text
stringlengths
2.85k
2.55M
label
int64
0
10
(Preprint) Control of a Bucket-Wheel for Surface Mining of Asteroids and Small-Bodies Ravi teja Nallapu,* Erik Asphaug,† and Jekan Thangavelautham‡ Near Earth Asteroids (NEAs) are thought to contain a wealth of resources, including water, iron, titanium, nickel, platinum and silicates. Future space missions that can exploit these resources by performing In-Situ Resource Utilization (ISRU) gain substantial benefit in terms of range, payload capacity and mission flexibility. Compared to the Moon or Mars, the milligravity on some asteroids demands a fraction of the energy for digging and accessing hydrated regolith just below the surface. However, asteroids and small-bodies, because of their low gravity present a major challenge in landing, surface excavation and resource capture. These challenges have resulted in adoption of a “touch and go techniques”, like the upcoming Osiris-rex sample-return mission. Previous asteroid excavation efforts have focused on discrete capture events (an extension of sampling technology) or whole-asteroid capture and processing. This paper analyzes the control of a bucket-wheel design for asteroid or smallbody excavation. Our study focuses on system design of two counter rotating bucket-wheels that are attached to a hovering spacecraft. Regolith is excavated and heated to 1000oC to extract water. The water in turn is electrolyzed to produce hydrogen and oxygen for rocket fuel. We analyze control techniques to maximize traction of the bucket-wheels on the asteroid surface and minimize lift-off the surface, together with methods to dig deeper into the asteroid surface. Our studies combine analytical models, with simulation and hardware testing. For initial evaluation of material-spacecraft dynamics and mechanics, we assume lunar-like regolith for bulk density, particle size and cohesion. Our early studies point towards a promising pathway towards refinement of this technology for demonstration aboard a future space mission. INTRODUCTION Asteroids are known to contain large reserves of water, iron, titanium, nickel, platinum, palladium and silicates1. In-Situ Resource Utilization (ISRU)2 aims at extracting these resources onsite, which if successful, can improve our current space exploration capabilities. While there has been progress reported in ISRU research for applications on the lunar surfaces3 and Mars4, the low-gravity environments on asteroids, on the other hand, presents additional challenges in performing ISRU5. One of the major challenges includes lift-off due to excavator thrusting off the small body. * PhD Student, Space and Terrestrial Robotic Exploration Laboratory, Arizona State University, 781 E. Terrace Mall, Tempe, AZ. † Professor and Ronald Greeley Chair of Planetary Science, Space and Terrestrial Robotic Exploration Laboratory, Arizona State University, 781 E. Terrace Mall, Tempe, AZ ‡ Assistant Professor, Space and Terrestrial Robotic Exploration Laboratory, Arizona State University, 781 E. Terrace Mall, Tempe, AZ 1 In this paper we focus on use of bucket-wheels to perform excavation. Bucket-wheels have been identified as one of the best tools for excavation in low-gravity environments, beating out bulldozers and front-loaders10,13. This paper addresses the problem of excavator lift-off which is the predominant concern on very low-gravity environments; by considering a dual bucket wheel excavator on the surface of Martian moon Phobos. Phobos as shown in Figure 1 has an escape velocity of about 11.1 m/s. Hence if any of the excavation mechanisms experience a force that can impart this speed, the mechanism would be thrown off the surface of Phobos. Figure 1. Martian moon Phobos is a promising target for ISRU. In this paper, we present a bucketwheel excavator system that has two counter rotating bucket wheels, like RASSOR developed by NASA KSC6, and can apply the necessary vertical plunge force. The counter rotation ensures that no horizontal velocities are imparted, and the vertical plungers ensure the compensation for lift-off due to any reactive-excavation forces. The paper starts with introduction to the bucket-wheel system design followed by optimization of its size, operating parameters and power source 7,8. We then present dynamical and control models of the system and a simulation of the proposed mechanism, followed by preliminary results and conclusions. BUCKET WHEEL SYSTEM DESIGN The design of a bucketwheel is a multi-disciplinary problem. Several forces, geometry, and performance requirements are considered. To understand the role of an excavator, a diagram of the full ISRU system is shown in Figure 2. The excavation system is powered by solar insolation. The solar panels generate the power based on the incident radiation, which is used to charge an onboard system battery that powers various subsystems. The ISRU unit is tasked with excavating regolith, extracting water by heating regolith and electrolyzing hydrogen and oxygen from the water. The hydrogen and oxygen would be used as propellant for rockets on their journey to earth or to power fuel cells power supplies during eclipse14,15,16. A design of a bucket-wheel and ISRU system was provided by Nallapu et al.8 (Figure 3) where the geometric parameters of the bucket wheel, including number of buckets and their dimensions were obtained by constraining the total operating power to 10 kW. 2 Figure 2. Systems diagram for the proposed ISRU system Figure 3. Proposed excavator with counter rotating bucket wheels This proposed unit consists of 2 counter rotating bucket-wheels that cancel out horizontal motion. The unit is also capable of compensating for any lift-off vertical forces by exerting a radial thrust as shown in Figure 3. SYSTEM DYNAMICS Excavation dynamics Consider a bucket wheel excavator, plunging the bucket into the regolith as shown in Figure 4. Let the wheel be applied torque, τ, and be spinning with a speed, ω. During the excavation, the wheel experiences the resistive forces from the regolith, Freg, normal to the cutting surface. Let Fsup, a force applied to counter-act any lift-off experienced. 3 Figure 4. Excavation modelling The resistive regolith forces are modeled based on a Luth-Wismer model9. The Luth-Wismer model separates the regolith forces as a non-cohesive force (sand) and pure cohesive (clay) forces. Skonieczny et al.10 formulates these forces as: (1) and, (2) The force acts normal to the cutting surface, and the total force is given by: (3) Equations of motion This method of separating the forces along the horizontal and vertical axis is similar in procedure used by Park11 and Xiao et al.12. The equations of motion for the system shown in Figure 3 are therefore given by: (4) (5) (6) (7) (8) (9) where F1 and F2 are the forces applied to counteract any lift-off forces on wheels 1 and 2 respectively. The forces Fr1 and Fr2 are the resistive forces on regolith acting on wheels 1 and 2 respec- 4 tively, and whose magnitude is calculated by Equation 3. Additionally, a random disturbance force in the range [0, Freg/2] was added to the magnitudes of Fr1 and Fr2 to account for any unmodeled dynamics. Finally, τ1 and τ2 represent the control torques exerted on the wheels 1 and 2 respectively. SIMULATION The design of the wheel as mentioned earlier was to maintain the total operational power under 10 kW. This required that the wheels’ spin at about 3 RPM8, which is the value of ωdes in Equations 11 and 12. Additionally, the translator motion needs to be confined vertically downwards, and no horizontal motion was desired. To realize this, a proportional-derivative (PD) controller was applied to the vertical forces, and wheel torques as given by Equations 10-12. The control law given by Equation 10 is only applied when y>0. The gains Ky, Kvy, K1, K2, and Kx are chosen by repetitively running simulations and picking the values that give satisfactory performance. (10) (11) (12) Equations 4 through 5 were propagated with an ODE4513 solver in MATLAB with the following parameters shown in Table 1. Table 1. Simulation Parameters. Simulation Parameter # Wheels Value 2 # Buckets per wheel 24 Mass of wheel (kg) 5 D (m) 0.622 W (m) 6.31E-02 β1 (degrees) 10 β2(degrees) -10 V (m/s) 0.12 3 1880 p (kg/m ) 2 g (m/s ) 0.0057 c (Pa) 147 Specific heat of the material (J/[Kg-Celsius]) 1,430 Surface temperature of the material (Celsius) 200 5 Water extraction temperature (Celsius) 1,000 Water content in the regolith (%) 10 Kx 1 Ky 0.9 Kvy 90,000 K1 4,000 K2 4,000 RESULTS This section presents the results of simulations described above. These simulations were run for a time length of 100 seconds with a step length of 0.1 seconds. Excavator Displacement The displacement response of the excavator is shown in Figure 5. As seen here, the displacement is confined to the negative y direction, while the counter rotating wheels ensure that there is no horizontal displacement. Figure 5. Target position of bucket-wheel Angular Velocity Response Angular velocity response of the 2 bucket wheels are shown in Figure 6. As seen here the 2 wheels reach the desired speed of 3.3 RPM almost instantly while rotating in opposite directions. 6 Figure 6. Angular velocity response Wheel Motion The rotations of the two bucket wheels are shown in Figure 7. As expected, their magnitudes are equal in opposite directions because of the counter rotations of the wheel. Figure 7. Wheel rotations CONCLUSIONS In this paper, we present the significance of ISRU in extracting resources from small-bodies such as Martian moon Phobos. Phobos is strategic location and a potential base-camp for a future human mission to Mars. This paper identifies one of the principle challenges of ISRU, namely lift-off of the excavation system in low-gravity environments such as Phobos. A dynamics and control model of a 10 kW excavator and ISRU system is presented, and its equations of motion are then propagated with computer simulations. The simulations show the proposed bucket-wheel excavator can indeed be stable on an asteroid surface, and is not susceptible to liftoff forces. Further work will be required in testing algorithms in a relevant environment and in identifying the required sensors and actuators to maintain a steady-pace of excavation on the surface of the small-body. 7 REFERENCES 1 W. F. Bottke, Asteroids III, University of Arizona Press, Tucson, Arizona 2002. 2 K. Zacny, P. Chu, G. Paulsen, et al. 'Mobile in-Situ Water Extractor (MISWE) for Mars, Moon, and Asteroids in Situ Resource Utilization', AIAA SPACE Conference, 2012. 3 P. Mueller, and R. H. King. 'Trade Study of Excavation Tools and Equipment for Lunar Outpost Development and ISRU', Space Technology and Applications International Forum (STAIF 2008), vol. 969, 2008, pp. 237-244. 4 G. B. Sanders, A. Paz, L. Oryshchyn, et al. 'Mars ISRU for Production of Mission Critical Consumables – Options, Recent Studies, and Current State of the Art', AIAA SPACE 2015 Conference and Exposition, 2015. 5 A. Probst, G. Peytavi, B. Eissfeller, et al. 'Mission Concept Selection for an Asteroid Mining Mission', Aircraft Engineering and Aerospace Technology, vol. 88, no. 3, 2016, pp. 458-470. 6 R. Mueller, R. E. Cox, T. Ebert, et al. 'Regolith Advanced Surface Systems Operations Robot (RASSOR)', 2013 IEEE Aerospace Conference, 2013, pp. 1-12. 7 T. Nakamura, and B. K. Smith. 'Solar Thermal System for Lunar ISRU Applications: Development and Field Operation at Mauna Kea, HI', Proceedings of SPIE, vol. 8124, no. 1, 2011. 8 R. T. Nallapu, A. Thoesen, L. Garvie, E. Asphaug, J. Thangavelautham. “Optimized Bucket Wheel Design for Asteroid Excavation,” International Astronautic Congress, 2016, Guadalajara, Mexico, IAF. 9 H.J. Luth and R.D. Wismer, 'Performance of Plane Soil Cutting Blades in Sand’. Journal of Terramechanics, vol. 9, no. 4, 1973, pp. 67-67. 10 K. Skonieczny,. 'Lightweight Robotic Excavation', PhD Thesis, Carnegie Mellon University, 2013. 11 B. Park. 'Development of a Virtual Reality Excavator Simulator: A Mathematical Model of Excavator Digging and a Calculation Methodology', 2002. 12 Thangavelautham, J., Abu El Samid, N., Grouchy, P., Earon E., Fu, T., Nagrani, N., D'Eleuterio, G.M.T., “Evolving Multirobot Excavation Controllers and Choice of Platforms Using Artificial Neural Tissue Controllers,” Proceedings of the IEEE Symposium on Computational Intelligence for Robotics and Automation, 2009, DOI: 10.1109/CIRA.2009.542319 13 J. Thangavelautham, K. Law, T. Fu, N. Abu El Samid, A. Smith, G. M.T. D’Eleuterio, “Autonomous Multirobot Excavation for Lunar Applications,” Robotica, pp. 1-39, 2017. 14 J. Thangavelautham and S. Dubowsky, “On the Catalytic Degradation in Fuel Cell Power Supplies for Long-Life Mobile Field Sensors.” Journal of Fuel Cells: Fundamental to Systems, pp. 181-195, 2013. 15 P. Iora, J. Thangavelautham, “Design of a mobile PEM power backup system through detailed dynamic and control analysis,” International Journal of Hydrogen Energy, vol. 37, no. 22, pp. 17191–17202, 2012. 16 J. Thangavelautham, D. Strawser, M. Cheung, S. Dubowsky, “Lithium Hydride Powered PEM Fuel Cells for LongDuration Small Mobile Robotic Missions,” IEEE International Conference on Robotics and Automation (ICRA), St. Paul, Minnesota, 2012. 8
3
Opinion dynamics in social networks with stubborn agents: An issue-based perspective ? Ye Tian a , Long Wang b,∗ arXiv:1609.03465v2 [cs.SY] 13 Aug 2017 a Center for Complex Systems, School of Mechano-electronic Engineering, Xidian University, Xi’an 710071, P. R. China b Center for Systems and Control, College of Engineering, Peking University, Beijing 100871, P. R. China Abstract Classic models on opinion dynamics usually focus on a group of agents forming their opinions interactively over a single issue. Yet generally agreement can not be achieved over a single issue when agents are not completely open to interpersonal influence. In this paper, opinion formation in social networks with stubborn agents is considered over issue sequences. The social network with stubborn agents is described by the Friedkin-Johnsen (F-J) model where agents are stubborn to their initial opinions. Firstly, we propose a sufficient and necessary condition in terms of network topology for convergence of the F-J model over a single issue. Secondly, opinion formation of the F-J model is investigated over issue sequences. Our analysis establishes connections between the interpersonal influence network and the network describing the relationship of agents’ initial opinions for successive issues. Taking advantage of these connections, we derive the sufficient and necessary condition for the F-J model to achieve opinion consensus and form clusters over issue sequences, respectively. Finally, we consider a more general scenario where each agent has bounded confidence in forming its initial opinion. By analyzing the evolution of agents’ ultimate opinions for each issue over issue sequences, we prove that the connectivity of the state-dependent network is preserved in this setting. Then the conditions for agents to achieve opinion consensus over issue sequences are established. Simulation examples are provided to illustrate the effectiveness of our theoretical results. Key words: Opinion dynamics, issue sequences, path-dependence, convergence, confidence bound 1 Introduction Recently, opinion dynamics has attracted much attention of researchers from various disciplines, such as applied mathematics, economics, social psychology, control theory, etc., due to its broad applications in modeling and explaining complex phenomena in social and artificial networks (Degroot, 1974; Lamport et al., 1982; Hegselmann & Krause, 2002; Acemoglu et al., 2010; Frasca et al., 2015; Ravazzi et al., 2015). In a social network, agents form opinions on various political, economic and social issues according to the information they received from neighbors determined by the network topology (Jadbabaie et al., 2003; Olfati-Saber & Murray, 2004; Ren & Beard, 2005) or the confidence/influence bound (Blondel et al., 2009; Mirtabatabaei & Bullo, 2012; Jing et al., 2016). A fundamental question in opinion dynamics is: how do the ? This work was supported by National Science Foundation of China (Grant Nos. 61533001 and 61375120) and the Fundamental Research Funds for the Central University (Grant No. JBZ170401). ∗ Corresponding author : Long Wang Email addresses: [email protected] (Ye Tian), [email protected] (Long Wang). Preprint submitted to Automatica network structure and opinions’ initial distribution influence the diffusion and aggregation of scattered opinions in the process of opinion formation? In Degroot (1974), a model is presented to characterize the process of a group of agents reaching opinion consensus on a common issue by pooling their subjective opinions, which is known as the Degroot model. The interactions between agents are described by a stochastic matrix which can be regarded as the one-step transition probability matrix of a Markov chain and some sufficient conditions for achieving opinion consensus are provided. To further investigate how the interpersonal influence contributes to the opinion formation, the work in Friedkin & Johnsen (1999) extends the Degroot model by introducing a diagonal matrix which represents agents’ susceptibilities to interpersonal influence. In the Degroot model and the Friedkin-Johnsen (F-J) model, interactions between agents are specified by given networks. Different from these linear models, in Hegselmann & Krause (2002), the authors present a nonlinear model in which agents have bounded confidence for others. In the Hegselmann-Krause (H-K) model, two agents are said to be connected if and only if the difference between their opinions is smaller than a given confidence bound, which means that the network topology of the H-K model is state-dependent. 15 August 2017 about convergence of the F-J model over a single issue usually require that the interpersonal influence network is undirected and connected or its adjacent matrix is strictly row-substochastic (Ghaderi & Srikant, 2014; Mirtabatabaei et al., 2014). We propose a milder sufficient and necessary condition in terms of network topology to guarantee that opinions of agents converge to constant values. Several properties of agents’ ultimate opinions for a single issue are provided. Secondly, we study opinion formation of the F-J model over a sequence of interdependent issues inspired by the path-dependence theory (North, 1990; Page, 2006; MacKay et al., 2006; Egidi & Narduzzo, 1997). By virtue of the inherent coherence between basic assumption of the F-J model and the path-dependence theory, we assume that the factor of each agent’s cognitive inertia over two interdependent issues equals to its stubborn factor. Then, each agent will form its initial opinion for the next issue by making a tradeoff between its initial opinion for the last interdependent issue and other agents’ initial opinions for the next issue. The connections between the interpersonal influence network and the network which characterizes the relationship of agents’ initial opinions for successive issues are established, and the sufficient and necessary condition for the F-J model to achieve opinion consensus or form clusters over issue sequences is proposed. Finally, we consider the more general case in which an information assimilation mechanism is employed to weaken agents’ interpersonal influence. We assume that each agent maintains a confidence bound in forming its initial opinions. This assumption is consistent with the reported echo-chamber effect (Sunstein, 2012; Dandekar et al., 2013), i.e., people usually assimilate information in a selective way: they tend to give considerable weight to the information supporting their initial opinions, and dismiss the undermining information meanwhile. Connectivity preservation of the modified F-J model is analyzed. Then we derive the conditions for achieving opinion consensus. The main difficulties for our analysis are twofold. On one hand, the evolution of agents’ initial opinions over issue sequences is not directly determined by the interpersonal influence network and agents’ stubborn extent, which increases complexity of our analysis from the graphical perspective. On the other hand, due to the fact that the evolution of agents’ initial opinions over issue sequences is influenced by the evolution of their opinions over time sequences, connectivity preservation of the modified F-J model is more complex compared with connectivity preservation of the H-K model. As has been widely reported (Ghaderi & Srikant, 2014; Frasca et al., 2015; Friedkin, 2015), a social network with stubborn agents does not generally achieve consensus over a single issue. Our investigation shows that opinions of a group of individuals can achieve consensus over each path-dependent issue sequence 1 , even if agents are stubborn to their initial opinions. Simply put, repeatedly arising or interdependent As the research in multi-agent systems continues, the tools that are available within opinion dynamics have been enriched considerably. The Degroot model is further investigated both on continuous-time dynamics and switched topologies (Jadbabaie et al., 2003; Olfati-Saber & Murray, 2004; Ren & Beard, 2005). In addition, many complex scenarios are also considered, including asynchronous consensus (Xiao & Wang, 2008), time delays (Wang & Xiao, 2007), finite-time consensus (Wang & Xiao, 2010), leaderfollowing framework (Liu et al., 2012; Ma et al., 2016), heterogeneous model (Zheng & Wang, 2014) and antagonistic interactions (Altafini, 2013), to name but a few. Based on the gossip algorithm (Boyd et al., 2006), randomized opinion dynamics is investigated in Acemoglu et al. (2010), Ravazzi et al. (2015), Frasca et al. (2015) and Li et al. (2013), respectively. In Ghaderi & Srikant (2014), the equilibrium and convergence rate of the F-J model are investigated. Under the assumption that the adjacent matrix of the interpersonal influence network is an irreducible sub-stochastic matrix with the row sum of at least one row strictly smaller than one, the authors transform the F-J model to a random walk, and the form of equilibrium is proposed based on the first hitting probabilities of the random walk. In Bindel et al. (2011), the F-J model is interpreted as a best-response game, and the ratio between the optimal solution and the Nash equilibrium solution, which is defined as the price of anarchy, is discussed under both undirected and directed networks. Most of the available literature on the F-J model focuses on opinion evolving over a single issue. Yet the F-J model does not in general converge to consensus over a single issue due to the presence of stubborn agents. Actually, the empirical evidence shows that consensus may be reached over a sequence of issues (Joshi et al., 2010). In practice, associations of individuals (such as small groups within firms, deliberative bodies of government, etc.) are usually constituted to deal with issues within particular issue domains which consist of deeply interdependent issues, especially repeatedly arising issues. In this scenario, individuals’ opinions for interdependent issues are always correlated. Thus, extending the existing theories of opinion dynamics to issue sequences is necessary and can uncover the underlying mechanism of opinion formation in the real world. Mirtabatabaei et al. (2014) and Jia et al. (2015) modify the F-J model and the Degroot model to investigate the evolution of agents’ selfappraisals over an issue sequence, respectively. In Parsegov et al. (2017), the authors present a multidimensional extension of the F-J model in which agents’ opinions for several interdependent issues evolve over time sequences. Different from the works which focus on agents’ selfappraisal dynamics (Mirtabatabaei et al., 2014; Jia et al., 2015) over sequences of independent issues, or evolution of agents’ opinions for multiple interdependent but unordered issues over time sequences (Parsegov et al., 2017), we consider the opinion formation of the F-J model which evolves over both interdependent issue sequences and time sequences in this paper. Firstly, convergence of the F-J model is studied over a single issue. The existing results 1 In the sequel, we say that an issue sequence is path-dependent or has the property of path-dependence if individual’s opinions over it have the path-dependent property. A detailed explanation of path dependence will be presented below. 2 ei j ∈ E means w ji , 0, otherwise, w ji = 0. A directed path of length m+1 from i to j is a finite ordered sequence of distinct vertices of G with the form i, k1 , k2 , · · · , km , j. Particularly, if i = j, the directed path is called a cycle of i( j). The directed graph G is said to be strongly connected if between every pair of distinct vertices i, j, there exists a directed path that begins at i and ends at j. A maximal subgraph of G that is strongly connected forms a strongly connected component (SCC). In an SCC of digraph G, if there exists a vertex which has parents belonging to other SCCs, we say that the in-degree of this SCC is nonzero, otherwise, we call it an independent strongly connected component (ISCC). The directed graph G is said to have a spanning tree if there exists a vertex that is called the root which has a directed path to every other vertex. The directed graph G is said to contain a star subgraph if there exists a vertex that is called the center vertex which has directed edges to any other vertices. An undirected graph is a digraph G(W) which satisfies that wi j = w ji for any i, j ∈ V. For more details about algebraic graph theory, we refer to Godsil & Royal (2001). issues lead to consensus. Our study also provides a theoretical explanation for the cohort effect (Joshi et al., 2010). Moreover, the evolution of opinions over issue sequences enhances the connectivity of the social network. As long as one of the partially stubborn agent’s opinions can scatter to all the rest partially stubborn agents through partially stubborn or non-stubborn agents, opinion consensus can be reached, and all the partially stubborn agents form a star subgraph in the network which characterizes the relationship of agents’ initial opinions for successive issues. The differences between opinion dynamics over issue sequences and a single issue give us a deeper understanding of opinion formation in social networks. The rest of this paper is organized as follows. In Section 2, we introduce some notions on graph theory and the F-J model. In Section 3, convergence of the F-J model is studied over a single issue, and some properties of ultimate opinions are proposed. In Section 4, opinion formation of the F-J model is investigated over issue sequences. In Section 5, we consider opinion formation of the F-J model over issue sequences with bounded confidence. In Section 6, numerical simulations are given to illustrate the effectiveness of theoretical results. Some conclusions are drawn in Section 7. 2.2 The F-J model presented in Friedkin & Johnsen (1999) sheds light on the relationship between interpersonal influence and opinion change in social networks. The F-J model is a generalization of the Degroot model (Degroot, 1974). It introduces a positive diagonal matrix to quantify the extent of each member of the group open to the interpersonal influence. Notation: Denote the set of real numbers, natural numbers, n-dimensional real vector space and n × n real square matrix space by R, N, Rn and Rn×n , respectively. 1n is a vector of size n having all the elements equal 1. In is the n × n identity matrix. For a given vector or matrix A, AT denotes its transpose, kAk∞ denotes its maximum row sum norm. 0 denotes an all-zero vector or matrix with compatible dimension. ρ(A) denotes the spectral radius for a matrix A ∈ Rn×n . By | · | we denote the absolute value, modulus and cardinality of real number, complex number and set, respectively. Given a vector ζ ∈ Rn and a matrix sequence {Ak }m k=1 with Ak ∈ Rn×n , diag(ζ) denotes an n×n diagonal matrix whose diagonal elements are the elements of ζ, diag(A1 , A2 , . . . , Am ) denotes an nm × nm block diagonal matrix with Ak being its block on diagonal. 2 Consider n agents forming opinions on a certain issue in a network formulated by a weighted digraph G(W) = (V, E, W). Each agent holds an initial opinion xi (0), i ∈ V. The classic F-J model is: x(k + 1) = ΞW x(k) + (I − Ξ)x(0), (1) where x(k) = (x1 (k), x2 (k), . . . , xn (k))T ∈ Rn is a vector representing the stack of opinions with k ∈ N being the scale of time, W is a stochastic weighted adjacency matrix characterizing the structure of the interpersonal influence network, Ξ = diag(ξ) is the diagonal matrix mentioned above with ξ = (ξ1 , ξ2 , . . . , ξn )T ∈ Rn satisfying ξi ∈ [0, 1]. ξi represents the susceptibility of agent i to interpersonal influence while 1 − ξi quantifies the extent to which agent i is stubborn to its initial opinion. Here, xi (0) can be regarded as the internal opinions of agent i for the issue (Bindel et al., 2011). Note that if ξ = 1n , the F-J model collapses to the Degroot model. However, different from the Degroot model in which disagreement is mainly the consequence of lack of communication, it is more likely the result of the presence of stubborn agents anchored to their own initial opinions in the F-J model. This is coincident with the empirical evidence that failing in reaching agreement usually owes to the stubbornness of individuals in practice, rather than the insufficiency of persistent contracts and interactions (Friedkin & Johnsen, 1999; Friedkin, 2011; Frasca et al., 2015). Preliminaries In this section, some basic concepts on graph theory are introduced. Then, a brief introduction of the F-J model is presented. 2.1 Introduction of the F-J model Basic concepts on graph theory A weighted directed graph (digraph) G of order n is a triple G(W) = (V, E, W) which consists of a vertex set V = {1, 2, . . . , n}, an edge set E = {ei j : i, j ∈ V} and a weighted adjacency matrix W = [wi j ]n×n with entries wi j . An edge ei j is an ordered pair (i, j) which means that node j can obtain information from node i, but not necessarily vice versa. i is called the parent of j if (i, j) ∈ E. The adjacency elements associated with the edges of the graph are nonzero, i.e., 3 As mentioned above, if Ξ = I in equation (1), the F-J model is transformed into the Degroot model: model is convergent if and only if 1 is the only maximummodulus eigenvalue of W. x(k + 1) = W x(k), For two positive integers, we say they are coprime if and only if their greatest common divisor is 1. For agent i, if ξi < 1, we say it is a stubborn agent, otherwise, we say it is a non-stubborn agent. In Golub & Jackson (2010), the authors prove that the Degroot model (2) is convergent if and only if each ISCC of G(W) is aperiodic from the perspective of Markov chain corresponding to W. In Friedkin (2015), convergence of the F-J model requires that the lengths of all cycles of G(ΞW) are coprime. In the next theorem, we propose a graph-theoretical condition for the F-J model to achieve convergence by virtue of properties of irreducible and primitive matrix’s eigenvalue. Different from the Degroot model (2), convergence of the F-J model only depends on the ISCC composed of non-stubborn agents in G(W). Before proposing our convergence condition, we need the following lemmas in Horn & Johnson (2012). (2) where W is a stochastic matrix. On the other hand, consider the augmented system of the F-J model (1). Let x̂(k) = [x(0)T x(k)T ]T , we have x̂(k + 1) = Ŵ x̂(k), (3) where   In×n Ŵ =  (I − Ξ)  0   . ΞW From equation (3), the F-J model is equivalent to the leaderfollowing structure (Liu et al., 2012) where agents’ initial opinion are virtualized as stationary leaders. 3 Lemma 2 Let A ∈ Rn×n be irreducible and suppose that λ ∈ R is not in the interior of any Ger s̆gorin disc of A. If some Ger s̆gorin circle of A does not pass through λ, then λ is not an eigenvalue of A. Convergence of the F-J model over a single issue A fundamental problem with respect to the F-J model is its limiting behavior when the time scale k tends to infinity. In this subsection, convergence of the F-J model is considered over a single issue. A sufficient and necessary condition on the regularity of ΞW for convergence of the F-J model is presented in Parsegov et al. (2017). Here we give a sufficient and necessary condition from the perspective of the interpersonal influence network G(W) which ensure that x(k) converges to a constant vector as k → ∞. Firstly, we propose the definition of the convergence of dynamic systems. Lemma 3 Let A ∈ Rn×n be irreducible and nonnegative, and let P1 , P2 , . . . , Pn be the vertices of the directed graph G(A). Let Li = {l1i , l2i , . . .} be the set of lengths of all cycles of Pi in G(A), Let γi be the greatest common divisor of all the lengths in Li . Then A is primitive if and only if γ1 = γ2 = · · · = γn = 1. Remark 1 Note that the condition in Lemma 3 is consistent with the definition of aperiodicity (Definition 2 in Golub & Jackson (2010)). For a nonnegative and irreducible matrix, aperiodicity ensures that it does not have any periodic eigenvalues, that is , it is primitive. Thus, aperiodicity is a graph-theoretical criterion for primitivity. By the virtue of aperiodicity, we provide a sufficient and necessary condition concerning on the interpersonal influence network G(W) for the F-J model to achieve convergence in the next theorem. Definition 1 For a dynamic system with state vector `(k) ∈ Rn , k ∈ N, if for any initial state `(0), there exists a constant vector `ˆ ∈ Rn , such taht ˆ lim `(k) = `, k→∞ we say the system is convergent. Lemma 1 The F-J model (1) is convergent if and only if 1 is the only maximum-modulus eigenvalue of ΞW. Assumption 1 For each ISCC of G(W) which only consists of more than one non-stubborn agent, there exists at least one agent having two cycles which are coprime in length. Lemma 1 naturally follows from Corollary 2 and Lemma 5 in Parsegov et al. (2017). In Lemma 1, that 1 is the only maximum-modulus eigenvalue of ΞW means ΞW has no other maximum-modulus eigenvalues except 1, here the algebraic multiplicity of eigenvalue 1 may be larger than one. In other words, suppose λ is an eigenvalue of ΞW, then |λ| = 1 implies λ = 1. Otherwise, let a + bi , 1 be an eigenb value of ΞW with |a+bi| = 1. We have a+bi = ei arctan a = eiθ , where θ ∈ [−π, π] is the principal value of the argument of a + bi. Thus, (a + bi)k = eiθk , which shows that (a + bi)k is periodic. Suppose that J is the Jordan canonical form of ΞW, then J k is periodic, which indicates that system (1) is nonconvergent. Let Ξ = I, one can readily get that the Degroot Assumption 1 means that all ISCCs of G(W) consisting of only non-stubborn agents are aperiodic. This condition is milder than condition for convergence of the Degoot model (2) which requires that all ISCC of G(W) are aperiodic (Golub & Jackson, 2010). Theorem 1 The F-J model (1) achieves convergence if and only if Assumption 1 holds. Proof. Suppose that G(W) has α SCCs with α ≤ n. Because W is reducible, then there exists a permutation matrix P such 4 Since system (1) is convergent under Assumption 1, the limit of Ψ(k) exists. Let Ψ = limk→∞ Ψ(k). that   W1 × · · · ×      W · · · × 2   T  W̃ = P WP =  . . ..  ,  . .      Wα Property 1 Ψ is a stochastic matrix. 0 Proof. Firstly, we show that Ψ(k) is stochastic for any k ∈ N inductively. Note that ΞW and I − Ξ are both nonnegative, thus Ψ(k) is nonnegative. From equation (5), we have Ψ(0) = I and Ψ(1) = ΞW + I − Ξ are both stochastic. Now suppose that Ψ(l) is a stochastic matrix, we have where Wi , i ∈ {1, 2, . . . , α} is the irreducible adjacent matrix corresponding to each SCC of G(W) (Brualdi & Ryser, 1991). Let Ξ̃ = PT ΞP = diag(Ξ1 , Ξ2 , . . . , Ξα ), then we have ΞW = PΞ̃W̃PT . If there exists ξ j = 0 which is a diagonal element of Ξi , then G(Wi ) is separated into a vertex j which corresponds to a row of Ξi Wi with all elements being zero and several SCCs with nonzero in-degrees in G(Ξi Wi ). Otherwise, if G(Wi ) has nonzero in-degree, or G(Wi ) is an ISCC but contains at least one stubborn agent, Ξi Wi is a irreducible matrix which satisfies kΞi Wi k∞ ≤ 1 and contains at least one row whose row sum is strictly smaller than 1. From Lemma 2, we obtain ρ(Ξi Wi ) < 1. If G(Wi ) is an ISCC and contains no stubborn agent, i.e., Ξi Wi = Wi is an irreducible stochastic matrix, then 1 is its only maximum-modulus eigenvalue if and only if Wi is primitive. In this case, if G(Wi ) contains only one non-stubborn agent i, then the eigenvalue of Wi is 1. Otherwise, by Lemma 3, 1 is the only eigenvalue of Wi that has maximum modulus if and only if there exists at least one agent in G(Wi ) which has at least two cycles with coprime length. In conclusion, 1 is the only eigenvalue of ΞW with maximum-modulus if and only if Assumption 1 holds. By Lemma 1, the F-J model (1) achieves convergence if and only if Assumption 1 holds.  Ψ(l + 1)1n = ((ΞW)l+1 + = ((ΞW)l ΞW + = ((ΞW)l (ΞW + I − Ξ) + l−1 X (ΞW)t (I − Ξ))1n t=0 l−1 X = (ΞW)l Ψ(1)1n + (ΞW)t (I − Ξ)1n . t=0 l l Since Ψ(1) is stochastic, we have (ΞW) Pl−1Ψ(1)1nt = (ΞW) 1n . l Therefore, Ψ(l + 1)1n = ((ΞW) ΞW + t=0 (ΞW) (I − Ξ))1n = Ψ(l)1n = 1n , which implies that Ψ(k) is stochastic for any k ∈ N. Moreover, since Ψ1n = limk→∞ Ψ(k)1n = 1n , we obtain that Ψ is a stochastic matrix.  Property 1 shows that each agent’s opinion converges to a convex combination of all agents’ initial opinions. Let x∗ = limk→∞ x(k). Denote the set of fully stubborn agents by V f = {i ∈ V|ξi = 0}, the set of partially stubborn agents by V p = {i ∈ V|0 < ξi < 1} and the set of non-stubborn agents by Vn = {i ∈ V|ξi = 1}. Without loss of generality, let V f = {1, 2, . . . , r1 }, V p = {r1 + 1, r1 + 2, . . . , r1 + r2 }, Vn = {r1 + r2 + 1, r1 + r2 + 2, . . . , n}. Let Ψ = [ψ1 , ψ2 , . . . , ψn ], where ψi ∈ Rn . The following property reveals the influence of the interpersonal influence network G(W) and the levels of stubbornness of agents to the ultimate opinion x∗ . Property 2 Under Assumption 1, for any i ∈ Vn , if there S exists j ∈ V f V p which has a directed path to agent i in graph G(W), then ψi = 0. Proof. Following equation (5), we obtain Ψ(k + 1) − Ψ(k) k k−1 X X k+1 t k =(ΞW) + (ΞW) (I − Ξ) − (ΞW) + (ΞW)t (I − Ξ) t=0 t=0 (4) =(ΞW) k+1 − (ΞW) + (ΞW) (I − Ξ) k k =(ΞW)k Ξ(W − I). where k−1 X (ΞW)t (I − Ξ) + (ΞW)l (I − Ξ))1n t=0 Next, we shall further analyze the ultimate opinion of system (1). Employing equation (1) iteratively, we have Ψ(k) = (ΞW)k + (ΞW)t (I − Ξ))1n t=0 l−1 X Remark 2 In the available literature, convergence of the F-J model over a single issue usually requires that G(W) is undirected connected or every ISCC of G(W) contains at least one stubborn agent (Mirtabatabaei et al., 2014; Ghaderi & Srikant, 2014). Theorem 1 shows that the convergence is achieved under the milder condition which ensures condition in Lemma 1. The proof of Theorem 1 also implies that each ISCC consisting of non-stubborn agents achieves consensus as the F-J model converges. Note that from Theorem 1, that each ISCC consisting of non-stubborn agents of G(W) has at least one agent containing self-loop is a sufficient but not necessary condition for convergence of the F-J model. However, if G(W) is undirected, the F-J model achieve convergence if and only if each ISCC consisting of non-stubborn agents has at least one agent containing selfloop in G(W). The proof directly follows from Theorem 1. x(k) = Ψ(k)x(0), l X (ΞW)t (I − Ξ). (5) From the proof of Theorem 1, limk→∞ (ΞW)k exists. More- t=0 5 over, since limk→∞ Ψ(k) = Ψ , we have lim (ΞW)k Ξ(W − I) = lim (ΞW)k (I − Ξ) = 0. k→∞ k→∞ represents the proportion of the initial opinion of agent i in each agent’s ultimate opinion. Property 2 suggests that if a non-stubborn agent wants to determine the group’s ultimate opinion, i.e., to be a leader, it must ensure that it is not influenced by stubborn agents. If we regard initial opinions of stubborn agents as external information, then this result is consistent with the experimental results in Dyer et al. (2009) and Couzin et al. (2005) that the leaders emerging spontaneously in groups are usually the individuals who have more power in communication or external information. Furthermore, for any individual who has no external information, it can never be a leader unless it does not receive information of the individuals who have external information. (6) Let limk→∞ (ΞW)k = Q = [q1 , q2 , . . . , qn ] = [qi j ]n×n with qi ∈ Rn , from equation (6) we obtain ( QΞ = Q QW = Q. S Because QΞ = Q, we have qi = 0 for any i ∈ VS V p . It f follows from QW = Q that for any i ∈ V, j ∈ V V , one f p P has nt=r1 +r2 +1 qit wt j = 0. Recalling that Q and W are both nonnegative, we have that for any i ∈ Vn , if there exists S j ∈ V f V p such that wi j , 0, then qli = 0 for any l ∈ V, i.e., qi = 0. Furthermore, for aforementioned i ∈ Vn , l ∈ V and qli = 0, if there exists u ∈ Vn satisfying wui , 0, then qlu wui = qli = 0. Thus, qu = 0. This indicates that for any agent i ∈ Vn , as long as it receives information from any stubborn agents directly or indirectly, there holds qi = 0. 4 Opinion formation of the F-J model over issue sequences In this section, we study opinion formation of the F-J model over sequences consisting of interdependent issues. On one hand, most of the prior investigations on opinion dynamics are considered over a single issue. In practice, however, associations of individuals are constituted to deal with sequences of issues within particular domains, and successive issues in specific issue domain are always correlated. On the other hand, for individuals, related issues always arise repeatedly in practice. Empirical evidences show that a group of individuals who share a common set of experiences will hold highly similar beliefs or characteristics (Joshi et al., 2010). Hence, it is significant to consider the formation of opinions over issue sequences. P t Let Q̃ = limk→∞ k−1 t=0 (ΞW) (I − Ξ) = [q̃1 , q̃2 , . . . , q̃n ], then there holds Ψ = Q + Q̃ = [ψ1 , ψ2 , . . . , ψn ] = [q1 + q̃1 , q2 + q̃2 , . . . , qn + q̃n ]. Since ξi = 1 for any i ∈ Vn , we obtain q̃i = 0 for any i ∈ Vn , namely, qi = ψi for anySi ∈ Vn . In conclusion, for any i ∈ Vn , if there exists j ∈ V f V p which has a directed path to agent i in graph G(W), then ψi = 0.  In Ghaderi & Srikant (2014), the authors study the equilibrium of system (1). Under the assumption that the network topology is undirected and connected, they present the form of equilibrium taking advantage of the appropriately defined hitting probabilities of a random walk over the network. However, since their conditions for convergence require that ρ(ΞW) < 1, the equilibrium is only related to the initial opinions of stubborn agents. A similar assumption for directed graph is presented in Mirtabatabaei et al. (2014). In Property 2, we show that under the condition of Assumption 1, if a non-stubborn agent can obtain information directly or indirectly from any stubborn agents, including fully stubborn and partially stubborn agents, then the ultimate opinion x∗ does not include the information of this non-stubborn agent’s initial opinion. Otherwise, according to the proof of Theorem 1, the ultimate opinion is also related to the initial opinions of non-stubborn agents which form ISCCs with no stubborn agents in it. Next, we shall briefly introduce the path-dependence theory. The path-dependence theory is originally studied in economic and institutional change (North, 1990; Page, 2006), and subsequently developed in cognitive psychology (Egidi & Narduzzo, 1997; MacKay et al., 2006). In Egidi & Narduzzo (1997), path-dependence is observed in the behavioral experiments of human groups. The main point of pathdependence is “history matters”. That is, the decision one faces for any given circumstance are constrained by the decisions one has made in the past, even though past circumstance may no longer be relevant. This phenomenon is ubiquitous in technological innovation, institutional change and cognitive process of humans, etc. In the cognitive and decision-making process of humans, people always have cognitive inertia with which they are unwilling to change their beliefs or decisions over interdependent issues. For example, one may wonder that why the U.S. standard railroad gauge is 4 feet 8.5 inches, which is an exceedingly odd number. A well known explanation for this question is that it is resulted from path-dependence (North, 1990). Firstly, the U.S. railroads were built by English expatriates and that is the guage they built them in England. Further, the first rail lines of England were built by the same people who built the pre-railroad tramways, where that gauge was used. Moreover, the tramways were built by the same people who built wagons using the same jigs and tools. In fact, that gauge is the wheel spacing of the wagon. In this example, peo- Remark 3 Property 1 and Property 2 also provide an interesting perspective on leadership in social networks (Dyer et al., 2009) and animal groups (Couzin et al., 2005). In Wang & Xiao (2007), a generalized definition of “leader” and “follower” is presented. A leader refers to the agent who determines the ultimate state of the system, and the rest are followers. This definition includes the notion of “leader” and “follower” in which a leader is the agent who sends information to others but never receives information. From Property 1, Ψ is a stochastic matrix, thus the element of ψi 6 issue 0 issue 1 ... issue 2 issue s where the first term of Ci (x) depicts the cognitive inertia of agent i to change its initial opinions (i.e., internal opinions) for interdependent issues, and the second term represents the willingness of agent i to escape being unsocial. As a consequence, the initial opinion of agent i for issue s + 1 satisfies issue s+1 time 0 k0 k1 k2 ks-1 ks Fig. 1. An issue sequence. ple’s decisions over the interdependent issue sequence “The gauge of the U.S. railroad”, “The gauge of the English railroad”, “The gauge of the tramway” and “The wheel spacing of the wagon” remain unaltered. This phenomenon is named cognitive freezing (MacKay et al., 2006). Since in the FJ model, agents’ initial opinions can be regarded as their internal opinions, we will establish a connection between agents’ initial opinions for interdependent issues based on the path-dependence theory. xi (s+1, k s+1 ) = ζi xi (s, k s )+(1−ζi ) n X wi j x j (s+1, k s+1 ), (9) j=1 i.e., x(s + 1, k s+1 ) = Λx(s, k s ) + (I − Λ)W x(s + 1, k s+1 ), (10) where Λ = diag(ζ1 , ζ2 , . . . , ζn )T . Let s = 0, 1, 2, . . . denote a sequence of interdependent or repeatedly arising issues over which path-dependence works 2 , k s be a constant denoting the time at which issue s arises, x(s, k) denote agents’ opinions for issue s at time k. Suppose that issue 0 arises at time 0, agents stop dealing with issue s − 1 and start to deal with issue s at time k s (Fig. 1). Note that different from the assumptions in Mirtabatabaei et al. (2014) and Jia et al. (2015) which require the time interval k s+1 − k s tends to infinity, here k s+1 − k s can be any positive integer. For a given issue s, system (1) is modified as: The hypothesis in equation (10) can be naturally observed from reality. In practice, an individual always has cognitive inertia over sequences of path-dependent issues, especially when an issue arises repeatedly. In extreme cases, cognitive inertia may reinforce into cognitive freezing with which individuals keep their decisions unchangeable, even they are exposed to more efficient options (Egidi & Narduzzo, 1997; MacKay et al., 2006). Next we propose an assumption about G(W) which ensures that I − ΞW is nonsingular. x(s, k + 1) = ΞW x(s, k) + (I − Ξ)x(s, k s ), (7) Assumption 2 For each ISCC of G(W), there exists at least one stubborn agent in it. where x(s, k s ) represents initial opinions, i.e., internal opinions, of agents for issue s, and k ∈ [k s , k s+1 ]. Lemma 4 I − ΞW is nonsingular if and only if Assumption 2 holds. Let ζi denote the factor of cognitive inertia of agent i for two successive issues in an path-dependent issue sequence. Note that the basic assumption of the F-J model is that agents are anchored to their initial opinions over a given issue, this is coincident with the path-dependence theory which emphasizes that individual has the cognitive inertia over a sequence of interdependent issues. Thus, we assume that for each agent i, its factor of cognitive inertia ζi equals to its stubborn factor, i.e., ζi = 1 − ξi . Then, basing on the game theory formulation of the F-J model in Bindel et al. (2011) and the self-reinforcing process of path-dependence (North, 1990), we assume that in forming its initial opinion for issue s + 1, agent i attempts to myopically minimize the following cost function: Ci (x) = ζi (xi − xi (s, k s ))2 + (1 − ζi ) n X wi j (xi − x j )2 , Proof. Sufficiency. Since Assumption 2 holds, the proof of Theorem 1 shows that ρ(ΞW) = ρ(Ξ̃W̃) < 1, which implies that I − ΞW is nonsingular. Necessity. If Assumption 2 does not hold, there exists at least one eigenvalue of ΞW equals to 1. Namely, I − ΞW is singular.  From equation (10) we have (I − W + ΛW)x(s + 1, k s+1 ) = Λx(s, k s ). If Assumption 2 holds, then I − ΞW is nonsingular. Since Λ = I − Ξ, we obtain (8) x(s + 1, k s+1 ) = (I − ΞW)−1 (I − Ξ)x(s, k s ). j=1 2 Note that the issue sequence is not necessarily consecutive over time, some other uncorrelated issues may interpolate in it. For example, Let S 1 = S 10 , S 11 , S 12 , . . . denote a issue sequence which consists of interdependent issues, and S 2 denote another. The issues in S 1 and S 2 may be irrelevant and arise alternately. Without loss of generality, we focus on each path-dependent subsequence in this paper. (11) Since ΞW + I − Ξ is a stochastic matrix, we have that for any nontrivial Ξ and W, x(s, k s+1 ) = χ1n if and only if x(s, k s ) = χ1n , where χ ∈ R is a constant. Thus, we focus on consensus of agents’ initial opinions for each issue in the sequel. Now, we shall propose a definition of opinion consensus for system (7), (10). 7 1 for any i ∈ V. From (14) we obtain Definition 2 System (7), (10) is said to achieve consensus if and only if for any initial opinion x(0, 0), there exists a constant χ ∈ R, such that lim x(s, k s ) = χ1n . 1 + ξi (12) s→∞ ψ̂ii = Remark 4 Suppose that Assumption 2 holds. If k s+1 − k s is large enough for each s, such that ∞ P then, according to Lemma 4 and equation (7), we obtain x(s + 1, k s+1 ) = x(s, ∞), (13) which implies that agents’ initial opinions for issue s + 1 equal to their limiting opinions for issue s, namely, cognitive freezing happens. This is consistent with our discussion above that cognitive inertia can be reinforced into cognitive freezing in extreme cases. For example, as more people bought QWERTY keyboard, buying other keyboards with different key configuration requires learning to type anew. Thus, people’s opinions for the sequence of issues related to keyboard will be locked in QWERTY keyboard, even though there are many other more efficient types of keyboard (Page, 2006). Other examples of cognitive freezing are also reported, such as the fall of the Dundee jute industry (MacKay et al., 2006), the persistence of the narrow-gauge rail (North, 1990), etc. In Page (2006), the author attributes cognitive freezing to the externalities of other people. Note that in equation (8), we assume that each agent’s initial opinion for the next issue is influenced by other agents, i.e., the interpersonal influence creates externalities under Assumption 2, which lead to cognitive freezing in equation (13). S 1 > 0. 1 − ξi wii V p , we have ψii = ψ̂ii (1 − (ΞW)t . Let (ΞW)t = [ψ̂ti j ]n×n . Note that ψ̂ti j > 0 repre- Lemma 5 connects G(Ψ) with G(W), such that we can address property of G(Ψ) by analyzing G(W). From the proof of Lemma 5, we have  Ir1 ×r1 0  Ψ =  Ψ p f Ψ pp  Ψn f Ψnp Let Ψ = [ψi j ]n×n = (I − ΞW)−1 (I − Ξ). The next lemma reveals the connections between G(Ψ) and G(W).  0  0 ,  0 where Ψ pp ∈ Rr2 ×r2 . Property 3 Any root of subgraph G(Ψ pp ) is a center vertex which has directed edges to any other vertices of G(Ψ pp ). Lemma 5 Under Assumption 2, the following statements hold: S (i) ψii > 0 for any i S ∈ V f Vp. S (ii) For any i ∈ V p Vn , j ∈ V f V p , i , j, ψi j > 0 if and only if there exists a directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i) from S vertex j to vertex i in G(W), where j1 , j2 , . . . , jm ∈ V p Vn . Proof. Suppose that i is a root of G(Ψ pp ). Let (i, j) and ( j, l) be edges of G(Ψ pp ) for j, l ∈ V p . By Lemma S 5, there exist directed paths consisting of vertices in V p Vn from i to j and j to l in G(W), respectively. Thus, there exists at least aSdirected path consisting of edges between vertices in V p Vn from i to l in G(W). From Lemma 5 we have ψli > 0, namely, there exists a directed edge from i to l in G(Ψ pp ). Following the same lines as above, one has that any root of subgraph G(Ψ pp ) is a center vertex which has directed edges to any other vertices of G(Ψ pp ).  Proof. Let Ψ̂ = [ψ̂i j ]n×n = (I − ΞW)−1 . (i) Since (I − ΞW)Ψ̂ = I, we have i ∈ V. ≥ sents that there exist paths consisting of t edges (maybe appear repeatedly or contain self-loops ) in G(ΞW) start from vertex j to vertex i. Moreover, if we take no account of the weights, G(ΞW) and G(W) have no difference except the edges to fully stubborn agents. Thus, if there exists a directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i) S from vertex j to vertex i in G(W), and j1 , j2 , . . . , jm ∈ V p Vn , we have ψ̂m i j > 0. Therefore, ψ̂i j > 0. Otherwise, we have ψ̂ti j = 0 for any t ∈ N. Thus, ψ̂i j = 0. Since ξ j < 1 for S j ∈ V f S V p , ψi j = ψ̂Si j (1 − ξ j ), we have that ψi j > 0 for any i ∈ V p Vn , j ∈ V f V p , i , j if and only if there exists a directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i) from S vertex j to vertex i in G(W), where j1 , j2 , . . . , jm ∈ V p Vn .  Thus, wit ψ̂ti , 1 − ξi wii (ii) Since Assumption 2 holds, one has (I − ΞW)−1 = t=0 x(s, ∞) = (I − ΞW)−1 (I − Ξ)x(s, k s ). n X wit ψ̂ti t=1 t,i Since 1 − ξi > 0 for any S i ∈ Vf ξi ) > 0 for any i ∈ V f V p . x(s, k s+1 ) = x(s, ∞), ψ̂ii (1 − ξi wii ) = 1 + ξi n P (14) t=1 t,i Lemma 5 and Property 3 show that if there exists a directed path from a stubborn agent i to a partially stubborn or non-stubborn agent j in G(W), then (i, j) is an edge of G(Ψ). Moreover, if G(Ψ pp ) contains a spanning tree, then it Assumption 2 implies that if wii = 1, ξi < 1. Thus, ξi wii < 8 also contains a star subgraph. In other words, the connectivity of the social network is enhanced over issue sequences. The block form of Ψ shows that fully stubborn agents never change their opinions in the process of opinion formation. Thus, we consider the scenario in which there are no fully stubborn agents in the social network. form of Ψ indicates that when there exists more than one fully stubborn agent in the network, consensus can not be achieved for arbitrary initial opinion unless the influence of fully stubborn agents to others is identical (Friedkin, 2015). Since the condition for achieving opinion consensus in Theorem 2 is sufficient and necessary, it also gives the condition for opinions of agents to form clusters. Theorem 2 Suppose that V f = ∅ and Assumption 2 holds. System (7), (10) achieves opinion consensus if and only if there exists a partially stubborn agent which has directed paths to any other partially stubborn agents in G(W). Corollary 1 Suppose that V f = ∅ and Assumption 2 holds. System (7), (10) forms opinion clusters if and only if there exists more than one ISCC in G(W). Proof. Sufficiency. Since V f = ∅, i.e., r1 = 0, we have 5    Ψ pp W pp W pn     , Ψ =  W =  Ψnp Wnp Wnn  0  , 0 As discussed in Section 4, the cognitive inertia of agent can be reinforced into cognitive freezing under Assumption 2, i.e., each agent’s initial opinion for issue s + 1 equals to its limiting opinion for issue s if its opinion for s converges. It is mainly because of the externalities created by agents’ interpersonal influence under which agents treat opinions of others with no difference. However, in practice, people usually assimilate information in a selective way: they tend to give considerable weight to the information supporting their initial opinions, and dismiss the undermining information meanwhile, which is named echo-chamber effect (Sunstein, 2012; Dandekar et al., 2013). Similar observations in animal groups are reported in Couzin et al. (2005). In this section, we consider a more general scenario that each agent maintains a confidence bound in forming its initial opinions. where W pp ∈ Rr2 ×r2 , Wnn ∈ Rn−r2 ×n−r2 , Ψ pp ∈ Rr2 ×r2 . From Property 1 we have that Ψ pp and Ψnp are both stochastic matrices. Lemma 5. (i) indicates that Ψ pp has positive diagonal elements. Moreover, since there exists a partially stubborn agent which has S directed paths consisting of edges between vertices in V p Vn to any other partially stubborn agents in G(W), Lemma 5. (ii) implies that G(Ψ pp ) has a spanning tree. By Corollary 3.5 and Lemma 3.7 in Ren & Beard (2005), we have that Ψ pp is stochastic, indecomposable and aperiodic (SIA). That is, there exists a nonnegative vector ν ∈ Rr2 such that lim Ψ spp = 1r2 νT , where ν satisfies ΨTpp ν = ν and s→∞ 1T ν = 1. Note that   Ψ spp lim Ψ = lim  s→∞ s→∞ Ψ Ψ s−1 np pp s Opinion formation of the F-J model over issue sequences with bounded confidence For simplicity, we employ the assumption used in Mirtabatabaei et al. (2014) and Jia et al. (2015) that the scale of time k increases faster than the scale of issue s in this section. In other words, the convergence of opinion x(s, k) can be achieved with k increasing before the next issue s+1 arising, i.e., k s = ∞ for issue s − 1 and k s = 0 for issue s. From Remark 4, we have x(s + 1, 0) = x(s, ∞) under Assumption 2, which means that agents take their ultimate opinions for the last issue as their initial opinions for the next issue. Inspired by the echo-chamber effect, we suppose that agent i forms its initial opinion xi (s + 1, 0) by taking a weighted average of other agents’ ultimate opinions x j (s, ∞), j ∈ V which satisfy |xi (s, ∞) − x j (s, ∞)| < d, where d ∈ R is the given confidence bound.      0  1r2 νT 0  1r2 νT 0  =   =   , 0 Ψnp 1r2 νT 0 1n−r2 νT 0 which indicates that Ψ spp converges to a matrix of rank one as s → ∞. Since Assumption 2 holds, we have lim s→∞ x(s, k s ) = Ψ s x(0, 0) = [νT 0Tn−r2 ]x(0, 0)1n , namely, system (7), (10) achieves opinion consensus as s → ∞. Necessity. If there exists no partially stubborn S agent which has directed paths consisting of vertices in V p Vn to any other partially stubborn agents in G(W), Lemma 5. (ii) suggests that G(Ψ pp ) does not contain any spanning trees. This implies that the eigenvalue 1 of Ψ pp has algebraic multiplicity larger than one, that is, Ψ has more than one eigenvalue equal to 1. In conclusion, opinion consensus cannot be achieved.  Let Ni (s) = { j ∈ V : |xi (s, ∞) − x j (s, ∞)| < d} denote the set of agents whose ultimate opinions for issue s are within the confidence interval of agent i, NiΨ = { j ∈ V : ψi j > 0} denote the set of neighbors of agent i in G(Ψ). Here we employ a symmetric modification of the H-K model (Jing et al., 2016; Yang et al., 2014): X xi (s + 1, 0) = xi (s, ∞) + h (x j (s, ∞) − xi (s, ∞)), (15) As is often pointed out, the F-J model does not generally achieve opinion consensus over a single issue even if the network topology is completely connected (Ghaderi & Srikant, 2014; Frasca et al., 2015). However, Theorem 2 shows that in the absence of fully stubborn agents, as long as there exists at least one partially stubborn agent whose opinion can scatter to other partially stubborn agents through partially stubborn agents or non-stubborn agents, opinion consensus can be achieved over a sequence of issues. The block j∈Ni (s) where h ∈ R satisfies h > 0 and 1 − (n − 1)h > 0. Note that if the differences of agents’ initial opinions are large enough 9 such that Ni (s) = {i} for any i ∈ V and s ∈ N, equation (15) will collapse to equation (11). Combining equation (15) and Lemma 4, we have G(Φ0 (s)) has a spanning tree, we have G(Φ1 (s)) contains a spanning tree. Following from Corollary 3.5 and Lemma 3.7 in Ren & Beard (2005), Φ1 (s) is SIA.  x(s, ∞) = Ψx(s, 0), Lemma 6 implies that as long as the connectivity of G(Φ0 (s)) can be preserved, Φ1 (s) is SIA. This is on account of enhanced connectivity of the interpersonal influence network over issue sequences, which is shown in Property 3. Next, we give the condition for H(0) to preserve connectivity. and x(s + 1, 0) = H(s)x(s, ∞), where Ψ = (I − ΞW)−1 (I − Ξ), H(s) = [hi j (s)]n×n , and     hii (s) = 1 − h(|Ni (s)| − 1) i ∈ V,  hi j (s) = h j , i, j ∈ Ni (s),     hi j (s) = 0 otherwise. (16) Let y(s) = Ψx(s), then x(s + 1) = H(s)y(s). Denote the set of common neighbors of agents i and j for issue s by For simplicity, we omit the time scale k in the sequel. Let Φ(s) = [ϕi j (s)]n×n = H(s)Ψ, then we have x(s + 1) = Φ(s)x(s). According to the partition of V, we have  Φ1 (s) Φ(s) =  Φ2 (s) Ni j (s) = {l ∈ V : |yi (s) − yl (s)| < d, |y j (s) − yl (s)| < d}.  0  , 0 From equation (15), we have that G(H(s)) is undirected. The following assumption proposes the conditions for connectivity preservation of G(H(s)). where Φ1 (s) ∈ R(r1 +r2 )×(r1 +r2 ) . Rewrite H(s) as a same block form of W:   H f f (s) H f p (s) H f n (s)   H(s) = H p f (s) H pp (s) H pn (s) ,   Hn f (s) Hnp (s) Hnn (s) S T Assumption 3 (i) For any i ∈ V f , j ∈ (V p Vn ) Ni (0) S and l ∈ N Ψ , l ∈ Ni (0). For any i ∈ V p Vn , j ∈ T S T j , l ∈ N j (0) Ni (0). (V p Vn ) Ni (0) and l ∈ N Ψ Tj (ii) For any i ∈ V f , j ∈ V f Ni (0), |Ni j (0)| > n2 . For any S T 1 . i ∈ V p Vn , j ∈ V Ni (0), |Ni j (0)| > n2 + 4h where H f f (s) ∈ Rr1 ×r1 , H pp (s) ∈ Rr2 ×r2 and Hnn (s) ∈ R(n−r1 −r2 )×(n−r1 −r2 ) . Let   H f f (s) H f p (s)  Φ0 (s) =   Wp f W pp . As mentioned above, only if the difference between two agents’ opinions is small enough, agents will take account of other agents’ opinions. In Assumption 3, we give some conditions about the distribution of agents’ ultimate opinions for the first issue to ensure that G(H(0)) is adequately connected and thus the connectivity of G(H(s)) can be preserved for any s ∈ N. Note that given a social network, the interpersonal influence network G(W) and agents’ stubborn extent Ξ are determined, and y(0) = (I −ΞW)−1 (I −Ξ)x(0, 0). Therefore, the conditions on y(0) in Assumption 3 are actually conditions on x(0, 0). From equation (15), we have 1 . Moreover, since |Ni j (0)| < n, from Assumption 3 h < n−1 1 1 1 we have h > 2n . Thus, 2n < h < n−1 . (r1 +r2 )×(r1 +r2 ) Lemma 6 For any s ∈ N, if G(Φ0 (s)) has a spanning tree, then Φ1 (s) is SIA. Proof. From equation (16), H(s) is a nonnegative and stochastic matrix with positive diagonal elements. By S Lemma 5, we have ψii > 0 for any i ∈ V f V p . Thus, Φ(s) and Φ1 (s) are both stochastic matrices and Φ1 (s) has positive diagonal elements. Since Φ(s) = H(s)Ψ, we have  n P    ϕi j (s) = hi j (s) + hit (s)ψt j    t=r1 +1  n  P    hit (s)ψt j ϕi j (s) = t=r1 +1 i ∈ Vf S Vp, j ∈ V f , i ∈ Vf S Vp, j ∈ Vp. Lemma 7 Under Assumption 3, no edge in G(H(0)) will be lost in G(H(s)) for any s ∈ N. (17) S Hence, for any i ∈ V f , j ∈ V f V p , hi j (s) > 0 indicates ϕi j (s) > 0.SMoreover, Lemma 5. (ii) shows that for i ∈ V p , j ∈ V f V pS , wi j > 0 means ψi j > 0. Thus, for any i ∈ V p , j ∈ V f V p , wi j > 0 implies ϕi j > 0. Because Proof. Firstly, we shall show that if Assumption 3 holds for issue s, then it holds for issue s + 1. Suppose that for any |yi (s) − y j (s)| < d, i, j ∈ V, Assumption 3 holds for issue s. 10 For i, j ∈ V f , we have N j (s) T Ni (s) and |Nil (0)| > X |yi (s + 1) − y j (s + 1)| =|xi (s + 1) − x j (s + 1)| X X = yi (s) + h (yl (s) − yi (s)) − y j (s) − h (yl (s) − y j (s)) l∈Ni (s) = yi (s) − y j (s) + h X + (y j (s) − yi (s))+ h X (yl (s) − yi (s)) − h ≤ (yl (s) − y j (s)) X ≤(1 − h|Ni j (s)|)|yi (s) − y j (s)| + h X < l∈N j (s)\Ni j (s) ψ jl (xi (s + 1) − xl (s + 1)) . l∈N Ψ j Noting that for any l ∈ N Ψ j , one has l ∈ Ni (s) and |Nil (0)| > n . Following the same lines as above, we obtain 2 |yi (s + 1) − y j (s + 1) |< X ψ jl (xi (s + 1) − xl (s + 1)) X ψil d X d ψ jl = d. + 2 2 Ψ l∈N j The connectivity preservation is a crucial and challenging problem in research for the consensus problem of the H-K model since the evolution of agents’ opinions is only associated with the initial states and their distribution. In Jing et al. (2016), a potential function is presented to measure the total difference of agents’ initial opinions such that the connectivity is preserved by restricting the distribution of agents’ initial opinions. Following a different line, in Lemma 7 we ensure that the links existing in G(H(0)) will never be lost as s increases by proposing a lower bound for the number of agents’ common neighbors in G(H(0)). In addition, different from the modified H-K model considered in Yang et al. (2014), in system (7), (15), the evolution of opinions over time scale increases the complexity of our analysis. Vn , we have l∈N Ψ j = ψil (xl (s + 1) − xi (s + 1)) That is to say, if Assumption 3 holds for issue s, then no edge contained in G(H(s)) will be lost, which implies that Assumption 3 holds for issue s+1. Thus, no edge in G(H(0)) will be lost in G(H(s)) for any s ∈ N under Assumption 3.  |yi (s + 1) − y j (s + 1)| X = xi (s + 1) − ψ jl xl (s + 1) X ψ jl (xi (s + 1) − xl (s + 1)) X l∈NiΨ <(1 − h|Ni j (s)|)d + h(|Ni (s)| + |N j (s)| − 2|Ni j (s)|)d ≤(1 − h|Ni j (s)|)d + h(n − |Ni j (s)|)d ≤(1 + hn − 2h|Ni j (s)|)d <d. S X l∈N Ψ j |(yl (s) − y j (s))| For i ∈ V f , j ∈ V p ψil (xl (s + 1) − xi (s + 1)) X + |(yl (s) − yi (s))| l∈Ni (s)\Ni j (s) +h ψ jl xl (s + 1) l∈N Ψ j l∈NiΨ l∈N j (s)\Ni j (s) l∈Ni (s)\Ni j (s) X we obtain l∈N Ψ j l∈Ni j (s) X 1 4h , l∈NiΨ l∈N j (s) X + ψil xl (s + 1) − l∈NiΨ = n 2 Lemma 8 (Lemma 3.1, Ren & Beard (2005)) Let P1 , P2 , ..., Pm ∈ Rn×n be m nonnegative matrices with positive diagonal elements, then ψ jl d = d. P1 P2 ...Pm ≥ η(P1 + P2 + ... + Pm ), l∈N Ψ j where η can be specified from matrices Pi , i = 1, 2, ..., m. ψ jl xl (s + 1) . By the proof of Lemma 6 and Lemma 7, that the subgraph of G(H(0)) corresponding to stubborn agents is connected also implies that Φ1 (s) is SIA. In the next theorem, we employ a more feasible condition which reduces the requirements for the distribution of agents’ initial opinions. Since for any l ∈ N Ψ j , Assumption 3 ensures l ∈ Theorem 3 Under Assumption 2 and 3, system (7), (15) achieves opinion consensus if the following conditions hold: (i) there exists a partially stubborn Sagent which has directed paths consisting of vertices in V p Vn to any other partially For i, j ∈ (V p S Vn ), we get |yi (s + 1) − y j (s + 1)| = X l∈NiΨ ψil xl (s + 1) − X l∈N Ψ j 11 stubborn agents in G(W); (ii) G(H f f (0)) is connected; (iii) there exists an edge in G(H(0)) between a partially stubborn agent and a fully stubborn agent. Theorem 3 show that consensus can be achieved by the F-J model over a sequence of issues. Yet in the same context, it generally fails to achieve consensus over a single issue, even under completely connected networks. In practice, as the number of the issues that individuals collaborate to deal with increases, initial opinions of individuals for each issue become more and more similar and reach agreement ultimately. This phenomenon is named cohort effect (Joshi et al., 2010), which describes a high degree of similarity in characteristics or beliefs of a group of individuals who share a common set of experiences. Moreover, this mechanism is usually used to train groups for specific tasks (to name but a few, athlete team, special action force or fire brigade) to make the opinions or decisions of the group members grow similar. Proof. From Assumption 3 and Lemma 7, we have that G(Φ0 (s)) contains a spanning tree for any s ∈ N. Hence, Lemma 6 implies that Φ1 (s) is SIA and G(Φ1 (s)) contains a spanning tree for any s ∈ N. Let ∆(s) = Φ(s − 1)Φ(s − 2) . . . Φ(1)Φ(0), then x(s) = ∆(s)x(0). From the block form of Φ(s), we have  Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) ∆(s) =  Φ2 (s − 1)Φ1 (s − 2) . . . Φ1 (0)  0  . 0 Since the set of all possible matrices H(s) is finite under equation (16), Φ(s) = H(s)Ψ, one has that the set of all possible matrices Φ(s) is finite, which indicates that the set of all possible matrices Φ1 (s) is finite. Moreover, because G(Φ1 (s)) contains a spanning tree for any s ∈ N, from Lemma 8, we have Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) is SIA for any s ∈ N. From Wolfowitz Theorem (Wolfowitz, 1963), there exists a nonnegative vector ν ∈ Rr1 +r2 such that 6 In this section, numerical simulations are provided to illustrate the effectiveness of the theoretical results proposed above. Example 1 (Convergence of the F-J model over a single issue) Consider 10 agents labeled from 1 to 10 interacting with each other in digraph G(W 1 ) (Fig. 2a). W 1 is the stochastic adjacent matrix of G(W 1 ). Let ξ1 = (0, 0, 0, 0.2, 0.5, 0.7, 1, 1, 1, 1)T , namely, V f = {1, 2, 3}, V p = {4, 5, 6} and Vn = {7, 8, 9, 10}. Initialize x(k) with x(0) = (−1, 0, 1, 1, −2, 0, −1, −2, 1, 2)T , the trajectory of x(k) under G(W 1 ) with k increasing is shown in Fig. 2b. lim Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) = 1r1 +r2 νT . s→∞ Thus,   Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) 0  lim  s→∞ Φ (s − 1)Φ (s − 2) . . . Φ (0) 0 2 1 1   T   1 ν 0 r +r 1 2  . =  lim s→∞ Φ2 (s − 1)1r1 +r2 νT 0 Note that in Fig. 2b, the opinions of fully stubborn agents are fixed, while the opinions of partially stubborn agents and non-stubborn agents tend to be constant as k increases. The network G(W 1 ) has four SCCs, i.e., {1, 4, 5}, {3, 6, 7}, {8, 9, 10}, {2}. The ISCC consisting of non-stubborn agents is {8, 9, 10}, in which agent 9 and agent 10 both have two cycles whose lengths are 2 and 3, respectively. Thus, Assumption 1 is satisfied. By computing we find√ that the maximum-modulus √ eigenvalues of W 1 are 1, − 21 + 23 i, and − 12 − 23 i, while the maximum-modulus eigenvalue of Ξ1 W 1 is 1, which accords with the algebraic condition in Lemma 1. In Fig. 2b, the trajectory of x(k) is almost fixed after k = 20. When k = 20, one can find that the ISCC {8, 9, 10} achieve consensus, while the other non-stubborn agent 7 has different ultimate opinion with them. Moreover, we have ψ7 = 0, ψ8 , ψ9 and ψ10 are nonzero, which is consistent with Property 2 and the discussion following it. Since Φ2 is stochastic, we obtain   1r +r νT lim ∆(s) =  1 2 s→∞ 1n−r1 −r2 νT  0  . 0 Therefore, lim lim x(s, k) = lim x(s) = [νT 0Tn−r1 −r2 ]x(0)1n , s→∞ k→∞ Simulations s→∞ which implies that system (7), (15) achieves consensus as k → ∞, s → ∞.  Example 2 (Consensus of the F-J model over issue sequences) Consider 10 agents labeled from 1 to 10 in which agents 1 to 5 are partially stubborn agents, others are non-stubborn agents. The network topology is characterized by the digraph G(W 2 ) (Fig. 3a). Let ξ2 = (0.3, 0.6, 0.2, 0.8, 0.7, 1, 1, 1, 1, 1)T . x(0, 0) = (−1, 0, 1, 1, −2, 0, −1, −2, 1, 2)T is the initial opinion vector at s = 0 and k = 0. The trajectory of x(k) is showed in Fig. 4. As we discussed in Rmark 4, cognitive freezing emerges in model (7), (10) under Assumption 2. This is attributed to the externality resulted from the interpersonal influence. Thus, in model (7), (10), fully stubborn agents will keep their opinions unchangeable for all issues. Theorem 3 shows that the cognitive freezing is weakened by the bounded confidence of agents so that consensus can be achieved even in the presence of fully stubborn agents. Theorem 2 and 12 2 2 partially stubborn agent fully stubborn agent 6 partially stubborn agent 7 non-stubborn agent 6 non-stubborn agent 7 1 5 5 3 3 4 4 10 1 9 9 2 10 8 6 7 6 7 8 a . G(W 1 ) a . G(W 2 ) 2.5 fully stubborn agents partially stubborn agents non−stubborn agents 2 partially stubborn agent 6 1.5 non-stubborn agent 7 1 x(k) 0.5 0 2 5 −0.5 3 −1 4 −1.5 1 −2 9 −2.5 0 10 4 8 12 16 20 k 7 b . x(k) 6 8 b . G(Ψ2 ) Fig. 2. The network topology G(W 1 ) and the trajectory of x(k). Fig. 3. The network topologies G(W 2 ) and G(Ψ2 ). Fig. 4 shows the trajectories of x(s, k) over issues s = 0, 1, 2, 5, 10, 20, respectively. Note that over each issue s, x(s, k) tends to a steady opinion vector as k increases, and all steady opinions tend to be a common value with s increasing. When s = 30, Fig. 4 shows that consensus is achieved by system (7), (10). Moreover, since G(W 2 ) satisfies the condition in Assumption 2, we have Ψ3 = (I − Ξ2 W 2 )−1 (I − Ξ2 ). From Lemma 5 and Property 3, the existence of a partially stubborn agents in G(W 2 ) which has a directed path to other partially stubborn agents implies that the subgraph corresponding to partially stubborn agents in G(Ψ2 ) not only has a spanning tree, but also contains a star topology, and selfloops are contained by partially stubborn agents in G(Ψ2 ), which are shown in Fig. 3b. We can find visually from Fig. 3b that partially stubborn agents do not receive information from non-stubborn agents, which indicates that ψi = 0 for any i ∈ {5, 6, . . . , 10}. This is consistent with the theoretical result in Property 2. Example 3 (Consensus of the F-J model over issue sequences with bounded confidence) Consider system (7), (15) with 10 agents labeled from 1 to 10. The network topology G(W 3 ) is showed in Fig. 5a. Let ξ3 = (0, 0, 0, 0.8, 0.3, 0.2, 1, 1, 1, 1)T , namely, V f = {1, 2, 3}, V p = {4, 5, 6} and others are non-stubborn agents. Let x(0, 0) = (−0.7, 0.2, 0, 0.2, 2, −2.5, −1.5, 1, 1.5, −1)T . 1 1 The confidence bound is set as d = 1. Since 2n < h < n−1 , let h = 0.1. Fig. 6a and Fig. 6b show the trajectories of x(s, k) and x(s, 0), respectively. Because that in Fig. 5a, G(W 3 ) satisfies the condition of Assumption 2, Ψ3 exists. G(Ψ3 ) is depicted in Fig. 5b. Moreover, G(Ψ3 ) and x(0, 0) satisfy the conditions in Assumption 3 and Theorem 3, thus x(s, 0) reaches consensus as s → ∞ (Fig. 6b), which implies x(s, k) reaches consensus (Fig. 6a). The connectivity of G(H(0)) is related with the percentage of the fully stubborn agents. In this exam- 13 s=0 s=1 2 fully stubborn agents partially stubborn agents non−stubborn agents 2 x(1,k) 0 −2 0 10 20 s=2 30 0 1 −2  40 k 0 −2  s=5    k 0   s=10      s=20       k −1 −3 10 9  k 2 0 0 −2  k x(20,k) x(10,k)  −2  2 −2   2 x(5,k) x(2,k) 2 x(s,k) x(0,k) 2 8 7 6 k 0 −2   partially stubborn agents     5 4 3 2 1 0 0 25 20 15 10 5 39 35 30 s k non−stubborn agents a . The trajectories of x(s, k). Fig. 4. The trajectories of x(s, k) at s = 0, 1, 2, 3, 4, 30, respectively. 2 fully stubborn agents partially stubbornagents non−stubborn agents 1.5 fully stubborn agent 2 1 partially stubborn agent 2 0.5 6 x(s,0) non-stubborn agent 7 10 1 5 6 0 −0.5 0.1 −1 0 −1.5 −0.1 −2 −0.2 0.5 −2.5 0 2 4 6 8 10 12 14 1 16 1.5 18 20 2 22 2.5 24 3 26 28 30 32 34 36 3839 s 4 9 b . The trajectory of x(s, 0). 8 7 3 Fig. 6. The trajectories of x(s, k) and x(s, 0). a . G(W 3 ) 10 ple, Assumption 3 requires that each fully stubborn agent has at least 8 neighbors in G(H(0)). By computing we have y(0) = (−0.7, 0.2, 0, 0.2, 1.46, −1.9876, 0.0082, 0.0274, 0.2, −0.25)T , thus agents 1, 2, 3, 4, 7, 8, 9, 10 form a completely connected subgraph in G(H(0)), and agents 5 and 6 are isolated with others, respectively. fully stubborn agent 2 partially stubborn agent 6 non-stubborn agent 1 7 2 7 6 In this paper, opinion dynamics in social networks with stubborn agents has been investigated over issue sequences. The social network with stubborn agents is described by the F-J model. In order to investigate opinion formation of the F-J model over issue sequences, we studied convergence of the F-J model over a single issue and properties of the ultimate opinion. Then taking advantage of the underlying connections between the network of interpersonal influence and the network describing the relationship of agents’ initial opinion for successive issues, opinion consensus and cluster of the F-J model was investigated over issue sequences based on the path-dependence theory. Moreover, we further 5 3 4 9 8 Conclusions 7 b . G(Ψ3 ) Fig. 5. The network topologies G(W 3 ) and G(Ψ3 ). 14 the community cleavage problem, IEEE Control Systems, 35(3), 40-51. Friedkin, N. E., & Johnsen, E. C. (1999). Social influence networks and opinion change, Advances in Group Processes, 16(1), 1-29. Friedkin, N. E. (2011). A formal theory of reflected appraisals in the evolution of power, Administrative Science Quarterly, 56(4), 501-529. Frasca, P., Ishii, H., Ravazzi, C., & Tempo, R. (2015). Distributed randomized algorithms for opinion formation, centrality computation and power systems estimation: A tutorial overview, European journal of control, 24(1), 213. Golub, B., & Jackson, M. O. (2010). Naive learning in social networks and the wisdom of crowds, American Economic Journal: Microeconomics, 2(1), 112-149. Godsil, C., & Royal, G. (2001). Algebraic graph theory, New York: Springer-Verlag. Ghaderi, J., & Srikant, R. (2014). Opinion dynamics in social networks with stubborn agents: Equilibrium and convergence rate, Automatica, 50(12), 3209-3215. Horn, R. A., & Johnson, C. R. (2012). Matrix analysis, New York: Cambridge University Press. Hegselmann, R., & Krause, U. (2002). Opinion dynamics and bounded confidence models, analysis, and simulation, Journal of Artificial Societies and Social Simulation, 5(3). Jia, P., Mirtabatabaei, A., Friedkin, N. E., & Bullo, F. (2015). Opinion dynamics and the evolution of social power in influence networks, SIAM Review, 57(3), 367-397. Jing, G., Zheng, Y., & Wang, L. (2016). Consensus of multiagent systems with distance-dependent communication networks, IEEE Transactions on Neural Networks and Learning Systems, DOI: 10.1109/TNNLS.2016.2598355. Jadbabaie, A., Lin, J., & Morse, A. S. (2003). Coordination of groups of mobile autonomous agents using nearest neighbor rules, IEEE Transactions on Automatic Control, 48(6), 988-1001. Joshi, A., Dencker, J. C., Franz, G., & Martocchio, J. J. (2010). Unpacking generational identities in organizations, Academy of Management Review, 35(3), 392C414. Liu, H., Xie, G., & Wang, L. (2012). Necessary and sufficient conditions for containment control of networked multiagent systems, Automatica, 48(7), 1415-1422. Li, L., Scaglione, A., Swami, A., & Zhao, Q. (2013). Consensus, polarization and clustering of opinions in social networks, IEEE Journal on Selected Areas in Communications, 31(6), 1072-1083. Lamport, L., Shostak, R., & Pease, M. (1982). The Byzantine generals problem, ACM Transactions on Programming Languages and Systems, 4(3), 382-401. Mirtabatabaei, A., & Bullo, F. (2012). Opinion dynamics in heterogeneous networks: convergence conjectures and theorems, SIAM Journal on Control and Optimization, 50(5), 2763-2785. Mirtabatabaei, A., Jia, P., Friedkin, N. E., & Bullo, F. (2014). On the reflected appraisals dynamics of influence networks with stubborn agents, American Control Conference, IEEE, 3978-3983. Ma, J., Zheng, Y., Wu, B., & Wang, L. (2016). Equilibrium considered the more general scenario where agents have bounded confidence to others when they form their initial opinions. Mathematical conditions for opinions achieving consensus or forming clusters were established, respectively. We showed that the F-J model may achieve opinion consensus over each path-dependent issue sequence, while it generally does not achieve consensus over a single issue. The connections between network characterizing interpersonal influence and the one describing the relationship of agents’ initial opinions for successive issues uncover the difference between opinion formation over issue sequences and over a single issue, such as the enhanced network connectivity in the former. Our investigation may provide some theoretical explanations for many observations in the real world such as decision making in human society or animal kingdom. The future work will focus on the evolution of agents’ extent of stubborn over issue sequences. References Acemoglu, D., Ozdaglar, A., & ParandehGheibi, A. (2010). Spread of (mis) information in social networks, Games and Economic Behavior, 70(2), 194-227. Altafini, C. (2013). Consensus problems on networks with antagonistic interactions, IEEE Transactions on Automatic Control, 58(4), 935-946. Brualdi, R. A., & Ryser, H. J. (1991). Combinatorial matrix theory, New York: Cambridge University Press. Boyd, S., Ghosh, A., Prabhakar, B., & Shah, D. (2006). Randomized gossip algorithms, IEEE Transactions on Information Theory, 52(6), 2508-2530. Blondel, V. D., Hendrickx, J. M., & Tsitsiklis, J. N. (2009). On Krause’s multi-agent consensus model with statedependent connectivity, IEEE Transactions on Automatic Control, 54(11), 2586-2597. Bindel, D., Kleinberg, J., & Oren, S. (2011). How bad is forming your own opinion?, Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science, 57-66. Couzin, I. D., Krause, J., Franks, N. R., & Levin, S. A. (2005). Effective leadership and decision-making in animal groups on the move, Nature, 433(7025), 513-516. Degroot, M. H. (1974). Reaching a consensus, Journal of the American Statistical Association, 69(345), 118-121. Dyer, J. R. G., Johansson, A., Helbing, D., Couzin, I. D., & Krause, J. (2009). Leadership, consensus decision making and collective behaviour in humans, Philosophical Transactions of the Royal Society of London B: Biological Sciences, 364(1518), 781-789. Dandekar, P., Goel, A., & Lee, D. T. (2013). Biased assimilation, homophily, and the dynamics of polarization, Proceedings of the National Academy of Sciences, 110(15), 5791-5796. Egidi, M., & Narduzzo, A. (1997). The emergence of pathdependent behaviors in cooperative contexts. International Journal of Industrial Organization, 15(6), 677-709. Friedkin, N. E. (2015). The problem of social control and coordination of complex systems in sociology: A look at 15 topology of multi-agent systems with two leaders: A zerosum game perspective, Automatica, 73, 200-206. MacKay, R., Masrani, S., & McKiernan, P. (2006). Strategy options and cognitive freezing: The case of the Dundee jute industry in Scotland, Futures, 38(8), 925-941. North, D. C. (1990). Institutions, institutional change and economic performance, Cambridge university press. Olfati-Saber, R., & Murray, R. M. (2004). Consensus problems in networks of agents with switching topology and time-delays, IEEE Transactions on Automatic Control, 49(9), 1520-1533. Parsegov, S. E., Proskurnikov, A. V., Tempo, R., & Friedkin, N. E. (2017). Novel Multidimensional Models of Opinion Dynamics in Social Networks, IEEE Transactions on Automatic Control, 62(5), 2270-2285. Page, S. E. (2006). Path dependence, Quarterly Journal of Political Science, 1(1), 87-115. Ren, W., & Beard, R. W. (2005). Consensus seeking in multiagent systems under dynamically changing interaction topologies, IEEE Transactions on Automatic Control, 50(5), 655-661. Ravazzi, C., Frasca, P., Tempo, R., & Ishii, H. (2015). Ergodic randomized algorithms and dynamics over networks. IEEE transactions on control of network systems, 2(1), 78-87. Sunstein, C. (2012). Breaking up the echo, NY Times, A25. Wang, L., & Xiao, F. (2007). A new approach to consensus problems in discrete-time multiagent systems with timedelays, Science in China Series F: Information Sciences, 50(4), 625-635. Wang, L., & Xiao, F. (2010). Finite-time consensus problems for networks of dynamic agents, IEEE Transactions on Automatic Control, 55(4), 950-955. Wang, L., Jiang, F., Xie, G., & Ji, Z. (2009). Controllability of multi-agent systems based on agreement protocols, Science in China Series F: Information Sciences, 52(11), 2074-2088. Wang, L., Shi, H., Chu, T., Zhang, W., & Zhang, L. (2004). Aggregation of foraging swarms, In Australasian Joint Conference on Artificial Intelligence (pp. 766-777). Springer, Berlin, Heidelberg. Wolfowitz, J. (1963). Products of indecomposable, aperiodic, stochastic matrices, Proceedings of the American Mathematical Society, 14(5), 733-736. Xiao, F., & Wang, L. (2008). Asynchronous consensus in continuous-time multi-agent systems with switching topology and time-varying delays, IEEE Transactions on Automatic Control, 53(8), 1804-1816. Yang, Y., Dimarogonas, D. V., & Hu, X. (2014). Opinion consensus of modified Hegselmann-Krause models, Automatica, 50(2), 622-627. Zheng, Y., & Wang, L. (2014). Containment control of heterogeneous multi-agent systems, International Journal of Control, 87(1), 1-8. Zheng, Y., Ma, J., & Wang, L. (2017). Consensus of Hybrid Multi-agent Systems, IEEE Transactions on Neural Networks and Learning Systems, DOI:10.1109/TNNLS.2017. 2651402. 16
3
1 The Stochastic Geometry Analyses of Cellular Networks with α-Stable Self-Similarity arXiv:1709.05733v1 [cs.IT] 18 Sep 2017 Rongpeng Li, Zhifeng Zhao, Yi Zhong, Chen Qi, and Honggang Zhang Abstract—To understand the spatial deployment of base stations (BSs) is the first step to facilitate the performance analyses of cellular networks, as well as the design of efficient networking protocols. Poisson point process (PPP) has been widely adopted to characterize the deployment of BSs and established the reputation to give tractable results in the stochastic geometry analyses. However, given the total randomness assumption in PPP, its accuracy has been recently questioned. On the other hand, the actual deployment of BSs during the past long evolution is highly correlated with heavy-tailed human activities. The αstable distribution, one kind of heavy-tailed distributions, has demonstrated superior accuracy to statistically model the spatial density of BSs. In this paper, we start with the new findings on α-stable distributed BSs deployment and investigate the intrinsic feature (i.e., the spatial self-similarity) embedded in the BSs. Based on these findings, we perform the coverage probability analyses and provide the relevant theoretical results. In particular, we show that for some special cases, our work could reduce to the fundamental work by J. G. Andrews in [1]. We also examine the network performance under extensive simulation settings and validate that the simulations results are consistent with our theoretical derivations. Index Terms—Stochastic geometry, coverage probability, cellular networks, Poisson point process (PPP), α-stable distributions, self-similarity I. I NTRODUCTION As a key enabler in the information and communications technology (ICT) industry, cellular networks play a decisive role in delivering communication messages and entertainment content [2]. In order to meet the increasing traffic demand, cellular network operators gradually deploy different types of necessary infrastructure including lots of base stations (BSs). To understand the spatial deployment of BSs is the first step to facilitate the performance analyses of cellular networks, as well as the design of efficient networking protocols. In the earliest stages, a two-dimensional hexagonal grid model was used, implying that BSs were deployed regularly, which deviates from the real scenarios. In the recent stages, Poisson point process (PPP) [1], [3]–[5] was assumed, which could roughly model the randomness in the realistic deployment of BSs in cellular networks, meanwhile leading to tractable results. However, given the total randomness assumption in PPP, its practical accuracy has been recently questioned [6], [7]. Consequently, in order to reduce the modeling gap between the PPP model and the realistic spatial deployment of R. Li, Z. Zhao, C. Qi and H. Zhang are with Zhejiang University, Hangzhou 310027, China (email:{lirongpeng, zhaozf, qichen7c, honggangzhang}@zju.edu.cn). Y. Zhong is with Huazhong University of Science and Technology, Wuhan 430073, China (email: [email protected]). BSs, other kinds of point processes have been exploited to obtain more precise analytical results [8]. In particular, Poisson cluster processes [9], [10] and Gauss-Poisson process [11] are exploited to model the attractive behavior between BSs, while Matérn hard core point process (MHCP) [12], Ginibre point process (GPP) [8], [13], [14], and determinantal point process [15] are studied to characterize the repulsive feature between BSs [7], [16]–[18]. On the other hand, the actual deployment of BSs during the past long evolution is highly correlated with human activities [19]. Humans tend to live together with societal relationship, and their social behaviors lead to mobile traffic hotspots, thus causing BSs to be more densely deployed in certain areas. Interestingly, according to an observation named “preferential attachment” [20], Barabási et al. argued that many large networks should grow to be heavy-tailed. As its names implies, a heavy-tailed distribution has non-exponential bounded tail. Mathematically, for a heavy-tailed random variable X, the probability Pr(X > x) satisfies lim eκx Pr(X > x) = ∞, x→∞ for all κ > 0. Many well-known statistical distributions including power-law distribution (also named as generalized Pareto distribution), Weibull distribution, log-normal distribution, and α-stable distribution [6], [21], [22] belong to the heavy-tailed family. Therefore, heavy-tailed distributions appear to be more suitable to capture the societal feature and clustering property for the practical BSs. Based on the practical BS deployment information, we have validated that the α-stable distributions demonstrate superior accuracy to statistically model the spatial density of BSs and also outperform other aforementioned heavy-tailed distributions [7], [19], [23]–[25]. But the spatial density alone cannot reach some intuitive conclusions. Fortunately, the α-stable distributions, which have been widely adopted to characterize the distribution of aggregated traffic at the BS level in cellular networks and at the switch level in wired broadband networks, often imply the self-similarity of traffic [22], [26]. As a popular property in complex networks [27], the self-similarity of traffic in the temporal domain means that the distribution of traffic remains invariant under different temporal scales. Similar to the case of traffic, as the practically deployed BSs are αstable distributed, it is natural to ask whether the spatial selfsimilarity holds in cellular networks. Furthermore, compared to other point process models, the inhomogeneous PPP with αstable distributed density becomes applicable with significant merit. The system model based on multiple tiers of PPPs may lead to some tractable results, but it lacks the reasonable explanation to divide the gradually deployed and increasingly 2 denser heterogeneous cells [28] into different tiers. On the contrary, α-stable distributions contribute to understanding the spatial self-similarity and bridging the gap between cellular networks and other social behavior-based complex networks. A. Related Works Stochastic geometry tools have successfully established the reputation to model and analyze wireless networks, as they are able to capture the topological randomness in the network geometry and lead to tractable analytical results [1], [3]– [5], [9]–[18]. There is no doubt that the PPP belongs to the most popular point process used in the literature because of its tractability and has led to a lot of meaningful research results for cellular networks with different kinds of cutting-edge techniques. The baseline operations in singletier and/or multiple-tier downlink cases are examined in [1], [29]–[32] (and references therein) while their counterparts in uplink cases are considered in references like [33]–[38]. User association and load balancing are examined in [39]– [42]. Cognitive, cooperative and intelligent cellular networks are taken into account in [18], [43]–[47]. Energy efficiency, energy harvesting, and BS sleeping for green cellular networks are investigated in [48]–[52]. Besides, multiple-input multipleoutput (MIMO) antenna and in-band full-duplex (FD) systems are studied in [53]–[62]. Also, the PPP-related works have been extended to mobile ad hoc networks [63]. Along with the continuous progress in techniques for physical-layer and network management in wireless networks, the PPP model offers a useful theoretical platform for the initial performance calibration, so as to save economic expenditure and avoid timeconsuming large-scale setup for realistic tests. For example, FD communication, which benefits from the advance in signal processing and self-interference cancellation techniques, is optimistically promoted to double the spectral efficiency for wireless networks [64]. However, given the more complicated interference in FD networks, it is essential to conduct a careful re-examination. Consistent with the system-level simulation results in [64], [65] has taken advantage of the PPP model and demonstrated the potential negative effect that FD communications might impose on the uplink transmission. Although the PPP model provides many useful performance trends, the concern about total independence between nodes (e.g., BSs) has never stopped. Hence, in order to reduce the modeling gap between the PPP model and the practical BS deployment, point processes with either attractive or repulsive spatial correlations have been explored as well. • For attractive point processes, [66] has shown that Poisson cluster process is more suitable to model the spatial distribution of BSs in urban areas. The general clustering nature of deployed BSs in highly populated urban areas clearly reflects the aggregation property of ever-growing traffic demands in cellular networks [7]. [10] has further verified the aggregated interference when the transmitting nodes are modeled by Poisson cluster process and compared the corresponding results with that in the classical PPP model. • On the contrary, [29] and [67] have argued that BSs, in particular macro BSs, in cellular networks tend to be deployed systematically, such that any two BSs are not too close. Thus, a spatial model based on a point process with the repulsive nature seems to be more desirable [29], [67]. Furthermore, the MHCP model [12] possesses limited tractability and leaves many open challenges to be addressed. The GPP model, one typical example of determinantal point processes on the complex plane, has been widely adopted and shows a promising tradeoff between accuracy and tractability [8], [13], [14]. In particular, Deng et al. [8] have shown that the GPP leads to the same trend curve of coverage probability1 as the PPP. Hence, we can come to the following conclusion that the spatial BS density of large-scale cellular networks simultaneously possesses two conflicting features, that is, the density is very large in some clustering regions while being significantly smaller in others. The conclusion is also consistent with our common sense. Furthermore, the heavy-tailed distributions, which generate small values with the high probability but still allow comparatively larger values, fit well to model the spatial BS density. Our previous works [6], [7], [23]–[25] have shown that the α-stable distribution, one kind of heavy-tailed distributions, could be used to perfectly model the spatial BS density in China and Italy, especially in urban areas. In fact, α-stable distributions are not totally new to researchers in the communications field. On one hand, a distribution is called stable if a linear combination of two independent identically distributed random variables has the same distribution [21]. In particular, the Gaussian distribution, which is one specific kind of α-stable distributions with α = 2, has been widely adopted to model the distribution of channel noise. On the other hand, α-stable distributions have been observed for the distribution of wired broadband network traffic [68] since two decades ago, and have recently been found in modeling the cellular network traffic [22], [26]. αstable distributions also owe their importance in both theory and practice to the generalization of the central limit theorem [21] and the accompanying self-similarity [27], [69]–[71] of the stable family. Furthermore, the well-known self-similarity lays the very foundation for the traffic predictability, thus making it possible to perform some actions beforehand. For example, [70] has highlighted the practicability to perform resource reservation schemes for the broadband network traffic with self-similarity. Hence, as the spatial BS density could be better modeled by the α-stable distributions, it is essential to theoretically examine the spatial self-similarity and understand its impact on coverage probability. In other words, we will take the very first step to investigate the spatial self-similarity in the BS deployment and perform stochastic geometry analyses of cellular networks when the BS density is α-stable distributed. B. Contributions Different from the previous works, this paper aims at explaining the implications to statistically model the spatial 1 The coverage probability indicates the probability that the signal-tointerference-plus-noise ratio (SINR) for a mobile user achieves a target threshold. 3 BS density by α-stable distributions and to build the theory to derive the coverage probability mathematically. Belonging to one of the precursor works, we take advantage of a large amount of practical BS deployment records and provide the following key insights: • Firstly, this paper visits and confirms the self-similarity in the spatial deployment of BSs. To our best knowledge, it is the first work in the literature to validate the spatial selfsimilarity among BSs in cellular networks. Therefore, this paper lays the foundation to apply the advance in complex network theory to examine cellular networks. • Secondly, this paper provides the approach to characterize the coverage probability and derive the computable representation when the spatial BS deployment satisfies the self-similarity and the density of the practical BSs obeys α-stable distributions. • Thirdly, this paper theoretically proves that for some special cases, our result could be reduced to the fundamental work by J. G. Andrews in [1]. Besides, this paper studies the coverage probability performance under extensive simulation settings and validates that the simulations results are consistent with our theoretical derivations. The paper also evaluates the impact of self-similarity on the coverage probability performance. The remainder of the paper is organized as follows. In Section II, we present some necessary mathematical background, introduce the realistic dataset of spatial BS deployment and validate the spatial self-similarity. In Section III, we provide the analyses of coverage probability. Section IV evaluates the computable representation obtained by the theoretical analysis and compares it with the classical PPP model. Finally, we conclude this paper in Section V. Our previous works [6], [23] have validated that β = 1 holds for the fitting results of actual spatial BS density in both Hangzhou, China and Rome, Italy. For simplicity of representation, we use the operator b ∼ c to denote that b and c have the same distribution and further have λ ∼ S(α, σ, µ) to indicate that the spatial BS density λ follows the α-stable distributions with β = 1. 2) The self-similarity: The self-similarity has been mostly applied to model time series [69]. Given zero-mean, stationary time series Y = (Yt , t = 1, 2, 3, · · · ), Y is called as self(m) similar process if its m-aggregated series Y (m) = (Yt , t = tm P (m) Yk satisfy 1, 2, 3, · · · ) with each element Yt = k=(t−1)m+1 (m) Yt H ∼ m Yt for all m > 0, where H ∈ (0, 1) is the Hurst parameter indicating the decay rate of statistical dependence of two points with increasing time interval. In other words, the self-similarity implies that the time series is exactly or approximately similar to a part of itself. The concept of self-similarity is also applicable to spatial scenarios. For example, H. ElSawy et al. [16] have shown the aggregated interference from distributed nodes to a receiver obey α-stable distributions, while X. Ge et al. [72] have verified that the statistical characteristics of the wireless cellular coverage boundary possess the self-similarity or fractal property. However, no exact self-similar phenomenon exists in the real world. Most of the self-similar phenomena observed in the real world only have the statistical characteristic. Moreover, the self-similarity of random processes is usually evaluated by the Hurst parameter, which can be estimated using two typical methods and should be in the interval (0, 1). • The rescaled adjusted range statistic (R/S) method: For the random process Yt , the partial sum is dePn noted by Z(n) = Y , and then the sample varit II. M ATHEMATICAL BACKGROUND AND S TATISTICAL t=1 Pn Z(n) 2 t=1 (Yt − n ) M ODELING . ance could be denoted by S 2 (n) = n R(n) A. Mathematical Background The R/S statistic could be formulated as S(n) = i i max (0,Z(i)− n Z(n))− min (0,Z(i)− n Z(n)) Beforehand, Table I summarizes the most used notations in 0≤i≤n 0≤i≤n . The log-log S(n) this paper. relationship between the R/S statistic and n should also 1) α-Stable distributions: A random variable x is said to be linear with a slope of H. obey the α-stable distribution f (x) if there are parameters • The variance-time (V-T) method: This involves the aggre0 < α ≤ 2, σ ≥ 0, −1 ≤ β ≤ 1, and µ ∈ R such that its (m) gated series Yt and the blocking size m. The log-log characteristic function is of the following form: (m) plot of the variance of Yt with respect to m should Φ(ω) = E (exp(jωx)) = follow a straight line with the slope ι if the data are   πα  n o  statistical self-similar. In this case, H = 1 − 2ι . α α  + jµω , α 6= 1;  exp −σ |ω| 1 − jβsgn(ω) tan 2 Moreover, a larger H ∈ (0.5, 1) corresponds to stronger self    2β  similarity.  exp −σ|ω| 1 + j sgn(ω) ln |ω| + jµω , α = 1. π (1) The function E(·) represents the expectation operation with B. Statistical Modeling respect to a random variable. α is called the characteristic As validated in [6], [23], [25], when we divide the region exponent and indicates the index of stability, while β is iden- into several parts and calculate the corresponding probability tified as the skewness parameter. α and β together determine density function (PDF) of the spatial BS density in each part, the shape of the distribution. Moreover, σ and µ are called we observe that the PDF follows the α-stable distributions. scale and location shift parameters, respectively. In particular, For example, Fig. 1(a) depicts that a region is divided into if α = 2, the α-stable distribution reduce to the Gaussian four parts. The spatial BS density in each part λ1 , λ2 , λ3 and λ4 are mutually dependent and obey the α-stable distributions distribution. 4 TABLE I A Λ(s, b, c) Ξ(s, b, c) The coverage probability α-stable distributions with stability α, skewness β = 1, scale σ and shift µ Pathloss exponent The Rayleigh fading gain for the signal link The fading exponent for the interfering links Rayleigh fading factor Noise factor The Hurst parameter The self-similarity zooming parameter The predefined radius of inner circle in Fig. 1 The spatial density of BSs The number of BSs within an r-radius R circle The standard Gamma function Γ(d) = 0∞ tRd−1 e−t dt The incomplete Gamma function Γ(d, x) = x∞ td−1 e−t dt  def Θ(s, b, c) = (sg)2/δ Γ(− 2δ + 1, sgb−δ ) − Γ(− δ2 + 1, sgc−δ )     def Λ(s, b, c) = c2 1− exp −sgc−δ − b2 1 − exp −sgb−δ def Ξ(s, b, c) = πEg Λ(s, b, c) − Θ(s, b, c) – α = 0.6, σ = 0.25 and µ = 0.25 δ=4 – Assumed to follow Rayleigh fading. ζ=1 N0 = 1 (i.e., SNR = 0 dB) H = 0.9 a=2 R = 40 – – – – (a) (b) l1 – (c) N 3 N 2 N1 3R l3 lS l1 R l4 – 2R l2 – aR Θ(s, b, c) Default Value in Sec. IV R pc S(α, σ, µ) δ h g ζ N0 H a R λ N (r) Γ(d) Γ(d, x) Meaning r Symbol LIST OF THE MAIN SYMBOLS AND FUNCTIONS IN THE PAPER . Fig. 1. An illustration of the self-similarity for the spatial BS deployment. with the same values α, σ and µ. The correlation between BS density in different parts makes it challenging to directly derive the coverage probability. Instead, it is essential to take the statistical modeling of the correlation into consideration. In that regards, self-similarity emerges as a promising technique to characterize the correlation of the spatial density, as it has manifested its importance and effectiveness by modeling the correlation in different scales. In order to show the self-similarity in spatial BS deployment, we take advantage of the collected BS deployment records in Hangzhou, China and Rome, Italy2 . Fig. 2(a) and 2(d) illustrate the corresponding deployment situation in both cities. Similar to the common validation process in temporal dimension [69], we verify the accuracy of self-similarity in spatial BS deployment as follows. As depicted in Fig. 1(b), we randomly select a point as the starting “origin point” and thus get some concentric circles with increasingly larger radii (e.g., from R to 2R, 3R, · · · ). Then, we could get a series, each value corresponding to the number of BSs in one circle. Afterwards, we could apply the aforementioned R/S method and V-T method in Section II-A2. Fig. 2(b)(c) and Fig. 2(e)(f) 2 Interested readers could also refer to [25] to check our preliminary results on the spatial self-similarity in a more systematic manner. provide the corresponding log-log plots for both cities. From these figures, it can be observed that all the estimated Hurst parameters are very close to 1. Therefore, we could boldly argue that the spatially deployed BSs possess the spatial selfsimilarity. Then, according to the definition of self-similarity, the number of BSs N (aR) within a circle of radius aR should satisfy that N (aR) ∼ aH N (R), ∀R, a > 0, 0 ≤ H < 1, where a indicates the self-similarity zooming parameter and H denotes the Hurst parameter. Remark 1. For cellular networks, the number of BSs exhibit the spatial self-similarity. III. T HE C OVERAGE P ROBABILITY A NALYSES In this part, we derive the coverage probability in a downlink cellular network. Specifically, the coverage probability is defined as the probability that the SINR for a mobile user achieves a target threshold. Mathematically, the coverage probability is formulated as   hr−δ P(SINR > T ) = P >T , (2) N0 + Ir where δ denotes the pathloss exponent factor of the standard propagation channel. N0 is the additive white Gaussian noise 5 (a) BS Deployment in Hangzhou, China 2.5 2 200 1.5 150 0.5 50 0 0 50 150 100 150 1.94 1.92 1.9 -0.5 0 log(Var) vs. log(m) fitting line 1.96 1 100 (c) V-T Method H=0.97553 1.98 log(R/S) vs. log(n) fitting line log(Var) 250 log(R/S) km 300 (b) R/S Method H=0.96645 1.88 0 0.5 1 1.5 2 0 0.5 1 km log(n) log(m) (d) BS Deployment in Rome, Italy (e) R/S Method H=0.84158 (f)V-T Method H=0.86876 2 1.2 log(R/S) vs. log(n) fitting line 1.5 1.5 log(Var) vs. log(m) fitting line 1.1 1 log(Var) km log(R/S) 100 0.5 1 0.9 50 0 0.8 -0.5 0 0 50 100 150 200 250 300 0.7 0 0.5 km 1 1.5 2 0 0.5 log(n) 1 1.5 log(m) Fig. 2. The self-similarity modeling results for the spatial BS deployment in Hangzhou and Rome. (AWGN) factor and T is the target threshold. Besides, assuming that the fading follows the Rayleigh fading, we have h ∼ exp(ζ). Without loss of generality, we assume the mobile user is located at the “origin point”. When the distance from a mobile user to its serving BS b0 is r, Ir denotes the cumulative interference from all other BSs i (except BS b0 ) to the mobile user. A. Impact of α-Stable Distributions and Self-similarity Before delving into the coverage probability, we first talk about how the α-stable distributions and the self-similarity will mathematically shape the BS deployment? As depicted in Fig. 1(c), we assume that there exists a specific R (i.e., R > r) to divide the whole region of interest into two parts. Besides, the spatial BS density λ for the region within the radius R satisfies λ ∼ S(α, σ, µ). Moreover, we can have the following lemma to characterize the spatial BS density λS for the region outside the radius R. Lemma 1. The spatial BS density λ has a Laplace transform    σα α    exp − cos πα s − µs , α 6= 1; 2   Ψ(s) = E (exp(−sλ)) =  2σ   exp s ln s − µs , α = 1. π (3) while the spatial BS density λS will follow α-stable distributions (i.e., λS ∼ λaH−2 ) and the corresponding Laplace transform could be formulated as ΨS (s) = E (exp(−sλS ))    σ α aα(H−2) α  H−2  exp − s − sa µ , α 6= 1;    cos πα  2   = 2σaH−2 H−2  exp s [ln s + (H − 2) ln a] − sa µ ,   π    α = 1. (4) Proof. Following the definition of self-similarity, the number of BSs in the interfering region is coupled with the selfsimilarity zooming parameter a and could be formulated as N (aR) = λS πa2 R2 ∼ aH N (R) = λπaH R2 . Therefore, λS ∼ λaH−2 . (5) When x ∼ S(α, σ, 0), we get the corresponding Laplace transform (Proposition 1.2.12, [21]) as    σα α    exp − cos πα s , α 6= 1; 2   Ψ(s) = E (exp(−sx)) =  2   exp σ s ln s , α = 1. π (6) 6     α (πσ)α 2α−1   exp −µπr2 − (πσ) r2α 2µπr + 2α , α 6= 1; r cos πα cos πα f (r) = 2 2   exp −µπr2 + 2σr2 ln(πr2 ) 2µπr + 4σr ln(πr2 ) + 4σr , α = 1. (     σ α aα(H−2) h    Λ(s, R, aR) πE Λ(s, r, R) − Θ(s, r, R) − exp − λπE g g   cos πα  2   )     iα   H−2   − Θ(s, R, aR) −a µπEg Λ(s, R, aR) − Θ(s, R, aR) , α 6= 1;   ( LIr (s) =  o  i  n h     exp 2σaH−2 ln πEg Λ(s, R, aR) − Θ(s, R, aR) + (H − 2) ln a − πaH−2 µ      )           · Eg Λ(s, R, aR) − Θ(s, R, aR) − λπEg Λ(s, r, R) − Θ(s, r, R) , α = 1.  ΨS (s) By merging Eq. (6) and Eq. (7), we obtain the result. (12) 0, ∀λ < 0. The equation (b) is originated from the Laplace transform for a variable k ∼ S(α, σ, 0) in Eq. (6). So, the PDF of r Then, the Laplace transform of λS could be derived as  = E exp(−saH−2 (x + µ))  = Ψ(saH−2 ) · exp −saH−2 µ . (8) (7) f (r) =  B. The PDF of the Distance from Serving BS to UE In this paper, we adopt the minimum distance as the user association metric. Therefore, when the distance from a mobile user to its serving BS b0 is r, all distances from the interference BSs to the target mobile user must be larger than r. The derivation methodology of the PDF of r could basically follow the well-established lines in [1]. However, as the BS density varies in space and obeys the α-stable distributions, the derivations should be re-considered. Therefore, we give the following the theorem. Theorem 1. The PDF of the distance from the closest BS r to the target mobile user in a cellular network with α-stable distributed BS density is expressed in Eq. (8). Proof. Firstly, we take advantage of the simple fact that the null probability of a 2-D Poisson process in an area A with the given density λ is exp(−λA). Since λ ∼ S(α, σ, µ), we have P [r > rT ] = P(No BS closer than rT ) Z ∞ 2 e−λπ(rT ) f (λ)dλ = Z0 ∞ Z ∞ 2 (a) −λπ(rT )2 = e f (λ)dλ = e−(k+µ)π(rT ) f (k)dk (9) −∞ −∞   α (πσ)  2α  exp −µπ(rT )2 − , α 6= 1; (rT ) (b) cos πα = 2    exp −µπ(r )2 + 2σ(r )2 ln(π(r )2 ) , α = 1, T T T where the equation (a) is based on the fact that the spatial density in physical worlds should be non-negative, or f (λ) = dF (r) d (1 − P [r > rT ]) = dr drT (10) Then, merging Eq. (9) with Eq. (10) leads to the result.  Corollary 1. For homogeneous PPP with static density λ, the PDF of r could reduce to f (r) = exp(−λπr2 )2πλr. Similarly, for varying distribution λ, the conditional probability P(r|λ) = exp(−λπr2 )2πλr. This corollary could be achieved by directly applying Theorem 1 with a static density λ = µ and thus σ = 0. It is also consistent with the conclusions in [1]. C. Main Result We now state our main result for the coverage probability analysis. Generally, the coverage probability pc is mainly determined by the SINR threshold T , the spatial BS density distribution S(α, σ, µ), and the pathloss exponent δ. In some sense, pc (T, S(α, σ, µ), δ) is tightly coupled with the cumulative interference Ir for the α-stable distributed and selfsimilar BS deployment. The following lemma characterizes the relationship between pc (T, S(α, σ, µ), δ) and Ir . Lemma 2. The coverage probability pc (T, S(α, σ, µ), δ) could be obtained from the following formula, that is, pc (T, S(α, σ, µ), δ) ZZ δ e−ζT r N0 LIr (ζT rδ )P(r|λ)f (λ)drdλ, = (11) r>0,λ>0 where LIr (s) is the Laplace transformation of random variable Ir evaluated at s conditioned on the distance to the closest BS from the origin. The Rayleigh fading coefficient is assumed to satisfy h ∼ exp(ζ). We leave the proof of Lemma 2 in Appendix A, as the proof could be simply obtained by calculating the condition probability on the distance r from the serving BS to the mobile user. 7   exp −λS L∆S (s) = (1 − f (x))dx f (λS )dλS λS =0 ∆S Z α   Z  σ α aα(H−2) H−2   (1 − f (x))dx (1 − f (x))dx , α 6= 1; −a µ   exp − cos πα ∆S ∆S (a) 2 ( (16) =   Z    Z ) H−2  2σa  H−2  ln (1 − f (x))dx + (H − 2) ln a − a µ (1 − f (x))dx , α = 1.  exp π ∆S ∆S  ( !) !#α "  σ α aα(H−2)  H−2  exp − , α 6= 1; −a µπEg Λ(s, R, aR) − Θ(s, R, aR) πEg Λ(s, R, aR) − Θ(s, R, aR)    cos πα  2   !) ! (" (   (b) H−2 = + (H − 2) ln a exp 2σa ln πEg Λ(s, R, aR) − Θ(s, R, aR)     !) #     H−2  , α = 1. − πa µ · Eg Λ(s, R, aR) − Θ(s, R, aR)   Z ∞ Z Next, we focus on how to calculate the Laplace transform of the cumulative interference LIr (s), when the BS deployment obey α-stable distributions and self-similarity. In Section III-A, we divide the region of interest into two concentric circles. For the inner circle ∆ with a radius R, the impact of the spatial BS density λ is similar to the impact of r and explicitly represented by the latter’s PDF f (r). Meanwhile, the outer circle ∆S with the radius spanning from R to aR has a spatial BS density λS ∼ λaH−2 and understanding the impact of the interference from BSs in the outer circle is one of the core contributions Pof this paper. ForPsimplicity of representation, we let Ir = i∈∆/b0 gi R̂i−δ + i∈∆S gi R̂i−δ to denote the cumulative interference from all the other BSs i (except the serving BS b0 ) to the mobile user with the distance R̂i and pathloss gi . We could obtain the following lemma, Lemma 3. The Laplace transform of the cumulative interference Ir for a cellular network with α-stable distributed def BSs could be formulated as Eq. (12), where Θ(s, b, c) = 2 −δ 2/δ ) − Γ(− 2δ + 1, sgc−δ ) . Γ(d, x) = (sg) δ + 1, sgb R ∞ d−1 Γ(− −t t e dt Rdenotes the incomplete Gamma function, x ∞ while Γ(d) = 0 td−1 e−t dt denotes the standard Gamma   def function. Besides, Λ(s, b, c) = c2 1 − exp −sgc−δ −   b2 1 − exp −sgb−δ . The equation (a) comes from the identical, independent distribution of gi and its further independence from the point process. From Eq. (13), it can be observed that the Laplace transform his composedh of two parts ii (i.e., Q −δ and exp −sg R̂ E L∆ (s) = E∆ g i ii  hQ i∈∆/b0 h −δ ), which L∆S (s) = E∆S i∈∆S Eg exp −sg R̂i is also consistent with our intuition. Next, we derive the representation of these two parts separately. • For L∆ (s), we have a fixed spatial density λ. Then, from  Q the Campbell theorem [12], x∈∆ f (x) =  we have E R exp −λ ∆ (1 − fh(x))dx i  . Since f (x) = Eg exp −sg R̂−δ , we have Z (1 − f (x))dx ∆ Z R    vdv 1 − Eg exp −sgv −δ = 2π r( ) (a) = πEg Λ(s, r, R) − Θ(s, r, R) We leave the derivation of the equation (a) in Appendix B. Accordingly, we have !# " Proof. According to the definition of Laplace transform, we have LIr (s)   = EIr e−sIr   = E∆  · E∆S " Y i∈∆/b0 Y i∈∆S L∆ (s) = exp −λπEg Λ(s, r, R) − Θ(s, r, R) (15) For L∆S (s), as λS ∼ λaH−2 , we have Eq. (16), where the equation (a) comes from the Laplace transform of λS in Lemma 1. RThe equation (b) is achieved by applying the result ∆S (1 − f (x))dx = πEg {Λ(s, R, aR) − Θ(s, R, aR)}, which can be obtained by adopting a similar methodology as the derivation of Eq. (14). Combining Eq. (15) and Eq. (16), we obtain the result.  •  = E∆+∆s ,gi exp −s (a) (14) X i∈(∆+∆s )/b0 gi R̂i−δ   i  h −δ  Eg exp −sg R̂i # i h  −δ Eg exp −sg R̂i  (13) With the results above, we could obtain the final result in the following theorem. 8 pc (T, S(α, σ, µ), δ) Z n σ α aα(H−2)  α = 2πr exp − Ξ(ζT rδ , R, aR) − aH−2 µΞ(ζT rδ , R, aR) − µΞ(ζT rδ , r, R) πα cos 2 r>0 o h σα α i σα δ 2 α 2 δ δ 2 α−1 · (Ξ(ζT r , r, R) + πr ) − µπr − ζT r N (Ξ(ζT r , r, R) + πr ) + µ dr − 0 cos πα cos πα 2 2 pc (T, S(α, σ, µ), δ) ( Z 2πr exp = r>0 δ h 2σaH−2 i   ln Ξ(ζT rδ , R, aR) + (H − 2) ln a − aH−2 µ Ξ(ζT rδ , R, aR) π 2σΞ(ζT r , r, R) + 2σπr2 ln(Ξ(ζT rδ , r, R) + πr2 ) − µΞ(ζT rδ , r, R) − µπr2 ) π  i h 2σ  ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 + µ dr − ζT rδ N0 · − π + Υ(r) = Z λ>0 ( " δ δ ! exp −λπ Eg Λ(ζT r , r, R) − Θ(ζT r , r, R) +r 2 #) Proof. From Lemma 2, the coverage probability could be calculated as o σα δ 2 α 2 δ πα (Ξ(ζT r , r, R) + πr ) − µπr − ζT r N0 cos 2 h σα α i δ 2 α−1 · (Ξ(ζT r , r, R) + πr ) + µ dr (21) cos πα 2 2) if α = 1 r>0 where the equation (a) is the direct result of Corollary 1 and Lemma 3 and Υ(r) couldRbe formulated as Eq. (20), where the equation (b) is due to x e−sx xf (x)dx = − dΦ(s) ds . Merging Eq. (20), Eq. (19), and Lemma 3, we have the result.  When we consider the whole region (i.e., the outer circle spanning from R to ∞, or a → 0), we get the following corollary. Corollary 2. When a → ∞, the coverage probability could be reduced to 1) if α 6= 1 Z n 2πr exp − µΞ(ζT rδ , r, R) pc (T, S(α, σ, µ), δ) = r>0 Z r>0 (19) (20) − pc (T, S(α, σ, µ), δ) = pc (T, S(α, σ, µ), δ) ZZ δ e−ζT r N0 LIr (ζT rδ )P(r|λ)f (λ)drdλ = Z r>0,λ>0 δ (a) 2πre−ζT r N0 L∆s (ζT rδ )Υ(r)dr = (18) λf (λ)dλ  n o σα   exp − (Ξ(ζT rδ , r, R) + πr2 )α − µΞ(ζT rδ , r, R) − µπr2  πα  cos 2    h σα α i   δ 2 α−1  · (Ξ(ζT r , r, R) + πr ) + µ , α 6= 1  (b) cos πα 2 = n 2σΞ(ζT rδ , r, R) + 2σπr2     ln(Ξ(ζT rδ , r, R) + πr2 ) − µΞ(ζT rδ , r, R) exp   π   oh 2σ   i    − µπr2 − ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 + µ , α = 1 π Theorem 2. The coverage probability in a cellular networks with α-stable distributed BS density and the self-similarity is given by Eq. (17) and Eq. (18) for α 6= 1 and α = 1, respectively, where Ξ(s, b, c) = πEg (Λ(s, b, c) − Θ(s, b, c)). (17) 2πr exp ( − µΞ(ζT rδ , r, R) − µπr2 2σΞ(ζT rδ , r, R) + 2σπr2 − ζT rδ N0 + ln(Ξ(ζT rδ , r, R)+ π ) i h 2σ  ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 dr (22) πr2 ) · µ − π Proof. Firstly, we have h  r δ i lim a2 R2 1 − exp −ζT g( ) a→∞ aR   r δ R2 1 − exp −ζT g( aR ) = lim 2 a→∞ 1/a   r δ δ ) k R2 1 − exp −ζT g( R = lim+ (23) k2 k→0 δ   −ζT g(δ − 1) Rrδ−2 r (a) exp −ζT g( )δ k δ k δ−2 = lim+ 2 R k→0 =0 where the equation (a) comes from the l’Hôpital’s Rule and applies the fact that the pathloss exponent δ ≥ 2. 9 #  α−1  2(ζT g)2/δ r2  2 2  σα πEg Γ(− , ζT g) − Γ(− ) +µ · pc (T, S(α, σ, µ), δ) = 2πr cos πα δ δ δ r>0 2 !α (  2(ζT g)2/δ r2  2 2  σα α Γ(− , ζT g) − Γ(− ) − ζT rδ N0 exp − πEg cos πα δ δ δ 2   !) 2(ζT g)2/δ r2 2 2 − µπEg Γ(− , ζT g) − Γ(− ) dr δ δ δ ! Z  2(ζT g)2/δ r2   i h 2 2σ 2  ln πEg +1 · Γ(− , ζT g) − Γ(− ) 2πr µ − pc (T, S(α, σ, µ), δ) = π δ δ δ r>0 (  2(ζT g)2/δ r2  2(ζT g)2/δ r2  2 2  Γ(− , ζT g) − Γ(− ) ln πEg exp − ζT rδ N0 2σEg δ δ δ δ ! )    2/δ 2  2(ζT g) r  2 2  2  2 − µπEg dr Γ(− , ζT g) − Γ(− ) Γ(− , ζT g) − Γ(− ) δ δ δ δ δ " Z Hence, as a → ∞, we have aH−2 → 0 for H ∈ (0, 1). So, a H−2   lim R2 1 − exp −ζT g( Rr )δ R→∞ ! = aH−2 πEg Λ(s, b, c) − Θ(s, b, c) h  r i =a πEg − R 1 − exp −ζT g( )δ R ! r 2 − (ζT g)2/δ r2 Γ(− + 1, ζT g( )δ ) δ R = πEg (24) − r2 [1 − exp (−ζT g)] − (ζT g)2/δ r2 · ! h  r i 2 Γ(− + 1, ζT g) + πEg R2 1 − exp −ζT g( )δ δ R ! r  2 (27) + (ζT g)2/δ r2 Γ − + 1, ζT g( )δ δ R 2 − r2 [1 − exp (−ζT g)] + (ζT g)2/δ r2 Γ(− + 1) δ ! 2 − (ζT g)2/δ r2 Γ(− + 1, ζT g) δ  ! 2 2 2(ζT g)2/δ r2 (a) 2 Γ(− , ζT g) − Γ(− ) = −πr + πEg δ δ δ → πEg →0 From Theorem 2, it can be observed that when → ∞, only the term aH−2 Ξ(ζT rδ! , R, aR) = will be af- fected. We have the conclusion.  Based on Corollary 2, we have the following remark. Remark 2. When we expand the interference to the whole region, the cumulative interference from the outer circle could be negligible and the coverage probability is mainly contingent on the SINR within the inner circle. When R → ∞, we can further simplify the results to get more interesting insight. Theorem 3. When R → ∞, the coverage probability could be reduced to Eq. (25) and Eq. (26) for α 6= 1 and α = 1, respectively. Proof. Similar to  the lines to proveCorollary 2, we r δ ) = 0 and have lim a2 R2 1 − exp −ζT g( aR R→∞ 2. Ξ(ζT rδ , r, R) = πEg Λ(s, b, c) − Θ(s, b, c) 2 aH−2 πEg Λ(ζT rδ , R, aR) − Θ(ζT rδ , R, aR) ≥ δ ! h  r δ i + aH−2 πEg a2 R2 1 − exp −ζT g( ) aR ! r δ 2 2/δ 2 ) ) + (ζT g) r Γ(− + 1, ζT g( δ aR a 0 for all δ (26) Then lim Ξ(ζT r , R, aR) = 0. On the other hand, as R→∞ R → ∞, δ Ξ(ζT r , R, aR) H−2 = (25) where the Equation (a) comes from Γ(s, x) = (s − 1)Γ(s − 1, x) + xs−1 e−x and Γ(s) = (s − 1)Γ(s − 1). There, we obtain the result in the theorem after simple mathematical manipulations.  Next, we state the coverage probability when extra constraints are imposed, that is, the spatial density in the inner circle is fixed (i.e., σ = 0 and λ = µ in Theorem 3). We get the following corollary. Corollary 3. The coverage probability in cellular networks with fixed spatial BS density is pc (T, S(α, 0, λ), δ) ( Z 2(ζT g)2/δ r2 = 2πµr exp − ζT rδ N0 − µπEg δ r>0 10 1 0.9 -Stable theory, SNR = 20 dB -Stable theory, SNR = 0 dB PPP theory, SNR = 20 dB PPP theory, SNR = 0 dB -Stable simulation, SNR = 20 dB -Stable simulation, SNR = 0 dB PPP simulation, SNR = 20 dB PPP simulation, SNR = 0 dB Coverage Probability 0.8 0.7 0.6 0.7 0.5 0.4 0.3 0.6 0.5 0.4 0.3 0.2 0.2 0.1 0.1 0 -10 -Stable, = 0.25 -Stable, = 25 -Stable, = 100 PPP, = 0.25 PPP, = 25 PPP, = 100 0.8 Coverage Probability 0.9 -8 -6 -4 -2 0 2 4 6 8 0 -10 10 -8 -6 -4 SINR Threshold (dB) Fig. 3. The coverage probability comparison under different SNR environment. !) dr 0 2 4 6 8 10 Fig. 4. The coverage probability comparison under various (average) spatial BS densities. 0.9 (28) Remark 3. When the spatial density is fixed and equals λ, the self-similarity patterns no longer take effect and our result could be reduced to the well-recognized conclusions obtained by J. G. Andrews et al. in [1]. IV. N UMERICAL A NALYSES In this part, we provide numerical evaluations through which we compare the coverage probability of the cellular network with α-stable distributed BS density and the classical PPP model. Our simulation parameters are configured according to Table I. In particular, the default spatial BS density for the PPP model is consistent with that in [1]. As [21] states that when α ∈ (0, 1), the mean value of S(α, σ, µ) equals µ. Therefore, it is fair to compare the network with α-stable distributed BS density and the classical PPP model. Firstly, we leverage the theoretical analysis results and give the coverage probability comparison under different AWGN environment in Fig. 3. From the figure, the network with αstable distributed BS density exhibits significant performance improvement than the PPP model in low SNR environment while the performance gap becomes gradually narrow along with the increase of SNR. On the other hand, the performance gap between SNR = 0 dB and SNR = 20 dB is only 4 dB and 6 dB for the α-stable model and the PPP, respectively, which demonstrates that the cellular network is interferencelimited rather than noise-limited. Fig. 3 also depicts the results by Monte Carlo simulations (see the dashed or dotted curves) and each curve is averaged under 15000 iterations. It can be observed that the results obtained by Monte Carlo simulations match well with those obtained by the theoretical analyses, which further verifies the correctness of our theoretical derivations. Fig. 4 illustrates interesting coverage probability comparison under various (average) spatial BS densities. It shows that µ = 0.25 has lead to remarkable coverage probability and -Stable, -Stable, -Stable, PPP 0.8 = 0.5 = 0.7 = 0.9 0.7 Coverage Probability h 2 i 2 Γ(− , ζT g) − Γ(− ) δ δ -2 SINR Threshold (dB) 0.6 0.5 0.4 0.3 0.2 0.1 -10 -8 -6 -4 -2 0 2 4 6 8 10 SINR Threshold (dB) Fig. 5. The impact of α on the coverage probability comparison. also made the networks to be interference-limited. Therefore, further increasing the spatial density would add more to the aggregated interference and impose negative impact on the coverage probability. It also implies that the influence of the spatial BS density on the coverage probability is rather sophisticated. Fig. 5 and Fig. 6 further examine the impact of α and σ. They show that when α becomes larger or σ gets smaller, the network coverage probability increases. In some cases, the network with α-stable self-similarity could produce interior performance than the PPP model. Next, we focus on the impact of the spatial self-similarity on the coverage probability. Recalling the statements in Section II-A2, the spatial self-similarity is examplified by the relationship N (aR) ∼ aH N (R) or λS ∼ aH−2 λ. Therefore, we examine the coverage probability when a and H differs and provide the corresponding results in Table II. From the table, we observe increasing H or decreasing a will result in a slight reduction of the coverage probability. The trivial impact of a and H on the network performance can be explained as that a variation of H or a will make the spatial BS density 11 TABLE II A SUMMARY OF THE NETWORK COVERAGE PROBABILITY UNDER DIFFERENT a AND SNR -10 dB 0 dB 10 dB a=2 H = 0.9 a = 20 H = 0.9 α-Stable a = 200 H = 0.9 a=2 H = 0.1 a=2 H = 0.5 PPP 0.8015 0.4437 0.1355 0.8019 0.4441 0.1357 0.8020 0.4443 0.1357 0.8016 0.4439 0.1356 0.8016 0.4438 0.1355 0.7531 0.3580 0.1153 0.9 0.9 -Stable, -Stable, -Stable, -Stable, PPP 0.8 = 0.25 = 2.5 = 25 = 250 -Stable, R = 40 -Stable, R = 1 -Stable, R = 0.5 PPP 0.8 0.7 Coverage Probability Coverage Probability 0.7 0.6 0.5 0.4 0.3 0.6 0.5 0.4 0.3 0.2 0.2 0.1 0 -10 H. -8 -6 -4 -2 0 2 4 6 8 0.1 -10 10 -8 -6 -4 SINR Threshold (dB) -2 0 2 4 6 8 10 SINR Threshold (dB) (a) The impact of R Fig. 6. The impact of σ on the coverage probability comparison. 0.9 -Stable, = 2.5 -Stable, = 3 -Stable, = 4 PPP, = 2.5 PPP, = 3 PPP, = 4 0.8 0.7 Coverage Probability λS of the outer circle larger from a probabilistic sense, thus making BSs over-crowded and generating huge interference. This phenomenon that stronger self-similarity incurs negative impact is also consistent with its counterpart of self-similar Ethernet traffic. As stated in [73], stronger self-similarity in Ethernet traffic will make heavier traffic prone to arrive in a sequel and congest the network. We continue the performance analyses in Fig. 7(a) and Fig. 7(b). Fig. 7(a) shows reducing R will cause a reduction of coverage probability for low SINR threshold but an increment for high SINR threshold. On the other hand, consistent with our intuition, Fig. 7(b) depicts that a smaller pathloss exponent will bring a lower coverage probability. However, the network with α-stable distributed BSs always demonstrates relatively larger coverage probability than the PPP model. 0.6 0.5 0.4 0.3 0.2 0.1 0 -10 -8 -6 -4 -2 0 2 4 6 8 10 SINR Threshold (dB) (b) The impact of δ Fig. 7. Performance sensitivity analyses under different R and δ. V. C ONCLUSION In this paper, we have performed the stochastic geometry analyses in cellular networks with α-stable self-similarly deployed BSs. Based on the practical BS deployment records in China and Europe (Italy), we have validated the spatial self-similarity among BSs. Afterwards, we have theoretically derived the coverage probability for cellular networks with self-similarity and provided a tractable result. In particular, we have demonstrated that our analytical results could be reduced to the works achieved by J. G. Andrews [1]. We have also simulated the coverage probability performance under extensive parameter settings and verified the consistence between the theoretical and simulation results. Our results have shown that compared to the classical PPP model, the modeling with α-stable self-similarity could contribute to analyze the performance under more sophisticated network configurations, thus making it easier to understand the actual network variations. There still exist some open questions to be addressed. For example, our work has shown that instead of improving the coverage performance, simple yet stubborn deployment of BSs incurs significant interference and degrades the coverage performance. Therefore, frequency reuse has been applied in practical cellular communication. In this case, it is still mean- 12 ingful to combine α-stable self-similarity with more realistic network configurations, so as to produce more valuable results. A PPENDIX A. Proof of Lemma 2 Proof. According to the definition of the coverage probability, we have pc (T, S(α, σ, µ), δ) = Er [P(SINR > T |r)] ZZ P(SINR > T |r)P(r|λ)f (λ)drdλ = r>0,λ>0   ZZ hr−δ > T |r P(r|λ)f (λ)drdλ P = N0 + Ir r>0,λ>0 (29) Next, recalling that theh pathloss in Rayleigh fading satisfies i hr −δ h ∼ exp(ζ), the term P N0 +Ir > T |r will satisfy   hr−δ > T |r N0 + Ir   = P h > rδ T (N0 + Ir )|r    = EIr P h > rδ T (N0 + Ir )|r, Ir   = EIr exp(−ζrδ T (N0 + Ir ))|r, Ir P = e−ζT r δ N0 (30) LIr (ζT rδ ) Combining Eq. (29) and Eq. (30), we get the result.  B. Derivations of Eq. (14) In this part, we provide the details about the equation (a) in the Eq. (14). Z Z R   (1 − f (x))dx = 2π vdv 1 − Eg exp −sgv −δ ∆ r Z ∞Z R   1 − exp −sgv −δ vdvf (g)dg (31) = 2π =π Z 0 0 ∞ Z |r r R−δ −δ 2 {1 − exp (−sgy)} dy − δ f (g)dg {z } (>) n o = πEg Λ(s, r, R) − Θ(s, r, R) The last equation holds, since for the inside integral (>), we have 2 R−δ (>) = y − δ [1 − exp (−sgy)] −δ r Z R−δ 2 2 (32) (sgy)− δ exp (−sgy) dy − (sg) δ r −δ     = R2 1 − exp −sgR−δ − r2 1 − exp −sgr−δ   2 2 2 −δ −δ δ − (sg) Γ(− + 1, sgr ) − Γ(− + 1, sgR ) δ δ R EFERENCES [1] J. G. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans. Wireless Commun., vol. 59, no. 11, pp. 3122–3134, Nov. 2011. [2] R. Li, Z. Zhao, X. Zhou, G. Ding, Y. Chen, Z. Wang, and H. Zhang, “Intelligent 5G: When cellular networks meet artificial intelligence,” IEEE Wireless Commun., Mar. 2017, (early access). [3] J. G. Andrews, H. Claussen, M. Dohler, S. Rangan, and M. C. Reed, “Femtocells: Past, present, and future,” IEEE J. Sel. Area. Comm., vol. 30, no. 3, pp. 497–508, Apr. 2012. [4] J. G. Andrews, S. Singh, Q. Ye, X. Lin, and H. Dhillon, “An overview of load balancing in HetNets: Old myths and open problems,” arXiv:1307.7779 [cs, math], Jul. 2013. [Online]. Available: http://arxiv.org/abs/1307.7779 [5] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic geometry and random graphs for the analysis and design of wireless networks,” IEEE J. Sel. Area. Comm., vol. 27, no. 7, pp. 1029–1046, Sep. 2009. [6] Y. Zhou, R. Li, Z. Zhao, X. Zhou, and H. Zhang, “On the α–stable distribution of base stations in cellular networks,” IEEE Commun. Lett., vol. 19, no. 10, pp. 1750–1753, Oct. 2015. [7] Y. Zhou, Z. Zhao, Y. Louet, Q. Ying, R. Li, X. Zhou, X. Chen, and H. Zhang, “Large-scale spatial distribution identification of base stations in cellular networks,” IEEE Access, vol. 3, pp. 2987 – 2999, Dec. 2015. [8] N. Deng, W. Zhou, and M. Haenggi, “The Ginibre point process as a model for wireless networks with repulsion,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 107–121, Jan. 2015. [9] M. Haenggi and R. K. Ganti, “Interference in large wireless networks,” Foundations and Trends in Networking, vol. 3, no. 2, pp. 127–248, Nov. 2009. [Online]. Available: http://www.nowpublishers.com/article/Details/NET-015 [10] Y. J. Chun, M. O. Hasna, and A. Ghrayeb, “Modeling heterogeneous cellular networks interference using poisson cluster processes,” IEEE J. Sel. Area. Comm., vol. 33, no. 10, pp. 2182 – 2195, May 2015. [11] A. Guo, Y. Zhong, W. Zhang, and M. Haenggi, “The Gauss-Poisson process for wireless networks and the benefits of cooperation,” IEEE Trans. Commun., vol. 64, no. 5, pp. 1916–1929, May 2016. [12] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry and its applications,, 3rd ed. Wiley, Jul. 2013. [Online]. Available: http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470664819.html [13] N. Miyoshi and T. Shirai, “A cellular network model with Ginibre configured base stations,” Adv. in Appl. Probab., vol. 46, no. 3, pp. 832–845, Sep. 2014. [14] T. Kobayashi and N. Miyoshi, “Uplink cellular network models with Ginibre deployed base stations,” in Proc. IEEE ITC 2014, Karlskrona, Sweden, Sep. 2014. [15] Y. Li, F. Baccelli, H. S. Dhillon, and J. G. Andrews, “Fitting determinantal point processes to macro base station deployments,” in Proc. IEEE Globecom 2014, Austin, TX, USA, Dec. 2014. [16] H. ElSawy, A. Sultan-Salem, M. S. Alouini, and M. Z. Win, “Modeling and analysis of cellular networks using stochastic geometry: A tutorial,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 167–203, 2017. [17] I. Flint, X. Lu, N. Privault, D. Niyato, and P. Wang, “Performance analysis of ambient RF energy harvesting with repulsive point process modeling,” IEEE Trans. Commun., vol. 14, no. 10, pp. 5402–5416, Oct. 2015. [18] H. ElSawy and E. Hossain, “Two-tier HetNets with cognitive femtocells: Downlink performance modeling and analysis in a multichannel environment,” IEEE Trans. Mob. Comput., vol. 13, no. 3, pp. 649–663, Mar. 2014. [19] X. Zhou, Z. Zhao, R. Li, Y. Zhou, J. Palicot, and H. Zhang, “Human mobility patterns in cellular networks,” IEEE Commun. Lett., vol. 17, no. 10, pp. 1877–1880, Oct. 2013. [20] A.-L. Barabsi and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509–512, Oct. 1999. [21] G. Samorodnitsky, Stable non-gaussian random processes: Stochastic models with infinite variance. New York: Chapman and Hall/CRC, Jun. 1994. [Online]. Available: http://www.amazon.com/Stable-Non-Gaussian-Random-Processes-Stochastic/dp/041205 [22] R. Li, Z. Zhao, J. Zheng, Y. Chen, C. Mei, Y. Cai, and H. Zhang, “The learning and prediction of application-level traffic data in cellular networks,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3899 – 3912, Jun. 2017. [23] L. Chiaraviglio, F. Cuomo, M. Maisto, A. Gigli, J. Lorincz, Y. Zhou, Z. Zhao, C. Qi, and H. Zhang, “What is the best spatial distribution 13 [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] to model base station density? A deep dive into two European mobile networks,” IEEE Access, vol. 4, pp. 1434–1443, Apr. 2016. L. Chiaraviglio, F. Cuomo, A. Gigli, M. Maisto, Y. Zhou, Z. Zhao, and H. Zhang, “A reality check of base station spatial distribution in mobile networks,” in Proc. IEEE INFOCOM 2016, San Francisco, CA, USA, Apr. 2016. Z. Zhao, M. Li, and R. Li, “Temporal-spatial distribution nature of traffic and base stations in cellular networks,” IET Commun., Aug. 2017, accepted. R. Li, Z. Zhao, C. Qi, X. Zhou, Y. Zhou, and H. Zhang, “Understanding the traffic nature of mobile instantaneous messaging in cellular networks: A revisiting to α-stable models,” IEEE Access, vol. 3, pp. 1416–1422, Sep. 2015. C. Song, S. Havlin, and H. A. Makse, “Self-similarity of complex networks,” Nature, vol. 433, no. 7024, pp. 392–395, Jan. 2005. X. Ge, S. Tu, G. Mao, C. X. Wang, and T. Han, “5G ultra-dense cellular networks,” IEEE Wireless Communications, vol. 23, no. 1, pp. 72–79, Feb. 2016. A. Guo and M. Haenggi, “Spatial stochastic models and metrics for the structure of base stations in cellular networks,” IEEE Trans. Wireless Commun., vol. 12, no. 11, pp. 5800–5812, Nov. 2013. W. C. Cheung, T. Q. S. Quek, and M. Kountouris, “Throughput optimization, spectrum allocation, and access control in two-tier femtocell networks,” IEEE J. Sel. Area. Comm., vol. 30, no. 3, pp. 561–574, Apr. 2012. S. Mukherjee, “Distribution of downlink SINR in heterogeneous cellular networks,” IEEE J. Sel. Area. Comm., vol. 30, no. 3, pp. 575–585, Apr. 2012. B. Yu, L. Yang, H. Ishii, and S. Mukherjee, “Dynamic TDD support in macrocell-assisted small cell architecture,” IEEE J. Sel. Area. Comm., vol. 33, no. 6, pp. 1201–1213, Jun. 2015. M. D. Renzo and P. Guan, “Stochastic geometry modeling and systemlevel analysis of uplink heterogeneous cellular networks with multiantenna base stations,” IEEE Trans. Commun., vol. 64, no. 6, pp. 2453– 2476, Jun. 2016. F. J. Martin-Vega, G. Gomez, M. C. Aguayo-Torres, and M. D. Renzo, “Analytical modeling of interference aware power control for the uplink of heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6742–6757, Oct. 2016. T. D. Novlan, H. S. Dhillon, and J. G. Andrews, “Analytical modeling of uplink cellular networks,” IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2669–2679, Jun. 2013. S. Singh, X. Zhang, and J. G. Andrews, “Joint rate and SINR coverage analysis for decoupled uplink-downlink biased cell associations in hetnets,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5360– 5373, Oct. 2015. H. Y. Lee, Y. J. Sang, and K. S. Kim, “On the uplink SIR distributions in heterogeneous cellular networks,” IEEE Communications Letters, vol. 18, no. 12, pp. 2145–2148, Dec. 2014. Z. Zeinalpour-Yazdi and S. Jalali, “Outage analysis of uplink two-tier networks,” IEEE Trans. Commun., vol. 62, no. 9, pp. 3351–3362, Sep. 2014. M. Mirahsan, R. Schoenen, and H. Yanikomeroglu, “HetHetNets: Heterogeneous traffic distribution in heterogeneous wireless cellular networks,” IEEE J. Sel. Area. Comm., vol. 33, no. 10, pp. 2252–2265, Oct. 2015. Y. Lin, W. Bao, W. Yu, and B. Liang, “Optimizing user association and spectrum allocation in hetnets: A utility perspective,” IEEE J. Sel. Area. Comm., vol. 33, no. 6, pp. 1025–1039, Jun. 2015. H. S. Dhillon, R. K. Ganti, and J. G. Andrews, “Load-aware modeling and analysis of heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 12, no. 4, pp. 1666–1677, Apr. 2013. S. Singh, H. Dhillon, and J. G. Andrews, “Offloading in heterogeneous networks: Modeling, analysis, and design insights,” IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 2484–2497, May 2013. H. ElSawy, E. Hossain, and D. I. Kim, “HetNets with cognitive small cells: User offloading and distributed channel access techniques,” IEEE Commun. Mag., vol. 51, no. 6, pp. 28–36, Jun. 2013. Y. S. Soh, T. Q. S. Quek, M. Kountouris, and G. Caire, “Cognitive hybrid division duplex for two-tier femtocell networks,” IEEE Trans. Wireless Commun., vol. 12, no. 10, pp. 4852–4865, Oct. 2013. K. Huang and J. G. Andrews, “An analytical framework for multicell cooperation via stochastic geometry and large deviations,” IEEE Trans. Inf. Theory, vol. 59, no. 4, pp. 2501–2516, Apr. 2013. C. H. M. de Lima, M. Bennis, and M. Latva-aho, “Statistical analysis of self-organizing networks with biased cell association and interference [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] avoidance,” IEEE Trans. Veh. Tech., vol. 62, no. 5, pp. 1950–1961, Jun. 2013. P. Semasinghe, E. Hossain, and K. Zhu, “An evolutionary game for distributed resource allocation in self-organizing small cells,” IEEE Trans. Mob. Comput., vol. 14, no. 2, pp. 274–287, Feb. 2015. Y. Deng, L. Wang, M. Elkashlan, M. D. Renzo, and J. Yuan, “Modeling and analysis of wireless power transfer in heterogeneous cellular networks,” IEEE Trans. Commun., vol. 64, no. 12, pp. 5290–5303, Dec. 2016. C. Li, J. Zhang, and K. B. Letaief, “Throughput and energy efficiency analysis of small cell networks with multi-antenna base stations,” IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 2505–2517, May 2014. D. Cao, S. Zhou, and Z. Niu, “Optimal combination of base station densities for energy-efficient two-tier heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4350–4362, Sep. 2013. ——, “Improving the energy efficiency of two-tier heterogeneous cellular networks through partial spectrum reuse,” IEEE Trans. Wireless Commun., vol. 12, no. 8, pp. 4129–4141, Aug. 2013. Y. S. Soh, T. Q. Quek, M. Kountouris, and H. Shin, “Energy efficient heterogeneous cellular networks,” IEEE J. Sel. Area. Comm., vol. 31, no. 5, pp. 840–850, May 2013. M. D. Renzo and P. Guan, “A mathematical framework to the computation of the error probability of downlink MIMO cellular networks by using stochastic geometry,” IEEE Trans. Commun., vol. 62, no. 8, pp. 2860–2879, Aug. 2014. N. Lee, D. Morales-Jimenez, A. Lozano, and R. W. Heath, “Spectral efficiency of dynamic coordinated beamforming: A stochastic geometry approach,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 230–241, Jan. 2015. A. K. Gupta, H. S. Dhillon, S. Vishwanath, and J. G. Andrews, “Downlink multi-antenna heterogeneous cellular network with load balancing,” IEEE Trans. Commun., vol. 62, no. 11, pp. 4052–4067, Nov. 2014. L. H. Afify, H. ElSawy, T. Y. Al-Naffouri, and M. S. Alouini, “A unified stochastic geometry model for MIMO cellular networks with retransmissions,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8595–8609, Dec. 2016. T. Bai and R. W. Heath, “Analyzing uplink SINR and rate in massive MIMO systems using stochastic geometry,” IEEE Trans. Commun., vol. 64, no. 11, pp. 4592–4606, Nov. 2016. S. Singh, M. N. Kulkarni, A. Ghosh, and J. G. Andrews, “Tractable model for rate in self-backhauled millimeter wave cellular networks,” IEEE J. Sel. Area. Comm., vol. 33, no. 10, pp. 2196–2211, Oct. 2015. F. Muhammad, Z. H. Abbas, and F. Y. Li, “Cell association with load balancing in nonuniform heterogeneous cellular networks: Coverage probability and rate analysis,” IEEE Trans. Veh.Tech., vol. 66, no. 6, pp. 5241–5255, Jun. 2017. I. Atzeni and M. Kountouris, “Full-duplex mimo small-cell networks: Performance analysis,” in Proc. IEEE Globecom 2015, San Diego, CA, USA, Dec. 2015. J. Lee and T. Q. S. Quek, “Hybrid full-/half-duplex system analysis in heterogeneous wireless networks,” IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2883–2895, May 2015. H. Tabassum, A. H. Sakr, and E. Hossain, “Analysis of massive MIMOenabled downlink wireless backhauling for full-duplex small cells,” IEEE Trans. Commun., vol. 64, no. 6, pp. 2354–2369, Jun. 2016. K. Huang, J. G. Andrews, D. Guo, R. W. Heath, and R. A. Berry, “Spatial interference cancellation for multiantenna mobile ad hoc networks,” IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1660–1676, Mar. 2012. R. Li, Y. Chen, G. Y. Li, and G. Liu, “Full-duplex cellular networks,” IEEE Commun. Mag., vol. 56, no. 4, pp. 184 – 191, Apr. 2017. A. AlAmmouri, H. ElSawy, O. Amin, and M. S. Alouini, “In-band αduplex scheme for cellular networks: A stochastic geometry approach,” IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6797–6812, Oct. 2016. C.-H. Lee, C.-Y. Shih, and Y.-S. Chen, “Stochastic geometry based models for modeling cellular networks in urban areas,” Wireless Net., vol. 19, no. 6, pp. 1063–1072, Aug. 2013. N. Miyoshi and T. Shirai, “Spatial modeling and analysis of cellular networks using the Ginibre point process: A tutorial,” IEICE Transactions on Communications, vol. E99.B, no. 11, pp. 2247–2255, Nov. 2016. A. Karasaridis and D. Hatzinakos, “Network heavy traffic modeling using α-stable self-similar processes,” IEEE Trans. Commun., vol. 49, no. 7, pp. 1203–1214, Jul. 2001. M. Crovella and A. Bestavros, “Self-similarity in world wide web traffic: Evidence and possible causes,” IEEE/ACM Trans. Netw., vol. 5, no. 6, pp. 835–846, Dec. 1997. 14 [70] W. Song and W. Zhuang, “Resource reservation for self-similar data traffic in cellular/WLAN integrated mobile hotspots,” in Proc. IEEE ICC 2010, Cape Town, South Africa, May 2010. [71] C. Qi, Z. Zhao, R. Li, and H. Zhang, “Characterizing and modeling social mobile data traffic in cellular networks,” in Proc. IEEE VTC 2016Spring, Nanjing, China, May 2016. [72] X. Ge, Y. Qiu, J. Chen, M. Huang, H. Xu, J. Xu, W. Zhang, Y. Yang, C. X. Wang, and J. Thompson, “Wireless fractal cellular networks,” IEEE Wireless Commun., vol. 23, no. 5, pp. 110–119, Oct. 2016. [73] K. Park, G. Kim, and M. Crovella, “On the effect of traffic self-similarity on network performance,” in Proc. SPIE ICPCNS 1997, Dallas, TX, USA, Oct. 1997.
7
Subspace arrangements and motives of classifying stacks of reflection groups arXiv:1507.03486v2 [math.AG] 8 Sep 2017 Emanuele Delucchi, Ivan Martino September 12, 2017 Abstract We study some combinatorial aspects of a subspace arrangement associated to every faithful representation of finite groups, with a view on the triviality problem for motivic classes of classifying stacks. In particular, for finite reflection groups we reduce this problem to a conjecture which would generalize a theorem by Aluffi. In this paper we unfold the combinatorics underlying the computation of the motivic class {BG} of the classifying stack of a finite group G in the Grothendieck ring of algebraic stacks K0 (Stackk ). In the case of complex reflection groups, we reduce it to the following conjecture. Conjecture. Let W ⊂ GL(V ) be a finite complex reflection group and let AW be the arrangement of hyperplanes associated to W (see Definition 1.3). Call Ve the open complement of this arrangement and call Ve/W its quotient under the action of W . Then, the motivic class {Ve/W } is a polynomial in L, the class of the affine line. More precisely, it has the following form: {Ve/W } = χAW /W (L), where χAW /W (L) denote the characteristic polynomial of the quotient arrangement. This conjecture generalizes a theorem of Aluffi [1] asserting that {Ve } = χAW (L). Before we go any further, let us put this in context and explain our motivation. The Noether Problem. Let k be a any field and G be a finite group. A century ago, Emmy Noether [11] studied the rationality of the field extension k(V )G /k, where k(V )G denotes the invariants of the field of rational functions k(V ) over the regular representation V of G. This rationality question became known as the Noether problem and no counterexamples to the rationality were found for more than 50 years. In fact, the first such counterexample came in 1969 with work of Swan [16] Z proving that the extension Q(V ) /47Z /Q is not rational. In the Eighties, several other non rational extensions were found over the complex field by Saltman [13] and Bogomolov [2] for certain p-groups of order p9 and of order p6 , respectively. More recently Hoshi, Kang and Kunyavskii [7] studied the order p5 cases with non rational extension C(V )G /C. 1 The triviality of the motivic class of BG. In 2009, Ekedahl [4] showed that the Noether problem relates to the computation of a certain second degree cohomology of the motivic class {BG}. Each group of this cohomology is called an Ekedahl invariant of G in [10, 9], to which we refer for an overview of the topic. A motivic class is said to be trivial if it coincides with the class of a point {Spec(k)}, that we denote for simplicity by 1 because it is the neutral element with respect to the product in K0 (Stackk ). In all above-mentioned nonrational instances of the Noether Problem, {BG} is not trivial in K0 (Stackk ). A further point of interest in this triviality problem comes from recent work of Totaro [17] which relates it with other five properties of finite groups: stable rationality of quotient varieties V /G, triviality for the birational motive of the quotient varieties V /G, the weak Chow Künneth property of BG, the Chow Künneth property of BG and the mixed Tate property of BG. The known instances of triviality for {BG} are – the finite subgroups G ⊂ GL1 (k) (see [4, Proposition 3.2]); – the symmetric groups Sn (see [4, Theorem 4.3]); – all finite subgroups of the group of affine transformations of A1k , assuming k algebraically closed (see [4, Example ii) on page 8]). – the finite subgroups G ⊆ GL3 (k), if char(k) = 0 [9, Theorem 2.4]. Our results. The computation of the motivic class of {BG} relates to an orbit stratification of the quotient stack [V /G] for any faithful representation ρ of G in GL(V ). In this paper we focus on the combinatorics of such stratification. We say that a subgroup H of G is a stabilizer subgroup if there exists v ∈ V stabilized only by H, that is Stabρ (v) = H (see Definition 1.4). The set of stabilizer subgroups Pρ with reverse inclusion has a natural poset structure (see Definition 1.4). Moreover the group G acts on Pρ by conjugation and so we denote by P̃ρ := Pρ/G the set of conjugacy classes of stabilizer subgroups. It will be useful to denote by P̃ρ′ the poset of all all conjugacy classes of stabilizer subgroups. Under certain group theoretic and geometric conditions, we reduce the computation of {BG} to the knowledge of the combinatorics of P̃ρ′ . In order to state our first result, let us denote by ∆ρ the order complex of P̃(G) (this is the set of its ordered chains, that is the set of flags f as H0 < H1 < · · · < Hk ), and call NG (f ) the intersection of all normalizer subgroups NG (Hi ) with Hi stabilizer subgroup in the flag. Theorem A. Let ρ : G → GL(V ) be a faithful representation of a finite group G such that (1) {BNG (f )} = 1 for all f ∈ ∆ρ and (2) {V /NG (H)} = Ldim V H H for all nontrivial stabilizer subgroups H ∈ P̃ ′ (G). Then, {BG}ϕρ (L) = ϕρ (L), where ϕρ is the characteristic polynomial of ρ. (see Definition 1.6). 2 Notice that, ϕρ (t) is a polynomial defined only using the combinatorial information of P̃(G). As a token of motivation let us emphasize the following fact: under the hypothesis of Theorem A, if ϕρ (L) is invertible in K0 (Stackk ), then {BG} = 1. Finite reflection groups are a distinguished family of finite subgroups of the general linear group, which contains the symmetric groups and all cyclic groups. This fact already suggests finite reflection groups as sensible candidates for the study of {BG}. Moreover, the wealth of combinatorial, geometric and representation-theoretic results about finite reflection groups provides many useful tools. In particular, to every finite reflection group W is associated a reflection arrangement, i.e., the arrangement of hyperplanes defined by the fix-point sets of the reflections in W . Reflection arrangements lie at the roots of the general theory of hyperplane arrangements, for an introduction to which we point to the textbook [12]. For this class of groups, we are able to identify a combinatorial property of the poset of stabilizer subgroups (Definition 1.4) which allows us to explicitly compute the polynomial ϕρ (t) for the standard linear representation of finite reflection groups. Theorem B. If W is a d-dimensional irreducible finite reflection group in GL(V ) that fulfills the hypothesis of Theorem A, then ϕW (t) = td − 1. Using the fact that Ld − 1 is invertible in K0 (Stackk ), these computations allow us to pave the way for the proof of the triviality of the motivic class for the reflection groups. The missing part is precisely the proof of the conjecture, affirming that {Ve/W } = χAW /W (L). We stress that χAW /W (L) = χP̃(W ) (L). Theorem C. If the Conjecture holds, then {BW } = 1 in K0 (Stackk ). This type of rationality problems have also been studied in literature by different authors. For instance, Looijenga [8, Lemma 5.1] has shown that {V /G} = Ln for every abelian group acting linearly on a n-dimensional kvector space, where k is a field of characteristic zero containing a root of unity of degree the order of G. However, this condition fails for the counterexamples to the Noether problem given by Saltman [13], Bogomolov [2] and Hoshi, Kang and Kunyavskii [7]. Usm ing [4, Proposition 3.1], one shows that for m large enough {V /G} = {BG}Lmn in the Kontsevich value ring of algebraic varieties. Since {BG} is not trivial then m {V /G} is not Lmn in the K0 (VarC ). This rationality problem has also been studied by Esnault and Viehweg (see Lemma 1.1 and Proposition 1.3 in [6]). To conclude, we do not know whether the conjecture might be true for a class of group larger than that of the reflection groups. Indeed, the hypothesis of Theorem A seem very restrictive and may well characterize finite reflection groups. The structure of the paper is the following. First, in Section 1 we review some basics on subspace arrangements, partially ordered sets, Motivic classes 3 and reflection groups. We present the new Conjecture in Section 2 and then in Section 3 we prove Theorem A. In section 4, we study the poset of conjugacy classes of stabilizer subgroups for a complex reflection group and we show Theorem B. Finally in Section 4.1, we prove that the conjecture implies that the class of the classifying stack of W is trivial, that is Theorem C. Acknowledgements. We thank Emanuele Ventura for pointing out the reference [1]. We are very thankful to an anonymous referee who pointed out a mistake in a older version of this manuscript. Both authors have been partially supported by the Swiss National Science Foundation Professorship grant PP00P2 150552/1. The second author have been partially supported by the Zelevinsky Research Instructor Fund, by the Knut and Alice Wallenberg Fundation and by the Royal Swedish Academy of Science. 1 1.1 Preliminaries and generalities Combinatorics of subspace arrangements The main combinatorial structure of interest in this paper is that of a partially ordered set or, for short, poset. In this section we briefly review some basic terminology and the results we will need later. For more background, a standard reference is [15, Chapter 3]. A poset is a pair (P, ≤) consisting of a set P with a partial order relation ≤. In what follows the set P will always be finite and the order relation will be understood (so we will just say ”the poset P ” referring to (P, ≤)). If p, q ∈ P are such that p ≤ q, the interval determined by p and q is the subset [p, q] := {r ∈ P | p ≤ r ≤ q}. The set of all intervals of P is denoted I(P ). A lattice is a poset where every pair of elements has a unique minimal upper bound as well as a unique maximal lower bound. For example, the poset LG of all subgroups of a given finite group G, ordered by inclusion, is a lattice. The Möbius function of the poset P is the function µP : I(P ) → Z defined recursively as follows: X µ(p, p) = 1 for all p ∈ P ; µ(p, r) 0 for all p < q in P. = r∈[p,q] If the poset P has a unique minimal element (i.e., an element 0̂ with p ≤ 0̂ for all p ∈ P \ {0̂}), for every p ∈ P we will write µP (p) as a shorthand for µP (0̂, p). To every poset P is associated the poset ∆(P ) of all chains of P . Precisely, this is the set ∆(P ) := {{p1 , p2 , . . . , pk } ⊆ P | p1 < p2 < . . . < pk } ordered by inclusion. If the poset P has a unique minimal element 0̂ and a b ) := ∆(P \ {0̂, 1̂}). unique maximal element 1̂, we define also ∆(P Since every subset of a totally ordered set is again totally ordered, ∆(P ) and ˆ ) are naturally abstract simplicial complexes. Their topology is related to ∆(P the Möbius function as follows. 4 Theorem 1.1. For every p ≤ q in a poset P , µP (p, q) is the reduced Euler P b characteristic of ∆([p, q]), that is µP (p, q) = ω∈∆([p,q]) (−1)|ω|−1 . b We will be concerned with posets arising from subspace arrangements. Let k be a field, V a k-vector space of dimension d. An arrangement of subspaces in V is a finite set A of linear subspaces of V ; its poset of intersections is the set \ L(A) := { W | X ⊆ A} (1) W ∈X ordered by reverse inclusion: for x, y ∈ L(A), x ≤ y if x ⊇ y. These posets are always lattices, and in particular they have a unique minimal element 0̂ (corresponding T to the intersection of the empty family) and a unique maximal element 1̂ = W ∈A W . The arrangement is called essential if dim ∩A = 0. The characteristic polynomial of the arrangement A is X µ(x)tdim x . χA (t) = x∈L(A) 1.2 The subspace arrangement of a representation Fix a field k. Let G be a finite group and let ρ : G → GL(V ) be a krepresentation of G. For every g ∈ G and v ∈ V , we write the action as g · v = ρ(g)v for every g ∈ G and v ∈ V , where gv is the usual matrix-vector product. Following [4], for any v ∈ V and for any subgroup H ⊆ G we define the following objects. NG (H) Stabρ (v) VH VH := {g ∈ G | gH = Hg} ⊆ G := {g ∈ G | g · v = v} ⊆ G := {v ∈ V | H = Stabρ (v)} ⊆ V := {v ∈ V | H ⊆ Stabρ (v)} ⊆ V. In other words, NG (H) is the normalizer of the subgroup H in G; V H is the k-vector subspace of V of all points fixed (at least) by all elements of H; VH is the set of points that are fixed exactly by the elements of H. Definition 1.2. We say that a subgroup H is a stabilizer subgroup with respect to the representation ρ if VH is not empty. Definition 1.3. The arrangement of subspaces of the representation ρ is Aρ := {V H | H 6= {e} and H is a stabilizer subgroup with respect to ρ}. The set Aρ is ordered by reverse inclusion similar to L(A) in (1). It is useful to observe that V e = V and so the poset Aρ ∪ {V e } as a minimal unique element. Notice that every VH is the complement of the union of a set of subspaces inside V H. Definition 1.4. The poset of stabilizer subgroups of the representation ρ is Pρ := {H | H is a stabilizer subgroup with respect to ρ}, ordered by inclusion H1 ≤ H2 if H1 ⊆ H2 . 5 Then one has: Aρ ∪ {V e } ≃ L(Aρ ) ≃ Pρ The first isomorphism is proven essentially by definition and by observing that V e = V is the only missing subspace in Aρ . For the second isomorphism, consider the function Pρ → L(Aρ ) H 7→ V H . This is order-preserving and bijective. Indeed, if V H1 = V H2 for two stabilizer subgroups, then, by definition, they contain each other. Moreover, every intersection S in L(Aρ ) is of the form ∩H∈X V H , where X is a finite set of subgroups. ′ Thus, there exists a maximal H ′ containing all H in X, with S = V H . Since both posets are finite, then it is an isomorphism of posets. In particular, if ρ is a representation of a reflection group, then Pρ is a lattice. The group G acts on Pρ by conjugation. Definition 1.5. Define P̃ρ := Pρ/G, i.e., the set of all orbits under the G-action, ordered according to G·H1 ≤ G·H2 if H1 ≤ g · H2 in Pρ for some g ∈ G. It will be useful to denote by P̃ρ′ the poset of all all nontrivial stabilizer subgroups H. We close this section by recalling a definition due to Ekedahl [4]. Definition 1.6. Let Ñρ denote the poset of normal stabilizer subgroups of G ordered by reverse inclusion. The following is the characteristic polynomial of ρ: X X H (−1)dim f (tdim V − 1). ϕρ (t) = H∈Ñρ f ∈∆(P̃ρ ), max f =H Assumption. From now on we will assume that the representation ρ is faithful, i.e. Ker ρ = {e}. Moreover, notice that, given such a representation of G, we can always reduce to the case where dim VG = 0 and, when this happens, we say that this representations is essential (because Aρ is). If the representation is faithful and clear from the context, we write AG instead of Aρ and, similarly, for AG , PG , and P̃G . 1.3 Motivic classes of classifying stacks, Ekedahl’s formula The aim of this section is to briefly introduce the motivic classes of the classifying stack of a group and to present and to collect the necessary tools for this paper. As a general reference for a more comprehensive introduction we point to [10]. We begin by recalling that the Grothendieck ring of algebraic varieties K0 (Vark ) is the group generated by the isomorphism classes {X} of algebraic k-varieties X, under the relation {X} = {Y } + {X \ Y }, for all closed subvarieties Y of X. The ring structure of K0 (Vark ) is given by {X} · {Z} = {X × Z}. 6 Like algebraic varieties, algebraic stacks also have their own Grothendieck ring. In [5, Theorem 4.1] it is proved that K0 (Stackk ) = K0 (Vark )[L−1 , (Ln − 1)−1 , ∀n ∈ N], where the symbol L stands for the class of the affine line A1k . The classifying stack of the group G is usually defined as the stack quotient of the point Spec(k) by the group G, i.e. BG := [Spec(k)/G]. Its motivic class is denoted by {BG} ∈ K0 (Stackk ). Ekedahl in [4] proposed a combinatorial way to approach the computation of {BG}. Here we present his theorem in purely combinatorial terms, after a preparatory definition. Definition 1.7. Given a representation ρ : G → GL(V ) of a finite group G, we write b P̃ρ ) ∆ρ := ∆( and, for any f = {H1 ⊆ H2 ⊆ . . . ⊆ Hm } ∈ ∆ρ , dim f := |f | − 1, df := dim V Hm , and NG (f ) = ∩m i=1 NG (Hi ). Theorem 1.8 ([4, Theorem 3.4]). Let G be a finite group and let ρ : G → GL(V ) be a faithful and essential representation of dimension d. Then X {BG}(Ld − 1) = {Ve/G} + (−1)dim(f ) {BNG (f )}(Ldf − 1). f ∈∆ρ Remark 1.9. We point out that in the statement of Theorem 3.4 in [4] Ekedahl uses the term stabilizer flag instead of our chain for f . 1.4 Characteristic classes of subspace arrangements An arrangement of hyperplanes in kd is an arrangement of subspaces all whose elements have codimension 1. In this section we recall a result of Aluffi [1] linking the characteristic polynomial of a hyperplane arrangement to the characteristic class of its complement M (A). We reproduce its proof in order to show that it immediately generalizes to the case of subspace arrangements. Theorem 1.10 ([1, Theorem 2.1]). Let L be the class of the affine line in the Grothendieck ring of algebraic k-varieties, K0 (Vark ). Let A be an arrangement of hyperplanes in kn . Then, we have the following equality in K0 (Vark ): {M (A)} = χA (L). Proof. Consider the intersection lattice L(A) defined in (1 and pick an element x ∈ L(A). We set xo = x \ ∪y>x y, that is the complement in x of the union of all intersections inside x. Trivially {x} = Ldim x . Every P element y in L(A) is the disjoint union of all xo with Px > y, that is {y} = x≥y {xo }. Now, by Möbius inversion we have {y o } = x≥y µ(y, x){x}, and therefore we can compute X X µ(x)Ldim x = χA (L). µ(0̂, x){x} = {M (A)} = {0o } = x∈L(A) x≥0̂ 7 It is now apparent that Aluffi’s argument also proves the following stronger statement. Theorem 1.11. Let B denote a subspace arrangement in kd . Then, with notations as above, {M (B)} = χB (L) in K0 (Vark ).  2 Towards the conjecture We now focus on the case of finite groups which admit representations whose associated subspace arrangement is the set of intersections of an arrangement of hyperplanes. These are the so-called finite reflection groups. A detailed treatment of geometric and combinatorial aspects of hyperplane arrangements associated to reflection groups is [12, Chapter 6]. Here we only sketch some basics we’ll have use for. Let V be a k-vector space. Any g ∈ GL(V ) is called a reflection if it has finite order and it fixes a subspace of codimension 1 (which is then called the reflecting hyperplane of g). Following [12, Section 6.2], we call reflection group any finite group W ⊆ GL(V ) whose order is not divisible by char k and which is generated by reflections. The Chevalley-Shephard-Todd theorem [3, 14] shows that W is a finite reflection group exactly if and only if V /W is isomorphic to affine space. From now on when we talk about a finite reflection group W , we consider the obvious representation ρ given by the inclusion in GL(V ) and we write AW omitting reference to the representation. In particular, we are interested in the quotient arrangement in V ≃ V /W : AW /W := {X/W , X ∈ AW }. Even if V /W ≃ V , this is not anymore an arrangement of subspaces in V , but an arrangement of quotient varieties. We can now state a conjecture that aims at generalizing Theorem 1.11. Conjecture. If W is a finite complex reflection group, then, {Ve/W } = χAW /W (L). The statement of the conjecture would for instance follow from the existence of a faithful representation of the group W such that one of the two following conditions are satisfied for all nontrivial stabilizer subgroups H: A {V /NG (H)} = Ldim V H B V H/NG (H) ≃ Akdim V H H for all H ∈ P̃ ′ (G); for all H ∈ P̃ ′ (G). In what follows we are going to show that the proof of this conjecture will have immediate application in the study of the motivic class of the classifying stack of a finite group. It is worth to note that any of the above conditions will imply that the hypothesis of Theorem A are satisfied. 8 3 An inductive criterion In this section we are going to prove Theorem A. For this we need two technical results: the first one deals with the motivic class of the open complement Ve/G and the second one relates this result to the class of BG. Here and in what follows, µ denotes the Möbius function of P̃(G). Lemma 3.1. Let ρ : G → GL(V ) be a d-dimensional faithful representation of a finite group G. Then X H µ(H){V /NG (H)}. {Ve/G} = H∈P̃ρ Proof. We follow the same step of the proof in Theorem 1.10 and we have that X X H H µ(H){V /NG (H)}. µ({e}, H){V /NG (H)} = {Ve/G} = H≥{e} H∈P̃ρ Let us apply this to the computation of the class of BG. Proposition 3.2. Let ρ : G → GL(V ) be a d-dimensional faithful representation of a finite group G. Then X X X H H (−1)dim f {BNG (f )}(Ldim V −1). µ(H){V /NG (H)}+ {BG}(Ld −1) = H∈P̃ρ′ H∈P̃ρ f ∈∆ρ max f =H Proof. We use Theorem 1.8 and Proposition 3.1 and we obtain the following. X X H (−1)dim(f ) {BNG (f )}(Ldf − 1), µ(H){V /NG (H)} + {BG}(Ld − 1) = f ∈∆ρ H∈P̃ρ which readily implies the claim. The next theorem is an inductive triviality criterion. Together with the statement of the Conjecture presented in Section 2, it opens an avenue for inductive proofs of triviality of the motivic class of BG. We will explain more about this strategy in Section 4.1. Theorem A. Let ρ : G → GL(V ) be a d-dimensional faithful and essential representation of a finite group G such that (1) {BNG (f )} = 1 for all f ∈ ∆ρ and (2) {V /NG (H)} = Ldim V H H for all nontrivial stabilizer subgroups H ∈ P̃ ′ (G). Then, {BG}ϕρ (L) = ϕρ (L), where ϕρ is the characteristic polynomial of ρ (see Definition 1.6). 9 Proof. We start our computation by expanding the formula of Proposition 3.2: {BG}(Ld − 1) = Ld + µ(G) X H µ(H)Ldim V + H∈P̃ρ′ X + H∈P̃ρ′ X − H∈P̃ρ′ X f ∈∆ρ max f =H  X   H (−1)dim f {BNG (f )}Ldim V  (−1)dim f {BNG (f )}. f ∈∆ρ max f =H Now isolate on the right hand side all the terms containing the motivic class of BG: {BG}(Ld − 1) = + Ld + µ(G) X H µ(H)Ldim V H∈P̃ρ′ +  X   {BG}Ldim V H   H∈P̃ ′ ρ  +  X     ′ H∈P̃ ρ − X f ∈∆ρ max f =H NG (f )6=G X {BG} X X H∈P̃ρ′ − H∈P̃ρ′   (−1)dim f    X f ∈∆ρ max f =H NG (f )=G    H (−1)dim f {BNG (f )}Ldim V    X (−1)dim f f ∈∆ρ max f =H NG (f )=G f ∈∆ρ max f =H NG (f )6=G    (−1)dim f {BNG (f )}. Using assumption (1) we can continue the computation as follows. {BG}(Ld − 1) = + Ld + µ(G) X H µ(H)Ldim V H∈P̃ρ′ + X  dim V H {BG}L H∈P̃ρ′ 10      X f ∈∆ρ max f =H NG (f )=G  dim f (−1)      X +  X     f ∈∆ρ dim V H L H∈P̃ρ′ − X {BG} X X H∈P̃ρ′ Now we add and subtract X (−1)dim f (−1)dim f f ∈∆ρ max f =H NG (f )6=G X X X (−1) f ∈∆ρ max f =H NG (f )=G H∈P̃ρ′ max f =H, NG (f )=G and dim f max f =H NG (f )6=G H∈P̃ρ′ −   X H∈P̃ρ′ max f =H, NG (f )=G         (−1)dim f ,  H (−1)dim f Ldim V . Remark also that, for all x 6∈ {{e}, G}, by Theorem 1.1. X X (−1)dim f +1 = −µ(x). (−1)dim f = f ∈∆ρ max f =x ′ f ∈P̃ρ,<x Using this identity, we can rewrite as follows. {BG}(Ld − 1) = + Ld + µ(G) X H µ(H)Ldim V H∈P̃ρ′ +  X ({BG} − 1)L X µ(H)Ldim V X ({BG} − 1) X µ(H). dim V H H∈P̃ρ′ − H∈P̃ρ′ + + X dim f (−1) f ∈∆ρ max f =H NG (f )=G      H X f ∈∆ρ max f =H NG (f )=G H∈P̃ρ′       (−1)dim f  H∈P̃ρ′ The defining identity of the Möbius function implies µ(G) + µ(e) = 0. Thereby, we simplify as follows: {BG}(Ld − 1) = Ld − 1 11 P H∈P̃ρ′ µ(H) + +  X ({BG} − 1)L X ({BG} − 1) dim V H H∈P̃ρ′ + X f ∈∆ρ max f =H NG (f )=G H∈P̃ρ′      X f ∈∆ρ max f =H NG (f )=G  dim f (−1)       (−1)dim f . The claim now follows by regrouping terms and noticing that NG (f ) = G implies that all elements of f are normal subgroups. 4 The conjugacy classes stabilizer poset for W Let us now focus on finite reflection groups. The following is a useful fact in order to study P̃W . Proposition 4.1. If W is a finite reflection group in GL(V ), then N is a normal stabilizer subgroup if and only if W/N is a reflection group. Proof. Let N be a normal subgroup of W . The subspace V N fixed by N is an element of the lattice of intersections of AW , thus V N = ∩ni=1 Ri where Ri are the reflecting hyperplanes of the reflections ri ∈ N . Call t1 , . . . , ts the reflections that are not in N and Tj the reflecting hyperplane of tj . If N is a normal stabilizer subgroup, then V N is a faithful representation of W/N by Lemma 3.3 in [4]. Moreover, W/N is generated by τj = tj + N . Each τj fixes V N ∩ Tj , a subspace of codimension one in V N . For the reverse implication assume that W/N is generated by the reflections γ1 , . . . , γk but N is not a normal stabilizer subgroup. Call N ′ the stabilizer ′ ′ subgroup N ⊆ N ′ such that V N = V N . The G-orbit of V N consists of the H ′ ′ subspaces V with H in the same conjugacy class of N . If N is not a normal subgroup then this orbit consists of at least two distinct subspaces. But this ′ goes against the fact that V N = V N and the orbit of V N consists only of the N points of V because N is normal. Thus N ′ needs to be normal. Since N ′ is ′ also a stabilizer subgroup, then (by the proof of the first implication) V N is a faithful representation of the reflection group W/N ′ ≃ W/N/(N ′/N ). We know that V N = ∩ni=1 Ri because W/N is generated by reflections, and similarly deduce ′ that V N is the intersection of ∩ni=1 Ri with certain Tj s (at least one), and this is not possible. Therefore N ′ = N . So we can compute the poset of conjugacy classes for a complex reflection group. Proposition 4.2. If W is an irreducible finite reflection group in GL(V ), then ÑW = P̃W ∩ NW = {e, W }. Proof. In order to prove the statement, we observe that if N is a non trivial normal subgroup of W , then because of Proposition 4.1, the representation decomposes in the sum of two representations V = V N ⊕ (V N )⊥ . This is against the fact that W is an irreducible reflection group. 12 Hence, under the hypothesis of Theorem A, one can compute the main ingredient for the computation of BW . Theorem B. If W is a d-dimensional irreducible finite reflection group in GL(V ) that fulfills the hypothesis of Theorem A, then ϕW (t) = td − 1. Proof. The proof of the results comes directly by combining Proposition 4.2 and Theorem A. 4.1 The reduction to the conjecture We are ready to show that if the conjecture holds, the motivic class of the classifying stack of BW is trivial in the Grothendieck group of algebraic stacks. Theorem C. If W is a finite reflection group such that Conjecture holds, then {BW } = 1 in K0 (Stackk ). Proof. Every reflection group is product of irreducible ones and we observe that B(W1 × W2 ) = BW1 × BW2 and so {B(W1 × W2 )} = {BW1 }{BW2 }. Hence we assume without loss of generality that W is an irreducible complex reflection group. One then easily proves the statement for small (inclusion-minimal) reflection groups and proceeds by using the induction step as in the previous computations. Then {BW }pW (L) = pW (L) and so by Proposition 4.2 {BW }(Ld − 1) = (Ld − 1). The claim now readily follows since the polynomial Ld − 1 is clearly invertible in K0 (Stackk ) = K0 (Vark )[L−1 , (Ln − 1)−1 ]. References [1] P. Aluffi, Grothendieck classes and Chern classes of hyperplane arrangements, Int. Math. Res. Not. IMRN, (2013), pp. 1873–1900. [2] F. A. Bogomolov, The Brauer group of quotient spaces of linear representations, Izv. Akad. Nauk SSSR Ser. Mat., 51 (1987), pp. 485–516, 688. [3] C. Chevalley, Invariants of finite groups generated by reflections, Amer. J. Math., 77 (1955), pp. 778–782. [4] T. Ekedahl, A geometric invariant of a finite group. arXiv:0903.3148v1, 2009. [5] , The Grothendieck group of algebraic stacks. arXiv:0903.3143v2, 2009. [6] H. Esnault and E. Viehweg, On a rationality question in the Grothendieck ring of varieties, Acta Math. Vietnam., 35 (2010), pp. 31– 41. [7] A. Hoshi, M.-C. Kang, and B. E. Kunyavskii, Noether’s problem and unramified Brauer groups, Asian J. Math., 17 (2013), pp. 689–713. 13 [8] E. Looijenga, Motivic measures, Astérisque, (2002), pp. 267–297. Séminaire Bourbaki, Vol. 1999/2000. [9] I. Martino, The Ekedahl invariants for finite groups, J. Pure Appl. Algebra, 220 (2016), pp. 1294–1309. [10] , Introduction to the Ekedahl invariants, Math. Scand., 120 (2017), pp. 211–224. [11] E. Noether, Gleichungen mit vorgeschriebener Gruppe, Math. Ann., 78 (1917), pp. 221–229. [12] P. Orlik and H. Terao, Arrangements of hyperplanes, vol. 300 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], Springer-Verlag, Berlin, 1992. [13] D. J. Saltman, Noether’s problem over an algebraically closed field, Invent. Math., 77 (1984), pp. 71–84. [14] G. C. Shephard and J. A. Todd, Finite unitary reflection groups, Canadian J. Math., 6 (1954), pp. 274–304. [15] R. P. Stanley, Enumerative combinatorics. Volume 1, vol. 49 of Cambridge Studies in Advanced Mathematics, Cambridge University Press, Cambridge, second ed., 2012. [16] R. G. Swan, Invariant rational functions and a problem of Steenrod, Invent. Math., 7 (1969), pp. 148–158. [17] B. Totaro, The motive of a classifying space. arXiv:1407.1366, 2014. Emanuele Delucchi Department of Mathematics, University of Fribourg, 1700 Fribourg, Switzerland. E-mail address: [email protected] Ivan Martino Department of Mathematics, Northeastern University, Boston, MA 02115, USA. E-mail address: [email protected] 14
4
Gradient Flows in Uncertainty Propagation and Filtering of Linear Gaussian Systems arXiv:1704.00102v4 [math.OC] 29 Sep 2017 Abhishek Halder, and Tryphon T. Georgiou University of California, Irvine Abstract— The purpose of this work is mostly expository and aims to elucidate the Jordan-Kinderlehrer-Otto (JKO) scheme for uncertainty propagation, and a variant, the LaugesenMehta-Meyn-Raginsky (LMMR) scheme for filtering. We point out that these variational schemes can be understood as proximal operators in the space of density functions, realizing gradient flows. These schemes hold the promise of leading to efficient ways for solving the Fokker-Planck equation as well as the equations of non-linear filtering. Our aim in this paper is to develop in detail the underlying ideas in the setting of linear stochastic systems with Gaussian noise and recover known results. I. I NTRODUCTION n Consider the gradient flow dx dt = −∇ψ(x) in R , where ∇ is the gradient (w.r.t. the Euclidean metric) of a function ψ(x), and consider the discretization xk = xk−1 − h∇ψ(xk−1 ), for k ∈ N. was to show that the minimizer of (2) approximates the solution ρ(x, t) of the heat equation ∂ρ(x, t) = ∆ρ(x, t), with ρ(x, 0) = ρ0 (x), ∂t in the sense that ̺k (x, h) → ρ(x, t = kh), as h ↓ 0. Thus, (2) establishes the remarkable result that the heat equation is the gradient descent flow of the (negative) entropy integral with respect to the Wasserstein metric. An analogous JKO-like scheme was introduced recently in Laugesen et al. [9] for the measurement update-step in continuous-time filtering. More specifically, let us consider the general system of Itô stochastic differential equations (SDE’s) p (4a) dx(t) = −∇U (x) dt + 2β −1 dw(t), dz(t) = c(x(t), t) dt + dv(t), (4b) (1) where x ∈ Rn , z ∈ Rm , β > 0, U (·) is a potential, the process and measurement noise processes w(t) and v(t) are Wiener and satisfy E [dwi dwj ] = Qij dt ∀ i, j = 1, . . . , n and E [dvi dvj ] = Rij dt ∀ i, j = 1, . . . , m, with Q, R ≻ 0, respectively. Then x(t) and z(t) represent state and sensor measurements at time t. Further, as usual, v(t) is assumed to be independent of w(t) and independent of the initial state x(0). Given the history of noise corrupted sensor data up to time t, the filtering problem requires computing the posterior probability distribution that obeys the Kushner-Stratonovich stochastic PDE [19]–[21]. the solution, which depends on the choice of the step size h, satisfies xk (h) → x(t = kh), as h → 0. For the special case of trivial state dynamics, i.e., dx = 0, and R the identity, Laugesen et al. [9] introduced  − ̺+ k (x, h) = arg inf {DKL ̺k̺k + hΦ(̺)}, k ∈ N, (5) As is well known in finite-dimensional optimization, 1 xk = arg min{ kx − (xk−1 − h∇ψ(xk−1 ))k2 } 2 x 1 = arg min kx − xk−1 k2 + hψ(x) + o(h). 2 x By recursively evaluating the proximal operator [1], [2] xk k·k = proxhψ (xk−1 ) 1 = arg min{ kx − xk−1 k2 + hψ(x)}, 2 x The Jordan-Kinderlehrer-Otto (JKO) scheme, introduced in [3], is a similar recursion in the infinite-dimensional space of density functions with respect to the Wasserstein geometry [4], namely, ̺k (x, h) = arg min ̺ 1 2 W (̺, ̺k−1 ) + hS(̺), k ∈ N, (2) 2 2 where W2 (·, ·) denotes the Wasserstein-2 distance between two (probability) density functions, Z ̺(x) log(̺(x))dx (3) S(̺) := Rn is the negative differential entropy functional, and dx is the volume element. In other words, (2) can be viewed as the 2 proximal operation proxW hS (̺k−1 ). The main result in [3] ̺∈D2 with 1 E̺ {(yk − c(x))⊤ R−1 (yk − c(x))}, (6) 2 where yk is the noisy measurement in discrete-time defined via yk := h1 ∆zk , ∆zk := zk − zk−1 , and {zk−1 }k∈N the sequence of samples of z(t) at {tk−1 }k∈N for tk−1 := (k − 1)h. Laugesen et al. [9] proved that the LMMR equation (5) approximates the solution of h ⊤ dρ+ (x(t), t) = c(x(t), t) − Eρ+ {c(x(t), t)} R−1  dz(t) − Eρ+ {c(x(t), t)}dt ρ+ (x(t), t), (7) Φ(̺) := i.e., of the Kushner-Stratonovich PDE corresponding to + dx = 0, in the sense that ̺+ k (x, h) ⇀ ρ (x(t), t) over t ∈ [(k − 1)h, kh), as h ↓ 0. Thus, they showed that in this special case, the Kushner-Stratonovich PDE is the gradient descent of functional Φ(·) with respect to DKL , i.e., − KL computed by proxD hΦ (̺k ). The purpose of the present paper is to develop this circle of ideas, namely, that both uncertainty propagation and filtering can be viewed as gradient flows in the special case of linear stochastic systems with Gaussian noise. In fact, we consider the general case of the linear stochastic system dx(t) = Ax(t) dt + B dw(t), (8) where w(t) is a Wiener process as before, though possibly not of the same dimension as x. We suppose that the uncertain initial condition x(0) has a known Gaussian PDF, the matrix A is Hurwitz, and that the diffusion matrix B is such that (A, B) is a controllable pair. For this, we recover the well-known propagation equations (see for example [6, Ch. 3.6]) for the mean and covariance of the state x(t) out of the JKO-scheme via a two-step optimization. The applicability of the JKO-scheme to (8) is not immediately obvious since the development in [3] requires the state dynamics to be in the canonical form (4a) with the drift being a gradient and the diffusion coefficient being a positive scalar. We further show that this two-step optimization procedure that we introduce, can be used to derive the Kalman-Bucy filter from a generalized version of the LMMR equation (5). We remark that variational schemes for estimator/observer design based on gradient flows can also be seen as regularized dynamic inversion in the spirit of [23]. Notation Throughout we use bold-faced upper-case letters for matrices, and bold-faced lower case letters for vectors. The notation I stands for identity matrix of appropriate dimension, we use tr(·) and det(·) to respectively denote the trace and determinant of a matrix, and the symbols ∇ and △ denote the gradient and Laplacian operators, respectively. We denote the space of probability R density functions (PDFs) on Rn by D := {ρ : ρ ≥ 0, Rn ρ = 1}, by D2 := {ρ ∈ R D | Rn x⊤ x ρ(x)dx < ∞} the space of PDFs with finite second moments, by Dµ,P denote the space of PDFs which share the R same mean vector µ and same covariance matrix P := Rn (x − µ)(x − µ)⊤ ρ(x)dx. Likewise, let Dµ,τ denote the space of PDFs which have the same mean µ and same trace of covariance τ := tr(P ) > 0. Clearly, Dµ,P ⊂ Dµ,τ ⊂ D2 ⊂ D. We use the symbol N (µ, P ) to denote a multivariate Gaussian PDF with mean µ, and covariance P . The notation x ∼ ρ means that the random vector x has PDF ρ; and E {·} denotes the expectation operator while, when the probability density is to be specified, Eρ {·} := R (·)ρ(x)dx. n R II. JKO S CHEME IN G ENERAL We now discuss in some detail the JKO scheme for the case of the diffusion process in (4a), and the corresponding Fokker-Planck equation [7] ∂ρ = ∇ · (∇U (x)ρ) + β −1 △ρ, ρ(x, 0) = ρ0 (x). (9) ∂t To this end we first introduce the Wasserstein metric, the free energy, and the Kullback-Leibler divergence. The Wasserstein-2 distance W2 (ρ1 , ρ2 ) between a pair of PDFs ρ1 (x), ρ2 (y) ∈ D (or, even between probability measures, in general), supported on X , Y ⊆ Rn , is   12 Z 2 (10) W2 (ρ1 , ρ2 ) := inf kx − yk2 dσ(x, y) dσ∈Π(ρ1 ,ρ2 ) X ×Y where Π (ρ1 , ρ2 ) is a probability measure on the product space X × Y having finite second moments and marginals ρ1 , ρ2 , respectively. It is well known that W2 : D × D 7→ [0, ∞) is a metric [4, p. 208]. Further, its square W22 (ρ1 , ρ2 ) represents the smallest amount of “work” needed to “morph” ρ1 into ρ2 [5]. The infimum is achieved over a space of measures, and under mild assumptions, the minimizing dσ has support on the graph of the optimal “transportation map” T : X 7→ Y that pushes ρ1 to ρ2 . Alternatively, one may view the optimization problem in (10) as seeking the joint distribution of two random vectors x and y, distributed according to  ρ1 and ρ2 respectively, that minimizes the variance E kx − yk22 . Another important notion of distance that enters into our discussion, which however is not a metric, is the KullbackLeibler divergence (also known as relative entropy) between PDFs or positive Rmeasures in general. This is given dρ1 dρ1 1 by DKL (dρ1 kdρ2 ) := ( dρ dρ2 ) log( dρ2 )dρ2 where dρ2 denotes the Radon-Nikodym derivative. When1 dρi = ρi (x)dx, i ∈ {1, 2}, are absolutely continuous with respect to the Lebesgue measure, then Z ρ1 (x) ρ1 (x) log DKL (dρ1 kdρ2 ) = dx. ρ 2 (x) Rn Gradient flow requires an energy functional, which we R denote by E (ρ) := U (x)ρ(x)dx, where U (·) is the potential energy. Then, a stochastically driven gradient flow is modeled by the Itô SDE (4a) and the Fokker-Planck equation (9) for the corresponding PDF as before. The stationary solution of (9) is the Gibbs distribution ρ∞R(x) = Z1 e−βU(x) , where the normalization constant Z := Rn e−βU(x) dx is known as the partition function. The distance to equilibrium which, in a way, quantifies the amount of work that the system can deliver, is captured by the so-called free energy functional F (ρ), defined as the sum of the energy functional E (ρ) and the negative differential entropy S (ρ) given in (3), that is, F (ρ) := E (ρ) + β −1 S (ρ)   = β −1 DKL ρke−βU(x) . (11a) (11b) 1 Here we use a slight abuse of notation in that we denote both, the measure and the density with the same symbol. For the case of (4a), the JKO scheme becomes parameterized subset of D2 in such a way that when we optimize the functionals 21 W 2 (̺, ̺0 ) and hF (̺) individually 1 ̺k (x, h) = arg inf { W22 (̺, ̺k−1 ) + h F (̺)}, k ∈ N, (12) over this chosen subspace, the arginfs (which are achieved) 2 ̺∈D2 of the two individual optimization problems match. Hence, for step-size h > 0, and initialized by a given ̺0 (satisfying the sum of the two has the same arginf over the chosen F (̺0 ) < ∞). For U (x) ≡ 0, (12) reduces to (2). Solving subspace. In the second step, we optimize over the subspace (12) results in a sequence of PDFs {̺k (x, h)}k∈N in D2 . parameters. Our choice for the parameterized set of densities It can be shown following [3] that ̺k (x, h) ⇀ ρ (x(t), t) is Dµ,P ⊂ D2 , i.e., the PDFs with given mean-covariance weakly in L1 (Rn ) for t ∈ [(k − 1)h, kh), k ∈ N, as h ↓ 0. pair (µ, P ); the choice of the optimal pair is to be decided in the second optimization step. III. JKO S CHEME FOR LINEAR G AUSSIAN SYSTEMS The development below requires several technical lemmas that are collected in the Appendix. We now develop and solve the JKO scheme for the linear Gaussian system in (8) with ρ0 = N (µ0 , P0 ) and Q ≡ I, without loss of generality. Therefore, we are concerned with the linear Fokker-Planck (Kolmogorov’s forward) PDE n  ∂ρ ∂2 1 X = −∇ · (ρAx) + ρBQB ⊤ ij . (13) ∂t 2 i,j=1 ∂xi ∂xj Under the stated assumptions, it is well-known that (13) admits a steady-state, which is Gaussian with mean zero and covariance P∞ ≻ 0 that uniquely solves the algebraic Lyapunov equation AP∞ + P∞ A⊤ + BQB ⊤ = 0. Also, starting from ρ0 (x) = N (µ0 , P0 ), the transient is ρ(x(t), t) = N (µ(t), P (t)) where the µ(t) and P (t) satisfy the following ordinary differential equations (ODEs) [6, Ch. 3.6] µ̇(t) = Aµ(t), µ(0) = µ0 , (14a) Ṗ (t) = AP (t) + P (t)A⊤ + BQB ⊤ , P (0) = P0 . (14b) Below, we recover these equations using the JKO scheme. First, in Section III-A, wep explain how this is done when A is symmetric and B ≡ 2β −1 I, β > 0, in which case, Ax = −∇U (x) for a suitable potential. The general case, in Section III-B, is more involved and requires to view the drift as the gradient of a time-varying potential. p A. The case where A is symmetric and B ≡ 2β −1 I p 2β −1 I, the pair (A, B) is controllable. Since B ≡ Further, since A is Hurwitz and symmetric, Γ := −A ≻ 0, and utilizing the potential 1 ⊤ x Γx ≥ 0, 2 we can cast (8) in the canonical form (4a). Then,  1 ⊤ E(̺) := E[U (x)] = µ Γµ + tr (ΓP ) , 2 where P is the covariance of x. Notice that E(·) depends on the PDF of x only via its mean and covariance. U (x) := To carry out the optimization (12) over D2 , we adopt a two-step strategy. Our approach is motivated by the observation that the objective function in (12) is a sum of two functionals. In the first step, we choose a suitable 1) Optimizing over Dµ,P : Given ̺0 ≡ ρ0 = N (µ0 , P0 ), and a µ and P ≻ 0, we first determine 1 ̺1 = arg inf { W22 (̺, N (µ0 , P0 )) + h F (̺)}. (15) ̺∈Dµ,P 2 1 From Lemma 2 we see that arg inf W22 (̺, N (µ0 , P0 )) 2 ̺∈Dµ,P is achieved by ̺ = N (µ, P ) (uniquely). From Lemma 3, since U (x) = 21 x⊤ Γx, we also know that arg inf h F (̺) is ̺∈Dµ,P achieved by ̺ = N (µ, P ) (uniquely). Thus, ̺1 = N (µ, P ). The infimal value in (15) is now the sum of the two infima, "  1 !#  2 1 1 h 1 2 2 2 + k µ − µ0 k2 + tr P + P0 − 2 P0 P P0 2 2β h i −n − n log(2π) − log det(P ) + βµ⊤ Γµ + β tr (ΓP ) . (16) 2) Optimizing over (µ, P ): Equating the gradient of (16) w.r.t. µ to zero, results µ = φ(µ0 ) := (I + hΓ)−1 µ0 . The recursion µk = φ(µk−1 ), up to first order in h, becomes µk = (I − hΓ) µk−1 + O(h2 ). (17) We see that this recursion coincides with the solution of (14a) in the “small h” limit. Specifically, µ(t) = eAt µ0 ⇒ k µk := µ(t = kh) = eAh µ0 ⇒ µk = eAh µk−1 = (I + hA) µk−1 + O(h2 ), which is same as (17) since Γ := −A. Thus, we have recovered (14a) using discrete timestepping via JKO scheme in the small step-size limit. Setting the gradient of (16) w.r.t. P to zero (using Lemma 4), we obtain  1 1 1 h −1 −1 2 P02 − P −1 + hΓ = 0. (18) I − P02 P0 2 P −1 P0 2 β − 12 By pre and post multiplying both sides of (18) with P0 1  −1 2 −1 =: Z, we arrive at and letting P0 2 P −1 P0 2 , β β −1 −1 Z − P0 2 (I + hΓ)P0 2 = 0, h h which admits the unique closed-form solution [16, p. 304]   21 ! h − 12 β − 12 −I + I + 4 P0 (I + hΓ) P0 . (19) Z= 2h β Z2 + Expanding (19), we obtain   β 1 h −I + I + 4 P0 (I + hΓ) P0 + 2h 2 β  # 1 1 2 1 − 1 16h −1 − −1 3 2 2 2 2 (I + hΓ) P0 (I + hΓ) P0 + O(h ) P 2! β2 0   h −1 −1 = P0 2 I + hΓ − P0−1 P0 2 + O(h2 ). (20) β Z= −1 2 −1 2 1  −1 2 −1 back into (20), squarSubstituting Z = P0 2 P −1 P0 2 ing, and rearranging, we get that   −1  −1  1 1 P = I + h Γ − P0−1 P0 I + h Γ − P0−1 +O(h2 ) β β       1 1 P0 I − h Γ − P0−1 + O(h2 ) = I − h Γ − P0−1 β β = Ψ(P0 ) + O(h2 ),  where Ψ(P0 ) := P0 + h −ΓP0 − P0 Γ + 2β −1 I . Set the matrix-valued recursion Pk = Ψ (Pk−1 ), where  Ψ (Pk−1 ) := Pk−1 + h −ΓP0 − P0 Γ + 2β −1 I + O(h2 ). (21) To show that (21) indeed recovers (14b), p first notice that substituting A = A⊤ = −Γ and B = 2β −1 I in (14b) results the Lyapunov differential equation Ṗ (t) = −ΓP (t) − P (t)Γ + 2β −1 I subject to P (0) = P0 , which can be solved via the method of integrating factor as  1 (22) P (t) = Γ−1 I − e−2Γt + e−Γt P0 e−Γt . β Thus, for t = kh, (22) gives  Pk := P (kh) = β −1 Γ−1 I − e−2Γkh + e−Γkh P0 e−Γkh 1) Equipartition of energy coordinate transformation: Consider the stationary covariance P∞ associated with √ (A, 2B) that satisfies AP∞ + P∞ A⊤ + 2BB ⊤ = 0. For a system at a stationary distribution, we define the thermodynamic temperature θ as the average amount of “energy” per degree of freedom, that is, 1 θ := tr(P∞ ), n and, thereby, β := θ−1 the inverse temperature. By pre and −1 post multiplying (23) with P∞ 2 , and rescaling by θ so as to preserve the temperature in the new coordinates, we get √ √ Aep θI + θIA⊤ 2θBep ( 2θBep )⊤ = 0, (24) ep + Pk − Pk−1 = 2β −1 hI − hΓP0 − hP0 Γ + O(h2 ), which is same as (21) derived from JKO scheme. Thus, we have recovered the covariance evolution through FokkerPlanck dynamics using the time-stepping procedure via JKO scheme in the small step-size limit. −1 1 −1 2 , Bep := P∞ 2 B, while where Aep := P∞ 2 AP∞ the stationary covariance θI reflects equipartition of energy.√The equipartition√of energy co-ordinate transformation (A, 2B) 7→ (Aep , 2θBep ), corresponds to the state√ −1 transformation x 7→ xep := θP∞ 2 x, leading to √ dxep (t) = Aep xep (t) dt + 2θBep dw(t). (25) This settles how β is to be defined and interpreted in the context of JKO scheme (11) and (12). On the other hand, Aep being similar to A, is guaranteed to be Hurwitz but not symmetric, unless A was symmetric to begin with. Thus, it remains for us to “symmetrize” Aep and define a suitable potential energy U (·) as needed in (12). We do this next. 2) Symmetrization transformation: We introduce the time-varying transformation = 2β −1 khI + (P0 − khΓP0 − khP0 Γ) + O(h2 ). Replacing k with k−1 in the latter yields a similar expression for Pk−1 . Then, subtracting these expressions for Pk−1 from Pk we obtain that skew where Askew ep xep 7→ xsym := e−Aep := 1 2 (Aep skew t t xep A⊤ ep ). − This results in √ √ (Aep , 2θBep ) 7→ (F (t), 2θG(t)), with F (t) := e−Aep skew Aep Asym ep e where, similarly, Asym := ep satisfies t skew , and G(t) := e−Aep 1 2 (Aep dxsym (t) = F (t)xsym (t) dt + B. The case of Hurwitz A and controllable (A, B) √ We scale B into 2B without loss of generality, and take as initial PDF ̺0 ≡ ρ0 = N (µ0 , P0 ). Since we allow any Hurwitz√(not necessarily symmetric) A, and any B that makes (A, 2B) a controllable pair, it is not apparent if and how one can express (8) in the canonical form (4a). The main impediment in doing so, is twofold: (1) how to define the potential energy U (x), and (2) how to interpret and define the parameter β in the generic case. In the following, we show that by two successive co-ordinate transformations, system (8) can indeed be put in the form (4a). Similar transformations have been mentioned in [17, p. 1464], [18] in a different context. (23) t Bep , + A⊤ ep ). Thus, xsym (t) √ 2θG(t) dw(t). (26) Notice that F (t) is symmetric for all t. Furthermore, observe that the new coordinates xsym is simply obtained by a (time-varying) orthogonal transformation of the equipartition of energy coordinates xep . Hence the stationary covariance of xsym is identical to that of xep , which is θI (from Section III-B.1). What happens is that the covariance of xsym (t) tends to the same steady state value as t → ∞ in spite of the fact that (26) has time varying coefficients. To see this ⊤ in different way, we can rewrite (24) as Bep Bep = −Asym ep , and deduce that skew G(t)G(t)⊤ = e−Aep skew ⊤ Aep t Bep Bep e = −F (t), √ √ ⇒ F (t)θI + θIF (t) + 2θG(t)( 2θG(t))⊤ = 0. t (27) The symmetrization xep 7→ xsym leaves the stationary covariance θI invariant. This guarantees that the definition of temperature θ stays intact. The coordinate transformations described above are summarized in Table I. 3) Recovery of the Fokker-Planck solution: We are now ready to apply the JKO scheme to√ the generic stochastic linear system dx(t) = Ax(t) dt + 2B dw(t), with initial PDF ρ(x(0), 0) = N (µ0 , P0 ). To this end, we carry out a computation akin to the two steps in Section III-A, for the transformed SDE (26) in the symmetrized coordinate xsym . From there on, we recover the Fokker-Planck solution in the original coordinate x. Since x 7→ xsym is a linear transformation, it follows that xsym ∼ N (µsym , Psym ) whenever x ∼ N (µ, P ). Thus, carrying out the first step of the optimization in xsym coordinate, we get an expression similar to (16) wherein (µ, P ) is to be replaced by (µsym , Psym ), and (µ0 , P0 ) is to be replaced by (µsym0 , Psym0 ). To carry out the second ⊤ step of optimization, notice that Asym = −Bep Bep  0, ep skew skew −Aep t sym Aep t and consequently F (t) = e Aep e  0. Thus, considering the time-varying potential 1 U (xsym ) := − x⊤ F (t)xsym ≥ 0, 2 sym and setting the partial derivative of the infimal value from first stage of the optimization w.r.t. µsym to zero, results the recursion µsymk = (I − hF (kh))−1 µsymk−1 . Recalling skew √ −1 that xsym = e−Aep t θP∞ 2 x, we arrive at a recursion in original coordinate: 1 skew 2 Aep µk = P∞ e kh skew {(I − hF (kh))−1 eAep e −Askew kh ep −1 P∞ 2 h } µk−1 . (28) By series expansion and collecting linear terms in h, one can verify the following: 2 (I − hF (kh))−1 = I + hAsym ep + O(h ), −1 Askew h ep (I − hF (kh)) e Askew kh ep e where C ∈ Rm×n , and ρ0 = N (µ0 , P0 ). The conditional PDF ρ+ (x(t), t) = N (µ+ (t), P + (t)), given measurements up to time t, is well-known and given by the Kalman-Bucy filter [22]  dµ+ (t) = Aµ+ (t)dt + K(t) dz(t) − Cµ+ (t)dt , (31a) Ṗ +(t) = AP +(t)+P +(t)A⊤+2BB ⊤−K(t)RK(t)⊤ (31b) that specifies a vector SDE and a matrix ODE, respectively, for the conditional mean µ+ (t) and covariance P + (t). The initial conditions are µ+ (0) = µ0 , P + (0) = P0 , and K(t) := P + (t)C ⊤ R−1 is the so-called Kalman gain. In the sequel, we demonstrate that by applying the twostep optimization strategy we used before in Section III, we can recover the Kalman-Bucy filter from LMMR-equation (5) for the linear Gaussian case as the h ↓ 0 limit. A. LMMR gradient descent scheme Once again we proceed with carrying out the following two optimization steps. First, we optimize (5) over Dµ,P , and then optimize the minimum value over the choice of parameters (µ, P ). − − 1) Optimizing over Dµ,P : Consider ̺− k = N (µk , Pk ) to be our prior for the state PDF at time t = kh. Observe that inf ̺∈Dµ,P −  DKL ̺kN (µ− k , Pk ) = inf ̺∈Dµ,P −E̺ {log e F ILTERING dz(t) = Cx(t) dt + dv(t), = I + hAep + O(h ), e FOR In this section, we focus on the linear Gaussian filtering problem, with process model and measurement models √ dx(t) = Ax(t)dt + 2Bdw(t), 2 −1 Askew h −Askew kh ep ep (I − hF (kh)) IV. JKO- LIKE S CHEMES Z ̺(x) log ̺(x)dx Rn  − N (µ− k , Pk )} , (32) and that 2 = I + hAep + O(h ). −1 1h ⊤ (µ − µ− Pk− (µ − µ− k) k ) 2  1  + tr P (Pk− )−1 − log (2π)n det(Pk− ) 2 − E̺ {log N (µ− k , Pk )} = − Hence (28) yields   1 −1 2 Aep P∞ 2 µk−1 + O(h2 ) µk = I + hP∞ = (I + hA) µk−1 + O(h2 ), − 21 (29) 1 2 where the last equality follows from Aep := P∞ AP∞ . hA 2 Since µ̇ = Aµ and e = I + hA + O(h ), in the small h limit, equation (29) thus recovers (14a), as in Section III-A. A similar straightforward but tedious computation leads to the matrix recursion Pk − Pk−1 = h(APk−1 + Pk−1 A⊤ + 2BB ⊤ ) + O(h2 ), (30) which in the limit h ↓ 0, is indeed a first-order approximation of the Lyapunov equation for the original system. We omit the details for brevity. remains invariant for all ̺ ∈ Dµ,P . Therefore, the arginf in (32) is achieved by the Gaussian PDF N (µ, P ) (i.e., the maximum entropy PDF with given mean-covariance), and − the infimal value is precisely DKL (N (µ, P )kN (µ− k , Pk )). On the other hand, notice that 1h 1 (yk − Cµ)⊤ E̺ {(yk − Cx)⊤ R−1 (yk − Cx)} = 2 2  i R−1 (yk − Cµ) + tr C ⊤ R−1 CP = constant (33) inf ̺∈Dµ,P ❤❤❤ → ❤❤❤Coordinate ❤❤❤ Attribute ↓ ❤❤ Original Equipartition of energy Symmetrization State vector x xep xsym (A, System matrices Stationary covariance √ 2B) P∞ (Aep , √ 2θBep ) θI (F (t), √ 2θG(t)) θI TABLE I: Summary of the coordinate transformations for Section III-B. as well over Dµ,P . Hence   − arg inf DKL ̺kN (µ− k , Pk ) B. Alternative JKO-like schemes for filtering ̺∈Dµ,P +  h E̺ {(yk − Cx)⊤ R−1 (yk − Cx)} = N (µ, P ), 2 and the corresponding infimum value is  1 − −1 ⊤ tr (Pk− )−1 P + (µ− (µ− k − µ) (Pk ) k − µ) − n− 2  h (yk − Cµ)⊤ R−1 (yk − Cµ) log det (Pk− )−1 P + 2  + tr C ⊤ R−1 CP . (34) 2) Optimizing over (µ, P ): Equating the partial derivative of (34) w.r.t. µ to zero, and setting µ ≡ µ+ k in the resulting algebraic equation, we get   + ⊤ −1 (Pk− )−1 µ− yk − Cµ+ k − µk + hC R k = 0,  − − ⊤ −1 (35) yk − Cµ+ ⇒µ+ k . k = µk + hPk C R On the other hand, equating the partial derivative of (34) w.r.t. P to zero, and then setting P ≡ Pk+ in the resulting algebraic equation, we get  (Pk+ )−1 = (Pk− )−1 + hC ⊤ R−1 C ⇒ Pk+ = I + hPk− C ⊤ −1 − R−1 C Pk = Pk− − hPk− C ⊤ R−1 CPk− + O(h2 ). (36) With ∆zk = yk h, as in Section I, 2 µ+ (t)dt = µ+ k h + O(h ), and from (29) that + 2 µ− k = (I + hA)µk−1 + O(h ). These, together with (36), allow us to simplify (35) as  2 + + + ⊤ −1 µ+ ∆zk − hCµ+ k −µk−1 = hAµk−1 + Pk C R k + O(h ), which in the limit h ↓ 0, leads to (31a). Substituting (30) into (36) we arrive at + + −hPk−1 C ⊤ R−1 CPk−1 + O(h2 ). In the limit h ↓ 0, (37) recovers (31b). ̺+ k (x, h) = arg inf ̺∈D2  1 2 W2 ̺, ̺− + hΦ(̺), k 2 k ∈ N, (38) where the functional Φ(·) is as in (6). The template of the two-step optimization again applies and, specializing to the linear Gaussian case, the solution of (38) in the h ↓ 0 limit, is N (µ+ (t), P + (t)), given by  dµ+ (t) = Aµ+ (t)dt + L dz(t) − Cµ+ (t)dt , (39a) Ṗ + (t)=(A − LC)P + (t)+P + (t)(A − LC)⊤+2BB ⊤(39b) where L := C ⊤ R−1 , and µ+ (0) = µ0 , P + (0) = P0 . This follows by noticing from Sections III-A.1 and IV-A.1 that    1 2 − − W ̺, N (µk , Pk + hΦ(̺) = N (µ, P ), arg inf 2 2 ̺∈Dµ,P where the infimum value is    1   1 − 21 2 − − 12 2 P (P ) k µ−µ− k + tr P + P −2 (P ) k k 2 k k 2  h + (yk − Cµ)⊤ R−1 (yk − Cµ)+tr C ⊤ R−1 CP .(40) 2 dz(t) = ∆zk + O(h2 ), + + + Pk+ − Pk−1 = h(APk−1 + Pk−1 A⊤ + 2BB ⊤ ) The ideas in the LMMR-scheme suggest the possibility of alternative variational schemes to approximate stochastic estimators. Such a viewpoint has been put forth in [23], promoting the notion of regularized dynamic inversion. As an example, one may consider a gradient descent with respect to the Wasserstein distance 12 W22 , instead of KL-divergence DKL in (5). In that case, the posterior may be constructed according to (37) Equating the partial derivative of (40) w.r.t. µ to zero, then + + setting µ ≡ µ+ k , and using (29), we find (µk −µk−1 ) equals  ⊤ −1 2 ∆zk − hCµ+ hAµ+ k + O(h ), k−1 + C R (41) which in the limit h ↓ 0, results the SDE (39a). Similarly, using Lemma 4, we equate the partial derivative of (40) w.r.t. P to zero, and then setting P ≡ Pk+ , we get   (Pk+ )−1 = I + hC ⊤ R−1 C (Pk− )−1 I + hC ⊤ R−1 C ⇒  Pk+ = Pk− − h Pk− C ⊤ R−1 C + C ⊤ R−1 CPk− + O(h2 ), + + which combined with the recursion Pk− = Pk−1 +h(APk−1 + ⊤ ⊤ 2 + Pk−1 A + 2BB ) + O(h ) from Section III-B.3, yields   + + + Pk+ = Pk−1 +h A − C ⊤ R−1 C Pk−1 + Pk−1 (A− i  ⊤ 2 ⊤ −1 ⊤ C R C + 2BB + O(h ). (42) In the limit h ↓ 0, recursion (42) gives Lyapunov ODE (39b). It is instructive to compare the SDE-ODE system (39) with that in (31). In the case of (39), the estimator is of a Luenberger type with a static gain matrix L which is decoupled from the covariance, unlike (31). The estimator (39) is obviously not optimal in the minimum mean-square error sense. It is only presented here as a guideline to explore other variational schemes with desirable properties. V. C ONCLUDING REMARKS Reformulating uncertainty propagation and the filtering equations as gradient flows [8] is potentially transformative [3] [9]. The full power of this viewpoint is yet to be uncovered. Moreover, casting the iterative approximation steps in the language of proximal operators on the space of density functions may provide theoretical insights and computational benefits. A specific direction of future work would be developing proximal algorithms [2] to numerically solve the nonlinear filtering problem by recursively solving convex optimization problems, and to quantify computational performance of the same with respect to existing sequential Monte Carlo algorithms like the particle filter. The purpose of the present paper has been to highlight and elucidate the ideas in [3] and [9] in the context of linear Gaussian systems. We hope that this study will help to motivate further exploration of this topic. A PPENDIX In this Appendix, we collect some lemmas that are used in Sections III and IV. In addition, we will show in Corollary 1 below that applying Lemma 1 and 2 together enables us to provide an alternative proof of a Theorem in [14], which might be of independent interest. Lemma 1: If X and Y are symmetric positive definite  1  21 p 1 matrices, then tr X 2 Y X 2 ≤ tr (X) tr (Y ). Proof: From Uhlmann’s variational formula (see [10], also Theorem 6.1 in [11]) , given any G ≻ 0, we have   21  p 1 1 ≤ tr (XG) tr (Y G−1 ), (43) tr X2Y X2 where the equality in (43) is achieved for the specific choice  1 − 21 1 1 1 1 1 Gopt = Y 2 X 2 Y X 2 X 2 Y 2 X − 2 . Specializing (43) for G = Y , and noting that tr (XY ) ≤ tr (X) tr (Y ), the statement follows. Lemma 2: Given a PDF ̺0 (x) ∈ D2 with mean µ0 ∈ Rn , and n × n covariance matrix P0 ≻ 0. Then inf W22 (̺, ̺0 ) equals ̺∈Dµ,P kµ− µ0 k22   1  21  1 2 2 , + tr P + P0 − 2 P0 P P0 (44) and is achieved by push-forward of ̺0 (x) via an affine trans 1 − 12 1 1 1 port map M x + m, where M := P 2 P 2 P0 P 2 P 2, and m := µ− µ0 , that is, the arginf for (44) is ̺(x)  = q  1  12 1 1 1 det(P0 ) −2 P 2 P0 P 2 P − 2 (x − µ) + µ0 . In det(P ) ̺0 P particular, if ̺0 = N (µ0 , P0 ), then ̺ = N (µ, P ). Proof: Let ̺0 be as given, and choose any ̺ ∈ Dµ,P . Let ̺0 and ̺ be obtained by translating ̺0 and ̺ respectively, such that both ̺0 and ̺ have zero mean. Using (10), we can directly verify [12, p. 236] that W22 (̺, ̺0 ) =k µ − µ0 k22 +W22 (̺, ̺0 ). On the other hand, it is known [13, p. 11, Proposition 1.1.6] that   1  21  1 2 2 2 W2 (̺, ̺0 ) ≥ tr P + P0 − 2 P0 P P0 ⇒ W22 (̺, ̺0 ) ≥ right hand side of (44). (45) Now consider a candidate transport map M x + m where M and m are functions of P , P0 , µ, µ0 as in the statement. It suffices to prove that our candidate transport map indeed achieves the equality in (45). To this end, directly substituting the expressions for M and m, notice that the push-forward has mean M µ0 + m = µ, and covariance M P0 M ⊤ = P . So our candidate transport map (M , m) is feasible. To show optimality, from (10) notice that W22 (̺, ̺0 ) = inf tr(P + P0 − 2C), where C := M P0 solves P0 − C∈Rd×d CP −1 C ⊤  0, which has known optimal solution Copt :=  1 − 21 1 1 1 Mopt P0 = P0 P 2 P 2 P0 P 2 P 2 . Since our candi1   − 2 1 1 1 1 P 2 satisfies tr (M P0 ) = date M := P 2 P 2 P0 P 2    12 1 1 , the statement follows. tr (Mopt P0 ) = tr P02 P P02 In the Corollary below, combining Lemma 1 and 2, we recover a result in [14, Theorem 3.1]. Corollary 1: Given d-dimensional joint PDF ̺0 with mean µ0 , covariance P0 ≻ 0, suppose tr(P0 ) = τ0 . For fixed µ and τ > 0, √ 2 √ inf W22 (̺, ̺0 ) = τ − τ 0 + k µ − µ0 k22 , (46) ̺∈Dµ,τ and is achieved by ̺(x) = τ0 τ  d2 ̺0 τ0 τ  (x − µ) + µ0 . Proof: Let us choose P := ττ0 P0 , and from (44) √ 2 √ observe that inf W22 (ξ, ̺0 ) = ( τ − τ 0 ) + k µ − ξ∈Dµ,P µ0 k22 . On the other hand, for any ̺ ∈ Dµ,τ , we know from (45) that  1  12 1 W22 (̺, ̺0 ) ≥ τ + τ0 − 2 tr P02 SP02 + k µ − µ0 k22 , where S is the covariance of ̺. Using Lemma 1, we get  21  1 1 √ ≤ τ τ0 ⇒ W22 (̺, ̺0 ) ≥ tr P02 SP02 √ √ 2 inf W22 (ξ, ̺0 ) = τ − τ 0 + k µ − µ0 k22 , (47) [7] H. Risken, The Fokker-Planck Equation: Methods of Solution and Applications. Springer Series in Synergetics, Vol. 18, First ed., Springer; 1989. [8] L. Ambrosio, N. Gigli, and G. Savaré, Gradient Flows: in Metric Spaces and in the Space of Probability Measures. Lectures in Mathematics, ETH Zürich, Second ed., Birkhäuser; 2008. [9] R.S. Laugesen, P.G. Mehta, S.P. Meyn, and M. Raginsky, “Poisson’s Equation in Nonlinear Filtering”. SIAM Journal on Control and Optimization. Vol. 53, No. 1, pp. 501–525, 2015. ξ∈Dµ,P and that the equality is achieved when S = P = ττ0 P0 . In  d that case, det(S) = ττ0 det(P0 ), and hence Lemma 2 yields the arg inf ̺(x) for (46) as s    1  12 1 det(P0 ) − 12 − 12 2 2 ̺0 S S P0 S S (x − µ) + µ0 det(S)   τ  d2  τ 0 0 ̺0 (x − µ) + µ0 . = τ τ Lemma 3: If E(·) depends on ̺ only via the mean and covariance of ̺, then inf F (̺) is achieved by N (µ, P ). ̺∈Dµ,P Proof: As E(̺) ≡ E(µ, P ), henceR from (11) we get ̺ log ̺ dx. Since inf F (̺) = E(µ, P ) + β −1 inf ̺∈Dµ,P ̺∈Dµ,P [10] A. Uhlmann, “The “Transition Probability” in the State Space of a *-Algebra”. Reports on Mathematical Physics, Vol. 9, No. 2, pp. 273– 279, 1976. [11] D. Petz, Quantum Information Theory and Quantum Statistics. Theoretical and Mathematical Physics, First ed., Springer; 2008. [12] C.R. Givens, and R.M. Shortt, “A Class of Wasserstein Metrics for Probability Distributions”. The Michigan Mathematical Journal, Vol. 31, No. 2, pp. 231–240, 1984. [13] S.T. Rachev, and L. Rüschendorf, Mass Transportation Problems. Volume I: Theory. First ed., Springer; 1998. [14] E.A. Carlen, and W. Gangbo, “Constrained Steepest Descent in the 2-Wasserstein Metric”. Annals of Mathematics, pp. 807–846, 2003. [15] A. Halder, and E.D.B. Wendel, “Finite Horizon Linear Quadratic Gaussian Density Regulator with Wasserstein Terminal Cost”. Proceedings of the 2016 American Control Conference, pp. 7249–7254, 2016. N (µ, P ) is the maximum entropy PDF under prescribed mean µ and covariance P , hence the statement. [16] N.J. Higham, and H.M. Kim, “Solving A Quadratic Matrix Equation by Newton’s Method with Exact Line Searches”. SIAM Journal on Matrix Analysis and Applications, Vol. 23, No. 2, pp. 303–316, 2001. Lemma 4: For P , P0 ≻ 0,  21 1 1  1 1 ∂ 1 1  −1 −1 2 tr P02 P P02 = P02 P0 2 P −1 P0 2 P02 . ∂P 2 Proof: We refer the readers to Appendix B in [15]. [17] D. Liberzon, and R.W. Brockett, “Spectral Analysis of Fokker–Planck and Related Operators Arising from Linear Stochastic Differential Equations”. SIAM Journal on Control and Optimization, Vol. 38, No. 5, pp. 1453–1467, 2000. R EFERENCES [1] H.H. Bauschke, and P.L. Combettes, Convex Analysis and Monotone Operator Theory in Hilbert Spaces. CMS Books in Mathematics, Springer; 2011. [18] R.W. Brockett, and J.C. Willems, “Stochastic Control and the Second Law of Thermodynamics”. Proceedings of the 1978 IEEE Conference on Decision and Control including the 17th Symposium on Adaptive Processes, pp. 1007–1011, 1978. [19] R.L. Stratonovich, “Application of the Theory of Markov Processes for Optimum Filtration of Signals”. Radio Eng. Electron. Phys. (USSR), Vol. 1, pp. 1–19, 1960. [2] N. Parikh, and S. Boyd, “Proximal Algorithms”. Foundations and Trends in Optimization. Vol. 1, No. 3, pp. 127–239, 2014. [20] H.J. Kushner, “On the Differential Equations Satisfied by Conditional Densities of Markov Processes, with Applications”. Journal of the SIAM Series A Control, Vol 2, No. 1, pp. 106–119, 1964. [3] R. Jordan, D. Kinderlehrer, and F. Otto, “The Variational Formulation of the Fokker–Planck Equation”. SIAM Journal on Mathematical Analysis. Vol. 29, No. 1, pp. 1–17, 1998. [21] M. Fujisaki, G. Kallianpur, and H. Kunita, “Stochastic Differential Equations for the Non Linear Filtering Problem”. Osaka Journal of Mathematics, Vol. 9, No. 1, pp. 19–40, 1972. [4] C. Villani, Topics in Optimal Transportation. Graduate Studies in Mathematics, Vol. 58, First ed., American Mathematical Society; 2003. [22] R.E. Kalman, and R.S. Bucy, “New Results in Linear Filtering and Prediction Theory”. Journal of Basic Engineering, Vol. 83, No. 3, pp. 95–108, 1961. [5] J.-D. Benamou, and Y. Brenier, “A Computational Fluid Mechanics Solution to the Monge–Kantorovich Mass Transfer Problem”. Numerische Mathematik. Vol. 84, No. 3, pp. 375–393, 2000. [6] K.J. Åström, Introduction to Stochastic Control Theory. Academic Press; 1970. [23] A. Yezzi, and E.I. Verriest, “Nonlinear Observers via Regularized Dynamic Inversion”. Proceedings of the 2007 American Control Conference, pp. 1693–1698, 2007.
3
Leveraging Joint Interactions for Credibility Analysis in News Communities Subhabrata Mukherjee Gerhard Weikum Max Planck Institute for Informatics {smukherjee, weikum}@mpi-inf.mpg.de arXiv:1705.02667v2 [cs.AI] 9 May 2017 Abstract Media seems to have become more partisan, often providing a biased coverage of news catering to the interest of specific groups. It is therefore essential to identify credible information content that provides an objective narrative of an event. News communities such as digg, reddit, or newstrust offer recommendations, reviews, quality ratings, and further insights on journalistic works. However, there is a complex interaction between different factors in such online communities: fairness and style of reporting, language clarity and objectivity, topical perspectives (like political viewpoint), expertise and bias of community members, and more. This paper presents a model to systematically analyze the different interactions in a news community between users, news, and sources. We develop a probabilistic graphical model that leverages this joint interaction to identify 1) highly credible news articles, 2) trustworthy news sources, and 3) expert users who perform the role of “citizen journalists” in the community. Our method extends CRF models to incorporate real-valued ratings, as some communities have very fine-grained scales that cannot be easily discretized without losing information. To the best of our knowledge, this paper is the first full-fledged analysis of credibility, trust, and expertise in news communities. Categories and Subject Descriptors H.3.3 [Information Storage and Retrieval]: Information Search and Retrieval - Information Filtering; I.2.7 [Computing Methodologies]: Artificial Intelligence - Natural Language Processing Keywords Credibility; News Community; Probabilistic Graphical Models 1. INTRODUCTION Motivation: Media plays a crucial role in the public dissemination of information about events. Many people find online information and blogs as useful as TV or magazines. At the same time, however, people also believe that there is substantial media bias in news coverage [24, 8], especially in view of inter-dependencies and crossownerships of media companies and other industries (like energy). Several factors affect the coverage and presentation of news in media incorporating potentially biased information induced via the Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. CIKM’15, October 19-23, 2015, Melbourne, VIC, Australia Copyright 2015 ACM. ISBN 978-1-4503-3794-6/15/10 ...$15.00. DOI: http://dx.doi.org/10.1145/2806416.2806537 . fairness and style of reporting. News are often presented in a polarized way depending on the political viewpoint of the media source (newspapers, TV stations, etc.). In addition, other source-specific properties like viewpoint, expertise, and format of news may also be indicators of information credibility. In this paper, we embark on an in-depth study and formal modeling of these factors and inter-dependencies within news communities for credibility analysis. A news community is a news aggregator site (e.g., reddit.com, digg.com, newstrust.net) where users can give explicit feedback (e.g., rate, review, share) on the quality of news and can interact (e.g., comment, vote) with each other. Users can rate and review news, point out differences, bias in perspectives, unverified claims etc. However, this adds user subjectivity to the evaluation process, as users incorporate their own bias and perspectives in the framework. Controversial topics create polarization among users which influence their ratings. [30, 6] state that online ratings are one of the most trusted sources of user feedback; however they are systematically biased and easily manipulated. Problem Statement: Given a set of news sources generating news articles, and users reviewing those articles on different qualitative aspects with mutual interactions — our objective is to jointly rank the sources, articles, and users based on their trustworthiness, credibility, and expertise respectively. In this process, we want to analyze the influence of various factors like the writing style of a news article, its topic distribution, type of media and format of news, political viewpoint and expertise, and other user traits on the credibility analysis of the community. Our Approach: To analyze the factors and inter-dependencies in a news community, we have developed a sophisticated probabilistic graphical model, specifically a Continuous Conditional Random Field (CCRF) model, which exploits several moderate signals of interaction jointly between the following factors to derive a strong signal for information credibility (refer to Figures 1a and 1b). In particular, the model captures the following factors. • Language and credibility of a news article: objectivity, rationality, and general quality of language in the news article. Objectivity is the quality of the news to be free from emotion, bias and prejudice of the author. The credibility of a news article refers to presenting an unbiased, informative and balanced narrative of an event. • Properties and trustworthiness of a news source: trustworthiness of a news source in the sense of generating credible articles based on source properties like viewpoint, expertise and format of news. • Expertise of users and review ratings: expertise of a user, in the news community, in properly judging the credibility of news articles. Expert users should provide objective evaluations – by reviews and/or ratings – of news articles, corroborating with the evaluations of other expert users. This can be used to identify potential “citizen journalists” [17] in the community. We show that the CCRF performs better than sophisticated col- 2. MODELING NEWS COMMUNITIES Our approach exploits the rich interaction taking place between the different factors in a news community. We propose a probabilistic graphical model that leverages the interplay between news credibility, language objectivity, source trustworthiness, and user expertise. Refer to Figure 1 for the following discussion. Consider a set of news sources hsi (e.g., s1 in Figure 1c) generating articles hdi which are reviewed and analyzed by users hui for their credibility. Consider rij to be the review by user uj on article di . The overall article rating of di is given by yi . In our model, each news source, news article, user and her rating or review, and overall article rating is associated with a continuous random variable r.v. ∈ [1 . . . 5], that indicates its trustworthiness, objectivity, expertise, and credibility, respectively. 5 indicates the best quality that an item can obtain, and 1 is the worst. Discrete ratings, being a special case of this setting, can be easily handled. Each node is associated with a set of observed features that are extracted from the news community. For example, a news source has properties like topic specific expertise, viewpoint and format of news; a news article has features like topics, and style of writing from the usage of discourse markers and subjective words in the article. For users we extract their topical perspectives and expertise, engagement features (like the number of questions, replies, Joint Probabilistic Inference Source Trustworthiness News Article Language Objectivity News Source Users Topics Reviews User Expertise …, Engagement, Expertise V Ex iew pe p rt oin is t e, , ... Observable Features Emotionality, Discourse,... laborative filtering approaches based on latent factor models, and regression methods that do not consider all these interactions. Although this work is focused on news communities, the framework can also be used for instance, in health communities (e.g. healthboards.com) where users write posts on drug usage — the objective being to jointly rank posts, drug side-effects, and users based on their quality, credibility, and trustworthiness respectively. In this work, the attributes credibility and trustworthiness are always associated with a news article and a news source, respectively. The joint interaction between several factors also captures that a source garners trustworthiness by generating credible news articles, which are highly rated by expert users. Similarly, the likelihood of a news article being credible increases if it is generated by a trustworthy source. Some communities offer users fine-grained scales for rating different aspects of news articles and news sources. For example, the newstrust.net community analyzes an article on 15 aspects like insightful, fairness, style and factual. These are aggregated into an overall real-valued rating after weighing the aspects based on their importance, expertise of the user, feedback from the community, and more. This setting cannot be easily discretized without blowup or risking to lose information. Therefore, we model ratings as real-valued variables in our CCRF. Contributions: The paper introduces the following novel elements: • A continuous CRF that captures the mutual dependencies between credibility of articles, trustworthiness of sources, expertise of users, and expresses real-valued ratings. • An inference method for the CCRF that allows us to jointly (a) predict ratings; and (b) rank articles, sources, and users by their credibility, trustworthiness, and expertise, respectively. • A large experimental study with data from newstrust.net, one of the most sophisticated news communities with a focus on quality journalism. The rest of the paper is organized as follows. Section 2 presents how we model news communities, and which factors we include in the model. Section 3 develops the CCRF that captures the interaction between all the factors. Section 4 introduces the dataset that we use for experimental evaluation and further studies. Section 5 presents our experimental results followed by discussion. Article Credibility Ratings (a) Interactions between source trustworthiness, article credibility, language objectivity, and user expertise. (b) Sample instantiation. (c) Clique representation. Figure 1: Graphical model representation. reviews posted) and various interactions with other users (like upvotes/downvotes) and news sources in the community. The objective of our model is to predict credibility ratings hyi of news articles hdi by exploiting the mutual interactions between different variables. The following edges between the variables capture their interplay: • Each news article is connected to the news source from where it is extracted (e.g., s1 − d1 , s1 − d2 ) • Each news article is connected to its review or rating by a user (e.g., d1 − r11 , d1 − r12 , d2 − r22 ) • Each user is connected to all her reviews (e.g., u1 − r11 , u2 − r12 , u2 − r22 ) • Each user is connected to all news articles rated by her (e.g., u1 − d1 , u2 − d1 , u2 − d2 ) • Each source is connected to all the users who rated its articles (e.g., s1 − u1 , s1 − u2 ) • Each source is connected to all the reviews of its articles (e.g., s1 − r11 , s1 − r12 , s1 − r22 ) • For each article, all the users and all their reviews on the article are inter-connected (e.g., u1 − r12 , u2 − r11 , u1 − u2 ). This captures user-user interactions (e.g., u1 upvoting/downvoting u2 ’s rating on d1 ) influencing the overall article rating. Therefore, a clique (e.g., C1 ) is formed between a news article, its source, users and their reviews on the article. Multiple such cliques (e.g., C1 and C2 ) share information via their common news sources (e.g., s1 ) and users (e.g., u2 ). News topics play a significant role on information credibility. Individual users in community (and news sources) have their own perspectives and expertise on various topics (e.g., environmental politics). Modeling user-specific topical perspectives explicitly captures credibility judgment better than a user-independent model. However, many articles do not have explicit topic tags. Hence we use Latent Dirichlet Allocation (LDA) [1] in conjunction with Support Vector Regression (SVR) [4] to learn words associated to each (latent) topic, and user (and source) perspectives for the topics. Documents are assumed to have a distribution over topics as latent variables, with words as observables. Inference is by Gibbs sampling. This LDA model is a component of the overall model, discussed next. We use a probabilistic graphical model, specifically a Conditional Random Field (CRF), to model all factors jointly. The modeling approach is related to the prior work of [23]. However, unlike that work and traditional CRF models, our problem setting requires a continuous version of the CRF (CCRF) to deal with real-valued ratings instead of discrete labels. In this work, we follow an approach similar to [26, 27, 32] in learning the parameters of the CCRF. We use Support Vector Regression [4] to learn the elements of the feature vector for the CCRF. The inference is centered around cliques of the form h source, article, h users i, h reviews ii. An example is the two cliques C1 : s1 − d1 − hu1 , u2 i − hr11 , r12 i and C2 : s1 − d2 − u2 − r22 in the instance graph of Figure 1c. This captures the “cross-talk” between different cliques sharing nodes. A news source garners trustworthiness by generating multiple credible articles. Users attain expertise by correctly identifying credible articles that corroborate with other expert users. Inability to do so brings down their expertise. Similarly, an article attains credibility if it is generated by a trustworthy source and highly rated by an expert user. The inference algorithm for the CCRF is discussed in detail in Section 3. In the following subsections, we discuss the various feature groups that are considered in our CCRF model. 2.1 Articles and their Stylistic Features The style in which news is presented to the reader plays a pivotal role in understanding its credibility. The desired property for news is to be objective and unbiased. In this section, we examine the different stylistic indicators of news credibility. All the lexicons used in this section are compiled from [28, 23]. Assertives: Assertive verbs (e.g., “claim”) complement and modify a proposition in a sentence. They capture the degree of certainty to which a proposition holds. Factives: Factive verbs (e.g., “indicate”) pre-suppose the truth of a proposition in a sentence. Hedges: These are mitigating words (e.g., “may”) to soften the degree of commitment to a proposition. Implicatives: These words trigger pre-supposition in an utterance. For example, usage of the word complicit indicates participation in an activity in an unlawful way. Report verbs: These verbs (e.g., “argue”) are used to indicate the attitude towards the source, or report what someone said more accurately, rather than using just say and tell. Discourse markers: These capture the degree of confidence, perspective, and certainty in the set of propositions made. For instance, strong modals (e.g., “could”), probabilistic adverbs (e.g., “maybe”), and conditionals (e.g., “if”) depict a high degree of uncertainty and hypothetical situations, whereas weak modals (e.g., “should”) and inferential conjunctions (e.g., “therefore”) depict certainty. Subjectivity and bias: News is supposed to be objective: writers should not convey their own opinions, feelings or prejudices in their stories. For example, a news titled “Why do conservatives hate your children?” is not considered objective journalism. We use a subjectivity lexicon1 , a list of positive and negative opinionated words2 , and an affective lexicon3 to detect subjective clues in arti1 http://mpqa.cs.pitt.edu/lexicons/subj_lexicon/ http://www.cs.uic.edu/ liub/FBS/opinion-lexicon-English.rar 3 http://wndomains.fbk.eu/wnaffect.html 2 Latent Topics Topic Words Obama admin. Citizen journ. US military AmyGoodman Alternet Climate obama, republican, party, election, president, senate, gop, vote cjr, jouralism, writers, cjrs, marx, hutchins, reporting, liberty, guides iraq, war, military, iran, china, nuclear, obama, russia, weapons democracy, military, civil, activist, protests, killing, navajo, amanda media, politics, world news, activism, world, civil, visions, economy energy, climate, power, water, change, global, nuclear, fuel, warming Table 1: Latent topics (with illustrative labels) and their words. cles. The affective features capture the state of mind (like attitude and emotions) of the writer while writing an article or post (e.g., anxiousness, confidence, depression, favor, malice, sympathy etc.). We additionally harness a lexicon of bias-inducing words extracted from the Wikipedia edit history from [28] exploiting its Neutral Point of View Policy to keep its articles “fairly, proportionately, and as far as possible without bias, all significant views that have been published by reliable sources on a topic”. Feature vector construction: For each stylistic feature type fi and each news article dj , we compute the relative frequency of words of type fi occurring in dj , thus constructing a feature vector F L (dj ) = hf reqij = #(words in fi ) / length(dj )i. Consider the review rj,k written by user uk on the article dj . For each such review, analogous to the per-article stylistic feature vector hF L (dj )i, we construct a per-review feature vector hF L (rj,k )i. 2.2 Articles and their Topics Topic tags for news articles play an important role in user-perceived prominence, bias and credibility, in accordance to the ProminenceInterpretation theory [7]. For example, the tag Politics is often viewed as an indicator of potential bias and individual differences; whereas tags like Energy or Environment are perceived as more neutral news and therefore invoke higher agreement in the community on the associated articles’ credibility. Obviously, this can be misleading as there is a significant influence of Politics on all topics in all format of news. Certain users have topic-specific expertise that make them rate articles on those topics better than others. News sources also have expertise on specific topics and provide a better coverage of news on those topics than others. For example, National Geographic provides a good coverage of news related to environment, whereas The Wall Street Journal provides a good coverage on economic policies. However, many news articles do not have any explicit topic tag. In order to automatically identify the underlying theme of the article, we use Latent Dirichlet Allocation (LDA) [1] to learn the latent topic distribution in the corpus. LDA assumes a document to have a distribution over a set of topics, and each topic to have a distribution over words. Table 1 shows an excerpt of the top topic words in each topic, where we manually added illustrative labels for the topics. The latent topics also capture some subtle themes not detected by the explicit tags. For example, Amy Goodman is an American broadcast journalist, syndicated columnist and investigative reporter who is considered highly credible in the community. Also, associated with that topic cluster is Amanda Blackhorse, a Navajo activist and plaintiff in the Washington Redskins case. Feature vector construction: For each document dj and each of its review rj,k , we create feature vectors hF T (dj )i and hF T (rj,k )i respectively, using the learned latent topic distributions, as well as the explicit topic tags. Section 3.1 discusses our method to learn the topic distributions. 2.3 News Sources A news source is considered trustworthy if it generates highly credible articles. We examine the effect of different features of a news source on its trustworthiness based on user assigned ratings Category Elements Variables Type Description Media Format Scope Viewpoint Top Topics Expertise on Topics newspaper, blog, radio, magazine, online editorial, investigative report, news, research local, state, regional, national, international far left, left, center, right, neutral politics, weather, war, science„ U.S. military U.S. congress, Middle East, crime, presidential election, Bush administration, global warming dj s u rj,k Vector Vector Vector Vector yj,k z SVRuk , SVRsi SVRL , SVRT Ψ = f (hψj i) Real Number Vector Real Number ∈ [1 . . . 5] Real Number λ= hαu , βs , γ1 , γ2 i yn×1 Xn×m Qn×n bn×1 Σn×n µn×1 Vector Document with sequence of words hwi Sources Users Review by user uk on document dj with sequence of words hwi Rating of rj,k Sequence of topic assignments for hwi SVR prediction for users, sources, language, and topics Clique potential with ψj = hyj , si , dj , huk i, hrj,k ii for clique of dj Combination weights for users hui, sources hsi, language and topic models Credibility rating of documents hdi Feature matrix with m = |U | + |S| + 2 f (λ) f (λ, X) f (λ) f (λ, X) Table 2: Features for source trustworthiness. in the community. We consider the following source features (summarized in Table 2): the type of media (e.g., online, newspaper, tv, blog), format of news (e.g., news analysis, opinion, special report, news report, investigative report), (political) viewpoint (e.g., left, center, right), scope (e.g., international, national, local), the top topics covered by the source, and their topic-specific expertise. Feature vector construction: For each news source sl , we create a feature vector hF S (sl )i using features in Table 2. Each element fiS (sl ) is 1 or 0 indicating presence or absence of a feature. Note that above features include the top (explicit) topics covered by any source, and its topic-specific expertise for a subset of those topics. 2.4 Users, Ratings and Interactions A user’s expertise in judging news credibility depends on many factors. [5] discusses the following traits for recognizing an expert. Community Engagement of the user is an obvious measure for judging the user authority in the community. We capture this with different features: number of answers, ratings given, comments, ratings received, disagreement and number of raters. Inter-User Agreement: Expert users typically agree on what constitutes a credible article. This is inherently captured in the proposed graphical model, where a user gains expertise by assigning credibility ratings to articles that corroborate with other expert users. Topical Perspective and Expertise: The potential for harvesting user preference and expertise in topics for rating prediction of reviews has been demonstrated in [22, 21]. For credibility analysis the model needs to capture the user’s perspective and bias towards certain topics based on their political inclination that bias their ratings, and their topic-specific expertise that allows them to evaluate articles on certain topics better as “Subject Matter Experts”. These are captured as per-user feature weights for the stylistic indicators and topic words in the language of user-contributed reviews. Interactions: In a community, users can upvote (digg, like, rate) the ratings of users that they appreciate, and downvote the ones they do not agree with. High review ratings from expert users increase the value of a user; whereas low ratings bring down her expertise. Similar to this user-user interaction, there can be user-article, usersource and source-article interactions which are captured as edges in our graphical model (by construction). Consider the following anecdotal example in the community showing an expert in nuclear energy downvoting another user’s rating on nuclear radiation: “Nonexpert: Interesting opinion about health risks of nuclear radiation, from a physicist at Oxford University. He makes some reasonable points ... Low rating by expert to above review: Is it fair to assume that you have no background in biology or anything medical? While this story is definitely very important, it contains enough inaccurate and/or misleading statements...” Feature vector construction: For each user uk , we create an engagement feature vector hF E (uk )i. In order to capture user subjectivity, in terms of different stylistic indicators of credibility, we consider the per-review language feature vector hF L (rj,k )i of user uk (refer to Section 2.1). To capture user perspective and expertise on different topics, we consider the per-review topic feature vector hF T (rj,k )i of each user uk . Vector Matrix Diagonal Matrix Vector CovarianceMatrix Mean Vector Table 3: Symbol table. 3. JOINT PROBABILISTIC INFERENCE In this section we incorporate the discussed features and insights into a joint probabilistic graphical model. The task is to identify credible news articles, trustworthy news sources, and expert users jointly in a news community. Table 3 summarizes the important notations used in this section. 3.1 Topic Model Consider an article d consisting of a sequence of {Nd } words denoted by w1 , w2 , ...wNd . Each word is drawn from a vocabulary V having unique words indexed by 1, 2, ...V . Consider a set of topic assignments z = {z1 , z2 , ...zK } for d, where each topic zi can be from a set of K possible topics. LDA [1] assumes each document d to be associated with a multinomial distribution θd over topics Z with a symmetric dirichlet prior ρ. θd (z) denotes the probability of occurrence of topic z in document d. Topics have a multinomial distribution φz over words drawn from a vocabulary V with a symmetric dirichlet prior ζ. φz (w) denotes the probability of the word w belonging to the topic z. Exact inference is not possible due to intractable coupling between Θ and Φ. We use Gibbs sampling for approximate inference. Let n(d, z, w) denote the count of the word w occurring in document d belonging to the topic z. In the following equation, (.) at any position in the above count indicates marginalization, i.e., summing up the counts over all values for the corresponding position in n(d, z, w). The conditional distribution for the latent variable z (with components z1 to zK ) is given by: P (zi = k|wi = w, z−i , w−i ) ∝ n(., k, w) + ζ n(d, k, .) + ρ P ×P k n(d, k, .) + Kρ w n(., k, w) + V ζ (1) Let hT E i and hT L i be the set of explicit topic tags and latent topic dimensions, respectively. The topic feature vector hF T i for an article or review combines both explicit tags and latent topics and is constructed as follows:  if T E0 = FtT  #f req(w, d), t T Ft (d) = #f req(w, d) × φT L0 (w), if TtL0 = FtT and φT L0 (w) > δ t  t  0 otherwise So for any word in the document matching an explicit topic tag, the corresponding element in the feature vector hF T i is set to its occurrence count in the document. If the word belongs to any latent topic with probability greater than threshold δ, the probability of the word belonging to that topic (φt (w)) is added to the corresponding element in the feature vector, and set to 0 otherwise. 3.2 Support Vector Regression We use Support Vector Regression (SVR) [4] to combine the different features discussed in Section 2. SVR is an extension of the max-margin framework for SVM classification to the regression problem. It solves the following optimization problem to learn weights w for features F : N min w X 1 T (max(0, |yd − wT F | − ))2 w w+C× 2 d=1 (2) Article Stylistic Model: We learn a stylistic regression model SVRL using the per-article stylistic feature vector hF L (dj )i for article dj (or, hF L (rj,k )i for review rj,k ), with the overall article rating yj (or, yj,k ) as the response variable. Article Topic Model: Similarly, we learn a topic regression model SVRT using the per-article topic feature vector hF T (dj )i for article dj (or, hF T (rj,k )i for review rj,k ), with the overall article rating yj (or, yj,k ) as the response variable. Source Model: We learn a source regression model SVRsi using the per-source feature vector hF S (si )i for source si , with the overall source rating as the response variable . User Model: For each user uk , we learn a user regression model SVRuk with her per-review stylistic and topic feature vectors hF L (rj,k )∪F T (rj,k )i for review rj,k for article dj , with her overall review rating yj,k as the response variable. Note that we use overall article rating to train article stylistic and topic models. For the user model, however, we take user assigned article ratings and per-user features. This model captures user subjectivity and topic perspective. The source models are trained on news-source specific meta-data and its ground-truth ratings. 3.3 Continuous Conditional Random Field We model our learning task as a Conditional Random Field (CRF), where the random variables are the ratings of news articles hdj i, news sources hsi i, users huk i, and reviews hrj,k i. The objective is to predict the credibility ratings hyj i of the articles hdj i. The cliques in the CRF consist of an article dj , its source si , set of users huk i reviewing it, and the corresponding user reviews hrj,k i — where rj,k denotes the review by user uk on article dj . Different cliques are connected via the common news sources, and users. There are as many cliques as the number of news articles. Let ψj (yj , si , dj , huk i, hrj,k i) be a potential function for clique j. Each clique has a set of associated vertex feature functions. In our problem setting, we associate features to each vertex.The features constituted by the stylistic, topic, source and user features explained in Section 2 are: F L (dj )∪F T (dj )∪F S (si )∪k (F E (uk )∪ F L (rj,k ) ∪ F T (rj,k )). A traditional CRF model allows us to have a binary decision if a news article is credible (yj = 1) or not (yj = 0), by estimating the conditional distribution with the probability mass function of the discrete random variable y: Qn j=1 exp(ψj (yj , si , dj , huk i, hrj,k i)) P r(y|D, S, U, R) = P Qn y j=1 exp(ψj (yj , si , dj , huk i, hrj,k i)) Given a news article dj , its source id si , and a set of user ids huk i who reviewed the article, the regression models SVRL (dj ), SVRT (dj ), SVRsi , hSVRuk (dj )i (discussed in Section 3.2) predict rating of dj . For notational brevity, hereafter, we drop the argument dj from the SVR function. These SVR predictors are for separate feature groups and independent of each other. Now we combine the different SVR models to capture mutual interactions, such that the weight for each SVR model reflects our confidence on its quality. Errors by an SVR are penalized by the squared loss between the predicted article rating and the ground-truth rating. There is an additional constraint that for any clique only the regression models corresponding to the news-source and users present in it should be activated. This can be thought of as partitioning the input feature space into subsets, with the features inside a clique capturing local interactions, and the global weights capture the overall quality of the random variables via the shared information between the cliques (in terms of common sources, users, topics and language features) — an ideal setting for using a CRF. Equation 5 shows one such linear combination. Energy function of an individual clique is given by: ψj (yj , si , dj , huk i, hrj,k i) = − P r(y|D, S, U, R) = n j=1 exp(ψj (yj , si , dj , huk i, hrj,k i)) R∞ Q n j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))dy −∞ (4) αk Iuk (dj )(yj − SVRuk )2 k=1 − i=S X βi Isi (dj )(yj −SVRsi )2 −γ1 (yj −SVRL )2 −γ2 (yj −SVRT )2 i=1 (5) Indicator functions Iuk (dj ) and Isi (dj ) are 1 if uk is a reviewer and si is the source of article dj respectively, and are 0 otherwise. As the output of the SVR is used as an input to the CCRF in Equation 5, each element of the input feature vector is already predicting the output variable. The learned parameters λ = hα, β, γ1 , γ2 i (with dimension(λ) = |U | + |S| + 2) of the linear combination of the above features depict how much to trust individual predictors. Large λk on a particular predictor places large penalty on the mistakes committed by it, and therefore depicts a higher quality for that predictor. αu corresponding to user u can be taken as a proxy for that user’s expertise, allowing us to obtain a ranked list of expert users. Similarly, βs corresponding to news source s can be taken as a proxy for that source’s trustworthiness, allowing us to obtain a ranked list of trustworthy news sources. Overall energy function of all cliques is given by: Ψ= n X ψj (yj , si , dj , huk i, hrj,k i) j=1 (Substituting ψj from Equation 5 and re-organizing terms) Ψ= n X (− j=1 − i=S X k=U X αk Iuk (dj )(yj − SVRuk )2 k=1 βi Isi (dj )(yj − SVRsi )2 − γ1 (yj − SVRL )2 − γ2 (yj − SVRT )2 ) i=1 (3) But in our problem setting, we want to estimate the credibility rating of an article. Therefore, we need to estimate the conditional distribution with the probability density function of the continuous random variable y: Q k=U X =− n X yj2 [ j=1 + n X j=1 2yj [ k=U X αk Iuk (dj ) + k=1 k=U X βi Isi (dj ) + γ1 + γ2 ] i=1 αk Iuk (dj )SVRuk + k=1 + γ2 SVRT ] − i=S X i=S X βi Isi (dj )SVRsi + γ1 SVRL i=1 n k=U i=S X X X [ αk Iuk (dj )SVR2uk + βi Isi (dj )SVR2si j=1 k=1 i=1 + γ1 SVR2L + γ2 SVR2T ] Organizing the bracketed terms into variables as follows: (P k=U k=1 Qi,j = bi = 2[ αk Iuk (di ) + Pl=S l=1 βl Isl (di ) + γ1 + γ2 0 k=U X l=S X αk Iuk (di )SVRuk + ∂Σ ∂Σ−1 = −Σ Σ ∂λk ∂λk = −2ΣΣ i=j i 6= j ∂ ∂ (µT Σ−1 µ) = (bT Σb) ∂λk ∂λk βl Isl (di )SVRsl +γ1 SVRL +γ2 SVRT ] l=1 k=1 = bT i=S n k=U X X X βi Isi (dj )SVR2si +γ1 SVR2L +γ2 SVR2T ] αk Iuk (dj )SVR2uk + c= [ i=1 j=1 k=1 = bT (Σ We can derive: Ψ = −y T Qy + y T b − c Qn −∞ = 4X(.),k µ − 2µT µ ∂log|Σ−1 | 1 ∂Σ−1 = Trace(|Σ−1 |Σ ) ∂λk |Σ−1 | ∂λk exp(ψj ) j=1 exp(ψj )dy = 2Trace(Σ) exp(Ψ) −∞ exp(Ψ)dy = R∞ We can derive the gradient vector: exp(−y T Qy + y T b) T T −∞ exp(−y Qy + y b)dy (7) ∂logP (y|X) T = −y T y+2y T X(.),k −2X(.),k µ+µT µ+ Trace(Σ) ∂λk (11) = R∞ = R∞ exp(− 21 y T Σ−1 y + y T Σ−1 µ) −∞ exp(− 21 y T Σ−1 y + y T Σ−1 µ)dy Let η denote the learning rate. The update equation is given by: (Substituting Q = 12 Σ−1 , b = Σ−1 µ) Equation 7 can be transformed R ∞ into a multivariate Gaussian distribution after substituting −∞ exp(− 12 y T Σ−1 y + y T Σ−1 µ)dy = (2π)n/2 1 |Σ−1 | 2 exp( 12 µT Σ−1 µ). Therefore obtaining, P (y|X) = 1 n ∂Σ ∂bT ∂b + b) + Σb ∂λk ∂λk ∂λk = 4X(.),k Σb − 2bT ΣΣb (6) Substituting Ψ in Equation 4: j=1 P (y|X) = R ∞ Qn ∂Σb ∂bT + Σb ∂λk ∂λk 1 (2π) 2 |Σ| 2 1 exp(− (y − µ)T Σ−1 (y − µ)) 2 (8) Q represents the contribution of λ to the covariance matrix Σ. Each row of the vector b and matrix Q corresponds to one training instance, representing the active contribution of features present in it. To ensure Equation 8 represents a valid Gaussian distribution, the covariance matrix Σ needs to be positive definite for its inverse to exist. For that the diagonal matrix Q needs to be a positive semidefinite matrix. This can be ensured by making all the diagonal elements in Q greater than 0, by constraining λk > 0. Since this is a constrained optimization problem, gradient ascent cannot be directly used. We follow the approach similar to [27] and maximize log-likelihood with respect to log λk , instead of λk as in standard gradient ascent, making the optimization problem unconstrained as: ∂logP (y|X) ∂logP (y|X) = αk ( ) ∂logλk ∂λk (9) Taking partial derivative of the log of Equation 8 w.r.t λk : ∂logP (y|X) 1 ∂ = (−y T Σ−1 y + 2y T Σ−1 µ − µT Σ−1 µ ∂λk 2 ∂λk + log|Σ−1 | + Constant) (10) Substituting the following in the above equation: ∂Q ∂Σ−1 =2 ∂λk ∂λk = 2I ∂Σ−1 µ ∂b = [∵ µ = Σb] ∂λk ∂λk = 2X(.),k where, X(.),k indicates the kth column of the feature matrix X. logλnew = logλold k k +η ∂logP (y|X) ∂logλk (12) Once the model parameters are learned using gradient ascent, the inference for the prediction y of the article credibility rating is straightforward. As we assume the distribution to be Gaussian, the prediction is the expected value of the function, given by the mean of the distribution: y0 = argmaxy P (y|X) = µ = Σb. Note that Σ and b are both a function of λ = hα, β, γ1 , γ2 i which represents the combination weights of various factors to capture mutual interactions. The optimization problem determines the optimal λ for reducing the error in prediction. 4. USE CASE: NEWSTRUST We performed experiments with data from a typical news community: newstrust.net4 . This community is similar to digg.com and reddit.com, but has more refined ratings and interactions. We chose NewsTrust because of the availability of ground-truth ratings for credibility analysis of news articles; such ground-truth is not available for the other communities. We collected stories from NewsTrust from May, 2006 to May, 2014. Each such story features a news article from a source (E.g. BBC, CNN, Wall Street Journal) that is posted by a member, and reviewed by other members, many of whom are professional journalists and content experts5 . We crawled all the stories with their explicit topic tags and other associated meta-data. We crawled all the news articles from their original sources that were featured in any NewsTrust story. The earliest story dates back to May 1, 1939 and the latest one is in May 9, 2014. We collected all member profiles containing information about the demographics, occupation and expertise of the members along with their activity in the community in terms of the posts, reviews and ratings; as well as interaction with other members. The members in the community can also rate each others’ ratings. The earliest story rating by a member dates back to May, 2006 and the most recent one 4 Code and data available at http://www.mpi-inf.mpg.de/impact/credibilityanalysis/ 5 http://www.newstrust.net/help#about_newstrust Factors Count Unique news articles reviewed in NewsTrust NewsTrust stories on news articles NewsTrust stories with ≥ 1 reviews NewsTrust stories with ≥ 3 reviews NewsTrust member reviews of news articles 62,064 84,704 43,107 18,521 134,407 News articles extracted from original sources NewsTrust stories on extracted news articles 47,565 52,579 News sources Journalists who wrote news articles Timestamps (month and year) of posted news articles 5,658 19,236 3,122 NewsTrust members who reviewed news articles NewsTrust members who posted news articles 668 Explicit topic tags Latent topics extracted 456 300 Nodes Sources Members News articles Reviews Edges Total triangles Count 181,364 1,704 6,906 42,204 130,550 602,239 521,630 Factors No. of weakly connected components Diameter Average path length Average degree Average clustering coefficient Modularity Latent Factor Models (LFM) Simple LFM [15] Experience-based LFM [21] Text-based LFM [20] Our Model: User SVR 0.95 0.85 0.78 0.60 Model Table 4: Dataset statistics. Factors MSE Table 6: MSE comparison of models for predicting users’ credibility rating behavior with 10-fold cross-validation. Improvements are statistically significant with P-value < 0.0001. 7,114 1,580 News sources reviewed by NewsTrust members Model Count 12 8 47 6.641 0.884 0.516 Table 5: Graph statistics. is in Feb, 2014. In addition, we collected information on member evaluation of news sources, and other information (e.g., type of media, scope, viewpoint, topic specific expertise) about source from its meta data. Crawled dataset: Table 4 shows the dataset statistics. In total 62K unique news articles were reviewed in NewsTrust in the given period, out of which we were able to extract 47K full articles from the original sources like New York Times, TruthDig, ScientificAmerican etc — a total of 5.6K distinct sources. The remaining articles were not available for crawling. There are 84.7K stories featured in NewsTrust for all the above articles, out of which 52.5K stories refer to the news articles we managed to extract from their original sources. The average number of reviews per story is 1.59. For general analysis we use the entire dataset. For experimental evaluation of the CCRF and hypotheses testing, we use only those stories ( 18.5K) with a minimum of 3 reviews that refer to the news articles we were able to extract from original sources. Generated graph: Table 5 shows the statistics of the graph constructed by the method of Section 2. Ground-Truth for evaluation: The members in the community can rate the credibility of a news article on a scale from 1 to 5 regarding 15 qualitative aspects like facts, fairness, writing style and insight, and popularity aspects like recommendation, credibility and views. Members give an overall recommendation for the article explained to them as: “... Is this quality journalism? Would you recommend this story to a friend or colleague? ... This question is similar to the up and down arrows of popular social news sites like Digg and Reddit, but with a focus on quality journalism." Each article’s aspect ratings by different members are weighted (and aggregated) by NewsTrust based on findings of [16], and the member expertise and member level (described below). This overall article rating is taken as the ground-truth for the article credibility rating in our work. A user’s member level is calculated by NewsTrust based on her community engagement, experience, other users’ feedback on her ratings, profile transparency and validation by NewsTrust staff. This member level is taken as the proxy for user expertise in our work. Members rate news sources while reviewing an article. These ratings are aggregated for each source, and taken Only Title MSE Title & Text MSE Language Model: SVR Language (Bias and Subjectivity) Explicit Topics Explicit + Latent Topics All Topics (Explicit + Latent) + Language 3.89 1.74 1.68 1.57 0.72 1.74 1.01 0.61 News Source Features and Language Model: SVR News Source News Source + All Topics + Language 1.69 0.91 1.69 0.46 Aggregated Model: SVR Users + All Topics + Language + News Source 0.43 0.41 Our Model: CCRF+SVR User + All Topics + Language + News Source 0.36 0.33 Table 7: MSE comparison of models for predicting aggregated article credibility rating with 10-fold cross-validation. Improvements are statistically significant with P-value < 0.0001. as a proxy for the source trustworthiness in our work. Training data: We perform 10-fold cross-validation on the news articles. During training on any 9-folds of the data, the algorithm learns the user, source, language and topic models from user-assigned ratings to articles and sources present in the train split. We combine sources with less than 5 articles and users with less than 5 reviews into background models for sources and users, respectively. This is to avoid modeling from sparse observations, and to reduce dimensionality of the feature space. However, while testing on the remaining blind 1-fold we use only the ids of sources and users reviewing the article; we do not use any user-assigned ratings of sources or articles. For a new user and a new source, we draw parameters from the user or source background model. The results are averaged by 10-fold cross-validation, and presented in the next section. Experimental settings: In the first two experiments we want to find the power of the CCRF in predicting user rating behavior, and credibility rating of articles. Therefore, the evaluation measure is taken as the Mean Squared Error (MSE) between the prediction and the actual ground-rating in the community. For the latter experiments in finding expert users (and, trustworthy sources) there is no absolute measure for predicting user (and, source) quality; it only makes sense to find the relative ranking of users (and, sources) in terms of their expertise (and, trustworthiness). Therefore, the evaluation measure is taken as the Normalized Discounted Cumulative Gain (NDCG) [13] between the ranked list of users (and, sources) obtained from CCRF and their actual ranking in the community. 5. 5.1 EXPERIMENTS Predicting User Ratings of Articles First we evaluate how good our model can predict the credibility ratings that users assign to news articles using the Mean Squared Error (MSE) between the prediction and the actual rating. Model Experience LFM [21] PageRank CCRF NDCG 0.80 0.83 0.86 Table 8: NDCG scores for ranking trustworthy sources. Model Experience LFM [21] Member Ratings CCRF NDCG 0.81 0.85 0.91 Table 9: NDCG scores for ranking expert users. Baselines: We consider the following baselines for comparison: 1. Latent Factor Recommendation Model (LFM) [15]: LFM considers the tuple huserId, itemId, ratingi, and models each user and item as a vector of latent factors which are learned by minimizing the MSE between the rating and the product of the user-item latent factors. In our setting, each news article is considered an item and rating refers to the credibility rating assigned by a user to an article. 2. Experience-based LFM [21]: This model incorporates experience of a user in rating an item in the LFM. The model builds on the hypothesis that users at similar levels of experience have similar rating behaviors which evolve with time. The model has an extra dimension: the time of rating an item which is not used in our SVR model. Note the analogy between the experience of a user in this model, and the notion of user expertise in the SVR model. However, these models ignore the text of the reviews. 3. Text-based LFM [20]: This model incorporates text in the LFM by combining the latent factors associated to items in LFM with latent topics in text from topic models like LDA. 4. Support Vector Regression (SVR) [4]: We train an SVR model SVRuk for each user uk (refer to Section 3.2) based on her reviews hrj,k i with language and topic features hF L (rj,k )∪F T (rj,k )i, with the user’s article ratings hyj,k i as the response variable. We also incorporate the article language features and the topic features, as well as source-specific features to train the user model for this task. The other models ignore the stylistic features, and other fine-grained user-item interactions in the community. Table 6 shows the MSE comparison between the different methods. Our model (User SVR) achieved the lowest MSE and thus performed best. 5.2 Finding Credible Articles As a second part of the evaluation, we investigate the predictive power of different models in order to find credible news articles based on the aggregated ratings from all users. The above LFM models, unaware of the user cliques, cannot be used directly for this task, as each news article has multiple reviews from different users which need to be aggregated. We find the Mean Squared Error (MSE) between the estimated overall article rating, and the groundtruth article rating. We consider stories with at least 3 ratings about a news article. We compare the CCRF against the following baselines: 1. Support Vector Regression (SVR) [4]: We consider an SVR model with features on language (bag-of-all-words, subjectivity, bias etc.), topics (explicit tags as well as latent dimensions), and news-sourcespecific features. The language model uses all the lexicons derived and used in [28, 23]. The source model also includes topic features in terms of the top topics covered by the source, and its topic-specific expertise for a subset of the topics. 2. Aggregated Model (SVR) [4]: As explained earlier, the user features cannot be directly used in the baseline model, which is agnostic of the user cliques. Therefore, we adopt a simple aggregation approach by taking the average rating of all the user ratings SVRuk (dj ) for an article dj as a feature. Note that, in contrast to this |uk | simple average used here, our CCRF model learns the weights hαu i per-user to combine their overall ratings for an article. Table 7 shows the MSE comparison of the different models. MSE Comparison: The first two models in Table 6 ignore the textual content of news articles, and reviews, and perform worse than the ones that incorporate full text. The text-based LFM considers title and text, and performs better than its predecessors. However, the User SVR model considers richer features and interactions, and attains 23% MSE reduction over the best performing LFM baselines. The baselines in Table 7 show the model performance after incorporating different features in two different settings: 1) with news article titles only as text, and 2) with titles and the first few paragraphs of an article. The language model, especially the bias and subjectivity features, is less effective using only the article titles due to sparseness. On the other hand, using the entire article text may lead to very noisy features. So including the first few paragraphs of an article is the “sweet spot”. For this, we made an ad-hoc decision and included the first 1000 characters of each article. With this setting, the language features made a substantial contribution to reducing the MSE. The aggregated SVR model further brings in the user features, and achieves the lowest MSE among the baselines. This shows that a user-aware credibility model performs better than user-independent ones. Our CCRF model combines all features in a more sophisticated manner, which results in 19.5% MSE reduction over the most competitive baseline (aggregated SVR). This is empirical evidence that the joint interactions between the different factors in a news community are indeed important to consider for identifying highly credible articles. 5.3 Finding Trustworthy Sources We shift the focus to two use cases: 1) identifying the most trustworthy sources, and 2) identifying expert users in the community who can play the role of “citizen journalists”. Using the model of Section 3, we rank all news sources in the community according to the learned hβsi i in Equation 5. The baseline is taken as the PageRank scores of news sources in the Web graph. In the experience-based LFM we can consider the sources to be users, and articles generated by them to be items. This allows us to obtain a ranking of the sources based on their overall authority. This is the second baseline against which we compare the CCRF. We measure the quality of the ranked lists in terms of NDCG using the actual ranking of the news sources in the community as ground-truth. NDCG gives geometrically decreasing weights to predictions at the various positions of the ranked list: N DCGp = DCGp IDCGp where DCGp = rel1 + Pp reli i=2 log2 i Table 8 shows the NDCG scores for the different methods. 5.4 Finding Expert Users Similar to news sources, we rank users according to the learned hαuk i in Equation 5. The baseline is the average rating received by a user from other members in the community. We compute the NDCG score for the ranked lists of users by our method. We also compare against the ranked list of users from the experience-aware LFM [21]. Table 9 shows the NDCG scores for different methods. 5.5 Discussion Hypothesis Testing: We test various hypotheses under the influence of the feature groups using explicit labels, and ratings available in the NewsTrust community. A summary of the tests is presented in Table 10 showing a moderate correlation between various factors which are put together in the CCRF to have a strong indicator for information credibility. Language: The stylistic features (factor (a) in Table 10) like assertives, hedges, implicatives, factives, discourse and affective play a significant role in the credibility detection of news, in conjunction with other language features like topics. Factors Corr. a) Stylistic Indicators Vs. Article Credibility Rating Insightful (Is it well reasoned? thoughtful?) Fairness (Is it impartial? or biased?) Style (Is this story clear? concise? well-written?) Responsibility (Are claims valid, ethical, unbiased?) Balance (Does this story represent diverse viewpoints?) 0.77 0.75 0.65 0.72 0.49 b) Influence of Politics Vs. Disagreement c) Expertise (Moderate, High) Vs. Disagreement Interactions d) User Expertise Vs. User-User Rating e) Source Trustworthiness Vs. Article Credibility Rating f) User Expertise Vs. MSE in Article Rating Prediction 0.11 -0.10, -0.31 0.40 0.47 -0.29 Table 10: Pearson’s product-moment correlation between various factors (with P-value < 0.0001 for each test). Money - Politics War in Iraq Media - Politics Green Technology Most Trusted rollingstone.com nybooks.com consortiumnews discovermagazine.com truthdig.com consortiumnews thenation.com nature.com democracynow.org truthout.org thedailyshow.com scientificamerican.com Least Trusted firedoglake.com suntimes.com trueslant.com crooksandliars rushlimbaugh.com timesonline rightwingnews.com suntimes.com foxnews.com Table 11: Most and least trusted sources on sample topics. Topics: Topics are an important indicator for news credibility. We measured the influence of the Politics tag on other topics by their co-occurrence frequency in the explicit tag sets over all the news articles. We found significant influence of Politics on all topics, with an average measure of association of 54% to any topic, and 62% for the overall news article. The community gets polarized due to different perspectives on topical aspects of news. A moderate correlation (factor (b) in Table 10) indicates a weak trend of disagreement, measured by the standard deviation in article credibility rating among users, increasing with its political content. In general, we find that community disagreement for different viewpoints are as follows: Right (0.80) > Left(0.78) > Center(0.65) > Neutral (0.63). Users: User engagement features are strong indicators of expertise. Although credibility is ultimately subjective, experts show moderate agreement (factor (c) in Table 10) on highly credible news. There is a moderate correlation (factor (d) in Table 10) between feedback received by a user on his ratings from community, and his expertise. Sources: Various traits of a news source like viewpoint, format and topic expertise are strong indicators of trustworthiness. In general, science and technology websites (e.g., discovermagazine.com, nature.com, scientificamerican.com), investigative reporting and non-partisan sources (e.g., truthout.org, truthdig.com, cfr.org), book sites (e.g., nybooks.com, editorandpublisher.com), encyclopedia (e.g., Wikipedia) and fact checking sites (e.g., factcheck.org) rank among the top trusted sources. Table 11 shows the most and least trusted sources on four sample topics. Overall, news sources are considered trustworthy with an average rating of 3.46 and variance of 0.15. Tables 12 and 13 show the most and least trusted sources on different viewpoints and media types respectively. Contents from blogs are most likely to be posted followed by newspaper, magazine and other online sources. Contents from wire service, TV and radio are deemed the most trustworthy, although they have the least subscription, followed by magazines. Interactions: In principle, there is a moderate correlation between trustworthy sources generating credible articles (factor (e) in Table 10) identified by expert users (factor (f) in Table 10). A negative sign of correlation indicates decrease in disagreement or MSE with Left Right Most Trusted democracynow, truthdig.com, rollingstone.com courant.com, opinionjournal.com, townhall.com Least Trusted crooksandliars, suntimes.com, washingtonmonthly.com rightwingnews, foxnews.com, weeklystandard.com Center Neutral armedforcesjournal.com, bostonreview.net spiegel.de,cfr.org, editorandpublisher.com sltrib.com, examiner.com, spectator.org msnbc.msn.com, online.wsj.com, techcrunch.com Table 12: Most and least trusted sources with different viewpoints. Magazine Online Newspaper Blog Most Trusted Sources rollingstone.com nybooks.com thenation.com truthdig.com cfr.org consortiumnews nytimes.com nola.com seattletimes juancole.com dailykos.com huffingtonpost investigativevoice northbaltimore hosted.ap.org suntimes.com nydailynews.com dailymail.co.uk rightwingnews firedoglake.com crooksandliars Least Trusted Sources weeklystandard.com commentarymagazine nationalreview.com Table 13: Most and least trusted sources on different types of media. increase in expertise. In a news community, we can observe moderate signals of interaction between various factors that characterize users, articles, and sources. Our CCRF model brings all these features together to build a strong signal for news credibility. 6. RELATED WORK Rating prediction in online communities: Collaborative filtering based approaches [15] for rating prediction exploit user and item similarities by latent factors. [21] further studies the temporal evolution of users and their rating behavior in this framework. Recent works [20, 22] also tap into user review texts to generate userspecific ratings of reviews. Other papers have studied temporal issues for anomaly detection [10].Prior work that tapped user review texts focused on other issues. Sentiment analysis over reviews aimed to learn latent topics [18], latent aspects and their ratings [35], and user-user interactions [36]. Our model unifies several dimensions to jointly study the role of language, users, topics, and interactions for information credibility. Information credibility in social media: [3] analyzes micro-blog postings in Twitter related to trending topics, and classifies them as credible or not based on features from user posting and re-posting behavior. [14] focuses on credibility of users, harnessing the dynamics of information flow in the underlying social graph and tweet content. [2] analyzes both topical content of information sources and social network structure to find credible information sources in social networks. Information credibility in tweets has been studied in [11]. [33] conducts a user study to analyze various factors like contrasting viewpoints and expertise affecting the truthfulness of controversial claims. However, none of these prior works analyze the interplay between sources, language, topics, and users. The works closest to our problem and approach are [34, 23]. [34] presents an algorithm for propagating trust scores in a heterogeneous network of claims, sources, and documents. [23] proposes a method to jointly learn user trustworthiness, statement credibility, and language objectivity in online health communities. However, these works do not analyze the role of topics, language bias, user perspective, expertise, and fine-grained interactions in community. Bias in social communities and media: The use of biased language in Wikipedia and similar collaborative communities has been studied in [9, 28]. Even more broadly, the task of characterizing subjective language has been addressed, among others, in [37, 19]. The influence of different kinds of bias in online user ratings has been studied in [30, 6]. [6] proposes an approach to handle users who might be subjectively different or strategically dishonest. Citizen journalism: [29] defines citizen journalism as “the act of a citizen or group of citizens playing an active role in the process of collecting, reporting, analyzing and dissemination of news and information to provide independent, reliable, accurate, wide-ranging and relevant information that a democracy requires.” [31] focuses on user activities like blogging in community news websites. Although the potential of citizen journalism is greatly highlighted in the recent Arab Spring [12], misinformation can be quite dangerous when relying on users as news sources (e.g., the reporting of the Boston Bombings in 2013 [25]). 7. CONCLUSIONS In this work, we analyzed the effect of different factors like language, topics and perspectives on the credibility rating of articles in a news community. These factors and their mutual interactions are the features of a novel model for jointly capturing credibility of news articles, trustworthiness of news sources and expertise of users. From an application perspective, we demonstrated that our method can reliably identify credible articles, trustworthy sources and expert users in the community. As future work, we plan to model and analyze the temporal evolution of the factors associated with each of the components in our model. We have a strong intuition that time has a significant influence on the trustworthiness of sources and credibility of news. 8. REFERENCES [1] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. J. Mach. Learn. Res., 3, 2003. [2] K. R. Canini, B. Suh, and P. Pirolli. Finding credible information sources in social networks based on content and social structure. In PASSAT, 2011. [3] C. Castillo, M. Mendoza, and B. Poblete. Information credibility on twitter. In WWW, 2011. [4] H. Drucker, C. J. C. Burges, L. Kaufman, A. J. Smola, and V. Vapnik. Support vector regression machines. In NIPS, 1996. [5] H. J. Einhorn, R. M. Hogarth, and E. Klempner. Quality of group judgment. Psychological Bulletin, 1977. [6] H. Fang, J. Zhang, and N. Magnenat Thalmann. Subjectivity grouping: Learning from users’ rating behavior. In AAMAS, 2014. [7] B. J. Fogg. Prominence-interpretation theory: explaining how people assess credibility online. In CHI, 2003. [8] Gallup.com. Americans’ confidence in newspapers continues to erode. http://www.gallup.com/poll/163097/americans-confidencenewspapers-continues-erode.aspx. Accessed: 2015-05-07. [9] S. Greene and P. Resnik. More than words: Syntactic packaging and implicit sentiment. In NAACL, 2009. [10] S. Günnemann, N. Günnemann, and C. Faloutsos. Detecting anomalies in dynamic rating data: A robust probabilistic model for rating evolution. KDD, 2014. [11] A. Gupta and P. Kumaraguru. Credibility ranking of tweets during high impact events. In PSOSM, 2012. [12] P. N. Howard, A. Duffy, D. Freelon, M. Hussain, W. Mari, and M. Mazaid. Opening closed regimes: What was the role of social media during the arab spring? 2011. [13] K. Järvelin and J. Kekäläinen. Cumulated gain-based evaluation of IR techniques. ACM Trans. Inf. Syst., 20(4), 2002. [14] B. Kang, J. O’Donovan, and T. Höllerer. Modeling topic specific credibility on twitter. In IUI, 2012. [15] Y. Koren. Factorization meets the neighborhood: A multifaceted collaborative filtering model. KDD, 2008. [16] C. Lampe and R. K. Garrett. It’s all news to me: The effect of instruments on ratings provision. In HICSS, 2007. [17] S. C. Lewis, K. Kaufhold, and D. L. Lasorsa. Thinking about citizen journalism: The philosophical and practical challenges of user-generated content for community newspapers. Journalism Practice, 4(2), 2010. [18] C. Lin and Y. He. Joint sentiment/topic model for sentiment analysis. CIKM, 2009. [19] C. Lin, Y. He, and R. Everson. Sentence subjectivity detection with weakly-supervised learning. In IJCNLP, 2011. [20] J. McAuley and J. Leskovec. Hidden factors and hidden topics: Understanding rating dimensions with review text. RecSys, 2013. [21] J. J. McAuley and J. Leskovec. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In WWW, 2013. [22] S. Mukherjee, G. Basu, and S. Joshi. Joint author sentiment topic model. In SDM, 2014. [23] S. Mukherjee, G. Weikum, and C. Danescu-Niculescu-Mizil. People on drugs: Credibility of user statements in health communities. KDD, 2014. [24] Nber.org. Media bias and voting. http://www.nber.org/digest/oct06/w12169.html. Accessed: 2015-05-07. [25] Nytimes.com. Should reddit be blamed for the spreading of a smear? http://www.nytimes.com/2013/07/28/magazine/should-reddit-beblamed-for-the-spreading-of-a-smear.html. Accessed: 2015-05-07. [26] T. Qin, T. Liu, X. Zhang, D. Wang, and H. Li. Global ranking using continuous conditional random fields. NIPS, 2008. [27] V. Radosavljevic, S. Vucetic, and Z. Obradovic. Continuous conditional random fields for regression in remote sensing. ECAI, 2010. [28] M. Recasens, C. Danescu-Niculescu-Mizil, and D. Jurafsky. Linguistic models for analyzing and detecting biased language. In ACL, 2013. [29] B. Shayne and W. Chris. We media: How audiences are shaping the future of news and information. 2003. [30] Sloanreview.mit.edu. The problem with online ratings. http://sloanreview.mit.edu/article/the-problem-with-online-ratings-2/ . Accessed: 2015-05-07. [31] A. Stuart. Citizen journalism and the rise of ‘mass self-communication’: Reporting the london bombings. Global Media, 1(1), 2007. [32] B. Tadas, P. Robinson, and L. Morency. Continuous conditional neural fields for structured regression. In ECCV, 2014. [33] V. Vydiswaran et al. BiasTrust: Teaching biased users about controversial topics. CIKM, 2012. [34] V. V. Vydiswaran, C. Zhai, and D. Roth. Content-driven trust propagation framework. In KDD, 2011. [35] H. Wang et al. Latent aspect rating analysis without aspect keyword supervision. KDD, 2011. [36] R. West, H. S. Paskov, J. Leskovec, and C. Potts. Exploiting social network structure for person-to-person sentiment analysis. TACL, 2(2), 2014. [37] J. Wiebe and E. Riloff. Creating subjective and objective sentence classifiers from unannotated texts. In CICLing, 2005.
2
Recognizing Abnormal Heart Sounds Using Deep Learning arXiv:1707.04642v2 [cs.SD] 19 Oct 2017 Jonathan Rubin1 , Rui Abreu2 , Anurag Ganguli2 , Saigopal Nelaturi2 , Ion Matei2 , Kumar Sricharan2 1 Philips Research North America, 2 PARC, A Xerox Company [email protected], [email protected], {anurag.ganguli, saigopal.nelaturi, ion.matei, sricharan.kumar}@parc.com Abstract The work presented here applies deep learning to the task of automated cardiac auscultation, i.e. recognizing abnormalities in heart sounds. We describe an automated heart sound classification algorithm that combines the use of time-frequency heat map representations with a deep convolutional neural network (CNN). Given the cost-sensitive nature of misclassification, our CNN architecture is trained using a modified loss function that directly optimizes the trade-off between sensitivity and specificity. We evaluated our algorithm at the 2016 PhysioNet Computing in Cardiology challenge where the objective was to accurately classify normal and abnormal heart sounds from single, short, potentially noisy recordings. Our entry to the challenge achieved a final specificity of 0.95, sensitivity of 0.73 and overall score of 0.84. We achieved the greatest specificity score out of all challenge entries and, using just a single CNN, our algorithm differed in overall score by only 0.02 compared to the top place finisher, which used an ensemble approach. 1 PhysioNet [Goldberger et al., 2000] has held a Computing in Cardiology Challenge since 2000 that requires participants to automatically analyze physiologic time series data. The 2016 challenge [Clifford et al., 2016] asked participants to perform automated analysis of phonocardiogram (PCG) waveforms, i.e. heart sound data collected using digital stethoscopes. The objective of the challenge was to accurately classify normal and abnormal heart sounds. Recordings were collected from both healthy individuals, as well as those with heart disease, including heart valve disease and coronary artery disease. A PCG plot showing the recording of the (normal) sounds made by the heart is given in Figure 1. Introduction Advances in deep learning [LeCun et al., 2015] are being made at a rapid pace, in part due to challenges such as ILSVRC – the ImageNet Large-Scale Visual Recognition Challenge [Russakovsky et al., 2015]. Successive improvements in deep neural network architectures have resulted in computer vision systems that are better able to recognize and classify objects in images [Lin et al., 2013; Szegedy et al., 2015] and winning ILSVRC entries [Szegedy et al., 2014; He et al., 2015]. While a large focus of deep learning has been on automated analysis of image and text data, advances are also increasingly being seen in areas that require processing other input modalities. One such area is the medical domain where inputs into a deep learning system could be physiologic time series data. An increasing number of large scale challenges in the medical domain, such as [Kaggle, 2014] and [Kaggle, 2015] have also resulted in improvements to deep learning architectures [Liang and Hu, 2015]. Figure 1: A phonocardiogram showing the recording of normal heart sounds, together with corresponding electrocardiogram tracing. S1 is the first heart sound and marks the beginning of systole. Source [Springer et al., 2016]. Heart disease remains the leading cause of death globally, resulting in more people dying every year due to cardiovascular disease compared to any other cause of death [World Health Organization, 2017]. Successful automated PCG analysis can serve as a useful diagnostic tool to help determine whether an individual should be referred on for expert diagnosis, particularly in areas where access to clinicians and medical care is limited. In this work, we present an algorithm that accepts PCG waveforms as input and uses a deep convolutional neural network architecture to classify inputs as either normal or abnor- mal using the following steps: 1. Segmentation of time series A logistic regression hidden semi-Markov model is used to segment incoming heart sound instances into shorter segments beginning at the start of each heartbeat, i.e. the S1 heart sound. 2. Transformation of segments into heat maps Using Mel-frequency cepstral coefficients, one dimensional time series input segments are converted into twodimensional spectrograms (heat maps) that capture the time-frequency distribution of signal energy. 3. Classification of heat maps using a deep neural network A convolutional neural network is trained to perform automatic feature extraction and distinguish between normal and abnormal heat maps. The contributions of this work are as follows: 1. We introduce a deep convolutional neural network architecture designed to automatically analyze physiologic time series data for the purposes of identifying abnormalities in heart sounds. 2. Given the cost-sensitive nature of misclassification, we describe a novel loss function used to train the above network that directly optimizes the sensitivity and specificity trade-off. 3. We present results from the 2016 PhysioNet Computing in Cardiology Challenge where we evaluated our algorithm and achieved a Top 10 place finish out of 48 teams who submitted a total of 348 entries. The remainder of this paper is organized as follows. In Section 2, we discuss related works, including historical approaches to automated heart sound analysis and deep learning approaches that process physiologic time series input data. Section 3 introduces our approach and details each step of the algorithm. Section 4 further describes the modified costsensitive loss function used to trade-off the sensitivity and specificity of the network’s predictions, followed by Section 5, which details the network training decisions and parameters. Section 6 presents results from the 2016 PhysioNet Computing in Cardiology Challenge and in Section 7 we provide a final discussion and end with conclusions in Section 8. 2 Related Work Before the 2016 PhysioNet Computing in Cardiology Challenge there were no existing approaches (to the authors’ knowledge) that applied the tools and techniques of “deep learning” to the automated analysis of heart sounds [Liu et al., 2016]. Previous approaches relied upon a combination of feature extraction routines input into classic supervised machine learning classifiers. Features extracted from heart cycles in the time and frequency domains, as well as wavelet features, time-frequency and complexity-based features were input into artificial neural networks [De Vos and Blanckenberg, 2007; Uğuz, 2012a; Uğuz, 2012b; Sepehri et al., 2008; Bhatikar et al., 2005] and support vector machines [Maglogiannis et al., 2009; Ari et al., 2010; Zheng et al., 2015] for classification. Previous works have also employed Hidden Markov Models for both segmenting PCG signals into the fundamental heart sounds [Springer et al., 2014; Springer et al., 2016], as well as classifying normal and abnormal instances [Wang et al., 2007; Saraçoglu, 2012]. While there have been many previous efforts applied to automated heart sound analysis, gauging the success of historical approaches has been somewhat difficult, due to differences in dataset quality, number of recordings available for training and testing algorithms, recorded signal lengths and the environment in which data was collected (e.g. clinical vs. non-clinical settings). Moreover, some existing works have not performed appropriate train-test data splits and have reported results on training or validation data, which is highly likely to produce optimistic results due to overfitting [Liu et al., 2016]. In this work, we report results from the 2016 PhysioNet Computing in Cardiology Challenge, which evaluated entries on a large hidden test-set that was not made publicly available. To reduce overfitting, no recordings from the same subject were included in both the training and the test set and a variety of both clean and noisy PCG recordings, which exhibited very poor signal quality, were included to encourage the development of accurate and robust algorithms. The work presented in this paper, is one of the first attempts at applying deep learning to the task of heart sound data analysis. However, there have been recent efforts to apply deep learning approaches to other types of physiological time series analysis tasks. An early work that applied deep learning to the domain of psychophysiology is described in [Martı́nez et al., 2013]. They advocate the use of preference deep learning for recognizing affect from physiological inputs such as skin conductance and blood volume pulse within a game-based user study. The authors argue against the use of manual ad-hoc feature extraction and selection in affective modeling, as this limits the creativity of attribute design to the researcher. One difference between the work of [Martı́nez et al., 2013] and ours is that they perform an initial unsupervised pre-training step using stacked convolutional denoising auto-encoders, whereas our network does not require this step and is instead trained in a supervised fashion end-to-end. Similar deep learning efforts that process physiologic time series have also been applied to the problems of epileptic seizure prediction [Mirowski et al., 2008] and human activity recognition [Hammerla et al., 2016]. 3 Approach Recall from Section 1 that our approach consists of three general steps: segmentation, transformation and classification. Each is described in detail below. 3.1 Segmentation of time series The main goal of segmentation is to ensure that incoming time series inputs are appropriately aligned before attempting to perform classification. We first segment the incoming heart sound instances into shorter segments and locate the beginning of each heartbeat, i.e. the S1 heart sound. A logistic regression hidden semi-Markov model [Springer et al., 2016] is used to predict the most likely sequence of heart sound states Figure 2: MFCC heat map visualization of a 3-second segment of heart sound data. Sliding windows, i, are represented on the horizontal axis and filterbank frequencies, j, are stacked along the inverted y-axis. MFCC energy information, ci,j is represented by pixel color in the spectrograms. Also shown are the original one-dimensional PCG waveforms that produced each heat map. (S1 → Systole → S2 → Diastole) by incorporating information about expected state durations. Once the S1 heart sound has been identified, a time segment of length, T , is extracted. Segment extraction can either be overlapping or non-overlapping. Our final model used a segment length of, T = 3 seconds, and we chose to use overlapping segments as this led to performance improvements during initial training and validation. 3.2 Transformation of segments into heat maps Each segment is transformed from a one-dimensional time series signal into a two-dimensional heat map that captures the time-frequency distribution of signal energy. We chose to use Mel Frequency Cepstral Coefficents [Davis and Mermelstein, 1980] to perform this transformation, as MFCCs capture features from audio data that more closely resembles how human beings perceive loudness and pitch. MFCCs are commonly used as a feature type in automatic speech recognition [Godino-Llorente and Gomez-Vilda, 2004]. We apply the following steps to achieve the transformation: log transformation as sound volume is not perceived on a linear scale. c∗i,j = log( ci,j = k (1) n=1 where k ∈ [1, K], K is the length of the DFT and h(n) is a hamming window of length N . The power spectral estimate for window, i, is then given by (2). Pi (k) = 1 |Si (k)|2 N (2) 3. Apply a filterbank of, j ∈ [1, J], triangular band-pass filters, dj,1...K , to the power spectral estimates, Pi (k), and sum the energies in each filter together. Include a J X j=1 c∗i,j cos h k(2i − 1)π i ,k = 1...J 2J (4) The result is a collection ofcepstral coefficients, ci,j for  T window, i. For i = 1 . . . ∆ , ci,j can be stacked together to give a time-frequency heat map that captures changes in signal energy over heart sound segments. Figure 2 illustrates two example heat maps (one derived from a normal heart sound input and the other from an abnormal input), where ci,j is the MFCC value (represented by color) at location, i, on the horizontal axis and, j, on the (inverted) vertical axis. 3.3 si (n)h(n)ei2πn `ν (3) We used a filterbank consisting of J = 26 filters, where frequency ranges were derived using the Mel scale that maps actual measured frequencies, f , to values that better match how humans perceive pitch, M (f ) = f 1125 ln(1 + 700 ). 4. Finally, apply a Discrete Cosine Transform to decorrelate the log filterbank energies, which are correlated due to overlapping windows in the Mel filterbank. 2. Compute the Discrete Fourier transform for each window. Si (k) = dj,k Pi (k)) k=1 1. Given an input segment of length, T , and sampling rate, ν, select a window length, `, and step size, ∆, and extract overlapping sliding windows, si (n),  from the input time T series segment, where i ∈ [1, ∆ ] is the window index and n ∈ [1, `ν] is the sample index. We chose a window length of 0.025 seconds and a step size of 0.01 seconds. `ν X K X Classification of heat maps using a deep neural network The result of transforming the original one-dimensional timeseries into a two-dimensional time-frequency representation is that now each heart sound segment can be processed as an image, where energy values over time can be visualized as a heat map (see Figure 2). Convolutional neural networks are a natural choice for training image classifiers, given their ability to automatically learn appropriate convolutional filters. Therefore, we chose to train a convolutional neural network architecture using heat maps as inputs. Decisions about the number of filters to apply and their sizes, as well as how many layers and their types to include in the network were made by a combination of initial manual Figure 3: Convolutional neural network architecture for predicting normal versus abnormal heart sounds using MFCC heat maps as input exploration by the authors, followed by employing a random search over a limited range of network architecture parameters. Figure 3 depicts the network architecture of a convolutional neural network that accepts as input a single channel 6x300 MFCC heat map and outputs a binary classification, predicting whether the input segment represents a normal or abnormal heart sound. The first convolutional layer learns 64 2x20 kernels, using same-padding. This is followed by applying a 1x20 maxpooling filter, using a horizontal stride of 5, which has the effect of reducing each of the 64 feature maps to a dimension of 6x60. A second convolutional layer applies 64 2x10 kernels over the previous layer, once again using same padding. This is again followed by a max-pooling operation using a filter size of 1x4 and a stride of 2, further reducing each feature map to a dimension of 6x30. At this stage in the architecture a flattening operation is applied that unrolls each of the 64 6x30 feature maps into a single dimensional vector of size 11,520. This feature vector is fed into a first fully connected layer consisting of 1024 hidden units, followed by a second layer of 512 hidden units and finally a binary classification output. 4 Sensitivity-Specificity Loss Trade-off The loss function of the network was altered from a standard softmax cross entropy loss function to instead directly tradeoff between sensitivity and specificity. Given unnormalized log-probabilities, y = W x + b, from a classifier consisting of weight matrix, W , and bias b. The softmax function: s(y (1) ) s(y (2) ) .. .    Y =  e s(yi ) = P eyj (5) j gives probability predictions P (yi |x; W, b) for the class at index, i, for input x. Consider, y ∗(1) y ∗(2) .. .     ∗  ,Y =    y ∗(n) s(y (n) )      (j) where s(yi ), refers to the ith entry of row j and Y ∗ is the corresponding one hot encoded matrix of actual class labels. For the binary class labels of normal (y0∗ ) and abnormal ∗ (y1 ), we define the mask matrices, YN n and YAa , where entries within each matrix are softmax prediction values extracted ∀s(y(j) )∈Y , as follows: YN n  (j) ∗(j) s(y0 ), where y0 = 1 and     arg max {s(y (j) )} = arg max{y ∗(j) } =     0, otherwise YAa  (j) ∗(j)  s(y1 ), where y1 = 1 and   arg max {s(y (j) )} = arg max{y ∗(j) } =     0, otherwise We then define softmax sensitivity, Se , and specificity, Sp , as follows: Se = yi  X Y (j) Aa , ∗(j) j YAa Sp = X Y (j) Nn ∗(j) j (6) YN n The final loss function we wish to minimize is given in (7). LSeSp = −(Se + Sp ) + λR(W ) (7) where λR(W ) is a regularization parameter and routine, respectively. Hyper-parameters Learning rate Beta Dropout Network parameters Regularization Type Batch Size Weight Update Value 0.00015822 0.000076253698849 0.85565561 Value L2 256 Adam Optimization Table 1: Listing of hyper-parameters and selected network parameters. Hyper-parameters were learned over the network architecture described in Section 3.3, using random search over a restricted parameter space. 5 Network Training L2 regularization was computed for each of the fully connected layers’ weight and bias matrices and applied to the loss function. Dropout was applied within both fully connected layers. Table 1 shows the values of hyper-parameters chosen by performing a random search through parameter space, as well as a list of other network training choices, including weight updates and use of regularization. Adam optimization [Kingma and Ba, 2014] was used to perform weight updates. Models were trained on a single NVIDIA GPU with between 4 – 6 GB of memory. A mini-batch size of 256 was selected to satisfy the memory constraints of the GPU. 5.1 Given that each model was trained on 3-second MFCC heat map segments, it was necessary to stitch together a collection of predictions to classify a single full instance. The simple strategy of averaging each class’s prediction probability was employed and the class with the greatest probability was selected as the final prediction. 6 Equations (8) and (9) show the modified sensitivity and specificity scoring metrics that were used to assess the submitted entries to the 2016 PhysioNet Computing in Cardiology Challenge [Clifford et al., 2016]. Uppercase symbols reflect the true class label, which could either be (A)bnormal, or (N )ormal. Lowercase symbols refer to a classifier’s predicted output where, once again, a is abnormal, n is normal and q is a prediction of unsure. A subscript of 1 (e.g. Aa1 , N a1 ) refers to heart sound instances that were considered good signal quality by the challenge organizers and a subscript of 2 (e.g. An2 , N n2 ) refers to heart sound instances that were considered poor signal quality by challenge organizers. Finally, the weights used to calculate sensitivity, wa1 and wa2 , capture the percentages of good signal quality and poor signal quality recordings in all abnormal recordings. Correspondingly for specificity, the weights wn1 and wn2 are the proportion of good signal quality and poor signal quality recordings in all normal recordings. Overall, scores are given by Se+Sp . 2 Training/Validation/Test Datasets The overall dataset used within the PhysioNet Computing in Cardiology Challenge was provided by the challenge organizers and consisted of eight heart sound databases collected from seven countries over a period of more than a decade [Clifford et al., 2016]. In total 4,430 recordings were taken from 1,072 subjects, resulting in 30 hours of heart sound recordings. From this total dataset, 1,277 heart sound recordings from 308 subjects were removed to be used as heldout test data for evaluating challenge submissions. The test dataset was not made publicly available and challengers were only allowed to make 15 submissions, in total, to the challenge server to evaluate their models on a small 20% subset of the hidden dataset, before final results were computed. The number of allowed submissions was limited to avoid the issue of participants implicitly overfitting their models on the hidden test dataset. From the 3153 publicly available PCG waveforms supplied by the challenge organizers, the authors set aside a further 301 instances to be used as a local held-out test-set to gauge model performance before making a submission to the challenge server. The remaining instances were used to train initial models. Models were trained on the overlapping 3-second MFCC segments extracted from the remaining 2852 PCG waveforms. This resulted in approximately 90,000 MFCC heat maps, which were split into a training (∼ 75, 000 instances) and validation set (∼ 15, 000 instances). This training and validation set was unbalanced, consisting of approximately 80% normal segments and 20% abnormal segments. Training was performed on the unbalanced dataset and no attempt was made to compensate for this class imbalance. Results Se = Sp = wa1 · Aa1 wa2 · (Aa2 + Aq2 ) + , Aa1 + Aq1 + An1 Aa2 + Aq2 + An2 (8) wn1 · N n1 wn2 · (N n2 + N q2 ) + N a1 + N q1 + N n1 N a2 + N q2 + N n2 (9) Table 2 shows a selected subset of the results for the 2016 PhysioNet Computing in Cardiology Challenge. For each selected entry, sensitivity, specificity and overall scores are shown, as well as the entry’s final ranking and a brief description of its approach. In total, 348 entries were submitted by 48 teams. Our entry, as described by the algorithm presented in this paper, was ranked 8th with a sensitivity of 0.7278 and specificity of 0.9521, giving an overall score of 0.8399. The top entry to the competition achieved sensitivity of 0.9424, specificity of 0.7781 for an overall score of 0.8602. Also included in Table 2 is the result of a benchmark entry that was supplied by the challenge organizers, which ranked 43rd overall, with a sensitivity of 0.6545 and specificity of 0.7569, for an overall score of 0.7057. 7 Discussion Table 2 shows that the overall scores for the top entries to the PhysioNet Computing in Cardiology challenge were very close. In particular, our entry, which achieved an 8th place ranking, had a difference in score of only 0.02, compared to the top place finisher. For our entry, the overall score of 0.8399 was achieved using a single convolutional neural network, whereas other top place finishers achieved strong classification accuracies using an ensemble of classifiers. Improvements in performance have often been witnessed using Rank 1 2 3 4 5 6 7 8 9 10 43 48 Sensitivity 0.9424 0.8691 0.8743 0.8639 0.8848 0.8063 0.7696 0.7278 0.8691 0.7696 0.6545 0.8063 Specificity 0.7781 0.849 0.8297 0.8269 0.8048 0.8766 0.9125 0.9521 0.7873 0.8831 0.7569 0.2643 Overall 0.8602 0.859 0.852 0.8454 0.8448 0.8415 0.8411 0.8399 0.8282 0.8263 0.7057 0.5353 Description AdaBoost & CNN Ensemble of SVMs Regularized Neural Networks MFCCs, Wavelets, Tensors & kNN Random Forest + LogitBoost Unofficial entry Probability-distribution based Our Approach (see Section 3) Approach Unknown Approach Unknown Provided Benchmark Entry Approach Unknown Table 2: Selected results from the 2016 PhysioNet Computing in Cardiology Challenge an ensemble of networks or separate classifiers and we leave this for future work/improvement. For practical purposes, a diagnostic tool that relies on only a single network, as opposed to a large ensemble, has the advantage of limiting the amount of computational resources required for classification. Deployment of such a diagnostic tool on platforms that impose restricted computational budgets, e.g mobile-based, could perhaps benefit from such a trade-off between accuracy and computational cost. Another point of interest is that our entry to the PhysioNet Computing in Cardiology challenge achieved the greatest specificity score (0.9521) out of all challenge entries. However, the network architecture produced a lower sensitivity score (0.7278). Once again, considering the practical result of deploying a diagnostic tool that relied upon our algorithm, this would likely result in a system with few false positives, but at the expense of misclassifying some abnormal instances. Final decisions about the trade-off between sensitivity and specificity would require further consideration of the exact conditions and context of the deployment environment. A final point of discussion and area of future improvement is that the approach presented was limited to binary decision outputs, i.e. either normal or abnormal heart sounds. An architecture that also considered signal quality as an output would likely result in performance improvement. 8 Conclusion The work presented here is one of the first to apply deep convolutional neural networks to the task of automated heart sound classification for recognizing normal and abnormal heart sounds. We have presented a novel algorithm that combines a CNN architecture with MFCC heat maps that capture the time-frequency distribution of signal energy. The network was trained to automatically distinguish between normal and abnormal heat map inputs and it was designed to optimize a loss function that directly considers the trade-off between sensitivity and specificity. We evaluated the approach by submitting our algorithm as an entry to the 2016 PhysioNet Computing in Cardiology Challenge. The challenge required the creation of accurate and robust algorithms that could deal with heart sounds that exhibit very poor signal quality. Overall, our entry to the challenge achieved a Top-10 place finish out of 48 teams who submitted 348 entries. Moreover, using just a single CNN, our algorithm differed by a score of at most 0.02 compared to other top place finishers, all of which used an ensemble approach of some kind. References [Ari et al., 2010] Samit Ari, Koushik Hembram, and Goutam Saha. Detection of cardiac abnormality from pcg signal using lms based least square svm classifier. Expert Systems with Applications, 37(12):8019–8026, 2010. [Bhatikar et al., 2005] Sanjay R Bhatikar, Curt DeGroff, and Roop L Mahajan. A classifier based on the artificial neural network approach for cardiologic auscultation in pediatrics. Artificial intelligence in medicine, 33(3):251–260, 2005. [Clifford et al., 2016] Gari D Clifford, CY Liu, Benjamin Moody, David Springer, Ikaro Silva, Qiao Li, and Roger G Mark. Classification of normal/abnormal heart sound recordings: the physionet/computing in cardiology challenge 2016. Computing in Cardiology, pages 609–12, 2016. [Davis and Mermelstein, 1980] Steven Davis and Paul Mermelstein. Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences. IEEE transactions on acoustics, speech, and signal processing, 28(4):357–366, 1980. [De Vos and Blanckenberg, 2007] Jacques P De Vos and Mike M Blanckenberg. Automated pediatric cardiac auscultation. IEEE Transactions on Biomedical Engineering, 54(2):244–252, 2007. [Godino-Llorente and Gomez-Vilda, 2004] Juan Ignacio Godino-Llorente and P Gomez-Vilda. Automatic detection of voice impairments by means of short-term cepstral parameters and neural network based detectors. IEEE Transactions on Biomedical Engineering, 51(2):380–384, 2004. [Goldberger et al., 2000] A. L. Goldberger, L. A. N. Amaral, L. Glass, J. M. Hausdorff, P. Ch. Ivanov, R. G. Mark, J. E. Mietus, G. B. Moody, C.-K. Peng, and H. E. Stanley. PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals. Circulation, 101(23):e215–e220, 2000. [Hammerla et al., 2016] Nils Y. Hammerla, Shane Halloran, and Thomas Plötz. Deep, convolutional, and recurrent models for human activity recognition using wearables. In Subbarao Kambhampati, editor, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016, pages 1533–1540. IJCAI/AAAI Press, 2016. [He et al., 2015] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. CoRR, abs/1512.03385, 2015. [Kaggle, 2014] Kaggle. American epilepsy society seizure prediction challenge. https://www.kaggle.com/ c/seizure-prediction, 2014. [Online; accessed 22-December-2016]. [Kaggle, 2015] Kaggle. Grasp-and-Lift EEG Detection. https://www.kaggle.com/c/ grasp-and-lift-eeg-detection, 2015. [Online; accessed 22-December-2016]. [Kingma and Ba, 2014] Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs/1412.6980, 2014. [LeCun et al., 2015] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436– 444, 2015. [Liang and Hu, 2015] Ming Liang and Xiaolin Hu. Recurrent convolutional neural network for object recognition. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015, pages 3367–3375. IEEE Computer Society, 2015. [Lin et al., 2013] Min Lin, Qiang Chen, and Shuicheng Yan. Network in network. CoRR, abs/1312.4400, 2013. [Liu et al., 2016] Chengyu Liu, David Springer, Qiao Li, Benjamin Moody, Ricardo Abad Juan, Francisco J Chorro, Francisco Castells, José Millet Roig, Ikaro Silva, Alistair EW Johnson, et al. An open access database for the evaluation of heart sound algorithms. Physiological Measurement, 37(12):2181, 2016. [Maglogiannis et al., 2009] Ilias Maglogiannis, Euripidis Loukis, Elias Zafiropoulos, and Antonis Stasis. Support vectors machine-based identification of heart valve diseases using heart sounds. Computer methods and programs in biomedicine, 95(1):47–61, 2009. [Martı́nez et al., 2013] Héctor Perez Martı́nez, Yoshua Bengio, and Georgios N. Yannakakis. Learning deep physiological models of affect. IEEE Comp. Int. Mag., 8(2):20– 33, 2013. [Mirowski et al., 2008] Piotr W Mirowski, Yann LeCun, Deepak Madhavan, and Ruben Kuzniecky. Comparing svm and convolutional networks for epileptic seizure prediction from intracranial eeg. In 2008 IEEE Workshop on Machine Learning for Signal Processing, pages 244–249. IEEE, 2008. [Russakovsky et al., 2015] Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211– 252, 2015. [Saraçoglu, 2012] Ridvan Saraçoglu. Hidden markov modelbased classification of heart valve disease with PCA for dimension reduction. Eng. Appl. of AI, 25(7):1523–1528, 2012. [Sepehri et al., 2008] Amir A Sepehri, Joel Hancq, Thierry Dutoit, Arash Gharehbaghi, Armen Kocharian, and A Kiani. Computerized screening of children congenital heart diseases. Computer methods and programs in biomedicine, 92(2):186–192, 2008. [Springer et al., 2014] David B Springer, Lionel Tarassenko, and Gari D Clifford. Support vector machine hidden semimarkov model-based heart sound segmentation. In Computing in Cardiology 2014, pages 625–628. IEEE, 2014. [Springer et al., 2016] David B Springer, Lionel Tarassenko, and Gari D Clifford. Logistic regression-hsmm-based heart sound segmentation. IEEE Transactions on Biomedical Engineering, 63(4):822–832, 2016. [Szegedy et al., 2014] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott E. Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. Going deeper with convolutions. CoRR, abs/1409.4842, 2014. [Szegedy et al., 2015] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. CoRR, abs/1512.00567, 2015. [Uğuz, 2012a] Harun Uğuz. Adaptive neuro-fuzzy inference system for diagnosis of the heart valve diseases using wavelet transform with entropy. Neural Computing and applications, 21(7):1617–1628, 2012. [Uğuz, 2012b] Harun Uğuz. A biomedical system based on artificial neural network and principal component analysis for diagnosis of the heart valve diseases. Journal of medical systems, 36(1):61–72, 2012. [Wang et al., 2007] Ping Wang, Chu Sing Lim, Sunita Chauhan, Jong Yong A Foo, and Venkataraman Anantharaman. Phonocardiographic signal analysis method using a modified hidden markov model. Annals of Biomedical Engineering, 35(3):367–374, 2007. [World Health Organization, 2017] World Health Organization. Cardiovascular diseases (cvds). http://who. int/mediacentre/factsheets/fs317/en/, 2017. [Online; accessed 01-Febuary-2017]. [Zheng et al., 2015] Yineng Zheng, Xingming Guo, and Xiaorong Ding. A novel hybrid energy fraction and entropybased approach for systolic heart murmurs identification. Expert Systems with Applications, 42(5):2710–2721, 2015.
1
Shaping Influence and Influencing Shaping: A Computational Red Teaming Trust-based Swarm Intelligence Model Jiangjun Tang1 , Eleni Petraki2 , and Hussein Abbass1 arXiv:1802.09647v1 [cs.AI] 26 Feb 2018 1 University of New South Wales, School of Engineering and Information Technology, Canberra, ACT 2600, Australia?? . 2 Faculty of Science, Technology, Education, and Mathematics, University of Canberra Canberra, Australia. [email protected],[email protected],[email protected] Abstract. Sociotechnical systems are complex systems, where nonlinear interaction among different players can obscure causal relationships. The absence of mechanisms to help us understand how to create a change in the system makes it hard to manage these systems. Influencing and shaping are social operators acting on sociotechnical systems to design a change. However, the two operators are usually discussed in an ad-hoc manner, without proper guiding models and metrics which assist in adopting these models successfully. Moreover, both social operators rely on accurate understanding of the concept of trust. Without such understanding, neither of these operators can create the required level to create a change in a desirable direction. In this paper, we define these concepts in a concise manner suitable for modelling the concepts and understanding their dynamics. We then introduce a model for influencing and shaping and use Computational Red Teaming principles to design and demonstrate how this model operates. We validate the results computationally through a simulation environment to show social influencing and shaping in an artificial society. Keywords: Influence, Shaping, Trust, Boids 1 Introduction Recently, computational social scientists are attracted to studying means for measuring the concepts of influence and shaping. For influence to work is to exert a form of social power. Servi and Elson [1] introduce a new definition of influence which they apply to online contexts as ‘the capacity to shift the patterns of emotion levels expressed by social media users’. They propose that measuring influence entails identifying shifts in users’ emotion levels followed by the examination of the extent to which these shifts can be connected with a user. ?? Portions of this work was funded by the Australian Research Council Discovery Grant number DP140102590. However, if the process of influence creates shifts in patterns of emotions which can be detected in the short-term, can a persistent application of influencing operators create a long-term shift (i.e. shaping)? Shmueli et.al. [2] discuss computational tools to measure processes for shaping and affecting human behaviour in real life scenarios. Trust was identified as a means to influence humans in a social system. Moreover, trust was found to have a significant impact on social persuasion. Trust is a complex psychological and social concept. A review of the concept can be found in [3]. Larson et.al. [4] are among a few to imply a distinction between influence and shaping, whereby shaping is perceived to be a change to the organization or the environment, while influence fosters attitudes, behaviours or decisions of individuals or groups. However, the majority of the literature follows a tendency to assume that social influencing would lead to shaping. In this paper, we aim to distil subtle differences to distinguish between the two concepts. This distinction is very important for a number of reasons. First, it examines the validity of the implicit assumption that influencing is a sufficient condition for shaping. Second, it is important when studying social sciences using computational models (computational social sciences) to create models that are not ambiguous about the social and psychological phenomena under investigation. Third, it is vital to make it explicit that social influencing and shaping work on different time scales; that is, social influencing is effective in the short run, while shaping requires time and is more effective in the long run. We will use a computational red teaming (CRT) model, whereby a red agent acts on a blue team to influence, shape and sometimes distract the blue team. The idea of the model should not be seen from a competition or conflict perspective. The model is general, were the red agent can be an agent that promotes a positive attitude within a team (a servant leader) or a social worker correcting the social attitude of a gang. 2 Influence, Shaping, and Trust Influence will be defined in this paper as: an operation which causes a short-term effect in the attitude or behaviour of an individual, group or an organization. Shaping, on the other hand, is defined as: an operation which causes a long-term effect in the attitude or behaviour of an individual, group or an organization. We use the more accurate term “effect” rather than the term “change” because sometimes social influence and shaping need to operate to maintain the status quo. If agent A is attempting to influence agent B by changing B’s behaviour, agent C can attempt to counteract agent A’s influence by influencing B to maintain its behaviour. Therefore, influence does not necessarily require a change to occur. In a strict mathematical sense, social influence would change the parameters of a model, while social shaping would alter the constraint system. To illustrate the difference, we will use a model, whereby a group of blue agents attempts to follow a blue leader. A red agent has a self-interest to influence or shape the blue team. All agents are connected through a network. Each agent, excluding the blue leader and the red agent, attempts to align their behaviour with their neighbours (the other agents it is connected to). The blue leader attempts to reach the blue goal (a position in space). When all agents fully trust each other, and in the absence of the red agent’s effect, it is expected that the intention of the blue leader will propagate throughout the network. Over time, the blue agents will also move towards the blue goal. The red agent has a different goal. It aligns with the agents it is connected to, but it also attempts to influence and/or shape them towards its own goal (or away from the blue’s goal). Social influence by red is represented through changing red movements; thus, affecting the movements of its neighbours. Social shaping by red is represented through a network re-wiring mechanism. Connections in a network are the constraints on the network’s topology. By rewiring the network, the red agent changes the constraints system. We abstract trust to a scale between -1 and 1, whereby “1” implies maximum trust, while “-1” implies maximum distrust. We do not differentiate in this paper between distrust and mistrust. A “0” value is a neutral indicator that is equivalent to not knowing a person. 3 The Model An agent-based Boids [5] model is proposed in this paper. All agents are randomly initialized with random headings and locations. Agents are connected through a network structure that allows information exchange among the agents. In this setup, the neighborhood is mostly defined by the hamming distance between two agents in the network, while sometimes it will be defined by the proximity of one agent to another in the physical space. This latter definition is the classic and default one used in the Boids model. Three Boids rules: cohesion, alignment, and separation, are still adopted here. However, the first two vectors are sensed by network connections while the separation vector is perceived through the Euclidean distance in the physical space. Each agent has a trust factor value which decides how much this agent trusts the information perceived from others. The first two vectors are scaled using the trust factor before an agent’s velocity gets updated. An agent 100% trusts the cohesion and alignment information from its linked neighbours when it has a trust factor of 1. When the trust factor is -1, the agent totally believe that the information is deliberately altered to the opposite value, and therefore, the agent reverses the information it receives. In the model, there are three types of agents: blue leader (AB ), red agent (AR ), and blue agent. The blue leader always moves towards a specific location/goal, and attempts to make the other blue agents follow it. The blue agent is an agent that senses its neighbours through network links for both cohesion and alignment but by Euclidean distance for separation, and then makes decisions on its new velocity. The red agent is a special agent in the model who controls the level of noise (η) in the velocity and network connections for influ- encing and shaping. Many blue agents can exist but there is only a single blue leader and a single red agent. Agents form a set A and live in a space (S) defined by a given width (spaceW ) and a given length (spaceL). All agents are connected by a random network. To establish network connections, a probability (p) is defined. If we have n agents including one blue leader, one red agent, and n − 2 blue agents, the network can be denoted as G(n, p). A Goal (G) is a 2-D position that sits at one of the corners of S. Blue leader always aims to move towards G. The area surrounding of G is denoted by δ. Once the blue leader enters this area, the position of G changes. An agent has the following common attributes: – Position (p), p ∈ S, is a 2-D coordinate. – Velocity (v) is a 2-D vector representing the agent’s movement (heading and speed) in a time unit. – Cohesion Velocity (cohesionV ) of an agent is the velocity calculated based on the mass of all agents that are connected to this agent. – Alignment Velocity (alignmentV ) of an agent is the velocity calculated based on the average velocity of all agents that are connected to this agent. – Separation Velocity (separationV ) of an agent is the velocity that forces this agent to keep a certain small distance from its neighbors and is based on the Euclidean distance. – Velocity weights: • Cohesion weight (wc ): a scaler for the cohesion velocity. • Alignment weight (wa ): a scaler for the alignment velocity. • Separation weight (ws ): a scaler for the separation velocity. – Trust factor (τ ) defines how much an agent trusts its connected neighbours. It has an impact on both the cohesion velocity and alignment velocity but not on the separation velocity. All agents except the blue leader attempt moving towards the neighbours’ location guided with the cohesion vector. The cohesion vector,cohesionVi , of an agent Ai is: P|N | j=0 pj − pi (1) cohesionVi = |N | where, |N | is the cardinality of the neighbourhood N . The alignment velocity of an agent with its linked neighbours is: P|N | alignmentVi = j=0 |N | vj − vi (2) The separation velocity of an agent is calculated using neighbours Nd in the spatial proximity of other agents as follows: |Nd | separationVi = − X j=0 (pj − pi ) (3) The trust factor of a blue agent is updated by the average trust factors of all its connected neighbours (N ) as below: P|N | τi = 0.5 × (τi + j=0 τj |N | ) (4) The blue leader and red agent’s trust factors are not updated. The velocity of the blue leader always aims at the goal G at each step and it is not affected by any other factor. The velocities at time t of all agents except the blue leader are updated by Equation 5. v = v + τ × (wc × cohesionV + wa × alignmentV ) + ws × separationV (5) where, cohesionV , AlignmentV , and separationV are normalized vectors. The position at time t of each agent can be updated by: p = p + vt (6) If an agent’s new position is outside the bounds of S, the reflection rule is applied. According to Equation 5, an agent adjusts its own velocity in compliance with both cohesionV and alignmentV when it has a positive trust value, and follows the opposite direction as suggested by cohesionV and alignmentV when its trust factor is negative. If τ = 0, only the separation vector takes effect on this agent so that this agent doesn’t anyone. The red agent introduces heading noise, changes its network structure, or does both at each time step. The heading noise can be propagated to blue agents through the connections of the network to cause a deviation in some blue agents’ moving directions. Changes in the network structure may result in long term effects on blue agents. At each time step, Red agent updates its own velocity (vRedAgent ) by Equation 5 and then Equation 7 uses a normal distribution (N (0, η)) to generate noise and add it to Red’s velocity. vRedAgent = vRedAgent + N (0, η) (7) Equation 6 is used to update the red agent’s position. Furthermore, the red agent has the ability to re-configure network connections by using the noise level η as a probability that governs the eventuality of the following steps: 1. 2. 3. 4. Randomly pick up a blue agent (Ai ) who is connected with the red agent. Randomly pick up another blue agent (Aj ) who is connected with Ai . Break the connection between Ai and Aj . Connect the red agent with a randomly chosen blue agent Aj . In this way, the connection between the red agent and blue agents changes but the number of edges of the whole network remains as before. The long term effects of these topological updates are expected because the path along with information propagates changes and some blue agents may not get consistent updates from their neighbours. The blue leader attempts to lead other blue agents towards a given destination, and the red agent attempts to disorient through influence (deliberate changes in heading) and/or shaping (deliberate re-configuration of network structure). Therefore, the “effect” from our model can be derived as how well the blue agents follow the blue leader given the influence/shaping by the red agent. A straightforward measure of this effect within our model is the average distance between blue agents and the goal when the blue leader reaches the goal. If this distance is small, blue agents followed the blue leader. If it is large, red agent distracted the blue agent. During a single simulation run, the blue leader is tasked to reach the goal multiple times. Each time it reaches the goal (an iteration), the location of the goal changes. The effect is measured at the end of each iteration. The overall effect of a simulation run is the average of all iterations except the first iteration, which is excluded to eliminate the warm-up period in the system resultant from the random initialisation of agents. In summary, the effect is defined by Equation 8. ! n M X 1X 1 ¯ dm,i (8) d= M m=1 n i=1 where, M is the number of iterations except the first one, n is the number of blue agents, and dm,i is the distance between agent i and the goal location at the m’th iteration. 4 Experimental Design Our aim is to evaluate the “effects” of the short term inference and long term shaping caused by the red agent. Two stages are used for the experiments. The first stage focuses on the noise of red agent where the effect from the trust factor is minimised. The second stage investigates both the trust factor and the red agent’s noise. The number of blue agents is 25, so there are a total of 27 agents including a blue leader and a red agent. All agents’ initial locations are uniformly initialised at random within S, where S is a square space with the dimension of 500×500. All agents’ headings are uniformly initialised at random with constant speed of 1. All agents except the blue leader have the same velocity weights: wc = 0.4 for cohesion, wa = 0.4 for alignment, and ws = 0.2 for separation. The initial trust factor values of all blue agents are uniformly assigned at random within the range of [−1, 1]. Connections among agents are created by a random network G(n, 0.1), where n = 27. In all experiments, two levels of noise (η − = 0.1 and η + = 0.9) are used. In the first stage, to reduce the effect of the trust factor, it is assumed constant with a value of 1 for all agents; that is, all blue agents trust any perceived information, including the information arriving from red. In the second stage, the blue leader has two trust levels: τB− = 0.2 and τB+ = 1, and the red agent has two levels of trust: τR− = −0.2 and τR+ = −1. Three scenarios are designed for investigating the red agent’s impact in our experiments. In Scenario 1, the red agent introduces noise to its heading at each time step thus this noise can immediately affect direct neighbours and can be propagated through the network. In Scenario 2, the red agent changes the network structure at each time step thus shaping the environment of the blue agents. In Scenario 3, the red agent introduces noises to its heading and changes network structures at each time step, so that both influence and shaping take place in our model. Using 2k factorial design [6], a total of 2 factor combinations is available at the first stage and 8 at the second stage. Each combination has three individual scenarios to study. Moreover, the randomness exists in the initialisation phase, therefore 10 runs for each factor combination and impact are desired in order to obtain meaningful results. In summary, there are 60 (3 × 2 × 10) simulation runs in the first stage and 240 (3 × 8 × 10) runs in the second stage. The results and analysis are provided in the next section. 5 Results and Discussion The results from the first stage experiments are presented in Table 1. The dis¯ is listed from the tance between blue agents and goal location of each run (d) second column to the eleventh column. And the last three columns of the table are the averages of 10 runs, the standard deviations and the confidence intervals that are obtained at α = 0.05. Table 1: Results of red agent’s noise impact when τB = 1 and τR = 1 R1 R2 η = 0.1 47.64 46.78 η = 0.9 145.90 155.75 eη 98.27 108.97 η = 0.1 45.71 59.28 η = 0.9 61.23 57.63 eη 15.52 -1.65 η = 0.1 45.34 47.09 η = 0.9 213.49 168.69 eη 168.15 121.59 R3 R4 R5 R6 R7 R8 R9 R10 Scenario1: Velocity Noise 39.26 56.63 47.09 67.29 60.65 38.76 42.99 44.86 168.04 199.94 171.94 243.61 162.15 144.08 103.82 117.94 128.78 143.31 124.85 176.33 101.50 105.33 60.83 73.08 Scenario 2: Network Changes 47.39 54.31 58.14 69.65 50.27 44.35 43.90 48.83 56.30 81.25 53.65 74.69 55.76 40.86 47.74 52.03 8.91 26.94 -4.49 5.04 5.49 -3.49 3.85 3.20 Scenario 3: Velocity Noise and Network Changes 65.90 54.05 51.93 84.91 54.66 41.11 43.88 52.21 197.52 188.80 171.62 236.93 174.46 183.98 84.95 122.82 131.62 134.75 119.69 152.02 119.80 142.87 41.07 70.61 Avg STD Conf. 49.19 8.90 6.36 161.32 37.65 26.93 112.12 31.70 22.68 52.18 7.78 58.11 11.36 5.93 9.00 5.56 8.13 6.44 54.11 12.23 8.75 174.32 41.20 29.47 120.22 35.90 25.68 The results show that the more noise the red agent has in its velocity, the more deviation from the goal observed by the blue agents. Changes in the network structure can lower blue agents performance, although the magnitude of this decrease may not be significant. This is expected since the shaping operates work on a smaller timescale than the influence operator. When both influence and shaping work together, the effect is more profound than any of the individual cases in isolation. Table 2: Results of effects from red agent’s noise impact and trust factors. The confidence level is at 0.05. Effect R1 R2 eτ B eτ R eN -170.40 -146.54 165.32 160.08 1.78 15.84 eτ B eτ R eN -122.99 -165.55 142.72 177.17 42.90 1.75 eτ B eτ R eN -151.65 -140.59 157.63 152.23 2.27 22.60 R3 R4 R5 R6 R7 R8 R9 R10 Scenario 1: Velocity Noise -83.92 -55.00 -131.83 -6.05 -128.09 -110.66 -184.81 -152.86 95.83 71.21 149.41 8.11 133.20 111.97 167.79 160.23 -9.18 6.22 6.74 3.40 -13.50 0.35 -14.64 -17.58 Scenario 2: Network Changes -144.34 -64.94 -168.15 -8.09 -154.27 -170.61 -189.59 -187.66 154.10 77.45 186.62 24.03 164.25 172.21 171.13 172.02 12.81 19.08 8.50 -1.08 -0.29 -12.17 25.41 -15.03 Scenario 3: Velocity Noise and Network Changes -132.44 -35.97 -166.98 -7.63 -159.37 -171.89 -194.38 -163.85 147.97 38.06 176.90 16.03 175.96 163.48 171.95 174.82 15.16 14.70 21.23 4.64 5.73 10.22 20.50 8.15 Avg STD Conf. -117.02 55.01 39.35 122.31 51.75 37.02 -2.06 11.04 7.90 -137.62 58.31 41.71 144.17 52.25 37.38 8.19 17.62 12.61 -132.47 61.12 43.72 137.50 59.31 42.43 12.52 7.38 5.28 The results from the second stage are summarised in Table 2. Interestingly, the trust factors of the blue leader and red agent become critical but the red agent’s noise is not critical. The model responses to the trust factor as expected. When the blue leader has a higher level of trust, all blue agents follow it better (smaller effect values can be observed from eτB ). On the other hand, the blue agents demonstrate disorder behaviours (larger value of eτR ) if red agents have small negative trust. These situations are found in all three scenarios and the effects of trust factors are all statistically significant. Although the red agent’s noise has some effects on blue agents, it is very little and can be ignored when compared to the effect of the trust factor. Negative trust values taken by the blue agents counteract the influence generated by both blue and red agents. The red agent’s noise can have impact on blue agents’ behaviours through short term influence (velocity) and long term shaping (network structures) if the effects of trust are low. When the trust factors are high, the situation changes. Trust has a significant impact on blue agents’ behaviours. Figure 1 illustrates the agents’ footprints when the red agent impacts velocity, network structure or both but with minimum trust effects. These footprints are obtained from the first runs of all three scenarios in the first stage and the results are listed in the column “R1” of Table 1. Figure 1a, 1b, and 1c show that the blue leader leads other agents towards the goal well as being demonstrated by a few congested trajectories. When noise increases, blue agents’ trajectories are disturbed as shown in Figure 1d. Figure 1e shows that changes in the network structure seem to not generate much effects on blue agents’ behaviours. However, the blue agents behaviours are more random when red affects both velocity and network structure. This manifests disorderliness as more scattered blue agents’ footprints can be observed in the last figure. Figure 2 shows two examples of agents’ footprints that are affected by trust with small noise values (η = 0.1). The footprints presented in Figure 2a are extracted from the first run of the third scenario in the second stage with τB = 0.2 and τR = −1. When the red agent’s trust is -1, the negative effect on blue 500 45 500 55 500 450 40 450 50 450 400 35 45 400 80 70 400 60 40 350 350 350 30 35 300 300 25 250 30 250 40 250 25 20 200 50 300 200 200 30 20 15 150 150 150 15 10 100 5 50 100 200 300 400 500 100 5 100 200 300 400 50 500 100 (b) Scenario 2: η = 0.1 25 450 20 400 20 100 10 0 (a) Scenario 1: η = 0.1 500 10 50 200 300 400 500 0 (c) Scenario 3: η = 0.1 500 55 500 20 450 50 450 18 400 16 350 14 300 12 250 10 200 8 150 6 100 4 45 400 40 350 350 35 15 300 300 30 250 250 25 10 200 200 20 150 150 15 5 100 50 100 10 50 100 200 300 400 500 (d) Scenario 1: η = 0.9 5 100 200 300 400 500 (e) Scenario 2: η = 0.9 2 50 100 200 300 400 500 0 (f) Scenario 3: η = 0.9 Fig. 1: Agents’ footprints under Red agent’s noise (η) impacts on velocity and network with minimum trust effects (τB = 1 and τR = 1). agents’ trust is continuously broadcasted throughout the network. Eventually, all blue agents will have a negative trust value that is close to -1 since the blue leader doesn’t have much power (τB = 0.2) to compete against the red agent. This results in all blue agents distrusting each other. In this case, the blue agents spread out to the boundaries. However, the reflection rule forces them back into the given space, causing the blue agents to move around the corners after several time steps as shown in Figure 2a. The right side of Figure 2 depicts agents’ footprints extracted from the third scenario in the second stage with τB = 1, τR = −0.2, and η = 0.1. Some trajectory patterns can be observed from Figure 2b. In this case, the blue leader has enough power to beat the red agent in terms of trust. All blue agents will have positive trust that are passed from the blue leader. Although the red agent has influence on their velocity and connections, the blue agents are still capable to follow the blue leader to reach the goal locations (corners) as the trajectory patterns show. From the above examples and previous results, it can be concluded that trust has a more significant impact on blue agents behaviours than the effect of noise caused by the red agent. 6 Conclusion In this paper, we presented a CRT trust-based model which is an extension of the classic Boids. The network topologies for situation awareness and a trust 500 500 500 10 450 450 450 9 400 400 400 8 350 350 350 7 300 300 300 6 250 250 250 5 200 200 200 4 150 150 150 3 100 100 100 2 50 1 50 50 100 200 300 400 500 0 (a) τB = 0.2, τR = −1, and η = 0.1 100 200 300 400 500 0 (b) τB = 1, τR = 0.2, and η = 0.1 Fig. 2: Trust effects on agents behaviours with red agent noise level at 0.1 in Scenario 3. factor on perceived information are introduced into our model. They provide the necessary tools to investigate influence and shaping using CRT. A number of experiments are designed and conducted in order to differentiate the potential impact from influence and shaping on a system. As the results of the first experimental stage suggest, short term influence can have an immediate effect on the system which is easily observed. The long term shaping effects may not be easily observable although it has effect on the system, especially when it interacts with influence. However, trust among agents plays a critical role in the model. Based on our findings in the second experiment, trust dominates the agents’ behaviours regardless of noise. Acknowledgement This is a pre-print of an article published in International Conference in Swarm Intelligence, Springer, Cham, 2016. The final publication is available at https: //doi.org/10.1007/978-3-319-41000-5_2. References 1. Les Servi and Sara Beth Elson. A mathematical approach to gauging influence by identifying shifts in the emotions of social media users. Computational Social Systems, IEEE Transactions on, 1(4):180–190, 2014. 2. Erez Shmueli, Vivek K Singh, Bruno Lepri, and Alex Pentland. Sensing, understanding, and shaping social behavior. Computational Social Systems, IEEE Transactions on, 1(1):22–34, 2014. 3. Eleni Petraki and Hussein Abbass. On trust and influence: A computational red teaming game theoretic perspective. In Computational Intelligence for Security and Defense Applications (CISDA), 2014 Seventh IEEE Symposium on, pages 1–7. IEEE, 2014. 4. Eric V Larson, Richard E Darilek, Daniel Gibran, Brian Nichiporuk, Amy Richardson, Lowell H Schwartz, and Cathryn Q Thurston. Foundations of effective influence operations: A framework for enhancing army capabilities. Technical report, DTIC Document, 2009. 5. Craig W Reynolds. Flocks, herds and schools: A distributed behavioral model. In ACM SIGGRAPH computer graphics, volume 21, pages 25–34. ACM, 1987. 6. Douglas C Montgomery. Design and analysis of experiments. John Wiley & Sons, 2008.
2
arXiv:1705.03510v1 [math.PR] 9 May 2017 The middle-scale asymptotics of Wishart matrices Didier Chételat and Martin T. Wells Department of Applied Mathematics and Industrial Engineering École Polytechnique Montréal, Québec H3T 1J4 Canada e-mail: [email protected] Department of Statistical Science Cornell University 1198 Comstock Hall Ithaca, NY 14853-3801 USA e-mail: [email protected] Abstract: We study the behavior of a real p-dimensional Wishart random matrix with n degrees of freedom when n, p Ñ 8 but p{n Ñ 0. We establish the existence of phase transitions when p grows at the order npK`1q{pK`3q for every k P N, and derive expressions for approximating densities between every two phase transitions. To do this, we make use of a novel tool we call the G-transform of a distribution, which is closely related to the characteristic function. We also derive an extension of the t-distribution to the real symmetric matrices, which naturally appears as the conjugate distribution to the Wishart under a G-transformation, and show its empirical spectral distribution obeys a semicircle law when p{n Ñ 0. Finally, we discuss how the phase transitions of the Wishart distribution might originate from changes in rates of convergence of symmetric t statistics. MSC 2010 subject classifications: Primary 60B20, 60B10; secondary 60E10. 1. Introduction The roots of random matrix theory lies in statistics, with the work of Wishart [1928] and Bartlett [1933], and in numerical analysis, with the work of Von Neumann and Goldstine [1947]. In this early period, many well-known matrix distributions were introduced. This includes the real Gaussian matrix ensemble Gpp, qq, a p ˆ q matrix with independent standard Gaussian entries, the Gaussian orthogonal ensemble GOEppq, the distribution of a symmetric matrix pX ` ? X t q{ 2 with X „ Gpp, pq, and the Wishart (also known as Laguerre) distribution Wp pn, Ip {nq, the distribution of a symmetric matrix XX t {n with X „ Gpp, nq. During that time, the main concern was to derive properties of these distributions for a fixed dimension. Some asymptotics of the Wishart distribution were considered, but only as n Ñ 8 for fixed p. 1 Chételat and Wells/Mid-scale Wishart asymptotics 2 Starting with the pioneering work of Wigner [1951, 1955, 1957], Porter and Rosenzweig [1960], Gaudin [1961] and Mehta [1960a,b], researchers began investigating the asymptotics of Gaussian ensembles as their dimension grew to infinity. As a result of decades of work, the behavior of a GOEppq matrix is now well understood both in the classical setting where p is fixed, and in the setting where p Ñ 8. However, the situation asymptotics of the Wishart distribution is more complicated, as it depends on two parameters, n and p, and initial progress was slow. The work of Marchenko and Pastur [1967] clearly established that the analogue of a Gaussian orthogonal ensemble matrix whose dimension p grows to infinity is a Wishart matrix whose degrees of freedom n and dimension p jointly grow to infinity in such a way that p{n Ñ c P p0, 1q. Since then, we gained a very good understanding of the behavior of Wishart matrices in this regime. But this body of work left open the question as to what happens to a Wishart matrix when n, p Ñ 8 with p{n Ñ 0. Since such asymptotics are middle-scale between the classical regime where p is fixed as n Ñ 8 and the high-dimensional regime where p{n Ñ c P p0, 1q, we might refer to them as middle-scale regimes. Hence, we might ask: what is the asymptotic behavior of a Wishart matrix Wp pn, Ip {nq in the middle-scale regimes? This question is addressed this article. To gain some intuition, it is instructive to look at the eigenvalues λ1 ą ¨ ¨ ¨ ą λp ą 0 of a Wp pn, Ip {nq Wishart matrix. In the classical regime where p is fixed as n Ñ 8, the eigenvalues must all almost surely tend to 1 by the strong law of large numbers. In constrast, in the high-dimensional regime where both n, p Ñ 8 with p{n Ñ c P p0, 1q, the Marchenko-Pastur law states that for any bounded, continuous f , a ż c` n pc` ´ lqpc´ ´ lq 1 ÿ dl a.s., f pλi q Ñ f plq n i“1 2πcl c´ ? where c˘ “ p1 ˘ cq2 . Thus the eigenvalues do not all tend to 1, but rather distribute themselves in the shape of a Marchenko-Pastur law with parameter c. What happens between these two extremes? When c Ñ 0, the MarchenkoPastur law converges weakly to a Dirac measure with mass at 1. This suggests that whenever n, p Ñ 8 with p{n Ñ 0 n 1 ÿ f pλi q Ñ f p1q n i“1 a.s., or in other words that the eigenvalues converge almost surely to 1, as in the classical case. This motivates a binary view of Wishart asymptotics. It appears that the behavior of a Wishart matrix in the middle-scale regimes is the same as in the classical regime, and therefore that there really are only two regimes: lowdimensional where p{n Ñ 0, and high-dimensional where p{n Ñ c P p0, 1q. This binary view has very concrete repercussions. For example, in statistics, many covariance matrix estimators have been developed that leverage high- Chételat and Wells/Mid-scale Wishart asymptotics 3 dimensional Wishart asymptotics (see Pourahmadi [2013] for a review). When faced with a problem where p is large with respect to n, it has been argued that the high-dimensional asymptotics, rather than the classical, constitute the correct model. The binary view provides a useful rule of thumb: small p’s call for classical covariance estimators, while large p’s call for high-dimensional covariance estimators. Unfortunately, recent results establish that this binary view is incorrect. In the classical regime where p is fixed, the central limit theorem implies that ı ? ” n Wp pn, Ip {nq ´ Ip ñ GOEppq, as n Ñ 8, where the arrow stands for weak convergence. In fact, something better is known: recent work has extended this result to the case where p tends to infinity. Recall that the total variation distance between two absolutely continuous distributions şF1 and F2 with densities f and g is given by dTV pF1 , F2 q “ dTV pf1 , f2 q “ |f1 pxq ´ f2 pxq|dx. With different approaches, Jiang and Li [2015] and Bubeck et al. [2016] independently established that ˙ ˆ ” ı ? n Wp pn, Ip {nq ´ Ip , GOEppq Ñ 0 dTV whenever p3 {n Ñ 0. Thus, when p3 {n Ñ 0, the same asymptotics hold as in the p fixed case, and we might regard these regimes as rightfully belonging to the classical setting. The surprising part is that the converse is true! When p3 {n Û 0, results of Bubeck et al. [2016] and Rácz and Richey [2016] show that ˆ ” ˙ ı ? dTV n Wp pn, Ip {nq ´ Ip , GOEppq Û 0. ? Thus a phase transition occurs when p is of the order 3 n. This begs the?question: if a normal approximation fails to hold when p grows faster than 3 n, what asymptotics hold? Is there a uniform asymptotic behavior that holds whenever p{n Ñ 0 with p3 {n Û 0, or are there further phase transitions as the growth rate of p is increased? The results of this paper offers a mostly complete answer to this question. Namely, we establish that when p3 {n Û 0 but p2 {n Ñ 0, ˆ ” ˙ ı ? dTV n Wp pn, Ip {nq ´ Ip , F1 Ñ 0, where F1 is a continuous distribution on the space of real symmetric matrices whose density is given when n ě 3p ´ 3 by ? ˇ „ " ˇ 2i i i 1 3 4 f1 pXq 9 ˇˇE exp ? tr XZ ´ ? tr Z ` tr Z ` 3{2 tr Z 5 4n 5n 8 3 2n ? *ˇ2 ˇ 1 ipp ` 1q p`1 4 2ipp ` 1q 6 2 3 ˇ , ´ 2 tr Z ` ? tr Z ´ tr Z ´ tr Z (1.1) ˇ 3{2 3n 4n 3n 2 2n Chételat and Wells/Mid-scale Wishart asymptotics 4 Fig 1. Correct picture of Wishart asymptotics. This contrasts with the binary view, where no phase transitions occur between p held constant and p growing like n. ? for a Z „ GOEppq. When p grows like n, another phase transition occurs. Namely, we establish that when p2 {n Û 0 but p5{3 {n Ñ 0, ˙ ˆ ” ı ? n Wp pn, Ip {nq ´ Ip , F2 Ñ 0, dTV where F2 is a continuous distribution on the space of real symmetric matrices whose density is given when n ě 3p ´ 3 by ? ˇ „ " ˇ i i 1 2i 3 4 ˇ f2 pXq 9 ˇE exp ? tr XZ ´ ? tr Z ` tr Z ` 3{2 tr Z 5 4n 5n 8 3 2n ? ? ipp`1q 1 2 2i p`1 4 2ipp`1q 7 6 2 tr Z 3 ´ 2 tr Z ´ 5{2 tr Z ` ? tr Z ´ tr Z ´ 3n 4n 7n 3n3{2 2 2n *ˇ2 ˇ p`1 1024pp`1q 512pp`1q 5 4 6 ˇ , ` tr Z ´ tr Z ` i tr Z (1.2) ˇ 4n2 3n3 5n5{2 again for a Z „ GOEppq. In general, for every K P N we find a continuous distribution FK on the space of real symmetric matrices, with density given when n ě 3p ´ 3 by 2K`3` 1rK odds ˇ « # ÿ ˇ ´ 2 ¯ k2 tr Z k i n ˇ fK pXq 9 ˇE exp ? trpXZq ` ik ˇ 4 n k 8 k“3 2K`2´ 1rK odds p `1 ` 4 ÿ k i +ffˇ2 ˇ ˇ ˇ ˇ k ´ 2 ¯ k2 tr Z k n (1.3) k“1 for a Z „ GOEppq, which approximates the normalized Wishart distribution in some (but not all) middle-scale regimes. Namely, we prove the following, which can be regarded as the main result of this paper. Theorem 1.For any K P N,?the total variation distance between the the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s and the K th degree density fK satisfies ˆ ” ˙ ı ? dTV n Wp pn, Ip {nq ´ Ip , FK Ñ 0 Chételat and Wells/Mid-scale Wishart asymptotics 5 as n Ñ 8 with pK`3 {nK`1 Ñ 0. The definition of fK and proof of Theorem 1 are found in Section 6, and follow from definitions and results from Sections 3, 4 and 5 that constitute the bulk of this paper. The main consequence of this theorem is the existence of an infinite countable number of phase transitions, occurring when p grows like npK`1q{pK`3q for K P N. A diagram is provided at Figure 1. This naturally groups“ the middle-scale ˘ log p K K`1 regimes satisfying lim log n ă 1 by which semi-open interval K`2 , K`3 their nÑ8 log p nÑ8 log n limit lim belongs to. We might refer to this grouping as the degree of the log p regime. In other words, we will say an middle-scale regime satisfying lim log n ă nÑ8 “ K K`1 ˘ log p 1 has degree K when lim log n P K`2 , K`3 . nÑ8 The main result of this paper, Theorem 1, may then be summarized as saying that the normalized Wishart distribution can be approximated by the distribution with density fK in every middle-scale regime of degree K or less. The 0th degree case corresponds to the classical setting, while the higher degrees correspond to previously unknown behavior. In fact, we show that our 0th degree approximation F0 is asymptotically equivalent to the Gaussian orthogonal ensemble. The results of this paper can therefore be regarded as a wide generalization of the Wishart asymptotics results of Jiang and Li [2015], Bubeck et al. [2016], Bubeck and Ganguly [2016] and Rácz and Richey [2016]. Our approach relies on a novel technical tool we call the G-transform. It turns out that to understand middle-scale regime behavior of Wishart matrices, densities are less clear than characteristic functions (that is, Fourier transforms of densities). Unfortunately, characteristic functions are difficult to relate to metrics like the total variation distance. To remedy this problem, we develop the G-transform and some associated theory in Section 3. An interesting aspect of G-transform theory is that to every distribution we can associate a closely related distribution called its G-conjugate. In fact, the G-conjugate of a Wishart matrix is essentially a generalization of the t distribution to real symmetric matrices. In Section 4, we define and derive several results concerning this new distribution, including a semicircle law. From these results, we derive in Section 5 approximations to the Wishart distribution for middle-scale regimes of every degree. Since these approximations are given using the language of G-transforms, we derive in Section 6 density approximations, from which Theorem 1 follows. We briefly discuss what concrete effects the phase transitions might have on Wishart asymptotics in Section 7. Finally, we compile auxiliary results in Section 8, while we discuss in Section 9 open questions that arise from these results. Although the results of this paper explain a large part of the behavior of Wishart matrices when p{n Ñ 0, there exists regimes for which p{n Ñ 0 yet log p p R OpnpK`1q{pK`3q q for all K P N, or in other words for which lim log n “ 1. nÑ8 ? An example is when p grows at the order n1´1{ log n . Although the results of our paper characterize almost all middle-scale regimes in the sense that among log p log p those regimes satisfying lim log n ď 1, those such that lim log n “ 1 represent nÑ8 nÑ8 Chételat and Wells/Mid-scale Wishart asymptotics 6 a negligible set, they nonetheless exist. One might regard regimes such as those as having infinite degree. Beyond this, however, it is difficult to say anything about the behavior of Wishart matrices in these regimes. More work in that direction is clearly needed. 2. Notation and definitions The transpose of a matrix is denoted t , and the identity matrix of dimension p is Ip . As is standard, we take the trace operator to have lower priority than the power operator: thus for a matrix X, tr X k means the trace of X k . We will write trk X when we mean the k th power of the trace of X. The Kronecker delta is the symbol δkl “ 1rk “ ls. The space of all real-valued symmetric matrices is denoted Sp pRq “ tX P Mp pRq|X “ X t u. For a symmetric matrix X, we define the symmetric differentiation operator Bs {Bs Xkl by # 1 B for k ­“ l 1 ` δkl B Bs kl “ “ 2 BX B Bs Xkl 2 BXkl for k “ l. BXkk This operator has the elegant property that BSBXS kl trpXY q “ Ykl for any two symmetric matrices X, Y . The space of symmetric matrices Sp pRq can be assimilated to Rppp`1q{2 by mapping a symmetric matrix to its upper triangle. By integration over Sp pRq, we mean integration with respect to the pullback Lebesgue measure under this isomorphism, that is, ż ż f pXq dX “ Sp pRq p ` ˘ź f X dXij . Rppp`1q{2 iďj We say a real symmetric matrix follows the Gaussian orthogonal ensemble GOEppq distribution if Xkl , k ď l are all independent, with diagonal elements Xkk „ Np0, 2q and off-diagonal elements Xkl „ Np0, 1q. Let X be a n ˆ p matrix of i.i.d. Np0, 1q random variables, and let Σ be a p ˆ p positive-definite matrix. The Wishart distribution Wp pn, Σq is the distri1 1 bution of the random matrix Σ 2 X t XΣ 2 . This is a special case of the matrix gamma distribution. Following Gupta and Nagar [1999, Section 3.6], we say a positive-definite matrix X has a matrix gamma distribution Gp pα, Σq with shape parameter α ą pp ´ 1q{2 and scale parameter Σ if it has density over Sp pRq given by ! ) ˇ ˇα´ p`1 1 2 ˇX ˇ exp ´ trpΣ´1 Xq 1rX ą 0s , f pXq “ α |Σ| Γp pαq where Γp is the multivariate gamma function. With this definition, the Wishart distribution Wp pn, Σq is a matrix gamma with shape n2 and scale 2Σ. While studying the Wishart distribution, the expression n ´ p ´ 1 comes up so often that it makes sense to give it its own symbol. We will therefore write m “ n ´ p ´ 1. Chételat and Wells/Mid-scale Wishart asymptotics 7 The Hellinger distance is metric between absolutely continuous probability measures. For two distributions F1 and F2 with densities f1 and f2 , their Hellinger distance is defined as ˇ2 ¯ 12 ´ż ˇ ˇ ˇ 1{2 1{2 HpF1 , F2 q “ Hpf1 , f2 q “ ˇf1 pxq ´ f2 pxqˇ dx . The Hellinger distance is closely related to the total variation distance by the inequalities 1 1{2 dTV pf1 , f2 q ď Hpf1 , f2 q ď dTV pf1 , f2 q. (2.1) 2 In particular, Hpf1 , f2 q Ñ 0 if and only if dTV pf1 , f2 q Ñ 0. Thus they can be seen as inducing the same topology on absolutely continuous probability measures, called the strong topology, in contrast to the topology induced by weak convergence of measures called the weak topology. One can show that if a sequence of measures converges in the strong sense (i.e. in the dTV or H metrics), then it converges weakly. 3. G-transforms Our analysis of Wishart matrices relies heavily on a tool we call the G-transform of a probability measure. To do so, we first need to define the Fourier transform over symmetric matrices. In Section 2, we clarified what we meant by integration over Sp pRq. For a function f : Sp pRq Ñ C in L1 pSp pRqq, we define its Fourier transform to be ż Ftf upT q “ 1 p 22 π ppp`1q 4 e´i trpT Xq f pXq dX. (3.1) Sp pRq It is more common to define the Fourier transform on symmetric(matrices with ( ř the integrand exp ´ i kďl Tkl Xkl , but choosing exp i trpT Xq considerably simplifies our computations. We extend this definition to f P Lr pSp pRqq, 1 ă r ď 2 in the usual manner. Because of the specific normalization chosen, this definition obeys a simple version of Plancherel’s theorem, namely ż ż f pXqs g pXq dX “ Sp pRq Ę q dT. Ftf upT qFtgupT Sp pRq We now define the G-transform. In itself, the definition has nothing to do with symmetric matrices and could have been perfectly well defined on any other space endowed with a Fourier transform. Definition 1 (G-transform of a density). Let f be an integrable function Sp pRq Ñ C. Its G-transform is the complex-valued function Gtf u : Sp pRq Ñ C defined by Gtf u “ Ftf 1{2 u2 , where z 1{2 stands for the principal branch of the complex logarithm. (3.2) Chételat and Wells/Mid-scale Wishart asymptotics 8 In the same way that the Fourier transform maps L2 pSp pRqq to itself, the G-transform maps L1 pSp pRqq to itself. By extension, for an absolutely continuous distribution on Sp pRq with density f , we will define its G-transform to be the G-transform of its density. (This usage mirrors other transforms, such as the Stietjes transform.) We will usually denote the G-transform of f by ψ. Since a density is integrable, this is always well-defined. Moreover, f “ F ´1 tψ 1{2 u2 , so the density can be recovered from the G-transform, and therefore to understand a distribution it is equivalent to study its density or its G-transform. Two comments are in order. First, for many densities, f 1{2 P L1 pSp pRqq. In this case, the G-transform can be written explicitly as ż ˆ ˙2 1 ´i trpT Xq 1{2 (3.3) e f pXq dX . ψpT q “ Gtf upT q “ ppp`1q 2p π 2 Sp pRq Second, throughout this article we will often talk about “the” square root of a G-transform. To be clear, by ψ 1{2 we will always mean Ftf 1{2 u. Now, in many ways, the G-transform behaves similarly to the characteristic function (Fourier transform of a density), but it has unique features. First, Plancherel’s theorem yields that ż ż |ψ 1{2 pT q|2 dT |ψpT q| dT “ Sp pRq żS pRq p ż |f 1{2 pXq|2 dX “ “ Sp pRq |f pXq| dX “ 1. (3.4) Sp pRq Thus |ψ| is itself a density, which we will call the G-conjugate of f . (In particular, ψ 1{2 is much like a quantum-mechanical wavefunction.) We will also use an asterisk notation, so that the G-conjugate of a Np0, 1q distribution will be denoted Np0, 1q˚ . For example, straightforward computations yield that 2 2 ?1 Np0, 1q˚ “ Np0, 1{8q, χ2˚ n “ 8n tn{2 (where χν and tν are the univariate χ and ˚ ´1 ˚ t distributions with ν degrees of freedom, respectively) and paF ` bq “ a F for any distribution F and scalars a ­“ 0, b P R. Studying the G-conjugate of the Wishart distribution will play a key part in deriving results about the Wishart distribution itself. We should note that, in general, the double G-conjugate F ˚˚ is not the same as F . For example, χ2˚˚ is a density involving modified Bessel n functions of the first kind, not a χ2n . A second feature that distinguishes G-transforms from characteristic functions is that they are easy to relate to the Hellinger distance between probability measures. Consider two densities f1 , f2 with G-transforms ψ1 , ψ2 . By analogy, we could define the “total variation” and “Hellinger” distances of ψ1 and ψ2 by ż dTV pψ1 , ψ2 q “ |ψ1 pT q ´ ψ2 pT q| dT, Sp pRq (3.5) Chételat and Wells/Mid-scale Wishart asymptotics ż ´ and 1{2 1{2 |ψ1 pT q ´ ψ2 pT q|2 dT Hpψ1 , ψ2 q “ ¯ 12 . 9 (3.6) Sp pRq Since the modulus of the G-transforms integrate to one, their total variation and Hellinger distances are related to each other in the same way as in Equation 2.1 for densities, namely 1 1{2 dTV pψ1 , ψ2 q ď Hpψ1 , ψ2 q ď dTV pψ1 , ψ2 q. (3.7) 2 Thus dTV pψ1 , ψ2 q Ñ 0 if and only if Hpψ1 , ψ2 q Ñ 0. But the Hellinger distance between G-transforms is much more useful. Indeed, by the Plancherel theorem, for any two densities f1 , f2 with G-transforms ψ1 , ψ2 , their Hellinger distance satisfies ż H2 pf1 , f2 q “ 1{2 1{2 |f1 pXq ´ f2 pXq|2 dX żS pRq p “ 1{2 1{2 |ψ1 pT q ´ ψ2 pT q|2 dT “ H2 pψ1 , ψ2 q. (3.8) Sp pRq Thus to compute the Hellinger distance H2 pf1 , f2 q between two densities, we can instead compute the Hellinger distance H2 pψ1 , ψ2 q of their G-transforms. In contrast, there is no explicit way to express the Hellinger distance in terms of characteristic functions. And no such connection exists between the total variation distances of densities and G-transforms. The G-transform does have some disadvantages compared to the Fourier transform. It is a non-linear transformation (and therefore not a true transform), and it does not behave well with respect to convolution. For our purposes, however, the advantages listed above outweigh these problems. In practice, it is not aways easy to control the Hellinger distance directly, and one often focuses on the Kullback-Leibler divergence instead. The two quantities are related through the well known inequality  „ f1 pXq for X „ f1 . H2 pf1 , f2 q ď E log f2 pXq For G-transforms, the following analog holds, which clarifies our interest in Gconjugates: ˇ2 „  „ˇ ˇ ψ1 pT q ψ1 pT q ˇˇ H2 pψ1 , ψ2 q ď E < Log ` 2E ˇˇ= Log for T „ F1˚ , ψ2 pT q ψ2 pT q ˇ where Log stands for the principal branch of the complex logarithm. In fact, in this article we will need a further generalization, where ψ2 does not need to be a G-transform of a density. Proposition 1 (Kullback-Leibler inequality for G-transforms). Let ψ1 be the G-transform of an absolutely continuous distribution F1 on Sp pRq, and let ψ2 Chételat and Wells/Mid-scale Wishart asymptotics 10 be an integrable function Sp pRq Ñ C. Then ż  „  „ ψ1 pT q H2 pψ1 , ψ2 q ď |ψ2 |pT q dT ´ 1 ` E < Log ψ2 pT q Sp pRq ż ˇ 1 „ˇ ˇ 1 ψ1 pT q ˇˇ 2 ˇ 2 `2 |ψ2 |pT q dT ¨ E ˇ= Log ψ2 pT q ˇ Sp pRq for T „ F1˚ , where Log stands for the principal branch of the complex logarithm. Proof. We can write ż 1{2 H2 pψ1 , ψ2 q “ Sp pRq „ 1{2 1{2 ´ ψ1 ψs2 dT ż ż «  |ψ2 |pT q| ´ 1 ` 2 ´ “ 1{2 |ψ1 |pT q ` |ψ2 |pT q| ´ ψs1 ψ2 1{2 ψ1 pT q Sp pRq 1{2 1{2 ψ2 pT q ` ψ̄2 pT q 1{2 ψ̄1 pT q ff |ψ1 |pT q dT Sp pRq ż „ ż „ |ψ2 |pT q| ´ 1 ` 2 1 ´ #  “ żS pRq żS pRq p „ < p 1{2 ψ2 pT q 1{2 ψ1 pT q +  |ψ1 |pT q dT  „ |ψ2 |pT q| ´ 1 ` 2 1 ´ " * 1 ψ1 pT q exp ´ < Log 2 ψ2 pT q Sp pRq Sp pRq “ ˙  ψ1 pT q 1 = Log |ψ1 |pT q dT . 2 ψ2 pT q a Now using the inequality ´ cospxq ď ´1 ` 2|x| that holds for any x P R. The last quantity is bounded as ˆ ¨ cos ż „ ż  „ |ψ2 |pT q| ´ 1 ` 2 1 ´ " *  1 ψ1 pT q exp ´ < Log |ψ1 |pT q dT 2 ψ2 pT q Sp pRq Sp pRq ď ż `2 ˇ " *dˇ ˇ 1 ψ1 pT q ψ1 pT q ˇˇ ˇ exp ´ < Log ˇ= Log ψ2 pT q ˇ|ψ1 |pT q dT. 2 ψ2 pT q Sp pRq In the second term, use 1 ´ x ď ´ logpxq for x ě 0, while in the third term, use the Cauchy-Schwarz inequality to obtain ż ż „ ď  |ψ2 |pT q| ´ 1 ´ 2 log " * ψ1 pT q 1 |ψ1 |pT q dT exp ´ < Log 2 ψ2 pT q Sp pRq Sp pRq Chételat and Wells/Mid-scale Wishart asymptotics ż `2 11 ż " * 1 ψ1 pT q exp ´< Log |ψ1 |pT q dT 2 ψ2 pT q ˇ 1 ψ1 pT q ˇˇ ˇ ˇ= Log ˇ|ψ1 |pT q dT 2 . ψ2 pT q Sp pRq Sp pRq Now use Jensen’s inequality in the second term and the algebraic identity expt´< Log ψ1 pT q{ψ2 pT qu “ |ψ2 |pT q{|ψ1 |pT q in the third term to obtain ż ż „ ď  |ψ2 |pT q| ´ 1 ` < Log Sp pRq Sp pRq ψ1 pT q |ψ1 |pT q dT ψ2 pT q ż ż |ψ2 |pT q dT 2 ˇ 1 ψ1 pT q ˇˇ ˇ ˇ= Log ˇ|ψ1 |pT q dT 2 , ψ2 pT q Sp pRq Sp pRq 1 `2 as desired. Let us now compute the G-transform of the Gaussian Orthogonal Ensemble and the normalized Wishart distribution, which will be needed in our proofs. The density of a GOEppq matrix over Sp pRq is ! 1 ) 1 fGOE pXq “ ppp`3q ppp`1q exp ´ tr X 2 . (3.9) 4 2 4 π 4 To compute its G-transform, we will make use of the fact that the elements of a GOEppq matrix are independent to reduce the expression to a product of characteristic functions. Proposition 2. The G-transform of the Gaussian Orthogonal Ensemble density on Sp pRq is pp3p`1q ! ) 2 4 ψGOE pT q “ ppp`1q exp ´ 4 tr T 2 . π 4 ? 1{2 Proof. From Equation (3.9), fGOE is proportional to the density of the 2 GOEppq distribution, so it is integrable. Therefore, we can apply Equation (3.3) to find that ż 1 1{2 ψGOE pT q “ p 2 2 π ppp`1q 4 ! ) 1{2 exp ´ i trpT Xq fGOE pXq dX żS pRq p 1 “ 2 ppp`7q 8 π 3ppp`1q 8 ! ) 1 exp ´ i trpT Xq ´ tr X 2 dX 8 żS pRq p 1 “ 2 ppp`7q 8 π 3ppp`1q 8 p p ! ÿ 1ÿ 2 exp ´ 2i Tkl Xkl ´ X 4 kăl kl kăl Rppp`1q{2 ´i p ÿ k“1 Tkk Xkk ´ p p 1 ÿ 2 )ź Xkk dXkl 8 k“1 kďl Chételat and Wells/Mid-scale Wishart asymptotics 12 ż “ 2 pp3p`1q 8 π ppp`1q 8 p ź kăl ) exp ´ 1 X 2 ( ? 4 kl dXkl exp ´ 2iTkl Xkl 4π ! R ż p ź ) exp ´ 1 X 2 ( ? 8 kk dXkk exp ´ iTkk Xkk 8π ! ¨ k“1 “ 2 pp3p`1q 8 π ppp`1q 8 R p p ” ! )ı ” ! ? )ı ź ź E exp ´ 2iTkk Z E exp ´ 8iTkl Z kăl k“1 for Z „ Np0, 1q. The characteristic function of a Np0, 1q is expp´t2 {2q, so pp3p`1q p p ! )ź ! ) ź 2 8 2 2 “ ppp`1q exp ´ 4Tkl exp ´ 2Tkk π 8 kăl k“1 pp3p`1q ! ) 2 8 “ ppp`1q exp ´ 2 tr T 2 . π 8 Squaring this result yields the desired expression for ψGOE . In particular, we see that |ψGOE | is the density of a GOEppq{4 distribution, or in other words that GOEppq˚ “ GOEppq{4. In particular the Gaussian orthogonal ensemble is its own G-conjugate, up to a constant factor. Let us now compute the G-transform of the normalized Wishart distribution. Unlike the GOEppq case, the elements of the matrix are not independent, but the elements of its Cholesky decomposition are. By being careful about complex changes of variables, we can reduce the computation of the G-transform to the computation of characteristic functions of the Cholesky elements. Proposition?3. Let n ě p´2. Then the G-transform of the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s density on Sp pRq is given by ˇ´ n`p`1 " *ˇ 2 ˇ ˇ ? 4T ψNW pT q “ Cn,p exp 2i n tr T ˇˇIp ` i ? ˇˇ n with ˘ ` ppn`2pq Γ2p n`p`1 2 2 4˘ ` Cn,p “ ppp`1q ppp`1q . Γp n2 π 2 n 4 Proof. Recall the notation m “ n ´ p ´ 1 used throughout this article. The density of a Y „ Wp pn, Ip {nq distribution is np ! n ) m n 2 1rY ą 0s ` n ˘ exp ´ tr Y |Y | 2 . fW pY q “ np 2 2 2 Γp 2 ? ? If we do a change of variables X “ npY ´ Ip q, so that Y “ Ip ` X{ n and p p ź ź 1 dYij “ ppp`1q dXij , n 4 iďj iďj ? we see that the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s has den- Chételat and Wells/Mid-scale Wishart asymptotics 13 sity „  ppn`mq n 4 X ` ˘ ? 1 I ` ą 0 np p n 2 2 Γp n2 fNW pXq “ ! n ” X ˇˇ m2 X ı)ˇˇ ¨ exp ´ tr Ip `? ˇIp `? ˇ . (3.10) 2 n n ` 4 ´1 ˘ p`1 n`p`1 1{2 Notice that fW is proportional to expt´ tr r n Ip s Y u|Y | 4 ´ 2 , so it ` ˘ must be proportional to the density of a matrix gamma distribution Gp n`p`1 , n4 Ip 4 ą p´1 when n`p`1 4 2 , i.e. n ě p ´ 2. In particular, it must be integrable. As fNW 1{2 was obtained by a linear change of variables from fW , fNW must be integrable too, that is ż 1{2 fNW pXqdX ă 8. (3.11) Sp pRq Therefore, we can apply Equation (3.3) to obtain ż 1 1{2 ψN W pT q “ “ p 22 π 1 p 22 π ppp`1q 4 ppn´2q 4 1 ppp`1q 4 ! ) 1{2 exp ´ i trpT Xq fNW pXq dX Sp pRq ” ! ) ı ´1{2 E exp ´ i trpT Xq fNW pXq `n˘ „ " *  n ” X ı ˇˇ X ˇˇ´ m4 ? ? E exp ´ i trpT Xq ` tr I ` ` . ˇI ˇ p p ppp`1q ppn`mq 4 n n π 4 n 8 ? If we rewrite the expectation in terms of Y “ Ip ` X{ n, this last expression equals 1 ` ˘ ppn´2q *  „ "´ `? ˘ ? 2 4 Γp2 n2 n ¯ ´m 4 . (3.12) “ ppp`1q ppn`mq exp i n tr T E etr ´i nT ` Ip Y |Y | 4 π 4 n 8 Since T is real symmetric, there must be a spectral decomposition T “ ODOt with O real orthogonal and D real diagonal. As Ot Y O has the same distribution as Y , namely Wp pn, Ip {nq, we can rewrite Equation (3.12) as 1 ` ˘ ppn´2q „ "´ *  ˘ `? ? 2 4 Γp2 n2 n ¯ ´m 4 “ ppp`1q ppn`mq exp i n tr T E etr ´i nD ` Ip Y |Y | . (3.13) 4 π 4 n 8 Now, since Y is positive-definite it has a Cholesky decomposition Y “ U t U with U upper-triangular. According to Bartlett’s theorem [see Muirhead, 1982, Theorem 3.2.14], all the elements of U are independent, the diagonal elements 2 have the distribution Ukk „ χ2n´k`1 {n and the upper diagonal elements have Ukl „ Np0, 1{nq for k ă l. Since „´  p ´ ÿ ? ? Ip ¯ n ¯ 1 tr ´ i nD ` Y “ ´ i nD ` Ip Ukl Ulj 4 4 jk j,k,l “ 2 Γp2 2 Chételat and Wells/Mid-scale Wishart asymptotics p ´ ÿ “ lďk 14 ? n¯ 2 ´ i nDkk ` U 4 lk śp 2 k“1 Ukk , we have by independence and Equation (3.13) that # + p „ 1 ` ˘ ppn´2q * "´ ź ? ? 2 4 Γp2 n2 n¯ 2 “ ppp`1q ppn`mq exp i n tr T U E exp ´ i nDkk ` 4 lk π 4 n 8 lăk *  „ "´ p ź ? n¯ 2 2 ´m E exp ´ i nDkk ` ¨ Ukk pUkk q 4 . (3.14) 4 k“1 and |Y | “ We will now compute these expected values in several steps. For a given 1 ď k ď p, let „ "´  * ? n¯ 2 ´m A “ E exp ´ i nDkk ` (3.15) Tkk Tkk 2 . 4 2 Since Tkk „ χ2n´k`1 {n and m “ n ´ p ´ 1, we have ż8 " * n´k`1 ´ 2 ? m n n¯ ¯ exp ´ i nDkk ` x x´ 4 A “ n´k`1 ´ n´k`1 4 2 2 Γ 0 2 ! n ) n´k`1 ¨ x 2 ´1 exp ´ x dx 2 ż8 " * n´k`1 ´ ¯ n´2k`p`3 n 2 n ? ´1 4 ¯ “ n´k`1 ´ dx (3.16) exp ´ ` nDkk i x x n´k`1 4 2 Γ 2 0 2 Consider the truncated integrands " ´ ¯ * n´2k`p`3 n ? ´1 4 hM pxq “ exp ´ ` nDkk i x x 1r0 ă x ă M s . 4 Clearly this sequence is dominated by the integrable positive function h, " * n´2k`p`3 n ´1 4 , |hM pxq| ď hpxq “ exp ´ x x 4 ˆ ˙ n´2k`p`3 ˙ ˆ ż8 4 4 n ´ 2k ` p ` 3 hpxqdx “ ă 8. Γ n 4 0 Therefore, by the Dominated Convergence Theorem and Equation (3.16), żM " n´k`1 ´n ? ¯ * n´2k`p`3 2 n ´1 4 ¯ lim A “ n´k`1 ´ exp ´ ` nDkk i x x dx. M Ñ8 n´k`1 4 2 2 Γ 0 2 `n ? ˘ By the change of variables z “ 4 ` nDkk i x, this can be rewritten “ n n´k`1 2 ? ˘´ n´2k`p`3 4 nDkk i 4 ` ´ ¯ lim n´k`1 M Ñ8 2 2 Γ n´k`1 2 `n ż nM 4 ? ` nDkk M i e´z z n´2k`p`3 ´1 4 dz. (3.17) 0 To compute this integral, we use a contour argument. Consider the closed path nM C “ C1 ` C2 ` C3 given by C1 a path from 0 to nM 4 , C2 a path from 4 to Chételat and Wells/Mid-scale Wishart asymptotics y nM 4 15 ? ` nDkk M i C3 C2 C1 0 nM 4 x Fig 2. Contour C “ C1 ` C2 ` C3 when Dkk ě 0. The diagram is mirrored around the x axis when Dkk ă 0. ? ? ` nDkk M i and finally C3 a path from nM nDkk M i to 0. A diagram 4 ` is provided as Figure 2. n´2k`p`3 ´1 4 As k ď p, z ÞÑ e´z z is entire and its integral over C must be zero. Therefore ? ˇ ˇ nM ˇ ˇ 4 ` nDkk M i ˇ ˙ˇ ˆ ˇ ˇ n´2k`p`3 n ´ 2k ` p ` 3 ´1 ˇ lim ˇ 4 e´z z dz ´ Γ ˇM Ñ8 ˇ 4 ˇ ˇ ˇ ˇ 0 ? ˇ ˇ nM nM ˇ ˇ 4 ` nDkk M i 4 ˇ ˇ ˇ ˇ n´2k`p`3 n´2k`p`3 ´1 ´1 4 4 “ lim ˇˇ e´z z dz ´ e´x x dxˇˇ M Ñ8 ˇ ˇ ˇ 0 ˇ 0 ? ˇ ˇ ˇ ˇ nM ˇ ˇ ˇ ˇ 4 ` nDkk M i ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ n´2k`p`3 n´2k`p`3 ´z ´z ´1 ´1 ˇ ˇ ˇ 4 4 e z “ lim ˇ e z dz ˇ “ lim ˇ dz ˇˇ . M Ñ8 ˇ M Ñ8 ˇ ˇ ˇ ˇ C2 ˇ ˇ nM ˇ 4 nM ? z´ 4 ? Do a change of variables z “ nM 4 ` y nDkk M i, so that y “ nDkk M i is real on the path. It yields ˇ ˇ 1 ˇ ˇ ˇ „  n´2k`p`3 ´1 ˇ 4 ? ˇ ? ? M ˇˇ nM “ n|Dkk | lim nM ˇ e´y nDkk M i `y nDkk M i dy ˇˇ M Ñ8 e 4 ˇ 4 ˇ ˇ 0 ˇ nM 4 ż ż ż ż ż ż ż ď ? 1 ˇ ˇ n´2k`p`3 n´2k`p`3 ´1 4 ˇn ˇ 4 ? M ˇ ` y nDkk iˇ dy ¨ lim . nM ˇ4 ˇ M Ñ8 e 4 n|Dkk | 0 This last integral is finite, since it is continuous on a bounded interval. Therefore Chételat and Wells/Mid-scale Wishart asymptotics the limit is zero and by Equation (3.17) and the previous expression, ´ ¯ n´k`1 ´n ? ¯´ n´2k`p`3 n 2 Γ n´2k`p`3 4 4 ´ ¯ A “ . ` nDkk i n´k`1 n´k`1 4 2 2 Γ 2 16 (3.18) Going back to (3.14), let us now consider the expectations in the second products. For fixed 1 ď l ă k ď p, let „ "´ * ? n¯ 2 ´ i nDkk ` B “ E exp T . (3.19) 4 lk 2 Since Tlk „ χ21 {n, ż8 c B “ "´ n 2π exp * n ? n ¯ e´ 2 x ´ i nDkk ` x ? dx 4 x 0 ż8 c “ " ´ ¯ * 1 ? n exp ´ ` i nDkk x ? dx. 4 x n 2π (3.20) 0 Consider the truncated integrands  " ´ ¯ * 1 „ 1 ? n ` i nDkk x ? 1 ăxăM . (3.21) hM pxq “ exp ´ 4 x M We see that they are dominated by a positive, integrable function hpxq, c ż8 n e´ 4 x π |hM pxq| ď hpxq “ ? , ă 8. hpxqdx “ 2 x n 0 Therefore, by the Dominated Convergence Theorem and Equation (3.20), we conclude that M c " ´ ¯ * 1 ? n n B “ lim exp ´ ` i nDkk x ? dx. 2π M Ñ8 4 x 1{M ` ˘ ? A complex change of variables z “ n4 ` i nDkk x yields ż ż c “ ¯´ 12 ? n ´n ` i nDkk lim M Ñ8 2π 4 nM 4 ? ` nDkk M i ? e´z { z dz. ? nDkk n 4M ` M (3.22) i Let’s compute this integral again using a contour integration argument. Consider n the contour C “ C1 ` C2 ` C3 ` C4 given by C1 a line from 4M to nM 2 a line 4 , C? ? ? nM nM nM n kk from 4 to 4 ` nDkk M i, C3 a line from 4 ` nDkk M i to 4M ` nD i M ? nD n n kk and C4 a line from?4M ` M i to 4M . A diagram is provided as Figure 3. Since z ÞÑ e´z { z is holomorphic away from zero, ? ? ˇ ˇ ˇ ˇ nM nM nM ˇ ˇ ˇ ˇ 4 ` nDkk M i 4 ` nDkk M i 4 ˇ ˇ ˇ ˇ ˇ ˇ ˇ ˇ ? ? ? ? ´z ´z ´x ˇ lim ˇ “ lim ˇ ˇ e { z dz ´ π e { z dz ´ e { x dx ˇM Ñ8 ˇ M Ñ8 ˇ ˇ ˇ ˇ ˇ ˇ ? ? nDkk nDkk ˇ ˇ ˇ ˇ n n n ` i ` i ż 4M ż ż M 4M M 4M Chételat and Wells/Mid-scale Wishart asymptotics y nM 4 17 ? ` nDkk M i C3 n ` 4M ? nDkk M C2 i C4 0 n 4M C1 nM 4 x Fig 3. Contour C “ C1 ` C2 ` C3 ` C4 when Dkk ě 0. The diagram is mirrored around the x axis when Dkk ă 0. ˇ ˇ ˇ ˇ “ lim ˇ M Ñ8 ˇ ˇ ˇ ˇ ˇ ˇ ď lim ˇˇ M Ñ8 ˇ ˇ ż ż ˇ ˇ ˇ ? ? ˇ e´z { z dz ` e´z { z dz ˇ ˇ ˇ C2 C4 ? ˇ ˇ ˇ nM n ˇ ˇ ˇ 4 ` nDkk M i 4M ˇ ˇ ˇ ˇ ˇ ˇ ? ? e´z { z dz ˇˇ ` ˇˇ e´z { z dz ˇˇ . ˇ ˇ ˇ ˇ ˇ n ` ?nDkk i ˇ nM 4 4M M ? ? nDkk n By changes of variables z “ nM i on the 4 ` y nDkk M i and z “ 4M ` y M two respective integrals, we get ˇ 1 ˇ ˇ ˇ ? ˇ ˇ nD M i y kk ? M ˇ e ˇ “ n|Dkk | lim nM ˇ 1 dy ˇ ı ” M Ñ8 e 4 ˇ ˇ ? 2 ˇ 0 nM ˇ 4 ` y nDkk M i ˇ 1 ˇ ? ˇ ˇ nDkk ˇ ˇ i y ? 1 ˇ e M ˇ ` n|Dkk | lim dy ˇ ˇ n 1 ” ı ? M Ñ8 M e 4M ˇ ˇ 2 n kk ˇ 0 4M ˇ ` y nD i M ż ż ż ż ż1 ď ? n|Dkk | 0 ? 1 M dy ¨ lim nM ˇ ˇ 12 M Ñ8 ? ˇn ˇ e 4 ˇ 4 ` y nDkk iˇ ż1 1 1 ? n . ˇ ˇ 12 dy ¨ Mlim Ñ8 ? M e 4M ˇn ˇ 0 ˇ 4 ` y nDkk iˇ 1 ˇ ˇ ´ 2 ¯´ 14 ? ˇ ˇ´ 2 2 “ n16 ` y 2 nDkk is continuous on r0, 1s, a bounded Since ˇ n4 ` y nDkk iˇ interval, we conclude that the integrals are finite and that the limits are zero. ` ? n|Dkk | Chételat and Wells/Mid-scale Wishart asymptotics Therefore, by Equation (3.22), c ´ ¯´ 12 ? n n B “ ` i nDkk . 2 4 18 (3.23) Recall the definitions of A and B at Equations (3.15) and (3.19). Combining 1{2 both Equations (3.18) and (3.23) into the expression for ψNW at Equation (3.14) provides 1 ` ˘ ppn´2q " *ź p c ´ ¯´ 12 ? ? 2 4 Γp2 n2 n n 1{2 ψNW pT q “ ppp`1q ppn`mq exp i n tr T ` i nDkk 2 4 π 4 n 8 lăk ¯ ´ n´k`1 p n 2 ¯´ n´2k`p`3 ´n ? Γ n´2k`p`3 ź 4 4 ´ ¯ ¨ nD i ` kk n´k`1 n´k`1 4 Γ k“1 2 2 2 ´ ¯ 1 ` ˘ ppn´2q " * n´k`1 k´1 p Γ n´2k`p`3 p n 2 ` ź ź 4 2 ? 2 Γp 2 4 n 2 ` ˘ “ ppp`1q ppn`mq exp i n tr T n´k`1 ` k´1 Γ n´k`1 2 2 π 4 n 8 2 k“1 k“1 2 p ´ n´2k`p`3 ¯ ź ´ ´ k´1 n ? 4 2 ´ nDkk i ¨ 4 k“1 ´ ¯ n´2k`p`3 ˇ n`p`1 " *ˇ pp2n`p`1q p Γ ź ˇn 8 ? ? ˇ´ 4 4 n ` n´k`1 ˘ exp i n tr T ˇˇ Ip ` i nT ˇˇ “ ppn`2q ppp`1q . 4 2 4 π 4 k“1 Γ 2 But by Muirhead [1982, Theorem 2.1.12], p ` ˘ ´ ¯ ppp´1q ś ˘ ` π 4 Γ n`p`1 ` 1´k p Γ n´2k`p`3 4 2 ź Γp n`p`1 4 k“1 4 ` ˘ , ` ˘ “ p ˘ “ Γp n ` ppp´1q ś Γ n´k`1 2 2 k“1 π 4 Γ n2 ` 1´k 2 k“1 so by taking a n{4 factor out of the determinant, we find that ` ˘ ˇ´ n`p`1 " *ˇ ppn`2pq 4 ˇ ? Γp n`p`1 2 4 4T ˇˇ 1{2 4 ˇ ? ψNW pT q “ ppp`1q ppp`1q exp i n tr T I ` i . ` ˘ p ˇ 1{2 nˇ Γp n2 π 4 n 8 Squaring this result yields the desired expression for ψNW . By Proposition 3, when n ě p ´ 2 the G-conjugate of a normalized Wishart distribution must have a density on Sp pRq given by ` ˘ˇ ˇ´ n`p`1 ppn`2pq 4 ˇ Γ2p n`p`1 2 2 16T 2 ˇˇ 4 ` n ˘ ˇˇIp ` |ψNW |pT q “ ppp`1q ppp`1q . (3.24) ˇ n Γp 2 π 2 n 4 As mentioned in the paragraph following Equation (3.4), the G-conjugate of a χ2n {n distribution is a scaled tn{2 . Thus, by analogy, Equation (3.24) should be represent some kind of generalization of the t distribution to the real symmetric matrices. Matrix-variate generalizations of the t distribution have been investigated in the past, but not for symmetric matrices. Hence it appears the concept is new. Chételat and Wells/Mid-scale Wishart asymptotics 19 This motivates us to propose in Section 4 a candidate for a symmetric matrix variate t distribution. Using that definition, the G-conjugate to the normalized Wishart could then be regarded as the t distribution with n{2 degrees of freedom and scale matrix Ip {8, which we denote Tn{2 pIp {8q. But regardless of its name, this distribution will play a key role in our results about the middle-scale regime asymptotics of Wishart matrices, and will be investigated in depth in Section 4. 4. The symmetric matrix variate t distribution In Section 3, Equation (3.24), we proved ? that when n ě p ´ 2, the G-conjugate of the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s has density on Sp pRq given by ` ˘ˇ ˇ n`p`1 ppn`2pq 2 ˇ´ 4 ˇ Γ2p n`p`1 16T 2 2 4 ˇ ` ˘ ˇˇIp ` |ψNW |pT q “ ppp`1q ppp`1q . (4.1) n ˇ Γp n2 π 2 n 4 Two remarks are in order. First, we are unaware of any matrix calculus tools that could let us integrate this expression directly. Thus, the mere fact that this expression integrates to unity, a consequence of being the G-conjugate of another distribution, seems remarkable.? Second, when p “ 1, this is the tn{2 { 8 distribution. Thus, as we mentioned while discussing Equation (3.24), it is natural to interpret this distribution as the parametrization of some generalization of the t distribution to Sp pRq, the space of real-valued symmetric matrices. The purpose of this section is to propose a candidate definition for such generalization, as well as prove several results concerning the normalized Wishart G-conjugate. To the best of our knowledge, no extension of the t distribution to symmetric matrices has ever been proposed. However, a non-symmetric matrix variate t distribution has been thoroughly investigated in the literature – see Gupta and Nagar [1999, Chapter 4] for a thorough summary. Several definitions exist. For our purposes, we say that a p ˆ q real-valued random matrix T has the matrix variate t distribution with ν degrees of freedom and q ˆ q positive-definite scale matrix Ω if it has density ¯ ´ ˇ ˇ´ ν`p`q´1 Γp ν`p`q´1 2 pˇ 2 T Ω´1 T t ˇˇ ´ ˇ 2 ´ ¯ |Ω| I ` . p ˇ ˇ pq pq ν ν 2 π 2 Γ ν`p´1 p 2 It is not exactly clear what should be the proper analog of this distribution for symmetric matrices. But it would be elegant if the degrees of freedom of Equation (4.1) were to be exactly n{2, as in the univariate case. Thus, the following definition seems natural. Definition 2 (Symmetric matrix variate t distribution). We say a real symmetric p ˆ p matrix T has the symmetric matrix variate t distribution with ν ě p{2 ´ 1 degrees of freedom and p ˆ p positive-definite scale matrix Ω, Chételat and Wells/Mid-scale Wishart asymptotics 20 denoted Tν pΩq, if it has density ˇ´ ν`pp`1q{2 ˇ 2 ˇ T Ω´1 T ˇˇ ˇ . fTn pΩq pT q 9 ˇIp ` ˇ ν With this definition, the G-conjugate to the normalized Wishart distribution, whose density is given by Equation (4.1), is the Tn{2 pIp {8q distribution on Sp pRq. In fact, since Equation (4.1) integrates to one, we can deduce the normalization constant of Definition 2. For an arbitrary degrees of freedom parameter ν, imagine the density |ψNW | of the G-conjugate of a normalized Wishart distribution with n “ 2ν ě p ´ 2. By virtue of being a G-conjugate, it must integrate to 1 ? 1 unity. Then from the change of variables T “ Ω´ 4 SΩ´ 4 { 8 which has Jacobian ppp`1q p`1 dT “ 8´ 4 |Ω|´ 4 dS, we see that ż 1“ ż |ψNW |pT q dT “ Sp pRq 2ppν´1q Γ2p “ π ppp`1q 2 ν ´ 1 2 3ppp`1q 4 ν`pp`1q{2 2 ppp`1q 4 |Ω| p`1 4 ˆ ´1 1 ˙ Ω 4 SΩ´ 4 ? dS |ψNW | 8 Sp pRq ż ¯ |Ω| ´ p`1 4 Γp pνq ˇ ˇ ν`pp`1q{2 ´1 ˇ´ 2 ˇ ˇIp ` SΩ S ˇ dS. ˇ ˇ ν Sp pRq Thus we must have fTn pΩq pT q “ 2ppν´1q Γ2p ´ ν`pp`1q{2 2 ¯ ˇ ˇ´ ν`pp`1q{2 2 ˇ T Ω´1 T ˇˇ I ` . p ˇ ˇ ν ´ p`1 4 ˇ |Ω| (4.2) ppp`1q ppp`1q π 2 ν 4 Γp pνq It would be interesting to see if this distribution satisfies the properties we would expect of a t distribution, to ensure our guess is the “correct” one. However, this would take us too far away from the topic of this article. Instead, we will focus in the rest of this section on proving results about Tn{2 pIp {8q, the G-conjugate to the normalized Wishart distribution. Our first result will concern the asymptotic expansion of its normalization constant. We mention that this constant is the same as the Cn,p term appearing in the expression of the G-transform of the normalized Wishart in Proposition 3. Lemma 1. The normalization constant of the Tn{2 pIp {8q distribution ` ˘ ppn`2pq Γ2p n`p`1 2 2 4˘ ` Cn,p “ ppp`1q ppp`1q Γp n2 π 2 n 4 has, for every K P N, the asymptotic expansion " K`1 pp3p`1q 2 4 1 ÿ 1rk evens pk`2 Cn,p “ ppp`1q exp ´ 2 k“1 kpk`1qpk`2q nk π 4 (4.3) K`1 ´ pK`3 ¯* 1 ÿ 1`21rk evens pk`1 ´ ` o K`1 . 4 k“1 kpk`1q nk n as n Ñ 8 with p{n Ñ 0. Chételat and Wells/Mid-scale Wishart asymptotics 21 Proof. By Stirling’s approximation applied to log Γ, as well as Muirhead [1982, Theorem 2.1.12], we find that ˙ ˆ p ÿ ppp ´ 1q i´1 log Γp pxq “ log π ` log Γ x ´ 4 2 i“1 „ˆ ˙ ˆ ˙ p ÿ ppp ´ 1q i´1 1 i´1 “ log π ` x´ ´ log x ´ 4 2 2 2 i“1 ˙ ˆ ˙ ˆ 1 1 i´1 ` log 2π ` O ´ x´ 2 2 x ppp ` 1q p ppp ´ 1q “ log π ` log 2 ´ px ` 4 2 4 ˙ ˆ ˙ p ˆ ´p¯ ÿ i i´1 ` log x ´ `O x´ 2 2 x i“1 as x Ñ 8. Thus ˙ ˆ ´ n ¯ ppp ` 1q p n`p`1 ´ log Γp “ log π ` log 2 2 log Γp 4 2 4 2 ˆ ˙ ˆ ˙ p ppp ` 3q ÿ n`p`1 n`p`1 i´1 ´ ` ´ i log ´ 4 2 4 2 i“1 ˙ ˆ ˙ ˆ p ÿ n i n i´1 ´ log ´ ` op1q ´ 2 2 2 2 i“1 “ ppp ` 1q pp2n ` p ´ 1q ppp ` 1q ppp ` 3q log π ´ log 2 ` log n ´ 4 4 4 4 ˆ ˙ p ¯ 1 ÿ´ 2i´p´3 ` n ´ r2i´p´1s log 1 ´ 2 i“1 n ˆ ˙ p i´1 1ÿ pn ´ iq log 1 ´ ` op1q, ´ 2 i“1 n as n Ñ 8 with p{n Ñ 0, and so by Equation (4.3), pp3p ` 1q ppp ` 1q ppp ` 3q log Cn,p “ log 2 ´ log π ´ 4 4 4 ˙ p ¯ ˆ 1 ÿ´ 2i´p´3 ` n ´ r2i´p´1s log 1 ´ 2 i“1 n ˆ ˙ p 1ÿ i´1 ´ pn ´ iq log 1 ´ ` op1q. (4.4) 2 i“1 n Let us now focus on the two sums in this expression. Recall that for any k ě 1, x2 x3 xk ´ logp1 ´ xq “ x ` ` ` ¨¨¨ ` ` Opxk`1 q as x Ñ 0, (4.5) 2 3 k even for negative x. Therefore, ˆ ˙ p 1ÿ i´1 ´ pn ´ iq log 1 ´ 2 i“1 n Chételat and Wells/Mid-scale Wishart asymptotics 22 ˆ K`4 ˙ p p K`2 K`1 1 ÿ ÿ pi´1qk 1 ÿ ÿ pi´1qk p ´ ` O n i 2 i“1 k“1 k nk 2 i“1 k“1 k nk nK`2 ˆ K`3 ˙ ˙ p p K`1 ˆ p p 1ÿ 1 ÿ ÿ i´1 i pi´1qk `O “ pi´1q ` ´ k K`1 2 i“1 2 i“1 k“1 k´1 k n n n ˆ ˙ ˙ ˆ p K`1 pK`3 ppp ´ 1q 1 ÿ ÿ 1 pi´1qk i´1 `o “ ´ ` k 4 2 i“1 k“1 kpk`1q k n nK`1 ˆ K`3 ˙ p´1 p´1 K`1 K`1 ÿ ppp ´ 1q 1 ÿ 1 1 ÿ 1 ÿ k p k`1 “ ´ i i . ´ ` o k k 4 2 k“1 kpk`1qn i“1 2 k“1 k n i“1 nK`1 “ Now let Bk denote the Bernoulli numbers, with the convention B1 “ 12 . Faulhaber’s formula provides K`1 k`2 ppp ´ 1q 1 ÿ 1 1 ÿ “ ´ ¨ Bk`2´l pp´1ql 4 2 k“1 kpk`1qnk k`2 l“1 ˆ K`3 ˙ K`1 k`1 1 ÿ p 1 ÿ 1 l ¨ Bk`1´l pp´1q ` o . ´ 2 k“1 k nk k`1 l“1 nK`1 But by the binomial theorem, pk`1 n ` op1q and pp´1ql “ op1q nk K`1 ÿ „ˆ pp´1qk`2 nk “ pk`2 nk k`1 ´ pk ` 2q pnk ` op1q, pp´1qk`1 nk “ for any 1 ď l ď k. Thus ˙ k`2 B0 pk`2 ´ pk`2qpk`1 ppp ´ 1q 1 ´ “ 4 2 k“1 k`2 kpk`1qpk`2q nk ˆ ˙  k`2 B1 pk`1 ` ` op1q k`1 kpk`1qpk`2q nk ˙  ˆ K`3 ˙ K`1 „ˆ 1 ÿ k`1 B0 pk`1 p ` op1q ` o . ´ 2 k“1 k`1 kpk`1q nk nK`1 Using that B0 “ 1 and B1 “ 12 , we obtain “ K`1 ppp ´ 1q 1 ÿ 1 pk`2 ´ 4 2 k“1 kpk`1qpk`2q nk ˆ K`3 ˙ K`1 1 ÿ 1 pk`1 p ´ `o . 4 k“1 kpk`1q nk nK`1 (4.6) The analysis of the other sum of Equation (4.4) is similar but more involved, as we must distinguish the cases where p is even and where p is odd. We find, from Equation (4.5) again, that ˙ p ¯ ˆ 1 ÿ´ 2i´p´3 n ´ r2i´p´1s log 1 ´ 2 i“1 n ˆ ˙ ˆ ˙ p p 1ÿ 1ÿ 2i´p´3 2i´p´3 “´ ` p2i´p´1q log 1 ´ n log 1 ´ 2 i“1 n 2 i“1 n Chételat and Wells/Mid-scale Wishart asymptotics 23 ˆ K`4 ˙ p p K`2 K`1 ÿ p2i´p´3qk 1ÿ 1 ÿ ÿ p2i´p´3qk p ´ ` O p2i´p´1q n k k K`2 2 i“1 k n 2 k n n i“1 k“1 k“1 ˙ p p K`1ˆ 1ÿ 1 ÿ ÿ 2i´p´1 2i´p´3 p2i´p´3qk “ p2i´p´3q ` ´ 2 i“1 2 k“1 k“1 k k`1 nk ˆ K`3 ˙ p p `O K`1 n n ˆ K`3 ˙ ˆ ˙ p K`1 k ÿ ÿ p 2i´p´3 2 p2i´p´3q 1 `o ` “p` 2 i“1 k“1 kpk`1q k nk nK`1 “ “p` p K`1 ÿ 1 ÿ 1 p2i´p´3qk`1 2 k“1 kpk`1qnk i“1 ˆ K`3 ˙ p 1 ÿ p k ` p2i´p´3q ` o k K`1 kn n i“1 k“1 „  p ÿ k`1 k`1 k`1 p´p´1q ` p´p`1q ` p2i´p´3q k K`1 ÿ K`1 1 ÿ 1 2 k“1 kpk`1qn i“3  ˆ K`3 ˙ p K`1 ÿ 1 „ ÿ p k k k ` p´p´1q ` p´p`1q ` p2i´p´3q ` o . k kn nK`1 i“3 k“1 “p` (4.7) At this point, it is simpler to analyze the cases where p is even and odd separately. If p is odd, define q “ pp´3q{2 and observe that by Faulhaber’s formula, p q ” ıÿ ÿ p2i´p´3ql “ 1`p´1ql p2iql i“3 i“1 “ 1rl evens l`1 By the binomial theorem, op1q and p2qql “ nk k`1 p´p´1q nk l`1 ÿ ˆ s“1 p2qqk`2 nk “ ˙ l`1 Bl`1´s 2l`1´s p2qqs . s pk`2 nk k`1 ´ 3pk`2q pnk ` op1q, p2qqk`1 nk “ pk`1 nk ` op1q for 1 ď l ď k. Moreover, “ p´p`1qk`1 p´pqk`1 “ ` op1q k n nk (4.8) and p´p´1qk p´p`1qk “ “ op1q. (4.9) nk nk Thus, for odd p, Equation 4.7 equals „ ˆ ˙ K`1 1 ÿ 1 k`2 B0 pk`2 ´ 3pk`2qpk`1 “p` ` 1rk odds 2 k“1 kpk`1q k`2 k`2 nk ˆ ˙  k`2 2B1 pk`1 p´pqk`1 ` 1rk odds `2 ` op1q nk k`1 k`2 nk Chételat and Wells/Mid-scale Wishart asymptotics ` 24  ˆ K`3 ˙ ˆ ˙ K`1 „ 1 ÿ 1 p k`1 B0 pk`1 ` op1q ` o 1rk evens . 2 k“1 k k`1 k`1 nk nK`1 Moreover, 2p´pqk`1 ´ 31rk odds pk`1 ` 1rk odds pk`1 ` 1rk evens pk`1 “ ´1rk evens pk`1 . Thus, ˆ K`3 ˙ K`1 K`1 p 1 ÿ 1rk odds pk`2 1 ÿ 1rk evens pk`1 ´ `o K`1 . “p` 2 k“1 kpk`1qpk`2q nk 2 k“1 kpk`1q nk n (4.10) When p is even, let q “ pp ´ 2q{2 and observe that by Faulhaber’s formula, ˆÿ ˙ p q 2q q ” ıÿ ÿ ÿ l l l l l p2i´p´3q “ 1`p´1q p2i ´ 1q “ 21rl evens i ´ p2iq i“3 i“1 “ 1rl evens l`1 But by the binomial theorem, p2qql nk pk`1 nk l`1 ÿ s“1 ˆ i“1 i“1 ˙ l`1 Bl`1´s p2 ´ 2l`1´s q p2qqs . s p2qqk`2 nk “ pk`2 nk k`1 ´ 2pk `2q pnk ` op1q, p2qqk`1 nk “ ` op1q and “ op1q for 1 ď l ď k. If we apply Equations (4.8)–(4.9), then Equation (4.7) becomes „ ˆ ˙ K`1 1 k`2 p2 ´ 1qB0 pk`2 ´ 2pk ` 2qpk`1 1 ÿ 1rk odds “p` 2 k“1 kpk`1q k`2 k`2 nk ˆ ˙  k`2 p2 ´ 2qB1 pk`1 ` 1rk odds ` op1q k`1 k`2 nk „ ˆ ˙  ˆ K`3 ˙ K k`1 p2 ´ 1qB0 pk`1 p 1 ÿ 1 1rk evens ` op1q `o K`1 . ` k 2 k“1 k k`1 k`1 n n Moreover, 2p´pqk`1 ´ 21rk odds pk`1 ` 1rk evens pk`1 “ ´1rk evens pk`1 . Thus again, “p` ˆ K`3 ˙ K`1 K`1 1 ÿ 1rk odds pk`2 1 ÿ 1rk evens pk`1 p ´ `o . k k 2 k“1 kpk`1qpk`2q n 2 k“1 kpk`1q n nK`1 (4.11) which is the exact same result as in the odd p case (see Equation 4.10). Plugging Equations (4.6) and (4.10)–(4.11) in Equation (4.4), we obtain K`1 ppp ` 1q 1 ÿ pp3p ` 1q 1rk evens pk`2 log 2 ´ log π ´ log Cn,p “ 4 2 2 k“1 kpk`1qpk`2q nk ˆ K`3 ˙ K`1 1 ÿ 1 ` 21rk evens pk`1 p ´ `o K`1 , 4 k“1 kpk`1q nk n as desired. Chételat and Wells/Mid-scale Wishart asymptotics 25 Thus the constant Cn,p is closely related to the normalization constant of the GOEppq distribution 2pp3p`1q{4 {π ppp`1q{2 . We now turn our attention to the study of the asymptotic moments of a Tn{2 pIp {8q distribution. We first remind the reader of some classic results. For a Gaussian Orthogonal Ensemble matrix Z „ GOEppq, a moment-based approach to Wigner’s theorem states that for any k P N, its k th moment satisfy  „ 1 ´ Z ¯k “ Ck{2 1rk evens , lim E tr ? pÑ8 p p `2k˘ 1 where Ck “ k`1 is the k th Catalan number. In fact, Anderson et al. k [2010, section 2.1.4 on‰ p.17] show that the variance of the k th moment satisfies “1 ? lim Var p trpZ{ pqk “ 0, so we really have pÑ8 1 ´ Z ¯k L2 tr ? ÝÑ Ck{2 1rk evens p p as p Ñ 8. “ Now,‰ what do we know about the moments of Tn{2 pIp {8q? By symmetry, E tr T k “ 0 for odd k, but it is much less clear what happens for even k. It turns out that in many ways, if T „ Tn{2 pIp {8q then 4T „ Tn{2 p2Ip q mimics the Gaussian Orthogonal Ensemble results outlined above, especially when p{n Ñ 0 as n Ñ 8. We have the following result. Theorem 2. Let k P N and T „ T“n{2 pIp {8q. ‰ If p{n Ñ c P r0,“1q, the‰moments of T satisfy the asymptotic bounds E tr T 2k “ Oppk`1 q and E tr2 T k “ Oppk`2 q as n Ñ 8. In fact, for any k P N, 1 ´ 4T ¯k L2 tr ? ÝÑ Ck{2 1rk evens p p `2k˘ 1 th Catalan number. as n, p Ñ 8 with p{n Ñ 0, where Ck “ k`1 k is the k Although our proof will rely on the close relationship between the Wishart and the t distribution, it is worthwhile to step back and think why a Tn{2 p2Ip q should behave like a GOEppq when p{n Ñ 0. One good reason might be the classic result that as n Ñ 8, the density of a t distribution converges pointwise to a standard normal density. Thus, we might think that as long as p does not grow too fast, in some aspects the symmetric t distribution should behave like a GOEppq. In the context of the proof, it will prove useful to use the notion of power sum symmetric polynomials. For any integer partition κ “ pκ1 , . . . , κq q in decreasing order κ1 ě ¨ ¨ ¨ ě κq ą 0, define its associated power sum polynomial to be q ź rκ pZq “ tr Z κi . (4.12) i“1 The norm of the partition κ is |κ| “ κ1 ` ¨ ¨ ¨ ` κq ą 0, which should not be confused with its length qpκq “ q (number of elements). By convention, we will assume there also exists an empty partition ∅ “ pq with length qp∅q “ 0, norm |∅| “ 0 and power sum polynomial r∅ pZq “ 1. Chételat and Wells/Mid-scale Wishart asymptotics 26 Let’s now turn to the proof of the theorem. The odd moments of the Tn{2 pIp {8q moments sense to focus on the even moments “ ‰ are zero by symmetry, so it makes “ ‰ E tr T 2k and the square moments E tr2 T k . Our first step in the proof is to express these in terms of expectations of power sum polynomials of an inverse Wishart Y ´1 „ W´1 p pn, Ip {nq, where by power sum polynomials we mean expressions like at Equation (4.12). Recall the useful shorthand m “ n ´ p ´ 1. Lemma 2. Let T „ Tn{2 pIp {8q. Then for any k P N, whenever n is large enough so that n ě p ` 16k ` 6, we can compute the 2k th moment of T by ż np “ ‰ p´1qk E tr T 2k “ nk p ÿ ¨ i1 ,...,i2k ! n )ˇ ˇ m n2 ` n ˘ exp ´ tr Y ˇY ˇ 4 np 4 2 2 Γp 2 Y ą0 ˇ )ˇ ! n ˇ m4 ˇ Bs Bs Bs ˇ ˇ ... dY exp ´ trpY `Xq Y `X ˇˇ Bs Xi1 i2k Bs Xi3 i2 Bs Xi2 i1 4 X“0 “ “ ‰ p´1qk ÿ p1q bκ pn, m, pq E rκ pY ´1 q k n (4.13) |κ|ď2k and its squared k th moment by ż np “ ‰ p´1qk E tr2 T k “ nk ! n )ˇ ˇ m n2 ` n ˘ exp ´ tr Y ˇY ˇ 4 4 2 Γp 2 np 2 p ÿ Y ą0 Bs Bs Bs Bs Bs Bs ... ... B X B X B X B X B X B X s j3 j2 s j2 j1 s i1 ik s i3 i2 s i2 i1 i1 ,...,ik s j1 jk j1 ,...,jk ˇ )ˇ ! n ˇ m4 ˇ ˇ ˇ dY exp ´ trpY `Xq Y `X ˇˇ 4 X“0 k ÿ “ ‰ p´1q “ bκp2q pn, m, pq E rκ pY ´1 q , (4.14) k n ¨ |κ|ď2k`1 for Y ´1 „ W´1 p pn, Ip {nq p1q p2q p1q p2q and some bκ , bκ . These bκ , bκ are polynomials in p1q n, m, p, indexed by integer partitions κ, whose degrees satisfy deg bκ ď 2k ` 1 ´ p2q qpκq and deg bκ ď 2k ` 2 ´ qpκq. The sums are taken over all partitions of the integers κ satisfying |κ| ď 2k and |κ| ď 2k ` 1 respectively, including the empty partition. Proof. Let fNW and ψNW ? stand for the density and the G-transform of a normalized Wishart matrix nrWp pn, Ip {nq ´ Ip s. In the proof of Proposition 3, we 1{2 concluded at Equation (3.11) that fNW had to be integrable when n ě p ´ 2, as its integral was proportional to a multivariate gamma function. Let RpXq “ ´X 1{2 1{2 be the flip operator. Since fNW is integrable, fNW ˝R must be integrable as well, Chételat and Wells/Mid-scale Wishart asymptotics 27 ` 1{2 ˘ 1{2 and so their convolution fNW ‹ fNW ˝ R is well-defined and integrable. At Equation (3.1) at the start of Section 3, we defined our notion of Fourier transform for integrable functions on Sp pRq. Define the map ι : Sp pRq Ñ Rppp`1q{2 that maps a symmetric matrix to its vectorized upper triangle, and let τ : Sp pRq Ñ Sp pRq be the map # 2Xij if i ‰ j τ pXqij “ Xjj if i “ 1. Then in terms of the usual Fourier transform on Rppp`1q{2 , (` ˘ ppp´1q Ftf upT q “ 2 4 F f ˝ ι´1 ι ˝ τ pT q . This close relationship transfer properties to our Fourier transform on Sp pRq. We will need three. ( 1. For any integrable function f , we have F f ˝ R “ Ftf u. 2. (Convolution) For any two integrable functions f1 and f2 , we have Ftf1 ‹ ppp`1q p f2 u “ 2 2 π 4 Ftf1 uFtf2 u. 3. (Fourier inversion) For any continuous integrable f with integrable Fourier transform φ, we have ż f pXq “ 1 p 2 2 π ppp`1q 4 ei trpT Xq φpT q dT “ Ftφup´Xq, Sp pRq for all X P Sp pRq. These properties are important for the following. Since fNW is real-valued, properties 1 and 2 provide ! ) ` 1{2 ˘) ( ppp`1q p 1{2 1{2 1{2 2´ 2 π ´ 4 F fNW ‹ fNW ˝ R “ F fNW F fNW ˝ R ˇ 1{2 ˇ 1{2 ( 1{2 1{2 1{2 ( “ F fNW F fNW “ ψNW ψNW “ ˇψNW ˇ. But then, since |ψNW | is integrable (in fact, to unity), the Fourier inversion formula yields that ż ` 1{2 ˘ 1{2 fNW ‹ fNW ˝ R pXq “ ˇ ˇ ei trpT Xq ˇψNW pT qˇ dT. (4.15) Sp pRq Thus we might say the characteristic function of the Tn{2 pIp {8q distribution is ˘ 1{2 ` 1{2 given by fNW ‹ fNW ˝ R . It is well known that the derivatives of the characteristic function of a distribution evaluated at zero provide its moments, up to a ˘ 1{2 ` 1{2 constant. This suggests should try“ to repeatedly differentiate fNW ‹ fNW ˝R “ we2k ‰ ‰ at zero to compute E tr T and E tr2 T k , our ultimate goal. Unfortunately, the convolution is given by an integral whose domain makes it difficult to directly interchange the differentiation and integration symbols. Because the integrand is orthogonally invariant, we found it easier to compute the derivatives at zero by taking a limit over a sequence of decreasing positive- Chételat and Wells/Mid-scale Wishart asymptotics 28 definite matrices at both sides instead. In this spirit, define on the open set t0 ă X ă Ip u Ă Sp pRq the real-valued functions p´1qk H1 pXq “ nk p ÿ ˘? Bs Bs Bs 1{2 ` 1{2 ... fNW ‹ fNW ˝R p nXq Bs Xi1 i2k Bs Xi3 i2 Bs Xi2 i1 i1 ,...,i2k and p´1qk H2 pXq “ nk p ÿ Bs Bs Bs Bs Bs Bs ... ... Bs Xj1 jk Bs Xj3 j2 Bs Xj2 j1 Bs Xi1 ik Bs Xi3 i2 Bs Xi2 i1 i1 ,...,ik j1 ,...,jk for fixed k, p and n. Here ˘? 1{2 ` 1{2 fNW ‹ fNW ˝R p nXq Bs Bs Xij stands for the symmetric differentiation operator ? “ as defined in Section 2. The n scaling in the argument helps link the convolution to an expectation with respect to an inverse Wishart distribution. Let’s first relate these functions to the moments of the Tn{2 pIp {8q distribution. The symmetric differentation operator has the pleasant property that Bs Bs Xij trpXT q “ Tij for any two symmetric matrices X, T . Thus, for any 1 ď l ď 2k and indices 1 ď i1 , . . . , i2l ď p, we find that ˇ ˇ ? ˇ ˇ ˇ ˇ Bs Bs Bs i n trpT Xq ˇ ˇ ˇ ... ψNW pT qˇˇ e ˇ Bs Xi i Bs Xi4 i3 Bs Xi2 i1 2l 2l´1 ˇ ˇˇ ˇ ˇ ˇ “ nl ˇTi2l i2l´1 ¨ ¨ ¨ Ti4 i3 Ti2 i1 ˇˇψNW ˇpT q (4.16) 1`δij B 2 BXij , Bs Bs Xij for all X P Sp pRq. We now show that the right hand side (4.15) is integrable. This is not a mere formality: when p “ 1, asking if this expression is integrable is the same as asking if the t distribution with n{2 degrees of freedom has an lth moment, and it is well-known that the t distribution only possesses moments of order smaller than its degrees of freedom. So the answer is most likely to be positive, but only for n large enough. Let us see why. For any symmetric matrix T , g f p ´ ¯ bˇ a fź ˇ 2 |Tij | ď λ1 pT q ď e 1 ` λi pT 2 q “ ˇIp ` T 2 ˇ, i“1 where λ1 pT 2 q ě ¨ ¨ ¨ ě λp pT 2 q ě 0 are the ordered eigenvalues of the positivedefinite matrix T 2 . Thus ż ˇ ˇˇ ˇ ˇ ˇ nl ˇTi2l i2l´1 ¨ ¨ ¨ Ti2 i1 ˇˇψNW ˇpT q dT Sp pRq ż 3l 2 n “ l Cn,p 4 ˇ´ n`p`1 ˇ ˇ 4T 4 4Ti2 i1 ˇˇˇˇ 16T 2 ˇˇ ˇ i2l i2l´1 ¨ ¨ ¨ ? ˇˇIp ` dT ˇ ? ˇ n n n Sp pRq Chételat and Wells/Mid-scale Wishart asymptotics ż ˇ ˇ pn´2lq`p`1 2 ˇ´ 4 ˇ ˇIp ` 16T ˇ dT ˇ n ˇ 3l 2 n ď l Cn,p 4 Sp pRq 3l 2 ˆ n Cn,p ď l 4 Cn´2l,p 29 ż n n ´ 2l ˙ppp`1q 4 ˇ ˇ´ pn´2lq`p`1 4 ˇ 16T 2 ˇˇ ˇ Cn´2l,p ˇIp ` dT. n ´ 2l ˇ (4.17) Sp pRq When n ´ 2l ě p ´ 2, the last integrand is the density of a Tn{2´l pIp {8q distribution, so integrates to unity. Thus, when n ě p ` 4k ´ 2, the right hand side of Equation (4.16) is an integrable function for all 1 ď l ď 2k and 1 ď i1 , . . . , i2l ď p. By Equation (4.15), and repeated differentiation under the integral sign justified by the integrability bounds given by Equations (4.16) and (4.17), we find that k H1 pXq “ p´1q nk ż p ÿ ? Bs Bs Bs ... Bs Xi1 i2k Bs Xi3 i2 Bs Xi2 i1 ei i1 ,...,i2k ˇ n trpT Xq ˇ ˇ ψNW pT qˇdT Sp pRq ż tr T 2k ei “ ? ˇ n trpT Xq ˇ ˇ ψNW pT qˇdT (4.18) Sp pRq and p´1qk H2 pXq “ nk p ÿ Bs Bs ... Bs Xj1 jk Bs Xj2 j1 i1 ,...,ik j1 ,...,jk ż Bs Bs Bs ... Bs Xi1 ik Bs Xi3 i2 Bs Xi2 i1 ei ˇ ψNW pT qˇdT Sp pRq ż “ ? ˇ n trpT Xq ˇ tr2 T k ei ? ˇ n trpT Xq ˇ ˇ ψNW pT qˇdT. (4.19) Sp pRq for any X P Sp pRq and any n ě p ` 4k ´ 2. ˘ 1{2 ` 1{2 Now let’s relate H1 and H2 to the definition of fNW‹ fNW˝R as a convolution. This is where restricting H1 and H2 to small positive-definite matrices becomes useful. By Equation (3.10), the expression is ż ˘? 1{2 ` 1{2 fNW ‹ fNW ˝R p nXq “ ż np “ n2 ` ˘ np 2 2 Γp n2 1{2 1{2 fNW pZqfNW pZ ´ ? nXqdZ Sp pRq ! n )ˇ ! n )ˇ ˇ m ˇm exp ´ trpY `Xq ˇY `X ˇ 4 exp ´ tr Y ˇY ˇ 4 dY 4 4 Y `Xą0, Y ą0 ? ppp`1q using the change of variables Y “ Ip ` Z{ n ´ X with dZ “ n 4 dY . For Chételat and Wells/Mid-scale Wishart asymptotics 30 X ą 0, we have 1rY ` X ą 0, Y ą 0s “ 1rY ą 0s, and thus H1 , H2 satisfy H1 pXq “ p ÿ p´1qk nk ż Bs Bs Bs ... Bs Xi1 i2k Bs Xi3 i2 Bs Xi2 i1 i1 ,...,i2k and p´1qk H2 pXq “ nk p ÿ Y ą0 np ˇm ˇ ¨ˇY `X ˇ 4 ! n ) exp ´ trpY `Xq 4 ! n )ˇ ˇ m n2 ` n ˘ exp ´ tr Y ˇY ˇ 4 dY np 4 2 2 Γp 2 (4.20) Bs Bs Bs ... Bs Xj1 jk Bs Xj3 j2 Bs Xj2 j1 i1 ,...,ik j1 ,...,jk ż Bs Bs Bs ... Bs Xi1 ik Bs Xi3 i2 Bs Xi2 i1 ! n )ˇ ˇm exp ´ trpY `Xq ˇY `X ˇ 4 4 Y ą0 np 2 ! n )ˇ ˇ m n ` n ˘ exp ´ tr Y ˇY ˇ 4 dY. (4.21) 4 2 Γp 2 We would now like to interchange the integral and differentiation signs. )To do m so, we must understand what the repeated derivatives of expt´ n4 tr Y |Y | 4 look like. Differentiating once, we see that: ! n )ˇ ˇm Bs exp ´ trpY `Xq ˇY `X ˇ 4 Bs Xi2 i1 4  „ ! n )ˇ ˇm n m ´1 pY `Xqi2 i1 ´ pIp qi2 i1 exp ´ trpY `Xq ˇY `X ˇ 4 . “ 4 4 4 Differentiating twice, we see that: ! n )ˇ ˇm Bs Bs exp ´ trpY `Xq ˇY `X ˇ 4 Bs Xi4 i3 Bs Xi2 i1 4 „ m m ´1 ´1 “ ´ pY `Xq´1 pY `Xq´1 i2 i4 pY `Xqi3 i1 ´ i2 i3 pY `Xqi4 i1 8 8 mn m2 ´1 ´1 ` pY `Xq´1 pY `Xq´1 i4 i3 pY `Xqi2 i1 ´ i4 i3 pIp qi2 i1 16 16  ! n )ˇ ˇm n2 mn ´1 ´1 ´1 ´ pIp q´1 pY `Xq ` pI q pI q trpY `Xq ˇY `X ˇ 4. p i4 i3 p i2 i1 exp ´ i4 i3 i2 i1 16 16 4 So in general, it is clear that the repeated derivatives are) given by some polym nomial in entries of pY ` Xq´1 , times expt´ n4 trpY ` Xq |Y ` X| 4 . We won’t investigate further the nature of these polynomials beyond remarking that for any indices 1 ď l ď 2k and 1 ď i1 , . . . , i2l ď p, and any symmetric matrices X, Y P Sp pRq, we must have some crude bound ˇ ˇ * " ˇ ˇ ˇ m4 ˇ Bs Bs Bs n ˇ ˇ ˇ ... exp ´ trpY `Xq Y `X ˇˇ ˇ Bs Xi i Bs Xi i Bs Xi i 4 ¨ 2l 2l´1 4 3 2 1 np 2 Chételat and Wells/Mid-scale Wishart asymptotics l ÿ ÿ ď 31 s l ˇ ź ˇ ˇ ˇ ˇ ˇź ˇ ˇ ˇpY `Xq´1 ˇ ˇ ˇ pI q pn, mq ˇ ˇaJ,s p j2t j2t´1 j2t j2t´1 "t“1 * ˇ ˇm n ¨ exp ´ trpY `Xq ˇY `X ˇ 4 4 for some polynomials aJ,s that do not depend on X or Y . We relegate a proof of this result as Lemma 3 in Section 8. This can be uniformly bounded for all 0 ď X ď Ip by l ! n )“ ÿ ‰ mp ď C1 pn, m, pq trs pY ´1 q exp ´ tr Y 1 ` tr Y 4 (4.22) 4 s“0 s“0 t“s`1 JP t1,...,pu2l for some constant C1 pn, m, pq that does not depend on X or Y . But for any n ě p ´ 2 and l ě 0, ż l ÿ )“ ! n ‰ mp trs pY ´1 q exp ´ tr Y 1 ` tr Y 4 4 s“0 np ! n )ˇ ˇ m n2 ¨ np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY 4 2 2 Γp 2 C1 pn, m, pq Y ą0 ż “ n np 2 l C1 pn, m, pq ÿ `n˘ np 2 2 Γp 2 s“0 “ 1`tr Y ‰ mp 4 trs pY ´1 q Y ą0 ! n )ˇ ˇ n`p`1 p`1 ´ 2 exp ´ tr Y ˇY ˇ 4 dY 2 ` ˘ ” ı ´ n ¯ mp Γp n`p`1 mp 4 4˘ ` E p1 ` tr Y q 4 trs pY ´1 q “ n 2 Γp 2 ` ˘ for a Y with a matrix gamma distribution Gp n`p`1 , n2 Ip . The Cauchy-Schwarz 4 inequality then entails the bound ˘ ” ` ı 12 ´ n ¯ mp ı 21 ” Γp n`p`1 mp 4 4 ` n ˘ E p1 ` tr Y q 2 E tr2s pY ´1 q . (4.23) ď 2 Γp 2 The first expectation is always finite when n ě p ´ 2. Since tr2s pY ´1 q can be written as a sum of zonal polynomials indexed by partitions of the integer 2s, the results of Muirhead [1982, Theorem 7.2.13] imply that the second expectation is finite whenever n`p`1 ą 2s ` p´1 4 2 ô n ě p ` 8s ´ 2. Thus, in Equation (4.20) with l ď k and (4.21) with l ď 2k, whenever n ě p ` 16k ´ 2 we are justified in repeatedly differentiating under the integral sign by the integrability bounds given by Equations (4.22) and (4.23), and obtain in that case ż p´1qk H1 pXq “ nk p ÿ Y ą0 i1 ,...,i2k Bs Bs Bs ... Bs Xi1 i2k Bs Xi3 i2 Bs Xi2 i1 (4.24) Chételat and Wells/Mid-scale Wishart asymptotics 32 np ! n )ˇ ! n )ˇ ˇ m ˇ m4 n2 ˇ ˇ ` n ˘ exp ´ tr Y ˇY ˇ 4 dY exp ´ trpY `Xq Y `X np 4 4 2 2 Γp 2 (4.25) and ż p ÿ p´1qk H2 pXq “ nk i ,...,ik Y ą0 1 Bs Bs Bs ... Bs Xj1 jk Bs Xj3 j2 Bs Xj2 j1 j1 ,...,jk ! n )ˇ ˇm Bs Bs Bs ... exp ´ trpY `Xq ˇY `X ˇ 4 Bs Xi1 ik Bs Xi3 i2 Bs Xi2 i1 4 np ! n )ˇ ˇ m n2 ¨ np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY. 4 2 2 Γp 2 (4.26) Let us now look at how H1 pXq and H2 pXq behave as X Ñ 0. On one hand, a ? for any symmetric matrix T we have | tr T k | ď p tr T 2k ď p|Ip ` T 2 |k{2 , so we must have the bounds ˇ ˇ ˇ ˇ pn´4kq`p`1 k 2 ˇ´ 4 ? ˇ ˇ ˇˇ ˇ n C 16T n,p 2k i n trpT Xq ˇ tr T e ˇψNW pT qˇˇ ď ˇ ˇ ˇ 16k Cn´4k,p Cn´4k,p ˇIp ` n ˇ ˇ and ˇ ˇ ˇ pn´4kq`p`1 ˇ k 2 ˇ´ 4 ˇˇ ˇ 2 k i?n trpT Xq ˇ ˇ pn C 16T n,p ˇψNW pT qˇˇ ď ˇ tr T e ˇ ˇ . ˇ 16k Cn´4k,p Cn´4k,p ˇIp ` n ˇ ˇ holding uniformly in X. When n ´ 4k ě p ´ 2 ô n ě p ` 4k ´ 2, the right hand sides are proportional to the density of the G-conjugates of the normalized Wishart distributions with n ´ 4k degrees of freedom, so are integrable. Thus, by the dominated convergence theorem and Equations (4.18) and (4.19), ż lim XÑ0 H1 pXq 0ăXăIp “ ˇ ˇ “ ‰ lim ? tr T 2k XÑ0 ei n trpT Xq ˇψNW pT qˇdT “ E tr T 2k (4.27) 0ăXăIp Sp pRq and lim XÑ0 H2 pXq 0ăXăIp ż “ lim ei?n trpT Xq ˇˇψ pT qˇˇdT “ E“tr2 T k ‰ tr2 T k XÑ0 NW (4.28) 0ăXăIp Sp pRq for T „ Tn{2 pI{ 8q. On the other hand, the integrands at Equations (4.25) and (4.26) take a particularly simple form. Lemma 4 establishes by induction that there must be p1q p2q p1q polynomials bκ and bκ in n, m and p with degrees deg bκ ď 2k ` 1 ´ qpκq Chételat and Wells/Mid-scale Wishart asymptotics 33 p2q and deg bκ ď 2k ` 2 ´ qpκq such that ż p´1qk H1 pXq “ nk ÿ bp1q κ pn, m, pqrκ prY ` Xs |κ|ď2k Y ą0 " * n q exp ´ trpY ` Xq 4 np ˇ ˇm ¨ˇY ` X ˇ 4 and ´1 ! n )ˇ ˇ m n2 ` n ˘ exp ´ tr Y ˇY ˇ 4 dY 4 2 Γp 2 np 2 (4.29) ż p´1qk H2 pXq “ nk ÿ bp2q κ pn, m, pqrκ prY |κ|ď2k`1 ´1 ` Xs " * n q exp ´ trpY ` Xq 4 Y ą0 np ! n )ˇ ˇ m n2 ` n ˘ exp ´ tr Y ˇY ˇ 4 dY (4.30) 4 2 Γp 2 for any 0 ă X ă Ip and n ě p ` 16k ´ 2. The sums are taken over all partitions of the integers κ satisfying |κ| ď 2k and |κ| ď 2k ` 1 respectively, including the empty partition. But for any integer partition κ, the bound ˇm ˇ “ ‰ mp n n rκ prY ` Xs´1 qe´ 4 trpY `Xq ˇY ` X ˇ 4 ď tr|κ| pY ´1 qe´ 4 tr Y 1 ` tr Y 4 ˇ ˇm ¨ˇY ` X ˇ 4 np 2 holds uniformly in 0 ď X ď Ip . Thus for |κ| ď 2k ` 1, the right hand side is integrable for n ě p ` 16k ` 6, by the same argument as for Equation (4.23). Thus for such n, by the dominated convergence theorem and Equations (4.29) and (4.30), we obtain that ż lim XÑ0 H1 pXq 0ăXăIp “ p´1qk nk lim XÑ0 0ăXăIp Y ą0 ÿ ´1 bp1q q κ pn, m, pqrκ prY ` Xs |κ|ď2k " * np ! n )ˇ ˇ m ˇ ˇm n n2 ¨ exp ´ trpY ` Xq ˇY ` X ˇ 4 np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY 4 4 2 2 Γp 2 k ÿ “ ‰ p´1q ´1 “ bp1q q (4.31) κ pn, m, pq E rκ pY nk |κ|ď2k and lim ż XÑ0 H2 pXq 0ăXăIp “ p´1qk nk lim XÑ0 0ăXăIp Y ą0 ÿ ´1 bp2q q κ pn, m, pqrκ prY ` Xs |κ|ď2k`1 " * np )ˇ ˇ m ! n ˇ ˇm n2 n ¨ exp ´ trpY ` Xq ˇY ` X ˇ 4 np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY 4 4 2 2 Γp 2 k ÿ “ ‰ p´1q ´1 “ bp2q q , (4.32) κ pn, m, pq E rκ pY k n |κ|ď2k`1 Chételat and Wells/Mid-scale Wishart asymptotics 34 where Y follows a Wp pn, Ip {nq distribution. Combining Equations (4.27)–(4.28) with Equations (4.31)–(4.32) and Lemma 4 concludes the proof. Something remarkable about Lemma 2 is that it provides us with an algorithm to compute the moments of a symmetric t distribution in terms of the moments of an inverse Wishart matrix. For example, when k “ 1, repeated differentiation yields that p ! n )ˇ ÿ ˇm Bs Bs exp ´ trpY `Xq ˇY `X ˇ 4 BX BX 4 i1 ,i2 s i1 i2 s i2 i1 „ mpm ´ 2q mn n2 p “ trpY ` Xq´2 ´ trpY ` Xq´1 ` 16 8 16  ! n )ˇ ˇm m 2 ´ tr pY ` Xq´1 exp ´ trpY `Xq ˇY `X ˇ 4 . (4.33) 8 4 We can recognize trpY ` Xq´2 and tr2 pY ` Xq as the power sum polynomials rp2q prY ` Xs´1 q and rp1,1q prY ` Xs´1 q in the sense of Equation (4.12), so we p1q p1q p1q p1q must have bp2q “ mpm ´ 2q{16, bp1,1q “ ´m{8, bp1q “ mn{8 and b∅ “ n2 p{16 in the “ result ‰ of Lemma 4. Hence Lemma 2 really tells us that whenever n ě p ` 22, E tr T 2 for T „ Tn{2 pIp {8q can be expressed as “ ‰ m “ 2 ´1 ‰ ‰ mpm ´ 2q “ E tr Y ´2 ` E tr Y E tr T 2 “ ´ 16n 8n ‰ np m “ E tr Y ´1 ´ (4.34) ` 8 16 where Y „ Wp pn, Ip {nq. Of course, this also works with square moments and higher k. For example, the same strategy for, “ ‰ say, square moments with k “ 2 yields that whenever n ě p ` 38, E tr2 T 2 for T „ Tn{2 pIp {8q can be expressed as ` ˘ “ 2 2‰ ‰ m pm ´ 2q “ ‰ m m2 ´ 5m ` 10 “ E tr T “ ´ E tr Y ´4 ` E tr Y ´3 tr Y ´1 2 2 16n 4n ` ˘ m m3 ´ 4m2 ` 20m ´ 32 “ 2 ´2 ‰ m2 “ 4 ´1 ‰ E tr Y E tr Y ` ` 2 256n˘ 64n2 ` 2 ‰ m pm ´ 2q “ ‰ m m ´ 2m ` 16 “ E tr Y ´2 tr2 Y ´1 ` ´ E tr Y ´3 2 64n 8n ` ˘ ‰ m m2 ´ 2m ` 16 “ m2 “ 3 ´1 ‰ ´ E tr Y ´2 tr Y ´1 ` E tr Y 64n 32n ‰ m p´m ` pq “ 2 ´1 ‰ m pmp ´ 2p ´ 8q “ ` E tr Y ´2 ´ E tr Y 128 64 ‰ n2 p 2 mnp “ ´ E tr Y ´1 ` (4.35) 64 256 again where Y „ Wp pn, Ip {nq. Unfortunately, as we consider larger orders, the repeated differentiation of expt´ n4 tr Zu|Z|m{4 quickly becomes too cumbersome to perform by hand. But Chételat and Wells/Mid-scale Wishart asymptotics 35 at“ least ‰in theory, “ we can ‰ compute expressions like (4.34) and (4.35) for any E tr T 2k and E tr2 T k , and Lemma 2 summarize that fact. That is, using the Fourier inversion theorem we have reduced the problem of computing moments of the t-distribution Tn{2 pIp {8q to that of computing expected power sum polynomials of the inverse Wishart distribution W´1 p pn, Ip {nq, for large enough n. How can we compute expected power sum polynomials of an inverse Wishart? There are two approaches in the literature. Letac and Massam [2004] found an expression in terms of a different basis, the zonal polynomials, which behave particularly nicely with respect to the inverse Wishart distribution, and whose expectations have a simple closed form. From this, they provided an algorithm for computing expected power sum polynomials to arbitrary order. Matsumoto [2012] found expressions of coordinate-wise moments in terms of modified Wiengarten orthogonal functions, from which expectations of power sum polynomials can be computed. We follow the idea of Letac and Massam [2004] in our asymptotic analysis. For any integer partition κ, there exist coefficients cκ,λ (which depend solely on κ and λ) such that ÿ rκ pY ´1 q “ cλ Cλ pY ´1 q |λ|“|κ| for Cλ the so-called zonal polynomials. For an overview of the topic with a focus on random matrix theory, see Muirhead [1982, Chapter 7]. The coefficients cκ,λ are explicitly computable. If we follow the normalization of zonal polynomials of Muirhead [1982], for example, we find that “ ‰ “ ‰  „  „ „ r∅ “ C∅ , Cp2q rp2q 1 ´ 21 and . “ (4.36) “ ‰ “ ‰ Cp1,1q rp1,1q 1 1 rp1q “ Cp1q , As mentioned, expectations of zonal polynomials with respect to a Wishart or inverse Wishart distribution take a particularly simple form. From Muirhead [1982, Theorem 7.2.13 and Equation (18) on p.237], the expected zonal polynomials for Y ´1 „ W´1 p pn, Ip {nq are “ ‰ n|λ| E Cλ pY ´1 q “ Cλ pIp q ś qpλq 2|λ| i“1 m´i`1 2 śqpλq i ´1 ź λź 2|λ| |λ|! iăj p2λi ´ 2λj ´ i ` jq |λ| qpλq p ` p1 ´ i ` 2lq n “ (4.37) śqpλq m ´ p1 ´ i ` 2lq i“1 l“0 i“1 p2λi ` qpλq ´ iq! “ ‰ for λ ‰ ∅, and E C∅ pY ´1 q “ 1. For example, the first few expected zonal polynomials are “ ‰ “ ‰ np , E C∅ pY ´1 q “ 1, E Cp1q pY ´1 q “ m “ ‰ 2n2 p pp ´ 1q “ ‰ n2 p pp ` 2q E Cp1,1q pY ´1 q “ , E Cp2q pY ´1 q “ . 3m pm ` 1q 3m pm ´ 2q ‰ “ ‰ “ ‰ “ From this, we can exactly compute E rκ pY ´1 q and thus E tr T 2k and E tr2 T k , Chételat and Wells/Mid-scale Wishart asymptotics 36 as a function of p and n (or m). For example, by Equation (4.36) we find that “ ‰ “ ‰ np E r∅ pY ´1 q “ 1, E rp1q pY ´1 q “ , m “ ‰ “ ‰ n2 p pm ` pq n2 p pmp ´ p ` 2q , E rp2q pY ´1 q “ . E rp1,1q pY ´1 q “ m pm ´ 2q pm ` 1q m pm ´ 2q pm ` 1q and thus, by Equation (4.34), whenever n ě p ` 38 ‰ “ np pmp ` m ` 2q E tr T 2 “ . 16 pm ´ 2q pm ` 1q (4.38) In a similar way, we can compute the expected zonal polynomials and hence, the expected power sum polynomials of Y ´1 for |κ| “ 3, 4. So from Equation (4.35), we obtain for n ě p ` 38 that ´ “ ‰ n2 p m3 p3 ` 2m3 p2 E tr2 T 2 “ 256 pm ´ 6q pm ´ 2q pm ´ 1q pm ` 1q pm ` 3q ` 5m3 p ` 4m3 ´ 3m2 p3 ` 6m2 p2 ` 9m2 p ` 24m2 ´ 12mp3 ¯ ´ 36mp2 ` 36mp ´ 36p . (4.39) Of course, this reasoning also works for other k’s. In particular, we essentially derived a (potentially inefficient) algorithm to compute the moments of a Tn{2 pIp {8q distribution to arbitrary order on our path to proving this theorem. At this point, it is worthwhile to realize that Equations (4.38) and (4.39) are already enough to prove the theorem for small moments. For example, when n Ñ 8 such that p{n Ñ c P r0, 1q, then m „ p1 ´ cqn and ˆ 2 ˙ “ ‰ m2 np np n 1 ` ` „ p2 , E tr T 2 “ pm ´ 2q pm ` 1q 16m 16m 8m2 16p1 ´ cq “ ‰ which proves that E tr T 2 “ Opp2 q. In fact,  ˆ ˙ „ m2 1 p 2 3 2 2 1 ´ 4T ¯2 ´1“ ` ` ` ` 2` 2 E tr ? pm´2q pm`1q p m m mp m p p m p 1 p Ñ 0. (4.40) „ ` p m Moreover, when n, p Ñ 8 such that p{n Ñ 0, then m „ n and „ˆ ˙  2 ‰ 32 “ ‰2 1 ´ 4T ¯2 256 “ E tr ? ´1 “ 4 E tr2 T 2 ´ 2 E tr T 2 ` 1 p p p p ˆ 5 m 5 4 2 22 “ ` 3` ` pm´6q pm´2q pm´1q pm`1q pm`3q p2 p m mp 27 32 p2 6p 33 60 115 52 ` ` ` ` 2` 2` 2 ` 2 2` 2 3 2 3 2 mp mp m m m m p m p m p 24 12p2 3p2 6p 3 118 93 96p ´ 3 ` 3` 3` 3 ` 3 2` 3 3´ ´ 4 m m m m p m p m p m4 m Chételat and Wells/Mid-scale Wishart asymptotics 48 84 144 144 36 36 ´ 4´ 4 ´ 4 2´ 5 ´ 5 ´ 5 2 m m p m p m m p m p 2 p2 5 ` 2 Ñ 0. „ 2` p m m 37 ˙ (4.41) Thus 1 ´ 4T ¯2 L2 tr ? ÝÑ 1 “ C1 p p and the theorem is proven for the second moment. In theory, we could proceed in the same way for any moment of interest, but naturally we could never conclude that the theorem holds for all moments that way. Nonetheless, the calculations give us some hints about how to argue in the general case. The idea is to express the moments of the symmetric t distribution as polynomials of p and p{m. There are two regimes where random matrix theory is well understood: the classical regime where p is held fixed as n Ñ 8, and the linear, high-dimensional regime where p grows linearly with n. From this, we can therefore conclude a few facts regarding the behavior of symmetric t moments in these regimes. But these moments are polynomials, and a polynomial is a very rigid object: results from the two extreme cases where p is fixed and p grows linearly will be enough to prove results for every regime in between, yielding the first part of the theorem. Proving the second part will then be the simple matter of applying the GOE approximation of Jiang and Li [2015] and Bubeck et al. [2016] to the specific shape found for the symmetric t moments while proving the first part, namely Equations (4.54) and (4.55). Proof of Theorem 2. Recall the expected zonal polynomial of an inverse Wishart W´1 p pn, Ip {nq is given by Equation (4.37). Based on the previous calculations, it is tempting to define śqpλq qpλq i ´1 ź λź 2|λ| |λ|! iăj p2λi ´ 2λj ´ i ` jq m 1 cλ “ , Rλ pmq “ śqpλq m ´ p1 ´ i ` 2lq i“1 l“0 i“1 p2λi ` qpλq ´ iq! ˆ ˙ qpλq i ´1 ź λź p 1 ´ i ` 2l and Pλ pm, pq “ ` (4.42) m m i“1 l“0 so that “ ‰ E Cλ pY ´1 q “ c1λ n|λ| Rλ pmqPλ pm, pq. With these expressions the expected power sum polynomials can be written as ˜ ¸ p ÿ ź ź “ ‰ ´1 1 |κ| ´1 E rκ pY q “ cκ,λ cλ n Rµ pmq Rµ pmq Pλ pm, pq |λ|“|κ| “ |µ|“|κ| |µ|“|κ| µ­“λ ź ÿ ź n|κ| ¨ Rµ pmq ¨ m|κ| cκ,λ c1λ Rµ´1 pmqPλ pm, pq. |κ| m |µ|“|κ| |λ|“|κ| |µ|“|κ| µ­“λ Chételat and Wells/Mid-scale Wishart asymptotics 38 In other words, if we define ź 1 R|µ| “ Rµ pmq, |µ|“|κ| 1 P|λ| pm, pq “ m|κ| ÿ cκ,λ c1λ |λ|“|κ| ź Rµ´1 pmqPλ pm, pq (4.43) |µ|“|κ| µ­“λ then “ ‰ n|κ| 1 1 E rκ pY ´1 q “ |κ| R|κ| pmqP|κ| pm, pq. (4.44) m ` ˘ ś ś λi ´1 qpλq 1´ 1´i`2l But Rµ´1 pmq “ i“1 l“0 is a polynomial in 1{m, while Pλ pm, pq “ m ˘ śqpλq śλi ´1 ` p 1´i`2l is a polynomial in p{m and 1{m, both of degree at i“1 i“1 m ` m most |µ| “ |λ| “ |κ|. Thus ÿ ź 1 cκ,λ c1λ Rµ´1 pmqPλ pm, pq P|κ| pm, pq ” m|κ| |λ|“|κ| “ m|κ| |κ| ÿ |κ| ÿ i“0 j“0 |µ|“|κ| µ­“λ bij ´ p ¯i 1 m mj (4.45) for some coefficients bij that don’t depend on m, p (or n). Define the polynomials ř|κ| fj pαq “ i“0 bij αi , so that |κ| ´ ÿ p ¯ ´j 1 P|κ| pm, pq “ m|κ| f m . (4.46) m j“0 Let us show that for all 0 ď`j ă |κ|´qpκq, the polynomial fj must be identically ˘ zero over the interval α P 0, 1{ maxp|κ| ´ 2, 0q . Indeed, say this was not the case, and let 0 ď j0 ă |κ| ˘ smallest j with the property that ` ´ qpκq1 be the . As fj0 is a polynomial, by continuity fj0 pα0 q ‰ 0 for some α0 P 0, maxp|κ|´2,0q it must be non-zero in a neighborhood of α0 , so we may as well assume α‰0 is “ rational without loss of generality. Now look at what happens to E rκ pY ´1 q as α0 p grows to infinity at the very specific linear rate p “ t 1`α pn ´ 1qu. Since α0 is 0 rational, there must be a subsequence nl such that pl is exactly an integer (for example, if α0 “ a{b with a, b integers, we can take nl “ pa ` bql ` 1). Then for α0 pl “ 1`α pnl ´ 1q, we have exactly pl “ α0 ml . 0 ` α ˘´1 1 0 Since α0 ă maxp|κ|´2,0q , then |κ| ă 1 ` 1`α . Thus by Hölder’s inequality 0 and Lemma 5, ı “ ‰ 1 1 1 ” lim |κ|´qpκq´j ¨ qpκq E rκ pY ´1 q ď 0 ¨ lim E tr Y ´|κ| “ 0. 0 lÑ8 m lÑ8 pl p l l On the other hand, by Equations (4.44) and (4.46), the definition of j0 and the fact that R|κ| pmq Ñ 1 as m Ñ 8, “ ‰ 1 1 lim ¨ qpκq E rκ pY ´1 q lÑ8 m|κ|´qpκq´j0 pl l Chételat and Wells/Mid-scale Wishart asymptotics ˆ “ lim lÑ8 “ p1 ` nl ml ˙|κ| ˆ 1 R|κ| pml q ml pl ˙qpκq ÿ |κ| 39 fj pα0 qmjl 0 ´j j“j0 ´qpκq α0 q|κ| α0 fj0 pα0 q. As α0 ą 0, fj0 pα0 q must therefore equal zero, a contradiction. Hence, as claimed, the ˘ fj pαq for 0 ď j ă |κ| ´ qpκq all vanish over the interval ` polynomials 1 0, maxp|κ|´2,0q . But a polynomial can have an infinite number of zeros only if all its coefficients are zero, so we conclude that bij “ 0 for 0 ď j ă |κ| ´ qpκq. Thus, from Equations (4.44) and (4.45) we have “ ‰ ´ n ¯|κ| qpκq 1 R|κ| pmqPκ2 pm, pq m E rκ pY ´1 q “ m where |κ| |κ| ´ p ¯i ÿ ÿ 1 Pκ2 pm, pq “ bij . j´|κ|`qpκq m m i“0 j“|κ|´qpκq Going back to equations (4.13) and (4.14) and plugging in the above yields that as long as n ě p ` 16k ` 6, “ ‰ m2k`1 1 R2k pmqQp1q (4.47) E tr T 2k “ κ pm, pq, nk “ ‰ m2k`2 1 E tr2 T k “ R2k`1 pmqQp2q (4.48) κ pm, pq nk where 1 p1q ÿ ´ 1 ¯|κ| R|κ| pmq bκ pn, m, pq 2 p k ` Qp1q pm, pq “ p´1q 1` P pm, pq, κ 1 pmq m m R2k m2k`1´qpκq κ |κ|ď2k k Qp2q κ pm, pq “ p´1q 1 p2q ÿ ´ 1 ¯|κ| R|κ| pmq bκ pn, m, pq 2 p P pm, pq. 1` ` 1 m m R2k`1 pmq m2k`2´qpκq κ |κ|ď2k`1 Now, for any a ď b, we can associate a partition µ of norm |µ| “ a with the partition µ˚ “ pµ1 ` b ´ a, µ` 2, . . . , µqpµq q of norm |µ˚ | “ b, which satisfies ˚ ˚ ˆ qpµ i ´1 ź q µź i“1 j“0 1´i`2j 1´ m ˆ qpµq i ´1 ź µź ˙ “ i“1 j“0 1´i`2j 1´ m µ1 `b ˙ ´a´1 ź ˆ j“µ1 ˙ 2j 1´ . m By definition for the Rµ pmq’s at Equation (4.42), this means that every factor that appears in Rµ´1 pmq appears in Rµ´1 ˚ pmq, so by definition of the R|µ| pmq’s p1q 1 at Equation (4.43), Ra pmqR´1 pmq is a polynomial in m . Moreover, as bκ and p2q bκ are polynomials of degrees d1 pκq ” 2k ` 1 ´ qpκq and d2 pκq ” 2k ` 2 ´ qpκq Chételat and Wells/Mid-scale Wishart asymptotics p1q 40 p2q respectively, there exists coefficients cijl and cijl such that p1q bκ pn, m, pq m2k`1´qpκq “ 1 md1 pκq d1 pκq d1 pκq dÿ ´i ´i´j 1 pκq ÿ ÿ i“0 j“0 d1 pκq d1 pκq dÿ ´i ´i´j 1 pκq ÿ ÿ “ i“0 j“0 p1q cijl mi nj pl l“0 1 p1q cijl l“0 md1 pκq´i´j´l ´ p 1 ¯j ´ p ¯l 1` ` m m m and p2q bκ pn, m, pq m2k`2´qpκq “ 1 md2 pκq d2 pκq d2 pκq dÿ ´i ´i´j 2 pκq ÿ ÿ i“0 j“0 d2 pκq d2 pκq dÿ ´i ´i´j 2 pκq ÿ ÿ “ i“0 j“0 l“0 p2q cijl p2q cijl mi nj pl l“0 ´ 1 ¯j ´ p ¯l p ` . 1` m m m md2 pκq´i´j´l 1 As d1 p´i ´ j ´ l ě 0q, j, l ě 0 in the first case and d2 pκq ´ i ´ j ´ l, j, l ě 0 in the second case, we conclude that these two expressions are polynomials p 1 in m and m . Therefore, looking back at (4.47) and (4.48), we conclude that p2q p1q p 1 the Qκ pm, pq’s and Qκ pm, pq’s are polynomials in m and m . Therefore, if p1q p2q n ě p ` 16k ` 6 there must be coefficients aij , aij and large enough integers D1 , D2 such that D1 ÿ i j ÿ “ ‰ m2k`1 p1q p E tr T 2k “ R pmq a 2k ij nk mi i“0 j“0 D1 ´ m ¯k ÿ p1q “ R2k pmq gi ppqmk`1´i (4.49) n i“0 D2 ÿ i j ÿ “ ‰ m2k`2 p2q p E tr2 T k “ R pmq a 2k`1 ij nk mi i“0 j“0 D2 ´ m ¯k ÿ p2q “ R2k`1 pmq gi ppqmk`2´i (4.50) n i“0 p1q for polynomials gi ppq “ i ř j“0 p1q p2q p1q i ř p2q aij pj . j“0 p2q gi must vanish aij pj and gi ppq “ We will now proceed to show that gi and on N for 0 ď i0 ă k ` 1 and 0 ď i0 ă k ` 2 respectively. Our argument relies on the analysis of the asymptotic behavior of the moments of T in the classical regime where p is held fixed while n grows to‰infinity.“ “ ‰ Observe first that E tr T 2k and E tr2 T k must have a finite limit as n Ñ 8 with p held fixed. Indeed, since 16T 2 {n is positive definite, |Ip ` 16T 2 {n| is Chételat and Wells/Mid-scale Wishart asymptotics 41 greater than one and so we have the bound ż ‰ “ E tr T 2k “ Cn,p tr T 2k ˇ ˇ n`p`1 2 ˇ´ 4 ˇ ˇIp ` 16T ˇ dT ˇ n ˇ Sp pRq ż ď Cn,p ˇ ˇ´ n ˇ 16T 2 ˇˇ 4 tr T 2k ˇˇIp ` dT. n ˇ Sp pRq pp3p`1q 4 ppp`1q 4 When p is held fixed, lim Cn,p “ 2 {π by Lemma 1. Moreover, nÑ8 n n ˇ ˇ ˆ ˙ p ´ ´ 2ˇ 4 4 ź ˇ λi p4T 2 q ˇIp ` 16T ˇ “ 1` ˇ ˇ n n{4 i“1 for λ1 p4T 2 q ě ¨ ¨ ¨ ě λp p4T 2 q ě 0 the eigenvalues of 4T 2 , and p1 ` x{nq´n is monotone decreasing towards exppxq. Therefore, for a fixed dimension p we can apply the monotone convergence theorem to obtain that ż pp3p`1q “ ‰ 2 4 lim E tr T 2k ď ppp`1q nÑ8 π 4 “ ‰ 2 tr T 2k e´4 tr T dT “ E tr Z 2k ă 8 (4.51) Sp pRq for Z „ GOEppq{4. Repeating the argument with tr2 T k yields similarly ż pp3p`1q 4 “ ‰ 2 lim E tr2 T k ď ppp`1q π 4 nÑ8 “ ‰ 2 tr2 T k e´4 tr T dT “ E tr2 Z k ă 8. (4.52) Sp pRq “ ‰ “ ‰ Thus indeed E tr T 2k and E tr2 T k have finite limits when p is held fixed. p1q p2q We can use this to show that gi and gi must vanish on N for 0 ď i0 ă k `1 and 0 ď i0 ă k ` 2 as follows. Say the first statement wasn’t true, and let p1q 0 ď i0 ă k ` 1 be the smallest i such that for some p0 P N, gi0 pp0 q ‰ 0. Then “ ‰ by Equation (4.49) and the definition of i0 , the limit of E tr T 2k as n Ñ 8 with p fixed at p0 satisfies “ ‰ D1 ÿ E tr T 2k p1q p1q k “ 1 ¨ 1 ¨ lim gi pp0 qmi0 ´i “ gi0 pp0 q. lim nÑ8 nÑ8 mk`1´i0 i“i 0 But m “ n´p´1 tends to infinity as n tends to infinity, and since k `1´i0 ą 0, “ ‰ p1q Equation (4.51) means that E tr T 2k {mk`1´i0 must tend to zero. Thus gi0 pp0 q has to equal zero, which contradicts our assumption. Thus for every 0 ď i ă k`1, p1q the polynomial gi must vanish on N. p2q Similarly, for 0 ď i ă k ` 2, the polynomial gi must vanish on N, because if it wasn’t the case, we could take 0 ď i0 ă k ` 2 as the smallest i with the p2q property that for some p0 P N, gi0 pp0 q ‰ 0, and then by Equation (4.50) with Chételat and Wells/Mid-scale Wishart asymptotics 42 p fixed at p0 as n Ñ 8 we would get “ ‰ D2 ÿ E tr2 T k p2q p2q k “ 1 ¨ 1 ¨ lim gi pp0 qmi0 ´i “ gi0 pp0 q. lim nÑ8 nÑ8 mk`2´i0 i“i 0 But then by Equation (4.52), as m tends to infinity and k ` 2 ´ i0 ě 1 the “ ‰ p2q ratio E tr2 T k {mk`2´i0 must tend to zero. Thus we must have gi0 pp0 q “ 0, a p2q contradiction. Hence indeed for 0 ď i ă k ` 2, the polynomial gi must vanish on N. But of course, a polynomial can only have an infinite number of zeroes if its coefficients are all zero, so we must have p1q for 0 ď i ă k ` 1, p2q for 0 ď i ă k ` 2. aij “ 0 aij “ 0 (4.53) Now say that p varies with n in such a way that limnÑ8 p{n “ α ă 1. Then for large enough n, n ě p ` 16k ` 6 so by Equations (4.49) and (4.53), D1 ÿ i ´ m ¯k j´pk`1q ÿ “ ‰ 1 p1q p R2k pmq aij i´pk`1q lim k`1 E tr T 2k “ lim nÑ8 n nÑ8 p m i“k`1 j“0 « p1q D1 ÿ k ÿ aij “ p1 ´ αqk ¨ 1 ¨ lim i´pk`1q ppk`1q´j nÑ8 m i“k`1 j“0 ff D1 i ´ p ¯j´pk`1q 1 ÿ ÿ p1q ` aij m mi´j i“k`1 j“k`1 ff « ˙ ˆ p1q D1 i´pk`1q k ÿ ÿ ak`1 α p1q (4.54) “ p1 ´ αqk ` a ` ˘pk`1q´j ii 1´α j“0 lim p i“k`1 pÑ8 and by Equations (4.50) and (4.53), D2 ÿ i ´ m ¯k j´pk`2q ÿ “ ‰ 1 p2q p lim k`2 E tr2 T k “ lim R2k`1 pmq aij i´pk`2q nÑ8 p nÑ8 n m i“k`2 j“0 « p2q D k`1 ÿ2 ÿ aij “ p1 ´ αqk ¨ 1 ¨ lim i´pk`2q nÑ8 m ppk`2q´j i“k`2 j“0 ff D1 i ´ p ¯j´pk`2q 1 ÿ ÿ p2q ` aij m mi´j i“k`2 j“k`2 « ff ˆ ˙ p2q D2 i´pk`2q k`1 ÿ ÿ ak`2 α p2q “ p1 ´ αqk aii . (4.55) ` ˘pk`2q´j ` 1´α j“0 lim p i“k`2 pÑ8 Although we might not know what aij coefficients are, this shows at least that the limits are finite. In‰ particular, from “Equations (4.54) and (4.55) we can “ ‰ conclude that E tr T 2k “ Oppk`1 q and E tr2 T k “ Oppk`2 q, which shows the first claim of the theorem. For the second claim, let n, p Ñ 8 with p{n Ñ α “ 0. Then Equations (4.54) Chételat and Wells/Mid-scale Wishart asymptotics 43 and (4.55) specialize to lim nÑ8 1 pk`1 1 lim nÑ8 pk`2 “ ‰ p1q E tr T 2k “ apk`1qpk`1q , “ ‰ p2q E tr2 T k “ apk`2qpk`2q . (4.56) What is interesting about this result is that these limits must be the same regardless of the way p grows! As long as p Ñ 8 with p{n Ñ 0, the limits are ? p1q p2q apk`1qpk`1q and apk`2qpk`2q , regardless of whether p „ log n or p „ n or some other growth. Now, Bubeck et al. [2016, Theorem 7] and Jiang and Li [2015, Theorem 1] have shown that when p Ñ 8?with p3 {n Ñ 0, the total variation distance between a normalized Wishart npWp pn, Ip {nq ´ Ip q matrix and a Gaussian Orthogonal Ensemble GOEppq matrix tends to zero as n Ñ 8. Therefore, the Hellinger distance satisfies also H 2 pψNW , ψGOE q “ H 2 pfNW , fGOE q Ñ 0 as n Ñ 8. But convergence in Hellinger distance has strong implications for real-valued statistics. Indeed, for T1 „ Tn{2 pIp {8q “ |ψNW |, T2 „ GOEppq{4 “ |ψGOE | and any function g : Sp pRq Ñ R such that gpT1 q, gpT2 q are square-integrable, ˇ ˇ ˇˇ ” ı ˇˇ ˇ ˇ gpT q |ψNW |pT q ´ |ψGOE |pT q dT ˇˇ ˇ ErgpT1 qs ´ ErgpT2 qs ˇ “ ˇˇ ż Sp pRq ż ˇ ˇ ď ˇˇ ” ı ˇˇ 1{2 1{2 1{2 gpT qψNW pT q ψNW pT q ´ ψGOE pT q dT ˇˇ Sp pRq ˇ ˇ ` ˇˇ ż ” ı ˇˇ 1{2 1{2 1{2 gpT qψGOE pT q ψNW pT q ´ ψGOE pT q dT ˇˇ Sp pRq ż ż „  1 gpT q2 |ψNW |pT qdT 2 ` ď Sp pRq ż ¨ 1 gpT q2 |ψGOE |pT qdT 2 Sp pRq ˇ ˇ2 1 ˇ 1{2 ˇ 1{2 ˇψNW pT q ´ ψGOE pT qˇ dT 2 S pRq p 1 1 “ ‰ “ ‰ “ E gpT1 q2 2 ` E gpT2 q2 2 HpψNW , ψGOE q „ (4.57) by the Cauchy-Schwarz inequality. Let’s consider applying this result to gpT q “ tr T 2k {pk`1 and gpT q “ tr2 T k {pk`2 . What do we know about these statistics? In the case where T2 „ GOEppq{4, results of Anderson et al. [2010, Lemma 2.1.6 and the equation above Equation (2.1.21)] provide that „  tr T22k Ck lim E k`1 “ 2k nÑ8 p 4 Chételat and Wells/Mid-scale Wishart asymptotics 44 „ 2 k ˙2 ´ „ tr T k  ¯2 ˆ C tr T k{2 2 lim E k`22 “ 1 rk evens “ lim E k{2`1 nÑ8 nÑ8 p 4k p „´  „  ˆ ˙2 ´ tr T22k ¯2 tr T22k ¯2 Ck lim E “ lim E k`1 ă8 “ nÑ8 nÑ8 pk`1 p 42k „ „´ 2 k ¯   tr T24k tr T2 2 C2k ď lim E lim E “ 4k ă 8 nÑ8 nÑ8 pk`2 p2k`1 4 because these expressions only depend on p, and since p Ñ 8 as n Ñ 8, taking a limit as n Ñ 8 is the same as taking a limit as p Ñ 8. Moreover, in the T1 „ Tn{2 pIp {8q case, using Jensen’s inequality and Equations (4.54)–(4.55) we can at least see that „´  „  tr T12k ¯2 tr T14k lim E ď lim E 2k`1 ă 8 nÑ8 nÑ8 pk`1 p „ 2 2k  „´ 2 k ¯  2 tr T1 tr T1 ď lim E ă 8. lim E nÑ8 nÑ8 pk`2 pk`2 Therefore, using Equation (4.57) with gpT q “ tr T 2k {pk`1 and gpT q “ tr2 T k {pk`2 we find that when n, p Ñ 8 with p3 {n Ñ 0, ˇ ˇ „  ˆ „´ 1 ˙ 2k ˇ Ck ˇˇ tr T12k ¯2 2 C2k ˇ lim E tr T1 ´ 2k ˇ ď lim E ` 2k ¨ 0 “ 0, ˇ nÑ8 nÑ8 pk`1 4 pk`1 4 ˇ ˇ „ 2 k ´ ¯ 2ˇ ˇ Ck{2 ˇ lim E tr T1 ´ 1rk evens ˇˇ ˇ nÑ8 k`2 k p 4 ˆ „´ 2 k ¯  12 1{2 ˙ C2k tr T1 2 ď lim E ` 2k ¨ 0 “ 0. nÑ8 pk`2 4 Since p3 {n Ñ 0 implies p{n Ñ 0, we conclude from Equation (4.56) that 2 Ck{2 Ck p1q p2q 2 apk`1qpk`1q “ 2k , apk`2qpk`2q “ 2k 1rk evens . 4 4 But then, by that same equation, we conclude that when n, p Ñ 8, not only when p3 {n Ñ 0 but for all p such that p{n Ñ 0, we have “ ‰ Ck 1 lim E tr T 2k “ 2k , nÑ8 pk`1 4 (4.58) 2 “ 2 k ‰ Ck{2 1 2 lim k`2 E tr T “ 2k 1rk evens nÑ8 p 4 for “ T „‰Tn{2 pIp {8q. To finish the proof, use Equation (4.58) with the fact that E tr T k “ 0 for odd k to find that „  „ 2 k „ 2 tr T k tr T tr T k lim Var k{2`1 “ lim E k`2 ´ E k{2`1 nÑ8 nÑ8 p p p 2 ´ ¯2 Ck{2 Ck{2 2 “ 2k 1rk evens ´ 1 rk evens “ 0. 4 4k L2 Thus tr T k {pk`1 ÝÑ Ck {42k , as desired. This proves the second claim and concludes the proof. Chételat and Wells/Mid-scale Wishart asymptotics 45 A pleasant consequence of this result is that when n, p Ñ 8 with p{n Ñ 0, we can conclude a version of the semicircle law holds for the Tn{2 p2Ip q distribution. This is interesting because the Tn{2 p2Ip q distribution has dependent entries with heavy tails, whose distribution varies with n, p. ? ? ? ? Let 4T { p „ 4Tn{2 pIp {8q{ p, with eigenvalues λ1 p4T { pq ě ¨ ¨ ¨ ě λp p4T { pq. Then define its empirical spectral measure to be p ? 1ÿ L4T {?p pAq “ 1rλi p4T { pq P As . p i“1 Since L4T {?p depends on the random matrix T , it is a random measure on R. Corollary 1 (Semicircle law for the t distribution). The empirical spectral ? measure L4T {?p of a 4Tn{2 pIp {8q{ p random matrix converges weakly, in square mean, to the semicircle distribution ż ? 4 ´ x2 1r|x| ď 2s dx. LpAq “ 2π A Proof. Let f be any continuous function R Ñ R that vanishes at infinity. By the Stone-Weierstrass theorem, there exists a sequence f1 , f2 , . . . of polynomials such that for any  ą 0, supxPR |f pxq ´ fl pxq| ă . To fix some notation, write fl pxq “ degf ÿl alk xk . k“1 Then since L4T {?p and L are both probability measures, «ˆ ż ˙2 ff 12 ż f pxqdL4T {?p pxq ´ f pxqdLpxq E R R «ˆ ż ˙2 ff 21 “ ‰ f pxq ´ fl pxq dL4T {?p pxq ď E R «ˆ ż ˙2 ff 21 ż fl pxqdL4T {?p pxq ´ fl pxqdLpxq `E R R «ˆ ż ˙2 ff 21 “ ‰ `E fl pxq ´ f pxq dLpxq R ď ` degf ÿl k“1 «ˆ ˙2 ff 21 1 ´ 4T ¯k |alk | E tr ? ´ Ck{2 1rk evens ` . p p By Theorem 2, the expectation tends to zero as n, p Ñ 8 with p{n Ñ 0. Thus «ˆ ż ˙2 ff 21 ż lim E f pxqdL4T {?p pxq ´ f pxqdLpxq ď 2. nÑ8 R R But this is true for every  ą 0, so the limit must ş be zero. Hence for every continuous f that vanishes at infinity, the integral f dL4T {?p converges in square Chételat and Wells/Mid-scale Wishart asymptotics 46 ş mean to f dL. By Chung [2001, Theoremş 4.4.1 and 4.4.2], this implies that for every bounded continuous f , the integral f dL4T {?p converges in square mean ş to f dL. Thus the empirical spectral distribution L4T {?p converges weakly, in square mean, to the semicircle distribution L, as desired. 5. Wishart asymptotics: the G-transform point-of-view We now turn our attention to the main objective of this paper, namely studying the behavior of Wishart matrices in the various middle-scale regimes. To do this, we exploit the close connection between the Wishart and the symmetric t distributions and make use of the results found Section 4. The main result of this section, Theorem 3, states that we can approximate for every middlescale regime the G-transform ψNW of a normalized Wishart by a degree-specific function ψK . This can be seen as an analogue of Theorem 1 in the G-transform domain. The reasoning behind the approximations is as follows. We could imagine writing ψNW from Proposition 3 in exponential form, and expanding the terms as a Taylor series would yield ˇ ˇ* " ˇ ? 4T ˇˇ n`p`1 ˇ log ˇIp ` i ? ˇ ψNW pT q “ Cn,p exp 2i n tr T ´ 2 n " ˆ ˙k * 8 ´ ? n ` p ` 1 ÿ p´iqk p ¯ k2 4T tr ? . “ Cn,p exp 2i n tr T ` 2 k n p k“1 Now imagine that the T ’s appearing in the expression follow a Tn{2 pIp {8q dis` 4T ˘k tribution. By Theorem 2, we know that tr ? “ Θppq when k is even, in p ` 4T ˘k 2 an L sense. When k is odd, the theorem merely proves that tr ? “ oppq, p k but for a GOEppq matrix Z, we know that tr ?Zp is asymptotically normal for odd k by Anderson et al. [2010, Theorem 2.1.31]. This would suggest that ` 4T ˘k tr ? “ Θp1q when k is odd. Thus we would have, in some sense, p "ÿ ˆ k{2`1 ˙ ÿ ˆ k{2 ˙ * 8 8 p p ψNW pT q “ Cn,p exp Θ ` Θ k{2´1 k{2´1 n n k“2 k“2 even “ Cn,p exp "ÿ 8 k“0 odd ˆ Θ k`2 p nk 8 ÿ ˙ ` k“1 ˜c Θ pp2k´1q`2 n2k´1 ¸* . In other words, terms in the power series would be associated with some degree K, such that they would be non-negligible in any middle-scale regime of degree up to K, and negligible in higher degrees. In fact, a similar phenomenon occurs with Cn,p , by Lemma 1. This suggests we should try truncating these power series to derive degree-specific approximations. Definition 3 (G-transform approximations). For any K P N, define the K th Chételat and Wells/Mid-scale Wishart asymptotics 47 degree approximation ψK : Sp pRq Ñ C as $ 2K`3` , 2K`2´ ’ / odds 1 rK odds & 1rK . ÿ ÿ ¯ ¯ ´ ´ k k k k pKq p `1 4i tr T 4i tr T ψK pT q “ Cn,p exp n ? ? ` ’ / %2 n k 2 n k k“2 with pKq Cn,p “ 2 pp3p`1q 4 π ppp`1q 4 k“1 " K`1 1 ÿ 1rk evens pk`2 exp ´ 2 k“1 kpk`1qpk`2q nk * K`1 1 ÿ 1`21rk evens pk`1 ´ . 4 k“1 kpk`1q nk Just like the G-transform of a normalized Wishart matrix, these functions implicitly depend on n. The first three are " * pp3p`1q 32 p`1 p`1 2 4 tr T 2 , ψ0 pT q “ ppp`1q exp ´4 tr T 2 ´i ? tr T 3 `2i ? tr T ´4 3 n n n π 4 " 2 pp3p`1q 2 4 32 32 512 p ψ1 pT q “ ppp`1q exp ´ ´4 tr T 2 ´i ? tr T 3 ` tr T 4 `i 3{2 tr T 5 8n 3 n n 5n π 4 * p ` 1 p ` 1 32pp ` 1q 1024 6 2 3 tr T `2i ? tr T ´4 tr T ´i tr T ´ 3n2 n n 3n3{2 and " pp3p`1q 2 4 p4 32 32 p2 ψ2 pT q “ ppp`1q exp ´ ´4 tr T 2 ´i ? tr T 3 ` tr T 4 ´ 2 48n 8n 3 n n 4 π 512 1024 8192 p`1 `i 3{2 tr T 5 ´ tr T 6 ´i 5{2 tr T 7 `2i ? tr T 2 3n n 5n 7n p`1 32pp ` 1q p ` 1 ´4 tr T 2 ´i tr T 3 `32 2 tr T 4 3{2 n n 3n * 512pp ` 1q 1024pp ` 1q 5 6 `i tr T ´ tr T . 3n3 5n5{2 These functions have the pleasant property that their modulus is bounded, up to a constant, by the G-conjugate density |ψK |. Indeed, on one hand we can rewrite Definition 3 into K`1` $ 1rK odds ’ ? 2k ÿ & n tr p4T { nq pKq ψK pT q “ exp log Cn,p ` p´1qk ’ 2 2k % k“1 K`1´ 1rK odds p`1 ` 2 ÿ p´1q k“1 ? k tr p4T { 2k 2k nq K`1 n ´i 2 ÿ k“1 p´1qk ? 2k`1 tr p4T { nq 2k ` 1 Chételat and Wells/Mid-scale Wishart asymptotics 48 , ? 2k`1 / . tr p4T { nq ´i p´1qk . (5.1) / 2 2k ` 1 k“1 ? ` ˘ On the other hand, for any x P R, we can write 1 ` ix “ 1 ` x2 exp i atanpxq with the arctangent function taking values in p´π{2, π{2q. Thus by Proposition 3 we can rewrite ψNW as ˇ ˇ " ˇ 16T 2 ˇˇ n`p`1 ˇ log ˇIp ` ψNW pT q “ exp log Cn,p ´ 4 n ˇ ˆ ˙ * ? n`p`1 4T ´i tr atan ? ` 2i n tr T , (5.2) 2 n with the understanding that the matrix-variate arctangent function operates on eigenvalues by functional calculus. Now, for any x P R and odd integer L, there is an elementary inequality L ÿ 1 x2l ď ´ logp1 ` x2 q. p´1ql 2l 2 l“1 K ÿ p`1 Notice that K ` 1 ˘ 1rK odds is always an odd integer. Thus, from the above inequality and Equations (5.1) and (5.2), we can derive the bound ˇ ! ´n p ` 1¯ ˇ ˇ 16T 2 ˇˇ) ˇ pKq ˇψK ˇpT q ď Cn,p exp ´ ` log ˇIp ` ˇ 4 4 n pKq ˇ Cn,p ˇˇ “ ψNW ˇpT q. (5.3) Cn,p In particular, since ψNW is integrable whenever n ě p ´ 2 by Proposition 3, Equation (5.3) implies that every ψK must also be integrable whenever n ě p´2. In particular, for large enough n it makes sense to talk about the asymptotic total variation or Hellinger distance between ψNW and ψK . We now state the main result, which is that each function ψK approximates the G-transform of a normalized Wishart for all middle-scale regimes of degree K or lower, but no other. log p Theorem 3.Let lim log n ă 1 as n Ñ 8. For any K P N, the total varianÑ8 tion distance between the G-transform of the normalized Wishart distribution ? nrWp pn, Ip {nq ´ Ip s and the K th approximating function ψK satisfies ż ` ˘ dTV ψNW , ψK “ ˇ ˇ ˇψNW pT q ´ ψK pT qˇ dT Ñ 0 as n Ñ 8 Sp pRq if and only if pK`3 {nK`1 Ñ 0. Proof. If statement. For the first part of the theorem, remark that by Equation (3.7) it is equivalent to show that the Hellinger distance tends to zero, i.e. that ż ` ˘ H2 ψNW , ψK “ ˇ ˇ2 ˇ 1{2 ˇ 1{2 ˇψNW pT q ´ ψK pT qˇ dT Ñ 0 Sp pRq as n Ñ 8 Chételat and Wells/Mid-scale Wishart asymptotics 49 when pK`3 {nK`1 Ñ 0. To control this quantity, we use the Kullback-Leibler inequality for G-transforms. Notice that for any x P R and L P N, ˇ ˇ L´1 ˇ 1 2l ˇ ÿ x2L ˇ 2 lx ˇ p´1q , (5.4) ˇ ď ˇ´ logp1 ` x q ´ ˇ 2 2l ˇ 2L l“1 ˇ ˇ L´1 ˇ 2l`1 ˇ ÿ x2L x ˇ ˇ p´1ql . (5.5) ˇ ď ˇatanpxq ´ ˇ 2l ` 1 ˇ 2L l“1 Let Log stand for the principal branch of the complex logarithm, and let us study Log ψNW {ψK . Its real part can be bounded by ˇ ˇ ˇ ˇˇ ˇ ˇ 2ˇ ˇ ˇ ˇ pKq ˇ< Log ψNW pT q ˇ “ ˇˇ log Cn,p ´ n ` p ` 1 log ˇIp ` 16T ˇ ´ log Cn,p ˇ ˇ ψK pT q ˇ ˇ 4 n ˇ ˇ K`1` K`1´ k“1 k“1 1rK odds 1rK odds ? 2k ? 2k ÿ ÿ n p`1 tr p4T { nq k tr p4T { nq ´ ´ p´1q p´1qk 2 2k 2 2k ˇ ˇ ˇ ˇ ˇ ˇ ˇ K`1` ˇ ˇ 1rK odds ˇ ˇ ˇ ˇ ˇ ˇ ? ÿ 2k ˇ ˇ 2ˇ ˇ ˇ nˇ 1 ˇ 16T tr p4T { nq ˇ pKq k ˇ´ ď ˇˇ log Cn,p ´log Cn,p ˇˇ ` ˇ´ log ˇˇIp ` p´1q ˇ ˇ 2ˇ 2 n ˇ 2k ˇ ˇ k“1 K`1´ ˇ ˇ odds ˇ ˇ ˇ 1rK ? 2k ˇˇ ÿ ˇ 2 ˇ 16T ˇˇ p`1ˇ 1 tr p4T { nq ˇ ´ ` p´1qk ˇ´ log ˇˇIp ` ˇ. ˇ ˇ 2 ˇ 2 n 2k ˇ ˇ k“1 By Equation (5.4), this can be bounded by ˇ ˇ ? ˇ ˇ n trp4T { nq2K`4`21rK odds pKq ˇ ˇ ď ˇ log Cn,p ´log Cn,p ˇ ` 2 2K ` 4 ` 21rK odds ? p ` 1 trp4T { nq2K`4´21rK odds ` 2 2K ` 4 ´ 21rK odds ˇ ˇ 2K`3`21rK odds ˇ ˇ 4 tr T 2K`4`21rK odds pKq ˇ “ ˇˇ log Cn,p ´log Cn,p ˇ ` K ` 2 ` 1rK odds nK`1`1rK odds 42K`3´21rK odds pp ` 1q tr T 2K`4´21rK odds . (5.6) K ` 2 ´ 1rK odds nK`2´1rK odds We can bound the imaginary part of Log ψNW {ψK in a similar way. Define x Pp´π,πs : R Ñ p´π, πs to be the projection mapping Pp´π,πs x “ x ´ 2πr 2π ´ 12 s. A plot is given as Figure 4. It satisfies = Log z “ Pp´π,πs = log z for all branches of log z, as well as the inequality |Pp´π,πs x| ď |x|. Using this mapping, we can see that the imaginary ` Chételat and Wells/Mid-scale Wishart asymptotics 50 y π -5π -3π -π π 3π 5π x -π Fig 4. Plot of Pp´π,πq on p´5π, 5πs. part of Log ψNW {ψK can be bounded as ˇ » ˇ ˇˇ ˇ ˆ ˙ ˇ ˇ ? n`p`1 4T ˇ= Log ψNW pT q ˇ “ ˇˇ Pp´π,πs— tr atan ? ` 2 n tr T –´ ˇ ˇ ˇ ψK pT q 2 n ˇ fiˇ K ? 2k`1 ? 2k`1 ˇˇ ÿ p`1 tr p4T { nq tr p4T { nq ffiˇ ` ` p´1qk p´1qk flˇ ˇ 2 2k ` 1 2 2k ` 1 ˇ k“1 k“1 ˇ ˇ ˇ K`1 ˆ ˙ ? ? 2k`1 ˇˇ ÿ 4T 2 n tr T n ˇˇ ˇ k tr p4T { nq ´ ´ ď ˇ tr atan ? p´1q ˇ ˇ 2ˇ n n{2 2k ` 1 ˇ ˇ k“1 ˇ ˇ ˇ K ˙ ÿ ˆ ? 2k`1 ˇˇ ˇ p`1ˇ 4T tr p4T { nq ˇ ` ´ p´1qk ˇ tr atan ? ˇ. ˇ 2 ˇ n 2k ` 1 ˇ ˇ k“1 K`1 ÿ n By Equation (5.5), this can be bounded by ? ? p ` 1 trp4T { nq2K`2 n trp4T { nq2K`4 ` ď 2 2K ` 4 2 2K ` 2 2K`3 2K`4 2K`1 4 tr T 4 pp ` 1q tr T 2K`4 ď ` . (5.7) K`1 K `2 n K `1 nK`1 Recall that the G-conjugate of the normalized Wishart distribution is the t distribution with n{2 degrees of freedom and scale matrix Ip {8, denoted Tn{2 pIp {8q – see Equation (3.24) and Section 4 for details. Let us bound the expectations of these absolute real and imaginary parts under this distribution. By Equations (5.10), (5.6), (5.7) and Theorem 2, we find that for T „ |ψNW | “ Tn{2 pIp {8q, ‰ “ ˇ „ˇ 2K`3`21rK odds E tr T 2pK`2`1rK oddsq ˇ ˇ ψ pT q 4 NW ˇ ď E ˇˇ< Log ψK pT q ˇ K ` 2 ` 1rK odds nK`1`1rK odds “ ‰ ´ pK`3 ¯ 42K`3´21rK odds pp ` 1q E tr T 2pK`2´1rK oddsq ` ` o K ` 2 ´ 1rK odds nK`1 nK`2´1rK odds ˆ K`2`1rK odds`1 ˙ ˆ ˙ ´ K`2´1rK odds`1 K`3 ¯ p p¨p p ď O `O ` o K`1 K`1` 1 odds K`2´ 1 odds rK rK n n n Chételat and Wells/Mid-scale Wishart asymptotics “ O 51 ´ pK`3 ¯ (5.8) nK`1 and “ ‰ “ ‰ ˇ „ˇ 2K`3 E tr T 2pK`2q 2K`1 pp`1qE tr T 2pK`2q ˇ ˇ ψ pT q 4 4 NW ˇ ď E ˇˇ= Log ` ψK pT q ˇ K `2 nK`1 K `1 nK`1 ˆ K`2`1 ˙ ˆ ˙ ´ pK`3 ¯ p p ¨ pK`2`1 ď O (5.9) `O “ O K`1 K`1 K`2 n n n as n Ñ 8 with p{n Ñ 0. Moreover, from Lemma 1, we see that " ˆ K`3 ˙* p p pKq Cn,p “ Cn,p exp o as n Ñ 8 with Ñ 0. (5.10) K`1 n n Thus, from Equations (5.3) and (5.10), we see that when pK`3 {nK`1 Ñ 0, the asymptotic L1 norm of ψK is bounded by ż ż ! lim nÑ8 ˇ ˇ ˇψK pT qˇ dT ď lim exp ´o nÑ8 ´ pK`3 ¯) nK`1 Sp pRq ˇ ˇ ˇψNW pT qˇ dT “ 1. (5.11) Sp pRq In fact, at the end of this proof we will see that this bound is sharp and the limit must be exactly 1. Using Equations (5.8), (5.9) and (5.11) with Proposition (1) implies that when pK`3 {nK`1 Ñ 0, ´ ¯ 0 ď lim H2 ψNW , ψK nÑ8 ż ż „ ď lim nÑ8  |ψK |pT q dT ´ 1 ` 0 ` 2 lim |ψK |pT q dT 2 ¨ 0 2 Sp pRq Sp pRq nÑ8 1 2 1 2 1 1 ď r1 ´ 1s ` 0 ` 2 ¨ 1 ¨ 0 “ 0. ` ˘ Thus` H2 ψNW˘, ψK Ñ 0, hence by Equation (3.7) we must have the limit dTV ψNW , ψK Ñ 0, as desired. Only if statement. For the second part of the theorem, assume that˘ the total ` variation distance satisfies dTV pψNW , ψK q Ñ 0, hence H ψNW , ψK Ñ 0 by Equation (3.7), as n Ñ 8. We will show by contradiction this implies that pK`3 {nK`1 Ñ 0. log p Assume this wasn’t the case. Since limnÑ8 log n ă 1, there must be an L P N such that pL`3 {nL`1 Ñ 0, and since pK`3 {nK`1 Û 0, we must have K ă L. By Equation (5.8), we must have for T „ |ψNW | “ Tn{2 pIp {8q that ˇ „ˇ ´ pL`3 ¯ ˇ ψNW pT q ˇˇ ˇ lim E ˇ< Log ď lim O L`1 “ 0, ˇ nÑ8 nÑ8 ψL pT q n so 1 ψNW pT q L1 < Log ÝÑ 0. (5.12) 2 ψL pT q Chételat and Wells/Mid-scale Wishart asymptotics 52 Now write, by Equation (5.1) and Definition 3, L`1` RpT q ” 1 ψL pT q 1 < Log “ log 2 ψK pT q 2 1rLÿ odds ˆ ˙2k n p´1qk 4T ` tr ? 4 2k n pLq Cn,p pKq Cn,p K`2` k“1rK odds L`1´ 1rLÿ odds ˆ ˙2k p`1 p´1qk 4T tr ? ` 4 2k n K`2´ k“1rK odds “ ´ L`1 ÿ 1`21rk evens pk`1 1 ÿ 1rk evens pk`2 1 L`1 ´ 4 k“K`2 kpk`1qpk`2q nk 8 k“K`2 kpk`1q nk L`1` ` 1rLÿ odds n 4 L`1´ p´1qk ´ p ¯k tr 2k n ˆ 4T ? p ˙2k ` p`1 4 K`2` k“1rK odds 1rLÿ odds ˆ ˙2k 4T p´1qk ´ p ¯k tr ? . 2k n p K`2´ k“1rK odds But as pL`3 {nL`1 , we must have p{n Ñ 0, so by Theorem 2, we have 1 p L2 4T 2k trp ? Ñ pq Ck . Moreover, as we assumed that pK`3 {nK`1 Û 0, we must have p Ñ 8. Thus L`1 1 ÿ 1rk evens pk´K´1 nK`1 RpT q “ ´ pK`3 4 k“K`2 kpk`1qpk`2q nk´K´1 L`1` 1 1`21rk evens 1 pk´K´1 1 ` 8 k“K`2 kpk`1q p nk´K´1 4 L`1 ÿ ´ 1rLÿ odds p´1qk pk´K´2 1 tr 2k nk´K´2 p ˆ 4T ? p ˙2k ˆ 4T ? p ˙2k K`2` k“1rK odds L`1´ 1 ` 4 L2 ÝÑ 0 ` 0 ` “ 1rK evens 8pK ` 2q ˆ 1 1` p odds ˙ 1rL ÿ p´1qk pk´K´1 1 tr 2k nk´K´1 p K`2´ k“1rK odds CK`2 ` 1rK odds 8pK ` 1q CK`1 CK`1`1rK evens ą 0. 8pK ` 1 ` 1rK evensq Then by the reverse triangle inequality, ż ` ˘ 0 “ lim H2 ψNW , ψK “ lim nÑ8 nÑ8 ˇ ˇ2 ˇ 1{2 ˇ 1{2 ˇψNW pT q ´ ψK pT qˇ dT Sp pRq (5.13) Chételat and Wells/Mid-scale Wishart asymptotics 53 ż ď lim nÑ8 ˇ2 ˇ ˇ ˇ ˇ|ψNW |1{2 pT q ´ |ψK |1{2 pT qˇ dT Sp pRq «ˇ ˇ2 ff " * ˇ ˇ 1 ψ pT q K “ lim E ˇˇ exp < Log ´ 1ˇˇ nÑ8 2 ψNW pT q for a T „ |ψNW | “ Tn{2 pIp {8q, that is " * 1 ψK pT q L2 exp < Log ÝÑ 1. 2 ψNW pT q Since Lp convergence implies convergence in probability, by the continuous mapping theorem we must have ψK pT q P 1 < Log ÝÑ 0 2 ψNW pT q as n Ñ 8, so by Equation (5.12) ψK pT q 1 ψNW pT q P 1 ´ < Log ÝÑ ´0 ´ 0 “ 0. RpT q “ ´ < Log 2 ψNW pT q 2 ψL pT q But then, from Equation (5.13) and Slutsky’s lemma [van der Vaart, 2000, Lemma 2.8 (iii)], ˆ K`1 ˙´1 pK`3 n P 8pK ` 1 ` 1rK evensq ¨ 0 “ 0. “ RpT q RpT q ÝÑ K`1 K`3 n p CK`1`1rK evens K`3 as n Ñ 8. As pK`3 {nK`1 is deterministic, this {nK`1 Ñ 0 ` implies ˘that p 2 as n Ñ 8, a contradiction. Thus whenever H ψNW , ψK Ñ 0 as n Ñ 8 with lim log p ă 1, we must have pK`3 {nK`1 Ñ 0, as desired. This concludes the nÑ8 log n proof. Although Theorem 3 states that the functions ψK approximate ψNW , there is no guarantee that they are G-transforms of a probability density. In other words, nothing guarantees that their inverse G-transforms f˜K “ G ´1 tψK u are real-valued, non-negative and integrate to unity. However, the reverse triangle inequality applied to the L2 -norm provides that ż ˇ ˇ ˇ ż |ψNW pT q| dT 2 ´ ˇ ` ˘ 1ˇ |ψK pT q| dT 2 ˇ ď H ψNW , ψK , Sp pRq Sp pRq 1 so Theorem 3 and the Plancherel theorem implies that ż lim nÑ8 ż |f˜K pT q| dT “ lim |ψK pXq| dX “ 1 Sp pRq Sp pRq nÑ8 (5.14) when pK`3 {nK`1 Ñ 0. That is, the theorem at least guarantees that |f˜K | is asymptotically a density in its associated regime. We discuss this further in Section 6. Chételat and Wells/Mid-scale Wishart asymptotics 54 We independently know, by the results of Jiang and Li [2015] and Bubeck et al. [2016], that a Gaussian orthogonal ensemble approximation holds in the classical regime. Although ψ0 is not the G-transform of a GOEppq, a simple Kullback-Leibler argument is sufficient to prove that it approximates ψGOE for 0th degree regimes. Proposition 4. The total variation distance between the 0th degree G-transform approximation ψ0 and the Gaussian orthogonal ensemble G-transform ψGOE satisfies dTV pψ0 , ψGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0. Proof. We use a similar strategy to Theorem 3: namely, by Equation (3.7) is it equivalent to prove that Hpψ0 , ψGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0, and to control that quantity we can use the Kullback-Leibler inequality for G-transforms. Let T „ |ψGOE | “ GOEppq{4. Since the Gaussian orthogonal ensemble has been extensively studied, we understand well its empirical moments. “ ‰For example, according to Anderson et al. [2010, Lemma 2.2.2], we have E tr T 2 “ Opp2 q, while (2.1.45) of the same book we have Er| tr T |s “ Opp1{2 q and “ from ‰ Equation 3 3{2 E | tr T | “ Opp q. Then from Definition 3 and Proposition 2, and using the projection map Pp´π,πq as in the proof of Theorem 3, we find that  ˆ 3˙ „ ‰ p`1 “ p ψGOE pT q 2 “ ´4 E tr T “ O E < Log ψ0 pT q n n and ˇ „ˇ „ „ˇ ˇ ˇ ˇ ˇ ψGOE pT q ˇˇ p`1 3 ˇPp´π,πq ´ 32 ˇ ? ? E ˇˇ= Log “ E tr T ` tr T ˇ ˇ ˇ ψ0 pT q 3 n n ˆc 3 ˙ ‰ p`1 p 32 “ . ď ? E | tr T 3 | `2i ? Er| tr T |s “ O 3 n n n ş Since Sp pRq |ψ0 |pT qdT Ñ 0 when n Ñ 8 with p3 {n Ñ 0 by Equation (5.14), if we apply Proposition 1 we find thatt 1 1 lim H2 pψ0 , ψGOE q ď 0 ` 0 ` 2 ¨ 1 2 ¨ 0 2 “ 0 nÑ8 for p3 {n Ñ 0. By Equation (3.7), this concludes the proof. As a consequence, HpfNW , fGOE q “ HpψNW , ψGOE q ď HpψNW , ψ0 q`Hpψ0 , ψGOE q Ñ 0 when n Ñ 8 with p3 {n Ñ 0 by Theorem 3 and Proposition 4. Hence dTV pfNW , fGOE q Ñ 0 by Equation (2.1) in the classical setting. This provides an alternative proof of the results of Jiang and Li [2015] and Bubeck et al. [2016]. 6. Wishart asymptotics: the density point-of-view In Section 5,?we studied the asymptotic behavior of the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s using its G-transform ψNW . In particular, we derived an approximation to ψNW for every middle-scale regime of a given degree. But although it is equivalent to study a probability distribution from a density or a G-transform point of view, it is still natural to wonder if we can find Chételat and Wells/Mid-scale Wishart asymptotics 55 approximations to the density of a normalized Wishart for every middle-scale regime of a given degree. Recall from Theorem 3 that dTV pψNW , ψK q Ñ 0 when pK`3 {nK`1 Ñ 0. Define f˜K “ G ´1 tψK u. In general, there is no guarantee that these should be real-valued. On the other hand, we know from Equation (5.3) that whenever n ě p ´ 2, ψK must be integrable, and since the G-transform maps integrable functions to integrable functions, f˜K must also be integrable. In fact, according to Equation (5.14), we know |f˜K | must be asymptotically a density when pK`1 {nK`1 Ñ 0. This suggests we define the following densities. Definition 4 (Density approximations). For any K P N and n ě p ´ 2, define the K th degree density approximation as |f˜K |pXq , fK pXq “ ş |f˜K pY q|dY Sp pRq where f˜K “ G ´1 tψK u and ψK is as in Definition 3. The distribution on the real symmetric matrices with density fK will be denoted FK . The main interest is that we can asymptotically approximate the density fNW of a normalized Wishart by the bona fide densities fK . This was the content of Theorem 1 from Section 1, which we now prove as a simple corollary of its G-transform analogue Theorem 3 from Section 5. Proof of Theorem 1. As in the rest ? of this paper, we write the density of the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s by fNW , and by Definition 4 the density of FK is fK . Notice that by Equation (2.1), to prove dTV pfNW , fK q Ñ 0 it is equivalent to prove that HpfNW , fK q Ñ 0. From the triangle inequality, the reverse triangle inequality, Theorem 3 and Equation (5.14), ´ ¯ ´ ¯ ´ ¯ lim H fNW , fK ď lim H fNW , |f˜K | ` lim H |f˜K |, fK nÑ8 nÑ8 nÑ8 ż ˇ ˇ2 1 ˇ 1{2 ˇ 1{2 ˇfNW pXq ´ |f˜K |pXqˇ dX 2 “ lim nÑ8 Sp pRq ż ˇ ˇ 1{2 ˇ|f˜ |pXq ´ ş ˇ K ` lim nÑ8 Sp pRq ˇ2 1{2 ˇ |f˜K |pXq ˇ dX 12 ˇ 1{2 ˜ |fK |pY qdY Sp pRq ż ď lim nÑ8 ˇ ˇ2 1 ˇ 1{2 ˇ 1{2 ˇfNW pXq ´ f˜K pXqˇ dX 2 Sp pRq ż ˇ ˇ ` lim ˇˇ1 ´ ş nÑ8 ˇ ˇ 1 ˇ ˇ 1{2 ˜ | f |pY qdY K Sp pRq 1 |f˜K |pXqdX 2 Sp pRq Chételat and Wells/Mid-scale Wishart asymptotics 56 ˇ 1 ˇˇ ˇ “ 01{2 ` ˇ1 ´ 1{2 ˇ ¨ 11{2 “ 0. 1 when pK`3 {nK`1 Ñ 0. Thus HpfNW , fK q, hence dTV pfNW , fK q, tends to zero when n Ñ 8 with pK`3 {nK`1 Ñ 0, as desired. We defined fK in terms of the inverse G-transform of the ψK functions given by Definition 3. How can we express this explicitely? By Equation (5.3), we see that |ψK |pT q is asymptotically bounded by the Tn{2 pIp {8q density |ψNW |pT q, which is integrable whenever n ´ p ` 2 ě 0. But |ψNW |1{2 pT q is proportional n Ip q density in the sense of Definition 2, which is integrable for to a Tm{4 p 4m m{4 ě p{2 ´ 1, that is whenever n ´ 3p ` 3 ě 0. Thus |ψNW |1{2 pT q and therefore |ψK |1{2 pT q is integrable whenever n ´ 3p ` 3 ě 0. Hence we can use the Fourer inversion theorem to conclude that fK is proportional to the integral ˇ ˇ ˇ ˇ fK pXq 9 ˇG ´1 tψK uˇpXq ˇ ˇ ˇ 9 ˇ ˇ ż 2K`3` 1rK odds ÿ ´ 4i ¯k tr T k n ? exp i trpXT q ` 4 n k # k“2 Sp pRq 2K`2´ 1rK odds + ˇ2 ÿ ˇ ´ 4i ¯k tr T k p `1 ˇ ? ` dT ˇ ˇ 4 n k (6.1) k“1 ? whenever n ´ 3p ` 3 ě 0. In particular, if we do a change of variables Z “ 8T , we obtain Equation (1.3) from Section 1 whenever n ě 3p ´ 3, from which we can derive Equations (1.1) and (1.2). It would be quite pleasant if there was a way to solve the integral in Equation (6.1) or (1.3) and obtain a (potentially quite complicated) closed form expression for fK up to its normalization constant. So far, our efforts have been unfruitful. We close our discussion with a final remark. At the end of Section 5, we showed that ψ0 approximates ψGOE in 0th degree middle-scale regimes, from which the classical asymptotic normality follows. It is natural to wonder if f0 approximates fGOE in the same context. An argument similar to that of Theorem 1 shows this is the case. Proposition 5. The total variation distance between the 0th degree density approximation f0 and the Gaussian orthogonal ensemble G-transform fGOE satisfies dTV pf0 , fGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0. Proof. The Hellinger distance between f0 and fGOE satisfies ´ ¯ ´ ¯ ´ ¯ lim H f0 , fGOE ď lim H f0 , |f˜0 | ` lim H |f˜0 |, fGOE nÑ8 nÑ8 nÑ8 ż ˇ ˇ ď lim ˇˇ1 ´ ş nÑ8 Sp pRq ˇ ˇ 1 ˇ ˇ 1{2 ˜ |f |pY qdY ´ ¯ 1 |f˜0 |pXqdX 2 ` lim H f˜0 , fGOE nÑ8 0 Sp pRq Chételat and Wells/Mid-scale Wishart asymptotics 57 ˇ ´ ¯ 1 ˇˇ ˇ “ ˇ1 ´ 1{2 ˇ ¨ 11{2 ` lim H ψ0 , ψGOE “ 0. nÑ8 1 By Equation (2.1), the result follows. Of course, we could conclude from this that HpfNW , fGOE q ď HpfNW , f0 q ` Hpf0 , fGOE q Ñ 0 when n Ñ 8 with p3 {n Ñ 0, offering yet again another proof that a Gaussian orthogonal ensemble approximation holds in the classical setting. 7. The effect of phase transitions Although we have established the existence of phase transitions, it does not shed much light on how the behavior of a normalized Wishart distribution might differ across phase transitions. To do this, it can be very illuminating to study the asymptotics of some of its statistics. For example, we could study its empirical moments. ? For a normalized Wishart matrix X „ nrWp pn, Ip {8q ´ Ip s, a direct computation yields „ˆ ˙  ˆ ˙ 2 1 ´ X ¯2 5 4 8 20 20 5 1 E tr ? ´1 “ 2` 3` ` 2 ` 3 “ 2 `o p p p p np np np p p2 so in every middle-scale regime, that is whenever n, p Ñ 8 with p{n Ñ 0, ? › › ´ ¯ › › 1 ´ X ¯2 5 all middle-scale › › tr ? „ ´ 1 . › 2 ›p regimes p p L Thus we have L2 convergence of the second empirical moment to 1, but otherwise nothing very interesting. There doesn’t seem to be any change of behavior across the different middle-scale regimes. In contrast, the situation with the symmetric t distribution is striking, and illustrates yet again that middle-scale regime behavior becomes clearer under a G-transform. Indeed, we know from 4T 2 Theorem 2 that for a T „ Tn{2 pIp {8q, the quantity p1 trp ? p q also converges to 1, but we know more. At Equation (4.41), we computed the exact L2 distance 4T 2 between p1 trp ? p q and 1, and found that ˙  „ˆ 2 m5 1 ´ 4T ¯2 E tr ? ´1 “ p p pm´6q pm´2q pm´1q pm`1q pm`3q ˙ „ ˆ 2 p2 2 p2 5 1 ¨ 2` ` 2 `o ` ` . p m m p2 m m2 Thus the L2 distance must have middle-scale asymptotics › › › 1 ´ 4T ¯2 › › tr ? ´ 1›› ›p p L2 Chételat and Wells/Mid-scale Wishart asymptotics ? $ 5 ’ ’ ’ ’ ’ p ’ ’ ’ ’ ’ ’ ? 1 ’ 2 ’ ’ & 5 ` 2α ` α p ? „ 1 ’ “ 5α´1 ` 2 ` α ? ’ ’ n ’ ’ ? ’ ’ ´2 ´1 ’ “ 5α ` 2α ` 1 p ’ ’ n ’ ’ ’ p ’ % n 58 for p2 Ñ0 n for p2 Ñα n for ¯ ´ p2 second or higher Ñ8 degree n ´ ` classical or first degree second degree ¯ ˘ (7.1) 4T 2 as n, p Ñ 8 with p{n Ñ 0. Thus there is a sharp change in behavior of p1 trp ? pq ? when p grows like n, and despite the symmetric t distribution satisfying a semicircle law according to Corollary 1, it must ultimately behave differently than a Gaussian orthogonal ensemble matrix. The first-order asymptotics look the same: it is rather in the rate of this convergence that they differ. This matters for both the symmetric t and the Wishart distribution because rates of convergence can be distinguished in the strong topology. As a simple example, consider the sequence of one-dimensional distributions ` ˘ ` ˘ Fp “ N 0, 1{p , and Gp “ N 0, 1{p2 . In the weak topology, these are asymptotically the same, since they converge to the same distribution – namely Fp , Gp ñ δ0 as p Ñ 8, for δ0 the Dirac measure at 0. In other words, in a metric that induces the weak topology such as the Lévy metric, dLévy pFp , Gp q Ñ 0. Yet, by a direct computation of the Hellinger distance, which induces the strong topology, d ´ ¯1{4 ? 4p dHellinger pFp , Gp q “ HpFp , Gp q “ 2 1 ´ 2 p ` 2p ` 1 ? Ñ 2ą0 as p Ñ 8. Thus it is clear that the strong topology captures rates of convergence in a way that the weak topology can’t. But then, we should expect ? a phase transition when p grows like n for the Tn{2 pIp {8q distribution. And since the symmetric t is the G-conjugate of the Wishart, this should imply a ? phase transition when p grows like n for the Wishart distribution as well. This is consistent with Theorem 3, and provides an alternative explanation for the existence of the second phase transition. A natural question then is to ask whether we can find symmetric t statistics that exemplify all the middle-scale regime phase transitions. It is tempting to look at the L2 error of the other empirical moments of the symmetric t distribution, because we can use the methodology developed in Section 4 to compute their asymptotics to arbitrary order. As a reference, we compiled a table of the Chételat and Wells/Mid-scale Wishart asymptotics Normalized empirical moment 1 ´ 4T ¯ tr ? p p 1 ´ 4T ¯2 tr ? p p 1 ´ 4T ¯3 tr ? p p 1 ´ 4T ¯4 tr ? p p Limit Asymptotics of its squared L2 error 0 2 p2 C1 “ 1 5 2 p2 ` ` 2 2 p m m 0 24 p2 C2 “ 2 50 25p2 97 ` ` 2 p m m2 59 Table 1 Asymptotics of small normalized empirical moments of T „ Tn{2 pIp {8q. few first few moments as Table 1. As can be seen from the table, the odd moments seem to have uniform behavior across all middle-scale regimes. In contrast, the even ? moments seem to all change asymptotics at the second phase transition p “ Θp nq, but nowhere else. Hence finding statistics that “flag” the other phase transitions remain an open question. 8. Auxiliary results This section compiles several lemmas used elsewhere in the article. Lemma 3 (First derivatives lemma).For any indices 1 ď i1 , . . . , i2l ď p and real symmetric matrix Z, there exist polynomials aJ,s pn, mq in n and m “ n ´ p ´ 1, indexed by 0 ď s ď l and J “ pj1 , . . . , j2l q, such that " * ˇ ˇm Bs Bs Bs n ... exp ´ tr Z ˇZ ˇ 4 Bs Zi2l i2l´1 Bs Zi4 i3 Bs Zi2 i1 4 " * s l l ź ÿ ÿ ź ˇ ˇm n ´1 Zj2t j2t´1 exp ´ tr Z ˇZ ˇ 4 . “ aJ,s pn, mq pIp qj2t j2t´1 4 t“1 s“0 t“s`1 JP t1,...,pu2l Proof. To simplify notation, let * " l s ź ź ˇ ˇm n ´1 MJ,s pZq “ pIp qj2t j2t´1 Zj2t j2t´1 exp ´ tr Z ˇZ ˇ 4 , 4 t“s`1 t“1 and let Ml “ tMJ,s | J P t1, . . . , pu2l , s ď lu be the set of all such terms “on 2l indices”. Let xMl y denote the linear span of Ml , that is, the space of all linear combinations of elements of Ml , with as coefficients real polynomials in n and m. Then we are really claiming that " * ˇ ˇm Bs n Bs Bs ... exp ´ tr Z ˇZ ˇ 4 P xMl y. (8.1) Bs Zi2l i2l´1 Bs Zi4 i3 Bs Zi2 i1 4 Chételat and Wells/Mid-scale Wishart asymptotics 60 To see this, let J “ pj1 , . . . , j2l´2 q P t1, . . . , pu2l´2 and define the extension q Ja,b “ pj1 , . . . , jq´1 , a, b, jq`1 , . . . , j2l´2 q P t1, . . . , pu2l to be J with indices a, b inserted (in this order) at the q th position. Then using that ı 1 ” ´1 ´1 Bs ´1 ´1 Zab “ ´ Zai Zi2l´1 b ` Zai Zi´1 2l 2l´1 2l b Bs Zi2l i2l´1 2 and " * ˇ ˇm n exp ´ tr Z ˇZ ˇ 4 Bs Zi2l i2l´1 4 " * ”m ı ˇ ˇm n n “ Zi2l i2l´1 ´ pIp qi2l i2l´1 exp ´ tr Z ˇZ ˇ 4 , 4 4 4 we conclude that s s Bs 1 ÿ 1 ÿ MJi2r i ´ M 2r MJ,s pZq “ ´ ,s`1 2l 2l´1 Bs Zi2l i2l´1 2 r“1 2 r“1 Ji2l´1 i2l ,s`1 m n ` MJ 2s`1 ,s`1 ´ MJ 2s`1 ,s P xMl y. i i i2l i2l´1 4 4 2l 2l´1 Thus, by linearity, Bs {Bs Zi2l i2l´1 maps xMl´1 y to xMl y. But naturally we have expt´ n4 tr Zu|Z|m{4 P xM0 y, so by induction Equation (8.1) must then hold, as desired. Bs Lemma 4 (Second derivatives lemma).For any k P N and any Z P Sp pRq, p ÿ i1 ,...,i2k ˇ ˇm n Bs Bs Bs ... e´ 4 tr Z ˇZ ˇ 4 Bs Zi1 i2k B s Z i3 i2 B s Z i2 i1 n “ e´ 4 ˇ ˇ m4 ÿ p1q Zˇ bκ pn, m, pqrκ pZ ´1 q tr Z ˇ |κ|ď2k and p ÿ i1 ,...,ik j1 ,...,jk ˇ ˇm n Bs Bs Bs Bs Bs Bs e´ 4 tr Z ˇZ ˇ 4 ... ... Bs Zj1 jk Bs Zj3 j2 Bs Zj2 j1 Bs Zi1 i2k Bs Zi3 i2 Bs Zi2 i1 n “ e´ 4 ˇ ˇ m4 ÿ p2q Zˇ bκ pn, m, pqrκ pZ ´1 q tr Z ˇ |κ|ď2k`1 p1q bκ pn, m, pq p2q bκ pn, m, pq p1q with degrees deg bκ ď 2k ` and for some polynomials p2q 1 ´ qpκq and deg bκ ď 2k ` 2 ´ qpκq. The sums at the right hand sides are taken over all integer partitions κ of norm at most 2k and 2k ` 1, including the empty partition. Proof. We give a spectral proof. Let OLOt be the spectral decomposition of Z, with eigenvalues λ1 ě ¨ ¨ ¨ ě λp , and notice that p t t Bs Ohl 1 ÿ Oha Oai 1 ÿ Oha Oaj “ Ojl ` Oil , Bs Zij 2 a‰l λl ´ λa 2 a‰l λl ´ λa Bs λ h “ Oih Ojh Bs Zij for any 1 ď i, j, h, l ď p. As a consequence, for any differentiable real-valued Chételat and Wells/Mid-scale Wishart asymptotics 61 functions F1 pLq, . . . , Fp pLq, we have ˆÿ ˙ p p p p ÿ ÿ Fb ´ Fa t Bs 1 ÿ BFa t t Oha Oja Fa Oai “ Oai ` Oha O . B Z 2 λ ´ λ Bλa ai s hj b a a“1 a“1 j“1 a,b b‰a This suggests we define a new operator DL that would map the space of diagonal matrices F pLq “ diagpF1 pLq, . . . , Fp pLqq that differentially depends on L, to itself, by p p ÿ BFa 1 ÿ Fb ´ Fa Bs t t ` so that OF Oji “ OF Oki . DL tF ua “ 2 b‰a λb ´ λa Bλa B Z j“1 s hj In particular, p ÿ i1 ,...,i2k ˇ ˇm n Bs Bs Bs ... e´ 4 tr Z ˇZ ˇ 4 Bs Zi1 i2k Bs Zi3 i2 Bs Zi2 i1 p ÿ “ i1 ,...,i2k Bs ” ´ n tr Z ˇˇ ˇˇ m4 ı Bs Bs Z Ip e 4 ... Bs Zi0 i2k Bs Zi3 i2 Bs Zi2 i1 i1 i0 ! n ˇ ˇm ) 2k “ tr DL e´ 4 tr Z ˇZ ˇ 4 Ip , (8.2) and similarly p ÿ i1 ,...,ik j1 ,...,jk ˇ ˇm n Bs Bs Bs Bs Bs Bs e´ 4 tr Z ˇZ ˇ 4 ... ... Bs Zj1 jk Bs Zj3 j2 Bs Zj2 j1 Bs Zi1 ik B s Z i3 i2 B s Z i2 i1 ! ! n ˇ ˇ m )) k k “ tr DL tr DL e´ 4 tr Z ˇZ ˇ 4 Ip . (8.3) Let us look more closely at this operator DL . It satisfies the following. (i) DL is linear, in the sense that for diagonals F pLq, GpLq and constants a, b with respect to L, DL taF ` bGu “ aDL tF u ` bDL tGu. (ii) DL satisfies a restricted product rule, in the sense that for a diagonal F pLq of the form F pLq “ f pLqIp for some function f pLq, and any diagonal GpLq, DL tF Gu “ DL tF uG ` F DL tGu. Moreover, from the definition of DL , ( n n n DL e´ 4 tr L Ip “ ´ e´ 4 tr L Ip , 4 ( DL trpL´s qIp “ ´sL´ps`1q , and ( m m m DL |L| 4 Ip “ |L| 4 Ip , 4 s ( s 1ÿ trpL´rs`1´ts qL´t . DL L´s “ ´ L´ps`1q ´ 2 2 t“1 Chételat and Wells/Mid-scale Wishart asymptotics 62 Now define the spaces # Ml “ ´n 4 bpn, m, pqe ˇ + ˇ bpn, m, pq is a polynomial with m ˇ ˇ ˇ tr L ˇ ˇ 4 L rκ pL´1 qL´s ˇ degree at most l ´ qpκq, and κ ˇ and s satisfy |κ| ď l ´ s. for l “ 1, . . . , 2k, and let xMl y denote the linear span of Ml , i.e. the space of all real linear combinations of elements of Ml . Moreover, for a partition κ, let κ ˘ i denote κ with the integer i added or removed, respectively. For example, p3, 1, 1, 1q`2 “ p3, 2, 1, 1, 1q and p3, 2, 1, 1, 1q´1 “ p3, 2, 1, 1q. Note that |κ˘i| “ |κ| ˘ i. Then, for any F P Ml , ) ! ˇ ˇm n DL tF u “ DL bpn, m, pqe´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s ! n )ˇ ˇ m “ bpn, m, pqDL e´ 4 tr L Ip ˇLˇ 4 rκ pL´1 qL´s !ˇ ˇ m ) n ` bpn, m, pqe´ 4 tr L DL ˇLˇ 4 Ip rκ pL´1 qL´s ! ) ˇ ˇm n ` bpn, m, pqe´ 4 tr L ˇLˇ 4 DL rκ pL´1 qIp L´s ! ) ˇ ˇm n ` bpn, m, pqe´ 4 tr L ˇLˇ 4 rκ pL´1 qDL L´s ı n ” n ˇ ˇm “ ´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s ” m4 ı n ˇ ˇm ` bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s 4 qpκq ı n ÿ” ˇ ˇm ` ´ κi bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ´κi pL´1 qL´s i“1 ı n ˇ ˇm s ` ´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´ps`1q 2 s ” ı n ÿ ˇ ˇm 1 ` ´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ`ps`1´tq pL´1 qL´t 2 t“1 ” Thus DL tF u P xMl`1 y. It follows by linearity that DL maps xMl y to xMl`1 y. ˇ ˇm ˇ ˇm n 2k ´ n te 4 tr L ˇLˇ 4 Ip u P xM2k y. Now, e´ 4 tr L ˇLˇ 4 Ip P M0 , so by induction DL p1q Hence, for some polynomials bκ,s pn, m, pq of degree at most 2k ´ qpκq, ! n ÿ ˇ ˇm ) ˇ ˇm 2k ´n 4 tr L ˇLˇ 4 r pL´1 q trpL´s q tr DL e´ 4 tr L ˇLˇ 4 Ip “ bp1q κ κ,s pn, m, pqe |κ|`sď2k ÿ “ p1q n bκ1 pn, m, pqe´ 4 ˇ ˇ m4 Lˇ rκ1 pL´1 q tr L ˇ (8.4) |κ1 |ď2k p1q p1q p1q p1q for κ1 “ κ ` s, bκ1 “ bκ,s when s ‰ 0, while κ1 “ κ, bκ1 “ pbκ,s when s “ 0. Notice that when s ‰ 0, the degree of the bκ1 ’s is at most 2k ´ qpκq “ 2k ´ pqpκ1 q ´ 1q, while when s “ 0 it is at most 2k ´ qpκq ` 1 “ 2k ´ qpκ1 q ` 1. p1q Thus in both cases, deg bκ1 ď 2k ´ qpκ1 q ` 1, which by Equation (8.2) shows the first statement of the lemma. For the second statement of the lemma, by an argument analoguous to Equa- Chételat and Wells/Mid-scale Wishart asymptotics 63 ˇ ˇ m4 Lˇ Ip u P xMk`1 y. Thus by induction ˇ ˇm n k k again, we must have DL ttr DL te´ 4 tr L ˇLˇ 4 Ip uu P xM2k`1 y. Hence for some n k tion (8.4) we find that tr DL te´ 4 tr L ˇ p2q polynomials bκ,s pn, m, pq of degree at most 2k ` 1 ´ qpκq, ! ! n ˇ ˇ m )) k k DL tr DL e´ 4 tr L ˇLˇ 4 Ip ÿ ˇ ˇm ´n 4 tr L ˇLˇ 4 r pL´1 q trpL´s q “ bp2q κ κ,s pn, m, pqe |κ|`sď2k`1 ÿ “ n p2q bκ1 pn, m, pqe´ 4 ˇ ˇ m4 Lˇ rκ1 pL´1 q tr L ˇ |κ1 |ď2k`1 p2q p2q p2q p2q for again κ1 “ κ ` s, bκ1 “ bκ,s when s ‰ 0, while κ1 “ κ, bκ1 “ pbκ,s when p2q s “ 0. By the same argument as before, deg bκ1 ď 2k ´ qpκ1 q ` 2, which by Equation (8.3) shows the second statement of the lemma. This concludes the proof. We will also need in our proof a result about the asymptotics of inverse moments of the Wishart distribution. Because we couldn’t find anything like it in the literature, we think it is worthwhile to provide some context. Let f : p0, 4q Ñ R be the restriction to the positive reals of a complex function analytic in a neighborhood of p0, 4q. We are often interested in the linear spectral statistic p1 tr f pY q for Y „ Wp pn, Ip {nq. Much is known about its distributional properties in the high-dimensional regime where p Ñ 8 such that lim np “ α ă 1. For example, if 0 ă α ă 1, there must be an  ą 0 such nÑ8 that p{n P r, 1 ´ s for all n large enough, so Bai and Silverstein [2010, Theorem 9.10] and the dominated convergence theorem yield that ż rp{ns` a prp{ns` ´ tqpt ´ rp{ns´ q f ptq dt 2πrp{nst 1 P tr f pY q ÝÑ lim nÑ8 p ż α rp{ns ´ ` “ a pα` ´ tqpt ´ α´ q dt f ptq 2παt (8.5) α´ ? P as n Ñ 8. Here, Ñ stands for convergence in probability and x˘ for p1 ˘ xq2 . In fact, the theorem states more, namely a central limit theorem, but what we want to draw to attention is the class of functions for which this result was proven. This is sometimes enough, but often we would like to understand the expectation of this linear spectral statistic. If f is bounded, then Equation (8.5) implies that α` a ı pα` ´ tqpt ´ α´ q 1 ” f ptq dt. (8.6) lim E tr f pY q “ nÑ8 p 2παt ż α´ This is nice for a function f pzq like ez or sin z that happens to be bounded Chételat and Wells/Mid-scale Wishart asymptotics 64 on a neighborhood of p0, 4q, but it unfortunately excludes many interesting unbounded functions, such as log z or 1{z. In fact, for unbounded f , it is in general not even clear if lim p1 Ertr f pY qs will be finite! nÑ8 The following result shows that, at least in the case f pzq “ 1{z s for s P N, we can use Stein’s lemma to obtain Equation (8.6) and its α “ 0 analogue. Lemma 5. Let for Y „ Wp pn, Ip {nq and s be any integer s ě 1. Then as long as n ě p ` 4s ` 2, the sth inverse moment satisfies the recursive bound ˆ ˙ ” ı ” ı pp ` 1qs 1´ E tr Y ´s ď E tr Y ´ps´1q . n In particular, as p Ñ 8 such that lim np “ α ă 1, if s ă α´1 ´ 1 then nÑ8 $ α` a ’ ’ pα` ´ tqpt ´ α´ q & ı ’ 1 ” dt if 0 ă α ă 1, ´s lim E tr Y “ 2παts`1 nÑ8 p ’ α ´ ’ ’ % 1 if α “ 0. ? 2 for α˘ “ p1 ˘ αq . ż Proof. The classical lemma that for any differentiable function f : ˇstates “ˇ`Stein’s ˘ ‰ 2 B R Ñ R such that E ˇ BZ ´ Z f pZqˇ ă 8 for Z „ Np0, 1q and lim f pzqe´z {2 “ zÑ˘8 0, we must have  „´ ¯ B ´ Z f pZq “ 0. E BZ Let Z „ Nnˆp p0, In b Ip q be an n ˆ p matrix of i.i.d. standard normal random variables, and let Y “ n1 Z t Z „ Wp pn, Ip {nq. For any 1 ď α ď n and 1 ď β, i, j ď p, ´s p s ı Bs Yβj B 2 ÿ 1 ÿ ” ´l ´ps´l`1q Bs ´l ´ps´l`1q Yβi Yβj ` Yββ “ Zαi and “´ Yij , BZαβ n i“1 Bs Yiβ Bs Yiβ 2 l“1 so for δ the Kronecker delta, ˙ ˆ ` ˘ B ´ Zαβ ZY ´s αβ BZαβ  p „ p ÿ 2 ÿ Bs ´s ´s ´s “ δβj Yβj ` Zαj Zαi Y ´ Zαβ Zαj Yβj n i“1 Bs Yiβ βj j“1 ´s “ Yββ ´ s s ˘ ` ˘ ˘ 1 ÿ` 1 ÿ ´l ` ZY l αβ ZY ´ps´l`1q αβ ´ Yββ ZY ´ps´l`1q Z t αα n l“1 n l“1 ` ˘ ´Zαβ ZY ´s αβ (8.7) Let us first show that this expression is integrable. For any matrix X, |Xij | ď 1{2 }X}2 “ }X t X}2 . Thus by Equation (8.7), ˇ „ˇˆ ˙ ˇ ` ˘ ˇ B ´s ˇ ˇ E ˇ ´ Zαβ ZY αβ ˇ BZαβ Chételat and Wells/Mid-scale Wishart asymptotics « ď E }Y ´s }2 ` s ÿ 1 65 1 }Y 2l`1 }22 }Y 2s`2l´1 }22 l“1 ff s ÿ }Y ` ´2l 1 2 }2 }Y ´2s`2l 1 2 1 2 }2 ` n}Y }2 }Y ´2s`1 1 2 }2 l“1 As Y is positive definite, }Y ˘a }2 ď tr Y ˘a for any a P N, so by the CauchySchwarz inequality, „  ÿ s ” ı 12 ” ı 12 E tr Y ´2l`1 E tr Y ´2s`2l´1 ď E tr Y ´s ` l“1 s ” ı 12 ” ı 12 ” ı 12 ” ı 12 ÿ E tr Y ´2l E tr Y ´2s`2l ` n E tr Y E tr Y ´2s`1 , ` l“1 which is finite for n ě p ` 4s ` 2. Moreover, pZY ´s qαβ can be expressed using minors and determinants as a rational function of the entries of Z, so lim Zαβ Ñ˘8 2 pZY ´s qαβ e´Zαβ {2 “ 0. So all conditions are fulfilled to apply Stein’s lemma to Equation 8.7 and obtain ff « ˙ p ˆ n ` ˘ B 1 ÿ ÿ ´s ´ Zαβ ZY 0“E αβ n α“1 β“1 BZαβ « ff s s 1 ÿ ´s ´s ´l ´ps´lq ´ps´1q “ E tr Y ´ tr Y ´ trpY q trpY q ´ tr Y n n l“1 As trpY ´l q trpY ´ps´lq q ď p tr Y ´s for any 1 ď l ď s, and every term is integrable as n ě p ` 4s ` 2, this means that ˆ ˙ ” ı ” ı pp ` 1qs 1´ E tr Y ´s ď E tr Y ´ps´1q . (8.8) n This shows the first part of the proof. For the second part, let S P N. If we let n Ñ 8 such that lim np “ α ă 1, nÑ8 then any S ă α´1 we will have n ě p ` 4S ` 2 and n ě pp ` 1qS for n large enough. So by repeatedly applying Equation (8.8) for s “ S, . . . , 1 and dividing by p, we obtain ˙ S ˆ ı ı ź pp ` 1ql 1 ” 1 ” 1´ ¨ E tr Y ´S ď E tr Y ´0 “ 1. n p p l“1 Taking a limit in the above yields S ı ź 1 ” p1 ´ αlq lim E tr Y ´S ď 1. nÑ8 p l“1 Thus for any S ă α´1 , we have S ı ź 1 1 ” lim E tr Y ´S ď ă 8. nÑ8 p 1 ´ αl l“1 (8.9) Chételat and Wells/Mid-scale Wishart asymptotics 66 In the case 0 ă α ă 1, if s`1 ă α´1 then by Jensen’s inequality and Equation (8.9) applied to S “ s ` 1, we have ı ˘1` 1s ı 1 ” 1 ”´ ď lim E tr Y ´ps`1q ă 8. lim E tr Y ´s nÑ8 p nÑ8 p 1 ´s Thus p tr Y is uniformly integrable, and by Equation (8.5), żα ` a ” ı pα` ´ tqpt ´ α´ q 1 dt lim E tr T ´s “ nÑ8 p 2παts`1 α´ ? for α˘ “ p1 ˘ αq2 . In contrast, by applying Jensen’s inequality twice, „´ „ ´s „  ¯´s  1 1 1 ďE 1 “ E tr Y tr Y ď E tr Y ´s p p p so when α “ 0, by applying Equation (8.9) with S “ s, we obtain that lim p1 Ertr Y ´s s “ 1, as desired. nÑ8 9. Conclusion The results of this paper raise more questions than they answer. We enumerate some that we found particularly interesting. (1) The univariate t distribution with ν degrees of freedom is often defined as ? the distribution of Z{ s, for Z „ Np0, 1q and s „ χ2ν {ν independent. In the real symmetric matrix case, we could imagine studying the distribution of S 1{4 ZS 1{4 , for Z „ GOEppq and S „ Wp pν, Ip {νq independent. Is this the Tν p2Ip q distribution in the sense of Section 4? (2) By Theorem 2 and Corollary 1, it is clear the empirical moments of a symmetric t distribution are quite similar to those of a Gaussian orthogonal ensemble matrix, except perhaps in their rates of convergence. From Anderson et al. [2010, Theorem 2.1.31], we know the empirical moments of a Gaussian orthogonal ensemble are asymptotically normal. Are the empirical moments of the symmetric t distribution also asymptotically normal? (3) In Section 4, we showed that the rate of convergence of the even normalized empirical moments of a symmetric t distribution change when p grows like ? n. Can we find analogue symmetric t statistics that change their rates of convergence when p grows like npK`1q{pK`3q for every K P N? This would establish phase transitions for the symmetric t distribution. If so, can we find approximating densities between every two transitions, just like in the Wishart case? (4) As a counterpart of Theorem 1, could we prove that dTV pfNW , fK q Û 0 whenever pK`3 {nK`1 Û 0 as n Ñ 8? This is delicate because we have no guarantee that the L1 norm of ψK is asymptotically bounded for regimes of degree K ` 1 or higher. Chételat and Wells/Mid-scale Wishart asymptotics 67 (5) Can we find the normalization constant or, better, solve the expectation of Equation (1.3) in closed form? (6) What asymptotics hold for the symmetric t or the Wishart distribution in a middle-scale regime of infinite degree? How do these asymptotics differ from the other middle-scale regimes, or the high-dimensional regime? (7) The symmetric t distribution was discovered as the G-conjugate of the Wishart distribution. What other distributions can be realized as the Gconjugate of some well-known distribution? (8) In Lemma 2, we expressed the characteristic function of the G-conjugate F ˚ of a distribution F as f 1{2 ‹ pf 1{2 ˝ Rq, for f the density of F and R the flip operator. To obtain the moments, we then repeatedly differentiated under the convolution integral at zero, and obtained an expression of the moments as an expectation with respect to f . The argument worked when F ˚ was the symmetric t distribution. Can this argument be generalized to other F ˚ ? If F ˚ is a well-known distribution, does this give rise to novel and nontrivial expressions for its moments? (9) The G-transform of a distribution encodes all the information relative to that distribution. However, taking a modulus removes some information, and so in some sense the G-conjugate distribution is “less informative” than the original distribution. What happens when we repeatedly apply the G-conjugation operator, destroying information every time? For example, is there an attractor distribution G that is the limit of this process regardless of the initial distribution? (10) Can we find distinct random operators which can be regarded, in some sense, as the total variation limit of a normalized Wishart matrix between every two phase transitions? It appears to us that some of these questions might be very difficult to answer. We would be pleased if future work were able to shed light on any of them. References Greg W. Anderson, Alice Guionnet, and Ofer Zeitouni. An Introduction to Random Matrices. Cambridge University Press, 2010. Zhidong Bai and Jack W. Silverstein. Spectral Analysis of Large Dimensional Random Matrices, volume 20. Springer, 2010. Maurice S. Bartlett. On the theory of statistical regression. Proceedings of the Royal Society of Edinburgh, 53:260–283, 1933. Sébastien Bubeck and Shirshendu Ganguly. Entropic CLT and phase transition in high-dimensional Wishart matrices. International Mathematics Research Notices, pages 243–258, 2016. Sébastien Bubeck, Jian Ding, Ronen Eldan, and Miklós Z. Rácz. Testing for high-dimensional geometry in random graphs. Random Structures & Algorithms, 49:503–532, 2016. Kai-Lai Chung. A Course in Probability Theory. Academic Press, 2001. Chételat and Wells/Mid-scale Wishart asymptotics 68 Michel Gaudin. Sur la loi limite de l’espacement des valeurs propres d’une matrice alé atoire. Nuclear Physics, 25:447–458, 1961. Arjun K. Gupta and Daya K. Nagar. Matrix Variate Distributions. CRC Press, 1999. Tiefeng Jiang and Danning Li. Approximation of rectangular beta-Laguerre ensembles and large deviations. Journal of Theoretical Probability, 28:804– 847, 2015. Gérard Letac and Hélène Massam. All invariant moments of the wishart distribution. Scandinavian Journal of Statistics, 31:295–318, 2004. Vladimir A. Marchenko and Leonid A. Pastur. Distribution of eigenvalues for some sets of random matrices. Matematicheskii Sbornik, 114:507–536, 1967. Sho Matsumoto. General moments of the inverse real wishart distribution and orthogonal weingarten functions. Journal of Theoretical Probability, 25:798– 822, 2012. Madan L. Mehta. On the statistical properties of the level-spacings in nuclear spectra. Nuclear Physics, 18:395–419, 1960a. Madan L. Mehta. Lemploi des polynômes orthogonaux pour calculer certain déterminants. Rapport S PH (Saclay), 658, 1960b. Robb J. Muirhead. Aspects of Multivariate Statistical Theory. Wiley Series in Probability and Mathematical Statistics. Wiley, 1982. Charles E. Porter and Norbert Rosenzweig. Statistical properties of atomic and nuclear spectra. Technical report, Univ. of Minnesota, Minneapolis, 1960. Mohsen Pourahmadi. High-dimensional Covariance Estimation: with HighDimensional Data. John Wiley & Sons, 2013. Miklós Z. Rácz and Jacob Richey. A smooth transition from Wishart to GOE. arXiv:1611.05838, 2016. Aad W. van der Vaart. Asymptotic statistics, volume 3. Cambridge University Press, 2000. John Von Neumann and Herman H. Goldstine. Numerical inverting of matrices of high order. Bulletin of the American Mathematical Society, 53:1021–1099, 1947. Eugene P. Wigner. On the statistical distribution of the widths and spacings of nuclear resonance levels. In Mathematical Proceedings of the Cambridge Philosophical Society, volume 47, pages 790–798, 1951. Eugene P. Wigner. Characteristic vectors of bordered matrices with infinite dimensions. Annals of Mathematics, 62:548–564, 1955. Eugene P. Wigner. Statistical properties of real symmetric matrices with many dimensions. In Proceedings of the Fourth Canadian Mathematical Congress. University of Toronto Press, 1957. John Wishart. The generalised product moment distribution in samples from a normal multivariate population. Biometrika, 20A:32–52, 1928.
10
1 Time-Varying Block Codes for Synchronization Errors: MAP Decoder and Practical Issues arXiv:1802.08595v1 [cs.IT] 23 Feb 2018 Johann A. Briffa, Victor Buttigieg, Member, IEEE, and Stephan Wesemeyer Abstract—In this paper we consider Time-Varying Block (TVB) codes, which generalize a number of previous synchronization error-correcting codes. We also consider various practical issues related to MAP decoding of these codes. Specifically, we give an expression for the expected distribution of drift between transmitter and receiver due to synchronization errors. We determine an appropriate choice for state space limits based on the drift probability distribution. In turn, we obtain an expression for the decoder complexity under given channel conditions in terms of the state space limits used. For a given state space, we also give a number of optimizations that reduce the algorithm complexity with no further loss of decoder performance. We also show how the MAP decoder can be used in the absence of known frame boundaries, and demonstrate that an appropriate choice of decoder parameters allows the decoder to approach the performance when frame boundaries are known, at the expense of some increase in complexity. Finally, we express some existing constructions as TVB codes, comparing performance with published results, and showing that improved performance is possible by taking advantage of the flexibility of TVB codes. Index Terms—Insertion-Deletion Correction, MAP Decoder, Forward-Backward Algorithm I. I NTRODUCTION Most error-control systems are designed to detect and/or correct substitution errors, where individual symbols of the received sequence have been substituted while maintaining synchronization with the transmitted sequence. Some channels, however, also experience synchronization errors, where symbols may additionally be deleted from or inserted into the received sequence. It has long been recognized that codes can be designed specifically for synchronization error correction [1], [2]. Except for the less-known work by Gallager [3], for a long time only some short block codes were known. This changed when Davey and MacKay [4] proposed a concatenated scheme combining an outer LDPC code with good error-correction capability with an inner code whose aim is to correct synchronization errors. Ratzer [5] took a different approach, using short marker sequences inserted in binary LDPC codewords; a similar approach was used by Wang et al. [6]. Yet another approach extends the state space of convolutional codes to allow correction of synchronization errors [7]–[9]. The problem of convolutional code design for Manuscript submitted February 27, 2014; accepted May 29, 2014 for publication in the IET Journal of Engineering. This research has been carried out using computational facilities procured through the European Regional Development Fund, Project ERDF-080. J. A. Briffa and S. Wesemeyer are with the Dept. of Computing, University of Surrey, Guildford GU2 7XH, England. Email: [email protected]; [email protected] V. Buttigieg is with the Dept. of Comm. & Computer Engineering, University of Malta, Msida MSD 2080, Malta. Email: [email protected] synchronization error channels has been considered in [10]. More recently, this approach has been applied successfully to turbo codes [11]. The renewed increase in interest is mainly due to new applications requiring such codes. A recent survey can be found in [12]. We have in previous papers extended the work of DaveyMacKay, proposing a maximum a posteriori (MAP) decoder [13], improved code designs [14], [15], as well as a parallel implementation of the MAP decoder resulting in speedups of up to two orders of magnitude [16]. However, these papers were restricted to the case where the frame boundaries were known by the decoder. While Davey and MacKay showed that the frame boundaries could be accurately determined for their bit-level decoder and code construction [4], it has not been shown whether this property extends to our MAP decoder and improved constructions. In this paper we define Time-Varying Block (TVB) codes in terms of the encoding used in [16], and show that TVB codes represent a new class of codes which generalizes a number of previous synchronization error-correcting codes. We use the MAP decoder of [16] for these codes, showing how it can be used in an iterative scheme with an outer code. We also consider a number of important issues related to any practical implementation of the MAP decoder. Specifically, we give an expression for the expected distribution of drift between transmitter and receiver due to synchronization errors. We determine an appropriate choice for state space limits based on the drift probability distribution. In turn, we obtain an expression for the decoder complexity under given channel conditions in terms of the state space limits used. For a given state space, we also give a number of optimizations that reduce the algorithm complexity with no further loss of decoder performance. We also show how the MAP decoder can be used for stream decoding, where the boundaries of the received frames are not known a priori. In doing so we demonstrate how an appropriate choice of decoder parameters allows stream decoding to approach the performance when frame boundaries are known, at the expense of some increase in complexity. We express some previously published codes as TVB codes, comparing performance with published results, and showing that the greater flexibility of TVB codes permits the creation of improved codes. In the following, we start with definitions in Section II and summaries of results from earlier work. The applicable design criteria for TVB codes are considered in Section III, together with the representation of previously published codes as TVB codes. The appropriate choice for state space limits is given in Section IV, followed by expressions for the decoder 2 complexity in Section V. MAP decoder optimizations are given in Section VI and the changes necessary for stream decoding in Section VII. Finally, practical results are given in Section VIII. II. BACKGROUND A. TVB Codes Consider the encoding defined in [16], used there to simplify the representation of the inner code of [4]. We observe that this encoding generalizes a number of additional previous schemes, including the inner codes of [5], [6], [15] (c.f. Section III-B). We define a TVB code in terms of this encoding by the sequence C = (C0 , . . . , CN −1 ), which consists of the constituent encodings Ci : Fq ,→ Fn2 for i = 0, . . . , N − 1, where n, q, N ∈ N, 2n ≥ q, and ,→ denotes an injective mapping. Two constituent encodings Ci , Cj are said to be equal if Ci (D) ∈ Cj ∀D. For a given TVB code, the set of unique constituent encodings is that set where no two constituent encodings are equal; the cardinality of this set, denoted by M ≤ N , is called the order of the code. Note that unique constituent encodings may still have some common codewords. We denoted a TVB code by the tuple (n, q, M ). We restrict ourselves to binary TVB codes, where codewords are sequences of bits; the extension to the non-binary case is trivial. For any sequence z, denote arbitrary subsequences as zba = (za , . . . , zb−1 ), where zaa = () is an empty sequence. Given a message DN = (D0 , . . . , DN −1 ), each 0 Ci maps the q-ary message symbol Di ∈ Fq to codeword nN Ci (Di ) of length n. That is, DN = 0 is encoded as X0 C0 (D0 )k · · · kCN −1 (DN −1 ), where ykz is the juxtaposition of y and z. Each q-ary symbol is encoded independently of previous inputs, and different codebooks may be used for each input symbol. This time-variation offers no advantage on a fully synchronized channel. However, in the presence of synchronization errors, the differences between neighbouring codebooks provide useful information to the decoder to recover synchronization. In practice a TVB code is suitable as an inner code to correct synchronization errors in a serially concatenated construction. A conventional outer code corrects residual substitution errors. In such a scheme, the inner code’s MAP decoder a posteriori probabilities (APPs) are used to initialize the outer decoder. The concatenated code can be iteratively decoded, in which case the prior symbol probabilities of the inner decoder are set using extrinsic information from the previous pass of the outer decoder. B. Channel Model We consider the Binary Substitution, Insertion, and Deletion (BSID) channel, an abstract random channel with unbounded synchronization and substitution errors, originally presented in [17] and more recently used in [4], [5], [13]–[15] and others. At time t, one bit enters the channel, and one of three events may happen: insertion with probability Pi where a random bit is output; deletion with probability Pd where the input is discarded; or transmission with probability Pt = 1 − Pi − Pd . A substitution occurs in a transmitted bit with probability Ps . After an insertion the channel remains at time t and is subject to the same events again, otherwise it proceeds to time t + 1, ready for another input bit. We define the drift St at time t as the difference between the number of received bits and the number of transmitted bits before the events of time t are considered. As in [4], the channel can be seen as a Markov process with the state being the drift St . It is helpful to see the sequence of states as a trellis diagram, observing that there may be more than one way to achieve each state transition. Also note that the state space is unlimited for positive drifts but limited for negative drifts. Specifically, St may take any positive value for t > 0, though with decreasing probability as the value increases. On the other hand, St ≥ −t where the lower limit corresponds to receiving the null sequence. C. The MAP Decoder We summarize here the MAP decoder of [16]; this is the same as the MAP decoder of [13] with a trivial modification to work with the notation of TVB codes. The decoder uses the standard forward-backward algorithm for hidden Markov models. We assume a message sequence DN 0 , encoded using a (n, q, M ) TVB code to the sequence Xτ0 , where τ = nN . The sequence Xτ0 is transmitted over the BSID channel, resulting in the received sequence Y0ρ , where in general ρ is not equal to τ . To avoid ambiguity, we refer to the message sequence as a block of size N and the encoded sequence as a frame of size τ . We calculate the APP Li (D) of having encoded symbol D ∈ Fq in position i for 0 ≤ i < N , given the entire received sequence, using X 1 σi (m0 , m, D), (1) Li (D) = λN (ρ − τ ) 0 m ,m where λi (m) = αi (m)βi (m), (2) σi (m0 , m, D) = αi (m0 )γi (m0 , m, D)βi+1 (m), (3) and αi (m), βi (m), and γi (m0 , m, D) are the forward, backward, and state transition metrics respectively. Note that strictly, the above metrics depend on Y0ρ , but for brevity we do not indicate this dependence in the notation. The summation in (1) is taken over the combination of m0 , m, being respectively the drift before and after the symbol at index i. The forward and backward metrics are obtained recursively using X αi (m) = αi−1 (m0 )γi−1 (m0 , m, D), (4) m0 ,D and βi (m) = X βi+1 (m0 )γi (m, m0 , D). (5) m0 ,D Initial conditions for known frame boundaries are given by ( ( 1 if m = 0 1 if m = ρ − τ α0 (m) = and βN (m) = 0 otherwise, 0 otherwise. Finally, the state transition metric is defined as n(i+1)+m γi (m0 , m, D) = Pr {Di = D} R(Yni+m0 | Ci (D)) (6) where Ci (D) is the n-bit sequence encoding D and R(ẏ|x) is the probability of receiving a sequence ẏ given that x was sent 3 through the channel (we refer to this as the receiver metric). The a priori probability Pr {Di = D} is determined by the source statistics, which we generally assume to be equiprobable so that Pr {Di = D} = 1/q. In iterative decoding, the prior probabilities are set using extrinsic information from the previous pass of an outer decoder, as explained in Section II-A. The receiver metric is obtained by calculating the forward recursion X  t+m α̇t−1 (m0 ) · Q ẏt−1+m α̇t (m) = (7) 0 |xt−1 , m0 where for brevity we do not show the dependence on ẏ and x, and Q(y|x) can be directly computed from y, x and the channel parameters:  if µ = 0   Pd   Pi µ−1 1 Q(y|x) = Pt P s + 2 Pi P d if µ > 0, yµ−1 6= x 2    Pi µ−1 1 Pt P̄s + 2 Pi Pd if µ > 0, yµ−1 = x, 2 where µ is the length of y and P̄s = 1 − Ps . The required value of the receiver metric is given by R(ẏ|x) = α̇n (µ̇ − n), where µ̇ is the length of ẏ, n is the length of x. As in [16], the α, β, and α̇ metrics are normalized as they are computed to avoid exceeding the limits of floatingpoint representation. We also assume that (7) is computed at single precision1 , while the remaining equations use double precision. III. TVB C ODE D ESIGN A. Construction Criteria In any error-correcting scheme, the decoder’s objective is to minimize the probability of decoding error (at the bit or codeword level depending on the application). If the channel does not introduce synchronization errors, this optimization may be performed independently of previous or subsequent codewords. Hence the performance of the code depends exclusively on its distance properties. In particular, the performance of the code at low channel error rate is dominated by the code’s minimum Hamming distance. At any channel error rate the performance is determined by the code’s distance spectrum [18], [19]. Thus when designing codes for substitution error channels, either the minimum Hamming distance or the more complete distance spectrum needs to be optimized for the given code parameters. In the case of the BSID channel, and other channels that allow synchronization errors, a similar behaviour is observed if the codeword boundaries are known, only this time the Levenshtein distance [2] replaces the Hamming one. Recall that the Levenshtein distance gives the minimum number of edits (insertions, deletions, or substitutions) that will change one codeword into another. For the BSID channel an upper bound for the probability of decoding a codeword in error was given in [15], assuming codeword boundaries are known. For Pi , Pd , Ps  1, the bound of [15, (9)] is dominated by the number of correctable 1 We refer to 32-bit floating point as single precision, and 64-bit floating point as double precision. errors, t. Now, for a code with jminimumk Levenshtein distance d −1 [2]. Hence designing dlmin , it can be shown that t = lmin 2 TVB codes with constituent encodings having large dlmin will result in the greatest improvement to the code’s performance at low channel error rates. However, in general the codeword boundaries are not known and need to be estimated by the decoder. Therefore decoding a given codeword on synchronization error channels depends not only on the current received word, but also on previous and subsequent ones. This means that the performance of a TVB code depends not only on the distance properties of constituent encodings considered separately, but also on the relationship between constituent encodings. This effect becomes more significant under poorer channel conditions, where the drift can easily exceed the length of a codeword. Unfortunately, the required relationship between constituent encodings for optimal performance over the BSID channel is still an open problem. What is known is that the diversity created by a sequence of different encodings helps the decoder estimate the drift within a codeword length, improving performance at higher channel error rates [15]. B. Representation of Previous Schemes as TVB Codes TVB codes generalize a number of existing synchronization error-correcting codes. The flexibility of the generalization allows the creation of improved codes at the same size and rate, as we shall show. Consider first the sparse inner codes with a distributed marker sequence2 of the Davey-MacKay construction [4]. It is clear that the sparse code is a fixed encoding C 0 : Fq ,→ Fn2 ; these codewords are then added to a distributed marker sequence wi of length n, specific for each codeword index i. Thus we can write Ci (Di ) = C 0 (Di ) + wi to represent the inner codes of [4] as TVB codes. The equivalence of this mapping to the inner code of [4] has also been shown in [16]. The distributed marker serves the same function as the use of different encodings in TVB codes. The decoder of [4] tracks the marker sequence directly, treating the additive encoded message sequence as substitution errors. Therefore, to corrupt the marker sequence as little as possible, the inner code used is sparse. The sparseness results in a low dlmin , making it harder for the decoder to distinguish between the various codewords, and leads to relatively poor performance at low channel error rates. The codes of [15] can similarly be represented as TVB codes, with C 0 corresponding to the Synchronization and Error Correcting (SEC) code and wi corresponding to the Allowed Modification Vectors (AMVs). SEC codes are designed with a large dlmin for good performance at low channel error rates. For such channels this code can perform much better than the sparse code of [4]. AMVs are chosen such that when added to the SEC code the resulting code’s dlmin does not change. Clearly, the AMVs serve the same function as the use of different encodings in TVB codes. In contrast to a random distributed marker sequence, the use of AMVs does 2 This was originally referred to as a watermark sequence. 4 Table I A (7, 8, 4) TVB CODE C = (C0 , . . . , C3 ) WITH dlmin = 3. 100 C1 0000000 0000111 0011110 0110101 1001001 1100110 1111000 1111111 C2 0000011 0001100 0011111 0101010 1011001 1100000 1100111 1111110 C3 0000000 0001111 0101001 0110110 1000011 1001100 1110000 1111111 10−1 Symbol Error Rate C0 0000000 0000111 0011001 0110110 1001010 1100001 1111000 1111111 Comparison of Inner Codes with (n,q) =(7,8) and N =666 (7,8) sparse + random marker 3 data bits + 4 marker bits (7,8,3) SEC code with 8 AMVs (7,8,4) TVB code 10−2 10−3 not compromise the performance of the underlying SEC code at low channel error rates. In general, however, the Levenshtein distance spectrum is altered. The separate constituent encodings in TVB codes give greater design freedom than SEC codes with AMVs and also allows the design of constituent encodings that maintain the required optimized Levenshtein distance spectrum. The marker codes given by Ratzer [5] can also be cast as TVB codes by letting each possible sequence of data bits (between markers) be represented by a q-ary symbol. For example, consider a marker code with 3 marker bits inserted after every 9 data bits, where the 3-bit marker is randomly chosen between the sequences 001 and 110. This can be represented as a (12, 512, 2) TVB code, where encoding C0 consists of all possible 9-bit sequences appended with 001, and C1 consists of all possible 9-bit sequences appended with 110. Like the sparse codes of [4], these marker codes suffer from a low dlmin , leading to relatively poor performance at low channel error rates. On the other hand, the fixed marker bits improve the determination of codeword boundaries, and the random use of different marker bits creates the necessary diversity to improve performance in poorer channel conditions. To illustrate the difference in performance between the various designs, consider encodings of size (n, q) = (7, 8) with N = 666 (same size as codes C and H in [4]). A (7, 8, 4) TVB code where each constituent code has the best possible Levenshtein distance spectrum with dlmin = 3, found through an exhaustive search, is given in Table I. In Fig. 1 we compare this TVB code with earlier constructions from the literature at the same size. Consider first the SEC code of the same size and dlmin from [15], used with 8 AMVs in a random sequence. As expected, the TVB code performs better due to its improved Levenshtein distance spectrum, even though both TVB and SEC codes have the same dlmin . The performance of the sparse code with random distributed marker from [4] is considerably worse, particularly at low channel error rates. Similarly a code with three data bits and four marker bits (randomly chosen between 0011/1100), similar to [5], also performs poorly at low channel error rates. IV. A PPROPRIATE L IMITS ON S TATE S PACE The equations in Section II-C assume that summations can be taken over the set of all possible states. For a channel such as the one considered, the state space is unbounded for positive drifts. A practical implementation will have to take sums over a finite subset of states. In [4] the state space was limited 10−4 −5 10 10−4 10−3 10−2 Channel Error Event Probability (Pd = Pi; Ps =0) 10−1 3 ×10−1 Figure 1. Comparison of inner code designs of size (n, q) = (7, 8) with N = 666: a sparse code with random distributed marker from [4], a marker code with 0011/1100 marker bits similar to [5], a SEC code with randomlysequenced AMVs from [15], and the TVB code of Table I. to a drift |St | ≤ xmax , where xmax was chosen to be ‘several times larger’ than the standard deviation of the synchronization drift over one block length, assuming this takes a Gaussian distribution. No recommendation was given for the value that should be used. Limiting the state space is by definition sub-optimal. However, we can arbitrarily lower the number of cases where the sub-optimal solution is worse than the optimal one, by ensuring that only the least likely states are omitted. The choice of summation limits also involves a trade-off with complexity, which has a polynomial relationship with the size of the state space (c.f. Section V). Therefore, an appropriate choice of summation limits will result in the smallest state space such that the probability of the drift being outside that range is as low as required. The first step to identify good summation limits is to derive an accurate probability distribution of the state space, avoiding the Gaussian approximation of [4]. A. Drift Probability Distribution The drift ST after transmission of T bits was stated in [4] (and shown in [20]) to be normally distributed with zero mean and a variance equal to T p/(1 − p) for the special case where p := Pi = Pd . This distribution is asymptotically valid as T → ∞. For cases where Pi 6= Pd or where T is not large enough, this distribution cannot be used. This is particularly relevant for determining the summation limits of (7) where the sequence length n is not large. An exact expression for the probability distribution of ST is given by ΦT (m) = Pr {ST = m}  j T   X T T +m+j−1 Pi Pd T m = Pt Pi , j m+j Pt j=j (8) 0 where j0 = max(−m, 0). Observe that for a drift of m bits, we need m insertion events more than we have deletion events. Over a sequence of T bits, for j deletion events, this means 5 m + j insertion events and T − j transmission events. The j probability of this is Pim+j Pdj PtT −j = PtT Pim [Pi Pd /Pt ] . We get (8) by adding all different combinations of these events, and summing over j, noting that we cannot have fewer than 0 events of any type. Specifically, the number of combinations  for j deletions in T transmitted bits is given by Tj . The number of combinations for m + j insertions is given by T +m+j−1 , as the m + j insertion events create an additional m+j m + j opportunities for insertion. B. Avoiding Numerical Issues In a practical implementation, computing the drift probability (8) requires a few special considerations. Practical codes from the literature have codeword size n in the range 5–12 bits and number of codewords N up to 1000, for a frame length nN of about 4000–6000 bits. These codes are designed to operate under channel conditions Pi , Pd from 10−3 to above 10−1 . Evaluating (8) under these conditions, one encounters very large values for the two binomial coefficients and very small values for the power term. For example, consider evaluating (8) at m = 0 for T = 6000 and Pi = Pd = 10−3 . The two binomial coefficients have a range of up to 1.56 × 101804 (at j = 3000) and 8.34 × 103609 (at j = 6000) respectively. The power term has a range of down to 1.65 × 10−35995 (at j = 6000). This range is far beyond that representable even in double-precision floating point. A direct implementation of (8) will therefore result in numerical overflow and underflow (in computing the binomial coefficients and power term respectively) for typical frame sizes and channel conditions, even though the summation term itself is representable. The above numerical range problem can be avoided by combining the computation of all terms in the summation as follows. Observe that (8) can be rewritten as ΦT (m) = T X δj , (9) j=j0 j    T +m+j−1 Pi Pd T m T (10) where δj = Pt Pi Pt j m+j and j0 = max(−m, 0) as before. In this expression, note that the summation is empty if j0 > T , resulting in zero probability. Also, since j ≥ 0, the first binomial coefficient is always non-zero, while the second binomial coefficient is non-zero if T > 0. Expanding the binomial coefficients using the factorial formula, we can express the summation term recursively as δj = δj−1 · Pi P d T + m + j − 1 T − j + 1 · · , Pt m+j j (11) allowing successive factors to be determined easily from previous ones. The initial factor required is the one at j0 , and can be determined from (10) by expanding the binomial coefficients using the multiplicative formula:  j j0 m+j0 Y T − j0 − i Y T − 1 − i Pi Pd 0 δj0 = PtT Pim . i i Pt i=1 i=1 (12) Consider the earlier example, now evaluating (9) at m = 0 for T = 6000 and Pi = Pd = 10−3 . In this case, the initial value δj0 = 6.07 × 10−6 , and the multiplier δj /δj−1 in the recursive expression (11) has its smallest value of 3.34×10−10 at j = 6000. Both values are easily representable as floating point numbers. Using (9), numerical range issues remain when computing δj0 for larger values of Pi , Pd , and consequently also for storing successive values of δj . For example, consider evaluating (9) at m = 0 for T = 6000 and Pi = Pd = 10−1 . In this case δj0 = 3.47 × 10−582 , and one needs to accumulate a number of δj values in this range to obtain the required result Φ6000 (0) = 0.0109. Again, the intermediate values are beyond the range of double-precision floating point numbers although the final result is representable. These numerical range issues can be avoided by computing (11) and (12) using logarithms. For the earlier example with m = 0, T = 6000, and Pi = Pd = 10−1 , we now get log δj0 = −1.34 × 103 and the smallest value of log δj is −1.93 × 104 at j = 6000. Finally, the required drift probability is obtained by accumulating the exponential of the log δj values using (9). However, the individual values of δj are still beyond the range of double-precision floating point. In practice, we have found that the use of extended-precision (80-bit) floating point provides sufficient range. Alternatively, the accumulation in (9) may be computed in logarithmic domain using the property  log(A + B) = log A + log 1 + elog B−log A . Note that expression (8) is valid for any Pi ≥ 0, Pd ≥ 0, and Pi + Pd < 1. However, the computation using logarithms cannot be applied directly when either or both of Pi and Pd are zero. These degenerate cases have to be handled as special cases, by first reducing (8) and then implementing the simplified equations using logarithms. C. Probability of Drift Outside Range + We want to choose lower and upper limits m− T , mT such that the drift after transmitting a sequence of T bits is outside + the range {m− T . . . mT } with an arbitrarily low probability Pr :   + Pr ST < m− < Pr , T + Pr ST > mT (13) m+ T or equivalently: 1 − X ΦT (m) < Pr . (14) m=m− T An appropriate choice of limits can be obtained iteratively as follows. Observe that for the BSID channel ΦT (m) is monotonically decreasing with increasing |m|. A first estimate for the limits is given by: −(1) mT +(1) and mT Pr 2 Pr = min m ΦT (m + 1) < , 2 = max m ΦT (m − 1) < (15) (16) where the number in superscript parentheses indicates the iteration count. If these estimates satisfy (14), we use them 6 103 That is, we extend the range by one in the direction of greatest gain. The iterative process is repeated until (14) is satisfied. − The size of the state space is given by MT = m+ T − mT + 1. E. Example Overestimating the required state space increases computational complexity, while underestimating the state space often results in poor decoding performance. Accurate limits are particularly important for restricting the drifts considered across each codeword. It is therefore useful to illustrate the discrepancy between the approximate distribution of [4] and the exact expression for the distribution of the drift. Consider a system with typical block and codeword sizes N = 500, n = Mτ (appr.) Mτ (exact) Mn (appr.) Mn (exact) M1 (appr.) M1 (exact) 102 101 100 −4 10 D. Choice of Summation Limits 10−3 10−2 10−1 Channel Error Event Probability (Pd = Pi; Ps =0) 100 (a) Probability of Event Outside Chosen Limits When considering the whole frame, T = τ , so that the overall size of the state space is given by Mτ . Now the final output of the MAP decoder is calculated using (1), which sums 0 + over all Mτ prior states m− τ ≤ m ≤ mτ . For each prior state, however, only the drifts introduced by the transmission of n bits need to be considered, corresponding to a subset Mn of + states m− n ≤ m ≤ mn . Similarly, the computation of (4) + and (5) is required for all Mτ states m− τ ≤ m ≤ mτ , each involving a summation over Mn prior or posterior states m− n ≤ respectively. Finally, the state transition metric is m0 ≤ m+ n obtained using the forward pass of (7); this is computed over + a sequence of n bits for each of Mn states m− n ≤ m ≤ mn . Each recursion consists of a summation over prior states m0 ; in this case only the drifts introduced by the transmission of one bit need to be considered, corresponding to a subset M1 + 0 of prior states m− 1 ≤ m ≤ m1 . Now consider that we want to limit the probability of any of these summations not covering an actual channel event over a whole frame to, say, no more than Pe . When computing the limits over the whole frame, m± τ , we simply need to set Pr = Pe . However, when computing limits over an n-bit sequence, m± repeated for each of N such n , since this summation is √ sequences, we set Pr = 1 − N 1 − Pe ≈ PNe for small Pe . Similarly, for limits over a 1-bit sequence, m± 1 , we use Pr = √ τ 1 − 1 − Pe ≈ Pτe for small Pe . Except in the case of stream decoding (c.f. Section VII), the state space limits only need to be determined once and remain valid as long as the channel conditions do not change. In any case, the required values of ΦT (m) depend only on the code parameters and channel conditions, so that a table may be pre-computed. This makes the average complexity of determining the state space limits negligible. N =500, n =10, Pe =10−10 104 Number of States as our lower and upper limits. Otherwise these estimates are updated iteratively as follows: ( −(i) +(i) −(i) mT − 1 if ΦT (mT + 1) ≤ ΦT (mT − 1) −(i+1) mT = −(i) mT otherwise, (17) ( +(i) +(i) −(i) mT + 1 if ΦT (mT + 1) > ΦT (mT − 1) +(i+1) mT = +(i) mT otherwise. (18) 100 10−1 10−2 10−3 10−4 10−5 10−6 10−7 10−8 10−9 10−10 10−11 10−12 10−13 −4 10 N =500, n =10, Pe =10−10 Mτ (appr.) Mτ (exact) Mn (appr.) Mn (exact) M1 (appr.) M1 (exact) 10−3 10−2 10−1 Channel Error Event Probability (Pd = Pi; Ps =0) 100 (b) Figure 2. (a) Number of states within summation limits, and (b) probability of encountering a channel event outside the chosen summation limits over a single frame, using the approximation of [4] and our exact computation. 10. We plot in Fig. 2a the number of states within summation limits using the approximate and exact expressions, in each case for Pe = 10−10 . For T = 1, [4, Section VII.A] assumes a maximum of two successive insertions; this is equivalent to setting m+ 1 = 2, so that M1 = 4. It is immediately apparent that while the approximation is very close for large T and high Pi = Pd , it quickly starts to underestimate the required range at lower channel error rates. As expected, the discrepancy is particularly large when considering shorter sequences. For T = 1 it is not surprising that there is a large discrepancy for channels with high error rate. Next, we determine the probability of encountering a channel event outside the chosen limits over a single frame, shown in Fig. 2b for the same limits used in Fig. 2a. For the exact distribution, this probability is always below the chosen threshold Pe = 10−10 , as expected. For the approximation, however, the probability of exceeding the chosen limits is higher than the threshold throughout the range considered. 7 At lower channel error rates, the discrepancy is significant (several orders of magnitude) even for large T . For small T , the probability of exceeding the chosen limits is high enough to make the approximation useless. For T = 1, the artificial limit of two successive insertions of [4] means that channels with high error rate will exceed this limit with high probability. V. A LGORITHM C OMPLEXITY A. Complexity of the MAP Decoder As a first step towards determining the overall complexity of the decoder, consider first the calculation of the state transition metric in (6). This is recursively computed using the forward pass of (7) over a sequence of n bits, for each of Mn states m. Each recursion consists of a summation over M1 prior states m0 as argued in Section IV-D. The bit-level probability Q can be obtained by a look-up table. Thus the complexity for calculating a single state transition metric is Θ(nMn M1 ). The final output of the algorithm consists of q probabilities for each of N symbols, calculated using (1). This equation sums over all Mτ prior states m0 and Mn states m, defining the domain for σi (m0 , m, D). It follows from (3) that the domain for γi (m0 , m, D) is the same. Now the computation of (3) is dominated by the evaluation of γi (m0 , m, D) in (6), whose complexity is Θ(nMn M1 ) as shown. Considering the number of times the γ metric is computed, the MAP decoder has an asymptotic complexity of Θ(N nqMτ Mn2 M1 ). B. Complexity of the Davey-MacKay Decoder It would initially appear that the MAP decoder complexity is significantly higher than that of the Davey-MacKay decoder, given as O(N nMτ M1 ) in [4] for a direct implementation (using our notation). However, the expression of the DaveyMacKay decoder seems to consider only the complexity of the initial forward and backward passes, ignoring the additional small forward passes needed to compute the final decoder output. The final output of the Davey-MacKay algorithm also consists of q probabilities for each of N symbols. Each of these is computed using [4, (4)], which sums over all possible prior and posterior states. In a direct implementation all possible prior states need to be considered; using our notation the number of states is Mτ . While not stated in [4], the number of posterior states that need to be considered is Mn , as argued for the MAP decoder. The computation within the summation of [4, (4)] is dominated by the conditional probability, which is computed using a separate forward pass. This forward pass is effectively identical to (7) whose complexity is Θ(nMn M1 ). Considering the number of times the forward pass is computed, it follows that the Davey-MacKay decoder has an overall asymptotic complexity of Θ(N nqMτ Mn2 M1 ). C. Comments on Algorithm Complexity Comparing the complexity expressions for the MAP decoder for TVB codes and the Davey-MacKay decoder for sparse codes with a distributed marker sequence, it follows that the asymptotic complexity for both decoders is the same. This is consistent with experimental running times for both decoders in [13]. In the complexity expression note that N , n, and q depend only on the code parameters while Mτ , Mn , and M1 also depend on the channel conditions. For M1 , it was argued in [4, Section VII.A] that it is sufficient to consider a maximum of two successive insertions, at a minimal cost to decoding performance. This is equivalent to setting m+ 1 = 2, so that M1 = 4; these limits were also used in [13], [14]. However, this artificially low limit is insufficient for more advanced code constructions, as shown in [15]. It was also argued in [4] that useful speedups can be obtained by only following paths through the trellis that pass through nodes with probabilities above a certain threshold. However, the choice of this threshold was not analyzed. It is also likely that this choice would depend on the properties of the inner code being used. VI. S PEEDING T HINGS U P A. Batch Computation of Receiver Metric In a naïve implementation, each γ computation (6) requires the computation of the receiver metric as a separate forward pass using (7). However it can be observed that for a given starting state m0 and symbol D, the γ metric will be computed for each end state m within the limits considered (c.f. equations (1), (3), (4), and (5), where the γ computations are used). In turn, this means that for a given x, the receiver metric will need to be determined for all subsequences ẏ within the drift limit considered. It is therefore sufficient to compute the forward pass (7) once, with the longest subsequence ẏ required. In doing so, the values of the receiver metric for shorter subsequences are obtained for free. We call this approach batch computation. This effectively reduces the complexity of computing the collection of γ metrics by a factor of Mn . The asymptotic complexity of the MAP decoder is therefore reduced to Θ(N nqMτ Mn M1 ). B. Lattice Implementation of Receiver Metric To compute the receiver metric, an alternative to the trellis of (7) is to define a recursion over a lattice as in [17]. For the computation of R(ẏ|x), the required lattice has n + 1 rows and µ̇ + 1 columns. Each horizontal path represents an insertion with probability 21 Pi , each vertical path is a deletion with probability Pd , while each diagonal path is a transmission with probability Pt Ps if the corresponding elements from x and ẏ are different or Pt P̄s if they are the same. Let Fi,j represent the lattice node in row i, column j. Then the lattice computation in the general case is defined by the recursion Fi,j = 1 Pi Fi,j−1 + Pd Fi−1,j + Q̇(ẏj |xi )Fi−1,j−1 , 2 (19) which is valid for i < n, and where Q̇(y|x) can be directly computed from y, x and the channel parameters: ( Pt Ps if y 6= x Q̇(y|x) = (20) Pt P̄s if y = x. 8 Table II C OMPLEXITY EXPRESSIONS FOR THE MAP DECODER FOR VARIOUS COMPUTATION MODES OF THE RECEIVER METRIC . Initial conditions are given by ( 1 if i = 0, j = 0 Fi,j = 0 if i < 0 or j < 0. (21) The last row is computed differently as the channel model does not allow the last event to be an insertion. In this case, when i = n, the lattice computation is defined by Fn,j = Pd Fn−1,j + Q̇(ẏj |xn )Fn−1,j−1 . C. Optimizing the Lattice Implementation In the lattice implementation of the receiver metric, it can be readily seen that the horizontal distance of a lattice node from the main diagonal is equivalent to the channel drift for the corresponding transmitted bit. It should therefore be clear that the likelihood of a path passing through a lattice node decreases as the distance to the main diagonal increases. We can take advantage of the above observation by limiting the lattice computation to paths within a fixed corridor around the main diagonal. Specifically, the arguments of Section IV can be applied directly, resulting in a corridor of width Mn in general for the transmitted sequence of n bits considered. Exceptions to this width occur in the first few rows with index + i < −m− n and the last few rows with index i > µ̇ − mn , where part of the corridor falls outside the lattice rectangle. The number of nodes within this corridor is given by where κUL = κLR = − ∆(−m− n ) − ∆(−mn − n), + ∆(n + m+ n − µ̇) − ∆(mn − ( and ∆(k) = k2 +k 2 0 if k > 0 otherwise. (23) (24) µ̇), Algorithm Original Batch computation Lattice receiver D Corridor constraint Complexity Θ(N nqMτ Mn2 M1 ) Θ(N nqMτ Mn M1 ) + Θ(N  nqMτ h[n + mn ]) h ii − 2 Θ N qMτ nMn − 21 (m− n ) − mn (22) Finally, the required receiver metric is obtained from this computation as R(ẏ|x) = Fn,µ̇ . The calculation of a single run through the lattice requires a number of computations proportional to the number of nodes in the lattice. Now for the transmitted sequence of n bits considered, the number of rows will always be n while the number of columns is at most n + m+ n . The complexity of a direct implementation of this algorithm is therefore Θ(n[n + m+ n ]). It has been argued in Section VI-A that for a given x, the receiver metric R(ẏ|x) needs to be determined for all subsequences ẏ within the drift limit considered. Observe that the same argument applies equally when the receiver metric is computed using the lattice implementation (19). Therefore, when the lattice implementation is used in batch mode, the MAP decoder has an asymptotic complexity of Θ(N nqMτ [n + m+ n ]). κ = nMn − κUL − κLR , A B C (25) (26) The complexity of the corridor-limited lattice algorithm is therefore Θ(nMn − κUL − κLR ). Some simplification of this expression is possible when the corridor-limited lattice algorithm is used in the MAP decoder with batch computation for the channel considered. When batch computation is used, µ̇ = n + m+ n by definition, so that κLR = 0. Furthermore, for the BSID channel,  − 2  1 − −n ≤ m− ≤ 0, so that κ = (m ) − m . Under these UL n n n 2 conditions,the MAP decoder has an asymptotic complexity of   2 − Θ N qMτ nMn − 12 (m− ) − m . n n D. Comparing Complexity A summary of the complexity expressions for the MAP decoder for various computation modes of the receiver metric is given in Table II. Comparing the expressions in rows A and B of Table II we can immediately see that the batch computation of the receiver metric reduces complexity by a factor equal to Mn . Unfortunately, the remaining complexity expressions contain terms that depend on the code parameters and channel conditions in a rather opaque way, making it harder to understand the benefits of these improvements. In the first instance, we can simplify the expressions further to facilitate comparison. Consider the expression in row C of Table II, when the lattice implementation is used. It can be shown that n + m+ n → Mn − 1 as channel conditions get worse; we can therefore simplify the complexity expression to O(N nqMτ Mn ). Comparing this to the expression in row B of Table II we can see that the use of the lattice implementation reduces complexity by a factor of at least M1 . Finally, consider the expression in row D of Table II, when the corridor − constraint  −is 2applied  to the lattice algorithm. Since mn ≤ 0, 1 − the 2 (mn ) − mn term is strictly positive. The reduction in complexity offered by the corridor constraint is therefore equal 2nMn to 2nM −(m − , and becomes significant as channel con− 2 n n ) +mn ditions improve. As channel conditions get worse, m− n → −n, so that the expression is dominated by the nMn term. Under these conditions, the complexity of the corridor-constrained lattice implementation becomes approximately equal to that of the unconstrained lattice implementation. We can also illustrate the effect of the proposed speedups by considering a rate- 21 TVB code with typical block and codeword sizes N = 500, n = 10, and q = 32. We compute the MAP decoder complexity for this code under a range of channel conditions, using the original algorithm of Section II-C and the improvements described above. We plot these in Fig. 3 using the same summation limits as in Section IV-E. Note that for a fairer comparison between the lattice and trellis modes, we include a constant factor of three in the lattice computation. This follows the observation that each lattice node computation (19) requires three multiplications while each trellis computation (7) requires only one. A few general observations can be made on this graph: a) The batch computation of the receiver metric results in a considerable reduction of complexity throughout, but is even more significant under poor channel conditions. b) The lattice implementation is considerably less complex than the 9 N =500, n =10, q =32 Complexity (Number of Arithmetic Operations) 1014 1013 1012 Trellis Trellis (batch) Lattice (batch) Lattice corridor (batch) 1011 1010 109 108 107 −4 10 10−3 10−2 10−1 Channel Error Event Probability (Pd = Pi; Ps =0) 100 Figure 3. MAP decoder complexity (in number of arithmetic operations) under a range of channel conditions, for various computation modes of the receiver metric. trellis implementation at high channel error rates. c) The lattice corridor constraint extends this improvement to the low channel error rate range. In conclusion, the proposed speedups result in a considerable reduction in complexity of almost two orders of magnitude for typical code sizes and channel conditions. We have observed a similar trend under a range of typical code sizes, so this result can be taken as representative. Note that in general this distribution βN (m) has a wider spread than Φτ (m). As discussed in Sections IV-C and IV-D, the choice of state space limits depends on the expected distribution of drift. For limits involving the whole frame, the distribution used is Φτ (m), which assumes that the initial drift is zero. The assumption does not hold under stream decoding conditions, where the initial drift is not known a priori, although its distribution can be estimated. The uncertainty in locating the startof-frame position increases the uncertainty in locating the endof-frame position, resulting in a wider prior distribution for the end-state boundary condition βN (m). Therefore, any limits on state space determined using Φτ (m) will be underestimated. The severity of this error depends on the difference between βN (m) and Φτ (m), which increases as channel conditions get worse. For stream decoding, therefore, it is sensible to recompute the state space limit Mτ at the onset of decoding a given frame, using βN (m) in lieu of Φτ (m). Doing so avoids underestimating the required state space, and implies that for stream decoding, the state space size will change depending on how well-determined the frame boundaries are. After decoding the current frame, we obtain the posterior probability distribution for the drift at end-of-frame, given by: n o n o τ +m+ τ +m+ Pr Sτ = m Ym− τ = λN (m)/ Pr Ym− τ τ τ λN (m) . =P 0 m0 λN (m ) (28) The most likely drift at end-of-frame can be found by: VII. S TREAM D ECODING We have so far considered the case where frame boundaries are known exactly. While there are practical cases involving single-frame transmission where this is true, exact frame boundaries are often unknown. The MAP decoder can handle such cases by changing the initial conditions for (4) and (5) and choosing appropriate state space limits. This obviates the need for explicit frame-synchronization markers as used in conventional communication systems, and can therefore reduce this overhead. The approach presented here is in principle similar to that used in [4] for ‘sliding window’ decoding. However, there are some critical differences which we explore further in Section VII-C. A. Choosing End-of-Frame Priors Consider first the common case where a sequence of frames is transmitted in a stream. The usual practice in communication systems is for the receiver to decode one frame at a time, starting the decoding process as soon as all the data related to the current frame is obtained from the channel. In this case, τ +m+ the current received frame is considered to be Ym− τ , which τ may include some bits from the end of the previous frame and start of the next frame. The end-state boundary condition for (5) can be obtained by convolving the expected end-of-frame drift probability distribution with the start-state distribution: X βN (m) = α0 (m0 )Φτ (m − m0 ). (27) m0 λN (m) = arg max λN (m). 0 m m0 λN (m ) Ŝτ = arg max P m (29) As in [4], we determine the nominal start position of the next frame by shifting the received stream by τ + Ŝτ positions. The initial condition for the forward metric for the next frame, α̂0 (m), is set to: λN (m + Ŝτ ) α̂0 (m) = P , 0 m0 λN (m ) (30) replacing the initial condition for (4) reflecting a known frame boundary. B. Stream Look-Ahead Taking advantage of the different constituent encodings in TVB codes, the MAP decoder can make use of information from the following frame to improve the determination of the end-of-frame position. We augment the current block of N symbols with the first ν symbols from the following block (or blocks, when ν > N ), for an augmented block size N 0 = N +ν. The MAP decoder is applied to the corresponding augmented frame. After decoding, only the posteriors for the initial N symbols are kept; the start of the next frame is determined from the drift posteriors at the end of the first N symbols, and the process is repeated. Consider the latency of the MAP decoder to be the time from when the first bit of a frame enters the channel to when the decoded frame is available. The cost of look-ahead is an increase in decoding complexity and latency corresponding 10 to the change in block size from N to N 0 . The effect on complexity is seen by using terms corresponding to the augmented block size in the expressions of Table II. The latency is equal to the time it takes to receive the complete frame and decode it. Look-ahead increases the time to receive the augmented frame linearly with ν and the decoding time according to the increase in complexity. The required look-ahead ν depends on the channel conditions and the code construction. In general, a larger value is required as the channel error rate increases. We show how an appropriate value for ν can be chosen for a given code under specific channel conditions in Section VIII-A. Typical values for ν are small (ν < 10) for good to moderate channels (Pi , Pd < 10−2 ). The required look-ahead increases significantly for poor channels: the example in Section VIII-A requires ν = 1000 at Pi = Pd = 2 × 10−1 . C. Comparison with Davey-MacKay Decoder A key feature of the Davey-MacKay construction is the presence of a known distributed marker sequence that is independent of the encoded message. This allows the decoder, in principle, to compute the forward and backward passes over the complete stream. However, to reduce decoding delay, the decoder of [4] performs frame-by-frame decoding using a ‘sliding window’ mechanism. The ‘sliding window’ mechanism seems intended to approximate the computation of the forward and backward passes over all received data at once. This approach is similar in principle to ours when stream lookahead is used; however, there are some critical differences which we discuss below. In [4], the starting index for a given frame is taken to be the most likely end position of the previous frame, as determined by the Markov model posteriors. This is the same as the approach we use in Section VII-A. However, in [4], the initial conditions of the forward pass are simply copied from the final values of the forward pass for the previous frame. This is consistent with the view that the ‘sliding window’ mechanism approximates the computation over all received data at once, but contrasts with our method. In Section VII-A the initial conditions of the forward pass are determined from the posterior probabilities of the drift at the end of the previous frame. These drift posteriors include information from the look-ahead region and from the priors at the end of the augmented frame, which were determined analytically from the channel parameters. Observe that in the ‘sliding window’ mechanism of [4], the backward pass values cannot be computed exactly as for the complete stream. Instead, the decoder of [4] computes the forward pass for some distance beyond the expected end of frame position, and initializes the backward pass from that point. The suggested distance by which to exceed the expected end of frame position is ‘several (e.g. five) multiples of xmax ’, where xmax is the largest drift considered. The concept is the same as the stream look-ahead of Section VII-B. However, we recommend choosing the look-ahead quantity ν based on empirical evidence (c.f. Section VIII-A). It is claimed in [4] that the backward pass is initialized from the final forward pass values; the reasoning behind this is unclear, and does not seem to have a theoretical justification. We initialize the backward pass with the prior probabilities for the drift at the end of frame, as explained in Section VII-A. D. Initial Synchronization The only remaining problem is to determine start-of-frame synchronization at the onset of decoding a stream. This can be obtained by choosing state space limits Mτ large enough to encompass the initial desynchronization and by setting equiprobable initial conditions: α0 (m) = βN (m) = 1 ∀m. Previous experimental results [4] have assumed a Mτ known start for the first frame, with the decoder responsible for maintaining synchronization from that point onwards. We adopt the same strategy in the following. VIII. R ESULTS Practical results are given in this section. We show how an appropriate choice of decoder parameters allows stream decoding to perform as well as when frame boundaries are known. Results are also given for existing constructions which can be expressed as TVB codes, showing how the symbol-level MAP decoder improves on the original decoder (in the case of [4]) or is equivalent (in the case of [5]). We also demonstrate some improved constructions allowed by the flexibility of TVB codes. These are achieved by using simulated annealing to find TVB codes of a required order with a good Levenshtein distance spectrum. Specifically, we seek to find constituent codes with the highest possible minimum Levenshtein distance and the lowest multiplicity at small distances. For all codes so designed, M < N ; we construct our TVB codes using a random sampling with replacement of the unique constituent codes, and use this as our inner code. Construction parameters for all codes used in this section are given in Table III. To facilitate reproduction of these results, the TVB codebooks used are available for download from the first author’s web site3 . A. Stream Decoding with MAP Decoder The results of [13] assumed known frame boundaries; under these conditions, the decoder is arguably at an advantage when comparing with the results of [4], [5]. It is also not clear whether the MAP decoder can keep track of frame boundaries with the non-sparse constructions of [13], [15] and the TVB codes introduced here, especially in the absence of a known marker sequence. In the following we investigate the performance of the MAP decoder under stream decoding conditions, and consider the choice of look-ahead required. As in [4] we assume that the start of the first frame is known, while the decoder is responsible for keeping synchronization from that point onwards. We use the limits specified in Section IV. We start by investigating the effect of stream decoding on the ability of the MAP decoder to track codeword boundaries. We consider a (6, 8, 12) TVB code, which is the inner code for the concatenated system N2b of Table III. We simulate 3 Available at http://jabriffa.wordpress.com/publications/data-sets/. 11 Table III C ONSTRUCTION PARAMETERS OF CODES USED IN SIMULATIONS . Labela P1 N1a N1b P2 N2a N2b P3 N3 P4 N4 P5 N5 Inner code (5, 16) sparse (5, 16) sparse (10, 256, 3) TVB (6, 8) sparse (6, 8) sparse (6, 8, 12) TVB 9 bits, uncoded 9 bits, uncoded not applicable (7, 8, 8) TVB not applicable (7, 4, 32) TVB Marker random, distributed random, distributed none random, distributed random, distributed none 001/110, appended 001/110, appended not applicable none not applicable none Outer code LDPC (999, 888) F16 LDPC (999, 888) F16 LDPC (499, 444) F256 LDPC (1000, 100) F8 LDPC (1000, 100) F8 LDPC (1000, 100) F8 LDPC (3001, 2000) F2 LDPC (2997, 1998) F2 b 3 turbo code F2 Rate 14 LDPC (666, 333) F8 1 turbo code F2 Rate 10 LDPC (855, 300) F4 Comment Published in [4, Fig. 8, Code D] Identical construction to P1, symbol-level MAP decoder Same overall rate and block size as P1 Published in [4, Fig. 8, Code I] Identical construction to P2, symbol-level MAP decoder Same overall rate, block size, and outer code as P2 Published in [5, Fig. 7, Code D] Identical inner code to P3, marginally smaller outer code Published in [11, Fig. 4, Code T2] Same overall rate as P4 Published in [11, Fig. 4, Code T4] Same overall rate as P5 a Labels starting with P indicate previously published results, while labels starting with N indicate new simulation results. by truncating the LDPC (3001, 2000) F2 of P3. This truncation is necessary so that the outer-encoded sequence can be expressed by an integral number of inner codewords. b Obtained Fidelity at codeword boundaries, (p = Pd = Pi; Ps =0) 100 Frame Error Rate Fidelity 10−2 10−3 10−1 10−2 (6,8,12) TVB, p =0.22 10−4 0 500 1000 1500 Index for codeword following boundary 2000 Figure 4. The fraction of correctly resynchronized codeword boundaries (fidelity) as a function of codeword index, for code N2b of Table III. this inner code with a block size N = 2000 under the channel conditions at the onset of convergence for the concatenated system, that is at Pi = Pd = 0.22, assuming only the start position of the first frame is known. At each codeword boundary we plot the fraction of correctly determined drifts (fidelity) in Fig. 4. As expected, the fidelity drops at the end of the frame, where the actual drift is unknown to the decoder. However, it can be observed that the fidelity reaches a steady high value within about 1000 codewords from the end of frame. It could therefore be supposed that a look-ahead of ν = 1000 would be sufficient for this code under these channel conditions. The dip at the start of the frame is caused by the uncertainty in the frame start position, due to the very low fidelity at the end of the previous frame. To test this hypothesis, we concatenate this inner code with the (1000, 100) LDPC code over F8 of [4, Code I]. We simulate this system under the following conditions: 1) known frame start and end (frame decoding); 2) known start for the first frame, unknown frame ends (stream decoding), no Comparison of frame and stream decoding for code N2b 10−3 −1 10 Frame [1 iter] Frame [5 iter] Stream, ν =0 [1 iter] Stream, ν =0 [5 iter] Stream, ν =1000 [1 iter] Stream, ν =1000 [5 iter] Channel Error Event Probability (Pd = Pi; Ps =0) 100 Figure 5. Demonstration of the effect of look-ahead on the MAP decoder’s performance under stream decoding conditions, and comparison with frame decoding. look-ahead; 3) stream decoding with look-ahead ν = 1000 codewords. Results are shown in Fig. 5. We give results after the first and fifth iterations. As anticipated, performance under stream decoding conditions is poorer than frame decoding if there is no look-ahead. However, an appropriate look-ahead quantity allows the decoder to perform as well under stream decoding as under frame decoding. It is important to highlight that this result is dependent on the inner code structure, and that therefore the generalization to other constructions is not obvious. However, we have repeated the same test with other constructions, including those of [4], [5], [13]–[15] and the new constructions in this paper, and under different channel conditions. In all cases we have found that the result is repeatable, in that it is possible to approach the performance of frame decoding with stream decoding, as long as an appropriate look-ahead quantity is chosen. The only cost of stream decoding is therefore the need for a fidelity analysis to determine a suitable look-ahead value 12 100 Comparison with Davey & MacKay 100 10−1 Frame Error Rate Frame Error Rate 10−1 10−2 10−3 P1 N1a [1 iter] N1a [5 iter] N1b [1 iter] N1b [5 iter] 10−4 10−5 −3 3 ×10 Comparison with Ratzer and Mansour & Tewfik 10−2 P2 N2a [1 iter] N2a [5 iter] N2b [1 iter] N2b [5 iter] 10−1 Channel Error Event Probability (Pd = Pi; Ps =0) 3 ×10−1 Figure 6. Comparison with Davey-MacKay: improving the performance of [4, Code D] (left) and [4, Code I] (right) using our MAP decoder, iterative decoding, and an inner code with better Levenshtein distance spectrum. and the increased decoding latency and complexity caused by the augmented block size. Since the code performance is undiminished, to simplify our analysis from this point onwards we assume known frame start and end positions. B. Comparison with Prior Art We have already shown in [13] that the (symbol-level) MAP decoder allows us to obtain better performance from the codes of [4]. Further improvement can be obtained with iterative decoding, as we show here. Additionally, the flexibility of TVB codes allows us to obtain codes that perform better at the same size and/or rate. In the following, we simulate channel conditions Pi = Pd ; Ps = 0 in order to compare with published results. For low channel error rates, consider [4, Code D], listed as P1 in Table III. We compare the previously published result with a MAP decoding of the same code (N1a) in Fig. 6. As shown in [13], the MAP decoder improves the performance of this code even after the first iteration; additional iterations improve the result further. At the same overall code rate and block size we can improve the performance further by designing an inner TVB code with a better Levenshtein distance spectrum (N1b). We repeat the process at higher channel error rates for [4, Code I], listed as P2 in Table III. Again, compared to the published result, a MAP decoding of the same code (N2a) improves performance even after the first iteration, also in Fig. 6. Additional iterations improve the result, but the difference in this case is less pronounced. Replacing the inner code with one of the same size but a better Levenshtein distance spectrum (N2b) improves performance further. As we have already discussed in Section II-A, the marker codes given by Ratzer [5] can also be cast as TVB codes. In [5] binary outer LDPC codes were used. To use a binary outer code with our MAP decoder, the bitwise APPs can be obtained from the q-ary symbol APPs by marginalizing over the other bits [21, p. 326]; these are then passed to the decoder for the binary outer code. In this case, for a binary 10−2 P3 [serial] P3 [iterative] N3 [1 iter] N3 [20 iter] P4 [10 iter] N4 [5 iter] P5 [10 iter] N5 [20 iter] 10−3 10−4 10−5 −2 10 10−1 Channel Error Event Probability (Pd = Pi; Ps =0) 100 Figure 7. Comparison with Ratzer and with Mansour & Tewfik: demonstrating the equivalence of our MAP decoder on [5, Code D], with and without iterative decoding, and improving performance on [11, Codes T2, T4] at the same overall code rate, using inner codes with improved Levenshtein distance in concatenation with LDPC outer codes. outer code we expect the performance of the concatenated code to be identical, whether the inner code is decoded with the bit-level (MAP) decoder of [5] or with our symbol-level decoder. We show this in Fig. 7 for [5, Code D], listed as P3 in Table III, in comparison with an almost-identical code (N3) using our MAP decoder. It is important to highlight that decoding marker codes as TVB codes provides no material advantage; in fact, a cost is paid in complexity for doing so. We do not propose or expect that marker codes will be decoded as TVB codes. However, there is value in showing that marker codes can be decoded as TVB codes with no loss in performance. Specifically, this allows us to compare the structure of marker codes with other constructions, within the same context. Finally, in Fig. 7 we compare with the more recent turbo codes of [11, Codes T2, T4], respectively listed as P4 and P5 in Table III, with concatenated systems of the same overall rate, using a TVB inner code and an LDPC outer code. It can be seen that our concatenated systems outperform the codes of [11], significantly at lower channel error rates, and somewhat less so at higher channel error rates. IX. C ONCLUSIONS In this paper we have considered TVB codes, which generalize a number of previous codes for synchronization errors. We discussed the applicable design criteria for TVB codes, expressing some previously published codes as TVB codes and showing that the greater flexibility of TVB codes allows improved constructions. For example, our (7, 8, 4) TVB code achieves a SER of 10−4 at a Pi , Pd that is almost two orders of magnitude higher than a marker or distributed marker code of the same size, and slightly better than our earlier SEC codes. We also considered a number of important issues related to a practical implementation of the corresponding MAP decoder. Specifically, we have given an expression for the 13 expected distribution of drift between transmitter and receiver due to synchronization errors, with consideration for practical concerns when evaluating this expression. We have shown how to determine an appropriate choice for state space limits based on the drift probability distribution. The decoder complexity under given channel conditions is then expressed as a function of the state space limits used. For a given state space, we have also given a number of optimizations that reduce the algorithm complexity with no further loss of decoder performance. The proposed speedups, which are independent of the TVB code construction, result in a considerable reduction in complexity of almost two orders of magnitude for typical code sizes and channel conditions. For code constructions with appropriate mathematical structure we expect to be able to replace the receiver metric, which considers each possible transmitted codeword, with a faster soft-output algorithm. Next, we have considered the practical problem of stream decoding, where there is no prior knowledge of the received frame boundary positions. In doing so we have also shown how an appropriate choice of decoder parameters allows stream decoding to approach the performance when frame boundaries are known, at the expense of some increase in complexity. Finally, practical comparisons of TVB codes with earlier constructions were given, showing that TVB code designs can in fact achieve improved performance. Even compared to the state of the art codes of [11], the TVB codes presented here 1 achieve a FER of 10−3 at 24% higher Pi , Pd for a rate- 10 3 code, and at 84% higher Pi , Pd for a rate- 14 code. We expect further improvements to the codes shown here to be possible, particularly by co-designing optimized outer codes. However, a detailed treatment of the design process is beyond the scope of this paper, and will be the subject of further work. R EFERENCES [1] F. F. Sellers, “Bit loss and gain correction code,” IRE Trans. Inf. Theory, vol. IT-8, pp. 35–38, 1962. [2] V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions and reversals,” Sov. Phys. Doklady, vol. 10, no. 8, pp. 707–710, 1966. [3] R. G. Gallager, “Sequential decoding for binary channels with noise and synchronization errors,” Massachusetts Inst. of Tech. Lexington Lincoln Lab, Tech. Rep. 2502, Oct. 27th, 1961. [4] M. C. Davey and D. J. C. MacKay, “Reliable communication over channels with insertions, deletions, and substitutions,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 687–698, 2001. [5] E. A. Ratzer, “Marker codes for channels with insertions and deletions,” Annals of Telecommunications, vol. 60, pp. 29–44, Jan. 2005. [6] F. Wang, D. Fertonani, and T. M. Duman, “Symbol-level synchronization and LDPC code design for insertion/deletion channels,” IEEE Trans. Commun., vol. 59, no. 5, pp. 1287–1297, May 2011. [7] T. Swart, H. Ferreira, and M. dos Santos, “Using parallel-interconnected Viterbi decoders to correct insertion/deletion errors,” in 7th AFRICON Conference in Africa, vol. 1, Sep. 2004, pp. 341–344. [8] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in IEEE Intern. Conf. on Signal Image Technology and Internet Based Systems (SITIS), 2008, Nov. 30th– Dec. 3rd, 2008, pp. 277–284. [9] M. Mansour and A. Tewfik, “Convolutional decoding in the presence of synchronization errors,” IEEE J. Sel. Areas Commun., vol. 28, no. 2, pp. 218–227, Feb. 2010. [10] M. F. Mansour and A. H. Tewfik, “Convolutional decoding in the presence of synchronization errors,” IEEE J. Selected Areas in Commun., vol. 28, no. 2, pp. 218–227, Feb. 2010. [11] ——, “A turbo coding scheme for channels with synchronization errors,” IEEE Trans. Commun., vol. 60, no. 8, pp. 2091–2100, Aug. 2012. [12] H. Mercier, V. Bhargava, and V. Tarokh, “A survey of error-correcting codes for channels with symbol synchronization errors,” IEEE Commun. Surveys Tuts., vol. 12, no. 1, pp. 87–96, First Quarter 2010. [13] J. A. Briffa, H. G. Schaathun, and S. Wesemeyer, “An improved decoding algorithm for the Davey-MacKay construction,” in Proc. IEEE Intern. Conf. on Commun., Cape Town, South Africa, May 23–27, 2010. [14] J. A. Briffa and H. G. Schaathun, “Improvement of the Davey-MacKay construction,” in Proc. IEEE Intern. Symp. on Inform. Theory and its Applications, Auckland, New Zealand, Dec. 7–10, 2008, pp. 235–238. [15] V. Buttigieg and J. A. Briffa, “Codebook and marker sequence design for synchronization-correcting codes,” in Proc. IEEE Intern. Symp. Inform. Theory, St. Petersburg, Russia, Jul. 31–Aug. 5, 2011. [16] J. A. Briffa, “A GPU implementation of a MAP decoder for synchronization error correcting codes,” IEEE Commun. Lett., vol. 17, no. 5, pp. 996–999, May 27th 2013. [17] L. R. Bahl and F. Jelinek, “Decoding for channels with insertions, deletions, and substitutions with applications to speech recognition,” IEEE Trans. Inf. Theory, vol. 21, no. 4, pp. 404–411, Jul. 4, 1975. [18] L. C. Perez, J. Seghers, and D. J. Costello, Jr., “A distance spectrum interpretation of turbo codes,” IEEE Trans. Inf. Theory, vol. 42, no. 6, pp. 1698–1709, Nov. 1996. [19] G. Ferrari and K. M. Chugg, “Linear programming-based optimization of the distance spectrum of linear block codes,” IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1794–1800, 2003. [20] M. C. Davey, “Error-correction using low-density parity-check codes,” Ph.D. dissertation, University of Cambridge, 1999. [21] D. J. C. MacKay, Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003.
7
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 1 A Dissipative Systems Theory for FDTD with Application to Stability Analysis and Subgridding arXiv:1606.08761v1 [cs.CE] 28 Jun 2016 Fadime Bekmambetova, Xinyue Zhang, and Piero Triverio, Senior Member, IEEE Abstract—This paper establishes a far-reaching connection between the Finite-Difference Time-Domain method (FDTD) and the theory of dissipative systems. The FDTD equations for a rectangular region are written as a dynamical system having the magnetic and electric fields on the boundary as inputs and outputs. Suitable expressions for the energy stored in the region and the energy absorbed from the boundaries are introduced, and used to show that the FDTD system is dissipative under a generalized Courant-Friedrichs-Lewy condition. Based on the concept of dissipation, a powerful theoretical framework to investigate the stability of FDTD methods is devised. The new method makes FDTD stability proofs simpler, more intuitive, and modular. Stability conditions can indeed be given on the individual components (e.g. boundary conditions, meshes, embedded models) instead of the whole coupled setup. As an example of application, we derive a new subgridding method with material traverse, arbitrary grid refinement, and guaranteed stability. The method is easy to implement and has a straightforward stability proof. Numerical results confirm its stability, low reflections, and ability to handle material traverse. Index Terms—finite-difference time-domain, stability, energy, dissipation, subgridding. I. I NTRODUCTION The Finite-Difference Time-Domain (FDTD) method is widely used to solve Maxwell’s equations numerically in microwave and antenna engineering, photonics and physics [1], [2]. FDTD is versatile, easy to implement, and has a low computational cost per time step. Through explicit update equations, FDTD recursively computes the electric and magnetic field in the region of interest without requiring the solution of linear systems. This update process is stable if time step ∆t satisfies the Courant-Friedrichs-Lewy (CFL) stability limit [2] 1 ∆t < q q , (1) 1 1 1 1 εµ ∆x2 + ∆y 2 + ∆z 2 where ∆x, ∆y, ∆z denote cell size, ε denotes permittivity and µ denotes permeability. While many breakthroughs have been achieved in FDTD since Yee’s original algorithm [3], the efficiency of FDTD for multiscale problems remains an open problem. The simultaneous presence of large and small geometrical features can dramatically reduce FDTD efficiency Manuscript received ...; revised ... This work was supported in part by the Natural Sciences and Engineering Research Council of Canada (Discovery grant program) and in part by the Canada Research Chairs program. F. Bekmambetova, X. Zhang and P. Triverio are with the Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, Toronto, M5S 3G4 Canada (email: [email protected], [email protected], [email protected]). because of two factors. First, the mesh has to be refined, at least locally, to properly resolve small features, which increases the number of unknowns and the cost per iteration. Second, because of (1), a mesh refinement imposes a smaller time step, which further increases computational cost. For example, a 3X refinement of the entire FDTD mesh increases computational cost by 81 times. These issues are unfortunate since multiscale problems abound in practice. Numerous solutions have been proposed to mitigate this issue, including sophisticated boundary conditions to mimic open spaces [2], local grid refinement [4], [5], [6] (commonly known as subgridding), thin wire models [1], lumped elements [7], [8], and hybridizations with model order reduction [9], [10], [11], finite elements [12], integral equations [13], ray tracing [14] and implicit schemes like ADI-FDTD [15], [16]. From a system theory viewpoint, many of these methods consist of the interconnection of subsystems, such as models, algorithms, boundary conditions. For example, in [13], an FDTD model, used to describe an inhomogeneous scatterer, is coupled to the time-domain method of moments, used to model a thin-wire antenna. In this way, one can leverage the respective strengths of different algorithms. However, while the stability properties of the individual algorithms may be well understood, ensuring the stability of their combination can be a formidable task. Ensuring stability is not trivial even in the relatively simple case of FDTD subgridding, where one just couples a coarse and a fine FDTD grid through an interpolation rule to relate fields at the grid transition. The lack of a systematic approach to ensure the stability of advanced FDTD methods is a major issue, that limits the development of new methods and their adoption by industry, where guaranteed stability is mandatory. This issue is the main motivation for this paper, that proposes a new theoretical framework to investigate and ensure the stability of both simple and advanced FDTD methods. Several techniques are available to analyze the stability of FDTD-like methods. Von Neumann analysis [1] is the simplest, but is only applicable to uniform meshes and homogeneous materials. The iteration method [2] checks if the eigenvalues of the matrix that relates the current and next field solution are all below one in magnitude. In the energy method [8] instead, one writes an expression for the total energy stored in the simulation domain, and then checks if the algorithm satisfies a discrete equivalent of the principle of energy conservation. Since energy conservation prevents an unphysical growth of the solution, this implies stability [17]. The iteration and energy methods are general, but they can lead to long derivations, since they require the analysis of the whole JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 West boundary North boundary (Nx + 1, Ny + 1) ∆x Ey |1, 3 2 Hz |1, 3 2 (1, 1) ∆y Hz | 3 , 3 East boundary coupled scheme, which may consist of many subsystems such as FDTD meshes, different boundary conditions, reduced order models, and so on. For example, in a subgridding scenario, one must derive the iteration matrix or energy function of the whole scheme, taking simultaneously into account coarse and fine meshes, interpolation rules and boundary conditions. This issue makes stability analysis quite involved. Moreover, it does not yield stability conditions on the individual subsystems. Consequently, if a subsystem is changed (for example, a different boundary condition is introduced), the iteration matrix or energy function of the whole problem must be derived again. In this paper, we propose a new stability framework for FDTD. The framework is based on the theory of dissipative systems [18], and generalizes the energy method. First, starting from FDTD update equations, we develop a self-contained mathematical model for a region with arbitrary permittivity, permeability and conductivity. The model is in the form of a discrete time dynamical system. The magnetic field tangential to the boundary is taken as input, while the electric field tangential to the boundary is taken as output. Through this form, we reveal that an FDTD model can be interpreted as a dynamical system which is dissipative when ∆t satisfies a generalized CFL condition. If this condition is not met, the system can generate energy on its own, leading to an unstable simulation. We thus establish a connection between FDTD and the elegant theory of dissipative systems, which is a novel result. We believe that this connection will greatly benefit the FDTD community, since the theory of dissipative systems has been extremely successful in control theory for ensuring the stability of interconnected systems. This key result sets the basis for a powerful FDTD stability theory, where each part of a given FDTD setup (standard meshes, boundary conditions, interpolation schemes, ...) is interpreted as a subsystem, and is required to be dissipative. Since the connection of dissipative systems is dissipative [18], [17], this will ensure the stability of the FDTD algorithm resulting from the connection of the subsystems. The proposed theory has numerous advantages. It simplifies stability proofs, since conditions can be imposed on each subsystem individually, rather than on the whole coupled algorithm. Stability proofs are thus made modular and “reusable”: once a given FDTD model (e.g., an advanced boundary condition) has been deemed to be dissipative, it can be combined to any other dissipative FDTD subsystem with guaranteed stability. The proposed approach also naturally provides the CFL stability limit of the resulting scheme, which will be the most restrictive CFL limit of the individual subsystems. Finally, the theory is intuitive, since it is based on the concept of energy, familiar to most scientists. The proposed theory is presented in 2D, for the sake of clarity. An extension to 3D is feasible and is currently under development. As an example of application, the proposed theory is used to derive the subgridding algorithm which is stable by construction, and has several desirable features. Material traverse is supported for both dielectrics and highly conductive materials, which is a limitation of other stable subgridding methods [19]. The proposed method has low reflections, and avoids non-rectangular cells [6], finite element concepts [20] and Withney forms [21], [22]. Corners are natively supported 2 y z x 2 2 Hz | 3 ,1 Ex | 3 ,1 2 2 South boundary Figure 1: Graphical representation of the 2D region considered in Sec. II. The hanging variables introduced on the four boundaries are denoted in green. without any special treatment [5] nor L-shaped cells [6]. Ultimately, the proposed algorithm just consists of a compact FDTD-like update equation for the edges between coarse and fine mesh, and is thus easy to implement. This update equation is provided explicitly for an arbitrary integer refinement ratio r, while several previous works [5], [6] provide the update weights only for specific refinements (typically r = 2 or 3), leaving the derivation of other cases to the Reader. The paper is organized as follows. In Sec. II, we cast the FDTD update equations for a rectangular region into the form of a dynamical system with suitable inputs and outputs. In Sec. III, we show that FDTD equations can be interpreted as a dissipative system, and propose the new stability theory. The theory is applied to derive a stable subgridding algorithm in Sec. IV, followed by numerical results in Sec. V. II. D ISCRETE T IME DYNAMICAL M ODEL FOR A 2D FDTD R EGION The goal of this section is to cast the FDTD equations for a 2D region into the form of a discrete time dynamical model. The model shall be self-contained, involving only field samples from the nodes belonging to the region. This goal will be achieved by introducing suitable magnetic field samples at the boundaries. We consider the 2D rectangular region shown in Fig. 1, operating in a TE mode with components Ex , Ey , and Hz . The region is discretized with a uniform rectangular grid with Nx × Ny cells, of width ∆x and height ∆y. In addition to the field samples used by standard FDTD, we also sample the H field on the four boundaries of the region. These additional samples will be referred to as hanging variables [22], and will allow us to: 1) develop a self-contained model for the region, which does not involve field samples beyond its boundaries; 2) derive an expression for the energy absorbed from each boundary; 3) connect the FDTD grid to other subsystems while maintaining stability. To keep the notation compact, we collect all Ex and Ey samples into column vectors Enx and Eny , of size NEx = Nx (Ny + 1) and NEy = (Nx + 1)Ny , respectively. The Hz JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 3 samples at the internal nodes are collected into column vector n+ 1 Hz 2 of size NHz = Nx Ny . The hanging variables on the South boundary of the region are collected into the Nx × 1 vector h iT n+ 1 n+ 1 n+ 1 (2) HS 2 = Hz |1+ 12,1 . . . Hz |N +2 1 ,1 . x 2 A. State Equation for Each Node The dynamical model for the region consists of an update equation for each E and H sample, excluding the hanging variables. Those variables will indeed be eliminated once the region is connected to the surrounding subsystems or to some boundary conditions. 1) Internal Hz Nodes: For these nodes, we use a standard FDTD update [2] µ µ n+ 1 n− 1 Hz |i+ 12,j+ 1 = ∆x∆y Hz |i+ 12,j+ 1 2 2 2 2 ∆t ∆t − ∆xEx |ni+ 1 ,j + ∆xEx |ni+ 1 ,j+1 2 2 2 (3) 2 for i = 1, . . . , Nx and j = 1, . . . , Ny . In (3), µ denotes n+ 1 the average permittivity on the edge where Hz |i+ 12,j+ 1 is 2 2 sampled. Subscripts are omitted from µ in order to simplify the notation. Equations (3) can be written in matrix form as Dµ n+ 12 Dµ n− 12 Hz = DA Hz + Gy Dlx Enx − Gx Dly Eny , ∆t ∆t (4) where DA is a diagonal matrix containing the area of the primary cells, Dµ is a diagonal matrix containing the average permittivity on each edge of the secondary grid. Diagonal matrices DA Dly = ∆yINEy (5) contain the length of the x- and y-directed edges of the primary grid, respectively. With Im , we denote the m × m identity matrix. Matrix Gx is the discrete derivative operator along x, which can be written as Gx = INy ⊗ WNx , (6) where ⊗ is the Kronecker’s product [23] and WNx is the Nx × (Nx + 1) matrix [24]   −1 +1   −1 +1   Wn =  (7) . .. ..   . . −1 +1 Similarly, Gy = WNy ⊗ INx . 2 2 2 for i = 1, . . . , Nx and j = 2, . . . , Ny . In (9), εx and σx denote, respectively, the average permittivity and average conductivity on the corresponding edge. While the common factor ∆x could be eliminated from (9), it is kept as it will be useful later. For the Ex nodes on the South boundary, the standard FDTD update equation involves a Hz sample outside the region. In order to avoid this, we apply the finite difference approximation to the half step of the  secondary grid between nodes i + 12 , 1 + 12 and i + 12 , 1 , making use of the hanging variables. In this way, we obtain an update equation that involves only field samples from the considered region σx  ∆y  εx + Ex |n+1 = ∆x i+ 21 ,1 2 ∆t 2  σx  ∆y εx − Ex |ni+ 1 ,1 ∆x 2 2 ∆t 2 n+ 12 n+ 1 + ∆xHz |i+ 1 ,1+ 1 − ∆xHz |i+ 12,1 , (10) 2 + ∆yEy |ni,j+ 1 − ∆yEy |ni+1,j+ 1 Dlx = ∆xINEx 2 2 Similarly, the hanging variables on the North, East and West n+ 1 n+ 1 n+ 1 sides are cast into column vectors HN 2 , HE 2 and HW 2 , respectively. ∆x∆y 2) Ex Nodes: For the Ex nodes that fall strictly inside the region, we use a standard FDTD update [2] ε ε σx  σx  x x ∆x∆y Ex |n+1 = ∆x∆y Ex |ni+ 1 ,j + − 1 i+ 2 ,j 2 ∆t 2 ∆t 2 n+ 21 n+ 21 + ∆xHz |i+ 1 ,j+ 1 − ∆xHz |i+ 1 ,j− 1 (9) (8) 2 2 for i = 1, . . . , Nx . In (10), εx and σx denote the material  properties of the half cell between nodes i + 12 , 1 + 12 and i + 12 , 1 . The update equation for the Ex nodes on the North boundary is obtained similarly, and reads ∆y  εx σx  ∆x = + Ex |n+1 i+ 21 ,Ny +1 2 ∆t 2   ∆y εx σx ∆x − Ex |ni+ 1 ,Ny +1 2 2 ∆t 2 n+ 21 n+ 1 + ∆xHz |i+ 1 ,N +1 − ∆xHz |i+ 12,N + 1 , (11) 2 y 2 y 2 for i = 1, . . . , Nx . Relations (9), (10) and (11) can be compactly written as   D εx Dσx Dlx Dly0 + En+1 = x ∆t 2   Dσx Dεx n+ 1 − Enx − Dlx GTy Hz 2 Dlx Dly0 ∆t 2 " 1# 2   Hn+ S + Dlx BS Dlx BN , (12) n+ 1 HN 2 where • Dl0 is an NEx × NEx diagonal matrix containing the y length of the y-directed edges of the secondary grid, including the half-edges of length ∆y/2 that intersect the North and South boundaries; • Dεx and Dσx are diagonal matrices storing the permittivity and conductivity on each x-directed primary edge, respectively; • BS has all entries set to zero, except for a −1 at the intersection of each row associated with a South boundary edge and the column of the corresponding n+ 1 hanging variable in HS 2 ; JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 4 BN is defined similarly to BS , but has a +1 on each entry associated with an edge of the North boundary. 3) Ey Nodes: The update equations for the Ey nodes are derived with a similar procedure. A standard FDTD update equation is written for the Ey nodes that fall strictly inside the region. For the Ey nodes on the West and East boundaries, instead, finite differences are applied on a half grid step, similarly to (10) and (11). This process leads to   Dσy D εy + En+1 = Dly Dlx0 y ∆t 2   Dσy D εy n+ 1 Dly Dlx0 − Eny + Dly GTx Hz 2 ∆t 2 # " n+ 21   HW , (13) + Dly BW Dly BE n+ 1 HE 2 • where • Dl0 is an NEy × NEy diagonal matrix containing the x length of the x-directed edges of the secondary grid, including the half-edges of length ∆x/2 that intersect the East and West boundaries; • Dεy and Dσy are diagonal permittivity and conductivity matrices associated with the y-directed edges of the primary grid, respectively; • BW has all entries set to zero, except for a +1 at the intersection of each row associated with a West boundary edge and the column of the corresponding n+ 1 hanging variable in HW 2 ; • BE is analogous to BW , but has a −1 on each entry associated with an East boundary edge. B. Descriptor System Formulation The update equations derived in the previous sections form a complete dynamical model for the rectangular region (R + F)xn+1 y n = 1 (R − F)xn + Bun+ 2 , T n = L x . (14a) equation (14b) extracts these values from the state vector xn . The coefficients matrices in (14a) and (14b) read   Dεx 1 T Dlx Dly0 ∆t 0 2 Dlx Gy   Dε R= 0 Dly Dlx0 ∆ty − 12 Dly GTx  , (17) D 1 − 12 Gx Dly DA ∆tµ 2 Gy Dlx   D 1 T Dlx Dly0 2σx 0 D G l y x 2   Dσ F= 0 Dly Dlx0 2 y − 21 Dly GTx  , (18) 1 − 12 Gy Dlx 0 2 Gx Dly   Dlx BS Dlx BN 0 0 0 Dly BW Dly BE  , B= 0 (19) 0 0 0 0   −BS BN 0 0 0 BW −BE  . L= 0 (20) 0 0 0 0 Equations (14a)-(14b) define an FDTD-like model for a 2D lossy, source-free region, with possibly non-uniform permittivity and permeability. From a control perspective, this model is a discrete time descriptor system [25], also known as generalized state-space. From an electrical standpoint, the model is an impedance-type description of the region, because it gives the electric field tangential to the boundary in terms of the tangential magnetic field. In [24], a special case of the proposed representation was derived for a lossy region enclosed by PEC boundaries. The proposed developments generalize [24] in two directions: 1) the assumption of a PEC termination is removed. Suitable input-output variables are introduced in such a way that model (14a)-(14b) can be connected to other subsystems, such as different FDTD grids, boundary conditions, or reduced models; 2) the proposed formulation will allow us to prove, in the next section, that FDTD equations can be interpreted as a dissipative dynamical system. (14b) III. FDTD AS A D ISSIPATIVE D ISCRETE T IME S YSTEM The first equation (14a) is formed by update equations (4), (12) and (13), and updates the state vector  n  Ex n xn =  Ey  , (15) n− 12 Hz which consists of all electric and magnetic field samples in the 1 region, excluding hanging variables. The input vector un+ 2 n and output vector y are given by  n+ 1   n H 2 ES  Sn+ 21  n     1 H E N  yn =  nN  . un+ 2 =  (16) 1  n+ 2  EW  HW  n EE n+ 1 HE 2 The input vector contains all hanging variables, i.e. all magnetic field samples on the region boundaries. The output vector is made by the E samples at the same nodes, which are collected into vectors EnS , EnN , EnW and EnE . Output In this section, we define suitable expressions for the energy stored in the 2D region and the energy absorbed from its four boundaries. These expressions are then used to derive the conditions under which system (14a)-(14b) is dissipative. A. Dissipation Inequality A discrete time system like (14a)-(14b) is dissipative when it satisfies the following condition [26]. Definition 1. Dynamic system (14a)-(14b) is said to be 1 dissipative with supply rate s(yn , un+ 2 ) if there exists a n nonnegative function E(x ) with E(0) = 0, called storage function, such that 1 E(xn+1 ) − E(xn ) ≤ s(yn , un+ 2 ) n+ 12 for all u (21) and all n. The storage function E(xn ) can be interpreted as the energy stored in the system at time n, while the supply rate JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 5 1 s(yn , un+ 2 ) is the energy absorbed by the system from its boundaries between time n and n+1. Clearly, only dissipative systems can satisfy the dissipation inequality (21). Indeed, their stored energy can increase between time n and n + 1 by at most the energy absorbed from the outside world. If this limit is violated, the system is considered active, since it can generate energy on its own. For most practical systems, inequality (21) is satisfied strictly because of the presence of losses. B. Storage Function and Supply Rate For system (14a)-(14b), we choose as candidate storage function ∆t n T (x ) Rxn , (22) E(xn ) = 2 and as supply rate n+ 12 n s(y , u yn + yn+1 ) = ∆t 2 T 1 LT Bun+ 2 . Substituting (27) into (23), we obtain (EnS + En+1 )T n+ 12 S HS 2 n+1 T n n T (E + EN ) (E + En+1 n+ 1 n+ 1 W ) +∆t∆x N HN 2 +∆t∆y W HW 2 2 2 T (EnE + En+1 n+ 1 E ) HE 2 , (28) − ∆t∆y 2 and see that the supply rate is the sum of the energy absorbed by the region from each boundary between time n and n + 1. Signs in (28) are consistent with the direction of the Poynting vector on each boundary. 1 s(yn , un+ 2 ) = −∆t∆x C. Dissipativity Conditions Using the proposed storage function (22) and supply rate (23), we can derive simple dissipativity conditions on the coefficients matrices R, F, B and L in (14a)-(14b). Theorem 1. If (23) R = RT > 0 , (29a) Before showing that these functions satisfy (21), we investigate their physical meaning. Substituting (17) into (22), we get F + FT ≥ 0 , (29b) B = LLT B , (29c) 1 n T (E ) Dlx Dly0 Dεx Enx 2 x T 1 Eny Dly Dlx0 Dεy Eny + 2   ∆t Dµ n− 21 n n Hz + Gy Dlx Ex − Gx Dly Ey + DA . (24) 2 ∆t E(xn ) = Since the term between square brackets is the right hand side of (4), we can reduce (24) to 1 T E(x ) = (Enx ) Dlx Dly0 Dεx Enx 2 T 1 Eny Dly Dlx0 Dεy Eny + 2 1  n− 12 T n+ 1 Hz DA Dµ Hz 2 . (25) + 2 n Z  A  1 2 1 1 2 2 εE (t) + εEy (t) + µHz (t) dA , 2 x 2 2 (26) the continuous expression for the electromagnetic energy per unit height of a 2D TE mode in a region of area A. The first term of (25) is the energy stored in the x component of the electric field in the region. Indeed, the diagonal matrix Dlx Dly0 is the area of the half cells around the Ex edges. Similarly, the second and third term in (25) represent the energy stored in the Ey and Hz components, respectively. We now discuss the physical meaning of supply rate (23). Direct inspection reveals that   −∆xINx 0 0 0   0 +∆xINx 0 0 . LT B =    0 0 +∆yINy 0 0 0 0 −∆yINy (27) then system (14a)-(14b) is dissipative according to Definition 1, with (22) as storage function and (23) as supply rate. Proof. Condition (29a) makes storage function (22) nonnegative for all xn , as required by Definition 1. Next, we show that if (29b) and (29c) hold, the dissipation inequality (21) will hold as well. Substituting (22) and (23) into (21), we obtain T T 1 T xn+1 Rxn+1 −(xn ) Rxn − yn + yn+1 LT Bun+ 2 ≤ 0 . This inequality can be rewritten as T  T xn+1 R xn+1 − xn + xn+1 − xn Rxn T 1 − yn + yn+1 LT Bun+ 2 ≤ 0 (30) From (14a), we have that   1 R xn+1 − xn = −F xn+1 + xn − Bun+ 2 (31)   T Using (31), the terms R xn+1 − xn and xn+1 − xn R in (30) can be expressed in terms of F T  T − xn+1 F xn+1 + xn − xn+1 + xn FT xn  T T 1 1 + xn+1 Bun+ 2 + un+ 2 BT xn T 1 1 T − (xn ) LLT Bun+ 2 − xn+1 LLT Bun+ 2 ≤ 0 (32) Under (29c), we can finally rewrite (32) as T   xn+1 + xn F + FT xn+1 + xn ≥ 0 (33) which is clearly satisfied if (29b) holds. We now investigate the physical meaning of the three dissipativity conditions, starting from (29c), which can be directly verified by combining (27) and (20). This condition holds because the region inputs and outputs in (16) are sampled at the same nodes, and is reminiscent of a similar JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 6 relation which holds for linear circuits under the impedance representation [27]. Condition (29b) is related to losses, and reads   Dlx Dly0 Dσx 0 0 F + FT =  0 Dly Dlx0 Dσy 0 ≥ 0 . (34) 0 0 0 Since Dlx , Dly , Dlx0 and Dly0 are diagonal with positive elements only, (34) boils down to D σx ≥ 0, (35) Dσy ≥ 0. (36) As one may expect, the average conductivity on each primary edge must be non-negative in a dissipative system. Condition (29a) is the most interesting, and is a generalized CFL criterion. From (17), we see that R = RT by construction. With the Schur’s complement [28], we can transform (29a) into Dlx Dly0 Dεx > 0 , (37) Dly Dlx0 Dεy > 0 , 4 IN , SST < ∆t2 Hz (38) (39) where h 1 −1 −1 −1 −1 S = DA 2 Dµ 2 Gy Dl2x Dl0 2 Dεx2 i 1 −1 −1 −Gx Dl2y Dl0 2 Dεy2 . y x (40) Inequalities (37) and (38) are clearly satisfied by construction. If we denote with sk the singular values of (40), inequality (39) will hold if 2 ∆t < ∀k . (41) sk This condition sets an upper bound on the FDTD time step, and is analogous to the generalized CFL constraint derived in [24] for an FDTD grid terminated on PEC boundaries. From (40), we indeed see that the time step upper limit depends on grid size, permittivity and permeability. Using a time step which violates (41) has two consequences. First, the discretization of Maxwell’s equations leads to an active discrete time model, even if the real physical system has positive losses everywhere, and should therefore be dissipative. The numerical model is thus inconsistent with the actual physics. Second, being able to generate energy on its own, model (14a)(14b) can lead to divergent transient simulations. Even when such model is connected to other dissipative subsystems, its ability to generate energy on its own can destabilize the whole simulation. The proposed theory provides a new, deeper understanding on the root causes of FDTD instability, and is able to pinpoint which part of an FDTD setup is responsible for it. It is hoped that this new explanation will facilitate the development of powerful FDTD schemes with guaranteed stability. D. Relation to CFL Stability Limit The relation between (41) and the CFL limit can be further understood if we apply (41) to a single cell. The purpose of (41) is to make storage function (22) non-negative. A sufficient condition for this is to require the energy stored in each primary cell to be positive. This condition can be derived by applying (39) to a single primary cell. We consider the primary cell extending from node (i, j) to node (i + 1, j + 1). The coefficient matrices for this special case can be obtained from the formulas in Sec. II by setting Nx = Ny = 1 Dlx = ∆xI2 ∆x I2 Dlx0 = 2  Gx = Gy = −1 1 Dly = ∆yI2 ∆y Dly0 = I2 2 DA = ∆x∆y  (42) (43) (44) The permeability matrix Dµ = µ|i+ 12 ,j+ 12 is the average permeability on the secondary edge, while the permittivity matrices     0 0 εx |i+ 12 ,j εy |i,j+ 12 Dεx = Dεy = 0 εx |i+ 21 ,j+1 0 εy |i+1,j+ 21 (45) contain the average permittivity on the four primary edges. Substituting (42)-(45) into (39), we obtain " ! 1 1 1 ∆t < + 2∆x2 µ|i+ 12 ,j+ 12 εy |i,j+ 12 εy |i+1,j+ 12 ! #− 21 1 1 1 , (46) + + 2∆y 2 µ|i+ 21 ,j+ 12 εx |i+ 12 ,j εx |i+ 21 ,j+1 which is a generalized CFL condition. For a uniform medium with permittivity ε and permeability µ, (46) reduces to ∆t < q 1 1 εµ q 1 ∆x2 + 1 ∆y 2 , (47) the CFL limit of 2D FDTD. This derivation confirms that (29a) is a generalized CFL condition, here reinterpreted in the context of dissipation. E. Application to Stability Analysis The proposed dissipation theory can be effectively used to investigate and enforce the stability of FDTD algorithms. Most FDTD setups consist of an interconnection of FDTD subsystems. In the simplest scenario, a uniform FDTD grid is connected to some boundary conditions. In most advanced scenarios, one may want to couple a main FDTD grid to refined grids, reduced models, lumped elements, or models from other numerical techniques, such as finite elements, integral equations or ray tracing. Ensuring stability of these hybrid schemes can be very challenging, since stability is a property of the overall scheme, rather than of its individual subsystems. By invoking the concept of dissipation, we can instead achieve stability in an easy and modular way. Each part is seen as an FDTD subsystem and required to satisfy dissipativity conditions (29a)-(29c). Since the connection of dissipative systems is dissipative by construction [17], the overall method will be guaranteed to be stable. The proposed theoretical framework generalizes the socalled energy method [8], and has numerous advantages over the state of the art: JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 1) non-uniform problems can be handled, unlike in the von Neumann analysis [1]; 2) stability conditions can be given on each subsystem separately, unlike in the iteration method [2], which requires the analysis of the iteration matrix of the whole scheme. This makes stability analysis modular and thus simpler; 3) once some given FDTD models have been proven dissipative, they can be arbitrarily interconnected without having to carry out further stability proofs. With the iteration method, when a single part of a coupled scheme changes, the whole proof must be revised; 4) the CFL limit of the resulting scheme can be easily determined by applying (37), (38) or (39) to each subsystem and taking the most restrictive CFL limit; 5) the stability framework is intuitive, since it is based on the fundamental physical concept of energy dissipation. 7 ∆x r Ĥz |ı̂+ 12 ,̂+ 12 Ĥz |ı̂+ 32 ,̂+ 12 ∆y r (ı̂, ̂) Ĥz |ı̂+ 21 ,̂ Êx |ı̂+ 12 ,̂ Ĥz |ı̂+ 32 ,̂ Êx |ı̂+ 32 ,̂ Hz |i+ 1 ,j (i, j) Ex |i+ 1 ,j 2 y 2 z Hz |i+ 1 ,j− 1 2 x 2 Figure 2: Subgridding scenario considered in Sec. IV for the case of r = 2. For clarity, a virtual gap has been inserted between the two grids. This virtual gap is closed when the two grids are connected. Fine mesh Ĥz |ı̂+ 1 ,̂ 2 Êx |ı̂+ 3 ,̂ Ĥz |ı̂+ 3 ,̂ 2 2 Êx |ı̂+ 1 ,̂ 2 IV. A PPLICATION : S TABLE FDTD S UBGRIDDING We demonstrate the proposed theory by deriving a subgridding algorithm which is stable by construction, easy to implement and supports an arbitrary grid refinement ratio. The goal is to derive stable update equations for a setup where one or more fine grids are embedded in a main coarse grid. Without loss of generality, we consider the case where a coarse grid with cell size ∆x × ∆y hosts a single fine grid with cell size ∆x/r × ∆y/r, where r is an arbitrary integer. The algorithm will ultimately consist of conventional FDTD equations to update the fields that fall strictly inside the two grids, and a special update equation to update the fields on the edges at the grid transition. To derive the method, it is sufficient to consider the interface between a single coarse cell and the corresponding fine cells, as shown in Fig. 2. In the figure a virtual gap has been opened between the two grids for clarity. Without loss of generality, we consider a refinement in the positive x direction. The other three cases can be derived in the same way. The coarse cell under consideration is centered at node (i+ 12 , j − 12 ) and the corresponding fine cells at nodes (ı̂ + 12 , ̂ + 21 ), ... , (ı̂ + r − 12 , ̂ + 21 ), where coordinates (ı̂, ̂) correspond to the same physical location as (i, j) in the coarse grid. Superscript “ˆ” denotes variables related to the fine grid. A subgridding algorithm can be interpreted as a the result of the connection of the three subsystems, as shown in Fig. 3. Two of those subsystems correspond to the coarse and fine grids to be coupled. The third subsystem represents the interpolation rule which is used to relate the fields on the boundaries of the two grids, that are sampled with different resolution. A. State Equations for the Coarse and Fine Cells on the Boundary For the coarse and fine grids, we adopt the formulation of Sec. II, introducing hanging variables on the two boundaries to be connected. The purpose of the hanging variables is to facilitate the coupling of the two meshes and the proof of stability. These extra variables will be eliminated when deriving the update equation for the fields at the interface. Interpolation rule Hz |i+ 1 ,j 2 Ex |i+ 1 ,j 2 Coarse mesh Figure 3: Interpretation of the subgridding method as the connection of three dynamical systems, representing the coarse grid, the fine grid, and the interpolation rule. On the North boundary of the coarse cell, we introduce the hanging variable n+ 12 HN n+ 1 = Hz |i+ 12,j . (48) 2 Similarly, on the South fine cell boundaries we introduce the hanging variables h iT n+ 1 n+ 1 n+ 12 ĤS 2 = Ĥz |ı̂+ 12,̂ . . . Ĥz |ı̂+r− , (49) 1 ,̂ 2 2 as shown in Fig. 2. From (11), we obtain the following state equation for the coarse E-field sample at the interface and the coarse hanging variable σx  n+1 ∆y  εx + EN = 2 ∆t 2  ∆y εx σx  n n+ 1 n+ 1 − EN + HN 2 − Hj− 12 , (50) 2 2 ∆t 2 where n+ 1 n+ 1 Hj− 12 = Hz |i+ 12,j− 1 , 2 2 2 n EN = Ex |ni+ 1 ,j , (51) 2 and εx and σx are the permittivity and conductivity on the primary edge of the coarse cell below the interface. Similarly, the state equation for the r fine cells can be written as ! ∆y D̂εx D̂σx + Ên+1 = S 2r ∆t 2 ! ∆y D̂εx D̂σx n+ 1 n+ 1 − ÊnS + Ĥ̂+ 12 − ĤS 2 , (52) 2 2r ∆t 2 JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 8 where n+ 1 Ĥ̂+ 12 2 h iT n+ 1 n+ 21 = Ĥz |ı̂+ 12,̂+ 1 . . . Ĥz |ı̂+r− , 1 1 2 2 2 ,̂+ 2 iT h ÊnS = Êx |nı̂+ 1 ,̂ . . . Êx |nı̂+r− 1 ,̂ , 2 2 (53) (54) and D̂εx and D̂σx are r × r diagonal matrices containing the values of permittivity and conductivity above the interface for the South edges where the fine Êx fields are sampled. B. Interpolation Rule The interpolation rule [29] relates the field sampled on the coarse and fine grids. From the boundary condition for tangential electric fields, we have that n ÊnS = EN T ∀n , (55) where T is an r × 1 matrix of ones. Condition (55) forces the coarsely- and finely-sampled E fields to be equal at all times. On the magnetic fields at the boundary, we impose a constraint reciprocal to (55) n+ 12 n+ 1 TT ĤS 2 ∀n . (56) r We will see in Sec. IV-D that the reciprocity between the E and H interpolation rules is required to ensure stability. HN = C. Explicit Update Equation for the Interface Interpolation conditions (55) and (56) can now be used to combine (50) and (52) in order to derive an explicit update equation for the fields at the coarse-fine interface, and eliminate hanging variables. Substituting (55) into (52), and multiplying the obtained equation by TT /r on the left yields ! ∆y TT D̂εx T TT D̂σx T n+1 + EN = 2r r∆t 2r ! ∆y TT D̂εx T TT D̂σx T n − EN 2r r∆t 2r n+ 1 TT Ĥ̂+ 12 n+ 1 TT ĤS 2 + − . (57) r r For the simplicity of notation we define symbols for the average permittivity and conductivity of the r South boundary fine cells 2 TT D̂σx T TT D̂εx T , σ̂x = . r r Equation (57) can now be added to (50), yielding ! σx + σ̂rx ∆y εx + ε̂rx n+1 + EN = 2 ∆t 2 ! σx + σ̂rx ∆y εx + ε̂rx n − EN 2 ∆t 2 ε̂x = n+ 12 + HN n+ 1 − Hj− 12 + 2 n+ 1 TT Ĥ̂+ 12 2 r (58) TT ĤS r Rearranging (60), we get the following explicit update equation for EN in terms of the neighboring magnetic fields !−1 ! σ̂x ε̂x σ̂x ε̂x σ + ε + σ + ε + x x x x n+1 n r r r r EN + − EN = ∆t 2 ∆t 2  !−1  T n+ 21 T Ĥ̂+ 1 1 εx + ε̂rx σx + σ̂rx 2 n+ 2  + + − Hj− 12  . 2 ∆y ∆t 2 r (61) The fine interface electric fields are then updated using (55). It should be noted that, when r = 1, equation (61) reduces to the standard FDTD update equation. The overall subgridding algorithm can be summarized as follows: 1) Calculate the magnetic field samples everywhere at time n + 12 using conventional FDTD update equations. 2) Use standard FDTD update equations to compute the E fields at time n + 1 on the edges that are strictly inside the coarse and fine grids. n+1 3) Compute EN , the coarsely-sampled electric field at the interface, using (61). 4) Update the finely-sampled Êx fields at the interface using (55). The computational overhead of this scheme is minimal, since the coefficients in (61) can be pre-computed before the update iterations. The proposed method is thus simple to implement, since it consists of conventional FDTD update equations inside the two meshes and a modified update equation for the edges at the interface. In comparison to previous subgridding methods, we avoid non-rectangular cells [6], finite element concepts [20] and Withney forms [21], [22]. The proposed update equation can be also used at corners with no modifications, unlike in previous works that require special treatment [5] or L-shaped cells [6]. Finally, we remark that in Sec. II, the FDTD update equations have been given in matrix form in order to reveal the dissipative nature of FDTD systems. This form, however, does not have to be used in the practical implementation, which can use conventional for loops or, in languages like MATLAB, vectorized operations. D. Proof of Stability n+ 21 − With the interpolation rule (56), we cancel the hanging variables to obtain ! σx + σ̂rx ∆y εx + ε̂rx n+1 + EN = 2 ∆t 2 ! n+ 12 T T Ĥ 1 σx + σ̂rx ∆y εx + ε̂rx ̂+ 12 n+ n EN − Hj− 12 + − . 2 2 ∆t 2 r (60) . (59) The proposed dissipation theory makes it straightforward to prove that the subgridding algorithm is stable under the CFL limit of the fine grid. For stability, all three subsystems in Fig. 3 need to be dissipative, which requires one to use the JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 9 more restrictive fine grid time step. With the time step chosen correctly, in order to guarantee the overall stability we need to only ensure dissipativity of the interpolation rule. Analogously to (23) the supply rate for the interpolation subsystem is defined as n+1 EN + n+ 1 ) = −∆t∆x HN 2 s(yn , u 2 )T n+ 21 ∆x (ÊnS + Ên+1 S + ∆t ĤS . (62) r 2 Substituting (55) and (56) into (62), we have n+ 12 20 mm ∆x = 1 mm ∆y = 2 mm 40 mm n EN PEC Probe y ∆x̂ = ∆x/4 ∆ŷ = ∆y/4 z x 40 mm Source 60 mm Figure 4: Layout of the PEC cavity considered in Sec. V-A. 1 s(yn , un+ 2 ) = n+ 12 TT ĤS r − n+ 1 HN 2 ! = 0 . (63) Therefore, the proposed interpolation rule is a lossless system that does not dissipate nor absorb any energy. Physically, this result makes sense, since the connection system corresponds to an infinitely thin region where no energy dissipation can take place. In conclusion, since the proposed subgridding method can be seen as the connection of three dissipative systems, it is overall dissipative, and thus stable. 0.5 Hz (A/m) n+1 T (E n + EN ) ∆t∆x N 2 0 −0.5 0 2 4 6 Timestep 8 10 5 x 10 Figure 5: Magnetic field at the probe for the the empty cavity with subgridding of Sec. V-A, computed for 106 time steps. V. N UMERICAL E XAMPLES The following sections provide the results of FDTD simulations that were done to verify the proposed theory. The subgridding algorithm was implemented in Matlab and tests were performed in order to check its stability, ability to handle material traverse, its accuracy and speedup capability. A. Stability Verification Stability was verified by simulating an empty cavity with perfect electric conductor (PEC) walls with a centrally placed subgridding region for 106 time steps. The layout of the simulation is shown in Fig. 4. The cavity was excited using a modulated Gaussian magnetic current source with central frequency of 3.75 GHz and half-width at half-maximum of 0.74 GHz. Magnetic field was recorded at a probe placed inside the cavity. The time step was set 1% below the CFL limit of the fine grid. The resulting waveform in Fig. 5 shows that no instability occurred after 106 time steps. Stable behavior after such a large number of time steps verifies the correctness of the proposed stability enforcement technique, especially since no lossy materials were present to dissipate any spurious energy artificially created by the algorithm. B. Material Traverse The ability of the proposed method to produce meaningful results when objects traverse the subgridding interface was tested using the setup in Fig. 6. A 16 × 16 mm slab of material was simulated for three different placements of the subgridding region: enclosing, traversing and away from the slab. The test was done for copper and a lossy dielectric with conductivity of 5 S/m and relative permittivity of 2. As a reference, uniformly discretized all-coarse and all-fine simulations were performed at the fine time step, in addition to the subgridding simulations. Coarse and fine meshes in uniformly discretized and subgridding runs were chosen as 1 mm and 0.2 mm respectively. 15 mm-thick perfectly matched layer (PML) terminated the simulation region. Modulated Gaussian magnetic current excitation was used at 15.0 GHz central frequency with 8.82 GHz half-width at half-maximum bandwidth. The time step was chosen as 0.467 ps in all test cases. The magnetic field waveforms at the probe recorded in the different subgridding scenarios are shown in Fig. 7, and are in excellent agreement among each other. This result confirms that the proposed subgridding method can properly handle material traverse, for both very good conductors and for lossy dielectrics. C. Application to Simulating Scatterer Reflections In order to investigate the accuracy of the proposed scheme, we looked at waveguide reflections from the scatterer shown in Fig. 8, which consisted of four copper rods with 1 mm radius. We have also investigated the reflections from the subgridding interface, in order to assess the quality of the subgridding scheme. The coarse cell was chosen to be 1 mm, which was 1 10 of the minimum wavelength of interest that corresponded to 30.0 GHz. The fields of the incident wave were computed by running a reference simulation without the scatterer and without subgridding. Reflected wave fields were found by subtracting the incident wave fields from the total fields in simulations with the scatterer. 15 mm-thick PML boundary was chosen to terminate the two sides of the waveguide. The JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 10 PEC 40 mm x z Source subgrids y Jy current Probes 8×8 mm y Probe PML PML x z PML 20 mm 2 mm ∆x = 1 mm ∆y = 1 mm Figure 6: Layout used for the material traverse test of Sec. V-B, and the three different placements of the subgridding region. 2 mm Scatterer 66 mm Figure 8: Layout of the four-rod reflection simulation discussed in Sec. V-C. The dashed line shows the location of the subgrid in the subgridding run. Lossy dielectric −5 With scatterer −10 0 11 |S | (dB) Hz (A/m) 0.02 −0.02 −15 −20 −25 −30 −35 Copper Sub−grid interface only −40 0 |S | (dB) Hz (A/m) 0.02 11 −0.02 0.2 0.25 Time (ns) 0.3 0.35 Figure 7: Time-domain magnetic field at the probe recorded for the three locations of the subgrid in Sec. V-B: enclosed ( ), outside ( ) and traversing the object ( ). Waveforms from the uniformly discretized all-coarse (  ) and allfine ( ) simulations are also shown. time steps in the subgridding runs were set 1% below the CFL limit of the refined region. Uniformly discretized simulations were run 1% below the CFL limits of the respective grids. The resulting reflections are shown in Fig. 9 for the subgridding case with different refinement ratios, as well as the reference run with full refinement by a factor of 6. The simulation times are shown in Table I. It can be seen that the local refinement of the grid around the scatterer with the proposed subgridding method can improve the accuracy substantially compared to the coarse grid run. The larger choice of refinement ratio makes the solution very close to the reference all-fine solution. Moreover, very good speedup - almost by a factor of 11 - is achieved even for the grid refinement of 6 when the redundant high resolution of the grid in air is eliminated. The reflections from subgridding interface were significantly lower than those from the scatterer, further demonstrating the accuracy of the proposed method. −60 −80 −100 0 5 10 15 20 Frequency (GHz) 25 Figure 9: Reflected power with respect to the incident for the example of Sec. V-C. Top panel: reflections from the four-rod scatterer for different global discretization: all-coarse (  ) and all-fine with r = 6 ( ); and for the subgridding runs: r=2( ), r = 4 ( ) and r = 6 ( ). Bottom panel: reflections from the subgrid interface only. D. Application to Exposure Studies We show the possibility of applying the method for multiscale human exposure simulations. The chosen setup is shown in Fig. 10. A transverse cross-section of the head of the model of Ella from IT’IS Virtual Population V1.x [30] was used to assign the material properties [31] to the FDTD cells. A 900 MHz source was placed approximately 3 meters away from the human head. The simulation region was terminated with 20 cm PML. The reference (fine) resolution in the tissues was set to 2 mm, based on the mesh size chosen by [32] in a radiation exposure study at that frequency. Specific absorption rate, or SAR, was evaluated according to the formula in [33], which was used as follows for sinusoidal excitation SAR = σ(Ex2p + Ey2p ) 2ρ , (64) JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 Table I: Simulation times for different meshes in four-rod scatterer simulations in Sec. V-C. Simulation times were recorded for the total field run only - not for the reference run. Method All-fine (r = 6) All-coarse Subgridding (r = 2) Subgridding (r = 4) Subgridding (r = 6) Simulation time (s) 427.4 3.2 10.7 23.3 39.5 3.05m Head slice Method All-fine All-coarse Subgridding All-fine z Error in SAR integral Not applicable 59.5% -3.1% Subgridding Simulation time (s) 1596.4 6.9 34.5 All-coarse x PML 4.01m Figure 10: Layout of the simulation in Sec. V-D with human head cross-section placed approximately 3 meters away from a point source. where subscript “p” denotes the peak absolute value of a field component and ρ corresponds to tissue density. SAR was calculated for each of the primary cells. The values of the electric field components at the primary cell centers were found by averaging the nearest known samples at the cell edges. The peak values of the fields were found for the time interval from 25.6 ns to 26.8 ns, which gave the wave sufficient time to reach the head and penetrate inside it. In the subgridding run, the empty space was coarsened to 1 1 cm, which corresponded to 33.3 of the wavelength. The reference all-fine run was performed at 2 mm resolution, along with the all-coarse run where the entire simulation region was discretized at 1 cm. The volumetric integral of SAR over the tissues was used as an accuracy metric XX SAR|i+ 12 ,j+ 12 ∆x∆y , (65) i Table II: Error in the integral of SAR and simulation times in the simulations discussed in Sec. V-D. y subgrid Source 11 j where ∆x and ∆y are FDTD cell dimensions in the tissues. Time step of 4.67 ps was chosen for the all-fine simulation and for the subgridding simulation. The coarse grid case was run at 23.11 ps. The resulting SAR maps are shown in Fig. 11. Table II shows simulation times and percent error in the total SAR with respect to the all-fine simulation. The results show that with subgridding a speedup of 46X can be obtained with only 3.1% loss in accuracy. No noticeable difference can be seen on the SAR maps in Fig. 11 between the subgridding and all-fine simulations. When, instead, the coarse resolution was chosen for the entire grid, the head tissues were not sufficiently resolved and the integral SAR differed from the reference by 59.5%, showing the necessity of local grid refinement. VI. C ONCLUSION This paper proposed a dissipative systems theory for FDTD, recognizing that FDTD equations can be seen as a dynamical Figure 11: SAR maps obtained in Sec. V-D with all-fine (2 mm), all-coarse (1 cm) discretization and with subgridding (2 mm in the tissues and 1 cm in the air). system which is dissipative under a generalized CourantFriedrichs-Lewy condition. The theory provides a new, powerful framework to make FDTD stability analysis simpler and modular. Stability conditions can indeed be given on the individual components (e.g. boundary conditions, meshes, thin-wire models) rather than on the whole coupled FDTD setup. The theory is intuitive since rooted on the familiar concept of energy dissipation, and sheds new light on the root mechanisms behind FDTD instability. As an example of application, a simple yet effective subgridding algorithm is derived, with straightforward stability proof. The proposed algorithm allows material traverse, is simpler to implement than existing solutions, and supports an arbitrary grid refinement ratio. Numerical results confirm its stability and accuracy. Speedups of up to 46X were observed with only 3.1% error with respect to standard FDTD. R EFERENCES [1] A. Taflove and S. C. Hagness, Computational electrodynamics. Artech house, 2005. [2] S. D. Gedney, Introduction to the Finite-Difference Time-Domain (FDTD) Method for Electromagnetics, 1st ed. San Rafael, CA: Morgan & Claypool Publishers, 2011. [3] K. Yee, “Numerical solution of initial boundary value problems involving Maxwell’s equations in isotropic media,” IEEE Trans. Antennas Propag., vol. 14, no. 3, pp. 302–307, 1966. [4] M. Okoniewski, E. Okoniewska, and M. Stuchly, “Three-dimensional subgridding algorithm for FDTD,” IEEE Trans. Antennas Propag., vol. 45, no. 3, pp. 422–429, 1997. [5] P. Thoma and T. Weiland, “A consistent subgridding scheme for the finite difference time domain method,” Int. J. Numer. Model El., vol. 9, no. 5, pp. 359–374, 1996. [6] K. Xiao, D. J. Pommerenke, and J. L. Drewniak, “A three-dimensional FDTD subgridding algorithm with separated temporal and spatial interfaces and related stability analysis,” IEEE Trans. Antennas Propag., vol. 55, no. 7, pp. 1981–1990, 2007. [7] W. Sui, D. A. Christensen, and C. H. Durney, “Extending the twodimensional FDTD method to hybrid electromagnetic systems with active and passive lumped elements,” IEEE Trans. Microw. Theory Techn., vol. 40, no. 4, pp. 724–730, 1992. [8] F. Edelvik, R. Schuhmann, and T. Weiland, “A general stability analysis of FIT/FDTD applied to lossy dielectrics and lumped elements,” International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, vol. 17, no. 4, pp. 407–419, 2004. JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012 [9] B. Denecker, F. Olyslager, L. Knockaert, and D. De Zutter, “Generation of FDTD subcell equations by means of reduced order modeling,” IEEE Trans. Antennas Propag., vol. 51, no. 8, pp. 1806–1817, 2003. [10] X. Li, C. D. Sarris, and P. Triverio, “Structure-Preserving Reduction of Finite-Difference Time-Domain Equations with Controllable Stability Beyond the CFL Limit,” IEEE Trans. Microw. Theory Techn., vol. 62, no. 12, pp. 3228–3238, 2014. [11] X. Li and P. Triverio, “Stable FDTD Simulations with Subgridding at the Time Step of the Coarse Grid: a Model Order Reduction Approach,” in IEEE MTT-S Int. Conf. on Numerical Electromagnetic and Multiphysics Modeling and Optimization, Ottawa, Canada, August 11–14 2015. [12] J.-F. Lee, R. Lee, and A. Cangellaris, “Time-domain finite-element methods,” IEEE Trans. Antennas Propag., vol. 45, no. 3, pp. 430–442, 1997. [13] A. R. Bretones, R. Mittra, and R. G. Martı́n, “A hybrid technique combining the method of moments in the time domain and FDTD,” IEEE Microw. Guided Wave Lett., vol. 8, no. 8, pp. 281–283, 1998. [14] Y. Wang, S. Safavi-Naeini, and S. K. Chaudhuri, “A hybrid technique based on combining ray tracing and FDTD methods for site-specific modeling of indoor radio wave propagation,” IEEE Trans. Antennas Propag., vol. 48, no. 5, pp. 743–754, 2000. [15] T. Namiki, “A new FDTD algorithm based on alternating-direction implicit method,” IEEE Microw. Wireless Compon. Lett., vol. 47, no. 10, pp. 2003–2007, 1999. [16] F. Zheng, Z. Chen, and J. Zhang, “A Finite-Difference time-domain method without the Courant stability conditions,” IEEE Microwave Guided Wave Lett., vol. 9, no. 11, pp. 441–443, Nov 1999. [17] P. Triverio, S. Grivet-Talocia, M. S. Nakhla, F. Canavero, R. Achar, “Stability, causality, and passivity in electrical interconnect models,” IEEE Trans. Adv. Packag., vol. 30, no. 4, pp. 795–808, 2007. [18] J. C. Willems, “Dissipative dynamical systems part i: General theory,” Archive for rational mechanics and analysis, vol. 45, no. 5, pp. 321–351, 1972. [19] Y. Wang, S. Langdon, and C. Penney, “Analysis of accuracy and stability of FDTD subgridding schemes,” in 2010 European Microwave Conf. IEEE, 2010, pp. 1297–1300. [20] F. Collino, T. Fouquet, and P. Joly, “Conservative space-time mesh refinement methods for the FDTD solution of Maxwell’s equations,” J. Comput. Phys., vol. 211, no. 1, pp. 9–35, 2006. [21] R. A. Chilton and R. Lee, “Conservative and provably stable FDTD subgridding,” IEEE Trans. Antennas Propag., vol. 55, no. 9, pp. 2537– 2549, 2007. [22] N. V. Venkatarayalu, R. Lee, Y.-B. Gan, and L.-W. Li, “A stable FDTD subgridding method based on finite element formulation with hanging variables,” IEEE Trans. Antennas Propag., vol. 55, no. 3, pp. 907–915, 2007. [23] J. Brewer, “Kronecker products and matrix calculus in system theory,” IEEE Trans. Circuits Syst., vol. 25, no. 9, pp. 772–781, 1978. [24] B. Denecker, F. Olyslager, L. Knockaert, and D. De Zutter, “A new statespace-based algorithm to assess the stability of the Finite-Difference time-domain method for 3D finite inhomogeneous problems,” AEU-Int. J. Electron. C, vol. 58, no. 5, pp. 339 – 348, 2004. [25] L. Dai, “Singular control systems,” 1989. [26] C. Byrnes and W. Lin, “Losslessness, feedback equivalence, and the global stabilization of discrete-time nonlinear systems,” IEEE Trans. Autom. Control, vol. 39, no. 1, pp. 83–98, 1994. [27] S. Grivet-Talocia and B. Gustavsen, Passive Macromodeling: Theory and Applications. Hoboken, NJ: Wiley, 2015. [28] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in System and Control Theory, ser. Studies in Applied Mathematics. SIAM, 1994, vol. 15. [29] L. Kulas and M. Mrozowski, “Reciprocity principle for stable subgridding in the finite difference time domain method,” in EUROCON, 2007. The International Conference on “Computer as a Tool”, Sept 2007, pp. 106–111. [30] A. Christ et al., “The Virtual Family - Development of surface-based anatomical models of two adults and two children for dosimetric simulations,” Physics in Medicine and Biology, vol. 55, no. 2, pp. N23– N38, 2010. [31] IT’IS Foundation, “Overview - Database of Tissue Properties.” [Online]. Available: http://www.itis.ethz.ch/virtual-population/tissueproperties/overview/ [Aug. 19, 2015]. [32] S. Kühn et al., “MMF/GSMA phase 2: scientific basis for base station exposure compliance standards,” IT’IS Foundation, Tech. Rep. 21, June 2009. [33] D. A. Sánchez-Hernández, High Frequency Electromagnetic Dosimetry. Boston, MA: Artech House, 2009. 12
5
Approximation algorithms for the maximum weight internal spanning tree problem∗ arXiv:1608.03299v2 [cs.DS] 26 May 2017 Zhi-Zhong Chen† Guohui Lin‡§ Lusheng Wang¶ Yong Chenk‡ Dan Wang¶ May 30, 2017 Abstract Given a vertex-weighted connected graph G = (V, E), the maximum weight internal spanning tree (MwIST for short) problem asks for a spanning tree T of G such that the total weight of the internal vertices in T is maximized. The unweighted variant, denoted as MIST, is NPhard and APX-hard, and the currently best approximation algorithm has a proven performance ratio 13/17. The currently best approximation algorithm for MwIST only has a performance ratio 1/3 − ǫ, for any ǫ > 0. In this paper, we present a simple algorithm based on a novel relationship between MwIST and the maximum weight matching, and show that it achieves a better approximation ratio of 1/2. When restricted to claw-free graphs, a special case been previously studied, we design a 7/12-approximation algorithm. Keywords: Maximum weight internal spanning tree; maximum weight matching; approximation algorithm; performance analysis ∗ An extended abstract appears in the Proceedings of COCOON 2017. Division of Information System Design, Tokyo Denki University. Hatoyama, Saitama 350-0394, Japan. Email: [email protected] ‡ Department of Computing Science, University of Alberta. Edmonton, Alberta T6G 2E8, Canada. Email: [email protected] § Correspondence author. ¶ Department of Computer Science, City University of Hong Kong. Tat Chee Avenue, Kowloon, Hong Kong, China. Email: [email protected] k Institute of Operational Research and Cybernetics, Hangzhou Dianzi University. Hangzhou, Zhejiang 310018, China. Email: [email protected] † 1 2 1 Chen et al. /v:May 30, 2017 Introduction In the maximum weight internal spanning tree (MwIST for short) problem, we are given a vertexweighted connected graph G = (V, E), where each vertex v of V has a nonnegative weight w(v), with the objective to compute a spanning tree T of G such that the total weight of the internal vertices in T , denoted as w(T ), is maximized. MwIST has applications in the network design for cost-efficient communication [18] and water supply [1]. When the vertex weights are uniform, or simply vertex-unweighted, the problem is referred to as the maximum internal spanning tree (MIST for short) problem. MIST is clearly NP-hard because it includes the NP-hard Hamiltonian-path [6] problem as a special case. Furthermore, MIST has been proven APX-hard [12], suggesting that it does not admit a polynomial-time approximation scheme (PTAS). In the literature, much research is done on designing (polynomial-time, if not specified) approximation algorithms for MIST to achieve the worst-case performance ratio as close to 1 as possible. The probably first approximation for MIST is a local search algorithm, which achieves a ratio of 1/2 and is due to Prieto and Sliper [14]. Salamon and Wiener [18] later modified slightly Prieto and Sliper’s algorithm to make it run faster (in linear-time) while achieving the same ratio of 1/2. Besides, two special cases of MIST were considered by Salamon and Wiener [18]: when restricted to claw-free graphs, they designed a 2/3-approximation algorithm; when restricted to cubic graphs, they designed a 5/6-approximation algorithm. Later, Salamon [17] proved that the 1/2-approximation algorithm in [18] actually achieves a performance ratio of 3/(r + 1) for the MIST problem on r-regular graphs (r ≥ 3). Based on local optimization, Salamon [16] presented an O(n4 )-time 4/7-approximation algorithm for MIST restricted to graphs without leaves. The algorithm was subsequently simplified and re-analyzed by Knauer and Spoerhase [7] to run faster (in cubic time), and it becomes the first improved 3/5-approximation for the general MIST. Via a deeper local search strategy than those in [7] and [16], Li et al. [8] presented a further improved approximation algorithm for MIST with ratio 2/3. At the same time, Li and Zhu [12] presented another 2/3-approximation algorithm for MIST. Unlike the other previously known approximation algorithms for MIST, the 2/3-approximation by Li and Zhu [12] is based on a simple but crucial observation that the maximum number of internal vertices in a spanning tree of a graph G can be upper bounded by the maximum number of edges in a triangle-free 2-matching (a.k.a. path-cycle cover) of G. The time complexity of this approximation algorithm is dominated by computing the maximum triangle-free 2-matching, O(nm1.5 log n), where n and m are the numbers of vertices and edges in G, respectively. Li and Zhu [11] claimed that they are able to further improve their design to achieve a 3/4-approximation algorithm for MIST, of the same time complexity. Recently, Chen et al. [2] gave another 3/4approximation algorithm for MIST, which is simpler than the one in [11]; and they showed that by applying three more new ideas, the algorithm can be refined into a 13/17-approximation algorithm for MIST of the same time complexity. This is currently the best approximation algorithm for MIST. The parameterized MIST by the number of internal vertices k, and its special cases and variants, have also been extensively studied in the literature [14, 13, 15, 3, 5, 1, 4, 9, 10]. The best known kernel for the general problem has a size 2k, which leads to the fastest known algorithm with running time O(4k nO(1) ) [9]. For the vertex-weighted version, MwIST, Salamon [16] designed the first O(n4 )-time 1/(2∆−3)approximation algorithm, based on local search, where ∆ is the maximum degree of a vertex in the input graph. For MwIST on claw-free graphs without leaves, Salamon [16] also designed an O(n4 )-time 1/2-approximation algorithm. Subsequently, Knauer and Spoerhase [7] proposed the Approximating the maximum weight internal spanning tree 3 first constant-ratio 1/(3 + ǫ)-approximation algorithm for the general MwIST, for any constant ǫ > 0. The algorithm is based on a new pseudo-polynomial time local search algorithm, that starts with a depth-first-search tree and applies six rules to reach a local optimum. It yields a 1/3-approximation for MwIST and then is extended to a polynomial time 1/(3 + ǫ)-approximation scheme. The authors also showed that the ratio of 1/3 is asymptotically tight. In this paper, we deal with the MwIST problem. We first prove a novel relationship between the total weight of the internal vertices in a spanning tree of the given vertex-weighted graph and the maximum weight matching of an edge-weighted graph, that is constructed out of the given vertexweighted graph. Based on this relationship, we present a simple 1/2-approximation algorithm for MwIST; this ratio 1/2 significantly improves upon the previous known ratio of 1/3. When restricted to claw-free graphs, a special case previously studied in [18, 16], we design a 7/12-approximation algorithm, improving the previous best ratio of 1/2. 2 The 1/2-approximation algorithm Recall that in the MwIST problem, we are given a connected graph G = (V, E), where each vertex v of V has a nonnegative weight w(v), with the objective to compute a spanning tree T of G such that the total weight of the internal vertices in T , denoted as w(T ), is maximized. We note that for such an objective function, we may assume without loss of generality that every leaf in the given graph G has weight 0. We construct an edge-weighted graph based on G = (V, E). In fact, the structure of the new graph is identical to that of G: the vertex set is still V , but instead the vertices have no weights; the edge set is still E, where the weight of each edge e = {u, v} is w(e) = w(u) + w(v), i.e., the weight of an edge is the total weight of its two ending vertices in the original graph. Since there is no ambiguity when we discuss the edge weights or the vertex weights, the new edge-weighted graph is still referred to as G. The weight of an edge subset refers to the total weight of the edges therein; while the weight of an acyclic subgraph refers to the total weight of the internal (and those surely will become internal) vertices therein. Let M ∗ denote the maximum weight matching of (the edge-weighted graph) G, which can be computed in O(n min{m log n, n2 })-time, where n = |V | and m = |E|. Lemma 1 Given a spanning tree T of G, we can construct a matching M of G such that w(T ) ≤ w(M ). Proof. We construct M iteratively. Firstly, we root the tree T at an internal vertex r, and all the edges of T are unmarked; then in every iteration we include into M an unmarked edge e = {u, v} of T such that 1) both u and v are internal and 2) e is the closest to the root r measured by the number of edges on the path from r to e, followed by marking all the edges incident at u or v. This way, the total weight of the two internal vertices u and v in the tree T is transferred to M by adding the edge e to M . At the time this iterative procedure stops, there is no unmarked edge of T connecting two internal vertices, and thus every internal vertex whose weight has not been transferred to M must be adjacent to at least a leaf each via an unmarked edge. Next, we iteratively include into M a remaining unmarked edge e = {u, v} of T , followed by marking all the edges incident at u or v. This way, the total weight of u and v, which is greater than or equal to the weight of the internal vertex between u and v, is transferred to M by adding the edge e to M . At the end of this procedure, T contains no more unmarked edges. Since leaves in the tree T count nothing towards w(T ), we conclude that w(T ) ≤ w(M ). This proves the lemma. ✷ 4 Chen et al. /v:May 30, 2017 The following corollary directly follows from Lemma 1, stating an upper bound on the total weight of an optimal solution to the MwIST problem. Corollary 1 Let T ∗ denote an optimal (maximum weight internal) spanning tree of G. Then, w(T ∗ ) ≤ w(M ∗ ). We next start with M ∗ to construct a spanning tree T . Let the edges of M ∗ be e1 , e2 , . . . , ek ; let ej = {aj , bj }, such that w(aj ) ≥ w(bj ), for all j = 1, 2, . . . , k. Note that there could be vertices of degree 0 in the spanning subgraph G[V, M ∗ ] with the edge set M ∗ , and there could be edges of weight 0 in M ∗ ; let X denote the set of such degree-0 vertices and the end-vertices of such weight-0 edges. Essentially we do not worry about the degree of any vertex of X in our final tree T , since their weights (if any) are not counted towards w(M ∗ ). This way, we assume without loss of generality that w(aj ) > 0 for each edge ej of M ∗ , and consequently the degree of aj is dG (aj ) ≥ 2, that is, aj is adjacent to at least one other vertex than bj in the graph G. Let A = {aj | j = 1, 2, . . . , k}, and B = {bj | j = 1, 2, . . . , k}; note that V = A ∪ B ∪ X. Let E aa = E(A, A ∪ X), i.e., the set of edges each connecting a vertex of A and a vertex of A ∪ X, and E ab = E(A, B), i.e., the set of edges each connecting a vertex of A and a vertex of B. Our construction algorithm first computes a maximal acyclic subgraph of G, denoted as H0 , by adding a subset of edges of E aa to M ∗ . This subset of edges is a maximum weight spanning forest on A ∪ X, and it can be computed in O(|E aa | log n)-time via a linear scan. In the achieved subgraph H0 , if one connected component C contains more than one edge, then the vertex aj of each edge ej = {aj , bj } in C has degree at least 2, i.e. is internal. Therefore, the total weight of the internal vertices in the component C is at least half of w(C ∩ M ∗ ), and C is called settled and left alone by the algorithm. Our algorithm next considers an arbitrary edge of M ∗ that is not yet in any settled component, say ej = {aj , bj }. In other words, the edge ej is an isolated component in the subgraph H0 . This implies that the vertex aj is not incident to any edge of E aa , and thus it has to be adjacent to some vertex in B − {bj }. If aj is adjacent to some vertex bi in a settled component, then this edge (aj , bi ) is added to the subgraph H0 (the edge ej is said merged into a settled component) and the iteration ends. The updated component remains settled, as w(aj ) ≥ w(ej )/2 is saved towards the weight of the final tree T . In the other case, the vertex aj is adjacent to a vertex bi , such that the edge ei = {ai , bi } is also an isolated component in the current subgraph. After adding the edge (aj , bi ) to the subgraph, the algorithm works with the vertex ai exactly the same as with aj at the beginning. That is, if ai is adjacent to some vertex bℓ in a settled component, then this edge (ai , bℓ ) is added to the subgraph (the component that ai belongs to is merged into a settled component) and the iteration ends; if ai is adjacent to a vertex bℓ , such that the edge eℓ = {aℓ , bℓ } is also an isolated component in the current subgraph, then the edge (ai , bℓ ) is added to the subgraph, the algorithm works with the vertex aℓ exactly the same as with aj at the beginning; in the last case, ai is adjacent to a vertex bℓ inside the current component that ai belongs to, then the edge (ai , bℓ ) is added to the current component to create a cycle, subsequently the lightest edge of M ∗ in the cycle is removed, the iteration ends, and the current component becomes settled. We note that in the above last case, the formed cycle in the current component contains at least 2 edges of M ∗ ; breaking the cycle by removing the lightest edge ensures that at least half of the total weight of the edges of M ∗ in this cycle (and thus in this component) is saved towards the weight of the final tree T . Therefore, when the iteration ends, the resulting component is settled. When the second step of the algorithm terminates, there is no isolated edge of M ∗ in the current subgraph, denoted as H1 , and each component is acyclic and settled. In the last step, the algorithm Approximating the maximum weight internal spanning tree 5 connects the components of H1 into a spanning tree using any possible edges of E. We denote the entire algorithm as Approx. Lemma 2 At the end of the second step of the algorithm Approx, every component C of the achieved subgraph H1 is acyclic and settled (i.e., w(C) ≥ w(C ∩ M ∗ )/2). Proof. Let C denote a component; C ∩ M ∗ is the subset of M ∗ , each edge of which has both end-vertices in C. If C is obtained at the end of the first step, then C is acyclic and for every edge ej ∈ C ∩ M ∗ , the vertex aj has degree at least 2, and thus w(C) ≥ w(C ∩ M ∗ )/2. If a subgraph of C is obtained at the end of the first step but C is finalized in the second step, then C is also acyclic and for every edge ej ∈ C ∩ M ∗ , the vertex aj has degree at least 2, and thus w(C) ≥ w(C ∩ M ∗ )/2. If C is newly formed and finalized in the second step, then at the time C was formed, there was a cycle containing at least 2 edges of M ∗ of which the lightest one is removed to ensure the acyclicity, and thus the total weight of the internal vertices on this path is at least half of the total weight of the edges of M ∗ on this cycle. Also, the vertex aj of every edge ej not on the cycle has degree at least 2. Thus, w(C) ≥ w(C ∩ M ∗ )/2. ✷ Theorem 1 The algorithm Approx is a 1/2-approximation for the MwIST problem. Proof. One clearly sees that Approx runs in polynomial time, and in fact the running time is dominated by computing the maximum weight matching M ∗ . From Lemma 2, at the end of the second step of the algorithm Approx, every component C of the achieved subgraph H1 is acyclic and satisfies w(C) ≥ w(C ∩ M ∗ )/2. Since there is no edge of M ∗ connecting different components of the subgraph H1 , the total weight of the internal vertices in H1 is already at least w(M ∗ )/2, i.e. w(H1 ) ≥ w(M ∗ )/2. The last step of the algorithm may only increase the total weight. This proves that the total weight of the internal vertices of the tree T produced by Approx is w(T ) ≥ w(H1 ) ≥ w(M ∗ )/2 ≥ w(T ∗ )/2, where the last inequality is by Corollary 1, which states that w(M ∗ ) is an upper bound on the optimum. Thus, Approx is a 1/2-approximation for the MwIST problem. ✷ 3 A 7/12-approximation algorithm for claw-free graphs We present a better approximation algorithm for the MwIST problem on claw-free graphs. A graph G = (V, E) is called claw-free if, for every vertex, at least two of its arbitrary three neighbors are adjacent. We again assume without loss of generality that every leaf in the graph G has weight 0. Besides, we also assume that |V | ≥ 5. We first present a reduction rule, which is a subcase of Operation 4 in [2], that excludes certain induced subgraphs of the given graph G from consideration. Operation 1 If G has a cut-vertex v such that one connected component C of G − v has two, three or four vertices, then obtain G1 from G − V (C) by adding a new vertex u of weight 0 and a new edge {v, u}. 6 Chen et al. /v:May 30, 2017 Let tw(C) denote the maximum total weight of the internal vertices in a spanning tree of the subgraph induced on V (C) ∪ v, in which w(v) is revised to 0. Then there is an optimal spanning tree T1 of G1 of weight w(T1 ) if and only if there is an optimal spanning tree T of G of weight w(T ) = w(T1 ) + tw(C). Proof. Let Gc denote the subgraph induced on V (C) ∪ v, that is, Gc = G[V (C) ∪ v]; and let Tc denote the spanning tree of Gc achieving the maximum total weight of the internal vertices, that is, w(Tc ) = tw(C) (Tc can be computed in O(1)-time). Note that in T1 , the leaf u must be adjacent to v and thus w(v) is counted towards w(T1 ). We can remove the edge {v, u} and u from T1 while attach the tree Tc to T1 by collapsing the two copies of v. This way, we obtain a spanning tree T of G, of weight w(T ) = w(T1 ) + w(Tc ) since w(v) is not counted towards w(Tc ). Conversely, for any spanning tree T of G, the vertex v is internal due to the existence of C. We may duplicate v and separate out a subtree Tc on the set of vertices V (C) ∪ v, in which the weight of v is revised to 0. This subtree Tc is thus a spanning tree of Gc , and every vertex of V (C) is internal in T if and only if it is internal in Tc . We attach the 0-weight vertex u to the vertex v in the remainder tree via the edge {v, u}, which is denoted as T1 and becomes a spanning tree of G1 ; note that the vertex v is internal in T1 . It follows that w(T ) = w(Tc ) + w(T1 ). ✷ See Figure 1 for an illustration of the local configurations specified in Operation 1. When |V (C)| = 2 and Gc is a triangle, we refer the configuration as a hanging triangle; when |V (C)| = 3 and Gc contains a length-4 cycle, we refer the configuration as a hanging diamond; when |V (C)| = 4 and Gc contains a length-5 cycle, we refer the configuration as a hanging pentagon. Applying Operation 1, we assume in the sequel that there is no hanging triangle, or hanging diamond, or hanging pentagon in the given graph G. v v v (a) A hanging triangle. (b) A hanging diamond. (c) A hanging pentagon. Figure 1: Local configurations of a hanging triangle, a hanging diamond, and a hanging pentagon, specified in Operation 1, where the dotted edges could be in or not in the graph. Let M ∗ denote a maximum weight matching of G, which is computed in O(n min{m log n, n2 })time, where n = |V | and m = |E|. Let the edges of M ∗ be e1 , e2 , . . . , ek ; let ej = {aj , bj }, such that w(aj ) ≥ w(bj ), for all j = 1, 2, . . . , k. For convenience, aj and bj are referred to as the head and the tail vertices of the edge ej , respectively. The same as in the last section, we assume without loss of generality that w(aj ) > 0 for each j, and consequently the degree of aj is dG (aj ) ≥ 2, that is, aj is adjacent to at least one vertex other than bj in the graph G. Let A = {aj | j = 1, 2, . . . , k}, B = {bj | j = 1, 2, . . . , k}, and X = V − (A ∪ B). Let E aa = E(A, A), i.e., the set of edges each connecting two vertices of A, E ax = E(A, X), i.e., the set of edges each connecting a vertex of A and a vertex of X, and E ab = E(A, B), i.e., the set of edges each connecting a vertex of A and a vertex of B, respectively. Approximating the maximum weight internal spanning tree 7 Let M aa ⊆ E aa be a maximum cardinality matching within the edge set E aa . We next prove a structure property of the spanning subgraph G[V, M ∗ ∪ M aa ], which has the edge set M ∗ ∪ M aa . For an edge ej = {aj , bj } of M ∗ , if aj is not incident to any edge of M aa , then ej is called isolated in G[V, M ∗ ∪ M aa ]. Lemma 3 Assume that two edges ej1 = {aj1 , bj1 } and ej2 = {aj2 , bj2 } of M ∗ are connected by the edge {aj1 , aj2 } ∈ M aa in G[V, M ∗ ∪ M aa ]. Then there is at most one isolated edge ej3 = {aj3 , bj3 } whose head aj3 can be adjacent to aj1 or aj2 . Proof. By contradiction, assume that there are two isolated edges ej3 = {aj3 , bj3 } and ej4 = {aj4 , bj4 } such that both the vertices aj3 and aj4 are adjacent to aj1 or aj2 . Then from the maximum cardinality of M aa , aj3 and aj4 must be both adjacent to aj1 or both adjacent to aj2 . Suppose they are both adjacent to aj1 ; from the claw-free property, at least two of aj2 , aj3 and aj4 are adjacent, which contradicts the maximum cardinality of M aa . This proves the lemma. ✷ For an isolated edge ej3 = {aj3 , bj3 } whose head is adjacent to an edge {aj1 , aj2 } ∈ M aa (i.e., satisfying Lemma 3), and assuming that {aj2 , aj3 } ∈ E aa , we add the edge {aj2 , aj3 } to G[V, M ∗ ∪ M aa ]; consequently the edge ej3 is no longer isolated. Let N aa denote the set of such added edges associated with M aa . At the end, the achieved subgraph is denoted as H0 = G[V, M ∗ ∪ M aa ∪ N aa ]. Lemma 4 In the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ], • every connected component containing more than one edge has either two or three edges from M ∗ , with their head vertices connected (by the edges of M aa ∪ N aa ) into a path; it is called a type-I component (see Figure 2a) and a type-II component (see Figure 2b), respectively; • for every isolated edge ej = {aj , bj }, the head vertex is incident with at least one edge of E ax ∪ E ab , but with no edge of E aa . Proof. The proof directly follows the definition of the subgraph H0 and Lemma 3. aj2 aj1 aj3 bj2 bj1 bj3 (a) A type-I component. aj2 bj2 ✷ aj1 bj1 (b) A type-II component. Figure 2: The configurations of a type-I component and a type-II component. The following lemma is analogous to Lemma 3. Lemma 5 Any vertex of X can be adjacent to the head vertices of at most two isolated edges in the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ]. 8 Chen et al. /v:May 30, 2017 Proof. By contradiction, assume that x ∈ X and there are three isolated edges ejk = {ajk , bjk }, k = 1, 2, 3, in the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ], such that the edge {ajk , x} ∈ E ax . From the claw-free property, at least two of aj1 , aj2 and aj3 are adjacent, which contradicts Lemma 4. This proves the lemma. ✷ For an isolated edge ej = {aj , bj } in the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ] whose head is adjacent to a vertex x ∈ X (i.e., satisfying Lemma 5), we add the edge {aj , x} to H0 ; consequently the edge ej is no longer isolated. Let N ax denote the set of such added edges associated with X. At the end, the achieved subgraph is denoted as H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ]. Lemma 6 In the subgraph H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ], • every connected component of H0 containing more than one edge remains unchanged in H1 ; • every connected component containing a vertex x of X and some other vertex has either one or two edges from M ∗ , with their head vertices connected (by the edges of N ax ) to the vertex x; it is called a type-III component (see Figure 3a) and a type-IV component (see Figure 3b), respectively; • for every isolated edge ej = {aj , bj }, the head vertex is incident with at least one edge of E ab , but with no edge of E aa ∪ E ax . Proof. The proof directly follows the definition of the subgraph H1 and Lemmas 4 and 5. aj1 aj1 aj2 x ✷ x bj1 (a) A type-III component. bj2 bj1 (b) A type-IV component. Figure 3: The configurations of a type-III component and a type-IV component. Let E0ab denote the subset of E ab , to include all the edges {aj , bℓ } where both the edges ej = {aj , bj } and eℓ = {aℓ , bℓ } are isolated in the subgraph H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ]. Let M ab ⊆ E0ab be a maximum cardinality matching within the edge set E0ab . Let H2 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ] be the subgraph obtained from H1 by adding all the edges of M ab . One clearly sees that all the isolated edges in the subgraph H1 are connected by the edges of M ab into disjoint paths and cycles; while a path may contain any number of isolated edges, a cycle contains at least two isolated edges. Such a path and a cycle component are called a type-V component (see Figure 4a) and a type-VI component (see Figure 4b), respectively. Note that in a type-V component, there is exactly one head vertex of degree 1 and there is exactly one tail vertex of degree 1. We assume that for the tail vertex in a type-V component, it is not adjacent to the head of any other edge (via an edge of E ab ) in the same component; otherwise, through an edge exchange, the component is decomposed into a smaller type-V component and a new type-VI component. Approximating the maximum weight internal spanning tree ...... ...... (a) A type-V component. 9 (b) A type-VI component. Figure 4: The configurations of a type-V component and a type-VI component. Lemma 7 In the subgraph H2 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ], for every type-V component, the degree-1 head vertex is adjacent (via an edge of E ab ) to the tail vertex of an edge in a type-I, -II, -III, or -IV component; on the other hand, the tail vertex of every edge in a type-I, -II, -III, or -IV component is adjacent to at most one such head vertex. Proof. We first show that the degree-1 head vertex in a type-V component C, denoted as aj , cannot be adjacent to the tail of any edge in another type-V or a type-VI component C ′ . By contradiction, assume {aj , bℓ } ∈ E ab and eℓ is in C ′ . If the tail bℓ is already incident to some edge of M ab , say {ai , bℓ }, then by the claw-free property at least two of ai , aj , aℓ must be adjacent, contradicting the fact that they are all isolated in the subgraph H1 . In the other case, the tail bℓ is the tail vertex of C ′ (which is a type-V component too), then it violates the maximum cardinality of M ab since {aj , bℓ } ∈ E ab can be added to increase the size of M ab . This proves the first half of the lemma. The second half can be proven by a simple contradiction using the claw-free property of the graph. ✷ Subsequently, every type-V component C is connected to a type-I, -II, -III, or -IV component C ′ , via the edge between the degree-1 head vertex of C and the tail vertex of an edge in C ′ ∩ M ∗ . This way, the degree-1 tail vertex of C takes up the role of “the tail vertex” of the edge in C ′ ∩ M ∗ , to become a tail vertex in the newly formed bigger component. For simplicity, the type of the component C ′ is passed to the newly formed bigger component. Denote this set of newly added edges as N ab , which is a subset of E ab − M ab . The achieved subgraph is denoted as H3 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ]. Lemma 8 In the subgraph H3 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ], • there is no isolated type-V component; • the head vertex of every edge of M ∗ has degree at least 2. Proof. The first half of the lemma follows from Lemma 7; the second half holds since there is no more isolated type-V component, which is the only type of component containing a degree-1 head vertex. ✷ We next create a set F of edges that are used to interconnect the components in the subgraph H3 . F is initialized to be empty. By Lemma 8, for every type-I, -II, -III, or -IV component C in the subgraph H3 , of weight w(C ∩M ∗ ), it is a tree and the total weight of the internal vertices therein is at least 12 w(C ∩ M ∗ ); for every type-VI component C, which is a cycle, by deleting the lightest edge 10 Chen et al. /v:May 30, 2017 of C ∩ M ∗ from C we obtain a path and the total weight of the internal vertices in this path is also at least 12 w(C ∩ M ∗ ). In the next five lemmas, we show that every component C in the subgraph H3 can be converted into a tree on the same set of vertices, possibly with one edge specified for connecting a leaf of this tree outwards, such that the total weight of the internal vertices (and the leaf, if specified) in the tree is at least 32 w(C ∩ M ∗ ). The specified edge for the interconnection purpose, is added to F . At the end of the process, the component C is called settled. A settled component C can be expressed in multiple equivalent ways, for example, that the total weight of the internal vertices (and the leaf, if specified) in the resulting tree is at least 32 w(C ∩ M ∗ ), or that the total weight of the internal (and the leaf, if specified) vertices in the resulting tree is at least twice the total weight of the leaves (excluding the specified leaf, if any). In the sequel, we abuse the vertex notation to also denote its weight in math formulae; this simplifies the presentation and the meaning of the notation is easily distinguishable. For estimating the total weight of the internal vertices in a tree in the sequel, we frequently use the following inequality: ∀w1 , w2 , w3 ∈ R, w1 + w2 + w3 − min{w1 , w2 , w3 } ≥ 2 min{w1 , w2 , w3 }. Lemma 9 A type-I component in the subgraph H3 can be settled. Proof. Consider a type-I component C in the subgraph H3 . Recall from Lemma 8 and the paragraph right above it, that a general type-I component is an original type-I component (shown in Figure 2a) augmented with zero to two type-V components. Let the two original edges of M ∗ in C be ej1 and ej2 and the two tail vertices be b1 and b2 (which replace bj1 and bj2 to be the tail vertices, respectively) with w(b1 ) ≥ w(b2 ). The corresponding two head vertices to the tails b1 and b2 are denoted as a1 and a2 , respectively. See Figure 5 for the general configuration of such a component. We assume that w(b1 ) > 0, since otherwise C is settled automatically. a2 b2 aj2 bj2 aj1 a1 bj1 b1 Figure 5: The general configuration of a type-I component, with a type-V component adjacent to each of the two tail vertices. Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F ; this settles C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 ≥ 3b2 (recall that a vertex notation here represents the weight of the vertex). We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to be adjacent to some vertex inside C. Note that C is a path with b1 and b2 being its two ending vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this distance dC (b1 , v) ≥ 2 and where v locates. Approximating the maximum weight internal spanning tree 11 Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then by the construction of a type-V component we know that v must be a tail of an edge of M ∗ (Figures 6a and 6b), and thus dC (b1 , v) is even. Denote this edge as ej3 = {aj3 , bj3 }, that is v = bj3 . a2 b2 aj2 bj2 aj1 a1 a2 bj1 v b1 b2 (a) dC (b1 , v) ≥ 4. aj2 bj2 a1 aj1 bj1 v b1 (b) dC (b1 , v) = 2. Figure 6: Local configurations corresponding to Case 2, where v is inside the type-V component adjacent to bj1 . Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex other than aj3 that bj3 is adjacent to as aj4 (see Figure 6a). We conclude from the claw-free property that there must be at least an edge among aj3 , aj4 , b1 , which contradicts the identity of the type-V component. Therefore, it is impossible to have dC (b1 , v) ≥ 4. Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1 (see Figure 6b), i.e. there is at least another edge incident at a1 besides {a1 , bj3 } and {a1 , b1 }. Denote this neighbor of a1 as u. If u is inside C, then u = b2 ; in this case, add the edges {b1 , bj3 } and {a1 , b2 } to C while delete the edge {a1 , bj3 } and the lightest among the edges of C ∩ M ∗ from C. This way, the component becomes a tree and thus C is settled. If u is outside C, then we add the edge {b1 , bj3 } to C while delete the edge {a1 , bj3 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled. Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 (see Figure 7). a2 b2 aj2 bj2 aj1 a1 bj1 b1 Figure 7: Local configurations corresponding to Case 3, where v = bj1 . Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus it is impossible. Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , which is {a1 , b1 }, then we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj1 } and {a1 , b1 }. (The following is the same as in Case 2.2.) Denote this neighbor of a1 as u. If u is inside C, then u = b2 ; in this case, add the edges {b1 , bj1 } and 12 Chen et al. /v:May 30, 2017 {a1 , b2 } to C while delete the edge {a1 , bj1 } and the lightest among the edges of C ∩ M ∗ from C. This way, the component becomes a tree and thus C is settled. If u is outside C, then we add the edge {b1 , bj1 } to C while delete the edge {a1 , bj1 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled. Case 4. If b1 6= bj1 and v = aj1 (see Figure 8), then we leave C as it is when w(b1 ) ≤ w(bj1 ), or we add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. The total weight of the internal vertices in the resulting path is at least a2 + aj1 + a1 + max{b1 , bj1 } ≥ 2(b2 + min{b1 , bj1 }), and thus C is settled. a2 b2 aj2 bj2 aj1 a1 bj1 b1 Figure 8: Local configurations corresponding to Case 4, where v = aj1 . Case 5. If b1 6= bj1 and v = aj2 (see Figure 9), then by the claw-free property there is at least an edge among bj2 , aj1 , b1 . Note that bj2 and b1 cannot be adjacent due to the definition of the vertex v (being the farthest). If aj1 and b1 are adjacent, then it has been proven in Case 4 that C can be settled. If bj2 and aj1 are adjacent, then similarly as in Case 4 we either leave C as it is when w(b1 ) ≤ w(bj1 ), or add the edges {aj2 , b1 } and {aj1 , bj2 } to C while delete the edges {aj1 , bj1 } and {aj2 , bj2 } from C; the total weight of the internal vertices in the resulting path is at least a2 + aj1 + a1 + max{b1 , bj1 } ≥ 2(b2 + min{b1 , bj1 }), and thus C is settled. a2 b2 aj2 bj2 aj1 a1 bj1 b1 Figure 9: Local configurations corresponding to Case 5, where v = aj2 . Case 6. If b1 6= bj1 and v = bj2 (see Figure 10), then by the claw-free property aj2 and b1 must be adjacent. Case 6.1. If b2 6= bj2 , then we have three ways to convert C into a path ending at b2 : 1) doing nothing to leave b1 as a leaf; 2) adding the edge {aj2 , b1 } to C while deleting the edge {aj2 , aj1 } to leave aj1 as a leaf; 3) adding the edge {bj2 , b1 } to C while deleting the edge {aj2 , bj2 } to leave aj2 as a leaf. Then, the maximum total weight of the internal vertices among these three paths is at least a2 + a1 + aj1 + aj2 + b1 − min{b1 , aj1 , aj2 } ≥ 2(b2 + min{b1 , aj1 , aj2 }). Thus, C is settled. Approximating the maximum weight internal spanning tree a2 aj2 b2 bj2 aj1 a1 bj1 b1 13 Figure 10: Local configurations corresponding to Case 6, where v = bj2 . Case 6.2. If b2 = bj2 , that is, there is no type-V component adjacent to bj2 , then we add the edge {bj2 , b1 } to C while delete the lightest edge of C ∩ M ∗ from C to settle C, because C ∩ M ∗ contains at least three edges. Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish whether v is a head or a tail (see Figure 11). a2 2 a v aj2 aj1 b bj2 bj1 (a) v is a head. aj1 a1 a2 bj1 b1 b2 aj2 aj1 a1 bj1 b1 a b2 2 aj2 1 b bj2 v bj2 1 (b) v = b2 . (c) v is a tail. Figure 11: Local configurations corresponding to Case 7, where v is inside the type-V component adjacent to bj2 . Case 7.1. If v is a head, say aj3 of the edge ej3 (see Figure 11a), and assume that aj3 is also adjacent to bj4 , then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or add the edge {aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. Then, the total weight of the internal vertices in the resulting path is at least a2 +a1 +aj4 +max{b1 , bj4 } ≥ 2(b2 +min{b1 , bj4 }). Thus, C is settled. Case 7.2. If v is a tail, say bj3 of the edge ej3 (see Figures 11b and 11c). If b2 = bj3 (see Figure 11b), then we add the edge {b1 , b2 } to C makes it a cycle while delete the lightest edge of C ∩ M ∗ to settle C since there are at least four edges in C ∩ M ∗ ; if b2 6= bj3 (see Figure 11c), then by the claw-free property and the definition of v we conclude that b1 is adjacent to aj3 too, and thus the argument in Case 7.1 applies to settle C. In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1 (see Figure 12). Case 8. If b1 = bj1 and v = aj2 , then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1 (see Figure 13). Case 8.1. If there is a vertex u outside C that is adjacent to a1 , then we add the edge {a1 , u} to F , add the edge {aj2 , b1 } to C while delete the edge {a1 , aj2 } from C; this way, C is settled. Case 8.2. Otherwise by the claw-free property a1 must be adjacent either to b2 or to bj2 . 14 Chen et al. /v:May 30, 2017 a2 a1 aj2 b2 b1 bj2 Figure 12: A special configuration without a type-V component adjacent to bj1 , i.e. bj1 = b1 . a2 a1 aj2 b2 b1 bj2 Figure 13: Local configurations corresponding to Case 8, where v = aj2 . Case 8.2.1. Assuming b2 6= bj2 , in the former case, we add the edges {aj2 , b1 } and {a1 , b2 } to C while delete the edge {a1 , aj2 } and the lightest edge of C ∩ M ∗ from C; this way, C is settled since there were at least three edges in C ∩ M ∗ . In the latter case, we conclude that dG (aj2 ) ≥ 4 by Operation 1. Recursively, if there is a vertex u outside C that is adjacent to aj2 , then we add the edge {aj2 , u} to F , add the edges {aj2 , b1 } and {a1 , bj2 } to C while delete the edges {a1 , aj2 } and {aj2 , bj2 } from C; this way, C is settled. Otherwise by the claw-free property aj2 must be adjacent to b2 ; we add three edges {aj2 , b1 }, {a1 , bj2 } and {aj2 , b2 } to C while delete the edges {a1 , aj2 } and {aj2 , bj2 }, and the lightest edge of C ∩ M ∗ from C; this way, C is settled. Case 8.2.2. Assuming b2 = bj2 , that is, there is no type-V component adjacent to bj2 . We conclude that dG (a2 ) ≥ 4 and there is a vertex u outside C that is adjacent to a2 by Operation 1. Thus, we add the edge {a2 , u} to F , add the edges {a2 , b1 } and {a1 , b2 } to C while delete the edges {a1 , a2 } and {a2 , b2 } from C; this way, C is settled. Case 9. If b1 = bj1 and v = bj2 (see Figure 14), we consider two possible scenarios. a2 aj2 a1 a2 a1 b2 bj2 b1 b2 b1 (a) b2 6= bj2 . (b) b2 = bj2 . Figure 14: Local configurations corresponding to Case 9, where v = bj2 . Approximating the maximum weight internal spanning tree 15 Case 9.1. If b2 6= bj2 (see Figure 14a), then we conclude from the claw-free property and the definition of v that b1 is also adjacent to aj2 . By Operation 1, at least one of a1 and aj2 must be adjacent to another vertex u. Case 9.1.1. If there is a vertex u outside C that is adjacent to a1 (aj2 , respectively) then we add the edge {a1 , u} ({aj2 , u}, respectively) to F , add the edges {bj2 , b1 } and {aj2 , b1 } ({bj2 , b1 }, respectively) to C while delete the edges {a1 , b1 } and {aj2 , bj2 } ({aj2 , bj2 }, respectively) from C; this way, C is settled. Case 9.1.2. Otherwise by the claw-free property u ∈ {b2 , bj2 }. If u = b2 , then we can settle C by converting C into a cycle on the same set of vertices, followed by deleting the lightest edge of C ∩ M ∗ from C. In the other case, u = bj2 and thus a1 is adjacent to bj2 , which by Operation 1 is impossible. Case 9.2. If b2 = bj2 , that is, there is no type-V component adjacent to bj2 (see Figure 14b). We conclude that either there is a vertex u outside C that is adjacent to a2 , or a2 is adjacent to b1 and there is a vertex u outside C that is adjacent to a1 . In either case, we add the edge {·, u} to F , and convert C into a path with b2 and · as two ending vertices; this way, C is settled. Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish whether v is a head or a tail (see Figure 15). a2 a2 b2 v aj2 a1 bj2 b1 (a) v is a head. b2 aj2 bj2 a1 a2 b1 b2 (b) v = b2 . aj2 v bj2 a1 b1 (c) v is a tail. Figure 15: Local configurations corresponding to Case 10, where v is inside the type-V component adjacent to bj2 . Case 10.1. If v is a head, say aj3 of the edge ej3 (see Figure 15a), and assume that aj3 is also adjacent to bj4 , then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or add the edge {aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. Then, the total weight of the internal vertices in the resulting path is at least a2 +a1 +aj4 +max{b1 , bj4 } ≥ 2(b2 +min{b1 , bj4 }). Thus, C is settled. Case 10.2. If v is a tail, say bj3 of the edge ej3 (see Figures 15b and 15c). If b2 = bj3 (see Figure 15b), then we add the edge {b1 , b2 } to C makes it a cycle while delete the lightest edge of C ∩ M ∗ to settle C since there are at least three edges in C ∩ M ∗ ; if b2 6= bj3 (see Figure 15c), then by the claw-free property and the definition of v we conclude that b1 is adjacent to aj3 too, and thus the argument in Case 10.1 applies to settle C. All possible cases have be discussed in the above. The lemma is proven. ✷ Lemma 10 A type-II component in the subgraph H3 can be settled. Proof. Consider a type-II component C in the subgraph H3 . Recall from Lemma 8 and the paragraph right above it, that a general type-II component is an original type-II component (shown 16 Chen et al. /v:May 30, 2017 in Figure 2b) augmented with zero to three type-V components. Let the three original edges of M ∗ in C be ej1 , ej2 , ej3 , with ej2 in the middle (see Figure 2b), and the three tail vertices be b1 , b2 , b3 (which replace bj1 , bj2 , bj3 , respectively). We consider the situation where b1 is the heaviest among the three tail vertices (the other situation is where b2 is the heaviest, and can be similarly discussed). In the following, discussion for most cases is similar to the cases in the proof of Lemma 9, and thus not all details are presented (neither the illustration figures). Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 + a3 ≥ 2(b2 + b3 ) (recall that a vertex notation here represents the weight of the vertex). In the sequel we assume b1 is not adjacent to any vertex outside C, and thus it has to be adjacent to some vertex inside C. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C (tie breaks arbitrarily). We distinguish this distance dC (b1 , v) ≥ 2 and where v locates. Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be the tail of an edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej4 = {aj4 , bj4 }, that is v = bj4 . Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex other than aj4 that bj4 is also adjacent to as aj5 . We conclude from the claw-free property that there must be at least an edge among aj4 , aj5 , b1 , which contradicts the identity of the type-V component. Thus it is impossible to have dC (b1 , v) ≥ 4. Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj4 } and {a1 , b1 }. Denote this neighbor of a1 as u. If u is inside C, then u ∈ {b2 , b3 }; in the case of u = b2 (the argument for u = b3 is identical), we know that the branch incident at aj1 contains at least three edges of M ∗ (ej1 , ej4 , e1 ), and thus we may add the edges {bj4 , b1 } and {a1 , b2 } to C while delete the edge {a1 , bj4 } and the lightest among the three edges ej1 , ej4 , e2 (which are on the created cycle), denoted as ex = {ax , bx }, from C. This way, the component becomes a tree with leaves b3 , ax , bx . The total weight of the internal vertices in the tree is at least a3 + (a1 + b1 ) + 2(ax + bx ) ≥ 2(b3 + ax + bx ); that is, C is settled. If u is outside C, then we add the edge {bj4 , b1 } to C while delete the edge {a1 , bj4 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled. Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 . Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus it is impossible. Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , which is {a1 , b1 }; in this case, we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj1 } and {a1 , b1 }. Denote this neighbor of a1 as u. If u is inside C, then u ∈ {b2 , b3 }. In the case of u = b2 (the argument for u = b3 is identical), we may add the edges {b1 , bj1 } and {a1 , b2 } to C while delete the edge {a1 , bj1 } to form a cycle. When bj2 = b2 , we either delete the edge {aj2 , bj2 } to leave bj2 as a leaf, or delete the edge {aj2 , aj1 } to leave aj1 as a leaf. The maximum total weight of the internal vertices between the two trees is at least a3 + a1 + b1 + a2 + max{b2 , aj1 } ≥ 2(b3 + min{b2 , aj1 }), and thus C is settled. When bj2 6= b2 , we delete the lightest among the three edges ej1 , ej2 , e2 (which are on the created cycle), denoted as ex = {ax , bx }, from C. This way, the component becomes a tree with leaves b3 , ax , bx . The total Approximating the maximum weight internal spanning tree 17 weight of the internal vertices in the tree is at least a3 + (a1 + b1 ) + 2(ax + bx ) ≥ 2(b3 + ax + bx ); that is, C is settled. If u is outside C, then we add the edge {b1 , bj1 } to C while delete the edge {a1 , bj1 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled. Case 4. If b1 6= bj1 and v = aj1 , we consider the size of the type-V component containing b1 . Case 4.1. If this type-V component contains more than one edge of M ∗ , then denote one edge other than {a1 , b1 } as ej4 = {aj4 , bj4 }. We add the edge {aj1 , b1 } to C while either delete the edge {aj1 , bj1 } to have a tree with leaves bj1 , b2 , b3 , or delete the edge {aj4 , bj4 } to have a tree with leaves aj4 , bj4 , b2 , b3 . It follows that the maximum total weight of the internal vertices between the two trees is at least a2 + a3 + a1 + b1 + aj1 + max{bj1 , aj4 + bj4 } ≥ 2(b2 + b3 + min{bj1 , aj4 + bj4 }); therefore, C is settled. Case 4.2. If this type-V component contains only one edge of M ∗ , which is {a1 , b1 }, then from the claw-free property and the definition of v being the farthest we conclude that bj1 is adjacent to at least one of aj2 and b1 . Case 4.2.1. Assume bj1 and aj2 are adjacent. By treating aj2 as the cut-vertex in Operation 1, we conclude that at least one of the three vertices aj1 , bj1 , a1 is adjacent to a vertex u outside of the set {aj2 , aj1 , bj1 , a1 , b1 }. Case 4.2.1.1. If aj1 is adjacent to a vertex u outside the component C, then we add the edges {aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {aj1 , bj1 } from C to obtain a tree with leaves b3 , b2 , aj1 ; thus, adding the edge {aj1 , u} to F settles C. If bj1 is adjacent to a vertex u outside the component C, then we add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C to obtain a tree with leaves b3 , b2 , bj1 ; thus, adding the edge {bj1 , u} to F settles C. If a1 is adjacent to a vertex u outside the component C, then we add the edges {aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {bj1 , a1 } from C to obtain a tree with leaves b3 , b2 , a1 ; thus, adding the edge {a1 , u} to F settles C. Case 4.2.1.2. If aj1 is not adjacent to any vertex outside the component C, but to some vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). There are only four possibilities. When u = aj3 (u = bj3 and bj3 6= b3 implying that aj3 and aj1 are adjacent), we can add the edges {aj3 , aj1 }, {aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj3 , aj2 }, {aj2 , aj1 } and {aj1 , bj1 } from C to obtain a path with leaves b3 , b2 ; thus, C is settled. When u = bj2 , we can add the edges {bj2 , aj1 }, {aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj2 , aj1 }, {aj2 , bj2 } and {aj1 , bj1 } from C to obtain a path with leaves b3 , b2 ; thus, C is settled. When u = b3 (whether b3 = bj3 or not), we can add the edge {b3 , aj1 } to C while delete the edge {aj2 , aj1 } from C to obtain a path with leaves b2 , b1 ; we also can add the edges {b3 , aj1 } and {aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {aj1 , bj1 } from C to obtain a path with leaves b2 , bj1 . It follows that the maximum total weight of the internal vertices between the two paths is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }); therefore, C is settled. When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that C can be settled. Case 4.2.1.3. If a1 is not adjacent to any vertex outside the component C, but to some vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that u cannot be any head vertex, as otherwise it violates the algorithm; u cannot be any tail vertex either, unless it is b2 or b3 . Therefore there are only two possibilities. 18 Chen et al. /v:May 30, 2017 When u = b3 (whether b3 = bj3 or not), we can add the edges {b3 , a1 } and {aj1 , b1 } to C while delete the edge {aj2 , aj1 }. Then, we either delete {a1 , b1 } to obtain a path with leaves b2 , b1 , or delete {a1 , bj1 } to obtain a path with leaves b2 , bj1 . It follows that the maximum total weight of the internal vertices between the two paths is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }); therefore, C is settled. When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that C can be settled. Case 4.2.1.4. If bj1 is not adjacent to any vertex outside the component C, but to some vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). When u ∈ {aj3 , bj3 , bj2 } (u = bj3 and bj3 6= b3 implying that aj3 and bj1 are adjacent), similarly as in Case 4.2.1.2, we can convert C into a path with leaves b3 , b2 to settle C. In the remaining case, u is inside one of the attached type-V components. When u is a head, say aj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), and assume that aj4 is adjacent to bj5 besides bj4 , then we can do nothing to have a tree with leaves b3 , b2 , b1 ; or we can add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj1 ; or we can add the edges {aj4 , bj1 } and {aj1 , b1 } to C while delete the edges {aj4 , bj5 } and {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj5 . The maximum total weight of the internal vertices among the three trees is at least a3 + a2 + aj1 + bj1 + aj5 + bj5 + a1 + b1 − min{b1 , bj1 , bj5 } ≥ 2(b3 + b2 + min{b1 , bj1 , bj5 }), which settles C. When u is a tail, say bj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), but bj 4 ∈ / {b2 , b3 }, then from the claw-free property and the definition of u we conclude that bj1 is also adjacent to aj4 . Thus the argument in the last paragraph applies to settle C. Lastly, when u = b2 (or b3 , which can be shown in the same way), we conclude that b2 is adjacent either to aj1 , which is settled in Case 4.2.1.2, or to a1 , which is settled in Case 4.2.1.3. Case 4.2.2. Assume bj1 is not adjacent to aj2 but to b1 . By treating aj1 as the cut-vertex in Operation 1, we conclude that at least one of the two vertices bj1 , a1 is adjacent to a vertex u outside the set {aj1 , bj1 , a1 , b1 }. Case 4.2.2.1. If bj1 is adjacent to a vertex u outside the component C, then we add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C to obtain a tree with leaves b3 , b2 , bj1 ; thus, adding the edge {bj1 , u} to F settles C. If a1 is adjacent to a vertex u outside the component C, then we add the edges {bj1 , b1 } and {aj1 , b1 } to C while delete the edges {aj1 , bj1 } and {a1 , b1 } from C to obtain a tree with leaves b3 , b2 , a1 ; thus, adding the edge {a1 , u} to F settles C. Case 4.2.2.2. If a1 is not adjacent to any vertex outside the component C, but to some vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that u cannot be any head vertex, as otherwise it violates the algorithm; u cannot be any tail vertex either, unless it is b2 or b3 . Therefore there are only two possibilities. (This is very similar to Case 4.2.1.3.) When u = b3 (whether b3 = bj3 or not), we can add the edges {b3 , a1 } and {aj1 , b1 } to C while delete the edge {aj2 , aj1 }. Then, we can delete {a1 , b1 } to obtain a path with leaves b2 , b1 , or we can delete {a1 , bj1 } to obtain a path with leaves b2 , bj1 . It follows that the maximum total weight of the internal vertices between the two paths is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }); therefore, C is settled. When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that C can be settled. Case 4.2.2.3. If bj1 is not adjacent to any vertex outside the component C, but to some vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that u 6= aj2 , which is Case 4.2.1. When u ∈ {aj3 , bj3 , bj2 }, similarly as in Case 4.2.1.2, we can convert Approximating the maximum weight internal spanning tree 19 C into a path with leaves b3 , b2 to settle C. In the remaining case, u is inside one of the attached type-V components. (This is very similar to Case 4.2.1.4.) When u is a head, say aj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), and assume that aj4 is adjacent to bj5 besides bj4 , then we can do nothing to have a tree with leaves b3 , b2 , b1 ; or we can add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj1 ; or we can add the edges {aj4 , bj1 } and {aj1 , b1 } to C while delete the edges {aj4 , bj5 } and {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj5 . The maximum total weight of the internal vertices among the three trees is at least a3 + a2 + aj1 + bj1 + aj5 + bj5 + a1 + b1 − min{b1 , bj1 , bj5 } ≥ 2(b3 + b2 + min{b1 , bj1 , bj5 }), which settles C. When u is a tail, say bj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), but bj 4 ∈ / {b2 , b3 }, then from the claw-free property and the definition of u we conclude that bj1 is also adjacent to aj4 . Thus the argument in the last paragraph applies to settle C. Lastly, when u = b2 (or b3 , which can be shown in the same way), we conclude that b2 is adjacent either to aj1 or to a1 , the latter of which is settled in Case 4.2.2.3. In the remaining case where b2 is adjacent to aj1 , we can add the edge {b2 , aj1 } to C while delete the edge {aj1 , aj2 } to obtain a path with leaves b3 , b1 ; or we can add the edges {b2 , aj1 } and {b1 , aj1 } to C while delete the edges {aj1 , aj2 } and {aj1 , bj1 } to obtain a path with leaves b3 , bj1 . The maximum total weight of the internal vertices between the two trees is at least a3 + a1 + aj1 + max{b1 , bj1 } ≥ 2(b3 + min{b1 , bj1 }), which settles C. Case 5. If b1 6= bj1 and v = aj2 , then by the claw-free property there is at least an edge among bj2 , aj1 , b1 . Note that bj2 and b1 cannot be adjacent due to the definition of the vertex v being the farthest. If aj1 and b1 are adjacent, then it has been proven in the above Case 4 that C can be settled. If bj2 and aj1 are adjacent, then we add the edges {aj2 , b1 } and {aj1 , bj2 } to C while delete the edges {aj2 , aj1 } and {aj2 , bj2 } from C; this way we obtain a path with two leaves b2 and b3 , and thus it settles C. Case 6. If b1 6= bj1 and v = bj2 , then we add the edge {bj2 , b1 } to C while delete the edge {aj2 , bj2 } from C; this way we obtain a path with two leaves b2 and b3 , and thus it settles C. If b1 6= bj1 and v = aj3 , then we add the edge {aj3 , b1 } to C while delete the edge {aj3 , aj2 } from C; this way we obtain a path with two leaves b2 and b3 , and thus it settles C. If b1 6= bj1 and v = bj3 , then there are two possible scenarios. When b3 6= bj3 , by the clawfree property and the definition of v we conclude that aj3 and b1 must be adjacent, and the last paragraph shows that C is settled. When b3 = bj3 , we add the edge {b3 , b1 } to C while either delete the edge {a3 , aj2 } from C to achieve a path with two leaves a3 , b2 , or delete the edge {aj2 , aj1 } from C to achieve a path with leaves aj1 , b2 ; we may also do nothing to C which is a tree with leaves b1 , b2 , b3 . Among these three trees, the maximum total weight of the internal vertices is at least a3 + b3 + a2 + aj1 + a1 + b1 − min{a3 , aj1 , b1 + b3 } ≥ 2(b2 + min{a3 , aj1 , b1 + b3 }); thus, C is settled. Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish whether v is a head or a tail. (Note that the same argument applies to b3 6= bj3 and v is in the type-V component containing b3 .) Case 7.1. If v is a head, say aj4 of the edge ej4 , and assume that aj4 is adjacent to bj5 besides bj4 , then we consider two distinct scenarios. Case 7.1.1. When bj5 6= bj2 , besides two leaves b2 and b3 , we either do nothing to C to leave 1 b as a leaf, or add the edge {aj4 , b1 } to C while delete the edge {aj4 , bj5 } from C to leave bj5 as a leaf, or add the edge {aj4 , b1 } to C while delete the edge {aj2 , bj2 } from C to leave bj2 as 20 Chen et al. /v:May 30, 2017 a leaf. Among these three trees, the maximum total weight of the internal vertices is at least a3 + a2 + a1 + b1 + aj2 + bj2 + aj5 + bj5 − min{b1 , bj2 , bj5 } ≥ 2(b3 + b2 + min{b1 , bj2 , bj5 }); thus, C is settled. Case 7.1.2. When bj5 = bj2 , by the claw-free property and the definition of the vertex v we conclude that bj2 is adjacent to at least one of bj4 and b1 . If bj2 and bj4 are adjacent, then we add the edges {aj4 , b1 } and {bj2 , bj4 } to C while delete the edges {aj2 , bj2 } and {aj4 , bj4 } from C to obtain a path with leaves b2 and b3 ; if bj2 and b1 are adjacent, then we add the edge {bj2 , b1 } to C while delete the edge {aj2 , bj2 } from C to obtain a path with leaves b2 and b3 . Thus, C is settled. Case 7.2. In the other case v is a tail, say bj4 of the edge ej4 . Case 7.2.1. If b2 = bj4 , then besides the leaf b3 , we either do nothing to C to leave b1 , b2 as leaves, or add the edge {b1 , b2 } to C and delete the edge {aj2 , aj1 } to leave aj1 as a leaf, or add the edge {b1 , b2 } to C and delete the edge {aj2 , bj2 } to leave bj2 as a leaf. Among these three trees, the maximum total weight of the internal vertices is at least a3 + a1 + aj1 + bj2 + b1 + b2 − min{b1 + b2 , aj1 , bj2 } ≥ 2(b3 + min{b1 + b2 , aj1 , bj2 }); thus, C is settled. (In this paragraph, we deal with the case where b3 takes the role of b2 and prove our claim at the beginning of Case 7 “that the same argument applies to b3 6= bj3 and v is in the type-V component containing b3 ”. The complete assumption of Case 7.2.1 is thus b3 6= bj3 and v = b3 . Then, besides the leaf b2 , we either do nothing to C to leave b1 , b3 as leaves, or add the edge {b1 , b3 } to C and delete the edge {aj2 , aj1 } to leave aj1 as a leaf, or add the edge {b1 , b3 } to C and delete the edge {aj2 , aj3 } to leave aj3 as a leaf. Among these three trees, the maximum total weight of the internal vertices is at least a2 + a1 + aj1 + aj3 + b1 + b3 − min{b1 + b3 , aj1 , aj3 } ≥ 2(b2 + min{b1 + b3 , aj1 , aj3 }); thus, C is settled. In summary, here the vertex aj3 takes up the role of bj2 correspondingly.) Case 7.2.2. If b2 6= bj4 , then by the claw-free property and the definition of v we conclude that b1 is adjacent to aj4 too. Assume that aj4 is adjacent to bj5 besides bj4 . When bj5 6= bj2 , the argument in Case 7.1.1 can be applied to settle C; when bj5 = bj2 (the argument in Case 7.1.2 does not applied to settle C due to the deferent v), besides the leaves b2 and b3 , we either do nothing to C to leave b1 as a leaf, or add the edge {b1 , aj4 } to C and delete the edge {aj2 , bj2 } to leave bj2 as a leaf, or add the edge {b1 , aj4 } to C and delete the edge {aj2 , aj1 } to leave aj1 as a leaf. Among these three trees, the maximum total weight of the internal vertices is at least a3 + a2 + aj1 + aj2 + bj2 + a1 + b1 − min{b1 , aj1 , bj2 } ≥ 2(b3 + b2 + min{b1 , aj1 , bj2 }); thus, C is settled. This finishes the discussion on Case 7. In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We next consider the situation where b1 = bj1 , that is, there is no type-V component attached to bj1 . Case 8. If b1 = bj1 and v = aj2 , then dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1. Case 8.1. If there is a vertex u outside C that is adjacent to a1 , then we add the edge {a1 , u} to F , add the edge {aj2 , b1 } to C while delete the edge {aj2 , a1 } from C; this way, C is settled. Case 8.2. Note that if a1 and bj3 (6= b3 ) are adjacent, then a1 and aj3 are adjacent too. By the claw-free property, we conclude that a1 must be adjacent to a vertex u ∈ {aj3 , b3 , bj2 , b2 }. Case 8.2.1. When u = aj3 (or u = bj2 ), we add the edges {a1 , u} and {b1 , aj2 } to C while delete the edges {u, aj2 } and {aj2 , a1 } from C; this way, we obtain a path with two leaves b3 and b2 , and thus settle C. Case 8.2.2. Otherwise, aj3 and bj2 are adjacent. When u = b2 (6= bj2 ), we add the edge {a1 , b2 } to C while delete the edge {aj2 , a1 } from C, to obtain a path with two leaves b3 and b1 ; we may also add the edges {a1 , b2 } and {aj2 , b1 } to C while delete the edges {aj2 , a1 } and {aj2 , bj2 } from C to obtain a path with two leaves b3 and bj2 . Between these two paths, the maximum total weight of the internal vertices is at least a3 + aj2 + bj2 + a1 + b1 − min{b1 , bj2 } ≥ 2(b3 + min{b1 , bj2 }); thus, Approximating the maximum weight internal spanning tree 21 C is settled. When u = b3 (6= bj3 ), the same argument applies to settle C. Case 9. If b1 = bj1 and v = bj2 , we add the edge {b1 , bj2 } to C while delete the edge {aj2 , bj2 } from C; this way, we obtain a path with two leaves b3 and b2 , and thus C is settled. If b1 = bj1 and v = aj3 , we add the edge {b1 , aj3 } to C while delete the edge {aj3 , aj2 } from C; this way, we obtain a path with two leaves b3 and b2 , and thus C is settled. If b1 = bj1 and v = bj3 , then we distinguish whether bj3 = b3 or not. When bj3 6= b3 , then b1 and aj3 must be adjacent in G and thus C can be settled as in the last paragraph. When bj3 = b3 , if aj3 is adjacent to one of a1 and bj2 , then we can obtain a path with two leaves b3 and b2 to settle C; if a1 and bj2 are adjacent and bj2 6= b2 , then we can obtain a path with two leaves being b2 and the lightest among a3 , aj2 , a1 , and thus the total weight of the internal vertices of this path is at least a2 + a3 + aj2 + a1 + b1 − min{a3 , aj2 , a1 } ≥ 2(b2 + min{a3 , aj2 , a1 }), which settles C; otherwise bj2 = b2 , and then we add the edge {a1 , b2 } to C while delete the edge {a2 , a1 } from C to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ = {{a1 , b1 }, {a2 , b2 }, {a3 , b3 }} to settle C. Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish whether v is a head or a tail. Note that the case where b3 6= bj3 and v is in the type-V component containing b3 can be argued in exactly the same way. Case 10.1. If v is a head, say aj4 of the edge ej4 , assume that aj4 is adjacent to bj5 besides bj4 . Exactly the same argument as in Case 7.1 applies to settle C, since it does not matter whether b1 = bj1 or not. Case 10.2. If v is a tail, say bj4 of the edge ej4 . Note that bj4 6= bj2 , which has been dealt in Case 9. Case 10.2.1. If b2 = bj4 , then besides the leaf b3 , we either do nothing to C to leave b1 , b2 as leaves, or add the edge {b1 , b2 } to C and delete the edge {aj2 , a1 } to leave a1 as a leaf, or add the edge {b1 , b2 } to C and delete the edge {aj2 , bj2 } to leave bj2 as a leaf. Among these three trees, the maximum total weight of the internal vertices is at least a3 + a1 + aj2 + bj2 + b1 + b2 − min{b1 + b2 , a1 , bj2 } ≥ 2(b3 + min{b1 + b2 , a1 , bj2 }); thus, C is settled. Case 10.2.2. If b2 6= bj4 , then by the claw-free property and the definition of v we conclude that b1 is adjacent to aj4 too. Assume that aj4 is adjacent to bj5 besides bj4 . When bj5 6= bj2 , the argument in Case 7.1.1 can be applied to settle C; when bj5 = bj2 , if aj3 and bj2 are adjacent, then we add the edges {aj3 , bj2 } and {b1 , aj4 } to C and delete the edges {aj3 , aj2 } and {bj2 , aj4 } to achieve a path with leaves b3 and b2 ; if aj3 and a1 are adjacent, then we add the edges {aj3 , a1 }, {b1 , aj4 } and {b1 , bj4 } to C and delete the edges {aj3 , aj2 }, {a1 , b1 } and {aj4 , bj4 } to achieve a path with leaves b3 and b2 ; if bj2 and a1 are adjacent, then we add the edges {bj2 , a1 }, {b1 , aj4 } and {b1 , bj4 } to C and delete the edges {aj2 , bj2 }, {a1 , b1 } and {aj4 , bj4 } to achieve a path with leaves b3 and b2 . Thus, C is settled. All possible cases have be discussed in the above. The lemma is proven. ✷ Lemma 11 A type-III component in the subgraph H3 can be settled. Proof. Recall that a type-III component C in its original form contains only one edge ej1 = {aj1 , bj1 } of M ∗ , with another edge {aj1 , x} where x ∈ X (see Figure 3a); there could be a type-V component attached to bj1 , with its tail b1 replacing the role of bj1 . 22 Chen et al. /v:May 30, 2017 Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles C, since the total weight of the internal vertices in C is w(C ∩ M ∗ ). We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to be adjacent to some vertex inside C. Note that C is a path with b1 and x being its two ending vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this distance dC (b1 , v) ≥ 2 and where v locates. Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be a tail of an edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej2 = {aj2 , bj2 }, that is v = bj2 . Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex bj2 is adjacent to in the type-V component as aj3 , besides aj2 . We conclude from the claw-free property that there must be at least an edge among aj2 , aj3 , b1 , which contradicts the identity of the type-V component. Therefore, it is impossible to have dC (b1 , v) ≥ 4. Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj2 } and {a1 , b1 }. Denote this neighbor of a1 as u, which is impossible to be inside C by our construction algorithm. Thus, we add the edge {b1 , bj2 } to C while delete the edge {a1 , bj2 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a path and thus C is settled. Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 . Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus it is impossible. Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , that is {a1 , b1 }, then exactly the same argument in Case 2.2 settles C. Case 4. If b1 6= bj1 and v = aj1 , then we leave C as it is if w(b1 ) ≤ w(bj1 ), or we add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. In either case, the total weight of the internal vertices in the resulting path is at least aj1 + a1 + max{bj1 , b1 } ≥ 3 min{bj1 , b1 }, and thus it settles C. Case 5. If b1 6= bj1 and v = x, then we leave C as it is if w(b1 ) ≤ w(aj1 ), or we add the edge {x, b1 } to C while delete the edge {aj1 , x} from C. In either case, the total weight of the internal vertices in the resulting path is at least a1 + max{aj1 , b1 } ≥ 2 min{aj1 , b1 }, and thus it settles C. In summary, Cases 2-5 together prove that when b1 6= bj1 , the component C can be settled. We next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1 . Case 6. If b1 = bj1 , then v = x, and we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1, that is, there is a vertex u outside C that is adjacent to a1 . Thus we add the edge {a1 , u} to F , add the edge {x, b1 } to C while delete the edge {a1 , x} from C; this way, C is settled. All possible cases have be discussed in the above. The lemma is proven. ✷ Lemma 12 A type-IV component in the subgraph H3 can be settled. Proof. Denote the two edges of M ∗ in the type-IV component C in its original form as ej1 and ej2 . Note that both aj1 and aj2 are adjacent to a vertex x ∈ X (see Figure 3b), and there could be Approximating the maximum weight internal spanning tree 23 a type-V component attached to bj1 and bj2 , respectively, with the tails b1 , b2 replacing the roles of bj1 , bj2 . We assume w.l.o.g. that w(b1 ) ≥ w(b2 ). Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 ≥ 3b2 . We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to be adjacent to some vertex inside C. Note that C is a path with b1 and b2 being its two ending vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this distance dC (b1 , v) ≥ 2 and where v locates. Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be a tail of an edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej3 = {aj3 , bj3 }, that is v = bj3 . Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex bj3 is adjacent to in the type-V component as aj4 , besides aj3 . We conclude from the claw-free property that there must be at least an edge among aj3 , aj4 , b1 , which contradicts the identity of the type-V component. Therefore, it is impossible to have dC (b1 , v) ≥ 4. Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj3 } and {a1 , b1 }. Denote this neighbor of a1 as u. If u is inside C, then u = b2 by our construction algorithm and the claw-free property. We add the edges {a1 , b2 } and {bj3 , b1 } to C while delete the edge {bj3 , a1 } from C to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since C ∩ M ∗ has at least three edges. If u is outside C, then we add the edge {b1 , bj3 } to C while delete the edge {a1 , bj3 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a path and thus C is settled. Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 . Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus it is impossible. Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , that is {a1 , b1 }, then from the definition of v we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj1 } and {a1 , b1 }. The same argument as in Case 2.2, with j3 replaced by j1 , applies to settle C. Case 4. If b1 6= bj1 and v = aj1 , then we leave C as it is when w(b1 ) ≤ w(bj1 ), or we add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. In either case, the total weight of the internal vertices in the resulting path is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }), and thus it settles C. Case 5. If b1 6= bj1 and v = x, then by the definition of v and the claw-free property aj1 and b1 are adjacent. We thus settle C as in Case 4. We note that this is simpler than Case 5 in the proof of Lemma 10 because here aj1 and aj2 cannot be adjacent. Case 6. If b1 6= bj1 and v = aj2 , then we add the edge {aj2 , b1 } to C while delete the edge {aj2 , x} from C. This gives a path with leaves b2 and x, and thus it settles C. If b1 6= bj1 and v = bj2 , then we conclude that aj2 and b1 are adjacent when b2 6= bj2 , and thus we settle C as in the last paragraph; when b2 = bj2 , we add the edge {b2 , b1 } to C to obtain a cycle, 24 Chen et al. /v:May 30, 2017 followed by deleting the lightest edge of C ∩ M ∗ from C. Since C ∩ M ∗ has at least three edges, this settles C. Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish whether v is a head or a tail. Case 7.1. If v is a head, say aj3 of the edge ej3 , and assume that aj3 is adjacent to bj4 besides bj3 , then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or otherwise add the edge {aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. In either way, the total weight of the internal vertices of the resulting path is at least a2 +aj4 +a1 +max{bj4 , b1 } ≥ 2(b2 +min{bj4 , b1 }). Therefore, in either case C can be settled. Case 7.2. If v is a tail, say bj3 of the edge ej3 . If b2 = bj3 , then we add the edge {b1 , b2 } to C to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ from C. Since C ∩ M ∗ has at least three edges, this settles C. If b2 6= bj3 , then by the claw-free property and the definition of v we conclude that b1 is adjacent to aj3 too, and thus the argument in Case 7.1 applies to settle C. This finishes the discussion on Case 7. In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1 . Case 8. If b1 = bj1 and v = x, and we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1, that is there is a vertex u adjacent to a1 other than x and b1 . Case 8.1. If u is inside C, then u = b2 by our construction algorithm and the claw-free property. 2 If b 6= bj2 , then we add the edges {a1 , b2 } and {x, b1 } to C while delete the edge {x, a1 } from C to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since C ∩ M ∗ has at least three edges. If b2 = bj2 , then we add the edges {a1 , b2 } and {x, b1 } to C while delete the edges {x, a1 } and {x, a2 } from C to obtain a path with leaves x and a2 when w(a2 ) ≤ w(b1 ), or otherwise we add the edge {a1 , b2 } to C while delete the edge {x, a1 } from C to obtain a path with leaves x and b1 . In either way, the total weight of the internal vertices of the resulting path is at least a1 + max{a2 , b1 } ≥ 2 min{a2 , b1 }. Therefore, C can be settled. Case 8.2. If u is outside C, then we add the edge {b1 , x} to C while delete the edge {a1 , x} from C, and add the edge {a1 , u} to F ; this way, the component becomes a path and thus C is settled. Case 9. If b1 = bj1 and v = aj2 , then we add the edge {aj2 , b1 } to C while delete the edge {aj2 , x} from C to obtain a path with leaves x and b2 . Therefore, C can be settled. If b1 = bj1 and v = bj2 , when b2 6= bj2 then we conclude from the claw-free property and the definition of v that aj2 and b1 are also adjacent, and thus C can be settled as in the last paragraph; when b2 = bj2 , we can either do nothing to C to leave b1 and b2 as leaves, or add the edge {b2 , b1 } to C to obtain a cycle, followed by either deleting the edge {a2 , x} to obtain a path with leaves a2 and x, or deleting the edge {a1 , x} to obtain a path with leaves a1 and x. This way, the maximum total weight of the internal vertices among the three resulting paths is at least a1 + a2 + b1 + b2 − min{a1 , a2 , b1 + b2 } ≥ 2 min{a1 , a2 , b1 + b2 }. Thus, C can be settled. Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish whether v is a head or a tail. Case 10.1. If v is a head, say aj3 of the edge ej3 , and assume that aj3 is adjacent to bj4 besides bj3 , then we do nothing to C to leave b1 as a leaf if w(b1 ) ≤ w(bj4 ), or otherwise add the edge {aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. This way, the total weight of the Approximating the maximum weight internal spanning tree 25 internal vertices of the resulting path is at least a1 + a2 + aj4 + max{b1 , bj4 } ≥ 2(b2 + min{b1 , bj4 }). Thus, C can be settled. Case 10.2. If v is a tail, say bj3 of the edge ej3 . If b2 = bj3 , then we add the edge {b1 , b2 } to C to make it a cycle followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since there are at least three edges in C ∩ M ∗ . If b2 6= bj3 , then from the claw-free property and the definition of v, we conclude that aj3 must be adjacent to b1 too. Therefore, the same as in Case 10.1, C can be settled. All possible cases have be discussed in the above. The lemma is proven. ✷ Lemma 13 A type-VI component in the subgraph H3 can be settled. Proof. Recall that a type-VI component C is a cycle containing two or more edges of M ∗ , where the head of one edge of M ∗ is adjacent to the tail of another edge of M ∗ (see Figure 4b). Clearly, if there are three or more edges of M ∗ in C, we simply delete the lightest one to settle C. In the sequel we deal with the case where C is a length-4 cycle. Denote the two edges of C ∩M ∗ as {a1 , b1 } and {a2 , b2 }, and assume that w(b1 ) ≥ w(b2 ). If a1 (a2 , respectively) is adjacent to a vertex v outside C, then we add the edge {a1 , v} ({a2 , v}, respectively) to F and delete the edge {a1 , b2 } ({a2 , b2 }, respectively) from C; this way, the total weight of the internal vertices is at least a1 + a2 + b1 ≥ 3b2 , and thus C is settled. If neither a1 nor a2 is adjacent to any vertex v outside C, then we conclude from the construction algorithm that dG (a1 ) = dG (a2 ) = 2 since a1 and a2 are not adjacent to each other. It follows from the claw-free property that neither b1 nor b2 can be adjacent to any vertex u outside C. This implies |V | = 4, a contradiction to our assumption that |V | ≥ 5. The lemma is proved. ✷ Theorem 2 The MwIST problem on claw-free graphs admits a 12/7-approximation algorithm. Proof. The above Lemmas 9–13 state that every component of the subgraph H3 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ] can be settled, without affecting any other components. Also, such a settling process for a component takes only linear time, by scanning once the edges in the subgraph induced on the set of vertices of the component. By settling, essentially the component is converted into a tree, possibly with one edge of F specified for connecting a leaf of the tree outwards. In the next step of the algorithm, it iteratively processes the heaviest component C, i.e. with the largest w(C ∩ M ∗ ). If the component C has been associated with an edge e of F , and using the edge e to connect a leaf of the resulting tree for C outwards does not create a cycle, then the algorithm does this and C is processed. This guarantees the total weight of the internal vertices in V (C) is at least 2w(C ∩ M ∗ )/3. If using the edge e to connect a leaf of the resulting tree for C outwards would create a cycle, the algorithm processes C by replacing C with another tree that guarantees the total weight of the internal vertices in V (C) at least 21 w(C ∩ M ∗ ). Notice that the latter case happens only because of (at least) one edge of F in an earlier iteration where a distinct component C ′ was processed, which connects a vertex of C ′ into a vertex of C. Therefore, every such C is associated with a distinct component C ′ processed by the algorithm in an earlier iteration, and thus w(C ′ ) ≥ w(C). On the other hand, every such component C ′ is associated to one C only, due to its edge in F connecting a leaf outwards into a vertex of C. It follows that for this pair of components C and C ′ , the total weight of the internal vertices in V (C) ∪ V (C ′ ) is at least w(C)/2 + 2w(C ′ )/3 ≥ 7(w(C) + w(C ′ ))/12. 26 Chen et al. /v:May 30, 2017 After all components of H3 are processed, we obtain a forest for which the total weight of the internal vertices therein is at least 7w(M ∗ )/12. The algorithm lastly uses any other available edges of E to interconnect the forest into a final tree, denoted as T ; clearly w(T ) ≥ 7w(M ∗ )/12. The time for the interconnecting purpose is at most O(m log n). Therefore, by Corollary 1 we have a 7/12-approximation algorithm for the MwIST problem on claw-free graphs. ✷ 4 Concluding remarks We have presented an improved approximation algorithm for the vertex weighted MIST problem, denoted MwIST, which achieves the worst-case performance ratio 1/2, beating the previous best ratio of 1/(3 + ǫ), designed by Knauer and Spoerhase in 2009 [7]. The key ingredient in the design and analysis of our algorithm is a novel relationship between MwIST and the maximum weight matching, which we uncovered and it is inspired by the work [12, 11, 2]. A step further, for the problem restricted to claw-free graphs, we presented a 7/12-approximation algorithm, improving the previous best ratio of 1/2 designed by Salamon in 2009 for claw-free graphs without leaves. It would be interesting to see whether this newly uncovered relationship, possibly combined with other new ideas, can be explored further to design better approximation algorithms for MwIST, or special cases of MwIST including claw-free graphs and cubic graphs. Acknowledgement The authors are grateful to two reviewers for their insightful comments on the COCOON 2017 submission and for their suggested changes that improve the presentation greatly. ZZC was supported in part by the Grant-in-Aid for Scientific Research of the Ministry of Education, Culture, Sports, Science and Technology of Japan, under Grant No. 24500023. GL was supported by the NSERC Canada and the NSFC Grant No. 61672323; most of his work was done while visiting ZZC at the Tokyo Denki University at Hatoyama. LW was supported by the Hong Kong GRF Grants CityU 114012 and CityU 123013. YC was supported in part by the NSERC Canada, the NSFC Grants No. 11401149, 11571252 and 11571087, and the China Scholarship Council Grant No. 201508330054. References [1] D. Binkele-Raible, H. Fernau, S. Gaspers, and M. Liedloff. Exact and parameterized algorithms for max internal spanning tree. Algorithmica, 65:95–128, 2013. [2] Z.-Z. Chen, Y. Harada, and L. Wang. An approximation algorithm for maximum internal spanning tree. CoRR, abs/1608.00196, 2016. [3] N. Coben, F. V. Fomin, G. Gutin, E. J. Kim, S. Saurabh, and A. Yeo. Algorithm for finding kvertex out-trees and its application to k-internal out-branching problem. Journal of Computer and Systems Science, 76:650–662, 2010. [4] F. V. Fomin, S. Gaspers, S. Saurabh, and S. Thomasse. A linear vertex kernel for maximum internal spanning tree. Journal of Computer and Systems Science, 79:1–6, 2013. Approximating the maximum weight internal spanning tree 27 [5] F. V. Fomin, D. Lokshtanov, F. Grandoni, and S. Saurabh. Sharp separation and applications to exact and parameterized algorithms. Algorithmica, 63:692–706, 2012. [6] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-completeness. W. H. Freeman and Company, San Francisco, 1979. [7] M. Knauer and J. Spoerhase. Better approximation algorithms for the maximum internal spanning tree problem. In Proceedings of WADS 2009, LNCS 5664, pages 489–470, 2009. [8] W. Li, J. Chen, and J. Wang. Deeper local search for better approximation on maximum internal spanning tree. In Proceedings of ESA 2014, LNCS 8737, pages 642–653, 2014. [9] W. Li, J. Wang, J. Chen, and Y. Cao. A 2k-vertex kernel for maximum internal spanning tree. In Proceedings of WADS 2015, LNCS 9214, pages 495–505, 2015. [10] X. Li, H. Jiang, and H. Feng. Polynomial time for finding a spanning tree with maximum number of internal vertices on interval graphs. In Proceedings of FAW 2016, LNCS 9711, pages 92–101, 2016. [11] X. Li and D. Zhu. A 4/3-approximation algorithm for the maximum internal spanning tree problem. CoRR, abs/1409.3700, 2014. [12] X. Li and D. Zhu. Approximating the maximum internal spanning tree problem via a maximum path-cycle cover. In Proceedings of ISAAC 2014, LNCS 8889, pages 467–478, 2014. [13] E. Prieto. Systematic kernelization in FPT algorithm design. PhD thesis, The University of Newcastle, Australia, 2005. [14] E. Prieto and C. Sliper. Either/or: Using vertex cover structure in designing fpt-algorithms – the case of k-internal spanning tree. In Proceedings of WADS 2003, LNCS 2748, pages 474–483, 2003. [15] E. Prieto and C. Sloper. Reducing to independent set structure – the case of k-internal spanning tree. Nordic Journal of Computing, 12:308–318, 2005. [16] G. Salamon. Approximating the maximum internal spanning tree problem. Theoretical Computer Science, 410:5273–5284, 2009. [17] G. Salamon. Degree-Based Spanning Tree Optimization. PhD thesis, Budapest University of Technology and Economics, Hungary, 2009. [18] G. Salamon and G. Wiener. On finding spanning trees with few leaves. Information Processing Letters, 105:164–169, 2008.
8
arXiv:1610.03376v1 [math.GR] 9 Oct 2016 CUBULATING RANDOM GROUPS IN THE SQUARE MODEL TOMASZ ODRZYGÓŹDŹ 3 Abstract. Our main result is that for densities < 10 a random group in the square model has the Haagerup property and is residually finite. Moreover, we generalize the Isoperimetric Inequality, to some class of non-planar diagrams and, using this, we introduce a system of modified hypergraphs providing the structure of a space with walls on the Cayley complex of a random group. Then we show that the natural action of a random group on this space with walls is proper, which gives the proper action of a random group on a CAT(0) cube complex. 1. Introduction In [Odr16] we introduced the square model for random groups, where we draw at random relations of length four. The motivation was that the Cayley complex of such a group has a natural structure of a square complex, which should be easier to analyze than the polygonal Cayley complexes for groups in the Gromov model. Definition 1.1. [Square model, [Odr16, Definition 1.3]] Consider the set An = {a1 , . . . , an }, which we will refer to as an alphabet. Let Wn be the set of all cyclically reduced words of length 4 over An . Note that |Wn | = (2n − 1)4 up to a multiplicative constant. By Fn we will denote the free group generated by the elements of An . By relators we will understand words over generators and by relations the corresponding equalities holding in the group. For d ∈ (0, 1) let us choose randomly, with uniform distribution, a subset Rn ⊂ Wn such that |Rn | = ⌊(2n − 1)4d ⌋. Quotienting Fn by the normal closure of the set Rn , we obtain a random group in the square model at density d. We say that property P occurs in the square model at density d with overwhelming probability (w.o.p.) if the probability that a random group has property P converges to 1 as n → ∞. In [Odr16] we showed that a random group in the square model at density d w.o.p.: • is trivial for d > 21 , • is infinite, hyperbolic, torsion-free of geometric dimension 2 for d < 12 , • is free for d < 41 • does not have Property (T) for d < 31 In this paper we prove 3 a random group in the square model w.o.p. Theorem 1.2. For densities d < 10 acts properly and cocompactly on a CAT(0) cube complex. 3 Corollary 1.3. For densities d < 10 a random groups in the square model w.o.p. has the Haagerup property and is residually finite. 1 2 TOMASZ ODRZYGÓŹDŹ Proof. The residual finiteness results from [Ago13, Corollary 1.2] and the Haagerup Property by a folklore remark (see for example [CMV04]).  To obtain Theorem 1.2 we needed to generalize the isoperimetric inequality ([Oll07, Theorem 2]) to a class of non-planar diagrams (see Theorem 2.5). This generalization has already proved to be useful in other work on random groups (see for example [MP15]). Theorem 2.5 is stated in the regime of the square model, but the reasoning can be easily repeated in the Gromov model (see [Odr14] for some version of it). The main idea of the proof of Theorem 1.2 is based on introducing modified hypergraps, which provide a structure of a space with walls on the Cayley complex of a random group, that has desired metric properties. This modified walls allowed us to construct a proper action of a random group on a space with walls, which was impossible to obtain using standard hypergraphs (introduced in [OW11] for the Gromov model and in [Odr16] for the square model). Organization. The paper is organized as follows: first we prove a generalization of the isoperimetric inequality, then using this we introduce “corrected” hypergraphs that provide the structure of a space with walls on the Cayley complex of a random group. Finally we show that a random group acts properly on this space with walls. The idea of correcting hypergraphs was inspired by [MP15]. Acknowledgements. The author would like to thank Piotr Przytycki for many discussions and Piotr Nowak for general advice on writing. 2. Non-planar isoperimetric inequality The goal of this section is to generalize the isoperimetric inequality to some class of non-planar complexes, but having “disc-like” structure, meaning that they are unions of a large disc component and some bounded non-planar pieces. Firstly, let us recall the isoperimetric inequality: Theorem 2.1 ([Oll07, Theorem 2]). For any ε > 0, in the Gromov model at density d < 21 , with overwhelming probability all reduced van Kampen diagrams associated to the group presentation satisfy (2.1) |∂D| ≥ l(1 − 2d − ε)|D|. Here ∂D denotes the set of boundary edges of the diagram D and |D| denotes the number of 2-cells of D. One of the corollaries of Theorem 2.1 is that in the Gromov density model at densities < 21 a random group is w.o.p. hyperbolic (see [Oll04, Theorem 1] and [Gro93]). In [Odr16, Theorem 3.15] the author proved that Equation (2.1) is satisfied w.o.p. as well for the square model of random groups. Let us now introduce some definitions. Definition 2.2. Suppose Y is a finite 2–complex, not necessarily a disc diagram. ˜ |, is • The generalized boundary length of Y , denoted |∂Y X ˜ | := (2 − deg(e)), |∂Y e∈Y (1) CUBULATING RANDOM GROUPS IN THE SQUARE MODEL • and the cancellation in Y is Cancel(Y ) := X e∈Y 3 (deg(e) − 1), (1) where deg(e) is the number of times that e appears as the image of an edge of the attaching map of a 2–cell of Y . ˜ | = |∂Y |. Moreover, Cancel(Y ) = Note, that for every planar diagram Y we have |∂Y | − |∂Y |). 1 2 (4|Y Definition 2.3. We say that a finite 2-complex Y is fulfilled by a set of relators e R if there is a combinatorial map from Y to the presentation complex X/G that is locally injective around edges (but not necessarily around vertices). e is fulfilled by R. In particular, any subcomplex of the Cayley complex X Definition 2.4 (Diagram with K-small legs). Let G = hS|Ri be a finite group presentation where R consists of cyclically reduced words of length 4 over S. For K > 0 let Y be a 2–complex that is a union of a reduced Van Kampen diagram Z and a family Zi of connected complexes, called legs of Y , such that |Zi | ≤ K, for each i the leg Zi contains an external vertex of Z and that every edge of Y belongs to maximally two legs. We call such Y a diagram with K-small legs (with respect to the presentation hS|Ri). The disc diagram Z is called the disc basis of Y . Until the end of this section G will denote the random group in the square model e — the Cayley complex of G with respect to this with the presentation hS|Ri and X presentation. Theorem 2.5 (Generalized Isoperimetric Inequality). In the square model at density d ≤ 21 the following statement holds w.o.p.: for each K and ε > 0 there is no diagram Y with K-small legs fullfilable by R and satisfying: (2.2) Cancel(Y ) > 4(d + ε)|Y |, or equivalently (2.3) ˜ | > 4(1 − 2d − ε)|Y |. |∂Y Our strategy to prove Theorem 2.5 is to first prove a “local” version of it, that is with the additional limit on the number of 2-cells in a diagram, and then to show that this locality assmuption can be ommited. Analogous results for the Gromov model was obtained by the author in [Odr14] and used in [MP15] to construct balanced walls. We thank Piotr Przytycki for suggesting the statement of Theorem 2.5 involving the notion of cancellation. 2.1. Local version of the generalized isoperimetric inequality. Lemma 2.6. In the square model at density d ≤ 21 , for each K, ε > 0 w.o.p. there is no 2-complex Y with |Y | ≤ K fulfilled by R and satisfying (2.4) Cancel(Y ) > 4(d + ε)|Y |. Our proof of Lemma 2.6 will be only a slight modification of Olliver’s proof of Theorem 2.1. We postpone it to to introduce some necessary tools first. 4 TOMASZ ODRZYGÓŹDŹ Definition 2.7. Let Y be a 2-complex. Suppose that the following additional information is given: (1) Every face of Y is labeled by a number i ∈ {1, 2, . . . , n}. The labels can repeat and for each number 1 ≤ i ≤ n there is at least one face labeled with i. We call n the number of distinct relators. (2) For each face there is a distinguished edge, called the starting edge and an orientation. Such Y will be referred to as an abstract 2-complex. We say that Y is fulfilled by a sequence of relators (r1 , r2 , . . . , rn ) if it is fulfilled by {r1 , r2 , . . . , rn } as 2complex, in such a way that each face f labelled by i ∈ {1, 2, . . . , n} (according to (1) in Definition 2.7) is sent under the combinatorial map to the face of X/G corresponding to ri , so that the image in X (1) /G of the attaching path of f , starting at the oriented starting edge (according to (2) in Definition 2.7) reads off the word ri . If f is labeled by i we say that f bears the relator i. Recall that S denotes the cardinality of the generating set of a random group in the square model. Let m denote the cardinality of the set S. Proposition 2.8. Let R be a random set of relators at density d and at length 4 on m generators. Let Y be an abstract 2-complex. Then either Cancel(Y ) < 4(d + 2ε)|Y | or the probability that there exists a tuple of relators in R fulfilling Y is less than (2m − 1)−4ε . Before we prove this proposition we introduce some additional notation. Let n be the number of distinct relators in an abstract 2-complex Y . For 1 ≤ i ≤ n let mi be the number of times relator i appears in Y . Up to reordering the relators we can suppose that m1 ≥ m2 ≥ · · · ≥ mn . For 1 ≤ i1 , i2 ≤ n and 1 ≤ k1 , k2 ≤ l we say that (i1 , k1 ) > (i2 , k2 ) if i1 > i2 or i1 = i2 but k1 > k2 (lexicographic order). Suppose that for some s ≥ 2 an edge e of Y is adjacent to faces f1 , f2 , . . . , fs labeled by i1 , i2 , . . . , is accordingly. Suppose moreover that for 1 ≤ j ≤ s the edge e is the kj –th edge of the face fj . Since Y → X/G is locally injective around e, the pairs (ij , kj ) are distinct. Choose j = jmin for which (ij , kj ) is minimal. We say that edge e belongs to faces fj for j ∈ {1, 2, . . . s} \ {jmin }. Let δ(f ) be the number of edges belonging to a face f . For 1 ≤ i ≤ n let κi = max{δ(f ) : f is a face labeled by relator i} Note that (2.5) Cancel(Y ) = X f ∈Y (2) δ(f ) ≤ X mi κ i 1≤i≤n Definition 2.9. Let Y be an abstract 2-complex with n distinct relators. For 1 ≤ k ≤ n let R′ = (w1 , w2 , . . . , wk ) be a sequence of relators. We say that Y is partially fulfilled by R′ if the abstract 2-complex Y ′ ⊂ Y that is the closure of the faces of Y labeled by the numbers i ∈ {1, 2, ..., k} is fulfilled by R′ . Lemma 2.10. For 1 ≤ i ≤ n let pi be the probability that i randomly chosen words w1 , w2 , . . . , wi partially fulfill Y and let p0 = 1. Then pi ≤ (2m − 1)−κi . (2.6) pi−1 CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 5 Proof. Suppose that first i − 1 words w1 , . . . , wi−1 partially fulfilling Y are given. We will successively analyze what is the choice for the consecutive letters of the word wi , so that Y is fulfilled. Let k ≤ 4 and suppose that the first k − 1 letters of wi are chosen. Let f be the face realizing δ(f ) = κi and let e be the k-th edge of the face f . If e belongs to f this means that there is another face f ′ meeting e which bears relator i′ < i or bears i too, but e appears in f ′ as a k ′ < k-th edge. In both cases the letter on the edge e is imposed by some letter already chosen so drawing it at 1 up to some small error. In fact, this estimate random has probability ≤ (2m−1) would be valid only if the words were only required to be reduced; since they are cyclically reduced a negligible error appears, which we ignore. Combining all these observations we get that the probability to choose at random  the correct word wi is at most pi−1 (2m − 1)−κi . Now we can provide the proof of Proposition 2.8 Proof of Proposition 2.8. For 1 ≤ i ≤ n let Pi be the probability that there exists an i-tuple of words partially fulfilling Y in the random set of relators R. We trivially have: Pi ≤ |R|i pi = (2m − 1)4id pi (2.7) Combining equations (2.5) and (2.6) we get n X Cancel(Y ) ≤ mi (log2m−1 pi−1 − log2m−1 pi ) = i=1 = n−1 X (mi+1 − mi ) log2m−1 pi − mn log2m−1 pn + m1 log2m−1 p0 . i=1 Now p0 = 1 so log2m−1 p0 = 0 and we have Cancel(Y ) ≤ n−1 X (mi+1 − mi ) log2m−1 pi − mn log2m−1 pn . i=1 From (2.7) and the fact that mi+1 − mi ≤ 0 we obtain Cancel(Y ) ≤ n−1 X (mi+1 − mi )(log2m−1 Pi − 4id) − mn log2m−1 (Pn − 4nd) i=1 Observe that Pn−1 i=1 (mi − mi+1 )i + mn n = Cancel(Y ) ≤ 4|Y |d + n−1 X Pn i=1 mi = |Y |. Hence (mi+1 − mi ) log2m−1 Pi − mn log2m−1 Pn i=1 Setting P = mini Pi and using the fact that mi+1 − mi ≤ 0 we get Cancel(Y ) ≤ 4|Y |d + (log2m−1 P ) n−1 X (mi+1 − mi ) − mn log2m−1 P = i=1 = 4|Y |d − m1 log2m−1 P ≤ |Y |(4d − log2m−1 P ), 6 TOMASZ ODRZYGÓŹDŹ since m1 ≤ |Y |. It is clear that a complex is fulfillable if it is partially fulfillable for any i ≤ n and so: Probability(Y is fullfillable by relators of R) ≤ P ≤ (2m − 1) 4|Y |d−Cancel(Y ) |Y | which was to be proven. ,  Proof of Lemma 2.6. Denote by C(K, m) the number of abstract square complexes with at most K 2-cells. Observe that there are finitely many square complexes with at most K faces. There are also finitely many ways to decide which faces would bear the same relator, and also finitely many ways to choose the starting point of each relator. Therefore, the values {C(K, m)}m∈N with fixed K have a uniform bound M . We know by Proposition 2.8 that for any abstract 2-complex with at most K faces violating the inequality Cancel(Y ) < 4(d + ε)|Y | the probability that it is fulfilled by a random set of relators is ≤ (2m − 1)−4ε . So the probability that there exists a fulfilled 2-complex with at most K faces, violating the inequality is ≤ C(K, m)(2m − 1)−4εl ≤ M (2m − 1)−4εl , so it converges to 0 as m → ∞.  2.2. From the local version to the global. We start this subsection by reformulating [Oll07, Lemma 11] by replacing the length of relator l by 4. Lemma 2.11. Let G = hS|Ri be a finite presentation in which all elements of R have length 4. Suppose that for some constant C ′ > 0 every van Kampen diagram E of this presentation satisfies: |∂E| ≥ 4C ′ |E|. Then every van Kampen diagram D can be partitioned into two diagrams D′ , D′′ by with endpoints on the boundary cutting it along a path of length at most 4 + 8 log(|D|) C′ of D such that each of D′ and D′′ contains at least one quarter of the boundary of D. We will state now prove two propositions „approximating” Theorem 2.5. Proposition 2.12. Let G = hS|Ri be a finite presentation such that all elements of R are reduced words of length 4. Suppose that for some constant C ′ all van Kampen diagrams D with respect to this presentation satisfy |∂D| ≥ C ′ 4|D|. 7A Choose any K, ε > 0. Take A large enough to satisfy εA > 2(1 + C2′ log( 6C ′ ) + 2K). Suppose that for some C > 0 all diagrams with K–small legs Y having the disc basis of boundary at most 4A satisfy: ˜ | ≥ C4|Y |. |∂Y Then all diagrams with K–small legs Y having the disc basis of boundary at most 14 3 A satisfy: ˜ | ≥ (C − ε)4|Y | |∂Y CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 7 Proof. Let Y be the diagram with K–small legs such that its disc basis Z has the boundary length between 4A and 14 3 A. By Lemma 2.11 we can perform a partition of Z into two reduced disc diagrams Z ′ and Z ′′ such that: |∂Z ′ |, |∂Z ′′ | ≥ 41 |∂Z| and |∂Z ′ ∩ ∂Z ′′ | ≤ 4 + C8′ log(|Z|). The number of 1–cells that belong both to Z and one of the legs Zi is bounded by 4K, since there are no more than 4K 1–cells in Zi . We define Y ′ to be the union of Z ′ and all legs of Y that are adjacent to Z ′ , and Y ′′ to be the union of Z ′′ and all legs of Y adjacent to it. Hence we can perform a partition of Y into two diagrams Y ′ and Y ′′ with K–small legs such that ˜ | ≥ |∂Y ˜ ′ | + |∂Y ˜ ′′ | − 2(4 + 8′ log(|Z|) + 8K). |∂Y C Note that |∂Z ′ |, |∂Z ′′ | < 4A so by our assumption we know ˜ ′ | ≥ C4|Y ′ | |∂Y ˜ ′′ | ≥ C4|Y ′′ |. |∂Y Moreover by the assumption on van Kampen diagrams we obtain that 7A 1 C ′ log( 6C ′ ). Hence 1 C′ log(|Z|) < ˜ | ≥ |∂Y ˜ ′ | + |∂Y ˜ ′′ | − 2(4 + 8 log(|Z|) + 8K) |∂Y C′ 7A 8 ≥ C4(|Y ′ | + |Y ′′ |) − 2(4 + ′ log( ′ ) + 8K). C 6C 7A We have chosen A large enough so that 2(1 + 2 C1′ log( 6C ′ ) + 2K) < εA so we can continue estimation ˜ | ≥ Cl|Y | − 4εA ≥ 4(C − ε)|Y | |∂Y since 4|Y | ≥ |∂Z| ≥ 4A.  The last approximation to Theorem 2.5 is the following Proposition 2.13. Let G = hS|Ri be a finite presentation such that all elements of R are reduced words of length 4. Suppose that for some constant C ′ all van Kampen diagrams D with respect to the presentation satisfy (2.8) |∂D| ≥ C ′ l|D|. 7A Choose any K, ε > 0. Take A large enough to satisfy εA > 2(1+2 C1′ log( 6C ′ )+2K). Suppose that for some C > 0 all diagrams Y with K–small legs and the disc basis with boundary length at most 4A satisfy: (2.9) ˜ | ≥ 4C|Y |. |∂Y Then all diagrams with K–small legs Y satisfy: ˜ | ≥ 4(C − ε)|Y | |∂Y Proof. The assumptions of this proposition and Proposition 2.12 are the same. Hence by the statement of Proposition 2.12 we can conclude that the assumptions 1 of Proposition 2.12 are fulfilled with the new parameters: A1 = 67 A, ε1 = ε( 67 ) 2 and C1 = C − ε instead of A, ε, C and with the same C ′ (these new parameters 1 indeed satisfy ε1 A1 > 2(1 + C2′ log( 7A 6C ′ ) + 2K)). By induction every diagram with 8 TOMASZ ODRZYGÓŹDŹ K − small legs such that its disc basis has boundary of length at most 4A satisfies ˜ |≥ |∂Y C−ε k−1 X i=0 and we conclude by the inequality P∞ i=0 6 7 6 7  2i  2i !  7 k 6 4|Y | < 14.  Proof of Theorem 2.5. First, by Theorem 2.1 we know that all Van Kampen diagrams satisfy Equation (2.8) for C = (1 − 2d − ε′ ), for arbitrary small ε′ . By Lemma 2.6 we know that for any K, ε all diagrams with K-small legs satisfy Equation (2.9). Hence the assumptions of the Proposition 2.13 are satisfied, which gives the statement.  3. Colored hypergraphs In this section we we will introduce colored hypergraphs, which can be effectively used in investigating random groups in the square model. We start with e be the Cayley complex of a random group in the square Proposition 3.1. Let X 1 model at density d < 3 . Then w.o.p.: e having three common edges. (1) There is no pair of 2-cells in X e such that |∂D ∩ ∂E| = 2, then there is no 2-cell (2) If D and E are 2-cells in X e F in X such that |(∂D ∪ ∂E) ∩ ∂F | > 1. e having three common edges forms a van Kampen Proof. (1) A pair of 2-cells in X diagram D satisfying |∂D| = 2 and |D| = 2. Therefore |∂D| ≤ 43 |D|, so D violates Theorem 2.5, which implies that w.o.p. there is no such a pair of 2-cells. (2) Suppose, on the contrary, that there exist such 2-cells D, E and F . Consider a diagram D consisting of 2-cells D and E. Adding a new 2-cell to D by gluing it along two edges does not change the generalized boundary length of D. Hence ˜ | = 4, |Y | = 3. the diagram Y that is a union of D and the 2-cell F satisfies: |∂Y ˜ Therefore, Y violates Theorem 2.5, which states that |∂Y | > 4(1 − 2d)|Y |, so w.o.p. there is no such a triple of 2-cells.  e be the Cayley complex of a random group in the square Definition 3.2. Let X 1 e have two common edges, we say they are model at density ≤ 3 . If two 2-cells in X strongly adjacent. If a 2-cell D is strongly adjacent to some other 2-cell we say that D is a distinguished 2-cell. The common edges of two strongly adjacent 2-cells we call distinguished edges. A 2-cell which is not a distinguished 2-cell we call a regular 2-cell. Proposition 3.3. Let D and E be strongly adjacent 2-cells. Then there is no e element of a random group G sending D to E under the natural action of G on X. e In other words, D and E are in different orbits of the action of G on X.  (2n−1)4 −6(2n)2 (2n−1)4d  (2n−1)4 (2n−1)4d   , CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 9 Proof. Suppose that there exists g ∈ G sending D to E. By Lemma 3.1 we know that a 2-cell can be strongly adjacent to at most one other 2-cell, co g preserves the pair {D, E}. The diagram Y consisting of 2-cells D and E has exactly one internal vertex (that is a vertex isolated from the boundary). If the diagram {D, E} is preserved by g the internal vertex must be also preserved, which contradicts the fact that the action of G on its Cayley graph is free.  Definition 3.4 (Procedure of painting the Cayley complex). By Proposition 3.1 we know that distinguished 2-cells form a set S of disjoint unordered pairs of 2-cells. By Proposition 3.3 we know that none of these pairs lies in one orbit of G-action e We will now perform a procedure of painting distinguished 2-cells in two on X. colors: red and blue. In the first step we consider one of the pairs {D, E} ∈ S and choose arbitrarily one 2-cell from this pair. Without loss of generality we can suppose that D is chosen. We say that D is a red 2-cell and E is a blue cell. Moreover we say that each element in the orbit of D is red and each element in the orbit of E is blue. In the next step we choose another pair of strongly adjacent 2-cells {D1 , D2 }, that is not in the orbit of the pair {D, E}. Then we paint all elements in the orbit of D1 in red, and all elements in the orbit of E1 in blue. We repeat this step until all distinguished 2-cells are painted. The Cayley complex is cofinite, so there are finitely many orbits of 2-cells and therefore this painting procedure must end after a finite number of steps. The Cayley complex with painted distinguished 2-cells we call painted Cayley complex. From now we will always assume that the Cayley complex of a random group is e painted, and we will denote it by X. We now recall the definition of a hypergraph from [OW11, Definition 2.1]. Definition 3.5 (standard hypergraph). Let X be a connected square complex. We define a graph Γ as follows: The set of vertices of Γ is the set of 1-cells of X. There is an edge in Γ between two vertices if there is some 2-cell R of X such that these vertices correspond to opposite 1-cells in the boundary of R (if there are several such 2-cells we put as many edges in Γ). The 2-cell R is the 2-cell of X containing the edge. There is a natural map ϕ from Γ to X, which sends each vertex of Γ to the midpoint of the corresponding 1-cell of X and each edge of Γ to a segment joining two opposite points in the 2-cell R. Note that the images of two edges contained in the same 2-cell R always intersect, so that in general ϕ is not an embedding. A standard hypergraph in X is a connected component of Γ. The 1-cells of X through which a hypergraph passes are dual to it. The hypergraph Λ embeds if ϕ is an embedding from Λ to X, that is, if no two distinct edges of Λ are mapped to the same 2-cell of X. We call the subdiagram of X consisting of all open faces containing edges of the hypergraph Λ the carrier of Λ and denote it by Car(Λ). The hypergraph segment in X is a finite path in a hypergraph immersed into X. The carrier of a segment Λ′ denoted Car(Λ′ ) is the diagram consisting of all open 2-cells containing edges of the segment Λ′ . By [Odr16, Lemma 5.16] we know that standard hypergraphs are embedded trees. Moreover, [OW11, Lemma 2.3] states that for each standard hypergraph Γ e − Γ has exactly two connected components. However the system of the space X 10 TOMASZ ODRZYGÓŹDŹ standard hypergraphs is not sufficient to construct a proper action of a random group on a CAT(0) cube complex, which we need to prove Theorem 1.3. Our strategy of constructing such an action is based on showing that the wall space metric on the Cayley complex is equivalent to the edge path metric. This means in particular that for every number N if we have two enough distant points in the Cayley complex they are separated by at least N walls, which are hypergraphs in our case. In Figure 1 we present an example of a geodesic edge-path γ of an arbitary length such that no standard hypergraph separates its ends x and y. Situation presented in Figure 1 cannot be excluded for densities ≥ 14 in the square model, therefore we need a better system of walls, based on more systems of hypergraphs. x γ ... y Figure 1. Arbitrary long geodesic edge-path joining points x and y that are not separated by a hypergraph. We now introduce a new type of hypergraph - red hypegraph, which is modified on red 2-cells. Definition 3.6 (red and blue hypergraph). Let X be a connected square complex e We define a graph Γ as that is a subcomplex of the painted Cayley complex X. follows: The set of vertices of Γ is the set of 1-cells of X. We put an edge in Γ between two vertices if one the following holds: (1) there is some regular or blue 2-cell R of X such that these vertices correspond to opposite 1-cells in the boundary of R (if there are several such 2-cells we put as many edges in Γ (2) there is some red 2-cell R of X such that one of this vertices corresponds to distinguished edge e of R and the second corresponds to non distinguished edge of R which is not opposite to e. The 2-cell R is the 2-cell of X containing the edge. There is a natural map ϕ from Γ to X, which sends each vertex of Γ to the midpoint of the corresponding 1-cell of X and each edge of Γ to a segment joining two points in the boundary 2-cell R. A red hypergraph in X is a connected component of Γ. The 1-cells of X through which a hypergraph passes are dual to it. The red hypergraph Λ embeds if ϕ is an embedding from Λ to X. We call the subdiagram of X consisting of all open 2-cells containing edges of the red hypergraph Λ the carrier of Λ and denote it by Car(Λ). The hypergraph segment in X is a finite path in a hypergraph immersed into X. The carrier of a segment Λ′ denoted Car(Λ′ ) is the diagram consisting of all open 2-cells containing edges of the segment Λ′ . CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 11 If in the above definition we replace every occurrence of the word “red” by the word “blue” we obtain the definition of the blue hypergraph. The comparison of the hypergraphs introduced above is presented in Figure 2. Λst blue 2-cell Λst blue 2-cell Λred red 2-cell Λblue red 2-cell a) b) Figure 2. a) The comparison of a red hypergraph Λred and a standard hypergraph Λst , b) The comparison of a blue hypergraph Λblue and a standard hypergraph Λst . 3.1. Hypergraphs are embedded trees. Now we are going to prove Theorem 3.7. In the square model at density d < e are embedded trees. hypergraphs in X 1 3 w.o.p. all red and blue To investigate standard and red hypergraphs we need a notion of a collared diagram. Our definition is a slight modification of the one introduced by Ollivier and Wise in [OW11, Definition 3.2]. Definition 3.8. (collared diagram) Let D be a Van Kampen with the following properties: (1) there is an external 2-cell C called a corner of D e of a hypergraph (standard, red or blue) of (2) there is a segment λ → D → X length at least 2 (3) the first and the last edge of λ lie in C, and no other edge lies in C (4) λ passes through every other external 2-cell of D exactly once (5) λ does not pass through any internal 2-cell of D We call D a collared diagram and λ a collaring segment. We also say that D is cornerless if the first and the last edge of λ coincide in C (in which case the hypergraph cycles). Now we will use the additional color-structure of a Painted Cayley complex to perform the following procedure of adding horns to a diagram. e Definition 3.9 (adding horns procedure). Let D be a van Kampen diagram in X. Let ∂2 (D) be the set of all 2-cells in D that contain a boundary edge of D. Let ∂2s (D) be the set of all distinguished 2-cells c in 2 − ∂(D) such that a 2-cell c′ , that is strongly adjacent to c, does not belong to D. 12 TOMASZ ODRZYGÓŹDŹ We define a diagram with horns D in the following way: for each c ∈ ∂2 (D) we glue to a diagram D a 2-cell c′ that is strongly adjacent to c (gluing is in a way that e these 2-cells are glued in X). If that will be clear we will call diagrams with horns just diagrams, for shortness. ˜ Lemma 3.10. Let D be a diagram with horns. Then |∂(D)| (the generalized boundary length) is an even number. Proof. The statement results from the fact that every 2-cell of D has even number of edges and every gluing of 2-cells along an edge decreases the generalized boundary length by 2.  Remark 3.11. A diagram with horns is a union of a disc diagram D and a set Z of 2-cells, each of them being adjacent to the boundary of D along at least one vertex and such that no two elements of Z share an edge. Proof. The only thing that we need to prove is that no two elements of Z share an edge. This results by Proposition 3.1.  Corollary 3.12 (of Remark 3.11). Collared diagrams with horns w.o.p. satisfy the assumptions of Theorem 2.5. The following theorem shows the relation between collared diagrams and hypergraphs Theorem 3.13 (reformulation of [OW11, Theorem 3.5]). Let Λ be a hypergraph in e The following conditions are equivalent: X. (1) Λ is an embedded tree. (2) There is no collared diagram collared by a segment of Λ. There is a definition of a diagram collared by a hypergraph in [OW11, Definition 3.11]. However, in the paper [OW11] this definition was stated for a general l-gon complex and for the standard hypergraphs that join antipodal midpoints of faces they are passing through. Definition 4.3 is a modification of [OW11, Definition 3.11]: we use it for l = 4 and for hypergraphs defined in a different way, but the e is not necessary fact the hypergraph joins the antipodal midpoints of edges in X to provide the proof of Theorem 3.13, in fact the proof can be repeated, as well, in case of colored hypergraphs. The next theorem is motivated by Theorem 3.13 and shows the relation between collared diagrams with horns and colored hypergraphs. e If Theorem 3.14. Let Λ be a red or blue hypergraph in X. Λ is not an embedded tree, then there is a collared diagram with horns collared by a segment of Λ. Proof. By Theorem 3.13 we know that there exists collared diagram collared by a segment of Λ. We obtain the statement of Theorem 3.14 by applying the procedure of adding horns to a diagram described in Definiton 3.9  Proof of Theorem 3.7. Suppose, on the contrary, that there is a red or blue hypergraph that is not an embedded tree. By Theorem 3.14 we know that there is a ˜ collared diagram with horns E collared by some segment λ. Let n = |∂E|. For  1 ε < 2 3 − d by Theorem 2.5 we have w.o.p. CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 13 ˜ ≥ 4|E|(1 − 2d − ε) > 4 |E| n = |∂E| 3 There are two possibilities: either E is cornerless or not. First consider the case where E is cornerless. Then every external 2-cell, which is not red or blue has exactly one external edge. Each pair of strongly adjacent 2-cells gives a contribution ˜ equal 2, independently of the way the blue or red 2-cell is glued to the to |∂E| diagram E. Hence |E| ≥ n. By (3.1) we know that with overwhelming probability all collared cornerless diagrams with horns satisfy: (3.1) 4 n, 3 which is a contradiction. Therefore, with overwhelming probability there are no such diagrams. Let us now consider the case where the diagram E is not cornerless. The only difference between the previous case is that a corner can have two external edges. Therefore |E| ≥ n − 1. We have two possibilities |E| ≥ n or |E| = n − 1. If |E| ≥ n we again obtain (3.2), which is a contradiction. Hence, the only remaining case is ˜ = n and |E| = n − 1. Again we use (3.1) to obtain: where |∂E| (3.2) n> 4 (n − 1). 3 It can be easily seen that for n > 3 this is not possible. So we only have to exclude ˜ = 3. But there are no diagrams with odd generalized the diagram |E| = 2, |∂E| boundary length, according to Lemma 3.10.  n> Lemma 3.15. Suppose that a red hypergraph or a blue hypergraph Λ is an embedded e Then X e − Λ consists of two connected components. tree in X. Proof. The proof is analogous to the proof of [OW11, Lemma 2.3].  4. Metrically proper action on a space with walls In this section our goal is to prove the following 3 . Let Theorem 4.1. Let G be a random group in the square model at density d < 10 e e X be the Cayley complex of G. For x, y ∈ X we denote by dwall (x, y) the number of hypergraphs Λ (standard, red and blue) such that x and y lie in the different e − Λ. Then w.o.p. connected components of X 1 d e (1) (x, y)⌋, 15 X e denotes the edge metric on the 1-skeleton of X. dwall (x, y) ≥ ⌊ where dXe (1) The meaning of the foregoing theorem comes from the following Proof of Theorem 1.2. By Lemma 3.15 hypergraphs are embeddes trees, and by Lemma 3.15 and [OW11, Lemma 2.3] they separate the Cayley complex into two connected components, so they provide a structure of a space with walls on it. Every discrete group acts properly on its Cayley complex, and by Theorem 4.1 the wall metric and edge metric on the Cayley complex are equivalent. Therefore a 14 TOMASZ ODRZYGÓŹDŹ group acts properly on a space with walls. Then by [CN05] there is an action of a random group on a CAT(0) cube complex.  Before we provide the proof of Theorem 4.1 we need several facts about the geometry of hypergraphs. For simplicity, until the end of this section we will denote e the painted Cayley complex of a random group in the square model at density by X 3 e (1) the 1-skeleton of X e (i.e. the Cayley graph of a random group). and by X d < 10 e let E be a 2-cell having exactly Lemma 4.2. Let D be a distinguished 2-cell in X, one common edge with D and let F be a 2-cell different than D and having at least one common edge with E. Then w.o.p. E and F are regular 2-cells. Proof. Suppose, on the contrary, that E is a distinguished 2-cell. Then let D′ and E ′ be the 2-cells strongly adjacent to D and E respectively. By the assumption we know that D′ 6= E and E ′ 6= D (otherwise D and E would be strongly adjacent). By Proposition 3.1 we know that D′ 6= E ′ . Therefore there are two pairs of distinguished 2-cells {D, D′ } and {E, E ′ } which have at least one common edge. Consider the diagram D consisting of 2-cells D, D′ , E, E ′ , glued in the way they ˜ ≤ 6. Note, that every diagram A consiste We will show that |∂D| are glued in X. ˜ = 4. Gluing two ing of two strongly adjacent 2-cells satisfies: |A| = 4 and |∂A| such diagrams, consisting of disjoint sets of 2-cells, along one edge decreases the ˜ ≤ 6. Therefore, the diagram D violates generalized boundary length by 2, so |∂D| ˜ ≥ |D|4(1 − 2d), so by Theorem 2.5 w.o.p. there is no such a the inequality |∂D| diagram D. Therefore E is a regular 2-cell. Now suppose, on the contrary, that F is a distinguished 2-cell. Let F ′ be the 2-cell strongly adjacent to F . Again by Propistion 3.1, shows that F ′ 6= D, D′ 6= F and F ′ 6= D′ . Moreover, from the previous part of the proof we know that with w.o.p. E is a regular 2-cell, so F ′ 6= E. Hence, there is a diagram E, which is a union of a pair {D, D′ } of strongly adjacent 2-cells, 2-cell E, and a second pair of strongly adjacent 2-cells {F, F ′ }. Analogously as above, we can prove that E ˜ ≤ 8. Therefore the diagram E violates the inequality satisfies: |E| = 5 and |∂E| ˜ |∂E| ≥ |E|4(1 − 2d), so by Theorem 2.5 w.o.p. there is no such a diagram E. Hence F is a regular 2-cell.  Now, we introduce the notion of a diagram collared by hypergraph and path. Definition 4.3. Let λ be a segment of a hypergraph (red, blue or standard) and e (1) . Let D be a van Kampen diagram with the following let γ be an edge-path in X additional properties: (1) λ passes only through external 2-cells of D (2) every external edge of D belongs to the boundary of the carrier of λ or belongs to γ. We call D a diagram collared by hypergraph and path. After applying the procedure of adding horns(see Definition 3.9) to D we obtain a diagram with horns collared by hypergraph and path. We call λ a collaring hypergraph segment and γ a collaring edge-path. There is a definition of a diagram collared by hypergraphs and paths in [OW11, Definition 3.11]. In the paper [OW11] this definition was stated for a general polygonal complex and for the hypergraphs that join antipodal midpoints of faces they are passing through. Definition 4.3 is a modification of [OW11, Definition 3.11]: we CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 15 use it for l = 4, one path and one hypergraph segment, and for hypergraphs defined in a different way, but the fact the hypergraph joins the antipodal midpoints is not necessary to provide the proofs of upcoming lemmas. The proofs of lemmas from [OW11] that we will use can be as well repeated for red and blue hypergraphs. The following lemma is then a slight modification of [OW11, Lemma 3.17]. e and γ be an edge path in X e (1) . Suppose, Lemma 4.4. Let Λ be a hypergraph in X that γ intersects Λ in two consecutive points x, y. Then there is a diagram with horns collared by Λ and a segment of γ bounded by points x and y (here γ is an edge path which starts and ends at“midedge vertices” corresponding to vertices of Λ. Proof. First we prove that there exists a diagram collared collared by Λ and a segment of γ bounded by points x and y. The proof of this fact is analogous to the proof of [OW11, Lemma 3.17]. Then we apply a procedure of adding horns (Definition 3.9) to that diagram.  e (1) and let Λ be a hypergraph in X. e Lemma 4.5. Let γ be a geodesic edge-path in X Suppose that there is a finite, nonempty geodesic segment γ ′ ⊂ γ, such that the first and the last vertex of γ ′ lie in Car(Λ) but no other vertices of γ ′ lie in Car(Λ) and no edge of γ ′ lie in Car(Λ). Then w.o.p. γ ′ has length 2, and there is the following e diagram D consisting of three 2-cells immersed in X: γ′ Λ′ Figure 3. The diagram D. Moreover, every 2-cell of D is a regular 2-cell. Definition 4.6. A diagram D having the same shape as the one presented in Figure 4.5 will be called a house diagram. The geodesic segment γ ′ we be called a roof (of a house diagram). Proof. Let e0 , e1 be some edges dual to Λ with endpoints in the first and the last vertex of γ ′ . By Lemma 4.4 we know that there is a diagram D with horns collared by the edge-path {e0 , γ ′ , e1 } and a segment Λ′ of Λ. Suppose that the length of this hypergraph segment equals k and the length of γ ′ equals l. Let k ′ denote the number of horns in D. Note that ˜ ≤ k + k ′ + l + 2. (4.1) |∂D| Note that every edge of γ ′ lies in the boundary of some 2-cell in D that is not in the carrier of Λ, since otherwise there would be an inner vertex of γ ′ lying in Car(Λ). Moreover, more than 2 edges of γ ′ cannot lie in the boundary of one 2-cell in D, 16 TOMASZ ODRZYGÓŹDŹ since otherwise γ ′ would not be a geodesic. Therefore, there are at least in D not lying in Car(Λ). Hence   l ′ . (4.2) |D| ≥ k + k + 2 l 2 2-cells Moreover, l ≥ 2, because there is at least one vertex of γ ′ not lying in the carrier of Λ and l ≤ k because γ is a geodesic. By Lemma 3.10 the number k + k ′ + l must be even. Combining this with Theorem 2.5 gives the following system of conditions, which is w.o.p. satisfied by k, k ′ and l: (4.3)   l  8 ′ ′  k + k + l + 2 > 5 k + k + 2 l ≤ k, l ≥ 2, k ≥ 1 ⇐⇒ 2 ≤ l ≤ k   k + k ′ + l is an even number Now we will find the possible values of l (see 4.3). If l is even then we can rewrite the first inequality in (4.3) in form k + k ′ + l + 2 > 8 l ′ ′ 5 (k + k + 2 ). This is equivalent to 3(k + k ) < 10 + l. Combining this with the second inequality in (4.3), that is l ≤ k, we obtain k < 5. Therefore l ≤ 4, since l is even. Hence for even l possible solutions are: l = 4 and l = 2. If l is odd then the first inequality in (4.3) becomes k +k ′ +l+2 > 85 (k +k ′ + l+1 2 ), which is equivalent to 3(k + k ′ ) < l + 6. Combining this with l ≤ k we get k < 3. Therefore l ≤ 1 since l is odd. This contradicts l ≥ 2. Hence, there are no solutions with odd l. First, consider the case, where l = 2. Then 8 k + k ′ + 4 > (k + k ′ + 1), 5 ′ so k + k < 4. Combining this with the parity of k + k ′ + l we obtain that only possible solution for l = 2 is k + k ′ = 2. Hence, there are two subcases to consider: k ′ = 0 and k ′ = 1. If k ′ = 1 then the segment Λ′ consists of a distinguished 2-cell c, which is strongly adjacent to some 2-cell c′ : c′ A c B Λ γ′ D C Figure 4. The diagram D with one of possible hypergraphs Λ and geodesic segments γ ′ . The geodesic segment γ ′ joins vertices A and C or B and D, since otherwise γ would not be geodesic. It can be easily seen that the 2-cell c′ also belongs to the carrier of Λ. Therefore γ ′ cannot run along the boundary path of c′ , since it has at least one vertex that lies outside the carrier of Λ. Hence, there must be at least one ˜ = 4 and |D| ≥ 3, which contradicts Theorem more 2-cell in D. This gives us |∂D| 2.5. CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 17 The second subcase (of the case l = 2) is k ′ = 0 and k = 2. In that subcase Car(Λ′ ) consists of two regular 2-cells (see Figure 5 a) ). γ′ A B C A B Λ′ F E C Λ′ D F a) E D b) Figure 5. The diagram D. Note, that γ ′ can join only vertices A with C or D with F , since in all other cases γ ′ is either not a geodesic or intersects Λ, according to Lemma 3.15. After relabelling vertices, we can always obtain a diagram D presented in Figure 5 b), as desired. Moreover, every 2-cell in D is a regular 2-cell, since D does not have any horns. There are exactly three 2-cells in D since by 2.5 there are no diagrams with the boundary equal 6 consisting of more than three 2-cells. Now, consider the case where l = 4. Then 8 k + k ′ + 6 ≥ (k + k ′ + 2), 5 so k + k ′ ≤ 4. We start with the subcase, where k + k ′ = 4. We know that ˜ |∂D| ≤ k + k ′ + l = 10 and |D| ≥ k + k ′ + 2l = 6. By Theorem 2.5 and the fact ˜ ≤ 10 we obtain that |D| = 6 and |∂D| ˜ = 10. Let C = D ∩ Car(Λ). The that |∂D| diagram D − C consists of two 2-cells, call them A and B. Note that all edges of γ ′ belong to A ∪ B. Therefore 2-cells A and B have no common edges, since otherwise there will be no two points in A ∪ B within distance 4. This means, that there are three vertices of γ ′ belonging to C. This contradicts our assumption on γ ′ so there is no diagram with k + k ′ = 4 satisfying the assumptions of the Lemma 4.5. Now consider the case, where k + k ′ = 2 and l = 4. If k + k ′ = 2 then the carrier of Λ′ consists of maximally two 2-cells, so every pair of vertices in this carrier lies in the distance dXe (1) equal at most 3. Therefore γ ′ cannot join any vertices of the carrier of Λ′ . Hence, there is no diagram D with k + k ′ = 2 and l = 4. There are no other possibilities, because of the parity of k + k ′ + l.  Definition 4.7. Let λ be a segment of a hypergraph. A diagram consisting of two strongly adjacent 2-cells, such that λ passes through this pair will be called a divided tile (of λ) we. A 2-cell in the carrier of λ that is not a regular 2-cell but is not an element of a divided tile of λ will be called an isolated 2-cell. A tile is a divided tile or a regular 2-cell. Lemma 4.8 (hypergraphs do not osculate). Let Λ′ be a hypergraph segment in e (1) . Suppose that one of the following conditions is satisfied X 18 TOMASZ ODRZYGÓŹDŹ a) Λ′ is a segment of a red hypergraph and there are no isolated red 2-cells of Λ′ , b) Λ′ is a segment of a blue hypergraph and there are no isolated blue 2-cells of Λ′ , c) Λ′ is a segment of a standard hypergraph and there is no divided tile of Λ′ . Then w.o.p. holds (1) For every vertex v of Car(Λ′ ) there is only one edge in Car(Λ′ ) ending in v, dual to Λ′ that is not an internal edge of a divided tile (the situation presented in Figure 6 a) does not occur). In other words: if there is a vertex in Car(Λ′ ) being the endpoint of two edges dual to Λ′ then one of these edges must be an internal edge of a divided tile. e (1) such that its vertices lie in Car(Λ′ ) but e does (2) There is no edge e in X ′ not lie in Car(Λ ), see Figure 6 b). c1 v c2 e a) b) Figure 6. Two types of hypergraphs osculations. Proof. (1) Suppose, on the contrary, that such a point v exists. Then let e1 , e2 be the two edges, ending in v that are dual to the hypergraph segment Λ′ and that are none of them is an internal edge of a divided tile. Let D be a diagram collared by ˜ ≤ |D| + 2. Therefore, by Λ′ and an edge-path {e1 , e2 }. Such diagram satisfies |∂D| ˜ Theorem 2.5 we obtain |D| ≤ 3. Hence |∂D| ≤ 5, and combining this with Lemma ˜ ≤ 4. This by Theorem 2.5 gives us that that |D| ≤ 2. A 3.10 we get that |∂D| diagram consisting of two 2-cells and having the generalized boundary length at most 4 must be a pair of strongly adjacent 2-cells. This ends the proof in the case c). If Λ′ is red or blue hypergraph we need to provide further argument. Note, that both red and blue hypergraph join the antipodal midpoints of bundary edges of every tile. Hence, there are no two edges that are dual do Λ′ , have common end and non of them is an internal edge of a divided tile. This ends the proof in cases a) and b). Therefore there is a blue 2-cell and a red 2-cell in the carrier of Λ′ , which contradicts assumptions a), b) and c). (2) Let v1 and v2 be the ends of the edge e. For i = 1, 2 let ei be the edge dual to Λ′ ending in vi that is not an internal edge of a divided tile. Let E be a CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 19 diagram with horns collared by Λ′ and the edge-path {e1 , e, e2 }. As previously, E satisfies |∂E| ≤ |E| + 2. Therefore by 2.5 |E| ≤ 3, so |∂E| ≤ 5. By Lemma 3.10 we obtain that in fact |∂E| ≤ 4, which, by previous observation, means that |E| ≤ 2. A diagram with two 2-cells and the boundary length equal 4 must be a pair of strongly adjacent 2-cells. In a diagram which is a pair of strongly adjacent 2-cells there is no edge which does not lie in Car(Λ) but its endpoints do. This end the proof in cases a), b) and c).  e (1) Lemma 4.9. Let Λ1 be a hypergraph segment and γ be a geodesic segment in X that intersects Λ1 in two points, which are the endpoints of γ. Let Λ2 6= Λ1 be a e intersecting γ in point x. hypergraph in X (1) Λ1 and Λ2 pass through a common 2-cell cx , that is Car(Λ1 )∩Car(Λ2 ) ⊇ cx . (2) If moreover Λ2 intersects γ in two different points x and y that do not lie in the boundary of the same 2-cell of Car(Λ1 ) then there are two different 2-cells in Car(Λ1 ) ∩ Car(Λ2 ). Proof. Part (1) Let e be an edge of γ dual to Λ2 . There are two possibilities • The edge e lies in the boundary of a 2-cell c ∈ Car(Λ1 ). In that case Λ2 is dual to the boundary edge of c, so cx := c belongs to Car(Λ2 ). See Figure 7 a). • The edge e does not lie in the boundary edge of a 2-cell c ∈ Car(Λ1 ). Since γ is a geodesic edge-path, by Lemma 4.5 combined with Lemma 4.8 we know that e lies in the boundary of a house diagram presented in Figure 7 b). It is clear from the Figure 7 b) that cx ∈ Car(Λ1 ) ∩ Car(Λ2 ). Part (2). If x and y lie in the boundaries of distinct 2-cells cx and cy belonging to Car(Λ) then it is clear that cx and cy both lie in Car(Λ1 ) ∩ Car(Λ2 ) (see Figure 7. Consider the case where x lies in the boundary of a 2-cell c1 in Car(Λ1 ) and y do not. Considering a hypergraph Λ1 dual to γ passing through y we will find (as in part (1) ) a regular 2-cell c2 that lies in Car(Λ1 ) ∩ Car(Λ2 ) and that there is no edge of γ in the boundary of c2 . Hence c2 6= c1 and c1 and c2 both lie in Car(Λ1 ) ∩ Car(Λ2 ). The last case to consider is when neither x nor y lie in the boundary of Car(Λ1 ). First, note that x and y cannot lie in the roof of the same house diagram since then there would be a self intersection of Λ2 (see Figure 7 b) ) which contardicts Theorem 3.7. Hence, x and y lie in the roofs of different house diagrams, which means that one 2-cell from each of those diagrams belongs to Car(Λ1 ) ∩ Car(Λ2 ). This means that there are at least two different 2-cells in Car(Λ1 ) ∩ Car(Λ2 ).  e Let γ be a geodesic edge-path in the Lemma 4.10. Let Λ be a hypergraph in X. e Suppose that γ intersects Λ in two consecutive points x and y. Let 1-skeleton of X. Λxy be the segment of Λ joining x and y. Then: (1) if Λ is a red hypergraph, there is an isolated red 2-cell c of Λxy , (2) if Λ is a blue hypergraph, there is an isolated blue 2-cell c of Λxy , (3) if Λ is a standard hypergraph, there is a divided tile of Λxy , such that the none of its internal edges belong to γ. Proof. The proof relies on the idea, that if a geodesic crosses a hypergraph two times it must be worthwile in terms of distance. If the hypergraph does not “turn” 20 TOMASZ ODRZYGÓŹDŹ cx cx Λ1 γ e Λ2 γ Λ1 x y x e a) b) Figure 7. Intersections of hypergraphs Λ1 and Λ2 . there is no reason for a geodesic to cross it two times. A colored hypergraph can “turn” only if there is an isolated 2-cell of the segment of hypergraph and a standard hypergraph “effectively turns” when meeting a pair of strongly adjacent 2-cells. Let now state a precise argument. First, consider the case where Λ is a red hypergraph. Suppose, on the contrary, that there is no isolated red 2-cell of Λxy . The the carrier of Λxy consists only of tiles (regular 2-cells or divided tiles) and every edge of Λxy joins an antipodal midpoints of boundary edges of every tile in Car(Λ′ ) i.e. the carrier of Λ′ has the shape illustrated in Figure 8. γ x′ x x′′ Λ′ ... y′ y y ′′ k Figure 8. The diagram collared by Λxy and γ. e containing x, and suppose that Let x′ and x′′ be the two ends of the edge of X ′ ′′ e x lies on γ between x and y. Let y and y be the two ends of the edge of X ′ ′ containing y, and suppose that y lies on γ between x and y. Let γ0 be the subpath of γ joining x′ and y ′ (see Figure 8). Let V be the set of vertices of γ ′ . Define ′ V ′ = {v ∈ V |there is at least one edge of γ ′ ending in v and not belonging to Car(Λ′ )}. For each pair s, t of two consecutive vertices in V ′ consider the subsegment of ′ ′ γ joining s and t and denote it by γst . By Lemma 4.8 part (2) we obtain that γst either (1) lies in the boundary of the carrier of Λ, or (2) has a length at least 2. ′ In the latter case, we know that γst is a roof of a house diagram. Therefore ′ without change of the total length of γ ′ we can replace γst with an edge-path of length 2, that lies in the boundary of Car(Λxy ) and does not cross Λxy . Hence, we can modify γ ′ to a path having the same length such that all its edges lie in the boundary of Car(Λxy ). From now γ ′ denotes modified path. For every ′ CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 21 vertex v of γ ′ denote by ev the edge dual to Λ′ ending in v that is not an internal edge of a divided tile (this definition is unambiguous according to Lemma 4.8 part (1) ). We will prove now that the length d of γ ′ equals the number k of tiles of Λxy . Every edge of γ ′ lies in the boundary of exactly one tile so k ≥ d. Suppose, on the contrary, that k > d. This means that there must be a vertex of γ ′ that is a common vertex of more than two tiles. But in that case there are at least two edges dual to Λxy that are not internal edges of a divided tile. This contradicts e joining x′′ Lemma 4.8 part 1). Hence k = d. Consider now the edge-path γ ′′ in X ′′ and y and goes along the boundary of Car(Λxy ). The length of this edge-path is not greater then k since every tile of Λxy shares at most one boundary edge with γ ′′ . Hence there exists an edge-path joining x′′ and y ′′ of length k. Note that the segment of γ joining x′′ and y ′′ has length k + 2. This contradicts the fact that γ is a geodesic. If Λ′ is a blue hypergraph the proof is analogous. Consider now the case, where Λ is a standard hypergraph. In that case we can provide an analogous argument to prove that there must be a divided tile of Λxy . We only need to prove that none of the internal edges of a divided tile belong to γ. Suppose, on the contrary, that this is the case. By Lemma 4.4 there exists a planar diagram D collared by Λxy and γ. By definiton of a diagram collared by a hypergraph and path γ cannot contain any internal edge of D which ends the proof.  The definition of a 2-collared diagram in case of standard hypergraphs can be found in [OW11, Subsection 3.3]. In a nutshell this is a diagram collared by two hypergraphs (see Definition [OW11, Lemma 3.17]). Let us state this definition for a case of general hypergraphs. Definition 4.11 (2-collared diagram). Let λ1 and λ2 be two hypergraph segments. Let D be a van Kampen diagram with the following additional properties: (1) (2) (3) (4) There are two external 2-cells of D called corners λ1 and λ2 pass only through external 2-cells of D every external edge of D belongs to Car(λ1 ) ∪ Car(λ2 ) corners are the only 2-cells of D containing the edges of both hypergraph segments λ1 and λ2 . We call D 2-collared diagram (collared by λ1 and λ2 ). Lemma 4.12 (reformulation of [OW11, Theorem 3.12]). Suppose, Λ1 and Λ2 are e and that they intersect at least distinct hypergraphs that are embedded trees in X, twice. Let c be a common 2-cell of Car(Λ1 ) and Car(Λ2 ) Then there exists a 2collared diagram collared by segments Λ1 and Λ2 . Moreover we can choose c to be one of its corners. There is a definition of a 2-collared diagram in the beginning of [OW11, Section 3.11]. However this is the special case of the general definition of a diagram collared by hypergraphs and paths that was stated for a general polygonal complex and for the standard hypergraphs. Definition 4.11 is a modification of it: we use it for l = 4 and for general hypergraphs, but the fact that the hypergraph joins the antipodal e is not necessary to provide the proof of Lemma 4.12, in midpoints of edges in X fact the proof can be provided, as well, in the case of colored hypergraphs. 22 TOMASZ ODRZYGÓŹDŹ Figure 9. 2-collared diagram. Collaring segments are indicated with thick lines. e is a pair of strongly adjacent Lemma 4.13. W.o.p. every 2-collared diagram in X 2-cells. Proof. Let D be a 2-collared diagram (with horns) collared by hypergraphs Λ1 and Λ2 . Let k1 be the length of the collaring segment of Λ1 and k2 be the length of the collaring segment of Λ2 . Let h denote the number of horns in D. Each pair of strongly adjacent 2-cells gives a contribution to the generalized boundary length ˜ ≤ k1 + k2 + h. There are two 2-cells in Car(Λ1 ) ∩ Car(Λ2 ), so equal 2, hence |∂D| 3 |D| ≥ k1 + k2 + h − 2. Hence, by Theorem 2.5 for the density d < 10 we obtain that w.o.p.: ˜ > 8 |D| > 8 (k1 + k2 + h − 2). k1 + k2 + h ≥ |∂D| 5 5 ˜ is even. Therefore Hence k1 + k2 + h ≤ 5. By Lemma 3.10 we know that |∂D| ˜ |∂D| ≤ 4 and by (4.4) we obtain |D| ≤ 2. Hence, D must be a diagram consisting of two strongly adjacent 2-cells.  (4.4) Lemma 4.14. The following statement holds w.o.p.: Let Λ1 and Λ2 be two hypere Suppose that Λ1 and Λ2 intersect transversally in a 2-cell c, meaning graphs in X. that Car(Λ1 ) ∩ Car(Λ2 ) contains a regular 2-cell c and that Λ1 ∩ c 6= Λ2 ∩ c. Then Λ and Λ′ intersect only once. Moreover c is the only one 2-cell in Car(Λ1 ) ∩ Car(Λ2 ). Proof. Suppose, on the contrary, that there is another point of intersection. Then by Lemma 4.12 there is a 2-collared diagram with horns D collared by Λ1 and Λ2 and containing c. By Lemma 4.13 we know that every 2-cell of D is distinguished, so this is a contradiction with the assumption that c is regular. Now suppose, on the contrary, that there is a 2-cell d ∈ Car(Λ1 ) ∩ Car(Λ2 ) such that d 6= c. We know that there is only one point of intersection of Λ1 and Λ2 , so the only possibility is that d is a distinguished 2-cell of some color, and Λ1 and Λ2 are both hypergraphs of this color (see Figure 10). But then Λ1 and Λ2 intersect in the middle of the 2-cell strongly adjacent to d, so there are two points of intersection of Λ1 and Λ2 , which is a contradiction.  CUBULATING RANDOM GROUPS IN THE SQUARE MODEL Λ1 23 c Λ2 d Figure 10. Two 2-cells in Car(Λ1 ) ∩ Car(Λ2 ). e (1) . Let e be an edge in γ, and Lemma 4.15. Let γ be a geodesic edge-path in X denote by s its midpoint. Then either: (a) There is a hypergraph intersecting γ only in the point s. (b) There is a hypergraph Λ such that its segment Λsx starting in s intersects γ in two consecutive points: s and x such that there are at least two not sharing an edge distinguished 2-cells in Λsx and Λ does not intersect γ anywhere else between points s and x. Proof. If one of the hypergraphs (red, blue or standard) dual to the edge e intersects γ only once, the statement is satisfied. Hence, consider the case where all hypergraphs dual to the edge e intersect γ at least twice. Denote by x, y and z the e (1) ), in which three hypergraphs nearest points to s (in the edge-path metric in X x y z Λ , Λ and Λ dual to the edge e intersect γ. A priori, it may happen that some of these points are equal. Without loss of generality, we can assume that x and y lie in the same connected component of γ − s and that x is at least as far from s as y. Now, we will prove that y 6= x. Suppose, on the contrary, that x = y. This means that every time segments Λsx and Λsy split, they also rejoin at some point, since they end in the same point. Every situation where Λsx and Λsy split an rejoin gives us a 2-collared diagram collared by a subsegments of Λsx and Λsy . By Lemma 4.14 every 2-collared diagram is a pair of strongly adjacent 2-cells. This means that if Λsx and Λsy split they rejoin in the next 2-cell of the common carrier, see Figure 11. This means that Car(Λsx ) = Car(Λsy ) and that distinguished 2-cells Car(Λsx ) occur only in strongly adjacent pairs. blue 2-cell red 2-cell Λred Λblue Figure 11. The only possible way of splitting and rejoining of Λx and Λy . One of the hypergraphs Λx and Λy is red or blue, so by Lemma 4.10 in the carrier of Λsx exists an isolated distinguished 2-cell, so this is a contradiction. Therefore y 6= x. 24 TOMASZ ODRZYGÓŹDŹ Therefore, y lies on a geodesic edge-path that intersects Λsx twice. Hence, by Lemma 4.5 we know that y lies in the boundary of the carrier of Λsx (see Figure 12 a) or y lies the boundary of the house diagram F presented in Figure 12 b). c c1 Λy c2 Λx γsx Λx y γsx y F a) b) Figure 12. Two possible locations of y. The hypergraphs Λx and Λy cannot intersect transversely in a regular 2-cell c1 , since otherwise by Lemma 4.14 they would intersect only once in the middle of c1 , and we know that they intersect also in s. Hence y lies in the boundary of a distinguished 2-cell cy ∈ Car(Λsx ). Therefore the carriers of the segments Λsx and Λsy share a common distinguished 2-cell cy . Without loss of generality, we can suppose that cy is red (if it is blue the argument is analogous). If Λx or Λy is blue then, according to Lemma 4.10, its carrier contains an isolated blue 2-cell cb , so cb does not share an edge with cy . In that case the carrier of Λx or Λy contains a red 2-cell cy and some non-adjacent by an edge to it blue 2-cell cb , so we are done. The only cases left to consider are: (1) Λy is a red hypergraph and Λx is a standard hypergraph (2) Λx is a red hypergraph and Λy is a standard hypergraph. First consider the situation 1). If there are at least two red 2-cells in the carrier of Λsx , we are done. Hence, we can suppose that cy is the only isolated red 2-cell in the carrier of Λsx . In that case Car(Λsx ) has the shape presented in Figure 13. We know that y lies in the boundary of cy and y does not belong to Λsx . Hence y = y1 or y = y2 . Recall that points s, x and y lie on γ. If y = y2 then there is a segment of standard hypergraph bounded by s and y intersecting γ twice at its ends, such that there is only one distinguished 2-cell in its carrier. This contradicts Lemma 4.10 (3). If y = y2 we obtain analogous contradiction. Hence there must be at least one more isolated red 2-cell in the carrier of Λsx , so we are done, since two red 2-cells cannot share an edge. Now consider situation 2), that is Λx is a standard hypergraph and there is only one divided tile of Λsx and y belongs to this divided tile. In that case Car(Λsx ) has the shape presented in Figure 14. We know that y lies in the boundary of cy but y does not belong to Λsx . Moreover by 4.10 part (3) we know that y does not lie on an internal edge of a divided tile. Hence y = y3 or y = y4 . If y = y3 then there is a segment of a red hypegraph bounded by x and y intersecting γ twice with no isolated red 2-cell in its carrier. This contradicts Lemma 4.10 part (1). If y = y4 CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 25 y1 s Λsx ... y2 x Figure 13. The carrier of Λsx in case where Λx is red. y3 s Λsx ... y4 x Figure 14. The carrier of Λsx in case where Λx is standard hypergraph. we obtain the contradiction analogously. Hence, there must be at least two not sharing an edge 2-cells in the carrier of Λsx .  e of length at Theorem 4.16. Let γ be a geodesic edge-path in the 1-skeleton of X least 21. Let E := {e−7 , e−6 , . . . , e0 , . . . , e7 } be the set of 15 consecutive edges of e intersecting γ exactly once and such that this γ. Then there is a hypergraph in X intersection is the midpoint of one of the edges in E. Proof. Denote the midpoint of the edge e0 by s. If one of the hypergraphs dual to the edge e0 intersects γ only once, we are done. If not, by Lemma 4.10 we know that there exists a hypergraph Λ, such that its segment Λsx intersects γ in two consecutive points of γ: s and x and that the segment Λsx contains at least two not sharing an edge distinguished 2-cells: ⌈1 and ⌈2 . We will consider two cases: (1) There are at least seven 2-cells in Car(Λsx ) (2) There are at most six 2-cells in Car(Λsx ). We will use slightly different methods to deal with each of these two cases. 4.1. Case 1: There are at least seven 2-cells in Car(Λsx ). Let c1 , c2 , c3 be the 3-th, 4-th and 5-th 2-cells in Λsx respectively counted from s. According to Lemma 4.2 at least one of them must be a regular 2-cell, call it c. Denote by Λc 26 TOMASZ ODRZYGÓŹDŹ the standard hypergraph passing through 2-cell c and dual to Λ. By Lemma 4.14 Λc and Λ intersect only once. We will prove two assertions: (a) Λc intersects some edge in E. (b) Λc intersects γ exactly once. We start with the proof of assertion (a). Let us resolve where is the point of intersection of γ and Λc . If there is an edge ec of γ lying in the boundary of c then Λc and γ intersect in the midpoint of ec . In this case denote by xc the midpoint of e (1) that goes along the ec , see Figure 15 a). In that case there is an edge-path in X boundary of Car(Λ) of length at most 6, because there are at most five 2-cells in Car(Λsx ) between s and c. Hence dγ (s, xc ) ≤ 6. If there is no edge of γ lying in the boundary of c then, by Lemma 4.5 we know that the 2-cell c lies in the house diagram presented in Figure 15 b) so Λc intersects the edge ec from Figure 15 b). In that case we denote by the xc the midpoint of e (1) that goes along the boundary of ec . In this situation, there is an edge-path in X Car(Λ) and a boundary of a house diagram containing c of length at most 7, because there are at most five 2-cells in Car(Λsx ) between s and c. Hence dγ (s, xc ) ≤ 7. This ends the proof of assertion (a). c c Λc Λc Λ γ Λ ec xc γ xc ec a) b) Figure 15. Two possible ways of intersection of Λc and γ Now we will prove assertion (b). By Lemma 3.15 there are exactly two cone − Λ. Hence, we can split Λc into two parts: nected components of X e − Λ containing • Λ+ which is the intersection of Λc with the component of X xc e − Λ not con• Λ− which is the intersection of Λc with the component of X taining xc . We will show that Λ− does not intersect γ and that Λ+ intersects γ only once (in the point xc ). Firstly, consider Λ+ . Suppose, on the contrary, that Λ+ intersects γ in some point yc 6= xc . Suppose that yc is the nearest among what point to xc in the metric dγ . Points xc and yc cannot both lie in the boundary of c since there is at most one common edge of c and γ. We will consider three cases: (1) yc belongs to the segment γsx of γ bounded by s and x, , see Figure 16 (1) (2) yc does not belong to γsx and points xc and yc lie in the different connected e − Λ, , see Figure 16 (2) components of X CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 27 (3) yc does not belong to γsx and points xc and yc lie in the same connected e − Λ. , see Figure 16 (3) component of X Λ− Λ (1) γ s c yc xc x Λ+ Λ− Λ (2) γ c s xc x yc Λ+ Λ− Λ (3) γ s c z2 xc z1 yc Λ+ Figure 16. Intersections of Λ+ and γ. 1)If yc belongs to the segment γsx of γ bounded by s and x. Then by Lemma 4.9 applied to Λ1 = Λ and Λ2 = Λc we obtain that there are two common 2-cells of the carriers of Λ and Λc , which is a contradiction with Lemma 4.14. e − Λ then 2) If points xc and yc lie in the different connected components of X there is an intersection of Λ+ which contradicts the fact that Λ and Λc intersect only once ( Lemma 4.14). e − Λ then Λ 3) If points xc and yc lie in the same connected component of X intersects γsx at least twice in some points z1 , z2 . If this two points do not lie in the boundary of the same 2-cell c′ in Car(Λc ) then ′ c 6= c. By Lemma 4.9 applied for Λ1 = Λc and Λ2 = Λ we obtain that there are two different 2-cells in Car(Λ) ∩ Car(Λc ), which contradicts Lemma 4.14. If z1 and z2 lie in the boundary of the same 2-cell c′ in Car(Λc ) then we know, that c′ 6= c, since c shares at most one edge with γ. Hence, c′ , c ∈ Car(Λc ) ∩ Car(Λ), which again contardicts 4.14. Hence, we proved that Λ+ does not intersect γ. Let us now consider Λ− . Suppose, on the contrary, that Λ− intersects γ. Let tc be the point of the intersection of Λ− and γ, which is the nearest to the point xc 28 TOMASZ ODRZYGÓŹDŹ in the edge-path metric on Λ− (see Figure 17). Note, that tc lies in the connected e − Λ not containing xc , since otherwise there will be a second component of X intersection of Λ and Λc which is not allowed, according to Lemma 4.14. Λ− Λ γ tc c s xc x Λ+ Figure 17. Intersection of Λ− and γ Let Λ′− be the hypergraph segment of Λc bounded by the points xc and tc . One of the points {x, s} lies on γ between points xc and tc . Suppose first that this point is s. Since s lies on the geodesic segment, that intersects Λc twice, by Lemma 4.5 we have two possibilities: s lies on the boundary of the 2-cell c (see Figure 18 a) ) or s lies in the diagram presented in Figure 18 b). c c Λ Λ Λc γ Λc x γ a) x b) Figure 18. Two possible locations of x Note, that in both cases the segment of Λ joining the point s and the 2-cell c consists of at most one 2-cell, which, if occurs, is a regular 2-cell. Remember that between s and x in Car(Λ) was at least seven 2-cells and c is 3-rd, 4-th or 5-th of them. Hence there must be a least two 2-cells between c and s. This is a contradiction, so Λ− does not intersect γ. If x lies on γ between xc and tc the reasoning is analogous. This ends the proof in Case 1. CUBULATING RANDOM GROUPS IN THE SQUARE MODEL 29 4.2. Case 2: There are at most six 2-cells in Car(Λsx ). Now let us consider the case, where there are at most six 2-cells in the carrier of Λsx . Let c be any regular 2-cell in the carrier of Λsx that lies between ⌈1 and ⌈2 (recall that ⌈1 and ⌈2 were two not sharing an edge distinguished 2-cells in the segment Λsx ). Again, we denote by Λc the hypergraph passing through c and dual to Λsx . Analogously we state two assertions: (a) Λc intersects some edge of the set E. (b) Λc intersects γ exactly once. To prove assertions (a) and (b) we first define the point xc as in Case 1. Proof of assertion (a) is analogous as in Case 1. Now, consider assertion (b). Again, we split Λc into two connected components: e − Λ containing • Λ+ which is the intersection of Λc with the component of X xc e − Λ not con• Λ− which is the intersection of Λc with the component of X taining xc . To prove that Λ+ intersects γ only once we can repeat the argument from Case 1. Consider now Λ− . Suppose, on the contrary that Λ− intersects γ in a point e − Λ not containing xc , so tc . Note that tc lies in the connected component of X the geodesic segment of γ bounded by xc and tc contains x or s. Without loss of generality we can assume that this geodesic segment contains x. Let Λ′− be the hypergraph segment of Λc bounded by the points xc and tc . The same reasoning, as in previous case, shows that there is at most one 2-cell in Car(Λ) between c and x, which, if occurs, is a regular 2-cell. This is a contraction since c lies in Car(Λ) between two distinguished 2-cells, so there must be a distinguished 2-cell in Car(Λ) between c and x.  Thorem 4.1 is an immediate consequence of Theorem 4.16. References [Ago13] Ian Agol, The virtual Haken conjecture, Doc. Math. 18 (2013), 1045–1087. With an appendix by Agol, Daniel Groves, and Jason Manning. [KK13] Marcin Kotowski and Michał Kotowski, Random groups and property (T ): Żuk’s theorem revisited, J. Lond. Math. Soc. (2) 88 (2013), no. 2, 396–416. [CMV04] Pierre-Alain Cherix, Florian Martin, and Alain Valette, Spaces with measured walls, the Haagerup property and property (T), Ergodic Theory Dynam. Systems 24 (2004), no. 6, 1895–1908. [CN05] Indira Chatterji and Graham Niblo, From wall spaces to CAT(0) cube complexes, Internat. J. Algebra Comput. 15 (2005), no. 5-6, 875–885. [Oll05] Yann Ollivier, A January 2005 invitation to random groups, Ensaios Matemáticos [Mathematical Surveys], vol. 10, Sociedade Brasileira de Matemática, Rio de Janeiro, 2005. , Some small cancellation properties of random groups, Internat. J. Algebra [Oll07] Comput. 17 (2007), no. 1, 37–51. [Gro93] M. Gromov, Asymptotic invariants of infinite groups, Geometric group theory, Vol. 2 (Sussex, 1991), London Math. Soc. Lecture Note Ser., vol. 182, Cambridge Univ. Press, Cambridge, 1993, pp. 1–295. [Oll07] Yann Ollivier, Some small cancellation properties of random groups, Internat. J. Algebra Comput. 17 (2007), no. 1, 37–51. 30 TOMASZ ODRZYGÓŹDŹ [Oll04] Y. Ollivier, Sharp phase transition theorems for hyperbolicity of random groups, Geom. Funct. Anal. 14 (2004), no. 3, 595–679. [OW11] Yann Ollivier and Daniel T. Wise, Cubulating random groups at density less than 1/6, Trans. Amer. Math. Soc. 363 (2011), no. 9, 4701–4733. [MP15] John M. Mackay and Piotr Przytycki, Balanced walls for random groups, Michigan Math. J. 64 (2015), no. 2, 397–419. [Odr16] Tomasz Odrzygóźdź, The square model for random groups, Colloq. Math. 142 (2016). , Nonplanar isoperimetric inequality for random groups, Note, aviable at: [Odr14] http://students.mimuw.edu.pl/∼to277393/web/files/nonplanar.pdf (2014). Institute of Mathematics, Polish Academy of Sciences, Warsaw, Śniadeckich 8 E-mail address: [email protected]
4
Average Age of Information with Hybrid ARQ under a Resource Constraint Elif Tuğçe Ceran, Deniz Gündüz, and András György arXiv:1710.04971v1 [cs.IT] 1 Oct 2017 Department of Electrical and Electronic Engineering Imperial College London Email: {e.ceran14, d.gunduz, a.gyorgy}@imperial.ac.uk Abstract—Scheduling of the transmission of status updates over an error-prone communication channel is studied in order to minimize the long-term average age of information (AoI) at the destination, under an average resource constraint at the source node, which limits the average number of transmissions. After each transmission, the source receives an instantaneous ACK/NACK feedback, and decides on the next update, without a priori knowledge on the success of the future transmissions. The optimal scheduling policy is studied under different feedback mechanisms; in particular, standard automatic repeat request (ARQ) and hybrid ARQ (HARQ) protocols are considered. Average-cost reinforcement learning algorithms are proposed when the error probabilities for the HARQ system are unknown. I. I NTRODUCTION We consider a source node which continually communicates the most up-to-date status packets to the destination. In particular, we are interested in the age of information (AoI) [1], [2] at the destination, for a system in which the source node samples an underlying time-varying process and sends the sample values over an imperfect link which introduces delays. Our goal is to minimize the average AoI taking into account packet retransmissions. Most of the prior work on AoI either do not consider retransmissions, or consider a standard automatic repeat request (ARQ) protocol, where, if a packet cannot be decoded, it is retransmitted until correct decoding, up to a maximum number of retransmissions (e.g., [3], [4]). Here, we analyze the AoI for both the standard ARQ and hybrid ARQ (HARQ) protocols. In the latter, the receiver combines information from all previous transmission attempts of a packet in order to increase the success probability of decoding after each retransmission [5]. To address the trade-off between the success probability and the freshness of the status update to be transmitted, we develop scheduling policies to minimize the expected average AoI under an average transmission-rate constraint. This constraint is motivated by the fact that sensors sending status updates have usually limited energy supplies (e.g., are powered via energy harvesting); hence, they cannot afford to send an unlimited number of updates, or increase the signal-to-noise-ratio in the transmission. First, we assume that the success probability before each transmission attempt is known (which depends on the number of previous unsuccessful transmissions); hence, the source can judiciously decide when to retransmit, and when to discard failed information and send a fresh update. Then, we consider transmitting status updates over an unknown channel, Process H(t) ACK/ NACK feedback Sample of the process Source Error-prone channel Destination Figure 1. System model of a status update system over an error-prone pointto-point link in the presence of ACK/NACK feedback from the destination. in which the success probabilities of transmission attempts are not known a priori, and must be learned in an online fashion. The main contributions of this paper are outlined as follows: • An long-term average resource constraint is imposed on the transmitter, which limits the average number of transmissions. • Both retransmissions and pre-emption following a failed transmission are considered, corresponding, respectively, to the HARQ and ARQ protocols. • The optimal preemptive transmission policy for the standard ARQ protocol is shown to be threshold-type, and the optimal threshold value is derived in closed-form. • An average-cost reinforcement learning (RL) algorithm is proposed to learn the optimal scheduling decisions when the transmission success probabilities are unknown. • Extensive simulations are conducted in order to show the effect of feedback, resource constraint and ARQ/ HARQ error correction algorithms on the data freshness. A. Related Work Earlier work on AoI considered queue-based models, in which the status updates arrive at the source node randomly as a memoryless Poisson process, and are stored in a buffer before being transmitted to the destination [1], [2], [6]. Instead, in this paper, we follow the so-called generate-at-will model that has been recently considered in [4] and [7], in which the status updates of the underlying process of interest can be sampled and generated at any time by the source. A constant packet failure probability for status update systems is investigated for the first time in [3], but this work focuses on an M/M/1 queuing model, and no feedback is considered for retransmissions. The paper [4] considers broadcasting of status updates to multiple clients over an unreliable broadcast channel. However, this paper only considers index policies, which update the information at every time slot, since no constraint is imposed on the number of updates. Optimizing the scheduling decisions in an AoI system is also investigated in [7], focusing on multiple receivers, which leads to a different set of constraints than ours, as we limit the average number of transmissions to a single receiver. The AoI in the presence of HARQ is modeled through an M/G/1 queue in [8]; however, no resource constraint is taken into account, and the status update arrivals are assumed to be memoryless and random, in contrast to our work, which considers general and controlled status update generation. The rest of the paper is organized as follows. In Section II, the system model is presented, and the problem of minimizing the average AoI with HARQ under a resource constraint is formulated as a constrained Markov decision process (CMDP). In Section III, a primal-dual algorithm is proposed to solve this CMDP. Then, minimizing the AoI under the standard ARQ protocol is investigated in Section IV, and a computationally efficient solution is proposed. Section V introduces a reinforcement learning algorithm to minimize AoI in an unknown environment. Simulation results are presented in Section VI, and the paper is concluded in Section VII. II. S YSTEM M ODEL AND P ROBLEM F ORMULATION We consider a slotted status update system over an errorprone wireless link. The source monitors an underlying timevarying process, for which it is able to generate a status update at the beginning of each time slot; this is known as the generate-at-will model [4]. A transmission attempt of a status update takes constant time, which is assumed to be equal to the duration of one time slot. We assume that the channel state changes randomly from one time slot to the next in an independent and identically distributed fashion. We further assume the availability of errorand delay-free single-bit feedback from the destination to the source node. Successful reception of a status update is acknowledged by an ACK signal, while a NACK signal is sent in case of a failure. In the classical ARQ protocol, a packet is retransmitted after each NACK feedback, until it is successfully decoded, and the received signal is discarded after each failed transmission attempt. However, in the AoI framework there is no point in retransmitting a failed out-ofdate status packet if it has the same error probability with a fresh status update. Hence, the source always removes a failed status signal, and transmits a fresh status update (preemption). On the other hand, in the HARQ protocol, signals from all previous transmission attempts are combined for decoding; and therefore, the probability of error decreases with every retransmission. In general, the error probability of each retransmission attempt depends on the particular combining technique used, as well as the channel conditions [5]. The AoI is defined as the time elapsed since the most upto-date packet at the destination is generated. Assume that the most up-to-date packet at the destination at time t has a time stamp of generation U (t), then the AoI at time t, denoted by aging due to erronous transmission aging due to resource constraint minimum AoI level t at i i n x x n x i n i i i n δt rt 1 2 3 4 5 3 4 2 3 1 1 2 3 0 0 0 1 2 0 1 0 0 0 0 0 0 Feedback NACK NACK ACK NACK ACK ACK Figure 2. Illustration of the AoI in a slotted status update system with HARQ. δt , is defined as: δt , t−U (t). Therefore, the AoI increases by one when a transmission fails, while it decreases to one (or, to the number of retransmissions in the case of HARQ) when a status update is successfully decoded. The system model and the evolution of AoI for a slotted status update system are illustrated in Figures 1 and 2, respectively. The probability of error after r retransmissions, denoted by g(r), depends only on r, and the particular HARQ scheme used for combining multiple transmission attempts. An empirical method to estimate g(r) is presented in [9]. As in any reasonable HARQ strategy, g(r) is non increasing in the number of retransmissions r, i.e., g(r1 ) ≥ g(r2 ) for all r1 ≤ r2 . To simplify the analysis, we assume that there is a maximum number of retransmissions rmax , and a packet is assumed to be successfully decoded after rmax transmissions, i.e., g(r) = 0, for all r ≥ rmax . Let δt ∈ Z+ denote the AoI at time slot t, and rt ∈ {0, . . . , rmax } denote the transmission attempt number. We define the state vector at time slot the t as st , (δt , rt ). At each time slot, the source node takes one of the three possible actions, denoted by a ∈ A, where A = {i, n, x}. It can i) remain idle (a = i); ii) generate and transmit a new status update packet (a = n); or, iii) retransmit the previously failed packet (a = x). The state transitions can be summarized as follows: The next state (δt+1 , rt+1 ) is determined stochastically depending on action at and the current state (δt , rt ): Pr(δt+1 = δt + 1, rt+1 = rt |at = i, δt , rt ) = 1 (1a) Pr(δt+1 = δt + 1, rt+1 = 1|at = n, δt , rt ) = g(0) (1b) Pr(δt+1 = 1, rt+1 = 0|at = n, δt , rt ) = 1−g(0) (1c) Pr(δt+1 = δt + 1, rt+1 = rt + 1|at = x, δt , rt ) = g(rt ) (1d) Pr(δt+1 = rt + 1, rt+1 = 0|at = x, δt , rt ) = 1−g(rt ) (1e) and P r(δt+1 , rt+1 |at , δt , rt ) is zero elsewhere. Note that if there is no resource constraint, remaining idle for a time slot is not a favorable action since it increases the AoI by 1. However, continuous transmission is typically not possible in practice due to energy or interference constraints. Thus, we impose a constraint on the average number of transmissions denoted by Cmax . This leads to the CMDP formulation, defined by the 5tuple {S, A, P, c, d} [10]. A countable set of states (δ, r) ∈ S and a finite set of actions A = {i, n, x} are already defined. P contains the transition probabilities outlined in (1). The instantaneous cost ct at time slot t is equal to age δt , and we use dt as the transmission count, that is, dt = 0 if at = i, or dt = 1 otherwise. Policies are represented by π : S × A → [0, 1], π ∈ Π, where at maps states st ∈ S into actions at ∈ A with some probability π(at |st ). We will use sπt = (δtπ , rtπ ) and aπt to denote the states and actions, respectively, induced by policy π. Let J π (s0 ) denote the infinite horizon average age, and C π (s0 ) denote the expected average number of transmissions when policy π is employed with initial state s0 . We restrict our attention to stationary policies, and denote the set of feasible policies by ΠF , such that C π ≤ Cmax , ∀π ∈ ΠF . We can state the CMDP optimization problem as follows, where Eπ [·] represents the expectation with respect to policy π and error probabilities g(r): Problem 1. " T # 1 π X π (2) δt s0 , Minimize J (s0 ) , lim sup E T →∞ T t=1 # " T 1 π X π π s.t. C (s0 ) = lim sup E 1[at 6= i] s0 ≤ Cmax . T →∞ T t=1 π ∗ We define a policy π ∗ to be optimal in ΠF if J ∗ , J π ≤ π J for all π ∈ ΠF . A policy is said to be deterministic if it chooses an action with certainty at each decision epoch, and for convenience we denote a deterministic policy simply by π [10]. Also, without loss of generalization, problem horizon is assumed to begin when the information at the destination is up-to-date, i.e. s0 = (1, 0); and s0 will be removed from the notation for simplicity. We assume throughout this paper that the MDP is unichain [10], [11], which is intuitive since any reasonable policy for Problem 1 results in an ergodic Markov chain. A. Structure of the Optimal Policy Note that a deterministic stationary policy which is optimal for countable-state average-cost MDPs exist and can be found under certain conditions defined in [11], [12]. However, the optimal policies for constrained MDPs are no longer limited to the set of deterministic policies [10], [13], and randomized stationary policies should be considered. Since the CMDP defined in Problem 1 has a single global constraint, Corollary 1 below follows immediately from Theorem 4.4 of [10]. Corollary 1. An optimal stationary policy for the CMDP in Problem 1 exists, and it is a randomized mixture of two deterministic policies. The next proposition formalizes the simple observation that retransmitting a packet immediately after a failed attempt is better than waiting some slots and then retransmitting (since the waiting time just increases the age in case of a successful retransmission, and the age will be the same in case of a failure). The proof of the proposition is trivial, and hence omitted. Proposition 1. There exists an optimal policy for Problem 1 that takes a retransmission action only after a failed transmission event, that is P r(a∗t+1 = x|a∗t = i) = 0. Based on Proposition 1, the transition for rt in (1) can be simplified when at = n, and we have rt+1 = 0 instead of rt+1 = rt . In the next section, the methodology to solve Problem 1 will be described. III. P RIMAL -D UAL A LGORITHM TO M INIMIZE AO I To solve the average cost CMDP in Problem 1, we adopt the Lagrangian primal-dual method [10], [13]. Similar methods have been adopted in other wireless network problems including [14], [15]. A. Relaxed Unconstrained MDP Lagrangian relaxation of the constraint with non-negative multiplier η can be written as: ! " T # T 1 π X π 1 X π π 1[at 6= i] , Jη = lim E δt − η Cmax − T →∞ T T t=1 t=1 (3) and the optimal Jη∗ for a given η is defined as Jη∗ , minπ Jηπ . Following the methodology proposed in [10], for a constant η, the above minimization is equivalent to an unconstrained average-cost MDP, in which the instantaneous overall cost becomes δt + η 1[aπt ∈ {n, x}]. Then, the problem is to minimize Jη which is the averagecost for the unconstrained problem for a given η. There exits an optimal stationary deterministic policy, and thus, the optimality equations can be written. Let h(δ, r) denote the differential cost (bias) function, and ρ represent the gain, which is an approximation of the average overall cost; i.e., Jη∗ → ρ [11]. The differential cost function h(δ, r) : S → R is defined as the difference of the value function V (δ, r) with respect to an arbitrary but fixed reference state (δ ref , rref ) [11], i.e. h(δ ref , rref ) = 0, and ∀(δ, r) ∈ S,  h(δ, r) + ρ = min δ + η · 1[a 6= i] + Eπ [h(δ ′ , r′ )] , a∈{i,n,x} (4) ′ ′ where (δ , r ) denotes the next state when decision a is taken at state (δ, r) with a transition matrix given in (1. Equations in (4) are also known as the Bellman optimality equations [11]. For countable S and finite A, there exists a differential cost function h(δ, r), ∀(δ, r) ∈ S, and a unique gain ρ, which satisfy the optimality equations in (4). Moreover, for a given η value the optimal stationary deterministic policy π ∗ (δ, r) is given by:  πη∗ (δ, r) ∈ arg min δ + η · 1[a 6= i] + Eπ [h(δ ′ , r′ )] . (5) a∈{i,n,x} Note that the state space of possible status age values is possibly countably infinite. In order to write a practical algorithm that solves the Bellman equations in (4), we truncate to the state space S N = {1, 2, . . . , N } × {0, 1, . . . , rmax } which approaches to the original countable state CMDP as N → ∞ [16], [7]. Under any reasonable policy for Problem 1, probability of visiting a state with a large age value decreases exponentially whereas the cost incurred due to a large age is polynomial, so it is intuitive to truncate to a large N . The state transition function when at = i, or at ∈ {n, x} but the transmission fails can be written as δt+1 = ⌊δt + 1⌋N , where y = ⌊x⌋N implies y = x if x ≤ N , and y = N otherwise; which provides the finite state space approximation similarly to [16], [7]. B. Relative Value Iteration Value iteration (VI) algorithm can be used to solve countable-state finite-action MDPs [11]. However, for averagecost problems with Bellman equations defined as in (4), value functions in VI generally do not converge and differences between successive value iterations approximate to the true value of Jη∗ . Due to possible large values, it may result in numerical instability [11]. Therefore, the relative value iteration (RVI) algorithm [11] is adopted to solve (4). Starting with an arbitrary but a fixed reference state (δref , rref ), a single value iteration for the RVI algorithm [11] is given as follows: Qn+1 (δ, r, a) ← δ + η · 1[aπ 6= i] + Eπ [hn (δ ′ , r′ )] , (6) Vn+1 (δ, r) ← min(Qn+1 (δ, r, a)), (7) hn+1 (δ, r) ← Vn+1 (δ, r) − Vn+1 (δ ref , rref ), (8) a where Qn (δ, r, a), Vn (δ, r) and hn (δ ′ , r′ ) denote the state action value function, value function and differential value function for iteration n, respectively. C. Finding the Approximate Lagrange Parameter η ∗ and Randomization We start with an initial parameter η0 for m = 0, and at each iteration, run the RVI algorithm and compute ηm+1 as follows: ηm+1 ← ηm + α(Cηm − Cmax ). (9) We continue iteration until convergence, and find the optimal parameter η ∗ . Note that, it is not straightforward to obtain two different η values for two different deterministic policies, such that the randomization between the two results in an optimal stochastic policy. Thus, a heuristic method will be adopted: after obtaining η ∗ , it can be perturbed by small ξ, and the optimal policies for Lagrange parameters η ∗ + ξ and η ∗ − ξ are computed and randomized with probabilities µ and 1 − µ, respectively. The randomization probability µ can be computed using the average power consumptions of Cη∗ +ξ and Cη∗ −ξ , such that µCη∗ +ξ + (1 − µ)Cη∗ −ξ = Cmax . The average transmission bη∗ +ξ , C bη∗ −ξ can be computed by empirical estimation, rates C and randomization probability µ is given by: µ= bη∗ +ξ Cmax − C . bη∗ −ξ − C bη∗ +ξ C (10) IV. AO I WITH C LASSICAL ARQ P ROTOCOL Now, assume that the system adopts the classical ARQ protocol; that is, failed transmissions are discarded at the destination. In this case, there is no point in re-transmitting an undecoded packet since the successful transmission probabilities are the same for a retransmission and the transmission of a new update. The state space reduces to δ ∈ {1, 2, . . . , N } as rt = 0, ∀t, and the action space to A ∈ {n, x}. The probability of error in a status update is p , g(0). State transitions in (1), Bellman optimality equations in (4) and the RVI algorithm can all be simplified accordingly. Thanks to these simplifications, we are able to provide a closedform solution to the corresponding unconstrained MDP with Lagrange relaxation. Lemma 1. The optimal policy that minimizes Jη with the standard ARQ protocol admits a deterministic threshold structure characterized as follows for some threshold value ∆: ( n if δ ≥ ∆, π(δ) = (11) i if δ < ∆. Proof. Proof is not included here due to space limitations, but will be provided in the extended version of the paper. Theorem 1. Optimal threshold value for the standard ARQ protocol is given by: p 2η(1 − p) + p − p ∗ ∆ = . (12) 1−p Proof. Proof will be provided in the extended version of the paper. Note that the optimal threshold value in (12) depends on η, which stands for the trade-off between the average AoI and the constraint. We can compute the average transmission rate for a given η using the optimal threshold policy in (12), denoted by Cη . An approximate solution for η ∗ can be obtained by solving Cη = Cmax . Together with (12) we can obtain the threshold value for the CMDP as follows: p 1 − . (13) ∆∗ = Cmax (1 − p) 1 − p The threshold policy defined in (13) is the optimal deterministic policy for the standard ARQ case when randomization is not considered, which is not sufficient for the CMDP. Corollary 2. The optimal policy for the constrained average AoI problem with standard ARQ is a randomized mixture of two different threshold policies defined in Theorem 1. Since we have the threshold in closed-form for the optimal deterministic policy, which corresponds to η ∗ ; we can compute ∆1 , ∆2 directly by using ∆∗ , instead of finding η1 , η2 Algorithm 1: Average-cost modified SARSA with softmax 1 2 3 4 Input : Lagrange parameter η n ← 0 /* time iteration τ ← 1 /* softmax temperature parameter ×3 QN×M ← 0 , ρ ← 0 /* initialization η */ */ */ foreach n do foreach a ∈ A do 5 exp(−Qη (sn , a)/τ ) π(a|sn ) = X exp(−Qη (sn , a′ )/τ ) 6 a′ ∈A end Sample an from π(a|Sn ), observe next state sn+1 and cost cn = δn + η1{an =1,2} foreach a ∈ A do exp(−Qη (sn+1 , an+1 )/τ ) π(a|sn+1 ) = X exp(−Qη (sn+1 , a′n+1 )/τ ) 7 8 9 10 a′n+1 ∈A 11 12 13 14 15 16 17 18 end end Sample an+1 from π(an+1 |sn+1 ) Update Q√ η (sn , an ) as: αn ← 1/ n Qη (sn , an ) ← Qη (sn , an ) + αn [cn − ρ + Qη (sn+1 , an+1 ) − Qη (sn , an )] /* update ρ at every step */ ρ ← ρ + 1/n[cn − ρ] n← n+1 first, and then computing ∆1 , ∆2 accordingly. We propose a heuristic policy (optimal if (∆, C ∆ ) pairs form a convex set) in order to minimize the average AoI with standard ARQ by randomizing between the two policies corresponding to the nearest integers to ∆∗ in (13), that is ∆1 , ⌊∆∗ ⌋, ∆2 , ⌈∆∗ ⌉. Randomization coefficient µ ∈ [0, 1] can be computed by using the power consumptions C ∆j of the deterministic threshold policies corresponding to ∆j , j = 1, 2. From (13) we have: C ∆j , (1 − p)−1 (∆j + p/(1 − p))−1 . (14) Therefore, randomization factor µ of stochastic policy can be found using ∆j , j = 1, 2 as in 10, and the resultant algorithm is a threshold policy that uses ∆1 on the threshold with with probability µ and ∆2 with probability (1 − µ) at each slot. V. L EARNING TO MINIMIZE AO I IN AN UNKNOWN ENVIRONMENT Here we consider a practical scenario, in which the source node may not have a-priori information about the channel or the decoding probabilities at the destination, or these may change over time. Therefore, an online learning algorithm is employed to learn g(r) over time without degrading the performance significantly. The literature for average-cost reinforcement learning (RL) is quite limited compared to discounted cost problems. R-learning [17] is an average-cost RL algorithm which is an off-policy method similar to Q-learning [18], and initially proposed with a uniform exploration strategy (ǫgreedy ). For the average AoI minimization problem in Problem 1, a modified version of the R-learning algorithm is employed. In Figure 3. Deterministic policies πη−ξ (top) and πη+ξ (bottom) when Cmax = 0.4, p0 = 0.3, and rmax = 9, for a time horizon T = 1000. The results are averaged over 1000 trials. (Blue circles, red stars and green diamonds represent actions πη (δ, r) = i, n and x, respectively.) Algorithm 1 we use the softmax exploration strategy instead of ǫgreedy for the current and the next states [18]. Then, Algorithm 1 becomes an on-policy RL algorithm. Moreover, we update the gain ρ at every time slot based on the empirical average instead of updating at non-explored time slots and losing information. The resultant algorithm is called averagecost SARSA with softmax. VI. N UMERICAL R ESULTS Decoding error probability is assumed to be given by g(r) , p0 21−r , where p0 denotes the failure probability of the first transmission, and r is the retransmission count. The exponential behavior of the error probability follows from previous research on HARQ [5], [9]. In Figure 3, we illustrate the deterministic policies obtained by RVI and η search for given Cmax , rmax and p0 values. Final policies are generated by randomizing between πη−ξ and πη+ξ . As it can be seen from the figure, the designed policy transmits less as η increases, and vice versa. Figure 4 illustrates the performance of the proposed randomized HARQ policy with respect to Cmax for different p0 values. We also include the performance of deterministic and randomized threshold policies with ARQ. As expected, average AoI can be reduced by randomization between two deterministic threshold policies. We observe that average AoI decreases exponentially with respect to Cmax . The average AoI also decreases with decreasing p0 and with increasing rmax as expected. Figure 5 shows the evolution of the average AoI over time when the proposed average-cost SARSA learning algorithm is employed. It can be observed that the average AoI achieved by Algorithm 1 converges to the one obtained from the RVI algorithm which has a priori knowledge of g(r). Average AoI achieved by the proposed online learning algorithm is 12 12 p =0.5, ARQ, deterministic RL, p 0 =0.5, r max =3 0 p =0.5, ARQ, randomized RVI, p 0 =0.5, r max =3 p0=0.5, rmax=3, HARQ 0 8 p =0.1, r 0 max max RVI, p 0 =0.2,r max =9 =3, HARQ =9, HARQ 6 Average AoI p =0.3, r Average AoI 10 0 10 8 RL, p 0 =0.2, r max =9 6 4 4 2 2 0 0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Average number of transmissions, C max Figure 4. Expected average AoI J π with respect to Cmax for ARQ and HARQ protocols for different p0 and rmax values. Time horizon is set to T = 1000, and the results are averaged over 1000 trials. 0.2 0.3 0.4 0.5 0.6 0.7 0.8 Average number of transmissions, C max Figure 6. Performance of the RL (average-cost SARSA) with respect to RVI Algorithm for n = 1000 iterations, and values are averaged over 1000 trials for different p0 and rmax values (both the mean and the variance are shown). R EFERENCES Figure 5. Performance of the average-cost SARSA for rmax = 9, p0 = 0.2, η = 10 and n ≤ 10000, averaged over 1000 trials (both the mean and the variance are shown). presented in Figure 6 as a function of Cmax , which shows that the performance is close to that of RVI. VII. C ONCLUSIONS We have considered a wireless system transmitting timesensitive data over an imperfect channel with the average AoI as the performance measure, which quantifies the timeliness of the data available at the destination. Considering both the classical ARQ and the HARQ protocols, preemptive scheduling policies have been proposed by taking into account retransmissions under a resource constraint. In addition to identifying a randomized threshold structure for the optimal policy when the error probabilities are known, an efficient RL algorithm is also proposed for practical applications, when the system characteristics may not be known in advance. The algorithms designed in this paper are relevant to other systems concerning the timeliness of information, and the proposed methodology can be used in other CMDP problems. As a future work, the problem will be extended to time-correlated channel statistics in a multi-user setting. [1] S. Kaul, M. Gruteser, V. Rai, and J. Kenney, “Minimizing age of information in vehicular networks,” in IEEE Coms. Society Conf. on Sensor, Mesh and Ad Hoc Coms. and Nets., June 2011, pp. 350–358. [2] S. Kaul, R. Yates, and M. Gruteser, “Real-time status: How often should one update?” in INFOCOM, Proc. IEEE, March 2012, pp. 2731–2735. [3] K. Chen and L. Huang, “Age-of-information in the presence of error,” in IEEE Int’l Symp. on Inf. Theory (ISIT), July 2016, pp. 2579–2583. [4] I. Kadota, E. Uysal-Biyikoglu, R. Singh, and E. Modiano, “Minimizing age of information in broadcast wireless networks,” in Annual Allerton Conf. On on Communication, Control, and Computing, September 2016. [5] P. Frenger, S. Parkvall, and E. Dahlman, “Performance comparison of harq with chase combining and incremental redundancy for hsdpa,” in IEEE Vehicular Technology Conf. Proc., vol. 3, 2001, pp. 1829–1833. [6] M. Kashef and A. Ephremides, “Optimal packet scheduling for energy harvesting sources on time varying wireless channels,” Journal of Communications and Networks, vol. 14, no. 2, pp. 121–129, April 2012. [7] Y. P. Hsu, E. Modiano, and L. Duan, “Age of information: Design and analysis of optimal scheduling algorithms,” in 2017 IEEE International Symposium on Information Theory (ISIT), June 2017, pp. 561–565. [8] E. Najm, R. D. Yates, and E. Soljanin, “Status updates through M/G/1/1 queues with HARQ,” CoRR, vol. abs/1704.03937, 2017. [9] V. Tripathi, E. Visotsky, R. Peterson, and M. Honig, “Reliability-based type ii hybrid arq schemes,” in Communications, 2003. ICC ’03. IEEE International Conference on, vol. 4, May 2003, pp. 2899–2903 vol.4. [10] E. Altman, Constrained Markov decision processes, ser. Stochastic modeling. Boca Raton, London: Chapman & Hall/CRC, 1999. [11] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. New York, NY, USA: John Wiley & Sons, 1994. [12] L. I. Sennott, “Average cost optimal stationary policies in infinite state markov decision processes with unbounded costs,” Operations Research, vol. 37, no. 4, pp. 626–633, 1989. [13] ——, “Constrained average cost Markov decision chains,” Probability in Eng. and Informational Sciences, vol. 7, no. 1, p. 6983, 1993. [14] M. H. Ngo and V. Krishnamurthy, “Monotonicity of constrained optimal transmission policies in correlated fading channels with arq,” IEEE Trans. on Signal Processing, vol. 58, no. 1, pp. 438–451, Jan 2010. [15] A. Roy and A. Karandikar, “Optimal radio access technology selection policy for lte-wifi network,” in Int’l Symp. Modeling and Opt. in Mobile, Ad Hoc, and Wireless Nets. (WiOpt), May 2015, pp. 291–298. [16] E. Altman, R. E. Azouzi, D. S. Menasché, and Y. Xu, “Forever young: Aging control in dtns,” CoRR, vol. abs/1009.4733, 2010. [17] S. Mahadevan, “Average reward reinforcement learning: Foundations, algorithms, and empirical results,” Machine Learning, vol. 22, no. 1, pp. 159–195, 1996. [18] R. S. Sutton and A. G. Barto, Introduction to Reinforcement Learning, 1st ed. Cambridge, MA, USA: MIT Press, 1998.
7
Class-Splitting Generative Adversarial Networks Grinblat, G.L.1 , Uzal, L.C.1 and Granitto, P.M.1 arXiv:1709.07359v1 [stat.ML] 21 Sep 2017 1 CIFASIS, French Argentine International Center for Information and Systems Sciences, UNR-CONICET, Argentina Figure 1: Samples generated with our Splitting GAN method with supervised training on CIFAR-10 dataset. Each line has samples of one of the original classes. Each side has samples corresponding to one of the two clusters generated for each class. We use ResNet-B architecture (see text for details). Abstract when no class information is available, i.e. in the unsupervised setup. Our generated samples reach Generative Adversarial Networks (GANs) produce state-of-the-art Inception scores for CIFAR-10 and systematically better quality samples when class STL-10 datasets in both supervised and unsuperlabel information is provided., i.e. in the con- vised setup. ditional GAN setup. This is still observed for the recently proposed Wasserstein GAN formulaIntroduction tion which stabilized adversarial training and al- 1 lows considering high capacity network architectures such as ResNet. In this work we show how The irruption of Generative Adversarial Nets to boost conditional GAN by augmenting available (GAN) [5] produced a great leap for image data class labels. The new classes come from cluster- generation. Samples were generated simply by aping in the representation space learned by the same plying a neural network transform to an input ranGAN model. The proposed strategy is also feasible dom vector sampled from a uniform distribution. 1 There is no need for any Markov chains or unrolled approximate inference networks during either training or generation of samples [5]. GAN based generative models did not take long to reach impressive image quality [13, 14, 17, 10] at least for some specific datasets. However, current GAN models cannot produce convincing samples when trained on datasets of images with high variability, even for relatively low resolution images. On the other hand, it is observed that sample quality improves when class information is taken into account in a conditional GAN setup [11, 12]. These findings suggest that it is hard to learn a multimodal distribution from a smooth transform of a uniform (or Gaussian) distribution and that providing categorical class information to the generator alleviates this problem. Our proposal is inspired in two observations. First, as mentioned above, conditioning generation with categorical class labels with high level of abstraction improves image quality. Second, as early observed in [5, 13], the adversarial network pair learns an useful hierarchy of representations in an unsupervised setup. We propose to exploit the same representation space learned by the GAN model in order to generate new class labels with a high level of abstraction. This is done by applying a simple clustering method in this representation space. By conditioning generation with this new class labels the model is able to generate better samples. This can be done either when prior class information is available or not. The main contributions of the present paper are1 : Figure 2: Class-conditioned samples generated with WGAN-GP method [7] over the ResNet-B architecture for CIFAR-10 dataset. Each row has samples of a given class. art Inception scores for CIFAR-10 and STL-10 datasets in both tasks. 2 Background In the original GAN formulation [5], the generator is a neural network that transform noise input z ∼ p(z) into fake samples and the discriminator D is a neural network with a single scalar output with a sigmoid activation. This output is interpreted as the model probability for its input being a real image from the dataset distribution against being a fake image sampled by generator G. The discriminator D is trained using the standard binary classification formulation by minimizing the binary cross-entropy between fake and real distributions. On the other hand, the generator G is simultaneously trained to mislead the discriminator. This is accomplished in practice by updating G parameters minimising the same loss but with fake samples tagged with a ‘true’ label [5]. In other words, the discriminator is updated by • We propose a method for increasing the number of class labels during conditional GAN training based on clustering in the representation space learned by the same GAN model. We base our implementation on the more stable Wasserstein GAN formulation [2, 7]. • We show an effectively way of adapting networks architecture to handle this increasing number of classes. • We show that this splitting GAN strategy improves samples quality both in the supervised and unsupervised tasks, reaching state-of-the1 The source code will be available at https://github. com/CIFASIS 2 Figure 3: Real CIFAR-10 samples corresponding to the 20 clusters found by our method. Each line is divided in the same way as in Figure 1. gradient descent over a negative log likelihood loss of the generated samples by adding more structure to the GAN latent space and an auxiliary classiLD = − E [log(D(x̃))]− E [log(1−D(G(z)))], fier. This approach requires the dataset to include x∼Pr z∼p(z) class labels, i.e. to work in a supervised setting. (1) The generator receives the noise vector z and also while the generator minimizes the selected label c so that the generated sample LG = − E [log(D(G(z)))]. (2) is a function of both. Furthermore, the discrimiz∼p(z) nator has, in addition to the usual objective, the task of correctly classifying the real and generated The main issue in the original GAN formula- samples (through an auxiliary classifier). The gention was the instability of the training process that erator is optimized not only to deceive the discrimmade very hard to improve architectures and to inator, but also to generate fake samples that minscale up to bigger images. In [13] a deep convo- imize the auxiliary classifier error, i.e. to produce lutional architecture was proposed for both gen- well class-defined samples. erator and discriminator which presents some degree of stability for adversarial training. This work was the first one producing convincing image sam- 2.2 WGAN ples for datasets with low variability (Bedrooms and Faces) and relatively low resolution (64x64). In order to address the problem of instability in However, standard GAN formulation fails to gen- GAN training, Arjovsky et al. in a series of works erate globally consistent samples when trained on [1, 2] proposed a reformulation of the function to be optimized. They argue that the original loss funcdatasets with high variability like ImageNet. tion presents discontinuities and vanishing gradients with respect to generator parameters. Instead, 2.1 AC-GAN they proposed a distance for distributions known In order to tackle datasets with high variability, as Earth-Mover distance or Wasserstein-1, which Odena et al. [12] proposed to improve the quality captures the cost of transporting mass in order to 3 transform one distribution into the other. From this distance they derive the WGAN loss function for the minimax objective min max E [D(x)] − G D∈D x∼Pr E [D(G(z))] (3) z∼p(z) where D (called critic in WGAN formulation) is not anymore a binary classifier and is restricted to be in the set D of 1-Lipschitz functions. Again, z is a noise vector sampled from a simple distribution (uniform or Gaussian distribution). The Lipschitzness of D was imposed by weight clipping in this first version of WGAN. The importance of Arjovsky’s contribution lies on a gain in the robustness of the adversarial training process and a reduction in the frequency of the mode collapse phenomenon. Furthermore, the proposed loss function correlates well with the observed sample quality as opposed to the original GAN loss which gives little information about training progress. Figure 4: Samples generated with the ResNet-B architecture trained with Splitting GAN over CIFAR10 without class labels (unsupervised). is the most recurrent benchmark for image generation in GAN literature. In the unsupervised setting (without using any class information) they reach 2.2.1 WGAN-GP the state-of-the-art, while in the supervised case An improved version of WGAN was recently pro- (following the strategy of AC-GAN and without posed by Gulrajani et al. [7]. They found that the tuning any hyperparameter nor architecture) they 2 weight clipping can cause convergence problems in reach the second place behind SGAN [8] . All this some settings and propose to enforce the Lipschitz advantageous features made –to our knowledge– constraint on the critic D by penalizing its gradi- WGAN the current standard formulation for adversarial training. ent’s norm. The penalty term is computed over a set of random points x̂ uniformly sampled from straight lines Our Method: Splitting between real and fake sample points. Naming as Px̂ 3 the latter distribution, the new loss can be written GAN as The main idea is to generate new artificial classes L = E [D(x̃)] − E [D(x)] based on the representation learned by the last hidx∼Pr x̃∼Pg den layer of the critic after enough training itera  +λ E (k∇x̂ D(x̂)k2 − 1)2 (4) tions. This is done by applying k-means to each x̂∼Px̂ class set in this representation space. We divide each set in two clusters only when the class has where the penalty coefficient is set to λ = 10. This improved WGAN formulation exhibits high more samples than a certain threshold. After that, robustness against changing model architecture. training is resumed replacing the old labels with The authors tested six different network designs the new ones for the entire dataset. With this procedure we need to make two mifor both G and D, which typically break standard GAN training but show stable WGAN training for nor modifications to the model architecture before all cases. Furthermore, WGAN formulation helps resuming learning: achieving better quality samples. Quantitative re2 By simply duplicating the number of feature maps of sults are reported by the authors in terms of the Gulrajani’s networks we found WGAN outperforms SGAN Inception score [14] over CIFAR-10 dataset, which score. See Sec. 4 4 1. The auxiliary classifier needs to predict a different number of classes, so we extend the last layer of this classifier adding a copy of the weights of the parent class for each child class. Method Improved GAN (-L+HA) [14] EGAN-Ent-VI [4] DFM [15] Splitting GAN ResNet-B (ours) WGAN-GP ResNet-B WGAN-GP ResNet-A [7] Splitting GAN ResNet-A (ours) Inception Score 6.86 ± 0.06 7.07 ± 0.10 7.72 ± 0.13 7.80 ± 0.08 7.81 ± 0.10 7.86 ± 0.07 7.90 ± 0.09 2. In the conditional WGAN-GP implementation [6], the class labels are injected in each batch normalization layer of the generative network by setting a specific gain and bias parameters (γ and b) for each class. We follow this strategy in our proposal and, for the class splitting, we set the new pair (γ, b) for each child class as Table 1: Unsupervised Inception scores on CIFARγchild = γf ather +∆γ and bchild = bf ather +∆b, 10 with initialization ∆γ = 0 and ∆b = 0 when the new classes are created. This formulation Method Inception Score implies that child classes start both with the father class params and they eventually beImproved GAN [14] 8.09 ± 0.07 come different. AC-GAN [12] 8.25 ± 0.07 WGAN-GP ResNet-A [7] 8.42 ± 0.10 SGAN [8] 8.59 ± 0.12 4 Results WGAN-GP ResNet-B 8.67 ± 0.14 Splitting GAN ResNet-A (ours) 8.73 ± 0.08 To demonstrate the effectiveness of our proposal, Splitting GAN ResNet-B (ours) 8.87 ± 0.09 we conducted several experiments with CIFAR-10 [9], a dataset containing 50000 32x32 images corresponding to 10 different classes, and the unlabeled Table 2: Supervised Inception scores on CIFAR-10 set of STL-10, containing 100000 larger and more diverse images [3]. We based our model on the improved WGAN algorithm proposed by Gulrajani et al. [7, 6]. In all cases, during training, we sample ture with the original WGAN-GP algorithm. The 50000 images from the current model to select the results are detailed in Table 1 and Table 2. best one so far based on the Inception score. FiAlso for comparison, samples obtained with the nally, we sample another 50000 with the best model WGAN-GP supervised model (Figure 2) and obin order to calculate the reported score, following tained with the proposed method (Figure 1) are [12]. shown. Figure 3 has real samples of CIFAR-10 corresponding to each of the 20 clusters found. 4.1 CIFAR-10 Figures 4 and 5 show generated images and clusters found in the unsupervised test. With CIFAR-10, an unsupervised test was performed starting from all the examples considered as a single class and dividing them into two clusMethod Inception Score ters every approximately 10 epochs. This was done with the Gulrajani’s ResNet architecture without Original Dataset [15] 26.08 ± 0.26 changes (named ResNet-A) and a modified version DFM [15] 8.51 ± 0.13 (ResNet-B) doubling the number of maps in each WGAN-GP ResNet-A 9.05 ± 0.12 convolutional layer. A supervised test was also conSplitting GAN ResNet-A (ours) 9.50 ± 0.13 ducted with these two architectures, starting from the original 10 classes of CIFAR and dividing them into two at approximately 20 training epochs. For comparison we also trained the ResNet-B architec- Table 3: Unsupervised Inception scores for STL-10 5 Figure 6: Images generated by the model trained on STL-10. 4.2 STL-10 We treat STL-10 in the same way as [15]. That is, we downsample each dimension by 2, resulting in 48x48 RGB images. We tested our algorithm with the ResNet-A architecture, with the minimum changes necessary for the model to generate 48x48 images. Table 3 shows the resulting Inception score. Figures 6 and 7 show the generated images and the clusters found by the method. 5 Discussion Several things can be observed from the results presented in the previous section. First, regarding the obtained clusterization of the real samples (Figure 3 for the supervised case and Figure 5 for the unsupervised one), we can visually find rules that define the vast majority of samples, for at least several clusters. As an example, in the supervised case (Figure 3) we can see in the left side of the fourth row cats looking forward and in the left side of the eighth row horse side views. Compare with cats and horses in several positions corresponding to the Figure 5: The 25 clusters found in the unsupervised clusters in the right side. In the unsupervised case case (real CIFAR-10 samples). Each line has two (Figure 5) we can see a tendency to generate clusdifferent clusters. ters for cars, planes or ships, but in general they 6 are much more mixed. Regarding the generated samples in the supervised case (Figure 1 for our method and Figure 2 for WGAN-GP), we can see that the class splits allows the model to generate better samples. Not only for the more uniform clusters such as the horse side views or the cats looking forward, but for the whole original class. Compare for example the fourth row (cats) or the eighth row (horses) in Figure 1 with those rows in Figure 2, corresponding to the same model trained with WGAN-GP. Note that these samples do not differ too much from those shown in [7]. Even in classes where the clustering step does not seem to have found an obvious separation rule, such as cars (second row), a better sample quality can be observed than in the original WGAN-GP. In the unsupervised case with CIFAR-10 (Figure 4), although the Inception score is similar than the one obtained by the state-of-the-art so far, the samples generated seem to be of a higher quality. Nevertheless, they do not reach the quality of the generated images in a supervised setting. It is always advisable to start the division into clusters from the predefined classes, if this information is available. In the case of STL-10 (Figure 6), there is a noticeable difference in the Inception score. The reason of this may be that STL-10 is a much more diverse dataset, so a division into a large number of classes can be beneficial. It should be noted that in this case the state-of-the-art is much further from the actual dataset score than in the case of CIFAR-10. The success of our Splitting GAN method suggests that reinjecting high level information from critic to the generative model improves sampling quality. This breaks the strictly adversarial training and allows some degree of information sharing between both networks. We believe that this simFigure 7: The 15 clusters found by the model (real ple (but successful) strategy could inspire a new STL-10 samples). and better adversarial training formulation where a small amount of high level information directly flows from critic’s last layers to generator input. 6 Conclusions Work and Future In this work we showed that our Splitting GAN method allows generating better images. This can 7 be seen in the results on CIFAR-10 and STL-10 for which clearly better images were obtained. This is supported by an Inception score well above the previous state-of-the-art for both datasets. A future direction of research to improve the current Splitting GAN version is oriented to understand how a given model architecture or dataset determines the optimal number of clusters (or classes). Also, clusterization could be enhanced during adversarial training with the addition of an extra loss term like in [16]. We are also currently working in a generalization of the Splitting GAN ideas following two paths: First, making the high level information from the critic’s representation flows continually to the generator, avoiding special purpose steps at predefined times in the training process. Second, avoiding the hard threshold clustering step and replacing it with some sort of continuous representation capturing the same amount of information. A. Courville, and Y. Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014. [6] I. Gulrajani. Improved Training of Wasserstein GANs. https://github.com/igul222/ improved_wgan_training, 2017. [Online; accessed 18-Sep-2017]. [7] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. Courville. Improved training of wasserstein gans. arXiv preprint arXiv:1704.00028, 2017. [8] X. Huang, Y. Li, O. Poursaeed, J. Hopcroft, and S. Belongie. Stacked generative adversarial networks. arXiv preprint arXiv:1612.04357, 2016. [9] A. Krizhevsky and G. Hinton. Learning multiple layers of features from tiny images. 2009. [10] X. Mao, Q. Li, H. Xie, R. Y. Lau, Z. Wang, and S. P. Smolley. Least squares generative adversarial networks. arXiv preprint The authors acknowledge grant support from ANArXiv:1611.04076, 2016. PCyT PICT-2016-4374. [11] M. Mirza and S. Osindero. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784, 2014. References 7 Acknowledgements [1] M. Arjovsky and L. Bottou. Towards princi- [12] A. Odena, C. Olah, and J. Shlens. Conditional image synthesis with auxiliary classifier pled methods for training generative adversarGANs. In D. Precup and Y. W. Teh, editors, ial networks. In International Conference on Proceedings of the 34th International ConferLearning Representations 2017, 2017. ence on Machine Learning, volume 70 of Proceedings of Machine Learning Research, pages [2] M. Arjovsky, S. Chintala, and L. Bot2642–2651, International Convention Centre, tou. Wasserstein gan. arXiv preprint Sydney, Australia, 06–11 Aug 2017. PMLR. arXiv:1701.07875, 2017. [3] A. Coates, A. Ng, and H. Lee. An analysis of [13] A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep single-layer networks in unsupervised feature convolutional generative adversarial networks. learning. In Proceedings of the fourteenth inarXiv preprint arXiv:1511.06434, 2015. ternational conference on artificial intelligence and statistics, pages 215–223, 2011. [14] T. Salimans, I. Goodfellow, W. Zaremba, V. Cheung, A. Radford, X. Chen, and [4] Z. Dai, A. Almahairi, P. Bachman, E. Hovy, X. Chen. Improved techniques for training and A. Courville. Calibrating energygans. In D. D. Lee, M. Sugiyama, U. V. based generative adversarial networks. arXiv Luxburg, I. Guyon, and R. Garnett, editors, preprint arXiv:1702.01691, 2017. Advances in Neural Information Processing [5] I. Goodfellow, J. Pouget-Abadie, M. Mirza, Systems 29, pages 2234–2242. Curran AssoB. Xu, D. Warde-Farley, S. Ozair, ciates, Inc., 2016. 8 [15] D. Warde-Farley and Y. Bengio. Improving generative adversarial networks with denoising feature matching. In International Conference on Learning Representations 2017, 2017. [16] Y. Wen, K. Zhang, Z. Li, and Y. Qiao. A discriminative feature learning approach for deep face recognition. In European Conference on Computer Vision, pages 499–515. Springer, 2016. [17] J. Zhao, M. Mathieu, and Y. LeCun. Energybased generative adversarial network. arXiv preprint arXiv:1609.03126, 2016. 9
1
i F WLBP: A Scale Invariant Descriptor for Texture Classification arXiv:1801.03228v1 [cs.CV] 10 Jan 2018 Swalpa Kumar Roy, Nilavra Bhattacharya, Bhabatosh Chanda, Bidyut B. Chaudhuri, Life Fellow, IEEE, and Dipak Kumar Ghosh Abstract—In this paper we propose a novel texture recognition feature called Fractal Weighted Local Binary Pattern (FWLBP). It has been observed that fractal dimension (FD) measure is relatively invariant to scale-changes, and presents a good correlation with human perception of surface roughness. We have utilized this property to construct a scale-invariant descriptor. We have sampled the input image using an augmented form of the local binary pattern (LBP), and then used an indexing operation to assign FD weights to the collected samples. The final histogram of the descriptor has its features calculated using LBP, and its weights computed from the FD image. The proposed descriptor is scale, rotation and reflection invariant, and is also partially tolerant to noise and illumination changes. In addition, it is also shown that the local fractal dimension is relatively insensitive to the bi-Lipschitz transformations, whereas its extension is able to correctly discriminate between fundamental texture primitives. Experimental results show the proposed descriptor has better classification rates compared to the state-of-the-art descriptors on standard texture databases. Index Terms—Fractal Dimension (FD), Fractal weighted local binary pattern (FWLBP), Scale invariance, Scale space, Texture classification C I. I NTRODUCTION ONSTRUCTING effective texture feature is a major challenges in computer vision [1]. It has received a lot of attention in the past decades due to its value in understanding how human beings recognize textures. A crucial issue of texture analysis is constructing an effective texture representation. There are primarily five methodologies of texture representation: statistical, geometrical, structural, model-based, and signal processing based [2], [3]. In recent literature, two categories of texture classification approaches dominate current research, namely texture descriptor based methods [4], [5] and deep learning based methods. In the second category, a convolutional neural network (C NN) is trained to classify the texture images [6], [7]. The deep learning based methods offer good classification performance, however it has following limitations: it requires a large amount of data and hence is computationally expensive to trains. S. K. Roy and B. B. Chaudhuri are with the Optical Character Recognition Lab, Computer Vision and Pattern Recognition Unit at Indian Statistical Institute, Kolkata, India (email: [email protected]; [email protected]). Nilavra Bhattacharya is with the School of Information, The University of Texas, Austin, USA (email: [email protected]). B. Chanda is with the Image Processing Lab, Electronics and Communication Sciences Unit at Indian Statistical Institute, Kolkata, India (email: [email protected]). D. K. Ghosh is with the Department of Electronics & Communication Engineering, National Institute of Technology Rourkela, Orissa, India (email: [email protected]) Basically the complex models take weeks to train using several machines equipped with expensive GPUs. Also, at present, no strong theoretical foundation on topology/training method/flavor/hyper-parameters for deep learning exist in the literature. On the other hand, the descriptor based methods have the advantage of ease of use, data independence, and robustness to real-life challenges such as illumination and scale differences. In this category of methods the design of effective texture descriptor is regarded as extremely important for texture recognition. A picture may be captured under geometric and photometric varying conditions. An ideal model for describing and recognizing textures should be able to capture essential perceptual properties of the texture. It should be robust enough against changes, like view-point alteration, luminance variation, image rotation, reflection, scale change, and geometry of the underlying surface. Attention has been focussed on the design of local texture descriptors capable of achieving local invariance [8]–[11]. The search for invariant descriptors started in the 1990s [12]. Kashyap and Khotanzad first proposed a circular autoregressive dense model [13] to study rotation invariant texture classification. Many other models including multiresolution [14], hidden Markov model [15], and Gaussian Markov model [16] were explored to study rotation invariance. More recently Varma and Zisserman [10] proposed to learn a rotation invariant texton dictionary from a training set, and then classify the texture image based on its texton distribution. They also proposed another texton based algorithm [11] by using the local image patch to represent the feature directly. In addition some works have been done on scale and affine invariant feature extraction in texture classification. Among them Varma and Garg [17] extracted a local fractal vector for each pixel, and computed a statistical histogram. Liu and Fieguth [18] applied random projection for densely sampled image patches, and extracted the histogram signature. Yao and Sun [19] normalized statistical edge feature distribution to resist the variation in scale. Lazebinik et al. [20] and Zhang et al. [8] detected Harris and Laplacian key points for extracting texture signatures. Recently, global scale invariant feature extraction methods drew more attention because local scale normalization is slow because of pixel by pixel operations are needed there. Xu et al. [21] and Quan et al. [5] have classified the image pixels into multiple point sets by gray intensities or local feature descriptors. Instead of extracting scale invariant features, pyramid histograms with shifted matching scheme was proposed by some researchers [9], [22]. Roy et al. [23] introduced a complete dual-cross pattern (C DCP) to address ii the scale and rotational effects in unconstrained texture classification. Generally, a texture can be characterized by geometric multi-scale self-similar macro-structure (like fractal dimension and L BP). Geometric structure of object in the image vary with scale changes while illumination change does not change the object structure. Several studies have been done using fractal based texture classification [17], [24]–[26] but the drawback of these techniques are that the value of fractal dimension is continuous, so a quantization stage is required to compute the histogram. However, an accurate quantization depends upon a excessive training with large number of samples. In this paper we approach the quantization problem by proposing a new descriptor called Fractal Weighted Local Binary Pattern (F WLBP) based on a commonly used method of combining fractal dimension proposed by Chaudhuri and Sarkar [27]. This method is based on differential boxcounting (D BC) algorithm [28]. Where instead of directly measuring a texture surface, the measures at different scales are obtained by means of counting the number of boxes of different size, which can cover the whole surface. In this paper, our main contributions are summarized below: • We propose a simple, effective, yet robust fractaldimension based texture descriptor called Fractal Weighted Local Binary Pattern (Sec. III-A) for texture classification. • The F WLBP descriptor achieves sufficient invariance to address the challenges of scale, translation, and rotation (or reflection); and is also partially tolerant to noise and illumination for texture classification. • The proposed algorithm takes a reasonable amount of time in the feature extraction stage (Sec. III-B). • We experimented and observed that our proposed descriptor outperforms the traditional L BP based and other stateof-the-art methods on different texture databases, such as KTH-TIPS and CUReT (Sec. IV). The remaining of this the paper is organized as follows. Sec. II deals with the mathematical background of fractal dimension, and our approach to convert the input image to its FD form. The proposed F WLBP feature extraction scheme is presented in Sec. III. In Sec. IV the performance of texture classification is compared with the state-of-the-art methods. Finally, concluding remarks are drawn in Sec. V. II. F RACTAL D IMENSION A fractal is a geometrical set whose Hausdorff - Besicovitch dimension is strictly greater than its topological dimension [30]. Mandelbrot introduced the term fractal to describe nonEuclidean, self-similar structures. The Fractal Dimension (FD) of a structure gives an idea of its texture complexity, which can be used to measure, analyse and classify shape and texture. Fractal surfaces show the property of self-similarity. In the Euclidian n-space, a set S is said to be self-similar, if S is the union of Nr (s) distinct (non-overlapping) copies of itself, each of which is scaled down by a ratio r > 0. Let D(s) (i.e. an exponential function of r), where Nr (s) = k( 1r ) D(s) is a density function, and k is a constant. Then 1 log Nr (s) = log k + D(s) · log (1) r Then, the local Fractal Dimension (FD) of s becomes log(Nr (s)) D(s) = lim . (2) r→0 log(1/r) It is difficult to compute the local Fractal dimension D using Eqn. (2) directly. In our implementation (Fig. 1), we transform the texture images into FD images using the differential boxcounting (D BC) algorithm [28]. To achieve scale-invariance, we construct a Gaussian scale space [31] using Eqn. (3): Z Γx,y,r = hGr (x, y)|I(x, y)i = Gr (x, y)I(x, y)dxdy. x,y∈R (3) In Eqn (3) a convolution formalism may be used when convolution across the entire image is required. However, here an inner product formalism (h.|.i) is more convenient where Gr is a Gaussian smoothing kernel with variance r: −kx2 k 1 Gr (x) = √ exp 2σ2 r 2π As the 2D Gaussian function is separable [32], [33], its convolution with the input image can be efficiently computed by applying two passes of the 1D Gaussian function in the horizontal and vertical directions: Gr (x, y, r) = Gr (x)Gr (y). The scaling operation to obtain Ir = Gr ∗ I (where ∗ represents convolution operator) can be computed efficiently and stably because of the properly localization of the Gaussian both in space and frequency [34] even if the input image (I) is the result of physical measurement, so called directly sampled [35]. After constructing the Gaussian scale space, we use the D BC algorithm on each layer of the scale space to generate a set of intermediate images. We combine the intermediate images into the final FD image using a linear-regression technique adapted from [29]. The input texture image Ax,y (X × Y ) is used to generate a Gaussian scale space Γx,y,r (X ×Y ×L) having L layers, with scaling factor r varying from rmin , to rmax , and total number of layers L = rmax −rmin +1. Each layer is considered as a 3− D space, with (x, y) denoting the 2 − D position, and the third coordinate, g, denoting the gray level. The D BC algorithm is implemented by applying a varying-size non-linear kernel bi,j (m × n), which operates on the image surface and finds the difference between the maximum (gmax ) and the minimum (gmin ) gray values of the region enclosed within the kernel (Fig. 2). Non-negative integers α and β are used to center the kernel b(i, j) on the pixel gx,y in the image layer. The kernel is calculated as   β α X X gmax − gmin b(i, j) = floor +1 (4) r i=−α j=−β where r is the scaling factor of the layer l, and     m−1 n−1 α = ceil , and β = ceil . (5) 2 2 The kernel is applied as  2 β α X X L Ω(x, y, r) = b(i, j)Γ(x + α, y + β, r) (6) r i=−α j=−β iii   rmax rmax  rmax Box n Ax , y ( X  Y )   rmin rmin  rmin Image intensity surface Box 2 (a) Fx , y ( X  Y ) Box 1  x , y ,r ( X  Y  L) (b) (e)  x , y ,r ( X  Y  L) (d) (c) Fig. 1. Illustrates the Differential Box Counting (DBC) technique [28] for computing Fractal Dimension. (a) Input texture image. (b) Gaussian Scale Space with six layers, generated from the input image with box sizes from rmin × rmin , . . . , rmax × rmax . (c) DBC is used to calculate the FD for each image layer of the scale space. (d) Intermediate images. (e) Final FD image obtained using technique adapted from [29]. The slope can be determined by computing the sums of squares: P 2 X ( r) (9) Ψ1 = r2 − L P 2 P 2 X ( r) ( Θ) Ψ2 = rΘ − . (10) L Finally, the FD image Fx,y (X × Y ) is calculated as: g max g min F (x, y) = λxy =    =  Fig. 2. Image intensity surface enclosed within a box, showing the difference between maximum and minimum gray values. where Ωx,y,r (X × Y × L) is a matrix of intermediate images, such that the first layer denotes the original image after it has been filtered by the kernel with scale r = rmin , and the highest layer denoting the image filtered by the kernel with scale r = rmax . Thus, we define   g11r g12r · · · g1Y r  g21r g22r . . . g2Y r    Ω(x, y, r) =  . (7)  .. .. ..  ..  . . . gX1r gX2r ... gXY r The slope λx,y of the least square linear regression line between Ω(x, y, r) and r will denote the pixel value F (x, y) of the FD image Fx,y (X × Y ). For this purpose, a columnvector Θ is defined, such that the first gray values of all the layers in Ω(x, y, r) comprise vector θ1 , all the second gray values comprise vector θ2 etc. as shown in Eqn. (8).    Θ  θ1 θ2 .. . θX×Y       =   g111 g121 .. . g112 g122 .. . ··· ... .. . g11L g12L .. . gXY 1 gXY 2 ... gXY L      (8) X X Y X Ψ2 x=1 y=1 Ψ1 g11r g21r .. . g12r g22r .. . ··· ... .. . g1Y r g2Y r .. . gX1r gX2r ... gXY r    .  (11) Algorithm 1: Algorithm to compute FD image of input texture image. 1 2 3 4 5 6 Data: Input texture image, Ax,y (X × Y ) Result: Matrix Fx,y (X × Y ) containing FD values of each pixel of A initialize (rmin = 2, rmax = 7, L = rmax − rmin + 1) ; while (r ≥ rmin and r ≤ rmax ) do Gr = Gaussian Kernel([r, r], r/2) ; Γ(x,y,r) = hGr (x, y)|I(x, y)i; /* Update D BC kernel b */ h i β α P P min b(i, j) = floor gmax −g +1 ; r i=−α j=−β 7 8 /* Compute Ω(x, y, d) Matrix of intermediate FD values */  2 β α P P Ω(x, y, d) = b(i, j)Γ(x + α, y + β, l) L ; r i=−α j=−β 9 end while 10 Convert the 3-D matrix Ωx,y,r (X × Y × L) to a column vector Θ, as per Eqn. (8). ; 11 /* Compute sum of square */ 12 Ψ1 = 13 Ψ2 = P P P ( r)2 ; L P P ( r)2 ( Θ)2 − L r2 − rΘ 14 Compute FD image F (x, y) = ; X P Y P x=1 y=1 Ψ2 Ψ1 ; A. Effects of Fractal Transform An interesting property of the Fractal Transform is its invariance under bi-Lipschitz transform. A transform t : R2 → R2 iv is called a bi-Lipschitz transform, if there exist two constants 0 < c1 ≤ c2 ≤ ∞ such that for any two points x1 , x2 ∈ R2 , c1 kx1 − x2 k < kt(x1 ) − t(x2 )k < c2 kx1 − x2 k (12) where kp1 − p2 k is the Euclidean metric between points p1 and p2 . So, any smooth transform (like translation, rotation, projective transformation, texture warping of a regular surface, change in viewpoint, and non-rigid deformation) is a biLipschitz transform [36], [37]. Up-sampling or down-sampling by a factor of n are also special cases of the bi-Lipschitz transform, where c1 = c2 = n. Then, we can drive the following theorem: Theorem 1. Let us consider an image as f (x), x ∈ R2 . Let the fractal dimension and length of point x be D and L, respectively. For a sampling function t(x) = nx, where n > 1 means up-sampling, and n < 1 means down-sampling, the fractal dimension and length at point t(x) become Dt = D, Lt = L + D · log n (13) where L = log k. Proof. For a point x, we have log Nr (x) = D · log( 1r ) + L (from Eqn. (1)). By the definition of t(x) we know that t is invertible and kt(x1 ) − t(x2 )k = n kx1 − x2 k. The biLipschitz constant ensures that Nr (t(x)) = N nr (x). Hence we can write, n log N nr (x) = D · log + L r 1 ⇒ log Nr (t(x)) = D · log + D log n + L r (14) 1 ⇒ log Nr (t(x)) = Dt · log + Lt r ⇒ Dt = D, Lt = L + D · log n Hence, from the above theorem, the fractal dimension of an image is invariant to scale changes, or in other words, invariant to local bi-Lipschitz transforms, but not the fractal length of the image. Theoretically, the fractal dimension of an image remains unchanged when it is sampled-up with a factor of n and vice-versa. This is our main motivation to take advantage of the fractal dimension in our proposed descriptor. III. P ROPOSED T EXTURE D ESCRIPTOR Scale variations can create a dramatic impact on the appearance of a texture. There is no locally invariant texture descriptor that can handle scale changes of such image intensity surface. Our goal in this paper is to build texture descriptors which are invariant to scale changes in the intensity surface of natural texture. Even local fractal dimension is a powerful measurement of surface “roughness” of a natural image, though the fractal dimension alone is not sufficient to characterize natural texture. However, the FD yields continuous values and so it needs to be quantized. The quantization process can be done by calculating the feature distribution from all the training samples to know about the distribution of feature space. Finally, some threshold value is calculated to divided the feature space into fixed number of bins and the quantization of test FD image is done according to the training threshold values. Fig. 3 illustrates quantization process of the feature space using four bins. There are the following important limitations due to the quantization process, which need to be addressed carefully. • To determine the threshold values for each bin, it require a pre-training stage. • Texture images are captured under different geometric and photometric varying conditions. So, the quantization process fully depends on the training samples. • The choice of number of bins is a challenging task although there are some techniques [38] to select it. It is always a trade-off between optimal number of bins for the best of accuracy and feature size. Since the distribution has a finite number of entries, choosing a few bins may fail to provide sufficient discriminative power while large number of bins may lead to sparse and unreliable results. Hence, feature matching becomes computationally inefficient. The method is explained in the following sections. Fig. 3. Quantization procedure of the feature space [39] A. Fractal Weighted Local Binary Pattern (F WLBP) A good texture descriptor should have four powerful characteristics: reliability, independence, discrimination, and small size. Hence, we propose a simple, efficient, yet robust texturedescriptor called the Fractal Weighted Local Binary Pattern (F WLBP) and offer a solution to the above problem based on the concept of local image patterns exhibiting self-similarity. The discrimination power of the proposed descriptor is enhanced by using the fractal dimensions as weights of the histogram where the sampling method of indexing is an augmentation of the native L BP [38]. We generated multi-scale indexing images at different scales by varying the sampling radius (R ∈ [Rmin , Rmax ]). However, to keep reasonable complexity, we have kept number of sampling points (N ) constant across all the scales. Since fractal dimension is a logarithmic function (Eqn. (2)), it helps to reduce effects of illumination, because the log function expands the values of darker pixels and compresses the brighter pixels in the image. As a result, the FD values are spread more uniformly [40]. Thus, the proposed descriptor is insensitive to scale, translation, rotation or reflection, illumination; and is also noise-tolerant. After generating the scale-invariant FD image (Fig. 4b) of the original texture using the D BC technique (Sec. II), we proceed to compute the proposed descriptor – Fractal v the FD values of these n locations in the FD image are F (x1 , y1 ), F (x2 , y2 ), . . . , F (xn , yn ), then the weight w of the L BP value in the feature histogram becomes (16) w = F (x1 , y1 ) + F (x2 , y2 ) + . . . + F (xn , yn ). (b) (a) I Mathematically, it can be expressed as: I F WLBPR,N (p) = I(L BPR,N x,y , Fx,y , p), Rmin O Rmax where (e) I (c) (d) (f) Fig. 4. Proposed F WLBP algorithm. (a) input texture image (b) computation of FD image using Gaussian Scale Space and D BC algorithm (c) taking L BPR,N samples from input image using R ∈ [Rmin , Rmax ] and constant N (d) L BP images for varying R (e) indexing output FD image with the different L BP images to calculate fractal weights (f) final feature vector Weighted Local Binary Pattern (F WLBP). We generate multiresolution L BP images (Fig. 4(d)) from the input texture image by varying the sampling radius R ∈ [Rmin , Rmax ] (Fig. 4(c)). The L BP for a given pixel at location (x, y) in the input image Ax,y (X × Y ) is computed by comparing its gray value ax,y with a set of N local circularly and equally spaced neighbours R,N Px,y placed at a radius R ( R ∈ [Rmin , Rmax ]) around the pixel. L BP is computed for only those pixels whose all N local neighbours lie within the image, and not for pixels along the image boundary. The final L BP value of a given pixel is calculated as LBPR,N x,y = N X n=1 R,N 2n−1 × sign(Px,y − ax,y ) p ∈ [0, 2N −1 ] (17) (15) where sign is a unit step function to denote whether a given input is positive or not, and is defined as ( 1, z ≥ 0 sign(z) = . 0, z < 0 The range of L BPR,N x,y depends on the number of neighbouring sampling points (N ) around the pixel (x, y) at radius R to form the pattern, and its value lies in between 0 to 2N −1 . In other words, the range of L BP is [0, 2N −1 ]. Fig. 4(d) shows the computed local binary patterns (i.e. L BPR,N x,y |R = [Rmin , Rmax ]) for a candidate texture image (Fig. 4(a)). Finally, we use an indexing operation I to combine each of the L BP images with the previously generated FD image, and then compute the feature histogram. The indexing operation works as follows: in order to compute the histogram frequency R,N N −1 ]) of (weight) of a given pixel value (pR,N x,y | px,y ∈ [0, 2 R,N the L BP image L BPx,y , we refer to the FD image Fx,y (X × Y ). For all the pixel locations in the L BP image which have the same value as pR,N x,y , we find the sum of the FD values in all the same pixel locations in the FD image. This sum is the weight of the value pR,N x,y in the histogram. For instance, if the L BP value pR,N x,y occurs at n locations in the L BP image, namely (x1 , y1 ), (x2 , y2 ), . . . , (xn , yn ), and I(L BPR,N x,y , Fx,y , p), = (P ∴ L BPR,N x,y == p otherwise Fx,y , 0, where F WLBP(p) gives the weight of the value p in the histogram, L BPR,N x,y is the L BP image matrix constructed with sampling radius R and N sampling points, Fx,y is the FD image as computed in Sec.( II), and I is the indexing operation. The final F WLBP feature vector (Fig. 4(f)) is constructed by concatenating all F WLBP(p) values. Since the weights of the L BP histogram are decided by the value of the fractal dimensions, we named the descriptor as Fractal Weighted Local Binary Pattern. Given a m texture image, we have created the feature matrix Mm×n where each row corresponds to the F WLBP descriptors of a texture. The principal component analysis (P CA) feature is computed as following. Initially, we compute the co-variance matrix Σ of feature matrix as, Pn (M(., i) − M(., i))(M(., i) − M(., i))T Σ(i, j) = i=1 n−1 (18) where Mm×n is the feature matrix, n is the number of feature, M(., i) represents the ith column of M, and M(., i) is the mean of respective column. We calculate eigen-vector e of Σ if it satisfies Σe = λe. Where λ is an eigen-value of Σ. The eigen-values of Σ are sorted in descending order as λ1 ≥ λ2 ≥ . . . ≥ λn and corresponding eigenvectors e1 , e2 , . . . , en are used as columns of linear transform matrix U. Finally, M is multiplied by UT . Thus, the P CA features are provided by D = UT M. The scatter plot of proposed descriptor without and with P CA are shown in Fig. 5. 20 200 0.01 15 0.008 150 0.006 10 0.004 100 5 0.002 0 50 140 120 100 80 60 40 20 50 100 150 200 250 300 0 1500 1000 500 (a) 1000 2000 3000 4000 0.035 0.03 0.025 0.02 0.015 0.01 0.005 (b) 0.04 0.06 0.08 0.1 (c) 0.15 300 2000 200 0.1 1000 100 0.05 0 0 0 −1000 −100 −2000 −200 −3000 −300 −4000 200 100 200 0 −100 0 −200 (d) −200 6000 4000 2000 −0.05 −0.1 −0.15 −0.2 0.2 5000 0 −2000 0 −5000 (e) 0.1 0.2 0.1 0 0 −0.1 −0.1 −0.2 −0.2 (f) Fig. 5. Top row (a)-(c) represent scatter plot of F WLBP feature, whereas bottom row (d)-(f) represent F WLBP feature after P CA transform, are extracted from Brodatz, KTH-TIPS and Outex TC10 databases . vi Algorithm 2: Algorithm to extract FWLBPx,y R,N descriptor, where N is the number of circular samples taken at radius R. 1 2 3 4 5 6 7 8 9 10 11 Data: Input texture image, Ax,y (X × Y ), FD image F (x, y) Result: Normalized Fractal Weighted Local Binary Pattern (F WLBP) Descriptor initialize (Rmin = 1, Rmax = 3, N = 8, i = R + 1, j = R + 1, k = [0, K]); while (R ≤ Rmax ) do /* Compute L BP image with sampling radius R, from a sample of R,N N local circularly spaced neighbours Px,y around a central pixel A(x, y) */ PN R,N L BP(x,y)R,N = n=1 2(n−1) × sign(Px,y − A(x, y); /* Compute weights of pixel values for histogram by indexing operation */ R,N F WLBP(p) = I(L (PBPx,y , Fx,y , p) ; Bx,y , f or all Bx,y where Ax,y == k ; I(A, B, k) = 0, otherwise /* Generate histrograms, concatenate, and normalize */ HR,N = H IST(F WLBPR,N ); H FWLBP = concatNormalizeF WLBP(HR,N ); end while B. Complexity of FWLBP Assuming the image is of size M × M and the kernel is of size r × r, the algorithmic complexity of the proposed descriptors is computed as follows. To create the FD image ×M of an input texture image with the number of blocks Mr×r using Algorithm 1, the following operations are performed: 2M 2 comparisons, 4(M/r)2 addition, 5(M/r)2 subtractions, 4(M/r)2 multiplication and 2(M/r)2 divisions. Therefore overall complexity of Algorithm 1 is O(M 2 ). In Algorithm 2, assuming that neighboring pixels are considered with respect to each center pixel for the evaluation of the L BP for FD image of size M × M . The time complexity to evaluate Step 4 of Algorithm 2 is O(p × M 2 ) [41] because p circular shifting are required for each pixel, and there are M 2 pixels in total. Step 6 of Algorithm 2 takes O(M 2 ) for Indexing operation and Step 9 takes O(M 2 ) for building histogram. The overall time complexity to compute the proposed F WLBP descriptor using the combined Algorithms 1 and 2 is O(M 2 ). C. Comparing Distribution of FWLBP After computing the F WLBP descriptors, as elaborated in the previous section, we need to represent their distributions in the training (model) and test (sample) images. This is done since the dissimilarity of sample and model histograms is a test of goodness-of-fit, which can be measured with a nonparametric statistical test. Examples of metrics for evaluating the fit between two histograms are histogram intersection, log-likelihood ratio, and chi-square (χ2 ) statistic [38]. In this paper, the classification is performed via a non-parametric classifier called nearest subspace classifier (N SC) [42]. Here we have chosen N SC over popular parametric classifier like S VM due to the following reasons: the N SC finds an estimation of the underlying subspace within each class and assigns data points to the class that corresponds to its nearest subspace, which does not required any parameter tuning, while S VM has limitations in speed during both training and testing phase, and there is always a trade-off between the selection of kernel function, tuning of its hyper-parameters and classification performance. In order to avoid the over emphasizing patterns with large frequency, a pre-processing step is applied to the proposed feature before using N SC, similar to that in [43]: p (19) X¯m = Xm , m = 1, 2, ..., M where M is the number of bins, and Xm is the original frequency of the F WLBP at mth bin. The nearest subspace classifier (N SC) first calculates the distance from the test sample y to the ith class and measures the projection residual ri from y to the orthogonal principle subspace Bi ∈ RM ×m of the training sets is spanned by the principal P Xi , which T th eigenvectors of = X X class, given as i i for the i i follows, ri = k(I − PBi )yk2 = k(I − Bi BT i )yk2 (20) where P = I ∈ RM ×M is a identity matrix where M rows are selected uniformly at random. The test sample y is then assigned to the one of the C classes with the smallest residual among all classes, i.e. i∗ = arg min ri (21) i=1,...,C IV. E XPERIMENTAL E VALUATION A. Texture Databases We have evaluated the performance of our proposed descriptor on five standard texture databases: Outex TC-00010 (Outex TC10) [4], Outex TC-00012 (Outex TC12) [4], Brodatz album [44], KTH-TIPS [45], and CUReT [46] texture database. We have compared the performance of the proposed F WLBP descriptor with L BPR,N [38], L BPu2 R,N , D LBP R,N [41], su2 riu2 riu2 [47], multiscale C LBP S L BPsri R,N R,N /MR,N /C(1, 8 + 3, 16 + 5, 24) [48], B IF [9] and other state-of-the-art descriptors. We have tested the classification accuracy using a nonparametric classifiers – N SC, and have reported the classification accuracy using k-fold cross-validation test. In k-fold cross-validation test, the feature set is randomly partitioned into k equal sized subsets (k = 10). Of the k subsets, a single subset is retained as the validation data for testing the classifier, and the remaining (k − 1) subsets are used as training data. The average of the classification accuracies over k rounds give us a final cross-validation accuracy. We have normalized each input image to have an average intensity of 128 and a standard deviation of 20 [38]. In VZ-MR8 and VZPatch methods, the texture samples are normalized to have an average intensity of 0 and a standard deviation of 1 [10], [11], [17]. This is done to remove global intensity and contrast. The details of two experimental setups are given as follows: TABLE I S UMMARY OF T EXTURE DATABASE USED IN E XPERIMENT #2 Texture Database KTH-TIPS Brodatz CUReT Image Rotation X X X Illumination Variation X X Scale Variation X X Texture Classes 10 32 61 Sample Size (pixels) 200 x 200 64 x 64 200 x 200 Samples per Class 81 64 92 Total Samples 810 2048 5612 E XPERIMENT #1: Brodatz [44] album is chosen to allow a direct comparison with the state-of-the-art results [41]. There vii are 32 homogeneous texture classes 1 . Each image is partitioned into 25 non-overlapping sub-images of size 128 × 128, and each sub-image is down-sampled to 64 × 64 pixels. Fig. 6. Ten texture images randomly taken from each class of KTH-TIPS database. For the CUReT database [46], we have used the same subset of images as in [8], [10], [18], which contain 61 texture classes with 92 images per class. It is designed to contain large intra-class variation and is widely used to assess the classification performance. The images are captured under different illumination and viewing directions with constant scale. All 92 images of 61 texture classes are cropped into 200 × 200 region and converted to gray scale [10]. The KTH-TIPS database [45] is extended by imaging new samples of ten CUReT textures as shown in Fig. 6. It contains texture images with 3 different poses, 4 illuminations, and 9 different scales of size 200×200 and hence each class contains 81 samples. The KTH-TIPS, Brodatz, and CUReT, databases are summarized in Table I. TABLE II S UMMARY OF T EXTURE DATABASE USED IN E XPERIMENT #2 Texture Database Outex TC10 Outex TC12 Image Rotation X X Illumination Variation X Scale Variation Texture Classes 24 24 Sample Size (pixels) 128 x 128 128 x 128 Samples per Class 180 200 Total Samples 4320 4800 E XPERIMENT #2: 24 different homogeneous texture classes are selected from the Outex texture databases [4], each having the size of 128 × 128 pixels. Outex TC 00010 (Outex TC10) contains texture with illuminant “inca”, and Outex TC 00012 (Outex TC12) contains textures with illuminants “inca”, “horizon”, and “tl84”. Both of the Outex test suites are collected under 9 different rotation angles ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ (0 , 5 , 10 , 15 , 30 , 45 , 60 , 75 , and 90 ) in each texture class. The test suites Outex TC10, and Outex TC12 are summarized in Table II. Running experiments on the whole Fig. 7. 24 texture images randomly taken from each class of Outex TC10 and Outex TC12 database database is challenging due to a large number of texture classes, small number of samples per class, and lack of intraclass variation. 1 The 32 Brodatz textures are Bark, Beachsand, Beans, Burlap, D10, D11, D4, D51, D52, D5, D6, D95, Fieldstone, Grass, Ice, Image09, Image15, Image17, Image19, Paper, Peb54, Pigskin, Pressedcl, Raffia2, Raffia, Reptile, Ricepaper, Seafan, Straw2, Tree, Water, Woodgrain; TABLE III C OMPARISON WITH OTHER VARIANTS OF L BP Methods Classifier L BPV [49] B RINT [50] L BPriu2 1,8 [38] D LBP3,24 [41] sri L BP1,8 su2 [47] N NC N NC N NC S VM N NC N NC N NC N NC S VM N NC N NC N NC N SC L BP(1,8+2,16+3,24) [38] C LBP SMC [48] S SLBP [43] P RI C O L BPg [51] L BPHF S [52] L BPHF S M [53] C OA L BP [54] Proposed F WLBP Classification Accuracy (%) KTH-TIPS [45] Brodatz [44] CUReT [46] 95.50 93.80 94.00 97.75 99.22 97.06 82.67 82.16 80.63 86.99 99.16 84.93 89.73 69.50 85.00 95.17 91.60 95.84 97.19 94.80 97.40 97.80 98.55 98.40 96.90 98.40 97.00 94.60 95.90 97.00 94.60 95.90 97.00 94.20 98.00 99.75 99.62 99.10 B. Results of Experiment #1 To test the scale invariance performance of the proposed descriptor, we have used the KTH-TIPS database, which contains relatively small variations in scales (i.e, 9 scales, continually from 0.5 to 2) [45]. In literature, for texture classification task usually L BP variants were used, in this section, we compared F WLBP descriptor with some powerful variant of L BPs, which includes su2 C LBP [48], L BPV [49], LTP [55], Dlbp [41], L BPsri [47], R,N P RI C OLBP [51], B RINT [50], and C OA L BP [54]. The classification performance is evaluated on three well known benchmark texture databases (KTH-TIPS, Brodatz, and CUReT) and results are shown in Table III. The observations noted su2 from Table III are as follows: The scale-invariant L BPsri R,N riu2 descriptor performs better than L BPR,N . However, the perriu2 formance is worse than multi-resolution L BPR,N descriptor, riu2 riu2 and C LBP SR,N /MR,N /C descriptor; and much worse than the proposed descriptor. This is because extracting consistent and accurate scale for each pixel is difficult. However, the su2 L BPsri R(i,j),8 provides good performance in controlled environment [47], but it fails over more complex databases. The D LBP, when combined with Gabor features, attains a higher classification rate than the conventional L BP with N NC. However, its performance is quite less than the proposed F WLBP, as it does not consider changes in scale. F WLBP achieves remarkably better classification performance than C LBP, L BPV, L BPHF S and L BPHF S M on KTH-TIPS, Brodatz and CUReT, texture datasets and yields comparable performance with D LBP. Note that L BP, L BPHFS , L BPHF S M , C LBP, and L BPV generally encode multi-scale information whereas the proposed F WLBP descriptor encodes the spatial fractal dimension to characterize the local scale information into the 1-D L BP histogram. Table IV shows performance of texture classification performance other than L BP variants. Lazebinik et al. [20] proposed to detect interest regions using Harris-affine corner and Laplacian-affine blobs and then extracted S PIN and R IFT as texture signatures after normalizing these regions. Finally, texture classification is performed using nearest neighbor classifier (N NC). Caputo et al. [56] used S VM kernel instead of N NC and reveal that the S VM classifier could achieve reasonably better performance. Zhang et al. [8] proposed viii 0.8 FWLBP LBP 0.6 1 S 3 S 4 S 5 S 6 S 7 S 8 S 9 S (d) S 2 0.4 0.2 0 (a) (b) 1 2 3 4 5 Scales 6 7 8 (c) Fig. 8. (a)-(c) represent the individual histograms (HR,N of F WLBP, where R = 1, 2, 3 and N = 8) for a texture sample taken from the KTH-TIPS database [45], having 9 different scales. The abscissa and ordinate represent number of bins and feature probability distribution, respectively. As the histograms of individual F WLBP for the 9 different scales are overlapping, it implies that the F WLBP descriptor is scale invariant. (d) represents the Chi-square (χ2 ) distance of proposed F WLBP and L BP descriptor extracted from original texture image (S 1 ) and 8 texture image with different scale (S 2 − S 9 ). Methods Classifier VZ-MR8 [10] VZ-Patch [11] Lazebnik et al. [20] Zhang et al. [8] Liu et al. [18] M FS [24] Capato et al. [56] P FS [5] B IF [9] Proposed F WLBP N NC N NC N NC S VM S VM N NC S VM S VM Shift N NC N SC Classification Accuracy (%) KTH-TIPS [45] Brodatz [44] CUReT [46] 94.50 94.62 97.43 92.40 87.10 98.03 91.30 88.20 72.50 96.10 95.90 95.30 94.20 98.50 81.62 94.80 95.00 98.50 97.35 98.50 98.47 98.60 99.75 99.62 99.10 It is interesting to note that even for the database having large number of variations and a few number of samples, this property can make the proposed descriptor suitable for other applications where the number of features plays an important role. 100 99 98 Accuracy (%) TABLE IV T EXTURE C LASSIFICATION R ESULTS ON KTH-TIPS, B RODATZ , AND CUR E T 97 96 95 Outex_TC10 KTH−TIPS Brodatz 94 93 object and texture classification by analyzing different texture features and kernels. Recently, global scale invariant feature extraction methods drew attention because local scale normalization is usually slow due to pixel by pixel operations. Xu et al. [21] and Quan et al. [5] have classified the image pixels into multiple point sets by gray intensities or local feature descriptors. Multi-scale B IF [9] at scales σ, 2σ, 4σ, and 8σ gives better performance than the proposed F WLBP with N NC classifier. This is mainly because B IF uses pyramid histogram with time inefficient shift matching scheme. Also, the feature dimension of B IF descriptor [9], C LBP [48], S SLBP [43] and P RI C OLBP [51] are larger (64 = 1296, 2200, 480 × 5 = 1000 and 590 × 2 = 1180) than the dimension of proposed F WLBP descriptor (256×3 = 768). The performance of B IF is reduced when scale shifting scheme is not considered [9]. Apart from bag-of-words model, the variant of L BP based descriptors, sri su2 e.g., C LBP 2 , L BPV, LTP, D LBP, L BPR,N , P RI C OLBP, B RINT, C OA L BP, and S S L BP also perform reasonably well on texture classification task. The observations noted from Table IV are as follows: F WLBP also exceeds the classification performance of several bag-of-words methods, [8], [11], [18], [20], [54], [56]. Fig. 9 shows the graph of success rates against the number of selected feature on Brodatz, KTHTIPS and Outex TC10 texture databases. The classification rate of proposed descriptor rapidly increases due to P CA transform, which carries the most relevant information with large variance among the first component of the feature matrix. 2 We used the best C LBP settings i.e., C LBP S/M/C in this paper 92 50 100 150 200 Feature Dimension 250 300 Fig. 9. Success rate against the number of descriptors on Brodatz, KTH-TIPS and Outex TC10 texture databases Although the images are captured under scale, rotation, and illumination variations, the proposed F WLBP gives sound performance as given by results in Table IV, and achieves comparable, and sometimes even better performance, than the state-of-the-art methods. It validates that the encoding strategy preserves the relative information about local scale change along with orientation angle are effective. An illustration of the scale invariance property of the proposed descriptor is given in Fig. 8, where S1 -S9 show nine KTH-TIPS texture images of “corduroy” class at different scales from 0.5 to 2, and (a)-(c) depict the histograms (HR,N |R ∈ [1, 2, 3]) of individual F WLBPR,N descriptor with R = 1, 2, 3, and N = 8. It is evident from Fig. 8(a)-(c) that the histograms of individual F WLBP for the 9 different scales are approximately identical. In addition Fig. 8(d) shows the Chi-square (χ) distance [11] between extracted F WLBP and L BP descriptor from original texture image (S 1 ) and 8 texture images with different scale (S 2 − S 9 ), its shown that proposed descriptor has less χ-distance compared to L BP. Therefore, from both the observations it implies that the F WLBP descriptor is not sensitive to small scale variations. The proposed descriptor achieves scale invariance by utilizing the properties of Fractal Dimension and Gaussian Scale Space, as explained in ix Theorem 1. Fig. 10(a)-(b) represent images of two texture classes taken form Brodatz database and Fig. 10(c) shows P CA transformed F WLBP descriptor extracted from three images per texture class and respective feature probability distribution functions (P DF). Since both texture classes contain very small intra-class variation even though their P DF provides a strong indication about the discriminative power of the proposed descriptor. 3 class 1 class 2 2.8 2.6 PDF 2.4 (a) 2.2 2 1.8 1.6 1.4 1.2 1 2 4 6 8 10 Descriptors (b) (c) Fig. 10. Discriminative power of the proposed F WLBP descriptors are visualized using P CA. We have taken 6 images from two classes of Brodatz textures and extracted the F WLBP. Notice that the classes are substantially separated by the curves. TABLE V T HE C LASSIFICATION ACCURACIES OF PROPOSED F WLBP AND F WLBPu2 DESCRIPTORS USING DIFFERENT SCALING FACTORS OF D BC ALGORITHM ON BRODATZ TEXTURE DATABASE . Methods Proposed FWLBP Std. Error Proposed FWLBPu2 Std. Error Classification Rates With Different box sizes ranges rmin to rmax 2×2 2×2 2×2 2×2 2×2 to to to to to 2×2 3×3 4×4 5×5 6×6 7×7 99.24 99.25 99.27 99.27 99.31 99.62 ±0.9216 0.0052 ±0.9688 0.0052 ±0.7547 0.0052 ±0.6701 0.0104 ±0.6484 0.0104 ±0.3257 0.0002 98.05 98.16 98.30 98.45 98.53 98.57 ±0.6717 0.0156 ±0.8426 0.0208 ±0.8590 0.0208 ±0.8058 0.0156 ±0.7514 0.0104 ±0.7243 0.0260 C. Analysis of parameter rmax The proposed fractal based descriptor has only one hyperparameter rmax , which is the maximum value of the scaling factor of the D BC algorithm. The rmax represents how much a specific intrinsic structure is self-similar [36] to its surrounding pixels. The different values of rmax influence the deviation of classification accuracies. Table V shows recognition accuracy for Brodatz textures using proposed F WLBP and F WLBPu23 , where rmax values are ranging from 2 to 7. Its shows clearly that both the descriptors have similar trends towards rmax and recognition rate increases till it reaches rmax to 7. Table V also indicates that for different scaling factors the proposed F WLBP descriptor significantly outperforms F WLBPu2 on well-known Brodatz texture database (includes images of scale and rotation or view-point variations). To compute fractal dimension of an image of size less than let say, 200 × 200 fast, Faraji and Qi [40] recommend rmax to be used in between 7 and 10 to 3 Where ‘u2’ indicates uniform pattern encoding; compromise between good texture recognition accuracy and computational overheads. In our experimental setup, we use 7 as rmax value for all the texture databases. D. Results of Experiment #2 The results of Experiment #2, carried out on Outex TC10 and Outex TC12 are tabulated in Table VI. It shows the average classification accuracy obtained by k-fold cross-validation test (k = 10) for proposed descriptor, and the comparative summary of the results for variants of L BP e.g., L BP(R,N ) [38], VZ-MR8 [10], VZ-Patch [11] and recent state-of-theart bag-of-word methods. The observations made from the results of Experiment #2 are stated as follows. L BP and L BPV have similar feature dimensions, but the later one incorporates additional contrast measures to the pattern histogram, it produces a significant performance improvement compared to the conventional L BP. L BPriu2 R,N /VAR R,N provides better performance compared to L BPVriu2 R,N , because L BP and local variance of a texture image are complementary; and hence the joint distribution of L BP and local variance gives better results than any one alone. C LBP S/M/C is created by fusing C LBP S and C LBP M/C. It provides better performance compared to other variants of C LBP as it has complementary features of sign and magnitude, in addition to the center pixel representing the gray value of the local patch. C DCP [23] achieves improved performance over C LBP since in C DCP patterns are extracted from component and holistic levels. The state-of-the-art bag-of-words statistical algorithms, VZTABLE VI AVERAGE CLASSIFICATION ACCURACY (%) ON O UTEX TC10 AND O UTEX TC12 USING STATE - OF - THE - ART SCHEMES Method Classifier Outex TC10 VZ-MR8 [10] VZ-Patch [11] LTP [55] VAR [57] L BP [38] L BPriu2 R,N L BP/VAR riu2 L BPVR,N [49] C LBP S/M/C [48] T L BPN R,N [58] D LBPR=3,N =24 [41] B RINT C S C M [50] P TP [59] C DCP [23] Proposed F WLBP N SC N SC N NC N NC S VM N NC N NC N NC N NC N NC S VM N NC N NC N SC N SC 93.59 92.00 76.06 90.00 97.60 84.89 96.56 91.56 98.93 99.24 98.10 99.35 99.56 99.76 99.97 Outex TC12 horizon tl84 92.82 92.55 92.06 91.41 63.42 62.56 64.35 62.93 85.30 91.30 63.75 65.30 78.08 79.31 77.01 76.62 92.29 90.30 96.18 94.28 87.40 91.60 97.69 98.56 98.08 97.94 99.82 99.62 99.98 99.93 Average 92.99 91.82 67.34 72.42 91.40 71.31 84.65 81.73 93.84 96.56 92.36 98.12 98.52 99.72 99.96 MR8 and VZ-Patch, take dense response from multiple filters. However, their performance is poor compared to the proposed F WLBP. Also, feature extraction and matching complexity of these two techniques is quite high [11], when compared to the proposed F WLBP due to the MR8 needs to find 8 maximum responses after 38 filters convolving with the image and compares every 8-dimension vector in an image with all the textons to build histograms using clustering technique. D LBP + N GF utilizes the top ranking 80% of L BP pattern to improve the recognition, as compared with the results obtained using original L BPu2 R,N . But like VAR R,N , it neglects local spatial structure which is important for texture discrimination. Also, D LBP needs pre-training stage, and the dimensionality of the D BLP varies with the training samples. x 0.7 FWLBP 0.6 5 10 15 30 45 60 75 LBP 0.5 90 (d) 0 0.4 0.3 0.2 0.1 0 (a) (b) 1 2 3 4 5 Angles 6 7 8 (c) Fig. 11. (a)-(c) represent individual F WLBP histograms (F W LBPR,N |R ∈ [1, 2, 3]) of a texture sample taken from the Outex database, with 9 different orientations. The abscissa and ordinate represent the number of bins and feature probability distribution, respectively. The histograms show that the feature distribution for the different texture orientations are approximately overlapping, which signify the rotation invariance property of the proposed F WLBP descriptor. ◦ ◦ ◦ (d) represents the Chi-square (χ) distance between original texture image (0 ) and 8 texture image with different angles (5 − 90 ) Though the trend is clear from the performance Table VI, we have further analysed the performance using one way statistical analysis of variance (A NOVA) test [60]. A NOVA is a collection of statistical tests used to analyze the differences among group means and their associated procedures. In other word, one-way A NOVA is used to test the equality of two or more means at one time using the variances. The null hypothesis H0 for the test is, there is no significant difference among group means. We have taken the significance level α = 0.05 for this A NOVA test. We can reject H0 if the p-value for an experiment is less than the selected significant level, which implies that the at least one group mean is significantly different from the others. To understand why the performance of proposed F WLBP descriptor was significantly different from well-known descriptors such as VZ-Patch, VZ-MR8, B RINT, D LBP, C LBP, and L BPriu2 , we conduct one way A NOVA test with significance level α = 0.05. The test results are shown in Table VII where the p-value (1.6460e−07 ) is much lesser than the pre-select significance level α = 0.05. This indicates that the performance of proposed descriptor significantly better than other descriptors and hence we can reject the hypothesis H0 . In addition, the box plot corresponding to aforementioned A NOVA test is shown in Fig. 12, which also clearly indicates that the mean performance of F WLBP descriptor is significantly better than the well-known descriptors such as VZ-MR8 [10], VZ-Patch [11], B RINT [50], D LBP [41], C LBP [48], and L BPriu2 [38]. 100 Recognition rates (%) For comparison, we have taken the best results of D LBP with T R = 3 and N = 24 in Table. VI. The L BPN R,N [58] based methods and B RINT [50] give better performance compared to other state-of-the-art L BP methods. However, compared to the proposed F WLBP, their accuracies are lower. This is T because L BPN R,N extracts features by locally rotation invariant riu2 L BPR,N approach, which produces only 10 bins. Such small features cannot represent each class well. On the other hand, B RINT extracts a large number of features from multiple resolution (R = 1, 2, 3, 4) by utilizing rotation invariant L BPri R,N approach, but it loses some global image information. From Table VI, it is evident that our proposed descriptor provides better classification performance compared to other state-of-the-art methods. The better performance is due to generation of a six-layer Gaussian Scale Space to provide basic scale-invariance (Fig. 1), transforming the scale space to fractal dimension (FD) images, which also provides additional levels of scale invariance and some degree of illumination invariance (Sec. III), and finally using the FD as weights for the values in the feature vector histograms. When all these are put together we achieve high degree of invariance to scale, rotation, and reflection, and are able to capture the micro structure in the different illumination controlled environments (for images like “inca”, “horizon” and “tl84”). To visualize the rotation invariant characteristic of our proposed descriptor, an example of the F WLBP feature distribution for a texture sample is taken from the Outex TC10 database (with 9 orientations – ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ 0 , 5 , 10 , 15 , 30 , 45 , 60 , 75 , and 90 ) and is shown in Fig. 11. Fig 11(a)-(c) represent the histograms (HR,N |R ∈ [1, 2, 3]) of individual (F WLBPR,N |R ∈ [1, 2, 3]). The histograms show that the F WLBP feature distribution for the different texture orientations are approximately overlapping, which signify the rotation invariance property of the F WLBP descriptor. In addition, Fig. 11(c) represents the histograms of individual F WLBP for the 9 different rotational angles, which are approximately identical. In addition, Fig. 8(d) shows the Chi-square (χ) distance [11] between extracted F WLBP and ◦ L BP features from original texture image (0 ) and 8 texture ◦ ◦ images with different rotational view-points (5 − 90 ), it is shown that the proposed descriptor has less χ-distance compared to L BP. 95 90 85 80 75 70 65 FWLBP VZ−Patch VZ−MR8 BRINT DLBP CLBP LBP_riu2 State−of−the−art descriptors Fig. 12. The box plot (Descriptor vs. Accuracy) corresponding to one way statistical A NOVA test for proposed F WLBP and state-of-the-art descriptors on Outex, KTH-TIPS, Brodatz, CUReT databases. xi TABLE VII O NE WAY STATISTICAL A NOVA TEST RESULTS FOR O UTEX , KTH-TIPS, B RODATZ , AND CUR E T DATABASES , WHERE THE SIGNIFICANCE LEVEL α IS 0.05. Source Groups Error Total SS 1923.34 0621.82 2515.67 df 06 28 34 MS 325.557 022.208 F 14.36 Prob (p) > F 1.6460e−07 where the convolution filters are pre-defined as wavelet and no learning process is needed. Inspired by ScatNet, a simple deep learning network, P CA N ET is proposed by chan et al. [64] which is based on cascading of multistage P CA, binary hashing and histogram pooling. E. Robustness to Noise S NR = 5 24.06 99.74 51.22 57.37 50.88 88.31 99.93 Table VIII demonstrates the noise robustness of different methods on Outex TC10 database based on classification rates of various noise levels (measured using S NR i.e Signal to Noise Ratio). The proposed descriptor achieves state-of-theart results in term of accuracy mean and standard deviations 100 ± 0%, 100 ± 0%, 99.97 ± 0.0732%, 99.95 ± 0.0976%, and 99.93 ± 0.1118% on S NR = 100 dB, 30 dB, 15 dB, 10 dB, and 5 dB, respectively. It can be observed from Table VIII that the proposed F WLBP descriptor is very modestly improved as compared with other L BP based descriptors. The proposed descriptor has inherited this property from the calculation of fractal dimension in Gaussian scale space representation in contrast to the L BP and its variants. F. Comparison of Proposed F WLBP with state-of-art deep learning based methods A key characteristic of deep convolutional neural networks (C NN)(see Fig. 13) is a hierarchical representation which is universal and directly generated from the data, used to perform image classification task. Deep C NNs have universal shown their power of pattern recognition. However, the robustness for recognition is limited due to the lack of geometric invariance of global C NN activations. An effective texture descriptor FVCNN has been introduced by Cimpoi et al. [7], where at first C NN features are extracted at multiple scales. Then an orderless Fisher Vector pooling operation is performed. Despite significant progress of deep C NN models, not much analytical insights into its internal operation and behaviour is available. Mallat et al. [62], [63] have introduced scale and rotation invariant wavelet convolution scattering network (ScatNet) TABLE IX T HE TEXTURE CLASSIFICATION PERFORMANCE AND FEATURE DIMENSIONALITY OF THE PROPOSED L MP AND STATE - OF - ART DEEP LEARNING BASED METHODS Classification Accuracy (%) Methods FV-VGGDM (S VM) [7], [65] FV-AlexNet (S VM) [65], [67] S CAT N ET (P CA) [62], [63] S CAT N ET (N NC) [62], [63] P CA N ET (N NC) [64] P CA N ETriu2 (N NC) [64] R AND N ET (N NC) [64] R AND N ETriu2 (N NC) [64] Proposed F WLBP (N NC) Proposed F WLBP (N RS) 80.00 67.30 99.69 98.59 39.87 35.36 47.43 43.54 99.79 99.86 82.30 72.30 99.06 98.10 45.53 40.88 52.45 45.70 99.41 99.73 88.20 77.90 68.92 63.66 59.43 52.15 60.67 56.90 98.37 99.87 99.80 99.10 96.15 88.64 57.70 49.80 56.57 48.20 97.12 99.90 Feature C LBP SMC [48] LTPriu2 R=3,N =24 [55] N RLBPriu2 R,N [61] B RINT [50] Proposed F WLBP Classification Accuracy (%) S NR = 30 S NR = 15 S NR = 10 86.93 67.24 49.79 99.79 99.76 99.76 98.12 94.58 86.07 98.31 93.44 84.32 81.16 77.52 70.16 96.48 95.47 92.97 100 99.97 99.95 Dimention N NC N NC N NC N NC N NC N NC N NC S NR = 100 95.03 99.30 99.45 84.49 97.76 100 UIUC Classifier L BPriu2 R,N [38] T L BPN R,N,k [58] KTH-TIPS Methods A simple variation of P CA N ET, named R AND N ET, in which the cascaded filters are randomly selected but not learned, was also proposed by Chan et al. [64]. One of the major trends in deep C NN research community is to use more and more complex networks to improve the classification performances. However, it needs the powerful and large memory computer and GPUs to train very deep and computationally expensive networks. The comparative results of texture classification performance with feature dimensionality of the proposed F WLBP and state-of-art deep learning based methods such as F V-C NN [7], [65], S CAT N ET [62], [63], P CA N ET, P CA N ETriu2 , and R AND N ET [64], are tabulated in Table IX. It is observed from Table IX that the proposed F WLBP provides comparable or better classification performance compared to state-of-art deep learning based methods. In addition, the feature dimension of proposed F WLBP descriptor is less than the deep learning based models4 . Outex TC12 TABLE VIII C LASSIFICATION ACCURACY (%) OF P ROPOSED M ETHOD AND D IFFERENT STATE - OF - THE - ART M ETHODS ON O UTEX TC10 WITH D IFFERENT N OISE L EVELS IN TERM OF D B . Fig. 13. A Deep C NN architecture where the input is processed in a feed forward manner through the stage of convolutions and sub-sampling and finally classified with a linear or non-linear classifier. Outex TC10 To evaluate the performance of the proposed method in noisy environment, the experiments are carried out on Outex TC10 texture database (discussed in subsec. IV-A) by adding white Gaussian noise, resulting in different Signal to Noise Ratio (S NR). The training and testing set-up are the same as in noise-free situation. 65536 32768 596 596 2048 80 2048 80 354 354 V. C ONCLUSIONS In this paper, we have proposed a simple, efficient yet robust descriptor, called the Fractal Weighted Local Binary Pattern (F WLBP) for texture classification. At first, a Gaussian Scale Space representation of the texture image is generated, and 4 The results of deep learning based methods are taken from Liu et al. [66] xii then Differential Box Counting (D BC) algorithm is used to transform the images into fractal dimension. An augmented form of Local Binary Pattern (L BP), with fixed sample size and varying radius is used, and the weights for the samples are calculated using an indexing function. Finally, the normalized feature vector is formed by concatenating the histogram of F WLBP for all elements of L BP. Experimental results show that our proposed F WLBP descriptor provides promising performance under scale, rotation, reflection, and illumination variation. Comparative study indicates that our descriptor also performs better, as compared to other state-of-the-art methods. In addition, the dimensionality of the extracted feature vector is significantly less the state-of-the-art method, making it computationally efficient. As it offers reasonably high speed to extract the features, this descriptor may be applied to real time scenarios. Our current work is focused on texture classification. In future, this work can be utilized in texture classification in multi-texture scenario, also in other domains like face and object recognition. ACKNOWLEDGEMENT The authors sincerely thank the Machine Vision Group (MVG), University of Oulu, Finland, Visual Geometry Group (VGG), University of Oxford, UK, Department of Computing, The Hong Kong Polytechnic University, China, and Department of Computer Science, University College London, UK for sharing the source codes of L BP, VZ-MR8, C LBP, and B IF descriptors. The authors would also like to thank Manik Varma, Timor Kadir and Andrew Zisserman for providing preprocessed CUReT datasets. R EFERENCES [1] X. Xie and M. Mirmehdi, “A Galaxy of Texture Features,” in Handbook Of Texture Analysis. World Scientific, 2008, pp. 375–406. [2] R. M. Haralick, K. Shanmugam et al., “Textural features for image classification,” IEEE Transactions on systems, man, and cybernetics, no. 6, pp. 610–621, 1973. [3] T. Randen and J. H. Husoy, “Filtering for texture classification: A comparative study,” IEEE Transactions on pattern analysis and machine intelligence, vol. 21, no. 4, pp. 291–310, 1999. [4] T. Ojala, T. Maenpaa, M. Pietikainen, J. Viertola, J. Kyllonen, and S. Huovinen, “Outex-new framework for empirical evaluation of texture analysis algorithms,” in Pattern Recognition, 2002. Proceedings. 16th International Conference on, vol. 1. IEEE, 2002, pp. 701–706. [5] Y. Quan, Y. Xu, and Y. Sun, “A distinct and compact texture descriptor,” Image and Vision Computing, vol. 32, no. 4, pp. 250–259, 2014. [6] V. Andrearczyk and P. F. Whelan, “Using filter banks in convolutional neural networks for texture classification,” Pattern Recognition Letters, vol. 84, pp. 63–69, 2016. [7] M. Cimpoi, S. Maji, I. Kokkinos, and A. Vedaldi, “Deep filter banks for texture recognition, description, and segmentation,” International Journal of Computer Vision, vol. 118, no. 1, pp. 65–94, 2016. [8] J. Zhang, M. Marszałek, S. Lazebnik, and C. Schmid, “Local features and kernels for classification of texture and object categories: A comprehensive study,” International journal of computer vision, vol. 73, no. 2, pp. 213–238, 2007. [9] M. Crosier and L. D. Griffin, “Using basic image features for texture classification,” International Journal of Computer Vision, vol. 88, no. 3, pp. 447–460, 2010. [10] M. Varma and A. Zisserman, “A statistical approach to texture classification from single images,” International Journal of Computer Vision, vol. 62, no. 1-2, pp. 61–81, 2005. [11] ——, “A statistical approach to material classification using image patch exemplars,” IEEE transactions on pattern analysis and machine intelligence, vol. 31, no. 11, pp. 2032–2047, 2009. [12] I. WEISS, “Geometric invariants and object recognition,” International journal of computer vision, vol. 10, no. 3, pp. 207–231, 1993. [13] R. L. Kashyap and A. Khotanzad, “A model-based method for rotation invariant texture classification,” IEEE Transactions on Pattern Analysis and Machine Intelligence, no. 4, pp. 472–481, 1986. [14] J. Mao and A. K. Jain, “Texture classification and segmentation using multiresolution simultaneous autoregressive models,” Pattern recognition, vol. 25, no. 2, pp. 173–188, 1992. [15] J.-L. Chen and A. Kundu, “Rotation and gray scale transform invariant texture identification using wavelet decomposition and hidden Markov model,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, no. 2, pp. 208–214, 1994. [16] H. Deng and D. A. Clausi, “Gaussian MRF rotation-invariant features for image classification,” IEEE transactions on pattern analysis and machine intelligence, vol. 26, no. 7, pp. 951–955, 2004. [17] M. Varma and R. Garg, “Locally invariant fractal features for statistical texture classification,” in Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. IEEE, 2007, pp. 1–8. [18] L. Liu and P. Fieguth, “Texture classification from random features,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 3, pp. 574–586, 2012. [19] C.-H. Yao and S.-Y. Chen, “Retrieval of translated, rotated and scaled color textures,” Pattern Recognition, vol. 36, no. 4, pp. 913–929, 2003. [20] S. Lazebnik, C. Schmid, and J. Ponce, “A sparse texture representation using local affine regions,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 8, pp. 1265–1278, 2005. [21] Y. Xu, H. Ji, and C. Fermüller, “Viewpoint invariant texture description using fractal analysis,” International Journal of Computer Vision, vol. 83, no. 1, pp. 85–100, 2009. [22] J. Zhang, J. Liang, and H. Zhao, “Local energy pattern for texture classification using self-adaptive quantization thresholds,” IEEE transactions on image processing, vol. 22, no. 1, pp. 31–42, 2013. [23] S. K. Roy, B. Chanda, B. B. Chaudhuri, D. K. Ghosh, and S. R. Dubey, “A complete dual-cross pattern for unconstrained texture classification.” [24] Y. Xu, H. Ji, and C. Fermuller, “A projective invariant for textures,” in Computer Vision and Pattern Recognition, 2006 IEEE Computer Society Conference on, vol. 2. IEEE, 2006, pp. 1932–1939. [25] J. B. Florindo, A. R. Backes, M. de Castro, and O. M. Bruno, “A comparative study on multiscale fractal dimension descriptors,” Pattern Recognition Letters, vol. 33, no. 6, pp. 798–806, 2012. [26] Y. Quan, Y. Xu, Y. Sun, and Y. Luo, “Lacunarity analysis on image patterns for texture classification,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 160–167. [27] B. B. Chaudhuri and N. Sarkar, “Texture segmentation using fractal dimension,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 17, no. 1, pp. 72–77, 1995. [28] N. Sarkar and B. B. Chaudhuri, “An efficient differential box-counting approach to compute fractal dimension of image,” IEEE Transactions on Systems, Man and Cybernetics, vol. 24, no. 1, pp. 115–120, 1994. [29] O. S. Al-Kadi, D. Watson et al., “Texture analysis of aggressive and nonaggressive lung tumor ce ct images,” IEEE transactions on biomedical engineering, vol. 55, no. 7, pp. 1822–1830, 2008. [30] B. B. Mandelbrot and R. Pignoni, The fractal geometry of nature. WH freeman New York, 1983, vol. 173. [31] T. Lindeberg, “Scale-space theory: A basic tool for analyzing structures at different scales,” Journal of applied statistics, vol. 21, no. 1-2, pp. 225–270, 1994. [32] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International journal of computer vision, vol. 60, no. 2, pp. 91–110, 2004. [33] L. D. Griffin and M. Lillholm, “Symmetry sensitivities of derivativeof-gaussian filters,” IEEE transactions on pattern analysis and machine intelligence, vol. 32, no. 6, pp. 1072–1083, 2010. [34] J. D. Victor and B. W. Knight, “Simultaneously band and space limited functions in two dimensions, and receptive fields of visual neurons,” in Perspectives and Problems in Nolinear Science. Springer, 1994, pp. 375–419. [35] J. J. Koenderink, “The structure of images,” Biological cybernetics, vol. 50, no. 5, pp. 363–370, 1984. [36] K. Falconer, Fractal geometry: mathematical foundations and applications. John Wiley & Sons, 2004. [37] R. Van Den Boomgaard and A. Smeulders, “The morphological structure of images: The differential equations of morphological scale-space,” IEEE transactions on pattern analysis and machine intelligence, vol. 16, no. 11, pp. 1101–1113, 1994. xiii [38] T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE Transactions on pattern analysis and machine intelligence, vol. 24, no. 7, pp. 971–987, 2002. [39] M. Pietikäinen, A. Hadid, G. Zhao, and T. Ahonen, Computer Vision Using Local Binary Patterns. Springer Science & Business Media, 2011, vol. 40. [40] M. R. Faraji and X. Qi, “Face recognition under varying illumination with logarithmic fractal analysis,” IEEE Signal Processing Letters, vol. 21, no. 12, pp. 1457–1461, 2014. [41] S. Liao, M. W. Law, and A. C. Chung, “Dominant local binary patterns for texture classification,” IEEE transactions on image processing, vol. 18, no. 5, pp. 1107–1118, 2009. [42] J. Wright, A. Y. Yang, A. Ganesh, S. S. Sastry, and Y. Ma, “Robust face recognition via sparse representation,” IEEE transactions on pattern analysis and machine intelligence, vol. 31, no. 2, pp. 210–227, 2009. [43] Z. Guo, X. Wang, J. Zhou, and J. You, “Robust texture image representation by scale selective local binary patterns,” IEEE Transactions on Image Processing, vol. 25, no. 2, pp. 687–699, 2016. [44] P. Brodatz, Textures: a photographic album for artists and designers. New York, NY, USA: Dover Pubns, 1966. [45] E. Hayman, B. Caputo, M. Fritz, and J.-O. Eklundh, “On the significance of real-world conditions for material classification,” in European conference on computer vision. Springer, 2004, pp. 253–266. [46] K. J. Dana, B. Van Ginneken, S. K. Nayar, and J. J. Koenderink, “Reflectance and texture of real-world surfaces,” ACM Transactions On Graphics (TOG), vol. 18, no. 1, pp. 1–34, 1999. [47] Z. Li, G. Liu, Y. Yang, and J. You, “Scale-and rotation-invariant local binary pattern using scale-adaptive texton and subuniform-based circular shift,” IEEE Transactions on Image Processing, vol. 21, no. 4, pp. 2130– 2140, 2012. [48] Z. Guo, L. Zhang, and D. Zhang, “A completed modeling of local binary pattern operator for texture classification,” IEEE Transactions on Image Processing, vol. 19, no. 6, pp. 1657–1663, 2010. [49] ——, “Rotation invariant texture classification using LBP variance (LBPV) with global matching,” Pattern recognition, vol. 43, no. 3, pp. 706–719, 2010. [50] L. Liu, Y. Long, P. W. Fieguth, S. Lao, and G. Zhao, “Brint: binary rotation invariant and noise tolerant texture classification,” IEEE Transactions on Image Processing, vol. 23, no. 7, pp. 3071–3084, 2014. [51] X. Qi, R. Xiao, C.-G. Li, Y. Qiao, J. Guo, and X. Tang, “Pairwise rotation invariant co-occurrence local binary pattern,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 11, pp. 2199– 2213, 2014. [52] T. Ahonen, J. Matas, C. He, and M. Pietikäinen, “Rotation invariant image description with local binary pattern histogram fourier features,” Image analysis, pp. 61–70, 2009. [53] G. Zhao, T. Ahonen, J. Matas, and M. Pietikainen, “Rotation-invariant image and video description with local binary pattern features,” IEEE Transactions on Image Processing, vol. 21, no. 4, pp. 1465–1477, 2012. [54] R. Nosaka, Y. Ohkawa, and K. Fukui, “Feature extraction based on cooccurrence of adjacent local binary patterns,” in Pacific-Rim Symposium on Image and Video Technology. Springer, 2011, pp. 82–91. [55] X. Tan and B. Triggs, “Enhanced local texture feature sets for face recognition under difficult lighting conditions,” in International Workshop on Analysis and Modeling of Faces and Gestures. Springer, 2007, pp. 168–182. [56] B. Caputo, E. Hayman, M. Fritz, and J.-O. Eklundh, “Classifying materials in the real world,” Image and Vision Computing, vol. 28, no. 1, pp. 150–163, 2010. [57] T. Ojala, M. Pietikäinen, and D. Harwood, “A comparative study of texture measures with classification based on featured distributions,” Pattern recognition, vol. 29, no. 1, pp. 51–59, 1996. [58] A. Fathi and A. R. Naghsh-Nilchi, “Noise tolerant local binary pattern operator for efficient texture analysis,” Pattern Recognition Letters, vol. 33, no. 9, pp. 1093–1100, 2012. [59] K. Wang, C.-E. Bichot, C. Zhu, and B. Li, “Pixel to patch sampling structure and local neighboring intensity relationship patterns for texture classification,” IEEE Signal Processing Letters, vol. 20, no. 9, pp. 853– 856, 2013. [60] G. R. Iversen and H. Norpoth, Analysis of variance. Sage, 1987, no. 1. [61] J. Ren, X. Jiang, and J. Yuan, “Noise-resistant local binary pattern with an embedded error-correction mechanism,” IEEE Transactions on Image Processing, vol. 22, no. 10, pp. 4049–4060, 2013. [62] J. Bruna and S. Mallat, “Invariant scattering convolution networks,” IEEE transactions on pattern analysis and machine intelligence, vol. 35, no. 8, pp. 1872–1886, 2013. [63] L. Sifre and S. Mallat, “Rotation, scaling and deformation invariant scattering for texture discrimination,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2013, pp. 1233– 1240. [64] T.-H. Chan, K. Jia, S. Gao, J. Lu, Z. Zeng, and Y. Ma, “Pcanet: A simple deep learning baseline for image classification?” IEEE Transactions on Image Processing, vol. 24, no. 12, pp. 5017–5032, 2015. [65] M. Cimpoi, S. Maji, and A. Vedaldi, “Deep filter banks for texture recognition and segmentation,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3828–3836. [66] L. Liu, P. Fieguth, X. Wang, M. Pietikäinen, and D. Hu, “Evaluation of lbp and deep texture descriptors with a new robustness benchmark,” in European Conference on Computer Vision. Springer, 2016, pp. 69–86. [67] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105.
1
On the stable Andreadakis problem Jacques Darné March 2, 2018 arXiv:1711.05991v2 [math.AT] 1 Mar 2018 Abstract Let Fn be the free group on n generators. Consider the group IAn of automorphisms of Fn acting trivially on its abelianization. There are two canonical filtrations on IAn : the first one is its lower central series Γ∗ ; the second one is the Andreadakis filtration A∗ , defined from the action on Fn . In this paper, we establish that the canonical morphism between the associated graded Lie rings L(Γ∗ ) and L(A∗ ) is stably surjective. We then investigate a p-restricted version of the Andreadakis problem. A calculation of the Lie algebra of the classical congruence group is also included. Introduction Automorphisms of free groups have been widely studied over the years, from many different points of view. They are linked to the mapping class groups of surfaces and braid groups [FM12a]; they also act on a moduli space of graphs, called the outer space, introduced in [CV86], which is still actively studied nowadays (see, for instance, [BBM07], or [FM12b]). Recently, several results have also been obtained regarding the stable homology of these groups [Gal11, RWW17, DV15, Dja16a]. One way to try and understand the structure of these automorphism groups is to cut them into pieces, by considering a family of subgroups and studying how these interact with each other. Such families of subgroups can arise from the action on the free group Fn and related geometric objects, as is the case with the automorphisms with boundaries (see for instance [JW04] or [DP12]), and for the Andreadakis subgroups, which we now focus on. The first Andreadakis subgroup of Aut(Fn ) is the IA-group. Precisely, we can first look at how automorphisms act on Fnab ∼ = Zn . That is, we can consider the projection from Aut(Fn ) onto GLn (Z). We then put aside this linear part by considering only IAn , the subgroup of automorphisms acting trivially on Zn , which is an algebraic analogue of the Torelli subgroup of the mapping class group. An explicit finite set of generators of IAn has been known for a long time [Nie24] – see also [BBM07, 5.6]. Nevertheless, the structure of IAn remains largely mysterious. For instance, IA3 is not finitely presented [KM97], and it is not known if IAn is finitely presented for n > 3. Recent results about the IA-groups include the finite L-presentation of IAn given in [DP16], or finiteness results on the lower central series of IAn obtained in [CP17]. The IA-group is the first step of the Andreadakis filtration IAn = A1 ⊇ A2 ⊇ · · · , in which Aj is the group of automorphisms acting trivially on Fn /Γj+1 (Fn ), where Fn is filtered by its lower central series Fn = Γ1 (Fn ) ⊇ Γ2 (Fn ) ⊇ · · · . The Andreadakis filtration is an N -series. As such, it contains the minimal N -series on IAn , its lower 1 central series: for all k, Ak ⊇ Γk (IAn ). We are thus led to the problem of comparing these filtrations, that we call the Andreadakis problem. Since the two filtrations are N -series, the associated graded objects are graded Lie rings (that is, Lie algebras over Z), the Lie bracket being induced by the commutator map (x, y) 7→ [x, y] = xyx−1 y −1 . The inclusion i : Γ∗ (IAn ) ⊆ A∗ induces a morphism of Lie rings: M M i∗ : L(Γ∗ (IAn )) = Γj (IAn )/Γj+1 (IAn ) −→ L(A∗ ) = Aj /Aj+1 . (0.0.1) j>1 j>1 Thus, the Andreadakis problem translates into the following question: Problem 1 (Andreadakis). How close is the morphism (0.0.1) to be an isomorphism? Andreadakis conjectured that the filtrations were the same [And65, p. 253]. In [Bar13], Bartholdi disproved the conjecture, using computer calculations. He then tried to prove that the two filtrations were the same up to finite index, but in the erratum [Bar16], he showed that even this weaker statement cannot be true. His proof uses the L-presentation of IAn given in [DP16], to which he applies algorithmic methods described in [BEH08] to calculate (using the software GAP) the first degrees of the Lie algebra associated to each filtration. In this paper, we are interested in the difference between Ak (Fn ) and Γk (IAn ) for n  k, that is, in the stable range. We thus ask the following question: Problem 2 (Andreadakis - stable version). How close is the morphism i∗ : Lk (Γ∗ (IAn )) = Γk (IAn )/Γk+1 (IAn ) −→ Lk (A∗ ) = Ak /Ak+1 (0.0.2) to be an isomorphism when n  k? Our main goal here is to show the following partial answer to this question. Theorem 2.38 (Stable surjectivity). When n > k + 2, the morphism (0.0.2) is surjective. A (weaker) rational version of this theorem has been obtained independently by Massuyeau and Sakasai [MS17, th. 5.1]. Like them, we prove it by building on results from [Sat12], but using quite different methods. These methods include a description of Andreadakis-like filtrations via a categorical framework, allowing us to state and study a p-restricted version of the problem. We answer the questions asked in [HM17] about this problem, and use our answers to study the stable p-restricted Andreadakis problem. Also, we solve the stable q-torsion Andreadakis problem for Zn , getting a complete calculation of the Lie ring of the congruence group GLn (p Z) for n > 5. Let us now describe in more detail the methods we use and the results contained in the present paper. In section 1, we set up a general framework for understanding N -series and their associated Lie algebras. We introduce a category SCF of N -series. We remark that the categorical definition of an action of an object on another makes sense in this category. This allows us to interpret an old construction of Kaloujnine (see theorem 1.16) as the construction of universal actions in SCF. This category is thus action-representative, a situation studied in [BJK05, BB07, Bou08]. Using this language, we are able to recover and generalize several classical constructions: 2 • Taking the graded rings associated to N -series gives a functor L from SCF to the category of Lie rings. This functor preserves actions, and the Johnson morphism admits a nice generalisation as the classifying morphism associated to an action between Lie rings obtained from an action in SCF. • Lazard’s classical construction of N -series from algebra filtrations described in [Laz54] is recovered as a particular case of Kaloujnine’s construction. • We also obtain the filtrations on congruence groups studied in [Lop14]. In particular, we show that the filtration given by the last construction on the classical congruence group GLn (q Z) coincides with its lower central series when n > 5. As a consequence, we get an explicit calculation of this group’s Lie ring (generalizing [LS76, Th. 1.1], which is the degree-one part): Corollary 1.46. For all n > 5 and all q > 3, there is a canonical isomorphism of graded Lie rings (in degrees at least one): L(GLn (q Z)) ∼ = sln (Z /q)[t], where the degree of t is 1, and the Lie bracket of M ti and N tj is [M, N ]ti+j . Section 2 deals with the proof of our stable surjectivity result (Theorem 2.38). The proof relies on the constructions of the first section, applied to Fox’s free differential calculus. The Jacobian matrix map D : f 7→ Df turns out to be a derivation from Aut(Fn ) to GLn (Z Fn ), sending the Andreadakis filtration to the congruence filtration GLn ((IFn )∗ ) (the group algebra Z Fn being filtered by the powers of its augmentation ideal IFn ). We then study such derivations, and the maps they induce on the graded Lie rings associated to N -series they preserve. We thus show that the trace map defined by Tr(f ) = Tr(Df − 1n ) induces a well-defined map: Tr : L(A∗ ) −→ gr(Z Fn ). The graded algebra gr(Z Fn ) is in fact the tensor algebra T V over V = Fnab . A result from [BLGM90] implies that this trace map takes values in [T V, T V ]. Studying the links between free differential calculus and differential calculus in T V , we show that this trace map is exactly the one introduced by Morita [Mor93, Def. 6.4], getting the explicit description in terms of contraction maps notably used by Satoh in [Sat12]. Denoting the Johnson morphisms by τ and τ 0 , we get a commutative diagram of graded linear maps: L(IAn ) τ0 i∗ L(A∗ ) τ Der(LV ) TrM T V, where TrM ◦τ = Tr This gives the following inclusions of subspaces of Der(LV ): Im(τ 0 ) ⊆ L(A∗ ) ⊆ Tr−1 M ([T V, T V ]). We observe that calculations from [Sat12] work over Z. From this , we deduce that the subspaces Im(τ 0 ) and Tr−1 M ([T V, T V ]) are stably the same, so these inclusions are equalities in the stable range, and i∗ must be stably surjective. We close the section by 3 investigating some of the consequences of this result for automorphisms of free nilpotent groups. In section 3, we turn to the p-restricted version of the Andreadakis problem. Precisely, we can do the same construction as above, replacing the lower central series [p] Γ∗ (Fn ) by the mod-p lower central series Γ∗ (Fn ), which is an Np -series: [p] [p] (Γi )p ⊆ Γpi . [p] Kaloujnine’s construction gives an associated Andreadakis filtration A∗ on the group IA[p] of automorphisms of Fn acting trivially on Fnab ⊗ Fp . This filtration was shown in [p] [HM17] to be an Np -series. It then contains the minimal Np -series Γ∗ (IA[p] ). Whence the natural question: Problem 3 (Andreadakis – p-restricted version). What is the difference between the [p] [p] [p] Np -series A∗ and Γ∗ (IAn ) ? Answering to [HM17, rk. 8.6], we show that these two filtrations fit in the same kind of nice machinery as their classical counterparts, but they turn out to always differ. The paper ends on a quantification of the lack of stable surjectivity in this p-restricted case (see Proposition 3.20). Acknowledgements: This work is part of the author’s PhD thesis. The author is indebted to his advisors, Antoine Touzé and Aurélien Djament, for their constant support, countless helpful discussions, and numerous remarks and comments on earlier versions of the present paper. He also thanks Gwenaël Massuyeau and Takao Satoh, who kindly agreed to be the reviewers of his thesis, for their useful observations and comments. Contents Introduction 1 1 Generalities on strongly central series 1.1 Notations and reminders . . . . . . . . . . . . . . . . . 1.2 Strongly central filtrations and Lie algebras . . . . . . 1.3 Actions in the category of strongly central filtrations . 1.4 Johnson’s morphisms . . . . . . . . . . . . . . . . . . . 1.5 The Andreadakis problem . . . . . . . . . . . . . . . . 1.6 Lazard’s theorem . . . . . . . . . . . . . . . . . . . . . 1.7 Congruence groups . . . . . . . . . . . . . . . . . . . . 1.8 Comparison between filtrations obtained from an action 2 Traces and stable surjectivity 2.1 Free differential calculus . . . . . . . . . . . . 2.2 Derivations and strongly central filtrations . . 2.3 Algebras, actions and derivations . . . . . . . 2.4 Traces . . . . . . . . . . . . . . . . . . . . . . 2.4.1 The induced map between Lie algebras 2.4.2 Introducing the contraction map . . . . 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 6 7 11 12 14 15 17 . . . . . . 19 19 21 22 25 26 27 2.5 Stable surjectivity . . . . . . . . . . . . . . . . . . 2.5.1 Vanishing of the trace map . . . . . . . . . 2.5.2 Linear algebra . . . . . . . . . . . . . . . . 2.5.3 Stable cokernel of τ 0 and stable surjectivity Automorphisms of free nilpotent groups . . . . . 2.6 3 The 3.1 3.2 3.3 3.4 1 case of positive caracteristic Dark’s theorem . . . . . . . . . . . . . . . . p-Restricted strongly central series . . . . . The p-restricted Andreadakis problem . . . . The stable p-restricted Andreadakis problem 3.4.1 Vanishing of the trace map . . . . . . 3.4.2 Linear algebra . . . . . . . . . . . . . 3.4.3 Stable cokernel of i∗ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 28 30 30 31 . . . . . . . 33 33 34 35 37 37 38 39 Generalities on strongly central series 1.1 Notations and reminders Throughout the paper, G will denote an arbitrary group, and k a commutative unitary ring. The left and right action of G on itself by conjugation are denoted respectively by xy = y −1 xy and yx = yxy −1 . The commutator of two elements x and y in G is denoted by: [x, y] := xyx−1 y −1 . If A and B are subsets of G, we denote by [A, B] the subgroup generated by the commutators [a, b] with (a, b) ∈ A×B. If A and B are stable by conjugation by elements of G (resp. by all automorphisms of G), then [A, B] is a normal (resp. characteristic) subgroup of G. For instance, [G, G] is a characteristic subgroup of G, called the derived subgroup of G. The quotient Gab := G/[G, G] is the abelianization of G, its bigger abelian quotient. The derived subgroup is the second step of a filtration of G by characteristic subgroups: Definition 1.1. The lower central series of G, denoted by Γ∗ (G), or shortly Γ∗ , is the filtration of G defined by: ( Γ1 := G, Γk+1 := [G, Γk ]. Definition 1.2. A group G is said to be nilpotent if its lower central series stops. The least integer c such that Γc+1 (G) = {1} is then G’s nilpotency class. More generally, G is said to be residually nilpotent if its lower central series is separated, i.e. if: \ Γi (G) = {1}. i One can easily check the following formulas: Proposition 1.3. For all x, y, z ∈ G, • [x, x] = 1, • [x, y]−1 = [y, x], • [x, yz] = [x, y] (y [x, z]) , 5 • [[x, y], yz] · [[y, z], zx] · [[z, x], xy] = 1, x z y • [[x, y −1 ], z −1 ] · [[z, x−1 ], y −1 ] · [[y, z −1 ], x−1 ] = 1. The last ones are two versions of the Witt-Hall identity, which implies the following: Lemma 1.4 (3-subgroups lemma). Let A, B and C be three subgroups of a group G. If two of the three following subgroups are trivial, then so is the third: [A, [B, C]], [B, [C, A]], [C, [A, B]]. Equivalently, one of them is contained in the normal closure of the two others. 1.2 Strongly central filtrations and Lie algebras The theory of strongly central series has notably been studied by M. Lazard [Laz54]. Definition 1.5. Let G be a group. A strongly central filtration of G (also called strongly central series or N -series) is a filtration G = G1 ⊇ · · · ⊇ Gi ⊇ · · · of G by subgroups, satisfying: ∀i, j > 1, [Gi , Gj ] ⊆ Gi+j . Remark that indexation has to begin from G = G1 . In particular, [G, Ni ] ⊆ Ni+1 ⊆ Ni , which means exactly that the Ni are normal subgroups of G. Proposition 1.6. Let G be a group. The lower central series Γ∗ (G) is a strongly central series on G, and it is the minimal one. Proof. The strong centrality is shown by induction, using the 3-subgroup lemma 1.4. Given a strongly central filtration G∗ of G = G1 , a straightforward induction then gives: Gi ⊇ Γi (G) for any i > 1. Let G = G1 ⊇ · · · ⊇ Gk ⊇ · · · be any strongly central filtration of a group G. The quotients Li (N∗ ) := Ni /Ni+1 are abelian (for any i > 1), since [Ni , Ni ] ⊆ N2i ⊆ Ni+1 . The graded abelian group M L(N∗ ) := Li (N∗ ), i>1 is endowed with a bracket induced by the commutator map (x, y) 7→ [x, y] of G. Using the formulas 1.3, one easily checks that this defines a Lie bracket: L(G∗ ) is a Lie ring (i.e. a Lie algebra over Z). Notation 1.7. We denote L(Γ∗ (G)) by L(G) (that is, if we do not specify a strongly central filtration on a group, it is understood to be filtered by its lower central series). Example 1.8. If G is a free group, then L(G) is the free Lie algebra over the Z-module Gab [Laz54, th. 4.2]. As products of commutators become sums of brackets inside the Lie algebra, the following fundamental property follows from the definition of the lower central series: Proposition 1.9. The Lie ring L(G) is generated in degree 1. Precisely, it is generated (as a Lie ring) by L1 (G) = Gab . As a consequence, if G is of finite type, then each Ln (G) is too. 6 1.3 Actions in the category of strongly central filtrations Let SCF be the category whose objects are the strongly central filtrations, where morphisms between G∗ and H∗ are the group morphisms from G1 to H1 preserving filtrations. There is a forgetful functor ω1 : SCF −→ Grps defined by G∗ 7→ G1 . This functor admits a left adjoint Γ : G 7→ Γ∗ (G) (see Proposition 1.6). It also admits a right adjoint G 7→ (G, G, ...). Proposition 1.10. The category SCF is complete and cocomplete, and is homological (but not semi-abelian). A general reference on homological categories is [BB04]. The reader can also consult [HL11] for a simple version of the axioms defining homological cocomplete and semiabelian categories. Proof of Proposition 1.10. The forgetful functor ω1 admits both a left and a right adjoint, so it has to commute to limits and colimits. It does not create either of them (in the sense of [ML98], V.1), but it almost does. Precisely, let F : D −→ SCF be a diagram. The colimit G∞ of the group diagram ω1 F is in general endowed with several strongly central filtrations making ω1 F (d) −→ G∞ into filtration-preserving morphisms (for instance the trivial one). One checks easily that the minimal such filtration (which is the intersection of all those) is the colimit of F . Similarly, the limit G∞ of the group diagram ω1 F is endowed with several strongly central filtrations making ϕd : G∞ −→ ω1 F (d) into filtration-preserving morphisms (for instance its lower central series). However, the maximal such filtration is the limit of F . It is explicitly described as: \ G∞ = ϕ−1 ∗ d (F (d)). d To check that SCF is homological, one can check the axioms given in [HL11]. It is not semi-abelian, because there are equivalence relation R∗ ⊆ G2∗ for which R∗ is not the induced filtration on R1 (like in topological groups – or more generally in the categories of topological algebras considered in [BC05] – where an equivalence relation does not have to be endowed with the induced topology). In a homological category, we need to distinguish between usual epimorphisms (resp. monomorphisms) and regular ones, that is, the ones obtained as coequalizers (resp. equalizers). In SCF, the former are the u such that u1 = ω1 (u) is an epimorphism (resp. a monomorphism), whereas the latter are surjections (resp. injections): Definition 1.11. Let u : G∗ −→ H∗ be a morphism in SCF. It is called an injection (resp. a surjection) when u1 is injective (resp. surjective) and u−1 (Hi ) = Gi (resp. u(Gi ) = Hi ) for all i. Examples of homological categories include abelian categories, the category Grps of groups, or the category Lie of Lie algebras. The usual lemmas of homological algebra (the nine lemma, the snake lemma, the five lemma...) are true in these categories. Homological categories differ from abelian ones notably by the fact that in general, two split extensions between the same objects are not isomorphic (by an isomorphism preserving the splittings). This allows us to define an action of an object on another. 7 Definition 1.12. Let C be a homological category. If X and Z are two objects of C, we define an action of Z on X as a split extension (with a given splitting): X Y Z. When such an action is given, we will say that Z acts on X, and write: Z  X. This definition (which needs only the weaker setting of pointed protomodular categories to make sense) is motivated by the situation in Grps, where an action of a group K on a group G is encoded by a semi-direct product structure G o K. Remark 1.13. The choice of splitting is crucial here. For instance, the canonical extension:   X   0 1 1   0 X ×X  0  1 X   1 1 can be split by , or by the diagonal . The first choice gives the trivial action, whereas the second one gives the adjoint action, which is highly non-trivial: in Lie, this gives the adjoint representation; in Grps, we get the action of a group on itself by conjugation. The set Act(Z, X) of actions of Z on X is a contravariant functor in Z: the restriction of an action along a morphism is defined via a pullback. In Grps, as in Lie, this functor is representable, for any X. Indeed, an action of a group K on a group G is given by a morphism K −→ Aut(G). Similarly, an action of a Lie algebra k on a Lie algebra g is given by a morphism k −→ Der(g), where Der(g) is the Lie algebra of derivations from g to itself. Recall that a derivation ∂ is a linear map satisfying: ∂([x, y]) = [∂x, y] + [x, ∂y]. The situation when actions are representable has notably been studied in [BJK05], and in several subsequent papers [BB07, Bou08]. The following terminology was introduced in [BB07, Def. 1.1]: Definition 1.14. A homological category C is said to be action-representative when the functor Act(−, X) is representable, for any object X ∈ C. Our goal for the rest of this section is to construct universal actions in SCF, getting in particular the following result: Proposition 1.15. The category SCF is action-representative. A representative for Act(−, X) is a universal action on X. Explicitly, it is an action of an object A(X) on X such that any action Z  X is obtained by restriction along a unique morphism Z → A(X). For instance, in Grps, the universal action on G is: G G o Aut(G) Aut(G), where the group G o Aut(G) is the holomorph of G. Its underlying set is G × Aut(G), endowed with the product defined by (g, σ) · (h, τ ) := (gσ(h), στ ). The construction of universal actions in SCF is given by a theorem of Kaloujnine [Kal50a, Kal50b], quoted by Lazard in [Laz54, p. 117]: 8 Theorem 1.16 (Kaloujnine). Let G∗ be a strongly central series. Let j > 1 be an integer. Let Aj (G∗ ) ⊆ Aut(G∗ ) be the subgroup of automorphisms acting trivially on every quotient Gi /Gi+j . Then A∗ (G∗ ) is a strongly central series. Notation 1.17. As for Lie rings (Notation 1.7) we abbreviate A∗ (Γ∗ (G)) to A∗ (G). We can rewrite the definition of Aj (G∗ ) given in the theorem as: ! Y Aj (G∗ ) = ker Aut(G∗ ) −→ Aut (Gi /Gi+j ) . i Identifying G and Aut(G) to the subgroups G × 1 and 1 × Aut(G) of the holomorph G o Aut(G), we can define the commutator of an automorphism with an element of G: [σ, g] = σ(g)g −1 . Note that [Aut(G), G] ⊆ G. Using this point of view, we can rephrase the previous definition: Aj (G∗ ) = { σ ∈ Aut(G∗ ) | ∀i > 1, [σ, Gi ] ⊆ Gi+j } ⊆ G1 o Aut(G∗ ). (1.17.1) Proof of Theorem 1.16. We abbreviate Aj (G∗ ) to Aj . Obviously, Aj+1 ⊆ Aj . We show the strong centrality using the 3-subgroup lemma (Lemma 1.4). Precisely, let α, β > 1 be two integers. For all i > 1, the group Gi+α+β is normal in G o Aut(G∗ ) (it is normal in G and Aut(G∗ )-stable). Lemma 1.4 thus implies: [[Aα , Aβ ], Gi ] ⊆ Gi+α+β . This says exactly that [Aα , Aβ ] ⊆ Aα+β , which is the desired conclusion. Remark 1.18. The group A1 (G∗ ) is the group of automorphisms of G1 preserving G∗ and acting trivially on L(G∗ ). Example 1.19. Let G∗ = Γ∗ (G). Then L(G∗ ) is generated in degree one as a Lie algebra. As a consequence A1 (G∗ ) is the subgroup of automorphisms acting trivially on the abelianization Gab = L1 (G), denoted by IAG . In order to show that the filtration A∗ (G∗ ) acts universally on G∗ , we need to investigate actions in SCF. Proposition 1.20. An action K∗  G∗ in SFC consists of a group action of K = K1 on G = G1 such that : ∀i, j, [Ki , Gj ] ⊆ Gi+j . Proof. Let an action of K∗ on G∗ be given: G∗ H∗ K∗ . The forgetful functor ω1 : G∗ 7→ G1 from SCF to groups has a left adjoint G 7→ Γ∗ G. Hence, it commutes with kernels. Applying this functor to the given action, we get a split extension of groups: G1 H1 9 K1 . The group H1 thus decomposes as a semi-direct product G1 o K1 of G1 by K1 . In fact, there are other forgetful functors ωi : G∗ 7→ Gi , each one with a left adjoint G 7→ Γd ∗i e G (where d−e is the usual ceiling function). We then get split extensions of groups: Gi Hi Ki . The groups Hi thus decomposes as semi-direct products Gi o Ki of Gi by Ki . As H∗ is a strongly central filtration, we can apply Lemma 1.21 below to get the desired relation. Conversely, let a group action be given as in the statement of the proposition. Using the same lemma, we see that H∗ = G∗ o K∗ is a strongly central filtration on H = K o G, and the corresponding split sequence in SFC is exact. Lemma 1.21. Let K  G be an action in Grps, encoded in a semi-direct product structure H = G o K. Let G∗ and K∗ be given filtrations on G = G1 and K = K1 respectively. Then the Hi := Gi o Ki are subgroups of H defining a strongly central filtration of H if and only if:   K∗ is a strongly central series on K, G∗ is a strongly central series on G,  ∀i, j, [Kj , Gi ] ⊆ Gi+j . Proof. Suppose first that (Gi o Ki )i is strongly central. Then its projection K∗ on K also is. So is its intersection G∗ with G. Hence, the conclusion follows from: [Kj , Gi ] ⊆ (Gi+j o Ki+j ) ∩ G = Gi+j . Conversely, under the hypothesis listed above, Gi is stable under the action of Ki , so the Hi = Gi o Ki are subgroups of H. We then use the formulas 1.3 to compute [kg, k 0 g 0 ] with k, g, k 0 , g 0 in Ki , Gi , Kj and Gj respectively: 0 [kg, k 0 g 0 ] = [kg, k 0 ] ·g [kg, g 0 ] 0 0 = k[g, k 0 ] · [k, k 0 ] · k k[g, g 0 ] · k [k, g 0 ] ∈ Gi+j · Ki+j · Gi+j · Gi+j = Gi+j o Ki+j . This completes the proof. We are now ready to show the result announced in Proposition 1.15: Proposition 1.22. Let G∗ be a strongly central series. The strongly central series A∗ (G∗ ) acts canonically on G∗ , and this action is universal. Proof. That A∗ (G∗ ) acts on G∗ follows from the formula (1.17.1), Theorem 1.16 and Proposition 1.20. Given an action of a strongly central series K∗ on G∗ , the underlying group action is described by a unique morphism from K1 to Aut(G1 ). From Proposition 1.20, we deduce that this morphism sends Kj into Aj (G∗ ). Conversely, any morphism from K∗ to A∗ (G∗ ) in SCF gives a group action lifting to an action in SCF by Proposition 1.20. Remark 1.23. If a group K acts on a group G, and G∗ is a strongly central filtration on G = G1 , we can pull back the canonical filtration A∗ (G∗ ) by the associated morphism: K −→ Aut(G). 10 This gives a strongly central filtration A∗ (K, G∗ ), maximal amongst strongly central filtrations on subgroups of K which act on G∗ via the given action K  G. It can be described explicitly as: Aj (K, G∗ ) = { k ∈ K | ∀i > 1, [k, Gi ] ⊆ Gi+j } ⊆ K. 1.4 Johnson’s morphisms The construction of the Johnson morphism associated with an action in SCF relies on the following: Proposition 1.24. The Lie functor L : SCF −→ LieZ is exact, i.e. it preserves short exact sequences [BB04, Def 4.1.5]. Proof. The exactness of L is equivalent to the exactness of each Li : SCF −→ Ab. Consider the forgetful functors ωi : G∗ 7→ Gi from SCF to Grps. Each ωi has a left adjoint G 7→ Γd ∗i e G, so these functors preserve kernels. Moreover, they preserve regular epimorphisms, which are surjections in SCF (cf. Definition 1.11). Hence, they are exact. Since Li is the cokernel of the injection ωi+1 ,→ ωi , its exactness follows from the nine lemma in Grpes. Precisely, if E is any short exact sequence in SCF, apply the nine lemma to the diagram ωi+1 (E) ,→ ωi (E)  Li (E) to get the exactness of Li (E) from that of ωi (E) and ωi+1 (E). As a consequence of Proposition 1.24, the functor L preserves actions. Precisely, from an action in SCF: G∗ H∗ K∗ , we get an action in the category of graded Lie rings: L(G∗ ) L(H∗ ) L(K∗ ). Such an action is given by a morphism of graded Lie rings: L(K∗ ) −→ Der∗ (L(G∗ )). (1.24.1) The target is the (graded) Lie algebra of graded derivations: a derivation is of degree k when it raises degrees of homogeneous elements by k. Definition 1.25. The morphism (1.24.1) is called the Johnson morphism associated to the given action K∗  G∗ . We can give an explicit description of this morphism: for k ∈ K, the derivation associated to k̄ is induced by [k̄, −] inside L(G∗ oK∗ ) = L(G∗ )oL(K∗ ), so it is induced by [k, −] inside G∗ o K∗ . Example 1.26. The Johnson morphism associated to the universal action A∗ (G∗ )  G∗ is the Lie morphism: τ : L(A∗ (G∗ )) −→ Der∗ (L(G∗ )) induced by σ 7→ (x 7→ σ(x)x−1 ). 11 If K1 is in fact a normal subgroup of a group K0 , such that each Ki is normal in K0 , and such that the action of K1 on G∗ can be extended to an action of K0 , then K0 acts on L(G∗ o K∗ ) and this action factorizes through K0 /K1 . Moreover, as this action is by automorphisms of the Lie ring: Lemma 1.27. Let K0 .K1 be given as above. Then the Johnson morphism τ is K0 /K1 equivariant. The action of K0 on derivations is by conjugation. Precisely: τ (k · x) = [k · x, −] = k · [x, k −1 · −] = k ◦ τ (x) ◦ k −1 . Lemma 1.28. Let K∗  H∗ be an action in SCF. The associated Johnson morphism τ : L(K∗ ) −→ Der(L(G∗ )) is injective if and only if K∗ is the filtration A∗ (K, G∗ ) defined in Remark 1.23. Proof. Every non-trivial element in ker(τj ) lifts to an element in Aj (K, G∗ ) − Kj . Conversely, an element σ in Aj (K, G∗ ) − Kj is in Kk − Kk+1 for some k < j. Then σ ∈ Kk /Kk+1 − {0} is a non-trivial element in ker(τ ). Remark 1.29. The definition of Aj (K, G∗ ) makes sense for j = 0, giving a subgroup K0 = A0 (K, G∗ ) of K acting as above. The morphism τ is then A0 (K, G∗ )-equivariant. In fact, τ can then be extended to a morphism of extended Lie algebras, in the sense of [HM17]. Ideed, their construction of an algebra of extended derivations is exactly a construction of universal actions in the category of extended Lie algebras, and their version of the Johnson morphism is exactly the one we find if we replace N -series and Lie algebras by their extended version in the constructions above. 1.5 The Andreadakis problem Let G be a group. To study the structure of Aut(G), we can consider first how automorphisms act on Gab . Then we can put aside this linear part by considering the kernel of the projection from Aut(G) to GL(Gab ). This kernel IAG is (residually) nilpotent when G is, and in endowed with two strongly central filtrations: its lower central series, and the Andreadakis filtration A∗ (G). We are thus led to the problem of comparing these filtrations, which we call the Andreadakis problem (Problem 1). Recall from Theorem 1.16 and Example 1.19 that A∗ (G) is a strongly central filtration on A1 (G) = IAG . Since A1 (G) is the kernel of the canonical action of Aut(G) on L(G), we get an induced faithful action of Aut(G)/IAG (6 GL(Gab )) on L(G). The next lemma gives a similar concrete description of all the Aj (G): Lemma 1.30. The group Aj (G) is the subgroup of automorphisms acting trivially on G/Γj+1 (G), i.e. Aj (G) = { σ ∈ Aut(G) | [σ, G] ⊆ Γj+1 (G) } . Proof. Let us denote by Kj the right-hand side of the equality. We only need to show the inclusion Kj ⊆ Aj (G). The case j = 1 is given in Example 1.19. Suppose it true for j − 1, and let σ ∈ Kj . In particular, σ is inside Kj−1 = Aj−1 (G), so it induces a derivation [σ, −] of degree j − 1 of L(G), via the Johnson morphism. By definition, [σ, G] ⊆ Γj+1 . This says exactly that the derivation [σ, −] is trivial on L1 (G). Since L(G) is generated in degree one (Proposition 1.9), [σ, −] has to be trivial on all of L(G): for all i, [σ, Γi ] ⊆ Γi+j , which is the desired conclusion. 12 The filtration A∗ (G) is strongly central on A1 (G) = IAG . As a consequence, Ak (G) contains Γk (IAG ). A first consequence of this inclusion is that the (residual) nilpotency of G implies the (residual) nilpotency of IAG . Precisely, let G be a c-nilpotent group. Then Ac (G) = {1G }. Accordingly, Γc (IAG ) = {1G }, so IAG is (c − 1)-nilpotent. In a similar fashion, one can check that IAG has to be residually nilpotent when G is. The following question is crucial for trying to understand the structure of automorphism groups of residually nilpotent groups, in particular for trying to understand the structure of Aut(Fn ): Problem 1 (Andreadakis). What is the difference between A∗ (G) and Γ∗ (IAG ) ? Example 1.31. Consider the alternating group An . When n 6= 2, 6, Aut(An ) = Σn (acting by conjugation), as is easily deduced from [Rot95, cor. 7.5]. But if n > 5, then An is perfect: [An , An ] = An . On the one hand, the Andreadakis filtration is thus constant equal to IA(An ) = Aut(An ) = Σn . On the other hand, the lower central series of Σn is Σn , An , An , ..., so the two filtrations differ in this case. Recall from the Introduction that we are interested in a stable form of the problem for G = Fn : Problem 2 (Andreadakis - stable version). What is the difference between Ak (Fn ) and Γk (IAn ) for n  k ? The Johnson morphism turns out to be a powerful tool in the study of the Andreadakis filtration (which is the analogous of Johnson’s filtration on the mapping class group, defined by Johnson in [Joh83]). Recall the A∗ (G) acts on Γ∗ (G) (see Proposition 1.22). The associated Johnson morphism τ is described in Example 1.26. The Γi (G) are characteristic subgroups of G, so A0 (G) = Aut(G). Lemmas 1.27 and 1.28 then give: Lemma 1.32. The morphism τ is injective and Aut(G)/IAG -equivariant. The filtration Γ∗ (IAG ) also acts on Γ∗ (G), by pulling back the universal action along the inclusion i : Γ∗ (IAG ) ⊆ A∗ (Fn ). The associated Johnson morphism is denoted by: τ 0 = τ ◦ i∗ . The morphism τ 0 is still equivariant, but is injective if and only if G satisfies Andreadakis’ conjecture (i.e. if i∗ = 1 ). Example 1.33. If G is a free group, then L(Fn ) is the free Lie algebra LV on V = Gab . If g  h is an action in Lie, then g also acts on ho , which is obtained by considering the module h as an abelian Lie algebra. Derivations from g to h then identify with sections of the projection ho o g  g. Hence, the free Lie algebra is also free with respect to derivations. In particular: Derk (LV ) ∼ = Homk (V, Lk V ) ∼ = V ∗ ⊗ Lk V. The following result is well-known [Kaw06, th. 6.1]: Proposition 1.34. In degree one, the Johnson morphism τ 0 is a GLn (Z)-equivariant isomorphism: 2 ∼ ∗ τ10 : IAab n = V ⊗ Λ V. Proof. The group IAn is generated by the following elements [Nie24] – see also [BBM07, 5.6]: ( ( xj xi x−1 if t = i [xj , xk ]xi if t = i j and Kijk : xt 7−→ (1.34.1) Kij : xt 7−→ xt else xt else. One can check by a direct calculation that these generators are sent to a basis of the free abelian group V ∗ ⊗ Λ2 V . 13 1.6 Lazard’s theorem Definition 1.35. A filtered algebra A∗ is an associative k-algebra A0 endowed with a filtration by ideals: A = A0 ⊇ A1 ⊇ ... such that: ∀i, j, Ai Aj ⊆ Ai+j . We denote by f Alg the category of filtered algebras (and filtration-preserving morphisms). Example 1.36. Let kG be the group algebra of G with coefficients in the (commutative) ring k. We denote by ε : kG → k its canonical augmentation and by Ik G := ker(ε) its augmentation ideal (we will sometimes write IG, or even I, for short). Then kG is filtered by the powers I ∗ G of its augmentation ideal. If G is a free group, then gr(kG) is the tensor algebra over Gab ⊗ k [Pas79, th. 6.2]. From Theorem 1.16, we can deduce the useful corollary [Laz54, th. 3.1]: Theorem 1.37 (Lazard). Let A = A0 ⊃ A1 ⊇ · · · be a filtered algebra. Then A× ∗ := × A× ∩ (1 + A∗ ) is a strongly central filtration on A× ⊆ A , and (−) − 1 induces an 1 embedding of graded Lie algebras: L(A× ∗ ) ,→ gr∗ (A1 ). α Remark 1.38. Fix a morphism G −→ A× . We can pull back the filtration given by the theorem to get a strongly central filtration α−1 (1 + A∗ ) on G1 = α−1 (1 + A1 ). Proof of Theorem 1.37. The filtration A = A0 ⊃ A1 ⊇ · · · can be seen as a filtration of the abelian group A. As A is abelian, it has to be strongly central. Consider the action by left multiplication: ρ : A× −→ Aut(A, +). Let a ∈ A× . One can easily check that ρ(a) ∈ Aj (A∗ ) (where Aj (A∗ ) is the filtration defined in Kaloujnine’s theorem 1.16) if and only if a ∈ 1 + Aj . Thus, A× ∩ (1 + Ai ) = ρ−1 (Aj (A∗ )) is a strongly central filtration, as announced. It remains to show that ∂ = α − 1 induces a morphism of Lie ring (necessarily injective). This can be checked directly from the formula: [g, h] − 1 = [g − 1, h − 1]g −1 h−1 . We will give a slightly different proof later on, using the concept of derivations (see Paragraph 2.2). Example 1.39. Applying Remark 1.38 to the inclusion of G in kG filtered by the powers of the augmentation algebra, we get the dimension series of G: D∗k G = G ∩ (1 + Ik∗ G). It is a strongly central series on G, so it contains Γ∗ G. The question of the equality of D∗Z G and Γ∗ G was known as the dimension subgroup problem during a long time, until an example of a group for which the two filtration differ was given in [Rip72]. See [MP09, chap. 2] for more on this subject. If G is a free group, then L(D∗Z G) is the sub-Lie ring generated in degree one in the tensor algebra gr(Z G) ∼ = T V . Hence (by the PBW theorem), it is the free Lie ring. It then has to coincide with L(G), so D∗Z G = Γ∗ G. Thus, free groups have the dimension property. 14 Lazard’s theorem gives a construction of a strongly central filtration from a filtered algebra. Conversely, we can define a filtered algebra from a strongly central filtration G∗ on G = G1 . Indeed, let kG be filtered by: Fi := kG · (Ni − 1) = ker(kG −→ k(G/Hi )). This filtration does not make kG into a filtered algebra, but it generates a filtration which does: X akj (N∗ ) := kG · (Ni1 − 1) · · · (Nin − 1). i1 +···+in >j One can easily check that these constructions are universal: Proposition 1.40. The above constructions define an adjunction: SCF 1.7 ak∗ (−)× ∗ f Algk . Congruence groups If I is an (associative) ring without unit, recall that its congruence group GLn (I) is defined as: GLn (I) := ker(GLn (A) −→ GLn (A/I)), where A is any unitary (associative) ring containing I as a (two-sided) ideal, (e.g. A = I o Z). This group depends only on I, as it is exactly (1 + Mn (I))× . If A = A0 ⊇ A1 ⊇ · · · is a filtered algebra (see Definition 1.35), then so is the matrix algebra Mn (A), endowed with the filtration Mn (A∗ ). Theorem 1.37 gives us a strongly central filtration of the congruence group: GLn (A1 ) = GLn (A) ∩ (1 + Mn (A1 )) = ker(GLn (A) −→ GLn (A/A1 )). by congruence subgroups: GLn (Aj ) = GLn (A) ∩ (1 + Mn (Aj )) = ker(GLn (A) −→ GLn (A/Aj )), and an embedding of the associated Lie ring into a matrix algebra: L(GLn (A∗ )) ,→ gr∗ (Mn (A∗ )) ∼ = Mn (gr∗ (A∗ )). As in the proof of Theorem 1.37, this filtration can be interpreted as: GLn (A∗ ) = A∗ (GLn (A), An∗ ). We also can recover Lazard’s theorem as the case n = 1 of this construction. Suppose that A∗ is commutative. Then the usual determinant defines a filtrationpreserving morphism: det : GLn (A∗ ) −→ GL1 (A∗ ) = A× ∗. Indeed, if M ∈ Mn (Aj ), then det(1 +M ) ∈ 1+Aj . The following proposition determines the associated graded morphism: 15 Proposition 1.41. The following square commutes: L(GLn (A∗ )) (−)−1 Mn (gr(A∗ )) det L(A× ∗) Tr (−)−1 gr(A∗ ). Moreover, it is Cartesian, that is: L(GLn (A∗ )) ∼ = Tr−1 (L(A× ∗ ) − 1). The kernels of det and Tr then coincide. We thus recover (an generalize slightly) a result of [Lop14]: Corollary 1.42. Let SLn (A∗ ) be the kernel of the determinant. Then: L(SLn (A∗ )) ∼ = ker(Tr) = sln (gr(A∗ )). Remark 1.43. If L(A× ∗ ) = 0, then L(GLn (A∗ )) = L(SLn (A∗ )), and this Lie ring identifies to sln (gr(A∗ )). This happens for example when GL1 (A1 ) = {1} (implying SLn (A∗ ) = GLn (A∗ )), which is verified for A∗ = q ∗ Z (if q > 2), or A∗ = t∗ k[t]. Proof of Proposition 1.41. Let M ∈ Mn (Aj ). Then: det(1 + M ) ≡ 1 + Tr(M ) (mod A2j ). When j > 1, then A2j ⊆ Aj+1 , so this formula gives the commutativity of the above square. The module Tr−1 (Lj (A× ∗ ) − 1) is additively generated by the matrices: āeαβ , ā(e11 − eαα ) and b̄e11 , for α 6= β, a ∈ Aj and 1 + b ∈ A× j . Replacing ā(e11 − eαα ) by ā(e11 + e1α − eα1 − eαα ), we can lift these to GLn (Aj ) as follows:  lifts āeαβ ,  1 + aeαβ 1 + a(e11 + e1α − eα1 − eαα ) lifts ā(e11 + e1α − eα1 − eαα ),  1 + be11 lifts b̄e11 . This completes the proof. Let n > 3. If A is a ”non-totally-imaginary Dedekind ring of arithmetic type” and q is an ideal of A, then we have [BMS67, cor. 4.3 (b)] that SLn (q) is normally generated in SLn (A) (in fact in En (A)) by the shear mappings 1 + teαβ with α 6= β and t ∈ q. This applies for instance to A = Z and q = (q). From this we deduce: Proposition 1.44. If n > 5, under the above hypothesis: Γ∗ (SLn (q)) = SLn (q∗ ). Proof. The filtration SLn (q∗ ) is strongly central on SLn (q), so it contains its lower central series. Conversely, using that:  1 + (a + b)eαβ = (1 + aeαβ )(1 + beαβ ) if α 6= β, 1 + abeαβ = [1 + aeαγ , 1 + beγβ ] if α, β and γ are pairwise distinct, one can easily check that for any t in qk and any α 6= β, if n > 5: 1 + teαβ ∈ Γk (SLn (q)). Using the result from [BMS67], we see that these generate SLn (qk ) as a normal subgroup of SLn (A). Hence SLn (qk ) ⊆ Γk (SLn (q)), as required. 16 Remark 1.45 (On the q-torsion Andreadakis problem for Zn ). Fix an integer q. A qtorsion strongly central filtration is a strongly central filtration G∗ such that Gqi ⊆ Gi+1 for every i > 1 (this means exactly that q L(G∗ ) = 0). On any group G, there is (q) a minimal q-torsion strongly central filtration Γ∗ (G). Moreover, A∗ (G∗ ) is q-torsion whenever G∗ is, because L(A∗ (G∗ )) embeds into a q-torsion Lie algebra via the Johnson (q) (q) (q) morphism. Let us denote A∗ (Γ∗ (G)) by A∗ (G) and A1 (G) by IA(q) (G) (it is the group of automorphisms acting trivially on Gab ⊗ (Z /q)). Thus we get an inclusion of (q) (q) Γ∗ (IA(q) ) into A∗ and a corresponding q-torsion Andreadakis problem. (q) Apply this with G = Zn and q > 3. Then Γ∗ (G) = q ∗ Z, Aut(G) = GLn (Z), (q) and A∗ (G) = GLn (q ∗ Z) = SLn (q ∗ Z) Proposition 1.44 then gives an answer to the (q) q-torsion Andreadakis problem for Zn in the stable range (n > 5) : A∗ (Zn ) is the lower central series of IA(q) (Zn ) = SLn (q Z). When A = Z and q = (q), the graded ring gr(q ∗ Z) is (Z /q)[t]. Moreover, GLn (q Z) = SLn (q Z) (see Remark 1.43). Proposition 1.44 and Corollary 1.42 thus give: Corollary 1.46. For all n > 5 and all q > 3, there is a canonical isomorphism of graded Lie rings (in degrees at least one): L(GLn (q Z)) ∼ = sln (Z /q)[t], where the degree of t is 1, and the Lie bracket of M ti and N tj is [M, N ]ti+j . Remark 1.47. This generalizes [LS76, Th. 1.1], which is the degree-one part. Remark 1.48. For n = 2 and q > 5 a prime number, the group SL2 (q Z) is free on 1 + q(q 2 − 1)/12 generators [Gro52, Fra33]. Its Lie ring is then a free Lie ring on the same number of generators. The author does not know a complete calculation for n = 3 or 4 : the above calculus does give the abelianization, but it fails to determine the whole lower central series. 1.8 Comparison between filtrations obtained from an action Let G be a group. Suppose that G acts on two strongly central series H∗ et K∗ (by automorphisms in SCF). We then can ask what link exists between A∗ (G, H∗ ) and A∗ (G, K∗ ) (as defined in Remark 1.23), depending on the links between H∗ an K∗ . The next proposition describes the behaviour of the construction A∗ (G, −) with respect to injections, surjections (see Definition 1.11) and semi-direct products in the category G−SCF of strongly central series endowed with a G-action (where morphisms respect this action): Proposition 1.49. Let G be a group acting on strongly central series N∗ , H∗ and K∗ . Let u : N∗ −→ H∗ and v : H∗ −→ K∗ be G-equivariant morphisms. If u : N∗ −→ H∗ is an injection, then A∗ (G, H∗ ) ⊆ A∗ (G, N∗ ). If v : H∗ −→ K∗ is a surjection, then A∗ (G, H∗ ) ⊆ A∗ (G, K∗ ). If N∗ H∗ K∗ is a split exact sequence in G − SCF, then: A∗ (G, H∗ ) = A∗ (G, K∗ ) ∩ A∗ (G, N∗ ). 17 Proof. In the first case, we identify N = N1 to a subgroup of H = H1 . Let g ∈ Aj (G, H∗ ). We write: [g, Ni ] = [g, N ∩ Hi ] ⊆ [g, N ] ∩ [g, Hi ] ⊆ N ∩ Hi+j = Ni+j . Similarly, to show the second assertion, let us take g ∈ Aj (G, H∗ ). We write: [g, Ki ] = [g, v(Hi )] = ϕ([g, Hi ]) ⊆ v(Hi+j ) = Ki+j . The third assertion’s hypothesis comes down to require that H∗ decompose as a semidirect product K∗ o N∗ , the action of G on H∗ being factor-wise. We then get Gequivariant isomorphisms: Hi /Hi+j ∼ = Ki /Ki+j o Ni /Ni+j . An element g of G acts trivially on the left hand side if and only if it does on the right hand side. Whence the result. Remark 1.50. Let 1 N∗ u H∗ v K∗ 1 be a non-split short exact sequence in G − SCF, the first part of Proposition 1.49 gives: A∗ (G, H∗ ) ⊆ A∗ (G, K∗ ) ∩ A∗ (G, N∗ ). Nevertheless, equality is not true in general. Indeed, the sequences: 1 Ni /Ni+j u Hi /Hi+j v Ki /Ki+j 1 are exact, but g ∈ G can act trivially on the kernel and quotient without acting trivially on the middle term. For instance, H 1 (G) = Ext1G (Ztriv , Ztriv ) is non-trivial in general. We can get a little more about semi-direct products: H K be a split exact sequence in G − Grps. SupProposition 1.51. Let N pose that N is filtered by a strongly central series N∗ . Then: A∗ (G, N∗ ) ⊆ A∗ (G, A∗ (K, N∗ )) . Proof. Let us denote by K∗ the filtration A∗ (K, N∗ ) and by G∗ the filtration A∗ (G, N∗ ). A straightforward application of the 3-subgroup lemma (Lemma 1.4) in (N o K) o G provides the inclusion: [[Gα , Kβ ], Nγ ] ⊆ Nα+β+γ . Thus [Gα , Kβ ] ⊆ Aα+β (K, N∗ ) = Kα+β , which means that Gα ⊆ Aα (G, K∗ ). Corollary 1.52. Let G be a group acting on a filtered algebra A∗ by automorphisms of filtered algebras. Then: A∗ (G, A∗ ) ⊆ A∗ (G, A× ∗ ). Proof. Apply Proposition 1.51 to the G-equivariant split exact sequence: A A o A× A× and the given filtration on A. Here is an interesting case when the filtrations of Corollary 1.52 are equal: 18 Proposition 1.53. Let G be a group, and k a commutative ring. Then:  A∗ Aut(G), D∗k G = A∗ (Aut(G), Ik∗ G) . Proof. The algebra Z G is filtered by Ik∗ G, the powers of its augmentation ideal. The group Aut(G) acts on Z G by automorphisms of filtered algebras. As A∗ (G, Ik∗ G) = D∗k G, Proposition 1.51, applied to the action of Aut(G) on kG o G, gives an inclusion: A∗ (Aut(G), Ik∗ G) ⊆ A∗ (Aut(G), D∗k G). To show that it is in fact an equality, take ϕ ∈ A∗ (Aut(G), D∗k G). Then: ∀g ∈ G = D1 G, [ϕ, g] = (ϕ(g)g −1 − 1)g ∈ (Dj+1 − 1)G ⊆ I j+1 . We then show that [ϕ, I i ] ⊆ I i+j by induction on i > 1, using the formula: [ϕ, uv] = [ϕ, u]ϕ(v) + u[ϕ, v] (= (ϕ(u) − u) · ϕ(v) + u · (ϕ(v) − v)) . Let us remark that, in the language of paragraph 2.3, the last formula states that [ϕ, −] is a (1 , ϕ)-derivation, so we have in fact used lemma 2.18. 2 Traces and stable surjectivity 2.1 Free differential calculus We recall some basic concepts of free differential calculus. A detailed account can be found in [Fox53]. Definition 2.1. Let G be a group, and M a kG-module. A derivation from G to M is a map ∂ : G −→ M such that: ∀g, h ∈ G, ∂(gh) = ∂g + g · ∂h. It can be extended to a linear map ∂ : kG −→ M , which verifies: ∀u, v ∈ kG, ∂(uv) = ∂(u)ε(v) + u · ∂(v). We denote by Der(G, M ) or Der(kG, M ) the space of derivations from G to M . We will often write Der(kG) for Der(kG, kG). Remark 2.2. Let G = FS be the free group over a set S. As derivations identify with sections of M o G  G, we get: Der(kFS , M ) ∼ = M S for any kG-module M . Definition 2.3. Let S = (xi )i be a chosen basis of a free group F . The following requirement defines a derivation of kF : ( 1 if t = i, ∂ : xt 7−→ ∂xi 0 else. Let us give a first version of the chainrule: Proposition 2.4. Let λ : FY −→ G a group morphism, where FY is the free group on a set Y = {yj }. Then, for u in kY and ∂ in Der(kG): X  ∂u  ∂(λu) = λ ∂(λyj ). ∂y j j 19 Remark 2.5. The sums involved here are finite, because only a finite number of letters appear in a given element u. Proof of proposition 2.4. One can check that each member of this equality defines a derivation from kFY to kG, where kFY acts on kG by y · g = λ(y)g. As these formulas give the same result when evaluated at elements of the basis, the corresponding derivations are equal. If G = FX = hxi i is free too, we can apply proposition 2.4 with ∂ =   ∂u ∂(λyj ) ∂(λu) X = λ . ∂xi ∂y ∂x j i j ∂ ∂xi to get: For X = Y and λ = 1FX , this gives a change-of-base formula similar to the usual one. The following definition keeps on with our analogy with classical differential calculus: Definition 2.6. Let FY = hyj i and FX = hxi i be free groups as above. Let f be a morphism from FY to FX . We define its Jacobian matrix (with respect to the chosen basis) by:   ∂f (yj ) D(f ) := ∈ MY X (kX). ∂xi ji Remark 2.7. The morphism f is determined by Df . Indeed, proposition 2.4, applied with λ = 1, ∂ : v 7−→ v − ε(v) and u = f (xi ), gives: f (xi ) − 1 = X ∂f (xi ) ∂xj j (xj − 1). g f Let FZ = hzk i, FY = hyj i and FX = hxi i be free groups, and let FZ −→ FY −→ FX be morphisms between them. We can use proposition 2.4 to get a chainrule for Jacobian matrices:   ∂g(zk ) ∂f (yj ) ∂f (g(zk )) X = f . ∂xi ∂yj ∂xi j This can be restated as: g f Corollary 2.8. Let FZ −→ FY −→ FX be morphisms between free groups with fixed basis, as above. Then: D(f g) = f (Dg)D(f ). Remark 2.9. The reader may have noticed that this formula seems to come ”in the wrong way”. This can be explained as follows: a morphism f : FY −→ FX is in fact a r-tuple of monomials f (yj ) = fj (xi ) ∈ kFX , and should as such be considered as a ”polynomial function from FX to FY ”, whose coordinates would be the fj s. From this point of view, f g would be a ”polynomial function from FX to FZ ”, whose coordinates would be given by f g(zk ) = gk (fj (xi )): it looks more like ”g ◦ f ” ! This seems to be completely analogous to the classical setting of algebraic geometry. To get more accurate statements, one would have to interpret kFX as an algebra of functions over a geometric object associated to FX . Which should look like a one-point object with some local structure (as Df determines f ). 20 2.2 Derivations and strongly central filtrations We introduce the notion of a derivation from a group G to a group H on which it acts. Our aim here is to describe a general framework which will be useful to study Jacobian matrices and their interactions with Lie brackets: the chainrule formula 2.8 tells us that D is a derivation. We will also get back to Lazard’s theorem 1.37 in this framework. Definition 2.10. Let H be a group, on which another group G acts. A map ∂ : G −→ H is a derivation if: ∀ x, y ∈ G, ∂(xy) = ∂x · x∂y. Remark 2.11. If H = M is an abelian group, i.e. a representation of G, then we recover the usual definition of a derivation from G to M (see Definition 2.1). To give a derivation ∂ : G −→ H is exactly the same as giving a section σ = (∂, 1G ) of the canonical projection: σ H oG p G. Keeping this in mind, the following lemma follows immediately: Lemma 2.12. Let ∂ be a derivation from G to H. Then ∂ −1 sends G-stable subgroups of H on subgroups of G. Let H∗ be strongly central filtration on a subgroup H1 of H. Let G∗ be a strongly central filtration on a subgroup G1 of G, which acts on H∗ through the given action of G on H (see Proposition 1.20). A derivation ∂ from G to H being given, we can use the morphism σ = (∂, 1G ) to pull back the filtration H∗ o G∗ . We thus get a strongly central filtration on G1 ∩ ∂ −1 (H1 ): σ −1 (Hi o Gi ) = Gi ∩ ∂ −1 (Hi ). Remark 2.13. For instance, if H∗ is given, we can let G∗ be A∗ (G, H∗ ), the maximal filtration acting on H∗ , as described in Remark 1.23. The above construction then gives a strongly central filtration on A1 ∩ ∂ −1 (H1 ). This subgroup is all of G if and only if:   G stabilises H∗ , G acts trivially on L(H∗ ), (2.13.1)  ∂(G) ⊆ H1 . Under these conditions, A∗ ∩ ∂ −1 (H∗ ) is a strongly central series on G. In particular, it then contains Γ∗ (G). Keeping the above notations, the morphism σ = (∂, 1G ) induces a Lie ring morphism (which is injective by definition of the filtration on the domain): σ̄ : L(G∗ ∩ ∂ −1 (H∗ )) ,−→ L(H∗ ) o L(G∗ ). This ensures that ∂ induces a well-defined linear map ∂¯ between the Lie algebras. ¯ 1̄ ) : x 7−→ ∂x ¯ + x preserves Lie brackets, hence: Moreover, the map σ̄ = (∂, ¯ ¯ y] + [x, ∂y] ¯ + [∂x, ¯ ∂y]. ¯ ∂([x, y]) = [∂x, If L(H∗ ) is an abelian Lie algebra, then the last term is zero, and ∂¯ is a Lie derivation. This happens in particular when H is an abelian group. 21 Back to the proof of Lazard’s theorem 1.37. Take the filtered (abelian) group (A, +) as H, and the group A× as G acting by left multiplication ρ. We already know that: × Aj (A× , A∗ ) = A× ∗ = A ∩ (1 + Aj ). Let ∂ be the derivation from A× to A defined by g 7−→ g −1. Obviously, ∂ −1 (Aj ) = A× j , × × −1 which is exactly Aj (A , A∗ ). It is then equal to Aj (A , A∗ ) ∩ ∂ (Aj ). The Lie ring L(A∗ ) is abelian (because A is an abelian group). Hence, the induced map ∂¯ is a derivation (with respect to the canonical action of L(A× ∗ ) on L(A∗ )): ∂¯ : L(A× ∗ ) −→ L(A∗ ). Let us remark that the Lie algebra L(A∗ ) is quite different from gr(A∗ ): the associative structure of A has been completely forgotten. Nevertheless, some part of this structures is encoded by the action of L(A× ∗ ), which is inherited from left multiplication. The ¯ map ∂ is a derivation with respect to this action, that is: ¯ ¯ y] + [x, ∂y]. ¯ ∂([x, y]) = [∂x, These brackets are described through the action of L(A× ∗ ) on L(A∗ ), as induced by commutators in A o A× : ∀g ∈ A× 1 , ∀x ∈ A, [g, x] = gx − x. As a consequence: ¯ ∂([x, y]) = −(y(x − 1) − (x − 1)) + (x(y − 1) − (y − 1)) = xy − yx, so ∂¯ is in fact a Lie morphism to gr(A∗ ). 2.3 Algebras, actions and derivations We now turn to studying derivations of algebras. In particular, we get a precise link between free differential calculus and differential calculus in the tensor algebra (see Proposition 2.25). We will use this in Paragraph 2.4.2 to get an explicit description of the trace map. Let Alg− be the category of associative non-unitary algebras over a fixed commutative ring k. This category is pointed (by 0) and protomodular. We can define actions there, as in paragraph 1.3. Actions in Alg− turn out to be representable. Precisely, for any algebra I, let Endr (I) (resp. Endl (I)) be the algebra of right (resp. left) I-linear endomorphisms of I, i.e. k-linear maps u from I to I satisfying: ∀x, y ∈ I, u(xy) = u(x)y (resp. u(xy) = xu(y)). Define Endr,l (I) as the kernel of :  Endr (I) × Endl (I) −→ Endk (I) α: (u, v) 7−→ u ◦ v − v ◦ u. Proposition 2.14. An action A  I in Alg− can be represented by a (unique) morphism: (λ,ρ) A −→ Endr,l (I). 22 Proof. If an action I B A is given, λ(a) and ρ(a) are obtained from left and right multiplications by a in B. Conversely, a morphism (λ, ρ) as above can be used to define an (associative) algebra structure on I × A defining an action of A on I. Let us remark that if I 2 = 0 (that is, I is endowed with a trivial algebra structure), then an action of A on I is just a A-bimodule structure. Remark 2.15. The same construction works in the category of (non-unitary) filtered algebras f Alg− , where we also get a representation of actions. The algebras Endr (I) and Endl (I) are then filtered by the usual requirement: a morphism u is of degree at least j if u(Ii ) ⊆ Ii+j for all i. The same requirement will be used to define a filtration on any module of morphisms between filtered modules or algebras. Definition 2.16. Let A act on I as above. A derivation from A to I is a k-linear map ∂ : A −→ I satisfying: ∂(ab) = ∂a · b + a · ∂b. The k-module of derivations from A to I is denoted by Der(A, I). Remark 2.17. The relation defining derivations depends only on the A-bimodule structure on I. We are thus led to consider I o , the algebra obtained by taking the same underlying k-module as I, endowed with the trivial product. The action of A on I induces an action of A on I o in the obvious manner, and a derivation from A to I is then the same as a section of the projection: Io o A  A in the category of algebras. When we work in the category of filtered algebras, Der(A, I) is a filtered module, a derivation ∂ being of degree at least j if ∂(Ai ) ⊆ Ii+j for all i. If A is filtered by its powers Ai , we just have to check this in degree one: Lemma 2.18. Let A be an algebra, filtered by its powers Ai := Ai , acting on a filtered algebra I∗ . Let ∂ ∈ Der(A, I). Then ∂ is of degree at least j if and only if: ∂(A) ⊆ Ij+1 . Proof. An action of A∗ on I∗ is given by a left and a right multiplication which are filtered, meaning that Ai Ij ⊆ Ii+j and Ij Ai ⊆ Ii+j . Use the formula: X ∂(a1 · · · ai ) = a1 · · · ak−1 ∂(ak )ak+1 · · · ai k to get the desired result. We can get examples of actions from algebras acting on themselves. Precisely, the adjoint action of A on itself is just the obvious A-bimodule structure on A. Derivations are then the usual ones. Given an action of A on I represented by (ρ, λ), we can twist it by choosing endomorphisms ϕ and ψ of A and letting A act on I through (ρ ◦ ϕ, λ ◦ ψ). This means that we let a ∈ A act on I by ϕ(a) · − on the left, and by − · ψ(a) on the right. We give a name to derivations from A to the the twisted A-bimodule I. 23 Definition 2.19. Let ϕ and ψ be endomorphisms of A. A (ϕ, ψ)-derivation is a linear map ∂ : A −→ I satisfying: ∂(ab) = ∂a · ψb + ϕa · ∂b. We denote by Der(ϕ,ψ) (A, I) the k-module of such derivations. Example 2.20. Let A be a group algebra kG and M a kG-module. We can make M into a bimodule by making kG act trivially on the right (that is, through ε). Then, Der(kG, M ) is exactly the usual module of derivations (see Definition 2.1). If M = kG, it is already a bimodule, but the above structure can be obtained through twisting the right action by ηε : g 7→ ε(g) · 1. Then Der(kG) (defined in Definition 2.1) is exactly Der(id,ηε) (kG, kG). We can apply Lemma 2.18 to A = I = IG, to get: Corollary 2.21. Let ∂ be a derivation of Z G such that ∂(Z G) ⊆ (IG)l+1 (which is always true for l = −1). For all integer k, we have: ∂((IG)k ) ⊂ (IG)k+l . Remark 2.22. Let us stress that the proof given here is fairly direct. In fact, it gets even shorter in this case, the result following from: ∀v ∈ I, ∂(uv) = u · ∂v. Remark 2.23. The classical inclusion of Γk − 1 into IGk can be shown by a direct induction, or follows from Lazard’s theorem (as D∗ (G) is a strongly central series, it contains Γ∗ G). Under the hypothesis of Proposition 2.21, it implies ∂(Γk ) ⊆ (IG)k+l , using that ∂(1) = 0. Remark 2.24. Some sets of derivations obtained from actions of A on itself can have more structure than just a module structure. Precisely, if we twist the adjoint action of A by some (ϕ, ψ) as above, and if we add the requirement that ϕ and ψ are idempotents, then the set of (ϕ, ψ)-derivations from A to A commuting to ϕ and ψ is a sub-Lie algebra of Endk (A): [∂, ∂ 0 ](ab) = ∂∂ 0 a · ψ 2 b + ϕ∂ 0 a · ∂ψb + ∂ϕa · ψ∂ 0 b + ϕ2 a · ∂∂ 0 b − ∂ 0 ∂a · ψ 2 b − ϕ∂a · ∂ 0 ψb − ∂ 0 ϕa · ψ∂b − ϕ2 a · ∂ 0 ∂b = [∂, ∂ 0 ](a) · ψ(b) + ϕ(a) · [∂, ∂ 0 ](b). In particular, if (ϕ, ψ) = (1 , 1 ), we get that Der(A) is a sub-Lie algebra of Endk (A). Another example is given by A = kG and (ϕ, ψ) = (1 , ηε). But more is true is this last case. Let kG be filtered by the powers of the augmentation ideal. If ∂, ∂ 0 ∈ Der(kG) are such that ∂ 0 has degree at least 0, then ∂ ◦ ∂ 0 ∈ Der(kG), because ε(∂ 0 v) = 0 for any v. Let A∗  I∗ be an action of filtered algebras. Since the functor gr : f Alg −→ grAlg from filtered algebras to graded ones is exact (the same proof as that of Proposition 1.24 works), this action is sent to an action gr(A∗ )  gr(I∗ ) of graded algebras. Moreover, gr also commutes with (−)o (the definition of (−)o being extended to graded algebras in the obvious way), so we get a morphism: gr(Der(A∗ , I∗ )) ,→ Der∗ (gr(A∗ ), gr(I∗ )), 24 where the target is the graded module of graded derivations. This morphism is obviously injective. It is in fact a restriction of the natural injection: gr(Homk (M∗ , N∗ )) ,→ Hom∗ (gr(M∗ ), gr(N∗ )) between bifunctors on graded modules. As such, it preserves all algebraic structure inherited from the additive bifunctor structure (see Remark 2.24). When A∗ is kG, filtered by the powers of IG, acting on itself, we thus get a morphism preserving the structure induced by composition: gr(Der(kG)) ,→ Der∗ (gr(kG)). Proposition 2.25. If G is a free group, and M∗ is a filtered kG-module (considered as a bimodule with trivial right action), the canonical map: gr(Der(kG, M∗ )) ,→ Der∗ (gr(kG), gr(M∗ )) is an isomorphism. Here, by derivations, we mean (id, ε)-ones. Proof. Let S be a free set of generators for G. Then V = Gab is free abelian on S, and gr(kG) ∼ = T V is the tensor algebra. Identifying derivations with sections as above (see Remark 2.17), we see that a derivation is completely determined by the choice of its values on S: Der∗ (T V, N∗ ) = F∗ (S, N∗ ), for any graded T V -bimodule N∗ , where F∗ (S, N∗ ) is the set of graded maps from S (concentrated in degree 0) to N∗ . The same is true for the other side. Indeed, a derivation from kG to M is a section of the projection M o G  G, so is determined by a map S → M : Der(kG, M∗ ) = Der(G, M∗ ) ∼ = M∗S . The second member is the set of maps from S to M , with the filtration inherited from the one on M . The desired isomorphism is then exactly: gr(M∗S ) ∼ = F∗ (S, gr(M∗ )). Remark 2.26. If M is a G-module, we can endow it with the universal kG-filtration (IG)∗ · M . Remark 2.27. The isomorphism gr(Der(kG)) ∼ = Der∗ (T V ) thus obtained preserves the algebraic structure obtained from the composition of derivations. 2.4 Traces In [Bar13], Bartholdi defines the trace of an automorphism ϕ of Fn by: Tr(ϕ) := Tr(Dϕ − 1 ) ∈ Z Fn , where Dϕ denotes ϕ’s Jacobian matrix. We will show that Tr induces a well-defined map between the graded Lie algebras, which we still call Tr: Tr : L(A∗ (Fn )) −→ gr(Z Fn ) ∼ = T V. The aim of this paragraph is to show that this map is indeed well-defined, to investigate its behaviour with respect to Lie structures, and to get Morita’s algebraic description [Mor93], used by Satoh in [Sat12]. 25 2.4.1 The induced map between Lie algebras Let ϕ ∈ Ak (Fn ). By definition, ϕi := x−1 i ϕ(xi ) ∈ Γk+1 . The Jacobian matrix of ϕ can be described explicitly: ∂(xi ϕi ) ∂xi ∂(ϕi ) = . +xi ∂xj ∂xj ∂xj |{z} (Dϕ)ij = δij Hence: Dϕ − 1 =  ∂ϕi xi ∂xj  . ij Using Remark 2.23, we see that this matrix is in fact in Mn (I k ) (to shorten notations, we write I for IFn in the sequel). Moreover, xi acts trivially on I k /I k+1 . We thus get an explicit formula for the trace map: Tr(Dϕ − 1 ) = X i xi ∂ϕi X ∂ϕi ≡ ∂xi ∂xi i (mod I k+1 ). Let G be any group. We can apply the construction of Paragraph 1.7 to A = kG, filtered by the powers of the augmentation ideal. This gives a strongly central filtration GLn (I ∗ G) on GLn (IG), which comes with an embedding of Lie algebras: L(GLn (I ∗ G)) ,→ gr(Mn (kG)) ∼ = Mn (gr(kG)). The next proposition replaces a formula from [Bar13, section 6]: Proposition 2.28. The Jacobian matrix D induces a morphism between graded modules: D : L(A∗ (Fn )) −→ L(GLn (I ∗ Fn )), satisfying: D([f, g]) = [g, Df ] + [Dg, f ] + [Dg, Df ] . In order to address the issue raised in Remark 2.9, let us introduce some notations before proving the proposition. If G is any group, we denote by Gop the opposite group, where multiplication is defined by: g ·op h = hg. Let G∗ be a strongly central filtration op on G. Then Gop and one easily checks that: ∗ is such a filtration on G op L(Gop ∗ ) = L(G∗ ) , where the bracket in L(G∗ )op is L(G∗ )’s additive inverse: [x, y]op = [y, x]. Proof of Proposition 2.28. Corollary 2.8 states exactly that D is a derivation from Aut(Fn ) to GLn (I)op ⊂ Mn (Z Fn )op , where Mn (Z Fn ) is endowed with the obvious Aut(Fn )-action. We thus can apply the results from 2.2 with ∂ = D, G = Aut(Fn ), H = GLn (I)op , and H∗ = GLn (I ∗ )op . The strongly central filtration A∗ (G, H∗ ) is in fact the Andreadakis filtration A∗ = A∗ (Fn ) on A1 = IAn ⊂ Aut(Fn ). Indeed, there is a series of inclusions: A∗ (G, D∗ Fn ) ⊇ A∗ (G, GLn (I ∗ )) ⊇ A∗ (G, Mn (Z Fn )) = A∗ (G, Z Fn ) . 26 The first one comes from 1.49 applied to the injection of D∗ Fn into GLn (I ∗ ) defined by w 7−→ w · 1 . The second one is a particular case of 1.52. The last equality comes from the fact that G acts component-wise on matrices: [g, (mij )] = g · (mij ) − (mij ) = ([g, mij ]). According to proposition 1.53, these inclusions are in fact equalities. Moreover, we have seen at the beginning of the present paragraph that D sends A∗ to GLn (I ∗ )op . The filtration A∗ ∩ ∂ −1 (H∗ ) is thus only A∗ . The work already done in 2.2 allows us to get the desired result. The map given by Proposition 2.28 can be composed with the morphism: (−)−1 L(GLn (I ∗ )) −→ gr(Mn (Z Fn )) ∼ = Mn (gr(Z Fn )) = Mn (T V ). Thus, for ϕ an element of Ak /Ak+1 , Dϕ − 1 is well-defined modulo Mn (I k+1 ). Composing with the usual trace, we get the announced well-defined linear map induced by ϕ 7−→ Tr(Dϕ − 1 ): Tr : L(A) −→ T V. Remark 2.29. That the map D− 1 (hence Tr) induces a well-defined map between the Lie algebras can be seen through explicit calculation, but the behaviour with respect to the Lie bracket is much less obvious from this point of view. Indeed, let ϕ ∈ Ak . If ϕ = ψχ, with χ ∈ Ak+1 , then: ψ(xi ) = ϕ(xi χi ) = xi ϕi ϕ(χi ). As χi stands inside Γk+2 , its image by ϕ does too. Thus: ∂ϕi ∂ϕ(χi ) ∂ϕi ∂ψi = + ϕi ≡ ∂xj ∂xj ∂x ∂xj | {zj } (mod I k+1 ). ∈I k+1 2.4.2 Introducing the contraction map Consider the evaluation map: ev : Der(1 ,ε) (T V ) ⊗ T V −→ T V. Using the universal property of T V , as in the proof of 2.25, we get a linear isomorphism: Der(1 ,ε) (T V ) ∼ = Hom(V, T V ) ∼ = V ∗ ⊗ T V. The evaluation map then is:  ∗ V ⊗ TV ⊗ TV ω⊗u⊗v −→ T V 7−→ Φ(ω ⊗ v)u, where Φ is the contraction map:  ∗ V ⊗ V ⊗k+1 −→ V ⊗k Φ: α ⊗ Xi1 · · · Xik+1 7−→ Xi1 · · · Xik α(Xik+1 ), extended by zero on k·1. This follows from the fact that any (1 , ε)-derivation ∂ verifies: ∂(uv) = u · ∂v, when the degree of v is at least 1 (that is, when ε(v) = 0), and ∂(1) = 0. We sum this up in the following: 27 Proposition 2.30. Let ∂ ∈ Der(1 ,ε) (T V ). Then: ∂ = Φ(∂|V ⊗ −). Let us consider the derivation ∂x∂ i of Z Fn . It induces a (1 , ε)-derivation of degree −1 of T V , denoted by ∂i (any derivation of kG is of degree at least −1, by Corollary 2.21). As ∂i |V = Xi∗ , we get the following: Corollary 2.31. The (1 , ε)-derivation of T V induced by ∂x∂ i ∈ Der(Z Fn ) is represented as: ∂ = ∂i = Φ(Xi∗ ⊗ −) : T V −→ T V. ∂xi We can use these results to interpret the trace map in a way more suited to explicit calculations: Proposition 2.32. The trace map can be described as: Tr = Φ ◦ ι ◦ τ, where τ is the Johnson morphism (see Definition 1.26), ι denotes the inclusion of Derk (LV ) ∼ = V ∗ ⊗ Lk+1 V into Derk (T V ) ∼ = V ∗ ⊗ V ⊗k+1 , and Φ is the contraction map. Proof. Let ϕ ∈ Ak . Then τ (ϕ) is defined by: ∼ τ (ϕ)(Xi ) = x−1 i ϕ(xi ) = ϕi ∈ Γk+1 /Γk+2 = Lk+1 V. We have seen at the beginning of Paragraph 2.4.1 that the trace map is given by: Tr(Dϕ − 1 ) = X ∂ϕi i ∂xi . The formula of the proposition is then equivalent to: ! X X ∂ϕi ∗ Φ . Xi ⊗ ϕi = ∂xi i i To get this formula, we evaluate the equality given by Corollary 2.31 to the elements ϕi − 1 (keeping in mind that the inclusion of Lk+1 V into Tk+1 V is given by w 7→ w − 1). 2.5 2.5.1 Stable surjectivity Vanishing of the trace map Here, we show that the trace map takes values in brackets inside T V . This result can also be found in [MS17, Prop. 5.3], where rational methods are used to get it. Proposition 2.33 ([BLGM90, Th. 2.1], quoted in [Bar13, Th. 6.2]). Let k > 2, and let J ∈ GLm (IZk Fn ). Denote by V the abelianization V = Fnab ∼ = Zn . Then: Tr (J − 1 ) ∈ [T V, T V ]k ⊂ V ⊗k ∼ = I k /I k+1 . This result relies on the following criterion: 28 Proposition 2.34 ([BLGM90, prop. 2.2]). Let f (X1 , ..., Xn ) ∈ V ⊗k . Let C ⊂ Mk (Z) be the sub-Z-module generated by the ei,i+1 . Suppose: ∀Ci ∈ C, Tr(f (C1 , ..., Cn )) = 0. Then f ∈ [T V, T V ]k . The proof can be found in [BLGM90]. The reader is also referred to the proof of Proposition 3.16, which is the same proof, adapted to the case of positive carateristic. Proof of Proposition 2.33. The main idea is to use evaluations into commutative algebras to be able to use Proposition 1.41, and to then get back to the non-commutative setting by using the above criterion. Let 1 + tAi ∈ GLk (tk[t]). There is an evaluation morphism xi 7→ 1 + tAi from Fn to GLk (t Z[t]), extending to a morphism from kFn to Mk (tk[t]) sending I ∗ to t∗ Mk (k[t]). Taking congruence groups, we get an evaluation morphism: ev1 +tAi : GLm (I ∗ Fn ) −→ GLm (t∗ Mk (k[t])) = GLmk (t∗ k[t]). There is a commutative diagram: L(GLm (I ∗ Fn )) (−)−1 Mm (T V ) ev1 +tAi L(GLmk (t∗ k[t])) (−)−1 Mmk (k[t]) TV evtAi evtAi det L(k[t]× ∗) = 0 Tr T rm Mm (k[t]) Tr Tr (−)−1 k[t] Here, we identify gr(I ∗ Fn ) with T V by xi 7→ 1 + Xi . We also identify gr(t∗ k[t]) with k[t]. The evaluation xi 7→ 1 + tAi thus induces Xi 7→ tAi between the associated graded. The bottom-left square is just the one in Proposition 1.41. The map T rm is the usual trace when the base algebra is Mm (k[t]). Let k = Z and f = Tr(J − 1 ) ∈ V ⊗k . The commutativity of the above diagram gives: 0 = Tr(f (tAi )) = tk Tr(f (Ai )). As a consequence, Tr(f (Ai )) = 0, for any 1 + tAi ∈ GLk (t Z[t]). We can then evaluate this at t = 0 to get: Tr(f (πAi )) = 0. This evaluation π is the map:  π : L1 (GLk (t∗ Z[t]) ,→ Mk t Z[t]/t2 Z[t] ∼ = Mk (Z). Using Proposition 1.42 and Remark 1.43, we see that its image is exactly sln (Z), so the conclusion follows from the above criterion (2.34). Because of Proposition 2.33, we will consider the trace map as taking values in the abelianization T V ab = T V /[T V, T V ]. As [T V, T V ]k is generated by the elements: [Xi1 ⊗ · · · ⊗ Xip , Xip+1 ⊗ · · · ⊗ Xik ] = Xi1 ⊗ · ⊗ Xik − tp · Xi1 ⊗ · ⊗ Xik , where t = 1̄ ∈ Z /k, the module T V ab is the module of cyclic powers C∗ V : (T V ab )k = Ck V := V ⊗k /(Z /k). The conclusion of Proposition 2.33 becomes, in this context: Tr (J − 1 ) = 0 ∈ C∗ V. 29 2.5.2 Linear algebra Consider the Johnson morphism τ 0 : L (ΓIAn ) −→ Der∗ (L(Fn )) (cf. 1.5). The morphism τ10 is an isomorphism (see Proposition 1.34). Moreover, L (ΓIAn ) is generated in degree 1 (cf. 1.9). As a consequence, the image of τ 0 is exactly the sub-Lie ring generated in degree 1 inside Der (L(Fn )). As L(Fn ) is the free Lie ring LV , the study of coker(τ 0 ) is solely a problem of linear algebra. Recall from Proposition 2.32 that the trace map can be seen as the composite of the Johnson morphism τ : Lk (A∗ (Fn )) → Derk (LV ) ∼ = V ∗ ⊗ Lk+1 V with: ι Φ π TrM : V ∗ ⊗ Lk+1 V −→ V ∗ ⊗ V ⊗k+1 −→ V ⊗k −→ Ck V := V ⊗k /(Z /(k)), where ι and π denote the canonical maps. All these morphisms are obviously GLn (Z)equivariant (with respect to the canonical actions). Notation 2.35. Let I denote the image of τ 0 , which is the sub-Lie ring generated in degree 1 inside Der(LV ). The following proposition can be seen as a consequence of Proposition 2.33. Precisely, I = Im(τ 0 ) ⊆ Im(τ ), and Proposition 2.33 implies that TrM ◦τ = Tr vanishes. Proposition 2.36. For every k > 2, TrM (Ik ) = {0}. 2.5.3 Stable cokernel of τ 0 and stable surjectivity Let k > 2. Using Proposition 2.36, we get a commutative diagram with exact rows: Ik V ∗ ⊗ Lk+1 V φ coker(τk0 ) Φ V ⊗k [T V, T V ]k Φ π Ck V. In [Sat12], Satoh shows:   For n > k + 1, Φ is surjective, (lemma 3.2) For n > k + 2, φ is surjective, (prop. 3.2)  For n > k + 2, ker Φ ⊆ I. (Prop. 3.3) His Theorem 3.1 is still true over Z: Proposition 2.37. Let k > 2 and n > k + 2 be integers. Then Φ is a GLn (Z)equivariant isomorphism: coker(τk0 ) ∼ = Ck V. Proof. Let us denote by K (resp. L) the kernel of Φ (resp. its cokernel). There is a commutative diagram in GLn (Z) − ModZ : ker Φ Ik φ 0 V ∗ ⊗ Lk+1 V coker(τ 0 ) Φ [T V, T V ]k V ⊗k 0 0 30 K Φ π Ck V L. The snake lemma ensures that K and L are zero: Φ is an isomorphism. We can now state our main result: Theorem 2.38. Let k + 2 6 n. Then the canonical morphism Lk (IAn ) −→ Lk (A∗ (Fn )) is surjective, and τ induces an isomorphism: Lk (A∗ (Fn )) ∼ = Ik . Remark 2.39. Basis being chosen, there is an injection of Fn in Fn+1 ∼ = Fn ∗ Z. An automorphism ϕ of Fn can be extended to an automorphism ϕ∗ 1 of Fn+1 . This induces injections IAn ,→ IAn+1 which in turn induce morphisms L(A∗ (Fn )) → L(A∗ (Fn+1 )). Taking the colimit over n, we can define a Lie ring Lst (A∗ ). In the same way, we can ab define injections from Der(L(Fnab )) into Der(L(Fn+1 )) and take the colimit Ist of the sub-algebras generated in degree one. With this point of view, the isomorphisms of Theorem 2.38 give an isomorphism between graded Lie algebras: τ st : Lst (A∗ ) ∼ = Ist , meaning exactly that Lst (A) is generated in degree one. In fact, all the constructions appearing here are functors on the category denoted by S(Z) in [Dja16b, section 7], where it is shown (using methods similar to the ones of [CEFN14]) that these functors are finitely supported. This implies the equivalence between τkst being an isomorphism and τk being one for n big enough. Proof of theorem 2.38. Consider the commutative diagram: i∗ L(IAn ) L(A∗ ) τ τ0 Der(LV ). The image I of τ 0 is the sub-Lie ring generated in degree one inside Der(LV ). Using the results quoted in Paragraph 2.5.3, we see that in degrees k 6 n − 2, it also is the kernel of the trace map. Proposition (2.33) tells us exactly that Tr ◦τ = 0, so that Im τk ⊆ ker Trk = Im τk0 when k > n − 2. As a consequence, Im τ = Im τ 0 . As τ is injective (1.32), it is an isomorphism onto its image, hence the result. 2.6 Automorphisms of free nilpotent groups Automorphisms of nilpotent groups are easy to deal with, due to the following classical fact: Lemma 2.40. Let G be a finite-type nilpotent group. An endomorphism ϕ ∈ End(G) is an automorphism if and only if the induced morphism ϕab ∈ End(Gab ) is. Proof. If ϕ is an automorphism then ϕab has to be, with (ϕab )−1 = (ϕ−1 )ab . Conversely, suppose that ϕab is an automorphism. This means that L1 (ϕ) is. Since L(G) is generated in degree one, L(ϕ) is surjective. But each Lk (G) is abelian of finite type, so each Lk (ϕ), being surjective, has to be bijective (it is obviously the case on the torsion 31 part, which is finite, and it also is on the free abelian part, for reasons of rank). The lemma then follows by induction from the five-lemma applied to: Lk (G) Lk (ϕ) Lk (G) G/Γk+1 G G/Γk G ϕ̄ G/Γk+1 G ϕ̄ G/Γk G. This induction process stops since there is a c such that G = G/Γc+1 G. b := lim (G/Γk G) . Definition 2.41. The pro-nilpotent completion of a group G is: G ←− b is canonically filtered by the Γ̄j G := lim (Γj G/Γk G). This filtraThe completion G ←− tion is its closed lower central series, defined as the closure of the lower central series. b An endomorphism of G b It is minimal amongst closed strongly central filtrations on G. is continuous if and only if it preserve this filtration. b is an automorLemma 2.42. Let G be a group. A continuous endomorphism ϕ of G ab ab phism if and only if the induced morphism ϕ ∈ End(G ) is. Proof. Such an endomorphism is an automorphism if and only if the associated morphism between projective system is. These are the induced endomorphisms of the G/Γk G, which are nilpotent groups. This condition amounts to ϕ inducing an isomorphism on Ĝ/Γ̄2 = Gab , by Lemma 2.40. b In fact, we can readily deduce the following explicit description of the group AutC 0 (G) b of continuous automorphisms of G: Proposition 2.43. The canonical map is an isomorphism: b ∼ AutC 0 (G) (Aut(G/Γk G)) . = lim ←− Let G = Fn be a free group of finite type. It is residually nilpotent, so it embeds into its completion Fbn . A continuous endomorphism of Fbn is uniquely determined by its (arbitrary) values on the topological generators xi . Let us denote by Fn,c the free c-nilpotent group Fn /Γc+1 Fn . Using Lemmas 2.40 and 2.42, we can show two surjectivity results for automorphisms of free nilpotent groups: Proposition 2.44. The canonical morphisms Aut(Fn,c ) → Aut(Fn,c−1 ) are surjective. Proof. Let (xi ) be a free basis of Fn . Let ϕ ∈ Aut(Fn /Γc (Fn )). Lift the elements ϕ(x̄i ) to elements ti of Fn /Γc+1 (Fn ). Then define the endomorphism ϕ̃ of Fn /Γc+1 (Fn ) by x̄i 7→ ti . Since ϕ and ϕ̃ induce the same endomorphism of Fnab , Lemma 2.40 implies that ϕ̃ is an isomorphism. Proposition 2.45 ([Bar13, th. 5.1]). The Johnson morphism associated to the universal action on Γ̄∗ (Fn ) is an isomorphism: τ : L(A∗ (Γ̄∗ Fn )) ∼ = Der(LV ). Proof. Because of Lemma 1.28, we know that τ is injective. We need to show that it is surjective. Let us first remark that L(Γ̄∗ (Fn )) = L(Γ∗ (Fn )) ∼ = LV . Let ∂ ∈ Derk (LV ). ∼ Lift each ∂(Xi ) ∈ Γk /Γk+1 = Γ̄k /Γ̄k+1 to an element ti ∈ Γ̄k . We can define a continuous endomorphism of Fbn by ϕ : xi 7→ ti xi . Then ϕ acts trivially on Fnab , so it is an isomorphism by Lemma 2.42. As a consequence, ϕ ∈ Ak (Γ̄∗ (Fn )) satisfies τ (ϕ̄) = ∂. This concludes the proof. 32 We can translate this last result into a statement about automorphisms of free nilpotent groups : because of Propositions 2.43 and 2.44, Aut(Fn,c ) is a quotient of AutC 0 (Fbn ). Moreover, the kernel of the canonical surjection is Ac (Γ̄∗ Fn ), by definition. Thus, this projection induces the c-truncations at the level of the associated graded objects : Corollary 2.46. The Johnson morphism associated to the universal action on Γ∗ (Fn,c ) is an isomorphism: τ : L(A∗ (Fn,c )) ∼ = Der(L6c V ). Consider the Johnson morphism τ 0 : L(Γ∗ (IAFn,c )) → Der(L6c V ). Using the identification of corollary 2.46, we see that τ 0 identifies with the Andreadakis morphism i∗ : L(Γ∗ (IAFn,c )) → L(A∗ (Fn,c )). Its image is the subalgebra generated in degree one inside Der(L6c V ), as was the case in paragraph 2.5.2. This subalgebra is exactly the truncation I<c , so is inside (and stably equal to) the kernel of the trace map. As a consequence, the Andreadakis equality never holds for free nilpotent groups. Moreover, in this context, our stable surjectivity result translates as : Corollary 2.47. The following sequence always is a complex, and is exact for n > c+1: i∗ Tr L(Γ∗ (IAFn,c )) −→ L(A∗ (Fn,c )) ∼ = Der(L6c V ) −→ C<c V −→ 0. Remark 2.48 (Non-tame automorphisms). The canonical morphism p : Aut(Fn ) → Aut(Fn,c ) is in general not surjective: some basis of the free nilpotent group do not lift to basis of the free group via Fn  Fn,c . Automorphisms of Fn,c induced by automorphisms of Fn are called tame. This was the original motivation of [BLGM90] for considering the trace map. In this regard, our stable surjectivity result could be re-stated as follows : in the stable range, the trace is the only obstruction for an automorphism to be tame. 3 The case of positive caracteristic 3.1 Dark’s theorem Let w be a word in a free group FS . Let w(r) be the word obtained from w by replacing each generator s ∈ S by some power srs . Dark’s theorem [Dar68] describes how to decompose w(r) as a product of commutators. This gives very useful universal formulas, that can then be evaluated in any group. The reader is referred to [Pas79, chap. IV, Th. 1.11] for a precise statement and a proof of the theorem. Here we recall two corollaries, obtained by taking w = [x, y] and w = xy in F{x,y} . The case w = [x, y] is [Pas79, IV, cor. 1.16]: Corollary 3.1. There exists a unique map θ : (N∗ )2 −→ F2 = hx, yi verifying: Y α β ∀α, β ∈ N, [xα , y β ] = θ(r, s)( r )( s ) . r,s>1 Each θ(r, s) is a product of {x±1 , y ±1 }-commutators such that x±1 appears at least r times and y ±1 at least s times in each factor. The case w = xy has been known for a long time (quoted in [Pas85, chap. 11, Th. 1.14], it already appears for instance in [Hal34]): 33 Corollary 3.2. There exists a unique map θ : N −→ F2 = hx, yi such that: Y α ∀α ∈ N, xα y α = θ(r)( r ) , r>0 Each θ(r) is a product of {x±1 , y ±1 }-commutators of length at least r. Remark 3.3. In both cases, uniqueness of the map θ is obvious: it can be defined by induction. 3.2 p-Restricted strongly central series Definition 3.4. Let p be a prime number. A strongly central series G∗ is said to be p-restricted if: ∀i, Gpi ⊆ Gip . Let G∗ be a p-restricted strongly central series. Using [Pas79, Th. III.1.7], we see that the morphism: L(G∗ ) −→ gr(aF∗ p (G∗ )) induced by g 7−→ g − 1 (see Theorem 1.37 and Proposition 1.40) is injective. We can identify L(G∗ ) with its image, which is stable by the p-th power operation in the F associative Fp -algebra gr(a∗ p (G∗ )), since (g − 1)p = g p − 1. From this we deduce that L(G∗ ) is a p-restricted Lie algebra with p-th power operation induced by g 7−→ g p in G1 . The reader is referred to the classical [Jac41] for a discussion of p-restricted Lie algebras. We also can deduce from [Pas79, Th. III.1.7] that any p-restricted strongly central series F F has to contain the dimension series D∗ p G defined in Example 1.39 (because a∗ p (G∗ ) contains IF∗p G): F Proposition 3.5. The filtration D∗ p G is the minimal p-restricted strongly central series, on any group G. [p] The filtration DFp , also denoted by Γ∗ also admits a description by induction, or the more explicit description: Y j [p] Γk G = (Γi G)p . ipj >n These can be found in [Laz54, Th. 5.6] or [Pas79, Th. IV.1.9]. We also refer to [CE16] for a nice discussion of filtrations defined by induction. This description has a nice [p] consequence, similar to Proposition 1.9 (we abbreviate L(Γ∗ G) to L[p] (G)): Proposition 3.6. The p-restricted Lie ring L[p] (G) is generated in degree 1. Precisely, [p] it is generated (as a p-restricted Lie ring) by L1 (G) = Gab ⊗ Fp . Example 3.7. If G is a free group, then L[p] (G) = L(D∗ p G) is the p-restricted Lie algebra generated by the degree-one part inside gr(Fp G) ∼ = TFp (Gab ) so, using PBW over Fp [Jac41, Th. 1] it is the free p-restricted Lie algebra over the Fp -module Gab ⊗ Fp [Laz54, Th. 6.5]. F [p] Remark 3.8. The filtration Γ∗ G (already defined in [Zas39]) is to be distinguished (p) from Stallings’ filtration Γ∗ G, defined in [Sta65]. The latter is the minimal p-torsion strongly central filtration on a group G, where a strongly central filtration is p-torsion when Gpi ⊆ Gi+1 (for all i). See remark 3.14 for more on q-torsion strongly central series. 34 3.3 The p-restricted Andreadakis problem [p] [p] [p] [p] Let us denote A∗ (Γ∗ G) by A∗ (G). Remark that A1 (G) is the group IAG of auto[p] [p] morphisms acting trivially on L1 (Γ∗ G) = Gab ⊗Fp , hence on all of L(Γ∗ G) (because of [p] Proposition 3.6). If we show that A∗ (G) is p-restricted (and we will – see Proposition 3.10) then we get an inclusion:   [p] [p] Γ∗ IAG ⊆ A∗[p] (G). We are thus led to consider a p-restricted version of the Andreadakis problem: Problem 3 (Andreadakis – p-restricted version). What is the difference between the [p] [p] [p] p-restricted strongly central series A∗ (G) and Γ∗ (IAG ) ? [p] Remark 3.9. The group IAG contains IAG as a normal subgroup. Moreover, the [p] quotient IAG /IAG is a subgroup of Aut(G)/IAG , hence of GL(Gab ). In fact, by [p] definition of IAG , it is contained in the congruence group: GL(pGab ) = ker(GL(Gab ) → GL(Gab ⊗ Fp )). When G = Fn is a free group of finite type, then Aut(G)/IAG ∼ = GLn (Z), and [p] IAG /IAG is exactly GLn (p Z). Proposition 3.10 ([HM17], Prop. 8.5). Let G∗ be a p-restricted strongly central filtration, and K be a group acting on G∗ . Then A∗ (K, G∗ ) is a p-restricted strongly central filtration. Proof. Let κ ∈ Aj (K, G∗ ) and g ∈ Gi . Using Corollary 3.1, we get: p [κ , g] = p Y p θ(k, 1)(k) , k=1 p with θ(k, 1) ∈ Gi+kj , for all k. If k < p, then θ(k, 1)(k) ∈ Gp(i+kj) ⊆ Gi+pj+1 . As θ(p, 1) also is in Gi+pj , we have: [κp , g] ∈ Gi+pj . This is true for every g ∈ Gi , for all i. Hence κp ∈ Apj (K, G∗ ), which completes the proof. Proposition 3.10 can be refined: Proposition 3.11. Under the same hypothesis as Proposition 3.10, A∗ (K, G∗ ) n G∗ is a p-restricted strongly central series. Proof. Denote A∗ (K, G∗ ) n G∗ by K∗ . An element of Kj = Aj n Gj is a product κ · g, with κ ∈ Aj and g ∈ Gj . Using Corollary 3.2, we get: p p κg = p Y p p θ(k)(k) = (κg)p · θ(2)(2) · · · θ(p − 1)p · θ(p), (3.11.1) k=1 with θ(1) = κg and θ(k) ∈ Kkj for any k, as K∗ is strongly central. We use this formula to show, by induction on d 6 p, the following result: ∀j, Kjp ⊆ Kdj . 35 This is true for d = 1, obviously. Let us assume that it holds for d − 1. Let κg ∈ Kj . For the sake of clarity, let us rewrite the formula (3.11.1): p p p −1 (κg) = κ g · θ(p) · 2 Y p θ(k)−(k) . k=p−1 Using, respectively, that A∗ is p-restricted (Proposition 3.10), that G∗ is (by definition) and that K∗ = A∗ n G∗ is strongly central, we get: κp , g p , θ(p) ∈ Kpj ⊆ Kdj , where the inclusion comes from the inequality d 6 p. If 2 6 k < p, then θ(k) ∈ Kkj .  As p divides kp , the induction hypothesis implies: p p ⊆ K(d−1)kj ⊆ Kdj , θ(k)(k) ∈ Kkj because (d − 1)kj > dj. Finally, we get what we were looking for: (κg)p ∈ Kdj , which completes the induction step, and the proof of the proposition. Let SCF p be the full subcategory of SCF given by p-restricted strongly central series. As a consequence of Propositions 3.10 and 3.11, we get: Corollary 3.12. The category SCF p is action-representative, the universal action on G∗ being A∗ (G∗ )  G∗ . This allows us to answer [HM17, rk. 8.6]. Indeed, the Lie functor restricts to a functor L : SCF p −→ pLie with values in the category pLie of p-restricted Lie algebras (over Fp ). Actions in pLie are represented by p-restricted derivations, in the sense of Jacobson [Jac41]. As in Paragraph 1.4, an action K∗  G∗ in SCF p induces, by exactness of the Lie functor, an action L(K∗ )  L(G∗ ) in pLie, which is encoded by a morphism between p-restricted Lie algebras: τ : L(K∗ ) −→ Der[p] (L(G∗ )), where Der[p] ⊆ Der is the p-restricted sub-algebra of p-restricted derivations, i.e. derivations ∂ satisfying: ∂(ap ) = adp−1 a (∂a). Let us stress that for g ∈ pLie, the Lie algebra Der(g) is indeed a p-restricted subalgebra of EndFp (g), but is does not act on g in pLie: the Lie algebra g o Der(g) bears no natural p-restricted structure. Remark 3.13. Using Proposition 3.6 instead of 1.9, and replacing derivations by p[p] restricted ones in the proof, we can get an analogous of Lemma 1.30 for A∗ (G): n o [p] [p] Aj (G) = σ ∈ Aut(G) [σ, G] ⊆ Γj+1 (G) . [p] [p] In other words A∗ (G) in the subgroup of automorphisms acting trivially on G/Γj+1 (G). This is exactly the definition used by Cooper [Coo15, def 3.2]. 36 Remark 3.14 (On the q-torsion case). The same statements are true when considering q-torsion strongly central filtrations (q does not have to be a prime number here), except that they are easier to show, because the condition Gqi ⊆ Gi+1 is equivalent to the fact that L(G∗ ) is q-torsion. Precisely, if L(G∗ ) is q-torsion, then Der(L(G∗ )) is too, and the injectivity of the Johnson morphism L(A∗ (G∗ )) ,→ Der(L(G∗ )) implies that L(A∗ (G∗ )) also is. Hence A∗ (G∗ ), and A∗ (G∗ ) n G∗ are q-torsion, so that these give a universal action on G∗ in the category of q-torsion strongly central series. Moreover, L(G∗ ) also gets some kind of q-th power operation, induced by q-th (q) powers in G = G1 . If G∗ = Γ∗ G is Stallings’ filtration on G, then these operations, together with the Lie algebra structure, generate L(G∗ ) from its degree one part, which (q) allow us to get an analogue of Lemma 1.30: Aj (Γ∗ G) is the subgroup of automor(p) phisms acting trivially on G/Γj+1 (G). Using only this definition, Cooper managed to get the above results on the q-torsion case [Coo15]. However, his claim that the p-restricted case worked similarly [Coo15, Lem. 3.7] seems flawed, and we do not see how to get it without the technical work done above (Proposition 3.10). The minimality of Stallings’ filtration also gives an inclusion:    [q] (q) G , Γ∗ IAG ⊆ A∗ Γ(q) ∗ and a corresponding Andreadakis problem. Nevertheless, our methods in studying the Andreadakis problems so far rely heavily on algebraic structures associated to the F [p] dimension subgroups D∗Z (Fn ) = Γ∗ (Fn ) and D∗ p (Fn ) = Γ∗ (Fn ), so they are not suited to the study of this particular problem. 3.4 3.4.1 The stable p-restricted Andreadakis problem Vanishing of the trace map In the p-restricted context, Proposition 2.33 is replaced by: Proposition 3.15. Let k > 2, and let J ∈ GLm (IFkp Fn ). Then: Tr (J − 1 ) ∈ [T V, T V ]k + (T V )p ⊂ V ⊗k ∼ = I k /I k+1 , Where V = Fnab ⊗ Fp ∼ = Fnp . The proof is exactly the same as the proof of proposition 2.33, over Fp instead of Z, Proposition 2.34 being replaced by: Proposition 3.16. Let f (X1 , ..., Xn ) ∈ V ⊗k . Let C ⊂ Mk (Fp ) be the sub-Z-module generated by the ei,i+1 . Suppose: ∀Ci ∈ C, Tr(f (C1 , ..., Cn )) = 0. Then f ∈ [T V, T V ]k + (T V )p . Proof. We say that two elements u and u0 of V ⊗k are cyclically equivalent, and we write u ∼ u0 if they are conjugate under the action of Z /p. We want to show that f is cyclically equivalent to a p-th power. Let us decompose f , up toP cyclical equivalence, as a sum of pairwise non-cyclically equivalent monomials: f ∼ µg g, where each g is of the form g = Xi1 · · · Xik . If g is such that the iα are pairwise distinct, evaluate each Xiα as Ciα = eα,α+1 , and all Xi not appearing in g as Ci = 0. Then µg = 37 Tr(f (C1 , ..., Cn )) = 0. As a consequence, no such g can appear in our decomposition of f . P Let λ be the algebra morphism from T V to T (V ⊗ V ) sending Xi to j Xij (where Xij = Xi ⊗ Xj ). Take a monomial g = Xi1 · · · Xik as above. Its image is λ(g) = P k j Xi1 j1 · · · Xik jk , the sum being taken over every j = (j1 , ..., jk ) ∈ {1, ..., k} . Let r be the number of monomials cyclically equivalent to h = Xi1 1 · · · Xik k in this sum. Then r is exactly the number of elements of Z /k stabilizing g. It is a multiple of p if and only if g is a p-th power. If we decompose λ(f ) up to cyclic equivalence, as we did earlier for f , the only occurrences of h must come from λ(g), hence the coefficient of h must be rµg . Note that λ(f ) satisfies the same hypothesis as f , because C is stable under addition. Since the Xiα α are pairwise distinct, we can apply the above argument and find that rµg = 0. Thus, µg = 0 or g is a p-th power. Whence the result. Remark 3.17. Any bracket and any p-th power satisfies the condition of Proposition 3.16. For brackets, it follows from the fact that the P trace of a bracket is itself a sum of brackets. For p-th power, remark that if M Q = mi ei,i+1 ∈ Mn (R), where R is an p associative ring of caracteristic p, then M = ( mi ) · 1p , and Tr(1p ) = p · 1 = 0 in k. If k = pl and f = (Xi1 · · · Xil )p , apply this to M = Ci1 · · · Cil (where the Ciα are in C), seen as a p × p-matrix with coefficients in Ml (k). Because of Proposition 3.15, in characteristic p, we will consider the trace map [p] as taking values in C∗ V = T V /([T V, T V ] + (T V )p ), which is the quotient of the cyclic power C∗ V by p-th powers. The conclusion of Proposition 3.15 then becomes: [p] Tr (J − 1 ) = 0 ∈ C∗ V. 3.4.2 Linear algebra Consider the Johnson morphism    [p] [p] ∼ (τ [p] )0 : L[p] IA[p] −→ Der L (F ) = V ∗ ⊗ L[p] V, n n ∗ the last isomorphism being obtained as in Example 1.33, using Example 3.7 instead of Example 1.8, and replacing derivations by p-restricted ones. When p 6= 2, the morphism [p] (τ1 )0 is surjective. Indeed, the free Fp -Lie algebra LV is a sub-algebra of the free prestricted algebra L[p] V , and this inclusion is an isomorphism in degrees prime to p, in particular in degree 2; thus we can lift the generators of V ∗ ⊗ Λ2 V by the generators of IAn used in the proof of Proposition 1.34. Moreover, L[p] (IAn ) is generated in degree 1 as a p-restricted Lie algebra (cf. 3.6). As a consequence, the image of τ 0 is exactly [p] the p-restricted Lie algebra generated in degree 1 inside Der[p] ∗ (L V ). The reader can easily check that the obvious p-restricted version of Proposition 2.32 does hold: the trace map obtained from free differential calculus can be seen as the [p] [p] [p] composite of the Johnson morphism τ : Lk (A∗ (Fn )) → Derk (L[p] V ) ∼ = V ∗ ⊗ Lk+1 V with: Φ π ι [p] [p] TrM : V ∗ ⊗ Lk+1 V −→ V ∗ ⊗ V ⊗k+1 −→ V ⊗k −→ Ck V, where ι and π again denote the canonical maps. Notation 3.18. Let I[p] denote the image of (τ [p] )0 , the p-restricted Lie algebra generated in degree 1 inside Der(LV ). The following proposition can be seen as a direct consequence of Proposition 3.15. 38 [p] Proposition 3.19. For every k > 2, TrM (Ik ) = {0}. Consider be the subspace of p-restricted derivations stabilizing the free Fp -Lie algebra LV ⊂ L[p] V . It is a p-restricted Lie sub-algebra of Der[p] (L[p] V ). Since each derivation of LV extends to a unique p-restricted derivation of L[p] V , this sub-algebra is isomorphic to Der(LV ). Under the identification with the graded module V ∗ ⊗L[p] V , it corresponds exactly to V ∗ ⊗ LV . As a consequence, if p 6= 2, the degree one part is the same. Hence: [p] I[p] ⊆ DerLV (L[p] V ). This implies that there is no stable surjectivity here: we can easily easily produce examples of automorphisms whose associated derivation does not preserve LV . For instance, take any world in Γk (Fn ) not containing any occurrence of x1 . Then the [p] automorphism ϕ defined by x1 7→ wp x1 and xi 7→ xi when i 6= 1 is obviously in Apk−1 , but τ (ϕ) = X1∗ ⊗ (w − 1)p sends X1 outside of LV . 3.4.3 Stable cokernel of i∗ We close the present paper with a quantification of the lack of stable surjectivity in the p-restricted case. Let k > 2. Like in paragraph 2.5.3, we get a commutative diagram with exact rows: Īk V ∗ ⊗ Lk+1 V φ [T V, T V ]k Xk Φ Φ π V ⊗k Ck V. Here, V denotes Fnab ⊗ Fp , and Ī∗ = I∗ ⊗ Fp is the sub-Lie algebra generated in degree one inside Der(LV ). The space Xk is just the quotient of V ∗ ⊗ Lk+1 V by Īk . We will be interested in a slightly different diagram, though: [p] Ik V ∗ ⊗ Lk+1 V Xk0 Φ φ Φ [p] π V ⊗k [T V, T V ]k + (T V )p Ck V. We can still apply the calculations from [Sat12] to show that if n > k + 2, then Φ is [p] surjective and ker Φ ⊆ Īk ⊆ Ik . Only, now φ could have a cokernel. From [Sat12], we only get that brackets are in its image, so this cokernel can only come from p-th powers. In particular, it is concentrated in degrees divisible by p. We denote it by K. The same application of the snake lemma as in the proof of Proposition 2.37 gives that K is also the kernel of Φ, and that Φ is surjective. Now consider the diagram: [p] Ik V ∗ ⊗ Lk+1 V Xk0 ι ker(TrM )k Φ [p] V ∗ ⊗ Lk+1 V 39 TrM [p] Ck V. [p] Denote by L the cokernel of the middle inclusion, then L = V ∗ ⊗ (Lk+1 V /Lk+1 V ) is concentrated in degrees k = pl − 1 (with l > 1). The snake lemma gives a short exact sequence: 0 K coker(ι) L 0. Since the trace map TrM ◦τ vanishes, we have a commutative diagram: i∗ [p] L(IAn ) τ0 [p] L(A∗ ) τ ker(TrM ). This implies that the cokernel of i∗ injects into the cokernel of ι. Thus, we have proved: Proposition 3.20. Fix n an integer, and consider only degrees k 6 n−2. The cokernel of the canonical morphism i∗ : L(IAn[p] ) → L(A∗[p] (Fn )) is concentrated in degrees k = pl − 1 and k = pl (for l > 1). If k = pl − 1, then [p] coker((i∗ )k ) injects into V ∗ ⊗ (Lk+1 V /Lk+1 V ). If k = pl, it is a sub-quotient of V ⊗l . Remark 3.21. The tensor power V ⊗l appearing in the proposition is in fact the Frobenius twist of V ⊗l . This has no consequence here, as the Frobenius map is trivial on Fp , but it should be kept in mind for any functorial study of this situation. References [And65] Stylianos Andreadakis. On the automorphisms of free groups and free nilpotent groups. Proc. London Math. Soc. (3), 15:239–268, 1965. 2 [Bar13] Laurent Bartholdi. Automorphisms of free groups. I. New York J. Math., 19:395–421, 2013. 2, 25, 26, 28, 32 [Bar16] Laurent Bartholdi. Automorphisms of free groups. I—erratum [ MR3084710]. New York J. Math., 22:1135–1137, 2016. 2 [BB04] Francis Borceux and Dominique Bourn. Mal’cev, protomodular, homological and semi-abelian categories, volume 566 of Mathematics and its Applications. Kluwer Academic Publishers, Dordrecht, 2004. 7, 11 [BB07] Francis Borceux and Dominique Bourn. Split extension classifier and centrality. In Categories in algebra, geometry and mathematical physics, volume 431 of Contemp. Math., pages 85–104. Amer. Math. Soc., Providence, RI, 2007. 2, 8 [BBM07] Mladen Bestvina, Kai-Uwe Bux, and Dan Margalit. Dimension of the Torelli group for Out(Fn ). Invent. Math., 170(1):1–32, 2007. 1, 13 [BC05] F. Borceux and Maria Manuel Clementino. Topological semi-abelian algebras. Adv. Math., 190(2):425–453, 2005. 7 40 [BEH08] Laurent Bartholdi, Bettina Eick, and René Hartung. A nilpotent quotient algorithm for certain infinitely presented groups and its applications. Internat. J. Algebra Comput., 18(8):1321–1344, 2008. 2 [BJK05] Francis Borceux, George Janelidze, and Gregory M. Kelly. On the representability of actions in a semi-abelian category. Theory Appl. Categ., 14:No. 11, 244–286, 2005. 2, 8 [BLGM90] Roger M. Bryant, Frank Levin, Chander K. Gupta, and Horace Y. Mochizuki. Nontame automorphisms of free nilpotent groups. Comm. Algebra, 18(11):3619–3631, 1990. 3, 28, 29, 33 [BMS67] Hyman Bass, John Milnor, and Jean-Pierre Serre. Solution of the congruence subgroup problem for SLn (n > 3) and Sp2n (n > 2). Inst. Hautes Études Sci. Publ. Math., 33:59–137, 1967. 16 [Bou08] Dominique Bourn. Commutator theory, action groupoids, and an intrinsic Schreier-Mac Lane extension theorem. Adv. Math., 217(6):2700–2735, 2008. 2, 8 [CE16] Michael Chapman and Ido Efrat. Filtrations of free groups arising from the lower central series. J. Group Theory, 19(3):405–433, 2016. 34 [CEFN14] Thomas Church, Jordan S. Ellenberg, Benson Farb, and Rohit Nagpal. FI-modules over Noetherian rings. Geom. Topol., 18(5):2951–2984, 2014. 31 [Coo15] James Cooper. Two mod-p Johnson filtrations. J. Topol. Anal., 7(2):309– 343, 2015. 36, 37 [CP17] Thomas Church and Andrew Putamn. Generating the johnson filtration ii: finite generation. arXiv:1704.01529, 2017. 1 [CV86] Marc Culler and Karen Vogtmann. Moduli of graphs and automorphisms of free groups. Invent. Math., 84(1):91–119, 1986. 1 [Dar68] Rex S. Dark. On nilpotent products of groups of prime order. PhD thesis, University of Cambridge, 1968. 33 [Dja16a] Aurélien Djament. Décomposition de hodge pour l’homologie stable des groupes d’automorphismes des groupes libres. arXiv:1510.03546, 2016. 1 [Dja16b] Aurélien Djament. Des propriétés de finitude des foncteurs polynomiaux. Fund. Math., 233(3):197–256, 2016. 31 [DP12] Matthew Day and Andrew Putman. A Birman exact sequence for Aut(Fn ). Adv. Math., 231(1):243–275, 2012. 1 [DP16] Matthew B. Day and Andrew Putamn. On the second homology group of the torelli subgroup of aut(fn ). arXiv:1408.6242v3, 2016. 1, 2 [DV15] Aurélien Djament and Christine Vespa. Sur l’homologie des groupes d’automorphismes des groupes libres à coefficients polynomiaux. Comment. Math. Helv., 90(1):33–58, 2015. 1 41 [FM12a] Benson Farb and Dan Margalit. A primer on mapping class groups, volume 49 of Princeton Mathematical Series. Princeton University Press, Princeton, NJ, 2012. 1 [FM12b] Stefano Francaviglia and Armando Martino. The isometry group of outer space. Adv. Math., 231(3-4):1940–1973, 2012. 1 [Fox53] Ralph H. Fox. Free differential calculus. I. Derivation in the free group ring. Ann. of Math. (2), 57:547–560, 1953. 19 [Fra33] Hermann Frasch. Die Erzeugenden der Hauptkongruenzgruppen für Primzahlstufen. Math. Ann., 108(1):229–252, 1933. 17 [Gal11] Søren Galatius. Stable homology of automorphism groups of free groups. Ann. of Math. (2), 173(2):705–768, 2011. 1 [Gro52] Emil Grosswald. On the parabolic generators of the principal congruence subgroups of the modular group. Amer. J. Math., 74:435–443, 1952. 17 [Hal34] Philip Hall. A contribution to the theory of groups of prime-power order. Proc. London Math. Soc. (2), 36:29–95, 1934. 33 [HL11] Manfred Hartl and Bruno Loiseau. A characterization of finite cocomplete homological and of semi-abelian categories. Cah. Topol. Géom. Différ. Catég., 52(1):77–80, 2011. 7 [HM17] Kazuo Habiro and Gwenael Massuyeau. Generalized johnson homomorphisms for extended n-series. arXiv:1707.07428, 2017. 2, 4, 12, 35, 36 [Jac41] Nathan Jacobson. Restricted Lie algebras of characteristic p. Trans. Amer. Math. Soc., 50:15–25, 1941. 34, 36 [Joh83] Dennis Johnson. A survey of the Torelli group. In Low-dimensional topology (San Francisco, Calif., 1981), volume 20 of Contemp. Math., pages 165– 179. Amer. Math. Soc., Providence, RI, 1983. 13 [JW04] Craig A. Jensen and Nathalie Wahl. Automorphisms of free groups with boundaries. Algebr. Geom. Topol., 4:543–569, 2004. 1 [Kal50a] Léo Kaloujnine. Sur quelques propriétés des groupes d’automorphismes d’un groupe abstrait. C. R. Acad. Sci. Paris, 230:2067–2069, 1950. 8 [Kal50b] Léo Kaloujnine. Sur quelques propriétés des groupes d’automorphismes d’un groupe abstrait. (Généralisation d’un theorème de M. Ph. Hall). C. R. Acad. Sci. Paris, 231:400–402, 1950. 8 [Kaw06] Nariya Kawazumi. Cohomological aspects of magnus expansions. arXiv:math/0505497, 2006. 13 [KM97] Sava Krstić and James McCool. The non-finite presentability of IA(F3 ) and GL2 (Z[t, t−1 ]). Invent. Math., 129(3):595–606, 1997. 1 [Laz54] Michel Lazard. Sur les groupes nilpotents et les anneaux de Lie. Ann. Sci. Ecole Norm. Sup. (3), 71:101–190, 1954. 3, 6, 8, 14, 34 42 [Lop14] Jonathan Lopez. Lie algebras and cohomology of congruence subgroups for SLn (R). J. Pure Appl. Algebra, 218(2):256–268, 2014. 3, 16 [LS76] Ronnie Lee and Robert H. Szczarba. On the homology and cohomology of congruence subgroups. Invent. Math., 33(1):15–53, 1976. 3, 17 [ML98] Saunders Mac Lane. Categories for the working mathematician, volume 5 of Graduate Texts in Mathematics. Springer-Verlag, New York, second edition, 1998. 7 [Mor93] Shigeyuki Morita. Abelian quotients of subgroups of the mapping class group of surfaces. Duke Math. J., 70(3):699–726, 1993. 3, 25 [MP09] Roman Mikhailov and Inder Bir Singh Passi. Lower central and dimension series of groups, volume 1952 of Lecture Notes in Mathematics. SpringerVerlag, Berlin, 2009. 14 [MS17] Gwenael Massuyeau and Takuya Sakasai. Morita’s trace maps on the group of homology cobordisms. arXiv:1606.08244, 2017. 2, 28 [Nie24] Jakob Nielsen. Die Isomorphismengruppe der freien Gruppen. Math. Ann., 91(3-4):169–209, 1924. 1, 13 [Pas79] Inder Bir S. Passi. Group rings and their augmentation ideals, volume 715 of Lecture Notes in Mathematics. Springer, Berlin, 1979. 14, 33, 34 [Pas85] Donald S. Passman. The algebraic structure of group rings. Robert E. Krieger Publishing Co., Inc., Melbourne, FL, 1985. Reprint of the 1977 original. 33 [Rip72] Eliyahu Rips. On the fourth integer dimension subgroup. Israel J. Math., 12:342–346, 1972. 14 [Rot95] Joseph J. Rotman. An introduction to the theory of groups, volume 148 of Graduate Texts in Mathematics. Springer-Verlag, New York, fourth edition, 1995. 13 [RWW17] Oscar Randal-Williams and Nathalie Wahl. Homological stability for automorphism groups. Adv. Math., 318:534–626, 2017. 1 [Sat12] Takao Satoh. On the lower central series of the IA-automorphism group of a free group. J. Pure Appl. Algebra, 216(3):709–717, 2012. 2, 3, 25, 30, 39 [Sta65] John Stallings. Homology and central series of groups. J. Algebra, 2:170– 181, 1965. 34 [Zas39] Hans Zassenhaus. Ein Verfahren, jeder endlichen p-Gruppe einen Lie-Ring mit der Charakteristik p zuzuordnen. Abh. Math. Sem. Univ. Hamburg, 13(1):200–207, 1939. 34 43
4
HAND SEGMENTATION FOR HAND-OBJECT INTERACTION FROM DEPTH MAP Byeongkeun Kang? Kar-Han Tan† Nan Jiang? Hung-Shuo Tai† Daniel Tretter‡ Truong Nguyen? arXiv:1603.02345v3 [cs.CV] 10 Jan 2018 ? Department of Electrical and Computer Engineering, UC San Diego, La Jolla, CA 92093 USA † NovuMind Inc., Santa Clara, CA 95054 USA ‡ Hewlett-Packard, Inc., Palo Alto, CA 94304 USA ABSTRACT Hand segmentation for hand-object interaction is a necessary preprocessing step in many applications such as augmented reality, medical application, and human-robot interaction. However, typical methods are based on color information which is not robust to objects with skin color, skin pigment difference, and light condition variations. Thus, we propose hand segmentation method for hand-object interaction using only a depth map. It is challenging because of the small depth difference between a hand and objects during an interaction. To overcome this challenge, we propose the two-stage random decision forest (RDF) method consisting of detecting hands and segmenting hands. To validate the proposed method, we demonstrate results on the publicly available dataset of hand segmentation for hand-object interaction. The proposed method achieves high accuracy in short processing time comparing to the other state-of-the-art methods. Index Terms— Hand segmentation, human-machine interaction, random decision forest, depth map 1. INTRODUCTION Recently, with the expansion of virtual reality (VR), augmented reality (AR), robotics, and intelligent vehicles, the development of new interaction technologies has become unavoidable since these applications require more natural interaction methods rather than input devices. For these applications, many researches have been conducted such as gesture recognition and hand pose estimation. However, most technologies focus on understanding interactions which do not involve touching or handling any real world objects although understanding interactions with objects is important in many applications. We believe that this is because hand segmentation is much more difficult in hand-object interaction. Thus, we present a framework of hand segmentation for hand-object interaction. This work is supported in part by NSF grant IIS-1522125. 1.1. Related work Hand segmentation has been studied for many applications such as hand pose estimation [1–6], hand tracking [7–9], and gesture/sign/grasp recognition [10, 11]. In color imagebased methods, skin color-based method has been popular [10, 12–16]. For hand-object interaction, Oikonomidis et al. and Romero et al. segmented hands by thresholding skin color in HSV space [4, 5, 7, 8]. Wang et al. processed hand segmentation using a learned probabilistic model where the model is constructed from the color histogram of the first frame [6]. Tzionas et al. applied skin color-based segmentation using the Gaussian mixture model [17]. However, skin color-based segmentation has limitations in interacting with objects in skin color, segmenting from other body parts, skin pigment difference, and light condition variations. An alternative method is wearing a specific color glove [18]. For depth map-based methods, popular methods are using a wrist band [3, 9, 11] or using random decision forest (RDF) [1,2,19]. Although the method using a black wristband is uncomplicated and effective, it is inconvenient. Moreover, the method cannot segment hands from objects during handobject interaction since it processes segmentation by finding connected components. Tompson et al. [1] and Sharp et al. [2] proposed the RDF-based methods based on [19]. Although the purposes of the methods are slightly different comparing to the proposed method, the methods are the most relevant methods. In this paper, we propose the hand segmentation method for hand-object interaction using only a depth map to avoid the limitations of skin color-based methods. We present the two-stage RDF method to achieve high accuracy efficiently. 2. METHOD We propose two-stage RDF for hand segmentation for handobject interaction. In our two-stage RDF, the first RDF detects hands by processing the RDF on an entire depth map. Then, the second RDF segments hands in pixel-level by applying the RDF in the detected region. This cascaded architecture is designed for the second RDF to focus on the segmentation of hands from objects and close body parts such as an arm. Fig. 1. Random decision forest. Red, black, and green circles represent root nodes, split nodes, and leaf nodes, respectively. RDF consists of a collection of decision trees as shown in Fig. 1. Each decision tree is composed of a root node, splitting nodes, and leaf nodes. Given an input data at the root node, it is classified to child nodes based on the split function at each splitting node until it reaches a leaf node. In this paper, the input data is the location of each pixel on a depth map. The split function uses the feature of the depth difference between two relative points on the depth map in [19]. At a leaf node, a conditional probability distribution is learned in a training stage, and the learned probability is used in a testing stage. For more details about RDF, we refer the readers to [20–22]. Fig. 2. Detection of hands using the RDF in the first stage. designed to evalutate the separation using the learned offset vectors and criteria as follows: X X |xc | L(x, D, u, v, θ) = − p(h|c) log p(h|c) |x| c∈{l,r} h∈{0,1} (3) where c and h are indexes for child nodes {l, r} and for classes, respectively; |xc | denotes the number of data points in the c child node; p(h|c) is the estimated probability of being the class h at the child node c. To learn offsets and a criteria, the algorithm randomly generates possible candidates and selects the candidate with a minimum loss L(·) as follows: (u, v, θ) = argmin L(x, D, u, v, θ). 2.1. Training (4) (u,v,θ) Given a training dataset D, the algorithm randomly selects a set Di of depth maps D and then randomly samples a set of data points x in the region of interest (ROI) on the selected depth maps D. The ROI is the entire region of the depth maps in the first stage. It is the detected regions using the first RDF in the second stage (see Fig. 2). The sampled set of data points x and the corresponding depth maps D are inputs to the training of a decision tree. Using the inputs (x, D), the algorithm learns a split function at each splitting node and a conditional probability distribution at each leaf node. First, learning the split function includes learning a feature f (·) and a criteria θ. We use the feature f (·) of the depth difference between two relative points {x + u/D x , x + v/D x } in [19] as follows: f (x, D, u, v) = Dx+u/Dx − Dx+v/Dx (1) where D x denotes the depth at a pixel x on a depth map D; u ∈ R2 and v ∈ R2 represent offset vectors for each relative point. Then, the criteria θ decides to split the data x to the left child or the right child. f (x, D, u, v) ≶ θ. (2) Thus, the algorithm learns two offset vectors (u, v) and a criteria θ at each splitting node. Since the goal is separating the data points x of different classes to different child nodes, the objective function is Learning a split function at each splitting node is repeated until the node satisfies the condition for a leaf node. The condition is based on (1) the maximum depth of the tree, (2) the probability distribution p(h|c), and (3) the amount of training data |x| at the node. Specifically, it avoids too many splitting nodes by limiting the maximum depth of the tree and by terminating if the child node has a high probability for a class or if the amount of remaining training data is too small. At each leaf node, the algorithm stores the conditional probability p(h|l) (probability of being each class h given reaching the node l) for the prediction in a testing stage. 2.2. Testing Using the learned RDF, the algorithm predicts the probability of being a class for a new data x. The new data is classified to child nodes using the learned split function at each splitting node until it reaches a leaf node. At the leaf node l, the learned conditional probability pT (h|l) is loaded. These steps are repeated for entire trees T in the forest T . Then, the probabilities are averaged to predict the probability p(h|x) of being a class h for the new data x. p(h|x) = 1 X pT (h|l) |T | T ∈T where |T | is the number of trees in the learned forest T . (5) (a) (b) Fig. 3. Scores depending on the decision boundary on the validation dataset. (a) Score of the RDF in the first stage. (b) Score of the two-stage RDF with filtering in Section 2.3. In the first stage, the first RDF is applied on an entire depth map to compute a probability map. Then, the probability map is used to detect hands as shown in Fig. 2. In the second stage, the second RDF processes the data points in the detected regions to predict the probability of being each class. The proposed two-stage RDF improves both accuracy and efficiency by focusing on each task in each stage. Decision boundaries are exhaustively searched with the step size of 0.01 using the predicted probability maps of the validation dataset as shown in Fig. 3. Although the most typical boundary is 0.5 for a probability map, we found that it is not the best parameter. The selected boundaries are shown in Table 1. Fig. 4. Analysis of accuracy and efficiency. 3. EXPERIMENTAL EVALUATIONS 3.1. Dataset We collected a new dataset1 using Microsoft Kinect v2 [26]. The newly collected dataset consists of 27,525 pairs of depth maps and ground truth labels from 6 people (3 males and 3 females) interacting with 21 different objects. Also, the dataset includes the cases of one hand and both hands in a scene. The dataset is separated into 19,470 pairs for training, 2,706 pairs for validation, and 5,349 pairs for testing, respectively. 2.3. Modified bilateral filter 3.2. Results Before classifying a data x to a class h, modified bilateral filter is applied to the predicted probability p(h|x) to make the probability more robust. Since the probability p(h|x) is predicted for each pixel independently, the probability is stabilized by averaging the probabilities of the data points in close distance and similar intensity on the depth map. Unlike typical bilateral filter whose weights are based on the input image (in this case, the probability map) [23], the weights in the modified bilateral filter are based on a separate image, the depth map. The filtering is defined as follows: The proposed method is analyzed by demonstrating the results on the dataset in Section 3.1. For the quantitative comparison of accuracy, we measure F1 score, precision, and recall as follows: tp tp precision = , recall = tp + fp tp + fn (7) precision × recall F1 = 2 × precision + recall 1 X pe(h|x) = gr (|D xi −D x |)gs (kxi −xk)p(h|xi ) (6) w xi ∈Ω where Ω is the set of pixels within the filter’s radius and the pre-defined depth difference; w is the normalization term, P w = xi ∈Ω gr (|D xi − D x |)gs (kxi − xk); gr (·) and gs (·) are the Gaussian functions for the depth difference and for the spatial distance from the data point x, respectively. gr (r) = s2 r2 exp(− 2σ 2 ); gs (s) = exp(− 2σ 2 ). The parameters in the filr s ter were selected based on the experiments using validation dataset. The selected parameters are as follows: the maximum depth difference to be considered is 400mm. Both standard deviations (σr and σs ) are 100. where tp, fp, and fn represent true positive, false positive, and false negative, respectively. For the comparison of efficiency, we measure the processing time using a machine with Intel i7-4790K CPU and Nvidia GeForce GTX 770. The proposed method is compared with the RDF-based method in [1, 19] and the fully convolutional networks (FCN) in [24, 25] using only a depth map. The proposed method is not compared with color-based methods since the characteristics of depth sensors and color imaging sensors are quite different. For example, a captured depth map using a depth sensor does not vary depending on light condition. However, a captured color image varies a lot depending on light condition. Thus, choosing the capturing environment affects the 1 https://github.com/byeongkeun-kang/HOI-dataset Table 1. Quantitative comparison. The two boundaries for the proposed method are for each stage. Method Score Processing time Method Boundary (ms) F1 score Filter Precision Recall RDF [1, 19] RDF [1, 19] + Proposed in Sec. 2.2 FCN-32s [24, 25] FCN-16s [24, 25] FCN-8s [24, 25] Proposed method (a) 0.50 0.78 0.50, 0.50 0.50, 0.52 0.50, 0.52 11 × 11 (b) (c) 38.1 54.5 70.0 68.0 70.4 59.2 60.8 62.9 91.2 72.7 68.6 72.2 74.4 77.4 75.1 75.6 53.7 62.3 69.3 70.1 72.3 67.1 67.2 68.7 (d) 6.7 6.7 376 376 377 8.9 8.9 10.7 (e) Fig. 5. Visual comparison. (a) Ground truth label. (b) Result using RDF [1, 19]. (c) Result using RDF [1, 19] with the proposed method in Section 2.2. (d) Result using FCN-8s [24, 25]. (e) Result using the proposed method. The results and ground truth label are visualized using different color channels for better visualization. comparison of results using depth maps and color images. Hence, we only compare the proposed method with the stateof-the-art methods which can process using only depth maps. Table 1 and Fig. 5 show quantitative results and visual results. The scores in Table 1 are scaled by a factor of 100. The quantitative results show that the proposed method achieves about 25% and 8% relative improvements in F1 score comparing to the RDF-based methods [1, 19] and its combination with the proposed method in Section 2.2, respectively. Comparing to the deep learning-based methods [24, 25], the proposed method achieves about 7% lower accuracy, but processes in about 42 times shorter processing time. Thus, deep learning-based methods can not be used in real-time applica- tions. Fig. 4 shows the comparison of methods in accuracy and efficiency. The proposed method achieves high accuracy in short processing time. 4. CONCLUSION In this paper, we present two-stage RDF method for hand segmentation for hand-object interaction using only a depth map. The two stages consist of detecting the region of interest and segmenting hands. The proposed method achieves high accuracy in short processing time comparing to the state-of-the-art methods. 5. REFERENCES [1] J. Tompson, M. Stein, Y. Lecun, and K. Perlin, “Realtime continuous pose recovery of human hands using convolutional networks,” ACM Trans. Graph., 2014. [2] T. Sharp, C. Keskin, D. Robertson, J. Taylor, J. Shotton, D. Kim, C. Rhemann, I. Leichter, A. Vinnikov, Y. Wei, D. Freedman, P. Kohli, E. Krupka, A. Fitzgibbon, and S. Izadi, “Accurate, robust, and flexible real-time hand tracking,” in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015. [3] C. Qian, X. Sun, Y. Wei, X. Tang, and J. Sun, “Realtime and robust hand tracking from depth,” in Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on, June 2014. [4] J. Romero, H. Kjellstrom, and D. Kragic, “Hands in action: real-time 3d reconstruction of hands in interaction with objects,” in Robotics and Automation (ICRA), 2010 IEEE International Conference on, May 2010. [5] J. Romero, H. Kjellstrom, C. H. Ek, and D. Kragic, “Non-parametric hand pose estimation with object context,” Image Vision Comput., vol. 31, no. 8, Aug. 2013. [6] Y. Wang, J. Min, J. Zhang, Y. Liu, F. Xu, Q. Dai, and J. Chai, “Video-based hand manipulation capture through composite motion control,” ACM Trans. Graph., vol. 32, no. 4, July 2013. [7] I. Oikonomidis, N. Kyriazis, and A.A. Argyros, “Full dof tracking of a hand interacting with an object by modeling occlusions and physical constraints,” in Computer Vision (ICCV), 2011 IEEE International Conference on, 2011. [8] A. A. Argyros and M. I. A. Lourakis, “Real-time tracking of multiple skin-colored objects with a possibly moving camera,” in Computer Vision - ECCV, 2004. [9] B. Kang, Y. Lee, and T. Nguyen, “Efficient hand articulations tracking using adaptive hand model and depth map,” in Advances in Visual Computing, Dec. 2015. [10] M. Cai, K.M. Kitani, and Y. Sato, “A scalable approach for understanding the visual structures of hand grasps,” in Robotics and Automation (ICRA), 2015 IEEE International Conference on, May 2015. [11] B. Kang, S. Tripathi, and T. Nguyen, “Real-time sign language fingerspelling recognition using convolutional neural networks from depth map,” in Pattern Recognition, 2015 3rd IAPR Asian Conference on, Nov. 2015. [12] M. J. Jones and J. M. Rehg, “Statistical color models with application to skin detection,” International Journal of Computer Vision, vol. 46, Jan. 2002. [13] R. Khan, A. Hanbury, J. Stttinger, and A. Bais, “Color based skin classification,” Pattern Recognition Letters, vol. 33, Jan. 2012. [14] C. Li and K.M. Kitani, “Pixel-level hand detection in ego-centric videos,” in Computer Vision and Pattern Recognition, 2013 IEEE Conference on, June 2013. [15] S. L. Phung, A. Bouzerdoum, and D. Chai, “Skin segmentation using color pixel classification: analysis and comparison,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 27, 2005. [16] P. Kakumanu, S. Makrogiannis, and N. Bourbakis, “A survey of skin-color modeling and detection methods,” Pattern Recognition, vol. 40, Mar. 2007. [17] D. Tzionas and J. Gall, “3d object reconstruction from hand-object interactions,” in International Conference on Computer Vision (ICCV), Dec. 2015. [18] R. Y. Wang and J. Popović, “Real-time hand-tracking with a color glove,” ACM Trans. Graph., vol. 28, 2009. [19] J. Shotton, A. Fitzgibbon, M. Cook, T. Sharp, M. Finocchio, R. Moore, A. Kipman, and A. Blake, “Real-time human pose recognition in parts from single depth images,” in Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, June 2011. [20] A. Criminisi and J. Shotton, “Decision forests for computer vision and medical image analysis,” Advances in Computer Vision and Pattern Recognition, 2013. [21] L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, 2001. [22] T. Ho, “Random decision forests,” in Proceedings of the Third International Conference on Document Analysis and Recognition, 1995. [23] C. Tomasi and R. Manduchi, “Bilateral filtering for gray and color images,” in Computer Vision, Sixth International Conference on, Jan. 1998. [24] J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015. [25] E. Shelhamer, J. Long, and T. Darrell, “Fully convolutional networks for semantic segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2016. [26] B. Kang, Y. Lee, and T. Q. Nguyen, “Depth adaptive deep neural network for semantic segmentation,” IEEE Transactions on Multimedia, 2018.
1
A Spatio-Temporal Representation for the Orienteering Problem with Time-Varying Profits arXiv:1611.08037v2 [cs.AI] 2 Jul 2017 Zhibei Ma, Kai Yin, Lantao Liu, Gaurav S. Sukhatme Abstract— We consider an orienteering problem (OP) where an agent needs to visit a series (possibly a subset) of depots, from which the maximal accumulated profits are desired within given limited time budget. Different from most existing works where the profits are assumed to be static, in this work we investigate a variant that has arbitrary time-dependent profits. Specifically, the profits to be collected change over time and they follow different (e.g., independent) time-varying functions. The problem is of inherent nonlinearity and difficult to solve by existing methods. To tackle the challenge, we present a simple and effective framework that incorporates time-variations into the fundamental planning process. Specifically, we propose a deterministic spatio-temporal representation where both spatial description and temporal logic are unified into one routing topology. By employing existing basic sorting and searching algorithms, the routing solutions can be computed in an extremely efficient way. The proposed method is easy to implement and extensive numerical results show that our approach is time efficient and generates near-optimal solutions. I. I NTRODUCTION The rapid progress of smart vehicle technologies allows us to envision that, in the future autonomous vehicles are able to carry out various tasks with little or even no human effort. We are interested in designing an efficient routing method to navigate a vehicle (agent) among a number of known and fixed depots, where each depot has some profit (e.g., score, benefit, utility, load) to be collected. If the travel time is limited, it is likely that the agent is not able to traverse all depots due to the limited time budget. This variant of routing problems is called the orienteering problem (OP) [11]. In a nutshell, an OP aims to find a tour traversing a subset of depots so that the accumulated profit collected from those traversed depots are maximized. Different from many existing vehicle routing problems which focus on analyzing path properties in the static context (i.e., unchanging environment or topology with stationary cost metrics) [17], [12], in this work we are intrigued to investigate a time-varying variant of OPs, i.e., each depot has a time-varying profit. Here are a few motivational examples: • As illustrated in Fig. 1, an autonomous truck needs to pick up goods from a number of fixed depots where manufacturing factories are located. The goods are produced consistently and accumulated as time goes by — so they are time-varying. The growth rate of goods at different factories may be nonidentical: larger factories Z. Ma, L. Liu and G.S. Sukhatme are with the Department of Computer Science at the University of Southern California, Los Angeles, CA 90089, USA. {zhibeima, lantao.liu, gaurav}@usc.edu. K. Yin is with HomeAway, Inc., [email protected]. Fig. 1. An autonomous vehicle needs to route through depots with timevarying profits (loads). The goal is to maximize overall collected profits within given limited time. The task can be persistent. grow faster and smaller ones grow slower. Assume the truck has sufficiently large capacity and it empties all goods from a depot when it arrives there. The objective is to find a route so that the truck will load the most goods in a given time window. • In environmental monitoring, autonomous robots are deployed to collect environment data in order to estimate an underlying environment state. However, the environment attributes at different locations can be timevarying (e.g., dissolved chemical compounds and algae blooms in the water vary both spatially and temporally.) An important objective of environment monitoring is to plan so-called “informative paths” [5] that navigate the robots to acquire data from those most information-rich spots which best help estimate the environment. In this paper, we present our initial study for the timevarying OP. We start our analysis from the single agent planning case, and attempt to establish a new framework that is different from traditional modeling and solving routines. We will show that, a big challenge of the time-varying OP (even for single agent case) lies in the requirement of a special treatment in an extra dimension — the time dimension, which inevitably introduces extra complexity as we need to model, predict, and integrate future dynamics. II. R ELATED W ORKS The routing problems have been well studied in many research domains including operations research, theoretical computer science, and transportation systems [3], [4], [7]. Typical routing problems involve incorporation of constraints expressed from the nature of the target problems, which also narrow the space of searching for solutions [19]. We are interested in a variant of routing problems called the orienteering problems (OPs) [11], [22]. An OP considers both travel cost (e.g., travel time) and scores collected along the travel. The goal of the OP is to determine which subset of vertices to visit and in which order so that the collected scores within a given period is maximized. The OPs integrate characteristics of both knapsack problems (KPs) [15] and travelling salesman problems (TSPs) [19], and OPs are NPhard as well. In contrast to the TSP, not all vertices of an OP need to be visited due to the limited time budget. During the past few decades, several variants of OPs have been studied, such as time-dependent OPs, Team OPs, (Team) OPs with Time Windows and OPs with stochastic profits. Recent survey papers [22], [12] have profoundly discussed state-of-the-art techniques of these variants as well as their applications. While OPs can be formulated as mixed integer programs (MIPs), the problem size typically is too large to directly use commercial solvers. A wide range of decomposition methods such as branch-and-price algorithms have been developed so that a large-scale MIP can be decomposed into smaller problems (e.g., a master problem and a series of sub-problems) which can then be iteratively solved by commercial solvers [13], [16]. In order to reduce the heavy computational burden in decomposition methods, heuristics and metaheuristics have been extensively studied, typically including tabu-based or neighborhood search based procedures [6], [21], [24]. Although in general OPs have been well researched, the time-dependent OPs (TOPs) have received relatively less attention comparing with other variants [10], [12]. Even so, most of existing TOPs discuss the time-varying properties that are associated with the real travel time between pairwise nodes, and assume that travel time between two nodes depends on the departure time at the first (or an earlier) node [18], [9], [8], [23]. Very rarely we could find the works that discuss about time-varying scores of OPs. One work that share certain similarity with this proposed problem is [2], where multiple vehicles need to serve a number of clients and the profit of each client follows a decreasing function of time. The work analyzed a lower bound and upper bound based on a classic MIP formulation. Instead of employing conventional techniques such as the column generation approach used in [2], in this work we present our first study that models and tackles the problem from a different perspective: we start from establishing a representation built from the spatial and temporal constraints, so that the time dependence attribute is transferred from the bulk MIP to a separate and intuitive representation. With that, fast approximate OP solutions can be found by employing and extending order-sensitive topological algorithms. III. P ROBLEM D ESCRIPTION AND F ORMULATION A routing problem can be represented with a graph G = (V, E), where V is the set of vertices and E denotes the set of edges. Let us denote the number of vertices as |V | = n+1, and suppose every edge takes time to traverse. Although the travel time, in many situations, depends on the states and properties of the network such as congestion and capacity, we assume that the travel time τij between two vertices vi and vj is time-invariant for simplicity∗ . We associate each ∗ It is relatively straightforward to incorporate time-dependent travel times in our proposed model described in the following section. vertex vi with a time-varying value, called profit, which is denoted by fi (t) ≥ 0 at time t ≥ 0. Here fi (·) is of arbitrary nonlinear function form. We assume that function fi (·) is known or can be predicted or approximated. Suppose that the agent (vehicle) starting from a dummy node v0 at time 0 travels across a subset of vertices on the graph G. When the agent visits vertex vi at time ti , it will collect the profit fi (ti ). The remaining profit at the vertex vi right after the agent leaves becomes 0 and accumulates again. Additionally, the profit at v0 is assumed to be 0, i.e., f0 (t) = 0. Assuming the agent visits each vertex once, the objective is to determine the order of a subset of vertices to visit so that total profits collected by the agent is maximized within a given planning period T . Note that we do not assign a specific destination to the agent, as the problem with a fixed end vertex is a special case for our problem. Let xij = 1 if the agent travels from vi to vj , and 0 otherwise. Let t0 = 0. We also introduce extra variables ui with u0 = 0 to eliminate the subtours. Then the problem in this study can be formulated as the following mixed-integer program. max xij n X i=1 n X j=1 n X fi (ti ) · x0j = xik = i=0 tj 6 T · X j n X i=1 n X j=0 n X xji , (1) xi0 = 1, (2) xkj 6 1, xij , ∀k 6= 0, ∀j, (3) (4) i=0 ti + xij (τij + T ) 6 T + tj , 1 6 ui 6 n, ui − uj + 1 6 n(1 − xij ), xij ∈ {0, 1}, ∀i, j, ∀i 6= 0, (5) (6) ∀i 6= 0, j 6= 0, ∀i, j. (7) (8) Eq. (1) is to maximize the total collected profits. Constraint (2) guarantees that the path starts and ends at dummy node v0 . Note that our setup allows a path to end at any node by discarding the inward edge. Constraints (3) ensure the connectivity of the path and guarantee that every vertex is visited at most once. The limited time budget is ensured by Constraint (4), while Constraint (5) determines the visiting time ti along the path. Constraints (6) and (7), so called Miller-Tucker-Zemlin (MTZ) formulation in the traveling sales problem[19], are used to prevent subtours. IV. A S PATIO -T EMPORAL R EPRESENTATION It appears a daunting task to solve the problem (1)-(8) due to the complexity of objective function. Most of existing literature in OPs either lumps all constraints together and solves it by conventional solvers of MIPs [20], [22], or decouples the constraints into master-subproblem modules such as column generation [2], or use certain heuristics such as center-of-gravity heuristic [11]. In contrast, we (a) (b) (c) (d) Fig. 2. Illustrations of spatio-temporal representation. (a) Graph G = (V, E) constructed on a x-y plane. Numbers on vertices are the vertex IDs, and numbers on edges denote required travel time costs; (b) Spatio-temporal graph of (a). In this example each vertex has 5 time units along the (z-axis); (c)(d) Another example with 7 vertices and 8 time windows. desire to develop a framework starting from a constraintincluded representation that is intuitive to understand, easy to implement from scratch, and flexible to modify and extend. In this section, we present a means for embedding constraints into a spatio-temporal representation built on which the original routing problem can be tackled by efficient methods (though it is still a NP-hard problem). As the problem essentially aims to determine the visiting time and order of vertices, it inspires us to incorporate a time dimension to extend the 2-dimensional graph on a spatial plane to a 3-dimensional graph (topology). To make the model implementable, the time range [0, T ] is discretized into a sequence of time intervals ∆t of equal length, and the interval ∆t is used as a time unit that specifies discrete time resolution. Thus, the travel time τij can be expressed as multiple times of the time unit. For example, τij = nij ∆t and T = nT ∆t , where nij and nT are integers. Figure 2 shows two examples that describe the basic idea. Intuitively, one can imagine that each spatial graph vertex (Fig. 2(a)) is extended to a sequence of vertices expanding in the time dimension, where each vertex is on an unique time layer corresponding to a future time moment (Fig. 2(b)). Then edges are added by concatenating vertices of different time layers, constrained by the real travel time. Formally, two vertices on different time layers form an edge if and only if the two vertices are spatially traversable and the time difference between the two time layers is exactly equal to the anticipated real travel time between the two vertices. Each vertex contains a profit and the profit is time-varying. In other words, the profits at different time layers are not the same. Therefore, the problem is equivalent to finding a path from the given start vertex at time 0 such that the path transits other vertices within time T and the total collected profits are maximized. It is worth mentioning that, the spatiotempral edges are “directed” since each edge must start from a vertex at an earlier time layer and ends at one at a later moment; Because the time is uni-directional and cannot travel backwards, it is impossible to form a loop or cycle on the spatio-temporal graph. As a result, such a spatio-temporal representation is equivalent to a vertex-weighted Directed Acyclic Graph (DAG) [18]. This allows us to conveniently develop our own routing algorithm built on many existing efficient DAG algorithms. More formally, the spatio-temporal representation is a vertex-weighted DAG, denoted by G0 = (V 0 , E 0 , W 0 ), where V 0 = V × T , T = {0, ∆t , ..., nT ∆t }; eijus is a directed 0 0 edge from vertex viu = (vi , u) to vjs = (vj , s), and 0 eijus ∈ G if and only if the edge e(vi , vj ) ∈ E in G and 0 0 ∈ W 0 for vertex viu τij = ns ∆t − nu ∆t ; the weight wiu 0 has value wiu = fi (u). Keep in mind that u = nu ∆t and a similar equation holds for s. As an example, suppose that we have a complete graph G with 3 vertices, ∆t = 1, and T = 5. In the spatiotemporal representation G0 shown in Fig. 2(b), there are 18 0 0 0 vertices v0,0 , v0,1 , ..., v2,5 , each vertex in the original graph G is duplicated at the discrete time in T = {0, 1, 2, 3, 4, 5}. If 0 0 τ01 = 3 and τ21 = 5, then vertex v0,0 is directed to v1,3 and 0 0 v2,0 is directed to v1,5 . In this example, we have 9 directed edges in total. With graph G = (V, E) and given time limit T , the spatiotemporal graph G0 = (V 0 , E 0 , W 0 ) can be constructed by Alg. 1. Assume there are n vertices in G, the time complexity of Alg. 1 is O(n2 T /∆t ) because there are three for loops each of which is associated with either n or T . Also there are n(T /∆t + 1) vertices in G0 , so the space complexity is O(nT /∆t ) . Algorithm 1: SpatioTemporalGraph (G, T, v0 , ∆t ) Input: 1: Graph G = (V, E), time limit T , start vertex v0 , time interval ∆t Output: 2: for each vertex vi in graph G do 3: for each t in time period [0, T ], time step is ∆t do 0 4: vit .id = i 0 0 5: vit .weight = fi (t), put wit into the weight set W 0 0 6: vit .position = vi .position 0 7: vit .prof it = fi (t) 0 8: vit .sum = −∞ 0 9: vit .parent = −1 10: for each vi ’s neighbor vj do 11: if t + τij is equal to t0 AND t0 <= T then 12: put edge eijtt0 into the edge set E 0 0 0 13: push vjt 0 into vector vit0 .successors 0 14: update indegree of vit . 0 15: put vit into the vertex set V 0 0 16: set the v0,0 .sum to 0 17: return graph G0 = (V 0 , E 0 , W 0 ) 0 Note: fi (t) is the time-varying profit function of vertex vi at time t. v0,0 is the start vertex in G0 , and .sum is used to store accumulated profit from prior traversal along a path. The label .parent points to the predecessor vertex. V. ROUTING A LGORITHM An important advantage of the spatio-temporal graph lies in that, the time related constraints have been incorporated into this spatio-temporal representation, so that temporal related constraints can be decoupled and eliminated from the process of optimizing the profits. Thus, the problem (1)-(8) is 0 equivalent to finding a path P from P vertex v00,0 = (v0 , 0) to 0 0 vks on G where s ≤ T such that (v0 u)∈P wiu is maximum. i Since the spatio-temporal graph is essentially a DAG, we develop our routing solution via extending classic DAG algorithms. Specifically, we found that the profit maximization can be transformed to a longest path problem by accumulating the profits collected from vertices instead of summing up edge lengths along a path. We manipulate the DAG so that vertices are sorted in a topological order along the temporal dimension, and then employ a dynamic programming paradigm to compute the maximal profit path. It is also noteworthy that, while developing a solution to the time-varying OP, we take two concerns that are related to applications into account. • Specification of a Routing Destination: Many routing problems, including classic OPs, require to specify a routing destination. The destination can be the original depot where the agent departures (e.g., a mail truck needs to return a central processing office); the destination can also be an arbitrary depot located somewhere else (e.g., a freight truck needs to pick up goods and unload them into some specified processing location that is different from the starting depot). • Persistent Task: Many long-term missions need repetitive and persistent routing, for which specifying a routing destination is not necessary or even inappropriate. For instance, in the persistent environmental monitoring task, we do not need the robot to stop at some specified location, as the robot will need to resume to next round of routing after the completion of current one. Thus, the routing destination should be computed on the fly based on the profit optimization constrained by time T , instead of being manually specified. We will show that the proposed framework works for both specified and unspecified routing destinations. A. Topological Sorting of DAG in Temporal Dimension The main purpose of topological sorting of the DAG is that, the vertices are “placed” onto different “stages” according to their temporal constraints, so that a dynamic programming structure (discussed in the following subsection) can be applied. Formally, a topological sort of a directed graph is a linear ordering of its vertices such that for every directed edge euv from vertex u to vertex v, u comes before v in ordering. A topological sort of a graph requires that the graph must be a DAG. We employ a well-known algorithm developed by Kahn [14] to sort our spatial-temporal graph G0 , with main steps shown in Alg. 2. Briefly, we first find a list of vertices that have no incoming edges (with deg − (v) = 0), and insert them into a set S. Note, at least one such vertex must exist in a non-empty graph. Then we traverse the set S. Each time we remove a vertex v from S, and add it to the tail of the list L. After removing v, the indegree of its successors should be decreased by 1. Then we insert those vertices with updated indegree equal to 0 in the set S. To analyze the time complexity, assume there are n vertices in G, so there will be n(T /∆t + 1) vertices in G0 . 0 For each vertex vit , there will be at most n−1 directed edges. 0 Therefore |E | = O(n2 T /∆t ), and the time complexity of Alg. 2 is O(|V 0 | + |E 0 |) = O(n2 T /∆t ). Algorithm 2: TopologicalSort (G0 ) 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: L: an empty list that will contain the sorted elements S: a set of all nodes with no incoming edges while S is not empty do remove a vertex v from S add v to the end of L for each successor u of v do deg − (u) = deg − (u) − 1 if deg − (u) equals to 0 then insert u into S return L (a topologically sorted order) Note: G0 is a DAG, the indegree of v is denoted as deg − (v). B. Computing Maximal Profit Path We transfer the time-varying OP to a longest path problem in a DAG. The classic longest path problem is the problem of finding a simple path of maximum length in a given graph. We employ a dynamic programming structure to memorize incumbent maximal accumulated profit at each vertex of topologically sorted stages. Note that, in our problem, we need to optimize profits collected from vertices, instead of adding up length of edges. Therefore, instead of using the longest path update function between two successive stages: l[w] = l[v] + τvw , if l[v] + τvw > l[w], (9) where l[w] is the largest distance from start vertex to w, we utilize an update function: w.sum = v.sum+w.prof it, if v.sum+w.prof it > w.sum. (10) The computation of the maximal profit path is described in Alg. 3. Briefly, the topologically sorted vertices V 0 of the spatio-temporal graph G0 are used as an input. Then vertices from different stages form dynamic programming subproblems and they are updated with accumulated profits 0 0 recursively, starting from v0,0 . Here we use vit .path to store vertices along the path from start v00 to vi0 (Note, only spatial information is recorded). To prevent from forming routing subtours, we check and discard those already visited vertices before each value update. After the completion of dynamic programming, each vertex contains information of the maximal profit path that 0 routes from v0,0 to it. Since the graph G0 has incorporated the time limit T , every vertex is feasible to the time constraint. To find a maximal profit path to a specified vertex (destination) vi ∈ G, one simply needs to enumerate 0 all states vij ∈ G0 , ∀j of vertex vi and retrieve the path with the largest value. If a destination is not specified, one needs to enumerate all states of all vertices and find out the maximal one among them. The time complexity of Alg. 3 is O(n2 T /∆t ) due to its two for loops. Algorithm 3: M aximalP rof itP ath(L) vit .sum = 0, i = 0, t = 0 0 for each vertex vit in topologically sorted order L do 0 0 for each vertex vjt 0 in vit .successors do 0 if vertex vj is not in the vit .path then 0 0 0 if vit .sum + vjt 0 .prof it > vjt0 .sum then 0 0 0 vjt0 .sum = vit .sum + vjt0 .prof it 0 0 update the vjt 0 .parent to vit 0 0 vjt0 .path = vit .path + vj 0 for each vertex vit in G0 do find the maximal sum retrieve a path P by backtracking from end to start 12: return P 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: Note: The label .path is a vector that stores all visited vertices from start to vi C. Main Routing Algorithm With the components descried above, the main algorithm is shown in Alg. 4. According to the analysis of each part, the overall time complexity of our algorithm is n2 T /∆t , and the space complexity is n2 T /∆t as well. Algorithm 4: Time-Varying OP Input: 1: 2D graph G = (V, E), start vertex v0 , time limit T , time interval ∆t Output: 2: construct a spatio-temporal graph G0 = SpatioT emporalGraph(G, T, v0 , ∆t ) 3: L = T opologicalSort(G0 ) 4: path = M aximalP rof itP ath(L) 5: return path Our algorithm has a polynomial time complexity given a fixed ∆t , but cannot guarantee to find the optimal solution to this NP-hard problem. The main reason for possibly reaching at sub-optimality lies in that, we added a non-subtour constraint in order to (1) prevent the path from traversing back and forth among a small subset of adjacent vertices and (2) comply with the structure of dynamic programming. Such a constraint eliminates certain feasible searching space which possibly contains the optimal solution. One may regard this as a trade-off between solution quality and practical runtime. Nevertheless, our evaluation results with extensive trials show that on average our algorithm produces near-optimal solutions. D. Discussion: Effects of Discretization The time interval ∆t plays a critical role in our framework as the total profits are actually evaluated at travel time steps equal to multiple ∆t . Yet it may be impractical to select a small enough time interval because it would result in an extremely large size of DAG. One possible implementation is to round the travel time to a value closet to some integer times of ∆t . Hence, it is important to analyze the impact of errors due to such rounding procedure. Assume that the profit function fi (t) satisfies the following Lipschitz condition: |fi (t) − fi (s)| ≤ K|t − s|, ∀t, s ∈ [0, T ], ∀i ∈ {0, ..., n}, (11) where K is a constant independent of i. Suppose that the optimal objective value for the problem (1)-(8) is z, and the optimal objective value by the proposed framework is z 0 . Then we have the result as follows. Proposition 1: Under the condition (11), we have the upper bound for the difference in two objective values: |z − z 0 | ≤ [n(n + 1)/2] · K · ∆t . (12) proof: Let P be the optimal path in the graph G for the problem (1)-(8) and let P 0 be the optimal path in the proposed spatio-temporal DAG G0 . By the construction of G0 , P must correspond to a path P̃ in the graph G0 . Let z̃ be the total profits (i.e. the value of objective (1) on this path) for the path P̃ . Since the difference between the discrete time in our framework and the original real-valued time is within ∆t , the fact that any path contains no more than n vertices and the condition (11) lead to |z − z̃| ≤ [n(n + 1)/2]K∆t . As P 0 rather than P̃ is the optimal path in G0 , we have z̃ ≤ z 0 . By combining these results, we should have z − z 0 ≤ [n(n + 1)/2]K∆t . Conversely, by construction any feasible path on the graph G0 must correspond to a feasible path on G. Using similar arguments, we have z 0 −z ≤ [n(n+1)/2]K∆t . Therefore, the result (12) holds. It is worthwhile noting that the constraint that the path in G or G0 contains no subtours is critical to the result (12). VI. R ESULTS We conducted numerical evaluations to validate the proposed algorithm. We compared our algorithm with other algorithms, all of which were implemented in C++. The experiments were performed on a system with an Intel i5 2.2GHz processor and 4GB RAM. In our experiments, vertices are randomly generated in the area [−50, 50] × [−50, 50] on the x-y plane, and each vertex has a profit (weight) following certain time-varying functions. The distance between two vertices is Euclidean distance. A. Routing Feature of “Orienteering” First, we demonstrate that our solution has the basic orienteering property: given limited time, the path always goes through those vertices with large profits. Fig. 3(a) shows an example. We purposely manipulate the profit distribution among the vertices, such that in the upper right corner, there are more vertices with larger profits. For better visualization, in the figure the size of a vertex is proportional to the profit on it. Additionally, we purposely put the starting vertex on the left and do not specify a destination. From Fig. 3(a) we (a) (b) Fig. 3. (a) Route feature of orienteering. ∆t is 1, vertex number is 200, T is 200 and the start vertex is at (-49,0); (b) Route behavior under timevarying profit function, ∆t is 1, vertex number is 200, T is 200. The start vertex v0 is at (-49,0). In all of our experimental graphs, the size of a vertex represents the weight, which is proportional to its profit. can see that, in order to obtain more profits, the route goes to the upper-right corner almost directly from the start vertex. In this way, a big part of time is used among traversing those vertices with large profits. B. Routing Properties under Temporal Variations To examine the effects caused by temporal variations, we manipulate the profit functions. Specifically, we divide the space into four regions (quadrants) I,II,III and IV, as shown in Fig. 3(b). The profits are the same if the vertices are in the same region, but different if not. For example, in region 0 I, the profit function for each vit is ( 5wi if t 6 T /2 fi (t)I = 0 if t > T /2 where wi is the weight of vertex vi in graph G. (Keep in 0 mind that, wi is different from wit which is time-varying. Here the weight wi refers to a fixed parameter for profit function.) Similarly, the profit functions in regions II, III and IV are ( 10wi if t 6 T /2 fi (t)II = 0 if t > T /2 ( 0 if t 6 T /2 fi (t)III = 5wi if t > T /2 ( 0 if t 6 T /2 fi (t)IV = 10wi if t > T /2 Figure 3(b) reveals that, the path first transits the vertices in region II, because during the first half T , vertices in region II have larger profits than those in region III. After the path enters region I and after the time passes T /2, vertices in region IV contain larger profits. Such variations attract the path to go through vertices in region IV. This example indicates that our algorithm is sensitive to the time-varying profit functions. C. Comparison with Optimal Solution We compare the result of our algorithm with the optimal solution that is obtained by enumerating all solutions in a brute-force way. Because of the prohibitive time complexity O(n!) for searching for the optimal solution, the practical runtime for 13 vertices requires more than 10 minutes. Thus, we tested up to 12 vertices to compare with the optimal solutions. We investigated three representative profit functions in the form of linear, quadratic and logarithmic, respectively. The results are shown in Fig. 4. We can see that the results of our algorithm are very close to those of the optimal solutions, for all the three functions. Figure 5 shows a group of paths produced from our algorithm and the optimal solution. We use a linear profit fi (t) = wi t/T for this example. In many cases, our algorithm get the same results as those of the optimal solution, as shown in Fig. 5(a) and Fig. 5(b). Sometimes the paths are different, such as Fig. 5(c) and Fig. 5(d), but the collected profits are quite similar (in this example, ours obtains 183.5 whereas the optimal is 185.0). Fig. 5(e) and Fig. 5(f) show another example. D. Comparison with Classic OP Algorithm We also compared our algorithm with the classic OP algorithms. We implemented a well-known heuristic called center-of-gravity [11], and tested with both time-invariant and time-variant profits. Fig. 6 demonstrates the differences between the results of our approach and those of the OP. Fig. 7 show statistics of numerical evaluations with 200 vertices. We can see that, our algorithm outperforms the OP for both the time-invariant and time-varying profits. Particularly, the difference margin is larger for the timevarying profits. Actually, the classic OP cannot handle timevarying profits and the total profit curve quickly converges (with fixed given time T , the overall profit of OP stops growing along with the increment of the number of vertices). The running time is compared in Fig. 7(c), from which we can observe that, in practice our algorithm costs less time than that of the OP using the center-of-gravity heuristic. E. Path Quality under Different Time Intervals Time interval ∆t determines time discretization resolution, and therefore affacts the optimality as well. Table I shows statistics of the route’s quality under different time intervals. In the table, numbers in the first row are interval values, and numbers in the first column are the number of vertices. The remaining values are the collected profits from our algorithm. We can see that, in general the route’s quality is better when the time interval is smaller. However, obviously a smaller time interval will inevitably lead to a larger graph and thus require a larger running time. F. Demonstration with New York Taxi Data We demonstrate that the proposed algorithm can be used for (autonomous) taxi routing. Fig. 8 shows real data of taxi calls in New York city. The data is obtained from NYC Taxi and Limousine Commission [1]. We use the kmeans clustering algorithm to cluster the whole New York taxi calls into 50 local regions, as shown in Fig. 9(a). The clustering centers are shown in Fig. 9(b). We assume that each pick-up and the subsequent drop-off occur in the same local region, and each pick-up and drop-off is counted as (a) f (t) = wi t/T (b) f (t) = −wi (t2 +tT +T 2 )/T 2 (c) f (t) = wi log(t + 1) Fig. 4. Profit statistics on (a) Linear function; (b) Quadratic function; (c) Logarithmic function. (a) (b) (c) (d) (e) (f) Fig. 5. Examples with linear profit functions. The paths in red are from our algorithm while the paths in green are found with brute-force search. (a)(b) Our algorithm obtains optimal solution 281; (c)(d) Our solution is 183.5 whereas the optimal solution is 185.0; (e)(f) Our solution is 186.6 whereas the optimal solution is 195.1. (a) (b) (c) (d) Fig. 6. Path comparisons. The paths in red are computed from our algorithm while the paths in green are from the classic OPs using the center-of-gravity heuristic. (a)(b) Time-invariant profits fi (t) = wi ; (c)(d) Time-varying profits fi (t) = wi t/T TABLE I S TATISTICS OF SOLUTION QUALITY WITH VARIOUS TIME INTERVALS ∆t Intervals (a) (b) 0.1 0.5 1 2 5 10 50 541.1 530.3 529.2 522.1 515.1 498.3 100 788.2 783.4 767.9 735.6 727.5 619.2 150 950.2 919.0 909.7 892.9 823.0 686.8 200 1129.5 1117.6 1107.1 1094.3 935.5 696.0 Note: T = 150, graph within [−50, 50] × [−50, 50] on x-y plane, profit fi (t) = wi t/T. 50,100,150 and 200 are the numbers of vertices. (c) Fig. 7. (a) Performance on time-invariant profits fi (t) = wi ; (b) Performance on time-varying profits fi (t) = wi t/T ; (c) Statistics of practical running time. other taxis too). Therefore, this problem can be formulated as an orienteering problem with time-varying profits, where we need to treat those clustered regions as super routing depots that offer different profits at different times of a day. Fig. 11 demonstrates a result generated from running our algorithm, from which we can observe that the taxi is routed across those regions with the most taxi calls, even though we set the starting point at a distant location with sparse requests. a completion of one service. Then a taxi driver aims at maximizing the profit by providing more services during a fixed period. In each region, we calculate the total number of taxi calls in every predefined time unit (e.g., minute). An example is shown in Fig. 10. We regard the total number of taxi calls in a region as a time-varying profit, and more calls indicate higher chance of getting profits (note, there are We presented a framework for addressing the orienteering problem with time-varying profits. Instead of following traditional mixed integer program solution routines, we develop an intuitive and effective framework that incorporates timevariations into the fundamental planning process. Specifically, we first construct a deterministic spatio-temporal VII. C ONCLUSION AND F UTURE W ORK Fig. 8. Data of taxi calls in New York city Fig. 11. The taxi routing path generated from our algorithm. The big square is the starting location. (a) (b) Fig. 9. (a) Taxi calls are clustered through k-means; (b) Clustering centers represent high-level routing depots. representation where both spatial description and temporal logic are unified into one routing topology, and then we extend existing sorting and searching algorithms, so that the routing solutions can be computed in an extremely efficient way. Finally, we validated our algorithm with numerical evaluations and the results show that our framework produces near-optimal solutions in a very efficient way. R EFERENCES [1] NYC Taxi and Limousine Commission. http://www.nyc.gov/ html/tlc/html/about/trip_record_data.shtml. Accessed: 2017-02-25. [2] H. M. Afsar and N. Labadie. Team orienteering problem with decreasing profits. Electronic Notes in Discrete Mathematics, 41:285– 293, 2013. [3] R. Bellman. On a routing problem. Quarterly of applied mathematics, pages 87–90, 1958. [4] M. Bellmore and G. L. Nemhauser. The Traveling Salesman Problem: A Survey. Operations Research, 16(3):538–558, May 1968. [5] J. Binney, A. Krause, and G. S. Sukhatme. Optimizing waypoints for monitoring spatiotemporal phenomena. The International Journal of Robotics Research, 32(8):873–888, 2013. [6] I.-M. Chao, B. L. Golden, and E. A. Wasil. The team orienteering problem. European journal of operational research, 88(3):464–474, 1996. [7] N. Christofides. The vehicle routing problem. Revue française d’automatique, d’informatique et de recherche opérationnelle. Recherche opérationnelle, 10(1):55–70, 1976. (a) (b) Fig. 10. For a particular region (region 1 in this example), the number of taxi calls is varying as time elapses. (a) Time unit is minute; (b) Time unit is hour. [8] H. C. B. de Oliveira and G. C. Vasconcelos. A hybrid search method for the vehicle routing problem with time windows. Annals of Operations Research, 180(1):125–144, 2010. [9] F. V. Fomin and A. Lingas. Approximation algorithms for timedependent orienteering. Information Processing Letters, 83(2):57–62, 2002. [10] A. Garcia, O. Arbelaitz, P. Vansteenwegen, W. Souffriau, and M. T. Linaza. Hybrid approach for the public transportation time dependent orienteering problem with time windows. In International Conference on Hybrid Artificial Intelligence Systems, pages 151–158, 2010. [11] B. L. Golden, L. Levy, and R. Vohra. The orienteering problem. Naval research logistics, 34(3):307–318, 1987. [12] A. Gunawan, H. C. Lau, and P. Vansteenwegen. Orienteering problem: A survey of recent variants, solution approaches and applications. European Journal of Operational Research, 2016. [13] G. Gutiérrez-Jarpa, G. Desaulniers, G. Laporte, and V. Marianov. A branch-and-price algorithm for the vehicle routing problem with deliveries, selective pickups and time windows. European Journal of Operational Research, 206(2):341–349, 2010. [14] A. B. Kahn. Topological sorting of large networks. Commun. ACM, 5(11):558–562, Nov. 1962. [15] H. Kellerer, U. Pferschy, and D. Pisinger. Introduction to NPCompleteness of knapsack problems. Springer, 2004. [16] M. Keshtkaran, K. Ziarati, A. Bettinelli, and D. Vigo. Enhanced exact solution methods for the team orienteering problem. International Journal of Production Research, 54(2):591–601, 2016. [17] G. Laporte. The traveling salesman problem: An overview of exact and approximate algorithms. European Journal of Operational Research, 59(2):231–247, 1992. [18] M. Mahmoudi and X. Zhou. Finding optimal solutions for vehicle routing problem with pickup and delivery services with time windows: A dynamic programming approach based on state–space–time network representations. Transportation Research Part B: Methodological, 89:19–42, 2016. [19] C. E. Miller, A. W. Tucker, and R. A. Zemlin. Integer programming formulation of traveling salesman problems. Journal of the ACM (JACM), 7(4):326–329, 1960. [20] G. L. Nemhauser and L. A. Wolsey. Integer and Combinatorial Optimization. Wiley-Interscience, New York, NY, USA, 1988. [21] H. Tang and E. Miller-Hooks. A tabu search heuristic for the team orienteering problem. Computers & Operations Research, 32(6):1379– 1407, 2005. [22] P. Vansteenwegen, W. Souffriau, and D. Van Oudheusden. The orienteering problem: A survey. European Journal of Operational Research, 209(1):1–10, 2011. [23] C. Verbeeck, K. Sörensen, E.-H. Aghezzaf, and P. Vansteenwegen. A fast solution method for the time-dependent orienteering problem. European Journal of Operational Research, 236(2):419–432, 2014. [24] T. Vidal, N. Maculan, L. S. Ochi, and P. H. Vaz Penna. Large neighborhoods with implicit customer selection for vehicle routing problems with profits. Transportation Science, 50(2):720–734, 2015.
2
Synchronization Detection and Recovery of Steganographic Messages with Adversarial Learning Haichao Shi1,2 and Xiao-Yu Zhang1 1 2 Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China Abstract. As a means for secret communication, steganography aims at concealing a message within a medium such that the presence of the hidden message can hardly be detected. In computer vision tasks, adversarial training has become a competitive learning method to generate images. However, the generative tasks are confronted with great challenge on synthesizing images. This paper studies the mechanism of applying adversarial learning for discriminative tasks to learn the steganographic algorithm. We show that through unsupervised adversarial training, the adversarial model can produce robust steganographic solutions, which act like an encryption. Through supervised adversarial training, we can also train a robust steganalyzer, which is utilized to discriminate whether an image contains secret information. Our model is composed of three modules, i.e. a generator, a discriminator and a steganalyzer. All the three members are trained simultaneously. To formulate the algorithm, we use a game to represent the communication between the three parties. In this game, the generator and discriminator attempt to communicate with each other with secret messages hidden in an image. While the steganalyzer attempts to analyze whether there is a transmission of confidential information. Experimental results demonstrate the effectiveness of the proposed method on steganography tasks. Keywords: Steganography, Steganalysis, Adversarial learning. 1 Introduction Steganography has become a heated research topic in information security, which is widely used in various applications. It is used to conceal secret information (i.e. a message, an image or a sound) within a medium such that both the secret message as well as its content will remain invisible. Therefore, the ultimate goal is to conceal a payload into a cover object without affecting the sharpness of the cover object. With the emergence of all sorts of media, steganography, especially image-based steganography, has drawn worldwide attention. The design of robust steganographic algorithms which are used in secret communications is of vital importance. Steganographic algorithms are designed to hide the secret information within a cover message such that the cover message appears unaltered to an external adversary. Recent researchers have made great efforts to design steganographic algorithms to minimize 2 the perturbations within the cover object when embedded into the secret message. Obviously, concealing both the content of the carrier as well as the presence of a secret message is of vital importance for privacy sensitive communication. The steganography aims to hide the presence of a secret message, while the steganalysis algorithms are utilized to find out and recover the secret information of the carrier object. Similar with adversarial training, the steganalysis serves as the adversarial to steganography. For the game design of the steganographic techniques, we leverage the ideas from the adversarial learning. Adversarial learning is based on game theory, and is combined with unsupervised way to jointly train the model. In our previous work [19], we proposed a novel strategy of secure steganograpy based on generative adversarial networks to generate suitable and secure covers for steganography, which was not considered the decoding process. This paper is different from that, we not only encode the secret messages into the images, but decode it utilizing the network. Then we utilize a steganalysis network to detect the presence of hidden messages. Through unsupervised training, the generator plays the role of a sender, which is utilized to generate steganographic images as real as possible. As the discriminator plays the role of a receiver, it not only differentiates real images and generated images, but also extracts the secret messages. And the steganalysis network, as a listener of the whole process, incorporates supervised learning with adversarial training to compete against state-of-the-art steganalysis methods. In summary, this paper makes the following contributions: (1) We incorporate the generative adversarial network into steganography, which proves to be a good way of encryption. (2) We integrate the unsupervised learning method and supervised learning method to train the generator and steganalyzer respectively, and received robust steganographic techniques in unsupervised manner. (3) We also utilize the discriminative network to extract the secret information. Experiments are conducted on widely used datasets, which demonstrate the advantages of the proposed method. The rest of the paper is structured as follows. In Section 2, we discuss the related work of steganography, adversarial networks. In Section 3, we elaborate the proposed method. In Section 4, experiments are conducted to demonstrate the effectiveness of the proposed method. In Section 5, we draw conclusions. 2 Related work 2.1 Steganography The image-based steganography algorithm can be split into two categories. The one is based on the spatial domain, the other is based on the DCT domain. In our work, we focus on the spatial domain steganography. The state-of-the-art steganographic schemes concentrate on embedding secret information within a medium while minimizing the perturbations within that medium. On the contrary, steganalysis is to figure out whether there is secret information or not in the medium. 3 Least Significant Bit (LSB) [12] is one of the most popular embedding methods in spatial domain steganography. If LSB is adopted as the steganography method, the statistical features of the image are destroyed. And it is easy to detect by the steganalyzer. For convenience and simple implementation, the LSB algorithm hides the secret to the least significant bits in the given image’s channel of each pixel. Mostly, the modification of the LSB algorithm is called ±1-embedding. It randomly adds or subtracts 1 from the channel pixel, so the last bits would match the ones needed. Besides the LSB algorithm, some sophisticated steganographic schemes choose to use a distortion function which is used for selecting the embedding localization of the image. This type of steganography is called the content-adaptive steganography. The minimization of the distortion function between the cover image 𝐶 and the steganographic image 𝑆 is usually required. These algorithms are the most popular and the most secure image steganography in spatial domain, such as HUGO (Highly Undetectable steGO) [4], WOW (Wavelet Obtained Weights) [2], S-UNIWARD (spatial universal wavelet relative distortion) [3], etc. 𝑑 𝐶, 𝑆 = 𝑓 𝐶, 𝑆 ∗ |𝐶 − 𝑆| (1) where 𝑓 𝐶, 𝑆 is the cost of modifying a pixel, which is variable in different steganographic algorithms. HUGO is a steganographic scheme that defines a distortion function domain by assigning costs to pixels based on the effect of embedding some information within a pixel. It uses a weighted norm function to represent the feature space. WOW is another content-adaptive steganographic method that embeds information into a cover image according to textural complexity of regions. In WOW shows that the more complex the image region is, the more pixel values will be modified in this region. S-UNIWARD introduces a universal distortion function that is independent of the embedded domain. Despite the diverse implementation details, the ultimate goals are identical, i.e. they are all devoted to minimize this distortion function, to embed the information into the noise area or complex texture, and to avoid the smooth image coverage area. 2.2 Adversarial Learning In recent years, GANs have been successfully applied to image generation tasks. The method that generative adversarial networks generate images can be classified in two manners in general. The first is mainly exploring image synthesis tasks in an unconditioned manner that generates synthetic images without any supervised learning schemes. Goodfellow et al. [7] propose a theoretical framework of GANs and utilize GANs to generate images without any supervised information. However, the early GANs has somewhat noisy and blurry results and sometimes the gradient will be vanished when training the networks. Later, Radford et al. [15] propose a deep convolutional generative adversarial networks (DCGANs) for unsupervised representation. To solve the situation of gradient vanishing, WGAN [14] is proposed using the Wasserstein distance instead of the Jensen-Shannon divergence, to make the data set distribution compared with the learning distribution from G. 4 Another direction of image synthesis with GANs is to synthesize images by conditioning on supervised information, such as text or class labels. The Conditional GAN [16] is one of the works that develop a conditional version of GANs by additionally feeding class labels into both generator and discriminator of GANs. Info-GAN [17] introduces a new concept, which divides the input noise z into two parts, one is the continuous noise signal that cannot be explained, and the other is called C. Where C represents a potential attribute that can be interpreted as a facial expression, such as the color of eyes, whether with glasses or not, etc. in the facial tasks. Recently, Reed et al. [18] utilize GANs for image synthesis using given text descriptions, enabling translation from character level to pixel level. Adversarial learning has been applied to steganographic and cryptographic problems. In Abadi’s [1] work, they apply two neural networks to adversarial game to encrypt a secret message. In which game the discriminator can be deceived. In this paper, we are devoted to training a model that can learn a steganographic technique by itself making full use of the discriminator. 3 Adversarial Steganography This section discusses our proposed adversarial steganographic scheme, we present the experiments supporting our claims after laying the theoretical groundwork. 3.1 Network Architecture Generator. The generator receives the cover images and secret messages. Before learning the distribution of the images, the secret messages are first embedded into the cover image. The generated steganographic images are then input into the generator. As is shown in Fig.1, we use a fully connected layer, which can cover anywhere of the image not merely a fixed region. Then four fractionally-strided convolution layers, and finally a Hyperbolic tangent function layer. The architecture is shown as follows: Fig. 1. The architecture of the generator Discriminator. The discriminator is mainly responsible for extracting the secret messages. Besides, it can also help to optimize the visual quality of the generated images. 5 We use four convolutional layers, and then a fully connected layer. In detail, we additionally add a decoding function at the end of the network to extract the secret messages. Which acts as an interface, accepting the steganographic images as input. The decoding function analyzes the modification of pixels in images, and recovers the message. As is shown as follows: Fig. 2. The architecture of the discriminator Steganalyzer. The steganalyzer’s inputs are both covers and steganographic images. The steganalyzer’s architecture is similar to the discriminator, as is illustrated in Fig. 3. With distinct, we first use a predefined high-pass filter to make a filtering operation, which is mainly for steganalysis. And then four convolutional layers. Finally, we use a classification layer, which includes several fully connected layers. Fig. 3. The architecture of the steganalyzer 3.2 Optimization Objective Our training scheme includes three parties: generator, discriminator and steganalyzer. In this game, the generator conveys a secret medium to the discriminator, which the steganalyzer attempts to eavesdrop the conveying process and find out whether there are some special information containing in the process. Generally speaking, the generator generates a steganographic image within the cover image embedded with a secret message. Then generator passes it to the next network which we called discriminator, concentrating on decoding and recovering the message. The steganalyzer figures out a 6 confidence probability of how much likely the image is hidden with a secret message when given an image. For the whole process of information conveying is transparent to the discriminator, so the decoding can be easily achieved. In the game of the three parties, the generator is trained to learn to produce a steganographic image such that the discriminator can decode and recover the secret message, and such that the steganalyzer can output a better probability whether it is a cover or a steganographic image. Fig. 4. The whole architecture of the training game. 𝑀 and 𝑀′ represents the secret message and extracted message from the steganographic image respectively, 𝐶 represents the cover image, and 𝑆𝐶 represents the steganographic image. 𝑝 is the probability of classifying the co- vers and steganographic images. 𝑝′ is the probability of classifying the real images and generated images. The whole architecture can be depicted in Fig.4, the generator receives a cover image, 𝐶, and a secret message, 𝑀. Combined with the above two inputs, it outputs a steganographic image, 𝑆- , which is simultaneously given to the discriminator and steganalyzer. Once receiving the steganographic image, the discriminator decodes it and attempts to recover the message. For the game is under generative adversarial networks, the discriminator can also improve the visual quality of the generated images. In addition to the steganographic images, the cover images are also input into the steganalyzer, whose output is a probability to classify the steganographic images and covers. We let 𝜔/ , 𝜔0 , 𝜔1 denote the parameters of generator, discriminator and steganalyzer respectively. We utilize 𝐺(𝜔/ , 𝑀, 𝐶) represents generator’s output given an image 𝐶 and secret message 𝑀 , 𝐷(𝜔0 , 𝑆- ) for discriminator’s output on steganographic images 𝑆- , and 𝑆(𝜔1 , 𝐶, 𝑆- ) for steganalyzer’s output on covers and steganographic images. Then we use 𝐿/ , 𝐿0 , 𝐿1 represent the loss of three networks respectively. And we can calculate as follows: 𝐷 𝜔0 , 𝑆- = 𝐷(𝜔0 , 𝐺(𝜔/ , 𝑀, 𝐶)) (2) 𝑆 𝜔1 , 𝐶, 𝑆- = 𝑆(𝜔1 , 𝐶, 𝐺(𝜔/ , 𝑀, 𝐶)) (3) 7 where the 𝐷 𝜔0 , 𝑆- is output of the discriminator, 𝑆 𝜔1 , 𝐶, 𝑆- is the output of the steganalyzer. For the generator’s loss, we correspond it with the other two networks. And we add constraints to normalize the loss. 𝐿/ 𝜔/ , 𝑀, 𝐶 = 𝜆/ ∙ 𝑑 𝐶, 𝑆- + 𝜆0 ∙ 𝐿0 (𝜔0 , 𝑆- ) + 𝜆1 ∙ 𝐿1 (𝜔1 , 𝐶, 𝑆- ) (4) where 𝑑 𝐶, 𝑆- is the Euclidean distance between the covers and the steganographic images. And 𝜆/ , 𝜆0 , 𝜆1 are the calculation loss weights of the generator, discriminator and steganalyzer respectively. These variables are varying from [0,1]. Also, we set discriminator’s loss to be the norm form. Here, we use the ℓ@ norm. 𝐿0 𝜔/ , 𝜔0 , 𝑀, 𝐶 = 𝑀, 𝐷 𝜔0 , 𝑆- @ = ||𝑀, 𝐷(𝜔0 , 𝐺(𝜔/ , 𝑀, 𝐶))||@ = ||𝑀, 𝑀′||@ (5) where the form ||𝑀, 𝑀′||@ is the distance between 𝑀 and 𝑀′. And we set steganalyzer’s loss to be binary cross-entropy of logistic regression. 𝐿1 𝜔/ , 𝜔1 , 𝐶, 𝑆- = − A B F 𝑦 ln 𝑆 𝜔1 , 𝐶, 𝑆- + (1 − 𝑦) ln(1 − 𝑆 𝜔1 , 𝐶, 𝑆- ) (6) where 𝑦 = 1 if 𝑥 = 𝐶, which means classifying the images as covers, 𝑦 = 0 if 𝑥 = 𝑆- , which means the steganographic images are identified. We apply adversarial learning techniques to discriminative tasks to learn the steganographic algorithm. Under unsupervised adversarial training, the model can produce steganographic techniques, which act like an encryption. 4 Experiments As a proof of concept, we conducted our experiments on two image datasets: celebrity faces in the wild (CelebA) [8] consisting of 202,599 images and BossBase, which is a dataset of 10000 grayscale images of various scenes. Our datasets are formed of 64 × 64 pixel images. For the choice of 𝑀, we concatenate a random paragraph message to generalize our model to random message, with each sample of each dataset. And we consider different kinds of embedding rates, which vary from 0.1bpp (bits per pixel) to 0.4bpp. Generally, most steganographic algorithms can successfully hide secret message approximately at 0.4bpp. All experiments were performed in TensorFlow[9], on a workstation with a Titan X GPU. 4.1 CelebA dataset For the CelebA dataset, which contains 202,599 images of celebrity faces from 10,177 unique identities. We train the model using RMSProp optimization algorithm with the learning rate of 2×10JK . At each batch we train either the generator, discriminator, or steganalyzer alternatively. From the results, we can see that there is no noticeable image quality decrease between 0.1bpp and 0.4bpp. As is shown in Fig. 5. And we also calculate the PSNR (Peak Signal to Noise Ratio) to evaluate the steganographic effect. 8 Fig. 5. The above are the covers and steganographic images of CelebA dataset. (a) represents the covers, (b) represents the steganographic images with the embedding rates of 0.1bpp, (c) represents the steganographic images with the embedding rates of 0.4bpp. The bottom is the contrast of PSNR of embedding rates at 0.1bpp and 0.4bpp. 4.2 BossBase dataset In addition to the experiments on the CelebA dataset, we also trained our model on the BossBase dataset, which is a standard steganography dataset. For the images from this dataset do not come from a single distribution, so the dataset can perform worse than the experiments on the CelebA dataset. 9 Fig. 6. Similarly, the above are the covers and steganographic images of BossBase dataset. (a) represents the covers, (b) represents the steganographic images with the embedding rates of 0.1bpp, (c) represents the steganographic images with the embedding rates of 0.4bpp. The bottom is also the contrast of PSNR of embedding rates at 0.1bpp and 0.4bpp. We can conclude from the two groups of experiments that for the datasets with distinct distribution, different embedding rates can influence the similarity between the original images and the embedded images. 4.3 Comparison with related work We train in such a way that the steganalyzer can detect the covers and steganographic images with low rates. Thus, on the basis of this experiment, we additionally conduct another experiment compared with the state-of-the-art steganographic algorithms. Which also shows competitive results. For both datasets, we compare our scheme against steganographic algorithms HUGO and S-UNIWARD. As is shown in Table 1, our steganalyzer performs competitively. By training steganalyzer in a supervised fashion, the experiments show that it has the capacity to become a strong steganalyzer, competing against established techniques like GNCNN, and so is a good choice for the steganalyzer. Furthermore, for both the CelebA 10 and BossBase datasets, we use 10,000 samples and split them in half, creating a training set and a test set. And we then trained the generator on the training set. Following this, we then created an additional 5,000 steganographic images utilizing each steganography algorithm. Thus, we can make the cover set and steganographic images set consist of 5,000 images respectively. Table 1. Accuracy of distinguishing between cover and steganographic images for the GNCNN and Steganalyzer at an embedding rate of 0.4bpp. Steganographic Algorithm HUGO S-UNIWARD Generator CelebA Steganalyzer GNCNN 0.93 0.91 0.94 Steganalyzer 0.91 0.89 0.92 BossBase Steganalyzer GNCNN 0.72 0.75 0.83 Steganalyzer 0.68 0.71 0.82 As demonstrated in the experiments, the steganalyzer performs competitively against the GNCNN [10], and the generator also performs well against other steganographic techniques. The experimental data shows that on the one hand, the generated images are good at visual quality. On the other hand, the generated images are harder to detect, which shows the security of the generated images as covers. 5 Conclusion In this paper, we have proposed an adversarial steganography architecture with generative adversarial networks. On the basis of generative adversarial networks, we leverage the adversarial structure to form an effective steganographic method. Encouraging results are received from experiments conducted on the widely used datasets in comparison with several state-of-the-art techniques. We think it could be used for adaptive steganographic algorithm for social network in the future. We believe that, by exploring more steganography properties, better performance can be achieved. References 1. Abadi M, Andersen D G. Learning to Protect Communications with Adversarial Neural Cryptography[J]. 2016:15. 2. Holub V, Fridrich J. Designing steganographic distortion using directional filters[C]// IEEE International Workshop on Information Forensics and Security. IEEE, 2012:234-239. 3. Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain[J]. Eurasip Journal on Information Security, 2014, 2014(1):1. 4. Pevný T, Filler T, Bas P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography[M]// Information Hiding. Springer Berlin Heidelberg, 2010:161177. 5. Xu G, Wu H Z, Shi Y Q. Structural Design of Convolutional Neural Networks for Steganalysis[J]. IEEE Signal Processing Letters, 23(5):708-712, 2016. 11 6. Xu G, Wu H Z, Shi Y Q. Ensemble of CNNs for Steganalysis: An Empirical Study[C]// ACM Workshop on Information Hiding and Multimedia Security. ACM, 2016:103-107. 7. Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative Adversarial Networks[J]. Advances in Neural Information Processing Systems, 3:2672-2680, 2014. 8. Liu Z, Luo P, Wang X, et al. Deep Learning Face Attributes in the Wild[J]. pp. 3730-3738, 2014. 9. Abadi M, Agarwal A, Barham P, et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems[J]. 2016. 10. Yinlong Qian, Jing Dong, WeiWang, and Tieniu Tan. Deep learning for steganalysis via convolutional neural networks. In IS&T/SPIE Electronic Imaging, pp. 94090J–94090J. International Society for Optics and Photonics, 2015a. 11. Browne M, Ghidary S S, Mayer N M. Convolutional Neural Networks for Image Processing with Applications in Mobile Robotics[J]. Studies in Computational Intelligence, 2008, 83:327-349. 12. Mielikainen, Jarno. Lsb matching revisited. IEEE signal processing letters, 13(5):285–287, 2006. 13. Andrew D Ker. Resampling and the detection of lsb matching in color bitmaps. In Eletronic Imaging 2005, pp. 1–15. International Society for Optics and Photonics, 2005. 14. Arjovsky M, Chintala S, Bottou L. Wasserstein GAN[J]. 2017. 15. Radford, Alec, Metz, Luke, and Chintala, Soumith. Unsupervised representation learning with deep convolutional generative adversarial networks. CoRR, abs/1511.06434, 2015. URL http://arxiv.org/abs/1511.06434. 16. Odena A, Olah C, Shlens J. Conditional Image Synthesis With Auxiliary Classifier GANs[J]. 2016. 17. Chen X, Duan Y, Houthooft R, et al. InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets[J]. 2016. 18. Reed S, Akata Z, Yan X, et al. Generative Adversarial Text to Image Synthesis[J]. 2016:1060-1069. 19. Shi H, Dong J, Wang W, et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks[C]. 2017.
1
A NEW ROBUST FREQUENCY DOMAIN ECHO CANCELLER WITH CLOSED-LOOP LEARNING RATE ADAPTATION Jean-Marc Valin and Iain B. Collings arXiv:1602.08609v1 [cs.SD] 27 Feb 2016 CSIRO ICT Centre, Sydney, Australia ([email protected]) ABSTRACT One of the main difficulties in echo cancellation is the fact that the learning rate needs to vary according to conditions such as double-talk and echo path change. Several methods have been proposed to vary the learning. In this paper we propose a new closed-loop method where the learning rate is proportional to a misalignment parameter, which is in turn estimated based on a gradient adaptive approach. The method is presented in the context of a multidelay block frequency domain (MDF) echo canceller. We demonstrate that the proposed algorithm outperforms current popular double-talk detection techniques by up to 6 dB. Fig. 1. Block diagram of echo cancellation system. 1. INTRODUCTION In any echo cancellation system, the presence of near end speech (double-talk) tends to make the adaptive filter diverge. To counter the effect, robust echo cancellers require adjustment of the learning rate to account for the presence of doubletalk in the signal. Most echo cancellation algorithms attempt to explicitly detect double-talk [1] conditions and then react by freezing the coefficients of the adaptive filter (setting the learning rate to zero). Reliable double-talk detection is a difficult problem and sometimes it is not clear what should be considered as double-talk, especially in an acoustic echo cancellation context with stationary background noise. In previous work [2], we proposed a new approach to make echo cancellation more robust to double-talk. Instead of attempting to explicitly detect double-talk conditions, a continuous learning rate was used. The learning rate depends on a misalignment estimate, which is obtained through a linear regression. While the technique gives good results, the estimation of the misalignment remains a difficult problem. In this paper, we propose a new approach where the misalignment is estimated in closed-loop based on a gradient adaptive approach. This closed-loop technique is applied to the block frequency domain (MDF) adaptive filter [3] and shows a significant improvement over previous approaches. c 2007 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. In Section 2, we discuss the optimal learning rate in presence of noise. Section 3 introduces the multidelay frequency domain (MDF) adaptive filter. In Section 4, we propose a gradient adaptive technique for adjusting the learning rate of the MDF algorithm. Experimental results and a discussion are presented in Section 5 and Section 6 concludes this paper. 2. OPTIMAL LEARNING RATE IN THE PRESENCE OF DOUBLE-TALK In the acoustic echo cancellation context illustrated in Fig. 1, the speech signal x (n) received from the far end is played into a loudspeaker. The microphone signal d (n) captures both the convoluted far end speech y (n) and the near end noisy speech v (n). The adaptive filter attempts to estimate the impulse response ĥ (n) to be as close as possible to the real impulse response h (n). The estimated echo ŷ (n) is subtracted from d (n), so the output signal e (n) contains both double-talk v (n) and residual echo r (n) = y (n) − ŷ (n). The conventional approach to double-talk robustness consists of setting the learning rate to zero when double-talk is detected. Double-talk detectors [1] are thus an important aspect of the approach. Unfortunately, they are sometimes unreliable, especially in acoustic echo cancellation context when background noise is present. In this paper, we investigate continuous learning rates that do not depend on a binary doubletalk decision. Whenever an adaptive filter is not perfectly adjusted, its residual signal r (n) can be used to gain better information about the exact (time-varying) filter weights h (n). However, the amount of information about h (n) present in e (n) decreases with the amount of noise and near end speech v(n). In the case of the normalised least mean square (NLMS) filter, it means that the stochastic gradient becomes less reliable when the noise increases or when the filter misalignment decreases (as the filter converges). The theoretical optimal learning rate is approximately equal to the residual-to-error ratio [2]:  E r2 (n) µopt (n) ≈ (1) E {e2 (n)} where r (n) = y (n) − ŷ (n) is the (unknown) residual echo and e (n) is the error signal. One possible method to vary the learning rate µ (n) would be to use the generalized normalized gradient descent (GNGD) algorithm [4], which includes the NLMS learning rate:  µ0 E x2 (n) (2) µ (n) = E {x2 (n)} + ǫ (n) where ǫ (n) is adapted based on the NLMS stochastic gradient behaviour. To examine ǫ (n) more closely, it is reasonable to surmise that (2) eventually converges to the optimal learning rate defined by (1). Assuming steady state behaviour (ǫ (n) is stable) and µ0 = 1, we find that:   E r2 (n) E r2 (n) ≈ (3) E {r2 (n)} + γ (n) ǫ (n) E {e2 (n)}  2  2 where  2 γ = E r (n)2 /E x (n)  . Knowing that we have E e (n) = E r (n) + E v 2 (n) , we find the relation ǫ (n) ≈ E v 2 (n) /γ (n). In other words, the gradientadaptive parameter ǫ (n) is approximately proportional to the variance of the near-field signal and independent of the farfield signal. Because ǫ (n) can only be adapted slowly  over time, it is clear that (2) implicitly assumes that E v 2 (n) also varies slowly. While this is a reasonable assumption in applications where the background noise is constant or slowly varying, the assumption does not hold for acoustic echo cancellation, where double-talk can start or stop at any time. In previous work [2], we proposed to use (1) directly to  adapt the learning rate. While E e2 (n) can  easily be estimated, the estimation of the residual echo E r2 (n) is difficult because one does not have access to the real filter coefficients. One reasonable assumption we make is that:    E r2 (n) = η (n) E y 2 (n) ≈ η (n) E ŷ 2 (n) (4) where η (n) is the normalised filter misalignment (or the inverse of the echo return loss enancement) and is easier to estimate because it is assumed to vary slowly as a function of time. Although direct estimation of η (n) through linear regression can lead to good results, estimating η (n) remains a difficult problem. In this paper we propose to apply a gradient adaptive approach to the problem of estimating η (n). 3. THE MDF ALGORITHM In this paper, we consider the special case of the multidelay block frequency domain (MDF) adaptive filter [3]. The MDF algorithm in matrix form is detailed here for the sake of clarity. Let N be the MDF block size, K be the number of blocks and F denote the 2N × 2N Fourier transform matrix, we denote the frequency-domain signals for frame ℓ as: T (5) e (ℓ) = F [01×N , e (ℓN ) , . . . , e (ℓN + N − 1)] o n T xk(ℓ) = diag F[x((ℓ−k−1)N ),. . . ,x((ℓ−k+1)N −1)] (6)  X (ℓ) = x0 , x1 , . . . , xK−1  (7) d (ℓ) = F [01×N , d (ℓN ) , . . . , d (ℓN + N − 1)] T (8) The MDF algorithm is then expressed in matrix form as: e (ℓ) = d (ℓ) − y (ℓ) (9) ŷ (ℓ) = G1 X (ℓ) ĥ (ℓ) (10) ĥ (ℓ + 1) = ĥ (ℓ) + G2 µ (ℓ) ∇ĥ (ℓ) (11) H ∇ĥ (ℓ) = Φ−1 xx (ℓ) X (ℓ) e (ℓ) (12) where Φxx (ℓ) is the diagonal normalisation matrix as computed in [3], G1 and G2 are the constraint matrices:   0N ×N 0N ×N F−1 (13) G1 = F 0N ×N IN ×N   IN ×N 0N ×N F−1 (14) G̃2 = F 0N ×N 0N ×N o n (15) G2 = diag G̃2 , G̃2 , . . . , G̃2 and µ (ℓ) is the 2KN × 2KN diagonal learning rate matrix: n T o (16) µ (ℓ) = diag µT (ℓ) , µT (ℓ) , . . . , µT (ℓ) µ (ℓ) = [µ0 (ℓ) , µ1 (ℓ) , . . . , µ2N −1 (ℓ)] T (17) If µk (ℓ) = µo , we have the standard MDF algorithm. 4. GRADIENT-ADAPTIVE LEARNING RATE In [2], we proposed to use the frequency-dependent learning rate:   2 (ℓ) ŷ k   (18) µk (ℓ) = min η (ℓ) 2 , µ0  |ek (ℓ)| where η(ℓ) is a direct estimation of the normalised misalignment exploiting the non-stationarity of the signals and using linear regression between the power spectra of the estimated echo and the output signal. The motivation behind this formulation is that it factors the residual echo estimation into a slowly-evolving (but unfortunately difficult to estimate) normalised misalignment η(ℓ) and a rapidly-evolving (but easy to 2 estimate) term far-end term yk (ℓ) . The learning rate can thus react quickly to double-talk even if the estimation of the residual echo (through the misalignment estimate) requires a longer time period. A remaining problem with that approach is that η(ℓ) is difficult to estimate and the algorithm does not know whether its estimate of η(ℓ) is too low or too high. In this sense, the η(ℓ) update in [2] is an open-loop estimate. 4.1. Adaptation algorithm In this paper we bypass the difficulty of estimating η(ℓ) directly and instead propose a closed-loop gradient adaptive estimation of η(ℓ). The parameter η(ℓ) is no longer an estimate of the normalised misalignment, but is instead adapted in closed-loop in such a way as to maximise convergence of the adaptive filter. As with other gradient-adaptive methods [5, 4] we compute the derivative of the mean square error E (ℓ) = eH (ℓ) e (ℓ), this time with respect to η (ℓ − 1), using the chain derivation rule: ∂E (ℓ) ∂E (ℓ) ∂e (ℓ) ∂ŷ (ℓ) ∂ ĥ (ℓ) ∂µ (ℓ − 1) = ∂η(ℓ−1) ∂e (ℓ) ∂ŷ (ℓ) ∂ ĥ (ℓ) ∂µ (ℓ − 1) ∂η (ℓ − 1) (19) = −e ≈− H H (ℓ)G1 X(ℓ)G2 Φ−1 xx (ℓ)X (ℓ) e(ℓ) ŷk (ℓ) ŷk (ℓ) 2 2 |ek (ℓ)| (20) 2 |ek (ℓ)|2 H ∇ĥ (ℓ) Φxx ∇ĥ (ℓ) (21) We propose to use a filtered version of the gradient with a multiplicative update, similar to the general approch in [6], and to drop the normalisation term Φxx . This results in the new gradient-based learning rate adaptation rule:  n o  2 H (ℓ) ℜ ψ (ℓ) ∇ ĥ (ℓ) ŷ k  n o  η (ℓ + 1) = η (ℓ) expρ  2P ∗ |ek (ℓ)| k ℜ ψk (ℓ) ∇ĥk (ℓ) (22) ψ (ℓ + 1) = αψ (ℓ) + ∇ĥ (ℓ) (23) where ρ is the step size and α controls the gradient smoothing (typically ρ = 1, α = 0.9). An intuitive interpretation for the update equation in (22) is that when the learning rate is too high (because η (ℓ)is too high), the gradient oscillates, causing η (ℓ) to decrease. On the other hand, when the learning rate is too low (perhaps because the echo path has changed) the gradient keeps pointing in the same direction and η (ℓ) increases. Also, because of |ŷ (ℓ)|2 the k 2 factor, we can apply (22) at each frame regardless |ek (ℓ)| of double-talk or even when no far-end speech is present (in 2 which case ŷk (ℓ) = 0 anyway). The last aspect that needs to be addressed is the initial condition. When the filter is initialised, all the weights are set to zero, which means that ŷ (ℓ) = 0 and no adaptation can take place in (18) and (22). In order to bootstrap the adaptation process, the learning rate µk (ℓ) is set to a fixed constant (we use µk (ℓ) = 0.25) for a short time equal to twice the filter length (only non-zero portions of signal x(n) are taken into account). This procedure is only necessary when the filter is initialised and is not required in case of echo path change. 4.2. Algorithm behaviour Here we show that the adaptive learning rate described above is able to deal with both double-talk and echo path change without explicit modelling. From (18) we can see that when 2 double-talk occurs, the denominator |ek (ℓ)| rapidly increases, causing an instantaneous decrease in the learning rate that lasts only as long as the double-talk period lasts. In the case of background noise, the learning rate depends on both the presence of an echo signal as well as the misalignment estimate. As the filter misalignment becomes smaller, the learning rate also becomes smaller. One major difficulty involved in double-talk detection is the need to distinguish between double-talk and echo path change since both cause a sudden increase in the filter error signal. This distinction is made implicitly in the gradientbased adaptation of η(ℓ). When the echo path changes, ∇ĥ (ℓ) starts pointing steadily in the same direction, thus significantly increasing η(ℓ), which is a clear sign that the filter is no longer properly adapted. In gradient adaptive methods [5, 6], the implicit assumption is that both the near-end and the far-end signals are nearly stationary. We have shown that the GNGD algorithm [4] only requires the near-end signal to be nearly stationary. In our new proposed method, both signals can be non-stationary, which is a requirement for double-talk robustness. 5. RESULTS AND DISCUSSION The proposed system is evaluated in an acoustic echo cancellation context with background noise, double-talk and a change in the echo path (16 seconds into a 32-second recording). The two impulse responses used are 1024-sample long and measured from real recordings in a small office room with both the microphone and the loudspeaker resting on a desk. The proposed algorithm is compared to our previous work [2], to the normalised cross-correlation (NCC) method [1] and to a baseline with no double-talk detection (no DTD). The optimal threshold found for the NCC algorithm was 0.35 with a learning rate µ = 0.25. It was found that choosing µmax = 0.75 as the upper bound on the learning rate gave good results for the proposed algorithm. In practise, µmax has little impact 25 4.5 proposed previous [2] NCC [1] no DTD 20 4 less double−talk more double−talk PESQ LQO-MOS ERLE (dB) 3.5 15 10 3 2.5 2 proposed previous [2] NCC [1] no DTD no cancellation 5 1.5 0 -20 less double−talk -15 -10 more double−talk -5 0 5 10 Near-end-to-far-end ratio (dB) 15 20 1 -20 -15 -10 -5 0 5 10 Near-end-to-far-end ratio (dB) 15 20 Fig. 2. Steady-state ERLE (first two seconds of adaptation not considered) as a function of the near-end to far-end ratio. Fig. 3. PESQ objective listening quality measure (LQOMOS) as a function of the near-end to far-end ratio. on the algorithm because the gradient-based adaptation would compensate for a higher value of µmax by reducing η (ℓ). The GNGD algorithm [4] is not included in the evaluation because it is not intended for applications where the near-field signal is highly non-stationary and it was not possible to obtain better results than the baseline. Fig. 2 shows the average steady-state (the first 2 seconds of adaptation are not considered) ERLE for the test data with different ratios of near-end signal and echo. Clearly, the proposed algorithm performs better than both our previous work (2 dB average improvement) and the NCC algorithm (6 dB average improvement). The perceptual quality of the output speech signal is also evaluated by comparing it to the near field signal v(n) using the Perceptual Evaluation of Speech Quality (PESQ) ITU-T recommendations P.862 [7]. The perceptual quality of the speech shown in Fig. 3 is evaluated based on the entire file, including the adaptation time. It is again clear that the proposed algorithm performs better than all other algorithms. It is worth noting that the reason why the results in Fig. 2 improve with double-talk (unlike in Fig. 2) is that the signal of interest is the double-talk v(n), so the higher the double-talk the less (relative) echo in the input signal. algorithm, we believe future work could apply it to other adaptive filtering algorithms, including the NLMS algorithm. 7. REFERENCES [1] J. Benesty, D.R. Morgan, and J.H. Cho, “A new class of doubletalk detectors based on cross-correlation,” IEEE Trans. on Speech and Audio Processing, vol. 8, no. 2, pp. 168–172, 2000. [2] J.-M. Valin, “On adjusting the learning rate in frequency domain echo cancellation with double-talk,” IEEE Trans. on Audio, Speech and Language Processing, 2007. [3] J.-S. Soo and K.K. Pang, “Multidelay block frequency domain adaptive filter,” IEEE Trans. ASSP, vol. 38, no. 2, pp. 373–376, 1990. [4] D.P. Mandic, “A generalized normalized gradient descent algorithm,” IEEE Signal Processing Letters, vol. 11, no. 2, pp. 115–118, 2004. [5] V.J. Mathews and Z. Xie, “A stochastic gradient adaptive filter with gradient adaptive step size,” IEEE Trans. on Signal Processing, vol. 41, pp. 2075–2087, 1993. 6. CONCLUSION We have demonstrated a novel method for adjusting the learning rate of frequency-domain adaptive filters based on a gradient adaptive estimation of the current misalignment. The proposed method performs better than a double-talk detector and previous work using direct estimation of the misalignment. In addition, the closed-loop gradient adaptive estimation of η (ℓ) makes the algorithm conceptually simple and means that there are very few important parameters to be tuned. Although the proposed algorithm is presented in the context of the MDF [6] W.-P. Ang and B. Farhang-Boroujeny, “A new class of gradient adaptive step-size LMS algorithms,” IEEE Trans. on Signal Processing, vol. 49, no. 4, pp. 805–810, 2001. [7] ITU-T, P.862: Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs, 2001.
3
Reconfiguring spanning and induced subgraphs∗ Tesshu Hanaka† Takehiro Ito‡ Naomi Nishimura§ Haruka Mizuta‡ Vijay Subramanya§ Benjamin Moore§ Akira Suzuki‡ arXiv:1803.06074v1 [cs.DS] 16 Mar 2018 Krishna Vaidyanathan§ March 19, 2018 Abstract Subgraph reconfiguration is a family of problems focusing on the reachability of the solution space in which feasible solutions are subgraphs, represented either as sets of vertices or sets of edges, satisfying a prescribed graph structure property. Although there has been previous work that can be categorized as subgraph reconfiguration, most of the related results appear under the name of the property under consideration; for example, independent set, clique, and matching. In this paper, we systematically clarify the complexity status of subgraph reconfiguration with respect to graph structure properties. 1 Introduction Combinatorial reconfiguration [6, 5, 11] studies the reachability/connectivity of the solution space formed by feasible solutions of an instance of a search problem. More specifically, consider a graph such that each node in the graph represents a feasible solution to an instance of a search problem P , and there is an edge between nodes representing any two feasible solutions that are “adjacent,” according to a prescribed reconfiguration rule A; such a graph is called the reconfiguration graph for P and A. In the reachability problem for P and A, we are given source and target solutions to P , and the goal is to determine whether or not there is a path between the two corresponding nodes in the reconfiguration graph for P and A. We call a desired path a reconfiguration sequence between source and target solutions, where a reconfiguration step from one solution to another corresponds to an edge in the path. 1.1 Subgraph reconfiguration In this paper, we use the term subgraph reconfiguration to describe a family of reachability problems that take subgraphs (more accurately, vertex subsets or edge subsets of a given graph) as feasible solutions. Each of the individual problems in the family can be defined by specifying the node set and the edge set of a reconfiguration graph, as follows. (We use the terms node for reconfiguration graphs and vertex for input graphs.) Nodes of a reconfiguration graph. The set of feasible solutions (i.e., subgraphs) can be defined in terms of a specified graph structure property Π which subgraphs must satisfy; for example, “a graph is a tree,” “a graph is edgeless (an independent set),” and so on. By the choice of how ∗ This work is partially supported by JST ERATO Grant Number JPMJER1201, JST CREST Grant Number JPMJCR1402, and JSPS KAKENHI Grant Numbers JP16K00004 and JP17K12636, Japan. Research by Canadian authors is supported by the Natural Science and Engineering Research Council of Canada. † Kyushu University, Fukuoka, Japan, [email protected] ‡ Tohoku University, Sendai, Japan, [email protected], [email protected], [email protected] § University of Waterloo, Waterloo, Canada, {brmoore, nishi, v7subram, kvaidyan}@uwaterloo.ca 1 Table 1: Subgraph representations and variants Subgraph representations Variant names Known reachability problems edge subset edge spanning tree [6] matching [6, 10], and b-matching [10] clique [7] independent set [6, 8] vertex subset induced induced forest [9] induced bipartite [9] induced tree [12] spanning clique [7] Es = E0 E1 E2 E3 = Et Figure 1: A reconfiguration sequence hE0 , E1 , E2 , E3 i in the edge variant under the TJ rule (also under the TS rule) with the property “a graph is a path,” where the edges forming solutions are depicted by thick lines. to represent subgraphs, each specific problem in the family can be categorized into one of three variants. (See also Table 1.) If a subgraph is represented as an edge subset, which we will call the edge variant, then the subgraph formed (induced) by the edge subset must satisfy Π. For example, Figure 1 illustrates four subgraphs represented as edge subsets, where Π is “a graph is a path.” On the other hand, if a subgraph is represented as a vertex subset, we can opt either to require that the subgraph induced by the vertex subset satisfies Π or that the subgraph induced by the vertex subset contains at least one spanning subgraph that satisfies Π; we will refer to these as the induced variant and spanning variant, respectively. For example, if Π is “a graph is a path,” then in the induced variant, the vertex subset must induce a path, whereas in the spanning variant, the vertex subset is feasible if its induced subgraph contains at least one Hamiltonian path. Figure 2 illustrates feasible vertex subsets of the induced variant and spanning variant. In the figure, the vertex subset V1′ is feasible in the spanning variant, but is not feasible in the induced variant, because it contains a spanning path but does not induce a path. As can be seen by this simple example, in the spanning variant, we need to pay attention to the additional complexity of finding a spanning subgraph and the complications resulting from the fact that the subgraph induced by the vertex subset may contain more than one spanning subgraph which satisfies Π. Edges of a reconfiguration graph. Since we represent a feasible solution by a set of vertices (or edges) in any variant, we can consider that tokens are placed on each vertex (resp., edge) in the feasible solution. Then, in this paper, we mainly deal with the two well-known reconfiguration rules, called the token-jumping (TJ) [8] and token-sliding (TS) rules [2, 4, 8]. In the former, a token can move to any other vertex (edge) in a given graph, whereas in the latter it can move only to an adjacent vertex (adjacent edge, that is sharing a common vertex.) For example, Figure 1 and Figure 2 illustrate reconfiguration sequences under the TJ rule for each variant. Note that the sequence in Figure 1 can also be considered as a sequence under the TS rule. In the reconfiguration graph, two nodes are adjacent if and only if one of the two corresponding solutions can be obtained from the other one by a single move of one token that follows the specified reconfiguration rule. Therefore, all nodes in a connected component of the reconfiguration graph represent subgraphs having the same number of vertices (edges). We note in passing that since in most cases we wish to retain the same number of vertices and/or edges, we rarely use the token-addition-and-removal (TAR) rule [6, 8], where we can add or remove a single token at a time, for subgraph reconfiguration problems. 2 Vs = V0 V1 V2 V3 V4 = Vt (a) Induced variant Vs = V0’ V1’ V2’ = Vt (b) Spanning variant Figure 2: Reconfiguration sequences hV0 , V1 , V2 , V3 , V4 i in the induced variant under the TJ rule and hV0′ , V1′ , V2′ i in the spanning variant under the TJ rule with the property “a graph is a path,” where the vertices forming solutions are depicted by colored circles, and the subgraphs satisfying the property by thick lines. 1.2 Previous work Although there has been previous work that can be categorized as subgraph reconfiguration, most of the related results appear under the name of the property Π under consideration. Accordingly, we can view reconfiguration of independent sets [6, 8] as the induced variant of subgraph reconfiguration such that the property Π is “a graph is edgeless.” Other examples can be found in Table 1. We here explain only known results which are directly related to our contributions. Reconfiguration of cliques can be seen as both the spanning and the induced variant; the problem is PSPACE-complete under any rule, even when restricted to perfect graphs [7]. Indeed, for this problem, the rules TAR, TJ, and TS have all been shown to be equivalent from the viewpoint of polynomial-time solvability. It is also known that reconfiguration of cliques can be solved in polynomial time for several well-known graph classes [7]. Wasa et al. [12] considered the induced variant under the TJ and TS rules with the property Π being “a graph is a tree.” They showed that this variant under each of the TJ and TS rules is PSPACE-complete, and is W[1]-hard when parameterized by both the size of a solution and the length of a reconfiguration sequence. They also gave a fixed-parameter algorithm when parameterized by both the size of a solution and the maximum degree of an input graph, under both the TJ and TS rules. In closely related work, Mouawad et al. [9] considered the induced variants of subgraph reconfiguration under the TAR rule with the properties Π being either “a graph is a forest” or “a graph is bipartite.” They showed that these variants are W[1]-hard when parameterized by the size of a solution plus the length of a reconfiguration sequence. 1.3 Our contributions In this paper, we study the complexity of subgraph reconfiguration under the TJ and TS rules. (Our results are summarized in Table 2, together with known results, where an (i, j)-biclique is a complete bipartite graph with the bipartition of i vertices and j vertices.) As mentioned above, because we consider the TJ and TS rules, it suffices to deal with subgraphs having the same number of vertices or edges. Subgraphs of the same size may be isomorphic for certain properties Π, such as “a graph is a path” and “a graph is a clique,” because there is only one choice of a path or a clique of a particular size. On the other hand, for the property “a graph is a tree,” there are several choices of trees of a particular size. (We will show an example in Section 3 with Figure 4.) As shown in Table 2, we systematically clarify the complexity of subgraph reconfiguration for several fundamental graph properties. In particular, we show that the edge variant under the TJ rule is computationally intractable for the property “a graph is a path” but tractable for the 3 Property Π path cycle tree Table 2: Previous and new results Edge Induced variant variant NP-hard (TJ) PSPACE-c. (TJ, TS) [Theorem 2] [Theorems 7, 9] P (TJ, TS) PSPACE-c. (TJ, TS) [Theorem 3] [Theorems 8, 9] P (TJ) PSPACE-c. (TJ, TS) [Theorem 6] [12] (i, j)-biclique P (TJ, TS) [Theorem 5] clique P (TJ, TS) [Theorem 4] diameter two any property XP for solution size (TJ, TS) [Theorem 1] PSPACE-c. for i = j (TJ) PSPACE-c. for fixed i (TJ) [Corollary 1, Theorem 12] PSPACE-c. (TJ, TS) [7] PSPACE-c. (TS) [Theorem 15] XP for solution size (TJ, TS) [Theorem 1] Spanning variant PSPACE-c. (TJ, TS) [Theorems 7, 9] PSPACE-c. (TJ, TS) [Theorems 8, 9] P (TJ) PSPACE-c. (TS) [Theorems 11, 10] NP-hard for i = j (TJ) P for fixed i (TJ) [Theorems 13, 14] PSPACE-c. (TJ, TS) [7] PSPACE-c. (TS) [Theorem 15] XP for solution size (TJ, TS) [Theorem 1] property “a graph is a tree.” This implies that the computational (in)tractability does not follow directly from the inclusion relationship of graph classes required as the properties Π; one possible explanation is that the path property implies a specific graph, whereas the tree property allows several choices of trees, making the problem easier. 1.4 Preliminaries Although we assume throughout the paper that an input graph G is simple, all our algorithms can be easily extended to graphs having multiple edges. We denote by (G, Vs , Vt ) an instance of a spanning variant or an induced variant whose input graph is G and source and target solutions are vertex subsets Vs and Vt of G. Similarly, we denote by (G, Es , Et ) an instance of the edge variant. We may assume without loss of generality that |Vs | = |Vt | holds for the spanning and induced variants, and |Es | = |Et | holds for the edge variant; otherwise, the answer is clearly no since under both the TJ and TS rules, all solutions must be of the same size. 2 General algorithm In this section, we give a general XP algorithm when the size of a solution (that is, the size of a vertex or edge subset that represents a subgraph) is taken as the parameter. For notational convenience, we simply use element to represent a vertex (or an edge) for the spanning and induced variants (resp., the edge variant), and candidate to represent a set of elements (which does not necessarily satisfy the property Π.) Furthermore, we define the size of a given graph as the number of elements in the graph. Theorem 1. Let Π be any graph structure property, and let f (k) denote the time to check if a candidate of size k satisfies Π. Then, all of the spanning, induced, and edge variants under the TJ or TS rules can be solved in time O(nk+1 k + nk f (k)), where n is the size of a given graph and k is the size of a source (and target) solution. Furthermore, a shortest reconfiguration sequence between source and target solutions can be found in the same time bound, if it exists. Proof. Our claim is that the reconfiguration graph can be constructed in the stated time. Since a given source solution is of size k, it suffices to deal only with candidates of size exactly k. For 4 Ps Pt e1s s1 ens s2 sn e1t t1 G sn+1 tn e1 x t en+1 ent t2 s en+1 e2 v e3 s t w tn+1 Figure 3: Reduction to the edge variant under the TJ rule for the property “a graph is a path.” a given graph, the total number of possible candidates of size k is O(nk ). For each candidate, we can check in time f (k) whether it satisfies Π. Therefore, we can construct the node set of the reconfiguration graph in time O(nk f (k)). We then obtain the edge set of the reconfiguration graph. Notice that each node in the reconfiguration graph has O(nk) adjacent nodes, because we can replace only a single element at a time. Therefore, we can find all pairs of adjacent nodes in time O(nk+1 k). In this way, we can construct the reconfiguration graph in time O(nk+1 k + nk f (k)) in total. The reconfiguration graph consists of O(nk ) nodes and O(nk+1 k) edges. Therefore, by breadthfirst search starting from the node representing a given source solution, we can determine in time O(nk+1 k) whether or not there exists a reconfiguration sequence between two nodes representing the source and target solutions. Notice that if a desired reconfiguration sequence exists, then the breadth-first search finds a shortest one. 3 Edge variants In this section, we study the edge variant of subgraph reconfiguration for the properties of being paths, cycles, cliques, bicliques, and trees. We first consider the property “a graph is a path” under the TJ rule. Theorem 2. The edge variant of subgraph reconfiguration under the TJ rule is NP-hard for the property “a graph is a path.” Proof. We give a polynomial-time reduction from the Hamiltonian path problem. Recall that a Hamiltonian path in a graph G is a path that visits each vertex of G exactly once. Given a graph G and two vertices s, t ∈ V (G) of G, the NP-complete problem Hamiltonian path is to determine whether or not G has a Hamiltonian path which starts from s and ends in t [3]. For an instance (G, s, t) of Hamiltonian path, we construct a corresponding instance (G′ , Es , Et ) of our problem, as follows. (See also Figure 3.) Let n = |V (G)|. We first add two new vertices v and x to G with two new edges e1 = xv and e2 = vs. We then add two paths Ps = hs1 , s2 , . . . , sn+1 , xi and Pt = ht1 , t2 , . . . , tn+1 , xi, where s1 , s2 , . . . , sn+1 and t1 , t2 , . . . , tn+1 are distinct new vertices. Each of Ps and Pt consists of n+1 edges; we denote by es1 , es2 , . . . , esn+1 the edges s1 s2 , s2 s3 , . . . , sn+1 x in Ps , respectively, and by et1 , et2 , . . . , etn+1 the edges t1 t2 , t2 t3 , . . . , tn+1 x in Pt , respectively. We finally add a new vertex w with an edge e3 = tw, completing the construction of G′ . We then set Es = {es1 , es2 , . . . , esn+1 , e1 , e2 } and Et = {et1 , et2 , . . . , etn+1 , e1 , e2 }; these edge subsets clearly form paths in G′ . We have thus constructed our corresponding instance (G′ , Es , Et ) in polynomial time. We now prove that an instance (G, s, t) of Hamiltonian path is a yes-instance if and only if the corresponding instance (G′ , Es , Et ) is a yes-instance. To prove the only-if direction, we first suppose that G has a Hamiltonian path P starting from s and ending in t. Then, we construct an actual reconfiguration sequence from Es to Et using the edges in P . Notice that P consists of n − 1 edges. Thus, we first move the n − 1 edges es1 , es2 , . . . , esn−1 in Es to the edges in P one by one, and then move esn to e3 . Next, we move esn+1 to etn+1 , and then move the edges in E(P ) ∪ {e3 } to etn , etn−1 , . . . , et1 one by one. By the construction of G′ , we know that each of the intermediate edge subsets forms a path in G′ , as required. 5 We now prove the if direction by supposing that there exists a reconfiguration sequence hEs = E0 , E1 , . . . , Eℓ = Et i. Let Eq be the first edge subset in the sequence such that E(Pt ) ∩ Eq 6= ∅; we claim that Eq contains a Hamiltonian path in G. First, notice that the edge in E(Pt ) ∩ Eq is etn+1 ; otherwise the subgraph formed by Eq is disconnected. Since |Eq | = |Es | = n + 3 and |E(Ps )| = n + 1, we can observe that Eq contains no edge in Ps ; otherwise the degree of x would be three, or Eq would form a disconnected subgraph. Therefore, the n + 2 edges in Eq \ {etn+1 } must be chosen from E(G) ∪ {e1 , e2 , e3 }. Since |V (G)| = n and Eq must form a path in G′ , we know that Eq \ {etn+1 } consists of e1 , e2 , e3 and n − 1 edges in G. Thus, Eq \ {etn+1, e1 , e2 , e3 } forms a Hamiltonian path in G starting from s and ending in t, as required. We now consider the property “a graph is a cycle,” as follows. Theorem 3. The edge variant of subgraph reconfiguration under each of the TJ and TS rules can be solved in linear time for the property “a graph is a cycle.” Proof. Let (G, Es , Et ) be a given instance. We claim that the reconfiguration graph is edgeless, in other words, no feasible solution can be transformed at all. Then, the answer is yes if and only if Es = Et holds; this condition can be checked in linear time. Let E ′ be any feasible solution of G, and consider a replacement of an edge e− ∈ E ′ with an edge e+ other than e− . Let u, v be the endpoints of e− . When we remove e− from E ′ , the resulting edge subset E ′ \{e} forms a path whose ends are u and v. Then, to ensure that the candidate forms a cycle, we can choose only e− = uv as e+ . This contradicts the assumption that e+ 6= e− . The same arguments hold for the property “a graph is a clique,” and we obtain the following theorem. We note that, for this property, both induced and spanning variants (i.e., when solutions are represented by vertex subsets) are PSPACE-complete under any rule [7]. Theorem 4. The edge variant of subgraph reconfiguration under each of the TJ and TS rules can be solved in linear time for the property “a graph is a clique.” We next consider the property “a graph is an (i, j)-biclique,” as follows. Theorem 5. The edge variant of subgraph reconfiguration under each of the TJ and TS rules can be solved in polynomial time for the property “a graph is an (i, j)-biclique” for any pair of positive integers i and j. Proof. We may assume without loss of generality that i ≤ j holds. We prove the theorem in the following three cases: Case 1: i = 1 and j ≤ 2; Case 2: i, j ≥ 2; and Case 3: i = 1 and j ≥ 3. We first consider Case 1, which is the easiest case. In this case, any (1, j)-biclique has at most two edges. Therefore, by Theorem 1 we can conclude that this case is solvable in polynomial time. We then consider Case 2. We show that (G, Es , Et ) is a yes-instance if and only if Es = Et holds. To do so, we claim that the reconfiguration graph is edgeless, in other words, no feasible solution can be transformed at all. To see this, because i, j ≥ 2, notice that the removal of any edge e in an (i, j)-biclique results in a bipartite graph with the same bipartition of i vertices and j vertices. Therefore, to obtain an (i, j)-biclique by adding a single edge, we must add back the same edge e. We finally deal with Case 3. Notice that a (1, j)-biclique is a star with j leaves, and its center vertex is of degree j ≥ 3. Then, we claim that (G, Es , Et ) is a yes-instance if and only if the center vertices of stars represented by Es and Et are the same. The if direction clearly holds, because we can always move edges in Es \ Et into ones in Et \ Es one by one. We thus prove the only-if direction; indeed, we prove the contrapositive, that is, the answer is no if the center vertices of stars represented by Es and Et are different. Consider such a star Ts formed by Es . Since Ts has j ≥ 3 leaves, the removal of any edge in Es results in a star having j − 1 ≥ 2 leaves. Therefore, to ensure that each intermediate solution is a star with j leaves, we can add only an edge of G which is incident to the center of Ts . Thus, we cannot change the center vertex. 6 Es = E0 E1 E2 = Et Figure 4: Reconfiguration sequence hE0 , E1 , E2 i in the edge variant under the TJ rule with the property “a graph is a tree.” In this way, we have proved Theorem 5. Although Case 1 takes non-linear time, our algorithm can be easily improved (without using Theorem 1) so that it runs in linear time. We finally consider the property “a graph is a tree” under the TJ rule. As we have mentioned in the introduction, for this property, there are several choices of trees even of a particular size, and a reconfiguration sequence does not necessarily consist of isomorphic trees (see Figure 4). This “flexibility” of subgraphs may yield the contrast between Theorem 2 for the path property and the following theorem for the tree property. Theorem 6. The edge variant of subgraph reconfiguration under the TJ rule can be solved in linear time for the property “a graph is a tree.” Proof. Suppose that (G, Es , Et ) is a given instance. We may assume without loss of generality that |Es | = |Et | ≥ 2; otherwise |Es | = |Et | ≤ 1 holds, and hence the instance is trivially a yes-instance. We will prove below that any instance with |Es | = |Et | ≥ 2 is a yes-instance if and only if all the edges in Es and Et are contained in the same connected component of G. Note that this condition can be checked in linear time. We first prove the only-if direction of our claim. Since |Es | = |Et | ≥ 2 and subgraphs always must retain a tree structure (more specifically, they must be connected graphs), observe that we can exchange edges only in the same connected component of G. Thus, the only-if direction follows. To complete the proof, it suffices to prove the if direction of our claim. For notational convenience, for any feasible solution Ei we denote by Ti the tree represented by Ei , and by Vi the vertex set of Ti . In this direction, we consider the following two cases: (a) Vs ∩ Vt = ∅, and (b) Vs ∩ Vt 6= ∅. We consider case (a), that is, Vs ∩ Vt = ∅. Since Ts and Tt are contained in one connected component of G, there exists a path hv0 , v1 , . . . , vℓ i in G such that v0 ∈ Vs , vℓ ∈ Vt and vi ∈ / Vs ∪ Vt for all i ∈ {1, 2, . . . , ℓ − 1}. Since Ts is a tree, it has at least two degree-one vertices. Let vs be any degree-one vertex in Vs \ {v0 }, and let es be the leaf edge of Ts incident to vs . Then, we can exchange es with v0 v1 , and obtain another tree represented by the resulting edge subset (Es ∪ {v0 v1 }) \ {es }. By repeatedly applying this operation along the path hv1 , v2 , . . . , vℓ i, we can obtain a solution Ek such that Vk ∩ Vt = {vℓ } 6= ∅; this case will be considered below. We finally consider case (b), that is, Vs ∩ Vt 6= ∅. Consider the graph (Vs ∩ Vt , Es ∩ Et ). Then, (Vs ∩ Vt , Es ∩ Et ) is a forest, and let G′ = (V ′ , E ′ ) be a connected component (i.e., a tree) of (Vs ∩ Vt , Es ∩ Et ) whose edge set is of maximum size. We now prove that there is a reconfiguration sequence between Es and Et by induction on k = |Es \ E ′ | = |Et \ E ′ |. If k = 0, then Es = E ′ = Et and hence the claim holds. We thus consider the case where k > 0 holds. Since G′ is a proper subtree of Tt , there exists at least one edge et in Et \ E ′ such that one endpoint of et is contained in V ′ and the other is not. We claim that there exists an edge es in Es \ E ′ which can be moved into et , that is, the subgraph represented by the resulting edge subset (Es ∪ {et }) \ {es } forms a tree. If both endpoints of et are contained in Vs (not just V ′ ), Es ∪ {et } contains a cycle; let C ⊆ Es ∪ {et } be the edge set of the cycle. Since the subgraph Tt has no cycle, there exists at least one edge in C \ Et , and we choose one of them as es . On the other hand, if just one endpoint of et is contained in Vs , then we choose a leaf edge of Ts in Es \ E ′ as es . Note that there exists such a leaf edge since G′ is a proper subtree of Ts . From the choice of es and et , we know the subgraph represented by the resulting edge subset (Es ∪ {et }) \ {es } forms a tree; let Ek = (Es ∪ {et }) \ {es }. Furthermore, since Ek ∩ Et includes E ′ ∪ {et } and the subgraph formed by E ′ ∪ {et } is connected, the subgraph 7 G G s2 s1 s t t1 s1 t2 (a) s t t1 (b) Figure 5: Reductions for the properties (a) “a graph is a path,” and (b) “a graph is a cycle.” formed by Ek ∩ Et has a connected component whose edge set has size at least |E ′ | + 1. Therefore, we can conclude that Ek is reconfigurable into Et by the induction hypothesis. 4 Induced and spanning variants In this section, we deal with the induced and spanning variants where subgraphs are represented as vertex subsets. Most of our results for these variants are hardness results, except for Theorems 11 and 14. 4.1 Path and cycle In this subsection, we show that both induced and spanning variants under the TJ or TS rules are PSPACE-complete for the properties “a graph is a path” and “a graph is a cycle.” All proofs in this subsection make use of reductions that employ almost identical constructions. Therefore, we describe the detailed proof for only one case, and give proof sketches for the other cases. We give polynomial-time reductions from the shortest path reconfiguration problem, which can be seen as a subgraph reconfiguration problem, defined as follows [1]. For a simple, unweighted, and undirected graph G and two distinct vertices s, t of G, shortest path reconfiguration is the induced (or spanning) variant of subgraph reconfiguration under the TJ rule for the property “a graph is a shortest st-path.” Notice that there is no difference between the induced variant and the spanning variant for this property, because any shortest path in a simple graph forms an induced subgraph. This problem is known to be PSPACE-complete [1]. Let d be the (shortest) distance from s to t in G. For each i ∈ {0, 1, . . . , d}, we denote by Li ⊆ V (G) the set of vertices that lie on a shortest st-path at distance i from s. Therefore, we have L0 = {s} and Ld = {t}. We call each Li a layer. Observe that any shortest st-path contains exactly one vertex from each layer, and we can assume without loss of generality that G has no vertex which does not belong to any layer. We first give the following theorem. Theorem 7. For the property “a graph is a path,” the induced and spanning variants of subgraph reconfiguration under the TJ rule are both PSPACE-complete on bipartite graphs. Proof. Observe that these variants are in PSPACE. Therefore, we construct a polynomial-time reduction from shortest path reconfiguration. Let (G, Vs , Vt ) be an instance of shortest path reconfiguration. Since any shortest stpath contains exactly one vertex from each layer, we can assume without loss of generality that G has no edge joining two vertices in the same layer, that is, each layer Li forms an independent set in G. Then, G is a bipartite graph. From (G, Vs , Vt ), we construct a corresponding instance (G′ , Vs′ , Vt′ ) for the induced and spanning variants; note that we use the same reduction for both variants. Let G′ be the graph obtained from G by adding four new vertices s1 , s2 , t1 , t2 which are connected with four new edges s2 s1 , s1 s, tt1 , t1 t2 . (See Figure 5(a).) Note that G′ is also bipartite. 8 We then set Vs′ = Vs ∪ {s1 , s2 , t1 , t2 } and Vt′ = Vt ∪ {s1 , s2 , t1 , t2 }. Since each of Vs and Vt induces a shortest st-path in G, each of Vs′ and Vt′ is a feasible solution to both variants. This completes the polynomial-time construction of the corresponding instance. We now give the key lemma for proving the correctness of our reduction. Lemma 1. Let V ′ ⊆ V (G′ ) be any solution for the induced or spanning variant which is reachable by a reconfiguration sequence from Vs′ (or Vt′ ) under the TJ rule. Then, V ′ satisfies the following two conditions: (a) s2 , s1 , s, t, t1 , t2 ∈ V ′ ; and (b) V ′ contains exactly one vertex from each layer of G. Proof. We first prove that condition (a) is satisfied. Notice that both Vs′ and Vt′ satisfy this condition. Because V ′ is reconfigurable from Vs′ or Vt′ , it suffices to show that we cannot move any of s2 , s1 , s, t, t1 , t2 in a reconfiguration sequence starting from Vs′ or Vt′ . Suppose for sake of contradiction that we can move at least one of s2 , s1 , s, t, t1 , t2 . Then, the first removed vertex v ∈ {s2 , s1 , s, t, t1 , t2 } must be either s2 or t2 ; otherwise the resulting subgraph would be disconnected. Let w be the vertex with which we exchanged v. Then, w ∈ V (G′ ) \ {s2 , s1 , s, t, t1 , t2 } = V (G) \ {s, t}. Therefore, the resulting vertex subset cannot induce a path, and hence it cannot be a solution for the induced variant. Similarly, the induced subgraph cannot contain a spanning path, and hence it cannot be a solution for the spanning variant. We next show that condition (b) is satisfied. Recall that d denotes the number of edges in a shortest st-path in G. Then, we have |V ′ | = |Vs′ | = |Vt′ | = d+ 5. By condition (a), we know that V ′ contains s2 , s1 , t1 , t2 , and hence in both induced and spanning variants, s and t must be connected by a path formed by d + 1 vertices in V ′ \ {s2 , s1 , t1 , t2 }. Since the length of this st-path is d, this path is shortest and hence V ′ must contain exactly one vertex from each of d + 1 layers of G. Consider any vertex subset V ′′ ⊆ V (G′ ) which satisfies conditions (a) and (b) of Lemma 1; note that V ′′ is not necessarily a feasible solution. Then, these conditions ensure that V ′′ \ {s2 , s1 , t1 , t2 } forms a shortest st-path in G if and only if the subgraph represented by V ′′ induces a path in G′ . Thus, an instance (G, Vs , Vt ) of shortest path reconfiguration is a yes-instance if and only if the corresponding instance (G′ , Vs′ , Vt′ ) of the induced or spanning variant is a yes-instance. This completes the proof of Theorem 7. Similar arguments give the following theorem. Theorem 8. Both the induced and spanning variants of subgraph reconfiguration under the TJ rule are PSPACE-complete for the property “a graph is a cycle.” Proof. Our reduction is the same as in the proof of Theorem 7 except for the following point (see also Figure 5(b)): instead of adding four new vertices, we connect s and t by a path of length three with two new vertices s1 and t1 . Then, the same arguments hold as the proof of Theorem 7. 4.2 Path and cycle under the TS rule We now consider the TS rule. Notice that, in the proofs of Theorems 7 and 8, we exchange only vertices contained in the same layer. Since any shortest st-path in a graph G contains exactly one vertex from each layer, we can assume without loss of generality that each layer Li of G forms a clique. Then, the same reductions work for the TS rule, and we obtain the following theorem. Theorem 9. Both the induced and spanning variants of subgraph reconfiguration under the TS rule are PSPACE-complete for the properties “a graph is a path” and “a graph is a cycle.” 4.3 Tree Wasa et al. [12] showed that the induced variant under the TJ and TS rules is PSPACE-complete for the property “a graph is a tree.” In this subsection, we show that the spanning variant for this 9 property is also PSPACE-complete under the TS rule, while it is linear-time solvable under the TJ rule. We first note that our proof of Theorem 9 yields the following theorem. Theorem 10. The spanning variant of subgraph reconfiguration under the TS rule is PSPACE-complete for the property “a graph is a tree.” Proof. We claim that the same reduction as in Theorem 9 applies. Let V ′ ⊆ V (G′ ) be any solution which is reachable by a reconfiguration sequence from Vs′ (or Vt′ ) under the TS rule, where (G′ , Vs′ , Vt′ ) is the corresponding instance for the spanning variant, as in the reduction. Then, the TS rule ensures that s2 , s1 , s, t, t1 , t2 ∈ V ′ holds, and V ′ contains exactly one vertex from each layer of G. Therefore, any solution forms a path even for the property “a graph is a tree,” and hence the theorem follows. In contrast to Theorem 10, the spanning variant under the TJ rule is solvable in linear time. We note that the reduction in Theorem 10 does not work under the TJ rule, because the tokens on s2 and t2 can move (jump) and hence there is no guarantee that a solution forms a path for the property “a graph is a tree.” Theorem 11. The spanning variant of subgraph reconfiguration under the TJ rule can be solved in linear time for the property “a graph is a tree.” Suppose that (G, Vs , Vt ) is a given instance. We assume that |Vs | = |Vt | ≥ 2 holds; otherwise it is a trivial instance. Then, Theorem 11 can be obtained from the following lemma. Lemma 2. (G, Vs , Vt ) with |Vs | = |Vt | ≥ 2 is a yes-instance if and only if Vs and Vt are contained in the same connected component of G. Proof. We first prove the only-if direction. Since |Vs | = |Vt | ≥ 2 and the property requires subgraphs to be connected, the subgraph induced by any feasible solution contains at least one edge. Because we can exchange only one vertex at a time and the resulting subgraph must retain connected, Vs and Vt are contained in the same connected component of G if (G, Vs , Vt ) is a yesinstance. Next, we prove the if direction for the case where |Vs | = |Vt | = 2. In this case, G[Vs ] and G[Vt ] consist of single edges, say es and et , respectively. Since Vs and Vt are contained in the same connected component of G, there is a path in G between es and et . Thus, we can exchange vertices along the path, and obtain a reconfiguration sequence from Vs to Vt . In this way, the if direction holds for this case. Finally, we prove the if direction for the remaining case, that is, |Vs | = |Vt | ≥ 3. Consider any spanning trees Ts of G[Vs ] and Tt of G[Vt ]. Since |Vs | = |Vt | ≥ 3, each of Ts and Tt has at least two edges. Then, if we regard (G, E(Ts ), E(Tt )) as an instance of the edge variant under the TJ rule for the property “a graph is a tree,” we know from the proof of Theorem 6 that it is a yes-instance. Thus, there exists a reconfiguration sequence E = hE(Ts ) = E0 , E1 , . . . , Eℓ = E(Tt )i of edge subsets under the TJ rule. We below show that, based on E, we can construct a reconfiguration sequence between Vs and Vt for the spanning variant under the TJ rule. For each Ei in E, let Vi be the vertex set of the tree represented by Ei . Notice that Vi is a feasible solution for the spanning variant, and that V0 = Vs and Vℓ = Vt hold. We claim that the sequence hVs = V0 , V1 , . . . , Vℓ = Vt i of vertex subsets is a reconfiguration sequence for the spanning variant under the TJ rule (after removing redundant vertex subsets if needed). To show this, it suffices to prove |Vi \ Vi−1 | = |Vi−1 \ Vi | ≤ 1 for all i ∈ {1, 2, . . . , ℓ}. Suppose for the sake of contradiction that there exists Vi such that |Vi \Vi−1 | ≥ 2 holds. (See also Figure 6.) Since |Ei | ≥ 2 and |Ei \ Ei−1 | = 1 hold, we have Ei ∩ Ei−1 6= ∅ and hence Vi ∩ Vi−1 6= ∅. Then there is at least one edge e = uv in Ei \ Ei−1 joining a vertex u ∈ Vi \ Vi−1 and v ∈ Vi ∩ Vi−1 , because Ei must form a connected subgraph. Since |Vi \ Vi−1 | ≥ 2, there is another vertex u′ 6= u in Vi \ Vi−1 , and there is an edge e′ incident to u′ . Note that e 6= e′ . Furthermore, we know that e′ ∈ Ei \ Ei−1 because u′ ∈ Vi \ Vi−1 . Therefore, we have e, e′ ∈ Ei \ Ei−1 , which contradicts the fact that |Ei \ Ei−1 | = 1 holds. 10 Vi-1 Vi v e u e’ u’ Figure 6: Illustration for the proof of Lemma 2. L R G ... Figure 7: Reduction for the property “a graph is an (i, j)-biclique” for any fixed i ≥ 1. 4.4 Biclique For the property “a graph is an (i, j)-biclique,” we show that the induced variant under the TJ rule is PSPACE-complete even if i = j holds, or i is fixed. On the other hand, the spanning variant under the TJ rule is NP-hard even if i = j holds, while it is polynomial-time solvable when i is fixed. We first give the following theorem for a fixed i ≥ 1. Theorem 12. For the property “a graph is an (i, j)-biclique,” the induced variant of subgraph reconfiguration under the TJ rule is PSPACE-complete even for any fixed integer i ≥ 1. Proof. We give a polynomial-time reduction from the maximum independent set reconfiguration problem [13], which can be seen as a subgraph reconfiguration problem. The maximum independent set reconfiguration problem is the induced variant for the property “a graph is edgeless” such that two given independent sets are maximum. Note that, because we are given maximum independent sets, there is no difference between the TJ and TS rules for this problem. This problem is known to be PSPACE-complete [13]. Suppose that (G, Vs , Vt ) is an instance of maximum independent set reconfiguration. We now construct a corresponding instance (G′ , Vs′ , Vt′ ) of the induced variant under the TJ rule for the property “a graph is an (i, j)-biclique,” where i is any fixed positive integer. (See also Figure 7.) Let L and R be distinct sets of new vertices such that |L| = i and |R| = 1. The vertex set of G′ is defined as V (G′ ) = V (G) ∪ L ∪ R, and the edge set of G′ as E(G′ ) = E(G) ∪ {uv | u ∈ V (G), v ∈ L} ∪ {vw | v ∈ L, w ∈ R}, that is, new edges are added so that there are edges between each vertex of L and each vertex of V (G) ∪ R. Let Vs′ = Vs ∪ L ∪ R and Vt′ = Vt ∪ L ∪ R. Since L, R, Vs and Vt are all independent sets in G′ , both Vs′ and Vt′ form (i, j)-bicliques, where i = |L| and j = |Vs ∪ R| = |Vt ∪ R|. We have now completed the construction of our corresponding instance, which can be accomplished in polynomial time. Because each vertex in L is connected to all vertices in V (G), a vertex subset V ′′ ⊆ V (G′ ) cannot form a bipartite graph (and hence an (i, j)-biclique) if V ′′ ∩ L 6= ∅ or if V ′′ contains two vertices joined by an edge in G. In addition, we cannot move any token placed on L ∪ R onto a vertex in V (G) because both Vs and Vt are maximum independent sets of G. Note that, in the case of i = 1, there may exist a vertex u in V (G) which is adjacent to all vertices in Vs or in Vt . However, u is not adjacent to the vertex in R, and hence the token placed on the vertex in L cannot be moved to u in this case, either. Therefore, for any feasible solution V ′ ⊆ V (G′ ) which is reconfigurable from Vs′ or Vt′ under the TJ rule, the vertex subset V ′ ∩ V (G) forms a maximum independent set of G. Thus, an instance (G, Vs , Vt ) of maximum independent set reconfiguration is a 11 G G1 G2 ... ... ... ... B1 ... ... A1 A2 B2 B A Figure 8: Reduction for the property “a graph is a (k, k)-biclique.” yes-instance if and only if our corresponding instance (G′ , Vs′ , Vt′ ) is a yes-instance. The corresponding instance (G′ , Vs′ , Vt′ ) constructed in the proof of Theorem 12 satisfies i = j if we set i = |Vs | + 1 = |Vt | + 1. Therefore, we can obtain the following corollary. Corollary 1. For the property “a graph is an (i, j)-biclique,” the induced variant of subgraph reconfiguration under the TJ rule is PSPACE-complete even if i = j holds. We next give the following theorem. Theorem 13. For the property “a graph is an (i, j)-biclique,” the spanning variant of subgraph reconfiguration under the TJ rule is NP-hard even if i = j holds. Proof. We give a polynomial-time reduction from the balanced complete bipartite subgraph problem, defined as follows [3]. Given a bipartite graph G and a positive integer k, the balanced complete bipartite subgraph problem is to determine whether or not G contains a (k, k)biclique as a subgraph; this problem is known to be NP-hard [3]. Suppose that (G, k) is an instance of balanced complete bipartite subgraph, where G is a bipartite graph with bipartition (A, B). Then, we construct a corresponding instance (G′ , Vs , Vt ) of the spanning variant under the TJ rule for the property “a graph is a (k, k)-biclique.” We first construct a graph G′ . (See Figure 8.) We add to G two new (k, k)-bicliques G1 and G2 ; let (A1 , B1 ) be the bipartition of G1 , and (A2 , B2 ) be that of G2 . We then add edges between any two vertices x ∈ B1 and y ∈ A, and between any two vertices x ∈ B and y ∈ A2 . Therefore, G′ [B1 ∪ A] and G′ [B ∪ A2 ] are bicliques in G′ . This completes the construction of G′ . We then set Vs = V (G1 ) and Vt = V (G2 ). Then, Vs and Vt are solutions, since G[Vs ] and G[Vt ] contain (k, k)-bicliques G1 and G2 , respectively. In this way, the corresponding instance can be constructed in polynomial time. By the construction of G′ , any reconfiguration sequence between Vs = V (G1 ) and Vt = V (G2 ) must pass through a (k, k)-biclique of G. Therefore, the theorem follows. We now give a polynomial-time algorithm solving the spanning variant for a fixed constant i ≥ 1. Theorem 14. For the property “a graph is an (i, j)-biclique,” the spanning variant of subgraph reconfiguration under the TJ rule is solvable in polynomial time when i ≥ 1 is a fixed constant. Proof. We give such an algorithm. We assume without loss of generality that j > i; otherwise both i and j are fixed constants, and hence such a case can be solved in polynomial time by Theorem 1. We will refer to the i vertices in the bounded-size part of the biclique as hubs, and the j vertices in the other part as terminals. Let H ⊆ V (G) be an arbitrary vertex subset such that |H| = i. We denote by C(H) the set of all common neighbors of H in G. Notice that, if |C(H)| ≥ j, then the subgraph represented by H ∪ C(H) contains at least one (i, j)-biclique whose hub set is H. We denote by S(H) the set of all solutions that contain (i, j)-bicliques with the hub set H. We know that S(H) = ∅ if |C(H)| < j; otherwise H ∪ T is in S(H) for any subset T ⊆ C(H) such that |T | = j. It should be noted that a solution in the spanning variant is simply a vertex subset 12 V ′ of V (G), and there is no restriction on how to choose a hub set from V ′ . (For example, if a solution V ′ induces a clique of size five, then there are ten ways to choose a hub set from V ′ for (2, 3)-bicliques.) Therefore, S(H) ∩ S(H ′ ) 6= ∅ may hold for distinct hub sets H, H ′ . We describe two key observations in the following. The first one is that for a hub set H, any two solutions Va , Vb ∈ S(H) are reconfigurable because we can always move vertices in Va \ Vb into ones in Vb \ Va one by one. The second one is that for any two distinct hub sets Ha and Hb , if there exist Va ∈ S(Ha ) and Vb ∈ S(Hb ) such that |Va \ Vb | ≤ 1 and |Vb \ Va | ≤ 1 (this means that Va and Vb are reconfigurable by one reconfiguration step, or Va = Vb ), then all pairs of solutions in S(Ha ) ∪ S(Hb ) are reconfigurable. Based on these observations, we construct an auxiliary graph A for a given instance (G, Vs , Vt ), as follows. Each node in A corresponds to a set H of i vertices (hubs) in the input graph G such that |C(H)| ≥ j; we represent the node in A simply by the corresponding hub set H. Two nodes Ha and Hb are adjacent in A if there exist Va ∈ S(Ha ) and Vb ∈ S(Hb ) such that |Va \ Vb | ≤ 1 and |Vb \ Va | ≤ 1. Let Hs and Ht be any two nodes such that Vs ∈ S(Hs ) and Vt ∈ S(Ht ), respectively. Then, we claim that there is a reconfiguration sequence between Vs and Vt if and only if there is a path in A between Hs and Ht . We first suppose that there is a path P in A between Hs and Ht . We know that any two consecutive nodes Ha and Hb in P are adjacent in A. Then, as we mentioned above, all pairs of solutions in S(Ha ) ∪ S(Hb ) are reconfigurable. Since Vs ∈ S(Hs ) and Vt ∈ S(Ht ), we can thus conclude that there is a reconfiguration sequence between Vs and Vt . We now suppose that there exists a reconfiguration sequence R between Vs and Vt . For each solution Va in R except for Vs and Vt , we choose an arbitrary node Ha in A which satisfies Va ∈ S(Ha ). Consider any two consecutive solutions Va and Vb in R. Then, by the construction of A, the chosen nodes Ha and Hb are adjacent in A (or sometimes Ha = Hb ) because |Va \ Vb | = 1 and |Vb \ Va | = 1. In this way, we can ensure the existence of a desired path in A. The running time of the algorithm depends on the size i of a hub set. Let n be the number of vertices in G. The size of the node set of A is in O(ni ). For any two nodes Ha and Hb in A, we can determine in O(n) time whether there is an edge between them by checking that all of the following four conditions hold or not: (a) |(Ha ∪ C(Ha )) ∩ (Hb ∪ C(Hb ))| ≥ i + j − 1; (b) |Ha \ (Hb ∪ C(Hb ))| ≤ 1; (c) |Hb \ (Ha ∪ C(Ha ))| ≤ 1; and (d) |Ha ∪ Hb | ≤ i + j + 1. Note that, since we have assumed that i < j, condition (d) is always satisfied. Therefore, we take O(n2i+1 ) time to construct A and to check whether the nodes corresponding to Vs and Vt are connected. 4.5 Diameter-two graph In this subsection, we consider the property “a graph has diameter at most two.” Note that the induced and spanning variants are the same for this property. Theorem 15. Both induced and spanning variants of subgraph reconfiguration under the TS rule are PSPACE-complete for the property “a graph has diameter at most two.” Proof. Since the induced variant and the spanning variant are the same for this property, it suffices to show the PSPACE-hardness only for the induced variant. We give a polynomial-time reduction from the clique reconfiguration problem, which is the induced variant (also the spanning variant) of subgraph reconfiguration for the property “a graph is a clique.” This problem is known to be PSPACE-complete under both the TJ and TS rules [7], and we give a reduction from the problem under the TS rule. Suppose that (G, Vs , Vt ) is an instance of clique reconfiguration under the TS rule such that |Vs | = |Vt | ≥ 2; otherwise it is a trivial instance. Then, we construct a corresponding instance (G′ , Vs′ , Vt′ ) of the induced variant under the TS rule. Let V (G) = {v1 , v2 , . . . , vn }, where n = |V (G)|. We form G′ by making two copies of G and adding edges between corresponding 13 l2 v2 v1 l1 l4 v4 l6 v6 r5 l5 v5 r4 r3 l3 v3 r2 = rs r1 (a) G r6 (b) G’ Figure 9: Reduction for the property “a graph has diameter at most two.” The vertices of Vs in G and of Vs′ in G′ are depicted by gray vertices, where rs = r2 . vertices of the two graphs. (See Figure 9.) More formally, the vertex set V (G′ ) is defined as V (G′ ) = L ∪ R, where L = {li | vi ∈ V (G)} and R = {ri | vi ∈ V (G)}, and the edge set E(G′ ) is defined as E(G′ ) = El ∪ Er ∪ Ec , where El = {li lj | vi vj ∈ E(G)}, Er = {ri rj | vi vj ∈ E(G)} and Ec = {li ri | vi ∈ V (G)}. For each i ∈ {1, 2, . . . , n}, we call li and ri corresponding vertices, and an edge joining corresponding vertices a connecting edge. We then construct Vs′ and Vt′ . We say that a vertex v ′ in a vertex subset V ′ ⊆ V (G′ ) is exposed in V ′ if the corresponding vertex of v ′ does not belong to V ′ . We construct Vs′ and Vt′ so that they each have exactly one exposed vertex. Let vs ∈ Vs be an arbitrary vertex in Vs and vt ∈ Vt be an arbitrary vertex in Vt . Then, we let Vs′ = {li , ri | vi ∈ Vs } \ {rs } and Vt′ = {li , ri | vi ∈ Vt } \ {rt }. Note that ls and lt are the unique exposed vertices in Vs′ and Vt′ , respectively. Since Vs and Vt form cliques in G, G′ [Vs′ ] and G′ [Vt′ ] have diameter at most two. We have thus constructed our corresponding instance in polynomial time. Let V ′ be any subset of V (G′ ), and let VL′ = V ′ ∩ L and VR′ = V ′ ∩ R. The key observation is that G[V ′ ] has diameter more than two if both VL′ and VR′ contain exposed vertices in V ′ . We below prove that (G, Vs , Vt ) of clique reconfiguration is a yes-instance if and only if the corresponding instance (G′ , Vs′ , Vt′ ) of the induced variant under the TS rule is a yes-instance. We first prove the only-if direction, supposing that there exists a reconfiguration sequence hVs = V0 , V1 , . . . , Vℓ = Vt i of cliques in G. Then, we show that Vs′ is reconfigurable into Vt′ by induction on ℓ. If ℓ = 0 and hence Vs = Vt , then we can obtain Vt′ from Vs′ by exchanging rt in Vs′ with rs (or Vs′ = Vt′ already holds). We then consider the case where ℓ ≥ 1. Let {vi } = V0 \ V1 and {vj } = V1 \ V0 ; note that vi and vj are adjacent in G since we consider the TS rule. Then, we consider two vertex subsets V0′′ = (Vs′ ∪ {rs }) \ {ri } and V1′ = (V0′′ ∪ {lj }) \ {li }; note that rs and ri are adjacent in G′ since rs , ri ∈ V0 = Vs , and that li and lj are adjacent in G′ since vi and vj are adjacent in G. Notice that V ′′ and V1′ have distinct exposed vertices li and lj , respectively. By the construction of G′ , since V0 and V1 are cliques in G, both G′ [V0′′ ] and G′ [V1′ ] have diameter at most two. Then, the sequence hVs′ , V0′′ , V1′ i is a reconfiguration sequence between Vs′ and V1′ . Therefore, by applying the induction hypothesis to (G′ , V1′ , Vt′ ) and (G, V1 , Vt ), we obtain a reconfiguration sequence between V1′ and Vt′ . Thus, we can conclude that (G′ , Vs′ , Vt′ ) is a yes-instance. To prove the if direction, we now suppose that there exists a reconfiguration sequence V ′ = ′ hVs = V0′ , V1′ , . . . , Vℓ′ = Vt′ i. Consider the case where Vi′ ∈ V ′ has the exposed vertex in the side L, ′ say li ∈ Vi′ , and hence ri 6∈ Vi′ ; the other case is symmetric. Because G′ [Vi+1 ] must have diameter ′ at most two (and hence it must have only one exposed vertex), we know that Vi+1 is obtained from Vi′ by one of the following three moves (1) a token on a vertex rk ∈ Vi′ is moved to ri ; (2) the token on li is moved to its corresponding vertex ri ; or (3) the token on li is moved to a vertex lj ∈ L which is not in Vi′ and is adjacent to all vertices Vi′ ∩ L. Notice that the other moves increase the number of exposed vertices or make the resulting graph have diameter more than two. Then, each Vi′ ∈ V ′ induces a clique of size |Vs | = |Vt | in either L or R, and we can obtain a desired sequence of cliques between Vs and Vt . We note that the TS rule is critical in the reduction of Theorem 15. Under the TJ rule, there is no guarantee that we maintain a clique (and we cannot even guarantee that the resulting clique gets bigger). 14 5 Conclusions and future work The work in this paper initiates a systematic study of subgraph reconfiguration. Although we have identified graph structure properties which are harder for the induced variant than the spanning variant, it remains to be seen whether this pattern holds in general. For the general case, questions of the roles of diameter and the number of subgraphs satisfying the property are worthy of further investigation. Another obvious direction for further research is an investigation into the fixed-parameter complexity of subgraph reconfiguration. A natural extension of subgraph reconfiguration is the extension from isomorphism of graph structure properties to other mappings, such as topological minors. References [1] P. Bonsma. The complexity of rerouting shortest paths. Theoretical Computer Science, 510:1– 12, 2013. [2] P. Bonsma and L. Cereceda. Finding paths between graph colourings: PSPACE-completeness and superpolynomial distances. Theoretical Computer Science, 410(50):5215–5226, 2009. [3] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, 1979. [4] R. A. Hearn and E. D. Demaine. PSPACE-completeness of sliding-block puzzles and other problems through the nondeterministic constraint logic model of computation. Theoretical Computer Science, 343(1–2):72–96, 2005. [5] J. van den Heuvel. The complexity of change. Surveys in Combinatorics 2013, 409:127–160, 2013. [6] T. Ito, E. D. Demaine, N. J. A. Harvey, C. H. Papadimitriou, M. Sideri, R. Uehara, and Y. Uno. On the complexity of reconfiguration problems. Theoretical Computer Science, 412(12–14):1054–1065, 2011. [7] T. Ito, H. Ono, and Y. Otachi. Reconfiguration of cliques in a graph. In Proceedings of the 12th Annual Conference on Theory and Applications of Models of Computation, pages 212–223, 2015. [8] M. Kamiński, P. Medvedev, and M. Milanič. Complexity of independent set reconfigurability problems. Theoretical Computer Science, 439:9–15, 2012. [9] A. E. Mouawad, N. Nishimura, V. Raman, N. Simjour, and A. Suzuki. On the parameterized complexity of reconfiguration problems. Algorithmica, 78(1):274–297, 2017. [10] M. Mühlenthaler. Degree-constrained subgraph reconfiguration is in P. In Proceedings of the 40th International Symposium on Mathematical Foundations of Computer Science, pages 505–516, 2015. [11] N. Nishimura. Introduction to reconfiguration. Preprints 2017090055, 2017. [12] K. Wasa, K. Yamanaka, and H. Arimura. The complexity of induced tree reconfiguration problems. In Proceedings of the 10th International Conference of Language and Automata Theory and Applications, pages 330–342, 2016. [13] M. Wrochna. Reconfiguration in bounded bandwidth and tree-depth. Journal of Computer and System Sciences, 93:1–10, 2018. 15
8
arXiv:1504.06729v4 [cs.DS] 12 Jul 2016 Optimal Principal Component Analysis in Distributed and Streaming Models Christos Boutsidis New York, New York [email protected] David P. Woodruff IBM Research Almaden, California [email protected] Peilin Zhong Institute for Interdisciplinary Information Sciences Tsinghua University, Beijing, China [email protected] Abstract We study the Principal Component Analysis (PCA) problem in the distributed and streaming models of computation. Given a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, we want to output an m × k orthonormal matrix U for which kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , where Ak ∈ Rm×n is the best rank-k approximation to A. We show the following. 1. In the arbitrary partition Psmodel of Kannan et al. (COLT 2014), each of s machines holds a matrix Ai and A = i=1 Ai . Each machine should output U. Kannan et al. achieve O(skm/ε) + poly(sk/ε) words (of O(log(nm)) bits) communication. We obtain the improved bound of O(skm) + poly(sk/ε) words, and show an optimal Ω(skm) lower bound up to low order terms. This resolves an open question for high precision PCA. A poly(ε−1 ) dependence is known to be required, but we separate this dependence from m. 2. We bypass the above lower bound when A is φ-sparse in each column and each server receives a subset of columns. Here we obtain an O(skφ/ε) + poly(sk/ε) word protocol. Our communication is independent of the matrix dimensions, and achieves the guarantee that each server, in addition to outputting U, outputs a subset of O(k/ε) columns of A containing a U in its span (that is, we solve distributed column subset selection). We show a matching Ω(skφ/ε) lower bound for distributed column subset selection. Achieving our communication bound when A is sparse but not sparse in each column, is impossible. 3. In the streaming model in which the columns arrive one at a time, an algorithm of Liberty (KDD, 2013) with an improved analysis by Ghashami and Phillips (SODA, 2014) shows O(km/ε) “real numbers” of space is achievable in a single pass, which we first improve to an O(km/ε)+poly(k/ε) word space upper bound. This almost matches a known Ω(km/ε) bit lower bound of Woodruff (NIPS, 2014). We show with two passes one can achieve O(km) + poly(k/ε) words of space and (up to the poly(k/ε) term and the distinction between words versus bits) this is optimal for any constant number of passes. 4. In turnstile streams, in which we receive entries of A one at a time in an arbitrary order, we show how to obtain a factorization of a (1 + ε)-approximate rank-k matrix using O((m+n)kε−1 ) words of space. This improves the O((m+nε−2 )kε−2 ) bound of Clarkson and Woodruff (STOC 2009), and matches their Ω((m + n)kε−1 ) word lower bound. Notably, our results do not depend on the condition number of A. 1 Introduction In distributed-memory computing systems, such as, Hadoop [1] or Spark [3], Principal Component Analysis (PCA) and the related Singular Value Decomposition (SVD) of large matrices is becoming very challenging. Machine learning libraries implemented on top of such systems, for example mahout [2] or mllib [4], provide distributed PCA implementations since PCA is often used as a building block for a learning algorithm. PCA is useful for dimension reduction, noise removal, visualization, etc. In all of these implementations, the bottleneck is the communication; hence, the focus has been on minimizing the communication cost of the related algorithms, and not the computational cost, which is the bottleneck in more traditional batch systems. The data matrix corresponding to the dataset in hand, e.g., a term-document matrix representing a text collection, or the Netflix matrix representing user’s ratings for different movies, could be distributed in many different ways [46]. In this paper, we focus on the following so-called arbitrary partition and column partition models. In the arbitrary partition model, a matrix A ∈ Rm×n Ps is arbitrarily distributed among s machines. Specifically, A = i=1 Ai where Ai ∈ Rm×n is held by machine i. Unless otherwise stated, we always assume m ≤ n. In the column partition model,  A A . . . A a matrix A ∈ Rm×n is distributed column-wise among s < n machines: A = ; 1 2 s P here, for i = 1 : s, Ai is an m × wi column submatrix of A with i wi = n. Note that the column partition model is a special case of the arbitrary partition model. Thus, it is desirable to prove upper bounds in the arbitrary partition model, and lower bounds in the column partition model. Both models have been adapted by traditional numerical linear algebra software libraries for distributed memory matrix computations [12]. A recent body of work [29, 10, 41, 31, 37, 13] (see Section 3 for a comparison) has focused on designing algorithms which minimize the communication needed for each machine to output an m × k matrix U for which an m × k orthonormal matrix U for which kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , where Ak ∈ Rm×n is the best rank-k approximation to A. Each machine should output the same matrix U which can then be used for downstream applications, such as clustering, where one first projects the data to a lower dimensional subspace (see, e.g., [10]). The protocol should succeed with large constant probability. The model is such that each of the s machines communicates with one machine, called the “coordinator” (which we sometimes refer to as Server), but does not communicate with other machines. This is known as the coordinator model and one can simulate arbitrary point-to-point communication with a constant factor overhead in communication together with an additive O(log(mn)) bit overhead per message (see, e.g., [45]). 1.1 Our Results The best upper bound in the arbitrary partition model is O((skmε−1 ) + s · poly(kε−1 )) words (of O(log(mn)) bits) communication [37], while the only known lower bound for these problems is in the arbitrary partition model and is Ω(skm) [37]. In high precision applications one may want to set ε to be as small as possible and the leading order term of O(skmε−1 ) is undesirable. A natural question is whether there is an O((skm) + s · poly(kε−1 )) word protocol. We note that there is a fairly simple known Ω(ε−2 ) bit lower bound [54] (we present this in Lemma 75 for completeness), so although one cannot achieve an O(log(1/ε)) dependence in the communication as one would maybe expect given iterative algorithms for regression with running time O(log(1/ε)) (see section 2.6 of [55] for an overview), an O((skm) + s · poly(kε−1 )) would at least separate the dependence of ε and m and allowing for much smaller ε with the same amount of communication. There are many existing protocols using O(skmε−1 ) words of communication [29, 10, 41, 31, 37, 13], and the protocols work in very different ways: that of [29, 10] is based on coresets, while 1 that of [41, 31] is based on adapting a streaming algorithm to the communication setting, while that of [37] is based on sketching, and that of [13] is based on alternating minimization and is useful only under some assumptions on the condition number (see Section 3 for a more detailed discussion of these protocols). It was thus natural to assume there should be a lower bound of Ω(skmε−1 ). Instead, we obtain a new upper bound in the arbitrary partition model and a matching lower bound (up to lower order terms) in the column partition model. Theorem 1 (Restatement of Theorem 43 and Theorem 82). Suppose matrix A ∈ Rm×n is partitioned in the arbitrary-partition model (See Definition 14). For any 1 ≥ ε > 0, there is an algorithm which on termination leaves the same orthonormal matrix U ∈ Rm×k on each machine such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the algorithm runs in polynomial time with total communication complexity O(skm + s · poly(kε−1 )) words each containing O(log(smnε−1 )) bits. If matrix A ∈ Rm×n is distributed in the column-partition model (See Definition 15), then for any positive constant C ≤ O(poly(skm)), the algorithm which can leave a orthonormal matrix U ∈ Rm×k on each machine such that kA − UUT Ak2F ≤ C · kA − Ak k2F holds with constant probability has at least Ω(skm log(skm)) bits of communication. In some applications even an O(skm) word protocol may be too costly, as m could be very large. One could hope to do for communication what recent work on input sparsity algorithms [22, 43, 44, 16, 25] has done for computation, i.e., obtain protocols sensitive to the number of non-zero entries of A. Many matrices are sparse, e.g., Netflix provides a training data set of 100, 480, 507 ratings that 480, 189 users give to 17, 770 movies. If users correspond to columns in the matrix, then the average column sparsity is ≈ 200 non-zero elements (out of the 17, 770 possible coordinates). Our second contribution is the first protocol depending on the number of non-zero entries of A in the column partition model. Our communication is independent of the matrix dimensions. Denote by φ the maximum number of non-zero elements of a column in A. When we say that A is φ-sparse, we mean that every column of A has at most φ non-zero elements and nnz(A) ≤ φ · n. Our protocol has the additional feature of leaving on each machine the same subset C of O(k/ε) columns of A for which there exists an m × k orthonormal matrix U in the column span of C for which kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . This is known as the column subset selection problem, which is useful since C may be sparse if A is, and also it can lead to better data intepretability. To partially complement our protocol, we show our protocol is optimal for any protocol solving the column subset selection problem. We summarize these results as follows. Theorem 2 (Restatement of Theorem 63). Suppose a φ-sparse matrix A ∈ Rm×n is partitioned in the column-partition model (See Definition 15). For any 1 ≥ ε > 0, there is an algorithm which on termination leaves C ∈ Rm×c with c = O(k/ε) columns of A and an orthonormal matrix U on each machine such that kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the algorithm runs in polynomial time with total communication complexity  O skφε−1 + sk2 ε−4 words each containing of O(log(smnε−1 )) bits. If a φ-sparse matrix A ∈ Rm×n is distributed in the column-partition model (See Definition 15), then for any positive constant C ≤ O(poly(skφ)), the algorithm which can leave a orthonormal matrix U ∈ Rm×k on each machine such that kA − UUT Ak2F ≤ C · kA − Ak k2F holds with constant probability has at least Ω(skφ log(skφ)) bits of communication. Remark 3. Our protocol has no dependence on condition number and works for arbitrary matrices. We 2 Upper bounds Lower bounds Definition 16 (arbitrary partition model) O(skm + s · poly(k/ε)) (Theorem 43) Ω(skm) (Theorem 1.2 in [37]) Definition 17 (column partition model) O(skm + s · poly(k/ε)) (Theorem 43) Ω(skm) (Theorem 82) Definition 17 with sparsity φ = o(ε · m) O(skφε−1 + s · poly(k/ε)) (Theorem 63) Ω(skφ) (Corollary 83 ) Table 1: Communication upper/lower bounds for the Distributed PCA problems. make a serious effort as shown in Section 6 to achieve this. Note that even if the entries of A are specified using O(log(mn)) bits, the condition number can be 2−Ω(mn log(mn)) [7]. Remark 4. We did not discuss the running time of the algorithms, but we are interested in the fastest possible algorithms with the minimal communication cost, and provide fast algorithms as well. Remark 5. The hard instance in Section 10.2.2 implies an Ω(skm) lower bound even if the input matrix is sparse overall but has skm non-zero positions in arbitrarily locations. Therefore, to obtain our bounds we discuss the sparsity on each column instead of the overall sparsity of the matrix. A model closely related to the distributed model of computation is the streaming model of computation. The model we focused on is the so-called turnstile streaming model. In this model, there is a stream of update operations and each operation indicates that the corresponding entry of A should be incremented by a specific number. We present novel PCA algorithms in this model. Our first one-pass algorithm improves upon the best existing streaming PCA algorithm [41, 31] in two respects. First, the space of [41, 31] is described in “real numbers” while our space bound (O(mk/ε + poly(k/ε)) - see Theorem 52) is in terms of words (we also bound the word size). This matches an Ω(km/ε) bit lower bound for one-pass algorithms in [53], up to the distinction between words versus bits and a low order term poly(k/ε). Second, our algorithm can be applied in the turnstile streaming model which is stronger than column update streaming model in [41, 31]. Theorem 6 (Restatement of Theorem 52). Suppose A ∈ Rm×n is given by a stream of update operations in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which uses a single pass over the stream and on termination outputs an orthonormal matrix U ∈ Rm×k such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant  probability. Further, the algorithm runs in polynomial time with space of total O mk/ε + poly(kε−1 ) words each containing O(log(smnε−1 )) bits. A slight modification of the previous algorithm leads to a one-pass algorithm which can compute a factorization of a (1 + ε)-approximate rank-k matrix. The modified algorithm only needs O((n + m)k/ε + poly(k/ε)) words of space which improves the O((m + nε−2 )kε−2 ) upper bound in [21] and matches the Ω((n + m)k/ε) bit lower bound given by [21], up to the low order term poly(k/ε). Theorem 7 (Restatement of Theorem 53). Suppose A ∈ Rm×n is given by a stream of update operations in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which uses a single pass over the stream and on termination outputs a matrix A∗k ∈ Rm×n with rank(A∗k ) ≤ k such that kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the algorithm runs in polynomial time with space of total O((m + n)k/ε + poly(kε−1 )) words each containing O(log(smnε−1 )) bits. 3 Upper bounds One-pass turnstile, Def. 21 One-pass turnstile, factorization, Def. 22 Two-pass turnstile, Def. 21 O(mkε−1 + poly(k, ε−1 )) Lower bounds (Theorem 52) O((n + m)kε−1 + poly(k, ε−1 )) (Theorem 53) O(mk + poly(k, ε−1 )) (Theorem 55) Ω(mkε−1 ) bits [53] Ω((n + m)kε−1 ) words [21] Ω(mk) bits [53] Table 2: Space upper/lower bounds for the Streaming PCA problem. We also show a two-pass algorithm which is an implementation of our distributed PCA protocol. It uses O((km)+poly(k/ε)) words of space, which up to the poly(k/ε) term and the distinction between words versus bits, is optimal for any constant number of passes. A “next natural goal” in [53] was to improve the lower bound of Ω(km) to a bound closer to the 1-pass Ω(km/ε) lower bound established in that paper; our upper bound shows this is not possible. Theorem 8 (Restatement of Theorem 55). Suppose A ∈ Rm×n is given by a stream of update operations in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which uses two passes over the stream and on termination outputs an orthonormal matrix U ∈ Rm×k such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the algorithm  runs in polynomial time with total space O mk + poly(kε−1 ) words each containing O(log(smnε−1 )) bits. 1.2 Technical Overview 1.2.1 Upper Bounds The Arbitrary Partition Model. Recall that the inputP matrix A ∈ Rm×n is arbitrarily partitioned m×n into s matrices Ai ∈ R , i.e., for i = 1, 2, . . . , s: A = si=1 Ai . By sketching on the left and right 2 2 by two small random sign matrices S ∈ RO(k/ε )×m and T ∈ Rn×O(k/ε ) , with O(sk 2 /ε4 ) words of communication, the server can learn à = SAT which is a “sketch” of A. It suffices to compute T the best rank-k approximation Ãk to Ã. Suppose the SVD of Ãk = UÃk ΣÃk Và . Then the server k can learn ATVÃk by the second round of communication which needs O(skm) words. We then prove (see Lemma 28): kA − UUT Ak2F ≤ (1 + ε)kA − Ak k2F where U is an orthonormal basis of the column space of ATVÃk . Notice that rank(U) ≤ k. Thus U is exactly what we want. Section 5.3 shows the details. A technical obstacle in the analysis above is that it may require a large number of machine words to specify the entries of VÃk , even if each entry in A is only a single word. In fact, one can show (we omit the details) that the singular values of Ãk can be exponentially large in k/ε, which means one would need to round the entries of VÃk to an additive exponentially small precision, which would translate to an undesirable sm · poly(k/ε) bits of communication. To counter this, we use the smoothed analysis of Tao and Vu [52] to argue that if we add small random Bernoulli noise to A, then its minimum singular value becomes inverse polynomial in n. Moreover, if the rank of A is at least 2k and under the assumption that the entries of A are representable with a single machine word (so we can identify them with integers in magnitude at most poly(nms/ε) by scaling), then we can show the additional noise preserves relative error approximation. To our knowledge, this is the first application of this smoothing technique to distributed linear algebra algorithms. Section 6 discusses the details of this approach. 4 On the other hand, if the rank of A is smaller than 2k, the smoothing technique need not preserve relative error. In this case though, we can learn a basis C ∈ Rm×O(k) for the column span of A by multiplying by a pseudorandom matrix based on Vandermonde matrices. Since C has at most 2k columns, we can efficiently communicate it to all servers using O(skm) communication. At this point we set up the optimization problem minrank(X)≤k kCXCT A−AkF . The server cannot learn CT A and A directly, as this would be Ω(nm) words, but we can choose additional “sketching matrices” Tlef t and Tright to instead solve minrank(X)≤k kTlef t (CXCT A − A)Tright kF , which is a generalization of the subspace embedding technique to “affine embeddings” [53]. the server learns Tlef t CXCT ATright and Tlef t ATright , which are small matrices, and can be sent to each machine. Each machine locally solves for the rank-k solution X∗ minimizing kTlef t CXCT ATright − Tlef t ATright kF . Now each machine can find the same m × k orthonormal basis and output it without further communication. Sparse Matrices in the Column Partition Model. Our algorithm for sparse matrices is technically simpler than that in the arbitrary partition model. Section 8.2 presents a distributed PCA algorithm that has O((φksε−1 ) + poly(sk/ε)) words of communication cost. Our idea in order to take advantage of the sparsity in the input matrix A is to select and transfer to the coordinator a small set of “good” columns from each sub-matrix Ai . Specifically, we design an algorithm that first computes, in a distributed way, a matrix C̃ ∈ Rm×c with c = O(kε−1 ) columns of A, and then finds U ∈ span(C̃) using a distributed, communication-efficient algorithm developed in [37]. The matrix C̃ is constructed using optimal algorithms for column sampling [17, 26, 24], extended properly to the distributed case. As mentioned, our algorithm actually solves the distributed column subset selection problem. It builds on results for column subset selection in the batch setting [17, 26, 24], but gives a novel analysis showing that in the distributed setting one can find columns as good as in the batch setting. To the best of our knowledge, only heuristics for distributed column subset selection were known [28]. We also optimize the time complexity of our algorithm, see Table 4. Turnstile streaming model. Our one-pass streaming PCA algorithm starts by generating two random sign matrices S ∈ RO(k/ε)×n and R ∈ Rm×O(k/ε) . As shown in Lemma 51, min kARXSA − Ak2F ≤ (1 + ε) · kA − Ak k2F rank(X)≤k T The intuition of the above is as the following. Suppose the SVD of Ak is UAk ΣAk VA where k Ak is the best rank-k approximation matrix to A. Since X can be chosen as ΣAk VAk , we have minrank(X)≤k kUAk X − Ak2F = kAk − Ak2F . As shown in [21], S can provide a sketch for the regression problem. Thus, kUAk X̃ − Ak2F ≤ (1 + ε) · minrank(X)≤k kUAk X − Ak2F where X̃ = arg min rank(X)≤k kSUAk X − SAk2F Notice that X̃ is in the row space of span(SA). Then we focus on the regression problem: min kXSA − Ak2F . rank(X)≤k Similarly, we can use R to sketch the problem. Thus finally we only need to optimize min kARXSA − Ak2F . rank(X)≤k 5 Upper bounds Definition 18 Definition 19 O(skφε−1 ) Lower bounds (Theorem 74) Ω(skφε−1 ) (Theorem 90)   O skφε−1 + s · poly(k/ε) (Theorem 74) Ω(skφε−1 ) (Corollary 91) Table 3: Communication upper/lower bounds for the CSSP problems of Definitions 18 and 19. However, it is too expensive to store the entire matrix A. Thus, we sketch on the left and right by Tlef t and Tright . Since all of Tlef t AR, SATright and Tlef t ATright can be maintained in small space, X∗ = arg minrank(X)≤k kTlef t (ARXSA−A)Tright k2F can be constructed after one pass over the stream. Additionally, if AR is also maintained in the algorithm, we can get U ∈ Rm×k of which columns are an orthonormal basis of span(ARX∗ ) satisfying kA − UUT Ak2F ≤ (1+ ε)·kA − Ak k2F . T , Furthermore, if SA is also maintained, since it suffices to compute the SVD of X∗ = UX∗ ΣX∗ VX ∗ T T = Tlef t ARUX∗ and K = VX SAT can be constructed in O((n + m)k) words of space. right ∗ Therefore, the algorithm can compute A∗k = TΣX∗ K = ARX∗ SA in O((n + m)k) words of space. The algorithm then can output A∗k with total space O((n + m)k/ε + poly(k/ε)) words (see Theorem 53). Our two-pass streaming PCA algorithm is just an implemententation of our distributed PCA algorithm in the streaming model. 1.2.2 Lower Bounds Table 3 summarizes the matching communication lower bounds that we obtain for distributed column-based matrix reconstruction. Theorem 90 proves a lower bound for the problem in Definition 18; then, a lower bound for the problem of Definition 19 follows immediately since this is a harder problem (see Corollalry 91). Distributed Column Subset Selection. Our most involved lower bound argument is in showing the tightness for the distributed column subset selection problem, and is given in Theorem 90. To illustrate the ideas, suppose k = 1. We start with the canonical hard matrix for column subset selection, namely, an m × m matrix A whose first row is all ones, and remaining rows are a subset of the identity matrix. Intuitively the best rank-1 approximation is very aligned with the first row of A. However, given only o(1/ε) columns of the matrix, there is not a vector in the span which puts a (1 − ε)-fraction of its mass on the first coordinate, so Ω(1/ε) columns are needed. Such a matrix has φ = 2. Obtaining a lower bound for general φ involves creating a large net of such instances. Suppose we set m = φ and consider L̃A, where L̃ is formed by choosing a random φ × φ orthonormal matrix, and then rounding each entry to the nearest integer multiple of 1/poly(n). We can show that o(1/ε) columns of L̃A do not span a rank-1 approximation to L̃A. We also need a lemma which shows that if we take two independently random orthonormal matrices, and round their entries to integer multiples of 1/poly(n), then these matrices are extremely unlikely to share a constant fraction of columns. The idea then is that if one server holds L̃A, and every other server holds the zero matrix, then every server needs to output the same subset of columns of L̃A. By construction of A, each column of L̃A is the sum of the first column of L̃ and an arbitrary column of L̃, and since we can assume all servers know the first column of L̃ (which involves a negligible 6 O(sφ) amount of communication), this implies that each server must learn Ω(1/ε) columns of L̃. The probability that random discretized orthonormal matrices share Ω(1/ε) columns is sufficiently small that we can choose a large enough net for these columns to identify L̃ in that net, requiring Ω(φ/ε) bits of communication per server, or Ω(sφ/ε) words in total. The argument for general k can be viewed as a “direct sum theorem”, giving Ω(skφ/ε) words of communication in total. Dense Matrices in the Column Partition Model. Our optimal lower bound for dense matrices is technically simpler. It gives an Ω(skm) word communication lower bound in column partition model for dense matrices. Theorem 82 argues that there exists an m × n matrix A such that for this A, any k ≤ 0.99m, and any error parameter C with 1 < C < poly(skm), if there exists a protocol to construct an m × k matrix U satisfying kA − UUT Ak2F ≤ C · kA − Ak k2F , with constant probability, then this protocol has communication cost at least Ω(skm) words. This lower bound is proven for a matrix A that has k fully dense columns. We should note that the lower bound holds even if each machine only outputs the projection of Ai onto U, i.e., UUT Ai , rather than U itself. Note that this problem is potentially easier, since given U, a machine could find UUT Ai . The intuition of the proof is that machine 1 has a random matrix A1 ∈ Rm×k with orthonormal columns (rounded to integer multiples of 1/poly(n)), while all other machines have a very small multiple of the identity matrix. When concatenating the columns of these matrices, the best kdimensional subspace to project the columns onto must be very close to A1 in spectral norm. Since machine i, i > 1, has tiny identity matrices, after projection it obtains a projection matrix very close to the projection onto the column span of A1 . By choosing a net of m × k orthonormal matrices, all of which pairwise have high distance in spectral norm, each machine can reconstruct a random element in this net, which requires lots of information, and hence communication. Our lower bound of Theorem 82 implies a lower bound of Ω(skφ) words for matrices in which the column sparsity is φ (see Corollary 83) as a simple corollary. 1.3 Road Map In the first ten pages, we have one additional section, Section 2, which gives an overview of our algorithm in the arbitrary partition model. In the Appendix, we then present more detail on prior results on distributed PCA algorithms in Section 3. Section 4 introduces the notation and basic results from linear algebra that we use in our algorithms. Section 5 presents our distributed PCA algorithm for arbitrary matrices for Definition 16. The communication of the algorithm in this section can be stated only in terms of “real numbers”. We resolve this issue in Section 6 where a modified algorithm has communication cost bounded in terms of machine words. Section 7 discusses space-optimal PCA methods in the streaming model of computation. Section 8 presents a distributed PCA algorithm for sparse matrices in column partition model, while Section 9 extends this algorithm to a faster distributed PCA algorithm for sparse matrices. Section 10 presents communication lower bounds. 2 Outline of our result in the arbitrary partition model Here we give a brief outline of our result in the arbitrary patition model, deferring the full details to the appendix. We describe a fast distributed PCA algorithm with total communication O(msk) words plus low order terms, which is optimal in the arbitrary partition model in the sense that an Ω̃(msk) bit 7 lower bound was given by [37]. The algorithm employs, in a novel way, the notion of projectioncost preserving sketches from [24]. In particular, whereas all previous [48, 23] dimension-reductionbased SVD methods reduce one dimension of the input matrix to compute some approximation to the SVD, our method reduces both dimensions and computes an approximation to the SVD from a small almost square matrix (we note that other work, such as work on estimating eigenvalues [8], uses sketches in both dimensions, but it is not clear how to compute singular vectors using such sketches). Unlike [37] which reduces only one dimension in the first communication round, we do the reduction on both dimensions in the same round. We first present the batch version of the algorithm which offers a new low-rank matrix approximation technique; a specific implementation of this algorithm offers a communication-optimal distributed PCA algorithm (we also discuss in Section 7 a variant of this algorithm that offers a two-pass space-optimal PCA method in the turnstile streaming model). Before presenting all these new algorithms in detail, we present the relevant results from the previous literature that we employ in the analysis. 2.1 Projection-cost preserving sketching matrices In this section, we recap a notion of sketching matrices which we call “projection-cost preserving sketching matrices”. A sketching matrix from this family is a linear matrix transformation and it has the property that for all projections it preserves, up to some error, the difference between the matrix in hand and its projection in Frobenius norm. Definition 9 (Projection-cost preserving sketching matrices). We say that W ∈ Rn×ξ is an (ε, k)projection-cost preserving sketching matrix of A ∈ Rm×n , if for all rank-k orthogonal projection matrices P ∈ Rm×m , it satisfies (1 − ε)kA − PAk2F ≤ kAW − PAWk2F + c ≤ (1 + ε)kA − PAk2F where c is a non-negative constant which only depends on A and W. We also call AW an (ε, k)-projectioncost preserving sketch of A. Due to the following lemma, we know that a good rank-k approximation projection matrix of (ε, k)-projection-cost preserving sketch AW also provides a good rank-k approximation to A. Lemma 10 (PCA via Projection-Cost Preserving Sketches - Lemma 3 in [24]). Suppose W ∈ Rn×ξ is ∗ an (ε, k)-projection-cost preserving sketching matrix of A ∈ Rm×n . Let P̂ = arg minrank(P)≤k kAW − ∗ PAWk2F . For all P̂, ε′ satisfying rank(P̂) ≤ k, ε′ ≥ 0, if kAW− P̂AWk2F ≤ (1+ε′ )kAW− P̂ AWk2F , kA − P̂Ak2F ≤ 1+ε · (1 + ε′ )kA − Ak k2F 1−ε [24] also provides several ways to construct projection-cost preserving sketching matrices. Because we mainly consider the communication, we just choose one which can reduce the dimension as much as possible. Furthermore, it is also an oblivious projection-cost preserving sketching matrix. Lemma 11 (Dense Johnson-Lindenstrauss matrix - part of Theorem 12 in [24]). √ For ε < √ 1, suppose n×ξ each entry of W ∈ R is chosen O(log(k))-wise independently and uniformly in {1/ ξ, −1/ ξ} where ξ = O(kε−2 ) [21]. For any A ∈ Rm×n , with probability at least 0.99, W is an (ε, k)-projection-cost preserving sketching matrix of A. 8 2.2 A batch algorithm for the fast low rank approximation of matrices In this section, we describe a new method for quickly computing a low-rank approximation to a given matrix. This method does not offer any specific advantages over previous such techniques [48, 23, 18]; however, this new algorithm can be implemented efficiently in the distributed setting (see Section 5.3) and in the streaming model of computation (see Section 7); in fact we are able to obtain communication-optimal and space-optimal results, respectively. For completeness as well as ease of presentation, we first present and analyze the simple batch version of the algorithm. The algorithm uses the dense Johnson-Lindenstrauss matrix of Lemma 27 in order to reduce both dimensions of A, before computing some sort of SVD to a poly(k/ε) × poly(k/ε) matrix (see Step 2 in the algorithm below). Consider the usual inputs: a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1. The algorithm below returns an orthonormal matrix U ∈ Rm×k such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . Algorithm 1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27). 2. Construct à = SAT. T 3. Compute the SVD of Ãk = UÃk ΣÃk Và (UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ). k 4. Construct X = ATVÃk 5. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k). Theorem 29 later in this section analyzes the approximation error and the running time of the previous algorithm. First, we prove the accuracy of the algorithm. Lemma 12. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98: kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . Proof. T T T kà − Ãk k2F = kà − ÃVÃk Và k2F = kSAT − SATVÃk Và k2F = kTT AT ST − VÃk Và TT AT ST k2F k k k T . The second equality is by the The first equality follows by the SVD of Ãk = UÃk ΣÃk Và k construction of à = SAT. The third equality is due to ∀M, kMk2F = kM T k2F . Due to Lemma 27, with probability at least 0.99, ST is an (ε, k)-projection-cost preserving sketch matrix of TT AT . According to Lemma 26, T T TT AT k2F ≤ k2F = kTT AT − VÃk Và kAT − ATVÃk Và k k 1+ε · kAT − (AT)k k2F 1−ε Observe that T T kUUT AT − ATk2F = kXX† AT − ATk2F ≤ kXVà − ATk2F = kATVÃk Và − ATk2F k which is at most 1+ε 1−ε · kAT − (AT)k k2F . 9 k (1) The first equality uses the fact that U is an orthonormal basis of span(X). The first inequality is followed by ∀X, M, N, kXX† M − Mk2F ≤ kXN − Mk2F . The second equality uses the construction that X = ATVÃk . The second inequality follows by Eqn (2). Due to Lemma 27, with probability at least 0.99, T is an (ε, k)-projection-cost preserving sketch matrix of A. Due to Lemma 26, kUUT A − Ak2F ≤ (1 + ε)2 · kA − Ak k2F (1 − ε)2 Due to union bound, the probability that ST is an (ε, k)-projection-cost preserving sketch matrix of TT AT and T is an (ε, k)-projection-cost preserving sketch matrix of A is at least 0.98. Note that (1+ε)2 is 1 + O(ε) when ε is small enough, so we can adjust ε here by a constant factor to show the (1−ε)2 statement. Next, we present the main theorem. Theorem 13. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98: kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . The running time of the algorithm is  O nmkε−2 + mk2 ε−4 + poly(kε−1 ) . Proof. The correctness is shown by Lemma 28. The running time is analyzed in Section 5. 2.3 The distributed PCA algorithm Ps Recall that the input matrix A ∈ Rm×n is partitioned arbitrarily as: A = i Ai for i = 1 : s, Ai ∈ Rm×n . The idea in the algorithm below is to implement the algorithm in Section 5.2 in the distributed setting. Input: 1. A ∈ Rm×n arbitrarily partitioned A = 2. rank parameter k < rank(A) Ps i Ai for i = 1 : s, Ai ∈ Rm×n . 3. accuracy parameter ε > 0 Algorithm 1. Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27). P 2. Each machine locally computes Ãi = SAi T and sends Ãi to the server. Server constructs à = i Ãi . T 3. Server computes the SVD of Ãk = UÃk ΣÃk Và (UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ). k 4. Server sends VÃk to all machines. 5. Each machine construct Xi = Ai TVÃk and sends Xi to the server. Server constructs X = 6. Server computes an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k). P i Xi . 7. Server sends U to each machine. Notice that in the first step, S and T can be described using a random seed that is O(log(k))wise independent due to Lemma 27. The major remaining challenge here is to obtain small bit complexity, since this protocol could have very large bit complexity. See Section 5 in the Appendix for the full details of our algorithm. 10 References [1] http://hadoop.apache.org/. [2] https://mahout.apache.org. [3] https://spark.apache.org/. [4] https://spark.apache.org/mllib/. [5] D. Achlioptas. Database-friendly random projections: Johnson-lindenstrauss with binary coins. J. Comput. Syst. Sci., 66(4):671–687, 2003. [6] N. Ailon and E. Liberty. Fast dimension reduction using rademacher series on dual bch codes. In ACM-SIAM Symposium on Discrete Algorithms (SODA), 2008. [7] N. Alon and V. H. Vu. Anti-hadamard matrices, coin weighing, threshold gates, and indecomposable hypergraphs. J. Comb. Theory, Ser. A, 79(1):133–160, 1997. [8] A. Andoni and H. L. Nguyen. Eigenvalues of a matrix in the streaming model. In Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New Orleans, Louisiana, USA, January 6-8, 2013, pages 1729–1737, 2013. [9] Z.-J. Bai, R. H. Chan, and F. T. Luk. Principal component analysis for distributed data sets with updating. In Advanced Parallel Processing Technologies, pages 471–483. Springer, 2005. [10] M.-F. Balcan, V. Kanchanapally, Y. Liang, and D. Woodruff. Improved distributed principal component analysis. arXiv preprint arXiv:1408.5823, to appear in NIPS, 2014. [11] J. Batson, D. Spielman, and N. Srivastava. Twice-ramanujan sparsifiers. In Proceedings of the 41st annual ACM symposium on Theory of computing, pages 255–262. ACM, 2009. [12] A. R. Benson, D. F. Gleich, and J. Demmel. Direct qr factorizations for tall-and-skinny matrices in mapreduce architectures. In Big Data, 2013 IEEE International Conference on, pages 264–272. IEEE, 2013. [13] S. Bhojanapalli, P. Jain, and S. Sanghavi. Tighter low-rank approximation via sampling the leveraged element. http://uts.cc.utexas.edu/˜bsrinadh/main.pdf, to appear in SODA, 2015. [14] L. S. Blackford, J. Choi, A. Cleary, E. D’Azevedo, J. Demmel, I. Dhillon, J. Dongarra, S. Hammarling, G. Henry, A. Petitet, et al. ScaLAPACK users’ guide, volume 4. siam, 1997. [15] Y.-A. L. Borgne, S. Raybaud, and G. Bontempi. Distributed principal component analysis for wireless sensor networks. Sensors, 2008. [16] J. Bourgain, S. Dirksen, and J. Nelson. Toward a unified theory of sparse dimensionality reduction in euclidean space. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015, pages 499–508, 2015. [17] C. Boutsidis, P. Drineas, and M. Magdon-Ismail. Near optimal column based matrix reconstruction. SIAM Journal on Computing (SICOMP), 2013. 11 [18] C. Boutsidis and A. Gittens. Improved matrix algorithms via the subsampled randomized hadamard transform. SIAM Journal on Matrix Analysis and Applications, 34(3):1301–1340, 2013. [19] C. Boutsidis and D. P. Woodruff. Optimal cur matrix decompositions. STOC, 2014. [20] A. Chakrabarti and O. Regev. An optimal lower bound on the communication complexity of gap-hamming-distance. SIAM Journal on Computing, 41(5):1299–1317, 2012. [21] K. Clarkson and D. Woodruff. Numerical linear algebra in the streaming model. In Proceedings of the 41st annual ACM symposium on Theory of computing (STOC), 2009. [22] K. L. Clarkson and D. P. Woodruff. Low rank approximation and regression in input sparsity time. In In STOC, 2013. [23] K. L. Clarkson and D. P. Woodruff. Low rank approximation and regression in input sparsity time. ArxiV report: http://arxiv.org/pdf/1207.6365v4.pdf, 2013. [24] M. Cohen, S. Elder, C. Musco, C. Musco, and M. Persu. Dimensionality reduction for k-means clustering and low rank approximation. arXiv preprint arXiv:1410.6801, 2014. [25] M. B. Cohen. Simpler and tighter analysis of sparse oblivious subspace embeddings. In SODA, 2016. [26] A. Deshpande, L. Rademacher, S. Vempala, and G. Wang. Matrix approximation and projective clustering via volume sampling. Theory of Computing, 2(12):225–247, 2006. [27] A. Deshpande and S. Vempala. Adaptive sampling and fast low-rank matrix approximation. In RANDOM - APPROX, 2006. [28] A. K. Farahat, A. Elgohary, A. Ghodsi, and M. S. Kamel. Distributed column subset selection on mapreduce. In Data Mining (ICDM), 2013 IEEE 13th International Conference on, pages 171– 180. IEEE, 2013. [29] D. Feldman, M. Schmidt, and C. Sohler. Turning big data into tiny data: Constant-size coresets for k-means, pca and projective clustering. In SODA, pages 1434–1453. SIAM, 2013. [30] S. Friedland and A. Torokhti. Generalized rank-constrained matrix approximations. SIAM Journal on Matrix Analysis and Applications, 29(2):656–659, 2007. [31] M. Ghashami and J. Phillips. Relative errors for deterministic low-rank matrix approximations. In SODA, 2013. [32] G. H. Golub and C. F. Van Loan. Matrix computations, volume 3. JHU Press, 2012. [33] M. Gu and S. C. Eisenstat. A divide-and-conquer algorithm for the bidiagonal svd. SIAM Journal on Matrix Analysis and Applications, 16(1):79–92, 1995. [34] R. Horn and C. Johnson. Matrix Analysis. Cambridge University Press, New York, 1985. [35] E. Jessup and D. Sorensen. A parallel algorithm for computing the singular value decomposition of a matrix. Siam Journal on Matrix Analysis and Applications, 15(2):530–548, 1994. [36] R. Kannan, S. Vempala, and D. P. Woodruff. Nimble algorithms for cloud computing. arXiv preprint arXiv:1304.3162, v3, 2013. 12 [37] R. Kannan, S. S. Vempala, and D. P. Woodruff. Principal component analysis and higher correlations for distributed data. In Proceedings of The 27th Conference on Learning Theory, pages 1040–1057, 2014. [38] M. Kapralov and K. Talwar. On differentially private low rank approximation. In Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New Orleans, Louisiana, USA, January 6-8, 2013, pages 1395–1414, 2013. [39] D. Kempe and F. McSherry. A decentralized algorithm for spectral analysis. In Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, pages 561–568. ACM, 2004. [40] Y. Li, H. L. Nguyên, and D. P. Woodruff. On sketching matrix norms and the top singular vector. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1562–1581. SIAM, 2014. [41] E. Liberty. Simple and deterministic matrix sketching. In KDD, pages 581–588. ACM, 2013. [42] S. V. Macua, P. Belanovic, and S. Zazo. Consensus-based distributed principal component analysis in wireless sensor networks. In Signal Processing Advances in Wireless Communications (SPAWC), 2010 IEEE Eleventh International Workshop on, pages 1–5. IEEE, 2010. [43] X. Meng and M. W. Mahoney. Low-distortion subspace embeddings in input-sparsity time and applications to robust linear regression. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 91–100. ACM, 2013. [44] J. Nelson and H. L. Nguyên. Osnap: Faster numerical linear algebra algorithms via sparser subspace embeddings. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on, pages 117–126. IEEE, 2013. [45] J. M. Phillips, E. Verbin, and Q. Zhang. Lower bounds for number-in-hand multiparty communication complexity, made easy. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012, pages 486– 501, 2012. [46] J. Poulson, B. Marker, R. A. van de Geijn, J. R. Hammond, and N. A. Romero. Elemental: A new framework for distributed memory dense matrix computations. ACM Transactions on Mathematical Software (TOMS), 39(2):13, 2013. [47] Y. Qu, G. Ostrouchov, N. Samatova, and A. Geist. Principal component analysis for dimension reduction in massive distributed data sets. In Proceedings of IEEE International Conference on Data Mining (ICDM), 2002. [48] T. Sarlos. Improved approximation algorithms for large matrices via random projections. In IEEE Symposium on Foundations of Computer Science (FOCS), 2006. [49] K. C. Sou and A. Ranzer. On generalized matrix approximation problem in the spectral norm. Linear Algebra and its Applications, 436(7):2331–2341, 2012. [50] F. Tisseur and J. Dongarra. A parallel divide and conquer algorithm for the symmetric eigenvalue problem on distributed memory architectures. SIAM Journal on Scientific Computing, 20(6):2223–2236, 1999. 13 [51] M. D. Vose. A linear algorithm for generating random numbers with a given distribution. Software Engineering, IEEE Transactions on, 17(9):972–975, 1991. [52] V. H. Vu and T. Tao. The condition number of a randomly perturbed matrix. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pages 248–255, 2007. [53] D. Woodruff. Low rank approximation lower bounds in row-update streams. In Advances in Neural Information Processing Systems, pages 1781–1789, 2014. [54] D. Woodruff and P. Zhong. Distributed low rank approximation of implicit functions of a matrix. In manuscript, 2015. [55] D. P. Woodruff. Sketching as a tool for numerical linear algebra. Foundations and Trends in Theoretical Computer Science, 10(1-2):1–157, 2014. 14 3 Related Work Distributed PCA (or distributed SVD) algorithms have been investigated for a long time. One line of work, developed primarily within the numerical linear algebra literature, studies such algorithms from the perspective of parallelizing existing standard SVD algorithms without sacrificing accuracy. This approach aims at high accuracy implementations with the least possible communication cost. The distributed models of computation go typically beyond the column-partition model and arbitrary-partition model that we study in this paper [46]. An extensive survey of this line of work is out of the scope of our paper; we refer the reader to [35, 50, 33] and references therein for more details as well as to popular software for distributed SVD such ScaLAPACK [14] and Elemental [46]. Another line of work for distributed PCA algorithms has emerged within the machine learning and datamining communities. Such algorithms have been motivated by the need to apply SVD or PCA to extremely large matrices encoding enormous amounts of data. The algorithms in this line of research are typically heuristic approaches that work well in practice but come with no rigorous theoretical analysis. We refer the reader to [47, 42, 9, 15] for more details. Finally, distributed PCA algorithms in the column-partition model have been recently studied within the theoretical computer science community. Perhaps the more intuitive algorithm for PCA in this model appeared in [29, 10]: first, a number of left singular vectors and singular values are computed in each machine; then, the server collects those singular vectors and concatenates them column-wise in a new matrix and then it computes the top k left singular vectors of this “aggregate” matrix. It is shown in [29, 10] that if the number of singular vectors and singular values in the first step is O(kε−1 ), then, the approximation error in Frobenius norm is at most (1 + ε) times the optimal Frobenius norm error; the communication cost is O(skmε−1 ) real numbers because each of the s machines sends O(kε−1 ) singular vectors of dimension m; unfortunately, it is unclear how one can obtain a communication cost in terms of words/bits. A different algorithm with the same communication cost (only in terms of real numbers since a word/bit communication bound remained unexplored) is implicit in [41, 31] (see Theorem 3.1 in [31] and the discussion in Section 2.2 in [41]). Kannan, Vempala and Woodruff proposed arbitrary-partition model in [37]. They developed a (1 + ε) Frobenius norm error algorithm with communication cost  −1 2 −4 O skmε + sk ε words. Bhojanapalli, Jain, and Sanghavi in [13] developed an algorithm that provides a bound with respect to the spectral norm. Their algorithm is based on sampling elements from the input matrix, but the communication cost is prohibitive if n is large. The cost also depends on the condition number of A. Moreover, to implement the algorithm, one needs to know kA − Ak kF . Finally, [39] discussed a distributed implementation of the “orthogonal iteration” to compute eigenvectors of graphs. The model they consider is different, but perhaps their protocol could be extended to our model. 4 Preliminaries Definitions. We formally define the problems and the models here. Definition 14 (Arbitrary-partition model). P An m×n matrix A is arbitrarily partitioned into s matrices Ai ∈ Rm×n , i.e., for i = 1, 2, . . . , s: A = si=1 Ai . There are s machines, and the i-th machine has Ai as input. There is also another machine, to which we refer to as the “server”, which acts as the central coordinator. The model only allows communication between the machines and the server. The communication cost of an algorithm in this model is defined as the total number of words transferred between the machines and the server, where we assume each word is O(log(nms/ε)) bits. 15 Reference kA − UUT Ak2 ≤ kA − UUT Ak2 F ≤ δ Communication cost Implicit in [29] - (1 + ε)kA − Ak k2 F 0 - Theorem 2 in [10] - (1 + ε)kA − Ak k2 F 0 - Theorem 6 in [10] - (1 + ε)kA − Ak k2 F >0 - Implicit in [41, 31] - (1 + ε)kA − Ak k2 F 0 O(mnkε−2 ) Thm 1.1 in [37]* - (1 + ε)kA − Ak k2 F O(1) Thm 5.1 in [13] kA − Ak k2 + Γ - >0 Remark p. 11 [13] kA − Ak k2 + Γ - >0 Theorem 43* - (1 + ε)kA − Ak k2 F O(1) -   O skmε−1 + sk2 ε−4   5 −2 O sm + nk ε ∆   O sm + nk3 ε−2 ∆ Theorem 63 - (1 + ε)kA − Ak k2 F O(1) O(skφε−1 + sk2 ε−4 ) Theorem 74 - (1 + ε)kA − Ak k2 F O(1) O(skφε−1 + sk3 ε−5 ) O (mns · poly(k, 1/ε))  O(skm + sk3 ε−5 ) Total  number of arithmetic operations  O mn min{m, n} + mskε−1 min{m, skε−1 }   O mn min{m, n} + mskε−1 min{m, skε−1 }        2 2 3 log sk log m O nnz(A) + s m 4k + k m 6 ε dε ε ε O(poly(m, n, k, s, ε−1 ))   −2 2 O nnz(A) + δ −1 nk5 ε−2 σ1 (A)σk (A)   −2 2 O nnz(A) + δ −1 nk5 ε−2 σ1 (A)σk (A)   O mnkε−2 + mk2 ε−4 + poly(kε−1 ) .  O nnz(A) · log2 ( ns ) + (m + n) · s · poly( k log( ns ) . δ ε δ Table 4: Distributed PCA Algorithms in the column-partition model with s machines (see Definition 15). ∗ indicates that the algorithm can also be applied in the arbitrary partition model (see Definition 14). A ∈ Rm×n has rank ρ, U ∈ Rm×k with k < ρ is orthonormal, 0 < ε < 1, and each column of A contains at most φ ≤ m  non-zero elements. δ is the failure probability. Finally, for −1 . notational convenience let Γ := εkA − Ak kF , ∆ := σ12 (A)σk−2 (A) log2 kAk2 kA − Ak k−1 F ε Definition 15 (Column-partition model). An m × n matrix A is partitioned arbitrarily column-wise  P m×w i into s blocks Ai ∈ R , i.e., for i = 1, 2, . . . , s: A = A1 A2 . . . As . Here, wi = n. There are s machines, and the i-th machine has Ai as input. There is also another machine, to which we refer to as the “server”, which acts as the central coordinator. The model only allows communication between the machines and the server. The communication cost of an algorithm in this model is defined as the total number of words transferred between the machines and the server, where we assume each word is O(log(nms/ε)) bits. Definition 16 (The Distributed Principal Component Analysis Problem in arbitrary partition Psmodel). m×n Give an m×n matrix A arbitrarily partitioned into s matrices Ai ∈ R (i : 1, 2, . . . , s): A = i=1 Ai , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of Definition 14 which, upon termination, leaves on each machine a matrix U ∈ Rm×k with k orthonormal columns such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and the communication cost of the algorithm is as small as possible. Definition 17 (The Distributed Principal Component Analysis Problem in column partition model). Given an m × n matrix A partitioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s): A = A1 A2 . . . As , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of Definition 15 which, upon termination, leaves on each machine a matrix U ∈ Rm×k with k orthonormal columns such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and the communication cost of the algorithm is as small as possible. Definition 18 (The Distributed Column Subset Selection Problem). Given an m × n matrix A par titioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s): A = A1 A2 . . . As , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of Definition 15 that, upon termination, leaves on each machine a matrix C ∈ Rm×c with c < n columns of A such that kA − CC† Ak2F ≤ (1 + ε) · kA − Ak k2F , and 1. The number of selected columns c is as small as possible. 2. The communication cost of the algorithm is as small as possible. Definition 19 (The Distributed Column Subset Selection Problem - rank k subspace version). Given an m × n matrix Apartitioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s): A = A1 A2 . . . As , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of Definition 15 that, upon termination, leaves on each machine a matrix C ∈ Rm×c with c < n columns of A and a matrix U ∈ Rm×k with k orthonormal columns with U ∈ span(C), such that kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and 16 1. The number of selected columns c is as small as possible. 2. The communication cost of the algorithm is as small as possible. Definition 20 (Streaming model for Principal Component Analysis). Let all the entries in A ∈ Rm×n initially be zeros. In the streaming model of computation, there is a stream of update operations that the q th operation has form (iq , jq , xq ) which indicates that Aiq ,jq should be incremented by xq where iq ∈ {1, ..., m}, jq ∈ {1, ..., n}, xq ∈ R. An algorithm is allowed a single pass over the stream. At the end of the stream the algorithm stores some information regarding A which we call a “sketch” of A. The space complexity of an algorithm in this model is defined as the total number of words required to describe the information the algorithm stores during the stream including the sketch. Each word is O(log(nms/ε)) bits. Definition 21 (The Streaming Principal Component Analysis Problem). Given an m × n matrix A, a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm that, using as little space as possible, first finds a sketch of A in the streaming model (see Definition 20) and then, using only this sketch outputs U ∈ Rm×k with k orthonormal columns such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . Definition 22 (The Streaming Principal Component Analysis Problem (factorization)). Given an m × n matrix A, a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm that, using as little space as possible, first finds a sketch of A in the streaming model (see Definition 20) and then, using only this sketch outputs A∗k ∈ Rm×n with rank(A∗k ) ≤ k such that kA−A∗k k2F ≤ (1 + ε) · kA − Ak k2F . Notation. A, B, . . . are matrices; a, b, . . . are column vectors. In is the n × n identity matrix; 0m×n is the m × n matrix of zeros; 1n is the n × 1 vector of ones; ei is the standard basis (whose dimensionality will be clear from the context): the ith element of ei is one and the rest are zeros. A(i) and A(j) denotes the ith column and jth row of A, respectively. Aij is the (i, j)th entry in A. Sampling Matrices. Let A = [A(1) , . . . , A(n) ] ∈ Rm×n and let C = [A(i1 ) , . . . , A(ic ) ] ∈ Rm×c consist of c < n columns of A. Note that we can write C = AΩ, where the sampling matrix is Ω = [ei1 , . . . , eic ] ∈ Rn×c (here ei are the standard basis vectors in Rn ). If D ∈ Rc×c is a diagonal matrix, then AΩD contains c columns of A rescaled with the corresponding elements in D. We abbreviate S := ΩD, hence the matrix S ∈ Rn×c “samples” and “rescales” c columns from A. P Matrix norms. We use the Frobenius and the spectral matrix-norms: kAk2F = i,j A2ij ; kAk2 = maxkxk2 =1 kAxk2 . kAkξ is used if a result holds for both norms ξ = 2 and ξ = F. The standard submultiplicativity property for matrix norms implies that for any A and B: kABkξ ≤ kAkξ ·kBkξ . The triangle inequality for matrix norms implies that kA + Bkξ ≤ kAkξ + kBkξ . A version of the triangle inequality for the norms squared is: kA + Bk2ξ ≤ 2 · kAk2ξ + 2 · kBk2ξ . A version of the matrix pythagorean theorem is: if AT B is the all-zeros matrix, then kA + Bk2F = kAk2F + kBk2F . If V has orthonormal columns, then kAV T kξ = kAkξ , for any A. If P is a symmetric projection matrix (i.e., P = PT and P2 = P) then, kPAkξ ≤ kAkξ , for any A. 17 Singular Value Decomposition (SVD) and Moore-Penrose Pseudo-inverse. Rm×n with rank(A) = ρ is     Σk VkT 0 A = Uk Uρ−k , T 0 Σρ−k Vρ−k {z } | | {z } | {z } UA ∈Rm×ρ ΣA ∈Rρ×ρ The SVD of A ∈ T VA ∈Rρ×n with singular values σ1 ≥ . . . σk ≥ σk+1 ≥ . . . ≥ σρ > 0. Here, k < ρ. We will use σi (A) to denote the i-th singular value of A when the matrix is not clear from the context. The matrices Uk ∈ Rm×k and Uρ−k ∈ Rm×(ρ−k) contain the left singular vectors of A, and, similarly, the matrices Vk ∈ Rn×k and Vρ−k ∈ Rn×(ρ−k) contain the right singular vectors of A. It is well-known that Ak = Uk Σk VkT = AVk VkT = Uk UkT A minimizes kA − Xkξ over P all matrices X ∈ Rm×n of rank 2 2 2 at most k. Specifically, kA − Ak k2 = σk+1 (A) and kA − Ak kF = ρi=k+1 σi2 (A) (see [32]). A† = T n×m denotes the so-called Moore-Penrose pseudo-inverse of A ∈ Rm×n (here Σ−1 VA Σ−1 A A UA ∈ R is the inverse of ΣA ). By the SVD of A and A† , for all i = 1, . . . , ρ = rank(A) = rank(A† ): σi (A† ) = 1/σρ−i+1 (A). 4.1 The best rank k matrix ΠξV,k (A) within a subspace V Our analysis uses theory involving computing the best rank k approximation of a matrix A within a given column subspace V. Let A ∈ Rm×n , let k < n be an integer, and let V ∈ Rm×c with m×n is the best rank k approximation to A in the column span of V. k < c < n. ΠF V,k (A) ∈ R Equivalently, we can write ΠF V,k (A) = VXopt , where Xopt = X∈R argmin kA − VXk2F . :rank(X)≤k c×n In order to compute ΠF V,k (A) given A, V, and k, one can use the following algorithm: V = YΨ is a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c. This step requires O(mc2 ) arithmetic operations. 2: Ξ = Y T A ∈ Rc×n . This step requires O(mnc) arithmetic operations. 1: T Ξk = ∆Σ̃k Ṽk ∈ Rc×n is a rank k SVD of Ξ with ∆ ∈ Rc×k , Σ̃k ∈ Rk×k , and Ṽk ∈ Rn×k . This step requires O(nc2 ) arithmetic operations. 4: Return Y∆∆T Y T A ∈ Rm×n of rank at most k. 3: Notice that Y∆∆T Y T A ∈ Rm×n is a rank k matrix that lies in the column span of V. The next lemma is a simple corollary of Lemma 4.3 in [21]. T Lemma 23. Given A ∈ Rm×n , V ∈ Rm×c and an integer k, Y∆∆T Y T and QŨk Σ̃k Ṽk satisfy: T 2 kA − Y∆∆T Y T Ak2F ≤ kA − Y∆Σ̃k Ṽk k2F = kA − ΠF V,k (A)kF The above algorithm requires O(mnc + nc2 ) arithmetic operations to construct Y, Ψ, and ∆. We will denote the above procedure as [Y, Ψ, ∆] = BestColumnSubspaceSV D(A, V, k). Proof. The equality was proven in Lemma 4.3 in [21]. To prove the inequality, notice that for any matrix X : kA − Y∆(Y∆)† Ak2F ≤ kA − Y∆Xk2F . Also, (Y∆)† = ∆† Y† = ∆T Y T , because both matrices are orthonormal. 18 Next, we state a version of the above lemma for the transpose of A, equivalently for the best rank k approximation within the row space of a given subspace R. Let A ∈ Rm×n , let k < n be an m×n is the best rank k approximation to A integer, and let R ∈ Rc×n with k < c < m. ΠF R,k (A) ∈ R in the row span of R. Equivalently, we can write ΠF R,k (A) = Xopt R, where Xopt = argmin kA − XRk2F . X∈Rm×c :rank(X)≤k In order to compute ΠF R,k (A) given A, R, and k, one can use the following algorithm: RT = YZ is a qr decomposition of RT with Y ∈ Rn×c and Z ∈ Rc×c . This step requires O(nc2 ) arithmetic operations. 2: Ξ = AY ∈ Rm×c . This step requires O(mnc) arithmetic operations. 3: Ξk = Ũk Σ̃k ∆T ∈ Rm×c is a rank k SVD of Ξ with Ũk ∈ Rm×k , Σ̃k ∈ Rk×k , and ∆ ∈ Rc×k . This step requires O(mc2 ) arithmetic operations. 4: Return AY∆∆T Y T ∈ Rm×n of rank at most k. 1: Notice that AY∆∆T Y T ∈ Rm×n is a rank k matrix that lies in the row span of R. The next lemma is a corollary of Lemma 23 when applied with A := AT and V := RT . Lemma 24. Given A ∈ Rm×n , R ∈ Rc×n and an integer k, Y∆∆T Y T and Ũk Σ̃k ∆T satisfy: 2 kA − AY∆∆T Y T k2F ≤ kA − Ũk Σ̃k ∆T Rk2F = kA − ΠF R,k (A)kF . The above algorithm requires O(mnc + mc2 ) arithmetic operations to construct Y, Z, and ∆. We will denote the above procedure as [Y, Z, ∆] = BestRowSubspaceSV D(A, R, k). 5 Distributed PCA in the arbitrary partition model This section describes a fast distributed PCA algorithm with total communication O(msk) words plus low order terms, which is optimal in the arbitrary partition model in the sense that an Ω̃(msk) bits lower bound was given by [37]. The algorithm employs, in a novel way, the notion of projection-cost preserving sketches from [24]. In particular, whereas all previous [48, 23] dimensionreduction-based SVD methods reduce one dimension of the input matrix to compute some approximation to the SVD, our method reduces both dimensions and computes an approximation to the SVD from a small almost square matrix. Unlike [37] which reduces only one dimension in the first communication round, we do the reduction on both dimensions in the same round. We first present the batch version of the algorithm which offers a new low-rank matrix approximation technique; a specific implementation of this algorithm offers a communication-optimal distributed PCA algorithm (we also discuss in Section 7 a variant of this algorithm that offers a two-pass space-optimal PCA method in the turnstile streaming model). Before presenting all these new algorithms in detail, we present the relevant results from the previous literature that we employ in the analysis. 19 5.1 Projection-cost preserving sketching matrices In this section, we recap a notion of sketching matrices which we call “projection-cost preserving sketching matrices”. A sketching matrix from this family is a linear matrix transformation and it has the property that for all projections it preserves, up to some error, the difference between the matrix in hand and its projection in Frobenius norm. Definition 25 (Projection-cost preserving sketching matrices). We say that W ∈ Rn×ξ is an (ε, k)projection-cost preserving sketching matrix of A ∈ Rm×n , if for all rank-k orthogonal projection matrices P ∈ Rm×m , it satisfies (1 − ε)kA − PAk2F ≤ kAW − PAWk2F + c ≤ (1 + ε)kA − PAk2F where c is a non-negative constant which only depends on A and W. We also call AW an (ε, k)-projectioncost preserving sketch of A. Due to the following lemma, we know that a good rank-k approximation projection matrix of (ε, k)-projection-cost preserving sketch AW also provides a good rank-k approximation to A. Lemma 26 (PCA via Projection-Cost Preserving Sketches - Lemma 3 in [24]). Suppose W ∈ Rn×ξ is ∗ an (ε, k)-projection-cost preserving sketching matrix of A ∈ Rm×n . Let P̂ = arg minrank(P)≤k kAW − ∗ PAWk2F . For all P̂, ε′ satisfying rank(P̂) ≤ k, ε′ ≥ 0, if kAW− P̂AWk2F ≤ (1+ε′ )kAW− P̂ AWk2F , kA − P̂Ak2F ≤ 1+ε · (1 + ε′ )kA − Ak k2F 1−ε [24] also provides several ways to construct projection-cost preserving sketching matrices. Because we mainly consider the communication, we just choose one which can reduce the dimension as much as possible. Furthermore, it is also an oblivious projection-cost preserving sketching matrix. Lemma 27 (Dense Johnson-Lindenstrauss matrix - part of Theorem 12 in [24]). √ For ε < √ 1, suppose n×ξ each entry of W ∈ R is chosen O(log(k))-wise independently and uniformly in {1/ ξ, −1/ ξ} where ξ = O(kε−2 ) [21]. For any A ∈ Rm×n , with probability at least 0.99, W is an (ε, k)-projection-cost preserving sketching matrix of A. 5.2 A batch algorithm for the fast low rank approximation of matrices In this section, we describe a new method for quickly computing a low-rank approximation to a given matrix. This method does not offer any specific advantages over previous such techniques [48, 23, 18]; however, this new algorithm can be implemented efficiently in the distributed setting (see Section 5.3) and in the streaming model of computation (see Section 7); in fact we are able to obtain communication-optimal and space-optimal results, respectively. For completeness as well as ease of presentation, we first present and analyze the simple batch version of the algorithm. The algorithm uses the dense Johnson-Lindenstrauss matrix of Lemma 27 in order to reduce both dimensions of A, before computing some sort of SVD to a poly(k/ε) × poly(k/ε) matrix (see Step 2 in the algorithm below). Consider the usual inputs: a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1. The algorithm below returns an orthonormal matrix U ∈ Rm×k such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . Algorithm 20 1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27). 2. Construct à = SAT. T 3. Compute the SVD of Ãk = UÃk ΣÃk Và (UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ). k 4. Construct X = ATVÃk 5. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k). Theorem 29 later in this section analyzes the approximation error and the running time of the previous algorithm. First, we prove the accuracy of the algorithm. Lemma 28. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98: kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . Proof. T T T k2F = kSAT − SATVÃk Và k2F = kTT AT ST − VÃk Và TT AT ST k2F kà − Ãk k2F = kà − ÃVÃk Và k k k T The first equality follows by the SVD of Ãk = UÃk ΣÃk Và . The second equality is by the k construction of à = SAT. The third equality is due to ∀M, kMk2F = kM T k2F . Due to Lemma 27, with probability at least 0.99, ST is an (ε, k)-projection-cost preserving sketch matrix of TT AT . According to Lemma 26, T T kAT − ATVÃk Và k2F = kTT AT − VÃk Và TT AT k2F ≤ k k 1+ε · kAT − (AT)k k2F 1−ε (2) Observe that kUUT AT − ATk2F = kXX† AT − ATk2F T ≤ kXVà − ATk2F k T = kATVÃk Và − ATk2F k ≤ 1+ε · kAT − (AT)k k2F 1−ε The first equality uses the fact that U is an orthonormal basis of span(X). The first inequality is followed by ∀X, M, N, kXX† M − Mk2F ≤ kXN − Mk2F . The second equality uses the construction that X = ATVÃk . The second inequality follows by Eqn (2). Due to Lemma 27, with probability at least 0.99, T is an (ε, k)-projection-cost preserving sketch matrix of A. Due to Lemma 26, kUUT A − Ak2F ≤ (1 + ε)2 · kA − Ak k2F (1 − ε)2 Due to union bound, the probability that ST is an (ε, k)-projection-cost preserving sketch matrix of TT AT and T is an (ε, k)-projection-cost preserving sketch matrix of A is at least 0.98. Note that (1+ε)2 is 1 + O(ε) when ε is small enough, so we can adjust ε here by a constant factor to show the (1−ε)2 statement. Next, we present the main theorem. 21 Theorem 29. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98: kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . The running time of the algorithm is  O nmkε−2 + mk2 ε−4 + poly(kε−1 ) . Proof. The correctness is shown by Lemma 28. Running time. Next, we analyze the running time of the algorithm: 1. There are a total of (ξ1 × m + ξ2 × n) entries of S and T. It is enough to generate them in O((n + m)kε−2 ) operations. 2. We first compute AT with O(mnξ2 ) arithmetic operations. Then, we compute SAT with O(ξ1 mξ2 ) arithmetic operations. 3. This step requires O(poly(k/ε)) operations since we compute the SVD of a O(poly(k/ε)) × O(poly(k/ε)) matrix Ã. 4. We already have AT from the second step. Hence, O(mξ2 k) additional arithmetic operations suffice to compute ATVÃk 5. O(mk2 ) operations suffice to compute an orthonormal basis for X, e.g., with a QR factorization. 5.3 The distributed PCA algorithm Ps Recall that the input matrix A ∈ Rm×n is partitioned arbitrarily as: A = i Ai for i = 1 : s, m×n Ai ∈ R . The idea in the algorithm below is to implement the algorithm in Section 5.2 in the distributed setting. Input: 1. A ∈ Rm×n arbitrarily partitioned A = 2. rank parameter k < rank(A) Ps i Ai for i = 1 : s, Ai ∈ Rm×n . 3. accuracy parameter ε > 0 Algorithm 1. Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27). P 2. Each machine locally computes Ãi = SAi T and sends Ãi to the server. Server constructs à = i Ãi . T 3. Server computes the SVD of Ãk = UÃk ΣÃk Và (UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ). k 4. Server sends VÃk to all machines. 5. Each machine construct Xi = Ai TVÃk and sends Xi to the server. Server constructs X = 6. Server computes an orthonormal basis U ∈ R m×k 7. Server sends U to each machine. for span(X) (notice that rank(X) ≤ k). P i Xi . Notice that in the first step, S and T can be described using a random seed that is O(log(k))wise independent due to Lemma 27. 22 5.3.1 Main result The theorem below analyzes the approximation error, the communication complexity, and the running time of the previous algorithm. Notice that the communication cost of this algorithm is only given in terms of “real numbers”. The only step where we can not bound the length of a machine word is when the server communicates VÃk to all machines; and this is because the entries of VÃk could be unbounded (see the discussion regarding the upper bounds in Section 1.2). We resolve this issue in the following section. Theorem 30. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.98: kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . (3) The communication cost of the algorithm is O(msk + s · poly(k/ε)) “real numbers” and the running time is of the order  O nmkε−2 + mk2 ε−4 + poly(kε−1 ) . Proof. The matrix U - up to the randomness in the algorithm - is exactly the same matrix as in the batch algorithm in Section 5.2, hence Theorem 29 proves Eqn. 3. The algorithm communicates O(msk + s · poly(k/ε)) real numbers in total: O(s · poly(k/ε)) in steps 2 and 4, and O(smk) in steps 5 and 7. The operations in the algorithm are effectively the same operations as in the batch algorithm in Section 5.2, hence the analysis of the running time in Theorem 29 shows the claim. 6 Obtaining bit complexity for the distributed PCA algorithm For the algorithm in the previous section, we were only able to provide a communication upper bound in terms of “real numbers”. In this section, we describe how to obtain a communication upper bound in terms of words for the above protocol, where each word is O(log(mnsk/ε)) bits. The basic idea is that we have a case analysis depending on the rank of the matrix A. If the rank of A is less than or equal to 2k, we follow one distributed protocol and if the rank is at least 2k we follow a different protocol. In Section 6.1, Section 6.2, and Section 6.3 we describe the algorithm that tests the rank of a distributed matrix, and the two PCA protocols, respectively. Then, in Section 6.4 we give the details of the overall algorithm and in Section 6.5 we give its analysis. 6.1 Testing the rank of a distributed matrix Lemma 31. Given A ∈ Rm×n and a rank parameter k < rank(A), there exists a distributed protocol in the arbitrary partition model to test if the rank of A is less than or equal to 2k using O(sk2 ) words of communication and succeeding with probability 1 − δ for an arbitrarily small constant δ > 0. Proof. This is an immediate implementation of a streaming algorithm due to [21] for testing if an n × n matrix A has rank at least 2k in the streaming model, using O(k2 ) words of space. In that algorithm, there is a fixed 6nk/δ × n matrix H whose entries are integers of magnitude at most poly(n), where δ > 0 is an arbitrarily small constant. The algorithm simply chooses 4k random 23 rows from H. Letting H′ be the 2k × n matrix of the first 2k random rows, and H′′ be the n × 2k matrix whose columns are the next 2k randomly chosen rows, the algorithm just declares that A has rank at least k iff the rank of H′ AH′′ is 2k. The above streaming algorithm can be implemented in the distributed setting by having the coordinator choose 4k random rows of the fixed, known matrix, and send the row identities to each of the machines. This only takes O(sk) words of communication. Then machine i computes H′ Ai H′′ , and returns this to the coordinator. The coordinator can then add these up to compute H′ AH′′ and compute its rank. The total communication is O(sk 2 ) words and the protocol succeeds with probability at least 1 − δ for an arbitrarily small constant δ > 0. Note that we can assume our input matrix A, which is m × n, is a square n × n matrix by padding with all-zeros rows. Those rows of course, will never get communicated in the implementation described above. 6.2 Distributed PCA protocol when rank(A) ≤ 2k 6.2.1 Subsampled Randomized Hadamard Transform and Affine Embeddings Our algorithms use the following tool, known as “Subsampled Randomized Hadamard Transform” or SRHT for short, to implement efficiently fast dimension reduction in large matrices. Definition 32 (Normalized Walsh–Hadamard Matrix). Fix an integer m = 2p , for p = 1, 2, 3, .... The (non-normalized) m × m matrix of the Walsh–Hadamard transform is defined recursively as,     Hm/2 Hm/2 +1 +1 . , with H2 = Hn = +1 −1 Hm/2 −Hm/2 1 The m × m normalized matrix of the Walsh–Hadamard transform is equal to H = m− 2 Hm ∈ Rm×m . Definition 33 (Subsampled Randomized Hadamard Transform (SRHT) matrix). Fix integers ξ and m = 2p with ξ < m and p = 1, 2, 3, .... An SRHT matrix is an ξ × m matrix of the form r m T= · RHD; ξ • D ∈ Rm×m is a random diagonal matrix whose entries are independent random signs, i.e. random variables uniformly distributed on {±1}. • H ∈ Rm×m is a normalized Walsh–Hadamard matrix (see Definition 32). • R ∈ Rξ×m is a subset or r rows from the n × n identity matrix, where the rows are chosen uniformly at random and without replacement. The next lemma argues that an SRHT matrix is a so-called “affine embedding matrix”. The SRHT is one of the possible choices of Lemma 32 in [23] that will satisfy the lemma. Lemma 34 (Affine embeddings - Theorem 39 in [23]). Suppose G and H are matrices with m rows, and G has rank at most r. Suppose T is a ξ × m SRHT matrix (see Definition 33) with ξ = O(r/ε2 ). Then, with probability 0.99, for all X simultaneously: (1 − ε) · kGX − Hk2F ≤ kT(GX − H)k2F ≤ (1 + ε) · kGX − Hk2F . Finally, we note that matrix-vector multiplications with SRHT’s are fast. Lemma 35 (Fast Matrix-Vector Multiplication, Theorem 2.1 in [6]). Given x ∈ Rm and ξ < m, one can construct T ∈ Rξ×m and compute Tx in at most 2m log2 (ξ + 1)) operations. 24 6.2.2 Generalized rank-constrained matrix approximations Let M ∈ Rm×n , N ∈ Rm×c , L ∈ Rr×n , and k ≤ c, r be an integer. Consider the following optimization problem, Xopt ∈ argmin kM − NXLk2F . X∈Rc×r ,rank(X)≤k Then, the solution Xopt ∈ Rc×r with rank(Xopt ) ≤ k that has the minimum kXopt kF out of all possible feasible solutions is given via the following formula,   T T L† . MVL VL Xopt = N† UN UN k  T T T T MVL VL ∈ UN UN MVL VL k ∈ Rm×n of rank at most k denotes the best rank k matrix to UN UN m×n R . This result was proven in [30] (see also [49] for the spectral norm version of the problem). 6.2.3 The PCA protocol Lemma 36. Suppose the rank ρ of A ∈ Rm×n satisfies ρ ≤ 2k, for some rank parameter k. Then, there is a protocol for the Distributed Principal Component Analysis Problem in the arbitrary partition model using O(smk + sk 2 /ε2 ) words of communication and succeeding with probability 1 − δ for an arbitrarily small constant δ > 0. Proof. The n×2k matrix H′′ chosen in the protocol of Lemma 31 satisfies that with probability 1−δ, for an arbitrarily small constant δ > 0, the rank of AH′′ is equal to the rank of A if ρ < 2k. Indeed, if this were not true, the algorithm could not be correct, as the rank of H′ AH′′ is at most the rank of AH′′ (and the same algorithm can be used for any ρ < 2k). It follows that with probability 1 − δ, the column span of AH′′ is equal to the column span of A. Hence, as in the protocol of Lemma 31, the coordinator learns the column space of A, which can be described with O(km) words. The coordinator thus communicates this to all machines, using O(skm) total words of communication, assuming the entries of A are integers of magnitude at most poly(mns/ε). Let C = AH′′ , which is m × 2k. We can set up the optimization problem: min kCXCT A − AkF . rank(X)≤k (4) Because the size of C is only m × 2k, every machine can know C by sending a total of O(smk) words. Since the rank of C and A are small, we can sketch on the left and right using affine embeddings Tlef t and Tright . Then machine i sends CT Ai Tright to the coordinator, together with Tlef t Ai Tright . The coordinator computes CT ATright and Tlef t ATright by adding up the sketches, and sends these back to all the machines. Each machine can then solve the optimization problem min kTlef t CXCT ATright − Tlef t ATright kF , rank(X)≤k (5) each obtaining the same X∗ which is the optimal solution to Eqn (5). Due to Lemma 34, X∗ is a (1 + O(ε))-approximation to the best solution to Eqn (4). Finally, every machine outputs the same orthonormal basis U ∈ Rm×k for CX∗ . We can construct affine embedding matrices Tlef t ∈ Rξ1 ×m and Tright ∈ Rn×ξ2 with ξ1 = O(k/ε2 ), ξ2 = O(k/ε2 ) (see Definition 33). The total communication of this protocol is O(skm + sk 2 /ε2 ) words and the success probability can be made 1−δ for an arbitrarily small constant δ > 0. 25 6.3 Distributed PCA protocol when rank(A) > 2k The idea here is more involved than in the previous subsection and in order to describe the algorithm we need several intermediate results. 6.3.1 Lower bounds on singular values of matrices with integers entries The first lemma gives a lower bound on the singular values of a matrix with integer entries with bounded magnitude. Lemma 37. (Lemma 4.1 of [21], restated) If an m × n matrix A has integer entries bounded in magnitude by γ, and has rank ρ = rank(A), then the k-th largest singular value A satisfies σk ≥ (mnγ 2 )−k/(2(ρ−k)) . Proof. In the proof of Lemma 4.1 of [21], equation (10), it is shown that if λk is the k-th largest eigenvalue of AT A, then λk ≥ (mnγ 2 )−k/(ρ−k) . This implies the k-th singular value σk of A satisfies σk ≥ (mnγ 2 )−k/(2(ρ−k)) . Next, we state two immediate corollaries of this lemma for future reference. Corollary 38. If an m × n matrix A has integer entries bounded in magnitude by poly(mns/ε) and kA − Ak kF > 0, then kA − Ak kF > (mns/ε)−O(k) . Proof. Since kA − Ak kF > 0, the rank ρ of A is at least k + 1, so by the preceding lemma, kA − Ak kF ≥ σk+1 ≥ (poly(mns/ε))−k/2 , as desired. Corollary 39. If an m × n matrix A has integer entries bounded in magnitude by poly(mns/ε) and rank(A) ≥ 2k, then kA − Ak kF > 1/poly(mns/ε). Proof. This follows by plugging ρ = 2k into Lemma 37. 6.3.2 Lower bounds on singular values of integer-perturbed matrices In this section, we describe a perturbation technique for matrices and provide lower bounds for the smallest singular value of the perturbed matrix. We start with a theorem of Tao and Vu. Theorem 40. (Theorem 2.5 of [52]) Let M be an n×n matrix with integer entries bounded in magnitude by nC for a constant C > 0. Let Nn be a matrix with independent entries each chosen to be 1 with probability 1/2, and −1 with probability 1/2. Then, there is a constant B > 0 depending on C, for which Pr[k(M + Nn )−1 k2 ≥ nB ] ≤ 1/n. In words, the result indicates that the spectral norm of the inverse of the perturbed matrix is bounded from below with high probability. We now describe a simple corollary of this result. 26 Corollary 41. Let M be an n × n matrix with integer entries bounded in magnitude by nC for a constant C > 0. Let Nn be a matrix with independent entries each chosen to be 1/nD with probability 1/2, and −1/nD with probability 1/2, where D > 0 is a constant. Then, there is a constant B > 0 depending on C and D for which Pr[k(M + Nn )−1 k2 ≥ nB ] ≤ 1/n. Proof. This follows by Theorem 40 after replacing the constat C in that theorem with C + D, and scaling by nD . We need to generalize Corollary 41 to rectangular matrices since we will eventually apply this perturbation technique to the matrix A to which we would like to compute a distributed PCA. Lemma 42. Let M be an m × n matrix with integer entries bounded in magnitude by nC for a constant C > 0, and suppose m ≤ n. Let Nm,n be a matrix with independent entries each chosen to be 1/nD with probability 1/2 and −1/nD with probability 1/2, where D > 0 is a constant. Then, there is a constant B > 0 depending on C and D for which Pr[σm (M + Nm,n ) < 1/nB ] ≤ 1/n, where σm (M + Nm,n ) denotes the smallest singular value of M + Nm,n . Proof. Suppose we were to pad M with n − m zero rows, obtaining a square matrix M. Now consider the n × n matrix Nn,n with independent entries each chosen to be 1/nD with probability 1/2 and −1/nD with probability 1/2. By Corollary 41, all singular values of M + Nn,n are at least 1/nB . Now consider a unit vector x ∈ Rn which is zero on all but its top m coordinates. Let y ∈ Rm be the unit vector which agrees with x on its top m coordinates. Then, 1/nB ≤ kx(M + Nn,n )k2 = ky(M + Nm,n )k2 , where the inequality uses the lower bound on the singular values of M + Nn,n , which occurs with probability at least 1 − 1/n, and the equality follows by definition of the matrices and vectors we have defined. As y ∈ Rm can be chosen to be an arbitrary unit vector, it follows that σm (M + Nm,n ) ≥ 1/nB , which completes the proof. 6.4 Description of algorithm Using the above results, we are now ready to describe a distributed PCA algorithm whose communication cost can be bounded in terms of machine words and not just in terms of “real numbers”. As in the algorithm in Section 5.3, we denote with Bi ∈ Rm×n the matrix that B1 arises from A1 after applying the Bernoulli perturbation technique P discussed above in Lemma 42 and ∀i > 1, Bi is equal to Ai . Using this notation, we have B := i Bi ∈ Rm×n . Notice that B exactly arises from A after applying the such Bernoulli perturbation technique. Input: 1. A ∈ Rm×n arbitrarily partitioned A = 2. rank parameter k < rank(A) Ps i Ai for i = 1 : s, Ai ∈ Rm×n . 3. accuracy parameter ε > 0 Algorithm 27 1. Use the protocol of Lemma 31 with δ = 0.01 to test if the rank of A is less than 2k. 2. If rank(A) ≤ 2k, use the protocol of Lemma 36 to find some orthonormal U ∈ Rm×k . 3. If rank(A) > 2k, (a) machine 1 locally and independently adds 1/nD with probability 1/2, and −1/nD with probability 1/2, to each of the entries of A1 , where D is the constant of Lemma 42. Note that this effectively adds the matrix Nm,n of Lemma 42 to the entire matrix A. For notational convenience let B = A + Nm,n , B1 ∈ Rm×n be the local perturbed matrix of machine 1 and ∀i > 1, Bi is just equal to Ai . (b) Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27). (c) Each machine locally computes B̃i = SBi T and sends B̃i to the server. Server constructs B̃ = P i B̃i . T (d) Server computes the SVD of B̃k = UB̃k ΣB̃k VB̃ (UB̃k ∈ Rξ1 ×k , ΣB̃k ∈ Rk×k , VB̃k ∈ Rξ2 ×k ). k (e) Now server rounds each of the entries in VB̃k to the nearest integer multiple of 1/nγ for a sufficiently large constant γ > 0. Let the matrix after the rounding be V̂B̃k (f) Server sends V̂B̃k to all machines. (g) Each machine construct X̂i = Bi TV̂B̃k and sends X̂i to the server. Server constructs X̂ = P i X̂i . (h) Server computes an orthonormal basis U ∈ Rm×k for span(X̂) (notice that rank(X̂) ≤ k), e.g. with a QR factorization. (i) Server sends U to each machine. 6.5 Main result The theorem below analyzes the approximation error, the communication complexity, and the running time of the previous algorithm. Notice that the communication cost of this algorithm is given in terms of machine words. Theorem 43. The matrix U ∈ Rm×k with k orthonormal columns satisfies with arbitrarily large constant probability: (6) kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . The communication cost of the algorithm is O(msk + s · poly(k/ε)) words and the running time is  O nmkε−2 + mk2 ε−4 + poly(kε−1 ) . 6.6 Proof of Theorem 43 Proof of Eqn. 6 If rank(A) ≤ 2k, then Lemma 36 shows the claim. If rank(A) > 2k, then the situation is more involved and we prove the approximation bound in the following subsection. Communication Complexity Step 1 requires O(sk 2 ) words (Lemma 31). Step 2 requires O(smk+ sk 2 /ε2 ) words (Lemma 36). Step 3 requires O(msk + s · poly(k/ε)) words and this follows from the analysis in Theorem 30. The only difference with Theorem 30 is that now all matrices communicated in the algorithm have real numbers which can be represented efficiently with one machine word of at most O(log(mns/ε)) bits. To see this, note that each entry of V̂B̃k is bounded in magnitude by nO(B+C)/γ . Therefore, the entries of V̂B̃k and the entries of Xi = Bi TV̂B̃k can each be described using O(log n) bits, i.e., a constant number of machine words. 28 Running time The operations in the third step in algorithm are effectively the same operations as in the batch algorithm in Section 5.2 (plus some extra operations whose running time is not asymptotically larger), hence the analysis of the running time in Theorem 29 shows the claim (the number of operations in the first two steps of the algorithm is asymptotically less than the number of operations in the third step). 6.7 Proof of Eqn. 6 if rank(A) > 2k ξ×p be a matrix of which Lemma 44 (Result in [21]). Suppose M ∈ Rp×q . For ε > 0, let√P ∈ R√ entries are O(q)-wise independently and uniformly chosen from {−1/ ξ, +1/ ξ} where ξ = O(q/ε2 ). With arbitrarily large constant probability, P is an ε-subspace embedding matrix of column space of M. Specifically, ∀x, it has (1 − ε)kMxk2 ≤ kPMxk2 ≤ (1 + ε)kMxk2 Lemma 45 (Lemma C.2 in [40]). Suppose P is an ε-subspace embedding matrix of column space of M ∈ Rp×q (q ≤ p). With arbitrarily large constant probability, ∀1 ≤ i ≤ q (1 − ε)σi (PM) ≤ σi (M) ≤ (1 + ε)σi (PM) where σi means the ith singular value. It is suffice to show the following: Lemma 46. With arbitrarily large constant probability, k(BTVB̃k )† k2 ≤ 8nB Proof. Notice that BTVB̃k is an m × k matrix. With high probability, S is a ε-subspace embedding matrix of column space of BTVB̃k due to Lemma 44. According to Lemma 45, σmin (BTVB̃k ) ≥ (1 − ε)σmin (SBTVB̃k ) where σmin means the minimum singular value. Without loss of generality, we assume ε < 1/2. Then σmin (BTVB̃k ) ≥ 12 σmin (SBTVB̃k ). Because VB̃k are the top k right singular vectors of SBT, σmin (SBTVB̃k ) ≥ σmin (SBT). Applying Lemma 44 again, TT is a constant error subspace embedding matrix of column space of BT ST . Combining with Lemma 45, we can make σmin (SBT) ≥ 21 σmin (SB). Notice that Lemma 44 also implies that q ξ1 T ξ1 which means ∀x ∈ Rξ1 , we can m S is a constant error subspace embedding matrix of R q q make kx ξm1 Sk2 > 12 kxk2 . Thus, ∀x ∈ Rξ1 , kx ξm1 SBk2 > 12 σmin (B)kxk2 . Due to Lemma 42, q q σmin (B) > 1/nB which implies σmin (SB) > 12 · ξm1 σmin (B) > 12 ξm1 n1B > 12 n1B . To conclude k(BTVB̃k )† k2 ≤ 1/σmin (BTVB̃k ) ≤ 8nB . Let E = VB̃k − V̂B̃k , we have kA − UUT AkF = kB − Nm,n − UUT (B − Nm,n )kF ≤ kB − UUT BkF + kNm,n kF † = kB − (BTV̂B̃k )(BTV̂B̃k ) BkF + kNm,n kF ≤ kB − (BT(VB̃k + E))(BTVB̃k )† BkF + kNm,n kF ≤ kB − (BTVB̃k )(BTVB̃k )† BkF + kBTE(BTVB̃k )† BkF + kNm,n kF ≤ (1 + O(ε))kB − Bk kF + kBTE(BTVB̃k )† BkF ≤ (1 + O(ε))kB − Bk kF 29 The first equality follows by using the relation B = A + Nm,n . The first inequality uses the triangle inequality for the Frobenius norm and the fact that I − UUT is a projector matrix and can be dropped without increasing the Frobenius norm. The second equality uses the fact that both † UUT and (BTV̂B̃k )(BTV̂B̃k ) are the same projector matrices. The second inequality follows by ∀M, C, X, kM − CC† MkF ≤ kM − CXkF and the relation E = VB̃k − V̂B̃k . The third inequality uses the triangle inequality. The fourth inequality uses that kB − Bk kF ≥ 1/poly(mns/ε) (follows from Lemma 42) while kNm,n kF can be made 1/nt for an arbitrarily large integer t, and the fact that kB − (BTVB̃k )(BTVB̃k )† BkF ≤ (1 + O(ε))kB − Bk kF (implied by replacing all A with B in Lemma 28). The last inequality uses the fact kBTE(BTVB̃k )† BkF ≤ kBkF kTkF kEkF k(BTVB̃k )† kF kBkF where kBkF , kTkF , k(BTVB̃k )† kF are poly(nms/ε) (Lemma 46 implies the bound of k(BTVB̃k )† kF ) and we can make |E|F be 1/np for an arbitrarily large p, and kB − Bk kF ≥ 1/poly(mns/ε). Overall, after rescaling ε, we have kA − UUT AkF ≤ (1 + ε)kB − Bk kF . (7) Finally, we need to relate kB − Bk kF to kA − Ak kF , which we do in the following lemma. Lemma 47. Let A ∈ Rm×n be any matrix, Nm,n be the random matrix of Lemma 42, and B = A + Nm,n . Let k < rank(A), ε > 0. Then, for arbitrarily large constant probability, kB − Bk kF ≤ (1 + ε)kA − Ak kF . Proof. Since B = A + Nm,n , the proof idea is to relate the singular values of B to the singular values of A using Weyl’s inequality. Specifically, for i : 1 : m (recall we assume m ≤ n) we have |σi (B) − σi (A)| ≤ kNm,n k2 ≤ 1/nD . Rearranging terms in this inequality, and taking squares of the resulting relation we obtain (for i = 1 : m), 2 σi2 (B) ≤ σi (A) + 1/nD . (8) We manipulate the term kB − Bk kF as follows: v u X u m σi2 (B) kB − Bk kF = t i=k+1 v u X u m (σi (A) + 1/nD )2 ≤ t i=k+1 v u X u m = t σi2 (A) + 1/n2D + 2σi (A)/nD i=k+1  v u X q q u m 2 2D t σi (A) + 1/n + 2σi (A)/nD ≤ i=k+1 ≤ kA − Ak kF + ε · kA − Ak kF + ε · kA − Ak kF ≤ (1 + 2ε)kA − Ak kF . 30 The first inequality uses Eqn. (8). In the third inequality, we used q 1/n2D ≤ εkA − Ak kF , which follows from Corollary 39 for a sufficiently large constant D. Also, we used q q q 2σi (A)/nD ≤ 2σ1 (A)/nD ≤ poly(nms/ε)/nD ≤ εkA − Ak kF , where the second inequality follows because kAk2 ≤ poly(nms/ε) and the last inequality uses again Corollary 39 for a sufficiently large constant D. Completing the proof. Using Lemma 47 in Eqn (7), taking squares in the resulting inequality, and rescaling ε concludes the proof. 7 Streaming Principal Component Analysis In this section, we are interested in computing a PCA of a matrix in turnstile streaming model. Specifically, there is a stream of update operations that the q th operation has form (iq , jq , xq ) which indicates that the (iq , jq )th entry of A ∈ Rm×n should be incremented by xq where iq ∈ {1, ..., m}, jq ∈ {1, ..., n}, xq ∈ R. Initially, A is zero. In the streaming setting of computation, we are allowed only one pass over the update operations, i.e., the algorithm “sees” each update operation one by one and only once. Upon termination, the algorithm should return a matrix U with k orthonormal columns which is a “good” basis for span(A) . In Section 7.1.1 below, we describe an algorithm which gives a space-optimal streaming algorithm. Further more, we provide a variation of this algorithm in Section 7.1.2 which can output A∗k satisfying kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F . It meets the space lower bound shown in [21]. In Section 7.2, we relax the problem and we describe a two-pass streaming algorithm which is a version of the algorithm of Section 5.2; unfortunately, the space complexity of this algorithm can be bounded only in terms of “real numbers”. We fix this in Section 7.3 where we describe an optimal two-pass streaming algorithm. Inputs to the algorithms in Section 7.1, Section 7.2 and Section 7.3 are a stream of update operations (i1 , j1 , x1 ), (i2 , j2 , x2 ), ..., (il , jl , xl ), a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1. 7.1 One-pass streaming PCA 7.1.1 The algorithm which outputs U In the following algorithm, the output should be U with orthogonal unit columns and satisfying kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F Our algorithm uses the following property of random sign matrices: Lemma 48 (Sketch for regression - Theorem 3.1 in [21]). Suppose both of A and B have m rows and rank(A) ≤ k. Further more, if each entry of S ∈ Rξ×m is O(k)-wise independently chosen from {−1, +1} where ξ = O(k/ε) and X̃ = arg min kSAX − SBk2F X , with probability at least 0.99, kAX̃ − Bk2F ≤ (1 + ε) · min kAX − Bk2F X 31 Algorithm 1. Construct random sign sketching matrices S ∈ Rξ1 ×m with ξ1 = O(kε−1 ) and R ∈ Rn×ξ2 with ξ2 = O(kε−1 ) (see Lemma 48) 2. Construct affine embedding matrices Tlef t ∈ Rξ3 ×m and Tright ∈ Rn×ξ4 with ξ3 = O(kε−3 ), ξ4 = O(k/ε−3 ) (see Definition 33). 3. Initialize all-zeros matrices: M ∈ Rξ3 ×ξ4 , L ∈ Rξ1 ×ξ4 , N ∈ Rξ3 ×ξ2 , D ∈ Rm×ξ2 . We will maintain M, L, N, D such that M = Tlef t ATright , L = SATright , N = Tlef t AR and D = AR. 4. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (one pass over the stream of update operations) (a) For all i = 1, ..., ξ3 , j = 1, ..., ξ4 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j . (b) For all i = 1, ..., ξ1 , j = 1, ..., ξ4 , let Li,j = Li,j + Si,iq · xq · (Tright )jq ,j . (c) For all i = 1, ..., ξ3 , j = 1, ..., ξ2 , let Ni,j = Ni,j + (Tlef t )i,iq · xq · Rjq ,j . (d) For all j = 1, ..., ξ2 , let Diq ,j = Miq ,j + xq · Rjq ,j 5. end 6. Construct X∗ = argmin kN·X·L−Mk2F . (Notice that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .) rank(X)≤k rank(X)≤k T (UX∗ ∈ Rξ×k , ΣX∗ ∈ Rk×k VX∗ ∈ Rξ×k ); then, compute 7. Compute the SVD of X∗ = UX∗ ΣX∗ VX ∗ T = DUX∗ . 8. Compute an orthonormal basis U ∈ Rm×k for span(T). Theorem 52 later in this section analyzes the approximation error, the space complexity, and the running time of the previous algorithm. First, we prove a few intermediate results. Lemma 49. For all matrices X ∈ Rξ2 ×ξ1 and with probability at least 0.98: (1 − ε)2 kARXSA − Ak2F ≤ kTlef t (ARXSA − A) Tright k2F ≤ (1 + ε)2 kARXSA − Ak2F Proof. Notice that rank(AR) ≤ ξ2 = O(kε−1 ). Then from Lemma 34 (G := AR and H := A), with probability at least 0.99 for all Y ∈ Rξ2 ×n : (1 − ε)kARY − Ak2F ≤ kTlef t (ARY − A)k2F ≤ (1 + ε)kARY − Ak2F Replacing Y = XSA, for an arbitrary X ∈ Rξ2 ×ξ1 , we obtain that with probability at least 0.99 and for all X ∈ Rξ2 ×ξ1 simultaneously: (1 − ε)kARXSA − Ak2F ≤ kTlef t (ARXSA − A) k2F ≤ (1 + ε)kARXSA − Ak2F Now notice that rank(SA) ≤ ξ1 = O(kε−1 ). Then from Lemma 34 (G := AT ST and H := T m×ξ2 : AT Tlef t ), with probability at least 0.99 for all Z ∈ R T 2 T T T T T T 2 T T T T T 2 (1 − ε)kA T ST ZT − AT Tlef t kF ≤ kTright (A S Z − A Tlef t )kF ≤ (1 + ε)kA S Z − A Tlef t kF T ξ2 ×ξ1 , we obtain that with probability at least Replacing Z = XT RT AT Tlef t for an arbitrary X ∈ R 0.99 and for all X simultaneously: (1 − ε)2 k(ARXSA − A)T k2F ≤ k(Tlef t (ARXSA − A) Tright )T k2F ≤ (1 + ε)2 k(ARXSA − A)T k2F 32 Lemma 50. Let Xopt = arg minrank(X)≤k kARXSA−Ak2F with Xopt ∈ Rξ2 ×ξ1 . Then, with probability at least 0.98 (1 + ε)2 min kTlef t (ARXSA − A) Tright k2F ≤ kARX∗ SA − Ak2F ≤ kARXopt SA − Ak2F 2 (1 − ε) rank(X)≤k Proof. From Lemma 49, we have that for all matrices X ∈ Rξ2 ×ξ1 and with probability at least 0.98: (1 − ε)2 · kARXSA − Ak2F ≤ kTlef t (ARXSA − A) Tright k2F ≤ (1 + ε)2 · kARXSA − Ak2F Applying this for X := Xopt , we obtain: (e) (1 − ε)2 · kARXopt SA − Ak2F ≤ kTlef t (ARXopt SA − A) Tright k2F ≤ (1 + ε)2 · kARXopt SA − Ak2F Applying this for X := X∗ , we obtain: (f ) (1 − ε)2 · kARX∗ SA − Ak2F ≤ kTlef t (ARX∗ SA − A) Tright k2F ≤ (1 + ε)2 · kARXopt SA − Ak2F Combining (f ), (e) along with the optimality of X∗ , formally using the relation: kTlef t (ARX∗ SA − A) Tright k2F ≤ kTlef t (ARXopt SA − A) Tright k2F , shows the claim. In words, the lemma indicates that in order to (1 + ε)-approximate the optimization problem minrank(X)≤k kARXSA − Ak2F , it suffices to “sketch” the matrix ARXSA − A from left and right with the matrices Tlef t and Tright . Recall that X∗ = argmin kTlef t (ARXSA − A) Tright k2F . rank(X)≤k Lemma 51. Let Xopt = arg minrank(X)≤k kARXSA − Ak2F . Then, with probability at least 0.98 kARXopt SA − Ak2F ≤ (1 + ε) · kA − Ak k2F , T T Proof. Suppose the SVD of A = UA ΣA VA and Ak = UAk ΣAk VA . Consider about the following k regression problem: min kUAk X − Ak2F rank(X)≤k Since we can choose X to be T UA A, k we have min rank(X)≤k kUAk X − Ak2F ≤ kA − Ak k2F Let X̃ = arg minrank(X)≤k kSUAk X − SAk2F . According to Lemma 48, with probability 0.99 kUAk X̃ − Ak2F ≤ (1 + ε) min rank(X)≤k kUAk X − Ak2F ≤ (1 + ε)kA − Ak k2F Since X̃ minimizes kSUAk X − SAk2F , the row space of X̃ is in the row space of SA (Otherwise, we can project SUAk X into the row space of SA to get a better solution). We denote X̃ = WSA where rank(W) ≤ k. Now, consider about another regression problem: min rank(X)≤k k(WSA)T XT − AT k2F 33 If we choose X to be UAk , we have min rank(X)≤k k(WSA)T XT − AT k2F ≤ kUAk X̃ − Ak2F ≤ (1 + ε)kA − Ak k2F Let X̂ = arg minrank(X)≤k kRT (WSA)T XT − RT AT k2F . According to Lemma 48, with probability 0.99 T kRT (WSA)T X̂ − RT AT k2F ≤ (1 + ε) min rank(X)≤k k(WSA)T XT − AT k2F ≤ (1 + ε)2 kA − Ak k2F Since X̂ minimizes kXWSAR − ARk2F , the column space of X̂ is in the column space of AR. We denote X̂ = ARG where rank(G) ≤ k. Thus, we have kARXopt SA − Ak2F ≤ kARGWSA − Ak2F ≤ (1 + ε)2 kA − Ak k2F We scale the ε with a constant factor. The statement is shown by applying union bound. Theorem 52. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.96: kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F .  The space complexity of the algorithm is O mk/ε + poly(kε−1 ) words, and the running time for each update operation is O(poly(kε−1 )) and the total running time is of the order O l · poly(kε−1 ) + mk2 ε−1 where l is total number of updates. Proof. Because UUT projects the columns of A into the column space of Tlef t ARX∗ , kA − UUT Ak2F ≤ kTlef t (ARXSA − A) Tright k2F According to Lemma 50 and Lemma 51, kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F To see the space complexity of the algorithm, observe that it suffices to maintain the matrices in the fourth step of the algorithm. Furthermore, observe that by the end of the stream: M = Tlef t ATright ∈ Rξ3 ×ξ4 , L = SATright ∈ Rξ1 ×ξ4 , N = Tlef t AR ∈ Rξ3 ×ξ2 and D = AR ∈ Rm×ξ2 . Those matrices form the so called “sketch” of the algorithm. Since all of ξ1 , ξ2 , ξ3 , ξ4 are O(kε−1 ), the running time for each update operation in the fourth step is O(poly(kε−1 )). We can do the sixth step by using the result of Section 6.2.2. The computation takes poly(kε−1 ) running time. In the seventh step, computing SVD needs poly(kε−1 ), and computing T needs O(mk2 ε−1 ). We can use O(mk2 ) to compute U in the final step, e.g. QR decomposition. 7.1.2 A variation which outputs A∗k We just slightly modify the previous algorithm in Section 7.1.1 to get the following one which can output a matrix A∗k ∈ Rm×n satisfying kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F Algorithm 34 1. Construct random sign sketching matrices S ∈ Rξ1 ×m with ξ1 = O(kε−1 ) and R ∈ Rn×ξ2 with ξ2 = O(kε−1 ) (see Lemma 48) 2. Construct affine embedding matrices Tlef t ∈ Rξ3 ×m and Tright ∈ Rn×ξ4 with ξ3 = O(kε−3 ), ξ4 = O(k/ε−3 ) (see Definition 33). 3. Initialize all-zeros matrices: M ∈ Rξ3 ×ξ4 , L ∈ Rξ1 ×ξ4 , N ∈ Rξ3 ×ξ2 , D ∈ Rm×ξ2 and C ∈ Rξ1 ×n . We will maintain M, L, N, D, C such that M = Tlef t ATright , L = SATright , N = Tlef t AR, D = AR and C = SA. 4. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (one pass over the stream of update operations) (a) For all i = 1, ..., ξ3 , j = 1, ..., ξ4 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j . (b) For all i = 1, ..., ξ1 , j = 1, ..., ξ4 , let Li,j = Li,j + Si,iq · xq · (Tright )jq ,j . (c) For all i = 1, ..., ξ3 , j = 1, ..., ξ2 , let Ni,j = Ni,j + (Tlef t )i,iq · xq · Rjq ,j . (d) For all j = 1, ..., ξ2 , let Diq ,j = Miq ,j + xq · Rjq ,j (e) For all i = 1, ..., ξ1 , let Ci,jq = Ci,jq + Si,iq · xq 5. end 6. Construct X∗ = argmin kN·X·L−Mk2F . (Notice that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .) rank(X)≤k rank(X)≤k T (UX∗ ∈ Rξ×k , ΣX∗ ∈ Rk×k VX∗ ∈ Rξ×k ); then, compute 7. Compute the SVD of X∗ = UX∗ ΣX∗ VX ∗ T = DUX∗ T C K = VX ∗ 8. Output A∗k = TΣX∗ K Theorem 53. With probability at least 0.96: kA − A∗k k2F ≤ (1 + O (ε)) · kA − Ak k2F .  The space complexity of the algorithm is O (m + n)k/ε + poly(kε−1 ) words, and the running time for each update operation is O(poly(kε−1 )) and the total running time is of the order  O l · poly(kε−1 ) + (m + n)k2 ε−1 + mnk where l is total number of updates. Proof. Notice that A∗k = ARX∗ SA. According to Lemma 50 and Lemma 51, we have kA − A∗k k2F ≤ (1 + O (ε)) · kA − Ak k2F . The total space of “sketch” matrices M, L, N, D is the same as the algorithm in Section 7.1.1. The maintenance of C needs additional O(nkε−1 ) space. T The running time is almost the same as before. Computation of K = VX C needs additional ∗ O(nk2 ε−1 ), and computation of A∗k = TΣX∗ K needs additional O(mnk). 35 7.2 Two-pass streaming PCA with “real numbers” space complexity A simple modification of the batch algorithm in Section 5.2 leads to a two-pass streaming algorithm with O(mk) + poly(k/ε) “real numbers” space complexity: Algorithm 1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27). 2. Initialize all-zero matrices: à ∈ Rξ1 ×ξ2 , X ∈ Rm×k . 3. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream) 4. For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let Ãi,j = Ãi,j + Si,iq · xq · Tjq ,j . 5. end T 6. Compute the SVD of Ãk = UÃk ΣÃk Và (UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ). k 7. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream) 8. For all i = 1, ..., ξ2 , j = 1, ..., k, let Xiq ,j = Xiq ,j + xq · Tjq ,i · (VÃk )i,j . 9. end 10. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k). The theorem below analyzes the approximation error, the space complexity, and the running time of the previous algorithm. Notice that the space complexity of this algorithm is only given in terms of “real numbers” - we resolve this issue in the following section. Theorem 54. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.98: kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F . The space complexity of the algorithm is  O mk + poly(kε−1 ) “real numbers”, the running time of each update operation is O(poly(kε−1 )), and the total running time is of the order  O l · poly(kε−1 ) + mk2 where l is the total number of update operations. Proof. The matrix U - up to the randomness in the algorithms - is exactly the same matrix as in the algorithm in Section 5.2, hence Theorem 29 shows the claim. To see the space complexity of the algorithm, observe that it suffices to maintain the matrices in the fourth and eighth steps of the algorithm. Furthermore, observe that by the end of the stream: à = SAT, and X = ATVÃk Since ξ1 , ξ2 are poly(kε−1 ), the running time for each update operation is poly(kε−1 ). Computing SVD in the sixth step needs poly(kε−1 ). Computing U in the final step needs O(mk 2 ). 36 7.3 Two-pass streaming PCA with bit space complexity The previous algorithm could suffer from large space complexity in case we need a lot of machine words to write down the entries of VÃk . To fix this issue we use the same idea as in the case of the distributed PCA algorithm in Section 6. This leads to a two-pass streaming algorithm for PCA. Again, as in the distributed case, we need to test if the rank of A is less than 2k, and then we use one approach if rank(A) < 2k and another approach if rank(A) ≥ 2k. Both of these approaches can be implemented with two passes. In the overall streaming PCA algorithm that we would like to design, we can not wait for the algorithm that tests the rank to finish and then start running one of the two PCA protocols, because this will lead to a three-pass algorithm (one pass to test the rank and two passes for the actual PCA protocol). To keep the number of passes to two, we just start running the PCA protocols in parallel with the protocol that tests the rank of the input matrix. In the end of the first pass over the stream of update operations, we already know which protocol to follow, and we just do this, disregarding the other protocol. We already discussed the streaming version of the algorithm that tests the rank of the matrix in Lemma 31. Below, we describe separately the two streaming PCA protocols. 7.3.1 Streaming PCA protocol when rank(A) ≤ 2k The idea here is to implement a streaming version of the distributed PCA protocol in Lemma 36. Algorithm 1. Construct an n × 2k matrix H′′ as in Lemma 36. 2. Construct affine embedding matrices Tlef t ∈ Rξ1 ×m and Tright ∈ Rn×ξ2 with ξ1 = O(k/ε2 ), ξ2 = O(k/ε2 ) (see Definition 33). 3. Initialize all-zeros matrices: C ∈ Rm×2k , M ∈ Rξ1 ×ξ2 , L ∈ Rξ×ξ2 , N ∈ Rξ1 ×2k . 4. (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream) (a) For all j = 1, ..., 2k, let Ciq ,j = Ciq ,j + xq · H′′jq ,j 5. end 6. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream) (a) For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j . (b) For all i = 1, ..., 2k, j = 1, ..., ξ2 , let Li,j = Li,j + CT i,iq · xq · (Tright )jq ,j . (c) For all i = 1, ..., ξ1 , j = 1, ..., 2k, let Ni,j = Ni,j + (Tlef t )i,iq · xq · H′′jq ,j . 7. end 8. Construct X∗ = argmin kN · X · L − Mk2F := argmin kTlef t AH′′ X(H′′ )T AT ATright − Tlef t ATright k2F . rank(X)≤k rank(X)≤k 9. Compute an orthonormal basis U ∈ Rm×k for span(CX∗ ). 37 7.3.2 Streaming PCA protocol when rank(A) > 2k The idea here is to implement a streaming version of step 3 of the algorithm in Section 6.4. Algorithm 1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27). 2. Initialize all-zero matrices: B̃ ∈ Rξ1 ×ξ2 , X̂ ∈ Rm×k . 3. For p := 1, ..., ξ1 , q := 1, ..., ξ2 , i := 1, ..., m, j := 1, ..., n 4. Let ri,j = −1/nD with probability 1/2 and ri,j = 1/nD with probability 1/2. 5. B̃p,q = B̃p,q + Sp,i · ri,j · Tj,q 6. end 7. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream) 8. For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let B̃i,j = B̃i,j + Si,iq · xq · Tjq ,j . 9. end T 10. Compute the SVD of B̃k = UB̃k ΣB̃k VB̃ (UB̃k ∈ Rξ1 ×k , ΣB̃k ∈ Rk×k , VB̃k ∈ Rξ2 ×k ). Then, we k round each of the entries of VB̃k to the nearest integer multiple of 1/nγ for a sufficient large constant γ > 0. Let the matrix after the rounding be V̂B̃k . 11. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream) 12. For all i = 1, ..., ξ2 , j = 1, ..., k, let X̂iq ,j = X̂iq ,j + xq · Tjq ,i · (V̂B̃k )i,j . 13. end 14. Compute an orthonormal basis U ∈ Rm×k for span(X̂) (notice that rank(X̂) ≤ k). 7.3.3 Main result The theorem below analyzes the approximation error, the space complexity, and the running time of the previous algorithm. Notice that the space complexity of this algorithm is given in terms of machine words. Theorem 55. The matrix U ∈ Rm×k with k orthonormal columns satisfies with arbitrarily large constant probability: kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . The space complexity of the algorithm is  O mk + poly(kε−1 ) machine words, the running time of each update operation is O(poly(kε−1 )), and the total running time is of the order  O l · poly(kε−1 ) + mk2 where l is the total number of update operations. Proof. The matrix U - up to the randomness in the algorithms - is exactly the same matrix as in the algorithm in Theorem 43, hence the approximation bound in that theorem shows the claim. To see the space complexity of the algorithm, observe that it suffices to maintain all the “sketch” matrices in the both two protocols above. Since ξ1 , ξ2 in both protocols are poly(kε−1 ), the running time for each update operation is O(poly(kε−1 )). Additional O(mk 2 ) running time is caused by computing U in the final step. 38 8 Distributed PCA for sparse matrices in column-partition model Recall that in the problem of Definition 15 we are given  P 1) an m × n matrix A partitioned columnwise as A = A1 A2 . . . As , with Ai ∈ Rm×wi ( wi = n); 2) a rank parameter k < rank(A); 3) an accuracy parameter ε > 0. We would like to design an algorithm that finds an m × k matrix U with UT U = Ik and, upon termination, leaves this matrix U in each machine of the network. The high level idea of our algorithm is to find, in a distributed way, a small set - O(kε−1 ) - of columns from A and then find U in the span of those columns. To choose those O(kε−1 ) columns of A in a distributed way we implement the following three-stage sampling procedure: 1. Local sampling: Each machine samples O(k) columns using the sampling algorithm from [24]. 2. Global sampling: The server collects the columns from each machine and down-samples them to O(k) columns using the deterministic algorithm from [17]. 3. Adaptive sampling: the server sends back to each machine those O(k) columns; then, an extra of O(kε−1 ) columns are selected randomly from the entire matrix A using [26]. We argue that if C̃ contains the columns selected with this three-stage approach, then, w.p. 0.99, † (A)k2F ≤ (1 + O(ε)) · kA − Ak k2F . kA − C̃C̃ Ak2F ≤ kA − ΠF C̃,k (A) to be the rank k matrix that approximates A, we are not Though we could have used ΠF C̃,k (A). To address this issue, using familiar with any communication-efficient computation of ΠF C̃,k (A)k2F ; an idea from [37], we compute U ∈ span(C̃) such that kA−UUT Ak2F ≤ (1+O(ε))kA−ΠF C̃,k this U can be calculated with small communication cost and it is sufficient for our purposes. Before presenting the new algorithm in detail, we discuss results from previous literature that we employ in the analysis. 8.1 Background material 8.1.1 Column sampling algorithms Our distributed PCA algorithm in Section 8 samples columns from the input matrix in three stages: 1. Local sampling: O(k) columns are selected locally in each machine. 2. Global sampling: O(k) columns are selected in the server. 3. Adaptive sampling: an extra O(kε−1 ) columns are selected from the entire matrix A. In the first stage, we use a sampling algorithm mentioned in [24]. Actually, the sampling algorithm is the same as the Batson, Spielman, and Strivastava (BSS) spectral sparsification algorithm [11]. But Cohen et al. showed that a small set of columns sampled by BSS sampling algorithm can provide a projection-cost preserving sketch. In the second stage, we use a deterministic algorithm developed in [17], which itself extends the Batson, Spielman, and Strivastava (BSS) spectral sparsification algorithm [11]. For the actual algorithm in the first stage we defer the reader to Theorem 15 in [24]. Lemma 56 states the result. And for the actual algorithm in the second stage we defer the reader to Lemma 3.6 in [17]. Lemma 57 and Lemma 58 below present the relevant results. In the third sampling stage, we use an adaptive sampling algorithm from [26]. 39 Lemma 56 (BSS Sampling for Projection-Cost Preserving Sketch. Theorem 15 in [24]). Let A ∈ Rm×w be an arbitrary matrix. For any integer 0 < k < m, real numbers 0 < ε < 1, 0 < δ, there is a randomized algorithm that runs in O(nnz(A) log(m/δ) + m · poly(k, ε, log(1/δ))) time, and constructs a “sampling/rescaling” w × O(k/ε2 ) matrix S with probability at least 1 − δ such that S is an (ε, k)-projection-cost preserving sketching matrix of A. We denote this sampling procedure as S = BssSamplingI(A, k, ε, δ). In words, there exists a randomized algorithm that runs in near input-sparsity running time can construct a projection-cost preserving sketch of a given matrix A by sampling and rescaling a small subset of columns of A. Lemma 57 (Dual Set Spectral-Frobenius Sparsification. Lemma 3.6 in [17]). Let V ∈ Rw×k be a matrix with w > k and V T V = Ik . Let E ∈ Rm×w be an arbitrary matrix. Then, given an integer ℓ such that k < ℓ ≤ w, there exists a deterministic algorithm that runs in O ℓwk2 + mw time, and constructs a “sampling/rescaling” w × ℓ matrix S such that    p 2 σk2 V T S ≥ 1 − k/ℓ , kESk2F ≤ kEk2F . Specifically, rank(V T S) = k. We denote this sampling procedure as S = BssSamplingII(V, E, ℓ). In words, given V and E, there exists an algorithm to select (and rescale) a small number of columns from E and rows from V such that: 1) the Frobenius norm squared of the sampled E is less than the Frobenius norm squared of E; 2) the sampled V has rank equal to the rank of V; and  p 2 3) the smallest singular value squared of the sampled V is bounded from below by 1 − k/ℓ . Lemma 58 (Constant factor column-based matrix reconstruction; Theorem 5 in [17]). Given matrix G ∈ Rm×α of rank ρ and a target rank k 1 , there exists a deterministic algorithm that runs in O αm min{α, m} + αck2 time and selects c > k columns of G to form a matrix C ∈ Rm×c with † kG − CC Gk2F ≤   rank  X(G) p −2 1 + 1 − k/c · σi2 (G). i=k+1 The algorithm in this theorem finds C as C = GS, where S = BssSamplingII(V, G − GVV T , c) and V ∈ Rα×k contains the top k right singular vectors of G. We denote this sampling procedure as C = DeterministicCssF robenius(G, k, c). In words, there exists a deterministic algorithm, running in polynomial time, to select any number of c > k columns from the given matrix G, such that the residual error, in Frobenius norm, from projecting G onto the span of the sampled columns is bounded from above with respect to the residual error of the best rank k matrix from the SVD of G. Notice that rank X(G) i=k+1 σi2 (G) = kG − Gk k2F , where Gk ∈ Rm×α has rank at most k and is computed via the SVD of G. 1 The original Theorem 5 in [17] has the assumption that k < ρ, but this assumption can be dropped having the result unchanged. The only reason the assumption k < ρ exists is because otherwise column subset selection is trivial. 40 Before presenting the adaptive sampling theorem from [26] we introduce some useful notation m×n is the used in the lemma. Let A ∈ Rm×n , k < n, and V ∈ Rm×c with k < c < n. ΠF V,k (A) ∈ R best rank k approximation to A - wrt the Frobenius norm - in the column span of V. Equivalently, ΠF V,k (A) = VXopt , where Xopt = argmin kA − VXk2F . X∈Rc×n ,rank(X)≤k Lemma 59 (Adaptive sampling; Theorem 2.1 of [26]). Given A ∈ Rm×n and V ∈ Rm×c1 (with c1 ≤ n, m), define the residual matrix Ψ = A − VV† A ∈ Rm×n . For j = 1, . . . , n, let pj be a probability distribution such that pj ≥ βkΨ(j) k22 /kΨk2F , for some 1 > β > 0, where Ψ(j) is the j-th column of the matrix Ψ. Sample c2 columns from A in c2 i.i.d. trials, where in each trial the j-th column is chosen with probability pj . Let C2 ∈ Rm×c2 contain the c2 sampled columns and let C = [V C2 ] ∈ Rm×(c1 +c2 ) contain the columns of V and C2 . Then, for any integer k > 0, rank i h X(A)   2 F † 2 E kA − CC AkF ≤ E kA − ΠC,k (A)kF ≤ σi2 (A) + i=k+1 k · kA − VV† Ak2F . β · c2 Given A and C, this method requires O(c1 mn) time to compute Ψ, another O(mn) time to compute the probabilities pj ’s and another O(n + c2 ) time for the sampling step - using the method in [51]. In total, the method requires O(c1 mn + c2 ) time to compute C2 . We denote this sampling procedure as C2 = AdaptiveCols(A, V, c2 , β). In words, given the matrix A and the subspace V, there exists a randomized algorithm to sample an additional of c2 columns from A, based on probabilities from the residual error matrix A − VV† A, such that residual error, in Frobenius norm, from projecting A onto the span of the union of the columns of V and the sampled columns is bounded from above with respect to the best rank k approximation to A, the residual A − VV† A, and the number of sampled columns c2 . 8.1.2 Distributed adaptive sampling In our distributed PCA algorithm below, we also need to use a distributed version of the previous adaptive sampling procedure. We provide some preliminary results for that task in this section. Lemma 60. Suppose that the columns of an m × n matrix A are partitioned arbitrarily across the machines into matrices A1 , . . . , As . Let C be an arbitrary m × r matrix. Consider the distribution p on n columns in which kaj − CC† aj k2F , pj = kA − CC† Ak2F where aj is the j-th column of A (j = 1 : n here). For each i ∈ [s], let some value βi satisfies kAi − CC† Ai k2F ≤ β i ≤ 2kAi − CC† Ai k2F . For each j ∈ [n], if column aj is held on the i-th server (denoted aij ), then let q j = Ps βi i′ =1 βi′ Then for each j ∈ [n], · kaij − CC† aij k22 kAi − CC† Ai k2F pj /2 ≤ qj ≤ 2pj . 41 . Proof. By definition of the β i , we have that Hence, kAi − CC† Ai k2F 2kAi − CC† Ai k2F βi P ≤ . ≤ s 2kA − CC† Ak2F kA − CC† Ak2F i′ =1 βi′ pj /2 ≤ qj ≤ 2pj . Lemma 61. Suppose the coordinator has an m × r matrix C of columns of an m × n matrix A, where r = O(k). Suppose the entries of A are integers bounded by poly(mns/ε) in magnitude, and let the columns of A be partitioned arbitrarily across the servers into matrices A1 , . . . , As . There is a protocol using O(skm) machine words of communication for the coordinator to learn values i β so that for all i ∈ [s], kAi − CC† Ai k2F ≤ β i ≤ 2kAi − CC† Ai k2F . Proof. The coordinator first sends C to all machines. The i-th server locally computes kAi − CC† Ai k2F . If this number is 0, he/she sends 0 to the coordinator, and in this case β i satisfies the requirement in the statement of the lemma. Otherwise, consider the matrix Bi which is formed by concatenating the columns of Ai with those of C. Then kBi − CC† Bi k2F = kAi − CC† Ai k2F > 0, (9) since the columns of Bi in C contribute a cost of 0. However, since Bi contains the columns of C and its cost is non-zero, it implies the rank of Bi is at least r + 1. By Corollary 38, this implies kBi − CC† Bi k2F > (mns/ε)−O(k) , which by (9) gives the same lower bound on kAi − CC† Ai k2F . Note also that kAi − CC† Ai k2F ≤ poly(mns/ε), since kAk2F ≤ poly(mns/ε). This implies if the i-th machine sends β i to the coordinator, where β i is the nearest power of 2 to kAi − CC† Ai k2F , there will only be O(k log(mns/ε)) possible values of β i , and hence each can be specified using O(log k + log log(mns/ε)) bits, i.e., a single machine word. This completes the proof. 8.1.3 Low-rank matrix approximations within a subspace The final stage of our distributed PCA algorithm below finds U ∈ span(C̃) such that the error of the residual matrix A − UUT A is “small”. To implement this step, we employ an algorithm developed in [37]. Lemma 62. Let A ∈ Rm×n be the input matrix and V ∈ Rm×c be the input subspace. We further assume that for some rank parameter k < c and accuracy parameter 0 < ε < 1 : 2 2 kA − ΠF V,k (A)kF ≤ (1 + O(ǫ))kA − Ak kF . Let V = YΨ be a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c . Let Ξ = Y T AW T ∈ Rc×ξ , √ √ where W T ∈ Rn×ξ with ξ = O(c/ε2 ), each element of which is chosen i.i.d. to be {+1/ n, −1/ n} with 42 probability 1/2. Let ∆ ∈ Rc×k contain the top k left singular vectors of Ξ. Then, with probability at least 1 − e−c , kA − Y∆∆T Y T Ak2F ≤ (1 + ε)kA − Ak k2F . Y, and ∆ can be computed in O(mnξ) time. We denote this procedure as [Y, ∆] = ApproxSubspaceSV D(A, V, k, ε). Proof. This result was essentially proven inside the proof of Theorem 1.1 in [36]. Specifically, the error bound proven in [36] is for the transpose of A (also Y, ∆ are denoted with U, V in [36]). As for the running time, given A, V, and k, one can compute (i) Y in O(mc2 ) time; (ii) Ξ in O(mnξ + mcξ) time; and (iii) ∆ in O(c2 ξ) time. In words, the lemma indicates that given the matrix A and the subspace V such that 2 2 kA − ΠF V,k (A)kF ≤ (1 + O(ǫ))kA − Ak kF , for some small ε > 0, there exists a randomized algorithm to compute matrices Y ∈ span(V) and ∆ such that the residual error, in Frobenius norm, from projecting A onto the span of Y∆ is also bounded by (1 + O(ǫ))kA − Ak k2F . Notice that ∆ contains the top k left singular vectors of a “sketched” version of Y T A, a property which makes the computation particularly effective in terms of running time. 8.2 Detailed description of the algorithm Input: 1. A ∈ Rm×n partitioned column-wise A = A1 A2 2. rank parameter k < rank(A)  P . . . As ; for i = 1 : s, Ai ∈ Rm×wi ; i wi = n. 3. accuracy parameter ε > 0 Algorithm 1. Local Column Sampling (a) For each sub-matrix Ai ∈ Rm×wi , compute Ci ∈ Rm×ℓ containing ℓ = O(k) columns from Ai as follows: Ci = Ai Si . Here, Si has dimensions wi × ℓ and is constructed as follows: Si = BssSamplingI(Ai , 4k, 1/2, 0.01/s) (see Lemma 56). (b) Machine i sends Ci to the server. 2. Global Column Sampling (a) Server constructs m × (s · ℓ) matrix G containing (s · ℓ) actual columns from A as follows: G = C1 C2 . . . Cs . Then, server constructs C ∈ Rm×c1 via choosing c1 = 4k columns from G as follows: C = DeterministicCssF robenius(G, k, c1 ) (see Lemma 58). (b) Server sends C to all the machines. 3. Adaptive Column Sampling (a) Machine i computes Ψi = Ai − CC† Ai ∈ Rm×wi and then computes βi as it was described in Lemma 61. Machine i sends βi to server. (b) Server computes probability distribution gi = Pβiβi . Server samples i.i.d. with replacement i ⌈ 50k/ε ⌉ samples (machines) from gi . Then, server determines numbers ti (i = 1, 2, . . . , s), where ti is the number of times the ith machine was sampled. It sends the ti ’s to the machines. 43 (c) Machine i computes probabilities qji = kxk22 /kΨi k2F (j = 1 : wi ), where x is the jth column of Ψi . And now machine i samples ti samples fromP it’s local probability distribution and sends the corresponding columns to the server. Let c2 = i ti = ⌈ 50k/ε ⌉. (d) Server collects the columns and assigns them to Ĉ ∈ Rm×c2 . Server constructs C̃ to be the  m × (c1 + c2 ) matrix: C̃ = C; Ĉ . Let c = c1 + c2 = 4k + ⌈ 50k/ε ⌉. 4. Rank-k matrix in the span of C̃ (a) Server sends C̃ to all the machines and each machine computes (the same) qr factorization of C̃: C̃ = YR where Y ∈ Rm×c has orthonormal columns and R ∈ Rc×c is upper triangular. 1/2. Implicitly (b) Machine i generates W̃i ∈ Rξ×wi with ξ = O(c/ε2 ) to be i.i.d.  {+1, −1} w.p.ξ×n , with W̃ ∈ R . Machine i all machines together generate W̃ = W̃1 W̃2 . . . W̃s T computes Hi = C̃ (Ai WiT ) ∈ Rc×ξ . Machine i sends Hi to the server. P (c) Server computes Ξ = si=1 Hi ∈ Rc×ξ and sends this back to all the machines. Now machines  √ compute Ξ := R−1 · Ξ · 1/ n(:= Y T AWT ), where ∈ Rξ×n is W √= W1 W2 . . . Ws √ random matrix each element of which is {+1/ n, −1/ n} w.p. 1/2, and then they compute ∆ ∈ Rc×k to be the top k left singular vectors of Ξ. Each machine computes U = Y · ∆ ∈ Rm×k . Discussion. A few remarks are necessary for the last two stages of the algorithm. The third stage (adaptive column sampling), implements the adaptive sampling method of Lemma 59. To see this, note that each column in A (specifically the jth column in Ai ) is sampled with probability gi · qji ≥ 1 ||xij ||22 , · 2 kΨk2F where Ψ = A − CC† A. This follows from Lemma 60. Overall, this stage effectively constructs Ĉ such that (see Lemma 59) Ĉ = AdaptiveCols(A, C, c2 , 1/2). The last stage in the algorithm implements the algorithm in Lemma 62. To see this, note that W satisfies the properties in the lemma. Hence, [Y, ∆] = ApproxSubspaceSV D(A, C̃, k, ε). 8.3 Main Result The theorem below analyzes the approximation error, the communication complexity, and the running time of the previous algorithm. Theorem 63. The matrix C̃ ∈ Rm×c with c = O(k/ε) columns of A satisfies w.p. at least 0.98, † (A)k2F ≤ (1 + O(ε)) · kA − Uk UkT Ak2F . kA − C̃C̃ Ak2F ≤ kA − ΠF C̃,k (10) The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.97, kA − UUT Ak2F ≤ (1 + O(ε)) · kA − Uk UkT Ak2F . (11) Let each column of Ahas at most φ non-zero elements. Then, the communication cost of the algorithm is O skφε−1 + sk2 ε−4 and the running time is O (mns · poly(k, 1/ε)) . 44 8.4 Proof of Theorem 63 8.4.1 Proof of Eqn. 10 From Lemma 59: h † E kA − C̃C̃ Ak2F i h ≤ E kA − (A)k2F ΠF C̃,k i ≤ rank X(A) σi2 (A) + i=k+1 2ε · kA − CC† Ak2F . 50 (12) Therefore, we need to bound kA − CC† Ak2F now. Lemma 64. With probability at least 0.99, matrix G is a (4k, 1/2)-projection-cost preserving sketch of A. Proof. For each i, Ci = Ai Si is a (4k, 1/2)-projection-cost preserving sketch of Ai with probability at least 1 − 0.01/s. Due to union bound, with probability at least 1 − 0.01, ∀i, Ci is a (4k, 1/2)projection-cost preserving sketch of Ai . Since Ci is a (4k, 1/2)-projection-cost preserving sketch of Ai , we can assume ci is a constant which is independent from projection matrix P which has rank at most 4k such that 3 1 kAi − PAi k2F ≤ kCi − PCi k2F + ci ≤ kAi − PAi k2F 2 2 Then, for any projection matrix P which has rank at most 4k we have: s 1 1X kAi − PAi k2F kA − PAk2F = 2 2 i=1 ≤ s X i=1 kCi − PCi k2F + ci s ≤ 3X kAi − PAi k2F 2  i=1 3 ≤ kA − PAk2F 2 Consider the right hand side of the first inequality, it is equal to kG − Let constant c = Ps i=1 ci , PGk2F + s X ci i=1 we have: 1 3 kA − PAk2F ≤ kG − PGk2F + c ≤ kA − PAk2F 2 2 Therefore, G is a (4k, 1/2)-projection-cost preserving sketch of A. For convenience, we use PG to denote a rank-k projection matrix which provides the best rank-k approximation Gk = PG G to matrix G. We also use PA to denote a rank-k projection 45 matrix which provides the best rank-k approximation Ak = PA A to matrix A. Thus, 1 kA − CC† Ak2F ≤ kG − CC† Gk2F + c 2 ≤ 5kG − PG Gk2F + c ≤ 5kG − PA Gk2F + c  ≤ 5 kG − PA Gk2F + c 15 kA − PA Ak2F ≤ 2 The first inequality is due to Lemma 64. G is a (4k, 1/2)-projection cost preserving sketch of A and C has rank at most 4k. The second inequality is based on Lemma 58. The third inequality is because PG provides the best rank-k approximation to G. The fourth inequality used the fact c is non-negative. The fifth inequality held because G is a (4k, 1/2)-projection cost preserving sketch of A. Thus, kA − CC† Ak2F ≤ 15kA − Ak k2F Combining with equation 12, we have: h E kA − C̃C̃ † Ak2F i h ≤ E kA − (A)k2F ΠF C̃,k i 30 ≤ (1+ ε) 50 rank X(A) i=k+1 σi2 (A) = (1+O(ε))kA−Ak k2F (13) Concluding the proof. Consider about rank i rank i h h X(A) X(A) † 2 2 ≤ (A) + O(ε) σ σi2 (A). (A)k E kA − C̃C̃ Ak2F ≤ E kA − ΠF i F C̃,k i=k+1 (14) i=k+1 Prank(A) The expectation is taken w.r.t. the randomness in constructing C̃; hence, the term i=k+1 σi2 (A) is a constant w.r.t. the expectation operation, which means that Eqn. 14 implies the bound:   rank rank X(A) X(A) F 2 2   E kA − ΠC̃,k (A)kF − σi (A) ≤ O(ε) · σi2 (A). i=k+1 (A)k2F − Let Y := kA − ΠF C̃,k Prank(A) i=k+1 i=k+1 σi2 (A). Y is a random variable with Y ≥ 0, because (A)) ≤ k. Markov’s inequality on Y implies that with arbitrary constant probability, rank(ΠF C̃,k kA − ΠF (A)k2F C̃,k kA − (A)k2F ΠF C̃,k − rank X(A) σi2 (A) ≤ rank X(A) σi2 (A) + i=k+1 ≤ O(ε) · rank X(A) σi2 (A), rank X(A) σi2 (A). i=k+1 equivalently, † i=k+1 O(ε) · (A)k2F concludes the proof. Using kA − C̃C̃ Ak2F ≤ kA − ΠF C̃,k 46 i=k+1 8.4.2 Proof of Eqn. 11 We would like to apply Lemma 62 for the matrix U ∈ Rm×k in the algorithm. Note that we have already proved that the matrix C̃ in the algorithm satisfies with probability at least 0.99: (A)k2F ≤ (1 + O(ε))kA − Ak k2F . Lemma 62 and a simple union bound conclude the kA − ΠF C̃,k proof. 8.4.3 Running time Next, we give an analysis of the arithmetic operations required in various steps in the algorithm. 1. Local Column Sampling: O(nnz(A) log(ms) + m · poly(k, ε, log(s))) arithmetic operations in total. (a) O(nnz(Ai ) log(ms) + m · poly(k, ε, log(s))) for each Si (b) - 2. Global Column Sampling: O(sk 3 + skm) arithmetic operations in total. (a) O(sk 3 + skm) to construct C. (b) 3. Adaptive Sampling O(sk 2 m + mnk + k/ε) arithmetic operations in total. (a) O(k2 m) for each C† locally; O(wi mk) for each Ψi and O(mwi ) for each ψi . (b) O(s) in total. (c) O(k/ε) in total using the method of [51] locally. (d) O(k/ε). 4. Rank-k matrix in span(C̃): O(mnk/ε3 + smk 2 /ε4 + sk 3 /ε5 ) arithmetic operations in total. (a) O(smk 2 /ε2 ) in total T (b) O(mwi k/ε3 ) for each Ai WiT and another O(mk2 ε−4 ) for each C̃ (Ai WiT ) (c) O(sk 2 ε−3 ) to find Ξ in the server; then another O(sk 3 ε−3 + sk 3 ε−5 )) to update Ξ locally in each machine and another O(sk 3 ε−5 ) to find ∆ locally in each machine; and O(smk 2 /ε) to find U locally in each machine. 8.4.4 Communication Complexity Assume that we can represent each element in the input matrix A with at most b bits. Also, we assume that one word has length b bits and b = O(log(mns/ε)). 1. Local Column Sampling: O(skφ) words. (a) (b) O(skφ) elements of A. 2. Global Column Sampling:O(skφ) words. (a) 47 (b) O(skφ) elements of A. 3. Adaptive Sampling: O(s + φk/ε) words. (a) s integers each of which is representable with O(log k+log log(mns/ε)) (from Lemma 61). (b) s integers (the ti ’s) each with magnitude at most n, hence representable with b bits. (c) O(φk/ε) elements of A. (d) 4. Best rank-k matrix in the span of C̃: O(sφk/ε + sk 2 ε−4 ) words. (a) O(skφε−1 ) elements of A. (b) O(sk 2 ε−4 ) numbers each of which can be represented with b bits. (c) O(sk 2 ε−4 ) numbers each of which can be represented with b bits. In total the communication complexity is O(skφ/ε + sk 2 /ε4 ) words. 9 Faster Distributed PCA for sparse matrices We now explain how to modify certain steps of the distributed PCA algorithm in Section 8 in order to improve the total running time spent to compute the matrix U; this, at the cost of increasing the communication cost slightly. Specifically, we replace the parts 2-(a), 3-(a), and 4-(b) with similar procedures, which are almost as accurate as the original procedures but run in time proportional to the number of the non-zero elements of the underlying matrices. Before presenting the new algorithm in detail, we discuss results from previous literature that we employ in the analysis. We remark that in the analysis below we have not attempted to optimize the constants. 9.1 Background material 9.1.1 Constant probability sparse subspace embeddings and sparse SVD First, we present the so-called sparse subspace embedding matrices of Clarskon and Woodruff [23]. Definition 65. [Sparse Subspace Embedding [23]] We call W ∈ Rξ×n a sparse subspace embedding of dimension ξ < n if it is constructed as follows, W = Ψ · Y, where • h : [n] → [ξ] is a random map so that for each i ∈ [n], h(i) = ξ ′ , for ξ ′ ∈ [ξ] w.p. 1/ξ. • Ψ ∈ Rξ×n is a binary matrix with Ψh(i),i = 1, and all remaining entries 0. • Y ∈ Rn×n is a random diagonal matrix, with each diagonal entry independently chosen to be +1 or −1, with equal probability. Such sparse subspace embedding matrices have favorable properties which we summarize below: Lemma 66 ([23]). Let AT ∈ Rn×m have rank ρ and let W ∈ Rξ×n be a randomly chosen sparse subspace embedding with dimension ξ = Ω(ρ2 ε−2 ), for some 0 < ε < 1. Then, 1) computing AW T requires O(nnz(A)) time; 2) nnz(AW T ) ≤ nnz(A); and 3) with probability at least 0.99, and for all vectors y ∈ Rm simultaneously, (1 − ε)kA T yk22 ≤ kWA T yk22 ≤ (1 + ε)kA T yk22 . 48 Notice that the third property in the lemma fails with constant probability. Based on the above sparse subspace embeddings, Clarkson and Woodruff [23] described a low-rank matrix approximation algorithm for A that runs in time nnz(A) plus low-order terms. Lemma 67 (Theorem 47 in [23]; for the exact statement see Lemma 3.4 in [19]). Given A ∈ Rm×n of rank ρ, a target rank 1 ≤ k < ρ, and 0 < ǫ ≤ 1, there exists a randomized algorithm that computes Z ∈ Rn×k with ZT Z = Ik and with probability at least 0.99, kA − AZZT k2F ≤ (1 + ǫ) kA − Ak k2F .  The proposed algorithm requires O nnz(A) + (m + n) · poly(k, ε−1 ) arithmetic operations. We denote this procedure as Z = SparseSV D(A, k, ε). Notice that the algorithm in the lemma fails with constant probability. 9.1.2 High probability sparse SVD Lemma 67 above presents a randomized algorithm to compute quickly an SVD of a sparse matrix; however, this lemma fails with constant probability. Since in our fast distributed PCA algorithm we will use the lemma multiple times (specifically, s times, since we need such a fast SVD locally in each machine), the overall failure probability would be of the order O(s) (by a union bound). To boost this failure probability, we develop a simple scheme to obtain a high probability result. Before we proceed, we quickly review the Johnson Lindestrauss transform, which we need in the analysis. Lemma 68. [Theorem 1 in [5] for fixed ε = 1/2] Let B ∈ Rm×n . Given β > 0, let r = (1/2)4+2β 2 −(1/2)3 log n. √ r×m Construct a matrix S ∈ R , each element of which is a random variable which takes values ±1/ r with equal probability. Let B̃ = SB. Then, if bi and b̃i denote the ith column of B and B̃, respectively, with probability at least 1− n−β , and for all i = 1, ...n, (1− 21 )kbi k22 ≤ kb̃i k22 ≤ (1+ 12 )kbi k22 . Given B, it takes O(nnz(B) log n) arithmetic operations to construct B̃. We will denote this procedure as B̃ = JLT (B, β). Now, we are fully equipped to design the “high-probability” analog of Lemma 67: Lemma 69. Given A ∈ Rm×n of rank ρ, a target rank 1 ≤ k < ρ, and 0 < δ, ǫ ≤ 1, there exists a randomized algorithm that computes Z ∈ Rn×k with ZT Z = Ik and with probability at least 1 − δ− 1/n, kA − AZZT k2F ≤ 3 (1 + ǫ) kA − Ak k2F . The proposed algorithm requires O nnz(A) log2 ( nδ ) + n · poly(k, ε, log( nδ )) arithmetic operations. We denote this procedure as Z = SparseSV DBoosting(A, k, ε, δ). Proof. The idea is to use the algorithm in Lemma 67 and generate i.i.d. r = O(log( 1δ )) matrices Z1 , Z2 , . . . , Zr , where Zi = SparseSV D(A, k, ε), and kA − AZi ZiT k2F ≤ (1 + ε)kA − Ak k2F , with probability at least 0.99 for a single Zi . Now, we could have chosen Z := Zi which minimizes kA − AZi ZiT k2F , and this would have implied that kA − AZZT k2F ≤ (1 + ε)kA − Ak k2F , with probability 1 − δ (via a simple chernoff argument), but evaluating the errors kA − AZi ZiT k2F is computationally intensive for the overall running time that we would like to obtain. Selection of Z. Instead, we use the Johnson Lindestrauss transform to speedup this computation (evaluating the errors). Hence, for every Zi , we (implicitly) set Bi := A − AZi ZiT and then we compute B̃i = JLT (Bi , 1) (see Lemma 68). Now, we choose the Zi that minimizes kB̃i k2F . 49 Correctness. For a fixed Zi , from Lemma 68 it follows that with probability 1 − 1/n it is: 21 kA − AZi ZiT k2F ≤ kB̃i k2F ≤ 23 kA−AZi ZiT k2F , where the failure probability is over the randomness of S in Lemma 68. Now, for some Zi with probability at least 0.99 it is kA− AZi ZiT k2F ≤ (1+ ε)kA − Ak k2F , where the failure probability is over the randomness in constructing Zi . Overall, given that n > 1, with probability at least 0.49 (over the randomness of both S and Zi ; the failure probability follows via a union bound) for each single Zi it is: kB̃i k2F ≤ 23 (1 + ε)kA − Ak k2F . Hence, since r = O(log 1δ ) and we have picked Z as the Zi that minimizes kB̃i k2F , it follows that with probability at least 1− δ, kB̃i k2F ≤ 23 (1+ε)kA −Ak k2F . Combining with 21 kA−AZi ZiT k2F ≤ kB̃i k2F , and using a union bound, it follows that with probability 1 − 1/n − δ: kA − AZi ZiT k2F ≤ 62 (1 + ε)kA − Ak k2F .  Running time. The following costs occur O(log( 1δ )) times: (i) O nnz(A) + (m + n) · poly(k, ε−1 ) to find Zi (via Lemma 67); (ii) O(nnz(A) log n + nk log(n)) to evaluate each cost, i.e., find kB̃i k2F . 9.1.3 Fast column sampling techniques Section 8.1.1 presented the column sampling algorithms that we used in our distributed PCA algorithm in Section 8. Next, we present the “fast” analogs of those algorithms. To design such fast analogs we employ the sparse subspace embedding matrices in the previous section. All the results in this section developed in [19]. There is a small difference in Lemma 70 below, hence we present a short proof for completeness. Specifically, the original result in [19] has a constant failure probability; here, via using standard arguments, we extended this result to a high probability bound. Lemma 70 (Input-Sparsity-Time Dual-Set Spectral-Frobenius Sparsification [19].). Let V ∈ Rw×k be a matrix with w > k and V T V = Ik . Let E ∈ Rm×w be an arbitrary matrix. Let δ be a failure probability parameter. For i = 1, 2, . . . , r = O(log 1δ ), let Bi = EWiT ∈ Rm×ξ , where Wi ∈ Rξ×w is a randomly chosen sparse subspace embedding with ξ = O(k2 /ε2 ) < w, for some 0 < ε < 1 (see Definition 65 and Lemma 66), and run the algorithm of Lemma 57 with V, Bi , and some ℓ with k < ℓ ≤ w, to construct Si ∈ Rw×ℓ . Choose some S from the Si ’s - see the proof for the details. 2   p 2  1+ε · kEk2F . Then, with probability at least 1 − δ, σk2 V T S ≥ 1 − k/ℓ and kESk2F ≤ 1−ε   The matrix S can be computed in O log 1δ · nnz(A) + ℓwk2 + mk 2 /ε2 + mℓ time. We denote this procedure as S = BssSamplingSparse(V, A, r, ε, δ). Proof. The algorithm constructs the Si ’s as follows, Si = BssSampling(V, Bi , r) - see Lemma 57.  p 2  From that lemma, we also have that σk2 V T Si ≥ 1 − k/ℓ and kBiT Sk2F ≤ kBiT k2F , i.e., kWi AT Si k2F ≤ kWi AT k2F . Since Wi is a subspace embedding, from Lemma 66 we have that with probability at least 0.99 and for all vectors y ∈ Rn simultaneously, (1 − ε) kAT yk22 ≤ kWi AT yk22 . Apply this r times for y ∈ Rn being columns from Si ∈ Rn×r and take a sum on the resulting inequalities: (1 − ε) kAT Si k2F ≤ kWAT Si k2F ; also, apply this n times for the basis vectors in Rn and take a sum on the resulting inequalities: kWA T k2F ≤ (1 + ε) kA T k2F . Combining all these · kA T k2 . inequalities together, we conclude that with probability at least 0.99, kAT Si k2F ≤ 1+ε 1−ε p F2  To summarize, for each Si and with probability at least 0.99, σk2 V T Si ≥ 1 − k/ℓ and 2  · kEk2F . kESi k2F ≤ 1+ε 1−ε 50 Selection of S. Now that we have r matrices Si each of which satisfying the above bounds with probability 0.99 we select one of them as follows: 1) we compute all σk2 V T Si and sort them from the largest to the smallest value; 2) we compute all kAT Si k2F and sort them from the smallest to the largest value; 3) we choose an Si which occurs in the top 2/3 fraction of each of the lists.  Correctness. Let Xi be an indicator random variable: Xi = 1 if the ith matrix Si satisfies σk2 V T Si ≥  p 2 P 1 − k/ℓ , and Xi = 0, otherwise. Then, Pr[Xi ] ≥ 0.99. Let X = ri Xi . The expected value of X is µX = E [X] = 0.99r. A standard Chernoff bound applied on X gives: Pr[X ≤ (1 − α)µX ] ≤ µX α e− 2 . Let (1 − α)0.99r = 0.75r, i.e., α = 0.14/0.99. Applying this to the Chernoff bound, we get: Pr[X ≤ 0.75r] ≤ e−O(r) . Replacing r = O(log(1/δ)): Pr[X ≤ 0.75r] ≤ δ/2. This means precisely p 2   that 3/4 of the fraction of the Si ’s satisfy with probability 1 − δ/2 : σk2 V T Si ≥ 1 − k/ℓ . Similarly, let Yi be an indicator random variable: Yi = 1 if the ith matrix Si satisfies kESi k2F ≤ 2 P 1+ε · kEk2F , and Yi = 0, otherwise. Then, Pr[Yi ] ≥ 0.99. Let Y = ri Xi . The expected value of 1−ε Y is µY = E [Y ] = 0.99r. A standard Chernoff bound applied on Y gives: Pr[Y ≤ (1 − α)µY ] ≤ µY α e− 2 . Let (1 − α)0.99r = 0.75r, i.e., α = 0.14/0.99. Applying this to the Chernoff bound, we get: Pr[Y ≤ 0.75r] ≤ e−O(r) . Replacing r = O(log(1/δ)): Pr[Y ≤ 0.75r] ≤ δ/2. This means precisely 2  1+ε · kEk2F . that 3/4 of the fraction of the Si ’s satisfy w.p. 1 − δ/2 : kESi k2F ≤ 1−ε Now a simple union bound indicates that with probability at least 1 − δ, the following two events happen simultaneously: X > 0.75r and Y > 0.75r. Since we select an element Si on top of the two sorted lists, it follows that this element should have Xi = Yi = 1.  Running time. The following costs occur O(log( 1δ )) times: (i) O(nnz(A)) to find Bi . (i) O(ℓwk2 +  mξ) to find Si (via Lemma 57); and (iii) O(k 2 ℓ + mℓ) to evaluate each cost and, i.e., find σk2 V T Si and kESi k2F . Additionally, O(log( 1δ ) log log( 1δ )) time in total is spent in sorting. The following Lemma is the “fast” analog of Lemma 58. The failure probability in the lemma is constant, but this is sufficient for our purposes since we apply this lemma only once in the global column sampling step of the distributed PCA algorithm in Section 9.2. Lemma 71 (Input-Sparsity-Time constant factor column-based matrix reconstruction; Lemma 6.3 2 in [19]). Given matrix G ∈ Rm×α of rank ρ and a target  rank k , there exists a randomized algorithm −1 that runs in O nnz(A) · log α + m · poly(log α, k, ε ) time and selects c = 4k columns of G to form a matrix C ∈ Rm×c such that with probability at least 0.69: kG − CC† Gk2F ≤ 4820 · rank X(G) σi2 (G). i=k+1 We denote this procedure as C = DeterministicCssF robeniusSparse(G, k, c). Finally, the lemma below presents the “fast” analog of Lemma 59. The failure probability in the lemma is, again, constant; we have not attempted to obtain a high probability bound since we employ this lemma only once in the algorithm in Section 9.2. 2 The original Lemma 6.3 in [19] has the assumption that k < ρ, but this assumption can be dropped having the result unchanged. The only reason the assumption k < ρ exists is because otherwise column subset selection is trivial. 51 Lemma 72 (Input-sparsity-time Adaptive Sampling [19]). Given A ∈ Rm×n and V ∈ Rm×c1 (with c1 ≤ n, m), define the residual matrix Ψ = A − VV† A ∈ Rm×n . Let Ψ̃ = JLT (Ψ, 1). For j = 1, . . . , n, let pj be a probability distribution such that, for some positive constant β ≤ 1, pj ≥ βkΨ̃ (j) (j) 2 k2 /kΨ̃k2F , where Ψ̃ is the j-th column of the matrix Ψ̃. Sample c2 columns from A in c2 i.i.d. trials, where in each trial the j-th column is chosen with probability pi . Let C2 ∈ Rm×c2 contain the c2 sampled columns and let C = [V C2 ] ∈ Rm×(c1 +c2 ) contain the columns of V and C2 . Then, for any integer k > 0, and with probability 0.9 − n1 2 2 kA − ΠF C,k (A)kF ≤ kA − Ak kF + 30 · k kA − VV† Ak2F . β · c2 Given A and V, the algorithm takes O(nnz(A) log n + mc1 log n + mc21 ) time to find C2 . We denote this sampling procedure as C2 = AdaptiveColsSparse(A, V, c2 , β). 9.1.4 Fast Low-rank matrix approximations within a subspace Finally, we present the fast analog of the result in Section 8.1.3. The failure probability in the lemma is, again, constant; we have not attempted to obtain a high probability bound since we employ this lemma only once in the algorithm in Section 9.2. Lemma 73. Let A ∈ Rm×n be the input matrix and V ∈ Rm×c be the input subspace. We further assume that for some rank parameter k < c and accuracy parameter 0 < ε < 1 : 2 2 kA − ΠF V,k (A)kF ≤ (1 + O(ε))kA − Ak kF . Let V = YΨ be a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c . Let Ξ = Y T AW T ∈ Rc×ξ , where W T ∈ Rn×ξ with ξ = O(c/ε2 ), is a sparse subspace embedding matrix (see Definition 65 and Lemma 66). Let ∆ ∈ Rc×k contain the top k left singular vectors of Ξ. Then, with probability at least 0.99, kA − Y∆∆T Y T Ak2F ≤ (1 + ε)kA − Ak k2F . Y and ∆ can be computed in O(nnz(A) + mcξ) time. We denote this procedure as [Y, ∆] = ApproxSubspaceSV DSparse(A, V, k, ε). Proof. This result was proven inside the proof of Theorem 1.5 in [36]. Specifically, the error bound proven in [36] is for the transpose of A (also Y, ∆ are denoted with U, V in [36]). The only requirement for the embedding matrix W (denoted with P in the proof of Theorem 1.5 in [36]) is to be a subspace embedding for Y T A, in the sense that W is a subspace embedding for A in Lemma 66. Since our choice of W with ξ = O(c2 /ε2 ) satisfies this requirement we omit the details of the proof. The running time is O(nnz(A)+mcξ): one can compute (i) Y in O(mc2 ); (ii) Ξ in O(nnz(A)+mcξ); and (iii) ∆ in O(cξ min{c, ξ}). The failure probability 0.01 from Lemma 66. 9.2 Detailed description of the algorithm This algorithm is very similar to the algorithm in Section 8.2; we only replace the parts 2-(a), 3-(a), and 4-(b) with faster procedures. Input: 1. A ∈ Rm×n partitioned column-wise A = A1 A2 2. rank parameter k < rank(A) 52  P . . . As ; for i = 1 : s, Ai ∈ Rm×wi ; i wi = n. 3. accuracy parameter ε > 0 4. failure probability δ Algorithm 1. Local Column Sampling (a) For each sub-matrix Ai ∈ Rm×wi , compute Ci ∈ Rm×ℓ containing ℓ = O(k) columns from Ai as follows: Ci = Ai Si . Here, Si has dimensions wi × ℓ and is constructed as follows: Si = BssSamplingI(Ai , 4k, 1/2, 0.01/s) (see Lemma 56). (b) Machine i sends Ci to the server. 2. Global Column Sampling (a) Server constructs m × (s · ℓ) matrix G containing (s · ℓ) actual columns from A as follows: G = C1 C2 . . . Cs . Then, server constructs C ∈ Rm×c1 via choosing c1 = 4k columns from G as follows: C = DeterministicCssF robeniusSparse(G, k, c1 ) (see Lemma 71). (b) Server sends C to all the machines. 3. Adaptive Column Sampling (a) Server initializes the random seed and communicates it to all the machines. Each machine constructs the same S ∈ Rr×m , with r = (1/2)4+2 2 −(1/2)3 log n, each element of which is a random vari√ able which takes values ±1/ r with equal probability. Machine i finds Ψ̃i = SAi − SCC† Ai ∈ Rm×wi and then computes βi as it was described in Lemma 61. Machine i sends βi to server. (b) Server computes probability distribution gi = Pβiβi . Server samples i.i.d. with replacement i ⌈ 50k/ε ⌉ samples (machines) from gi . Then, server determines numbers ti (i = 1, 2, . . . , s), where ti is the number of times the ith machine was sampled. It sends the ti ’s to the machines. (c) Machine i computes probabilities qji = kxk22 /kΨ̃i k2F (j = 1 : wi ), where x is the jth column of Ψ̃i . And now machine i samples ti samples fromP it’s local probability distribution and sends the corresponding columns to the server. Let c2 = i ti = ⌈ 50k/ε ⌉. (d) Server collects the columns and assigns them to Ĉ ∈ Rm×c2 . Server constructs C̃ to be the  m × (c1 + c2 ) matrix: C̃ = C; Ĉ . Let c = c1 + c2 = 4k + ⌈ 50k/ε ⌉. 4. Rank-k matrix in the span of C̃ (a) Server sends C̃ to all the machines and each machine computes (the same) qr factorization of C̃: C̃ = YR where Y ∈ Rm×c has orthonormal columns and R ∈ Rc×c is upper triangular. (b) Server initializes the random seed and sends this to each machine, such that each machine generates the same matrix Ψ ∈ Rξ×n , for ξ = O(c2 /ε2 ), (see Definition 65). Machine i generates Di ∈ Rn×wi such that implicitly D = D1 D2 . . . Ds is an n × n matrix each element of ξ×wi . which is ±1, with probability 1/2. Each machine constructs implicitly i ∈ R  Wi = Ψ · Dξ×n and W Implicitly all machines together generate W = W1 W2 . . . Ws , with W ∈ R T is a subspace embedding as in Definition 65. Machine i computes Hi = C̃ (Ai WiT ) ∈ Rc×ξ . Machine i sends Hi to the server. Ps (c) Server computes Ξ = i=1 Hi ∈ Rc×ξ and sends this back to all the machines. Now machines compute Ξ := R−1 · Ξ(:= Y T Ai WiT ), and then they compute ∆ ∈ Rc×k to be the top k left singular vectors of Ξ. Each machine computes U = Y · ∆ ∈ Rm×k . 53 Discussion. A few remarks are necessary for the last two stages of the algorithm. The third stage (adaptive column sampling), implements the adaptive sampling method of Lemma 72. To see this note that each column in A is sampled with probability qji · gi ≥ 1 · ||x||22 /kΨ̃k2F , 2 where x is this column in Ψ̃. This follows from Lemma 60. Overall, this stage constructs Ĉ such that Ĉ = AdaptiveColsSparse(A, C, c2 , 1/2). The last stage in the algorithm implements the algorithm in Lemma 73. To see this, note that W satisfies the properties in the lemma. Hence, [Y, ∆] = ApproxSubspaceSV DSparse(A, C̃, k, ε). 9.3 Main result The theorem below analyzes the approximation error, the communication complexity, and the running time of the previous algorithm. Theorem 74. The matrix C̃ ∈ Rm×c with c = O(k/ε) columns of A satisfies w.p. 0.59 − s+1 n   rank X(A) (A)k2F ≤ (1 + O(ε)) ·  kA − C̃C̃ Ak2F ≤ kA − ΠF σi2 (A) . C̃,k † − 2δ: (15) i=k+1 The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.58 −  kA − UUT Ak2F ≤ (1 + O(ε)) ·  rank X(A) i=k+1 s+1 n − 2δ:  σi2 (A) . (16) Let each column of Ahas at most φ non-zero elements. Then, the communication cost of the algorithm is O skφε−1 + sk3 ε−5 and the running time is  ns    ns  O nnz(A) · log2 + (m + n)s · poly(k, ε−1 , log . δ δ 9.4 Proof of Theorem 74 9.4.1 Proof of Eqn. 15 From Lemma 72, we have that with probability at least 0.9 − n1 : † (A)k2F ≤ kA − C̃C̃ Ak2F ≤ kA − ΠF C̃,k rank X(A) i=k+1 σi2 (A) + 60ε · kA − CC† Ak2F . 50 (17) According to Lemma 64, G is a (4k, 1/2)-projection-cost preserving sketch of A. It means that there exists a constant c which is independent from projection matrix P and we have the following: 3 1 kA − PAk2F ≤ kG − PGk2F + c ≤ kA − PAk2F 2 2 54 For convenience, we use PG to denote a rank-k projection matrix which provides the best rank-k approximation Gk = PG G to matrix G. We also use PA to denote a rank-k projection matrix which provides the best rank-k approximation Ak = PA A to matrix A. With probability at least 0.68, the following will be held, 1 kA − CC† Ak2F ≤ kG − CC† Gk2F + c 2 ≤ 4820kG − PG Gk2F + c ≤ 4820kG − PA Gk2F + c  ≤ 4820 kG − PA Gk2F + c 4820 ≤ kA − PA Ak2F 2 The first inequality is due to Lemma 64. G is a (4k, 1/2)-projection cost preserving sketch of A and C has rank at most 4k. The second inequality is based on Lemma 71. The third inequality is because PG provides the best rank-k approximation to G. The fourth inequality used the fact c is non-negative. The fifth inequality held because G is a (4k, 1/2)-projection cost preserving sketch of A. Thus, kA − CC† Ak2F ≤ 4820kA − Ak k2F Concluding the proof. Combining with Equation 17, we have: † kA − C̃C̃ Ak2F ≤ kA − ΠF (A)k2F ≤ C̃,k 9.4.2 rank X(A) i=k+1 σi2 (A) + O(ε) · rank X(A) σi2 (A). (18) i=k+1 Proof of Eqn. 16 We would like to apply Lemma 73 for the matrix U ∈ Rm×k in the algorithm. Note that we already proved that the matrix C̃ in the algorithm satisfies with probability 0.59 − s+1 n − 2δ: kA − ΠF (A)k2F ≤ (1 + O(ε))kA − Ak k2F . C̃,k Lemma 73 and a simple union bound conclude the proof. 9.4.3 Running time 1. Local Column Sampling: O(nnz(A) log(ms) + m · poly(k, ε, log(s))) arithmetic operations in total. (a) O(nnz(Ai ) log(ms) + m · poly(k, ε, log(s))) for each Si (b) -  2. Global Column Sampling: O nnz(A) · log k + m · poly(k, ε−1 ) .  (a) O nnz(A) · log k + m · poly(k, ε−1 ) to construct C - from Lemma 71. (b) - 55 3. Adaptive Sampling: O(nnz(A) · log n + m · s · poly(k, ε−1 , log n)). (a) First, we analyze the cost to compute the matrix Ψ̃i . O(k2 m) for each C† locally; then, we compute (SAi ) − (((SCi )C†i )Ai ). The costs are: SAi := D takes O(nnz(Ai )) time, SCi := G takes O(nnz(Ai ) log(n)) time, GC†i := H takes O(m log(n)k/ε2 ) time, HA := L takes O(nnz(Ai ) log(n)) time, and D − L takes O(n log n) time. So, the total time to compute one Ψ̃i is O(nnz(Ai ) log n + m · poly(k, ε−1 , log n)). Also, there is a cost of computing ψi , which is O(log n · wi ) arithmetic operations. (b) O(s) in total. (c) O(k/ε) in total using the method of [51] locally. (d) O(k/ε). 4. Rank-k matrix in span(C̃): O(nnz(A) + m · s · poly(k, ε−1 )) arithmetic operations in total. (a) O(smk 2 /ε2 ) in total. (b) O(sn) in total to generate s times the same Ψ. Then another O(n) in total to generate the Di ’s. For all Ai WiT we need O(nnz(A)) operations and then another O(mk 3 ε−7 ) for each Y T · (Ai WiT ) (c) O(sk 3 ε−5 ) to find Ξ; then another O(sk3 ε−3 + sk4 ε−6 )) to update Ξ locally in each machine and another O(sk 4 ε−6 ) to find ∆; and O(smk 2 /ε) to find U (s times). 9.4.4 Communication Complexity Assume that we can represent each element in the input matrix A with at most b bits. Also, we assume that one word has length b bits and b = O(log(mns/ε)). 1. Local Column Sampling: O(skφ) words. (a) (b) O(skφ) elements of A. 2. Global Column Sampling:O(skφ) words. (a) (b) O(skφ) elements of A. 3. Adaptive Sampling: O(s + φk/ε) words. (a) s integers each of which is representable with O(log k+log log(mns/ε)) (from Lemma 61). (b) s integers (the ti ’s) each with magnitude at most n, hence representable with b bits. (c) O(φk/ε) elements of A. (d) 4. Best rank-k matrix in the span of C̃: O(sφk/ε + sk 3 ε−5 ) words. (a) O(skφε−1 ) elements of A. (b) O(sk 3 ε−5 ) numbers each of which can be represented with b bits. (c) O(sk 3 ε−5 ) numbers each of which can be represented with b bits. In total the communication complexity is O(skφ/ε + sk 3 /ε5 ) words. 56 10 Lower bounds Only in Section 10.1, we discuss the result in arbitrary partition model. In Section 10.2, Section 10.3 and Section 10.4, we discuss results in column partition model which provides stronger lower bounds than in arbitrary partition model. 10.1 Dependence on Ω(ε−2 ) bits for distributed PCA in arbitrary partition model Lemma 75 (Theorem 8 in [54]). There are two machines, and each of them hold a matrix Ai ∈ Rm×n . Let A = A1 + A2 . Suppose ε2 ≤ 2n, the communication of computing a rank-k matrix U with constant probability such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F needs Ω(1/ε2 ) bits. Proof. (from [54]). The reduction is from GHD problem. Lemma 76 (Theorem 1.1 in [20]). Each of two machines has an n-bit vector. There is a promise: either √ √ the inputs are at Hamming distance less than n/2 − c n or greater than n/2 + c n. If they want to distinguish these two cases with constant probability, the communication required Ω(n) bits. Without loss of generality, we assume 1/ε2 is an integer, and machine 1 and machine 2 have 2 x, y ∈ {−1, 1}1/ε respectively. There is a promise that either xT y < −2/ε or xT y > 2/ε holds. Consider about the following protocol: 1. Machine 1 constructs A1 ∈ R(k+1)×(1/ε  xT ε √0  0 2   A1 =  0  0  ... ...  0 0 0 √ 0 2 +k) , and machine 2 constructs A2 ∈ R(k+1)×(1/ε ... ... 0 0 ... ... ... 0 ... 0 ... √ 2(1+ε) ε  2(1+ε) ε           A2 =    y T ε 0 0 ... 0 0 0 0 ... 0 0 0 0 0 0 ... ... ... ... ... 0 0 0 ... 0 2 +k) :       2. The server computes U such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F and sends U to both of two machines, where A = A1 + A2 . 3. Let P = Ik+1 − UUT . Each machine construct v = P(1) /kP(1) k2 4. Each machine checks whether v12 < 21 (1 + ε). If yes, return the case xT y > 2/ε. Otherwise return the case xT y < 2/ε Suppose the server successfully computes U. Since the rank of A is at most k + 1: kA − UUT Ak2F = kPAk2F = kvAk22 = vAAT v T 57 An observation is that     AAT =    kx + yk22 ε2 0 0 2 0 0 ... ... 0 0 0 0 2(1+ε) ε2 ... 0 ... ... ... ... ... 0 0 0 ... 2(1+ε) ε2 We have kA − Ak k2F ≤ 2. Then, k+1 2(1 + ε) X 2 vi = ε2 i=3        2(1 + ε) (1 − v12 − v22 ) ε2 < 2(1 + ε) We have v12 + v22 > 1 − ε2 . When xT y > 2/ε, kx + yk22 ε2 ≥ 2 + 4ε (1 + ε)kA − Ak k2F = 2(1 + ε) > v12 (2 + 4ε) + 2v22 > 2 − 2ε2 + 4εv12 So, v12 < 12 (1 + ε). When xT y < −2/ε, kx + yk22 ε2 ≤ 2 − 4ε (1 + ε)kA − Ak k2F = kx + yk22 ε2 (1 + ε) > v12 kx + yk22 ε2 + 2v22 = 2(v12 + v22 ) − (2 − kx + yk22 ε2 )v12 > 2(1 − ε2 ) − (2 − kx + yk22 ε2 )v12 So, v12 > 1 2(1 − ε2 ) − kx + yk22 ε2 (1 + ε) ≥ (1 + ε) 2 2 2 2 − kx + yk2 ε Therefore, machines can distinguish these two cases. The only communication is computing U. This cost shoulde be the same as Ω(1/ε2 ) bits lower bound of the gap hamming distance problem. 10.2 Lower bounds for distributed PCA on dense matrices This section provides a communication cost lower bound for the Distributed PCA problem of Definition 17. Specifically, we describe the construction of an m × n matrix A (hard instance), and formally argue that for this A, any k ≤ 0.99m, and any error parameter C with 1 < C < poly(skm), if there exists some algorithm to construct an m × k matrix U such that, with constant probability, kA − UUT Ak2F ≤ C · kA − Ak k2F , then this algorithm has communication cost Ω(skm) words. 10.2.1 Preliminaries We use the notation Gk,m to denote the set of k-dimensional subspaces of Rm , which we identify with corresponding projector matrices Q ∈ Rm×m , with rank(Q) = k ≤ m, onto the subspaces, i.e., Gk,m = {Q ∈ Rm×m : Q2 = Q, rank(Q) = k ≤ m.} 58 We also need a description of a subset from Gk,m: Cδk (P) = {Q ∈ Gk,m : kP − Qk2 ≤ δ}. This is the set of those projectors Q ∈ Gk,m which differ in operator norm by at most δ from another fixed projector P ∈ Gk,m . In our analysis below we also need a result from [38]: Theorem 77. (Net Bound - Corollary 5.1 of [38]) For any m, k, δ > 0, there is a family N = {P1 , . . . , PN }, N = 2Ω(k(m−k) log(1/δ)) , where Pi ∈ Gk,m and Cδk (Pi ) ∩ Cδk (Pj ) = ∅, for all i 6= j. Theorem 77 proves the existence of a large, but finite, set N of projection matrices, such that if one considers the ball of matrices of operator norm at most δ centered at each matrix in N , then these balls are disjoint. Our hard instance matrix A is constructed from some member in N . 10.2.2 Hard instance construction Recall that in the column-partition model of Definition 15 there are s servers holding matrices A1 , . . . , As , respectively, P where Ai has m rows and some subset of wi 3columns of some m × n matrix A. Notice that wi = n. First of all, for arbitrary m, s we assume that n ≥ sm. Below, we describe a specific construction for a matrix A. First of all, we set δ = 1/(skm), the parameter to be used in Theorem 77. Next, fix a family N of subspaces of Gk,m with the guarantees of Theorem 77. Let PR = RRT be a uniformly random member of N , where R ∈ Rm×k has orthonormal columns (any projector can be expressed as such a matrix, where the columns of R span the subspace that P projects onto). The entries of A1 are equal to the entries of R, each rounded to the nearest integer multiple of 1/B, where B = poly(skm) is a large enough parameter specified later. We denote this rounded matrix with k R̃ ∈ Rm×k . So, if αij is the (i, j)th entry in A1 , then αij = kmin B , with kmin = argmin |Rij − B |. Each k∈Z Ai for i = 2, 3, . . . , s − 1 is 1/B times the m × m identity matrix. Finally, As is the m × t matrix of all zeros with t = n − (s − 1)m − k. I.e.,  A = R̃ B1 Im B1 Im . . . B1 Im 0m×t . 10.2.3 Intermediate results First, we give a bound regarding the best rank k approximation for the above matrix A. Lemma 78. For the matrix A ∈ Rm×n in Section 10.2.2, and any k ≤ 0.99m : kA − Ak k2F < sm . B2 Proof. We have, kA − Ak k2F ≤ kA − A1 A†1 Ak2F X = k(I − A1 A†1 )Ai k2F i>1 ≤ X i>1 kAi k2F m = (s − 2) · 2 B sm < , B2 As, otherwise we can choose a value s′ < s so that n − m ≤ s′ m ≤ n and apply the argument of Theorem 82 with s replaced with s′ . Then, the lower bound in Theorem 82 will then be Ω(s′ mk), which assuming n ≥ 2d, is an Ω(n) communication lower bound 3 59 where the first inequality uses the fact that A1 A†1 is a matrix of rank at most k, the first equality uses the fact that (I − A1 A†1 )Ai is the all-zeros matrix, the second inequality uses that a projector cannot increase a unitarily invariant norm, and the third inequality follows by construction. Next, we bound, in the operator norm, the difference of A1 from the matrix R. The lemma follows from the fact that A1 ∈ Rm×k is obtained by R ∈ Rm×k by rounding each entry to the nearest integer multiple of 1/B, and then summing the squared differences across all km entries. Lemma 79. (Precision Lemma) kA1 − Rk2 ≤ Proof. kA1 − Rk22 ≤ kA1 − Rk2F ≤ √ km B . km . B2 Next, we prove a pure linear algebraic result. The following lemma captures the fact that if some P ∈ Gk,m is close to QP (in Frobenius norm) for Q ∈ Gk,m , then P is also close to Q (in Frobenius norm). We will use this lemma later for P = PR . Lemma 80. (Error Measure) Let P, Q ∈ Gk,m with kP − QPk2F ≤ ∆. Then kP − Qk2F ≤ 2∆. Proof. By the matrix Pythagorean theorem, k = kQk2F = kQPk2F + kQ(I − P)k2F . (19) Also by the matrix Pythagorean theorem, k = kPk2F = kQPk2F + k(I − Q)Pk2F , and so using the premise of the lemma, kQPk2F ≥ k − ∆. Combining with (19), kQ(I − P)k2F ≤ ∆. (20) Hence, kP − Qk2F = k(P − Q)Pk2F + k(P − Q)(I − P)k2F = kP − QPk2F + kQ − QPk2F ≤ ∆ + kQ(I − P)k2F ≤ 2∆, where the first equality follows by the matrix Pythagorean theorem, the second equality uses P2 = P (since P is a projector), the third equality uses the bound in the premise of the lemma, and the fourth inequality uses (20). 10.2.4 Main Argument Before presenting the main theorem, we give an intermediate technical lemma. Lemma 81. (Implication of Correctness) Let A ∈ Rm×n be the hard instance matrix in Section 10.2.2 and let A be distributed in s machines in the way it was described in Section 10.2.2:  A = R̃ B1 Im B1 Im . . . B1 Im 0m×t . Suppose n = Ω(sm), k < rank(A), and 1 < C < poly(skm). A is revealed to the machines by just describing the entries in A and without specifying any other detail regarding the construction. Given this A and assuming further that each machine knows some projector matrix Q ∈ Rm×m with rank at most k such that kA − QAkF ≤ CkA − Ak kF , there is a deterministic algorithm (protocol) which, upon termination, leaves on each machine the matrix R ∈ Rm×k which was used to construct A1 . 60 1 Proof. First, we prove that kRRT − Qk2 < 2skm . Then, using this bound, we describe a protocol that deterministically reveals the matrix R which was used to construct A1 . , which in Using Lemma 78 and the premise in the lemma, it follows that: kA − QAk2F ≤ C sm B2 particular implies that kA1 − QA1 k2F ≤ C sm . B2 (21) We further manipulate the term kA1 − QA1 kF as follows: kA1 − QA1 kF = k(I − Q)A1 kF = k(I − Q)RRT + (I − Q)(A1 − RRT )kF ≥ k(I − Q)RRT kF − k(I − Q)(A1 − RRT )kF ≥ k(I − Q)RRT kF − kI − QkF k(A1 − RRT )k2 √ √ km √ T ≥ k(I − Q)RR kF − ( m + k), B where the first inequality is the triangle inequality, the second inequality uses sub-multiplicativity, and the third inequality uses the triangle inequality, i.e., that kI − QkF ≤ kIkF + kQk , and Lemma √ F √ T Csm 2m k 79. Combining this bound with (21), it follows that k(I − Q)RR kF ≤ B + B . At this point we would like to apply Lemma 80 to conclude that kRRT − QkF is small. To do so, we need RRT and Q to be of rank k. While R has rank k by construction, Q may not. However, increasing the rank of Q cannot increase the error kA−QAkF . Hence, if rank(Q) < k, given Q, the protocol in the premise of the lemma allows each server to locally add standard basis vectors to the column space of Q until the column space of Q becomes k. This involves no communication and each server ends up with the same new setting of Q, which for simplicity we still denote with Q. Therefore, rank(Q) = k. Applying Lemma 80, it now follows that √ ! √ √ Csm 2m k T T + . kRR − Qk2 ≤ kRR − QkF ≤ 2 B B 1 . By setting B to be a sufficiently large poly(skm), we have kRRT − Qk2 < 2skm i Therefore, given Q, by Theorem 77 there is a unique matrix P in N for which Q ∈ Cδk (Pi ), 1 1 with δ = skm . Indeed, since kR − Qk2 ≤ skm < δ/2, there cannot be two matrices Pi and Pj for i 6= j for which Q ∈ Cδk (Pi ) and Q ∈ Cδk (Pj ) since then by the triangle inequality kPi − Pj k2 < δ, contradicting the construction of N . Hence, it follows that each machine can deterministically identify this Pi , by enumeration over N , and therefore compute R, via, for example, an SVD. We are now fully equipped to present the main argument about the communication cost lower bound for distributed PCA. Theorem 82. (Main) Let A ∈ Rm×n be the hard instance matrix in Section 10.2.2 and let A be distributed in s machines in the way it was described in Section 10.2.2:  A = R̃ B1 Im B1 Im . . . B1 Im 0m×t . Suppose n = Ω(sm), k ≤ .99m, and 1 < C < poly(skm). Assume that there is an algorithm (protocol) which succeeds with probability at least 2/3 in having the i-th server output QAi , for all i, where Q ∈ Rm×m is a projector matrix with rank at most k such that kA − QAkF ≤ CkA − Ak kF . Then, this algorithm requires Ω(skm log(skm)) bits of communication. 61 Further, the bound holds even if the input matrices Ai to the servers have all entries which are integer multiples of 1/B, for a value B = poly(skm), and bounded in magnitude by 1, and therefore all entries can be specified with O(log(skm)) bits. Note that assuming a word size of Θ(log(skm)) bits, we obtain an Ω(skm) word lower bound. Proof. If the protocol succeeds, then, since each server outputs QAi , and Ai is 1/B times the identity matrix for all i = 2, 3, ...s − 1, each of those servers can compute Q. One of those servers can now send this Q to the first and the last server. It follows by Lemma 81, that each server can identify PR and R. Letting E be the event that the protocol succeeds, and letting Πi be the ordered sequence of all incoming and outgoing messages at the i-th server, it follows that I(Πi ; Q | E) = Ω(log |N |) = Ω(km log(smk)), where I(X; Y | F) = H(X | F)−H(X | Y, F) is the mutual information between random variables X and Y conditioned on F. To see the first equality in the above, observe that I(Πi ; Q | E) = H(Q | E) − H(Q | Πi , E), and conditioned on E, there is a uniquely determined matrix PR each server identifies, which is uniform over a set of size |N |, and so H(Q | E) ≥ H(PR ) = Ω(log2P |N |). Here, H(X) is the Shannon entropyP of a random variable X, given by H(X) = x Pr[X = x] log(1/ Pr[X = x]), and H(X | Y ) = y Pr[Y = y]H(X | Y = y) is the conditional Shannon entropy. Hence, if Z is an indicator random variable which is 1 if and only if E occurs, then using that I(X; Y ) ≥ I(X; Y | W ) − H(W ) for any random variables X, Y, and W , and that I(X; Y | W ) = P w Pr[W = w]I(X; Y | W = w), we have I(Πi ; Q) ≥ I(Πi ; Q | Z) − 1 ≥ I(Πi ; Q | Z = 1) Pr[Z = 1] − 1 = Ω(km log(smk)), mapping X to Πi , Y to Q, and W to Z in the mutual information bound above. It follows that Ω(km log(smk)) ≤ I(Πi ; Q) ≤ H(Πi ) ≤ EPR ,rand [|Πi |], where |Πi | denotes the length, in bits, of the sequence Πi , and rand is the concatenation of the private randomness of all s players Note that the entropy of Πi is a lower bound on the expected encoding length of |Πi |, by the Shannon coding theorem. By linearity of expectation, P kΠi | = Ω(skm log(smk)), which implies there exists an R and setting of rand for which Pi ER,rand i i kΠ | = Ω(skm log(smk)). It follows that the total communication is Ω(smk log(smk)) bits. 10.3 Lower bounds for distributed PCA on sparse matrices Applying the previous theorem with m = φ gives a communication lower bound for sparse matrices. Corollary 83. Let A ∈ Rφ×n be the hard instance matrix in Section 10.2.2 (with m replaced with φ in noting the number of rows in A):  A = R̃ B1 Iφ B1 Iφ . . . B1 Iφ 0φ×t . Suppose n = Ω(sφ), k ≤ .99φ, and 1 < C < poly(skφ). Now, for arbitrary m consider the matrix  ∈ Rm×n which has A in the top part and the all-zeros (m − φ) × n matrix in the bottom part.  admits the same column partition as A after padding with zeros: 62  =  R̃ 1 B Iφ 1 B Iφ 0(m−φ)×k 0(m−φ)×φ 0(m−φ)×φ  1 ... 0φ×t B Iφ . . . . 0(m−φ)×φ 0(m−φ)×t We denote the new sub-matrices with Âi ∈ Rm×wi . Assume that there is an algorithm (protocol) which succeeds with probability at least 2/3 in having the i-th server output Q̂Âi , for all i, where Q̂ ∈ Rm×m is a projector matrix with rank at most k such that k − Q̂ÂkF ≤ Ck − Âk kF . Then, this algorithm requires Ω(skφ log(skφ)) bits of communication. Note that assuming a word size of Θ(log(skφ)) bits, we obtain an Ω(skφ) word lower bound. 10.4 Lower bounds for distributed column-based matrix reconstruction In this section we develop a communication lower bound for the Distributed Column Subset Selection Problem of Definition 19. 10.4.1 A Net of discretized Deshpande-Vempala hard instances We start by describing the construction of a special sparse matrix from the work of Desphande and Vempala [27], which was further studied by [17]. This matrix gives a lower bound (on the number of columns need to be selected in order to achieve a certain accuracy) for the standard column subset selection problem (see the following Fact). Suppose φ ≥ 2k/ǫ. Consider a (φ + 1) × φ matrix B for which the i-th column is e1 + ei+1 , where ei is the i-th standard basis vector in Rφ+1 . Now define an ((φ + 1)k) × (φk) matrix A with k blocks along the diagonal, where each block is equal to the matrix B. Let n = (φ + 1)k. Fact 84. (Proposition 4 in [27], extended in Theorem 37 of [17]) Let A be as above. If P is an n×n projection operator onto any subset of at most k/(2ǫ) columns of A, then kA − PAk2F > (1 + ǫ)kA − Ak k2F . To prove a communication lower bound for distributed column subset selection, we will need to transform the above matrix A by multiplying by a rounded orthonormal matrix, as follows. We also need to prove a similar lower bound as in the previous fact for this transformed matrix. Lemma 85. Let A, k, φ, 1/ε, and n be as above. For any n × n orthonormal matrix L, let L̃ denote the matrix formed by rounding each of the entries of L to the nearest integer multiple of M , where M ≤ 1/((φ + 1)k)c , for a sufficiently large constant c > 0. If P is an n × n projection operator onto any subset of at most k/(6ǫ) columns of L̃A, then kL̃A − PL̃Ak2F > (1 + ǫ)kL̃A − [L̃A]k k2F . Proof. We will show that, assuming 1/ε < n/3, if P is an n × n projection operator onto any subset of at most k/(2ǫ) columns of L̃A, then kL̃A − PL̃Ak2F > (1 + ǫ/3)kL̃A − [L̃A]k k2F . The lemma will then follow by replacing ε with 3ε. Suppose S is a subset of k/(2ǫ) columns of L̃A for which kL̃A − PL̃Ak2F ≤ (1 + ǫ/3)kL̃A − [L̃A]k k2F , (22) where P is the projection onto the columns in S and [L̃A]k is the best rank-k approximation to L̃A The proof strategy is to relate the left hand side of (22) to kA − QAk2F where Q is the projection onto the columns of A indexed by the same index set S, and simultaneously to relate the right hand side of (22) to kA − Ak k2F . We start by looking at kL̃A − [L̃A]k kF . Notice that L̃A = LA + EA, where E is a matrix whose entries are all bounded in magnitude by M . Therefore, L̃A = LA + F, where F = EA and 1/2 1/2 kFk2 ≤ kEkF kAkF ≤ n2 M 2 · (2(n − 1))1/2 ≤ 2n3 M 2 , 63 where we have used kAkF ≤ (2(n − 1))1/2 . By Weyl’s inequality (Corollary 7.3.8 of [34]), for all i ≤ φk, 1/2 |σi (LA) − σi (LA + F)| ≤ kFk2 ≤ 2n3 M 2 , where σi (X) denotes the i-th singular value of a matrix X. Since L is orthonormal, σi (LA) = σi (A) for all i. It follows that X kL̃A − [L̃A]k k2F = σi2 (L̃A) i>k X 1/2 2 = σi (LA) ± 2n3 M 2 i>k X 1/2 2 = σi (A) ± 2n3 M 2 i>k = kA − Ak k2F ± O(nkAk2 n3 M 2 = kA − Ak k2F ± O(1/n2 ), 1/2 + n4 M 2 ) (23) where the final line follows for a sufficiently small choice of M ≤ 1/nc , using that kAk2 ≤ kAkF = √ O( n). We now look at kL̃A − PL̃AkF . By the triangle inequality, kL̃A − PL̃AkF ≥ kLA − PLAkF − kEAkF − kPEAkF ≥ kLA − PLAkF − kEkF kAkF − kPk2 kEkF kAkF = kA − LT PLAkF − O(1/n3 ), (24) where the equality uses that multiplying by LT preserves norms, as well as that kEkF ≤ 1/poly(n) for an arbitrarily small poly(n) by making M ≤ 1/nc sufficiently small, whereas kPk2 ≤ 1 and √ kAkF = O( n). We claim LT PL = Q, where Q is the projection onto the columns in A indexed by the set S. To see this, let U be an orthonormal basis for the columns in A spanned by the index set S, so that P = LUUT LT . Then LT PL = UUT = Q. Hence, using that kA − QAkF ≤ kAkF = √ O( n) and squaring (24), we have, kL̃A − PL̃Ak2F ≥ kA − QAk2F − O(1/n2 ). (25) Combining (22), (23), and (25), kA − QAk2F ≤ (1 + ǫ/3)kA − Ak k2F + O(1/n2 ). (26) Note that kA − Ak kF ≥ 1 for any k < n, since if we remove the top row of A, creating a matrix B, then kB − Bk kF ≤ kA − Ak kF , yet B is the identity matrix, and so kB − Bk kF ≥ 1. It follows that the additive O(1/n2 ) error in (26) translates into a relative error, provided k < n and for 1/ε < n/3. Hence, kA − QAk2F ≤ (1 + ǫ)kA − Ak k2F , and therefore by Fact 84, we have |S| > k/(2ǫ). 10.4.2 Column sharing of discretized orthonormal matrices We need the following technical lemma about sampling random orthonormal matrices, concerning the number of columns they have in common after rounding. 64 Lemma 86. Let 1 ≤ r ≤ n, and let M ≤ 1/nc for a sufficiently large absolute constant c > 0. Suppose we choose two independently random orthogonal matrices A ∈ Rn×n and B ∈ Rn×n from the Haar measure (so they each have orthonormal columns and orthonormal rows). We then round each of the entries in A to the nearest integer multiple of M , obtaining a matrix Ã, and similarly obtain B̃. Let E denote the event that there exist r distinct indices i1 , . . . , ir ∈ [n] and r distinct indices j1 , . . . , jr ∈ [n] for which Ã∗,iℓ = B̃∗,jℓ for all ℓ = 1, 2, . . . , r, where Ã∗,iℓ denotes the iℓ -th column of Ã. Then, Pr[E] ≤ e−Θ(nr log M ) . Proof. We fix a subset S of r distinct indices i1 , . . . , ir ∈ [n] and a subset T of r distinct indices j1 , . . . , jr ∈ [n] and show that the probability Ã∗,iℓ = B̃∗,jℓ simultaneously for all ℓ ∈ [r] is at most e−Θ(nr log M ) . It then follows by a union bound that      ne 2r n n −Θ(nr log M ) e−Θ(nr log M ) ≤ e−Θ(nr log M ) , Pr[E] ≤ · ·e ≤ r r r as desired. Since A and B are independent and their distribution is permutation-invariant, we can assume iℓ = jℓ = ℓ for ℓ ∈ [r]. Let F be the event that Ã∗,iℓ = B̃∗,jℓ occurs for all ℓ ∈ [r]. If F occurs, then √ we need kA∗,iℓ − B∗,jℓ k∞ ≤ M for all ℓ ∈ [r], which implies kA∗,iℓ − B∗,jℓ k2 ≤ nM for all ℓ ∈ [r]. Let Ar be the leftmost r columns of A, and Br the leftmost r columns of B. Then, if F occurs r kA − Br k22 r ≤ kA − Br k2F = r X ℓ=1 kA∗,ℓ − B∗,ℓ k22 ≤ rnM 2 . Note that Ar and Br have orthonormal columns, and so PAr = (Ar )(Ar )T and PBr = (Br )(Br )T are projection matrices. Then, kAr − Br k2 ≥ k(Ar )(Ar )T − Br (Ar )T k2 /2 + k(Ar )(Br )T − (Br )(Br )T k2 /2 = k(Ar )(Ar )T − (Ar )(Br )T k2 /2 + k(Ar )(Br )T − (Br )(Br )T k2 /2 ≥ k(Ar )(Ar )T − (Br )(Br )T k2 /2, (27) where the first inequality follows since multiplying by a matrix on the right with orthonormal rows cannot increase the spectral norm, the equality follows by taking transposes, and the second inequality follows by the triangle inequality. We need another result from [38]. Theorem 87. (Probability Bound - Claim 5.2 of [38]) Suppose we choose two independent random subspaces Y and S of Rn each of dimension r from the Haar measure, where we denote the projection operators onto the subspaces by YY T and SST , respectively, where Y and S have r orthonormal columns. Then for any δ ∈ (0, 1), Pr[kYY T − SST k2 ≤ δ] ≤ e−Θ(r(n−r) log(1/δ)) . Combining (27) with Theorem 87, we have that for r ≤ n/2, Pr[F] ≤ e−Θ(rn log(M )) , since by √ taking M ≤ 1/nc sufficiently small, we can ensure kAr − Br k2 ≤ rnM ≤ M 1/2 , and so 2M 1/2 upper bounds k(Ar )(Ar )T − (Br )(Br )T k2 . Note that if r > n/2, then in particular we still have that Ã∗,iℓ = B̃∗,jℓ for all ℓ ∈ [r/2], and therefore in this case we also have Pr[F] ≤ e−Θ(rn log M ) . Hence, Pr[E] ≤ e−Θ(rn log M ) , which completes the proof. We now extend Lemma 86 to a k-fold version. 65 Lemma 88. Let M ≤ 1/nc for a sufficiently large absolute constant c > 0. Suppose we independently choose k pairs of matrices Az , Bz ∈ Rn×n , z ∈ [k], each with orthonormal columns (and hence also orthonormal rows). We then round each of the entries in each Az and Bz to the nearest integer multiple of M , obtaining matrices Ãz , and B̃z . Let r = (r1 , . . . , rk ) ∈ (Z≥0 )k and let E be the event that for each z ∈ [k], there exist distinct indices i1 , . . . , irz ∈ [n] and j1 , . . . , jrz ∈ [n] for which Ãz ∗,iℓ = B̃z ∗,jℓ for all Pk ℓ = 1, 2, . . . , rz . Then, Pr[E] ≤ e−Θ(n z=1 rz log M ) . Proof. This follows by Lemma 86, and the fact that the matrices A1 , . . . , Ak , B1 , . . . , Bk are jointly independent. Here we also use a union bound. Corollary 89. Suppose 1 ≤ k < c0 n for an absolute constant c0 > 0. Let r = (r1 , . . . , rk ) ∈ (Z≥0 )k . Let M ≤ 1/nc for a sufficiently large constant c > 0. There exists a set N of eΘ(nt log M ) k-tuples (Ã1 , . . . , Ãk ) of matrices each of dimensions n × n with entries that are integer multiples of M and bounded in magnitude P by 1, such that for every vector r = (r1 , . . . , rk ) ∈ (Z≥0 )k with kz=1 rz ≤ t, it holds that for all distinct ktuples (Ã1 , . . . , Ãk ), (B̃1 , . . . , B̃k ), there exists a z ∈ [k] for which there are no sets S = {i1 , . . . , irz }, T = {j1 , . . . , jz } ⊂ [n] for which Ã∗,iℓ = B̃∗,jℓ for all ℓ = 1, 2, . . . , rz . Proof. For a fixed vector r and a random choice of (A˜1 , . . . , A˜k ), (B˜1 , . . . , B˜k ), by the guarantee of Lemma 88, the complement of the event in the statement of the corollary happens with probability P at most e−Θ(nt log M ) . The number of vectors r with kz=1 rz ≤ t is at most tk , and tk e−Θ(nt log M ) ≤ e−Θ(nt log M ) provided k < c0 n for an absolute constant c0 > 0, so we can apply a union bound over all pairs in a random choice of eΘ(nt log M ) k-tuples. 10.4.3 Hard instance construction We have s servers holding matrices A1 , . . . , A Ps , respectively, where Ai has m rows and a subset of wi columns of an m × n matrix A, where wi = n. For our lower bound we assume 2/ε ≤ φ and kφ ≤ m. Note that for ε less than a sufficiently small constant, this implies that k < c0 kφ, and so the assumption in Corollary 89 is valid (since the n of that corollary is equal to (k + 1)φ We set M = 1/(mn)c for a sufficiently large constant c > 0. We will have A1 being an m × k(φ − 1) matrix for which all but the first kφ rows are zero. We assume 2/ε ≤ φ. On the first kφ rows, A1 is block diagonal containing k blocks, each block being a φ × (φ − 1) matrix. To specify A1 , let the parameters t and n of Corollary 89 equal k/(2ε) and φ, respectively. That corollary gives us a net N of eΘ(kφ(log(mn))/ε) k-tuples of matrices each of dimensions φ × φ with entries that are integer multiple of M and bounded in magnitude by 1. For a random k-tuple (B1 , . . . , Bk ) in N , we create an m × m block diagonal matrix B, which is 0 on all but its first kφ rows and first kφ columns. On its first kφ rows, it is a block diagonal matrix B whose blocks along the diagonal are B1 , . . . , Bk , respectively. Our matrix A1 is then the matrix product of B and an matrix D, where D is m × k(φ − 1) is formed by taking the kφ × k(φ − 1) matrix of Fact 84 and padding it with m − kφ rows which are all zeros. By Lemma 85, no k/(2ǫ) columns of A1 contain a k-dimensional subspace in their span which is a (1 + ǫ)-approximation to the best rank-k approximationt to A1 . Each Ai for i = 2, 3, . . . , s − 1 is the m × m matrix of all zeros. Finally, As is the m × t matrix  of all zeros with t = n − (s − 1)m − k(φ − 1), i.e., A = A1 0m×m 0m×m . . . 0m×m 0m×t . By construction, each column of A has at most φ non-zero entries, since the only non-zero columns are those in A1 , and each column in A1 has the form Bz∗,1 + Bz∗,i for a z ∈ [k] and an i ∈ [φ], so it has at most φ non-zero entries. 66 10.4.4 Main theorem In the Distributed Column Subset Selection Problem in Definition 18, a correct protocol should have each of the s machines simultaneously output a matrix C ∈ Rm×c with c < n columns of A such that kA − CC† Ak2F ≤ (1 + ε)kA − Ak k2F . Theorem 90. Assume 2/ε ≤ φ and kφ ≤ min(m, n). Then, any, possibly randomized, protocol Π which succeeds with probability at least 2/3 in solving the Distributed Column Subset Selection Problem of Definition 18, under the promise that each column of A has at most φ non-zero entries which are integer multiples of 1/(mn)c and bounded in magnitude by 1, for a constant c > 0, requires Ω(sφk(log(mn))/ε) bits of communication. If the word size is Θ(log(mn)), this implies the communication cost of the porticol is Ω(sφk/ε) words. Proof. By construction of A1 , whenever Π succeeds, each of the s machines outputs the same set C of at least t ≥ k/(2ǫ) columns of A1 . Let Πi denote the transcript (sequence of all messages) between the coordinator and the i-th player. We look at the information Πi reveals about A1 , given the event E that Π succeeds, that is, I(Πi ; A1 | E). A critical observation is that any column C∗,i of C, is equal to Bz∗,1 + Bz∗,i for some z ∈ [k], where Bz is as defined above (i.e., A1 = B · D). Hence, given Bz∗,1 and C∗,i , one can reconstruct Bz∗,i . Now, for any random variable W , I(Πi ; A1 | E) ≥ I(Πi ; A1 | E, W ) − H(W ). (28) We let W = (B1∗,1 , . . . , Bk∗,1 ), and observe that H(W ) ≤ log2 ((2M )kφ ) since there are 2M choices for each coordinate of each Bz∗,1 . Hence, H(W ) = O(kφ log(mn)). Note that I(Πi ; A1 | E, W ) = H(A1 ) = log2 (|N |), since conditioned on the protocol succeeding, and given W , by Corollary 89 we can reconstruct A1 . By (28), it follows that (Πi ; A1 | E) ≥ Θ(φk(log(mn))/ǫ) − O(kφ log(mn)) = Ω(φk(log(mn))/ǫ). Note that if Z is an indicator random variable that indicates that E occurs, we have H(Z) ≤ 1, and so I(Πi ; A1 ) ≥ I(Πi ; A1 | E) Pr[E] − 1 = Ω(φk(log(mn))/ǫ), since Pr[E] ≥ 2/3. It follows that Ω(φk(log(mn))/ǫ) ≤ I(Πi ; A1 ) ≤ H(Πi ) ≤ EA1 ,rand [|Πi |], where |Πi | denotes the length, in bits, of the sequence Πi of messages, and rand is the concatenation of the private randomness of all s machines. Note that the entropy of Πi is a lower bound on the expected encoding length of |Πi |, by the Shannon coding theorem. By linearity of expectation, X EA1 ,rand |Πi | = Ω(φk(log(mn))/ǫ), i which implies there exists an A1 and setting of rand for which X |Πi | = Ω(sφk(log(mn))/ǫ). i It follows that the total communication is Ω(sφk(log(mn))/ǫ) bits. 67 Corollary 91. Assume 2/ε ≤ φ and kφ ≤ min(m, n). Then, any, possibly randomized, protocol Π which succeeds with probability at least 2/3 in solving the Distributed Column Subset Selection Problem - rank k subspace version (see Definition 19), promise that each column of A has at most φ non-zero entries which are integer multiples of 1/(mn)c and bounded in magnitude by 1, for a constant c > 0, requires Ω(sφk(log(mn))/ε) bits of communication. If the word size is Θ(log(mn)), this implies the total communication across all s machines is Ω(sφk/ε) words. Proof. As any such protocol is also a protocol for the Distributed Column Subset Selection Problem of Definition 18 (the problem in Definition 19 is more general/difficult than the problem of Definition 18), the proof follows immediately from Theorem 90. 68
8
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Transmission Line Inspires A New Distributed Algorithm to Solve the Linear System of Circuit Fei Wei, Huazhong Yang, Senior Member, IEEE Abstract—Transmission line, or wire, is always troublesome to integrated circuits designers, but it could be helpful to parallel computing researchers. This paper proposes the Virtual Transmission Method (VTM), which is a new distributed and stationary iterative algorithm to solve the linear system extracted from circuit. It tears the circuit by virtual transmission lines to achieve distributed computing. For the symmetric positive definite (SPD) linear system, VTM is proved to be convergent. For the unsymmetrical linear system, numerical experiments show that VTM is possible to achieve better convergence property than the traditional stationary algorithms. VTM could be accelerated by some preconditioning techniques, and the convergence speed of VTM is fast when its preconditioner is properly chosen. Index Terms—Circuit simulation, distributed computing, numerical analysis, transmission line, wire. T I. INTRODUCTION RANSMISSION line, or interconnect, or wire, is one of the main determinants of chip performance, because of the long interconnect latency and large power dissipation [37]. However, the circuit could not work without transmission lines, because the transmission line plays an irreplaceable role to make the distributed circuit stable and scalable [13]. In this paper, transmission lines are used to assist the distributed computation of sparse linear system of circuit. The basic problem of the distributed circuit simulation is to distributedly solve the sparse linear system extracted from circuit [34, 41, 46]. Generally speaking, the linear system of circuit is unsymmetrical, because of the existence of controlled sources. Restricted to the resistor-capacitor (RC) network, the linear system would be symmetrical [39]. Many numerical algorithms are employed to solve the linear system from circuit. KLU is an optimized LU factorization algorithm for circuit, and it is broadly used in commercial and non-commercial circuit simulators [49]. KLU is sequential. SuperLU is an outstanding distributed algorithm to solve the general unsymmetrical sparse linear system on a large number of processors, and it has been widely adopted for circuit simulation [15]. Xyce is a parallel circuit simulator designed for supercomputers, and it uses the Block Jacobi preconditioned GMRES method [50, 4, 3]. Schur complement method is a non-overlapping domain decomposition method making use of the master-slave model. It is simple to be comprehended and implemented, and was frequently used [29, 65, 20]. [7] presents a parallel direct/iterative mixed approach, based on the Schur complement method and preconditioned GMRES method. [41] adopted the preconditioned overlapping domain decomposition method, which is supported by PETSc, a distributed scientific computing package [1]. The highlight of [41] is that it improves the matrix property by exploring the characters of transistor device models. The symmetric linear system of circuit is mainly extracted from the RC networks. Solving RC network is the key for the power grid analysis and thermal analysis [30, 26]. Meanwhile, the sparse linear system generated by the finite element method from elliptic partial differential equations (PDE) is equivalent to a resistor network. The simulation of power grid has been intensively researched in the past 10 years, and a variety of numerical algorithms had been employed to solve the RC network, such as stationary iterative methods [67], Krylov-subspace iterative method [12], algebraic multigrid (AMG) [31, 69], coupled iterative/direct method [32] and FFT method [48]. [42] proposed a stochastic method, and this method was further expanded as a preconditioning method for the diagonal dominant matrix [43]. To compute the RC network on the parallel computing platform, [68] makes use of the domain decomposition method (DDM). [11] adopts a distributed matrix inversion algorithm. The potential of GPU to solve the RC network was illustrated in [6, 16, 17, 48]. VTM is a new distributed and stationary iterative algorithm to solve the sparse linear systems [59]. VTM is similar to Block Jacobi or Overlapped Block Jacobi method [56, 66]. VTM is inspired by the behavior of transmission line [40, 13]. It inserts virtual transmission lines into the circuit to achieve distributed computing [58, 59]. The idea of VTM is derived from the pseudo transient method [57]. Pseudo transient method inserts pseudo capacitors or inductors into the circuit to approve the convergence property of DC analysis. Similarly, VTM inserts pseudo transmission lines into the circuit to approve the convergence property of distributed simulation. Inserting virtual or pseudo electrical element to assist the circuit simulation is a common approach, and the advantage is that the physical property of circuit could be utilized during numerical computation. VTM draws a parallel between distributed computing of linear system and distributed simulation of linear circuit, and it interprets the relationship between numerical analysis and circuit analysis. To solve a sparse linear system in parallel is equalized to simulate a linear circuit in parallel, and vice versa, > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < we might comprehend the distributed numerical algorithm from the viewpoint of circuit theory and microwave network. To partition a circuit, node tearing and branch tearing are two important methods [64, 47]. This paper proposes the third way, which is called wire tearing. Tearing the circuit by wires is not a new idea, since all the subcircuits are connected by wires, but we first apply this concept into the distributed numerical algorithms [58, 59]. Wire tearing can be considered as the insertion of transmission line to connect the torn nodes [61]. The advantage of wire tearing over the branch tearing and node tearing is that it does not bring in any extra energy, because all the wires are passive [27]. As a distributed numerical algorithm, VTM is similar to overlapped Block Jacobi or Block SOR method [2, 45]. We have proved that VTM is convergent to solve arbitrarily-large SPD linear system on arbitrary number of processors [59, 62]. VTM could also be considered as a new type of algebraic domain decomposition method [55]. VTM is similar to the additive Schwarz method with Robin condition, i.e. Schwarz-Robin method [35, 21, 22, 36]. Additive Schwarz method is mainly used to solve the sparse linear system from elliptic partial differential equations (PDE), and VTM is used to solve the general sparse linear system. The partitioning method for VTM, i.e. wire tearing, is different from the traditional partitioning methods for algebraic additive Schwarz method [22, 36]. Furthermore, the preconditioning technique for VTM is more flexible than Optimized Schwarz Method [21]. This paper is organized as follows. Section 2 presents a brief introduction to the linear system of circuit. Section 3 introduces the mathematical description of transmission line. Section 4 proposes the physical background of VTM. Section 5 describes how to partition the circuit by wire tearing. Section 6 details the algorithm of VTM. Section 7 presents the convergence theory. Section 8 provides a simple example. Section 9 discusses the preconditioning techniques for VTM. Numerical experiments are shown in Section 10. We conclude this work in Section 11. In the appendix, we present a proof for the convergence theory. II. LINEAR SYSTEM OF CIRCUIT In virtue of the nodal analysis, one circuit could be described by a sparse linear system [39]. Ax = b (1) Here x represents the nodes’ voltages, and b is the current sources flowing into the nodes. A is the coefficient matrix, which might be symmetrical, or unsymmetrical, depending on the property of circuit. If the circuit contains no voltage sources but only current sources, we call it current-driven circuit. To construct the linear system of current-driven circuit, we only need to use the nodal analysis technique, and do not need the modified nodal analysis technique [39]. If there were voltage sources in the circuit, they might be equalized into current sources, according to the Norton equivalent theory [18]. 2 Fig. 1. Transmission line. (A) The circuit diagram of the transmission line. (B) The equivalent circuit of the lossless transmission line. Lemma 1: For a current-driven linear resistor network, its coefficient matrix, A, is weakly diagonally dominant, and thus symmetrical-non-negative-definite (SNND). Further, if there is at least one resistor connecting to the ground, A is strictly diagonally dominant, and thus symmetric-positive-definite (SPD). The physical insight of this lemma is that the energy of a resistor network is always non-negative. III. TRANSMISSION LINE Transmission line is an important element in electrical and microwave engineering. It is also called cable, wire or interconnect in different contexts. The circuit diagram of the transmission line is illustrated in Fig. 1. The analytical description of the lossless or ideal transmission line is the wave equation [40, 13]. ∂ 2 u ( x, t ) ∂ 2 u ( x, t ) LC (2) = ∂2 x ∂ 2t Here L is the inductance per unit length, C is the capacitance per unit length. The time domain mathematical description of the lossless transmission line is called Transmission Delay Equations, as shown in (3) [40, 8, 59]. u1 (t ) + Z ⋅ i1 (t ) = u2 (t − τ ) − Z ⋅ i2 (t − τ ) u2 (t ) + Z ⋅ i2 (t ) = u1 (t − τ ) − Z ⋅ i1 (t − τ ) (3) Here u1(t) and u2(t) represent the port voltages. i1(t) and i2(t) represent port inflow currents. t is the time variable. τ is the propagation delay. Z is the characteristic impedance, which is positive. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 3 Z = L/C The propagation delay of the transmission line is: τ = l LC Where l is the length of the transmission line. The iterative formula of Transmission Delay Equations is similar to the Robin boundary condition in Partial Differential Equations and Schwarz-Robin method [35, 21]. There are two main differences: First, the normal derivative in the robin condition is replaced by a current; Second, (3) expresses the time delay explicitly. For a number of coupled transmission lines, (3) could be re-expressed in the matrix-vector form: u1 (t) + Z ⋅ i1 (t) = u 2 (t - τ) - Z ⋅ i 2 (t - τ) u 2 (t) + Z ⋅ i 2 (t) = u1 (t - τ) - Z ⋅ i1 (t - τ) (4) Here Z is the characteristic impedance matrix of the transmission lines. If there is no coupling among transmission lines, Z is diagonal; if there is coupling, Z is a sparse matrix. (4) could be re-expressed as (5): i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ) i 2 (t) + W ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ) (5) Here W is the characteristic admittance matrix of the wires. W = Z -1 Associated with the principle of parallel computer, we come to realize that, there is conceptual similarity between the distributed computer and the distributed circuit, as shown in Fig. 2 [61]. First, different circuits are connected by wires, which is similar to the situation where different processors are connected by the digital data link. Second, the wire has transmission delay, and there is also communication delay between the processors. As the result, if we assimilate each circuit to a processor, and consider the wire as the data link between processors, then the distributed circuit would be kind of a distributed computer. Fig. 2. Similarity between the distribute circuit and distributed computer. (a) Distributed circuit, two subcircuits are connected by a wire. (b) Distributed computer, two processors are connected by a digital data link. IV. PHYSICAL BACKGROUND In this section, we present an observation from circuit and microwave network. This lemma presents the stability property of the resistor network with wires. Fig. 3 presents an illustration for this lemma. Lemma 2 could be validated in SPICE [38, 44]. Lemma 2: A linear resistor network with wires inside never oscillates unendingly, and it will finally settle down to the steady state, which is the steady state of the resistor network eliminating all the wires. The physical insight of this lemma is that, the energy of a resistor network is limited. Divergence means infinite energy, which is impossible for the resistor network. Lemma 2 is also valid for the resistor-capacitor network. But for the general circuit with wires, it is not always valid. A distributed circuit with wires inside might go unconvergent. The stability is depending on the property of circuit and the characteristic impedance of the wires. Fig. 3. Illustration of the stability theory of resistor network with wires. (a) The resistor network with wires inside. (b) The resistor network without wires. (c) The voltage of node 2a and node 2b in (a) woud converge to the steady state, which is the voltage of node 2 in (b). > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < V. WIRE TEARING To solve the sparse linear system of a circuit, originally there is no transmission line in it, but we might figure out some way to insert transmission lines into the circuit by splitting the nodes. This partitioning technique is called wire tearing. By means of wire tearing, the original circuit is turned into a distributed circuit. It is partitioned into a number of separate sub-circuits by virtual transmission line. Later, we locate each sub-circuit into one processor, and use the digital data link to imitate the behavior of the transmission line. As the result, the distributed circuit is simulated in a distributed way. According to Lemma 2, the resistor network with wires would finally go to the steady state, which is exactly the steady state of the resistor network without wires. This lemma explains the reason that VTM could always be convergent to solve the resistor network. For the sparse linear system of a general circuit, VTM might be unconvergent. There are 4 steps to perform wire tearing for the circuit G . Γ denotes the set of all the nodes in G . Step 1. Set the splitting interface Γ interface ⊆ Γ . V is called interfacial node if V ∈ Γinterface ; otherwise, V is called inner node. Step 2. Split each interfacial node into a pair of nodes, which are called twin nodes. Step 3. Split the resistors and current sources connected to each interfacial node. Step 4. Connect each pair of twin nodes by a length of lossless wire. Add inflow currents to the twin nodes. Example 1. Fig. 4 illustrates an example, in which a simple resistor network is split into two sub-circuits. 4 First we define the set of inner nodes in Sub-circuit 1 as Γ1,inner , the set of inner nodes in Sub-circuit 2 as Γ 2,inner . By reordering the rows, the sparse linear system of circuit (1) could be re-formatted as below by row reordering: C   F1 F2 E1 D1 0 E2   u   f  0   y 1  = g1  D2   y 2  g 2  (6) Here u is the voltage vector of Γ interface . y1 and y2 are the voltage vector of Γ1,inner and Γ 2,inner , respectively. After wire tearing, the interfacial nodes are split, and Γinterface is split into two sets, the twin nodes in Sub-circuit 1, Γ1,twin , and the twin nodes in Sub-circuit 2, Γ 2,twin . The system of sub-circuit 1 is: C1 F  1 E1  u1   f1  i1  (7) = + D1   y 1  g1   0  u1 represents the voltage vector of Γ1,twin . i1 represents the currents flowing into Γ1,twin . After wire tearing, the system of sub-circuit 2 is: C 2 F  2 E 2  u 2   f 2   i 2  = + D2   y 2  g 2   0  (8) Here u 2 represents the voltages vector of Γ 2,twin . i 2 represents the currents flowing into each node of Γ 2,twin . Also we have, Fig. 4. Illustration of the wire tearing. (a) The original resistor network, and node 2 is set to be the interfacial node. (b) Split node 2 into a pair of twin nodes 2a and 2b, and insert a length of transmission line between them. 1/R2=1/R2a+1/R2b. I2=I2a+I2b. (c) Replace the virtual transmission line with its equivalent circuit, and the original resistor network is partitioned into two sub-networks. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < C1 + C2 = C f1 + f 2 = f u1 , i1 , u 2 , i 2 are called boundary variables, and they satisfy the Transmission Delay Equations (5). i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ) If we set the boundary condition as below: u1 (t) = u 2 (t) = u(t) i1 (t) = -i 2 (t) = i(t) Then (6) could be re-obtained from (7) and (8). The above splitting technique is called level-one wire tearing, since the interfacial node is split once. If the interfacial node was split for more than one times, this splitting technique is called multilevel wire tearing [59]. VI. VIRTUAL TRANSMISSION METHOD After partitioning of the circuit, there are 3 steps to perform the parallel computing by Virtual Transmission Method. Step 1. Replace the lossless transmission line with its equivalent circuit. Step 2. Load each sub-circuit into a processor. Step 3. Use the data link to transfer the previous interfacial variables from one processor to another by message passing, and perform the distributed computing. Example 2. Continuing with Example 1, the analytic expression of sub-circuit 1 is obtained by merging (5) and (7): E1  u1 (t)   f1  i1 (t)  = + D1   y 1 (t)  g1   0  C2 + W E 2  u 2 (t)  =  F D2   y 2 (t)  2  f 2 + W ⋅ u1 (t - τ) - i1 (t - τ)    (13) g2   i 2 (t) = − W ⋅ u 2 (t) + W ⋅ u1 (t - τ) - i1 (t - τ) If all the delays of lines are 1, we obtain: C2 + W E 2  u k2   =  F D2   y k2  2  f 2 + W ⋅ u1k −1 - i1k −1    g2   k k k −1 k −1 i 2 = − W ⋅ u 2 + W ⋅ u1 - i1 (14) Later, we locate (11) on Processor 1, and locate (14) on Processor 2. After that, we set the initial values for boundary variables: u10 = u 02 = 0 i10 = i 02 = 0 At last, we do the distributed computing. (9) VII. CONVERGENCE THEORY i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ) Eliminate i 1 (t) , and we obtain: C1 + W E1  u1 (t)  =  F D1   y 1 (t)  1  f1 + W ⋅ u 2 (t - τ) - i 2 (t - τ)    g1   (12) Eliminate i 2 (t) , and we obtain: i 2 (t) + W ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ) C1 F  1 C2 E 2  u 2 (t)   f 2  i 2 (t)   F D   y (t)  = g  +  0   2 2  2   2  i 2 (t) + Z ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ) 5 Theorem 1 (Convergence Theory): Assume a linear resistor network is partitioned into N sub-circuits by wire tearing, if the characteristic impedance matrix of the virtual transmission lines is symmetrical-positive-definite (SPD), then VTM converges at the answer to the resistor network. (10) i1 (t) = − W ⋅ u1 (t) + W ⋅ u 2 (t - τ) - i 2 (t - τ) Set all the delays of transmission lines to be 1, then, C1 + W E1  u1k  f1 + W ⋅ u 2k −1 - i 2k −1   =   F D1   y1k   g1  1  (11) i1k = − W ⋅ u1k + W ⋅ u 2k −1 - i 2k −1 (11) is an SPD sparse linear system, and it could be solved by any sequential algorithms, such as cholesky factorization, algebraic multigrid method (AMG) and conjugate gradient method (CG). Similarly, the analytic expression of sub-circuit 2 is obtained by merging (5) and (8): This conclusion is supported by Lemma 2, and the mathematical proof is given in the appendix. According to the proof of convergence theory, we know that the convergence speed of VTM is depending on the choice of the characteristic admittance matrix W. So W is also called the preconditioner for VTM. VIII. PRECONDITIONING In this section, we discuss the preconditioning techniques for VTM. We first define the input admittance matrix of a circuit or microwave network [18, 13]. From the view of numerical analysis, input admittance matrix is an alias of Schur complement matrix associated with the interface variables u [45, 68]. Example 3. Refer to (7), for Sub-circuit 1, the Schur complement matrix associated with the interface variables u1 is: > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < S1 = C1 - E1D1-1F1 5. S1 is also the input admittance matrix associated with the interface variables u1 in Sub-circuit 1. Similarly, in Sub-circuit 2, the Schur complement matrix associated with the interface variables u2 is: S 2 = C2 - E2 D-12 F2 T1 = ( W − S1 )( W + S1 ) W  S 1 or S 2 . S 1 or S 2 are called the partial input admittance matrix of the large circuit, which are defined as below:  D  -1  S 1 = C1 - E 1 1 F1  D  -1F S = C - E 2 S2 is also the input admittance matrix associated with the interface variables u2 in Sub-circuit 2. Then, the voltage reflection matrix on the interface of Sub-circuit 1 is defined as: −1 The voltage reflection matrix on the interface of Sub-circuit 2 is: T2 = ( W − S 2 )( W + S 2 ) −1 6 2 2 2 2   E 1  is a submatrix of   1 D1    C 2 E C 2 2 is a submatrix of      F2  F2 D2  C Here  1 F C1 E1   F D  . Similarly,  1 1 E2  . D2  This preconditioning technique is called Schur complement  or S is dense approximation method (SCA). Usually S 1 2 matrix, and we need to drop the small elements inside the matrix. After that, the fill-in pattern of W is similar to C1 or C2. If the circuit is a general circuit with controlled sources, i.e. the linear system of circuit is unsymmetrical, the above 5 CF = ρ (T1T2 ) preconditioning techniques could also be used, but VTM might Here ρ ( A ) is the spectral radius of the square matrix A. be unconvergent. Consequently, we know that the convergence speed of VTM is We have to say that, it is still an open problem to choose the depending on the choice of the characteristic admittance matrix preconditioner for the unsymmetrical linear system. In the next W. This viewpoint is identical to the impedance matching section, we illustrate a simple example to show the potential of technique in microwave engineering [13]. VTM to solve the unsymmetrical system. In the ideal case, if we set the preconditioner, W = S1 or S 2 IX. EXAMPLE According to the convergence proof in the appendix, the convergence factor of VTM is: Then, For the symmetrical linear system, a simple example could be found in [59]. Here we illustrate another example to solve As the result, only 1 iteration is needed to achieve convergence. the unsymmetrical linear system of the circuit. Fig. 5 proposes a Based on the knowledge of microwave network, we know that, if tightly-coupled circuit with 4 operational amplifiers connected one port is precisely matched, there would be no energy reflection end-to-end. The linear system of this circuit is: on this port and the network would settle down after 1 reflection. 0   u1   I1   g1 g 21 0 In practice, it is impossible to obtain the accurate input 0 g 0 g 42  u2   I 2  2 admittance matrix of a large circuit, because the dimension of D1  (15) = ρ (T1T2 ) = 0 −1 or D2 might be very large, and it is impossible to obtain D1 and D−21 . So we need to figure out some practical way to approximate W to make W ≈ S1 or S 2 . If the circuit is a resistor network, first we need to assure that W is SPD. Continue with Example 2, there are several ways to choose W. 1. W = α ⋅ I, α > 0 . I is the identity matrix. 2. W = diag ( C1 ) or diag ( C2 ) . We call it diagonal  g13  0 0 g3 0 g34 0   u3    g 4  u4  Here we set: g1 = g 2 = g3 = g 4 = 1 g13 = g34 = g 42 = − g 21 = 10 The loop gain of this circuit is: Gain = g13 g34 g 42 g 21 g1−1 g3−1 g 4−1 g 2−1 = −104 Then we partition this linear system by wire tearing, preconditioner. 3. W = C1 or C2 . This is called overlapped block preconditioner. It is similar to the overlapped block Jacobi method. 4.  I3     I4  W = α ⋅ C1 or α ⋅ C2 , α > 0 . This is called weighted overlapped block preconditioner (WOB). As the result, we obtain 2 sub-systems: > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <  g1 0   g13  g 2b  0   0 Here: g 21 g2a 0 0 g 3b g 34 0   u1   I1  0  u2 a  =  I 2 a + i2 a  g3a  u3a   I 3a + i2b  g 42  u2b   I 2b + i2b  0   u3b  =  I 3b + i3b  g 4   u4   I 4  7 g 2 a + g 2 b = g 2 , g 3 a + g 3b = g 3 (16) I 2 a + I 2 b = I 2 , I 3 a + I 3b = I 3 For simplicity, we set: g 2 a = g 2b = g 3a = g3b = 0.5 The transmission delay equations of T2 are: (17) i2 a (t ) + W2 ⋅ u2 a (t ) = −i2b (t − τ ) + W2 ⋅ u2b (t − τ ) i2b (t ) + W2 ⋅ u2b (t ) = −i2 a (t − τ ) + W2 ⋅ u2 a (t − τ ) (18) The transmission delay equations of T3 are: Fig. 5. Solving the unsymmetric linear system by VTM . (a) The original circuit with operational amplifiers. (b) Equivalent circuit of (a), with voltage controlled current sources (VCCS). (c) Partition the circuit by wire tearing. Node 2 and 3 is set to be the interfacial node. (d) Partition the equivalent circuit by wire tearing. 1/R2=1/R2a+1/R2b. I2=I2a+I2b. 1/R3=1/R3a+1/R3b. I3=I3a+I3b. (e) Replace the virtual transmission line with its equivalent circuit, and thus the original circuit is partitioned into two sub-circuits. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < i3a (t ) + W3 ⋅ u3a (t ) = −i3b (t − τ ) + W3 ⋅ u3b (t − τ ) 8 TABLE I SPARSE MATRICES PROPERTY i3b (t ) + W3 ⋅ u3b (t ) = −i3a (t − τ ) + W3 ⋅ u3a (t − τ ) (19) We set: W2 = 0.5 , W3 = 20000 Merge (16), (18) and (19), we obtain the linear system for Sub-circuit 1: 0  u2 a (t )   I 2 a + i2 a (t )  g2a  =  g g −1 g     −1  13 1 21 g3a   u3a (t )   I 3a − g13 g1 I1 + i3a (t )  i2 a (t ) + W2 ⋅ u2 a (t ) = −i2b (t − τ ) + W2 ⋅ u2b (t − τ ) Name Interface nodes Total nodes Property Source Grid2d 100 10000 SPD MESHPART Grid3d 900 27000 SPD H. Qian Fv2 129 9801 SPD UFpack Wang 870 26064 Unsymm. UFpack Pchip 13 2298 Unsymm. MCNC’90 TABLE II ITERATION NUMBER TO ACHIEVE CONVERGENCE Method Grid2d Grid3d Fv2 Wang Jacobi 27759 5238 212 50773 -- GS 18373 2950 109 27423 -- Similarly, we get the linear system for Sub-circuit 2: SGS 11773 1571 79 26842 --  g 2b g 42 g g34  u2b (t )   I 2b − g 42 g I + i2b (t )     = g 3b   u3b (t )   I 3b + i3b (t )  0  i2b (t ) + W2 ⋅ u2b (t ) = −i2 a (t − τ ) + W2 ⋅ u2 a (t − τ ) SOR 14253 2049 66 16289 -- SSOR 8839 1073 74 29135 -- BJ 966 227 50 563 952 i3a (t ) + W3 ⋅ u3a (t ) = −i3b (t − τ ) + W3 ⋅ u3b (t − τ ) (20) −1 4 −1 4 4 i3b (t ) + W3 ⋅ u3b (t ) = −i3a (t − τ ) + W3 ⋅ u3a (t − τ ) (21) Finally we solve this example on 2 processors by VTM, and the computing result is compared with a number of well-known stationary iterative algorithms, e.g. Jacobi, Gauss Seidel (GS), Successive Overrelaxation Method (SOR), Symmetric SOR (SSOR), Block Jacobi (BJ) [45]. Here the global iterative index k increases to k+1 until all the variables are updated. As shown in Fig. 6, the traditional stationary algorithms are Pchip OBJ 490 114 23 287 162 VTM_Diag 963 335 42 854 160 VTM_OB 491 115 23 287 161 VTM_WOB 296 68 22 175 -- VTM_SCE 275 75 14 186 -- However, for the large unsymmetrical linear system, we have not yet figure out an effective method to choose W. The convergence property of VTM is depending on the property of linear circuit, as well as the preconditioner W. X. NUMERICAL EXPERIMENTS Fig. 6. Comparison of the convergence speed of iterative algorithms for resistor network. unconvergent for this circuit, but VTM is convergent. The key is to choose proper characteristic admittances for the virtual transmission lines. According to this example, we conclude that there exists a parallel between the stability of VTM and the stability of distributed linear circuit (or microwave network). The traditional techniques to stabilize a distributed circuit might be transplanted to stabilize VTM. In this section we compare VTM with the traditional stationary algorithms for both the symmetrical matrix and unsymmetrical matrix. We use MATLAB and SIMULINK as our test environment [53, 54], and use METIS and MESHPART as our partitioning methods [28, 51, 19]. The test matrices are described in Table 1. Grid2d and Grid3d are structured resistor networks [51, 43]. Fv2 is a 2D mesh constructed by finite element method (FEM) [14]. Pchip is extracted from a MOS integrated circuit of MCNC’90 testbench [52]. Wang is a sparse matrix from semiconductor device simulation [14]. Table 2 illustrates the computing results of the stationery iterative algorithms. BJ, OBJ and VTM are tested on 2 processors. Jacobi, GS, Symmetrical GS (SGS), SOR and SSOR are tested on 1 processor. VTM_Diag means VTM with diagonal preconditioner. VTM_OB represents VTM with overlapped block preconditioner. VTM_WOB is VTM with weighted overlapped block preconditioner. VTM_SCA means VTM with Schur complement approximation preconditioner. All these preconditioning methods were previously described in Section 8. According to Table 2, we conclude that VTM is convergent to solve the SPD system, and its convergence speed is fast when using the SCA or WOB preconditioner. The convergence speed > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < of OBJ and VTM_OB are same. For the unsymmetrical linear systems, VTM might be unconvergent. At last, we test VTM on a various number of processors, as shown in Fig. 7. In this case, we use Grid3d as the testbench. The test result indicates that the convergence speed of VTM is slightly relative to the number of processors. 9 If the delays of virtual transmission lines are different and stochastic, VTM would turn to be a fully asynchronous and chaotic numerical algorithm [58]. If we replace each variable by a piece of waveform, VTM would become a waveform-relaxation algorithm [60]. To simulate the post-layout integrated circuit in parallel, we have figured out another method to distributedly solve the nonlinear delay differential equations extracted from the distributed circuits [61]. APPENDIX Here we prove that, if the graph of the resistor network is 2-partete, VTM converges. Lemma 3: Assume a linear resistor network is partitioned into 2 sub-circuits by level-one wire tearing, if the characteristic impedance matrix Z of the virtual transmission lines is SPD, VTM converges at the answer to the resistor network. Proof: Fig. 7. Test VTM on a number of processors. First, we consider the resistor network with inner nodes, and eliminate these inner nodes by Schur complement technique. Then, we prove Lemma 3 for the resistor network without inner nodes. The sparse linear system of the resistor network is: C   F1 F2 XI. CONCLUSION AND FUTURE WORK In this paper, we introduce VTM to solve the sparse linear system of circuit in parallel. VTM is a distributed and stationary iterative numerical algorithm, and it is efficient to solve the resistor networks. VTM proves many insightful conclusions linking numerics and electrics. The physical background of VTM is electric circuit, and this makes this algorithm different from the traditional numerical algorithms. As presented in this paper, we have borrowed many concepts from circuit theory to describe this algorithm. According to the simple example presented in Section 9, we conclude that there exists similarity between the stability of VTM and the stability of distributed linear circuit (or microwave network). The convergence speed of VTM is highly depending on the characteristic admittance matrix of the virtual transmission lines, i.e. its preconditioner W. A number of preconditioning techniques are implemented to accelerate VTM. Experiments indicate that, if W is properly chosen, the performance of VTM would be appreciable; if not, VTM would be plain. Nevertheless, the computation cost to design the preconditioner W should be aware of [5]. For the SPD linear system, we have proved that VTM is convergent; for the large unsymmetrical linear system, we have not yet figure out an effective way to choose the characteristic admittance matrix to guarantee convergence. This is an open problem. VTM could also be used to solve the nonlinear system, as we pointed out in [59]. However, the convergence analysis of nonlinear system is more complicated than the linear system. This problem should be further studied. E1 D1 0 E2   u   f  0   y 1  = g1  D2   y 2  g 2  Eliminate the inner variables y1 and y2, we obtain: (C - E D 1 F - E2 D-12 F2 ) u -1 1 1 = f - E1 D1-1g1 - E2 D-12 g 2 y1 = -D1-1F1u + D1-1g1 y 2 = -D-12 F2u + D-12 g 2 Set, S = C - E1D1-1F1 - E 2 D-12 F2 , r = f - E1D1-1g1 - E2 D-12 g 2 , then, (22) S ⋅u = r S is called the Schur complement matrix associated with the interface variables u. C E   is SPD, then the Schur  F D −1 complement matrix S = C - ED F is SPD. Lemma 4: If A =  If the circuit is split into two sub-circuits by level-one wire tearing, the system of Sub-circuit 1 is (7): C1 F  1 E1  u1   f1  i1  = + D1   y 1  g1   0  Eliminate the inner variables y1: > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < (C - E1D1-1F1 ) u1 = f1 - E1D1-1g1 + i1 1 u k2 = ( W + S 2 ) ( W − S1 ) u1k −1 −1 + ( W + S2 ) r y 1 = -D1-1F1u1 + D1-1g1 -1 -1 Set S1 = C1 - E1 D1 F1 , r1 = f 1- E1 D1 g1 , then, S1 ⋅ u1 = r1 + i1 (23) u1k = ( W + S1 ) ( W − S2 ) −1 × ( W + S 2 ) ( W − S1 ) u1k − 2 −1 −1 + ( W + S1 ) ( W − S 2 ) ( W + S 2 ) r −1 +( W + S1 ) r Eliminate the inner variables y2: 2 - E 2 D-12 F2 ) u 2 = f 2 - E2 D-12 g 2 + i 2 -1 2 2 2 -1 2 2 2, T1 = ( W − S1 )( W + S1 ) -1 2 2 S 2 = C2 - E D F r2 = f 2- E2 D-12 g 2 , then, S 2 ⋅ u 2 = r2 + i 2 (24) −1 + ( W − S1 ) T1T2 ⋅ r −1 (28) ( W − S1 ) u1k = T1T2 ( W − S1 ) u1k −2 (29) +T1T2 ⋅ r + T1 ⋅ r If we make use a new variable: = f - E1D1-1g1 - E2 D-12 g 2 a1k = ( W − S1 ) u1k =r Until now, we have eliminated all the inner nodes in the resistor network by Schur complement technique, and all the nodes are interfacial nodes. The linear system of (22) is partitioned into two sub-systems of (23) and (24) by wire tearing. The iterative formula is Transmission Delay Equations (5), i1k + W ⋅ u1k = −i 2k −1 + W ⋅ u 2k −1 i k2 + W ⋅ u 2k = −i1k −1 + W ⋅ u1k −1 then, (29) could be expressed as (30): a1k = T1T2 ⋅ a1k − 2 + h1 where h1 = T1 ⋅ T2 ⋅ r + T1 ⋅ r . (30) In the following text, we will prove that (30) is convergent. Here we use Z-1 instead of W. T1 = ( Z −1 − S1 )( Z −1 + S1 ) −1 = Z −1 ( I − Z ⋅ S1 )( I + Z ⋅ S1 ) Z −1 Here W is the characteristic admittance matrix of the Z = W −1 . i1k and i k2 by combine (23), (24) and (5), we find, W ⋅ u1k + ( S1u1k - r1 ) = W ⋅ u 2k −1 - ( S 2u 2k −1 - r2 ) T2 = ( Z −1 − S 2 )( Z −1 + S 2 ) =Z −1 (31) −1 ( I − Z ⋅ S 2 )( I + Z ⋅ S 2 ) −1 (32) Z Lemma 5: If Z is an SPD matrix of dimension n, then there ( W + S1 ) u1k − r1 = ( W − S 2 ) u 2k −1 + r2 exists a matrix Thus, Similarly, we obtain: u1k = ( W − S1 ) T1T2 ( W − S1 ) u1k − 2 Reformat (28) as (29): =S r1 + r2 = f 1- E1D1-1g1 + f 2 - E 2 D-12 g 2 ( W − S 2 ) u 2k −1 −1 + ( W + S1 ) r Then, −1 = C - E1D1-1F1 − E2 D-12 F2 u1k = ( W + S1 ) −1 +( W − S1 ) T1 ⋅ r S1 + S 2 = C1 - E1D1-1F1 + C2 - E2 D-12 F2 Eliminate (27) −1 T2 = ( W − S 2 )( W + S 2 ) S2 is called the Schur complement matrix associated with the interface variables u2 in Sub-circuit 2. Consequently, we have: transmission lines. W is SPD. −1 Set: y 2 = -D F u + D g Set (26) u1k , E 2  u 2   f 2   i 2  = + D2   y 2  g 2   0  (C −1 Merge (25) and (26), we come to know the iterative formula for S1 is called the Schur complement matrix associated with the interface variables u1 in Sub-circuit 1. The system of Sub-circuit 2 is (8): C 2 F  2 10 −1 (25) Z , which satisfies: Z T Z = Z. Proof: Because Z is SPD, Z = Q T ΛQ = Q T Λ ΛQ = Z T Z > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < T1 = Z −1 ( I − Z ⋅ S1 )( I + Z ⋅ S1 ) Z −1 T where Q Q = I . I is the identity matrix. Λ = diag (α1 , α 2 , , α n ) , α i ∈  + . )( )  ( ) ( )     ( Z Q )( Z Q )  ×  Z + Z Q Λ  ( ) ( Z Q )   = Z ( Z Q )(I − Λ )( Z Q ) ×( Z Q ) (I + Λ ) ( Z Q ) Z = Z ( Z Q ) ( I − Λ )( I + Λ ) ( Z Q ) Z  1− λ 1− λ  = Z ( Z Q ) ⋅ diag  , , ⋅ Z Q ) 1+ λ  ( 1+ λ ( −1 T T  Z Q1 Z Q1  = Z −1  T  − Z TQ Λ Z Q1  1 1  Λ = diag ( α1 , α 2 , , α n ) . Z = ΛQ . End of proof [25]. T Lemma 6: If both Z and S are SPD matrix of dimension n, then Z ⋅ S has the same eigenvalues as T Z ⋅S ⋅ Z . Proof: Because S and Z are SPD, Z ⋅ S is positive-definite, and T Z S Z is SPD. T Z ⋅ S ⋅ Z = QTQ T , where QQ T = I , T = diag (t1 , t 2 , , t n ) , t i > 0, i = 1,2, , n . Then, Assume (Z) = Z ⋅ QTQ ⋅ ( Z ) = ( Z Q) ⋅ T ⋅ ( Z Q) T T -1 T Z⋅S = Z ⋅ Z ⋅S ⋅ Z ⋅ T T -1 T Similarly, we obtain, λi > 0 , i = 1, , n , ) ( T Z Q1 ) -1 . T Z ⋅ S 2 ⋅ Z = Q 2 Λ 2Q 2 T where Λ 2 = diag ( μ1 , μ 2 , , μ n ) , μi > 0 , i = 1, , n , Q 2Q 2 T = I . Z ⋅ S 2 = ( T ) ( Z Q2 Λ 2 Then, (31) could be decomposed as below: T -1 T 1 1 1 -1 T −1 1 1 1 T −1 = Z −1 Z Q1 Λ 1 T T = Z −1 T ( 1 1 T 1 -1 T −1 1 1 1 1 n 1 n T -1 1 Z −1 Z ⋅ S1 ⋅ Z = Q1 Λ1Q1T Q1Q1T = I . Z ⋅ S1 = 1 T2 = Z −1 ( I − Z ⋅ S 2 )( I + Z ⋅ S 2 ) Z According to Lemma 5 and 6, we come to know that, T -1 T 1 Similarly, (32) could be decomposed as: End of proof. where Λ1 = diag (λ1 , λ2 , , λn ) , −1 1 T −1 -1 −1 T 1 −1 T -1 T 11 Z Q2 ) -1 . ( ( ) ( )Z  1− μ 1− μ  , , Z Q ) ⋅ diag  ⋅ Z Q ) 1+ μ  ( 1+ μ T Z Q 2 ( I − Λ 2 )( I + Λ 2 ) T 2 −1 T Z Q2 1 n 1 n -1 T 2 The spectral radius of T1T2 is defined as: ρ (T1T2 ) = lim ( T1T2 ) k 1/ k k →∞ So we first calculate ( T1T2 ) norm of the square matrix A. k . Here A is the spectral -1 Z > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < ( T1T2 ) ( ) ( ) -1 T T −1  −1  Z Z Q I Λ I Λ Z Q Z  − + ( )( ) 1 1 1 1  =   -1 ×Z −1 Z TQ ( I − Λ )( I + Λ )−1 Z TQ Z 2 2 2 2   Z ≤ Z × = ) (  Q1 ( I − Λ1 )( I + Λ1 )−1 Q1T   Z   ×Q 2 ( I − Λ 2 )( I + Λ 2 )−1 Q T2    ≤ ≤ ( −1 −1 Q1 ( I − Λ1 )( I + Λ1 ) Q1T −1 Z Z Z −1 −1 k   ⋅    1 − λ1 1 − λn  ⋅ diag  , ,  1 + λn   1 + λ1 k Z ≤ Z  1 − λ1 1 − λn  Z ⋅ max  , ,   1+ λ 1 + λn  1   1 − μ1 1 − μn  × max k  , , ⋅ Z 1 + μn   1 + μ1 −1 k As the result, ρ (T1 T2 ) = lim ( T1 T2 ) k 1/ k  1 − λ1 1 − λn ρ (T1 ) = max  , , 1 + λn  1 + λ1 Because μi > 0 , i = 1, , n , ( W − S2 ) −1 × ( W + S 2 ) ( W − S1 ) u1k − 2 −1 −1 + ( W + S1 ) ( W − S 2 ) ( W + S 2 ) r −1 +( W + S1 ) r k −1 −1 −1 −1 u1∞ = I − ( W + S1 ) ( W − S 2 )( W + S 2 ) ( W − S1 )    −1 −1 −1 × ( W + S1 ) + ( W + S1 ) ( W − S 2 ) ( W + S 2 )  ⋅ r   = ( W + S1 ) − ( W − S 2 )( W + S 2 )  −1 ( W − S1 ) −1 −1 × I + ( W − S 2 ) ( W + S 2 )  ⋅ r   ( ( ) ) ( ) −1 −1  I + W − S W + S −1 −1  ( 2 )( 2)   =  r −1 × I − ( W − S 2 )( W + S 2 ) W + S1  ( ) −1 ( W + S ) ( ( W + S ) + ( W − S ) )−1  2 2 2  r = × ( ( W + S ) − ( W − S ) ) ( W + S )−1 W + S  2 2 2 1  = ( W + S 2 )( 2 W )  k →∞  1 − λ1 1 − λn  ≤ max  , ,  1 + λn   1 + λ1  1 − μ1 1 − μn , , × max  1 + μn  1 + μ1 = ρ (T1 ) ρ (T2 ) Because λi > 0 , i = 1, , n , So we conclude that VTM converges for 2-partite resistor network [45]. According to (27), when this algorithm is convergent,  I − ( W − S )( W + S )−1 W +  2 2  = −1   I + ( W − S 2 )( W + S 2 ) S1    −1 × I + ( W − S 2 ) ( W + S 2 )  ⋅ r   k  1 − μ1 1 − μn  × diag  , ,  ⋅ 1 + μn   1 + μ1 ρ (T1T2 ) < 1 Z  Q ⋅ ( I − Λ )( I + Λ )−1 ⋅ Q T  1 1 1 1  ⋅ −1  T   × Q 2 ⋅ ( I − Λ 2 )( I + Λ 2 ) ⋅ Q 2   ( I − Λ )( I + Λ )−1 ⋅ 1 1 ⋅ −1  × ( I − Λ 2 )( I + Λ 2 )  Consequently, u1k = ( W + S1 ) ⋅ ×Q 2 ( I − Λ 2 )( I + Λ 2 ) Q T2 k   < 1 .  ρ (T2 ) = max  u1k = u1k − 2 = u1∞ , then, Z k −1 ⋅ ) k −1 =  1 − μ1 1 − μn , , 1 + μn  1 + μ1 k 12 −1 ( 2S 2 )( W + S 2 ) −1 −1 W + S1  r  −1 −1 = ( W + S 2 ) W −1S 2 ( W + S 2 ) W + S1  r   −1    −1 = ( I + S 2 W −1 ) S 2 ( I + W −1S 2 ) + S1  r   −1 −1 = ( S 2 + S 2 W −1S 2 )( I + W −1S 2 ) + S1  r   −1 −1 = S 2 ( I + W −1S 2 )( I + W −1S 2 ) + S1  r     < 1 ;  = [ S 2 + S1 ] r −1 = S −1 ⋅ r Until now, we have proved that, VTM is convergent for 2-partite resistor network when using level-one wire tearing. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < For the more general cases, the resistor network is k-partite, and the wire tearing might be level-one or multilevel. A general proof was presented in [62]. ACKNOWLEDGMENT Discussions with Hao Zhang, Yi Su, Bin Niu, Yu Wang, Wei Xue, Peng Zhang and Chun Xia were very helpful. Thanks are due to Qi Wei, Bo Zhao, Xia Wei, Xiaojian Mao, Yongpan Liu, Fei Qiao and Rong Luo for encouragement and support. We are very grateful for the public domain softwares provided by John R. Gilbert, Tim A. Davis, Robert Bridson, Haifeng Qian and et al. [17] [18] [19] [20] [21] REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] S. Balay, K. Buschelman, V. Eijkhout, W. D. Gropp, D. Kaushik, M. G. Knepley, L. Curfman McInnes, B. F. Smith and H. Zhang, PETSc Users Manual, ANL-95/11 - Revision 2.1.5, Argonne National Laboratory. R. Barrett, M. Berry, T. Chan, J. Demmel, J. Donato, J. Dongarra, V. Eijkhout, R. Pozo, C. Romine and H. Van der Vorst. Templates for the solution of Linear Systems: Building Blocks for Iterative Methods, 2nd Edition, SIAM, 1994. A. Basermann, U. Jaekel, and K. Hachiy. Preconditioning parallel sparse iterative solvers for circuit simulation. In Proceedings of the 8th SIAM Proceedings on Applied Linear Algebra, Williamsburg VA, 2003. A. Basermann, U. Jaekel, and M. Nordhausen. Parallel iterative solvers for sparse linear systems in circuit simulation. Fut. Gen. Fut. Gen.. Comput. Sys., 21(8):1275–1284, 2005. M. Benzi. Preconditioning techniques for large linear systems: A survey. Journal of Computational Physics, 182:418–477, 2002. J. Bolz, I. Farmer, E. Grinspun, and P. Schröoder. Sparse matrix solvers on the GPU: conjugate gradients and multigrid. In ACM SIGGRAPH 2003 (San Diego, California, July 27 - 31, 2003). C. W. Bomhof and H. A. Van der Vorst, A parallel linear system solver for circuit simulation problems, Numerical Linear Algebra with Applications, 7 (2000). F. H. Branin. Transient analysis of lossless transmission lines, Proceedings of the IEEE, vol. 55, pp. 2012–2013, Nov. 1967. R. Bridson. A MATLAB CMEX interface to the Metis library. Available at http://www.stanford.edu/~rbridson/download/metismex.c R. Bridson and W.-P. Tang. Refining an approximate inverse. Journal on Computational and Applied Math, 123 (2000), Numerical Analysis 2000 vol. III: Linear Algebra, pp. 293-306. S. Cauley, V. Balakrishnan, Cheng-Kok Koh, A parallel direct solver for the simulation of large-scale power/ground networks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, v.29 n.4, p.636-641, April 2010. T. H. Chen and C. C.-P Chen. Efficient large-scale power grid analysis based on preconditioned Krylov-subspace iterative methods. In Proc. IEEE/ACM DAC, pages 559--562, 2001. R. E. Collin. Foundations for microwave engineering, 2nd edition, Wiley-IEEE Press, 2000. T. A. Davis and Y. F. Hu. The University of Florida Sparse Matrix Collection. Submitted to ACM Transactions on Mathematical Software. Available at: http://www.cise.ufl.edu/research/sparse/matrices/ J. Demmel, J. Gilbert, and X. Li. An asynchronous parallel supernodal algorithm for sparse gaussian elimination. SIAM J. Matrix Analysis and Applications, 20(4): 915–952, 1999. Zhuo Feng, Peng Li. Multigrid on GPU: tackling power grid analysis on parallel SIMT platforms, Proceedings of the 2008 IEEE/ACM [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] 13 International Conference on Computer-Aided Design, November 10-13, 2008, San Jose, California. Zhuo Feng, Zhiyu Zeng. Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis. In Proceedings of the 47th Design Automation Conference (Anaheim, California, June 13 18, 2010). DAC '10. ACM, New York, NY, 661-666. T. L. Floyd. Principles of electric circuits, 6th edition, Prentice Hall, 1999. David Fritzsche, Andreas Frommer, and Daniel B. Szyld, Overlapping blocks by growing a partition with applications to preconditioning, Research Report 10-07-26, Department of Mathematics, Temple University, July 2010. N. Frohlich, B. M. Riess, U. A. Wever, and Q. Zheng A New Approach for Parallel Simulation of VLSI Circuits on a Transsitor Level. TCAD, June 1998. M. J. Gander, L. Halpern, and F. Nataf. Optimized Schwarz Methods. In T. Chan, T. Kako, H. Kawarada, O. Pironneau (eds.), Proceedings of the Twelveth International Conference on Domain Decomposition, DDM press, 2001, pp. 15–27. M. J. Gander, Schwarz Methods in the Course of Time, Electronic Transactions on Numerical Analysis, 31:228–255, 2008. A. George and J. W. Liu. Computer Solution of Large Sparse Positive Definite Systems. Prentice-Hall, Englewood Cliffs, New Jersey, 1981. John R. Gilbert, Gary L. Miller, and Shang-Hua Teng. Geometric mesh partitioning: Implementation and experiments. SIAM J. Scientific Computing 19:2091-2110, 1998. G. H. Golub and C. F. Van Loan, Matrix computations. Johns Hopkins University Press, 1989. Wei Huang. HotSpot: A chip and package compact thermal modeling methodology for VLSI design. Ph.D. Dissertation, University of Virginia, 2007. Russell Kao. Piecewise Linear Models for Switch-Level Simulation. Chapter 5.6.1, Node and Branch Tearing. Technical Report, CSL-TR-92-532, Stanford University, 1992. G. Karypis and V. Kumar. Metis 4.0: Unstructured graph partitioning and sparse matrix ordering system, Technical report, Department of Computer Science, University of Minnesota, 1998. Available at http://www.cs.umn.edu/metis D. P. Koester. Parallel Block-Diagonal-Bordered Sparse Linear Solvers for Power Systems Applications. Ph.D dissertation, Syracuse University. 1995. J. N. Kozhaya and S. R. Nassif. Fast Power Grid Simulation. In Proceedings of the 37th Design Automation Conference, 2000. J. N. Kozhaya, S. R. Nassif, and F. N. Najm, A multigrid-like technique for power grid analysis, IEEE Trans. Computer-aided Design, vol. 21, pp. 1148--1160, Oct. 2002. Zhao Li, C.-J. Richard Shi. A coupled iterative/direct method for efficient time-domain simulation of nonlinear circuits with power/ground networks. ISCAS (5) 2004: 165-168. Xiaoye S. Li. An overview of SuperLU: Algorithms, implementation, and user interface. ACM Trans. Math. Softw. 2005. Peng Li. What Is Parallel Circuit Simulation? ACM/SIGDA E-NEWSLETTER, vol. 40, No. 4, April 1, 2010 P. L. Lions, On the Schwarz alternating method III: a variant for nonoverlapping subdomains, Third International Symposium on Domain Decomposition Methods for Partial Differential Equations, 1989, Houston, Texas. Sébastien Loisel and Daniel B. Szyld, On the convergence of Optimized Schwarz Methods by way of Matrix Analysis , Domain Decomposition Methods in Science and Engineering XVIII, Michel Bercovier, Martin Gander, Ralf Kornhuber, and Olof B. Widlund, editors. Lecture Notes in Computational Science and Engineering, Vol. 70, Springer, 2009, pages 363-370. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < [37] J. D. Meindl. Beyond Moore's Law: The Interconnect Era. Computing in Science and Engineering. 2003. [38] L. Nagel. SPICE2: A Computer Program to Simulate Semiconductor Circuits, Electronics Research Laboratory Report No. ERL-M520. University of California, Berkeley, 1975. [39] Jan Ogrodzki. Circuit simulation methods and algorithms. CRC Press, 1994. [40] H. J. Pain. The physics of vibrations and waves, Wiley, 1976. [41] He Peng, Chung-Kuan Cheng. Parallel transistor level full-chip circuit simulation. DATE 2009: 304-307. [42] H. Qian, S. R. Nassif, and S. S. Sapatnekar, Power grid analysis using random walks, IEEE Trans. Computer-aided Design, vol. 24, pp. 1204--1224, Aug. 2005. [43] H. Qian and S. S. Sapatnekar, Stochastic Preconditioning for Diagonally Dominant Matrices, SIAM Journal on Scientific Computing, Vol. 30, No. 3, pp. 1178 – 1204, March, 2008. [44] T. L. Quarles. Analysis of Performance and Convergence Issues for Circuit Simulation. ERL Memo No. UCB/ERL M89/42 April 1989. [45] Y. Saad. Iterative Methods for Sparse Linear Systems. The PWS Publishing Company, Boston, 1996. Second edition, SIAM, Philadelphia, 2003. [46] R. A. Saleh, K. A. Gallivan, M. C. Chang, et al. Parallel circuit simulation on supercomputers. Proceedings of the IEEE, 1989. [47] Alberto Sangiovanni-Vincentelli, Li-Kuan Chen, and Leon O. Chua. A new tearing approach – node-tearing nodal analysis. In IEEE International Symposium on Circuits and Systems, 1977. [48] Jin Shi, Yici Cai, Wenting Hou, Liwei Ma, Sheldon X.-D. Tan, Pei-Hsin Ho, Xiaoyi Wang. GPU friendly fast Poisson solver for structured power grid network analysis, Proceedings of the 46th Annual Design Automation Conference, July 26-31, 2009, San Francisco, California. [49] Ken Stanley, T. A. Davis. KLU: a "Clark Kent" sparse LU factorization algorithm for circuit matrices. 2004 SIAM Conference on Parallel Processing for Scientific Computing (PP04). Originally appeared in NA Digest, 1997. [50] Heidi K. Thornquist, Eric R. Keiter, Robert J. Hoekstra, David M. Day, Erik G. Boman, A parallel preconditioning strategy for efficient transistor-level circuit simulation, Proceedings of the 2009 International Conference on Computer-Aided Design, November 02-05, 2009, San Jose, California. [51] John R. Gilbert. Meshpart, a public domain matlab toolbox for sparse matrix partitioning. Available at http://www.cerfacs.fr/algor/Softs/MESHPART/ [52] CircuitSim90, 1990 Circuit Simulation and Modeling Workshop at MCNC, Available at http://www.cbl.ncsu.edu/CBL_Docs/csim90.html [53] Mathworks Corparation. Matlab User Manual. R13. 2002. [54] Mathworks Corparation. Simulink User Manual. R13. 2002. [55] A. Toselli and O. Widlund. Domain Decomposition Methods – Algorithms and Theory. Springer Series in Computational, Mathematics 34, Springer, Berlin, Heidelberg, 2005. [56] R. S. Varga. Matrix Iterative Analysis. Prentice-Hall, Englewood Cliffs, New Jersey, 1962. Second Edition, Springer Series in Computational Mathematics 27, Springer, Berlin, Heidelberg, New York, 2000. [57] W. T. Weeks, A. J. Jimenez, G. W. Mahoney, and D. Mehta. Algorithms for ASTAP - A Network-Analysis Program. IEEE Trans.Circuit Theory, CT-20(4):628-634, 1973. [58] Fei Wei, Huazhong Yang. Directed Transmission Method, A Fully Asynchronous Approach to Solve Sparse Linear Systems in Parallel. In ACM Proceedings of the 20th Symposium on Parallelism in Algorithms and Architectures (Munich, Germany, June 14 - 16, 2008). SPAA 2008. [59] Fei Wei, Huazhong Yang, Virtual Transmission Method, A New Distributed Algorithm to Solve Sparse Linear Systems. The Fourth International Conference on Networked Computing and Advanced Information Management, vol. 1, pp.703-709, 2008. 14 [60] Fei Wei, Huazhong Yang. Waveform Transmission Method, A New Waveform Relaxation Based Algorithm to Solve Ordinary Differential Equations. Preprinted. 2009. [61] Fei Wei, Huazhong Yang. Transmission Line Inspires a New Distributed Algorithm to Solve the Nonlinear Dynamical System of Physical Circuits. The 5th International Conference on Computer Sciences and Convergence Information Technology, Nov. 30, Seoul, Korea, 2010. [62] Fei Wei, Huazhong Yang. Virtual Transmission Method, Algorithm and Theory. Preprinted. 2009. [63] J. White, A. Sangiovanni-Vincentelli, Relaxation Techniques for the simulation of VLSI circuits. Kluwer Academic Publishers, 1986. [64] Felix F. Wu. Solution of large-scale networks by tearing. IEEE Transactions on Circuits and Systems, 1976. [65] Wei Xue, Jiwu Shu, Yongwei Wu, Weimin Zheng. Parallel Algorithm and Implementation for Realtime Dynamical Simulation of Power System. ICPP 2005: 137-144. [66] D. M. Young. Iterative Solution of Large Linear Systems. Academic Press, New York, 1971. [67] Yu Zhong, M. D. F. Wong, Fast algorithms for IR drop analysis in large power grid, Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design, p.351-357, November 06-10, 2005. [68] Quming Zhou, Kai Sun, Kartik Mohanram, Danny C. Sorensen. Large power grid analysis using domain decomposition, Proceedings of the conference on Design, automation and test in Europe: Proceedings, March 06-10, 2006, Munich, Germany. [69] C. Zhuo, J. Hu, M. Zhao, and K. Chen. Power grid analysis and optimization using algebraic multigrid. IEEE Transactions on Computer-aided Design, 27:738–751, April 2008. Fei Wei received the B.S. degree in electronic engineering from Tsinghua University, Beijing, China in 2004. He is currently a Ph.D student in Department of Electronic Engineering, Tsinghua University. His research interests are distributed numerical algorithms and transistor-level circuit simulation. Huazhong Yang (M’97–SM’00) received the B.S. degree in microelectronics and the M.S. and Ph.D. degrees in circuits and systems from Tsinghua University, Beijing, China, in 1989, 1993, and 1998, respectively. Since 1993, he has been with the Department of Electronic Engineering, Tsinghua University, where he has been a Full Professor since 1998. His research interests include CMOS radio-frequency integrated circuits, VLSI system structure for digital communications and media processing, low-voltage and low power integrated circuits, and computer-aided design methodologies for system integration. He has authored or coauthored 6 books and more than 180 journal and conference papers in this area and holds 9 China patents. He is also a coeditor of the research monograph High-speed Optical Transceivers-Integrated Circuits Designs and Optical Devices Techniques (World Scientific, 2006). Dr. Yang was a recipient of the fund for Distinguished Young Scholars from NSFC in 2000, the outstanding researcher award of the National Keystone Basic Research Program of China in 2004, and the Special Government Allowance from the State Council of China in 2006.served as a TPC member of the Asia-Pacific Conference on Circuits and Systems, the International Conference on Communications, Circuits and Systems, and the Asia and South Pacific Design Automation Conference. He is an Associate Editor of the International Journal of Electronics.
5
PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar PRT (PERSONAL RAPID TRANSIT) NETWORK SIMULATION Włodzimierz Choromański, Warsaw University of Technology, Faculty of Transport, [email protected] Wiktor B. Daszczuk, Warsaw University of Technology, Institute of Computer Science, [email protected] Jarosław Dyduch, Warsaw University of Technology, Faculty of Transport, [email protected] Mariusz Maciejewski, Warsaw University of Technology, Faculty of Transport, [email protected] Paweł Brach, Warsaw University of Technology, Faculty of Transport, [email protected] Waldemar Grabski, Warsaw University of Technology, Institute of Computer Science, [email protected] ABSTRACT Transportation problems of large urban conurbations inspire search for new transportation systems, that meet high environmental standards, are relatively cheap and user friendly. The latter element also includes the needs of disabled and elderly people. This article concerns a new transportation system PRT - Personal Rapid Transit. In this article the attention is focused on the analysis of the efficiency of the PRT transport network. The simulator of vehicle movement in PRT network as well as algorithms for traffic management and control will be presented. The proposal of its physical implementation will be also included. Keywords: PRT, simulation, traffic experiments INTRODUCTION In Warsaw University of Technology, a project on Personal Rapid Transit (PRT) (Irving at al. 1978, Andreasson 2010) is under development (Choromański et al. 2011a and 2011b, Daszczuk at al. 2011). Personal rapid transit (PRT), is a public transportation mode featuring small automated vehicles operating on a network of specially-built guide ways. PRT is a type of th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar automated guideway transit (AGT), a class of system which also includes larger vehicles all the way to small driverless subway systems. The whole system is electrically supplied. In PRT designs, vehicles are sized for individual or small group travel, typically carrying no more than 3 to 4 passengers per vehicle. Guide ways are arranged in a network topology, with all stations located on sidings, and with frequent merge/diverge points. This approach allows for nonstop, point-to-point travel, bypassing all intermediate stations. The point-to-point service has been compared to a taxi. There are three kinds of nodes in the PRT network: stations, capacitors and intersections. Stations are places where passengers book their trips and board the vehicles, or wait for vehicles in a queue if there are no empty vehicles on a station. A capacitor is a source of vehicles (and sometimes may serve as a parking place). Intersections are threefold: “fork” (diverge), “join” (merge) and “junction” (such intersections are for technical purposes only). It is assumed that a vehicle has its own control unit, which is linked via radio network with control units of other vehicles and nodes (capacitors, stations and “join” intersections). Radio connections are established to vehicles and nodes that are closest to the vehicle, i.e. not farer that specified distance. This makes a subnet “visible” to the vehicle, the edge of which is called “a horizon”. The horizon distance should be chosen carefully, too large causes too much information to be transmitted (and routing problems), too small results in reduced safety of the traffic. A vehicle gets information about current parameters of movement of preceding vehicles: their positions, velocities and mode of operation (acceleration/ constant velocity/ deceleration/ friction braking). From an intersection controller a vehicle receives the decision on priority of crossing the intersection. Among other mechanical, electrical and transportation research goals, simulation of PRT network is performed, on two abstraction levels:  Coordination level is “behavioural simulation”. On this level, algorithms for following a route, keeping up, coordination on “join” intersections, joining the traffic and similar are tested for effectiveness.  Management level is “statistical simulation”. Simulation experiments identify the impact of various parameters of management algorithms (mainly of empty vehicle management and dynamic routing) on the passenger comfort (trip time and queue size). There are several PRT simulators available (Castangia and Guala 2011, Zheng, Jeffery and McDonald 2009, Andreasson 2010, Hermes, Beamways, RUF), yet the authors have decided to build the project’s own simulators, for two reasons:  Available simulators have fixed, inaccessible traffic algorithms (on both levels: coordination and management); the user can only observe the operation of included algorithms and he/she has no influence on their structure and parameters.  Simulators produce a number of synthetic output parameters; there is no access to individual events (witch should be reported as a kind of “event log”); this lack does not allow the researcher to build his/her own detailed characteristics of the traffic. It seems that the own simulators build are more advanced. They permit the analysis of various algorithms of coordination and management, and they give access to wide and detailed set of traffic parameters and event logs. The purpose of simulators is: th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar Entry buffer Exit buffer Debarking berth Other berths Boarding berth a) in-line Entry buffer Exit buffer Stubberths b) stub-berths Figure 1 – station types      analysis of various network topologies of PRT, identification of capacity and ridership of various networks, identification of saturation points (when performance is degraded to inaccessible level) research on dynamic algorithms (especially empty vehicles management and dynamic routing), and identification the operational cost of performance improvement (number of empty trips, distance of empty movement etc) sensitivity of the system to variation of different traffic parameters values. THE STRUCTURE OF THE PRT NETWORK A structure of PRT network is a graph (Andreasson 2010). Nodes are capacitors, stations and intersections. Edges are segments. There are two types of stations: in-line (with the FIFO rule applied) and with stubberths. Vehicles must have ability to drive backwards to operate inside a berth. A structure of both types of a station is shown in Figure 1. From topography point of view, nodes are simply points of size zero. Yet the nodes have internal structure necessary to model their roles in a network. The stations are most complicated: they have parking places (berths), entry and exit buffers, passenger queues th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar etc. Several parameters characterize a station, including its type (in-line/stub-berths), number of berths, sizes of entry and exit buffer. A capacitor is much simpler, because it is not related to passengers. It has only one characteristic – a number of parking places. Capacitor, station and “junction” intersection have one entry and one exit. “Fork” intersection has two exits (to diverge) while “join” intersection has two entries (to merge). Segments are edges of PRT graph. Segments are unidirectional and they have starting and ending points in nodes (capacitors, stations and intersections). A segment is characterized by its length and maximum velocity. Nodes and edges conform a static structure of PRT network. Two types of dynamic objects define a behaviour of the network: vehicles, which originate from capacitors, and passengers appearing in stations. A Passenger group has a specific destination station. Passengers wait for the vehicle (or take an empty one, standing in berth), then a trip is realized, and after completing the journey, they ‘’disappear” from the system. The basic goal of PRT network is to realize trips between stations for passengers. A vehicle is characterized by: capacity, maximum velocity, maximum acceleration and deceleration, maximum friction deceleration (emergency brake) and minimum (static) separation between vehicles. Passengers are organized in groups for a trip to common destination (station). A group is characterized by its cardinality and the target station. THE MODEL The control algorithm of the PRT network is specified in two levels: lower - coordination level, and upper - management level:  Two coordination algorithms are defined: keeping up, and coordination on “join” intersections (joining the traffic from a capacitor/station is realized as a special case of coordination on “join” intersection).  Several management algorithms, including some empty vehicle management algorithms and dynamic routing algorithm. The coordination algorithms use traffic parameters like maximum velocities, maximum acceleration and deceleration, separation between vehicles etc. Some basic rules of behaviour are fixed in the simulator, including movement inside stations, and movement along the track and keeping up rules, are fixed in the simulator. The routing is based on Dijkstra’s algorithm, although edge weights in the algorithm are parameterized by several values depending on static structure (segment lengths), traffic parameters (maximum velocities) and dynamic traffic situation (traffic jams). Various characteristics of the model have different variability:  The structure and topography of the network, type of individual stations (inline/stub berths), capacity of nodes, number of vehicles, boarding and debarking times as well as distribution of passenger group cardinality are constant.  Traffic parameters stay constant during single simulation.  Mean input of passenger groups and origin-destination matrix may be defined to be valid in specific periods.  Maximal velocity of a segment may be changed in specified while. th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar TWO APPROACHES TOWARDS PRT SIMULATION Two independent simulators have been built: one event-driven and second based on cellular automata. Both simulators use the same model of PRT network and the same base parameters. This allows to compare the results and verify correctness of the two simulators. The simulators have different usability properties: the former simulator is more accurate, while the latter one is much faster. Both simulators use micro-simulation (Daszczuk at al. 2011, Fox 1999, Barcelo 1999, Gabard 1999, Nagel and Schreckenberg 1992). In the event-driven simulator, segments are divided into sectors and passing a sector is a basic simulation step. The second simulator is based on cellular automata, where every automaton corresponds to a singular node of the network. The basic step of simulation is 1 second interval, in which all automata are updated. The design of the model typically follows a hierarchy of design steps, from most general to most detailed:  network structure and topography;  characteristics of network elements: station types, numbers of berths, maximal velocities of segments etc.;  acceleration and deceleration, general velocity limits, separation, boarding and debarking times, origin-destination matrix;  parameters of empty vehicle management, priority rules and dynamic routing;  number of vehicles and their individual characteristics (velocity limits for individual vehicles);  passenger input distribution. The simulation experiments may be used to compare throughput characteristics of various network structures, various station and segment parameters, or particular network in which empty vehicles management parameters or dynamic routing parameters vary. Ability to perform the same experiments on two different simulators assures results verification that will be model independent. Some research is described later. EVENT-DRIVEN SIMULATION ENVIRONMENT The movement of vehicles is performed in the event-driven manner, which is a typical solution (Anderson 1998, Lopez et al. 2008). Every segment is divided into sectors. The decisions on the behaviour of vehicles are made in the connections of sectors. Also, starting some actions in capacitors/stations – passenger group occurring, coupling of passenger group with a vehicle, beginning of boarding or debarking, start form parking place etc. are simulation events. The simulation environment is called Feniks 3.0. The main program of the simulator (called “UI”) is responsible for building a model, setting its parameters and to organizing simulation experiments. The external library (called “external simulator”) implements control algorithms (on both layers). The whole simulator is written in C#. The interface is defined between the simulator parts, which allows to define user’s own control algorithms instead of supplied with external simulator. th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar Every event (for example start of movement, time of passing the sector) is served by calling external simulator and performing adequate acts regarding obtained decision. The main program (UI) is a simulation engine, an animation engine and a statistics collector. Also, in UI are included procedures for defining a model structure and topography. External simulator decides on every change of state of every vehicle, for instance:  coupling of passenger group with a vehicle;  beginning of boarding or debarking, passing a connection of sectors, stopping at connection of sectors;  decision on the time of passing the sector; the time is calculated by the coordination algorithm that guarantees safe distance between vehicles on a track. The Simulator plans the vehicle movement analytically and therefore precisely (not approximate). Although the simulation is event-driven, the result of simulation is similar to the analogue simulator. The only inaccuracy comes from the fact that a vehicle may stop only at the connection of sectors (rather than inside a sector). Coordination - movement along a track Vehicles move along a track with maximal possible velocity (which is a minimum from maximum velocities of a model, a segment, a sector and a vehicle). A “horizon” is defined to be a distance “observed” by the vehicle. The nodes and other vehicles closer than the horizon influence the behaviour of the vehicle. The velocity on an empty track (in a distance closer than the horizon) is limited by the acceleration of the vehicle and by deceleration of the vehicle together with velocity limit on the next sectors. If there is a preceding vehicle on a track, or a node (station/capacitor/”join” intersection) which cannot be crossed because of traffic condition, a distance called “separation” is kept. Static separation defines the minimum distance. The coordination algorithm guarantees stopping after the preceding vehicle in static separation distance if preceding vehicles starts to decelerate of brake at the moment. If there is a “fork” intersection closer than the horizon, only the chosen outgoing track (left or right) is analyzed. If a node (capacitor or station) is closer than the horizon, and the node is the target of the trip, the vehicle must reach the zero velocity in a point of diverging from the track towards the node. The exception is when all the parking places and all entry buffers in the node are occupied – in such a case the vehicle must stop in separation distance before the node. If a vehicles wants to “drive through” a node, it runs with maximal allowed velocity, provided that no vehicle starting from the node is in conflict (this case will be described in the next subsection). Coordination - behaviour on “join” intersections A “join” intersection is allocated to one of approaching vehicles by the intersection controller. Only the vehicles closer then the horizon distance are considered. And only closest vehicles on both segments are taken into account, vehicles following them follow normal keeping up. From a vehicle’s point of view, if there is a possible conflict: th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar  if the intersection is allocated to a vehicle on the other track leading to the intersection, the considered vehicle is planned to stop prior to the intersection in static separation distance;  otherwise the vehicle ask the intersection controller which vehicle has the priority; if the other one – the considered vehicle stops as above. Joining the traffic (from a capacitor or a station) is very similar, just the point of the capacitor on the track (or the point of the station) is treated as intersection, and it is being allocated to a vehicle on the move or to a vehicle joining the traffic, depending on priority rules (parameters of coordination algorithm). CELLULAR AUTOMATA SIMULATION ENVIRONMENT Cellular automata is a structure defined by a matrix of cells and their states, transitions and the rules of those transitions (Nagel and Schreckenberg 1992). Automata in such form are mathematical models that construct an environment for a bigger, discrete classes of models, because all the structures describing them are discrete. Each simple cellular automaton consists of n-dimensional, discrete matrix of cells. Each cell is the same (is a copy of the previous cell) and the whole space of the matrix must be filled with the cells put next to each other. Each cell has exactly one state from the finite number of available states. Transition of each cell takes place based on the same, precisely defined local rules (homogeneity), that depend only on the previous state of the cell and states of finite number of neighbouring cells. Transition is discrete and happens at the same time for all cells (parallelism). In the cellular automata, a cell is finite automaton. In order to model the PRT network and traffic a more elaborated adaptation of cellular automata has been chosen – directed graph that represents the infrastructure. The computational model is a directed graph, in which the nodes are the hubs and the edges between the nodes are the segments. Each node and edge has all the parameters that describe a given element (length of the segment, direction of movement, maximum allowed speed, etc.). Each edge is tied to a discrete model of a segment, which is represented by 1-dimensional array. One cell represents one unit of segment and is a parameter of the model. Each junction is represented as one cell. In a given unit of time, in a given cell, there can be only one vehicle. The cell can have one of two available states – empty or occupied by a vehicle. Each vehicle in the model moves with a velocity from the range 0…V-max. In the simulator a topographic model has been implemented, that consists of 2-dimensional, regular and discrete cell matrix. This model is a layer of abstraction over the directed graph. In the graph the nodes are the elements of the segments and the edges define the direction of movement between the nodes. Each node represents exactly one cell in the 2-dimensional matrix. The configuration describing the infrastructure and the initial state of the environment – location of the vehicles, stations and capacitors and the passengers is one of the parameters of the model. The simulator uses and optimal-path algorithm to define a route to the target station. Such an approach allows for a dynamic control of the vehicles during the movement and is an excellent template of the real life movement of the PRT vehicles. th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar Movement in the network After defining all the elements of the cellular automata, the rules of transition can be applied on the cell matrix. The transition process can be split into several parts (Schadschneidert and Schreckenbergt 1993). Initial state, as mentioned previously, is a the definition of the initial conditions of the cell. Usually those are neutral states, that do not cause any conflicts. Update of the automata matrix is a walkthrough sequence of steps for each cell according to the instructions below: 1. Verification of the transition rules – in this step a current state of the cell is verified along with the states of the neighbouring cells and other parameters of automaton 2. Neighbours verification – during this step a verification of any conflict states of the neighbouring cell takes place. If there are any conflicts they have to be resolved according the predefined rules 3. Verification of boundary conditions – verification of the cell at the borders of the matrix. They can be removed (absorbing closed neighbourhood) or new ones can be created (periodic neighbourhood) 4. Verification of number of iterations- if this is a finite automaton, with predefined lifecycle than in this step it is check whether the transition should stop. In the case of the implemented PRT network prototype, updated model of the classic cellular automaton has been implemented (Benjaminy et al. 1996, Li and Wu 2001). The model consists of the following steps (each is performed in parallel for all vehicles in the environment): 1. Acceleration: if the speed of the vehicle V is smaller than the maximum, allowed speed (for a vehicle or road segment) and if the distance to the next vehicle is bigger than V+1, than the velocity is increased by 1, e.g. V:= V + 1 2. Deceleration: if the vehicle at the position I, with velocity V, sees a vehicle at the position i+j, for j smaller or equal to v, then the speed is reduced to j-1, e.g. V:= j-1 3. Randomization (optional): with a probability p1, the velocity of a vehicle is reduced by 1 (if bigger than 0), e.g. V:=V-1 4. Randomization (optional): with a probability p2, vehicle breaks down for a time period J, e.g. the velocity of vehicle is 0 for J units of time 5. If in the next unit of time vehicle will drive through a junction, following conditions are verified: a. If there is no conflict on the junction, e.g. there is no other vehicle coming to junction in the same time do nothing. th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar b. Otherwise define the order of the vehicles (using weights-based function). The priority vehicle does nothing (drives through the junction) and the other one slows down, letting the priority vehicle to drive through. The order of passing vehicles on the junction is defined by the weight of each vehicle - vehicle with higher weight goes first on the crossroad. The weight of the vehicle is determined based on the following function: W ( p)  Wt  t  Wd  d  W p  p  W pas  pas (1) where: W(p) – weight of the vehicle Wt - weight of waiting time t – waiting time Wd - weight of the priority of the segment d – priority of the segment Wp - weight of the priority of the vehicle p – priority of the vehicle W pas - weight of the number of passengers pas – number of passengers in the vehicle 6. Movement: move vehicles V cells in the direction of movement SIMULATION RESEARCH As an example of research work, a simulation experiment with empty trips in PRT network is presented. A PRT network performs people transport on their demand. Yet, to achieve the main goal, some trips without passengers (called empty trips) must be executed. The examples are:  When a passenger group (typically 1-4 persons) occurs at a station, and there are no empty vehicles available in the station, an empty trip must be organized to supply a vehicle for the passenger group. It is the calling mechanism.  When a vehicle approaches a station, and there is no empty berth for it, one of empty vehicles standing in the station must be expelled from the station.  Whether there are many empty vehicles in a given station, and there are no (or little) empty vehicles in other station, an empty trip may be organized from the station to the latter one (target station), especially if average passenger input at the target station posits to expect new group soon. The mechanism is called balancing.  If an empty vehicle stays in the station for a long time, and there are no passengers waiting or expected at the station, the vehicle may be withdrawn to a capacitor for safety reasons (especially at night). th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar The former two mechanisms (calling and expelling) are necessary in PRT system, while the latter two (balancing and withdrawing) are optional. Figure 2 – The first PRT model (city) In a simulation experiment, an impact of a passenger input rate on a number of empty trips is examined. As a PRT network is complicated and the influence of many design parameters in its behaviour is unknown, the research results may be obtained by simulation only. To show that a found relation is general, various network structures and various behaviour parameters should be applied. For the research on the problem mentioned above, two PRT network structures were used, presented in Figures. 2 (city) and 3 (seashore). The circles in the figures represent stations while solid circles represent capacitors. Two numbers of vehicles were used. The main parameters of the network are:  total tracks length 6064,5m (first model) or 5584m (second model),  12 or 24 vehicles,  4 passengers in every trip,  all stations of in-line type,  4 berths in each station.  maximal velocity 14m/s,  maximal acceleration and deceleration 2m/s2,  boarding and debarking times 10s.  static separation 4m (event-driven simulator) and 2m (cellular automata simulator),  passenger input rate differs in specific simulations,  trip destination chosen randomly th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar  empty vehicle management algorithm: calling, expelling and withdrawing mechanism used; Figure 3 - The second PRT model (seashore)   calling principle: nearest empty vehicle is called, if any; expelling principle: expelled empty vehicle is moved to a station on which there are empty berths and w distance to which is close (weighted expelling rule);  withdrawing principle: if a vehicle stays in a station for longer then 120s, it is moved to the capacitor (timeout 120s), provided that there is an empty berth in the capacitor. During this time it may be called to other station (in which a passenger waits) or expelled (if other vehicle approaches the station and there is no empty berth for it). The models (as with every model) have their saturation points, i.e. maximum numbers of trips per hour (depending on the model structure, number of vehicles etc.). The saturation point defines maximal throughput of the network: maximal number of passengers that may be moved to their destinations. For the research purposes, passenger groups input values were applied at saturation point and at several (5) input values less than maximum (passenger group input greater than in saturation point is useless because passenger queues rise to infinity). The results obtained from event-driven simulator are collected in Figure. 4, for the two PRT structures and for two numbers of vehicles. The results from cellular automata simulator are collected in Figure 5. Experiments in both simulators give similar results, where in every plot there is a maximum of empty trips (though the input rates of the maximum and the maximum values differ). The explanation of the observed feature is simple, although it is hard to expect it without simulation experiment. The reason of the plot shape is as follows: th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar  for input rates near saturation point every vehicle freed by passengers is taken immediately by successive passenger group, therefore empty trips seldom are obeyed; for low passenger input rates vehicles are seldom called (at most as many times as new passenger group occur at the stations); situations requiring expelling occur rarely (because of low number of trips with passengers); withdrawing may occur but at most  Model 1 - number of empty trips /12h Model 1 - number of empty trips /12h 3500 6000 3000 5000 2500 4000 2000 12 vehicles 1500 24 vehicles 3000 2000 1000 1000 500 0 0 12,9 25,8 38,7 51,7 64,6 25,1 77,5 50,2 75,3 100,3 125,4 150,5 Passenger groups input /h Passenger groups input /h Model 2 - number of empty trips /12h Model 2 - number of empty trips /12h 3000 5000 2500 4000 2000 3000 12 vehicles 1500 1000 24 vehicles 2000 1000 500 0 0 10,1 20,3 30,4 40,5 50,6 60,8 Passenger groups input /h 20,2 40,3 60,5 80,6 100,8 120,9 Passenger groups input /h Figure 4 – Simulation results for both models and two numbers of vehicles (event-driven simulator)  as frequent as trips with passengers; if passenger input grows then the numbers of calling situations and expelling situations grow as well, while the number of withdrawing situations falls; the growth of empty trips is limited by coincidences of passenger occurring with empty vehicle standing in the same station; the coincidences lastly dominate and the total number of empty trips begins to fall. th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar Figure 5– Simulation results for both models and two numbers of vehicles (cellular automata simulator) It is obvious that the described relation takes place in every reasonable model (perhaps excluding pathological ones, for example if calling a vehicle to other station precedes taking empty vehicle standing in the same station as passengers occur). IMPLEMENTING PRT STEERING AND MANAGING ALGORITHMS IN PHYSICAL LABORATORY ENVIRONMENT In parallel with developing logical model of the PRT network, a physical one is being built on the Warsaw University of Technology. It implements the algorithms described in the former chapters. The security and safety of PRT system is governed by a central computer control and dispatch system. The system consists of layers containing following subsystems (Figure. 6):  dispatcher system – DS.  central control system – CCS  area control system – ACS  radio communication system – RCS  vehicle control system – VCS The main task of the dispatcher system is the facilitation of the monitoring of the whole system by the maintenance personnel. The PRT system is fully automatic and during regular operation no human intervention is required. In case of emergency the personnel can switch to manual control. Dispatchers monitor the current state of the traffic, power system, data transmission and proper operability of computer systems. Dispatchers can mark any component as faulty and plan maintenance tasks. The steering and controlling system is equipped with surveillance video. The video cameras are mounted on the stations and PRT vehicles. Both the stations and vehicles have systems enabling instant contact with the th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar dispatchers In case of emergency dispatchers have direct live feedback from each vehicle. The video and voice transmissions are recorded and archived. At the infrastructure level the system is redundant, therefore provides the continuous operability in case of failure of single components of the system. The transmission system Figure 6 - Structure of the steering system of PRT also provided redundant connection in case of failure. Central control system is of distributed type - different functions are deployed on different steering layers. Central CCS system manages the vehicles. It sets the routes, assigns vehicles to the orders and manages empty vehicles. Performance and optimization of that part of the system is analyzed in the simulation environments. Optimization aims at the defining most efficient ways of movement in PRT network in terms of travel and waiting time as well as the energy efficiency. System react to emergency and faults situation by dynamically reassigning routes. Each change in the traffic situation is archived with a frequency of 100ms. The archived materials are available for analysis, elimination of bottleneck and errors in the system. Area control systems have the tasks of controlling single moving vehicles, controlling the traffic on the stations and assigning right-of-way on crossroads. The whole system is divided into areas that are managed by dedicated computers. The central system collects information about location of each vehicle and distributes it to all area computers. The rightof-way algorithms are parameterized and can be adjusted according to the traffic state in specific areas. ACS does not assign or manipulate routes. In case of emergency of CCS, the ACS directs the vehicles to the nearest station or evacuation points according to predefined scenario. If the connection with specific vehicle is lost, the ACS marks corresponding area as unavailable in order to maximize the safety of all participants. At the infrastructure level ACS is redundant. Additionally the information about movements and state of a vehicle is distributed to corresponding area computer as well as to th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar neighbouring ones. Such setup assures that in case of emergency one of the neighbouring computers can take over the control of the area. The main tasks of vehicle control system is communication with area control system, marking the position of the vehicle, assuring the safe distance to closest vehicle , maintaining a safe velocity, monitoring of the door controlling system, air conditioning, lightning, etc. VCS facilitates the voice and video communication between vehicles and dispatchers. Each vehicle is equipped with displays showing the current state and location of vehicle. Passenger can alter the target station at any moment and a new route will be assigned. During the trip the main display can present commercials and news information. VCS monitors the operation of the engine, breaking and power systems. Communication between PRT vehicles and ACS is facilitated by digital transmission system. The vehicle is in range of two independent base radio stations in any point of the network. The transmission system is implemented in accordance with European standard EN-50159. Data transmission is encoded and encrypted to disable access to the systems by undesirable individuals. Implementation of the European standards EN-50126, EN-50128, EN-50129 ensure highest safety, reliability and maintainability of the whole system. All the critical technical components are configured in fail-safe technique, using 2 out of 2 model CONCLUSIONS AND FURTHER WORK The results from simulation experiments show that the simulation environment is useful for observing and identification of effects occurring in PRT system. Also, it helps to compare various conditions of network operation, especially to find optimal conditions or to avoid traffic jams. In the future, the comparison of various network structures, management algorithms and other features may be performed from various points of view, for example from passenger, network administrator or network maintenance engineer point of view. The very wide set of output parameters measured give the possibility to observe the behaviour of a PRT network from that outlined or other points of view. A detailed log of events may be also obtained, which allows to build simulation statistics viewed from other points of view. Using the simulators, various design aspects may be viewed as complex optimization tasks. For this purpose, “unit costs” of all PRT elements (length of the track, number of vehicles, number of berths in a station, number of intersections of every type etc.) and PRT services (time and distance of a travel, time of vehicle technical maintenance, cost of amortisement, etc.) must be specified. Then, optimal usage parameters (passenger waiting time, effective travel velocity, delays in comparison to optimal conditions) or maintenance parameters (daily distance travelled, full/empty travel ratio etc.) may be identified in simulation experiments. Also, management algorithms build on other principles will be applied, i.e. decentralized th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar ACKNOWLEDGMENT The research work is carried out within the Eco‑Mobility Project that is being cofinanced by the European Regional Development Fund – Operational Program for Innovative Economy. UND-POIG.01.03.01-14-154 – Project Co-ordinator Prof. W. Choromański. REFERENCES Anderson J. E. (1998). Simulation of the operation of personal rapid transit systems, in Computers in Railways VI, WIT Press, Boston Southampton, Computational Mechanics Publications, 1998, 523-532 Andreasson I. J. (2010). Staged introduction of PRT with Mass Transit, in Proc. PRT@LHR 2010 Conference, September 21023, 2010, London Heathrow Airport, Barceló, J., Casas, J., J.L. Ferrer, J.L., García D. (1999). Modelling Advanced Transport Telematic Applications with Microscopic Simulators: the Case of AIMSUN2, Proc. Micro-simulation workshop, Institute for Transport Studies, University of Leeds , July 1999, 11-24 Beamways, http://www.beamways.com/ Benjamin, S. C., Johnson, N. F., Hui, P. M. (1996) Cellular automata models of traffic flow along a highway containing a junction, J. Phys. A: Math. Gen. 29 3119 Castangia, M., Guala, L. (2011). Modelling and simulation of a PRT network, in Proc . 17th International Conference on Urban Transport and the Environment, June 6-8, 2011, Pisa, Italy, pp 459-472 Choromański W., Dyduch J., Brach P. (2011a). Simulation research on innovative PRT transportation system traffic, Logistyka 6/2011 November/October 2011 (in Polish) Choromański W., Kowara J. (2011b). PRT–Modeling and Dynamic Simulation of Track and Vehicle, in Proc. 13th International Conference on Automated People Movers and Transit Systems, Paris, France, May 22-25, 2011 H. Leder W. H. and Sproule W. J. (eds), ISBN (print): 978-0-7844-1193-3, 294-306 Daszczuk, W.B., Mieścicki, J., Grabski, W. (2011). Building simulation models and simulation experiments in FeniksOnArena 1.0, WUT Research Report (in Polish) Fox K. (1999). Introduction to the SMARTEST Project, in Proc. Micro-simulation workshop, Institute for Transport Studies, University of Leeds, July 1999, 2-10 Gabard J.F., Breheret L. (1999). The SITRA-B+ Microscopic Traffic Simulation Model Examples of Use and Future Developments, in Proc. Micro-simulation workshop, Institute for Transport Studies, University of Leeds , July 1999, 49-58 Hermes, http://students.ceid.upatras.gr/~xithalis/simulation_en.html Irwing, J. et al. (1978). Fundamentals of Personal Rapid Transit, Lexington books, Lexington MA, 1978, ISBN is 0-669-02520-8 Li, X., Wu, Q. (2001) Cellular automata model considering the velocity effect of a car on the successive car, Physical Review E, Volume 64, 066128 Lopes C. V., Popov A., Kan L., Morla R. (2008). PRT simulation in an immersive virtual world, in Proc. of the 1st international conference on Simulation tools and techniques th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil PRT (Personal Rapid Transit) Network Simulation CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław; MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar for communications, networks and systems, SIMTOOLS ’08, Marseille, France, 57:157:7 Nagel K., Schreckenberg M. (1992) Cellular automata model for freeway traffic. J. Phys. I 2, 2221-2229 RUF, http://www.ruf.dk/ Schadschneidert A. and Schreckenbergt M. (1993) Cellular automaton models and traffic flow, 1993 J. Phys. A: Math. Gen. 26 L679 Zheng, P., Jeffery, D. and McDonald, M. (2009). Development and evaluation of traffic management strategies for personal rapid transit, in Proc. Industrial Simulation Conference 2009, Loughborough, UK, Jun 1-3, 2009, 191-195. th 13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
5
Fast Algorithms for Robust PCA via Gradient Descent Xinyang Yi∗ Dohyung Park∗ Yudong Chen† The University of Texas at Austin∗ arXiv:1605.07784v2 [cs.IT] 19 Sep 2016 {yixy,dhpark,constantine}@utexas.edu∗ Constantine Caramanis∗ Cornell University† [email protected]† Abstract We consider the problem of Robust PCA in the fully and partially observed settings. Without corruptions, this is the well-known matrix completion problem. From a statistical standpoint this problem has been recently well-studied, and conditions on when recovery is possible (how many observations do we need, how many corruptions can we tolerate) via polynomial-time algorithms is by now understood. This paper presents and analyzes a non-convex optimization approach that greatly reduces the computational complexity of the above problems, compared to the best available algorithms. In particular, in the fully observed case, with r denoting rank and d dimension, we reduce the complexity from O(r2 d2 log(1/ε)) to O(rd2 log(1/ε)) – a big savings when the rank is big. For the partially observed case, we show the complexity of our algorithm is no more than O(r4 d log d log(1/ε)). Not only is this the best-known run-time for a provable algorithm under partial observation, but in the setting where r is small compared to d, it also allows for near-linear-in-d run-time that can be exploited in the fully-observed case as well, by simply running our algorithm on a subset of the observations. 1 Introduction Principal component analysis (PCA) aims to find a low rank subspace that best-approximates a data matrix Y ∈ Rd1 ×d2 . The simple and standard method of PCA by singular value decomposition (SVD) fails in many modern data problems due to missing and corrupted entries, as well as sheer scale of the problem. Indeed, SVD is highly sensitive to outliers by virtue of the squared-error criterion it minimizes. Moreover, its running time scales as O(rd2 ) to recover a rank r approximation of a d-by-d matrix. While there have been recent results developing provably robust algorithms for PCA (e.g., [8, 28]), the running times range from O(r2 d2 ) to O(d3 )1 and hence are significantly worse than SVD. Meanwhile, the literature developing sub-quadratic algorithms for PCA (e.g., [16, 15, 3]) seems unable to guarantee robustness to outliers or missing data. Our contribution lies precisely in this area: provably robust algorithms for PCA with improved run-time. Specifically, we provide an efficient algorithm with running time that matches SVD while nearly matching the best-known robustness guarantees. In the case where rank is small compared to dimension, we develop an algorithm with running time that is nearly linear in the dimension. This last algorithm works by subsampling the data, and therefore we also show that our algorithm solves the Robust PCA problem with partial observations (a generalization of matrix completion and Robust PCA). 1 For precise dependence on error and other factors, please see details below. 1 1.1 The Model and Related Work We consider the following setting for robust PCA. Suppose we are given a matrix Y ∈ Rd1 ×d2 that has decomposition Y = M ∗ + S ∗ , where M ∗ is a rank r matrix and S ∗ is a sparse corruption matrix containing entries with arbitrary magnitude. The goal is to recover M ∗ and S ∗ from Y . To ease notation, we let d1 = d2 = d in the remainder of this section. Provable solutions for this model are first provided in the works of [9] and [8]. They propose to solve this problem by convex relaxation: min |||M |||nuc + λkSk1 , s.t. Y = M + S, M,S (1) where |||M |||nuc denotes the nuclear norm of M . Despite analyzing the same method, the corruption models in [8] and [9] differ. In [8], the authors consider the setting where the entries of M ∗ are corrupted at random with probability α. They show their method succeeds in exact recovery with α as large as 0.1, which indicates they can tolerate a constant fraction of corruptions. Work in [9] considers a deterministic corruption model, where nonzero entries of S ∗ can have arbitrary position, but the sparsity of each row √ and column does not exceed αd. They prove that for exact recovery, it can allow α = O(1/(µr d)). This was subsequently further improved to α = O(1/(µr)), which is in fact optimal [12, 19]. Here, µ represents the incoherence of M ∗ (see Section 2 for details). In this paper, we follow this latter line and focus on the deterministic corruption model. The state-of-the-art solver [21] for (1) has time complexity O(d3 /ε) to achieve error ε, and is thus much slower than SVD, and prohibitive for even modest values of d. Work in [22] considers the deterministic corruption model, and improves this running time without sacrificing the robustness guarantee on α. They propose an alternating projection (AltProj) method to estimate the low rank and sparse structures iteratively and simultaneously, and show their algorithm has complexity O(r2 d2 log(1/ε)), which is faster than the convex approach but still slower than SVD. Non-convex approaches have recently seen numerous developments for applications in low-rank estimation, including alternating minimization (see e.g. [20, 18, 17]) and gradient descent (see e.g. [4, 11, 25, 26, 31, 32]). These works have fast running times, yet do not provide robustness guarantees. One exception is [11], where the authors analyze a row-wise `1 projection method for recovering S ∗ . Their analysis hinges on positive semidefinite M ∗ , and the algorithm requires prior knowledge of the `1 norm of every row of S ∗ and is thus prohibitive in practice. Another exception is work [17], which analyzes alternating minimization plus an overall sparse projection. Their algorithm is shown to tolerate at most a fraction of α = O(1/(µ2/3 r2/3 d)) corruptions. As we discuss in Section 1.2, we can allow S ∗ to have much higher sparsity α = O(1/(µr1.5 )), which is close to optimal. After the initial post of our paper on arxiv, Cherapanamjeri et al. [14] posted their paper on solving robust PCA with partial observations by a method modified from AltProj. Their approach is shown to have optimal robustness. The sample complexity they established is O(µ2 r2 d log2 d log2 (1/ε)), which depends on the estimation error ε, since the analysis of AltProj under partial observations requires sampling splitting. In contrast, the sample complexity O(µ2 r2 d log d) of our approach (see Corollary 2) does not have such dependence. Moreover, their method requires computing rank-r SVD of the observed matrices in every round of iterations. Our algorithm only needs to compute rank-r SVD (approximately) once in the initialization step. It is worth mentioning other works that obtain provable guarantees of non-convex algorithms or problems including phase retrieval [5, 13, 30], EM algorithms [2, 27, 29], tensor decompositions [1] and second order method [24]. It might be interesting to bring robust considerations to these works. 2 1.2 Our Contributions In this paper, we develop efficient non-convex algorithms for robust PCA. We propose a novel algorithm based on the projected gradient method on the factorized space. We also extend it to solve robust PCA in the setting with partial observations, i.e., in addition to gross corruptions, the data matrix has a large number of missing values. Our main contributions are summarized as follows.2 1. We propose a novel sparse estimator for the setting of deterministic corruptions. For the lowrank structure to be identifiable, it is natural to assume that deterministic corruptions are “spread out” (no more than some number in each row/column). We leverage this information in a simple but critical algorithmic idea, that is tied to the ultimate complexity advantages our algorithm delivers. 2. Based on the proposed sparse estimator, we propose a projected gradient method on the matrix factorized space. While non-convex, the algorithm is shown to enjoy linear convergence under proper initialization. Along with a new initialization method, we show that robust PCA can be solved within complexity O(rd2 log(1/ε)) while ensuring robustness α = O(1/(µr1.5 )). Our algorithm is thus faster than the best previous known algorithm by a factor of r, and enjoys superior empirical performance as well. 3. Algorithms for Robust PCA with partial observations still rely on a computationally expensive convex approach, as apparently this problem has evaded treatment by non-convex methods. We consider precisely this problem. In a nutshell, we show that our gradient method succeeds (it is guaranteed to produce the subspace of M ∗ ) even when run on no more than O(µ2 r2 d log d) random entries of Y . The computational cost is O(µ3 r4 d log d log(1/ε)). When rank r is small compared to the dimension d, in fact this dramatically improves on our bound above, as our cost becomes nearly linear in d. We show, moreover, that this savings and robustness to erasures comes at no cost in the robustness guarantee for the deterministic (gross) corruptions. While this demonstrates our algorithm is robust to both outliers and erasures, it also provides a way to reduce computational costs even in the fully observed setting, when r is small. 4. An immediate corollary of the above result provides a guarantee for exact matrix completion, with general rectangular matrices, using O(µ2 r2 d log d) observed entries and O(µ3 r4 d log d log(1/ε)) time, thereby improving on existing results in [11, 25]. 1.3 Organization and Notation The remainder of this paper is organized as follows. In Section 2, we formally describe our problem and assumptions. In Section 3, we present and describe our algorithms for fully (Algorithm 1) and partially (Algorithm 2) observed settings. In Section 4.1, we establish theoretical guarantees of Algorithm 1. The theory for partially observed setting are presented in Section 4.2. The numerical results are collected in Section 5. Sections 6, 7 and Appendix A contain all the proofs and technical lemmas. To ease presentation, the discussion here assumes M ∗ has constant condition number, whereas our results below show the dependence on condition number explicitly. 2 3   For any index set Ω ⊆ [d1 ]×[d2 ], we let Ω(i,·) := (i, j) ∈ Ω j ∈ [d2 ] , Ω(·,j) := (i, j) ∈ Ω i ∈ [d1 ] . For any matrix A ∈ Rd1 ×d2 , we denote its projector onto support Ω by ΠΩ (A), i.e., the (i, j)-th entry of ΠΩ (A) is equal to A if (i, j) ∈ Ω and zero otherwise. The i-th row and j-th column of A are denoted by A(i,·) and A(·,j) . The (i, j)-th entry is denoted as A(i,j) . Operator norm of A is |||A|||op . Frobenius norm of A is |||A|||F . The `a /`b norm of A is denoted by |||A|||b,a , i.e., the `a norm of the vector formed by the `b norm of every row. For instance, |||A|||2,∞ stands for maxi∈[d1 ] kA(i,·) k2 . 2 Problem Setup We consider the problem where we observe a matrix Y ∈ Rd1 ×d2 that satisfies Y = M ∗ + S ∗ , where M ∗ has rank r, and S ∗ is corruption matrix with sparse support. Our goal is to recover M ∗ and S ∗ . In the partially observed setting, in addition to sparse corruptions, we have erasures. We assume that each entry of M ∗ + S ∗ is revealed independently with probability p ∈ (0, 1). In particular, for any (i, j) ∈ [d1 ] × [d2 ], we consider the Bernoulli model where ( (M ∗ + S ∗ )(i,j) , with probability p; Y(i,j) = (2) ∗, otherwise. We denote the support of Y by Φ = {(i, j) | Y(i,j) 6= ∗}. Note that we assume S ∗ is not adaptive to Φ. As is well-understood thanks to work in matrix completion, this task is impossible in general – we need to guarantee that M ∗ is not both low-rank and sparse. To avoid such identifiability issues, we make the following standard assumptions on M ∗ and S ∗ : (i) M ∗ is not near-sparse or “spiky.” We impose this by requiring M ∗ to be µ-incoherent – given a singular value decomposition (SVD)3 M ∗ = L∗ Σ∗ R∗> , we assume that r r µr µr ∗ ∗ |||L |||2,∞ ≤ , |||R |||2,∞ ≤ . d1 d2 (ii) The entries of S ∗ are “spread out” – for α ∈ [0, 1), we assume S ∗ ∈ Sα , where n o Sα := A ∈ Rd1 ×d2 kA(i,·) k0 ≤ αd2 for all i ∈ [d1 ] ; kA(·,j) k0 ≤ αd1 for all j ∈ [d2 ] . (3) In other words, S ∗ contains at most α-fraction nonzero entries per row and column. 3 Algorithms For both the full and partial observation settings, our method proceeds in two phases. In the first phase, we use a new sorting-based sparse estimator to produce a rough estimate Sinit for S ∗ based on the observed matrix Y , and then find a rank r matrix factorized as U0 V0> that is a rough estimate of M ∗ by performing SVD on (Y − Sinit ). In the second phase, given (U0 , V0 ), we perform an iterative method to produce series {(Ut , Vt )}∞ t=0 . In each step t, we first apply our sparse estimator to produce a sparse matrix St based on (Ut , Vt ), and then perform a projected gradient descent step on the low-rank factorized space to produce (Ut+1 , Vt+1 ). This flow is the same for full and partial observations, though a few details differ. Algorithm 1 gives the full observation algorithm, and Algorithm 2 gives the partial observation algorithm. We now describe the key details of each algorithm. 3 Throughout this paper, we refer to SVD of rank r matrix by form LΣR> where Σ ∈ Rr×r . 4 Sparse Estimation. A natural idea is to keep those entries of residual matrix Y − M that have large magnitude. At the same time, we need to make use of the dispersed property of Sα that every column and row contain at most α-fraction of nonzero entries. Motivated by these two principles, we introduce the following sparsification operator: For any matrix A ∈ Rd1 ×d2 : for all (i, j) ∈ [d1 ]×[d2 ], we let ( (αd ) (αd ) A(i,j) , if |A(i,j) | ≥ |A(i,·)2 | and |A(i,j) | ≥ |A(·,j)1 | Tα [A] := , (4) 0, otherwise (k) (k) where A(i,·) and A(·,j) denote the elements of A(i,·) and A(·,j) that have the k-th largest magnitude respectively. In other words, we choose to keep those elements that are simultaneously among the largest α-fraction entries in the corresponding row and column. In the case of entries having identical magnitude, we break ties arbitrarily. It is thus guaranteed that Tα [A] ∈ Sα . Algorithm 1 Fast RPCA INPUT: Observed matrix Y with rank r and corruption fraction α; parameters γ, η; number of iterations T . // Phase I: Initialization. 1: Sinit ← Tα [Y ] // see (4) for the definition of Tα [·]. 2: [L, Σ, R] ← SVDr [Y − Sinit ] 4 3: U0 ← LΣ1/2 , V0 ← RΣ1/2 . Let U, V be defined according to (7). // Phase II: Gradient based iterations. 4: U0 ← ΠU (U0 ), V0 ← ΠV (V0 ) 5: for t = 0, 1, . . . , T − 1 do   6: St ← Tγα Y − Ut Vt>  7: Ut+1 ← ΠU Ut − η∇U L(Ut , Vt ; St ) − 12 ηUt (Ut> Ut − Vt> Vt ) 8: Vt+1 ← ΠV Vt − η∇V L(Ut , Vt ; St ) − 21 ηVt (Vt> Vt − Ut> Ut ) 9: end for OUTPUT: (UT , VT ) Initialization. In the fully observed setting, we compute Sinit based on Y as Sinit = Tα [Y ]. In the partially observed setting with sampling rate p, we let Sinit = T2pα [Y ]. In both cases, we then set U0 = LΣ1/2 and V0 = RΣ1/2 , where LΣR> is an SVD of the best rank r approximation of Y − Sinit . Gradient Method on Factorized Space. After initialization, we proceed by projected gradient descent. To do this, we define loss functions explicitly in the factored space, i.e., in terms of U, V and S: L(U, V ; S) := e V ; S) := L(U, 1 |||U V > + S − Y |||2F , (fully observed) 2   1 |||ΠΦ U V > + S − Y |||2F . (partially observed) 2p (5) (6) 4 SVDr [A] stands for computing a rank-r SVD of matrix A, i.e., finding the top r singular values and vectors of A. Note that we only need to compute rank-r SVD approximately (see the initialization error requirement in Theorem 1) so that we can leverage fast iterative approaches such as block power method and Krylov subspace methods [23]. 5 Recall that our goal is to recover M ∗ that satisfies the µ-incoherent condition. Given an SVD M ∗ = L∗ ΣR∗> , we expect that the solution (U, V ) is close to (L∗ Σ1/2 , R∗ Σ1/2 ) up to some rotation. In order to serve such µ-incoherent structure, it is natural to put constraints on the row norms of U, V based on |||M ∗ |||op . As |||M ∗ |||op is unavailable, given U0 , V0 computed in the first phase, we rely on the sets U, V defined as r r     2µr 2µr d2 ×r d1 ×r |||A|||2,∞ ≤ U := A ∈ R |||A|||2,∞ ≤ |||U0 |||op , V := A ∈ R |||V0 |||op . (7) d1 d2 Now we consider the following optimization problems with constraints: min U ∈U ,V ∈V,S∈Sα min U ∈U ,V ∈V,S∈Spα 1 L(U, V ; S) + |||U > U − V > V |||2F , 8 e V ; S) + 1 |||U > U − V > V |||2 . L(U, F 64 (fully observed) (partially observed) (8) (9) The regularization term in the objectives above is used to encourage that U and V have the same scale. Given (U0 , V0 ), we propose the following iterative method to produce series {(Ut , Vt )}∞ t=0 and {St }∞ . We give the details for the fully observed case – the partially observed case is similar. For t=0   > t = 0, 1, . . ., we update St using the sparse estimator St = Tγα Y − Ut Vt , followed by a projected gradient update on Ut and Vt   1 > > Ut+1 = ΠU Ut − η∇U L(Ut , Vt ; St ) − ηUt (Ut Ut − Vt Vt ) , 2   1 > > Vt+1 = ΠV Vt − η∇V L(Ut , Vt ; St ) − ηVt (Vt Vt − Ut Ut ) . 2 Here α is the model parameter that characterizes the corruption fraction, γ and η are algorithmic tunning parameters, which we specify in our analysis. Essentially, the above algorithm corresponds to applying projected gradient method to optimize (8), where S is replaced by the aforementioned sparse estimator in each step. Algorithm 2 Fast RPCA with partial observations INPUT: Observed matrix Y with support Φ; parameters τ, γ, η; number of iterations T . // Phase I: Initialization. 1: Sinit ← T2pα [ΠΦ (Y )] 2: [L, Σ, R] ← SVDr [ p1 (Y − Sinit )] 3: U0 ← LΣ1/2 , V0 ← RΣ1/2 . Let U, V be defined according to (7). // Phase II: Gradient based iterations. 4: U0 ← ΠU (U0 ), V0 ← ΠV (V0 ) 5: for t = 0, 1, . . . , T − 1 do   > 6: St ← Tγpα Π Y − U V t Φ t   e t , Vt ; St ) − 1 ηUt (U > Ut − V > Vt ) 7: Ut+1 ← ΠU Ut − η∇U L(U t t 16   1 e 8: Vt+1 ← ΠV Vt − η∇V L(Ut , Vt ; St ) − 16 ηVt (Vt> Vt − Ut> Ut ) 9: end for OUTPUT: (UT , VT ) 6 4 Main Results In this section, we establish theoretical guarantees for Algorithm 1 in the fully observed setting and for Algorithm 2 in the partially observed setting. 4.1 Analysis of Algorithm 1 We begin with some definitions and notation. It is important to define a proper error metric because the optimal solution corresponds to a manifold and there are many distinguished pairs (U, V ) that minimize (8). Given the SVD of the true low-rank matrix M ∗ = L∗ Σ∗ R∗> , we let U ∗ := L∗ Σ∗1/2 and V ∗ := R∗ Σ∗1/2 . We also let σ1∗ ≥ σ2∗ ≥ . . . ≥ σr∗ be sorted nonzero singular values of M ∗ , and denote the condition number of M ∗ by κ, i.e., κ := σ1∗ /σr∗ . We define estimation error d(U, V ; U ∗ , V ∗ ) as the minimal Frobenius norm between (U, V ) and (U ∗ , V ∗ ) with respect to the optimal rotation, namely p d(U, V ; U ∗ , V ∗ ) := min |||U − U ∗ Q|||2F + |||V − V ∗ Q|||2F , (10) Q∈Qr for Qr the set of r-by-r orthonormal matrices. This metric controls reconstruction error, as p |||U V > − M ∗ |||F . σ1∗ d(U, V ; U ∗ , V ∗ ), (11) p when d(U, V ; U ∗ , V ∗ ) ≤ σ1∗ . We denote the local region around the optimum (U ∗ , V ∗ ) with radius ω as o n B2 (ω) := (U, V ) ∈ Rd1 ×r × Rd2 ×r d(U, V ; U ∗ , V ∗ ) ≤ ω . The next two theorems provide guarantees for the initialization phase and gradient iterations, respectively, of Algorithm 1. The proofs are given in Sections 6.1 and 6.2. Theorem 1 (Initialization). Consider the paired (U0 , V0 ) produced in the first phase of Algorithm 1. If α ≤ 1/(16κµr), we have √ √ p d(U0 , V0 ; U ∗ , V ∗ ) ≤ 28 καµr r σ1∗ . Theorem 2 (Convergence). Consider the second phase of Algorithm 1. Suppose we choose γ = 2 and η = c/σ1∗ for any c ≤ 1/36. There exist constants c1 , c2 such that when α ≤ c1 /(κ2 µr), given  p any (U0 , V0 ) ∈ B2 c2 σr∗ /κ , the iterates {(Ut , Vt )}∞ t=0 satisfy  c t 2 d2 (Ut , Vt ; U ∗ , V ∗ ) ≤ 1 − d (U0 , V0 ; U ∗ , V ∗ ). 8κ Therefore, using proper initialization and step size, the gradient iteration converges at a linear rate with a constant contraction factor 1 − O(1/κ). To obtain relative precision ε compared to the initial error, it suffices to perform √ O(κ log(1/ε)) iterations. Note that the step size is chosen according to 1/σ1∗ . When α . 1/(µ κr3 ), Theorem 1 and the inequality (11) together imply that |||U0 V0> − M ∗ |||op ≤ 12 σ1∗ . Hence we can set the step size as η = O(1/σ1 (U0 V0> )) using being the top singular value σ1 (U0 V0> ) of the matrix U0 V0> Combining Theorems 1 and 2 implies the following result, proved in Section 6.3, that provides an overall guarantee for Algorithm 1. 7 Corollary 1. Suppose that ( α ≤ c min 1 1 √ 3, 2 µ κr µκ r ) for some constant c. Then for any ε ∈ (0, 1), Algorithm 1 with T = O(κ log(1/ε)) outputs a pair (UT , VT ) that satisfies |||UT VT> − M ∗ |||F ≤ ε · σr∗ . (12) Remark 1 (Time Complexity). For simplicity we assume d1 = d2 = d. Our sparse estimator (4) can be implemented by finding the top αd elements of each row and column via partial quick sort, which has running time O(d2 log(αd)). Performing rank-r SVD in the first phase and computing the gradient in each iteration both have complexity O(rd2 ).5 Algorithm 1 thus has total running time O(κrd2 log(1/ε)) for achieving an  accuracy as in (12). We note that when κ = O(1), our algorithm is orderwise faster than the AltProj algorithm in [22], which has running time O(r2 d2 log(1/ε)). Moreover, our algorithm only requires computing one singular value decomposition. Remark 2 (Robustness). Assuming κ = O(1), our algorithm can tolerate corruption at a sparsity √ √ level up to α = O(1/(µr r)). This is worse by a factor r compared to the optimal statistical guarantee 1/(µr) obtained in [12, 19, 22]. This looseness is a consequence of the condition for (U0 , V0 ) in Theorem 2. Nevertheless, when µr = O(1), our algorithm can tolerate a constant α fraction of corruptions. Notably, we show that gradient descent works in the case of α = O(1/(µr)) if initialization is sufficiently close. Accordingly, to provide an algorithm with optimal robustness, it is straightforward to use a more complicated initial method such as AltProj that can tolerate 1/(µr) fraction of corruptions while satisfying our initial condition. As gradient descent provides a simple and efficient way to successively refine the estimation, such combination still gives a better running time than prior arts. 4.2 Analysis of Algorithm 2 We now move to the guarantees of Algorithm 2. We show here that not only can we handle partial observations, but in fact subsampling the data in the fully observed case can significantly reduce the time complexity from the guarantees given in the previous section without sacrificing robustness. In particular, for smaller values of r, the complexity of Algorithm 2 has near linear dependence on the dimension d, instead of quadratic. In the following discussion, we let d := max{d1 , d2 }. The next two results, proved in Sections 6.4 and 6.5, control the quality of the initialization step, and then the gradient iterations. Theorem 3 (Initialization, partial observations). Suppose the observed indices Φ follow the Bernoulli model given in (2). Consider the pair (U0 , V0 ) produced in the first phase of Algorithm 2. There √ exist constants {ci }3i=1 such that for any  ∈ (0, r/(8c1 κ)), if  2  1 µr 1 log d α≤ , p ≥ c2 + , (13) 2 64κµr  α d1 ∧ d2 then we have 5 p √ √ p d(U0 , V0 ; U ∗ , V ∗ ) ≤ 51 καµr r σ1∗ + 7c1  κσ1∗ , In fact, it suffices to compute the best rank-r approximation with running time independent of the eigen gap. 8 with probability at least 1 − c3 d−1 . Theorem 4 (Convergence, partial observations). Suppose the observed indices Φ follow the Bernoulli model given in (2). Consider the second phase of Algorithm 2. Suppose we choose γ = 3, and η = c/(µrσ1∗ ) for a sufficiently small constant c. There exist constants {ci }4i=1 such that if α≤ κ4 µ2 r2 log d c1 , and p ≥ c 2 κ2 µr d1 ∧ d2 (14) then with probability at least 1 − c3 d−1 , the iterates {(Ut , Vt )}∞ t=0 satisfy 2 ∗ ∗ d (Ut , Vt ; U , V ) ≤  c 1− 64µrκ t d2 (U0 , V0 ; U ∗ , V ∗ )   p for all (U0 , V0 ) ∈ B2 c4 σr∗ /κ . The above result ensures linear convergence to (U ∗ , V ∗ ) (up to rotation) even when the gradient iterations are computed using partial observations. Note that setting p = 1 recovers Theorem 2 up to an additional factor µr in the contraction factor. For achieving ε relative accuracy, now we need O(µrκ log(1/ε)) iterations. Putting Theorems 3 and 4 together, we have the following overall guarantee, proved in Section 6.6, for Algorithm 2. Corollary 2. Suppose that ( α ≤ c min 1 1 √ 3, 2 µ κr µκ r ) , p ≥ c0 κ4 µ2 r2 log d , d1 ∧ d2 for some constants c, c0 . With probability at least 1 − O(d−1 ), for any ε ∈ (0, 1), Algorithm 2 with T = O(µrκ log(1/ε)) outputs a pair (UT , VT ) that satisfies |||UT VT> − M ∗ |||F ≤ ε · σr∗ . (15) This result shows that partial observations do not compromise robustness to sparse corruptions: as long as the observation probability p satisfies the condition in Corollary 2, Algorithm 2 enjoys the same robustness guarantees as the method using all entries. Below we provide two remarks on the sample and time complexity. For simplicity, we assume d1 = d2 = d, κ = O(1). Remark 3 (Sample complexity and matrix completion). Using the lower bound on p, it is sufficient to have O(µ2 r2 d log d) observed entries. In the special case S ∗ = 0, our partial observation model is equivalent to the model of exact matrix completion (see, e.g., [7]). We note that our sample complexity (i.e., observations needed) matches that of completing a positive semidefinite (PSD) matrix by gradient descent as shown in [11], and is better than the non-convex matrix completion algorithms in [20] and [25]. Accordingly, our result reveals the important fact that we can obtain robustness in matrix completion without deterioration of our statistical guarantees. It is known that that any algorithm for solving exact matrix completion must have sample size Ω(µrd log d) [7], and a nearly tight upper bound O(µrd log2 d) is obtained in [10] by convex relaxation. While sub-optimal by a factor µr, our algorithm is much faster than convex relaxation as shown below. 9 d(U, V ; U ∗ , V ∗ ) GD p = 1 GD p = 0.5 GD p = 0.2 10 3 Time(secs) d(U, V ; U ∗ , V ∗ ) 10 1 10 0 10 -1 10 2 10 1 10 -2 10 GD p = 1 GD p = 0.5 GD p = 0.2 GD p = 0.1 AltProj IALM 0 10 -1 10 -2 10 -3 0 2 4 6 8 10 Iteration count (a) 10 3 10 4 10 5 Dimension d (b) 0 20 40 60 80 100 Time(secs) (c) Figure 1. Results on synthetic data. (a) Plot of log estimation error versus number of iterations when using gradient descent (GD) with varying sub-sampling rate p. It is conducted using d = 5000, r = 10, α = 0.1. (b) Plot of running time of GD versus dimension d with r = 10, α = 0.1, p = 0.15r2 log d/d. The low-rank matrix is recovered in all instances, and the line has slope approximately one. (c) Plot of log estimation error versus running time for different algorithms in problem with d = 5000, r = 10, α = 0.1. Remark 4 (Time complexity). Our sparse estimator on the sparse matrix with support Φ can be implemented via partial quick sort with running time O(pd2 log(αpd)). Computing the gradient in each step involves the two terms in the objective function (9). Computing the gradient of the first term Le takes time O(r|Φ|), whereas the second term takes time O(r2 d). In the initialization phase, performing rank-r SVD on a sparse matrix with support Φ can be done in time O(r|Φ|). We conclude that when |Φ| = O(µ2 r2 d log d), Algorithm 2 achieves the error bound (15) with running time O(µ3 r4 d log d log(1/ε)). Therefore, in the small rank setting with r  d1/3 , even when full observations are given, it is better to use Algorithm 2 by subsampling the entries of Y . 5 Numerical Results In this section, we provide numerical results and compare the proposed algorithms with existing methods, including the inexact augmented lagrange multiplier (IALM) approach [21] for solving the convex relaxation (1) and the alternating projection (AltProj) algorithm proposed in [22]. All algorithms are implemented in MATLAB 6 , and the codes for existing algorithms are obtained from their authors. SVD computation in all algorithms uses the PROPACK library.7 We ran all simulations on a machine with Intel 32-core Xeon (E5-2699) 2.3GHz with 240GB RAM. 5.1 Synthetic Datasets We generate a squared data matrix Y = M ∗ + S ∗ ∈ Rd×d as follows. The low-rank part M ∗ is given by M ∗ = AB > , where A, B ∈ Rd×r have entries drawn independently from a zero mean Gaussian distribution with variance 1/d. For a given sparsity parameter α, each entry of S ∗ is set to be nonzero with probability α, and the values of the nonzero entries are sampled uniformly from [−5r/d, 5r/d]. The results are summarized in Figure 1. Figure 1a shows the convergence of our algorithms for different random instances with different sub-sampling rate p (note that p = 1 corresponds to 6 7 Our code is available at https://www.yixinyang.org/code/RPCA_GD.zip. http://sun.stanford.edu/~rmunk/PROPACK/ 10 Original GD (49.8s) GD, 20% sample (18.1s) AltProj (101.5s) IALM (434.6s) Original GD (87.3s) GD, 20% sample (43.4s) AltProj (283.0s) IALM (801.4s) Figure 2. Foreground-background separation in Restaurant and ShoppingMall videos. In each line, the leftmost image is an original frame, and the other four are the separated background obtained from our algorithms with p = 1, p = 0.2, AltProj, and IALM. The running time required by each algorithm is shown in the title. the fully observed setting). As predicted by Theorems 2 and 4, our gradient method converges geometrically with a contraction factor nearly independent of p. Figure 1b shows the running time of our algorithm with partially observed data. We see that the running time scales linearly with d, again consistent with the theory. We note that our algorithm is memory-efficient: in the large scale setting with d = 2×105 , using approximately 0.1% entries is sufficient for the successful recovery. In contrast, AltProj and IALM are designed to manipulate the entire matrix with d2 = 4×1010 entries, which is prohibitive on a single machine. Figure 1c compares our algorithms with AltProj and IALM by showing reconstruction error versus real running time. Our algorithm requires significantly less computation to achieve the same accuracy level, and using only a subset of the entries provides additional speed-up. 5.2 Foreground-background Separation We apply our method to the task of foreground-background (FB) separation in a video. We use two public benchmarks, the Restaurant and ShoppingMall datasets.8 Each dataset contains a video with static background. By vectorizing and stacking the frames as columns of a matrix Y , the FB separation problem can be cast as RPCA, where the static background corresponds to a low rank matrix M ∗ with identical columns, and the moving objects in the video can be modeled as sparse corruptions S ∗ . Figure 2 shows the output of different algorithms on two frames from the dataset. Our algorithms require significantly less running time than both AltProj and IALM. Moreover, even with 20% sub-sampling, our methods still appear to achieve better separation quality (note that in each of the frames our algorithms remove a person that is not identified by the other algorithms). Figure 3 shows recovery results for several more frames. Again, our algorithms enjoy better running time and outperform AltProj and IALM in separating persons from the background images. In Appendix B, we describe the detailed parameter settings for our algorithm. 8 http://perception.i2r.a-star.edu.sg/bk_model/bk_index.html 11 Original GD (49.8s) GD, 20% sample (18.1s) AltProj (101.5s) IALM (434.6s) Original GD (49.8s) GD, 20% sample (18.1s) AltProj (101.5s) IALM (434.6s) Original GD (87.3s) GD, 20% sample (43.4s) AltProj (283.0s) IALM (801.4s) Original GD (87.3s) GD, 20% sample (43.4s) AltProj (283.0s) IALM (801.4s) Figure 3. More results of FB separation in Restaurant and ShoppingMall videos. The leftmost images are original frames. The right four columns show the results from our algorithms with p = 1, p = 0.2, AltProj [22], and IALM [21]. The runtime of each algorithm is written in the title. 12 6 Proofs In this section we provide the proofs for our main theoretical results in Theorems 1–4 and Corollaries 1–2. 6.1 Proof of Theorem 1 Let Y := Y − Sinit . As Y = M ∗ + S ∗ , we have Y − M ∗ = S ∗ − Sinit . We obtain Y − M ∗ ∈ S2α because S ∗ , Sinit ∈ Sα . We claim that kY −M ∗ k∞ ≤ 2kM ∗ k∞ . Denote the support of S ∗ , Sinit by Ω∗ and Ω respectively. Since Y − M ∗ is supported on Ω ∪ Ω∗ , to prove the claim it suffices to consider the following three cases. • For (i, j) ∈ Ω∗ ∩ Ω, due to rule of sparse estimation, we have (S ∗ − Sinit )(i,j) = 0. ∗ | ≤ 2kM ∗ k . Otherwise, we have |Y ∗ • For (i, j) ∈ Ω∗ \ Ω, we must have |S(i,j) ∞ (i,j) | = |(S + M ∗ )(i,j) | > kM ∗ k∞ . So |Y(i,j) | is larger than any uncorrupted entries in its row and column. Since there are at most α fraction corruptions per row and column, we have Y(i,j) ∈ Ω, which violates the prior condition (i, j) ∈ Ω∗ \ Ω. ∗ , trivially we have |(S • For the last case (i, j) ∈ Ω \ Ω∗ , since (Sinit )(i,j) = M(i,j) init )(i,j) | ≤ ∗ kM k∞ . The following result, proved in Section 7.1, relates the operator norm of Y − M ∗ to its infinite norm. Lemma 1. For any matrix A ∈ Rd1 ×d2 that belongs to Sα given in (3), we have p |||A|||op ≤ α d1 d2 kAk∞ . We thus obtain |||Y − M ∗ |||op ≤ 2α p p d1 d2 kY − M ∗ k∞ ≤ 4α d1 d2 kM ∗ k∞ = 4αµrσ1∗ . In the last step, we use the fact that M ∗ satisfies the µ-incoherent condition, which leads to µr kM ∗ k∞ ≤ |||M ∗ |||op |||L∗ |||2,∞ |||R∗ |||2,∞ ≤ √ |||M ∗ |||op . d1 d2 (16) (17) We denote the i-th largest singular value of Y by σi . By Weyl’s theorem, we have |σi∗ − σi | ≤ ∗ |||Y − M ∗ |||op for all i ∈ [d1 ∧ d2 ]. Since σr+1 = 0, we have σr+1 ≤ |||Y − M ∗ |||op . Recall that U0 V0> is the best rank r approximation of Y . Accordingly, we have |||U0 V0> − M ∗ |||op ≤ |||U0 V0> − Y |||op + |||Y − M ∗ |||op = σr+1 + |||Y − M ∗ |||op ≤ 2|||Y − M ∗ |||op ≤ 8αµrσ1∗ . 1 Under condition αµr ≤ 16κ , we obtain |||U0 V0> − M ∗ |||op ≤ 21 σr∗ . Applying Lemma 5.14 in [26] (we provide it as Lemma 15 for the sake of completeness), we obtain d2 (U0 , V0 ; U ∗ , V ∗ ) ≤ √ 10r|||U0 V0> − M ∗ |||2op 2 |||U0 V0> − M ∗ |||2F ≤ . σr∗ σr∗ 2−1 Plugging the upper bound of |||U0 V0> − M ∗ |||op into the above inequality completes the proof. 13 6.2 Proof of Theorem 2 We essentially follow the general framework developed in [11] for analyzing the behaviors of gradient descent in factorized low-rank optimization. But it is worth to note that [11] only studies the symmetric and positive semidefinite setting, while we avoid such constraint on M ∗ . The techniques for analyzing general asymmetric matrix in factorized space is inspired by the recent work [26] on solving low-rank matrix equations. In our setting, the technical challenge is to verify the local descent condition of the loss function (8), which not only has a bilinear dependence on U and V , but also involves our sparse estimator (4). We begin with some notations. Define the equivalent set of optimal solution as o n (18) E(M ∗ ) := (A, B) ∈ Rd1 ×r × Rd2 ×r A = L∗ Σ∗1/2 Q, B = R∗ Σ∗1/2 Q, where Q ∈ Qr .  p  Given (U0 , V0 ) ∈ B2 c2 σr∗ /κ , by (11), we have |||U0 V0> − M ∗ |||op ≤ 21 σr∗ when c2 is sufficiently small. By Weyl’s theorem We thus have q q q q ∗ ∗ ∗ σ1 /2 ≤ |||U0 |||op ≤ 3σ1 /2, and σ1 /2 ≤ |||V0 |||op ≤ 3σ1∗ /2. As a result, for U, V constructed according to (7), we have E(M ∗ ) ⊆ U × V, and U ⊆ U, V ⊆ V, (19) where ( U := A ∈ Rd1 ×r r |||A|||2,∞ ≤ 3µrσ1∗ d1 ( ) , V := A ∈ Rd2 ×r r |||A|||2,∞ ≤ 3µrσ1∗ d2 ) . We let 1 (20) G(U, V ) := |||U > U − V > V |||2F . 8 For L(U, V ; S), we denote the gradient with respect to M by ∇M L(U, V ; S), i.e. ∇M L(U, V ; S) = UV > + S − Y . The local descent property is implied by combining the following two results, which are proved in Section 6.7 and 6.8 respectively. Lemma 2 (Local descent property of  L). Suppose U, V satisfy (19). For any (U, V ) ∈ (U × V) ∩ p B2 ( σ1∗ ), we let S = Tγα Y − U V > , where we choose γ = 2. Then we have that for (Uπ∗ , Vπ∗ ) ∈ argmin(A,B)∈E(M ∗ ) |||U − A|||2F + |||V − B|||2F and β > 0, > > 2 ∗ hh∇M L(U, V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆> V ii ≥ |||U V − Uπ ∗ Vπ ∗ |||F − νσ1 δ − 3 q σ1∗ δ 3 . Here ∆U := U − Uπ∗ , ∆V := V − Vπ∗ , δ := |||∆U |||2F + |||∆V |||2F , and ν := 9(β + 6)αµr + 5β −1 . √ Lemma 3 (Local descent property of G). For any (U, V ) ∈ B2 ( σr∗ ) and (Uπ∗ , Vπ∗ ) ∈ arg min (A,B)∈E(M ∗ ) 14 |||U − A|||2F + |||V − B|||2F , (21) we have hh∇U G(U, V ), U − Uπ∗ ii + hh∇V G(U, V ), V − Vπ∗ ii r σ1∗ δ 3 1 1 > 1 ∗ > 2 ≥ |||U U − V V |||F + σr δ − − |||U V > − Uπ∗ Vπ>∗ |||2F , 8 8 2 2 where δ is defined according to Lemma 2. As another key ingredient, we establish the following smoothness condition, proved in Section 6.9, which indicates that the Frobenius norm of gradient decreases as (U, V ) approaches the optimal manifold.   p Lemma 4 (Smoothness). For any (U, V ) ∈ B2 ( σ1∗ ), we let S = Tγα Y − U V > , where we choose γ = 2. We have that |||∇M L(U, V ; S)|||2F ≤ 6|||U V > − M ∗ |||2F , (22) and |||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤ 2σ1∗ |||U > U − V > V |||2F . (23) With the above results in hand, we are ready to prove Theorem 2. Proof of Theorem 2. We use shorthands δt := d2 (Ut , Vt ; U ∗ , V ∗ ), Lt := L(Ut , Vt ; St ), and Gt := G(Ut , Vt ). For (Ut , Vt ), let (Uπt ∗ , Vπt∗ ) := argmin(A,B)∈E(M ∗ ) |||Ut − A|||2F + |||Vt − B|||2F . Define ∆tU := Ut − Uπt ∗ , ∆tV := Vt − Vπt∗ . We prove Theorem 2 by induction. It is sufficient  topconsider  one step of the iteration. For any t ≥ 0, under the induction hypothesis (Ut , Vt ) ∈ B2 c2 σr∗ /κ . We find that δt+1 ≤ |||Ut+1 − Uπt ∗ |||2F + |||Vt+1 − Vπt∗ |||2F ≤ |||Ut − η∇U Lt − η∇U Gt − Uπt ∗ |||2F + |||Vt − η∇V Lt − η∇V Gt − Vπt∗ |||2F ≤ δt − 2η hh∇U Lt + ∇U Gt , Ut − Uπt ∗ ii −2η hh∇V Lt + ∇V Gt , Vt − Vπt∗ ii | {z } | {z } W1 2 W2 2 2 2 + η |||∇U Lt + ∇U Gt |||F +η |||∇V Lt + ∇V Gt |||F , | | {z } {z } W3 (24) W4 where the second step follows from the non-expansion property of projection onto U, V, which is implied by E(M ∗ ) ⊆ U × V shown in (19). Since ∇U Lt = [∇M Lt ] V and ∇V Lt = [∇M Lt ]> U , we have t t> hh∇U Lt , Ut − Uπt ∗ ii + hh∇V Lt , Vt − Vπt∗ ii = hh∇M Lt , Ut Vt> − Uπt ∗ Vπt> ∗ + ∆U ∆V ii. Combining Lemma 2 and 3, under condition δt < σr∗ , we have that 1 1 1 W1 + W2 ≥ |||Ut Vt> − M ∗ |||2F + |||Ut> Ut − Vt> Vt |||2F + σr∗ δt − νσ1∗ δt − 4 2 8 8 15 q σ1∗ δt3 . On the other hand, we have W3 + W4 ≤ 2|||∇U Lt |||2F + 2|||∇U Gt |||2F + 2|||∇V Lt |||2F + 2|||∇V Gt |||2F ≤ 2(|||Ut |||2op + |||Vt |||2op )|||∇M Lt |||2F + 2|||∇U Gt |||2F + 2|||∇V Gt |||2F ≤ 36σ1∗ |||Ut Vt> − M ∗ |||2F + 4σ1∗ |||Ut> Ut − Vt> Vt |||2F ,   p where the last step is implied by Lemma 4 and the assumption (Ut , Vt ) ∈ B2 c2 σr∗ /κ that leads p p to |||Ut |||op ≤ 3σ1∗ /2, |||Vt |||op ≤ 3σ1∗ /2. By the assumption η = c/σ1∗ for any constant c ≤ 1/36, we thus have q 1 ∗ 2 ∗ −2η(W1 + W2 ) + η (W3 + W4 ) ≤ − ησr δt + 2ηνσ1 δt + 8η σ1∗ δt3 . 4 In Lemma 2, choosingpβ = 320κ and assuming α . 1/(κ2 µr), we can have ν ≤ 1/(32κ). Assuming 1 ∗ δt . σr∗ /κ leads to 14 σ1∗ δt3 ≤ 16 σr δt . We thus obtain   ησr∗ δt+1 ≤ 1 − δt . (25) 8 Under initial condition δ0 . σr∗ /κ, we obtain that such condition holds for all t since estimation error decays geometrically after each iteration. Then applying (25) for all iterations, we conclude that for all t = 0, 1, . . .,   ησ ∗ t δt ≤ 1 − r δ0 . 8 6.3 Proof of Corollary 1 We need α . κ21µr due to the condition of Theorem 2. In order to ensure the linear convergence happens, it suffices to let the initial error shown in Theorem 1 be less than the corresponding condition in Theorem 2. Accordingly, we need p √ √ p 28 καµr r σ1∗ . σr∗ /κ, which leads to α . 1 √ 3. µ rκ Using the conclusion that gradient descent has linear convergence, choosing T = O(κ log(1/ε)), we have σ∗ d2 (UT , VT ; U ∗ , V ∗ ) ≤ ε2 d2 (U0 , V0 ; U ∗ , V ∗ ) . ε2 r . κ ∗ ∗ > Finally, applying the relationship between d(UT , VT ; U , V ) and |||UT VT − M ∗ |||F shown in (11), we complete the proof. 6.4 Proof of Theorem 3 Let Y := p1 (Y − Sinit ). Similar to the proof of Theorem 1, we first establish an upper bound on |||Y − M ∗ |||op . We have that 1 1 |||Y − M ∗ |||op ≤ |||Y − ΠΦ M ∗ |||op + ||| ΠΦ (M ∗ ) − M ∗ |||op . p p 16 (26) For the first term, we have Y − p1 ΠΦ M ∗ = p1 (ΠΦ (S ∗ ) − Sinit ) because Y = ΠΦ (M ∗ + S ∗ ). Lemma d 10 shows that under condition p & α(dlog , there are at most 32 pα-fraction nonzero entries in each 1 ∧d2 ) row and column of ΠΦ (S ∗ ) with high probability. Since Sinit ∈ S2pα , we have ΠΦ (S ∗ ) − Sinit ∈ S4pα . (27) kΠΦ (S ∗ ) − Sinit k∞ ≤ 2kM ∗ k∞ . (28) In addition, we prove below that Denote the support of ΠΦ (S ∗ ) and Sinit by Ω∗o and Ω. For (i, j) ∈ Ω∗o ∩ Ω and (i, j) ∈ Ω \ Ω∗o , we ∗ , respectively. To prove the claim, have (ΠΦ (S ∗ ) − Sinit )(i,j) = 0 and (ΠΦ (S ∗ ) − Sinit )(i,j) = −M(i,j) ∗ | < 2kM ∗ k . If this is not true, then we must have it remains to show that for (i, j) ∈ Ω∗o \ Ω, |S(i,j) ∞ ∗ |Y(i,j) | > kM k∞ . Accordingly, |Y(i,j) | is larger than the magnitude of any uncorrupted entries in its row and column. Note that on the support Φ, there are at most 32 pα corruptions per row and column, we have (i, j) ∈ Ω, which violates our prior condition (i, j) ∈ Ω∗o \ Ω. Using these two properties (27), (28) and applying Lemma 1, we have p p 1 |||Y − ΠΦ M ∗ |||op ≤ 4α d1 d2 kΠΦ (S ∗ ) − Sinit k∞ ≤ 8α d1 d2 kM ∗ k∞ ≤ 8αµrσ1∗ , (29) p where the last step follow from (17). For the second term in (26), we use the following lemma proved in [10]. Lemma 5 (Lemma 2 in [10]). Suppose A ∈ Rd1 ×d2 is a fixed matrix. We let d := max{d1 , d2 }. There exists a constant c such that with probability at least 1 − O(d−1 ), s ! n o 1 log d log d > ||| ΠΦ (A) − A|||op ≤ c kAk∞ + max |||A|||2,∞ , |||A |||2,∞ . p p p Given the SVD M ∗ = L∗ ΣR∗> , for any i ∈ [d1 ], we have ∗ kM(i,·) k2 = kL∗(i,·) ΣR∗> k2 ≤ σ1∗ kL∗(i,·) k2 ≤ σ1∗ r µr . d1 We can bound |||M ∗> |||2,∞ similarly. Lemma 5 leads to 1 log d µr √ ||| ΠΦ (M ∗ ) − M ∗ |||op ≤ c0 σ ∗ + c0 p p d1 d2 1 s log d p r √ µr σ1∗ ≤ c0 σ1∗ / r d1 ∧ d2 (30) 2 log d under condition p ≥ 4µr 2 (d ∧d ) . 1 2 Putting (29) and (30) together, we obtain √ |||Y − M ∗ |||op ≤ 8αµrσ1∗ + c0 σ1∗ / r. Then using the fact that U0 V0> is the best rank r approximation of Y and applying Wely’s theorem (see the proof of Theorem 1 for a detailed argument), we have |||U0 V0> − M ∗ |||op ≤ |||U0 V0> − Y |||op + |||Y − M ∗ |||op √ ≤ 2|||Y − M ∗ |||op ≤ 16αµrσ1∗ + 2c0 σ1∗ / r 17 √ Under our assumptions, we have 16αµrσ1∗ + 2c0 σ1∗ / r ≤ 12 σr∗ . Accordingly, Lemma 15 gives d2 (U0 , V0 ; U ∗ , V ∗ ) ≤ √ 10r|||U0 V0> − M ∗ |||2op 2 |||U0 V0> − M ∗ |||2F ≤ . σr∗ σr∗ 2−1 We complete the proof by combining the above two inequalities. 6.5 Proof of Theorem 4 In this section, we turn to prove Theorem 4. Similar to the proof of Theorem 2, we rely on establishing the local descent and smoothness conditions. Compared to the full observation setting, e V ) := 1 |||U > U − V > V |||2 merely we replace L by Le given in (6), while the regularization term G(U, F 64 differs from G(U, V ) given in (20) by a constant factor. It is thus sufficient to analyze the properties e of L. Define E(M ∗ ) according to (18). Under the initial condition, we still have E(M ∗ ) ⊆ U × V, and U ⊆ U, V ⊆ V. (31) We prove the next two lemmas in Section 6.10 and 6.11 respectively. In both lemmas, for any (U, V ) ∈ U × V, we use shorthands (Uπ∗ , Vπ∗ ) = arg min (A,B)∈E(M ∗ ) |||U − A|||2F + |||V − B|||2F , ∆U := U − Uπ∗ , ∆V := V − Vπ∗ , and δ := |||∆U |||2F + |||∆V |||2F . Recall that d := max{d1 , d2 }. e Suppose U, V satisfy (31). Suppose we let Lemma 6 (Local descent property of L). i h  S = Tγpα ΠΦ Y − U V > , √ where we choose γ = 3. For any β > 0 and  ∈ (0, 41 ), we define ν := (14β +81)αµr +26 +18β −1 . There exist constants {ci }2i=1 such that if  2 2  µ r 1 log d p ≥ c1 + +1 , (32) 2  α d1 ∧ d2 then with probability at least 1 − c2 d−1 , q 3 > > 2 ∗ e V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆> ∗ V ∗ ||| − νσ δ − 10 hh∇M L(U, ii ≥ |||U V − U σ1∗ δ 3 − 2δ 2 (33) π V π F 1 16 p ∗ for all (U, V ) ∈ (U × V) ∩ B2 σ1 .   e Suppose U, V satisfy (31). Suppose we let S = Tγαp ΠΦ Y − U V > Lemma 7 (Smoothness of L). for γ = 3. There exist constants {ci }3i=1 such that for any  ∈ (0, 41 ), when p satisfies condition p (32), with probability at least 1 − c2 d−1 , we have that for all (U, V ) ∈ (U × V) ∩ B2 ( σ1∗ ), i h e V ; S)|||2 + |||∇V L(U, e V ; S)|||2 ≤ c3 µrσ ∗ |||U V > − Uπ∗ V >∗ |||2 + µrσ ∗ δ(δ + σ ∗ ) . (34) |||∇U L(U, F 1 π F 1 1 F 18 In the remainder of this section, we condition on the events in Lemma 6 and 7. Now we are ready to prove Theorem 4. Proof of Theorem 4. We essentially follow the process for proving Theorem 2. Let the following shorthands be defined in the same fashion: δt , (Uπt ∗ , Vπt∗ ), (∆tU , ∆tV ), Let , Get . Here we show error decays in one step of iteration. The induction process is the same as the proof of Theorem 2, and is thus omitted. For any t ≥ 0, similar to (24) we have that δt+1 ≤ δt − 2η hh∇U Let + ∇U Get , Ut − Uπt ∗ ii −2η hh∇V Let + ∇V Get , Vt − Vπt∗ ii {z } | {z } | W1 W2 + η |||∇U Let + ∇U Get |||2F +η 2 |||∇V Let + ∇V Get |||2F . | | {z } {z } 2 W3 W4 We also have t t> hh∇U Let , Ut − Uπt ∗ ii + hh∇V Let , Vt − Vπt∗ ii = hh∇M Let , Ut Vt> − Uπt ∗ Vπt> ∗ + ∆U ∆V ii, which can be lower bounded by Lemma 6. Note that Ge differs from G by a constant, we can still leverage Lemma 3. Hence, we obtain that q 1 1 1 W1 + W2 ≥ |||Ut Vt> − M ∗ |||2F + |||Ut> Ut − Vt> Vt |||2F + σr∗ δt − νσ1∗ δt − 11 σ1∗ δt3 − 2δt2 . 8 64 64 On the other hand, we have W3 + W4 ≤ 2|||∇U Let |||2F + 2|||∇U Get |||2F + 2|||∇V Let |||2F + 2|||∇V Get |||2F h i ≤ c µrσ1∗ |||Ut Vt> − M ∗ |||2F + µrσ1∗ δt (δt + σ1∗ ) + σ1∗ |||Ut> Ut − Vt> Vt |||2F , where c is a constant, and the last step is implied by Lemma 4 and Lemma 7. By the assumption η = c0 /[µrσ1∗ ] for sufficiently small constant c0 , we thus have q 1 −2η(W1 + W2 ) + η 2 (W3 + W4 ) ≤ − ησr∗ δt + 2ηνσ1∗ δt + 22η σ1∗ δt3 + 4ηδt2 . 32 √ Recall that ν := (14β + 81)αµr + 26  + 18β −1 . By letting β = c1 κ,  = c2 /κ2 and assuming α ≤ c3 /(µrκ2 ) and δt ≤ c4 σr∗ /κ for some sufficiently small constants {ci }4i=1 , we can have −2η(W1 + 1 W2 ) + η 2 (W3 + W4 ) ≤ − 64 ησr∗ δt , which implies that   ησr∗ δt+1 ≤ 1 − δt , 64 and thus completes the proof. 6.6 Proof of Corollary 2 We need α . µκ12 r due to the condition of Theorem 4. Letting the initial error provided in Theorem 3 be less than the corresponding condition in Theorem 4, we have p p √ √ p 51 καµr r σ1∗ + 7c1  κσ1∗ . σr∗ /κ, 19 which leads to 1 1 α. √ , . √ . µ r3 κ3 κ3 Plugging the above two upper bounds into the second term in (13), it suffices to have p& κ3 µr2 log d . d1 ∧ d2 Comparing the above bound with the second term in (14) completes the proof. 6.7 Proof of Lemma 2 Let M := U V > . We observe that ∇M L(U, V ; S) = M + S − M ∗ − S ∗ . Plugging it back into the left hand side of (21), we obtain ∗ ∗ ∗ > hh∇M L(U, V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆> V ii = hhM + S − M − S , M − M + ∆U ∆V ii ≥ |||M − M ∗ |||2F − |hhS − S ∗ , M − M ∗ ii| − |hhM + S − M ∗ − S ∗ , ∆U ∆> V ii| . {z } | {z } | T1 (35) T2 Next we derive upper bounds of T1 and T2 respectively. Upper bound of T1 . We denote the support of S, S ∗ by Ω and Ω∗ respectively. Since S − S ∗ is supported on Ω∗ ∪ Ω, we have T1 ≤ |hhΠΩ (S − S ∗ ), M − M ∗ ii| + |hhΠΩ∗ \Ω (S − S ∗ ), M − M ∗ ii| . | {z } | {z } W1 W2 Recall that for any (i, j) ∈ Ω, we have S(i,j) = (M ∗ + S ∗ − M )(i,j) . Accordingly, we have W1 = |||ΠΩ (M − M ∗ )|||2F . (36) Now we turn to bound W2 . Since S(i,j) = 0 for any (i, j) ∈ Ω∗ \ Ω, we have W2 = |hhΠΩ∗ \Ω S ∗ , M − M ∗ ii|. Let ui be the i-th row of M − M ∗ , and vj be the j-th column of M − M ∗ . For any k ∈ [d2 ], we let (k) ui denote the element of ui that has the k-th largest magnitude. Similarly, for any k ∈ [d1 ], we (k) let vj denote the element of vj that has the k-th largest magnitude. From the design of sparse estimator (4), we have that for any (i, j) ∈ Ω∗ \ Ω, |(M ∗ + S ∗ − M )(i,j) | is either smaller than the γαd2 -th largest entry of the i-th row of M ∗ + S ∗ − M or smaller than the γαd1 -th largest entry of the j-th column of M ∗ + S ∗ − M . Note that S ∗ only contains at most α-fraction nonzero entries per row and column. As a result, |(M ∗ + S ∗ − M )(i,j) | has to be less than (γαd2 −αd2 ) the magnitude of ui (γαd1 −αd1 ) . Formally, we have for (i, j) ∈ Ω∗ \ Ω, n o (γαd −αd2 ) (γαd −αd1 ) |, |vj 1 | . |(M ∗ + S ∗ − M )(i,j) | ≤ max |ui 2 | {z } or vj bij 20 (37) Furthermore, we obtain (γαd2 −αd2 ) 2 b2ij ≤ |ui (γαd1 −αd1 ) 2 | + |vj | ≤ kvj k22 kui k22 + . (γ − 1)αd2 (γ − 1)αd1 (38) Meanwhile, for any (i, j) ∈ Ω∗ \ Ω, we have ∗ · (M − M ∗ )(i,j) | = |(M ∗ + S ∗ − M − M ∗ + M )(i,j) · (M − M ∗ )(i,j) | |S(i,j) ≤ |(M − M ∗ )(i,j) |2 + |(M ∗ + S ∗ − M )(i,j) | · |(M − M ∗ )(i,j) | ≤ |(M − M ∗ )(i,j) |2 + bij · |(M − M ∗ )(i,j) |   b2ij β |(M − M ∗ )(i,j) |2 + , ≤ 1+ 2 2β (39) where β in the last step can be any positive number. Combining (38) and (39) leads to X ∗ · (M − M ∗ )(i,j) | W2 ≤ |S(i,j) (i,j)∈Ω∗ \Ω   X b2ij β ≤ 1+ |||ΠΩ∗ \Ω (M − M ∗ )|||2F + 2 2β (i,j)∈Ω∗ \Ω    X  kui k2 kvj k22 β 1 ∗ 2 2 ≤ 1+ |||ΠΩ∗ \Ω (M − M )|||F + + 2 2β (γ − 1)αd2 (γ − 1)αd1 ∗ (i,j)∈Ω \Ω   β 1 ≤ 1+ |||ΠΩ∗ \Ω (M − M ∗ )|||2F + |||M − M ∗ |||2F . 2 β(γ − 1) (40) In the last step, we use  X (i,j)∈Ω∗ \Ω ≤ 1 1 kui k22 + kvj k22 d2 d1 X X i∈[d] j∈Ω∗(i,·) ≤α X i∈[d] 1 kui k22 + d2 kui k22 + α X  ≤  X 1 1 2 2 kui k2 + kvj k2 d2 d1 ∗ (i,j)∈Ω X X j∈[d] i∈Ω∗(·,j) 1 kvj k22 d1 kvj k22 = 2α|||M − M ∗ |||2F . (41) j∈[d] We introduce shorthand δ := |||∆U |||2F + |||∆V |||2F . We prove the following inequality in the end of this section. p (42) |||M − M ∗ |||F ≤ 5σ1∗ δ. Combining (36), (40) and (42) leads to   β 5σ1∗ δ T1 ≤ |||ΠΩ (M − M ∗ )|||2F + 1 + |||ΠΩ∗ \Ω (M − M ∗ )|||2F + 2 β(γ − 1) ∗ 5σ1 δ ≤ 9(2γ + β + 2)αµrσ1∗ δ + , β(γ − 1) (43) where the last step follows from Lemma 14 by noticing that ΠΩ (M − M ∗ ) has at most γα-fraction nonzero entries per row and column. 21 Upper bound of T2 . To ease notation, we let C := M + S − M ∗ − S ∗ . We observe that C is supported on Ωc , we have > T2 ≤ |hhΠΩ∗c ∩Ωc (M − M ∗ ), ∆U ∆> V ii| + |hhΠΩ∗ ∩Ωc C, ∆U ∆V ii| . | {z } | {z } W3 W4 By Cauchy-Swartz inequality, we have ∗ W3 ≤ |||ΠΩ∗c ∩Ωc (M − M ∗ )|||F |||∆U ∆> V |||F ≤ |||M − M |||F |||∆U |||F |||∆V |||F ≤ q 5σ1∗ δ 3 /2, where the last step follows from (42) and |||∆U |||F |||∆V |||F ≤ δ/2. It remains to bound W4 . By Cauchy-Swartz inequality, we have ∗ ∗ > W4 ≤ |||ΠΩ∗ ∩Ωc C|||F |||∆U ∆> V |||F ≤ |||ΠΩ∗ ∩Ωc (M + S − M )|||F |||∆U ∆V |||F  1/2 s X 2 2 X (a) (b) kvj k2  kui k2 ≤ b2ij |||∆U |||F |||∆V |||F ≤  + |||∆U |||F |||∆V |||F . (γ − 1)αd2 (γ − 1)αd1 (i,j)∈Ω∗ \Ω (i,j)∈Ω∗ \Ω s r (c) 2 5σ1∗ δ 3 ∗ |||M − M |||F |||∆U |||F |||∆V |||F ≤ , ≤ γ−1 2(γ − 1) where step (a) is from (37), step (b) follows from (38), and step (c) follows from (41). Combining the upper bounds of W3 and W4 , we obtain s q 5σ1∗ δ 3 T2 ≤ 5σ1∗ δ 3 /2 + . (44) 2(γ − 1) Combining pieces. Now we choose γ = 2. Then inequality (43) implies that T1 ≤ [9(β + 6)αµr + 5β −1 ]σ1∗ δ. Inequality (44) then implies that q T2 ≤ 3 σ1∗ δ 3 . Plugging the above two inequalities into (35) completes the proof. Proof of inequality (42). We find that hp i2 σ1∗ (|||∆V |||F + |||∆U |||F ) + |||∆U |||F |||∆V |||F  2 p 1p ∗ 1p ∗ ∗ ≤ σ1 (|||∆V |||F + |||∆U |||F ) + σ1 |||∆U |||F + σ1 |||∆V |||F 2 2 |||M − M ∗ |||2F ≤ ≤ 5σ1∗ (|||∆U |||2F + |||∆V |||2F ), where the first step follows from the upper bound of |||M p − M ∗ |||F shown in Lemma 12, and the second step follows from the assumption |||∆U |||F , |||∆V |||F ≤ σ1∗ . 22 6.8 Proof of Lemma 3 We first observe that 1 1 ∇U G(U, V ) = U (U > U − V > V ), ∇V G(U, V ) = V (V > V − U > U ), 2 2 Therefore, we obtain hh∇U G(U, V ), U − Uπ∗ ii + hh∇V G(U, V ), V − Vπ∗ ii 1 = hhU > U − V > V , U > U − V > V − U > Uπ∗ + V > Vπ∗ ii 2 1 1 > = |||U U − V > V |||2F + hhU > U − V > V , U > U − V > V − 2U > Uπ∗ + 2V > Vπ∗ ii 4 4 1 > 1 > 2 > = |||U U − V V |||F + hhU > U − V > V , U > U − V > V − 2∆> U Uπ ∗ + 2∆V Vπ ∗ ii, 4 4 (45) > > > > > where the last step follows from ∆> U Uπ ∗ − ∆V Vπ ∗ = U Uπ ∗ − V Vπ ∗ since Uπ ∗ Uπ ∗ = Vπ ∗ Vπ ∗ . Note that U > U − V > V = (Uπ∗ + ∆U )> (Uπ∗ + ∆U ) − (Vπ∗ + ∆V )> (Vπ∗ + ∆V ) > > > > = Uπ>∗ ∆U + ∆> U Uπ ∗ + ∆U ∆U − Vπ ∗ ∆V − ∆V Vπ ∗ − ∆V ∆V , where we use Uπ>∗ Uπ∗ = Vπ>∗ Vπ∗ again in the last step. Furthermore, since U > U −V > V is symmetric, we have > > hhU > U − V > V , Uπ>∗ ∆U + ∆> U Uπ ∗ − Vπ ∗ ∆V − ∆V Vπ ∗ ii > = hhU > U − V > V , 2∆> U Uπ ∗ − 2∆V Vπ ∗ ii. Using these arguments, for the second term in (45), denoted by T2 , we have 1 > T2 = hhU > U − V > V , ∆> U ∆U − ∆V ∆V ii. 4 Furthermore, we have > > > 2 2 4T2 ≤ |hhU > U − V > V , ∆> U ∆U − ∆V ∆V ii| ≤ |||U U − V V |||F |||∆U |||F + |||∆V |||F   ≤ |||U > U − Uπ>∗ Uπ∗ |||F + |||V > V − Vπ>∗ Vπ∗ |||F δ q ≤ 2 (|||Uπ∗ |||op |||∆U |||F + |||Vπ∗ |||op |||∆V |||F ) δ ≤ 2 2σ1∗ δ 3 .  (46) It remains to find a lower bound of |||U > U − V > V |||F . The following inequality, which we turn to prove later, is true: |||U > U − V > V |||2F ≥ |||U U > − Uπ∗ Uπ>∗ |||2F + |||V V > − Vπ∗ Vπ>∗ |||2F − 2|||U V > − Uπ∗ Vπ>∗ |||2F . (47) Proceeding with the first term in (45) by using (47), we get 1 > 1 1 |||U U − V > V |||2F = |||U > U − V > V |||2F + |||U > U − V > V |||2F 4 8 8 1 > 1 1 1 ≥ |||U U − V > V |||2F + |||U U > − Uπ∗ Uπ>∗ |||2F + |||V V > − Vπ∗ Vπ>∗ |||2F − |||U V > − Uπ∗ Vπ>∗ |||2F 8 8 8 4 1 > 1 1 > 2 > > 2 > > 2 = |||U U − V V |||F + |||F F − Fπ∗ Fπ∗ |||F − |||U V − Uπ∗ Vπ∗ |||F , (48) 8 8 2 23 where we let     U Uπ∗ ∗ F := , Fπ := . V Vπ ∗ Introduce ∆F := F − Fπ∗ . Recall that δ := |||∆U |||2F + |||∆V |||2F . Equivalently δ = |||∆F |||2F . We have > > |||F F > − Fπ∗ Fπ>∗ |||F = |||∆F Fπ∗ + Fπ∗ ∆> F + ∆F ∆F |||F > 2 > > ≥ |||∆F Fπ∗ + Fπ∗ ∆> F |||F − |||∆F |||F = |||∆F Fπ∗ + Fπ ∗ ∆F |||F − δ. For the first term, we have > 2 > 2 > > |||∆F Fπ∗ + Fπ∗ ∆> F |||F = 2|||∆F Fπ∗ |||F + hh∆F Fπ∗ , Fπ ∗ ∆F ii > ∗ 2 > > ≥ 2σr (Fπ∗ )2 |||∆F |||2F + hh∆F Fπ∗ , F π ∗ ∆> F ii = 4σr |||∆F |||F + hh∆F Fπ∗ , Fπ ∗ ∆F ii. For the cross term, by the following result, proved in [11] (we also provide a proof in Section 7.5 for > , F ∗ ∆> ii ≥ 0. the sake of completeness), we have hh∆F Fπ∗ π F √ ∗ Lemma 8. When |||F − Fπ∗ |||op < 2σr , we have that ∆> F Fπ ∗ is symmetric. p p Accordingly, we have |||F F > −Fπ∗ Fπ>∗ |||F ≥ 2 σr∗ δ −δ ≥ σr∗ δ under condition δ ≤ σr∗ . Plugging this lower bound into (48), we obtain 1 > 1 1 1 |||U U − V > V |||2F ≥ |||U > U − V > V |||2F + σr∗ δ − |||U V > − Uπ∗ Vπ>∗ |||2F . 4 8 8 2 Putting (45), (46) and the above inequality together completes the proof. Proof of inequality (47). For the term on the left hand side of (47), it is easy to check that |||U > U − V > V |||2F = |||U U > |||2F + |||V V > |||2F − 2|||U V > |||2F . (49) The property Uπ>∗ Uπ∗ = Vπ>∗ Vπ∗ implies that |||Uπ∗ Uπ>∗ |||F = |||Vπ∗ Vπ>∗ |||F = |||Uπ∗ Vπ>∗ |||F . Therefore, expanding those quadratic terms on the right hand side of (47), one can show that it is equal to |||U U > |||2F + |||V V > |||2F − 2|||Uπ>∗ U |||2F − 2|||Vπ>∗ V |||2F + 4hhUπ>∗ U , Vπ>∗ V ii − 2|||U V > |||2F . Comparing inequalities (49) and (50), it thus remains to show that −2|||Uπ>∗ U |||2F − 2|||Vπ>∗ V |||2F + 4hhUπ>∗ U , Vπ>∗ V ii ≤ 0. Equivalently, we always have |||Uπ>∗ U − Vπ>∗ V |||2F ≥ 0, and thus prove (47). 6.9 Proof of Lemma 4 First, we turn to prove (23). As 1 1 ∇U G(U, V ) = U (U > U − V > V ), ∇V G(U, V ) = V (V > V − U > U ), 2 2 we have |||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤  1 |||U |||2op + |||V |||2op |||U > U − V > V |||2F . 4 24 (50) p p As (U, V ) p ∈ B2 ( σ1∗ ), we thus have |||U |||op ≤ |||Uπ∗ |||op + |||Uπ∗ − U |||op ≤ 2 σ1∗ , and similarly |||V |||op ≤ 2 σ1∗ . We obtain |||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤ 2σ1∗ |||U > U − V > V |||2F . Now we turn to prove (22). We observe that ∇M L(U, V ; S) = M + S − M ∗ − S ∗ , where we let M := U V > . We denote the support of S, S ∗ by Ω and Ω∗ respectively. Based on the sparse estimator (4) for computing S, ∇M L(U, V ; S) is only supported on Ωc . We thus have |||∇M L(U, V ; S)|||F ≤ |||ΠΩc \Ω∗ (M − M ∗ )|||F + |||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||F ≤ |||M − M ∗ |||F + |||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||F . It remains to upper bound the second term on the right hand side. Following (37) and (38), we have |||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||2F ≤ X (i,j)∈Ωc ∩Ω∗ kvj k22 2 kui k22 + ≤ |||M − M ∗ |||2F , (γ − 1)αd2 (γ − 1)αd1 γ−1 where the last step is proved in (41). By choosing γ = 2, we thus conclude that √ |||∇M L(U, V ; S)|||F ≤ (1 + 2)|||M − M ∗ |||F . 6.10 Proof of Lemma 6 We denote the support of ΠΦ (S ∗ ), S by Ω∗o and Ω. We always have Ω∗o ⊆ Φ and Ω ⊆ Φ. In the sequel, we establish several results that characterize the properties of Φ. The first result, proved in Section 7.2, shows that the Frobenius norm of any incoherent matrix whose row (or column) space are equal to L∗ (or R∗ ) is well preserved under partial observations supported on Φ. Lemma 9. Suppose M ∗ ∈ Rd1 ×d2 is a rank r and µ-incoherent matrix that has SVD M ∗ = log d L∗ Σ∗ R∗> . Then there exists an absolute constant c such that for any  ∈ (0, 1), if p ≥ c 2µr , (d1 ∧d2 ) then with probability at least 1 − 2d−3 , we have that for all A ∈ Rd2 ×r , B ∈ Rd1 ×r ,   (1 − )|||L∗ A> + BR∗> |||2F ≤ p−1 |||ΠΦ L∗ A> + BR∗> |||2F ≤ (1 + )|||L∗ A> + BR∗> |||2F . We need the next result, proved in Section 7.3, to control the number of nonzero entries per row and column in Ω∗o and Φ. Lemma 10. If p ≥ 56 log d 3 α(d1 ∧d2 ) , 1 |Φ(i,·) | − pd2 ≤ pd2 , 2 then with probability at least 1 − 6d−1 , we have 1 3 3 |Φ(·,j) | − pd1 ≤ pd1 , |Ω∗o(i,·) | ≤ αpd2 , |Ω∗o(·,j) | ≤ αpd1 , 2 2 2 for all i ∈ [d1 ] and j ∈ [d2 ]. 25 The next lemma, proved in Section 7.4, can be used to control the projection of small matrices to Φ. 2 2 log d Lemma 11. There exists constant c such that for any  ∈ (0, 1), if p ≥ c µ2 (dr 1 ∧d , then with 2) probability p at least 1 − O(d−1 ),pfor all matrices Z ∈ Rd1 ×d2 , U ∈ Rd1 ×r and V ∈ Rd2 ×r that satisfy |||U |||2,∞ ≤ µr/d1 ,|||V |||2,∞ ≤ µr/d2 , we have p−1 |||ΠΦ (U V > )|||2F ≤ |||U |||2F |||V |||2F + |||U |||F |||V |||F ; (51) p−1 |||ΠΦ (Z)V |||2F ≤ 2µr|||ΠΦ (Z)|||2F ; (52) p−1 |||U > ΠΦ (Z)|||2F ≤ 2µr|||ΠΦ (Z)|||2F . (53) In the remainder of this section, we condition on the events in Lemmas 9, 10 and 11. Now we are ready to prove Lemma 6. Proof of Lemma 6. Using shorthand M := U V > , we have e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ ) . ∇M L(U, Plugging it back into the left hand side of (21), we obtain e V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆> hh∇M L(U, V ii 1 = hhΠΦ (M + S − M ∗ − S ∗ ), M − M ∗ + ∆U ∆> V ii p 1 1 1 ≥ |||ΠΦ (M − M ∗ ) |||2F − |hhΠΦ (S − S ∗ ), M − M ∗ ii| − |hhΠΦ (M + S − M ∗ − S ∗ ), ∆U ∆> V ii| . p p p | {z } | {z } | {z } T1 T2 T3 (54) Next we derive lower bounds of T1 , upper bounds of T2 and T3 respectively. > > Lower bound of T1 . We observe that M −M ∗ = Uπ∗∗ ∆> V +∆U Vπ ∗ +∆U ∆V . By triangle inequality, we have > > |||ΠΦ (M − M ∗ )|||F ≥ |||ΠΦ (Uπ∗ ∆> V + ∆U Vπ ∗ )|||F − |||ΠΦ (∆U ∆V )|||F . Note that when c ≥ a − b for a, b ≥ 0, we always have c2 ≥ 21 a2 − b2 . We thus have T1 ≥ ≥ ≥ ≥ ≥ 1 1 > 2 > 2 |||ΠΦ (Uπ∗ ∆> V + ∆U Vπ ∗ )|||F − |||ΠΦ (∆U ∆V )|||F 2p p 1 1 > 2 > 2 (1 − )|||Uπ∗ ∆> V + ∆U Vπ ∗ |||F − |||ΠΦ (∆U ∆V )|||F 2 p 1 2 2 2 ∗ (1 − )|||M − M ∗ − ∆U ∆> V |||F − |||∆U |||F |||∆V |||F − 9σ1 |||∆U |||F |||∆V |||F 2 1 1 (1 − )|||M − M ∗ |||2F − (1 − )|||∆U ∆V |||2F − |||∆U |||2F |||∆V |||2F − 9σ1∗ |||∆U |||F |||∆V |||F 4 2 1 ∗ 2 (1 − )|||M − M |||F − 2δ 2 − 5σ1∗ δ. 4 where the second step is implied by Lemma 9, the third p step follows from (51) in Lemma 11 by p ∗ noticing that |||∆U |||2,∞ ≤ 3 µrσ1 /d1 and |||∆V |||2,∞ ≤ 3 µrσ1∗ /d1 , which is further implied by (31). 26 Upper bound of T2 . Since S − S ∗ is supported on Ω∗0 ∪ Ω, we have pT2 ≤ |hhΠΩ∗o \Ω (S ∗ ), ΠΩ∗o \Ω (M − M ∗ )ii| + |hhΠΩ (S − S ∗ ), ΠΩ (M − M ∗ )ii|. (55) For any (i, j) ∈ Ω, we have (S − S ∗ )(i,j) = (M ∗ − M )(i,j) . Therefore, for the second term on the right hand side, we have |hhΠΩ (S − S ∗ ), ΠΩ (M − M ∗ )ii| ≤ |||ΠΩ (M − M ∗ )|||2F ≤ 18γpαµrσ1∗ δ, (56) where the last inequality follows from Lemma 14 and the fact that |Ω(i,·) | ≤ γpαd2 , |Ω(·,j) | ≤ γpαd1 for all i ∈ [d1 ], j ∈ [d2 ]. We denote the i-th row of ΠΦ (M − M ∗ ) by ui , and we denote the j-th column of ΠΦ (M − M ∗ ) (k) (k) by vj . We let ui denote the element of ui that has the k-th largest magnitude. We let vj denote the element of vj that has the k-th largest magnitude. For the first term on the right hand side of (55), we first observe that for (i, j) ∈ Ω∗o \ Ω, |(M ∗ + ∗ S − M )(i,j) | is either less than the γpαd2 -th largest element in the i-th row of ΠΦ (M ∗ + S ∗ − M ), or less than γpαd1 -th largest element in the j-th row of ΠΦ (M ∗ + S ∗ − M ). Based on Lemma 10, ΠΦ (S ∗ ) has at most 3pαd2 /2 nonzero entries per row and at most 3pαd1 /2 nonzero entries per column. Therefore, we have n o ((γ−1.5)pαd2 ) ((γ−1.5)pαd1 ) |(M ∗ + S ∗ − M )(i,j) | ≤ max |ui |, |vj | . (57) In addition, we observe that |hhΠΩ∗o \Ω (S ∗ ), ΠΩ∗o \Ω (M − M ∗ )ii| X ≤ |(M ∗ + S ∗ − M )(i,j) ||(M ∗ − M )(i,j) | + |(M ∗ − M )(i,j) |2 (i,j)∈Ω∗o \Ω  ≤ β 1+ 2  |||ΠΩ∗o (M ∗ − M )|||2F + ≤ (27 + 14β)pαµrσ1∗ δ + 1 2β 1 2β X |(M ∗ + S ∗ − M )(i,j) |2 , (i,j)∈Ω∗o \Ω X |(M ∗ + S ∗ − M )(i,j) |2 , (58) (i,j)∈Ω∗o \Ω where the second step holds for any β > 0 and the last step follows from Lemma 14 under the size constraints of Ω∗o shown in Lemma 10. For the second term in (58), using (57), we have X X ((γ−1.5)pαd2 ) 2 ((γ−1.5)pαd1 ) 2 |(M ∗ + S ∗ − M )(i,j) |2 ≤ |ui | + |vj | (i,j)∈Ω∗o \Ω = X (i,j)∈Ω∗o X ((γ−1.5)pαd2 ) 2 |ui | i∈[d1 ] j∈Ω∗o(i,·) ≤ X i∈[d1 ] + X X ((γ−1.5)pαd1 ) 2 |vj | j∈[d2 ] i∈Ω∗o(·,j) X 1.5 1.5 3 kui k22 + kvj k22 ≤ |||ΠΦ (M − M ∗ )|||2F . γ − 1.5 γ − 1.5 γ − 1.5 (59) j∈[d2 ] Moreover, we have > 2 > 2 |||ΠΦ (M − M ∗ )|||2F ≤ 2|||ΠΦ (Uπ∗ ∆> V + ∆U Vπ ∗ )|||F + 2|||ΠΦ (∆U ∆V )|||F > 2 2 2 ∗ ≤ 2(1 + )p|||Uπ∗ ∆> V + ∆U Vπ ∗ |||F + 2p|||∆U |||F |||∆V |||F + 18pσ1 |||∆U |||F |||∆V |||F  ≤ 4(1 + )p |||Uπ∗ |||2op |||∆V |||2F + |||Vπ∗ |||2op |||∆U |||2F + 2p|||∆U |||2F |||∆V |||2F + 18pσ1∗ |||∆U |||F |||∆V |||F ≤ (4 + 13)pσ1∗ δ + 2pδ 2 , (60) 27 where the second step follows from Lemma 9 and inequality (51) in Lemma 11. Putting (55)-(60) together, we obtain T2 ≤ (18γ + 14β + 27)αµrσ1∗ δ + 3[(2 + 7)σ1∗ δ + δ 2 ] . β(γ − 1.5) Upper bound of T3 . By Cauchy-Schwarz inequality, we have pT3 ≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F |||ΠΦ (∆U ∆> V )|||F q ≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F p|||∆U |||2F |||∆V |||2F + 9pσ1∗ |||∆U |||F |||∆V |||F q ≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F pδ 2 + 5pσ1∗ δ. where we use (51) in Lemma 11 in the second step. We observe that ΠΦ (M − M ∗ + S − S ∗ ) is supported on Φ \ Ω. Therefore, we have |||ΠΦ (M − M ∗ + S − S ∗ )|||F ≤ |||ΠΦ∩Ωc ∩Φ∗c (M − M ∗ )|||F + |||ΠΦ∩Ωc ∩Φ∗ (M − M ∗ − S ∗ )|||F ≤ |||ΠΦ (M − M ∗ )|||F + |||ΠΩc ∩Φ∗ (M − M ∗ − S ∗ )|||F r 3 ∗ ≤ |||ΠΦ (M − M )|||F + |||ΠΦ (M − M ∗ )|||F γ − 1.5 r  q 3 (4 + 13)pσ1∗ δ + 2pδ 2 , ≤ 1+ γ − 1.5 where the third step follows from (59), and the last step is from (60). Under assumptions γ = 3,  ≤ 1/4 and δ ≤ σ1∗ , we have q q q √ T3 ≤ 3 9σ1∗ δ + 2δ 2 δ 2 + 5σ1∗ δ ≤ 10 σ1∗ δ 3 + 23 σ1∗ δ. Combining pieces. Under the aforementioned assumptions, putting all pieces together leads to e V ; S), U V > − Uπ∗ V >∗ + ∆U ∆> ii hh∇M L(U, π V   q √ 3 18 ∗ 2 ∗ ≥ |||M − M |||F − (14β + 81)αµrσ1 δ − 26  + σ1∗ δ − 10 σ1∗ δ 3 − 2δ 2 . 16 β 6.11 Proof of Lemma 7 Let M := U V > . We find that e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ ) V, ∇U L(U, e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ )> U. ∇V L(U, Conditioning on the event in Lemma 11, since (U, V ) ∈ U × V, inequalities (52) and (53) imply that e V ; S)|||2F + |||∇V L(U, e V ; S)|||2F ≤ 12 µrσ1∗ |||ΠΦ (M + S − M ∗ − S ∗ ) |||2F . |||∇U L(U, p 28 It remains to bound the term |||ΠΦ (M + S − M ∗ − S ∗ ) |||2F . Let Ω∗o and Ω be the support of ΠΦ (S ∗ ) and S respectively. We observe that |||ΠΦ (M + S − M ∗ − S ∗ ) |||2F = |||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F + |||ΠΦ∗c ∩Ωc ∩Φ (M − M ∗ ) |||2F ≤ |||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F + |||ΠΦ (M − M ∗ ) |||2F . In the proof of Lemma 6, it is shown in (59) that |||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F ≤ 3 |||ΠΦ (M − M ∗ )|||2F . γ − 1.5 Moreover, following (60), we have that > 2 2 2 ∗ |||ΠΦ (M − M ∗ )|||2F ≤ 2(1 + )p|||Uπ∗ ∆> V + ∆U Vπ ∗ |||F + 2p|||∆U |||F |||∆V |||F + 18pσ1 |||∆U |||F |||∆V |||F ≤ 4(1 + )p|||M − M ∗ |||2F + (6 + 4)p|||∆U |||2F |||∆V |||2F + 18pσ1∗ |||∆U |||F |||∆V |||F ≤ 4(1 + )p|||M − M ∗ |||2F + (6 + 4)pδ 2 + 9pσ1∗ δ. We thus finish proving our conclusion by combining all pieces and noticing that γ = 3 and  ≤ 1/4. 7 Proofs for Technical Lemmas In this section, we prove several technical lemmas that are used in the proofs of our main theorems. 7.1 Proof of Lemma 1 We observe that |||A|||op = sup sup x> Ay. x∈Sd1 −1 y∈Sd2 −1 We denote the support of A by Ω. For any x ∈ Rd1 , y ∈ Rd2 and β > 0, we have X 1 kAk∞ (β −1 x2i + βyj2 ) 2 (i,j)∈Ω (i,j)∈Ω   X X X X 1 = kAk∞  β −1 x2i + βyj2  2 x> Ay = X xi A(i,j) yj ≤ i j∈Ω(i,·) j i∈Ω(·,j)  1 ≤ kAk∞ αd2 β −1 kxk22 + αd1 βkyk22 . 2 It is thus implied that |||A|||op ≤ 21 α(β −1 d2 + βd1 )kAk∞ . Choosing β = 7.2 p d2 /d1 completes the proof. Proof of Lemma 9 We define a subspace K ⊆ Rd1 ×d2 as n o K := X X = L∗ A> + BR∗> for some A ∈ Rd2 ×r , B ∈ Rd1 ×r . 29 Let ΠK be Euclidean projection onto K. Then according to Theorem 4.1 in [6], under our assumptions, for all matrices X ∈ Rd1 ×d2 , inequality p−1 ||| (ΠK ΠΦ ΠK − pΠK ) X|||F ≤ |||X|||F (61) holds with probability at least 1 − 2d−3 . In our setting, by restricting X = L∗ A> + BR∗> , we have ΠK X = X. Therefore, (61) implies that |||ΠK ΠΦ X − pX|||F ≤ p|||X|||F . For |||ΠΦ X|||2F , we have |||ΠΦ X|||2F = hhΠΦ X, ΠΦ Xii = hhΠΦ X, Xii = hhΠK ΠΦ X, Xii ≤ |||ΠK ΠΦ X|||F |||X|||F ≤ p(1 + )|||X|||2F . On the other hand, we have |||ΠΦ X|||2F = hhΠK ΠΦ X, Xii = hhΠK ΠΦ X − pX + pX, Xii = p|||X|||2F − hhX, −ΠK ΠΦ X + pXii ≥ p|||X|||2F − |||X|||F |||ΠK ΠΦ X − pX|||F ≥ p(1 − )|||X|||2F . Combining the above two inequalities, we complete the proof. 7.3 Proof of Lemma 10 We observe that |Φ(i,·) | is a summation of d2 i.i.d. binary random variables with mean p and variance p(1 − p). By Bernstein’s inequality, for any i ∈ [d1 ], !     − 21 (pd2 /2)2 1 3 Pr |Φ(i,·) | − pd2 ≥ pd2 ≤ 2 exp − ≤ 2 exp − pd 2 . 2 28 d2 p(1 − p) + 13 (pd2 /2) By probabilistic union bound, we have " Pr sup |Φ(i,·) | − pd2 i∈[d1 ] #   1 3 ≥ pd2 ≤ 2d1 exp − pd2 ≤ 2d−1 , 2 28 log d where the last inequality holds by assuming p ≥ 56 3 d2 . The term |Ω∗o(i,·) | is a summation of at most αd2 i.i.d. binary random variables with mean p and variance p(1 − p). Again, applying Bernstein’s inequality leads to     h i 1 3 ∗ ∗ Pr |Ωo(i,·) | − E |Ωo(i,·) | ≥ pαd2 ≤ exp − pαd2 . 2 28 Accordingly, by the assumption p ≥ " 56 log d 3 αd2 , we obtain #   3 1 ∗ Pr sup |Ωo(i,·) | − pk ≥ pk ≤ d1 exp − pαd2 ≤ d−1 . 2 28 i∈[d1 ] The proofs for |Φ(·,j) | and |Ω∗o(·,j) | follow the same idea. 30 7.4 Proof of Lemma 11 d d1 ×d2 , we According to Lemma 3.2 in [8], under condition p ≥ c1 µd1log ∧d2 , for any fixed matrix A ∈ R have s d log d |||A − p−1 ΠΦ A|||op ≤ c2 kAk∞ , p holds with probability at least 1 − O(d−3 ). Letting A be all-ones matrix, then we have that for all u ∈ Rd1 , v ∈ Rd2 , X p ui vj ≤ pkuk1 kvk1 + c2 pd log dkuk2 kvk2 . (i,j)∈Φ We find that |||ΠΦ (U V > )|||2F ≤ X kU(i,·) k22 kV(j,·) k22 (i,j)∈Φ sX sX p 4 ≤ p|||U |||F |||V |||F + c2 pd log d kU(i,·) k2 kV(j,·) k42 2 2 i∈[d1 ] j∈[d2 ] p ≤ p|||U |||2F |||V |||2F + c2 pd log d|||U |||F |||V |||F |||U |||2,∞ |||V |||2,∞ s pµ2 r2 d log d ≤ p|||U |||2F |||V |||2F + c2 |||U |||F |||V |||F . d1 d2 By the assumption p & µ2 r2 log d , 2 (d1 ∧d2 ) we finish proving (51). d According to the proof of Lemma 10, if p ≥ c dlog , with probability at least 1 − O(d−1 ), we 1 ∧d2 3 3 have |Φ(i,·) | ≤ 2 pd2 and |Φ(·,j) | ≤ 2 pd1 for all i ∈ [d1 ] and j ∈ [d2 ]. Conditioning on this event, we have X X |||ΠΦ (Z)V |||2F = h(ΠΦ (Z))(i,·) , H(·,k) i2 i∈[d1 ] k∈[r] ≤ X X k(ΠΦ (Z))(i,·) k22 2 V(j,k) j∈Ω(i,·) i∈[d1 ] k∈[r] = |||ΠΦ Z|||2F X X kV(i,·) k22 j∈Ω(i,·) 3 ≤ |||ΠΦ Z|||2F pd2 · |||V |||22,∞ ≤ 2µrp|||ΠΦ Z|||2F . 2 We thus finish proving (52). Inequality (53) can be proved in the same way. 7.5 Proof of Lemma 8 Recall that we let F := [U ; V ] and Fπ∗ := [U ∗ ; V ∗ ]Q for some matrix Q ∈ Qr , which minimizes the following function |||F − [U ∗ ; V ∗ ]Q|||2F . (62) Let F ∗ := [U ∗ ; V ∗ ]. Expanding the above term, we find that Q is the maximizer of hhF, F ∗ Qii = Tr(F > F ∗ Q). Suppose F > F ∗ has SVD with form Q1 ΛQ> 2 for Q1 , Q2 ∈ Qr . When the minimum 31 diagonal term of Λ is positive, we conclude that the minimizer of (62) is unique and Q = Q2 Q> 1. To prove this argument, we note that X Λ(i,i) hpi , qi i, Tr(F > F ∗ Q) = i∈[r] where pi is the i-th column of Q1 and qi is the i-th column of Q> Q2 . Hence, Tr(F > F ∗ Q) ≤ P i∈[r] Λ(i,i) and the equality holds if and only if pi = qi for all i ∈ [r] since every Λ(i,i) > 0. We have Q1 = Q> Q2 and thus finish proving the argument. √ Under our assumption |||F − Fπ∗ |||op < 2σr∗ , for any nonzero vector u ∈ Rr , we have p kF > Fπ∗ uk2 ≥ kFπ>∗ Fπ∗ uk2 − k(Fπ∗ − F )> Fπ∗ uk2 ≥ ( 2σr∗ − |||Fπ∗ − F |||op )|||Fπ∗ u|||F > 0. In √ the second step, we use the fact that the singular values of Fπ∗ are equal to the diagonal terms of 2Σ∗1/2 . Hence, F > Fπ∗ has full rank. Furthermore, it implies that F > F ∗ has full rank and only contains positive singular values. Proceeding with the proved argument, we have > > F > Fπ∗ = Q1 ΛQ> 2 Q2 Q1 = Q1 ΛQ1 , which implies that F > Fπ∗ is symmetric. Accordingly, we have (F − Fπ∗ )> Fπ∗ is also symmetric. Acknowledgment Y. Chen acknowledges support from the School of Operations Research and Information Engineering, Cornell University. References [1] Animashree Anandkumar, Rong Ge, Daniel Hsu, Sham M. Kakade, and Matus Telgarsky. “Tensor decompositions for learning latent variable models”. In The Journal of Machine Learning Research 15.1 (2014), pp. 2773–2832. [2] Sivaraman Balakrishnan, Martin J. Wainwright, and Bin Yu. “Statistical guarantees for the EM algorithm: From population to sample-based analysis”. In arXiv preprint arXiv:1408.2156 (2014). [3] Srinadh Bhojanapalli, Prateek Jain, and Sujay Sanghavi. “Tighter low-rank approximation via sampling the leveraged element”. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM. 2015, pp. 902–920. [4] Srinadh Bhojanapalli, Anastasios Kyrillidis, and Sujay Sanghavi. “Dropping convexity for faster semi-definite optimization”. In arXiv preprint arXiv:1509.03917 (2015). [5] Emmanuel J. Candès, Xiaodong Li, and Mahdi Soltanolkotabi. “Phase retrieval via Wirtinger flow: Theory and algorithms”. In IEEE Transactions on Information Theory 61.4 (2015), pp. 1985–2007. [6] Emmanuel J. Candès and Benjamin Recht. “Exact matrix completion via convex optimization”. In Foundations of Computational mathematics 9.6 (2009), pp. 717–772. 32 [7] Emmanuel J. Candès and Terence Tao. “The power of convex relaxation: Near-optimal matrix completion”. In IEEE Transactions on Information Theory 56.5 (2010), pp. 2053–2080. [8] Emmanuel J. Candès, Xiaodong Li, Yi Ma, and John Wright. “Robust principal component analysis?” In Journal of the ACM (JACM) 58.3 (2011), p. 11. [9] Venkat Chandrasekaran, Sujay Sanghavi, Pablo A. Parrilo, and Alan S. Willsky. “Ranksparsity incoherence for matrix decomposition”. In SIAM Journal on Optimization 21.2 (2011), pp. 572–596. [10] Yudong Chen. “Incoherence-Optimal Matrix Completion”. In IEEE Transactions on Information Theory 61.5 (2015), pp. 2909–2923. [11] Yudong Chen and Martin J. Wainwright. “Fast low-rank estimation by projected gradient descent: General statistical and algorithmic guarantees”. In arXiv preprint arXiv:1509.03025 (2015). [12] Yudong Chen, Ali Jalali, Sujay Sanghavi, and Constantine Caramanis. “Low-rank Matrix Recovery from Errors and Erasures”. In IEEE Transactions on Information Theory 59.7 (2013), pp. 4324–4337. [13] Yuxin Chen and Emmanuel J. Candès. “Solving random quadratic systems of equations is nearly as easy as solving linear systems”. In Advances in Neural Information Processing Systems. 2015, pp. 739–747. [14] Yeshwanth Cherapanamjeri, Kartik Gupta, and Prateek Jain. “Nearly-optimal Robust Matrix Completion”. In arXiv preprint arXiv:1606.07315 (2016). [15] Kenneth L. Clarkson and David P. Woodruff. “Low rank approximation and regression in input sparsity time”. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing. ACM. 2013, pp. 81–90. [16] Alan Frieze, Ravi Kannan, and Santosh Vempala. “Fast Monte-Carlo algorithms for finding low-rank approximations”. In Journal of the ACM (JACM) 51.6 (2004), pp. 1025–1041. [17] Quanquan Gu, Zhaoran Wang, and Han Liu. “Low-Rank and Sparse Structure Pursuit via Alternating Minimization”. In Proceedings of the 19th International Conference on Artificial Intelligence and Statistics. 2016, pp. 600–609. [18] Moritz Hardt. “Understanding alternating minimization for matrix completion”. In 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS). IEEE. 2014, pp. 651– 660. [19] Daniel Hsu, Sham M. Kakade, and Tong Zhang. “Robust matrix decomposition with sparse corruptions”. In IEEE Transactions on Information Theory 57.11 (2011), pp. 7221–7234. [20] Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi. “Low-rank matrix completion using alternating minimization”. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing. ACM. 2013, pp. 665–674. [21] Zhouchen Lin, Minming Chen, and Yi Ma. “The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices”. In Arxiv preprint arxiv:1009.5055v3 (2013). 33 [22] Praneeth Netrapalli, UN Niranjan, Sujay Sanghavi, Animashree Anandkumar, and Prateek Jain. “Non-convex robust PCA”. In Advances in Neural Information Processing Systems. 2014, pp. 1107–1115. [23] Yousef Saad. Numerical Methods for Large Eigenvalue Problems: Revised Edition. Vol. 66. Siam, 2011. [24] Ju Sun, Qing Qu, and John Wright. “When Are Nonconvex Problems Not Scary?” In arXiv preprint arXiv:1510.06096 (2015). [25] Ruoyu Sun and Zhi-Quan Luo. “Guaranteed matrix completion via nonconvex factorization”. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS). IEEE. 2015, pp. 270–289. [26] Stephen Tu, Ross Boczar, Mahdi Soltanolkotabi, and Benjamin Recht. “Low-rank solutions of linear matrix equations via procrustes flow”. In arXiv preprint arXiv:1507.03566 (2015). [27] Zhaoran Wang, Quanquan Gu, Yang Ning, and Han Liu. “High Dimensional EM Algorithm: Statistical Optimization and Asymptotic Normality”. In Advances in Neural Information Processing Systems. 2015, pp. 2512–2520. [28] Huan Xu, Constantine Caramanis, and Sujay Sanghavi. “Robust PCA via Outlier Pursuit”. In IEEE Transactions on Information Theory 58.5 (2012), pp. 3047–3064. issn: 0018-9448. [29] Xinyang Yi and Constantine Caramanis. “Regularized EM Algorithms: A Unified Framework and Statistical Guarantees”. In Advances in Neural Information Processing Systems. 2015, pp. 1567–1575. [30] Huishuai Zhang, Yuejie Chi, and Yingbin Liang. “Provable Non-convex Phase Retrieval with Outliers: Median Truncated Wirtinger Flow”. In arXiv preprint arXiv:1603.03805 (2016). [31] Tuo Zhao, Zhaoran Wang, and Han Liu. “A Nonconvex Optimization Framework for Low Rank Matrix Estimation”. In Advances in Neural Information Processing Systems. 2015, pp. 559– 567. [32] Qinqing Zheng and John Lafferty. “A convergent gradient descent algorithm for rank minimization and semidefinite programming from random linear measurements”. In Advances in Neural Information Processing Systems. 2015, pp. 109–117. 34 Appendices A Supporting Lemmas In this section, we provide several technical lemmas used for proving our main results. Lemma 12. For any (U ∗ , V ∗ ) ∈ E(M ∗ ), U ∈ Rd1 ×r and V ∈ Rd2 ×r , we have p |||U V > − U ∗ V ∗> |||F ≤ σ1∗ (|||∆V |||F + |||∆U |||F ) + |||∆U |||F |||∆V |||F , where ∆U := U − U ∗ , ∆V := V − V ∗ . ∗> + ∆ ∆> . Hence, Proof. We observe that U V > − U ∗ V ∗> = U ∗ ∆> U V V + ∆U V ∗> |||U V > − U ∗ V ∗> |||F ≤ |||U ∗ ∆> |||F + |||∆U ∆> V |||F + |||∆U V V |||F ≤ |||U ∗ |||op |||∆V |||F + |||V ∗ |||op |||∆U |||F + |||∆U |||F |||∆V |||F . Furthermore, assuming (U, V ) ∈ U × V, where U and V satisfy the conditions in (19), we have the next result. Lemma 13. For any (i, j) ∈ [d1 ] × [d2 ], we have r r µrσ1∗ µrσ1∗ > ∗ ∗> |(U V − U V )(i,j) | ≤ 3 k∆V (j,·) k2 + 3 k∆U (i,·) k2 d1 d2 (63) Proof. We observe that ∗ ∗ |(U V > − M ∗ )(i,j) | ≤ |hU(i,·) , ∆V (j,·) i| + |hV(j,·) , ∆U (i,·) i| + |h∆U (i,·) , ∆V (j,·) i| r r µrσ1∗ µrσ1∗ 1 1 ≤ k∆V (j,·) k2 + k∆U (i,·) k2 + |||∆U |||2,∞ k∆V (j,·) k2 + |||∆V |||2,∞ k∆U (i,·) k2 . d1 d2 2 2 By noticing that r ∗ |||∆U |||2,∞ ≤ |||U |||2,∞ + |||U |||2,∞ ≤ 3 r µrσ1∗ µrσ1∗ ∗ , |||∆V |||2,∞ ≤ |||V |||2,∞ + |||V |||2,∞ ≤ 3 , d1 d2 we complete the proof. Lemma 13 can be used to prove the following result. Lemma 14. For any α ∈ [0, 1], suppose Ω ⊆ [d1 ] × [d2 ] satisfies |Ω(i,·) | ≤ αd2 for all i ∈ [d1 ] and |Ω(·,j) | ≤ αd1 for all j ∈ [d2 ]. Then we have |||ΠΩ (U V > − U ∗ V ∗> )|||2F ≤ 18αµrσ1∗ (|||∆V |||2F + |||∆U |||2F ). 35 Proof. Using Lemma 13 for bounding each entry of U V > − U ∗ V ∗> , we have that X |(U V > − U ∗ V ∗> )(i,j) |2 |||ΠΩ (U V > − U ∗ V ∗> )|||2F ≤ (i,j)∈Ω X 18µrσ ∗ 18µrσ1∗ 1 ≤ k∆V (j,·) k22 + k∆U (i,·) k22 d1 d2 (i,j)∈Ω X X 18µrσ ∗ X X 18µrσ ∗ 1 1 ≤ k∆V (j,·) k22 + k∆U (i,·) k22 d1 d2 j ≤ i i∈Ω(·,j) 18αµrσ1∗ (|||∆V |||2F j∈Ω(i,·) 2 + |||∆U |||F ). Denote the i-th largest singular value of matrix M by σi (M ). Lemma 15 (Lemma 5.14 in [26]). Let M1 , M2 ∈ Rd1 ×d2 be two rank r matrices. Suppose they have SVDs M1 = L1 Σ1 R1> and M2 = L2 Σ2 R2> . Suppose |||M1 − M2 |||op ≤ 21 σr (M1 ). Then we have 1/2 1/2 1/2 1/2 d2 (L2 Σ2 , R2 Σ2 ; L1 Σ1 , R1 Σ1 ) ≤ √ B 2 |||M2 − M1 |||2F . 2 − 1 σr (M1 ) Parameter Settings for FB Separation Experiments We approximate the FB separation problem by the RPCA framework with r = 10, α = 0.2, µ = 10. Our algorithmic parameters are set as γ = 1, η = 1/(2σ̂1∗ ), where σ̂1∗ is an estimate of σ1∗ obtained from the initial SVD. The parameters of AltProj are kept as provided in the default setting. For √ IALM, we use the tradeoff paramter λ = 1/ d1 , where d1 is the number of pixels in each frame (the number of rows in Y ). Note that both IALM and AltProj use the stopping criterion |||Y − Mt − St |||F /|||Y |||F ≤ 10−3 . Our algorithm for the partial observation setting never explicitly forms the d1 -by-d2 matrix Mt = Ut Vt> , which is favored in large scale problems, but also renders the above criterion inapplicable. Instead, we use the following stopping criterion |||Ut+1 − Ut |||2F + |||Vt+1 − Vt |||2F ≤ 4 × 10−4 . |||Ut |||2F + |||Vt |||2F This rule checks whether the iterates corresponding to low-rank factors become stable. In fact, our stopping criterion seems more natural and practical because in most real applications, matrix Y cannot be strictly decomposed into low-rank M and sparse S that satisfy Y = M + S. Instead of forcing M + S to be close to Y , our rule relies on seeking a robust subspace that captures the most variance of Y . 36
10
Square-free class sizes in products of groups arXiv:1703.08363v1 [math.GR] 24 Mar 2017 M. J. Felipe · A. Martı́nez-Pastor · V. M. Ortiz-Sotomayor ∗ Abstract We obtain some structural properties of a factorised group G = AB, given that the conjugacy class sizes of certain elements in A ∪ B are not divisible by p2 , for some prime p. The case when G = AB is a mutually permutable product is especially considered. Keywords Finite groups · Soluble groups · Products of subgroups · Conjugacy classes 2010 MSC 20D10 · 20D40 · 20E45 1 Introduction All groups considered thorogouth this paper are finite. Over the last years, many authors have investigated the influence of conjugacy class sizes on the structure of finite groups. In the meantime, numerous studies in the framework of group theory have focused in factorised groups. In this setting, a central question is how the structure of the factors affects the structure of the whole group, in particular when they are connected by certain permutability properties. The purpose of this paper is to show new achievements which combine both current perspectives in finite groups. More precisely, our aim is to get some information about a factorised group, provided that the conjugacy class sizes of some elements of its factors are square-free. The earlier starting point of our investigation can be traced back to the paper of Chillag and Herzog ([5]), where the structure of a group in which all elements have square-free conjugacy class sizes was first analysed. Next, in [6], Cossey and Wang localised one of the main theorems in [5] for a fixed prime p, that is, they considered conjugacy class sizes not divisible by p2 , for certain prime p. Later on, this study was ∗ The first author is supported by Proyecto Prometeo II/2015/011, Generalitat Valenciana (Spain), and the second author is supported by Proyecto MTM2014-54707-C3-1-P, Ministerio de Economı́a, Industria y Competitividad (Spain). The results in this paper are part of the third author’s Ph.D. thesis, and he acknowledges the predoctoral grant ACIF/2016/170, Generalitat Valenciana (Spain). The authors wish to thank John Cossey for helpful conversations during his last visit to Valencia. Instituto Universitario de Matemática Pura y Aplicada (IUMPA), Universitat Politècnica de València, Camino de Vera, s/n, 46022, Valencia, Spain. B: [email protected], [email protected], [email protected] 1 improved by Li in [12], and by Liu, Wang, and Wei in [13], by replacing conditions on all conjugacy classes by those referring only to conjugacy classes of either p-regular elements or prime power order elements, using the classification theorem of finite simple groups (CFSG). These authors also first obtained some preliminary results in factorised groups. This research was extended in 2012 by Ballester-Bolinches, Cossey and Li in [2], through mutually permutable products. More recently, in 2014, Qian and Wang ([14]) have gone a step further by considering just conjugacy class sizes of p-regular elements of prime power order (although not in factorised groups). In the context of factorised groups, and aiming to obtain criteria for products of supersoluble subgroups to be supersoluble, several authors have considered products in which certain subgroups of the factors permute (see [3] for a detailed account). In this scene, we are interested in mutually permutable products, factorised groups G = AB such that the subgroups A and B are mutually permutable, i.e., A permutes with every subgroup of B and B permutes with every subgroup of A (see also [4]). Obviously, if A and B are normal in G, then they are mutually permutable. We recall that, for a group G, the set xG = {g −1 xg : g ∈ G} is the conjugacy class of the element x ∈ G, and xG denotes the conjugacy class size of x. If p is a prime number, we say that x ∈ G is a p-regular element if its order is not divisible by p, and that it is a p-element if its order is a power of p. Moreover, if n is an integer, let np denote the highest power of p dividing n. The mth group of order n in the SmallGroups library [8] of GAP will be identified by n#m. The remainder notation is standard and is taken mainly from [7]. We also refer to this book for details about classes of groups. In this paper, motivated by the above development, at first we focus on the case of p-groups, extending for factorised groups the well-known Knoche’s theorem (see [11]). Theorem A. Let p be a prime number and let P = AB be a p-group such that p2 does not divide xP for all x ∈ A ∪ B. Then P ′ 6 Φ(P ) 6 Z(P ), P ′ is elementary abelian and |P ′ | ≤ p2 . Our next goal in the paper is to prove the following theorem, regarding mutually permutable products. Theorem B. Let G = AB be the mutually permutable product of the subgroups A and B, and let p be a prime such that gcd(p − 1, |G|) = 1. If p2 does not divide xG for any p-regular element x ∈ A ∪ B of prime power order, then: (1) G is soluble. (2) G is p-nilpotent. (3) The Sylow p-subgroups of G/ Op (G) are elementary abelian. In the particular case when G = A = B, we recover [14, Theorem A] (see Section 3, Corollary 3.5). We remark that both results use the CFSG. Moreover, in relation to the third assertion, we have found a gap in one of the statements in [6, Theorem 1], as it is reported in Remark 3.7 (a). On the other hand, we point out that it is possible to find examples of groups factorised as a product of two (mutually permutable) subgroups which satisfy the hypothe2 ses of Theorem B for some fixed prime p and, however, there exist elements x ∈ A ∪ B such that p2 divides either xA or xB (see Remark 3.7 (b)). The next theorem generalises the last assertion of [2, Theorem 1.3] regarding p-soluble groups, by considering only prime power order elements: Theorem C. Let G = AB be the mutually permutable product of the subgroups A and B, and let p be a prime. Suppose that for every prime power order p-regular element x ∈ A ∪ B, xG is not divisible by p2 . If G is p-soluble, then G is p-supersoluble. In the line of [5, Theorem 1] and [6, Theorem 2], if we consider all prime numbers, then we obtain some information about the structure of the derived subgroup of a factorised group G. Theorem D. Let G = AB be the product of the subgroups A and B, and assume that G is supersoluble. Suppose that every prime power order element x ∈ A ∪ B has square-free conjugacy class size. Then: (1) G′ is abelian. (2) The Sylow subgroups of G′ are elementary abelian. (3) F(G)′ has Sylow p-subgroups of order at most p2 , for every prime p. If we limit our conditions only to p-regular elements, as a consequence of Theorems B and C, we obtain the following result which extends [2, Corollary 1.5] (see Corollary 4.3) for prime power order elements, and also a theorem of [12], for products of groups. Theorem E. Let G = AB be the mutually permutable product of the subgroups A and B. Suppose that for every prime p and every prime power order p-regular element x ∈ A∪B, xG is not divisible by p2 . Then G is supersoluble, and G/ F(G) has elementary abelian Sylow subgroups. We remark that the first statement in Theorem D is not further true under the weaker hypotheses of the above theorem, even for arbitrary groups not necessarily factorised, as pointed out in [14]. Indeed, as a result of Theorem E, the supersolubility condition in Theorem D can be exchanged by the mutual permutability of the factors. On the other hand, with the stronger assumption that all p-regular elements of the factors (not only those of prime power order) have conjugacy class sizes not divisible by p2 , we get extra information about the orders of the Sylow p-subgroups of G/F (G), extending partially [6, Theorem 2]. Theorem F. Let G = AB be the mutually permutable product of the subgroups A and B. Suppose that for every prime p and every p-regular element x ∈ A ∪ B, xG is not divisible by p2 . Then the order of a Sylow p-subgroup of G/ F(G) is at most p2 . In summary, when dealing with mutually permutable products, the next corollary follows directly from the above theorems. Corollary G. Let G = AB be the mutually permutable product of the subgroups A and B. Suppose that xG is square-free for each element x ∈ A ∪ B. Then G is supersoluble, 3 and both G/ F(G) and G′ have elementary abelian Sylow subgroups. Moreover, G′ is abelian, and both groups G/ F(G) and F(G)′ have Sylow p-subgroups of order at most p2 , for each prime p. In Section 3 we prove Theorems A, B and C, which refer to class sizes not divisible by p2 , for a fixed prime p. Theorems E, D and F, which consider square-free conjugacy class sizes (for all primes), are proved in Section 4. In both cases we will illustrate the scope of the results presented with some examples. 2 Preliminary results We use the following elementary properties frequently, sometimes without further reference. Lemma 2.1. Let N be a normal subgroup of a group G, and let p be a prime. Then: (a) xN divides xG , for any x ∈ N . (b) (xN )G/N divides xG , for any x ∈ G. (c) If xN is a p-element of G/N , then there exists a p-element x1 ∈ G such that xN = x1 N . We need specifically the following fact about Hall subgroups of factorised groups. It is a reformulation of [1, 1.3.2] which is convenient for our purposes. We recall that a group is a Dπ -group, for a set of primes π, if every π-subgroup is contained in a Hall π-subgroup, and any two Hall π-subgroups are conjugate. In particular, all π-separable groups are Dπ -groups for any set of primes π, and all groups are Dπ -groups when π consists of a single prime. Lemma 2.2. Let G = AB be the product of the subgroups A and B. Asume that A, B, and G are Dπ -groups for a set of primes π. Then there exists a Hall π-subgroup H of G such that H = (H ∩ A)(H ∩ B), with H ∩ A a Hall π-subgroup of A and H ∩ B a Hall π-subgroup of B. We collect here some results on mutually permutable products, which will be very useful along the paper. Lemma 2.3. Let the group G = AB be the product of the mutually permutable subgroups A and B. Then we have: (a) ([3, 4.1.10]) G/N is the product of the mutually permutable subgroups AN/N and BN/N . (b) ([3, 4.1.21]) If U is a subgroup of G, then (U ∩ A)(U ∩ B) is a subgroup, and U ∩ A and U ∩ B are mutually permutable. Moreover, if N is a normal subgroup of G, then (N ∩ A)(N ∩ B) is also normal in G. Theorem 2.4. ([4, Theorem 1]) Let the non-trivial group G = AB be the product of the mutually permutable subgroups A and B. Then AG BG is not trivial. 4 The following lemma will be essential in the proofs of our theorems. Lemma 2.5. ([2, Lemma 2.4]) Let p be a prime, and Q be a p′ -group acting faithfully on an elementary abelian p-group N with |[x, N ]| = p, for all 1 6= x ∈ Q. Then Q is cyclic. The next result is the first assertion of Theorem A in [14], which uses the CFSG. Theorem 2.6. Let G be a group. For a fixed prime p with gcd(p − 1, |G|) = 1, if p2 does not divide xG for any p-regular element x ∈ G of prime power order, then G is soluble. Finally, the later lemma, which is a nice result due to Isaacs, will be very useful in the proof of Theorem D. Lemma 2.7. ([10, 4.17]) Let K be an abelian normal subgroup of a finite group G, and let x ∈ G be non-central. Then |CG (x)| < |CG (y)|, where y = [k, x] and k ∈ K is arbitrary. 3 Class sizes not divisible by p2 , for a fixed prime p The well-known Knoche’s theorem (see [11]) asserts that if P is a p-group, p a prime, then the conjugacy class sizes of P are square-free if, and only if, |P ′ | ≤ p. We begin this section by proving Theorem A, which clearly extends it for factorised groups. Proof of Theorem A. Since |P : CP (x)| ≤ p for each x ∈ A ∪ B, it follows Φ(P ) 6 CP (x). Therefore, Φ(P ) commutes with both A and B, so P ′ 6 Φ(P ) 6 Z(P ). Hence P/ Z(P ) is elementary abelian, and xp ∈ Z(P ) for all x ∈ P . Since P ′ 6 Z(P ) and [x, y]p = [xp , y] = 1 (see [7, A - 7.3(a)]) for any x, y ∈ P , it follows that P ′ is elementary abelian. Now it remains to prove that |P ′ | ≤ p2 . Let [x, y] be a generator of P ′ . Since P ′ 6 Z(P ) and y = ya yb with ya ∈ A and yb ∈ B, then [x, y] = [x, ya yb ] = [x, yb ][x, ya ]yb = [x, yb ][x, ya ] ∈ [P, B][P, A] . Thus P ′ = [P, B][P, A]. Clearly, [P, B] is elementary abelian. Suppose [P, B] 6= 1, and let 1 6= [x, z] and 1 6= [x′ , z ′ ] be two generators of [P, B], with x, x′ ∈ P and z, z ′ ∈ B. We distinguish three cases in order to prove that h[x, z]i = h[x′ , z ′ ]i: i) Suppose first z, z ′ ∈ B \ Z(B). Let b ∈ B \ (CP (z) ∪ CP (z ′ )). Since |P : CP (z)| = p then P = CP (z)hxi. Moreover, b ∈ / CP (z) implies that 1 6= [b, z] = [xi t, z] = [xi , z] = i i [x, z] , where b = tx with t ∈ CP (z). On the other hand, P = CP (b)hzi so z ′ = z j k, with k ∈ CP (b). Hence 1 6= [b, z ′ ] = [b, z j k] = [b, z]j = [x, z]i+j . Finally, as b ∈ P = CP (z ′ )hx′ i, then b = (x′ )m s with s ∈ CP (z ′ ). Therefore 1 6= [x, z]i+j = [b, z ′ ] = [(x′ )m s, z ′ ] = [x′ , z ′ ]m , and recall that [x, z] and [x′ , z ′ ] both have order p. Thus, h[x, z]i = h[x′ , z ′ ]i. ii) Now suppose z, z ′ ∈ Z(B). Then B 6 CP (z) ∩ CP (z ′ ). There exists w ∈ P \ (CP (z) ∪ CP (z ′ )). Therefore, w = wa wb with wa ∈ A and wb ∈ B 6 CP (z) ∩ CP (z ′ ), so wa ∈ A \ (CP (z) ∪ CP (z ′ )). Arguing analogously as in case i) with wa instead of b, we conclude that h[x, z]i = h[x′ , z ′ ]i too. 5 iii) Finally, suppose z ∈ B \ Z(B) but z ′ ∈ Z(B). Let z ′′ = zz ′ ∈ B \ Z(B). Therefore, we have [x′ , z ′′ ] = [x′ , z ′ ][x′ , z]. If [x′ , z ′′ ] = 1 then 1 6= [x′ , z ′ ]−1 = [x′ , z], and applying case i) to both [x, z] and [x′ , z] we conclude that they generate the same cyclic group of order p. On the other hand, if [x′ , z ′′ ] 6= 1 and [x′ , z] = 1, then we apply again the first case. Finally, if both [x′ , z ′′ ] 6= 1 6= [x′ , z] then they generate the same cyclic group by case i) again. Thus 1 6= h[x′ , z ′ ]i = h[x′ , z ′′ ][x′ , z]−1 i 6 h[x′ , z ′′ ]i. Since the last one has order p, it follows h[x′ , z ′ ]i = h[x′ , z ′′ ]i. So we have h[x′ , z ′ ]i = h[x′ , z ′′ ]i, which is equal to h[x, z]i by i) again. In conclusion, if [P, B] 6= 1, then it has order p. Analogously with [P, A]. Hence |P ′ | = |[P, B][P, A]| ≤ p2 and this establishes the result. Example 3.1. The converse of the above result is not true in general, in contrast to Knoche’s theorem. Let P be the group of the Small groups library of GAP with identification number 32#35, which is the product of a cyclic group of order 4 and a quaternion group of order 8. Then its derived group is P ′ = C2 × C2 , and P ′ = Φ(P ) = Z(P ). Nevertheless, there are elements in the quaternion group with conjugacy class size equal to 4. Example 3.2. Let G = Q8 × D8 be the direct product of a quaternion group and a dihedral group of order 8. Then every element contained in each factor has conjugacy class size equal to either 1 or 2, so Theorem A applies. However, there are elements in G with conjugacy class size divisible by 4, and Knoche’s result cannot be applied. Now we proceed with a key result in the sequel. Proposition 3.3. Let G be a group, and let p be a prime. Suppose that N is an abelian minimal normal subgroup of G, which is a p′ -group. Then: (1) If G is p-nilpotent, and xG is not divisible by p2 for every element x ∈ N , then |Op (G/N Op (G))| ≤ p. (2) If K/N Op (G) = Op (G/N Op (G)) has order p, and P is a Sylow p-subgroup of K, then CN (P ) = 1. Proof. (1) Suppose that the result is not true, and let G be a counterexample of minimal order. Since the hypotheses are inherited by quotients, we may assume by standard arguments that Op (G) = 1, and then also Φ(G) = 1. Since N is abelian, by a Gaschütz’s result ([9, 4.4]) N is complemented, that is, G = N S with N ∩ S = 1. We may assume that G/N is not a p′ -group, so Op (G/N ) ∼ = Op (S) 6= 1 by the minimality of G. Let P be a Sylow p-subgroup of S (so P is a Sylow p-subgroup of G). Hence it follows Op (S) ∩ Z(P ) 6= 1. Let Z be a minimal normal subgroup of Op (S) ∩ Z(P ). Since S is p-nilpotent, we get S = P L, where L is normal in S and P ∩ L = 1. It follows that [L, Z] 6 [L, Op (S)] 6 L ∩ Op (S) = 1, so Z 6 Z(S). Note that CN (Z) is normal in G = SN . Consequently, by the minimality of N , we have either CN (Z) = 1 or CN (Z) = N . If CN (Z) = N , then Z 6 Z(G), which implies that Z 6 Op (G) = 1, a contradiction. So we may affirm CN (Z) = 1, for every minimal normal subgroup Z of Op (S) ∩ Z(P ). 6 Now let 1 6= x ∈ N such that a Sylow p-subgroup of CG (x), say P0 , is contained in P , so P0 = CP (x). By the hypotheses, xG p = |G : CG (x)|p = |P : P0 | is not divisible by p2 , so it follows either |P : P0 | = 1 or |P : P0 | = p. The first case yields P = CP (x) and then x ∈ CN (Z) = 1, a contradiction. Therefore, we may assume that |P : P0 | = p, and so P0 is normal in P . In addition, since Op (S) ∩ Z(P ) is abelian, by the minimality of Z, we have either P0 ∩ Z = 1 or P0 ∩ Z = Z. The last case gives Z 6 CP (x), a contradiction again. Hence, P0 ∩ Z = 1 and it follows that P = P0 × Z and |Z| = |P : P0 | = p. We only need to see that Z = Op (S) to finish the proof. Note that Z(P ) = Z(P )∩P0 Z = Z(Z(P )∩P0 ), so it follows Z(P )∩Op (S) = Z(Z(P )∩ P0 ) ∩ Op (S) = Z(Z(P ) ∩ P0 ∩ Op (S)). If Z(P ) ∩ P0 ∩ Op (S) 6= 1, since it is normal in Op (S) ∩ Z(P ), we can choose a minimal normal subgroup Z1 of Op (S) ∩ Z(P ) such that Z1 6 Z(P )∩P0 ∩Op (S). But then Z1 6 P0 = CP (x), so x ∈ CN (Z1 ) = 1, a contradiction. Therefore, we may assume that Z(P ) ∩ P0 ∩ Op (S) = 1. On the other hand, we have Op (S) = Op (S)∩ZP0 = Z(P0 ∩Op (S)). If P0 ∩Op (S) is a non-trivial subgroup of P , since it is normal in P , we have a contradiction with Z(P ) ∩ P0 ∩ Op (S) = 1. Consequently we get the final contradiction Z = Op (S). The first assertion is then established. (2) Let K/N Op (G) = Op (G/N Op (G)), which has order p, and let P be a Sylow psubgroup of K. Then K = P N . Moreover, [K, N ] is normal in G and [K, N ] = [P, N ] 6 N so, by the minimality of N , we have either [P, N ] = 1 or [P, N ] = N . The first case leads to K = P × N , and then P 6 Op (G), a contradiction. Thus we have [P, N ] = N , and by coprime action it follows CN (P ) = 1. Note that every dihedral group of order 2q (for q an odd prime) verifies the hypotheses of the above proposition (take p = 2). Theorem B (3) is indeed an immediate consequence of the next more general result. Theorem 3.4. Let G = AB be a soluble group, which is the mutually permutable product of the subgroups A and B. Assume that G is p-nilpotent for a prime p. If p2 does not divide xG for any p-regular element x ∈ A ∪ B of prime power order, then G/ Op (G) has elementary abelian Sylow p-subgroups. Proof. Suppose that the result is false and let G be a minimal counterexample. We may assume by the minimality of G that Op (G) = 1, and therefore Φ(G) = 1 too. By Theorem 2.4, we can assume that there exists a minimal normal subgroup N of G such that N 6 A. Moreover, N is q-elementary abelian, for some prime q 6= p. Furthermore, since N ∩ Φ(G) = 1, by Gaschütz’s lemma we may write G = SN , with S ∩ N = 1. Let P be a Sylow p-subgroup of S (so it is a Sylow p-subgroup of G). Let T = Op (S). By the minimality of G we have T ∼ = Op (G/N ) 6= 1, and by Proposition 3.3 (1) it holds |T | = p. We may choose 1 6= x ∈ N such that P0 = CP (x) is a Sylow p-subgroup of CG (x). Since CN (T ) = 1 by Proposition 3.3 (2), it holds that P0 6= P , |P : P0 | = p, and P0 ∩ T = 1. Hence P = P0 × T . Finally, since P0 ∼ = (P N/N )/ Op (G/N ), which = P/T ∼ is elementary abelian by the minimality of G, it follows that P so is, and this leads to the final contradiction. Proof of Theorem B. Note that the quotients of G satisfy the hypotheses. Moreover, if N is a normal subgroup of G such that N = (N ∩ A)(N ∩ B), then N 7 also inherits the hypotheses. (Observe that this occurs, for instance, if either N 6 A or N 6 B.) (1) We first see that G is soluble by induction over |G|. Since every group of odd order is soluble, we may affirm that p = 2 because gcd(p − 1, |G|) = 1. By Theorem 2.4, we can assume that there exists a normal subgroup M of G such that 1 6= M 6 A. If M < G, then M is soluble by minimality. Analogously G/M is also soluble, and then so is G. If M = G, we apply Theorem 2.6. (2) Suppose that the result is false and let G be a counterexample of minimal order. Since the quotients of G inherit the hypotheses, the class of p-nilpotent groups is a saturated formation, and G is soluble, we may assume that G possesses a unique minimal normal subgroup N , with N = CG (N ) = F(G). If N is a p′ -group, since G/N is pnilpotent by the minimality of G, it follows that G is p-nilpotent, which is a contradiction. Thus, we may assume that N = Op (G). By Theorem 2.4, we can assume without loss of generality that N 6 A, and that there exists a minimal normal subgroup E/N of G/N such that either E/N ≤ A/N or E/N 6 BN/N . In the first case, we have E 6 A. In the second case, it follows E = E ∩ BN = N (E ∩ B) 6 (E ∩ A)(E ∩ B) 6 E. Therefore, we have E = (E ∩ A)(E ∩ B), where the factors are mutually permutable by Lemma 2.3 (b). In both cases, E is normal in G and E verifies the hypotheses. Hence, if E < G, then E is p-nilpotent by the minimality of G. Since N = Op (G), we get that E/N is q-elementary abelian for some prime q 6= p, so it follows that E = QN , with Q the normal Sylow q-subgroup of E. Hence, Q is normal in G which implies that E = N , a contradiction. Therefore, we can assume that E = G. So we have G = E = N Q, where Q is an abelian Sylow q-subgroup of G. By Lemma 2.2, we may assume that Q = (Q ∩ A)(Q ∩ B), with either Q ∩ A 6= 1 or Q ∩ B 6= 1. Suppose first that Q ∩ B 6= 1, and take 1 6= x ∈ Q ∩ B. Let E1 = hxiN , which is normal in QN = G. Hence, we have E1 = hxiN 6 (E1 ∩ B)(E1 ∩ A) 6 E1 . If Q ∩ B = 1, then G = A and we can choose 1 6= x ∈ Q, so that E1 = hxiN is normal in QN = G. Thus, in both cases, we have that E1 inherits the hypotheses and, if E1 < G, it follows that it is p-nilpotent. Therefore hxi is a normal Sylow q-subgroup of E1 , which is again a contradiction. Consequently, we may assume that G = E1 = hxiN , for some q-element x. Note that CN (x) is normal in G = hxiN , since N is abelian. By the minimality of N , it follows that either CN (x) = 1 or CN (x) = N . The second case leads to x ∈ CG (N ) = N , a contradiction. Hence, it follows that CG (x) = CG (x) ∩ N hxi = hxi CN (x) = hxi. Then xG = |G : CG (x)| = |N hxi : hxi| = |N | , and so |N | = p, by the hypotheses. Now, we get that hxi ∼ = G/N = NG (N )/ CG (N ) is isomorphic to a subgroup of Aut(N ) ∼ C , the cyclic group of order p − 1. Hence, |hxi| divides both p − 1 and = p−1 |G|, which contradicts the fact that gcd(p − 1, |G|) = 1. This finishes the proof of the p-nilpotency of G. (3) It follows from Theorem 3.4. In the particular case when G = A = B we recover: Corollary 3.5. ([14, Theorem A]) Let G be a group. For a fixed prime p with gcd(p − 1, |G|) = 1, if p2 does not divide xG for any p-regular element x ∈ G of prime power 8 order, then G is soluble, p-nilpotent and G/ Op (G) has elementary abelian Sylow psubgroups. Note that if G is the direct product of two symmetric groups of degree 3, then G verifies the hypotheses of Theorem B for p = 2, but not those of Corollary 3.5. Moreover, the asumption that gcd(p − 1, |G|) = 1 is necessary, which can be seen by considering G = A5 , the alternating group of degree 5, and the prime p = 3. We include here a theorem due to Cossey and Wang [6], which was the initial motivation for our results, to notify a gap that we have found in one of the statements. Theorem 3.6. ([6, Theorem 1]) Let G be a finite group, and p be a prime divisor of |G| such that if q is any prime divisor of |G|, then q does not divide p − 1. Suppose that no conjugacy class size of G is divisible by p2 . Then G is a soluble p-nilpotent group, and G/ Op (G) has a Sylow p-subgroup of order at most p. Further, if P is a Sylow p-subgroup of G, then P ′ has order at most p, and if P 6= Op (G), then Op (G) is abelian. Remark 3.7. (a) The statement “G/ Op (G) has a Sylow p-subgroup of order at most p” in the above theorem (and so the corresponding one in [13, Theorem 6]) is not true. To see this, consider the semidirect product G = [C5 × C5 ](Sym(3) × C2 ) (where Sym(3) is a symmetric group of degree 3), which is the group of the Small groups library of GAP with identification number 300#25, and the prime p = 2. Then G verifies the hypotheses of Theorem 3.6 but O2 (G) = 1 and |G|2 = 4. We reveal that this example has been communicated to us by John Cossey. (b) The same example shows that the hypotheses in Theorem B for the conjugacy class sizes of the elements x ∈ A ∪ B are not necessarily inherited by the factors, unless they are (sub)normal in G. The above group G can be factorised as the mutually permutable product of A = D10 × D10 and B = [C5 × C5 ]C3 (we checked this using GAP). It is clear that G = AB satisfies the hypotheses of Theorem B for p = 2, but there are elements x ∈ A with xA divisible by 4. Remark 3.8. A natural question is how to extend the last assertion of Theorem 3.6 for (mutually permutable) products. Concerning this, we show the following example: Let A = D8 be a dihedral group of order 8 and B = [C5 ]C4 = ha, b | a5 = b4 = 1, ab = a4 i, and consider the prime p = 2. Then G = A × B is a mutually permutable product of A and B, and G is 2-nilpotent. Moreover, 4 does not divide any conjugacy class size of elements in A ∪ B. However, O2 (G) = (O2 (G) ∩ A)(O2 (G) ∩ B) = D8 × C2 is not abelian. Regarding the claim “P ′ has order at most p” in Theorem 3.6, we get the next extension for factorised groups, as an immediate consequence of Theorem A: Corollary 3.9. Let G = AB be the product of the subgroups A and B. Assume that G is p-nilpotent, and that for all p-elements in the factors, p2 does not divide xG . If P is a Sylow p-subgroup of G, then P ′ 6 Φ(P ) 6 Z(P ), with P ′ elementary abelian of order at most p2 . 9 In particular, from this fact and Theorem B, we get [13, Theorem 7] as a corollary, taking G = A = B. Finally, we prove Theorem C, which is motivated by [2, Theorem 1.3]. Proof of Theorem C. Suppose that the result is false and let G be a counterexample of minimal order. Note that G cannot be simple. Since the class of p-supersoluble groups is a saturated formation, we may assume that there exists a unique minimal normal subgroup N of G, and that Φ(G) = 1. By the minimality of G, we get that G/N is p-supersoluble. Since G is p-soluble, it follows that N is either a p-group or a p′ -group. In the second case, since G/N verifies the thesis by minimality, we get a contradiction. Consequently, we may assume that N is p-elementary abelian and we must show that |N | = p. As Φ(G) = 1 and G is p-soluble with Op′ (G) = 1, by [7, A - 10.6] it follows that F(G) = Soc(G) = N = CG (N ), and also N = Op (G). Applying Theorem 2.4, we may assume that there exists a minimal normal subgroup Z/N of G/N such that Z/N 6 AN/N , so Z = Z ∩ AN = N (Z ∩ A). Since G/N is psoluble, it follows that Z/N is either a p-group or a p′ -group. The first case leads to Z/N 6 Op (G/N ) = Op (G/ Op (G)) = 1, a contradiction. Hence, we may assume that Z/N is a p′ -group. Let Q be a Sylow q-subgroup of Z ∩ A, where q 6= p is a prime (so Q is a Sylow q-subgroup of Z). Therefore Q ∼ = QN/N is a Sylow q-subgroup of Z/N , which acts faithfully on N . If 1 6= a ∈ Q 6 A, then N = [N, a]×CN (a). By the hypotheses, since p2 does not divide aG = |G : CG (a)|, then neither divides |N : CN (a)| = |[N, a]|, so either |[N, a]| = 1 or |[N, a]| = p. The first case leads to a ∈ CG (N ) = N , a contradiction. Thus, Lemma 2.5 yields QN/N is cyclic. Since this is valid for all primes q 6= p, we get by [10, 5.15] that Z/N is soluble. By the minimality of Z/N , it follows that (Z/N )′ = 1 and Z/N is abelian with cyclic Sylow subgroups. Consequently Z/N = hxN i, where x∈ / N and the order of xN is q, for some prime q 6= p. We may assume that x ∈ Z ∩ A and Z = N hxi. Hence CN (x) = CN (Z). By the minimality of N , we have either CN (Z) = N or CN (Z) = 1. The first case leads to x ∈ Z 6 CG (N ) = N , a contradiction. Therefore, since N = [N, x] × CN (x), it follows |N | = |[N, x]| = p, and this final contradiction establishes the theorem. Example 3.10. Let G be the symmetric group of degree 4. Then G = AB is a mutually permutable product, where A denotes the alternating group of degree 4 and B is a Sylow 2-subgroup of G, which verifies the hypotheses of Theorem C, for p = 3. 4 Square-free class sizes We begin this section with the proof of Theorem D. Proof of Theorem D. (1) Suppose that the result is false and let G be a counterexample of least possible order. Since G supersoluble, G/ F(G) is abelian, and so G′ 6 F(G). Moreover, the quotients of G inherit the hypotheses and the class of metabelian groups is a formation, so we may assume that there exists a unique minimal normal subgroup N of G with |N | = p, for some prime divisor p of |G|. 10 Hence, F(G) = Op (G) 6 P , a Sylow p-subgroup of G. Since G/ F(G) is abelian, P = Op (G) = F(G). Hence P = (P ∩ A)(P ∩ B), where P ∩ A and P ∩ B are Sylow p-subgroups of A and B respectively, by Lemma 2.2. Applying Theorem A, we have P ′ 6 Φ(P ) 6 Z(P ), and P ′ is elementary abelian of order at most p2 . Note that P ′ 6= 1, because G′ ≤ P . By Lemma 2.2, we may consider H a Hall p′ -subgroup of G, such that H = (H ∩ A)(H ∩ B), where H ∩ A and H ∩ B are Hall p′ -subgroups of A and B respectively. Moreover, H ∼ = G/ F(G) is abelian. Let x ∈ H ∩ A be a prime power order element. Since H 6 CG (x) 6 G, it follows by the hypotheses that xG ≤ p, and so Φ(G) 6 CG (x). Thus Φ(G) 6 CG (H ∩ A), and analogously for H ∩ B. Consequently we get P ′ 6 Φ(P ) 6 Φ(G) 6 CG (H). Since P ′ 6 Φ(P ) 6 Z(P ), it follows P ′ 6 Φ(P ) 6 Z(G). In particular, Φ(G) 6= 1 6= Z(G). If A, B 6 P , then G = P and G′ = P ′ 6 Z(G), a contradiction. Hence we have either H ∩ A 6= 1 or H ∩ B 6= 1. Assume H ∩ A 6= 1. Let QA be a Sylow q-subgroup of H ∩ A, for some prime q 6= p. Note that QA 66 Z(G), because Z(G) is a p-group. Let QA = QA Z(G)/ Z(G), which acts on P = P/ Z(G), which is elementary abelian because Φ(P ) 6 Z(G) 6 F(G) = P . Suppose w = w Z(G) ∈ CQA (P ). Then [w, y] = 1 for all y = y Z(G) ∈ P , so [w, y] ∈ Z(G) 6 P . Let k = o(w) denote the order of w. Thus [w, y]k = [wk , y] = 1. It follows [w, y] = 1 for all y ∈ P , so w ∈ CQA (P ) = CQA (F(G)) = 1. Then CQA (P ) = 1 and the action is faithful. Let 1 6= αq = αq Z(G) ∈ QA . Therefore P = [P , αq ] × CP (αq ), with [P , αq ] 6= 1. Moreover, [P , αq ] = P : CP (αq ) = P : CP (αq ) = |P : CP (αq )| , which divides αG q , because P is normal in G. Since H 6 CG (αq ) and αq is a non-central prime power order element in A, it follows αG q = p, and so [P , αq ] = p. ∼ Applying Lemma 2.5, we get that QA = QA is cyclic. Since this is valid for each prime divisor q of |H ∩ A|, we deduce that H ∩ A has cyclic Sylow subgroups, but it is abelian, so H ∩ A is cyclic. Analogously, if H ∩ B 6= 1, then it is cyclic. Let H ∩ A = hαi. Assume first that 1 6= α is a q-element, for some prime q, and that G = P hαi. By the above argument, hαi Z(G)/ Z(G) acts faithfully on P , and [P , α] = |P : CP (α)| = p. Let y ∈ P \ CP (α). If [y, α] = 1, then [y, α] ∈ Z(G) 6 P . Hence [y, α]o(α) = [y, αo(α) ] = 1, so [y, α] = 1 and y ∈ CP (α), a contradiction. Then [y, α] 6= 1, and since [P , α] = p, it follows [P , α] = h[y, α]i. Therefore we have [P, α] = [P , α] = h[y, α]i = h[y, α]i, so [P, α] 6 [P, α] Z(G) = h[y, α]i Z(G), and then G′ = P ′ [P, α] 6 h[y, α]i Z(G) which is abelian, a contradiction. Hence, we may assume that, for every prime q, if αq is the q-part of α, then P hαq i < G. Note that P hαq i is normal in G, and P hαq i = (P hαq i ∩ A)(P hαq i ∩ B). Therefore, by the minimality of G, it follows that (P hαq i)′ is abelian. Notice that (P hαq i)′ = P ′ [P, αq ], since P is normal in G. Let K = P ′ [P, αq ], which is an abelian normal subgroup of G, and let t ∈ [P, αq ] 6 K. Then Lemma 2.7 leads to |CG (αq )| < |CG ([t, αq ])|. If p divides [t, αq ]G we get a contradiction, because [t, αq ]G < αG q = p. Hence, P 6 CG ([t, αq ]) and [t, αq ] ∈ Z(P ), for each t ∈ [P, αq ]. By coprime action, P = [P, αq ] CP (αq ). Thus [P, αq ] = [[P, αq ] CP (αq ), αq ] = [P, αq , αq ]. If k is a generator of [P, αq , αq ], then k = [t, αq ] ∈ Z(P ) with t ∈ [P, αq ], so [P, αq ] = [P, αq , αq ] 6 Z(P ). Since this is valid for each 11 prime divisor q of the order of H ∩ A = hαi, we get: [P, H ∩ A] = [P, hαq1 i × · · · × hαqt i] = [P, αq1 ] · · · [P, αqt ] 6 Z(P ). Analogously, if H ∩ B 6= 1, then [P, H ∩ B] ≤ Z(P ). Since G′ = P ′ [P, H] = P ′ [P, H ∩ A][P, H ∩ B], we get G′ ≤ Z(P ). This final contradiction establishes statement (1). (2) Suppose that the second assertion is not true and let G be a counterexample of minimal order. We point out that the hypotheses are inherited by every quotient group of G and, by (1), G′ is abelian. There exists a prime divisor p of |G′ | such that G′ does not have any elementary abelian Sylow p-subgroup. By the minimality of G, we may consider that Op′ (G) = 1. Moreover, since G is supersoluble, then G/ F(G) is abelian, and F(G) = Op (G) = P is a normal Sylow p-subgroup of G such that G′ 6 P . Using Lemma 2.2 and Theorem A, we obtain respectively that P = (P ∩ A)(P ∩ B), and that P ′ is elementary abelian with P ′ 6 Φ(P ) 6 Z(P ). Let GN be the nilpotent residual of G. Note that GN 6= 1; in other case, G is a p-group and then G′ = P ′ , a contradiction. Since GN 6 G′ , it follows that GN is abelian. By using [7, III - 4.6, IV - 5.18], we have that GN is complemented in G, and its complements are precisely the Carter subgroups of G. Accordingly, G = GN H with H = NG (H) a nilpotent subgroup of G and GN ∩ H = 1. These facts yield G′ = GN × (H ∩ G′ ), and CGN (H) = 1. On the other hand, the minimality of G implies that G′ /GN ∼ = (H ∩ G′ ) is N N N elementary abelian, and thus G is not so. If CH (G ) 6= 1, since CH (G ) is normal in G, by the minimality of G we have (G/ CH (GN ))′ is an elementary abelian group, but (G/ CH (GN ))′ = G′ CH (GN )/ CH (GN ) = GN CH (GN )/ CH (GN ) ∼ = GN , which is a contradiction. Hence, CH (GN ) = 1. In particular, we deduce that Z(G) = 1. By Lemma 2.2, there exists a Hall p′ -subgroup H0 of G such that H0 = (H0 ∩ A)(H0 ∩ B). Let x ∈ H0 ∩ A be a non-trivial element of prime power order. Since H0 6 CG (x), it follows that xG ≤ p, and so Φ(G) 6 CG (x). Thus Φ(G) 6 CG (H0 ∩ A), and analogously for H0 ∩ B. Consequently, we get P ′ 6 Φ(P ) 6 Φ(G) 6 CG (H0 ). Since P ′ 6 Φ(P ) 6 Z(P ) and G = P H0 , it follows P ′ 6 Φ(P ) 6 Z(G) = 1, which implies that P is elementary abelian, the final contradiction. (3) Assume that the result is false and take G a counterexample of minimal order. Consider a prime p such that | F(G)′ |p > p2 . By minimality, we can affirm that Op′ (F(G)) = 1. Since G is supersoluble, we get that F(G) = Op (G) = P is a normal Sylow p-subgroup of G. Then, we apply both Lemma 2.2 and Theorem A to get the final contradiction. Example 4.1. Let G = A × B be the direct product of two symmetric groups of degree 3. Then G is supersoluble, and every element contained in each factor (not only those of prime power order) has square-free conjugacy class size, but neither the derived subgroup G′ nor G/ F(G) are cyclic, in contrast to [6, Theorem 2]. Example 4.2. In view of [6, Theorem 2], it is natural to wonder if we can affirm in the above result that the Sylow p-subgroups of G′ have order at most p2 . This fact is not further true, as we show: 12 Let G = A×B, where A = D14 is a dihedral group of order 14, and B = D14 ×[C7 ]C3 is the direct product of such a dihedral group and a semidirect product of a cyclic group of order 7 and a cyclic group of order 3 (B has identification number 294#9 in the Small groups library of GAP). Then G is supersoluble, and satisfies that all prime power order elements contained in each factor have square-free conjugacy class size, but G′ has order 73 . Now we proceed with the proof of Theorem E. Proof of Theorem E. Considering the smallest prime divisor of |G| and Theorem B, we conclude that G is soluble. Hence, it is p-soluble for each prime divisor p of |G|. Applying Theorem C, we get that G is p-supersoluble for each prime that divides |G|, so it is supersoluble. Now we prove the second assertion by induction on |G|. Let p be an arbitrary prime, and P be a Sylow p-subgroup of G. We want to show that P F(G)/ F(G) ∼ = P/ Op (G) is elementary abelian. Since G is supersoluble, we have that G/ F(G) is abelian. Moreover, we may assume by induction that Op (G) = 1. Therefore, we have that F(G) 6 H 6 G, where H is a Hall p′ -subgroup of G. Consequently, H is normal in G and G is p-nilpotent. Finally, by Theorem 3.4 the result is established. When considering in the above theorem all p-regular elements in the factors, we get as a corollary: Corollary 4.3. ([2, Corollary 1.5]) Let the group G = AB be the mutually permutable product of the subgroups A and B. Suppose that for every prime p and every p-regular element x ∈ A ∪ B, xG is not divisible by p2 . Then G is supersoluble. Example 4.4. Consider G = A × B, where A = Sym(3) is a symmetric group of degree 3, and B = Sym(3) × D10 is the direct product of such a symmetric group and a dihedral group of order 10. Then G satisfies the hypotheses of Theorem E. However there exists some 2-regular element in B, not of prime power order, such that 4 divides its conjugacy class size, so Corollary 4.3 cannot be applied. In the particular case when A and B are normal in G, we obtain [13, Proposition 9]. Corollary 4.5. Let A and B be normal subgroups of G such that G = AB. Suppose that xG is square-free for every element x of prime power order of A ∪ B. Then G is supersoluble. This development has its origins in the contributions of Chillag and Herzog [5, Theorem 1], and Cossey and Wang [6, Theorem 2]. Our next result Theorem F and Theorem D can be considered somehow extensions of the ones above for (mutually permutable) products. In fact, Theorem F provides further information on the Sylow subgroups of G/ F(G). Proof of Theorem F. Suppose the result is not true and let G be a counterexample of least order possible. Then if P is a Sylow p-subgroup of G, we have |P/ Op (G)| ≥ 13 p3 . We can assume by the minimality of G that Op (G) = 1 = Φ(G) = Z(G), so |P | ≥ p3 . By Lemma 2.2 we can choose P = (P ∩ A)(P ∩ B), with P ∩ A and P ∩ B Sylow p-subgroups of A and B respectively. By Theorem E, we have that G is supersoluble and G/ F(G) has elementary abelian Sylow subgroups. In particular, P F(G) is normal in G. Hence Lemma 2.3 (b) asserts that L = (P F(G) ∩ A)(P F(G) ∩ B) is normal in G, and it is a mutually permutable product. Moreover, P = (P ∩ A)(P ∩ B) 6 (P F(G)∩A)(P F(G)∩B) = L 6 P F(G). If we suppose L < G, by the minimality of G it follows |P/ Op (L)| = |P | ≤ p2 , a contradiction. Thus, we may assume L = G = P F(G), and so G is p-nilpotent. Let N be a minimal normal subgroup of G. We can assume without loss of generality that it is contained in A by Theorem 2.4. Note |N | = q 6= p. By Proposition 3.3 (1), it follows |Op (G/N )| ≤ p, and by the minimality of G we have |(P N/N )/ Op (G/N )| ≤ p2 . Since P ∼ = P N/N , we may assume |P | = p3 . As Φ(G) = 1, [[7], A - 10.6 Theorem] leads to F(G) = Soc(G). If N is the unique minimal normal subgroup of G, then P ∼ = NP (N )/ CP (N ) which is isomorphic to a subgroup of Aut(Cq ) ∼ = Cq−1 , so P is cyclic and elementary abelian, which implies that its order is p, a contradiction. Now we denote by T the product of all minimal normal subgroups of G distinct of N , so T 6= 1 and T ∩ N = 1. It follows F(G) = Soc(G) = N × T . We denote Q1 = Op (P N ) and Q2 = Op (P T ). Since P N ∼ = G/T (and P T ∼ = G/N ), by the minimality of G we may affirm Q1 6= 1 6= Q2 . On the other hand, since [Op (P N ), N ] 6 Op (P N ) ∩ N = 1, we have Q1 6 C1 = CP (N ) (analogously Q2 6 C2 = CP (T )). In addition, it follows C1 ∩ C2 6 CP (F(G)) 6 CG (F(G)) 6 F(G), so C1 ∩ C2 = 1. Let P0 be a Sylow psubgroup of CG (N ) such that P0 6 P . Hence P0 = C1 = CP (N ). In addition, since N = hxi where x is a q-element contained in A, by the hypotheses it follows that p2 does not divide xG p = |G : CG (x)|p = |P : C1 |. Moreover, since |P | = |P : C1 | · |C1 | = p3 , we may assume |C1 | ≥ p2 , and since 1 6= Q2 6 C2 , we have |C2 | ≥ p. Accordingly |C1 C2 | = |C1 | · |C2 | ≥ p3 , and since P is abelian, we have necessarily P = C1 × C2 . This leads to G = P F(G) = C1 C2 N T = (C1 T ) × (C2 N ). Suppose T ∩ A 6= 1, and let 1 6= y ∈ T ∩ A 6 C1 T ∩ A. Let 1 6= x ∈ N 6 A. Then since xy ∈ F(G) ∩ A and F(G) is abelian, we have that xy is a p-regular element, so by the hypotheses p2 does not divide (xy)G . As G is a direct product, we have (xy)G = xG y G . In addition, (N × C1 T ) 6 CG (x) 6 G, and therefore xG divides |G : (C1 T × N )| = |C2 | which is a p-number, so xG = p (recall that Z(G) = 1), and analogously y G = p, a contradiction. We conclude T ∩ A = 1. If F(G) = K × M with M normal in G and K a minimal normal subgroup of G contained in B, by similar arguments we can deduce M ∩ B = 1. This means, in particular, that neither A nor B can contain two distinct minimal normal subgroups of G. On the other hand, since F(G) is the unique p′ -Hall subgroup of G, Lemma 2.2 leads to F(G) = (F(G) ∩ A)(F(G) ∩ B). Moreover, since F(G) ∩ A = N T ∩ A = N (T ∩ A) = N , it follows F(G) = N (F(G) ∩ B). Note that (F(G) ∩ B) ∩ N 6 N with |N | = q so we distinguish two cases: either (F(G)∩ B)∩ N = N or (F(G)∩ B)∩ N = 1. In the first case 14 F(G) = F(G) ∩ B 6 B. Thus there exists another minimal normal subgroup contained in B and distinct of N , a contradiction. Hence we conclude (F(G) ∩ B) ∩ N = 1 so F(G) = N × (F(G) ∩ B). Now suppose that F(G) is a q-group. Then, since F(G) = Soc(G), it follows that F(G) is q-elementary abelian. In addition, P ∩ A acts faithfully over F(G). Let 1 6= x ∈ P ∩ A 6 A, then F(G) = [F(G), x] × CF(G) (x), with CF(G) (x) < F(G) since Z(G) = 1 and P is abelian. By the hypotheses, q 2 does not divide xG , and therefore it does not divide F(G) : CF(G) (x) . Thus we may affirm |[F(G), x]| = q. By Lemma 2.5 we conclude that P ∩ A is cyclic, and analogously P ∩ B is cyclic too. So they are both cyclic and elementary abelian, that is, they both have order p. Thus |P | = |(P ∩ A)(P ∩ B)| ≤ p2 , a contradiction. Hence we may suppose that there exists a prime r 6= q such that r divides |F(G)|. Let 1 6= R be a Sylow r-subgroup of F(G) ∩ B (so it is a Sylow r-subgroup of F(G)). Then 1 6= R = Or (G) 6 B, and since F(G) = Soc(G), necessarily we have that Or (G) is the product of the minimal normal subgroups of G with order r. Let M 6 B be one of those minimal normal subgroups. Arguing exactly in the same way as with N , it follows F(G) = M ×(A∩F(G)). But A∩F(G) = N so F(G) = N ×M with both minimal normal subgroups of G, N 6 A and M 6 B. Let P1 be a Sylow p-subgroup of CG (N ) = CG (x) such that P1 6 P . Then by the hypotheses we have xG p = |P : P1 | ≤ p. Since |P | = p3 , it follows |P1 | ≥ p2 . However, P1 is normal in P N so P1 6 Op (P N ) ∼ = Op (G/M ), and by Proposition 3.3 (1) we have |Op (G/M )| ≤ p. This final contradiction establishes the theorem. Example 4.6. Under the hypotheses of Theorem E (even under those of Theorem D), it is not possible to assure that G/ F(G) has Sylow p-subgroups of order at most p2 , as the following example shows: Let {p1 , p2 , . . . , pn } be a finite set of pairwise distinct odd primes, and let G = D2p1 × D2p2 × · · · × D2pn be the direct product of dihedral groups of order 2pi , 1 ≤ i ≤ n. Then G = A×B is a mutually permutable product of A = D2p1 and B = D2p2 ×· · ·×D2pn , and each prime power order element contained in the direct factors has square-free conjugacy class size. However, G/ F(G) has order 2n . References [1] B. Amberg, S. Franciosi and F. de Giovanni: University Press, New York, 1992. Products of groups. Oxford [2] A. Ballester-Bolinches, J. Cossey and Y. Li: Mutually permutable products and conjugacy classes. Monatsh. Math. 170 (2012) 305–310. [3] A. Ballester-Bolinches, R. Esteban-Romero and M. Asaad: Products of finite groups. Vol. 53 of de Gruyter Expositions in Mathematics, Berlin, 2010. [4] J. C. Beidleman and H. Heineken: Group classes and mutually permutable products. J. Algebra 297 (2006) 409–416. 15 [5] D. Chillag and M. Herzog: On the length of the conjugacy classes of finite groups. J. Algebra 131 (1990) 110–125. [6] J. Cossey and Y. Wang: Remarks on the length of conjugacy classes of finite groups. Commun. Algebra 27 (1999) 4347–4353. [7] K. Doerk and T. Hawkes: Finite Soluble Groups. Vol. 4 of de Gruyter Expositions in Mathematics, Berlin, 1992. [8] The GAP Group: GAP – Groups, Algorithms, and Programming. http://www.gap-system.org, Version 4.7.7, 2015. [9] B. Huppert: Endliche Gruppen I. Springer-Verlag, Berlin, 1967. [10] I. M. Isaacs: Finite Group Theory. American Mathematical Society, USA, 2008. [11] H. G. Knoche: Über den Frobeniusschen Klassenbegriff in nilpotenten Gruppen. Math. Z. 55 (1951) 71–83. [12] S. Li: On the class length of elements of prime power order in finite groups. Guangxi Sci. 6(1) (1999) 12–13. [13] X. Liu, Y. Wang and H. Wei: Notes on the length of conjugacy classes of finite groups. J. Pure Appl. Algebra 196 (2005) 111–117. [14] G. Qian and Y. Wang: On conjugacy class sizes and character degrees of finite groups. J. Algebra Appl. 13 (2014) 1350100-1–9. 16
4
A deep learning model integrating FCNNs and CRFs for brain tumor segmentation Xiaomei Zhao1,2, Yihong Wu1, Guidong Song3, Zhenye Li4, Yazhuo Zhang,3,4,5,6 , and Yong Fan7 National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences 1 2 3 4 Beijing Neurosurgical Institute, Capital Medical University, Beijing, China Department of Neurosurgery, Beijing Tiantan Hospital, Capital Medical University, Beijing, China 5 6 7 University of Chinese Academy of Sciences, Beijing, China Beijing Institute for Brain Disorders Brain Tumor Center, Beijing, China China National Clinical Research Center for Neurological Diseases, Beijing, China Department of Radiology, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA, USA *Correspondence to: Dr. Yihong Wu National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing, 100190, China Email: [email protected] Or Dr. Yong Fan Department of Radiology Perelman School of Medicine University of Pennsylvania Philadelphia, PA 19104, USA Email: [email protected]; [email protected] Tel: +1 215-746-4065 1 1 This article was accepted in the journal Medical Image Analysis. Please cite this article as: X. Zhao et al., A deep learning model integrating FCNNs and CRFs for brain tumor segmentation, Medical Image Analysis, Volume 43, January 2018, Pages 98-111. http://doi.org/10.1016/j.media.2017.10.002 1 ABSTRACT Accurate and reliable brain tumor segmentation is a critical component in cancer diagnosis, treatment planning, and treatment outcome evaluation. Build upon successful deep learning techniques, a novel brain tumor segmentation method is developed by integrating fully convolutional neural networks (FCNNs) and Conditional Random Fields (CRFs) in a unified framework to obtain segmentation results with appearance and spatial consistency. We train a deep learning based segmentation model using 2D image patches and image slices in following steps: 1) training FCNNs using image patches; 2) training CRFs as Recurrent Neural Networks (CRF-RNN) using image slices with parameters of FCNNs fixed; and 3) fine-tuning the FCNNs and the CRF-RNN using image slices. Particularly, we train 3 segmentation models using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine them to segment brain tumors using a voting based fusion strategy. Our method could segment brain images slice-by-slice, much faster than those based on image patches. We have evaluated our method based on imaging data provided by the Multimodal Brain Tumor Image Segmentation Challenge (BRATS) 2013, BRATS 2015 and BRATS 2016. The experimental results have demonstrated that our method could build a segmentation model with Flair, T1c, and T2 scans and achieve competitive performance as those built with Flair, T1, T1c, and T2 scans. Index Terms— Brain Tumor Segmentation, Fully Convolutional Neural Networks, Conditional Random Fields, Deep learning 1. Introduction Accurate brain tumor segmentation is of great importance in cancer diagnosis, treatment planning, and treatment outcome evaluation. Since manual segmentation of brain tumors is laborious [1], an enormous effort has devoted to the development of semi-automatic or automatic brain tumor segmentation methods. Most of the existing brain tumor segmentation studies are focusing on gliomas that are the most common brain tumors in adults and can be measured by Magnetic Resonance Imaging (MRI) with multiple sequences, such as T2-weighted fluid attenuated inversion recovery (Flair), T1-weighted (T1), T1-weighted contrast-enhanced (T1c), and T2-weighted (T2). The segmentation of gliomas based on MRI data is challenging for following reasons: 1) gliomas may have the same appearance as gliosis and stroke in MRI data [2]; 2) gliomas may appear in any position of the brain with varied shape, appearance and size; 3) gliomas invade the surrounding brain tissues rather than displacing them, causing fuzzy boundaries [2]; and 4) intensity inhomogeneity of MRI data further increases the difficulty. The existing automatic and semi-automatic brain tumor segmentation methods can be broadly categorized as either generative model based or discriminative model based methods [3]. The generative model based brain tumor segmentation methods typically require prior information, which could be gained through probabilistic image atlases [4-6]. Based on probabilistic image atlases, the brain tumor segmentation problem can be modeled 2 as an outlier detection problem [7]. On the other hand, the discriminative model based methods solve the tumor segmentation problem in a pattern classification setting, i.e., classifying image voxels as tumor or normal tissues based on image features. The performance of discriminative model based segmentation methods are hinged on the image features and classification algorithms. A variety of image features have been adopted in tumor segmentation studies, including local histograms [8], image textures [9], structure tensor eigenvalues [10], and so on. The most commonly adopted pattern classification algorithms in brain tumor segmentation studies are support vector machines (SVMs) [11-13] and random forests [8-10, 14]. More recently, deep learning techniques have been adopted in brain tumor segmentation studies following their success in general image analysis fields, such as images classification [15], objects detection[16], and semantic segmentation [17-19]. Particularly, Convolutional Neural Networks (CNNs) were adopted for brain tumor image segmentation in the Multimodal Brain Tumor Image Segmentation Challenge (BRATS) 2014 [20-22]. More deep learning based brain tumor segmentation methods were presented in the BRATS 2015 and different deep learning models were adopted, including CNNs [23-25], convolutional restricted Boltzman machines [26], and Stacked Denoising Autoencoders [27]. Among the deep learning based tumor segmentation methods, the methods built upon CNNs have achieved better performance. Particularly, both 3D-CNNs [22, 28, 29] and 2D-CNNs [20, 21, 23-25, 30, 31] models were adopted to build tumor segmentation methods. Although 3D-CNNs can potentially take full advantage of 3D information of the MRI data, the network size and computational cost are increased too. Therefore, 2D-CNNs have been widely adopted in the brain tumor segmentation methods. Davy et al. proposed a deep learning method with two pathways of CNNs, including a convolutional pathway and a fully-connected pathway [21]. Dvorak et al. modeled the multi-class brain tumor segmentation task as 3 binary segmentation sub-tasks and each sub-task was solved using CNNs [23]. Very deep CNNs [32] were adopted to segment tumors by Pereira et al. [25]. Most of these brain tumor segmentation methods train CNNs using image patches, i.e., local regions in MR images. These methods classify each image patch into different classes, such as healthy tissue, necrosis, edema, non-enhancing core, and enhancing core. The classification result of each image patch is used to label its center voxel for achieving the tumor segmentation. Most of the above CNN brain tumor segmentation methods assumed that each voxel’s label is independent, and they didn’t take the appearance and spatial consistency into consideration. To take the local dependencies of labels into account, Havaei et al. constructed a cascaded architecture by taking the pixel-wise probability segmentation results obtained by CNNs trained at early stages as additional input to their following CNNs [24, 30]. To take into consideration appearance and spatial consistency of the segmentation results, Markov Random Fields (MRFs), particularly Conditional Random Fields (CRFs), have been integrated with deep learning techniques in image segmentation studies, either used as a post-process step of CNNs [28, 33] or formulated as neural networks [18, 19]. In the latter setting, both CNNs and MRFs/CRFs can be trained with 3 back-propagation algorithms, tending to achieve better segmentation performance. Multiple 2D CNNs could be integrated for segmenting 3D medical images. In particular, Prasoon et al. proposed a triplanar CNN [34] for knee cartilage segmentation. The triplanar network used 3 CNNs to deal with patches extracted from xy, yz and zx planes and fused them using a softmax classifier layer. Fritscher et al. proposed a pseudo 3D patch-based approach [35], consisting of 3 convolutional pathways for image patches in axial, coronal, and sagittal views respectively and fully connected layers for merging them. Setio et al. used multi-view convolutional networks for pulmonary nodule detection [36]. Their proposed network architecture composed multiple streams of 2D CNNs, each of which was used to deal with patches extracted in a specific angle of the nodule candidates. The outputs of the multiple streams of 2D CNNs were finally combined to detect pulmonary nodules. However, all these methods built CNNs upon image patches, not readily extendable for building FCNNs. Preprocessing of MRI data plays an important role in the discriminative model based tumor segmentation methods that assume different MRI scans of the same modality have comparable image intensity information. The intensities of different MRI scans can be normalized by subtracting their specific mean values and dividing by their specific standard deviation values or by matching histograms [10, 22]. However, the mean values of intensities of different MRI scans do not necessarily correspond to the same brain tissue, and the histogram matching might not work well for tumor segmentation studies [8]. A robust intensity normalization has been adopted in tumor segmentation studies by subtracting the gray-value of the highest histogram bin and normalizing the standard deviation to be 1 [8]. Inspired by the success of deep learning techniques in medical image segmentation, we propose a new brain tumor segmentation method by integrating Fully Convolutional Neural Networks (FCNNs) and CRFs in a unified framework. Particularly, we formulate the CRFs as Recurrent Neural Networks [18], referred to as CRF-RNN. The integrative model of FCNNs and CRF-RNN is trained in 3 steps: 1) training FCNNs using image patches; 2) training CRF-RNN using image slices with parameters of FCNNs fixed; and 3) fine-tuning the whole network using image slices. To make use of 3D information provided by 3D medical images, we train 3 segmentation models using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine them to segment brain tumors using a voting based fusion strategy. The proposed method is able to segment brain images slice-by-slice, which is much faster than the image patch based segmentation methods. Our method could achieve competitive segmentation performance based on 3 MR imaging modalities (Flair, T1c, T2), rather than 4 modalities (Flair, T1, T1c, T2) [3, 8-10, 14, 20-31], which could help reduce the cost of data acquisition and storage. We have evaluated our method based on imaging data provided by the Multimodal Brain Tumor Image Segmentation Challenge (BRATS) 2013, the BRATS 2015, and the BRATS 2016. The experimental results have demonstrated that our method could achieve promising brain tumor segmentation performance. Preliminary results have been reported in a conference proceeding paper of the BRATS 2016 [37]. 4 2. Methods and materials 2.1 Imaging data All the imaging data used in this study were obtained from the BRATS 20132, the BRATS 20153 and the BRATS 20164. The BRATS 2013 provided clinical imaging data of 65 glioma patients, including 14 patients with low-grade gliomas (LGG) and 51 patients with high-grade gliomas (HGG). The patients were scanned with MRI scanners from different vendors at 4 different centers, including Bern University, Debrecen University, Heidelberg University, and Massachusetts General Hospital. Each patient had multi-parametric MRI scans, including T2-weighted fluid attenuated inversion recovery (Flair), T1-weighted (T1), T1-weighted contrast-enhanced (T1c), and T2-weighted (T2). All the MRI scans of the same patient were rigidly co-registered to their T1c scan and resampled at 1 mm isotropic resolution in a standardized axial orientation with a linear interpolator [3]. All images were skull stripped. Ground truths were produced by manual annotations. The cases were split into training and testing sets. The training set consists of 20 HGG and 10 LGG cases. The testing set consists of Challenge and Leaderboard subsets. The Challenge dataset has 10 HGG cases and the Leaderboard dataset contains 21 HGG and 4 LGG. The imaging dataset provided by BRATS 2015 contains imaging data obtained from the BRATS 2012, 2013, and the NIH Cancer Imaging Archive (TCIA). Each case has Flair, T1, T1c, and T2 scans aligned onto the same anatomical template space and interpolated at 1 mm3 voxel resolution. The testing dataset consists of 110 cases with unknown grades, and the training dataset consists of 220 HGG and 54 LGG cases. In the testing dataset, the ground truth of each case was produced by manual annotation. In the training dataset, all the cases from the BRATS 2012 and 2013 were labeled manually, and the cases from the TCIA were annotated by fusing segmentation results obtained using top-ranked methods of the BRATS 2012 and 2013. The annotations were inspected visually and approved by experienced raters. The tumor labels of the training cases are provided along with their imaging scans, while only imaging data are provided for the testing cases for blind evaluation of the segmentation results. BRATS 2016 shares the same training dataset with BRATS 2015, which consists of 220 HGG and 54 LGG. Its testing dataset consists of 191 cases with unknown grades. The ground truth of each testing case was produced by manual annotation, not released to the competition participants. 2.2 Brain tumor segmentation methods based on FCNNs trained using image patches Deep learning techniques, particularly CNNs, have been successfully adopted in image segmentation studies. A deep learning model of CNNs usually has millions or even billions of parameters. To train the deep CNNs with sufficient training samples, image patch-based techniques are adopted [20-25, 28, 30, 31, 38-40]. With the image 2 3 4 https://www.virtualskeleton.ch/BRATS/Start2013 https://www.virtualskeleton.ch/BRATS/Start2015 https://www.virtualskeleton.ch/BRATS/Start2016 5 patch based representation, the image segmentation problem can be solved as a classification problem of image patches. An image patch is a local region extracted from an image to characterize its central pixel/voxel in 2D/3D, and has the same label as its center pixel/voxel’s label in the classification problem. In the training phase, a large number of image patches can be extracted to train the CNNs. In the testing phase, image patches extracted from a testing image are classified one by one by the trained CNNs. Then, the classification results of all image patches make up a segmentation result of the testing image. However, FCNNs can segment a testing image slice by slice with improved computational efficiency [30], even though the model is trained using image patches. Since the number and location of training image patches for each class can be easily controlled by changing the image patch sampling scheme, image patch-based deep learning segmentation methods can avoid the training sample imbalance problem. However, a limitation of image patch-based segmentation methods is that relationship among image patches is typically lost. Integrating CRF-RNN with FCNNs tends to overcome such a limitation in tumor segmentation. 2.3 The proposed brain tumor segmentation method The proposed brain tumor segmentation method consists of 4 main steps: pre-processing, segmenting image slices using deep learning models with integrated FCNNs and CRF-RNN from axial, coronal and sagittal views respectively, fusing segmentation results obtained in the three different views, and post-processing. 2.3.1 Pre-processing of the imaging data Since MRI scans typically have varied intensity ranges and are affected by bias fields differently, we adopted a robust intensity normalization method to make MRI scans of different patients comparable, besides correcting the bias field of MRI data using N4ITK [41]. Our normalization method is built upon the image mode based method [8], which normalizes image intensity by subtracting the image mode (e.g. the gray-value of the highest histogram bin) and normalizing the standard deviation to be 1. As almost half of the brain is the whiter matter [42], the gray-value of the highest histogram bin typically corresponds to the gray-value of the white matter, and therefore matching intensity values of the white matter across MRI scans and normalizing the intensity distributions accordingly would largely make different MRI scans comparable. However, the standard deviation calculated based on intensity mean value does not necessarily have a fixed tissue meaning. Therefore, in our study a robust intensity deviation is adopted to replace the standard deviation used in [8]. The robust deviation is computed based on the gray-value of the highest histogram bin, representing the discreteness of intensity to the gray-value of white matter. Besides, the intensity mean is more sensitive to noise than the gray value of the highest histogram bin. Thus the standard deviation calculated based on intensity mean is more sensitive to noise than the robust deviation. Given an MRI scan with voxels { , ,⋯, } , and each voxel has intensity , V , ,⋯, , the 6 robust deviation V V , where denotes the gray-value of the highest histogram bin. Our intensity normalization procedure is following: Step 1. Transform the intensity range to 0-255 linearly. Step 2. Calculate the intensity histogram, with 256 bins. Step 3. Subtract the gray-value of the highest histogram bin and divide the robust deviation . Step 4. Multiply each voxel’s intensity by a constant σ and plus a constant are below 0 or above 255 to 0 and 255 respectively. In the present study, we set . Then, set the intensities that and equal to the gray-value of the highest histogram bin and robust deviation of NO. 0001 HGG clinical training image data of BRATS 2013, which has been pre-processed by N4ITK and the step 1. For the Flair, T1c, and T2 scans, =30, 31, 37 and =75, 99, 55 respectively. The image intensity normalization effect is illustrated with T2 scans in Fig. 1. Particularly, we randomly selected 3 subjects from the BRATS 2013 and 3 subjects from the BRATS 2015. The results shown in Fig. 1 clearly demonstrated that the image intention normalization could improve comparability of different scans. The improvement is further confirmed by image intensity histograms of 30 subjects from the BRATS 2013 training dataset, as shown in Fig.2. Fig.1. T2 scans before (top row) and after (bottom row) the proposed intensity normalization. (a-1)-(a-3) and (b-1)-(b-3) are randomly selected subjects from the BRATS 2013, and (a-4)-(a-6) and (b-4)-(b-6) are randomly selected subjects from the BRATS 2015. (a-1)-(a-6): before normalization; (b-1)-(b-6): after normalization. All the scans were preprocessed by N4ITK and the proposed normalization step 1. Fig.2. Image intensity histograms of T2 scans of 30 subjects from the BRATS 2013 training dataset before (left) and after (right) the intensity normalization. All the scans were preprocessed by N4ITK and the proposed normalization step 1. 2.3.2 A deep learning model integrating FCNNs and CRFs The proposed deep learning model for brain tumor segmentation integrates Fully Convolutional Neural Networks 7 (FCNNs) and Conditional Random Fields (CRFs), as illustrated by Fig. 3. We formulated CRFs as Recurrent Neural Networks (RNNs), referred to as CRF-RNN [18]. The proposed method could segment brain images slice by slice. Fig.3. Flowchart of the proposed deep learning model integrating FCNNs and CRFs for brain tumor segmentation. (1) FCNNs The structure of our proposed FCNNs is illustrated by Fig. 4. Similar to the network architectures proposed in [28, 30], the inputs to our network are also in 2 different sizes. Passing through a series of convolutional and pooling layers, the larger inputs turn into feature maps with the same size of smaller inputs. These feature maps and smaller inputs are sent into following networks together. In this way, both local image information and context information in a larger scale can be taken into consideration for classifying image patches. Different from the cascaded architecture proposed in [30], the two branches in our FCNNs are trained simultaneously, rather than trained in different steps. Furthermore, our model has more convolutional layers. Our deep FCNNs are trained using image patches, which are extracted from slices of the axial view, coronal view or sagittal views randomly. Equal numbers of training samples for different classes are extracted to avoid data imbalance problem. There are 5 classes in total, including healthy tissue, necrosis, edema, non-enhancing core, and enhancing core. As shown in Fig. 4, in our deep FCNNs, the kernel size of each max pooling layer is set to , and the size of image patches used to train FCNNs is proportional to the kernel size. Different settings of the kernel size or equivalently the image patch size may affect the tumor segmentation performance. The max pooling layers of our FCNNs are used to capture image information in large scales with a relatively small number of network parameters. We set the stride of each layer to be 1. Therefore, in the testing stage, our model can segment brain images slice by slice. 8 Fig.4. The network structure of our deep FCNNs. (2) CRF-RNN CRF-RNN formulates 2D fully connected Conditional Random Fields as Recurrent Neural Networks [18]. Given a 2D image , comprising a set of pixels { V ,…,u} , the image segmentation problem is solved as an optimization problem using fully connected CRFs by minimizing an energy function [43] : u V V where ,h, is a certain label assignment to , ,h denotes the assignment of label to pixel h, measures the cost of assigning label assigning label and jointly to and to pixel V ,h, h denotes the probability of assigning label Differentiating Eqn. (2) with respect to , h (1) denotes the assignment of label to pixel , and the pairwise term to [19], minimizing to pixel h,h h measures the cost of , h where V V th V is the number of Gaussian kernel; coordinates of h and ( and h, , h , h , , V (3) }, h h , and h h is defined , is a Gaussian kernel, denote the intensity of and (2) , which is the variable that we aim to estimate. as h h equals to minimizing an energy , h , can be obtained from the FCNNs, and the pairwise potential , , and setting the differentiation result equal to 0, we have th { The unary term , V { , ,⋯, } are segmentation labels, the unary term , h . According function: where { ,…,u}, h (4) V exp respectively, are parameters of the Gaussian kernels); h and h h and denote spatial is a weight for the 9 Gaussian kernel intensity ( , h) ; and denote image feature vectors of h and spatial position information ( , h ); Substituting (4) into (3), we get: , , th { V and indicates the compatibility of labels , h Fully connected CRF predicts the probability of assigning label respectively, encoding their h to pixel h and . (5) }. h according to Eqn. (5), and can be calculated using a mean field iteration algorithm formulated as Recurrent Neural Networks so that CNNs and the fully connected CRF are integrated as one deep network and can be trained using a back-propagation algorithm [18]. Fig. 5 shows the network structure of CRF-RNN. G and G in Fig. 5 are two gating functions: V where output V{ , ,…,u , of one mean-field iteration; output of FCNNs, and and t th th Vt V t t V , t , , V denotes the input }, h t , t , V , , h provided by Flair, T1c and T2 slices with t denotes the final prediction results of CRF-RNN. denotes the that after softmax operation. represents the V t, V t while t denotes the denotes the mean-field iteration, is the output of FCNNs, are computed based on pixel features V h , (6) (7) of one mean-field iteration; is the total number of mean-field iterations. In our study, the unary term and the pairwise potential , and and h with information are learned in the training phase [18]. By integrating FCNNs and CRF-RNN in one deep network, we are able to train the network end-to-end with a typical back-propagation algorithm [18]. Fig.5. The network structure of CRF-RNN. (3) The integration of FCNNs and CRF-RNN The proposed brain tumor segmentation network consists of FCNNs and CRF-RNN. The FCNNs predict the 10 probability of assigning segmentation labels to each pixel, and the CRF-RNN takes the prediction results and image information as its input to globally optimize appearance and spatial consistency of the segmentation results according to each pixel’s intensity and position information. The proposed deep learning network of FCNNs and CRF-RNN is trained in 3 steps: 1) training FCNNs using image patches; 2) training CRF-RNN using image slices with parameters of FCNNs fixed; and 3) fine-tuning the whole network using image slices. Once the fine-tune of deep learning based segmentation model is done, the model can be applied to image slices one by one for segmenting tumors. Given an t image slice with 3 channels, i.e., pre-processed Flair, T1c, and T2 scans respectively, we first pad the image slice with zeros to create 2 larger images with sizes of t t t t and tG h t tG h t respectively. Using these 2 larger images as inputs of the FCNNs, we obtain 5 label predication images , , , ,h , V , ,t,G,橔, V {h ,h , , ,th}, with the same size of the original image slices. h ,h represents one pixel’s predicted probability of brain tissue labels, such as healthy tissue, necrosis, edema, non-enhancing core or enhancing core. Then, these label predication images V{ V , ,t,G,橔} along with the image slice V { h, h, } are used as inputs to the CRF-RNN. Finally, the CRF-RNN obtains a globally optimized segmentation result of the original image slice. Fig. 3 shows the flowchart of the proposed deep learning model integrating FCNNs and CRF-RNN for brain tumor segmentation. In the training steps 2 and 3, we first calculate softmax loss according to the current segmentation results and the ground truth, and then the loss information is back-propagated to adjust network parameters of the integrated FCNNs and CRF-RNN. In the training step 2, we fix FCNNs and adjust the parameters in CRF-RNN. In the training step 3, we set a small learning rate and fine-tune the parameters of the whole network. In our experiments, the initial learning rate was set to 橔 and the learning rate was divided by 10 after each 20 epoches in the training step 1, and the learning rate was set to ㌳ and respectively in the training steps 2 and 3. 2.3.3 Fusing segmentation results obtained in axial, coronal and sagittal views We train 3 segmentation models using patches and slices of axial, coronal and sagittal views respectively. During testing, we use these 3 models to segment brain images slice by slice in 3 different views, yielding 3 segmentation results. A majority voting strategy is adopted to fuse the segmentation results. Let h , hh , and h denote the segmentation results of one voxel gotten in axial, coronal and sagittal views respectively, let h denote the segmentation result after fusion, let , , ,t,G denote a voxel labeled as healthy tissue, necrosis, edema, non-enhancing core, and enhancing core respectively, the fused segmentation result is obtained by following voting procedure: Step 1. If two or more than two of h , hh, and h are above 0, let h V . Step 2. If two or more than two of h , hh, and h equal to 1, let h V . 11 Step 3. If two or more than two of h , hh, and h equal to 3, let h V t. Step 4. If two or more than two of h , hh, and h equal to 4, let h V G. 2.3.4 Post-processing To further improve the brain tumor segmentation performance, a post-processing method is proposed. Hereinafter, h, h, denote pre-processed Flair, T1c, T2 MR images respectively, result obtained by our integrated deep learning model, denote the value of voxel t, , the voxel h h, h, , and , t, , h respectively, t, , , t, , , and t, , V , , ,t,G indicates that t, , is labeled as healthy tissue, necrosis, edema, non-enhancing core, and enhancing core t, , respectively, u in in h denotes the segmentation h and and u denote the average intensity of the whole tumor region indicated by scans. For a segmentation result t denote the average intensity of the with 3D connected tumor regions, 3D connected tumor area in h The post-processing method consists of following step: Step 1. If and h t to be 0 so that the t , set all voxels in the 3D connected tumor region is removed from and h and respectively. 3D connected tumor area in , taking into consideration that isolated local areas with super high intensities are usually caused by imaging noise rather than tumors. In the present study, V 橔 . V Step 2. If a voxel t, , ① set t, , h t, , V . satisfies the following conditions at the same time: h ,② u h , ③ t, , t, , , ④ u t t, , G, In general, tumor tissues have high signal in at least one modality of Flair, T1c, and T2. Voxels with low signal in Flair, T1c, and T2 at the same time are generally not tumor tissues. Thus, this step removes those segmented tumor regions whose intensities in Flair, T1c, T2 are below 3 thresholds respectively. However, enhancing core is an exception. In the present study, Step 3. Let t denote the volume of the V h㌳, t volume of the maximum 3D connected tumor area in connected segmented tumor region in Step 5. If h t, , G . In the present study, and t, , 橔, t V h . 3D connected tumor area in . If t Step 4. Fill the holes in Re s with necrosis. Holes in V t V h . t . t t t , remove the t is the t 3D are very likely to be necrosis. V G , set t, , V . Our model may mistakenly label necrosis areas as enhancing core. This step corrects this potential mistake through a threshold in T1c. In the present study, Step 6. Let G V t the whole tumor. If . denote the volume of enhancing core represented in t t h , h t, , h , and t, , , and V , set t denote the volume of t, , V t . Our tumor segmentation model is not sensitive to non-enhancing core. In our model, non-enhancing regions might be 12 mistakenly labeled as edema, especially when the enhancing core region is very small. In the present study, h 橔, h V ㌳橔. h V The parameters were set based on the BRATS 2013 dataset. Since the number of training cases of the BRATS 2013 is small, we did not cross-validate the parameters, therefore they are not necessarily optimal. We used the same parameters in all of our experiments, including our experiments on BRATS 2013, 2015 and 2016. In addition to the aforementioned post-processing steps, we could also directly use CRF as a post-processing step of FCNNs as did in a recent study [28]. 3. Experiments Our experiments were carried out based on imaging data provided by the BRATS 2013, 2015 and 2016 on a computing server with multiple Tesla K80 GPUs and Intel E5-2620 CPUs. However, only one GPU and one CPU were useable at the same time for our experiments. Our deep learning models were built upon Caffe [44]. Based on the BRATS 2013 data, a series of experiments were carried out to evaluate how different implementation of the proposed method affect tumor segmentation results with respect to CRF, post-processing, image patch size, number of training image patches, pre-processing, and imaging scans used. We also present segmentation results obtained for the BRATS 2013. The segmentation model was built upon the training data and then evaluated based on the testing data. Since no ground truth segmentation result for the testing data was provided, all the segmentation results were evaluated by the BRATS evaluation website. The tumor segmentation performance was evaluated using the BRATS segmentation evaluation metrics for complete tumor, core region, and enhancing region, including Dice, Positive Predictive Value (PPV), and Sensitivity. Particularly, the complete tumor includes necrosis, edema, non-enhancing core, and enhancing core; the core region includes necrosis, non-enhancing core, and enhancing core; and the enhancing region only includes the enhancing core. The tumor segmentation evaluation metrics are defined as follows: where h V , indicates complete, core or enhancing region, segmented region, and , , V , , V , denotes the manually labeled region, denotes the overlap area between and , and and denotes the denote the areas of respectively. 3.1. Experiments on BRATS 2013 dataset The BRATS 2013 training dataset contains 10 LGG and 20 HGG. Its testing dataset consists of two subsets, namely Challenge and Leaderboard. The Challenge dataset has 10 HGG cases and the Leaderboard dataset contains 21 HGG and 4 LGG. A number of experiments were carried out based on the BRATS 2013 dataset, including 1) comparing the segmentation performance of FCNNs with and without post-processing, and the performance of the proposed deep learning network integrating FCNNs and CRF-RNN (hereinafter referred to as FCNN+CRF) with and 13 without post-processing, in order to validate the effectiveness of CRFs and post-processing; 2) evaluating the segmentation performance of FCNN+CRF with 5 post-processing steps (6 post-processing steps in total), in order to test the effectiveness of each post-processing step; 3) evaluating the segmentation performance of FCNNs trained using different sizes of patches; 4) evaluating the segmentation performance of FCNNs trained using different numbers of patches; 5) comparing the segmentation performance of segmentation models built upon scans of 4 imaging sequences (Flair, T1, T1c, and T2) and 3 imaging sequences (Flair, T1c, and T2); and 6) evaluating how the image preprocessing step affect the segmentation performance. All the above experiments were performed in axial view. Apart from these experiments described above, we show the effectiveness of fusing segmentation results of three views in Section 3.1.7 and summarize comparison results with other methods in Section 3.1.8. 3.1.1. Evaluating the effectiveness of CRFs and post-processing Table 1 shows the evaluation results of FCNNs with and without post-processing, and FCNN+CRF (our integrated network of FCNNs and CRF-RNN) with and without post-processing on the BRATS 2013 Challenge dataset and Leaderboard dataset. These results demonstrated that CRFs improved the segmentation accuracy and so did the post-processing. With respect to both Dice and PPV, FCNN+post-process and FCNN+CRF improved the segmentation performance in all complete tumor, core region, and enhancing region. However, CRFs and post-process reduced Sensitivity. It is worth noting that CRFs improved Sensitivity of the enhancing region. In summary, CRFs improved both the Dice and PPV and decreased the Sensitivity on the complete and core regions, FCNN+CRF+post-process obtained the best performance with respect to Dice and PPV, but degraded the performance with respect to the Sensitivity, especially on the complete tumor region. We also adopted a 3D CRF based post-processing step as did in a recent study [28]. Particularly, the parameters of the 3D CRF were optimized by grid searching based on the training dataset of BRATS 2013. Table 1 summarizes segmentation scores obtained by our method with different settings. These results indicated that 3D CRF as a post-processing step could improve the segmentation performance as 3D information was taken into consideration. However, our proposed post-processing procedure could further improve the segmentation performance. Fig. 6 shows representative segmentation results on the BRATS 2013 Challenge dataset. These segmentation results demonstrated that FCNN+CRF could improve the spatial and appearance consistence of segmentation results, and FCNN+CRF+post-process could reduce false positives. Table 1. Evaluation results of FCNNs with and without post-processing, FCNN+CRF with and without post-processing, and FCNN+3D-CRF with and without post-processing. (The sizes of image patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20. FCNN+CRF is short for the integrated network of FCNNs and CRF-RNN) Dataset Methods Challenge FCNNs FCNN+post-process Dice complete core 0.74 0.81 0.72 0.75 PPV enhancing complete 0.67 0.73 0.62 0.73 core 0.63 0.70 Sensitivity enhancing complete 0.60 0.73 0.94 0.94 core enhancing 0.86 0.85 0.77 0.74 14 Leaderboard FCNN+CRF FCNN+CRF+post-process FCNN+3D-CRF FCNN+3D-CRF +post-process FCNNs FCNN+post-process FCNN+CRF FCNN+CRF+post-process FCNN+3D-CRF FCNN+3D-CRF +post-process 0.85 0.87 0.85 0.80 0.83 0.80 0.70 0.76 0.73 0.87 0.92 0.84 0.80 0.87 0.78 0.63 0.77 0.69 0.84 0.83 0.88 0.81 0.81 0.83 0.80 0.77 0.80 0.87 0.83 0.78 0.89 0.85 0.78 0.86 0.83 0.79 0.70 0.81 0.83 0.86 0.84 0.61 0.65 0.66 0.73 0.65 0.54 0.61 0.57 0.62 0.61 0.58 0.74 0.85 0.89 0.81 0.57 0.63 0.71 0.76 0.71 0.49 0.62 0.50 0.64 0.57 0.96 0.94 0.85 0.84 0.90 0.74 0.78 0.69 0.78 0.71 0.67 0.66 0.71 0.68 0.71 0.87 0.71 0.63 0.88 0.74 0.63 0.88 0.79 0.70 Fig.6. Example segmentation results on the BRATS 2013 Challenge dataset. The first and second rows show the segmentation results of the 50th and 80th slice of the axial view of Subject 0301. The third and fourth rows show the segmentation results of the 40th and 70th slice of the axial view of Subject 0308. From left to right: Flair, T1c, T2, segmentation results of FCNNs, segmentation results of FCNN+CRF, and segmentation results of FCNN+CRF+post-process. In the segmentation results, each gray level represents a tumor class, from low to high: necrosis, edema, non-enhancing core, and enhancing core. 3.1.2. Evaluating the effectiveness of each post-processing step To investigate the effectiveness of each post-processing step, we obtained segmentation results of FCNN+CRF+post-x, x=1, 2, …, 6. In particular, FCNN+CRF+post-x indicates FCNN+CRF with all other post-processing steps except the step x. As described in section 2.3.4, our post-processing consists of 6 steps in total. All the evaluation results are summarized in Table 2. These results indicated that the post-processing step 3 played the most important role in the tumor segmentation, although all these post-processing steps might contribute the segmentation. Table 2. The evaluation results of FCNN+CRF with 5 of 6 post-processing steps (FCNN+CRF+post-x indicates FCNN+CRF with all other post-processing steps except the step x, the sizes of patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20.) Dataset Methods Challenge FCNN+CRF+post-process FCNN+CRF+post-1 Dice complete core 0.87 0.87 0.83 0.83 PPV enhancing complete 0.76 0.76 0.92 0.92 core 0.87 0.87 Sensitivity enhancing complete core 0.77 0.77 0.83 0.83 0.81 0.81 enhancing 0.77 0.77 15 FCNN+CRF+post-2 FCNN+CRF+post-3 FCNN+CRF+post-4 FCNN+CRF+post-5 FCNN+CRF+post-6 FCNN+CRF+post-process FCNN+CRF+post-1 FCNN+CRF+post-2 Leaderboard FCNN+CRF+post-3 FCNN+CRF+post-4 FCNN+CRF+post-5 FCNN+CRF+post-6 0.86 0.85 0.86 0.87 0.87 0.86 0.84 0.86 0.85 0.85 0.86 0.86 0.83 0.80 0.82 0.83 0.83 0.73 0.71 0.73 0.70 0.71 0.72 0.70 0.76 0.72 0.76 0.74 0.76 0.62 0.62 0.62 0.59 0.62 0.59 0.62 0.90 0.88 0.92 0.92 0.92 0.89 0.88 0.88 0.87 0.89 0.89 0.89 0.87 0.80 0.88 0.87 0.87 0.76 0.75 0.76 0.73 0.77 0.76 0.76 0.77 0.69 0.77 0.70 0.77 0.64 0.64 0.64 0.57 0.64 0.57 0.64 0.84 0.83 0.82 0.83 0.83 0.84 0.82 0.86 0.84 0.82 0.84 0.84 0.81 0.81 0.78 0.81 0.81 0.78 0.77 0.77 0.75 0.74 0.76 0.71 0.77 0.77 0.77 0.79 0.77 0.68 0.68 0.68 0.68 0.68 0.71 0.68 3.1.3. Evaluating the impact of image patch size We used different kernel sizes in all the pooling layers to train different FCNNs. The training image patch size changed with the kernel size, as shown in Fig. 4, while the number of parameters in FCNNs was unchanged. We evaluated the segmentation performance of our segmentation models with n=1,3,5, as summarized in Table 3. When n=1,3,5, the corresponding sizes of training patches are 21*21*3 (small input patch) and 41*41*3 (large input patch), 27*27*3 and 53*53*3, 33*33*3 and 65*65*3. Bar plots of the Dice of complete regions on the Challenge dataset with different training patch sizes are shown in Fig. 7. These segmentation results indicated that 1) a bigger patch provided more information and helped improve FCNNs’ performance; 2) the CRF-RNN could reduce the performance differences caused by patch size as CRF-RNN could optimize the segmentation results according to the information in a whole image slice; and 3) the post-processing could further reduce the performance difference caused by patch size. Fig.7. Bar plots for the Dice of complete regions on the Challenge dataset with different training patch sizes. Table 3. Evaluation results of our segmentation model with n=1,2,3 (The number of patches used to train FCNNs was 5000*5*20.) Dataset n 1 Challenge 3 5 Leaderboard 1 Methods FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs Dice complete core 0.70 0.83 0.86 0.71 0.83 0.86 0.74 0.85 0.87 0.64 0.62 0.78 0.83 0.67 0.77 0.82 0.72 0.80 0.83 0.54 PPV enhancing complete 0.64 0.69 0.76 0.65 0.69 0.76 0.67 0.70 0.76 0.49 0.57 0.85 0.92 0.58 0.83 0.91 0.62 0.87 0.92 0.50 core 0.50 0.79 0.88 0.56 0.74 0.84 0.63 0.80 0.87 0.45 Sensitivity enhancing complete core enhancing 0.55 0.63 0.77 0.57 0.63 0.78 0.60 0.63 0.77 0.42 0.94 0.83 0.82 0.95 0.85 0.84 0.94 0.84 0.83 0.96 0.87 0.79 0.80 0.86 0.82 0.82 0.86 0.81 0.81 0.76 0.79 0.79 0.77 0.78 0.79 0.76 0.77 0.80 0.77 0.71 16 3 5 FCNN+CRF FCNN+CRF+post-process FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs FCNN+CRF FCNN+CRF+post-process 0.82 0.85 0.67 0.83 0.86 0.70 0.83 0.86 0.65 0.72 0.57 0.66 0.72 0.61 0.66 0.73 0.57 0.61 0.52 0.57 0.62 0.54 0.57 0.62 0.83 0.88 0.54 0.82 0.88 0.58 0.85 0.89 0.70 0.76 0.50 0.67 0.74 0.57 0.71 0.76 0.51 0.59 0.45 0.51 0.60 0.49 0.50 0.64 0.85 0.84 0.96 0.87 0.86 0.96 0.85 0.84 0.69 0.76 0.75 0.72 0.79 0.74 0.69 0.78 0.72 0.70 0.70 0.71 0.69 0.67 0.71 0.68 3.1.4. Evaluating the impact of the number of image patches used to train FCNNs The BRATS 2013 training dataset contains 10 LGG and 20 HGG. In our experiments, we trained our segmentation model using the 20 HGG cases, and our model worked well for segmenting LGG cases. To investigate the impact of the number of training patches on the segmentation performance, we trained FCNNs with varied numbers of image patches. In particular, we sampled training imaging patches randomly from each subject and kept the number of training samples for different classes equal (5 classes in total, including normal tissue, necrosis, edema, non-enhancing core, and enhancing core). We generated 3 sets of image patches by sampling, consisting of 1000*5*20, 3000*5*20, and 5000*5*20 patches respectively, and used them to train different segmentation models. The evaluation results are summarized in in Table 4. Bar plots of the Dice of complete regions on the Challenge dataset with different numbers of training patches are shown in Fig. 8. The results shown in Table 4 and Fig.8 indicated that the brain tumor segmentation accuracy of FCNNs increased with the increasing of the number of training patches. However, both CRFs and post-processing could reduce the performance difference. Fig.8. Bar plots for the Dice of complete regions on the Challenge dataset with different numbers of training image patches. Table.4 Evaluation results of the segmentation models trained using different numbers of training image patches (the sizes of image patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5) Dataset Challenge No. of patches Methods complete FCNNs 0.71 1000*5*20 FCNN+CRF 0.84 FCNN+CRF+post-process 0.87 FCNNs 0.73 3000*5*20 FCNN+CRF 0.84 FCNN+CRF+post-process 0.86 FCNNs 0.74 5000*5*20 FCNN+CRF 0.85 FCNN+CRF+post-process 0.87 Dice core enhancing complete 0.68 0.62 0.57 0.78 0.68 0.84 0.82 0.76 0.91 0.70 0.66 0.60 0.80 0.69 0.86 0.83 0.77 0.92 0.72 0.67 0.62 0.80 0.70 0.87 0.83 0.76 0.92 PPV Sensitivity core enhancing complete core enhancing 0.58 0.54 0.95 0.86 0.76 0.78 0.61 0.85 0.81 0.79 0.86 0.77 0.84 0.81 0.77 0.61 0.59 0.94 0.86 0.76 0.79 0.62 0.84 0.82 0.80 0.86 0.77 0.83 0.82 0.77 0.63 0.60 0.94 0.86 0.77 0.80 0.63 0.84 0.81 0.80 0.87 0.77 0.83 0.81 0.77 17 FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs 3000*5*20 FCNN+CRF Learderboard FCNN+CRF+post-process FCNNs 5000*5*20 FCNN+CRF FCNN+CRF+post-process 1000*5*20 0.66 0.83 0.86 0.69 0.83 0.85 0.70 0.83 0.86 0.58 0.65 0.72 0.60 0.65 0.72 0.61 0.66 0.73 0.51 0.56 0.61 0.52 0.56 0.61 0.54 0.57 0.62 0.53 0.82 0.88 0.57 0.84 0.89 0.58 0.85 0.89 0.53 0.71 0.76 0.56 0.70 0.75 0.57 0.71 0.76 0.45 0.51 0.63 0.47 0.49 0.59 0.49 0.50 0.64 0.96 0.86 0.85 0.96 0.85 0.84 0.96 0.85 0.84 0.74 0.69 0.77 0.74 0.69 0.77 0.74 0.69 0.78 0.67 0.70 0.68 0.67 0.71 0.68 0.67 0.71 0.68 In summary, all the experimental results demonstrated that both CRFs and the post-processing method can narrow the performance difference caused by training patch sizes and training patch numbers, indicating that CRFs and the post-processing method might be able to narrow the performance difference caused by other training tricks. We will confirm this inference in our future work. 3.1.5. Performance Comparison between segmentation models built upon 4 and 3 imaging modalities We also built a segmentation model using all available 4 imaging modalities, i.e., Flair, T1, T1c, and T2, and compared its segmentation performance with that of the segmentation model built upon 3 imaging modalities, i.e., Flair, T1c, and T2. The segmentation results of these segmentation models are summarized in Table 5. These results demonstrated that these two segmentation models achieved similar performance, indicating that a segmentation model built upon Flair, T1c, and T2 could achieve competitive performance as the model built upon 4 imaging modalities. Table.5 Performance comparison of segmentation models built upon scans of 4 imaging modalities and 3 imaging modalities (the sizes of patches used to train FCNNs were 33*33*4 and 65*65*4, or 33*33*3 and 65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20) Dataset No. of modalities 4 Challenge 3 4 Learderboard 3 Methods FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs FCNN+CRF FCNN+CRF+post-process FCNNs FCNN+CRF FCNN+CRF+post-process complete 0.74 0.85 0.87 0.74 0.85 0.87 0.69 0.82 0.85 0.70 0.83 0.86 Dice PPV Sensitivity core enhancing complete core enhancing complete core enhancing 0.72 0.67 0.61 0.64 0.60 0.95 0.86 0.77 0.80 0.71 0.85 0.79 0.67 0.87 0.82 0.78 0.83 0.76 0.91 0.85 0.78 0.84 0.82 0.76 0.72 0.67 0.62 0.63 0.60 0.94 0.86 0.77 0.80 0.70 0.87 0.80 0.63 0.84 0.81 0.80 0.83 0.76 0.92 0.87 0.77 0.83 0.81 0.77 0.59 0.55 0.57 0.56 0.49 0.95 0.72 0.68 0.64 0.58 0.82 0.70 0.55 0.85 0.67 0.68 0.74 0.62 0.89 0.75 0.62 0.83 0.79 0.66 0.61 0.54 0.58 0.57 0.49 0.96 0.74 0.67 0.66 0.57 0.85 0.71 0.50 0.85 0.69 0.71 0.73 0.62 0.89 0.76 0.64 0.84 0.78 0.68 3.1.6. Evaluation of different pre-processing strategies on the tumor segmentation We preprocessed the imaging data using our robust deviation based intensity normalization and the standard deviation based intensity normalization [8], and then evaluated segmentation models built on them separately. As the results shown in Table 6 indicated, the robust deviation based intensity normalization could slightly improve the segmentation performance. Table.6 Performance comparison of segmentation models built upon images normalized by the robust deviation and the standard deviation (the sizes of patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20) Dataset Deviation Methods standard FCNNs FCNN+CRF Dice PPV Sensitivity complete core enhancing complete core enhancing complete core enhancing 0.73 0.69 0.67 0.61 0.60 0.61 0.94 0.86 0.75 0.84 0.80 0.71 0.87 0.79 0.68 0.82 0.82 0.75 18 Challenge FCNN+CRF+post-process FCNNs robust FCNN+CRF FCNN+CRF+post-process FCNNs standard FCNN+CRF FCNN+CRF+post-process Learderboard FCNNs robust FCNN+CRF FCNN+CRF+post-process 0.86 0.74 0.85 0.87 0.69 0.83 0.86 0.70 0.83 0.86 0.83 0.72 0.80 0.83 0.60 0.66 0.73 0.61 0.66 0.73 0.76 0.67 0.70 0.76 0.54 0.58 0.61 0.54 0.57 0.62 0.93 0.62 0.87 0.92 0.57 0.85 0.89 0.58 0.85 0.89 0.86 0.63 0.80 0.87 0.55 0.71 0.75 0.57 0.71 0.76 0.80 0.60 0.63 0.77 0.50 0.56 0.66 0.49 0.50 0.64 0.81 0.94 0.84 0.83 0.97 0.85 0.84 0.96 0.85 0.84 0.81 0.86 0.81 0.81 0.75 0.70 0.78 0.74 0.69 0.78 0.74 0.77 0.80 0.77 0.67 0.67 0.66 0.67 0.71 0.68 3.1.7. Evaluating the effectiveness of fusing the segmentation results gotten in three views We trained 3 segmentation models using patches and slices obtained in axial, coronal and sagittal views respectively. During testing, we used these three models to segment brain images from 3 views and got three segmentation results. The results of different views were fused and the evaluation results are shown in Table 7. Evaluation results in Table 7 indicated that, for both Challenge and Leaderboard datasets, fusing the segmentation results typically led to better segmentation performance without the post-processing procedure. However, the improvement became insignificant after the post-processing procedure was applied to the segmentation results. Table.7 Evaluations of segmentation results obtained in axial, coronal, sagittal views before and after post-processing, and evaluations of fusion results before and after post-processing (the sizes of patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20) Dataset 2013 Methods FCNN+CRF Challenge fusing (FCNN+CRF) axial coronal sagittal fusing (FCNN+CRF)+post-process axial FCNN+CRF coronal sagittal fusing (FCNN+CRF) axial FCNN+CRF+post-process coronal sagittal fusing (FCNN+CRF)+post-process FCNN+CRF+post-process Learderboard axial coronal sagittal complete 0.85 0.82 0.83 0.85 0.87 0.87 0.87 0.88 0.83 0.80 0.80 0.84 0.86 0.86 0.84 0.86 Dice PPV Sensitivity core enhancing complete core enhancing complete core enhancing 0.80 0.70 0.87 0.80 0.63 0.84 0.81 0.80 0.80 0.70 0.77 0.78 0.62 0.90 0.83 0.82 0.80 0.71 0.80 0.79 0.64 0.87 0.83 0.82 0.83 0.74 0.85 0.84 0.68 0.88 0.82 0.82 0.83 0.76 0.92 0.87 0.77 0.83 0.81 0.77 0.82 0.76 0.86 0.83 0.74 0.89 0.83 0.79 0.82 0.77 0.88 0.83 0.75 0.86 0.82 0.79 0.84 0.77 0.90 0.87 0.76 0.86 0.82 0.80 0.66 0.57 0.85 0.71 0.50 0.85 0.69 0.71 0.65 0.56 0.75 0.69 0.50 0.90 0.69 0.70 0.66 0.55 0.78 0.69 0.49 0.86 0.69 0.70 0.67 0.60 0.84 0.74 0.54 0.87 0.68 0.72 0.73 0.62 0.89 0.76 0.64 0.84 0.78 0.68 0.73 0.62 0.86 0.73 0.60 0.89 0.79 0.67 0.71 0.60 0.85 0.74 0.59 0.84 0.74 0.67 0.73 0.62 0.89 0.77 0.60 0.85 0.77 0.69 3.1.8. Comparison with other methods Comparison results with other methods are summarized in Table 8. In particular, evaluation results of the top ranked methods participated in the BRATS 2013, shown on the BRATS 2013 website, are summarized in Table 8, along with the results of our method and other two state of art methods. Particularly, the method proposed by Sergio Pereira et al [31] ranked first on the Challenge dataset and second on the Leaderboard dataset right now, while our method ranked second on the Challenge dataset and first on the Leaderboard dataset right now. In general, it took 2-4 min for one of the three views of our method to segment one subject’s imaging data. We do 19 not have an accurate estimation of the training time for our segmentation models since we used a shared GPU server. On the shared GPU server, it took ~12 days to train our segmentation models. Table. 8 Comparisons with other methods on BRATS 2013 dataset Dataset Challenge Leaderboard Methods Nick Tustison Raphael Meier Syed Reza Mohammad Havaei[30] Sergio Pereira[31] Our method(axial) Our method(coronal) Our method(sagittal) Our method(fusing) Nick Tustison Liang Zhao Raphael Meier Mohammad Havaei[30] Sergio Pereira[31] Our method(axial) Our method(coronal) Our method(sagittal) Our method(fusing) complete 0.87 0.82 0.83 0.88 0.88 0.87 0.87 0.87 0.88 0.79 0.79 0.72 0.84 0.84 0.86 0.86 0.84 0.86 Dice core 0.78 0.73 0.72 0.79 0.83 0.83 0.82 0.82 0.84 0.65 0.59 0.60 0.71 0.72 0.73 0.73 0.71 0.73 Positive Predictive Value enhancing complete core enhancing 0.74 0.85 0.74 0.69 0.69 0.76 0.78 0.71 0.72 0.82 0.81 0.70 0.73 0.89 0.79 0.68 0.77 0.88 0.87 0.74 0.76 0.92 0.87 0.77 0.76 0.86 0.83 0.74 0.77 0.88 0.83 0.75 0.77 0.90 0.87 0.76 0.53 0.83 0.70 0.51 0.47 0.77 0.55 0.50 0.53 0.65 0.62 0.48 0.57 0.88 0.79 0.54 0.62 0.85 0.82 0.60 0.62 0.89 0.76 0.64 0.62 0.86 0.73 0.60 0.60 0.85 0.74 0.59 0.62 0.89 0.77 0.60 complete 0.89 0.92 0.86 0.87 0.89 0.83 0.89 0.86 0.86 0.81 0.85 0.88 0.84 0.86 0.84 0.89 0.84 0.85 Sensitivity core enhancing 0.88 0.83 0.72 0.73 0.69 0.76 0.79 0.80 0.83 0.81 0.81 0.77 0.83 0.79 0.82 0.79 0.82 0.80 0.73 0.66 0.77 0.53 0.69 0.64 0.72 0.68 0.76 0.68 0.78 0.68 0.79 0.67 0.74 0.67 0.77 0.69 3.2. Segmentation performance on the BRATS 2015 The BRATS 2015 training dataset contains 54 LGG and 220 HGG, and its testing dataset contains 110 cases with unknown grades. All the training cases in BRATS 2013 are reused in BRATS 2015 as a subset of its training dataset. As what we have done in our experiments with BRATS 2013 dataset, we just used HGG training cases to train our segmentation models in this section. We extracted 1000*5 patches from each of 220 HGG to train FCNNs and initialed the CRF-RNN by the CRF-RNN trained by BRATS 2013 dataset. The whole network was fine-tuned using slices in BRATS 2013 training dataset, which is a subset of BRATS 2015 training dataset. The evaluation results of BRATS 2015 testing dataset are shown in Table 9, including evaluations of segmentation results that were segmented by the models trained by BRATS 2013 training dataset and evaluations of segmentation results that were segmented by the models trained in this section. The results shown in Table. 9 indicated that fusing the segmentation results of multi-views could improve the segmentation accuracy. These results also indicated that a larger training dataset might improve the segmentation performance. Table.9 Evaluation results of 110 testing cases in BRATS 2015 testing dataset (the sizes of image patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5) Methods FCNN+CRF axial coronal sagittal Models trained based fusing (FCNN+CRF) on the BRATS axial 2013 training FCNN+CRF+post-process coronal dataset sagittal fusing (FCNN+CRF)+post-process complete 0.77 0.74 0.74 0.79 0.78 0.78 0.77 0.81 Dice PPV Sensitivity core enhancing complete core enhancing complete core enhancing 0.56 0.52 0.85 0.71 0.46 0.74 0.53 0.67 0.53 0.48 0.70 0.69 0.44 0.84 0.50 0.65 0.54 0.49 0.74 0.67 0.43 0.78 0.52 0.66 0.56 0.56 0.82 0.78 0.52 0.79 0.50 0.68 0.64 0.58 0.87 0.75 0.57 0.73 0.61 0.65 0.61 0.57 0.77 0.68 0.58 0.84 0.63 0.63 0.62 0.57 0.80 0.71 0.56 0.78 0.60 0.63 0.65 0.60 0.87 0.79 0.60 0.78 0.61 0.65 20 FCNN+CRF axial coronal sagittal Models trained based fusing (FCNN+CRF) on the BRATS axial 2015 training FCNN+CRF+post-process coronal dataset sagittal fusing (FCNN+CRF)+post-process 0.78 0.77 0.76 0.80 0.80 0.80 0.78 0.82 0.64 0.66 0.63 0.66 0.68 0.69 0.69 0.72 0.54 0.56 0.47 0.57 0.61 0.61 0.57 0.62 0.78 0.73 0.75 0.81 0.82 0.77 0.80 0.84 0.76 0.73 0.71 0.79 0.75 0.70 0.74 0.78 0.48 0.52 0.38 0.50 0.59 0.61 0.51 0.60 0.81 0.86 0.80 0.83 0.81 0.87 0.80 0.83 0.62 0.67 0.63 0.64 0.71 0.76 0.71 0.73 0.71 0.67 0.75 0.72 0.68 0.65 0.72 0.69 There were only 53 testing cases available during the BRATS 2015, but now there are 110 testing cases. Therefore, we are not able to directly compare our method with the methods that participated in the BRATS 2015. We are aware that K. Kamnitses et al [28] have published their evaluation results with 110 BRATS 2015 testing cases. The comparisons with K. Kamnitses et al’s method are shown in Table 10. Table. 10 Comparisons with other methods on BRATS 2015 dataset Dataset Methods BRATS 2015 testing dataset DeepMedic+CRF[28] Our method(axial) Our method(coronal) Our method(sagittal) Our method(fusing) Our FCNN(axial)+3D CRF Our FCNN(coronal)+3D CRF Our FCNN(sagittal)+3D CRF Our FCNN+3D CRF (fusing) complete 0.847 0.80 0.80 0.78 0.82 0.84 0.83 0.82 0.84 Dice core 0.67 0.68 0.69 0.69 0.72 0.72 0.72 0.72 0.73 Positive Predictive Value enhancing complete core enhancing 0.629 0.85 0.848 0.634 0.61 0.82 0.75 0.59 0.61 0.77 0.70 0.61 0.57 0.80 0.74 0.51 0.62 0.84 0.78 0.60 0.62 0.88 0.75 0.62 0.62 0.88 0.75 0.62 0.60 0.88 0.75 0.59 0.62 0.89 0.76 0.63 complete 0.876 0.81 0.87 0.80 0.83 0.82 0.82 0.81 0.82 Sensitivity core enhancing 0.607 0.662 0.71 0.68 0.76 0.65 0.71 0.72 0.73 0.69 0.76 0.67 0.75 0.66 0.76 0.67 0.76 0.67 3.3. Segmentation performance on the BRATS 2016 We also participated in the BRATS 2016. However, during the competition we just segmented brain images in axial view. Since the BRATS 2016 shares the same training dataset with BRATS 2015, we used the same segmentation models trained based on the BRATS 2015 training dataset. The BRATS 2015 training dataset has been pre-processed with rigid registration, bias field correction and skull stripping. However, the BRATS 2016 test dataset contains a number of unprocessed or partially pre-processed images [45], as shown in Fig. 9. To reduce false positives caused by incomplete pre-processing, apart from the post-processing steps described in Section 2.3.4, we manually placed rectangular bounding boxes around tumors in images and applied the post-processing step 2 to the segmentation results. Among 19 teams participated in the BRATS 2016, we ranked first on the multi-temporal evaluation. The ranking details of our method are shown in Table.11. Fig.9 An example of partial skull stripping case in BRATS 2016 testing dataset. From left to right: Flair, T1c, T2 21 Table. 11 The ranking details of our method on different items on BRAST 2016 (including tie) Items Ranking complete 4 Dice core 3 Tumor Segmentation enhancing 1 complete 7 Hausdorff core enhancing 6 2 Multi-temporal evaluation 1 4. Discussions and Conclusion In this study, we proposed a novel deep learning based brain tumor segmentation method by integrating Fully Convolutional Neural Networks (FCNNs) and Conditional Random Fields (CRFs) in a unified framework. This integrated model was designed to obtain tumor segmentation results with appearance and spatial consistency. In our method, we used CRF-RNN to implement CRFs [18], facilitating easy training of both FCNNs and CRFs as one deep network, rather than using CRFs as a post-processing step of FCNNs. Our integrated deep learning model was trained in 3 steps, using image patches and slices respectively. In the first step, image patches were used to train FCNNs. These image patches were randomly sampled from the training dataset and the same number of image patches for each class was used as training image patches, in order to avoid the data imbalance problem. In the second step, image slices were used to train the following CRF-RNN, with parameters of FCNNs fixed. In the third step, image slices were used to fine-tune the whole network. Particularly, we train 3 segmentation models using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine them to segment brain tumors using a voting based fusion strategy. Our experimental results also indicated that the integration of FCNNs and CRF-RNN could improve the segmentation robustness to parameters involved in the model training, such as image patch size and the number of training image patches. Our experimental results also demonstrated that a tumor segmentation model built upon Flair, T1c, and T2 scans achieved competitive performance as those built upon Flair, T1, T1c, and T2 scans. We also proposed a simple pre-processing strategy and a simple post-processing strategy. We pre-processed each MR scan using N4ITK and intensity normalization, which normalized each MR image’s intensity mainly by subtracting the gray-value of the highest frequency and dividing the robust deviation. The results shown in Fig. 1 and Fig. 2 demonstrated that the proposed intensity normalization method could make different MRI scans comparable, i.e., similar intensity values characterize similar brain tissues across scans. We post-processed the segmentation results by removing small 3D-connected regions and correcting false labels by simple thresholding method. Our experimental results have demonstrated that these strategies could improve the tumor segmentation performance. Our method has achieved promising performance on the BRATS 2013 and BRATS 2015 testing dataset. Different from other top ranked methods, our method could achieve competitive performance with only 3 imaging modalities (Flair, T1c, and T2), rather than 4 (Flair, T1, T1c, and T2). We also participated in the BRATS 2016 and our method ranked first on its multi-temporal evaluation. 22 Our method is built upon 2D FCNNs and CRF-RNN to achieve computational efficiency. For training CRF-RNN and fine-tuning the integrated FCNNs and CRF-RNN, we use image slices as training data. However, in image slices, the numbers of pixels for different classes are different, which may worsen the segmentation performance of the trained network. To partially overcome the imbalanced training data problem, we trained CRF-RNN with the parameters of FCNNs were fixed so that the CRF-RNN are trained to optimize the appearance and spatial consistency of segmentation results. Such a strategy in conjunct with a fine-tuning of the whole network with a small learning rate improved the tumor segmentation performance. However, 2D CNNs are not equipped to take full advantage of 3D information of the MRI data [28, 29]. Our experimental results have demonstrated adopting 3D CRF as a post-processing step could improve the tumor segmentation performance. Our ongoing study is to build a fully 3D network to further improve the tumor segmentation performance. Acknowledgements This work was supported in part by the National High Technology Research and Development Program of China (2015AA020504), the National Natural Science Foundation of China under Grant Nos. 61572499, 61421004, 61473296, and NIH grants EB022573, CA189523. References [1] S. Bauer, R. Wiest, L.-P. Nolte, and M. Reyes, "A survey of MRI-based medical image analysis for brain tumor studies," Physics in medicine and biology, vol. 58, pp. 97-129, 2013. [2] M. Goetz, C. Weber, F. Binczyk, J. Polanska, R. Tarnawski, B. Bobek-Billewicz, et al., "DALSA: domain adaptation for supervised learning from sparsely annotated MR images," IEEE transactions on medical imaging, vol. 35, pp. 184-196, 2016. [3] B. H. Menze, A. Jakab, S. Bauer, J. Kalpathy-Cramer, K. Farahani, J. Kirby, et al., "The multimodal brain tumor image segmentation benchmark (BRATS)," IEEE Transactions on Medical Imaging, vol. 34, pp. 1993-2024, 2015. [4] A. Gooya, K. M. Pohl, M. Bilello, L. Cirillo, G. Biros, E. R. Melhem, et al., "GLISTR: glioma image segmentation and registration," IEEE transactions on medical imaging, vol. 31, pp. 1941-1954, 2012. [5] M. B. Cuadra, C. Pollo, A. Bardera, O. Cuisenaire, J.-G. Villemure, and J.-P. Thiran, "Atlas-based segmentation of pathological MR brain images using a model of lesion growth," IEEE transactions on medical imaging, vol. 23, pp. 1301-1314, 2004. [6] B. H. Menze, K. Van Leemput, D. Lashkari, M.-A. Weber, N. Ayache, and P. Golland, "A generative model for brain tumor segmentation in multi-modal images," in International Conference on Medical Image Computing and Computer-Assisted Intervention, 2010, pp. 151-159. [7] M. Prastawa, E. Bullitt, S. Ho, and G. Gerig, "A brain tumor segmentation framework based on outlier detection," Medical image analysis, vol. 8, pp. 275-283, 2004. [8] M. Goetz, C. Weber, J. Bloecher, B. Stieltjes, H.-P. Meinzer, and K. Maier-Hein, "Extremely randomized trees based brain tumor segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 6-11, 2014. [9] S. M. S. Reza and K. M. Iftekharuddin, "Improved brain tumor tissue segmentation using texture features," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 27-30, 2014. [10] J. Kleesiek, A. Biller, G. Urban, U. Kothe, M. Bendszus, and F. Hamprecht, "Ilastik for multi-modal brain tumor segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 12-17, 2014. [11] S. Ruan, S. Lebonvallet, A. Merabet, and J.-M. Constans, "Tumor segmentation from a multispectral MRI images by using support vector machine classification," in 2007 4th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007, pp. 1236-1239. [12] H. Li and Y. Fan, "Label propagation with robust initialization for brain tumor segmentation," in 2012 9th IEEE International Symposium on Biomedical Imaging (ISBI), 2012, pp. 1715-1718. 23 [13] H. Li, M. Song, and Y. Fan, "Segmentation of brain tumors in multi-parametric MR images via robust statistic information propagation," in Asian Conference on Computer Vision, 2010, pp. 606-617. [14] R. Meier, S. Bauer, J. Slotboom, R. Wiest, and M. Reyes, "Appearance- and context-sensitive features for brain tumor segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 20-26, 2014. [15] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in Advances in neural information processing systems, 2012, pp. 1097-1105. [16] R. Girshick, J. Donahue, T. Darrell, and J. Malik, "Rich feature hierarchies for accurate object detection and semantic segmentation," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 580-587. [17] J. Long, E. Shelhamer, and T. Darrell, "Fully convolutional networks for semantic segmentation," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3431-3440. [18] S. Zheng, S. Jayasumana, B. Romera-Paredes, V. Vineet, Z. Su, D. Du, et al., "Conditional random fields as recurrent neural networks," in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 1529-1537. [19] Z. Liu, X. Li, P. Luo, C.-C. Loy, and X. Tang, "Semantic image segmentation via deep parsing network," in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 1377-1385. [20] D. Zikic, Y. Ioannou, M. Brown, and A. Criminisi, "Segmentation of brain tumor tissues with convolutional neural networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 36-39, 2014. [21] A. Davy, M. Havaei, D. Warde-farley, A. Biard, L. Tran, P.-M. Jodoin, et al., "Brain tumor segmentation with deep neural networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 1-5, 2014. [22] G. Urban, M. Bendszus, F. Hamprecht, and J. Kleesiek, "Multi-modal brain tumor segmentatioin using deep convolutional neural networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 31-35, 2014. [23] P. Dvorak and B. H. Menze, "Structured prediction with convolutional neural networks for multimodal brain tumor segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 13-24, 2015. [24] M. Havaei, F. Dutil, C. Pal, H. Larochelle, and P.-M. Jodoin, "A convolutional neural network approach to brain tumor segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 29-33, 2015. [25] S. Pereira, A. Pinto, V. Alves, and C. A. Silva, "Deep convolutional neural networks for the segmentatin of gliomas in multi-sequence MRI," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 52-55, 2015. [26] M. Agn, O. Puonti, I. Law, P. M. a. Rosenschold, and K. V. Leemput, "Brain tumor segmentation by a generative model with a prior on tumor shape," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 1-4, 2015. [27] K. Vaidhya, R. Santhosh, S. Thirunavukkarasu, V. Alex, and G. Krishnamurthi, "Multi-modal brain tumor segmentation using stacked denoising autoencoders," in Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), 2015, pp. 60-64. [28] K. Kamnitsas, C. Ledig, V. F. Newcombe, J. P. Simpson, A. D. Kane, D. K. Menon, et al., "Efficient multi-scale 3D CNN with fully connected CRF for accurate brain lesion segmentation," Medical Image Analysis, vol. 36, pp. 61-78, 2017. [29] D. Yi, M. Zhou, Z. Chen, and O. Gevaert, "3-D Convolutional Neural Networks for Glioblastoma Segmentation," arXiv preprint arXiv:1611.04534, 2016. [30] M. Havaei, A. Davy, D. Warde-Farley, A. Biard, A. Courville, Y. Bengio, et al., "Brain tumor segmentation with deep neural networks," Medical image analysis, vol. 35, pp. 18-31, 2017. [31] S. Pereira, A. Pinto, V. Alves, and C. A. Silva, "Brain tumor segmentation using convolutional neural networks in MRI images," IEEE transactions on medical imaging, vol. 35, pp. 1240-1251, 2016. [32] K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," arXiv preprint arXiv:1409.1556, 2014. [33] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille, "Semantic image segmentation with deep convolutional nets and fully connected crfs," arXiv preprint arXiv:1412.7062, 2014. [34] A. Prasoon, K. Petersen, C. Igel, F. Lauze, E. Dam, and M. Nielsen, "Deep feature learning for knee cartilage segmentation using a triplanar convolutional neural network," in International conference on medical image computing and computer-assisted intervention, 2013, pp. 246-253. [35] K. Fritscher, P. Raudaschl, P. Zaffino, M. F. Spadea, G. C. Sharp, and R. Schubert, "Deep Neural Networks for Fast Segmentation of 3D Medical Images," in International Conference on Medical Image Computing and Computer-Assisted Intervention, 2016, pp. 158-165. [36] A. A. A. Setio, F. Ciompi, G. Litjens, P. Gerke, C. Jacobs, S. J. van Riel, et al., "Pulmonary nodule detection in CT images: false positive reduction using multi-view convolutional networks," IEEE transactions on medical imaging, vol. 35, pp. 1160-1169, 2016. [37] X. Zhao, Y. Wu, G. Song, Z. Li, Y. Fan, and Y. Zhang, "Brain Tumor Segmentation Using a Fully Convolutional Neural Network with Conditional Random Fields," in International Workshop on Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2016, pp. 75-87. 24 [38] W. Zhang, R. Li, H. Deng, L. Wang, W. Lin, S. Ji, et al., "Deep convolutional neural networks for multi-modality isointense infant brain image segmentation," NeuroImage, vol. 108, pp. 214-224, 2015. [39] P. Moeskops, M. A. Viergever, A. M. Mendrik, L. S. de Vries, M. J. Benders, and I. Išgum, "Automatic segmentation of MR brain images with a convolutional neural network," IEEE transactions on medical imaging, vol. 35, pp. 1252-1261, 2016. [40] A. de Brebisson and G. Montana, "Deep neural networks for anatomical brain segmentation," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015, pp. 20-28. [41] N. J. Tustison, B. B. Avants, P. A. Cook, Y. Zheng, A. Egan, P. A. Yushkevich, et al., "N4ITK: improved N3 bias correction," IEEE transactions on medical imaging, vol. 29, pp. 1310-1320, 2010. [42] R. D. Fields, "Change in the brain's white matter," Science, vol. 330, pp. 768-769, 2010. [43] P. Krahenbuhl and V. Koltun, "Efficient inference in fully connected crfs with gaussian edge potentials," NIPS, 2011. [44] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, et al., "Caffe: Convolutional architecture for fast feature embedding," in Proceedings of the 22nd ACM international conference on Multimedia, 2014, pp. 675-678. [45] L. Le Folgoc, A. V. Nori, S. Ancha, and A. Criminisi, "Lifted Auto-Context Forests for Brain Tumour Segmentation," in International Workshop on Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2016, pp. 171-183. 25
1
A COPULA APPROACH FOR DEPENDENCE MODELING IN MULTIVARIATE NONPARAMETRIC TIME SERIES NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 arXiv:1705.07605v1 [math.ST] 22 May 2017 1 Department of Mathematics, University of Hamburg, Bundesstrasse 55, 20146 Hamburg, Germany 2 Department of Probability and Statistics, Faculty of Mathematics and Physics, Charles University, Sokolovská 83, 186 75 Praha 8, Czech Republic May 23, 2017 Abstract. This paper is concerned with modeling the dependence structure of two (or more) time-series in the presence of a (possible multivariate) covariate which may include past values of the time series. We assume that the covariate influences only the conditional mean and the conditional variance of each of the time series but the distribution of the standardized innovations is not influenced by the covariate and is stable in time. The joint distribution of the time series is then determined by the conditional means, the conditional variances and the marginal distributions of the innovations, which we estimate nonparametrically, and the copula of the innovations, which represents the dependency structure. We consider a nonparametric as well as a semi-parametric estimator based on the estimated residuals. We show that under suitable assumptions these copula estimators are asymptotically equivalent to estimators that would be based on the unobserved innovations. The theoretical results are illustrated by simulations and a real data example. Keywords and phrases: Asymptotic representation; CHARN model; empirical copula process; goodness-of-fit testing; nonparametric AR-ARCH model; nonparametric SCOMDY model; weak convergence. 1. Introduction Modeling the dependency of k observed time series can be of utmost importance for applications, e. g. in risk management (for instance to model the dependence between several exchange rates). We will take the approach to model k dependent nonparametric AR-ARCH time series Yji = mj (X i ) + σj (X i ) εji , i = 1, . . . , n, j = 1, . . . , k, where the covariate X i may include past values of the process, Yj i−1 , Yj i−2 , . . . (j = 1, . . . , k), or other exogenous variables. Further the innovations (ε1i , . . . , εki ), i ∈ Z, are assumed to be independent and identically distributed random vectors and (ε1i , . . . , εki ) is independent ∗ The second and the third authors gratefully acknowledge support from the grant GACR 15-04774Y. 1 2 NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 of the past and present covariates X ` , ` ≤ i, ∀i. For identifiability we assume E εji = 0, var(εji ) = 1 (j = 1, . . . , k), such that the functions mj and σj represent the conditional mean and volatility function in the jth time series. Such models are also called multivariate nonparametric CHARN (conditional heteroscedastic autoregressive nonlinear) models and have gained much attention over the last decades, see Fan and Yao (2005) and Gao (2007) for extensive overviews. Note that due to the structure of the model and Sklar’s theorem (see e.g., Nelsen, 2006), for zj = (yj − mj (x))/σj (x) (j = 1, . . . , k) one has P(Y1i ≤ y1 , . . . , Yki ≤ yk | X i = x) = P(ε1i ≤ z1 , . . . , εki ≤ zk ) = C(F1ε (z1 ), . . . , Fkε (zk )), where Fjε (j = 1, . . . , k) denote the marginal distributions of the innovations and C their copula. Thus the joint conditional distribution of the observations, given the covariate, is completely specified by the individual conditional mean and variance functions, the marginal distributions of the innovations, and their copula. The copula C describes the dependence structure of the k time series, conditional on the covariates, after removing influences of the conditional means and variances as well as marginal distributions. We will model the conditional mean and variance function nonparametrically like Härdle et al. (1998), among others. Semiparametric estimation, e. g. with additive structure for mj and multiplicative structure for σj2 as in Yang et al. (1999) can be considered as well and all presented results remain valid under appropriate changes for the estimators and assumptions. Further we will model the marginal distributions of the innovations nonparametrically, whereas we will take two different approaches to estimate the copula C: nonparametrically and parametrically. As the innovations are not observable, both estimators will be based on estimated residuals. We will show that the asymptotic distribution is not affected by the necessary pre-estimation of the mean and variance functions. This remarkable result is intrinsic for copula estimation, while the asymptotic distribution of empirical distribution functions is typically influenced by pre-estimation of mean and variance functions. Moreover, comparison of the nonparametric and parametric copula estimator gives us the possibility to test goodness-of-fit of a parametric class of copulas. Our approach extends the following parametric and semiparametric approaches in time series contexts. Chen and Fan (2006) introduced SCOMDY (semiparametric copula-based multivariate dynamic) models, which are very similar to the model considered here. However, the conditional mean and variance functions are modeled parametrically, while the marginal distributions of innovations are estimated nonparametrically and a parametric copula model is applied to model the dependence. See also Kim et al. (2007) for similar methods for some parametric time series models including nonlinear GARCH models, Rémillard et al. (2012), Kim et al. (2008) and the review by Patton (2012). Chan et al. (2009) give a goodness-of fit test for the innovation copula in the GARCH context. Further, in an i.i.d. setting Gijbels et al. A COPULA APPROACH FOR DEPENDENCE MODELING 3 (2015) show that in nonparametric location-scale models the asymptotic distribution of the empirical copula is not influenced by pre-estimation of the mean and variance function. This results was further generalized by Portier and Segers (2015) to a completely nonparametric model for the marginals. The remainder of the paper is organized as follows. In Section 2 we define the estimators and state some regularity assumptions. In Subsection 2.1 we show weak convergence of the copula process, while in Subsection 2.2 we show asymptotic normality of a parameter estimator when considering a parametric class of copulas. Subsection 2.3 is devoted to goodness-of-fit testing. In Section 3 we present simulation results and in Section 4 a real data example. All proofs are given in the Appendix. 2. Main results For the ease of presentation we will focus on the case of two time series, i. e. k = 2, but all results can be extended to general k ≥ 2 in an obvious manner. Suppose we have observed  for i = 1, . . . , n a section of the stationary stochastic process Y1i , Y2i , X i i∈Z that satisfies (1) Y1i = m1 (X i ) + σ1 (X i ) ε1i , Y2i = m2 (X i ) + σ2 (X i ) ε2i , i = 1, . . . , n,  where X i = (Xi1 , . . . , Xid )T is a d-dimensional covariate and the innovations (ε1i , ε2i ) i∈Z are independent identically distributed random vectors. Further (ε1i , ε2i ) is independent of the past and present covariates X k , k ≤ i, ∀i, and E ε1i = E ε2i = 0, var(ε1i ) = var(ε2i ) = 1. If the marginal distribution functions F1ε and F2ε of the innovations are continuous, then the copula function C of the innovations is unique and can be expressed as (2)  −1 −1 (u2 ) , C(u1 , u2 ) = Fε F1ε (u1 ), F2ε (u1 , u2 ) ∈ [0, 1]2 . As the innovations (ε1i , ε2i ) are unobserved, the inference about the copula function C is based on the estimated residuals (3) εbji = Yji − m b j (X i ) , σ bj (X i ) i = 1, . . . , n, j = 1, 2, where m b j and σ bj are the estimates of the unknown functions mj and σj . In what follows we will consider the local polynomial estimators of order p; see Fan and Gijbels (1996) or Masry (1996), among others. I.e. m b j (x) is for a given x = (x1 , . . . , xd )T defined as βb0 , the b with multi-index 0 = (0, . . . , 0), where β b is the solution to the minimization component of β problem (4) min β=(βi )i∈I n h X X i 2 Yj` − βi ψi,hn X ` − x Khn (X ` − x). `=1 i∈I 4 NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 Here I = I(d, p) denotes the set of multi-indices i = (i1 , . . . , id ) with i. = i1 + · · · + id ≤ p and  ik 1 Q k ψi,hn (x) = dk=1 x(k) ik ! . Further hn Khn (X ` − x) = d Y (k) k=1 with k being a kernel function and hn = Further σj2 (x) is estimated as 1 hn k  X`k −xk (k) hn (1) (d)  hn , . . . , hn  , the smoothing parameter. σ bj2 (x) = sbj (x) − m b 2j (x), where sbj (x) is obtained in the same way as m b j (x) but with Yj` replaced with Yj`2 . For any function f defined on J, interval in Rd , define for ` ∈ N, δ ∈ [0, 1), kf k`+δ = max sup |Di f (x)| + max sup i∈I(d,`) x,x0 ∈J i.=` x6=x0 i∈I(d,`) x∈J where Di = ∂ i. i , i ∂x11 ...∂xdd |Di f (x) − Di f (x0 )| , kx − x0 kδ `+δ (J) the set of and k · k is the Euclidean norm on Rd . Denote by CM e `+δ (J) the subset `-times differentiable functions f on J, such that kf k`+δ ≤ M . Denote by C 2 of C2`+δ (J) of the functions that satisfy inf x∈J f (x) ≥ 21 . In what follows we are going to prove that under appropriate regularity assumptions using the estimated residuals (3) instead of the (true) unobserved innovations εji affects neither the asymptotic distribution of the empirical copula estimator nor the parametric estimator of a copula. 2.1. Empirical copula estimation. Mimicking (2) the copula function C can be estimated nonparametrically as   en (u1 , u2 ) = Fbεb Fb−1 (u1 ), Fb−1 (u2 ) , (5) C 2b ε 1b ε where (6) n  1 X Fbεb(y1 , y2 ) = wni 1 εb1i ≤ y1 , εb2i ≤ y2 , Wn Wn = i=1 n X wnj j=1 is the estimate of the joint distribution function Fε (y1 , y2 ) and n  1 X b Fjbε (y) = wni 1 εbji ≤ y , Wn j = 1, 2, i=1 the corresponding marginal empirical cumulative distribution functions. Here we make use of a weight function wn (x) = 1{x ∈ Jn } and put wni = wn (X i ). For some real positive sequence cn → ∞ we set Jn = [−cn , cn ]d . (or) Now let Cn be the ‘oracle’ estimator based on the unobserved innovations, i.e.   −1 −1 (7) Cn(or) (u1 , u2 ) = Fbε Fb1ε (u1 ), Fb2ε (u2 ) , A COPULA APPROACH FOR DEPENDENCE MODELING 5  P where Fbε (z1 , z2 ) = n1 ni=1 1 ε1i ≤ z1 , ε2i ≤ z2 is the estimator of Fε (z1 , z2 ) based on the unobserved innovations and Fbjε (j = 1, 2) the corresponding marginal empirical cumulative distribution functions. Regularity assumptions. (β) The process (X i , Y1i , Y2i )i∈Z is strictly stationary and absolutely regular (β-mixing) with the mixing coefficient βi that satisfies βi = O(i−b ) with 1 + (s − 1)(1 + d) s−2 where s is specified in assumption (M) below. (1,1) (1,2) (2,2) (Fε ) The second-order partial derivatives Fε , Fε and Fε of the joint cumula(j,k) tive distribution function Fε (y1 , y2 ) = P(ε1 ≤ y1 , ε2 ≤ y2 ), with Fε (y1 , y2 ) = 2 ∂ Fε (y1 ,y2 ) ∂yj ∂yk , satisfy b> max sup j,k∈{1,2} y1 ,y2 ∈R2 Fε(j,k) (y1 , y2 )(1 + yj )(1 + yk ) < ∞. Further the innovation density fjε (j = 1, 2) satisfies     −1 −1 −1 −1 lim 1 + Fjε (u) fjε Fjε (u) = 0 and lim 1 + Fjε (u) fjε Fjε (u) = 0. u→0+ u→1− (FX ) The observations X i (i ∈ Z) have density fX that is bounded and differentiable with bounded uniformly continuous first order partial derivatives. We assume the  existence of some qf > 0 and some positive sequence cn = O (log n)1/d such that (1) (j) (j) d for αn  (log n)−qf and J+ n = ×j=1 [−cn − hn , cn + hn ], inf fX (x) ≥ αn(1) . x∈J+ n (M) For some s > 2, for j = 1, 2, E |εj0 |2s < ∞, the functions σj2s fX and |mj σj |s fX are bounded and there are some i∗ ∈ N, B > 0 such that for all i ≥ i∗ , sup σj2 (x0 )σj2 (xi )fX 0 ,X i (x0 , xi ) ≤ B, x0 ,xi sup mj (x0 )mj (xi ) σj (x0 )σj (xi )fX 0 ,X i (x0 , xi ) ≤ B, x0 ,xi where fX 0 ,X i denotes the joint density of (X 0 , X i ) and is bounded (for i ≥ i∗ ). p+γ (mσ) Let, for j = 1, 2 and for each n ∈ N, mj and σj be elements of CM (Jn ) for n q some γ ∈ (0, 1] and a sequence Mn = O((log n) m ) for some qm ≥ 0. Further, (2) E[σj4 (X 1 )] < ∞ and inf x∈Jn σj (x) ≥ αn for some positive sequence that fulfils (2) αn  (log n)−qσ for some qσ ≥ 0. (k) (Bw) There exists a sequence hn such that hhnn → ak , where ak ∈ (0, ∞), k = 1, . . . , d. Further, for γ from assumption (mσ) and for some δ > 0, nh2p+2γ (log n)D = o(1), n nh3d+2δ (log n)−D → ∞ n NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 6 for all D > 0, and b−1−d− log n = o(1) for θ = θ d n hn b+3−d− 1+b s−1 1+b s−1 with b from assumption (β) and s from assumption (M). (k) k : R → R is a symmetric (d+2)-times continuously differentiable probability density function supported on [−1, 1].  Remark 1. Using Fε (y1 , y2 ) = C F1ε (y1 ), F2ε (y2 ) assumption (Fε ) requires that n   −1 −1 sup C (j,k) (u1 , u2 ) fjε Fjε (uj ) fkε Fkε (uk ) u1 ,u2 ∈[0,1]2 o    −1 −1 −1 0 + C (j) (u1 , u2 ) fjε Fjε (uj ) 1{j = k} 1 + Fjε (uj ) 1 + Fkε (uk ) < ∞, 2 C(u1 ,u2 ) 1 ,u2 ) and C (j,k) (u1 , u2 ) = ∂ ∂u stand for the first and second where C (j) (u1 , u2 ) = ∂C(u ∂uj j ∂uk order partial derivatives of the copula function. Thus provided that for some δ > 0   C (j,k) (u1 , u2 ) = O u2 δ (1−u )2 δ1u2 δ (1−u )2 δ , j k j k  −1 −1 then we need that the functions fjε Fjε (u) (1 + Fjε (u) ) are of order O(uδ (1 − u)δ ). Remark 2. Parts of our assumptions are reproduced from Hansen (2008) because we apply his results about uniform rates of convergence for kernel estimators several times in our proofs. Note that in his Theorem 2 we set q = ∞. Theorem 1. Suppose that assumptions (β), (Fε ), (FX ), (Bw), (M), (k), (Jn ) and (mσ) are satisfied. Then  √  en (u1 , u2 ) − C (or) (u1 , u2 ) = oP (1). sup n C n (u1 ,u2 )∈[0,1]2 (or) Note that Theorem 1 together with the weak convergence of Cn (u1 , u2 ) (see e.g., Propo  e n = √n C en − C weakly converges in sition 3.1 of Segers, 2012) implies that that process C the space of bounded functions `∞ ([0, 1]2 ) to a centred Gaussian process GC , which can be written as GC (u1 , u2 ) = BC (u1 , u2 ) − C (1) (u1 , u2 ) BC (u1 , 1) − C (2) (u1 , u2 ) BC (1, u2 ) , where BC is a Brownian bridge on [0, 1]2 with covariance function   E BC (u1 , u2 )BC (u01 , u02 ) = C(u1 ∧ u01 , u2 ∧ u02 ) − C(u1 , u2 ) C(u01 , u02 ) . P Nevertheless in applications we recommend to use rather Wn = ni=1 wni instead of n as the sample size. A COPULA APPROACH FOR DEPENDENCE MODELING 7 2.2. Semiparametric copula estimation. The copula C describes the dependency between the two time series of interest, given the covariate. For applications modeling this dependency structure parametrically is advantageous because a parametric model often gives easier access to interpretations. Goodness-of-fit testing will be considered in the next section. Suppose that the joint distribution of (ε1i , ε2i ) is given by the copula function C(u1 , u2 ; θ), where θ = (θ1 , . . . , θp )T is an unknown parameter that belongs to a parametric space Θ ⊂ Rp . In copula settings we are often interested in semi-parametric estimation of the parameter θ, i.e. estimation of θ without making any parametric assumption on the marginal distributions F1ε and F2ε . The methods of semi-parametric estimation for i.i.d. settings are summarized in Tsukahara (2005). The question of interest is what happens if we use the estimated residuals (3) instead of the unobserved innovations εji . Generally speaking, thanks to Theorem 1 the answer is that using εbji instead of εji does not change the asymptotic distribution provided that the parameter of interest can be written as a Hadamard differentiable functional of a copula. 2.2.1. Method-of-Moments using rank correlation. This method is in a general way described for instance in Embrechts et al. (2005, Section 5.5.1). To illustrate the application of Theorem 1 for this method consider that the parameter θ is one-dimensional. Then the method of the inversion of Kendall’s tau is a very popular method of estimating the unknown parameter. For this method the estimator of θ is given by θbn(ik) = τ −1 (b τn ), where Z 1Z 1 C(u1 , u2 ; θ) dC(u1 , u2 ; θ) − 1 τ (θ) = 4 0 0 is the theoretical Kendall’s tau and τbn is an estimate of Kendall’s tau. In our settings the Kendall’s tau would be computed from the estimated residuals (b ε1i , εb2i ) for which wni > 0. By Theorem 1 and Hadamard differentiability of Kendall’s tau proved in Veraverbeke et al. (2011, Lemma 1), the estimators of Kendall’s tau based on εbji or on εji are asymptotically equivalent. Thus provided that τ 0 (θ) 6= 0 one gets that   n o  d √ 2 τ n θbn(ik) − θ −−−→ N 0, [τ 0σ(θ)] where στ2 = var 8 C(U11 , U21 ; θ) − 4 U11 − 4 U21 , 2 , n→∞ and (8)   U11 , U21 = F1ε (ε11 ), F2ε (ε21 ) . Analogously one can show that working with residuals has asymptotically negligible effects also for the method of moments introduced in Brahimi and Necir (2012). NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 8 2.2.2. Minimum distance estimation. Here one can follow for instance Tsukahara (2005, Section 3.2). Note that thanks to Theorem 1 the proof of Theorem 3 of Tsukahara (2005) does not (or) en . Thus provided assumptions (B.1)-(B.5) of Tsukahara change when Cn is replaced with C 1 ,u2 ;θ) (2005) are satisfied with δ(u1 , u2 ; θ) = ∂C(u∂θ , then the estimator defined as ZZ  (md) en (u1 , u2 ) − C(u1 , u2 ; t) 2 du1 du2 θbn = arg min C [0,1]2 t∈Θ is asymptotically normal and satisfies    √  (md) d n θbn − θ −−−→ N 0p , Σ(md) , n→∞ where (md) Σ  ZZ = var [0,1]2 h γ(u1 , u2 ; θ) 1{U11 ≤ u1 , U21 ≤ u2 } − 2 X C (j) (u1 , u2 ; θ) 1{Uj1 ) i ≤ uj } du1 du2 , j=1 with #−1 " ZZ δ(v1 , v2 ; θ) δ T (v1 , v2 ; θ) dv1 dv2 γ(u1 , u2 ; θ) = δ(u1 , u2 ; θ). [0,1]2 2.2.3. M-estimator, rank approximate Z-estimators. To define a general M -estimator let us introduce     e1i , U e2i = Wn Fb1bε εb1i , Fb2bε εb2i U (9) Wn +1 n that can be viewed as estimates of the unobserved (U1i , U2i ). Note that the multiplier WWn +1  e1i , U e2i bounded away is introduced in order to have both of the coordinates of the vector U from zero and one. The M -estimator of the parameter θ is now defined as θbn = arg min t∈Θ n X e1i , U e2i ; t wni ρ U  i=1 where ρ(u1 , u2 ; θ) is a given loss function. This class of estimators includes among others the (pl) pseudo-maximum likelihood estimators (θb ), for which ρ(u1 , u2 ; θ) = − log c(u1 , u2 ; θ), with n c(·) being the copula density function. Note that the estimator θbn is usually searched for as a solution to the estimating equations (10) n X  e1i , U e2i ; θbn = 0p , wni φ U i=1 where φ(u1 , u2 ; θ) = ∂ρ(u1 , u2 ; θ)/∂θ. In Tsukahara (2005) the estimator defined as the solution of (10) is called a rank approximate Z-estimator. A COPULA APPROACH FOR DEPENDENCE MODELING 9 In what follows we give general assumptions under which there exists a consistent root (θbn ) of the estimating equations (10) that is asymptotically equivalent to the consistent root (or) (θb ) of the ‘oracle’ estimating equations given by n n   X b1i , U b2i ; θb(or) = 0p , φ U n (11) i=1 where  b1i , U b2i = U (12) n n+1  Fb1ε (ε1i ), Fb2ε (ε2i ) are the standard pseudo-observations calculated from the unobserved innovations and their marginal empirical distribution functions Fbjε (y). Unfortunately, these general assumptions exclude some useful models (e.g. pseudo-maximum likelihood estimator in the Clayton family of copulas) for which the function φ(u1 , u2 ; θ) viewed as a function of (u1 , u2 ) is unbounded. The reason is that for empirical distribution functions calculated from estimated residuals εbji we lack some of the sophisticated results for an empirical distribution function calculated from (true) innovations εji . For such copula families one can use for instance the Method-of-Moments using rank correlation (see Section 2.2.1) to stay on the safe side. Nevertheless the simulation study in Section 3 suggests that the pseudo-maximum likelihood estimation can be used also for the Clayton copula (and probably also for other families of copulas with non-zero tail dependence) provided that the dependence is not very strong. Regularity assumptions. In what follows let θ stand for the true value of the parameter and V (θ) for an open neighbourhood of θ. (Id) θ is a unique minimizer of the function r(t) = E ρ(U1i , U2i ; t) and θ is an inner point of Θ. (φ) There exists V (θ) such that for each l1 , l2 ∈ {1, . . . , p} the functions φl1 (u1 , u2 ; t) = ∂φ(u1 ,u2 ;t) 1 ,u2 ;t) and φl1 ,l2 (u1 , u2 ; t) = ∂φ(u ∂tl1 ∂tl1 ∂tl2 are for each t ∈ V (θ) continuous in (u1 , u2 ) and of uniformly bounded Hardy-Kraus variation (see e.g., Berghaus et al., 2017). (j) (φ ) There exists V (θ) and a function h(u1 , u2 ) such that for each t ∈ V (θ) (j) (j) max max φl (u1 , u2 ; t) ≤ h(u1 , u2 ), where φl (u1 , u2 ; t) = j=1,2 l=1,...,p ∂φl (u1 ,u2 ;t) ∂uj and E h(U11 , U21 ) < ∞. 2 ;t) (Γ) Each element of the (matrix) function Γ(t) = E ∂φ(U∂t1 ,U is a continuous function T and the matrix Γ = Γ(θ) is positively definite. Theorem 2. Suppose that the assumptions of Theorem 1 are satisfied and that also (Id), (φ), (φ(j) ), and (Γ) hold. Then with probability going to one there exists a consistent root θbn 10 NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 of the estimating equations (10), which satisfies   √  d (13) n θbn − θ −−−→ Np 0p , Γ−1 Σ Γ−1 , n→∞ where ( ZZ  Σ = var φ U11 , U21 ; θ + ZZ + 1{U11 ≤ v1 } − v1  1{U21 ≤ v2 } − v2   ∂φ(v1 ,v2 ;θ) ∂v1 dC(v1 , v2 ; θ) )  ∂φ(v1 ,v2 ;θ) ∂v2 dC(v1 , v2 ; θ) . The proof of Theorem 2 is given in Appendix B. Note that the asymptotic distribution of the estimator θbn coincides with the distribution given in Section 4 of Genest et al. (1995) (or) that corresponds to the consistent root θb of the estimating equations (11). Thus using n the residuals instead of the true innovations has asymptotically negligible effect on the (first(or) order) asymptotic properties. In fact, it can be even shown that both θbn and θb have the n same asymptotic representations and thus √ (or)  n θbn − θbn = oP (1). 2.3. Goodness-of-fit testing. When modeling multivariate data using copulas parametrically one needs to choose a suitable family of copulas. When choosing the copula family tests of goodness-of-fit are often a useful tool. Thus we are interested in testing H0 : C ∈ C0 , where C0 = {Cθ , θ ∈ Θ} is a given parametric family of copulas. Many testing methods have been proposed (see e.g. Genest et al., 2009; Kojadinovic and Holmes, 2009, and the references therein). The most standard ones are based on the comparison of nonparametric and parametric estimators of a copula. For instance the Cramér-von Mises statistics is given by ZZ   en (u1 , u2 ) − C(u1 , u2 ; θbn ) 2 dC en (u1 , u2 ), (14) Sn = C where θbn is an estimate of the unknown parameter θ. As the asymptotic distributions of en (u1 , u2 ) and θbn are the same as the asymptotic distribution of C en(or) (u1 , u2 ) and θb(or) C n we suggest that the significance of the test statistic can be assessed in the same way as in i.i.d. settings. Thus one can use for instance the parametric bootstrap by simply generating independent and identically distributed observations from the copula function C(u1 , u2 ; θbn ). The test statistic is then simply recalculated from this observations in the same way as if we directly observed the innovations. The only difference is that instead of generating n observations we recommend to generate only Wn observations. A COPULA APPROACH FOR DEPENDENCE MODELING 11 Similar remarks hold when testing other hypotheses about the copula such as symmetry, for instance. Note that testing H0 : C(u1 , u2 ) ≡ u1 u2 provides a test for conditional independence of the two time series, given the covariate. 3. Simulation study A small Monte Carlo study was conducted in order to compare the semiparametric estimators based on the residuals with the ‘oracle’ estimators based on (unobserved) innovations. The inversion of Kendall’s tau (IK) method and the maximum pseudo-likelihood (MPL) method were considered for the following five copula families: Clayton, Frank, Gumbel, normal, and Student with 4 degrees of freedom. The values of the parameters are chosen so that they correspond to the Kendall’s tau τ = 0.25, 0.50 and 0.75. The data were simulated from the following four models: (Model 1) Y1i = 0.5(Xi + 1)2 + e1+0.1Xi ε1i , Y2i = 0.8(Xi − 1)2 + e1+0.2Xi ε2i , (Model 2) Y1i = 0.7Y1,i−1 + ε1i , Y2i = −0.5Y2,i−1 + ε2i , (Model 3) (Model 4) zY1i = 0.5 Y1,i−1 + ε1i , 2 1 + 0.1Y1,i−1 Y1i = σ1i ε1i , 2 2 σ1i = 1 + 0.3Y1,i−1 , Y2i = −0.4Y2,i−1 + ε2i , Y2i = σ2i ε2i , 2 2 σ2i = 5 + 0.2Y2,i−1 , where the innovations εji , j = 1, 2, follow marginally the standard normal distribution, and Xi is an exogenous variable following the ARMA model Xt = 0.5Xt−1 + ξt + 0.4ξt−1 with ξi being i.i.d. from a standard normal distribution. The simulations were conducted also for innovations εji , j = 1, 2 with Student marginals with 5 degrees of freedom but the results are similar. For brevity of the paper we do not present them here. The nonparametric estimates m b j and σ bj are constructed as local polynomial estimators of order p = 1 with K being the triweight kernel and the bandwidth hn chosen by the crossvalidation method for each estimate separately. The bandwidth is chosen from the interval (0, H), where H is the range of the corresponding explanatory variable. Finally, cn = log n. For each setting, we compute the estimate of the copula parameter θ from the true (but (ik,or) unobserved) innovations using the inversion of Kendall’s tau method (θbn ) and the max(pl,or) imum pseudo-likelihood method (θbn ). These oracle estimators are compared with their (ik) (pl) counterparts computed from the residuals (θbn ) and (θbn ). The performance of the estimators is measured by the bias, variance (VAR) and the mean square error (MSE), which are estimated from the 1 000 random samples. Finally, the sample sizes n = 200, 500 and 1000 are considered. The obtained results are listed for the five copulas separately in Tables 1,2,3,4 and (ik) (pl) 5. As θbn and θbn are natural competitors, the bigger of the two corresponding performance measures (bias, VAR, MSE) is stressed by the bold font. NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 12 n = 200 Known innovations Model estim bias VAR MSE bias VAR MSE bias VAR 0.25 (ik,or) θbn (pl,or) θbn 0.008 0.019 0.019 0.008 0.008 0.009 -0.001 0.005 0.005 0.026 0.015 0.016 0.019 0.007 0.008 0.007 0.004 0.004 (ik,or) θbn (pl,or) θbn 0.022 0.066 0.067 0.019 0.027 0.028 0.003 0.015 0.016 0.027 0.054 0.054 0.017 0.024 0.024 0.002 0.014 0.014 (ik,or) θbn (pl,or) θbn 0.052 0.383 0.386 0.055 0.162 0.165 0.014 0.084 0.085 -0.065 0.287 0.291 -0.029 0.126 0.126 -0.036 0.073 0.075 (ik) θbn (pl) θbn 0.014 0.029 0.029 0.005 0.011 0.011 0.002 0.005 0.005 0.027 0.023 0.023 0.010 0.009 0.009 0.002 0.004 0.004 (ik) θbn (pl) θbn 0.007 0.104 0.104 -0.004 0.039 0.039 -0.006 0.019 0.019 -0.058 0.080 0.084 -0.057 0.031 0.034 -0.047 0.016 0.018 -0.158 0.569 0.594 -0.123 0.223 0.238 -0.098 0.107 0.117 -0.723 0.509 1.032 -0.566 0.237 0.557 -0.443 0.151 0.347 0.005 0.029 0.029 0.004 0.010 0.010 -0.002 0.005 0.005 0.25 0.50 0.50 0.75 0.75 0.25 0.50 0.50 0.75 0.75 0.25 0.25 2 0.50 0.50 0.75 0.75 0.25 0.25 3 0.50 0.50 0.75 0.75 0.25 0.25 4 n = 1000 τ 0.25 1 n = 500 0.50 0.50 0.75 0.75 (ik) θbn (pl) θbn (ik) θbn (pl) θbn 0.018 0.023 0.023 0.013 0.008 0.009 0.003 0.004 0.004 -0.034 0.096 0.097 -0.006 0.033 0.033 -0.010 0.017 0.017 -0.092 0.077 0.086 -0.038 0.028 0.030 -0.028 0.015 0.016 -0.485 0.522 0.757 -0.194 0.205 0.243 -0.120 0.099 0.113 -1.166 0.481 1.842 -0.592 0.209 0.559 -0.368 0.105 0.240 0.003 0.028 0.028 0.002 0.010 0.010 -0.004 0.005 0.005 0.016 0.023 0.023 0.011 0.008 0.009 0.002 0.004 0.004 0.095 0.096 -0.012 0.033 0.033 -0.016 0.017 0.017 -0.093 0.077 0.086 -0.047 0.028 0.030 -0.036 0.015 0.016 -0.488 0.495 0.733 -0.242 0.189 0.247 -0.168 0.092 0.120 -1.128 0.427 1.699 -0.648 0.177 0.597 -0.432 0.094 0.281 0.005 0.030 0.030 0.004 0.010 0.010 -0.003 0.005 0.005 (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn -0.037 (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn MSE 0.016 0.024 0.024 0.010 0.009 0.009 0.000 0.004 0.004 -0.018 0.099 0.099 -0.004 0.033 0.033 -0.011 0.016 0.017 -0.083 0.079 0.086 -0.050 0.028 0.030 -0.046 0.015 0.017 -0.233 0.542 0.596 -0.098 0.200 0.209 -0.088 0.091 0.099 -0.837 0.421 1.122 -0.517 0.185 0.452 -0.402 0.102 0.264 Table 1. Estimation for Clayton copula. In agreement with the results of Genest et al. (1995) and Tsukahara (2005) the results for the (oracle) estimates based on (unobserved) innovations are in favour of MPL method. This continues to hold also when working with estimated residuals provided that the dependence is not very strong (i.e. τ = 0.25 or τ = 0.50). But if the dependence is strong (i.e. τ = 0.75) then one should consider using the IK method. This seems to be true in particular for the Clayton copula and to some extent also to the Frank copula and the Gumbel copula. A closer inspection of the results reveals that while the variance of MPL method is almost always slightly smaller than the variance of the IK method, the bias can be substantially larger. On A COPULA APPROACH FOR DEPENDENCE MODELING n = 200 Known innovations Model estim bias VAR MSE bias VAR MSE bias VAR MSE 0.25 (ik,or) θbn (pl,or) θbn 0.026 0.142 0.143 -0.006 0.071 0.071 0.012 0.037 0.037 0.032 0.142 0.143 -0.002 0.071 0.071 0.013 0.037 0.037 (ik,or) θbn (pl,or) θbn 0.044 0.237 0.239 -0.001 0.117 0.117 0.018 0.062 0.063 0.044 0.234 0.236 0.000 0.116 0.116 0.017 0.061 0.062 (ik,or) θbn (pl,or) θbn 0.073 0.774 0.780 0.009 0.388 0.388 0.038 0.199 0.201 0.25 0.50 0.50 0.75 0.75 0.25 0.50 0.50 0.75 0.75 0.25 0.25 2 0.50 0.50 0.75 0.75 0.25 0.25 3 0.50 0.50 0.75 0.75 0.25 0.25 4 n = 1000 τ 0.25 1 n = 500 13 0.50 0.50 0.75 0.75 -0.031 0.758 0.759 -0.040 0.377 0.379 0.006 0.197 0.197 (ik) θbn (pl) θbn -0.017 0.218 0.218 -0.010 0.091 0.091 -0.009 0.043 0.043 -0.005 0.218 0.218 -0.005 0.091 0.091 -0.005 0.043 0.043 (ik) θbn (pl) θbn -0.059 0.358 0.362 -0.043 0.151 0.153 -0.024 0.072 0.073 -0.055 0.349 0.352 -0.040 0.149 0.150 -0.023 0.072 0.072 (ik) θbn (pl) θbn -0.424 1.225 1.405 -0.287 0.509 0.591 -0.168 0.244 0.272 -0.555 1.154 1.462 -0.336 0.499 0.611 -0.192 0.242 0.278 (ik) θbn (pl) θbn -0.018 0.221 0.222 -0.020 0.085 0.085 0.002 0.041 0.041 -0.010 0.222 0.222 -0.016 0.085 0.085 0.004 0.041 0.041 (ik) θbn (pl) θbn -0.093 0.366 0.375 -0.054 0.140 0.143 -0.014 0.070 0.070 -0.093 0.361 0.369 -0.055 0.138 0.141 -0.016 0.069 0.069 (ik) θbn (pl) θbn -0.899 1.390 2.198 -0.415 0.513 0.685 -0.195 0.252 0.290 -1.048 1.325 2.424 -0.481 0.501 0.732 -0.234 0.250 0.305 0.041 (ik) θbn (pl) θbn -0.021 0.222 0.222 -0.025 0.085 0.085 -0.001 0.041 -0.012 0.223 0.223 -0.020 0.085 0.085 0.000 0.041 0.041 (ik) θbn (pl) θbn -0.107 0.359 0.371 -0.070 0.139 0.143 -0.028 0.069 0.070 -0.108 0.354 0.366 -0.071 0.137 0.142 -0.030 0.068 0.069 -0.930 1.298 2.163 -0.511 0.492 0.753 -0.291 0.238 0.323 (ik) θbn (pl) θbn -1.076 1.219 2.376 -0.575 0.479 0.810 -0.331 0.236 0.345 (ik) θbn (pl) θbn -0.015 0.230 0.230 -0.022 0.084 0.085 0.000 0.041 0.041 -0.006 0.230 0.230 -0.017 0.084 0.085 0.002 0.041 0.041 (ik) θbn (pl) θbn -0.059 0.381 0.385 -0.053 0.142 0.144 -0.017 0.070 0.070 -0.058 0.375 0.379 -0.053 0.140 0.143 -0.018 0.069 0.069 -0.483 1.353 1.587 -0.259 0.511 0.578 -0.144 0.238 0.258 -0.632 1.267 1.667 -0.317 0.493 0.594 -0.176 0.233 0.264 (ik) θbn (pl) θbn Table 2. Estimation for Frank copula. the other hand the results suggest that for the normal and the Student copula one can stay with MPL method even in case of a strong dependence. Finally note that for large sample sizes the performance of the estimates based on residuals is usually almost as good as of the oracle estimates based on (unobserved) innovations. But there is still some price to pay even for the sample size n = 1000 and this price relatively increases with the level of dependence. The question for possible further research is how to explain the bad performance of PML method when based on residuals for the Clayton copula with a strong dependence. NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 14 n = 200 Known innovations Model estim bias VAR MSE bias VAR MSE bias VAR MSE 0.25 (ik,or) θbn (pl,or) θbn 0.057 0.047 0.047 0.007 0.022 0.022 0.011 0.013 0.013 0.142 0.047 0.049 0.062 0.021 0.022 0.040 0.012 0.012 (ik,or) θbn (pl,or) θbn 0.103 0.153 0.154 0.034 0.069 0.069 0.024 0.040 0.040 0.207 0.148 0.152 0.109 0.066 0.067 0.057 0.037 0.037 (ik,or) θbn (pl,or) θbn 0.211 0.799 0.804 0.098 0.359 0.360 0.040 0.201 0.201 0.026 0.713 0.713 0.055 0.321 0.321 -0.034 0.173 0.174 0.25 0.50 0.50 0.75 0.75 0.25 0.50 0.50 0.75 0.75 0.25 0.25 2 0.50 0.50 0.75 0.75 0.25 0.25 3 0.50 0.50 0.75 0.75 0.25 0.25 4 n = 1000 tau 0.25 1 n = 500 0.50 0.50 0.75 0.75 (ik) θbn (pl) θbn 0.080 0.074 0.074 0.026 0.028 0.028 -0.023 0.014 0.014 0.173 0.067 0.070 0.062 0.026 0.027 0.003 0.013 0.013 (ik) θbn (pl) θbn 0.025 0.243 0.243 -0.006 0.089 0.089 -0.070 0.045 0.046 0.042 0.218 0.219 -0.038 0.082 0.082 -0.106 0.043 0.044 -0.595 1.227 1.262 -0.386 0.442 0.457 -0.394 0.235 0.250 -1.607 1.038 1.296 -1.228 0.411 0.562 -1.041 0.259 0.367 0.013 0.068 0.068 -0.018 0.027 0.027 -0.002 0.014 0.014 (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn 0.099 0.066 0.067 0.034 0.026 0.026 0.026 0.013 0.013 -0.158 0.227 0.230 -0.095 0.083 0.084 -0.041 0.044 0.044 -0.152 0.211 0.213 -0.070 0.079 0.079 -0.037 0.041 0.041 (ik) θbn (pl) θbn -2.175 1.182 1.655 -0.986 0.451 0.548 -0.532 0.236 0.265 -3.347 1.019 2.139 -1.537 0.425 0.661 -0.918 0.216 0.300 (ik) θbn (pl) θbn 0.003 0.067 0.067 -0.023 0.027 0.027 -0.007 0.014 0.014 0.086 0.066 0.066 0.029 0.026 0.026 0.018 0.013 0.013 (ik) θbn (pl) θbn -0.173 0.227 0.230 -0.119 0.082 0.083 -0.064 0.044 0.044 -0.165 0.210 0.213 -0.095 0.078 0.079 -0.063 0.040 0.041 (ik) θbn (pl) θbn -2.118 1.150 1.598 -1.154 0.444 0.577 -0.733 0.223 0.277 -3.150 0.988 1.980 -1.667 0.406 0.684 -1.105 0.200 0.322 0.015 0.069 0.069 -0.017 0.027 0.027 -0.006 0.014 0.014 (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn 0.093 0.068 0.068 0.030 0.026 0.026 0.012 0.013 0.013 -0.061 0.234 0.234 -0.069 0.085 0.085 -0.042 0.044 0.045 -0.081 0.210 0.211 -0.064 0.079 0.080 -0.073 0.040 0.041 -0.713 1.268 1.319 -0.429 0.453 0.471 -0.291 0.223 0.231 -1.736 1.087 1.389 -0.965 0.399 0.492 -0.740 0.198 0.253 Table 3. Estimation for Gumbel copula (10 multiples of BIAS, VAR and MSE). 4. Application To illustrate the proposed methods let us consider daily log returns of USD/CZK (US Dollar/Czech Koruna) and GBP/CZK (British Pound/Czech Koruna) exchange rates from 4th January 2010 to 31st December 2012. Note that we take only data till the end of 2012 (total of 758 observations for each series), because in November 2013 the Czech National Bank started its intervention aimed at CZK/EUR exchange rate, and this might violate the assumption of stationarity and independence for more recent data. A COPULA APPROACH FOR DEPENDENCE MODELING n = 200 Known innovations Model tau estim bias VAR 0.25 (ik,or) θbn (pl,or) θbn -0.051 0.710 (ik,or) θbn (pl,or) θbn -0.052 0.418 (ik,or) θbn (pl,or) θbn (ik) θbn (pl) θbn 0.25 0.50 0.50 0.75 0.75 0.25 0.25 1 0.50 0.50 0.75 0.75 0.25 0.25 2 0.50 0.50 0.75 0.75 0.25 0.25 3 0.50 0.50 0.75 0.75 0.25 0.25 4 0.50 0.50 0.75 0.75 n = 500 MSE bias VAR 0.290 0.290 -0.072 0.262 0.267 0.388 0.103 0.103 -0.052 0.087 0.089 0.242 -0.031 0.009 0.009 -0.049 0.008 0.008 -0.580 0.439 0.273 0.402 (ik) θbn (pl) θbn -0.644 -0.264 (ik) θbn (pl) θbn -0.406 (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn 15 n = 1000 MSE bias VAR MSE 0.141 0.141 -0.041 0.071 0.071 0.127 0.129 0.224 0.061 0.062 0.050 0.050 -0.029 0.026 0.026 0.043 0.043 0.139 0.021 0.021 -0.022 0.005 0.005 -0.010 0.002 0.002 -0.021 0.004 0.004 -0.011 0.002 0.002 0.443 -0.130 0.171 0.172 0.026 0.087 0.087 0.403 0.183 0.155 0.156 0.144 0.077 0.077 0.163 0.167 -0.234 0.064 0.064 -0.084 0.031 0.031 0.142 0.142 -0.168 0.055 0.055 -0.116 0.027 0.027 0.016 0.018 -0.209 0.006 0.007 -0.115 0.003 0.003 -0.676 0.016 0.020 -0.483 0.007 0.009 -0.336 0.003 0.004 -0.476 0.452 0.454 -0.287 0.161 0.162 -0.179 0.079 0.079 0.530 0.413 0.416 0.200 0.149 0.150 0.098 0.068 0.068 -0.912 0.169 0.177 -0.402 0.060 0.062 -0.228 0.028 0.029 -0.349 0.142 0.143 -0.122 0.052 0.052 -0.074 0.023 0.023 -1.061 0.022 0.033 -0.441 0.007 0.009 -0.224 0.003 0.003 -1.246 0.021 0.036 -0.526 0.006 0.009 -0.267 0.002 0.003 (ik) θbn (pl) θbn -0.530 0.448 0.451 -0.343 0.162 0.163 -0.216 0.079 0.079 0.469 0.409 0.412 0.137 0.150 0.150 0.060 0.068 0.068 (ik) θbn (pl) θbn -0.967 0.168 0.177 -0.489 0.059 0.062 -0.291 0.028 0.029 -0.401 0.138 0.140 -0.219 0.051 0.052 -0.133 0.023 0.024 (ik) θbn (pl) θbn -1.013 0.020 0.030 -0.504 0.006 0.009 -0.290 0.003 0.004 -1.179 0.019 0.032 -0.580 0.006 0.009 -0.328 0.002 0.003 -0.425 0.478 0.480 -0.352 0.166 0.168 -0.200 0.080 0.080 (ik) θbn (pl) θbn (ik) θbn (pl) θbn (ik) θbn (pl) θbn 0.528 0.438 0.440 0.092 0.154 0.154 0.035 0.069 0.069 -0.648 0.180 0.185 -0.387 0.061 0.062 -0.238 0.029 0.029 -0.125 0.150 0.151 -0.174 0.053 0.054 -0.138 0.024 0.024 -0.407 0.019 0.021 -0.206 0.006 0.006 -0.131 0.003 0.003 -0.565 0.017 0.020 -0.301 0.005 0.006 -0.197 0.002 0.003 Table 4. Estimation for normal copula (100 multiples of BIAS, VAR and MSE). Daily foreign exchange rates have been successfully modelled using the nonparametric autoregression, e.g., in Härdle et al. (1998) and Yang et al. (1999). Here, we apply a simple model of two separate nonparametric autoregressions of order 1 and search for a feasible copula for the innovations. The conditional means and variances are modelled using local polynomials with degree p = 1. The smoothing parameters are chosen using the crossvalidation (CV) method as 0.038, 0.061, 0.025, 0.056 for mU SD , mGBP , σU SD , and σGBP respectively. The fitted conditional means and standard deviations are plotted together with NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 16 n = 200 Known innovations Model tau estim bias VAR 0.25 (ik,or) θbn (pl,or) θbn -0.276 0.309 (ik,or) θbn (pl,or) θbn -0.184 0.185 (ik,or) θbn (pl,or) θbn (ik) θbn (pl) θbn -0.303 0.294 (ik) θbn (pl) θbn -0.491 -0.268 (ik) θbn (pl) θbn 0.25 0.50 0.50 0.75 0.75 0.25 0.25 1 0.50 0.50 0.75 0.75 0.25 0.25 2 0.50 0.50 0.75 0.75 0.25 0.25 3 0.50 0.50 0.75 0.75 0.25 0.25 4 0.50 0.50 0.75 0.75 n = 500 MSE bias VAR 0.350 0.351 -0.051 0.351 0.352 0.267 0.130 0.130 -0.032 0.119 0.120 0.143 -0.066 0.013 0.013 -0.098 0.011 n = 1000 MSE bias VAR MSE 0.179 0.179 -0.131 0.093 0.093 0.176 0.176 0.064 0.092 0.092 0.067 0.067 -0.084 0.035 0.035 0.061 0.061 0.033 0.032 0.032 -0.015 0.006 0.006 -0.028 0.003 0.003 0.011 -0.046 0.005 0.005 -0.041 0.003 0.003 0.513 0.514 -0.139 0.210 0.210 -0.239 0.113 0.114 0.514 0.514 0.084 0.207 0.208 -0.081 0.112 0.112 0.204 0.206 -0.256 0.079 0.080 -0.249 0.042 0.043 0.183 0.183 -0.231 0.072 0.073 -0.236 0.040 0.040 -0.396 0.022 0.024 -0.230 0.008 0.009 -0.178 0.004 0.005 -0.641 0.020 0.024 -0.435 0.007 0.009 -0.327 0.004 0.005 (ik) θbn (pl) θbn -0.995 0.520 0.529 -0.230 0.209 0.210 -0.254 0.103 0.104 -0.423 0.526 0.528 0.070 0.209 0.209 -0.094 0.102 0.102 (ik) θbn (pl) θbn -1.235 0.201 0.216 -0.381 0.081 0.082 -0.276 0.039 0.040 -1.067 0.189 0.201 -0.317 0.074 0.075 -0.232 0.036 0.037 -1.214 0.028 0.043 -0.449 0.009 0.011 -0.251 0.004 0.005 -1.594 0.027 0.052 -0.651 0.009 0.013 -0.356 0.004 0.005 0.104 (ik) θbn (pl) θbn (ik) θbn (pl) θbn -1.061 0.515 0.526 -0.305 0.210 0.210 -0.308 0.104 -0.469 0.521 0.524 -0.028 0.209 0.209 -0.163 0.102 0.102 (ik) θbn (pl) θbn -1.302 0.202 0.219 -0.466 0.081 0.083 -0.361 0.040 0.041 -1.113 0.190 0.203 -0.416 0.075 0.076 -0.331 0.037 0.038 (ik) θbn (pl) θbn -1.162 0.026 0.039 -0.508 0.009 0.012 -0.328 0.004 0.005 -1.475 0.024 0.046 -0.686 0.008 0.013 -0.434 0.004 0.005 (ik) θbn (pl) θbn -0.881 0.525 0.533 -0.175 0.215 0.216 -0.278 0.103 0.104 -0.243 0.530 0.531 0.071 0.215 0.215 -0.157 0.101 0.101 (ik) θbn (pl) θbn -0.902 0.202 0.210 -0.291 0.082 0.083 -0.277 0.039 0.040 -0.658 0.191 0.196 -0.254 0.077 0.078 -0.282 0.036 0.037 -0.503 0.023 0.025 -0.197 0.009 0.009 -0.153 0.004 0.004 -0.734 0.021 0.026 -0.359 0.008 0.009 -0.268 0.003 0.004 (ik) θbn (pl) θbn Table 5. Estimation for Student copula (100 multiples of BIAS, VAR and MSE). the data in Figure 1. It is visible that the conditional mean functions are rather flat and range around zero. We use the goodness-of-fit test proposed in Section 2.3 in order to decide which copula should be used for modelling the innovations from the two autoregressions. The significance of the test statistics is assessed with the help of the bootstrap test based on B = 999 bootstrap samples. We test Clayton, Frank, Gumbel, normal and Student copula with 4 degrees of freedom respectively and obtain p-values 0.001, 0.001, 0.002, 0.062, 0.289. Hence, we conclude 0.02 0.00 −0.01 0.00 GBP 0.01 0.01 0.02 0.03 data fitted cond. mean fitted st.dev. −0.02 −0.03 −0.02 −0.01 USD 17 0.03 A COPULA APPROACH FOR DEPENDENCE MODELING −0.03 data fitted cond. mean fitted st.dev. 0 200 400 600 0 200 Time 400 600 Time Figure 1. Fitted conditional mean and variance for the analyzed log returns. 1.0 that the Student copula seems to be the best choice for the innovations. The normal copula is also not rejected on the 5% level, but the corresponding p-value is rather borderline, so the Student copula seems to provide a better fit. The maximum likelihood method estimates 4.693 degrees of freedom and parameter ρ = 0.782. Figure 2 shows plot of pseudo-observations e1i , U e2i ) given by (9), together with contours of the fitted Student copula. (U ● ● ●●● ● ●● ●● ●● ● ●● ● ● ● ●● ● ● ● ●●●● ● ● ●● ● ●● ● ●● ●● ● ● ●● ● ●●● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ● ● ● ● ● ●● ●● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ● ● ●● ● ● ● ● ● ●● ● ● ●●● ● ● ● ● ● ● ● ● ● ●● ●● ● ●● ● ● ● ●● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ● ● ● ● ● ● ● ●● ●● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ●● ●● ● ● ● ● ● ● ● ● ● ● ● ●● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●●● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ●●● ● ● ● ● ● ● ● ● ● ● ● ● ●● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ●●● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ●● ● ● ●●● ● ● ● ● ● ● ● ● ●● ● ●● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ●● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ●●● ●● ● ● ● ● ●● ● ● ● ● ● ● ●●● ● ● ● ● ●●●● ●● ● ● ● ● ● ●● ●● ● ●● ● ● ● ● ● ●●● ● ● ● ● ● ● ●● ● ● ● ● ●●●●● ● ● ●● ● ● ● ● ● ●● ●●● ● ● ● ● ● ● ● 0.0 0.2 0.4 0.6 0.8 ● 0.0 0.2 0.4 ● 0.6 ● ● ●● 0.8 1.0 e1i , U e2i ) given by (9) together with contours Figure 2. Pseudo-observations (U of the fitted Student copula (black curves). NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 18 Appendix A - Proof of Theorem 1 P Recall the definition Wn = nj=1 wnj . Introduce n  1 X −1 −1 wni 1 εb1i ≤ F1ε (u1 ), εb2i ≤ F2ε (u2 ) Wn i=1  −1 −1 = Fbεb F1ε (u1 ), F2ε (u2 ) b n (u1 , u2 ) = G and note that  bn G b −1 (u1 ), G b −1 (u2 ) , en (u1 , u2 ) = G C 1n 2n b 1n and G b 2n denote the marginals of G b n . Further G b n is a distribution function on [0, 1]2 where G b 1n (0) = G b 2n (0) = 0. Thus one can make use of the with the marginals cdfs satisfying G −1 Hadamard differentiability of the ‘copula mapping’ Φ : G 7→ G(G−1 1 , G2 ) proved in Theorem 2.4 of Bücher and Volgushev (2013) provided we show that the process  √ b n (u1 , u2 ) = n G b n (u1 , u2 ) − C(u1 , u2 ) , (u1 , u2 ) ∈ [0, 1]2 , (A1) G converges in distribution in the space `∞ ([0, 1]2 ) to a process G with continuous trajectories such that G(u, 0) = G(0, u) = G(1, 1) = 0 for each u ∈ [0, 1]. b n . Denote A1: Decomposition and weak convergence of G G(or) n (u1 , u2 ) = n 1X  −1 −1 (u2 ) , (u1 ), ε2i ≤ F2ε 1 ε1i ≤ F1ε n i=1 n X e (or) (u1 , u2 ) = 1 G n Wn  −1 −1 (u2 ) . (u1 ), ε2i ≤ F2ε wni 1 ε1i ≤ F1ε i=1 b n as Now one can decompose the process G  √  √  √ bn = n G en + G e (or) + G(or) , bn − G e (or) + n G e (or) − G(or) + n G(or) − C = G (A2) G n n n n n n (or) (or) e n, G e n and Gn stand for the first, second and third term respectively on the where G right-hand side of the first equation in (A2). In Section A2 it will be shown that the first term on the right-hand side of (A2) satisfies uniformly in (u1 , u2 ) ∈ [0, 1]2 ,  n h −1 i (1) (u , u ) f X C F (u ) 1 2 1ε 1 F −1 (u ) 1ε e n (u1 , u2 ) = √ G ε1i + 1ε 2 1 (ε21i − 1) n i=1  n −1 i (2) C (u1 , u2 ) f2ε F2ε (u2 ) X h F −1 (u ) √ + ε2i + 2ε 2 2 (ε22i − 1) + oP (1) (A3) n i=1 where (in agreement with the last two conditions in (Fε )) for u1 ∈ {0, 1} the first term on the right-hand side of (A3) is defined as zero and analogously for u2 ∈ {0, 1}. A COPULA APPROACH FOR DEPENDENCE MODELING 19 In Section A3, we will show the asymptotic negligibility of the second term on the righthand side of (A2), i.e.  √ e (or) (u1 , u2 ) = e (or) (u1 , u2 ) − G(or) (u1 , u2 ) = oP (1). (A4) sup G sup n G n n n (u1 ,u2 )∈[0,1]2 (u1 ,u2 )∈[0,1]2 Now combining (A2) with (A3) and (A4) yields that uniformly in (u1 , u2 ) (A5) b n (u1 , u2 ) = An (u1 , u2 ) + Bn (u1 , u2 ) + oP (1), G where (A6) n  1 X √ An (u1 , u2 ) = 1{U1i ≤ u1 , U2i ≤ u2 } − C(u1 , u2 ) , n i=1 n 2 h 1 X X (j) −1 Bn (u1 , u2 ) = √ C (u1 , u2 ) fjε Fjε (uj ) εji + n −1 Fjε (uj ) 2 (εji 2 i − 1) . i=1 j=1 The asymptotic representation (A5) together with standard techniques yields the weak conb n. vergence of the process G Now thanks to Hadamard differentiability of the copula functional and Theorem 3.9.4 of van der Vaart and Wellner (1996),    √  √  en (u1 , u2 ) − C(u1 , u2 ) = n G bn G b −1 (u2 ) − C(u1 , u2 ) b −1 (u1 ), G n C 2n 1n (A7) b n (u1 , u2 ) − C (1) (u1 , u2 )G b n (u1 , 1) − C (2) (u1 , u2 )G b n (1, u2 ) + oP (1). =G Note that for each (u1 , u2 ) ∈ [0, 1]2 (A8) Bn (u1 , u2 ) − C (1) (u1 , u2 )Bn (u1 , 1) − C (2) (u1 , u2 )Bn (1, u2 ) = 0. Further combining (A7) with (A5), (A6) and (A8) gives  √  en (u1 , u2 ) − C(u1 , u2 ) n C (A9) = An (u1 , u2 ) − C (1) (u1 , u2 )An (u1 , 1) − C (2) (u1 , u2 )An (1, u2 ) + oP (1). Now the right-hand side of (A9) coincides with the asymptotic representation of the ‘oracle’  √  (or) copula process n Cn − C , which implies the statement of Theorem 1. A2: Showing (A3). Let us introduce the process n 1 X Zn (f ) = √ f (X i , ε1i , ε2i ), n i=1 that is indexed be the following set of functions n   F = (x, y1 , y2 ) 7→ 1 x ∈ [−c, c]d 1 y1 ≤ z1 b1 (x) + a1 (x), y2 ≤ z2 b2 (x) + a2 (x) , o c ∈ R+ , z1 , z2 ∈ R, a1 , a2 ∈ G, b1 , b2 ∈ Ge , NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 20 where, for δ from assumption (Bw) and some ν > d(1 + dδ ),   (A10) G = a : Rd → R | a ∈ C1d+δ Rd , sup kxkν |a(x)| ≤ 1 , x (A11) Ge =  d b:R →R|b∈ e d+δ C 2 d R , sup kxkν |b(x) − 1| ≤ 1 .  x Denote the centred process as (A12) Z̄n (f ) = Zn (f ) − E Zn (f ), f ∈ F, and note that f may be formally identified by (c, z1 , z2 , a1 , b1 , a2 , b2 ). We will use the notation f =(c, ˆ z1 , z2 , a1 , b1 , a2 , b2 ). Consider the semi-norm given by Z 1 kf k2,β = β −1 (u) Q−1 f (u) du, 0 where  β −1 (u) = inf x > 0 : βbxc ≤ u},   Q−1 f (u) = inf x > 0 : P f (ε11 , ε21 , X 1 ) > x ≤ u . Then completely analogously as in the proof of Lemma 1 in Dette et al. (2009) one can show that the logarithm of the bracketing number N[ ] (, F, k · k2,β ) can be bounded by        d d e k · k2 (A13) log O(−2d )N[ ] 2 , G, k · k2 N[ ] 2 , G, = O log() + O −2 ν + d+δ , where the rate follows from our Lemma 2 in Appendix C. Further one bracket is sufficient for  ≥ 1. Thus by (A13) and because ν > d(1 + dδ ), Z ∞q log N[ ] (, F, k · k2,β ) d < ∞. 0 From Dedecker and Louhichi (2002), Section 4.3, it follows that the centred process Z̄n given by (A12) is asymptotically k.k2,β -equicontinuous. To apply this result in order to prove (A3) note that √ X n  n n b 1 (Xi )−m1 (Xi ) −1 i) e Gn (u1 , u2 ) = wni 1 ε1i ≤ F1ε (u1 ) σσb11 (X +m , (X ) σ1 (Xi ) i Wn i=1 o m b 2 (Xi )−m2 (Xi ) −1 i) ε2i ≤ F2ε (u2 ) σσb22 (X + (Xi ) σ2 (Xi )   −1 −1 −1 ε1i ≤ F1ε (u1 ), ε2i ≤ F2ε (u2 ) and introduce the process √ X n  n o n −1 −1 wni 1 ε1i ≤ F1ε (u1 )bb1 (Xi ) + b a1 (Xi ), ε2i ≤ F2ε (u2 )bb2 (Xi ) + b a2 (Xi ) Ǧn (u1 , u2 ) = Wn i=1 n o −1 −1 − 1 ε1i ≤ F1ε (u1 ), ε2i ≤ F2ε (u2 ) A COPULA APPROACH FOR DEPENDENCE MODELING 21 with b aj , bbj , j = 1, 2, from Lemma 1 and Remark 3 in Appendix C. Then one obtains by monotonicity arguments applying Lemma 1(i) that, on an event with probability converging to one    Wn e Zn fn` − Zn gn ) ≤ Gn (u1 , u2 ) − Ǧn (u1 , u2 ) ≤ Zn fnu − Zn gn ) n for some deterministic positive sequence γn = o(n−1/2 ). Here,  −1 −1 −1 −1 fn` = ˆ cn , F1ε (u1 ), F2ε (u2 ), b a1 − γn , bb1 − γn sign(F1ε (u1 )), b a2 − γn , bb2 − γn sign(F2ε (u2 )) ,  −1 −1 −1 −1 fnu = ˆ cn , F1ε (u1 ), F2ε (u2 ), b a1 + γn , bb1 + γn sign(F1ε (u1 )), b a2 + γn , bb2 + γn sign(F2ε (u2 )) ,  −1 −1 gn = ˆ cn , F1ε (u1 ), F2ε (u2 ), b a1 , bb1 , b a2 , bb2 . We only consider the upper bound, the lower one can be handled completely analogous. First   note that Zn fnu − Zn gn ) = Z̄n fnu − Z̄n gn ) + Rn , where with probability converging to one, √ (A14) |Rn | ≤ 2 n max sup |Fjε (uv + w) − Fjε (u(v + sγn ) + w + γn )| = o(1), j=1,2 u∈R,s∈{−1,1} v∈(1/2,1),w∈(−1,1) where the last equality follows by a Taylor expansion, assumption (Fε ) and γn = o(n−1/2 ). Now introducing the notation (j = 1, 2)   −1 −1 −1 (A15) Fjε (u, x, γ) = Fjε (u) bbj (x) + γ sign(Fjε (u)) + b aj (x) + γ one can show that for a sufficiently large M similarly as in the proof of Lemma 1 in Dette et al. (2009)  n o −1 −1 kfnu − gn k2,β ≤ M P 1 X 1 ∈ Jn , ε11 ≤ F1ε (u1 , X 1 , γn ), ε21 ≤ F2ε (u2 , X 1 , γn ) o  n −1 −1 (u2 , X 1 , 0) > 0 (u1 , X 1 , 0), ε21 ≤ F2ε − 1 X 1 ∈ Jn , ε11 ≤ F1ε   −1 −1 (u1 , X 1 , γn ) ≤ M P X 1 ∈ Jn , F1ε (u1 , X 1 , 0) ≤ ε11 ≤ F1ε   −1 −1 + M P X 1 ∈ Jn , F2ε (u2 , X 1 , 0) ≤ ε21 ≤ F2ε (u2 , X 1 , γn ) and this can be bounded by M n−1/2 times the bound on the right hand side of (A14) and thus converges to zero in probability uniformly in u1 , u2 . From k.k2,β -equicontinuity of Z̄n one obtains Z̄n (fnu ) − Z̄n (gn ) = oP (1) uniformly with respect to u1 , u2 and in combination with (A14) and analogous considerations  for the lower bound Zn fn` − Zn gn ) we obtain e n (u1 , u2 ) − Ǧn (u1 , u2 ) = oP (1). sup G u1 ,u2 NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 22 The remaining proof of (A3) is divided into two parts. First we prove that sup Ǧn (u1 , u2 ) − E∗ [Ǧn (u1 , u2 )] = oP (1) (A16) u1 ,u2 and then we calculate E∗ [Ǧn (u1 , u2 )]. Here, with slight abuse of notation, E∗ denotes expectation, considering the functions b aj , bbj as deterministic. Showing (A16). Note that we have Ǧn (u1 , u2 ) − E∗ [Ǧn (u1 , u2 )] = Z̄n (fn ) − Z̄n (gn ), (A17) where  −1 −1 (u2 ), b a1 , bb1 , b a2 , bb2 , (u1 ), F2ε fn = cn , F1ε  −1 −1 (u2 ), 0, 1, 0, 1 , (u1 ), F2ε gn = cn , F1ε with 0 and 1 standing for functions that are constantly equal to zero and one respectively. Similarly to before one can show that for a sufficiently large M i  h   −1 (u1 , X 1 , 0) − u1 1 X 1 ∈ Jn kfn − gn k2,β ≤ M E F1ε F1ε i h   −1 (u2 , X 1 , 0) − u2 1 X 1 ∈ Jn + E F2ε F2ε using notation (A15). Now note that with Lemma 1 (iii) in Appendix C we obtain kfn − gn k2,β = oP (1) uniformly in u1 , u2 . Finally with the help of (A17) and the asymptotic k.k2,β -equicontinuity of the process Z̄n one can conclude (A16). Calculating E∗ [Ǧn (u1 , u2 )]. With the help of a second-order Taylor series expansion of the right-hand side one gets    −1 −1 −1 −1 E∗ [Ǧn (u1 , u2 )] = Fε F1ε (u1 , X, 0), F2ε (u2 , X, 0) − Fε F1ε (u1 ), F2ε (u2 ) = 2   √ X −1 −1 n E∗ wn (X) Fε(j) F1ε (u1 ), F2ε (u2 ) YjX (uj ) j=1 √ (A18) + n 2 2 X 2 X   −1 −1 E∗ wn (X) Fε(j,k) F1ε (u1X ), F2ε (u2X ) YjX (uj ) YkX (uk ) , j=1 k=1 where −1 −1 −1 Yjx (u) = Fjε (u, x, 0) − Fjε (u) = b aj (x) + Fjε (u)(bbj (x) − 1), j = 1, 2, A COPULA APPROACH FOR DEPENDENCE MODELING 23  −1 and the point ujx lies between the points Fjε Fjε (uj , x, 0) and uj . Now using Lemma 1 (iv) in Appendix C for j = 1, 2 √   −1 −1 n E∗ wn (X) Fε(j) F1ε (u1 ), F2ε (u2 ) YjX (uj ) h    i √ −1 −1 −1 ∗ b + = n Fε(j) F1ε (u1 ), F2ε (u2 ) E∗ b aj (X)1{X ∈ J+ } +F (u )E ( b (X) − 1) 1 {X ∈ J } j j n n jε n h i  1 X F −1 (uj ) √ εji + jε 2 (ε2ji − 1) + oP (1) n i=1  −1 n i Fjε (uj ) X h F −1 (uj ) εji + jε 2 (ε2ji − 1) + oP (1) −1 −1 F1ε (u1 ), F2ε (u2 ) = Fε(j) = C (j) (u1 , u2 ) fjε √ n i=1 uniformly in (u1 , u2 ). To conclude the proof of (A3) we need to show that ‘the second order terms’ in (A18) are asymptotically negligible. To show that note that by assumption (Fε ) and Lemma 1 (iii) there exists a finite constant M such that with probability going to one   −1 −1 (uk ) (uj ) 1 + Fkε 1 + Fjε    −1 −1 −1 −1 (uk ) (uj ) 1 + Fkε (u2x ) 1 + Fjε (u1x ), F2ε ≤ Fε(j,k) F1ε   −1 −1 (ukx ) (ujx ) 1 + Fkε 1 + Fjε   −1 −1 1 + Fjε (ujx ) 1 + Fkε (ukx )   −1 −1 (uk ) (uj ) 1 + Fkε 1 + Fjε   ≤M −1 −1 1 + Fjε (ujx ) 1 + Fkε (ukx )   −1 −1 (uk ) (uj ) 1 + Fkε M 1 + Fjε ≤   1  1  1 1 −1 −1 (uk ) 1 + op (n− 4 ) + op (n− 4 ) (uj ) 1 + op (n− 4 ) + op (n− 4 ) 1 + Fkε 1 + Fjε −1 −1 (u2x ) (u1x ), F2ε Fε(j,k) F1ε  ≤ 2M uniformly in (u1 , u2 ) ∈ [0, 1]2 and x ∈ Jn . Thus to prove   −1 −1 EX wn (X) Fε(j,k) F1ε (u1X ), F2ε (u2X ) YjX (uj ) YkX (uk ) = oP (1), it is sufficient to use once more Lemma 1 (iii). A3: Showing (A4). Note that with the notation Wn = Pn i=1 wni one can decompose  √ (or) e (or) n G n (u1 , u2 ) − Gn (u1 , u2 )  √  √ (or) e (or) = n G n (u1 , u2 ) − C(u1 , u2 ) − n Gn (u1 , u2 ) − C(u1 , u2 ) NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 24 (A19) =  n −1 X    −1 −1 √ wni 1 ε1i ≤ F1ε (u1 ), ε2i ≤ F2ε (u2 ) − C(u1 , u2 ) n n Wn i=1 n    1 X −1 −1 +√ (wni − 1) 1 ε1i ≤ F1ε (u1 ), ε2i ≤ F2ε (u2 ) − C(u1 , u2 ) n i=1  1 = Wn − 1 Bn1 (u1 , u2 ) + Bn2 (u1 , u2 ), where Bn1 (u1 , u2 ) stands for the first term on the right-hand side of the equation (A19) (except for the factor Wnn − 1) and Bn2 (u1 , u2 ) for the second term. Further using standard techniques one can show that both Bn1 (u1 , u2 ) and Bn2 (u1 , u2 ) viewed as processes on [0, 1]2 are asymptotically equi-continuous. Moreover as  n − 1 = o (1), and E w (X ) − 1 = −P(X 1 6∈ Jn ) = o(1), n 1 P Wn  one can conclude that both processes W1n − 1 Bn1 (u1 , u2 ) and Bn2 (u1 , u2 ) are uniformly asymptotically negligible in probability, which together with (A19) implies (A4). Appendix B - Proof of Theorem 2 Thanks to assumption (φ), the estimator θbn is a solution to the estimating equations (10). In what follows, first we prove the existence of a consistent root of the estimating equations (10) and then we derive that this root satisfies (B1) √ n   1 X b b n θbn − θ = Γ−1 √ φ U1i , U2i ; θ + oP (1), n i=1 b1i , U b2i ) are introduced in (12). The statement of the theorem now follows for p = 1 where (U by Proposition A 1(ii) of Genest et al. (1995) and for p > 1 by Theorem 1 of Gijbels et al. (2017).  en0 (u1 , u2 ) = 1 Pn wni 1 U e1i ≤ u1 , U e2i ≤ u2 , where pseudoProving consistency. Put C i=1 Wn e1i , U e2i ) are defined in (9). Note that observations (U (B2) en (u1 , u2 ) − C e 0 (u1 , u2 ) = OP C n sup (u1 ,u2 )∈[0,1]2 1 Wn  = OP 1 n  . Fix l ∈ {1, . . . , p}. By Corollary A.7 of Berghaus et al. (2017) one gets Z 1Z 1 n  1 X e e en0 (v1 , v2 ) wni φl U1i , U2i ; t = φl (v1 , v2 ; t) dC Wn 0 0 i=1 Z 1Z 1  en0 (v1 , v2 ) dφl (v1 , v2 ; t) + φl (1, 1; t = C 0 Z (B3) − 0 0 1 en0 (v1 , 1) dφl (v1 , 1; t) − C Z 0 1 e 0 (1, v2 ) dφl (1, v2 ; t). C n A COPULA APPROACH FOR DEPENDENCE MODELING 25 Note that thanks to assumption (φ(j) ) (uniformly in t ∈ V (θ)) Z 1 Z 1 n 1 X 0 e 1{Ue1i ≤ v1 } dφl (v1 , 1; t) Cn (v1 , 1) dφl (v1 , 1; t) = wni Wn 0 0 i=1 1 = Wn Wn X i=1 Z 1 i Wn +1 Z 1 = φl (1, 1; t) − (B4) Wn 1 X φl ( Wni+1 , 1; t) dφl (v1 , 1; t) = φl (1, 1; t) − Wn i=1 φl (v1 , 1; t) dv1 + OP 0 and analogously also Z 1 Z en0 (1, v2 ) dφl (1, v2 ; t) = φl (1, 1; t) − (B5) C 0 1 Wn  1 φl (1, v2 ; t) dv2 + OP 0 1 Wn  . Now combining (B3), (B4) and (B5) yields Z 1Z 1 n  1 X e e e 0 (v1 , v2 ) dφl (v1 , v2 ; t) + Al (t) + OP (B6) wni φl U1i , U2i ; t = C n Wn 0 0 1 n  , i=1 where (B7)  Al (t) = −φl (1, 1; t + Z 1 Z φl (v1 , 1; t) dv1 + 0 1 φl (1, v2 ; t) dv2 . 0 Analogously one gets (B8)  E φl U11 , U21 ; t = Z 1Z 1 C(v1 , v2 ) dφl (v1 , v2 ; t) + Al (t). 0 0 Now using (B2), (B6), (B8) and assumption (φ) gives that uniformly in t ∈ V (θ) n  1 X e1i , U e2i ; t − E φl (U11 , U21 ; t) wni φl U Wn i=1 Z 1Z 1  0  e (v1 , v2 ) − C(v1 , v2 ) dφl (v1 , v2 ; t) + OP = C n 0 0 1 n  = oP (1), where we have used Theorem 1 and assumption (φ). The existence of a consistent root of estimating equations (10) now follows by assumptions (Id) and (Γ). Analogously one can show the existence of a consistent root of estimating equations (11). Showing (B1). Let θbn be a consistent root of the estimating equations (10). Then by the mean value theorem applied to each coordinate of the vector-valued function n  1 X e1i , U e2i ; t wni φ U Ψn (t) = Wn i=1 one gets n   1 X e1i , U e2i ; θbn 0p = wni φ U Wn i=1 NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 26 n n      1 X 1 X ∗ e e e e = wni φ U1i , U2i ; θ + wni Dφ U1i , U2i ; θ n θbn − θ , Wn Wn i=1 i=1 1 ,u2 ;t) and θ ∗n is between θbn and θ. Note that as the mean value where Dφ stands for ∂φ(u∂t ∗,p theorem is applied to a vector valued function there are in fact p different points θ ∗,1 n , . . . , θn for each coordinate of the function Ψn (t) but all of them are consistent so for simplicity of notation we do not distinguish them. Thus to finish the proof of (B1) it is sufficient to show that n  1 X e1i , U e2i ; θ ∗ = Γ + oP (1) wni Dφ U n Wn (B9) i=1 and √ X n n X   n e1i , U e2i ; θ = √1 b1i , U b2i ; θ + oP (1). wni φ U φ U Wn n (B10) i=1 i=1 When proving (B9) one can mimic the proof of consistency of θbn and show that there exists V (θ) (an open neighbourhood of θ such that) sup t∈V (θ) n  1X e1i , U e2i ; t − E Dφ (U11 , U21 ; t) = oP (1). wni Dφ U n i=1 Using the consistency of θbn and assumption (Γ) yields (B9). 0(or) Thus one can concentrate on proving (B10). Put Cn b1i , U b2i ) are defined in (12). Note that u2 , where (U (B11) sup (u1 ,u2 )∈[0,1]2 (u1 , u2 ) = 1 n Cn(or) (u1 , u2 ) − Cn0(or) (u1 , u2 ) = OP Pn i=1 1 n  1 Ub1i ≤ u1 , Ub2i ≤  . Analogously as (B6) one can also show that for l = 1, . . . , p Z 1Z 1 n  1X b b φl U1i , U2i ; θ = φl (v1 , v2 ; θ) dCn0(or) (v1 , v2 ) n 0 0 i=1 Z 1Z 1 (B12) = Cn0(or) (v1 , v2 ) dφl (v1 , v2 ; θ) + Al (θ) + OP 0 0 where Al (θ) is given in (B7). Now using (B2), (B6), (B11), (B12), Theorem 1 and (φ) one gets √ X n n   n 1 X e e b1i , U b2i ; θ wni φl U1i , U2i ; θ − √ φl U Wn n i=1 i=1 Z 1Z 1  √  0 e (u1 , u2 ) − C 0(or) (u1 , u2 ) dφl (u1 , u2 ; θ) + oP = n C n n 0 0 which verifies (B10) and finishes the proof of (B1). √1 n  1 n  , = oP (1), A COPULA APPROACH FOR DEPENDENCE MODELING 27 Appendix C - Auxiliary results Lemma 1. Assume that (β), (Fε ), (M), (FX ), (Bw), (k), (Jn ) and (mσ) are satisfied. Then there exist random functions b aj and bbj on Jn such that for j = 1, 2 (i) sup x∈Jn   m b j (x) − mj (x) σ bj (x) b −b aj (x) = oP n−1/2 , sup − bj (x) = oP n−1/2 , σj (x) x∈Jn σj (x) (ii) kb aj kd+δ = oP (1), aj (x) = oP (iii) sup b kbbj − 1kd+δ = oP (1) for δ > 0 from assumption (Bw),   n−1/4 , sup bbj (x) − 1 = oP n−1/4 , x∈Jn x∈Jn Z (iv) b aj (x)fX (x) dx = Jn 1 n n X  εji + oP n−1/2 , i=1 n   X   bbj (x) − 1 fX (x) dx = 1 ε2ji − 1 + oP n−1/2 . 2n Jn Z i=1  Proof. For ease of presentation we set j = 1 and assume hn = hn , . . . , hn . We will first prove the assertions for m b 1 . The proof basically goes along the lines of the proof of Lemma 1 by Müller et al. (2009), but changes are necessary due to the dependency of observations in our model and because our covariate density is not assumed to be bounded away from zero on its support. Recall that I(d, p) denotes the set of multi-indices i = (i1 , . . . , id ) with i. = i1 + · · · + id ≤ p and we set I = I(d, p), where p is the order of the polynomials used in the local polynomial estimation. b denote the solution of the minimizaProof of assertion (i) for m b 1 . Fix some x ∈ Jn and let β b satisfies the normal equations tion problem (4). Then β X b = 0 ∀i ∈ I, b ik (x)β Ai (x) + Bi (x) − Q k k∈I where n Ai (x) = 1X σ1 (X ` ) ε1` ψi,hn (X ` − x) Khn (X ` − x), n Bi (x) = n 1X m1 (X ` )ψi,hn (X ` − x)Khn (X ` − x), n `=1 b ik (x) = Q 1 n `=1 n X ψi,hn (X ` − x) ψk,hn (X ` − x) Khn (X ` − x). `=1 1/2 From Theorem 2 in Hansen (2008) we obtain for %n = log n/(nhdn ) , (C1) b ik (x) − Qik (x) = OP (%n ), sup Q x∈Jn NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 28   b ik (x) , i, k ∈ I. Note that where we define Qik (x) = E Q Z Qik (x) = ψi,(1,..1) (u) ψk,(1,..1) (u) fX (x + hn u) K(u) du, and for x ∈ Jn , consider the matrices Q(x) with entries Qik (x), i, k ∈ I. Analogously put b b ik (x), i, k ∈ I. Q(x) for the matrix with entries Q It follows from assumption (FX ) that 0 < λn ≤ aT Q(x) a ≤ Λ < ∞ for all vectors a of unit Euclidean length, where λn is a sequence of positive real numbers of the same rate as (1) αn in assumption (FX ). Thus Q(x) has eigenvalues in the interval [λn , Λ], and on the event   λn b En = sup Q(x) − Q(x) ≤ 2 x∈Jn b b one has aT Q(x) a ≥ λn /2 for all a of unit Euclidean length, such that the matrix Q(x) is invertible as well. Here and throughout kQk denotes the spectral norm of a matrix Q. Note (1)  that P(En ) → 1 by (C1) and %n = o αn , which holds under assumption (Bw). For the remainder of the proof we assume that the event En takes place because its complement does not matter for the assertions of the lemma. It follows from the normal equations that for x ∈ Jn ,  b −1 (x) A(x) + B(x) , m b 1 (x) = eT Q 1 where e1 = (1, 0, . . . , 0)T and A(x) and B(x) denote the vectors with components Ai (x) and Bi (x), i ∈ I, respectively. Now define −1 b a1 (x) = eT 1 Q (x)A(x) (C2) 1 , σ1 (x) x ∈ Jn , then we have the decomposition m b 1 (x) − m1 (x) −b a1 (x) = r1 (x) + r2 (x) σ1 (x) (C3) with remainder terms 1 , σ1 (x)  1 b −1 b r2 (x) = eT , 1 Q (x) B(x) − Q(x)β(x) σ1 (x)  −1 b −1 r1 (x) = eT 1 Q (x) − Q (x) A(x) where β(x) is the vector with components β i (x) = hi.n Di m1 (x), i ∈ I. From Theorem 2 in Hansen (2008) we obtain (C4) sup Ai (x) = OP (%n ), i ∈ I. x∈Jn For the treatment of the inverse matrices in r1 (x) we use Cramer’s rule and write b −1 (x) − Q−1 (x) = Q T  1 1 b  C(x) T −  C(x) b det Q(x) det Q(x) A COPULA APPROACH FOR DEPENDENCE MODELING 29   b T T det Q(x) − det Q(x) 1 b b  C(x) − C(x) , +   C(x) b det Q(x) det Q(x) det Q(x) = b b where C(x) and C(x) denote the cofactor matrices of Q(x) and Q(x), respectively. Due to b the boundedness of the functions Qik each element of C(x) − C(x) can be absolutely bounded b by OP (%n ) by (C1) and the same rate is obtained for det(Q(x)) − det(Q(x)) , uniformly in |I| x. Using the lower bound λn for the determinant of Q(x), and assumption (mσ) to bound 1/σ1 gives the rate    (%n )2 (C5) sup r1 (x) = OP = oP n−1/2 (1) 2|I| (2) (αn ) x∈Jn αn by assumption (Bw). In order to show negligibility of r2 (x) first note that the spectral b −1 (x) is given by the reciprocal of the square root of the smallest eigenvalue of norm of Q T Q(x). b b Q(x) With 1/2 λn Tb b b b ≥ (aT Q(x)T Q(x)a)1/2 − Q(x) − Q(x) ≥ aT Q(x) Q(x)a = Q(x)a 2 b −1 (on En ) for all a with ||a|| = 1, we obtain the rate O(λ−1 n ) for Q (x) . Further, by Taylor expansion of m1 (X ` ) in the definition of Bi (x) and using assumption (mσ) we have n 1X ≤ Mn kX ` − xkp+γ kψi,hn (X ` − x)k Khn (X ` − x) n `=1  = O Mn hp+γ fbX (x), n  b Bi (x) − Q(x)β(x) i P where the kernel density estimator fbX (x) = n1 n`=1 Khn (X ` − x) converges to fX (x) uniformly in x ∈ Jn , see Theorem 6 by Hansen (2008). Altogether we have    p+γ n hn = oP n−1/2 (C6) sup r2 (x) = OP M(1) (2) αn αn x∈Jn using assumption (Bw). Now assertion (i) for m b 1 follows from (C2), (C3), (C5) and (C6). Proof of assertion (ii) for b a1 . kb a1 kd+δ = max sup Di b a1 (x) i∈I(d,d) x∈Jn + max max i∈I(d,d) i.=d    sup x,x0 ∈Jn kx−x0 k≤hn |Di b a1 (x) kx − Dib a1 (x0 )| , − x0 kδ sup x,x0 ∈Jn kx−x0 k>hn ≤ max sup Di b a1 (x) i∈I(d,d) x∈Jn + max i∈I(d,d+1) i.=d+1 sup Di b a1 (x) h1−δ + 2 max sup Di b a1 (x) h−δ n n x∈Jn i∈I(d,d) i.=d x∈Jn |Di b a1 (x) kx  − Dib a1 (x0 )|   − x0 kδ NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 30 by the mean value theorem. Again by Theorem 2 of Hansen (2008) we have sup hi.n Di Ak (x) = OP (%n ), i ∈ I(d, d + 1). x∈Jn Further note that   ∂ ∂ −1 −1 Q (x) = Q (x) Q(x) Q−1 (x) ∂xk ∂xk (1)  and that the spectral norm of Q−1 (x) can be bounded by O 1/αn before. We apply the product rule for derivatives to obtain kb a1 kd+δ ≤ max j ` X X `=1,...,d +2 OP  j=0 k=0 j d X X OP  j=0 k=0 = OP  %n h−d n (1) (2) αn αn = OP  %n (1) hd+δ α n n αn  `−j %n h−k n Mn (2) `−j+1 (1) j−k+1 (αn ) (αn ) d−j %n h−k n Mn (1) j−k+1 (2) d−j+1 (αn ) (αn )   + j d+1 X X OP  j=0 k=0 with considerations as d+1−j %n h−k n Mn (2) (1) j−k+1 (αn )d−j+2 (αn )  hn1−δ h−δ n  −d−1    hn %n h−d 1−δ −δ n + OP %n(1) h + O P (2) (1) (2) hn n αn αn αn αn  = oP (1) (2) by assumption (Bw). Assertion (ii) for b a1 follows. Proof of assertion (iii) for b a1 . From the definition of b a1 and (C4) we obtain that    a1 (x) = OP (1)%n (2) = oP n−1/4 sup b αn αn x∈Jn and thus (iii) follows for b a1 . Proof of assertion (iv) for b a1 . To prove (iv) note that Z n 1X ε1i ∆n (X i ) b a1 (x)fX (x) dx = n Jn i=1 with Z 1 eT Q−1 (x) ψ hn (X i − x) Khn (X i − x) fX (x) dx σ1 (x) 1 Z fX (X i − uhn ) = σ1 (X i )  eT Q−1 (X i − uhn ) ψ(u) K(u) du.  1 X i −cn X i +cn σ1 (X i − uhn ) , ∆n (X i ) = σ1 (X i ) hn hn From the support properties of the kernel function it follows that ∆n (X i )1{X i 6∈ J+ n } = 0. − d Further, for Jn = [−cn + hn , cn − hn ] note that n (C7)  1X − −1/2 ε1i ∆n (X i ) 1{X i ∈ J+ n \ Jn } = oP n n i=1 because the expectation is zero and the variance is bounded by    1 1 1 − 2 sup sup fX (x) E 1 X 1 ∈ J+ n \ Jn σ1 (X 1 ) n x∈Jn σ1 (x) λn x∈Rd A COPULA APPROACH FOR DEPENDENCE MODELING ≤ 31  1  Mn hn   1  1  \ J− = O (1) (2) = o n−1 . O (1) (2) Mn P X 1 ∈ J+ n n αn αn αn αn n n It remains to consider n 1X ε1i ∆n (X i )1{X i ∈ J− n }, n i=1 (1) (2) with ∆n (X i ) = ∆n (X i ) + ∆n (X i ), where Z −1 (1) eT ∆n (X i ) = 1 Q (X i − uhn ) ψ(u) K(u) fX (X i − uhn ) du, [−1,1]d Z ∆(2) n (X i ) = [−1,1]d   σ1 (X i ) −1 eT 1 Q (X i − uhn ) ψ(u) K(u) fX (X i − uhn ) σ1 (X i −uhn ) − 1 du. (2) Now, by applying the mean value theorem for σ1 , for X i ∈ J− n , ∆n (X i ) can be bounded (1) (2)  absolutely by O Mn hn /(αn αn ) = o(1). Thus analogously as when showing (C7) one can use Markov’s inequality to get Z n n   1X 1X − −1/2 b a1 (x)fX (x) dx − ε1i = ε1i ∆(1) . n (X i ) − 1 1{X i ∈ Jn } + oP n n n Jn i=1 i=1  (1) 2  To obtain the desired negligibility it remains to show E ∆n (X i ) − 1 1{X i ∈ J− n } → 0. To this end we write Z −1 1= eT 1 Q∗ (x − hn u)ψ(u)K(u)fX (x − hn u) du, [−1,1]d where for x ∈ J+ n the matrix Q∗ (x) has entries Z Q∗ik (x) = fX (x) ψi (u)ψk (u)K(u) du, i, k ∈ I. Note that Q∗ (x) has the smallest eigenvalue of order λn . Thus we obtain the bound  2  − E ∆(1) n (X i ) − 1 1{X i ∈ Jn }  Z  −1 −1 eT =E 1 Q (X i − uhn ) − Q∗ (X i − uhn ) [−1,1]d ψ(u)K(u)fX (X i − uhn ) du Z ≤ O(1) Z J− n [−1,1]d 2 Q−1 (x − uhn ) − Q−1 ∗ (x − uhn ) 1{X i ∈ 2  J− n} du fX (x) dx 2 ≤ O(1) sup kQ−1 (x)k2 sup kQ−1 ∗ (x)k x∈J+ n x∈J+ n Z J− n Z [−1,1]d kQ(x − uhn ) − Q∗ (x − uhn )k2 du fX (x) dx. NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 32 Now with bounds for the matrix norms similar to before, and inserting the definitions of Q and Q∗ we obtain   2 − E (∆(1) n (X i ) − 1) 1{X i ∈ Jn } Z  Z Z 1 |fX (x − uhn + hn v) − fX (x − uhn )|2 K(v) dv du fX (x) dx ≤O (1) 4 (αn ) =O  J− n  h2n (1) (αn )4 [−1,1]d [−1,1]d = o(1) by the mean value theorem and assumptions (FX ) and (k). Proof of assertions (i)–(iv) for σ b1 . Recall the definition σ b12 = sb1 − m b 21 , where sb1 is the local polynomial estimator based on (X i , Y1i2 ), i = 1, . . . , n. With the notation s1 (x) = E[Y1i2 | X i = x] = σ12 (x) + m21 (x) we obtain σ b1 (x) σ1 (x) = 1+ sb1 (x) − s1 (x) m b 1 (x) − m1 (x) m1 (x) − + r(x), σ1 (x) σ1 (x) 2σ12 (x) where r(x) = − 1 (m (b σ12 (x) − σ12 (x))2 b 1 (x) − m1 (x))2 − . 2 σ12 (x) 2σ12 (x)(b σ1 (x) + σ1 (x))2 Put −1 e b c1 (x) = eT 1 Q (x)A(x) 1 , 2 σ12 (x) x ∈ Jn , e where A(x) denotes the vector with components n  1 X e Ai (x) = 2 m1 (X ` )σ1 (X ` ) ε1` + σ12 (X ` ) ε21` − 1 ψi,hn (X ` − x) Khn (X ` − x), n i ∈ I. `=1 Along the lines of the proof of (i) and (ii) for m b 1 one can prove that sup x∈Jn      sb1 (x) − s1 (x) %2n Mn hp+γ n − b c (x) = O + O = oP n−1/2 1 P P (1) |I| (2) 2 (1) (2) 2 2 (αn ) (αn ) αn (αn ) 2σ1 (x) and sup |b c1 (x)| = OP x∈Jn Now noticing that the rate σ b12 (x)−σ12 (x)  %n (1) (2) αn (αn )2  = oP n−1/4 . = sb1 (x)−s1 (x)−(m b 1 (x)−m1 (x))(m b 1 (x)+m1 (x)) we obtain   sup |r(x)| = oP n−1/2 + OP x∈Jn  %2n (1) (2) (αn )2 (αn )4  = oP n−1/2  and (i) follows for σ b1 . If we define bb1 (x) = 1 + b c1 (x) − b a1 (x)m1 (x)/σ1 (x), then (ii) and (iii) follow analogously to before. The only difference is an additional factor σ1 (x) in the denominator that needs to be considered. A COPULA APPROACH FOR DEPENDENCE MODELING 33 To show validity of (iv) note that the regression model Y1i2 = s1 (X i ) + ηi holds with error term ηi = σi2 (X i )(ε21i − 1) + 2m1 (X i )σ1 (X i )ε1i . From this one obtains analogously to the derivation of (iv) for b a1 that Z n n  sb1 (x) 1 X 2 1 X m1 (X i ) f (x) dx = (ε − 1) + ε1i + oP n−1/2 . X 1i 2 2n n σ (X i ) Jn 2σ1 (x) i=1 i=1 1 R But the second sum is also the dominating term in Jn b a1 (x)m1 (x)/σ1 (x)fX (x) dx, which is again shown analogously to the proof of (iv) for b a1 . Thus (iv) follows for bb1 .  Remark 3. Note that due to property (iii) of Lemma 1 and assumption (FX ) we have for x ∈ Jn = [−cn , cn ]d , kxkν |b a1 (x)| ≤ O((log n)ν/d )o(n−1/4 ) = o(1) for every ν > 0. In the proof of Lemma 1, b a1 (x) was only defined for x ∈ Jn . Now we define d+δ d b a1 on R in a way that if b a1 ∈ C1 (Jn ) and kxkν |b a1 (x)| ≤ 1, then b a1 ∈ G defined in (A10).   d Then P b a1 ∈ G → 1 by Lemma 1. Analogously bb1 is defined on R such that P bb1 ∈ Ge → 1 for Ge from (A11). Lemma 2. Let H = G or Ge denote one of the function classes defined in (A10) and (A11), then we have with ν > d(1 + d/δ) and δ from assumption (Bw),   d d log N (, H, k · k∞ ) = O − ν + d+δ for  & 0, and thus the same bound holds for log N[ ] (, H, k · k2 ). e and let  > 0. Choose D = D() = −1/ν . Proof. Let H = G (the proof is similar for G) Let B denote the ball of radius D around the origin. Let a1 , . . . , am : B → R denote the centers of -balls with respect to the supremum norm that cover C1d+δ (B), that is m = N (, C1d+δ (B), k · k∞ ). Then for each a ∈ G we have a|B ∈ C1d+δ (B) and thus there exists j0 ∈ {1, . . . , m} such that supx∈B |a(x) − aj0 (x)| ≤ . Now define aj (x) = 0 for x ∈ Rd \ B, j = 1, . . . , m. Then n o sup |a(x) − aj0 (x)| ≤ max , sup |a(x)| ≤  x∈Rd kxkν |a(x)| kxk≥D because ≤ 1 by definition of G. We obtain N (, G, k · k∞ ) = m and due to van der Vaart and Wellner (1996), Theorem 2.7.1, we have for some universal K     d d d − νd + d+δ d 1 − d+δ d − d+δ log m ≤ K λ B  = O (D + 2)  =O  ,  where B 1 = x : kx − Bk < 1 Thus the first assertion follows. The second assertion follows by van der Vaart and Wellner (1996), proof of Cor. 2.7.2.  34 NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2 References Berghaus, B., Bücher, A., and Volgushev, S. (2017). Weak convergence of the empirical copula process with respect to weighted metrics. Bernoulli, 23(1):743–772. Brahimi, B. and Necir, A. (2012). A semiparametric estimation of copula models based on the method of moments. Stat. Methodol., 9(4):467–477. Bücher, A. and Volgushev, S. (2013). Empirical and sequential empirical copula processes under serial dependence. J. Multivariate Anal., 119:61–70. Chan, N.-H., Chen, J., Chen, X., Fan, Y., and Peng, L. (2009). Statistical inference for multivariate residual copula of GARCH models. Statist. Sinica, 19:53–70. Chen, X. and Fan, Y. (2006). Estimation and model selection of semiparametric copula-based multivariate dynamic models under copula misspecification. J. Econometrics, 135:125–154. Dedecker, J. and Louhichi, S. (2002). Maximal inequalities and empirical central limit theorems. In Dehling, H., Mikosch, T., and Sorensen, M., editors, Empirical process techniques for dependent data, pages 137–160. Birkhäuser Boston. Dette, H., Pardo-Fernández, J. C., and Keilegom, I. V. (2009). Goodness-of-fit tests for multiplicative models with dependent data. Scand. J. Statist., 36(4):782–799. Embrechts, P., Frey, R., and McNeil, A. (2005). Quantitative Risk Management: Concepts, Techniques, and Tools. Princeton Series in Finance, Princeton. Fan, J. and Gijbels, I. (1996). Local Polynomial Modelling and Its Applications. Chapman & Hall/CRC, London. Fan, J. and Yao, Q. (2005). Nonlinear Time Series : Nonparametric and Parametric Methods. Springer series in statistics. Springer, New York. Gao, J. (2007). Nonlinear Time Series: Semiparametric and Nonparametric Methods. Chapman & Hall/CRC, Boca Raton. Genest, C., Ghoudi, K., and Rivest, L.-P. (1995). A semiparametric estimation procedure of dependence parameters in multivariate families of distributions. Biometrika, 82:543–552. Genest, C., Rémillard, B., and Beaudoin, D. (2009). Goodness-of-fit tests for copulas: A review and a power study. Insurance Math. Econom., 44:199–213. Gijbels, I., Omelka, M., Pešta, M., and Veraverbeke, N. (2017). Score tests for covariate effects in conditional copulas. J. Multivariate Anal. Available online, doi: 10.1016/j.jmva.2017.05.001. Gijbels, I., Omelka, M., and Veraverbeke, N. (2015). Estimation of a copula when a covariate affects only marginal distributions. Scand. J. Statist., 42(4):1109–1126. Hansen, B. E. (2008). Uniform convergence rates for kernel estimation with dependent data. Econometric Theory, 24:726–748. Härdle, W., Tsybakov, A., and Yang, L. (1998). Nonparametric vector autoregression. J. Statist. Plann. Inference, 68(2):221–245. A COPULA APPROACH FOR DEPENDENCE MODELING 35 Kim, G., Silvapulle, M. J., and Silvapulle, P. (2007). Semiparametric estimation of the error distribution in multivariate regression using copulas. Aust. N. Z. J. Stat., 49(3):321–336. Kim, G., Silvapulle, M. J., and Silvapulle, P. (2008). Estimating the error distribution in multivariate heteroscedastic time-series models. J. Statist. Plann. Inference, 138(5):1442– 1458. Kojadinovic, I. and Holmes, M. (2009). Tests of independence among continuous random vectors based on Cramér–von Mises functionals of the empirical copula process. J. Multivariate Anal., 100(6):1137–1154. Masry, E. (1996). Multivariate local polynomial regression for time series: uniform strong consistency and rates. J. Time Series Anal., 17(6):571–599. Müller, U. U., Schick, A., and Wefelmeyer, W. (2009). Estimating the error distribution function in nonparametric regression. Statist. Probab. Lett., 79:957–964. Nelsen, R. B. (2006). An Introduction to Copulas. Springer, New York. Second Edition. Patton, A. J. (2012). A review of copula models for economic time series. J. Multivariate Anal., 110:4–18. Portier, F. and Segers, J. (2015). On the weak convergence of the empirical conditional copula under a simplifying assumption. arXiv preprint arXiv:1511.06544. Rémillard, B., Papageorgiou, N., and Soustra, F. (2012). Copula-based semiparametric models for multivariate time series. J. Multivariate Anal., 110:30–42. Segers, J. (2012). Weak convergence of empirical copula processes under nonrestrictive smoothness assumptions. Bernoulli, 18:764–782. Tsukahara, H. (2005). Semiparametric estimation in copula models. Canad. J. of Statist., 33:357–375. van der Vaart, A. W. and Wellner, J. A. (1996). Weak Convergence and Empirical Processes. Springer, New York. Veraverbeke, N., Omelka, M., and Gijbels, I. (2011). Estimation of a conditional copula and association measures. Scand. J. Statist., 38:766–780. Yang, L., Härdle, W., and Nielsen, J. (1999). Nonparametric autoregression with multiplicative volatility and additive mean. J. Time Series Anal., 20(5):579–604.
10
arXiv:1611.00507v1 [cs.DS] 2 Nov 2016 Worst Case Competitive Analysis of Online Algorithms for Conic Optimization Reza Eghbali Department of Electrical Engineering University of Washington Seattle, WA 98195 [email protected] Maryam Fazel Department of Electrical Engineering University of Washington Seattle, WA 98195 [email protected] Abstract Online optimization covers problems such as online resource allocation, online bipartite matching, adwords (a central problem in e-commerce and advertising), and adwords with separable concave returns. We analyze the worst case competitive ratio of two primal-dual algorithms for a class of online convex (conic) optimization problems that contains the previous examples as special cases defined on the positive orthant. We derive a sufficient condition on the objective function that guarantees a constant worst case competitive ratio (greater than or equal to 12 ) for monotone objective functions. We provide new examples of online problems on the positive orthant and the positive semidefinite cone that satisfy the sufficient condition. We show how smoothing can improve the competitive ratio of these algorithms, and in particular for separable functions, we show that the optimal smoothing can be derived by solving a convex optimization problem. This result allows us to directly optimize the competitive ratio bound over a class of smoothing functions, and hence design effective smoothing customized for a given cost function. 1 Introduction Given a proper convex cone K ⊂ Rn , let ψ : K 7→ R be an upper semi-continuous concave function. Consider the optimization problem ! m X maximize ψ At x t (1) t=1 subject to xt ∈ Ft , ∀t ∈ [m], where for all t ∈ [m] := {1, 2, . . . , m}, xt ∈ Rk are the optimization variables and Ft are compact convex constraint sets. We assume At ∈ Rn×k maps Ft to K; for example, when K = Rn+ and Ft ⊂ Rk+ , this assumption is satisfied if At has nonnegative entries. We consider problem (1) in the online setting, where it can be viewed as a sequential game between a player (online algorithm) and an adversary. At each step t, the adversary reveals At , Ft and the algorithm chooses x̂t ∈ Ft . The performance of the algorithm is measured by its competitive ratio, i.e., the ratio of objective value at x̂1 , . . . , x̂m to the offline optimum. Problem (1) covers (convex relaxations of) various online combinatorial problems including online bipartite matching [25], the “adwords” problem [31], and the secretary problem [27]. More generally, it covers online linear programming (LP) [9], online packing/covering with convex cost [4, 7, 11], and generalization of adwords [13]. Online LP is an important example on the positive orthant: maximize subject to m X cTt xt t=1 m X Bt xt ≤ b t=1 T 1 xt ≤ 1, xt ∈ Rk+ , ∀t ∈ [m]. Here Ft = {x ∈ Rk+ | 1T x ≤ 1}, ATt = [ct , BtT ] and ψ(u, v) = u + I{·≤b} (v) where I{·≤b} (v) is the concave indicator function of the set {v ≤ b}. The competitive performance of online algorithms has been studied mainly under the worst-case model (e.g., in [31]) or stochastic models (e.g., in [27]). In the worst-case model one is interested in lower bounds on the competitive ratio that hold for any (A1 , F1 ), . . . , (Am , Fm ). In stochastic models, adversary chooses a probability distribution from a family of distributions to generate (A1 , F1 ), . . . , (Am , Fm ), and the competitive ratio is calculated using the expected value of the algorithm’s objective value. The two most studied stochastic models are random permutation and i.i.d. models. In the random permutation model the adversary is limited to choose distributions that are invariant under random permutation while in the i.i.d. model (A1 , F1 ), . . . , (Am , Fm ) are required to be independent and identically distributed. Note that the worst case model can also be viewed as an stochastic model if one allows distributions with singleton support. Online bipartite matching, and its generalization the “adwords” problem, are two main examples that have been studied under the worst case model. The greedy algorithm achieves a competitive ratio of 1/2 while the optimal algorithm achieves a competitive ratio of 1 − 1/e as bid to budget ratio goes to zero [31, 8, 25, 23]. A more general version of adwords in which each agent (advertiser) has a concave cost has been studied in [13]. On the other hand, secretary problem and its generalizations are stated for random permutation model since the worst case competitive ratio of any online algorithm can be arbitrary small [5, 27]. The convex relaxation of the online secretary problem is a simple linear program (LP) with one constraint. Therefore, the competitive ratio of online algorithms for LP has either been analyzed under random permutation or i.i.d models [3, 16, 14, 20, 26] or under the worst case model with further restrictions on the problem data [9]. Several authors have also proposed algorithms for adwords and bipartite matching problems under stochastic models which have a better competitive ratio than the competitive ratio under the worst case model [29, 24, 17, 30, 21, 12]. The majority of algorithms proposed for the problems mentioned above rely on a primal-dual framework [8, 9, 4, 13, 7]. The differentiating point among the algorithms is the method of updating the dual variable at each step, since once the dual variable is updated the primal variable can be assigned using a simple assignment rule based on complementary slackness condition. A simple and efficient method of updating the dual variable is through a first order online learning step. For example, the algorithm stated in [14] for online linear programming uses mirror descent with entropy regularization (multiplicative weight updates algorithm) once written in the primal dual language. Recently, the work in [14] was independently extended to the random permutation model in [19, 15, 2]. In [2], the authors provide competitive difference bound for online convex optimization under random permutation model as a function of the regret bound for the online learning algorithm applied to the dual. In this paper, we consider two versions of the greedy algorithm for problem (1) The first algorithm, Algorithm 1, updates the primal and dual variables sequentially. The second algorithm, Algorithm 2, provides a direct saddle-point representation of what has been described informally in the literature as “continuous updates” of primal and dual variables. This saddle point representation allows us to generalize this type of updates to non-smooth function. In section 2, we bound the competitive ratios of the two algorithms. A sufficient condition on the objective function that guarantees a non-trivial worst case competitive ratio is introduced. We show that the competitive ratio is at least 12 for a monotone non-decreasing objective function. Examples that satisfy the sufficient condition (on the positive orthant and the positive semidefinite cone) are given. In section 3, we derive optimal algorithms, as variants of greedy algorithm applied to a smoothed version of ψ. For example, Nesterov smoothing provides optimal algorithm for online LP. The main contribution of this paper is to show how one can derive the optimal smoothing function (or from the dual point of view the optimal regularization function) for separable ψ on positive orthant by solving a convex optimization 2 problem. This gives a implementable algorithm that achieves the optimal competitive ratio derived in [13]. We also show how this convex optimization can be modified for the design of the smoothing function specifically for the sequential algorithm. In contrast, [13] only considers continuous updates algorithm. Notation. We denote the transpose of a matrix A by AT . The inner product on Rn is denoted by h·, ·i. Given a function ψ : Rn 7→ R, ψ ∗ denotes the concave conjugate of ψ defined as ψ ∗ (y) = inf hy, ui − ψ(u), u for all y ∈ Rn . For a concave function ψ, ∂ψ(u) denotes the set of supergradients of ψ at u, i.e., the set of all y ∈ Rn such that ∀u0 ∈ Rn : ψ(u0 ) ≤ hy, u0 − ui + ψ(u). The set ∂ψ is related to the concave conjugate function ψ ∗ as follows. For an upper semi-continuous concave function ψ we have ∂ψ(u) = argmin hy, ui − ψ ∗ (y). y Under this condition, (ψ ∗ )∗ = ψ. A differentiable function ψ has a Lipschitz continuous gradient with respect to k·k with continuity parameter µ1 > 0 if for all u, u0 ∈ Rn , 1 ∗ k∇ψ(u0 ) − ∇ψ(u)k ≤ ku − u0 k , µ ∗ where k·k is the dual norm to k·k. For an upper semi-continuous concave function ψ, this is ∗ equivalent to ψ ∗ being µ-strongly concave with respect to k·k (see, for example, [36, chapter 12]). The dual cone K ∗ of a cone K ⊂ Rn is defined as K ∗ = {y | hy, ui ≥ 0 ∀u ∈ K}. Two examples of self-dual cones are the positive orthant Rn+ and the cone of n × n positive semidefinite matrices n S+ . A proper cone (pointed convex cone with nonempty interior) K induces a partial ordering on Rn which is denoted by ≤K and is defined as x ≤K y ⇔ y − x ∈ K. For two sets F, G ⊂ Rn , we write F ≤K G when u ≤K v for all u ∈ F, v ∈ G. 1.1 Two greedy algorithms The (Fenchel) dual problem for problem (1) is given by m X minimize σt (ATt y) − ψ ∗ (y), (2) t=1 where the optimization variable is y ∈ Rn , and σt denotes the support function for the set Ft defined as σt (z) = supx∈Ft hx, zi. We denote the optimal dual objective with D? . A pair (x∗ , y ∗ ) ∈ (F1 × . . . Fm ) × K ∗ is an optimal primal-dual pair if and only if x∗t ∈ argmax x, ATt y ∗ ∀t ∈ [m], x∈Ft m X y ∗ ∈ ∂ψ( At x∗t ). (3) (4) t=1 Based on these optimality conditions, we consider two algorithms. Algorithm 1 updates the primal and dual variables sequentially, by maintaining a dual variable ŷt and using it to assign x̂t ∈ argmaxx∈Ft x, ATt ŷt . The algorithm then updates the dual variable based on the second optimality condition (4) 1 . By the assignment rule, we have At x̂t ∈ ∂σt (ŷt ), and the dual variable update can be viewed as * t + X ŷt+1 ∈ argmin As x̂s , y − ψ ∗ (y). y s=1 Therefore, the dual update is the same as the update in dual averaging [34] or Follow The Regularized Leader (FTRL) [39, 1][37, section 2.3] algorithm with regularization −ψ ∗ (y). 1 we assume that ∂ψ nonempty on the boundary of K, otherwise, we can modify the algorithm to start from a point in the interior of the cone very close to zero. 3 Algorithm 1 Sequential Update Initialize ŷ1 ∈ ∂ψ(0) for t ← 1 to m do Receive At , Ft x̂t ∈ argmaxx∈Ft x, ATt ŷt Pt ŷt+1 ∈ ∂ψ( s=1 As x̂s ) end for Algorithm 2 updates the primal and dual variables simultaneously, ensuring that x̃t ∈ argmax x∈Ft x, ATt ỹt , ỹt ∈ ∂ψ( t X As x̃s ). s=1 This algorithm is inherently more complicated than algorithm 1, since finding x̃t involves solving a saddle-point problem. This can be solved by a first order method like the mirror descent algorithm for saddle point problems. In contrast, the primal and dual updates in algorithm 1 solve two separate maximization and minimization problems 2 Algorithm 2 Simultaneous Update for t ← 1 to m do Receive At , Ft (ỹt , x̃t ) ∈ arg miny maxx∈Ft D E Pt−1 y, At x + s=1 As x̃s − ψ ∗ (y) end for For a reader more accustomed to optimization algorithms, we would like to point to alternative views on these algorithms. If 0 ∈ Ft for all t, then an alternative view on Algorithm 2 is coordinate minimization. Initially, all the coordinates are set to zero, then at step t ! t X x̃t ∈ argmax ψ At x̃s + At x . (5) x∈Ft s=1 If in addition ψ is differentiable, Algorithm 1, at each time step t, applies one iteration of Frank-Wolfe algorithm [18] for solving (5). 2 Competitive ratio bounds and examples for ψ In this section, we derive bounds on the competitive ratios of Algorithms P1mand 2 by bounding their respective duality gaps. Let ỹm+1 to be the minimum element in ∂ψ( t=1 At x̃t ) with respect to ordering ≤K ∗ (such an element exists in the superdifferential by Assumption (1), which appears Pm later in this section). We also choose ŷm+1 to be the minimum element in ∂ψ( t=1 At x̂t ) with respect to ≤K ∗ . Note that ŷm+1 is used for analysis and does not play a role in the assignments of Algorithm 1. Let Pseq and Psim denote the primal objective values for the primal solution produced by the algorithms 1 and 2, and Dseq and Dsim denote the corresponding dual objective values, ! ! m m X X Pseq = ψ At x̂t , Psim = ψ At x̃t , t=1 Dseq = m X t=1 σt (ATt ŷt ) − ψ ∗ (ŷm+1 ), Dsim = t=1 m X σt (ATt ỹt ) − ψ ∗ (ỹm+1 ). t=1 2 Also if the original problem is a convex relaxation of an integer program, meaning that each Ft = convFt where Ft ⊂ Zl , then x̂t can always be chosen to be integral while integrality may not hold for the solution of the second algorithm. 4 The next lemma provides a lower bound on the duality gaps of both algorithms. Lemma 1 The duality gap for Algorithm 2 is lower bounded as Psim − Dsim ≥ ψ ∗ (ỹm+1 ) + ψ(0), and the duality gap for Algorithm 1 is lower bounded as Pseq − Dseq ≥ ψ ∗ (ŷm+1 ) + ψ(0) + m X hAt x̂t , ŷt+1 − ŷt i . t=1 Furthermore, if ψ has a Lipschitz continuous gradient with parameter 1/µ with respect to k·k, then Pseq − Dseq ≥ ψ ∗ (ŷm+1 ) + ψ(0) − m X 1 2 kAt x̂t k . 2µ t=1 (6) Note that right hand side of (6) is exactly the regret bound of the FTRL algorithm (with a negative sign) [38]. The proof is given in Appendix A. To simplify the notation in the rest of the paper, we assume ψ(0) = 0. Now we state a sufficient condition on ψ that leads to non-trivial competitive ratios, and we assume this condition holds in the rest of the paper. One can interpret this assumption as having “diminishing returns” with respect to the ordering induced by a cone. Examples of functions that satisfy this assumption will appear later in this section. Assumption 1 Whenever u ≥K v, there exists y ∈ ∂ψ(u) that satisfies y ≤K ∗ z, for all z ∈ ∂ψ(v). When ψ is differentiable, Assumption 1 simplifies to u ≥K v ⇒ ∇ψ(u) ≤K ∗ ∇ψ(v). That is, the gradient, as a map from Rn (equipped with ≤K ) to Rn (equipped with ≤K ∗ ), is orderreversing (also known as antitone). If ψ satisfies Assumption 1, then so does ψ ◦ A, when A is a linear map such that hy, Avi ≥ 0, for all v ∈ K and y ∈ K ∗ . When ψ is twice differentiable, Assumption 1 is equivalent to w, ∇2 ψ(u)v ≤ 0, for all u, v, w ∈ K. For example, this is equivalent to Hessian being element-wise non-positive when K = Rn+ . Competitive ratio for non-decreasing ψ 2.1 To quantify the competitive ratio of the algorithms, we define αψ : K 7→ R as αψ (u) = sup {c | ψ ∗ (y) ≥ cψ(u), ∀y ∈ ∂ψ(u)}, (7) which for u 6= 0 can also be written as αψ (u) = ψ ∗ (y) . y∈∂ψ(u) ψ(u) inf Since ψ ∗ (y) + ψ(u) = hy, ui for all y ∈ ∂ψ(u), αψ is equivalent to3 αψ (u) = sup{c | hy, ui ≥ (c + 1)ψ(u), ∀y ∈ ∂ψ(u)} (8) = sup{c | ψ 0 (u; u) ≥ (c + 1)ψ(u)}, where ψ 0 (u, v) is the directional derivative of ψ at u in the direction of v. Note that for any u ∈ K, we have −1 ≤ αψ (u) ≤ 0 since for any y ∈ ∂ψ(u), by concavity of ψ and the fact that y ∈ K ∗ , we have 0 ≤ hy, ui ≤ ψ(u) − ψ(0). If ψ is a linear function then αψ = 0, while if 0 ∈ ∂ψ(u) for some u ∈ K, then αψ (u) = −1. Figure 1 shows a differentiable function ψ : R+ 7→ R. The value of α(u0 ) is the ratio of ψ ∗ (ψ 0 (u0 )) to ψ(u0 ) as shown. The next theorem provides lower bounds on the competitive ratio of the two algorithms. 3 If ψ(0) 6= 0, then the definition of αψ should be modified to αψ (u) = sup{c | hy, ui ≥ (c + 1)(ψ(u) − ψ(0)), y ∈ ∂ψ(u)}. 5 ψ(u0 ) −ψ ∗ (ψ 0 (u0 )) u0 u Figure 1: ψ 0 is the derivative of ψ and −ψ ∗ (ψ 0 (u0 )) is the y-intercept of the tangent to the function graph at u0 . αψ (u0 ) is the ratio of ψ ∗ (ψ 0 (u0 )) to ψ(u0 ). Theorem 1 If Assumption 1 holds, then for the simultaneous update algorithm we have 4 : Psim ≥ 1 D? . 1 − ᾱψ where D∗ is the dual optimal objective and ᾱψ = inf{αψ (u) | u ∈ K}. (9) For the sequential update algorithm, Pseq ≥ m X 1 (D? + hAt x̂t , ŷt+1 − ŷt i). 1 − ᾱψ t=1 Further, if ψ is differentiable with gradient Lipschitz continuity parameter Pseq ≥ Proof: 1 µ with respect to k·k, m X 1 1 2 kAt x̂t k ). (D? − 1 − ᾱψ 2µ t=1 (10) We first show that Assumption 1 implies that m X σt (ATt ỹt ) ≥ t=1 m X m X σt (At ŷt ) ≥ σt (ATt ỹm+1 ), t=1 m X t=1 (11) σt (At ŷm+1 ), t=1 To do so, we prove that for all t, σt (ATt ỹt ) ≥ σt (ATt ỹm+1 ). The proof for σt (ATt ŷt ) ≥ σt (ATt ŷm+1 ) follows the same steps. Pt Pm For any t, we have for all s. Since ỹt ∈ s=1 As x̃s ≤K s=1 As x̃s since As Fs ⊂ KP Pt m ∂ψ( s=1 As x̃s ) and ỹm+1 was chosen to be the minimum element in ∂ψ( s=1 As x̃s ) with respect to ≤K ∗ , by the Assumption 1, we have ỹt ≥K ∗ ỹm+1 . Since At x ∈ K for all x ∈ Ft , we get hAt x, yt i ≥ hAt x, ym i . Therefore, σt (ATt ỹt ) ≥ σt (ATt ỹm+1 ). Now by (11) Dsim = m X σt (ATt ỹt ) ∗ − ψ (ỹm+1 ) ≥ m X t=1 σt (ATt ỹm+1 ) − ψ ∗ (ỹm+1 ) ≥ D? . t=1 ? Similarly, Dseq ≥ D . Lemma 1 and definition of ᾱψ give the desired result. 4 If ψ(0) 6= 0, then the conclusion becomes Psim − ψ(0) ≥ 6 1 1−αψ (D? − ψ(0)).  Competitive ratio for non-monotone ψ 2.2 If ψ is not non-decreasing with respect to K, the algorithms are not guaranteed to increase the objective at each step; therefore, Pseq and Psim are not guaranteed to be non-negative. However, if we add the assumption that 0 ∈ Ft for all t, then Algorithm 2 will not decrease the objective at any step, t t−1 X X ψ( As x̃s ) − ψ( As x̃s ) ≥ x̃t , ATt ỹt = max x, ATt ỹt ≥ 0, s=1 x∈Ft s=1 (12) which follows from concavity of ψ. In other words, the algorithm simply assigns 0 to xt if any other feasible point in Ft reduces the objective value. Define m X ũ = At x̃t , t=1 and note that under the assumption 0 ∈ Ft , we have ψ(ũ) ≥ 0. Further, we have: 1 Psim ≥ D? . 1 − αψ (ũ) (13) We provide examples of non-monotone ψ and their competitive ratio analysis in this section and section 3.1. Given appropriate conditions on Ft and At , in order to find a lower bound on the competitive ratio independent of ũ, we only need to lower bound αψ over a subset of K. Note that when ψ is not non-decreasing, then there exists a supergradient that is not in K ∗ . Therefore, αψ (ũ) for general ψ can be less than −1. In this case, the lower bound for the competitive ratio of Algorithm (2) is less than 12 . We now consider examples of ψ that satisfy Assumption 1 and derive lower bound on αψ for those examples. 2.3 Examples on the positive orthant. Let K = Rn+ and note that K ∗ = K. To simplify the notation we use ≤ instead of ≤Rn+ . When ψ has continuous partial second derivatives with respect to all the variables, Assumption 1 is equivalent to the Hessian being element-wise non-positive over Rn+ . Assumption 1 is closely related to submodularity. In fact, on the positive orthant this assumption is sufficient for submodularity of ψ on the lattice defined by ≤. However, this assumption is not necessary for submodularity. When ψ has continuous partial second derivatives with respect to all the variables, the necessary and sufficient condition only requires the off-diagonal elements of the Hessian to be non-positive [28]. If ψ is separable, i.e., ψ(u) = n X ψi (ui ), (14) i=1 Assumption 1 is satisfied since by concavity for each ψi we have ∂ψi (ui ) ≤ ∂ψi (vi ) when ui ≤ vi . If ψ satisfies the Assumption 1, then so does ψ(Au), where A is an element-wise non-negative matrix. Adwords In the basic adwords problem, for all t, Ft = {x ∈ Rl+ | 1T x ≤ 1}, At is a diagonal matrix with non-negative entries, and n n X X ψ(u) = ui − (ui − 1)+ , (15) i=1 ∗ i=1 T where (·)+ = max{·, 0}. In this problem, ψ (y) = 1 (y − 1). Since 0 ∈ ∂ψ(1) we have αψ = −1 by (8); therefore, the competitive ratio of algorithm 2 is 12 . Let r = maxt,i,j At,ij , then we have Pm 1 t=1 hAt x̂t , ŷt+1 − ŷt i ≤ nr. Therefore, the competitive ratio of algorithm 1 goes to 2 as r (bid to budget ratio) goes to zero. In adwords with concave returns studied in [13], At is diagonal for all t and ψ is separable 5 . 5 Note that in this case one can remove the assumption that ∂ψi ⊂ R+ since if ỹt,i = 0 for some t and i, then x̃s,i = 0 for all s ≥ t. 7 Online linear program and non-separable budget Recall that online LP is given by ! m m X X T maximize ct xt + I{·≤1} Bt xt t=1 t=1 x t ∈ Ft , ∀t ∈ [m]. where Ft = {x ∈ Rk+ | 1T x ≤ 1} is the simplex. If a lower bound on the optimal dual variable mini yi∗ ≥ −l is given, then the LP can be written in the exact penalty form [6]: ! m m X X T maximizext ∈Ft ct x t + G Bt xt . (16) t=1 t=1 where G is an l-Lipschitz continuous function with respect to l1 norm given by n X G(u) = −l (ui − 1)+ . i=1 −l is a lower bound on dual variable if   ct,j l > max | Bt,ij > 0, j ∈ [k], i ∈ [n] . Bt,ij (17) To prove this, by way of contradiction, we assume that yi∗ ≤ −l for some i ∈ [n]. Now by the definition of l, we have ct,j + (BtT y ∗ )j < 0 for all j such that Bt,ij > 0. On the other hand by the optimality condition (3), ct + BtT y ∗ ∈ NFt (x∗t ) where NFt (x∗t ) is the normal cone of the simplex at x∗t . Therefore, we should have x∗t,j = 0 for all j such that Bt,ij > 0. This results in (Bt x∗t )i = 0 Pm which yield ( t=1 Bt x∗t )i = 0. This means that the corresponding variable yi∗ = 0 which is a contradiction. With this choice of l, Algorithm 2 always maintains a feasible solution for the original problem when applied to (16). This follows from the fact that if ỹt,i = −l for some t and i, then (Bt x̃t )i = 0. Note that in the adwords problem Bt = diag(ct ) and l = 1. For any p ≥ 1 let Bp be Pnthe lp -norm ball. In order to provide examples of non-separable G, we rewrite the function i=1 (ui − 1)+ using the distance from B∞ . For any set C ⊂ Rn+ , let d1 (u, C) = inf ū∈C ku − ūk1 and note that d1 (u, C) is 1-Lipschitz continuous with respect to l1 norm. We have: n X (1 − ui )+ = d1 (u, B∞ ). (18) i=1 Pm Consider a problem with constraint k t=1 Bt xt kp ≤ 1. Given the bound on dual variable in (17), this problem can be equivalently written in the form of (16) with the exact penalty [10, Theorem 5.5] G(u) = −ld1 (u, Bp ). When p = ∞, we get back (18). For p ≥ 1, although not separable, the function G(u) = −d1 (u, Bp ) satisfies Assumption 1. For B1 , that follows from the fact that d1 (u, B1 ) = (1T u − 1)+ ; therefore, ∂d1 (u, B1 ) = 1∂f (1T u), where f (x) = (x − 1)+ . The proof for p > 1 is given in Appendix B. When ψ is given by 16 with G(u) = −ld1 (u, Bp ), we have αψ (ũ) ≥ − θl , where θ = mint minx∈Ft 2.4 cT t x . 1T Bt x The derivation of this bound is also given in Appendix B. Examples on the positive semidefinite cone. n Let K = S+ and note that K ∗ = K. An interesting example that satisfies Assumption 1 is p ψ(U ) = trU with p ∈ (0, 1), where ∇ψ(U ) = pU p−1 and ᾱψ = p − 1. This objective function is used in pth mean optimal experiment design. Another example is ψ(U ) = log det(U + A0 ), where ∇ψ(U ) = (U + A0 )−1 and ᾱψ = −1 since h∇ψ(U ), U i n − tr(A0 + U )−1 A0 = → 0 as trU → ∞. ψ(U ) − ψ(0) log det((A0 + U )A−1 0 ) 8 Maximizing log det arises in several offline applications including D-optimal experiment design [35], maximizing the Kirchhoff complexity of a graph [41], Optimal sensor selection [22, 40]. An example of applications for maximizing the logdet of a projected Laplacian, as a function of graph edge weights, appears in connectivity control of mobile networks [41]. We derive the competitive ratio of the greedy algorithm with smoothing for online experiment design and Kirchhoff complexity maximization of a graph in section 3. 3 Smoothing of ψ for improved competitive ratio The technique of “smoothing” an objective function, or equivalently adding a strongly convex regularization term to its conjugate function, has been used in several areas. In convex optimization, a general version of this is due to Nesterov [32], and has led to faster convergence rates of first order methods for non-smooth problems. In this section, we study how replacing ψ with a appropriately smoothed function ψS helps improve the performance of the two algorithms discussed in section 1.1, and show that it provides optimal competitive ratio for two of the problems mentioned in section 2, adwords and online LP. We then show how to maximize the competitive ratio of Algorithm 2 for a separable ψ and compute the optimal smoothing by solving a convex optimization problem. This allows us to design the most effective smoothing customized for a given ψ: we maximize the bound on the competitive ratio over the set of smooth functions.(see subsection 3.2 for details). Let ψS denote an upper semi-continuous concave function (a smoothed version of ψ), and suppose ψS satisfies Assumption 1. The algorithms we consider in this section are the same as Algorithms 1 and 2, but with ψ replacing ψS . Note that the competitive ratio is computed with respect to the original problem, that is the offline primal and dual optimal values are still the same P ? and D? as before. If we replace ψ with ψS in algorithms 1 and 2, the dual updates are modified to * t + X ŷt+1 ∈ argmin As x̂s , y − ψS ∗ (y), y s=1 * (x̃t , ỹt ) ∈ arg min max y x∈Ft y, At x + t−1 X + As x s − ψS ∗ (y). s=1 From Lemma 1, we have that Dsim ≤ ψS Dseq ≤ ψS m X t=1 m X ! At x̃t − ψ ∗ (ỹm+1 ) ! At x̂t − ψ ∗ (ŷm+1 ) − t=1 (19) m X hAt x̂t , ŷt+1 − ŷt i . (20) t=1 Similar to our assumption on ψ(0), to simplify the notation, by replacing ψS (·) with ψS (·) − ψS (0), we assume ψS (0) = 0. Define αψ,ψS (u) = sup{c |ψ ∗ (y) ≥ ψS (u) + (c − 1)ψ(u), ∀y ∈ ∂ψS (u)}, and ᾱψ,ψS = inf{αψ,ψS (u) | u ∈ K}. Now the conclusion of Theorem 1 holds with ᾱψ replaced by ᾱψ,ψS . Similarly, when ψS is nonmonotone, inequality (13) holds with αψ replaced by αψ,ψS . 3.1 Nesterov Smoothing We first consider Nesterov smoothing [32], and apply it to examples on non-negative orthant. Given a proper upper semi-continuous concave function φ : Rn 7→ R ∪ {−∞}, let ψS = (ψ ∗ + φ∗ )∗ . Note that ψS is the hypo-sum (sup-convolution) of ψ and φ. ψS = ψφ(u) = sup ψ(v) + φ(u − v). v 9 This is called hypo-sum of ψ and φ since the hypo-graph of ψS is the Minkowski sum of hypo-graphs of ψ and φ. If ψ and φ are separable, then ψφ satisfies Assumption 1 for K = Rn+ . Here we provide example of Nesterov smoothing for functions on non-negative orthant. Adwords and Online LP: Consider the problem (16) with G(u) = −l problem we smooth G with: Pn i=1 (ui − 1)+ . For this m 1 X (e − 1) θ φ∗ (y) = ( ((yi − ) log(1 − yi )) − (1 + γ)1T y), γ i=1 (e − 1) θ where γ = log(1 + l(e−1) ), θ cTt x T x∈Ft 1 Bt x θ = min min t and l is defined as in (17). In this case, we have; 1 )γ. e−1 αψ,ψφ (ũ) ≥ 1 − (1 + (see the Appendix C for the derivation). This gives the competitive ratio of γ1 (1 − 1/e). In the case of adwords where θ = l, this yield the optimal competitive ratio of 1 − e−1 and the smoothed function coincides with the one derived in the previous paragraph. For a general LP, this approach provides the optimal competitive ratio, which is known to be O(γ −1 ) [9]. Online experiment design and online graph formation: As pointed in section 2.4, maximizing the determinant arises in graph formation, sensor selection and optimal experiment design. In the offline form, these problems can be cast into maximizing log det subject to linear constraints as follows: m X maximize log det(A0 + at aTt xt ) (21) t=1 subject to m X xt ≤ b, t=1 xt ∈ [0, 1], ∀t, where A0  0 and at ∈ Rn . We describe the online version of this problem for graph formation and experiment design case. Consider the following online problem on a graph: given an underlying connected graph with the Laplacian matrix L0 , at round t, the online algorithm is presented with an edge and should decide whether to pick or drop theP edge by choosing xt ∈ {0, 1}. There is a n bound on the number of the edges that can be picked, t=1 xt ≤ b. The goal is to maximize the Kirchhoff complexity of the graph. The convex relaxation of the optimization problem is given by 21 where A0 = L0 + 11T and at is the incidence vector of the edge presented at round t. The online experiment design or sensor selection is the same as (21). In that problem the vectors at are experiment or measurement vectors. The dual to 21 is as follows maximize m X (aTt Y at + y)+ + n − log det(Y ) + trA0 Y − by t=1 subject to y ≤ 0, Y ≥ 0. The hard budget constraint in problem 21 can be replaced by the exact penalty function G(u) = −l(u − b)+ when −l is a given lower bound on the optimal dual variable corresponding to the constraint. −l is a lower bound on the optimal dual variable corresponding to the constraint if l> 2 . λmin (A0 ) 10 (22) Pn This follows from the fact that by the optimality condition (4), Y ∗ = (A0 + t=1 at aTt x∗t )−1 . If y ∗ ≤ −l, then aTt Y ∗ at + y ∗ < 0 for all t. ThisP combined with the the primal optimality condition m (3) forces x∗t = 0 for all t. Therefore, we get t=1 x∗t = 0 and y ∗ = 0, which is a contradiction. Similar to the previous problems, we smooth G with: b θ e−1 ((y − ) log(1 − y) − (1 + γ)y). γ e−1 θ φ∗ (y) = Here γ = log(1 + θl ) and θ = log(1 + 1/n). For this problem we have: αψ,ψφ (ũ) ≥ 1 − (1 + 1 1 )γ + ᾱlog det ≥ −(1 + )γ. e−1 e−1 This results in the following competitive ratio bound 1 Psim − log det(A0 ) ≥  1+ 1+ 1 e−1  (D? − log det(A0 )). γ The proof is included in the Appendix C. In the graph formation problem, λmin (A0 ) = λ2 (L0 ), that is the second smallest eigenvalue of L0 . For a connected graph λ2 (L0 ) ∈ [1/n, n] with lower bound achieved by the path graph and the upper bound achieved by the complete graph. Therefore, the competitive ratio in this case is Ω( log1 n ). 3.2 Computing optimal smoothing for separable functions on Rn+ We now tackle the problem of finding the optimal smoothing for separable functions on the positive orthant, which as we show in an example at the endP of this section is not necessarily Pn given by Nesterov n smoothing. Given a separable monotone ψ(u) = i=1 ψi (ui ) and ψS (u) = i=1 ψS i (ui ) on Rn+ we have that ᾱψ,ψS ≥ mini ᾱψi ,ψS i . To simplify the notation, drop the index i and consider ψ : R+ 7→ R. We formulate the problem of finding ψS to maximize αψ,ψS as an optimization problem. In section 4 we discuss the relation between this optimization method and the optimal algorithm presented in [13]. We set ψM (u) = Ru y(s)ds with y a continuous function, and state the infinite dimensional convex optimization 0 problem with y as a variable, minimize β Z subject to (23) u y(s)ds − ψ ∗ (y(u)) ≤ βψ(u), ∀u ∈ [0, ∞) 0 y ∈ C[0, ∞). where β = 1− ᾱψ,ψS (theorem 1 describes the dependence of the competitive ratios on this parameter). Note that we have not imposed any condition on y to be non-increasing (i.e., the corresponding ψS to be concave). The next lemma establishes that every feasible solution to the problem (23) can be turned into a non-increasing solution. Lemma 2 Let (y, β) be a feasible solution for problem (23) and define ȳ(u) = inf s≤u y(s). Then (ȳ, β) is also a feasible solution for problem (23). In particular if (y, β) is an optimal solution, then so is (ȳ, β). The proof is given in the supplement.  Re- visiting the adwords problem, we observe that the optimal solution is given by y(u) = e−exp(u) e−1 + , which is the derivative of the smooth function we derived using Nesterov smoothing in section 3.1. The optimality of this y can be established by providing a dual certificate, a measure ν corresponding to the inequality constraint, that together with y satisfies the optimality condition. If we set dν = f (u) du with f (u) = exp (1 − u)/(e − 1), the optimality conditions are satisfied with 11 β = (1 − 1/e)−1 . Z ∞ f (u)ψ(u) du = 1, f  0, Zu=0 ∞ f (s) ds ∈ f (u)∂ψ ∗ (y(u)), ∀u ≥ 0, Zs=u u y(s)ds − ψ ∗ (y(u)) ≤ βψ(u), ∀u ≥ 0, 0 Z u f (u)( y(s)ds − ψ ∗ (y(u)) − βψ(u)) = 0, ∀u ≥ 0. 0 Also note that if ψ plateaus (e.g., as in the adwords objective), then one can replace problem (23) with a problem over a finite horizon. Theorem 2 Suppose ψ(u) = c on [u0 , ∞). Then problem (23) is equivalent to the following problem, minimize β (24) Z u subject to y(s)ds − ψ ∗ (y(u)) ≤ βψ(u), ∀u ∈ [0, u0 ] 0 y(u0 ) = 0, y ∈ C[0, u0 ]. So for a function ψ with a plateau, one can discretize problem (24) to get a finite dimensional problem, minimize β subject to h (25) t X y[s] − ψ ∗ (y[t]) ≤ βψ(ht), ∀t ∈ [d] s=1 y[d] = 0, where h = u0 /d is the discretization step. Figure 2a shows the optimal smoothing for the piecewise linear function ψ(u) = min(.75, u, .5u + .25) by solving problem (25). We point out that the optimal smoothing for this function is not given by Nesterov’s smoothing (even though the optimal smoothing can be derived by Nesterov’s smoothing for a piecewise linear function with only two pieces, like the adwords cost function). Figure 2d shows the difference between the conjugate of the optimal smoothing function and ψ ∗ for the piecewise linear function, which we can see is not concave. Pm In cases where a bound umax on t=1 At Ft is known, we can restrict t to [0, umax ] and discretize problem (23) over this interval. However, the conclusion of Lemma 2 does not hold for a finite horizon and we need to impose additional linear constraints y[t] ≤ y[t − 1] to ensure the monotonicity of y. We find the optimal √ smoothing for two examples of this kind: ψ(u) = log(1 + u) over [0, 100] (Figure 2b), and ψ(u) = u over [0, 100] (Figure 2c). In Figure 2e, we show the competitive ratio achieved with the optimal smoothing of ψ(u) √ = log(1 + u) over [0, umax ] as a function of umax . Figure 2f depicts this quantity for ψ(u) = u. 3.3 Bounds for the sequential algorithm In this section we provide a lower-bound on the competitive ratio of the sequential algorithm (Algorithm 1). Based on this competitive ratio bound we modify Problem (23) for designing the smoothing function for the sequential algorithm. Theorem 3 Suppose ψS is differentiable on an open set containing K and satisfies Assumption 1. In addition suppose there exists c ∈ K is such that At Ft ≤K c for all t, then 1 Pseq ≥ D? , 1 − ᾱψ,ψS + κc,ψ,ψS where κ is given by κc,ψ,ψS = inf{r | hc, ∇ψS (0) − ∇ψS (u)i ≤ rψ(u), u ∈ K} (26) 12 0.8 0.6 5 25 4 20 3 15 2 10 0.4 0.2 ψS ψ 1 ψS ψ 0 0 0 0 0.5 1 1.5 2 0 20 40 u 60 80 0 100 0.9 0.2 0.1 0.4 0.6 0.8 1 0.85 0.8 0.9 0.85 0.8 0.75 0 1 100 0.95 0.7 -0.1 80 (c) 0.75 0 60 u comp. ratio 0.3 comp. ratio 0.95 0.2 40 (b) 0.4 0 20 u (a) ψS∗ (y) − ψ∗ (y) ψS ψ 5 500 0.7 1000 0 200 400 umax y (e) (d) 600 800 1000 umax (f) Figure 2: Optimal√smoothing for ψ(u) = min(.75, u, .5u+.25) (a), ψ(u) = log(1+u) over [0, 100] (b), and ψ(u) = u over [0, 100] (c). The competitive ratio √ achieved by the optimal smoothing as a function of umax for ψ(u) = log(1 + u) (e) and ψ(u) = u (f). ψS ∗ − ψ ∗ for the piecewise linear function (d). Proof: Since ψS satisfies Assumption 1, we have ŷt+1 ≤K ∗ ŷt . Therefore, we can write: m X hAt x̂t , ŷt − ŷt+1 i ≤ t=1 m X hc, ŷt − ŷt+1 i t=1 = hc, ŷ0 − ŷm+1 i (27) Now by combining 20 with 27, we get Dseq ≤ ψS m X ! At x̂t * + c, ∇ψS (0) − ∇ψS t=1 m X !+ At x̂t . t=1 The conclusion of the theorem follows from the definition of ᾱψ,ψS , κc,ψ,ψS and the fact that D̂ ≥ D? .  Based on the result of the previous theorem we can modify the optimization problem set up in Section 3.2 for separable functions on Rn+ to maximize the lower bound on the competitive ratio of the sequential algorithm. Note that in this case we have κc,ψ,ψS ≤ maxi κci ,ψi ,ψS i . Similar to the previous section to simplify the notation we drop the index i and assume ψ is a function of a scalar variable. The optimization problem for finding ψS that minimizes κc,ψ,ψS − ᾱψ,ψS is as follows: minimize β Z subject to (28) u y(s)ds + c(ψ 0 (0) − y(u)) − ψ ∗ (y(u)) ≤ βψ(u), ∀u ∈ [0, ∞) 0 y ∈ C[0, ∞). In the case of Adwords, the optimal solution is given by    u−1 1 β= y(u) = β 1 − exp , −1 , 1+c 1 − exp( c+1 ) +   −1 which gives a competitive ratio of 1 − exp c+1 . In Figure 3b we have plotted the competitive ratio achieved by solving problem 28 for ψ(u) = log det(1 + u) with umax = 100 as a function 13 0.8 Competitive ratio Competitive ratio 0.7 0.6 0.5 0.4 0.3 0.6 0.4 0.2 0 0 0.2 0.4 0.6 0.8 1 0 20 40 60 c c (a) (b) 80 100 Figure 3: The competitive ratio achieved by the optimal smoothing for the sequential algorithm as a function of c for ψ(u) = min(.75, u, .5u + .25) (a) and ψ(u) = log(1 + u) with umax = 100 (b). of c. Figure 3a shows the competitive ratio as a function of c for the piecewise linear function ψ(u) = min(.75, u, .5u + .25). 4 Discussion and related work We discuss results and papers from two communities, computer science theory and machine learning, related to this work. Online convex optimization. In [13], the authors proposed an optimal algorithm for adwords with differentiable concave returns (see examples in section 2). Here, “optimal” means that they construct an instance of the problem for which competitive ratio bound cannot be improved, hence showing the bound is tight. The algorithm is stated and analyzed for a twice differentiable, separable ψ(u). The assignment rule for primal variables in their proposed algorithm is explained as a continuous process. A closer look reveals that this algorithm falls in the framework of algorithm 2, with the only difference being that at each step, (x̃t , ỹt ) are chosen such that where vi : R+ 7→ R+ is an increasing differentiable function given as a solution of a nonlinear differential equation that involves ψi and may not necessarily have a closed form. The competitive ratio is also given based on the differential equation. They prove that this gives the optimal competitive ratio for the instances where ψ1 = ψ2 = . . . = ψn . Note that this is equivalent of setting ψS i (ui ) = ψ(vi (ui ))). Since vi is nondecreasing ψS i is a concave function. On the other hand, given a concave function ψS i (R+ ) ⊂ ψi (R+ ), we can set vi : R+ 7→ R+ as vi (u) = inf{z | ψi (z) ≥ ψS i (u)}. Our formulation in section 3.2 provides a constructive way of finding the optimal smoothing. It also applies to non-smooth ψ. Recently, authors in [4, 7, 11] have provided a primal-dual onlineP algorithm for the Pmdual probm lemP (2) that corresponds to the non-monotone primal objective ψ ( t=1 At xt ) = t=1 cTt xt + m G ( t=1 Bt xt ).The primal and dual updates in their algorithm are presented as a continuous update based on a differential equation. They assume that G∗ is differentiable and that ∇G∗ is monotone on Rn+ , i.e., If y ≥ y 0 , then ∇G∗ (y) ≤ ∇G∗ (y 0 ). In contrast, our assumption written in terms of G∗ for a differentiable function will become: If ∇G∗ (y) < ∇G∗ (y 0 ), then y ≥ y 0 , which is not equivalent to the assumption in [7]. When G is separable the two assumptions coincide and this algorithm is similar Pn Rtoy algorithm 2 applied to the smooth function GM whose conjugate is given by G∗M (y) = γ1 i=1 0 i G∗i 0 (z) log(1 − z/θ) dz. This smoothing coincides with Nesterov smoothing in the case of LP. Online learning. As mentioned before, the dual update in Algorithm 1 is the same as in Follow-theRegularized-Leader (FTRL) algorithm with −ψ ∗ as the regularization. This primal dual perspective has been used in [39] for design and analysis of online learning algorithms. In the online learning literature, the goal is to derive a bound on regret that optimally depends on the horizon, m. The goal in the current paper is to provide competitive ratio for the algorithm that depends on the function ψ. Regret provides a bound on the duality gap, and in order to get a competitive ratio the regularization 14 function should be crafted based on ψ. A general choice of regularization which yields an optimal regret bound in terms of m is not enough for a competitive ratio argument, therefore existing results in online learning do not address our aim. Acknowledgments The authors would like to thank James Saunderson, Ting Kei Pong, Palma London, and Amin Jalali for their helpful comments and discussions. References [1] Jacob Abernethy, Elad Hazan, and Alexander Rakhlin. Competing in the dark: An efficient algorithm for bandit linear optimization. In COLT, pages 263–274, 2008. [2] Shipra Agrawal and Nikhil R Devanur. Fast algorithms for online stochastic convex programming. arXiv preprint arXiv:1410.7596, 2014. [3] Shipra Agrawal, Zizhuo Wang, and Yinyu Ye. A dynamic near-optimal algorithm for online linear programming. arXiv preprint arXiv:0911.2974, 2009. [4] Yossi Azar, Ilan Reuven Cohen, and Debmalya Panigrahi. Online covering with convex objectives and applications. arXiv preprint arXiv:1412.3507, 2014. [5] Moshe Babaioff, Nicole Immorlica, David Kempe, and Robert Kleinberg. Online auctions and generalized secretary problems. SIGecom Exch., 7(2):7:1–7:11, June 2008. [6] Dimitri P Bertsekas. Necessary and sufficient conditions for a penalty method to be exact. Mathematical programming, 9(1):87–99, 1975. [7] Niv Buchbinder, Shahar Chen, Anupam Gupta, Viswanath Nagarajan, et al. Online packing and covering framework with convex objectives. arXiv preprint arXiv:1412.8347, 2014. [8] Niv Buchbinder, Kamal Jain, and Joseph Seffi Naor. Online primal-dual algorithms for maximizing ad-auctions revenue. In Algorithms–ESA 2007, pages 253–264. Springer, 2007. [9] Niv Buchbinder and Joseph Naor. Online primal-dual algorithms for covering and packing. Mathematics of Operations Research, 34(2):270–286, 2009. [10] James V Burke. An exact penalization viewpoint of constrained optimization. SIAM Journal on control and optimization, 29(4):968–998, 1991. [11] TH Chan, Zhiyi Huang, and Ning Kang. Online convex covering and packing problems. arXiv preprint arXiv:1502.01802, 2015. [12] Nikhil R. Devanur and Thomas P. Hayes. The adwords problem: Online keyword matching with budgeted bidders under random permutations. In Proceedings of the 10th ACM Conference on Electronic Commerce, EC ’09, pages 71–78, New York, NY, USA, 2009. ACM. [13] Nikhil R Devanur and Kamal Jain. Online matching with concave returns. In Proceedings of the forty-fourth annual ACM symposium on Theory of computing, pages 137–144. ACM, 2012. [14] Nikhil R Devanur, Kamal Jain, Balasubramanian Sivan, and Christopher A Wilkens. Near optimal online algorithms and fast approximation algorithms for resource allocation problems. In Proceedings of the 12th ACM conference on Electronic commerce, pages 29–38. ACM, 2011. [15] Reza Eghbali, Jon Swenson, and Maryam Fazel. Exponentiated subgradient algorithm for online optimization under the random permutation model. arXiv preprint arXiv:1410.7171, 2014. [16] Jon Feldman, Monika Henzinger, Nitish Korula, Vahab S. Mirrokni, and Cliff Stein. Online stochastic packing applied to display ad allocation. In Proceedings of the 18th Annual European Conference on Algorithms: Part I, ESA’10, pages 182–194, Berlin, Heidelberg, 2010. SpringerVerlag. [17] Jon Feldman, Aranyak Mehta, Vahab Mirrokni, and S Muthukrishnan. Online stochastic matching: Beating 1-1/e. In Foundations of Computer Science, 2009. FOCS’09. 50th Annual IEEE Symposium on, pages 117–126. IEEE, 2009. 15 [18] Marguerite Frank and Philip Wolfe. An algorithm for quadratic programming. Naval research logistics quarterly, 3(1-2):95–110, 1956. [19] Anupam Gupta and Marco Molinaro. How the experts algorithm can help solve lps online. arXiv preprint arXiv:1407.5298, 2014. [20] Patrick Jaillet and Xin Lu. Near-optimal online algorithms for dynamic resource allocation problems. arXiv preprint arXiv:1208.2596, 2012. [21] Patrick Jaillet and Xin Lu. Online stochastic matching: New algorithms with better bounds. Mathematics of Operations Research, 2013. [22] Siddharth Joshi and Stephen Boyd. Sensor Selection via Convex Optimization. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 57(2), 2009. [23] Bala Kalyanasundaram and Kirk R Pruhs. An optimal deterministic algorithm for online b-matching. Theoretical Computer Science, 233(1):319–325, 2000. [24] Chinmay Karande, Aranyak Mehta, and Pushkar Tripathi. Online bipartite matching with unknown distributions. In Proceedings of the forty-third annual ACM symposium on Theory of computing, pages 587–596. ACM, 2011. [25] Richard M Karp, Umesh V Vazirani, and Vijay V Vazirani. An optimal algorithm for on-line bipartite matching. In Proceedings of the twenty-second annual ACM symposium on Theory of computing, pages 352–358. ACM, 1990. [26] Thomas Kesselheim, Klaus Radke, Andreas Tönnis, and Berthold Vöcking. Primal beats dual on online packing lps in the random-order model. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing, STOC ’14, pages 303–312, New York, NY, USA, 2014. ACM. [27] Robert Kleinberg. A multiple-choice secretary algorithm with applications to online auctions. In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, pages 630–631. Society for Industrial and Applied Mathematics, 2005. [28] GG Lorentz. An inequality for rearrangements. The American Mathematical Monthly, 60(3):176– 179, 1953. [29] Mohammad Mahdian and Qiqi Yan. Online bipartite matching with random arrivals: an approach based on strongly factor-revealing lps. In Proceedings of the forty-third annual ACM symposium on Theory of computing, pages 597–606. ACM, 2011. [30] Vahideh H Manshadi, Shayan Oveis Gharan, and Amin Saberi. Online stochastic matching: Online actions based on offline statistics. Mathematics of Operations Research, 37(4):559–573, 2012. [31] Aranyak Mehta, Amin Saberi, Umesh Vazirani, and Vijay Vazirani. Adwords and generalized online matching. Journal of the ACM (JACM), 54(5):22, 2007. [32] Yu Nesterov. Smooth minimization of non-smooth functions. Mathematical programming, 103(1):127–152, 2005. [33] Yurii Nesterov. Introductory lectures on convex optimization, volume 87. Springer Science & Business Media, 2004. [34] Yurii Nesterov. Primal-dual subgradient methods for convex problems. Mathematical programming, 120(1):221–259, 2009. [35] Friedrich Pukelsheim. Optimal design of experiments, volume 50. siam, 1993. [36] R Tyrrell Rockafellar, Roger J-B Wets, and Maria Wets. Variational analysis, volume 317. Springer, 1998. [37] Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations and Trends in Machine Learning, 4(2):107–194, 2011. [38] Shai Shalev-Shwartz and Yoram Singer. Online learning: Theory, algorithms, and applications. 2007. [39] Shai Shalev-Shwartz and Yoram Singer. A primal-dual perspective of online learning algorithms. Machine Learning, 69(2-3):115–142, 2007. 16 [40] Manohar Shamaiah, Siddhartha Banerjee, and Haris Vikalo. Greedy sensor selection: Leveraging submodularity. In 49th IEEE Conference on Decision and Control (CDC), pages 2572–2577. IEEE, dec 2010. [41] Michael M Zavlanos and George J Pappas. Distributed connectivity control of mobile networks. Robotics, IEEE Transactions on, 24(6):1416–1428, 2008. Appendix A Proofs Proof of Lemma 1: Using the definition of Dsim , we can write: Dsim = m X σt (ATt ỹt ) − ψ ∗ (ỹm+1 ) t=1 = m X hAt x̃t , ỹt i − ψ ∗ (ỹm+1 ) t=1 ≤ m X t t−1 X X (ψ( As x̃s ) − ψ( As x̃s )) − ψ ∗ (ỹm+1 ) t=1 = ψ( m X s=1 s=1 As x̃s ) − ψ(0) − ψ ∗ (ỹm+1 ), s=1 where in the inequality follows from concavity of ψ, and the last line results from the sum telescoping. Similarly, we can bound Dseq : Dseq = = m X t=1 m X σt (ATt ŷt ) − ψ ∗ (ŷm+1 ) (29) hAt x̂t , ŷt i − ψ ∗ (ŷm+1 ) t=1 = m X hAt x̂t , −ŷt+1 + ŷt i + t=1 ≤ m X t=1 = m X t=1 m X hAt x̂t , ŷt+1 i − ψ ∗ (ŷm+1 ) t=1 hAt x̂t , −ŷt+1 + ŷt i + m X t t−1 X X (ψ( As x̂s ) − ψ( As x̂s )) − ψ ∗ (ŷm+1 ) t=1 s=1 s=1 m X hAt x̂t , −ŷt+1 + ŷt i + ψ( As x̂s ) − ψ(0) − ψ ∗ (ŷm+1 ). s=1 To provide intuition about the above inequalities Pm we have plotted the derivative of a concave function ψ defined on R+ in Figure 4. The quantity t=1 hAt x̃t , ỹt i is a right Riemann Pm sum approximation of the integral of ψ 0 and lower bounds the integral (Figure 4a). The quantity t=1 hAt x̂t , ŷt i is a left Riemann sum approximation of the integral and upper bounds the integral (Figure 4b). The area of hatched rectangle bounds the error of the left Riemann sum and is equal to hAt x̂t , −ŷt+1 + ŷt i. When ψ is differentiable with Lipschitz gradient, we can use the following inequality that is equivalent to Lipschitz continuity of the gradient: ψ(u0 ) ≥ ψ(u) + h∇ψ(u), u0 − ui − 17 1 2 ku − u0 k 2µ u, u0 ∈ K ψ 0 (u) ψ 0 (u) ŷ1 ỹ1 ŷt ỹ2 ŷ3 ỹ3 A1 x̃1 A2 x̃2 u A3 x̃3 A1 x̂1 (a) Figure 4: Interpretation of At x̂t At x̂3 u (b) Pm t=1 σt (ATt ỹt ) and Pm t=1 σt (ATt ŷt ) as Riemann sums. (see, for example, [33, section 2.1.1]) to get Dseq = = m X t=1 m X σt (ATt ŷt ) − ψ ∗ (ŷm+1 ) (30) hAt x̂t , ŷt i − ψ ∗ (ŷm+1 ) t=1 ≤ t−1 t m m X X X X 1 2 As x̂s )) − ψ ∗ (ŷm+1 ) As x̂s ) − ψ( (ψ( kAt x̂t k + 2µ s=1 s=1 t=1 t=1 = m m X X 1 2 kAt x̂t k + ψ( As x̂s ) − ψ(0) − ψ ∗ (ŷm+1 ). 2µ t=1 s=1  Proof of Lemma 2: Let (y, β) be a feasible solution for problem (23). Note that y ≥ 0 since dom ψ ∗ ⊂ R+ by the fact that ψ is non-decreasing. Let ȳ(u) = inf s≤u y(s). Note that ȳ is continuous. Define Ru Ru y(s) ds − ψ ∗ (y(u)) ȳ(s) ds − ψ ∗ (ȳ(u)) s=0 β(u) = , β̄(u) = s=0 , ψ(u) ψ(u) with the definition modified with the right limit at u = 0. For any u such that ȳ(u) = y(u), we have: Ru Ru y(s) ds − ψ ∗ (y(u)) ȳ(s) ds − ψ ∗ (ȳ(u)) s=0 β(u) = ≥ s=0 = β̄(u). ψ(u) ψ(u) Now, we consider the set {u | ȳ(u) 6= y(u)}. By the definition of ȳ, we have ȳ(0) = y(0). Since both functions are continuous, the set {u | ȳ(u) 6= y(u)} is an open subset of R and hence can be written as a countable union of disjoint open intervals. Specifically, we can define the end points of the intervals as: a0 = b0 = 0, ai = inf{u > bi−1 | y(u) > ȳ(u)}, ∀i ∈ {1, 2, . . .} bi = inf{u > ai | y(u) = ȳ(u)}, ∀i ∈ {1, 2, . . .}. S then {u | ȳ(u) 6= y(u)} = i∈{1,2,...} (ai , bi ).(See Figure 5) For any i ∈ {1, 2, . . .}, we show that β(u) ≥ β̄(u) on (ai , bi ). If ai = ∞, then bi = ∞, so we assume that ai < ∞. By the definition of ai and bi , ȳ(u) is constant on (ai , bi ). Also, we have y(ai ) = ȳ(ai ). Similarly, we have y(bi ) = ȳ(bi ) whenever bi < ∞. 18 a1 b1 a2 b2 u Figure 5: An example of y(u) (solid blue) and ȳ(u) (dashed red). Since ȳ(u) ≤ y(u) for all u and y(ai ) = ȳ(ai ), we have β(ai ) ≥ β̄(ai ). (31) If bi < ∞, similarly by the fact that y(bi ) = ȳ(ai ) = ȳ(bi ), we have β(bi ) ≥ β̄(bi ). (32) Now we consider the case where bi = ∞. In this case we have ȳ(u) = ȳ(ai ) on (ai , ∞). We consider two cases based on the asymptotic behavior of ψ. If limu→∞ ψ(u) = +∞ (ψ is unbounded), then we have Ru Ru y(s) ds ȳ(ai ) ds s=0 lim sup β(u) = lim sup ≥ lim sup s=0 = lim β̄(u). (33) u→∞ ψ(u) ψ(u) u→∞ u→∞ u→∞ Here we used the fact that −ψ ∗ (y(u)) is bounded. This follows from the fact ψ ∗ is monotone thus: −ψ ∗ (y(u)) ≤ −ψ ∗ (ȳ(ai )), and −ψ ∗ (ȳ(ai )) < ∞ because if −ψ ∗ (ȳ(ai )) = ∞, then β(ai ) ≥ β̄(ai ) = ∞ which contradicts the feasibility of (y, β). Now consider the case when limu→∞ ψ(u) = M for some positive constant M . In this case, −ψ ∗ ≤ M . We claim that y(ai ) = 0 and lim inf t→∞ y(u) = 0. Suppose lim inf u→∞ y(u) > 0, then lim supu→∞ β(u) = ∞ since the numerator in the definition of β tends to infinity while the denominator is bounded. But this contradicts feasibility of (y, β). On the other hand, by the definition of ai and bi we should have y(ai ) = ȳ(ai ) ≤ lim inf u→∞ y(u). Combining this with the fact that ȳ(ai ) ∈ dom ψ ∗ ⊂ R+ , we conclude that y(ai ) = 0. Using that y(ai ) = 0 and lim inf u→∞ y(u) = 0, we get: Ru y(s) ds − ψ ∗ (y(u)) lim sup β(u) = lim sup s=0 ψ(u) u→∞ u→∞ Ru y(s) ds − ψ ∗ (0) ≥ lim s=0 u→∞ M R ai ȳ(s) ds − ψ ∗ (0) ≥ s=0 = lim β̄(u), (34) u→∞ M where in the last inequality we used the fact that ȳ(u) = 0 for u ≥ ai . Let ψ 0 be the right derivative of ψ. Since ψ is concave, ψ 0 is non-increasing. Therefore, the interval (ai , bi ) can be written as (ai , u0 ] ∪ [u0 , bi ) such that ψ 0 (u) ≥ ȳ(ai ) on (ai , u0 ] and ψ 0 (u) ≤ ȳ(ai ) on [u0 , bi ). Since ψ 0 (u) ≥ ȳ(ai ) on (ai , u0 ] we have: Z u Z u ȳ(s) ds = ȳ(ai ) ds ai ai Z u ≤ ψ 0 (s) ds = ψ(u) − ψ(ai ), ai 19 for all u ∈ (ai , u0 ]. This yields: R ai β̄(ai ) = ≥ ȳ(s) ds − ψ ∗ (ȳ(ai )) ψ(u) Ru R ai ȳ(s) ds + ai ȳ(s) ds − ψ ∗ (ȳ(ai )) s=0 s=0 ψ(ai ) + ψ(u) − ψ(ai ) = β̄(u). for all u ∈ (ai , u0 ]. Here we used the fact that if c1 ≥ c2 > 0 and d2 ≥ d1 ≥ 0, then c1 c1 + d1 ≥ . c2 c2 + d2 Similarly, we have β̄(bi ) ≥ β̄(u) for any u ∈ [u0 , bi ). Combining this with (31),(32),(33), and (34), we get: sup β̄(u) = max(β̄(ai ), β̄(bi )) ai ≤u≤bi ≤ max(β(ai ), β(bi )) ≤ sup β(u). ai ≤u≤bi We conclude that β̄(u) ≤ β(u) for all t ≥ 0 hence (ȳ, β) is a feasible solution for the problem. Proof of Theorem 2: Let (y, β) be a feasible solution for problem (23). By Lemma 2, we can assume that y is non-increasing. First, note that y ≥ 0 since dom ψ ∗ = [0, ∞). Define ȳ(u) = y(u) for u ≤ u0 and ȳ(u) = 0 for u > u0 . We show that (ȳ, β) is also a feasible solution for (23) modulo the continuity condition. Define Ru Ru y(s) ds − ψ ∗ (y(u)) ȳ(s) ds − ψ ∗ (ȳ(u)) s=0 β(u) = , β̄(u) = s=0 . ψ(u) ψ(u) By the definition of ȳ, for all u, we have: Z u Z y(s) ds ≥ 0 u ȳ(s) ds, (35) 0 and β(u) = β̄(u) for u ∈ [0, u0 ]. Since y(u) is non-increasing and y(u) ≥ 0, limu→∞ y(u) exists. We claim that limu→∞ y(u) = 0. To see this note that if limu→∞ y(u) > 0, then Z u y(s) ds = ∞, lim u→∞ s=0 which contradicts the fact that β(u) ≤ β for all u. For all u ≥ u0 , now we have: Ru limu→∞ s=0 y(s) ds − ψ ∗ (0) sup β(u) ≥ lim β(u) = u→∞ ψ(u0 ) u≥u0 Ru limu→∞ s=0 ȳ(s) ds − ψ ∗ (0) = β̄(u0 ), ≥ ψ(u0 ) where the equality follows from the fact that limu→∞ y(u) = 0, and in the last inequality, we used (35). Since ȳ(u) = 0 for u > u0 , β(u) is constant on [u0 ∞). Therefore, supu≥u0 β̄(u) = β̄(u0 ). Combining this with the previous inequality we get: sup β(u) ≥ sup β̄(u0 ). u≥u0 u≥u0 Therefore, we conclude that β̄(u) ≤ β for all u. Thus (ȳ, β) is also a feasible solution for (23) modulo the continuity condition. Note that ȳ(u) may not be continuous at u0 . However, we can find a sequence of continuous functions z (j) that converge pointwise to y and z (i) (u) = 0 for all i and u ≥ u0 . To do so we consider a sequence of real number i → 0. We define z (i) (u) = ȳ(u) for u ∈ [0, u0 − i ) ∪ [u0 , ∞). On [u0 − i , u0 ] we define z (i) (u) to be a linear function that take values y(u0 − ) and 0 on the endpoints. Define R u (i) z (s) ds − ψ ∗ (z (i) (u)) βz(i) = sup s=0 . ψ(u) u>0 20 By upper semi-continuity of ψ ∗ , βz(i) converges to β̄. Let β ∗ be the optimal solution for problem (23). By the definition, there exits a feasible sequence (y (j) , β (j) ) such that β (j) converges to β ∗ . Let ȳ (j) (u) = y (j) (u) for t ≤ u0 and ȳ (j) (u) = 0 for t > u0 . Note that ȳ (j) (u) may not be continuous at u0 . However, we can find a sequence of continuous functions (z (ji) , βz(ji) ) as in above. Now βz(jj) converges to β ∗ .  Distance from lp norm ball B In this section we prove that the function: G(u) = −d1 (u, Bp ) satisfies Assumption 1 and find a lower bound on ᾱψ when ψ is given by 16 with G(u) = −ld1 (u, Bp ). For any u ∈ Rn+ , there exists ū ∈ Bp such that d1 (u, Bp ) = ku − ūk1 . the subdifferential of distance function is6 : ∂d1 (u, Bp ) = ∂ ku − ūk1 ∩ NBp (ū), where NBp (u) = {ξ | hξ, v − ui ≥ 0, ∀v ∈ Bp } is the normal cone of Bp at u. In fact d1 (u, Bp ) = ku − ūk1 if and only if ∂ ku − ūk1 ∩ NBp (ū) 6= ∅. When u ∈ intBp , ū = u and ∂d1 (u, Bp ) = {0}. In order to find ∂d1 (u, Bp ) when u ∈ / intBp , we first find ū in this case. For any r ≥ 0, define u ∧ r ∈ Rn+ to be: (u ∧ r)i = min(ui , r) ∀i. Note that ku ∧ 0kp = 0 and ku ∧ (maxi ui )kp = kukp ≥ 1. Since ku ∧ rkp is a continuous function of r, by the intermediate value theorem, there exists ru ∈ (0, maxi ui ] such that ku ∧ ru kp = 1. Now ū = u ∧ r. To see this note that:  ∂ ku − ūk1 ∩ NBp (ū) =  ∂ ku − ūk1 ∩ NBp (ū) = 1 ◦(p−1)  (u ∧ ru ) for ru < max ui ; i rup−1  z ◦(p−1) |0≤z≤1 for ru = max ui ; p−1 (u ∧ ru ) i ru (36) (37) where ◦(p−1) denotes element-wise exponentiation. Now if u0 ≤ u, then ru ≤ ru0 since ku ∧ rkp ≥ ku0 ∧ rkp for all r. Thus by (36) and (37), there exists y ∈ ∂d1 (u, Bp ) such that y ≥ ∂d1 (u0 , Bp ). Now bound αψ when ψ is given by 16 with G(u) = −ld1 (u, Bp ). Let (v, u) = Pm we canPlower m ( t=1 ct x̃t , t=1 Bt x̃t ). Note that by (36) when y ∈ ∂ψ(u) with u ∈ / Bp , then mini yi = −l. Now by the definition of l in (17) and the explanation that followed it, we must have u ∈ Bp . If u ∈ intBp , then G is differentiable at u and ∇G(u) = 0 which yields αψ (v, u) = 0. Now suppose u ∈ bdBp . In this case we have: − kykq − kykq G∗ (y) Pm αψ (v, u) = min = min Pn ≥ min . y∈∂G(u) y∈∂G(u) ψ ( y∈∂G(u) θ1T u t=1 At xt ) t=1 ct x̄t Recall that θ = mint minx∈Ft cT t x . 1T Bt x By (37), we have: min − kykq = − y∈∂G(u) l . (maxi ui )p−1 Therefore, αψ (v, u) ≥ − l 1 . θ (1T u)(maxi ui )p−1 As u varies on the bdBp , the right hand side is lower bounded by 6 For convex function we use ∂ to denote subdifferential. 21 −l θ . This yields αψ ≥ − θl . C Derivation of lower bounds on αψ,ψφ We first derive a general inequality which will be specialized to different examples for bounding αψ,ψφ . Let K = K1 × K2 , with K1 and K2 two proper cones. Suppose ψ(v, u) = H(v) + G(u), where H : K1 7→ R is a non-decreasing, and G : K P2m7→ R is non-increasing and l Lipschitz continuous. We assume H(v) ≥ θu for all (v, u) ∈ t=1 At Ft . Note that ψ ∗ (z, y) = H ∗ (z) + G∗ (y). We set      m X θ (e − 1) 1 ∗ yi − log 1 − yi − (1 + γ)yi , φ (y) = γ (e − 1) θ i=1 Pm where γ = log(1 + l(e−1) ). We let ψφ(v, u) = H(v) + Gφ(u). Let (v, u) ∈ t=1 At x̃t . Since θ ψφ(0) = 0, and the simultaneous algorithm does not decrease the objective, H(v) + Gφ(u) ≥ ψφ(0) = 0. (38) Let (z, y) ∈ ∂ψφ(u), then we have: ˜ i G∗ (y) ui = ∇i φ∗ (y) + ∇ 1 (e − 1)yi ˜ i G∗ (y), = log(1 − )−1+∇ γ θ (39) ˜ ∗ (y) ∈ ∂G∗ (y). Using the previous identity, we can derive the following upper bound for some ∇G for Gφ(u): Gφ(u) = hy, ui − G∗ (y) − φ∗ (y) D E ˜ ∗ (y) − G∗ (y) + hy, ∇φ∗ (y)i − φ∗ (y) = y, ∇G ˜ ∗ (y)) + φ(∇φ∗ (y)) = G(∇G m X θ ˜ ∗ (y)) + ˜ i G∗ (y) + 1) + 1 1T y = G(∇G (ui − ∇ (e − 1) i=1 γ m X 1 θ ˜ i G∗ (y)) + 1 1T y. H(v) + (1 − ∇ (40) (e − 1) (e − 1) i=1 γ Pm Now we specialize the bound to the case where G : Rm + 7→ R and G(u) = −l i=1 (ui − 1)+ . We ∗ ˜ lower bound αψ,ψφ (v, u) when u ≤ 1. In that case, (39) is satisfied with ∇i G (y) = 1. Thus from (40) simplifies to: 1 1 Gφ(u) ≤ H(v) + 1T y. (41) (e − 1) γ ˜ ∗ (y)) + ≤ G(∇G Combining this with (38), we get: H(v) + G(u) = H(v) ≥ (1/e − 1) T 1 y. γ (42) In the view of definition of αψ,ψφ , by using (41) and the fact that G∗ (y) = 1T y, we derive the following inequality: 1 1 H(v) + Gφ(u) − G∗ (y) ≤ (1 + )H(v) + ( − 1)1T y. (43) e−1 γ Combining (42) and (43), we get the following lower bound on αψ,ψφ : αψ,ψφ (v, u) ≥ 1 − (1 + 1 )γ + ᾱH . e−1 (44) Online LP: In this problem, ψ m X t=1 ! At x t = m X cTt xt t=1 +G m X t=1 22 ! Bt xt , (45) Pn with G(u) = −l i=1 (ui − 1)+ . In this problem H(v) = v is the identity function. Pm Pm Let (ṽ, ũ) = ( t=1 cTt x̃t , t=1 Bt x̃t ). If ỹt,i ≤ −l for some t and i, then by the definition of l in (17) and the explanation that followed it, we have (Bt x̃t )i = 0. On the other hand, we have ∇i Gφ(u) ≤ −l when ũi ≥ 1. Therefore, we conclude that ũ ≤ 1. Also, by the definition of θ, we have H(ṽ) ≥ θ1T ũ. Since H is a linear function, αH = 0. Thus (44) yields αψ,ψφ (ṽ, ũ) ≥ 1 − (1 + 1 )γ. e−1 (46) Online graph formation and online Experiment design : In this problem, H(U ) = log det(U + A0 ) − log det(A0 ), G(u) = −l(b − u)+ and At x = (aTt at x, x). We can use the following identity for determinant of rank one update of a matrix det(A + vv T ) = det(A)(1 + v T A−1 v T ), to derive a lower bound on log det(U + A0 ) − log det(A0 ), H(U ) = log det(U + A0 ) − log det(A0 ) = m X log det(A0 + s=1 = m X s X at aTt x̃t ) − log det(A0 + t=1 s−1 X at aTt x̃t ) t=1 log(1 + aTt Ỹt at x̃t ) t=1 ≥ log(1 + m 1 X ) x̃t = θu. n t=1 Pm Pm Let (Ũ , ũ) = ( t=1 at aTt x̃t , t=1 x̃t ). If ỹt ≤ −l for some t, then by the definition of l in (22), aTt Ỹt at + ỹt < 0 which results in x̃t = 0. Given the fact that Gφ0 (u) = −l when u ≥ b, we conclude that ũ ≤ b. Therefore, by (44), we get αψ,ψφ (Ũ , ũ) ≥ −(1 + 23 1 )γ. e−1
8
ASYMPTOTIC GROWTH OF ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS arXiv:1204.3315v2 [math.AC] 5 Dec 2012 SARAH WOLFF Abstract. We specify a class of graphs, Ht , and characterize the irreducible decompositions of all powers of the cover ideals. This gives insight into the structure and stabilization of the corresponding associated primes; specifically, providing an answer to the question “For each integer t ≥ 0, does there exist a (hyper) graph Ht such that stabilization of associated primes occurs at n ≥ (χ(Ht ) − 1) + t?” [4]. For each t, Ht has chromatic number 3 and associated primes that stabilize at n = 2 + t. 1. Introduction We work at the intersection of graph theory and commutative algebra by relating powers of square-free monomial ideals in polynomial rings to vertex covers of finite simple graphs. Ideal constructions give two correspondences, both of which associate to each such graph a monomial ideal. These correspondences have been established and studied in, for example, [9], [8], [3], and [4]. Motivated by the Strong Perfect Graph Theorem, Francisco, Hà, and Van Tuyl [3] expand the link between graph theory and algebra in order to provide an algorithm for determining if a graph is perfect— neither it nor its complementary graph has an induced odd cycle of length five or greater. Their algorithm results from relating odd cycles to the associated primes of powers of monomial ideals. Francisco, Hà, and Van Tuyl continue to investigate this connection in [4], establishing a lower bound on the stabilization of these associated primes that is derived from the chromatic number of the corresponding graphs. They find that stabilization does not occur when n < χ(G) − 1, for χ(G) the chromatic number of the graph and n the power of the ideal [4, Corollary 4.9]. They further show that this bound is not optimal, leading to the question: “For each integer t ≥ 0, does there exist a (hyper)graph Ht such that the stabilization of associated primes occurs Date: March 24, 2018. 2000 Mathematics Subject Classification. 05C25, 05E40, 05C38, 13F20. 1 2 SARAH WOLFF at n ≥ (χ(Ht ) − 1) + t?” [4, Question 4.10]. In this paper we answer this question in the affirmative. More precisely, let G be a graph with vertex set VG = {v1 , . . . , vm } and edge set EG consisting of unordered pairs of distinct vertices of G. Let K be a field. We identify the vertices of G with the variables in the polynomial ring RG = K[v1 , . . . , vm ]. Further, we associate two square-free monomial ideals to G: the edge ideal, IG , generated by {vi vj | {vi , vj } ∈ EG }, and the cover ideal, JG , generated by {vi1 · · · vij | {vi1 , . . . , vij } a vertex cover of G}. These ideal constructions were first introduced in [9] and give the correspondences mentioned above. Francisco, Hà, and Van Tuyl study the associated primes of RG /(JG )2 , denoted Ass(RG /(JG )2 ), and find that P is in Ass(RG /(JG )2 ) if and only if either P = (vi , vj ) where {vi , vj } is an edge of G, or P = (vi1 , . . . , vis ) where the subgraph induced by {vi1 , . . . , vis } is an odd cycle of G [3, Corollary 3.4]. These results are derived by determining the irreducible decomposition of (JG )2 , i.e., writing (JG )2 as an intersection of irreducible monomial ideals. They then extend these ideas in [4] by studying Ass(RG /(JG )n ) for n ≥ 2. Brodmann [2] in 1979 proved that the set of associated primes of powers of ideals stabilizes, i.e., for a ring R and an ideal I of R, there exists some positive integer s such that Ass(R/I s ) = Ass(R/I n ) for all n ≥ s. Francisco, Hà, and Van Tuyl [4] find a lower bound on the stabilization of Ass(RG /(JG )n ), proving for a graph G that stabilization does not occur when n < χ(G) − 1 [4, Corollary 4.9]. They then pose the question mentioned above [4, Question 4.10], which we answer in the affirmative by providing a family of graphs, Ht , each with chromatic number three such that for each t, Ass(RHt /(JHt )n ) stabilizes at n = (χ(Ht ) − 1) + t = 2 + t. The main result of this paper is: Theorem 4.1. For t ∈ Z+ , let Rt := RHt be the polynomial ring associated to Ht and let Jt := JHt denote the cover ideal of Ht . Then the associated primes of Rt /(Jt )n stabilize at n = (χ(Ht )−1)+t = 2+t. As in [3], we characterize the associated primes of Rt /(Jt )n by studying the monomial ideal powers (Jt )n . Just as the cover ideal is generated by vertex covers of the graph, we find that the generators of the ideals in the irreducible decompositions of (Jt )n are closely related to vertex covers. In Section 2 we develop the necessary tools from algebra and graph theory for our results. In Section 3 we introduce the family of graphs and explore the structure of these graphs with several key lemmas. In Section 4 we use these lemmas to characterize the irreducible ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS 3 decompositions of (Jt )n (Theorem 4.11). Theorem 4.1 is then a direct consequence of Theorem 4.11. 2. Graph Theory and Associated Primes In this section we briefly introduce the important definitions from graph theory and algebra needed for our results. We use the basic conventions, notation, and definitions from [1], [3], and [7]. For a graph G we enumerate its vertex set VG = {v1 , . . . , vm }. We assume that G is a simple graph so that its edge set, EG , consists of unordered pairs {vi , vj } of distinct vertices. Two vertices are adjacent if they are joined by an edge. A coloring of G is an assignment of colors to the vertices of G such that no two adjacent vertices are assigned the same color. The chromatic number of G is the minimal number of colors in a coloring of G. A subset A of VG is a vertex cover if every edge of G is incident to at least one vertex of A. The subset is a minimum vertex cover if it is a vertex cover of smallest cardinality. In this paper we consider minimum vertex covers rather than minimal vertex covers as this distinction is necessary for the proof of Theorem 4.11. For a subset A of VG , the neighbors of A, denoted N (A), are the vertices of G that are adjacent to vertices of A, but do not lie in A. The subgraph of G induced by A is the subgraph with vertex set A and edge set consisting of those edges of G with both vertices in A. A graph with vertex set {w1 , . . . , wk } is a k-cycle if its edge set consists precisely of edges connecting wk to w1 and wi to wi+1 , 1 ≤ i < k. We call the cycle odd (respectively, even), if k is odd (respectively, even). Let K be a field. We identify the vertices of G with variables in the polynomial ring RG = K[v1 , . . . , vm ]. Let IG denote the edge ideal of G, and let JG denote the cover ideal of G, generated by {vi1 · · · vij | {vi1 , . . . , vij } a vertex cover of G}. We note that JG is often equivalently defined as the Alexander dual of IG (see, e.g., [3], [4]). For an explanation of Alexander duality, see [7]. A typical monomial element of the cover ideal JG is of the form a1 a2 am v1 v2 · · · vm for nonnegative integers ai . Just as the variables v1 , . . . , vm correspond to vertices of the graph G, the vector (a1 , . . . , am ) also has a graph theoretic interpretation. We refer to any such a = (a1 , . . . , am ) (corresponding to the vertices v1 , . . . , vm of G) as a degree vector and say a nonzero degree vector a is a k-cover if ai + aj ≥ k whenever {vi , vj } ∈ EG . 4 SARAH WOLFF The concept of k-cover was first introduced in [6] as a generalization of a vertex cover. Note that if a subset A of VG is a minimum vertex cover then a degree vector a with ai = 1 if vi ∈ A and ai = 0 otherwise is a one-cover of G. We call such a one-cover a minimum one-cover. am ) An irreducible monomial ideal is an ideal of the form V a = (v1a1 , . . . , vm ai n for a ∈ N , where if ai = 0, we omit vi from the set of generators. Every monomial ideal I can be written as the finite intersection of irreducible monomial ideals: I = V a1 ∩ · · · ∩ V as , called an irreducible decomposition of I [7]. The decomposition is called irredundant if no V ai can be omitted. Let R be a commutative ring and M an R-module. The set of associated primes of M , denoted Ass(M ), consists of prime ideals P such that P annihilates some m in M . T For a graph G, the cover ideal JG has irreducible decomposition JG = {vi ,vj }∈EG (vi , vj ) (see e.g., [3]); hence, Ass(R/JG ) = {(vi , vj ) | {vi , vj } ∈ EG }. Generalizing to (JG )n , we compute the irreducible decompositions of (JG )n for our family of graphs in order to deduce the set of associated primes of R/(JG )n . We refer to this set as the associated primes of G. 3. A Family of Graphs We proceed to define a family of graphs, Ht , to give an affirmative answer to the question posed in [4, Question 4.10]: “For each integer t ≥ 0, does there exist a (hyper)graph Ht such that the stabilization of associated primes occurs at n ≥ (χ(Ht ) − 1) + t?” Note by [3, Remark 3.3, Corollary 3.4] that the associated primes of an odd cycle, G, stabilize at n = χ(G) − 1 + 0 = 2. We thus answer the above question for t ≥ 1. Definition 3.1. The graph H1 has vertex set {x1 , . . . , x5 , y1 } and edge set such that the subgraph induced by {x1 , . . . , x5 } is a 5-cycle and the neighbors of y1 are precisely {x1 , x2 , x3 }. For t > 1, Ht has vertex set {x1 , . . . , x4t−1 , y1 , . . . , yt } and edge set such that the subgraph induced by {x1 , . . . , x4t−1 } is a (4t − 1)-cycle, the neighbors of y1 are precisely {x1 , x2 , x3 }, and for 1 < i ≤ t the neighbors of yi are precisely {x4i−4 , x4i−3 , x4i−2 , x4i−1 } (Figure 1). We first note that the graphs Ht have chromatic number three for all t ≥ 1. To see this, assign color 1 to the vertices {x1 , x3 } ∪ {yi | i > 1}, color 2 to the vertices {x2 } ∪ {x2k+1 | k > 1}, and color 3 to the remaining vertices. Each Ht has at least one odd cycle; thus, this 3-coloring is a minimum coloring. ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS H1 H2 x2 H3 x1 x1 x1 y1 x2 y1 x2 x3 x3 x3 x4 x4 x4 x5 x5 x6 x7 5 y2 x5 x6 y1 y2 ... x7 x8 x9 x10 y3 x11 Figure 1. Ht Let Jt := JHt be the cover ideal of Ht for each t ≥ 1 and let Rt := RHt be the polynomial ring associated to Ht . We show that Ass(Rt /(Jt )n ) stabilizes at n = 2 + t. This result will follow from a characterization of the irreducible decompositions of (Jt )n for all t ≥ 1 and n ≥ 1. For this characterization, we use the structure of the graphs together with the following technical lemmas, all of which follow easily from the definitions: Lemma 3.2. Let G be a graph with vertex set {v1 , . . . , vm }. Let RG be the polynomial ring associated to G, and let JG be the cover ideal of G. If M is a minimal generator of (JG )n , then \ M∈ (vin , vj ) ∩ (vin−1 , vj2 ) ∩ · · · ∩ (vi2 , vjn−1 ) ∩ (vi , vjn ). {vi ,vj }∈EG Lemma 3.3. Let G be a graph with vertex set {v1 , . . . , vm } and cover am ideal JG . Then the mononomial v1a1 · · · vm is an element of (JG )n if and only if a = (a1 , . . . , am ) is an n-cover of G that can be written as the sum of n one-covers, ai , of G: a = a1 + · · · + an . We note that a degree vector, a, for a graph G can also be interpreted as a degree vector for a subgraph of G induced by A ⊆ VG by considering only the ai corresponding to the vertices of A. We denote this subgraph degree vector by a|A . Lemma 3.4. For a graph G, let a be a degree vector for G. Let G1 , . . . , Gl be induced subgraphs of G such that EG ⊆ EG1 ∪ · · · ∪ EGl . 6 SARAH WOLFF Then a is a one-cover of G iff a|Gi is a one-cover of Gi for all i, 1 ≤ i ≤ l. Our interest is in studying (Jt )n . By Lemma 3.3, elements of (Jt )n correspond to n-covers of Ht . These n-covers can be written as the sum of n one-covers of Ht , which in turn arise from one-covers of induced subgraphs, by Lemma 3.4. Since minimum vertex covers give rise to one-covers, it will be informative to look at the structure of minimum vertex covers of induced subgraphs of our family Ht . Lemma 3.5. A minimum vertex cover of an odd k-cycle consists of k+1 vertices. 2 Lemma 3.6. For the graph Ht , a minimum vertex cover of the induced subgraph on {y1 } ∪ N (y1 ) consists of the vertices {x2 , y1 }. For i > 1, a minimum vertex cover of the induced subgraph on {yi } ∪ N (yi ) consists of exactly 3 vertices, one of which is yi . 4. Stability of Associated Primes We restate our main theorem. Recall that Jt is the cover ideal of Ht and Rt the polynomial ring associated to Ht . Theorem 4.1. Let t ∈ Z+ . The associated primes of Rt /(Jt )n stabilize at n = (χ(Ht ) − 1) + t = 2 + t. This result will follow from the determination of the irreducible decompositions of (Jt )n in Theorem 4.11. Each component of the irreducible decomposition of (Jt )n is an irreducible monomial ideal of the form (via11 , . . . , viakk ), for vij vertices of Ht (either x or y vertices). The powers of the variables are in fact determined by the structure of the subgraph induced by {vi1 , . . . , vik }. Thus, we abuse terminology in the following way: for an ideal (via11 , . . . , viakk ) ⊆ Rt , we refer to each variable vij as a vertex, each power aj as a degree, and a = (a1 , . . . , ak ) as a degree vector. For any simple graph G with vertex set {v1 , . . . , vm }, let JG be the cover ideal. Then by [3, Theorem 3.2], the irredundant irreducible decomposition of (JG )2 is: \ \ \ (JG )2 = [(vi2 , vj ) ∩ (vi , vj2 )] (vi21 , . . . , vi2k ), {vi ,vj }∈EG {vi1 ,...,vik } an odd cycle where the last intersection is over all subsets {vi1 , . . . , vik } such that the subgraph induced by {vi1 , . . . , vik } is an odd cycle. For our family of graphs, we generalize the above irreducible decomposition of (Jt )2 to one for (Jt )n , n > 2, by inductively adding ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS 7 a minimum one-cover’s worth of degrees to each degree vector appearing in the irreducible decomposition of (Jt )n−1 . In other words, if V c = (vic11 , . . . , vickk ) is an ideal in the irreducible decomposition of (Jt )n−1 , and b is a minimum one-cover of the subgraph induced by {vi1 , . . . , vik }, we show that V c+b is an ideal in the irreducible decomposition of (Jt )n . To be more explicit, if the induced subgraph on {vi1 , vi2 , vi3 } ⊆ VHt is a 3-cycle, then by [3, Theorem 3.2], (vi21 , vi22 , vi23 ) is a component of the irreducible decomposition of (Jt )2 . We lift this to (Jt )n by showing that (via11 , via22 , via33 ) is a component of the irreducible decomposition of (Jt )n whenever a = (a1 , a2 , a3 ) is a degree vector for the induced subgraph on {vi1 , vi2 , vi3 } obtained by adding (n − 2) minimum one-covers of this subgraph to the degree vector c = (2, 2, 2). This results in many different possibilities for a: by Lemma 3.5, a minimum one-cover of the subgraph is of form (0, 1, 1),(1, 0, 1), or (1, 1, 0). Thus, adding (n − 2) minimum one-covers to c leads to n2 possibilities for a. Rather than writing out all these possibilities, we introduce below the terminology n-admissible and n̂-admissible to distinguish degree vectors of specific induced subgraphs of Ht . As the irreducible decompositions of (Jt )n are known for n ≤ 2, we work with n > 2 in the following definitions. Consider an arbitrary subset of vertices, V = {vi1 , . . . , vik } ⊆ VHt . If the subgraph induced by V is an odd cycle, we call V an induced odd cycle. Consider the corresponding degree vector a = (a1 , . . . , ak ). Definition 4.2. A degree vector a corresponding to an induced odd cycle V is n-admissible if a = (2, . . . , 2) + b1 + · · · + bn−2 where each bi is a minimum one-cover of the cycle. Remark 4.3. Note by Lemma 3.5 that for V an induced odd k-cycle, if the corresponding degree vector a is n-admissible, then k X i=1 ai = 2k + (n − 2) k + 1 . 2 Now fix a positive integer r ≤ t and consider a subgraph induced by vertices V ∪Yr = {vi1 , . . . , vik , yj1 , . . . , yjr } where V ⊆ VHt is an induced odd cycle, Yr ⊆ {y1 , . . . , yt } (the specified y-vertices in Definition 3.1), and N (Yr ) ⊆ V . We call such a subgraph an r-cluster, or an r-cluster induced by V ∪ Yr , when we want to specify the vertices. Note that in the definition of r-cluster, V can be an induced odd cycle of any length on any of the vertices of Ht , so long as N (Yr ) ⊆ V . On the other hand, Yr must contain exactly r vertices, and they must be y-vertices. 8 SARAH WOLFF Recall that we assume n > 2 for the following definition. Definition 4.4. A degree vector c corresponding to an r-cluster induced by V ∪ Yr , is n̂-admissible if c = d + e + f1 + · · · + fn−3 , where:  2 vji ∈ V \ N (Yr ) (1) di = , 3 otherwise (2) e|Yr ∪N (Yr ) = (0, . . . , 0), (3) e|V \N (Yr ) is a minimum one-cover of the subgraph induced by V \ N (Yr ), (4) for all 1 ≤ i ≤ n − 3, fi |V \N (Yr ) is a minimum one-cover of the subgraph induced by V \ N (Yr ), (5) for all 1 ≤ i ≤ n − 3 and yjl ∈ Yr , fi |{yjl }∪N (yjl ) is a minimum one-cover of the subgraph induced by {yjl } ∪ N (yjl ). Example 4.5. Let n = 5. Consider the following 2-cluster of H4 : the subgraph induced by V ∪ Y2 = {x1 , x2 , x3 , x4 , y2 , x7 , x8 , y3 , x11 , x12 , x13 , x14 , x15 , y1 , y4 }. Then d = (3, 3, 3, 2, 2, 2, 2, 2, 2, 3, 3, 3, 3, 3, 3), one of the two possibilities for e is (0, 0, 0, 0, 1, 0, 1, 0, 1, 0, 0, 0, 0, 0, 0) and two of the six possibilities for each fi , i ∈ {1, 2}, are (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1) and (0, 1, 0, 0, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1, 1). Thus, the degree vector c = (3, 5, 3, 3, 4, 3, 4, 3, 4, 4, 4, 5, 3, 5, 5) is 5̂-admissible. Remark 4.6. Consider the subgraph induced by {x1 , x2 , x3 , y1 }. By Lemma 3.6, the minimum vertex cover of this subgraph is {x2 , y1 }. Thus, for an arbitrary r-cluster, induced by V ∪ Yr , if y1 ∈ Yr , the corresponding degrees for x2 and y1 would be 1 in each fj . By the same lemma, for i > 1, a minimum vertex cover of the subgraph induced by {yi } ∪ N (yi ) consists of yi and two vertices in N (yi ); thus, if yi ∈ Yr , then in each fj the corresponding degrees for yi and two vertices in N (yi ) would be 1. The following lemma is key to the proof of Theorem 4.11. Lemma 4.7. Let r ≥ 1 and n > r + 1. Consider an arbitrary r-cluster of Ht , induced by V ∪ Yr . Let c = (c1 , . . . , ck+r ) be a degree vector for  Pk+r the r-cluster. If c is n̂-admissible then i=1 ci < r + k + n k+1 +r . 2 Proof. Consider an arbitrary r-cluster of Ht , induced by V ∪ Yr , and suppose the corresponding degree vector, c, is n̂-admissible. We compute the degree sum imposed by the definition of n̂-admissible. This degree sum depends on whether y1 ∈ Yr , or not. ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS 9 First suppose y1 ∈ Yr . If c is n̂-admissible, then c = d + e + f1 + · · · + fn−3 , with each degree vector as specified in Definition 4.4. We first note that k+r X di = 12 + 15(r − 1) + 2(k − 4r + 1). i=1 Next, we claim k+r X ei ≤ i=1 k − 4r + 1 . 2 To see this, we find a bound on the number of vertices in a minimum vertex cover of the subgraph induced by V \ N (Yr ). First note that k − 4r + 1 vertices comprise V \ N (Yr ). Further, the subgraph of Ht induced by V \ N (Yr ) consists of disjoint subgraphs of V induced by one or more subsets V1 , . . . , Vl ⊂ V . Let vα be the number of vertices in Vα , 1 ≤ α ≤ l. If vα is even, a minimum vertex cover of the subgaph induced by Vα consists of v2α vertices, while if vα is odd, a minimum vertex cover consists of vα2−1 vertices. Hence, k+r X i=1 l X vα − 1 X vα 1X k − 4r + 1 ei = + ≤ vα = , 2 2 2 2 v even α=1 v odd α α as claimed. Finally, by Lemma 3.6 and the above claim we see that for each fj , 1 ≤ j ≤ n − 3, k+r X fji ≤ 2 + 3(r − 1) + i=1 Since the degree sum of fj , k+r X i=1 ci = k+r X Pk+r i=1 di + i=1 k − 4r + 1 . 2 fji , is independent of j, we have: k+r X ei + (n − 3) i=1 k+r X f ji , i=1 for any j ∈ {1, . . . , n − 3}. The inequality of the lemma then reduces to showing that r + 1 < n, which is true by assumption. Next suppose y1 ∈ / Yr . Here, k+r X di = 15r + 2(k − 4r), i=1 and we claim k+r X i=1 ei ≤ k − 4r − 1 . 2 10 SARAH WOLFF To see this, note that in this case k − 4r vertices comprise V \ N (Yr ). As above, the subgraph of Ht induced by V \ N (Yr ) consists of disjoint subgraphs of V induced by subsets V1 , . . . , Vl ⊂ V . Further, because V is an induced odd cycle, k − 4r is odd, so at least one of the subsets, without loss V1 , has an odd number of vertices, v1 . Hence, as above, k+r X i=1 l X vα − 1 X vα X  k − 4r − 1 1 ei = + ≤ v1 − 1 + vα = , 2 2 2 2 v even α=2 v odd α α as claimed. Finally, by Lemma 3.6 and the above claim we see that for each fj , 1 ≤ j ≤ n − 3, k+r X k − 4r − 1 fji ≤ 3r + . 2 i=1 Pk+r Again, the degree sum of fj , i=1 fji , is independent of j, and the inequality of the lemma reduces to showing r + 1 < n.  We now define several ideals to simplify the statement of Theorem 4.11. Fix a graph Ht and a positive integer n. For an arbitrary set of vertices V = {vi1 , . . . , vik } of Ht with corresponding degree vector a = (a1 , . . . , ak ), let V a denote the ideal (via11 , . . . , viakk ). Again, we a remind the reader of our convention to omit vijj when aj = 0. Definition 4.8. \ At,n = (vin , vj ) ∩ (vin−1 , vj2 ) ∩ · · · ∩ (vi2 , vjn−1 ) ∩ (vi , vjn ). {vi ,vj }∈EHt \ Definition 4.9. Bt,n = V a. subgraph of Ht induced by V an odd cycle, a n-admissible r Definition 4.10. Dt,n = \ (V ∪ Yr )c . subgraph of Ht induced by V ∪Yr an r-cluster, c n̂-admissible We now give the irreducible decompositions of (Jt )n : Theorem 4.11. Let t ∈ Z+ and let Jt be the cover ideal of Ht . For n > 2, (Jt )n has the following irredundant irreducible decomposition: n (Jt ) = At,n ∩ Bt,n ∩ n−2 \ r=1 r Dt,n ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS 11 T r Proof. For t ∈ N and n > 2, let L be the ideal At,n ∩ Bt,n ∩ n−2 r=1 Dt,n . Let M be a minimal generator of (Jt )n . We show M is in L by showing Tn−2 r separately. it is in each of the ideals At,n , Bt,n , and r=1 Dt,n First suppose M ∈ / Bt,n . Since M is a minimal generator of the am , for {v1 , . . . , vm } the vertices of monomial ideal (Jt )n , M = v1a1 · · · vm Ht . By Lemma 3.3 the powers, a = (a1 , . . . , am ), when viewed as a degree vector of Ht form an n-cover that can be written as the sum of n one-covers, bi , of Ht : a = b1 + · · · + bn . Let V = {vj1 , . . . , vjk } be an arbitrary induced odd cycle of Ht . Since a is an n-cover of Ht , a|V is an n-cover of the odd cycle. Further, for 1 ≤ i ≤ n, since bi is a one-cover of Ht , bi |V is a one-cover of the cycle. Then a|V = b1 |V + · · · + bn |V with each bi |V a one-cover of the subgraph induced by V . Thus, a|V = (aj1 , . . . , ajk ) is an n-cover of the cycle that can be written as the sum  P of n one-covers. Then by Lemma 3.5, ki=1 aji ≥ n k+1 . However, 2 M ∈ / Bt,n , so M ∈ / V u for some n-admissible u. Thus, in M each variable vij ∈ V has degree less than uj , so k X i=1 aj i ≤ k X (ui − 1) = k + (n − 2) i=1 k + 1 , 2   k+1 by Remark 4.3. But k + (n − 2) k+1 < n , so a|V is not an n2 2 cover of the cycle that can be written as the sum of n one-covers, a contradiction. Thus, M ∈ Bt,n . T a1 r am Now suppose M ∈ / n−2 r=1 Dt,n . Again, M = v1 · · · vm is a minimal generator of (Jt )n so the powers, a = (a1 , . . . , am ), when viewed as a degree vector of Ht form an n-cover that can be written as the sum of n one-covers, bi , of Ht : a = b1 + · · · + bn . For r ≤ n − 2, consider an arbitrary r-cluster of Ht , induced by V ∪ Yr . As above, a|V ∪Yr is an n-cover of the r-cluster and for 1 ≤ i ≤ n, bi |V ∪Yr is a one-cover of the r-cluster, so a|V ∪Yr = (al1 , . . . , alk+r ) is an n-cover of the r-cluster that as the sum of n one-covers. Tn−2 r Then by Lemma 3.6, Pk+rcan be written k+1 + r . However, M ∈ / r=1 Dt,n , so M ∈ / (V ∪ Yr )c , i=1 ali ≥ n 2 for some n̂-admissible c. Thus, as in the previous case, k+r X i=1 ali ≤ k+r X (ci − 1). i=1 But since n ≥ r + 2, Lemma 4.7 shows k+r X i=1 (ci − 1) < n  k+1 +r , 2 12 SARAH WOLFF so a|V ∪Yr is not an n-cover of the r-cluster that can be written as the Tn−2 r sum of n one-covers, a contradiction. Thus, M ∈ r=1 Dt,n . We finally note by Lemma 3.2 that M ∈ At,n . Hence, (Jt )n ⊆ L. Now let P be a minimal generator of L. The ideal L is an intersection of monomial ideals, so P = via11 · · · viamm . By definition, P ∈ At,n ; therefore, the powers a = (a1 , . . . , am ), of the variables of P when viewed as a degree vector of Ht form an n-cover. By Lemma 3.3, it suffices to show a can be written as the sum of n one-covers of Ht . Consider an arbitrary one-cluster of Ht , induced by V ∪ Y1 . Note that Ht can be written as a union of one-clusters. Thus, by Lemma 3.4, it suffices to show that a|V ∪Y1 can be written as a sum of n one-covers of the one-cluster. Applying Lemma 3.4 again to the subgraph induced by V ∪ Y1 = {vi1 , . . . , vik , yj1 }, it suffices to show a|V and a|{yj1 }∪N (yj1 ) can be written as a sum of n one-covers of the subgraphs induced by V and {yj1 } ∪ N (yj1 ), respectively. Let V be an induced odd k-cycle of Ht . Since P ∈ Bt,n , P ∈ V u for some n-admissible u = (u1 , . . . , uk ). Thus, we need to show that u can be written as the sum of n one-covers of V . By Definition 4.2, u = (2, . . . , 2) + b1 + · · · + bn−2 with each bi a one-cover of V . Thus, we need only show that (2, . . . , 2) can be written as a sum of two onecovers of V , but this is clear because (2, . . . , 2) = (1, . . . , 1) + (1, . . . , 1), which are trivially one-covers of V . Now consider the subgraph induced by {yj1 } ∪ N (yj1 ). Since P ∈ Tn−2 r c r=1 Dt,n , P ∈ (V ∪ Y1 ) , for some n̂-admissible c. Thus, we need to show c|{yj1 }∪N (yj1 ) can be written as a sum of n one-covers of the subgraph induced by {yj1 } ∪ N (yj1 ). By Definition 4.4, c = d + e + f1 + · · · + fn−3 with each fi a one-cover of the subgraph induced by {yj1 } ∪ N (yj1 ). Further, di = 3 for each vertex in {yj1 } ∪ N (yj1 ), so we need only show that (3, . . . , 3) can be written as a sum of 3 one-covers of the subgraph induced by {yj1 } ∪ N (yj1 ), but this is clear by Lemma 3.6. Thus, for an arbitrary one-cluster, induced by V ∪ Y1 , a|V ∪Y1 can be written as the sum of n one-covers of the subgraph induced by V ∪ Y1 . This proves that a can be written as the sum of n one-covers of Ht . Hence, L ⊆ (Jt )n .  Our main theorem now follows as a corollary to Theorem 4.11: Proof of Theorem 4.1. For t ∈ Z+ consider the graph Ht and label the vertices VHt = {v1 , . . . , vm } = X ∪ Y , where X (respectively, Y ) represents the set of x-vertices (respectively, y-vertices) as in Definition ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS 13 3.1 . By Theorem 4.11, for n > 2 it follows that a prime P is in Ass(Rt /(Jt )n ) if and only if: (a) P = (vi , vj ) where {vi , vj } ∈ EHt , (b) P = (vi1 , . . . , vik ), where the subgraph induced by {vi1 , . . . , vik } is an odd cycle, or, (c) For 1 ≤ r ≤ n − 2, P = (vi1 , . . . , vik , yj1 , . . . , yjr ), where the subgraph induced by {vi1 , . . . , vik , yj1 , . . . , yjr } is an r-cluster. By definition, Ht has exactly t y-vertices, so Ht has a t-cluster, namely the graph Ht itself. Thus, by (c) above, the ideal (v1 , . . . , vm ) is an element of Ass(Rt /(Jt )n ) for n ≥ t + 2, but not for n < t + 2. Thus, the associated primes do not stabilize until at least t+2. Further, note that the ideals of (a) and (b) are elements of Ass(Rt /(Jt )n ) for all n ≥ 2, so the only prime ideals not in Ass(Rt /(Jt )2+t ) that could appear in Ass(Rt /(Jt )n ) for n > 2 + t would be ideals that fall into category (c). However, for 1 ≤ r ≤ t, ideals whose generators correspond to the vertices of r-clusters are elements of Ass(Rt /(Jt )2+t ), so the only new ideals in Ass(Rt /(Jt )n ) for n > 2 + t would be those whose generators correspond to the vertices of r-clusters for r > t. The largest r for which Ht has an r-cluster is r = t; thus, no such new ideals exist in Ass(Rt /(Jt )n ) for n > 2 + t. Thus, the associated primes of Ht stabilize at 2 + t.  Remark 4.12. We note that our family of graphs can be generalized slightly. The proof of Theorem 4.11 used the definition n̂-admissible in two ways— to show that the degree vectors can be written as n onecovers, and to use the degree argument of Lemma 4.7. Both facts remain unchanged if the induced (4t − 1)-cycle is instead an odd cycle of any length greater than 4t − 1 (or in the case of H1 , if the 5-cycle is any odd cycle of length greater than 5). Further, for i > 1, yi could have more than 4 neighbors, as long as these neighbors are distinct from N (yj ), j 6= i, and the degree argument of Lemma 4.7 is still satisfied. 5. Acknowledgements Many of the results of this paper started as computer experiments using the program Macaulay 2 [5]. The author would like to thank Amelia Taylor for introducing her to the subject and for her invaluable support and guidance throughout the research and writing processes, Thomas Shemanske for his help in the editing process, and Adam Van Tuyl for a helpful discussion of Lemma 3.3. We also thank an anonymous referee for their insights and suggestions for improvement. 14 SARAH WOLFF References 1. Béla Bollobás, Modern graph theory, Graduate Texts in Mathematics, vol. 184, Springer-Verlag, New York, 1998. MR 1633290 (99h:05001) 2. M. Brodmann, Asymptotic stability of Ass(M/I n M ), Proc. Amer. Math. Soc. 74 (1979), no. 1, 16–18. MR 521865 (80c:13012) 3. Christopher A. Francisco, Huy Tài Hà, and Adam Van Tuyl, Associated primes of monomial ideals and odd holes in graphs, J. Algebraic Combin. 32 (2010), no. 2, 287–301. MR 2661419 (2011e:05133) , Colorings of hypergraphs, perfect graphs, and associated primes of 4. powers of monomial ideals, J. Algebra 331 (2011), 224–242. MR 2774655 (2012b:13054) 5. Daniel R. Grayson and Michael E. Stillman, Macaulay2, a software system for research in algebraic geometry, Available at http://www.math.uiuc.edu/Macaulay2/. 6. Jürgen Herzog, Takayuki Hibi, and Ngô Viêt Trung, Symbolic powers of monomial ideals and vertex cover algebras, Adv. Math. 210 (2007), no. 1, 304–322. MR 2298826 (2007m:13005) 7. Ezra Miller and Bernd Sturmfels, Combinatorial commutative algebra, Graduate Texts in Mathematics, vol. 227, Springer-Verlag, New York, 2005. MR 2110098 (2006d:13001) 8. Aron Simis, Wolmer V. Vasconcelos, and Rafael H. Villarreal, On the ideal theory of graphs, J. Algebra 167 (1994), no. 2, 389–416. MR 1283294 (95e:13002) 9. Rafael H. Villarreal, Cohen-Macaulay graphs, Manuscripta Math. 66 (1990), no. 3, 277–293. MR 1031197 (91b:13031)
0
arXiv:1705.04282v1 [cs.CV] 5 May 2017 Learning to see people like people Amanda Song University of California, San Diego 9500 Gilman Dr, La Jolla, CA 92093 Linjie Li Purdue University 610 Purdue Mall, West Lafayette, IN 47907 [email protected] [email protected] Chad Atalla University of California, San Diego 9500 Gilman Dr, La Jolla, CA 92093 Garrison Cottrell University of California, San Diego 9500 Gilman Dr, La Jolla, CA 92093 [email protected] [email protected] Abstract alignment[39], and face detection[25]. However, humans not only read objective properties from a face, such as gender, expression, race, age and identity, but also form subjective impressions of the social aspects of a face[31, 32], such as facial attractiveness[28], friendliness, trustworthiness[29], sociability, dominance[18], and typicality. Despite the relative less attention received by the social perception of faces, social judgment is an important part of people’s daily interactions, and it has significant impact on social outcomes, ranging from electoral success to sentencing decisions[19, 35]. Whereas current computer vision techniques exceed human abilities at recognizing a face and identifying the objective properties of a face [27, 25], awareness of human subjective judgments is important for social robotics theory-of-mind inferences. Accurate predictions of social aspects of faces can help robots better understand how humans interact with and perceive each other, and can make a robot aware of inherent human biases, as these judgments rarely correspond to reality (except, perhaps, attractiveness) [32]. The human perceptual system can make complex inferences on faces, ranging from the objective evaluations regarding gender, ethnicity, expression, age, identity, etc. to subjective judgments on facial attractiveness, trustworthiness, sociability, friendliness, etc. Whereas the objective aspects have been extensively studied, less attention has been paid to modeling the subjective perception of faces. Here, we adapt 6 state-of-the-art neural networks pretrained on various image tasks (object classification, face identification, face localization) to predict human ratings on 40 social judgments of faces in the 10k US Adult Face Database. Supervised ridge regression on PCA of the conv5 2 layer in VGG-16 network gives best predictions on the average human ratings. Human group agreement was evaluated by repeatedly randomly splitting the raters into two halves for each face, and calculating the Pearson correlation between the two sets of averaged ratings. Due to this methodology, the models correlations with the average human ratings can exceed this score. We find that 1) model performance grows as the consensus on a face trait increases, and 2) model correlations are always higher than human correlations with each other. These results illustrate the learnability of the subjective perception of faces, especially when there is consensus, and the striking versatility and transferability of representations learned for object recognition. This work has strong applications to social robotics, allowing robots to infer human judgments of each other. In this paper, we teach a machine to infer social impressions, that match human judgments, from faces. We examine a list of 20 pairs of social features that are typically studied by social psychologists, and that are relevant to social interactions between people [33, 32, 19]. Examples are attractiveness [7, 28, 5, 10, 8], trustworthiness [6, 29], sociability, aggressiveness [18], friendliness, kindness, happiness, familiarity [20], and memorability [2, 11]). Although social perceptions of faces are subjective, there is often a consensus among human raters in how they perceive facial attractiveness, trustworthiness and dominance[6, 5]. This indicates that faces contain high-level visual cues for social interactions, and therefore it is possible to model this process with machine learning techniques. We take advantage of the state-of-the-art neural network models trained for ob- 1. Introduction Recent advances in deep convolutional networks have driven tremendous progress in a variety of challenging face processing tasks including face recognition[27], face 1 ject recognition and face recognition tasks and use their internal representations for social perception learning. In all 40 social dimensions, our model correlates with human averaged ratings better than the humans correlate with each other. The contributions of the paper are summarized below: • To the best of our knowledge, this work is the first attempt to systematically examine the consistency of human social perceptions of faces, to explore the landscape of social feature semantic space, and to predict human judgments of 40 social attributes of faces; • We adapted 6 state of the art neural network algorithms trained for various visual tasks to make social judgment predictions on faces and achieve high correlations with human ratings in all 40 dimensions; • We evaluate the tuning properties of nodes in the best network and visualize the patterns that maximally ignite the perceptions for each specific social dimensions to facilitate a better understanding of the neural networks’ behavior in face processing. The rest of the paper is organized as follows. In Section 2, we review related work on social perception modeling. Section 3 and 4 summarize the methodology and the experimental framework. The experimental results and visualizations are presented in Section 5 and 6. Section 7 concludes the paper. 2. Related work The focus of our paper is to infer as much social judgment information as possible from a face image and to predict the subjective impression of faces by learning from human group data. We review related work in terms of the visual features they use, the dataset they choose, the evaluation metric they adopt, and the social attributes they examine. Visual features Since the early 1990s, psychologists have identified that high level visual features, such as the averageness of a face[14, 21] and the symmetry of the face [23] can explain why certain faces look more attractive. Machine learning researchers have developed various computer vision features and models to predict social perceptions of faces, especially facial attractiveness. Yael et al.[5] used geometric ratios and distances between facial features based on facial landmarks to build an attractiveness predictor (0.65 correlation with human raters, face database size=184). End-to-end neural networks were applied to predict facial attractiveness in 2010[8] (correlation 0.458, face database size=2056, young female faces only). Amit Kagian and his colleagues have used a combination of landmark-derived features along with global features to obtain a high correlation with human group averages on facial attractiveness [10](0.82 Pearson correlation, face database size=91). Traditional computer vision features such as SIFT, HoG, Gabor filters have been blended to predict the relative ranking of facial attractiveness in [1](rank order correlation 0.63, face database size=200). Rothe et al. incorporate collaborative filtering techniques with visual features extracted from pretrained VGG networks[24] to achieve individual-level prediction of facial attractiveness[22](correlation 0.671 on female face queries, database size = 13,000). McCurrie et al. [17] build a model based on a pretrained VGG network to predict trustworthiness, dominance and IQ in faces (R2 values on trustworthiness, dominance and IQ are 0.5687, 0.4601, 0.3548 respectively, face database size=6000). Previous papers have achieved correlations with human performance between 0.458 to 0.82 in attractiveness predictions, depending on the dataset and method used. However, to date, there is no standard dataset that has been used to compare these approaches. Dataset Earlier studies employ datasets with relatively small numbers of faces (a few hundred) and most face datasets use young Caucasian faces only, as pointed out by [15]. In contrast, the MIT dataset[2] we use contains 2,222 high quality color images that vary in ethnicity, gender, age and expression, with ratings on 40 attributes. This dataset is smaller than two of the ones mentioned above. The first is collected from howhot.io, an online dating website[22] and contains 13,000 face images, but that work focused on personalized prediction of facial attractiveness, rather than average ratings. There are only binary choices (like or dislike) indicating implicit preference of facial attractiveness. The second one is collected from testmybrain.com, contains 6,000 grayscale face images [17], and includes just three social features: dominance, IQ and trustworthiness. Evaluation metric Social perceptions of faces are collected from human participants in various ways. The most common way is to ask for a discrete rating, say from 1-9 [2], or 1-7 [5] from a number of raters, and then use the group average as the score for a face in the specified feature dimension (e.g. attractiveness). The consistency of ratings between humans is checked by repeatedly randomly splitting human participants into two subgroups and then computing the correlation between the two groups’ mean ratings. To compare model predictions with human ratings, Pearson correlation[10, 3], Spearman rank correlation[2] and R-squared values[17] are used, depending on the nature of the data. Another method is to present a pair of faces or multiple faces and ask for a relative ranking in a particular dimension (e.g., attractiveness). Prediction accuracy is measured using Kendall’s Tau and the Gamma Test [1]. In Rothe et al. [22], a person indicates his/ her preference by choosing to like or dislike another user’s face photo. In this paper, since our goal is to predict a continuous score of human average ratings, and our raters do not all rate the same faces, we also use Pearson correlation with average human ratings on a per-face basis. Social attributes Although social perceptions are a subjective judgment, and may not reflect a person’s actual traits or mental states, humans tend to share consensus on their first impressions. Kiapour et al.[12] and Wang et al.[34] find that the social styles of people (bikers vs. hipsters, for example) can be identified and classified from image features. Dhar et al. (2011) show that the interestingness of an image can be quantified and predicted [4]. Bainbridge et al. (2013) prove that the memorability of a face image can be predicted and modified to make it more memorable [2]. Todorov et al. [30, 31, 32] used synthesized faces to study the perception of competence, dominance, extroversion, likeability, threat, trustworthiness and attractiveness in faces [29]. However their face photos lack realism compared to real-world photos and therefore cannot predict human’s social perceptions of real faces in a more natural environment. McCurrie et al. [17] have worked toward removing this limitation by using real human faces to make predictions of trustworthiness and dominance ratings. 12 From the literature, we can observe two trends: (i) Besides McCurrie et al. [17] and Todorov. et al[29], most machine learning work on social perception of faces focuses on attractiveness prediction, leaving the prediction of other social perceptions largely unstudied. We aim to bridge this gap in our paper. (ii) As summarized by Laurentini et al[15] usually small datasets are used, with few variations on expression, gender, ethnicity and age. The dataset we chose overcomes the above limitations and has comprehensive coverage of a list of 40 social feature ratings. The papers closest to ours are McCurrie et al. [17] and Todorov. et al[29]. Our paper differs from theirs in three major ways: (1) Todorov. et al’s work is on synthesized faces whereas ours is on realistic photos; (2) McCurrie et al. [17] predict three social features, dominance, trustworthiness, and IQ, whereas we look at 40 social features including trustworthiness, aggressiveness (a term close to their dominance), and intelligence (close to their IQ term), so our feature set can be considered to be a superset of theirs; and (3) we compared various feature extraction methods, including traditional geometric features and 6 neural networks pretrained for various tasks (face identification, face localization, object recognition). We also examine the effect of fine-tuning the network compared with directly applying ridge regression on extracted features from higher layer of the networks. 3. Method In this section we first describe the dataset used in our experiments. Next, we introduce our method for predict- ing social perceptions of faces. Finally, we explain how we visualize the features that contribute most to social trait predictions. 3.1. Dataset To predict how human evaluate social traits of a face at a glance, we use the dataset collected by Aude Oliva’s group [2]. The dataset consists of 2,222 images of faces sampled from the 10k US Adult Face Database and annotated for 20 pairs of social attributes. Each attribute is rated on a scale of 1-9 (1 means not at all, 9 means extremely) and each image is rated by 15 subjects. We take the average rating across all raters as a collective estimation of the social feature for every face. The 20 pairs of social traits are: (attractive, unattractive), (happy, unhappy), (friendly, unfriendly), (sociable, introverted), (kind, mean), (caring, cold), (calm, aggressive), (trustworthy, untrustworthy), (responsible, irresponsible), (confident, uncertain), (humble, egotistical),(emotionally stable, emotionally unstable), (normal, weird), (intelligent, unintelligent), (interesting, boring), (emotional, unemotional), (memorable, forgettable), (typical, atypical), (familiar, unfamiliar) and (common, uncommon). Clearly, some of these traits will be highly correlated, and are predictable from the others. We compute the Spearman’s rank correlation between every pair of social features and show their correlations in a heatmap (see the left figure in Figure 1). We put features together in the map based on similarity and positive/negativeness. From the figure, we can see that negative social features such as untrustworthy, aggressiveness, cold, introverted, irresponsible form a correlated block, while most positive features such as attractive, sociable, caring, friendly, happy, intelligent, interesting, confident are highly correlated with each other. Although we chose 20 pairs of opposite features, they are not completely complementary and redundant. Principal component analysis shows that it takes 24 principal components to cover 95% of the variance. 3.2. Regression Model for Social Attributes After we average human ratings on each face, each face receives a continuous score from 1 to 9 in all social dimensions. We model these social scores with a regression model. Our proposed algorithm is a ridge regression model on features extracted from deep convolutional neural networks (CNN). Since CNN features are usually highdimensional, we first perform Principal Component Analysis (PCA) on the extracted features of the training set to reduce the dimensionality. The PCA dimensionality is chosen by cross-validation on a validation set, separately for each trait. The PCA weights are saved and further used in fine-tuning our CNN-regression model. Figure 1: Correlation heatmaps among social features. Left: human. Right: network. 3.3. Feature Visualization 4.1. Baseline I: Human Correlations Attempting to understand what features are most helpful in social attribute prediction, we visualize the features extracted from the CNN. Two different methods were proposed in past feature visualization studies: dataset-centric methods [36, 38], and a network-centric method[36, 37]. Since these social attributes are all subjective perceptions rated by people, it is informative to examine to what extent people agree with each other upon those social judgments. We performed the following procedure 50 times for each attribute and then averaged the results: The dataset-centric method we employed is to display image patches from the training set that cause high activation for the feature units and use the deconvolution method to highlight the portions of the image that are responsible for firing the important feature neurons [36, 38]. 1. For each face, we randomly split the 15 raters evenly into two groups of 7 and 8. (Note: the raters for each face will, in general, be different sets). The network-centric approach is usually used in classification networks. This method produces an image that is based on adapting the input by maximizing the output category activation using gradient ascent, i.e., it is mainly a function of the network. [36, 37]. The key idea is to optimize the input image so that the target neuron can be highly activated. We apply this idea to the output (regression) neuron as well as the top nine neurons that influence that output individually. 4. Experimental framework In this section, we report our experimental framework using 6 CNN-based regression models with respect to two baselines, human correlation between groups of raters, and a baseline model using the geometric features. 2. We calculate the two group’s average ratings for each face, obtaining two vectors of length 2,222 (there are 2,222 faces in the dataset). 3. We calculate the correlation between the two vectors. The results are shown in the second column of Table 1. For every social attribute, the averaged correlation between human subgroups serves as an index of the rating consistency. 4.2. Baseline II: Regression on geometric features Past studies on facial attractiveness have found that attractiveness can be inferred from the geometric ratios and configurations of a face[5, 10]. We suggest that other social attributes can also be inferred from geometric features. We compute 29 geometric features based on definitions described in [16] and further extract a ”smoothness” feature and skin color features according to the procedure in [5, 10]. The ”smoothness” of a face was evaluated by applying a Canny edge detector to windows from the cheek/forehead area [5]. The more edges detected by edge detectors within the window, the less smooth the skin is. The regions we chose to compute smoothness and skin color are highlighted in the right subplot of Figure 2). The ”skin color” feature is extracted from the same window as ”smoothness”, converted from RGB to HSV. Regressing on these handcrafted features alone are not enough to capture the richness of geometric details about a face, we therefore use a computer vision library (dlib, C++) to automatically label 68 face landmarks (see Figure 2) for each face and compute distances and slopes between any two landmarks. Combining 29 handcrafted geometric features, smoothness, color and the distance-slope features, we obtain 4592 features in total. Since the features are highly correlated, we apply PCA to reduce dimensionality. Again, the PCA dimensionality is chosen by cross-validating on the hold out set separately for each facial attribute. Then a ridge regression model is applied to predict social attribute ratings of a face. The hyperparameter of ridge regression is selected by leave-one-out validation within the training set. Figure 2: 68 face landmarks labeled by dlib software automatically. The gray regions are the locations used for computing smoothness and skin color. 4.3. CNN-based Regression Model We initially compared six neural network architectures: (1) VGG16, (2) VGG-Face from the Oxford Visual Geometry Groups VGG networks[24], (3) AlexNet (the publicly available CaffeNet reference model) [13] (4) Inception from Google [26] (5) a shallow face identification Siamese neural network that we trained from scratch: Face-SNN and (6) a state of the art VGG-derived network trained for the face landmark localization task: Face-LandmarkNN. These comparisons were performed with the Caffe deep learning framework [9]. To find the best CNN to predict social attribute ratings among all six networks, we first find the best-performing feature layers of each network (with the ridge regression model), and then we compare the results among the networks to select the best network. For each layer of each network, before the ridge regression, we performed PCA and picked the PCA dimension that gave the best results on the validation set. 5. Results Surprisingly, we found that features from conv5 2 layer of VGG16 trained for object classification slightly outperformed the AlexNet and Inception networks, while the three networks trained solely on faces, VGG-Face, FaceLandmarkNN and Face-SNN did not achieve performance as competitive as the other three for most of the social attributes. The best performing VGG16 layer was conv5 2. We speculate that the reason for the relatively poorer performance of the face recognition networks is that they are optimized either to learn differences between faces which define identity or to learn the face landmark configurations, whereas for this task at hand, we are looking for commonalities behind certain social features which go beyond identity. The landmark network presumably should give results similar to the geometric features, but did not learn features corresponding to all of the features we used in that model. These speculations need to be checked, of course, for example by trying to predict all of our measured features, using the landmark network, but we did not do that here. We tried fine-tuning the model as follows. We used backpropagation to fine tune the weights into the conv5 2 layer, the weights to the PCA layer from conv5 2 (initialized by the PCA weights), and the weights from the PCA layer to the output regression unit. However, this fine-tuning did not improve performance, so the results reported in Table 1 are without fine-tuning. We evaluate the performance on 50 random train / validation / test splits of the data with a 64/16/20 percent split for training, cross-validation and testing, respectively. The prediction performance of our model is evaluated using Pearson’s correlation with the human ratings on the test set. For each social attribute, we report its human consistency as described in Section 4.1. Table 1 summarizes the prediction performance of our model for all the social attributes compared to Baseline I and II. The table is organized in a descending order of human agreement on the putative positive attribute of the paired attributes. The three attributes where there is greater agreement among humans for the negative component of the pair are bolded. Among all the social attributes, human subjects agree most with each other about ”happy” and disagree most about ”unfamiliar.” For both regression models (Baseline II and our model), model performance grows as the consensus on a social trait increases and human correlations with each other are consistently lower than the models’ correlations with the average human ratings. Normally, one might consider the human correlations to be an upper bound on performance, but here they are different kinds of correlations. Since the change in expression would produce a change in landmark locations, it is not surprising that landmark- based geometric features (Baseline II) achieve comparable or slightly higher correlation as our model for predicting those social attributes that are highly related to expressions (such as ”happy”, ”unhappy”, ”cold” and ”friendly” etc.). While for other social attributes, our model slightly outperforms landmark-based geometric features by about 0.04 correlation on average and significantly outperforms human correlation by about 0.12 correlation on average. This implies that CNN features encode much more information than just landmark-based features. It is essential to visualize those features and understand what features extracted from CNN make our model powerful enough to predict social attributes. To quantitatively compare the face social features perceived by humans and those predicted by our best performing model, we take the model predictions on all social features, and compute the Spearman correlation between every pair in the set (see the right figure in Figure 1). Not surprisingly, this has very similar patterns compared the heatmap generated from human ratings (see the right panel in Figure 1). Pearson Correlation between the upper triangle of the two similarity matrices (human and model prediction) is 0.9836. However, note that each predictor was trained independently. 6. Feature Visualization In this section, we visualize the features that are of importance to social perceptions. We choose facial attractiveness as an example. The same method can be applied to the other social features. We employ the two methods described in section 3.3 to visualize features learned by our model. 6.1. Data-centric Visualization To identify visual features that ignite attractiveness perception, we find the top 9 units of highest influence on attractiveness at conv5 2 as follows. First, we compute a product of three terms: (1) A unit’s activation from conv5 2, (2) that unit’s weight to the following fc pca layer, (3) the fc pca unit’s weight to the output unit. We then sort all conv5 2 units’ average products of the three terms and identify the top 9 neurons as the ones that contribute most to the output neuron for the corresponding social feature. Then we employ the method described in [36, 38] to find top-9 input images that cause high activations in each of the top-9 conv5 2 neurons. Also we further produce the deconvolutional images by projecting each activation separately down to pixel space. Figure 3 captures the features that are important to predict the attractiveness of a face. The feature importance descends from left to right and top to bottom. The important features identified by our model are related to eyes, hair Social Attributes happy unhappy friendly unfriendly sociable introverted attractive unattractive kind mean caring cold trustworthy untrustworthy responsible irresponsible confident uncertain humble egotistic emotionally stable emotionally unstable normal weird intelligent unintelligent interesting boring calm aggressive emotional unemotional memorable forgettable typical atypical common uncommon familiar unfamiliar Baseline I 0.84 0.75 0.78 0.72 0.74 0.50 0.72 0.62 0.72 0.69 0.72 0.71 0.62 0.60 0.58 0.55 0.55 0.45 0.55 0.52 0.53 0.50 0.49 0.52 0.49 0.43 0.42 0.39 0.41 0.65 0.33 0.56 0.30 0.27 0.28 0.24 0.25 0.27 0.24 0.18 Baseline II 0.86 0.81 0.83 0.80 0.78 0.64 0.66 0.62 0.79 0.75 0.78 0.81 0.72 0.69 0.65 0.64 0.55 0.62 0.64 0.62 0.64 0.62 0.58 0.50 0.53 0.53 0.64 0.54 0.47 0.72 0.60 0.76 0.38 0.40 0.41 0.40 0.37 0.38 0.42 0.40 Our Model 0.84 0.80 0.82 0.79 0.78 0.65 0.75 0.70 0.79 0.73 0.79 0.79 0.73 0.70 0.70 0.67 0.61 0.63 0.63 0.62 0.67 0.64 0.61 0.56 0.62 0.58 0.67 0.60 0.50 0.72 0.60 0.75 0.48 0.48 0.43 0.43 0.40 0.40 0.44 0.44 Table 1: Prediction performance of all the social attributes. The reported performance is averaged on 50 random train/validation/test splits of the data. with bangs, high nose-bridge, high cheeks, dark eyebrows, strong commanding jawline, chin and red lips. Note that among the 9 cropped input image patches, not all the faces are perceived as attractive or rated as attractive. An attractive face needs to activate more than one feature in order to be considered attractive. This observation agrees with our intuition that attractiveness is a kind of holistic judgment, requiring a combination of multiple features. It also seems to be the case that several of the features include relationships between the parts. For example, while the first feature in the upper left of the figure emphasizes the eye, it also includes the nose. This is also true of the upper right feature. Smiling is also important in order to be perceived attractive, as emphasized by the feature in the lower left of the figure. 6.2. Network-centric Visualization In section 6.1, we have identified the top-9 units and their feature maps from the con5 2 layer that maximally activates the attractiveness neuron. Here, we use the gradient-ascent method to optimize the input image that would highly activate a specific neuron of the network. This method is also performed on the pretrained-VGG16 regression model, which is trained to predict attractiveness. Figure 4a shows the optimized image corresponding to the output neuron from a random input image. Optimizing the input image for the output neuron of a regression model does not result in a particularly interpretable figure, although it does appear to emphasize the eyes. Our second approach is to optimize the input image with respect to the top-9 contributing neurons from conv5 2 layer that have been identified in section 6.1. Figure 4b presents 9 optimized images with respect to the corresponding top-9 feature maps of the top-9 neurons from conv5 2 layer. Since we use a pretrained-VGG16 network for visualization, it is not surprising that the corresponding top-9 feature maps at conv5 2 layer are not particularly encoding facial patterns. We also present the optimized image initialize with a face image, along with the original face image for comparison in Figure 5. The optimized image tends to highlight the eyes, nose, cheeks and the contour of the face, which is consistent with the features identified by data-centric method. 7. Conclusion We have shown that a deep network can be used to predict human social judgments with high correlation with the average human ratings. As far as we know, this is the widest exploration of social judgment predictions, showing human-like perceptions on 40 social dimensions. Unsurprisingly, given previous work recognizing facial expressions, where happiness is the easiest to recognize, our highest correlation is on the happy feature. However, previous work in this area tended to classify a face as happy or not, rather than the degree of rated happiness. We find that for attributes that correspond to elements of the face that require muscle movement, or a lack of it (such as happy, unhappy, cold, aggressive, unemotional) a simple regression model based on the placement of facial landmarks works well. For ones that don’t appear to suggest emotions, such as friendly, note that friendly and happy are highly correlated (see Figure 1, and the red block indexed by happy and friendly). Similarly, aggressive and mean are highly correlated, which presumably requires not smiling. Perhaps of more significance are the correlations with judgments of traits, such as trustworthiness, responsibleness, confidence, and intelligence, which would correspond to more static features of the face. In this area, the deep network, which responds to facial textures as well as shape, has superior performance. While these judgments do not correspond to a notion of ”ground truth,” they are things for which humans have a fair amount of agreement, suggesting that there is a signal to be recognized. Of further note is that we have shown, yet again, that a machine can recognize attractiveness, presumably without any hormonal influences. For this dataset, our deep network correlates with human ratings at 0.75. This provides a benchmark for this dataset. Finally, it is of note that we can see that some of the traits considered to be ”opposite” in this list are not simply the reverse of one another. For example, there is a large difference in human agreements on ”sociable” (0.74) versus ”introverted” (0.50), suggesting they are not opposites. These results are significant for the field of social robotics. While a robot should not judge a human based completely on their appearance, it can be useful knowledge that humans might judge a person to be trustworthy, while the robot can be more objective. Similarly, a robot need not treat an attractive and unattractive person differently, but this knowledge could affect how the robot interacts with the unattractive person, knowing in advance that this person may have had many negative experiences interacting with people. In this paper, we train each social feature separately, due to their varied consistency and reliability. In the future, it is worth trying to train one single convnet to learn multiple tasks simultaneously and evaluate whether shared representation may further improve the model performance. In summary, we have provided the first machine learning system to learn subjective human judgments of a wide spectrum of traits. We found that the more humans agree on such subjective judgments, the more the system could pick up on the features driving those judgments. It will be of interest to investigate further what those features are, beyond the attractiveness features we displayed here. One step further from predicting the value in a certain social feature is to move faces on the social manifold and to increase a face’s elicited social perceptions in positive ways (e.g. to make a face look more sociable/ trustworthy/ attractive). Although the images generated by our current visualization method are still far away from being photorealistic, it may be a fruitful area in the future to develop generative models that can achieve this goal. Figure 3: Visualization of features in the pretrained-VGG16 regression network. For conv5 2 layer, we show the top 9 activations of the top 9 neurons that maximally activate the attractiveness neuron across the training data, projected down to pixel space using the deconvolutional network approach [38] and their corresponding cropped image patches. Best viewed in electronic form, and zoomed in. References [1] H. Altwaijry and S. Belongie. Relative ranking of facial attractiveness. In Applications of Computer Vision (WACV), 2013 IEEE Workshop on, pages 117–124. IEEE, 2013. 2 [2] W. A. Bainbridge, P. Isola, and A. Oliva. The intrinsic memorability of face photographs. Journal of Experimental Psychology: General, 142(4):1323, 2013. 1, 2, 3 [3] A. Dantcheva and J. Dugelay. Female facial aesthetics based on soft biometrics and photo-quality. In Proceedings of ICME, 2011. 2 [4] S. Dhar, V. Ordonez, and T. L. Berg. High level describable attributes for predicting aesthetics and interestingness. In Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, pages 1657–1664. IEEE, 2011. 3 [5] Y. Eisenthal, G. Dror, and E. Ruppin. Facial attractiveness: Beauty and the machine. Neural Computation, 18(1):119– 142, 2006. 1, 2, 4, 5 [6] V. Falvello, M. Vinson, C. Ferrari, and A. Todorov. The robustness of learning about the trustworthiness of other people. Social Cognition, 33(5):368, 2015. 1 [7] K. Grammer and R. Thornhill. Human (homo sapiens) facial attractiveness and sexual selection: the role of symmetry and averageness. Journal of comparative psychology, 108(3):233, 1994. 1 [8] D. Gray, K. Yu, W. Xu, and Y. Gong. Predicting facial beauty without landmarks. In Computer Vision–ECCV 2010, pages 434–447. Springer, 2010. 1, 2 [9] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093, 2014. 5 [10] A. Kagian, G. Dror, T. Leyvand, I. Meilijson, D. Cohen-Or, and E. Ruppin. A machine learning predictor of facial attractiveness revealing human-like psychophysical biases. Vision research, 48(2):235–243, 2008. 1, 2, 4 [11] A. Khosla, W. A. Bainbridge, A. Torralba, and A. Oliva. Modifying the memorability of face photographs. In Computer Vision (ICCV), 2013 IEEE International Conference on, pages 3200–3207. IEEE, 2013. 1 [12] M. H. Kiapour, K. Yamaguchi, A. C. Berg, and T. L. Berg. Hipster wars: Discovering elements of fashion styles. In European conference on computer vision, pages 472–488. Springer, 2014. 3 [13] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012. 5 [14] J. H. Langlois and L. A. Roggman. Attractive faces are only average. Psychological science, 1(2):115–121, 1990. 2 [15] A. Laurentini and A. Bottino. Computer analysis of face beauty: A survey. Computer Vision and Image Understanding, 125:184–199, 2014. 2, 3 [16] D. S. Ma, J. Correll, and B. Wittenbrink. The chicago face database: A free stimulus set of faces and norming data. Behavior research methods, 47(4):1122–1135, 2015. 4 (a) Original input image (b) Optimized image Figure 5: Visualization of the optimized image with a input face image: Figure 5a is the original face image before optimization. Figure 5b is produced by performing optimization with respect to the output unit. (a) Optimized input image with respect to the output unit [20] [21] [22] [23] [24] [25] (b) Optimized input images with respect to top-9 neurons from conv5 2 layer [26] Figure 4: Visualization of features using network-centric method. To produce Fig 4a, we use gradient ascent to optimize the output neuron. Fig 4b shows 9 optimized images for the feature maps corresponding to top-9 contributor neurons from conv5 2 layer. [27] [28] [17] M. McCurrie, F. Beletti, L. Parzianello, A. Westendorp, S. Anthony, and W. Scheirer. Predicting first impressions with deep learning. arXiv preprint arXiv:1610.08119, 2016. 2, 3 [18] A. Mignault and A. Chaudhuri. The many faces of a neutral face: Head tilt and perception of dominance and emotion. Journal of nonverbal behavior, 27(2):111–132, 2003. 1 [19] N. N. Oosterhof and A. Todorov. The functional basis of [29] [30] face evaluation. Proceedings of the National Academy of Sciences, 105(32):11087–11092, 2008. 1 M. Peskin and F. N. Newell. Familiarity breeds attraction: Effects of exposure on the attractiveness of typical and distinctive faces. PERCEPTION-LONDON-, 33(2):147–158, 2004. 1 G. Rhodes, L. Jeffery, T. L. Watson, C. W. Clifford, and K. Nakayama. Fitting the mind to the world face adaptation and attractiveness aftereffects. Psychological science, 14(6):558–566, 2003. 2 R. Rothe, R. Timofte, and L. Van Gool. Some like it hotvisual guidance for preference prediction. arXiv preprint arXiv:1510.07867, 2015. 2 J. E. Scheib, S. W. Gangestad, and R. Thornhill. Facial attractiveness, symmetry and cues of good genes. Proceedings of the Royal Society of London. Series B: Biological Sciences, 266(1431):1913–1917, 1999. 2 K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. 2, 5 R. Stewart, M. Andriluka, and A. Y. Ng. End-to-end people detection in crowded scenes. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016. 1 C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1–9, 2015. 5 Y. Taigman, M. Yang, M. Ranzato, and L. Wolf. Deepface: Closing the gap to human-level performance in face verification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1701–1708, 2014. 1 R. Thornhill and S. W. Gangestad. Facial attractiveness. Trends in cognitive sciences, 3(12):452–460, 1999. 1 A. Todorov, S. G. Baron, and N. N. Oosterhof. Evaluating face trustworthiness: a model based approach. Social cognitive and affective neuroscience, 3(2):119–127, 2008. 1, 3 A. Todorov, R. Dotsch, J. M. Porter, N. N. Oosterhof, and V. B. Falvello. Validation of data-driven computational models of social perception of faces. Emotion, 13(4):724, 2013. 3 [31] A. Todorov, P. Mende-Siedlecki, and R. Dotsch. Social judgments from faces. Current opinion in neurobiology, 23(3):373–380, 2013. 1, 3 [32] A. Todorov, C. Y. Olivola, R. Dotsch, and P. MendeSiedlecki. Social attributions from faces: Determinants, consequences, accuracy, and functional significance. Psychology, 66(1):519, 2015. 1, 3 [33] A. Todorov, C. P. Said, A. D. Engell, and N. N. Oosterhof. Understanding evaluation of faces on social dimensions. Trends in cognitive sciences, 12(12):455–460, 2008. 1 [34] Y. Wang and G. W. Cottrell. Bikers are like tobacco shops, formal dressers are like suits: Recognizing urban tribes with caffe. In 2015 IEEE Winter Conference on Applications of Computer Vision, pages 876–883. IEEE, 2015. 3 [35] J. Willis and A. Todorov. First impressions making up your mind after a 100-ms exposure to a face. Psychological science, 17(7):592–598, 2006. 1 [36] J. Yosinski, J. Clune, A. Nguyen, T. Fuchs, and H. Lipson. Understanding neural networks through deep visualization. arXiv preprint arXiv:1506.06579, 2015. 4, 6 [37] S. Yu and K. Zipser. A deep neural net trained for person categorization develops both detailed local features and broad contextual specificities. Journal of Vision, 16(12):411–411, 2016. 4 [38] M. D. Zeiler and R. Fergus. Visualizing and understanding convolutional networks. In European Conference on Computer Vision, pages 818–833. Springer, 2014. 4, 6, 8 [39] X. Zhu, Z. Lei, X. Liu, H. Shi, and S. Z. Li. Face alignment across large poses: A 3d solution. arXiv preprint arXiv:1511.07212, 2015. 1
2
arXiv:1607.00743v1 [math.ST] 4 Jul 2016 A Residual Bootstrap for High-Dimensional Regression with Near Low-Rank Designs Miles E. Lopes Department of Statistics University of California, Berkeley Berkeley, CA 94720 [email protected] Abstract We study the residual bootstrap (RB) method in the context of high-dimensional linear regression. Specifically, we analyze the distributional approximation of linear contrasts c⊤ (βbρ − β), where βbρ is a ridge-regression estimator. When regression coefficients are estimated via least squares, classical results show that RB consistently approximates the laws of contrasts, provided that p ≪ n, where the design matrix is of size n × p. Up to now, relatively little work has considered how additional structure in the linear model may extend the validity of RB to the setting where p/n ≍ 1. In this setting, we propose a version of RB that resamples residuals obtained from ridge regression. Our main structural assumption on the design matrix is that it is nearly low rank — in the sense that its singular values decay according to a power-law profile. Under a few extra technical assumptions, we derive a simple criterion for ensuring that RB consistently approximates the law of a given contrast. We then specialize this result to study confidence intervals for mean response values Xi⊤ β, where Xi⊤ is the ith row of the design. More precisely, we show that conditionally on a Gaussian design with near low-rank structure, RB simultaneously approximates all of the laws Xi⊤ (βbρ − β), i = 1, . . . , n. This result is also notable as it imposes no sparsity assumptions on β. Furthermore, since our consistency results are formulated in terms of the Mallows (Kantorovich) metric, the existence of a limiting distribution is not required. 1 Introduction Until recently, much of the emphasis in the theory of high-dimensional statistics has been on “first order” problems, such as estimation and prediction. As the understanding of these problems has become more complete, attention has begun to shift increasingly towards “second order” problems, dealing with hypothesis tests, confidence intervals, and uncertainty quantification [1, 2, 3, 4, 5, 6]. In this direction, much less is understood about the effects of structure, regularization, and dimensionality — leaving many questions open. One collection of such questions that has attracted growing interest deals with the operating characteristics of the bootstrap in high dimensions [7, 8, 9]. Due to the fact that bootstrap is among the most widely used tools for approximating the sampling distributions of test statistics and estimators, there is much practical value in understanding what factors allow for the bootstrap to succeed in the high-dimensional regime. The regression model and linear contrasts. In this paper, we focus our attention on highdimensional linear regression, and our aim is to know when the residual bootstrap (RB) method consistently approximates the laws of linear contrasts. (A review of RB is given in Section 2.) 1 To specify the model, suppose that we observe a response vector Y ∈ Rn , generated according to Y = Xβ + ε, n×p (1) p where X ∈ R is the observed design matrix, β ∈ R is an unknown vector of coefficients, and the error variables ε = (ε1 , . . . , εn ) are drawn i.i.d. from an unknown distribution F0 , with mean 0 and unknown variance σ 2 < ∞. As is conventional in high-dimensional statistics, we assume the model (1) is embedded in a sequence of models indexed by n. Hence, we allow X, β, and p to vary implicitly with n. We will leave p/n unconstrained until Section 3.3, where we will assume p/n ≍ 1 in Theorem 3, and then in Section 3.4, we will assume further that p/n is bounded strictly between 0 and 1. The distribution F0 is fixed with respect to n, and none of our results require F0 to have more than four moments. Although we are primarily interested in cases where the design matrix X is deterministic, we will also study the performance of the bootstrap conditionally on a Gaussian design. For this reason, we will use the symbol E[. . . |X] even when the design is non-random so that confusion does not arise in relating different sections of the paper. Likewise, the symbol E[. . . ] refers to unconditional expectation over all sources of randomness. Whenever the design is random, we will assume X ⊥ ⊥ ε, denoting the distribution of X by PX , and the distribution of ε by Pε . Within the context of the regression, we will be focused on linear contrasts c⊤ (βb − β), where c ∈ Rp is a fixed vector and βb ∈ Rp is an estimate of β. The importance of contrasts arises from the fact that they unify many questions about a linear model. For instance, testing the significance of the ith coefficient βi may be addressed by choosing c to be the standard basis vector c⊤ = e⊤ i . Another important problem is quantifying the uncertainty of point predictions, which may be addressed by choosing c⊤ = Xi⊤ , i.e. the ith row of the design matrix. In this case, an approximation to the law of the contrast leads to a confidence interval for the mean response value E[Yi ] = Xi⊤ β. Further applications of contrasts occur in the broad topic of ANOVA [10]. Intuition for structure and regularization in RB. The following two paragraphs explain the core conceptual aspects of the paper. To understand the role of regularization in applying RB to highdimensional regression, it is helpful to think of RB in terms of two ideas. First, if βbLS denotes the ordinary least squares estimator, then it is a simple but important fact that contrasts can be written as c⊤ (βbLS − β) = a⊤ ε where a⊤:= c⊤ (X ⊤ X)−1 X ⊤ . Hence, if it were possible to sample directly from F0 , then the law of any such contrast could be easily determined. Since F0 is unknown, the second key idea is to use the residuals of some estimator βb as a proxy for samples from F0 . When p ≪ n, the least-squares residuals are a good proxy [11, 12]. However, it is well-known that leastsquares tends to overfit when p/n ≍ 1. When βbLS fits “too well”, this means that its residuals are b “too small”, and hence they give a poor proxy for F0 . Therefore, by using a regularized estimator β, b overfitting can be avoided, and the residuals of β may offer a better way of obtaining “approximate samples” from F0 . The form of regularized regression we will focus on is ridge regression: βbρ := (X ⊤ X + ρIp×p )−1 X ⊤ Y, (2) where ρ > 0 is a user-specificed regularization parameter. As will be seen in Sections 3.2 and 3.3, the residuals obtained from ridge regression lead to a particularly good approximation of F0 when the design matrix X is nearly low-rank, in the sense that most of its singular values are close to 0. In essence, this condition is a form of sparsity, since it implies that the rows of X nearly lie in a low-dimensional subspace of Rp . However, this type of structural condition has a significant advantage over the the more well-studied assumption that β is sparse. Namely, the assumption that X is nearly low-rank can be inspected directly in practice — whereas sparsity in β is typically unverifiable. In fact, our results will impose no conditions on β, other than that kβk2 remains bounded as (n, p) → ∞. Finally, it is worth noting that the occurrence of near low-rank design matrices is actually very common in applications, and is often referred to as collinearity [13, ch. 17]. Contributions and outline. The primary contribution of this paper is a complement to the work of Bickel and Freedman [12] (hereafter B&F 1983) — who showed that in general, the RB method fails 2 to approximate the laws of least-squares contrasts c⊤ (βbLS − β) when p/n ≍ 1. Instead, we develop an alternative set of results, proving that even when p/n ≍ 1, RB can successfully approximate the laws of “ridged contrasts” c⊤ (βbρ − β) for many choices of c ∈ Rp , provided that the design matrix X is nearly low rank. A particularly interesting consequence of our work is that RB successfully approximates the law c⊤ (βbρ − β) for a certain choice of c that was shown in B&F 1983 to “break” RB when applied to least-squares. Specifically, such a c can be chosen as one of the rows of X with a high leverage score (see Section 4). This example corresponds to the practical problem of setting confidence intervals for mean response values E[Yi ] = Xi⊤ β. (See [12, p. 41], as well as Lemma 2 and Theorem 4 in Section 3.4). Lastly, from a technical point of view, a third notable aspect of our results is that they are formulated in terms of the Mallows-ℓ2 metric, which frees us from having to impose conditions that force a limiting distribution to exist. Apart from B&F 1983, the most closely related works we are aware of are the recent papers [7] and [8], which also consider RB in the high-dimensional setting. However, these works focus on role of sparsity in β and do not make use of low-rank structure in the design, whereas our work deals only with structure in the design and imposes no sparsity assumptions on β. The remainder of the paper is organized as follows. In Section 2, we formulate the problem of approximating the laws of contrasts, and describe our proposed methodology for RB based on ridge regression. Then, in Section 3 we state several results that lay the groundwork for Theorem 4, which shows that that RB can successfully approximate all of the laws L(Xi⊤ (βbρ − β)|X), i = 1, . . . , n, conditionally on a Gaussian design. Due to space constraints, all proofs are deferred to material that will appear in a separate work. Notation and conventions. If U and V are random variables, then L(U |V ) denotes the law of U , conditionally on V . If an and bn are two sequences of real numbers, then the notation an . bn means that there is an absolute constant κ0 > 0 and an integer n0 ≥ 1 such that an ≤ κ0 bn for all n ≥ n0 . The notation an ≍ bn means that an . bn and bn . an . For a square matrix A ∈ Rk×k whose eigenvalues are real, we denote them by λmin (A) = λk (A) ≤ · · · ≤ λ1 (A) = λmax (A). 2 Problem setup and methodology Problem setup. For any c ∈ Rp , it is clear that conditionally on X, the law of c⊤ (βbρ − β) is completely determined by F0 , and hence it makes sense to use the notation    Ψρ (F0 ; c) := L c⊤ (βbρ − β) (3) X . The problem we aim to solve is to approximate the distribution Ψρ (F0 ; c) for suitable choices of c. Review of the residual bootstrap (RB) procedure. We briefly explain the steps involved in the residual bootstrap procedure, applied to the ridge estimator βbρ of β. To proceed somewhat indirectly, consider the following “bias-variance” decomposition of Ψρ (F0 ; c), conditionally on X,     Ψρ (F0 ; c) = L c⊤ βbρ − E[βbρ |X]  (4) X + c⊤ E[βbρ |X] − β . | {z } {z } | =: Φρ (F0 ;c) =: bias(Φρ (F0 ;c)) Note that the distribution Φ(F0 ; c) has mean zero, and so that the second term on the right side is the bias of Φρ (F0 ; c) as an estimator of Ψρ (F0 ; c). Furthermore, the distribution Φρ (F0 ; c) may be viewed as the “variance component” of Ψρ (F0 ; c). We will be interested in situations where the regularization parameter ρ may be chosen small enough so that the bias component is small. In this case, one has Ψρ (F0 ; c) ≈ Φρ (F0 ; c), and then it is enough to find an approximation to the law Φρ (F0 ; c), which is unknown. To this end, a simple manipulation of c⊤ (βbρ − E[βbρ ]) leads to   Φρ (F0 ; c) = L(c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε (5) X). Now, to approximate Φρ (F0 ; c), let Fb be any centered estimate of F0 . (Typically, Fb is obtained by using the centered residuals of some estimator of β, but this is not necessary in general.) Also, let ε∗ = (ε∗1 , . . . , ε∗n ) ∈ Rn be an i.i.d. sample from Fb . Then, replacing ε with ε∗ in line (5) yields   Φρ (Fb ; c) = L(c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε∗  (6) X). 3 At this point, we define the (random) measure Φρ (Fb ; c) to be the RB approximation to Φρ (F0 ; c). Hence, it is clear that the RB approximation is simply a “plug-in rule”. A two-stage approach. An important feature of the procedure just described is that we are free to use any centered estimator Fb of F0 . This fact offers substantial flexibility in approximating Ψρ (F0 ; c). One way of exploiting this flexibility is to consider a two-stage approach, where a “pilot” ridge estimator βb̺ is used to first compute residuals whose centered empirical distribution function is Fb̺ , say. Then, in the second stage, the distribution Fb̺ is used to approximate Φρ (F0 ; c) via the relation (6). To be more detailed, if (b e1 (̺), . . . , ebn (̺)) = eb(̺) := Y − X βb̺ are the residuals of βb̺ , b then we define F̺ to be the distribution that places mass 1/n at each of the values ebi (̺) − ē(̺) with P ē(̺) := n1 ni=1 ebi (̺). Here, it is important to note that the value ̺ is chosen to optimize Fb̺ as an approximation to F0 . By contrast, the choice of ρ depends on the relative importance of width and coverage probability for confidence intervals based on Φρ (Fb̺ ; c). Theorems 1, 3, and 4 will offer some guidance in selecting ̺ and ρ. Resampling algorithm. To summarize the discussion above, if B is user-specified number of bootstrap replicates, our proposed method for approximating Ψρ (F0 ; c) is given below. 1. Select ρ and ̺, and compute the residuals eb(̺) = Y − X βb̺ . 2. Compute the centered distribution function Fb̺ , putting mass 1/n at each ebi (̺) − ē(̺). 3. For j = 1, . . . , B: • Draw a vector ε∗ ∈ Rn of n i.i.d. samples from Fb̺ . • Compute zj := c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε∗ . 4. Return the empirical distribution of z1 , . . . , zB . Clearly, as B → ∞, the empirical distribution of z1 , . . . , zB converges weakly to Φρ (Fb̺ ; c), with probability 1. As is conventional, our theoretical analysis in the next section will ignore Monte Carlo issues, and address only the performance of Φρ (Fb̺ ; c) as an approximation to Ψρ (F0 ; c). 3 Main results The following metric will be central to our theoretical results, and has been a standard tool in the analysis of the bootstrap, beginning with the work of Bickel and Freedman [14]. The Mallows (Kantorovich) metric. For two random vectors U and V in a Euclidean space, the Mallows-ℓ2 metric is defined by n h i o (7) d22 (L(U ), L(V )) := inf E kU − V k22 : (U, V ) ∼ π π∈Π where the infimum is over the class Π of joint distributions π whose marginals are L(U ) and L(V ). It is worth noting that convergence in d2 is strictly stronger than weak convergence, since it also requires convergence of second moments. Additional details may be found in the paper [14]. 3.1 A bias-variance decomposition for bootstrap approximation To give some notation for analyzing the bias-variance decomposition of Ψρ (F0 ; c) in line (4), we define the following quantities based upon the ridge estimator βbρ . Namely, the variance is vρ = vρ (X; c) := var(Ψρ (F0 ; c)|X) = σ 2 kc⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 . To express the bias of Φρ (F0 ; c), we define the vector δ(X) ∈ Rp according to   δ(X) := β − E[βbρ ] = Ip×p − (X ⊤ X + ρIp×p )−1 X ⊤ X β, 4 (8) and then put b2ρ = b2ρ (X; c) := bias2 (Φρ (F0 ; c)) = (c⊤ δ(X))2 . (9) We will sometimes omit the arguments of vρ and b2ρ to lighten notation. Note that vρ (X; c) does not depend on β, and b2ρ (X; c) only depends on β through δ(X). The following result gives a regularized and high-dimensional extension of some lemmas in Freedman’s early work [11] on RB for least squares. The result does not require any structural conditions on the design matrix, or on the true parameter β. Theorem 1 (consistency criterion). Suppose X ∈ Rn×p is fixed. Let Fb be any estimator of F0 , and let c ∈ Rp be any vector such that vρ = vρ (X; c) 6= 0. Then with Pε -probability 1, the following inequality holds for every n ≥ 1, and every ρ > 0,   b2 (10) d22 √1vρ Ψρ (F0 ; c), √1vρ Φρ (Fb ; c) ≤ σ12 d22 (F0 , Fb ) + vρρ . √ Remarks. Observe that the normalization 1/ vρ ensures that the bound is non-trivial, since the √ distribution Ψρ (F0 ; c)/ vρ has variance equal to 1 for all n (and hence does not become degenerate for large n). To consider the choice of ρ, it is simple to verify that the ratio b2ρ /vρ decreases monotonically as ρ decreases. Note also that as ρ becomes small, the variance vρ becomes large, and likewise, confidence intervals based on Φρ (Fb; c) become wider. In other words, there is a trade-off between the width of the confidence interval and the size of the bound (10). Sufficient conditions for consistency of RB. An important practical aspect of Theorem 1 is that for any given contrast c, the variance vρ (X; c) can be easily estimated, since it only requires an estimate of σ 2 , which can be obtained from Fb. Consequently, whenever theoretical bounds on d22 (F0 , Fb) and b2ρ (X; c) are available, the right side of line (10) can be controlled. In this way, Theorem 1 offers a simple route for guaranteeing that RB is consistent. In Sections 3.2 and 3.3 to follow, we derive a bound on E[d22 (F0 , Fb)|X] in the case where Fb is chosen to be Fb̺ . Later on in Section 3.4, we study RB consistency in the context of prediction with a Gaussian design, and there we derive high probability bounds on both vρ (X; c) and b2ρ (X; c) where c is a particular row of X. 3.2 A link between bootstrap consistency and MSPE If βb is an estimator of β, its mean-squared prediction error (MSPE), conditionally on X, is defined as     mspe(βb |X) := n1 E kX(βb − β)k22  (11) X . The previous subsection showed that in-law approximation of contrasts is closely tied to the approximation of F0 . We now take a second step of showing that if the centered residuals of an estimator βb are used to approximate F0 , then the quality of this approximation can be bounded naturally in terms of mspe(βb |X). This result applies to any estimator βb computed from the observations (1). Theorem 2. Suppose X ∈ Rn×p is fixed. Let βb be any estimator of β, and let Fb be the empirical b Also, let Fn denote the empirical distribution of n i.i.d. distribution of the centered residuals of β. samples from F0 . Then for every n ≥ 1,    2   E d22 (Fb, F0 )X ≤ 2 mspe(βb |X) + 2 E[d22 (Fn , F0 )] + 2σn . (12) Remarks. As we will see in the next section, the MSPE of ridge regression can be bounded in a sharp way when the design matrix is approximately low rank, and there we will analyze mspe(βb̺ |X) for the pilot estimator. Consequently, when near low-rank structure is available, the only remaining issue in controlling the right side of line (12) is to bound the quantity E[d22 (Fn , F0 )|X]. The very recent work of Bobkov and Ledoux [15] provides an in-depth study of this question, and they derive a variety bounds under different tail conditions on F0 . We summarize one of their results below. Lemma 1 (Bobkov and Ledoux, 2014). If F0 has a finite fourth moment, then E[d22 (Fn , F0 )] . log(n)n−1/2 . 5 (13) Remarks. The fact that the squared distance is bounded at the rate of log(n)n−1/2 is an indication that d2 is a rather strong metric on distributions. For a detailed discussion of this result, see Corollaries 7.17 and 7.18 in the paper [15]. Although it is possible to obtain faster rates when more b stringent tail conditions are placed on F0 , we will only need a fourth moment, since the mspe(β|X) term in Theorem 2 will often have a slower rate than log(n)n−1/2 , as discussed in the next section. 3.3 Consistency of ridge regression in MSPE for near low rank designs In this subsection, we show that when the tuning parameter ̺ is set at a suitable rate, the pilot ridge estimator βb̺ is consistent in MSPE when the design matrix is near low-rank — even when p/n is large, and without any sparsity constraints on β. We now state some assumptions. A1. There is a number ν > 0, and absolute constants κ1 , κ2 > 0, such that b ≤ κ2 i−ν κ1 i−ν ≤ λi (Σ) for all i = 1, . . . , n ∧ p. A2. There are absolute constants θ, γ > 0, such that for every n ≥ 1, ̺ n = n−θ and ρ n = n−γ . A3. The vector β ∈ Rp satisfies kβk2 . 1. Due to Theorem 2, the following bound shows that the residuals of βb̺ may be used to extract a consistent approximation to F0 . Two other notable features of the bound are that it is non-asymptotic and dimension-free. Theorem 3. Suppose that X ∈ Rn×p is fixed and that Assumptions 1–3 hold, with p/n ≍ 1. Assume 1 ν 1 further that θ is chosen as θ = 2ν 3 when ν ∈ (0, 2 ), and θ = ν+1 when ν > 2 . Then, ( 2ν if ν ∈ (0, 21 ), n− 3 ν (14) mspe(βb̺ |X) . − ν+1 n if ν > 12 . Also, both bounds in (14) are tight in the sense that β can be chosen so that βb̺ attains either rate. b are observable, they may be used to estimate ν and guide Remarks. Since the eigenvalues λi (Σ) the selection of ̺/n = n−θ . However, from a practical point of view, we found it easier to select ̺ via cross-validation in numerical experiments, rather than via an estimate of ν. A link with Pinsker’s Theorem. In the particular case when F0 is a centered Gaussian distribution, the “prediction problem” of estimating Xβ is very similar to estimating the mean parameters of a Gaussian sequence model, with error measured in the ℓ2 norm. In the alternative sequence-model format, the decay condition on the eigenvalues of n1 X ⊤ X translates into an ellipsoid constraint on the mean parameter sequence [16, 17]. For this reason, Theorem 3 may be viewed as “regression version” of ℓ2 error bounds for the sequence model under an ellipsoid constraint (cf. Pinsker’s Theorem, [16, 17]). Due to the fact that the latter problem has a very well developed literature, there may be various “neighboring results” elsewhere. Nevertheless, we could not find a direct reference for our stated MSPE bound in the current setup. For the purposes of our work in this paper, the more important point to take away from Theorem 3 is that it can be coupled with Theorem 2 for proving consistency of RB. 3.4 Confidence intervals for mean responses, conditionally on a Gaussian design In this section, we consider the situation where the design matrix X has rows Xi⊤ ∈ Rp drawn i.i.d. from a multivariate normal distribution N (0, Σ), with X ⊥ ⊥ ε. (The covariance matrix Σ may vary with n.) Conditionally on a realization of X, we analyze the RB approximation of the laws Ψρ (F0 ; Xi ) = L(Xi⊤ (βbρ − β)|X). As discussed in Section 1, this corresponds to the problem of setting confidence intervals for the mean responses E[Yi ] = Xi⊤ β. Assuming that the population eigenvalues λi (Σ) obey a decay condition, we show below in Theorem 4 that RB succeeds with high PX -probability. Moreover, this consistency statement holds for all of the laws Ψρ (F0 ; Xi ) simultaneously. That is, among the n distinct laws Ψρ (F0 ; Xi ), i = 1, . . . , n, even the worst bootstrap approximation is still consistent. We now state some population-level assumptions. 6 A4. The operator norm of Σ ∈ Rp×p satisfies kΣkop . 1. Next, we impose a decay condition on the eigenvalues of Σ. This condition also ensures that Σ is invertible for each fixed p — even though the bottom eigenvalue may become arbitrarily small as p becomes large. It is important to notice that we now use η for the decay exponent of the population eigenvalues, whereas we used ν when describing the sample eigenvalues in the previous section. A5. There is a number η > 0, and absolute constants k1 , k2 > 0, such that for all i = 1, . . . , p, k1 i−η ≤ λi (Σ) ≤ k2 i−η . A6. There are absolute constants k3 , k4 ∈ (0, 1) such that for all n ≥ 3, we have the bounds k3 ≤ np ≤ k4 and p ≤ n − 2. The following lemma collects most of the effort needed in proving our final result in Theorem 4. Here it is also helpful to recall the notation ρ/n = n−γ and ̺/n = n−θ from Assumption 2. Lemma 2. Suppose that the matrix X ∈ Rn×p has rows Xi⊤ drawn i.i.d. from N (0, Σ), and that Assumptions 2–6 hold. Furthermore, assume that γ chosen so that 0 < γ < min{η, 1}. Then, the statements below are true. (i) (bias inequality) Fix any τ > 0. Then, there is an absolute constant κ0 > 0, such that for all large n, the following event holds with PX -probability at least 1 − n−τ − ne−n/16 , max b2ρ (X; Xi ) ≤ κ0 · n−γ · (τ + 1) log(n + 2). 1≤i≤n (15) (ii) (variance inequality) There are absolute constants κ1 , κ2 > 0 such that for all large n, the following event holds with γ PX -probability at least 1 − 4n exp(−κ1 n η ), 1 max 1≤i≤n vρ (X;Xi ) γ ≤ κ2 n1− η . (16) (iii) (mspe inequalities) η when Suppose that θ is chosen as θ = 2η/3 when η ∈ (0, 21 ), and that θ is chosen as θ = 1+η 1 η > 2 . Then, there are absolute constants κ3 , κ4 , κ5 , κ6 > 0 such that for all large n, ( 2η with PX -probability at least 1 − exp(−κ3 n2−4η/3 ), if η ∈ (0, 21 ) κ4 n− 3 η mspe(βb̺ |X) ≤ 2 − η+1 κ6 n with PX -probability at least 1 − exp(−κ5 n 1+η ), if η > 21 . Remarks. Note that the two rates in part (iii) coincide as η approaches 1/2. At a conceptual level, the entire lemma may be explained in relatively simple terms. Viewing the quantities mspe(βb̺ |X), b2ρ (X; Xi ) and vρ (X; Xi ) as functionals of a Gaussian matrix, the proof involves deriving concentration bounds for each of them. Indeed, this is plausible given that these quantities are smooth functionals of X. However, the difficulty of the proof arises from the fact that they are also highly non-linear functionals of X. We now combine Lemmas 1 and 2 with Theorems 1 and 2 to show that all of the laws Ψρ (F0 ; Xi ) can be simultaneously approximated via our two-stage RB method. Theorem 4. Suppose that F0 has a finite fourth moment, Assumptions 2–6 hold, and γ is chosen η so that 1+η < γ < min{η, 1}. Also suppose that θ is chosen as θ = 2η/3 when η ∈ (0, 12 ), and η when η > 12 . Then, there is a sequence of positive numbers δn with limn→∞ δn = 0, such θ = η+1 that the event  h  i   E max d22 √1vρ Ψρ (F0 ; Xi ), √1vρ Φρ (Fb̺ ; Xi )  (17)  X ≤ δn  1≤i≤n has PX -probability tending to 1 as n → ∞. Remark. Lemma 2 gives explicit bounds on the numbers δn , as well as the probabilities of the corresponding events, but we have stated the result in this way for the sake of readability. 7 4 Simulations In four different settings of n, p, and the decay parameter η, we compared the nominal 90% confidence intervals (CIs) of four methods: “oracle”, “ridge”, “normal”, and “OLS”, to be described below. In each setting, we generated N1 := 100 random designs X with i.i.d. rows drawn from N (0, Σ), where λj (Σ) = j −η , j = 1, . . . , p, and the eigenvectors of Σ were drawn randomly by setting them to be the Q factor in a QR decomposition of a standard p × p Gaussian matrix. Then, for each realization of X, we generated N2 := 1000 realizations of Y according to the model (1), where β = 1/k1k2 ∈ Rp , and F0 is the centered t distribution on 5 degrees of freedom, rescaled to have standard deviation σ = 0.1. For each X, and each corresponding Y , we considered the problem of setting a 90% CI for the mean response value Xi⊤⋆ β, where Xi⊤⋆ is the row with the highest leverage score, i.e. i⋆ = argmax1≤i≤n Hii and H := X(X ⊤ X)−1 X ⊤ . This problem was shown in B&F 1983 to be a case where the standard RB method based on least-squares fails when p/n ≍ 1. Below, we refer to this method as “OLS”. To describe the other three methods, “ridge” refers to the interval [Xi⊤⋆ βbρ − qb0.95 , Xi⊤⋆ βbρ − qb0.05 ], where qbα is the α% quantile of the numbers z1 , . . . , zB computed in the proposed algorithm in Section 2, with B = 1000 and c⊤ = Xi⊤⋆ . To choose the parameters ρ and ̺ for a given X and Y , we first computed rb as the value that optimized the MSPE error of a ridge estimator βbr with respect to 5-fold cross validation; i.e. cross validation was performed for every distinct pair (X, Y ). We then put ̺ = 5b r and ρ = 0.1b r, as we found the prefactors 5 and 0.1 to work adequately across various settings. (Optimizing ̺ with respect to MSPE is motivated by Theorems 1, 2, and 3. Also, choosing ρ to be somewhat smaller than ̺ conforms with the constraints on θ and γ in Theorem 4.) The method “normal” refers to the CI based on the normal approximation L(Xi⊤⋆ (βbρ −β)|X) ≈ N (0, τb2 ), where r, and σ b2 is the usual unbiased estimate of σ 2 based τb2 = σ b2 kXi⊤⋆ (X ⊤ X +ρIp×p )−1 X ⊤ k22 , ρ = 0.1b on OLS residuals. The “oracle” method refers to the interval [Xi⊤⋆ βbρ − q̃0.95 , Xi⊤⋆ βbρ − q̃0.05 ], with ρ = 0.1b r, and q̃α being the empirical α% quantile of Xi⊤ (βbρ − β) over all 1000 realizations of Y based on a given X. (This accounts for the randomness in ρ = 0.1b r.) Within a given setting of the triplet (n, p, η), we refer to the “coverage” of a method as the fraction of the N1 ×N2 = 105 instances where the method’s CI contained the parameter Xi⊤⋆ β. Also, we refer to “width” as the average width of a method’s intervals over all of the 105 instances. The four settings of (n, p, η) correspond to moderate/high dimension and moderate/fast decay of the eigenvalues λi (Σ). Even in the moderate case of p/n = 0.45, the results show that the OLS intervals are too narrow and have coverage noticeably less than 90%. As expected, this effect becomes more pronounced when p/n = 0.95. The ridge and normal intervals perform reasonably well across settings, with both performing much better than OLS. However, it should be emphasized that our study of RB is motivated by the desire to gain insight into the behavior of the bootstrap in high dimensions — rather than trying to outperform particular methods. In future work, we plan to investigate the relative merits of the ridge and normal intervals in greater detail. Table 1: Comparison of nominal 90% confidence intervals setting 1 n = 100, p = 45, η = 0.5 setting 2 n = 100, p = 95, η = 0.5 setting 3 n = 100, p = 45, η = 1 setting 4 n = 100, p = 95, η = 1 width coverage width coverage width coverage width coverage oracle 0.21 0.90 0.22 0.90 0.20 0.90 0.21 0.90 ridge 0.20 0.87 0.26 0.88 0.21 0.90 0.26 0.92 normal 0.23 0.91 0.26 0.88 0.22 0.91 0.23 0.87 OLS 0.16 0.81 0.06 0.42 0.16 0.81 0.06 0.42 Acknowledgements. MEL thanks Prof. Peter J. Bickel for many helpful discussions, and gratefully acknowledges the DOE CSGF under grant DE-FG02-97ER25308, as well as the NSF-GRFP. 8 A Proof of Theorem 1 Proof. Due to line (4) and Lemma 8.8 in B&F 1981,  d22 (Ψρ (F0 ; c), Φρ (Fb ; c)) = d22 Φρ (F0 ; c), Φρ (Fb ; c) + (c⊤ δ(X))2 . (18) If ε∗ ∈ Rn is a random vector whose entries are drawn i.i.d. from Fb , then the definition of Φρ gives the matching relations   Φρ (F0 ; c) = L(c⊤ (X ⊤ X + ρ)−1 X ⊤ ε X) (19)   ⊤ ⊤ −1 ⊤ ∗ Φρ (Fb; c) = L(c (X X + ρ) X ε  X). To make use of these relations, we apply Lemma 8.9 in B&F 1981, which implies that if w ∈ Rn is a generic deterministic vector, and if U = (U1 , . . . , Un ) and V = (V1 , . . . , Vn ) are random vectors with i.i.d. entries, then d22 (w⊤ U, w⊤ V ) ≤ kwk22 · d2 (U1 , V1 )2 . Therefore,  d22 Φρ (F0 ), Φρ (Fb) ≤ kc⊤ (X ⊤ X + ρ)−1 X ⊤ k22 · d22 (ε1 , ε∗1 ) = 1 σ2 (20) · vρ (X; c) · d22 (F0 , Fb ). Combining this with line (18) and dividing through by vρ proves the claim. B Proof of Theorem 2 Proof. By the triangle inequality, d22 (Fb , F0 ) ≤ 2 d22 (Fb, Fn ) + 2 d22 (Fn , F0 ). (21) b which places mass 1/n at Let F̃n be the (uncentered) empirical distribution of the residuals eb of β, each value ebi , for i = 1, . . . , n. The proofs of Lemmas 2.1 and 2.2 in Freedman 1981, show that     Pn 2       E d2 (Fb, Fn )2  + E d2 (F̃n , Fn )2  X ≤ E n1 i=1 εi X     (22) ≤ n1 σ 2 + n1 E kb e − εk22  X     b 2 = n1 σ 2 + n1 E kX(β − β)k 2 X , b which holds for any estimator β. b This where we have used the algebraic identity eb − ε = X(β − β), completes the proof. C Proof of Theorem 3 Proof. We begin with a simple bias-variance decomposition, i h   2     X + mspe(βb̺ |X) = n1 E X βb̺ − E βb̺ |X   2 1 n   X(E βb̺ |X − β) 2 . 2 (23) We will handle the bias and variance terms separately. To consider the bias term, note that E[βbρ |X]− β = Bβ, where B = (X ⊤ X + ̺Ip×p )−1 X ⊤ X − Ip×p . Hence, 1 b n kX(E[β̺ |X] − β)k22 = 1 2 n kXBβk2 = β ⊤ B( n1 X ⊤ X)Bβ. 9 (24) If we let li = λi ( n1 X ⊤ X), then the eigenvalues of B( n1 X ⊤ X)B are of the form µi := In particular, it is simple to check1 that maxi µi ≍ ̺/n whenever θ ≤ ν, and so li (̺/n)2 (li +̺/n)2 . β ⊤ B( n1 X ⊤ X)Bβ . n̺ kβk22 = n−θ kβk22 . (25) Note that this bound is tight, since it is achieved whenever β is parallel to the top eigenvector of B( n1 X ⊤ X)B. To consider the variance term, note that βb̺ − E[βb̺ |X] = (X ⊤ X + ̺Ip×p )−1 X ⊤ ε, and so  h   i  2  1 b̺ − E[βb̺ |X]) 2  X = 1 tr X ⊤ X X ⊤ X + ̺Ip×p −1 E X( β  n n 2 2 Pn∧p li . = n1 i=1 li +̺/n It is natural to decompose the sum in terms of the index set I(n) := {i ∈ {1, . . . , n ∧ p} : li ≥ ̺/n}, (26) (27) θ ν which satisfies |I(n)| ≍ n . We will bound the variance term in two complementary cases; either ν > 1/2 or ν ≤ 1/2. First assume ν > 1/2. Then, 1 n p X i=1 2 li li +̺/n = 1 n X i∈I(n) . 1 n 2 li li +̺/n |I(n)| + 1 n Z + n∧p |I(n)| 1 n X i6∈I(n) 2 li li +̺/n (28) x−2ν (̺/n)2 dx (29)   θ using ν > . n−1 n ν + n2θ · (|I(n)|)1−2ν  θ  θ ≍ n−1 n ν + n2θ · (n ν )(1−2ν) 1 2 (30) (31) θ−ν ν = 2n . (32) To see that this upper bound is tight, note that in line (28), we can use the term-wise lower bounds ( 1 if i ∈ I(n) 2 4 li (33) ≥ l2i 1 li +̺/n if i 6∈ I(n), 4 (̺/n)2 and then apply an integral approximation from below (which leads to the same rate). Combining the bias and variance pieces, we have shown that θ−ν 1 if ν > 1 . EkX(βb̺ − β)k2 . n ν + n−θ 2 n 2 The bound is optimized when the two terms on the right side have the same rate, which leads to the ν . choice θ = ν+1 In the case where ν ∈ (0, 21 ), the calculation proceeds in the same way up to line (30), where we obtain the bound n∧p  θ  X 2 li 1 . n−1 n ν + n2θ · n1−2ν (34) n li +̺/n i=1 θ−ν (35) = n ν + n2(θ−ν) . This bound is also tight due to the same reasoning as above. Note that in order for the bound to tend to 0 as n → ∞, we must choose θ < ν. Furthermore, since we are working under the assumption ν ∈ (0, 12 ), it follows that the right side of line (35) has rate equal to n2(θ−ν) . Combining the rates for the bias and variance shows that 1 2 2(θ−ν) b + n−θ if ν ∈ (0, 21 ). n EkX(β̺ − β)k2 . n The bound is optimized when the two terms on the right side have the same rate, which leads to the choice θ = 2ν 3 . 2 t(̺/n) Note that if t ∈ R and f (t) := (t+̺/n) 2 , then f is maximized at t = ̺/n. Also, if θ ≤ ν, then there at least one li that scales at the rate of ̺/n. 1 10 D Proof of Lemma 2 The proof is split up into three pieces, corresponding to parts (i), (ii), and (iii) in the statement of the result. D.1 The bias inequality (15) We prove inequality (15) by combining Lemmas 3 and 5 below. Lemma 3. Assume the conditions of Lemma 2. For each i ∈ {1, . . . , n}, there are independent random vectors ui (X), w(X) ∈ Rp such that the random variable Xi⊤ δ(X) can be represented algebraically as bρ (X; Xi ) = Xi⊤ δ(X) = ui (X)⊤ w(X). Here, the vectors ui (X) can be represented in law as L ui (X) = 1 kzk2 Πp (z), (36) where z ∈ Rn is a standard Gaussian vector, and Πp (z) := (z1 , . . . , zp ). Also, the vector w(X) satisfies the bound kw(X)k22 ≤ ρ4 kβk22 almost surely. Proof. To fix notation, we write X ⊤ = Σ1/2 Z ⊤ where Z ⊤ ∈ Rp×n is a standard Gaussian matrix. Recall that δ(X) = Bβ, where B = Ip×p − (X ⊤ X + ρIp×p )−1 X ⊤ X. Let Z = HLG⊤ be a “signed s.v.d.” for Z, as defined in Appendix E.2, where H ∈ Rn×p , L ∈ Rp×p , and G ∈ Rp×p . Now define ui (X) and w(X) according to ⊤ 1/2 Xi⊤ δ(X) = e⊤ Bβ = i XBβ = ei ZΣ e⊤ H LG⊤ Σ1/2 Bβ . {z } |i{z } | =: ui (X)⊤ =: w(X) From Lemma 17 in Appendix E.2, the rows e⊤ i H can be represented in distribution as The same lemma also shows that the three matrices H, L, and G are independent. (37) 1 kzk2 Πp (z). Hence, to show that ui (X) and w(X) are independent, it suffices to show that w(X) is a function only of G and L. In turn, it is enough to show that B is a function only of G and L. But this is simple, because B is a function only of the matrix X ⊤ X, which may be written as X ⊤ X = Σ1/2 Z ⊤ ZΣ1/2 = Σ1/2 GL2 G⊤ Σ1/2 . (38) It remains to show that kw(X)k22 ≤ ρ4 kβk22 almost surely. Combining the definition of w(X) with line (38) gives  (39) kw(X)k22 = β ⊤ BX ⊤ XB β. 2 li 1 ⊤ The eigenvalues of BX ⊤ XB are of the form µi := n (l(ρ/n) 2 where li = λi ( n X X), and it is i +ρ/n) ρ simple to check that the inequality maxi µi ≤ 4 holds for every realization of X. Before proceeding to the second portion of the proof of inequality (15), we record some well-known tail bounds for Gaussian quadratic forms due to Laurent and Massart [18], which will be useful at various points later on. Lemma 4 (Laurent & Massart, 2001). Let A ∈ Rn×n be a fixed symmetric matrix, and let z ∈ Rn be a standard Gaussian vector. Then, for every t > 0, h i √ P z ⊤ Az ≥ tr(A) + 2 |||A|||F t + 2 |||A|||op t ≤ exp(−t) (40) and h √i P z ⊤ Az ≤ tr(A) − 2 |||A|||F t ≤ exp(−t). 11 (41) The next lemma completes the proof of inequality (15). Lemma 5. Assume the conditions of Lemma 2, and let τ > 0 be a constant. Then for every n ≥ 1, the following event holds with probability at least 1 − n−τ − ne−n/16 , max b2ρ (X; Xi ) ≤ 5kβk22 · n−γ · (τ + 1) log(n + 2). 1≤i≤n (42) Proof. Applying the representation for bρ (X; Xi ) given in Lemma 3, there is a standard Gaussian L vector z ∈ Rn , such that ui (X) = Πp (z)/kzk2. Consequently,   L 1 ⊤ b2ρ (X; Xi ) = kzk Πp (z), 2 · Πp (z) w(X)w(X) (43) The same lemma also implies that for all t′ ∈ (0, 14 ), i h 1 1 √ ≤ exp(−nt′ ). P kzk 2 ≥ (1−2 t′ )n (45) 2 where we may take z and w(X) to be independent by the same lemma. Using Lemma 4 on Gaussian quadratic forms, as well as the fact that kw(X)k22 ≤ ρ4 kβk22 almost surely, we have for all t > 0,  " #      √  ρ ⊤ ⊤ 2 P Πp (z) w(X)w(X) Πp (z) ≥ 4 kβk2 1 + 2 t + 2t) w(X) ≤ exp(−t). (44)     2 Now, we combine the bounds by integrating out w(X) in line (44) and choosing t′ = 1/16 in line (45). Taking a union bound, we conclude that for any t > 0, and any fixed i = 1, . . . , n, " # √  ρ 2 2 1 P bρ (X; Xi ) ≤ n · kβk2 · 2 1 + 2 t + 2t ≥ 1 − e−t − e−n/16 . (46) Finally, another union bound shows that the maximum of the bρ (X, Xi⊤ ) satisfies P " max 1≤i≤n b2ρ (X; Xi ) ≤ ρ n · kβk22 · 1 2 (1 # √ + 2 t + 2t) ≥ 1 − e−t+log(n) − ne−n/16 , (47) which implies the √stated result after choosing t = (τ + 1) log(n + 2), and noting that since t ≥ 1, we have 21 (1 + 2 t + 2t) ≤ 5t = 5(τ + 1) log(n + 2), as well as e−t+log(n) ≤ e−τ log(n+2) ≤ n−τ for every n ≥ 1. D.2 The variance inequality (16) The following “representation lemma” will serve as the basis for controlling the variance vρ (X; Xi ) = σ 2 kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 . Lemma 6. Assume the conditions of Lemma 2. For each i ∈ {1, . . . , n}, there is a random vector vi (X) ∈ Rp and a random matrix M (X) ∈ Rp×p that are independent and satisfy the algebraic relation kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 = vi (X)⊤ M (X)vi (X). Here, the vector vi (X) can be represented in law as L vi (X) = 1 kzk2 Πp (z), (48) where z ∈ Rn is a standard Gaussian vector and Πp (z) = (z1 , . . . , zp ). Also, the matrix M (X) satisfies the algebraic relation tr(M (X)) = kX(X ⊤X + ρIp×p )−1 X ⊤ k2F . An explicit formula for M (X) is given below. 12 (49) Proof. Define the matrix A := (X ⊤ X + ρIp×p )−1 X ⊤ X(X ⊤X + ρIp×p )−1 . Then, ⊤ kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 = e⊤ i XAX ei . (50) Using the notation in the proof of the previous lemma, let X = ZΣ1/2 where Z ∈ Rn×p is a standard Gaussian random matrix. Furthermore, let Z = HLG⊤ be a signed s.v.d. for Z, as defined in Appendix E.2. Then, we define vi (X) and M (X) according to ⊤ ⊤ e⊤ LG⊤ Σ1/2{z AΣ1/2 GL⊤} H ⊤ ei . i XAX ei = ei H | | {z } (51) =:M(X) =:vi (X)⊤ Some algebra shows that M (X) satisfies the relation (49). As in the proof of Lemma 3, the argument is completed using two properties of the signed s.v.d. of a standard Gaussian matrix: The rows of H can be represented as Πp (z)/kzk2 where z ∈ Rn is a standard Gaussian vector, and the matrices H, L, and G⊤ are independent. (See Lemma 17 in Appendix E.2.) To show that vi (X) and M (X) are independent, first note that vi (X) only depends on H. Also, it is simple to check that M (X) only depends on G and L, because A is a function only of X ⊤ X = Σ1/2 GL2 G⊤ Σ1/2 . D.2.1 Concentration of the variance and bounds on its expected value Due to Lemma 6, for each i = 1, . . . , n, we have the representation L vρ (X; Xi ) = 1 Π (z)⊤ M (X)Πp (z), kzk22 p (52) where z ∈ Rn is a standard Gaussian vector, independent of M (X). Conditionally on M (X), the quadratic form Πp (z)⊤ M (X)Πp (z) concentrates around tr(M (X)) by Lemma 4. The same 2 lemma p also implies that kzk2 concentrates around n. In the next three subsections, we will show that tr(M (X)) concentrates around its expected value, and obtain upper and lower bounds on the expected value. We will need two-sided bounds in preparation for Theorem 4. D.2.2 Concentration of p tr(M (X)) Lemma 7. Assume the conditions of Lemma 2. Then for every t > 0, and every n ≥ 1, # " p p 64 n1−γ t2 tr(M (X)) − E tr(M (X)) ≥ t ≤ 2 exp(− 54 P kΣkop ). (53) p Proof. We will show that tr(M (X)) is a Lipschitz function of a standard Gaussian matrix. Define s2 , which satisfies the Lipschitz condition the function gρ : R+ → [0, 1] by gρ (s) = s2 +(ρ/n) |gρ (s) − gρ (s′ )| ≤ Ln |s − s′ |, for all s, s′ ≥ 0, where Ln := √ 3 3 8 √1 . ρ/n If σ(A) = (σ1 (A), . . . , σk (A)) denotes the vector of singular values of a rank k matrix A, then we define gρ to act on σ(A) component-wise, i.e. gρ (σ(A)) = (gρ (σ1 (A)), . . . , gρ (σk (A))). Recall from Lemma 6 that p (54) tr(M (X)) = kX(X ⊤X + ρIp×p )−1 X ⊤ kF and note that the ith singular value of the matrix X(X ⊤ X +ρIp×p )−1 X ⊤ is given by gρ (σi ( √1n X)). Viewing the Frobenius norm of a matrix as the ℓ2 norm of its singular values, we have p tr(M (X)) = kgρ (σ( √1n X))k2 . (55) Write X ⊤ = Σ1/2 Z ⊤ for a standard Gaussian matrix Z ∈ Rn×p , and let f : Rn×p → R be defined according to p f (Z) := tr(M (X)). 13 We claim that f is Lipschitz with respect to the Frobenius norm. Let W ⊤ ∈ Rp×n be a generic matrix, and put A = √1n Σ1/2 Z ⊤ and B = √1n Σ1/2 W ⊤ . Then, |f (Z) − f (W )| = kgρ (σ(A))k2 − kgρ (σ(B))k2 ≤ gρ (σ(A)) − gρ (σ(B)) (56) (57) 2 ≤ Ln kσ(A) − σ(B)k2 (58) ≤ Ln kA − BkF (59) √1 Σ1/2 n = Ln ≤ Ln √ n (Weilandt-Hoffman)  Z⊤ − W ⊤ F p kΣkop · Z ⊤ − W ⊤ F , (60) (61) where we have used a version of the Weilandt-Hoffman inequality for singular values [19, p.186], as well as the inequality kM1 M2 kF ≤ kM1 kop kM2 kF , which holds for any square matrix M1 that is compatible with M2 . (See Lemma 12 in Appendix E.) The statement of the lemma now follows from the Gaussian concentration inequality. (See Lemma 15 in Appendix E). p D.2.3 Upper bound on E tr(M (X)) Lemma 8. Assume the conditions of Lemma 2. Then, the matrix M (X) satisfies ( 1 p n(γ−η)+ 2 if η ∈ (0, 21 ) γ E tr(M (X)) . if η > 21 . n 2η (62) p Proof. By Jensen’s inequality, it is enough to bound E[tr(M (X))] from above. Define the unis variate function ψ : R+ → R+ by ψ(s) := (√s+ρ/n) 2 , and observe that  2  tr(M (X)) = tr (X ⊤ X + ρIp×p )−1 X ⊤ X = p X b λ2i (Σ) 2 b (λi (Σ)+ρ/n) i=1 b 2 )) ψ(λi (Σ i=1 = p X (63)  b 2) . = tr ψ(Σ Here where we use the “operator calculus” notation ψ(A) = U ψ(D)U ⊤ where A is a symmetric matrix with spectral decomposition A = U DU ⊤ , and ψ(D) is the diagonal matrix whose ith diagb 2 )) is a concave matrix onal entry is ψ(Dii ). It is simple to check that ψ is a concave, and so tr(ψ(Σ 2 b functional of Σ by Lemma 13 in Section E.1 of Appendix A. Therefore, Jensen’s inequality implies b 2 ])) E[tr(M (X))] ≤ tr(ψ(E[Σ (64) P = pi=1 ψ(λi (S)), b 2 ]. Since X is Gaussian, Σ b is a Wishart matrix up to scaling, where we define the matrix S := E[Σ and so Lemma 16 in Appendix E shows that this expectation may be evaluated exactly as S = (1 + n1 )Σ2 + tr(Σ) n Σ. (65) We will now use this relation to apply an integral approximation to the right side of line (64). Clearly, the eigenvalues of S are given by λi (S) = (1 + n1 )λ2i (Σ) + ≍ i−2η + tr(Σ) −η . n i 14 tr(Σ) n λi (Σ) (66) Let r ∈ (0, 1) be a constant to be specified later. On the set of indices 1 ≤ i ≤ ⌈nr ⌉ we use the bound 1 ψ(λi (S)) ≤ 1, and on the set of indices i > ⌈nr ⌉ we use the bound ψ(λi (S)) ≤ (ρ/n) 2 λi (S). −γ 2 Recalling the assumption ρ/n = n , we may decompose the inequality (64) as E[tr(M (X))] ≤ ⌈nr ⌉ X ψ(λi (S)) + i=1 . nr + n2γ Z p X ψ(λi (S)) (67) i=⌈nr ⌉+1 p x−2η + nr =: nr + n2γ hn (η, r). tr(Σ) −η  dx n x (68) (69) where the function hn is defined in the last line. The bound is optimized when the two terms on the right are of the same order; i.e. when r solves the rate equation nr ≍ n2γ hn (η, r). Noting that tr(Σ) n ≍  −η n n−1 (70) if η ∈ (0, 1) if η > 1, the quantity hn (η, r) may be computed directly as  1−2η n hn (η, r) ≍ nr(1−2η)  r(1−2η) n + nr(1−η)−1 if η ∈ (0, 12 ), if η ∈ ( 12 , 1), if η > 1. (71) (72) If we let r = r∗ (η, γ) denote the solution of the rate equation (70), then some calculation shows that under the assumption γ ∈ (0, 1), ( 2(γ − η) + 1 if η ∈ (0, 12 ), (73) r∗ (η, γ) = γ if η > 21 . η When η ∈ (0, 1) this is straightforward. To show the details for η > 1, note that the rate equation (70) may be written as nr ≍ n2γ+r(1−2η) + n2γ+r(1−η)−1 , (74) which is the same as 1 ≍ n2(γ−ηr) + n2γ−ηr−1 . In order for both terms on the right to be O(1), the number r must satisfy the constraints r ≥ γη , r≥ γ η + (75) (76) γ−1 η . (77) Since Lemma 2 assumes γ ∈ (0, 1), only the first constraint matters. Furthermore, when r ≥ γη , the second term in line (75) is o(1), and we are reduced to choosing r so that 1 ≍ n2(γ−ηr) , which gives r = r∗ (η, γ) = γη . Substituting this value into line (69) completes the proof. (Note from the discussion preceding line (69) that r must lie in the interval (0, 1), and this requires γ/η < 1, which explains the assumption γ < min{η, 1} in Lemma 2.) p D.2.4 Lower bound on E tr(M (X)) Lemma 9. Assume the conditions of Lemma 2. Then, the matrix M (X) satisfies p γ E tr(M (X)) & n 2η . (78) 2 Note that if p/n ≍ 1, it is possible that nr > p for small values of n. Since we want nr ≤ p for the integral in line (68), Lemma 2 is stated for “all large n”. 15 p Proof. The variable tr(M (X)) may be written as kX ⊤X(X ⊤ X +ρIp×p )−1 kF . Since the Frobenius norm is a convex matrix functional, Jensen’s inequality implies i h p E tr(M (X)) ≥ E X ⊤ X(X ⊤ X + ρIp×p )−1 F (79) i h  b −1 −1 , = E Ip×p + nρ Σ F b := where the last step follows algebraically with Σ If we define the univariate function f : R+ → R+ by f (s) = (1 + nρ s)−1 , then last inequality is the same as p   b −1 . (80) E tr(M (X)) ≥ E f Σ F 1 ⊤ n X X. It is a basic fact that f is operator convex on the domain of positive semidefinite matrices [20, p.117]. This yields an operator version of Jensen’s inequality with respect to the Loewner ordering (Lemma 14 in Appendix E):   −1   b b −1  f E Σ . (81) E f Σ Furthermore, if two matrices satisfy A  B  0, then kAkF ≥ kBkF [21, Corollary 7.7.4]. Using this fact, as well as the formula for the expected inverse of a Wishart matrix [22, p. 97], we obtain p  −1  b E tr(M (X)) ≥ f E Σ F = f = n −1 n−p−1 Σ p X i=1 = p X i=1 1+ ρ n ·  F 1  n −1 ) 2 n−p−1 λi (Σ λ2i (Σ) λi (Σ) + ρ n · 2 n n−p−1 !1/2 !1/2 (82) .  n . For any i ∈ J, the ith summand in Define the index set J = i ∈ {1, . . . , p} : λi (Σ) ≥ nρ n−p−1 the previous line is at least 1/4. Also, assumption A6 that p/n is bounded strictly between 0 and 1, as well as the decay condition on the λi (Σ), imply that |J| ≍ nγ/η , which completes the proof. D.2.5 Putting the variance pieces together Combining Lemmas 7, 8, and 9 with the Gaussian concentration inequality (Lemma 15 in Section E.2 of Appendix A) p immediately gives the following result. (We choose t to be proportional to the relevant bound on E[ tr(M (X))] in the Gaussian concentration inequality.) Lemma 10. Assume the conditions of Lemma 2 and let tr(M (X)) be as in line (49). Then, there are absolute constants κ1 , κ2 , . . . , κ6 > 0 such that the following upper-tail bounds hold for all large n, i h (83) P tr(M (X)) ≥ κ1 n2(γ−η)+1 ≤ exp(−κ2 n2(1−η)+γ ), if η ∈ (0, 21 ), and i h γ(1−η) P tr(M (X)) ≥ κ3 nγ/η ≤ exp(−κ4 n1+ η ), and the following lower-tail bound holds for all large n, i h γ(1−η) P tr(M (X)) ≤ κ5 nγ/η ≤ exp(−κ6 n1+ η ), if η > 12 , (84) if η > 0. (85) Remarks. Note that in order for the last two probabilities to be small for large values of η > 0, it is necessary that γ < 1, as assumed in Lemma 2. The next result completes the assembly of the results in this Subsection D.2. Although the first two bounds in Lemma 11 are not necessary for the statement of Theorem 4, they show that the variance vρ (X; Xi ) tends 0 as n → ∞ when γ < η, as assumed in Theorem 4. In other words, we imposed the assumption γ < η so that confidence intervals based on Φρ (Fb̺ ; Xi ) have width that tends to 0 asymptotically. 16 Lemma 11. Assume the conditions of Theorem 4 and let tr(M (X)) be as in line (49). Assume γ < min{η, 1}. Then, there are absolute constants k1 , k2 , . . . , k6 > 0 such that the following upper-tail bounds hold for all large n, i h γ P max vρ (X; Xi ) ≤ k1 n2(γ−η) ≥ 1 − 4n exp(−k2 n η ), if η ∈ (0, 21 ) (86) 1≤i≤n and i h γ γ P max vρ (X; Xi ) ≤ k3 n η −1 ≥ 1 − 4n exp(−k4 n η ), 1≤i≤n and h P max 1 1≤i≤n vρ (X;Xi ) i γ γ ≤ k5 n1− η ≥ 1 − 4n exp(−k6 n η ), if η > 12 , (87) if η > 0. (88) Proof. We only prove the last inequality (88), since the other two inequalities are proven in a similar way. By Lemma 6, we have L vρ (X; Xi ) = 1 Π (z)⊤ M (X)Πp (z) kzk22 p (89) where z ∼ N (0, Ip×p ) and z ⊥ ⊥ M (X). To apply the lower-tail bound for Gaussian quadratic p forms, note that Hölder’s inequality implies kM (X)kF ≤ tr(M (X)) since kM (X)kop ≤ 1 almost surely. Therefore, letting t = t′ tr(M (X)) with t′ ∈ (0, 1) in inequality (41) gives  i h √    ′ (90) P Πp (z)⊤ M (X)Πp (z) ≥ (1 − 2 t′ ) tr(M (X))  M (X) ≥ 1 − exp − t tr(M (X)) Next, observe that inequality (41) with t = t′ · n for t′ ∈ (0, 1) gives, h i √ P kzk22 ≤ (1 + 4 t′ )n ≥ 1 − exp(−t′ n). If we define the event (91) ) (92) then the previous two inequalities imply     P E1  M (X) ≥ 1 − exp(−t′ tr(M (X))) − exp(−t′ · n) (93) E1 := ( 1 kzk22 1 ≤ Πp (z)⊤ M (X)Πp (z) √ n 1+4√t′ (1−2 t′ ) tr(M(X)) ≥ 1 − 2 exp(−t′ tr(M (X))), since tr(M (X)) ≤ n almost surely. Next, let κ5 , κ6 > 0 be as in the previous lemma, and define the event o n γ n (94) E2 := tr(M(X)) ≤ κ15 n1− η , which has probability P(E2 ) ≥ 1 − exp(−κ6 n1+ γ(1−η) η ). We now put these items together. Starting with line (89), if we work on the intersection of E1 and E2 , then for any fixed i = 1, . . . , n we have P h 1 vρ (X;Xi ) ≤ √ 1− γ 1+4√t′ 1 n η (1−2 t′ ) κ5 i h i ≥ E 1E1 · 1E2 h i ≥ 1 − E 1E1c + 1E2c      c = 1 − E E 1E1c  M (X) − P(E2 ) h i ≥ 1 − 2E exp(−t′ tr(M (X)) − P(E2c) h ′ i = 1 − 2E exp(−t tr(M (X))) · (1E2 + 1 ) − E2c γ ≥ 1 − exp(−t′ κ5 n η ) − 3P(E2c ) γ 1+ ≥ 1 − exp(−t′ κ5 n η ) − 3 exp(−κ6 n γ ≥ 1 − 4 exp(− min{t′ κ5 , κ6 } · n η ) 17 γ(1−η) η ) (95) P(E2c ) where we have used the previous lemma to bound P(E2c ), and also the assumption γ ∈ (0, 1) to conclude that γη ≤ 1 + γ(1−η) . Taking a union bound over i = 1, . . . , n, proves the claim. η The last component of Lemma 2 is to prove the MSPE inequalities. D.3 Proof of the MSPE inequalities The proof of Theorem (3) shows that for any realization of X we have h i   mspe(βb̺ |X) := n1 E kX(βb̺ − β)k22  X . n−θ kβk22 + 1 n p∧n X i=1 2 li li +̺ , (96) where li = λi ( n1 X ⊤ X). Now observe that the second term on the right side matches the expression for tr(M (X)) given in line (63) by replacing ρ with ̺ and multiplying by a factor of n1 . Therefore, using Lemma 10 and recalling ̺/n = n−θ shows that there are absolute constants κ1 , κ2 , κ3 , κ4 > 0 such that for all large n, and h i P mspe(βb̺ |X) ≥ κ1 n−θ + n2(θ−η) ≤ exp(−κ2 n2(1−η)+θ ), if η ∈ (0, 12 ). h θ(1−η) i θ P mspe(βb̺ |X) ≥ κ3 n−θ + n η −1 ≤ exp(−κ4 n1+ η ), if η > 21 . (97) (98) In line (97), the bound mspe(βb̺ |X) is optimized when n−θ ≍ n2(θ−η) , which explains the choice θ in line (98), the bound is optimized when n−θ ≍ n η −1 , which explains the θ = 2η 3 . Similarly, η choice θ = η+1 . Substituting in these values θ yields the stated result. E Background results E.1 Results on matrices and convexity Lemma 12. Let M1 ∈ Rk1 ×k1 and M2 ∈ Rk1 ×k2 . Then, kM1 M2 kF ≤ kM1 kop kM2 kF . (99) Proof. Observe that kM1 M2 k2F = tr(M2⊤ M1⊤ M1 M2 ) = tr((M1⊤ M1 )(M2 M2⊤ )) ≤ k1 X i=1 λi (M1⊤ M1 ) · λi (M2 M2⊤ ) ≤ kM1 k2op k1 X (100) λi (M2 M2⊤ ) i=1 2 kM1 kop kM2 k2F , = where we have used von Neumann’s trace inequality (also known as Fan’s inequality) [23, p.10] in the third line. A result on convex trace functionals. In the following lemma, an interval of the real line refers to any set of the form (a, b),(a, b],[a, b), or [a, b], where −∞ ≤ a ≤ b ≤ ∞. We also define spec(M ) p×p to be the set of eigenvalues of a square matrix M . The collection of symmetric is Pmatrices in R p×p denoted by S . For a univariate function ϕ, the symbol tr(ϕ(M )) denotes i ϕ(λi (M )). Lemma 13. Let I ⊂ R be an interval, and let M ⊂ Sp×p be a convex set such that spec(M ) ⊂ I for all M ∈ M. Let ϕ : I → R be a convex function. Then, the functional M 7→ tr(ϕ(M )) (101) is convex on M. A proof may be found in the paper [24, Proposition 2]. 18 Operator Jensen inequality. A function f : Sp×p → Sp×p is said to be operator convex if for all λ ∈ [0, 1], and all A, B ∈ Sp×p , f (λA + (1 − λ)B)  λf (A) + (1 − λ)f (B), (102) where A  B means that B − A is positive semidefinite. Lemma 14 (Operator Jensen inequality). Suppose f : Sp×p → Sp×p is operator convex, and let A be a random Sp×p -valued matrix that is integrable. Then, f (E[A])  E[f (A)]. (103) Proof. It is enough to show that for all x ∈ Rp , x⊤ f (E[A])x ≤ x⊤ E[f (A)]x. (104) For any fixed x, consider the function g : Sp×p → R defined by g(A) = x⊤ f (A)x. It is clear that g is a convex function in the usual sense, and so the ordinary version of Jensen’s inequality implies g(E[A]) ≤ E[g(A)], which is the same as (104). E.2 Results on Gaussian vectors and matrices The following lemma is standard and is often referred to as the Gaussian concentration inequality [25]. Lemma 15. Let Z ∈ Rp be a standard Gaussian vector and let f : Rp → R be an L-Lipschitz function with respect to the ℓ2 norm. Then for all t > 0,    −t2 (105) P |f (Z) − E[f (Z)]| ≥ t ≤ 2 exp 2L 2 . Next, we give a formula for the expected square of a Wishart matrix. b= Lemma 16. Let X ∈ Rn×p have rows drawn i.i.d. from N (0, Σ), and let Σ b = Proof. Write Σ then 1 n Pn i=1 b 2 ] = (1 + 1 )Σ2 + E[Σ n 1 ⊤ n X X. Then, tr(Σ) n Σ. Xi Xi⊤ where Xi⊤ ∈ Rp is the ith row of X. If we put Mi = Xi Xi⊤ , b 2 = 12 Pn M 2 + 12 P Mi Mj . Σ i i6=j i=1 n n Clearly, the Mi are independent with E[Mi ] = Σ for all i, and so  b 2 ] = 1 E[M 2 ] + 22 n Σ2 . E[Σ 1 n n 2 It remains to compute E[M12 ]. Write Xi = Σ1/2 Zi where Zi is a standard Gaussian vector in Rp , and let Σ1/2 = U Λ1/2 U ⊤ be a spectral decomposition of Σ1/2 where U ∈ Rp×p is orthogonal, and Λ is diagonal with Λii = λi (Σ). By the orthogonal invariance of the normal distribution, L Xi = U Λ1/2 Zi , and so h i E[M12 ] = E[X1 X1⊤ X1 X1⊤ ] = U Λ1/2 E Z1 Z1⊤ ΛZ1 Z1⊤ Λ1/2 U ⊤ . (106) Define the matrix M̃1 := Z1 Z1⊤ ΛZ1 Z1⊤ . It is straightforward to verify that E[M̃1 ] is diagonal, and its jth diagonal entry is E[M̃1 ]jj = tr(Σ) + 2λj . Therefore, E[M̃1 ] = tr(Σ)Ip×p + 2Λ, and combining this with line (106) gives E[M12 ] = tr(Σ)Σ + 2Σ2 . 19 Signed s.v.d. The following lemma describes the factors of an s.v.d. of a standard Gaussian matrix Z ∈ Rn×p with n ≥ p. To make the statement of the lemma more concise, we define the term signed s.v.d. below. This is merely a particular form of the s.v.d. that ensures uniqueness. Specifically, if Z ∈ Rn×p is a full rank matrix with n ≥ p, then the signed s.v.d. of Z is given by Z = HLG⊤ , (107) where H ∈ Rn×p has orthonormal columns, the matrix L ∈ Rp×p is diagonal with L11 ≥ L22 ≥ · · · ≥ Lpp > 0, and G ∈ Rp×p is orthogonal with its first row non-negative, i.e. G1i ≥ 0 for all i = 1, . . . , p. It is a basic fact from linear algebra that the signed s.v.d. of any full rank matrix in Rn×p exists and is unique [21, Lemma 7.3.1]. This fact applies to Gaussian matrices, since they are full rank with probability 1. Lemma 17. Suppose n ≥ p, and let Z ∈ Rn×p be a random matrix with entries drawn i.i.d. from N (0, 1). Let Z = HLG⊤ , (108) be the unique signed s.v.d. of Z as defined above. Then, the matrices H, L and G are independent. Furthermore, if Hi⊤ ∈ Rp denotes the ith row of H, then for each i = 1, . . . , n, the marginal law of Hi⊤ is given by L Hi⊤ = 1 kzk2 · Πp (z), (109) where z ∈ Rn is a standard Gaussian vector, and Πp (z) is the projection operator onto the first p coordinates, i.e. Πp (z) = (z1 , . . . , zp ). Proof. We first argue that H, L, and G are independent, and then derive the representation for Hi⊤ in the latter portion of the proof. Due to the fact that the transformation Z 7→ (H, L, G) is invertible, it is possible to obtain the joint density of (H, L, G) from the density of Z by computing the matrix Jacobian of the factorization Z = HLG. (See the references [22], [26], and [27] for more background on Jacobians of matrix factorizations.) To speak in more detail about the joint density, let Vn×p denote the Stiefel manifold of n×p matrices with orthonormal columns. Also, let Dp×p denote the set of p×p diagonal matrices, and Op×p the set of orthogonal p × p matrices. The subset of Op×p with non-negative entries in the n×p . first row will be denoted by O+ Let fH,L,G : Vn×p × Dp×p × Op×p → [0, ∞) denote the joint density of (H, L, G), where the base + measure is the product of Haar measure on Vn×p , Lebesgue measure on Dp×p , and Haar measure on Op×p restricted to Op×p + . (See the book [28] for background on these measures). From lines 8.8-8.10 in the paper [29], it is known that such a density exists, and that fH,L,G factors according to fH,L,G(h, l, g) = fH (h) · fL (l) · fG (g), (110) where the function fH denotes the density of H with respect to Haar measure on Vn×p , the function fL denotes the density of L with respect to Lebesgue measure on Dp×p , and the function fG denotes the density of G with respect to the restriction of Haar measure to Op×p + . This proves that H, L, and G are independent. We now prove the representation (109). From line 8.10 in the paper [29], it is known that fH is constant on Vn×p . In other words, the matrix H follows the Haar distribution on Vn×p . Consequently, Theorem 2.2.1(ii) in the book [28] implies that the rows Hi⊤ can be represented as L Hi⊤ = Πp (Ji⊤ ) (111) where Ji⊤ ∈ Rn is the ith row of a Haar-distributed random matrix in On×n . Furthermore, the rows Ji⊤ are uniformly distributed on the unit sphere on Rn , and hence can be represented as z/kzk2, where z ∈ Rn is a standard Gaussian vector. 20 References [1] C.-H. Zhang and S. S. Zhang. Confidence intervals for low dimensional parameters in high dimensional linear models. Journal of the Royal Statistical Society: Series B, 76(1):217–242, 2014. [2] A. Javanmard and A. Montanari. Hypothesis testing in high-dimensional regression under the Gaussian random design model: Asymptotic theory. arXiv preprint arXiv:1301.4240, 2013. [3] A. Javanmard and A. Montanari. Confidence intervals and hypothesis testing for highdimensional regression. arXiv preprint arXiv:1306.3171, 2013. [4] P. Bühlmann. Statistical significance in high-dimensional linear models. 19(4):1212–1242, 2013. Bernoulli, [5] S. van de Geer, P. Bühlmann, and Y. Ritov. On asymptotically optimal confidence regions and tests for high-dimensional models. arXiv preprint arXiv:1303.0518, 2013. [6] J. D. Lee, D. L. Sun, Y. Sun, and J. E. Taylor. Exact inference after model selection via the lasso. arXiv preprint arXiv:1311.6238, 2013. [7] A. Chatterjee and S. N. Lahiri. Rates of convergence of the adaptive lasso estimators to the oracle distribution and higher order refinements by the bootstrap. The Annals of Statistics, 41(3):1232–1259, 2013. [8] H. Liu and B. Yu. Asymptotic properties of lasso+mls and lasso+ridge in sparse highdimensional linear regression. Electronic Journal of Statistics, 7:3124–3169, 2013. [9] V. Chernozhukov, D. Chetverikov, and K. Kato. Gaussian approximations and multiplier bootstrap for maxima of sums of high-dimensional random vectors. The Annals of Statistics, 41(6):2786–2819, 2013. [10] E. L. Lehmann and J. P. Romano. Testing Statistical Hypotheses. Springer, 2005. [11] D. A. Freedman. Bootstrapping regression models. The Annals of Statistics, 9(6):1218–1228, 1981. [12] P. J. Bickel and D. A. Freedman. Bootstrapping regression models with many parameters. In Festschrift for Erich L. Lehmann, pages 28–48. Wadsworth, 1983. [13] N. R. Draper and H. Smith. Applied Regression Analysis. Wiley-Interscience, 1998. [14] P. J. Bickel and D. A. Freedman. Some asymptotic theory for the bootstrap. The Annals of Statistics, pages 1196–1217, 1981. [15] S. Bobkov and M. Ledoux. One-dimensional empirical measures, order statistics, and Kantorovich transport distances. preprint, 2014. [16] A. B. Tsybakov. Introduction to Nonparametric Estimation. Springer, 2009. [17] L. Wasserman. All of Nonparametric Statistics. Springer, 2006. [18] B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection. Annals of Statistics, 28(5):1302–1338, 2000. [19] R. A. Horn and C. R. Johnson. Topics in matrix analysis. Cambridge University Press, 1991. [20] R. Bhatia. Matrix Analysis. Springer, 1997. [21] R. A. Horn and C. A. Johnson. Matrix Analysis. Cambridge University Press, 22nd printing edition, 2009. [22] R. J. Muirhead. Aspects of Multivariate Statistical Theory. John Wiley & Sons, 1982. [23] J. M. Borwein and A. S. Lewis. Convex Analysis and Nonlinear Optimization Theory and Examples. CMS Bookks in Mathematics. Canadian Mathematical Society, 2000. 21 [24] D. Petz. A survey of certain trace inequalities. Functional analysis and operator theory, 30:287–298, 1994. [25] S. Boucheron, G. Lugosi, and P. Massart. Concentration Inequalities: A Nonasymptotic Theory of Independence. Oxford University Press, 2013. [26] A. M. Mathai. Jacobians of Matrix Transformations and Functions of Matrix Argument. World Scientific, 1997. [27] A. Edelman and N. R. Rao. Random matrix theory. Acta Numerica, 14:233–297, 2005. [28] Y. Chikuse. Statistics on Special Manifolds, volume 174. Springer Science & Business Media, 2003. [29] A. T. James. Normal multivariate analysis and the orthogonal group. The Annals of Mathematical Statistics, pages 40–75, 1954. 22
10
MARKOFF SURFACES AND STRONG APPROXIMATION: 1 arXiv:1607.01530v1 [math.NT] 6 Jul 2016 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK 1. Introduction This is the first of three papers giving detailed proofs of the results announced in [BGS16]. The main result here is strong approximation for Markoff triples for prime moduli. In paper two this is extended to more general moduli and applied to seiving in Markoff numbers. In the third paper, we formulate a strong approximation conjecture for more general affine Markoff surfaces and develop the techniques to obtain similar results in these cases. We review briefly the notation and setup from [BGS16] where background and references can be found. The Markoff surface X is the affine surface in A3 given by (1) X : x21 + x22 + x23 − 3x1 x2 x3 = 0. The Markoff triples M are the positive integer solutions to (1). Let Γ be a group of affine integral morphisms of A3 generated by the permutations of the coordiantes and the Vieta involutions R1 , R2 , , R3 , where R3 (x1 , x2 , x3 ) = (x1 , x2 , 3x1 x2 − x3 ) and R2 , R3 are defined similarly. The orbit of (1, 1, 1) under Γ yields all of M [Mar79], [Mar80]. If ∆ is the group of integral morphisms generated by Γ and the involutions which replace two of the coordinates of x by their negatives, then X(Z) consists of two ∆ orbits, namely of (0, 0, 0) and (1, 1, 1). For p a prime number the action of Γ and ∆ on X descends to a permutation action on the finite set X(Z/pZ) of solutions to (1) in Z/pZ. Our interest is in the orbits of this action which we often refer to as the components. Conjecture 1 (Strong Approximation Conjecture). For any prime p, X(Z/pZ) consists of two Γ orbits, namely {(0, 0, 0)} and X ∗ (Z/pZ) = X(Z/pZ)\{(0, 0, 0)} Clearly the above conjecture implies strong approximation for M and X(Z) in the form that their reductions mod p M → X ∗ (p) 1 2 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK and X(Z) → X(Z/pZ) are onto. In particular, one of the consequences is that the only prime congruence obstruction for a Markoff number m (that is a number which is a coordinate of an x ∈ M) is the one noted in [Fro13]: m 6= 23 , 0 mod p if p = 3 mod 4, p 6= 3. Our first result asserts that there is a very large orbit. Theorem 1. Fix ε > 0. Then for p large there is a Γ orbit C(p) in X ∗ (p) for which |X ∗ (p)\C(p)| ≤ pε (note that |X ∗ (p)| ∼ p2 ), and any Γ orbit D(p) satisfies 1 |D(p)| ≫ (log p) 3 . The proof of Theorem (1) establishes the strong approximation conjecture unless p − 1 is a very smooth number. In particular, the set of primes for which the strong approximation conjecture fails is very small. 2 Theorem 2. Let E be the set of primes for which the strong approximation conjecture fails. For ε > 0, the number of primes p ≤ T with p ∈ E is at most T ε , for T large. We end the introduction by outlining the rest of the paper. In Section 2 we define the fundamental rotations in Γ that are associated to an x ∈ X ∗ (p) and one of its coordinates. These act on the conic sections gotten by intersecting X ∗ (p) with the plane corresponding to the particular coordinate. Some basic properties of the incidence graph of the intersections of the conic sections are established. In Section 3, which we call the endgame, we define the cage C(p) which is shown to be a large component of X ∗ (p). Specifically any x ∈ X ∗ (p) for which the rotation associated to one of its coordinates (see Section 2 for definitions) has order at least 1 p 2 +δ0 (δ0 > 0) is shown to be in C(p). In Section 4 , the middle game, the last statement is extended to x’s for which the corresponding rotation has order pε0 (ε0 > 0 any fixed small number). The methods used in Sections 3 and 4 rely on nontrivial upper bounds for the number of points lying on curves over finite fields. In Section 3 Weil’s Riemann Hypothesis [Wei41] is a key tool, but this is not strong enough when the order is less 1 than p 2 +δ0 . In its stead we use Stepanov’s auxiliary polynomial method [Ste69] in the Appendix, or the recent gcd(u − 1, v − 1) bounds of Corvaja-Zannier [CS13], or the MARKOFF SURFACES AND STRONG APPROXIMATION: 1 3 combinatorial method based on the projective Szemeredi-Trotter Theorem [Bou12] developed in section 4. Section 5, the opening, deals with x’s for which the orders of the associated rotations are very small (for example, being uniformly bounded). This is done by lifting the equations to characteristic zero which leads to an equation in (Q̄)3 in roots of unity. In general (that is, in the setting of Paper III) we invoke Lang’s Gm conjecture at this point (proven in [Lau83] for example), however for the special case at hand one can show directly that X∗ (Q̄) has no finite Γ orbits (the last is a necessary condition for strong approximation, in the form of Conjecture 1, to hold). This Q̄ analysis leads to to part 2 of Theorem 1. In Section 6 we assemble the various stages of our argument, explicated in Sections 3, 4, 5 and give a proof of Theorem 1 in a form from which strong approximation follows if p2 − 1 is not very smooth: see (70). To prove Theorem 2 we combine the above with a variant of the results in [CKSZ14] concerning the multiplicative orders of coordinates of points of curves on A2 over Fp . 2. Preliminaries 2.1. Analysis of the conic sections. Theorem 1 in the weaker form that |C(p)| ∼ |X ∗ (p)| as p → ∞, can be viewed as the finite field analogue of [Gol03], where it is shown that the action of Γ on the compact real components of the character variety of the mapping class group of the once punctured torus is ergodic. As in [Gol03], our proof makes use of the rotations τij ◦ Ri , i 6= j where τij permutes xi and xj . For example, τ2,3 ◦ R2 (x1 , x2 , x3 ) = (x1 , x3 , 3x1 x3 − x2 ), so the action on (x2 , x3 ) for fixed x1 is given by the rotation rot(3x1 ) ! ! ! ! x2 x3 0 1 x2 (2) rot(3x1 ) = = . x3 3x1 x3 − x2 −1 3x1 x3 This rotation preserves the conic section obtained by intersecting X ∗ (p) with the plane defined by the first coordinate being equal to the value of x1 ; in general, we define the conic section Cj (a) as follows: (3) Cj (a) = {xj = a} ∩ X ∗ (p). We give an explicit description of this action, depending  2on whether x = 3x1 is parabolic (x2 − 4 = 0, that is x = ±2), hyperbolic ( x p−4 = 1) or elliptic  2   ( x p−4 = −1) with ·· being the Legendre symbol. 4 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK   = −1, that is if p ≡ −1 mod 4, then C1 (x) is Lemma 3. Let x = ±2. If −1 p   empty. If −1 = 1, that is if p ≡ 1 mod 4, then p (4) C1 (2) = (2, t, t ± 2i), where i2 ≡ −1 mod p; (5) C1 (−2) = (−2, t, −t ± 2i), which are pairs of disjoint lines. The action of ρ1 = rot(x) is (6) ρ1 (2, t, t ± 2i) = (2, t ± 2i, t ± 4i), (7) ρ1 (−2, t, −t ± 2i) = (−2, −t ± 2i, −t ∓ 4i), so rot(2) preserves each line and rot(−2)interchanges them. Now when x 6= ±2 we write x = χ + χ−1 ,  2   2  where χ ∈ Fp if x p−4 = 1 and χ ∈ Fp2 if x p−4 = −1. Note that ! ! ! ! ! !−1 1 −1 1 −1 1 1 χ 0 χ 0 1 1 1 1 χ −χ = rot(x) == χ χ χ1 0 χ1 0 χ1 χ χ1 χ χ1 −χ 1 and consequently ! 1 1 χℓ rot(x)ℓ = χ χ1 0 and hrot(x)i = 0 1 χℓ 1 χ ! 1 1 χ χ1 −1 −χ !−1 ( = χ1 χ − χ1 − Consequently C1 (x) contains all elements  1 1 χ χ1 χ χ1 1 χ1 ! χℓ 0 1 − χ1 χ1 1 − χχ1 χ1 0 1 χℓ ! ! ! −1 −1  1 −χ χ −χ 1 1 χ ) ; χ1 ∈ hχi .      1 −1  x2  1 1 −1  x3  1  χ− x3 − χ1 + (χx2 − x3 ) , χ− (χx3 − x2 )χ1 + x2 − χ χ χ1 χ χ χ1 with χ1 ∈ hχi. Note that where o n b Projx2 (Cx ) ⊃ aχ1 + ; χ1 ∈ hχi χ1   x2  1 −1 1 −1  x3 − and b = χ − a= χ− (χx2 − x3 ) χ χ χ MARKOFF SURFACES AND STRONG APPROXIMATION: 1 satisfy σ = ab =  5 1 x 2  χ + χ 2 = 6 1. = χ − χ1 χ − χ1 Denoting by ρ a primitive root of Fp , a hyperbolic element x can be written in the form x = ρj + ρ−j . (8) For a hyperbolic element we let ord(x) = p−1 . j An elliptic element x can be written in the form x = ξ j + ξ −j , (9) where ξ is an element in Fp2 , ξ = (ρ̃)p+1 , where ρ̃ is a generator or the multiplicative group of Fp2 . For an elliptic element we let ord(x) = p+1 . j Lemma 4. Let x be hyperbolic; write x = w + w −1, (10) where w = ρj ∈ Fp . Then C1 (x) is a hyperbola with p − 1 points. Set (11) κ(x) = Let (12)  x2 . x2 − 4 κ(x) H(x) = { t, t  | t ∈ Fp ∗ }. Then we have the following map from H(x) to C1 (x):     κ(x) κ(x) κ(x) → x, t + . , tw + (13) t, t t tw In these coordinates (14)     κ(x) κ(x) = tw, . ρ1 t, t tw Lemma 5. Let x be elliptic; write (15) x = v + vp, where v ∈ Fp2 − Fp , v p+1 = 1. Then C1 (x) is an ellipse with p + 1 points. Set (16) Let (17) κ(x) = x2 . x2 − 4 E(x) = {(t, tp ) | t ∈ Fp2 , tp+1 = κ(x)}. 6 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK Then we have the following map from E(x) to C1 (x):   κ(x) κ(x) p . , tv + (18) (t, t ) → x, t + t tv In these coordinates (19) ρ1  κ(x) t, t    κ(x) = tv, . tv 2.2. Incidence graph for the conic sections. We treat the case of p ≡ 3(mod4) (the case of p ≡ 1(mod4) is simpler because of the special point in Lemma 3). Let X ∗ (p) be the Markoff triples mod p; ξ any coordinate of a triple, ξ 6= 0, ± 23 . For j 6= k and ξ, η (20) |Cj (ξ) ∩ Ck (η)| = 0, 1, 2. To determine which it is, the intersection consists of all z’s such that ξ 2 + η 2 + z 2 = 3ξηz, (21) which has a solution if is a square in Fp . In terms of Legendre’s symbol (22) 9ξ 2 η 2 − 4(ξ 2 + η 2 ) |Cj (ξ) ∩ Ck (η)| = 1 +  9ξ 2 η 2 − 4(ξ 2 + η 2 ) p  . So each Cj (ξ) meets p−1 Ck (η)’s. Define the incidence graph I(p) of X ∗ (p) to have 2 vertices Cj (ξ)’s with the number of edges between Cj (ξ) and Ck (η) being |Cj (ξ) ∩ Ck (η)|. Proposition 6. For p large (p > 10) the incidence graph I(p) is connected and in fact diam(I(p)) = 2. Proof. Fix ξ1 , ξ2 and i, j, say i, j ∈ {1, 2}. We seek y ∈ Fp such that C3 (y)∩Ci (ξ1 ) 6= φ and C3 (y) ∩ Cj (ξ2 ) 6= φ. This leads to solving the pair of equations: (23) ( (9ξ12 − 4)y 2 − λ2 = 4ξ12 (9ξ22 − 4)y 2 − µ2 = 4ξ22 for y, λ, µ ∈ Fp . In ξ12 = ξ22 then (23) reduces to the first equation (take λ = µ) and since 9ξ12 − 4 6= 0 and ξ12 6= 0, it defines a conic section. Thus for p large it has a solution and provides us with our y. If ξ12 6= ξ22 then (23) defines an irreducible curve in A3 . Thus again for p large it has solutions over Fp providing us with our desired MARKOFF SURFACES AND STRONG APPROXIMATION: 1 7 y. It follows that the distance in I(p) between any two points is at most 2. On the other hand, Ci (ξ) and Ci (η) are not joined if ξ 6= η nor is Ci (ξ) joined to half of the Cj (η)’s for j 6= i. Hence diam(I(p)) = 2.  3. Endgame 3.1. Use of Weil’s bound. We begin with the following Proposition 7. If x = (x1 , x2 , x3 ) is in X ∗ (p) and for some j ∈ {1, 2, 3} the order of 1 the induced rotation rot(xj ) is at least p 2 +δ (δ > 0 fixed) then x is joined to a point y in X ∗ (p) one of whose induced rotations is of maximal order. Proof. Consider first the case that x1 (say j = 1) is hyperbolic. In light of the discussion in section 2, x = (x1 , x2 , x3 ) is connected to the points in X ∗ (p) of the form (24) (x1 , α1 t + α2 t−1 , α3 t + α4 t−1 ) with t ∈ H, a cyclic subgroup of Fp ∗ . Here |H| | (p − 1); we set eH = p−1 . Our aim |H| ∗ is to produce t’s in H for which there is a primitive root y ∈ Fp satisfying (25) α1 t + α2 t−1 = y + y −1. Let P (H)(= Pα1 ,α2 (H)) denote the number of such solutions. A subgroup K of Fp ∗ is determined by its order |K| which divides p−1; let dK = Let fH (K) = fH (dK ) be the number of solutions to (26) p−1 . |K| α1 t + α2 t−1 = y + y −1 , t ∈ H , y ∈ K (note that the traces of the matrices that we produce, namely the common values of the left- and right-hand side of (26), are hit with multiplicity 2 in both t and y in our counting). Clearly (27) fH (K) ≤ 2 min(|K|, |H|). 1 We can estimate fH (K), at least if |H| ≥ p 2 +δ , using Weil’s Riemann Hypothesis for curves over finite fields. The map ξ → ξ dK , η → η eH sends solutions of (28) Cα1 ,α2 : α1 η eH + α2 η −eH = ξ dK + ξ −dK 8 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK to solutions of (26) and it is eH dK to 1. Hence if N(Cα1 ,α2 ) is the number of solutions to (28) then (29) fH (K) = N(Cα1 ,α2 ) . eH dK As we prove below (see Lemma 8) the curve Cα1 ,α2 i is absolutely irreducible. Since its genus is O(eH dK ), applying Weil bound yields √ (30) N(Cα1 ,α2 ) = p + O( peH dK ). Hence (31) fH (K) = p √ + O( p). eH dK By inclusion/exclusion (32) X P (H) = µ(d)fH (Kd ), d|(p−1) where µ is the Mobius function. Hence (33)   X µ(d) X 1 1 √ ϕ(p − 1) |H| + O( p) = |H| +Oε (p 2 +ε ) = |H| +Oε (p 2 +ε ). P (H) = µ(d) d d p−1 d|(p−1) d|(p−1) Here ϕ is the Euler function and it satisfies ϕ(n) ≫ε n1−ε and hence from (33) 1 we deduce that P (H) > 1 under the assumption that |H| ≥ p 2 +δ . This proves Proposition 7 in the hyperbolic case. Now consider the case of x elliptic. Let D be a non-square element in Fp . Then √ Fp2 = Fp [ D] and we can parametrize the subgroup H1 as follows √ (34) {(ξ + Dη)d1 ; ξ, η ∈ Fp ; ξ 2 − Dη 2 = 1}, where d1 = p+1 . |H1 | The conic section C1 (x) is an ellipse which can be parametrized as α2 − Dβ 2 = κ(x), (35) where κ(x) = root in Fp ∗ . Now (36) x2 . x2 −4 We seek α which can be written as α = u + u−1 with u a primitive (ξ + √ √ D)n = gn (ξ) + hn (ξ) D, where gn , hn are integral polynomials (37) gn (ξ) = ⌊n/2⌋  X i=0  n D i ξ n−2i , 2i MARKOFF SURFACES AND STRONG APPROXIMATION: 1 (38) hn (ξ) = ⌊n/2⌋  X i=0 9  n D i ξ n−2i+1 . 2i + 1 Let (39) gn (ξ, η) = ⌊n/2⌋  X i=0 (40) hn (ξ, η) =  n D i ξ n−2i η 2i , 2i  n D i ξ n−2i+1 η 2i−1 . 2i + 1 ⌊n/2⌋  X i=0 Then we have (41) (ξ + √ √ Dη)n = gn (ξ, η) + hn (ξ, η) D. Now we seek to bound f (H1 , K) with K subgroup of Fp ∗ with d2 = p−1 . |K| As in the hyperbolic case this is given by M d(d11d,d2 2 ) where M(d1 , d2) now counts the number of points on the following curve in Fp 3 : ( (42) ξ 2 − Dη 2 = 1 gd1 (ξ, η) = µd2 + µ−d2 This is a curve of genus O(d1 d2 ) and we can apply Weil bound and inclusionexclusion as in the hyperbolic case to produce the primitive u. This completes the proof of Proposition 7.  Lemma 8. Suppose α1 α2 6= 1 mod p . Then the curve α1 y e + α2 y −e = xd + x−d is absolutely irreducible. Proof. Consider P (x, y) = α1 xd y 2e + α2 xd − x2d − y e ∈ Fp [X, Y ]. For d = 1 P is clearly irreducible. Let d > 1 and assume that P is not irreducible P and f (x, y) = ajk xj y k ∈ Fp [X, Y ] an irreducible factor. Assume d ≥ e and u a d-th root of unity. Since for 0 ≤ s ≤ d, P (x, y) = P (us x, y), also X fs (x, y) = f (us x, y) = ajk usj xj y k 10 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK is an irreducible component of P . Thus either fs and fs′ are coprime or fs ∼ fs′ . Since a0k 6= 0 for some k (otherwise x would be a factor of f (x, y)), it follows that fs = fs′ if fs ∼ fs′ . Case 1 The fs are not pairwise coprime. The f (x, y) = fs (x, y) for some 0 < s < d, implying that usj = 1, i.e. sj ≡ 0( mod d) if ajk 6= 0. It follows that d has a divisor d1 > 1 such that d1 |j if ajk 6= 0 and hence f (x, y) has form f (x, y) = g(xd1 , y). The polynomial g(x, y) is therefore a factor of Q(x, y) = α1 xd2 y 2e + α2 xd2 − x2d2 y e − y e with d2 = dd1 and we lowered d. Case 2 The fs (0 ≤ s ≤ d) are mutualy coprime. Define P1 (x, y) = d−1 Y fs (x, y), s=0 which divides P . Degree considerations show that 2d ≥ d degx f, 2e ≥ d degy f, 2d + e ≥ d deg f. Case 2.1 degx f > 1, degy f > 1. It follows that degx f = 2, degy f = 2, e = d, deg f = 3, and P (x, y) = P1 (x, y). With u as above, ϕ(x, y) = f (x, uy) is an irreducible factor of P (x, y). Therefore for some 0 ≤ s ≤ d X X ajk uk xj y k ∼ fs (x, y) = ajk usj xj y k . ϕ(x, y) = j,k≤2 Consequently, there is some 0 ≤ l ≤ d such that k − sj ≡ l( mod d) if ajk 6= 0. Since Y fs (x, y), α1 xd y 2d + α2 xd − x2d y d − y d = 0≤s≤d clearly a0,1 = 6 0, a1,0 6= 0, and therefore 1 ≡ l ≡ −s( mod d), i.e. k + j = 1( mod d) if ajk 6= 0. Since deg f = 3, 2 ≡ 0( mod d), hence d = 2 and a1,1 = a2,0 = a0,2 = 0. Thus α1 x2 y 4 + ga1 x2 − x4 y 2 − y 2 ∼ (a21 x2 y + a12 xy 2 + a10 x + a01 y)(a21 x2 y − a12 xy 2 − a10 x + a01 y) ∼ y 2(a21 x2 + a01 )2 − x2 (a12 y 2 + a10 )2 . Setting a0,1 = 1 gives −y 2 (a21 x2 +1)2 +x2 (a12 y 2 +a10 )2 and a221 = 1, a21 −a12 a10 = 0, a212 = α1 , a210 = α2 . But this contradicts the assumption α1 α2 6= 1. Case 2.2 degx f = 1 or degy f = 1. Assume degy f = 1, say. Then there are coprime a(x), b(x) ∈ Fp [X] such that P (x, a(x) ) = 0, that is b(x) α1 xd a(x)2e + α2 xd b(x)2e − x2d a(x)e b(x)e − a(x)e b(x)e = 0. MARKOFF SURFACES AND STRONG APPROXIMATION: 1 11 Since a(x), b(x) are coprime, it follows that a(x)e |xd , b(x)e |xd , hence a(x) or b(x) is constant. If, say, b(x) is constant, previous equation implies xd |a(x)e , hence a(x)e = γxd and α1 γ 2 x2d + α2 b2e − γb2 x2d − γb2 = 0. It follows that α1 γ = b2 , α2 b2 = γ, hence α1 α2 = 1, contradicting the assumptions that α1 α2 6= 1.  3.2. The Cage. A point x = (x1 , x2 , x3 ) ∈ X ∗ (p) is called maximal if ord(rot(xj )) is maximal for some j. Note that the condition that the order of rot(3xj ) be maximal depends only on xj and not on the other coordinates of x (since it depends on the order of λ, where λ + λ−1 = 3x1 in F∗p of F∗p2 ). We call ξ ∈ Fp maximal if it is of maximal order. By the cage we mean a set of maximal elements in X ∗ (p). We claim that the cage is connected, that is to say if x̂ and ŷ are in the cage then x̂ is connected to ŷ. Let ξ be the coordinate of maximal order of x̂ and η be the coordinate of maximal order of ŷ, so that x̂ is connected to all points in Cj (ξ) and similarly ŷ is connected to all the points in Ck (η). Now according to Proposition 6, which when extended with and inclusion/exclusion argument as in Proposition 7 gives a y of maximal order such that P ∈ Cj (ξ) ∩ Cl (y); Q ∈ Ck (η) ∩ Cl (y). Since y is maximal, P and Q are connected by Γ and P is Γ- connected to x̂ and Q to ŷ. Thus x̂ is Γ connected to ŷ. Denote by C(p) the connected component of X ∗ (p) (under the Γ action) that contains the cage, then C(p) is our large component. 4. Middle Game In the endgame (section 3) we connected any x ∈ X ∗ (p) of order (that is max(ord(rot(xj )))) 1 l ≥ p 2 +δ0 (δ0 > 0) to the cage in one step. In this section we allow any number of moves to do the connecting. In particular any x of order at least pε is shown to be in the giant component. As in section 3 the y’s which are joined to a given x whose order is l1 via the corresponding rotation and which have orders l2 (here l1 and l2 divide p − 1 or p + 1) correspond to solutions of an equation (with σ ∈ Fp , σ 6= 1):  1 σ  = h2 + , σ 6= 1 h1 + h1 h2 (43)  with h1 ∈ H1 , h2 ∈ H2 with H1 , H2 subgroups of Fp ∗ or Fp2 ∗ . 12 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK In (43) we have |H1 | = l1 , |H2 | = l2 . If we have an upper bound on the number of solutions to (43) so that on summing over all l2 ≤ l1 with l2 dividing p − 1 or p + 1, yields a quantitiy which is less than l1 , then there is at least one h1 for which the corresponding y will have order bigger than l1 . We then repeat this procedure replacing x by this y and so on, until the order of 1 the element is at least p 2 +δ0 . At that point we are in the endgame and can finish. The key therefore is a suitable upper bound to the number of solutions to (43). Our original treatment used Stepanov’s technique of auxiliary polynomials in his elementary proof of this Riemann Hypothesis for curves. This yields explicit and reasonably sharp estimates which are ample for our application. We carry this out in the Appendix partly to illustrate the flexibility of this method. Subsequently the recent powerful technique for estimating from above the g.c.d. of (u − 1, v − 1), of Corvaja and Zannier [CS13] yields sharper bounds. This is relevant for the purpose of giving efffective bounds on p after which Theorem 1 takes effect. The precise upper bound to (43) established by [CS13] is n |H1 |.|H2 | o 20 max (|H1|.|H2 |)1/3 , . p The third treatment, and the one which we develop in this section, while special to (43), is robust in that the upper bound requires little further structure and it is suitable for generalisation for more general moduli as demonstrated in Paper II. It is based on the following projective Szemeredi-Trotter theorem (Proposition 2 in [Bou12]). Theorem 9. Let Φ : Fp → Mat2 (Fp ) such that det Φ does not vanish identically and ImΦ ∩ PGL2 (Fp ) is not contained in a set of the form F∗p · gH for some g ∈ SL2 (Fp ) and H a proper subgroup of SL2 (Fp ). Then the following holds. Given ε > 0, r > 1, there is δ > 0 such that if A ⊂ P 1 (Fp ) and L ⊂ Fp satisfy (44) 1 ≪ |A| < p1−ε (45) log |A| < r log |L|. Then (46) where for g = |{(x, y, t) ∈ A × A × L; y = τΦ(t) (x)}| < |A|1−δ |L|, ! a b ax+b . , τg (x) = cx+d c d Using Theorem 9 we prove the following: MARKOFF SURFACES AND STRONG APPROXIMATION: 1 13 Proposition 10. Given δ > 0 there is τ < 1 and Cτ depending on δ such that if pδ < |H1 | < p1−δ then the number of solutions to (43) is at most Cτ |H1 |τ . Proof. For h ∈ H, a subgroup of F∗p or F∗p2 , denote by h̃ = h + h−1 . Similarly we e = {h̃ | h ∈ H}. denote by H Suppose that (43) has T solutions. Then  σ =u   h1 σ  = v, h1 t + h1 t h1 + (47) f2 , has at least T 2 solutions. where h1 , t ∈ H1 and u, v ∈ H Elimination of h1 in (47) yields (48)   1 2 1 uv + σ t − =0 u2 + v 2 − t + t t f2 × H f2 . which, by assumption, has at least T 2 solutions in (t, u, v) ∈ H1 × H Next, let u = f˜1 , v = f˜2 with f1 and f2 ∈ H2 and define the following elements f2 : x, y ∈ H 1 ^ , x = (f 1 f2 ) = f1 f2 + f1 f2 f1 f2 −1 y = (f^ + . 1 f2 ) = f2 f1 Thus uv = x + y, u2 + v 2 = xy + 4 and equation (48) gets transformed into (49) xy − t̃(x + y) + σ(t̃)2 + 4(1 − σ) = 0. Denoting (50) α = t̃ and β = σ(t̃)2 + 4(1 − σ) we obtain (51) y= with g= αx − β = τg (x) x−α α β 1 −α ! = g(t̃) and τg the Mobius transformation. e2 × H e2 × H e1. Equation (51) has at least T 2 solutions in (x, y, t̃) ∈ H 14 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK We apply Theorem 9 taking Φ(t) (52) Φ(t) = t −σt2 − 4(1 − σ) 1 −t ! e2, L = H e1. and A = H We verify the assumption on Φ. Since σ 6= 1, det Φ(t) = (1 − σ)(4 − t2 ) does not vanish identically. It remains to show that n det Φ(s) Φ(s)−1 Φ(t) ; s, t ∈ Fp } det Φ(t) is not contained in a proper subgroup H of SL2 (p). By (52) ! ! 2 2 −s σs + 4(1 − σ) t −σt − 4(1 − σ) Φ(s)−1 Φ(t) = −1 s 1 −t = −st + σs2 + 4(1 − σ) s−t (s − t)(4(1 − σ) − σst) −st + σt2 + 4(1 − σ)) ! Taking s = σt + 4(1 − σ) t gives  σ(1 + σ)t + (53) (1 − σ) − t t 1 4 4(1−σ) t −σ 2 t2 + 4(1 − σ)2 0 ! = (1 − σ) 4 t  − t gt . As the proper subgroups of SL(2, Fp ) have trivial second commutator [Suz82], it suffices to show that (54) )(gt2 gt1 gt−1 gt−1 )(gt4 gt3 gt−1 gt−1 ) gt−1 )(gt3 gt4 gt−1 gt−1 (gt1 gt2 gt−1 4 3 1 2 3 4 2 1 is not identically one for t1 , t2 , t3 , t4 ∈ F∗p . If this were the case, the same would be true for t1 , t2 , t3 , t4 taken in an extension field of Fp so as to make t2 = (55) 4(1 − σ)2 − ε (ε = ±1) σ2 solvable. Taking t = ±κ satisfying (55), we get 2 −ε (56) g±κ = ± σκ [(1 + σ) 4(1−σ) σ2 1 ! + 4(1 − σ)] ε . 0 MARKOFF SURFACES AND STRONG APPROXIMATION: 1 15 We choose ε = ±1 as to ensure that (1 + σ)(4(1 − σ)2 − ε) + 4σ 2 (1 − σ) 6= 0 and obtain matrices (57) g± = ±η ε 1 0 ! that clearly generate SL2 (p). Consequently, Theorem 9 is applicable, yielding the bound T 2 ≪ |H2|1−τ |H1 |.  5. Opening The analysis of the previous sections shows that we can connect x ∈ X ∗ (p) whose order is at least pε (or smaller if the divisors of p2 − 1 are not too numerous) to the cage. To deal with all x’s and in particular ones whose orders are uniformly bounded (indepndent of p) we lift to characteristic zero. In this connection we observe first that if the action of Γ on X ∗ (Q̄) has a finite orbit F then the strong approximation conjecture cannot hold. To see this consider more generally any finite orbit F of the Γ action on A3 (C). The coordinate of any ξ in such an F must lie in a cyclotomic field Ln = Q(ζn ), where ζn is a primitive n-th root of 1. For if ξ = (ξ1 , ξ2, ξ3 ) then ord(rot(ξj )) must be finite and hence 3ξj = tj + t−1 j (58) with tj a root of unity. If n is the least common multiple of all the orders of all the tj ’s corresponding to the ξ’s in F then ξj ∈ Ln and hence F ⊂ A3 (Ln ). In fact the ξj ’s (3) are all integral except possibly for denominators powers of 3, so that F ⊂ A3 (OLn ) (3) where OLn is the ring of S-integers in Ln , with S consisting of the primes dividing 3. If p is a rational prime (p 6= 3) which splits completely in Ln and P is a prime of (3) (3) Ln with P |(p) then OLn /P ∼ = Z/pZ). The Γ action of A3 (OLn ) factors through = Fp (∼ the reduction π mod P (3) A3 (OLn )  π y (3) Γ −−−→ Γ̄ (3) A3 (OLn )  π y (3) A3 (OL /P ) −−−→ A3 (OL /P ) and hence (59) F̄ = π(F ) ⊂ A3 (Fp ), is Γ̄ − invariant. 16 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK Since Γ preserves the level sets Xk : x21 + x22 + x23 − 3x1 x2 x3 = k, (60) (3) any such F is contained in Xk (OL ) for a suitable k. Thus for any such F , there is a positive density of p’s which split completely in Ln , and hence for which F̄ ⊂ Xk (Fp ) is a fixed size Γ̄ -orbit (|F̄ | ≤ |F |). That is, the finite Γ-orbits in A3 (Q̄) must be part of any description of the Γ̄-orbits on A3 (Fp ), for p large. In our setting of this paper, k = 0 and we have (we thank E. Bombieri for this simple proof) Proposition 11. X ∗ (Q̄) has no finite Γ-orbit. Proof. As in the discussion above, if F is such an orbit and ξ ∈ F then the ξj satisfy (58) with tj an lj -th root of one. The Markoff equation for t1 , t2 , t3 becomes (61) −1 −1 −1 −1 2 2 −1 2 (t1 + t−1 1 ) + (t2 + t2 ) + (t3 + t3 ) − (t1 + t1 )(t2 + t2 )(t3 + t3 ) = 0. Now (61) has no solutions with |tj | = 1 (let alone being roots of unity) except for tj = ±i, j = 1, 2, 3. To see this note that if −1 −1 ¯ a = t1 + t−1 1 (= t1 + t1 ), b = t2 + t2 , c = t3 + t3 then a, b, c, lie in [−2, 2] and by the inequality of the geometric and arithmetic means 2 |a|3 + |b|3 + |c|3 ≤ (a2 + b2 + c2 ). (62) 0 ≤ a + b + c = |abc| ≤ 3 3 Hence the only solutions to (61) correspond to a = b = c = 0 or tj = ±i. In terms of ξj this gives ξ = (0, 0, 0), which is the only invariant set for the action of Γ on X(Q̄).  We remark that in the context of the general surfaces that are studied in Paper III, for example the surfaces Xk in (60) with k 6= 0, there can be a continuum of solutions to the analogue of equation (61) with |tj | = 1. However the solutions with tj a root of unity (with unspecified order) are still restricted to a finite number of nondegenerate solutions. This follows from Lang’s Gm conjecture, see [Lau83] and [SA94] for proofs which give the solutions effectively. In various special cases these finite Q̄ orbits for the Γ-action correspond to the determination of the algebraic Painleve VI solutions ([DM00], [LT14]); we leave the details to paper III . Returning to the Markoff surface X, let ξ = (ξ1 , ξ2 , ξ3) ∈ X ∗ (p) with ord(rot(ξj )) = lj for j = 1, 2, 3. Let n = lcm(l1 , l2 , l3 ) and Ln = Q(ζn ) and let ζl1 , ζl2 , ζl3 be primitive roots of one respectively. Let 2 2 2 (63) η = (ζl1 +ζl−1 )2 +(ζl2 +ζl−1 )2 +(ζl3 +ζl−1 )2 −(ζl1 +ζl−1 )(ζl2 +ζl−1 )(ζl3 +ζl−1 ) ∈ OLn . 2 2 3 2 2 3 MARKOFF SURFACES AND STRONG APPROXIMATION: 1 17 According to Proposition 11 unless l1 = l2 = l3 = 2 (i.e. ζlj = ±i), η 6= 0. Now |η| ≤ 20 and hence (64) Norm(η) ≤ 20φ(n) ≤ 20n . If P is a prime in OLn and η ∈ P , then P |(η) and hence (65) N(P ) ≤ Norm(η) ≤ 20n . Put differently, if log20 N(P ) > n then (66) η 6= 0( mod P ). For our point ξ in X ∗ (p), 3ξj = λj + λ−1 j with λj in Fp or Fp2 and λj an lj -th root of 1, and (l1 , l2 , l3 ) 6= (2, 2, 2) since ξ 6= (0, 0, 0). If all the λj ’s are in Fp then Q(ζn ) splits completely at p, that is there is a prime P dividing (p) such that OLn /P ∼ = Fp , N(P ) = p and π(ζlj ) = λj in OLn /P and η ≡ 0( mod P ). Hence from (66) we conclude that (67) log20 p ≤ n. If the field generated by λj ’s (over Fp ) is Fp2 then there is a prime P of OLn dividing (p) such that OL /P ∼ = Fp2 , N(P ) = p2 n and π(ζlj ) = λj in OLn /P and η ≡ 0( mod P ). Hence again from (66) we conclude that (68) 2 log20 p ≤ n. Hence in either case n ≥ log20 p where n = lcm(l1 , l2 , l3 ), and hence (69) 1 max(l1 , l2 , l3 ) ≥ (log20 p) 3 . We have proven Proposition 12. Let ξ ∈ X ∗ (p) have maximal order l, i.e. max(l1 , l2 , l3 ) = l with 1 lj = ord(rot(ξj )), then l ≥ (log20 p) 3 . In particular, any component F of X ∗ (p) satisfies 1 |F | ≥ (log20 p) 3 . 18 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK 6. Proofs of Theorems 1 and 2 Proposition 12 establishes the second part of Theorem 1 and combined with the analysis in sections 3 and 4 yields a proof of the strong approximation conjecture if p2 − 1 is not very smooth. For example, the strong approximation conjecture is true for X ∗ (p) if the prime p satisfies (70) X 2 d 3 < y; for any y. 1 (log p) 3 ≤d≤y d|(p2 −1) We do this by using the arguments and results in [Cha13] and [CKSZ14] concerning points (x, y) on irreducible curves over Fp for which ord(x) + ord(y) is small (here ord(x) is the order of x in F∗p ). Theorem 13. Fix d ∈ Z+ and δ > 0. There is an ε > 0, ε = ε(d, δ), such that for all primes p ≤ z (z sufficiently large) with the exception of at most z δ of them, the following property holds. Let f (x, y) ∈ Fp [x, y] be of degree at most d and not divisible by any polynomial of the form ρxα y β − 1 or ρy β − xα for any ρ ∈ F¯p and integers α and β. Then all solutions (x, y) ∈ (F¯p × F¯p )∗ of f (x, y) = 0 satisfy (71) ord(x) + ord(y) ≥ pε except for at most 11d3 + d of them. Proof. Theorem 1.2 in [CKSZ14] establishes what we want except that pε in (71) is replaced by the stronger bound pα(d) , with α(d) = 2 , 89d2 + 3d + 14 while the exceptional set of primes is of zero density. For our purpose the exponent in (71) is allowed to be small and in exchange we want the exceptional set to be much smaller. To this end we follow verbatum the discussion in Section 4 of [CKSZ14]. For d fixed and T a large parameter they show that there is a U = U(d, T ) which has at 1 most O(T α(d) ) prime factors (their log T in the denominator is irrelevant for us) with the property: If p does not divide U and f as in Theorem 13 and f (x, y) = 0 in Fp , then (72) ord(x) + ord(y) ≥ T MARKOFF SURFACES AND STRONG APPROXIMATION: 1 19 except for at most 11d3 + d such (x, y) in Fp ∗ × Fp ∗ . For our given δ > 0 and large parameter z choose T to be T = z δα(d) . (73) Then the number of primes p with p|U is O(z δ ) , and if p does not divide U then Theorem 13 holds with (72) and (73), that is with ε = δα(d).  To prove Theorem 2 we apply Theorem 13 to the curves fσ (x, y) given by equation x+ 1 σ =y+ x y 1 with σ 6= 1. If (log20 p) 3 > 1000, then according to Proposition 12, for any ξ ∈ X ∗ (p) we have ord(rot(ξj0 )) is at least 1000 for j0 one of the j’s in {1, 2, 3}. Hence if p is not in the exceptional set in Theorem 13 with d = 4, then in the typical equation x + σx = y + y1 corresponding to the orders of the rotations in the rot(ξj0 ) orbit, there is (x, y) which is not one of the exceptional 11d3 + d < 1000 possible points. For such (x, y) the induced rotation has order at least pε and hence ξ is joined to the cage by the middle game. Our methods fall short of dealing with all p, specifically for those rare p’s for which p −1 is very smooth. The following hypothesis which is a strong variant of conjectures of M.C. Chang and B. Poonen [Cha13, Vol10] would suffice to deal with all large p’s. 2 Hypothesis: Given d ∈ N, there is δ > 0 and K = K(d) such that for p large and f (x, y) absolutely irreducible over Fp and of degree d and f (x, y) = 0 is not a translate of a subtorus of (F̄∗p )2 , the set of (x, y) ∈ (F∗p )2 for which f (x, y) = 0 and max(ordx, ordy) ≤ pδ , is at most K. Appendix A. Stepanov’s auxiliary polynomial method [Ste69] for bounding the number of solutons to equations like (43) is quite flexible. We demonstrate this for some special cases (the general case can be handled similarly). The proposition below is an extension of the approach and bounds in [HK00] (where S(x) = x, T (x) = 1 − x and t1 = t2 ). In what follows S(x) and T (x) are rational functions in Fp (x) of total degree d1 and d2 respectively and with disjoint divisors; e = d1 + d2 is fixed. Proposition 14. For p a large prime, t1 , t2 dividing p − 1, t1 ≥ t2 , let Y = {y ∈ Fp : S(y)t1 = T (y)t2 = 1}. 20 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK 1 Then if t1 ≪e p1− 2e , − 1 |Y | ≪e min{t2 , t1 t2 4e }. Remarks: (1) The trivial bound is O(t2) so the Proposition gives an improvement (power 4e saving) if t2 ≥ t14e−1 . (2) If h(ξ, η) = 0 is a plane curve of genus 0 over Fp , then the Proposition gives an upper bound on the number of solutions with ξ t1 = η t2 = 1 (cf. [CS13]). Applying Proposition 14 with t1 = t2 , S(y) = y, T (y) = ay+b cy+d yields 3 Corollary 15. For p large prime, t|(p − 1), t ≤ p 4 and Ut = {y ∈ Fp : y t = 1} the t-th roots of 1, 3 |σ(Ut ) ∩ Ut | ≪ t 4 for σ ∈ PGL2 (Fp ), σ 6= 1. 3 Corollary 16. For t|(p − 1), t ≤ p 4 , b ∈ Fp , b 6= 1, 3 |{w, ρ ∈ Fp : w + w −1 = ρ + bρ−1 , w t = ρt = 1}| ≪ t 4 . Proof. Put ρw = ξ, wρ = η, then ξ t = η t = 1 and each such solution with ξ = bη−1 η−1 corresponds to at most two solutions (w, ρ) above. Applying Corollary 15 yields Corollary 16.  Proof of Proposition 14: First we need a generalization of Proposition 3.2 in [VS12] where their common t is replaced by t0 , t1 , . . . , tn . The result is the following Lemma, whose proof is the same Lemma 17. Let t0 , t1 , . . . , tn , as well as B and J be integers, p a large prime, and α1 , . . . , αn distinct elements in Fp ∗ . Assume that 1 min(t0 , . . . , tn ) ≥ (n − 1)B 2n + JB 2 and that p ≥ (2nB + 2) max(t0 , t1 , . . . , tn ). Then xai xt0 b0,i (x − α1 )t1 b1,i . . . (x − αn )tn bn,i with aj ≤ J and b0,i , . . . bn,i ≤ B are linearly independent in Fp [x]. MARKOFF SURFACES AND STRONG APPROXIMATION: 1 21 Let α1 , . . . , αk ∈ Fp be distinct and ν1 , ν2 , . . . νk ∈ Z; set Rν (x) = (x − α1 )ν1 . . . (x − αk )νk . For m ≥ 1, X m dj1 dj k dm ν1 [R (x)] = [(x − α ) ] . . . [(x − α1 )νk ] = ν 1 j1 jk dxm dx dx j j1 +...jk =m X Bm,j (x − α1 )ν1 −j1 . . . (x − αk )νk −jk . j1 +j2 +...jk =m Hence dm (74) [(x − α1 )(x − α2 ) . . . (x − αk ] Rν (x) = Rν (x)Pm,ν (x), dxm where Pm,ν is a polynomial of degree at most km. Stepanov’s polynomial method is based on constructing a polynomial which vanishes to high order on Y . Let λa,b1 ,b2 be in Fp with 0 ≤ a ≤ J and 0 ≤ bj ≤ B and form X (75) φ(x) = λa,b1 ,b2 xa (S(x))t1 b1 (T (x))t2 b2 . m Write S(x), T (x) in the form (we assume that both factor into linear factors Fp [x]): A(x − α1 ) . . . (x − αt ) , (x − β1 ) . . . (x − βτ ) B(x − γ1 ) . . . (x − γµ ) T (x) = . (x − δ1 ) . . . (x − δν ) S(x) = (76) For simplicity we assume that S(x) and T (x) are square-free and we are assuming that the α, β, γ, δ’s are all distinct. The constants A and B can be absorbed into the λ’s, so without loss of generality we can take A = B = 1. For m ≥ 0 (77) [(x − α1 ) . . . (x − αt )(x − β1 ) . . . (x − βτ ) . . . (x − δν )]m  dm  a t1 b1 t2 b2 x (S(x)) (T (x)) = dxm xa S(x)t1 b1 T (x)t2 b2 Pm,a,b1 ,b2 (x) with Pm of degree at most em. Hence for x = y ∈ Y and m ≤ M (78) X X  dm dm  a t1 b1 t2 b2 λa,b1 ,b2 y a Pm,a,b1 ,b2 (y), φ(x)| = λ x S(x) T (x) = x=y a,b1 ,b2 x=y dxm dxm a,b ,b 1 2 by the definition of Y . We can make (78) equal to 0 for all y in Y by noting that y a Pm (y) is a polynomial of degree J + em. So (78) can be made 0 with not all of the 22 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK λa,b1 ,b2 ’s equal to 0 and for all m ≤ M as long as (J + eM)M < B 2 J. (79) Assuming that this is satisfied, we have φ(x) which is not identically zero and has degree (as a rational function) at most J + eBt1 . Hence if φ(x) is not identically zero, then its order of vanishing on Y is at least M and hence M|Y | ≤ J + eBt1 or (80) |Y | ≤ J + eBt1 . M We now check that under suitable constraints on the sizes of parameters, φ(x) does not vanish identically. We have φ(x) = consequently X λa,b1 ,b2 xa (x − α1 )t1 b1 . . . (x − αt )t1 b1 (x − γ1 )t2 b2 . . . (x − γµ )t2 b2 , (x − β1 )t1 b1 . . . (x − βτ )t1 b1 (x − δ1 )t2 b2 . . . (x − δν )t2 b2 (x − β1 )B . . . (x − βτ )B (x − δ1 )B . . . (x − δν )B φ(x) = X λa,b1 ,b2 xa (x − α1 )t1 b1 . . . (x − αt )t1 b1 (x − β1 )(B−b1 )t1 . . . (x − βτ )(B−b1 )t1 · · (x − γ1 )t2 b2 . . . (x − γµ )t2 b2 (x − δ1 )(B−b2 )t2 . . . (x − δν )(B−b2 )t2 . Now the monomials appearing in the last expression are linearly independent over Fp [x] according to Lemma 17 as long as (81) p ≥ (2eB + 2)t1 1 t2 ≥ eB 2e + JB e . 2 Thus, if (81) and (79) hold, so does (80). Choose J ≤ M and M 2 = Ce B 2 J. Then M= p √ Ce B J 1 1 and M ≥ J iff J ≪e B 2 . Now choose B + t12e and if t1 ≪ p1− 2e then (81) and (79) hold and − 1 |Y | ≪e t1 t2 4e . This completes the proof of Proposition 14. MARKOFF SURFACES AND STRONG APPROXIMATION: 1 23 Acknowledgements: While working on this paper, the authors were supported, in part, by the following NSF DMS awards: 1301619 (Bourgain), 1603715 (Gamburd), 1302952 (Sarnak). References [BS02] F. Beukers and C. J. Smyth, Cyclotomic points on curves, Number theory for the [Bom07] millenium (Urbana, Illinois, 2000), I, A.K. Peters, (2002), 67-85. E. Bombieri, Continued fractions and the Markoff tree, Expo. Math. 25 (2007), no [Bou12] 3, 187–213. J. Bourgain, A modular Szemeredi-Trotter theorem for hyperbolas, C.R. Acad. Sci. Paris Ser 1, 350 (2012), 793–796. [BG08] J. Bourgain and A. Gamburd, Uniform expansion bounds for Cayley graphs of SL2 (Fp ), Ann. Math. 167 (2008), 625–642. [BGS10] J. Bourgain, A. Gamburd and P. Sarnak, Affine linear sieve, expanders and sum product, Invent. Math. 179 (2010), 559–644. [BGS16] J. Bourgain, A. Gamburd, P. Sarnak, Markoff triples and strong approximation, C. R. Math. Acad. Sci. Paris 354 (2016), no. 2, 131-135. [Cas78] [Cha13] J. W. S. Cassels, Rational Quadratic Forms, Academic Press, 1978. Chang, Mei-Chu Elements of large order in prime finite fields. Bull. Aust. Math. [CKSZ14] Soc. 88 (2013) 169-176. M-C. Chang, B. Kerr, I. Shparlinski and U. Zannier, Elements of large orders on [CS13] varieties over prime finite fields, J. Theor. Nombres Bordeaux 26 (2014) 579-594. P. Corvaja, U. Zannier, Greatest common divisors of u − 1, v − 1 in positive charac- teristic and rational points on curves over finite fields, J. Eur. Math. Soc. (JEMS) 15 (2013) 1927-1942. [DKS13] C. D’Andrea, T. Krick and M. Sombra, Heights of varieties in multiprojective spaces [DM00] and arithmetic Nullstellensatz, Annales Sci. de l’ENS, 46, (2013),549-627. B. Dubrovin, M. Mazzocco, Monodromy of certain Painleve-VI transcendents and [Fro13] reflection groups, Invent. Math. 141 (2000) 55-147. G. Frobenius, Über die Markoffschen Zahlen, Akad. Wiss. Berlin, (1913), 458–487. [Gol03] W. Goldman, The modular group action on real SL(2)-characters of a one-holed torus, Geom. and Top. Vol. 7 (2003), 443–486. [HK00] R. Heath-Brown and S. Konyagin, New bounds for Gauss sums derived from k-th powers and for Heilbronn’s exponential sum, QUAR. J MATH (2000), 221–235. [Lau83] [Mar79] M. Laurent, Exponential diophantine equations, CR Acad Sc. 296 (1983), 945–947. A. Markoff, Sur les formes quadratiques binaires indéfinies, Math. Ann. 15 (1879) [Mar80] 381–409. A. Markoff, Sur les formes quadratiques binaires indéfinies, Math. Ann. 17 (1880) [LT14] 379–399. O. Lisovyy and Y. Tykhyy, Algebraic solutions of the sixth Painleve equation, Journal of Geometry and Physics, 85 (2014) 124-163. 24 JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK [MW13] D. McCullough and M. Wanderley, Nielsen equivalence of generating pairs in [SA94] SL(2, q), Glasgow Math. J. 55 (2013), 481–509. P. Sarnak and S. Adams, Betti numbers of congruence groups, with an appendix [Sch04] by Z. Rudnick, Israel J. Math, 88, 1994, 31-72. Schmidt, W. M Equations over finite fields: an Elementary approach, Kendrick [Ste69] Press 2004. S.A. Stepanov, The number of points of a hyperelliptic curve over a prime field, [Suz82] MATH USSR-IZV 3:5 (1969), 1103–1114. M. Suzuki, Group Theory I, Springer-Verlag, Berlin-Heidelberg-New York, 1982. [Vol10] Voloch, Elements of high order on finite fields from elliptic curves, Bull. Aust. Math. Soc. 81 (2010), 425-429. [VS12] [Wei41] Vyugin, I. V., Shkredov, I. D., Sb. Math. 203(2012), 844-863. A. Weil, On the Riemann Hypothesis in function fields, Proc. Nat. Acad. Sci. USA 27 (1941), 345–347. IAS E-mail address: [email protected] The Graduate Center, CUNY E-mail address: [email protected] IAS and Princeton University E-mail address: [email protected]
4
arXiv:1706.02858v2 [math.ST] 14 Mar 2018 On rumour propagation among sceptics Farkhondeh A. Sajadi and Rahul Roy1 University of Isfahan, Isfahan and Indian Statistical Institute, Delhi Keywords: complete coverage, eventual coverage, rumour process. AMS Classification: 60K35 Abstract: Junior, Machado and Zuluaga (2011) introduced a model to understand the spread of a rumour. This model consisted of individuals situated at i.i.d. points of the line N. An individual at the origin 0 starts a rumour and passes it to all individuals in the interval [0, ρ0 ], where ρ0 is a positive random variable. An individual located in this interval receives the rumour and transmits it further. The rumour process is said to survive if all the individuals in the model receive the rumour. We study this model, when the individuals are more sceptical and they transmit only if they receive the rumour from at least two different sources. In stochastic geometry the equivalent of this rumour process is the study of coverage of the space Nd by random sets. Our study here extends the study of coverage of space and considers the case when each vertex of Nd is covered by at least two distinct random sets. 1 Introduction Let {Xi : 1 ≥ 1} be a collection of i.i.d. Bernoulli (p) random variables, i.e., ( 1 with probability p Xi = 0 with probability 1 − p. (1) Also let {ρi : 1 ≥ 1} be a collection of i.i.d. N valued random variables, independent of the collection {Xi : 1 ≥ 1}. Let ρ denote a generic random variable with the same distribution as ρi . In addition, let ρ0 an independent N valued random variables, independent of the collections {Xi : 1 ≥ 1} and {ρi : 1 ≥ 1}, with ρ0 having the same distribution as ρ. Taking X0 ≡ 1, consider the region [ ([i, i + ρi ]). C := {i≥0:Xi =1} 1 [email protected], [email protected] 1 Junior, Machado and Zuluaga (2011) takes {i : Xi = 1} as the location of individuals on N and a rumour is started at the origin which is received by individuals located in [0, ρ0 ]. An individual at i on receiving the rumour spreads it among all individuals in the region [i, i + ρi ], and thus the rumour propagates. This model they call the firework process. They also introduce another model of rumour propagation, called the reverse firework process, where they study the region [ ([i − ρi , i]). C̃ := {i≥0:Xi =1} Their object of interest is under what conditions on the processes {Xi : 1 ≥ 1} and {ρi : 1 ≥ 1} are the regions C and C̃ unbounded connected regions with positive probability, i.e. the rumour process ‘percolates’. Remark 1.1. A simple argument using Kolmogorov’s 0-1 law yields that C (or C̃) being an unbounded connected region with positive probability is equivalent to C (or C̃) containing a region [t, ∞), for some t ≥ 1 with probability 1. We study the spread of rumour among sceptics. A sceptic individual at i spreads it among all individuals in the region [i, i + ρi ] only if s/he received the rumour from at least two distinct sources, i.e., (i) for the firework process, there are two individuals at j and k (say) with j 6= k and −1 ≤ j, k < i such that i ∈ [j, j + ρj ] ∩ [k, k + ρk ]; here we assume that there is an individual at location −1, who spreads the rumour in the region [−1, −1 + ρ−1 ], where ρ−1 is a random variable independent of all other random variables and having the same distribution as ρ, (ii) for the reverse firework process, there are two individuals at j and k (say) with j 6= k and −1 ≤ j, k < i such that j, k ∈ [i − ρi , i]. Towards this we define the regions D := {x ∈ R : there exist j, k ≥ −1 with j 6= k and Xj = Xk = 1 such that x ∈ ([j, j + ρj ] ∩ [k, k + ρk ])}, D̃ := {x ∈ R : x ∈ [i − ρi , i] for some i with Xi = 1 and there exist − i ≤ j, k < i with j 6= k and Xj = Xk = 1 such that j, k ∈ [i − ρi , i]}. We look for conditions on on the processes {Xi : 1 ≥ 1} and {ρi : 1 ≥ 1} such that the regions D and D̃ are unbounded connected regions with positive probability. Remark 1.2. As in the case of rumour propagation in C and C̃, a simple argument using Kolmogorov’s 0-1 law yields that D (or D̃) being an unbounded connected region with positive probability is equivalent to D (or D̃) containing a region [t, ∞), for some t ≥ 1 with probability 1. Thus we define 2 Definition 1.3. The firework process (respectively, reverse firework process,) percolates among sceptics if, with probability 1, D (respectively, D̃,) contains a region [t, ∞), for some t ≥ 1. Remark 1.4. Using this equivalent definition obtained by the tail event properties allows us to study the model without considering the influence of the two initiators X−1 and X0 . Proposition 1.5. Let l := lim inf jP(ρ ≥ j) > 1 and L := lim sup jP(ρ ≥ j) < ∞. j→∞ j→∞ We have that both the firework process and the reverse firework process percolate if p > 1/l and neither of them percolates if p < 1/L. We note here that this is the same condition that Junior, Machado and Zuluaga (2011) obtain for the percolation among ‘non-sceptical’ individuals. Indeed, the above proposition goes through among more radical sceptics too, i.e. if individuals need to receive the rumour from k ≥ 1 distinct sources before they transmit the rumour. As noted in the review article Junior, Machado and Ravishankar (2016), the above model is related to the study of coverage processes in stochastic geometry. Athreya, Roy and Sarkar (2004) introduce a notion of ‘eventual coverage’ which, for 1-dimension, is identical to the equivalent formulation of the percolation of rumour process as given in Remark 1.1. We state the model in brief here and present the results obtained. Let {Xi : i ∈ Nd } be a collection of i.i.d. Bernoulli (p) random variables and {ρi : i ∈ Nd } a collection of i.i.d. N valued random variables, independent of the collection {Xi : i ∈ Nd }. Let ρ denote a generic random variable with the same distribution as ρi . Let C := ∪i:Xi =1 (i + [0, ρi ]d ) denote the covered region of Nd . Athreya, Roy and Sarkar (2004) define a notion of eventual coverage as follows: Nd is eventually covered if there exists a t ∈ Nd such that t + Nd ⊆ C. For our purposes we say Nd is eventually doubly covered if there exists a t ∈ Nd such that t + Nd ⊆ D, where D := {x ∈ Rd : there exist i, j ∈ Nd with i 6= j and Xi = Xj = 1 such that x ∈ (i + [0, ρi ]d ) ∩ (j + [0, ρj ]d )}. We have Proposition 1.6. (i) For d = 1, let l := lim inf jP(ρ ≥ j) > 1 and L := lim sup jP(ρ ≥ j) < ∞. j→∞ j→∞ We have Pp (N is eventually doubly covered) = 3 ( 1 0 if p > 1/l if p < 1/L. (ii) For d ≥ 2, we have Pp (Nd is eventually doubly covered) = ( 1 0 if lim inf j→∞ jP(ρ ≥ j) > 0 if limj→∞ jP(ρ ≥ j) = 0. In stochastic geometry the notion of coverage of space has received widespread attention. In particular Hall (1988) and Chiu, et al (2013) provide a review of the topics studied. Our endeavour in this paper may be viewed as an effort to introduce a notion of ‘reinforced coverage’. 2 Proof of Proposition 1.5 Let S be the event that "the firework process percolates" and S̃ be the event that "the reverse firework process percolates". Observe that, S= ∞ [ ∞ \ ∞ [ ([ρn−i ≥ i + 1] ∩ [ρn−j ≥ j + 1]) , n=1 i=1 j=1,j6=i and S̃ = ∞ [ ∞ \ ∞ [ ([ρn+i ≥ i] ∩ [ρn+j ≥ j]) . n=1 i=1 j=1,j6=i We will show that if p > 1/l, then we have P(S) = 1, P(S̃) = 1 and if p < 1/L, then P(S) = 0, P(S̃) = 0. We prove the proposition for the firework process, a similar proof works for the reverse firework process. Using De Morgan’s law, we have Sc = ∞ \ ∞ [ ∞ \ ([ρn−i ≤ i] ∪ [ρn−j ≤ j]) . n=1 i=1 j=1,j6=i 4 Since p > 1/l, there exists η > 1 such that l > η/p. Also let i0 be such that iP(ρ ≥ i) > ηp , for all i ≥ i0 . Therefore, for all i, j ≥ i0 and each fixed n,   ∞ ∞ \ \ P ([ρn−i ≤ i] ∪ [ρn−j ≤ j]) i=i0 j=i0 ,j6=i     ∞ ∞ ∞ ∞   \ \ \ \ [ρn−i ≤ i]  [ρn−j ≤ j]) ∪ = P     j=i0 i=j+1 i=i0 j=i+1     ∞ ∞ ∞ ∞ \ \ \ \ [ρn−i ≤ i] [ρn−j ≤ j] + P  = P j=i0 i=j+1 i=i0 j=i+1  ≤ P = ≤ ≤ ∞ \ ∞ Y [1 − j=i0 +1 ∞ Y [1 − [ρn−i ≤ i] i=i0 +1 [1 − P(ρ ≥ j + 1)] + j=i0 +1 ∞ Y 1 j+1 ] ∞ \ [ρn−j ≤ j] + P j=i0 +1 j=i0 +1 Q But, ∞ j=i0 +1 [1 − Finally  ∞ Y ! [1 − P(ρ ≥ i + 1)] i=i0 +1 ∞ Y η η [1 − ]+ ] p(j + 1) p(i + 1) i=i +1 0 ∞ Y 1 ]+ j+1 i=i = 0 as well as [1 − 0 +1 Q∞ i=i0 +1 [1 1 ]. i+1 − 1 i+1 ] = 0. Therefore, P(S c ) = 0. P(percolation among sceptic individuals) ≤ P(percolation among ‘non sceptical’ individuals) =0 for p < 1/L , where the equality above follows from Theorem 2.1 of Junior, Machado and Ravishankar (2016). 3 Proof of Proposition 1.6 As mentioned earlier (i) of Proposition 1.6 is just Proposition 1.5 rephrased. Thus we need to prove (ii). First note that from Proposition 3.2(a) of Athreya, Roy and Sarkar (2004), we know that if limj−→∞ jP(ρ ≥ j) = 0 then Pp (Nd is eventually covered) = 0, and so Pp (Nd is eventually doubly covered) = 0. 5 We prove Proposition 1.6 (ii) for the case d = 2; the proof carries through in a straightforward fashion for higher dimensions. Fix 0 < p < 1 and we assume that lim inf j−→∞ jP(ρ ≥ j) > 0. For (i, j) ∈ N2 , define Bi,j := {(i, j) 6∈ D}. If we show that, for some N ≥ 1, X Pp (Bi,j ) < ∞, i,j≥N then Borel-Cantelli lemma guarantees that, with probability 1, there exists N0 ≥ 1 such that (i, j) ∈ D for all i, j ≥ N0 , i.e. we have eventual coverage. For u := (i − l1 , j − l2 ) ∈ N2 with 1 ≤ l1 ≤ i, 1 ≤ l2 ≤ j, we observe that (i, j) ∈ u + [0, ρu ]2 if and only if ρu ≥ max{l1 , l2 }. Also note that for i ≥ j and 0 ≤ t ≤ j − 1 there are exactly 2t + 1 vertices (i − l1 , j − l2 ) with max{l1 , l2 } = t (viz. {(i − l1 , j − l2 ) : l1 = t and 0 ≤ l2 ≤ t or l2 = t and 0 ≤ l1 ≤ t}), while for j ≤ t ≤ i there are exactly j vertices (i − l1 , j − l2 ) with max{l1 , l2 } = t (viz. {(i − l1 , j − l2 ) : l1 = t and 0 ≤ l2 ≤ j − 1}). Thus, for Ai,j := {(i, j) 6∈ C}, and, for i ≥ j, Pp (Bi,j ) = Pp (Ai,j )+ i−j Y [1 − pG(k + j − 1)] k=1 j−1 Y [1 − pG(t)] 2t+1  j−1 X j  pG(t) [1 − pG(t)] t=0 j−1 Y 2t [1 − pG(l)] 2l+1   +  l6=t,l=0 t=0 ×  i−j X  pG(k + j − 1) [1 − pG(k + j − 1)] j−1 i−j Y [1 − pG(l + j − 1)] Noting that for i ≥ j Pp (Ai,j ) = j−1 Y [1 − pG(l)] 2l+1 l=0 i−j Y [1 − pG(k + j − 1)] . (2)  l6=k,l=1 k=1 j   j k=1 (the last product is taken to be 1 if i = j), (2) simplifies to Pp (Bi,j ) = Pp (Ai,j ) + pPp (Ai,j ) i−1 X t=0 G(t) . 1 − pG(t) (3) Before we proceed we fix some quantities. Since lim inf jP(ρ ≥ j) > 0 we may choose j−→∞ η > 0 such that lim inf jP(ρ ≥ j) > η. Also, for this η and our fixed p ∈ (0, 1) let a be j−→∞ 6 such 0 < e−pη < a < 1. Now we choose N ≥ 1 such that for all j ≥ N the following hold: (i) jP(ρ ≥ j) > η, (ii) (1 − pηj −1 )j < a, (4) (iii) pjη > 1. Note that (ii) above guarantees that for all j ≥ N , we have (1 − pG(j))j < a. From the proof of Proposition 3.2(b) of Athreya, Roy and Sarkar (2004) we know that, for j ≥ N , ∞ X Pp (Ai,j ) < ∞. i=1 Thus if we show that, for j ≥ N , ∞ X Pp (Ai,j ) i−1 X t=0 i=1 G(t) <∞ 1 − pG(t) (5) then we will have ∞ X Pp (Bi,j ) < ∞ whenever j ≥ N. (6) i=1 Note that, i−1 X t=0 ∞ X Pp (Ai,j ) i=j = j−1 k=1 i−j X k=1 ∞ j−1 Y X G(k + j − 1) 1 − pG(k + j − 1) [1 − pG(t)]2t+1 i=j t=0 = j−1 Y j−1 Y i−j Y [1 − pG(l + j − 1)]j l=1 [1 − pG(t)]2t+1 t=0 = i−j X G(t) X G(k + j − 1) G(t) = + . Now, for fixed j ≥ N , 1 − pG(t) 1 − pG(t) 1 − pG(k + j − 1) t=0 ∞ i−1 Y X k=1 [1 − pG(l)]j−1 2t+1 t=0 ∞ X ∞ i−1 X Y  i−1 X  i=j l=j [1 − pG(t)] i−j X G(k + j − 1) 1 − pG(k + j − 1) G(k) j−1 [1 − pG(h)] h6=k,h=j k=j [1 − pG(l)] i−1 Y G(k) i−1 Y [1 − pG(h)] for j ≥ N. Taking ∞ i−1 X Y [1 − pG(l)]  h6=k,h=j k=j i=k+1 l=j ek :=   j−1 G(k) i−1 Y h6=k,h=j i=k+1 l=j 7 [1 − pG(h)] (7) as the inner sum in (7), we have ek =G(k) k Y [1 − pG(l)]j−1 l=j k−1 Y [1 − pG(h)] h=j × ∞ X 1+ i Y [1 − pG(l)] i=k+1 l=k+1 =G(k) k Y [1 − pG(l)]j−1 l=j k−1 Y i Y j−1 [1 − pG(h)] h=k+1 ! [1 − pG(h)] 1 + [1 − pG(k)]j h=j h × 1+ ∞ X i Y [1 − pG(l)] j−1 i=k+2 l=k+2 i Y [1 − pG(h)] h=k+2 i ! . (8) ! (9) Similarly, for ek+1 , as in the term in the first equality above, we have ek+1 =G(k + 1) k+1 Y [1 − pG(l)]j−1 l=j × k Y [1 − pG(h)] h=j 1+ ∞ X i Y [1 − pG(l)] j−1 i=k+3 l=k+3 i Y [1 − pG(h)] . h=k+3 Taking C(k, j) := 1 + ∞ X i Y [1 − pG(l)] j−1 i=k+2 l=k+2 i Y [1 − pG(h)] h=k+2 we see that j−1 ek+1 [1 − pG(k)] G(k + 1) [1 − pG(k + 1)] = C(k, j) j . ek G(k) 1 + C(k, j) [1 − pG(k + 1)] Now, G(k+1) G(k) (10) ≤ 1 for all k ≥ 0, and, for fixed j, j−1 (i) for k large enough, 0.9 < [1 − pG(k + 1)] [1 − pG(k + 1)] ≤ 1; (ii) for j ≥ N , from equation (3.5) of Athreya, Roy and Sarkar (2004), we have P∞ Qi j−1 < ∞ and hence i=k+2 l=k+2 [1 − pG(l)] ∞ X i Y [1 − pG(l)] i=k+2 l=k+2 j−1 i Y [1 − pG(h)] < ∞; h=k+2 which ensures that, for k large enough, 1 ≤ C(k, j) < 1.1. 1.1 Thus, for j ≥ N and k large enough, we have ek+1 ek < 1.9 , and so, by ratio test, ∞. This shows, from (7), that (5) and thereby (6) hold. 8 P∞ k=1 ek < P Now we show that, for N as above, i,j≥N Pp (Bi,j ) < ∞. Towards this, we first observe that, for i, j ≥ 1, by symmetry we have Pp (Bi,j ) = Pp (Bj,i ), thus we need to show X Pp (Bi,j ) = 2 i,j≥N ∞ X i−1 X Pp (Bi,j ) + i=N j=N ∞ X (11) Pp (Bi,i ) < ∞. i=N We will show separately that ∞ X i−1 X Pp (Bi,j ) < ∞ and i=N j=N ∞ X (12) Pp (Bi,i ) < ∞. i=N First, for any i, j ≥ 1, " Pp (Bi,j ) = 1 + p i−1 X t=0 # G(t) Pp (Ai,j ). 1 − pG(t) From the proof of Proposition 3.2(b) of Athreya, Roy and Sarkar (2004) we know that, ∞ X i−1 X Pp (Ai,j ) < ∞ and i=N j=N ∞ X Pp (Ai,i ) < ∞, i=N thus we need to show that ∞ X i−1 X i−1 X i=N j=N t=0 ∞ X i−1 X G(t) G(t) Pp (Ai,j ) < ∞ and Pp (Ai,i ) < ∞. 1 − pG(t) 1 − pG(t) t=0 (13) i=N For the first sum, interchanging the order of summation we have ∞ X i−1 X i−1 X i=N j=N t=0 ∞ ∞ X X G(t) G(t) Pp (Ai,j ) = 1 − pG(t) 1 − pG(t) t=0 ∞ X Pp (Ai,j ). j=N +1 i=max(t+1,j+1) Also breaking up the inner two sums according to the values taken by i, writing out the expression for Pp (Ai,j ) and collecting terms together, we have ∞ X ∞ X Pp (Ai,j ) j=N +1 i=max(t+1,j+1) = ∞ X ∞ X Pp (AN +r,N +m ) m=1 r=max(t−N +1,m+1) = t−N X ∞ X m=1 r=t+1−N + ∞ X N +m−1 Y [1 − pG(l)]2l+1 l=0 ∞ X m=t−N +1 r=m+1 r−m Y [1 − pG(k + N + m − 1)]N +m k=1 N +m−1 Y [1 − pG(l)] 2l+1 l=0 r−m Y k=1 9 N +m [1 − pG(k + N + m − 1)] ). G(t) 1−pG(t) , To simplify the expressions we take σt := N +m g(k, m) := [1 − pG(k + N + m − 1)] equations we have ∞ X i−1 X i−1 X i=N j=N t=0 [1 − pG(l)] 2l+1 and l=0 . Using this notation, from the previous two ∞ t−N X X G(t) Pp (Ai,j ) = σt 1 − pG(t) t=1 m=1 + N +m−1 Y sm := ∞ X ∞ X sm r=t+1−N ∞ X σt r−m Y g(k, m) k=1 ∞ X sm m=t−N +1 r=m+1 t=1 r−m Y g(k, m). (14) k=1 We start with the first term on the right in the above equation. Reordering the sums, we have ∞ X t=1 σt t−N X ∞ X sm m=1 r=t+1−N r−m Y g(k, m) = ∞ X sm m=1 k=1 Let ∞ X αm := sm ∞ X ∞ X σt t=m+N σt t=m+N ∞ X r−m Y r−m Y g(k, m). (15) r=t+1−N k=1 g(k, m) r=t+1−N k=1 denote the summand. Observe that ∞ X sm+1 t=m+1+N αm+1 = ∞ αm sm X r=t+1−N ∞ X r−m−1 Y σt t=m+N = [1 − pG(N + ∞ X σt k=1 r−m Y ∞ X σt t=m+1+N ∞ r−m X Y r=t+1−N ∞ X r−m−1 Y k=1 r−m Y σt = [1 − pG(N + m)]N +m ∞ X ∞ X σt t=m+N σm+N [1−pG(N +m)]N +m+1 g(k, m) r=t+1−N k=1 t=m+1+N m)]2(N +m)+1 ∞ X × g(k, m + 1) ∞ X g(k, m) + g(k, m) r=t+1−N k=1 r=t+1−N r=m+1 k=1 g(k, m + 1) r−m−1 Y k=1 ∞ X g(k, m + 1) t=m+1+N σt ∞ X r=t+1−N r−m−1 Y . g(k, m + 1) k=1 By our choice of N and 0 < a < 1 as in (4), we have [1 − pG(N + m)]N +m < a. All P∞ P∞ Qr−m−1 terms above being non-negative, if t=m+1+N σt r=t+1−N k=1 g(k, m + 1) < ∞, 10 then ααm+1 < a; and so an application of the ratio test will yield that the sum in (15) is m finite. P∞ P∞ Qr−m−1 To show t=m+1+N σt r=t+1−N k=1 g(k, m + 1) < ∞, we again apply a ratio P∞ Qr−m−1 test. Let τt := σt r=t+1−N k=1 g(k, m + 1) < ∞. Then, G(t + 1) τt+1 = [1 − pG(t)] τt G(t) [1 − pG(t + 1)] N +m ∞ X 1+ r Y ! g(k, m + 1) r=t+2−N −m k=t+2−N −m ∞ r X Y × N +m+1 1+ 1 + [1 − pG(t + 1)] g(k, m + 1) r=t+2−N −m k=t+2−N −m Note that ∞ X r Y !. g(k, m + 1) < ∞ (from Athreya, Roy and Sarkar (2004)) r=t+2−N −m k=t+2−N −m and so we may obtain a t0 such that, for all t ≥ t0 , (i) 1 ≤ 1 + ∞ X r Y g(k, m + 1) < 1.1 and r=t+2−N −m k=t+2−N −m N +m+1 (ii) [1 − pG(t + 1)] 1+ ∞ X r Y ! g(k, m + 1) r=t+2−N −m k=t+2−N −m This choice of t0 ensures that for all t ≥ t0 we have ∞ X t=m+1+N σt ∞ X r=t+1−N r−m−1 Y τt+1 τt > 0.9. < 1.1/1.9, and hence g(k, m + 1) < ∞. k=1 Thus the first term on the right of (14) is finite. A similar calculation and a use of ratio test shows that the second term on the right of (14) is finite, thereby showing that the sum in (14) is finite. Reordering the second sum in (11) and using the notation we introduced earlier, we have ∞ X i−1 X i=N t=0 N −1 X ∞ ∞ X ∞ X X G(t) σt Pp (Ai,i ). Pp (Ai,i ) = σt Pp (Ai,i ) + 1 − pG(t) t=0 i=t+1 i=N (16) t=N From the end of Section 3.1 of Athreya, Roy and Sarkar (2004) we know that with N as PN −1 P∞ P∞ above, i=N σt Pp (Ai,i ) < ∞ and hence t=0 i=N σt Pp (Ai,i ) < ∞. Expanding the term Pp (Ai,i ), we have ∞ X ∞ X t=N i=t+1 σt Pp (Ai,i ) = ∞ X ∞ X t=N i=t+1 11 σt i−1 Y l=0 [1 − pG(l)] 2l+1 (17) Taking at := σt see that P∞ i=t+1 at := σt Qi−1 t Y l=0 [1 − pG(l)] [1 − pG(l)] 2l+1 2l+1 l=1 from which we have and lt := P∞ r=t+2 Qr l=t+2 [1 − pG(l)] 2l+1 , we n o 2t+3 1 + [1 − pG(t + 1)] (1 + lt ) ; 2t+3 at+1 [1 − pG(t)] [1 − pG(t + 1)] (1 + lt ) G(t + 1)   = 2t+3 at G(t) [1 − pG(t + 1)] 1 + [1 − pG(t + 1)] (1 + lt ) 2t+2 = (1 + lt ) G(t + 1) [1 − pG(t)] [1 − pG(t + 1)] 2t+3 G(t) 1 + [1 − pG(t + 1)] (1 + lt ) ≤ (1 + lt ) G(t + 1) [1 − pG(t + 1)] 2t+3 G(t) 1 + [1 − pG(t + 1)] (1 + lt ) 2t+2 Also, with a as in (4), Qr+1 l=t+2 Qr l=t+2 [1 − pG(l)] 2l+1 [1 − pG(l)] 2l+1 2r+3 = [1 − pG(r + 1)]  pη < 1−p r+1 2r+3 < a for r ≥ N, so, by the ratio test lt < ∞ for t ≥ N . Now, since lt → 0 as t → ∞, from the remark 2t+2 following (4) we may obtain a t0 such that for t ≥ t0 , we have [1 − pG(t + 1)] (1 + lt ) < G(t+1) a < 1. Also G(t) < 1 for all t, thus at+1 < a for all t ≥ t0 , at and by ratio test we have that the sum in (16) is finite. This completes the proof of Proposition 1.6 (ii). References 1. Athreya, S., Roy, R. and Sarkar, A. (2004). On the coverage of space by random sets. Adv. Appl. Probab. (SGSA), 36, 1–18. 2. Chiu, S.N, Stoyan, D., N., Kendall, W.S., V. and Mecke, J. (2013). Stochastic geometry and its applications 3rd Ed., John Wiley, Chichester. 12 3. Gallo, S., Garcia, N., Junior, V. and Rodríguez, P. (2014). Rumor Processes on N and discrete renewal processes. J. Stat. Physics, 155, 591–602. 4. Hall, P. (1988). Introduction to the theory of coverage processes John Wiley, New York. 5. Junior, V., Machado, F. and Zuluaga, M. (2011), Rumor processes on N. J.. Appl. Probab., 48, 624–636. 6. Junior, V., Machado, F. and Ravishankar, K. (2016) The rumor percolation model and its variations. arXiv:1612.03853. 13
10
A Note on Fault Tolerant Reachability for Directed Graphs Loukas Georgiadis1 Robert E. Tarjan2 arXiv:1511.07741v1 [cs.DS] 24 Nov 2015 February 26, 2018 In this note we describe an application of low-high orders [2] in fault-tolerant network design. Baswana et al. [1] study the following reachability problem. We are given a flow graph G = (V, A) with start vertex s, and a spanning tree T = (V, AT ) rooted at s. We call a set of arcs A′ valid if the subgraph G′ = (V, AT ∪ A′ ) of G has the same dominators as G. The goal is to find a valid set of minimum size. Baswana et al. [1] show that there is a valid set containing at most n − 1 arcs, and they give an algorithm to compute a minimum-size valid set in O(m log n) time, where n = |V | and m = |A|. Their algorithm is based on generalizing the notion of semi-dominators [3] from a depth-first spanning tree to an arbitrary spanning tree. Here we give a simple algorithm, Algorithm 9 below, to compute a minimum-size valid set in O(m) time, given the dominator tree D and a low-high order of it. Since D and a low-high order can be computed in O(m) time [2], so can a minimum-size valid set. Algorithm 9: Construction of a minimum-size valid set A′ Initialize A′ to be empty. For each vertex v 6= s, apply the appropriate one of the following cases, where t(v) and d(v) are the parent of v in T and D respectively (d(v) is the immediate dominator of v): Case 1: t(v) = d(v). Do nothing. Case 2: t(v) 6= d(v) and (d(v), v) ∈ A. Add (d(v), v) to A′ . Case 3: (d(v), v) 6∈ A. Subcase 3a: t(v) > v. Add to A′ an arc (x, v) with x < v. Subcase 3b: t(v) < v. Add to A′ an arc (x, v) with x > v and x not a descendant of v in D. Theorem 1. The set A′ computed by Algorithm 9 is a minimum-size valid set. Proof. First, we show that in each occurrence of Cases 2 and 3, an arc will be added to A′ . This is obvious for Case 2. To show that this is true for Case 3, we use the definition of a low-high order [2, Section 2]: for any vertex v 6= s such that (d(v), v) 6∈ A, there are two arcs (u, v) and (w, v) such that u < v < w and w is not a descendant of v in D. Only one of these arcs can be in T . It 1 Department of Computer Science & Engineering, University of Ioannina, Greece. E-mail: [email protected]. Department of Computer Science, Princeton University, 35 Olden Street, Princeton, NJ, 08540, and Intertrust Technologies. E-mail: [email protected]. 2 1 follows that in both Case 3a and Case 3b, there is an arc that satisfies the stated constraint, and hence such an arc will be added to A′ . Second, we show that A′ is valid. To do this, we use the notion of a pair of divergent spanning trees from [2]. Two spanning trees B and R, both rooted at s, are divergent if, for every vertex v, the paths from s to v in B and R have only the dominators of v in common. Algorithm 1′ below, which simplifies Algorithm 1 in [2] as discussed just before Theorem 2.10 in [2], constructs two divergent spanning trees, provided that each step is successful: the proof of Theorem 2.8 in [2] applies to Algorithm 1′ equally as well as to the original Algorithm 1. Indeed, as does Algorithm 1, Algorithm 1′ constructs a pair of strongly divergent spanning trees, but here we need only the weaker property of divergence. Algorithm 1′ : Construction of Two Divergent Spanning Trees B and R Let D be the dominator tree of flow graph G = (V, A), with a preorder that is a low-high order of G. For each vertex v 6= s, apply the appropriate one of the following cases to choose arcs (b(v), v) in B and (r(v), v) in R: Case 1: (d(v), v) ∈ A. Set b(v) = r(v) = t(v). Case 2: (d(v), v) 6∈ A. Choose two arcs (u, v) and (w, v) such that u < v < w in low-high order and w is not a descendant of v in D. Set b(v) = u and r(v) = w. Suppose we apply Algorithm 1′ to G, but only allow it to choose arcs that are in subgraph G′ . Suppose Case 1 of Algorithm 1′ applies to v. Then (d(v), v) is in G. But the construction of A′ guarantees that (d(v), v) is in G′ as well. Hence this case will add an arc in G′ , namely (d(v), v), to both B and R. Suppose Case 2 of Algorithm 1′ applies to v. Then (d(v), v) is not in G. Algorithm 9 will apply Case 3 to v, which guarantees that G′ contains arcs (u, v) and (w, v) such that u < v < w (in low-high order) and w is not a descendant of v in D: if t(v) > v, t(v) cannot be a descendant of v in D since there is a v-avoiding path in T from s to t(v). Hence this case can successfully choose arcs in G′ to add to B and R. We conclude that G′ contains two spanning trees that are divergent in G. It follows that if v dominates w in G′ , v dominates w in G. The converse is immediate, since G′ is a subgraph of G. Thus A′ is valid. Finally, we show that A′ is minimum-size. Set A′ contains an arc (u, v) only if t(v) 6= d(v). Any valid set must contain an arc entering v, since otherwise t(v) dominates v in G′ , contradicting validity. References [1] S. Baswana, K. Choudhary, and L. Roditty. Fault tolerant reachability for directed graphs. In Yoram Moses, editor, Distributed Computing, volume 9363 of Lecture Notes in Computer Science, pages 528–543. Springer Berlin Heidelberg, 2015. [2] L. Georgiadis and R. E. Tarjan. Dominator tree certification and divergent spanning trees. ACM Transactions on Algorithms, 12(1):11:1–11:42, November 2015. [3] T. Lengauer and R. E. Tarjan. A fast algorithm for finding dominators in a flowgraph. ACM Transactions on Programming Languages and Systems, 1(1):121–41, 1979. 2
8
Asymptotic equivalence of paired Hotelling test and conditional logistic regression arXiv:1610.06774v1 [math.ST] 21 Oct 2016 Félix Balazard1,2 1 2 Sorbonne Universités, UPMC Univ Paris 06, CNRS INSERM U1169, Hôpital Bicêtre, Université Paris-Sud, [email protected] Abstract Matching, the stratification of observations, is of primary importance for the analysis of observational studies. We show that the score test of conditional logistic regression and the paired Student/Hotelling test, two tests for paired data, are asymptotically equivalent. Keywords: matching, conditional logistic regression, asymptotic equivalence, paired Student test, observational studies. 1 Introduction Observational studies are the main source of information in many areas of science such as epidemiology or the social and political sciences (Rosenbaum, 2002). Such studies aim at estimating the effect of a treatment on an outcome and they differ from randomized experiments by the absence of random allocation of treatment. This lack of randomization is due to ethical or economical considerations and as a consequence, observational studies are subject to confounding. In the typical context of an observational study, we have n observations of a random outcome Y and a random predictor or treatment X. The analysis is complicated by the possibility of confounding i.e., the influence of a third variable Z on X or Y . To take an example, suppose Y is lung cancer, X is yellow coloration of the teeth and Z is smoker status. If we do not take into account Z, we will find an association between Y and X but if we control for Z, the association will disappear since both lung cancer and yellow coloration of the teeth are caused by smoking. In a randomized experiment, randomization will ensure that the treated and non-treated group have similar values for all confounders. Matching is an important method to control for bias in observational studies. Matching is the grouping of observations in strata. Such a grouping is necessary when the observations in a strata cannot be considered independent. For example, consider a continuous variable, such as blood pressure, which is measured before and after the beginning of a medical treatment given to a group of patients. In order to show that the treatment is effective, an incorrect 1 approach would be to compare the mean of the group before treatment to the mean after treatment using a two-samples Student test. This naive approach relies on the unwarranted assumption of independence of the measurement of the same patient before and after the treatment. The correct approach is to compute the difference between blood pressure before and after treatment for each patient and then to test if the differences have zero mean using a Student test. This is called the paired Student test. In this simple example, the stratas are the pairs of observations of the same patient. In presence of confounding, matching on the values of the confounder remove bias (Rubin, 1973) or when there are several confounders, other techniques based on matching can be used (Rosenbaum and Rubin, 1983). Matching can also guide the data collection of an observational study. This is best illustrated by the case-control study in epidemiology. Such a study begins by gathering disease cases for example at hospitals. The recruitment of controls is less straightforward than the recruitment of cases and must try and limit confounding. One way of achieving this is to choose controls that are naturally matched to cases: for each case, controls are chosen among friends or neighbors whose –potentially unobserved– confounders are similar to that of the case. As the case and his controls have been chosen for their similarity, they cannot be considered independent and must be grouped in a strata. Once a matching is obtained, adapted statistical procedures are needed and especially statistically sound testing procedures. A good reference on statistical methods for matched data is the monograph by Breslow and Day (1981). For strata limited to pairs of one case and one control (or before and after treatment) and when the predictor X is a binary variable, the so-called McNemar test can be used (McNemar, 1947). In this simple case, there are only 4 possibilities for each pair. The data can be summarized in the following two-by-two contingency table. Table 1: McNemar test Y =1 X=0 X=1 X=0 a b Y =0 X=1 c d In the table above, a + d is the number of pairs of a case and a control concordant for the predictor X and b + c is the number of discordant pairs. The statistic ξmc of the McNemar test depends only on the numbers of discordant pairs b and c and has the following form: ξmc = (b − c)2 . b+c Under the null hypothesis of independence between Y and X, ξmc follows the χ2 distribution asymptotically (McNemar, 1947). This test statistic has the advantage of being computationally simple. However, in many settings, we have access to more than one control for each case. For example, in the Isis-Diab study (Balazard et al., 2016), each patient was asked to recruit two controls . A test for strata of arbitrary size and a binary predictor was proposed in Mantel and Haenszel (1959) and is now referred to as the Cochran-Mantel-Haenszel (CMH) test. It 2 also provides an estimate of the odd-ratio associated with the predictor. The original article contains an interesting discussion of practical aspects of the prospective study of disease. If the predictor is not binary but continuous, appropriate tests are available if the matching is a pairing i.e., each case has exactly one control. If the vector of differences between cases and controls can be assumed to be normally distributed, a Student test can be applied on this vector to decide if its mean is zero as in our first example. The resulting test is called the paired Student test (McDonald, 2009, p180-185). The paired Hotelling test is the generalization of the paired Student test when there are several predictors. When the normality assumption is not respected, a non-parametric alternative is available via the Wilcoxon signed rank test. None of the above procedures allow for analysis of continuous variables with arbitrary strata size. This was made possible by conditional logistic regression (CLR) first introduced in Breslow et al. (1978). CLR is however not limited to continuous variables and can be applied in all settings of the previous tests. As CLR is based on logistic regression, it is more flexible than the previous tests and allows for multivariate analyses. When different statistical tests are available for the same data, it is desirable to prove that their results are similar. For procedures based on maximum likelihood such as CLR, the three tests of significance for predictors (the Wald test, the likelihood ratio test and the score test) have been shown to be asymptotically equivalent (Engle, 1984). This result of asymptotic equivalence is with respect to the null hypothesis as well as to a sequence of local alternatives. For the analysis of matched data with a binary predictor, the available tests have been shown to be identical. When the strata are pairs, both the CMH test and the McNemar test can be applied and their statistic is identical (Agresti and Kateri, 2011, p413). When the strata size is arbitrary, CMH and CLR can be applied and the CMH statistic is identical to the score test statistic of CLR (Day and Byar, 1979) and therefore if the strata are pairs, the McNemar statistic will be identical to the score test statistic of CLR. When the strata are pairs and the predictor (resp. predictors) is continuous, the paired Student test (resp. paired Hotelling test) and CLR can be applied. However, to the best of the author’s knowledge, there are no results comparing the two procedures in that case. The objective of this note is to prove that the paired Hotelling test is asymptotically equivalent to the score test of CLR and therefore also to the Wald and likelihood ratio tests. We start by deriving the exact form of the two test statistics in section 2. Finally, we present our result and prove it in section 3. 2 Test statistics Let Yi` be the label of the `-th individual of the i-th stratum and Xi` ∈ Rp its continuous predictor value. The paired Hotelling test can be applied when stratas are pairs of discordant observations and therefore ` ∈ {1, 2}. Without loss of generality, we can assume that Yi1 = 1 and Yi2 = 0. We are interested in testing the null hypothesis: H0 : There is no association between Y and X 3 (1) against the alternative hypothesis: H1 : There is an association between Y and X. To test this null hypothesis in this setting, we have two options: the paired Hotelling test whose test statistic we denote ξhot or CLR whose score test statistic we denote ξsc . We now derive the expressions of those two test statistics. As we will show below, the paired Hotelling test and CLR depend only on the vector of differences between pairs. We therefore denote Zi = Xi1 − Xi2 the difference between pairs. Paired Hotelling test The hypotheses tested by the paired Hotelling test are expressed by the parameter µ = (E[Zj ])j∈{1,...,p} , the mean of the difference between pairs. Using this parameter, the hypothesis (2) becomes H0 : µ = 0. Let the unbiased sample covariance be defined as: n C= where Z̄ = 1 n Pn i=1 1 X (Zi − Z̄)(Zi − Z̄)> , n − 1 i=1 Zi and ∗> is the transposition operator. The statistic of the test is: ξhot = nZ̄ > C −1 Z̄. (2) When Z follows a centered Gaussian distribution, the distribution of ξhot is called the Hotelling distribution. Conditional Logistic Regression score test In logistic regression, the likelihood of an observation, given the parameters α ∈ R and β ∈ Rp , equals: > ey(α+β X) P(Y = y|X) = , > 1 + eα+β X with y ∈ {0, 1}. Logistic regression can take into account stratification by having a different constant term αi for each stratum. However, when the strata are small e.g., pairs, this leads to a large number of parameters and biases parameter estimation (Breslow and Day, 1981, p249-251). Conditional logistic regression adresses the problem by conditioning the likelihood on the number of cases in each stratum. This eliminates the need to estimate the αi . In the case of pairings, when the first observation is a case and the second is a control, the conditional likelihood of the i-th strata is: 4 P(Yi1 = 1, Yi2 = 0|Xi1 , Xi2 , Yi1 + Yi2 = 1) P(Yi1 = 1|Xi1 )P(Yi2 = 0|Xi2 ) = P(Yi1 = 1|Xi1 )P(Yi2 = 0|Xi2 ) + P(Yi1 = 0|Xi1 )P(Yi2 = 1|Xi2 ) = = = exp(αi +β > Xi1 ) 1+exp(αi +β > Xi1 ) × 1 1+exp(αi +β > Xi2 ) exp(αi +β > Xi1 ) exp(αi +β > Xi2 ) × 1+exp(α 1+β> X ) + 1+exp(α 1+β> X ) × 1+exp(α > 1+exp(αi +β > Xi1 ) i i2 i i1 i +β Xi2 ) exp(β > Xi1 ) (The αi have been eliminated.) exp(β > Xi1 ) + exp(β > Xi2 ) 1 . 1 + exp(β > (Xi2 − Xi1 )) In the general case, when there is k cases in a strata of size m, with the cases being the first k observations, the conditional likelihood of a strata can be written: P m X exp( kj=1 β > Xij ) P(Yij = 1 for j ≤ k, Yij = 0 for j > k|Xi1 , . . . , Xim , Yij = k) = P , P > exp(β X ) m ij J∈C j∈J j=1 k where Ckm is the set of all subsets of size k of the set {1, . . . , m}. To obtain the full conditional likelihood, we multiply over each stratum and take the log to obtain the log-likelihood L(β, Z): L(β, Z) = − n X log(1 + e−β > Zi ). i=1 The score s(β, Z) is then defined by: n X Zi ∂L (β, Z) = s(β, Z) = . > ∂β exp(β Zi ) + 1 i=1 If β = β 0 , the covariance matrix of s(β 0 , Z) is Fisher’s information matrix: !   n X Zij Zik exp(β > Z ) ∂ 2L i 0 I(β 0 ) = E[− (β , z)|β 0 ] = > ∂β j ∂β k 0 (exp(β Z ) + 1)2 0 i j,k∈{1,...,p} i=1 . j,k∈{1,...,p} To test the hypothesis H0 : β = β 0 , the score test statistic is: ξsc = s(β 0 , Z)> I(β 0 , z)−1 s(β 0 , Z) Expressed using β, hypothesis (2) becomes H0 : β = 0. As shown above, the null hypothesis of the paired Hotelling test is expressed using µ, the mean of the difference between pairs, rather than β, the regression coefficient. There is no general correspondence between the two parameters. However, the two null hypotheses that are of interest in practice are the same: µ = 0 ⇐⇒ β = 0. 5 For β = 0, the score, Fisher’s information matrix and the test statistic become: n s(0, Z) = Z̄, 2 n 1X Zi Zi> I(0, Z) = 4 i=1 and n ξsc = nZ̄ > 1X Zi Zi> n i=1 !−1 Z̄. (3) Now that we have expressed analytically ξhot and ξsc , we state our result in the following section. 3 Asymptotic equivalence In this section, we introduce the sequence of local alternatives and state the result of asymptotic equivalence between the two tests. We adopt the framework of Engle (1984) for asymptotic equivalence. The motivation for considering a sequence of local alternatives is that any reasonable test will have the right size and will reject a fixed alternative when the number of observations becomes large. The sequence of local alternatives considers deviations from the null that approach the null as sample size increases. This allows to compare tests more precisely. (n) We model the sequence of local alternatives by a triangular array of observations (Zi )n∈N,i∈{1,...,n} that respects the following assumption. Let δ ∈ Rp and Σ be a positive definite matrix of dimension p. (n) Assumption 1. For all n ∈ N, i ∈ {1, . . . , n}, we have E[Zi ] = (n) In addition, Wi (n) = Zi − √δ n √δ n (n) and Cov[Zi ] = Σ. are independent and identically distributed. The triangular array of Assumption 1 is the sequence of local alternatives. The parameter δ controls the deviation from the null. The √ null hypothesis is the special case of the sequence of local alternatives when δ = 0. The n in the denominator of the deviation shrinks the deviation towards the null as the sample size increases. This particular power of n ensures that the test statistics are well-behaved as they converge in distribution. We denote ξsc,n (resp. ξhot,n ) the statistic of the score test (resp. of the paired Hotelling test) associated with Z (n) , the n-th line of the triangular array of Assumption 1. In the same fashion as for the Student distribution and the χ2 distribution, the Hotelling distribution with degrees of freedom p and n − 1 and the χ2p distribution are different for P finite samples but they are the same asymptotically. Therefore, ξsc,n −ξhot,n − → 0 is enough to guarantee asymptotic equivalence. Our theorem is more precise as it includes the convergence rate and limiting distribution of this difference. We note the convergence in distribution d. Theorem 1. Under the null or a sequence of local alternatives, the paired Hotelling test and the score test of CLR are asymptotically equivalent. More precisely, under Assumption 1, we have: d n(ξsc,n − ξhot,n ) → − K 6  where K = (δ + V )> Σ−1 Σ − (δ + V )(δ + V )> Σ−1 (δ + V )> with V ∼ N (0, Σ) and N refers to the normal distribution. Examples of distribution of K for p = 1, Σ = σ 2 = 1 and different values of δ are shown in figure 1. We see that for small values of δ, K is concentrated between 0 and 1/4. As δ grows, the distribution shifts to large, negative values. For the practitioner, the result of Theorem 1 will not affect the choice of test but ensures that similar conclusions are reached regardless of that choice. The result also implies that CLR can be considered a generalization of the paired Hotelling or Student test when the conditions for the latter do not apply. Proof of Theorem 1 To facilitate the notation, we omit the dependence in n in most quantities, writing Z instead of Z (n) . The quantity we want to estimate is: n(ξsc,n − ξhot,n ) = n2 Z̄ > (Ĩ −1 − C −1 )Z̄ = n2 Z̄ > Ĩ −1 (C − Ĩ)C −1 Z̄, (4) P where Ĩ = n1 ni=1 Zi Zi> . The Lindeberg-Feller Central Limit Theorem for triangular arrays (Hall and Heyde, 1980, (n) Theorem 3.2 p58) applied on the Wi gives: √ d nZ̄ → − (δ + V ), (5) with V ∼ N (0, Σ). The weak law of large numbers for triangular arrays implies: P C− → Σ. (6) 1X 1X P Ĩ = Zi Zi> = (Zi − Z̄)(Zi − Z̄)> + Z̄ Z̄ > − →Σ n i=1 n i=1 (7) Combining (5) and (6), we see: n n and, using the second identity in (7), we obtain: d n(C − Ĩ) = C − nZ̄ Z̄ > → − Σ − (δ + V )(δ + V )> . Applying Slutsky’s lemma to all of the above, we conclude: d n(ξsc,n − ξhot,n ) → − K  where K = (δ + V )> Σ−1 Σ − (δ + V )(δ + V )> Σ−1 (δ + V )> with V ∼ N (0, Σ). This concludes the proof of Theorem 1. Acknowledgements The author thanks Gérard Biau for his supervision and his many comments on the manuscript. Funding: The author acknowledges a PhD grant from École Normale Supérieure. 7 Delta=1 Density 3 6 0 0 1 2 2 4 Density 4 8 5 6 10 Delta=0 −0.8 −0.6 −0.4 −0.2 0.0 0.2 −1.0 −0.8 −0.6 −0.4 −0.2 K K Delta=2 Delta=3 0.0 0.2 0.0 0.2 0.0 0.00 0.2 0.05 0.10 Density 0.6 0.4 Density 0.8 1.0 0.15 1.2 −1.0 −1.0 −0.8 −0.6 −0.4 −0.2 0.0 0.2 −1.0 K −0.8 −0.6 −0.4 −0.2 K Figure 1: Distribution of K. Distribution of the limit variable for p = 1, Σ = σ 2 = 1 and δ ∈ {0, 1, 2, 3}. 8 References References P. Rosenbaum. Observational Studies. Springer, New York, 2002. D. Rubin. Matching to remove bias in observational studies. Biometrics, 29:159–183, 1973. P. Rosenbaum and D. Rubin. The central role of the propensity score in observational studies for causal effects. Biometrika, 70:41–55, 1983. N.E. Breslow and N.E. Day. Statistical methods in cancer research. The analysis of casecontrol studies. International Agency for Research on Cancer, Lyon, 1981. Q. McNemar. Note on the sampling error of the difference between correlated proportions or percentages. Psychometrika, 12:153–157, 1947. F. Balazard, S. Le Fur, S. Valtat, Isis Diab collaborative group, A.-J. Valleron, and P. Bougnères. Association of environmental markers with childhood type 1 diabetes mellitus revealed by a long questionnaire on early life exposures and lifestyle in a case-control study. BMC Public Health, 2016. N. Mantel and W. Haenszel. Statistical aspects of the analysis of data from retrospective studies. Journal of the national cancer institute, 22:719–748, 1959. J.H. McDonald. Handbook of Biological Statistics. Sparky House Publishing, Baltimore, 2009. N.E. Breslow, N.E. Day, K.T. Halvorsen, R.L. Prentice, and C. Sabai. Estimation of multiple relative risk functions in matched case-control studies. American Journal of Epidemiology, 108:299–307, 1978. R.F. Engle. Wald, likelihood ratio, and lagrange multiplier tests in econometrics. Handbook of Econometrics, 2:775–826, 1984. A. Agresti and M. Kateri. Categorical Data Analysis. Springer, Berlin, Heidelberg, 2011. N.E. Day and D.P. Byar. Testing hypotheses in case-control studies-equivalence of mantelhaenszel statistics and logit score tests. Biometrics, 35:623–630, 1979. P. Hall and C.C. Heyde. Martingale limit theory and its application. Academic Press., New York, 1980. 9
10
Flexible and Creative Chinese Poetry Generation Using Neural Memory Jiyuan Zhang1,2 , Yang Feng3,1,4 , Dong Wang1∗, Yang Wang1 , Andrew Abel6 , Shiyue Zhang1,5 , Andi Zhang1,5 1 Center for Speech and Language Technologies(CSLT), RIIT, Tsinghua University, China 2 Shool of Software & Microelectronics, Peking University, China 3 Key Laboratory of Intelligent Information Processing,Institute of Computing Technology,CAS 4 Huilan Limited, Beijing, China 5 Beijing University of Posts and Telecommunications, China 6 Xi’an Jiaotong-Liverpool University, China zhangjy [email protected], [email protected] arXiv:1705.03773v1 [cs.AI] 10 May 2017 Abstract It has been shown that Chinese poems can be successfully generated by sequence-to-sequence neural models, particularly with the attention mechanism. A potential problem of this approach, however, is that neural models can only learn abstract rules, while poem generation is a highly creative process that involves not only rules but also innovations for which pure statistical models are not appropriate in principle. This work proposes a memory-augmented neural model for Chinese poem generation, where the neural model and the augmented memory work together to balance the requirements of linguistic accordance and aesthetic innovation, leading to innovative generations that are still rule-compliant. In addition, it is found that the memory mechanism provides interesting flexibility that can be used to generate poems with different styles. 1 Introduction Classical Chinese poetry is a special cultural heritage with over 2,000 years of history and is still fascinating us today. Among the various genres, perhaps the most popular one is the quatrain, a special style with a strict structure (four lines with five or seven characters per line), a regulated rhythmical form (the last characters in the second and fourth lines must follow the same rhythm), and a required tonal pattern (tones of characters in some positions should satisfy a predefined regulation) (Wang, 2002). This genre flourished mostly in the Tang Dynasty, and so are often called ‘Tang 1 Corresponding author: Dong Wang; RM 1-303, FIT BLDG, Tsinghua University, Beijing (100084), P.R. China. poems’. An example of a quatrain written by Wei Wang, a famous poet in the Tang Dynasty, is shown in Table 1. Due to the stringent restrictions in both rhythm and tone, it is not trivial to create a fully rule-compliant quatrain. More importantly, besides such strict regulations, a good quatrain should also read fluently, hold a consistent theme, and express a unique affection. Therefore, poem generation is widely recognized as a very intelligent activity and can be performed only by knowledgeable people with a lot of training. 乐游原 Climbing the Paradise Mound 向晚意不适, (* Z Z P Z) As I was not in a good mood this evening round, 驱车登古原。 (P P P Z P) I went by cart to climb the Ancient Paradise Mound. 夕阳无限好, (* P P Z Z) It is now nearing dusk, 只是近黄昏。 (* Z Z P P) When the setting sun is infinitely fine, which is a must. Table 1: An example of a 5-char quatrain. The tonal pattern is shown at the end of each line, where ’P’ indicates a level tone, ’Z’ indicates a downward tone, and ’*’ indicates the tone can be either. The translation is from (Tang, 2005). In this paper we are interested in machine poetry generation. Several approaches have been studied by researchers. For example, rule-based methods (Zhou et al., 2010), statistical machine translation (SMT) models (Jiang and Zhou, 2008; He et al., 2012) and neural models (Zhang and Lapata, 2014; Wang et al., 2016a,c). Compared to previous approaches (e.g., rule-based or SMT), the neural model approach tends to generate more fluent poems and some generations are so natural that even professional poets can not tell they are the work of machines (Wang et al., 2016a). In spite of these promising results, neural models suffer from a particular problem in poem generation, a lack of innovation. Due to the statistical nature of neural models, they pay much more attention to high-frequency patterns, whereas they ignore low-frequency ones. In other words, the more regular and common the patterns, the better the neural model is good at learning them and tends to use them more frequently at run-time. This property certainly helps to generate fluent sentences, but it is not always useful: the major value of poetry is not fluency, but the aesthetic innovation that can stimulate some unique feelings. This is particularly true for Chinese quatrains that are highly compact and expressive: it is nearly impossible to find two similar works in the thousands of years of history in this genre, demonstrating the importance of uniqueness or innovation. Ironically, the most important thing, innovation, is largely treated as trivial, if not noise, by present neural models. Actually this problem is shared by all generation models based on statistics (although it is more serious for neural models) and has aroused a long-standing criticism for machine poem generation: it can generate, and sometimes generate well, but the generation tends to be unsurprising and not particularly interesting. More seriously, this problem exists not only in poem generation, but also in all generation tasks that require innovation. This paper tries to solve this extremely challenging problem. We argue that the essential problem is that statistical models are good at learning general rules (usage of regular words and their combinations) but are less capable of remembering special instances that are difficult to cover with general rules. In other words, there is only rule-based reasoning, no instance-based memory. We therefore present a memory-augmented neural model which involves a neural memory so that special instances can be saved and referred to at run-time. This is like a human poet who creates poems by not only referring to common rules and patterns, but also recalls poems that he has read before. It is hard to say whether this combination of rules and instances produces true innovation (which often requires real-life motivation rather than simple word reordering), but it indeed offers interesting flexibility to generate new outputs that look creative and are still rule-compliant. Moreover, this flexibility can be used in other ways, e.g., generating poems with different styles. In this paper, we use the memory-augmented neural model to generate flexible and creative Chinese poems. We investigate three scenarios where adding a memory may contribute: the first scenario involves a well trained neural model where we aim to promote innovation by adding a memory, the second scenario involves an over-fitted neural model where we hope the memory can regularize the innovation, and in the third scenario, the memory is used to encourage generation of poems of different styles. 2 Related Work A multitude of methods have been proposed for automatic poem generation. The first approach is based on rules and/or templates. For example, phrase search (Tosa et al., 2009; Wu et al., 2009), word association norm (Netzer et al., 2009), template search (Oliveira, 2012), genetic search (Zhou et al., 2010), text summarization (Yan et al., 2013). Another approach involves various SMT methods, e.g., (Jiang and Zhou, 2008; He et al., 2012). A disadvantage shared by the above methods is that they are based on the surface forms of words or characters, having no deep understanding of the meaning of a poem. More recently, neural models have been the subject of much attention. A clear advantage of the neural-based methods is that they can ‘discover’ the meaning of words or characters, and can therefore more deeply understand the meaning of a poem. Here we only review studies on Chinese poetry generation that are mostly related to our research. The first study we have found in this direction is the work by Zhang and Lapata (2014), which proposed an RNN-based approach that produces each new line character-by-character using a recurrent neural network (RNN), with all the lines generated already (in the form of a vector) as a contextual input. This model can generate quatrains of reasonable quality. Wang et al. (2016b) proposed a much simpler neural model that treats a poem as an entire character sequence, and poem generation is conducted character-by-character. This approach can be easily extended to various genres such as Song Iambics. To avoid theme drift caused by this long-sequence generation, Wang et al. (2016b) utilized the neural attention mechanism (Bahdanau et al., 2014) by which human intention is encoded by an RNN to guide the generation. The same model was used by Wang et al. (2016a) for Chinese quatrain generation. Yan (2016) proposed a hierarchical RNN model that conducts iterative generation. Recently, Wang et al. (2016c) proposed a similar sequence generation model, but with the difference that attention is placed not only on the human input, but also on all the characters that have been generated so far. They also proposed a topic planning scheme to encourage a smooth and consistent theme. All the neural models mentioned above try to generate fluent and meaningful poems, but none of them consider innovation. The memory-augmented neural model proposed in this study intends to address this issue. Our system was built following the model structure and training strategy proposed by Wang et al. (2016a) due to its simplicity and demonstrated quality, but the memory mechanism is general and can be applied to any of the models presented above. The idea of memory argumentation was inspired by the recent advance in neural Turing machine (Graves et al., 2014, 2016) and memory network (Weston et al., 2014). These new models equip neural networks with an external memory that can be accessed and manipulated via some trainable operations. In comparison, the memory in our work plays a simple role of knowledge storage, and the only operation is simple pre-defined READ. In this sense, our model can be regarded as a simplified neural Turing machine that omits training. Figure 1: The memory-augmented neural model used for Chinese poetry generation. In this section, we first present the idea of memory augmentation, and then describe the model structure and training method. able. The memory component involves a set of ‘direct’ mappings from input to output, and therefore can be used to memorize some special cases of the generation that can not be represented by the neural model. For poem generation, the memory stores the information regarding which character should be generated in a particular context. The output from the two components are then integrated, leading to a consolidated output. There are several ways to understand the memory-augmented neural model. Firstly, it can be regarded as a way of combining reasoning (neural model) and knowledge (memory). Secondly, it can be regarded as a way of combining rule-based inference (neural model) and instance-based retrieval (memory). Thirdly, it can be regarded as a way of combining predictions from complementary systems, where the neural model is continuous and parameter-shared, while the memory is discrete and contains no parameter sharing. Finally, the memory can be regarded as an effective regularization that constrains and modifies the behavior of the neural model, resulting in generations with desired properties. Note that this memory-augmented neural model is inspired by and related to the memory network proposed by Weston et al.(2014) and Graves et al.(2016), but we more focus on an accompanying memory that plays the role of assistance and regularization. 3.1 3.2 3 Memory-augmented neural model Memory augmentation The idea of memory augmentation is illustrated in Fig. 1. It contains two components, the neural model component on the left, and the memory component on the right. In this work, the attention-based RNN generation model presented by (Wang et al., 2016a) is used as the neural model component, although any neural model is suit- Model structure Using the Chinese poetry generation model shown in Fig. 1 as an example, this section discusses the creation of a memory-augmented neural model. Firstly, the neural model part is an attentionbased sequence-to-sequence model (Bahdanau et al., 2014). The encoder is a bi-directional RNN (with GRU units) that converts the in- put topic words, denoted by the embeddings of the compositional characters (x1 , x2 , ..., xN ), into a sequence of hidden states (h1 , h2 , ..., hN ). The decoder then generates the whole quatrain character-by-character, denoted by the corresponding embeddings (y1 , y2 , ...). At each step t, the prediction for the state st is based on the last generation yt−1 , the previous status st−1 of the decoder, as well as all the hidden states (h1 , h2 , ...) of the encoder. Each hidden state hi contributes to the generation according to a relevance factor αt that measures the similarity between st−1 and hi . This is written as: st = fd (yt−1 , st−1 , N X αt,i hi ) i=1 where αt,i represents the contribution of hi to the present generation, and can be implemented as any function. The output of the model is a posterior probability over the whole set of characters, written by zt = σ(st W ) where W is the projection parameter. The memory consists of a set of elements {mi }K i=1 , where K is the size of the memory. Each element mi involves two parts, the source part mi (s), that encodes the context, i.e. when this element should be selected, and the target part mi (g), that encodes what should be output if this element is selected. In our study, the neural model is firstly trained, and then the memory is created by running fd (the decoder of the neural model). Specifically, for the k-th poem selected to be in the memory, the character sequence is input to the decoder one by one, with the contribution from the encoder set to zero. Denoting the starting position of this poem in the memory is pk , the status of the decoder at the j-th step is used as the source part of the (pk +j)-th element of the memory, and the embedding of the corresponding character, xj , is set to be the target part. this is formally written as: mi (s) = fd (xj−1 , sj−1 , 0) (1) st , and then the outputs of the selected elements are averaged as the output of the memory component. We choose cosine distance to measure the fitting degree, and have1 : vt = K X cos(st , mi (s))mi (g). (2) i=1 The output of the neural model and the memory can be combined in various ways. Here, a simple linear combination before the softmax is used, i.e., zt = σ(st W + βvt E) (3) where β is a pre-defined weighting factor, and E contains word embeddings of all the characters. Although it is possible to train β from the data, we found that the learned β is not better than the manually-selected one. This is probably because β is a factor to trade-off the contribution from the model and the memory, and how to make the trade-off should be a ‘prior knowledge’ rather than a tunable parameter. In fact, if it is trained, than it will be immediately adapted to match the training data, which will nullify our effort to encourage innovative generation. 3.3 Model Training In our implementation, only the neural model component is required to be trained. The training algorithm follows the scheme defined in (Wang et al., 2016a), where the cross entropy between the distributions over Chinese characters given by the decoder and the ground truth is used as the objective function. The optimization uses the SGD algorithm together with AdaDelta to adjust the learning rate (Zeiler, 2012). 4 Memory augmentation for Chinese poetry generation This section describes how the memory mechanism can be used to trade-off between the requirements for rule-compliant generation and aesthetic innovation, and how it can also be used to do more interesting things, for example style transfer. and mi (g) = xj where i = pk + j. 4.1 In this section, we describe how the memory mechanism promotes innovation. Monitoring the 1 At run-time, the memory elements are selected according to their fit to the present decoder status Memory for innovative generation In fact, we run a parallel decoder to provide st in Eq.(2). This decoder does not accept input from the encoder and so is consistent with the memory construction process as Eq.(1). training process for the attention-based model, we found that the cost on the training set will keep decreasing until approaching zero, but on the validation set, the degradation stops after only one iteration. This can be explained by the fact that Chinese quatrains are highly unique, so the common patterns can be fully learned in one iteration, resulting in overfitting with additional iterations. Due to the overfitting, we observe that with the one-iteration model, reasonable poems can be generated, and with the over-fitted model, the generated poems are meaningless, in that they do not resemble feasible character sequences. The energy model perspective helps to explain this difference. For the one-iteration model, the energy surface is smooth and the energy of the training data is not very low, as illustrated in plot (a) in Fig. 2, where the x-axis represents the input and y-axis represents the output, and the z-axis represents the energy. With this model, inputs with small variance will be attracted to the same low-energy area, leading to similar generations. These generations are trivial, but at least reasonable. If the model is overfitted, however, the energy at the locations of the training data becomes much lower than their surrounding areas, leading to a bumpy energy surface as shown in plot (b) in Fig. 2. With this model, inputs with a small variation may be attracted to very different low-energy areas, leading to significantly different generations. Since many of the low-energy areas are nothing to do with good generations but are simply caused by the complex energy function, the generations can be highly surprising for human readers, and the quality is not guaranteed. In some sense, these generations can be regarded as ‘innovative’ , but based on observations made in our experiments, most of them are meaningless. The augmented memory introduces a new energy function, which is combined with the energy function of the neural model to change the energy surface of the generation system. This can be seen in Eq. (3), where st W and βvt E can be regarded as the energy function of the neural model component and the memory component, respectively, and the energy function of the memory-augmented system is the sum of the energy functions of these two components. For this reason, the effect of the memory mechanism can be regarded as a regularization of the neural model that will adjust its generation behavior. This regularization effect is illustrated in Fig. 2, where the energy function of the memory shown in plot (c) is added to the energy function of the one-iteration model and the overfitted model, as shown in plot (e) and plot (f) respectively. It can be seen that with the memory involved, the energy surface becomes more bumpy with the one-iteration model, and more smooth with the overfitted model. In the former case, the effect of the memory is to encourage innovation, while still focusing on rule-compliance, and in the latter case, the effect is to encourage rule compliance, while keeping the capability for innovation. It is important to notice that the energy function of the memory component is a linear combination of the energy functions of the compositional elements (see Eq.(2)), each of which is convex and is minimized at the location represented by the element. This means that the energy surface of the memory is rather ‘healthy’, in the sense that low-energy locations mostly correspond to good generations. For this reason, the regularization provided by the memory is safe and helpful. 4.2 Memory for style transfer The effect of the memory is easy to control. For example, the complexity of the behavior can be controlled by the memory size, the featured bias can be controlled by memory selection, and the strength of the impact can be controlled by the weighting parameter β. This means that the memory mechanism is very flexible and can be used to produce poems with desired properties. In this work, we use these capabilities to generate poems with different styles. This has been illustrated in Fig. 2, where the energy function of the style memory shown in plot (d) is biased towards a particular style, and once it is added to energy function of the one-iteration model, the resulting energy function shown in plot (g) obtains lower values at locations corresponding to the locations of the memory, which encourages generation of poems with similar styles as those poems in the memory. 5 Experiments This section describes the experiments and results carried out in this paper. Here, The baseline system was a reproduction of the Attention-based system presented in (Wang et al., 2016a). the model in This system has been shown to be rather flexi- Figure 2: The energy surface for (a) one-iteration model (b) overfitted model (c) memory (d) style memory (e) one-iteration model augmented with memory (f) overfitted model augmented with memory (g) one-iteration model augmented with style memory. ble and powerful: it can generate different genres of Chinese poems, and when generating quatrains it has been shown to be able to fool human experts in many cases (Wang et al., 2016a) and the authors had did a thorough comparison with competitive methods mentioned in the related work of this paper. We obtained the database and the source code (in theano), and reproduced their system using Tensorflow from Google2 . We didn’t make comparisons with some previous methods such as NNLM, SMT, RNNPG as they had been fully compared in (Wang et al., 2016a) and all of them were much worse than the attention-based system. Another reason was that the experts were not happy to evaluate poems with clearly bad quality. We also reproduced the model in (Wang et al., 2016c) with the help of the first author. However, since their implementation did not involve any restrictions on rhythm and tone, the experts were reluctant to recognize them as good poems. With a larger dataset (e.g., 1 Million poems), it is assumed that the rhythm and tone can be learned and their system would be good in both fluency and rule compliance. It should be also emphasized that the memory approach proposed in this paper is a general technique and is complementary to other efforts such as the planning approach (Wang et al., 2016c) and the recursive approach (Yan, 2016). Based on the baseline system, we built the memory-augmented model, and conducted two 2 https://www.tensorflow.org/ experiments to demonstrate its power. The first is an innovation experiment which employs memory to promote or regularize the generation of innovative poems, and the second is a style-transfer experiment which employs memory to generate flexible poems in different styles. We invited 34 experts to participate in the experiments, and all of them have rich experience not only evaluating poems, but also in writing them. Most of the experts are from prestigious institutes, including Peking university and the Chinese Academy of Social Science (CASS). Following the suggestions of the experts, we use five metrics to evaluate the generation, as listed below: • Compliance: if regulations on tones and rhymes are satisfied; • Fluency: if the sentences read fluently and convey reasonable meaning; • Theme consistency: if the entire poem adheres to a single theme; • Aesthetic innovation: if the quatrain stimulates any aesthetic feeling with elaborate innovation; • Scenario consistency: if the scenario remains consistent. 5.1 Datasets The baseline system was built with two customized datasets. The first dataset is a Chinese poem corpus (CPC), which we used in this work to train the embeddings of Chinese characters. Our CPC dataset contains 284,899 traditional Chinese poems in various genres, including Tang quatrains, Song Iambics, Yuan Songs, and Ming and Qing poems. This large quantity of data ensures reliable learning for the semantic content of most Chinese characters. Our second dataset is a Chinese quatrain corpus (CQC) that we have collected from the internet, which consists of 13, 299 5-char quatrains and 65, 560 7-char quatrains. This corpus was used to train the attention-based RNN baseline. We filtered out the poems whose characters are all low-frequency (less than 100 counts in the database). After the filtering, the remaining corpus contains 9,195 5-char quatrains and 49,162 7-char quatrains. We used 9,000 5-char and 49,000 7-char quatrains to train the attention model, and the rest for validation. Another two datasets were created for use in the memory-augmented system. Our first dataset, MEM-I, contains 500 quatrains randomly selected from our CQC corpus. This dataset was used to produce the memory in the innovation experiment; the second dataset, MEM-S, contains 300 quatrains with clear styles, including 100 pastoral, 100 battlefield and 100 romantic quatrains. It was used to generate memory with different styles in the style-transfer experiment. All the datasets will be released online3 . 5.2 Evaluation Process We invited 34 experts to evaluate the quality of the poem generation. In the innovation experiment, the evaluation consisted of a comparison between different systems and configurations in terms of the five metrics. The innovation questions presented the expert with two poems, and asked them to judge which of the poems was better in terms of the five metrics; in the style-transfer experiment, the evaluation was performed by identifying the style of a generated poem. The evaluation was conducted online, with each questionnaire containing 11 questions focusing on innovation and 4 questions concerned with style-transfer. Each of the style-transfer questions presented the expert with a single poem and asked them to score it between 1 to 5, with a larger score being better, in terms of compliance, aesthetic innovation, 3 http://vivi.cslt.org scenario consistency, and fluency. They were also asked to specify the style of the poem. Using the poems generated by our systems, we generated many different questions of both types, and then created a number of online questionnaires that randomly selected from these questions. This meant that as discussed above, each questionnaire had 11 randomly selected innovation questions, and 4 randomly selected style transfer questions. Each question was only used once, meaning that it was not duplicated on multiple questionnaires, and so each questionnaire was different. Experts could choose to answer multiple questionnaires if they wished, as each one was different. From the 34 experts, we collected 69 completed questionnaires, which equals to 759 innovation questions and 276 style-transfer questions. 5.3 Innovation experiment This experiment focuses on the contribution of memory for innovative poem generation. We experimented with two configurations: one is with a one-iteration model (C1 ) and the other is with an overfitted model (C∞ ). The memory was generated from the 500 quatrains in MEM-I, and the weighting factor was defined empirically as 16 for C1 and 49 for C∞ . The topics of the generation were 160 keywords randomly selected from Shixuhanyinge (Liu, 1735). Given a pair of poems generated by two different configurations using the same topic, the experts were asked to choose which one they preferred. The evaluation is therefore pair-wised, and each pair of configurations contains at least 180 evaluations. The results are shown in Table 2, where the preference ratio for each pair of configurations was tested in terms of the 5 metrics. From the first row of Table 2, we observe that the experts have a clear preference for the poems generated by the C1 model, the one that can produce fluent yet uninteresting poems. In particular, the ‘aesthetic innovation’ score for C∞ is not better than C1 , which was different from what we expected. Informal offline discussions with the poetry experts found that the experts identified some innovative expression in the C∞ condition, but most of the them was regarded as being nonsense in the opinion of many of the experts. In comparison to sparking innovation, fluency and being meaningful is more important not only for non-expert readers, but also for professional po- C1 vs C∞ C1 vs C1 +Mem C∞ vs C∞ +Mem C1 vs C∞ +Mem Compliance Fluency 0.59:0.41 0.41:0.59 0.40:0.60 0.43:0.57 0.68:0.32 0.36:0.64 0.26:0.74 0.58:0.42 Preference Ratio Theme Consistency 0.70:0.30 0.37:0.63 0.32:0.68 0.59:0.41 Aesthetic Innovation 0.68:0.32 0.33:0.67 0.30:0.70 0.50:0.50 Scenario Consistency 0.69:0.31 0.43:0.57 0.36:0.64 0.59:0.41 Table 2: Preference ratios for systems with or without overfitting and with or without memory augmentation. ets. In other words, only meaningful innovation is regarded as innovation, and irrational innovation is simply treated as junk. From the second and third rows of Table 2, it can be seen that involving memory significantly improves both C1 and C∞ , particularly for C∞ . For C1 , the most substantial improvement is observed in terms of ‘Aesthetic innovation’, which is consistent with our argument that memory can help encourage innovation for this model. For C∞ , ‘Fluency’ seems to be the most improved metric. This is also consistent with our argument that involving memory constrains over-innovation for over-fitted models. The last row of Table 2 is an extra experiment that investigates if C∞ is regularized well enough after introducing the memory. It seems that with the regularization, the overfitting problem is largely solved, and the generation is nearly as fluent and consistent as the C1 condition. Interestingly, the score for aesthetic innovation is also significantly improved. Since the regularization is not supposed to boost innovation, this seems confusing at first glance (in comparison to the result on the same metric in the first row), but this is probably because the increased fluency and consistency makes the innovation more appreciated, therefore doubly confirming our argument that true innovation should be reasonable and meaningful. 5.4 Style-transfer experiment In the second experiment, the memory mechanism is used to generate poems in different styles. We chose three styles: pastoral, battlefield, and romantic. A style-specific memory, which we call style memory, was constructed for each style by the corresponding quatrains in the MEM-S dataset. The system with one-iteration model C1 was used as the baseline. Two sets of topics were used in the experiment, one is general and the other is style-biased. The experiments then investigate if the memory mechanism can produce a clear style if the topic is general, and can transfer to a different style if the topic is style-biased already. The experts were asked to specify the style from four options including the three defined above and a ‘unclear style’ option. In addition, the experts were asked to score the poems in terms of compliance, fluency, aesthetic innovation, and scenario consistency, which we can use to check if the style transfer impacts the quality of the poem generation. Note that we did not ask for the theme consistency to be scored in this experiment because the topic words were not presented to the experts, in order to prevent the topic affecting their judgment regarding the style. The score ranges from 1 to 5, with a larger score being better. Table 3 presents the results with the general topics. The numbers show the probabilities that the poems generated by a particular system were labeled as having various styles. Since the topics are unbiased in types, the generation of the baseline system is assumed to be with unclear styles. For other systems, the style of the generation is assumed to be the same as the style of their memories. The results in Table 3 clearly demonstrates these assumptions. The tendency that romantic poems are recognized as pastoral poems is a little surprising. Further analysis shows that experts tend to recognize romantic poems as pastoral poems only if there are any related symbols such as trees, mountain, river. These words are very general in Chinese quatrains. The indicator words of romantic poems such as skirt, rouge, and singing are not as popular and their indication power is not as strong, leading to less labeling of romantic poems, as shown in the results. Model C1 (Baseline) C1 + Pastoral Mem C1 + Battlefield Mem C1 + Romantic Mem Pastoral 0.09 0.94 0.05 0.17 Probability Battlefield Romantic 0.04 0.18 0.00 0.06 0.93 0.00 0.00 0.61 Unclear 0.69 0.00 0.02 0.22 Table 3: Probability that poems generated by each configuration with general topics are labeled as various styles. We also tested transferring from one style to another. This was achieved by generating poems with some style-biased topics, and then using a style memory to force the generation to change the style. Our experiments show that in 73% cases the style can be successfully transferred. Finally, the scores of the poems generated with and without the style memories are shown in Table 4, where the poems generated with both general and style-biased topics are accounted for. It can be seen that overall, the style transfer may degrade fluency a little. This is understandable, as enforcing a particular style has to break the optimal generation with the baseline, which is assumed to be good at generating fluent poems. Nevertheless the sacrifice is not significant. Method C1 C1 C1 C1 C1 Compliance Fluency 4.10 4.07 3.82 4.00 3.95 3.01 3.00 2.63 2.78 2.80 (baseline) + Pastoral Mem + Battlefield Mem + Romantic Mem + All Mem Aesthetic Innovation 2.53 3.07 2.60 2.59 2.74 Scenario Consistence 2.94 3.17 2.95 3.00 3.05 Table 4: Averaged scores for systems with or without style memory. 5.5 Examples Table 5 to Table 7 shows example poems generated by the system C1 , C1 +Mem and C1 +Style Mem where the style in this case is set to be romantic. The three poems were generated with the same, very general, topic (‘(oneself)’). More examples are given in the supporting material. 自从此意无心物, Nothing in my heart, 一日东风不可怜。 Spring wind is not a pity. 莫道人间何所在, Don’t ask where it is, 我今已有亦相传。 I’ve noticed that and tell others. 一山自有无人语, Nobody speaking in the mountain, 不是青云入水边。 Also no green cloud stepping into the river. 莫把春风吹落叶, Spring wind does not stir leaves, 花开绿树满江船。 But flowers blooming in trees and flying to boats. Table 6: Example poems generated by the C1 +Mem system. 花香粉脸胭脂染, Beautiful face addressed by rouge, 帘影鸳鸯绿嫩妆。 Mandarin duck outside the curtain. 翠袖红蕖春色冷, Green sleeves and red flowers in cold spring, 柳梢褪叶暗烟芳。 Willow leaves gone in fragrant mist. Table 7: Example poems generated by the C1 +Style Mem system where the style is romantic. ory can boost innovation from two opposite directions: either by encouraging creative generation for regularly-trained models, or by encouraging rule-compliance for overfitted models. Both strategies work well, although the former generated poetry that was preferred by experts in our experiments. Furthermore, we found that the memory can be used to modify the style of the generated poems in a flexible way. The experts we collaborated with feel that the present generation is comparable to today’s experienced amateur poets. Future work involves investigating a better memory selection scheme. Other regularization methods (e.g., norm or drop out) are also interesting and may alleviate the over-fitting problem. Acknowledgments Table 5: system. 6 Example poems generated by the C1 Conclusions In this paper, we proposed a memory mechanism to support innovative Chinese poem generation by neural models augmented with a memory. Experimental results demonstrated that mem- This paper was supported by the National Natural Science Foundation of China (NSFC) under the project NO.61371136, NO.61633013, NO.61472428. References Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 . Alex Graves, Greg Wayne, and Ivo Danihelka. 2014. Neural turing machines. arXiv preprint arXiv:1410.5401 . Alex Graves, Greg Wayne, Malcolm Reynolds, Tim Harley, Ivo Danihelka, Agnieszka GrabskaBarwińska, Sergio Gómez Colmenarejo, Edward Grefenstette, Tiago Ramalho, John Agapiou, et al. 2016. Hybrid computing using a neural network with dynamic external memory. Nature 538(7626):471–476. Jing He, Ming Zhou, and Long Jiang. 2012. Generating Chinese classical poems with statistical machine translation models. In Twenty-Sixth AAAI Conference on Artificial Intelligence. Long Jiang and Ming Zhou. 2008. Generating Chinese couplets using a statistical mt approach. In Proceedings of the 22nd International Conference on Computational Linguistics. Association for Computational Linguistics, volume 1, pages 377–384. Wenwei Liu. 1735. ShiXueHanYing. Yael Netzer, David Gabay, Yoav Goldberg, and Michael Elhadad. 2009. Gaiku: Generating haiku with word associations norms. In Proceedings of the Workshop on Computational Approaches to Linguistic Creativity. Association for Computational Linguistics, pages 32–39. H Oliveira. 2012. Poetryme: a versatile platform for poetry generation. In Proceedings of the ECAI 2012 Workshop on Computational Creativity, Concept Invention, and General Intelligence. Yihe Tang. 2005. English Translation for Tang Poems (Ying Yi Tang Shi San Bai Shou). Tianjin People Publisher. Naoko Tosa, Hideto Obara, and Michihiko Minoh. 2009. Hitch haiku: An interactive supporting system for composing haiku poem. Entertainment Computing-ICEC 2008 pages 209–216. Springer. Li Wang. 2002. A Summary of Rhyming Constraints of Chinese Poems (Shi Ci Ge Lv Gai Yao), volume 1. Beijin Press. Qixin Wang, Tianyi Luo, and Dong Wang. 2016a. Can machine generate traditional Chinese poetry? a feigenbaum test. In BICS 2016. Qixin Wang, Tianyi Luo, Dong Wang, and Chao Xing. 2016b. Chinese song iambics generation with neural attention-based model. In IJCAI 16. Zhe Wang, Wei He, Hua Wu, Haiyang Wu, Wei Li, Haifeng Wang, and Enhong Chen. 2016c. Chinese poetry generation with planning based neural network. In COLING 2016. Jason Weston, Sumit Chopra, and Antoine Bordes. 2014. Memory networks. arXiv preprint arXiv:1410.3916 . Xiaofeng Wu, Naoko Tosa, and Ryohei Nakatsu. 2009. New hitch haiku: An interactive renku poem composition supporting tool applied for sightseeing navigation system. Entertainment Computing-ICEC 2009 pages 191–196. Springer. Rui Yan. 2016. i, Poet: Automatic poetry composition through recurrent neural networks with iterative polishing schema. In IJCAI2016. Rui Yan, Han Jiang, Mirella Lapata, Shou-De Lin, Xueqiang Lv, and Xiaoming Li. 2013. i, Poet: automatic Chinese poetry composition through a generative summarization framework under constrained optimization. In Proceedings of the Twenty-Third international joint conference on Artificial Intelligence. AAAI Press, pages 2197–2203. Matthew D Zeiler. 2012. Adadelta: an adaptive learning rate method. arXiv preprint arXiv:1212.5701 . Xingxing Zhang and Mirella Lapata. 2014. Chinese poetry generation with recurrent neural networks. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). pages 670–680. Cheng-Le Zhou, Wei You, and Xiaojun Ding. 2010. Genetic algorithm and its implementation of automatic generation of Chinese Songci. Journal of Software 21(3):427–437.
2
AMAS: optimizing the partition and filtration of adaptive seeds to speed up read mapping Ngoc Hieu Tran1,* Email: [email protected] 1 Xin Chen Email: [email protected] 1 School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore * Corresponding author 1 ABSTRACT Background: Identifying all possible mapping locations of next-generation sequencing (NGS) reads is highly essential in several applications such as prediction of genomic variants or protein binding motifs located in repeat regions, isoform expression quantification, metagenomics analysis, etc. However, this task is very time-consuming and majority of mapping tools only focus on one or a few best mapping locations. Results: We propose AMAS, an alignment tool specialized in identifying all possible mapping locations of NGS reads in a reference sequence. AMAS features an effective use of adaptive seeds to speed up read mapping while preserving sensitivity. Specifically, an index is designed to pre-store the locations of adaptive seeds in the reference sequence, efficiently reducing the time for seed matching and partitioning. An accurate filtration of adaptive seeds is further applied to substantially tighten the candidate alignment space. As a result, AMAS runs several times faster than other state-of-the-art read mappers while achieving similar accuracy. Conclusions: AMAS provides a valuable resource to speed up the important yet time-consuming task of identifying all mapping locations of NGS reads. AMAS is implemented in C++ based on the SeqAn library and is freely available at https://sourceforge.net/projects/ngsamas/. Keywords: next-generation sequencing, read mapping, sequence alignment, adaptive seeds, seed partition, filtration 2 Background Recent advances in next-generation sequencing (NGS) technologies have produced massive amounts of short reads data, bringing up promising opportunities in several biomedical research areas such as RNA-seq, ChIP-seq, de novo genome sequencing, resequencing, metagenome sequencing, etc [1]. In many applications, the first key step is to map NGS reads to a reference sequence of interest. Thus, dozens of rapid alignment algorithms have been developed to improve the read mapping [2, 3], especially to address the problem of errors tolerance (mismatches, indels) and the increasing read length. To achieve an optimal combination of speed, accuracy, and memoryefficiency, many popular mapping tools such as Bowtie 1, 2 [4, 5], BWA [6-8], etc, apply heuristic approaches to prune the search space, prioritize candidate locations, and finally return one or a few best mapping locations for each read. They can be referred to as best-mappers. Another class of mapping tools, which can be referred to as all-mappers, are specialized in identifying as many as possible, if not all, matches within a reasonable time. This all-mapping task is highly essential in several applications such as prediction of genomic variants or protein binding motifs located in repeat regions, isoform expression quantification, metagenomics analysis [9-12]. Some prominent allmappers include SOAP 2 [13], SHRiMP 2 [14], mrsFAST [10, 15], mrFAST [9, 16], RazerS 3 [17], GEM [18], Masai [19], Hobbes 1, 2 [20, 21]. Exhaustive search for all mapping locations of NGS reads in a reference sequence is a computationally intensive task. The problem is even more complicated for large genomes with highly repetitive regions, e.g. the human genome, and when sequencing errors as well as genomic variants are taken into account. In order to narrow down the search space, most all-mappers are designed with the seed-and-extend strategy. In particular, a read is first partitioned into a few non-overlapping seeds. If the read can be mapped to the reference sequence with some allowed errors, its seeds must also have exact/approximate matches in the reference sequence, and moreover, the read’s mapping locations can be found in the neighbourhood regions of its seeds’ locations. Hence, the seeds are quickly mapped to the reference sequence and their identified locations are then used as candidates for further extending the alignment to the rest of the read by using standard dynamic programming algorithms such as Smith-Waterman [22] or Needleman-Wunsch [23]. The mapping sensitivity is guaranteed by the pigeonhole principle. For example, to map a read to the reference sequence with up to e errors, one can partition it into e+1 non-overlapping seeds. By the pigeonhole principle, at least one of those e+1 seeds must have an exact match in the reference sequence. Thus, all possible mapping locations with up to e errors of the read can be found by extending all exact matches of those seeds. Most all-mappers partition a read into seeds of equal lengths, where the seed length is specified by users or may also be determined from the number of errors allowed and the pigeonhole principle. In any cases, the seed length is several times shorter than the read length and the seeds are usually mapped exactly (i.e. without errors) to the reference sequence. To further speed up the seed mapping process, most all-mappers (except for RazerS 3) index the reference sequence using some special data structures. In particular, SHRiMP 2, mrsFAST, mrFAST, and Hobbes use hash tables to index 3 the reference sequence. For a fixed length k (which is less than or equal to the seed length), the hash tables contain all possible k-mers as the keys and each key is associated with a list of locations where the corresponding k-mer is observed in the reference sequence. Masai, on the other hand, constructs a suffix tree of the reference sequence to perform the seed matching. Both suffix array and the much more memory-efficient Ferragina-Manzini (FM) index [24] with Burrows-Wheeler Transform (BWT) can be used in Masai to mimic the suffix tree top-down traverse. Hash tables can also be combined to accelerate the searching in the BWT-FM index, as demonstrated in SOAP 2. Among those commonly used data structures, the FM index is well-known for its small memory footprint, which is only ~3-4 GB for the human genome. Interestingly, in the latest version of mrsFAST [15], the authors proposed a new compact structure for hash tables significantly reducing the index size to ~2GB for the human genome, which is even smaller than the FM index. In addition to indexing the reference sequence, some all-mappers also index the input reads so that multiple reads can be handled simultaneously rather than in a one-by-one fashion. For instance, in the read index of mrsFAST, each k-mer is associated with a list of read IDs, locations of the k-mer in the reads, etc. In the extension step, for each k-mer, the two lists (from the reference index and from the read index) are compared in a divide-and-conquer fashion to achieve cache efficiency. Similarly, in Masai, all seeds of the input reads are organized in a radix tree. Then, by walking through the reference suffix tree along with the read radix tree, all seeds can be mapped to the reference sequence simultaneously. After the seeds of a read have been mapped to the reference sequence, their identified locations are then used as candidates for further extending the alignment to the rest of the read. This step is usually called the extension or the verification step, and is performed by using standard dynamic programming algorithms such as Smith-Waterman [22] or Needleman-Wunsch [23]. In fact, this step is the bottleneck and consumes the most computations of the whole mapping task. As the seed length is several orders of magnitudes shorter than the reference length and the reference sequence often contains highly repetitive regions, the candidate space generated by the seeds is huge. Moreover, majority of the locations actually are false positives which will not lead to acceptable alignment results yet waste computing resources. Hence, filtration strategies are needed to reduce the number of locations The first filtration strategy widely used by the all-mappers is based on the pigeonhole principle. In particular, if a read is aligned with up to e errors and exact seed matching is employed, only e+1 nonoverlapping seeds are required to guarantee the full mapping sensitivity. More advanced strategies are further implemented in different all-mappers. For instance, the FastHASH algorithm in the latest version of mrFAST [16] applies two procedures called Cheap K-mer Selection and Adjacency Filtering to reduce the number of locations while preserving sensitivity. In the first procedure, the seeds of a read are sorted according to their frequencies in the reference sequence and e+1 seeds with the lowest frequencies are selected. The second procedure filters out the obviously false locations based on the idea that the potentially true locations (i.e. those that may return correct alignments) of adjacent seeds must be close to each other in the reference sequence. 4 In Hobbes [20] the authors proposed a more complicated procedure of seed selection. Instead of partitioning the read into contiguous seeds, Hobbes considers all possible partitions and applies a dynamic programming to select the one that minimizes the sum of frequencies of the seeds. In the latest version, Hobbes 2 [21], the authors further suggested to use extra seeds to improve filtering specificity: instead of e+1, e+2 (or more) non-overlapping seeds can be employed. Then, by the pigeonhole principle, at least two of those seeds must have exact matches in the reference sequence and hence only those locations reported by at least two seeds will be selected as candidates for the extension step. This technique has also been applied previously in GSNAP [25]. The filtration in Masai [19] is based on the use of long approximate seeds rather than short exact seeds to achieve better specificity. For example, if a read of length 100bp is aligned to the reference sequence with up to e=5 errors, by the pigeonhole principle, it can be partitioned into 6 nonoverlapping seeds of length 16bp and the seeds are mapped exactly to the reference genome. To increase the seed length, Masai partitions the read into 3 seeds of 33bp and each seed is mapped to the reference genome with up to 1 error. The approximate matching of all seeds is performed simultaneously by applying a multiple backtracking algorithm on the reference index and the read index. It is worth to note that most all-mappers partition a read into equal-length seeds and prefer to use short k-mers as seeds. However, the occurrences of equal-length seeds in a reference sequence may not be uniformly distributed and the seed frequencies may differ by orders of magnitudes (see Supplementary Figure S1 for the frequency distribution of 10-mers in the human genome). Highly repetitive seeds may substantially enlarge the candidate space with false positives and hence waste computing resources. This problem was addressed by introducing seed selection mechanisms in mrFAST, Hobbes, or by using long approximate seeds in Masai. However, the seed frequencies are still not fully controllable. A more efficient strategy of seed partition was proposed in GEM [18] using adaptive seeds. Specifically, GEM allows seeds to have variable lengths while restricting the number of candidate locations generated by each seed to be less than a predefined threshold. Figure 1A shows an example of such efficient partition where the number of candidate locations of the read was reduced by 44.66 times by using adaptive seeds instead of equal-length seeds. In general, adaptive seeds provide better control on the candidate space while consuming similar computing resources as equal-length seeds. Similar ideas have also been used in some best-mappers [7, 8, 26, 27] to avoid unnecessary extension for highly repetitive seeds. As we have briefly reviewed above, intensive efforts have been put into optimizing the use of equal-length seeds in the all-mapping task, including sequence indexes for fast exact/approximate seed matching and filtration strategies to reduce candidate locations. However, little attention has been paid into adaptive seeds and their advantages have not been fully explored to speed up the read mapping. Hence, in this work we carefully study the strengths and weaknesses of adaptive seeds and attempt to find an optimal strategy for their mapping, partition and filtration. The main contributions of our all-mapping tool with adaptive seeds, AMAS, are summarized below. 5 Firstly, to speed up the mapping of adaptive seeds, we pre-compute all possible adaptive seeds and their locations in the reference sequence for a given frequency threshold. Then, our index of the reference sequence consists of all possible adaptive seeds as the keys and each key is associated with a list of locations where the corresponding seed is observed. The index is stored in a local file and can be reused for every mapping task. The idea is similar to hash tables, but instead of fix-length k-mers, the keys in our index are variable-length substrings with frequencies less than a predefined threshold. Secondly, in the adaptive seed partition, the number of seeds is not controllable and varies across different reads. For some reads, there may not be sufficient seeds for the pigeonhole principle to guarantee the mapping sensitivity. Hence, we refine the partition of adaptive seeds by adding one more constraint on the seed lengths in order to guarantee the minimum number of seeds in the partition. On the other hand, there may also be more than enough seeds available from the partition. In such cases, we make effective use of the extra seeds to filter out false positives from the candidate space. Thirdly, due to the shortage of nucleotides assigned to the last seed in the adaptive partition of a read, that seed may be too short and the number of candidate locations it reported may far exceed the desired threshold. Majority of such locations are false positives which increase the candidate space dramatically. However, blindly ignoring all of the last seeds will lead to a considerable loss of mapping sensitivity. Hence, we also pay special attention to an accurate filtration of the last seeds. Overall, by optimizing the partition and filtration of adaptive seeds, our tool AMAS runs several times faster than other state-of-the-art all-mappers while achieving comparable sensitivity and accuracy. Detailed methods and performance results are presented in the next sections. AMAS was implemented in C++ based on the source code of Masai and the SeqAn library. Our main contributions include the index, the partition, and the filtration of adaptive seeds. For the extension step with edit distance, we borrowed Masai’s implementation [17, 19] of the Myers’ bitvector dynamic programming algorithm [28]. We also borrowed I/O components of Masai for handling the reference, the read sequences, and the alignment results in SAM format. AMAS is freely available at https://sourceforge.net/projects/ngsamas/. A user guide and sample data sets are also provided. Methods To find an effective strategy for the partition and filtration of adaptive seeds, we first performed experiments on a data set of 100k reads of length 100bp, which were simulated from the human genome (UCSC hg19) using Mason [29] with the Illumina model. The reads were mapped to the human genome with up to e=5 errors. In the following, we shall describe our strategy and use the simulated data set for illustration. Partition of adaptive seeds An example of adaptive seeds versus equal-length seeds is illustrated in Figure 1A. To partition a read into adaptive seeds, we scan the read against the reference sequence in the forward (left-to-right) 6 direction, base by base. When the number of matches of the current seed drops below a predefined frequency threshold F, its locations are added to the candidate space and a new seed is started. That process is continued until the desired number of seeds is obtained or the read’s end is reached. In the latter case, the number of matches of the last seed might be still higher than the threshold F. In the example in Figure 1A, the read was mapped to the human genome and F was set at 300. The number of candidate locations of the read was reduced by 44.66 times by using 6 adaptive seeds instead of 6 seeds of equal lengths 16bp. Similarly, for the whole simulated data set of 100k reads, the total number of candidate locations was reduced by 6.61 times (Supplementary Table S1). Index of adaptive seeds To search for the locations of adaptive seeds in the reference sequence, GEM uses the FM index to achieve both speed and low memory footprint [18]. As all-mapping is a very time-consuming task, it may be desirable to further boost up the mapping speed at the expense of a reasonable amount of memory, like using hash tables in Hobbes, mrsFAST, mrFAST, or suffix arrays, enhanced suffix arrays in Masai. Here we pre-compute all possible adaptive seeds and their locations in the reference sequence for a given frequency threshold F. Then, our index of the reference sequence consists of all possible adaptive seeds as the keys and each key is associated with a list of locations where the corresponding seed is observed. The idea is similar to hash tables, but instead of fix-length k-mers, the keys in our index are variable-length substrings with frequencies less than a predefined threshold F. To represent all possible adaptive seeds in the reference sequence, we implement a lookup table and extend it with a radix tree (Figure 1B). In particular, we first pick a length k, organize all k-mers in the lookup table and search for their locations in the reference sequence. Then, for each k-mer, we further extend the search to its 4 child nodes which correspond to adding the 4 bases “A”, “C”, “G”, and “T”. The search and extension are continued until the numbers of matches of the nodes drop below the threshold F (shaded leaf nodes in Figure 1B). Thus, all leaf nodes in the radix tree correspond to all possible adaptive seeds and each of them is linked to an array of its locations in the reference sequence. A similar idea has been used in SOAP 2 [13] where a hash table was combined to accelerate the searching in the FM index. Note that the leaf nodes in our index represent adaptive seeds with desired frequencies, not suffixes like in common suffix-array based data structures. By default, we consider adaptive seeds with a minimum length of k=10 bases. In general, using lower values of F helps to tighten the candidate space reported by the seeds but also enlarges the index. We choose F to be about 10 times less than the average frequency of k-mers in the reference sequence. For instance, we set F=300 for the human genome (Figure 1B), F=10 for the worm genome, and F=17 for the fruit-fly genome (Supplementary Table S2). The index only needs to be built once for each genome and it can be stored on a local disk for future mapping tasks. 7 Constraint on the maximum seed length As we use exact seed matching, by the pigeonhole principle, at least e+1 seeds are needed to achieve full sensitivity for mapping a read with up to e errors. The number of adaptive seeds, however, is not controllable and varies across different reads (see Supplementary Figure S2 for the seed count’s distribution of the simulated data set). Some reads may not have sufficient seeds to guarantee the mapping sensitivity. Hence, in addition to the frequency constraint, we also impose a constraint on the maximum length of the seeds. The maximum length threshold l allows to control the minimum number of seeds in the partition and hence to improve the mapping sensitivity. For example, for a read of length 100bp, setting l=33 guarantees that there will be at least 3 seeds in the partition and all matching locations with up to 2 errors will be found (Supplementary Figure S2). This feature greatly improves the sensitivity of our tool over GEM, as we will show later in the section Results. Filtration using the last seeds in the adaptive partition We also pay special attention to the last seeds in the adaptive partition. Due to the lack of nucleotides remaining, the last seed in the adaptive partition of a read may be too short and its number of matches may far exceed those of the other seeds as well as the threshold F. For instance, in the simulated data set, the number of candidate locations reported by the last seeds contributed up to 64% of the total candidate space. Apparently, majority of those locations were false positives, but removing all of them may lead to a considerable loss of mapping sensitivity. Our tool chooses to filter out only those last seeds whose numbers of matches are higher than the expected frequency of kmers and contribute to more than 95% of the candidate locations of their respective reads (i.e. the last seed reports too many locations compared to other seeds in the same read). Nevertheless, we avoid removing the last seeds from those reads that have too few seeds required by the pigeonhole principle. For the simulated data set, this filtration step only affected a small amount of reads (1.6%, Supplementary Figure S3), but significantly reduced the total candidate space by more than 50% (Supplementary Table S1). Filtration using the extra seeds in the adaptive partition Last but not least, when there are more than e+1 seeds available from the adaptive partition, we make effective use of the extra seeds to filter out false positives. For instance, the simulated reads were mapped with up to e=5 errors and hence e+1=6 seeds were required. However, the reads could be partitioned up to 9 seeds, where majority of them were partitioned into 8 seeds (Supplementary Figure S2). If a read was partitioned into 7, 8, or 9 seeds, only those locations reported by at least 2, 3, or 4 seeds, respectively, were selected as candidates. This filtration step further reduced the total candidate space by more than 70% (Supplementary Table S1). Our tool stores candidate locations in a binary search tree that allows quickly sorting and identifying those reported by multiple seeds. Using more extra seeds increases the filtering specificity but also requires longer filtration time. Our experiment with the simulated data set showed that using only one extra seed, i.e. total e+2=7 seeds, 8 achieved the best overall mapping time (Supplementary Table S1). This is similar to the observation in Hobbes 2 [21], GSNAP [25]. Overall, the combination of two filtration steps using the last seeds and the extra seeds substantially reduced the candidate space of the simulated data set by more than 85% (Supplementary Table S1). Obviously, such effective filtration will save a lot of computing resources in the extension step. Seed extension To perform seed extension with edit distance (i.e. including both mismatches and indels), we reused Masai’s implementation [17, 19] of the Myers’ bit-vector dynamic programming algorithm [28]. Results and discussion In this section, we compare the performance of AMAS and the latest state-of-the-art all-mappers GEM [18], Masai [19], Hobbes 2 [21], mrFAST (with FastHASH) [16], and mrsFAST-ultra [15]. We also included two popular best-mappers Bowtie 2 and BWA in the comparison. The mappers were configured to search for all possible mapping locations with up to e=5 errors and then output the alignment results in the SAM format. Details of parameters configuration can be found in the Supplementary Table S3. The experiments were performed on a Linux server with 12 Intel Xeon processors (E5-2640, 2.50 GHz), 64 GB of RAM, CentOS 6.3, GCC 4.4.7. All mappers were tested using one single thread and eight threads, except for Masai and mrFAST which do not support multithreading. Rabema benchmark Following previous studies of Masai and Hobbes 2 [19, 21], we used the Rabema benchmark [30] to measure the sensitivity of the mappers. First, RazerS 3 [17] was run in its full-sensitive mode to build the gold-standard set of all possible mapping locations with up to 5 errors. Any other mappers that can guarantee full mapping sensitivity can also be used to build the gold-standard set [30]. The goldstandard set was then used by Rabema to assess the sensitivity of each mapper in three categories “All”, “All-best”, and “Any-best”. For the “All” category, the mappers need to find all mapping locations in the gold-standard set. Similarly, for the “All-best” and “Any-best” categories, the mappers need to find all of the best mapping locations and any of the best mapping locations of the reads, respectively. Note that the term “best” here is in terms of the edit distance between the read and the reference sequence. Some mappers such as Bowtie 2 or BWA have their own scoring schemes to evaluate the mapping quality of the alignments. As original locations were available for the simulated reads, we also assessed the recall and the precision of the mappers on the simulated data set. Recall is defined in Rabema as the fraction of the input reads that were correctly mapped and precision is defined as the fraction of the uniquely mapped reads that were correctly mapped. A read is said to be mapped correctly if its original location was reported by the mapper. A read is said to be mapped uniquely if only one location was reported by the mapper. 9 Performance on the simulated data set Table 1 shows the Rabema benchmark for mapping the simulated data set of 100k reads to the human genome (UCSC hg19). The column “All” shows that AMAS was able to identify 98.11% of all mapping locations and achieved full sensitivity (100%) for those locations with up to 2 errors. Hobbes 2 achieved the highest sensitivity 99.85%, i.e. 1.74% more sensitive than AMAS, and was followed by Masai (99.83%), mrFAST (99.33%), AMAS (98.11%), GEM (97.65%), and mrsFAST (78.52%). AMAS and GEM had lower sensitivity than Masai, Hobbes 2, and mrFAST, especially when searching for mapping locations with 4 or 5 errors. This is because the adaptive seed partition does not guarantee the number of seeds and hence there may not be sufficient seeds required by the pigeonhole principle. The additional constraint on the maximum seed length introduced in AMAS guaranteed the full sensitivity (100%) for all mapping locations with up to 2 errors and also improved the overall sensitivity for locations with 3, 4, 5 errors. Hence, AMAS was 0.46% more sensitive than GEM. mrsFAST had much lower mapping rate (79.35%) and sensitivity (78.52%) than the others because it only allows mismatches and cannot detect indels. In the “All-best” and “Any-best” categories, AMAS achieved 99.99% and 100% sensitivity, respectively. That was similar to Hobbes 2 and better than the rest. AMAS also achieved the best recall rate 99.09%, while its precision was 99.99%, the second best among the tools. The best-mappers Bowtie 2, BWA, and GEM-best only searched for one or a few best mapping locations. Hence, they ran faster than the all-mappers while having lower sensitivity. We noticed that GEM-best outperformed Bowtie 2 and BWA in terms of both running time and sensitivity, demonstrating the advantages of adaptive seeds. We tried to configure Bowtie 2 and BWA as allmappers (Supplementary Table S3) but their running times were too long and the results were not reported here. We also configured Bowtie 2 in its -k mode to report up to -k=100 alignments for each read so that it could finish within a reasonable time. Its sensitivity was 96.04%, i.e. 2.07% lower than AMAS. Performance on real data sets Next, we run the mappers on a real NGS data set SRR063408 from the 1000 Genomes Project (individual HG01495). The data set includes 25.6 million reads of length 100bp which were generated from the Illumina Genome Analyzer II. Table 2 shows the running time, memory footprint, and Rabema benchmark of mapping the first one million reads to the human genome. AMAS took about 30 minutes to finish the job using one single thread and 5 minutes using eight threads. AMAS was able to map 93.75% of the reads and identified 98.14% of all mapping locations, including nearly all of the best mapping locations (99.98%). AMAS only lose behind Masai and Hobbes 2, which achieved highest sensitivity, 99.93% and 99.90% of all mapping locations, 100% of all best mapping locations. In both single-thread and eight-thread tests, AMAS was more than 3 times faster than Hobbes 2. AMAS was also more than 3 times faster than Masai in the single-thread test (Masai does not support multi-threading). While using the same idea of adaptive seeds, AMAS outperformed GEM in terms of mapping rate (0.06% higher), sensitivity (0.25% higher in the “All” category), and running time (2-7 10 times faster). This clearly shows the benefits of the optimized partition and filtration implemented in AMAS. AMAS was more than 6 times faster than mrFAST in the single-thread test (mrFAST does not support multi-threading). In this experiment, mrFAST produced invalid SAM output with many inconsistent CIGAR strings, which could not be converted to BAM for further analysis with Rabema. mrsFAST had similar running time as AMAS in the single-thread test but was more than 2 times slower than AMAS in the eight-thread test. AMAS also had better mapping rate (1.37% higher) and sensitivity (1.02% higher in the “All” category) than mrsFAST. To map the full data set SRR063408 of 25.6 million reads to the human genome, AMAS took about 12 hours using one single thread and 2 hours using eight threads (Table 3). Masai required 31 hours and Hobbes 2 required nearly 50 hours, that is, 2.6 times and 4.2 times slower than AMAS when using one single thread. When eight threads were deployed, Hobbes 2 took about 8 hours, 4 times slower than AMAS. mrsFAST was the fastest in the single-thread test (9 hours), but was 2 times slower than AMAS in the eight-thread test (4 hours). mrFAST could not finish the mapping within 3 days, thus we did not record its results. For this data set, GEM was not able to output its alignment results in the SAM format. Thus we were only able to record its mapping time, which was already 1.55 times slower than the total running time of AMAS. We also performed similar experiments on Caenorhabditis elegans (data set SRR065388 mapped to the worm genome UCSC ce10) and Drosophila melanogaster (data set SRR497711 mapped to the fruit-fly genome UCSC dm3). The results are presented in Supplementary Tables S4-S7. AMAS took 9 minutes to map 36 million reads to the worm genome. AMAS outperformed GEM and mrsFAST in terms of running time, mapping rate, and sensitivity. It was nearly 2 times faster than Hobbes 2, 2.5 times faster than Masai and 4.6 times faster than mrFAST. AMAS fell behind Masai and Hobbes 2 by no more than 0.04% of reads and 1.35% of all mapping locations. Similar results were also obtained for the fruit-fly genome. Most all-mappers use the seed-and-extend strategy in which locations reported by the seeds of a read are used as candidates for extending the alignment to the rest of the read. Many locations reported by different seeds of a read may actually correspond to one single location of the read in the reference sequence. Thus it is important to mark duplicate candidates to reduce the time for seed extension, and more importantly, to avoid duplicate alignments in the output. We measured the percentage of the true alignments (according to Rabema benchmark) found by the mappers among the alignments they reported. Table 4 shows that AMAS and mrsFAST were the most accurate while Masai reported quite a large number of duplicate alignments. Finally, we tested the mappers on a longer read length and more errors. A data set of one million reads of length 200bp were simulated from the human genome and then were mapped with up to e=10 errors (i.e. 5% error rate). The results are shown in Table 5. AMAS was able to map 99.90% of the reads and identified 99.02% of all mapping locations, including nearly all (99.99%) of the best mapping locations. Masai and Hobbes 2 achieved full sensitivity, but were 4-5 times slower than AMAS. GEM did not scale well with this experiment. In the single-thread test its memory footprint increased dramatically and in the eight-thread test it crashed due to memory errors. mrFAST was 3 11 times slower than AMAS and produced invalid SAM output. mrsFAST had similar running time as AMAS, but much lower mapping rate (62.56%) and sensitivity (61.42% of all mapping locations) because mrsFAST cannot handle indels. Index and memory footprint As AMAS processes reads in blocks of one million, the memory foot-print is kept stable regardless of the size of the input NGS data (Tables 2 and 3). To map the full data set SRR063408 of 25.6M 100bp reads to the human genome, AMAS requires 19.5 GB. The memory consumption includes 15.9 GB for the index and 3 GB for the reference sequence. The memory footprint is not well optimized yet and shall be the focus of our future development. Hobbes 2 uses hash tables and requires 16.7 GB. Masai uses suffix arrays and requires 25 GB. GEM uses FM index with much less memory footprint 5.7 GB for mapping. However, the memory footprint of GEM increases significantly or even crashes when outputting the alignments to SAM format (using “gem-to-sam” tool) or when handling longer reads with more errors (Tables 3, 5). mrsFAST uses hash tables but only needs 6.6 GB. Note that for smaller data sets (with 1M reads), mrsFAST and mrFAST have very low memory footprint, 2 GB, which is even less than the FM index (Table 2). Our index of the human genome takes about 3 hours to build, and it can be stored on a local disk with 13.8 GB for future mapping tasks (Supplementary Table S2). As our index needs to identify all possible adaptive seeds with desired frequencies and their locations in the reference sequence, it may take more time to build than other indexes. However, this indexing task only needs to be done once for each genome and does not affect the mapping time. Conclusions In this study, we proposed an effective strategy for the partition and filtration of adaptive seeds to speed up the exhaustive search for all possible mapping locations of NGS reads in a reference sequence. Our tool, AMAS, features a new index designed specifically to accelerate the alignment of adaptive seeds to the reference sequence. Frequency and length constraints on adaptive seeds allow better control on the candidate alignment space while preserving enough seeds to guarantee the mapping sensitivity. Finally, an accurate filtration strategy based on the last seeds and the extra seeds is further applied to substantially tighten the candidate alignment space, efficiently reducing the time for seed extension. As a result, AMAS runs several times faster than other competitors while achieving comparable sensitivity and accuracy. Multi-mapping reads are highly essential in several applications such as prediction of genomic variants or protein binding motifs located in repeat regions, isoform expression quantification, metagenomics analysis, etc. However, searching for them is a very time-consuming task. Current stateof-the-art all-mappers such as GEM, Masai, Hobbes 2, mrsFAST, mrFAST, and best-mappers such as Bowtie 2, BWA, etc, may take up to 1-2 days to find all possible mapping locations of reads from a single NGS run for the human genome. Our tool offers a more efficient way to significantly speed up that process. We have shown that AMAS run 2-7 times faster and was more sensitive than GEM. 12 AMAS was also up to 4 times faster than Masai, Hobbes 2, and mrFAST. Although AMAS did not achieve nearly full sensitivity like Masai, Hobbes 2, and mrFAST, it only missed out less than 1.76% of all mapping locations and 0.02% of all best mapping locations, while guaranteeing full sensitivity for matches with small numbers of errors. Most of missing locations by AMAS were those with high numbers of errors and may not be of interest in practice. AMAS scales well in multi-threading environment and keeps the memory footprint stable regardless of the size of input data. AMAS also supports pair-end read mapping, best-mapping mode, and –k mapping mode (reporting up to –k alignments for each read). Hence, we believe that AMAS will become a useful resource for read mapping in NGS data analysis. Competing interests The authors declare that they have no competing interests. Authors’ contributions XC and NHT designed the project. NHT developed the software and performed the analysis. NHT and XC wrote the manuscript. Both authors read and approved the manuscript. Acknowledgements We thank the SeqAn team, especially the authors of Masai package for making their source codes available. Our tool uses the SeqAn library and some well-developed components of Masai. This work was supported by the Singapore National Medical Research Council (CBRG11nov091) and the Singapore Ministry of Education Academic Research Fund (MOE2012-T2-1-055) References 1. 2. 3. 4. 5. 6. 7. 8. 9. Metzker ML: Sequencing technologies - the next generation. Nat Rev Genet 2010, 11(1):3146. Fonseca NA, Rung J, Brazma A, Marioni JC: Tools for mapping high-throughput sequencing data. Bioinformatics 2012, 28(24):3169-3177. Li H, Homer N: A survey of sequence alignment algorithms for next-generation sequencing. Brief Bioinform 2010, 11(5):473-483. Langmead B, Salzberg SL: Fast gapped-read alignment with Bowtie 2. Nat Methods 2012, 9(4):357-359. Langmead B, Trapnell C, Pop M, Salzberg SL: Ultrafast and memory-efficient alignment of short DNA sequences to the human genome. Genome Biol 2009, 10(3):R25. Li H, Durbin R: Fast and accurate short read alignment with Burrows-Wheeler transform. Bioinformatics 2009, 25(14):1754-1760. Li H, Durbin R: Fast and accurate long-read alignment with Burrows-Wheeler transform. Bioinformatics 2010, 26(5):589-595. Li H: Aligning sequence reads, clone sequences and assembly contigs with BWA-MEM. arXiv: 13033997 [q-bioGN] 2013. Alkan C, Kidd JM, Marques-Bonet T, Aksay G, Antonacci F, Hormozdiari F, Kitzman JO, Baker C, Malig M, Mutlu O et al: Personalized copy number and segmental duplication maps using next-generation sequencing. Nat Genet 2009, 41(10):1061-1067. 13 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. Hach F, Hormozdiari F, Alkan C, Birol I, Eichler EE, Sahinalp SC: mrsFAST: a cache-oblivious algorithm for short-read mapping. Nat Methods 2010, 7(8):576-577. Newkirk D, Biesinger J, Chon A, Yokomori K, Xie X: AREM: aligning short reads from ChIPsequencing by expectation maximization. J Comput Biol 2011, 18(11):1495-1505. Roberts A, Pachter L: Streaming fragment assignment for real-time analysis of sequencing experiments. Nat Methods 2013, 10(1):71-73. Li R, Yu C, Li Y, Lam TW, Yiu SM, Kristiansen K, Wang J: SOAP2: an improved ultrafast tool for short read alignment. Bioinformatics 2009, 25(15):1966-1967. David M, Dzamba M, Lister D, Ilie L, Brudno M: SHRiMP2: sensitive yet practical SHort Read Mapping. Bioinformatics 2011, 27(7):1011-1012. Hach F, Sarrafi I, Hormozdiari F, Alkan C, Eichler EE, Sahinalp SC: mrsFAST-Ultra: a compact, SNP-aware mapper for high performance sequencing applications. Nucleic Acids Res 2014, 42(Web Server issue):W494-500. Xin H, Lee D, Hormozdiari F, Yedkar S, Mutlu O, Alkan C: Accelerating read mapping with FastHASH. BMC Genomics 2013, 14 Suppl 1:S13. Weese D, Holtgrewe M, Reinert K: RazerS 3: faster, fully sensitive read mapping. Bioinformatics 2012, 28(20):2592-2599. Marco-Sola S, Sammeth M, Guigo R, Ribeca P: The GEM mapper: fast, accurate and versatile alignment by filtration. Nat Methods 2012, 9(12):1185-1188. Siragusa E, Weese D, Reinert K: Fast and accurate read mapping with approximate seeds and multiple backtracking. Nucleic Acids Res 2013, 41(7):e78. Ahmadi A, Behm A, Honnalli N, Li C, Weng L, Xie X: Hobbes: optimized gram-based methods for efficient read alignment. Nucleic Acids Res 2012, 40(6):e41. Kim J, Li C, Xie X: Improving read mapping using additional prefix grams. BMC Bioinformatics 2014, 15:42. Smith TF, Waterman MS: Identification of common molecular subsequences. J Mol Biol 1981, 147(1):195-197. Needleman SB, Wunsch CD: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J Mol Biol 1970, 48(3):443-453. Ferragina P, Manzini G: Opportunistic data structures with applications. In: Proceedings of the 41st Annual Symposium on Foundations of Computer Science. IEEE Computer Society; 2000: 390. Wu TD, Nacu S: Fast and SNP-tolerant detection of complex variants and splicing in short reads. Bioinformatics 2010, 26(7):873-881. Kielbasa SM, Wan R, Sato K, Horton P, Frith MC: Adaptive seeds tame genomic sequence comparison. Genome Res 2011, 21(3):487-493. Liu Y, Popp B, Schmidt B: CUSHAW3: sensitive and accurate base-space and color-space short-read alignment with hybrid seeding. PLoS One 2014, 9(1):e86869. Myers G: A fast bit-vector algorithm for approximate string matching based on dynamic programming. J ACM 1999, 46:395-415. Holtgrewe M: Mason - a read simulator for second generation sequencing data. Technical report TR-B-10-06, Institut fur Mathematik und Informatik, Freie Universitat Berlin 2010. Holtgrewe M, Emde AK, Weese D, Reinert K: A novel and well-defined benchmarking method for second generation read mapping. BMC Bioinformatics 2011, 12:210. 14 Figure Legends Figure 1. Partition of adaptive seeds. (A) Partition of the read “AGGTCAAGAAATTGAGACCATCCCGGCCAACTTGGTGAAACCCCGTCTCGTCTCTACTAAAAGT AAAAAAAATTAGCTGGGCGTGGTGGCGGGTGCATAT” against the human genome using 6 equallength16bp seeds (upper) and 6 adaptive seeds with frequencies less than F=300 (lower). Using adaptive seeds significantly reduced the total number of candidate locations by ~44.66 times. (B) A partial sub-tree of our index with k=10, F=300 for the human genome. Nodes were extended until their numbers of matches dropped below 300 (shaded leaf nodes). The path corresponding to the first adaptive seed of the read in (A) with length 13bp and frequency 157 is illustrated with bold lines. 15 Tables Table 1. Rabema benchmark for mapping the simulated data set of 100k reads of length 100bp to the human genome with up to e=5 errors. The first seven tools are all-mappers and the last three are best-mappers. The column “All” shows the percentage of all mapping locations that the mappers were able to find. Numbers in bold show the overall percentage, numbers in the smaller font size show detailed percentages for mapping locations with 0, 1, 2 (upper) and 3, 4, 5 (lower) errors. Similarly, the two columns “All-best” and “Any-best” respectively show the sensitivity of the mappers for identifying all of the best mapping locations and any of the best mapping locations of the reads. The last two columns, “Rec” and “Prec”, show the recall and the precision of the mappers, respectively (see the main text for the definitions of recall and precision). Mappers Reads mapped (%) AMAS 99.11 All (%) 100 Bowtie2 (k=100) 99.06 GEM (all) 99.06 Masai 99.06 Hobbes2 mrFAST mrsFAST 98.55 79.35 Bowtie2 (best) 98.58 GEM (best) 99.06 BWA 98.04 100 98.11 100 100 Any-best (%) 100 99.99 98.71 90.76 72.53 99.97 99.82 98.73 96.04 93.02 76.36 52.47 100 99.99 99.82 97.65 99.94 99.77 99.94 99.71 99.69 99.34 67.40 100 100 100 99.74 99.38 97.46 100 100 100 99.83 99.20 98.92 97.26 100 99.87 99.78 99.64 99.24 96.52 100 100 100 99.70 99.05 98.35 99.94 97.28 100 100 100 99.33 100 100 100 99.99 87.95 100 74.50 53.65 78.52 100 99.97 99.92 100 100 100 37.93 48.97 97.91 96.59 92.00 90.12 100 100 55.16 100 74.09 52.27 51.96 20.70 100 99.29 97.25 94.19 31.88 11.55 02.46 96.58 96.27 94.61 67.59 32.80 97.91 96.68 92.71 75.48 42.92 14.71 89.43 99.92 99.70 99.65 99.27 97.50 100 99.98 99.87 99.82 99.44 96.86 100 100 100 99.70 99.05 98.47 100 100 100 100 100 99.92 100 100 100 100 100 55.31 100 74.16 52.33 31.93 11.60 02.50 100 99.47 97.53 97.25 96.13 95.49 100 99.96 99.87 99.77 99.50 96.94 100.00 99.68 99.20 93.00 80.16 68.20 99.27 94.15 93.14 92.20 100 99.86 99.76 99.85 90.26 100 79.76 96.01 79.43 100 99.44 79.72 39.40 99.89 100 99.44 100 99.97 99.95 100 100 100 99.92 99.95 99.85 100 99.88 99.85 88.26 100 100 99.59 97.27 99.11 100 All-best (%) 99.91 99.54 99.21 96.50 96.58 96.54 96.21 90.13 77.24 65.54 95.53 98.76 16 Rec (%) Prec (%) 99.09 99.99 98.40 99.76 98.72 99.73 99.05 100 98.99 99.89 98.00 99.43 78.14 98.75 94.88 96.25 98.61 99.70 93.92 95.79 Table 2. Rabema benchmark, running time, and memory footprint for mapping the first one million reads of the real Illumina data set SRR063408 to the human genome with up to e=5 errors. The read mapping was performed using 1 thread and 8 threads. Masai and mrFAST do not support multi-threading. The column “All” shows the percentage of all mapping locations that the mappers were able to find. Similarly, the two columns “All-best” and “Any-best” respectively show the sensitivity of the mappers for identifying all of the best mapping locations and any of the best mapping locations of the reads. In this experiment, mrFAST produced invalid SAM output with many inconsistent CIGAR strings, which could not be converted to BAM for further analysis. NA: not available. Mappers 1-thread Time (mm:ss) 8-thread Time (mm:ss) Memory (GB) Reads mapped (%) All (%) All-best (%) Any-best (%) AMAS 29:43 04:59 19.4 93.75 98.14 99.98 99.99 Bowtie2 (k=100) 55:30 07:31 3.6 93.70 95.89 99.60 99.91 GEM (all) 71:41 36:45 5.3 93.69 97.89 99.91 99.92 Masai 91:12 NA 16.7 93.75 99.93 100 100 Hobbes2 110:24 15:16 14.9 93.76 99.90 100 100 mrFAST 189:47 NA 2.0 NA NA NA NA mrsFAST 29:41 11:28 2.1 92.38 97.12 98.48 98.50 Table 3. Details of mapping the full data set SRR063408 of 25.6 million reads to the human genome with up to e=5 errors. The read mapping was performed using 1 thread and 8 threads. Masai and mrFAST do not support multi-threading. For this full data set, GEM was not able to output the alignment results in the SAM format. Thus we only recorded its running time and memory consumption for the mapping step, but not the writing step. mrFAST could not finish the mapping within 3 days, thus we did not record its results. NA: not available. Mappers 1-thread Time (hh:mm) 8-thread Time (hh:mm) Memory (GB) AMAS Bowtie2 (k=100) GEM* (all) Masai Hobbes2 mrFAST mrsFAST 12:09 24:23 18:07 31:02 49:56 NA 08:48 01:59 03:19 10:41 NA 08:13 NA 04:06 19.5 3.8 5.7 25.0 16.7 NA 6.6 17 Table 4. Percentage of the true alignments found by the mappers among the alignments they reported. For the real data set of one millions reads, mrFAST produced invalid SAM output with many inconsistent CIGAR strings, which could not be converted to BAM for further analysis. NA: not available. AMAS GEM (all) Masai Hobbes 2 mrFAST mrsFAST Number of true alignments found 8,886,145 8,624,695 13,813,089 13,735,743 13,806,005 10,785,780 Number of alignments reported 8,886,270 8,628,751 21,954,696 13,762,313 13,918,070 10,785,975 100 99.95 62.92 99.81 99.20 100 Number of true alignments found 99,339,852 105,459,737 148,827,680 148,526,618 NA 134,412,384 Number of alignments reported 99,447,106 105,602,112 243,162,835 148,743,923 149,368,650 134,506,255 99.89 99.87 61.21 99.85 NA 99.93 Mappers Simulated data set of 100k reads Percentage Real data set of 1M reads Percentage Table 5. Rabema benchmark, running time, and memory footprint for mapping the simulated data set of one million reads of length 200bp to the human genome with up to e=10 errors. The read mapping was performed using 1 thread and 8 threads. Masai and mrFAST do not support multithreading. The multi-threading mode of GEM also crashed for this data set due to memory problem. The column “All” shows the percentage of all mapping locations that the mappers were able to find. Similarly, the two columns “All-best” and “Any-best” respectively show the sensitivity of the mappers for identifying all of the best mapping locations and any of the best mapping locations of the reads. In this experiment, mrFAST produced invalid SAM output with many inconsistent CIGAR strings, which could not be converted to BAM for further analysis. NA: not available. Mappers 1-thread Time (mm:ss) 8-thread Time (mm:ss) Memory (GB) Reads mapped (%) All (%) All-best (%) Any-best (%) Recall (%) Precision (%) AMAS 38:58 05:55 19.6 99.90 99.02 99.99 100 99.89 100 Bowtie2 (k=100) 185:30 24:41 3.6 99.90 98.20 99.76 99.94 99.64 99.90 GEM (all) 332:47 NA 19.7 99.90 98.71 99.95 99.99 99.42 99.55 Masai 217:06 NA 17.0 99.90 100 100 100 99.90 100 Hobbes2 180:35 24:21 14.2 99.90 99.91 100 100 99.81 99.91 mrFAST 122:26 NA 2.3 NA NA NA NA NA NA mrsFAST 33:53 07:08 2.9 62.56 61.42 62.28 62.31 60.92 97.71 18 Additional files Additional file 1 – Supplementary figures Additional file 2 – Supplementary tables 19 (A) 16 16 16 16 16 16 55 3 35,778 1,585 6,534 3,246 13 15 17 13 15 24 157 134 184 293 282 7 ∑=47,201 ∑=1,057 (B) AAAAAAAAAA: 3,000,786 A: 612 A: 2,272 A: 99 A: 208 C: 386 C: 700 C: 35 C: 323 AGGTCAAGAA: 5,466 G: 438 G: 1,136 G: 165 G: 148 T: 836 T: 1,358 TTTTTTTTTT: 3,015,555 T: 24 T: 157
5
A LINEAR TIME ALGORITHM FOR THE 3-NEIGHBOUR TRAVELLING SALESMAN PROBLEM ON A HALIN GRAPH AND EXTENSIONS arXiv:1504.02151v5 [cs.DM] 4 Sep 2017 BRAD WOODS, ABRAHAM PUNNEN, AND TAMON STEPHEN Abstract. The Quadratic Travelling Salesman Problem (QTSP) is to find a least cost Hamiltonian cycle in an edge-weighted graph, where costs are defined for all pairs of edges contained in the Hamiltonian cycle. The problem is shown to be strongly NP-hard on a Halin graph. We also consider a variation of the QTSP, called the k-neighbour TSP (TSP(k)). Two edges e and f , e 6= f , are k-neighbours on a tour τ if and only if a shortest path (with respect to the number of edges) between e and f along τ and containing both e and f , has exactly k edges, for k ≥ 2. In (TSP(k)), a fixed nonzero cost is considered for a pair of distinct edges in the cost of a tour τ only when the edges are p-neighbours on τ for 2 ≤ p ≤ k. We give a linear time algorithm to solve TSP(k) on a Halin graph for k = 3, extending existing algorithms for the cases k = 1, 2. Our algorithm can be extended further to solve TSP(k) in polynomial time on a Halin graph with n nodes when k = O(log n). The possibility of extending our results to some fully reducible class of graphs is also discussed. TSP(k) can be used to model the Permuted Variable Length Markov Model in bioinformatics as well as an optimal routing problem for unmanned aerial vehicles (UAVs). 1. Introduction The Travelling Salesman Problem (TSP) is to find a least cost Hamiltonian cycle in an edge weighted graph. It is one of the most widely studied combinatorial optimization problems and is well-known to be NP-hard. The TSP model has been used in a wide variety of applications. For details we refer the reader to the well-known books [2, 8, 18, 23, 27] as well as the papers [4, 13, 21, 22]. For some applications, more than linear combinations of distances between consecutive nodes are desirable in formulating an objective function. Consider the problem of determining an optimal routing of an unmanned aerial vehicle (UAV) which has a list of targets at specific locations. This can be modelled as a TSP which requires a tour that minimizes the distance travelled. However, such a model neglects to take into account the physical limitations of the vehicle, such as turn radius or momentum. To illustrate this idea, in Figure 1 we give a Hamiltonian path, in Figure 2 we give the corresponding flight path, and Figure 3 shows a route which is longer but can be travelled at a greater speed and hence reducing the overall travel time. To model the traversal time, we can introduce penalties for pairs of (not necessarily adjacent) edges to force a smooth curve for its traversal. In this paper we consider a generalization of the TSP which can be used to model similar situations and contains many variations of the TSP, such as the angular-metric TSP [1] and the TSP [5] as special cases. Let G = (V, E) be an undirected graph on the node set V = {0, 1, . . . , n − 1} with the convention that all indices used hereafter are taken modulo n. For each edge (i, j) ∈ E a nonnegative cost cij is given. Let F be the set of all tours (Hamiltonian cycles) in G and let τ = (v0 , v1 , . . . , vn−1 , v0 ) ∈ F. Note that a tour τ can be represented either by its sequence (permutation) of the vertices, or by the sequence, or simply the set, of edges it traverses. In this paper, it is usually more convenient to work with the edge representation. The edges e = (vi , vi+1 ) and f = (vj , vj+1 ), e 6= f , are k-neighbours on τ , if and only if a shortest path between e and f on τ containing these edges has exactly k edges, for k ≥ 2. Here the shortest path refers to the path with the least number of edges, rather than the minimum cost path. Thus e and f are 2-neighbours in τ if and only if they share a common node in τ . Let q(e, f ) be the cost of the pair (e, f ) of edges and δ(k, τ ) = {(e, f ) : e, f ∈ τ and e and f are pneighbours on τ for some 2 ≤ p ≤ k}. Assume that q(e, f ) = q(f, e) for every pair of edges e, f ∈ E. Then the k-neighbour TSP (TSP(k)) is defined as in [31] 1 Figure 2. Smoothing of the optimal TSP tour. Figure 1. Optimal TSP tour. Figure Figure Figure 3. A Figure 3. A route which cantour be 1. Optimal Figure which can 1. Optimal TSP tour. TSP tour 2. Smoothbe travFigure 2. Smoothing of the optimal TSP tour. with respect ing of the elled more to length. tour. quickly. T SP (k) : X Minimize q(e, f ) + (e,f )∈δ(k,τ ) Subject to X travelled more quickly c(e) e∈τ τ ∈ F. A closely related problem, the Quadratic TSP (QTSP), is defined as follows: QT SP : X Minimize (e,f )∈τ ⊗τ Subject to q(e, f ) + X c(e) e∈τ τ ∈ F. where τ ⊗ τ = τ × τ \ of {(e,the e) : e ∈ τ }. Note: TSP tour. Figure 2. Smoothing optimal ( Figure 3. A route which can be iftravelled more 1 quickly. δ(n/2, τ ) n is even gure 3. τ ⊗τ = δ((n + 1)/2, τ ) if n is odd. Thus when k ≥ n/2 (for n even) or k ≥ (n + 1)/2 (for n odd), the k-neighbour TSP reduces to the Quadratic TSP [33]. Define TSP(1) to be the original TSP. Elsewhere in the literature (e.g. [17], [14]), the term Quadratic TSP is sometimes used for what we refer to as TSP(2). That is, quadratic terms are allowed, but only for pairs of edges that share a node. The bottleneck version of TSP(k) was introduced by Arkin et al. in [3], denoted as the k-neighbour maximum scatter TSP. Jäger and Molitor [19] encountered TSP(2) while studying the Permuted Variable Length Markov Model. Several heuristics are proposed and compared in [16, 19] as well as a branch and bound algorithm for TSP(2) in [16]. A column generation approach to solve TSP(2) is given in [28], lower bounding procedures discussed in [29], and polyhedral results were reported by Fischer and Helmberg [17], Fischer [14], and Fischer and Fischer [15]. The k-neighbour TSP is also related to the k-peripatetic salesman problem [12, 20] and the watchman problem [7]. Algorithms for maximization and minimization versions of TSP(2) were studied by Staněk [30] and Oswin et al. [26]. To the best of our knowledge, no other works in the literature address TSP(k). Referringwhich to the UAV discussed earlier, it isquickly. clear that the flight subpaths depend on both the A route canexample be travelled more angle and distances between successive nodes. By precalculating these and assigning costs to q(e, f ), for e, f ∈ E, we see that QTSP is a natural model for this problem. In fact, the flight paths may be affected by edges further downstream. Thus we can get successively better models by considering TSP(1), TSP(2),. . ., 12 TSP(k) in turn. In practice we expect diminishing returns to take hold quickly and hence TSP(k) with small values of k are of particular interest. In this paper we show that QTSP is NP-hard even if the costs are restricted to 0-1 values and the underlying graph is Halin. In contrast, TSP and TSP(2) on a Halin graph can be solved in O(n) time [9, 33]. Interestingly, we show that TSP(3) can also be solved on a Halin graph in O(n) time, although as we move from TSP(2) to TSP(3), the problem gets much more complicated. In fact, our approach can be extended to obtain polynomial time algorithms for TSP(k) whenever k = O(log n). We note that while Halin graphs have treewidth 3, the results on graphs with bounded treewidth (e.g. [6, 11]) usually cannot easily be extended to optimization problems with quadratic objective functions. The paper is organized as follows. In Section 2 we introduce some preliminary results and notations for the problem. The complexity result for QTSP on Halin graphs is given in Section 3. An O(n) algorithm to solve TSP(3) on Halin graphs is given in Section 4.1, which can be extended to obtain an O(n2(k−1)/2 ) algorithm for TSP(k). Further extensions of this result to fully reducible classes of graphs are briefly discussed in Section 5. An earlier version of the NP-completeness results presented here were included as part of the M.Sc. thesis of the first author [31]. 2. Notations and definitions A Halin graph H = T ∪ C is obtained by embedding a tree with no nodes of degree two in the plane and connecting the leaf nodes of T in a cycle C so that the resulting graph remains planar. Unless otherwise stated, we always assume that a Halin graph or its subgraphs are given in the planar embedded form. The non-leaf nodes belonging to T are referred to as tree or internal nodes and the nodes in C are referred to as cycle or outer nodes of H. A Halin graph with exactly one internal node is called a wheel. If H has at least two internal nodes and w is an internal node of T which is adjacent to exactly one other internal node, then w is adjacent to a set of consecutive nodes of C, which we denote by C(w). Note that |C(w)| ≥ 2. The subgraph of H induced by {w} ∪ C(w) is referred to as a fan, and we call w the centre of the fan. See Figure 4. F w edge in C edge in T fan in H Figure 1. A Halin graph with 3 fans. w is the centre of fan F . Figure 4. A Halin graph H with 3 fans. w is the centre of fan F . Lemma 2.1 (Cornuejols et al. [9]). Every Halin graph which is not a wheel has at least two fans. Let G = (V, E) be a graph and let S ⊆ V be a connected subgraph of G. Let ϕ(S) be the cutset of S, that is, the smallest set of edges whose removal disconnects S from the vertices in V \ S. Let G/S be the graph obtained by contracting S into a single node, called a ‘pseudonode’ denoted by vS [9]. The edges in G/S are obtained as follows: 3 (1) An edge with both ends in S is deleted; AinHalin with 3 fans. w is the centre (2) An edge Figure with both 1. ends G − Sgraph remains unchanged; (3) An edge (v1 , v2 ) with v1 ∈ G − S, v2 ∈ S is replaced by the edge (v1 , vs ). of fan F . Lemma 2.2 (Cornuejols et al. [9]). If F is a fan in a Halin graph H, then H/F is a Halin graph. Note that each time a fan F is contracted using the graph operation H/F , the number of non-leaf nodes of the underlying tree is reduced by one. That is, after at most d(n − 1)/2e fan contractions, a Halin graph will be reduced to a wheel. Let w be the centre of a fan F , and label the outer nodes in F in the order they appear in C as, u1 , u2 , . . . , ur (r ≥ 2). Let (j, k, l) be the 3-edge cutset ϕ(F ) which disconnect F from G such that j is adjacent to u1 , k is adjacent to w but not adjacent to ui for any i, 1 ≤ i ≤ r, and l is adjacent to ur (See Figure 5, r = 4). Note that every Hamiltonian cycle τ in H contains exactly two edges of {j, k, l}. The pair of edges chosen gives us a small number of possibilities for traversing F in a tour τ . For example, if τ uses k and l, it contains the subsequence w, u1 , u2 , . . . , ur (call this a left-traversal of F ), if τ uses j and k it contains the subsequence u1 , u2 , . . . ur , w (call this a right-traversal of F ) and if τ uses j and l, it contains a subsequence of the form u1 , u2 , . . . , ui , w, ui+1 , . . . , ur , for some i ∈ {1, 2, . . . , r − 1} as it must detour through the centre of F (call this a centre-traversal of F ). j F u1 u2 u3 v k edge in C edge in T fan in H u4 l Figure A Halin H containing fan F a. 3-edge {j, k,cutset l} is which a 3-edge cutset Figure 5. 2. A Halin graphgraph H containing fan F . {j, k, l} is disconnects disconnects F from H. Fwhich from H. 1 3. Complexity of QTSP on Halin graphs Many optimization problems that are NP-hard on a general graph are solvable in polynomial time on a Halin graph [9, 24, 25]. In particular, TSP on a Halin graph is solvable in linear time. Unlike this special case, we show that QTSP is strongly NP-hard on Halin graphs. The decision version of QTSP on a Halin graph, denoted by RQTSP, can be stated as follows: P e∈τ c(e) + P “Given a Halin graph H and a constant θ, does there exist a tour τ in H such that q(e, f ) ≤ θ?” e,f ∈τ Theorem 3.1 (Woods [31]). RQTSP is NP-complete even if the values c(e) ∈ {0, 1} and q(e, f ) ∈ {0, 1} for e, f ∈ H. Proof. RQTSP is clearly in NP. We now show that the 3-SAT problem can be reduced to RQTSP. The 3-SAT problem can be stated as follows: “Given a Boolean formula R in Conjunctive Normal Form (CNF) containing a finite number of clauses C1 , C2 , . . . , Ch on variables x1 , x2 , . . . , xt such that each clause contains 4 exactly three literals (L1 , . . . , L3h where for each i, Li = xj or Li = ¬xj for some 1 ≤ j ≤ t), does there exists a truth assignment such that R yields a value ‘true’ ?” From a given instance of 3-SAT, we will construct an instance of RQTSP. The basic building block of our construction is a 4-fan gadget obtained as follows. Embed a star on 5 nodes with center v and two specified nodes ` and r on the plane and add a path P from ` to r covering each of the pendant nodes so that the resulting graph is planar (see Figure 6). Call this special graph a 4-fan gadget. µ1 µ2 µ3 r ` v Figure 4-fan gadget constructed by embedding starinon nodes the Figure 6.3.4-fan gadget constructed by embedding a star on 5anodes the4plane andinadding a path.and adding a path connecting the pendant nodes so that the resulting plane graph is planar. The nodes on path P of this gadget are called outer nodes and edges on P are called outer edges. Let µ1 , µ2 , µ3 be edges with distinct end points in P . Note C1 that any `-r Hamiltonian path of the gadget must contain all the outer edges except one which is skipped to detour through v. We will refer to an `-r µ 2 µ1 µ3 Hamiltonian path in a 4-fan gadget as a center-traversal as r1 before. l1 We will construct a Halin graph H using one copy of the gadget for each clause and let µ1 , µ2 , µ3 correspond to literals contained in that clause. We will assign costs to pairs of edges such that every Hamiltonian cycle with cost 0 must contain a centre-traversal for each clause. To relate a Hamiltonian cycle to a truth vy which does not contain edge µi corresponds assignment, a centre-traversal to an assignment of a true value l2 µ4 to literal Li . v1 y clause C1 , . . . , Ch , create a copy of µthe 4-fan gadget. The r, `, and v Now construct H as follows. For each 5 nodes of the 4-fan gadget corresponding to the clause Ci are denoted by ri , `i andCv2i respectively. Connect the 6 node ri to the node `i+1 , i = 1, 2, . . . , h. Introduce nodes vxv2and vy and theµedges (`1 , vx ), (vx , vy ), (vy , rh ). vx w and connect it to vw Also introduce a new node x , vy and vi for i = 1, 2, . r.2. , h − 1. The resulting graph is the required Halin graph H. See Figure x 7. Assign the cost c(e) = 0 for every edge in H. Let x = (vx , w) and y = (vy , w). Note that every tour which contains edges x and y traverses every gadget using a centre-traversal. For each gadget: assign costs of v4 v3 q(e, f ) = 1 for pairs of edges which are neither outer edges nor both adjacent to the same literal edge µ1 , µ2 or µ3 , and for all other pairs of edges within the gadget assign cost 0. For each variable xj , j = 1, . . . , n, and all literals Lm , Lq (m 6=r4q) if xj = Lm = ¬Lq , assign cost q(µ0ml,3µ0q ) = 1 where µ0m and µ0q are edges connecting µm (and µq ) to the paired costs are assumed to be 0. µ7 µ12respective 4-fan gadget centre v. All other Suppose B is a valid truth assignment. Then in each clause there exists at least one true literal. Consider µ 8 µ11 C3gadget such that τ detours around C4 the a tour τ in H which contains edges r3 µ9 every µ10 l4x and y and traverses exactly one literal edge which corresponds to a literal which is true in B. Since the truth assignment is valid, such a τ exists. Clearly τ has cost 0, since no costs are incurred by pairs of edges contained in a single Figure 4. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 . gadget, nor are costs incurred of the form q(µ0a , µ0b ) where La = ¬Lb . The latter must be true because in any truth assignment, the variable corresponding to La , say xa , must be either assigned a value of true or false. Suppose a cost of 1 is incurred by q(µ0a , µ0b ) and hence La = ¬Lb . If xa is true, and xa = La , then Lb clearly must be false, so τ cannot detour to miss both µ0a and µ0b . The same contradiction arises, if xa is false. Hence a yes instance of 3-SAT can be used to construct a yes instance for RQTSP with θ = 0. Now suppose there is a tour which solves RQTSP with θ = 0. Suppose τ 0 is such a tour. Clearly it must use edges x and y, and hence must traverse every gadget via a centre-traversal. Such a detour must 5 v Figure 3. 4-fan gadget constructed by embedding a star on 4 nodes in the plane and adding a path connecting the pendant nodes so that the resulting graph is planar. C1 µ1 µ2 µ3 r1 l1 vy l2 v1 y µ5 µ6 v2 vx C2 r2 w x v4 v3 r4 l3 µ12 µ7 C4 µ4 µ8 µ11 r3 µ 9 µ10 l4 C3 Figure 4. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 . Figure 7. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 . skip a literal edge in every gadget, otherwise a cost of 1 is incurred. Suppose D = {L1 , . . . , Ls } is the set of literals which are skipped. Li 6= ¬Lj for any i, j, otherwise a cost of 1 is incurred. This implies that a truth assignment which results in every literal in D being true is a valid truth assignment to the variables x1 , . . . , xt . That is, for each literal edge which is skipped in τ 0 , assign true or false to the corresponding variable such that the literal evaluates to true (if Li = xj , set xj = true and if Li = ¬xj , set xj = f alse). The truth values for any remaining variables can be assigned arbitrarily. This truth assignment returns true for each clause since exactly one literal in each clause is detoured, and evaluates to true. Hence this truth assignment is a valid assignment for 3-SAT.   4. Complexity of k-neighbour TSP on Halin graphs Let G be a planar embedding of a planar graph and e and f are two distinct edges of G. Then e and f 2 contains both e and f . This may include the outer are said to be cofacial if there exists a face of G which face. Theorem 4.1. Let τ be a tour in the planar embedding H = T ∪ C of a Halin graph. Then, any two edges adjacent in τ must be cofacial. Proof. Suppose the result is not true. Then, there exists a tour τ in H containing two adjacent edges e = (u, x), f = (x, v) such that e and f are not cofacial. From our previous discussion on fan traversals, we can assume that x 6∈ C. Since e and f are not cofacial at x, there exists edges g = (y, x) and h = (x, z) in H such that the clockwise ordering of edges incident on x is of the form f, . . . , g, . . . , e, . . . , h (See Figure 8). Without loss of generality, assume T is rooted at x. Then T has at least four subtrees Tu , Tv , Ty , Tz rooted respectively at u, v, y and z. Since τ is a tour containing the edge e, it must contain a path, say P1 , through the subtree Tu from u to uc ∈ C. Note that uc could be the same as u and in this case the subtree Tu is the isolated node u. Similarly, τ must contain a path P2 in Tv from v to vc ∈ C (See Figure 8). Note that P = P1 ∪ P2 ∪ {e, f } is a path in τ . Deleting the vertex set V (P ) of P and its incident edges from H yields a disconnected graph. Thus, τ − V (P ) must be disconnected, a contradiction.   A preliminary version of this result is given in [31]. 6 yc y g uc P1 u e x v f vc P2 h z zc Figure8.5.A A Halin graph H non-consecutive with non-consecutive edges andx.f Hat− node x. Figure Halin graph H with edges e and f at enode P where P P2 ∪ {e,Pf }=has hence no components, τ contains bothhence edges enoand f. H =−PP1 ∪where P1 two ∪ Pcomponents, two τ contains 2 ∪ {e, f } has both edges e and f . x A path in the planar embedding H = T ∪ C of a Halin graph is called a candidate paths if its consecutive α α 5 edges are cofacial. A candidate path with k-edges is called 6a candidate k-path. Note that only candidate paths can be subpaths of a tour but it is possible that kthere are candidate paths that are not part of a tour. Corollary 4.2. Let H = T ∪ C be a planar embedding of a Halin graph a specified edge of H. α4 and eαbe α2 3 w Then, H has at most k α · 21k−1 candidate k-paths containing e. Proof. Consider extending e, if necessary in either directions in H, to a candidate k-path P . For a given u u0 end point of a sub path of P , say vertex u, tby are onlyr+1 two possible edges incident on 1 Theorem 4.1,tthere r u, which may belong to P . Thus, there are at most 2k−1 candidate k-paths when the position of e is fixed. Since e can take any of the k positions in a candidate k-path, there arel at most k · 2k−1 candidate k-paths j u1 ur containing e.   yr−1 y1 As an immediate consequence of Corollary 4.2, we have an upper bound of 2n−2 on the number of Hamiltonian cycles in a Halin graph. To see this, let r be the number of Hamiltonian cycles in H. From Figure 6. A fan F with centre w. Every τ containing j and k contains each such cycle, we can generate n distinct Hamiltonian paths (candidate (n − 1)-paths) by ejecting an edge. edges . . ,Hamiltonian yr−1 , tr . Every l contains y1and , . . . all , yr−1 , t1paths . 1 , .all Repeating this yfor cyclesτ incontaining H, we get k rnand candidate (n − edges 1)-paths these are Every τ containing j and l must contain one of the subpaths from the set distinct. Hence rn is a lower bound on the number of candidate (n − 1)-paths in H. By Corollary 4.2, (n − 1)2n−2 upper Thus, {α1is−anj − l − bound α3 , α1on − the j −number l − α4 ,ofαcandidate − −α1)-paths l− α4 }.rn ≤ (n − 1)2n−2 and 2 − j − l (n 3 , α2 − jin−H. n−1 n−2 n−2 hence r ≤ n 2 ≤2 . Noting that there are at most 2(n − 1) edges in H and that the number of quadratic costs which are relevant is the number of candidate k-paths, it follows from Corollary 4.2, that the number of quadratic costs which are relevant is bounded above by k · 2k · (n − 1) = O(n) for any fixed k and O(nt+2 ) if k ≤ t log n. Note that any face of H must contain an outer edge. Moreover, the following Corollary will prove useful. Corollary 4.3. If H is embedded in the plane such that it is planar and C defines the outer face, for any outer edge e which is contained in the outer face and face Fe , every tour which does not contain e must contain all other edges of Fe . 7 3 4.1. TSP(3) on Halin graphs. As indicated earlier, TSP(1) is the same as TSP, which is solvable in linear time on Halin graphs [9]. TSP(2) can also be solved in linear time by appropriate modifications of the algorithm of [25] as indicated in [33]. However, for k ≥ 3, such modifications do not seem a viable option. We now develop a linear time algorithm to solve TSP(3). Let us start with an alternative formulation of TSP(3). For any subgraph G of H, let P3 (G) be the collection of all distinct candidate 3-paths in G. For each candidate 3-path (e, f, g) ∈ P3 (H), define q(e, f, g) = q(e, g) + q(e, f ) + q(f, g) c(e) + c(f ) + c(g) + . 2 3 (4.1) Now consider the simplified problem: ST SP (3) : Minimize X q(e, f, g) (e,f,g)∈P3 (τ ) Subject to τ ∈ F. Theorem 4.4. Any optimal solution to the STSP(3) is also optimal solution to TSP(3). Proof. For any τ ∈ F, X q(e, f, g) (e,f,g)∈P3 (τ )  q(e, f ) + q(f, g) c(e) + c(f ) + c(g) + = q(e, g) + 2 3 (e,f,g)∈P3 (τ ) X X = q(e, f ) + c(e). X (e,f )∈δ(3,τ )  e∈δ(τ ) Thus, the objective function values of STSP(3) and TSP(3) are identical for identical solutions. Since the family of feasible solutions of both these problems are the same, the result follows.   In view of Theorem 4.4, we restrict our attention to STSP(3). For TSP(1), Cornuejols et al. [9] identified costs of new edges generated by a fan contraction operation by solving a linear system of equations. This approach cannot be extended for any k-neighbour TSP for k ≥ 3 as it leads to an over-determined system of equations which may be infeasible. Instead, we extend the penalty approach used in Phillips et al. [25]. The idea here is to introduce a node-weighted version of the problem STSP(3) where we use a penalty function for the nodes of C, the value of which depends on the edges chosen to enter and exit the node, along with some other ‘candidate’ edges. We iteratively contract the fans in H, storing the appropriate values of suitable subpaths as we traverse the fans in a recursive way. Once we reach a wheel, we can compute an optimal tour for the resulting problem. Backtracking by recovering appropriate subpaths from contracted fans in sequence, an optimal solution can be identified. To formalize the general idea discussed above, let us first discuss the case where H is a Halin graph which is not a wheel. In this case, H will have at least two fans. Let F be an arbitrary fan in H with w as the centre. Label the outer nodes of F in the order they appear in C, say, u1 , u2 , . . . , ur (r ≥ 2). Let {j, k, l} be the 3-edge cutset ϕ(F ) which disconnects F from H such that j is adjacent to u1 , k is adjacent to w and l is adjacent to ur . Let j = (u1 , u0 ), k = (w, x) and l = (ur , ur+1 ). There are exactly two edges not connected to F which are cofacial with k and incident on x. The first edge which follows k in the clockwise orientation of edges incident on x is denoted α5 , and the other edge incident on x and cofacial with k is denoted by α6 . (See Figure 9.) There are exactly two edges not connected to F and incident on u0 . These edges are labelled α1 , α2 . Likewise, there are exactly two edges not connected to F and incident on ur+1 . These edges are labelled α3 , α4 . (See Figure 9.) Without loss of generality α1 , α3 are in C and α2 , α4 are in T . It is possible that α2 could be the same as α5 and also possible that α4 could be the same as α6 . To complete a fan contraction operation, we consider the 3 types of traversals of F . We define a penalty function stored at nodes (pseudonodes) of C which contains attributes of a minimum traversal of F of each type. For any left- or right-traversal of F , there is a single path through F using all cycle edges. Any tour which includes j and k must pass through one edge of the pair incident on u0 lying outside F together with edges y1 , . . . , yr−1 , tr , k, α6 . Similarly, any tour which includes k and l must pass through one edge of the pair incident on ur+1 lying outside F together with edges yr−1 , . . . , y1 , t1 , k, α5 . Any tour which includes j and l must also pass through one edge in each of the pairs of edges incident on u0 (or ur+1 ) lying outside 8 z zc F . That is, every tour τ containing j and l must contain a path containing one collection of edges from the set {(α1 ,Figure j, l, α3 ), (α5. l, α , j, l, α3 ), α4 )}. We refer to aedges centre-traversal of Fnode whichx.bypasses 1 , j,A 4 ), (α2graph 2 , j, l, non-consecutive Halin H(αwith e and f at y1 ∈ F ∩ C as a left path, one which bypasses ys ∈ F ∩ C for some s ∈ [2, r − 2] as a middle path, and one H − P where P = P ∪ P ∪ {e, f } has two components, hence no τ contains which bypasses yr−1 ∈ F ∩ C as 1a right2 path. both edges e and f . α5 x α6 k α2 α1 α4 w u0 t1 ur+1 tr j u1 α3 ur l yr−1 y1 Figure9. 6. A Ffan F centre withw.centre Every jτand containing j and Figure A fan with Every τw. containing k contains edges y1 ,k. . .contains , yr−1 , tr . Every τ containing k and l contains edges y , . . . , y , t . Every τ containing j and l must edges y1 , . . . , yr−1 , tr . Every τ containing k and , t1 . 1 r−1 l 1contains edges y1 , . . . , yr−1 contain one of the subpaths from the set {α − j − l − α , α − j − l − α , α − j − l − α 1 4 2 from the 3 , αset 2− Every τ containing j and l must contain one3 of1 the subpaths j − l − α4 }. {α1 − j − l − α3 , α1 − j − l − α4 , α2 − j − l − α3 , α2 − j − l − α4 }. Let S be the set of nodes (pseudonodes) in C at some iteration in the contraction process. In TSP(3), quadratic costs are ‘absorbed’ during each fan contraction operation, depending both on the edges in F and within a distance 2 from F , so care must be taken to retain the proper information. That is, in order to develop an extension of the penalty approach used in Phillips et al. [25] for TSP(3), we extend the penalty function stored at the nodes (pseudonodes) in C that depends on an additional parameter ρ, which specifies the structure of edges around each pseudonode. Note that due to the recursive property of pseudonodes where a fan contraction operation may ‘absorb’ pseudonodes, the parameter ρ specifies a shape of the structure rather than explicitly stating the edges surrounding a pseudonode. Further, we define a function β which stores the penalty values associated with ρ. 3 0), L = (1, 0), R = (0, 1), B = (1, 1)} and A2 be the Let A1 be the collection of ordered pairs {M = (0, collection of ordered pairs {(1, 3), (1, 4), (1, 6), (2, 3), (2, 4), (2, 6), (5, 3), (5, 4)}. At each node i ∈ S we define 12 1 2 21 22 2 ρi = (ρ1i , ρ2i ) where ρ1i = (ρ11 i , ρi ) ∈ A and ρi = (ρi , ρi ) ∈ A . ρi indicates which penalty value (to be defined shortly) stored at pseudonode i is to contribute to the objective function value. The first component of ρi is a binary vector of length 2 which specifies the inner structure of i (edges y1 , t1 , yr−1 and tr prior to any fan contractions such that the first component is 0 if y1 is selected, and 1 if t1 is instead, and the second component is 0 if yr−1 is selected, and 1 if tr is instead), and the second component of ρi , the outer structure (α1 to α6 prior to any contraction of adjacent pseudonodes). Let ρ be the vector containing ρi for every i ∈ S. Let ρH/F be the restriction of ρ to the vertices in H/F and augmented by ρvF ∈ {(a, b)}. Let βi (ρi ) be the penalty that is incurred if ρi occurs at i. For i ∈ C define: ( βi (ρi ) if ρi is defined, Pi (τ, ρi ) = 0 otherwise. Since the penalties stored at i ∈ S depend on edges which are not incident with i, and the dependent edges may be ‘absorbed’ into adjacent pseudonodes so that not every ρ is feasible for a given τ . That is, the inner and outer structures of adjacent pseudonodes in C must agree. Formally, we say that ρ is feasible for τ if the following conditions are satisfied for every pseudonode i (1) j, k ∈ τ ⇐⇒ ρ22 i = 6 and (2) k, l ∈ τ ⇐⇒ ρ21 i = 5, 9 Figure 7. A tour τ in a wheel, which skips edge ci . ci−1 ci+1 ti+1 ti w ui+1 i and for every pair of consecutive upseudonodes i, i + 1 ∈ C (1) (2) (3) (4) ρ12 i ρ12 i ρ22 i ρ22 i =1 =0 =3 =4 ⇐⇒ ⇐⇒ ⇐⇒ ⇐⇒ ρ21 i+1 ρ21 i+1 ρ11 i+1 ρ11 i+1 = 2, ci = 1, = 0 and = 1. ti+1 ti ci ui+1 ui c ci+1 For an example i−1 Let F 0 be the set of all feasible (τ, ρ) pairs. of a feasible (τ, ρ) pair, see Figure 10. Figure 8. Wheel H with center w considered as a fan. F1 F2 F3 Figure of Hofwhich becomes a fan after contracting F1 , F2 and F3F. ,The Figure10.9. AAsubgraph subgraph H which becomes a fan after contracting 1 F2 bold edges depict a centre-traversal of F contained in Hamiltonian cycle τ . Since τ contains and F3 . The bold edges depict a centre-traversal of F contained in Hamilton the edges t1 and yr−1 (relative to F1 ), the inner structure of vF1 must be (1, 0), and since cycle τ . A (τ, ρ F11 ),=the ((1, 0), (2, 3)), ρvofF2 v= ((0, 1), (1, 3)) τ contains edges ρ) α2 pair and αcontaining outer structure 3 (relative to vF F1 must be (2, 3). and ρis,vF3a = ((0, 0), 6)) is feasible. which correspond That feasible (τ, (2, ρ) pair must contain The ρvF1 edges = ((1, 0), (2, 3)). Consideringtoallthe of Finner 1 , F2 and F , every feasible (τ, ρ) pair contains ρ = ((1, 0), (2, 3)), ρ = ((0, 1), (1, 3)) and 3 vF2 correspond to the structure of ρvF2 are coloured in blue vand the edges which F1 ρ = ((0, 0), (2, 6)). The edges which correspond to the inner structure of ρ are coloured vF3 vF2 outer structure of ρvF2 are coloured in red. in blue and the edges which correspond to the outer structure of ρvF2 are coloured in red. The problem now contains a cost for every triplet of consecutive edges in tour τ and additionally, a penalty 4 at each outer node i. Consider the modified 3-Neighbour TSP on a Halin graph defined as follows: M T SP (3) : Minimize X z(τ, ρ) = (e,f,g)∈P3 (τ ) Subject to q(e, f, g) + X i∈C Pi (τ, ρi ) (τ, ρ) ∈ F 0 . The necessary costs to construct MTSP(3) can be obtained as required by applying (4.1) or by first embedding H in the plane, and evaluating the candidate k-paths from Corollary 4.2. Note that Pv (τ, ρv ) can be computed in O(1) time by storing penalty 24-tuples containing the βv -values described in Table 1, at each cycle node v. Also note that there may be O(2n ) feasible ρ vectors for a given τ , however, we show that the optimal (τ, ρ) pair can be found in O(n)-time. It is also important to note that the set of pseudonodes is retained for reasons which will become apparent. In the initial graph, and for all ρi , i ∈ C, set βi (ρi ) = 0. For fan F in H, the penalties must be updated to store the costs of traversing F when F is contracted to pseudonode vF . Let K represent P the traversal of F which contains only edges in C. That is, K = j − y1 − · · · − yr−1 − l. Then q(K) = e−f −g∈K q(e, f, g) represents the cost incurred by selecting the edges in K. Let τ (F ) and ρ(F ) be the restrictions of τ and ρ to F , respectively. Assign the minimum cost of the right-traversal (which contains αs , s ∈ {1, 2} and α6 ), with inner structure of the first pseudonode a ∈ {L = (1, 0), M = (0, 0)} to βvF (a, (s, 6)). That is, assign to βvF (a, (s, 6)) the sum of the costs along the traversal, q(αs − j − y1 − · · · − yr−1 − tr − k − α6 ), together with the minimum feasible set of penalties on the outer nodes contained in F , u1 , u2 . . . , ur . Note that for the case that u1 6∈ S, 10 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Penalty Description βvF ((0, ∗), (1, 6)) traversal of F with inner structure (0, ∗) and outer structure βvF ((1, ∗), (1, 6)) traversal of F with inner structure (1, ∗) and outer structure βvF ((0, ∗), (2, 6)) traversal of F with inner structure (0, ∗) and outer structure βvF ((1, ∗), (2, 6)) traversal of F with inner structure (1, ∗) and outer structure βvF ((∗, 0), (5, 3)) traversal of F with inner structure (0, ∗) and outer structure βvF ((∗, 1), (5, 3)) traversal of F with inner structure (1, ∗) and outer structure βvF ((∗, 0), (5, 4)) traversal of F with inner structure (0, ∗) and outer structure βvF ((∗, 1), (5, 4)) traversal of F with inner structure (1, ∗) and outer structure βvF ((0, 0), (1, 3)) traversal of F with inner structure (0, 0) and outer structure βvF ((0, 1), (1, 3)) traversal of F with inner structure (0, 1) and outer structure βvF ((1, 0), (1, 3)) traversal of F with inner structure (1, 0) and outer structure βvF ((1, 1), (1, 3)) traversal of F with inner structure (1, 1) and outer structure βvF ((0, 0), (1, 4)) traversal of F with inner structure (0, 0) and outer structure βvF ((0, 1), (1, 4)) traversal of F with inner structure (0, 1) and outer structure βvF ((1, 0), (1, 4)) traversal of F with inner structure (1, 0) and outer structure βvF ((1, 1), (1, 4)) traversal of F with inner structure (1, 1) and outer structure βvF ((0, 0), (2, 3)) traversal of F with inner structure (0, 0) and outer structure βvF ((0, 1), (2, 3)) traversal of F with inner structure (0, 1) and outer structure βvF ((1, 0), (2, 3)) traversal of F with inner structure (1, 0) and outer structure βvF ((1, 1), (2, 3)) traversal of F with inner structure (1, 1) and outer structure βvF ((0, 0), (2, 4)) traversal of F with inner structure (0, 0) and outer structure βvF ((0, 1), (2, 4)) traversal of F with inner structure (0, 1) and outer structure βvF ((1, 0), (2, 4)) traversal of F with inner structure (1, 0) and outer structure βvF ((1, 1), (2, 4)) traversal of F with inner structure (1, 1) and outer structure Table 1. Description of penalty 24-tuple stored at pseudonodes in C. (1, 6) (1, 6) (2, 6) (2, 6) (5, 3) (5, 3) (5, 4) (5, 4) (1, 3) (1, 3) (1, 3) (1, 3) (1, 4) (1, 4) (1, 4) (1, 4) (2, 3) (2, 3) (2, 3) (2, 3) (2, 4) (2, 4) (2, 4) (2, 4) it is not possible to have an inner structure L or B, and βvF (L, (s, 6)) = βvF (B, (s, 6)) = ∞. Otherwise ( r ) X βvF (a, (s, 6)) = q(αs − j − y1 − · · · − yr−1 − tr − k − α6 ) + min 0 βui (ρui ) (τ (F ),ρ(F ))∈F (F ): ρ1u =a or B,ρ22 ur =6 i=1 1 = q(αs , j, y1 ) + q(K) − q(yr−2 , yr−1 , l) + q(yr−2 , yr−1 , tr ) + q(yr−1 , tr , k) + q(tr , k, α6 ) (4.2) ( r ) X + min 0 βui (ρui ) . (τ (F ),ρ(F ))∈F (F ): ρ1u =a or B,ρ22 ur =6 i=1 1 We will explain how the minimum in (4.2) can be calculated efficiently later in this paper. Similarly, assign the minimum cost of the left-traversal (which contains αt , t ∈ {3, 4}, and α5 ) with inner structure a ∈ {M = (0, 0), R = (0, 1)} to βvF (a, (5, t)). In the case that ur 6∈ S, it is not possible to have an inner structure R or B, and βvF (R, (5, t)) = βvF (B, (5, t)) = ∞. Otherwise βvF (a, (5, t)) = q(α5 , k, t1 ) + q(k, t1 , y1 ) + q(t1 , y1 , y2 ) + q(K) − q(j, y1 , y2 ) + q(yr−1 , l, αt ) ( r ) X + min 0 βui (ρui ) . (τ (F ),ρ(F ))∈F (F ): ρ1ur =a or B,ρ21 u =5 (4.3) i=1 1 Let K(yi ), i ∈ {1, . . . , r − 1}, be the centre-traversal of F which does not contain yi . Then q(K(yi )) represents the cost incurred by the edges in K(yi ). That is, q(K(y1 )) = q(K) + q(j, t1 , t2 ) + q(t1 , t2 , y2 ) + q(t2 , y2 , y3 ) − q(j, y1 , y2 ) − q(y1 , y2 , y3 ), 11 q(K(yp )) = q(K) + q(yp−2 , yp−1 , tp ) + q(yp−1 , tp , tp+1 ) + q(tp , tp+1 , yp+1 ) + q(tp+1 , yp+1 , yp+2 ) − q(yp−2 , yp−1 , yp ) − q(yp−1 , yp , yp+1 ) − q(yp , yp+1 , yp+2 ), for p ∈ {2, . . . , r − 2}, and q(K(yr−1 )) = q(K) + q(yr−3 , yr−2 , tr−1 ) + q(yr−2 , tr−1 , tr ) + q(tr−1 , tr , l) − q(yr−3 , yr−2 , yr−1 ) − q(yr−2 , yr−1 , l). Assign the minimum cost of the centre-traversal which contains αs , s ∈ {1, 2}, and αt , t ∈ {3, 4}, which has inner structure a ∈ {L = (1, 0), M = (0, 0), R = (0, 1), B = (1, 1)} to βvF (a, (s, t)). In the case that u1 6∈ S and a = L, there is a single path traversing F with inner structure L, namely, j − t1 − t2 − y2 − · · · − yr−1 − l, so ( r ) X βvF (L, (s, t)) = q(αs , j, t1 ) + q(K(y1 )) + q(yr , l, αt ) + min 0 βui (ρui ) , (4.4) (τ (F ),ρ(F ))∈F (F ): 22 ρ12 ur =0,ρu2 =6 i=2 and when u1 ∈ S, we assign the cost of the minimum centre-traversal with inner structure L. Note that this path detours some yg , g ∈ {2, . . . , r − 1}.          ( r )     X q(αs , j, t1 ) + q(K(yg )) + q(yr , l, αt ) + min 0 . βui (ρui ) βvF (L, (s, t)) = min  g∈{2,...,r−1}  (τ (F ),ρ(F ))∈F (F ):   i=1   12   ρ11 u1 =1,ρr =0,     21 22 ρug =5,ρu g+1 =6 (4.5) Similarly, when a = R and ur 6∈ S, there is a single path traversing F with inner structure R, namely, j − y1 − · · · − yr−2 − rr−1 − tr − l so (r−1 ) X βvF (R, (s, t)) = q(αs , j, y1 ) + q(K(y1 )) + q(tr , l, αt ) + min 0 βui (ρui ) , (4.6) (τ (F ),ρ(F ))∈F (F ): 22 ρ11 =6 u =0,ρu 1 i=1 r−1 and when ur 6∈ S, we assign the cost of the minimum centre-traversal with structure R. Note that this path detours some yg , g ∈ {1, . . . , r − 2}.          ( r )     X βvF (R, (s, t)) = q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) + min 0 βui (ρui ) . min  g∈{1,...,r−2}  (τ (F ),ρ(F ))∈F (F ):   i=1   11 12   ρu1 =0,ρr =1,     21 22 ρug =5,ρu g+1 =6 (4.7) Now consider a = M . If u1 ∈ S, ur ∈ S then βvF (M, (s, t)) is assigned the cost of the minimum path detouring yg for g ∈ {1, . . . , r − 1}. If u1 (ur ) is not a pseudonode then the centre-traversal must contain y1 (yr−1 ) and 1 (r − 1) is removed from g from the following equation.          (r−1 )     X βvF (M, (s, t)) = min q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) + min 0 βui (ρui ) .  g∈{1,...,r−1}  (τ (F ),ρ(F ))∈F (F ):   i=1   12   ρ11 u1 =0,ρur =0,     21 22 ρug =5,ρu g+1 =6 (4.8) 12 Now consider a = B. This is the same as the case where a = M except for the inner structure.          (r−1 )     X βvF (B, (s, t)) = min q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) + min 0 βui (ρui ) .  g∈{1,...,r−1}  (τ (F ),ρ(F ))∈F (F ):   i=1   11 12   ρu1 =1,ρur =1,     21 22 ρug =5,ρu g+1 =6 (4.9) All βvF which have not been assigned are not associated with a feasible ρvF and are assigned a value ∞. Theorem 4.5. Suppose H = T ∪ C is a Halin graph which is not a wheel and F is a fan in H. If (τ ∗ , ρ∗ ) is an optimal tour pair in H then there exists a feasible ρ∗H/F in H/F such that (τ ∗ /F, ρ∗H/F ) is optimal in H/F and z(τ ∗ , ρ∗ ) = z(τ ∗ /F, ρ∗H/F ). Proof. Let S be the set of pseudonodes in H. Let vF be the pseudonode which results from the contraction of F , and label the vertices and edges of F as in Figure 9. Given (τ ∗ , ρ∗ ), we construct (τ ∗ /F, ρ∗H/F ) as follows. Let ρ∗H/F,i = ρ∗i ∀i 6∈ F and ρ∗H/F,vF corresponding to the structure of (τ ∗ , ρ∗ ) around F in H. That is, τ contains an αi , αj path through F in H, so let ρ∗H/F,vF = ((a, b), (c, d)) where ( 0 a= 1 if (u1 6∈ S and y1 ∈ τ ∗ ) or (u1 ∈ S and ρ∗11 u1 = 0) ∗ if (u1 ∈ 6 S and y1 6∈ τ ) or (u1 ∈ S and ρ∗11 u1 = 1), ( if (ur 6∈ S and yr−1 ∈ τ ∗ ) or (ur ∈ S and ρ∗12 u1 = 0) ∗ ∗12 if (ur ∈ 6 S and yr−1 6∈ τ ) or (ur ∈ S and ρu1 = 1), b= 0 1   1 c= 2   5 if (u1 6∈ S and α1 ∈ τ ∗ ) or (u1 ∈ S and ρ∗21 u0 = 1) ∗ if (u1 ∈ 6 S and α2 ∈ τ ) or (u1 ∈ S and ρ∗21 u0 = 2) if (u1 ∈ 6 S and α5 ∈ τ ∗ ) or (u1 ∈ S and ρ∗21 u0 = 5),   3 d= 4   6 if (ur 6∈ S and tr 6∈ τ ∗ ) or (ur ∈ S and ρ∗22 ur = 3) ∗ if (ur ∈ 6 S and tr ∈ τ ) or (ur ∈ S and ρ∗22 ur = 4) ∗ ∗22 if (ur ∈ 6 S and tr ∈ τ ) or (ur ∈ S and ρur = 6). and Then (τ ∗ /F, ρ∗H/F,vF ) is feasible in H/F . Using equations (4.2)-(4.9) and noting that all new triples which contain vF have q(e, f, g) = 0, we get X X z(τ ∗ , ρ∗ ) = q(e, f, g) + Pi (τ ∗ , ρ∗i ) (e,f,g)∈P3 (τ ∗ ) = X = X X q(e, f, g) + (e,f,g)∈ P3 (τ ∗ −F ) = i∈C (e,f,g)∈ P3 (τ ∗ )\P3 (τ ∗ −F ) q(e, f, g) + (e,f,g)∈ P3 (τ ∗ /F −vF ) z(τ ∗ /F, ρ∗H/F ). X X q(e, f, g) + i∈C\F βi (ρ∗i ) + X βi (ρ∗i ) i∈F βi (ρ∗i ) + βvF (ρvF ) i∈C\F It remains to show that (τ ∗ /F, ρ∗H/F ) is optimal in H/F . Towards a contradiction, suppose there exists a tour pair (τ 0 /F, ρ0H/F ) 6= (τ ∗ /F, ρ∗H/F ) such that z(τ 0 /F, ρ0H/F ) < z(τ ∗ /F, ρ∗H/F ). The calculations of the minimums in equations (4.2)-(4.9) imply that τ 0 /F 6= τ ∗ /F . Using equations (4.2)-(4.9), we can expand F , extending (τ 0 /F, ρ0H/F ) to (τ 00 , ρ00 ) in H with z(τ 0 /F, ρ0H/F ) = z(τ 00 , ρ00 ). Then z(τ 00 , ρ00 ) = z(τ 0 /F, ρ0H/F ) < 13 z(τ ∗ /F, ρ∗H/F ) = z(τ ∗ , ρ∗ ), contradicting the optimality of (τ ∗ , ρ∗ ). Hence (τ ∗ /F, ρ∗H/F ) is optimal in H/F .   We now show that βvF can be updated in O(|F |)-time, by introducing a structure which allows to optimally chain together the β-values for consecutive nodes in F ∩ C. Refer to the subgraph induced by the nodes {w} ∪ {ua , ua+1 , . . . , ub } as pseudo-fan P Fa,b for (1 ≤ a ≤ b ≤ r). Define the minimum penalty associated with pseudo-fan P Fa,b to be P Fa,b (c, d) for a, b ∈ {1, . . . , r} with inner structure c ∈ {0, 1}2 and outer structure d = (d1 , d2 ) ∈ {(1, 3), (1, 4), (2, 3), (2, 4)}. Note that the inner structure of pseudo-fan P Fa,b refers to the edges y1 , t1 and yr−1 , tr within fans Fa and Fb (which are contracted to pseudonodes ua and ub ), respectively. The outer structure refers to the edges α1 , α2 and α3 , α4 with respect to fans Fa and Fb , if ua and ub are considered as pseudonodes. To compute P Fa,b (c, d) we use the following recursion which chains together the minimum β-values through consecutive nodes in C while maintaining feasibility of ρ. For c1 , c2 ∈ {0, 1}, d1 ∈ {1, 2} and d2 ∈ {3, 4}, and 1 ≤ i ≤ r − 1 P F1,1 ((c1 , c2 ), (d1 , d2 )) = βu1 ((c1 , c2 ), (d1 , d2 )) (4.10) P Fr,r ((c1 , c2 ), (d1 , d2 )) = βur ((c1 , c2 ), (d1 , d2 )) (4.11) P F1,i+1 ((c1 , c2 ), (d1 , d2 )) = min {P F1,i ((c1 , s), (d1 , t)) + βui+1 ((t − 3, c2 ), (s + 1, d2 ))} (4.12) min {βui−1 ((c1 , t − 1), (d1 , s + 3)) + P Fi,r ((s, c2 ), (t, d2 ))} (4.13) s∈{0,1},t∈{3,4} and P Fi−1,r ((c1 , c2 ), (d1 , d2 )) = s∈{0,1},t∈{1,2} To prove that the recursions defined by (4.10)-(4.13) are correct, first consider the optimal P F1,i+1 ((c1 , c2 ), (d1 , d2 )). The minimum feasible assignment of penalties for the nodes within pseudo-fan P F1,i+1 is simply the minimum among optimal assignments of penalties for the nodes within pseudo-fan P F1,i and the penalty at pseudonode ui+1 , such that these penalties are feasible. That is, the outer structure of P F1,i must match the inner structure of ui+1 and vice-versa. By definition, this is precisely min P F1,i ((c1 , s), (d1 , t)) + βui+1 ((t − 3, c2 ), (s + 1, d2 )). An analogous argument holds for s∈{0,1},t∈{3,4} P Fi−1,r ((c1 , c2 ), (d1 , d2 )). It is now possible to compute the minimum traversals of F used in equations (4.2)-(4.9). For example, middle paths through F have a cost which minimizes the sum of the penalties on P F1,i−1 + βi and βi+1 + P Fi+2,r , such that both pairs are feasible. Note that the minimum ρ(F ) has been found while performing the recursion defined by equations (4.10)-(4.13). In the worst case, when all outer nodes in F belong to S, we must compute P F1,1 , . . . , P F1,r−1 and P Fr,r , . . . , P F2,r , which can be done in O(|F |)-time. By precomputing these, one can evaluate the minimum traversals of F used in equations (4.2)-(4.9), in O(|F |)-time and hence one can update βvF in O(|F |)-time. We iteratively perform the fan contraction operation, updating costs and penalties until we are left with a wheel. The optimal tour in H skirts the cycle C and detours exactly once through centre w, skipping exactly one edge of C. Orient the cycle C in the clockwise direction. τ contains all edges in C except for the skipped edge, say ci = (ui , ui+1 ), together with the two edges which detour around ci . Define function φ(ci ) for each edge ci = (ui , ui+1 ) ∈ E(C). Let ti and ti+1 be the tree edges adjacent to ui and ui+1 , respectively. We will define φ(ci ) = q(ci−2 , ci−1 , ti ) + q(ci−1 , ti , ti+1 ) + q(ti , ti+1 , ci+1 ) +q(ti+1 , ci+1 , ci+2 ) − q(ci−2 , ci−1 , ci ) − q(ci−1 , ci , ci+1 ) −q(ci , ci+1 , ci+2 ). Then, the optimal tour pair has     X z(τ ∗ , ρ∗ ) = q(C) + min φ(ci ) + min βuj (ρuj ) . i:ci ∈C   feasible ρ uj ∈C Suppose that we fix an edge ci in τ . Then H can be considered to be a fan as shown in Figure 12. 14 ci ui ci−1 ti ci−2 ui ci−1 ci+1 ti+1 ci w ti ci−2 ui+1 ui+1 ci+2 ci+1 ti+1 ci+2 w Figure wheel,which which skips Figure7. 11.AAtour tour ττ in in aa wheel, skips edgeedge ci . ci . ci−1 ci+1 ti+1 ti w Figure ui 7. ci−1 ui+1 edge c . A tour τ in a wheel, which skips i ti+1 ti ci ci ci+1 ti+1 ti u u i+1 ui w i ci−1 ci+1 ui+1 t Figure 8. Wheel i+1 H with center twi considered as a fan. ci ci ui+1 ui ci−1 ci+1 Figure 8. Wheel H with center w considered as a fan. Figure 12. Wheel H with centre w considered as a fan. Note that edge ci is fixed and the fan ‘wraps’ around the wheel, reusing edges ci−1 , ci , ci+1 , ti−1 , ti and ti+1 . F1 F2 F3 Figure 9. A subgraph of H which becomes a fan after contracting F1 , F2 and F3 . The bold edges depict a centre-traversal of F contained in Hamilton cycle τ . A (τ, ρ) pair containing ρvF1 = ((1, 0), (2, 3)), ρvF2 = ((0, 1), (1, 3)) and ρvF3 = ((0, 0), (2, 6)) is feasible. The edges which correspond to the inner F1 F2 F3 structure of ρvF2 are coloured in blue and the edges which correspond to the outer structure of ρvF2 are red. Figure 9. A subgraph of coloured H whichinbecomes a fan after contracting F , F Fix edge cr in τ and consider H to be a fan Fcr . Then the minimum tour in H can be determined by 1 2 calculating theFminimum of theedges minimum centre-traversal of Fcr and which bypasses cr (using, say, and depict a centre-traversal ofthe F tour contained in Hamilton 3 . The bold fan Fc1 ). cycle This can in O(r)-time using technique above. τ . be A computed (τ, ρ) pair containing ρvFthe =pseudofan ((1, 0), (2, 3)), ρvdescribed = ((0, 1), (1, 3)) F2 1 The preceeding discussion yields the following algorithm. and ρvF3 = ((0, 0), (2, 6)) is feasible. The edges which correspond to the inner 15 4 structure of ρvF2 are coloured in blue and the edges which correspond to the outer structure of ρvF2 are coloured in red. Algorithm 1 HalinTSP(3)(H, q, β) Input: Halin graph H, quadratic cost function q, and penalty function β if H is a wheel then Use the wheel procedure to find an optimal tour τ in H else Let F be a fan in H Contract F to a single node vF , using the Case 1 procedure. That is, assign penalties β to vF , assign costs of 0 to all triples in H/F and assign costs of q to all remaining triples which are 3-neighbours in H. HalinTSP(3)(H/F , q, β) end if Expand all pseudonodes in reverse order and update τ return τ Each time that a fan is contracted, the number of tree nodes is reduced by 1, and hence the fan contraction operation is performed one less than the number of non-leaf nodes in H. The fan contraction operation can be performed in O(|F |)-time, and each time it is performed, the number of nodes in H is reduced by |F | − 1. Since the wheel procedure takes O(n)-time, the total time for the algorithm is O(n). 4.2. TSP(k). We now show that the previous ideas can be extended to solve TSP(k). For any subgraph G of H, let Pk (G) be the collection of all distinct candidate k-paths in G. For each candidate k-path (e1 , e2 , . . . ek ) ∈ Pk (H), define q(e1 , ek−1 ) + q(e2 , ek ) q(e1 , ek−2 ) + q(e2 , ek−1 ) + q(e3 , ek ) + 2 3 c(e1 ) + c(e2 ) + . . . + c(ek ) + ... + . k Now consider the simplified problem: X ST SP (k) : Minimize q(e1 , e2 , . . . , ek ) q(e1 , e2 , . . . , ek ) =q(e1 , ek ) + (4.14) (e1 ,e2 ,...,ek )∈Pk (τ ) Subject to τ ∈ F. Theorem 4.6. Any optimal solution to the STSP(k) is also optimal for TSP(k). Proof. Using equation (4.14), the proof of this follows along the same way as that of Theorem 4.4 and hence is omitted.   As a result of Corollary 4.2, the preceding algorithm can be extended to solve TSP(k) by extending the penalty functions at outer nodes to accommodate subpaths of length 2d(k+1)/2e . A complete description of these varies as the information that needs to be stored is more involved and is hence omitted. Some details however will be available in [32]. The complexity increases by a factor of (2d(k+1)/2e ), which is constant for fixed k and polynomially bounded when k = t log n. 5. TSP(k) on fully reducible graph classes We say that a class C of 3-connected graphs is fully reducible if it satisfies the following: (1) If G ∈ C has a 3-edge cutset which partitions G into components S and S̄, then both G/S and G/S̄ are in C and we call G a reducible graph in C; and (2) TSP can be solved in polynomial time for the graphs in C that do not have non-trivial 3-edge cutsets, i.e. 3-edge cutsets that leave both components Hamiltonian. We call such graphs irreducible. For instance, Halin graphs can be understood as graphs built up from irreducible fans connected to the remainder of the graph via 3-edge cutsets. Cornuejols et al. [10] show that the ability to solve TSP in polynomial time on irreducible graphs in C allows to solve TSP in polynomial time on all of C using facts about the TSP polyhedron. 16 We remark that the algorithm of Section 4 can be used to show a somewhat similar statement for TSP(k). Here we consider a graph class C that is fully k-reducible in the sense that either it can be subdivided into irreducible graphs via 3-edge cutsets, or it is irreducible and it is possible to solve the k-neighbour Hamiltonian path problem in polynomial time. This requires solving the following problem: X X M T SP (k) : Minimize q(e1 , . . . , ek ) + Pi (τ ) (e1 ,...,ek )∈Pk (τ ) Subject to i∈V τ ∈F where Pi (τ ) is a penalty function for the pseudonode which depends on how tour τ traverses i, analogous to the construction for the 3-neighbour TSP of section 4. We recursively perform the contraction operation on the irreducible subgraphs of G, storing the necessary tour information in the penalty at the resulting pseudonode. A similar result to Corollary 4.2 may be derived to show that for any fixed k, this requires a polynomial number of penalties. The least cost traversals of S can be computed in polynomial time using a generalization of the pseudo-fan strategy above. Suppose the contraction operation is performed on a subgraph of size r in time O(P (r)), where P (r) is a polynomial in r. Each time this operation is performed, the number of nodes in the graph is reduced by r. This operation is performed at most n times and it follows that the entire algorithm can be performed in polynomial time. 6. Conclusions In this paper, we have shown that QTSP is NP-hard even when the costs are restricted to taking 0-1 values on Halin graphs. We have presented a polynomial time algorithm to solve a restriction of QTSP, denoted TSP(k) on any fully k-reducible graph for any fixed k. To illustrate this, we have given an algorithm which solves TSP(3) on a Halin graph in O(n) time. The k-neighbour bottleneck TSP on a Halin graph can be solved by solving O(log(n)) problems of the type TSP(k). However, it is possible to solve the problem faster. Details will be reported elsewhere. We would also like to thank Ante Ćustić for his useful comments. References [1] A. Aggarwal, D. Coppersmith, S. Khanna, R. Motwani, and B. Schieber. The angular-metric traveling salesman problem. SIAM Journal on Computing, 29:697–711, 2000. [2] D. Applegate, R. Bixby, V. Chvatal, and W. Cook. The traveling salesman problem: a computational study. Princeton University Press, 2011. [3] E. Arkin, Y. Chiang, J. Mitchell, S. Skiena, and T. Yang. On the maximum scatter traveling salesperson problem. SIAM Journal on Computing, 29:515–544, 1999. [4] E. Balas, R. Carr, M. Fischetti, and N. Simonetti. New facets of the STS polytope generated from known facets of the ATS polytope. Discrete Optimization, 3:3–19, 2006. [5] E. Balas, M. Fischetti, and W. Pulleyblank. The precedence-constrained asymmetric traveling salesman polytope. Mathematical Programming, 68:241–265, 1995. [6] H. Bodlaender. Dynamic programming on graphs with bounded treewidth. In Automata, languages and programming (Tampere, 1988),Lecture Notes in Comput. Sci., 317:105–118. Springer, Berlin, 1988. [7] W. Chin and S. Ntafos. Optimum watchman routes. In Proceedings of the Second Annual Symposium on Computational Geometry, 24–33. ACM, 1986. [8] W. Cook. In pursuit of the traveling salesman: mathematics at the limits of computation. Princeton University Press, 2012. [9] G. Cornuéjols, D. Naddef, and W. Pulleyblank. Halin graphs and the travelling salesman problem. Mathematical Programming, 26:287–294, 1983. [10] G. Cornuéjols, D. Naddef, and W. Pulleyblank. The traveling salesman problem in graphs with 3-edge cutsets. Journal of ACM, 32:383–410, April 1985. [11] B. Courcelle. The monadic second-order logic of graphs. I. Recognizable sets of finite graphs. Inform. and Comput., 85:12– 75, 1990. [12] F. Della Croce, V. Paschos, and R. Calvo. Approximating the 2-peripatetic salesman problem. In Proc. Workshop on Modelling and Algorithms for Planning and Scheduling Problems, MAPSP, 114–116, 2005. [13] O. Ergun and J. Orlin. A dynamic programming methodology in very large scale neighborhood search applied to the traveling salesman problem. Discrete Optimization, 3:78–85, 2006. The Traveling Salesman Problem. 17 [14] A. Fischer. An analysis of the asymmetric quadratic traveling salesman polytope. SIAM Journal on Discrete Mathematics, 28:240–276, 2014. [15] A. Fischer and F. Fischer. An extended approach for lifting clique tree inequalities. Journal of Combinatorial Optimization, 30:489–519, 2015. [16] A. Fischer, F. Fischer, G. Jäger, J. Keilwagen, P. Molitor, and I. Grosse. Exact algorithms and heuristics for the quadratic traveling salesman problem with an application in bioinformatics. Discrete Applied Mathematics, 166:97–114, 2014. [17] A. Fischer and C. Helmberg. The symmetric quadratic traveling salesman problem. Mathematical Programming, 142:205– 254, 2013. [18] G. Gutin and A. Punnen, editors. The traveling salesman problem and its variations, volume 12 of Combinatorial Optimization. Springer New York, 2002. [19] G. Jäger and P. Molitor. Algorithms and experimental study for the traveling salesman problem of second order. In B. Yang, D. Du, and C. Wang, editors, Combinatorial Optimization and Applications, Lecture Notes in Computer Science, 5165:211–224. Springer Berlin, 2008. [20] J. Krarup and I. Spadille. The peripatetic salesman and some related unsolved problems. Combinatorial programming: methods and applications: proceedings of the NATO Advanced Study Institute held at the Palais des Congrès, Versailles, France, 2-13 September 1974, 173, 1975. [21] J. LaRusic and A. Punnen. The asymmetric bottleneck traveling salesman problem: algorithms, complexity and empirical analysis. Computers & Operations Research, 43:20–35, 2014. [22] J. LaRusic, A. Punnen, and E. Aubanel. Experimental analysis of heuristics for the bottleneck traveling salesman problem. Journal of heuristics, 18:473–503, 2012. [23] E. Lawler, J. Lenstra, A. Kan, and D. Shmoys. The Traveling Salesman Problem: a guided tour of combinatorial optimization, volume 3. Wiley New York, 1985. [24] D. Lou. An algorithm to find the optimal matching in Halin graphs. IAENG International Journal of Computer Science, 34:220–226, 2007. [25] J. Phillips, A. Punnen, and S. Kabadi. A linear algorithm for the bottleneck traveling salesman problem on a Halin graph. Information Processing Letters, 67:105–110, 1998. [26] A. Oswin, A. Fischer, F. Fischer, F. Meier, U. Pferschy, A. Pilz, and R. Staněk Minimization and maximization versions of the quadratic travelling salesman problem. Optimization, 66:521–546, 2017. [27] G. Reinelt. The traveling salesman: computational solutions for TSP applications. Springer-Verlag, 1994. [28] B. Rostami, F. Malucelli, P. Belotti and S. Gualandi. Quadratic TSP: A lower bounding procedure and a column generation approach Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on, 377-384, September 2013. [29] B. Rostami, F. Malucelli, P. Belotti, and S. Gualandi. Lower bounding procedure for the asymmetric quadratic traveling salesman problem. European Journal of Operational Research, 253:584–592, 2016. [30] R. Staněk, Problems on tours and trees in combinatorial optimization, PhD Thesis, Graz University of Technology, 2016. [31] B. Woods. Generalized travelling salesman problems on Halin graphs. Master’s thesis, Simon Fraser University, Canada, 2010. [32] B. Woods. The quadratic travelling salesman problem: complexity, approximations, and exponential neighbourhoods. PhD. thesis In preparation, Simon Fraser University, Canada. [33] B. Woods and A. Punnen. The quadratic travelling salesman problem on Halin graphs. Working paper, Simon Fraser University, Canada, 2016. (SFU) Department of Mathematics, Simon Fraser University, 250-13450 102 Avenue, Surrey, British Columbia, V3T 0A3, Canada 18
8
arXiv:1708.03981v1 [cs.SY] 14 Aug 2017 PSSE Redux: Convex Relaxation, Decentralized, Robust, and Dynamic Approaches Vassilis Kekatos, Gang Wang, Hao Zhu, and Georgios B. Giannakis ∗ August 15, 2017 1 Introduction With the advent of digital computers, power system engineers in the 1960s tried computing the voltages at critical buses based on readings from current and potential transformers. Local personnel manually collected these readings and forwarded them by phone to a control center. Nevertheless, due to timing, modeling, and instrumentation inaccuracies, the power flow equations were always infeasible. In a seminal contribution [61], the statistical foundations were laid for a multitude of grid monitoring tasks, including topology detection, static state estimation, exact and linearized models, bad data analysis, centralized and decentralized implementations, as well as dynamic state tracking. Since then, different chapters, books, and review articles have nicely outlined the progress in the area; see for example [74, 55, 1]. The revolutionary monitoring capabilities enabled by synchrophasor units have been put forth in [58]. This chapter aspires to glean some of the recent advances in power system state estimation (PSSE), though our collection is not exhaustive by any means. The Cramér-Rao bound, a lower bound on the (co)variance ∗ V. Kekatos is with the Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA 24061, USA. G. Wang is with the Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455, USA, and also with the State Key Lab of Intelligent Control and Decision of Complex Systems, Beijing Institute of Technology, Beijing 100081, P. R. China. H. Zhu is with the Department of Electrical and Computer Engineering, University of Illinois, Urbana, IL 61801. G. B. Giannakis is with the Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455, USA. E-mails: [email protected]; {gangwang, georgios}@umn.edu; [email protected]. 1 of any unbiased estimator, is first derived for the PSSE setup. After reviewing the classical Gauss-Newton iterations, contemporary PSSE solvers leveraging relaxations to convex programs and successive convex approximations are explored. A disciplined paradigm for distributed and decentralized schemes is subsequently exemplified under linear(ized) and exact grid models. Novel bad data processing models and fresh perspectives linking critical measurements to cyber-attacks on the state estimator are presented. Finally, spurred by advances in online convex optimization, model-free and model-based state trackers are reviewed. Notation: Lower- (upper-) case boldface letters denote column vectors (matrices), and calligraphic letters stand for sets. Vectors 0, 1, and en denote respectively the all-zero, all-one, and the n-th canonical vectors of suitable dimensions. The conjugate of a complex-valued object (scalar, vector or matrix) x is √ denoted by x∗ ; <{x} and ={x} are its real and imaginary parts, and j := −1. Superscripts T and H stand for transpose and conjugate-transpose, respectively, while Tr(X) is the trace of matrix X. A diagonal matrix having vector x on its main diagonal is denoted by dg(x); whereas, the vector of diagonal entries of X is dg(X). The range space of X is denoted by range(X); and its null space (kernel) by null(X). The notation N (µ, Σ) represents the Gaussian distribution with mean µ and covariance matrix Σ. 2 Power Grid Modeling This section introduces notation and briefly reviews the power flow equations; for detailed exposition see e.g., [1], [19] and references therein. A power system can be represented by the graph G = (B, L), where the node set B comprises its Nb buses, and the edge set L its Nl transmission lines. Given the focus on alternating current (AC) power systems, steady-state voltages and currents are represented by their single-phase equivalent phasors per unit. A transmission line (n, k) ∈ L running across buses n, k ∈ B is modeled by its total series admittance ynk = gnk + jbnk , and total shunt susceptance jbsnk . If Vn is the complex voltage at bus n, the current Ink flowing from bus m to bus n over line (m, n) is Ink = (ynk + jbsnk /2)Vn − ynk Vn . (1) The current Inm coming from the other end of the line can be expressed symmetrically. That is not the case if the two buses are connected via a 2 transformer with complex ratio ρnk followed by a line, where ynk + jbsnk /2 ynk Vn − ∗ Vn 2 |ρnk | ρnk ynk = (ynk + jbsnk /2)Vn − Vn . ρnk Ink = (2a) Inm (2b) Kirchhoff’s current law dictates that the current injected into bus n is P In = n∈Bn Ink , where Bn denotes the set of buses directly connected to bus n. If vector i ∈ CNb collects all nodal currents, and v ∈ CNb all nodal voltages, the two vectors are linearly related through the bus admittance matrix Y = G + jB as i = Yv. (3) Similar to (3), line currents can be stacked in the 2Nl -dimensional vector if , and expressed as a linear function of nodal voltages if = Yf v (4) for some properly defined 2Nl × Nb complex matrix Yf [cf. (1)–(2)]. The complex power injected into bus n will be denoted by Sn := Pn + jQn . Since by definition Sn = Vn In∗ , the vector of complex power injections s = p + jq can be expressed as s = dg(v)i∗ = dg(v)Y∗ v∗ . (5) ∗ . The power flowing from bus n to bus n over line (m, n) is Snk = Vn Ink jθ If voltages are expressed in polar form Vn = Vn e n , the power flow equations in (5) per real and imaginary entry can be written as Nb X Pn = n=1 Nb X Qn = Vn Vn [Gnk cos(θn − θn ) + Bnk sin(θn − θn )] (6a) Vn Vn [Gnk sin(θn − θn ) − Bnk cos(θn − θn )] . (6b) n=1 Since power injections are invariant if voltages are shifted by a common angle, the voltage phase is arbitrarily set to zero at a particular bus called the reference bus. Alternatively to (6), if voltages are expressed in rectangular coordinates Vn = Vr,m + jVi,m , power injections are quadratically related to voltages Pn = Vr,m Nb X (Vr,n Gnk − Vi,n Bnk ) + Vi,m n=1 Nb X (Vi,n Gnk + Vr,n Bnk ) n=1 3 (7a) Qn = Vi,m Nb X (Vr,n Gnk − Vi,n Bnk ) − Vr,m Nb X (Vi,n Gnk + Vr,n Bnk ). (7b) n=1 n=1 To compactly express (7), observe that Sn∗ = Vn∗ In = (vH en )(eTn i) = vH en eTn Yv from which it readily follows that Pn = vH HPn v (8a) Qn = vH HQn v (8b) where the involved matrices are defined as  1 en eTn Y + YH en eTn 2  1 en eTn Y − YH en eTn . := 2j HPn := (9a) HQn (9b) Similar expressions hold for the squared voltage magnitude at bus n: Vn2 = vH HVn v, where HVn := en eTn . (10) Realizing that a line current can also be provided as Ink = eTnk if , the ∗ = V ∗I power flow on line (n, k) as seen from bus n is expressed as Snk n nk = H T H T (v en )(enk if ) = v en enk Yf v, from which it follows that Pnk = vH HPnk v H Qnk = v HQnk v (11a) (11b) where HPnk and HQnk are defined by substituting eTn Y and YH en by eTnk Yf and YfH enk in (9), accordingly. Equations (8), (10) and (11) explain how power injections, flows, and squared voltage magnitudes are quadratic functions of voltage phasors as described by vH Hm v for certain complex Nb × Nb matrices Hm . Regardless if Y and/or Yf are symmetric or Hermitian, Hm are Hermitian by definition. T = <{H }, and This means that Hm = HH m m , or equivalently, <{Hm } ={Hm }T = −={Hm }. It can be easily verified that the quadratic functions can be expressed in terms of real-valued quantities as vH Hm v = v̄T H̄m v̄ (12) for the expanded real-valued voltage vector v̄ := [<{v}T ={v}T ]T , and the real-valued counterpart of Hm , namely   <{Hm } −={Hm } H̄m := . (13) ={Hm } <{Hm } 4 3 Problem Statement It was seen in Section 2 that given grid parameters collected in Y and Yf , all power system quantities can be expressed in terms of the voltage vector v, which justifies its term as the system state. Meters installed across the grid measure electric quantities, and forward their readings via remote terminal units to a control center for grid monitoring. Due to lack of synchronization, conventional meters cannot utilize the angle information of phasorial quantities. For this reason, legacy measurements involve phaseless power injections and flows along with voltage and current magnitudes at specific buses. The advent of the global positioning system (GPS) facilitated a precise timing signal across large geographical areas, thus enabling the revolutionary technology of synchrophasors or phasor measurement units (PMUs) [58]. Recovering bus voltages given network parameters and the available measurements constitutes the critical task of power system state estimation. This section formally states the problem, provides the Cramér-Rao bound on the variance of any unbiased estimator, and reviews the Gauss-Newton iterations. Solvers based on semidefinite relaxation and successive convex approximations are subsequently explicated, and the section is wrapped up with issues germane to PMUs. 3.1 Weighted Least-Squares Formulation Consider M real-valued measurements {zm }M m=1 related to the complex power system state v through the model zm = hm (v) + m (14) where hm (v) : CNb → R is a (non)-linear function of v, and m captures the measurement noise and modeling inaccuracies. Collecting measurements and noise terms in vectors z and  accordingly, the vector form of (14) reads z = h(v) +  (15) for the mapping h : CNb → RM . Model (15) is instantiated for different types of measurements next. Traditionally, the system state v is expressed in polar coordinates, namely nodal voltage magnitudes and angles. Then h(v) maps the 2Nb -dimensional state vector to SCADA measurements through the nonlinear equations (6). Expressing the states in polar form has been employed primarily due to two reasons. First, the Jacobian matrix of h(v) is amenable to approximations. 5 Secondly, voltage magnitude measurements are directly related to states. Nevertheless, due to recent computational reformulations, most of our exposition models voltages in the rectangular form. Then, as detailed in (12), the m-th SCADA measurement zm involves the quadratic function of the state hm (v) = vH Hm v for a Hermitian matrix Hm . Expressing voltages in rectangular coordinates is computationally advantageous when it comes to synchrophasors too. As evidenced by (3)–(4), PMU measurements feature linear mappings hm (v). If PMU measurements are expressed in rectangular coordinates, the model in (14) simplifies to z = Hv +  (16) for an M × Nb complex matrix H, and complex-valued noise . Following the notation of (12)–(13), the linear measurement model of (16) can be expressed in terms of real-valued quantities as z̄ = (H∗ )v̄ + ¯. (17) The random noise vector  in (15) is usually assumed independent of h(v), zero-mean and circularly symmetric, that is E[H ] = Σ and E[T ] = 0. The last assumption holds if for example the real and imaginary components of  are independent and have identical covariance matrices. This is true for a PMU measurement, where the actual state lies at the center of a spherically-shaped noise cloud on the complex plane. Moreover, the entries of  are oftentimes assumed uncorrelated yielding 2 }) with σ 2 being the variance of the a diagonal covariance Σ = dg({σm m m-th entry m . However, that may not always be the case. For example, active and reactive powers at the same grid location are derived as products between the readings of a current transformer and a potential transformer. Further, noise terms may be correlated between the real and imaginary parts of the same phasor in a PMU. Adopting the weighted least-squares (WLS) criterion, power system state estimation can be formulated as minimize kΣ−1/2 (z − h(v))k22  v∈CNb (18) −1/2 where Σ is the matrix square root of the inverse noise covariance matrix. If the noise is independent across measurements, then (18) simplifies to M X (zm − hm (v))2 minimize . 2 v σm m=1 6 (19) Either way, the PSSE task boils down to a (non)-linear least-squares (LS) fit. When the mapping h(v) is linear or when the entries of  are uncorrelated, the measurement model in (15) can be prewhitened. For example, the linear measurement model z = Hv +  can be equivalently transformed to Σ−1/2 z = (Σ−1/2 H)v + Σ−1/2   (20) −1/2 so that the associated noise Σ  is now uncorrelated. To ease the presentation, the noise covariance will be henceforth assumed Σ = IM , yielding v̂ := arg min v M X (zm − hm (v))2 . (21) m=1 For Gaussian measurement noise  ∼ N (0, IM ), the minimizer of (21) coincides with the maximum likelihood estimate (MLE) of v [29]. 3.2 Cramér-Rao Lower Bound Analysis According to standard results in estimation theory [29], the variance of any unbiased estimator is lower bounded by the Cramér-Rao lower bound (CRLB). Appreciating its importance as a performance benchmark across different estimators, the ensuing result shown in the Appendix derives the CRLB for any unbiased power system state estimator based on the so-termed Wirtinger’s calculus for complex analysis [41]. Proposition 1. Consider estimating the unknown state vector v ∈ CNb from the noisy SCADA data {zm }M m=1 of (15), where the Gaussian measurement error m is independent across meters with mean zero and variance 2 . The covariance matrix of any unbiased estimator v̂ satisfies σm Cov(v̂)  [F† (v, v∗ )]1:Nb ,1:Nb (22) where the Fisher information matrix (FIM) is given as " PM # PM 1 1 H ∗ ∗ H 2 (Hm v)(Hm v) 2 (Hm v)(Hm v ) m=1 σm m=1 σm ∗ PM F(v, v )= PM . 1 1 ∗ ∗ H ∗ ∗ ∗ ∗ H 2 (Hm v )(Hm v) 2 (Hm v )(Hm v ) m=1 σm m=1 σm (23) ∗ In addition, matrix F(v, v ) has at least rank-one deficiency even when all possible SCADA measurements are available. Although rank-deficient, the pseudo-inverse of F(v, v∗ ) qualifies as a valid lower bound on the mean-square error (MSE) of any unbiased estimator [63]. Rank deficiency of the FIM originates from the inherent voltage 7 angle ambiguity: SCADA measurements remain invariant if nodal voltages are shifted globally by a unimodular phase constant. Fixing the angle of the reference bus waives this issue. It is also worth stressing that the CRLB in Prop. 1 is oftentimes attainable and benchmarks the optimal estimator performance [63]. Having derived the CRLB for the PSSE task, our next subsection deals with PSSE solvers. 3.3 Gauss-Newton Iterations Consider for specificity model (16), though the real-valued model in (17) or the model involving polar coordinates could be employed as well. When the noise covariance matrix Σ = IM , the PSSE task in (18) reduces to the nonlinear LS problem minimize kz − h(v)k22 (24) v∈CNb for which the Gauss-Newton iterations are known to offer the “workhorse” solution [3, Ch. 1], [1, Ch. 2]. According to the Gauss-Newton method, the function h(v) is linearized at a given point vi ∈ CNb using Taylor’s expansion as h̃(v, vi ) := h(vi ) + Ji (v − vi ) where Ji := ∇h(vi ) is the M × Nb Jacobian matrix of h evaluated at vi , whose (m, n)-th entry is given by the Wirtinger derivative ∂hm /∂Vn ; see e.g., [41] for Wirtinger’s calculus. The Gauss-Newton method subsequently approximates the nonlinear LS fit in (24) with a linear one of h̃, and relies on its minimizer to obtain the next iterate as vi+1 ∈ arg min v = arg min v z − h̃(v, vi ) z − h(vi ) 2 2 − 2(v − vi )H (Ji )H (z − h(vi )) + (v − vi )H (Ji )H Ji (v − vi ). (25) When matrix (Ji )H Ji is invertible, vi+1 can be found in closed form as  −1 vi+1 = vi + (Ji )H Ji (Ji )H (z − h(vi )). (26) The state estimate is iteratively updated using (26) until some stopping criterion is satisfied. If, on the other hand, the WLS cost (18) is minimized, the Gauss-Newton −1/2 −1/2 iterations can be similarly obtained by treating Σ z as z and Σ h(v) as h(v) in (24), yielding   i −1 i H −1 (J ) Σ (z − h(vi )). (27) vi+1 = vi + (Ji )H Σ−1  J 8 It is well known that the pure Gauss-Newton iterations in (26) or (27) may not guarantee convergence, which in fact largely depends on the starting point v0 [3, Ch. 1.5]. A common way to improve convergence and ensure descent of the cost in (18) consists of including a backtracking line search in (27) to end up with   i −1 i H −1 vi+1 = vi + µi (Ji )H Σ−1 (J ) Σ (z − h(vi ))  J (28) where the step size µi > 0 is found through the backtracking line search rule [3, Ch. 1.2]. Due to its intimate relationship with ordinary gradient descent alternatives for nonconvex optimization however, this Gauss-Newton iterative procedure can be trapped by local solutions [3, Ch. 1.5]. In a nutshell, the grand challenge remains to develop PSSE solvers capable of attaining or approximating the global optimum at manageable computational complexity. A few recent proposals in this direction are presented next. 3.4 Semidefinite Relaxation A method to tackle the nonlinear measurement model that can convert the PSSE problem of (21) to a convex semidefinite program (SDP) has been introduced in [83], [84]. Consider first expressing each measurement in z linearly in terms of the outer-product matrix V := vvH . In this way, the quadratic models in (8), (10), and (11) can be transformed to linear ones in terms of the matrix variable V. Thus, each noisy measurement in (14) can be written as zm = vH Hm v + m = Tr(Hm V) + m . Rewriting the PSSE task in (21) accordingly in terms of V reduces to V̂1 := arg min V∈CNb ×Nb M X  2 zm − Tr(Hm V) (29a) m=1 s. to V  0, and rank(V) = 1 (29b) where the positive semi-definite (PSD) and the rank-1 constraints jointly ensure that for any V obeying (29b), there always exists a vector v such that V = vvH . Although zm and V are linearly related as in (29), nonconvexity is still present in two aspects: (i) the cost function in (29a) has degree 4 in the entries of V; and (ii) the rank constraint in (29b) is nonconvex. Aiming for an SDP reformulation of (29), Schur’s complement lemma, see e.g., [5, Appx. 5.5], can be leveraged to tightly bound each summand in (29a) using 9 an auxiliary variable χm > 0. Collecting all χm ’s in χ ∈ Rm , the problem in (29) can be expressed as {V̂2 , χ̂2 } := arg min 1T χ (30a) V, χ s. to V  0, and rank(V) = 1 (30b)   χm zm − Tr(Hm V)  0, ∀m. (30c) zm − Tr(Hm V) 1 The equivalence among all three SE problems (21), (29), and (30) has been shown in [83], where their optimal solutions satisfy:  2 V̂1 = V̂2 = v̂v̂H , and χ̂2,m = zm − Tr(Hm V̂2 ) , ∀m. (31) The only source of nonconvexity in the equivalent SE problem of (30) comes from the rank-1 constraint. Motivated by the technique of semidefinite relaxation (SDR); see e.g., the seminal work of [21], one can obtain the following convex SDP upon dropping the rank constraint {V̂, χ̂} := arg min 1T χ V, χ s. to V  0, and (30c). (32a) (32b) For the SDR-PSSE formulation in (32), a few assumptions have been made in [84] to establish its global optimality in a specific setup. (as1) The graph G = (B, L) has a tree topology; (as2) Every bus is equipped with a voltage magnitude meter; and (as3) All measurements in z are noise-free, that is  = 0. Proposition 2. Under (as1)-(as3), solving the relaxed problem (32) attains the global optimum of the original PSSE problem (30) or (21); that is, rank(V̂) = 1. Assumptions (as1)-(as3) may offer a close approximation of the realistic PSSE scenario, thanks to characteristics of transmission systems such as sparse connectivity, almost flat voltage profile, and high metering accuracy. Although they do not hold precisely in realistic transmission systems, nearoptimality of the relaxed problem (32) has been numerically supported by extensive tests [84]. A more crucial issue is to recover a feasible SE solution from the relaxed problem (32), as V̂ is very likely to have rank greater than 1. This is possible either by finding the best rank-1 approximation to V̂ via eigenvalue decomposition, or via randomization [46]. 10 SDR endows SE with a convex SDP formulation for which efficient schemes are available to obtain the global optimum using for example the interior-point solver. The computational complexity for eigen-decomposition is in the order of matrix multiplication, and thus negligible compared to solving the SDP; see [46] and references therein. However, the polynomial complexity of solving the SDP could be a burden for real-time power system monitoring, which motivates well the distributed implementation of Section 4.2. 3.5 Penalized Semidefinite Relaxation Building on an alternative formulation of the power flow problem, a penalized version of the aforementioned SDP-based state estimator has been devised in [48, 47, 78]. Commencing with the power flow task, it can be interpreted as a particular instance of PSSE, where: • Measurements (henceforth termed specifications) are noiseless; • Excluding the reference bus, buses are partitioned into the subset BPV for which active injections and voltage magnitudes are specified, and the subset BPQ , for which active and reactive injections are specified. The power flow task can be posed as the feasibility problem; that is, find v ∈ CNb s. to Pn = vH HPn v, H Qn = v HQn v, Vn2 = vH HVn v, (33) ∀n ∈ BPV ∪ BPQ ∀n ∈ BPQ 2 = V0 . ∀n ∈ BPV , and Vref Using the SDP reformulation presented earlier, the power flow task can be equivalently expressed as find V ∈ CNb ×Nb (34) s. to zm = Tr(Hm V), m = 1, . . . , 2Nb − 1 V  0, and rank(V) = 1 where the specifications (constraints) of (33) have been generically captured b −1 by the pairs {(zm ; Hm )}2N m=1 . Although the optimization in (34) is non-convex, a convex relaxation can be obtained by dropping the rank constraint. To promote rank-one solutions, the feasibility problem is further reduced to [48] V̂ := arg min Tr(H0 V) (35) V0 11 s. to zm = Tr(Hm V), m = 1, . . . , 2Nb − 1. (36) If the Hermitian matrix H0 is selected such that H0  0, rank(H0 ) = Nb −1, and H0 1 = 0; then any state v close to the flat voltage profile 1 + j0 can be recovered from the rank-one minimizer V̂ of (35); see [48, Thm. 2]. The stated conditions exclude the case H0 = INb that would have led to the nuclear-norm heuristic commonly used in low-rank matrix completion. Spurred by this observation, the PSSE task can be posed as [47] V̂µ := arg min Tr(H0 V) + µ V0 M X fm zm − Tr(Hm V)  (37) m=1 for some regularization parameter µ ≥ 0, where M now can be larger than 2Nb − 1. The second term in the cost of (37) is a data-fitting term ensuring that the recovered state is consistent with the collected measurements based on selected criteria. Two cases for fm of special interest are the LS fit LS () := 2 , and the least-absolute value (LAV) one f LAV () := ||, ∀m = fm m 1, . . . , M . On the other hand, the first term in (37) can be understood as a regularizer to promote rank-one solutions V̂µ ; see more details in [47]. In the noiseless setup, where all measurements comply with the model zm = v0H Hm v0 , the minimization in (37) has been shown to possess a rankLS and f LAV ; see one minimizer V̂µ = v̂µ v̂µH for all µ ≥ 0 under both fm m details in [47]. Interestingly, the solution v̂µ obtained under the LS fit does not coincide with v0 for any µ ≥ 0, whereas the LAV solution v̂µ provides the actual state v0 for a sufficiently large µ. Error bounds between V̂µ and v0 v0H under the regularized LAV solution for noisy measurements are established in [78]. 3.6 Feasible Point Pursuit The feasible point pursuit (FPP) method studied in [51] offers another computationally manageable solver for approximating the globally optimal PSSE. As a special case of the convex-concave procedure [44], FPP is an iterative algorithm for handling general nonconvex quadratically constrained quadratic programs (QCQPs) [77]. It approximates the feasible solutions of a nonconvex QCQP by means of a sequence of convexified QCQPs obtained with successive convex inner-restrictions of the original nonconvex feasibility set [77]. The first step in applying FPP to PSSE is a reformulation of (18) into 12 a standard QCQP [71, 70] minimize v∈CNb , χ∈RM χT Σ−1 χ (38a) s. to vH Hm v ≤ zm + χm , H v (−Hm ) v ≤ −zm + χm , 1≤m≤M (38b) 1≤m≤M (38c) where vector χ ∈ RM collects the auxiliary variables {χm ≥ 0}M m=1 . For power flow and power injection measurements, the corresponding Hermitian measurement matrices {Hm } are indefinite in general; thus, both constraints (38b) and (38c) are nonconvex. On the contrary, squared voltage magnitude measurements relate to positive semidefinite matrices {Hm }, so that only the related constraint (38c) is nonconvex. Either way, problem (38) is NPhard, and hence computationally intractable [57]. Using eigen-decomposition, every measurement matrix Hm can be expressed as the sum of a positive and a negative semidefinite matrix as − Hm = H+ m + Hm , so that the constraints in (38) are rewritten as H − vH H+ m v + v Hm v ≤ zm + χm v H H+ mv +v H H− mv ≥ z m − χm (39a) (39b) for m = 1, . . . , M . Observe now that since vH H− m v is a concave function of v, it is upper bounded by its first-order (linear) approximation at any point vi ; that is, i H − i H − i vH H− m v ≤ 2<{(v ) Hm v} − (v ) Hm v . The concave function vH (−H+ m )v can be upper bounded similarly. Based on this observation, the FPP technique replaces the concave functions in the constraints of (39) with their linear upper bounds. The point of linearization at every iteration is chosen to be the previous state estimate. Specifically, initializing with v0 , the FPP produces the iterates {vi+1 , χi+1 } := arg min χT Σ−1  χ v, χ≥0 (40) i H − i H − i s. to vH H+ m v + 2<{(v ) Hm v} ≤ zm + (v ) Hm v + χm , ∀m i H + i H + i vH H− m v + 2<{(v ) Hm v} ≥ zm + (v ) Hm v − χm , ∀m. At every iteration, the FPP technique solves the now convex QCQP in (40). The procedure has been shown to globally converge to a stationary point of the WLS formulation (18) of the PSSE task [71]. Extensions of the developed FPP solver to cope with linear(ized) measurements and bad data are straightforward; see [71] for details. 13 100 Mean-square error (p.u.) Angle error (degrees) 102 102 10-2 Magnitude error (p.u.) 10-4 100 10-5 GN-based SE SDR-based SE FPP-based SE 5 10 15 20 25 10 100 10-1 10-2 10 30 GN-based SE SDR-based SE FPP-based SE Cramer-Rao bound 1 -3 1 2 3 4 5 Types of measurements bus index Figure 1: Left: Voltage magnitude and angle estimation errors per bus for the IEEE 30-bus system. Right: MSEs and CRLB versus types of measurements used for the IEEE 14-bus system using: (i) Gauss-Newton iterations; ii) the SDR-based PSSE; and iii) the FPP-based PSSE. Figure 1 compares Gauss-Newton iterations, the SDR-based solver, and the FPP-based solver on the IEEE 14- and 30-bus systems [64]. The actual nodal voltage magnitudes and angles were generated uniformly at random over [0.9, 1.1] and [−0.4π, 0.4π], respectively. Independent zero-mean Gaussian noise with standard deviation 0.05 for power and 0.02 for voltage measurements was assumed, and all reported results were averaged over 100 independent Monte Carlo realizations. The measurements for the IEEE 30bus system include all nodal voltage magnitudes and the active power flows at both sending and receiving ends. The left panel of Fig. 1 depicts that the magnitude and angle estimation errors attained by the FPP solver are consistently below its competing alternatives [71]. The second experiment examines the MSE performance of the three approaches relative to the CRLB of (22) for the IEEE 14-bus test system. Initially, all voltage magnitudes as well as all sending- and receiving-end active power flows were measured, which corresponds to the base case 1 in the x-axis of the right panel of Fig. 1. To show the MSE performance relative for an increasing number of measurements, additional types of measurements were included in a deterministic manner. All types of SCADA measurements were ordered as {Vn2 , Pkn , Pnk , Qkn , Qnk , Pn , Qn }. Each x-axis value in the right panel of Fig. 1 implies that the number of ordered types of measurements was used in the experiment to obtain the corresponding MSEs. 14 3.7 Synchrophasors To incorporate synchrophasors into the PSSE formulation, let ζn = Φn v+εn collect the noisy PMU data at bus n [cf. (16)]. The related measurement matrix is Φn , and the measurement noise εn is assumed to be complex zeromean Gaussian, independent from the noise  in legacy meters and across buses. Following the normalization convention in (21), the noise vector εn is assumed prewhitened, such that all PMU measurements exhibit the same accuracy. The PSSE task now amounts to estimating v given both z and {ζn }n∈P , where P ⊆ B denotes the subset of the PMU-instrumented buses. Hence, the MLE cost in (21) needs to be augmented by the log-likelihood induced by PMU data as v̂ := arg min v M X (zm − hm (v))2 + m=1 X kζn − Φn vk22 . (41) n∈P The SDR methodology is again well motivated to convexify the augmented PSSE problem (41) into X  H minimize 1T χ + Tr(ΦH (42a) n Φn V) − 2<{ζn Φn v} V, v, χ n∈P  s. to V v vH 1   0, and (30c). (42b) By Schur’s complement, the left SDP constraint in (42b) can be expressed equivalently as V  vvH . If the latter constraint is enforced with equality, the matrix V becomes rank-one. Imposing a rank-one constraint in (42) renders it equivalent to the augmented PSSE task of (41). The SDP here also offers the advantages of (32), in terms of the near-optimality and the distributed implementation deferred to Section 4.2. To recover a feasible solution, one can again use the best rank-1 approximation or adopt the randomization technique as elucidated in [84]. Alternatively, the two types of measurements can be jointly utilized upon interpreting the SCADA-based estimate as a prior for PMU-based estimation [58, 32]. Specifically, if v̂s is the SCADA-based estimate, the prior probability density function of the actual state can be postulated to be a circularly symmetric complex Gaussian with mean v̂s and covariance Σ̂s . Given PMU data and the SCADA-based prior, the state can be estimated following a maximum a-posteriori probability (MAP) approach as X v̂ := arg min (v − v̂s )H Σ̂−1 kζn − Φn vk22 (43) s (v − v̂s ) + v n∈P 15 where the first summand is the negative logarithm of the prior distribution, and the second one is the negative log-likelihood from the PMU data. In essence, the approach in (43) treats the SCADA-based estimate as pseudomeasurements relying on the model v̂s = v +  with circularly symmetric zero-mean noise having E[H ] = Σ̂s . 4 Distributed Solvers Upcoming power system requirements call for decentralized solvers. Measurements are now collected at much finer spatio-temporal scales and the number of states increases exponentially as monitoring schemes extend to low-voltage distribution grids [13]. Tightly interconnected power systems call for the close coordination of regional control centers [22], while operators and utilities perform their computational operations on the cloud. This section reviews advances in distributed PSSE solvers. As the name suggests, distributed PSSE solutions spread the computational load across different processors or control centers to speed up time, implement memoryintensive tasks, and/or guarantee privacy. A network of processors may be coordinated by one or more supervising control centers in a hierarchical fashion, or completely autonomously, by exchanging information between processors. To clarify terminology, the latter architecture will be henceforth identified as decentralized. Distributed solvers with a hierarchical structure have been proposed since the statistical formulation of PSSE [61, Part III]. Different versions of this original scheme were later developed in [10], [27], [80], [22], [38]. Decentralized schemes include block Jacobi iterations [43], [9]; an approximate algorithm building on the related optimality conditions [18]; or matrixsplitting techniques for facilitating matrix inversion across areas running Gauss-Newton iterations [53]. Most of the aforementioned approaches presume local identifiability (i.e., each area is identifiable even when shared measurements are excluded) or their convergence is not guaranteed. Assuming a ring topology, every second agent updates its state iteratively through the auxiliary problem principle in [16]. Local observability is waived in the consensus-type solver of [75], where each control center maintains a copy of the entire high-dimensional state vector resulting in slow convergence. For a relatively recent review on distributed PSSE solves, see also [23]. 16 Figure 2: Left: The IEEE 14-bus system partitioned into four areas [64, 38]. Dotted lassos show the buses belonging to area state vectors vk ’s. PMU bus voltage (line current) measurements depicted by green circles (blue squares). Right: The matrix structure for the left system with the distributed SDR solver: green square denotes the overall V, while dark and light blue ones correspond to the four area submatrices {Vk } and their overlaps. 4.1 Distributed Linear Estimators Consider an interconnected system partitioned in K areas supervised by separate control centers. Without loss of generality, an area may be thought of as an independent system operator region, a balancing authority, a power distribution center, or a substation [58]. Area k collects Mk measurements obeying the linear model zk = Hk vk + k (44) where vector vk ∈ CNk collects the system states related to zk through the complex matrix Hk . The random noise vector k is zero-mean with identity covariance upon prewhitening, if measurements are uncorrelated across areas. The model in (44) is exact for PMU measurements, but it may also correspond to a single Gauss-Newton iteration as explained in Section 3.3. Performing PSSE locally at area k amounts to solving minimize fk (vk ) vk ∈Xk (45) where the convex set Xk captures possible prior information, such as zero17 injection buses or short circuits [55], [1]. If fk (vk ) = kzk − Hk vk k22 /2, the minimizer of (45) is the least-squares estimate (LSE) of vk , which is also the MLE of vk for Gaussian k . As illustrated in Fig. 2, the per-area state vectors {vk }K k=1 overlap partially. Although area 4 supervises buses {9, 10, 14}, it also collects the current reading on lines (10, 11). Thus, its state vector v4 extends to bus {11} that is nominally supervised by area 3. To setup notation, define Skl as the shared states for a pair of neighboring areas (k, l). Let also vk [l] (vl [k]) denote the sub-vector of vk (vl ) consisting of their overlapping variables ordered as they appear in v. For example, v3 [4] = v4 [3] contain the bus voltages of {11}. Solving the K problems in (45) separately is apparently suboptimal since the estimates of shared states will disagree, tie-line measurements have to be ignored, and boundary states may thus become unobservable. Coupling the per-area PSSE tasks can be posed as minimize {vk ∈Xk } K X fk (vk ) (46) k=1 s. to vk [l] = vl [k], ∀l ∈ Bk , ∀k where Nk is the set of areas sharing states with area k. The equality constraints of (46) guarantee consensus over the shared variables. Although (46) is amenable to decentralized implementations (cf. [16]), areas need a coordination protocol for their updates. To enable a truly decentralized solution, we follow the seminal approach of [60, 82]. An auxiliary variable vkl is introduced per pair of connected areas (k, l); the symbols vkl and vlk are used interchangeably. The optimization in (46) can then be written as minimize {vk ∈Xk }, {vkl } K X fk (vk ) (47) k=1 s. to vk [l] = vkl , ∀l ∈ Bk , k = 1, . . . , K. Problem (47) can be solved using the alternating direction method of multipliers (ADMM) [4], [20]. In its general form, ADMM tackles convex optimization problems of the form minimize f (x) + g(z) x∈X , z∈Z s. to Ax + Bz = c 18 (48a) (48b) for given matrices and vectors (A, B, c) of proper dimensions. Upon assigning a Lagrange multiplier λ for the coupling constraint in (48a), the (x, z) minimizing (48a) are found through the next iterations for some µ > 0 µ kAx + Bzi − c + λi k22 2 µ := arg min g(z) + kAxi+1 + Bz − c + λi k22 z∈Z 2 := λi + Axi+1 + Bzi+1 − c. xi+1 := arg min f (x) + (49a) zi+1 (49b) x∈X λi+1 (49c) Towards applying the ADMM iterations to (46), identify variables {vk } as x in (48a) and {vkl } as z with g(z) = 0. Moreover, introduce Lagrange multipliers λk,l for each constraint in (47). Observe that λk,l and λl,k correspond to the distinct constraints vk [l] = vkl and vl [k] = vkl , respectively. According to (49a), the per-area state vectors {vk } can be updated separately as µX i vki+1 := arg min fk (vk ) + kvk [l] − vkl + λik,l k22 . (50) vk ∈Xk 2 l∈Bk From (49b) and assuming every state is shared by at most two areas, the auxiliary variables vkl can be readily found in closed form given by i+1 vkl =  1 i+1 vk [l] + vli+1 [k] + λik,l + λil,k 2 (51) while the two related multipliers are updated as i+1 i+1 i λi+1 k,l := λk,l + (vk [l] − vkl ) λi+1 l,k := λil,k + (vli+1 [k] − i+1 ). vkl (52a) (52b) i+1 Adding (52) by parts and combining it with (51) yields λi+1 k,l = −λl,k at all iterations i if the multipliers are initialized at zero. Hence, the auxiliary variable vkl ends up being the average of the shared states; that is, i+1 vkl =  1 i+1 vk [l] + vli+1 [k] . 2 (53) To summarize, at every iteration i: (i) Each control area solves (50). If fk (vk ) is the LS fit and for unconstrained problems, the per-area states are updated as the LSEs using legacy software. The second summand in (50) can be interpreted as pseudo-measurements on the shared states forcing them to consent across areas. 19 −2 10 Error curves averaged over areas LSE D−RPSSE −3 10 −4 10 −5 10 −6 10 0 10 20 30 40 50 60 70 80 Iteration P300 t P t Figure 3: Average error curves 300 k=1 ek,o /300 k=1 ek,c /300 (bottom) and (top) for the LSE, and its robust counterpart D-RPSSE (see Section 5.1) on a 4,200-bus grid. (ii) Neighboring areas exchange their updated shared states. This step involves minimal communication, and no grid models need to be shared. Every area updates its copies of the auxiliary variables vkl using (53). (iii) Every area updates the Lagrange multipliers λkl based on the deviation of the local from the auxiliary variable as in (52). For convex pairs {fk (vk ), Xk }K k=1 , the aforementioned iterates reach the optimal cost in (46), under mild conditions. If the overall power system is observable, the ADMM iterates converge to the unique LSE. The approach has been extended in [33] for joint PSSE and breaker status verification. The decentralized algorithms were tested on a 4,200-bus power grid synthetically built from the IEEE 14- and 300-bus systems. Each of the 300 buses of the latter was assumed to be a different area, and was replaced by a copy of the IEEE 14-bus grid. Additionally, every branch of the IEEE 300-bus grid was an inter-area line whose terminal buses are randomly selected from the two incident to this line areas. Two performance metrics were adopted: the per area error to the centralized solution of (46), denoted (c) by etk,c :=kvk − vkt k2 /Nk , and the per-area error to the true underlying state defined as etk,o :=kvk − vkt k2 /Nk . Figure 3 shows the corresponding error curves averaged over 300 areas. The decentralized LSE approached the underlying state at an accuracy of 10−3 in approximately 10 iterations 20 or 6.2 msec on an Intel Duo Core @ 2.2 GHz (4GB RAM) computer using MATLAB; while the centralized LSE finished in 93.4 msec. 4.2 Distributed SDR-based Estimators Although the SDR-PSSE approach incurs polynomial complexity √ when im4 plemented as a convex SDP, its worst-case complexity is still O(M Nb log(1/)) for a given solution accuracy  > 0 [46]. For typical power networks, the number of measurements M is on the order of the number of buses Nb , and thus the worst-case complexity becomes O(Nb4.5 log(1/)). This complexity could be prohibitive for large-scale power systems, which motivates accelerating the SDR-PSSE method using distributed parallel implementations. Following the area partition in Fig. 2, the m-th measurement per area k can be written as zk,m = hk,m (vk ) + k,m = Tr(Hk,m Vk ) + k,m , ∀k, m where Vk denotes a submatrix of V formed by extracting the rows and columns corresponding to buses in area k; and likewise for each Hk,m . Due to the overlap among the subsets of buses, the outer-product Vk of area k overlaps also with Vl for each neighboring area l ∈ Nk , as shown in Fig. 2. By reducing the measurements atP area k to submatrix Vk , one can de2 k fine the PSSE error cost fk (Vk ) := M m=1 [zk,m − Tr(Hk,m Vk )] per area k, which only involves the local matrix Vk . Hence, the centralized PSSE problem in (32) becomes equivalent to V̂ = arg min K X V0 fk (Vk ). (54) k=1 This equivalent formulation effectively expresses the overall PSSE cost as the superposition of each local cost fk . Nonetheless, even with such a decomposable cost, the main challenge to implement (54) in a distributed manner lies in the PSD constraint that couples the overlapping local matrices {Vk } (cf. Fig. 2). If all submatrices {Vk } were non-overlapping, the cost would be decomposable as in (54), and the PSD of V would boil down to a PSD constraint per area k, as in V̂ = arg min {Vk 0} K X fk (Vk ). (55) k=1 Similar to PSSE for linearized measurements in (46), the formulation in (55) can be decomposed into sub-problems, thanks to the separable PSD 21 constraints. It is not always equivalent to the centralized (54) though, because the PSD property of all submatrices does not necessarily lead to a PSD overall matrix. Nonetheless, the decomposable problem (55) is still a valid SDR-PSSE reformulation, since with the additional per-area constraints rank(Vk ) = 1, it is actually equivalent to (30). While it is totally legitimate to use (55) as the relaxed SDP formulation for (30), the two relaxed problems are actually equivalent under mild conditions. The fresh idea here is to explore valid network topologies to facilitate such PSD constraint decomposition. To this end, it will be instrumental to leverage results on completing partial Hermitian matrices to obtain PSD ones [24]. Upon obtaining the underlying graph formed by the specified entries in the partial Hermitian matrices, these results rely on the so-termed graph chordal property to establish the equivalence between the positive semidefiniteness of the overall matrix and that of all submatrices corresponding to the graph’s maximal cliques. Interestingly, this technique was recently used for developing distributed SDP-based optimal power flow (OPF) solvers in [28, 12, 42]. Construct first a new graph B 0 over B, with all its edges corresponding to the entries in {Vk }. The graph G 0 amounts to having all buses within each subset Nk to form a clique. Furthermore, the following are assumed: (as4) The graph with all the control areas as nodes, and their edges defined by the neighborhood subset {Nk }K k=1 forms a tree. (as5) Each control area has at least one bus that does not overlap with any neighboring area. Proposition 3. Under (as4)-(as5), the two relaxed problems (54) and (55) are equivalent. Proposition 3 can be proved by following the arguments in [84] to show that the entire PSD matrix V can be “completed” using only the PSD submatrices Vk . The key point is that in most power networks even those not obeying (as4) and (as5), (55) can achieve the same accuracy as the centralized one. At the same time, decomposing the PSD constraint in (55) is of paramount importance for developing distributed solvers. One can adopt the consensus reformulation to design the distributed solver for (55) as in (46) of Section 4.1. Accordingly, the ADMM iterations can be employed to solve (55) through iterative information exchanges among neighboring areas, and this is the basis of the distributed SDR-PSSE method. This distributed SDR-PSSE method was tested on the IEEE 118-bus system using the three-area partition in [31]. All three areas measure their 22 1 10 Area 1 Area 2 Area 3 Local matrix error 10 0 Area 1 Area 2 Area 3 10 Local estimation error 0 −1 10 −2 −1 10 10 −3 10 0 20 40 60 0 80 20 40 60 80 Iteration index Iteration index Figure 4: (Left) Per area state matrix error and (Right) state vector estimation error, versus the number of ADMM iterations for the distributed SDR-PSSE solver using the IEEE 118-bus system. local bus voltage magnitudes, as well as real and reactive power flow levels at all lines. The overlaps among the three areas form a tree communication graph used to construct the area-coupling constraints. To demonstrate convergence of the ADMM iterations to the centralized SE solution V̂ of (55), i − V̂ k is plotted versus the the local matrix Frobenius error norm kV̂(k) (k) F iteration index i in the left panel of Fig. 4 for every control area k. Clearly, all local iterates converge to (approximately with a linear rate) their counterparts in the centralized solution. As the task of interest is to estimate the i − v k is also voltages, the local estimation error for the state vector kv̂(k) (k) 2 depicted in the right panel of Fig. 4, where v̂(k) is the estimate of bus volti using the eigen-decomposition ages at area k obtained from the iterate V̂(k) method. Interestingly, the estimation error costs converge within the estimation accuracy of around 10−2 after about 20 iterations (less than 10 iterations for area 1), even though the local matrix has not yet converged. In addition, these error costs decrease much faster in the first couple of iterations. This demonstrates that even with only a limited number of iterations, the PSSE accuracy can be greatly boosted in practice, which in turn makes inter-area communication overhead more affordable. 5 Robust Estimators and Cyber Attacks Bad data, also known as outliers in the statistics parlance, can challenge PSSE due to communication delays, instrument mis-calibration, and/or line 23 parameter uncertainty. In today’s cyber-enabled power systems, smart meter and synchrophasor data could be also purposefully manipulated to mislead system operators. This section reviews conventional and contemporary approaches to coping with outliers. 5.1 Bad Data Detection and Identification Bad data processing in PSSE relies mainly on the linear measurement model z = Hv + , where H ∈ RM ×N . Recall that this model is exact for PMU measurements [cf. (16)–(17)], but approximate per Gauss-Newton iteration or under the linearized grid model. In addition, the aforementioned model assumes real-valued states and measurements, slightly abusing the symbols introduced in (17). This is to keep the notation uncluttered and cover both cases of exact and inexact grid models. Albeit the nominal measurement noise vector is henceforth assumed zero-mean with identity covariance, results extend to colored noise as per (20). To capture bad data, the measurement model is now augmented as z = Hv + o +  (56) where o ∈ RM is an unknown vector whose m-th entry om is deterministically non-zero only if zm is a bad datum [30, 39, 15]. Therefore, vector o is sparse, i.e., many of its entries are zero. Under this outlier-cognizant model in (56), the unconstrained LSE given as v̂LSE = (HT H)−1 HT z, yields the residual error r := z − Hv̂LSE = Pz = P(o + ) (57) with P := IM − H(HT H)−1 HT being the so-called projection matrix onto the orthogonal subspace of range(H). The last equality in (57) stems from the fact that PH = 0. As a projection matrix, P is idempotent, that is, P = P2 ; Hermitian PSD with (M − N ) eigenvalues equal to one and N zero eigenvalues; while its diagonal entries satisfy Pm,m ∈ [0, 1] for m = 1, . . . , M ; see e.g., [6]. For  ∼ N (0, IM ), it apparently holds that P ∼ N (0, P). The meansquared residual error is (see also [39] for its Bayesian counterpart) E[krk22 ] = E[kPk22 ] + kPok22 = (M − N ) + kPok22 . (58) In the absence of bad data, or if o ∈ range(H), the squared residual error follows a χ2 distribution with mean (M − N ). The χ2 -test compares krk22 against a threshold to detect the presence of bad data [1, 55]. 24 Finding both v and o from measurements in (56) may seem impossible, given that the number of unknowns exceeds the number of equations. Leveraging the sparsity of o though, interesting results can be obtained [30]. If τ0 bad data are expected, one would ideally wish to solve o n1 {v̂, ô} ∈ arg min (59) kz − Hv − ok22 : kok0 ≤ τ0 . v, o 2 But the `0 -(pseudo) norm kok0 counting the number of non-zero entries of o, renders (59) NP-hard in general; see also Definition 2 later in Section 5.2. For the special case of τ0 = 1, problem (59) can be efficiently handled. Consider the scenario where the only non-zero entry of ô is the m-th one, and denote the related v̂ minimizer by v̂(m) . Apparently, the m-th entry of the ô minimizer is ôm := zm − hTm v̂(m) . This choice nulls the m-th residual (zm − hTm v̂(m) − ôm = 0). With the m-th residual zeroed, the cost in (59) becomes kr(m) k22 := kz(m) − H(m) v̂(m) k22 , where z(m) is obtained from z upon dropping its m-th entry and H(m) by removing the m-th row of H. The problem in (59) is then equivalent to minimize m 1 kr k2 . 2 (m) 2 (60) Problem (60) can be solved by exhaustively finding all M LSEs excluding one measurement at a time. Fortunately, a classical result from the adaptive filtering literature relates the error kr(m) k22 to the error attained using all outlier-free measurements krk22 := kPzk22 ; see e.g., [25, Ch. 9] krk22 = kr(m) k22 + rm ôm . (61) The same result links the a-posteriori error rm to the a-priori error ôm as rm = Pm,m ôm . Through these links, solving (60) is equivalent to: |rm | rmax := maximize p . m Pm,m (62) In words, a single bad datum can be identified by properly normalizing the entries of the original residual vector r = Pz. Interestingly, the task in (62) coincides with the largest normalized residual (LNR) test that compares rmax to a prescribed threshold to identify a single bad datum [1, Sec. 5.7]. The p threshold is derived after recognizing that in the absence of bad data, rm / Pm,m is standard normal for all m. The LNR test does not generalize for multiple bad data and problem (59) becomes computationally intractable for larger τ0 ’s. Heuristically, if 25 a measurement is deemed as outlying, PSSE is repeated after discarding this bad datum, the LNR test is re-applied, and the process iterates till no corrupted data are identified. Alternatively, the least-median squares and the least-trimmed squares estimators have provable breakdown points and superior efficiency under Gaussian data; see e.g., [52] and references therein. Nevertheless, their complexity scales unfavorably with the network size. Leveraging compressed sensing [7], a practical robust estimator can be found if the `0 -pseudonorm is surrogated by the convex `1 -norm as [30, 31] n1 o minimize kz − Hv − ok22 : kok1 ≤ τ1 (63) v, o 2 for a preselected constant τ1 > 0, or in its Lagrangian form {v̂, ô} ∈ arg min v, o 1 kz − Hv − ok22 + λkok1 2 (64) for some tradeoff parameter λ > 0. The estimates of (64) offer joint state estimation and bad data identification. Even when some measurements are deemed as corrupted, their effect has been already suppressed. The optimization task in (64) can be handled by off-the-shelf software or solvers customized to the compressed sensing setup. When λ → ∞, the minimizer ô becomes zero, and thus v̂ reduces to the LSE. On the contrary, by letting λ → 0+ , the solution v̂ coincides with the least-absolute value (LAV) estimator [40, 6, 17, 68]; presented earlier in (37), namely v̂LAV := arg min kz − Hvk1 . v (65) For finite λ > 0, the v̂ minimizer of (64) is equivalent to Huber’s Mestimator; see [30] and references therein. Based on this connection and for Gaussian , parameter λ can be set to 1.34, which makes the estimator 95% asymptotically efficient for outlier-free measurements [50, p. 26]. Huber’s estimate can be alternatively expressed as the v-minimizer of [49], minimizev, ω 21 kωk22 + λkv − Hv − ωk1 . The bad data identification performance of this minimization has been analyzed in [76]. Table 1 compares several bad data analysis methods on the IEEE 14bus grid of Fig. 2 under the next four scenarios: (S0) no bad data; (S1) bad data on line (4, 7); (S2) bad data on line current (4, 7) and bus voltage 5; and (S3) bad data on bus voltage 5 and line currents (4, 7) and (10, 11). In all scenarios, bad data are simulated by multiplying the real and imaginary parts of the actual measurement by 1.2. The performance metric here is the `2 -norm between the true state and the PSSE, which is 26 Table 1: Mean-Square Estimation Error in the Presence of Bad Data Method GA-LSE LSE LNRT Huber’s 0.0278 0.0313 0.0336 0.0367 0.0278 0.0318 0.1431 0.1434 0.0286 0.0331 0.0404 0.0407 0.0281 0.0322 0.0390 0.0390 (S0) (S1) (S2) (S3) averaged over 1,000 Monte Carlo runs. Four algorithms were tested: (a) an ideal but practically infeasible genie-aided LSE (GA-LSE), which ignores the corrupted measurements; (b) the regular LSE; (c) the LNR test-based (LNRT) estimator with the test threshold set to 3.0 [1]; and (d) Huber’s estimator of (64) with λ = 1.34. For (S0)-(S1), the estimators perform comparably. The few corrupted measurements in (S2)-(S3) can deteriorate LSE’s performance, while Huber’s estimator performs slightly better than LNRT. Computationally, Huber’s estimator was run within 1.3 msec, while the LNRT required 1.5 msec. The computing times were also measured for the IEEE 118-bus grid without corrupted data. Interestingly, the average time on the IEEE 118-bus grid without corrupted data are 3.2 msec and 81 msec, respectively. Towards a robust decentralized state estimator, the ADMM-based framework of Section 4.1 can be engaged here too. If the measurement model for the k-th area is zk = Hk vk + ok + k , the centralized problem boils down to minimize {vk ∈Xk , ok } K X 1 k=1 2 kzk − Hk vk − ok k22 + λkok k1 . (66) To allow for decentralized implementation, the optimization in (66) can be reformulated as minimize K X 1 k=1 2 kzk − Hk vk − ok k22 + λkωk k1 (67a) over {vk ∈ Xk , ok , ωk }, {vkl } (67b) s. to vk [l] = vkl , for all l ∈ Bk , k = 1, . . . , K. (67c) ok = ωk , for all k = 1, . . . , K. (67d) As in Section 4.1, the constraints in (67c) and the auxiliary variables {vkl } enforce consensus of shared states. On the other hand, the variables {ok } 27 are duplicated as {ωk } in (67d). Then, variables {vk , ok } are put together in the x-update of ADMM in (49a), whereas {vkl , ωk } fall into the z-update in (49b). In this fashion, costs are separable over variable groups, and the minimization involving the `1 -norm enjoys a closed-form solution expressed in terms of the soft thresholding operator [31]. 5.2 Observability and Cyber Attacks In the cyber-physical smart grid context, bad data are not simply unintentional errors, but can also take the form of malicious data injections [54]. Amid these challenges, the intertwined issues of critical measurements and stealth cyber-attacks on PSSE are discussed next. It has been tacitly assumed so far that the power system is observable. A power system is observable if distinct states v 6= v0 are mapped to distinct measurements h(v) 6= h(v0 ) under a noiseless setup. Equivalently, if the so-called measurement distance function is defined as [81] D(h) := minimize kh(v) − h(v0 )k0 0 v6=v (68) the power system is observable if and only if D(h) ≥ 1. Given the network topology and the mapping h(v), the well-studied topic of observability analysis aims at determining whether the system state is uniquely identifiable, at least locally in a neighborhood of the current estimate [1, Ch. 4]. If not, mapping observable islands, meaning maximally connected sub-grids with observable internal flows, is important as well. Observability analysis relies on the decoupled linearized grid model, and is accomplished through topological or numerical tests [8, 56]. Apparently, under the linear or linearized model h(v) = Hv, the state v is uniquely identifiable if and only if H is full column-rank. Phase shift ambiguities can be waived by fixing the angle at a reference bus. In the presence of bad data and/or cyber attacks, observability analysis may not suffice. Consider the noiseless measurement model z = h(v) + o, where the non-zero entries of vector o correspond to bad data or compromised meters; and let us proceed with the following definitions. Definition 1 (Observable attack [81]). The attack vector o is deemed as observable if for every state v there is no v0 6= v, such that h(v)+o = h(v0 ). Definition 2 (Identifiable attack [81]). The attack vector o is identifiable if for every v there is no (v0 , o0 ) with v0 6= v and ko0 k0 ≤ kok0 , such that h(v) + o = h(v0 ) + o0 . 28 If the outlier vector o is observable, the operator can tell that the collected measurements do not correspond to a system state, and can hence decide that an attack has been launched. Nevertheless, the attacked meters can be pinpointed only under the stronger conditions of Definition 2. The resilience of the measurement mapping h(v) against attacks can be characterized through D(h) in (68): The maximum number of counterfeited meters for an attack to be observable is Ko = D(h)−1 and to be identifiable, it is Ki = b D(h)−1 c; see [81, 76]. Here, the floor function bxc returns the 2 greatest integer less than or equal to x. Consider the linear mapping h(v) = Hv. Measurement m is termed critical if once removed from the measurement set, it renders the power system non-identifiable. In other words, although H is full column-rank, its submatrix H(m) is not. It trivially follows that D(h) = 1, and the system operator can be arbitrarily misled even if only measurement m is attacked. Due to the typically sparse structure of H, critical measurements or multiple simultaneously corrupted data do exist [1]. It was pointed out in [45] that if an attack o can be constructed to lie in the range(H), it comprises a ‘stealth attack.’ Although finding D(h) is not trivial in general, a polynomial-time algorithm leveraging a graph-theoretic approach is devised in [39]. 6 Power System State Tracking The PSSE methods reviewed so far ignore system dynamics and do not exploit historical information. Dynamic PSSE is well motivated thanks to its improved robustness, observability, and predictive ability when additional temporal information is available [26]. Recently proposed model-free and model-based state tracking schemes are outlined next. 6.1 Model-free State Tracking via Online Learning In complex future power systems, one may not choose to explicitly commit to a model for the underlying system dynamics. The framework of online convex optimization (OCO), particularly popular in machine learning, can account for unmodeled dynamics and is thus briefly presented next [62]. The OCO model considers a multi-stage game between a player and an adversary. In the PSSE context, the utility or the system operator assumes the role of the player, while the loads and renewable generations can be viewed as the adversary. At time t, the player first selects an action Vt from a given action set V, and the adversary subsequently reveals a convex loss 29 function ft : V → R. In this round, the player suffers a loss ft (Vt ). The ultimate goal for the player is to minimize the regret Rf (T ) over T rounds: Rf (T ) := T X ft (Vt ) − minimize V∈V t=1 T X ft (V). (69) t=1 The regret is basically the accumulated cost incurred the player relative Pby T 0 to that by a single fixed action V := arg minV∈V t=1 ft (V). This fixed action is selected with the advantage of knowing the loss functions {ft }Tt=1 in hindsight. Under appropriate conditions, judiciously designed online optimization algorithms can achieve sublinear regret; that is, Rf (T )/T → 0 as T → +∞. Building on the SDR-PSSE formulation of Section 3.4, the ensuing method considers streaming data for real-time PSSE. The data referring to and colt lected over the control period t are {(zmt ; Hmt )}M mt =1 with t = 1, . . . , T . The number and type of measurements can change over time, while the matrix corresponding to measurement m may change over time as indicated by t {Hmt }M mt =1 due to topology reconfigurations. The online PSSE task can be now formulated as T X minimize ft (V) (70) V0 t=1 PMt where ft (V) := mt =1 [zmt − Tr(Hmt V)]2 . Online PSSE aims at improving the static estimates by capitalizing on previous measurements as well as tracking slow time-varying variations in generation and demand. Minimizing the cost in (70) may be computationally cumbersome for real-time implementation. An efficient alternative based on online gradient descent amounts to iteratively minimizing a regularized first-order approximation of the instantaneous cost instead [37] Vt+1 := arg min Tr(VH ∇ft (Vt )) + V0 1 kV − Vt k2F 2µt (71) for t = 1, . . ., and suitably selected step sizes µt > 0. Interestingly, the optimization in (71) admits a closed-form solution given by Vt+1 = ProjS+ [Vt − µt ∇ft (Vt )] (72) with ProjS+ denoting the projection onto the positive semidefinite cone, which can be performed using eigen-decomposition followed by setting negative eigenvalues to zero. It is worth mentioning that the online PSSE in 30 (72) enjoys sublinear regret [37]. Upon finding Vt , a state estimate vt can be obtained by eigen-decomposition or randomization as in Section 3.4. With an additional nuclear-norm regularization term promoting low-rank solutions in (71), online ADMM alternatives were devised in [36]. Interestingly, online learning tools has recently been advocated for numerous real-time energy management tasks in [35], [34], [69]. 6.2 Model-based State Tracking Although the previous model-free solver can recover slow time-varying states, model-based approaches facilitate tracking of fast time-varying system states. A typical state-space model for power system dynamics is [65] vt+1 = Ft vt + gt + ωt (73a) zt = h(vt ) + t (73b) where Ft denotes the state-transition matrix, gt captures the process mismatch, and wt is the additive noise. The nonlinear mapping h(·) comes from conventional SCADA measurements. Values {(Ft , gt )} can be obtained in real-time using for example Holt’s system identification method [11]. Two common dynamic tracking approaches to cope with the nonlinearity in the measurement model of (73b) include the (extended or unscented) Kalman filters and moving horizon estimators [65, 14, 26, 73, 72], and they are outlined in order next. The extended Kalman filter (EKF) handles the nonlinearity by linearizing h(v) around the state predictor. To start, let v̂t+1|t stand for the predicted estimate at time t + 1 given measurements {zτ }tτ =1 up to time t. Let also v̂t+1|t+1 be the filtered estimate given measurements {zτ }t+1 τ =1 . If the noise terms ωt and t in (73) are assumed zero-mean Gaussian with known covariance matrices Qt  0 and Rt  0, respectively, the EKF can be implemented with the following recursions   v̂t+1|t+1 = v̂t+1|t + Kt+1 zt+1 − h(v̂t+1|t ) (74) where the state predictor v̂t+1|t and the Kalman gain Kt+1 are given by v̂t+1|t = Ft v̂t|t + gt (75a) H Kt+1 = Pt+1|t JH t+1 Jt+1 Pt+1|t Jt+1 + Rt+1 Pt+1|t+1 = Pt+1|t − Kt+1 Jt+1 Pt+1|t Pt+1|t = Ft Pt|t FH t + Qt 31 −1 (75b) (75c) (75d) with Jt+1 being the measurement Jacobian matrix of h evaluated at v̂t+1|t , and Pt+1|t+1  0 (Pt+1|t  0) denoting the corrected (predicted) state estimation error covariance matrix at time t + 1. To improve on the approximation accuracy of the EKF, extended Kalman filters (UKF) have been reported in [65]; see also [79] for their robust versions. Particle filtering may also be useful if its computational complexity can be supported during real-time power systems operations. Because the EKF and UKF are known to diverge for highly nonlinear dynamics, moving horizon estimation (MHE) has been suggested as an accurate yet tractable alternative with proven robustness to bounded model errors [59]. Different from Kalman filtering, the initial state v0 , and noises ωt and t in MHE are viewed as deterministic unknowns taking values from given bounded sets S, W, and E, respectively. The sets W and E model disturbances with truncated densities [59]. The idea behind MHE is to perform PSSE by exploiting useful information present in a sliding window of the most recent observations. Consider here a sliding window of length L + 1. Let v̂t−L|t denote the smoothed estimate at time t − L given L past measurements, as well as the current one, namely {zτ }tτ =t−L . MHE aims at obtaining the most recent L t state estimates {v̂t−L+s|t }L s=0 based on {zτ }t−L and the available estimate v̌t−L := v̂t−L|t−1 from time t − 1 and for t ≥ L. A key simplification is that once v̂t−L|t becomes available, the other L recent estimates at time t can be recursively obtained through ‘noise-free’ propagation based on the dynamic model (73a); that is, v̂t−L+s|t = Ft−L+s−1 v̂t−L+s−1|t (76) for s = 1, . . . , L. By relating all recent estimates to v̂t−L|t via successive multiplications of transition matrices, the update in (76) simplifies to v̂t−L+s|t = Tt−L+s v̂t−L|t (77) where Tt−L+s := Ft−L+s−1 Tt−L+s−1 for s = 1, . . . , L, with Tt−L = I. The MHE-based state estimate v̂t−L|t is then given by v̂t−L|t := arg min v L X zt−L+s − h(Tt−L+s v) 2 2 + λkv − v̌t−L k22 (78) s=0 where λ > 0 can be tuned relying on our confidence in the state predictor v̌t−L , and the measurements {zτ }tt−L . Given the quadratic dependence of 32 the SCADA measurements {h(vt )} and the state v, the optimization problem in (78) is non-convex. Finding the MHE-based state estimates in real time entails online solutions of dynamic optimization problems. The MHE formulation can be convexified by exploiting the semidefinite relaxation: vector v is lifted to the matrix V := vvH  0, and the m-th entry of h(vt−L+s ) for s = 0, . . . , L, is expressed as H hm (Tt−L+s v) = vH TH t−L+s Hm Tt−L+s v = Tr(Tt−L+s Hm Tt−L+s V). Upon dropping the nonconvex rank constraint rank(V) = 1, the SDP-based MHE yields V̂t−L|t := arg min V0 L X zt−L+s −Tr TH t−L+s Hm Tt−L+s V  2 +λkv− v̌t−L k22 2 s=0 which can be solved in polynomial time using off-the-shelf toolboxes. Rankone state estimates can be obtained again through eigen-decomposition or randomization. The complexity of solving the last problem is rather high in its present form on the order of Nb4.5 [46]. Therefore, developing faster solvers for the SDP-based MHE by exploiting the rich sparsity structure in {Hm } matrices is worth investigating. Decentralized and localized MHE implementations are also timely and pertinent. Devising FPP-based solvers for the MHE in (78) constitutes another research direction. 7 Discussion This chapter has reviewed some of the recent advances in PSSE. After developing the CRLB, an SDP-based solver, and its regularized counterpart were discussed. To overcome the high complexity involved, a scheme named feasible point pursuit relying on successive convex approximations was also advocated. A decentralized PSSE paradigm put forth provides the means for coping with the computationally-intensive SDP formulations, it is tailored for the interconnected nature of modern grids, while it can also afford processing PMU data in a timely fashion. A better understanding of cyber attacks and disciplined ways for decentralized bad data processing were also provided. Finally, this chapter gave a fresh perspective to state tracking under model-free and model-based scenarios. Nonetheless, there are still many technically challenging and practically pertinent grid monitoring issues to be addressed. Solving power grid data 33 processing tasks on the cloud has been a major trend to alleviate data storage, communication, and interoperability costs for system operators and utilities. Moreover, with the current focus on low- and medium-voltage distribution grids, solvers for unbalanced and multi-phase operating conditions [2] are desirable. Smart meters and synchrophasor data from distribution grids (also known as micro-PMUs [67]) call for new data processing solutions. Advances in machine learning and statistical signal processing, such as sparse and low-rank models, missing and incomplete data, tensor decompositions, deep learning, nonconvex and stochastic optimization tools, and (multi)kernel-based learning to name a few, are currently providing novel paths to grid monitoring tasks while realizing the vision of smarter energy systems. Acknowledgements G. Wang and G. B. Giannakis were supported in part by NSF grants 1423316, 1442686, 1508993, and 1509040; and by the Laboratory Directed Research and Development Program at the NREL. H. Zhu was supported in part by NSF grants 1610732 and 1653706. Appendix 2 })). Proof of Prop. 1. Consider the AGWN model (15) with  ∼ N (0, dg({σm The data likelihood function is   M Y 1 (zm − vH Hm v)2 p p(z; v) = (79) exp − 2 2 2σm 2πσm m=1 and the negative log-likelihood function denoted by f (v) = − ln p(z; x) is f (v) =  M  X 2 1  1 H 2 z − v H v + ln 2πσ . m m m 2 2σm 2 (80) m=1 The Fisher information matrix (FIM) is defined as the Hessian of the real-valued function f (v) with respect to the complex vector v ∈ CNb . Deriving the CRLB amounts to finding the Hessian of a real-valued function with respect to a complex-valued vector. Wirtinger’s calculus confirms that f (v) can be equivalently rewritten as f (v, v∗ ); see e.g., [41]. Upon introducing the conjugate coordinates [vT (v∗ )T ]T ∈ C2Nb , the Wirtinger derivatives, namely the first-order partial differential operators of functions over 34 complex domains, are given by [41] ∂f ∂f (v, v∗ ) := ∂v ∂vT ∂f ∂f (v, v∗ ) := ∂v∗ ∂(v∗ )T  ∂f ∂f ··· = ∂V1 ∂VN constant v∗ v∗   ∂f ∂f . = ··· ∗ ∂V1∗ ∂VN v constant v  constant constant These definitions follow the convention in multivariate calculus that derivatives are denoted by row vectors, and gradients by column vectors. Define for notational brevity φm (v, v∗ ) := zm − (v∗ )T Hm v for m = 1, . . . , M . Accordingly, the Wirtinger derivatives of f (v, v∗ ) in (80) are obtained as M L X X ∂f 1 ∂φm ∂f 1 ∂φm = φ and = φ 2 m ∂vT 2 m ∂(v∗ )T ∂v σm ∂v∗ σm m=1 (82) m=1 and the Wirtinger derivatives of φm (v, v∗ ) can be found likewise ∂φm ∂φm = −(Hm v)H and = −(H∗m v∗ )H . ∂vT ∂(v∗ )T (83) In the conjugate coordinate system, the complex Hessian of f (v, v∗ ) with respect to the conjugate coordinates [vT (v∗ )T ]T is defined as   Hvv Hv∗ v ∗ 2 ∗ H(v, v ) := ∇ f (v, v ) = (84) Hvv∗ Hv∗ v∗ whose blocks are given as  Hvv ∂ := ∂vT  Hvv∗ ∂ := ∂vT ∂f ∂v H ∂f ∂v∗ ,  Hv∗ v ∂f ∂v  Hv ∗ v ∗ ∂ := ∂(v∗ )T ∂f ∂v∗ H , H ∂ := ∂(v∗ )T H . Substituting (82) and (83) into the last equations and after algebraic manipulations yields Hvv = Hv ∗ v = M X m=1 M X   −2 σm Hm v(Hm v)H − φm Hm (85a) −2 σm Hm v(H∗m v∗ )H (85b) m=1 35 Hvv∗ = Hv ∗ v ∗ = M X m=1 M X −2 ∗ ∗ σm Hm v (Hm v)H (85c)   −2 σm H∗m v∗ (H∗m v∗ )H − φm H∗m . (85d) m=1 Evaluating the Hessian blocks of (85) at the true value of v, and taking the expectation with respect to , yields E[φm ] = 0. Hence, the φm -related terms in (85) disappear, and the FIM F(v, v∗ ) := E[H(v, v∗ )] simplifies to the expression in (23); see also [66]. To show that the FIM is rank-deficient, define gm := [(Hm v)H (H∗m v∗ )H ]H , PM −2 g gH . Observe now that the nonso that the FIM becomes F = m=1 σm m m T ∗ T T zero vector d(v) := [v − (v ) ] is orthogonal to gm for m = 1, . . . , M ; that is, H gm d = vH Hm v − (vH Hm v)∗ = 0. Based on the latter, it is not hard to verify that Fd = 0, which proves that the null space of F is non-empty. References [1] A. Abur and A. Gómez-Expósito, Power System State Estimation: Theory and Implementation. New York, NY: Marcel Dekker, 2004. [2] M. Bazrafshan and N. Gatsis, “Comprehensive modeling of three-phase distribution systems via the bus admittance matrix,” arXiv:1705.06782, 2017. [3] D. P. Bertsekas, Nonlinear Programming, 2nd ed. Athena Scientific, 1999. Belmont, MA: [4] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” Found. Trends Mach. Learn., vol. 3, pp. 1–122, 2010. [5] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY: Cambridge University Press, 2004. [6] M. K. Celik and A. Abur, “A robust WLAV state estimator using transformations,” IEEE Trans. Power Syst., vol. 7, no. 1, pp. 106–113, Feb. 1992. 36 [7] S. S. Chen, D. L. Donoho, Michael, and A. Saunders, “Atomic decomposition by basis pursuit,” SIAM J. Sci. Comput., vol. 20, pp. 33–61, Jul. 1998. [8] K. A. Clements, G. R. Krumpholz, and P. W. Davis, “Power system state estimation with measurement deficiency: An observability/measurement placement algorithm,” IEEE Trans. Power App. Syst., vol. 102, no. 7, pp. 2012–2020, Jul. 1983. [9] A. J. Conejo, S. de la Torre, and M. Canas, “An optimization approach to multiarea state estimation,” IEEE Trans. Power Syst., vol. 22, no. 1, pp. 213–221, Feb. 2007. [10] T. V. Cutsem and M. Ribbens-Pavella, “Critical survey of hierarchical methods for state estimation of electric power systems,” IEEE Trans. Power App. Syst., vol. 102, no. 10, pp. 3415–3424, Oct. 1983. [11] A. L. Da Silva, M. Do Coutto Filho, and J. De Queiroz, “State forecasting in electric power systems,” IEE Proc. Generat. Transm. Distrib., vol. 130, no. 5, pp. 237–244, Sep. 1983. [12] E. Dall’Anese, H. Zhu, and G. B. Giannakis, “Distributed optimal power flow for smart microgrids,” IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1464–1475, Sep. 2013. [13] J. De La Ree, V. A. Centeno, J. Thorp, and A. Phadke, “Synchronized phasor measurement applications in power systems,” IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 20–27, Jun. 2010. [14] A. S. Debs and R. E. Larson, “A dynamic estimator for tracking the state of a power system,” IEEE Trans. Power App. Syst., no. 7, pp. 1670–1678, Sep. 1970. [15] D. Duan, L. Yang, and L. L. Scharf, “Phasor state estimation from PMU measurements with bad data,” in Proc. IEEE Workshop on Comp. Adv. in Multi-Sensor Adaptive Proc., San Juan, Puerto Rico, Dec. 2011. [16] R. Ebrahimian and R. Baldick, “State estimation distributed processing,” IEEE Trans. Power Syst., vol. 15, no. 4, pp. 1240–1246, Nov. 2000. 37 [17] A. A. El-Keib, J. Nieplocha, H. Singh, and D. Maratukulam, “A decomposed state estimation technique suitable for parallel processor implementation,” IEEE Trans. Power Syst., vol. 7, no. 3, pp. 1088–1097, Aug. 1992. [18] D. M. Falcao, F. F. Wu, and L. Murphy, “Parallel and distributed state estimation,” IEEE Trans. Power Syst., vol. 10, no. 2, pp. 724–730, May 1995. [19] G. B. Giannakis, V. Kekatos, N. Gatsis, S.-J. Kim, H. Zhu, and B. Wollenberg, “Monitoring and optimization for power grids: A signal processing perspective,” IEEE Signal Process. Mag., vol. 30, no. 5, pp. 107–128, Sept. 2013. [20] G. B. Giannakis, Q. Ling, G. Mateos, I. D. Schizas, and H. Zhu, “Decentralized learning for wireless communications and networking,” Splitting Methods in Communication, Imaging, Science, and Engineering, pp. 461–497, Springer, 2016. [21] M. X. Goemans and D. P. Williamson, “Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming,” J. ACM, vol. 42, no. 6, pp. 1115–1145, Nov. 1995. [22] A. Gómez-Expósito, A. Abur, A. de la Villa Jaén, and C. Gómez-Quiles, “A multilevel state estimation paradigm for smart grids,” Proc. IEEE, vol. 99, no. 6, pp. 952–976, Jun. 2011. [23] A. Gómez-Expósito, A. de la Villa Jaén, C. Gómez-Quiles, P. Rousseaux, and T. V. Cutsem, “A taxonomy of multi-area state estimation methods,” Electr. Pow. Syst. Res., vol. 81, pp. 1060–1069, Apr. 2011. [24] R. Grone, C. R. Johnson, E. M. Sá, and H. Wolkowicz, “Positive definite completions of partial hermitian matrices,” Linear Algebra & its Appl., vol. 58, pp. 109–124, Apr. 1984. [25] S. Haykin, Adaptive Filter Theory. New York, NY: Prentice Hall, 2002. [26] S.-J. Huang and K.-R. Shih, “Dynamic-state-estimation scheme including nonlinear measurement function considerations,” IEE Proc. Generat. Transm. Distrib., vol. 149, no. 6, pp. 673–678, Nov. 2002. 38 [27] S. Iwamoto, M. Kusano, and V. H. Quintana, “Hierarchical state estimation using a fast rectangular-coordinate method,” IEEE Trans. Power Syst., vol. 4, no. 3, pp. 870–880, Aug. 1989. [28] R. A. Jabr, “Exploiting sparsity in SDP relaxations of the OPF problem,” IEEE Trans. Power Syst., vol. 27, no. 2, pp. 1138–1139, May 2012. [29] S. M. Kay, Fundamentals of Statistical Signal Processing, Vol. I: Estimation Theory. Prentice Hall, 1993. [30] V. Kekatos and G. B. Giannakis, “From sparse signals to sparse residuals for robust sensing,” IEEE Trans. Signal Process., vol. 59, no. 7, pp. 3355–3368, Jul. 2011. [31] ——, “Distributed robust power system state estimation,” IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1617–1626, May 2013. [32] V. Kekatos, G. B. Giannakis, and B. F. Wollenberg, “Optimal placement of phasor measurement units via convex relaxation,” IEEE Trans. Power Syst., vol. 27, no. 3, pp. 1521–1530, Aug. 2012. [33] V. Kekatos, E. Vlachos, D. Ampeliotis, G. B. Giannakis, and K. Berberidis, “A decentralized approach to generalized power system state estimation,” in Proc. IEEE Wkshp. on Comp. Adv. in MultiSensor Adaptive Proc., Saint Martin, Dec. 2013. [34] V. Kekatos, G. Wang, A. J. Conejo, and G. B. Giannakis, “Stochastic reactive power management in microgrids with renewables,” IEEE Trans. Power Syst., vol. 30, no. 6, pp. 3386–3395, Nov. 2015. [35] S. J. Kim, G. B. Giannakis, and K. Y. Lee, “Online optimal power flow with renewables,” in Asilomar Conf. on Signals, Syst. and Comput., Pacific Grove, CA, Nov 2014, pp. 355–360. [36] S.-J. Kim, “Online power system state estimation using alternating direction method of multipliers,” in Proc. IEEE PES Summer Meeting, Denver, CO, 2015. [37] S.-J. Kim, G. Wang, and G. B. Giannakis, “Online semidefinite programming for power system state estimation,” in Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Process., Florence, Italy, May 2014, pp. 6024–6027. 39 [38] G. N. Korres, “A distributed multiarea state estimation,” IEEE Trans. Power Syst., vol. 26, no. 1, pp. 73–84, Feb. 2011. [39] O. Kosut, L. Jia, J. Thomas, and L. Tong, “Malicious data attacks on the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658, Dec. 2011. [40] W. W. Kotiuga and M. Vidyasagar, “Bad data rejection properties of weighted least-absolute-value techniques applied to static state estimation,” IEEE Trans. Power App. Syst., no. 4, pp. 844–853, Apr. 1982. [41] K. Kreutz-Delgado, “The complex gradient operator and the CRcalculus,” arXiv:0906.4835, 2009. [42] A. Y. Lam, B. Zhang, and T. David, “Distributed algorithms for optimal power flow problem,” in Proc. IEEE Conf. on Decision and Control, Maui, HI, Dec. 2012, pp. 430–437. [43] S.-Y. Lin and C.-H. Lin, “An implementable distributed state estimator and distributed bad data processing schemes for electric power systems,” IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1277–1284, Aug. 1994. [44] T. Lipp and S. Boyd, “Variations and extension of the convex–concave procedure,” Optim. Eng., vol. 17, no. 2, pp. 263–287, Jun. 2016. [45] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Trans. Info. and System Security, vol. 14, no. 1, pp. 13:1–13:33, May 2011. [46] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20–34, May 2010. [47] R. Madani, A. Ashraphijuo, J. Lavaei, and R. Baldick, “Power system state estimation with a limited number of measurements,” in Proc. IEEE Conf. on Decision and Control, Las Vegas, NV, Dec. 2016. [48] R. Madani, J. Lavaei, and R. Baldick, “Convexification of power flow problem over arbitrary networks,” in Proc. IEEE Conf. on Decision and Control, Osaka, Japan, Dec. 2015. [49] O. L. Mangasarian and D. R. Musicant, “Robust linear and support vector regression,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 9, pp. 950–955, Sep. 2000. 40 [50] R. A. Maronna, R. D. Martin, and V. J. Yohai, Robust Statistics: Theory and Methods. Wiley, 2006. [51] O. Mehanna, K. Huang, B. Gopalakrishnan, A. Konar, and N. Sidiropoulos, “Feasible point pursuit and successive approximation of non-convex QCQPs,” vol. 22, no. 7, pp. 804–808, Nov. 2015. [52] L. Mili, M. G. Cheniae, and P. J. Rousseeuw, “Robust state estimation of electric power systems,” IEEE Trans. Circuits Syst. I, vol. 41, no. 5, pp. 349–358, May 1994. [53] A. Minot, Y. M. Lu, and N. Li, “A distributed Gauss-Newton method for power system state estimation,” IEEE Trans. Power Syst., vol. 31, no. 5, pp. 3804–3815, Sep. 2016. [54] B. Y. Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, “Cyber-physical security of a smart grid infrastructure,” Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012. [55] A. Monticelli, “Electric power system state estimation,” Proc. IEEE, vol. 88, no. 2, pp. 262–282, Feb. 2000. [56] A. Monticelli and F. F. Wu, “Network observability: Theory,” IEEE Trans. Power App. Syst., vol. 104, no. 5, pp. 1042–1048, May 1985. [57] P. M. Pardalos and S. A. Vavasis, “Quadratic programming with one negative eigenvalue is NP-hard,” J. Global Optim., vol. 1, no. 1, pp. 15–22, Mar. 1991. [58] A. G. Phadke and J. S. Thorp, Synchronized Phasor Measurements and Their Applications. New York, NY: Springer, 2008. [59] C. V. Rao, J. B. Rawlings, and D. Q. Mayne, “Constrained state estimation for nonlinear discrete-time systems: Stability and moving horizon approximations,” IEEE Trans. Autom. Contr., vol. 48, no. 2, pp. 246–258, Feb. 2003. [60] I. D. Schizas, A. Ribeiro, and G. B. Giannakis, “Consensus in ad hoc WSNs with noisy links: Part I: Distributed estimation of deterministic signals,” IEEE Trans. Signal Process., vol. 56, no. 1, pp. 350–364, Jan. 2008. [61] F. C. Schweppe, J. Wildes, and D. Rom, “Power system static state estimation: Parts I, II, and III,” IEEE Trans. Power App. Syst., vol. 89, pp. 120–135, Jan. 1970. 41 [62] S. Shalev-Shwartz, “Online learning and online convex optimization,” Found. and Trends Mach. Learning, vol. 4, no. 2, pp. 107–194, Mar. 2011. [63] P. Stoica and T. L. Marzetta, “Parameter estimation problems with singular information matrices,” IEEE Trans. Signal Process., vol. 49, no. 1, pp. 87–90, Jan. 2001. [64] Power systems test case archive. Univ. of Washington. [Online]. Available: http://www.ee.washington.edu/research/pstca/ [65] G. Valverde and V. Terzija, “Unscented Kalman filter for power system dynamic state estimation,” IEE Proc. Generat. Transm. Distrib., vol. 5, no. 1, pp. 29–37, Jan. 2011. [66] A. Van den Bos, “A Cramér-Rao lower bound for complex parameters,” IEEE Trans. Signal Process., vol. 40, no. 10, Oct. 1994. [67] A. Von Meier, D. Culler, A. McEachern, and R. Arghandeh, “Microsynchrophasors for distribution systems,” in Proc. IEEE Conf. on Innovative Smart Grid Technologies, 2014, pp. 1–5. [68] G. Wang, G. B. Giannakis, and J. Chen, “Robust and scalable power system state estimation via composite optimization,” preprint, 2017. [69] G. Wang, V. Kekatos, A. J. Conejo, and G. B. Giannakis, “Ergodic energy management leveraging resource variability in distribution grids,” IEEE Trans. Power Syst., vol. 31, no. 6, pp. 4765–4775, Nov. 2016. [70] G. Wang, A. S. Zamzam, G. B. Giannakis, and N. D. Sidiropoulos, “Power system state estimation via feasible point pursuit,” in Proc. IEEE Global Conf. on Signal and Inf. Process., Washington, D.C., Nov. 2016. [71] ——, “Power system state estimation via feasible point pursuit: Algorithms and Crmér-Rao bound,” arXiv:1203.0853, 2017. [72] G. Wang, S.-J. Kim, and G. B. Giannakis, “Moving-horizon dynamic power system state estimation using semidefinite relaxation,” in Proc. IEEE PES General Meeting, Washington, DC, Jul. 2014, pp. 1–5. [73] S. Wang, W. Gao, and A. S. Meliopoulos, “An alternative method for power system dynamic state estimation based on unscented transform,” IEEE Trans. Power Syst., vol. 27, no. 2, pp. 942–950, May 2012. 42 [74] A. J. Wood and B. F. Wollenberg, Power Generation, Operation, and Control, 2nd ed. New York, NY: Wiley & Sons, 1996. [75] L. Xie, D.-H. Choi, and S. Kar, “Cooperative distributed state estimation: Local observability relaxed,” in Proc. IEEE Power & Energy Society General Meeting, Detroit, MI, Jul. 2011. [76] W. Xu, M. Wang, J. F. Cai, and A. Tang, “Sparse error correction from nonlinear measurements with applications in bad data detection for power networks,” IEEE Trans. Signal Process., vol. 61, no. 24, pp. 6175–6187, Dec. 2013. [77] A. S. Zamzam, N. D. Sidiropoulos, and E. Dall’Anese, “Beyond relaxation and Newton-Raphson: Solving AC OPF for multi-phase systems with renewables,” IEEE Trans. Smart Grid, 2017. [78] Y. Zhang, R. Madani, and J. Lavaei, “Conic relaxations for power system state estimation with line measurements,” IEEE Trans. Control Netw. Syst., 2017 (to appear). [79] J. Zhao, M. Netto, and L. Mili, “A robust iterated extended Kalman filter for power system dynamic state estimation,” IEEE Trans. Power Syst., 2016 (to appear). [80] L. Zhao and A. Abur, “Multiarea state estimation using synchronized phasor measurements,” IEEE Trans. Power Syst., vol. 20, no. 2, pp. 611–617, May 2005. [81] H. Zhu and G. B. Giannakis, “Robust power system state estimation for the nonlinear AC flow model,” in Proc. North American Power Symposium, Urbana-Champaign, IL, Sep. 2012. [82] H. Zhu, G. B. Giannakis, and A. Cano, “Distributed in-network decoding,” IEEE Trans. Signal Process., vol. 57, no. 10, pp. 3970–3983, Oct. 2009. [83] H. Zhu and G. B. Giannakis, “Estimating the state of AC power systems using semidefinite programming,” in Proc. North American Power Symposium, Boston, MA, Aug. 2011. [84] ——, “Power system nonlinear state estimation using distributed semidefinite programming,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 6, pp. 1039–1050, Dec. 2014. 43
3
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES arXiv:1207.1910v3 [math.AG] 4 Feb 2013 ZSOLT PATAKFALVI AND KARL SCHWEDE Abstract. For a characteristic p > 0 variety X with controlled F -singularities, we state conditions which imply that a divisorial sheaf is Cohen-Macaulay or at least has depth ≥ 3 at certain points. This mirrors results of Kollár for varieties in characteristic zero. As an application, we show that relative canonical sheaves are compatible with arbitrary base change for certain families with sharply F -pure fibers. 1. Introduction In the paper [Kol11b], Kollár proved that sheaves OX (−D) satisfy strong depth conditions if D is locally Q-linearly equivalent to a divisor ∆ such that (X, ∆) is SLC or KLT. These results generalized [Ale08, Lemma 3.2], [Fuj09] and [KM98, Corollary 5.25]. Because depth conditions can be interpreted as vanishing of local cohomology, these results were described as a local version of the Kawamata-Viehweg vanishing theorem. In this paper, we obtain characteristic p > 0 analogs of the main results of [Kol11b]. This is particularly interesting because the (global) Kawamata-Viehweg vanishing theorem is false in positive characteristic [Ray78]. We replace the KLT and SLC conditions by strongly F regular and sharply F -pure singularities respectively (such characteristic p > 0 singularity classes are known as F -singularities). For the convenience of the reader, we recall that by [HW02, MS12] ◦ KLT pairs correspond philosophically to strongly F -regular pairs, and ◦ SLC pairs correspond philosophically to sharply F -pure pairs. Similar to [Kol11b], we can apply our results on depth to prove base change for relative canonical sheaves. (A special case of ) Corollary 4.13. (cf. [Kol11b, 4.3]) Let f : X −→ Y be a flat morphism of finite type with S2 , G1 equidimensional fibers to a smooth variety and let ∆ ≥ 0 be a Qdivisor on X avoiding all the codimension zero and the singular codimension one points of the fibers. Further suppose that KX + ∆ is Q-Cartier, p 6 | ind(KX + ∆) and (Xy , ∆y ) is sharply F -pure for every y ∈ Y . Then ωX/Y is flat over Y and compatible with arbitrary base change. Corollary 4.13 is hoped to be useful in constructing a moduli space for varieties of general type in positive characteristics. See [Pat10] for further explanation, and also for examples for which the above compatibility does not hold. We also remark here that ωX/Y behaves surprisingly well with respect to base-change. It obeys base-change for example when the fibers are Cohen-Macaualay [Con00, Theorem 3.6.1]. In particular, this pertains to families of normal [m] surfaces. In contrast, the higher reflexive powers, ωX/Y for m > 1, are not compatible with base change in the surface case [HK10, Section 14.A]. Similar differences between canonical and pluricanonical sheaves have been observed earlier [Kol87, page 2], [Kol90, Remark 4.4]. 2010 Mathematics Subject Classification. 13A35, 14J10, 14J17, 14F18, 13C14, 13C15. Key words and phrases. depth, Cohen-Macaulay, F -singularities, base change, relative canonical sheaf. The second author was partially supported by the NSF grant DMS #1064485. 1 2 ZSOLT PATAKFALVI AND KARL SCHWEDE The technical result on depth used to prove Corollary 4.13 is as follows. It is a characteristic p > 0 version of [Kol11b, Theorem 3(1)], also compare with [Ale08, Lemma 3.2], [Fuj09, Theorem 4.21], [AH11, Theorem 1.5] and [Kov11, Theorem 1.2, 1.5]. Theorem 3.8. (cf. [Kol11b, Theorem 3(1)]) Suppose that R is local, S2 and G1 and that 0 ≤ ∆ is an R-divisor on X = Spec R with no common components with the singular locus of X and such that (X, ∆) is sharply F -pure. Set x ∈ X to be the closed point and assume that x is not an F -pure center of (X, ∆). Suppose that 0 ≤ ∆′ ≤ ∆ is another R-divisor and that r∆′ is integral for some r > 0 relatively prime to p. Further assume that M is any rank-1 reflexive subsheaf of K(X) such that M (−r) ∼ = OX (r∆′ ) (here (·) denotes reflexive power). Then depthx M ≥ min{3, codimX x}. Another interesting depth statement, again completely analogous to a theorem of Kollár is below. In the introduction we phrase it in the language of Frobenius splittings [BK05], but in the text it is phrased slightly more generally. Theorem 3.6, Remark 3.7. (cf. [Kol11b, Theorem 3(2)]) Suppose that (R, m) is an S2 local ring with Frobenius splitting ϕ : F∗e R −→ R which is not compatibly split with m. Additionally suppose that Z is any union of compatibly ϕ-split subvarieties of X = Spec R such that no irreducible component of Z coincides with an irreducible component of X. Suppose that IZ ⊆ R is the ideal defining Z, then depthm IZ ≥ min{3, 1 + codimZ x}. The other main statement on depth we obtain, Theorem 3.1, asserts that if (X, ∆) is strongly F -regular and (pe − 1)D is an integral divisor linearly equivalent to (pe − 1)∆, then OX (−D) is Cohen-Macaulay. Compare with [Kol11b, Theorem 2]. Remark 1.1. One should also compare the above results on depth, as well as the related characteristic zero results, to [AE05, Theorem 4.8(vi)] where Aberbach and Enescu showed that the depth of an F -pure ring R is always ≥ than the dimension of the minimal F -pure center (ie, of the dimension of R modulo the splitting prime, which we know is equal to the s-dimension of [AE05] by [BST11]). Acknowledgements: The authors began working on this project at the workshop ACC for minimal log discrepancies and termination of flips held at the American Institute of Mathematics and organized by Tommaso de Fernex and Christopher Hacon. The authors would also like to thank Florian Enescu for valuable discussions as well as thank the referee, János Kollár and Sándor Kovács for many useful comments on a previous draft. 2. Preliminaries on F -singularities Notation 2.1. Throughout this paper, all schemes are Noetherian, separated, of equal characteristic p > 0 and F -finite.1 Note that any such scheme X is automatically locally excellent by [Kun76] and also has a dualizing complex by [Gab04]. In particular, we are implicitly assuming all schemes are locally excellent and possess dualizing complexes. Little will be lost to the reader if he or she considers only schemes that are essentially of finite type over a perfect field. 1Meaning the Frobenius morphism is a finite morphism. DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES 3 We remind the reader of some special divisors on non-normal schemes. Definition 2.2 (Divisors on non-normal schemes). We follow the notation of [K+92, Section 16]. For an S2 reduced local ring R, set X = Spec R. We define a W-divisor (or Weil divisor ) to be a formal sum of codimension one subsets of X whose generic points are not singular points of X. This has the same data as divisors on the regular locus of X or as rank-1 S2 submodules M of K(R) (the total ring of fractions of R) such that Mη = Rη as a subset of K(R), for every codimension 1 singular point η of X. Later in the paper, we will need to instead work with the more general notion of Weil divisorial sheaves WSh(X), rank one reflexive subsheaves of K(X) that are invertible in codimension 1. In the non-local setting, such divisors are simply formal sums of irreducible subschemes that satisfy this definition locally. We now set WDivQ (X) := WDiv(X)⊗Z Q and WDivR (X) := WDiv(X) ⊗Z R. Note we have containments: WDiv(X) ⊆ WDivQ (X) ⊆ WDivR (X). One can also form WShQ (X) := WSh(X) ⊗Z Q and WShZ(p) (X) := WShZ(p) (X) ⊗Z Z(p) similarly, but the natural maps WSh(X) − → WShZ(p) (X) − → WShQ (X) are not necessarily P injective [K+92, Section 16]. Given i ai Di = ∆ ∈ WDivR (X), we use ⌈∆⌉ to denote P ⌈a ⌉D (such roundings are not necessarily well defined for WShZ(p) (X) or WShQ (x)). i i i Finally, given D ∈ WDiv(X), we use OX (D) (or R(D)) to denote the corresponding subsheaf of K (X) (or of K(R)) in the usual way. Note that D is effective if and only if OX (D) ⊇ OX . Now we move away from divisors. Suppose that R is a ring of characteristic p > 0. Following [Sch11, Bli09], we say a Cartier subalgebra C is a graded subring of the graded ring M HomR (F∗e R, R) =: C R e≥0 where multiplication is done by Frobenius twisted composition2 such that the zeroth graded piece [C ]0 = HomR (R, R) ∼ = R. We note that even though we call C a Cartier subalgebra, it is not an R-algebra because R ∼ = [C ]0 is not necessarily central. Example 2.3 (Cartier subalgebra associated to a divisor). Given an S2 and G1 ring R, set X = Spec R and assume that 0 ≤ ∆ ∈ WDivR (X) on X (for example, if R is normal, ∆ is simply an R-divisor). We can form the Cartier subalgebra C ∆ where [C ∆ ]e := HomR (F∗e R(⌈(pe − 1)∆⌉), R) ⊆ HomR (F∗e R, R). Example 2.4 (Cartier subalgebra generated by a map). Suppose that C R is as above and ϕ ∈ [C R ]e for some e > 0. Then we can form the Cartier subalgebra Rhϕi generated by R = [C ]0 and ϕ. Explicitly, this is the direct sum R ⊕ (ϕ · (F∗e R)) ⊕ (ϕ2 · (F∗2e R)) ⊕ · · · . Now we define sharply F -pure pairs and F -pure centers. Definition 2.5 (Sharply F -pure pairs). If C is a Cartier subalgebra on R, then we say that the pair (R, C ) is sharply F -pure if there exists some ϕ ∈ [C ]e for some e ≥ 1 such that ϕ(F∗e R) = R. In particular, if (R, ∆) is a pair as in Example 2.3, then we say that (R, ∆) is sharply F -pure if the associated (R, C ∆ ) is sharply F -pure. If (R, C R ) is sharply F -pure, then we simply say that R is F -pure. Definition 2.6 (Compatible ideals and F -pure centers). If (R, C ) is a pair as above, then an ideal I ⊆ R is called C -compatible if ϕ(F∗e I) ⊆ I for all ϕ ∈ [C ]e and all e ≥ 0. In the case that C = Rhϕi, we will sometimes simply say that I is ϕ-compatible. 2If ϕ ∈ [C R ] and ψ ∈ [C R ] , then ϕ · ψ = ϕ ◦ (F e ψ). See the aforementioned sources for more details. e d ∗ 4 ZSOLT PATAKFALVI AND KARL SCHWEDE An irreducible closed set W = V (Q) ⊆ Spec R = X, for some Q ∈ Spec R, is called an F -pure center if the following two conditions hold: (a) The localization (RQ , CQ ) is sharply F -pure, and (b) For every for e ≥ 0 and ϕ ∈ [C ]e , we have ϕ(F∗e Q) ⊆ Q (in other words, if Q is C -compatible). Likewise we say that W is an F -pure center of (R, ∆) if it is an F -pure center of (R, C ∆ ) where C ∆ is associated to ∆ as in Example 2.3. We also define strongly F -regular pairs. Definition 2.7 (Strongly F -regular pairs). If R is a local ring, a pair (R, C ) is called strongly F -regular if the only proper C -compatible ideals of R are 0 and R itself. If R is not local, then we say (R, C ) is strongly F -regular if every localization is. A pair (R, ∆) is strongly F -regular if (R, C ∆ ) is strongly F -regular. Remark 2.8. Given a pair (X, ∆), all of the above definitions generalize to the non-affine setting by requiring them to hold at each stalk. The notion of Cartier subalgebras is somewhat more subtle in the non-affine setting however (but we will not need such generalities). We recall some facts about compatible ideals and F -pure centers. Lemma 2.9. Suppose that (R, C ) is a pair and I ⊆ J ⊆ R are ideals. (i) The set of C -compatible ideals are closed under sum and intersection. (ii) A prime ideal Q is C -compatible if and only if QRQ is CQ -compatible. (iii) If C ′ ⊆ C are Cartier subalgebras and I is C -compatible, then I is C ′ -compatible. (iv) Given ϕ ∈ HomR (F∗e R, R), we have ϕ(F∗e J) ⊆ J if and only if J is Rhϕi-compatible. (v) Suppose that ϕ : F∗e R −→ R is surjective. Some Q ∈ Spec R is ϕ-compatible if and only if it is ϕn -compatible where (n−1)e ϕn := ϕ ◦ (F∗e ϕ) ◦ · · · ◦ (F∗ {z | n-times ϕ) } (vi) If I is ϕ-compatible, then there exists a map ϕ/I : F∗e (R/I) −→ (R/I) such that the following diagram commutes: F∗e R ϕ  F∗e (R/I) ϕ/I // R  // (R/I). Furthermore, J ⊇ I is ϕ-compatible if and only if J/I is ϕ/I-compatible. (This statement can also be done with Cartier subalgebras, but we will not need it). (vii) (R, C ) is strongly F -regular if and only if for every c ∈ R \ {minimal primes}, there exists a ϕ ∈ [C ]e for e > 0, in fact one may take e to be any larger multiple, such that ϕ(F∗e c) = 1. Proof. (v) follows from the argument of [Sch10, Proposition 4.1]. (vii) can be found in this  generality in [Sch11, Proposition 3.23]. The rest are obvious. Our next goal is to give an example of a ϕ-compatible ideal that will be crucial in later sections. The main idea is that Frobenius maps and Frobenius splittings induce maps on local cohomology. Those induced maps can then be thought of as acting directly and explicitly on Čech classes. For the convenience of the reader not already familiar with this construction, recall that if X = Spec R and U = Spec R \ {m}, then for any coherent OX -module M , we DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES 5 have Hmi (M ) = H i−1 (U, M ) for i > 1 and also that Hm1 (M ) = H 0 (U, M )/ image(H 0 (X, M )). We can then use the Čech cohomology description of sheaf cohomology to define Hmi (M ). For a more thorough description of local cohomology by the Čech complex, see for example [BH93, Section 3.5]. We now consider Frobenius action on local cohomology. The Frobenius map R − → F∗ R → Hmi (F∗ R) ∼ yields Ψ : Hmi (R) − = Hmi (R). Given a Čech class [z] = [. . . , zj , . . . ] ∈ Hmi (R), we e e have Ψ([z]) ∈ Hmi (F∗ R). But certainly Ψ([z]) = F∗e [z]p = F∗e [. . . , zjp , . . . ] is identified with raising the entries of [z] to the pe th power. Now we do the same computation with a Frobenius splitting. Suppose that ϕ : F∗e R − →R ϕ i e i → Hm (R) induced by ϕ. is an R-linear Frobenius splitting, and so we have a map Hm (F∗ R) − Certainly ϕ(F∗e [. . . , yj , . . . ]) = [. . . , ϕ(F∗e yj ), . . . ]. But now observe that for any [z] ∈ Hmi (R) and r ∈ R we have that e e ϕ(F∗e (r · [z]p )) = ϕ(F∗e [. . . , rzjp , . . . ]) = [. . . , ϕ(F∗e r)zj , . . . ] = ϕ(F∗e r)[z]. Lemma 2.10. (cf. [EH08, Theorem 4.1]) Suppose that (R, m) is a local ring. Then AnnR Hmi (R) is compatible with every splitting3 ϕ : F∗e R −→ R of Frobenius R −→ F∗e R. Proof. We have the following composition 1 ϕ // F e R ∗ R ✤ // F e 1 ∗ // R // 1. ✤ Now suppose that r ∈ AnnR Hmi (R). Then choose [z] ∈ Hmi (R). We want to show that ϕ(F∗e r).[z] = 0. Now, it follows from the Čech cohomology description of local cohomology, and ϕ’s action on it, that e 0 = ϕ(F∗e 0) = ϕ(F∗e (r.[z]p )) = ϕ(F∗e r).[z] which completes the proof.  We also recall the following fact. We include the proof because the method will be generalized later. Lemma 2.11. If (R, C ) is strongly F -regular, then R is normal and Cohen-Macaulay. Proof. We first note that by Lemma 2.9(vii), the strong F -regularity hypothesis implies that ψ → R is an isomorphism for some there exists a Frobenius splitting ψ such that R − → F∗e R − e > 0. It then easily follows that R must be reduced since if not, the map R − → F∗e R is not injective. Normality follows since the conductor ideal is compatible with every ϕ ∈ C R by the argument of [BK05, Proposition 1.2.5]. For the Cohen-Macaulay condition, by working locally we assume that (R, m) is a local domain. By local duality [Har66, Chapter V, Theorem 6.2], q q each Hmi (R) is Matlis dual to hi−dim R ωR for some normalized dualizing complex ωR . Since an element c ∈ R annihilates a finitely generated R-module if and only if c annihilates the Matlis dual of a module, it follows that there exists 0 6= c ∈ R such that c · Hmi (R) = 0 for all i < dim R. Lemma 2.9(vii) then implies that there exists ϕ ∈ [C ]e such that the composition F e (·c) R− → F∗e R −−∗−−→ F∗e R − →R is an isomorphism. Taking local cohomology for i < dim R gives us an isomorphism: F e (·c) Hmi (R) − → Hmi (F∗e R) −−∗−−→ Hmi (F∗e R) − → Hmi (R) where the middle map is the zero map. Thus Hmi (R) = 0 which completes the proof. 3A splitting is simply a map ϕ : F e R − → R that sends F∗e 1 to 1. Splittings are necessarily surjective. ∗  6 ZSOLT PATAKFALVI AND KARL SCHWEDE We also state a generalization of [SS10, Theorem 4.3], similar computations were done in [MS12]. Lemma 2.12. Suppose that X = Spec R is S2 and G1 and sharply F -pure. Then there exists an element 0 ≤ ∆ ∈ WDivQ (X) such that (pe − 1)(KX + ∆) is Q-Cartier and (X, ∆) is sharply F -pure. Proof. A surjective map ϕ ∈ HomR (F∗e R, R) ∼ = H 0 (X, F∗e OX ((1 − pe )KX )) induces an effec4 tive Weil divisorial sheaf Γϕ by [Har94, Proposition 2.9] such that (pe − 1)KX + Γϕ ∼ 0. We would like to show that Γϕ can be identified with an element of WDiv(X). At the singular height one points η of X, OX,η is already Gorenstein. Thus we can consider the map Φη which generates HomOX,η (F∗e OX,η , OX,η ) as an F∗e OX,η -module. Set m to be the maximal ideal of OX,η and notice that m is the conductor ideal since F -pure rings are seminormal [HR76] and in particular the conductor is radical. But then Φ(F∗e m) ⊆ m by the proof of → OX,η is equal to Φ(F∗e (r · )) for [BK05, Proposition 1.2.5]. Now, we know ϕη : F∗e OX,η − some r ∈ OX,η . We want to show that r is a unit, which would prove that Γϕ is trivial at η. Since ϕη is surjective, we see that r ∈ / m and thus r is a unit. This implies that the Weil divisorial sheaf (Γϕ )η coincides with OX,η and thus Γϕ ∈ WDiv(X) as desired. Finally, set ∆ = pe1−1 Γϕ .  We conclude by recalling a well known lemma on the height of annihilators of local cohomology modules. However, because we lack a reference, we provide a proof. Lemma 2.13. Suppose that (R, m) is a local ring and suppose that M is a finitely generated R-module which is Sn in the sense5 of [BH93]. Set Yi = V AnnR (Hmi (M )) ⊆ Spec R = X. Suppose that d is the minimum over the dimensions of the components of Supp M . Then dim Yi ≤ i − n for i < d. Remark 2.14. Note Yi may not be the same as Supp Hmi (M ) since Hmi (M ) is not finitely generated. Proof. Set ωX to be a normalized dualizing complex on X (recall that all our rings are excellent and possess dualizing complexes). By local duality in the form of [Har66, Chapter q V, Theorem 6.2], it is equivalent to prove that dim Supp h−i R HomR (M, ωR ) ≤ i−n. Suppose q this is false, and thus that W ⊆ Supp h−i R HomR (M, ωR ) is an irreducible component of dimension t > i − n for some i < d. Set γ to be the generic point of W (which we also view as a prime ideal). By localizing at γ, we see that q (h−i R HomR (M, ωR ))γ = h−i R HomRγ (Mγ , ωRγ [t])) = h−i+t R HomRγ (Mγ , ωRγ )) q q q is supported at a point. The shift by [t] is necessary to keep the dualizing complexes normalized. Thus Hγi−t (Mγ ) 6= 0 by local duality again. Now, i − t < n. Also observe that dim Mγ ≥ d − t (this is why the d is necessary since we do not know what component of Supp M we will be restricting to). Since Mγ is still Sn , we see that Hγj (Mγ ) = 0 for j < min(n, dim Mγ ). But then min(n, dim Mγ ) ≥ min(n, d − t) > i − t since n > i − t and d > i. Setting j = i − t we obtain a contradiction.  4in the terminology of [K+92, Section 16] 5In other words, depth M ≥ min(n, dim M ) for all z ∈ Spec R. Note that here we use dim M not dim R . z z z z DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES 7 3. Depth and F -singularities Our goal in this section is to prove several results on the depths of sheaves on schemes with controlled F -singularities. First we prove our result for pairs (R, ∆) which are strongly F -regular, this is the simplest case. Theorem 3.1. (cf. [Kol11b, Theorem 2]) Suppose that (R, m) is local and that (X = Spec R, ∆) is strongly F -regular. Further suppose that 0 ≤ ∆′ ≤ ∆ is such that rD ∼ r∆′ for some integral divisor D and some integer r > 0 realtively prime to p. Then OX (−D) is CohenMacaulay. Proof. By possibly multiplying r with an integer, we may assume that r = pe − 1. Choose, using Lemma 2.13, 0 6= c ∈ R \ {minimal primes} such that c · Hmi (OX (−D)) = 0 for all ′ i < dim R. Note that since ∆′ ≤ ∆, C ∆ ⊆ C ∆ and then (X, ∆′ ) is strongly F -regular as well by Lemma 2.9(iii). Therefore, by Lemma 2.9(vii) there exists an e > 0 and a splitting ϕ such that the composition F e (·c) ϕ OX − → F∗e OX − → F∗e OX ((pe − 1)∆′ ) −−∗−−→ F∗e OX ((pe − 1)∆′ ) − → OX is an isomorphism. By replacing e by a multiple if necessary, we may assume that this e > 0 also satisfies the condition from the hypothesis. Twisting by OX (−D), reflexifying, and applying Hmi ( ) we obtain the following composition which is also an isomorphism. Hmi (OX (−D)) − → Hmi (F∗e OX ((pe − 1)(∆′ − D) − D)) F e (·c) −−∗−−→ Hmi (F∗e OX ((pe − 1)(∆′ − D) − D)) ϕ − → Hmi (OX (−D)) However, the map labeled F∗e (·c) is the zero map for i < dim X since Hmi (F∗e OX ((pe − 1)(∆′ − D) − D)) = Hmi (F∗e OX (−D)). Thus Hmi (OX (−D)) = 0 as desired.  Remark 3.2. If one assumes that (X, ∆) is purely F -regular (an analog of purely log terminal [Tak08]), the same result holds by the same proof. The point is that we may take c annihilating Hmi (R) and which simultaneously doesn’t vanish along the support of any component of ∆′ . Corollary 3.3. (cf. [KM98, Corollary 5.25]) If (R, m) is local and (X = Spec R, ∆) is strongly F -regular, then for every Q-Cartier integral divisor D, OX (−D) is Cohen-Macaulay. Proof. If the index of D is not divisible by p then the statement is a special case of Theorem 3.1 by setting ∆′ := 0. Hence assume that the index m of D is divisible by p. Choose then an effective divisor E linearly equivalent to D and set r := ms + 1, ∆′ := 1r E for some integer s ≫ 0. In this situation r is relatively prime to p and   1 E = r∆′ . rD = (ms + 1)D ∼ D ∼ E = r r  Furthermore, for s ≫ 0, X, ∆ + 1r E is strongly F -regular. Hence, we may apply Theorem 3.1 for ∆ replaced by ∆+ 1r E and the above choices of r, D and ∆′ . This concludes our proof.  Before moving on to the sharply F -pure pairs, we need a Lemma on the existence of certain Frobenius splittings. Lemma 3.4. Suppose that (R, C ) is any pair where C is a Cartier subalgebra on a local ring (R, m). Suppose m is not C -compatible. Then there exists some Frobenius splitting ϕ : F∗e R −→ R such that ϕ(F∗e m) = R ) m. 8 ZSOLT PATAKFALVI AND KARL SCHWEDE Proof. There obviously exists a map in [C ]e , ψ : F∗e R − → R, such that ψ(F∗e m) 6⊆ m. It follows e that ψ(F∗ m) = R. We have two cases: Case 1: Suppose that there is a unit d ∈ R \ m such that ψ(F∗e d) = u ∈ / m. Thus e e ψ(F∗e (u−p d)) = 1. Consider the map ϕ(F∗e ) = ψ(F∗e ((u−p d)· )) and notice that ϕ(F∗e 1) = 1 which shows that ϕ is a splitting. Also notice that m is not ϕ-compatible since ϕ is a unit multiple of ψ. Thus we have found our ϕ. Case 2: Since we have already handled Case 1, we may assume that ψ(F∗e d) ∈ m for all units d ∈ R. Choose c ∈ m such that ψ(F∗e c) = 1. Now then ψ(F∗e 1) ∈ m since 1 is a unit. Thus ψ(F∗e (c + 1)) = ψ(F∗e c) + ψ(F∗e 1) ∈ 1 + m 6⊆ m is a unit. But this is a contradiction since c is assumed not be a unit and so c+ 1 is a unit.  Remark 3.5. If, in addition to the hypotheses of Lemma 3.4, R is S2 and G1 , then by applying the argument of Lemma 2.12 to the splitting ϕ constructed in the proof of Lemma 3.4, we obtain a Q-divisor ∆ on X = Spec R such that ◦ (pe − 1)(KX + ∆) is Cartier. ◦ (X, ∆) is sharply F -pure. ◦ x = V (m) is not an F -pure center of (X, ∆). The second two statements follow since ϕ ∈ [C ∆ ]e . Theorem 3.6. (cf. [Kol11b, Theorem 3(2)]) Suppose that (R, m) is a local S2 -ring, and C is a Cartier-subalgebra on R such that (R, C ) is sharply F -pure and V (m) is not an F -pure center. Additionally suppose that Z ( X = Spec R is any union of F -pure centers of (R, C ). We also assume that Z and X have no common irreducible components. If IZ is the (radical) ideal defining Z, then depthm IZ ≥ min{3, 1 + codimZ x}. → R Proof. Since shrinking C is harmless, we set C = Rhϕi for some splitting ϕ : F∗e R − which by Lemma 3.4 is not compatible with the origin V (m). Indeed, by Lemma 2.9(iii) we can only increase the number of centers when restricting a Cartier subalgebra. We have the long exact sequence: · · · Hm1 (IZ ) − → Hm1 (R) − → Hm1 (R/IZ ) − → Hm2 (IZ ) − → Hm2 (R) − → Hm2 (R/IZ ) − → Hm3 (IZ ) − → ··· and recall we are trying to show that Hmi (IZ ) = 0 for i < min{3, 1 + codimZ x}. Since R is S2 , Hm1 (R) = Hm0 (R) = 0. Since Z 6= V (m) and Z is reduced, Hm0 (OZ ) = 0 and so Hm1 (IZ ) = 0. Thus depthm IZ ≥ 2. It is now sufficient to prove the case when codimZ x ≥ 2. This implies that dim X ≥ 3 (since Z and X have no common components). Furthermore, we can assume that every component of Z has dimension at least 2. Indeed, suppose that Z1 is an irreducible component of Z such that dim Z1 = 1. If Z2 is the union of the other components of Z and Z2 6= ∅, then Z1 ∩ Z2 = x (for dimension reasons and since we working in a local ring). But this implies that x is an F -pure center since intersections of F -pure centers are unions of F -pure centers by Lemma 2.9(i). Thus we can assume that Z1 = Z is 1-dimensional. But then codimZ x = 1, which contradictions our assumption. By Lemma 2.10, we know that AnnR (Hm2 (R)) is compatible with p (R, C ) = (R, Rhϕi). 2 However, if Hm (R) 6= 0, then since R is S2 and of dimension ≥ 3, AnnR (Hm2 (R)) = m by Lemma 2.13. But AnnR (Hm2 (R)) is radical (since C is sharply F -pure) so AnnR (Hm2 (R)) = m. But V (m) is not an F -pure center, this is a contradiction. We conclude that Hm2 (R) = 0. Now we come to Hm1 (R/IZ ). Again, since R/IZ is reduced, R/IZ is S1. Furthermore, since Z has no 1-dimensional components we can apply Lemma 2.13 to conclude that AnnR Hm1 (R/IZ ) can either be m-primary or R. Suppose it is m-primary. Since ϕ|Z is still a splitting, it follows that AnnR/IZ Hm1 (R/IZ ) is ϕ|Z -compatible and also radical and so equal to m/IZ . But then DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES 9 m is ϕ-compatible by basic facts about Frobenius splitting or by Lemma 2.9(vi). We conclude that Hm1 (R/IZ ) = 0. This forces Hm2 (IZ ) to be zero and completes the proof.  Remark 3.7. Another way to state a special case of Theorem 3.6 using the language of Frobenius splittings is as follows: Suppose that (R, m) is an S2 local ring with Frobenius splitting ϕ : F∗e R −→ R which is not compatibly split with m. Additionally suppose that Z is any union of compatibly split subvarieties of X = Spec R such that no irreducible component of Z coincides with an irreducible component of X. Suppose that IZ ⊆ R is the ideal defining Z, then depthm IZ ≥ min{3, 1 + codimZ x}. Now we come to our main technical result on depth. It is a characteristic p > 0 version of [Kol11b, Theorem 3(1)] but also compare with [Ale08, Lemma 3.2], [Fuj09, Theorem 4.21], [AH11, Theorem 1.5] and [Kov11, Theorem 1.2, 1.5]. Theorem 3.8. (cf. [Kol11b, Theorem 3(1)]) Suppose that R is local, S2 and G1 , X = Spec R and that 0 ≤ ∆ ∈ WDivR (X) is such that (R, ∆) is sharply F -pure. Set x ∈ X to be the closed point and assume that x is not an F -pure center of (R, ∆). Suppose that 0 ≤ ∆′ ≤ ∆ is another element of WDivR (X) and that r∆′ is integral for some r > 0 relatively prime to p. Further assume that M is any rank-1 (along each component of X) reflexive coherent subsheaf of K(X) such that M (−r) ∼ = OX (r∆′ ) (here (·) denotes reflexive power).6 Then depthx M ≥ min{3, codimX x} = min{3, dim R}. Proof. First observe that it is harmless to assume that dim R ≥ 3 since otherwise the statement is trivial since M is reflexive and thus S2 by [Har94, Theorem 1.9]. We may also assume that M ⊆ OX is an ideal sheaf since we are working locally. We thus identify M with an ideal of R also denoted by M . Finally, by replacing r by a power if necessary, we may assume that r = pe − 1 for some e > 0. Using Lemma 3.4, we can find ϕ a splitting, not compatible with m, making the following composition an isomorphism: ϕ OX − → F∗e OX ֒→ F∗e OX ((pe − 1)∆′ ) ֒→ F∗e OX (⌈(pe − 1)∆⌉) − → OX . Twisting by M and reflexifying (which we denote by ∗∗ ), we obtain M e − → F∗e (M (p −1) ⊗ M )∗∗ e ֒→ F∗e (OX ((pe − 1)∆′ ) ⊗ M (p −1) ⊗ M )∗∗ e ֒→ F∗e (OX (⌈(pe − 1)∆⌉) ⊗ M (p −1) ⊗ M )∗∗ ϕ −−M → M. Using the fact that (OX ((pe − 1)∆′ ) ⊗ M (p e −1) )∗∗ ∼ = OX , we have a composition M− → F∗e M − →M that is an isomorphism (note the first map is not the usual inclusion of ideal sheaves via Frobenius). Certainly Hm1 (M ) = 0 since M is reflexive and thus S2 by [Har94, Theorem 1.9]. We now study Hm2 (M ). Since M is S2 , it follows that either AnnR Hm2 (M ) is equal to R or it is mprimary by Lemma 2.13. Since we have an injection Hm2 (M ) − → Hm2 (F∗e M ), it follows that e 2 2 p AnnR Hm (M ) is at the very least radical (since if r kills Hm (M ), so does r). In particular, if AnnR Hm2 (M ) 6= R, then it must be m. 6Note that it is also common to use the notation confused with Frobenius power. [·] . We do not use that notation since it might be 10 ZSOLT PATAKFALVI AND KARL SCHWEDE Fix [z] ∈ Hm2 (M ), and recall that we are considering M as an ideal. If zj ∈ Γ(U, M )7, then since ∆′ ≥ 0 we have e e zjp ∈ Γ(U, M (p ) ) ⊆ Γ U, (OX ((pe − 1)∆′ ) ⊗ M (p e −1)  ⊗ M )∗∗ . Thus we have a class e [F∗e z p ] ∈ Hm2 F∗e (OX ((pe − 1)∆′ ) ⊗ M (p e −1)  ⊗ M )∗∗ . e Now, when we apply ϕM to this class, it is just applied component-wise. Thus ϕM ([F∗e z p ]) = e [z]. For any r ∈ m, it follows that ϕM ((F∗e r).[F∗e z p ]) = ϕ(F∗e r).[z]. In particular, if an e arbitrary F∗e r ∈ F∗e m annihilates all classes [y] ∈ Hm2 (F∗e (OX ((pe − 1)∆′ ) ⊗ M (p −1) ⊗ M )∗∗ ) ∼ = Hm2 (F∗e M ), then ϕ(F∗e r) also annihilates all such [z] ∈ Hm2 (M ). This proves that m is ϕ-compatible, a contradiction.  4. Applications Here we list the most important corollaries of the results of Section 3. The characteristic zero analog of many of them are already mentioned in [Kol11b]. We still state them here for the sake of completeness and we give a full proof of our main motivation, the compatibility of the relative canonical sheaf with base change. In Section 4.A some lemmas are gathered while in Section 4.B the promised corollaries are presented. 4.A. Auxilliary results. In this section, we prove a series of lemmas culminating with a base change statement for relative canonical sheaves for families with sharply F -pure fibers Lemma 4.7. 4.A.1. Basic lemmas on depth and relative canonical sheaves. We begin with a short section where we make note of some simple results on depth and relative canonical sheaves that we will use. Fact 4.1. [BH93, Theorem 1.2.5] Let F be a coherent sheaf on a Noetherian scheme X, H a Cartier divisor on X containing a point P , such that the local equation of H at P is not a zero divisor of FP (in other words, it is a regular element for Fp ). Then (a) depth FP ≥ d ⇔ depth(F |H )P ≥ d − 1, (b) depth FP ≥ min{d, dim FP } ⇔ depth(F |H )P ≥ min{d − 1, dim(F |H )P }. Lemma 4.2. If f : X −→ Y is a morphism of Noetherian schemes, F 6= 0 is a coherent sheaf on X flat over Y , such that F |Xy is Sd for every y ∈ Y (i.e., F is relatively Sd over Y ) and G 6= 0 is an Sd coherent sheaf on Y , then F ⊗ f ∗ G is Sd as well. 7Here U = X \ {x}, and local cohomology classes are treated as Čech classes on U as explained earlier. DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES 11 Proof. Fix an arbitrary P ∈ X and set Q := f (P ) and F := XQ . Then depthOX,P (F ⊗ f ∗ G )P = depthOF,P (F |F )P + depthOY,Q GQ | {z } F is flat over Y & [Gro65, Proposition 6.3.1]  ≥ min d, dimOF,P (F |F )P {z | F |F is Sd  + depthOY,Q GQ } = min d + depthOY,Q GQ , dimOF,P (F |F )P + depthOY,Q GQ  ≥ min d + depthOY,Q GQ , dimOF,P (F |F )P + min{d, dimOY,Q GQ } | {z } G is Sd  = min d + depthOY,Q GQ , min{dimOF,P (F |F )P + d, dimOF,P (F |F )P + dimOY,Q GQ }  = min d + depthOY,Q GQ , min{dimOF,P (F |F )P + d, dimOX,P (F ⊗ f ∗ G )P } | {z } F is flat over Y and [Gro65, Corollaire 6.1.2]  ≥ min d + depthOY,Q GQ , min{d, dimOX,P (F ⊗ f ∗ G )P }  ≥ min d, dimOX,P (F ⊗ f ∗ G )P .  Lemma 4.3. If f : X −→ Y is a flat morphism of finite type to a Gorenstein scheme, then q q ωX/Y and ωX [− dim Y ] are locally isomorphic. In particular if X is relatively Gorenstein over Y , then it is Gorenstein, and ωX/Y and ωX are locally isomorphic over Y . Proof. Locally on Y the following isomorphisms hold. q q q ωX/Y = f ! OY ∼ = ωX [− dim Y ] = f ! ωY ∼ = f ! ωY [− dim Y ] ∼  Before continuing, let us remind ourselves of how F -adjunction works and how it can allow us to restrict divisors. 4.A.2. Restricting divisors by F -adjunction: the F -different. Suppose that ∆ ≥ 0 is a Qdivisor on an S2 and G1 variety X and that (pe − 1)(KX + ∆) is Cartier. In fact, everything we say even holds more generally if ∆ ≥ 0 is a Z(p) -Weil divisorial sheaf, which is intuitively something like a Weil divisor having components also in the singular locus8. Further suppose that D is a reduced Cartier divisor on X that is itself S2 and G1 and which has no common components with ∆. We now explain how we can construct a canonical Z(p) -Weil divisorial sheaf (not necessarily a Z(p) -Weil divisor) which we call Diff F,D ∆ on D. Here the subindex F means that this is the F -singularity counterpart of the usual different known from minimal model program theory. However, contrary to the usual different, the construction of Dif fF,D ∆ goes through without any further assumption requiring that ∆ is Q-Cartier at certain points. Without loss of generality we can assume that X = Spec R and that R is a local ring and that D = V (f ). The fact that the divisor (pe − 1)(KX + ∆) is Cartier implies that HomR (F∗e R((pe − 1)∆), R) is a free F∗e R-module. Choose a generator of this module ϕ, which 8See [K+92] and [MS12] for definitions, in the latter source these are called Z -AC-divisors. (p) 12 ZSOLT PATAKFALVI AND KARL SCHWEDE we can also view as an element of HomR (F∗e R, R) since ∆ is effective. Now define a new map e e ψ : F∗e R − → R by the rule ψ(F∗e ) = ϕ(F∗e (f p −1 · )). Certainly ψ(F∗e hf i) = ϕ(F∗e hf p i) ⊆ hf i and thus ψ induces a map ψ ∈ HomR/hf i (F∗e R/hf i, R/hf i). Note that for every height one prime η containing f ∈ R, i.e., a minimal associated prime of D, we have that ∆η = 0 (since ∆ and D have no common components). Furthermore, Rη is regular (since Rη /hf i is reduced and zero dimensional and hence regular). It follows from inspection that ψ is non-zero at every such η. By [MS12, Theorem 2.4], it follows that ψ induces an effective Z(p) -Weil divisorial sheaf on D. It is straightforward to verify that ∆|D is independent of the choice of e and ϕ and so: Definition 4.4. We use Diff F,D ∆ to denote the effective Z(p) -Weil divisorial sheaf described above which coincides with ψ. We also observe: Observation 4.5 (F -adjunction [Sch09]). Notice now additionally that ψ (corresponding to Diff F,D ∆) is surjective if and only if ψ (corresponding to ∆+D) is surjective. In other words, (X, ∆ + D) is sharply F -pure near D if and only if (D, Diff F,D ∆) is sharply F -pure. It will be useful for us to note that if (D, Diff F,D ∆) is sharply F -pure, then Diff F,D ∆ is in fact an honest Z(p) -Weil divisor and not just a Z(p) -divisorial sheaf. Suppose not, then the Weil divisorial sheaf (pe − 1)(Diff F,D ∆) must properly contain OD , even at some generic point of the non-normal locus. A contradiction can then be obtained from the fact that the conductor is already compatible with every ϕ ∈ C R (this last fact follows from the argument of [BK05, Proposition 1.2.5]). The above introduced F -different Diff F,D ∆ is equal to ∆|D in most cases when the latter is defined. Lemma 4.6. With the notation above, suppose additionally that ∆ is Z(p) -Cartier at all of the height-two primes primes of R containing f (the codimension 2 points of X that are contained inside D). Then Diff F,D ∆ coincides with the restriction ∆|D of ∆ to D. Proof. At each of those codimension 2 points q ∈ Spec R, Rq is already Gorenstein (since R/hf i is G1 and so Rq /hf i is Gorenstein). It is enough to prove the result at each such q, so fix one such q. Further choose e > 0 as above and also sufficiently divisible such that (pe − 1)D is Cartier at q. We can thus write (pe − 1)∆ = divSpec Rq (g) for some g ∈ Rq . Since Rq is Gorenstein, we can choose Φ ∈ HomRq (F∗e Rq , Rq ) generating the set as an F∗e Rq e → Rq defined by the rule Ψ(F∗e ) = Φ(F∗e (f p −1 · )). module. Consider the map Ψ : F∗e Rq − Certainly Ψ restricts to a map Ψ ∈ HomRq /hf i (F∗e (Rq /hf i), Rq /hf i) as above. Furthermore, Ψ generates the F∗e (Rq /hf i)-module HomRq /hf i (F∗e (Rq /hf i), Rq /hf i) by the diagrams in [Sch09, Proof of Proposition 7.2]. It follows that ψ = (F∗e g) · Ψ restricts to ϕ = (F∗e g) · Ψ and hence corresponds to the naive restriction ∆|W . This proves the lemma.  4.A.3. The relative canonical sheaf. We apply the above ideas on F -different to the following. It is the inductional step in the proof of Corollary 4.13. Lemma 4.7. Let f : X −→ Y be a flat morphism of finite type with S2 , G1 equidimensional fibers to a smooth variety9 Y and ∆ ∈ WDivQ (X), such that KX + ∆ is Q-Cartier and p 6 | ind(KX + ∆). Assume also that Z ⊆ Y is a smooth Cartier divisor such that for W := X ×Y Z, ∆ does not contain any component of W and (W, Diff F,W ∆) is sharply F -pure.10 Then ωX/Y |W ∼ = ωW/Z . 9Variety here means a separated, integral scheme of finite type over an algebraically closed base-field. 10The fact that (W, Diff F,W ∆) is sharply F -pure implies that Diff F,W ∆ is a Z(p) -divisor and not simply a Z(p) -Weil divisorial sheaf. DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES 13 Proof. By Lemma 4.2, both X and W are S2 . Similarly, both are G1 by Lemma 4.3. By F adjunction Observation 4.5, cf. [Sch09, Main Theorem, Proposition 7.2, Remark 7.3], (X, ∆+ W ) is sharply F -pure in a neighborhood of W . Hence, so is (X, ∆). We now claim: Claim 4.8. No F -pure center of (X, ∆) is contained in W . Proof of claim. Suppose that Z ⊆ X was an F -pure center of (X, ∆) contained in W . Let η denote the generic point of Z and now we work in R = OX,η with maximal ideal m → OX,η of [C ∆ ]e , we corresponding to η. For any element ϕ : F∗e OX,η ⊆ F∗e OX,η (⌈(pe −1)∆⌉) − e notice that ϕ(F∗ m) ⊆ m since Z is an F -pure center. Choose f ∈ m to be the defining equation e of the Cartier divisor W in OX,η . It follows from construction that (F∗e f p −1 ) · [C ∆ ]e = e [C ∆+W ]e . In other words, for any ψ ∈ [C ∆+W ]e , we can write ψ(F∗e ) = ϕ(F∗e (f p −1 · )) e for some ϕ ∈ [C ∆ ]e . With this notation, for any r ∈ R we have ψ(F∗e r) = ϕ(F∗e (f p −1 r)) ∈ ϕ(F∗e m) ⊆ m. This proves that (X, ∆ + W ) is not sharply F -pure at η, the generic point of Z. But we assumed that (X, ∆ + W ) was sharply F -pure, a contradiction which proves the claim.  We return to the proof of Lemma 4.7. By Theorem 3.8 then, for every x ∈ W , depthx ωX ≥ min{3, codimX x} = min{3, dim ωX,x }. However, by Lemma 4.3, ωX and ωX/Y are isomorphic locally, and then in the above inequality ωX can be replaced by ωX/Y . Then by Fact 4.1, ωX/Y |W is S2 . To be precise, to apply Fact 4.1, one needs to prove a priori that the local equation of W is not a zero-divisor of ωX/Y . For this it is enough to show that ωX/Y is S1 , which follows using again that locally ωX/Y and ωX are isomorphic and that ωX is S2 by [KM98, Corollary 5.69]. Therefore ωX/Y |W is S2 indeed. However, so is ωW/Z by using [KM98, Corollary 5.69] again. Furthermore, ωX/Y |W and ωW/Z are isomorphic on the relative Gorenstein locus, since the relative canonical sheaf is compatible with base-change for Gorenstein morphisms [Con00, Theorem 3.6.1]. Therefore  [Har94, Theorems 1.9 and 1.12] yields the statement of the lemma. The next lemma is used in Corollary 4.15. It allows us to cite [Kol11a]. Lemma 4.9. Suppose that Y is a scheme of finite type over an algebraically closed field. If f : X −→ Y is a projective, flat, relatively S2 and G1 , equidimensional morphism, then ωX/Y is reflexive. Proof. According to [HK04, Corollary 3.7], it is enough to exhibit an open set U contained in the relative Gorenstein locus, such that (a) for Z := X \ U , codimXy Zy ≥ 2 for every y ∈ Y and (b) for the inclusion of open set j : U ֒→ X, the natural homomorphism ωX/Y − → j∗ (ωX/Y |U ) is an isomorphism. Let W be the non-relatively Gorenstein locus. Fix a finite surjective morphism π : X − → PnY over Y , after possibly shrinking Y (cf. [Kol11b, proof of Corollary 24]). Set then Z := π −1 (π(W )), V := PnY \ π(W ). Let q : V − → PnY be the natural inclusion. With the above choices, codimXy Zy ≥ 2 is satisfied for all y ∈ Y . For the other condition, notice that it is enough to prove that the natural homomorphism π∗ ωX/Y − → π∗ j∗ (ωX/Y |U ) is an isomorphism. However π∗ j∗ (ωX/Y |U ) ∼ = q∗ ((π∗ ωX/Y )|V ) ∼ = q∗ Hom V ((π∗ OX )|V , ωV /Y ) {z } | Grothendieck duality ∼ = Hom X (π∗ OX , q∗ ωV /Y ) ∼ = | {z } adjoint functors Hom X (π∗ OX , ωPn /Y ) | {z Y } [HK04, Proposition 3.5] using that ωPn /Y is flat and relatively S2 Y ∼ = π∗ ωX/Y , 14 ZSOLT PATAKFALVI AND KARL SCHWEDE and the composition of the above isomorphisms is the natural homomorphism π∗ ωX/Y − → π∗ j∗ (ωX/Y |U ).  4.B. Consequences. We begin with a simple consequence on the depth of OX and ωX . Corollary 4.10. (cf. [Ale08, Lemma 3.2], [Fuj09, Theorem 4.21], [Kol11b, 4.1, 4.2, 4.3], [AH11, Theorem 1.5], [Kov11, Theorem 1.2, 1.5]) Suppose that X = Spec R is S2 and G1 . If X is F -pure and x ∈ X is not an F -pure center of X, then depthx OX ≥ {3, codimX x} and depthx ωX ≥ min{3, codimX x}. Proof. We may assume that X = Spec R for a local ring (R, m) with x = V (m). Since X is S2 and G1 , by using Remark 3.5, we can assume that there exists some ∆ ≥ 0 such that (pe − 1)(KX + ∆) is Cartier, such that (X, ∆) is sharply F -pure and such that x is not an F -pure center of (X, ∆). Now the second statement follows from Theorem 3.8 by setting M = OX (KX ) and setting ∆′ = ∆. The first statement also follows from Theorem 3.8 by setting M = OX and ∆′ = 0.  Question 4.11. Suppose that (R, m) is F -injective. If m is not an annihilator of any F -stable submodule of Hmi (R), does that imply any depth conditions on R or ωR ? To prove our main corollary, we need to introduce a generalization of Diff F,D ∆ to the case when D has higher codimension. We focus only on our case of interest, that is, when D is the fiber over a smooth base. Definition 4.12. Let f : X − → Y be a flat morphism of finite type with S2 , G1 equidimensional fibers. Further suppose that Y is a smooth variety, and ∆ ∈ WDivQ (X) is such that ∆ does not contain any component of any fiber. Fix a point y ∈ Y . Working locally, we may assume that Y = Spec A and X = Spec R for local rings (A, n) and (R, m). Further assume that n = hf1 , . . . , fn i is regular system of generators with Yi = V (f1 , . . . , fi ) regular. Then, let ∆i := Diff F,Yi ∆i−1 and define then Diff F,Xy ∆ := ∆n . The only question is whether this construction of Diff F,Xy ∆ is independent of the choice of fi . Following the method of F -adjunction, multiplying by each fi successively, we take a map corresponding to ∆ and ϕ : F∗e R − → R and obtain another map ψf : F∗e R − → R defined by e e e the rule ψf (F∗ ) = ϕ(F∗ ((f1 · · · fn )p −1 · )). We then restrict this map to Xy by modding out by n and so obtain ψ f . Choosing different Yi ’s is simply choosing a different set of generators {g1 , . . . , gn } for n which yields ψ g . To complete the proof of the claim, it is sufficient to show that these maps e differ only by multiplication by a unit. We use n[p ] to denote the ideal generated by the pe th e e e e e powers of the generators of n. Since n[p ] : n = h(f1 · · · fn )p −1 i+n[p ] = h(g1 · · · gn )p −1 i+n[p ] , e e see for example [Fed83, Proposition 2.1], it follows that (f1 · · · fn )p −1 = u(g1 · · · gn )p −1 + P e vi hpi for some unit u ∈ A, elements vi ∈ A and hi ∈ n. But now we see that ψ f = (F∗e u)·ψ g e since any multiple of hpi will be sent into nR. This completes the proof. Corollary 4.13. (cf. [Kol11b, 4.3]) Let f : X −→ Y be a flat morphism of finite type with S2 , G1 , equidimensional fibers to a smooth variety and let ∆ ∈ WDivQ (X) be such that it does not contain any component of any fiber. Additionally assume that KX + ∆ is Q-Cartier, p 6 | ind(KX + ∆) and (Xy , Diff F,Xy ∆) is sharply F -pure for every y ∈ Y . Then ωX/Y is flat over Y and compatible with arbitrary base change. Proof. We claim that ωX/Y is flat over Y and relatively S2 . By [BHPS12, Lemma 2.13], flatness follows as soon as we prove that the restriction of ωX/Y to every fiber is S1 . On DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES 15 the other hand relatively S2 means the stronger condition that the above restrictions are S2 . Therefore to show the claim, it is enough to prove that ωX/Y |Xy is S2 for every y ∈ Y . By [KM98, Corollary 5.69], ωXy is S2 and hence, it is enough to show that ωX/Y |Xy ∼ = ωXy locally around every point x ∈ Xy . We thus replace both X and Y by Spec OX,x and Spec OY,y , respectively. Therefore, we may assume that there is a sequence of smooth subvarieties: Y = Y0 ⊇ Y1 ⊇ · · · ⊇ Ym−1 ⊇ Ym = {y}, such that Yi−1 is a Cartier divisor in Yi . Set Xi := XYi and ∆i := Diff F,Xi ∆i−1 with ∆0 = ∆. Note that then Deltam = Diff F,Xy ∆. By applying Observation 4.5 (backwards) inductively and possibly further restricting X around x, one obtains that (Xi , ∆i + Xi−1 ) and hence (Xi , ∆i ) is sharply F -pure for all i (in fact, this also implies all the Z(p) -Weil divisorial sheaves ∆i are honest divisors). Finally, applying Lemma 4.7 inductively again yields that ωXi /Yi |Xi−1 ∼ = ωXi−1 /Yi−1 for all i, and consequently ωX/Y |Xy ∼ = ωXy . This finishes the proof of our claim. By our claim and [HK04, Corollary 3.8] ωX/Y and all its pullbacks are reflexive. Hence, by restricting to the relatively Cohen-Macaulay locus (whose complement has codimension ≥ 2) and using [HK04, Proposition 3.6], for any morphism Z − → Y , ωXZ /Z ∼  = (ωX/Y )Z . Remark 4.14. By Lemma 4.6, the appearance of Diff F,Xy ∆ can be replaced by an actual “geometric” restriction, if we assume the following: (1) for each y ∈ Y , there is some r > 0 relatively prime to p such that r∆ is Cartier at the codimension 1 points of the fiber Xy ⊆ X. In particular, this is satisfied if Supp ∆ does not contain the singular codimension one points of the fibers. Indeed, let ξ be a codimesnion 1 point of a fiber Xy . If ξ is in the singular locus of Xy , then ξ 6∈ Supp ∆ and hence ∆ is Cartier at ξ. Otherwise, X is smooth around ξ, and hence KX is Cartier at ξ. In particular then by p 6 | ind(KX + ∆), we obtain that ∆ is Z(p) Cartier at ξ. In either cases ∆ satisfies (1), and therefore in the special case of Corollary 4.13 stated in Section 1, the use of ordinary restriction of ∆ was legitimate. When f is projective, the compatibility of Corollary 4.13 follows for arbitrary reduced base by an important result of Kollár [Kol11a]. Corollary 4.15. Let f : X −→ Y be a flat projective morphism with S2 , G1 equidimensional fibers. Further suppose that Y is a reduced, separated scheme of finite type over an algebraically closed field, and ∆ a Q-Weil-divisor that avoids all the codimension zero and the singular codimension one points of the fibers. Additionally assume that there is a p 6 | N > 0, such [N ] that N ∆ is Cartier in relative codimension one and ωX/Y (N ∆) 11 is a line bundle and that (Xy , ∆y ) is sharply F -pure for every y ∈ Y . Then ωX/Y is flat and compatible with arbitrary base change. Proof. First, we need some preparation about pulling back ∆. Suppose τ : Y ′ − → Y is a ′ ′ ′ ′ ′ ′ morphism and set X := X ×Y Y , π : X − → X, and f : X − → Y the induced morphisms. Then a natural pullback ∆′ of ∆ can be defined as follows. Let U ⊆ X be the open set where f is Gorenstein and ∆ is Q-Cartier. Then, pull ∆|U back to π −1 U , and finally extend it uniquely over X ′ . This extension is unique, since codimX ′ X ′ \ π −1 U ≥ 2. We claim that (2) [N ] [N ] π ∗ ωX/Y (N ∆) ∼ = ωX ′ /Y ′ (N ∆′ ). 11 Let U be the intersection of the relative Gorenstein locus and the locus where N ∆ is Cartier. Set [N] N ι : U −→ X for the natural inclusion. The sheaf ωX/Y (N ∆) is the reflexive hull of ωU/Y (N ∆|U ), i.e. the N unique reflexive sheaf that restricts on U to the above sheaf. It can be obtained as ι∗ (ωU/Y (N ∆|U )). Indeed, N ι∗ (ωU/Y (N ∆|U )) is reflexive by [HK04, Corollary 3.7] and it is unique by [HK04, Proposition 3.6]. 16 ZSOLT PATAKFALVI AND KARL SCHWEDE [N ] [N ] Indeed, notice that by construction π ∗ ωX/Y (N ∆) and ωX ′ /Y ′ (N ∆′ ) agree over π −1 U , that [N ] is, in relative codimension one. Notice also that since ωX/Y (N ∆) is assumed to be a line [N ] [N ] bundle, so is π ∗ ωX/Y (N ∆), and therefore π ∗ ωX/Y (N ∆) is reflexive. On the other hand, since [N ] ωX ′ /Y ′ (N ∆′ ) is defined as a pushforward of a line bundle from relative codimension one, it is reflexive by [HK04, Corollary 3.7]. Therefore by [HK04, Proposition 3.6], (2) holds. In [N ] particular, ωX ′ /Y ′ (N ∆′ ) is a line bundle. The main consequence of the previous paragraph, is that the conditions of the corollary are invariant under pullback to another reduced, separated scheme Y ′ of finite type over k. That is, X ′ , f ′ and ∆′ defined above satisfy all the assumptions of the corollary. Let us turn now to the actual proof of the corollary. First, we may assume that Y is connected. Second, according to [Kol11a, Corollary 24] and Lemma 4.9, there is a locally closed decomposition ∐Yi − → Y , such that if T − → Y , then ωXT /T is flat and commutes with base-change if and only if T − → Y factors through some Yi − → Y . Now, for every irreducible component Y ′ of Y , →S there is a regular alteration S − → Y ′ [dJ96, Thorem 4.1]. By the above discussion XS − satisfies the assumptions of the corollary, and hence also of Corollary 4.13. Therefore, ωXS /S is flat and compatible with arbitrary base-change. Hence S − → Y factors through one of the Yi . In particular, since the image of S − → Y is the component Y ′ , Y ′ ⊆ Yi . That is, every irreducible component of Y is contained in one Yi . However, Y is connected, therefore all irreducible components of Y are contained in the same Yi , and hence by the reducedness of Y , Yi = Y .  Remark 4.16. In the case of dim Y = 1, if instead of assuming that Xy is sharply F -pure, one assumes that (X, Xy ) is F -pure for all y ∈ Y , the p 6 | ind(KX + ∆) assumption can be dropped from the above corollaries using the trick of Lemma 2.12. Question 4.17. Does the compatibility of the relative canonical sheaf with base change stated in Corollary 4.13 hold for singular Y (with the adequate modification in the setup as in Corollary 4.15)? From the modular point of view, especially interesting would be the case of non-reduced Y . This case is open even in the projective case. Remark 4.18. It should be noted that the characteristic zero analogue of Corollary 4.13 is known if f is projective and Y is arbitrary [KK10, Theorem 7.9]. That is, the answer to the characteristic zero analogue of Question 4.17 is positive when f is projective. Question 4.19. Can one replace sharply F -pure by log-canonical (still assuming positive characteristic) in the statement of Corollary 4.13? This would also be important from the modular point of view, since sharply F -pure varieties can be deformed to log-canonical but not sharply F -pure varieties. Question 4.20. Can one remove the divisibility by p condition from the statement of Corollary 4.13? Remark 4.21. [Kol11b, 4.10] The sheaf OX (−D) in Theorem 3.1 and Theorem 3.8 cannot be replaced by OX (D) as shown in [Kol11b]. We refer to [Kol11b] for the actual example. References [AE05] I. M. Aberbach and F. Enescu: The structure of F -pure rings, Math. Z. 250 (2005), no. 4, 791–806. MR2180375 [Ale08] V. Alexeev: Limits of stable pairs, Pure Appl. Math. Q. 4 (2008), no. 3, Special Issue: In honor of Fedor Bogomolov. Part 2, 767–783. 2435844 (2009j:14020) [AH11] V. Alexeev and C. Hacon: Non-rational centers of log canonical singularities, arXiv:1109.4164. [BHPS12] B. Bhatt, W. Ho, Zs. Patakfalvi, and C. Schnell: Moduli of products of stable varieties, arXiv:1206.0438. DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES [Bli09] [BST11] [BK05] 17 M. Blickle: Test ideals via algebras of p−e -liner maps, arXiv:0912.2255, to appear in J. Algebraic Geom. M. Blickle, K. Schwede, and K. Tucker: F -signature of pairs and the asymptotic behavior of Frobenius splittings, arXiv:1107.1082. M. Brion and S. Kumar: Frobenius splitting methods in geometry and representation theory, Progress in Mathematics, vol. 231, Birkhäuser Boston Inc., Boston, MA, 2005. MR2107324 (2005k:14104) [BH93] [Con00] [dJ96] [EH08] [Fed83] W. Bruns and J. Herzog: Cohen-Macaulay rings, Cambridge Studies in Advanced Mathematics, vol. 39, Cambridge University Press, Cambridge, 1993. MR1251956 (95h:13020) B. Conrad: Grothendieck duality and base change, Lecture Notes in Mathematics, vol. 1750, Springer-Verlag, Berlin, 2000. MR1804902 (2002d:14025) A. J. de Jong: Smoothness, semi-stability and alterations, Inst. Hautes Études Sci. Publ. Math. (1996), no. 83, 51–93. 1423020 (98e:14011) F. Enescu and M. Hochster: The Frobenius structure of local cohomology, Algebra Number Theory 2 (2008), no. 7, 721–754. MR2460693 (2009i:13009) R. Fedder: F -purity and rational singularity, Trans. Amer. Math. Soc. 278 (1983), no. 2, 461–480. MR701505 (84h:13031) [Fuj09] [Gab04] [Gro65] O. Fujino: Introduction to the log minimal model program for log canonical pairs, arXiv:0907.1506. O. Gabber: Notes on some t-structures, Geometric aspects of Dwork theory. Vol. I, II, Walter de Gruyter GmbH & Co. KG, Berlin, 2004, pp. 711–734. A. Grothendieck: Éléments de géométrie algébrique. IV. Étude locale des schémas et des morphismes de schémas. II, Inst. Hautes Études Sci. Publ. Math. (1965), no. 24, 231. 0199181 (33 #7330) [HK10] [HW02] [Har66] [Har94] [HK04] [HR76] [Kol87] C. D. Hacon and S. J. Kovács: Classification of higher dimensional algebraic varieties, Oberwolfach Seminars, vol. 41, Birkhäuser Verlag, Basel, 2010. 2675555 (2011f:14025) N. Hara and K.-I. Watanabe: F-regular and F-pure rings vs. log terminal and log canonical singularities, J. Algebraic Geom. 11 (2002), no. 2, 363–392. MR1874118 (2002k:13009) R. Hartshorne: Residues and duality, Lecture notes of a seminar on the work of A. Grothendieck, given at Harvard 1963/64. With an appendix by P. Deligne. Lecture Notes in Mathematics, No. 20, Springer-Verlag, Berlin, 1966. MR0222093 (36 #5145) R. Hartshorne: Generalized divisors on Gorenstein schemes, Proceedings of Conference on Algebraic Geometry and Ring Theory in honor of Michael Artin, Part III (Antwerp, 1992), vol. 8, 1994, pp. 287–339. MR1291023 (95k:14008) B. Hassett and S. J. Kovács: Reflexive pull-backs and base extension, J. Algebraic Geom. 13 (2004), no. 2, 233–247. MR2047697 (2005b:14028) M. Hochster and J. L. Roberts: The purity of the Frobenius and local cohomology, Advances in Math. 21 (1976), no. 2, 117–172. MR0417172 (54 #5230) J. Kollár: Subadditivity of the Kodaira dimension: fibers of general type, Algebraic geometry, Sendai, 1985, Adv. Stud. Pure Math., vol. 10, North-Holland, Amsterdam, 1987, pp. 361–398. MR946244 (89i:14029) [Kol90] J. Kollár: Projectivity of complete moduli, J. Differential Geom. 32 (1990), no. 1, 235–268. 1064874 (92e:14008) [Kol11a] [Kol11b] [K+92] J. Kollár: Hulls and husks, arXiv:0805.0576. J. Kollár: A local version of the Kawamata-Viehweg vanishing theorem, Pure Appl. Math. Q. 7 (2011), no. 4, Special Issue: In memory of Eckart Viehweg, 1477–1494. 2918170 J. Kollár and 14 coauthors: Flips and abundance for algebraic threefolds, Société Mathématique de France, Paris, 1992, Papers from the Second Summer Seminar on Algebraic Geometry held at the University of Utah, Salt Lake City, Utah, August 1991, Astérisque No. 211 (1992). MR1225842 (94f:14013) [KK10] [KM98] [Kov11] [Kun76] J. Kollár and S. J. Kovács: Log canonical singularities are Du Bois, J. Amer. Math. Soc. 23 (2010), no. 3, 791–813. 2629988 J. Kollár and S. Mori: Birational geometry of algebraic varieties, Cambridge Tracts in Mathematics, vol. 134, Cambridge University Press, Cambridge, 1998, With the collaboration of C. H. Clemens and A. Corti, Translated from the 1998 Japanese original. MR1658959 (2000b:14018) S. Kovács: Irrational centers, Pure Appl. Math. Q. 7 (2011), no. 4, Special Issue: In memory of Eckart Viehweg, 1495–1515. 2918171 E. Kunz: On Noetherian rings of characteristic p, Amer. J. Math. 98 (1976), no. 4, 999–1013. MR0432625 (55 #5612) 18 ZSOLT PATAKFALVI AND KARL SCHWEDE [MS12] [Pat10] [Ray78] [Sch09] [Sch10] [Sch11] [SS10] [Tak08] L. E. Miller and K. Schwede: Semi-log canonical vs F -pure singularities, J. Algebra 349 (2012), 150–164. 2853631 Zs. Patakfalvi: Base change behavior of the relative canonical sheaf related to higher dimensional moduli, arXiv:1005.5207, to appear in Algebra Number Theory. M. Raynaud: Contre-exemple au “vanishing theorem” en caractéristique p > 0, C. P. Ramanujam—a tribute, Tata Inst. Fund. Res. Studies in Math., vol. 8, Springer, Berlin, 1978, pp. 273–278. 541027 (81b:14011) K. Schwede: F -adjunction, Algebra Number Theory 3 (2009), no. 8, 907–950. 2587408 (2011b:14006) K. Schwede: Centers of F -purity, Math. Z. 265 (2010), no. 3, 687–714. 2644316 (2011e:13011) K. Schwede: Test ideals in non-Q-Gorenstein rings, Trans. Amer. Math. Soc. 363 (2011), no. 11, 5925–5941. K. Schwede and K. E. Smith: Globally F -regular and log Fano varieties, Adv. Math. 224 (2010), no. 3, 863–894. 2628797 (2011e:14076) S. Takagi: A characteristic p analogue of plt singularities and adjoint ideals, Math. Z. 259 (2008), no. 2, 321–341. MR2390084 (2009b:13004) Department of Mathematics, Princeton University, Princeton, NJ, 08542, USA E-mail address: [email protected] Department of Mathematics, The Pennsylvania State University, University Park, PA, 16802, USA E-mail address: [email protected]
0
A Unified View of Entropy-Regularized Markov Decision Processes Gergely Neu [email protected] arXiv:1705.07798v1 [cs.LG] 22 May 2017 Universitat Pompeu Fabra, Barcelona, Spain Vicenç Gómez [email protected] Universitat Pompeu Fabra, Barcelona, Spain Anders Jonsson [email protected] Universitat Pompeu Fabra, Barcelona, Spain Abstract We propose a general framework for entropy-regularized average-reward reinforcement learning in Markov decision processes (MDPs). Our approach is based on extending the linear-programming formulation of policy optimization in MDPs to accommodate convex regularization functions. Our key result is showing that using the conditional entropy of the joint state-action distributions as regularization yields a dual optimization problem closely resembling the Bellman optimality equations. This result enables us to formalize a number of state-of-the-art entropy-regularized reinforcement learning algorithms as approximate variants of Mirror Descent or Dual Averaging, and thus to argue about the convergence properties of these methods. In particular, we show that the exact version of the TRPO algorithm of Schulman et al. (2015) actually converges to the optimal policy, while the entropy-regularized policy gradient methods of Mnih et al. (2016) may fail to converge to a fixed point. Finally, we illustrate empirically the effects of using various regularization techniques on learning performance in a simple reinforcement learning setup. 1. Introduction Reinforcement learning is the discipline of model-based optimal sequential decisionmaking in unknown stochastic environments. In average-reward reinforcement learning, the goal is to find a behavior policy that maximizes the long-term average reward, taking into account the effect of each decision on the future evolution of the decisionmaking process. In known environments, this optimization problem has been studied (at least) since the influential work of Bellman (1957) and Howard (1960): the optimal behavior policy can be formulated as the solution of the Bellman optimality equations. In unknown environments with partially known or misspecified models, greedily solving these equations often results in policies that are far from optimal in the true environment. Rooted in statistical learning theory (Vapnik, 2013), the notion of Neu Gómez Jonsson regularization offers a principled way of dealing with this issue, among many others. In particular, entropy regularization has proven to be one of the most successful tools of machine learning and related fields (Littlestone and Warmuth, 1994; Vovk, 1990; Freund and Schapire, 1997; Kivinen and Warmuth, 2001; Arora et al., 2012). The idea of entropy regularization has also been used extensively in the reinforcement learning literature (Sutton and Barto, 1998; Szepesvári, 2010). Entropyregularized variants of the classic Bellman equations and the entailing reinforcementlearning algorithms have been proposed to induce safe exploration (Fox et al., 2016) and risk-sensitive policies (Howard and Matheson, 1972; Marcus et al., 1997; Ruszczyński, 2010), or to model observed behavior of imperfect decision-makers (Ziebart et al., 2010; Ziebart, 2010; Braun et al., 2011), among others. Complementary to these approaches rooted in dynamic programming, another line of work proposes direct policy search methods attempting to optimize various entropy-regularized objectives (Williams and Peng, 1991; Peters et al., 2010; Schulman et al., 2015; Mnih et al., 2016; O’Donoghue et al., 2017), with the main goal of driving a safe online exploration procedure in an unknown Markov decision process. Notably, the state-of-the-art methods of Mnih et al. (2016) and Schulman et al. (2015) are both based on entropy-regularized policy search. In this work, we connect these two seemingly disparate lines of work by showing a strong Lagrangian duality between the entropy-regularized Bellman equations and a certain regularized average-reward objective. Specifically, we extend the linearprogramming formulation of the problem of optimization in MDPs to accommodate convex regularization functions, resulting in a convex program. We show that using the conditional entropy of the joint state-action distribution gives rise to a set of nonlinear equations resembling the Bellman optimality equations. Observing this duality enables us to establish a connection between regularized versions of value and policy iteration methods (Puterman and Shin, 1978) and incremental convex optimization methods like Mirror Descent (Nemirovski and Yudin, 1983; Beck and Teboulle, 2003) or Dual Averaging (Xiao, 2010; McMahan, 2014; Hazan et al., 2016; Shalev-Shwartz, 2012). For instance, the convex-optimization view we propose reveals that the TRPO algorithm of Schulman et al. (2015) and the regularized policy-gradient method of Mnih et al. (2016) are approximate versions of Mirror Descent and Dual Averaging, respectively, and that both can be interpreted as regularized policy iteration methods. Our work provides a theoretical justification for various algorithms that were first derived heuristically. In particular, our framework reveals that the exact version of TRPO is identical to the MDP-E algorithm of Even-Dar et al. (2009). This establishes the fact that the policy updates of TRPO converge to the optimal policy, improving on the theoretical results claimed by Schulman et al. (2015). We also argue that our formulation is useful for pointing out possible inconsistencies of heuristic learning algorithms. In particular, we show that the approximation steps employed by Mnih et al. (2016) may break the convexity of the objective, thus possibly leading to convergence to bad local optima or even divergence. This observation is in accordance 2 A unified view of entropy-regularized MDPs with the very recent findings of Asadi and Littman (2016), who show that value iteration with poorly chosen approximate updates may lead to divergence. To complement these results, we suggest an alternative objective that can be optimized consistently, avoiding the possibility of diverging. A similar Lagrangian duality between the Bellman equations and entropy maximization has been previously noted by Ziebart (2010, Sec. 5.2) and Rawlik et al. (2012) for a special class of episodic Markov decision processes where the time index within the episode is part of the state representation. In this particular setting, the convexity of the conditional entropy is more obvious. One of our key observations is pointing out the convexity of the conditional entropy of distribution functions defined over general state spaces, which enables us to develop a much broader theory of regularized Markov decision processes. We note that our theory also readily extends to discounted MDPs by replacing the stationary state-action distributions we consider by discounted state-action occupancy measures. For consistency, we will discuss each particular algorithm in their most natural average-reward version, noting that all conclusions remain valid in the simpler discounted and episodic settings. The rest of the paper is organized as follows. In Section 2, we provide background on average-reward Markov decision processes, briefly discussing both linear-programming and dynamic-programming derivations of the optimal control. In Section 3, we provide a convex-programming formulation of regularized average-reward Markov decision processes, and show the connection to the regularized Bellman equations. Section 4 provides a brief summary of the complementary dynamic-programming formulation and discusses regularized equivalents of related concepts, such as expressions of the regularized policy gradient. In Section 5, we describe several existing learning algorithms in our framework. We provide an empirical evaluation of various regularization schemes in a simple reinforcement learning problem in Section 6. P P set S, we will often use s as shorthand for s∈S , and we Notation. Given a finite P use ∆(S) = {µ ∈ RS : s µ(s) = 1, µ(s) ≥ 0 (∀s)} to denote the set of all probability distributions on S. 2. Preliminaries on Markov decision processes We consider a finite Markov decision process (MDP) M = (X , A, P, r), where X is the finite state space, A is the finite action space, P : X × A × X → [0, 1] is the transition function, with P (y|x, a) denoting the probability of moving to state y from state x when taking action a, and r : X × A → R is the reward function mapping state-action pairs to rewards. In each round t, the learner observes state Xt ∈ X , selects action At ∈ A, moves to the next state Xt+1 ∼ P (·|Xt , At ), and obtains reward r(Xt , At ). The goal is to select actions as to maximize some notion of cumulative reward.iIn this paper we consider the h P T 1 average-reward criterion lim inf T →∞ E T t=1 rt (Xt , At ) . A stationary state-feedback 3 Neu Gómez Jonsson policy (or policy for short) defines a probability distribution π(·|x) over the learner’s actions in state x. MDP theory (see, e.g., Puterman (1994)) stipulates that under mild conditions, the average-reward criterion can be maximized by stationary policies. Throughout the paper, we make the following mild assumption about the MDP: Assumption 1 The MDP M is unichain: All stationary policies P π induce a unique stationary distribution νπ over the state space satisfying νπ (y) = x,a P (y|x, a)π(a|x)νπ (x) for all y ∈ X . In particular, this assumption is satisfied if all policies induce an irreducible and aperiodic Markov chain (Puterman, 1994). For ease of exposition in this section, we also make the following simplifying assumption: Assumption 2 The MDP M admits a single recurrent class: All stationary policies π induce stationary distributions strictly supported on the same set X 0 ⊆ X . In general, this assumption is very restrictive in that it does not allow policies to cover different parts of the state space. We stress that our results in the later sections do not require this assumption to hold. With the above assumptions in mind, we can define the average reward of any policy π as " # T X 1 ρ(π) = lim E rt (Xt , At ) , T →∞ T t=1 where At ∼ π(·|Xt ) in each round t and the existence of the limit is ensured by Assumption 1. Furthermore, the average reward of any policy π can be simply P written as ρ(π) = x,a νπ (x)π(a|x)r(x, a), which is a linear function of the stationary state-action distribution µπ = νπ π. This suggests that finding the optimal policy can be equivalently written as a linear program (LP) where the decision variable is the stationary state-action distribution. Defining the set of all feasible stationary distributions as ( ) X X ∆ = µ ∈ ∆(X × A) : µ(y, b) = P (y|x, a)µ(x, a) (∀y) , (1) x,a b the problem of maximizing the average reward can be written as µ∗ = arg max ρ(µ). (2) µ∈∆ Just as a policy π induces stationary distributions νπPand µπ , a stationary distribution µ induces a state distribution νµ defined as νµ (x) = a µ(x, a) and a policy πµ defined as πµ (a|x) = µ(x, a)/νµ (x), where the denominator is strictly positive for recurrent states by Assumption 2. Since ∆ is a compact polytope (non-empty by Assumption 1) 4 A unified view of entropy-regularized MDPs the maximum in (2) is well-defined and induces an optimal policy πµ∗ in recurrent states. Due to Assumption 2, πµ∗ can be arbitrarily defined in transient states. The linear program specified in Equation (2) is well studied in the MDP literature (see, e.g., Puterman, 1994, Section 8.8), although most commonly as the dual of the linear program minρ∈R ρ subject to ρ + V (x) − (3) X P (y|x, a)V (y) ≥ r(x, a), ∀(x, a). (4) y Here, the dual variables V are commonly referred to as the value functions. By strong LP duality and our Assumption 1, the solution to this LP equals the optimal average reward ρ∗ and the dual variables V ∗ at the optimum are the solution to the average-reward Bellman optimality equations ! X V ∗ (x) = max r(x, a) − ρ∗ + P (y|x, a)V ∗ (x) , (∀x) . (5) a y Note that V ∗ is not unique as for any solution V , a constant shift V − c for any c ∈ R is also a solution. However, we can obtain a unique solution V ∗ by imposing the P additional constraint x,a µ∗ (x, a)V ∗ (x) = 0, which states that the expected value should equal 0. 3. Regularized MDPs: A convex-optimization view Inspired by the LP formulation of the average-reward optimization problem (2), we now define a regularized optimization objective—a framework that will lead us to our main results. Our results in this section only require the mild Assumption 1. Our regularized optimization problem takes the form ( ) X 1 max ρeη (µ) = max µ(x, a)r(x, a) − R(µ) , (6) µ∈∆ µ∈∆ η x,a where R(µ) : RX ×A → R is a convex regularization function and η > 0 is a learning rate that trades off the original objective and regularization. Note that η = ∞ recovers the unregularized objective. Unlike previous work on LP formulations for MDPs, we find it useful to regard (6) as the primal. We focus on two families of regularization functions: the negative Shannon entropy of (X, A) ∼ µ, X RS (µ) = µ(x, a) log µ(x, a), (7) x,a 5 Neu Gómez Jonsson and the negative conditional entropy of (X, A) ∼ µ, X X µ(x, a) = νµ (x)πµ (a|x) log πµ (a|x). RC (µ) = µ(x, a) log P b µ(x, b) x,a x,a (8) In what follows, we refer to these functions as the relative entropy and the conditional entropy. We also make use of the Bregman divergences induced by RS and RC which take the respective forms X X µ(x, a) πµ (a|x) DS (µkµ0 ) = µ(x, a) log 0 and DC (µkµ0 ) = µ(x, a) log . 0 (a|x) µ (x, a) π µ x,a x,a While the form of DS is standard (it is the relative entropy between two state-action distributions), the fact that DC is the Bregman divergence of RC (or even that RC is convex) is not immediately obvious1 . The following proposition asserts this statement, which we prove in Appendix A.1. The only work we are aware of that establishes a comparable result is the recent paper of Neu and Gómez (2017). Proposition 1 The Bregman divergence corresponding to the conditional entropy RC is DC . Furthermore, DC is nonnegative on ∆, implying that RC is convex and DC is convex in its first argument. We proceed to derive the dual functions and optimal solutions to (6) for our two choices of regularization functions. Without loss of generality, we assume that the reference policy πµ0 has full support, which implies that the corresponding stationary distribution µ0 is strictly positive on the recurrent set X 0 . We only provide the derivations for the Bregman divergences; the calculations are analogous for RS and RC . Both of these solutions will be expressed with the help of dual variables V : RX → R which are useful to think about as value functions, as in the case of the LP formulation (2). We also define the corresponding advantage functions A(x, a) = P r(x, a) + y P (y|x, a)V (y) − V (x). 3.1. Relative entropy The choice R = DS (·kµ0 ) has been studied before by Peters et al. (2010) and Zimin and Neu (2013); we defer the proofs to Appendix A.3. The optimal state-action distribution for a given value of η is ∗ µ∗η (x, a) ∝ µ0 (x, a)eηAη (x,a) , (9) where A∗η is the advantage function for the optimal dual variables Vη∗ . The dual function is X 1 g(V ) = log µ0 (x, a)eηA(x,a) , (10) η x,a 1. In the special case of loop-free episodic environments, showing the convexity of RC is straightforward (Lafferty et al., 2001; Ziebart, 2010; Rawlik et al., 2012). 6 A unified view of entropy-regularized MDPs that now needs to be minimized on RX with no constraints in order to obtain Vη∗ . By strong duality, g is convex in V and takes the value ρe∗η = maxµ∈∆ ρeη (µ) at its optimum. 3.2. Conditional entropy The choice R = DC (·kµ0 ) leads to our main contributions. Similar to above, the optimal policy is ∗ πη∗ (a|x) ∝ πµ0 (a|x)eηAη (x,a) . (11) In this case, the dual problem closely resembles the average-reward Bellman optimality equations (5): Proposition 2 The dual of the optimization problem (6) when R = DC (·kµ0 ) is given by minλ∈R λ !! X X 1 P (y|x, a)V (y) , (∀x) . πµ0 (a|x) exp η r(x, a) − λ + subject to V (x) = log η y a We defer the proofs to Appendix A.4. Using strong duality, the optimum of the above problem is ρe∗η , which implies that the optimal dual variables Vη∗ are given as a solution to the system of equations !! X X 1 P (y|x, a)Vη∗ (y) , (∀x) . πµ0 (a|x) exp η r(x, a) − ρe∗η + Vη∗ (x) = log η y a (12) By analogy with the Bellman optimality equations (5), we call this the regularized average-reward Bellman optimality equations. Since ρe∗η is guaranteed to be finite (because it is the maximum of a bounded function on a compact domain), the solution to the above optimization problem is well-defined, bounded, and unique up to a constant shift (as in the case of the LP dual variables). Again, we can make the solution unique by imposing the constraint that the expected value should equal 0. 4. Dynamic programming in regularized MDPs We now present a dynamic-programming view of the regularized optimization problem (Bertsekas, 2007) for the choice R = DC (·kµ0 ). Similar derivations have been done several times for discounted and episodic MDPs (Littman and Szepesvári, 1996; Ruszczyński, 2010; Azar et al., 2011; Rawlik et al., 2012; Asadi and Littman, 2016; Fox et al., 2016), but we are not aware of any work that considers the average-reward case. That said, the generalization is straightforward, and the existence and unicity of 7 Neu Gómez Jonsson the optimal solution to the Bellman optimality equation (12) follows from our results in the previous section. We first define the regularized Bellman equations for an arbitrary policy π and a reference policy π 0 : ! X X π(a|x) 1 − ρeη (π) + P (y|x, a)Vηπ (y) (∀x) , Vηπ (x) = π(a|x) r(x, a) − log 0 η π (a|x) y a (13) where ρeη (π) is the regularized average reward of policy π defined as in Equation (6). By our Assumption 1 and Proposition 4.2.4 of Bertsekas (2007), it is easy to show that this system of equations has a unique solution satisfying the additional constraint P ∗|π 0 π and x,a µπ (x, a)Vη (x) = 0. We also define the Bellman optimality operator Tη π|π 0 the Bellman operator Tη that correspond to the Bellman equations (12) and (13), 0 respectively, as well as the greedy policy operator Gπη that corresponds to Equation (11) (for completeness, the formal definitions appear in Appendix B). We include two results that are useful for deriving approximate dynamic programming algorithms. We first provide a counterpart to the performance-difference lemma (Burnetas and Katehakis, 1997, Prop. 1, Kakade and Langford, 2002, Lemma 6.1, Cao, 2007). This statement will rely on the regularized advantage function Aπη defined for each policy π as Aπη (x, a) = r(x, a) − X 1 log π(a|x) P (y|x, a)Vηπ (y) − Vηπ (x), − ρ e (π) + η η log π 0 (a|x) y where Vηπ is the regularized value function corresponding to π with baseline π 0 . Lemma 3 For any pair of policies π, π 0 , we have X µπ0 (x, a)Aπη (x, a). ρe(π 0 ) − ρe(π) = x,a For completeness, we provide the simple proof in Appendix B.1. Second, we provide an expression for the gradient of ρeη , thus providing a regularized counterpart of the policy gradient theorem of Sutton et al. (1999). To formalize this statement, let us consider a policy πθ parametrized by a vector θ ∈ Rd and assume that the gradient ∇πθ (a|x) exists for all x, a and all θ. The form of the policy gradient is given by the following lemma, which we prove in Appendix B.2: Lemma 4 Assume that ∂πθ∂θ(a|x) /πθ (a|x) > 0 for all θi , x, a. The gradient of ρeη exists i and satisfies X ∇e ρη (θ) = µπθ (x, a)∇ log πθ (a|x)Aπη θ (x, a). x,a 8 A unified view of entropy-regularized MDPs 5. Algorithms In this section we derive several reinforcement learning algorithms based on our results. For clarity of presentation, we assume that the MDP M is fully known, an assumption that we later relax in the experimental evaluation. We will study a generic sequential optimization framework where a sequence of policies πk are computed iteratively. Inspired by the online convex optimization literature (see, e.g., ShalevShwartz, 2012; Hazan et al., 2016) and by our convex-optimization formulation, we study two families of algorithms: Mirror Descent and Dual Averaging (also known as Follow-the-Regularized-Leader). 5.1. Iterative policy optimization by Mirror Descent A direct application of the Mirror Descent algorithm (Nemirovski and Yudin, 1983; Beck and Teboulle, 2003; Martinet, 1978; Rockafellar, 1976) to our case is defined as   1 µk+1 = arg max ρ(µ) − DR (µkµk ) , (14) η µ∈∆ where DR is the Bregman divergence associated with the convex regularization function R. We now proceed to show how various learning algorithms can be recovered from this formulation. 5.1.1. Mirror Descent with the relative entropy We first remark that the Relative Entropy Policy Search (REPS) algorithm of Peters et al. (2010) can be formulated as an instance of Mirror Descent with the Bregman divergence DS . This is easily seen by comparing the form of the update rule (14) with the problem formulation of Peters et al. (2010, pp. 2), with the slight difference that our regularization is additive and theirs is enforced as a constraint. It is easy to see that this only amounts to a change in learning rate. This connection is not new: it has been first shown by Zimin and Neu (2013)2 , and has been recently rediscovered by Montgomery and Levine (2016). Independently of each other, Zimin and Neu (2013) and Dick et al. (2014) both show that Mirror Descent achieves near-optimal regret guarantees in an online learning setup where the transition function is known, but the reward function is allowed to change arbitrarily between decision rounds. This implies that REPS duly converges to the optimal policy in our setup. 5.1.2. Mirror Descent with the conditional entropy We next show that the Dynamic Policy Programming (DPP) algorithm of Azar et al. (2012) and the Trust-Region Policy Optimization (TRPO) algorithm of Schulman et al. (2015) are both approximate variants of Mirror Descent with the Bregman 2. Although they primarily referred to Mirror Descent as the “Proximal Point Algorithm” following (Rockafellar, 1976; Martinet, 1978). 9 Neu Gómez Jonsson divergence DC . To see this, note that a full Mirror Descent update requires computing the optimal value function Vη∗ for the baseline µk , e.g. by regularized value iteration or regularized policy iteration (see Appendix B). Since a full update for Vη∗ is expensive, DPP and TRPO provide two ways to approximate it. We remark that the algorithm of Rawlik et al. (2012) can also be viewed as an instance of Mirror Descent for the finite-horizon episodic setting, in which the exact update can be computed efficiently by dynamic programming. Dynamic Policy Programming. We first claim that each iteration of DPP is a single regularized value iteration step: Starting from the previous value function Vk , it extracts the greedy policy πk+1 = Gπη k [Vk ] and applies the Bellman optimality ∗|π ∗|π operator Tη k to obtain Vk+1 = Tη k [Vk ]. This follows from comparing the form of DPP presented in Appendix A of Azar et al. (2012): their update rules (19) and (20) precisely match the discounted analogue of our expressions (26) in Appendix B with π 0 = πk . The convergence guarantees proved by Azar et al. (2012) demonstrate the soundness of this approximate update. Trust-Region Policy Optimization. Second, we claim that each iteration of TRPO is a single policy iteration step: TRPO first fully evaluates the policy πk to compute its unregularized value function Vk = V∞πk and then extracts the regularized greedy policy πk+1 = Gπη k [Vk ] with πk as a baseline. This can be seen by inspecting the TRPO update3 that takes the form (  ) X X π(a|x) 1 πk πk+1 = arg max νπk (x) π(a|x) A∞ (x, a) − log . η πk (a|x) π x a This objective approximates Mirror Descent by ignoring the effect of changing the policy on the state distribution. Surprisingly, using our formalism, this update can be expressed in closed form as πk πk+1 (a|x) ∝ πk (a|x)eηA∞ (x,a) . We present the detailed derivations in Appendix B.3. A particularly interesting consequence of this result is that TRPO is completely equivalent to the MDP-E algorithm of Even-Dar et al. (2009) (see also (Neu et al., 2010, 2014)), which is known to minimize regret in an online setting, thus implying that TRPO also converges to the optimal policy in the stationary setting. This guarantee is much stronger than the ones provided by Schulman et al. (2015), who only claim that TRPO produces a monotonically improving sequence of policies (which may still converge to a suboptimal policy). 3. As in the case of REPS, we discuss here the additive-regularization version of the algorithm. The entropy-constrained update actually implemented by Schulman et al. (2015) only differs in the learning rate. 10 A unified view of entropy-regularized MDPs 5.2. Iterative policy optimization by Dual Averaging We next study algorithms arising from the Dual Averaging scheme (Xiao, 2010; McMahan, 2014), commonly known as Follow-the-Regularized-Leader in online learning (Shalev-Shwartz, 2012; Hazan et al., 2016). This algorithm is defined by the iteration   1 (15) µk+1 = arg max ρ(µ) − R(µ) , ηk µ∈∆ where ηk is usually an increasing sequence to ensure convergence in the limit. We are unaware of any pure instance of dual averaging using relative entropy, and only discuss conditional entropy below. 5.2.1. Dual Averaging with the conditional entropy Just as for Mirror Descent, a full update (15) requires computing the optimal value function Vη∗ . Various approximations of this update have been long studied in the RL literature—see, e.g., (Littman and Szepesvári, 1996) (with additional discussion by (Asadi and Littman, 2016)), (Perkins and Precup, 2002; Ruszczyński, 2010; Petrik and Subramanian, 2012; Fox et al., 2016). In this section, we focus on the stateof-the-art algorithms of Mnih et al. (2016) and O’Donoghue et al. (2017) that were originally derived from an optimization formulation resembling our Equation (6). Our main insight is that this algorithm can be adjusted to have a dynamic-programming interpretation and a convergence guarantee. Entropy-regularized policy gradients. The A3C algorithm of Mnih et al. (2016) aims to maximize X 1 X ρ(π) − νπk (x) π(a|x) log π(a|x) ηk x a by taking policy gradient steps. Interestingly, our formalism implies a connection between TRPO and A3C. Due to P Lemma 4,Pthe gradient of ρ(πθ ) with respect to θ coincides with the gradient of x νπk (x) a πθ (a|x)Aπ∞k (x, a), so A3C actually attempts to optimize the objective   X X 1 πk log πθ (a|x) . (16) νπk (x) πθ (a|x) A∞ (x, a) − η k x a This objective can be seen as the dual-averaging counterpart of the TRPO objective. As in the case of TRPO, the maximizer of this objective can be computed in closed form as πk πk+1 (a|x) ∝ eηk A∞ . Unlike for TRPO, we are not aware of any convergence results for A3C, and we believe the algorithm does not converge. Indeed, the objective (16) is non-convex in either 11 Neu Gómez Jonsson of the natural parameters µ or π, which can cause premature convergence to a bad local optimum. An even more serious concern is that the objective function changes between iterations, so gradient descent may fail to converge to any stationary point. This problem is avoided by TRPO since the sum of the TRPO objectives is a sensible optimization objective (Even-Dar et al., 2009, Theorem 4.1). However, there is no such clear interpretation for the objective (16). O’Donoghue et al. (2017, Section 3.1) study the stationary points of the objective (16) and, similarly to us, show a connection between a certain type of value function and a policy achieving the stationary point. However, they do not show that this stationary point is unique nor that gradient descent converges to a stationary point4 . As we argue above, this may very well not be the case. These observations are consistent with those of Asadi and Littman (2016), who show that softmax policy updates may lead to inconsistent behavior when used in tandem with unregularized advantage functions. To overcome these issues, we advocate for directly optimizing the objective (15) instead of (16) via gradient descent. Due to the fact that (15) is convex in µ and to standard results regarding dual averaging (McMahan, 2014), this scheme is guaranteed to converge to the optimal policy. Estimating the gradients can be done analogously as for the unregularized objective, by our Lemma 4. 6. Experiments In this section we analyze empirically several of the algorithms described in the previous section, with the objective of illustrating the interplay of regularization and model-estimation error in a simple reinforcement learning setting. We consider an iterative setup where in each episode k = 1, 2, . . . , N , we execute a policy πk , observe the sample transitions and update the estimated model via maximum likelihood. We focus on the regularization aspect, with no other approximation error than that introduced by model estimation. It is important to emphasize that the comparison may not extend to other variants of the algorithms or in the presence of other sources of approximation. We consider a simple MDP, defined on a grid (Fig. 1, left), where an agent has four possible actions (up, down, left and right) that succeed with probability 0.9 but fail with probability 0.1. In case of failure, the agent does not move or goes to any random adjacent location. Negative (or positive) rewards are given after hitting a wall (or reaching one of the white diamond locations, respectively). In both cases, the agent is sent back to one of the starting locations (marked with ’X’ in the figure). The reward of the diamonds is proportional to the distance from the starting locations. Therefore, the challenge of this experiment is to discover the path towards the top-right reward while learning the dynamics incrementally, and then exploit it. 4. Strictly speaking, O’Donoghue et al. (2017) do not even show that a stationary point (16) exists. 12 A unified view of entropy-regularized MDPs 8 0.05 8 0.04 0.03 0.02 6 6 DA-RV DA TRPO DPP RegVI Opt 4 0.01 2 0 -0.01 0 10 -4 10 -3 10 -2 10 -1 10 0 10 1 2 avg reward 10 avg reward 0.06 4 DPP ModRegPI-2 ModRegPI-20 TRPO 2 0 10 0 10 1 10 2 iteration k Figure 1: Left: the MDP used for evaluation. Reward is −0.1 at the walls and 5, 50, 200 at the diamonds. The optimal policy is indicated by red arrows. The cell colors correspond to the stationary state distribution for open locations. Middle: Average reward as a function of the learning rate η for all algorithms (see text for details). Number of iterations N and samples per iteration S are N = S = 500. Results are taken over 20 random runs per value of η. Right: Performance of DPP, TRPO and two version of modified regularized Policy Iteration for a fixed η ≈ 0.1. Note that the optimal agent ignores the intermediate reward at the center and even prefers to hit a wall in locations too far away from the largest reward (bottom-left). We fix the number of iterations N and samples per iteration S and analyze the average reward of the final policy as a function of η. We compare the following algorithms: regularized Value Iteration with a fixed reference uniform policy and fixed η (RegVI); several variants of approximate Mirror Descent, including DPP and TRPO (Section 5.1); and two Dual Averaging methods (DA and DA-RV). DA corresponds to optimizing the objective (16), which is not guaranteed to lead to an optimal policy, and DA-RV corresponds to the iteration (15), which has convergence guarantees (Section 5.2). For both variants, we use a linear annealing schedule ηk = η · k. Fig. 1 (middle) shows results as a function of η. The maximum reward is depicted in blue at the top. For very small η (strong regularization), all algorithms perform poorly and do not even reach the intermediate reward. In contrast, for very large η, they converge prematurely to the greedy policy that exploits the intermediate reward. Typically, for an intermediate value of η, the algorithms occasionally discover the optimal path and exploit it. Note that this is not the case for RegVI, which never obtains the optimal policy. This shows that using both a fixed value of η and a fixed reference policy is a bad choice. In this MDP, we observe that the performance of both Dual Averaging methods (DA and DA-RV) is very similar, and in general slightly better than the approximate Mirror Descent variants. 13 Neu Gómez Jonsson We also show an interesting relationship between the Mirror Descent approximations. Our analysis in Section 5.1.2 suggests an entire array of algorithms lying between DPP and TRPO, just as Modified Policy Iteration lies between Value Iteration and Policy Iteration (Puterman and Shin, 1978; Scherrer et al., 2012). Fig. 1 (right) illustrates this idea, showing the convergence of DPP and TRPO for a fixed value of η. TRPO tends to converge faster than DPP to a locally optimal policy, since DPP uses a single value update per iteration. Using more value updates leads to a modified regularized Policy Iteration algorithm (we call it ModRegPI-2 and ModRegPI-20, for 2 and 20 updates, respectively) that interpolates between DPP and TRPO. 7. Conclusion We have presented a unifying view of entropy-regularized MDPs from a convexoptimization perspective. We believe that such unifying theories can be very useful in moving a field forward: We recall that in the field of online learning theory, the convex-optimization view has enabled a unified treatment of many existing algorithms and acts today as the primary framework for deriving new algorithms (see the progress from Cesa-Bianchi and Lugosi (2006) through Shalev-Shwartz (2012) to Hazan et al. (2016)). In this paper, we argued that the convex-optimization view may also be very useful in analyzing algorithms for reinforcement learning: In particular, we demonstrated how this framework can be used to provide theoretical justification for state-of-the-art reinforcement learning algorithms, and how it can highlight potential problems with them. We expect that this newly-found connection will also open the door for constructing more advanced reinforcement learning algorithms by borrowing further ideas from the convex optimization literature, such as Composite Objective Mirror Descent Duchi et al. (2010) and Regularized Dual Averaging (Xiao, 2010). Finally, we point out that our work does not provide a statistical justification for using entropy regularization in reinforcement learning. In the case of online learning in known Markov decision processes with changing reward functions, entropyregularization has been known to yield near-optimal learning algorithms (Even-Dar et al., 2009; Neu et al., 2010, 2014; Zimin and Neu, 2013; Dick et al., 2014). It remains to be seen if this technique also provably helps in driving the exploration process in unknown Markov decision processes. References S. Arora, E. Hazan, and S. Kale. The multiplicative weights update method: A meta-algorithm and applications. Theory of Computing, 8:121–164, 2012. Kavosh Asadi and Michael L. Littman. A new softmax operator for reinforcement learning. CoRR, abs/1612.05628, 2016. 14 A unified view of entropy-regularized MDPs Mohammad Gheshlaghi Azar, Vicenç Gómez, and Hilbert J Kappen. Dynamic policy programming with function approximation. In International Conference on Artificial Intelligence and Statistics, pages 119–127, 2011. Mohammad Gheshlaghi Azar, Vicenç Gómez, and Hilbert J Kappen. Dynamic policy programming. Journal of Machine Learning Research, 13(Nov):3207–3245, 2012. A. Beck and M. Teboulle. Mirror descent and nonlinear projected subgradient methods for convex optimization. Operations Research Letters, 31(3):167–175, 2003. R. Bellman. Dynamic Programming. Princeton University Press, Princeton, New Jersey, 1957. D. P. Bertsekas. Dynamic Programming and Optimal Control, volume 2. Athena Scientific, Belmont, MA, 3 edition, 2007. Daniel A Braun, Pedro A Ortega, Evangelos Theodorou, and Stefan Schaal. Path integral control and bounded rationality. In Adaptive Dynamic Programming And Reinforcement Learning (ADPRL), 2011 IEEE Symposium on, pages 202–209. IEEE, 2011. A. N. Burnetas and M. N. Katehakis. Optimal adaptive policies for Markov Decision Processes. 22(1):222–255, 1997. Xi-Ren Cao. Stochastic Learning and Optimization: A Sensitivity-Based Approach. Springer, New York, 2007. N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge University Press, New York, NY, USA, 2006. T. Dick, A. György, and Cs. Szepesvári. Online learning in markov decision processes with changing cost sequences. In ICML 2014, 2014. John C Duchi, Shai Shalev-Shwartz, Yoram Singer, and Ambuj Tewari. Composite objective mirror descent. In COLT, pages 14–26, 2010. E. Even-Dar, S. M. Kakade, and Y. Mansour. Online Markov decision processes. Mathematics of Operations Research, 34(3):726–736, 2009. Roy Fox, Ari Pakman, and Naftali Tishby. Taming the noise in reinforcement learning via soft updates. In Proceedings of the Thirty-Second Conference on Uncertainty in Artificial Intelligence, 2016. Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 55: 119–139, 1997. 15 Neu Gómez Jonsson Elad Hazan et al. Introduction to online convex optimization. Foundations and Trends R in Optimization, 2(3-4):157–325, 2016. R. A. Howard. Dynamic Programming and Markov Processes. The MIT Press, Cambridge, MA, 1960. Ronald A Howard and James E Matheson. Risk-sensitive markov decision processes. Management science, 18(7):356–369, 1972. Sham M. Kakade and John Langford. Approximately optimal approximate reinforcement learning. In Proceedings of the Nineteenth International Conference on Machine Learning (ICML 2002), pages 267–274, 2002. J. Kivinen and M. Warmuth. Relative loss bounds for multidimensional regression problems. Machine Learning, 45:301–329, 2001. John Lafferty, Andrew McCallum, and Fernando Pereira. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In ICML 2001, pages 282–289, 2001. URL citeseer.ist.psu.edu/lafferty01conditional.html. N. Littlestone and M. Warmuth. The weighted majority algorithm. Information and Computation, 108:212–261, 1994. M.L. Littman and Cs. Szepesvári. A Generalized Reinforcement Learning Model: Convergence and applications. In Int. Conf. on Machine Learning, pages 310–318, 1996. Steven I Marcus, Emmanual Fernández-Gaucherand, Daniel Hernández-Hernandez, Stefano Coraluppi, and Pedram Fard. Risk sensitive markov decision processes. In Systems and control in the twenty-first century, pages 263–279. Springer, 1997. B. Martinet. Perturbation des méthodes d’optimisation. applications. ESAIM: Mathematical Modelling and Numerical Analysis - Modélisation Mathématique et Analyse Numérique, 12(2):153–171, 1978. URL http://eudml.org/doc/193317. H Brendan McMahan. A survey of algorithms and analysis for adaptive online learning. arXiv preprint arXiv:1403.3465, 2014. Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous methods for deep reinforcement learning. In International Conference on Machine Learning, pages 1928–1937, 2016. William H Montgomery and Sergey Levine. Guided policy search via approximate mirror descent. In NIPS-29, pages 4008–4016, 2016. 16 A unified view of entropy-regularized MDPs A. Nemirovski and D. Yudin. Problem Complexity and Method Efficiency in Optimization. Wiley Interscience, 1983. G. Neu, A. György, and Cs. Szepesvári. The online loop-free stochastic shortest-path problem. In Proceedings of the 23rd Annual Conference on Learning Theory (COLT), pages 231–243, 2010. Gergely Neu and Vicenç Gómez. Fast rates for online learning in Linearly Solvable Markov Decision Processes. 2017. Gergely Neu, András György, Csaba Szepesvári, and András Antos. Online Markov decision processes under bandit feedback. IEEE Transactions on Automatic Control, 59:676–691, 2014. Brendan O’Donoghue, Remi Munos, Koray Kavukcuoglu, and Volodymyr Mnih. PGQ: Combining policy gradient and Q-learning. In 5th International Conference on Learning Representations, 2017. Theodore J. Perkins and Doina Precup. A convergent form of approximate policy iteration. In Advances in Neural Information Processing Systems, pages 1595–1602, 2002. Jan Peters, Katharina Mülling, and Yasemin Altun. Relative entropy policy search. In Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, pages 1607–1612, 2010. Marek Petrik and Dharmashankar Subramanian. An approximate solution method for large risk-averse markov decision processes. In Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, pages 805–814, 2012. Martin L. Puterman. Markov Decision Processes. Wiley, 1994. ISBN 9780471727828. URL http://books.google.com/books/about/Markov_decision_ processes.html?id=Y-gmAQAAIAAJ. Martin L. Puterman and Moon Chirl Shin. Modified policy iteration algorithms for discounted Markov decision processes. Management Science, 24:1127–1137, 1978. Konrad Rawlik, Marc Toussaint, and Sethu Vijayakumar. On stochastic optimal control and reinforcement learning by approximate inference. In Proceedings of Robotics: Science and Systems VIII, 2012. R. Tyrrell Rockafellar. Monotone Operators and the Proximal Point Algorithm. SIAM Journal on Control and Optimization, 14(5):877–898, 1976. Andrzej Ruszczyński. Risk-averse dynamic programming for Markov decision processes. Mathematical programming, 125(2):235–261, 2010. 17 Neu Gómez Jonsson B. Scherrer, V. Gabillon, M. Ghavamzadeh, and M. Geist. Approximate modified policy iteration. In ICML 2012, pages 1207–1214, 2012. John Schulman, Sergey Levine, Pieter Abbeel, Michael Jordan, and Philipp Moritz. Trust region policy optimization. In Proceedings of the 32nd International Conference on Machine Learning (ICML-15), pages 1889–1897, 2015. Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations and Trends in Machine Learning, 4(2):107–194, 2012. R. S. Sutton, D. A. McAllester, S. P. Singh, and Y. Mansour. Policy gradient methods for reinforcement learning with function approximation. In NIPS-12, pages 1057–1063, 1999. R.S. Sutton and A.G. Barto. Reinforcement Learning: An Introduction. MIT Press, 1998. Cs. Szepesvári. Algorithms for Reinforcement Learning. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan & Claypool Publishers, 2010. Vladimir Vapnik. The nature of statistical learning theory. Springer science & business media, 2013. V. Vovk. Aggregating strategies. In Proceedings of the third annual workshop on Computational learning theory (COLT), pages 371–386, 1990. Ronald J Williams and Jing Peng. Function optimization using connectionist reinforcement learning algorithms. Connection Science, 3(3):241–268, 1991. Lin Xiao. Dual averaging methods for regularized stochastic learning and online optimization. Journal of Machine Learning Research, 11(Oct):2543–2596, 2010. Brian D Ziebart. Modeling Purposeful Adaptive Behavior with the Principle of Maximum Causal Entropy. PhD thesis, Carnegie Mellon University, 2010. Brian D Ziebart, J Andrew Bagnell, and Anind K Dey. Modeling interaction via the principle of maximum causal entropy. In International Conference on Machine Learning (ICML), pages 1247–1254, 2010. A. Zimin and G. Neu. Online learning in episodic Markovian decision processes by relative entropy policy search. In NIPS-26, pages 1583–1591, 2013. 18 A unified view of entropy-regularized MDPs Appendix A. Complementary Technical Results A.1. Convexity of the negative conditional entropy Let us consider the joint state-action distribution µ on the finite set X × A. We denote P νµ (x) = a µ(x, a) and πµ (a|x) = µ(x, a)/νµ (x) for all x, a. We study the negative conditional entropy of (X, A) ∼ µ as a function of µ: RC (µ) = X x,a X µ(x, a) µ(x, a) = µ(x, a) log . µ(x, a) log P ν (x) µ b µ(x, b) x,a We will study the Bregman divergence DRC corresponding to RC : DRC (µkµ0 ) = RC (µ) − RC (µ0 ) − ∇RC (µ0 )> (µ − µ0 ), P where the inner product between two vectors v, w ∈ RX ×A is w> v = x,a v(x, a)w(x, a). Our aim is to show that DRC is nonnegative, which will imply the convexity of RC . We begin by computing the partial derivative of RC (µ) with respect to µ(x, a): X µ(x, b) µ(x, a) µ(x, a) ∂RC (µ) = log +1− = log , ∂µ(x, a) νµ (x) ν ν µ (x) µ (x) b where we used the fact that ∂νµ (x)/∂µ(x, a) = 1 for all a. With this expression, we have RC (µ0 ) + ∇RC (µ0 )> (µ − µ0 ) = X = X µ0 (x, a) log µ0 (x, a) µ0 (x, a) X + (µ(x, a) − µ0 (x, a)) log νµ0 (x) νµ0 (x) x,a µ(x, a) log µ0 (x, a) . νµ0 (x) x,a x,a Thus, the Bregman divergence takes the form   X µ0 (x, a) µ(x, a) 0 DRC (µkµ ) = µ(x, a) log − log νµ (x) νµ0 (x) x,a = X x,a µ(x, a) log X X πµ (a|x) πµ (a|x) = ν(x) πµ (a|x) log . πµ0 (a|x) πµ0 (a|x) x a This proves that the Bregman divergence corresponding to RC coincides with DC , as claimed. To conclude the proof, note that DC is the average relative entropy between the distributions πµ and πµ0 —that is, a sum a positive terms. Indeed, this shows that DC is nonnegative on the set of state-action distributions ∆(X × A), proving that RC (µ) is convex. 19 Neu Gómez Jonsson A.2. Derivation of optimal policies Here we prove the results stated in Equations (9)-(11) and Proposition 2, which give the expressions for the dual optimization problems and the optimal solutions corresponding to the primal optimization problem (6), for the two choices of regularization function DS (·kµ0 ) and DC (·kµ0 ). We start with generic derivations that will be helpful for analyzing both cases and then turn to studying the individual regularizers. Recall that the primal optimization objective in (6) is given by ( ) X 1 max ρeη (µ) = max µ(x, a)r(x, a) − R(µ) , µ∈∆ µ∈∆ η x,a where ∆, the feasible set of stationary distributions, is defined by the following constraints: X X µ(y, b) = µ(x, a)P (y|x, a), ∀y ∈ X , (17) x,a b X µ(x, a) = 1, (18) µ(x, a) ≥ 0, ∀(x, a) ∈ X × A. (19) x,a We begin by noting that for all state-action pairs where µ0 (x, a) = 0, the optimal solution µ∗η (x, a) will also be zero, thanks to the form of our regularized objective. Thus, without loss of generality, we will assume that all states are recurrent under µ0 : µ0 (x, a) > 0 holds for all state-action pairs. For any choice of regularizer R, the Lagrangian of the primal (6) is given by X X X 1 µ(y, b) V (y) µ(x, a)P (y|x, a) − L(µ; V,λ, ϕ) = µ(x, a)r(x, a) − R(µ) + η x,a y x,a b ! X X +λ 1− µ(x, a) + ϕ(x, a)µ(x, a) X x,a x,a ! = X = X x,a x,a µ(x, a) r(x, a) + X P (y|x, a)V (y) − V (x) − λ + ϕ(x, a) y 1 − R(µ) + λ η 1 µ(x, a) (A(x, a) − λ + ϕ(x, a)) − R(µ) + λ, η where V , λ and ϕ are the Lagrange multipliers5 , and A is the advantage function for V . Setting the gradient of the Lagrangian with respect to µ to 0 yields the system of 5. Technically, these are KKT multipliers as we also have inequality constraints. However, these will be eliminated by means of complementary slackness in the next sections. 20 ! A unified view of entropy-regularized MDPs equations ∂L 1 ∂R(µ) = (A(x, a) − λ + ϕ(x, a)) − , ∂µ(x, a) η ∂µ(x, a) ∂R(µ) = η (A(x, a) − λ + ϕ(x, a)) , (20) ⇔ ∂µ(x, a) for all x, a. By the first-order stationary condition, the unique optimal solution µ∗η satisfies this system of equations. To obtain the final solution we have to compute the optimal values Vη∗ , λ∗η and ϕ∗η of the Lagrange multipliers by optimizing the dual optimization objective g(V, λ, ϕ) = L(µ∗η ; V, λ, ϕ), and insert into the expression for µ∗η . V and λ are unconstrained in the dual, while ϕ satisfies ϕ(x, a) ≥ 0 for each (x, a) ∈ X × A. We give the derivations for each regularizer below. 0= A.3. The relative entropy P Here we prove the results for R(µ) = DS (µkµ0 ) = x,a µ(x, a) log µµ(x,a) 0 (x,a) . The gradient of R is ∂R(µ) µ(x, a) = log 0 + 1. ∂µ(x, a) µ (x, a) The optimal state-action distribution µ∗η is now directly given by Equation (20): µ∗η (x, a) = µ0 (x, a) exp (η (A(x, a) − λ + ϕ(x, a)) − 1) . (21) For µ∗η to belong to ∆, it has to satisfy Constraints (18) and (19). Because of the exponent in (21), µ∗η (x, a) ≥ 0 trivially holds for any choice of ϕ(x, a), and complementary slackness implies ϕ∗η (x, a) = 0 for each (x, a). Eliminating ϕ and inserting µ∗η into Constraint (18) gives us X 1= µ0 (x, a) exp (ηA(x, a)) e−ηλ−1 , x,a 1 ⇔ λ= η ! log X µ0 (x, a) exp (ηA(x, a)) − 1 . (22) x,a Since the value of λ is uniquely determined by (22), we can optimize the dual over V only. The dual function is given by   X µ∗η (x, a) 1 1 ∗ ∗ g(V ) = L(µη ; V, λ) = µη (x, a) A(x, a) − λ − log 0 +λ= +λ η µ (x, a) η x,a X 1 = log µ0 (x, a) exp (ηA(x, a)) . η x,a This is precisely the dual given in Equation (10). Note that this dual function has no associated constraints. The expression for the optimal state-action distribution in Equation (9) is obtained by inserting the advantage function A∗η corresponding to the optimal value function Vη∗ into (21). 21 Neu Gómez Jonsson A.4. The conditional entropy We next prove the results for R(µ) = DC (µkµ0 ) = gradient of R is P x,a µ(x, a) log ππµ0(a|x) . The (a|x) µ ∂R(µ) πµ (a|x) X µ(x, b) ∂πµ (b|x) = log + · . ∂µ(x, a) πµ0 (a|x) πµ (b|x) ∂µ(x, a) b Since the policy is defined as πµ (a|x) = µ(x,a) , νµ (x) its gradient with respect to µ is  I{a=b} µ(x, b) ∂πµ (b|x) 1 = − I − π (b|x) , ∀x ∈ X , a, b ∈ A. = µ {a=b} ∂µ(x, a) νµ (x) νµ (x)2 νµ (x) Inserting into the expression for the gradient of R yields  πµ (a|x) X πµ (b|x) ∂R(µ) = log + I{a=b} − πµ (b|x) ∂µ(x, a) πµ0 (a|x) πµ (b|x) b X πµ (a|x) πµ (a|x) πµ (b|x) = log = log +1− . πµ0 (a|x) πµ0 (a|x) b The optimal policy πµ∗ is now directly given by Equation (20): πη∗ (a|x) = πµ0 (a|x) exp (η (A(x, a) − λ + ϕ(x, a))) . (23) For µ∗η to belong to ∆, it has to satisfy Constraint (19). Because of the exponent in (23) and the fact that µ∗η (x, a) ∝ πη∗ (a|x), µ∗η (x, a) ≥ 0 trivially holds for any choice of ϕ(x, a), implying that ϕ∗η (x, a) = 0 for each (x, a) by complementary slackness. Since πη∗ (a|x) = µ∗η (x,a) , νη∗ (x) X we also obtain the following set of constraints: πη∗ (a|x) = a X µ∗η (x, a) a νη∗ (x) = νη∗ (x) = 1, ∀x ∈ X . νη∗ (x) Inserting the expression for πη∗ yields 1= X πµ0 (a|x) exp (ηA(x, a)) e−ηλ , ∀x ∈ X . a If we expand the expression for A(x, a) and rearrange the terms we obtain !! X X 1 P (y|x, a)V (y) πµ0 (a|x) exp η r(x, a) − λ + , ∀x ∈ X . V (x) = log η a y (24) 22 A unified view of entropy-regularized MDPs The dual function is obtained by inserting the expression for µ∗ into the Lagrangian:   X πη∗ (a|x) 1 ∗ ∗ g(V, λ) = L(µη ; V, λ) = µη (a|x) A(x, a) − λ − log + λ = λ. (25) 0 (a|x) η π µ x,a Together, Equations (24) and (25) define the dual optimization problem in Proposition 2. The expression for the optimal policy in Equation (11) is obtained by inserting the optimal advantage function A∗η into (23). We remark that to recover the optimal stationary state-action distribution µ∗η , we would have to insert the expression for the optimal policy πη∗ into Constraints (17) and (18), and solve for the stationary state distribution νη∗ . However, this is not necessary since µ∗η and νη∗ are not required to solve the dual function or to compute the optimal policy. Appendix B. The regularized Bellman operators In this section, we define the regularized Bellman operator Tπ|π0 corresponding to the policy π and regularized with respect to baseline π 0 as ! X π(a|x) X 0 0 π|π 0 P (x |x, a)V (x ) (∀x) . + Tη [V ](x) = π(a|x) r(x, a) − log 0 π (a|x) a x0 Similarly, we define the regularized Bellman optimality operator T∗|π0 with respect to baseline π 0 as !! X X 1 0 Tη∗|π [V ](x) = log π 0 (a|x) exp η r(x, a) + P (y|x, a)V (y) (∀x) , η a y and the regularized greedy policy with respect to the baseline π 0 as !! 0 Gπη [V ](a|x) ∝ π 0 (a|x) exp η r(x, a) + X P (y|x, a)V (y) − V (x) . y With these notations, we can define the regularized relative value iteration algorithm with respect to π 0 by the iteration 0 πk+1 = Gπη [Vk ] 0 Vk+1 (x) = Tη∗|π [Vk ](x) − δk+1 (26) ∗|π 0 for some δk+1 lying between the minimal and maximal values of Tη [Vk ]. A common ∗|π 0 technique is to fix a reference state x0 and choose δk+1 = Tη [Vk ](x0 ). Similarly, we can define the regularized policy iteration algorithm by the iteration  ∞ π0 πk+1 |π 0 πk+1 = Gη [Vk ] Vk+1 (x) = Tη [Vk ](x) − δk+1 , (27) 23 Neu Gómez Jonsson with δk+1 defined analogously. For establishing the convergence of the above procedures, it is crucial to ensure ∗|π 0 that the operator Tη is a non-expansion: For any value functions V1 and V2 , we need to ensure 0 0 Tη∗|π [V1 ] − Tη∗|π [V2 ] ≤ kV1 − V2 k for some norm. We state the following result claiming that the above requirement indeed holds and present the simple proof below. We note that analogous results have been proven several times in the literature, see, e.g., (Fox et al., 2016; Asadi and Littman, 2016). ∗|π 0 is a non-expansion for the supremum norm kf k∞ = maxx |f (x)|. P Proof For simplicity, let us introduce the notation Q1 (x, a) = r(x, a)+ y P (y|x, a)V1 (y), with Q2 defined analogously, and ∆ = Q1 − Q2 . We have Proposition 5 Tη ∗|π 0 Tη ∗|π 0 [V1 ](x) − Tη ! 1 [V2 ](x) = η log X π 0 (a|x) exp (ηQ1 (x, y)) − log X π 0 (a|x) exp (ηQ2 (x, y)) a a P   0 π (a|x) exp (ηQ (x, y)) 1 1 = log Pa 0 π (a|x) exp (ηQ η 2 (x, y)) Pa 0   exp (η (Q2 (x, y) + ∆(x, y))) 1 a π (a|x) P 0 = log η a π (a|x) exp (ηQ2 (x, y)) X 1 p(x, a) exp (η∆(x, a)) (with an appropriately defined p) = log η a 1 log max exp (η∆(x, a)) a η X = max ∆(x, a) = max P (y|x, a) (V1 (y) − V2 (y)) ≤ a a y ≤ max |V1 (y) − V2 (y)| . y With an analogous technique, we can also show the complementary inequality 0 0 Tη∗|π [V2 ](x) − Tη∗|π [V1 ](x) ≤ max |V2 (y) − V1 (y)| , y which concludes the proof. ∗|π 0 Together with the easily-seen fact that Tη is continuous, this result immediately ∗|π 0 implies that Tη has a fixed point by Brouwer’s fixed-point theorem. Furthermore, this insight allows us to treat the value iteration method (26) as an instance of generalized value iteration, as defined by Littman and Szepesvári (1996). ∗|π 0 We now argue that regularized value iteration converges to the fixed point of Tη . If the initial value function V0 is bounded, then so is Vk for each k since the operator 24 A unified view of entropy-regularized MDPs ∗|π 0 Tη is a non-expansion. Similar to Section 3, we assume without loss of generality that the initial reference policy π0 has full support, i.e. π0 (a|x) > 0 for each recurrent 0 state x and each action a. Inspecting the greedy policy operator Gπη , it is easy to show by induction that πk has full support for each k. In particular, πk+1 (a|x) only equals 0 if either πk (a|x) equals 0 or if the exponent Ak (x, a) equals −∞, which is only possible if Vk is unbounded. Now, since πk has full support for each k, any trajectory always has a small probability of reaching a given recurrent state. We can now use a similar argument as Bertsekas (2007, Prop. 4.3.2) to show that regularized value iteration converges to the ∗|π 0 fixed point for Tη . B.1. The proof of Lemma 3 Let µ and µ0 be the respective stationary distributions of π and π 0 . The statement follows easily from using the definition of Aπη : X x,a µ 0 (x, a)Aπη (x, a) X 1 log π(a|x) = µ (x, a) r(x, a) − − ρ e (µ) + P (y|x, a)Vηπ (y) − Vηπ (x) 0 η log π (a|x) x,a y ! X X µ0 (x, a) P (y|x, a)Vηπ (y) − Vηπ (x) = ρe(µ0 ) − ρe(µ) + X 0 x,a y 0 = ρe(µ ) − ρe(µ), where the last step follows from the stationarity of µ0 . B.2. Regularized policy gradient Here we prove Lemma 4 which gives the gradient of the regularized average reward ρeη (θ) when the policy πθ is parameterized on θ. Following Sutton et al. (1999), we first compute the gradient of Vηπθ : ! X 1 πθ (a|x) r(x, a) − log 0 − ρeη (θ) + P (y|x, a)Vηπθ (y) η π (a|x) y ! X ∂Vηπθ (y) 1 ∂πθ (a|x) ∂ ρeη X + πθ (a|x) − − + P (y|x, a) . ηπθ (a|x) ∂θi ∂θi ∂θi a y ∂Vηπθ (x) X ∂πθ (a|x) = ∂θi ∂θi a 25 ! Neu Gómez Jonsson Rearranging the terms gives us X 1 1 πθ (a|x) r(x, a) − log 0 − ρeη (θ) + P (y|x, a)Vηπθ (y) − η π (a|x) η y ∂ ρeη X ∂πθ (a|x) = ∂θi ∂θi a + X πθ (a|x) X a = P (y|x, a) y X ∂πθ (a|x) ∂θi a Aπη θ (x, a) + ! ∂Vηπθ (y) ∂Vηπθ (x) − ∂θi ∂θi X πθ (a|x) a X y ∂Vηπθ (y) ∂Vηπθ (x) P (y|x, a) − . ∂θi ∂θi P The last equality follows from the fact that since a ∂πθ (a|x)/∂θi = 0 for each x, we can add any state-dependent constant to the multiplier of ∂πθ (a|x)/∂θi ; adding the term η1 − Vηπθ (x) results in the given expression. Summing both sides over the stationary state distribution νπθ yields ∂ ρeη X ∂πθ (a|x) πθ ∂ ρeη X = νπθ (x) = νπθ (x) Aη (x, a) ∂θi ∂θ ∂θ i i x x,a + XX y = X = X x,a x,a νπθ (x)πθ (a|x)P (y|x, a) x,a ∂Vηπθ (y) X ∂Vηπθ (x) − νπθ (x) ∂θi ∂θi x X ∂Vηπθ (y) X ∂Vηπθ (x) ∂πθ (a|x) πθ Aη (x, a) + νπθ (y) − νπθ (x) νπθ (x) ∂θi ∂θi ∂θi y x νπθ (x) ∂πθ (a|x) πθ Aη (x, a). ∂θi To conclude the proof it is sufficient to note that µπθ (x, a) ∂ log πθ (a|x) µπ (x, a) ∂πθ (a|x) ∂πθ (a|x) = θ = νπθ (x) . ∂θi πθ (a|x) ∂θi ∂θi B.3. The closed form of the TRPO update Here we derive the closed-form solution of the TRPO update. To do so, we first briefly summarize the mechanism of the algorithm. The main idea of Schulman et al. (2015) is replacing ρ(µ0 ) by the surrogate X X Lπ (π 0 ) = ρ(π) + νπ (x) π 0 (a|x)Aπ∞ (x, a), x a 26 A unified view of entropy-regularized MDPs where Aπ∞ is the unregularized advantage function corresponding to policy π. Furthermore, TRPO uses the regularization term DTRPO (µkµ0 ) = X νµ0 (x) X x πµ (a|x) log a 6 πµ (a|x) . πµ0 (a|x) The difference between L + DTRPO and ρ + DC is that the approximate version ignores the impact of changing the policy π on the stationary distribution. Given this surrogate objective, TRPO approximately computes the distribution   1 (28) µk+1 = arg max Lµk (µ) − DTRPO (µkµk ) . η µ∈∆ Observing that the TRPO policy update can be expressed equivalently as (  ) X X 1 π(a|x) π(a|x) Aπ∞k (x, a) − log πk+1 = arg max νµk (x) , η πk (a|x) π a x we can see that the policy update can be expressed in closed form as πk πk+1 (a|x) ∝ πk (a|x)eηA∞ (x,a) . This update then can be seen as a regularized greedy step with respect to the value function of the previous policy πk . 6. This form is inspired by the well-known identity we state as Lemma 3. 27
2
Learning Policies for Adaptive Tracking with Deep Feature Cascades Chen Huang Simon Lucey Deva Ramanan Robotics Institute, Carnegie Mellon University arXiv:1708.02973v2 [cs.CV] 13 Sep 2017 [email protected] {slucey,deva}@cs.cmu.edu Pixel layer + correlation filters Abstract Visual object tracking is a fundamental and time-critical vision task. Recent years have seen many shallow tracking methods based on real-time pixel-based correlation filters, as well as deep methods that have top performance but need a high-end GPU. In this paper, we learn to improve the speed of deep trackers without losing accuracy. Our fundamental insight is to take an adaptive approach, where easy frames are processed with cheap features (such as pixel values), while challenging frames are processed with invariant but expensive deep features. We formulate the adaptive tracking problem as a decision-making process, and learn an agent to decide whether to locate objects with high confidence on an early layer, or continue processing subsequent layers of a network. This significantly reduces the feedforward cost for easy frames with distinct or slow-moving objects. We train the agent offline in a reinforcement learning fashion, and further demonstrate that learning all deep layers (so as to provide good features for adaptive tracking) can lead to near real-time average tracking speed of 23 fps on a single CPU while achieving state-of-the-art performance. Perhaps most tellingly, our approach provides a 100X speedup for almost 50% of the time, indicating the power of an adaptive approach. Deep convolutional layers Template frame Current frame Easy frame Agent Output at this layer or forward to the next layer Hard frame Figure 1. Learning policies for adaptive tracking with deep feature cascades. The agent decides whether we can accurately locate objects on an early layer of the cascade. This avoids the need to always wait for the last layer to make decisions, saving a substantial amount of feed-forwarding time. designing a tracker that has both high accuracy and high speed. Real-time tracking methods like TLD [21] and correlation filters [19] usually rely on low-level features that are not descriptive enough to disambiguate target and background. Several recent works [15, 27, 11, 31, 10] overcome this limitation by learning correlation filters on hierarchical deep features, but the real-time capacity largely fades away. Other deep trackers [41, 30, 40] take full advantage of the end-to-end learning, and fine-tune the deep network online to achieve top performance. However, even on a high-end GPU, the speed of such trackers is usually around 1 fps which is too slow for practical use. 1. Introduction Visual Object Tracking (VOT) is a fundamental problem in vision. We consider the single object tracking task, where an object is identified in the first video frame and should be tracked in subsequent frames, despite large appearance changes due to object scaling, occlusion, and so on. VOT is the basic building block of many time-critical systems such as video surveillance and autonomous driving. Thus it is important for a visual tracker to meet the strict constraints of time and computational budget, especially on mobile or embedded computing architectures where real-time analysis perception is often required. Although much progress has been made in the tracking literature, there still exist tremendous challenges in Two recent deep trackers [3, 18] significantly boost their speed by deploying fixed convolutional networks without any online learning. During tracking, the pre-trained network is simply traversed in a feed-forward pass for similarity evaluation or location regression, allowing to track objects at real-time speeds on GPU. Nevertheless, on a modern CPU, smartphone or tablet with much less computing power, such deep trackers can only process a couple of frames per second, far below the normal video frame-rate 30 fps. Obviously, the major computational burden comes from the forward pass through the entire network, and can 1 be larger with deeper architectures. We aim to improve both the accuracy and speed of deep tracking, instead of trading off the quality for speed by e.g. using compressed models [1]. We propose to learn to speed up deep trackers in an adaptive manner. Our adaptive approach builds on the observation that the tracking complexity varies across frames. For example, it is usually effective to use features from the last layer of a deep network to track objects undergoing large appearance change (e.g. abrupt motion) - as these higher-level features are more tolerant to dramatic appearance variation [27]. However, when the object is visually distinct or barely moves, early layers are in most scenarios sufficient for precise localization - offering the potential for substantial computational savings. In the extreme case, the “zeroth” pixel-level layer may suffice for such easy frames, as evidenced by the success of pixelbased correlation filters. Such an adaptive strategy crucially depends on making the right decision - should the tracker stop at the current feature layer or keep computing features on the next layer? To this end, we learn an agent to automatically achieve this goal as illustrated in Fig. 1. The agent learns to find the target at each layer, and decides if it is confident enough to output and stop there. If not, it moves forward to the next layer to continue. This is equivalent to learning a “timely” decision policy to choose the optimal layer for tracking. We will show such policy learning is much more robust than heuristically thresholding the response map of the current active layer. It is also in sharp contrast to the layer selection mechanism in [40], which only selects from two fixed levels of convolutional layers after the entire forward pass is finished. Instead, we formulate this problem as a decision-making process, making sequential decisions with early stopping ability. Specifically, we learn the policy in a reinforcement learning [29] fashion during the training phase, and simply apply the policy for adaptive tracking at test time. In doing so, we are able to provide a speedup of around 10× (on average) over the baseline deep tracker [3] and achieve even higher accuracies on existing OTB [43] and VOT [22] tracking benchmarks. Perhaps most tellingly, our approach provides a 100× speedup almost 50% of the time, indicating the power of an adaptive approach - it turns out that most frames are quite easy to track! Accuracy is improved because each layer of the network is directly trained to be informative for adaptive tracking, similar to the past approaches for “deep supervision” [25]. Concretely, our adaptive tracker works by defining object templates across multiple layers of a network, including the “zeroth” pixel layer. Templates are evaluated across Region of Interest (ROI) with a convolutional filter. We use fast correlation filters [19] to compute response maps for lower layers of our network, where Fourier processing significantly speeds up the convolutional procedure (Fig. 1). We refer to our approach as EArly-Stopping Tracker (EAST). On a single CPU, it has a near real-time average speed of 23.2 fps, and is about 190 fps almost 50% of the time. This makes it the first CPU-friendly deep tracker among the top benchmark performers. It is worth noting that our policy learning method is quite generic. Further, it is readily applied to train end-to-end with an existing deep network for other time-critical vision tasks besides visual tracking. 2. Related Work Real-time tracking and correlation filters: Visual tracking methods can rely on either generative (e.g. [32]) or discriminative (e.g. [16]) models. Discriminative models are often found to outperform in accuracy by discriminating the target from background. Such trackers can usually run fast using hand-crafted features (e.g. HOG [9]) and various learning methods of P-N learning [21], structured SVM [16], multi-expert entropy minimization [45], and correlation filter [4]. Among them, Discriminative Correlation Filter (DCF)based methods [4, 19] are the family of tracking methods with high efficiency and high accuracy as well. The fast speed of DCF is due to its efficient use of all spatial shifts of a training sample by exploiting the discrete Fourier transform. The pioneering MOSSE [4] and improved Kernelized Correlation Filter (KCF) [19] trackers can operate at 669 fps and 292 fps respectively on a single CPU, which far exceeds the real-time requirement. Recent advances of DCF have achieved great success by the use of multi-feature channels [14, 15, 27, 11, 31, 10], scale estimation [13, 26], longterm memory [28], and boundary effect alleviation [11, 12]. However, with increasing accuracy comes a dramatic decrease in speed (0.3–11 fps on a high-end GPU). Tracking by deep learning: Directly applying correlation filters on the multi-dimensional feature maps of deep Convolutional Neural Networks (CNNs) is one straight-forward way of integrating deep learning for tracking. Usually the deep CNN is fixed, and the DCF trackers trained on every convolutional layer are combined by a hierarchical ensemble method [27] or an adaptive Hedge algorithm [31]. Danelljan et al. [15] recently introduced a continuous spatial domain formulation C-COT, to enable efficient integration of multi-resolution deep features. C-COT and its improved ECO [10] can achieve top performance in the VOT challenge [22], but the tracking speed is still slow due to the high dimension of the entire deep feature space. Another category of deep trackers [41, 30, 40] update a pre-trained CNN online to account for the target-specific appearance at test time. Such trackers usually take a classification approach to classify many patches and choose the highest scoring one as the target object. Unfortunately, online training and exhaustive search severely hamper their speed. The top performing tracker MDNet [30] has the GPU speed of only 1 fps or so. Recent advances include using Recurrent Neural Networks (RNNs) [20, 7] to model temporal information using an attention mechanism, but the speed remains slow. One common reason for the slow speed of the abovementioned deep trackers is they always conduct a complete feed-forward pass to the last CNN layer. This ignores the fact that the tracking complexity differs across varying conditions. One of our conclusions is that most frames in current video benchmarks are rather easy. For those frames, forwarding to only early layers may suffice. In principle, such an insight can be used to speed up many recent realtime deep trackers, such as GOTURN [18] (165 fps on GPU) and SiamFC [3] (86 fps on GPU), to make them more CPU-friendly with near frame-rate speed. Feature selection in tracking: Good features are important to tracking. The initial DCF trackers were limited to a single feature channel, e.g. a grayscale image in MOSSE [4]. The DCF framework was later extended to multi-channel features such as HOG [13, 19], Haar-like features [16], binary patterns [21] and Color Attributes [14]. Generally, the hand-crafted features are cheap to compute, but they are not discriminative enough to handle complex tracking scenarios. Many recent deep trackers (e.g. [41, 30]) exploit the semantically robust features from the last CNN layer (fullyconnected). However, spatial details of the tracked object are lost in the last layer which is not optimal for visual tracking. Danelljan et al. [11] found the first convolutional layer is very suitable for tracking. Other works [15, 27, 31, 10] choose to utilize all the hierarchical convolutional features, where early layers can preserve high spatial resolution and deep layers are more discriminative. In this paper, we make the best of hand-crafted and deep convolutional features in a cascaded structure, and learn an agent to select a minimum sequence of feature layers for fast tracking purposes. Unlike FCNT [40] that selects features from two pre-defined layers only after a complete forward pass, our selection is sequential and can stop early at any layer with enough confidence. Feature cascades: CNNs are a natural cascaded architecture with increasingly abstract feature representations. Contemporary works either improve the cascade’s optimality by deep layer supervision [25], or stack multiple CNNs into a deeper cascade for coarse-to-fine [35] or multi-task [8] predictions. Our work differs in learning a decision policy of using only early feature layers in a cascade, and in combining feature cascades and reinforcement learning [36] to achieve this goal. Our approach bears some similarity to the “attentional cascade” structure [39] which uses a cascade of gradually more complex classifiers. The difference is that attentional cascade aims to use early classifiers to eliminate easy negatives and reduce the burden of complex classifier evaluation, whereas we aim to use these early layers to make a strong decision as early as possible. Reinforcement learning for tracking: Reinforcement learning (RL) [29, 36] is capable of learning good policies to take a sequence of actions based on trail and error. It has been successfully applied to vision tasks (e.g. object detection [5]) by treating them as a decision-making process. For visual tracking, there are two recent works that use RL to temporally attend target regions [44] and select suitable template [6]. Our work is the first one to use RL to learn an early decision policy for speeding up deep tracking. 3. Method We use the deep Convolutional Neural Network (CNN) as a rich feature cascade for robust visual tracking. Given an input video frame at time t, the process of tracking an object with bounding box can be seen as the problem of maximizing a confidence function fl : Ht → R over the set of hypothesized object regions Rt : rt∗ = arg max fl (r), r∈Ht (1) where Ht usually consists of regions around the object location in the previous frame, and l denotes the feature layer at which the object confidence is obtained. Many deep trackers [41, 30] exploit l = L as the last fully-connected layer or last convolutional layer of AlexNet [24] or deeper VGGNet [34]. Other trackers [15, 27, 31, 10] exploit a full layer set {l}L l=1 of all the convolutional layers to take the best advantage of feature hierarchies. While these methods have been successful and effective, they are still slow and may not be needed when tracking during easy frames. In this paper, we propose a principled sequential method that accumulates confidence fl=1,...,Lt (r) from an adapt tively small set of feature layers {l}L l=1 in order to track efficiently without losing accuracy. For example, Lt = 2 convolutional layers C1–C2 can suffice to track a distinct face in Fig. 3; but for a blurry face in cluttered backgrounds, we may want to gather more evidence from a deeper layer C5. During such sequential search, our method needs to adjust the bounding box to progressively localize the object using more and more robust features. Ideally, we would like to minimize the number of forwarded layers necessary to locate objects. A naive approach might use a heuristic for determining when to advance to the next layer: for example, one might advance if the maximum value of the current response map is below a threshold. However, defining such heuristics can be difficult when the response map is ambiguous or has multiple peaks (e.g. Fig. 3). Instead, we propose to train a functioning agent end to end by deep reinforcement learning [29]. The agent learns the action and search policy (including the early stopping criteria) so that it can make decisions under uncertainty to reach the target. Fig. 2 shows the framework of our policy learning. Pixel layer Template frame Cropped image 127*127*3 HOG layer Deep convolutional layers C2 C3 C4 C1 6*6*128 Q-Net C5 Global scaling Action history 32-d 17*17 Averaged 128-d 128-d score map 8 actions Q-Net Q-Net Q-Net Q-Net Q-Net Q-Net Local scaling Reshaped Fully-connected layers score 289-d Current frame Search image 255*255*3 No scaling 22*22*128 Stop Figure 2. System framework of our EArly-Stopping Tracker (EAST) by policy learning. C1 C2 C1 C2 C3 C4 C5 1 1,2 0 0 4,5 2,3 1 0 3 2 0,1 More examples of used layers and box actions Figure 3. Example sequences of actions taken to adjust the bounding box scale over deep convolutional layers. Box translation is determined by the relative position of maximum score on the score map. Note each score map is averaged with all the maps from preceding layers. Our agent learns to wisely act upon the score maps. It terminates the search early if the confidence score is highly peaked. When the score map is ambiguous (e.g. has two peaks for a blurry face in cluttered backgrounds), the agent postpones decision and enlarges the box according to the more unambiguous score map at the next layer. Further actions of box scaling are performed with stronger confidence. 3.1. Fully-Convolutional Siamese Network In this section, we review the fully-convolutional Siamese tracker [3], which we make use of for its good trade-off between speed (86 fps on GPU) and accuracy in exploiting deep convolutional layers. Other trackers are either too slow [15, 27, 31, 10] as a baseline (<11 fps on GPU), or do not provide explicit response maps (direct regression instead in [18]) for our policy learning purposes. The Siamese network [3] is trained offline to locate a 127 × 127 template image z within a larger 255 × 255 search image x. A similarity function is learned to compare the template image z to a candidate region of the same size in the search image x, so as to return a high score for the truth region and low score otherwise. Such similarity evaluation is fully-convolutional with respect to x in the network, much more efficient than exhaustive search. Specifically, a cross-correlation layer is proposed to compute similarity for all translated sub-regions in x in one pass: Fl (z, x) = ϕl (z) ∗ ϕl (x) + vI, (2) where ϕl is the convolutional feature embedding at layer l = 5 (i.e. C5 layer), and v ∈ R is an offset value. Here Fl (·, ·) is a confidence score map of size 17×17, as opposed to the single confidence score fl (·) in Eq. 1. During tracking, this Siamese network simply evaluates the similarity online between the template image in previous frame and the search region in current frame, leading to fast speed. The relative position of the maximum score multiplied by the stride of the network, gives the object translation from frame to frame. Our goal is to learn an early decision policy from these confidence score maps Fl , to adaptively 1) predict the object bounding box across layers, and 2) stop early at a layer l < 5 when sufficiently confident about the prediction. Note the score map dimension depends on the size of input feature maps. The score map Fl on an early layer l will have a larger resolution than 17 × 17, and so we downsample to this size to facilitate learning. Also, SiamFC [3] searches over multiple scales of the search image to handle scale variations. We only work on the original scale for high efficiency, and learn to gradually infer the box scale from heatmaps computed during the single forward-pass. 3.2. Learning Policies with Reinforcement Learning We treat the tracking problem as a Markov Decision Process (MDP) where an agent can make a sequence of actions across feature layers, see Fig. 2. This agent learns when to stop advancing to the next layer, as well as how to to gradually deform a bounding box once per layer, which is initialized to the estimated box from the previous frame. The ultimate goal is to output a tight box around the object with as few as layers as possible. The challenge is to be able to operate with rewards that rule out supervision at each step, and at the same time, to minimize the number of steps to locate the target given its changing complexity. We train the agent in a reinforcement learning (RL) setting to learn decision policies. In the RL setting there are a set of states S and actions A, and a reward function R. At each step on layer l, the agent examines the current state Sl , and decides on the action Al to either transform the box or stop with a box output. The action Al is expected to reduce the uncertainty in localizing the object, and receives positive or negative reward Rl reflecting how well the current box covers the object and how few steps are used before action stop. By maximizing the expected rewards, the agent learns the best policy to take actions and can explicitly balance accuracy (search for more layers) and efficiency (stop early if highly confident). Actions: Our action set A includes seven anisotropic scaling transformations to a box and one stop action to terminate search. We do not use the agent to predict the centroid of the box, and instead compute it directly from the relative position of the maximum score on score map as in Eq. 1. We also experimented with requiring the agent to report box translations, but found directly inferring them from the score maps simplified training and increased convergence (due to the smaller space of actions A). For scaling actions, there are two global and four local (modify aspect ratio) transformations as shown in Fig. 2. Similar to [5], any of these actions makes a combined horizontal and vertical change to the box by a factor of 0.2 relative to its current size. We also introduce a no scaling action that does not scale the box at all. This action allows the agent to postpone decision when the current score map is ambiguous or a decision simply cannot be made. Fig. 3 exemplifies this case where two peaks exist on the first-layer score map for a cluttered scene. The agent decides not to act on this map but waits for a more unambiguous map at the next layer to act (enlarge the box). States: The state Sl is represented as a tuple (Fl0 , hl ), where Fl0 is the score map and hl is a vector of the history of taken Pl actions. We define Fl0 = k=1 Fk /l as the average of the score map at current layer l and all its preceding maps from earlier layers. Thus Fl0 not only encodes the currently observed confidence but also the confidence history that has been collected. This is found to work better empirically than using Fl only, and is similar to the hypercolumn representation [17] with the benefits of simultaneously leveraging information from early layers that capture fine-grained spatial details and deeper layers that capture semantics. Also, the resulting robustness comes at a negligible cost in averaging the score maps already obtained. The history vector hl keeps track of the past 4 actions. Each action in the vector is represented by an 8-dimensional one-hot vector or zero vector (when processing the first layer). We find that including hl ∈ R32 helps stabilize action trajectories. Rewards: The reward function R(Sl−1 , Sl ) reflects the localization accuracy improvement from state Sl−1 to Sl after taking a particular action Al . The accuracy is measured by the Intersection-over-Union (IoU) between the predicted box b and ground-truth box g. We can formally define IoU as IoU (b, g) = area(b ∩ g)/area(b ∪ g). Since each state Sl is associated with a box bl , the reward function is then defined following [5]:   sign(IoU (bl , g) − IoU (bl−1 , g)), Al 6= stop R(Sl−1 , Sl ) = +3, IoU (bl , g) ≥ 0.6, Al = stop   −3, IoU (bl , g) < 0.6, Al = stop, (3) where the accuracy improvement is quantized to ±1 if the current action is not stop. This reward scheme encourages positive transformations even with small accuracy improvement. If there is no transformation for further improvement, or if the agent already arrives at the last layer l = L, the action should be stop. In this case, the reward function will penalize the predicted box bl with IoU less than 0.6. Note such a reward scheme implicitly penalizes a large number of layers l since Q-learning (detailed next) models the expected future rewards when deciding on an action (positive or negative). Deep Q-learning: The optimal policy of selecting actions should maximize the sum of expected rewards on a given frame. Since we do not have a priori knowledge about the correct layer or action to choose, we address the learning problem through deep Q-learning [29]. This approach learns an action-value function Q(Sl , Al ) to select the action Al+1 that gives the highest reward at each layer. The learning process iteratively updates the action-selection policy by: Q(Sl , Al ) = R + γ max Q(S 0 , A0 ), 0 A (4) where Q(S 0 , A0 ) is the future reward and γ the discount factor. The function Q(S, A) is learned by a deep Q-Network as illustrated in Fig. 2. It takes as input the state representation S, i.e. the reshaped score vector and action history vector. The network consists of two 128-dimensional fullyconnected layers, finally mapping to 8 actions. Each fully- connected layer is randomly initialized, and is followed by ReLU and dropout regularization [24]. Note during training, we not only update the weights of the Q-Network, but also the pre-trained convolutional layer when the agent receives rewards on that layer. Similar to the deeply-supervised net [25], our approach provides a direct target signal for learning the feature representation at each layer, so as to improve performance of our adaptive tracker. Testing with learned policies: During testing, the agent does not receive rewards or update the Q-function. It just follows the decision policy to deform the box and output it when a stop action is performed. Our agent takes only 2.1 steps on average to locate the target between frames on the OTB-50 dataset [42]. This means we can correctly track most objects by using 2 deep layers. Only for those hard frames, the search degenerates to a full forward pass. The overall tracking algorithm follows SiamFC [3] to search over candidate regions around the estimated location from previous frame. As a result, one order of magnitude speedups are achieved over traditional non-adaptive deep trackers. Set aside efficiency, the policies are still appealing in that they mimic the dynamic attention mechanism by progressively attending to the target region in feature cascades. Implementation details: We use the AlexNet [24]-like convolutional architecture as in SiamFC [3]. The whole network including Q-Net is trained on the ImageNet Video [33] trainval set (4417 videos) for 50 epochs, each completed after the agent has interacted with all training images. We make use of an -greedy [36] optimization during Qlearning, taking a random action with probability  to encourage exploration of diverse action policies. We anneal  linearly from 1 to 0.1 over the first 30 epochs, and fix  to 0.1 in the remaining 20 epochs. We use a learning rate 1e-3, discount factor γ = 0.9 and batch size 64. The network parameters are updated with direct stochastic gradient descent using MatConvNet [38] on a single NVIDIA GeForce Titan X GPU and an Intel Core i7 CPU at 4.0GHz. 3.3. Learning with cheap features Our policy learning can be applied to a feature cascade with any type of feature layers. We explore the use of additional cheap feature layers after the pixel-layer and before the more expensive deep layers. Inspired by the success of correlation filters defined on multi-channel HOG layers [9], we explore an optional HOG layer. In theory, other cheap features such as Color Attributes [14] might apply. When processing our pixel and HOG layers, we make use of fast correlation filters. We specifically make use of the Dual Correlation Filter (DCF) [19], which exhibits a good tradeoff in CPU speed (270+ fps on CPU) and accuracy compared to alternatives such as the Kernelized Correlation Filter (2× slower), STC [46] (350 fps but lower accuracy) and SRDCF [12] (5 fps). 4. Results Before comparing our EArly-Stopping Tracker (EAST) with prior works, we first conduct an ablation study of some of its important variants. We compare EAST to variants using different feature cascades—EAST-Pixel-HOG, EASTHOG, EAST-Pixel, as well as the baseline SiamFC [3]. Fig. 4 shows the probability of stopping at different feature layers and the associated speed on OTB-50 [42]. EAST indeed learns to use only early layers over 70% of the time, as they suffice when tracking easy frames. Hard frames are processed with additional layers, degenerating to a full forward-pass (as in SiamFC) only when needed. Fig. 5 illustrates some examples of easy and hard frames (and their stopped layers) on particular video sequences. Obviously, the earlier layer we stop at, the greater the speedup. EAST-Pixel-HOG (which lacks a pixel or HOG layer) is about 4.5× faster than SiamFC on average, running at 10.7 fps on a CPU and 467.3 fps on a GPU. Recall that Pixel and HOG layers can be processed by fast correlation filters [19] that run at 278 fps and 292 fps, respectively. By adding such layers, EAST achieves a CPU speedup of 10× on average and 100× for those easy frames. Even though HOG may incur an additional feature computation cost compared to the Pixel layer, it produces a greater speedup because it enables more accurate pruning, and so is selected more often by EAST. Note that the average GPU speed is sacrificed to some extent due to larger reliance on CPU computations. Nonetheless, EAST still produces a near-real-time CPU rate of 23.2 fps, making it quite practical for CPU-bound tracking (required on many embedded devices). Table 1 (top) summarizes the speed and accuracy of these EAST variants. We use the Overlap Success (OS) rate as a strict evaluation metric for accuracy. One-Pass Evaluation (OPE) is employed to compare accuracies in terms of Area Under the Curve (AUC) of OS rates for different threshold values. Table 1 shows that the use of more and stronger feature layers systematically improves the accuracy of the tracker, reaching to the AUC score of 0.638 for our full EAST model. Speed is also improved due to the larger computational savings on cheap layers. Table 1 (middle) further compares other EAST variants: • EASTlast : tracking by always forwarding to the last feature layer. • EASTth : feed-forwarding if the maximum value of the current response map is lower than 0.9. Scale is determined by the size of thresholded region. • EAST−ch : policy learning without confidence hisPl tory, i.e. we use Fl instead of Fl0 = k=1 Fk /l. • EAST−ah : policy learning without action history hl . EASTlast is similar to the baseline SiamFC [3] in that all layers are always processed, but differs in that it is trained Avg. speed SiamFC [3] with 3 scale-search CPU: 1.9 fps GPU: 86 fps Stopping probability 1 EAST-Pixel-HOG CPU: 10.7 fps GPU: 467.3 fps EAST-HOG CPU: 14.5 fps GPU: 197.6 fps EAST-Pixel CPU: 19.9 fps GPU: 223.6 fps EAST CPU: 23.2 fps GPU: 158.9 fps 0.6 0.6 0.6 0.6 0.8 0.5 0.5 0.5 0.5 0.6 0.4 0.4 0.4 0.4 0.3 0.3 0.3 0.3 0.2 0.2 0.2 0.2 0.1 0.1 0.1 0.1 0 0 0 0.4 0.2 0 C1 C2 C3 C4 C5 C1 C2 C3 C4 C5 CPU 10.7x 5.2x 3.3x 2.4x 2.0x speedup Pixel C1 C2 C3 C4 C5 CPU 98.7x 7.9x 4.5x 3.2x 2.2x 1.9x speedup HOG C1 C2 C3 C4 C5 CPU 101.3x 8.0x 4.5x 3.2x 2.2x 2.0x speedup 0 CPU speedup Pixel HOG C1 C2 C3 C4 C5 98.7x 62.4x 6.2x 3.9x 2.9x 2.0x 1.8x Figure 4. Stopping probability at different feature layers and the resulting speed on OTB-50 dataset [42]. For each of the 5 models with different feature cascades, we show the average speed on both CPU and GPU (top), and the CPU speedup ratio over the baseline SiamFC [3] (1.9 fps) at each layer (bottom). SiamFC searches over multi-scaled images to handle scale variations, while we predict the scale in a single forward-pass, leading to a constant tracking speedup. Our early stopping policy further accelerates tracking (4.5×) by adaptively using early layers as compared to SiamFC that always uses the last layer C5. When the early layer is the cheap HOG or pixel layer with fast CPU speed (270+ fps), we are able to increase the average CPU speed by one order of magnitude and operate at around 100× faster speed for almost 50% of the time. Our full model EAST operates at near real-time speed 23.2 fps on CPU. On the other hand, it is found the more reliance on CPU computations will generally increase the CPU speed, but also lose the benefits of GPU speed to some acceptable extent. C5 C4 C3 C2 C1 HOG Pixel C5 C4 C3 C2 C1 HOG Pixel Table 1. One-Pass Evaluation (OPE) results of Area Under the Curve (AUC) score and speed (CPU/GPU fps) on OTB-50 dataset. frame 50 frame 100 50 150 100 200 150 250 200 300 350 250 400 300 450 Method EAST-Pixel-HOG EAST-HOG EAST-Pixel EASTlast EASTth EAST−ch EAST−ah SiamFC [3] EAST AUC 0.619 0.628 0.631 0.645 0.597 0.621 0.610 0.612 0.638 Speed 10.7 / 467.3 14.5 / 197.6 19.9 / 223.6 3.4 / 76.3 45.7 / 172.0 21.1 / 137.2 17.4 / 127.6 1.9 / 86 23.2 / 158.9 350 Figure 5. Stopped feature layers for the frames in videos David (frames 300-770 of the original video) and Tiger2. Easy and hard frames are marked in green and red. with deep supervision and does not require an image pyramid to model scale. As a result, it both works better and faster (in CPU terms) than SiamFC. Interestingly, EASTlast outperforms EAST but is much slower. This suggests that our adaptive strategy is slightly hurting accuracy. EASTth makes use of manually-designed heursitics for stopping, avoiding the need to predict actions with a Q-Net, making it 2× faster on CPU. However, heuristic policies fail to work as well as the one learned by Q-learning. Finally, eliminating scoremap and action histories also hurts performance, likely because such histories stabilize the search process. OTB-50 results: The OTB-50 [42] benchmark contains 50 video sequences for evaluation. Table 2 compares the AUC scores of our EAST and the state-of-the-art trackers: TLD [21], GOTURN [18], Struck [16], KCF [19], DSST [13], MEEM [45], RTT [7], FCNT [40], Staple [2], HDT [31], HCF [27], LCT [28], SiamFC [3] and SINT [37]. CPU/GPU speeds (fps) are also reported. EAST achieves the highest AUC of any method. It does so while being significantly faster. For example, the runner-up SINT is 4 fps on GPU, while other GPU-based real-time deep trackers (GOTURN and SiamFC) are significantly slower on a CPU (2-3 fps). When compared to fast correlation trackers e.g. KCF defined on cheap features, EAST is significantly more accurate while still maintaining near-real-time speeds. This is in contrast to correlation filters defined on deep features (HCF and HDF), who are not real-time even with a GPU. The Staple tracker combines HOG and color features by a ridge regression, while FCNT tracks by selecting features from deep layers. EAST outperforms both in terms of accuracy. The Recurrently Targetattending Tracker (RTT) trains Recurrent Neural Networks (RNNs) to capture attentions as a regularization on correlation filter maps. However, it is noticeably slower and less accurate than EAST (3 fps on CPU, and an AUC of 0.588). OTB-100 results: The OTB-100 [43] dataset is the extension of OTB-50 and is more challenging. We test on the full 100 videos to compare with recent related trackers: RDT [6], SRDCF [12], MDNet [30], C-COT [15], ECO [10]. Table 3 summarizes their AUC scores and Table 2. The Area Under the Curve (AUC) score for One-Pass Evaluation (OPE), and speed (fps, * indicates GPU speed, otherwise CPU speed) on the OTB-50 dataset. The best results are shown in bold. Method AUC Speed TLD [21] 0.438 22 GOTURN [18] 0.450 165* Struct [16] 0.474 10 KCF [19] 0.516 172 DSST [13] 0.554 24 MEEM [45] 0.572 10 RTT [7] 0.588 3 Table 3. The Area Under the Curve (AUC) score for One-Pass Evaluation (OPE), and speed (fps, * indicates GPU speed, otherwise CPU speed) on the OTB-100 dataset. The best results are shown in bold. Method AUC Speed RDT [6] 0.603 43* SRDCF [12] 0.605 5 MDNet [30] 0.685 1* C-COT [15] 0.686 0.3 ECO [10] 0.694 6 EAST 0.629 23/159* FCNT [40] 0.599 3* Staple [2] 0.600 80 HDT [31] 0.603 10* HCF [27] 0.605 11* LCT [28] 0.612 27 SiamFC [3] 0.612 86* SINT [37] 0.625 4* EAST 0.638 23/159* Table 4. Raw scores and speed for our method and the top 4 trackers of the VOT-15 Challenge. The * indicates the speed in EFO units. The CPU/GPU speeds for our EAST are given. Tracker MDNet [30] EAST DeepSRDCF [11] EBT [47] SRDCF [12] Accuracy 0.60 0.57 0.56 0.47 0.56 Robustness 0.69 1.03 1.05 1.02 1.24 Overlap 0.38 0.34 0.32 0.31 0.29 Speed (fps) 1 21/148 <1* 5 5 35 30 Overall Rank DCF 25 20 15 10 EAST 5 0 0 EASTlast 0.2 0.4 0.6 0.8 1 Runtime (EFO/frame) Figure 6. Overall rank and runtime of our tracker (red) in comparison to the 38 trackers from VOT-14 Challenge. We show the results of EAST and its two variants that always forward to the first (i.e. DCF on pixel layer) and last (i.e. EASTlast ) feature layer. CPU/GPU speeds. EAST is close to state-of-the-art in terms of accuracy and is the fastest among the top performers on OTB-100. The MDNet and correlation-filter-based advances SRDCF, C-COT and ECO all suffer from low speed, while EAST does not sacrifice the run-time performance for accuracy. RDT is a related Reinforcement Learning (RL)based method that selects the best template to track a given frame. EAST (which also makes use of RL) proves more accurate while being 4× faster on a GPU. VOT-14 results: We test EAST on the 25 videos from the VOT-14 [23] Tracking Challenge. Fig. 6 compares the speed and overall rank of EAST to that of the 38 tracker submissions. For the rank computation, the challenge first evaluates the average accuracy and robustness ranking (refer to the supplementary material for details) for each tracker, and then averages the two rank values to get the overall rank. As can be seen from Fig. 6, EAST achieves the best accuracyspeed trade-off, outperforming all competitors in the overall rank. We also show two EAST variants at the opposite extreme: always forwarding to the first (i.e. DCF [19] on pixel layer) and last (i.e. EASTlast ) feature layer. Our EAST is able to adaptively take advantage of the speed and accuracy benefits of two variants by policy learning. VOT-15 results: The VOT-15 [22] Tracking Challenge has 60 testing videos chosen from a pool of 356. Trackers are automatically re-initialized five frames after failure (zero overlap). Table 4 compares our EAST with the top 4 trackers in terms of accuracy and speed (using the vot2015challenge toolkit). Our testing speed on this benchmark are 21 fps on CPU and 148 fps on GPU, making EAST the fastest and most CPU-friendly tracker among the top performers. We achieve comparable accuracy scores to MDNet, while providing a 148× speedup on GPU, indicating the power of our adaptive policy learning approach. 5. Conclusion This paper proposes an adaptive approach to tracking with deep feature cascades. Our fundamental insight is that most frames in typical tracking scenarios turn out to be easy, in that simple features (such as pixels or HOG) suffice. That said, some challenging frames do require “heavy-duty” invariant feature processing. The challenge is in determining which is which! By formulating the tracking problem as a decision making process, we learn a reinforcementlearning agent that can make such distinctions. Importantly, the agent learns to do so in an iterative manner, making efficient use of a feature cascade that proceeds to deeper layers only when the current one does not suffice. This dramatically reduces the feed-forwarding cost for those easy frames (by 100X), leading to an overall significant speedup for tracking. Such a policy learning method is appealing in that it is trained end-to-end and can be applied to any deep network designed for time-critical tasks. Acknowledgment: This research was supported in part by NSF grants CNS-1518865, IIS-1618903 and IIS-1526033 and the DARPA grant HR001117C0051. Additional support was provided by the Intel Science and Technology Center for Visual Cloud Systems (ISTC-VCS), Google, and Autel. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the view(s) of their employers or the above-mentioned funding sources. References [1] A. Alfvén. Object tracking with compressed networks. Master’s Theses in Mathematical Sciences, Mathematics (Faculty of Technology) and Numerical Analysis, Lund University, 2016. [2] L. Bertinetto, J. Valmadre, S. Golodetz, O. Miksik, and P. H. S. Torr. Staple: Complementary learners for real-time tracking. In CVPR, 2016. [3] L. Bertinetto, J. Valmadre, J. F. Henriques, A. Vedaldi, and P. H. S. Torr. Fully-convolutional siamese networks for object tracking. In ECCV, 2016. [4] D. S. Bolme, J. R. Beveridge, B. A. Draper, and Y. M. Lui. Visual object tracking using adaptive correlation filters. In CVPR, 2010. [5] J. C. Caicedo and S. Lazebnik. Active object localization with deep reinforcement learning. In ICCV, 2015. [6] J. Choi, J. Kwon, and K. M. Lee. Visual tracking by reinforced decision making. arXiv preprint, 1702.06291, 2017. [7] Z. Cui, S. Xiao, J. Feng, and S. Yan. Recurrently targetattending tracking. In CVPR, 2016. [8] J. Dai, K. He, and J. Sun. Instance-aware semantic segmentation via multi-task network cascades. In CVPR, 2016. [9] N. Dalal and B. Triggs. Histograms of oriented gradients for human detection. In CVPR, 2005. [10] M. Danelljan, G. Bhat, F. S. Khan, and M. Felsberg. ECO: efficient convolution operators for tracking. In CVPR, 2017. [11] M. Danelljan, G. Häger, F. S. Khan, and M. Felsberg. Convolutional features for correlation filter based visual tracking. In ICCV Workshop, 2015. [12] M. Danelljan, G. Häger, F. S. Khan, and M. Felsberg. Learning spatially regularized correlation filters for visual tracking. In ICCV, 2015. [13] M. Danelljan, G. Hger, F. Shahbaz Khan, and M. Felsberg. Accurate scale estimation for robust visual tracking. In BMVC, 2014. [14] M. Danelljan, F. S. Khan, M. Felsberg, and J. v. d. Weijer. Adaptive color attributes for real-time visual tracking. In CVPR, 2014. [15] M. Danelljan, A. Robinson, F. Shahbaz Khan, and M. Felsberg. Beyond correlation filters: Learning continuous convolution operators for visual tracking. In ECCV, 2016. [16] S. Hare, A. Saffari, and P. H. S. Torr. Struck: Structured output tracking with kernels. In ICCV, 2011. [17] B. Hariharan, P. Arbelez, R. Girshick, and J. Malik. Hypercolumns for object segmentation and fine-grained localization. In CVPR, 2015. [18] D. Held, S. Thrun, and S. Savarese. Learning to track at 100 fps with deep regression networks. In ECCV, 2016. [19] J. F. Henriques, R. Caseiro, P. Martins, and J. Batista. Highspeed tracking with kernelized correlation filters. TPAMI, 37(3):583–596, 2015. [20] S. E. Kahou, V. Michalski, and R. Memisevic. RATM: recurrent attentive tracking model. In CVPRW, 2017. [21] Z. Kalal, K. Mikolajczyk, and J. Matas. Tracking-learningdetection. TPAMI, 34(7):1409–1422, 2012. [22] M. Kristan, J. Matas, A. Leonardis, M. Felsberg, L. Čehovin, G. Fernandez, T. Vojir, G. Häger, G. Nebehay, and R. Pflugfelder. The visual object tracking VOT2015 challenge results. In ICCV 2015 Workshop, 2015. [23] M. Kristan, R. Pflugfelder, A. Leonardis, J. Matas, L. Cehovin, G. Nebehay, T. Vojir, G. Fernandez, A. Lukezic, and A. Dimitriev. The visual object tracking VOT2014 challenge results. In ECCV 2014 Workshop, 2014. [24] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In NIPS, 2012. [25] C.-Y. Lee, S. Xie, P. W. Gallagher, Z. Zhang, and Z. Tu. Deeply-supervised nets. In AISTATS, 2015. [26] Y. Li and J. Zhu. A scale adaptive kernel correlation filter tracker with feature integration. In ECCV Workshop, 2014. [27] C. Ma, J.-B. Huang, X. Yang, and M.-H. Yang. Hierarchical convolutional features for visual tracking. In ICCV, 2015. [28] C. Ma, X. Yang, C. Zhang, and M.-H. Yang. Long-term correlation tracking. In CVPR, 2015. [29] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller, and A. K. Fidjeland et al. Human-level control through deep reinforcement learning. Nature, 518(7540):529–533, 2015. [30] H. Nam and B. Han. Learning multi-domain convolutional neural networks for visual tracking. In CVPR, 2016. [31] Y. Qi, S. Zhang, L. Qin, H. Yao, Q. Huang, J. Lim, and M.-H. Yang. Hedged deep tracking. In CVPR, 2016. [32] D. A. Ross, J. Lim, R.-S. Lin, and M.-H. Yang. Incremental learning for robust visual tracking. IJCV, 77(1-3):125–141, 2008. [33] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. IJCV, 115(3):211–252, 2015. [34] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. In ICLR, 2015. [35] Y. Sun, X. Wang, and X. Tang. Deep convolutional network cascade for facial point detection. In CVPR, 2013. [36] R. Sutton and A. Barto. Reinforcement Learning: An introduction. MIT Press, 1998. [37] R. Tao, E. Gavves, and A. W. M. Smeulders. Siamese instance search for tracking. In CVPR, 2016. [38] A. Vedaldi and K. Lenc. Matconvnet: Convolutional neural networks for matlab. In ACM MM, 2015. [39] P. Viola and M. Jones. Rapid object detection using a boosted cascade of simple features. In CVPR, 2001. [40] L. Wang, W. Ouyang, X. Wang, and H. Lu. Visual tracking with fully convolutional networks. In ICCV, 2015. [41] N. Wang, S. Li, A. Gupta, and D. Yeung. Transferring rich feature hierarchies for robust visual tracking. arXiv preprint, 1501.04587, 2015. [42] Y. Wu, J. Lim, and M.-H. Yang. Online object tracking: A benchmark. In CVPR, 2013. [43] Y. Wu, J. Lim, and M. H. Yang. Object tracking benchmark. TPAMI, 37(9):1834–1848, 2015. [44] D. Zhang, H. Maei, X. Wang, and Y.-F. Wang. Deep reinforcement learning for visual object tracking in videos. arXiv preprint, 1701.08936, 2017. [45] J. Zhang, S. Ma, and S. Sclaroff. MEEM: robust tracking via multiple experts using entropy minimization. In ECCV, 2014. [46] K. Zhang, L. Zhang, Q. Liu, D. Zhang, and M.-H. Yang. Fast visual tracking via dense spatio-temporal context learning. In ECCV, 2014. [47] G. Zhu, F. Porikli, and H. Li. Tracking randomly moving objects on edge box proposals. arXiv preprint, 1507.08085, 2015. Table 5. Network architecture and convolutional layer specifics. Supplementary Material Layer A. Algorithmic Details Network architecture: We use the exact convolutional architecture of SiamFC [3]. The convolutional layers C1−C5 and their parameter details are given in Table 5. Note maxpooling is employed for the convolutional layers C1 and C2. We use the nonlinear ReLU function [24] after every convolutional layer except for C5. Batch normalization is inserted after every linear layer. Deep Q-learning: During deep Q-learning [29], the optimal action-value function Q(Sl , Al ) obeys the Bellman equation: it is optimal to select the action A0 that maximizes the expected reward Q(Sl , Al ) = R + γ max Q(S 0 , A0 ), 0 A 0 C1 C2 C3 C4 C5 Input conv1 pool1 conv2 pool2 conv3 conv4 conv5 Support Stride 11×11 3×3 5×5 3×3 3×3 3×3 3×3 2 2 1 2 1 1 1 Method LCT [28] 0.612 0.594 0.518 27 AUC-OPE AUC-TRE AUC-SRE Speed 0 A (6) The gradient of this loss function with respect to the network weights θl is as follows:  h 0 0 Q(S , A ; θ ) − Q(S , A ; θ ) ∇θl V (θl ) = E R + γ max l−1 l l l A0 i ·∇θl Q(Sl , Al ; θl ) . (7) B. Discussions and Results The main idea of our EArly-Stopping Tracker (EAST) is to track easy frames using only early layers of a deep feature cascade, e.g. pixel values, while hard frames are processed with invariant but expensive deep layers when needed. An attached video demo.mp4 exemplifies such tracking policies in video sequences. To further validate the advantages of EAST in both accuracy and speed, we compare with the top 3 trackers on OTB-50 [42] in terms of speed, and AUC score for One-Pass Evaluation (OPE), Temporal Robustness Evaluation (TRE) and Spatial Robustness Evaluation (SRE). Table 6 shows that EAST achieves the highest scores under all evaluation metrics, while maintaining fast tracking speed. Table 7 shows the detailed ranks of accuracy RA and robustness RR under baseline and region noise experiments in VOT-14 challenge. The two experiments evaluate trackers with the initial target location from ground truth and that perturbed with random noises. The table also lists the overall rank Ro and running speed to compare EAST with the best 3 trackers out of 38 submitted ones. It is evident that Search activation 255×255 123×123 61×61 57×57 28×28 26×26 24×24 22×22 Chans. 3 96 96 256 256 192 192 128 Table 6. The Area Under the Curve (AUC) score for One-Pass Evaluation (OPE), Temporal Robustness Evaluation (TRE) and Spatial Robustness Evaluation (SRE), and speed (fps, * indicates GPU speed, otherwise CPU speed) on the OTB-50 dataset. The best results are shown in bold. (5) where Q(S , A ) is the future reward and γ the discount factor. Since the action-value function is approximated by a QNet with weights θ, the Q-Net can be trained by minimizing the loss function V (θl ) at each iteration l,  2  0 0 V (θl ) = E R + γ max Q(S , A ; θ ) − Q(S , A ; θ ) . l−1 l l l 0 Template activation 127×127 59×59 29×29 25×25 12×12 10×10 8×8 6×6 SiamFC [3] 0.612 0.621 0.554 86* SINT [37] 0.625 0.643 0.579 4* EAST 0.638 0.662 0.591 23/159* Table 7. The accuracy RA , robustness RR and average R ranks under baseline and region noise experiments in VOT-14. Ro is the overall (averaged) ranking for both experiments, which is used to rank the 38 trackers in the main paper. Our CPU/GPU speeds are reported in fps, while the speeds for the top 3 trackers are in EFO units, which roughly correspond to fps (e.g. the speed of the NCC baseline is 140 fps and 160 EFO). Tracker EAST DSST SAMF KCF RA 4.95 5.41 5.30 5.05 baseline RR 5.42 11.93 13.55 14.60 R 5.19 8.67 9.43 9.82 region noise RA RR R 5.11 4.73 4.92 5.40 12.33 8.86 5.24 12.30 8.77 5.17 12.49 8.83 Ro 5.06 8.77 9.10 9.33 Speed 22/155 7.66 1.69 24.23 EAST is one of the fastest trackers, while outperforming other top performers in the overall rank. Template Update It is worth noting that, in our feature cascade we explore the pixel and HOG layers before expensive deep layers. When processing the cheap pixel and HOG layers, we make use of fast correlation filters [19]. A correlation filter w with the same size of image patch x is learned by solving the Ridge Regression loss function X 2 min wT xi − yi + λkwk2 , (8) w i where yi is the target response value, and λ is the regularization parameter. Solving this loss function is fast due to the efficient use of all shifted patches xi by exploiting the discrete Fourier transform. Besides fast speed, the correlation filter has another benefit of updating the template w over time. However, this adaptive merit is not preserved for deep layers. Recall that for the deep convolutional layers C1 − C5, we AUC 0.641 EAST 0.638 0.635 C1 C2 C3 C4 C5 Layer Figure 7. The Area Under the Curve (AUC) score for One-Pass Evaluation (OPE) of template update for deep layers C1 − C5. follow SiamFC [3] to compute the similarity of a template image z to all translated regions in search image x by Fl (z, x) = ϕl (z) ∗ ϕl (x) + vI, (9) where ϕl is the convolutional feature embedding at layer l, and v ∈ R is an offset value. Here ϕl (z) can be treated as the convolutional template to compute the target responses, but is fixed to ϕl (zt=1 ) from the first frame and is never updated during tracking. Then a question naturally arises: can we improve the performance by updating the template for deep layers? To this end, we conduct the following experiment on OTB-50: we simply update ϕl (zt ) as ϕl (zt−1 ) from the previous frame, and record the accuracy if we separately update the convolutional layer l from C1−C5. Fig.7 shows the AUC score when we update the template for each deep layer. Marginal gains are obtained on lower layers C1−C2, suggesting that they are less invariant and so would need to be updated more often. On the other hand, updating the top layer C5 leads to no difference, which is actually in line with the observations by SiamFC [3] that always uses this invariant top layer for tracking. In the future, we can consider how to learn to update template online rather than just use the previous frame. Another promising direction is to further speedup the deep convolutional process by adopting the Fourier transform techniques.
1
arXiv:1608.04809v1 [math.GR] 16 Aug 2016 GENERALIZING THE FUTURAMA THEOREM J. ELDER AND O. VEGA Abstract. The 2010 episode of Futurama titled The Prisoner of Benda centers around a machine that swaps the brains of any two people who use it. The problem is, once two people use the machine to swap brains with each other, they cannot swap back. In this article, we present a new proof of this theorem and also a generalization of it to what would happen if, instead, the machine swapped cyclically the brains of p characters, where p is prime. 1. Introduction In the 2010 Writers Guild Award-winning episode of Futurama, The Prisoner of Benda [5], Professor Farnsworth and Amy build a machine that can swap the brains of any two people. The two use the machine to swap brains with each other, but then discover that once two people have swapped with each other, the machine does not swap them back. More characters get involved until the group is thoroughly mixed up, and they start looking for ways to return to their own heads. Clearly, the problem of undoing what the machine has done may be studied using permutations; each brain swap can be described by a transposition in Sn , where n is the number of characters involved in the brain-swapping. Hence, the problem consists in writing the inverse of a permutation as a product of transpositions that (1) are all distinct, and (2) were not already used in constructing the original permutation. The solution given in the episode relies on involving two additional people; these two characters were not involved in any of the original swaps, and so have no restrictions on who they can swap with now. For example, using the additional people x and y, we have (1 2)−1 = (x y)(2 x)(1 y)(2 y)(1 x) Note that the transpositions used in the product above are all distinct, and that none of them is an element of S2 , which is where the original element (1 2) was taken from. This can be done in general for any permutation, and leads to the following theorem. Theorem 1 (Keeler, 2010). Let n ∈ N, n ≥ 2. The inverse of any permutation in Sn can be written as a product of distinct transpositions in Sn+2 \ Sn . 2010 Mathematics Subject Classification. Primary 20B30; Secondary 20F05. Key words and phrases. Permutations, products of cycles, Futurama. The first author thanks the support of the Division of Graduate Studies at California State University, Fresno in the form of the Robert & Norma Craig Graduate Scholarship and also for travel support. She would also like to thank the College of Science and Mathematics at California State University, Fresno for travel support. 1 Although Ken Keeler (writer and executive producer for Futurama at the time) never published the proof of his theorem, the proof given in the episode as well as a write up of the idea may be found in [3]. This was, most probably, the first time in which a theorem was proved for the purpose to advance the narrative of a TV show, and thus it was all over the internet [1, 4, 7] and was also mentioned in books, such as Simon Singh’s The Simpsons and Their Mathematical Secrets [6]. Of course, this aroused the interest of mathematicians (the authors of this article included), and so in 2014, Evans, Huang, and Nguyen [2] proved that Keeler’s solution to the problem is optimal in the sense that it uses the minimal number of cycles and the minimal number of additional elements. In that article, they also gave necessary and sufficient conditions on m and n for the identity permutation to be expressible as a product of m distinct transpositions in Sn . Although in the title of this article we used The Futurama Theorem, for the remainder of this work we will refer to Theorem 1 as Keller’s Theorem. 2. Reproving Keeler’s Theorem We want to reprove Keeler’s Theorem using a different, and possibly less optimal, method. The goal is to present a method that can be generalized to larger cycles in Sn . As in Keeler’s proof, we will need additional elements that could not have been used in the permutation we wish to work with. As expected, we will first study how to write the inverse of a cycle using ‘new’ transpositions to later putting all this together using that every permutation can be written as the product of disjoint cycles. Definition 2. Fix n ∈ N and let x, y ∈ N be such that x, y ≫ n. We consider the set that we will use to define the elements of Sn+2 to be {1, 2, . . . , n, x, y}. Throughout this paper, we will consider, without loss of generality, the k-cycle (1 2 · · · k) instead of a generic k-cycle. We start by setting some notation. Definition 3. Let m ∈ N such that m is odd and m ≤ n − 2. And let δm ∈ Sn+2 be defined as m Y (i + 1 y)(i + 2 y)(i x)(i + 1 x). δm = i=1 i odd Notice that δm , for any 1 ≤ m, will not contain any repeated transpositions. In fact, every number 1 ≤ j ≤ m will appear at most twice in the product: once in (j x) and once in (j y). Also, we can see that (x y) is not in the product. Lemma 4. Let k ≥ 7 be odd and such that k ≡ 1 (mod 3). If σ is a k-cycle then σ −1 = δk−2 . Proof. We write k = 1 + 6t, for t ∈ N. We will prove the result by induction on t. For t = 1, we get: (1 2 3 4 5 6 7)−1 = (6 9)(7 9)(5 8)(6 8)(4 9)(5 9)(3 8)(4 8)(2 9)(3 9)(1 8)(2 8) = δ5 We now assume the result for all k-cycles, where k = 1 + 6s and s < t. Now let σ be a j-cycle, where j = 1 + 6t. We let k = j − 6 and write (2.1) (1 2 · · · j)−1 = (j − 6 j − 5 j − 4 j − 3 j − 2 j − 1 j)−1 (1 2 · · · k)−1 From the induction hypothesis, we get (1 2 · · · k)−1 = δj−8 , 2 and from the base case we get (j − 6 j − 5 j − 4 j − 3 j − 2 j − 1 j)−1 = j−2 Y (i + 1 y)(i + 2 y)(i x)(i + 1 x). i=j−6 i odd Putting all this together in Equation (2.1) yields:   j−2 Y (1 2 · · · j)−1 =  (i + 1 y)(i + 2 y)(i x)(i + 1 x) δj−8 = δj−2 , i=j−6 i odd which is what we wanted to obtain.  We will use this lemma to prove all remaining cases. First for k odd. Lemma 5. Let k be an odd number and σ be a k-cycle. 1. If k ≥ 5 and k ≡ 2 (mod 3), then σ −1 = (x y)(k − 2 x)(k − 1 x)(k x)δk−4 . 2. If k ≥ 3 and k ≡ 0 (mod 3), then σ −1 = (x y)(k x)δk−2 . Proof. Let k be an odd number and σ be a k-cycle. 1. For k = 5, we see that (1 2 3 4 5)−1 = (6 7)(3 6)(4 6)(5 6)(2 7)(3 7)(1 6)(2 6) For k > 5 and k ≡ 2 (mod 3), we write (1 2 . . . k) = (1 2 . . . k − 4)(k − 4 k − 3 k − 2 k − 1 k) Since k − 4 is odd and k − 4 ≡ 1 (mod 3) we use Lemma 4 to get the desired result. 2. For k = 3, we have (1 2 3)−1 = (4 5)(3 4)(2 5)(3 5)(1 4)(2 4), and when k > 3 and k ≡ 0 (mod 3), we know that k − 2 ≡ 1 (mod 3), with k − 2 odd. Hence (1 2 . . . k) = (1 2 . . . k − 2)(k − 2 k − 1 k). At this point we use Lemma 4 to get the desired result.  Now we will proceed in a similar manner for the cases where k is even. Lemma 1. If 2. If 3. If 6. Let k be a positive even number, and σ be a k-cycle. k ≥ 6 and k ≡ 0 (mod 3), then σ −1 = (k y)(k − 1 x)(k x)δk−3 . k ≥ 4 and k ≡ 1 (mod 3), then σ −1 = (x y)(k − 1 x)(k x)δk−3 . k ≥ 8 and k ≡ 2 (mod 3), then σ −1 = (k − 2 y)(k − 1 y)(k y)(k − 3 x)(k − 2 x)δk−5 . Proof. Let k be even, and σ be a k-cycle. 1. For k = 6, we see that (1 2 3 4 5 6)−1 = (6 8)(5 7)(6 7)(4 8)(5 8)(3 7)(4 7)(2 8)(3 8)(1 7)(2 7) For k > 6, and k ≡ 0 (mod 3), we write (1 2 . . . k) = (1 2 . . . k − 5)(k − 5 k − 4 k − 3 k − 2 k − 1 k) Since k − 5 is odd and k − 5 ≡ 1 (mod 3) we can use Lemma 4 to get the desired result 3 2. For k = 4, we have (1 2 3 4)−1 = (5 6)(3 5)(4 5)(2 6)(3 6)(1 5)(2 5) and when k > 4 and k ≡ 1 (mod 3), we know that k − 3 ≡ 1 (mod 3), k − 4 is odd. Hence (1 2 . . . k) = (1 2 . . . k − 3)(k − 3 k − 2 k − 1 k) At this point we use Lemma 4 to get the desired result. 3. For k = 8, σ −1 = (6 y)(7 y)(k y)(5 x)(6 x)δ3 When k > 8 and k ≡ 2 (mod 3), we write (1 2 . . . k) = (1 2 . . . k − 7)(k − 7 . . . k − 1 k) Since k − 7 ≡ 1 (mod 3), we use Lemma 4 to get the desired result.  Remark 7. Lemmas 4, 5, and 6 allow us to write any given k-cycle as a product of transpositions. Moreover, such products consist of transpositions that are all distinct from each other, and each one of these 2-cycles is an element in Sn+2 \ Sn . Finally, given a permutation σ ∈ Sn , we write its inverse as a product of disjoint cycles, σ −1 = σ1 σ2 · · · σr , and then we write each σi as a product of transpositions in Sn+2 \ Sn using Lemmas 4, 5, and 6. It is easy to see that the only transposition that could appear more than once in this product is (x y). In this case, each (x y) would appear at the beginning of a product representing a σi (see Lemmas 5 and 6), but this situation is easy to fix as if τ is a permutation in Sn+2 \ Sn then the conjugation (x y)τ (x y) yields a permutation that is equal to τ where all the xs and the ys have been exchanged. Keeler’s Theorem follows. 3. Products of larger cycles Now we are interested in learning what would happen if Professor Farnsworth and Amy had created a machine that swapped several brains in a cyclical way. For example, the machine would do Professor −→ Amy −→ Bender −→ Leela −→ Fry −→ Professor The problem of undoing what the machine does in the example above would be easy if the machine did not have any ‘issues’ and worked even when a set of five people sat in the machine for a second time; we could use that (1 2 3 4 5)−1 = (5 4 3 2 1) or that (1 2 3 4 5)−1 = (1 2 3 4 5)4 to solve the problem. That would be too easy, there would be no TV network that would broadcast an episode featuring such a simple problem/solution (the existence of the show Scooby-Doo may go against this premise). Hence, to make this interesting, we will assume that the machine does not always work when a set of people who have already sat in the machine sits in it again. Our restriction will be technical, and so we will phrase it explicitly in the statement of our results. So, for the rest of this article, we will assume that we are working with a machine that swaps cyclically the brains of p people at a time, where p is an odd prime. Note that now, in terms of permutations, our problem will reside in An , as the brain-swapping machine yields an odd cycle every time it functions. We will start our study with what will end up being a special case: p = 3. 4 Products of 3-cycles. It turns out that, in this case, we only need one extra character to undo the mess created by the machine. Lemma 8. Let n ∈ N, n > 2, and let σ ∈ An be an odd cycle. Then, σ −1 can be written as a product of 3-cycles σ −1 = τ1 τ2 · · · τt where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈< / τj >, for all i 6= j. Proof. For k = 3 we get (1 2 3) = (x 3 1)(x 1 2), and for every 3 > k ≤ n, k odd, and x ≫ n, consider the product (1 2 · · · k − 1 k) = (x k 1)(x k − 2 k − 1) · · · (x 3 4)(x 1 2). The result is now immediate, as the inverse of any odd cycle is also an odd cycle, and the 3-cycles used in the products considered all fix different sets of elements.  Lemma 9. Let α, β ∈ Sn , n > 2, be two disjoint even cycles. Then, (αβ)−1 can be written as a product of 3-cycles (αβ)−1 = τ1 τ2 · · · τt , where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈< / τj >, for all i 6= j. Proof. Let β −1 = (a1 a2 · · · ar ) and α−1 = (b1 b2 · · · bs ) be two disjoint cycles, where r and s are even. Note that (αβ)−1 = β −1 α−1 ∈ An can be written as β −1 α−1 = (a1 a2 )(b1 b2 ) (a2 a3 · · · ar )(b2 b3 · · · bs ) = (b2 b1 x)(b1 a2 x)(a2 a1 x)(a1 b1 x) (a2 a3 · · · ar )(b2 b3 · · · bs ). Note that the last two cycles in the product are odd, and thus we can write them as a product of 3-cycles, as indicated in Lemma 8. It is easy to see now that (αβ)−1 can be written as claimed.  The previous two lemmas indicate that we should only need one extra person to undo whatever chaos the 3-brain-swapping machine might have created. We make this result explicit in the following theorem. Theorem 10. Let σ ∈ An , n > 2. Then, σ −1 can be written as a product of 3-cycles σ −1 = τ1 τ2 · · · τt , where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈< / τj >, for all i 6= j. Proof. Given σ ∈ An , we know we can write σ −1 as a product of disjoint cycles. Moreover, after rearrangement (if needed) we can put all the appearing even cycles (if any) in pairs. Hence, Lemmas 8 and 9 guarantee the desired factorization of σ −1 .  Products of p-cycles, p > 5. In order to give an answer to what would happen if the machine now swapped p brains cyclically, where p is a prime larger than three, we need to set some notation first. Fix n, p ∈ N, where p > 3 is prime and n > 2. Then, we define the following ordered lists of numbers [x]n,p = x1 x2 . . . xp−3 [x]−1 n,p = xp−3 . . . x2 x1 5 where xi ≫ n, for all i = 1, 2, . . . , p − 3. We will use these lists to write cycles. For example (1 2 [x]3,7 ) = (1 2 x1 x2 x3 x4 ), where x1 , x2 , x3 , x4 ≫ 3. Theorem 11. Let n ∈ N and p be a prime such that p > 3 and n > 2. If σ ∈ An , then, σ −1 can be written as a product of p-cycles σ −1 = τ1 τ2 · · · τt , where τi ∈ An+(p−3) \ An , for all i = 1, 2, . . . , t, and τi ∈< / τj >, for all i 6= j. Proof. We will first prove that every element σ ∈ An can be written as a product of p-cycles, then we will prove that the factors used satisfy the conditions claimed in the theorem. We know that every element in An can be written as a product of odd cycles and an even number of even cycles. We will first deal with odd cycles. For k = 3 we can write (1 2 3) = (1 3 2 [x]−1 n,p )(2 1 3 [x]n,p ), and so we need p − 3 new elements to write a 3-cycle as a product of p-cycles. For k > 3 we know that every k-cycle in An can be written as a product of k−1 2 distinct 3-cycles as follows: (3.1) (a1 a2 · · · ak ) = (a1 a2 a3 )(a3 a4 a5 ) · · · (ak−2 ak−1 ak ). So, if σ ∈ An is a k-cycle with k > 3, then we write it as in Equation (3.1). After that we write each of the 3-cycles in that product as a product of two p-cycles, as discussed in the case k = 3 above. Hence, we can write σ as a product of p-cycles by incorporating p − 3 new elements. For products of two even cycles we let σ = (a1 a2 · · · ar ) and τ = (b1 b2 · · · bs ), where r and s are even. Note that στ ∈ An can be written as στ = (a1 a2 )(b1 b2 ) (a2 a3 · · · ar )(b2 b3 · · · bs ) −1 = (b2 b1 a2 [x]n,p )(a2 a1 b1 [x]n,p ) (a2 a3 · · · ar )(b2 b3 · · · bs ) where the first two cycles need p − 3 new elements to have length p, and all the other cycles involved are odd, and thus can be written as products of p-cycles. In order to see that all the p-cycles obtained in the final product describing σ −1 generate distinct subgroups of An+(p−3) we notice that, in the majority of the cases, a pair of these p-cycles will not ‘move’ the same p elements, and thus the groups they generate would intersect trivially. Thus, the only case that should be analyzed is when we get two cycles of the form τ1 = (1 3 2 [x]−1 n,p ) and τ2 = (2 1 3 [x]n,p ). In this case, if we assumed that these elements generate the same subgroups then τ2i = τ1 , for some i. However, if we look at τ2i (2) we can see that the only possibility for τ2i = τ1 to happen would be when i = p − 1, but it is easy to see that τ2p−1 = τ2−1 6= τ1 . This finishes the proof.  We conclude that as long as the brain-swapping machine Professor Farnsworth and Amy build swaps a prime number of brains cyclically, they can always fix the chaos created by incorporating enough extra characters to the mix. References [1] Casey Chan, Futurama writer invented a new math theorem just to use in the show (2010) http://gizmodo.com/5618502/futurama-writer-invented-a-new-math-theorem-just-to-use-in-the-show. [2] Ron Evans, Lihua Huang, Tuan Nguyen, Keeler’s theorem and products of distinct transpositions, Amer. Math. Monthly 121 (2014) 136–144. 6 [3] Hristo Georgiev, The Futurama theorem explained. The Commutator 2 (2010) 18–20. [4] Tony Phillips, Math in the Media, Amer. Math. Soc., Original math on Futurama (2010), http://www.ams.org/news/math-in-the-media/10-2010-media. [5] Previous Nominees & Winners of the Writers Guild Awards (last accessed on 08/15/16). http://awards.wga.org/wga-awards/previous-nominees-winners. [6] Simon Singh, The Simpsons and Their Mathematical Secrets. Bloomsbury, NY, 2013. [7] The prisoner of Benda. The Infosphere, the Futurama Wiki (last accessed on 08/15/16). http://theinfosphere.org/The_Prisoner_of_Benda. Department of Mathematics. Arizona State University. Tempe, AZ 85287. E-mail address: [email protected] Department of Mathematics. California State University, Fresno. 93740. E-mail address: [email protected] 7 Fresno, CA
4
Strong converse for the feedback-assisted classical capacity of entanglement-breaking channels arXiv:1506.02228v4 [quant-ph] 3 Nov 2017 Dawei Ding∗ Mark M. Wilde† November 7, 2017 Abstract Quantum entanglement can be used in a communication scheme to establish a correlation between successive channel inputs that is impossible by classical means. It is known that the classical capacity of quantum channels can be enhanced by such entangled encoding schemes, but this is not always the case. In this paper, we prove that a strong converse theorem holds for the classical capacity of an entanglement-breaking channel even when it is assisted by a classical feedback link from the receiver to the transmitter. In doing so, we identify a bound on the strong converse exponent, which determines the exponentially decaying rate at which the success probability tends to zero, for a sequence of codes with communication rate exceeding capacity. Proving a strong converse, along with an achievability theorem, shows that the classical capacity is a sharp boundary between reliable and unreliable communication regimes. One of the main tools in our proof is the sandwiched Rényi relative entropy. The same method of proof is used to derive an exponential bound on the success probability when communicating over an arbitrary quantum channel assisted by classical feedback, provided that the transmitter does not use entangled encoding schemes. 1 Introduction The classical theory of communication is one of the modern successes of applied mathematics [CT91, GK12]. It is arguably one of the foundations of our current information age and provides new ways of thinking about problems in many other fields of study, such as physics and in particular quantum mechanics. The interaction between these two fields is mutual; while some problems in quantum mechanics can be turned into communication problems, the existence of quantum phenomena strongly suggests that we should rethink many aspects of communication theory. Not only does the notion of a quantum state challenge what we mean by “information,” but the possibilities due to quantum mechanics give rise to new classes of communication protocols. With respect to this latter consideration, some fundamental motivating questions for quantum information theory have traditionally been and still are the following: 1. Is the theory of classical communication affected at a fundamental level by the consideration of quantum mechanical phenomena? ∗ Department of Applied Physics, Stanford University, Stanford, California 94305-4090, USA Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Center for Computation and Technology, Louisiana State University, Baton Rouge, Louisiana 70803, USA † 1 2. Does using quantum states and measurement for classical communication have practical advantages over using classical techniques? In an attempt to answer these questions, one of the primary goals is to study the ability of a quantum channel to communicate classical information, that is, bits. Like many communication problems, this ability is quantified by the notion of channel capacity. The classical capacity C of a quantum channel N is defined to be the maximum rate of communication such that the decoding error probability can tend to zero in the limit of many channel uses. With this definition, one natural question is to determine how to compute the classical capacity. We know that the Holevo-Schumacher-Westmoreland (HSW) theorem [Hol98, SW97] provides a lower bound: CpN q ě χpN q ” sup IpX; Bqρ , (1.1) tpX pxq,ρx u where tpX pxq, ρx u is an ensemble of quantum states such that each ρx can be input to the channel, and IpX; Bqρ ” HpXqρ ` HpBqρ ´ HpXBqρ is the quantum mutual information of the following classical-quantum state: ÿ ρXB ” pX pxq|xyxx|X b N pρx q, (1.2) x where t|xyu is an orthonormal basis for the classical reference system and HpGqσ is the von Neumann entropy of a quantum state σG on system G. The quantity χpN q is called the Holevo information of the channel. The classical capacity CpN q can actually be formally rewritten in terms of the Holevo information as well, via a procedure known as regularization. Before doing so, note that we obtain the HSW theorem by considering only encoding procedures that do not use entangled inputs1 . That is, each quantum system sent through the channel is not entangled with any other system that is sent. To get the classical capacity, it is generally necessary to incorporate entangled inputs into the calculation. The approach given by [Hol98, SW97] is to multiplex the channel such that one use of this multiplexed channel corresponds to multiple uses of the original channel. A multipartite entangled state describing several inputs across different uses of the original channel can now be simulated by the corresponding single input state to the multiplexed channel. We can therefore express the maximum rate for blocks of size n in terms of a Holevo information: 1 χpN bn q. n (1.3) To obtain the classical capacity, we simply allow for inputs entangled across arbitrarily many channel uses: 1 CpN q “ lim χpN bn q. (1.4) nÑ8 n This idea put together with a converse theorem establishes the regularized expression in (1.4) as being equal to the classical capacity. Unfortunately, computing the classical capacity this way is clearly intractable. This prompts us to look for special cases. We observe that the limit in (1.4) is equal to χpN q iff the Holevo information satisfies a tensor-power additivity property (see Appendix A for a brief derivation): @n χpN bn q “ nχpN q. 1 (1.5) The highest possible rate with this restriction, proven by the HSW theorem to be χpN q, is then a lower bound on the classical capacity. 2 Another way to restate the above is that entangled inputs do not increase capacity iff (1.5) is satisfied. However, this is not true for some channels, as was shown in [Has09]. The next question then appears: What characterizes channels that satisfy (1.5)? A sufficient condition for a quantum channel to satisfy tensor-power additivity is for it to be entanglement-breaking (EB) [HSR03]. Let NAÑB denote a quantum channel, where the arrow notation indicates that the channel maps a state of the input system A to a state in an output system B. An EB channel is defined such that for any bipartite state ρAA1 , the output state pNAÑB b idA1 q pρAA1 q (1.6) is separable. That is, the output of an EB channel can be written as a convex sum of product states. Effectively, the channel “breaks” the entanglement between A and A1 . Previous results have established that the Holevo information of EB channels is additive2 [Sho02]. This is intuitive since any entanglement of the inputs is broken by the channel. Following this line of thinking, one could consider making a stronger statement by allowing additional resources to assist the communication but not to the point that entanglement can be established. Indeed, [BN05] proves a generalization of tensor-power additivity for EB channels with noiseless classical feedback. Furthermore, their results show that classical feedback does not increase the capacity of EB channels. There are also possible stronger statements in another direction. The direct part of the original HSW theorem states that if the rate R of communication is less than the Holevo information χ, then there exists a sequence of protocols P n such that the probability of error for such a sequence satisfies lim pe pnq “ 0, (1.7) nÑ8 where n is the number of channel uses. A result from [Hay07] sharpens this claim by showing that there exists a sequence P n such that pe pnq ď 2´kn , (1.8) for some k ą 0 determined by the channel. The converse part of the original HSW theorem can be strengthened in a similar manner. It states that if R ą CpN q, for any sequence of protocols P n , then lim pe pnq ą 0. (1.9) nÑ8 This is known as the weak converse. In contrast, a strong converse is symmetric to the achievability result above and states that regardless of the protocols used, the success probability decreases to zero in the asymptotic limit whenever R ą CpN q. The strong converse can be sharpened as well whenever there is a constant separation between R and CpN q, such that the convergence of the success probability to zero is exponential in n. There are many reasons why we would want to prove a strong converse. First, a strong converse enriches our understanding of the capacity. A strong converse along with an achievability theorem shows that the capacity is a sharp boundary between reliable and unreliable communication regimes. This, amongst other results, indicates that the classical capacity of a quantum channel is a fundamental quantity of interest. Second, a strong converse is more relevant in practice than is the weak converse. A realistic quantum communication scheme has a finite blocklength; that is, 2 Shor proved that the Holevo information of a tensor product of an EB channel with any other channel is equal to the sum of their respective Holevo informations. This form of additivity is stronger than (1.5) and is the one usually found in the literature. 3 the encoding is across a finite number of channel uses. Although the weak converse does provide a lower bound on the probability of error in the non-asymptotic regime, the strong converse improves the bound considerably. It expresses a trade-off between rate, error probability, and blocklength restrictive enough to be easily checked numerically or experimentally. While a classical version of the strong converse is known for arbitrary discrete memoryless classical channels [Wol78, Ari73], it is still open whether or not strong converses hold for memoryless quantum channels. After some early work [ON99, Win99], the strong converse has been proved for special cases, in particular for channels with certain symmetry [KW09], for EB channels [WWY14], and for a wide class of quantum Gaussian channels [BGPWW15]. Given the strong converse results for EB channels [WWY14] and the weak converse for EB channels with feedback [BN05], it is natural to ask if these two statements are true at the same time. We can also ask directly for the strong converse for unentangled inputs when a feedback link is available. These are the main questions that we address in this paper. 2 Summary of Results In this paper, we derive an explicit exponential bound on the success probability of a classical communication scheme that uses an entanglement-breaking channel along with classical feedback. The same method of proof can be used to establish a bound for arbitrary quantum channels with classical feedback, provided that the inputs are not entangled across multiple uses of the channel. When the communication rate exceeds the classical capacity, these exponential bounds immediately imply strong converse theorems for these settings. We now provide an outline of the proof: 1. First, taking as a starting point the general approach of [Nag01], relating hypothesis testing to unassisted communication, we bound the success probability of an arbitrary feedbackassisted classical communication protocol by a sandwiched Rényi relative entropy [MLDS` 13, WWY14]. 2. Next, one of the main observations from [BN05] is that the sender and receiver’s systems are separable at all times throughout such a protocol, whenever the communication channel is entanglement-breaking. We use this fact and an entropy inequality from [Kin03] to split the relative entropy into two terms. The first term is bounded by an α-information radius, which is a measure of the range of states a channel can output. We then equate this to the sandwiched α-Holevo information [WWY14], which is a Rényi generalization of the Holevo information. The second term is bounded via monotonicity by another sandwiched Rényi relative entropy, to which we recursively apply the same argument. 3. This gives the following bound on the probability of success for any finite blocklength n: psucc ď 2´n supαą1 α´1 pR´χ rα pN qq α , (2.1) where R is the rate of communication and N is the EB channel. It follows from previous arguments [WWY14] that when R ą χpN q, the right hand side of (2.1) is a decaying exponential, thereby establishing the strong converse. We provide an alternate (arguably simpler) proof of this fact (similar to those in [MH11, CMW16]) by establishing that the α-Holevo information converges continuously to the Holevo information as α approaches 1. Appendix B includes a brief review of the argument for the weak converse from [BN05]. 4 3 Preliminaries In this section we provide some necessary definitions, concepts, and previous results used in the derivation of (2.1). 3.1 Quantum states, measurements, operator norms, and quantum channels We start with definitions of relevant mathematical notions from quantum mechanics. Given a finitedimensional Hilbert space H, let BpHq denote the algebra consisting of linear operators acting on H. A relevant measure of a operator X is its Schatten α-norm, which is defined as }X}α ” tTr r|X|α su1{α , (3.1) ? where α ě 1 and |X| ” X : X. The set of quantum states is a convex subset of BpHq given by SpHq “ tρ P BpHq : ρ ě 0, Tr ρ “ 1u , (3.2) where the notation ρ ě 0 means that ρ is positive semidefinite. For composite states, we consider the tensor product of two Hilbert spaces HA and HB , denoted by HA b HB . We can obtain from the overall density operator ρAB P SpHA b HB q the reduced density operator ρA corresponding to the quantum state on only the A system by performing a partial trace: ρA ” TrB pρAB q. (3.3) TrB p|x1 yxx2 |A b |y1 yxy2 |B q ” |x1 yxx2 |A xy2 |y1 y (3.4) The partial trace can be defined as for vectors |x1 y, |x2 y, |y1 y, and |y2 y, and then extended by linearity. A state ρAB is separable if it can be written as ÿ ρAB “ ppxqρxA b ρxB , (3.5) x where ppxq is a probability distribution and tρxA u and tρxB u are sets of states. A positive operator-valued measure (POVM) consists of a set tΛm u of positive semidefinite operators indexed by m and corresponding to different measurement results. The set satisfies ř m Λm “ I, which allows us to interpret the quantity pm ” TrpρΛm q (3.6) as the probability of measuring m given a quantum state ρ. We next consider maps on operators and in particular quantum states. A linear map Ψ : BpHA q Ñ BpHB q is called positive if @τ P BpHA q, τ ě 0 implies Ψpτ q ě 0. It is called completely positive if idR b Ψ is positive for an arbitrary auxiliary system R, where idR is the identity map on R. A map Ψ is a quantum channel if it is linear, completely positive, and also trace-preserving. 5 M A’0 X0 B’0 A’2 A’1 E1 A1 N B1 E2 X1 D1 A2 B2 N D2 B’1 E3 X2 A3 B3 N D3 B’2 M̂ Figure 1: A general protocol for feedback-assisted classical communication. The sender manipulates the systems labeled by A and the receiver those labeled by B. Every X system is classical and represents noiseless classical feedback from the receiver to the sender. 3.2 Classical feedback-assisted classical communication protocols Figure 1 depicts the most general three-round protocol for classical feedback-assisted classical communication. The generalization to n rounds is clear. The protocol begins with Alice preparing a classical register M with the message to be sent. This is correlated with some system A10 . Bob uses the classical feedback channel to send a classical system X0 correlated with some quantum system B01 to Alice. The global state is then ÿ ÿ ρM A10 X0 B01 ” pM pmq |my xm|M b ρm b pX0 pxq |xy xx|X0 b ρxB 1 . (3.7) 1 A 0 m 0 x We will track the state conditioned on a particular value m of the message register M , given by ÿ m ρm pX0 pxq |xy xx|X0 b ρxB 1 . (3.8) A1 X0 B 1 ” ρA1 b 0 0 0 0 x Alice performs an encoding EA1 1 X0 ÑA1 A1 . The state at this point is 0 ρm A11 A1 B01 ” 1 EA1 1 X0 ÑA1 A1 0 1 ÿ “ ´ ρm A10 X0 B01 ¯ (3.9) ´ ¯ x pX0 pxqEA1 1 X0 ÑA1 A1 ρm A1 b |xy xx|X0 b ρB 1 , 0 x 1 0 0 (3.10) 1 1 We note that the state ρm A11 A1 B01 is separable with respect to the cut A1 A1 : B0 . Next, Alice uses the EB channel NA1 ÑB1 for the first time by sending system A1 , leading to the state ´ ¯ m . (3.11) ρm ” N ρ 1 1 1 1 A1 ÑB1 A B1 B A A1 B 1 0 1 0 Since the channel is entanglement-breaking and the state before the channel was already separable with respect to the A11 A1 : B01 cut, the state after the channel is fully separable, that is, it is separable across all possible partitions. Now, consider instead that Alice uses an arbitrary channel 6 NA1 ÑB1 but with an input separable across the A11 : A1 cut (such that ρm A11 A1 B01 is fully separable). m Then, the state ρA1 B1 B 1 is again fully separable. We write it in the form 1 0 ρm A1 B1 B 1 “ 1 ÿ 0 y,m pY pyqρy,m b ρy,m B1 b ρB 1 . A1 1 y (3.12) 0 1 Bob now applies the decoding map DB 1 1 , where X1 is the classical system that is sent 1 B0 ÑX1 B1 back to Alice. The state at this point is ´ ¯ 1 m ρm (3.13) A11 X1 B11 ” DB1 B01 ÑX1 B11 ρA11 B1 B01 ÿ ÿ “ pX1 px1 q |x1 y xx1 |X1 b pZ1 |X1 pz1 |x1 qρxA11 ,z1 b ρxB11,z1 . (3.14) x1 z1 1 1 which is fully separable. Hence, after Alice applies the second encoder E 2 and then sends it through the channel, the state will still be fully separable. The key observation here is that if we use an EB channel or an arbitrary channel with separable inputs, the state is always separable across a cut that divides Alice and Bob’s systems. The only difference in subsequent rounds is the final measurement. Say there are n rounds in 1 using a POVM given by tDm u the protocol. At the last round, Bob measures the state ρBn Bn´1 with elements corresponding to different possible messages that Alice sent. 3.3 Rényi relative entropies and bounds on success probability An important classical information theoretic quantity is the Rényi relative entropy, which can be generalized to the quantum case in a number of ways. In this paper, we use the sandwiched quantum Rényi relative entropy [MLDS` 13, WWY14] which is given by ” ´` # ˘ ¯ı 1 p1´αq{p2αq ρσ p1´αq{p2αq α log Tr σ : ρ M σ ^ psupppρq Ď supppσq _ α P p0, 1qq α´1 r α pρ}σq ” D `8 : otherwise (3.15) where α P p0, 1q Y p1, 8q and ρ M σ means ρ, σ are non-orthogonal quantum states. Note that all logarithms in this paper are taken base two. We now recall some properties of the sandwiched Rényi relative entropy. For fixed ρ and σ, the r α pρ}σq is monotone non-decreasing [MLDS` 13]. It also converges to the quantum function α ÞÑ D relative entropy Dpρ}σq [Ume62] in the limit as α Ñ 1 [MLDS` 13, WWY14]: r α pρ}σq “ Dpρ}σq, lim D αÑ1 where " Dpρ}σq ” Tr rρ plog ρ ´ log σqs : supppρq Ď supppσq . `8 : otherwise (3.16) (3.17) Furthermore, it satisfies the data-processing inequality for α P r1{2, 1q Y p1, 8q [FL13, Bei13]; that is, for all quantum channels N , r α pN pρq}N pσqq ď D r α pρ}σq. D 7 (3.18) In particular, consider the following replacement channel which simply replaces the input with some state ω: Rω pρq ” Trpρqω. (3.19) r α pω}ωq “ 0, implying that It is easy to see that for all ω, D r α pρ}σq ě D r α pRω pρq}Rω pσqq “ 0, D (3.20) which shows that the sandwiched Rényi relative entropy is non-negative whenever its arguments are quantum states ρ and σ. Using the sandwiched Rényi relative entropy, we can define the sandwiched α-Holevo information [WWY14] of an ensemble, that is, a classical probability distribution of quantum states, tpX pxq, ρx u as r α pρXR }ρX b σR q rα ptpX pxq, ρx uq ” χ inf D (3.21) σR PSpHR q where ρXR ” ÿ pX pxq|xyxx|X b pρx qR (3.22) x and ρx are states of a system R. With this, we define the α-Holevo information of a quantum channel N as χ rα pN q ” sup χ rα ptpX pxq, N pρx quq . (3.23) tpX pxq,ρx u We also define the α-information radius of a channel N : SpHA q ÞÑ SpHB q as r α pN q ” K inf r α pN pρq}σq. sup D (3.24) σPSpHB q ρPSpHA q r α is monotonically non-decreasing in α, so are χ rα. We note that since D rα and K 4 Strong converse This section is dedicated to proving the main theorem of this paper. We will need the following lemmas. The first is proven using an inequality from [Nag01] in Lemma 5 of [CMW16] via monor α . The second will be used to take advantage of the separability of the quantum state tonicity of D observed in Section 3.2. The third is an equality between α-Holevo information and α-information radius. The fourth states that α-Holevo information and α-information radius respectively tend to the conventional Holevo information and information radius in the limit α Ñ 1, which we prove in Appendix C. Note that this establishes Lemma 3 as a generalization of the equality χpN q “ KpN q [OPW97, SW01, SW02]. Lemma 1. Let α ą 1, ρ, σ P SpHq, and Λ be such that 0 ď Λ ď I. Let p ” Tr rΛρs , q ” Tr rΛσs . Then r α pρ}σq ě D “ ‰ 1 log pα q 1´α . α´1 8 (4.1) (4.2) Lemma 2 ([Kin03, Hol06]). Let PAB be a positive semidefinite separable operator. Such an operator can be written in the following form: ÿ j j CA b DB , (4.3) PAB “ j j j where CA , DB ě 0 for all j. Let PB “ TrA tPAB u and let MA be a completely positive linear map acting on the A system. Then, for all α ě 1, }pMA b idB q pPAB q}α ď να pMA q ¨ }PB }α , (4.4) where να pMA q is the 1 Ñ α norm of MA , defined as να pMA q ” }MA pXq}α . }X}1 X‰0,XPBpHA q sup (4.5) Lemma 3 ([WWY14]). For α ą 1, the α-Holevo information and the α-information radius are the same: r α pN q. rα pN q “ K χ (4.6) Proof. This statement was essentially proved as Lemma 14 of [WWY14], but only for the interval α P p1, 2s. To get the statement for all α ą 1, we actually need to extend Lemma 14 in [WWY14] slightly. This follows from the proof given there and the observations that for all α ą 1, xp1´αq{α r α is jointly quasi-convex. is operator convex, Trtxα u is convex, and D For completeness and convenience, we also give a full proof here, following the steps in the r α pN q ď χ rα pN q for α ą 1. proof of Lemma 14 in [WWY14] closely. We first prove the inequality K p1´αq{2α p1´αq{2α α r α pρ}σq ” Trppσ Defining Q ρσ q q, consider that r α pN q “ inf sup D r α pN pρq}σq K σ 1 r α pN pρq}σq log Q α´1 (4.8) 1 r α pN pρq}σq log inf sup Q σ α´1 ρ (4.9) “ inf sup σ “ (4.7) ρ ρ r α quantity and find that So now we focus on the Q ż r r α pN pρq }σq inf sup Qα pN pρq }σq ď inf sup dµpρq Q σ σ µ ρ ż r α pN pρq}σq “ sup inf dµpρq Q µ σ ÿ r α pN pρx q }σq “ sup inf pX pxqQ tpX pxq,ρx u σ “ sup (4.11) (4.12) x r α pρXB }ρX b σB q inf Q tpX pxq,ρx u σB (4.10) (4.13) The first inequality follows by taking a supremum over all probability measures µ on the set of all states ρ. The first equality is a result of applying the Sion minimax theorem [Sio58]—we can do 9 ş r α pN pρq }σq is linear in the probability measure µ and convex in so because the function dµpρq Q r states σ. Convexity of Qα pN pρq}σq in σ follows because !´ ¯α ) r α pN pρq}σq “ Tr rN pρqs1{2 σ p1´αq{α rN pρqs1{2 Q , (4.14) xp1´αq{α is operator convex for α ą 1 and Trpxα q is convex for α ą 1. The second equality follows by an application of the Fenchel-Eggleston-Caratheodory theorem (see [EGK12], for example): the r α pN pρq}σq is continuous in ρ, which is a density operator acting on a d-dimensional function Q Hilbert space, so that for each µ, there exists a probability distribution pX pxq on no more than d2 letters such that ż ÿ r α pN pρq}σq “ r α pN pρx q }σq . (4.15) dµpρq Q pX pxqQ x r α and by defining The last equality in (4.13) follows from the properties of Q ÿ ρXB ” pX pxq |xy xx|X b rN pρx qsB . (4.16) x So we can then conclude that r α pN q ď K “ 1 r α pρXB }ρX b σB q log sup inf Q α´1 tpX pxq,ρx u σB (4.17) 1 r α pρXB }ρX b σB q log Q α´1 (4.18) sup inf tpX pxq,ρx u σB “χ rα pN q . (4.19) r α pN q ě χ rα pN q is simpler. Consider that The proof of the other inequality K χ rα pN q “ sup r α pρXB }ρX b σB q inf D (4.20) sup r α pρXB }ρX b σq D (4.21) r α p|xy xx| b N pρx q } |xy xx| b σq sup D (4.22) r α pN pρx q }σq sup D (4.23) tpX pxq,ρx u σB ď tpX pxq,ρx u sup ď tpX pxq,ρx u x sup “ tpX pxq,ρx u x r α pN pρq }σq . ď sup D (4.24) ρ r α for α ą 1 [FL13, Bei13], where a The second inequality follows from joint quasi-convexity of D function f is jointly quasi-convex if f pλx1 ` p1 ´ λqx2 , λy1 ` p1 ´ λqy2 q ď max tf px1 , y1 q, f px2 , y2 qu . (4.25) r α pN q ě χ rα pN q. Since the above inequality holds for all states σ, we can conclude that K Lemma 4. For a quantum channel N , the following limits hold: rα pN q “ χpN q lim χ αÑ1 10 (4.26) and r α pN q “ KpN q, lim K (4.27) αÑ1 where KpN q ” inf sup DpN pρq}σq (4.28) σPSpHq ρPSpHq is the information radius. We now state the theorem. Theorem 5. Given any n-round protocol for classical feedback-assisted classical communication over an entanglement-breaking channel N with rate R, the average probability of success is bounded from above by an exponential in n: psucc ď 2´n supαą1 α´1 pR´χ rα pN qq α , (4.29) rα is the α-Holevo information. The same bound holds for an arbitrary channel N given where χ that the encoder does not entangle inputs across different uses of the channel. Proof. We take as a starting point the approach of Nagaoka [Nag01], connecting hypothesis testing with data processing of a Rényi information quantity. Let Pn be such a protocol. We are bounding the average probability of success, so we assume Alice chooses her messages uniformly at random. Using the notation of Section 3.2, the state we have at the final round of the protocol Pn is 1 “ ρM Bn Bn´1 L 1 ÿ |myxm|M b ρm , 1 Bn Bn´1 L m“1 (4.30) where L is the number of possible messages. Following the argument in [CMW16], we can write the success probability as psucc ı ı ” 1ÿ ” m m 1 1 “ Tr DBn B 1 ρBn B 1 “ Tr TM Bn Bn´1 ρM Bn Bn´1 , n´1 n´1 L m (4.31) where 1 TM Bn Bn´1 ” ÿ m |myxm|M b DB 1 nB n´1 m . (4.32) Note that 0 ď T ď I, so that tT, I ´ T u is a POVM. 1 We now consider the state τM Bn Bn´1 defined to be the final state if we had implemented Pn using a replacement channel Rσ instead of the original channel (see Figure 2). The overall state in this alternate scenario has a simple expression since Bob’s states are now independent of m: 1 1 τM Bn Bn´1 “ τM b σBn b τBn´1 , (4.33) where τM “ IM {L. In the above, we remind that Bn is a label for the output system of the nth replacement channel Rσ , and the state of this system is equal to σ. We can then compute the following: ” ı ı 1ÿ ” m 1 1 1 1 Tr TM Bn Bn´1 τM Bn Bn´1 “ Tr DBn B 1 σBn b τBn´1 “ , (4.34) n´1 L m L 11 M A’0 X0 B’0 A’2 A’1 E1 A1 σ B1 X1 D1 E2 A2 σ X2 B2 D2 B’1 E3 A3 σ B3 B’2 D3 M̂ Figure 2: A protocol for feedback-assisted classical communication when using the replacement channel. Notice that the communication line between A1 and M̂ is broken. ř 1 where the last equality follows because m Dm “ I and TrrσBn b τBn´1 s “ 1. This equality is intuitive, since for a replacement channel, the receiver Bob cannot do any better than to guess the input message m at random. Letting T be the operator Λ in Lemma 1, we conclude that for α ą 1, „  1 1 α r 1 1 qě }τM Bn Bn´1 Dα pρM Bn Bn´1 log psucc 1´α , (4.35) α´1 L which can be re-written as follows: α r α pρM B B 1 }τM B B 1 q. logppsucc q ` log L ď D n n´1 n n´1 α´1 (4.36) We note that if the support of the state σ does not contain the support of the image of the channel r α upper bound is trivially equal to `8. So, in what follows, we choose σ such NAÑB , then the D that its support contains the support of the image of the channel in order to guarantee that all quantities involved in the forthcoming proof are finite. r α pρM B B 1 }τM B B 1 q. To do so, consider that We would therefore like to bound D n n´1 n n´1 r α pNAn ÑBn pρM A B 1 q}τM B 1 b σBn q r α pρM B B 1 }τM B B 1 q “ D D n n´1 n n´1 n n´1 n´1 ›˜ › ¸ › ´ ¯› α › p1´αq{p2αq p1´αq{p2αq › 1 “ τM B 1 log › Θ 1´α ˝ NAn ÑBn ρM An Bn´1 τM B 1 › , (4.37) α n´1 n´1 › › α´1 σBn α where ˝ denotes function composition and in the last equality, we define Θ by Θσ pρq ” σ 1{2 ρσ 1{2 , (4.38) and the identity operation on the other systems is implied. We now use the key observation from Section 3.2 (and used in [BN05]) that if N is EB or if Alice uses separable inputs, throughout Pn , 1 Alice and Bob’s systems are always separable. Furthermore, the M system is classical, so ρM An Bn´1 1 is separable with respect to the An : M Bn´1 cut. This implies that p1´αq{p2αq τM B 1 n´1 p1´αq{p2αq 1 ρM An Bn´1 τM B 1 n´1 12 (4.39) is a positive semidefinite separable operator: p1´αq{p2αq p1´αq{p2αq 1 τM B 1 ρM An Bn´1 τM B 1 n´1 n´1 “ p1´αq{p2αq τM B 1 n´1 ÿ “ ˜ ÿ ¸ ppjqρjAn b ρjM B 1 n´1 j ´ p1´αq{p2αq j ppjqρjAn b τM B 1 ρM B 1 n´1 j p1´αq{p2αq n´1 τM B 1 (4.40) n´1 p1´αq{p2αq ¯ τM B 1 . (4.41) n´1 Since conjugation by a positive semidefinite operator is clearly a completely positive map, we can apply Lemma 2 to conclude that › ›˜ ¸ › ´ ¯› › p1´αq{p2αq p1´αq{p2αq › 1 τM B 1 τM B 1 ˝ NAn ÑBn ρM An Bn´1 › › Θ 1´α α n´1 n´1 › › σBn ˜ ¸ α › › › p1´αq{p2αq p1´αq{p2αq › 1 ď να Θ 1´α ˝ N ¨ τ ρ τ › › . (4.42) 1 1 A ÑB M B n n MB n´1 M B α n´1 σBn n´1 α We then have the following chain of inequalities: ´ ¯ r α pρM B 1 }τM B 1 q r α pρM B B 1 }τM B B 1 q ď α log να Θ 1´α ˝ N ` D D n n´1 n n´1 n´1 n´1 σ α α´1 ¯ ´ α r α pρM B B 1 }τM B B 1 q ď log να Θ 1´α ˝N `D n´1 n´2 n´1 n´2 σ α α´1 ´ ¯ α r α pρM B 1 }τM B 1 q ďn log να Θ 1´α ˝N `D 0 0 σ α α´1 ¯ ´ α “n log να Θ 1´α ˝N σ α α´1 ›ˆ › ˙ › › α › “n log sup › Θ 1´α ˝ NAÑB pρA q›› . α α´1 σB ρA PSpHA q α (4.43) (4.44) (4.45) (4.46) (4.47) The first inequality follows by combining (4.37) and (4.42). The second inequality follows from monotonicity of the sandwiched Rényi relative entropy under the partial trace channel. The third r α pρM B B 1 }τM B B 1 q is the relative entropy at round inequality follows by recognizing that D n´1 n´2 n´1 n´2 n ´ 1 of Pn , which allows us to apply the above argument inductively. This is a crucial step of the argument and proves a form of additivity similar to that of (1.5). The first equality is a consequence of the fact that ρM B01 “ τM B01 , since no channels have been applied at that point in the protocol. The last equality follows from the main result of [Aud09] which allows us to take the supremum over quantum states instead of all operators (furthermore from the fact that quantum states have trace equal to one). Hence, we have that ›ˆ › ˙ › › α α › › . pρ q (4.48) log psucc pPn q ` log L ď n log sup › Θ 1´α ˝ N AÑB A › α´1 α´1 σB α ρA PSpHA q α Hence, we have proven that the upper bound holds for all states σB , so we can conclude that ›ˆ › ˙ › › α α › log psucc pPn q ` log L ď n inf sup log › Θ 1´α ˝ NAÑB pρA q›› (4.49) α α´1 σB PSpHB q ρA PSpHA q α ´ 1 σB α r α pN q “ nK (4.50) “ nr χα pN q. (4.51) 13 The first equality comes from the definition of the α-information radius, and the second equality is due to Lemma 3. Now, the protocol uses the channel n times and the rate R of Pn is defined to be the number of bits per channel use, so that R ď logn L . This allows us to introduce R into the inequality: 1 α´1 rα pN qq. log psucc pPn q ď ´ pR ´ χ n α (4.52) Since this is true for all α ą 1, we can take a supremum over α ą 1 and arrive at the bound stated in (4.29). The strong converse itself now follows from Theorem 5 and Lemma 4. Corollary 6 (Strong Converse). The probability of success of any sequence of protocols which use an entanglement-breaking channel with classical feedback at a rate greater than the classical capacity is bounded from above by a decaying exponential. The same is true for arbitrary channels with separable inputs. r α is monotonically increasing in α, so is χ Proof. Recall that since D rα . This along with Lemma 4 implies rα pN q “ lim χ rα pN q “ χpN q. inf χ αą1 αŒ1 (4.53) rα pN q as α Œ 1, there exists a value of α ą 1 such Hence, if R ą χpN q, by the continuity of χ pR ´ χ r that α´1 pN qq ą 0. Then the bound in (4.29) implies an exponential decay of the success α α probability. 5 Conclusion By studying the classical capacity of a quantum channel, quantum information theorists found that an implication of quantum mechanics for classical communication is the possibility of superior encoding schemes that use entanglement, a uniquely quantum phenomenon [Has09]. However, entanglement does not give an advantage for every channel. The results in this and previous papers show that for entanglement-breaking channels, no communication protocols, even with classical feedback, can take advantage of this extra resource. They cannot use it to increase their capacity, nor, as proved in this paper, to even lift the exponentially decaying ceiling on their success probabilities. We perhaps expect this since by definition EB channels destroy entanglement, and classical feedback channels cannot create entanglement. This is the guiding principle behind our proof, in particular the key fact that the transmitter and receiver states are separable throughout the protocol. More generally, it is known that classical feedback can give a large boost to the classical capacity of channels which are not entanglement-breaking in at least two different ways: first, there exist channels for which the Holevo information is small but the classical capacity with feedback included can be quite large [BDSS06]. Similarly, there exist channels for which the classical capacity is small but becomes large when classical feedback is available [SS09]. Thus, showing that the Holevo information is a strong-converse bound suggests that for feedback not to help, we require special channels, such as the entanglement-breaking ones. 14 Going in the opposite direction, it is known that EB channels form a proper superset of classical channels [KHH12]. We thus obtain the result of [PV10] as a direct corollary. Furthermore, since the original posting of our paper as arXiv:1506.02228, an open question that we posed has now been answered — the strong converse exponent from Theorem 5 is tight, due to the results in [MO17]. Hence, we obtain as a special case from this and our result the classical results of [Aug78, DK79, CK82] as well. A possible direction for future research is to ask the same question for Hadamard channels, which are defined to be complements of EB channels. To define the complementary channel, we first explain the interpretation of channel as a model for open quantum dynamics. That is, a channel from system A to system B can be interpreted as the restriction of a unitary interaction with larger system BR, where R is referred to as the “environment.” The complementary channel is the map from A to BR tracing out the B system instead and is itself a channel from A to R. Hence, Hadamard channels break any entanglement with the environment system that is traced out and is thus related to our guiding principle. The strong converse has already been proved for Hadamard channels [WWY14], but with the addition of classical feedback, even a weak converse has yet to be proved. Examples of Hadamard channels include generalized dephasing channels, cloning channels, and the Unruh channel [BHTW10]. Finally, we remark here that it should be possible to use the methods given here and in [CMW16] in order to characterize a particular adaptive hypothesis testing scenario. Suppose that the goal is to distinguish an entanglement-breaking channel from a replacement channel by means of adaptive, separability-preserving channels. Then the optimal strong converse exponent should be given in terms of a quantity similar to that in (4.29). However, we leave the details for future work. Acknowledgements. We are grateful to Patrick Hayden, Milan Mosonyi, and Graeme Smith for insightful discussions about the topic of this paper. We also thank an anonymous referee for many helpful suggestions for improving the paper. MMW acknowledges support from startup funds from the Department of Physics and Astronomy at LSU, the NSF under Award No. CCF-1350397, and the DARPA Quiness Program through US Army Research Office award W31P4Q-12-1-0019. DD acknowledges support from a Stanford Graduate Fellowship. A Additivity Here we justify the statement in (1.5). The backward implication is trivial. As for the forward implication, we first note that given n, for all k P Z` , 1 1 χpN bn q ď χpN bkn q, n kn (A.1) because we can split the kn channels into k blocks of n channels and encode each block independently. In particular, n1 χpN bn q ě χpN q. To show the opposite inequality, we assume the contrapositive: n1 χpN bn q ą χpN q for some n. However, this means 1 1 χpN bkn q ´ χpN q ě χpN bn q ´ χpN q ą 0, kn n for all k P Z` and thus the limit in (1.4) does not converge to χpN q. 15 (A.2) B Weak converse and finite bounds We recall for motivation and the reader’s convenience the argument for the weak converse from [BN05]. Theorem 7. Let Pn be a protocol for classical feedback-assisted classical communication over an entanglement-breaking channel N such that it uses the channel n times, has communication rate R, and has average probability of decoding error ε. Then, it satisfies the following inequality: R ď χpN q ` gpn, εq, (B.1) where χpN q is the Holevo information of the channel and gpn, εq is a real valued function such that lim lim gpn, εq “ 0. (B.2) εŒ0 nÑ8 The same is true for a protocol for communication over an arbitrary channel given that the encoder does not entangle inputs across different uses of the channel. Proof. We use the notation in Section 3.2 and take a general approach that is, for instance, presented in Section 21.5.1 of [Wil16]. Let Φ denote the following “shared randomness” state: 1 ÿ |my xm|M b |my xm|M̂ , ΦM M̂ “ (B.3) |M| m where |M| is the size of the message set M. Now, suppose the information processing task is common randomness generation instead of classical communication. If we require the state ρ at the end of the protocol to be ε1 -close to Φ kΦ ´ ρk1 ď ε1 , (B.4) the Fannes-Audenaert inequality for mutual information [Fan73, Aud07] gives (B.5) nR “ IpM ; M̂ qΦ 1 ď IpM ; M̂ qρ ` f pn, ε q, (B.6) where f pn, ε1 q is some continuous function of n and ε1 with the property: limε1 Œ0 limnÑ8 n1 f pn, ε1 q “ 0. Continuing, we have 1 IpM ; M̂ qρ ď IpM ; Bn Bn´1 qρ “ 1 IpM ; Bn´1 qρ ` (B.7) 1 IpM ; Bn |Bn´1 qρ , (B.8) where we applied the data processing inequality and the chain rule for conditional quantum mutual information. We use the chain rule again to get 1 1 IpM ; Bn |Bn´1 qρ ď IpM Bn´1 ; Bn qρ . (B.9) From Section 3.2, if N is entanglement-breaking or if Alice uses separable inputs, Alice and Bob’s systems are always separable. Hence, the global state before the nth channel use can be written as ÿ 1 ρM A1n An Bn´1 “ pM pmq|myxm|M b ρm (B.10) A1n An B 1 n´1 m ÿ “ pM pmq |my xm|M b m ÿ y 16 m,y pY |M py|mqρm,y . A1 An b ρB 1 n n´1 (B.11) Hence, the state after the channel is given by ¯ ´ ÿ ÿ m,y 1 . “ pM pmq |my xm|M b pY |M py|mqNAn ÑBn ρm,y ρM A1n Bn Bn´1 1 A An b ρB 1 n y m (B.12) n´1 We introduce an auxiliary system Y that labels the separable sum over the index y. That is, Y is chosen such that the global state is ´ ¯ ÿ m,y 1 ” pM pmq pY |M py|mq |my xm|M b |yy xy|Y b NAn ÑBn ρm,y . (B.13) ρM Y A1n Bn Bn´1 1 A An b ρB 1 n m,y n´1 We trace over A1n to get 1 ρM Y Bn Bn´1 “ ÿ m,y pM pmq pY |M py|mq |my xm|M b |yy xy|Y b ρm,y , Bn b ρB 1 where (B.14) n´1 m,y ´ ´ ¯¯ ` ˘ m,y 1 ρm,y ” Tr N ρ “ NAn ÑBn ρm,y An ÑBn An An . Bn A1 An n (B.15) This allows us to argue 1 1 IpM Bn´1 ; Bn qρ ď IpM Y Bn´1 ; Bn qρ “ IpM Y ; Bn qρ ` 1 IpBn´1 ; Bn |M Y qρ (B.16) (B.17) “ IpM Y ; Bn qρ (B.18) ď χpN q, (B.19) where the first inequality is from data processing, the first equality from the chain rule, and the 1 second equality because the Bn´1 Bn system is in a product state when conditioning on M and Y . Finally, given equation (B.15), the state ρM Y Bn is a classical-quantum state of the form: ´ ¯ 1 1 ρM Y Bn “ TrBn´1 ρM Y Bn Bn´1 (B.20) ÿ ` ˘ “ pM pmq pY |M py|mq |my xm|M b |yy xy|Y b NAn ÑBn ρm,y (B.21) An . m,y Hence, the definition of the Holevo information of the channel N gives us final inequality. Putting things together, we find that 1 IpM ; M̂ qρ ď χpN q ` IpM ; Bn´1 qρ ď χpN q ` 1 IpM ; Bn´1 Bn´2 qρ , (B.22) (B.23) where the last inequality follows from the data processing inequality. But now, we recognize the 1 1 quantity IpM ; Bn´1 Bn´2 qρ is of the same form as IpM ; Bn Bn´1 qρ in (B.7), so that we can iterate through the same sequence of arguments to get 1 IpM ; M̂ qρ ď 2χpN q ` IpM ; Bn´2 Bn´3 qρ . (B.24) Continuing all the way back to the first channel use, we find IpM ; M̂ qρ ď nχpN q 17 (B.25) since IpM ; B01 q “ 0 (see (3.7)). Thus, we conclude R ď χpN q ` 1 f pn, ε1 q. n (B.26) Now, the rate for classical communication with n channel uses and error ε is at most that of randomness generation with n uses and error ε1 , where ε1 is some function of ε such that limεŒ0 ε1 “ 0. Hence, gpn, εq ” n1 f pn, ε1 q is what we need. Corollary 8 (Weak Converse). The classical capacity of entanglement-breaking channels with classical feedback is given by the Holevo information. The same is true for arbitrary channels with separable inputs. Proof. This is immediate. C Limit value of the α-Holevo information The arguments here are essentially the same as those in [MH11, CMW16], along with an additional insight from [TWW17, Appendix A]. We first recall a minimax result due to [MH11, Corollary A2]. s where X is a compact topological space, Y is a Lemma 9. Suppose a function f : X ˆ Y Ñ R, s subset of R, and R is the extended real numbers, satisfies 1. @y P Y , f p¨, yq is lower semicontinuous. 2. @x P X, f px, ¨q is monotonic. Then, inf sup f px, yq “ sup inf f px, yq. xPX yPY yPY xPX (C.1) If the first condition was instead 1. @y P Y , f p¨, yq is upper semicontinuous, then inf sup f px, yq “ sup inf f px, yq. yPY xPX xPX yPY (C.2) We now prove Lemma 4. r α pρXR1 , ρX bσR1 q is lower semicontinuous (see, e.g., [CMW16, Proof. For fixed ρXR1 and α, σR1 ÞÑ D r α pρXR1 , ρX b σR1 q is monotone nonAppendix A]). Furthermore, for fixed ρXR1 and σR1 , α ÞÑ D decreasing. We can therefore invoke Lemma 9 with X “ SpHR1 q and Y “ p0, 1q. We use this, the definition of the Holevo information, and properties of the quantum relative entropy to find the 18 following one-sided limit of the α-Holevo information of a quantum channel N : BpHR q Ñ BpHR1 q: rα pN q “ sup χ rα pN q lim χ αÕ1 (C.3) αPp0,1q “ sup sup αPp0,1q tpX pxq,ρx u “ “ “ “ sup rα ptpX pxq, N pρx quq χ sup inf r α pρXR1 }ρX b σR1 q D (C.5) r α pρXR1 }ρX b σR1 q sup D (C.6) tpX pxq,ρx u αPp0,1q σR1 PSpHR1 q sup inf (C.4) tpX pxq,ρx u σR1 PSpHR1 q αPp0,1q sup inf tpX pxq,ρx u σR1 PSpHR1 q DpρXR1 }ρX b σR1 q IpX : R1 qρ sup (C.7) (C.8) tpX pxq,ρx u “ χpN q, (C.9) where ρXR1 ” ÿ pX pxq|xyxx|X b rN pρx qsR1 . (C.10) x The fourth equality follows from applying Lemma 9. The fifth follows from (3.16) and the fact that the sandwiched Rényi relative entropy is monotone non-decreasing in α. r α pN pρR q}σR1 q is monotone To find the other limit, we note that for fixed ρR and σR1 , α ÞÑ D non-decreasing. We then use an idea from [TWW17, Appendix A]. Note that for fixed α and r α pN pρR q}σR1 q is continuous (and thus upper semicontinuous). Let positive definite σR1 , ρR ÞÑ D ε P p0, 1q and define σ pεq ” p1 ´ εq σ ` επ, where π is the maximally mixed state. Thus σpεq is positive definite for σ positive semidefinite. Consider that σpεq ě p1 ´ εq σ, (C.11) Dpρ}σpεqq ď Dpρ} p1 ´ εq σq “ Dpρ}σq ´ log p1 ´ εq . (C.12) which implies that (This is because of the well known fact that σ ď σ 1 implies that Dpρ}σq ě Dpρ}σ 1 q.) Hence, using Lemma 9, Lemma 3, and the identification of the Holevo information as an information radius 19 [OPW97, SW01], we can conclude the following chain of equalities: rα pN q rα pN q “ inf χ lim χ (C.13) r α pN q “ inf K (C.14) αą1 αŒ1 αą1 “ inf inf sup r α pN pρR q}σR1 q D (C.15) ď inf inf sup r α pN pρR q}σpεqR1 q D (C.16) sup r α pN pρR q}σpεqR1 q D (C.17) αą1 σR1 PSpHR1 q ρ PSpH q R R αą1 σR1 PSpHR1 q ρ PSpH q R R “ “ “ ď inf inf σR1 PSpHR1 q αą1 ρR PSpHR q inf sup r α pN pρR q}σpεqR1 q inf D (C.18) inf sup DpN pρR q}σpεqR1 q (C.19) DpN pρR q}σR1 q ´ logp1 ´ εq (C.20) σR1 PSpHR1 q ρR PSpHR q αą1 σR1 PSpHR1 q ρR PSpHR q inf sup σR1 PSpHR1 q ρR PSpHR q “ χpN q ´ log p1 ´ εq . (C.21) The first inequality follows because there is an infimum with respect to σR1 , such that replacing σR1 with σpεqR1 can never decrease the quantity. The fifth equality follows from applying Lemma 9. The sixth equality follows from (3.16) and the fact that the sandwiched Rényi relative entropy is monotone non-decreasing in α. The last inequality follows from (C.12). The last equality uses χpN q “ KpN q. rα pN q ď χpN q. Combined with Given that ε ą 0 was arbitrary, we can conclude that limαŒ1 χ rα pN q ě χpN q for all α ě 1, we conclude that the fact that χ rα pN q “ χpN q. lim χ (C.22) r α pN q “ KpN q. lim K (C.23) αŒ1 This also implies that αŒ1 r α pN q “ KpN q, which follows from a similar line of reasoning: We now show that limαÕ1 K r α pN q “ sup K r α pN q lim K αÕ1 (C.24) αPp0,1q “ sup inf sup r α pN pρR q}σR1 q D (C.25) r α pN pρR q}σR1 q D (C.26) r α pN pρR q}σR1 q sup D (C.27) αPp0,1q σR1 PSpHR1 q ρR PSpHR q “ “ “ inf sup sup σR1 PSpHR1 q αPp0,1q ρR PSpHR q inf sup σR1 PSpHR1 q ρR PSpHR q αPp0,1q inf sup σR1 PSpHR1 q ρR PSpHR q “ KpN q, DpN pρR q}σR1 q (C.28) (C.29) 20 where the third equality follows from Lemma 9 and the fact that for fixed α and ρR , σR1 ÞÑ r α pN pρR q}σR1 q is lower semicontinuous and that the pointwise supremum of lower semicontinuous D functions is lower semicontinuous. References [Ari73] Suguru Arimoto. On the converse to the coding theorem for discrete memoryless channels. IEEE Transactions on Information Theory, 19(3):357–359, May 1973. [Aud07] Koenraad M. R. Audenaert. A sharp continuity estimate for the von Neumann entropy. Journal of Physics A: Mathematical and Theoretical, 40(28):8127, July 2007. arXiv:quant-ph/0610146. [Aud09] Koenraad M. R. Audenaert. A note on the p Ñ q norms of 2-positive maps. Linear Algebra and its Applications, 430(1):1436–1440, February 2009. arXiv:mathph/0505085. [Aug78] Udo Augustin. Noisy channels. Habilitation thesis, Universitat Erlangen-Nurnberg, West Germany, September 1978. [BDSS06] Charles H. Bennett, Igor Devetak, Peter W. Shor, and John A. Smolin. Inequalities and separations among assisted capacities of quantum channels. Physical Review Letters, 96(15):150502, April 2006. arXiv:quant-ph/0406086. [Bei13] Salman Beigi. Sandwiched Rényi divergence satisfies data processing inequality. Journal of Mathematical Physics, 54(12):122202, December 2013. arXiv:1306.5920. [BGPWW15] Bhaskar Roy Bardhan, Raul Garcia-Patron, Mark M. Wilde, and Andreas Winter. Strong converse for the classical capacity of all phase-insensitive bosonic Gaussian channels. IEEE Transactions on Information Theory, 61(4):1842–1850, April 2015. arXiv:1401.4161. [BHTW10] Kamil Brádler, Patrick Hayden, Dave Touchette, and Mark M. Wilde. Trade-off capacities of the quantum Hadamard channels. Physical Review A, 81(6):062312, June 2010. arXiv:1001.1732. [BN05] Garry Bowen and Rajagopal Nagarajan. On feedback and the classical capacity of a noisy quantum channel. IEEE Transactions on Information Theory, 51(1):320–324, 2005. arXiv:quant-ph/0305176. [CK82] Imre Csiszar and Janos Korner. Feedback does not affect the reliability function of a DMC at rates above capacity. IEEE Transactions on Information Theory, 28(1):92– 93, January 1982. [CMW16] Tom Cooney, Milan Mosonyi, and Mark M. Wilde. Strong converse exponents for a quantum channel discrimination problem and quantum-feedback-assisted communication. Communications in Mathematical Physics, 344(3):797–829, June 2016. arXiv:1408.3373. 21 [CT91] Thomas M. Cover and Joy A. Thomas. Elements of Information Theory. WileyInterscience, August 1991. [DK79] Gunther Dueck and Janos Korner. Reliability function of a discrete memoryless channel at rates above capacity. IEEE Transactions on Information Theory, 25(1):82–85, January 1979. [EGK12] Abbas El Gamal and Young-Han Kim. Network information theory. Cambridge University Press, January 2012. [Fan73] Mark Fannes. A continuity property of the entropy density for spin lattice systems. Communications in Mathematical Physics, 31(4):291–294, December 1973. [FL13] Rupert L. Frank and Elliott H. Lieb. Monotonicity of a relative Rényi entropy. Journal of Mathematical Physics, 54(12):122201, December 2013. arXiv:1306.5358. [GK12] Abbas El Gamal and Young-Han Kim. Network information theory. Cambridge University Press, January 2012. arXiv:1001.3404. [Has09] Matthew B. Hastings. Superadditivity of communication capacity using entangled inputs. Nature Physics, 5:255–257, April 2009. arXiv:0809.3972. [Hay07] Masahito Hayashi. Error exponent in asymmetric quantum hypothesis testing and its application to classical-quantum channel coding. Physical Review A, 76(6):062301, December 2007. arXiv:quant-ph/0611013. [Hol98] Alexander S. Holevo. The capacity of the quantum channel with general signal states. IEEE Transactions on Information Theory, 44(1):269–273, January 1998. arXiv:quant-ph/9611023. [Hol06] Alexander S. Holevo. Multiplicativity of p-norms of completely positive maps and the additivity problem in quantum information theory. Russian Mathematical Surveys, 61(2):301–339, 2006. [HSR03] Michal Horodecki, Peter W. Shor, and Mary Beth Ruskai. Entanglement breaking channels. Reviews in Mathematical Physics, 15(6):629–641, August 2003. arXiv:quant-ph/0302031. [KHH12] J. K. Korbicz, P. Horodecki, and R. Horodecki. Quantum-correlation breaking channels, broadcasting scenarios, and finite Markov chains. Physical Review A, 86(4):042319, October 2012. arXiv:1208.2162. [Kin03] Christopher King. Maximal p-norms of entanglement breaking channels. Quantum Information and Computation, 3(2):186–190, 2003. arXiv:quant-ph/0212057. [KW09] Robert Koenig and Stephanie Wehner. A strong converse for classical channel coding using entangled inputs. Physical Review Letters, 103(7):070504, August 2009. arXiv:0903.2838. 22 [MH11] Milán Mosonyi and Fumio Hiai. On the quantum Rényi relative entropies and related capacity formulas. IEEE Transactions on Information Theory, 57(4):2474–2487, April 2011. arXiv:0912.1286. [MLDS` 13] Martin Müller-Lennert, Frédéric Dupuis, Oleg Szehr, Serge Fehr, and Marco Tomamichel. On quantum Rényi entropies: A new generalization and some properties. Journal of Mathematical Physics, 54(12):122203, December 2013. arXiv:1306.3142. [MO17] Milán Mosonyi and Tomohiro Ogawa. Strong converse exponent for classicalquantum channel coding. Communications in Mathematical Physics, 355(1):373–426, October 2017. arXiv:1409.3562v7. [Nag01] Hiroshi Nagaoka. Strong converse theorems in quantum information theory. Proceedings of ERATO Workshop on Quantum Information Science, page 33, 2001. Also appeared in Asymptotic Theory of Quantum Statistical Inference, ed. M. Hayashi, World Scientific, 2005. [ON99] Tomohiro Ogawa and Hiroshi Nagaoka. Strong converse to the quantum channel coding theorem. IEEE Transactions on Information Theory, 45(7):2486–2489, November 1999. arXiv:quant-ph/9808063. [OPW97] Masanori Ohya, Denes Petz, and Noburu Watanabe. On capacities of quantum channels. Probability and Mathematical Statistics-Wroclaw University, 17:179–196, 1997. [PV10] Yury Polyanskiy and Sergio Verdú. Arimoto channel coding converse and Rényi divergence. Proceedings of the 48th Annual Allerton Conference on Communication, Control, and Computation, pages 1327–1333, September 2010. [Sho02] Peter W. Shor. Additivity of the classical capacity of entanglement-breaking quantum channels. Journal of Mathematical Physics, 43(9):4334–4340, October 2002. arXiv:quant-ph/0201149. [Sio58] Maurice Sion. On general minimax theorems. Pacific Journal of Mathematics, 8(1):171–176, 1958. [SS09] Graeme Smith and John A. Smolin. Extensive nonadditivity of privacy. Physical Review Letters, 103(12):120503, September 2009. arXiv:0904.4050. [SW97] Benjamin Schumacher and Michael Westmoreland. Sending classical information via noisy quantum channels. Physical Review A, 56(1):131–138, July 1997. [SW01] Benjamin Schumacher and Michael D Westmoreland. Optimal signal ensembles. Physical Review A, 63(2):022308, January 2001. arXiv:quant-ph/9912122. [SW02] Benjamin Schumacher and Michael D Westmoreland. Relative entropy in quantum information theory. Contemporary Mathematics, 305:265–290, 2002. arXiv:quantph/0004045. 23 [TWW17] Marco Tomamichel, Mark M. Wilde, and Andreas Winter. Strong converse rates for quantum communication. IEEE Transactions on Information Theory, 63(1):715–727, January 2017. arXiv:1406.2946. [Ume62] Hisaharu Umegaki. Conditional expectation in an operator algebra. Kodai Mathematical Seminar Reports, 14(2):59–85, 1962. [Wil16] Mark M. Wilde. From classical to quantum Shannon theory. arXiv:1106.1445v7. [Win99] Andreas Winter. Coding theorem and strong converse for quantum channels. IEEE Transactions on Information Theory, 45(7):2481–2485, 1999. arXiv:1409.2536. [Wol78] Jacob Wolfowitz. Coding Theorems of Information Theory. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 3rd edition, 1978. [WWY14] Mark M. Wilde, Andreas Winter, and Dong Yang. Strong converse for the classical capacity of entanglement-breaking and Hadamard channels via a sandwiched Rényi relative entropy. Communications in Mathematical Physics, 331(2):593–622, October 2014. arXiv:1306.1586. 24 March 2016.
7
NORTH-SOUTH DYNAMICS OF HYPERBOLIC FREE GROUP AUTOMORPHISMS ON THE SPACE OF CURRENTS arXiv:1509.05443v3 [math.GR] 29 Jun 2017 MARTIN LUSTIG AND CAGLAR UYANIK Abstract. Let ϕ be a hyperbolic outer automorphism of a non-abelian free group FN such that ϕ and ϕ−1 admit absolute train track representatives. We prove that ϕ acts on the space of projectivized geodesic currents on FN with generalized uniform North-South dynamics. 1. Introduction Thurston’s groundbreaking work on the classification of surface homeomorphisms (NielsenThurston classification) has triggered much of the progress on the mapping class group and on the Teichmüller space in the past 30 years. This theory has inspired important developments for several related groups; most notably for the group Out(FN ) of outer automorphisms of a non-abelian free group FN of finite rank N ≥ 2. Two rather different spaces on which Out(FN ) acts serve as analogues to Teichmüller space: One is Culler-Vogtmann’s Outer space CVN [CV86], the other is the space of projectivized geodesic currents PCurr(FN ) [Bon91]. An intersection form, generalizing Thurston’s celebrated intersection form for measured laminations [Thu88], intimately intertwines the two spaces [KL09]. The space CVN is finite dimensional, and the action of Out(FN ) on CVN is properly discontinuous. Moreover, CVN has a natural “Thurston boundary”, which gives rise to a compactification CVN . The Out(FN )-action extends to this compactification, which mimics closely Thurston’s compactification of the Teichmüller space via projective measured laminations [BF93], [CL95], [CV86], [Thu88]. On the other hand, the space of projectivized geodesic currents PCurr(FN ) is infinite dimensional, but it is already compact, and has a projective structure. There is a natural “interior” of PCurr(FN ) on which Out(FN ) acts properly discontinuously [KL10a]. The space CVN has received more attention in recent years than PCurr(FN ), due to the connections with various curve complex analogues (see e.g. [BF14], [HM13]). Nevertheless, for several purposes, including some rather fundamental ones, the space PCurr(FN ) seems to have an advantage over CVN . In order get a deeper understanding one often needs to utilize the action of Out(FN ) on both spaces simultaneously, see for instance [BR15], [Ham12]. February 12, 2018. The authors gratefully acknowledge support from U.S. National Science Foundation grants DMS 1107452, 1107263, 1107367 “RNMS: GEometric structures And Representation varieties” (the GEAR Network).” The first author was partially supported by the French research grant ANR-2010-BLAN-116-01 GGAA. The second author was partially supported by the NSF grants of Ilya Kapovich (DMS 1405146 and DMS 1710868) and Christopher J. Leininger (DMS 1510034). 1 2 MARTIN LUSTIG AND CAGLAR UYANIK This paper concerns one of the fundamental features prominently present in NielsenThurston theory: the dynamics of the action of individual elements ϕ ∈ Out(FN ) on PCurr(FN ), and the study of the relationship between aspects of this dynamics and the algebraic structure of ϕ. More precisely, the paper aims to generalize Thurston’s result that any pseudo-Anosov mapping class acts on compactified Teichmüller space with North-South dynamics [Thu88, Iva92] An important result in this direction is already known for both of the above mentioned Out(FN )-analogues of Teichmüller space: If the automorphism ϕ ∈ Out(FN ) is fully irreducible, also known as iwip (“irreducible with irreducible powers”), then the ϕ-action on both, CVN and PCurr(FN ), has uniform North-South dynamics, see [LL03], [Mar95], [Uya14] and [Uya15]. The pairs of poles of these two actions are strongly related to each other through the above mentioned intersection form, see [CHL08], [KL10b], [Uya15]. In this paper we concentrate on the following class of automorphisms: An element ϕ ∈ Out(FN ) is called hyperbolic if the length of any non-trivial conjugacy class grows exponentially under iteration of ϕ. This condition turns out to be equivalent to requiring that ϕ is atoroidal, i.e. ϕ has no non-trivial periodic conjugacy class in FN . Recall that both classes, fully irreducible and hyperbolic automorphisms, can be viewed as natural analogues of pseudo-Anosov mapping classes. In a probabilistic sense, both of these notions are “generic” in Out(FN )[Riv08], as is the case for pseudo-Anosov homeomorphisms in mapping class groups [Riv08, Mah11]. Hyperbolic automorphisms have the advantage that their mapping torus groups FN oϕ Z are Gromov hyperbolic, see [BF92], [Bri00]. However, hyperbolic automorphisms can admit invariant free factors and hence these automorphisms are harder to study than fully irreducible automorphisms. As a consequence of the more complicated algebraic structure, one can not expect a classical North-South dynamics for hyperbolic automorphisms. Counterexamples for both, CVN and PCurr(FN ) are easy to construct. Nevertheless, it turns out that there are still strong North-South dynamical features in the action of any hyperbolic ϕ ∈ Out(FN ) on the space of currents. This paper aims to make this statement precise: We define “generalized North and South poles” in PCurr(FN ), which are finite dimensional simplexes ∆+ (ϕ) and ∆− (ϕ), and show: Theorem 1.1. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism with the property that both ϕ and ϕ−1 admit (absolute) train track representatives. Then ϕ acts on PCurr(FN ) with “generalized uniform North-South dynamics from ∆− (ϕ) to ∆+ (ϕ)” in the following sense: Given a neighborhood U of ∆+ (ϕ) and a compact set K ⊂ PCurr(FN ) r ∆− (ϕ), there exists an integer M ≥ 1 such that ϕn (K) ⊂ U for all n ≥ M . Similarly, given a neighborhood V of ∆− (ϕ) and a compact set K 0 ⊂ PCurr(FN ) r ∆+ (ϕ), there exists an integer M 0 ≥ 1 such that ϕ−n (K 0 ) ⊂ V for all n ≥ M 0 . Although there exist hyperbolic automorphisms that do not admit (absolute) train track representatives (see Sections 2.3 and 2.4), the train track assumption in the above theorem turns out to be not really restrictive (see Remark 2.6). Our train track technology (see Section 4) has been purposefully set up in a way that it also applies to more general kind of train track maps. Since the paper is already technically rather loaded, we have refrained from adding such generalizations here. DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 3 The second dynamics result obtained here concerns single orbits of rational currents, that is, currents given by non-trivial conjugacy classes in FN , which form a dense subset of PCurr(FN ), see Section 2.5: Theorem 1.2. Let ϕ be as in Theorem 1.1, and let µ ∈ Curr(FN ) be a non-zero rational current. Then, after possibly replacing ϕ by a positive power, there are [µ∞ ] ∈ ∆+ (ϕ) and [µ−∞ ] ∈ ∆− (ϕ) such that lim ϕn [µ] = [µ∞ ] n→∞ and lim ϕ−n [µ] = [µ−∞ ]. n→∞ It is important to point out that this pointwise convergence is in general not uniform: On the contrary, it is possible to construct examples of hyperbolic ϕ for which there exist rational currents that linger for an arbitrary long iteration time in an arbitrary close neighborhood of a (fixed) current that is different from the eventual limit current. We now give a brief outline of the paper. We’d like to point out immediately that the sections 3, 4 and 5 are written independently of each other and can be read in arbitrary order. • In Section 2 we recall some background information and set up notation that is needed in the sections to follow. • In Section 3 we define several versions of North-South dynamics (in a general context without reference to Out(FN ) or currents) and derive the main criterion (Propositions 3.3 and 3.4) used in the proof of Theorem 1.1. • Section 4 is entirely devoted to train track technology, addressing issues such as indivisible Nielsen paths (INPs), exponential growth of the number of illegal turns under backwards iteration, etc. Moreover, we recall and investigate the notion of “goodness” which plays a key role in our analysis. We conclude Section 4 with Proposition 4.20 (see also Remark 4.21). This proposition is a crucial tool in our approach, since it permits the restriction of our attention in the convergence approximation to conjugacy classes with large goodness. • In Section 5 we present some standard notions from symbolic dynamics and use the main result from our previous paper [LU17] on limit frequencies of substitutions in order to define the limit simplexes ∆+ (ϕ) and ∆− (ϕ) and show their ϕ-invariance (Corollary 5.12). • In Section 6 the crucial convergence approximation is calculated for conjugacy classes with large goodness (Lemma 6.1), done carefully over several pages. The main results are derived from “putting together the pieces” derived previously. We finish this section with a particular “free products” example of hyperbolic outer automorphisms which are not fully irreducible. Acknowledgements: We would heartfully like to thank Ilya Kapovich for his constant encouragement and support, as well as for many helpful mathematical and organizational suggestions. We would also like to thank Arnaud Hilion and Matt Clay for useful exchanges and helpful comments. We thank the anonymous referee who provided detailed feedback, 4 MARTIN LUSTIG AND CAGLAR UYANIK and prompted us to clarify several points and improve the exposition. The second author is grateful to Chris Leininger for useful discussions, support, and helpful comments. 2. Preliminaries We first recall facts about graphs, paths, and maps between graphs. For an even more detailed discussion of these notions we refer reader to Section 2 of [DKL15]. For a streamlined version which uses the standard conventions the reader is referred to [LU16]. 2.1. Graphs. A topological graph Γ is a 1-dimensional finite cell complex. The 0-cells of Γ are called vertices and the set of vertices is denoted by V Γ. The 1-cells of Γ are called topological edges and the set of topological edges is denoted by Etop Γ. Each topological edge admits exactly two orientations, and we call a topological edge with a choice of orientation an oriented edge. The set of all oriented edges is denoted by EΓ. Given e ∈ EΓ, we denote the edge with the opposite orientation by e. Given a finite set of points in a topological graph Γ, one obtains a topological graph Γ0 as the subdivision, in which the vertex set contains the original vertex set, together with the finite set of points. Let Γ be a topological graph. We choose an orientation for each edge, and denote the set of positively (resp. negatively) oriented edges by E + Γ ( resp. E − Γ). Given an edge e ∈ E + Γ, the initial vertex of e is denoted by o(e) and the terminal vertex of e is denoted by t(e). The graph Γ is equipped with a natural metric called the simplicial metric which is obtained by identifying each edge e of Γ with the interval [0, 1] via a characteristic map αe : [0, 1] → e, meaning that α is continuous on [0, 1] and the restriction to (0, 1) is an orientation preserving homeomorphism onto the interior of e. 2.2. Paths. A combinatorial edge path γ of simplicial length n ≥ 1 is a concatenation e1 e2 . . . en of oriented edges of Γ where t(ei ) = o(ei+1 ). The simplicial length of an edge path γ in Γ is denoted by |γ|Γ , and if it is clear from the context, we suppress Γ and write |γ|. A topological edge path of simplicial length n ≥ 1 is a continuous map p : [a, b] → Γ such that there exists a combinatorial edge path γp = e1 e2 . . . en and a subdivision a = c0 < c1 < c2 < . . . < cn = b such that for each 1 ≤ i ≤ n we have p(ci−1 ) = o(ei ), and p(ci ) = t(ei ) and the restriction of p to (ci−1 , ci ) is an orientation preserving homeomorphism onto the interior of ei . We say that γp is the combinatorial edge path associated to p. Let Γ be equipped with the simplicial metric as above. A topological edge path p : [a, b] → Γ is a PL edge path if for every edge ei in the combinatorial edge path γp the composition αe−1 ◦ p : (ci−1 , ci ) → (0, 1) is the unique orientation preserving affine homeomorphism from i (ci−1 , ci ) to (0, 1). By not requiring that p(a) and p(b) are vertices in Γ, the concept of PL edge paths easily extend to PL paths. A combinatorial edge path of simplicial length 0 consists of a vertex in Γ. A (degenerate) edge path γ that consists of a vertex is called trivial. A combinatorial edge path γ is called reduced if ei 6= ei+1 for all i = 1, . . . , n − 1. A reduced edge path is called cyclically reduced if t(en ) = o(e1 ) and en 6= e1 . A topological or PL edge path is called reduced (resp. trivial) if the corresponding combinatorial edge path is reduced (resp. trivial). More generally, a PL path is called reduced if p : [a, b] → Γ is locally injective. DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 5 2.3. Graph maps. A topological graph map f : Γ → Γ is a continuous map that sends vertices to vertices, and edges to topological edge paths. The latter means that for any edge e and a characteristic map αe : [0, 1] → Γ, the composition f ◦ αe : [0, 1] → Γ is a topological edge path as above. A linear graph map is a topological graph map f : Γ → Γ as above which, in addition, satisfies the following condition: For every e ∈ Γ, the restriction of f to e is a PL edge path from f (o(e)) to f (t(e)). Note that given a topological graph map f : Γ → Γ there is a linear graph map from Γ to itself that is homotopic to f relative to vertices. Definition 2.1. We say that a topological graph map f : Γ → Γ is regular if for all e ∈ EΓ the (combinatorial) edge path (associated to) f (e) is non-trivial and reduced. The map f is called expanding if for every edge e ∈ EΓ there is an exponent t ≥ 1 such that the edge path f t (e) has simplicial length |f t (e)| ≥ 2. A turn in Γ is a pair (e1 , e2 ) where o(e1 ) = o(e2 ). A turn is called non-degenerate if e1 6= e2 , otherwise it is called degenerate. A regular graph map f : Γ → Γ induces a derivative map Df : EΓ → EΓ where Df (e) is the first edge of the combinatorial edge path associated to f (e). The derivative map induces a map T f on the set of turns defined as T f ((e1 , e2 )) := (Df (e1 ), Df (e2 )). A turn (e1 , e2 ) is called legal if T f n ((e1 , e2 )) is nondegenerate for all n ≥ 0. An edge path γ = e1 e2 . . . en is called legal if every turn (ei , ei+1 ) in γ is legal. Remark-Convention 2.2. (1) For the rest of this paper, a path means a PL path. Also note that, given a combinatorial edge path γ in Γ there is always a PL edge path p : [a, b] → Γ such that γp = γ. Hence, by an edge path we will either mean a PL edge path or a combinatorial edge path and won’t make a distinction unless it is not clear from the context. (2) Similarly, from now on, unless otherwise stated, a graph map means a linear graph map as defined above. Definition 2.3. A graph map f : Γ → Γ is called a train track map if for every edge e and any t ≥ 1 the edge path f t (e) is legal. 2.4. Markings and topological representatives. Let FN denote a free group of finite rank N ≥ 2 which we fix once and for all. A graph Γ is said to be marked, if it is equipped ∼ = with a marking isomorphism θ : FN −→ π1 Γ. Markings are well defined only up to inner automorphisms, which is why we suppress the choice of a base point in Γ. A homotopy equivalence f : Γ → Γ is a topological representative of an automorphism ∼ = ϕ ∈ Out(FN ) with respect to the marking θ : FN −→ π1 Γ if one has ϕ = θ−1 f∗ θ. A graph map f : Γ → Γ is called a train track representative for ϕ if f is a topological representative for ϕ and f is a train track map. Remark 2.4. If a topological graph map f : Γ → Γ represents a hyperbolic outer automorphism ϕ of FN , then the hypothesis that f be expanding is easy to satisfy: It suffices to contract all edges which are not expanded by any iterate f t to an edge path of length ≥ 2: The contracted subgraph must be a forest, as otherwise some f t would fix a non-contractible loop and hence ϕt would fix a non-trivial conjugacy class of π1 (Γ) ∼ = FN , contradicting the 6 MARTIN LUSTIG AND CAGLAR UYANIK assumption that ϕ is hyperbolic. It is easy to see that, if f is a train track map, then this property is inherited by the above “quotient map”. Given an (not necessarily reduced) edge path γ ∈ Γ, let [γ] denote the reduced edge path which is homotopic to γ relative to endpoints. The following is a classical fact for free group automorphisms: Lemma 2.5 (Bounded Cancellation Lemma). [Coo87] Let f : Γ → Γ be topological graph map that is a homotopy equivalence. There exist a constant Cf , depending only on f , such that for any reduced edge path ρ = ρ1 ρ2 in Γ one has |[f (ρ)]| ≥ |[f (ρ1 )]| + |[f (ρ2 )]| − 2Cf . That is, at most Cf terminal edges of [f (ρ1 )] are cancelled against Cf initial edges of [f (ρ2 )] when we concatenate them to obtain [f (ρ)]. Remark 2.6. In Section 4 of this paper we will consider train track maps f : Γ → Γ that are not assumed to be homotopy equivalences. We do, however, assume that f possesses a cancellation bound: there is an integer C ≥ 0 such that for any two legal edge paths γ and γ 0 with common initial vertex but distinct initial edges the backtracking path γ 00 at the image of the concatenation point of the non-reduced path f (γ ◦ γ 0 ) has combinatorial length |γ 00 | ≤ C. The smallest such integer C is denoted by C(f ). The reason for not imposing the homotopy equivalence condition is to make the results and techniques of this paper available for the study of free group endomorphisms, as well as for the use of more general type of train track maps in the context of free group automorphisms. Definition 2.7. A path η in Γ which crosses over precisely one illegal turn is called a periodic indivisible Nielsen path (or INP, for short), if for some exponent t ≥ 1 one has [f t (η)] = η. The smallest such t is called the period of η. A path γ is called pre-INP if its image under f t0 is an INP for some t0 ≥ 1. The illegal turn on η = γ 0 ◦ γ is called the tip of η, while the two maximal initial legal subpaths γ 0 and γ, of η and η respectively, are called the branches of η. A multi-INP or a Nielsen path is a legal concatenation of finitely many INP’s. If f is an expanding train track map, then any non-trivial reduced path η, such that f t (η) is homotopic to η relative to endpoints for some t ≥ 1, can be written as a legal concatenation of finitely many INP’s. This can be seen by a direct elementary argument; alternatively it follows from Proposition 4.12. The reader should be aware of the fact that a priori the endpoints of an INP may not be vertices of Γ (compare with Convention 4.7 below). 2.5. Geodesic Currents on Free Groups. Let FN be the free group of finite rank N ≥ 2, and denote by ∂FN the Gromov boundary of FN . The double boundary of FN is defined by ∂ 2 FN := (∂FN × ∂FN ) r ∆, where ∆ denotes the diagonal. The flip map on ∂ 2 FN is defined by (ξ, ζ) 7→ (ζ, ξ). A geodesic current µ on FN is a locally finite, Borel measure on ∂ 2 FN which is flip and FN -invariant. The set of all geodesic currents on FN is denoted by Curr(FN ). The space of DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 7 currents is naturally equipped with the weak*-topology. In particular, a sequence of currents µn ∈ Curr(FN ) satisfies lim µn = µ iff n→∞ lim µn (S1 × S2 ) = µ(S1 × S2 ) n→∞ for any two disjoint Borel subsets S1 , S2 ⊂ ∂FN . An immediate example of a geodesic current is given by any non-trivial conjugacy class in FN : For an element g ∈ FN which is not a proper power (i.e. g 6= hk for any h ∈ FN and any k ≥ 2) define the counting current ηg as follows: for any Borel set S ⊂ ∂ 2 FN the value ηg (S) is the number of FN -translates of (g −∞ , g ∞ ) or of (g ∞ , g −∞ ) that are contained in S. For an arbitrary element h ∈ FN r {1} write h = g k , where g is not a proper power, and define ηh := kηg . It is easy to see that this definition is independent of the particular representative of the conjugacy class of h, so that ηh depends only on [h] ⊂ FN . The set of all non-negative real multiples of a counting current is called rational currents, and it is an important fact that rational currents are dense in Curr(FN ), see [Kap05], [Kap06]. Let Φ ∈ Aut(FN ) be an automorphism of FN . Since Φ induces homeomorphisms on ∂FN and on ∂ 2 FN , there is a natural action of Aut(FN ) on the space of currents: For any Φ ∈ Aut(FN ), µ ∈ Curr(FN ) and any Borel subset S ⊂ ∂ 2 FN one has Φµ(S) := µ(Φ−1 (S)). Note that any inner automorphism of FN acts trivially, so that the above action factors through the quotient of Aut(FN ) by all inner automorphisms to give a well defined action of Out(FN ) on Curr(FN ). The space of projectivized geodesic currents is defined as the quotient  PCurr(FN ) =: Curr(FN ) ∼ where µ1 ∼ µ2 in Curr(FN ) if and only µ1 = λµ2 for some λ > 0. We denote the projective class of the current µ by [µ]. We derive from the above stated facts: Proposition 2.8. (1) The space PCurr(FN ) is a compact metric space, and the above actions of Aut(FN ) and Out(FN ) on Curr(FN ) descend to well defined actions on PCurr(FN ) by setting ϕ[µ] := [ϕµ]. (2) The subset of PCurr(FN ) defined by all rational currents is dense in PCurr(FN ). For any marked graph Γ the marking isomorphism θ : FN → π1 Γ gives rise to canonical FN -equivariant homeomorphisms between the Gromov boundaries and double boundaries of e which for simplicity we also denote by θ. the group FN and of the universal cover Γ, e We define the cylinder set associated to γ Let γ e be a reduced edge path in Γ. e as follows: Cyl(e γ ) := {(ξ, ζ) ∈ ∂FN | γ e is a subpath of [∂θ(ξ), ∂θ(ζ)]} where [∂θ(ξ), ∂θ(ζ)] denotes the biinfinite reduced edge path that joins the end ∂θ(ξ) to the e end ∂θ(ζ) of Γ. 8 MARTIN LUSTIG AND CAGLAR UYANIK e We Let γ be a reduced edge path in Γ and let µ ∈ Curr(FN ). Let γ e be a lift of γ to Γ. define hγ, µi := µ(Cyl(e γ )) and note that the FN -equivariance for geodesic currents implies that the value µ(Cylα (e γ )) does not depend on the particular lift γ e we chose, so we have a well defined quantity hγ, µi. Note also that in case of a rational current µ = ηg the quantity hγ, µi is given by the number of occurrences of γ or of γ in the reduced loop [γ] which represents the conjugacy class [g]. Moreover, the action of Out(FN ) on rational currents is given explicitly by the formula (2.1) ϕηg = ηϕ(g) . An important fact about cylinder sets is that they form a basis for the topology on ∂ 2 FN , so that a geodesic current µ is uniquely determined by the set of values hγ, µi for all non-trivial reduced edge paths γ in Γ, see [Kap06]. In particular, we have lim µn = µ if and only if lim hγ, µn i = hγ, µi for all reduced edge n→∞ n→∞ paths γ in Γ. Moreover, if we denote by P(Γ) the set of reduced edge paths in Γ, then the function µΓ : P(Γ) → R≥0 , γ 7→ hγ, µi satisfies for all γ ∈ P(Γ): P (1) µΓ (γ) = µΓ (γ 0 ) = γ 0 ∈E+ (γ) P µΓ (γ 00 ), and γ 0 ∈E− (γ) (2) µΓ (γ) = µΓ (γ), where E+ (γ) ⊂ P(Γ) and E− (γ) ⊂ P(Γ) denote the set of reduced edge paths obtained from γ by adding a further edge at the beginning or at the end respectively. Any function µ0Γ : P(Γ) → R≥0 which satisfies (1) and (2) above is called a Kolmogorov function, and it is well known (see [Kap05, Kap06]) that any such µ0Γ defines uniquely a geodesic current µ on FN which satisfies µΓ = µ0Γ . Let Γ be a marked graph as above. Given a geodesic current µ ∈ Curr(FN ), define the weight of µ with respect to Γ as X (2.2) kµkΓ := he, µi. e∈E + Γ The following criterion given in [Kap06] plays a key role in our convergence estimates in Section 6. Lemma 2.9. Let ([µn ])n∈N be a sequence of currents in PCurr(FN ). Then one has lim [µn ] = n→∞ [µ] in PCurr(FN ) if and only if hγ, µn i hγ, µi = n→∞ kµn kΓ kµkΓ lim holds for all reduced edge paths γ in Γ. DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 9 3. North-South dynamics In this section we describe some general considerations for maps with North-South dynamics. We will keep the notation simple and general; at no point we will refer to the specifics of currents on free groups. However, in this section we will prove the main criteria used in the remainder of the paper to establish the North-South dynamics result in our main theorem. Definition 3.1. Let f : X → X be homeomorphism of a topological space X. (a) The map f is said to have (pointwise) North-South dynamics if f has two distinct fixed points P+ and P− , called attractor and repeller, such that for every x ∈ X r {P+ , P− } one has: lim f t (x) = P+ and lim f t (x) = P− . t→∞ t→−∞ (b) The map f is said to have uniform North-South dynamics if the following holds: There exist two distinct fixed points P− and P+ of f , such that for every compact set K ⊂ X r{P− } and every neighborhood U+ of P+ there exists an integer t+ ≥ 0 such that for every t ≥ t+ one has: f t (K) ⊂ U+ . Similarly, for every compact set K ⊂ X r {P+ } and every neighborhood U− of P− there exists an integer t− ≤ 0 such that for every t ≤ t− one has: f t (K) ⊂ U− . It is easy to see that uniform North-South dynamics implies pointwise North-South dynamics. Definition 3.2. A homeomorphism f : X → X of a topological space X has generalized uniform North-South dynamics if there exist two disjoint compact f -invariant sets ∆+ and ∆− in X, such that the following hold: (i) For every compact set K ⊂ X r ∆− and every neighborhood U+ of ∆+ there exists an integer t+ ≥ 0 such that for every t ≥ t+ one has: f t (K) ⊂ U+ (ii) For every compact set K ⊂ X r ∆+ and every neighborhood U− of ∆− there exists an integer t− ≤ 0 such that for every t ≤ t− one has: f t (K) ⊂ U− More precisely, we say that the map f has generalized uniform North-South dynamics from ∆− to ∆+ . Note that we interpret the phrase “f -invariant” in its strong meaning, i.e. f (∆+ ) = ∆+ and f (∆− ) = ∆− . Proposition 3.3. Let f : X → X be a homeomorphism of a compact metrizable space X. Let Y ⊂ X be dense subset of X, and let ∆+ and ∆− be two f -invariant sets in X that are disjoint. Assume that the following criterion holds: For every neighborhood U of ∆+ and every neighborhood V of ∆− there exists an integer m0 ≥ 1 such that for any m ≥ m0 and any y ∈ Y one has either f m (y) ∈ U or f −m (y) ∈ V . Then f 2 has generalized uniform North-South dynamics from ∆− to ∆+ . 10 MARTIN LUSTIG AND CAGLAR UYANIK Proof. Let K ⊂ X r ∆− be compact, and let U and V be neighborhoods of ∆+ and ∆− respectively. See Figure 1. X V U U0 ∆− ∆+ W K Figure 1. Let W be an open neighborhood of K such that W ∩ V = ∅. Since X is compact, the closure W is compact. Then V1 := V r W is again an open neighborhood of ∆− , moreover it is disjoint from W . Let U1 be a neighborhood of ∆+ which has the property that its closure is contained in the interior of U . Such a neighborhood exists because X is a metrizable space. Let m0 be as postulated in the criterion, applied to the neighborhoods U1 and V1 , and pick any m ≥ m0 . Consider any y ∈ Y ∩ f m (W ). Notice that f −m (y) is contained in W , which is disjoint from V1 . Thus, by the assumed criterion, f m (y) must be contained in U1 . Since W is open and f is a homeomorphism, any dense subset of X must intersect f m (W ) in a subset that is dense in f m (W ). This implies that f m (f m (W )) ⊆ U1 ⊂ U . Since K ⊂ W , this shows that f 2m (K) ⊂ U . Using the analogous argument for the inverse iteration we see that f 2 has generalized uniform North-South dynamics from ∆− to ∆+ . u t Proposition 3.4. Let f : X → X be a homeomorphism of a compact space X, and let ∆+ and ∆− be disjoint f -invariant sets. Assume that some power f s with s ≥ 1 has generalized uniform North-South dynamics from ∆− to ∆+ . Then the map f , too, has generalized uniform North-South dynamics from ∆− to ∆+ . Proof. Let K ⊂ X r ∆− be compact, and let U be an open neighborhood of ∆+ . Set K 0 := K ∪ f (K) ∪ . . . ∪ f s−1 (K), which is again compact. Note that the fact that K ⊂ X r ∆− and f −1 (∆− ) = ∆− implies that K 0 ⊂ X r ∆− . Indeed, x ∈ K 0 implies that x = f t (y) for some y ∈ K and for some 0 ≤ t ≤ s − 1. Thus x ∈ ∆− would imply that y = f −t (x) ∈ f −1 (∆− ) = ∆− , contradicting the assumption K ∩ ∆− = ∅. DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 11 From the hypothesis that f s has generalized uniform North-South dynamics from ∆− to 0 ∆+ it follows that there is a bound t0 such that for all t0 ≥ t0 one has f t s (K 0 ) ⊂ U . Hence, for any point x ∈ K and any integer t ≥ st0 , we can write t = k + st0 with t0 ≥ t0 and 0 ≤ k ≤ s − 1 to obtain the desired fact 0 0 f t (x) = f k+st (x) = f st f k (x) ∈ f st (K 0 ) ⊂ U. The analogous argument for f −1 finishes the proof of the Lemma. u t 4. Train-Tracks In this section we will consider train track maps which satisfy the following properties: Convention 4.1. Let Γ be a finite connected graph, and let f : Γ → Γ be an expanding train track map which possesses a cancellation bound Cf ≥ 0 as defined in Remark 2.6. We also assume that f has been replaced by a positive power so that for some integers λ00 ≥ λ0 > 1 we have, for any edge e of Γ: λ00 ≥ |f (e)| ≥ λ0 (4.1) and λ0 , λ00 is attained for some edges. 4.1. Goodness. The following terminology was introduced by R. Martin in his thesis [Mar95]. Definition 4.2. Let f : Γ → Γ, Cf and λ0 be as in Convention 4.1. Define the critical Cf constant C for f as C := 0 . Let γ be a reduced edge path in Γ. Any edge e in γ that is λ −1 at least C edges away from an illegal turn on γ is called good, where the distance (= number of edges traversed) is measured on γ. An edge is called bad if it is not good. Edge paths or loops, in particular subpaths of a given edge path, which consist entirely of good (or entirely of bad) edges are themselves called good (or bad). For any edge path or a loop γ in Γ we define the goodness of γ as the following quotient: #{good edges of γ} g(γ) := ∈ [0, 1] |γ| We will now discuss some basic properties of the goodness of paths and loops. We first consider any legal edge path γ in Γ of length |γ| = C and compute: (4.2) |f (γ)| ≥ λ0 |γ| = λ0 C = Cf + C Lemma 4.3. Let f : Γ → Γ and λ0 be as in Convention 4.1. Let γ be a reduced edge path or a cyclically reduced loop in Γ. Then any good subpath γ 0 of γ has the property that no edge of f (γ 0 ) = [f (γ 0 )] is cancelled when f (γ) is reduced, and that it consists entirely of edges that are good in [f (γ)]. Hence, for any reduced loop γ in Γ we have: #{good edges in [f (γ)]} ≥ λ0 · #{good edges in γ} Proof. If γ is legal, then every edge is good, and the lemma follows directly from the definition of λ0 in Convention 4.1. Now assume that the path γ has at least one illegal turn. Let γ = γ1 B1 γ2 B2 . . . γn Bn 12 MARTIN LUSTIG AND CAGLAR UYANIK b2 a1 γ1 a2 Figure 2. ai ’s are legal ends of maximal bad segments, γ is a good (legal) segment be a decomposition of γ into maximal good edge paths γi and maximal bad edge paths Bi . Note that each maximal bad segment Bi can be written as an illegal concatenation Bi = ai bi ai+1 where ai is a legal segment of length C and bi is an edge path that (possibly) contains some illegal turns. Note that since |f (ai )| ≥ λ0 |ai | ≥ λ0 C = Cf +C, Lemma 2.5 implies that [f (Bi )] is an edge path of the from [f (Bi )] = a0i b0i c0i where a0i , c0i are legal edge paths such that |a0i |, |c0i | ≥ C. Moreover, the turn at f (γi )a0i is legal. Since by Convention 4.1 every edge grows at least by a factor of λ0 , this implies the required result. u t On the other hand, for any cyclically reduced loop γ the number of bad edges is related to the number of illegal turns on γ, which we denote by ILT (γ), via: (4.3) ILT (γ) ≤ #{bad edges in γ} ≤ 2C · ILT (γ) Since the number of illegal turns on γ can only stay constant or decrease under iteration of the train track map, we obtain directly (4.4) #{bad edges in [f t (γ)]} ≤ 2C · ILT (γ) ≤ 2C · #{bad edges in γ} for all positive iterates f t of f . Notice however that the number of bad edges may actually grow (slightly) faster than the number of good edges under iteration of f , so that the goodness of γ does not necessarily grow monotonically under iteration of f . Nevertheless up to passing to powers one can overcome this issue: Proposition 4.4. Let f : Γ → Γ be as in Convention 4.1. (a) There exists an integer s ≥ 1 such that for every reduced loop γ in Γ one has: g([f s (γ)]) ≥ g(γ) In particular, for any integer t ≥ 0 one has g([(f s )t (γ)]) ≥ g(γ) (b) If 0 < g(γ) < 1, then for any integer s0 > s we have 0 g([f s (γ)]) > g(γ) DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 13 and thus, for any t ≥ 0: 0 g([(f s )t (γ)]) > g(γ) Proof. (a) We set s ≥ 1 so that λ0 s ≥ 2C and obtain from Lemma 4.3 for the number g 0 of good edges in [f s (γ)] and the number g of good edges in γ that: s g 0 ≥ λ0 g For the number b0 of bad edges in [f s (γ)] and the number b of bad edges in γ we have from equation (4.4) that: b0 ≤ 2Cb Thus we get g0 g g0 λ0s g g ≥ and hence ≥ ≥ 0 0 0 b 2C b b g +b g+b s which proves g([f (γ)]) ≥ g(γ). The second inequality in the statement of the lemma follows directly from an iterative application of the first. (b) The proof of part (b) follows from the above given proof of part (a), since λ0 s > 2C unless there is no good edge at all in γ, which is excluded by our hypothesis 0 < g(γ). Since the hypothesis g(γ) < 1 implies that there is at least one illegal turn in γ, in the above proof we get b ≥ 1, which suffices to show g0 g > , 0 b b s and thus g([f (γ)]) > g(γ). u t From the inequalities at the end of part (a) of the above proof one derives directly, for g > 0, the inequality 1 g([f s (γ)]) ≥ . 2C 1 1 + λ0s ( g(γ) − 1) Hence we obtain: Corollary 4.5. Let f : Γ → Γ be as in Convention 4.1, and let δ > 0 and ε > 0 be given. Then there exist an integer M 0 = M 0 (δ, ε) ≥ 0 such that for any loop γ in Γ with g(γ) ≥ δ we have g([f m (γ)]) ≥ 1 − ε for all m ≥ M 0 . u t 4.2. Illegal turns and iteration of the train track map. The following lemma (and also other statements of this subsection) are already known in differing train track dialects (compare for example Lemma 4.2.5 in [BFH00]); for convenience of the reader we include here a short proof. Recall the definition of an INP and a pre-INP from Definition 2.7. Lemma 4.6. Let f : Γ → Γ be as in Convention 4.1. Then there are only finitely many INP’s and pre-INP’s in Γ for f . Furthermore, there is an efficient method to determine them. 14 MARTIN LUSTIG AND CAGLAR UYANIK Proof. We consider the set V of all pairs (γ1 , γ2 ) of legal edge paths γ1 , γ2 with common initial vertex but distinct first edges, which have combinatorial length |γ1 | = |γ2 | = C. Note that V is finite. From the definition of the cancellation bound and the inequalities (4.1) it follows directly that every INP or every pre-INP η must be a subpath of some path γ 1 ◦ γ2 with (γ1 , γ2 ) ∈ V. Furthermore, we define for i = 1 and i = 2 the initial subpath γi∗ of γi to consist of all points x of γi that are mapped by some positive iterate f t into the backtracking subpath at the tip of the unreduced path f t (γ 1 ◦ γ2 ). We observe that the interior of any INP-subpath or pre-INP-subpath η of γ 1 ◦ γ2 must agree with the subpath γ ∗1 ◦ γ2∗ . Thus any pair (γ1 , γ2 ) ∈ V can define at most one INP-subpath of γ 1 ◦ γ2 . Since V is finite and easily computable, we obtain directly the claim of the lemma. u t In light of Lemma 4.6, we obtain a subdivision Γ0 of Γ by adding the endpoints of all the finitely many INP’s or pre-INP’s, while keeping the property that f maps vertices to vertices. This gives a train track map f 0 : Γ0 → Γ0 which represents the same outer automorphism as f : Γ → Γ, thus justifying that from now on we concentrate on train track maps which satisfy the following: Convention 4.7. Let f : Γ → Γ be a train track map as in Convention 4.1. We assume in addition that every endpoint of an INP or a pre-INP is a vertex. Lemma 4.8. Let f : Γ → Γ be as in Convention 4.7. Then, there exists an exponent M1 ≥ 1 with the following property: Let γ be a path in Γ, and assume that it contains precisely two illegal turns, which are the tips of INP-subpaths or pre-INP-subpaths η1 and η2 of γ. If η1 and η2 overlap in a non-trivial subpath γ 0 , then f M1 (γ) reduces to a path [f M1 (γ)] which has at most one illegal turn. Proof. For any point x1 in the interior of one of the two legal branches of an INP or a pre-INP η there exists a point x2 on the other legal branch such that for a suitable positive power of f one has f t (x1 ) = f t (x2 ). Hence, if we pick a point x in the interior of γ 0 , there are points x0 on the other legal branch of η1 and x00 on the other legal branch of η2 such that for some positive iterate of f one has f t (x0 ) = f t (x) = f t (x00 ). It follows that the decomposition γ = γ1 ◦ γ2 ◦ γ3 , which uses x0 and x00 as concatenation points, defines legal subpaths γ1 and γ3 which yield [f t (γ)] = [f t (γ1 ) ◦ f t (γ3 )], which has at most one illegal turn. Since by Convention 4.7 the overlap γ 0 is an edge path, it follows from the finiteness result proved in Lemma 4.6 that there are only finitely many constellations for η1 and η2 . This shows that there must be a bound M1 as claimed. u t Lemma 4.9. For every train track map f : Γ → Γ as in Convention 4.7 there exists a constant M2 = M2 (Γ) ≥ 0 such that every path γ with precisely 1 illegal turn satisfies the following: Either γ contains an INP or pre-INP as a subpath, or else [f M2 (γ)] is legal. Proof. Similar to the set V in the proof of Lemma 4.6 we define the set V+ be the set of all pairs (γ1 , γ2 ) of legal edge paths γ1 , γ2 in Γ which have combinatorial length 0 ≤ |γ1 | ≤ C and 0 ≤ |γ2 | ≤ C, and which satisfy: The paths γ1 and γ2 have common initial point, and, unless one of them (or both) are trivial, they have distinct first edges. Note that V+ is finite and contains V as subset. DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 15 Following ideas from [CL15] we define a map f# : V+ → V+ induced by f through declaring the f# -image of a pair (γ1 , γ2 ) ∈ V+ to be the pair f# (γ1 , γ2 ) := (γ100 , γ200 ) ∈ V+ which is defined by setting for i ∈ {1, 2} f (γi ) =: γi0 ◦ γi00 ◦ γi000 , where γi0 is the maximal common initial subpath of f (γ1 ) and f (γ2 ), where |γi00 | ≤ C, and where γi000 is non-trivial only if |γi00 | = C. Then for any (γ1 , γ2 ) ∈ V+ we see as in the proof of Lemma 4.6 that there exists an exponent t ≥ 0 such that the iterate f#t (γ1 , γ2 ) =: (γ3 , γ4 ) ∈ V+ satisfies one of the following: (1) One of γ3 or γ4 (or both) are trivial. (2) The turn defined by the two initial edges of γ3 and γ4 is legal. (3) The path γ 3 ◦ γ4 contains an INP as subpath. From the finiteness of V+ it follows directly that there is an upper bound M2 ≥ 0 such that for t ≥ M2 one of the above three alternatives must be true for f#t (γ1 , γ2 ) =: (γ3 , γ4 ). Consider now the given path γ, and write it as illegal concatenation of two legal paths γ = γ10 ◦ γ20 . Then the maximal initial subpaths γ1 of γ 01 and γ2 of γ20 of γ2 of length |γi | ≤ C form a pair (γ1 , γ2 ) in V+ . In the above cases (1) or (2) it follows directly that f t (γ) is a (possibly trivial) legal path. In alternative (3) the path f t (γ) contains an INP. u t Proposition 4.10. For any train track map as in Convention 4.7 there exists an exponent r = r(f ) ≥ 0 such that every finite path γ in Γ with ILT(γ) ≥ 1 satisfies ILT([f r (γ)]) < ILT(γ) , unless every illegal turn on γ is the tip of an INP or pre-INP subpath ηi of γ, where any two ηi are either disjoint subpaths on γ, or they overlap precisely in a common endpoint. Proof. Through considering maximal subpaths with precisely one illegal turn we obtain the claim as direct consequence of Lemma 4.9 and Lemma 4.8. u t Definition 4.11. A path γ in Γ is called pseudo-legal if it is a legal concatenation of legal paths and INP’s. From the same arguments as in the last proof we also deduce the following: Proposition 4.12. Let f : Γ → Γ be as in Convention 4.7. Then for any finite edge path γ in Γ there is a positive iterate f t (γ) which reduces to a path γ 0 := [f t (γ)] that is pseudo-legal. The analogous statement also holds for loops instead of paths. The exponent t needed in either case depends only on the number of illegal turns in γ. Proof. Since the number of illegal turns in [f t (γ)] non-strictly decreases for increasing t, we can assume that for sufficiently large t it stays constant. It follows from Lemma 4.9 (after possibly passing to a further power of f ) that every illegal turn of [f t (γ)] is the tip of some INP-subpath ηi of [f t (γ)]. From Lemma 4.8 we obtain furthermore that any two such ηi and ηj that are adjacent on [f t (γ)] can not overlap non-trivially. u t 16 MARTIN LUSTIG AND CAGLAR UYANIK In the next subsection we also need the following lemma, where illegal (cyclic) concatenation means that the path (loop) is a concatenation of subpaths where all concatenation points are illegal turns. Lemma 4.13. Let f : Γ → Γ be an expanding train track map. Let γ be a reduced loop in Γ and let γ 0 = [f (γ)] be its reduced image loop. Assume that for some t ≥ 1 a decomposition γ 0 = γ10 ◦γ20 ◦. . .◦γt0 as illegal cyclic concatenation is given. Then there exists a decomposition as illegal cyclic concatenation γ = γ1 ◦ γ2 ◦ . . . ◦ γt with the property that the reduced image paths [f (γi )] contain the paths γi0 as subpaths, for i = 1, 2, . . . , t. Proof. We cut the loop γ at some illegal turn to get a (closed) path γ = e1 e2 . . . eq . We consider the initial subpaths γ(k) = e1 e2 . . . ek of γ for k = 1, 2, . . .. Let k 0 be the smallest positive integer such that the reduced image path [f (γ(k 0 ))] contains the path γ10 as a subpath. Since k 0 is the smallest such integer, it follows that the path f (ek0 ) passes through the last edge of γ10 . Note that f (ek0 ) is a legal path and that γi0 terminates at an illegal turn, so that the endpoint of f (ek0 ) must lie somewhere in the backtracking subpath of the possibly unreduced path [f (e1 e2 . . . ek0 ) ] ◦ [f (ek0 +1 ek0 +2 . . . eq )]. It follows that the reduced image path [f (ek0 +1 ek0 +2 . . . eq )] contains the path γ20 ◦ . . . ◦ γt0 as subpath. Thus we define γ1 := γ(k 0 ), and proceed iteratively in precisely the same fashion, thus finding iteratively γ2 , γ3 , . . . γt−1 . As above, it follows that the “left-over” terminal subpath of γ has the property that its reduced image contains γt0 as subpath, so that we can define this left-over subpath to be the final factor path γt . u t 4.3. Goodness versus illegal turns. We recall from Definition 2.7 that a multi-INP is a legal concatenation of finitely many INPs along their endpoints. For the remainder of this section we will concentrate on graph maps f : Γ → Γ which satisfy the following: Convention 4.14. Let f : Γ → Γ be an expanding train track map as in Convention 4.7. We assume furthermore that there is an upper bound A(f ) to the number of INP factor paths in any multi-INP path γ ∈ Γ. Note that this condition implies in particular that in Γ there can not be a non-trivial loop which is a cyclic legal concatenation of INPs. The next lemma shows in particular that an expanding train track map which represents a hyperbolic outer automorphism naturally satisfies the conditions given in Convention 4.14. Lemma 4.15. For any expanding train track map f : Γ → Γ, which has the property that no positive power of f fixes the homotopy class of any non-trivial loop in Γ, there is an upper bound to the number of INP factors on any multi-INP path. Proof. There is an upper bound A ≥ 0 for number of INPs in Γ, see Lemma 4.6. Hence, any multi-INP with more than A(f ) := 2A factors would have to run over the same INP twice in the same direction. Thus we obtain as subpath a non-trivial loop which is fixed by some positive power of f , violating the given assumption. u t Lemma 4.16. For any train track map f : Γ → Γ as in Convention 4.14 there exists an exponent s ≥ 1 such that for any reduced path γ ∈ Γ with reduced image path γ 0 = [f s (γ)] the following holds: If g(γ 0 ) = 0 and satisfies ILT (γ 0 ) ≥ A(f ) + 1, then ILT (γ) > ILT (γ 0 ). DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 17 Proof. Since the map f is expanding, for the critical constant C ≥ 0 given in Definition 4.2 there exists an integer s ≥ 1 such that |f s (e)| ≥ 2C + 1 for every edge e ∈ Γ. We can furthermore assume s ≥ r, where r = r(f ) is given by Lemma 4.10. Thus, by Lemma 4.10 we have ILT (γ) > ILT (γ 0 ) , unless every illegal turn on γ is the tip of an INP or pre-INP ηi , and any two such subpaths ηi are disjoint or they overlap precisely at a common endpoint. The case where two such paths are disjoint can be excluded as follows: If there is an edge e in γ which doesn’t belong to any of the ηi , then f s (e) is a legal subpath of [f s (γ)] = γ 0 of length greater than 2C + 1, contradicting the assumption that g(γ 0 ) = 0. Thus we can assume that any two of the subpaths ηi overlap precisely in a common endpoint, and that there is no non-trivial initial of final subpath of γ outside of the con0 catenation of all the ηi . Therefore, for some s0 ≥ 0, the iterate f s (γ 0 ) is a multi-INP with ILT (γ 0 ) ≥ A(f ) + 1 factors, which contradicts Convention 4.14. Hence the conclusion of the Lemma follows. u t Lemma 4.17. Let f : Γ → Γ and A(f ) be as in Convention 4.14. Then there exists a constant δ with 0 < δ ≤ 1 so that the following holds: Every reduced loop γ in Γ with ILT (γ) ≥ A(f ) + 1 can be written as cyclic illegal concatenation γ = γ1 ◦ γ2 . . . ◦ γ2m such that for every odd index j, the subpath γj is either trivial or satisfies g(γj ) ≥ δ . For every even index k the subpath γk is non-trivial and satisfies g(γk ) = 0; moreover, we have: A(f ) + 1 ≤ ILT (γk ) ≤ 2A(f ) + 1 Proof. Let Lγ be the collection of maximal legal subpaths γi0 of γ of length |γi0 | ≥ 2C + 1, for C ≥ 0 as given in Definition 4.2. Note that any two distinct elements γi0 , γj0 in this collection are either disjoint or overlap at at single point. In the latter case the turn at the overlap point is illegal, as otherwise they would merge into a longer legal subpath, which violates 0 the maximality of the γi0 . For any two (on γ) consecutive paths γi0 and γi+1 in Lγ , if the path 0 0 βi between them is trivial or satisfies ILT (βi ) ≤ A(f ), then we erase γi and γi+1 from the 0 0 collection Lγ and add in the new path γi βi γi+1 . We continue this process iteratively until all the complementary subpaths βi between any two consecutive elements in our collection satisfies ILT (βi ) ≥ A(f ) + 1. We call the obtained collection of subpaths Cγ . We now pick a path γj in the collection Cγ and consider its “history” as being obtained iteratively through joining what amounts to ` paths γi0 from Lγ . Thus γj can be written as illegal concatenation 0 γj = γ10 ◦ β1 ◦ γ20 ◦ . . . ◦ γ`−1 ◦ β`−1 ◦ γ`0 , where each γi0 is legal and of length |γi0 | ≥ 2C + 1. Each βi has at most A(f ) illegal turns, and the legal subpaths of βi between these illegal turns have length ≤ 2C, so that we get |βi | ≤ (A(f ) + 1)2C. Thus the set of good edges on γj is given precisely as disjoint union 18 MARTIN LUSTIG AND CAGLAR UYANIK over all the γi0 of the sets of the |γi0 | − 2C edges of γi0 that are not on the two boundary subpaths of length C of γi0 . Hence we compute for the goodness: P` P` 0 (|γ 0 | − 2C) i=1 (|γi | − 2C) g(γj ) = = P` i=1 0 i P`−1 |γj | i=1 |γi | + i=1 |βi | ` 1 = (2C + 1) · ` + (A(f ) + 1)2C · ` 2C(A(f ) + 2) + 1 We finally add to the collection Cγ a suitable set of trivial subpaths at illegal turns to get a collection Cγ0 , where these trivial paths are chosen as to get as complementary subpaths of Cγ0 only subpaths γk which satisfy: ≥ A(f ) + 1 ≤ ILT (γk ) ≤ 2A(f ) + 1 Thus setting δ= 1 2C(A(f ) + 2) + 1 u t finishes the proof. Proposition 4.18. Let f : Γ → Γ be a train track map as in Convention 4.14, and let s ≥ 1 be the integer given by Lemma 4.16 and δ > 0 be the constant given by Lemma 4.17. Then there exists a constant R > 1 such that for any reduced loop γ in Γ one has either (1) g([f s (γ)]) ≥ δ 2 or (2) ILT (γ) ≥ R · ILT ([f s (γ)]). Proof. By 4.12 there is an exponent t ≥ 0 such that for any loop γ with less than A(f ) + 1 illegal turns the loop γ 0 = [f t (γ)] is pseudo-legal. From the assumption that f satisfies Convention 4.14 it follows that γ 0 is not a legal concatenation of INPs, so that it must have at least one good edge. Since iteration of f only decreases the number of illegal turns, we obtain from equality (4.3) that g(γ) ≥ 1 . 2C(A(f ) + 1) + 1 Thus the first inequality from our assertion follows for a suitable choice of s from Proposition 4.4. 0 Thus we can now assume that ILT (γ) ≥ A(f ) + 1, and thus that [f s (γ)] = γ10 ◦ . . . ◦ γ2m is a decomposition as given by Lemma 4.17. There are two cases to consider: Assume that X X |γj0 | ≥ |γk0 |. j odd k even For any odd index j the non-trivial path γj0 has g(γj0 ) ≥ δ, which together with the last inequality implies: δ g([f s (γ)]) ≥ 2 DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 19 Now, assume that: X X |γj0 | ≤ j odd |γk0 | k even Let γ = γ1 ◦ . . . ◦ γ2m be an illegal cyclic concatenation given by Lemma 4.13 so that, for each i = 1, . . . , 2m, the reduced image [f s (γi )] contains γi0 as a subpath. Hence, for every even index, we apply Lemma 4.16 to see that ILT (γk ) > ILT ([f s (γk )]) ≥ ILT (γk0 ). Since the number if illegal turns never increases when applying a train track map, for each odd index j, we have ILT (γj ) ≥ ILT ([f s (γj )]) ≥ ILT (γj0 ). Combining last two inequalities we obtain: ILT (γ) > ILT ([f s (γ)]) + m. (4.5) We also observe that the number of illegal turns in [f s (γ)] is equal to the sum of the number of illegal turns in the odd indexed subpaths, the number of illegal turns in the even indexed subpaths, and the number of illegal turns at concatenation points: X X ILT (γk0 ) + 2m ILT (γj0 ) + (4.6) ILT ([f s (γ)]) ≤ k even j odd Now, note that (4.7) X ILT (γj0 ) ≤ X j odd j odd |γj0 | ≤ X |γk0 |, k even by assumption. For each γk0 (with even index k), since Lemma 4.17 assures g(γk0 ) = 0 and ILT (γk0 ) ≤ 2(A(f ) + 1), we have |γk0 | ≤ 2C(2(A(f ) + 1) + 1), which together with (4.7) implies that: X (4.8) ILT (γj0 ) ≤ 2mC(2(A(f ) + 1) + 1) j odd Furthermore, from ILT (γk0 ) ≤ 2(A(f ) + 1) for even index k we deduce X (4.9) ILT (γk0 ) ≤ 2m(A(f ) + 1) k even Using (4.6), (4.8) and (4.9) we obtain: (4.10) ILT ([f s (γ)]) ≤ 2mC(2(A(f ) + 1) + 1) + 2m(A(f ) + 1) + 2m 20 MARTIN LUSTIG AND CAGLAR UYANIK Using (4.5) and (4.10), we have: ILT (γ) m ≥ 1 + ILT ([f s (γ)]) ILT ([f s (γ)]) m 2mC(2(A(f ) + 1) + 1) + 2m(A(f ) + 1) + 2m 1 ≥1+ 2C(2(A(f ) + 1) + 1) + 2(A(f ) + 1) + 2 ≥1+ Therefore, the conclusion of the lemma holds for: R=1+ 1 2C(2(A(f ) + 1) + 1) + 2(A(f ) + 1) + 2 u t 4.4. Uniform goodness in the future or the past. For the convenience of the reader we first prove a mild generalization of Proposition 4.18, which will be a crucial ingredient in the proof of the next proposition. Proposition 4.19. Let f : Γ → Γ be as in Convention 4.14. Given any constants 0 < δ1 < 1 and R1 > 1, there exist an integer s1 > 0 so that for any reduced loops γ and γ 0 in Γ with [f s1 (γ 0 )] = γ one has either (i) g([f s1 (γ)]) ≥ δ1 or (ii) ILT (γ 0 ) ≥ R1 · |γ|Γ . Proof. We first replace f by a positive power (say f r , cited at the end of the proof) as given by Proposition 4.4 so that for the rest of the proof we can assume that goodness is monotone. Let s, δ and R be as in Lemma 4.18 and let γ be any reduced loop in Γ. Assume that for γ that alternative (1) of Lemma 4.18 holds, i.e. g([f s (γ)]) ≥ 2δ . Then by Corollary 4.5 there is an exponent M ≥ 1 such that g([(f s )m (γ)]) ≥ δ1 for all m ≥ M . On the other hand, if g([f s (γ)]) < 2δ , then Lemma 4.18 assures that ILT (γ) ≥ R · ILT ([f s (γ)]). We now claim that ILT (γ1 ) ≥ R · ILT (γ) s for any reduced loop γ1 with [f (γ1 )] = γ. To see this, apply Lemma 4.18 to the loop γ1 . If one had δ g([f s (γ1 )]) = g(γ) ≥ , 2 then by monotonicity of goodness this would also imply g([f s (γ)]) ≥ 2δ , which contradicts with our assumption. Hence for γ1 alternative (2) of Lemma 4.18 holds, giving indeed ILT (γ1 ) ≥ R · ILT (γ). DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 21 Repeating the same argument iteratively shows that for any sequence of reduced loops γM 0 , defined iteratively through [f s (γM 0 )] = γM 0 −1 for any M 0 ≥ 2, the inequality 0 γM 0 ≥ RM · ILT (γ). holds. Also, notice that since g(γ) < δ 2 we have #{bad edges in γ} δ ≥1− , |γ|Γ 2 and by the inequalities (4.3) we have furthermore #{bad edges in γ} ≤ 2C · ILT (γ). Hence we obtain 0 ILT (γM 0 ) ≥ RM · ILT (γ) 0 #{bad edges in γ} 2C δ 1 · (1 − ) |γ|Γ 2 2C ≥ RM · ≥ RM 0 0 1 ≥ R1 . Then s1 = max{M, M 0 } satisfies the Let M 0 ≥ 1 be such that RM · (1 − 2δ ) 2C requirements of the statement of Proposition 4.19 up to replacing f by the power f r as done at the beginning of the proof. u t In addition to the train track map f we now consider a second train track map f 0 : Γ0 → Γ0 , which also satisfies the requirements of Convention 4.14 and which is related to f via maps h : Γ → Γ0 and h0 : Γ0 → Γ such that f and h0 f 0 h are homotopy inverses. We also assume that the lifts of h and h0 to the universal coverings are quasi-isometries (with respect to the simplicial metrics), so that there exists a bi-Lipschitz constant B > 0 which satisfies for any two “corresponding” reduced loops γ in Γ and γ 0 := [h(γ)] the inequalities (4.11) 1 0 |γ |Γ0 ≤ |γ|Γ ≤ B |γ 0 |Γ0 B We denote the goodness for the map f 0 by g0 , and the critical constant for f 0 from Definition 4.2 by C 0 . Proposition 4.20. Let f : Γ → Γ and f 0 : Γ0 → Γ0 be as specified in the last paragraph. Given a real number δ so that 0 < δ < 1, there exist a bound M > 0 such that (up to replacing f and f 0 by a common power) for any pair of corresponding reduced loops γ in Γ and γ 0 in Γ0 , either (a) g([f n (γ)]) ≥ δ or (b) g0 ([(f 0 )n (γ 0 )]) ≥ δ holds for all n ≥ M . 22 MARTIN LUSTIG AND CAGLAR UYANIK Proof. Let B be a bi-Lipschitz constant for the transition from Γ to Γ0 as in (4.11) above. Set R1 = 4C 0 B 2 , and apply Proposition 4.19 to the loop γ. Assume first that alternative (i) of this proposition holds. Then Corollary 4.5, applied to f s1 , gives a bound L ≥ 0 so that inequality (a) holds for all n ≥ L (after having replaced f by f s1 ). Now assume that for γ alternative (ii) of Proposition 4.19 holds. Then we have the following inequalities, where γ 00 denotes the reduced loop in Γ corresponding to f 0s1 (γ 0 ) (which implies [f s1 (γ 00 )] = γ): 1 00 1 |γ |Γ ≥ ILT (γ 00 ) B B 1 ≥ R1 · |γ|Γ = 4C 0 B · |γ|Γ B = 4C 0 · |γ 0 |Γ0 |f 0s1 (γ 0 )|Γ0 ≥ This however implies that g0 (f 0s1 (γ 0 )) ≥ 1/2, since for any t ≥ 0 the number of bad edges in f 0t (γ 0 ) is bounded above by 2C 0 · ILT (f 0t (γ 0 )) ≤ 2C 0 · ILT (γ 0 ) ≤ 2C 0 · |γ 0 |Γ0 . Thus, by invoking Corollary 4.5 again, there exist L0 such that 0 g0 (f 0s1 L (γ 0 )) ≥ δ. Hence for M 0 = max{L, L0 } the conclusion of the Lemma follows. u t Remark 4.21. From the next section on we will restrict our attention to expanding train track maps which are homotopy equivalences. For any such train track representative f of some ϕ ∈ Out(FN ) and f 0 of ϕ−1 , which both satisfy Convention 4.14, the conditions stated before Proposition 4.20 are satisfied, so that this proposition is valid for them. 5. Perron Frobenius Theorem for reducible substitutions and automorphisms The purpose of this section is to define the simplex of attraction ∆+ and the simplex of repulsion ∆− explicitly by exhibiting the coordinate values for the defining currents. For this purpose we crucially need the main result from our earlier paper [LU17]; details of how to use this quote are given below. 5.1. Symbolic dynamics, substitutions and quotes from [LU17]. In this subsection we recall some terminology, well known definitions and basic facts from symbolic dynamics. Given any finite set of symbols A = {a1 , . . . , am }, called an alphabet, one considers the free monoid A∗ over A, which is given by all finite words in A (without inverses), including the empty word 1. The length |w| of a word w ∈ A∗ denotes the number of letters in w. Furthermore one considers the full shift AZ , the set of all biinfinite words in A, which is canonically equipped with the product topology and with the shift-operator. The latter maps x = . . . xi−1 xi xi+1 . . . ∈ AZ to y = . . . yi−1 yi yi+1 . . . ∈ AZ , with yi = xi+1 ∈ A for any i ∈ Z. A subset Σ ⊂ AZ is called a subshift if it is non-empty, closed and shift-invariant. The language of Σ is the collection of all finite words occurring in elements of Σ. For any DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 23 w = x1 . . . xn ∈ A∗ we denote by Cylw the set of all y = . . . yi−1 yi yi+1 . . . ∈ AZ which satisfy y1 = x1 , y2 = x2 , . . . , yn = xn . An invariant measure µ on a subshift Σ is a finite Borel measure on Σ which is invariant under the shift map. It extends canonically to an invariant measure on all of AZ by setting µ(B) := µ(B ∩ Σ) for any measurable set B ⊂ AZ . For any invariant measure µ on AZ obtained this way we say that µ has support in Σ. Remark 5.1. (1) Any invariant measure µ defines a function µA : A∗ → R≥0 , w 7→ µ(Cylw ) which satisfies for any w ∈ A∗ the following Kirchhoff conditions: X X µA (w) = µA (xw) = µA (wx) x∈A x∈A ∗ ∗ Conversely, for every such weight function µ : A → R≥0 (i.e. µ∗ satisfies the Kirchhoff conditions) there exists a well defined invariant measure µ on AZ with µA = µ∗ , see [FM10]. (2) The measure µ has support in a subshift Σ ⊂ AZ if and only if µA (w) = 0 for any w ∈ A∗ with Cylw ∩ Σ = ∅. A substitution ζ on the finite alphabet A = {a1 , . . . am } is a monoid morphism ζ : A∗ → A∗ . It is well defined by knowing all ζ(ai ), and conversely, any map A → A∗ defines a substitution. A substitution ζ : A → A∗ is called expanding if for each ai ∈ A, |ζ k (ai )| ≥ 2 for some k ≥ 1. For any two words w1 , w2 ∈ A∗ , let us denote the number of occurrences of the word w1 in w2 by |w2 |w1 . By proving a generalized version of the classical Perron–Frobenius Theorem for reducible matrices, in [LU17] we obtain the following result. Proposition 5.2 (Corollary 1.3 and Remark 3.14 of [LU17]). For any expanding substitution ζ : A∗ → A∗ and any letter ai ∈ A there is a well defined invariant measure µai on AZ . For any non-empty w ∈ A∗ and the associated cylinder Cylw the value of µai is given, after possibly raising ζ to a suitable power (which does not depend on w), by the limit frequency |ζ t (ai )|w . t→∞ |ζ t (ai )| µai (Cylw ) = lim Remark 5.3. (1) We note that in [LU17] the measure µai is defined on the substitution subshift Σζ , while in the above quote we denote by µai the canonical extension to all of AZ . Accordingly, in [LU17] the set Cylw denotes set Cylw ∩ Σζ . However, as explained in Remark 3.13 of [LU17], these differences are only superficial: the statement quoted above and the one in [LU17] are indeed equivalent. (2) It can be derived from [LU17] that the positive power to which ζ has to be raised in order to get the frequency equality in Proposition 5.2 is not just independent of w but actually independent of ζ. It only depends on the size of the alphabet A. In the next subsection we also need the following: Lemma 5.4 (Remark 3.3 of [LU17]). Let ζ : A∗ → A∗ be an expanding substitution. Then (up to replacing ζ by a positive power) there exists a constant λai > 1 for each ai ∈ A such 24 MARTIN LUSTIG AND CAGLAR UYANIK that: |ζ t+1 (ai )| = λai t→∞ |ζ t (ai )| lim u t 5.2. Train track maps reinterpreted as substitutions. We now apply the material from the previous subsection to a particular substitution ζf which we construct from an expanding train track map f : Γ → Γ as in the section 4. We first set up the following general definitions: For any graph Γ we recall (see section 2.1) that the set EΓ of oriented edges of Γ is equipped with a fixed point free involution ι : EΓ → EΓ, e 7→ e where e denotes as before the edge e with reversed orientation. We now use EΓ as alphabet, and consider the free monoid EΓ∗ and the both-sided full shift EΓZ . The latter contains the subshift (of “finite type”) ΣΓ ⊂ EΓZ , which consists of all biinfinite reduced edge paths in Γ. We denote the language of ΣΓ by P(Γ), it is the set of all finite reduced edge paths in Γ. We observe that the involution ι induces an involution on EΓ∗ which for convenience will be denoted also by ι. On EΓZ this involution induces the flip involution which is given by ι(. . . xi xi+1 xi+2 . . .) = . . . yi yi+1 yi+2 . . . with yn = x−n+1 for all n ∈ Z. The subshift ΣΓ is clearly flip-invariant. A shift-invariant measure µ∗ on ΣΓ is called flip-invariant if for any measurable subset Σ0 ⊂ ΣΓ one has µ∗ (ι(Σ0 )) = µ∗ (Σ0 ). From Remark 5.1 we see that this is equivalent to requiring that the weight function µ∗EΓ associated to µ∗ satisfies µ∗EΓ (γ) = µ∗EΓ (γ) for any γ ∈ P(Γ). We now observe: Lemma 5.5. Let Γ be a graph provided with a marking θ : FN → π1 Γ. Then any shiftinvariant and flip-invariant measure µ∗ on ΣΓ defines a current µ on FN and conversely. This canonical 1-1 correspondence is given by the fact that the Kolmogorov function µEΓ associated to µ (see section 2.5) and the weight function µ∗EΓ associated to µ∗ satisfy µEΓ (γ) = µ∗EΓ (γ) for any finite reduced path γ in Γ. Proof. It is well known that a current and the associated Kolmogorov function determine each other vice versa (see section 2.5), and similarly for a shift-invariant measure and its weight function (see Remark 5.1). Hence the statement of the lemma is a direct consequence of the observation that any flip-invariant weight function on EΓ∗ , which is zero on EΓ∗ r P(Γ), restricts on P(Γ) to a Kolmogorov function, and conversely, any Kolmogorov function on P(Γ) gives canonically rise to a flip-invariant weight function on EΓ by setting it equal to 0 for any element of on EΓ∗ r P(Γ). u t DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 25 We now consider the occurrences of a path γ as subpath in a path γ 0 . As before, the number of such occurrences is denoted by |γ 0 |γ . We denote the number of occurrences of γ or of γ as subpath in a path γ 0 by hγ, γ 0 i and obtain: hγ, γ 0 i = |γ 0 |γ + |γ 0 |γ (5.1) Let now f : Γ → Γ be any graph self-map. Then f induces a substitution ζf : EΓ∗ → EΓ∗ , but in general ζf -iterates of reduced paths in Γ will be mapped to non-reduced paths. An exception is given if f is a train track map and if the path γ 0 is legal: In this case all f t (γ 0 ) will be reduced as well: [f t (γ 0 )] = f t (γ 0 ) where [ρ] denotes as in section 2.1 the path obtained from an edge path ρ via reduction relative to its endpoints. Hence the occurrences of any path γ or of γ in [f t (γ 0 )] are given by (5.2) hγ, [f t (γ 0 )]i = |f t (γ 0 )|γ + |f t (γ 0 )|γ for any integer t ≥ 0. We are now ready to prove: Proposition 5.6. Let f : Γ → Γ be an expanding train-track map, and let e ∈ EΓ. Then, after possibly replacing f by a positive power, for any reduced edge path γ in Γ the limit hγ, f t (e)i = aγ n→∞ |f t (e)| lim exists, and the set of these limit values defines a unique geodesic current µ+ (e) on FN through setting hγ, µ+ (e)i = aγ for any γ ∈ P(Γ). Proof. Since every edge e of Γ is legal, we obtain for any γ ∈ P(Γ) from equation (5.2) above that hγ, f t (e)i = hγ, [f t (e)]i = |f t (e)|γ + |f t (e)|γ for all exponents t ≥ 0. On the other hand, for any element ω ∈ EΓ∗ r P(Γ) one has |f t (e)|ω + |f t (e)|ω = 0. Furthermore the assumption that f is expanding implies directly that the substitution ζf associated to f is also expanding. Hence we can apply Proposition 5.2 to the substitution ζf to obtain that, after possibly t (e)i replacing f and ζf by a suitable positive power, the limit of the hγ,f exists indeed, and |f t (e)| ∗ ∗ ∗ that it is equal to µe (Cylγ ) + µe (Cylγ ), where µe is a shift-invariant measure on EΓ∗ with support in the subshift ΣΓ . Hence γ 7→ µ∗e (Cylγ ) defines a weight function on EΓ∗ which is zero outside P(Γ), and thus similarly γ 7→ µ∗e (Cylγ ). Their sum is thus also a weight function with support in P(Γ), and furthermore it is flip invariant, so that we obtain from Lemma 5.5 a Kolmogorov function. This in turn defines the current µ+ (e), as stated in our proposition. u t We now want to show that the currents µ+ (e) are projectively ϕ-invariant. For this purpose we start by stating two lemmas; the first one is an elementary exercise: Lemma 5.7. For any graph Γ without valence 1 vertices there exists a constant K ≥ 0 such that for any finite reduced edge path γ in Γ there exists an edge path γ 0 of length |γ 0 | ≤ K such that the concatenation γ ◦ γ 0 exists and is a reduced loop. u t 26 MARTIN LUSTIG AND CAGLAR UYANIK Lemma 5.8. Let f : Γ → Γ as in Proposition 5.6, and let K1 ≥ 0 be any constant. For all integers t ≥ 0 let γt0 ∈ EΓ∗ be any element with |γt0 | ≤ K1 . Set γt := f t (e)∗ γt0 , where f t (e)∗ is obtained from f t (e) by erasing an initial and a terminal subpath of length at most K1 . Then for any reduced path γ in Γ one has hγ, γt i lim = hγ, µ+ (e)i t→∞ |γt | Proof. From the hypotheses |γt0 | ≤ K1 and |f t (e)∗ | ≥ |f t (e)| − 2K1 , and from the fact that hγ,γt i f is expanding and hence |f t (e)| → ∞ for t → ∞, we obtain directly lim hγ,f t (e)i = 1 and t→∞ t| lim |f|γt (e)| = 1. Hence the claim follows directly from Proposition 5.6. t→∞ u t Proposition 5.9. Let ϕ ∈ Out(FN ) be an automorphism which is represented by an expanding train-track map f : Γ → Γ. We assume that ϕ and f have been replaced by positive powers according to Proposition 5.6. Then there exist a constant λe > 1 such that ϕ(µ+ (e)) = λe µ+ (e). Proof. For the given graph Γ let K ≥ 0 be the constant given by Lemma 5.7, and for any integer t ≥ 0 let γt0 ∈ P(Γ) with |γt0 | ≤ K be the path given by Lemma 5.7 so that γt =: f t (e)γt0 ∈ P(Γ) is a reduced loop. Let [wt ] ⊂ FN ∼ = π1 Γ be the conjugacy class represented by γt , and note that the rational current η[wt ] satisfies kη[wt ] k = |γt |, by equality (2.2) from section 2.5. Similarly, consider f (γn ) = f t+1 (e)f (γt0 ), and notice that |f (γt0 )| is bounded above by the constant K0 = K max{|f (e)| | e ∈ EΓ}. Since f is a train track map, the path f t+1 (e) is reduced. Hence the reduced loop γt00 := [f (γn )] = [f t+1 (e)f (γt0 )] can be written as product f t+1 (e)∗ γt00 with |γt00 | ≤ K1 and |f t+1 (e)∗ | ≥ |f t+1 (e)| − 2K1 , where f t+1 (e)∗ is a subpath of f t+1 (e) and K1 is the maximum of K0 and the cancellation bound Cf of f (see Lemma 2.5). Thus we can apply Lemma 5.8 twice to obtain for any reduced path γ in Γ that hγ, γt i lim = hγ, µ+ (e)i t→∞ |γt | and hγ, γt00 i lim = hγ, µ+ (e)i . t→∞ |γt00 | The first equality implies that the rational currents η[wt ] satisfy η[wt ] lim = µ+ (e). t→∞ kη[wt ] k From the continuity of the Out(FN )-action on current space and from ϕη[wt ] = ηϕ[wt ] (see equality (2.1) from section 2.5) we thus deduce ηϕ[wt ] = ϕµ+ (e). lim t→∞ kη[wt ] k However, since the reduced loops γt00 represent the conjugacy classes ϕ[wt ], the second of the above equalities implies that ηϕ[wt ] lim = µ+ (e). t→∞ kηϕ[wt ] k DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 27 |γ 00 | t| Since lim |f|γt (e)| = 1 and lim |f t+1t (e)| = 1, with |γt | = kη[wt ] k and |γt00 | = kηϕ[wt ] k, the conclusion t→∞ t→∞ follows from Lemma 5.10 below. u t Lemma 5.10. For every edge e of Γ there exists a real number λe > 1 which satisfies: |f t+1 (e)| = λe t→∞ |f t (e)| lim Proof. This is a direct consequence of Lemma 5.4 and of the definition of ζf . u t We now define ∆− (ϕ) and ∆+ (ϕ) that are used in the next section: Definition 5.11. Let ϕ ∈ Out(FN ) be an outer automorphism. Assume that ϕ is replaced by a positive power such that both, ϕ and ϕ−1 are represented by expanding train-track maps as in Proposition 5.6. Let f : Γ → Γ be the representative of ϕ. Then the simplex of attraction is defined as follows: X X ∆+ (ϕ) = {[ ai µ+ (ei )] | ai ≥ 0, ai > 0}. ei ∈E + Γ Analogously, we define the simplex of repulsion as ∆− (ϕ) = ∆+ (ϕ−1 ). It should be pointed out here that distinct edges ei of Γ may well give the same limit current µ+ (ei ). Furthermore, even if a subset of currents µ+ (ei ) which define pairwise different vertices of the “simplex” ∆+ (ϕ), this subset may a priori not be linearly independent. However, it follows from general results in dynamics (see for instance [FM10]) that the extremal points of ∆+ (ϕ) correspond to ergodic currents, and that pairwise projectively distinct ergodic currents are linearly independent, so that ∆+ (ϕ) is indeed a finite dimensional simplex. From Proposition 5.9 we obtain directly: Corollary 5.12. Let ϕ ∈ Out(FN ) be as in Definition 5.11. Then the simplexes ∆+ (ϕ) and ∆− (ϕ) are ϕ-invariant: ϕ(∆+ (ϕ)) = ∆+ (ϕ) and ϕ(∆− (ϕ)) = ∆− (ϕ) u t Remark 5.13. There seems to be an interesting question as to what the maximal possible dimension of the limit simplexes ∆+ (ϕ) (or ∆− (ϕ) = δ+ (ϕ−1 )) can be. It has been shown by G. Levitt [Lev09] that for any ϕ ∈ Out(FN ) the number of exponentially growing strata in any train track representative of ϕ is bounded above by 3N4−2 (and that this bound is attained, by certain geometric automorphisms). This gives: 3N − 6 4 We do not know whether there are hyperbolic automorphisms which realize this bound. Preliminary considerations have lead us to construct for any integer k ≥ 1 a family of k+1 hyperbolic automorphisms ϕk with rank(ϕk ) = 2 · 3k + 3 and dim(∆+ (ϕk )) = 3 2 −1 . dim(∆+ (ϕ)) ≤ 28 MARTIN LUSTIG AND CAGLAR UYANIK In the next section we will specify the automorphism in question to be hyperbolic. Recall that ϕ ∈ Out(FN ) is hyperbolic if there is no non-trivial ϕ-periodic conjugacy class in FN . Let f : Γ → Γ be an absolute train track representative of ϕ. By Remark 2.4 we can assume that f is expanding. We then replace ϕ and f by a positive power so that Convention 4.1 is satisfied, and furthermore subdivide edges in accordance to Convention 4.7. Furthermore we have: Lemma 5.14. Any expanding train track representative f : Γ → Γ of a hyperbolic automorphism ϕ ∈ Out(FN ) which satisfies Convention 4.7 also satisfies the hypotheses of Convention 4.14. Proof. This is a direct consequence of Lemma 4.15. u t Convention 5.15. A hyperbolic automorphism ϕ ∈ Out(FN ) is said to have a properly expanding train track representative f : Γ → Γ if f satisfies Conventions 4.1, 4.7 and 4.14, and if both have been raised to a suitable positive power according to Propositions 5.6 and 5.9. Remark 5.16. From Lemma 5.14 one obtains directly that every hyperbolic automorphism ϕ which possesses an absolute train track representative has a positive power ϕt which possesses a properly expanding train track representative. 6. Hyperbolic automorphisms Let ϕ ∈ Out(FN ) be a hyperbolic automorphism which possesses a properly expanding train track representative f : Γ → Γ as in Convention 5.15. Let [w] be a conjugacy class in FN . Represent [w] by a reduced loop γ in Γ. Then the goodness of w, denoted by g([w]), is defined by: g([w]) := g(γ) Lemma 6.1. Given a neighborhood U of the simplex of attraction ∆+ (ϕ) ∈ PCurr(FN ), there exist a bound δ > 0 and an integer M = M (U ) ≥ 1 such that, for any [w] ∈ FN with g([w]) ≥ δ, we have (ϕM )n [ηw ] ∈ U for all n ≥ 1. Proof. We first replace ϕ by a positive power as in Proposition 4.4 so that the goodness function for the train-track map f : Γ → Γ becomes monotone. Recall from Section 2.5 that [ν] ∈ PCurr(FN ) is close to [ν 0 ] ∈ PCurr(FN ) if there exists ε > 0 and R >> 0 such that for all reduced edge paths γ with |γ| ≤ R we have hγ, νi hγ, ν 0 i − < ε. kνkΓ kν 0 kΓ Thus, since ∆+ (ϕ) is compact, there exist ε > 0 and R ∈ R such that the above inequalities imply for ν 0 ∈ ∆+ (ϕ) that ν ∈ U . DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 29 We proved the pointwise convergence for edges in Proposition 5.6. Since there are only finitely many edges and finitely many edge paths γ in Γ with |γ| ≤ R, we can pick an integer M0 ≥ 0 such that (6.1) hγ, f n (e)i − hγ, µ+ (e)i < ε/4 |f n (e)| for all n ≥ M0 , for all γ with |γ| ≤ R and for all edges e of Γ. Let λ0 , λ00 > 1 be the minimal and the maximal expansion factors respectively as given in 1 Convention 4.1. For any reduced loop c in Γ with g(c) ≥ 1+ε/4 iterative application of the fact, that f maps any good edge in c to to a path in [f (c)] which consists entirely of good edges and has length at least λ0 , implies: |f n (c)| ≥ 1 |c|(λ0 )n . 1 + ε/4 Thus for any integer M1 > logλ0 R(1 + 4ε ) and all n ≥ M1 we get the following inequalities: (6.2) R|c| R|c|Γ (1 + ε/4) R(1 + ε/4) ε R(1 + ε/4) ≤ ≤ = ≤ |f n (c)| |c|(λ0 )n (λ0 )M1 R(1 + 4/ε) 4 We note that for any integer m ≥ 1 and for each edge the minimum expansion factor for f m is at least (λ0 )m and the maximum expansion factor for f m is at most (λ00 )m . For the rest of the proof set M = max{M0 , M1 } and δ := max{ 1 1 }, , 0 λ 1 + ε/4 1 + ( λ00 )M ε/4 and let c be a reduced loop in Γ which represents a conjugacy class w with g(w) ≥ δ. The assertion of Lemma 6.1 now follows if we show that for all integers n ≥ 1 the current (ϕM )n ([ηw ]) is (ε, R)-close (in the above sense) to some point in ∆+ (ϕ). Indeed, since by the first paragraph of the proof the goodness function is monotone, it suffices to assume n = 1 and apply the resulting statement iteratively. For simplicity we denote from now on f M by f . Another auxiliary computation gives: (6.3)     (λ00 )M · #{bad edges in c} (λ00 )M (1 − g(w))|c| λ00 M 1 λ00 M 1 ε = =( 0) −1 ≤( 0) −1 ≤ . 0 M 0 M (λ ) · #{good edges in c} (λ ) g(w)|c| λ g(w) λ δ 4 We now write c = c1 c2 . . . b1 . . . cp cp+1 . . . cr b2 cr+1 . . . bk . . . cs−1 cs , where the ci denote good edges and the bj denote maximal bad subpaths of c. Note for the second of the inequalities below that the definition of “good” implies that there can be no cancellation in f (c) between adjacent f (ci ) and f (ci+1 ) nor between adjacent f (ci ) and f (bj ), see Lemma 4.3. 30 MARTIN LUSTIG AND CAGLAR UYANIK Then we calculate: hγ, f (c)i hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i Ps − |f (c)| i=1 |f (ci )| s hγ, f (c)i X hγ, f (ci )i ≤ − |f (c)| |f (c)| i=1 P s s X hγ, f (ci )i hγ, f (ci )i P − i=1 + s |f (c)| i=1 |f (ci )| i=1 P s hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i i=1 hγ, f (ci )i Ps + P − s i=1 |f (ci )| i=1 |f (ci )| k 2R|c| X hγ, [f (bj )]i + |f (c)| j=1 |f (c)| Ps Ps hγ, f (c )i i i=1 hγ, f (ci )i i=1 − P + Ps Pk s i=1 |f (ci )| j=1 |[f (bj )]| i=1 |f (ci )| + Ps hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i i=1 hγ, f (ci )i Ps + P − s i=1 |f (ci )| i=1 |f (ci )| < ε/4 + ε/4 + ε/4 + ε/4 = ε. ≤ Here the first inequality is just a triangle inequality. In the second inequality the last two terms are unchanged, and first two terms come from the first term in the previous quantity and follows from counting frequencies as follows: An occurrence of an edge path γ or its inverse can occur either inside the image of a good edge f (ci ) or inside of the image of a bad segment [f (bj )], or it might cross over the concatenation points. This observation gives the claimed inequality. In the final inequality, the first ε/4 follows from the equation (6.2). The second one follows from the equation (6.3) as follows: k X hγ, [f (bj )]i j=1 |f (c)| ≤ k X |[f (bj )]| j=1 |f (c)| ≤ k X j=1 (λ0 )M |bj |(λ00 )M ε ≤ . 4 · #{good edges in c} DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 31 The third ε/4 comes from the following observation: Ps Ps i=1 hγ, f (ci )i i=1 hγ, f (ci )i − P Ps Pk s i=1 |f (ci )| i=1 |f (ci )| + j=1 |[f (bj )]|  Pk  Ps i=1 hγ, f (ci )i j=1 |[f (bj )]| = Ps  Ps  Pk i=1 |f (ci )| i=1 |f (ci )| + j=1 |[f (bj )]| Pk Ps hγ, f (c )i i j=1 |[f (bj )]| i=1 · Ps ≤ P s i=1 |f (ci )| i=1 |f (ci )| P (λ00 )M kj=1 |bj | P ≤ ≤ ε/4 (λ0 )M si=1 |ci | by (6.3). Finally, the last ε/4 can be verified using (6.1) as follows: Ps hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i i=1 hγ, f (ci )i P Ps − s i=1 |f (ci )| i=1 |f (ci )| Ps hγ, f (ci )i − hγ, µ+ (ci )i) i=1 |f (ci )|( |f (ci )| Ps = i=1 |f (ci )| Ps i=1 |f (ci )|ε/4 ≤ P = ε/4 s i=1 |f (ci )| Since after applying ϕM to a conjugacy class with g(w) ≥ δ we still have g(ϕM (w)) ≥ δ we get (ϕM )n ([ηw ]) ∈ U for all n ≥ 1. u t Lemma 6.2. For any δ > 0 and any neighborhood U of ∆+ (ϕ) there exists an integer M (δ, U ) > 0 such that (up to replacing ϕ by a positive power) for any conjugacy class w with goodness g(w) > δ we have ϕn [ηw ] ∈ U for all n ≥ M . Proof. This is a direct consequence of Corollary 4.5 and Lemma 6.1. u t Proposition 6.3. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism such that ϕ and ϕ−1 both admit properly expanding train-track representatives. Given neighborhoods U of the simplex of attraction ∆+ (ϕ) and V of the simplex of repulsion ∆− (ϕ) in PCurr(FN ), then (up to replacing ϕ by a positive power) there exist an integer M ≥ 0 such that for any conjugacy class w ∈ FN we have ϕn [ηw ] ∈ U for all n ≥ M . or ϕ−n [ηw ] ∈ V 32 MARTIN LUSTIG AND CAGLAR UYANIK Proof. This is a direct consequence of Proposition 4.20 (see Remark 4.21) and Lemma 6.2. u t The following result also proves Theorem 1.1 from the Introduction: Theorem 6.4. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism such that ϕ and ϕ−1 admit absolute train-track representatives. Then, ϕ acts on PCurr(FN ) with uniform NorthSouth dynamics from ∆− (ϕ) to ∆+ (ϕ): Given an open neighborhood U of the simplex of attraction ∆+ (ϕ) and a compact set K ⊂ PCurr(FN ) r ∆− (ϕ) there exists an integer M > 0 such that ϕn (K) ⊂ U for all n ≥ M. Proof. According to Remark 5.16 we can pass to common positive powers of ϕ and ϕ−1 that have a properly expanding train track representatives as in Convention 5.15. We can then combine Propositions 2.8, 3.3, 3.4 and 6.3 to obtain directly the required result. For the application of Proposition 3.3 we need that ∆+ (ϕ) and ∆− (ϕ) are disjoint, which is shown in Remark 6.5 below. We also need for Proposition 3.3 that both, ∆+ (ϕ) and ∆− (ϕ), are ϕ-invariant, which is shown in Corollary 5.12. u t Remark 6.5 (Dynamics within ∆+ (ϕ)). (1) It is proved in Proposition 5.6 that every vertex of the simplex ∆+ = ∆+ (ϕ) is an expanding ϕ-invariant current, i.e. a projectivized current [µ] for which there exist λ > 1 and t ≥ 1 such that ϕt (µ) = λµ. For the rest of this remark we replace ϕ by a suitable positive power so that every vertex current of ∆+ is projectively fixed by ϕ. Of course, this implies that ϕ fixes also every face ∆0 of ∆+ (but not necessarily pointwise). (2) A uniform face ∆0 is a face of ∆+ which is spanned by vertices [µ1+ ], . . . , [µk+ ] that all have the same stretch factor λ > 1, i.e. ϕ(µj+ ) = λµj+ for all 1 ≤ j ≤ k. (3) Since the action of ϕ on Curr(FN ) is linear, all the uniform faces of ∆+ are pointwise fixed. Any non-vertex current [µ] is always contained in the interior of some face ∆0 ⊂ ∆+ . Then the sequence of ϕn ([µ]) converges towards a point in the uniform face ∆0+ of ∆0 which is spanned by all vertices that have maximal stretch factor among all vertices of ∆0 . (4) Similarly, under backwards iteration n → −∞ the sequence of ϕn ([µ]) converges towards a point in the uniform face ∆0− of ∆0 ⊂ ∆+ which is spanned by all vertices that have minimal stretch factor among all vertices of ∆0 . (5) As a consequence, it follows that a current [µ] can not belong to both, ∆+ (ϕ) and ∆− (ϕ): By symmetry in the previous paragraph, any [µ] ∈ ∆− (ϕ) converges under backwards iteration of ϕ−1 to an expanding ϕ−1 -invariant current. But backwards iteration of ϕ−1 is the same as forward iteration of ϕ, and the limit current can not be simultaneously expanding ϕ-invariant and expanding ϕ−1 -invariant. Remark 6.6. As recalled in Remark 6.5, every vertex of the convex cell ∆+ = ∆+ (ϕ) is an expanding ϕ-invariant current. Furthermore, any point in a uniform face of ∆+ is also an expanding ϕ-invariant current, and these are the only such in ∆+ . It follows from Theorem 6.4 and from Remark 6.5 (applied to ϕ−1 ) that there are no other expanding ϕ-invariant currents in PCurr(FN ) r ∆+ . DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN 33 It has been shown in [BHL15] in a slightly more general context that expanding fixed currents (i.e. currents µ with ϕµ = λϕ for some λ > 1) are in 1-1 relation with the nonnegative eigenvectors with eigenvalue > 1 for the transition matrix M (f ) of any expanding train track representative f : Γ → Γ of ϕ. It seems likely that a similar result can be obtained by extending the methods of Section 5. Moreover, pointwise dynamics for a dense subset follows from our machinery: Theorem 6.7. Let ηg be a rational current in Curr(FN ). Then, there exist [µ∞ ] ∈ ∆+ such that lim ϕt [ηg ] = [µ∞ ]. t→∞ Proof. Let γ be a reduced loop representing the conjugacy class g. Apply a sufficiently large power ϕk to g, hence [f k (γ)], the reduced edge path representing ϕk (g) is a pseudo-legal loop, see Proposition 4.12. Then the arguments in in the proof of Lemma 6.1 give the pointwise convergence by looking at the set of non-INP edges in [f k (γ)]. u t Remark 6.8. From the proof of Theorem 6.7 and from the results of our previous paper [LU17] one can also derive a precise description of the limit current µ∞ for any given rational current ηg : Let [f k (γ)] be the pseudo-legal loop representing the conjugacy class ϕk (g), and assume without loss of generality that the initial point doesn’t lie on any INP-subpath. Let [f k (γ)] = c1 c1 . . . cp ρ1 cp+1 cp+1 . . . ρ2 cr cr+1 . . . cs−1 cs be a legal concatenation of edges ci and of INP’s ρj . Then the limit current µ∞ is given by X µ+ (ci )] , [µ∞ ] = [ ci ∈EΓ0 where Γ0 is the (possibly non-connected) subgraph of Γ consisting precisely of those strata Hi of Γ which satisfy one of the following two conditions, where  denotes the natural partial order on strata defined by the non-zero off-diagonal coefficients of the transition matrix M (f ) (see [LU17]): (1) There exists a chain Hi = Hd  Hd−1  . . .  H1 of pairwise distinct strata, all with maximal Perron-Frobenius eigenvalue among the diagonal blocks of M (f ). Furthermore d is the maximal length of any such chain. (2) Hi  Hj for some Hj as in (1). The analogue of Theorem 6.7 for non-rational currents is delicate, but the authors expect that it is actually true. However, as already cautioned in the Introduction, in general the pointwise convergence on PCurr(FN ) will not be uniform. To finish the paper, we would like to illustrate our main result by considering the particular case of a hyperbolic ϕ ∈ Out(FN ) which is given as a “free product” of fully irreducible hyperbolic outer automorphisms: Theorem 6.4 then shows that such a free product automorphism acts on the space of projectivized geodesic currents with generalized uniform North-South dynamics, and the simplex of attraction is spanned by the forward limit currents for each of the fully irreducible factors. More precisely: 34 MARTIN LUSTIG AND CAGLAR UYANIK Example 6.9. Let ϕi ∈ Out(FNi ) (with Ni ≥ 3) be a finite family of hyperbolic fully irreducible outer automorphisms, where each ϕi : FNi → FNi is represented by an absolute train-track map fi : Γi → Γi . For simplicity we now assume (for example by passing to a positive power) that every fi has a fixed vertex vi in Γi , and we consider the lift Φi ∈ Aut(FN ) represented by fi on π1 (Γi , vi ). We then get a global absolute train-track map f by wedging together the Γi at the fixed points vi , and f represents the outer automorphism ϕ given by Φ = Φ1 ∗ . . . ∗ Φk ∈ Aut(FN ), for FN := FN1 ∗ . . . ∗ FNk . Then the Bestvina-Feighn Combination Theorem implies that the “free product” ϕ is hyperbolic. We consider for any i the embedding κi : Curr(FNi ) ,→ Curr(FN ) as described in [KL10c]. In [Uya14] it was proven that for each factor graph Γi the current µ+ (e) defined in Proposition 5.6 is the same for every edge e of Γi . Hence the simplex of attraction for ϕ is spanned by k currents µ+ (ei ), each of which is given by an edge ei from a different Γi . In fact, each µ+ (ei ) is the κi -image of the well defined forward limit current for ϕi in Curr(FN ). Analogously, the simplex of repulsion is equal to the linear span of the images in Curr(FN ) of the backwards limit currents for all ϕ. References [BF92] [BF93] [BF14] [BFH00] [BHL15] [Bon91] [BR15] [Bri00] [CHL08] [CL95] [CL15] [Coo87] [CV86] [DKL15] M. Bestvina and M. Feighn. A combination theorem for negatively curved groups. J. Differential Geom., 35(1):85–101, 1992. Mladen Bestvina and Mark Feighn. Outer limits. 1993. http://andromeda.rutgers.edu/ feighn/papers/outer.pdf. Mladen Bestvina and Mark Feighn. Hyperbolicity of the complex of free factors. Adv. Math., 256:104–155, 2014. Mladen Bestvina, Mark Feighn, and Michael Handel. The Tits alternative for Out(Fn ). I. Dynamics of exponentially-growing automorphisms. Ann. of Math. (2), 151(2):517–623, 2000. Nicolas Bédaride, Arnaud Hilion, and Martin Lustig. Invariant measures for train track towers. arXiv preprint arXiv:1503.08000, 2015. Francis Bonahon. Geodesic currents on negatively curved groups. In Arboreal group theory, pages 143–168. Springer, 1991. Mladen Bestvina and Patrick Reynolds. The boundary of the complex of free factors. Duke Math. J., 164(11):2213–2251, 2015. P. Brinkmann. Hyperbolic automorphisms of free groups. Geom. Funct. Anal., 10(5):1071–1089, 2000. Thierry Coulbois, Arnaud Hilion, and Martin Lustig. R-trees and laminations for free groups. III. Currents and dual R-tree metrics. J. Lond. Math. Soc. (2), 78(3):755–766, 2008. Marshall M. Cohen and Martin Lustig. Very small group actions on R-trees and Dehn twist automorphisms. Topology, 34(3):575–617, 1995. Thierry Coulbois and Martin Lustig. Long turns, INP’s and indices for free group automorphisms. Illinois J. Math., 59(4):1087–1109, 2015. Daryl Cooper. Automorphisms of free groups have finitely generated fixed point sets. J. Algebra, 111(2):453–456, 1987. Marc Culler and Karen Vogtmann. Moduli of graphs and automorphisms of free groups. Invent. Math., 84(1):91–119, 1986. Spencer Dowdall, Ilya Kapovich, and Christopher J Leininger. Dynamics on free-by-cyclic groups. Geom. Topol, 19(5):2801–2899, 2015. DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN [FM10] [Ham12] [HM13] [Iva92] [Kap05] [Kap06] [KL09] [KL10a] [KL10b] [KL10c] [Lev09] [LL03] [LU16] [LU17] [Mah11] [Mar95] [Riv08] [Thu88] [Uya14] [Uya15] 35 Sébastien Ferenczi and Thierry Monteil. Infinite words with uniform frequencies, and invariant measures. In Combinatorics, automata and number theory, volume 135 of Encyclopedia Math. Appl., pages 373–409. Cambridge Univ. Press, Cambridge, 2010. Ursula Hamenstaedt. The boundary of the free splitting graph and the free factor graph. arXiv preprint arXiv:1211.1630, 2012. Michael Handel and Lee Mosher. The free splitting complex of a free group, I: hyperbolicity. Geom. Topol., 17(3):1581–1672, 2013. Nikolai V Ivanov. Subgroups of Teichmuller modular groups, volume 115. American Mathematical Soc., 1992. Ilya Kapovich. The frequency space of a free group. Internat. J. Algebra Comput., 15(5-6):939–969, 2005. Ilya Kapovich. Currents on free groups. In Topological and asymptotic aspects of group theory, volume 394 of Contemp. Math., pages 149–176. Amer. Math. Soc., Providence, RI, 2006. Ilya Kapovich and Martin Lustig. Geometric intersection number and analogues of the curve complex for free groups. Geom. Topol., 13(3):1805–1833, 2009. Ilya Kapovich and Martin Lustig. Domains of proper discontinuity on the boundary of outer space. Illinois J. Math., 54(1):89–108, 2010. Ilya Kapovich and Martin Lustig. Intersection form, laminations and currents on free groups. Geom. Funct. Anal., 19(5):1426–1467, 2010. Ilya Kapovich and Martin Lustig. Ping-pong and outer space. J. Topol. Anal., 2(2):173–201, 2010. Gilbert Levitt. Counting growth types of automorphisms of free groups. Geometric and Functional Analysis, 19(4):1119–1146, 2009. Gilbert Levitt and Martin Lustig. Irreducible automorphisms of Fn have north-south dynamics on compactified outer space. J. Inst. Math. Jussieu, 2(1):59–72, 2003. Martin Lustig and Caglar Uyanik. North-south dynamics of hyperbolic free group automorphisms on the space of currents. arXiv preprint arXiv:1509.05443v2, 2016. Martin Lustig and Caglar Uyanik. Perron-Frobenius theory and frequency convergence for reducible substitutions. Discrete and Continuous Dynamical Systems, 37(1):355–385, 2017. Joseph Maher. Random walks on the mapping class group. Duke Mathematical Journal, 156(3):429– 468, 2011. Reiner Martin. Non-uniquely ergodic foliations of thin-type, measured currents and automorphisms of free groups. ProQuest LLC, Ann Arbor, MI, 1995. Thesis (Ph.D.)–University of California, Los Angeles. Igor Rivin. Walks on groups, counting reducible matrices, polynomials, and surface and free group automorphisms. Duke Mathematical Journal, 142(2):353–379, 2008. William P. Thurston. On the geometry and dynamics of diffeomorphisms of surfaces. Bull. Amer. Math. Soc. (N.S.), 19(2):417–431, 1988. Caglar Uyanik. Dynamics of hyperbolic iwips. Conformal Geometry and Dynamics of the American Mathematical Society, 18(11):192–216, 2014. Caglar Uyanik. Generalized north-south dynamics on the space of geodesic currents. Geometriae Dedicata, 177(1):129–148, 2015. Aix Marseille Université, CNRS, Centrale Marseille, I2M UMR 7373 13453, Marseille, France E-mail address: [email protected] Department of Mathematics, University of Illinois at Urbana-Champaign, 1409 West Green Street, Urbana, IL 61801, USA, http://www.math.uiuc.edu/~cuyanik2 E-mail address: [email protected]
4
Further insights into the damping-induced self-recovery phenomenon Tejas Kotwal ∗, Roshail Gerard †and Ravi Banavar ‡ arXiv:1709.05596v4 [cs.SY] 11 Jan 2018 January 12, 2018 1 Abstract In a series of papers [1, 2, 3, 4], D. E. Chang, et al., proved and experimentally demonstrated a phenomenon they termed “damping-induced self-recovery”. However, these papers left a few questions concerning the observed phenomenon unanswered- in particular, the effect of the intervening lubricantfluid and its viscosity on the recovery, the abrupt change in behaviour with the introduction of damping, a description of the energy dynamics, and the curious occurrence of overshoots and oscillations and its dependence on the control law. In this paper we attempt to answer these questions through theory. In particular, we derive an expression for the infinite-dimensional fluid-stool-wheel system, that approximates its dynamics to that of the better understood finite-dimensional case. 2 Introduction The damping-induced self-recovery phenomenon refers to the fundamental property of underactuated mechanical systems: if an unactuated cyclic variable is subject to a viscous damping-like force and the system starts from rest, then the cyclic variable will always recover to its initial state as the actuated variables are brought to rest. A popular illustration exhibiting self-recovery is when a person sits on a rotating stool with damping, holding a wheel whose axis is parallel to the stool’s axis. The wheel can be spun and stopped at will by the person (Refer to [5]). Initially, the system begins from rest; when the person starts spinning the wheel (say anticlockwise), the stool begins moving in the expected direction (i.e., clockwise). Then the wheel is brought to a halt; the stool then begins a recovery by going back as many revolutions in the reverse direction (i.e., anticlockwise) as traversed before. This phenomenon defies conventional intuition based on well-known conservation laws. Andy Ruina was the first to report this phenomenon in a talk, where he demonstrated a couple of experiments on video [6]. Independently, Chang et al., [1, 2] showed that in a mechanical system with an unactuated cyclic variable and an associated viscous damping force, a new momentum-like quantity is conserved. When ∗ Department of Mathematics of Mechanical Engineering ‡ Systems and Control Engineering, Indian Institute of Technology Bombay, Mumbai, India † Department 1 the other actuated variables are brought to rest, the conservation of this momentum leads to asymptotic recovery of the cyclic variable to its initial position. Boundedness is another associated phenomenon, in which the unactuated cyclic variable reaches a saturation eventually, when the velocity corresponding to the actuated variable is kept constant; this occurs due to the presence of damping. In the experiment explained above, this manifests as the angle of rotation of the stool reaching an upper limit, when the wheel is spinning at a constant speed. Chang et al. generalize this theory to an infinite-dimensional system in which the interaction of an intermediate fluid is considered [3, 4]; they show that the fluid layers also display self-recovery, which is confirmed via experiments as well [7]. Such a generalization of the model is considered because of the interaction of the fluid in the bearing with the recovery phenomenon of the stool, in the experiment explained above. In this work, we make the following points: • We show that the dynamics of the stool and the wheel in the infinite-dimensional fluid system can be approximated to that of the finite-dimensional case by finding an effective damping constant that takes into account the effect of the viscous fluid on the system. • We analyse the finite-dimensional system from a dynamical systems point of view, and show that a bifurcation occurs when the damping constant switches from zero to a positive value. We also derive an expression for the angle at which boundedness occurs. • In addition to the recovery phenomenon described previously, further complex behaviour is observed in the experiments reported in [5, 7]. In particular, the unactuated variable not only approaches its initial state during recovery, but also overshoots and then oscillates about this initial position, eventually reaching it asymptotically. This oscillation phenomenon has not been looked into in previous works, and is one of the points that we address as well. • In Chang et al. [5], in the experiment described, the oscillations are of significant amplitude, and this would prompt one to assume that some sort of mechanical ‘spring-like’ energy is being stored, as the stool appears to start moving after the entire system has come to a halt. The question of energy has been touched upon in this work, and we present energy balance equations for the given mechanical system. The paper unfolds as follows. Initially we present mathematical models for the stool-wheel experiment - the first is a finite-dimensional one, and the second one incorporates the intervening fluid (either in the bearing or in a tank) using the Navier-Stokes equation for a Newtonian incompressible fluid. This is followed by a section that presents an intuitive interpretation of recovery highlighting three distinct types of behaviour. Then follows a theoretical section that presents a technique to reduce the infinitedimensional fluid effect to an effective damping constant and hence model the overall system in finite dimensions. This part is followed up by a result on boundedness and the occurrence of a bifurcation in the system dynamics. In the appendix, the derived results are used in conjunction with numerical experiments to validate the expression for the effective damping constant. We then examine the case of 2 oscillations and overshoots, and present plausible explanations to why these occur, and possible sources of future investigation. 3 Mathematical models Finite-dimensional model: We first analyze a simplified, idealized version of the person with a wheel in hand, sitting on a rotatable stool whose motion is opposed by damping, which for the purpose of analysis is assumed to be linear viscous damping. This is a specific example of the model that Chang, et al. studied [1, 2]. We assume two flat disks, one for the wheel and one for the stool-person mass as shown in Fig. 1. The stool consists of an internal motor, that actuates the wheel, while the motor-rod-stool setup rotates as one piece (henceforth just called the stool). There is linear viscous damping present in the rotational motion of the stool, with damping coefficient k. The torque imparted on the wheel by the motor is denoted by u(t). Figure 1: A schematic diagram of the wheel-stool model. The inertia matrix of the system is given by  (mij ) =  m11 m21  I = w m22 Iw m12  Iw Iw + Is  , (1) where Iw and Is are the moments of inertia of the wheel and stool respectively. The kinetic energy of the described system is K.E.(t) = 1 1 Iw (θ̇w + φ̇s )2 + Is φ̇2s , 2 2 (2) where θw denotes the angle rotated by the wheel relative to the stool, and φs denotes the angle rotated by the stool relative to the ground frame. Since there is no external potential in our system, the 3 Lagrangian only comprises of the total kinetic energy. The Euler-Lagrange equations for the system are given by Iw φ̈s + Iw θ̈w = u(t) (3a) (Iw + Is )φ̈s + Iw θ̈w = −k φ̇s (3b) Although this model captures the damping-induced boundedness and recovery phenomena, further behaviour that cannot be explained with this model are the overshoot and oscillations, which were observed in experiments [5, 7]. It was suggested that the lubricating fluid inside the bearing of the rotatable stool could be one of the reasons behind this additional behaviour. As a result, a generalized model that involves the dynamics of the fluid interacting with the stool-wheel setup is analyzed [3, 4]. Infinite-dimensional fluid model: The model consists of two concentric infinitely long cylinders with inner radius Ri and outer radius Ro . The outer radius is fixed, while the inner cylinder is free to rotate (this is the stool in our case). A motor is installed in the inner cylinder (as described in the previous case, i.e., φs ), to drive the wheel (i.e., θw ) attached to it. The annulus region between the two cylinders is filled with an incompressible viscous fluid. Due to symmetry in the z direction, we may regard this as a 2D system in a horizontal plane. The moments of inertia should be considered as per unit depth, because of the infinite length in the z direction. Due to rotational symmetry, the fluid only flows coaxially, i.e, there is no fluid flow in the radial direction. Let v(r, t) denote the tangential velocity of the fluid at radius r and time t, where Ri ≤ r ≤ Ro . The subscripts t and r denote partial derivatives with respect to time and radius respectively. As described before, u(t) is the driving torque on the wheel imparted by the motor. The corresponding equations are Iw φ̈s + Iw θ̈w = u(t) (4a)  (Iw + Is )φ̈s + Iw θ̈w = 2πρνRi Ri vr (Ri , t) − v(Ri , t) (4b) vt = ν(vrr + vr v − 2) r r (4c) where ν is the kinematic viscosity and ρ is the density of the fluid. The right hand side of Eq. (4b) is the torque on the inner cylinder due to stress exerted by the surrounding fluid [8]. Equation (4c) is the Navier-Stokes equation for an incompressible viscid fluid in radial coordiantes. The system (4) is an infinite-dimensional fluid system, compared to the previous finite-dimensional system (3). The initial and boundary conditions are given by φs (0) = φ̇s (0) = θw (0) = θ̇w (0) = 0 (5a) v(r, 0) = 0 (5b) v(Ri , t) = Ri φ̇s (t) (5c) v(Ro , t) = 0 (5d) 4 where Eqs. (5c) and (5d) are the no-slip boundary conditions for the fluid. The given initial conditions imply that the entire system begins from rest. In order to control the wheel independently of the effects of inertia of the stool and damping of the fluid, we employ a method known as partial feedback linearization. This is done by partially cancelling the nonlinearities in the dynamics, i.e. the wheel equations are linearized by introducing a new input τ (t) and redefining the input u(t) as  u(t) = Iw Iw + Is  Is τ (t) + 2πρνRi Ri vr (Ri , t) − v(Ri , t)  (6) where τ (t) is precisely equal to the acceleration of the wheel, i.e. θ̈w = τ (t). We assume a PD control law for the new control variable given as   d d d τ (t) = θ̈w (t) + c1 θ̇w (t) − θ̇w + c0 θw (t) − θw (7) d where θw (t) is the desired trajectory of the wheel, and c0 and c1 are the proportional and differential gains respectively. For the standard demonstration of recovery and/or boundedness, we require the wheel to be driven from rest to constant velocity, and then abruptly braked to a stop. Such a desired trajectory   d (t) = (1/2) θ̇steady |t| − |t − tstop | + tstop where θ̇steady is of the wheel is given by a ramp function, θw the desired constant velocity of the wheel, and tstop is the time at which the wheel is instantaneously brought to rest (Refer to Fig. 2). By appropriately tuning the values of c0 and c1 , we can mimic the desired trajectory. This tuning is important in accounting for the presence of oscillations, or lack thereof, Desired trajectory of the wheel 3wd (rad) as we shall see later. slope = 3_steady 0 0 tstop Time t (s) d Figure 2: An illustration of the desired trajectory θw (t) in the control law of the wheel (7) . 4 An intuitive interpretation of recovery We present a qualitative interpretation of the boundedness and recovery phenomenon using the momentum equation of the finite dimensional stool-wheel case. A brief explanation of the recovery phenomenon was also presented by Andy Ruina [6] which we summarize: Change in angular momentum is equal to 5 the net external torque, but since it is only due to linear viscous damping, we have L̇ = −cϕ̇ (where L is the angular momentum, c is the damping constant and ϕ is the angle). If the system’s initial and final state is the rest state, then ∆L = 0 =⇒ ∆ϕ = 0. Thus the net change in angle has to be zero, implying that recovery must occur. We delve a little deeper into the phenomenon and attempt to provide an intuitive interpretation for the reversal of direction of the stool. Consider the case where the wheel follows the desired trajectory perfectly (i.e., the ramp function). This means that at t = 0, an impulsive acceleration gets the wheel spinning instantaneously (to a constant speed), and at t = tstop , an impulsive deceleration brings the wheel to a halt instantaneously (refer to Fig. 3). Consider the damping-induced momentum equation, as derived by Chang, et al. [1, 2] Acceleration of wheel 3Bw (rad=s2 ) Iw (θ̇w + φ̇s ) + Is (φ̇s ) + kφs = 0 (8) 2000 1000 0 -1000 -2000 0 2 4 6 8 10 Time t (s) Figure 3: Acceleration vs time for the wheel. The first peak corresponds to the initial impulse to get the wheel spinning to a constant velocity; the second negative impulse is to brake the wheel to a halt. At t = 0, there is a jump in θ̇w , while φs remains constant (i.e., φs = 0) (refer to Figs. 8 and 9). The momentum equation (8) then simplifies to Iw (θ̇w (0) + φ̇s (0)) + Is (φ̇s (0)) = 0 (9) which is the usual momentum conservation. Thus, at t = 0, the velocity of the stool is governed by the conservation of standard angular momentum, and the velocity of the wheel. Let this velocity be φ̇s (0) = φ̇fs . At t = tstop , there is an instantaneous jump down to zero for θ̇w , while φs remains constant. This time, the momentum equation (8) simplifies to Iw (θ̇w (tstop ) + φ̇s (tstop )) + Is (φ̇s (tstop )) = C (10) where C is a constant (C = −kφs (tstop )). Once again, this equation may be interpreted as the standard angular momentum conservation. We examine three distinct cases: • Case 1: (No damping) The speed of the stool at t = tstop − ε is the same as what it was at t = 0, 6 (i.e. φ̇fs ), implying that at t = tstop , the stool comes to rest instantaneously (i.e., φ̇s (tstop ) = 0). Recall, that this is the standard case, where the usual momentum conservation law holds. Refer to Figs. 7 and 4. Position of stool ?s (rad) 0 -0.2 -0.4 -0.6 -0.8 -1 0 2 4 6 8 10 Time t (s) Figure 4: Case 1. k = 0, tstop = 5, vw = 2. This case corresponds to the usual momentum conservation. • Case 2: (Damping present but damping induced boundedness not yet reached) During 0 < t < tstop , the damping force keeps decreasing the speed of the stool. However, the momentum equation (10) is still the same at t = tstop . Thus, the change in momentum of the stool would be the same (as in Case 1). But since |φ̇s (tstop − ε)| < |φ̇fs |, the final momentum of the wheel ends up overshooting zero at t = tstop , resulting in the change in direction of the stool. Refer to Figs. 7 and 5. • Case 3: (Damping present and damping-induced boundedness has been attained) This case can be viewed as a special instance of Case 2, where for 0 < t < tstop , the speed of the stool decreases all the way to zero. The rest of the explanation follows as in Case 2. Refer to Figs. 7 and 6. 7 Position of stool ?s (rad) 0 -0.02 -0.04 -0.06 -0.08 -0.1 0 2 4 6 8 10 Time t (s) Figure 5: Case 2. k = 1, tstop = 1, vw = 2. In this case, damping-induced boundedness is not yet reached, but the recovery phenomenon can be seen. Position of stool ?s (rad) 0 -0.05 -0.1 -0.15 0 2 4 6 8 10 Time t (s) Figure 6: Case 3. k = 1, tstop = 5, vw = 2. In this case, both—damping-induced boundedness and recovery phenomenon can be seen. 8 Change in velocity of the stool before and after braking 0 Case 1 Case 2 Case 3 Figure 7: Comparison of the three cases before and after braking. Blue dots: velocity of stool just before braking; red dots: velocity of stool immediately after braking. For cases 2, 3, the (magnitude of) velocity of the stool before braking decreases due to damping; hence momentum transferred by the wheel overshoots the stool velocity to something positive. This explains why the wheel changes direction. 9 5 Effective damping constant In this section, we demonstrate that the dynamics of the infinite-dimensional fluid system can be approximated by that of a finite-dimensional one. d Claim 5.1. Let the desired trajectory of the wheel be the ramp function, given by θw (t) = (1/2) θ̇steady |t|−   |t − tstop | + tstop . Then the solution of Eq. (4c) satisfies lim v(r, t) = lim Ri φ̇s (t) t→∞ t→∞ Ro − r . Ro − Ri Proof: We consider an analytical solution to the PDE (4c), obtained by the method of separation of variables. Since one of the boundary conditions is non-homogeneous (and in fact time dependent), we perform a change of variables in order to make it homogeneous [9]. The change of variables is given as v(r, t) = w(r, t) + Ri φ̇s (t) Ro − r Ro − Ri (11) where w(r, t) is transformed the variable. The correction term is taken as a linear interpolation between the two boundary conditions for simplicity. The transformed PDE is given as wt − ν(wrr + w wr − 2 ) = F (r, t) r r (12) where F (r, t) is the driving force of the PDE resulting from the change of variables given by F (r, t) = −Ri φ̈s (t) Ro − r Ro − νRi φ̇s (t) 2 Ro − Ri r (Ro − Ri ) (13) The transformed initial and boundary conditions are given by w(r, 0) = 0 (14a) w(Ri , t) = 0 (14b) w(Ro , t) = 0 (14c) We assume the solution w(r, t) = W (r)T (t), and obtain the homogeneous solution of the spatial ODE by analyzing the corresponding eigenvalue problem. The eigen solution obtained is given by r W (r) = aJ1  r  λ λ r + bY1 r ν ν (15) where J1 and Y1 are the Bessel’s functions of the first and second kind respectively, λ denotes the eigen value, and a and b are arbitrary constants determined by the boundary conditions. Upon plugging in the boundary conditions, and solving for λ, we find that the eigen values are positive due to the fact that roots of Bessel’s functions are real [10]. Thus we have the following solution for v(r, t) 10 v(r, t) = ∞ X r J1 n=1 |  r ! λn λn Ro − r r + kn Y1 r Tn (t) +Ri φ̇s (t) ν ν Ro − Ri {z } (16) transient term where kn and λn are constants obtained by solving the boundary conditions in the eigen value problem, and Tn (t) is the time component of the solution, which is obtained by solving the corresponding initial value problem. The series given in the right hand side of Eq. (16) is considered as a transient term for the PDE (4c), and we show that it is insignificant as t → ∞. Consider the time component of the solution (16) Z t e Tn (t) = 0 R Ro −λn (t−τ ) Ri F (r, τ )Wn (r)dr R Ro Ri Wn (r)2 dr dτ = e −λn t Z t eλn τ (mφ̈s (τ ) + lφ̇s (τ ))dτ 0 where Wn (r) is the nth term of the Fourier series, and m and l are constants obtained after evaluating the integrals in the spatial variable. For our case, plug in θ̇w (t) equal to the desired ramp trajectory   d (θw (t) = (1/2) θ̇steady |t| − |t − tstop | + tstop ) in the momentum equation (8). Upon solving for φ̇s (t), we see that it is exponentially decaying, and therefore Tn (t) → 0 as t → ∞ for all n.1 Thus, we have the result. . In the limit where the transient term is insignificant, the solution (16) is plugged in Eq. (4b) and simplified as follows (Iw + Is )φ̈s + Iw θ̈w = − 2πρνRo Ri2 φ̇s Ro − Ri (17) We would like to emphasize here that we have found an effective damping constant kef f for the infinite-dimensional fluid system (4) that approximates its dynamics to that of a finite dimension case (3). The effective damping constant is given by kef f = 2πρνRo Ri2 Ro − Ri (18) We revisit this effective damping constant and its validity in the appendix, after we introduce a couple of expressions from the boundedness and bifurcation section. 6 Boundedness and bifurcation We now revisit the finite dimensional case (3), and rewrite the corresponding momentum equation as a first order system. The damping-induced momentum equation (8) is given by (Iw + Is )φ̇s + Iw θ̇w (t) + kφs = 0 (19) 1 In fact, the result holds for any wheel trajectory that grows polynomially for finite time before eventually coming to rest. 11 where θ̇w (t) is written as a function of time, since it is an external driving force for the stool dynamics. (Using partial feedback linearization, the wheel can be controlled independently of the stool). Claim 6.1. Suppose k > 0. Then for a fixed speed of the wheel, say θ̇w (t) = vw = constant, we have the following equality lim φs (t) = φ∗s = t→∞ −Iw vw k Proof: Rewritting Eq. (8) as a first order system in φs φ̇s = −k −Iw φs + θ̇w (t) = −αφs − β θ̇w (t) = f (φs , t) Iw + Is Iw + Is (20) where α, β are constants. Since Eq. (20) is a nonautonomous system, we rewrite it in a higher dimensional autonomous form as φ̇s = −αφs − β θ̇w (t) (21a) ṫ = 1 (21b) In the differential equation for the stool, for a fixed speed of the wheel, say θ̇w (t) = θ̇steady = vw = constant, the solution is Z φs (t) = −β t [e−α(t−s) ]vw ds = 0 −βvw [1 − e−αt ] α (22) and as t → ∞, we have φ∗s = lim φs (t) = t→∞ −βvw −Iw vw = α k . The above equality corresponds to the damping-induced boundedness phenomenon, and is especially relevant in Figs. 8 and 9. Now we get to the dynamical systems aspect of our discussion. For the purpose of this discussion we present a few definitions from standard texts on dynamical systems. A fixed point for a system of differential equations Ẋ = F (X) is defined as the set of points that are solutions to the equation F (X) = 0. A fixed point for system (21) does not exist since ṫ 6= 0 for any state (φs , t). We will consider (φ∗s , t∗ ) to be a fixed point if f (φ∗s , t∗ ) = 0. A bifurcation is defined as a change in the qualitative structure of the flow as the parameters are varied. In particular, fixed points can be created or destroyed, or their stability can change [11]. In this particular case, the drastic change in behaviour occurs at k = 0. d Claim 6.2. Let the desired trajectory of the wheel be the ramp function, i.e., θw (t) = (1/2) θ̇steady |t| −   |t − tstop | + tstop . Then • If k = 0, the stool dynamics is neutrally stable • If k > 0, the stool dynamics is asymptotically stable. Thus, a bifurcation occurs when k is varied from 0 to a positive number. 12 Velocity of stool ?_ s (rad=s) 0.1 0 -0.1 -0.2 -0.8 -0.6 -0.4 -0.2 0 Position of stool ?s (rad) Figure 8: Phase portrait of stool dynamics with varying values of damping coefficient k, and steady state wheel velocity θ̇steady = 2. Green: k = 1; red: k = 0.1; blue: k = 0. Green: damping-induced boundedness attained; red: damping induced boundedness is not yet reached; blue: neutral stability, no recovery phenomenon. The final equilibrium point for the k = 0 case and k > 0 are drastically different. Proof: k = 0: From eqn. (21), k = 0 ⇒ φ̇s = −β θ̇w (t) This implies that the stool dynamics has a fixed point only when the wheel is brought to a rest; the stool is neutrally stable at any constant value φ∗s . k > 0: The fixed point φ∗s for the stool dynamics is governed by φ∗s = −Iw θ̇w (t∗ ) k (23) For a fixed point to occur, there are two possibilities: The wheel is at a constant speed vw ⇒ φ∗s = −Iw vw /k or The wheel is at rest ⇒ φ∗s = 0 Clearly, if the wheel is braked (zero speed), the stool must go back to its initial state (φ∗s = 0) governed by φ̇s = −αφs (24) This is the damping-induced self recovery equilibrium state. As seen from the above analysis, the system undergoes a change in its dynamical system behaviour, when k is switched from 0 to a positive number. Eq. (23), rewritten as φ∗s k = −Iw θ̇w (t∗ ) (25) is the equation of a hyperbola in the variables φ∗s and k, and as k → 0, φ∗s → ∞. For k > 0 (no matter how small it is), the recovery phenomenon occurs (implying that the stool must return to its initial position regardless how many rotations it has completed). But for k = 0, the stool is neutrally stable, implying a change in the stability behaviour. (Note that as φs is 2π−periodic, one should consider 13 Velocity of stool ?_ s (rad=s) 0.3 0.2 0.1 0 -0.1 -0.2 -0.15 -0.1 -0.05 0 Position of stool ?s (rad) Figure 9: Phase portrait of stool dynamics with varying values of steady state wheel velocity θ̇steady . Innermost to outermost loop: θ̇steady = 1, 2, 3 (k = 1 for all cases). φs mod 2π to obtain the actual position of the stool. However, not doing so, gives us the number of rotations the stool completes. For e.g., if φ∗s = 8π, then the damping-induced bound is attained after four rotations) . 7 Oscillations and energy description Oscillations of the unactuated variable have been reported in a few experiments on the damping induced self-recovery phenomenon [4, 5, 6, 7]. In our opinion, the cause of these oscillations has not been adequately identified in previous works. We believe that a seemingly trivial, but important source of these oscillations, is the nature of the control law used on the wheel. It is observed that if oscillations are induced in the wheel via the control law, then the stool also mimics these oscillations, with a slight time lag due to the damping. This type of oscillation can be produced in both, the finite-dimensional as well as the infinite-dimensional system. Refer to Figs. 10 and 11 for an example via simulations. We would like to emphasize that oscillations of this kind are a direct consequence of the actuation of the wheel. It is likely that the oscillations in [4, 7] are of this kind. However, the oscillations in Ref. [5] occur even though the wheel is stationary with respect to the stool; in fact, at the extreme positions of the oscillation, it appears as though the entire system (stool and wheel) begins moving again from a complete state of rest. That is, it appears that there is some kind of mechanical ‘spring-like’ energy being stored at these extreme positions. These oscillations are clearly not of the type mentioned above, as they are not a direct result of the actuation of the wheel. Additionally, the observed oscillations in the stool are of high amplitude whereas those in the wheel, if any, appear to be of small amplitude. This is contradictory to what is observed in the previous type of oscillations (seen in Figs. 10 and 11) as the inertia of the stool-wheel system is greater than the inerita of the wheel only. A simple order of magnitude analysis shows that a more complex model is probably 14 Position of wheel 3w (rad) 500 400 300 200 100 0 0 5 10 15 20 Time t (s) Figure 10: Trajectory of the wheel (solid blue line) with control parameters c0 = 1 and c1 = 3. The red dashed line denotes the desired trajectory, and the overshoot of the wheel may be seen at t = 2s. Position of stool ?s (rad) 0.02 0 -0.02 -0.04 -0.06 -0.08 0 5 10 15 20 Time t (s) Figure 11: Trajectory of the stool (solid blue line) under the influence of the wheel trajectory shown in Fig. 10. The black dashed line denotes the zero position of the stool, and the overshoot of the stool may be seen after it recovers (Note the slight delay when compared to the overshoot of the wheel; this is due to the time constant of the system). required to account for this phenomenon. In order to demonstrate this, we first consider the energy dynamics of the system. Energy description for the finite-dimensional system: In order to derive the energy equations of the finite dimensional system, (3b) is multiplied by φ̇s , and (3a) with θ̇w , to yield (Iw + Is )φ̈s φ̇s + Iw θ̈w φ̇s = −k φ̇s φ̇s (26a) Iw φ̈s θ̇w + Iw θ̈w θ̇w = uθ̇w (26b) Equations (26a) and (26b) are integrated, and then summed up, resulting in the following energy balance (in the ground frame) Z t Z uθ̇w dt = K.E.(t) + 0 0 15 t k φ̇2s dt (27) where K.E.(t) is the total kinetic energy of the system. The second term on the right hand side of represents the cumulative energy lost due to damping losses up to time t. The energy lost in damping is precisely equal to the work done by the damping force, that is Z φs (t) L.E.(t) = Z k φ̇s dφs = 0 t k φ̇2s dt. (28) 0 The term on the left hand side of Eq. (27) represents the total energy pumped into the system by the motor, up to time t. The power input into the system by the motor is the sum of power imparted to the wheel by the actuation force u(t), and the power imparted to the stool by the reaction force. The cumulative input energy (denoted by I.E.(t)) is given by Z t Z t Z (29) 0 0 0 t uθ̇w dt (−u)φ̇s dt = u(θ̇w + φ̇s ) dt + I.E.(t) = We can simplify the energy balance (27) as I.E.(t) = K.E.(t) + L.E.(t) (30) Energy description for the infinite-dimensional fluid system: The above energy equation can be extended for the infinite dimensional case as follows. 1 I.E.(t) = K.E.(t) + ρ 2 Z 1 v dV + ρν 2 2 Z tZ  0 ∂vi ∂vk + ∂xk ∂xi 2 dV dt (31) where the second term on the right hand side is the kinetic energy of the fluid, while the third term is the energy lost due to viscous damping [8]. The velocity of the fluid in cartesian coordinates is given by v = −v sinθ î + v cosθ ĵ, where v is the tangential velocity of the fluid as discussed previously (4). We consider the system at a state when the wheel is no longer being actuated and is in a state of rest with respect to the stool. The system can be found in such a state at the extreme position of an oscillation that occurs after the wheel has been brought to rest. This implies that I.E(t) in (31) is zero and hence, the kinetic energy of the stool can only be exchanged with that of the fluid, or be lost due to damping. We analyze this state with the parameters from table 1 for the fluid-stool-wheel system. At the extremum of the oscillation, the stool-wheel system is momentarily at rest, and as is clear from (31), must be imparted energy from the fluid to start rotating again. The maximum energy that the stool-wheel system could possibly regain is therefore equal to the kinetic energy of the fluid at this extreme position. This leads to an expression (32) for the minimum fluid velocity (averaged over the thickness of the annulus) in terms of system constants and the velocity of the stool.  i 2 1h  1 (Iw + Is )φ̇2s = ρπ (Ri + t)2 − (Ri )2 h vavg 2 2 (32) where t and h are the thickness and height of the bearing respectively, while vavg is the velocity of the fluid averaged over the thickness of the annulus. Even for a stool velocity as low as 1 rpm, the required average fluid velocity is around 11 rpm, which is quite high and unrealistic. Hence, it is likely that a 16 different model is required to address such behaviour. Name Moment of Inertia of Wheel-Stool System Inner diameter of bearing Thickness of bearing Height of bearing Density of Fluid Value 1 0.1 0.01 0.01 1000 Units kg/m2 m m m kg/m3 Table 1: Parameter values of fluid-wheel-stool system that are representative of experiment in [5] 8 Conclusion In this paper, we present certain aspects of the damping-induced self recovery phenomenon that have not been investigated so far in the existing literature. We present a technique to reduce the infinitedimensional fluid model to the better understood finite dimensional case, by deriving a formula for an effective damping constant. We show that a bifurcation takes place at k = 0, and upon varying the value of k from zero to a positive number, the stability of the stool changes from neutral to asymptotically stable. We also derive an expression for the angle at which boundedness occurs to validate the approximation of the fluid system (by comparing with numerical experiments). Finally, we present an energy description of the system to give an intuitive understanding of the energy dynamics, and to point out that further experimental and theoretical investigation is necessary to explain the peculiar oscillations found in experiments [5, 6]. References [1] Dong Eui Chang and Soo Jeon. Damping-induced self recovery phenomenon in mechanical systems with an unactuated cyclic variable. Journal of Dynamic Systems, Measurement, and Control, 135(2):021011, 2013. [2] Dong Eui Chang and Soo Jeon. On the damping-induced self-recovery phenomenon in mechanical systems with several unactuated cyclic variables. Journal of Nonlinear Science, 23(6):1023–1038, 2013. [3] Dong Eui Chang and Soo Jeon. On the self-recovery phenomenon in the process of diffusion. arXiv preprint arXiv:1305.6658, 2013. [4] Dong Eui Chang and Soo Jeon. On the self-recovery phenomenon for a cylindrical rigid body rotating in an incompressible viscous fluid. Journal of Dynamic Systems, Measurement, and Control, 137(2):021005, 2015. [5] Dong Eui Chang and Soo Jeon. Video of an experiment that demonstrates the self-recovery phenomenon in the bicycle wheel and rotating stool system. https://youtu.be/og5h4QoqIFs. 17 [6] Andy bikes, Ruina. arrows, Dynamic and walking muscle-smarts: 2010: Cats, astronauts, Stability, translation, and trucks, rotation. http://techtv.mit.edu/collections/locomotion:1216/videos/8007-dynamic-walking-2010-andyruina-cats-astronauts-trucks-bikes-arrows-and-muscle-smarts-stability-trans, 2010. [7] Dong Eui Chang and Soo Jeon. Video of an experiment that demonstrates the self-recovery phenomenon in the vessel and fluid system. https://youtu.be/26qGQccK4Rc. [8] L. D. Landau and E. M. Lifshitz. Fluid Mechanics, volume 6. 1959. [9] Stanley J Farlow. Partial differential equations for scientists and engineers. Courier Corporation, 1993. [10] Milton Abramowitz and Irene A Stegun. Handbook of mathematical functions: with formulas, graphs, and mathematical tables, volume 55. Courier Corporation, 1964. [11] S.H. Strogatz. Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering. Advanced book program. Avalon Publishing, 1994. Appendix A Validation of effective damping constant With the computed, effective damping constant kef f (18) of the infinite-dimensional fluid system (4), we find the angle at which boundedness is attained, given by φ∗s = −Iw vw (Ro − Ri ) 2πρνRo Ri2 (33) We now present some numerical experiments by solving the PDE-system (4) using the method of lines. Equation (18) is then verified by comparing the numerical values obtained using formula (33) and the numerical solutions of the original PDE. It is observed that the error tends to zero as Ro /Ri approaches 1, independent of the value of Ri . The material constants used for the simulation, and for the theoretical calculation are tabulated below 18 Ri (cm) Ro (cm) 13.5 13.5 13.5 13.5 13.5 13.5 13.5 13.5 13.5 13.51 13.68 13.75 14 14.5 15 15.5 20 27 27 27 27 27 27 27 27 27 27 27.02 27.36 27.5 28 29 30 31 40 54 0.07 1.33 1.85 3.70 7.41 11.11 14.81 48.15 100 With the PDE Angle (rad) 6.16 108.7 149.8 291.7 553.8 790.3 1004 2265 3123 With kef f Angle (rad) 6.16 109.5 151.3 297.1 573.7 831.9 1073 2704 4160 0.07 1.33 1.85 3.70 7.41 11.11 14.81 48.15 100 1.54 27.19 37.47 72.96 138.5 197.6 251.1 566.3 780.8 1.54 27.37 37.81 74.28 143.4 208 268.4 675.9 1039.9 (Ro −Ri ) Ri × 100 % Error 0.00 0.74 1.00 1.85 3.59 5.26 6.87 19.38 33.21 0.00 0.66 0.91 1.81 3.54 5.26 6.89 19.35 33.18 Table 2: A comparison of the angles at which boundedness occurs, i.e., between the numerical simulations and the theoretically derived formula (33), for different values of (Ro − Ri )/Ri . Name Moment of Inertia of Wheel Moment of Inertia of Stool Kinematic Viscosity of Fluid Density of Fluid Steady State Velocity of Wheel Proportional Control Parameter Derivative Control Parameter Value 6 × 10−3 1.96 1.17 × 10−6 1.0147 × 103 60π 1 100 Units kg/m2 kg/m2 m2 /s kg/m3 rad/s - Table 3: Parameter constants used for the simulations. 19
3
Rate-Splitting for Multi-Antenna Non-Orthogonal Unicast and Multicast Transmission Yijie Mao∗ , Bruno Clerckx† and Victor O.K. Li∗ ∗ arXiv:1802.05567v2 [cs.IT] 16 Feb 2018 The University of Hong Kong, Hong Kong, China † Imperial College London, United Kingdom ∗ Email: {maoyijie, vli}@eee.hku.hk, † [email protected] Abstract—In a superimposed unicast and multicast transmission system, one layer of Successive Interference Cancellation (SIC) is required at each receiver to remove the multicast stream before decoding the unicast stream. In this paper, we show that a linearly-precoded Rate-Splitting (RS) strategy at the transmitter can efficiently exploit this existing SIC receiver architecture. By splitting the unicast message into common and private parts and encoding the common parts along with the multicast message into a super-common stream decoded by all users, the SIC is used for the dual purpose of separating the unicast and multicast streams as well as better managing the multi-user interference between the unicast streams. The precoders are designed with the objective of maximizing the Weighted Sum Rate (WSR) of the unicast messages subject to a Quality of Service (QoS) requirement of the multicast message and a sum power constraint. Numerical results show that RS outperforms existing Multi-User Linear-Precoding (MU–LP) and power-domain Non-Orthogonal Multiple Access (NOMA) in a wide range of user deployments (with a diversity of channel directions and channel strengths). Moreover, since one layer of SIC is required to separate the unicast and multicast streams, the performance gain of RS comes without any increase in the receiver complexity compared with MU–LP. Hence, in such non-orthogonal unicast and multicast transmissions, RS provides rate and QoS enhancements at no extra cost for the receivers. Index Terms—non-orthogonal multicast and unicast transmission, rate-splitting, rate region, WMMSE algorithm I. I NTRODUCTION The scarcity of radio resources and the heterogeneity of wireless applications in 5G and beyond motivate recent research on the non-orthogonal unicast and multicast transmission [1]– [4], which is based on Layered Division Multiplexing (LDM) in the literature of digital television systems [5]. The unicast and multicast messages are precoded and superimposed at the transmitter and then broadcast to the receivers in the same timefrequency resources. Each receiver decodes and removes the multicast message using Successive Interference Cancellation (SIC) before decoding its intended unicast message. Joint unicast and multicast beamforming of multi-cell cooperative transmission has been studied, e.g., for transmit power minimization [1], [2], Weighted Sum Rate (WSR) maximization [3] and energy efficiency maximization [4]. However, all of the above works consider the use of Multi-User Linear Precoding (MU–LP) beamforming for the unicast messages. Once the common message is successfully decoded and subtracted from the received signal, each receiver fully decodes its intended unicast message by treating the interference as noise. However, MU–LP is sensitive to the user channel orthogonality and strengths. Another method is to apply power-domain Nonorthogonal Multiple Access (NOMA) to decode the unicast This work is partially supported by the U.K. Engineering and Physical Sciences Research Council (EPSRC) under grant EP/N015312/1. messages at the cost of more layers of SICs. Power-domain NOMA relies on Superposition Coding (SC) at the transmitter and SIC at the receivers [6]. It is denoted in short as SC–SIC in this work. By using SC–SIC, some users are forced to fully decode and cancel interference created by other users. Such method is only suitable when the user channels are (semi-) aligned and exhibit a large disparity of strengths. In contrast to MU–LP and SC–SIC, linearly-precoded RateSplitting (RS) is an emerging multi-user multi-antenna transmission strategy where each unicast message is split into a common part and a private part at the transmitter [7]. The common part is required to be decoded by all the receivers and removed from the received signal using SIC before each receiver decodes its intended private part by treating the interference from other users as noise. RS can be viewed mathematically as a non-orthogonal unicast and multicast transmission strategy given the superimposed transmission of common and private messages. Hence, RS was termed joint multicasting and broadcasting in [8]. However, common message in RS has an objective different from that of a conventional multicast message. The multicast message is intended and decoded by all the users while the common message of RS is decoded by all users but is intended to a subset of users. Its presence enables the decoding of part of the multi-user interference and treating the remaining part of the interference as noise. In this work, motivated by the benefits of RS in multiantenna Broadcast Channels (BC) [7], [9], [10], we propose the use of RS in non-orthogonal unicast and multicast transmissions. To the best of our knowledge, this is the first work that applies RS to non-orthogonal unicast and multicast transmissions. In such a setup, we split the unicast messages into common and private parts and encode the common parts along with the multicast message into a super-common stream decoded by all users. A single layer of SIC in RS is then used for the dual purpose of separating the unicast and multicast streams as well as better managing the multi-user interference of the unicast streams. We design the precoders by formulating the WSR maximization problem of the unicast messages with a Quality of Service (QoS) requirement of the multicast message and a sum power constraint. The problem is transformed into an equivalent Weighted Minimum Mean Square Error (WMMSE) problem and solved using an Alternating Optimization (AO) algorithm. We demonstrate in the numerical results that the rate region of RS is always equal to or larger than that of MU– LP and SC–SIC. Importantly, this performance gain comes at no additional cost for the receivers since one layer of SIC is required to separate unicast and multicast streams in the conventional MU–LP strategy. In other words, RS makes a better use of the existing SIC architecture. The rest of the paper is organized as follows. In Section II, the existing MU–LP beamforming is overviewed. The proposed RS beamforming and the optimization framework are respectively specified in Section III and Section IV. Section V illustrates numerical results and Section VI concludes the paper. Notations: C and E{·} respectively refer to the complex space and the statistical expectation. The boldface uppercase and lowercase letters represent matrices and vectors, respectively. k·k is the Euclidean norm. The superscripts (·)T and (·)H correspond to transpose and conjugate-transpose operators. tr(·) and diag(·) are the trace and diagonal entries. II. E XISTING MU–LP B EAMFORMING In this work, we consider a BS equipped with Nt antennas serving K single-antenna users. The users are indexed by the set K = {1, . . . , K}. In each time frame, the BS wants to transmit a multicast message W0 intended for all users and K unicast messages W1 , . . . , WK intended for different users. The messages W0 , W1 , . . . , WK are independently encoded into data streams s0 , s1 , . . . , sK . The stream vector s = [s0 , s1 , . . . , sK ]T is precoded using the precoder P = [p0 , p1 , . . . , pK ], where p0 ∈ CNt ×1 and pk ∈ CNt ×1 are the respective precoders of the multicast stream s0 and the unicast stream sk , ∀k ∈ K. Assuming that E{ssH } = I, the transmit power is constrained by tr(PPH ) ≤ Pt . The resulting transmit signal x ∈ CNt ×1 is given by X x = Ps = p0 s0 + pk s k . (1) k∈K The signal received at user-k is yk = hH k x + nk , where hk ∈ CNt ×1 is the channel between the BS and user-k. nk ∼ 2 CN (0, σn,k ) is the Additive White Gaussian Noise (AWGN) at user-k. Without loss of generality, we assume the noise variances are equal to one. The transmit SNR is equal to the total power consumption Pt . We assume perfect Channel State Information at the Transmitter (CSIT) and perfect Channel State Information at the Receivers (CSIR). At user sides, each user first decodes the multicast stream by treating the signal of all the unicast streams as interference. The Signal-to-Interference-plus-Noise Ratio (SINR) of the multicast 2 2 P H + 1). stream at user-k is γk,0 = hH k p0 /( j∈K hk pj Once s0 is successfully decoded, its contribution to the original received signal yk is subtracted. After that, user-k decodes its unicast stream sk by treating the unicast streams of other users as noise. The SINR of decoding the unicast stream sk 2 2 P H at user-k is γk = hH + 1). The k pk /( j∈K,j6=k hk pj corresponding achievable rates of s0 and sk at user-k are Rk,0 = log2 (1 + γk,0 ) and Rk = log2 (1 + γk ) . (2) To ensure that s0 is successfully decoded by all users, the achievable rate of s0 shall not exceed R0 = min {R1,0 , . . . , RK,0 } . (3) In this work, we maximize the WSR of the unicast messages while the rate constraint of the multicast message and the power constraint of the BS should be met. For a given weight vector u = [u1 , . . . , uK ], the WSR achieved by the unicast messages Fig. 1: K-user RS assisted multi-antenna non-orthogonal unicast and multicast transmission model in the K-user MU–LP assisted multi-antenna non-orthogonal unicast and multicast is X uk Rk (4a) RMU−LP (u) = max P k∈K s.t. Rk,0 ≥ R0th , ∀k ∈ K (4b) H (4c) tr(PP ) ≤ Pt where R0th is the lower bound on the multicast rate. III. P ROPOSED R ATE - SPLITTING B EAMFORMING In this section, we introduce the use of RS to the system. We highlight the difference between the proposed RS beamforming and the existing MU–LP beamforming. The contents that are not specified remain consistent with Section II. The main difference between MU–LP and RS beamforming lies in the generation of the data streams. Different from MU– LP beamforming where the messages are directly encoded into independent streams, the unicast message Wk intended for user-k is split into a common part Wk,c and a private part Wk,p , ∀k ∈ K. The common parts of the unicast messages W1,c , . . . , WK,c are encoded along with the multicast message W0 into a super-common stream s0 . It is required to be decoded by all users. Note that s0 includes not only the whole multicast message, but parts of the unicast messages intended for different users. The private parts of the unicast streams W1,p , . . . , WK,p are independently encoded into the private streams s1 , . . . , sK . The stream vector s = [s0 , s1 , . . . , sK ]T are linear precoded via the precoder matrix P = [p0 , p1 , . . . , pK ] and broadcast to users. The system model is illustrated in Fig. 1. At user sides, the super-common stream and private streams are decoded using SIC as in MU–LP. The achievable rate of the super-common stream Rk,0 and the private stream Rk , ∀k ∈ K are calculated based on equation (2). To ensure that the supercommon stream s0 is successfully decoded by all users, the achievable super-common rate R0 is calculated by equation (3). R0 is shared by the rate of transmitting the multicast message W0 and the rates of transmitting the common parts of the unicast messages of all users, W1,c , . . . , WK,c . Denote C0 as the portion of R0 transmitting W0 and Ck,0 as the user-k’s portion of R0 transmitting Wk,c , the achievable super-common rate is equal to X C0 + Ck,0 = R0 (5) k∈K Following the RS structure described above, the total achievable rate of the unicast message of user-k is Rk,tot = Ck,0 + Rk . For a given weight vector u, the WSR achieved by the private messages in the K-user RS assisted multi-antenna nonorthogonal unicast and multicast is RRS (u) = max P,c s.t. C0 + X uk Rk,tot (6a) k∈K X Ck,0 ≤ Rk,0 , ∀k ∈ K (6b) k∈K C0 ≥ R0th (6c) Ck,0 ≥ 0, ∀k ∈ K (6d) tr(PPH ) ≤ Pt (6e) where c = [C0 , C1,0 , . . . , CK,0 ] is the common rate vector. We note that problem (6) boils down to problem (4) when no power is allocated to the common messages W1,c , . . . , WK,c . Hence, RS always achieves the same or superior performance to MU–LP. In the unicast-only transmission, RS requires one layer of SIC to decode the common parts of the unicast messages for the purpose of enabling the capability of decoding part of the multi-user interference and treating part of the multiuser interference as noise [7], [9], [10]. In comparison, MU– LP does not require any SIC at each receiver in the unicastonly transmission. However, one-layer of SIC is necessary at each user to decode the multicast stream before decoding the intended unicast stream in the MU–LP assisted joint unicast and multicast transmission and RS still requires one layer of SIC at no extra cost for the receivers. The SIC of RS in the joint unicast and multicast transmission is used for separating the unicast and multicast streams as well as better managing the multi-user interference between the unicast streams. to γk,0 = 1/εMMSE − 1 and γk = 1/εMMSE − 1 based on k,0 k (9). The rates become Rk,0 = − log2 (εMMSE k,0 ) and Rk = − log2 (εMMSE ). The WMSEs are given by k ξk,0 = uk,0 εk,0 − log2 (uk,0 ), ξk = uk εk − log2 (uk ), where uk,0 and uk are weights associated with the MSEs of ∗ MMSE and gk∗ = gkMMSE user-k. The optimum equalizers gk,0 = gk,0 ∂ξk,0 ∂ξk are then derived by solving ∂gk,0 = 0 and ∂g = 0. k MMSE Substituting gk,0 and gkMMSE into (10), we have  MMSE = uk,0 εMMSE − log2 (uk,0 ), ξk,0 gk,0 k,0  (11) MMSE MMSE ξk gk = u k εk − log2 (uk ). The optimum MMSE weights are obtained by solving MMSE MMSE ∂ξk (gk ∂ξk,0 (gk,0 ) ) = 0 and = 0, which are given by ∂uk,0 ∂uk −1 u∗k,0 = uMMSE , (εMMSE , u∗k = uMMSE , (εMMSE )−1 (12) k,0 k,0 ) k k The Rate-WMMSE relationships are finally established by substituting (12) into (11). They are given by MMSE , ξk,0 (7) εk = |gk |2 Tk − 2ℜ{gk hH k pk } + 1, P H 2 2 where Tk,0 , |hH k p0 | + j∈K |hk pj | + 1 and Tk , Tk,0 − 2 H |hk p0 | . The optimum MMSE equalizers are then calculated ∂ε ∂εk by solving ∂gk,0 = 0 and ∂g = 0, which are given by k,0 k −1 −1 MMSE MMSE gk,0 = pH = pH 0 hk Tk,0 , gk k hk T k . (8) Substituting (8) into (7), the MMSEs are −1 εMMSE , min εk,0 = Tk,0 Ik,0 , εMMSE , min εk = Tk−1 Ik , k,0 k gk,0 gk (9) 2 where Ik,0 = Tk and Ik = Tk − |hH p | . The SINRs of k k decoding s0 and sk at user-k can be respectively transformed (13) uk ,gk Based on the Rate-WMMSE relationships in (13), the optimization problem (6) is transformed equivalently into the WMMSE problem given by X min uk ξk,tot (14a) P,x,u,g εk,0 = |gk,0 |2 Tk,0 − 2ℜ{gk,0 hH k p0 } + 1, min ξk,0 = 1 − Rk,0 , uk,0 ,gk,0 ξkMMSE , min ξk = 1 − Rk . IV. O PTIMIZATION F RAMEWORK The WMMSE algorithm to solve the sum rate maximization problem in RS without a multicast message is proposed in [9]. It is extended to solve the problem (4) and (6). We firstly explain the procedure to solve the RS problem (6) and then specify how (4) can be solved correspondingly. User-k decodes s0 and sk sequentially using SICs. The common stream s0 is decoded first. By using the equalizer gk,0 , s0 is estimated as ŝ0 = gk,0 yk . sk is estimated using the equalizer gk as ŝk = gk (yk − hH k p0 s0 ) after s0 is successfully decoded and removed from yk . The Mean Square Errors (MSEs) of the common and private streams are defined as εk,0 , E{|ŝk,0 − sk,0 |2 } and εk , E{|ŝk − sk |2 }, respectively. They are given by (10) s.t. X0 + k∈K X Xk,0 + 1 ≥ ξk,0 , ∀k ∈ K (14b) k∈K X0 ≤ −R0th (14c) Xk,0 ≤ 0, ∀k ∈ K (14d) H tr(PP ) ≤ Pt (14e) where x = [X0 , X1,0 , . . . , XK,0 ] is the transformation of the common rate c. u = [u1,0 , . . . , uK,0 , u1 , . . . , uK ] and g = [g1,0 , . . . , gK,0 , g1 , . . . , gK ] are the weights and equalizers, respectively. ξk,tot = Xk,0 + ξk , ∀k ∈ K. Denote uMMSE and gMMSE as two vectors formed by the corresponding MMSE equalizers and weights. According to the KKT conditions of problem (14), it is easy to show that (uMMSE , gMMSE ) are optimal and unique. We can obtain (uMMSE , gMMSE ) by minimizing (14a) with respect to u and g, respectively. Problem (14) can be transformed to problem (6) based on the Rate-WMMSE relationship (13) and the common rate transformation c = −x. The solution given by (c∗ = −x∗ , P∗ ) meets the KKT optimality conditions of (6) for any point (x∗ , P∗ , u∗ , g∗ ) satisfying the KKT optimality conditions of (14). Therefore, problem (6) and problem (14) are equivalent. The joint optimization of (x, P, u, g) in problem (14) is nonconvex. With fixed (x, P, u), the MMSE equalizer gMMSE is optimal. With fixed (x, P, g), the MMSE weight uMMSE is the optimal weight. With fixed (u, g), the optimization problem (14) is a convex Quadratically Constrained Quadratic Program (QCQP) which can be solved using interior-point methods. 1 2 3 4 5 6 7 Initialize: n ← 0, P[n] , WSR[n] ; repeat n ← n + 1; P[n−1] ← P; u ← uMMSE (Pn−1 ); g ← gMMSE (Pn−1 ); update (x, P) by solving (14) using the updated u, g; until |WSR[n] − WSR[n−1] | ≤ ǫ; V. N UMERICAL R ESULTS In this section, the performance of the proposed RS beamforming is illustrated by comparing with the existing MU–LP and SC–SIC beamforming. We focus on the two-user case since different two-user rate regions are easily compared in a twodimensional figure. The SC–SIC assisted joint unicast and multicast transmission is briefed before we illustrate the results. Different from RS where the multicast message is encoded with the common parts of the unicast messages, the multicast message in SC–SIC is encoded along with the unicast message to be decoded first into a super-common stream s0 . Hence, the super-common rate R0 of SC–SIC is shared by the rate of the multicast message as well as the rate of the unicast message to be decoded first. Following the system model of RS in Section III and the difference between SC–SIC and RS, we can formulate the problem of SC–SIC and solve it by modifying the optimization framework. Note that the receiver complexity of SC–SIC increases with the number of users. More layers of SICs are required at each user to decode the interference from more users. Moreover, SC– SIC is a particular instance of the proposed RS strategy when K = 2 [10]. RS should always achieve the same or superior performance to MU–LP and SC–SIC. We investigate the influence of the multicast rate constraint, channel strength disparity and channel angle between the users on the performance. The BS is equipped with four antennas (Nt = 4) serving two single-antenna users (K = 2). The simulation setting follows the underloaded two-user deployment in [10]. The channels of users are realized as h1 = (b) θ=2π/9 10 10 8 8 R2,tot (bit/s/Hz) R2,tot (bit/s/Hz) (a) θ=π/9 6 4 2 6 4 2 0 0 0 5 10 0 R1,tot (bit/s/Hz) 10 (d) θ=4π/9 10 8 8 R2,tot (bit/s/Hz) 10 6 4 RS SC-SIC MU-LP 2 5 R1,tot (bit/s/Hz) (c) θ=π/3 R2,tot (bit/s/Hz) Hence, the AO algorithm is motivated to solve the problem. In the nth iteration, the equalizers and weights are  calculated by (u, g) = uMMSE (P[n−1] ), gMMSE (P[n−1] ) based on the precoder P[n−1] in the (n − 1)th iteration. (x, P) are then calculated by solving problem (14). (u, g) and (x, P) are iteratively updated until the convergence of the WSR. Algorithm 1 shows the steps of AO, where ǫ is the error tolerance for convergence and WSR[n] is the WSR calculated based on the updated (x, P) in nth iteration. Since WSR[n] is increasing with n and it is bounded above for a given power constraint, the AO algorithm is guaranteed to converge. Note that the global optimality of the solution cannot be guaranteed in general as the problem is non-convex. The initialization of the precoder P will influence the final results. The optimization framework described above are adopted to solve the MU–LP problem (4) by reformulating it into its equivalent WMMSE problem and using the AO algorithm to solve it. Algorithm 1: Alternating Optimization Algorithm 6 4 2 0 0 0 5 R1,tot (bit/s/Hz) 10 0 5 10 R1,tot (bit/s/Hz) Fig. 2: Achievable rate region comparison of different strategies in perfect CSIT, γ = 1, R0th = 0.5 bit/s/Hz  H H [1, 1, 1, 1] , h2 = γ × 1, ejθ , ej2θ , ej3θ . In the following results, γ = 1 and γ = 0.3, which respectively represent equal channel strength and 5 dB channel strength  difference. For each π 4π γ, we consider four different θ, θ ∈ π9 , 2π , , 9 3 9 . When θ is less than π9 , the user channels are sufficiently aligned. When θ is larger than 4π 9 , the user channels are sufficiently orthogonal. The rate region is the set of all achievable points. Its boundary is calculated by varying the weights assigned to users. We follow the weights in [11], where the weight of user-1 is fixed to u1 = 1 for each weight of user-2 in u2 ∈ 10[−3,−1,−0.95,··· ,0.95,1,3] . The precoders of RS, MU– LP and SC–SIC are initialized using the same methods as discussed in [10]. SNR is fixed to 20 dB. Fig. 2 shows the results when user-1 and user-2 have equal channel strengths (γ = 1) and the multicast rate constraint is R0th = 0.5 bit/s/Hz. In each subfigure, the rate region achieved by RS is confirmed to be equal to or larger than that of SC–SIC and MU–LP. RS performs well for any angle between the user channels. As the SC–SIC strategy is motivated by leveraging the channel strength difference of users, it is sensitive to the channel strength disparity. When users have equal channel strengths, SC–SIC has poor performance. RS exhibits a clear rate region improvement over SC–SIC and MU–LP when θ = π9 . The performance of MU–LP is poor when the user channels are closely aligned to each other. MU– LP is sensitive to the channel angle. As θ increases, the gap between the rate regions of RS and MU–LP decreases. When θ = 4π 9 , RS reduces to MU–LP. Fig. 3 shows the results when γ = 1, R0th = 1.5 bit/s/Hz. Comparing the corresponding subfigures of Fig. 2 and Fig. 3, the rate regions of all the strategies increase as the rate threshold of the multicast message decreases. Moreover, the rate region gain of RS over MU–LP and SC–SIC increases as the rate threshold of the multicast message decreases. This is due to the fact the super-common stream can absorb a larger portion of the unicast messages as the rate of the multicast message decreases. RS is able to overcome the limitations of MU–LP and SC–SIC by dynamically determining the level of the multi-user interference to decode and treat as noise. When (b) θ=2π/9 10 8 8 R2,tot (bit/s/Hz) R2,tot (bit/s/Hz) (a) θ=π/9 10 6 4 2 6 4 2 0 0 0 5 10 0 R1,tot (bit/s/Hz) (c) θ=π/3 10 (d) θ=4π/9 10 10 RS SC-SIC MU-LP 8 R2,tot (bit/s/Hz) R2,tot (bit/s/Hz) 5 R1,tot (bit/s/Hz) 6 4 2 8 6 4 2 0 0 0 5 10 0 R1,tot (bit/s/Hz) 5 10 R1,tot (bit/s/Hz) Fig. 3: Achievable rate region comparison of different strategies in perfect CSIT, γ = 1, R0th = 1.5 bit/s/Hz (b) θ=2π/9 6 5 5 R2,tot (bit/s/Hz) R2,tot (bit/s/Hz) (a) θ=π/9 6 4 3 2 1 4 3 2 1 0 0 0 5 10 0 R1,tot (bit/s/Hz) 10 R1,tot (bit/s/Hz) (c) θ=π/3 R EFERENCES (d) θ=4π/9 6 6 5 R2,tot (bit/s/Hz) 5 R2,tot (bit/s/Hz) 5 4 3 2 RS SC-SIC MU-LP 1 4 3 2 1 0 0 0 5 R1,tot (bit/s/Hz) VI. C ONCLUSIONS To conclude, we exploit the benefit of the linearly-precoded RS in the joint unicast and multicast transmission systems. Comparing with the conventional MU–LP assisted unicast and multicast transmission system where one layer of SIC is required at each receiver to remove the multicast stream before decoding the unicast stream, the proposed RS-assisted unicast and multicast transmission system further exploits the merits of the existing one layer of SIC. By utilizing a super-common stream to encapsulate the multicast message and parts of the unicast messages, RS uses one layer of SIC to not only separate the unicast and multicast streams but also dynamically manage the multi-user interference. We show in the numerical results that the performance of MU–LP and SC–SIC is more sensitive to the channel strength disparity and channel angles among users. Thanks to its ability of partially decoding the interference and partially treating the interference as noise, RS softly bridges and outperforms MU–LP and SC–SIC in any user deployments. Moreover, the performance gain of RS increases as the rate threshold of the multicast message decreases. The benefit of RS is obtained without any increase in the receiver complexity compared with MU–LP. Therefore, RS is a more powerful transmission scheme for downlink multi-antenna nonorthogonal unicast and multicast transmission systems. 10 0 5 10 R1,tot (bit/s/Hz) Fig. 4: Achievable rate region comparison of different strategies in perfect CSIT, γ = 0.3, R0th = 0.5 bit/s/Hz the rate threshold of the multicast message decreases, more power is allocated to the unicast stream. RS exhibits further benefits of dynamic interference management. Fig. 4 shows the results when γ = 0.3, R0th = 0.5 bit/s/Hz. Comparing with the corresponding subfigures of Fig. 2, the rate region of SC–SIC is closer to that of RS when there is a 5 dB channel strength difference. However, the rate region gap between RS and SC–SIC increases with θ despite the 5 dB channel strength difference. Comparing with RS, SC–SIC is more sensitive to the angle between the user channels. In Fig. 4(b), SC–SIC and MU–LP outperform each other at one part of the rate region and the rate region of RS is larger than the convex hull of the rate regions of SC–SIC and MU–LP. We can easily draw the conclusion from Fig. 4(b) that RS softly bridges and outperforms MU–LP and SC–SIC. Comparing with MU–LP and SC–SIC, RS is more robust to a wide range of channel gain difference and channel angles among users. RS always outperforms MU–LP and SC–SIC. This performance gain comes at no additional cost for the receivers since one layer of SIC is required to separate unicast and multicast streams in the conventional MU–LP strategy. [1] J. Zhao, O. Simeone, D. Gunduz, and D. Gomez-Barquero, “Nonorthogonal unicast and broadcast transmission via joint beamforming and LDM in cellular networks,” in 2016 IEEE Global Communications Conference (GLOBECOM), Dec 2016, pp. 1–6. [2] Y. F. Liu, C. Lu, M. Tao, and J. Wu, “Joint multicast and unicast beamforming for the MISO downlink interference channel,” in 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), July 2017, pp. 1–5. [3] E. Chen, M. Tao, and Y.-F. Liu, “Joint base station clustering and beamforming for non-orthogonal multicast and unicast transmission with backhaul constraints,” arXiv preprint arXiv:1712.01508, 2017. [4] O. Tervo, L.-N. Tran, S. Chatzinotas, M. Juntti, and B. Ottersten, “Energy-efficient joint unicast and multicast beamforming with multiantenna user terminals,” arXiv preprint arXiv:1705.03723, 2017. [5] L. Zhang, W. Li, Y. Wu, X. Wang, S. I. Park, H. M. Kim, J. Y. Lee, P. Angueira, and J. Montalban, “Layered-division-multiplexing: Theory and practice,” IEEE Transactions on Broadcasting, vol. 62, no. 1, pp. 216–232, March 2016. [6] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future radio access,” in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), June 2013, pp. 1–5. [7] B. Clerckx, H. Joudeh, C. Hao, M. Dai, and B. Rassouli, “Rate splitting for MIMO wireless networks: A promising PHY-layer strategy for LTE evolution,” IEEE Communications Magazine, vol. 54, no. 5, pp. 98–105, May 2016. [8] H. Joudeh and B. Clerckx, “Sum rate maximization for MU-MISO with partial CSIT using joint multicasting and broadcasting,” in 2015 IEEE International Conference on Communications (ICC), June 2015, pp. 4733–4738. [9] ——, “Sum-rate maximization for linearly precoded downlink multiuser MISO systems with partial CSIT: A rate-splitting approach,” IEEE Transactions on Communications, vol. 64, no. 11, pp. 4847–4861, Nov 2016. [10] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting multiple access for downlink communication systems: Bridging, generalizing and outperforming SDMA and NOMA,” arXiv preprint arXiv:1710.11018v3, 2017. [11] S. S. Christensen, R. Agarwal, E. D. Carvalho, and J. M. Cioffi, “Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design,” IEEE Transactions on Wireless Communications, vol. 7, no. 12, pp. 4792–4799, Dec 2008.
7
On a measurable analogue of small topological full groups François Le Maître arXiv:1608.07399v1 [math.DS] 26 Aug 2016 August 29, 2016 Abstract We initiate the study of a measurable analogue of small topological full groups that we call L1 full groups. These groups are endowed with a Polish group topology which admits a natural complete right invariant metric. We mostly focus on L1 full groups of measure-preserving Z-actions which are actually a complete invariant of flip conjugacy. We prove that for ergodic actions the closure of the derived group is topologically simple although it can fail to be simple. We also show that the closure of the derived group is connected, and that for measure-preserving free actions of non-amenable groups the closure of the derived group and the L1 full group itself are never amenable. In the case of a measure-preserving ergodic Z-action, the closure of the derived group is shown to be the kernel of the index map. If such an action is moreover by homeomorphism on the Cantor space, we show that the topological full group is dense in the L1 full group. Using Juschenko-Monod and Matui’s results on topological full groups, we conclude that L1 full groups of ergodic Z-actions are amenable as topological groups, and that they are topologically finitely generated if and only if the Z-action has finite entropy. Contents 1 Introduction 1.1 L1 full groups of measure-preserving transformations . . . . . . . . . 1.2 Some topological properties of L1 full groups . . . . . . . . . . . . . . 1.3 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2 4 7 2 Preliminaries 8 2.1 Basic ergodic theory . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2 Graphings, equivalence relations and full groups . . . . . . . . . . . . 10 2.3 Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3 L1 full groups of graphings 14 3.1 Definition and first properties . . . . . . . . . . . . . . . . . . . . . . 14 3.2 The closure of the derived group is topologically generated by involutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 1 3.3 3.4 3.5 Dye’s reconstruction theorem . . . . . . . . . . . . . . . . . . . . . . 22 Closed normal subgroups of the closure of the derived group . . . . . 23 Link with topological full groups . . . . . . . . . . . . . . . . . . . . . 27 4 L1 full groups of Z-actions 4.1 The index map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 A characterization of supports of n-cycles . . . . . . . . . . . . . . . 4.3 The L1 full group is generated by induced transformations along with periodic transformations . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Escape time and non-simplicity results . . . . . . . . . . . . . . . . 4.5 Density of topological full groups, amenability and finiteness of the topological rank . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Further remarks and questions 5.1 Non-amenability . . . . . . . . . . . 5.2 Absence of a natural closure property 5.3 Lp full groups . . . . . . . . . . . . . 5.4 Questions . . . . . . . . . . . . . . . 1 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 . 30 . 32 . 33 . 36 . 39 . . . . 41 41 41 43 44 Introduction L1 full groups of measure-preserving transformations The study of (invertible) measure preserving transformations on standard probability spaces has a long and rich history stemming from its connections with various fields such as statistical mechanics, information theory, Riemannian geometry or number theory. Over the years, various invariants have been introduced in order to classify such transformations, although a result of Foreman, Rudolph and Weiss shows that such a classification cannot “reasonably” be obtained for all measurepreserving transformations [FRW11]. The most well-behaved measure-preserving transformations are probably the compact ones, i.e. those which arise as translation by a topological generator in a compact abelian group (for instance, an irrational rotation is a compact transformation). Indeed, ergodic compact transformations are completely classified up to conjugacy by the countable subgroup of the circle S1 consisting of all the eigenvalues of the associated Koopman unitary (for an irrational rotation this is just the group generated by its angle). To be more precise, a theorem of Halmos and von Neumann states that two such transformations T and T 0 of a standard probability space (X, µ) are conjugate iff spec(T ) = spec(T 0 ) where spec(T ) is the group consisting of all the λ ∈ S1 such that there is a non-null f ∈ L2 (X, µ) satisfying f ◦ T = λf . So an ergodic compact transformation T is entirely described by the countable group spec(T ). The purpose of this paper is to initiate the study of a Polish group [T ]1 called the L1 full group which one can associate to a measure-preserving transformation T . Its main feature resembles that of the spectrum of compact transformations: two 2 ergodic measure-preserving transformations T and T 0 are flip-conjugate1 and if and only if [T ]1 is abstractly (or topologically) isomorphic to [T 0 ]1 . The idea for this group comes from full groups, which were defined by Dye as subgroups of the group Aut(X, µ) of measure-preserving transformations of a standard probability space (X, µ) satisfying a strong closure property. The most basic example of a full group is the full group of a measure-preserving invertible aperiodic transformation T , which consists in all the measure-preserving transformations U such that for almost all x ∈ X, there exists n ∈ Z such that U (x) = T n (x). This full group is denoted by [T ] and every U ∈ [T ] is then completely described by the cocycle map cU : X → Z defined by the equation U (x) = T cU (x) (x). Note that the full group [T ] only depends on the partition of the space into orbits induced by T : it is an invariant of orbit equivalence. A theorem of Dye states that all measure-preserving ergodic transformations are orbit equivalent [Dye59], thus making the associated full group a trivial conjugacy invariant for such transformations. To obtain an interesting invariant, we will place an integrability restriction on the cocycle maps. Definition 1.1. The L1 full group of an aperiodic measure-preserving invertible transformation T on a standard probability space (X, µ) is the group of all U ∈ [T ] such that Z |cU (x)| dµ(x) < +∞. X The L1 full group is endowed with a natural metric given by the L1 metric when viewing elements of [T ]1 as cocycle maps X → Z. Such a metric is actually complete, separable and right-invariant (see Proposition 3.4) so that L1 full groups are cli2 Polish groups. Theorem 1.2 (see Thm. 4.2). Let T and T 0 be two measure-preserving ergodic transformation of a standard probability space (X, µ). Then the following are equivalent: (1) T and T 0 are flip-conjugate; (2) the groups [T ]1 and [T 0 ]1 are abstractly isomorphic; (3) the groups [T ]1 and [T 0 ]1 are topologically isomorphic. There are two results behind this theorem: the first is a reconstruction result à la Dye which says that any isomorphisms between L1 full groups must be a conjugacy by a measure-preserving transformation. The second is Belinskaya’s theorem [Bel68, Cor. 3.7], which states that if two ergodic transformations share the same L1 full group, then they must be flip-conjugate. Two measure-preserving transformation T and T 0 are flip-conjugate if there is a measurepreserving transformation S such that T 0 = ST S −1 or T 0 = ST −1 S −1 . 2 A Polish group is cli if it admits a compatible left- (or equivalently right-) invariant metric 1 3 There are natural and well-studied analogues of full groups and L1 full groups in the context of Cantor dynamics. Given a homeomorphism T of the Cantor space C, its (topological) full group [T ]t is the group of all homeomorphisms U of the Cantor space such that for all x ∈ C there is n ∈ N such that U (x) = T n (x). This full group turns out to completely determine the partition of the Cantor space into orbits up to a homeomorphisms. Such partitions are entirely described up to homeomorphism in terms of the set of invariant measure: by a theorem of Giordano, Putnam and Skau [GPS95], two minimal homeomorphisms T and T 0 of the Cantor space are orbit equivalent if and only if there is a homeomorphism S such that S(MT ) = MT 0 where MT denotes the set of T -invariant Borel probability measures. As in the measurable case, an element of the topological full group of an aperiodic homeomorphism T is completely described by the associated cocycle map cU : C → Z defined by U (x) = T cU (x) (x). The analogue of L1 full groups is sometimes called the small topological full group and is also defined by putting a restriction on cocycles. Namely, given a homeomorphism T of the Cantor space C, its small (topological) full group [T ]c is the group of homeomorphisms U of the Cantor space whose cocycle map cU is actually continuous. A result of Giordano-Putnam-Skau in complete analogy with Theorem 1.2 states that when T is minimal, the flip conjugacy class of T is completely determined by its small topological full group [T ]c (see [GPS99]). In the end, L1 full groups can be seen as the missing piece in the following picture. Topological setup Measurable setup Orbit equivalence [T ]t = {U ∈ Homeo(C) : ∀x, U (x) = T cU (x) } [T ] = {U ∈ Aut(X, µ) : ∀x, U (x) = T cU (x) } Flip conjugacy [T ]c = {U ∈ [T ]t : cU is continuous} [T ]1 = {U ∈ [T ] : cU is integrable} 1.2 Some topological properties of L1 full groups Theorem 1.2 implies that every ergodic theoretic property of a measure-preserving transformation T should be reflected algebraically in the group [T ]1 . However since the latter is an uncountable group, it is quite hard to find a purely group-theoretic property allowing us to distinguish two L1 full groups. But as we already pointed out, we also have at our disposal a Polish group topology, which provides richer tools to study [T ]1 . Before we present our results, let us mention a fundamental tool for the study of L1 full groups and topological full groups. Given an aperiodic measure-preserving transformation, one defines the index 4 map I : [T ]1 → R by putting Z cU (x)dµ(x). I(U ) = X If T is a minimal homeomorphism, we define the index map the same way picking an invariant measure µ so as to view T as a measure-preserving transformation. The resulting index map can be shown not to depend on the chosen invariant measure [GPS99]. We can now give various descriptions of the closure of the derived group of the 1 L full group of an ergodic measure-preserving transformation. Theorem 1.3 (see Cor. 4.20). Let T ∈ Aut(X, µ) be ergodic. Then D([T ]1 ) is equal to the following four groups: • the kernel of the index map, • the connected component of the identity, • the group generated by periodic elements and • the group topologically generated by involutions. Since the index map actually takes values into Z we conclude from the first item of the above theorem that the (topological) abelianization of the L1 full group of an ergodic transformation is always equal to Z. In the context of topological full groups of minimal homeomorphisms, it is also true that the index map takes values into Z, but its kernel is often much larger than the derived group. Nevertheless, Matui succesfully computed the abelianization of [T ]c in K-theoretic terms and gave examples where this abelianisation is not even finitely generated (see [Mat06]). So the situation for L1 full groups is much simpler with respect to the (topological) abelianization. An important feature of the derived group of the topological full group of a minimal homeomorphism is that it is a simple group. The following result is a natural analogue. Theorem 1.4. Let T be a measure-preserving transformation. Then T is ergodic if and only if D([T ]1 ) is topologically simple. This result is actually true in a greater generality for L1 full groups of graphings as defined by Levitt [Lev95], see section 3.4. We also prove that D([T ]1 ) is never simple using the fact that there are many Borel sets whose escape time is not integrable (see section 4.4). Let us now seek finer invariants. The topological rank of a separable topological group is the minimal number of elements needed to generate a dense subgroup. The main result of this paper is that the topological rank of the L1 full group of an ergodic measure-preserving transformation T is related to the entropy of T . Theorem 1.5. Let T ∈ Aut(X, µ) be ergodic. Then the following are equivalent 5 (1) the L1 full group [T ]1 is topologically finitely generated; (2) the closed subgroup D([T ])1 is topologically finitely generated; (3) the transformation T has finite entropy. A crucial tool in the previous theorem is Matui’s characterization of finitegeneratedness of topological full groups [Mat06, Thm. 5.4]. He proved that the derived group of the topological full group of a minimal homeomorphism T is finitely generated if and only if T is a subshift. He also characterised finite-generatedness of the whole topological full group of T in terms of a strictly more restrictive condition. In our context the situation is again simpler: Theorem 1.5 shows that for an ergodic measure-preserving transformation T , the L1 full group of T is topologically finitely generated if and only if the closure of its derived group is. In order to use Matui’s aforementioned results so as to prove Theorem 1.5, we establish the following important connection between L1 full groups and topological full groups. Theorem 1.6 (see Thm. 4.28). Let T be a minimal homeomorphism of the Cantor space and let µ be an invariant measure. Then D([T ]c ) is dense in D([T ]1 ) and [T ]c is dense in [T ]1 . Our proof of Theorem 1.5 also relies on a deep theorem of Krieger which characterizes finite entropy transformations as those which can be realised as uniquely ergodic minimal subshifts [Kri72]. It would be nice to have a purely ergodic-theoretic proof of Theorem 1.5. Theorem 1.6 has another interesting consequence. Recall that a topological group is amenable if whenever it acts continuously on a compact space, the action admits an invariant Borel probability measure. Juschenko and Monod have proven that the topological full group of any minimal homeomorphism of the Cantor space is amenable [JM13]. Using the Jewett-Krieger theorem we obtained the following result. Theorem 1.7. Let T be an ergodic measure-preserving transformation. Then the L1 full group of T is amenable. Note that since [T ]1 surjects onto Z via the index map, it is not extremely amenable. However it would be intersting to understand wether the kernel of the index map is extremely amenable. Let us now end extend these kind of questions to the setup of measure-preserving actions of finitely generated groups. Definition 1.8. Let Γ be a finitely generated group acting in a measure-preserving manner on a standard probability space (X, µ). The full group of this action is denoted by [Γ] and defined by [Γ] = {T ∈ Aut(X, µ) : ∀x ∈ X, T (x) ∈ Γ · x}. Let S be a finite generating set for Γ. Then every Γ-orbit is naturally equipped with a Schreier graph metric dS , and we let the L1 full group of the Γ-action be the group [Γ]1 of all T ∈ [Γ] such that the map x 7→ dS (x, T (x)) is integrable. 6 The definition of this group does not depend on the choice of a finite generating set, and the L1 full group [Γ]1 has a natural Polish group topology. The following result is a counterpart to Theorem 1.7. Theorem 1.9 (see Thm. 5.1). Let Γ be a finitely generated non amenable group acting freely in a measure-preserving manner on (X, µ). Then neither [Γ]1 nor D([Γ]1 ) are amenable. It would be interesting to understand which amenable finitely generated groups admit measure-preserving free actions with an amenable L1 full group. It is also natural to seek for generalizations of our results relating topological rank and entropy in this context. Finally, we should stress out that L1 full groups are not invariants of L1 orbit equivalence but only of L∞ orbit equivalence (see Corollary 5.3). I do not know wether they are complete invariants of L∞ orbit equivalence: if [Γ]1 = [Λ]1 , does it follow that Γ and Λ are L∞ orbit equivalent? 1.3 Outline This paper is organised as follows. Section 2 begins with some general facts from ergodic theory. We then recall the definition of graphings, which provide a natural setup for L1 full groups. The section ends with a few basic facts from entropy theory. In section 3 we give the definition of the L1 full group of a graphing and establish some basic properties such as stability under taking induced transformations. We show that the closure of their derived group is topologically generated by involutions and hence connected. We then establish that L1 full groups of ergodic graphings satisfy a reconstruction theorem: any isomorphism between them arises as the conjugacy by a measure preserving transformation. We also use involutions to prove that the only closed normal subgroups of the closure of their derived group are the obvious ones when the graphing is aperiodic (Theorem 3.23). From this we conclude that the graphing is ergodic if and only if the closure of the derived group of its L1 full group is topologically simple. Finally, we relate topological full groups to L1 full groups in terms of density. Section 4 contains the main results on L1 full groups of Z-actions. We first prove Theorem 1.2 and then continue by defining the index map and studying its behaviour with respect to induced transformations. We then study involutions more closely by characterizing the Borel sets which arise as supports of involutions (and more generally those which arise as supports of n-cycles). After that, we show that the L1 full group of T ∈ Aut(X, µ) is generated by transformation induced by T along with periodic transformations, using the work of Belinskaya. We then show that D([T ]1 ) is never simple. Finally, we prove Theorem 1.7 and Theorem 1.5, using the fact that the topological full group is dense in the L1 full group. In section 5 we first prove Theorem 1.9. We then show that L1 full groups are not stable under “L1 cutting and pasting”. After that we make a few observations about Lp full groups which are defined analogously and we conclude with some more questions. 7 2 2.1 Preliminaries Basic ergodic theory Let (X, µ) be a standard probability space, i.e. a standard Borel space equipped with a Borel non-atomic probability measure µ. All such spaces are isomorphic to the interval [0, 1] equipped with the Lebesgue measure, in particular they admit a Borel linear order. We will always work up to measure zero, e.g. for two Borel sets A and B if we write A ⊆ B we mean µ(B \ A) = 0. For us a partition of a Borel set A ⊆ X will be a countable family of disjoint Borel subsets of A whose reunion is equal to A up to measure zero. Note that some of these sets may have measure zero or even be empty. A Borel bijection T : X → X is called a measure-preserving transformation of (X, µ) if for all Borel A ⊆ X, one has µ(A) = µ(T −1 (A)). We denote by Aut(X, µ) the group of all measure-preserving transformations, two such transformations being identified if they coincide up to measure zero. An important fact to keep in mind is that every Borel bijection between full measure Borel subsets of X which is measurepreserving can be seen as an element of Aut(X, µ): there is a measure-preserving transformation T 0 of (X, µ) such that T (x) = T 0 (x) for almost all x ∈ X. Definition 2.1. A measure-preserving transformation T is ergodic if every Borel set which is a reunion of T -orbits has measure 0 or 1. It is aperiodic if all its orbits are infinite. A fundamental construction for us will be that of the induced transformation: given T ∈ Aut(X, µ) and A ⊆ X of positive measure, the Poincaré recurrence theorem ensures us that for almost all x ∈ A there are infinitely many n ∈ N∗ such that T n (x). We let nA,T (x) denote the smallest such n, also called the return time to A. When the transformation T we consider is clear from the context, we will denote the return time simply by nA . The transformation TA ∈ Aut(X, µ) induced by T on A by for all x ∈ X,  n T A,T (x) if x ∈ A TA (x) = x else. It can easily be checked that TA is indeed a measure-preserving transformation, and that moreover for all x ∈ A the TA -orbit of x is the intersection of the T -orbit of x with A. Also note that (TA )−1 = (T −1 )A The following lemma is a direct consequence of the fact that the orbits of the restriction of TA to A are precisely the intersections of the T -orbits with A. Lemma 2.2. Let S ∈ Aut(X, µ) be a measure-preserving transformation and A ⊆ X intersects every S-orbit, then S is aperiodic if and only if SA is aperiodic when restricted to A, and S is ergodic if and only if SA is ergodic when restricted to A. Definition 2.3. An element T ∈ Aut(X, µ) is periodic if all its orbits are finite. 8 If T is periodic, the Borel set of minimums of T -orbits (for a fixed Borel total order on X) intersects every T -orbit at exactly one point: it is a Borel fundamental domain for T . Such fundamental domains actually exist if and only if T is periodic. A nice way to build a new transformation from a periodic one is to compose it with a transformation supported on a fundamental domain. Lemma 2.4. Let T be a periodic measure-preserving transformation, and let A be a fundamental domain of T . Let U be a measure-preserving transformation supported on A. Then (U T )A = U = (T U )A . Proof. Let x ∈ A, let n ∈ N∗ be the least positive integer such that T n (x) = x. Since A is a fundamental domain for T , for all i ∈ {0, ..., n − 1} we have T i (x) 6∈ A. Since U (y) = y for all y 6∈ A, we deduce by induction that (U T )i (x) = T i (x) 6∈ A for all i ∈ {1, ..., n − 1}. In particular (U T )n−1 (x) = T n−1 (x) so (U T )n (x) = U T n (x) = U (x) ∈ A, which proves that (U T )A = U as desired. For the equality (T U )A = U , one can run a similar argument or apply the previously obtained equality to T −1 and U −1 to get (U −1 T −1 )A = U −1 , which by taking inverses yields (T U )A = U . Proposition 2.5. Let T be a periodic measure-preserving transformation, and let A be a fundamental domain of T . Let U be a measure-preserving transformation supported on A. Then the following equivalences hold: (1) The restriction of U to A is aperiodic ⇔ U T is aperiodic ⇔ T U is aperiodic. (2) T restriction of U to A is ergodic ⇔ U T is ergodic ⇔ T U is ergodic. Proof. It follows from the proof of Lemma 2.4 that A intersects every T U orbit and every U T orbit. The conclusion then follows from Lemmas 2.4 and 2.2. Let us observe that one can go the other way around in the above constructions: starting from an aperiodic transformation T and a Borel set A which intersects almost every T -orbit, the map TA−1 T is periodic with A as a Borel fundamental domain and same return time to A as T . This fact is the key idea for the following result of Belinskaya which we won’t use but which is an important step towards to the proof of her Theorem 4.1. Proposition 2.6 (Belinskaya, [Bel68, Thm. 3.6]). Let S and T be two measurepreserving transformations, let A be a Borel subset which intersects every S and every T -orbit. Suppose that SA = TA and that the return times of S and T to A are the same, i.e. nA,S = nA,T . Then S and T are conjugate. We will use the following well-known proposition several times. A proof is provided for completeness. Proposition 2.7. Let T ∈ Aut(X, µ). There is a partition (A1 , A2 , B1 , B2 , B3 ) of supp T such that T (A1 ) = A2 , T (B1 ) = B2 and T (B2 ) = B3 . 9 Proof. Since X is a standard Borel space, there is a countable partition (Xi )i∈N of supp T into Borel sets such that for all i ∈ N, T (Xi ) is disjoint from Xi (see for instance [EG14, Lem. 5.1]). We then define by recurrence an increasing family of sets (Yi )i∈N by letting Y0 = X0 and then for all i ∈ N Yi+1 = Yi t {x ∈ Xi+1 : T (x) 6∈ Yi and T −1 (x) 6∈ Yi }. S Let Y = n∈N Yn , then by construction Y and T (Y ) are disjoint. Moreover, we have supp T = T −1 (Y ) ∪ Y ∪ T (Y ). Indeed, if x ∈ supp T \ Y there is i ∈ N such that x ∈ Xi+1 , and since x 6∈ Yi+1 either T (x) ∈ Yi or T −1 (x) ∈ Yi so that in any case x ∈ T −1 (Y ) ∪ T (Y ). Since supp T is T -invariant, we conclude that supp T = Y ∪ T (Y ) ∪ T 2 (Y ). Now let A1 = {x ∈ Y : T 2 (x) ∈ Y } and B1 = {Y \ A1 }. Then since Y and T (Y ) are disjoint, the sets A1 , A2 := T (A1 ), B1 , B2 := T (B1 ) are disjoint. Let B3 := T 2 (B1 ). By the definition of B1 the set B3 is disjoint from Y . Moreover since T (B1 ) is disjoint from Y we also have T 2 (B1 ) disjoint from T (Y ) so that B3 is actually disjoint from Y t T (Y ). We conclude that A1 , A2 , B1 , B2 , B3 are as desired. Remark. Note that the proof does not use that T is measure-preserving and actually works in the purely Borel context. 2.2 Graphings, equivalence relations and full groups If (X, µ) is a standard probability space, and A, B are Borel subsets of X, a partial isomorphism of (X, µ) of domain A and range B is a Borel bijection f : A → B which is measure-preserving for the measures induced by µ on A and B respectively. We denote by dom f = A its domain, and by rng f = B its range. Given two partial isomorphisms ϕ1 : A → B and ϕ2 : C → D, we define their composition ϕ2 ◦ ϕ1 as the map ϕ−1 1 (B ∩ C) → ϕ2 (B ∩ C) given by ϕ2 ◦ ϕ1 (x) = ϕ1 ϕ2 (x). We also define the inverse ϕ−1 of a partial isomorphism ϕ : A → B by ϕ−1 : B → A and the equation ϕ−1 ◦ ϕ = idA . By definition a graphing is a countable set of partial isomorphisms. Every graphing Φ generates a measure-preserving equivalence relation RΦ , defined to be the smallest equivalence relation containing (x, ϕ(x)) for every ϕ ∈ Φ and x ∈ dom ϕ. Given a graphing Φ, a Φ-word is a composition of finitely many elements of Φ or their inverses. Obviously (x, y) ∈ RΦ iff and only if there exists a Φ-word w such that y = w(x). Given a Borel set A, its Φ-closure is the reunion of all w(A) where w is a Φ-word. Say that Φ is ergodic when the Φ-closure of any non-null Borel set A has full measure. The full group of a measure-preserving equivalence relation R is the group [R] of automorphisms of (X, µ) which induce permutations in the R-classes, that is [R] = {ϕ ∈ Aut(X, µ) : ∀x ∈ X, ϕ(x) R x}. It is a separable group when equipped with the complete metric du defined by du (T, U ) = µ({x ∈ X : T (x) 6= U (x)}. 10 The metric du is called the uniform metric and the topology it induces is called the uniform topology. One also defines the pseudo full group of R, denoted by [[R]], which consists of all partial isomorphisms ϕ such that ϕ(x) R x for all x ∈ dom ϕ. Given a measure-preserving equivalence relation R, we denote by MR the σalgebra of all Borel sets A such that T (A) = A for all T ∈ [R]. Consider the Hilbert space of R-invariant functions, i.e. the set of all f ∈ L2 (X, µ) such that for any T ∈ [R], one has f ◦ T = f a.e. We denote this closed Hilbert space by L2R (X, µ) and remark that it consists of all the MR -measurable elements of L2 (X, µ). By definition R is ergodic if L2R (X, µ) only consists of constant functions. A graphing Φ is ergodic if and only if RΦ is. The orthogonal projection ER from the Hilbert space L2 (X) onto the closed subspace L2R (X) satisfies the following equality, which defines it uniquely: for any f ∈ L2 (X, µ) and g ∈ L2R (X, µ), Z Z fg = ER (f )g. X X ER is called a conditional expectation. When A is a subset of X, its characteristic function is an element of L2 (X, µ), and we call ER (χA ) the R-conditional measure of A, denoted by µR (A) or µΦ (A) when R = RΦ . Often the equivalence relation R will be clear from the context and we will simply call µR (A) the conditional measure of A. Because ER is a contraction for the L∞ norm, µR (A) takes values in [0, 1]. For those who are familiar with the ergodic decomposition, µR (A) is just the function x 7→ µx (A) where (µx )x∈X is the ergodic decomposition of R. Given ϕ ∈ [[R]], we have µR (dom ϕ) = µR (rng ϕ). The following well-known result is a kind of converse (see [LM15, Sec. 2.1]). Proposition 2.8 (Dye). Let R be a measure-preserving equivalence relation. Then if two sets A and B have the same R-conditional measure, there exists ϕ ∈ [[R]] whose domain is A and whose range is B. Note that in the ergodic case, the previous proposition implies that any two sets of the same measure can be mapped to each other by an element of the pseudo full group of R. A measure-preserving equivalence relation is aperiodic if almost all its equivalence classes are infinite. The following proposition is well-known, see [LM15, Sec. 2.1] for a proof. Proposition 2.9 ([Dye59], Maharam’s lemma). A measure-preserving equivalence relation R is aperiodic iff for any A ⊆ X, and for any MR -measurable function f such that 0 6 f 6 µR (A), there exists B ⊆ A such that the R-conditional measure of B equals f . Corollary 2.10. Let R be an aperiodic measure-preserving equivalence relation, and let f : X → [0, 1] be an MR -measurable function. Let A be a subset of X such that for almost all x ∈ A, one has f (x) > 0. Then there is a countable partition (An )n∈N of A such that for all x ∈ X and all n ∈ N, µR (An )(x) 6 f (x). 11 Proof. The proof relies the following basic fact: there is a countable family of MR measurable positive functions fP n : X → [0, 1] such that for all x ∈ X, we have fn (x) 6 f (x) for all n ∈ N and n∈N fn (x) = µR (x). Indeed, if for all x ∈ X we let fn (x) = 0 if µR (A)(x) = 0 and else    f (x) j k if n < bµR (A)(x)c f (x) f (x) − g(x) if n = bµR (A)(x)c fn (x) =   0 else, it is easily checked that such functions satisfy the desired properties. We can now use the previous proposition to build by recurrence a sequence (An ) of disjoint subsets P of A such that for every n ∈P N, µR (An ) = fn F 6 f . Then µR (A) = n∈N µR (An ) hence by integrating µ(A) = n∈N µ(An ) = µ( n∈N An ) so that (An ) is a partition of A meeting all our requirements. Let us also record the following easy consequences of the previous results. Lemma 2.11. Let R be a measure-preserving equivalence relation. Then if two disjoint Borel sets A and B have the same R-conditional measure, there exists an involution U ∈ [R] whose support is equal to A t B such that U (A) = B. Proof. By Proposition 2.8 there exists ϕ ∈ [[R]] such that ϕ(A) = B. Then the involution U ∈ [RΦ ] defined by   ϕ(x) if x ∈ A ϕ−1 (x) if x ∈ B U (x) =  x else clearly works. Lemma 2.12. Let R be a measure-preserving aperiodic equivalence relation and let C be a Borel subset of X. Then there exists an involution U ∈ [R] such that supp U = C. Proof. By Maharam’s Lemma (Lemma 2.9), one can write C = AtB where µR (A) = µR (B) = µR (C)/2. The previous lemma can then readily be applied. Remark. In Section 4.2, we will characterise which sets arise as supports of involutions belonging to the L1 full group of T , where T is an ergodic transformation. 2.3 Entropy The entropy of a countable partition (Ai )I∈I of (X, µ) is the quantity X H((Ai )i∈I ) := − µ(Ai ) ln µ(Ai ) i∈I where we use the convention 0 ln 0 = 0. It represents the average amount of information we get when we choose an element x ∈ X at random and only learn in which piece Ai of the partition x is. The following statement was extracted from the more general Lemma 2.1 in [Aus16]. It shows that cocycle partitions coming from elements of L1 full groups of Z-actions have finite entropy. 12 Lemma 2.13. Let (An )n∈Z be a partition of X such that Then H((An )n∈Z ) < +∞. P n∈Z |n| µ(An ) < +∞. Proof. Some elementary calculus yields the inequality −t ln t 6 mt + e−m−1 for all t, m > 0. In particular for all n ∈ Z∗ we have −µ(An ) ln µ(An ) 6 |n| µ(An ) + e−|n|−1 . P Summing this P over n ∈ Z∗ and applying our hypothesis n∈Z∗ |n| µ(An ) < +∞, we obtain that − n∈Z∗ µ(An ) ln µ(An ) < +∞. So H((An )n∈N ) < +∞ as wanted. Remark. Austin’s result (Lemma 2.1 in [Aus16]) actually yields that whenever Γ is a finitely generated group, the cocycle partitions of elements of the L1 full group of any free Γ-action have finite entropy. Given two partitions (Ai ) and (Bj ) of X, we let (Ai ) ∨ (Bj ) be their join, i.e. the partition (Ai ∩ Bj ). We have the following natural inequality (for a proof see e.g. [Dow11, 1.6.10]). Lemma 2.14. Let (Ai ) and (Bj ) be two partitions of X. Then H((Ai ) ∨ (Bj )) 6 H((Ai )) + H((Bj )). Note that in particular, the join of finitely many partitions with finite entropy has finite entropy. Lemma 2.14 enables one to give the classical definition of the entropy of T ∈ Aut(X, µ). First, given a partition Q, we let ! n−1 _ 1 h(T, P) := lim H T i (P) , n→+∞ n i=0 where the limit exists by subadditivity of the sequence H( 2.14). The entropy of T is h(T ) = sup Wn−1 i=0 T i (P)) (cf. Lemma h(T, P). P partition A partition P is called generating if up to measure zero, the σ-algebra generated by the T -translates of P is equal to the Borel σ-algebra of X. A more convenient way to see this for us is in terms of the measure algebra of (X, µ). Recall that given a standard probability space (X, µ), its measure algebra is denoted by MAlg(X, µ) and consists of all Borel subsets of X, two such sets being identified if their symmetric difference has measure zero. It is naturally endowed with a metric dµ defined by dµ (A, B) = µ(A 4 B) which is complete and separable (see [Hal50, 40.A]). Then a partition P is generating if and only if the algebra generated by the T -translates of P is dense in MAlg(X, µ). 13 Kolmogorov-Sinai’s theorem states that whenever P is a generating partition of finite entropy, one has h(T ) = h(T, P) < +∞ Conversely, Krieger’s finite generator theorem states that every transformation of finite entropy admits a finite generating partition [Kri70] (moreover, there is such a partition whose cardinality k satisfies the inequality eh(T ) 6 k 6 eh(T ) + 1). Krieger then proved that every such transformation is actually conjugate to a minimal uniquely ergodic subshift [Kri72], which will be relevant to us when we connect topological full groups to L1 full groups (see Section 4.5). 3 3.1 L1 full groups of graphings Definition and first properties Let Φ be a graphing, and let RΦ be the measure-preserving equivalence relation it generates. Such a graphing induces a metric dΦ on the orbits of RΦ by putting for all (x, y) ∈ R dΦ (x, y) = min{n ∈ N : ∃ϕ1 , ..., ϕn ∈ Φ±1 such that y = ϕn · · · ϕ1 (x)}. The L1 full group of Φ, denoted by [Φ]1 , is then defined by [Φ]1 := {T ∈ [RΦ ] : x 7→ dΦ (x, T (x)) is integrable}. The triangle inequality implies that [Φ]1 is indeed a group, which we equip with a right-invariant metric d˜Φ defined by Z dΦ (S(x), T (x)). d˜Φ (S, T ) := X Our first example is fundamental since the study of single measure-preserving transformations is a central subject in ergodic theory. Example 3.1. Suppose we are given a measure-preserving aperiodic Z-action, that is, an element T ∈ Aut(X, µ), all whose orbits are infinite. Then Φ = {T } is a graphing, and we denote by [T ]1 the associated L1 full group. Given S ∈ [RT ], for all x ∈ X there is a unique cS (x) ∈ Z such that S(x) = T cS (x) (x). The map x 7→ cS (x) is called the cocycle associated to S and it completely determines S. The partition ({x ∈ X : cS (x) = n})n∈Z is called the cocycle partition associated to S. For all x ∈ X and all S, S 0 ∈ [RT ], we have the cocycle identity cS 0 S (x) = cS 0 (S(x)) + cS (x). The L1 full group [T ]1 := [RΦ ]1 consists of all the S ∈ [RT ] such that the corresponding cocycle cS is integrable. The metric d˜Φ is then given by Z 0 ˜ dΦ (S, S ) = |cS (x) − cS 0 (x)| dµ(x) X This fundamental example will be explored in Section 4. 14 Example 3.2. Suppose Φ is a graphing, all whose connected components are complete graphs. Then dΦ is the discrete metric: for all (x, y) ∈ RΦ ,  0 if x = y, dΦ (x, y) = 1 else. Hence we have [Φ]1 = [RΦ ] and d˜Φ is equal to the uniform metric du . Example 3.3. Let Γ be a finitely generated group and consider a measure-preserving Γ-action on (X, µ). If S is a finite generating set of Γ, it defines a graphing which generates RΓ , and we can consider the associated L1 full group [S]1 . Observe that if S 0 is another finite generating set, then the metrics dS and dS 0 are bilipschitzequivalent on every orbit with a uniform constant. So the metrics d˜S and d˜S 0 are bilipschitz-equivalent and we have [S]1 = [S 0 ]1 . We conclude that we can actually define the L1 full group of the Γ-action by [Γ]1 = [S]1 since it does not depend on the choice of a finite generating set. Note that the L1 full group of the action of a finitely generated group comes naturally equipped with a complete left invariant metric well-defined up to bilipschitz equivalence. Of course Example 3.1 falls into this category with Γ = Z. Moreover, if Γ acts freely, every T ∈ [Γ] is uniquely defined by the associated cocycle cT : X → Γ defined by T (x) = cT (x) · x. Such a cocycle satisfies the cocycle identity cT 0 T (x) = cT 0 (T (x))cT (x). Proposition 3.4. Let Φ be a graphing. The metric d˜Φ is complete and separable. Proof. Let (Tn ) be a Cauchy sequence for d˜Φ . Note that since a Cauchy sequence converges iff it admits a converging subsequence we can freely replace (Tn ) by a subsequence. Clearly for all T, T 0 ∈ [Φ]1 we have du (T, T 0 ) 6 d˜Φ (T, T 0 ), so the sequence (Tn ) is du -Cauchy and admits a du -limit T ∈ [RΦ ]. Up to taking a subsequence, we may assume that Tn → T pointwise and that for all n ∈ N we have d˜Φ (Tn , Tn+1 ) < 21n . We deduce that Z X dΦ (Tn (x), Tn+1 (x))dµ(x) < 2. X n∈N Now for all n ∈ N and all x ∈ X we have dΦ (Tn (x), T (x)) = lim dΦ (Tn (x), Tm (x)) m→+∞ 6 lim m→+∞ 6 X m−1 X dΦ (Ti (x), Ti+1 (x)) i=n dΦ (Ti (x), Ti+1 (x)) i∈N By integrating this inequality for n = 0 we deduce that d˜Φ (T0 , T ) < +∞ so that T ∈ [Φ]1 . Moreover this inequality allows us apply the Lebesgue dominated convergence theorem to the sequence of functions x 7→ dΦ (Tn (x), T (x)) to conclude that dΦ̃ (Tn , T ) → 0. The metric d˜Φ is therefore complete. 15 The separability follows from the line of ideas present in [CLM16, Thm. 3.17]. Namely, let S be a family of involutions such that [ {(x, s(x)) : x ∈ X} = GΦ ∪ {(x, x) : x ∈ X} s∈S and define Γ = hSi equipped with the word metric dS . We consider the space R L1 (X, µ, Γ) of measurable functions taking values in Γ such that X dS (f (x), 1Γ ) < +∞. Such a space is separable for the natural L1 metric, and [Φ]1 is a continuous quotient of a subspace of the metric space L1 (X, µ, Γ) (namely, the subspace of maps f ∈ L1 (X, µ, Γ) such that Tf : x 7→ f (x) · x belongs to Aut(X, µ)), hence separable. Remark. Because d˜Φ is right-invariant, the previous Proposition shows that [Φ]1 is a cli Polish group, which means it admits a complete left (or equivalently right)invariant metric compatible with its topology. Examples of cli Polish groups include all the locally compact second-countable groups (see [Bec98, Prop. 3.C.2]), and nonexamples include the following Polish groups: Aut(X, µ), the group of unitaries of an infinite dimensional Hilbert space and the group of permutation of the integers. Using Rohlin’s lemma, it can be shown that whenever T ∈ Aut(X, µ) is aperiodic, the L1 full group [T ]1 is never SIN (meaning that its topology does not admit a basis at the identity made of conjugacy-invariant neighborhoods). To our knowledge, such L1 full groups are the first examples of cli Polish groups which are non-SIN but at the same time far from being locally compact groups. A fundamental feature of L1 full groups is that they are stable under taking induced maps. Proposition 3.5. Let Φ be a graphing, let [Φ]1 be the associated L1 -full group. Then for all T ∈ [Φ]1 , we have TA ∈ [Φ]1 , and d˜Φ (TA , idX ) 6 d˜Φ (T, idX ). Proof. For all n ∈ N, let An := {x ∈ X : TA (x) = T n (x)}. Then the An ’s form a partition of A. For all n ∈ N and all 0 6 m < n, we let Bn,m := T m (An ). The family (Bn,m )06m<n is a collection of disjoint sets. We now fix n ∈ N. By the triangle inequality, we have that for all x ∈ An , n dΦ (x, TA (x)) = dΦ (x, T (x)) 6 n X dΦ (T m (x), T m+1 (x)). m=0 By integrating and summing this over all n ∈ N, we deduce that Z dΦ (x, TA (x)) = A n Z XX n∈N m=0 Z dΦ (x, T (x)) 6 Bn,m dΦ (x, T (x)). X To conclude, we note that the left term above is equal to d˜Φ (TA , idX ), while the right term is equal to d˜Φ (T, idX ). 16 Remark. The above proof is basically the same as that of Kac’s formula [Kac47, Thm.2’]. We will use this proof again to get later a similar statement in the case of L1 full groups of Z-actions (see Prop. 4.4). The following lemma will provide us many involutions in L1 full groups. Lemma 3.6. Let Φ be a graphing. Then for every involution U ∈ [RΦ ], there S exists an increasing sequence of U -invariant sets An ⊆ supp U such that supp U = n∈N An and for all n ∈ N, UAn ∈ [Φ]1 . Proof. Let U ∈ [RΦ ] be an involution and for all n ∈ N, let An = {x ∈ supp U : dΦ (x, U (x)) < S n}. Since U is an involution and dΦ is symmetric each An is U invariant, and n∈N An = supp U , so µ(supp U \ An ) → 0. By the definition of An , each UAn belongs to [Φ]1 . Theorem 3.7. Let Φ be a graphing. Then [Φ]1 is dense in [RΦ ] for the uniform topology. Proof. Because full groups are generated by involutions (see [Kec10, Lem. 4.5]), we only need to show that every involution in [RΦ ] can be approximated by elements of [Φ]1 . Let U ∈ [RΦ ] be such an involution. By the previous lemmaSwe have an increasing sequence (An ) of U -invariant subsets of supp U such that n∈N An = supp U and for all n ∈ N the involution UAn belongs to [Φ]1 . So µ(supp U \ An ) → 0 and we conclude that du (UAn , U ) → 0 as desired. 3.2 The closure of the derived group is topologically generated by involutions As we will see later, given a graphing Φ and T ∈ [Φ]1 , the map A ∈ MAlg(X, µ) 7→ TA ∈ [Φ]1 is not continuous in general. We however have the following very useful statement. Proposition 3.8. Let A ⊆ X, let Φ be a graphingSand take T ∈ [Φ]1 . If (An ) is an increasing sequence of subsets of A such that A = n∈N An then TA = lim TAn . n→+∞ Proof. Let k : X → N be defined by TA (x) = T k(x) (x) and similarly for all n ∈ N define kn : X → N by TAn (x) = T kn (x) (x). Since µ(An 4 A) → 0, we have that kn → k pointwise. So if we let Bn = {x ∈ X : k(x) 6= kn (x)}, we have µ(Bn ) → 0. By the definition of Bn we get Z d˜Φ (TAn , TA ) = dΦ (TAn (x), TA (x)) Bn The triangle inequality now yields Z Z ˜ dΦ (TAn , TA ) 6 dΦ (TAn (x), x) + Bn Bn 17 dΦ (TA (x), x). (1) Since An ⊆ A we have (TA )An = TAn , so Proposition 3.5 yields d˜Φ (TAn , idX ) 6 d˜Φ (TA , idX ). By developing the left-hand term we get Z Z Z dΦ (TAn (x), x) + dΦ (TAn (x), x) 6 d˜Φ (TA (x), x)). Bn X\Bn X Since for all x ∈ X \ Bn we have TA (x) = TAn (x), we may rewrite this as Z Z Z dΦ (TAn (x), x) 6 dΦ (TA (x), x) − dΦ (TA (x), x) Bn X X\Bn Z Z dΦ (TAn (x), x) 6 dΦ (TA (x), x). Bn Bn We now reinject this inequality into inequality (1) and obtain Z dΦ (TA (x), x). d˜Φ (TAn , TA ) 6 2 Bn By the dominated convergence theorem we now have conclude that dΦ (TAn , TA ) → 0 as desired. R Bn dΦ (TA (x), x) → 0 so we The above proposition is a direct consequence of the dominated convergence theorem when the sets An are already TA -invariant. We will often use it in this easier case, but the general statement will appear at a crucial point towards proving that the closure of the derived group of [Φ]1 is topologically generated by involutions. Let us for the moment make sure that every involution belongs to the closure of the derived group. Lemma 3.9. Suppose Φ is aperiodic. Then every involution in [Φ]1 belongs to the closure of derived group of [Φ]1 . Proof. Let T ∈ [Φ]1 be an involution. We can find B ⊆ X such that supp T = B t T (B). By aperiodicity, there is an involution Ũ ∈ [RΦ ] such that supp Ũ = B (see Lemma 2.12). We then find C ⊆ B such that B = C t Ũ (C). Lemma 3.6 then S yields an increasing sequence of Ũ -invariant sets Bn such that B = n∈N Bn , and for all n ∈ N, ŨBn ∈ [Φ]1 . We let Cn = C ∩ Bn , and Tn := TCn tT (Cn ) . Now we define an involution Un in the L1 full group of Φ by  if x ∈ Bn t U (Bn ),  Ũ (x) Un (x) := T Ũ T (x) if x ∈ T (Bn t U (Bn )),  x else. By construction, the commutator [Tn , Un ] is theS tranformation induced by T on the T -invariant set An := Bn t T (Bn ), and we have n∈N An = supp T . We conclude by the previous proposition that [Tn , Un ] → T as desired. 18 Remark. I do not know wether involutions actually belong to the derived group itself. As a more general question, when does it happen that D([Φ]1 ) is closed? Note that full groups of measure-preserving equivalence relations (which are a special case of L1 full groups by 3.2) are perfect if and only if the equivalence relation is aperiodic (see [LM14b, Prop. 3.6]). We will now gradually establish that conversely, the closure of D([Φ]1 ) is topologically generated by involutions. Lemma 3.10. Let Φ be an aperiodic graphing. Then every periodic element of [Φ]1 belongs to the closed subgroup of [Φ]1 generated by involutions and hence to the closure of the derived group of [Φ]1 . Proof. Let U ∈ [Φ]1 be periodic, and for all n ∈ N∗ let An denote the U -invariant set of all x ∈ X whose U -orbit has cardinality n. By Proposition 3.8, we have U = lim U n→+∞ Sn i=1 Ai = lim n→+∞ n Y UAi . i=2 so it suffices to prove the statement for cycles, i.e. elements U of [Φ]1 for which there is n ∈ N such that every non-trivial U -orbit has cardinality n. If U ∈ [Φ]1 is such an element, we may find A ⊆ X such that supp U = n G U i (A). i=1 For i ∈ {1, ..., n − 1} we let Ui ∈ [Φ]1 be the involution defined by   U (x) if x ∈ U i (A) U −1 (x) if x ∈ U i+1 (A) Ui (x) =  x else. It now follows from the well-known identity in symmetric groups (1 2 · · · n) = (1 2)(2 3) · · · (n − 1 n) that U = U1 U2 · · · Un−1 , which proves the first part of the lemma. The “as well as” part follows from Lemma 3.9. Lemma 3.11. Let Φ be an aperiodic graphing. The L1 full group [Φ]1 is generated by elements whose support has Φ-conditional measure everywhere less than 1/4. Remark. As the proof shows, 1/4 can be replaced by any  > 0, but we won’t need that. Proof. First note that by breaking a fundamental domain into pieces of small conditional measure (using Maharam’s lemma 2.9), one can show every periodic element is the product of elements whose support has Φ-conditional measure everywhere less than 1/4. 19 Now if T ∈ [Φ]1 , one may write T = Tp T 0 where Tp is periodic and all the nontrivial T 0 -orbits are infinite. By Maharam’s lemma we then find A ⊆ supp T 0 such that for all x ∈ supp T 0 , we have 0 < µT 0 (A)(x) < 1/4. Then A intersects almost every non-trivial T 0 -orbit so that T 0 T 0 −1 A is periodic. Since 0 A has T -conditional measure everywhere less than 1/4, the same is true of its Φconditional measure. So the support of T 0 A has Φ-conditional measure everywhere 0 less than 1/4 as wanted, and T = Tp (T 0 T 0 −1 A )T A can be written as a product of elements whose support has Φ-conditional measure everywhere less than 1/4. Theorem 3.12. Let Φ be an aperiodic graphing. Then the closure of the derived group of [Φ]1 is topologically generated by involutions. Proof. Denote by S the set of T ∈ [Φ]1 whose support has Φ-conditional measure everywhere less than 1/4. By the previous lemma S generates [Φ]1 . Since S is moreover invariant under conjugacy, it suffices to show that the commutator of any two elements of S belongs to the closed subgroup generated by involutions. So let T, U ∈ S and let B = supp g ∪supp h. There exists an involution V ∈ [RΦ ] such that B and V (B) are disjoint and supp V = B t V (B) =: A. By Lemma 3.6 there exists S an increasing sequence (An ) of V -invariant subsets of A such that VAn ∈ [Φ]1 and An = A. By Proposition 3.8 we have TAn → T and UAn → U , so it suffices to show that for every n ∈ N, the commutator [TAn , UAn ] belongs to the closed group generated by involutions. To this end, we fix n ∈ N and observe that the set supp TAn ∪ supp UAn is disjoint from VAn (supp TAn ∪ supp UAn ). It follows that if we let Tn0 = VAn TA−1 V , then Tn0 n An commutes with both TAn and UAn . So we have [TAn , UAn ] = [TAn Tn0 , UAn ] = [(TAn VAn TA−1 )VAn , UAn ] n and since taking a commutator means multiplying by a conjugate of the inverse, this equality implies [TAn , UAn ] is a product of involutions in [Φ]1 . As explained before [TAn , UAn ] → [T, U ] so this ends the proof. As a consequence, we can easily derive that the closure of the derived group is connected. Corollary 3.13. Let Φ be an aperiodic graphing. Then D([Φ]1 ) is connected. Proof. By the previous theorem it suffices to show that the group generated by involutions in [Φ]1 is connected, and we will actually prove that it is path connected. Let U ∈ [Φ]1 be an involution and let A be a fundamental domain for U . There is an increasing family of Borel subsets (At )t∈[0,1] such that A0 = ∅ and A1 = A and for all t ∈ [0, 1], µ(At ) = tµ(A). Then by the dominated convergence theorem the family of involutions Ut := UAt ∪U (At ) is a continuous path from U0 = idX to U1 = U . So every involution in [Φ]1 is connected by a path to the identity, and we conclude that the group generated by involutions is path connected as desired. 20 For ergodic Z-actions, D([T ]1 ) is actually the connected component of the identity (this follows from Corollary 4.20 along with the above result). We end this section by refining the fact that the closure of the derived group is topologically generated by involutions so as to obtain the same statements that Kittrell and Tsankov had obtained for full groups in [KT10, Sec. 4.2]. The proof is actually the same as Kittrell and Tsankov’s modulo the use of the dominated convergence theorem and we reproduce it here for the reader’s convenience. Let Φ be a graphing and ϕ ∈ Φ. If A is a Borel subset of dom ϕ such that A ∩ ϕ(A) = ∅, we denote by Iϕ,A the involution in Aut(X, µ) defined by: for all x ∈ X,   ϕ(x) if x ∈ A ϕ−1 (x) if x ∈ ϕ(A) Iϕ,A (x) =  x else. Note that Iϕ,A ∈ [Φ]1 since dΦ (x, Iϕ,A (x)) 6 1 for all x ∈ X. Theorem 3.14. Let Φ be a graphing. Then the group D([Φ]1 ) is topologically generated by the set {Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} . Proof. By Theorem 3.12, we only need to show that involutions belong to the group topologically generated by the set {Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} . So let U ∈ [Φ]1 be an involution, and let A be a fundamental domain for the restriction of U to its support. Let (wn ) enumerate the Φ-words, and for each n ∈ N let An ={x ∈ A : U (x) = wn (x) and for all m ∈ N if U (x) = wm (x) then either |wm | > |wn | or m > n} Then (An ) forms a partition of A and for all n ∈ N, if wn = ϕ1 · · · ϕk , then for all x ∈ An we have that for all i 6= j ∈ {1, ..., k} ϕi · · · ϕk (x) 6= ϕj · · · ϕk (x) by minimality of the length of wn . By the dominated convergence theorem, U = lim N Y N →+∞ Iwn ,An , n=0 so we may actually assume that U = Iϕ1 ···ϕk ,B for some B ⊆ X and ϕ1 , ..., ϕk ∈ Φ±1 such that for all i 6= j ∈ {1, ..., k} and all x ∈ B, ϕi · · · ϕk (x) 6= ϕj · · · ϕk (x). Since X is a standard Borel space, a well-known argument yields that we may actually find a partition (Bm )m∈N of B such that for all m ∈ N and all i 6= j ∈ {1, ..., k}, ϕi · · · ϕk (Bm ) ∩ ϕj · · · ϕk (Bm ) = ∅ 21 (see for instance [EG14, Lem. 5.2]). Again by the dominated convergence theorem U = lim N →+∞ N Y Iϕ1 ···ϕk ,Bm , n=0 so we may actually assume that U = Iϕ1 ···ϕk ,C for some C ⊆ X such that for all i 6= j ∈ {1, ..., k}, ϕi · · · ϕk (C) ∩ ϕj · · · ϕk (C) = ∅ Then note that for all m ∈ N and i ∈ {1, ..., k − 1}, the identity (i − 1 k) = (i − 1 i)(i k)(i − 1 i) in the symmetric group over {0, ..., k} yields Iϕi ···ϕk ,C = Iϕi ,ϕi+1 ···ϕk (C) Iϕi+1 ···ϕk ,C Iϕi ,ϕi+1 ···ϕk (C) so that by a downward recurrence on i ∈ {1, ..., k} we have that Iϕi ···ϕk ,C belongs to the group generated by {Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} . In particular, U = Iϕ1 ···ϕk ,C belongs to such a group, as wanted. 3.3 Dye’s reconstruction theorem We now show that L1 full groups as abstract groups can only be isomorphic through a measure-preserving transformation, which is a key step in order to see than L1 full groups of ergodic Z-actions are a complete invariant of flip conjugacy. Fortunately, the main result that we need for this has already been proven by Fremlin in a much more general context. Definition 3.15 (Fremlin). A subgroup G 6 Aut(X, µ) has many involutions if for every Borel A ⊆ X non-null, there exists a non-trivial involution U ∈ G such that supp U ⊆ A. Proposition 3.16. Let Φ be a graphing. The following are equivalent (1) Φ is aperiodic; (2) [Φ]1 has many involutions; (3) D([Φ]1 ) has many involutions; (4) D([Φ]1 ) has many involutions. Proof. Note that (2) and (3) are equivalent since every involution in [Φ]1 belongs to D([Φ]1 ) by Lemma 3.10. Let us show by contrapositive that (2)⇒(1): if Φ is not aperiodic, then we may find a non-null set A which intersects every Φ-orbit in at most one point. Clearly 22 every element of [Φ]1 (actually of [RΦ ]) supported in A is trivial, in particular [Φ]1 does not have many involutions. For the converse (1)⇒(2), suppose that Φ is aperiodic and let A ⊆ X be nonnull. Then by Lemma 2.12, there exists an involution U ∈ [RΦ ] whose support is equal to A. Now Lemma 3.6 ensures us that there is a non-null U -invariant set A0 such that UA0 ∈ [Φ]1 , witnessing that [Φ]1 has many involutions. So the implication (1)⇒(2) also holds and we conclude that (1), (2) and (3) are equivalent. Clearly (4) ⇒ (2), so we now only need to show that (2)⇒(4). Suppose that [Φ]1 has many involutions and let A be a non-null Borel subset of X. Let U ∈ [Φ]1 be an involution supported in A, let B be a fundamental domain of the restriction of U to its support. Finally, let V ∈ [Φ]1 be an involution supported in B. Since B and U (B) are disjoint, U V U V is an involution supported in A and belonging to D([Φ]1 ) as wanted: D([Φ]1 ) has many involutions. We denote by Aut∗ (X, µ) the group of non-singular transformations of (X, µ), i.e. Borel bijections T : X → X such that for all Borel A ⊆ X, one has µ(A) = 0 if and only if µ(T (A)) = 0. We can now state and use Fremlin’s theorem, which is a generalization of Dye’s reconstruction theorem for full groups. Theorem 3.17 (Fremlin [Fre04, 384D]). Let G, H 6 Aut(X, µ) be two groups with many involutions. Then any isomorphism between G and H is the conjugacy by some non-singular transformation: for all ψ : G → H group isomorphism, there is S ∈ Aut∗ (X, µ) such that for all T ∈ G, ψ(T ) = ST S −1 . Corollary 3.18. Let Φ and Ψ be two ergodic graphings. Then every isomorphism between [Φ]1 and [Ψ]1 is the conjugacy by some measure-preserving transformation. Proof. By Proposition 3.16 and the previous theorem, if ψ : [Φ]1 → [Ψ]1 is a group isomorphism then there is S ∈ Aut∗ (X, µ) such that for all T ∈ [Φ]1 one has ψ(T ) = ST S −1 . Let f be the Radon-Nikodym derivative of the probability measure S∗ µ with respect to µ. Since µ is preserved by every T ∈ [Φ]1 , the measure S∗ µ is preserved by every T 0 ∈ [Ψ]1 . So f ◦ T 0 = f a.e. for every T 0 ∈ [Ψ]1 . But Ψ is ergodic so this implies f is constant: the measure µ is preserved by S as wanted. 3.4 Closed normal subgroups of the closure of the derived group Given a group G ⊆ Aut(X, µ), we denote by GA the subgroup of all T ∈ G such that supp T ⊆ A. Note that if Φ is a graphing and A is Φ-invariant then D([Φ]1 )A is a closed normal subgroup of D([Φ]1 ). We will see that conversely if Φ is aperiodic then all the closed normal subgroups of D([Φ]1 ) arise in this manner. Our approach is based on the study of closed normal subgroups generated by involutions. 23 Lemma 3.19. Let Φ be a graphing. If A is a Φ-invariant set then D([Φ]1 A ) = D([Φ]1 )A = D([Φ]1 )A . Proof. To simplify notation we let G = [Φ1 ]A , so that we aim to prove that D(GA ) = D(G)A = D(G)A . To this end we show that the chain of inclusions D(GA ) ⊆ D(G)A ⊆ D(G)A ⊆ D(GA ) holds. • We clearly have the inclusion D(GA ) ⊆ D(G)A so that D(GA ) ⊆ D(G)A . • Next, note that D(G)A is a closed subgroup of G which contains every element of D(G)A . It follows that D(G)A ⊆ D(G)A . • For the last remaining inclusion D(G)A ⊆ D(GA ), let T ∈ D(G)A . Then T is supported on A and is a limit of elements Tn belonging to D(G). Now note that by definition of the topology T is also the limit of the sequence of transformations (TnA )n∈N . Moreover each TnA can be rewritten as a product of commutators of elements supported in A by taking the induced transformations instead, which is harmless since A is invariant by every element appearing in such a product. We conclude that T ∈ D(GA ) as desired. We now establish a crucial lemma allowing a better understanding closures of conjugacy classes of involutions. Lemma 3.20. Let Φ be a graphing. Let U and V be two involutions such that their supports are disjoint and have the same Φ-conditional measure. Then V belongs to the closure of the conjugacy class of U . Proof. Let A and B be fundamental domains of the respective restrictions of U and V to their support. Then µΦ (A) = µΦ (B) so there exists an involution T ∈ [RΦ ] such that T (A) = B and we can moreover assume that T (x) = x for all x ∈ A ∩ B. For all n ∈ N we let An = {x ∈ A : dΦ (x, T (x)) < n} and Bn = {x ∈ B : dΦ (x, T (x)) < n}. Since T is an involution and T (A) = B, we also have B Sn = T (An ). Note that (A ) and (B ) are increasing sequences of sets and that n n n An = A, S 0 n Bn = B. We now define a new involution Tn  T (x) if x ∈ An t Bn    V T U (x) if x ∈ U (An ) Tn0 (x) = U T V (x) if x ∈ V (Bn )    x else. The definition of An and the fact that V, U ∈ [Φ]1 yield that Tn0 ∈ [Φ]1 as well. For all n ∈ N and all x ∈ X, an easy calculation yields that: • if x ∈ (A ∪ U (A)) \ (An ∪ U (An )), then Tn0 U Tn0 (x) = U (x), • else if x ∈ (Bn ∪ V (Bn ), then Tn0 U Tn0 (x) = V (x) and 24 • else Tn0 U Tn0 (x) = x. So Tn0 U Tn0 → V pointwise. Moreover the trichotomy above also shows that for all x ∈ X we have dΦ (x, Tn0 U Tn0 (x)) 6 dΦ (x, U (x)) + dΦ (x, V (x)), so by the dominated convergence theorem d˜Φ (Tn0 U Tn0 , V ) → 0. We have therefore established that V belongs to the closure of the conjugacy class of U . Lemma 3.21. Let Φ be an aperiodic graphing, let U ∈ [Φ]1 be an involution such that µΦ (supp U ) 6 1/2. Let A be the Φ-closure of the support of U . Then the closed subgroup generated by conjugates of U by elements of D([Φ]1 ) contains D([Φ]1 )A . Proof. By Lemma 3.19 we may as well assume that A = X so that our aim becomes to show that whenever U has support whose Φ-closure is equal to X and which satisfies µΦ (supp U ) 6 1/2, the closed subgroup generated by conjugates of U by involutions contains D([Φ]1 ). So let U be as such, let B = supp U and denote by G the closed subgroup generated by conjugates of U by elements of D([Φ]1 ). Since µΦ (supp U ) 6 1/2 by Maharam’s lemma we may find a set C disjoint from B such that µΦ (C) = µΦ (B). There is an involution V ∈ [RΦ ] supported on B t C such that V (B) = C. For all n ∈ N we let Bn = {x ∈ B : dΦ (x, V (x)) < n and dΦ (U (x), V U (x)) < n} Then (Bn ) is an increasing sequence of U -invariant Borel subsets of B such that S S n∈N Bn = B. Let An be the Φ-closure of Bn . Observe that n∈N An = X, so the proof will be finished once the following claim is proven. Claim. For all n ∈ N, the group G contains D([Φ])An . We now prove the claim. Let n ∈ N; the sets and functions that are to be defined depend on n but we will omit the subscript n for readability. Let F be a fundamental domain of the restriction of U to its support, let Fn be its intersection with Bn , which is a fundamental domain for the restriction of U to Bn . Let f = µΦ (Fn ) = µΦ (Bn )/2. We know that D([Φ])An is topologically generated by involutions, so it suffices to show that any involution in [Φ]1 supported in An belongs to G. So let W be an involution supported in An . Let D be a Borel fundamental domain for the restriction of W to its support: then supp W = D t W (D). By Corollary 2.10 we have a partition (Dm )m∈N of D such that for all m ∈ N, µΦ (Dm ) 6 f6 . For all m ∈ N we let Wm = WDm tW (Dm ) . By the dominated convergence theorem, W = lim k→+∞ k Y Wm m=0 so we only need to show that every Wm belongs to G. 25 B C Bn U V Fn Let us fix m ∈ N, and for notational simplicity let Γ = hU, V i ' (Z/2Z × Z/2Z) o (Fn ) Z/2Z. Since µΦ (Dm ) 6 µΦ10 we can find a subset E ⊆ Fn such that µΦ (E) = µΦ (Dm )/2 and E is disjoint from Γ(Dm t W (Dm )). Then Γ(E) is disjoint from Dm t W (Dm ) = supp Wm . Consider the Γ-invariant set Ẽ = (E t U (E)) t V (E t U (E)) and the involution Ṽ = VẼ . An easy calculation yields U Ṽ U Ṽ = UẼ so that UẼ ∈ G. Now the support of UẼ has Φ-conditional measure µΦ (Ẽ) = 4µΦ (E) = 2µΦ (Dm ) = µΦ (supp Wm ). Since moreover Ẽ and supp Wm are disjoint, we infer by Lemma 3.20 that Wm belongs to the closure of the conjugacy class of of UẼ . Since we have already established that UẼ ∈ G, we can conclude that Wm ∈ G. As already observed, this ends the proof of the claim and therefore of the theorem. Proposition 3.22. Let Φ be an aperiodic graphing, let T ∈ [Φ]1 and let A be the Φ-closure of the support of T . Then the closed subgroup generated by conjugates of T by elements of D([Φ]1 ) contains D([Φ]1 )A . Proof. Again by Lemma 3.19 we only need to show that whenever T has a support whose Φ-closure is equal to X, the closed subgroup generated by conjugates of T by involutions contains D([Φ]1 ). Let G be the closed subgroup generated by conjugates of T by elements of D([Φ]1 ). We start by applying Proposition 2.7 and find a partition (A1 , A2 , B1 , B2 , B3 ) of supp T such that A2 = T (A1 ), B2 = T (B1 ) and B3 = T 2 (B1 ). Let C = A1 t b1 , then by construction C ∩ T (C) = ∅ and C intersects every non-trivial T -orbit. Since the Φ-closure of supp T is equal to X this implies C intersects every Φ-orbit. Let G be the closed subgroup generated by conjugates of T by elements of D([Φ]1 ). Let U be an involution in [Φ]1 whose support is equal to C. For all S n ∈ N, let Cn = {x ∈ X, dΦ (x, U (x)) < n}. Then n∈N Cn = C and for all n ∈ N we have UCn ∈ [Φ]1 . Now since U (C) is disjoint from C we also have that U (Cn ) 26 and Cn are disjoint so that [T, UCn ] is an involution belonging to G whose support is Cn t T (Cn ). Applying Lemma 3.21 S we deduce that G contains D([Φ]1 )An where An is the Φ-closure of Cn . Since n∈N Cn = C and C intersects every Φ-orbit, we have that S A = X. Moreover the sequence (An ) is increasing, so a direct application of n∈N n S Proposition refprop: weak order continuity yields that n∈N D([Φ]1 )An is dense in D([Φ]1 ) so that G contains D([Φ]1 ) as wanted. We can now easily prove our main results for this section. Theorem 3.23. Let Φ be an aperiodic graphing. Then for every closed normal subgroup N of D([Φ]1 ) there is a (unique up to measure zero) Φ-invariant Borel set A such that N = D([Φ]1 )A . Proof. Let t = sup{µ(A) : A is Φ-invariant and D([Φ]1 )A ⊆ N }, and let An be a sequence of subsets of X such that µ(An ) → t and D([Φ]1 )An ⊆ N . Note that whenever A0 , A00 are two Φ-invariant subsets of X then the group generated by D([Φ]1 )A0 ∪ D([Φ]1 )A00 is equal to D([Φ]1 )A0 ∪A00 . So we may assume the sequence (An ) is increasing. S Let A = n∈N An , then µ(A) = t. By proposition 3.8 since N is closed we actually have that N contains D([Φ]1 )A . Conversely, let T ∈ N and let B be the Φ-closure of the support of T . By Proposition 3.22 the group N contains D([Φ]1 )B . So N contains D([Φ]1 )A∪B hence µ(A ∪ B) 6 t. But µ(A) = t so B ⊆ A up to measure zero, hence T ∈ D([Φ]1 A . So D([Φ]1 )A contains N and we conclude that N = D([Φ]1 )A . Finally, the uniqueness of A up to measure zero follows from the fact that given any B ⊆ X of positive measure, there is a non trivial T ∈ D([Φ]1 ) supported in B (see Proposition 3.16). Corollary 3.24. Let Φ be an aperiodic graphing. Then Φ is ergodic if and only if D([Φ]1 ) is topologically simple. We will see that D([Φ]1 ) and D([Φ]1 ) are never simple when Φ = {T } and T ∈ Aut(X, µ) is aperiodic (see Theorem 4.26). 3.5 Link with topological full groups In this section we connect L1 full groups to the well-studied topological full groups. Since we are dealing with L1 full groups associated to graphings, we need to introduce their natural topological counterparts. Let 2N be the Cantor space and let ν be a Borel probability measure on it. A continuous graphing on the measured Cantor space (2N , ν) is a graphing Φ such that for all ϕ ∈ Φ, the sets dom ϕ, rng ϕ are clopen and ϕ : dom ϕ → rng ϕ is a homeomorphism. 27 Definition 3.25. Let Φ be a continuous graphing on (2N , ν). The topological full group of Φ, denoted by [Φ]c , is the group of all homeomorphisms T of 2N such that for all x ∈ 2N there is a neighborhood U of x and a Φ-word w such that for all y ∈ U , T (x) = w(x). It follows from compactness that one can think equivalently of the topological full group of a continuous graphing Φ as the group of all maps obtained by cutting and pasting finitely many Φ-words along a partition into clopen sets. In particular, [Φ]c is always a countable group. The most interesting case is when Φ is actually a countable group acting by homeomorphisms on a compact set (or a generating set for such a countable group): we then recover the usual definition of the topological full group. We denote by [Φ]c−inv denote the group generated by involutions in a topological full group [Φ]c . The following result is an L1 full group version of a result of Miller [Mil05] for full groups, also proved by Kittrell-Tsankov [KT10, Prop. 4.1] and Medynets [Med07] in the case of a single homeomorphism. Theorem 3.26. Let ν be a Borel probability measure on 2N , and let Φ be a continuous graphing on (2N , µ). Then the group [Φ]c−inv is dense in D([Φ]1 ). Proof. Let us recall that if ϕ ∈ Φ and A is a Borel subset of dom ϕ such that A ∩ ϕ(A) = ∅, we denote by Iϕ,A the involution in [Φ]1 defined by: for all x ∈ X,   ϕ(x) if x ∈ A ϕ−1 (x) if x ∈ ϕ(A) Iϕ,A (x) =  x else. By Theorem 3.14, the group D([Φ]1 ) is topologically generated by such involutions, so we only need to check that, given ϕ ∈ Φ and a Borel subset A of dom ϕ such that A ∩ ϕ(A) = ∅, the involution Iϕ,A can be approximated by elements of [Φ]c−inv . So let ϕ ∈ Φ and let A be a Borel subset of dom ϕ such that A∩ϕ(A) = ∅. Since ν is regular, there is a sequence (An ) of clopen subsets of 2N such that ν(An 4 A) → 0. Consider the set A0n := An \ϕ(An ). Note that since ϕ is a partial homeomorphism, A0n is still clopen, and by definition A0n is disjoint from ϕ(A0n ) so the involution Iϕ,A0n belongs to [Φ]c−inv . We now have Z Z d˜Φ (Iϕ,A , Iϕ,A0n ) ) = dΦ (ϕ(x), x) + dΦ (x, ϕ(x)) A\A0n A0n \A Z Z −1 + dΦ (ϕ (x), x) + dΦ (x, ϕ−1 (x)) ϕ(A\A0n ) =2µ(A0n 4 A). ϕ(A0n \A) Moreover since ν(An 4 A) → 0, since ϕ preserves the measure and since A is disjoint from ϕ(A), a straightforward computation yields µ(A0n 4 A) → 0. We conclude that d˜Φ (Iϕ,A , Iϕ,A0n ) ) → 0 as desired. Let us now show that the similar statement that [Φ]c is dense in [Φ]1 is not true in general. 28 Example 3.27. Consider the odometer T0 on 2N . For every word s with letters in {0, 1}, we let Ns ⊆ 2N be the set of infinite words which start by s. For every n ∈ N, let ϕn be the restriction of T0 to N1n 0 , and then let Φ = {ϕn : n ∈ N}. It is easily checked that the topological full group [Φ]c is the group S2∞ of dyadic permutations. In particular [Φ]c is locally finite, hence contained in D([Φ]1 ). We conclude from Theorem 3.26 that [Φ]c = D([Φ]1 ). However the L1 full group of Φ is equal to the L1 full group of T0 since up to measure zero they induce the same graph. But T0 has index 1 (see Definition 4.3) hence cannot belong to D([T0 ]1 ) = D([Φ]1 ), and we conclude that [Φ]c is not dense in [Φ]1 . It is well-known that every countable group Γ of measure-preserving transformation of (X, µ) is up to measure zero conjugate by a measure-preserving isomorphism to a group of homeomorphism of the Cantor space preserving a Borel probability measure ν (see for instance [Gla03, Thm. 2.15]). Here we check that the same can be done for graphings so as to be able to apply our density result above in the right level of generality. Recall that the group of homeomorphisms of the Cantor space is canonically isomorphic to the group of automorphisms of the Boolean algebra of clopen subsets of the Cantor space. Furthermore, the Boolean algebra of clopen subsets of the Cantor space is the unique countable atomless Boolean algebra (see for instance [GH09, Chap. 16]). We can now state and prove that any graphing is conjugate to a continuous one up to measure zero. Proposition 3.28. Let (X, µ) be a standard Borel space, and let Φ be a graphing on X. Then there exists a Borel probability measure ν on 2N , a continuous graphing Ψ on (2N , ν), a Φ-invariant full measure Borel subset X0 of X and Borel measurepreserving injection T : (X0 , µ) → (2N , ν) and a continuous graphing Ψ on 2N such that ΨT (X0 ) = T ΦX0 T −1 . Proof. Let C be a countable separating family of Borel sets containing X. Let D be set of finite Boolean combinations of sets of the form w(C) or w−1 (C) for w a Φ-word and C ∈ C. Then D is countable separating, contains the domain and range of every ϕ ∈ Φ, and is Φ-invariant in the sense that for every ϕ ∈ Φ and D ∈ D, ϕ±1 (D) ∈ D. Each atom of D is a singleton since D contains a separating family. Let A be the reunion of the atoms of D, then A is countable and hence has measure zero. Let X0 := X \ A, and consider the Boolean algebra DX0 := {D ∩ X0 : D ∈ D}. induced by D on X0 . By Stone duality, DX0 is isomorphic to the algebra of clopen subsets of its Stone space Y . Since DX0 is a countable atomless algebra its Stone space Y is homeomorphic to 2N so we may as well assume that Y = 2N . By construction every ϕ ∈ Φ induces a Boolean algebra isomorphism between the Boolean algebra induced by DX0 on dom ϕ and the Boolean algebra induced by DX0 on rng ϕ, so every ϕ ∈ Φ induces a homeomorphism ϕ̃ between the corresponding clopen subsets of Y . Let Ψ = {ϕ̃ : ϕ ∈ Φ}, we will check that such a continuous graphing works. 29 We define a map T : X0 → Y by associating to every x ∈ X0 the unique element T (x) of the Stone space of DX0 defined by x. Since DX0 contains a separating family of X0 , the map T is injective. Moreover it conjugates the restriction ΦX0 and ΨT (X0 ) by the definition of Ψ. Finally the map T is also Borel since the preimage of a clopen set belongs to DX0 , so by putting ν = T∗ µ we get the desired statement. 4 L1 full groups of Z-actions We now focus on L1 full groups of Z-actions, for which we can say a lot more. The main feature is that for Z-actions, L1 full groups become invariants of flip-conjugacy. To see this, we need the following fundamental result of Belinskaya. Theorem 4.1 (Belinskaya, [Bel68]). Let T and T 0 be two ergodic transformations with the same orbits, and suppose furthermore that T 0 ∈ [T ]1 . Then there exists S ∈ [T ] such that either T = ST 0 S −1 or T −1 = ST 0 S −1 . With this in hand, we can now prove that L1 full groups of ergodic Z-actions are complete invariants of flip conjugacy. Theorem 4.2. Let T and T 0 be two measure-preserving ergodic transformation of a standard probability space (X, µ). Then the following are equivalent: (1) T and T 0 are flip-conjugate; (2) the groups [T ]1 and [T 0 ]1 are abstractly isomorphic; (3) the groups [T ]1 and [T 0 ]1 are topologically isomorphic. Proof. Clearly (1) implies (3) and (3) implies (2). Suppose that (2) holds and let ψ : [T ]1 → [T 0 ]1 be an abstract group isomorphism. By Corollary 3.18, there is S ∈ Aut(X, µ) such that for all U ∈ [T ]1 , we have ψ(U ) = SU S −1 . In particular, we have that ST S −1 ∈ [T 0 ]1 . Since ψ is surjective, ST S −1 must have the same orbits as T 0 . So by Belinkskaya’s Theorem 4.1, ST S −1 and T 0 are flip-conjugate, so T and T 0 are flip-conjugate. So (2) implies (1), which ends the proof. 4.1 The index map One of the specific features of L1 full groups of aperiodic Z-actions is the existence of a natural homomorphism into R, given by integrating the corresponding cocycles. We will see later that in the ergodic case, it actually takes values into Z. 30 Definition 4.3. Let T ∈ Aut(X, µ) be ergodic. The index of S ∈ [T ]1 is defined by Z cS (x)dµ(x), IT (S) := X where cS is the cocycle associated to S ∈ [T ]. When the transformation T we are considering is clear from the context, we will also simply write the index map as I. From the cocycle identity cSS 0 (x) = c0S (S(x)) + cS (x) and the fact that elements of [T ]1 are measure preserving we deduce that the index map is a homomorphism. We will denote its kernel by [T ]0 . Our first observation is that taking induced transformations does not change the index. The proof is very similar to that of Kac’s formula, which should be no surprise since Kac’s formula corresponds to the case S = T . Proposition 4.4. Let S ∈ [T ]1 , and let A ⊆ X intersect every non trivial S-orbit. Then we have the equality I(SA ) = I(S). Proof. For all n ∈ N, let An := {x ∈ X : TA (x) = T n (x)}. Then the An ’s form a partition of A. For all n ∈ N and all 0 6 m < n, we let Bn,m := T m (An ). The family (Bn,m )06m<n is a partition of the support of S since A intersects every non trivial S-orbit. We now compute Z I(SA ) = cSA (x)dµ(x) A XZ cSA (x)dµ(x) = An n∈N = n−1 X XZ cS (S m (x))dµ(x), An m=0 n∈N the last equality being a consequence of the cocycle identity. We deduce that I(SA ) = n−1 Z XX An n∈N m=0 = XZ n∈N Z cS (S m (x))dµ(x) cS (x)dµ(x) Bn,m = cS (x)dµ(x) supp S I(SA ) = I(S) The following corollary can also be obtained directly by noting that if S ∈ [T ]1 , then on every finite S-orbit the average of nS must be equal to zero. Corollary 4.5. Let T ∈ Aut(X, µ) be aperiodic. Every periodic element of [T ]1 has index zero. 31 Proof. Let S ∈ [T ]1 be a periodic element, let A ⊆ X be a fundamental domain for S (see the paragraph following Definition 2.3). Then SA = idX by definition so I(SA ) = 0. By the previous proposition we conclude that I(S) = I(SA ) = 0. One can completely describe the ergodic elements of the L1 full group of T ∈ Aut(X, µ) which are conjugate to T in terms of their index. This will be very useful to us in the next section. Theorem 4.6 (Belinskaya, [Bel68, Thm. 3.8]). Let T ∈ Aut(X, µ) be an ergodic transformation, and let T 0 ∈ [T ]1 . Then T and T 0 are flip-conjugate iff T 0 is ergodic and I(T 0 ) = ±1. 4.2 A characterization of supports of n-cycles In full groups of aperiodic equivalence relations, every Borel set is the support of an involution. Here we will see that this is not true in general for L1 full groups and give a complete characterization of sets which arise as supports of involutions, or more generally of n-cycles. Definition 4.7. A measure-preserving transformation T is an n-cycle if every T orbit has cardinality either 1 or n. Note that if p is prime, a p-cycle is precisely an element of Aut(X, µ) of order p. Our result is that n-cycles in L1 -full groups arise only in the most obvious manner: for instance there is an involution whose support is equal to X if and only if there exists a Borel set B such that X = B t T (B). Theorem 4.8. Let T be a measure-preserving ergodic transformation, let A be a Borel subset of X and let n ∈ N. Then A is equal to the support of an n-cycle if and only if there is B ⊆ A such that A = B t TA (B) · · · t TAn−1 (B) Remark. We should point out however that every Borel set arises as the support of a periodic transformation all whose orbits have cardinality at most 3 (see Lemma 4.24). Proof of Theorem 4.8. The sufficiency of the condition is easy: since TA ∈ [T ]1 by Kac’s formula (see Prop. 3.5), if A = B t TA (B) · · · t TAn−1 (B) we can define an n-cycle T0 ∈ [T ]1 whose support equates A by putting  F i if x ∈ n−2  TA (x) i=0 TA (B) −n−1 n−1 T0 (x) = T (x) if x ∈ TA (B) .  A x else. For the converse, let us recall that if G 6 Aut(X, µ) and A is a Borel subset of X, we let GA denote the group of elements of G supported in A. Observe that if T ∈ Aut(X, µ) then for all x, y ∈ A we have dT (x, y) > dTA (x, y) so that [T ]1 A 6 [TA ]1 (we will see in Theorem 5.2 that the inclusion is actually strict). This observation will be used implicitly in what follows. 32 Suppose that A is the support of an n-cycle T0 , let C be a fundamental domain for T0 , and consider the transformation S = TC T0 whose support also equates A and satisfies A = C t S(C) t · · · t S n−1 (C). By Proposition 2.5 the restriction of S to A is ergodic. Moreover note that TC = (TA )C so the the TA -index of TC is ITA (TC ) = 1 by Proposition 4.4. Since T0 is periodic, its TA -index is equal to 0 by Corollary 4.5 and we conclude that ITA (S) = 1. By applying Belinskaya’s theorem 4.6 to the restriction of S to A which is ergodic, we conclude that TA and S are conjugate by a measure-preserving transformation U supported in A. But recall that A = C t S(C) t · · · t S n−1 (C) so we have A = U (C) t TA (U (C)) · · · t TAn−1 (U (C)) hence TA satisfies the desired conclusion with B := U (C). Example 4.9. Let T ∈ Aut(X, µ) be a weakly mixing transformation. Then for all n ∈ N, there is no n-cycle in [T ]1 whose support equates X. Remark. The existence of B ⊆ A such that A = B t TA (B) · · · t TAn−1 (B) is a spectral property of TA : it is equivalent to the associated unitary operator on L2 (A) having e2iπ/n as an eigenvalue. 4.3 The L1 full group is generated by induced transformations along with periodic transformations We will now use the index map to find a nice generating set for [T ]1 . Our ideas are in the direct continuation of Belinskaya’s paper [Bel68]. Let us start by analyzing the action of elements of [T ]1 on the T -orbits. A sequence (nk )k∈N of integers is called almost positive if for all but finitely k ∈ N, we have nk > 0. It is called almost negative if (−nk )k∈N is almost positive, and a sequence which is either almost negative or almost positive is called almost sign invariant. It is an easy exercise to check that an injective sequence is almost positive iff it tends to +∞, while it is almost negative iff it tends to −∞. The following lemma thus implies that under the identification of a T -orbit with Z via k 7→ T k (x), every forward S-orbit either tends to +∞ or −∞. Lemma 4.10 ([Bel68, Thm. 3.2]). Let T ∈ Aut(X, µ) be aperiodic and S ∈ [T ]1 . For almost every x ∈ X such that the S-orbit of x is infinite, the sequence sign(cS k (x)) is almost sign invariant. Definition 4.11. An element S ∈ [T ]1 such that for all x ∈ supp S, the sequence (cS k (x))k∈N is almost positive is called almost positive. If for every x ∈ supp S the sequence (cS k (x))k∈N is almost negative, we say that S is almost negative. Note that every almost positive or almost negative element has to be aperiodic when restricted to its support. Also the inverse of an almost positive element is almost negative and vice-versa. We have a natural order on every T -orbit which allows for a more natural formulation of the previous definition. 33 Definition 4.12. Let T ∈ Aut(X, µ) be aperiodic. We define a partial order 6T on X by x 6T y if y = T n (x) for some n > 0. Note that 6T is total when restricted to a T -orbit, and that such a restriction corresponds to the natural ordering 6 on Z via n 7→ T n (x). We may now reformulate the previous definition as: S ∈ [T ]1 is almost positive if for almost every x ∈ supp S, S k (x) >T x for all but finitely many k ∈ N. Proposition 4.13. Let T ∈ Aut(X, µ) be aperiodic. Every element s ∈ [T ]1 can be written as a product S = Sp S+ S− , where Sp is periodic, S+ is almost positive, S− is almost negative and these three elements have disjoint supports. Proof. Let S ∈ [T ]1 . The set of x ∈ X such that the sequence (cS k (x))k∈N is almost positive (respectively almost negative) is S-invariant. Call this set A+ (respectively A− ). Finally let Ap denote the set of x ∈ X whose S-orbit is finite. Then (A− , A+ , Ap ) is a partition of X by the previous lemma, and since they are S-invariant we deduce that S = SA− SA+ SAp . Clearly Sp := SAp , S+ := SA+ and S− := SA− are as wanted. Definition 4.14. Let T ∈ Aut(X, µ) be aperiodic. If S ∈ [T ]1 , we say that S is positive if S(x) >T x for all x ∈ X. The proof of the following proposition uses the same ideas as in [Bel68, Lem. 3.5]. Proposition 4.15. Let T ∈ Aut(X, µ) be aperiodic, and let S ∈ [T ]1 be almost positive. Then there exists a positive element S 0 ∈ [T ]1 whose support is a subset of supp S such that SS 0 −1 and S 0 −1 S are periodic. Proof. Consider the set A := {x ∈ X : S k (x) >T x for all k > 0}. Note that TA (x) may be defined as the first element greater than x which belongs to A, so by the definition of A we have TA (x) 6T SA (x) for all x ∈ A. Let us show that A intersects every non trivial S-orbit. Let x ∈ supp S. Since S is almost positive, the sequence (nS k (x))k∈N is almost positive. Let k be the last natural integer such that nS k (x) 6 0, then by definition S k (x) ∈ A as wanted. Now for all x ∈ A we have SA (x) >T TA (x) >T x, in particular SA is positive. Since A intersects every S-orbit, we moreover have that SSA−1 and SA−1 S are periodic, so S 0 := SA is as desired. Lemma 4.16. Let T ∈ Aut(X, µ) be aperiodic, let S ∈ [T ]1 be positive and let A = supp S. Then STA−1 is positive. Proof. Since S is positive, we have A = {x ∈ X : S(x) >T x}. But then by the definition of TA ,for all x ∈ A we have S(x) >T TA (x). Since A is TA -invariant, we deduce that for all x ∈ A, STA−1 (x) >T x. But the support of STA−1 is contained in A so the previous inequality actually holds for all x ∈ X, and we conclude that STA−1 is positive. 34 Proposition 4.17. Let T ∈ Aut(X, µ) be ergodic. Then every positive element is the product of finitely many transformations which are induced by T : for all S ∈ [T ]+ 1 there exists k ∈ N and A1 , ..., Ak ⊆ X such that S = TA1 · · · TAk . In particular, the index of a positive element is a (positive) integer. Proof. Note that the index of a positive element has to belong to [0, +∞[, and that the index of a positive element S is null if and only if S = idX . We prove the result by induction on bI(S)c. First, if bI(S)c = 0, suppose towards a contradiction that S is non-trivial. let A = supp S, by the previous lemma STA−1 is positive. Since T is ergodic, A intersects almost every T -orbit. Proposition 4.4 thus yields that I(TA ) = I(T ) = 1. So I(STA−1 ) = I(S) − 1 < 0, but STA−1 is positive, a contradiction. The inductive step is basically the same: if bI(S)c = n + 1 for some n ∈ N, the support A of S is nontrivial so that S = TA S 0 where bI(S 0 )c = n. Theorem 4.18. Let T ∈ Aut(X, µ) be ergodic, then [T ]1 is generated by the set P er([T ]1 ) ∪ Ind([T ]1 ), where P er([T ]1 ) is the set of periodic elements in [T ]1 and Ind([T ]1 ) is its set of transformations induced by T . Proof. By Proposition 4.13 the group [T ]1 is generated by almost positive elements along with periodic elements. Now every almost positive element is the product of a positive element by a periodic element (Proposition 4.15) and every positive element is the product of finitely many induced transformations (Proposition 4.17). Corollary 4.19. Let T ∈ Aut(X, µ) be ergodic, then [T ]1 is generated by the set P er([T ]1 ) ∪ {T }, where P er([T ]1 ) is the set of periodic elements in [T ]1 . Proof. If A is a non-null subset of X, then by ergodicity A intersects almost every T orbit so that TA−1 T is periodic. In other words every induced transformation belongs to the group generated by periodic elements along with T , and since by the previous theorem periodic elements along with induced transformations generate [T ]1 we are done. Corollary 4.20. Let T ∈ Aut(X, µ) be ergodic. Then D([T ]1 ) is equal to the following three groups: • the group generated by periodic elements, • the group topologically generated by involutions and • the kernel of the index map. Moreover we have the following short exact sequence I 1 → D([T ]1 ) → [T ]1 → − Z → 1. 35 Proof. Denote by Gper the group generated by periodic elements in [Φ]1 , and by Ginv the group topologically generated by involutions. Note that both are normal subgroups of [T ]1 . By Lemma 3.10, we have Gper 6 Ginv 6 D([T ]1 ). Since the index map is continuous and takes values in an abelian group, we also have D([T ]1 ) 6 Ker (I). Let S ∈ [T ]1 . We may write S as a product of periodic elements and powers of T by the previous corollary. So modulo Gper , we have S = T n for some n ∈ Z. So I(S) = n and we conclude that the index map takes values into Z. Moreover if S ∈ Ker (I) we infer that n = 0 so that S ∈ Gper . So Gper = Ker (I) and since we have already established that Gper 6 Ginv 6 D([T ]1 ) 6 Ker (I), we conclude that all these four normal subgroups are equal. Remark. Note that for topological full groups, the kernel of the index map can be larger than the derived group due to the fact that some involutions may not belong to the derived group. Matui has obtained a complete description of the quotient of the kernel of the index map by the derived group, see [Mat06, Thm. 4.8]. 4.4 Escape time and non-simplicity results In this section, we show that the closure of the derived group of [T ]1 is never simple. To this end, we will use the non-integrability of certain escape times. Let us first recall that given a standard probability space (X, µ), its measure algebra is denoted by MAlg(X, µ) and consists of all Borel subsets of X, two such sets being identified if their symmetric difference has measure zero. It is naturally endowed with a metric dµ defined by dµ (A, B) = µ(A 4 B) which is complete and separable (see [Hal50, 40.A]). Definition 4.21. Let T ∈ Aut(X, µ) and A ∈ MAlg(X, µ). The T -escape time of A is the map τA : A → N defined by • τA (x) = +∞ if there is no n ∈ N such that T n (x) 6∈ A, • else τA (x) is the the first integer n ∈ N such that T n (x) 6∈ A or T −n (x) 6∈ A. By Kac’s theorem, for any Borel set A ⊆ X the T -return time to A is integrable and its integral is equal to 1. The situation for escape times is however very different. Indeed, any non-null T -invariant set fails to have an integrable escape time so a non ergodic transformation admits non-trivial sets with non-integrable escape time. This is actually true of any measure-preserving transformation in a strong sense as the following result shows. Theorem 4.22. Let T be a measure-preserving transformation. Then there is a dense Gδ of A ∈ MAlg(X, µ) whose T -escape time is not integrable. Proof. For n ∈ N, let Fn be the set of A ∈ MAlg(X, µ) whose escape time is either non integrable or has L1 norm stricly bigger than n. We have to show that each Fn is open dense. To see that Fn is open, first note that for a fixed k ∈ N, if we let Ak := {x ∈ A : nA (x) = k} then ! k [  Ak+1 = A \ Al ∩ T −(k+1) (A) ∪ T k+1 (A) l=1 36 so that Ak depends continuously P on A. Now take A ∈ Fn , by definition we may find N ∈ N big enough so that N k=1 kµ(Ak ) > n. Such an inequality will remain true 0 for A sufficiently close to A by continuity, so that Fn is indeed open. Next, to check the density, we will be done if we can build a sequence (Am ) such that kτAm k1 → +∞ but µ(Am ) → 0. Indeed, then A ∪ Am converges to A and for any n ∈ N, it belongs to Fn for m large enough. If the ergodic decomposition of T has a diffuse part, there is a sequence of T invariant sets (Am ) such that µ(Am ) → 0 and kτAm k1 = +∞ by T -invariance. If the ergodic decomposition of T does not have a diffuse part, then T has to be aperiodic. So we apply Rohlin’s lemma to T for N = 6m ,  = 21 to get Bm ⊆ X all whose first 6m translates are disjoint such that 2·61m 6 µ(Bn ) 6 61n . Let An := 4m −1 G T i (Bm ) i=0 be the reunion of the first 4m translates of the base Bm of the Rohlin tower. We now compute the integral of the escape time: 4m /2−1 Z τAm = 2µ(Bm ) Am = 2µ(Bm ) · 1 16m > m· 6 8 X (i + 1) i=0 m 4m 42 2 +1 2 which tends to +∞ while µ(Am ) 6 ( 46 )m tends to zero as m tends to +∞. Remark. For any T ∈ Aut(X, µ) of rank one, it is easily checked that the set of A ∈ MAlg(X, µ) whose T -escape time is bounded is also dense, but I do not know wether this is true for any T ∈ Aut(X, µ). The following corollary of Theorem 4.22 is in sharp contrast with the situation for full groups of ergodic measure-preserving equivalence relations, which act transitively on elements of MAlg(X, µ) of the same measure. Corollary 4.23. Let T ∈ Aut(X, µ) be ergodic. There is a dense Gδ of A ∈ MAlg(X, µ) such that for every B ∈ MAlg(X, µ) disjoint of A of the same measure, no element of [T ]1 maps A to B. Proof. If T maps A to a set disjoint from A, then by definition the L1 -norm of T is an upper bound of the integral of the escape time of A. By the previous theorem, this cannot happen for a dense Gδ of A ∈ MAlg(X, µ). We will now refine the preceding result to establish that for all T ∈ [R] aperiodic, neither the derived group of [T ]1 nor its closure are simple. We will need the following lemma, which is essentially contained in [Fat78]. Lemma 4.24. Let T ∈ Aut(X, µ) be aperiodic. For every A ∈ MAlg(X, µ), there exists a periodic U ∈ [T ]1 whose support is equal to A and all whose orbits have cardinality at most 3. 37 Proof. Consider the induced transformation TA , which belongs to [T ]1 by Proposition 3.5. Since T is aperiodic, supp TA = A. By a maximality argument, there is a partition (A1 , A2 , B1 , B2 , B3 ) of A such that TA (A1 ) = A2 , TA (B1 ) = B2 and TA (B2 = B3 ) (see [Fri70, Lem. 7.2]). We then have a naturally defined periodic element U ∈ [T ]1 given by  TA (x) if x ∈ A1 t B1 t B2    −1 TA (x) if x ∈ A2 U (x) = T −2 (x) if x ∈ B3    A x else. It is easily checked that U is as desired. Lemma 4.25. Let T ∈ Aut(X, µ) be aperiodic. For every Borel A ⊆ X, there exists U ∈ D([T ]1 ) whose support is equal to A and all whose orbits have cardinality at most 3. Proof. Consider the transformation U ∈ [T ]1 provided by the previous lemma. Observe that U = U2 U3 where U2 is the transformation induced by U on the set of points whose U -orbit has cardinality 2, and U3 is the transformation induced by U on the set of points whose U -orbit has cardinality 3. U3 is a commutator by the equality (1 2 3) = (1 2)(1 3)(1 2)(1 3) in the symmetric group over {1, 2, 3}. Let C be a fundamental domain of the restriction of U2 to its support. Applying the above lemma again, we find V ∈ [T ]1 all whose orbits have cardinality at most 3 such that supp V = C. We then let Ũ2 = U2 V U2 V −1 ∈ D([T ]1 ) which has the same support as U2 . Now U 0 = Ũ2 U3 is as desired. If every A ∈ MAlg(X, µ) were the support of an involution belonging to [T ]1 , one could take U from the previous lemma to be an involution. However X itself may fail to be the support of an involution (see Theorem 4.8 and the example thereafter). Theorem 4.26. Let T ∈ Aut(X, µ) be ergodic. Then neither D([T ]1 ) nor D([T ]1 ) are simple. The previous theorem follows trivially from the following statement which we will prove using Theorem 4.22. Lemma 4.27. Let T ∈ Aut(X, µ) be ergodic. Then there exists S1 , S2 ∈ D([T ]1 ) such that S1 cannot be written as a product of conjugates of S2±1 by elements of [T ]1 . Proof. Take A ∈ MAlg(X, µ) whose escape time is not integrable, which exists by Theorem 4.22. By Lemma 4.25, we may fix S1 ∈ D([T1 ]) whose support is equal to A and S2 ∈ D([T ]1 ) whose support B is disjoint from A. Now assume S1 is a product of S conjugates of S2±1 by T1 , ..., Tn ∈ [T ]1 . We must have A ⊆ ni=1 Ti (B), but then the integral of the escape time of A must be less than n X dT (Ti−1 , idX ) < +∞, i=1 a contradiction. 38 Remark. The two above results result are also true in the more general aperiodic case, but the non-trivial case is the ergodic one. Indeed, in the non-ergodic case we can directly use Lemma 4.25 to build two non-trivial elements in D([Φ]1 ) whose supports are T -invariant and disjoint, so the normal subgroups they generate actually intersect trivially. 4.5 Density of topological full groups, amenability and finiteness of the topological rank Theorem 4.28. Let T be a homeomorphism of the Cantor space, and let ν be a non-atomic ergodic probability measure preserved by T . Then the topological full group [T ]c is dense in the L1 full group [T ]1 . Proof. By Theorem 3.26, the group [T ]c contains D([Φ]1 ), in particular it contains every periodic element of [Φ]1 by Lemma 3.10. By Corollary 4.19 the group [T ]1 is generated by periodic elements along with T , and since T ∈ [T ]c we conclude that [T ]c = [T ]1 . So given a measure-preserving ergodic homeomorphism T of (2N , λ), we have the following chain of Polish groups where each is dense in its successor: [T ]c 6 [T ]1 6 [T ] 6 Aut(2N , ν). I don’t know whether the above theorem can be generalised to other finitely generated groups acting by measure-preserving homeomorphisms. Recall however that this result is wrong for graphings in general (see Example 3.27). Recall that a topological group is amenable if all its continuous actions on compact spaces admit invariant probability measures. Note that if a topological group contains a dense subgroup which is amenable as a discrete group, it has to be amenable itself. We view countable groups as discrete groups. Juschenko and Monod have shown that topological full groups of minimal Z-actions on the Cantor space are amenable [JM13]. Since the Jewett-Krieger theorem ensures us that every ergodic Z-actions can be modelled by a minimal uniquely ergodic homeomorphism (see e.g. [Pet89]), the previous theorem has the following interesting application. Theorem 4.29. Let T ∈ Aut(X, µ) be ergodic. Then its L1 full group [T ]1 is an amenable topological group, and so is the closed subgroup D([T ]1 ). It would be interesting to obtain a purely ergodic-theoretic proof of the previous result. The same is true of our next result where we rely on Matui’s work on finite generation of topological full groups (the commutator group of the topological full group of a minimal homeomorphism is finitely generated if and only if the homeomorphism is a subshift of finite type, see [Mat06, Thm. 5.4]). We should also point out that our proof of (1)⇒(2) is a natural adaptation of his. Theorem 4.30. Let T ∈ Aut(X, µ) be ergodic. Then the following are equivalent 1. the L1 full group [T ]1 is topologically finitely generated; 39 2. the closed subgroup D([T ])1 is topologically finitely generated; 3. the transformation T has finite entropy. Proof. (1)⇒(3) Suppose that [T ]1 is topologically finitely generated, and let S1 , ..., Sk ∈ [T ]1 generate a dense subgroup of [T ]1 . For each i ∈ {1, ..., k} and each n ∈ Z let Ai,n := {x ∈ X : cSi (x) = n}. Since S1 , ..., Sk ∈ [T ]1 , for every i ∈ {1, ..., k} we have X |n| µ(Ai,n ) < +∞ n∈Z Lemma 2.13 thus yields that every partition (Ai,n )n∈N has finite entropy. The partiW tion P := ki=1 (Ai,n )n∈Z thus has finite entropy. We will show that it is a generating partition. Let A be the algebra generated by the T -translates of P. Note that every element of the group generated by S1 , ..., Sk must have a cocycle partition whose elements belong to A. Since P has finite entropy, in order to conclude that T has finite entropy we only need to check that A is dense in MAlg(X, µ). For every Borel set A the transformation induced by T on A has support equal to A and can be approximated by elements of the group generated by S1 , ..., Sk in the metric d˜T which refines the uniform metric du . So the supports of these transformations form a sequence (An ) whose elements belong to Q such that µ(An 4 A) → 0. We can conclude that up to measure zero, Q generates the σ-algebra of X. As explained before, this yields that T has finite entropy. (3)⇒(2) : If T has finite entropy, Krieger’s finite generator theorem yields that we can take T to be a minimal subshift of finite type [Kri72]. It then follows from Matui’s result [Mat06, Thm. 5.4] that D([T ]c ) is finitely generated. So by Theorem 4.28 the Polish group D([T ]1 ) is topologically finitely generated. (2)⇒(1): Suppose D([T ]1 ) is topologically finitely generated. It follows from Corollary 4.20 that [T ]1 = D([T ]1 ) o hT i , so [T ]1 is also topologically finitely generated. We now give a concrete example where the topological rank is equal to 2. Proposition 4.31. The topological rank of the L1 full group of an irrational rotation is equal to 2. Proof. The topological generators that Marks built in [Mar16] to show that the full group of the ergodic hyperfinite equivalence relation is topologically 2-generated can readily be used. To be more precise, consider an irrational rotation Tα on [0, 1[ of irrational angle α ∈ [0, 1[. Let β ∈ (0, α) be irrational and consider the involution ITα ,[0,β[ as defined in the paragraph preceding Theorem 3.14. The exact same proof as Marks’ shows that the group topologically generated by Tα and ITα ,[0,β[ contains all the involutions ITα ,A where A is any Borel subset of [0, 1[ 40 such that A ∩ Tα (A) = ∅ (indeed the uniform and the L1 topology coincide on the set of involutions of the form ITα ,A so Marks’ proof readily applies). So the group topologically generated by Tα and ITα ,[0,β[ contains D([Tα ]1 ) by Theorem 3.14. But by Corollary 4.20 we have [Tα ]1 = D([T ]1 ) o hT i , so the group topologically generated by Tα and ITα ,A is equal to [Tα ]1 which has thus topological rank at most 2. Since [Tα ]1 is not abelian, we conclude that its topological rank is equal to 2. Remark. Matui’s work [Mat13, Prop. 3.2] can also be used to obtain the above result for irrational rotations of angle α ∈ (0, 1/6). 5 5.1 Further remarks and questions Non-amenability Theorem 5.1. Let Γ be a finitely generated non amenable group acting freely in a measure-preserving manner on (X, µ). Then neither [Γ]1 nor D([Γ]1 ) are amenable. Proof. Let Γ be a finitely generated non amenable group acting freely in a measurepreserving manner on (X, µ). It follows from Theorem 3.7 that [Γ]1 is dense in [RΓ ] for the uniform topology. Since Γ is infinite and acting freely, the equivalence relation RΓ is aperiodic so the group [RΓ ] is perfect by [LM14b, Prop. 3.6]. So D([Γ]1 ) is also dense in [RΓ ]. Furthermore, the group [RΓ ] is non-amenable for the uniform topology by [GP07, Prop. 5.6]. So the dense subgroups [Γ]1 and D([Γ]1 ) are not amenable for the uniform topology, in particular they are not amenable for the thinner L1 topology. It would be very interesting to understand which amenable groups admit free actions whose L1 full groups are amenable. Note that by Theorem 4.29, all the free ergodic Z-actions induce an amenable L1 full group. 5.2 Absence of a natural closure property Full groups as defined by Dye are stable under cutting and pasting a countable family of elements along a countable partition of X. Here L1 full groups are only stable under cutting and pasting a finite family of elements, and it seems natural to wonder if they can be more abstractly characterised. Here we show that L1 full groups are not “stable under L1 cutting and pasting”, showing that the most natural closure property one could hope for does not hold. Theorem 5.2. There exists an ergodic measure-preserving transformation T and a non-null Borel set A ⊆ X such that [TA ]1 66 [T ]1 . Remark. A reformulation of the theorem is that the inclusion [T ]1 A 6 [TA ]1 can be strict. In particular, given S ∈ [T ]1 , it can happen that [S]1 66 [T ]1 . 41 Proof. We fix a Borel partition (Xn )n>1 of X such that for every n ∈ N, µ(Xn ) = 2−n . 4n −1 We then cut each Xn into 4n pieces (Bn,m )m=0 of equal measure (so µ(Bn,m ) = 8−n ). Let T0 be a periodic transformation such that • for all n ∈ N and m ∈ {0, ..., 4n − 2}, one has T0 (Bn,m ) = Bn,m+1 and n • for all n ∈ N and x ∈ Bn,0 one has T04 +1 (x) = x. F Then the set B0 := n∈N Bn,0 is a fundamental domain for T0 . Let U be a measure-preserving transformation such that supp U = B0 and UB0 is ergodic, and consider T := U T0 . By Proposition 2.5, T is ergodic. Moreover for all n ∈ N and m ∈ {0, ..., 4n − 1} we have T (Bn,m ) = Bn,m+1 . Now for all n ∈ N we let An := n −1 2G Bn,2n m m=0 and then A := G An . n∈N Consider the transformation TA , and note that by construction for all n ∈ N, n all m ∈ {0, 2n − 2} and all x ∈ Bn,2n m we have TA (x) = T 2 (x). Now consider the involution Un defined by  4n /2 F n /2−1 Bn,2n m (x) if x ∈ 2m=0  T F2n −1 n /2 −4 Un (x) = T (x) if x ∈ m=2n /2 Bn,2n m  x else. TA T B2,0 B2,3 B2,7 B2,11 U3 Figure 1: The construction of U3 . The set A3 is the gray part of the figure. Note that for all x ∈ An we have dT (x, Un (x)) = 4n /2. We can then compute dT (Un , idX ) = n −1 Z 2X m=0 n Bn,2n m n 4 2 × n 8 2 1 = 2 = 42 dT (x, Un (x)) Also for all x ∈ An we have dTA (x, Un (x)) = 2n /2 so the same computation as before yields 1 2n 2n = n+1 dTA (Un , idX ) = n × 8 2 2 Let U be the involution obtained by gluing together all the Un ’s, namely for all x∈X  Un (x) if x ∈ An for some n ∈ N, U (x) = x else. We clearly have X X1 = +∞ 2 n∈N n∈N X X 1 1 and dTA (U, idX ) = dTA (Un , idX ) = = < +∞. n+1 2 2 n∈N n∈N dT (U, idX ) = dT (Un , idX ) = We conclude that U witnesses the fact that [TA ]1 66 [T ]1 . Recall that two actions of finitely generated groups Γ and Λ are L1 orbit equivalent if up to a measure-preserving transformation, they share the same orbits and for every λ ∈ Λ and γ ∈ Γ, the maps x 7→ dΓ (x, λ(x)) and x 7→ dΛ (x, γ(x)) are integrable, where dΓ and dΛ are respective Schreier graph distances (see e.g. [Aus16] for more on this notion). Here we note that although sharing the same L1 full group implies L1 orbit equivalence, the converse does not hold a priori. Corollary 5.3. There exists two measure-preserving actions of the free group on two generators F2 such that the identity map is an L1 -orbit equivalence between them but they do not share the same L1 full group. Proof. Write F2 = ha, bi, fix T ∈ Aut(X, µ) and A ⊆ X as in the proof of the previous theorem. Define a measure-preserving F2 -action α1 by α1 (a) = T and α2 (b) = T . Then define a second action α2 by α2 (a) = TA and α2 (b) = T TA−1 . Since TA ∈ [T ]1 these two actions are L1 orbit equivalent via the identity map. However a map U as in the proof of the previous theorem belongs to the L1 full group of α2 , but not to the L1 full group of α2 . Remark. Obviously L∞ orbit equivalence implies conjugacy of the L1 full groups. It would be interesting to understand wether the converse holds. 5.3 Lp full groups Let p ∈ [1, +∞]. One can then define Lp full group [Φ]p of a graphing Φ on a standard probability space (X, µ) by letting [Φ]p = {T ∈ [RΦ ] : the map x 7→ dΦ (T (x), x) belongs to Lp (X, µ)} . 43 The triangle inequality and Minkowski’s inequality yield that [Φ]p is indeed a group, and the natural distance d˜pΦ given by d˜pΦ (S, T ) = kx 7→ dΦ (S(x), T (x))kp is right-invariant, complete and refines the uniform topology. Moreover Hölder’s inequality implies that [Φ]q 6 [Φ]p whenever p < q. Note that the L∞ full group is discrete since dΦ takes values in Z. It is also uncountable hence we view it as a degenerate case. For p < +∞ however, one can show exactly like for p = 1 that [Φ]p is separable, so that it is also a Polish group. The proof that [Φ]1 is dense in [RΦ ] actually implies that [Φ]∞ is dense in [RΦ ] so that all the [Φ]p are dense in [RΦ ]. Also D([Φ]∞ ) is dense in D([Φ]p ) for all p ∈ [1, +∞[, but it is not clear wether [Φ]p is dense in [Φ]q for q < p. The main difference with L1 full groups is that for p > 1 the Lp full groups are not stable under taking induced transformations. Indeed, given a set A such that 0 < µ(A) < 1 and a map f : A → N of integral 1, one can use Lemma 2.4 to build a measure-preserving ergodic transformation T whose return time to A equates f . So if f was chosen not to be in Lp the transformation induced by T on A won’t belong to the Lp full group of T . If T is an ergodic measure-preserving transformation, the Lp full group of T is a complete invariant of flip conjugacy since it also has many involutions and is a subgroup of the L1 full group. The index map on [T ]1 restricts to its Lp full group and yields a surjective homomorphism [T ]p → Z. The kernel of this homomorphism clearly contains D([T ]p ) but it is unclear wether the converse holds, in which case we would have that [T ]p is dense in [T ]q for q < p by arguments similar of those used for Theorem 4.28. One way to establish the converse would be to obtain an analogue of Theorem 4.18. To begin with, we can still write every element of [T ]p as a a product of three elements of disjoint supports, the first being almost positive, the second almost negative and the third periodic (the proof of 4.13 readily adapts). But the problem is to understand wether almost positive elements admit a decomposition as a product of periodic elements and induced transformations belonging to [T ]p (cf. Prop. 4.14 and Prop. 4.16 for the case p = 1). Since D([T ]1 ) = Ker I, a positive answer to the following general question would also imply that D([T ]p ) = Ker I. Question 5.4. Let Φ be an ergodic graphing. Is it true that for all p ∈]1, +∞[ we have the equality D([Φ]1 ) ∩ [Φ]p = D([Φ]p ), where the closure in the left term is in the L1 topology while the closure in the right term is in the Lp topology? 5.4 Questions We close this paper by recalling some questions scattered through the text and asking a few more. The first was contained in the previous section. Question 5.5. Let 1 6 p < q 6 +∞. Is it true that [Φ]q is dense in [Φ]p ? 44 Note that a positive answer for q = +∞ yields a positive answer for every 1 6 p < q 6 +∞. When Φ is a continuous graphing, we obviously have [Φ]c 6 [Φ]∞ . We thus also ask: Question 5.6. Let Φ be a finite continuous graphing and 1 6 p < +∞. Is it true that [Φ]c is dense in [Φ]p ? Note that the answer is negative if we remove the condition that Φ is finite (cf. Example 3.27). We have seen that the L1 full group of an ergodic measurepreserving transformation T is topologically finitely generated if and only if T has finite entropy, and gave examples where the topological rank of [T ]1 is equal to 2. One could hope that there is a formula linking the topological rank to entropy as is true for cost and topological rank of full groups [LM14a], but for now we don’t even know the answer to the following very basic and pessimistic question. Question 5.7. Let T be an ergodic measure-preserving transformation of finite entropy. Is the topological rank of [T ]1 necessarily equal to 2? Using Lemma 2.1 from [Aus16], our proof that if [T ]1 is topologically finitely generated then T has finite entropy can easily generalised to show that given a measure-preserving ergodic free action of a finitely generated group Γ, if the L1 full group of the action or the closure of its derived group are topologically finitely generated then the Γ-action has a generating partition of finite entropy (i.e. the action has finite Rohlin entropy; see [Sew14] for more on Rohlin entropy). The following question is very general, but answering it for some non virtually cyclic infinite amenable group would already be very nice (in the amenable case the Rohlin entropy is equal to the usual entropy by a result of Seward and Tucker-Drob [STD14]). Question 5.8. Let Γ be a finitely generated group acting freely and ergodically on (X, µ). Suppose further that the action has finite Rohlin entropy. Is it true that [Γ]1 has finite topological rank? That D([Γ]1 ) has finite topological rank? It would also be interesting to try to generalise our structural results on L1 full groups of ergodic Z-actions to Zn -actions. For instance, given a measure-preserving ergodic Zn -action, one can still define an index map In : [Zn ]1 → Rn and ask for analogues of Corollary 4.20. Question 5.9. Does the index map In take values into Zn when the canonical generators of Zn act ergodically? Is the kernel of In equal to the closure of the derived group of [Zn ]? Our positive answer to this question for n = 1 relied crucially on the decomposition of elements of [T ]1 as products of almost positive, almost negative and periodic elements of disjoint supports, but it is not clear what an analogue of this in higher dimension would be so that another approach is probably needed. We should mention that in the case of a single ergodic measure-preserving transformation T , one can use the ideas from section 4.3 to show that the open unit ball in [T ]1 only consists of periodic elements. Since those belong to D([T ]1 ) (cf. Lemma 3.10), this yields another way to prove that D([T ]1 ) is open. We thus ask: 45 Question 5.10. Let a finitely generated group Γ act freely on (X, µ) with all its generators acting ergodically. When does the open unit ball in [Γ]1 only contain periodic elements? The fact that for an ergodic measure-preserving transformation T the open unit ball of the L1 full group only contains periodic elements can be used to show that [T ]1 has Rosendal’s local property (OB) and is (OB) generated, so that by Rosendal’s work it has a well defined quasi-isometry type as a topological group (see [Ros14]). This will be the subject of a later work. Finally, full groups of ergodic measure-preserving equivalence relations can be seen as special cases of L1 full groups (see Example 3.2). They enjoy the automatic continuity property as was shown by Kittrell and Tsankov [KT10, Thm. 1.5] and hence admit a unique Polish group topology. Question 5.11. Let Φ be an ergodic graphing. Does [Φ]1 satisfy the automatic continuity property? Is its Polish group topology unique? References [Aus16] Tim Austin. Behaviour of entropy under bounded and integrable orbit equivalence. ArXiv e-prints, 2016. [Bec98] Howard Becker. Polish group actions: dichotomies and generalized elementary embeddings. J. Amer. Math. Soc., 11(2):397–449, 1998. [Bel68] R. M. Belinskaya. Partitions of lebesgue space in trajectories defined by ergodic automorphisms. Functional Analysis and Its Applications, 2(3):190– 199, 1968. [CLM16] Alessandro Carderi and François Le Maître. Orbit full groups for locally compact groups. accepted for publication in Transactions of the AMS, 2016. [Dow11] Tomasz Downarowicz. Entropy in dynamical systems, volume 18 of New Mathematical Monographs. Cambridge University Press, Cambridge, 2011. [Dye59] Henry A. Dye. On groups of measure preserving transformation. I. Amer. J. Math., 81:119–159, 1959. [EG14] Amichai Eisenmann and Yair Glasner. Generic IRS in free groups, after Bowen. to appear in Proc. Amer. Math. Soc., 2014. [Fat78] Albert Fathi. Le groupe des transformations de [0, 1] qui préservent la mesure de Lebesgue est un groupe simple. Israel J. Math., 29(2-3):302– 308, 1978. [Fre04] D. H. Fremlin. Measure theory. Vol. 3. Torres Fremlin, Colchester, 2004. Measure algebras, Corrected second printing of the 2002 original. 46 [Fri70] Nathaniel A. Friedman. Introduction to ergodic theory. Van Nostrand Reinhold Co., New York-Toronto, Ont.-London, 1970. Van Nostrand Reinhold Mathematical Studies, No. 29. [FRW11] Matthew Foreman, Daniel J. Rudolph, and Benjamin Weiss. The conjugacy problem in ergodic theory. Ann. of Math. (2), 173(3):1529–1586, 2011. [GH09] Steven Givant and Paul Halmos. Introduction to Boolean algebras. Undergraduate Texts in Mathematics. Springer, New York, 2009. [Gla03] Eli Glasner. Ergodic theory via joinings, volume 101 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2003. [GP07] Thierry Giordano and Vladimir Pestov. Some extremely amenable groups related to operator algebras and ergodic theory. J. Inst. Math. Jussieu, 6(2):279–315, 2007. [GPS95] Thierry Giordano, Ian F. Putnam, and Christian F. Skau. Topological orbit equivalence and C ∗ -crossed products. J. Reine Angew. Math., 469:51– 111, 1995. [GPS99] Thierry Giordano, Ian F. Putnam, and Christian F. Skau. Full groups of Cantor minimal systems. Israel J. Math., 111:285–320, 1999. [Hal50] Paul R. Halmos. Measure Theory. D. Van Nostrand Company, Inc., New York, N. Y., 1950. [JM13] Kate Juschenko and Nicolas Monod. Cantor systems, piecewise translations and simple amenable groups. Ann. Math. (2), 178(2):775–787, 2013. [Kac47] Mark Kac. On the notion of recurrence in discrete stochastic processes. Bull. Amer. Math. Soc., 53:1002–1010, 1947. [Kec10] Alexander S. Kechris. Global aspects of ergodic group actions, volume 160 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2010. [Kri70] Wolfgang Krieger. On entropy and generators of measure-preserving transformations. Trans. Amer. Math. Soc., 149:453–464, 1970. [Kri72] Wolfgang Krieger. On unique ergodicity. In Proceedings of the Sixth Berkeley Symposium on Mathematical Statistics and Probability (Univ. California, Berkeley, Calif., 1970/1971), Vol. II: Probability theory, pages 327– 346. Univ. California Press, Berkeley, Calif., 1972. [KT10] John Kittrell and Todor Tsankov. Topological properties of full groups. Ergodic Theory Dynam. Systems, 30(2):525–545, 2010. 47 [Lev95] Gilbert Levitt. On the cost of generating an equivalence relation. Ergodic Theory Dynam. Systems, 15(6):1173–1181, 1995. [LM14a] François Le Maître. The number of topological generators for full groups of ergodic equivalence relations. Invent. Math., 198:261–268, 2014. [LM14b] François Le Maître. Sur les groupes pleins préservant une mesure de probabilité. PhD thesis, ENS Lyon, 2014. 2014ENSL0892. [LM15] François Le Maître. On full groups of non-ergodic probability measure preserving equivalence relations. to appear in Ergodic Theory Dyn. Syst., 2015. [Mar16] Andrew Marks. Topological generators for full groups of hyperfinite pmp equivalence relations. preprint, 2016. [Mat06] Hiroki Matui. Some remarks on topological full groups of Cantor minimal systems. Internat. J. Math., 17(2):231–251, 2006. [Mat13] Hiroki Matui. Some remarks on topological full groups of Cantor minimal systems II. Ergodic Theory Dynam. Systems, 33(5):1542–1549, 2013. [Med07] Konstantin Medynets. On approximation of homeomorphisms of a Cantor set. Fund. Math., 194(1):1–13, 2007. [Mil05] Benjamin David Miller. Density of topological full groups. Unpublished note available at https: // dl. dropboxusercontent. com/ u/ 47430894/ Web/ notes/ density. pdf , 2005. [Pet89] Karl Petersen. Ergodic theory, volume 2 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, 1989. Corrected reprint of the 1983 original. [Ros14] Christian Rosendal. Coarse geometry of topological groups. preprint, 2014. [Sew14] Brandon Seward. Krieger’s finite generator theorem for ergodic actions of countable groups i. ArXiv e-prints, 2014. [STD14] Brandon Seward and Robin D. Tucker-Drob. Borel structurability on the 2-shift of a countable group. ArXiv e-prints, 2014. 48
4