diff --git "a/Saturation Magnetization/6.json" "b/Saturation Magnetization/6.json" new file mode 100644--- /dev/null +++ "b/Saturation Magnetization/6.json" @@ -0,0 +1 @@ +[ { "title": "2402.11876v1.Hausdorff_dimension_of_random_attractors_for_a_stochastic_delayed_parabolic_equation_in_Banach_spaces.pdf", "content": "arXiv:2402.11876v1 [math.AP] 19 Feb 2024Hausdorff dimension of random attractors for a stochastic de layed\nparabolic equation in Banach spaces\nWenjie Hu1,2, Tom´ as Caraballo3,4∗, Yueliang Duan5.\n1The MOE-LCSM, School of Mathematics and Statistics, Hunan Norm al University,\nChangsha, Hunan 410081, China\n2Journal House, Hunan Normal University, Changsha, Hunan 4100 81, China\n3Dpto. Ecuaciones Diferenciales y An´ alisis Num´ erico, Facultad de Ma tem´ aticas,\nUniversidad de Sevilla, c/ Tarfia s/n, 41012-Sevilla, Spain\n4Department of Mathematics, Wenzhou University,\nWenzhou, Zhejiang Province 325035, China\n5Department of Mathematics, Shantou University, Shantou 51506 3, China\nAbstract\nThe main purpose of this paper is to give an upper bound of Hausdorff dimension of random at-\ntractors for a stochastic delayed parabolic equation in Banach spa ces. The estimation of dimensions\nof random attractors are obtained by combining the squeezing pro perty and a covering lemma of\nfinite subspace of Banach spaces, which generalizes the method es tablished in Hilbert spaces. Unlike\nthe existing works, where orthogonal projectors with finite rank s applied for proving the squeezing\nproperty of stochastic partial differential equations in Hilbert spa ces, we adopt the state decompo-\nsition of phase space based on the exponential dichotomy of the th e linear deterministic part of the\nstudied SDPE to obtain similar squeezing property due to the lack of s mooth inner product geom-\netry structure. The obtained dimension of the random attractor s depend only on the spectrum of\nthe linear part and the random Lipschitz constant of the nonlinear t erm, while not relating to the\ncompact embedding of the phase space to another Banach space a s the existing works did.\nKey words Hausdorff dimension, random dynamical system, random attra ctors, random delayed\ndifferential equation, stochastic delayed parabolic equat ion\n1 Introduction\nFor infinite dimensional random dynamical systems (RDSs), t he existence of random attractors can\nreduce the essential parts of the random flows to random compa ct sets. Furthermore, if the attractors\nhave finite Hausdorff dimension or fractal dimension, then th e attractors can be described by a finite\nnumber of parameters and hence the limit dynamics of the infin ite dimensional RDSs are likely to be\nstudied by the concepts and methods of finite dimensional RDS s. The study of random attractors for\nRDSs dates back to the pioneer works [12, 13, 23], where Craue l, Flandoli and Schmalfuß, amongst\nothers, generalized the concept of global attractors of infi nite dimensional dissipative systems and es-\ntablished the basic framework of random attractors for infin ite dimensional RDSs. Since then, the\nexistence, dimension estimation and qualitative properti es of random attractors for various stochastic\n∗Corresponding author. E-mail address: caraball@us.es (To m´ as Caraballo)\n1evolution equations have been investigated by many researc hers. For example, for the stochastic partial\ndifferential equations (SPDEs) without time delay, Caraball o et al. [6], Gao et al. [24] and Li and Guo\n[33] explored the existence of global attractors on bounded domains. In [2], [40] and [43], the authors\nobtained the existence of global attractors on unbounded do mains. For SPDEs with delay, the existence\nof random attractors and their qualitative properties have been extensively and intensively studied in\n[3, 7, 9, 26, 27, 32, 39] and the references therein.\nCriteria for the finiteHausdorff dimensionality of attracto rs for deterministic fluiddynamics models\nhave been derived by Douady and Oesterle [20], which was late r generalized by Constantin, Foias and\nTemam [11] and [44]. Then, it was further extended to the stochastic case in [14] and [35], where the\nRDS is first linearized and the global Lyapunov exponents of t he linearized mapping is then examined.\nDebussche showed that the random attractors of many RDSs hav e finite Hausdorff dimension by an\nergodicity argument in [18] and furthergave a precise bound on the dimension by combining the method\nof linearization andLyapunov exponents in[19]. [15, 21, 29 , 30, 42] considered thefractal dimensionality\nofrandomsetsandrandomattractors. Intherecentworks[38 ]and[43], theauthorsprovedthefiniteness\nof fractal dimension of random attractor for SPDEs with line ar multiplicative white noise by extending\nthe idea of [18] to obtain the existence of random exponentia l attractors.\nDespite the fact that the finite Hausdorff dimension and fract al dimension of attractors for abstract\nRDSs and applications to SPDEs in Hilbert spaces have been ex tensively and intensively studied, to\nour best knowledge, the estimation of dimensions of stochas tic differential equations with delays, i.e.,\nthe stochastic partial functional differential equations (S PFDEs) have not been extensively studied\nsince their natural phase space are Banach spaces. The lack o f smooth inner product causes the\nexisting methods can not be directly applied. Therefore, in our recent work [25], we extend the method\nestablished in [37] to recast SPFDEs into an auxiliary Hilbe rt space and adopt the method established\nin [19] to give upper bound of the Hausdorff and fractal dimens ions of a delayed reaction-diffusion\nequation by requiring the nonlinear term to be twice continu ous and the first derivative satisfies certain\nconditions. Nevertheless, the natural phase space for SPFD Es are Banach spaces and recast SPFDEs\ninto Hilbert spaces are unnatural and the conditions are qui te strong and hence one naturally wonders\nwhat can we say about the Hausdorff dimension of random attrac tors for SPFDEs in their natural phase\nspace, i.e. the Banach spaces? Here, we extend the squeeze me thod in [18] for estimating dimensions\nof SPDEs in Hilbert spaces to SPFDEs in Banach spaces by combi ng the squeezing property and the\ncovering of finite subspace of Banach spaces. Unlike [18], wh ere orthogonal projector in Hilbert space\nand variational technique are adopted to obtain squeezing p roperty, we prove similar squeezing property\nby semigroup approach and a phase space decomposition based on the exponential dichotomy of linear\npart.\nItshouldbepointed out that in [8] and [36], theauthors prov ed theexistence of randomexponential\nattractors and uniform exponential attractors of random dy namical systems in Banach spaces based on\na smoothing property of the systems, which indicates the fini te fractal dimensionality of the systems.\nHowever, the fractal dimension obtained by smoothing prope rty may depend on the choice of another\nembedding space, which may vary from space to space. Further more, the dimension estimation depends\non the entropy number between two spaces for which is general ly quite difficult to obtain an explicit\nbound. Here, the dimension obtained by our method only depen ds on the inner characteristics of the\nstudied equation while not depend the entropy number betwee n two spaces.\nWe consider the following stochastic delayed parabolic equ ation with additive noise\n\n\n∂u\n∂t(x,t) = ∆u(x,t)−µu(x,t)−σu(x,t−τ)+F(u(x,t))+f(u(x,t−τ))\n+/summationtextm\nj=1gj(x)dωj(t)\ndt,t>0,x∈ O,\nu0(x,s) =φ(x,s),−τ≤s≤0,x∈ O,\nu0(x,t) = 0,−τ≤t,x∈∂O,(1.1)\n2whereO ⊆RNis a bounded open domain with smooth boundary ∂O,{ωj}m\nj=1are mutually indepen-\ndent two-sided real-valued Wiener process on an appropriat e probability space to be specified below.\nEquation (1.1) can model many processes from chemistry or ma thematical biology. For instance, it\ncan be used to describe the evolution of mature populations f or age-structured species, where ∆ u(x,t)\nandF(u(x,t))−µu(x,t) represent the spatial diffusion and the death rate of mature i ndividuals,\nf(u(x,t−τ))−σu(x,t−τ) represents birth rate,/summationtextm\nj=1gj(x)dωj(t)\ndtstands for the random perturbations\nor environmental effects.\nWe organize the remaining part of this paper as follows. In Se ction 2, we review some results\nabout the existence of random attractors in the existing lit erature and prove the squeezing property of\nthe RDS generated by (1.1) on the random attractors. Then, we give upper bound of the Hausdorff\ndimension estimation for (1.1) in Section 3. At last, we summ arize the paper and point out some\npotential directions for future research in Section 4.\n2 Squeezing property\nThis section is concerned about the squeezing property of th e RDS generated by (1.1) on the random\nattractors. In order to adopt the RDS theory, as a first step, w e follow the idea of [16] to transform\nthe stochastic (1.1) into a random delayed equation, i.e., a path-wise deterministic delayed equation.\nThe same idea has been adopted by many authors when dealing wi th random attractors or invariant\nmanifolds for various stochastic evolution equations, suc h as [17, 26, 27, 32].\nWe consider the canonical probability space (Ω ,F,P) with\nΩ ={ω= (ω1,ω2,...,ω m)∈C(R;Rm) :ωi(0) = 0}\nandFis the Borel σ-algebra induced by the compact open topology of Ω ,whilePis the corresponding\nWiener measure on (Ω ,F). Then, we identify Wwith\nW(t,ω) = (ω1(t),ω2(t),...,ω m(t)) fort∈R.\nMoreover, we define the time shift by\nθtω(·) =ω(·+t)−ω(t),t∈R.\nThen,/parenleftbig\nΩ,F,P,{θt}t∈R/parenrightbig\nis a metric dynamical system. Consider the stochastic stati onary solution of\nthe one dimensional Ornstein-Uhlenbeck equation\ndzj+µzjdt= dωj(t),j= 1,...,m, (2.1)\nwhich is given by\nzj(t)/defineszj(θtωj) =−µ/integraldisplay0\n−∞eµs(θtωj)(s)ds, t∈R. (2.2)\nProposition 4.3.3 in [1] implies that there exists a tempere d function 0 ̺2>···with multiplicity\nn1,n2,···. Moreover, it follows from [41] that the characteristic val ues̺1>̺2>···of the linear part\nASare the roots of the following characteristic equation\nµ2\nm−/parenleftBig\nλ+µ−σe−λτ/parenrightBig\n= 0,m= 1,2,···. (2.13)\nWe introduce the following state decomposition results of t he linear part ASof (2.11) established\nin [41]. For any given ̺m<0,m≥1, there is a\nkm=n1+n2+···+nm (2.14)\ndimensional subspace XU\nkmsuch that\nX=XU\nkm/circleplusdisplay\nXS\nkm\nis the decomposition of Xby̺m. LetPkmandQkmbe the projection of XontoXU\nkmandXS\nkm\nrespectively, that is XU\nkm=PkmX,XS\nkm= (I−Pkm)X=QkmX. It follows from the definition of Pkm\nandQkmthat\n/bardblQkmS(t)x/bardbl ≤Ke̺mt/bardblx/bardbl, t≥0, (2.15)\nwhereKis a positive constant. Moreover, there exists a positive co nstantMsuch that\n/bardblS(t)φ/bardbl ≤Me̺1t/bardblφ/bardbl, (2.16)\nfor anyt≥0.\nFor the later use, we extend the domain of S(t) to the following space of some discontinuous\nfunctions\nˆC=/braceleftbigg\nφ: [−τ,0]→H;φ|[−r,0)is continuous and lim\nθ→0−φ(θ)∈Hexists/bracerightbigg\n(2.17)\n5and introduce the following variation of constants formula established in [41, Section 4.2, Theorem 2.1]\nvt(·,ω,φ) =S(t)φ+/integraldisplayt\n0S(t−s)X0[−Lz(θs+·ω)+F(v(s)+z(θsω))+f(vs+z(θs+·ω))+Az(θsω)]ds\n(2.18)\nfor anyt≥0, whereX0: [−τ,0]→B(X) is bounded linear operator on Xgiven byX0(θ) = 0 if\n−r≤θ<0 andX0(0) =Id.\nRemark 2.1. In general, the solution semigroup defined by (2.18)have no definition at discontinuous\nfunctions and the integral in the formula is undefined as an in tegral in the phase space. However, if\ninterpreted correctly, one can see that (2.18)does make sense. Details can be found in [5] Pages 144\nand 145.\nSubsequently, we prove the squeezing property of the RDS Φ.\nTheorem 2.1. LetPbe the finite dimensional projection PkmofXontoXU\nkm,K,M,̺ mandρ1being\ndefined by (2.15)and(2.16)respectively and assume Hypothesis A1 holds, then we have\n/bardblP[Φ(t,ω,ϕ)−Φ(t,ω,ψ)]/bardbl ≤Me(MLf+̺1)t+/integraltextt\n0R(θsω)ds/bardblϕ−ψ/bardbl (2.19)\nand\n/bardbl(I−P)[Φ(t,ω,ϕ)−Φ(t,ω,ψ)]/bardbl ≤[Ke̺mt+KM/radicalbig\n2(̺1−̺m)e[(MLf+̺1)t+/integraltextt\n0MR(θsω)ds+/integraltextt\n0R2(θsω)ds]\n+KMLfe[(MLf+̺1)t+/integraltextt\n0MR(θsω)ds]\n̺1−̺m]/bardblϕ−ψ/bardbl(2.20)\nfor anyt≥0andϕ,ψ∈ A(ω), whereR(θsω) =/summationtext2p−1\nk=1ak(c+(c+1)r(θsω))k−1withr(ω)being defined\nby(2.3)andcbeing a constant.\nProof.For anyφ,χ∈ A(ω), denote by y=φ−χandwt(·,ω) = Φ(t,ω,φ)−Φ(t,ω,χ) =ut(·,ω,φ)−\nut(·,ω,χ) =vt(·,ω,ϕ)−vt(·,ω,ψ), whereφ=ϕ+z(θ−τω) andχ=ψ+z(θ−τω) and hence y=φ−χ.\nThen it follows from (2.18) that\nwt(·,ω) =S(t)y+/integraldisplayt\n0S(t−s)X0[F(v(s,ω,ϕ)+z(θsω))−F(v(s,ω,ψ)+z(θsω))]ds\n+/integraldisplayt\n0S(t−s)X0[f(vs(·,ω,ϕ)+z(θs+·ω))−f(vs(·,ω,ψ)+z(θs+·ω))]ds.(2.21)\nTaking projection I−Pon both sides of (2.21) leads to\n/bardbl(I−P)wt(·,ω)/bardbl=/bardbl(I−P)S(t)y+/integraldisplayt\n0(I−P)S(t−s)X0[F(v(s,ω,ϕ)+z(θsω))−F(v(s,ω,ψ)+z(θsω))]ds\n+/integraldisplayt\n0(I−P)S(t)X0[f(vs(·,ω,ϕ) +z(θs+·ω))−f(vs(·,ω,ψ)+z(θs+·ω))]ds/bardbl\n≤Ke̺mt/bardbly/bardbl+/bardbl/integraldisplayt\n0(I−P)S(t−s)X0[F(v(s,ω,ϕ))−F(v(s,ω,ψ))]ds/bardbl\n+LfM/integraldisplayt\n0e̺1t/bardbl(I−P)ws/bardblds.\n(2.22)\n6Since we have assumed that Fis a polynomial with order 2 p−1, then we have\n/bardblF(v(t,ω,ϕ))−F(v(t,ω,ψ))/bardblH=/bardbl2p−1/summationdisplay\nk=1ak(vk(t,ω,ϕ)−vk(t,ω,ψ))/bardblH\n=/bardbl(v(t,ω,ϕ)−v(t,ω,ψ))2p−1/summationdisplay\nk=1akk−1/summationdisplay\nj=0(vk−1−j(t,ω,ϕ)vj(t,ω,ψ))/bardblH\n≤/bardbl(v(t,ω,ϕ)−v(t,ω,ψ))/bardblH2p−1/summationdisplay\nk=1akk−1/summationdisplay\nj=0/bardbl(vk−1−j(t,ω,ϕ)/bardbl/bardblvj(t,ω,ψ))/bardblH\n≤/bardbl(v(t,ω,ϕ)−v(t,ω,ψ))/bardblH2p−1/summationdisplay\nk=1ak(c+(c+1)r(θtω))k−1,\n(2.23)\nwhere the last inequality follows from the fact that v(t,ω,ϕ)∈ A(θtω)−z(θtω),v(t,ω,ψ)∈ A(θtω)−\nz(θtω) andA(θtω)+z(θtω)⊂ BX(0,c+(c+1)r(θtω)). Incorporating (2.23) into (2.22) gives\n/bardbl(I−P)wt(·,ω)/bardbl ≤Ke̺mt/bardbly/bardbl+M/integraldisplayt\n0R(θsω)e̺1(t−s)/bardbl(I−P)ws(·,ω)/bardblds\n+LfM/integraldisplayt\n0e̺1(t−s)/bardbl(I−P)ws(·,ω)/bardblds,(2.24)\nwhereR(θsω) =/summationtext2p−1\nk=1ak(c+(c+1)r(θsω))k−1. Multiplying both sides of (2.24) by e−̺1tgives\ne−̺1t/bardbl(I−P)wt(·,ω)/bardbl ≤Ke(̺m−̺1)t/bardbly/bardbl+M/integraldisplayt\n0R(θsω)e−̺1s/bardbl(I−P)ws(·,ω)/bardblds\n+LfM/integraldisplayt\n0e−̺1s/bardbl(I−P)ws(·,ω)/bardblds.(2.25)\nBy applying the Gronwall inequality, we have\ne−̺1t/bardbl(I−P)wt(·,ω)/bardbl ≤K/bardbly/bardbl[e(̺m−̺1)t+M/integraldisplayt\n0(R(θsω)+Lf)e(̺m−̺1)se/integraltextt\n0M(R(θrω)+Lf)drds]\n≤K/bardbly/bardbl{e(̺m−̺1)t+MeMLft+M/integraltextt\n0R(θsω)ds[/integraldisplayt\n0R(θsω)e(̺m−̺1)sds+Lf\n̺1−̺m]}\n≤K/bardbly/bardbl{e(̺m−̺1)t+MeMLft+M/integraltextt\n0R(θsω)ds[(/integraldisplayt\n0R2(θsω)ds)1\n2(/integraldisplayt\n0e2(̺m−̺1)sds)1\n2+Lf\n̺1−̺m]}\n≤K{e(̺m−̺1)t+MeMLft+M/integraltextt\n0R(θsω)ds[e/integraltextt\n0R2(θsω)ds1/radicalbig\n2(̺1−̺m)+Lf\n̺1−̺m]}/bardbly/bardbl,\n(2.26)\nwhere the third inequality follows from the H¨ older’s inequ ality and the last inequality follows from the\nfact that√x≤ex. (2.26) indicates that\n/bardbl(I−P)wt(·,ω)/bardbl ≤[Ke̺mt+KM/radicalbig\n2(̺1−̺m)e[(MLf+̺1)t+/integraltextt\n0MR(θsω)ds+/integraltextt\n0R2(θsω)ds]\n+KMLfe[(MLf+̺1)t+/integraltextt\n0MR(θsω)ds]\n̺1−̺m]/bardbly/bardbl.(2.27)\n7Subsequently, we prove the first part. Since S(t,σ)y=P(t)S(t,σ)y+(I−P(t))S(t,σ)y, we have\n/bardblPwt(·,ω)/bardbl=/bardblPS(t)y+/integraldisplayt\n0PS(t−s)X0[F(v(s,ω,ϕ)+z(θsω))−F(v(s,ω,ψ)+z(θsω))]ds\n+/integraldisplayt\n0PS(t−s)X0[f(vs(·,ω,ϕ)+z(θs+·ω))−f(vs(·,ω,ψ)+z(θs+·ω))]ds/bardbl\n≤Me̺1t/bardbly/bardbl+M/integraldisplayt\n0(R(θsω)+Lf)e̺1(t−s)/bardblPws(·,ω)/bardblds.(2.28)\nMultiplying both sides of (2.28) by e−̺1tgives rise to\ne−̺1t/bardblPwt(·,ω)/bardbl ≤M/bardbly/bardbl+M/integraldisplayt\n0(R(θsω)+Lf)e−̺1s/bardblPws(·,ω)/bardblds. (2.29)\nAgain, it follows from the Gronwall inequality that\ne−̺1t/bardblPwt(·,ω)/bardbl ≤MeM/integraltextt\n0(R(θsω)+Lf)ds/bardbly/bardbl, (2.30)\nimplying that\n/bardblPwt(·,ω)/bardbl ≤Me(MLf+̺1)t+/integraltextt\n0MR(θsω)ds/bardbly/bardbl. (2.31)\nThis proves the first part.\n3 Hausdorff dimensions of random attractors\nIn this section, we study the Hausdorff dimension of the attra ctorsA(ω) for the RDS generated by\n(1.1). The Hausdorff dimension of the random attractor A(ω)⊂Xis\ndH(A(ω)) = inf{d:µH(A(ω),d) = 0}\nwhere, ford≥0,\nµH(A(ω),d) = lim\nε→0µH(A(ω),d,ε)\ndenotes the d-dimensional Hausdorff measure of the set A(ω)⊂X, where\nµH(A(ω),d,ε) = inf/summationdisplay\nird\ni\nand the infimum is taken over all coverings of A(ω) by balls of radius ri/lessorequalslantε. It can be shown that\nthere exists dH(A(ω))∈[0,+∞] such that µH(A(ω),d) = 0 ford > dH(A(ω)) andµH(A(ω),d) =∞\nford0,r2>0, wherem= dimFandN/parenleftbig\nr1,BF\nr2/parenrightbig\nis the minimum number of balls needed to\ncoverBF\nr2by the ball of radius r1calculated in the Banach space X.\n8We can now establish the upper bound for the Hausdorff dimensi on of the random attractors for\nthe random dynamical system Φ( t,ω,φ) in the Banach space Xunder Hypothesis A1.\nTheorem 3.1. Assume Hypothesis A1 holds and there exists 0<α<2such that\n(αM+2K+2KMLf\n̺1−̺m+2KM/radicalbig\n2(̺1−̺m))e(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))t0<1.(3.2)\nThen, the Hausdorff dimension of the global attractor A(ω)of(1.1)satisfies\nd<−lnkm−kmln(2+4\nα)\nln(αM+2K+2KML f\n̺1−̺m+2KM√\n2(̺1−̺m))+(MLf+̺1+2E(R)+2E(R2))t0,(3.3)\nwherekmis the dimension of PXdefined by (2.14),K,M,̺ mandρ1being defined by (2.15)and(2.16)\nrespectively and R(θtω)is defined in Theorem 2.1.\nProof.SinceA(ω) is a compact subset of X, for any 0 < ε <1, there exist r1,...,rNin (0,ε] and\n˜u1,...,˜uNinXsuch that\nA(ω)⊂N/uniondisplay\ni=1B(˜ui,ri), (3.4)\nwhereB(˜ui,ri) represents the ball in Xof center ˜uiand radius ri. Without loss of generality, we can\nassume that for any i\nB(˜ui,ri)∩A(ω)/ne}ationslash=∅, (3.5)\notherwise, it can be deleted from the sequence ˜ u1,...,˜uN. Therefore, we can choose ui,i= 1,2,···,N\nsuch that\nui∈B(˜ui,ri)∩A(ω), (3.6)\nand\nA(ω)⊂N/uniondisplay\ni=1(B(ui,2ri)∩A(ω)). (3.7)\nIt follows from (2.19) and (2.20) that for any u∈B(ui,2ri)∩A(ω), we have\n/bardblP[Φ(t0,ω,u)−Φ(t0,ω,ui)]/bardbl ≤2Me(MLf+̺1)t0+/integraltextt0\n0MR(θsω)ds/bardblu−ui/bardbl. (3.8)\nand\n/bardbl(I−P)[[Φ(t0,ω,u)−Φ(t0,ω,ui)]]/bardbl ≤2[Ke̺mt+KM/radicalbig\n2(̺1−̺m)e[(MLf+̺1)t+/integraltextt\n0MR(θsω)ds+/integraltextt\n0R2(θsω)ds]\n+KMLfe[(MLf+̺1)t+/integraltextt\n0MR(θsω)ds]\n̺1−̺m]/bardblu−ui/bardbl.\n(3.9)\nBy Lemma 3.1, for any α>0, we can find y1\ni,...,yni\nisuch that\nBPX/parenleftBig\nPΦ(t0,ω,ui),2Me(MLf+̺1)t0+/integraltextt0\n0MR(θsω)dsri/parenrightBig\n⊂ni/uniondisplay\nj=1BPX/parenleftBig\nyj\ni,αMe(MLf+̺1)t0+/integraltextt0\n0MR(θsω)dsri/parenrightBig\n(3.10)\n9with\nni≤km2km/parenleftbigg\n1+2\nα/parenrightbiggkm\n, (3.11)\nwherekmis the dimension of PXand we have denoted by BPX(y,r) the ball in PXof radiusrand\ncentery.\nSet\nuj\ni=yj\ni+(I−P)Φ(t0,ω,ui) (3.12)\nfori= 1,...,N,j = 1,...,n i. Then, for any u∈B(ui,2ri)∩A(ω), there exists a jsuch that\n/vextenddouble/vextenddouble/vextenddoubleΦ(t0,ω,u)−uj\ni/vextenddouble/vextenddouble/vextenddouble≤/vextenddouble/vextenddouble/vextenddoublePΦ(t0,ω,u)−yj\ni/vextenddouble/vextenddouble/vextenddouble+/bardbl(I−P)Φ(t0,ω,u)−(I−P)Φ(t0,ω,ui)/bardbl\n≤(αMe(MLf+̺1)t0+/integraltextt0\n0MR(θsω)ds+2(Ke̺mt0+KMLfe[(MLf+̺1)t0+/integraltextt\n0MR(θsω)ds]\n̺1−̺m)\n+2KM/radicalbig\n2(̺1−̺m)e[(MLf+̺1)t0+/integraltextt0\n0MR(θsω)ds+/integraltextt0\n0R2(θsω)ds])ri\n≤(αM+2K+2KMLf\n̺1−̺m+2KM/radicalbig\n2(̺1−̺m))e[(MLf+̺1)t0+/integraltextt0\n0MR(θsω)ds+/integraltextt0\n0R2(θsω)ds])ri\n(3.13)\nwith\nni≤km(2+4\nα)km(3.14)\nDenote byη=αM+2K+2KML f\n̺1−̺m+2KM√\n2(̺1−̺m)andC(θt0ω) =e[(MLf+̺1)t0+/integraltextt0\n0MR(θsω)ds+/integraltextt0\n0R2(θsω)ds],\nthen we have\nΦ(t0,ω,B(ui,2ri))∩A(θt0ω)⊂ni/uniondisplay\nj=1B/parenleftBig\nuj\ni,ηC(θt0ω)ri/parenrightBig\n. (3.15)\nThanks to the invariance of A(ω), i.e.,A(θt0ω) = Φ(t0,ω,A(ω)), we have\nA(θt0ω)⊂N/uniondisplay\ni=1ni/uniondisplay\nj=1B/parenleftBig\nuj\ni,ηC(θt0ω)ri/parenrightBig\n. (3.16)\nThis implies that, for any d≥0,\nµH(A(θt0ω),d,ηC(θt0ω)ε)≤N/summationdisplay\ni=1ni/summationdisplay\nj=1ηdrd\ni≤km(2+4\nα)kmηdCd(θt0ω)N/summationdisplay\ni=1rd\ni, (3.17)\nwe deduce, by taking the infimum over all the coverings of A(ω) by balls of radii less than ε,\nµH(A(θt0ω),d,ηε)≤km(2+4\nα)kmηdCd(θt0ω)µH(A(ω),d,ε). (3.18)\nApplying the formula recursively for ktimes and by adopting the fact/integraltext(k−1)t0\n0[R(θrω)+R2(θsω)]dr+/integraltextkt0\n(k−1)t0[R(θrω)+R2(θsω)]ds=/integraltextkt0\n0[R(θrω)+R2(θsω)]ds, we have\nµH/parenleftBig\nA(θkt0ω),d,˜C(ω)(ηε)k/parenrightBig\n≤[km(2+4\nα)kmηd]k˜Cd(ω)µH(A(ω),d,ε), (3.19)\n10where˜C(ω) =e[(MLf+̺1)kt0+/integraltextkt0\n0MR(θsω)ds+/integraltextkt0\n0R2(θsω)ds]. Thanks to the ergodicity of θt,t∈R, for\nalmost allω∈Ω, we have\n1\nt[/integraldisplayt\n0R(θsω)ds+/integraldisplayt\n0R2(θsω)ds]→E(R(θtω))+E(R2(θtω)) (3.20)\nwhent→ ∞. Therefore, there exist k0(ω) such that for all k≥k0(ω), we have\n/integraldisplaykt0\n0R(θsω)ds+/integraldisplaykt0\n0R2(θsω)ds]≤2(E(R(θtω))+E(R2(θtω)))kt0. (3.21)\nimplying that\n˜C(ω)≤e(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))kt0 (3.22)\nIncorporating (3.22) into (3.19) gives\nµH/parenleftBig\nA(θkt0ω),d,˜C(ω)(ηε)k/parenrightBig\n≤[km(2+4\nα)km(ηe(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))t0)d]kµH(A(ω),d,ε),\n(3.23)\nHence, if\nd<−lnkm−kmln(2+4\nα)\nln(αM+2K+2KML f\n̺1−̺m+2KM√\n2(̺1−̺m))+(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))t0,(3.24)\nthen\nkm(2+4\nα)km(ηe(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))t0)d<1. (3.25)\nThus, by taking k→ ∞, we have (ηε)k→0 and (3.19) leads to\nµH(A(θkt0ω),d,(ηε)k˜Cd(ω))→0. (3.26)\nBy the ergodicity of θt,t∈R, we have\nµH(A(ω),d,ε)→0. (3.27)\nfor almost all ω∈Ω. This completes the proof.\nRemark 3.1. By(3.3), we can see estimation of dHdepends on the parameter α. If we take α↑2and\nassume2M+2K+2KML f\n̺1−̺m+2KM√\n2(̺1−̺m))e(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))t0<1, then for all α∈(0,2),\nwe haveαM+2K+2KML f\n̺1−̺m+2KM√\n2(̺1−̺m))e(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))t0<1and hence we obtain the\nestimation\ndH≤−lnΛ−Λln4\nln(2M+2K+2KML f\n̺1−̺m+2KM√\n2(̺1−̺m))+(MLf+̺1+2E(R(θtω))+2E(R2(θtω)))t0,(3.28)\nwhich is independent of α.\n114 Conclusions\nIn this paper, we give an upper bound of Hausdorff dimension of random attractors for a stochastic\ndelayed parabolic equation in Banach spaces that depends on ly on the inner characteristics of the\nequation, while not relating to the compact embedding of the phase space to another Banach space as\nthe existing works did. Similar procedures can also be emplo yed to study the fractal dimension. In\n[28], the authors proposed the Lyapunov dimension and gave t he famous Kplan-York formula, which\nwas proved to be correct for Navis-Stokes equation in Hilber t space in [14]. In [11], Constantin, Foias\nand Temam also showed the Lyapunov dimension can control the Hausdorff dimension and gave better\nestimation ofHausdorffdimensionthanthesqueezemethod, i .e., themethodweusedhere. Furthermore,\n[22] showed the dimension of chaotic attractor of delayed Ma ckey-Glass equation satisfies the Kplan-\nYork formula by numerical simulations and Ledrappier and Yo ung [31] showed the Kplan-York formula\nwas mathematically correct for random semiflow generated by stochastic ordinary differential equation,\nwhich heuristically inspire us to believe the Kplan-York fo rmula also holds for random delay differential\nequations in Banach spaces. Nevertheless, the rigorous the oretical proof are not established even for the\ndeterministic case maybe due to the lack of exterior product and tensor product of the Hilbert space\ngeometry structure, which will be studied in the near future .\nAcknowledgement. This work was jointly supported by the National Natural Scie nce Foundation\nof China grant 12201379, the Scientific Research Fund of Huna n Provincial Education Department\n(23C0013), China Scholarship Council(202008430247).\nTheresearch of T. Caraballo has beenpartially supportedby SpanishMinisterio deCiencia eInnovaci´ on\n(MCI), Agencia Estatal de Investigaci´ on (AEI), Fondo Euro peo de Desarrollo Regional (FEDER) under\nthe project PID2021-122991NB-C21.\nReferences\n[1] Arnold L.: Random Dynamical System, Springer-Verlag, New York , Berlin, (1998).\n[2] Bates P. W., Lu K., Wang B.: Random attractors for stochastic re action-diffusion equations on unbounded\ndomains. J. Differ. Equ. 246 (2009), 845-869.\n[3] Bessaih H., Garrido-Atienza M. J., Schmalfuß B.: Pathwise solutions and attractors for retarded SPDES with\ntime smooth diffusion coefficients. Disc. Contin. Dyn. Syst., 34 (2014 ), 3945-3968.\n[4] CaraballoT.: Nonlinear partialfunctional differential equations: Existence and stability. J. Math. Anal. Appl.\n262, 87-111 (2001).\n[5] Chow S. N., Mallet-Paret J.: Integral averaging and bifurcation. J. Differential Equations, 26 (1977), 112-159.\n[6] Caraballo T., Langa J. A., Robinson J. C.: Stability and random attra ctors for a reaction-diffusion equation\nwith multiplicative noise. Discrete Cont. Dyn. Syst., 6 (2000), 875-8 92.\n[7] Caraballo T., Garrido-Atienza M. J., Schmalfuß B.: Existence of exp onentially attracting stationary solutions\nfor delay evolution equations. Disc. Contin. Dyn. Syst., 18 (2007), 271-293.\n[8] Caraballo T., Sonner S.: Random pullback exponential attractors : General existence results for random\ndynamical systems in Banach spaces. Disc. Contin. Dyn. Syst., 37 ( 2017) 6383-6403.\n[9] Chueshov I., Lasiecka I., Webster J.: Attractors for delayed, n on-rotational von Karman plates with applica-\ntions to ow-structure interactions without any damping. Commun. Partial Differ. Equ., 39 (2014), 1965-1997.\n[10] Constantin P., Foias, C.: Global Lyapunov exponents, Kaplan-Y orke formulas and the dimension of the\nattractors for 2D Navier-Stokes equations. Comm. Pure Appl. Ma th. 38 (1985), 1-27.\n[11] Constantin P., Foias C., Temam R.: Attractors representing tur bulent flows. Memoirs Amer. Math. Soc., 53\n(1985), 314.\n12[12] Crauel H., Flandoli F.: Attractors for random dynamical syste ms. Probab. Theory Relat. Fields, 100 (1994),\n365-393.\n[13] Crauel H.: Random point attractors versus random set attra ctor. J. London Math. Soc., 63 (2002), 413-427.\n[14] Crauel H., Flandoli F.: Hausdorff dimension of invariant sets for r andom dynamical systems. J. Dynam.\nDiffer. Equ., 10 (1998), 449-474.\n[15] Cui H, Cunha A C, Langa J A.: Finite-dimensionality of tempered ra ndom uniform attractors. J. Nonlinear\nSci., 32 (2022), 13.\n[16] Duan J., Lu K., Schmalfuß B.: Invariant manifolds for stochastic p artialdifferential equations.Ann. Probab.,\n31 (2003), 2109-2135.\n[17] Duan J., Lu K., Schmalfuß B.: Smooth stable and unstable manifolds for stochastic evolutionary equations.\nJ. Dyn. Differ. Equ., 16 (2004), 949-972.\n[18] Debussche A.: On the finite dimensionality of random attractors . Stoch. Anal. Appl., 15 (1997), 473-491.\n[19] Debussche A.: Hausdorff dimension of a random invariant set. J. Math. Pures Appl., 77 (1998), 967-988.\n[20] Douady A., Oesterle J.: Dimension de Hausdorff des attracteurs . C.R. Acad. Paris Ser. A, 290 (1980),\n1135-1138.\n[21] Fan X.: Random attractors for damped stochastic wave equat ions with multiplicative noise. Inter. J. Math.,\n19 (2008), 421-437.\n[22] Farmer J. D.: Chaotic attractors of an infinite dimensional dyna mical systems. Physica 4D, (1982), 366-393.\n[23] Flandoli F., Schmalfuß B.: Random attractors for the 3D stocha stic navier-stokes equation with multiplica-\ntive white noise. Stoch. Stoch. Proc., 59 (1996), 21-45.\n[24] Gao H., Garrido-Atienza M. J., Schmalfuß B.: Random attractors for stochastic evolution equations driven\nby fractional Brownian motion. SIAM J. Math. Anal., 46 (2014), 228 1-2309.\n[25] Hu W, CaraballoT.: Topologicaldimensionsofrandomattractors for astochasticreaction-diffusionequation\nwith delay. https://arxiv.org/abs/2302.05501\n[26] Hu W., Zhu Q.: Random attractors for a stochastic age-struct ured population model. J. Math. Phys., 63\n(2022), 032703.\n[27] HuW., ZhuQ., CaraballoT.: Randomattractorsforastochasticn onlocaldelayedreactiondiffusion equation\non a semi-infinite interval. IMA J. Appl. Math. doi:10.1093/imamat/hxa d025\n[28] Kaplan J., Yorke, J.: Chaotic behaviour of multidimensional differe nce equations. Functional Difference\nEquations and Approximation of Fixed Points, Lecture Notes in Math ematics 730, Springer-Verlag, Berlin,\n(1979).\n[29] Langa J. A.: Finite-dimensional limiting dynamics of random dynamic al systems. Dyn. Syst., 18 (2003),\n57-68.\n[30] Langa J. A., Robinson J. C.: Fractal dimension of a random invaria nt set. J. Math. Pures Appl., 85 (2006),\n269-294.\n[31] Ledrappier F., Young, L.S.: Dimension formula for random transf ormations. Commun. Math. Phys. 117\n(1988), 529-548.\n[32] Li S., Guo S.: Random attractors for stochastic semilinear dege nerateparabolic equations with delay. Phys.\nA, 550 (2020), 124164.\n[33] Li Y., Guo B.: Random attractors for quasi-continuous random dynamical systems and applications to\nstochastic reaction-diffusion equations. J. Differ. Equ., 245 (2008 ), 1775-1800.\n[34] Man´ e R.: On the dimension of the compact invariant sets of cert ain nonlinear maps, in: Lecture Notes in\nMath., vol. 898, Springer-Verlag, Berlin/New York, 1981, pp. 230- 242.\n13[35] Schmalfuß B.: The random attractor of the stochastic Lorenz system. Z. Angew. Math. Phys., 48 (1997),\n951-975.\n[36] ShirikyanA., Zelik S.: Exponential attractorsfor random dynam ical systems and applications. Stoch. Partial\nDiffer. Equ. Anal. Comput., 1 (2013), 241-281.\n[37] So J. W-H., Wu J.: Topological dimensions of global attractors fo r semilinear PDEs with delays. Bull.\nAustralian Math. Soc., 43 (1991), 407-422.\n[38] Xu L., Huang J, Ma Q.: Random exponential attractor for stoch astic non-autonomous suspension bridge\nequation with additive white noise. Discrete Cont. Dyn. Syst. B, 27 ( 2022), 6323-6351.\n[39] Wang X., Lu K., Wang B.: Random attractors for delay parabolic eq uations with additive noise and deter-\nministic nonautonomous forcing. SIAM J. Appl. Dyn. Syst. 14 (2015 ), 1018-1047.\n[40] Wang X., Lu K., Wang B.: Wong-Zakai approximations and attract ors for stochastic reaction-diffusion\nequations on unbounded domains. J. Differ. Equ., 264 (2018), 378- 424.\n[41] Wu J.: Theory and applications of partial functional-differential equations, Springer-Verlag, NewYork, 1996.\n[42] ZhaoM., ZhouS.: Fractaldimension ofrandominvariantsets for nonautonomousrandomdynamical systems\nand random attractor for stochastic damped wave equation. Non linear Anal., 133 (2016), 292-318.\n[43] Zhou S.: Random exponential attractors for stochastic reac tion-diffusion equation with multiplicative noise\nin R3. J. Differ. Equ., 263 (2017), 6347-6383.\n[44] Zhou S., Zhao C., Wang Y.: Finite dimensionality and upper semicontin uity of compact kernel sections of\nnon-autonomous lattice systems. Discrete Cont. Dyn. Syst.-A, 2 1 (2008), 1259-1277.\n14" }, { "title": "2402.11888v1.The_Volterra_lattice__Abel_s_equation_of_the_first_kind__and_the_SIR_epidemic_models.pdf", "content": "arXiv:2402.11888v1 [nlin.SI] 19 Feb 2024The Volterra lattice, Abel’s equation of the\nfirst kind, and the SIR epidemic models\nAtsushiNobe\nFaculty of Political Science and Economics, Waseda University,\n1-6-1 Nishiwaseda, Shinjuku, Tokyo 169-8050, Japan\ne-mail:nobe@waseda.jp\nAbstract\nThe Volterra lattice, when imposing non-zero constant boun dary values, admits\nthe structureof a completely integrable Hamiltonian syste m if the system size is suffi-\nciently small. Such a Volterra lattice can be regarded as an e pidemic model known as\nthe SIR model with vaccination, which extends the celebrate d SIR model to account\nfor vaccination. Upon the introduction of an appropriate va riable transformation,\nthe SIR model with vaccination reduces to an Abel equation of the first kind, which\ncorresponds to an exact differential equation. The equipoten tial curve of the exact\ndifferential equation is the Lambert curve. Thus, the general solution to the ini-\ntial value problem of the SIR model with vaccination, or the V olterra lattice with\nconstant boundary values, is implicitly provided by using t he Lambert W function.\n1 Introduction\nThe Volterra lattice is a simultaneous system of infinitely many first-o rder differential\nequations that pertain to the nodes on a one-dimensional infinite lat tice [1, 2, 3]. By\nimposing an appropriate boundary condition, the Volterra lattice re duces to a completely\nintegrableHamiltonianflowonafinite-dimensional Poissonmanifold. Sig nificant boundary\nconditions that contribute to complete integrability include the perio dic boundary and the\nopen-end boundary. When the Volterra lattice imposes either the p eriodic or the open-end\nboundary, it admits a bi-Hamiltonian structure on the Poisson manifo ld, thereby providing\na sufficient number of conserved quantities [4, 5, 6] .\nInthis article, we consider another boundaryconditionthat contr ibutes tothe complete\nintegrabilityoftheVolterralattice: theboundarynodesareassign edconstantvalues, which\nare not necessarily zero. Although such a Volterra lattice has a Pois son structure, and\nhence, is a Hamiltonian flow on a finite-dimensional Poisson manifold, it d oes not admit a\nbi-Hamiltonian structure. Thus, the Volterra lattice with constant boundary values is, in\ngeneral, not a completely integrable Hamiltonian system. Neverthele ss, if the system size\n1is sufficiently small, the Volterra lattice exhibits complete integrability b ecause a sufficient\nnumber of conserved quantities immediately follow from the Hamiltonia n. If the system\nsize is two, the Volterra lattice with constant boundary values redu ces to an integrable\nepidemic model called the SIR model with vaccination [7], which is an exte nsion of the\nSIR model [8] under the influence of vaccination and is abbreviated t o the SIRv model. If\nthe system size is three, the Volterra lattice with constant bounda ry values also exhibits\nthe complete integrability; however, its significance as an epidemic mo del is unclear.\nUpon the introduction of an appropriate variable transformation, the SIRv model is\ntransformed into an exact differential equation via a first-order n onlinear differential equa-\ntion of degree three called Abel’s equation of the first kind [9, 10]. The exact differential\nequation thus obtained possesses the potential arising from the s ymplectic structure of\nthe Volterra lattice. Moreover, the invariant curve of the SIRv mo del, or the equipoten-\ntial curve of the Abel equation, is the Lambert curve. Hence, the general solution to the\nSIRv model, or the Volterra lattice with constant boundary values, is implicitly provided\nin terms of the Lamber W function [11]. In addition, an integrable discr etization of the\nSIRv model, possessing exactly the same conserved quantity as th e continuous model, is\nachieved through a geometric construction utilizing the Lambert cu rve [12].\nThis article is organized as follows. In $2, we introduce the Volterra lattice and briefly\nreview its Poisson structure. Then we show that the Volterra lattic e with constant bound-\nary values is a completely integrable Hamiltonian flow on the Poisson man ifold if the\nsystem size is either two or three. We moreover show that the two- dimensional Volterra\nlattice can be regarded as an epidemic model called the SIRv model. In $3, we investigate\nAbel’s equation of the first kind and show that it reduces to an exact differential equation\nif some conditions are satisfied. We also show that the Abel equation can be related with\nthe SIRv model. The equipotential curve of the exact differential e quation is the Lambert\ncurve, thereby the general solution to the initial value problems of the SIRv model, or the\ntwo-dimensional Volterra lattice with constant boundary values, is implicitly provided in\nterms of the Lambert W function. We devote to concluding remarks in$4.\n2 The Volterra lattice\nLetpa natural number. The following simultaneous system of inifinitely man y first-order\ndifferential equationsthatpertaintothenodesonaone-dimension al infinitelatticeiscalled\nthe Volterra lattice or the Lotka-Volterra system [1, 2, 3, 4, 5]\n˙ai=ai/parenleftBiggp/summationdisplay\nj=1ai+j−p/summationdisplay\nj=1ai−j/parenrightBigg\n(i∈Z), (1)\nwhereai=ai(t) is a differentiable function in tassigned to the i-th node, and “˙” denotes\nthe derivative with respect to t. Throughout this article, we assume p= 1, which achieves\nthe simplification of (1):\n˙ai=ai(ai+1−ai−1) (i∈Z). (2)\n22.1 Boundary conditions\nLet us consider the differentiable L-dimensional manifold\nV=RL(a1,a2,...,a L),\nwhere (a1,a2,...,a L) stands for the local, and hence, the global coordinates. The Volt erra\nlattices equipped with the following two boundary conditions are know n as completely\nintegrable Hamiltonian systems on the phase space V[4, 5, 6].\n(I) Periodic boundary ( ai=aL+i).\na1=aL+1a2 aL−1aL=a0\n(II) Open-end boundary ( a0=aL= 0).\na1 aL−1aL= 0 a0= 0\nThe exterior nodes a−1,a−2,...andaL+1,aL+2,...are not uniquely determined, even\nwhen the values of the inner nodes a0,a1,...,a Lare assigned. Actually, since\n0 = ˙a0=a0(a1−a−1) = 0(a1−a−1),\n0 = ˙aL=aL(aL+1−aL−1) = 0(aL+1−aL−1)\nholds, the nodes a−1andaL+1are arbitrary, thereby we inductively arrive at the\nclaim. Since a0=aL= 0 and the exterior nodes are arbitrary, the Volterra lattice\nwith the open-end boundary is a Hamiltonian system on the phase spa ceV=RL−1,\nmaking it a subsystem of the one with the periodic boundary (I) on V=RL.\nIn this article, we consider the third boundary condition with which th e Volterra lattice\n(2) is completely integrable Hamiltonian system on V=RMfor certain system sizes M:\n(III) Constant boundary ( a0=α,aM+1=β,α,β∈R\\{0}).\na1 aMaM+1=β a0=α\n3Contrary to (II), the exterior nodes a−1,a−2,...andaM+2,aM+3,...are uniquely\ndetermined as rational functions of the inner nodes a0,a1,...,a M+1via (2):\nai−1=ai+1−˙ai\nai(i <0),\nai+1=ai−1+˙ai\nai(i > M+1).\nIn particular, the nearest exterior nodes are reflective with resp ect to the boundary\nnodesa0andaM+1,\na−1=a1andaM+2=aM,\nsincea0/\\e}atio\\slash= 0,aM+1/\\e}atio\\slash= 0 and ˙ a0= ˙aM+1= 0. Hence, the system with the constant\nboundary is not a subsystem of the one with the periodic boundary ( I).\nNumerical examination implies that the Volterra lattice (2) with the co nstant bound-\nary (III) is, in general, not completely integrable. Nevertheless, t he Volterra lattice with\nthe constant boundary (III) exhibits the complete integrability if t he system size Mis\nsufficiently small, since it has a Poisson structure on V=RMfor anyM.\n2.2 Poisson structures\nBefore reviewing the Poisson structure, we introduce the two-fie ld form of the Volterra\nlattice. Let a2k=xkanda2k−1=yk. Then the Volterra lattice (2) reduces to the system\nof first-order ODEs called the two-field form\n˙xk=xk(yk+1−yk), (3)\n˙yk=yk(xk−xk−1) (4)\nfork∈Z.\nFirst remark the bi-Hamiltonian structure of the Volterra lattice (3 –4) on the 2 N-\ndimensional phase space\nV=R2N(x1,...,x N,y1,...,y N)\nwith the periodic boundary (I). We adopt the following convention: t he Poisson brackets\nare defined by writing down all non-vanishing brackets between the coordinate functions.\nWe say that two Poisson brackets on Vare compatible if their arbitrary linear combination\nis also a Poisson bracket on V.\nProposition 2.1 ([6]).Suppose the periodic boundary condition (I). The relations\n{xk,yk}2=xkyk,\n{xk,yk+1}2=−xkyk+1\n4define a quadratic Poisson bracket {·,·}2onV. The flow (3–4) is a Hamiltonian system on\n(V,{·,·}2) with the Hamiltonian function\nH1(x,y) :=N/summationdisplay\nk=1(xk+yk).\nAlso the relations\n{xk,yk}3=xkyk(xk+yk),\n{xk,yk+1}3=−xkyk+1(xk+yk+1),\n{xk,xk+1}3=−xkyk+1xk+1,\n{yk,yk+1}3=−ykxkyk+1\ndefine a cubic Poisson bracket {·,·}3onVcompatible with {·,·}2. The flow (3–4) is a\nHamiltonian system on ( V,{·,·}3) with the Hamiltonian function\nH0(x,y) :=1\n2N/summationdisplay\nk=1(logxk+logyk).\nThese Poisson structures are also valid for the open-end boundar y (II).\nLetF(V) be the set of smooth real-valued functions on the M-dimensional manifold\nV. ForF,G∈ F(V) and a Poisson bracket {·,·}onV, we have\n{F,G}=M/summationdisplay\ni,j=1Aij∂F\n∂ai∂G\n∂aj,\nwhereAij={ai,aj}forms the skew-symmetric M×Mmatrix as a coordinate represen-\ntation of the Poisson tensor.\nThe assertion in Proposition 2.1 can be confirmed as follows. For the c ubic Poisson\nbracket{,}3, we have\n{H0,xk}3=1\n2({logxk−1,xk}3+{logxk+1,xk}3+{logyk,xk}3+{logyk+1,xk}3)\n=1\n2/parenleftbigg\n−xk−1ykxk\nxk−1+xkyk+1xk+1\nxk+1−xkyk(xk+yk)\nyk+xkyk+1(xk+yk+1)\nyk+1/parenrightbigg\n=xk(yk+1−yk).\nFor the quadratic bracket {,}2, we also have\n{H1,xk}2={yk,xk}2+{yk+1,xk}2=xk(yk+1−yk).\nWe similarly obtain\n{H0,yk}3={H1,yk}2=yk(xk−xk−1).\n5Thus (3–4) defines two compatible Hamiltonian flows on V=R2N:\n˙xk={H1,xk}2={H0,xk}3,\n˙yk={H1,yk}2={H0,yk}3.\nMeanwhile, suppose the Volterra lattice (3–4) to have the constan t boundary (III). If\nwe consider the phase space\nV=R2N(x1,...,x N,y1,...,y N)\nof 2N-dimension then (3–4) reduces to\n˙y1=y1(x1−α), (5)\n˙xk=xk(yk+1−yk) for k= 1,2,...,N−1, (6)\n˙yk=yk(xk−xk−1) for k= 2,3,...,N, (7)\n˙xN=xN(β−yN). (8)\nWhereas, if the phase space is of (2 N−1)-dimension,\nV=R2N−1(x1,...,x N−1,y1,...,y N),\nthen\n˙y1=y1(x1−α), (9)\n˙xk=xk(yk+1−yk) for k= 1,2,...,N−1, (10)\n˙yk=yk(xk−xk−1) for k= 2,3,...,N−1, (11)\n˙yN=yN(β−xN−1). (12)\nLet us consider the following function H01(x,y) inxkandyk\nH01(x,y) :=N/summationdisplay\nk=1(xk+yk)−αN/summationdisplay\nk=1logxk−βN/summationdisplay\nk=1logyk. (13)\nIfM= 2Nthen the boundaries are x0=αandyN+1=β, and the derivative of H01with\nrespect to talways vanishes\n˙H01(x,y) =N/summationdisplay\nk=1(xkyk+1−xk−1yk)−αN/summationdisplay\nk=1(yk+1−yk)−βN/summationdisplay\nk=1(xk−xk−1)\n=βxN−αy1−α(β−y1)−β(xN−α) = 0.\nTherefore, H01is a conserved quantity of the system (5–8) for arbitrary α,β.\nIfM= 2N−1 then the boundaries are x0=αandxN=β, butH01is, in general, not\na conserved quantity; the derivative of H01with respect to tdoes not vanish:\n˙H01(x,y) =xN−1yN−αy1+yN(β−xN−1)−α(yN−y1)−β(β−α)\n=(yN−β)(β−α).\n6However, this computation suggests that if α=βthenH01is still a conserved quantity.\nMoreover, it implies that H01is divided into two conserved quantities G1andG2asH01=\nG1−αG2ifα=β, where\nG1(x,y) :=N/summationdisplay\nk=1(xk+yk)−αN/summationdisplay\nk=1logxk,\nG2(x,y) :=N/summationdisplay\nk=1logyk.\nNow, investigate the Poisson structure of the Volterra lattice (3– 4) equipped with the\nconstant boundary (III), or (5–8) and (9–12). We easily see tha t the Hamiltonians H0and\nH1in Proposition 2.1 are no longer conserved when the constant bound ary condition (I\nII) is imposed. However, we know that the function H01(see (13)) is still a conserved\nquantity of (5–8) for arbitrary α,β, and is of (9–12) when α=β. We then obtain the\nfollowing proposition concerning the Poisson structure of the Volte rra lattice with the\nconstant boundary (III).\nProposition 2.2. Suppose the constant boundary condition (III). If V=R2N, the flow\n(5–8) is the Hamiltonian system on the Poisson manifold ( V,{·,·}2) with the Hamiltonian\nfunction H01for anyα,β. Similarly, if V=R2N−1andα=β, the flow (9–12) is also the\nHamiltonian system on ( V,{·,·}2) withH01.\nProof.We have\n{H01,logxk}2=−xkyk\nxk+xkyk+1\nxk+βxkyk\nxkyk−βxkyk+1\nxkyk+1=yk+1−yk,\n{H01,logyk}2=xkyk\nyk−xk−1yk\nyk−αxkyk\nxkyk+αxk−1yk\nxk−1yk=xk−xk−1\nfor non-boundary nodes xkandyk. IfV=R2N, these are also valid for the boundary\nnodesy1andxNfor any boundary values α,β, since we have\n{H01,logy1}2=x1y1\ny1−αx1y1\nx1y1=x1−α,\n{H01,logxN}2=−xNyN\nxN+βxNyN\nxNyN=β−yN.\nWhereas, if V=R2N−1andα=β, at the boundary, we also have {H01,logy1}2=x1−α\nand\n{H01,logyN}2=−xN−1yN\nyN+αxN−1yN\nxN−1yN=α−xN−1=β−xN−1.\nHence the Hamiltonian flow\nd\ndtlogxk={H01,logxk}2=yk+1−yk,\nd\ndtlogyk={H01,logyk}2=xk−xk−1\n7is equivalent to the Volterra lattice (3–4) for both V=R2Nwith arbitrary α,βand\nV=R2N−1withα=β.\nRemark 1. In the limit as α,β→0, the constant boundary condition (III) reduces to the\nopen-end one (II), and H01consistently approaches H1, the Hamiltonian of the Volterra\nlattice with the open-end boundary (II) with respect to the P oisson bracket {,}2.\nFor the Poisson bracket {,}2on the 2N-dimensional phase space\nV=R2N(x1,...,x N,y1,...,y N),\nwe have the skew-symmetric 2 N×2NmatrixA= (Aij) of the Poisson tensor that possess\nthe following non-zero entries\nA2k−1,2k=−xkykand A2k,2k−1=xkykfork= 1,2,...,N,\nA2k,2k+1=−xkyk+1and A2k+1,2k=xkyk+1fork= 1,2,...,N−1.\nThe matrix Ais non-degenerate, thereby we also have a symplectic structure o nV.\nIn order to capture the symplectic structure, we introduce new c oordinate variables\nxk= logy1+logy2+···+logyk,\npk= logxk\nfork= 1,2,...,N. Then we have\n{pk,xk}2={logxk,logyk}2= 1\nfork= 1,2,...,Nand\n{pk,xk+1}2={logxk,logyk}2+{logxk,logyk+1}2= 0\nfork= 1,2,...,N−1. Hence x1,...,xN,p1,...,pNform canonically conjugate coordinates\non the symplectic manifold ( V=R2N,Ω) possessing the symplectic form\nΩ =N/summationdisplay\nk=1dpk∧dxk=N/summationdisplay\nk=1k/summationdisplay\nℓ=1dxk∧dyℓ\nxkyℓ. (14)\nThe symplectic manifold ( V,Ω) is called the canonical phase space of the Hamiltonian flow\n(5–8).\nIn these canonical coordinates, the hamiltonian H01is represented by\nH01(p,x) =N/summationdisplay\nk=1epk+N/summationdisplay\nk=1exk−xk−1−αN/summationdisplay\nk=1pk−βxN,\n8where we assume x0= 0. Hence we have\n∂H01\n∂pk=epk−α=xk−α,\n∂H01\n∂xk=exk−xk−1−exk+1−xk=yk−yk+1,\n˙xk=k/summationdisplay\nℓ=1˙yℓ\nyℓ=k/summationdisplay\nℓ=1(xℓ−xℓ−1) =xk−α,\n˙pk=˙xk\nxk=yk+1−yk.\nTherefore, the Volterra lattice (5–8) is canonically represented b y the Hamilton equations\n˙xk=∂H01\n∂pk, (15)\n˙pk=−∂H01\n∂xk(16)\nfork= 1,2,...,N.\nThus, we obtain:\nProposition 2.3. Suppose the constant boundary condition (III). The flow (5–8) is a\nHamiltonian system on the symplectic manifold ( V=R2N,Ω) with the Hamiltonian func-\ntionH01with respect to the symplectic form Ω given by (14).\nFor the Poisson bracket {,}2on the (2 N−1)-dimensional phase space\nV=R2N−1(x1,...,x N−1,y1,...,y N),\nthe skew-symmetric (2 N−1)×(2N−1) matrix of the Poisson tensor is degenerate, thereby\nit does not define a symplectic structure on V.\nIt should be remarked that the Hamiltonian H01and the functions Gi∈ F(V) (i= 1,2)\nare in involution with respect to the Poisson bracket {,}2onV=R2N−1,\n{H01,G1}2={H01,G2}2= 0.\nIndeed, we have H01=G1−αG2and\n{G1,G2}2=N/summationdisplay\nk=1{xk−αlogxk,logyk}2+N−1/summationdisplay\nk=1{xk−αlogxk,logyk+1}2\n=N/summationdisplay\nk=1(xk−α)−N−1/summationdisplay\nk=1(xk−α)\n=xN−α= 0,\nwhere we use the assumption xN=β=α. Thus, if α=β, there exist at least two func-\ntionally independent conserved quantities for the Hamiltonian flow (9 –12) on the Poisson\nmanifold ( V=R2N−1,{,}2).\n92.3 Complete integrability\nBy virtue of the above observation, we easily find two completely inte grable Hamiltonian\nsystems equipped with the constant boundary (III).\nThe first one is the case where M= 2NandN= 1. The Hamiltonian H01achieves\na sufficient number of conserved quantities since the phase space Vis of two-dimension.\nThe Hamiltonian flow (5–8) then reduces to\n˙x1=x1(β−y1), (17)\n˙y1=y1(x1−α), (18)\nand the Hamiltonian\nH01(x1,y1) =x1+y1−αlogx1−βlogy1\nto the conserved quantity.\nIfα >0 and as β→0, (17–18) is nothing but the SIR epidemic model [8], which is\nknown as an integrable dynamical system crucial for mathematical analysis on the spread\nof infectious diseases. Moreover, if α >0 andβ <0, (17–18) is an integrable extension\nof the SIR model under the influence of vaccination, called the SIRv model [7]. In the\nnext section, we will investigate (17–18) precisely, and reveal the relation with an exact\ndifferential equation via Abel’s equation of the first kind. We moreove r provide the general\nsolution to the initial value problem of (17–18) in terms of the Lamber t W function.\nAs mentioned earlier, the symplectic structure of (17–18) is explicit ly given as\nΩ =dp∧dx=dx1∧dy1\nx1y1, (19)\nwhere the canonically conjugate coordinates xandpare given by\nx= logy1andp= logx1.\nThe Hamiltonian in the canonically conjugate coordinates,\nH01(p,x) =ep+ex−αp−βx,\nsolves Hamilton’s canonical equations (15–16) of motion with N= 1.\nThe case where M= 2N−1 andN= 2 includes the second completely integrable sys-\ntem. In this three-dimensional system, we moreover assume α=β. Then the Hamiltonian\nflow (9–12) reduces to the system\n˙y1=y1(x1−α), (20)\n˙x1=x1(y2−y1), (21)\n˙y2=y2(α−x1), (22)\n10which possesses two conserved quantities:\nG1(x1,y1,y2) =y1+x1+y2−αlogx1,\nG2(x1,y1,y2) = logy1+logy2.\nHowever, having these conserved quantities is sufficient for (20–2 2) to exhibit complete\nintegrability, since the phase space Vis of three-dimension.\nWe can eliminate y2from (20–22) by employing the conserved quantity G2. LetG2be\na constant log ℓ(ℓ >0). Then we have y1y2=ℓ. By replacing y2withℓ/y1, (20–21) and\nG1respectively reduce to\n˙y1=y1(x1−α),\n˙x1=x1/parenleftbiggℓ\ny1−y1/parenrightbigg\nand\nG1(x1,y1) =y1+x1+ℓ\ny1−αlogx1.\nThis is a two-dimensional completely integrable system possessing th e conserved quantity\nG1, but it differs slightly from (17–18), or the SIRv model. In the limit as ℓ→0, it\napproaches the SIR model. However, its significance as an epidemic m odel has remained\nunclear.\n3 Abel’sequationofthefirstkind andtheSIRv model\nIn the previous section, we observed that the SIRv model is a comp letely integrable Hamil-\ntonian system on the symplectic manifold ( V=R2,Ω), where Ω is the symplectic form\n(19). Meanwhile, in this section, we investigate the SIRv model from another perspective\non integrability through a first-order nonlinear differential equatio n of degree three known\nas Abel’s equation of the first kind [10]. Abel’s equation of the first kind is a generaliza-\ntion of the Riccati equation, and similar to the Riccati equation, it ad mits the completely\nintegrability under certain conditions.\n3.1 Abel’s equation of the first kind\nLet us consider the following first-order nonlinear ODE of degree th ree pertaining to φ=\nφ(x)\ndφ\ndx=f0+f1φ+f2φ2+f3φ3, (23)\nwheref0,f1,f2andf3are meromorphic functions in x. The equation (23) is called Abel’s\nequation of the first kind if f3/\\e}atio\\slash≡0, whereas the Riccati equation if f3≡0 andf2/\\e}atio\\slash≡0.\nHereafter we assume f3/\\e}atio\\slash≡0, which makes (23) Abel’s equation of the first kind. We\nhave the following lemma [10].\n11Lemma 3.1. Iff0,f1,f2andf3satisfy\nf0≡0, (24)\nd\ndxlogf2\nf3=f1 (25)\nthen(23)reduces to an exact differential equation.\nProof.First introduce a new dependent variable ϕ=ϕ(x) such that\nφϕ= exp/parenleftbigg/integraldisplay\nf1dx/parenrightbigg\n=:F(x).\nIff0≡0, (23) reduces to the following ODE concerning ϕ:\nϕdϕ\ndx+f2Fϕ+f3F2= 0. (26)\nNext consider a function ̟inxandϕ:\n̟(x,ϕ) =e−(1+kϕ)−kG,\nwhere\nG(x) :=/integraldisplay\nf2Fdx=/integraldisplay\nf2exp/parenleftbigg/integraldisplay\nf1dx/parenrightbigg\ndx\nandkis the integration constant of (25):\nk=f2\nf3F.\nBy multiplying the integrating factor ̟, (26) reduces to the exact differential equation\ndΨ(x,ϕ) = 0 (27)\npossessing the potential\nΨ(x,ϕ) = (1+ kϕ)̟(x,ϕ).\nIndeed, we compute\ndΨ(x,ϕ) =−k2̟/bracketleftbig/parenleftbig\nf2Fϕ+f3F2/parenrightbig\ndx+ϕdϕ/bracketrightbig\n,\nwhich asserts the equivalence of (26) and (27).\n12The solution to the exact differential equation (27) is provided by us ing the Lambert\nW function W(z). Through the relationship w=W(z), this function parametrizes the\nfollowing non-algebraic curve on the ( z,w)-plane, known as the Lambert curve [11]:\n(wew−z= 0).\nThe Lambert W function W(z) is single-real-valued on [0 ,∞), while it is double-real-\nvalued on [ −e−1,0) and is not defined on ( −∞,−e−1) as a real function. We denote the\nbrach such that −1≤W(z)<0 byW0(z), and the one such that W(z)<−1 byW−1(z).\nHence the function\nW(z) =/braceleftBigg\nW0(z) (−e−1≤z <0),\nW(z) (z≥0)\nis real analytic on [ −e−1,∞). The Taylor series of W(z) about 0 is\n∞/summationdisplay\nn=0(−1)n+1nn−1\nn!zn\nwith the radius e−1of convergence.\nProposition 3.2. Let\nϕ(x) =−1\nk/bracketleftbig\nW/parenleftbig\n−Ψ0ekG/parenrightbig\n+1/bracketrightbig\n(28)\nusing the Lambert W function, where Ψ0is the initial value of the potential Ψ. Thenϕ\nsolves the initial value problem of the exact differential eq uation(27), which is equivalent\nto(26)with imposing (25).\nProof.First note that, given initial value x0ofx, the solution curve, or the equipotential\ncurve, of the exact differential equation (27) is given by\nΨ(x,ϕ) = (1+ kϕ)̟(x,ϕ) = Ψ(x0,ϕ(x0)) = Ψ0. (29)\nSince̟(x,ϕ) =e−(1+kϕ)−kG, we have\n−(1+kϕ)e−(1+kϕ)=−Ψ0ekG. (30)\nThe solution curve is the Lambert curve on the ( z,w)-plane by imposing\nz=−Ψ0ekGandw=−(1+kϕ).\nIt immediately follows\n−(1+kϕ) =W/parenleftbig\n−Ψ0ekG/parenrightbig\n(31)\nfrom (30). Thus the solution to the exact differential equation (27 ) is given by (28).\n13Corollary 3.3. Let\nφ(x) =F\nϕ=−kF\nW(−Ψ0ekG)+1. (32)\nThenφsolves the initial value problem of Abel’s equation (23)of the first kind with imposing\n(24)and(25).\nRemarkthatthereal-valuedLambertWfunction W(z)isdefinedonlyfor z∈[−e−1,∞)⊂\nR. Moreover, W(z) is double-valued and has the branch point only at z=−e−1. Given\ninitial value x0ofx, the initial value Ψ0of the potential Ψ( x,ϕ) at (x0,ϕ(x0)) is uniquely\ndetermined. Therefore, the solutions (28) and (32) potentially po ssess the branch point\nonly atxthat satisfies\nΨ0=e−kG(x)−1. (33)\nThe branches of W(z) in (28) and (32) are uniquely determined as follows.\n(1) If Ψ0>0 then the solution curve ϕ=ϕ(x) is restricted to the region\nS:={(x,ϕ)|kϕ >−1}\non the (x,ϕ)-plane, since ̟is always positive (see (29)). In this case, Wtakes negative\nvalue (see (31)), therefore, we have Ψ0≤e−kG−1, sinceW(z) is defined only on z≥ −e−1.\nThus Ψ0obeys\n0<Ψ0≤e−kG−1.\nMoreover, there exists exactly a branch point xwhen Ψ0>0 (see (33)), thereby ϕ(x)\nis double-valued on S. Let\nS−:={(x,ϕ)| −1< kϕ≤0} ⊂ S.\nSinceϕ(x) is given by (28), we choose the branch W0such that W0≥ −1 for (x,ϕ)∈ S−\nto give the solution (28). Whereas, we choose another branch W−1such that W−1<−1\nfor (x,ϕ)∈ S+to give (28), where we let\nS+:=S\\S−={(x,ϕ)|kϕ >0}.\n(2) If Ψ0<0 then the solution curve is contained in\nT:={(x,ϕ)|kϕ <−1}.\nFor such an initial value Ψ0of Ψ,Win (28) necessarily takes positive value. This is\nconsistent with the positivity of the independent variable −Ψ0ekG(x)ofW, because Wis\npositive single-valued on the positive real axis. Hence, for ( x,ϕ)∈ T, the solution (28) is\nuniquely given by the single-valued Wdefined on [0 ,∞).\n(3) Finally, if Ψ0= 0 then ( x,ϕ) is on the boundary between SandT. Hence,\nkϕ(x)≡ −1, thereby Ψ ≡0. This gives a constant solution to (26), which is a special\nsolution contained in (28).\nAbove discussion is summarized into the following:\n14Proposition 3.4. Assume(24)and(25)to be satisfied in order that Abel’s equation (26)\nof the first kind reduces to the exact differential equation (27). LetΨ0be the initial value\nof the potential Ψto(27).\n(1) IfΨ0>0, the Lambert W function Win the solution (28)to(26)is either\n(a) the branch W0for(x,ϕ)∈ S−or\n(b) the branch W−1for(x,ϕ)∈ S+,\nboth of which are defined on [−e−1,0).\n(2) IfΨ0≤0thenWin(28)is the single-valued W function defined on [0,∞).\n3.2 The SIRv model and its general solution\nNow, we relate Abel’s equation (23) of the first kind to the SIRv mode l (17—18), following\nthe approach of [9]. Introduce a new variable t=t(x) as an antiderivative of φ(x):\nt=/integraldisplay\nφ(x)dx.\nThen we find\ndx\ndt=1\ndt\ndx=1\nφand\nd2x\ndt2=d\ndt1\nφ=−1\nφ2dx\ndtdφ\ndx=−1\nφ3dφ\ndx.\nIt follows that we have\nφ=1\nx′anddφ\ndx=−x′′\n(x′)3,\nwhere we denote the derivative with respect to tby′for simplicity.\nThen Abel’s equation (23) of the first kind reduces to the second or der ODE\nx′′+f0(x′)3+f1(x′)2+f2x′+f3= 0.\nDividing by x, we obtain\n(logx)′′+f2(logx)′+f0\nx(x′)3+xf1+1\nx2(x′)2+f3\nx= 0. (34)\nLet us consider the following system of first-order ODEs\nx′=−xy+ax+b, (35)\ny′=xy+cy+d, (36)\n15wherea,b,c,d∈R. From the first equation (35), we have\ny=a+b\nx−(logx)′.\nBy substituting this into the second equation (36), we get\n(logx)′′−c(logx)′−x(logx)′+b\nx2+a(x+c)+b\nx(x+c)+d= 0.\nComparing this with (34), we see that, if\nf0= 0, f1=−1\nx, f2=−x−c,and\nf3=a(x+c)x+b/parenleftbigg\nx+c+1\nx/parenrightbigg\n+dx,\nthesystem (35–36) ofODEsreduces to Abel’sequation(23)ofthe first kind, which satisfies\n(24). Moreover, if b=d= 0, the condition (25) is also satisfied:\nd\ndxlogf2\nf3=d\ndxlog1\n−ax=−1\nx=f1,\nthereby (35–36) reduces to the exact differential equation (27) .\nThus, weobtainthefollowingpropositionthatclaimsarelationbetwee nAbel’sequation\nof the first kind and the SIRv model, thereby the integrability of the SIRv model via the\nexact differential equation.\nProposition 3.5. Let\nf0= 0, f1=−1\nx, f2=γ−x,andf3=ν(γ−x)x, (37)\nwhereγandνare real numbers, in particular, ν/\\e}atio\\slash= 0, since we assume f3/\\e}atio\\slash≡0. Then,(23)\nreduces to\ndφ\ndx=−1\nxφ+(γ−x)φ2+ν(γ−x)xφ3. (38)\nThe Abel equation (38)of the first kind is equivalent to\nx′=−xy−νx, (39)\ny′=xy−γy, (40)\nwhich is (35–36) with imposing\na=−ν, b= 0, c=−γ,andd= 0.\nMoreover, (39–40) attributes to the exact differential equa tion(27).\n16Suppose xandyrespectively stand for the populations of the susceptible and the\ninfected of an infectious disease. Also let γandνrespectively represent the transmission\nrate and the vaccination rate. Then the system (39–40) of ODEs g overns the spread of the\ninfectious diseases under the influence of vaccination, and is called t he SIRv model [7, 12].\nThus, when we call (39–40) the SIRv model, we assume γandνto be positive, since they\nrespectively stand for the rates of transmission and vaccination.\nThe discussion in the previous section leads to the following propositio n concerning the\nintegrability of the SIRv model on the Poisson mmanifold.\nProposition 3.6. Let\nx0=α=γ, x 1=x, x 2=β=−ν,andy1=y.\nThen the SIRv model (39–40) is the completely integrable Vol terra lattice (17–18) with the\nconstant boundary (III) on the Poisson manifold (V=R2,{,}2)possessing the Hamilto-\nnian\nH01(x,y) =x+y−γlogx+νlogy. (41)\nThe SIRv model (39–40) is also the Hamiltonian flow arising fr om the symplectic structure\nΩ =dx∧dy\nxy\non the symplectic manifold (V,Ω).\nRemark 2. Suppose ν= 0against our assumption f3=ν(γ−x)x/\\e}atio\\slash≡0. Then (39–\n40) reduces to the original SIR mode. Unfortunately, the dis cussion above, based on Abel’s\nequation of the first kind, is not valid for the SIR model. The S IR model can be investigated\nusing the Riccati equation instead of the Abel equation [12] .\nThe SIRv model attributes to Abel’s equation (38) of the first kind e mploying the\ncoefficients (37), which reduces to the exact differential equation (27). Hence the SIRv\nmodel (39–40) and the Volterra lattice (17–18) are exactly solved as follows.\nWe have\nF= exp/integraldisplay\nf1dx=CF\nx,\nG=/integraldisplay\nf2Fdx=CF(γlogx−x)+CG,\nwhereCFandCGare integration constants. Since eCGacts on̟, or Ψ, as a constant\nmultiplication, it does not affects the exact differential equation dΨ = 0. Hence, we can\nassumeCG= 0 without loss of generality. Moreover, since we define the consta ntkto be\nthe integration constant\nk=f2\nf3F=1\nνCF,\n17we may assume CF= 1 by putting k= 1/ν. Thus we obtain\nF=1\nx, G=γlogx−x,andk=1\nν.\nThen the equation (26) concerning ϕreduces to\nϕdϕ\ndx+γ−x\nxϕ+νγ−x\nx= 0. (42)\nThis attributes to the exact differential equation\ndΨ(x,ϕ) =d/bracketleftbigg/parenleftbigg\n1+1\nνϕ/parenrightbigg\n̟(x,ϕ)/bracketrightbigg\n= 0\nwith employing the integrating factor given by\n̟(x,ϕ) = exp/bracketleftbigg\n−/parenleftbigg\n1+1\nνϕ/parenrightbigg\n−1\nν(γlogx−x)/bracketrightbigg\n=x−γ\nνex\nν−ϕ\nν−1.\nThe potential is\nΨ(x,ϕ) =/parenleftbigg\n1+1\nνϕ/parenrightbigg\n̟(x,ϕ) =−1\nνexp/parenleftbiggH01\nν/parenrightbigg\n, (43)\nwhereH01is the Hamiltonian (41). Thus the potential Ψ is, of course, conserv ed through\nthe evolution. In addition, the exact differential equation dΨ = 0 is equivalent to Hamil-\nton’s canonical equation of motion,\ndH01(p,x) =∂H01\n∂pdp+∂H01\n∂xdx= 0,\non the symplectic manifold ( V=R2,Ω).\nRemark that, for any initial values x0,y0∈R, the initial value Ψ0of the potential is\nnegative when ν >0. Hence, if ν >0, by virtue of Proposition 3.4, the solution (28) to\n(42) is given by the single-valued Lambert W function Won [0,∞). Explicitly, we have\nϕ(x) =−ν/bracketleftbigg\nW/parenleftbigg1\nνxγ\nνe1\nν(H0\n01−x)/parenrightbigg\n+1/bracketrightbigg\n,\nwhereH0\n01:=H01(x0,y0). Similarly, the solution (32) to Abel’s equation (38) of the first\nkind is also provided by the single-valued W:\nφ(x) =−1\nνx/bracketleftbigg\nW/parenleftbigg1\nνxγ\nνe1\nν(H0\n01−x)/parenrightbigg\n+1/bracketrightbigg.\n18Since the independent variable tis the antiderivative of φ, the solution to the SIRv\nmodel (39–40) is implicitly given by\nt=−/integraldisplaydx\nνx/bracketleftbigg\nW/parenleftbigg1\nνxγ\nνe1\nν(H0\n01−x)/parenrightbigg\n+1/bracketrightbigg. (44)\nMoreover, since we have\ny=−ν−x′\nx\nform (39), we obtain\ny=νW/parenleftbigg1\nνxγ\nνe1\nν(H0\n01−x)/parenrightbigg\n, (45)\nifxsatisfies (44).\nWe summarize the discussion above into the following:\nTheorem 3.7. TheSIRvmodel(39–40) reducesto the exactdifferentialequa tiondΨ(x,ϕ) =\n0for the potential (43)by introducing ϕ= (logx)′. The solution to the initial value prob-\nlem of the SIRv model is implicitly provided by (44)and(45), whereH0\n01is the initial value\nof the conserved quantity. Remark that Wis the single-valued Lambert W function defined\non[0,∞), since we assume ν >0.\nFor the Volterra lattice (17–18), we have\nk=−1\nβ, ϕ=˙x1\nx1=β−y1,and Ψ =1\nβexp/parenleftbigg\n−H01\nβ/parenrightbigg\n.\nRemark that we assume β/\\e}atio\\slash= 0. If and only if β <0, Ψ0<0. Hence, according to\nProposition 3.4, ( x1,ϕ(x1)) = (x1,β−y1) is contained in T, thereby ( x1,y1) is in\n/tildewideT:={(x1,y1)|y1> β}.\nThe solution ( x1,y1) to the Volterra lattice (17–18) is given by the single-valued Lamber t\nW function.\nWhereas, ifandonlyif β >0,Ψ0>0. Hence, accordingtoProposition3.4,( x1,ϕ(x1)) =\n(x1,β−y1) is contained in S=S−∪S+, thereby ( x1,y1) is in\n/tildewideS=/tildewideS−∪/tildewideS+,\n/tildewideS−:={(x1,y1)|0< y1≤β},\n/tildewideS+:={(x1,y1)|y1> β}.\nThe solution ( x1,y1) to the Volterra lattice (17–18) is given by the branch W0of the\nLambert W function if ( x1,y1)∈/tildewideS−, while by the branch W−1if (x1,y1)∈/tildewideS+.\nThus, we obtain:\n19Theorem 3.8. The general solution to the initial value problem of the Volt erra lattice\n(17–18) is implicitly provided by\nt=/integraldisplaydx1\nβx1/bracketleftbigg\nW/parenleftbigg\n−1\nβx−α\nβ\n1e1\nβ(x1−H0\n01)/parenrightbigg\n+1/bracketrightbigg,\ny1=−βW/parenleftbigg\n−1\nβx−α\nβ\n1e1\nβ(x1−H0\n01)/parenrightbigg\n,\nwhereH0\n01is the initial value of the Hamiltonian H01. Ifβ <0, the function Wis the\nsingle-valued Lambert W function, whereas, if β >0,Wis the branch W0of the Lambert\nW function when (x1,y1)∈/tildewideS−, and is the branch W−1when(x1,y1)∈/tildewideS+.\n4 Concluding remarks\nWe investigate the complete integrability of the Volterra lattice with im posing the con-\nstant boundary condition (III) in terms of the Poisson structure {,}2and the symplectic\nstructure Ω on the phase space V=RM. We then find that the Volterra lattice has the\nsymplectic structure Ω if M= 2Nfor any boundary values α,β, and hence it achieves the\ncomplete integrability if M= 2. Such a Volterra lattice is nothing but the SIRv model, an\nintegrable extension of theSIR epidemic model under theinfluence o f vaccination. Wheres,\nifM= 2N−1 andα=β, the Voltera lattice has the Poisson structure {,}2, and hence it\nalso admits the complete integrability if M= 3 and α=β. While such a Volterra lattice\ncan also be seen as an integrable extension of the SIR model, its signifi cance as an epidemic\nmodel has not yet been revealed, as far as the author knows.\nMeanwhile, upon the introduction of an appropriate variable transf ormation, the SIRv\nmodel is transformed into Abel’s equation of the first kind, which att ributes to an exact\ndifferential equation. The potential of the exact differential equa tion is, of course, the\nconserved quantity of the SIRv model, i.e., the Hamiltonian H01of the Volterra lattice on\nthe symplectic manifold ( R2,Ω). Thus, the exact differential equation is equivalent to the\nHamiltonian flow on ( R2,Ω) with the Hamiltonian H01. In addition, the invariant curve of\nthe SIRv model, or the equipotential curve of the exact differentia l equation, is provided\nby the Lambert curve. Thus, we implicitly obtain the general solution to the initial value\nproblem of the SIRv model, or the Volterra lattice on ( R2,Ω), in terms of the Lambert W\nfunction.\nThe integrable discretization of completely integrable systems has b een extensively\nstudied for several decades. Regarding SIR epidemic models, ther e has been enthusiastic\ninvestigation into integrable discretization, resulting in the discover y of several discrete\nmodels that possess complete integrability (see [13, 14, 15, 16]). I n particular, an inte-\ngrable discretization of the SIRv model, which preserves the same c onserved quantity as\nthe continuous model, has been achieved through a geometric cons truction utilizing its in-\nvariant curve. Although the process of geometric discretization w as omitted in this article\n20due to space limitations, it has been thoroughly documented in [12]. I nterested readers\nare encouraged to refer to this article for further insight into the geometric discretization\nof the SIRv model.\nReferences\n[1] Kac, M. and van Moerbeke, P., Some probabilistic aspects of scat tering theory, in\nArthurs, A.M. (ed.), Functional integration and its applications , Clarendon Press,\n(1975) 87–96.\n[2] Kac,M.andvanMoerbeke, P., Onanexplicitly solublesystem ofnon linear differential\nequations related to certain Toda lattices, Adv. Math. ,16(1975) 160–169.\n[3] Moser, J, Finitely many mass points on the line under the influence o f an exponential\npotential–an integrable system, in Moser, J. (ed.), Dynamical systems, theory and\napplications , Lecture Notes in Physics, 38, Springer–Verlag, (1975) 467–497.\n[4] Bogoyavlenskij, O.I., Algebraic constructions of integrable dyna mical systems–\nextensions of the Volterra lattice, Russian Math. Surveys ,46(1991), 1–64.\n[5] Bogoyavlenskij, O.I., Integrable Lotka-Volterra Systems, Regul. Chaotic Dyn. ,13\n(2008), 543–556.\n[6] Suris, Y.B., The Problem of Integrable Discretization: Hamiltonian App roach,\nProgress in Mathematics 219, Birkh¨ auser, 2003.\n[7] Hethcote, H.W., Asymptotic behavior and stability in epidemic models ,Mathematical\nProblems in Biology , Lecture Notes in Biomathematics 2, Springer–Verlag, (1974)\n83–92.\n[8] Kermack, W. and McKendrick, A., A contribution to the mathemat ical theory of\nepidemics, Proc. Roy. Soc. Lond A ,115(1927) 700–721.\n[9] Harko, T., Lobo, F. and Mak, M., Exact analytical solutions of the Susceptible-\nInfected-Recovered (SIR) epidemic model and of the SIR model w ith equal death\nand birth rate, Appl. Math. Comput. ,236(2014) 184–194.\n[10] Mancas, S. and Rosu, H., Integrable Abel equations and Vein’s e quation, Math. Meth.\nAppl. Sci. ,39(2016) 1376–1387.\n[11] Corless, R.M., Gonnet, G.H., Hare, D.E.G., Jeffery, D.J. and Knuth, D.E., On the\nLambert W functions, Adv. Compt. Math. ,5(1996) 329–360.\n[12] Nobe, A., Exact solutions to SIR epidemic models via integrable disc retization, arXiv:\n2303.17198 (2023).\n21[13] Willox, R., Grammaticos, B., Carstea, A.S. and Ramani, A., Epidemic d ynamics:\ndiscrete-time and cellular automaton models Physica A ,328(2003) 13–22.\n[14] Satsuma, J., Willox, R., Ramani, A., Grammaticos, B. and Carstea, A.S., Extending\nthe SIR epidemic model, Physica A ,336(2004) 369–375.\n[15] Sekiguchi, M. Ishiwata, E.andNakata,Y., Dynamicsofanultra- discreteSIRepidemic\nmodel with time delay, Math. Biosci. Eng. ,15(2018) 653–666.\n[16] Tanaka, Y. and Maruno, K., Integrable discretizations of the S IR model,\narXiv:2209.08549 (2022).\n22" }, { "title": "2402.11899v1.A_study_of_the_radio_spectrum_of_Mrk_421.pdf", "content": "arXiv:2402.11899v1 [astro-ph.HE] 19 Feb 2024Draft version February 20, 2024\nTypeset using L ATEX default style in AASTeX62\nA study of the radio spectrum of Mrk 421\nJee Won Lee ,1Sang-Sung Lee ,1,2Jeffrey Hodgson ,3Algaba Juan-Carlos ,4Sang-Hyun Kim ,1,2\nWhee Yeon Cheong ,1,2Hyeon-Woo Jeong ,1,2andSincheol Kang1\n1Korea Astronomy and Space Science Institute, 776 Daedeok-d aero, Yuseong-gu, Daejeon 34055, Republic of Korea\n2University of Science and Technology, 217 Gajeong-ro, Yuse ong-gu, Daejeon 34113, Korea\n3Department of Physics and Astronomy, Sejong University, 20 9 Neungdong-ro, Gwangjin-gu, Seoul, South Korea\n4Department of Physics, Faculty of Science, Universiti Mala ya, 50603 Kuala Lumpur, Malaysia\nSubmitted to ApJ\nABSTRACT\nWe present the results of a spectral analysis using simultan eous multifrequency (22, 43, 86, and\n129 GHz) very long baseline interferometry (VLBI) observat ions of the Korean VLBI Network (KVN)\non BL Lac object, Markarian 421 (Mrk 421). The data we used was obtained from January 2013 to\nJune 2018. The light curves showed several flux enhancements with global decreases. To separate the\nvariable and quiescent components in the multifrequency li ght curves for milliarcsecond-scale emission\nregions, we assumed that the quiescent radiation comes from the emission regions radiating constant\noptically-thin synchrotron emissions (i.e., a minimum flux density with an optically thin spectral\nindex). The quiescent spectrum determined from the multifr equency light curves was subtracted from\nthe total CLEAN flux density, yielding a variable component i n the flux that produces the time-\ndependent spectrum. We found that the observed spectra were flat at 22-43 GHz, and relatively steep\nat 43-86 GHz, whereas the quiescent-corrected spectra are s ometimes quite different from the observed\nspectra (e.g., sometimes inverted at 22-43 GHz ). The quiesc ent-corrected spectral indices were much\nmore variable than the observed spectral indices. This spec tral investigation implies that the quiescent-\nspectrum correction can significantly affect the multifrequ ency spectral index of variable compact radio\nsources such as blazars. Therefore, the synchrotron self-a bsorption B-field strength (BSSA)can be\nsignificantly affected because BSSAis proportional to the fifth power of turnover frequency.\nKeywords: BL Lacertae objects: individual (Mrk 421)—galaxies:active — quasars: relativistic jets—\nradio continuum: galaxies\n1.INTRODUCTION\nActive Galactic Nuclei (AGN) are the central regions of gala xies that exhibit unusually bright luminosity across\nmultiwavelengths, from radio to gamma rays. It is thought th at the mechanism responsible for this luminosity is a\nsupermassive black hole ( 106−1010M⊙)at the center of the AGN, which accretes enormous amounts of m atter from\nits surrounding environment. A relativistic jet is formed b y the accreted matter ( Ulrich et al. 1997 ).\nA blazar is a subclass of AGN that exhibits extremely energet ic and highly variable observational behavior. The\nsource is among the most luminous and powerful objects, and f eatures a relativistic jet that points directly toward\nus with a very small viewing angle. This alignment causes a bl azar to appear as a point-like source in the sky that\nexhibits rapid and dramatic variability in its brightness ( Urry & Padovani 1995 ). Blazars encompass both BL Lac\nobjects and flat-spectrum radio quasars (FSRQs). While FSRQ s and BL Lac objects share similar characteristics,\nsuch as being highly variable and bright, their spectra diffe r. The spectrum of a BL Lac object has weak or no broad\nemission, unlike that of an FSRQ.\nCorresponding author: Sang-Sung Lee\nsslee@kasi.re.kr2 Lee et al.\nMarkarian 421 (Mrk 421), is one of the most extensively studi ed high-synchrotron-peaked blazars and one of the clos-\nest sources, located at a redshift z=0.031. Its high luminos ity enables us to investigate its emission ( Katarzyński et al.\n2003;Charlot et al. 2006 ;Horan et al. 2009 ;Acciari et al. 2011 ;Aleksić et al. 2015 ;Arbet-Engels et al. 2021 ). Its\nsource Mrk 421 was the first extragalactic source detected in the TeV energy bands, as reported by Punch et al. (1992)\nusing the Whipple 10-m Cherenkov telescope. Mrk 421 is class ified as a BL Lac object.\nAcciari et al. (2011) reported no correlation between TeV γ-ray and optical/radio light curves obtained from obser-\nvations performed from December 2005 to May 2008 with VERITA S/Whipple gamma-ray data and Metsahovi and\nUMRAO radio data. On the other hand, when focusing on the very high energy (VHE) E > 100 GeV, they found\na strong correlation between TeV gamma-ray and X-rays and su ggested that this can be explained by the one-zone\nsynchrotron self-Compton model ( Zhu et al. 2016 ). In a multiwavelength study conducted on Mrk 421 over 5.5-y r\nperiod, from December 2012 to April 2018, Arbet-Engels et al. (2021) performed several cross-correlation analyses.\nThey found that the TeV and X-ray light curves were very well c orrelated, with a lag of less than 0.6 days. The GeV\nand 15 GHz radio light curves also showed correlation, with a lag of over 30-100 days. However, no correlation was\nobserved between the TeV and the radio light curves. They sug gested that the variability at high energy may be due\nto the leptonic mechanism, given the short time scale of vari ability.\nAlthough extensive multiwavelength studies on Mrk 421 have been extensively conducted to date, research on its\nradio spectrum has been limited. In particular, simultaneo us multifrequency very long baseline interferometry (VLBI )\nimaging observations with high time resolution have not bee n performed yet. In this study, we present various analyses\nof the radio spectrum of Mrk 421 to explain the correlation be tween the spectrum and the flux density variations.\nIn this paper, we report results from simultaneous multifre quency VLBI observations of Mrk 421 carried out using\nthe Korea VLBI Network (KVN) at 22, 43, and 86, from January 20 13 to June 2018. The paper is organized as follows.\nIn Section 2, we present descriptions of the observations for both the KV N and all archival data used in this paper.\nSection 3and4describe the results and various analyses of flux density var iability at multiple frequencies, respectively.\nFinally, Section 5includes a discussion on the results and analysis.\n2.OBSERVATIONS AND DATA CALIBRATION\n2.1.KVN observations\nWe conducted simultaneous multifrequency VLBI imaging mon itoring observations of Mrk 421 using the Korean\nVLBI Network (KVN) at 22, 43, 86, and 129 GHz as part of the iMOG ABA(Interferometric Monitoring of Gamma-ray\nBright active galactic Nuclei) project ( Lee et al. 2016 ,2017b ;Algaba et al. 2018 ;Lee et al. 2020 ;Kang et al. 2021 ).\nThe KVN is a VLBI network system consisting of three 21-meter radio telescopes located in Seoul (KVN Yonsei),\nUlsan (KVN Ulsan), and Jeju (KVN Tamna), Korea. The monitori ng observations were primarily carried out every\nmonth. However, we excluded the 129 GHz data from the analysi s because there were no valid measurements, higher\nthan 3-σof errors. The observation period was from January 2013 to Ju ne 2018, except for maintenance periods from\nJune to August. Measurements were made in 41 epochs over a per iod of 5.5 years. At 22, 43, and 86 GHz, 40 epochs,\n33 epochs, and 21 epochs were measured, respectively. The ob serving frequencies were 21.700-21.764, 43.400-43.464,\n86.800-86.864, and 129.300-129.364 GHz, with a total bandw idth of 256 MHz. The angular resolutions of the KVN\nwere 6, 3, and 1.5 mas at 22, 43, and 86 GHz, respectively. We us ed a left circular polarization observation mode at a\nrecording rate of 1 Gbps. For more details of the KVN observat ions, see Lee et al. (2016,2017a).\n2.2.Data calibration\nThe observed data were processed using the DiFX software cor relator in Daejeon, Korea ( Deller et al. 2007 ;Lee et al.\n2015). The DiFX correlator generated a cross-correlation funct ion spectrum with a resolution of 0.125 MHz and an\naccumulation period of one second. After the correlation, t he data was calibrated with the AIPS (Astronomy Image\nProcessing System) software package, provided by the Natio nal Radio Astronomy Observatory (NRAO), following\nstandard procedures, including phase and amplitude calibr ation, fringe fitting, and bandpass calibration. We used the\nKVN pipeline developed by Hodgson et al. (2016) to perform the data calibration. Sensitivity at high frequ encies was\nimproved by transferring phase solutions from lower to high er frequencies (i.e., FPT) as described by Rioja & Dodson\n(2011) and Algaba et al. (2015). Amplitude calibration was conducted using the system tem peratures measured\nduring the observations. The system temperatures were adju sted for atmospheric opacity based on sky-tipping curve\nmeasurements conducted every hour at each radio telescope. Renormalization of the fringe amplitudes was conducted to\ncorrect the amplitude distortion due to quantization, and l osses from quantization and re-quantization were correcte diMOGABA: Mrk 421 3\nFigure 1. CLEAN maps of Mrk 421 obtained in Epoch 14 (April 23, 2014). Th e left, middle, and right panels indicate source\nstructures at 22, 43, and 86 GHz, respectively. The source sh ows a compact core-dominated structure at all frequencies. The\ncontour level starts from 3 times the noise and increases by a factor of√\n2. The beam size is indicated by the filled ellipse in\nthe bottom left corner.\n(Lee et al. 2015 ). After the amplitude calibration and the re-quantization loss calibration, the uncertainty of the\namplitude calibration was within 5 % at 22 and 43 GHz and 10-30 % at 86 and 129 GHz.\n2.3.Imaging and modelfitting\nAfter the phase and amplitude calibration, we used DIFMAP to make a CLEAN contour map. To make a CLEAN\nmap with the phase self-calibration, for the first time we per formed the startmod command. This uses a point source\nmodel of 1 Jy to conduct the initial phase self-calibration. Then, the visibility data at 22, 43, and 86 GHz were averaged\nat 30-second intervals. This averaging time aligned with th e typical coherence timescales of KVN observations. We\nflagged bad amplitude and phase data points and outliers in th e vplot. Then, the repetitive CLEANing and phase\nself-calibration within the central emitting regions were performed until the noise root-mean-square (rms) level was\nno longer significantly lowered. The standard CLEANing and s elf-calibration within the central emitting regions were\nconducted until no significant flux density was added compare d to the image rms level.\nSince Mrk 421 is a compact source observed on mas-scales in th e KVN observations, finding the best model is\nstraightforward. Figure 1displays the CLEAN contour maps of Mrk 421 at 22, 43, and 86 GHz for a representative\nepoch (well observed at all frequencies) showing compact co re-dominated components. After making the CLEAN\ncontour map, we computed the image quality factor ξr. This is the ratio of the image rms noise and its mathematical\nexpectation, ξr=Sr/Sr,exp, whereSris the maximum absolute flux density in the residual image, an dSr,expis the\nexpectation of Sr. For a more comprehensive understanding of this image quali ty evaluation scheme, please refer4 Lee et al.\n56250 56500 56750 57000 57250 57500 57750 58000 58250\nMJD0.10.20.30.40.50.60.70.8Clean Flux [Jy]22 GHz (KVN)\n43 GHz (KVN)\n86 GHz (KVN)\nFigure 2. Light curves of Mrk 421. Yellow, green, and sky blue dots indi cate 22, 43, and 86GHz, respectively.\ntoLobanov et al. (2006) and Lee et al. (2016,2017a ). Theξrvalues derived in this paper range from 0.65 - 0.97,\nsuggesting that the images sufficiently represent the struct ure identified in the visibility data.\nTo establish the model of the source, we fit the model in the uv-data. In this process, we used a single circular\ntwo-dimensional Gaussian model to obtain the model paramet ers, the information of the model, such as flux, size, and\ndegree of the major axis. The model fitting was repeated until reduced χ2approached one, and model fitting stops\nwhen the reduced χ2does not decrease anymore.\nTable 1lists the fitted parameters, including the observing freque ncies, restoring beam size Bmaj,min, position angle\nBPA, total CLEAN flux density SKVN, peak flux density Spin units of Jy per beam, rms in the image σ, the dynamic\nrange (ratio of peak to rms) of the image D, and image quality f actorξr.\n3.RESULTS\n3.1.Multifrequency light curves\nWe present the results of the multifrequency radio observat ions of Mrk 421. Figure 2displays the multifrequency\nlight curves of Mrk 421 at 22, 43, and 86 GHz observed between J anuary 16, 2013 (MJD 56308) and June 1, 2018\n(MJD 58270). During the 5.5-year observation period, the flu x density gradually decreases and several small flux\nenhancements are shown (which we call flares). The light curv es show a similar trend at all frequencies. Although\nwe can’t show the 15 GHz light curve of the OVRO in this study, t he 15 GHz light curve exhibits flux enhancements\npeaking at approximately MJD 56400, 56900, and 57200 (see Fi gure 1 in Arbet-Engels et al. 2021 ). In the KVN light\ncurves, only the flare at MJD 56900 is seen due to the relativel y sparse data points. Because of that, the flare at MJD\n56900 looks like a large flare. But the flare is very sharp indee d.iMOGABA: Mrk 421 5\nTable 1 . Image parameters\nEpoch MJD Band BmajBminBPASKVN Sp σ D ξ r\n(mas) (mas) (◦) (Jy) (Jy/beam) (mJy/beam)\n(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11)\n2013 Jan 16 56308 K 0.300 0.189 −89.9 0.530 0.523 3 193 0.73\n2013 Jan 16 56308 Q 0.148 0.094 −85.2 0.508 0.496 6 89 0.72\n2013 Jan 16 56308 W 0.077 0.045 −72.6 0.278 0.281 11 26 0.75\n2013 Apr 11 56393 K 0.299 0.182 −82.7 0.435 0.435 4 103 0.79\n2013 Apr 11 56393 Q 0.147 0.096 −78.7 0.404 0.401 7 55 0.72\n2013 Apr 11 56393 W 0.076 0.043 −83.1 0.230 0.218 16 13 0.70\n2013 May 07 56419 K 0.300 0.180 −77.9 0.471 0.470 5 87 0.75\n2013 May 07 56419 Q 0.149 0.093 −77.2 0.408 0.404 11 35 0.68\n2013 Oct 15 56580 K 0.303 0.176 −77.2 0.507 0.505 5 95 0.82\n2013 Oct 15 56580 Q 0.151 0.089 −77.5 0.465 0.436 10 42 0.76\n2013 Oct 15 56580 W 0.077 0.043 −85.8 0.306 0.217 26 8 0.78\n2013 Nov 19 56615 K 0.304 0.179 −81.0 0.447 0.446 3 144 0.72\n2013 Nov 19 56615 Q 0.153 0.086 −84.2 0.390 0.369 5 79 0.80\n2013 Nov 19 56615 W 0.078 0.043 87.3 0.245 0.208 8 26 0.73\n2013 Dec 24 56650 K 0.283 0.170 79.6 0.476 0.472 6 84 0.74\n2013 Dec 24 56650 Q 0.146 0.086 79.5 0.471 0.446 7 65 0.83\n2013 Dec 24 56650 W 0.070 0.042 82.9 0.301 0.285 9 33 0.82\n2014 Jan 27 56684 K 0.298 0.187 −83.5 0.399 0.398 4 113 0.74\n2014 Jan 27 56684 Q 0.148 0.098 −79.6 0.378 0.368 5 75 0.71\n2014 Feb 28 56716 K 0.376 0.164 −63.9 0.394 0.393 5 76 0.72\n2014 Feb 28 56716 Q 0.176 0.086 −63.6 0.406 0.400 9 47 0.81\n2014 Feb 28 56716 W 0.113 0.037 −62.1 0.198 0.216 11 20 0.74\n2014 Mar 22 56738 K 0.309 0.172 −85.6 0.379 0.379 4 108 0.73\n2014 Mar 22 56738 Q 0.150 0.091 −85.7 0.353 0.353 6 61 0.83\n2014 Mar 22 56738 W 0.082 0.041 89.8 0.268 0.253 10 26 0.80\n2014 Apr 22 56769 K 0.304 0.175 −79.9 0.407 0.407 2 171 0.83\n2014 Apr 22 56769 Q 0.148 0.091 −78.4 0.389 0.384 3 131 0.79\n2014 Apr 22 56769 W 0.078 0.042 −79.7 0.302 0.286 8 37 0.85\n2014 Sep 01 56901 K 0.300 0.180 −80.1 0.723 0.720 7 99 0.83\n2014 Sep 01 56901 Q 0.142 0.095 −82.1 0.615 0.616 6 110 0.70\n2014 Sep 01 56901 W 0.078 0.043 −76.9 0.510 0.481 27 18 0.92\n2014 Oct 29 56959 K 0.330 0.160 86.2 0.430 0.428 5 79 0.74\n2014 Oct 29 56959 Q 0.174 0.075 −84.3 0.415 0.404 7 56 0.79\n2014 Nov 28 56989 K 0.334 0.164 −76.9 0.496 0.492 8 64 0.83\n2014 Nov 28 56989 Q 0.169 0.084 −70.2 0.509 0.508 9 57 0.70\n2014 Dec 25 57016 K 0.324 0.162 −84.6 0.464 0.462 6 78 0.87\n2014 Dec 25 57016 Q 0.148 0.090 −82.8 0.376 0.384 10 37 0.89\n2015 Feb 23 57076 K 0.312 0.170 −80.3 0.427 0.425 4 109 0.93\nTable 1 continued on next page6 Lee et al.\nTable 1 (continued)\nEpoch MJD Band BmajBminBPASKVN Sp σ D ξ r\n(mas) (mas) (◦) (Jy) (Jy/beam) (mJy/beam)\n(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11)\n2015 Feb 23 57076 Q 0.149 0.094 −78.8 0.368 0.365 3 115 0.77\n2015 Feb 23 57076 W 0.078 0.042 −77.7 0.233 0.220 7 34 0.84\n2015 Mar 26 57107 K 0.312 0.168 −84.2 0.398 0.396 4 111 0.98\n2015 Mar 26 57107 Q 0.147 0.091 −81.9 0.361 0.353 2 144 0.80\n2015 Mar 26 57107 W 0.079 0.041 −83.6 0.210 0.191 6 34 0.78\n2015 Apr 30 57142 K 0.323 0.163 −77.8 0.458 0.456 7 69 0.85\n2015 Apr 30 57142 Q 0.149 0.088 −81.9 0.407 0.404 4 110 0.84\n2015 Apr 30 57142 W 0.082 0.040 −78.0 0.304 0.288 11 25 0.79\n2015 Sep 24 57289 K 0.316 0.171 −69.6 0.528 0.528 6 95 0.84\n2015 Sep 24 57289 Q 0.156 0.083 −77.2 0.418 0.420 10 43 0.74\n2015 Oct 23 57318 K 0.347 0.165 80.8 0.438 0.436 9 46 0.81\n2015 Nov 30 57356 K 0.293 0.181 −86.9 0.396 0.396 4 96 0.89\n2015 Nov 30 57356 Q 0.141 0.096 −87.0 0.361 0.363 4 83 0.78\n2015 Nov 30 57356 W 0.076 0.043 −86.2 0.235 0.218 8 27 0.85\n2015 Dec 28 57384 K 0.300 0.175 −85.1 0.375 0.375 3 125 0.83\n2015 Dec 28 57384 Q 0.147 0.091 −81.1 0.344 0.343 2 144 0.78\n2015 Dec 28 57384 W 0.080 0.041 −85.3 0.217 0.202 6 36 0.79\n2016 Jan 13 57400 K 0.303 0.174 −88.6 0.337 0.337 2 139 0.71\n2016 Jan 13 57400 Q 0.147 0.091 −84.3 0.332 0.321 2 135 0.79\n2016 Jan 13 57400 W 0.080 0.041 89.5 0.191 0.164 6 26 0.84\n2016 Mar 01 57448 K 0.303 0.173 −85.4 0.417 0.417 3 123 0.90\n2016 Mar 01 57448 Q 0.149 0.089 −85.1 0.398 0.392 3 119 0.81\n2016 Mar 01 57448 W 0.077 0.042 −86.5 0.279 0.259 9 29 0.81\n2016 Apr 24 57502 K 0.301 0.185 −81.8 0.464 0.465 5 88 0.94\n2016 Apr 24 57502 Q 0.152 0.091 −80.9 0.427 0.410 3 117 0.90\n2016 Apr 24 57502 W 0.078 0.044 −83.8 0.245 0.251 6 44 0.77\n2016 Oct 18 57679 K 0.330 0.168 80.8 0.428 0.428 5 87 0.71\n2016 Nov 27 57719 K 0.310 0.183 −88.6 0.365 0.365 4 86 0.89\n2016 Dec 28 57750 K 0.290 0.184 −87.4 0.321 0.321 3 95 0.84\n2016 Dec 28 57750 Q 0.148 0.088 89.6 0.309 0.304 4 76 0.85\n2017 Mar 28 57840 K 0.372 0.172 −62.2 0.339 0.340 2 181 0.65\n2017 Mar 28 57840 W 0.097 0.042 -61.7 0.165 0.149 4 37 0.85\n2017 Apr 19 57862 K 0.310 0.170 −86.0 0.345 0.344 5 65 0.82\n2017 Apr 19 57862 Q 0.166 0.082 84.9 0.312 0.290 8 35 0.80\n2017 May 21 57894 K 0.316 0.174 83.9 0.341 0.341 5 68 0.78\n2017 May 21 57894 Q 0.168 0.081 80.3 0.295 0.282 4 68 0.75\n2017 Jun 17 57921 K 0.310 0.174 −77.3 0.356 0.355 5 75 0.93\n2017 Jun 17 57921 Q 0.164 0.080 −80.2 0.315 0.302 3 101 0.78\n2017 Sep 19 58015 K 0.321 0.180 −78.4 0.364 0.365 7 53 0.83\nTable 1 continued on next pageiMOGABA: Mrk 421 7\nTable 1 (continued)\nEpoch MJD Band BmajBminBPASKVN Sp σ D ξ r\n(mas) (mas) (◦) (Jy) (Jy/beam) (mJy/beam)\n(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11)\n2017 Sep 19 58015 Q 0.165 0.083 −78.9 0.312 0.308 3 98 0.80\n2017 Oct 21 58047 K 0.307 0.176 85.4 0.338 0.338 3 133 0.86\n2017 Oct 21 58047 Q 0.162 0.084 79.7 0.321 0.310 3 120 0.80\n2017 Nov 04 58061 K 0.330 0.185 −68.5 0.320 0.320 4 87 0.87\n2017 Nov 04 58061 Q 0.178 0.086 −69.0 0.310 0.301 4 79 0.77\n2017 Nov 22 58079 K 0.293 0.183 −84.4 0.299 0.298 4 82 0.85\n2017 Nov 22 58079 Q 0.156 0.085 −89.1 0.290 0.281 4 80 1.00\n2017 Dec 06 58093 K 0.296 0.178 −88.3 0.278 0.275 5 51 0.97\n2018 Jan 13 58131 Q 0.158 0.084 88.2 0.308 0.302 2 159 0.77\n2018 Jan 13 58131 W 0.075 0.043 −85.3 0.203 0.189 6 31 0.78\n2018 Mar 25 58202 K 0.300 0.184 −79.8 0.295 0.290 11 27 0.82\n2018 Mar 25 58202 W 0.085 0.042 −73.3 0.177 0.224 32 7 0.71\n2018 Apr 19 58227 K 0.307 0.174 −88.7 0.363 0.362 6 60 0.89\n2018 Apr 19 58227 Q 0.157 0.083 89.6 0.331 0.321 3 95 0.84\n2018 Apr 19 58227 W 0.082 0.040 88.8 0.239 0.244 11 22 0.95\n2018 May 26 58264 K 0.303 0.181 83.9 0.333 0.333 7 47 0.84\n2018 May 31 58269 K 0.331 0.171 80.0 0.327 0.327 8 41 0.79\nNote — Column designation: 1 - Date; 2 - modified Julian date; 3 - obs erving frequency band: K - 22 GHz band;\nQ - 43 GHz band; W - 86 GHz band; D - 129 GHz band; 4-6 - restoring b eam: 4 - major axis; 5 - minor axis;\n6 - position angle of the major axis; 7 - total CLEAN KVN flux den sity; 8 - peak flux density; 9 - off-source RMS\nin the image; 10 - dynamic range of the image; 11 - quality of th e residual noise in the image (i.e., the ratio of the\nimage root-mean-square noise to its mathematical expectat ion).\n4.ANALYSIS\n4.1.Radio spectrum\nThe simultaneous multifrequency monitoring KVN observati ons enable us to investigate source spectra accurately\nwithout the time uncertainty. The multifrequency spectral analyses of variable blazars using arcsecond-scale observ a-\ntions by Kim et al. (2022) and Jeong et al. (2023) show that variable spectral properties can be revealed by s ubtracting\noff the quiescent spectrum in the multifrequency light curve s. We calculated the quiescent spectrum by fitting the four\nlocal minima obtained on MJD 56716, 57107, 57400, and 57840 - 58093 shown in Figure 3. The fourth local minimum\nwe used is obtained on MJD 58093 at 22 GHz, MJD 58079 at 43 GHz, a nd MJD 57840 at 86 GHz. The quiescent\nspectrum is obtained as 0.263 ±0.045 Jy, 0.271 ±0.021 Jy, and 0.156 ±0.027 Jy at 22, 43, and 86 GHz, respectively, by\nextrapolating each of the three frequencies to a common time (MJD 58269), as shown in Figure 4.\nThe mas-scale spectra of Mrk 421 are shown in Figure 5. Out of the 41 epochs, data existed for at least two\nfrequencies for 33 epochs. The observed spectrum is shown in black, and the quiescent-corrected spectrum (the\nobserved spectrum by subtracting the quiescent spectrum) i s shown in red. The spectra generally appear to be flat\nbetween 22 and 43 GHz, and seem to be relatively steep between 43 and 86 GHz. The quiescent-corrected spectra\nare sometimes consistent with the observed spectra and some times quite different. Unlike the observed spectra, the\nquiescent-corrected spectra generally show inverted spec tra between 22 and 43 GHz. Although we were not able to\nprecisely calculate the turnover frequency, νc, of Mrk 421 in this analysis, we clearly find that the quiescen t-corrected\nspectrum becomes steeper between 22 and 43 GHz and flatter bet ween 43 and 86 GHz than the observed spectrum.\nThis implies that the quiescent emission correction for the source spectrum in the mas-scale may be important to\nstudy the intrinsic spectral properties of the variable emi ssion regions.8 Lee et al.\n20 30 40 50 60 70 80\nF requency (GHz)0.150.200.250.300.350.40Flux density (Jy)MJD 56716\nMJD 57107\nMJD 57400\nMJD 57840\nFigure 3. Plot of local minima on MJD 56716, 57107, 57400, and 57840 - 58 093.\n3 × 101\n4 × 101\n6 × 101\nF requency (GHz)1.4 × 10−11.6 × 10−11.8 × 10−12 × 10−12. 2 × 10−12.4 × 10−12.6 × 10−12.8 × 10−1Minimum Flux (Jy)\nFigure 4. The minimum flux density at each frequency, by fitting the four local minima obtained on MJD 56716, 57107, 57400,\nand 57840 - 58093, and extrapolating each of the three freque ncies to a common time (MJD 58269).\n4.2.Spectral index\nThe spectral index αis defined as Sν∝να, whereνis the observing frequency, and Sνis the flux density. We\ncalculated αfor the data pairs 22 and 43 GHz, α22/43, and 43 and 86 GHz, α43/86(see Figure 6). The range of observed\nα22/43was−0.34 - 0.04 with a mean α22/43of−0.12, and α43/86was−1.04 -−0.27 with a mean α43/86of−0.63.\nTheα22/43was relatively flat, and α43/86was steep. As before, we calculated the quiescent-correcte d spectral indices.\nThe range of the quiescent-corrected spectral indices betw een 22 and 43 GHz αcor,22/43was−1.7 - 0.04 with a mean\nαcor,22/43of−0.57. For 43 and 86 GHz, the range of the quiescent-corrected spectral indices αcor,43/86was−1.69 -\n−0.47 with a mean αcor,43/86of−0.33.\nIn Figure 6, we see that the 22 and 43 GHz quiescent-corrected spectral i ndices are consistently lower (steeper) than\nthe observed spectral indices, although the errors are larg e. We noticed that the values of α22/43were steeper when\nthe flares were around the peaks on MJD 56901 and MJD 57289, whe reas those were flatter at local minima (MJD\n56716 and MJD 57400).\nThe 43 and 86 GHz quiescent-corrected spectral indices show ed more variability with spectral indices that were\nsometimes consistent, sometimes lower, and sometimes high er than the observed spectral indices, although the errors\nwere large. To further investigate the effect of correcting f or the quiescent spectrum, we plotted the spectral indices\nversus flux density. In Figures 7-8, a) and b) indicate the observed spectral index, and c) and d) indicate theiMOGABA: Mrk 421 9\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56308\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56393\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56419\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56580\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56615\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56650\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56684\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56716\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56738\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56769\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56901\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56959\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)56989\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57016\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57076\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57107\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57142\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57289\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57318\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57356\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57384\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57400\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57448\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57502\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57679\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57719\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57750\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57840\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57862\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57894\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)57921\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58015\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58047\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58061\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58079\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58093\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58131\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58202\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58227\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58264\n101\n102\nF requency (GHz)10−310−210−1100Flux density (Jy)58269\nFigure 5. Spectrum of Mrk 421. Black and red symbols represent the obse rved spectrum and quiescent-corrected spectrum,\nrespectively.\nquiescent-corrected spectral index versus flux density, re spectively. To analyze the relation between the spectral in dex\nand flux density quantitatively, we computed the Spearman co rrelation coefficient ρand probability pfor each case.\nThe values of ρofα22/43for 22 GHz and 43 GHz flux density were −0.24 and 0.04, respectively. The values of ρof\nαcor,22/43for 22 GHz and for 43 GHz flux density were 0.4 and 0.66, respect ively.. The values of ρofα43/86for 43 GHz\nand for 86 GHz were −0.11 and 0.6, respectively. The values of ρofαcor,43/86for 43 GHz and for 86 GHz were −0.44\nand 0.33, respectively.\nThe original 22 and 43 GHz spectral indices were uncorrelate d with the flux densities. For the quiescent-corrected\nspectral indices (c and d), the spectral indices and flux dens ities showed a significant correlation (See, Figure 7). In\nFigure 8, there is no correlation between α43/86and the 43 GHz flux density, but the α43/86is correlated with 86 GHz\nflux density. The α43/86increases with the 86 GHz flux density. In the quiescent-corr ected case, we now see an\nanti-correlation between the corrected spectral indices v s. 43 GHz flux densities. The quiescent-corrected spectral10 Lee et al.\n56250 56500 56750 57000 57250 57500 57750 58000 58250\nMJD−2.0−1.5−1.0−0.50.00.51.01.52.0Spectral indexα\ncor , 22/43\nα\n22/43\n56250 56500 56750 57000 57250 57500 57750 58000 58250\nMJD−2.0−1.5−1.0−0.50.00.51.01.52.0Spectral indexα\ncor , 43/ 86\nα\n43/ 86\nFigure 6. Spectral index αof Mrk 421. The top panel is α22/43and the bottom panel is α43/86. The red symbols indicate the\nquiescent-corrected spectral index. A horizontal line is a guideline of zero.\nindices were less correlated with the 86 GHz flux densities th an before.\n5.DISCUSSION\nFigures 7and8show that correcting for the quiescent spectrum can signific antly affect the measurements of the\nspectral indices. This is of particular importance for calc ulations that require measurements of the synchrotron self -\nabsorption frequency, for example, the magnetic field stren gth,BSSA∝ν5\nc. This means that even small errors in\nmeasuring νccan lead to significant errors when measuring the magnetic fie ld strength. This suggests that magnetic\nfield strength estimations based on multifrequency data sho uld be carefully obtained with a proper determination of\nthe optically thin quiescent spectrum of compact radio sour ces even on mas-scales.\nTo test the previous work, which did not consider correcting the quiescent spectrum, we re-analyzed the multifre-\nquency spectral properties of OJ 287 ( Lee et al. 2020 ). The minimum flux densities of OJ 287 were 2.58, 2.27, 1.83,\nand 1.36 at 22, 43, 86, and 129 GHz, respectively. The spectra l index between 86 and 129 GHz was −0.73. We used\nthis optically thin spectral index to correct the observed s pectrum. We subtracted the minimum flux density obtained\nfrom the optically thin spectral index at each frequency for 8 epochs analyzed in Lee et al. (2020). Figure 9shows the\nspectra of OJ 287. The black and grey symbols indicate the obs erved and the quiescent-corrected spectra, respectively.\nAfter subtracting the optically thin spectrum, the spectru m was fitted with a curved power-law function ( Lee et al.\n2016,2017b ,2020). Then, we obtained the turnover frequency and the peak flux d ensity. The turnover frequencies ob-iMOGABA: Mrk421 11\n3 × 10−1\n4 × 10−1\n6 × 10−1\nFlux\n22 (Jy)−2−1012α\n22/43\nρ = -0. 24\np =0.179a)\n3 × 10−1\n4 × 10−1\n6 × 10−1\nFlux\n43 (Jy)−2−1012α\n22/43\nρ =0.04\np =0.816b)\n10−1\nFlux\n22 (Jy)−2−1012α\nco r, 22/43\nρ =0.4\np =0.023c)\n10−2\n10−1\nFlux\n43 (Jy)−2−1012α\nco r, 22/43\nρ =0.66\np =3.8176e -05d)\nFigure 7. Spectral index as a function of the flux density. The left and r ight panels indicate 22 and 43GHz, respectively. a)\nand b) indicate αvs. flux density. c) and d) indicate the αcorvs. flux density. ρand p values indicate coefficient and probability,\nrespectively.\ntained from the quiescent-corrected spectra were in the ran ge of 28-80 GHz, and the peak flux densities were 0.7-3.3 Jy.\nThe turnover frequencies were larger by a factor of approxim ately 2.5 larger than the ones obtained from the observed\nspectra. Because of the BSSA∝ν5\nc, the synchrotron self-absorption magnetic field strength m ight be underestimated\ninLee et al. (2020). This could also potentially change the comparison result between the equipartition magnetic field\nstrength and synchrotron self-absorption magnetic field st rength.\n6.SUMMARY\nWe have presented the results of simultaneous multifrequen cy observations at 22, 43, and 86 GHz with the KVN.\nThe light curves showed a global decaying and several small r adio flares. To separate the variable component and\nthe quiescent component in the light curves, we subtracted t he quiescent component, assuming the minimum flux\ndensity. We found that the observed spectra were flat at 22-43 GHz, and relatively steep at 43-86 GHz, whereas\nthe quiescent-corrected spectra are sometimes quite differ ent from the observed spectra (e.g., sometimes inverted at\n22-43 GHz ). This means that the turnover frequency, νcis shifted to a higher frequency. Based on the assumption\nof the synchrotron self-absorption magnetic field strength estimation, BSSA∝ν5\nc. Therefore, to properly estimate the\nmagnetic field strength, subtracting the quiescent spectru m in the KVN light curves is important.12 Lee et al.\n3 × 10−1\n4 × 10−1\n5 × 10−1\n6 × 10−1\nFlux\n43 (Jy)−2.0−1.5−1.0−0.50.00.51.01.52.0α\n43/ 86\nρ = -0.11\np =0.644a)\n2 × 10−1\n3 × 10−1\n4 × 10−1\nFlux\n86 (Jy)−2.0−1.5−1.0−0.50.00.51.01.52.0α\n43/ 86\nρ =0.6\np =0.006b)\n10−1\nFlux\n43 (Jy)−4−2024α\nco r, 43/ 86\nρ = -0.44\np =0.063c)\n10−1\nFlux\n86 (Jy)−4−2024α\nco r, 43/ 86\nρ =0.33\np =0.173d)\nFigure 8. Spectral index as a function of the flux density. The left and r ight panels indicate 43 and 86GHz, respectively. a)\nand b) indicate αvs. flux density. c) and d) indicate the αcorvs. flux density. ρand p values indicate coefficient and probability,\nrespectively.\nWe thank the anonymous reviewer for valuable comments and su ggestions that helped to improve the paper. We are\ngrateful to all staff members in KVN who helped to operate the a rray and to correlate the data. The KVN is a facility\noperated by the Korea Astronomy and Space Science Institute . The KVN operations are supported by KREONET\n(Korea Research Environment Open NETwork) which is managed and operated by KISTI (Korea Institute of Science\nand Technology Information). This work was supported by the National Research Foundation of Korea (NRF) grant\nfunded by the Korea government (MIST) (2020R1A2C2009003).\nREFERENCES\nAcciari, V. A., Aliu, E., Arlen, T., et al. 2011, ApJ, 738, 25.\ndoi:10.1088/0004-637X/738/1/25\nAleksić, J., Ansoldi, S., Antonelli, L. A., et al. 2015, A&A,\n576, A126. doi:10.1051/0004-6361/201424216\nAlgaba, J.-C., Zhao, G.-Y., Lee, S.-S., et al. 2015, Journal\nof Korean Astronomical Society, 48, 237.\ndoi:10.5303/JKAS.2015.48.5.237Algaba, J.-C., Lee, S.-S., Kim, D.-W., et al. 2018, ApJ, 852,\n30. doi:10.3847/1538-4357/aa9e50\nArbet-Engels, A., Baack, D., Balbo, M., et al. 2021, A&A,\n647, A88. doi:10.1051/0004-6361/201935557\nCharlot, P., Gabuzda, D. C., Sol, H., et al. 2006, A&A, 457,\n455. doi:10.1051/0004-6361:20054078\nDeller, A. T., Tingay, S. J., Bailes, M., et al. 2007, PASP,\n119, 318. doi:10.1086/513572iMOGABA: Mrk421 13\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=56308\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=56738\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=56769\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=56960\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=57356\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=57384\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=57400\n101\n102\nF requency (GHz)10−1100101Flu density (Jy)\nMJD=57448\nFigure 9. The spectra of OJ287. Black and grey symbols indicate the ori ginal and the quiescent-corrected spectra, respectively.\nBlack and grey vertical lines correspond to the turnover fre quency at the original spectrum and the quiescent-correcte d spectrum,\nrespectively.\nHodgson, J., Lee, S.-S., Zhao, G.-Y., et al. 2016, JKAS, 49,\n137\nHoran, D., Acciari, V. A., Bradbury, S. M., et al. 2009,\nApJ, 695, 596. doi:10.1088/0004-637X/695/1/596\nJeong, H.-W., Lee, S.-S., Cheong, W. Y., et al. 2023,\nMNRAS, 523, 5703. doi:10.1093/mnras/stad1736\nKang, S., Lee, S.-S., Hodgson, J., et al. 2021, A&A, 651,\nA74. doi:10.1051/0004-6361/202040198\nKatarzyński, K., Sol, H., & Kus, A. 2003, A&A, 410, 101.\ndoi:10.1051/0004-6361:20031245\nKim, S.-H., Lee, S.-S., Lee, J. W., et al. 2022, MNRAS,\n510, 815. doi:10.1093/mnras/stab3473\nLee, S.-S., Byun, D.-Y., Oh, C. S., et al. 2015, Journal of\nKorean Astronomical Society, 48, 229.\ndoi:10.5303/JKAS.2015.48.5.229\nLee, S.-S., Wajima, K., Algaba, J.-C., et al. 2016, ApJS,\n227, 8Lee, J. W., Lee, S.-S., Hodgson, J. A., et al. 2017a, ApJ,\n841, 119\nLee, J. W., Sohn, B. W., Byun, D.-Y., Lee, J. A., & Kim,\nS. S. 2017b, A&A, 601, A12\nLee, J. W., Lee, S.-S., Algaba, J.-C., et al. 2020, ApJ, 902,\n104. doi:10.3847/1538-4357/abb4e5\nLobanov, A. P., Krichbaum, T. P., Witzel, A., et al. 2006,\nPASJ, 58, 253. doi:10.1093/pasj/58.2.253\nPunch, M., Akerlof, C. W., Cawley, M. F., et al. 1992,\nNature, 358, 477. doi:10.1038/358477a0\nRioja, M. & Dodson, R. 2011, AJ, 141, 114.\ndoi:10.1088/0004-6256/141/4/114\nUlrich, M.-H., Maraschi, L., & Urry, C. M. 1997, ARA&A,\n35, 445. doi:10.1146/annurev.astro.35.1.445\nUrry, C. M. & Padovani, P. 1995, PASP, 107, 803.\ndoi:10.1086/133630\nZhu, Q., Yan, D., Zhang, P., et al. 2016, MNRAS, 463,\n4481. doi:10.1093/mnras/stw2346" }, { "title": "2402.11906v1.Non_monotonous_shear_rate_dependence_of_dielectric_relaxation_frequency_of_a_nematic_liquid_crystal_revealed_by_rheo_dielectric_spectroscopy.pdf", "content": "Non-monotonous shear rate dependence of dielectric relaxation frequency of a\nnematic liquid crystal revealed by rheo-dielectric spectroscopy\nK. Anaswara Das, M. Praveen Kumar and Surajit Dhara∗\nSchool of Physics, University of Hyderabad,\nHyderabad-500046, India\n(Dated: February 20, 2024)\nDielectric relaxation of materials provides important information on the polarisation dynamics\nat different time scales. We study the dielectric relaxation of a nematic liquid crystal under steady\nrotational shear and simultaneously measure the viscosity. The dielectric anisotropy of the nematic\nis positive and the applied electric field is parallel to the velocity gradient direction with a magnitude\nlarger than the Freedericksz threshold field. The complex dielectric constant and effective viscosity\ndecrease rapidly with increasing shear rate. The dielectric relaxation frequency exhibits a non-\nmonotonous shear rate dependence, first decreasing but beyond a critical shear rate increasing.\nOur experiments suggest the emergence of collective dipolar relaxation under the influence of the\ncompeting effects of hydrodynamic and dielectric torques.\nI. INTRODUCTION\nThe structures and properties of complex fluids such as\npolymeric systems, colloidal suspensions and liquid crys-\ntals have been studied under simultaneous shear flow and\nelectric fields [1, 2]. In some fluids, the viscosity is en-\nhanced significantly due to the application of an electric\nfield. This effect is known as the electrorheological effect\nand is very important for applications in electromechan-\nical devices [3–6]. In nematic liquid crystals (LCs), com-\nposed of axially polar molecules, under the application of\nsufficient electric field the effective viscosity is enhanced\nand this effect is due to the change in the orientation of\nthe director (average aligning direction of the molecules)\nwith respect to the shear flow direction [7–14]. In uniaxial\nnematic LCs, there are two principal dielectric constants,\nnamely ϵ||andϵ⊥, where the subscripts refer components\nin relation to the director [17]. The dielectric anisotropy\n(∆ϵ=ϵ||−ϵ⊥) of the nematic LCs composed of polar\nmolecules could be zero, positive or negative, depending\non the orientation of the permanent dipole moments with\nrespect to the long molecular axis [18].\nBoth the dielectric constants are frequency dependent\nand the corresponding relaxation frequencies f||andf⊥\nare related to the time scales of rotation of the dipoles\nalong the short and long molecular axes, respectively [18].\nFor axially polar molecules, the relaxation frequency f||\nis much smaller than f⊥and it is the opposite in the\ncase of transversely polar molecules [18]. Usually, these\nrelaxation frequencies are measured in cells composed of\nparallel electrodes in which the director is aligned either\nperpendicular (homeotropic) or parallel (homogeneous)\nto the electrodes. In cells the nematic LCs are in the\nquiescent state, hence such measurements provide equi-\nlibrium relaxation times which are important for device\napplications.\n∗surajit@uohyd.ac.inA nematic LC is far away from the equilibrium when\nsubjected to a steady shear flow and depending on the\nsystem it may exhibit three dynamic modes, namely flow-\naligned, wagging and tumbling [19–24]. In flow aligned\nnematics, the director forms a steady state with a tilt\nangle θL(Lesli angle) with respect to the flow direction\nwhereas, in the case of wagging, the director oscillates\nand for tumbling motions, the director makes full rota-\ntions in the shear plane [25–29]. In a flow-aligned nematic\nwith positive dielectric anisotropy (∆ ϵ >0) the applica-\ntion of sufficient electric field perpendicular to the flow di-\nrection induces an apparent change in viscosity [17]. The\nchange in viscosity due to the change in the director ori-\nentation can be measured easily from the rheo-dielectric\nstudies at a frequency much below the dielectric relax-\nation frequency [11, 13–16]. However, so far it is not well\nunderstood if the shear flow affects the dielectric relax-\nation frequencies of the nematic LCs [30, 31]. Since the\nshear rate is much slower than the equilibrium rotation\nof the dipoles ( ˙ γ≪τ−1, relaxation time), one would ex-\npect that the shear flow should not affect the dielectric\nrelaxation frequency. The rheo-dielectric studies at low\nelectric fields on some cyanobiphenyl nematic LCs show\nno measurable effect of shear flow on the dielectric relax-\nation frequency [30].\nIn this paper, we apply a sufficiently high electric field\nthat orients the director of the nematic along the velocity\ngradient direction (perpendicular to the shear flow direc-\ntion) and study the frequency dispersion of the effective\ndielectric constant of a nematic liquid crystal at various\nshear rates. We measure the real and imaginary parts of\nthe dielectric constants and analyse their frequency de-\npendence at varying voltage and shear rates. Our study\nshows evidence of a collective dielectric relaxation mode\nin the intermediate shear rate range. We discuss the pos-\nsible origin of the collective dipolar relaxation.arXiv:2402.11906v1 [cond-mat.soft] 19 Feb 20242\nII. EXPERIMENT\nWe worked on a nematic liquid crystal mixture, known\nas E7. It is a mixture of several cyanobiphenyl, cyan-\noterphenol and triphenyl compounds at some specific\ncompositions [32]. It was obtained from Grand Winton\nInc, and used without further purification. At 5◦C the\nparallel and perpendicular components of the dielectric\nconstant are given by ϵ||= 19 .6 and ϵ⊥= 4.5, respec-\ntively and the dielectric anisotropy is positive (∆ ϵ=\nϵ||−ϵ⊥= 15.1) (see Fig.S1, SM)[33]. The nematic\nto isotropic phase transition temperature is 61◦C and\nit exhibits a broad nematic temperature range (61◦C to\n−10◦C). The rheo-dielectric measurements were made by\na strain-controlled rheometer (Anton Paar MCR 501) us-\ning parallel-plate geometry with a plate diameter of 50\nmm. The plate gap was fixed at 80 µm and no alignment\nlayer was used in this experiment. The bottom plate was\nfixed while the top plate was rotated at different shear\nrates. The bottom plate was attached with a Peltier tem-\nperature controller for controlling the temperature with\nan accuracy of 0 .1◦C. A hood was used to cover the mea-\nsuring plates for temperature uniformity. An LCR meter\n(Agilent E4980A) was connected to the plates for rheo-\ndielectric measurements. The applied electric field was\ngreater than the Freedericksz threshold field ( E≫Eth)\nand the frequency was increased from 100 Hz to 1.0 MHz.\nThe experiments were performed at different shear rates\nand the frequency-dependent real and imaginary parts of\nthe dielectric constant were measured by the LCR me-\nter. All the measurements were made at 5◦C. Before the\nmeasurement, the sample was pre-sheared for 5 minutes\nat a fixed shear rate ( ˙ γ=100 s-1). A schematic diagram\nof the experimental setup is shown in Fig.1.\nFIG. 1. Experimental setup for rheo-dielectric measurements.\nIII. RESULTS AND DISCUSSION\nWe measured the frequency dispersion of the effective\ndielectric constants at a fixed electric field and different\nshear rates (Fig.2). At room temperature the complete\nrelaxation mode is not observed due to the limiting fre-\nquency range of the LCR meter (100 Hz to 2 MHz) hence,\n(a)\n(b)FIG. 2. Plots of (a) real ( ϵ′\neff) and (b) imaginary ( ϵ′′\neff) com-\nponents of the effective dielectric constant with frequency f,\nat different shear rates and temperature T=5◦C. The applied\nelectric field E= 2.5×105V/m, which is 10 times higher than\nthe Freedericksz threshold field, Eth= 2.5×104V/m.\nall the experiments were performed at a fixed tempera-\nture of 5◦C. Figure 2(a,b) shows the dielectric disper-\nsion of the real ( ϵ′\neff) and imaginary ( ϵ′′\neff) parts of the\neffective dielectric constant at different shear rates. The\napplied electric field was Eth= 2.5×105V/m, which\nis 10 times larger than the Freedericksz threshold field\n(Eth= 2.5×104V/m). In the low-frequency region,\n(f <104Hz), at zero shear rate (i.e., quiescent nematic),\nϵ′\neffis independent of frequency and decreases with in-\ncreasing shear rate. On the other hand, ϵ′′\neffdecreases\nwith the increasing frequency in the low-frequency region\n(f < 103Hz). It varies as ϵ′′\neff∝f−1, which suggests\nthe influence of the conductivity (direct current) on the\nimaginary component of the dielectric constant.\nFigure 3(a) and (b) shows the variation of ϵ′\neffand\nϵ′′\neffobtained from Fig.1 with the shear rate at a fixed\nfrequency f= 4 kHz. Both decrease exponentially\nwith increasing shear rate. For example, at ˙ γ= 0 s-1,\nϵ′\neff= 20 .3. This value is nearly equal to the paral-\nlel component of the dielectric constant measured in a\nhomeotropic cell i.e.,ϵ||≃19.6 (see Fig.S1, SM)[33]. It\nsuggests that the director is almost perpendicular to the\nconfining plates and parallel to the electric field direc-\ntion. With increasing shear rate, ϵ′\neffdecreases rapidly\nand eventually becomes constant i.e,ϵ′\neff≃6, when the\nshear rate is increased to ˙ γ= 200 s-1. This dielectric con-\nstant at this shear rate is slightly larger than the value3\n(a) (b)\n(c)(d)\nFIG. 3. Variation of (a) ϵ′\neffand (b) ϵ′′\neffwith shear rate\nat frequency f= 4 kHz (obtained from Fig.1). (c) Time-\ndependent effective viscosity ηeffatE= 2.5×105V/m and\nat different shear rates. (d) Variation of ηeffat different shear\nrates obtained from the figure (c). Shear-dependent director\norientations are shown in the insets.\nmeasured in a homogeneous (planar) cell i.e.,ϵ⊥≃4.5\n(see Fig.S1, SM)[33]. Hence, these results demonstrate\nthat initially ( ˙ γ= 0 s-1) the director is perpendicular to\nthe plates i.e.,parallel to the velocity gradient direction\nand it gradually tilts in the shear plane towards the shear\nflow direction. Further, the effective viscosity ηeffof the\nliquid crystal was measured simultaneously with the di-\nelectric dispersion measurements. Figure 3(c) shows that\nthe viscosity is independent of time but it decreases with\nincreasing shear rate. Figure 3(d) shows the variation\nof the viscosity at different shear rates. At ˙ γ= 1 s-1,\nηeff= 0.7 Pa s and it reduces to about 0 .11 Pa s when\n˙γ= 100 s-1. At ˙ γ= 1 s-1, the effective viscosity can be\nconsidered as the Miesowicz viscosity for the director ori-\nentation being parallel to the velocity gradient direction\ni.e.,ηeff≃η1and at the highest shear rate ( ˙ γ= 100 s-1),\nηeff≃η3, where η3is the Miesowicz viscosity with the\ndirector being nearly parallel to the velocity direction.\nOne important observation is the change of dielectric\nrelaxation frequency with shear rate (Fig. 2(b)). It is\napparent that not only does the peak height of the ϵ′′\neff\ndecrease, but the frequency at which the peak occurs,\nso-called the dielectric relaxation frequency also changes\nwith shear rate. To obtain the actual dielectric relax-\nation frequency ( fr), we fitted the dielectric data to the\nHavriliak-Negami relaxation function [36],\nϵ∗(f) =ϵ∞+∆ϵ\n[1 + ( i2πfτ)α]β−iσ0\nϵ02πf(1)\nwhere ∆ ϵis the dielectric strength, ϵ∞is the dielectricpermittivity at the high-frequency limit, σ0is the conduc-\ntivity and τis the relaxation time. The corresponding\nrelaxation frequency is given by fr= 1/2πτ(see Fig.S2,\nSM [33]). The exponents αandβdescribe the asym-\nmetry and broadness of the corresponding spectra and\nare found to vary in the range of 0.8 to 1 (see Table S1,\nSM [33]).\n(a)\n(b) (c)\nFIG. 4. (a) Variation of the effective relaxation frequency\nfrwith shear rate at E= 2.5×105V/m. Dependence of (b)\nminimum relaxation frequency fmin\nrand (c) the critical shear\nrate ˙γc. The standard deviation of the relaxation frequency\nat zero shear rate is about 2 kHz.\nFigure 4(a) shows the variation of the relaxation fre-\nquency frwith the shear rate ˙ γat an applied field of\nE= 2.5×105V/m. The relaxation frequency decreases\nfrom 320 kHz to 116.7 kHz when ˙ γis increased from 0\nto 23 s-1. It shows a pronounced minimum at ˙ γ= 23 s-1,\nabove this, frincreases to about 400 kHz, when ˙ γis fur-\nther increased to 200 s-1. At ˙γ= 0 s-1, the director is par-\nallel to the field direction, hence the effective relaxation\nfrequency frcorresponds to the rotation of the longitudi-\nnal (axial) components of the dipole moments about the\nshort axis i.e.,fr∼f||\nr∼320 kHz, where f||\nris the relax-\nation frequency measured in homeotropic cell (quiescent\nnematic)(see Fig.S1, SM) [33]. The relaxation frequency\nof the transverse dipole moments about the long axis\nin the homogeneous cell (quiescent nematic) is f⊥\nr>2\nMHz (see Fig.S1, SM) [33] which is much larger than f||\nr.\nHence, one would have expected the relaxation frequency\nfrto increase continuously from 320 kHz to 400 kHz with4\nincreasing shear rate. Thus, the minimum relaxation fre-\nquency ( fmin\nr) at a particular shear rate is rather unex-\npected and can not be explained simply by considering\nthe tilting of the director. In this context, two possible\ndirector dynamics should be mentioned. Any effect of\nelectrohydrodynamic instability on the dielectric relax-\nation is ruled out as both the dielectric and conductivity\nanisotropies (∆ ϵand ∆ σ) are positive [37]. Further, E7 is\na flow-aligning nematic hence the tumbling and wagging\nof the director is absent [38]. Hence, the reduction of re-\nlaxation frequency, in other words, the slowing down of\nthe relaxation time ( τ) could hint at a possible collective\ndipolar relaxation. One can expect that the collective re-\nsponse should also contribute to enhancing the effective\ndielectric constant. However, such an effect can not be\nobserved because of the counter effect of tilting of the di-\nrector in the shear plane that tends to reduce the effective\ndielectric constant.\nWe performed experiments at a few different electric\nfields ( E≫Eth) at the same temperature (see Fig.S3\nand S4, SM [33]) and observed that the minimum re-\nlaxation frequency fmin\nrdecreases almost linearly with\nthe increasing field (Fig. 4(b)). The critical shear rate\nγcat which the relaxation frequency is minimum is also\nfound to increase with the field (Fig. 4(c)). We measured\nthe dielectric relaxation frequency at a few electric fields\nin a homogeneous cell of thickness 11 .3µm(quiescent\nnematic). It is observed that the relaxation frequency\ndecreases almost linearly with increasing electric field as\nexpected (see Fig.S5, SM [38]). Hence, the decrease of\nfmin\nrwith increasing field under shear flow can be at-\ntributed to the increasing tilt angle of the molecules with\nrespect to the field direction. Figure 4(c) demonstrates\nthe competing effects, i.e., the high shear rate is required\nat a larger electric field for the collective response to be\nobserved (see later discussion).\nBased on the above results we propose possible director\nconfigurations at different shear rates. In our experiment,\nthe bottom plate is fixed and the top plate is rotated\nwith different shear rates. At zero shear rate ( ˙ γ= 0 s-1),\nthe molecules are aligned perpendicular to the plates as\nthe applied electric field is very much greater than the\nFreedericksz threshold field (see Fig. 5(a)). At a high\nshear rate ( ˙ γ≫˙γc), the hydrodynamic torque due to the\nshear flow is much larger than the dielectric torque due\nto the applied electric field. As a result, the molecules\nalign nearly parallel to the shear flow direction except\nat the centre as shown in Fig.5(c) (see later discussion).\nAt the critical shear rate ( ˙ γ∼˙γc) these two torques\nare comparable and the director attains an intermediate\norientation ( π/2≤θ≤θL).\nFurther, the shear rate experienced by fluid elements in\nparallel plate geometry depends on their position r(dis-\ntance from the centre of plates) and is given by ˙ γ=rω/h ,\nwhere his the gap between the plates and ωis the angular\nfrequency. Conventionally, in parallel plate systems, the\nshear rate at the rim ( r=a) is considered for the calcu-\nlation of stress and viscosity of Newtonian fluids, whereais the radius of the plate. In complex fluids like liquid\ncrystals, the shear rate, and consequently the hydrody-\nnamic torque very much depends on rand is not the same\nthroughout the plate. The hydrodynamic torque is zero\nat the centre and it increases from the centre to the edge\nof the plates. Near the critical shear rate (0 < γ∼γc),\nthe director at the centre is vertical and, as one moves to-\nwards the perimeter, the hydrodynamic torque increases\ngradually and the director tilts continuously towards the\nshear flow direction, creating a half skyrmion-like direc-\ntor deformation as shown in Fig.5(b). Such a complex\ndirector distortion can give rise to flexoelectric polarisa-\ntion [17, 37] which can couple to the orientational fluc-\ntuations of the director. As a result, it can give rise to a\ncollective polarisation mode. However, such polarization\nis expected to relax at a much lower frequency [34] hence\nthe influence of flexoelectric polarization can be ignored\nin our experiments. The complex director configuration\nin the low shear rate range (0 < γ≤γc) can give rise to\na cooperative dipolar motion due to secondary coupling\nof the steric interactions of the molecules to the electric\npolarization and consequently reduces the dielectric re-\nlaxation frequency. The secondary effect is very different\nfrom the primary statistical correlation function associ-\nated with the molecular dipole reorientations to polar-\nization, which occurs at a much higher frequency [34].\nHowever, theoretical / simulation studies are required to\nunderstand the results quantitatively.\n(a)(b) (c)\n(d) (e) (f)\nFIG. 5. Top view (xy-plane) of the director at electric field\nE≫Eth(along z-axis) and different shear rates, (a) ˙ γ= 0,\n(b) ˙γ∼˙γcand (c) ˙ γ≫˙γc. Side views of the director in the\nvertical mid-plane (zy-plane) at the corresponding shear rates\nare shown in (d-f). The rotation of the top plate is indicated\nby blue arrows. Note that the director is twisted radially\noutward forming a half skyrmion-like structure in (b,e) and\nthe structure is almost uniform except at the centre in figure\n(c,f).\nFurther, a few comments are in order. First, two di-\nmensionless numbers, that characterize the flow are Deb-\norah number De=τ˙γ, and Ericksen numbers Er=\nη˙γ\nK/h2[39], where τis the characteristic relaxation time\nof the material, his the gap between the two plates, η\nis the effective viscosity and Kis the mean elastic con-\nstant. In the experimental shear rate range ( ˙ γ=1-200\ns-1),Er= 103∼105andDe= 10−2∼2 (see Table S2,5\nSM) [33]. It suggests liquid-like response and the viscous\neffects dominate over the elastic effects. Second, liquid\ncrystals contain finite impurity ions which can move to-\nwards the opposite electrodes under ac electric field and\ncreate space charge polarization. The electrode charg-\ning time τ=λDL/2D, where λDis the Debye screening\nlength, Lis the gap between the electrodes and Dis\nthe diffusion constant of the ions. Taking D∼10−11\nm2s-1[40],λD∼0.1µm[41],L= 80 µm, the estimated\nelectrode polarisation frequency is about 2.5 Hz which is\nfar below the experimental frequency range. Third, since\nthe maximum applied electric field is not very strong (far\nbelow the dielectric breakdown) the dielectric response is\nassumed to be in the linear regime.\nIV. CONCLUSION\nThe effective dielectric constant and shear viscosity at\nan electric field higher than the Freedericksz threshold\nfield of a nematic liquid crystal decrease very rapidly un-\nder rotational shear due to the tilting of the director in\nthe shear plane from the field to the shear flow direction.The dielectric relaxation frequency shows a pronounced\nminimum at a critical shear rate. The results suggest the\ndevelopment of a cooperative dipolar relaxation in the\nlow shear rate range. These results are important for ap-\nplications of liquid crystals as well as polar liquids in elec-\ntromechanical devices. Considering the competing effects\nof the hydrodynamic and dielectric torques, we proposed\na simple physical model that demonstrates the director\nconfiguration at different shear rates qualitatively. In\nessence, our findings uncover cooperative dipolar relax-\nation under in the presence of transverse electric and flow\nfields that reduce dielectric relaxation frequency. We fo-\ncussed on an apolar nematic LC, however rheo-dielectric\nstudies on liquid crystals with macroscopic polarisations\nsuch as ferroelectric nematic and ferroelectric smectics\nLCs are promising for new relaxation dynamics.\nV. ACKNOWLEDGMENTS\nAcknowledgments : SD acknowledges financial sup-\nport from SERB (SPR/2022/000001). AD acknowledges\nDST for fellowship (DST/WISE-PhD/PM/2023/57).\nWe thank Dr. Arun Roy for the useful discussions.\n[1] R. G. Larson, The Structure and Rheology of Complex\nFluids (Oxford University Press, New York, 1999).\n[2] M. Parthasarathy, and D. J. Klingenberg, Materials Sci-\nence and Engineering: R: Reports, RI7, 57 (1996).\n[3] W. W. Winslow, Appl. Phys., 20, 1137 (1967).\n[4] D. R. Gamota, J. Rheol., 35, 399 (1991).\n[5] S. Fukayama, J. Mol. Liq., 90131 (2001).\n[6] D. J. Klingenberg,, J. Chem.Phys., 91, 7888 (1989).\n[7] T. Carlsson and K. Skarp, Mol. Cryst. Liq. Cryst., 78,\n157 (1981).\n[8] S. Skarp, T. Carlsson, S. T. Lagerwall and B. Stebler,\nMol. Cryst. Liq. Cryst., 66, 199 (1981).\n[9] K-L Tse and A. D. Shine, J. Rheol., 39, 1021 (1995).\n[10] I. Yang and A. D. Shine, J. Rheol., 361079 (1992).\n[11] K. Negita, J. Chem. Phys. 105, 7837 (1996).\n[12] H. Watanabe, Rheologica Acta, 37, 6 (1998).\n[13] P. Patrico, C. R. Leal, L.F.V. Pinto, A. Boto and M.T.\nCidade, Liq. Cryst., 39, 25 (1999).\n[14] M.T. Cidade, G. Pereira, A. Bubnov, V. Hamplova, M.\nKaspar and J. P. Casquilho, Liq. Cryst., 39, 191 (2012).\n[15] J. Ananthaiah, Rasmita Sahoo, M. V. Rasna and Surajit\nDhara, Phy. Rev. E 89, 022510 (2014).\n[16] J. Ananthaiah, M. Rajeswari, V. S. S. Sastry, R.\nDabrowski and Surajit Dhara, Euro. Phy. J. E 34, 74\n(2011).\n[17] P. G. de Gennes, The Physics of Liquid Crystals (Oxford\nUniversity Press, Oxford, England, 1974).\n[18] W. H. de Jeu, Physical Properties of Liquid Crystals , 2nd\ned. (Cambridge University Press, Cambridge, 1992).\n[19] F. M. Leslie, J. Phys. D: Appl Phys 9, 925 (1976).\n[20] F. M. Leslie, Adv. Liq. Cryst. 4, 1 (1979).\n[21] F. M. Leslie, Theory and flow phenomena in nematic\nliquid crystals. Theory and Applications of Liquid Crys-tals. Springer, Berlin Heidelberg New York, pp 235-254\n(1987).\n[22] Andreas M. Menzel, Phys. Rep., 554, 1 (2015).\n[23] G. Rien¨ acker, S. Hess, Physica A., 267, 321 (1999).\n[24] V. V. Belyaev, Viscosity of Nematic Liquid Crystals, 1st\ned. (Cambridge International Science, Cambridge, 2011).\n[25] A. Archer, R. G. Larson, J. Chem. Phys., 103, 3108\n(1995).\n[26] D. J. Ternet, R. G. Larson, L. G. Leal, Rheol. Acta, 38,\n183 (1999).\n[27] W. R. Burghardt, G. G. Fuller, Macromolecules, 24, 2546\n(1991).\n[28] G. Rien¨ acker, S. Hess, Physica, A 315, 537 (2002).\n[29] Y.G. Tao, W. K. den Otter and W. J. Briels, 86, 56005\n(2009).\n[30] H. Watanabe, T. Sato, M. Hirose, K. Osaki, and M- Yao,\nRheol. Acta, 37, 519 (1998).\n[31] H. Watanabe, T. Sato, M. Matsumiya, T. Inoue and K.\nOsaki, Nihon Reoroji Gakkaishi, 27, 121 (1999).\n[32] https://shop.synthon-chemicals.com/en/LIQUID-\nCRYSTALS/LIQUID-CRYSTALS-MIXTURES/Liquid-\ncrystal-mixture-E7.html.\n[33] Supplementary material presents additional results of di-\nelectric relaxation at different electric fields, also mea-\nsurements in homogeneous and homeotropic cells.\n[34] B. I. Outram and S. J. Elston, Phys. Rev. E Phys. Rev.\nE88, 012506 (2013).\n[35]\n[36] S. Havriliak and S. Negami, J. Polymer, 8, 161 (1967).\n[37] L. M. Blinov and V. G. Chigrinov, Electrooptic Effects\nin Liquid Crystal Materials (Springer, Berlin, 1994).\n[38] D. J. Ternet, R. G. Larson, L. G. Leal, Rheol. Acta 38,\n183 (1999).6\n[39] R. G. Larson and D. W. Mead, Liq. Cryst. 15, 151 (1993).\n[40] S. Hern` andez-Navarro, P. Tierno, J. Ign´ es-Mullol and F.\nSagu´ es, Soft Matter 9, 7999 (2013).[41] O. D. Lavrentovich, Curr. Opin. Colloid Interface Sci.,\n21, 97 (2016)." }, { "title": "2402.11926v2.Lax_Wendroff_Flux_Reconstruction_on_adaptive_curvilinear_meshes_with_error_based_time_stepping_for_hyperbolic_conservation_laws.pdf", "content": "LAX-WENDROFF FLUX RECONSTRUCTION ON ADAPTIVE\nCURVILINEAR MESHES WITH ERROR BASED TIME STEPPING FOR\nHYPERBOLIC CONSERVATION LAWS\nA P REPRINT\nArpit Babbar\nCentre for Applicable Mathematics\nTata Institute of Fundamental Research\nBangalore – 560065\narpit@tifrbng.res.inPraveen Chandrashekar∗\nCentre for Applicable Mathematics\nTata Institute of Fundamental Research\nBangalore – 560065\npraveen@math.tifrbng.res.in\nFebruary 21, 2024\nABSTRACT\nLax-Wendroff Flux Reconstruction (LWFR) is a single-stage, high order, quadrature free method for\nsolving hyperbolic conservation laws. This work extends the LWFR scheme to solve conservation\nlaws on curvilinear meshes with adaptive mesh refinement (AMR). The scheme uses a subcell\nbased blending limiter to perform shock capturing and exploits the same subcell structure to obtain\nadmissibility preservation on curvilinear meshes. It is proven that the proposed extension of LWFR\nscheme to curvilinear grids preserves constant solution (free stream preservation) under the standard\nmetric identities. For curvilinear meshes, linear Fourier stability analysis cannot be used to obtain an\noptimal CFL number. Thus, an embedded-error based time step computation method is proposed\nfor LWFR method which reduces fine-tuning process required to select a stable CFL number using\nthe wave speed based time step computation. The developments are tested on compressible Euler’s\nequations, validating the blending limiter, admissibility preservation, AMR algorithm, curvilinear\nmeshes and error based time stepping.\nKeywords Hyperbolic conservation laws ·Lax-Wendroff flux reconstruction ·Curvilinear grids ·Admissibility\npreservation and shock Capturing ·Adaptive mesh refinement ·Error based time stepping\n1 Introduction\nLax-Wendroff method is a single step method for time dependent problems in contrast to method of lines approach\nwhich combines a spatial discretization scheme with a Runge-Kutta method in time. The Lax-Wendroff idea has\nbeen used for hyperbolic conservation laws to develop single step finite volume and discontinuous Galerkin methods\n[31,30,50,8,11]. Another approach to develop high order, single-stage schemes is based on ADER schemes [ 41,12].\nFlux Reconstruction (FR) method introduced by Huynh [ 18] is a finite-element type high order method which is\nquadrature-free. The key idea in this method is to construct a continuous flux approximation and then use collocation\nat solution points which leads to an efficient implementation that can exploit optimized matrix-vector operations and\nvectorization capabilities of modern CPUs. The continuous flux approximation requires a correction function whose\nchoice affects the accuracy and stability of the method [ 18,43,44,42]; by properly choosing the correction function and\nsolution points, the FR method can be shown to be equivalent to some discontinuous Galerkin and spectral difference\nschemes [18, 42].\nIn [2], a Lax-Wendroff Flux Reconstruction (LWFR) scheme was proposed which used the approximate Lax-Wendroff\nprocedure of [ 50] to obtain an element local high order approximation of the time averaged flux and then performs\n∗Corresponding authorarXiv:2402.11926v2 [math.NA] 20 Feb 2024APREPRINT - FEBRUARY 21, 2024\nthe FR procedure on it to perform evolution in a single stage. The numerical flux was carefully constructed in [ 2]\nto obtain enhanced accuracy and linear stability based on Fourier stability analysis. In [ 3], a subcell based shock\ncapturing blending scheme was introduced for LWFR based on the work of subcell based scheme of [ 17]. To enhance\naccuracy, [ 3] used Gauss-Legendre solution points and performed MUSCL-Hancock reconstruction on the subcells.\nSince the subcells used in [ 3] were inherently non-cell centred, the MUSCL-Hancock scheme was extended to non-cell\ncentred grids along with the proof of [ 4] for admissibility preservation. The subcell structure was exploited to obtain a\nprovably admissibility preserving LWFR scheme by careful construction of the blended numerical flux at the element\ninterfaces.\nIn this work, the LWFR scheme of [2] is further developed to incorporate three new features:\n1. Ability to work on curvilinear, body-fitted grids\n2. Ability to work on locally and dynamically adapted grids with hanging nodes\n3. Automatic error based time step computation\nCurvilinear grids are defined in terms of a tensor product polynomial map from a reference element to the physical\nelement. The conservation law is transformed to the coordinates of the reference element and then the LWFR procedure\nis applied leading to a collocation method that has similar structure as on Cartesian grids. This structure also facilitates\nthe extension of the provably admissibility preserving subcell based blending scheme of [ 3] to curvilinear grids. The\nFR formulation on curvilinear grids is based on its equivalence with the DG scheme, see [ 23], which also obtained\ncertain metric identities that are required for preservation of constant solutions, that is, free stream preservation. See\nreferences in [ 23] for a review of earlier study of metric terms in the context of other higher order schemes like finite\ndifference schemes. The free stream preserving conditions for the LWFR scheme are proven to be the same discrete\nmetric identities as that of [ 23]. The only requirement for the required metric identities in two dimensions is that the\nmappings used to define the curvilinear elements must have degree less than or equal to the degree of polynomials used\nto approximate the solution.\nIn many problems, there are non-trivial and sharp solution features only in some localized parts of the domain and\nthese features can move with respect to time. Using a uniform mesh to resolve small scale features is computationally\nexpensive and adaptive mesh refinement (AMR) is thus very useful. In this work, we perform adaptive mesh refinement\nbased on some local error or solution smoothness indicator. Elements with high error indicator are flagged for refinement\nand those with low values are flagged for coarsening. A consequence of this procedure is that we get non-conformal\nelements with hanging nodes which is not a major problem with discontinuous Galerkin type methods, except that\none has to ensure conservation is satisfied. For discontinuous Galerkin methods based on quadrature, conservation is\nensured by performing quadrature on the cell faces from the refined side of the face [ 38,47]. For FR type methods\nwhich are of collocation type, we need numerical fluxes at certain points on the element faces, which have to computed\non a refined face without loss of accuracy and such that conservation is also satisfied. For the LWFR scheme, we use\nthe Mortar Element Method [ 25,26] to compute the solution and fluxes at non-conformal faces. The resulting method\nis conservative and also preserves free-stream condition on curvilinear, adapted grids.\nThe choice of time step is restricted by a CFL-type condition in order to satisfy linear stability and some other non-linear\nstability requirements like maintaining positive solutions. Linear stability analysis can be performed on uniform\nCartesian grids only, leading to some CFL-type condition which depends on wave speed estimates. In practice these\nconditions are then also used for curvilinear grids but they may not be optimal and may require tuning the time\nstep for each problem by adding a safety factor. Thus, automatic time step selection methods based on some error\nestimates become very relevant for curvilinear grids. Error based time stepping methods are already developed for\nODE solvers; and by using a method of lines approach to convert partial differential equations to a system of ordinary\ndifferential equations, error-based time stepping schemes of ODE solvers have been applied to partial differential\nequations [ 5,20,45] and recent application to CFD problems can be found in [ 32,34]. The LWFR scheme makes use\nof a Taylor expansion in time of the time averaged flux; by truncating the Taylor expansion at one order lower, we can\nobtain two levels of approximation, whose difference is used as a local error indicator to adapt the time step. As a\nconsequence the user does not need to specify a CFL number, but only needs to give some error tolerances based on\nwhich the time step is automatically decreased or increased.\nThe rest of the paper is organized as follows. In Section 2, we review notations and the transformation of conservation\nlaws from curved elements to a reference cube following [ 23,22]. In Section 3, the LWFR scheme of [ 2] is extended\nto curvilinear grids. In Section 3.1, we review FR on curvilinear grids and use it to construct LWFR on curvilinear\ngrids in Section 3.2. Section 3.3 shows that the free stream preservation condition of LWFR is the standard metric\nidentity of [ 23]. In Section 4, the admissibility preserving subcell limiter for LWFR from [ 3] is reviewed and extended\nto curvilinear grids. In Section 5, the Mortar Element Method for treatment of non-conformal interfaces in AMR of [ 25]\nis extended to LWFR. In Section 6, error-based time stepping methods are discussed; Section 6.1 reviews error-based\n2APREPRINT - FEBRUARY 21, 2024\ntime stepping methods for Runge-Kutta and Section 6.2 introduces an embedded error-based time stepping method for\nLWFR. In Section 7, numerical results are shown to demonstrate the scheme’s capability of handling adaptively refined\ncurved meshes and benefits of error-based time stepping. Section 8 gives a summary and draws conclusions from the\nwork.\n2 Conservation laws and curvilinear grids\nThe developments in this work are applicable to a wide class of hyperbolic conservation laws but the numerical\nexperiments are performed on 2-D compressible Euler’s equations, which are a system of conservation laws given by\n∂\n∂t\nρ\nρu\nρv\nE\n+∂\n∂x\nρu\np+ρu2\nρuv\n(E+p)u\n+∂\n∂y\nρv\nρuv\np+ρv2\n(E+p)v\n=0 (1)\nHere, ρ, pandEdenote the density, pressure and total energy per unit volume of the gas, respectively and (u, v)are\nCartesian components of the fluid velocity. For a polytropic gas, an equation of state E=E(ρ, u, v, p )which leads to\na closed system is given by\nE=p\nγ−1+1\n2ρ(u2+v2) (2)\nwhere γ > 1is the adiabatic constant. For the sake of simplicity and generality, we subsequently explain the\ndevelopment of the algorithms for a general hyperbolic conservation law written as\nut+∇x·f(u) =0 (3)\nwhere u∈Rpis the vector of conserved quantities, f(u) = (f1, . . . ,fd)∈Rp×dis the corresponding physical flux,\nxis in domain Ω⊂Rdand\n∇x·f=dX\ni=1∂xifi (4)\nLet us partition ΩintoMnon-overlapping quadrilateral/hexahedral elements Ωesuch that\nΩ =M[\ne=1Ωe\nThe elements Ωeare allowed to have curved boundaries in order to match curved boundaries of the problem domain Ω.\nTo construct the numerical approximation, we map each element Ωeto a reference element Ωo= [−1,1]dby a bijective\nmapΘe: Ωo→Ωe\nx= Θ e(ξ)\nwhere ξ= (ξi)d\ni=1are the coordinates in the reference element, and the subscript ewill usually be suppressed. We will\ndenote a d-dimensional multi-index as p= (pi)d\ni=1. In this work, the reference map is defined using tensor product\nLagrange interpolation of degree N≥1,\nΘ(ξ) =X\np∈Nd\nNbxpℓp(ξ) (5)\nwhere\nNd\nN={p= (p1, . . . , p d) :pi∈ {0,1, . . . , N },1≤i≤d} (6)\nand{ℓp}p∈Nd\nNis the degree NLagrange polynomial corresponding to the Gauss-Legendre-Lobatto (GLL) points\n{ξp}p∈Nd\nNso that Θ(ξp) =bxpfor all p∈Nd\nN. Thus, the points {ξp}p∈Nd\nNare where the reference map will be\nspecified and they will also be taken to be the solution points of the Flux Reconstruction scheme throughout this work.\nThe functions {ℓp}p∈Nd\nNcan be written as a tensor product of the 1-D Lagrange polynomials {ℓpi}N\npi=0of degree N\ncorresponding to the GLL points {ξpi}N\npi=0\nℓp(ξ) =dY\ni=1ℓpi(ξi), ℓ pi(ξi) =NY\nk=0,k̸=iξi−ξpk\nξpi−ξpk(7)\nThe numerical approximation of the conservation law will be developed by first transforming the PDE in terms of the\ncoordinates of the reference cell. To do this, we need to introduce covariant and contravariant basis vectors with respect\nto the reference coordinates.\n3APREPRINT - FEBRUARY 21, 2024\nDefinition 1 (Covariant basis) The coordinate basis vectors {ai}d\ni=1are defined so that ai,ajare tangent to {ξk=\nconst}where i, j, k are cyclic. They are explicitly given as\nai= (ai,1, . . . , a i,d) =∂x\n∂ξi, 1≤i≤d (8)\nDefinition 2 (Contravariant basis) The contravariant basis vectors\b\nai\td\ni=1are the respective normal vectors to the\ncoordinate planes {ξi= const }3\ni=1. They are explicitly given as\nai= (ai\n1, . . . , ai\nd) =∇xξi, 1≤i≤d (9)\nThe covariant basis vectors aican be computed by differentiating the reference map Θ(ξ). The contravariant basis\nvectors can be computed using [23, 22]\nJai=J∇ξi=aj×ak (10)\nwhere (i, j, k )are cyclic, and Jdenotes the Jacobian of the transformation which also satisfies\nJ=det\u0014∂x\n∂ξ\u0015\n=ai·(aj×ak) ( i, j, k )cyclic\nThe divergence of a flux vector can be computed in reference coordinates using the contravariant basis vectors as [ 23,22]\n∇x·f=1\nJdX\ni=1∂\n∂ξi(Jai·f) (11)\nConsequently, the gradient of a scalar function ϕbecomes\n∇ϕ=1\nJdX\ni=1∂\n∂ξi[(Jai)ϕ] (12)\nWithin each element Ωe, performing change of variables with the reference map Θe(11), the transformed conservation\nlaw is given by\neut+∇ξ·˜f=0 (13)\nwhere\neu=Ju, ˜fi=Jai·f=dX\nn=1Jai\nnfn (14)\nThe flux ˜fis referred to as the contravariant flux.\nThe vectors {Jai}d\ni=1are called the metric terms and the metric identity is given by\ndX\ni=1∂(Jai)\n∂ξi=0 (15)\nThe metric identity can be obtained by reasoning that the gradient of a constant function is zero and using (12) or\nthat a constant solution must remain constant in (13). The metric identity is crucial for studying free stream stream\npreservation of a numerical scheme.\nRemark 1 The equations for two dimensional case can be obtained by setting (Θ(ξ))3=x3(ξ) = ξ3so that\na3= (0,0,1).\n3 Lax-Wendroff Flux Reconstruction (LWFR) on curvilinear grids\nThe solution of the conservation law will be approximated by piecewise polynomial functions which are allowed to be\ndiscontinuous across the elements. In each element Ωe, the solution is approximated by\nbuδ\ne(ξ) =X\npue,pℓp(ξ) (16)\nwhere the ℓpare tensor-product polynomials of degree Nwhich have been already introduced before to define the map\nto the reference element. The hat will be used to denote functions written in terms of the reference coordinates and the\ndelta denotes functions which are possibly discontinuous across the element boundaries. Note that the coefficients ue,p\nare the values of the function at the solution points which are GLL points.\n4APREPRINT - FEBRUARY 21, 2024\nξξR\n2\nξL\n2ξL\n1 ξR\n1\nΘe(ˆξ1,ˆξ2)ˆnR,1ˆnL,1ˆnR,2\nˆnL,2ˆnR,1ˆnL,1ˆnR,2\nnL,2∂ΩR\no,i∂ΩR\ni\nFigure 1: Illustration of reference map, solution point projections, reference and physical normals\n3.1 Flux Reconstruction (FR)\nRecall that we defined the multi-index p= (pi)d\ni=1(6)where pi∈ {0,1. . . , N }. Let i∈ {1, . . . , d }denote a\ncoordinate direction and S∈ {L, R}so that (S, i)corresponds to the face ∂ΩS\no,iin direction ion side Swhich has\nthe reference outward normal bnS,i, see Figure 1. Thus, ∂ΩR\no,idenotes the face where reference outward normal is\nbnR,i=eiand∂ΩL\no,ihas outward unit normal bnL,i=−bnR,i.\nThe FR scheme is a collocation scheme at each of the solution points\b\nξp= (ξpi)d\ni=1, pi= 0, . . . , N\t\n. We will thus\nexplain the scheme for a fixed ξ=ξpand denote ξS\nias the projection of ξto the face S=L, R in the ithdirection\n(see Figure 1), i.e.,\n(ξS\ni)j=(ξj, j ̸=i\n−1, j =i, S=L\n+1, j =i, S=R(17)\nThe first step is to construct an approximation to the flux by interpolating at the solution points\n(˜fδ\ne)i(ξ) =X\np(Jai·f)(ξp)ℓp(ξ) (18)\nwhich may be discontinuous across the element interfaces. In order to couple the neighbouring elements and\nensure conservation property, continuity of the normal flux at the interfaces is enforced by constructing the\ncontinuous flux approximation using the FR correction functions gL, gR[18]. We construct this for the contravariant\nflux˜fδ(18) by performing correction along each direction i,\n(˜fe(ξ))i= (˜fδ\ne(ξ))i+ ((˜fe·bnR,i)∗−˜fδ\ne·bnR,i)(ξR\ni)gR(ξpi)−((˜fe·bnL,i)∗−˜fδ\ne·bnL,i)(ξL\ni)gL(ξpi) (19)\nwhere ˜fe·bnS,i(ξS\ni)denotes the trace value of the normal flux in element Ωeand(˜fe·bni)∗(ξS\ni)denotes the numerical\nflux. We will use Rusanov’s numerical flux [37] which for the face (S, i)is given by\n(˜fe·bnS,i)∗=˜f∗(u−\nS,i,u+\nS,i,bnS,i) =1\n2[(˜fδ·bnS,i)++ (˜fδ·bnS,i)−]−λS,i\n2(u+\nS,i−u−\nS,i) (20)\nThe(˜fδ·nS,i)±andu±\nS,idenote the trace values of the normal flux and solution from outer, inner directions respectively;\nthe inner direction corresponds to the element Ωewhile the outer direction corresponds to its neighbour across the\ninterface (S, i). The λS,iis a local wave speed estimate at the interface (S, i). For compressbile Euler’s equations (1),\nthe wave speed is estimated as [33]\nλ= max( |v−|,|v+|) + max( |c−|,|c+|), v±=v·n±, c±=p\nγp±/ρ±\nwhere nis the physical unit normal at the interface. The FR correction functions gL, gRin the degree N+ 1polynomial\nspace PN+1are a crucial ingredient of the FR scheme and have the property\ngL(−1) = gR(1) = 1 , g L(1) = gR(−1) = 0\nReference [ 18] gives a discussion on how the choice of correction functions leads to equivalence between FR and\nvariants of DG scheme. In this work, the correction functions known as g2orgHUfrom [ 18] are used since along with\n5APREPRINT - FEBRUARY 21, 2024\nGauss-Legendre-Lobatto (GLL) solution points, they lead to an FR scheme which is equivalent to a DG scheme using\nthe same GLL solution and quadrature points. Once the continuous flux approximation is obtained, the FR scheme is\ngiven by\nduδ\ne,p\ndt+1\nJe,p∇ξ·˜fe(ξp) =0,∀p (21)\nwhere Je,pis the Jacobian of the transformation at solution points xe,p. The FR scheme is explicitly written as\nduδ\ne,p\ndt+1\nJe,p∇ξ·˜fδ\ne(ξ)\n+1\nJe,pdX\ni=1((˜fe·bnR,i)∗−˜fδ\ne·bnR,i)(ξR\ni)g′\nR(ξpi)−((˜fe·bnL,i)∗−˜fδ\ne·bnL,i)(ξL\ni)g′\nL(ξpi) =0(22)\n3.2 Lax-Wendroff Flux Reconstruction (LWFR)\nThe LWFR scheme is obtained by following the Lax-Wendroff procedure for Cartesian domains [ 2] on the transformed\nequation (13). With undenoting the solution at time level t=tn, the solution at the next time level can be written\nusing Taylor expansion in time as\nun+1=un+N+1X\nk=1∆tk\nk!∂(k)\ntun+O(∆tN+2)\nwhere Nis the solution polynomial degree. Then, use ut=−1\nJ∇ξ·˜ffrom (13) to swap a temporal derivative with a\nspatial derivative and retaining terms upto O(∆tN+1)\nun+1=un−1\nJN+1X\nk=1∆tk\nk!∂(k−1)\nt (∇ξ·˜f)\nShifting indices and writing in a conservative form\nun+1=un−∆t\nJ∇ξ��˜F (23)\nwhere ˜Fis a time averaged approximation of the contravaraint flux ˜fgiven by\n˜F=NX\nk=0∆tk\n(k+ 1)!∂k\nt˜f≈1\n∆tˆtn+1\ntn˜fdt (24)\nWe first construct an element local order N+ 1approximation ˜Fδ\neto˜F(Section 3.2.1)\n˜Fδ\ne(ξ) =X\np˜Fe,pℓp(ξ)\nand which will be in general discontinuous across the element interfaces. Then, we construct the\ncontinuous time averaged flux approximation by performing a correction along each direction i, analogous to the\ncase of FR (19), leading to\n(˜Fe(ξ))i= (˜Fδ\ne(ξ))i+ ((˜Fe·bnR,i)∗−˜Fδ\ne·bnR,i)(ξR\ni)gR(ξpi)−((˜Fe·bnL,i)∗−˜Fδ\ne·bnL,i)(ξL\ni)gL(ξpi)(25)\nwhere, as in (20), the numerical flux (˜Fe·bnS,i)∗is an approximation to the time average flux and is computed by a\nRusanov-type approximation,\n(˜Fe·bnS,i)∗=1\n2[(˜Fδ·bnS,i)++ (˜Fδ·bnS,i)−]−λS,i\n2(U+\nS,i−U−\nS,i) (26)\nwhere Uis the approximation of time average solution given by\nU=NX\nk=0∆tk\n(k+ 1)!∂k\ntu≈1\n∆tˆtn+1\ntnudt (27)\n6APREPRINT - FEBRUARY 21, 2024\nThe computation of dissipative part of (26) using the time averaged solution instead of the solution at time tnwas\nintroduced in [ 2] and was termed D2 dissipation. It is a natural choice in approximating the time averaged numerical\nflux and doesn’t add any significant computational cost because the temporal derivatives of uare already available\nwhen computing the local approximation ˜Fδ. The choice of D2 dissipation reduces to an upwind scheme in case of\nconstant advection equation and leads to enhanced Fourier CFL stability limit [2].\nThe Lax-Wendroff update is performed following (21) for (23)\nun+1\ne,p=un\ne,p−∆t\nJe,p∇ξ·˜Fe(ξp)\nwhich can be explicitly written as\nun+1\ne,p=un\ne,p−∆t\nJe,p∇ξ·˜Fδ\ne(ξp)\n−∆t\nJe,pdX\ni=1((˜Fe·bnR,i)∗−˜Fδ\ne·bnR,i)(ξR\ni)g′\nR(ξpi)−((˜Fe·bnL,i)∗−˜Fδ\ne·bnL,i)(ξL\ni)g′\nL(ξpi)(28)\nBy multiplying (28) by quadrature weights Je,pwpand summing over p, it is easy to see that the scheme is conservative\n(see Appendix A) in the sense that\nun+1\ne=un\ne−∆t\n|Ωe| dX\ni=1ˆ\n∂ΩR\no,i(˜Fe·bnR,i)∗dSξ+ˆ\n∂ΩL\no,i(˜Fe·bnL,i)∗dSξ!\n, (29)\nwhere the element mean value ueis defined to be\nue=1\n|Ωe|X\npue,pJe,pwp (30)\n3.2.1 Approximate Lax-Wendroff procedure\nWe now illustrate how to approximate the time average flux at the solution points ˜Fe,pwhich is required to construct\nthe element local approximation ˜Fδ\ne(ξ)using the approximate Lax-Wendroff procedure [ 50]. For N= 1,(24) requires\n∂t˜fwhich is approximated as\n∂t˜fδ(ξp) =˜f(up+ ∆t(ut)p)−˜f(up−∆t(ut)p)\n2∆t(31)\nwhere element index eis suppressed as all these operations are local to each element. The time index is also suppresed\nas all quantities are used from time level tn. Theutabove is approximated using (13)\n(ut)p=−1\nJp∇ξ·˜fδ(ξp) (32)\nwhere ˜fδ\neis the cell local approximation to the flux ˜fgiven in (18). For N= 2, (24) additionally requires ∂tt˜f\n∂tt˜fδ(ξp) =1\n∆t2\u0014\n˜f\u0012\nup+ ∆t(ut)p+∆t\n2(utt)p\u0013\n−2˜f(up) +˜f\u0012\nup−∆t(ut)p+∆t\n2(utt)p\u0013\u0015\nwhere the element index eis again suppressed. We approximate uttas\n(utt)p=−1\nJp∇ξ·∂t˜fδ(ξp) (33)\nThe procedure for other degrees will be similar and the derivatives ∇ξare computed using a differentiation matrix. The\nimplementation can be made efficient by accounting for cancellations of ∆tterms. Since this step is similar to that on\nCartesian grids, the reader is referred to Section 4 of [2] for more details.\n3.3 Free stream preservation for LWFR\nSince the divergence in a Flux Reconstruction (FR) scheme (22) is computed as the derivative of a polynomial, the\nfollowing metric identity is required for our scheme to preserve a constant state\ndX\ni=1∂\n∂ξiIN(Jai) =0 (34)\n7APREPRINT - FEBRUARY 21, 2024\nwhere INis the degree Ninterpolation operator defined as\nIN(f)(ξ) =X\npℓp(ξ)f(ξp) (35)\nThe study of free-stream preservation was made in [ 23] showing that satisfying (34) gives free stream preservation.\nHowever, it was also shown that the identities impose additional constraints on the degree of the reference map Θ. The\nremedy given in (34) is to replace the metric terms Jaiby a different degree Napproximation IN(Jai)so that (34)\nreduces to\ndX\ni=1∂\n∂ξiININ(Jai) =dX\ni=1∂\n∂ξiIN(Jai) =0 (36)\nIn [23], choices of INlike the conservative curl form were proposed which ensured (36) without any additional\nconstraints on the degree of the reference map Θ. Those choices are only relevant in 3-D as, in 2-D, they are equivalent\nto interpolating Θto a degree Npolynomial before computing the metric terms which is the choice of INwe make in\nthis work by defining the reference map as in (5).\nIn this section, we show that the identities (34) are enough to ensure free stream preservation for LWFR. Throughout this\nsection, we assume that the mesh is well-constructed [23] which is a property that follows from the natural assumption\nof global continuity of the reference map.\nDefinition 3 Consider a mesh where element faces in reference element Ωoare denoted as\b\n∂ΩS\no,i\t\nfor coordinate\ndirections 1≤i≤dandS=L/R chosen so that the corresponding reference normals {bnS,i}arebnR,i=eiand\nbnL,i=−bnR,iwhere {ei}d\ni=1is the Cartesian basis, see Figure 1. The mesh is said to be well-constructed if the\nfollowing is satisfied\ndX\nm=1(IN(Jam)+−IN(Jam)−)(bnS,i)m=0∀1≤i≤d, s =L, R (37)\nwhere ±are used to denote trace values from Ωoor from the neighbouring element respectively.\nRemark 2 From (10), the identity (37) can be seen as a property of the tangential derivatives of the reference map\nat the faces and is thus obtained if the reference map is globally continuous. Also, since the unit normal vector of an\nelement at interface iis given by Jai/\r\rJai\r\r, (37) also gives us continuity of the unit normal across interfaces.\nAssuming the current solution is constant in space, un=c, we will begin by proving that the approximate time\naveraged flux and solution satisfy\n˜Fδ=˜fδ(c),U=uδ=c (38)\nFor the constant physical flux f(c), the contravariant flux ˜fwill be\n˜fi=IN(Jai)·f(c) =dX\nn=1IN(Jai\nn)fn(c)\nUsing (32), we obtain at each solution point\nut=−1\nJ∇ξ·˜fδ=−1\nJdX\ni=1∂ξi(˜fδ)i\n=−1\nJdX\ni=1∂ξi(IN(Jai)·f(c)) =−1\nJ dX\ni=1∂ξiIN(Jai)!\n·f(c)\n=0\nwhere the last equality follows from using the metric identity (34). For polynomial degree N= 1, recalling (31), this\nproves that\n∂t˜fδ=˜f(u+ ∆tut)−˜f(u−∆tut)\n2∆t=0\nThus, we obtain\n˜Fδ=˜fδ+∆t\n2∂t˜fδ=˜fδ,U=uδ+∆t\n2∂tuδ=uδ\n8APREPRINT - FEBRUARY 21, 2024\nBuilding on this, for N= 2, by (33),\nutt=−1\nJ∇ξ·∂t˜fδ=0\nwhich will prove ∂tt˜fδ=0and we similarly obtain the following for all degrees\n˜Fδ=NX\nk=0∆tk\n(k+ 1)!∂k\nt˜fδ=˜fδ=\b\nJai·f(c)\td\ni=1(39)\nU=NX\nk=0∆tk\n(k+ 1)!∂k\ntuδ=uδ=c (40)\nTo prove free stream preservation, we argue that the update (28) vanishes as the volume terms involving divergence of\n˜Fδand the surface terms involving trace values and numerical flux vanish. By (39), the volume terms in (28) are given\nby\n1\nJ∆t dX\ni=1∂ξiIN(Jai)!\n·f(c)\nand vanish by the metric identity (36). By (40), the dissipative part of the numerical flux (26) is computed with the\nconstant solution un=cand will thus vanish. For the central part of the numerical flux, as the mesh is well-constructed\n(Definition 3), the trace values are given by\n(˜Fδ·bni)+=dX\nm=1(IN(Jam)·f(c))+(bni)m=dX\nm=1(IN(Jam)·f(c))−(bni)m= (˜Fδ·bni)−\nThus, the numerical flux agrees with the physical flux at element interfaces, making the surface terms in (28) vanish.\n4 Shock capturing and admissibility preservation\nThe LWFR scheme (28) gives a high order method for smooth problems, but most practical problems involving\nhyperbolic conservation laws consist of non-smooth solutions containing shocks. In such situations, using a higher\norder method is bound to produce Gibbs oscillations, as is stated in Godunov’s order barrier theorem [ 15]. The cure\nis to non-linearly add dissipation in regions where the solution is non-smooth, with methods like artificial viscosity,\nlimiters and switching to a robust lower order scheme; the resultant scheme will be non-linear even for linear equations.\nIn this work, we use the blending scheme for LWFR proposed in [ 3] for Gauss-Legendre solution points. In order to be\ncompatible with Trixi.jl [33] and make use of this excellent code, we introduce LWFR with blending scheme for\nGauss-Legendre-Lobatto solution points, which are also used in Trixi.jl . As in [ 3], the blending scheme has to be\nconstructed to be provably admissibility preserving (Definition 4). The rest of this section consists of terminologies for\nadmissibility preservation and the admissibility preserving blending scheme, some of which is a review of [3].\n4.1 Admissibility preservation\nFor the Euler’s equations, since negative density and pressure are nonphysical, an admissible solution is one that\nbelongs to the admissible set {u:ρ(u), p(u)>0}. Since the admissibility preservation approach used in this work\ncan be used for more general problems, we introduce the general notations here.\nLetUad⊂Rpdenote the convex set in which physically correct solutions of the general conservation law (3)must\nbelong; we suppose that it can be written in terms of Kconstraints as\nUad={u∈Rp:pk(u)>0,1≤k≤K} (41)\nwhere each admissibility constraint pkis concave if pj>0for all j < k . For Euler’s equations, K= 2andp1, p2are\ndensity, pressure functions respectively; the density is clearly a concave function of uand if the density is positive\nthen it can be easily verified that the pressure is also a concave function of the conserved variables. The admissibility\npreserving property, also known as convex set preservation property , of the conservation law can be written as\nu(·, t0)∈ Uad =⇒ u(·, t)∈ Uad, t > t 0 (42)\nand thus we define an admissibility preserving flux reconstruction scheme as follows.\n9APREPRINT - FEBRUARY 21, 2024\nFe\u00001\n2Fe+1\n2\nxe\u00001\n2xe+1\n2f1\n2f3\n2f5\n2f7\n2\nGLL nodes\nFR element\nSubcells\nFigure 2: Subcells used by the lower order scheme for degree N= 4\nDefinition 4 The flux reconstruction scheme is said to be admissibility preserving if\nun\ne,p∈ Uad,∀e,p =⇒ un+1\ne,p∈ Uad,∀e,p\nwhere Uadis the admissibility set of the conservation law.\nTo obtain an admissibility preserving scheme, we exploit the weaker admissibility preservation in means property.\nDefinition 5 The flux reconstruction scheme is said to be admissibility preserving in the means if\nun\ne,p∈ Uad,∀e,p =⇒ un+1\ne∈ Uad,∀e\nwhere Uadis the admissibility set of the conservation law and uedenotes the element mean (30).\n4.2 Blending scheme\nIn this section, we explain the blending procedure which obtains admissibility preservation in means property for LWFR\nscheme on curvilinear grids using Gauss-Legendre-Lobatto solution points. The procedure is very similar to that of [ 3]\nfor Cartesian grids where Gauss-Legendre solution points were used.\nLet us write the LWFR update equation (23) as\nuH,n+1\ne =un\ne−∆t\n∆xeRH\ne (43)\nwhere ueis the vector of nodal values in the element Ωe. Suppose we also have a lower order, non-oscillatory scheme\navailable to us in the form\nuL,n+1\ne =un\ne−∆t\n∆xeRL\ne (44)\nThen a blended scheme is given by\nun+1\ne= (1−αe)uH,n+1\ne +αeuL,n+1\ne =un\ne−∆t\n∆xe[(1−αe)RH\ne+αeRL\ne] (45)\nwhere αe∈[0,1]must be chosen based on some local smoothness indicator. If αe= 0, then we obtain the high order\nLWFR scheme, while if αe= 1then the scheme becomes the low order scheme that is less oscillatory. In subsequent\nsections, we explain the details of the lower order scheme and the design of smoothness indicators.\n4.2.1 Blending scheme in 1-D\nLet us subdivide each element Ωe= [xe−1\n2, xe+1\n2]intoN+ 1subcells associated to the solution points {xe\np, p=\n0,1, . . . , N }of the LWFR scheme. Thus, we will have N+ 2subfaces within each element Ωedenoted by {xe\np+1\n2, p=\n−1, . . . , N }where xe\n−1\n2=xe−1\n2=xe\n0,xe\nN+1\n2=xe+1\n2=xe\nN. For maintaining a conservative scheme, the pthsubcell\nis chosen so that\nxe\np+1\n2−xe\np−1\n2=wp∆xe, 0≤p≤N (46)\nwhere wpis the pthquadrature weight associated with the solution points, and ∆xe=xe+1\n2−xe−1\n2. Figure 2 gives an\nillustration of the subcells for degree N= 4case.\nThe low order scheme is obtained by updating the solution in each of the subcells by a finite volume scheme,\nuL,n+1\ne,0=un\ne,0−∆t\nw0∆xe[fe\n1\n2−Fe−1\n2]\nuL,n+1\ne,p =un\ne,p−∆t\nwp∆xe[fe\np+1\n2−fe\np−1\n2], 1≤p≤N−1\nuL,n+1\ne,N =un\ne,N−∆t\nwN∆xe[Fe+1\n2−fe\nN−1\n2](47)\n10APREPRINT - FEBRUARY 21, 2024\nξ(2,2)\nξ0Θe(ˆξ1,ˆξ2)\nxe,0xe,(2,2)\nFigure 3: Subcells in a curved element\nThe fluxes fe\np+1\n2=f(un\np,un\np+1)are first order numerical fluxes and Fe+1\n2is the blended numerical flux which is\na convex combination of the time averaged numerical flux (26) and a lower order flux fe+1\n2=f(un−\ne+1\n2,un+\ne+1\n2) =\nf(ue,N,ue+1,0). The same blended numerical flux Fe+1\n2is used in the high order LWFR residual (43, 28); see\nRemark 1 of [ 3] for why it is crucial to do so to ensure conservation. In this work, Rusanov’s flux [ 37] will be used for\nthe inter-element fluxes and for fluxes in the lower order scheme. The element mean value obtained by the low order\nscheme, high order scheme and the blended scheme satisfy the conservative property\nuL,n+1\ne =uH,n+1\ne =un+1\ne=un\ne−∆t\n∆xe(Fe+1\n2−Fe−1\n2) (48)\nThe inter-element fluxes Fe±1\n2are used both in the low and high order schemes at xe+1\n2=xe\nN, xe−1\n2=xN\n0respectively,\nwhere both schemes have a solution point and an element interface. It has to be chosen carefully to balance accuracy,\nrobustness and ensure admissibility preservation. The following natural initial guess is made and then further corrected\nto enforce admissibility, as explained in Section 4.3\nFe+1\n2= (1−αe+1\n2)FLW\ne+1\n2+αe+1\n2fe+1\n2, αe+1\n2∈[0,1] (49)\nwhere FLW\ne+1\n2is the high order inter-element time-averaged numerical flux of the LWFR scheme (26) andfe+1\n2is a\nlower order flux at the face xe+1\n2shared between FR elements and subcells. The coefficient αe+1\n2is given byαe+αe+1\n2\nwhere αeis the blending coefficient computed with a smoothness indicator (Section 4.2.3). The reader is referred to\nSection 3.2 of [3] for more details.\nRemark 3 The contribution to RL\ne,RH\neof the flux Fe+1\n2has coefficients given by∆t\nwN∆xe,∆t\n∆xeg′\nR(ξN)respectively, as\ncan be seen from (47, 28). Since we use g2correction functions with Gauss-Legendre-Lobatto solution points, we have\nfrom equivalence of FR and DG, g′\nR(ξN) =ℓN(1)/wN= 1/wN. Thus, the coefficient is the same for both higher and\nlower order residuals and we add the contribution without a blending coefficient. This is different from the case of\nGauss-Legendre solution points used in the blending scheme of [3].\n4.2.2 Blending scheme for curvilinear grids\nThe subcells for a curved element will be defined by the reference map, as shown in Figure 3. As in Appendix B.3 of [ 17],\nthe finite volume formulation on subcells is obtained by an integral formulation of the transformed conservation law (13).\nIn the reference element, consider subcells Cpof size wp=Qd\ni=1wpiwith solution point (ξpi)d\ni=1corresponding to\nthe multi-index p= (pi)d\ni=1where pi∈ {0,1. . . , N }. Fix a subcell C=Cparound the solution point ξ= (ξpi)d\ni=1\nand denote ξL/R\ni as in (17). Integrate the conservation law on the fixed subcell C\nˆ\nCJutdV+ˆ\nC∇ξ·˜fdV=0\nNext perform one point quadrature in the first term and apply Gauss divergence theorem on the second term to get\nJe,pdup\ndtwp+ˆ\n∂C˜f·bndA=0 (50)\n11APREPRINT - FEBRUARY 21, 2024\nwherebnis the reference normal vector on the subcell surface. Now evaluate this surface integral by approximating\nfluxes in each direction with numerical fluxes\nˆ\n∂C˜f·bndA=dX\ni=1wp\nwpi[(˜fδ\nC·bnR,i)∗(ξR\ni) + ( ˜fδ\nC·bnL,i)∗(ξL\ni)],bnR,i=ei,bnL,i=−ei (51)\nThe explicit lower order method using forward Euler update is given by\nun+1\np=un\np−∆t\nJe,pdX\ni=11\nwpi[(˜fδ\nCp·bnR,i)∗(ξR\ni) + ( ˜fδ\nCp·bnL,i)∗(ξL\ni)] (52)\nFor the subcells whose interfaces are not shared by the FR element, the fluxes are computed, following [17], as\n(˜fδ\nCp·bnR,i)∗(ξR\ni) =∥(nR,i)p∥f∗\u0012\nup,upi+,(nR,i)p\n∥(nR,i)p∥\u0013\n(˜fδ\nCp·bnL,i)∗(ξL\ni) =∥(nL,i)p∥f∗\u0012\nupi−,up,(nL,i)p\n∥(nL,i)p∥\u0013\n(pi±)m=\u001apm m̸=i\npi±1m=i(53)\nwhere (ns,i)pis the normal vector of subcell Cpin direction iand side s∈ {L, R}. The numerical fluxes (53) are\ntaken to be Rusanov’s flux (20)\n˜f∗(u−,u+,n) =1\n2[(f·n)(u+) + (f·n)(u−)]−λ\n2(u+−u−) (54)\nAt the interfaces shared by FR elements, the first order numerical flux is computed by setting u±in(54) to element\ntrace values as in (20). However, the lower order residual needs to be computed using the same inter-element flux as the\nhigher order scheme at interfaces of the Flux Reconstruction (FR) elements. Thus, for example, for an element Ωeat\nsolution point ξ=ξpwithp=0, the subcell update will be given by\nun+1\ne,0=un\ne,0−∆t\nJe,pdX\ni=11\nwpi[(˜fδ\nC0·bnR,i)∗(ξR\ni) + ( ˜Fδ\ne·bnL,i)∗(ξL\ni)] (55)\nwhere (˜Fδ\ne·bni)∗(ξL\ni)is the blended numerical flux and is computed by taking a convex combination of the lower\norder flux chosen as in (20) and the time averaged flux (26). An initial guess is made as in 1-D (49) and then further\ncorrection is performed to ensure admissibility, as explained in Section 4.3.2. Other subcells neighbouring the element\ninterfaces will also use the blended numerical fluxes at the element interfaces and thus have an update similar to (55).\nThen, by multiplying each update equation of each subcell pbywpand summing over p, the conservation property is\nobtained\nuL,n+1\ne =X\npuL,n+1\ne,pwp=un\ne−∆t\n|Ωe| dX\ni=1ˆ\n∂ΩR\no,i(˜Fδ\ne·bnR,i)∗dSξ+ˆ\n∂ΩL\no,i(˜Fδ\ne·bnL,i)∗dSξ!\n(56)\nSince we also have the conservation property in the higher order scheme (29), the blended scheme will be conservative,\nanalogous to the 1-D case (48).\nThe expressions for normal vectors on the subcells needed to compute (53) are taken from Appendix B.4 of [ 17] where\nthey were derived by equating the high order flux difference and Discontinuous Galerkin split form. We directly state\nthe normal vectors here, denoting (nR,i)pas the outward normal direction in subcell Cpalong the positive idirection\n(nR,i)p=IN(Jai)pi|0+piX\nl=0wl∂ξiIN(Jai)pi|l, (pi|l)m=\u001apmm̸=i\nplm=i.\nwhere {wl}N\nl=0are quadrature weights corresponding to solution points, INis the approximation operator for metric\nterms (36), and (nL,i)pcan be obtained by the relation (nL,i)p=−(nR,i)pi−, where pi−was defined in (53).\n12APREPRINT - FEBRUARY 21, 2024\nFree-stream preservation. To show the free stream preservation of the lower order scheme with the chosen normal\nvectors, we consider a constant initial state u=cand show that the finite volume residual will be zero. A constant\nstate implies that the time average of the contravariant flux will be the contravariant flux itself (38). Thus, all numerical\nfluxes including element interface fluxes are first order fluxes like in (53) and the residual at pin direction iis given by\nf(c)\nwpi·((nR,i)p+ (nL,i)p) =f(c)\nwpi·(IN(Jai)pi|0+piX\nl=0wl∂ξiIN(Jai)pi|l−IN(Jai)pi|0−pi−1X\nl=0wl∂ξiIN(Jai)pi|l)\n=f(c)·∂ξiIN(Jai)p\nThe residuals in other directions give similar terms and summing them gives\nf(c)·dX\ni=1∂\n∂ξiIN(Jai)p=0\nby the metric identities, thus satisfying the free stream preservation condition.\n4.2.3 Smoothness indicator\nThe smoothness of the numerical solution is assessed by writing the degree Npolynomial within each element in terms\nof an orthonormal basis like Legendre polynomials and then analyzing the decay of the coefficients [ 29,21,17]. For a\nsystem of PDE, the orthonormal expansion of a derived quantity q(u)is used; a good choice for Euler’s equations is the\nproduct of density and pressure [17] which depends on all the conserved quantities.\nLetq=q(u)be the quantity used to measure the solution smoothness. With {Lj}N\nj=0being the 1-D Legendre\npolynomial basis of degree N, taking tensor product gives the degree NLegendre basis\nLp(ξ) =dY\ni=1Lpi(ξi), p i∈ {0,1, . . . , N }\nThe Legendre basis representation of qcan be obtained as\nqh(ξ) =X\npˆqpLp(ξ),ξ∈Ωo, ˆqp=ˆ\nΩoq(uδ(ξ))Lj(ξ)dξ\nThe Legendre coefficients {ˆqp}are computed using the quadrature induced by the solution points,\nˆqp=X\nqq(ue,q)Lp(ξq)wq\nDefine\nSK=X\np,pi≤Kˆq2\np\nwhich the measures the \"energy\" in qh. Then the energy contained in highest modes relative to the total energy of the\npolynomial is computed as follows\nE= max\u001aSN−SN−1\nSN,SN−1−SN−2\nSN−1\u001b\nIn 1-D, this simplifies to the expression of [17, 3]\nE= max(\nˆq2\nNPN\nj=0ˆq2\nj,ˆq2\nN−1PN−1\nj=0ˆq2\nj)\nTheNthLegendre coefficient ˆqNof a function which is in the Sobolev space H2decays as O(1/N2)(see Chapter\n5, Section 5.4.2 of [ 10]). We consider smooth functions to be those whose Legendre coefficients ˆqNdecay at rate\nproportional to 1/N2or faster so that their squares decay proportional to 1/N4[29]. Thus, the following dimensionless\nthreshold for smoothness is proposed in [17]\nT(N) =a·10−c(N+1)4\n13APREPRINT - FEBRUARY 21, 2024\nwhere parameters a=1\n2andc= 1.8are obtained through numerical experiments. To convert the highest mode energy\nindicator Eand threshold value Tinto a value in [0,1], the logistic function is used\n˜α(E) =1\n1 + exp( −s\nT(E−T))\nThe sharpness factor swas chosen to be s= 9.21024 so that blending coefficient equals α= 0.0001 when highest\nenergy indicator E= 0. In regions where ˜α= 0or˜α= 1, computational cost can be saved by performing only the\nlower order or higher order scheme respectively. Thus, the values of αare clipped as\nαe:=\n\n0,if˜α < α min\n˜α, ifαmin≤˜α≤1−αmin\n1,if1−αmin<˜α\nwithαmin= 0.001. Finally, since shocks can spread to the neighbouring cells as time advances, some smoothening of\nαis performed as\nαfinal\ne= max\nE∈Ee\u001a\nαe,1\n2αE\u001b\n(57)\nwhere Eedenotes the set of elements sharing a face with Ωe.\n4.3 Flux limiter for admissibility preservation\nWe first review the flux limiting process for admissibility preservation from [ 3] for 1-D and then do a natural extension\nto curvilinear meshes. The first step in obtaining an admissibility preserving blending scheme is to ensure that the lower\norder scheme preserves the admissibility set Uad. This is always true if all the fluxes in the lower order method are\ncomputed with an admissibility preserving low order finite volume method. But the LWFR scheme uses a time average\nnumerical flux and maintaining conservation requires that we use the same numerical flux at the element interfaces for\nboth lower and higher order schemes (Remark 1 of [ 3]). To maintain accuracy and admissibility, we carefully choose a\nblended numerical flux Fe+1\n2as in (49) but this choice may not ensure admissibility and further limitation is required.\nOur proposed procedure for choosing the blended numerical flux will give us an admissibility preserving lower order\nscheme. As a result of using the same numerical flux at element interfaces in both high and low order schemes, element\nmeans of both schemes are the same (Theorem 1). A consequence of this is that our scheme now preserves admissibility\nof element means and thus we can use the scaling limiter of [48] to get admissibility at all solution points.\nThe theoretical basis for flux limiting can be summarized in the following Theorem 1.\nTheorem 1 Consider the LWFR blending scheme (45) where low and high order schemes use the same numerical flux\n(˜Fδ\ne·bni)∗(ξs\ni)at every element interface and the lower order residual is computed using the first order finite volume\nscheme (52). Then the following can be said about admissibility preserving in means property (Definition 5) of the\nscheme:\n1.element means of both low and high order schemes are same, and thus the blended scheme (45) is admissibility\npreserving in means if and only if the lower order scheme is admissibility preserving in means;\n2.if the blended numerical flux (˜Fδ\ne·bni)∗(ξs\ni)is chosen to preserve the admissibility of lower-order updates at\nsolution points adjacent to the interfaces, then the blending scheme (45) will preserve admissibility in means.\nProof By (29, 56), element means are the same for both low and high order schemes. Thus, admissibility in means\nof one implies the same for the other, proving the first claim. For the second claim, note that our assumptions imply\nuL,n+1\ne,p given by (52, 55) are in Uadfor all p. Therefore, we obtain admissibility in means property of the lower order\nscheme by (56) and thus admissibility in means for the blended scheme. 2\n4.3.1 Flux limiter for admissibility preservation in 1-D\nFlux limiting ensures that the update obtained by the lower order scheme will be admissible so that, by Theorem 1,\nadmissibility in means is obtained. The procedure of flux limiting will be explained for the element Ωe= [xe−1\n2, xe+1\n2].\nThe lower order scheme is computed with a first order finite volume method so that admissibility is already ensured for\ninner solution points; i.e., we already have\nuL,n+1\ne,p∈ Uad, 1≤p≤N−1\n14APREPRINT - FEBRUARY 21, 2024\nThe admissibility for the first ( p= 0) and last solution points ( p=N) will be enforced by appropriately choosing\nthe inter-element flux Fe+1\n2. The first step is to choose a candidate for Fe+1\n2which is heuristically expected to give\nreasonable control on spurious oscillations while maintaining accuracy in smooth regions, e.g.,\nFe+1\n2= (1−αe+1\n2)FLW\ne+1\n2+αe+1\n2fe+1\n2, αe+1\n2=αe+αe+1\n2\nwhere fe+1\n2is the lower order flux at the face e+1\n2shared between FR elements and subcells, and αeis the blending\ncoefficient (45) based on an element-wise smoothness indicator (Section 4.2.3).\nThe next step is to correct Fe+1\n2to enforce the admissibility constraints. The guiding principle of this approach is to\nperform the correction within the face loops, minimizing storage requirements and additional memory reads. The lower\norder updates in subcells neighbouring the e+1\n2face with the candidate flux are\n“un+1\n0=un\ne+1,0−∆t\nw0∆xe+1(fe+1\n3\n2−Fe+1\n2)\n“un+1\nN=un\ne,N−∆t\nwN∆xe(Fe+1\n2−fe\nN+1\n2)(58)\nTo correct the interface flux, we will again use the fact that low order finite volume flux fe+1\n2=f(u−\ne+1\n2,u+\ne+1\n2)\npreserves admissibility, i.e.,\n“ulow,n+1\n0 =un\ne+1,0−∆t\nw0∆xe+1(fe+1\n3\n2−fe+1\n2)∈ Uad\n“ulow,n+1\nN =un\ne,N−∆t\nwN∆xe(fe+1\n2−fe\nN+1\n2)∈ Uad\nLet{pk,1≤1≤K}be the admissibility constraints (41) of the conservation law. The numerical flux is corrected by\niterating over the admissibility constraints as explained in Algorithm 1\nAlgorithm 1 Computation of blended flux Fe+1\n2\nInput: FLW\ne+1\n2,fe+1\n2,fe+1\n3\n2,fe\nN+1\n2,un\ne+1,0,un\ne,N, αe, αe+1\nOutput: Fe+1\n2\nαe+1\n2=αe+αe+1\n2\nFe+1\n2←(1−αe+1\n2)FLW\ne+1\n2+αe+1\n2fe+1\n2▷Heuristic guess to control oscillations\n“un+1\n0←un\ne+1,0−∆t\nw0∆xe+1(fe\n3\n2−Fe+1\n2) ▷FV inner updates with guessed Fe+1\n2\n“un+1\nN←un\ne,N−∆t\nwN∆xe(Fe+1\n2−fe\nN+1\n2)\n“ulow,n+1\n0 =un\ne+1,0−∆t\nw0∆xe+1(fe+1\n3\n2−fe+1\n2) ▷FV inner updates with fe+1\n2\n“ulow,n+1\nN =un\ne,N−∆t\nwN∆xe(fe+1\n2−fe\nN+1\n2)\nfork= 1 : Kdo ▷Correct Fe+1\n2forKadmissibility constraints\nϵ0, ϵN←1\n10pk(“ulow,n+1\n0 ),1\n10pk(“ulow,n+1\nN )\nθ←min\u0012\nminj=0,N\f\f\f\fϵj−pk(“ulow,n+1\nj))\npk(“un+1\nj)−pk(“ulow,n+1\nj)\f\f\f\f,1\u0013\nFe+1\n2←θFe+1\n2+ (1−θ)fe+1\n2▷FV inner updates with guessed Fe+1\n2\n“un+1\n0←un\ne+1,0−∆t\nw0∆xe+1(fe+1\n3\n2−Fe+1\n2)\n“un+1\nN←un\ne,N−∆t\nwN∆xe(Fe+1\n2−fe\nN+1\n2)\nend for\nBy concavity of pk, after the kthiteration, the updates computed using flux Fe+1\n2will satisfy\npk(“un+1\nj) =pk(θ(“un+1\nj)prev+ (1−θ)“ulow,n+1\nj )\n≥θpk((“un+1\nj)prev) + (1 −θ)pk(“ulow,n+1\nj )\n≥ϵj, j = 0, N(59)\n15APREPRINT - FEBRUARY 21, 2024\nsatisfying the kthadmissibility constraint; here (“un+1\nj)prevdenotes “un+1\njbefore the kthcorrection and the choice of\nϵj=1\n10pk(“ulow,n+1\nj )is made following [ 35]. After the Kiterations, all admissibility constraints will be satisfied and\nthe resulting flux Fe+1\n2will be used as the interface flux keeping the lower order updates and thus the element means\nadmissible. Thus, by Theorem 1, the choice of blended numerical flux gives us admissibility preservation in means. We\nnow use the scaling limiter of [ 48] to obtain an admissibility preserving scheme as defined in Definition 4. An overview\nof the complete residual computation of Lax-Wendroff Flux Reconstruction scheme can be found in Algorithm 3.\n4.3.2 Flux limiter for admissibility preservation on curved meshes\nConsider the calculation of the blended numerical flux for a corner solution point of the element, see Figure 3. A corner\nsolution point is adjacent to interfaces in all ddirections, making its admissibility preservation procedure different from\n1-D. In particular, let us consider the corner solution point p=0and show how we can apply the 1-D procedure in\nSection 4.3.1 to ensure admissibility at such points. The same procedure applies to other corner and non-corner points.\nThe lower order update at the corner is given by (55)\n“un+1\ne,0=un\ne,0−∆t\nJe,pdX\ni=11\nwpi[(˜fδ\nC0·bnR,i)∗(ξR\ni) + ( “Fδ\ne·bnL,i)∗(ξL\ni)] (60)\nwherebni=eiis the reference normal vector on the subcell interface in direction i,(˜fδ\nC0·bnR,i)∗denotes the lower order\nflux(51) at the subcell C0surrounding ξ0,(“Fδ\ne·bnL,i)∗(ξL\ni)is the initial guess candidate for the blended numerical\nflux. Pick ki>0such thatPd\ni=1ki= 1and\n“ulow,n+1\ni :=un\ne,0−∆t\nkiwpiJe,p[(˜fδ\nC0·bnR,i)∗(ξR\ni) + ( ˜f·bnL,i)∗(ξL\ni)], 1≤i≤d (61)\nsatisfy\n“ulow,n+1\ni ∈ Uad, 1≤i≤d (62)\nwhere (˜f·bni)∗(ξL\ni)is the first order finite volume flux computed at the FR element interface.\nThe{ki}that ensure (62) will exist provided the appropriate CFL restrictions are satisfied because the lower order\nscheme using the first order numerical flux at element interfaces is admissibility preserving. The choice of {ki}should\nbe made so that (62) is satisfied with the least time step restriction. However, we make the trivial choice of equal ki’s\nmotivated by the experience of [ 3], where it was found that even this choice does not impose any additional time step\nconstraints over the Fourier stability limit. After choosing ki’s, we have reduced the update to 1-D and can repeat the\nsame procedure as in Algorithm 1 where for all directions i, the neighbouring element is chosen along the normal\ndirection. After the flux limiting is performed following the Algorithm 1, we obtain (“Fδ\ne·bnL,i)∗(ξL\ni)such that\n“un+1\ni:=un\ne,0−∆t\nkiwpiJe,p[(˜fδ\nC0·bnR,i)∗(ξR\ni) + ( “Fδ·bnL,i)∗(ξL\ni)]∈ Uad (63)\nThen, we will get\ndX\ni=1ki“un+1\ni=“un+1\ne,0∈ Uad (64)\nalong with admissibility of all other corner and non-corner solution points where the flux (“Fδ·bni)∗(ξR\ni)is used.\nFinally, by Theorem 1, admissibility in means (Definition 30) is obtained and the scaling limiter of [ 48] can be used to\nobtain an admissibility preserving scheme (Definition 4).\n5 Adaptive mesh refinement\nAdaptive mesh refinement helps resolve flows where the relevant features are localized to certain regions of the physical\ndomain by increasing the mesh resolution in those regions and coarsening in the rest of the domain. In this work, we\nallow the adaptively refined meshes to be non-conforming, i.e., element neighbours need not have coinciding solution\npoints at the interfaces (Figure 4a). We handle the non-conformality using the mortar element method first introduced\nfor hyperbolic PDEs in [25].\nIn order to perform the transfer of solution during coarsening and refinement, we introduce some notations and operators.\nDefine the 1-D reference elements\nI0= [−1,0], I 1= [0,1], I = [−1,1],Nd\n1={0,1}d(65)\n16APREPRINT - FEBRUARY 21, 2024\nand the bijections ϕs:Is→Ifors= 0,1as\nϕ0(ξ) = 2 ξ+ 1, ξ∈I0, ϕ 1(ξ) = 2 ξ−1, ξ∈I1 (66)\nso that the inverse maps ϕ−1\ns:I→Isare given by\nϕ−1\n0(ξ) =ξ−1\n2, ξ∈I, ϕ−1\n1(ξ) =ξ+ 1\n2, ξ∈I (67)\nDenoting the 1-D solution points and Lagrange basis for Ias{ξp}N\np=0and{ℓp(ξ)}N\np=0respectively, the same for Is\nare given by\b\nϕ−1\ns(ξp)\tN\np=0and{ℓp(ϕs(ξ))}N\np=0respectively. We also define −´\nto be integration under quadrature at\nsolution points. Thus,\n−ˆ\nIu(ξ)dξ=NX\np=0u(ξp)wp,−ˆ\nIsu(ξ)dξ=NX\np=02u(ϕ−1\ns(ξp))wp\nIn order to get the solution point values of the refined elements, we will perform interpolation. All integrals in this\nsection are approximated by quadrature at solution points which are the degree NGauss-Legendre-Lobatto points. The\ninterpolation operator from Ito{Is}s=0,1is given by VΞsdefined as the Vandermonde matrix corresponding to the\nLagrange basis\n(Vs)pq=ℓq(ϕ−1\ns(ξp)), 0≤p, q≤N, s = 0,1 (68)\nFor the process of coarsening, we also define the L2projection operators {Ps}s=0,1which projects a polynomial u\ndefined on the Lagrange basis of Isto the Lagrange basis of Ias\n−ˆ\nIPs(u)(ξ)ℓi(ξ)dξ=−ˆ\nIsu(ξ)ℓi(ξ)dξ 0≤i≤N\nApproximating the integrals by quadrature on solution points, we obtain the matrix representations corresponding to the\nbasis\nPs\npq=1\n2wq\nwpℓp(ϕ−1\ns(ξq)) 0 ≤i, j≤N, s = 0,1 (69)\nwhere{wp}N\np=0are the quadrature weights corresponding to solution points. The transfer of solution during coarsening\nand refinement is performed by matrix vector operations using the operators (68, 69). Thus, the operators (68, 69) are\nstored as matrices for reference element at the beginning of the simulation and reused for the adaptation operations in\nall elements. Lastly, we introduce the notation of a product of matrix operators {Ai}d\ni=1acting on b= (bp)p∈Nd\nN=\n(bp1p2p3)p∈Nd\nNas\n(Aib)p=X\nq∈Nd\nN dY\ni=1(Ai)piqi!\nbq (70)\n5.1 Solution transfer between element and subelements\nCorresponding to the element Ωe, we denote the 2dsubdivisions as (Figure 4b)\nΩes= Θ e dY\ni=1Isi!\n,∀s∈Nd\n1\nwhere Isare defined in (65). We also define ϕs(ξ) = ( ϕsi(ξi))d\ni=1so that ϕsis a bijection between ΩesandΩe.\nRecall that {ℓp}p∈Nd\nNare Lagrange polynomials of degree Nwith variables ξ= (ξi)d\ni=1. Thus, the reference solution\npoints and Lagrange basis for Ωesare given by\b\nϕ−1\ns(ξp)\t\np∈Nd\nNand{ℓp(ϕs(ξ))}p∈Nd\nN, respectively. The respective\nrepresentations of solution approximations in Ωe,Ωesin reference coordinates are thus given by\nue(ξ) =X\nq∈Nd\nNℓq(ξ)ue,q,ues(ξ) =X\nq∈Nd\nN���q(ϕs(ξ))ues,q (71)\n17APREPRINT - FEBRUARY 21, 2024\n(a)\nΩe\nueRefine and interpolate\nCoarsen and projectΩe1\nue1Ωe2\nue2\nΩe3\nue3Ωe4\nue4\n(b)\nFigure 4: (a) Neighbouring elements with hanging nodes (b) Illustration of refinement and coarsening\n5.1.1 Interpolation for refinement\nAfter refining an element Ωeinto child elements {Ωes}s∈Nd\n1, the solution uehas to be interpolated on the solution\npoints of child elements to obtain {ues}s∈Nd\n1. The scheme will be specified by writing ues,qin terms of ue,q, which\nwere defined in (71). The interpolation is performed as\nues,p=X\nq∈Nd\nNℓq(ϕ−1\ns(ξp))ue,q=X\nq∈Nd\nN dY\ni=1ℓqi(ϕ−1\nsi(ξpi))!\nue,q\n=X\nq∈Nd\nN dY\ni=1(VΞsi)piqi!\nue,q(72)\nIn the product of operators notation (70), the interpolation can be written as\nues= dY\ni=1VΞsi!\nue\n5.1.2 Projection for coarsening\nWhen 2delements are joined into one single bigger element Ωe, the solution transfer is performed using L2projection\nof{ues}s∈Nd\n1intoue, which is given by\nX\ns∈Nd\n1−ˆ\nΩesuesℓp(ξ)dx=−ˆ\nΩeueℓp(ξ)dx,∀p∈Nd\nN (73)\nSubstituting (71) into (73) gives\nX\ns∈Nd\n1X\nq∈Nd\nN−ˆ\nΩesℓp(ξ)ℓq(ϕs(ξ))ues,qdx=X\nq∈Nd\nN−ˆ\nΩeℓp(ξ)ℓq(ξ)ue,qdx (74)\n18APREPRINT - FEBRUARY 21, 2024\nNote the 1-D identities\n−ˆ\nIℓp(ξ)ℓq(ξ)dξ=δpqwp\n−ˆ\nIsℓp(ξ)ℓq(ϕs(ξ))dξ=1\n2−ˆ1\n−1ℓp(ϕ−1\ns(ξ))ℓq(ξ)dξ=1\n2ℓp(ϕ−1\ns(ξq))wq=Ps\npqwp\nwhere the projection operator {Ps}s=0,1is defined in (69). Then, by change of variables, we have the following\n−ˆ\nΩeℓp(ξ)ℓq(ξ) =Je,pdY\ni=1wpiδpiqi,−ˆ\nΩesℓp(ξ)ℓq(ϕs(ξ)) =Je,pdY\ni=1wpiPsi\npiqi(75)\nUsing (75) in (74) and dividing both sides by Je,pgives\nue,p=X\ns∈Nd\n1X\nq∈Nd\nN dY\ni=1Psi\npiqi!\nues,q=X\ns∈Nd\n1 dY\ni=1Psi!\nues\nwhere the last equation follows using the product of operators notation (70).\n5.2 Mortar element method (MEM)\n5.2.1 Motivation and notation\nWhen the mesh is adaptively refined, there will be elements with different refinement levels sharing a face; in this work,\nwe assume that the refinement levels of those elements only differs by 2 (Figure 4a). Since the neighbouring elements\ndo not have a common face, the solution points on their faces do not coincide (Figure 5). We will use the Mortar\nElement Method (MEM) for computing the numerical flux at all the required points on such a face, while preserving\naccuracy and the conservative property (29). There are two steps to the method\n1.Prolong ˜Fδ·bnS,i,US,i,uS,i(26) from the neighbouring elements to a set of common solution points known\nas mortar solution points (Figure 5a).\n2.Compute the numerical flux at the mortar solution points as in (26) and map it back to the interfaces (Figure 5b).\nIn Sections 5.2.2, 5.2.3, we will explain these two steps through the specific case of Figure 5 and we first introduce\nnotations for the same.\nConsider the multi-indices s∈Nd−1\n1={0,1}d−1and the interface in right (positive) i= 1 direction of element\nΩe, denoted as Γ(Figure 5). We assume that the elements neighbouring Ωeat the interface Γare finer and thus\nwe have non-conforming subinterfaces {Γs}s∈Nd−1\n1which, by continuity of the reference map, can be written as\nΓs= Θ e({1} ×Qd−1\ni=1Isi) = Θ e({1} ×ϕ−1\ns(Id−1)). Thus, in reference coordinates, ϕs(66) is a bijection from Γs\ntoΓ. The interface Γcan be parametrized as y=γ(η) = Θ e(1,η)forη∈Id−1and thus the reference variable of\ninterface is denoted η=γ−1(y). The subinterfaces can also be written by using the same parametrization so that\nΓs=n\nγ(η) :η∈Qd−1\ni=1Isio\n. For the reference solution points on Γbeing{ηs}s∈Nd−1\n1, the solution points in Γs\nare respectively given by\b\nϕ−1\ns(ηp)\t\np∈Nd−1\n1and for {ℓp(η)}p∈Nd−1\nNbeing Lagrange polynomials in Γ, the Lagrange\npolynomials in Γsare given by {ℓp(ϕs(η))}p∈Nd−1\n1respectively. Since the solution points between ΓandΓsdo not\ncoincide, they will be mapped to common solution points in the mortars Ξsand then back to Γ,Γsafter computing the\ncommon numerical flux. The solution points in Ξsare actually given by\b\nϕ−1\ns(ηp)\t\np∈Nd−1\n1, i.e., they are the same as\nΓs. The quantities with subscripts Ξ−\ns,Ξ+\nswill denote trace values from larger, smaller elements respectively.\n5.2.2 Prolongation to mortars\nWe will explain the prolongation procedure for a quantity Fwhich could be the normal flux ˜Fδ·bnS,i, time average\nsolution US,ior the solution uS,i. The first step of MEM of mapping of solution point values from solution points\nat element interfaces Γ,Γsto solution points at mortars Ξ−\ns,Ξ+\nsis known as prolongation. The prolongation of\n{Fδ\nΓs}s∈Nd−1\n1from small elements Γsto mortar values {FΞ+\ns}s∈Nd−1\n1is the identity map since both have the same\nsolution points, and the prolongation of Fδ\nΓfrom the large interface Γto the{F−\nΞs}s∈Nd−1\n1is an interpolation to the\n19APREPRINT - FEBRUARY 21, 2024\nΩe\nueΓ\nΩe1\nue1Ωe2\nue2\nΩe3\nue3Ωe4\nue4u−Γ, U−\nΓ, F−\nΓΞ1\nΞ2u−\nΞ2, U−Ξ2, F−Ξ2u−\nΞ1, U−\nΞ1, F−\nΞ1\nu+\nΞ2, U+\nΞ2, F+\nΞ2u+\nΞ1, U+\nΞ1, F+\nΞ1\nF+\nΓ2F+\nΓ1\nΓ2Γ1\n(a)\nΩe\nueΓ\nΩe1\nue1Ωe2\nue2\nΩe3\nue3Ωe4\nue4FΓΞ1\nΞ2FΞ1\nFΞ2FΓ2FΓ1\nΓ2Γ1\n(b)\nFigure 5: (a) Prolongation to mortar and computation of numerical flux FΞ1,FΞ2, (b) Projection of numerical flux to\ninterfaces\nmortar solution points. Accuracy is maintained by the interpolation as the mortar elements are finer. Below, we explain\nthe matrix operations used to perform the interpolation.\nThe prolongation of {Fδ\nΓs}s∈Nd−1\n1to the mortar values {FΞ+\ns}s∈Nd−1\n1is the identity map. The {F−\nΞs}s∈Nd−1\n1in Lagrange\nbasis are given by\nFΞ−\ns(η) =X\np∈Nd−1\nNℓp(ϕs(η))FΞ−\ns,p,η∈d−1Y\ni=1Isi (76)\nThe coefficients {F−\nΞs,p}p∈Nd−1\nNare computed by interpolation\nFΞ−\ns,p=FΓ−(ϕ−1\ns(ηp)) =X\nq∈Nd−1\nNℓq(ϕ−1\ns(ηp))Fδ\nΓ(ηq) =X\nq∈Nd−1\nN d−1Y\ni=1ℓqi(ϕ−1\nsi(ηpi))!\nFδ\nΓ(ηq)\n=X\nq∈Nd−1\nN d−1Y\ni=1(Vsi)piqi!\nFδ\nΓ(ηq) (77)\n20APREPRINT - FEBRUARY 21, 2024\nwhere the interpolation operators {VΞs}s=0,1were defined in (68). Using the product of operators notation (70), we\ncan compactly write (77) as\nFΞ−\ns= d−1Y\ni=1Vsi!\nFδ\nΓ (78)\nThe same procedure is performed for obtaining UΞ±\ns,uΞ±\ns. The numerical fluxes\b\nF∗\nΞs\t\ns∈Nd−1\n1are then computed as\nin (26).\n5.2.3 Projection of numerical fluxes from mortars to faces\nIn this section, we use the notation F∗:= (˜Fe·bnS,i)∗to denote the numerical flux (26). In the second step of MEM,\nthe numerical fluxes {F∗\nΞs}s∈Nd−1\n1computed using values at {Ξ±\ns}s∈Nd−1\n1are mapped back to interfaces Γs,Γ. Since\nthe solution points on Γsare the same as those of Ξ±\ns, the mapping from {F∗\nΞs}s∈Nd−1\n1to{F∗\nΓs}s∈Nd−1\n1is the identity\nmap. In order to maintain the conservation property, an L2projection is performed to map all the fluxes {F∗\nΞs}s∈Nd−1\n1into one numerical flux F∗\nΓon the larger interface.\nAnL2projection of these fluxes to F∗\nΓonΓis performed as\nX\ns∈Nd−1\n1−ˆ\nΓsF∗\nΞsℓp=−ˆ\nΓF∗\nΓℓp,∀p∈Nd−1\nN (79)\nwhere integrals are computed with quadrature at solution points. As in (76), we write the mortar fluxes as\nF∗\nΞs(η) =X\nq∈Nd−1\n1ℓq(ϕs(η))F∗\nΞs,q,η∈Ξs\nF∗\nΓ(η) =X\nq∈Nd−1\n1ℓq(η)F∗\nΓ,q,η∈Γ\nThus, the integral identity (79) can be written as\nX\ns∈Nd−1\n1X\nq∈Nd−1\nN−ˆ\nΓsℓp(η)ℓq(ϕs(η))F∗\nΞs,q=X\nq∈Nd−1\np−ˆ\nΓℓp(η)ℓq(η)F∗\nΓ,q,∀p∈Nd−1\nN (80)\nUsing the identities (80), the equations (80) become\nX\ns∈Nd−1\n1X\nq∈Nd−1\nN d−1Y\ni=1wpiPsi\npiqi!\nF∗\nΞs,qJS\ne,p=wpF∗\nΓ,pJS\ne,p\nwhere JS\ne,pis the surface Jacobian, given by ||(Ja1)e,p||in this case ((6.29) of [ 22]). Then, dividing both sides by\nJS\ne,pwpgives\nF∗\nΓ,p=X\ns∈Nd−1\n1X\nq∈Nd−1\nN d−1Y\ni=1Psi\npiqi!\nF∗\nΞs,q=X\ns∈Nd−1\n1 d−1Y\ni=1Psi!\nF∗\nΞs(81)\nwhere the last identity is obtained by the product of operators notation (70). Note that the identity (79) implies\nX\ns∈Nd−1\n1−ˆ\nΓsF∗\nΞsv=−ˆ\nΓF∗\nΓv, v ∈PN\nThen, taking v= 1 shows that the total fluxes over an interface Γare the same as over {Γs}s∈Nd−1\n1and thus the\nconservation property (29) of LWFR is maintained by the LWFR scheme.\nRemark 4 (Freestream and admissibility preservation under AMR) Under the adaptively refined meshes, free\nstream preservation and provable admissibility preservation are respectively ensured.\n21APREPRINT - FEBRUARY 21, 2024\n1.When refining/coarsening, there are two ways to compute the metric terms - interpolate/project the metric terms\ndirectly or interpolate/project the reference map Θat solution points and use the newly obtained reference map\nto recompute the metric terms. The latter, which is the approach taken in this work, can lead to violation of free\nstream preservation as we can have (IN)eL(Jai)̸= (IN)eR(Jai)where ΩeLandΩeSare two neighbouring\nlarge and small elements respectively. Thus, the interface terms may not vanish in the update equation (28) with\nconstant unleading to a violation of free stream preservation. This issue only occurs in 3-D and is thus beyond\nthe scope of this work, but some remedies are to interpolate/project the metric terms when refining/coarsening\nor to use the reference map Θ∈PN/2, as explained in [ 24]. Another solution has been studied in [ 27] where a\ncommon finite element space with mixed degree N−1andNis used with continuity at the non-conformal\ninterfaces. Since this work only deals with problems in 2-D, we always have (IN)eL(Jai) = (IN)eR(Jai)\nensuring that the interface terms in (28) vanish when u=c. Further, since the metric terms are recomputed in\nthis work, the volume terms will vanish by the same arguments as in Section 3.3. Thus, free stream preservation\nis maintained even with the non-conformal, adaptively refined meshes.\n2.The flux limiting explained in Section 4.3 ensures admissibility in means (Definition 5) and then uses the\nscaling limiter of [ 48] to enforce admissibility of solution polynomial at all solution points to obtain an\nadmissibility preserving scheme (Definition 4). However, the procedure doesn’t ensure that the polynomial is\nadmissible at points which are not the solution points. Adaptive mesh refinement introduces such points into\nthe numerical method and can thus cause a failure of admissibility preservation in the following situations: (a)\nmortar solution values {u−\nΞs}obtained by interpolation as in (76) are not admissible, (b) mean values {ues}\nof the solution values {ues}obtained by interpolating from the larger element as in (72) are not admissible.\nSince the scaling limiter [ 48] can be used to enforce admissibility of solution at any desired points, the remedy\nto both the issues is further scaling; we simply perform scaling of solution point values {u−\nΞs},{ues}with the\nadmissible mean value ue. This will ensure that the mortar solution point values and the mean values {ues}\nare admissible.\n5.3 AMR indicators\nThe process of adaptively refining and coarsening the mesh requires a solution smoothness indicator. In this work, two\nsmoothness indicators have been used for adaptive mesh refinement. The first is the indicator of [ 17], explained in\nSection 4.2.3. The second is Löhner’s smoothness indicator [ 28] which uses the central finite difference formula for\nsecond derivative, which is given by\nαe= max\np∈Nd\nNmax\n1≤i≤d\f\fq(upi+)−2q(up) +q(upi−)\f\f\n\f\fq(upi+)−q(up)\f\f+\f\fq(up)−q(upi−)\f\f+fwave(\f\fq(upi+)\f\f+ 2|q(up)|+\f\fq(upi−)\f\f)\n(pi±)m=\u001apm, m ̸=i\npi±1, m =i\nwhere {up}p∈Nd\nNare the degrees of freedom in element Ωeandqis a derived quantity like the product of density and\npressure used in Section 4.2.3. The value fwave= 0.2has been chosen in all the tests.\nOnce a smoothness indicator is chosen, the three level controller implemented in Trixi.jl [32] is used to determine\nthe local refinement level. The mesh begins with an initial refinement level and the effective refinement level is\nprescribed by how much further refinement has been done to the initial mesh, The mesh is created with two thresholds\nmed_threshold andmax_threshold and three refinement levels base_level ,med_level andmax_level . Then,\nwe have\nlevel e=\n\nbase_level , α e≤med_threshold\nmed_level ,med_threshold ≤αe≤max_threshold\nmax_level ,max_threshold ≤αe\nBeyond these refinement levels, further refinement is performed to make sure that two neighbouring elements only\ndiffer by a refinement level of 1.\n22APREPRINT - FEBRUARY 21, 2024\n6 Time stepping\nThis section introduces an embedded error approximation method to compute the time step size ∆tfor the single stage\nLax-Wendroff Flux Reconstruction method. A standard way to compute the time step size ∆tnis to use [2, 3]\n∆tn=Csmin\ne,p|Je,p|\nσ(une,p)CFL( N) (82)\nwhere the minimum is taken over all elements {Ωe}e,Jeis the Jacobian of the change of variable map, σ(un\ne)is the\nlargest eigenvalue of the flux jacobian at state un\ne, approximating the local wave speed, CFL( N)is the optimal CFL\nnumber dependent on solution polynomial degree NandCs≤1is a safety factor. In [ 2], a Fourier stability analysis of\nthe LWFR scheme was performed on Cartesian grids, and the optimal CFL numbers were obtained for each degree N\nwhich guaranteed the stability of the scheme. However, the Fourier stability analysis does not apply to curvilinear grids\nand formula (82) need not guarantee L2stability which may require the CFL number to be fine-tuned for each problem.\nAlong with the L2stability, the time step has to be chosen so that the scheme does not give inadmissible solutions. An\nerror-based time stepping method inherently minimizes the parameter tuning process in time step computation. The\nparameters in an error-based time stepping scheme that a user has to specify are the absolute and relative error tolerances\nτa, τr, and they only affect the time step size logarithmically. In particular, because of the weak dependence, tolerances\nτa=τr= 10−6worked reasonably for all tests with shocks; although, it was possible to enhance performance by\nchoosing larger tolerances for some problems. Secondly, if inadmissibility is detected during any step in the scheme or\nif errors are too large, the time step is redone with a reduced time step size provided by the error estimate. The scheme\nalso has the capability of increasing and decreasing the time step size.\nWe begin by reviewing the error-based time stepping scheme for the Runge-Kutta ODE solvers from [ 32,34] in\nSection 6.1 and explain our extension of the same to LWFR in Section 6.2.\n6.1 Error estimation for Runge-Kutta schemes\nConsider an explicit Runge-Kutta method used for solving ordinary differential equations by evolving the numerical\nsolution from time level nton+ 1. For error-estimation, the method is constructed to have an embedded lower order\nupdatebun+1, as described in equation (3) of [ 32]. The difference in the two updates, un+1−bun+1, gives an indication\nof the time integration error, which is used to build a Proportional Integral Derivative (PID) controller to compute the\nnew time step size,\nf∆tn+1=κ(εβ1/k\nn+1εβ2/k\nnεβ3/k\nn−1)∆tn (83)\nwhere for qbeing the order of main method, ˆqbeing the order of embedded method, we have\nk= min( q,ˆq) + 1\nandβiare called control parameters which are optimized for the particular Runge-Kutta scheme [ 32]. For mbeing the\ndegrees of freedom in u, we pick absolute and relative tolerances τa, τrand then error approximation is made as\nεn+1=1\nwn+1, w n+1=\n1\nMMX\ni=1 \nun+1\ni−bun+1\ni\nτa+τrmax\b\f\fun+1\ni\f\f,|˘u|\t!2\n1\n2\n(84)\nwhere the sum is over all degrees of freedom, including solution points and conservation variables. The tolerances are\nto be chosen by the user but their influence on the scheme is logarithmic, unlike the CFL based scheme (82).\nThe limiting function κ(x) = 1 + tan−1(x−1)is used to prevent sudden increase in time step sizes. For normalization,\nPETSc uses˘u=bun+1while OrdinaryDiffEq.jl uses˘u=un. Following [ 32], if the time step factor f∆tn+1/∆tn≥\n0.92, the new time step is accepted and used in the next level as ∆tn+1=f∆tn+1. If not, or if admissibility is violated,\nevolution is redone with time step size ∆tn=f∆tn+1computed from (83).\n6.2 Error based time stepping for Lax-Wendroff flux reconstruction\nConsider the LWFR scheme (28) with polynomial degree Nand formal order of accuracy N+ 1\nun+1\ne,p=un\ne,p−∆t\nJe,p∇ξ·˜Fδ\ne(ξp)−Ce,p\n23APREPRINT - FEBRUARY 21, 2024\nwhere Ce,pcontains contributions at element interfaces. In order to construct a lower order embedded scheme without\nrequiring additional inter-element communication, consider an evolution where the interface correction terms Ce,pare\nnot used, i.e., consider the element local update\nun+1\nloc,e,p=un\ne,p−∆t\nJe,p∇ξ·˜Fδ\ne(ξp) (85)\nTruncating the locally computed time averaged flux ˜Fδ\ne(24) at one order lower\ncFδe=N−1X\nk=0∆tk\n(k+ 1)!∂k\nt˜fδ\ne (86)\nwe can consider another update\n\\un+1\nloc,e,p=un\ne,p−∆t\nJe,p∇ξ·cFδe(ξp) (87)\nwhich is also locally computed but is one order of accuracy lower. We thus use un+1\ne=un+1\nloc,eandbun+1\ne=\\un+1\nloc,ein\nthe formula (84) along with ˘u=bun+1; then we use the same procedure of redoing the time step sizes as in Section 6.1.\nThat is, after using the error estimate (84) to compute f∆tn+1(83) we redo the time step if f∆tn+1/∆tn≥0.92or if\nadmissibility is violated; otherwise we set ∆tn+1to be used at the next time level. The complete process is also detailed\nin Algorithm 4. In this work, we have used the control parameters β1= 0.6, β2=−0.2, β3= 0.0for all numerical\nresults which are the same as those used in [32] for BS 3(2)3 F, the third-order, four-stage RK method of [7]. We tried\nthe other control parameters from [ 32] but found the present choice to be either superior or only slightly different in\nperformance, measured by the number of iterations taken to reach the final time.\nAlgorithm 2 High level overview of element residual computation of order N+ 1including error approximation using\nun+1\nloc,[un+1\nloc\nforeineachelement(mesh) do\nComputen\n∂k\nt˜fδ\neoN−1\nk=0using the approximate Lax-Wendroff procedure (31) to obtaincFδe(86)\nCompute\\un+1\nloc,eusingcFδe(87)\nCompute ∂N+1\nt˜fδ\neusing the approximate Lax-Wendroff procedure (31) to obtain ˜Fδ\ne(24)\nCompute un+1\nloc,eusingFδ\neas in (85)\ntemporal_error[e]=X\ni\nun+1\nloc,e,i−\\un+1\nloc,e,i\nτa+τrmaxn\f\f\fun+1\nloc,e,i\f\f\f,\f\f\f\\un+1\nloc,e,i\f\f\fo\n2\nwhere the sum is over dofs in e\nCompute and add local contribution of Fδ\neto the residual (28)\nend for\nAlgorithm 3 High level overview of LWFR residual (Within time integration)\nCompute {αe}(Section 4.2.3)\nAssemble cell residual (Algorithm 2)\nforΓineachinterface(mesh) do\nCompute FLW\nΓ,fΓand blend them into FΓ(Algorithm 1)\nend for\nforeineachelement(mesh) do\nAdd contribution of numerical fluxes to residual of element e(common to high, low residual, see Remark 3)\nend for\nUpdate solution\nApply positivity limiter\n24APREPRINT - FEBRUARY 21, 2024\nAlgorithm 4 Lax-Wendroff Flux Reconstruction at a high level to explain error based time stepping\nInitialize t←0, time step number n←0, and initial state u0\nInitialize PID controller with ε0←1, ε−1←1\nInitialize ∆t0=f∆twith a user supplied value\nInitialize accept_step ←false\nwhile t < T do\nifaccept_step then\naccept_step ←false\nt←˜t\n∆tn+1←f∆t\nn←n+ 1\nelse\n∆tn←f∆t\nend if\nift+ ∆tn>final_time then\n∆tn←final_time −t\nend if\nun→un+1with∆tn(Algorithm 3, 2) computing temporal_error and checking admissibility\nwn+1←\u0012\n1\nMP\netemporal_error[e]\u00131\n2\n▷ M is the total dofs\nwn+1←max{wn+1,10−10} ▷To avoid division by zero\nεn+1←1\nwn+1\ndt_factor ←κ(εβ1/k\nn+1εβ2/k\nnεβ3/k\nn−1) ▷ κ(x) = 1 + tan−1(x−1)\nf∆t←dt_factor ·∆tn\nifdt_factor ≥accept_safety && no inadmissibility then\naccept_step ←true\nelse\naccept_step ←false\nend if\nifaccept_step then\n˜t←t+ ∆tn\nif˜t≈final_time then\n˜t←final_time\nend if\nApply callbacks ▷Analyze and postprocess solution, AMR\nPositivity correction for AMR (Remark 4)\nend if\nend while\n7 Numerical results\nThe numerical experiments are performed on 2-D Euler’s equations (1). Unless specified otherwise, the adiabatic\nconstant γwill be taken as 1.4in the numerical tests, which is the typical value for air. The CFL based time stepping\nschemes use the following formula for the time step (see 2.5 of [34], but also [19, 32])\n∆tn=2\nN+ 1CCFLmin\ne,p \n1\n|Je,p|dX\ni=1˜λi\ne,p!\n, C CFL≤1 (88)\nwhere {˜λi\ne,p}d\ni=1are wave speed estimates computed by the transformation\n˜λi\ne,p=dX\nn=1(Jai\nn)e,pλi\ne,p\nwhere{Jai}d\ni=1are the contravariant vectors (2)andλi\ne,pis the absolute maximum eigenvalue of f′\ni(ue,p). For Euler’s\nequations with velocity vector v={vi}and sound speed c,λi=|vi|+c. The CCFLin(88) may need to be fine-tuned\n25APREPRINT - FEBRUARY 21, 2024\ndepending on the problem. Other than the convergence test (Section 7.2.2), the results shown below have been generated\nwith error-based time stepping (Section 6.2). The scheme is implemented in a Julia package TrixiLW.jl written\nusing Trixi.jl [33,40,39] as a library. Trixi.jl is a high order PDE solver package in Julia [6] and uses the\nRunge-Kutta Discontinuous Galerkin method; TrixiLW.jl uses Julia ’s multiple dispatch to borrow features like\ncurved meshes support and postprocessing from Trixi.jl .TrixiLW.jl is not a fork of Trixi.jl but only uses it\nthrough Julia ’s package manager without modifying its internal code. The setup files for the numerical experiments in\nthis work are available at [1].\n7.1 Results on Cartesian grids\n7.1.1 Mach 2000 astrophysical jet\nIn this test, a hypersonic jet is injected into a gas at rest with a Mach number of 2000 relative to the sound speed in the\ngas at rest. Following [ 16,49], the domain is taken to be [0,1]×[−0.5,0.5], the ambient gas in the interior has state\nuadefined in primitive variables as\n(ρ, u, v, p )a= (0.5,0,0,0.4127)\nand inflow state ujis defined in primitive variables as\n(ρ, u, v, p )j= (5,800,0,0.4127)\nOn the left boundary, we impose the boundary conditions\nub=\u001aua, ify∈[−0.05,0.05]\nuj, otherwise\nand outflow conditions on the right, top and bottom of the computational domain.\nThe simulation is performed on a uniform 5122element mesh. This test requires admissibility preservation to be\nenforced to avoid solutions with negative pressure. This is a cold-start problem as the solution is constant with zero\nvelocity in the domain at time t= 0. However, there is a high speed inflow at the boundary, which the standard wave\nspeed estimate for time step approximation (89) does not account for. Thus, in order to use the CFL based time stepping,\nlower values of CCFL(88) have to be used in the first few iterations of the simulations. Once the high speed flow has\nentered the domain, the this value needs to be raised since otherwise, the simulation will use much smaller time steps\nthan the linear stability limit permits. Error based time stepping schemes automate this process by their adaptivity and\nability to redo the time steps. The simulation is run till t= 10−2and the log scaled density plot for degree N= 4\nsolution obtained on the uniform mesh is shown in Figure 6a. For an error-based time stepping scheme, we define the\neffective CCFLas\nCCFL:= ∆tn\"\n2\nN+ 1min\ne,p \n1\n|Je,p|dX\ni=1˜λi\ne,p!#−1\n(89)\nwhich is a reverse computation so that its usage in (82) will get ∆tnchosen in the error-based time stepping scheme (Al-\ngorithm 4). In Figure 6b, time tversus effective CCFL(89) is plotted upto t= 10−5to demonstrate that the scheme\nautomatically uses a smaller CCFLof∼10−3at the beginning which later increases and stabilizes at ∼10−1. Thus, the\nerror based time stepping is automatically doing what would have to be manually implemented for a CFL based time\nstepping scheme which would be problem-dependent and requiring user intervention.\n7.1.2 Kelvin-Helmholtz instability\nThe Kelvin-Helmholtz instability is a common fluid instability that occurs across density and tangential velocity\ngradients leading to a tangential shear flow. This instability leads to the formation of vortices that grow in amplitude\nand can eventually lead to the onset of turbulence. The initial condition is given by [35]\n(ρ, u, v, p ) =\u00121\n2+3\n4B,1\n2(B−1),1\n10sin(2πx),1\u0013\nwithB= tanh(15 y+ 7.5)−tanh(15 y−7.5)in domain Ω = [−1,1]2with periodic boundary conditions. The initial\ncondition has a Mach number M≤0.6which makes compressibility effects relevant but does not cause shocks to\ndevelop. Thus, a very mild shock capturing scheme is used by setting αe= min {αe, αmax}(Section 4.2.3) where\nαmax= 0.002. The same smoothness indicator of Section 4.2.3 is used for AMR indicator with parameters from\nSection 5.3 chosen to be\n(base_level ,med_level ,max_level ) = (4 ,0,8), (med_threshold ,max_threshold ) = (0 .0003,0.003)\n26APREPRINT - FEBRUARY 21, 2024\n0.0 0.2 0.4 0.6 0.8 1.0\nt 1e5\n103\n102\n101\nCCFLError based scheme\n(a) (b)\nFigure 6: Mach 2000 astrophysical jet (a) Density plot (b) Effective CCFL\n(a) (b)\nFigure 7: Kelvin-Helmholtz instability at t= 3using polynomial degree N= 4(a) density plots, (b) adaptively refined\nmesh\nwhere base_level = 0refers to a 2×2mesh. This test case, along with indicators’ configuration was taken from the\nexamples of Trixi.jl [32]. The simulation is run till t= 3using polynomial degree N= 4. There is a shear layer at\ny=±0.5which rolls up and develops smaller scale structures as time progresses. The results are shown in Figure 7\nand it can be seen that the AMR indicator is able to track the small scale structures. The simulation starts with a mesh\nof1024 elements which steadily increases to 13957 at the final time; the mesh is adaptively refined or coarsened at\nevery time step. The solution has non-trivial variations in small regions around the rolling structures which an adaptive\nmesh algorithm can capture efficiently, while a uniform mesh with similar resolution would require 262144 elements.\n7.1.3 Double mach reflection\nThis test case was originally proposed by Woodward and Colella [ 46] and consists of a shock impinging on a wedge/ramp\nwhich is inclined by 30 degrees. An equivalent problem is obtained on the rectangular domain Ω = [0 ,4]×[0,1]\nobtained by rotating the wedge so that the initial condition now consists of a shock angled at 60 degrees. The solution\n27APREPRINT - FEBRUARY 21, 2024\n(a)\n(b)\nFigure 8: Double Mach reflection with solution polynomial degree N= 4att= 0.2(a) Density plot, (b) Adaptively\nrefined mesh at final time\nconsists of a self similar shock structure with two triple points. Define ub=ub(x, y, t )in primitive variables as\n(ρ, u, v, p ) =(\n(8,8.25 cos(π\n6),−8.25 sin(π\n6),116.5),ifx <1\n6+y+20t√\n3\n(1.4,0,0,1), ifx >1\n6+y+20t√\n3\nand take the initial condition to be u0(x, y) =ub(x, y,0). With ub, we impose inflow boundary conditions at the left\nside{0} ×[0,1], outflow boundary conditions both on [0,1/6]× {0}and{4} ×[0,1], reflecting boundary conditions\non[1/6,4]× {0}and inflow boundary conditions on the upper side [0,4]× {1}.\nThe setup of Löhner’s smoothness indicator (5.3) is taken from an example of Trixi.jl [32]\n(base_level ,med_level ,max_level ) = (0 ,3,6), (med_threshold ,max_threshold ) = (0 .05,0.1)\nwhere base_level = 0corresponds to a 16×5mesh. The density solution obtained using polynomial degree N= 4\nis shown in Figure 8 where it is seen that AMR is tracing the shocks and small scale shearing well. The initial mesh\nconsists of 80 elements and is refined in first iteration in the vicinity of the shock to get 2411 elements. In later iterations,\nthe mesh is refined and coarsened in each iteration, and the number of elements keeps increasing up to 7793 elements at\nthe final time t= 0.2. In order to capture the same effective refinement, a uniform mesh will require 327680 elements.\n7.1.4 Forward facing step\nForward facing step is a classical test case from [ 14,46] where a uniform supersonic flow passes through a channel\nwith a forward facing step generating several phenomena like a strong bow shock, shock reflections and a Kelvin-\nHelmholtz instability. It is a good test for demonstrating a shock capturing scheme’s capability of capturing small scale\nvortex structures while suppressing spurious oscillations arising from shocks. The step is simulated in the domain\nΩ = ([0 ,3]×[0,1])\\([0.6,3]×[0,0.2])and the initial conditions are taken to be\n(ρ, u, v, p ) = (1 .4,3,0,1) inΩ\nThe left boundary condition is taken as an inflow and the right one is an outflow, while the rest are solid walls. The\ncorner (0.6,0.2)of the step is the center of a rarefaction fan and can lead to large errors and the formation of a spurious\n28APREPRINT - FEBRUARY 21, 2024\n(a)\n(b)\nFigure 9: Mach 3 flow over forward facing step at time t= 3using solution polynomial degree N= 4with Löhner’s\nindicator for mesh refinement. (a) Density plot (b) Adaptively refined mesh\nboundary layer, as shown in Figure 7a-7d of [ 46]. These errors can be reduced by refining the mesh near the corner,\nwhich is automated here with the AMR algorithm.\nThe setup of Löhner’s smoothness indicator (5.3) is taken from an example of Trixi.jl [32]\n(base_level ,med_level ,max_level ) = (0 ,2,5), (med_threshold ,max_threshold ) = (0 .05,0.1)\nThe density at t= 3obtained using polynomial degree N= 4and Löhner’s smoothness indicator (5.3) is plotted in\nFigure 9. The shocks have been well-traced and resolved by AMR and the spurious boundary layer and Mach stem\ndo not appear. The simulations starts with a mesh of 198 elements and the number peaks at 6700 elements during the\nsimulation then and decreases to 6099 at the final time t= 3. The mesh is adaptively refined or coarsened once every\n100 time steps. In order to capture the same effective refinement, a uniform mesh will require 202752 elements.\n7.2 Results on curved grids\n7.2.1 Free stream preservation\nIn this section, free stream preservation is tested for meshes with curved elements. Since we use a reference map of\ndegree Nin(5), free stream will be preserved following the discussion in Section 3.3. We numerically verify the\nsame for the meshes taken from Trixi.jl which are shown in Figure 10. The mesh in Figure 10a consists of curved\nboundaries and only the elements adjacent to the boundary are curved, while the one in Figure 10b is a non-conforming\nmesh with curved elements everywhere, and is used to verify that free stream preservation holds with adaptively refined\nmeshes. The mesh in Figure 10b is a 2-D reduction of the one used in Figure 3 of [ 36] and is defined by the global map\n(ξ, η)7→(x, y)from [0,3]2→Ωdescribed as\nx=ξ+3\n8cos\u0012π\n22ξ−3\n3\u0013\ncos\u0012\n2π2y−3\n3\u0013\n, y =η+3\n8cos\u00123π\n22ξ−3\n3\u0013\ncos\u0012π\n22η−3\n3\u0013\nThe free stream preservation is verified on these meshes by solving the Euler’s equation with constant initial data\n(ρ, u, v, p ) = (1 ,0.1,−0.2,10)\nand Dirichlet boundary conditions. Figure 10 shows the density at time t= 10 which is constant throughout the domain.\n29APREPRINT - FEBRUARY 21, 2024\n(a) (b)\nFigure 10: Density plots of free stream tests with mesh and solution polynomial degree N= 6att= 10 on (a) mesh\nwith curved boundaries, (b) mesh with refined curved elements\n7.2.2 Isentropic vortex\nThis is a test with exact solution taken from [ 17] where the domain is specified by the following transformation from\n[0,1]2→Ω\nx(ξ, η) =\u0012\nξLx−AxLysin(2πη)\nηLy+AyLxsin(2πξ)\u0013\nwhich is a distortion of the square [0, Lx]×[0, Ly]with sine waves of amplitudes Ax, Ay. Following [ 17], we choose\nlength Lx=Ly= 0.1and amplitudes Ax=Ay= 0.1. The boundaries are set to be periodic. A vortex with radius\nRv= 0.005is initialized in the curved domain with center (xv, yv) = ( Lx/2, Ly/2). The gas constant is taken to\nbeRgas= 287 .15and specific heat ratio γ= 1.4as before. The free stream state is defined by the Mach number\nM0= 0.5, temperature T0= 300 , pressure p0= 105, velocity u0=M0p\nγRgasT0and density ρ0=p0\nRgasT0. The\ninitial condition u0is given by\n(ρ, u, v, p ) = \nρ0\u0012T\nT0\u00131\nγ−1\n, u0\u0012\n1−βy−yv\nRve−r2\n2\u0013\n, u0βx−xv\nRve−r2\n2, ρ(x, y)RgasT!\nT(x, y) =T0−(u0β)2\n2Cpe−r2, r =p\n(x−xv)2+ (y−yv)2/Rv\nwhere Cp=Rgasγ/(γ−1)is the heat capacity at constant pressure and β= 0.2is the vortex strength. The vortex\nmoves in the positive xdirection with speed u0so that the exact solution at time tisu(x, y, t ) =u0(x−u0t, y)where\nu0is extended outside Ωby periodicity. We simulate the propagation of the vortex for one time period tp=Lx/u0and\nperform numerical convergence analysis for degree N= 3in Figure 11b, showing optimal rates in grid versus L2error\nnorm for all the conserved variables.\n7.2.3 Supersonic flow over cylinder\nSupersonic flow over a cylinder is computed at a free stream Mach number of 3with the initial condition\n(ρ, u, v, p ) = (1 .4,3,0,1)\nSolid wall boundary conditions are used at the top and bottom boundaries. A bow shock forms which reflects across the\nsolid walls and interacts with the small vortices forming in the wake of the cylinder. The setup of Löhner’s smoothness\n30APREPRINT - FEBRUARY 21, 2024\n16232264212822562\nNumber of elements108\n106\n104\n102\n100102L2 error\nDegree N=3\nv1\nv2\nE\nO(M4)\n(a) (b)\nFigure 11: Convergence analysis for isentropic vortex problem with polynomial degree N= 3. (a) Density plot, (b) L2\nerror norm of conserved variables\nindicator (5.3) is taken from an example of Trixi.jl [32]\n(base_level ,med_level ,max_level ) = (0 ,3,5), (med_threshold ,max_threshold ) = (0 .05,0.1)\nwhere base_level = 0refers to mesh in Figure 12a. The flow consists of a strong a shock and thus the positivity\nlimiter had to be used to enforce admissibility. The flow behind the cylinder is highly unsteady, with reflected shocks\nand vortices interacting continuously. The density profile of the numerical solution at t= 10 is shown in Figure 12 with\nmesh and solution polynomial degree N= 4using Löhner’s indicator (5.3) for AMR. The AMR indicator is tracing the\nshocks and the vortex structures forming in the wake well. The initial mesh has 561 elements which first increase to\n63000 elements followed by a fall to 39000 elements and then a steady increase to the peak of 85000 elements from\nwhich it steadily falls to 36000 elements by the end of the simulation. The mesh is refined or coarsened once every 100\ntime steps. In order to capture the same effective refinement, a uniform mesh will require 574464 elements.\n7.2.4 Inviscid bow shock upstream of a blunt body\nThis test simulates steady supersonic flow over a blunt body and is taken from [ 17] which followed the description\nproposed by the high order computational fluid dynamics workshop [ 9]. The domain, also shown in Figure 13 consists\nof a left and a right boundary. The left boundary is an arc of a circle with origin (3.85,0)and radius 5.9extended till\nx= 0on both ends. The right boundary consists of (a) the blunt body and (b) straight-edged outlets. The straight-edged\noutlets are {(0, y) :|y|>0.5}extended till the left boundary arc. The blunt body consists of a front of length 1and\ntwo quarter circles of radius 0.5. The domain is initialized with a Mach 4 flow, which is given in primitive variables by\n(ρ, u, v, p ) = (1 .4,4,0,1) (90)\nThe left boundary is set as supersonic inflow, the blunt body is a reflecting wall and the straight edges at x= 0are\nsupersonic outflow boundaries. Löhner’s smoothness indicator (5.3) for AMR is set up as\n(base_level ,med_level ,max_level ) = (0 ,1,2), (med_threshold ,max_threshold ) = (0 .05,0.1)\nwhere base_level = 0refers to mesh in Figure 13a. Since this is a test case with a strong bow shock, the positivity\nlimiter had to be used to enforce admissibility. The pressure obtained with polynomial degree N= 4 is shown\nin Figure 13 with adaptive mesh refinement performed using Löhner’s smoothness indicator (5.3) where the AMR\nprocedure is seen to be refining the mesh in the region of the bow shock. The initial mesh (Figure 13a) has 244 elements\nwhich steadily increases to ∼1600 elements till t≈1.5and then remains nearly constant as the solution reaches steady\nstate. The mesh is adaptively refined or coarsened at every time step.\n31APREPRINT - FEBRUARY 21, 2024\n(a)\n(b)\n(c)\nFigure 12: Mach 3 flow over cylinder using solution and mesh polynomial degree N= 4att= 10 (a) Initial mesh, (b)\nadaptively refined mesh at final time, (c) density plot at final time\n32APREPRINT - FEBRUARY 21, 2024\n(a) (b) (c) (d)\nFigure 13: Mach 4 flow over blunt body using polynomial degree N= 4showing (a) initial mesh, (b) adaptively refined\nmesh, (c) pressure plot, (d) Mach number plot\n(a) (b)\nFigure 14: Meshes for transonic flow over NACA0012 airfoil. (a) Initial mesh (b) adaptively refined mesh\n7.2.5 Transonic flow over NACA0012 airfoil\nThis is a steady transonic flow over the symmetric NACA0012 airfoil. The initial condition is taken to have Mach\nnumber M0= 0.85and it is given in primitive variables as\n(ρ, u, v, p ) =\u0012p0\nT0R, U0cosθ, U0sinθ, p0\u0013\nwhere p0= 1, T0= 1, R= 287 .87, θ=π/180,U0=M0c0and sound speed c0=p\nγp0/ρ0. The airfoil is of length\n1unit located in the rectangular domain [−20,20]2and the initial mesh has 728 elements. We run the simulation with\nmesh and solution polynomial degree N= 6using Löhner’s smoothness indicator (5.3) for AMR with the setup\n(base_level ,med_level ,max_level ) = (1 ,3,4), (med_threshold ,max_threshold ) = (0 .05,0.1)\nwhere base_level = 1refers to the mesh in Figure 14a . In Figure 14, we show the initial and adaptively refined\nmesh. In Figure 15, we show the Mach number and compare the coefficient of pressure Cpon the surface of airfoil with\nSU2 [ 13] results, seeing reasonable agreement in terms of the values and shock locations. The AMR procedure is found\nto steadily increase the number of elements till they peak at ∼4200 and decrease to stabilize at ∼3750 ; the region of the\nshocks is being refined by the AMR process. The mesh is adaptively refined or coarsened once every 100 time steps. In\norder to capture the same effective refinement, a uniform mesh will require 186368 elements.\n33APREPRINT - FEBRUARY 21, 2024\n0.0 0.2 0.4 0.6 0.8 1.0\nx1.0\n0.5\n0.0\n0.5\n1.0CpM=0.85,AoA=1°\nLWFR\nSU2\n(a) (b)\nFigure 15: Transonic flow over airfoil using degree N= 6 on adapted mesh (a) Mach number (b) Coefficient of\npressure on the surface of the airfoil\nCFL based (88)Error Based (Alg. 4)\n(Successful + failed)Ratio\ntolE=1e-6CFL\ntolE=1e-6Best tolECFL\nBest tolE\nFF Step (7.1.4) 57064557661457\n(7661453 + 4)0.745646355 (5e-6)\n(5646355 + 5)1.01\nCylinder (7.2.3) 1529064871262\n(871124 + 138)1.755657170 (5e-6)\n(651118+6052)2.327\nBlunt body (7.2.4) -4200\n(3800 + 400)-4200 (1e-6)\n(3800 + 400)-\nNACA0012 (7.2.5) 68568284778674\n(4778651 + 23)1.434778674 (1e-6)\n(4778651 + 23)1.43\nTable 1: Number of time steps comparing error and CFL based methods\n7.3 Performance comparison of time stepping schemes\nIn Table 1, we show comparison of total time steps needed by error (Algorithm 4) and CFL (88) based time stepping\nmethods for test cases where non-Cartesian meshes are used. The total time steps give a complete description of the\ncost because our experiments have shown that error estimation procedure only adds an additional computational cost of\n∼4%. The relative and absolute tolerances τa, τrin(84) are taken to be the same, and denoted tolE . The iterations\nwhich are redone because of error or admissibility criterion in Algorithm 4 are counted as failed (shown in Table 1 in\nred) while the rest as successful (shown in Table 1 in blue). The comparisons are made between the two time stepping\nschemes as follows - the constant CCFLin(88) is experimentally chosen to be the largest which can be used without\nadmissibility violation while error based time stepping is shown with tolE = 1e-6 and the best tolerance for the\nparticular test case (which is either 1e-6 or5e-6 ). Note that the choice of tolE = 1e-6 is made in all the results\nshown in previous sections. A poor quality (nearly degenerate) mesh (Figure 13b) was used in the flow over blunt\nbody (Section 7.2.4) and thus the CFL based scheme could not run till the final time t= 10 without admissibility\nviolation for any choice of CCFL. However, the error-based time stepping scheme is able to finish the simulation by its\nability to redo time steps; although there are many failed time steps as is to be expected. The error-based time stepping\nscheme is giving superior performance with tolE = 1e-6 for the supersonic flow over cylinder and transonic flow\nover airfoil (curved meshes tests) with ratio of total time steps being 1.755 and 1.43 respectively. However, for the\nforward facing step test with a straight sided quadrilateral mesh, error based time stepping with tolE = 1e-6 takes\nmore time steps than the fine-tuned CFL based time stepping. However, increasing the tolerance to tolE = 5e-6 gives\nthe same performance as the CFL based time stepping. By using tolE = 5e-6 , the performance of supersonic flow\ncylinder can be further obtained to get a ratio of 2.327. These results show the robustness of error-based time stepping\nand even improved efficiency in meshes with curved elements.\n34APREPRINT - FEBRUARY 21, 2024\n8 Summary and conclusions\nThe Lax-Wendroff Flux Reconstruction (LWFR) of [ 2] has been extended to curvilinear and dynamic, locally adapted\nmeshes. On curvilinear meshes, it is shown that satisfying the standard metric identities gives free stream preservation\nfor the LWFR scheme. The subcell based blending scheme of [ 3] has been extended to curvilinear meshes along with\nthe provable admissibility preservation of [ 3] based on the idea of appropriately choosing the blended numerical flux [3]\nat the element interfaces. Adaptive Mesh Refinement has been introduced for LWFR scheme using the Mortar Element\nMethod (MEM) of [ 25]. Fourier stability analysis to compute the optimal CFL number as in [ 2] is based on uniform\nCartesian meshes and does not apply to curvilinear grids. Thus, in order to use a wave speed based time step computation,\nthe CFL number has to be fine tuned for every problem, especially for curved grids. In order to decrease the fine-tuning\nprocess, an embedded errror-based time step computation method was introduced for LWFR by taking difference\nbetween two element local evolutions of the solutions using the local time averaged flux approximations - one which is\norder N+ 1and the other truncated to be order N. This is the first time error-based time stepping has been introduced\nfor a single stage evolution method for solving time dependent equations. Numerical results using compressible Euler\nequations were shown to validate the claims. It was shown that free stream condition is satisfied on curvilinear meshes\neven with non-conformal elements and that the LWFR scheme shows optimal convergence rates on domains with\ncurved boundaries and meshes. The AMR with shock capturing was tested on various problems to show the scheme’s\nrobustness and capability to automatically refine in regions comprising of relevant features like shocks and small scale\nstructures. The error based time stepping scheme is able to run with fewer time steps in comparison to the CFL based\nscheme and with less fine tuning.\nAcknowledgments\nThe work of Arpit Babbar and Praveen Chandrashekar is supported by the Department of Atomic Energy, Government\nof India, under project no. 12-R&D-TFR-5.01-0520.\nAdditional data\nThe animations of the results presented in this paper can be viewed at\nwww.youtube.com/playlist?list=PLHg8S7nd3rfvI1Uzc3FDaTFtQo5VBUZER\nA Conservation property of LWFR on curvilinear grids\nIn order to show that the LWFR scheme is conservative, multiply (28) withJe,pwpand sum over p∈Nd\nNto get, using\nthe exactness of quadrature\nun+1\ne=un\ne−∆t\n|Ωe|ˆ\nΩo∇ξ·˜Fδ\ne(ξ)dξ\n−∆t\n|Ωe|ˆ\nΩodX\ni=1((˜Fe·bnR,i)∗−˜Fδ\ne·bnR,i)(ξR\ni)g′\nR(ξpi)−((˜Fe·bnL,i)∗−˜Fδ\ne·bnL,i)(ξL\ni)g′\nL(ξpi)dξ\n(91)\nwhere ξs\niare as defined in (17). Then, note the following integral identities that are an application of Fubini’s theorem\nfollowed by fundamental theorem of Calculus\nˆ\nΩo∂ξi·˜Fδ\ne(ξ)dξ=ˆ\n∂ΩL\no,i[˜Fδ\ne·bnL,i]dSξ+ˆ\n∂ΩR\no,i[˜Fδ\ne·bnR,i]dSξ\nˆ\nΩo((˜Fe·bnR,i)∗−˜Fδ\ne·bnR,i)(ξR\ni)g′\nR(ξpi)dξ=ˆ\n∂ΩR\no,i[(˜Fe·bnR,i)∗−˜Fδ\ne·bnR,i]dSξ\nˆ\nΩo((˜Fe·bnL,i)∗−˜Fδ\ne·bnL,i)(ξL\ni)g′\nL(ξpi)dξ=−ˆ\n∂ΩL\no,i[(˜Fe·bnL,i)∗−˜Fδ\ne·bnL,i]dSξ\nwhere ∂ΩS\no,iis as in Figure 1 and we used gL(−1) = gR(1) = 1 ,gL(−1) = gR(1) = 0 . Then substituting these\nidentities into (91) gives us the conservative update of the cell average (29).\n35APREPRINT - FEBRUARY 21, 2024\nReferences\n[1]A. B ABBAR AND P. C HANDRASHEKAR ,Extension of lwfr to adaptive, curved meshes with error based time\nstepping .https://github.com/Arpit-Babbar/JCP2024 , 2024.\n[2] A. B ABBAR , S. K. K ENETTINKARA ,AND P. C HANDRASHEKAR ,Lax-wendroff flux reconstruction method for\nhyperbolic conservation laws , Journal of Computational Physics, (2022), p. 111423.\n[3] ,Admissibility preserving subcell limiter for lax-wendroff flux reconstruction , 2023.\n[4] C. B ERTHON ,Why the MUSCL–hancock scheme is l1-stable , Numerische Mathematik, 104 (2006), pp. 27–46.\n[5]M. B ERZINS ,Temporal error control for convection-dominated equations in two space dimensions , SIAM Journal\non Scientific Computing, 16 (1995), pp. 558–580.\n[6]J. B EZANSON , A. E DELMAN , S. K ARPINSKI ,AND V. B. S HAH,Julia: A Fresh Approach to Numerical\nComputing , SIAM Review, 59 (2017), pp. 65–98. bibtex: Bezanson2017.\n[7]P. B OGACKI AND L. S HAMPINE ,A 3(2) pair of runge - kutta formulas , Applied Mathematics Letters, 2 (1989),\npp. 321–325.\n[8]R. B ÜRGER , S. K. K ENETTINKARA ,AND D. Z ORÍO ,Approximate Lax–Wendroff discontinuous Galerkin\nmethods for hyperbolic conservation laws , Computers & Mathematics with Applications, 74 (2017), pp. 1288–\n1310.\n[9] C ANAERO ,5th international workshop on high-order CFD methods , 2017.\n[10] C. C ANUTO , M. H USSAINI , A. Q UARTERONI ,AND T. Z ANG,Spectral Methods: Fundamentals in Single\nDomains , Scientific Computation, Springer Berlin Heidelberg, 2007.\n[11] H. C ARRILLO , E. M ACCA , C. P ARÉS , G. R USSO ,AND D. Z ORÍO ,An order-adaptive compact approximation\nTaylor method for systems of conservation laws , Journal of Computational Physics, 438 (2021), p. 110358. bibtex:\nCarrillo2021.\n[12] M. D UMBSER , D. S. B ALSARA , E. F. T ORO,AND C.-D. M UNZ,A unified framework for the construction of\none-step finite volume and discontinuous Galerkin schemes on unstructure d meshes , Journal of Computational\nPhysics, 227 (2008), pp. 8209–8253.\n[13] T. D. E CONOMON , F. P ALACIOS , S. R. C OPELAND , T. W. L UKACZYK ,AND J. J. A LONSO ,Su2: An open-\nsource suite for multiphysics simulation and design , AIAA Journal, 54 (2016), pp. 828–846.\n[14] A. F. E MERY ,An evaluation of several differencing methods for inviscid fluid flow problems , Journal of Computa-\ntional Physics, 2 (1968), pp. 306–331.\n[15] S. K. G ODUNOV AND I. B OHACHEVSKY ,Finite difference method for numerical computation of discontinuous\nsolutions of the equations of fluid dynamics , Matemati ˇceskij sbornik, 47(89) (1959), pp. 271–306.\n[16] Y. H A, C. G ARDNER , A. G ELB,AND C. S HU,Numerical simulation of high mach number astrophysical jets\nwith radiative cooling , Journal of Scientific Computing, 24 (2005), pp. 597–612.\n[17] S. H ENNEMANN , A. M. R UEDA -RAMÍREZ , F. J. H INDENLANG ,AND G. J. G ASSNER ,A provably entropy\nstable subcell shock capturing approach for high order split form dg for the compressible euler equations , Journal\nof Computational Physics, 426 (2021), p. 109935.\n[18] H. T. H UYNH ,A Flux Reconstruction Approach to High-Order Schemes Including Discontinuous Galerkin\nMethods , in 18th AIAA computational fluid dynamics conference, Miami, FL, June 2007, AIAA.\n[19] R. A. J AHDALI , R. B OUKHARFANE , L. D ALCIN ,AND M. P ARSANI ,Optimized Explicit Runge-Kutta Schemes\nfor Entropy Stable Discontinuous Collocated Methods Applied to the Euler and Navier–Stokes equations .\n[20] D. I. K ETCHESON , M. M ORTENSEN , M. P ARSANI ,AND N. S CHILLING ,More efficient time integration for\nfourier pseudospectral dns of incompressible turbulence , International Journal for Numerical Methods in Fluids,\n92 (2020), pp. 79–93.\n[21] A. K LÖCKNER , T. W ARBURTON ,AND J. H ESTHAVEN ,Viscous shock capturing in a time-explicit discontinuous\ngalerkin method , Mathematical Modelling of Natural Phenomena, 6 (2011).\n[22] D. K OPRIVA ,Implementing Spectral Methods for Partial Differential Equations , Springer Dordrecht, 01 2009.\n[23] D. A. K OPRIVA ,Metric identities and the discontinuous spectral element method on curvilinear meshes , Journal\nof Scientific Computing, 26 (2006), pp. 301–327.\n[24] D. A. K OPRIVA , F. J. H INDENLANG , T. B OLEMANN ,AND G. J. G ASSNER ,Free-stream preservation for\ncurved geometrically non-conforming discontinuous galerkin spectral elements , J. Sci. Comput., 79 (2019),\npp. 1389–1408.\n36APREPRINT - FEBRUARY 21, 2024\n[25] D. A. K OPRIVA AND J. H. K OLIAS ,A conservative staggered-grid chebyshev multidomain method for compress-\nible flows , Journal of Computational Physics, 125 (1996), pp. 244–261.\n[26] D. A. K OPRIVA , S. L. W OODRUFF ,AND M. Y. H USSAINI ,Computation of electromagnetic scattering with a non-\nconforming discontinuous spectral element method , International Journal for Numerical Methods in Engineering,\n53 (2002), pp. 105–122.\n[27] J. E. K OZDON AND L. C. W ILCOX ,An energy stable approach for discretizing hyperbolic equations with\nnonconforming discontinuous galerkin methods , Journal of Scientific Computing, 76 (2018), p. 1742–1784.\n[28] R. L ÖHNER ,An adaptive finite element scheme for transient problems in cfd , Computer Methods in Applied\nMechanics and Engineering, 61 (1987), pp. 323–338.\n[29] P.-O. P ERSSON AND J. P ERAIRE ,Sub-Cell Shock Capturing for Discontinuous Galerkin Methods , in 44th AIAA\nAerospace Sciences Meeting and Exhibit, Aerospace Sciences Meetings, American Institute of Aeronautics and\nAstronautics, Jan. 2006.\n[30] J. Q IU, M. D UMBSER ,AND C.-W. S HU,The discontinuous Galerkin method with Lax–Wendroff type time\ndiscretizations , Computer Methods in Applied Mechanics and Engineering, 194 (2005), pp. 4528–4543.\n[31] J. Q IU AND C.-W. S HU,Finite Difference WENO Schemes with Lax–Wendroff-Type Time Discretizations , SIAM\nJournal on Scientific Computing, 24 (2003), pp. 2185–2198. bibtex: Qiu2003.\n[32] H. R ANOCHA , L. D ALCIN , M. P ARSANI ,AND D. I. K ETCHESON ,Optimized runge-kutta methods with automatic\nstep size control for compressible computational fluid dynamics , Communications on Applied Mathematics and\nComputation, 4 (2021), pp. 1191–1228.\n[33] H. R ANOCHA , M. S CHLOTTKE -LAKEMPER , A. R. W INTERS , E. F AULHABER , J. C HAN ,AND G. G ASSNER ,\nAdaptive numerical simulations with Trixi.jl: A case study of Julia for scientific computing , Proceedings of the\nJuliaCon Conferences, 1 (2022), p. 77.\n[34] H. R ANOCHA , A. W INTERS , G. C ASTRO , L. D ALCIN , M. S CHLOTTKE -LAKEMPER , G. G ASSNER ,AND\nM. P ARSANI ,On error-based step size control for discontinuous galerkin methods for compressible fluid dynamics ,\nCommunications on Applied Mathematics and Computation, (2023).\n[35] A. R UEDA -RAMÍREZ AND G. G ASSNER ,A subcell finite volume positivity-preserving limiter for DGSEM\ndiscretizations of the euler equations , in 14th WCCM-ECCOMAS Congress, CIMNE, 2021.\n[36] A. M. R UEDA -RAMÍREZ , S. H ENNEMANN , F. J. H INDENLANG , A. R. W INTERS ,AND G. J. G ASSNER ,An\nentropy stable nodal discontinuous galerkin method for the resistive mhd equations. part ii: Subcell finite volume\nshock capturing , Journal of Computational Physics, 444 (2021), p. 110580.\n[37] V. R USANOV ,The calculation of the interaction of non-stationary shock waves and obstacles , USSR Computa-\ntional Mathematics and Mathematical Physics, 1 (1962), pp. 304–320.\n[38] K. S CHAAL , A. B AUER , P. C HANDRASHEKAR , R. P AKMOR , C. K LINGENBERG ,AND V. S PRINGEL ,Astro-\nphysical hydrodynamics with a high-order discontinuous Galerkin scheme and adaptive mesh refinement , Monthly\nNotices of the Royal Astronomical Society, 453 (2015), pp. 4278–4300.\n[39] M. S CHLOTTKE -LAKEMPER , G. J. G ASSNER , H. R ANOCHA , A. R. W INTERS ,AND J. C HAN,Trixi.jl: Adaptive\nhigh-order numerical simulations of hyperbolic PDEs in Julia .https://github.com/trixi-framework/\nTrixi.jl , 09 2021.\n[40] M. S CHLOTTKE -LAKEMPER , A. R. W INTERS , H. R ANOCHA ,AND G. J. G ASSNER ,A purely hyperbolic\ndiscontinuous Galerkin approach for self-gravitating gas dynamics , Journal of Computational Physics, 442 (2021),\np. 110467.\n[41] V. A. T ITAREV AND E. F. T ORO,ADER: Arbitrary High Order Godunov Approach , Journal of Scientific\nComputing, 17 (2002), pp. 609–618. bibtex: Titarev2002.\n[42] W. T ROJAK AND F. D. W ITHERDEN ,A new family of weighted one-parameter flux reconstruction schemes ,\nComputers & Fluids, 222 (2021), p. 104918. bibtex: Trojak2021.\n[43] P. E. V INCENT , P. C ASTONGUAY ,AND A. J AMESON ,A New Class of High-Order Energy Stable Flux Recon-\nstruction Schemes , Journal of Scientific Computing, 47 (2011), pp. 50–72.\n[44] P. E. V INCENT , A. M. F ARRINGTON , F. D. W ITHERDEN ,AND A. J AMESON ,An extended range of stable-\nsymmetric-conservative Flux Reconstruction correction functions , Computer Methods in Applied Mechanics and\nEngineering, 296 (2015), pp. 248–272. bibtex: Vincent2015.\n37APREPRINT - FEBRUARY 21, 2024\n[45] J. W ARE AND M. B ERZINS ,Adaptive finite volume methods for time-dependent p.d.e.s. , in Modeling, Mesh\nGeneration, and Adaptive Numerical Methods for Partial Differential Equations, I. Babuska, W. D. Henshaw,\nJ. E. Oliger, J. E. Flaherty, J. E. Hopcroft, and T. Tezduyar, eds., New York, NY , 1995, Springer New York,\npp. 417–430.\n[46] P. W OODWARD AND P. C OLELLA ,The numerical simulation of two-dimensional fluid flow with strong shocks ,\nJournal of Computational Physics, 54 (1984), pp. 115–173.\n[47] O. Z ANOTTI , F. F AMBRI ,AND M. D UMBSER ,Solving the relativistic magnetohydrodynamics equations with\nADER discontinuous Galerkin methods, a posteriori subcell limiting and adaptive mesh refinement , Monthly\nNotices of the Royal Astronomical Society, 452 (2015), pp. 3010–3029.\n[48] X. Z HANG AND C.-W. S HU,On maximum-principle-satisfying high order schemes for scalar conservation laws ,\nJournal of Computational Physics, 229 (2010), pp. 3091–3120.\n[49] X. Z HANG AND C.-W. S HU,On positivity-preserving high order discontinuous galerkin schemes for compressible\neuler equations on rectangular meshes , Journal of Computational Physics, 229 (2010), pp. 8918–8934.\n[50] D. Z ORÍO , A. B AEZA ,AND P. M ULET ,An Approximate Lax–Wendroff-Type Procedure for High Order Accurate\nSchemes for Hyperbolic Conservation Laws , Journal of Scientific Computing, 71 (2017), pp. 246–273. bibtex:\nZorio2017.\n38" }, { "title": "2402.11933v1.SLADE__Detecting_Dynamic_Anomalies_in_Edge_Streams_without_Labels_via_Self_Supervised_Learning.pdf", "content": "SLADE: Detecting Dynamic Anomalies in Edge Streams without\nLabels via Self-Supervised Learning\nJongha Lee\nKAIST\njhsk777@kaist.ac.krSunwoo Kim\nKAIST\nkswoo97@kaist.ac.krKijung Shin\nKAIST\nkijungs@kaist.ac.kr\nABSTRACT\nTo detect anomalies in real-world graphs, such as social, email,\nand financial networks, various approaches have been developed.\nWhile they typically assume static input graphs, most real-world\ngraphs grow over time, naturally represented as edge streams. In\nthis context, we aim to achieve three goals: (a) instantly detecting\nanomalies as they occur, (b) adapting to dynamically changing\nstates, and (c) handling the scarcity of dynamic anomaly labels.\nIn this paper, we propose SLADE (Self-supervised Learning for\nAnomaly Detection in Edge Streams) for rapid detection of dy-\nnamic anomalies in edge streams, without relying on labels. SLADE\ndetects the shifts of nodes into abnormal states by observing devia-\ntions in their interaction patterns over time. To this end, it trains a\ndeep neural network to perform two self-supervised tasks: (a) min-\nimizing drift in node representations and (b) generating long-term\ninteraction patterns from short-term ones. Failure in these tasks\nfor a node signals its deviation from the norm. Notably, the neural\nnetwork and tasks are carefully designed so that all required opera-\ntions can be performed in constant time (w.r.t. the graph size) in\nresponse to each new edge in the input stream. In dynamic anomaly\ndetection across four real-world datasets, SLADE outperforms nine\ncompeting methods, even those leveraging label supervision.\n1 INTRODUCTION\nThe evolution of web technologies has dramatically enhanced hu-\nman life. Platforms such as email and social networks have made\npeople communicating with diverse individuals and accessing help-\nful information easier. Additionally, e-commerce has enabled people\nto engage in economic activities easily. However, as convenience\nhas increased, many problems have emerged, such as financial\ncrimes, social media account theft, and spammer that exploited it.\nMany graph anomaly detection techniques [ 25,27] have been\ndeveloped for tackling these problems. These techniques involve\nrepresenting the interactions between users as a graph, thereby\nharnessing the connectivity between users to effectively identify\nanomalies. However, graph anomaly detection in real-world sce-\nnarios poses several challenges, as discussed below.\nC1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection:C1) Time Delay in Detection: While most graph anomaly detec-\ntion methods assume static input graphs, real-world graphs evolve\nover time with continuous interaction events. In response to con-\ntinuous interaction events, it is important to quickly identify anom-\nalies. Delaying the detection of such anomalies can lead to increas-\ning harm to benign nodes as time passes. However, employing static\ngraph-based methods repeatedly on the entire graph, whenever an\ninteraction event occurs, inevitably leads to significant delays due\nto the substantial computational expenses involved. To mitigate\ndelays, it is necessary to model continuous interaction events asedge streams and employ incremental computation to assess the ab-\nnormality of each newly arriving edge with detection time constant\nregardless of the accumulated data size.\nMany studies [ 4,12] have developed anomaly detection methods\nfor edge streams, leveraging incremental computation. However, as\nthese methods are designed to target specific anomaly types (e.g.,\nburstiness), lacking learning-based components, they are often\nlimited in capturing complex ones deviating from targeted types.\nC2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States:C2) Dynamically Changing States: In web services, users can\nexhibit dynamic states varying over time. That is, a user’s behavior\ncan be normal during one time period but abnormal during another.\nFor example, a normal user’s account can be compromised and\nthen manipulated to disseminate promotional messages. As a result,\nthe user’s state transitions from normal to abnormal. Such a user\ncan be referred to as a dynamic anomaly, and detecting dynamic\nanomalies presents a greater challenge compared to the relatively\neasier task of identifying static anomalies.\nAddressing this challenge can be facilitated by tracking the evo-\nlution of node characteristics over time, and to this end, dynamic\nnode representation learning [ 28,38] can be employed. However,\nexisting dynamic node representation learning methods require\nlabel information for the purpose of anomaly detection, which is\ntypically scarce, as elaborated in the following paragraph.\nC3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels:C3) Lack of Anomaly Labels: Deep neural networks, such as graph\nneural networks, have proven effective in detecting complex anom-\nalies within graph-structured data. However, they typically rely on\nlabel supervision for training, which can be challenging to obtain,\nespecially for dynamic anomalies. Assuming the absence of anom-\naly labels, various unsupervised training techniques have been\ndeveloped for anomaly detection in static graphs [10, 23].\nHowever, to the best of our knowledge, existing methods cannot\nsimultaneously address all three challenges. They either lack the\nability to detect dynamic anomalies, lack incremental detection\nsuitable for edge streams, or rely on labels.\nIn this work, we propose SLADE (Self-supervised Learning for\nAnomaly Detection in Edge Streams) to simultaneously tackle all\nthree challenges. Its objective is to incrementally identify dynamic\nanomalies in edge streams, without relying on any label supervision.\nTo achieve this, SLADE learns dynamic representations of nodes\nover time, which capture their long-term interaction patterns, by\ntraining a deep neural network to perform two self-supervised tasks:\n(a) minimizing drift in the representations and (b) generating long-\nterm interaction patterns from short-term ones. Poor performance\non these tasks for a node indicates its deviation from its interac-\ntion pattern, signaling a potential transition to an abnormal state.\nNotably, our careful design ensures that all required operations are\nexecuted in constant time (w.r.t. the graph size) in response to each\nnew edge in the input stream. Our experiments involving dynamicarXiv:2402.11933v1 [cs.LG] 19 Feb 2024anomaly detection by 9 competing methods across 4 real-world\ndatasets confirm the strengths of SLADE , outlined below:\n•Unsupervised: We propose SLADE to detect complex dynamic\nanomalies in edge streams, without relying on label supervision.\n•Effective: In dynamic anomaly detection, SLADE shows an av-\nerage improvement of 12.80% and 4.23% (in terms of AUC) com-\npared to the best-performing (in each dataset) unsupervised and\nsupervised competitors, respectively.\n•Constant Inference Speed: We show both theoretically and\nempirically that, once trained, SLADE requires a constant amount\nof time per edge for dynamic anomaly detection in edge streams.\n2 RELATED WORK\nIn this section, we provide a concise review of graph-based anomaly\ndetection methods, categorized based on the nature of input graphs.\n2.1 Anomaly Detection in CTDGs\nAcontinuous-time dynamic graph (CTDG) is a stream of edges\naccompanied by timestamps, which we also term an edge stream .\nUnsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs:Unsupervised Anomaly Detection in CTDGs: The majority of\nunsupervised anomaly detection techniques applied to CTDGs aim\nto identify specific anomaly types. Sedanspot [ 12] focuses on de-\ntecting (a) bursts of activities and (b) bridge edges between sparsely\nconnected parts of the input graph. MIDAS [ 4] aims to spot bursts of\ninteractions within specific groups, and F-FADE [ 6] is effective for\nidentifying sudden surges in interactions between specific pairs of\nnodes and swift changes in the community memberships of nodes.\nLastly, AnoGraph [ 5] spots dense subgraph structures along with\nthe anomalous edges contained within them. These methods are\ngenerally efficient, leveraging incremental computation techniques.\nNonetheless, as previously mentioned, many of these approaches\nlack learnable components and thus may encounter challenges in\nidentifying complex anomaly patterns, i.e., deviations from normal\npatterns in various aspects that may not be predefined.\nRepresentation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs:Representation Learning in CTDGs: Representation learning in\nCTDGs involves maintaining and updating representations of nodes\nin response to each newly arriving edge, capturing evolving pat-\nterns of nodes over time. To this end, several neural-network archi-\ntectures have been proposed. JODIE [ 20] utilizes recurrent-neural-\nnetwork (RNN) modules to obtain dynamic node representations.\nDyrep [ 33] combines a deep temporal point process [ 1] with RNNs.\nTGAT [ 38] leverages temporal encoding and graph attention [ 35]\nto incorporate temporal information during neighborhood aggrega-\ntion. Based on temporal smoothness, DDGCL [ 32] learns dynamic\nnode representations by contrasting those of the same nodes in\ntwo nearby temporal views. TGN [ 28] utilizes a memory module\nto capture and store long-term patterns. This module is updated\nusing an RNN for each node, providing representations that encom-\npass both temporal and spatial characteristics. Many subsequent\nstudies [ 36,37] have also adopted memory modules. Assuming a\ngradual process where memories for nodes do not show substan-\ntial disparities before and after updates, DGTCC [ 13] contrasts\nmemories before and after updates for training.\nFor the purpose of anomaly detection, dynamic node represen-\ntations can naturally be used as inputs for a classifier, which is\ntrained in a supervised manner using anomaly labels. Recently,more advanced anomaly detection methods based on representa-\ntion learning in CTDGs have been proposed. SAD [ 31] combines a\nmemory bank with pseudo-label contrastive learning, which, how-\never, requires anomaly labels for training.\n2.2 Anomaly Detection in Other Graph Models\nIn this subsection, we introduce anomaly detection approaches\napplied to other graph models.\nAnomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs:Anomaly Detection in Static Graphs: Many approaches [ 10,11,\n22] have been developed for anomaly detection in a static graph ,\nwhich does not contain any temporal information. Among them, we\nfocus on those leveraging graph self-supervised learning, which ef-\nfectively deals with the absence of anomaly labels. ANEMONE [ 14]\ncontrasts node representations obtained from (a) features alone\nand (b) both graph topology and features, identifying nodes with\nsubstantial differences as anomalies. DOMINANT [ 10] aims to re-\nconstruct graph topology and attributes, using a graph-autoencoder\nmodule, and anomalies are identified based on reconstruction error.\nThese approaches assume a static graph, and their extensions to\ndynamic graphs are not trivial, as node representations need to\nevolve over time to accommodate temporal changes.\nAnomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs:Anomaly Detection in DTDGs: Adiscrete-time dynamic graph\n(DTDG) corresponds to a sequence of graphs occurring at each time\ninstance, also referred to as a graph stream . Formally, a DTDG is a\nset\b\nG1,G2,···,G𝑇\t\nwhereG𝑡=\b\nV𝑡,E𝑡\t\nis the graph snapshot\nat time𝑡, andV𝑡andE𝑡are node- and edge-set in G𝑡, respectively\n[15]. Several methods have been developed for detecting anom-\nalies, with an emphasis on anomalous edges, in a DTDG, which is\na sequence of graphs at each time instance. Netwalk [ 39] employs\nrandom walks and autoencoders to create similar representations\nfor nodes that frequently interact with each other. Then, it identifies\ninteractions between nodes with distinct representations as anoma-\nlous. AddGraph [ 40] constructs node representations through an\nattentive combination of (a) short-term structural patterns within\nthe current graph (and a few temporally-adjacent graphs) captured\nby a graph neural network (spec., GCN [ 18]) and (b) long-term\npatterns captured by an RNN (spec., GRU [ 7]). These node repre-\nsentations are then employed to evaluate the anomalousness of\nedges. Instead, transformers [ 34] are employed in TADDY [ 24] to\nacquire node representations that capture both global and local\nstructural patterns. Note that these methods designed for DTDGs\nare less suitable for time-critical applications when compared to\nthose for designed CTDGs, as discussed in Section 3. Moreover,\ntechnically, these methods are trained to distinguish edges and non-\nedge node pairs, while our proposed method contrasts long-term\nand short-term patterns for training.\n3 PROBLEM DESCRIPTION\nIn this section, we introduce notations and, based on them, define\nthe problem of interest, dynamic node anomaly detection in CTDGs.\nNotations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations:Notations: A continuous-time dynamic graph (CTDG) G=(𝛿1,𝛿2,\n···) is a stream (i.e., continuous sequence) of temporal edges with\ntimestamps. Each temporal edge 𝛿𝑛=(𝑣𝑖,𝑣𝑗,𝑡𝑛)arriving at time 𝑡𝑛\nis directional from the source node𝑣𝑖to the destination node 𝑣𝑗. The\ntemporal edges are ordered chronologically, i.e., 𝑡𝑛≤𝑡𝑛+1holds for\n2each𝑛∈{1,2,···}. We denote byV(𝑡)=Ð\n(𝑣𝑖,𝑣𝑗,𝑡𝑛)∈G∧𝑡𝑛≤𝑡{𝑣𝑖,𝑣𝑗}\nthe temporal set of nodes arriving at time 𝑡or earlier.\nProblem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description:Problem Description: We consider a CTDG G=(𝛿1,𝛿2,···),\nwhere each temporal edge 𝛿𝑛=(𝑣𝑖,𝑣𝑗,𝑡𝑛)indicates a behavior\nof the source node 𝑣𝑖towards the destination node 𝑣𝑗at time𝑡𝑛.\nThat is, the source node represents the “actor” node. We aim to ac-\ncurately classify the current dynamic status of each node, which is\neither normal orabnormal . We address this problem in an unsuper-\nvised setting. That is, we do not have access to the dynamic states\nof any nodes at any time as input. In our experimental setups, the\nground-truth dynamic states are used only for evaluation purposes.\nReal-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios:Real-world Scenarios: Due to its substantial impact, this problem\nhas been explored in many previous studies, but in supervised\nsettings [ 20,28,33,38]. For instance, in web services, a normal\nuser’s account can be compromised and then exploited to circulate\npromotional messages. In such a case, the user’s state transitions\nfrom normal to abnormal. Detecting such transitions promptly is\ncrucial to minimize the inconvenience caused by the dissemination\nof promotional messages.\nWhy CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?:Why CTDGs?: Anomaly detection methods designed for DTDGs\n(refer to Section 2.2) process input on a per-graph basis, where\nedges need to be aggregated over time to form a graph. Thus, they\nare susceptible to delays in predicting the current state of nodes\nupon the arrival of an edge. In theory, methods designed for static\ngraphs can be applied to our problem by re-running them when-\never a new edge arrives. However, this straightforward application\nmakes their time complexity per edge (super-)linear in the graph\nsize, causing notable delays. However, CTDG-based methods, in-\ncluding our proposed one, process the arriving edge, whenever it\narrives, typically with constant time complexity regardless of the ac-\ncumulated graph size. As discussed in Section 1, this highlights the\nadvantages of CTDG-based methods in time-critical applications,\nincluding (dynamic) anomaly detection.\nComparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection:Comparison with Edge Anomaly Detection: In many scenar-\nios, the dynamic state of an actor node can be equated with the\nanomalousness (or maliciousness) of its behavior. In other words,\nan actor node is assumed to be in the abnormal state if and only\nif it performs anomaly (or malicious) behavior. In such cases, this\ntask shares some similarities with detecting anomalous edges. How-\never, it should be noticed that the predicted current node states are\nused for predicting the anomalousness of future interactions (see\nSection 4.3) rather than assessing the anomalousness of interac-\ntions that have already occurred. Hence, for effective dynamic node\nanomaly detection, it is important to consider node-wise behavioral\ndynamics over time.\n4 PROPOSED METHOD: SLADE\nIn this section, we present SLADE (Self-supervised Learning for\nAnomaly Detection in Edge Streams), our proposed method for\nunsupervised dynamic anomaly detection in CTDGs.\nThe underlying intuition is that nodes in the normal state tend\nto exhibit structurally and temporally similar interaction patterns\nover time [ 2,3], while those in the abnormal state do not because\nrepeating similar abnormal actions increases the risk of detection.\nMotivated by this idea, we consider two key assumptions:•A1. Stable Long-Term Interaction Patterns: Nodes in the\nnormal state tend to repetitively engage in similar interactions\nover a long-term period. This stable long-term interaction pattern\nexhibits minimal variation within short-time intervals.\n•A2. Potential for Restoration of Patterns: It would be feasible\nto accurately regenerate the long-term interaction patterns of the\nnodes in the normal state using recent interaction information.\nThey account for both structural and temporal aspects of normal\nnodes. While A1focuses on temporal aspects, A2takes a further\nstep by specifying the extent of structural similarities over time.\nUpon these assumptions, SLADE employs two self-supervised\ntasks for training its model (i.e., deep neural network) for maintain-\ning and updating a dynamic representation of each node, which we\nexpect to capture its long-term interaction pattern.\n•S1. Temporal Contrast: This aims to minimize drift in dynamic\nnode representations over short-term periods (related to A1).\n•S2. Memory Generation: This aims to accurately generate dy-\nnamic node representations based only on recent interactions\n(related to A2).\nBy being trained for S1andS2, the model is expected to learn\nnormal interaction patterns satisfying A1andA2. Once the model\nis trained, SLADE identifies nodes for which the model performs\npoorly on S1andS2, as these nodes potentially deviate from pre-\nsumed normal interaction patterns.\nSpecifically, to obtain dynamic representations, SLADE employs\nneural networks in combination with memory modules (see Sec-\ntion 4.1). The memories (i.e., stored information), which reflect the\nnormal patterns of nodes, are updated and regenerated to minimize\nour self-supervised losses related to S1andS2(see Section 4.2).\nLastly, these dynamic representations are compared with their past\nvalues and momentary representations to compute anomaly scores\nfor nodes (see Section 4.3). The overview of SLADE is visually pre-\nsented in Figure 1, and the following subsections provide detailed\ndescriptions of each of its components.\n4.1 Core Modules of SLADE\nIn order to incrementally compute the dynamic representation of\neach node, SLADE employs three core modules:\n•Memory Module: These time-evolving parameter vectors rep-\nresent the long-term interaction patterns of each node, i.e., how\na node’s interaction has evolved over time.\n•Memory Updater: This neural network captures evolving char-\nacteristics of nodes’ interaction patterns. It is employed to update\nthe memory (i.e., stored information).\n•Memory Generator: This neural network is used to generate\nthe memory of a target node from its recent interactions.\nBelow, we examine the details of each module in order.\nMemory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module:Memory Module: InSLADE , the dynamic representation of each\nnode, which represents its long-term interaction patterns, is stored\nand updated in a memory module introduced by Rossi et al . [28] .\nSpecifically, the memory module consists of a memory vector 𝒔𝑖\nfor each node 𝑣𝑖, and each 𝒔𝑖captures the interactions of the node\n𝑣𝑖up to the current time. When each node 𝑣𝑖first emerges in the\ninput CTDG, 𝒔𝑖is initialized to a zero vector. As 𝑣𝑖participates in\n3𝒔𝑗\n𝒔𝑙Previous memory 𝒔𝑖’\nMessage 𝒎𝑖Current memory 𝒔𝑖\nGenerated memory ො𝒔𝑖\nRecent neighbors aggregationTGATMemory Updater\nMemory GeneratorTemporal Contrast Memory Generation\nPrevious memory 𝒔𝑖’\nCurrent memory 𝒔𝑖\nGenerated memory ො𝒔𝑖\nAnomaly score( 𝑣𝑖, 𝑡)\n(c) Self -supervised Learning (d) Anomaly Scoring𝑣𝑙𝑣𝑗\n𝑣𝑘𝑣𝑖𝑡𝑖𝑗\n𝑡𝑘𝑖𝑡𝑖𝑙(a) Input Edge Stream…\n𝑣𝑖𝑡𝑖𝑗𝑣𝑗\n𝑣𝑖𝑡12𝑣1𝑣2\n𝑡23𝑣2𝑣3\nRaw message 𝒓𝑖Cosine Similarity\n𝑣𝑖𝑣𝑗\nInteraction𝑣1…𝑣𝑖𝑣𝑗\nMemory module\nMemory masking\n𝒔𝑘𝑣𝑖MLPGRU\n(b) Query at time tFigure 1: Overview of SLADE , whose objective is to measure the anomaly score of a query node at any time. For each newly\narriving edge, SLADE updates the memory vector of each endpoint using GRU. Given a query node, SLADE masks the memory\nvector of the node and approximately regenerates it based on its recent interactions using TGAT. Then, it measures the anomaly\nscore of the query node based on the similarities (1) between previous and current memory vectors (related to S1) and (2)\nbetween current and generated memory vectors (related to S2). SLADE aims to maximize these similarities for model training.\ninteractions, 𝒔𝑖is continuously updated by the memory updater,\ndescribed in the following subsection.\nMemory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater:Memory Updater: Whenever a node participates in a new inter-\naction, the memory updater gradually updates its memory vector,\naiming to represent its stable long-term interaction pattern. First,\neach interaction is transformed into raw messages [ 28]. Each raw\nmessage consists of the encoded time difference between the most\nrecent appearance of one endpoint and the present time, along with\nthe memory vector of the other endpoint. For instance, upon the\narrival of a temporal edge (𝑣𝑖,𝑣𝑗,𝑡𝑖𝑗)at time𝑡𝑖𝑗, with𝑣𝑖and𝑣𝑗\nhaving memory vectors 𝒔′\n𝑖and𝒔′\n𝑗, respectively, the raw messages\nfor the source and destination nodes are created as follows:\n𝒓𝑖=[𝒔′\n𝑗||𝜙(𝑡𝑖𝑗−𝑡−\n𝑖)],𝒓𝑗=[𝒔′\n𝑖||𝜙(𝑡𝑖𝑗−𝑡−\n𝑗)], (1)\nwhere||denotes a concatenate operator, and 𝑡−\n𝑖denotes the time\nof the last interaction of 𝑣𝑖before the interaction time 𝑡𝑖𝑗. Follow-\ning [9], as the time encoding function 𝜙(·), we use\n𝜙(𝑡′)=𝑐𝑜𝑠\u0012\n𝑡′·[𝛼−0\n𝛽||𝛼−1\n𝛽||···||𝛼−𝑑𝑡−1\n𝛽]\u0013\n, (2)\nwhere·denotes the inner product, and 𝑑𝑡denotes the dimension\nof encoded vectors. Scalars 𝛼,𝛽and𝑑𝑡are hyperparameters.\nThen, the raw message 𝒓𝑖is converted to a message 𝒎𝑖, employ-\ning an MLP and then used to update from 𝒔′\n𝑖to𝒔𝑖, as follows:\n𝒔𝑖=GRU(𝒎𝑖,𝒔′\n𝑖)where 𝒎𝑖=MLP(𝒓𝑖). (3)\nHere 𝒔𝑖is the memory vector for node 𝑣𝑖after time𝑡𝑖𝑗, persisting\nuntil a new interaction involving node 𝑣𝑖occurs (see Appendix D.2\nfor exploration of alternatives to GRU [ 7]). We also maintain 𝒔′\n𝑖(i.e.,\nthe previous value of the memory vector) for its future usage.\nMemory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator:Memory Generator: The memory generator aims to restore the\nmemory vectors, which represent existing long-term interaction\npatterns, based on short-term interactions. The generated vectors\nare used for training and anomaly scoring, as described later.The first step of generation is to (temporarily) mask the memory\nvector of a target node at current time 𝑡to a zero vector. Then, the\nmemory vectors of its at most 𝑘latest (1-hop) neighbors and the\ncorresponding time information of their latest interactions are used\nas inputs of an encoder. As the encoder, we employ TGAT [ 38],\nwhich attends more to recent interactions (see Appendix D.2 for\nexploration of alternatives). That is, for a target node 𝑣𝑖and the\ncurrent time 𝑡, we generate its memory vector as follows:\nˆ𝒔𝑖=MultiHeadAttention (𝒒,K,V),where 𝒒=𝜙(𝑡−𝑡),\nandK=V=\u0002\ns𝑛1||𝜙(𝑡−𝑡′\n𝑛1),···,s𝑛𝑘||𝜙(𝑡−𝑡′\n𝑛𝑘)\u0003\n.\nHere{𝑛1,...,𝑛𝑘}denote the indices of the neighbors of the target\nnode𝑣𝑖,{𝑡′𝑛1,...,𝑡′𝑛𝑘}denote the timestamps of the most recent in-\nteractions with them before 𝑡, and ˆs𝑖denotes the generated memory\nvector of𝑣𝑖at𝑡. As the memory vector has been masked, only time\ninformation is used for query component 𝒒.\n4.2 Training Objective and Procedure\nFor the proposed temporal contrast task ( S1) and memory genera-\ntion task ( S2),SLADE is trained to minimize two loss components:\n•Temporal Contrast Loss: It encourages the agreement between\nprevious and updated memory vectors.\n•Memory Generation Loss: It encourages the similarity between\nretained and generated memory vectors.\nBelow, we describe each self-supervised loss component and then\nthe entire training process in greater detail.\nTemporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss:Temporal Contrast Loss: ForS1, we aim to minimize drift in\ndynamic node representations within short time intervals. For the\nmemory vector 𝒔𝑖of each node 𝑣𝑖, we use the previous memory\nvector 𝒔′\n𝑖as the positive sample and the memory vectors of the\nother nodes as negative samples. Specifically, for each interaction\n4at time𝑡of𝑣𝑖, we aim to minimize the following loss:\nℓ𝑐(𝑣𝑖,𝑡)=−logexp(𝑠𝑖𝑚(𝒔𝑖(𝑡+),𝒔′\n𝑖(𝑡+)))\nÍ|V(𝑡+)|\n𝑘=1exp(𝑠𝑖𝑚(𝒔𝑖(𝑡+),𝒔𝑘(𝑡+))), (4)\nwhere 𝒔𝑖(𝑡+)is the current memory vector 𝒔𝑖right after processing\nthe interaction at 𝑡(denoted as𝑡+to distinguish it from 𝑡right before\nprocessing the interaction), 𝒔′\n𝑖(𝑡+)is the previous memory vector,\nand𝑠𝑖𝑚is the cosine similarity function, i.e., 𝑠𝑖𝑚(𝒖,𝒗)=∥𝒖·𝒗∥\n∥𝒖∥·∥𝒗∥.\nMemory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss:Memory Generation Loss: ForS2, we aim to accurately generate\ndynamic node representations from recent interactions (i.e., short-\nterm patterns). For each node 𝑣𝑖, we expect its generated memory\nvector ˆ𝒔𝑖to be matched well with the (temporally masked) memory\nvector 𝒔𝑖, relative to other memory vectors. Specifically, for each\ninteraction at time 𝑡of𝑣𝑖, we aim to minimize the following loss:\nℓ𝑔(𝑣𝑖,𝑡)=−logexp(𝑠𝑖𝑚(ˆ𝒔𝑖(𝑡+),𝒔𝑖(𝑡+)))\nÍ|V(𝑡+)|\n𝑘=1exp(𝑠𝑖𝑚(ˆ𝒔𝑖(𝑡+),𝒔𝑘(𝑡+))), (5)\nwhere 𝒔𝑖(𝑡+)is the current memory vector 𝒔𝑖after processing the\ninteraction at 𝑡, and ˆ𝒔𝑖(𝑡+)is the generated memory vector ˆ𝒔𝑖. We\npropose a novel self-supervised learning task that encourages a\nmodel to learn the normal temporal pattern of data.\nBatch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training:Batch Processing for Efficient Training: For computational ef-\nficiency, we employ batch processing for training SLADE , which\nhas been commonly used [ 28,31,38]. That is, instead of process-\ning a single edge at a time, multiple edges are fed into the model\nsimultaneously. To this end, a stream of temporal edges is divided\ninto batches of a fixed size in chronological order. Consequently,\nmemory updates take place at the batch level, and for these updates,\nthe model uses only the interaction information that precedes the\ncurrent batch. Note that a single node can be engaged in multiple\ninteractions within a single batch, leading to multiple raw mes-\nsages for the node. To address this, SLADE aggregates the raw\nmessages into one raw message using mean pooling and continues\nwith the remaining steps of memory update. In order for the tem-\nporal contrast in Eq. (4)reflects A1, which emphasizes minimizing\nthe difference between memory vectors before and after an update\nwithin a “short” time span, the batch size should not be excessively\nlarge. Therefore, it is crucial to establish an appropriate batch size,\ntaking both this and efficiency into consideration.\nFinal Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective:Final Training Objective: For each batch 𝐵with temporal edges\nE𝐵, the overall temporal contrast loss is defined as follows:\nL𝑐=1\n|E𝐵|∑︁\n(𝑣𝑖,𝑣𝑗,𝑡)∈E𝐵𝜔𝑐𝑠ℓ𝑐(𝑣𝑖,𝑡)+𝜔𝑐𝑑ℓ𝑐(𝑣𝑗,𝑡), (6)\nwhere𝜔𝑐𝑠and𝜔𝑐𝑑are hyperparameters for weighting each source\nnode and each destination node, respectively. Similarly, the overall\nmemory generation loss for𝐵is defined as follows:\nL𝑔=1\n|E𝐵|∑︁\n(𝑣𝑖,𝑣𝑗,𝑡)∈E𝐵𝜔𝑔𝑠ℓ𝑔(𝑣𝑖,𝑡)+𝜔𝑔𝑑ℓ𝑔(𝑣𝑗,𝑡), (7)\nwhere𝜔𝑔𝑠and𝜔𝑔𝑑hyperparameters for weighting each source\nnode and each destination node, respectively.\nThe final lossLfor𝐵is the sum of both losses, i.e., L=L𝑐+L𝑔.\nNote that, since anomaly labels are assumed to be unavailable,\nSLADE is trained with the assumption that the state of all nodes\nappearing in the training set is normal, irrespective of their actual\nstates. However, SLADE still can learn normal patterns effectively,given that they constitute the majority of the training data, as\ndiscussed for various types of anomalies in Section 5.1.\n4.3 Anomaly Scoring\nAfter being trained, SLADE is able to measure the anomaly score\nof any node at any given time point. SLADE measures how much\neach node deviates from A1andA2by computing the temporal\ncontrast score and the memory generation score, which are\nbased on A1andA2, respectively. Below, we describe each of them.\nTemporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score:Temporal Contrast Score: This score is designed to detect anoma-\nlous nodes that deviate from A1, and to this end, it measures the ex-\ntent of abrupt changes in the long-term interaction pattern. Specif-\nically, the temporal contrast score 𝑠𝑐𝑐(𝑣𝑖,𝑡)of a node𝑣𝑖at time𝑡\n(spec., before processing any interaction at 𝑡) is defined as the cosine\ndistance between its current and previous memory vectors:\n𝑠𝑐𝑐(𝑣𝑖,𝑡)=1−𝑠𝑖𝑚(𝒔𝑖(𝑡),𝒔′\n𝑖(𝑡)). (8)\nMemory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score:Memory Generation Score: In order to identify anomalous nodes\ndeviating from A2, this score measures the degree of deviation of\nshort-term interaction patterns from long-term interaction patterns.\nSpecifically, the memory generation score 𝑠𝑐𝑔(𝑣𝑖,𝑡)of a node𝑣𝑖at\ntime𝑡is defined as the cosine distance between its current and\ngenerated memory vectors:\n𝑠𝑐𝑔(𝑣𝑖,𝑡)=1−𝑠𝑖𝑚(ˆ𝒔𝑖(𝑡),𝒔𝑖(𝑡)). (9)\nFinal Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score:Final Score: The final anomaly score is a combination of both\nscores, i.e., the final score𝑠𝑐(𝑣𝑖,𝑡)of a node𝑣𝑖at time𝑡is defined as\n𝑠𝑐(𝑣𝑖,𝑡)=(𝑠𝑐𝑐(𝑣𝑖,𝑡)+𝑠𝑐𝑔(𝑣𝑖,𝑡))/4, (10)\nwhere it is normalized to fall within the range of [0,1]. Nodes in\nthe normal state will have scores closer to 0, while those in the\nabnormal state will have scores closer to 1.\nNote that in our notation, 𝑠𝑐(𝑣𝑖,𝑡)denotes the anomaly score\nbefore observing or processing any interaction at time 𝑡, if such\nan interaction exists. We use this score to measure the potential\nabnormality of node 𝑣𝑖’s current state and also that of its subsequent\naction (which can occur at time 𝑡or later).\n5 DISCUSSION AND ANALYSIS\nIn this section, we discuss how SLADE deals with various types of\nanomalies. Then, we analyze the time complexity of SLADE .\n5.1 Discussion on Anomaly Types\nBelow, we discuss how SLADE can detect anomalies of various\ntypes, without any prior information about the types. In Section 6.2\n(RQ4), we empirically confirm its effectiveness for all these types.\nT1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies:T1) Hijacked Anomalies: This type involves a previously nor-\nmal user’s account being compromised at some point, exhibiting\nmalicious behaviors that deviate from the user’s normal pattern.\nSLADE , motivated by such anomalies, contrasts short-term and\nlong-term interaction patterns to spot them, as discussed above.\nT2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies:T2) New or Rarely-interacting Anomalies: Many deep learning-\nbased detection models struggle with anomalies involving (1) newly\nintroduced or (2) rarely interacting nodes due to limited data for\nlearning their normal behaviors. SLADE assigns a higher anomaly\nscore (both contrast and generation scores) to such nodes because\n5their memory vectors undergo substantial changes until their long-\nterm patterns are established. We find it advantageous to pay atten-\ntion to such nodes because, in some of the real-world datasets we\nused, including Wikipedia, Bitcoin-alpha, and Bitcoin-OTC, new\nand rarely interacting nodes are more likely to engage in anomalous\nactions than those with consistent interactions.1\nT3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies:T3) Consistent Anomalies: SLADE can also effectively identify\nanomalies exhibiting interaction patterns that are consistent over\ntime but deviating from those of normal nodes. Due to the limited\ncapacity (i.e., expressiveness) of the neural networks used in it,\nSLADE prioritizes learning prevalent patterns (i.e., those of normal\nnodes) over less common abnormal ones. As a result, this can lead\nto a violation of A2, causing SLADE to assign high anomaly scores,\nespecially memory generation scores, to such nodes.\n5.2 Complexity Analysis\nWe analyze the time complexity of SLADE “in action” after be-\ning trained. Specifically, we examine the cost of (a) updating the\nmemory in response to a newly arrived edge, and (b) calculating\nanomaly scores for a query node.\nMemory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update:Memory Update: Given a newly arriving edge, SLADE updates\nthe memory vector of each endpoint using GRU. The total time com-\nplexity is dominated by that of GRU, which is O(𝑑𝑠2+𝑑𝑠𝑑𝑚)[29],\nwhere𝑑𝑠and𝑑𝑚indicate the dimensions of memory vectors and\nmessages respectively.\nAnomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring:Anomaly Scoring: Given a query node, SLADE first aims to gener-\nate its memory vector using TGAT with input being a zero-masked\nmemory of the query node and the memory vectors of its at most\n𝑘most recent neighbors. Thus, the time complexity of obtaining\ngenerated memory is O(𝑘𝑑𝑠2)[41] if we assume, for simplicity,\nthat the embedding dimension of the attention layers is the same\nas the dimension 𝑑𝑠of the memory vectors. Then, SLADE com-\nputes the similarities (a) between the current memory and previous\nmemory vectors and (b) between current and generated memory\nvectors, takingO(𝑑𝑠2)time. As a result, the overall time complexity\nofSLADE for anomaly scoring of a node is O(𝑘𝑑𝑠2).\nThe time complexity for both tasks is O(𝑘𝑑𝑠2+𝑑𝑠𝑑𝑚), which\nisconstant with respect to the graph size (i.e., the numbers of\naccumulated nodes and edges). If we assume that anomaly scoring\n(for each endpoint) is performed whenever each edge arrives, the\ntotal complexity becomes linear in the number of accumulated\nedges, as confirmed empirically in Section 6.2 (RQ2).\n6 EXPERIMENTS\nIn this section, we review our experiments for answering the fol-\nlowing research questions:\n•RQ1) Accuracy: How accurately does SLADE detect anomalies,\ncompared to state-of-the-art competitors?\n•RQ2) Speed: Does SLADE exhibit detection speed constant with\nrespect to the graph size?\n•RQ3) Ablation Study: Does every component of SLADE con-\ntribute to its performance?\n•RQ4) Type Analysis: CanSLADE accurately detect various\ntypes of anomalies discussed in Section 5.1?\n1We suspect that new or inactive accounts are typically used to perform anomalous\nactions since the cost of being suspended is low for such accounts.6.1 Experiment Details\nIn this subsection, we describe datasets, baseline methods, and eval-\nuation metrics that are used throughout our experiments. Then, we\nclarify the implementation details of the proposed method SLADE .\nDatasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets:Datasets: We assess the performance of SLADE on four real-world\ndatasets: two social networks (Wikipedia and Reddit [ 20]) and two\nonline financial networks (Bitcoin-alpha and Bitcoin-OTC [ 19]).\nThe Wikipedia dataset records edits made by users on Wikipedia\npages. In this context, when a user is banned after a specific edit, the\nuser’s dynamic label is marked as abnormal. The Reddit dataset con-\nsists of posts made by users on subreddits. The user’s dynamic label\nindicates whether the user is banned after the specific post. The\nBitcoin-alpha and Bitcoin-OTC datasets are fundamentally struc-\ntured as trust-weighted signed networks. Within these datasets,\nBitcoin alpha or OTC members assign ratings to other members,\nranging from -10 (total distrust) to +10 (complete trust). We uti-\nlize these ratings with temporal information to identify anomalous\nnodes and assign dynamic labels to users. Further details of the\ndataset processing and the statistics are provided in Appendix A.\nAcross all datasets, we assess the performance of our method and\nthe baseline models by utilizing the final 15% of the dataset in\nchronological order as the test set.\nBaselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric:Baselines Methods and Evaluation Metric: We extensively com-\npareSLADE with several baseline methods capable of anomaly de-\ntection in CTDGs under inductive settings (i.e., without further opti-\nmization for test sets). For four rule-based methods (SedanSpot [ 12],\nMIDAS-R [ 4], F-FADE [ 6], Anoedge-l [ 5]), since they do not require\nany representation learning process, we evaluate their performance\nin test sets without model training. For five neural network-based\nmodels (JODIE [ 20], Dyrep [ 33], TGAT [ 38], TGN [ 28], SAD [ 31]),\nwe train each model by using train sets and do hyperparameter tun-\ning with validation sets. At last, we evaluate them by using test sets.\nIn scenarios where a model requires node or edge features, but these\nattributes are absent from the dataset, the model uses zero vectors\nas substitutes. A detailed description of these baselines is provided\nin Appendix B. To quantify the performance of each model, we use\nArea Under ROC (AUC) as an evaluation metric. For extra results\nin terms of Average Precision (AP), refer to Appendix D.1.\nImplementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details:Implementation Details: In our experiments, we use two ver-\nsions of our method, SLADE andSLADE -HP. For SLADE , as label\nutilization is not possible in its original setting, we do not conduct\nhyperparameter tuning on the validation dataset split. Instead, we\nuse the same hyperparameter combination across all datasets. We\nadopt a batch size of 100and an initial learning rate of 3×10−6.\nWe also fix a memory dimension to 256, a message dimension to\n128, and a max number of most recent neighbors (node degree) to\n20. For the loss function, we set 𝜔𝑐𝑠=1,𝜔𝑐𝑑=1,𝜔𝑔𝑠=0.1, and\n𝜔𝑔𝑑=0.1across all datasets. We train the model on the training\nset for 10 epochs and then evaluate its performance on the test set.\nAnother version of SLADE isSLADE -HP, where we tune the\nhyperparameters of SLADE by using the validation split of each\ndataset, just as we tune the hyperparameters of “all” baseline meth-\nods, including the rule-based ones. Refer to Appendix C.3 for details\nregarding the hyperparameter search space of SLADE -HP.\nFor the baseline methods, we assess the performance on the test\nset using two hyperparameter settings: (a) those recommended by\n6Table 1: AUC (in %) in the detection of dynamic anomaly\nnodes. The first four methods are rule-based models, and the\nothers are based on representation learning. For each dataset,\nthe best and the second-best performances are highlighted in\nboldface and underlined, respectively. In most cases, SLADE\nandSLADE -HP perform best, even when compared to models\nthat rely on label information. For results in terms of Average\nPrecision (AP), refer to Appendix D.1.\nMethod Wikipedia Reddit Bitcoin-alpha Bitcoin-OTC\nSedanSpot [12] 82.88±1.54 58.97±1.85 69.09±0.76 71.71±0.73\nMIDAS [4] 62.92±3.53 59.94±0.95 64.57±0.11 62.16±1.99\nF-FADE [6] 44.88±0.00 49.79±0.05 53.57±0.00 51.12±0.00\nAnoedge-l [5] 47.38±0.32 48.47±0.46 62.52±0.24 65.99±0.19\nJODIE [20] 85.75±0.17 61.47±0.58 73.53±1.26 69.13±0.96\nDyrep [33] 85.68±0.34 63.42±0.62 73.30±1.51 70.76±0.70\nTGAT [38] 83.24±1.11 65.12±1.65 71.67±0.90 68.33±1.23\nTGN [28] 87.47±0.22 67.16±1.03 69.90±0.99 76.23±0.23\nSAD [31] 86.15±0.63 68.45±1.27 68.56±3.17 64.67±4.97\nSLADE 87.75±0.68 72.19±0.60 76.32±0.28 75.80±0.19\nSLADE -HP 88.68±0.39 75.08±0.50 76.92±0.36 77.18±0.27\nFigure 2: AUC (in %) when varying the test start ratio. For\nlearning-based methods, temporal edges preceding the test\nstart ratio in the dataset are employed for training. If vali-\ndation is needed, the last 10% of the training set is used for\nvalidation. Note that SLADE performs best in most cases.\nthe authors, and (b) those leading to the best validation performance\nfor each specific dataset. Subsequently, we conduct a performance\nevaluation on the test set using these two distinct settings and\nreport the best-performing outcome.\nThe reported results have been obtained by averaging across\n10 separate runs, each with different random initializations of the\nmodels. A further description of the implementation and hyperpa-\nrameters of SLADE and baselines are provided in Appendix C.\n6.2 Experimental Results\nRQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy:RQ1) Accuracy: As shown in Table 1, SLADE andSLADE -HP\nsignificantly outperform other baseline methods in most of the\ndatasets. There are two notable observations in this analysis.\nFirst, regarding the unsupervised learning competitors (i.e., SedanS-\npot, MIDAS, F-FADE, and Anoedge-l), SLADE consistently outper-\nforms them across all datasets, achieving performance gains of\nup to 20.44% (in the Reddit dataset) compared to the second-best\nFigure 3: The left figure shows the linear increase of the\nrunning time of SLADE with respect to the number of edges\nin the Reddit dataset. The right figure shows the trade-off\nbetween detection speed and accuracy (with standard devia-\ntions) in the Wikipedia dataset provided by the competing\nmethods. The baseline methods with AUC scores below 60%\nare excluded from consideration to enhance the clarity of per-\nformance differences between the methods. SLADE exhibits\nconstant processing time per edge (as proven in Section 5.2),\noffering the best trade-off between speed and accuracy. For a\ntraining-time comparison, refer to Appendix D.3.\nperforming unsupervised model. This result demonstrates that real-\nworld anomalies exhibit complex patterns hard to be fully captured\nby fixed rule-based approaches. As a result, the necessity for more\nintricate representation models becomes evident.\nSecond, interestingly, while SLADE does not utilize any label\ninformation, even for hyperparameter tuning, it still outperforms\nall supervised baseline models, on all datasets except for the Bit-\ncoinOTC dataset. This result implies that the patterns of nodes in\nthe normal state in real-world graphs closely adhere to A1andA2,\nandSLADE effectively captures such patterns. Furthermore, it is\nevident that measuring the extent to which nodes deviate from the\npatterns provides crucial information for anomaly detection.\nIn addition, we measure the performances of the considered\nmethods while varying the proportion of the training split (or equiv-\nalently the test split). Specifically, we utilize the first T%of the\nedges as a train set and assess each model by using the remaining\n(100−T) %of edges. We refer to Tas atest start ratio . As shown\nin Figure 2, SLADE outperforms all baseline methods in most of\nthe settings, across various test start ratios. Moreover, as seen in\nthe performances of SLADE between the 40% and 80% ratios in\nthe Wikipedia dataset, using just half of the dataset leads to only a\nmarginal performance degradation (spec., 3.2%).\nRQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action:RQ2) Speed in Action: To empirically demonstrate the theoretical\ncomplexity analysis in Section 5.2, we measure the running time of\nSLADE “in action” after being trained on the Reddit dataset while\nvarying the number of edges. Anomaly scoring is performed (for\neach endpoint) only when each edge arrives. As depicted in the\nleft subplot of Figure 3, the running time of SLADE is linear in the\nnumber of edges, being aligned with our analysis.\nAdditionally, we compare the running time and AUC scores of\nSLADE with those of all considered methods. As shown in the\nright plot of Figure 3, while SLADE is about 1.99×slower than\nSedanSpot, which is the most accurate rule-based approach, SLADE\ndemonstrates a significant improvement of 5.88% in AUC scores,\ncompared to SedanSpot. Furthermore, SLADE is about 4.57×faster\nthan TGN, which is the second most accurate following SLADE .\nRQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study:RQ3) Ablation Study: The ablation study is conducted across the\nfour datasets to analyze the necessity of the used self-supervised\n7Table 2: Comparison of AUC (in %) of SLADE and its variants\nthat use a subset of the proposed components (i.e., tempo-\nral contrast lossL𝑐, memory generation loss L𝑔, temporal\ncontrast score 𝑠𝑐𝑐, and memory generation score 𝑠𝑐𝑔).SLADE\nwith all components performs the best overall, showing the\neffectiveness of each.\nL𝑐L𝑔𝑠𝑐𝑐𝑠𝑐𝑔 Wikipedia Reddit Bitcoin-alpha Bitcoin-OTC\n✓ -✓ - 85.69±1.17 48.89±1.53 76.38±0.48 73.87±0.23\n-✓ -✓ 87.57±0.35 61.77±0.12 74.84±0.40 75.80±0.26\n✓ ✓ ✓ - 87.42±1.06 48.51±1.56 76.45±0.52 74.10±0.25\n✓ ✓ -✓ 84.64±0.75 71.33±0.56 75.24±3.50 75.70±0.21\n✓ ✓ ✓ ✓ 87.75±0.68 72.19±0.60 76.32±0.28 75.80±0.19\nTable 3: AUC (in %) in the detection of dynamic anomaly\nnodes in the two synthetic datasets. Since anomalies are in-\njected only into the test sets, the comparison is limited to\nunsupervised methods. F-FADE, which consistently achieves\nan AUC value below 0.5, is omitted from the table. For results\nin terms of Average Precision (AP), refer to Appendix D.1.\nDataset SedanSpot [12] MIDAS [4] Anoedge-l [5] SLADE\nSynthetic-Hijack 77.13±2.21 81.80±1.26 58.87±2.47 98.08±1.02\nSynthetic-New 78.05±1.68 82.63±0.07 61.86±2.41 98.38±1.09\nlosses (Eq (4)and Eq (5)) and two anomaly detection scores (Eq (8)\nand Eq (9)). To this end, we utilize several variants of SLADE , where\ncertain scores or self-supervised losses are removed from SLADE .\nAs evident from Table 2, SLADE , which uses all the proposed self-\nsupervised losses and scores, outperforms its variants in most of\nthe datasets (Wikipedia, Reddit, and Bitcoin-OTC). Moreover, even\nin the Bitcoin-alpha dataset, the performance gap between SLADE\nand the best-performing variant is within the standard deviation\nrange. Notably, the generation score greatly contributes to accurate\nanomaly detection in most of the dataset, providing an empirical\nperformance gain of up to 48.81% (on the Reddit dataset).\nRQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis:RQ4) Type Analysis: We demonstrate the effectiveness of SLADE\nin capturing various types of anomalies discussed in Section 5.1.\nTo this end, we create synthetic datasets by injecting anomalies to\nthe Email-EU [ 26] dataset, which consists of emails between users\nin a large European research institution. Specifically, we create\nanomalies that repetitively send spam emails to random recipients\nwithin a short time interval, mimicking spammers, and based on\nthe timing of spamming, we have two different datasets:\n•Synthetic-Hijack : Accounts of previously normal users start\ndisseminating spam emails after being hijacked at a certain time\npoint and continue their anomalous actions. We further catego-\nrize each anomaly as Type T1 during its initial 20 interactions\nafter being hijacked, and as Type T3 after that.\n•Synthetic-New : New anomalous users appear and initiate spread-\ning spam emails from the beginning and continue their anoma-\nlous actions. We further categorize each anomaly as Type T2\nduring its first 20 interactions, and as Type T3 afterward.\nIn them, all anomalies are injected only into the test set (i.e., final\n10%of the dataset in chronological order), ensuring that they remain\nunknown to the model during training. Consequently, the task\ninvolves detecting these anomalies in an unsupervised manner, and\nSLADE is compared only with the unsupervised baseline methods.\nFigure 4: (a) and (b) show the distribution of anomaly scores\nassigned by SLADE to instances of each node type in the two\nsynthetic datasets (visualization is based on Gaussian kernel\ndensity estimation). (c) and (d) show the anomaly scores at\neach time period. Note that in all figures, SLADE clearly\ndistinguishes anomalies from normal nodes. For results from\nseveral baseline methods, refer to Appendix D.4.\nAs shown in Table 3, SLADE performs best, achieving perfor-\nmance gains up to 19.9% in the Synthetic-Hijack dataset and 19.06%\nin the Synthetic-New dataset. These results reaffirm the limitations\nof traditional unsupervised methods in capturing anomalies beyond\ntheir targeted types. In contrast, as it can learn normal patterns from\ndata,SLADE successfully identifies various types of anomalies.\nFurthermore, we provide qualitative analysis of how SLADE as-\nsigns scores to the normal and anomalies of each type. Figures 4(a)\nand (b) show that SLADE clearly separates anomaly score distribu-\ntions of all anomaly types ( T1,T2, and T3) from the distribution\nof the normal ones. Figure 4(c) shows that the anomaly scores of\nhijacked anomalies ( T1) increase shortly after being hijacked. Fig-\nure 4(d) shows that SLADE successfully assigns high anomaly scores\nto new or rarely interacting anomalies ( T2). Consistent anomalies\n(T3) receive high anomaly scores in both cases.\n7 CONCLUSION\nWe proposed SLADE , a novel self-supervised method for dynamic\nanomaly detection in edge streams, with the following strengths:\n•SLADE does not rely on any label supervision while being able\nto capture complex anomalies (Section 4).\n•SLADE outperforms state-of-the-art anomaly detection methods\nin the task of dynamic anomaly detection in edge streams. SLADE\nachieves a performance improvement of up to 12.80% and 4.23%\ncompared to the best-performing unsupervised and supervised\nbaseline methods, respectively (Section 6.2).\n•SLADE demonstrates a constant time complexity per edge, which\nis theoretically supported (Section 5.2).\n8REFERENCES\n[1]Odd Aalen, Ornulf Borgan, and Hakon Gjessing. 2008. Survival and event history\nanalysis: a process point of view . Springer Science & Business Media.\n[2]Ashton Anderson, Ravi Kumar, Andrew Tomkins, and Sergei Vassilvitskii. 2014.\nThe dynamics of repeat consumption. In WWW .\n[3]Austin R Benson, Ravi Kumar, and Andrew Tomkins. 2018. Sequences of sets. In\nKDD .\n[4]Siddharth Bhatia, Bryan Hooi, Minji Yoon, Kijung Shin, and Christos Faloutsos.\n2020. Midas: Microcluster-based detector of anomalies in edge streams. In AAAI .\n[5]Siddharth Bhatia, Mohit Wadhwa, Kenji Kawaguchi, Neil Shah, Philip S Yu, and\nBryan Hooi. 2023. Sketch-Based Anomaly Detection in Streaming Graphs. In\nKDD .\n[6]Yen-Yu Chang, Pan Li, Rok Sosic, MH Afifi, Marco Schweighauser, and Jure\nLeskovec. 2021. F-fade: Frequency factorization for anomaly detection in edge\nstreams. In WSDM .\n[7]Kyunghyun Cho, Bart Van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau,\nFethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase\nrepresentations using RNN encoder-decoder for statistical machine translation.\nInEMNLP .\n[8]Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014.\nEmpirical evaluation of gated recurrent neural networks on sequence modeling.\nInNeurIPS, Deep Learning and Representation Learning Workshop .\n[9]Weilin Cong, Si Zhang, Jian Kang, Baichuan Yuan, Hao Wu, Xin Zhou, Hanghang\nTong, and Mehrdad Mahdavi. 2022. Do We Really Need Complicated Model\nArchitectures For Temporal Networks?. In ICLR .\n[10] Kaize Ding, Jundong Li, Rohit Bhanushali, and Huan Liu. 2019. Deep anomaly\ndetection on attributed networks. In SDM .\n[11] Kaize Ding, Qinghai Zhou, Hanghang Tong, and Huan Liu. 2021. Few-shot\nnetwork anomaly detection via cross-network meta-learning. In WWW .\n[12] Dhivya Eswaran and Christos Faloutsos. 2018. Sedanspot: Detecting anomalies\nin edge streams. In ICDM .\n[13] Jin Huang, Wentai Zhu, Jing Xiao, Tian Lu, and Weihao Yu. 2022. Dynamic Graph\nRepresentation Based on Temporal and Contextual Contrasting. In ACAI .\n[14] Ming Jin, Yixin Liu, Yu Zheng, Lianhua Chi, Yuan-Fang Li, and Shirui Pan. 2021.\nAnemone: Graph anomaly detection with multi-scale contrastive learning. In\nCIKM .\n[15] Seyed Mehran Kazemi, Rishab Goel, Kshitij Jain, Ivan Kobyzev, Akshay Sethi,\nPeter Forsyth, and Pascal Poupart. 2020. Representation learning for dynamic\ngraphs: A survey. The Journal of Machine Learning Research 21, 1 (2020), 2648–\n2720.\n[16] Shima Khoshraftar, Aijun An, and Nastaran Babanejad. 2022. Temporal graph\nrepresentation learning via maximal cliques. In Big Data .\n[17] Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic opti-\nmization. In ICLR .\n[18] Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph\nconvolutional networks. In ICLR .\n[19] Srijan Kumar, Francesca Spezzano, VS Subrahmanian, and Christos Faloutsos.\n2016. Edge weight prediction in weighted signed networks. In ICDM .\n[20] Srijan Kumar, Xikun Zhang, and Jure Leskovec. 2019. Predicting dynamic em-\nbedding trajectory in temporal interaction networks. In KDD .\n[21] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2007. Graph evolution:\nDensification and shrinking diameters. ACM transactions on Knowledge Discovery\nfrom Data (TKDD) 1, 1 (2007), 2–es.\n[22] Jundong Li, Harsh Dani, Xia Hu, and Huan Liu. 2017. Radar: Residual analysis\nfor anomaly detection in attributed networks.. In IJCAI .[23] Yixin Liu, Zhao Li, Shirui Pan, Chen Gong, Chuan Zhou, and George Karypis.\n2021. Anomaly detection on attributed networks via contrastive self-supervised\nlearning. IEEE transactions on neural networks and learning systems 33, 6 (2021),\n2378–2392.\n[24] Yixin Liu, Shirui Pan, Yu Guang Wang, Fei Xiong, Liang Wang, Qingfeng Chen,\nand Vincent CS Lee. 2021. Anomaly detection in dynamic graphs via transformer.\nIEEE Transactions on Knowledge and Data Engineering (2021).\n[25] Xiaoxiao Ma, Jia Wu, Shan Xue, Jian Yang, Chuan Zhou, Quan Z Sheng, Hui Xiong,\nand Leman Akoglu. 2021. A comprehensive survey on graph anomaly detection\nwith deep learning. IEEE Transactions on Knowledge and Data Engineering (2021).\n[26] Ashwin Paranjape, Austin R Benson, and Jure Leskovec. 2017. Motifs in temporal\nnetworks. In Proceedings of the tenth ACM international conference on web search\nand data mining . 601–610.\n[27] Tahereh Pourhabibi, Kok-Leong Ong, Booi H Kam, and Yee Ling Boo. 2020. Fraud\ndetection: A systematic literature review of graph-based anomaly detection\napproaches. Decision Support Systems 133 (2020), 113303.\n[28] Emanuele Rossi, Ben Chamberlain, Fabrizio Frasca, Davide Eynard, Federico\nMonti, and Michael Bronstein. 2020. Temporal Graph Networks for Deep Learning\non Dynamic Graphs. In ICML 2020 Workshop on Graph Representation Learning .\n[29] Michael Rotman and Lior Wolf. 2021. Shuffling recurrent neural networks. In\nAAAI .\n[30] Kartik Sharma, Mohit Raghavendra, Yeon Chang Lee, Srijan Kumar, et al .2022.\nRepresentation Learning in Continuous-Time Dynamic Signed Networks. arXiv\ne-prints (2022), arXiv–2207.\n[31] Sheng Tian, Jihai Dong, Jintang Li, Wenlong Zhao, Xiaolong Xu, Bowen Song,\nChanghua Meng, Tianyi Zhang, Liang Chen, et al .2023. SAD: Semi-Supervised\nAnomaly Detection on Dynamic Graphs. In IJCAI .\n[32] Sheng Tian, Ruofan Wu, Leilei Shi, Liang Zhu, and Tao Xiong. 2021. Self-\nsupervised representation learning on dynamic graphs. In Proceedings of the\n30th ACM International Conference on Information & Knowledge Management .\n1814–1823.\n[33] Rakshit Trivedi, Mehrdad Farajtabar, Prasenjeet Biswal, and Hongyuan Zha. 2019.\nDyrep: Learning representations over dynamic graphs. In ICLR .\n[34] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones,\nAidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all\nyou need. In NeurIPS .\n[35] Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro\nLio, Yoshua Bengio, et al. 2018. Graph attention networks. In ICLR .\n[36] Xuhong Wang, Ding Lyu, Mengjian Li, Yang Xia, Qi Yang, Xinwen Wang, Xin-\nguang Wang, Ping Cui, Yupu Yang, Bowen Sun, et al .2021. Apan: Asynchronous\npropagation attention network for real-time temporal graph embedding. In SIG-\nMOD .\n[37] Yiwei Wang, Yujun Cai, Yuxuan Liang, Henghui Ding, Changhu Wang, Siddharth\nBhatia, and Bryan Hooi. 2021. Adaptive data augmentation on temporal graphs.\nInNeurIPS .\n[38] Da Xu, Chuanwei Ruan, Evren Korpeoglu, Sushant Kumar, and Kannan Achan.\n2020. Inductive representation learning on temporal graphs. In ICLR .\n[39] Wenchao Yu, Wei Cheng, Charu C Aggarwal, Kai Zhang, Haifeng Chen, and\nWei Wang. 2018. Netwalk: A flexible deep embedding approach for anomaly\ndetection in dynamic networks. In KDD .\n[40] Li Zheng, Zhenpeng Li, Jian Li, Zhao Li, and Jun Gao. 2019. AddGraph: Anomaly\nDetection in Dynamic Graph Using Attention-based Temporal GCN.. In IJCAI .\n[41] Tongya Zheng, Xinchao Wang, Zunlei Feng, Jie Song, Yunzhi Hao, Mingli Song,\nXingen Wang, Xinyu Wang, and Chun Chen. 2023. Temporal Aggregation\nand Propagation Graph Neural Networks for Dynamic Representation. IEEE\nTransactions on Knowledge and Data Engineering (2023).\n9A APPENDIX: DATASET DETAILS\nA.1 Real-world Datasets\nWe use 4 real-world datasets for a dynamic anomaly detection task;\ntwo social network datasets (Wikipedia and Reddit)2[20] and two\nfinancial network datasets (Bitcoin-alpha and Bitcoin-OTC)3[19].\nBasic descriptive statistics of each dataset are provided in Table 4.\nBelow, we provide a detailed description of each dataset, focusing on\nthe process of creating the ground-truth dynamic anomaly labels.\nIn Wikipedia and Reddit datasets, which are social networks\nbetween users, a user’s dynamic label at time 𝑡indicates the user’s\nstate at time 𝑡. Specifically, if a user is banned by administrators\nat time𝑡, the label of the user at time 𝑡is marked as abnormal .\nOtherwise, the user has a label of normal . Note that these labels\nare inherently given in the original datasets. Therefore, we utilize\nthese dynamic labels as anomalous labels of users for our task.\nBitcoin-alpha and Bitcoin-OTC datasets are temporal weighted-\nsigned networks between users. Here, the weight of each directional\nedge indicates how much the source user trusts the destination user.\nSpecifically, for each edge, its weight, which lies between -10 (total\ndistrust) to +10 (total trust) is given, together with the time of the\ninteraction. Note that, in our experiments, the edge weights are\nutilized to create ground-truth dynamic labels, and they are not\nincluded in the inputs for the anomaly detection methods. While\nthe used social networks inherently contain dynamic node states\n(i.e., banned), such information of an individual user is not pro-\nvided in this case. Therefore, we assign a dynamic label to each\nnode according to the weights of the interactions the node is in-\nvolved in. Note that since the overall Bitcoin transaction systems\nare anonymized, it is not reliable to determine the state of a user\naccording to a single interaction.\nHence, to obtain reliable labels, we adopt a two-stage labeling\nprocess: for each user, first, we define the (1) overall state of the\nuser, then define (2) the dynamic state of the user based on the\noverall state. We further describe this process.\n(1):Defining overall state: For each user, if the sum of the scores\na user has received throughout the entire edge stream is smaller\nthan zero, the overall state of the user is decided to be abnormal .\nOtherwise, the overall state of the user is labeled as normal .\n(2):Defining dynamic state: For each user that has the normal\noverall state, the dynamic label of the user is assumed to be\nalways normal . On the other hand, for each user that has the\nabnormal overall state, when the user becomes the destination\nnode of a negative-weighted interaction (i.e., receiving a neg-\native trust score from other users), the dynamic label of the\nuser at the corresponding interaction time is assumed to be\nabnormal . Otherwise, if a user receives a positive trust score\nfrom another user, we assume the dynamic label of the user\nat that time is assumed to be normal . Note that these created\ndynamic node labels are utilized as ground-truth dynamic node\nlabels of our datasets.\n2http://snap.stanford.edu/jodie/#datasets\n3https://snap.stanford.edu/dataAs mentioned above, the weight of each edge determines the\nlabel of a destination node, not a source node4. Regarding node\nand edge features, all of the used baseline neural network-based\nanomaly detection models require feature information of nodes\nand edges. On the other hand, in Bitcoin-alpha and -OTC datasets,\nsuch information is not given. Following prior works that used\nsuch models in the corresponding datasets [ 16,30], we utilize zero\nvectors for node and edge features of such datasets.\nRegarding data splits, for all the datasets, we fix the chronological\nsplit with 70 % for training, 15% for validation, and the last 15 %\nfor testing, which is a common setting that is widely used in many\nexisting works [28, 31, 38].\nA.2 Semi-Synthetic Datasets\nNext, we describe the details of the Synthetic-Hijack and Synthetic-\nNew datasets, which we utilize in section 6.2. These datasets are\nvariants of the real-world email communication dataset: Email-\nEU [21]. Nodes indicate users, and an edge (𝑣𝑖,𝑣𝑗,𝑡)indicates an\nemail between users 𝑣𝑖and𝑣𝑗at time𝑡. Since the dataset does not\nhave ground-truth anomalous interactions, we inject anomalies\ndiscussed in Section 5.1 ( T1,T2, and T3). To this end, we first\nchoose the time interval where interactions have actively occurred\n(spec., interactions occur within (4.06×107,4.54×107)timestamp)\nsince our method and baselines can easily detect anomalies that are\ninjected in the later timestamp than 4.54×107. Then, we set the\ntimestamp region where the last 10%(in chronological order) in-\nteractions occur as an evaluation region. After, we select candidate\naccounts to perform anomalous actions:\n•Synthetic-Hijack: Randomly select 10 nodes ( ≈1%of the nor-\nmal nodes) from nodes that are normal before the final 10% of\nthe dataset and do not appear in the evaluation region.\n•Synthetic-New: Make 10 new nodes ( ≈1%of the normal nodes)\nthat have never appeared before the evaluation region.\nSubsequently, we inject anomalies equivalent to approximately 1%\nof the total normal interactions into the evaluation region (see the\nnext paragraph for details). Each of these anomalous actions is\nrepresented as temporal edge (𝑣𝑘,𝑣𝑙,𝑡𝑚), where at time 𝑡𝑚, the\nanomalous source node 𝑣𝑘from the selected candidates sends a\nspam email to some normal node 𝑣𝑙. In this case, the dynamic label\nof the node 𝑣𝑘at time𝑡𝑚is anomalous.\nWe further elaborate on how we make each anomalous edge. We\nconsider the characteristics of spammers. We assume that spam-\nmers tend to target an unspecified majority with multiple spam\nemails in a short time interval. Based on this assumption, (1) we\nsample a timestamp 𝑡in the evaluation region uniformly at random,\n(2) pick one anomalous node from the candidate pool, regarding\nit as the source node, (3) randomly choose 10 normal nodes as\ndestinations, and (4) make 10 edges by joining the selected source\nnode with each selected destination nodes. (5) Lastly, we assign\neach edge a timestamp 𝑡±𝛼, where𝛼is sampled uniformly at\nrandom from[0,300]. This process ((1) - (5)) is repeated until we\nhave approximately 1% of anomalies relative to the total normal\ninteractions for the Synthetic-Hijack and Synthetic-New.\n4For the sake of consistency with other datasets, the directions are reversed in\nthe Bitcoin datasets, enabling the scoring and evaluation to be performed for source\nnodes.\n10Table 4: Statistics of datasets used in our experiments. The count of anomalies refers to the number of edges where the dynamic\nstate of the actor node is abnormal, and the ratio represents the proportion of these abnormal edges in relation to the total\nnumber of edges.\nWikipedia Reddit Bitcoin-alpha Bitcoin-OTC Synthetic-Hijack Synthetic-New\n# Nodes 9,227 10,984 3,783 5,881 986 996\n# Edges 157,474 672,447 24,186 35,592 333,200 333,200\n# Features 172 172 0 0 0 0\n# anomalies 217 366 1,520 4,344 3,290 3,290\nanomalies ratio 0.14% 0.05% 6.28% 12.20% 0.99% 0.99%\nanomaly type post ban edit ban unreliable user unreliable user spammer spammer\nTable 5: Hyperparameter settings for all baseline methods of main experiments and SLADE on each dataset.\nMethod Wikipedia Reddit Bitcoin-alpha Bitcoin-OTC\nSedanSpot\n(sample size, # random walkers, restart probability)(5000,200,0.9) ( 20000,100,0.9) ( 20000,100,0.9) ( 5000,200,0.5)\nMIDAS\n(number of hash functions, CMS size, decay factor)(3,1024,0.1) ( 3,1024,0.5) ( 4,256,0.9) ( 2,256,0.9)\nF-FADE\n(batch size, memory size, embedding size)(100,100,100) ( 300,200,200) ( 100,400,100) ( 100,100,100)\nAnoedge-l\n(edge threshold, bucket size, decay factor)(50,128,0.5) ( 50,64,0.1) ( 50,128,0.9) ( 50,128,0.5)\nJODIE\n(pretraining batch size, batch size, node degree)(300,300,20) ( 200,100,10) ( 200,100,10) ( 200,100,10)\nDyrep\n(pretraining batch size, batch size, node degree)(200,200,10) ( 200,100,20) ( 200,100,10) ( 100,300,20)\nTGAT\n(pretraining batch size, batch size, node degree)(200,100,20) ( 200,100,20) ( 200,100,20) ( 300,300,10)\nTGN\n(pretraining batch size, batch size, node degree)(200,100,20) ( 200,100,10) ( 200,100,10) ( 200,100,10)\nSAD\n(batch size, anomaly alpha, supervised alpha)(100,0.1,0.01) ( 256,0.1,0.0005) ( 300,0.001,0.001) ( 200,0.01,0.1)\nSLADE\n(batch size,𝜔𝑔𝑠,𝜔𝑔𝑑)(100,0.1,0.1) ( 100,0.1,0.1) ( 100,0.1,0.1) ( 100,0.1,0.1)\nSLADE -HP\n(batch size,𝜔𝑔𝑠,𝜔𝑔𝑑)(300,10,10) ( 100,0.1,1) ( 300,1,10) ( 300,10,1)\nB APPENDIX: BASELINE METHOD DETAILS\nAmong the four experiments mentioned earlier, the last type anal-\nysis experiment utilizes only unsupervised baselines. we provide\nindividual baselines for the main experiments (RQ1, RQ2, RQ3) and\nthe type analysis experiment (RQ4).\nB.1 Details of Baselines in Main Experiments\nWe compare the performances of our proposed method and the nine\nbaseline methods in detecting dynamic anomalies in edge streams.\nThe used baseline methods can be categorized as below:\n•Rule-based: SedanSpot [ 12], MIDAS [ 4], F-FADE [ 6], and Anoedge-\nl [5]\n•Neural network-based: JODIE [ 20], Dyrep [ 33], TGAT [ 38],\nTGN [28], and SAD [31]\nFor rule-based approaches, although the training phase is not\nnecessary, some level of hyperparameter tuning can greatly in-\ncrease the performance of them in our task. For a fair comparison,\nfor each dataset, the optimal hyperparameter setting of each rule-\nbased method is determined using the validation set. The selected\nhyperparameter setting is used to evaluate the corresponding modelin the test set. There are several details regarding some of the used\nbaseline methods:\n•Anoedge-l: Bhatia et al . [5] propose several versions of\nAnoedge. Among them, we adopt Anoedge-l as our baseline\nmethod since it exhibits the best performance among them\nin our task.\n•MIDAS-R: Bhatia et al . [4] propose several versions of MI-\nDAS. Among them, we adopt MIDAS-R as our baseline\nmethod since it outperforms the others in our preliminary\nstudy.\n•F-FADE: This method processes a stream every minute,\nwhile interactions in the used datasets occur at a much dense\ntime interval (i.e., tens of interactions on original datasets\noccur within a minute). Due to this characteristic, F-FADE\nalways underperforms all other used methods, specifically,\ncannot capture any anomalies. For F-FADE, we modify each\ndataset by adjusting the time units to large intervals.\nIn neural network-based methods, except for our proposed method,\nafter selecting the hyperparameter settings based on its validation\nset, there are two strategies for utilizing a given dataset (training\n11Table 6: Hyperparameter settings for rule-based baseline\nmethods and SLADE in type analysis.\nMethod Synthetic-(∗)\nSedanSpot\n(sample size, # random walkers, restart probability)(10000,50,0.15)\nMIDAS\n(number of hash functions, CMS size, decay factor)(2,1024,0.5)\nF-FADE\n(batch size, memory size, embedding size)(100,100,100)\nAnoedge-l\n(edge threshold, bucket size, decay factor)(50,32,0.9)\nSLADE\n(batch size,𝜔𝑔𝑠,𝜔𝑔𝑑)(100,0.1,0.1)\nset and validation set) for training the final representation model\nwith the selected hyperparameter settings:\n•S1. Using Both: This indicates using both training and validation\nsets to train the final representation model with the selected\nhyperparameter settings. In this case, the model may utilize more\ninformation during training, while the model gets vulnerable to\nthe overfitting issue.\n•S2. Training Set Only: This indicates using only the training set\nto train the final representation model with the selected hyper-\nparameter settings. In this case, the model utilizes the validation\nset only for early stopping, but we do not fully utilize the given\ndataset during training.\nFor each model, except for SAD (since the method inherently uti-\nlizes a validation dataset during model training), we utilize both\nstrategies and report the higher test set evaluation performance\nbetween them.\nB.2 Details of Baselines in Type Analysis\nExperiments\nWe compare the performances of our proposed method and four\nunsupervised baseline methods in type analysis. The unsupervised\nbaseline methods are as follows: SedanSpot [ 12], MIDAS [ 4], F-\nFADE [ 6], and Anoedge-l [ 5]. In the Synthetic-hijack and Synthetic-\nNew datasets, anomalies exist only in the test set, making it impos-\nsible to conduct a validation. Thus, for each model, we utilize the\nhyperparameter combinations the respective paper has reported.\nIn cases where baseline settings in the previous work vary across\ndatasets, we use the combination that has shown good performance\nin our main experiments (Section 6.2).\nC APPENDIX: IMPLEMENTATION DETAILS\nIn this section, we introduce some details about our implementation,\nincluding the experiment environment and hyperparameters of the\nused models.\nC.1 Experiments Environment\nWe conduct all experiments with NVIDIA RTX 3090 Ti GPUs (24GB\nVRAM), 256GB of RAM, and two Intel Xeon Silver 4210R Processors.C.2 Details of Baselines in Main Experiments\nAs mentioned in Section 6.1, we tune most hyperparameters of\neach baseline method by conducting a full grid search on the vali-\ndation set of each dataset. For other hyperparameters, we strictly\nfollow the setting provided in their official code, because it leads\nto better results than grid searches. The selected hyperparameter\ncombination of each model is reported in Table 5.\nRule-based Methods. Hyperparameter search space of each rule-\nbased method is as below:\n•Sedanspot : sample size among (5000,10000,20000), number of\nrandom walkers among (100,200,300), and restart probability\namong(0.1,0.5,0.9)\n•MIDAS-R : number of hash functions among (2,3,4), CMS size\namong(256,512,1024), and decay factor among (0.1,0.5,0.9)\n•F-FADE : batch size among (100,200,300), limited memory size\namong(100,200,400), and embedding size among (100,200,300)\n•Anoedge-l : edge threshold among (25,50,100), bucket size among\n(64,128,256), and restart probability among (0.1,0.5,0.9)\nNeural Network-based Methods. We train all models with the\nAdam optimizer [ 17]. The hyperparameter search space of each\nneural network-based method is as below:\n•JODIE : self-supervised batch size among (100, 200, 300), super-\nvised batch size among (100,200,300), and node degree between\n(10,20)\n•Dyrep : self-supervised batch size among (100, 200, 300), super-\nvised batch size among (100,200,300), and node degree between\n(10,20)\n•TGAT : self-supervised batch size among (100, 200, 300), super-\nvised batch size among (100,200,300), and node degree between\n(10,20)\n•TGN : self-supervised batch size among (100, 200, 300), super-\nvised batch size among (100,200,300), and node degree between\n(10,20)\n•SAD : batch size among (100,200,300), anomaly alpha among\n(0.1,0.01,0.001)for deviation loss, and supervised alpha among\n(0.1,0.01,0.001)for supervised loss\nC.3 Details of Baseline Methods in Type\nAnalysis Experiments\nAs mentioned in B.2, We use hyperparameter settings from pre-\nvious studies or combinations for good performance on our main\nexperiments (Section 6.2). The selected hyperparameter setting of\neach model is reported in Table 6.\nC.4 Detailed Hyperparameters of SLADE and\nSLADE -HP\nWe train both SLADE andSLADE -HP using the Adam optimizer,\nwith a learning rate of 3×10−6and a weight decay of 10−4. We\nfix the dropout probability and the number of attention heads in\nTGAT to 0.1 and 2, respectively. In addition, we fix the scaling scalar\nof temporal encoding (Eq (2) in the main paper) to 𝛼=𝛽=10,\nthe weight of each loss in L𝑐(Eq (7) in the main paper) to 𝜔𝑐𝑠=\n𝜔𝑐𝑑=1, and the dimension of a time encoding to 256, which is\nequivalent to the memory dimension. As mentioned in Section 6.1 of\nthe main paper, we tune several hyperparameters of SLADE -HP on\n12Table 7: AP (in %) in the detection of dynamic anomaly nodes.\nThe first method randomly assigns anomaly scores from 0 to\n1, and the next four methods are rule-based models, and the\nothers are based on representation learning. For each dataset,\nthe best and the second-best performances are highlighted\nin boldface and underlined, respectively.\nMethod Wikipedia Reddit Bitcoin-alpha Bitcoin-OTC\nRandom Guess 0.22±0.05 0.09±0.01 8.96±0.53 6.37±0.28\nSedanSpot [12] 0.66±0.06 0.09±0.00 12.99±0.06 16.14±0.01\nMIDAS [4] 0.41±0.02 0.12±0.00 12.99±0.06 16.14±0.01\nF-FADE [6] 0.18±0.00 0.09±0.00 6.34±0.00 8.80±0.00\nAnoedge-l [5] 0.18±0.01 0.09±0.00 12.52±0.86 17.03±0.11\nJODIE [20] 1.40±0.02 0.25±0.05 14.31±0.40 15.79±0.11\nDyrep [33] 1.53±0.02 0.14±0.01 8.41±0.58 16.14±1.74\nTGAT [38] 1.48±0.14 0.27±0.12 12.19±0.13 18.81±0.63\nTGN [28] 1.30±0.04 0.19±0.01 9.65±0.40 19.87±1.75\nSAD [31] 2.77±0.91 0.28±0.06 12.55±0.58 14.33±0.88\nSLADE 1.24±0.14 0.23±0.02 15.40±0.19 20.21±0.28\nSLADE -HP 1.56±0.14 0.30±0.05 14.86±0.08 20.46±0.06\nTable 8: AP (in %) in the detection of dynamic anomaly nodes\nin the two synthetic datasets. In both datasets, SLADE per-\nforms best compared to unsupervised methods in AP.\nMethod Synthetic-Hijack Synthetic-New\nRandom Guess 6.61±0.07 6.63±0.01\nSedanSpot [12] 13.95±1.53 15.17±0.13\nMIDAS [4] 17.96±2.56 18.29±3.18\nF-FADE [6] 6.57±0.00 6.58±0.00\nAnoedge-l [5] 8.20±0.47 8.40±0.63\nSLADE 69.69±7.33 74.46±6.16\nthe validation set of each dataset, as we tune the hyperparameters\nof all baselines. The search space is as follows:\n•SLADE -HP: batch size among(100,200,300), the weight in mem-\nory generation loss L𝑔(Eq (8) in the main paper) for a source\nnode (𝜔𝑔𝑐) among(0.1,1,10), and for a destination node ( 𝜔𝑔𝑑)\namong(0.1,1,10).\nOur final hyperparameter settings for SLADE andSLADE -HP are\nalso reported in Table 5.\nD APPENDIX: ADDITIONAL EXPERIMENTS\nD.1 Performance Evaluation using Average\nPrecision\nIn this subsection, we evaluate each model with the Average Preci-\nsion (AP) metric regarding RQ1 and RQ4. Note that AP has different\ncharacteristics from that of the Area Under the ROC Curve (AUC).\nWhile AUC focuses on the overall distinguishability between two\ndifferent classes, AP focuses on how well a model assigns higher\nscores for positive samples than for negative samples in terms of\nprecision and recall.We utilize the same hyperparameter settings from Section C.2\nand C.3, and include a random guess model that randomly assigns\nanomaly scores between 0 and 1 for comparison. As shown in\nTable 7, SLADE -HP performs the best or second best in all real-\nworld graph datasets, demonstrating the effectiveness of SLADE -\nHP in our task regarding AP also. Furthermore, as shown in Table 8,\nSLADE significantly outperforms other methods in both synthetic\ndatasets.\nD.2 Variants in Model Architecture\nThere are two major neural network components in SLADE : (1)\nGRU [8], which updates the memory of each node, and (2) TGAT [38],\nwhich generates the memory of a target node. To demonstrate the\neffectiveness of each module in dynamic anomaly detection in edge\nstream, we compare the performances of SLADE and its several\nvariants where the memory updater and the memory generator are\nreplaced by other neural network architectures.\nMemory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):Memory Updater Variant (Instead of GRU):\n•SLADE -MLP : In this variant, we use MLP instead of the GRU\nmodule to update the memory of each node. Specifically, the\nmemory update procedure (Eq (3) in the main paper) is replaced\nby the one below:\n𝒔𝑖=MLP([𝒎𝑖||𝒔𝑖]). (11)\nNote that in this variant, 𝒎𝑖and 𝒔𝑖are treated as if they are\nindependent, and thus it cannot capture the temporal dependency\nbetween them.\nMemory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):Memory Generator Variants (Instead of TGAT):\n•SLADE -GAT : This variant calculates attention scores based only\non the currently given memory information, as follows:\nˆ𝒔𝑖=MultiHeadAttention (𝒒,K,V),𝒒=𝒔𝑖, (12)\nK=V=\u0002\n𝒔𝑛1,...,𝒔𝑛𝑘\u0003\n,\nwhere{𝑛1,...,𝑛𝑘}denote the indices of the neighbors of the tar-\nget node𝑣𝑖. Note that this variant cannot incorporate temporal\ninformation in its attention mechanism.\n•SLADE -SUM : In this variant, we use a modified temporal graph\nsum [28] for message passing, as follows:\nˆ𝒔𝑖=W2([¯𝒔𝑖||𝜙(𝑡−𝑡)]),\n¯𝒔𝑖=ReLU(𝑘∑︁\n𝑗=1W1(𝒔𝑛𝑗||𝜙(𝑡−𝑡′\n𝑛𝑗))), (13)\nW1,W2∈R𝑑𝑠×2𝑑𝑠,\nwhere{𝑛1,...,𝑛𝑘}denote the indices of the neighbors of the tar-\nget node𝑣𝑖,{𝑡′𝑛1,...,𝑡′𝑛𝑘}denote the times of the most recent\ninteractions with them, and the weights of each linear layer are\ndenoted as W1andW2, respectively. Note that this variant does\nnot use any attention mechanism, i.e., all neighbors have the\nsame importance.\nExperimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results:Experimental Results: We compare the performances of SLADE\nand the introduced three variants. As shown in Table 9, SLADE\nachieves the best performance in three out of four datasets. This\nresult demonstrates the necessity of GRU and TGAT, i.e., the impor-\ntance of modeling temporal dependency in memory updating and\n13Table 9: AUC (in %) in the detection of dynamic anomaly\nnodes. The first model is a memory updater variant, and\nthe next two models are memory generator variants. For\neach dataset, the best and the second-best performances are\nhighlighted in boldface and underlined, respectively. Across\nall datasets, SLADE consistently demonstrated the best or\nsecond-best performance compared to the other variants.\nMethod Wikipedia Reddit Bitcoin-alpha Bitcoin-OTC\nSLADE -MLP 85.97±1.17 55.35±3.34 74.68±1.35 75.42±0.65\nSLADE -GAT 86.86±0.44 67.15±1.85 75.67±0.57 74.24±0.25\nSLADE -SUM 88.43±0.44 70.89±0.53 75.84±0.26 75.42±0.15\nSLADE 87.75±0.68 72.19±0.60 76.32±0.28 75.80±0.19\nFigure 5: The left figure shows the increase in the running\ntime of SLADE with respect to the number of edges in the\nReddit dataset. The right figure shows the training time\nand AUC score (with standard deviations) in the Wikipedia\ndataset of the competing learning-based methods.\ntemporal attention in memory generation. Hyperparameter setting\nofSLADE variants is fixed as that of the original SLADE . Specif-\nically, SLADE -MLP and SLADE -GAT consistently underperform\nSLADE andSLADE -SUM, demonstrating the importance of utiliz-\ning temporal information and temporal dependency in detecting\ndynamic anomalies. Furthermore, while SLADE -SUM outperformsSLADE in the Wikipedia dataset, its performance gain is marginal\n(within the standard deviation).\nD.3 Model Training Speed\nIn this subsection, we analyze the training time of SLADE .\nWe first empirically demonstrate the training time of SLADE on\nthe Reddit dataset with varying edge counts, where the detailed\nsetting is the same as that described in Section 6.2 of the main\npaper. As shown in the left plot of Figure 5, the training runtime of\nSLADE is almost linear in the number of edges. Since the number\nof edges is much greater than that of nodes ( 67×), the overall scale\nis dominated by the number of edges.\nFurthermore, we compare the empirical training time of SLADE\nagainst that of other neural network-based methods, which require\nthe training procedure. As shown in the right plot of Figure 5,\nin terms of the empirical training speed, SLADE is competitive\ncompared to other methods. Specifically, among six neural network-\nbased dynamic anomaly detection methods, SLADE exhibits the\nsecond-fastest training time, showing the best anomaly detection\nperformance.\nD.4 Type Analysis of Baselines\nWe conduct an additional analysis regarding two baseline meth-\nods (MIDAS and SedanSpot), which ranked second- and third-best\nposition in our synthetic data experiments ( RQ4 ). First, as shown\nin the first row of Figure 6 (a) and (b), we verify that the score\ndistribution of the normal class and that of the consistent anomaly\nclass ( T3) largely overlaps in both models. Moreover, as shown in\nthe second row of Figure 6(a) and (b), MIDAS and SedanSpot assign\nrelatively high scores when anomalies of T1andT2occur, but not\nas distinctly as SLADE . These two results indicate that previous\nunsupervised anomaly detection baselines fail to detect anomalies\nif anomalies do not align with the targeted anomaly pattern, leading\nto high false negatives. These results emphasize the necessity of\nlearning-based unsupervised anomaly detection models ( SLADE ),\nwhich autonomously learn normal patterns, and are capable of\ndetecting a wide range of anomalies by finding cases that deviate\nfrom the learned normal patterns.\n14(a) Type Analysis of MIDAS\n (b) Type Analysis of SedanSpot\nFigure 6: For both (a) and (b), the above figures show the distribution of anomaly scores predicted by each baseline for each\nclass in the two synthetic datasets (utilizing kernel density estimation). The below figures show the anomaly scores predicted\nby each baseline over time for each class in both datasets. We display the anomaly scores of MIDAS on a log scale.\n15" }, { "title": "2402.11964v1.Tagged_particle_behavior_in_a_harmonic_chain_of_direction_reversing_active_Brownian_particles.pdf", "content": "Tagged particle behavior in a harmonic chain of\ndirection reversing active Brownian particles\nShashank Prakash\nRaman Research Institute, Bengaluru 560080, India\nEmail: shashankp@rrimail.rri.res.in\nUrna Basu\nS. N. Bose National Centre for Basic Sciences, Kolkata 700106, India\nEmail: urna@bose.res.in\nSanjib Sabhapandit\nRaman Research Institute, Bengaluru 560080, India\nEmail: sanjib@rri.res.in\nAbstract. We study the tagged particle dynamics in a harmonic chain of direction\nreversing active Brownian particles, with spring constant k, rotation diffusion\ncoefficient DR, and directional reversal rate γ. We exactly compute the tagged particle\nposition variance for quenched and annealed initial orientations of the particles. For\nwell-separated time scales, k−1, D−1\nRandγ−1, the strength of spring constant krelative\ntoDRandγgives rise to different coupling limits and for each coupling limit there\nare short, intermediate, and long time regimes. In the thermodynamic limit, we show\nthat, to the leading order, the tagged particle variance exhibits an algebraic growth tν,\nwhere the value of the exponent νdepends on the specific regime. For a quenched initial\norientation, the exponent νcrosses over from 3 to 1 /2, via intermediate values 5 /2 or\n1, depending on the specific coupling limits. On the other hand, for the annealed\ninitial orientation, νcrosses over from 2 to 1 /2 via an intermediate value 3 /2 or 1\nfor strong coupling limit and weak coupling limit respectively. An additional time\nscale tN=N2/kemerges for a system with a finite number of oscillators N. We\nshow that the behavior of the tagged particle variance across tNcan be expressed in\nterms of a crossover scaling function, which we find exactly. Finally, we characterize\nthe stationary state behavior of the separation between two consecutive particles by\ncalculating the corresponding spatio-temporal correlation function.\nContents\n1 Introduction 3\n2 Model and Results 4arXiv:2402.11964v1 [cond-mat.stat-mech] 19 Feb 20242\n3 Variance of the position of a tagged particle 6\n4 Quenched initial orientation 9\n4.1 Short-time regime ( t≪τ1) (R-I) . . . . . . . . . . . . . . . . . . . . . . . 12\n4.2 Long-time regime ( t≫τ3) (R-IV) . . . . . . . . . . . . . . . . . . . . . . 12\n4.3 Strong-coupling limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14\n4.4 Weak coupling limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\n4.5 Moderate-coupling limit . . . . . . . . . . . . . . . . . . . . . . . . . . . 19\n5 Annealed initial orientation 21\n5.1 Short-time regime ( t≪τ1) (R-I) . . . . . . . . . . . . . . . . . . . . . . . 22\n5.2 Long-time regime ( t≫τ2) (R-IV) . . . . . . . . . . . . . . . . . . . . . . 23\n5.3 Intermediate regime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23\n5.3.1 Strong-coupling limit [ k≫(DR,2γ)] (R-II) . . . . . . . . . . . . . 23\n5.3.2 Weak-coupling limit [ k≪(DR,2γ)] (R-III) . . . . . . . . . . . . . 24\n6 Finite-size effects 25\n7 Statistics of the separations 27\n8 Conclusions 35\nAppendix A Computation of effective noise correlation 37\nAppendix B Computation of Cn(β) 38\nAppendix C Some useful integrals and sums 403\n1. Introduction\nA system of interacting particles undergoing Newtonian dynamics results in a diffusive\nmotion for a tagged particle with the mean-squared displacement growing linearly with\ntime [1, 2, 3, 4, 5]. The tagged particle dynamics is still diffusive for a collection\nof interacting diffusive particles, in dimensions d≥2, albeit with a lower diffusivity.\nHowever, in one-dimensional interacting diffusive systems, the tagged particle dynamics\nshow a subdiffusive behavior. Systems with symmetric dynamics generically show a√\nt\ngrowth for mean-squared displacement, which, for example, has been observed for hard-\nparticle diffusive gases [6, 7, 8, 9, 10], symmetric simple exclusion process [11, 12, 13, 14,\n15], random average process [16, 17], and systems with harmonic interactions [18, 19],\nto name a few. On the other hand, systems with asymmetric dynamics give rise to\nsubdiffusive behavior with different exponents [20, 21, 22, 23, 24, 25]. This classical\nproblem of tagged particle motion in one-dimensional interacting systems is still of much\ninterest and various aspects of it are still being investigated. Examples include the study\nof typical and large deviations of the displacement fluctuations [26, 27, 28, 29, 30, 31, 32],\nduality relations [33], effects of pinning [34], disorder [35], and memory [36, 37], and\nentropy production [38].\nThough much has been known about the passive systems, the study of tagged\nparticle dynamics in an interacting system of active particles is still nascent. Active\nparticles self-propel by extracting energy from the surroundings at the individual level,\ngenerating a directed motion with a typical persistence time [39, 40, 41, 42, 43, 44].\nTheoretical attempts to characterize active motion often use minimal statistical models,\nwhere the position of an active particle evolves via an overdamped Langevin equation\n˙r(t) =v(t). Different stochastic dynamics of the self-propulsion velocity v(t) leads to\ndifferent models for active particles. Run-and-tumble particle (RTP) [45, 46, 47], active\nOrnstein-Uhlenbeck process (AOUP) [48], and active Brownian particle (ABP) [49, 50]\nare some of the basic models for which the single particle dynamics have been extensively\nstudied [51, 52, 53, 54, 55, 56, 57]. While at times much larger than the persistence\ntime these models generically show a diffusive behavior, the signatures of activity are\nmanifest at short-times, where the dynamics is strongly non-diffusive. This non-diffusive\nbehavior is expected to affect the dynamics of a tagged particle in interacting active\nsystems. Indeed, the variance of the position of a tagged particle, in a chain of such\nactive particles, shows a crossover [58, 59, 60] from a superdiffusive behavior, tµwith\nµ >1/2, to the subdiffusive behavior√\nt, typical of passive systems.\nRecently, it has been found that an active particle dynamics, namely, direction\nreversing active Brownian particle (DRABP), where the self-propulsion velocity v(t) has\nmultiple time-scales, display several novel features, in the intermediate time regimes, due\nto the interplay between these time-scales [61, 62]. It is natural to ask, how the presence\nof the additional time-scales changes the tagged particle behavior in an interacting\nsystem of such particles. In this paper, we comprehensively characterize the tagged\nparticle dynamics in a harmonic chain of DRABPs with periodic boundary conditions,4\nby studying the position-variance for quenched and annealed initial orientations. We find\nthat the presence of an additional time-scale leads to the emergence of new dynamical\nregimes with distinct super-diffusive growth of the variance [see Tables. 1-2]. We\nalso study the effect of the finite size of the chain on the variance and compute the\nscaling function that describes the crossover across the finite-size time scale. While\nthe fluctuations of the tagged particle grow with time, the separations between the\nadjacent tagged particles reach a stationary state, which we characterize analytically by\ncomputing the spatio-temporal correlation among the separation variables.\nThe paper is organized as follows: In section 2, we define the model and present\na summary of the main results. The basic setup of the calculation is presented in\nSec. 3. Sections 4, and 5 are devoted to the detailed derivation of the tagged particle\nvariance for quenched and annealed initial orientations, respectively. The main results\nare summarized in Tables. 1-2 for the convenience of the reader. We explore the finite-\nsize effects in Sec. 6, and finally in Sec. 7 we investigate the statistics of the separations\nbetween two consecutive particles.\n2. Model and Results\nThe position vector ⃗ r(t) of a single direction reversing active Brownian particle\n(DRABP) evolves via the Langevin equation,\n˙r(t) =v0σ(t) ˆn(t), (1)\nwhere v0denotes the self-propulsion speed of the particle and σ(t) is a dichotomous noise\nthat alternates between ±1 with a constant rate γ. The orientation vector ˆ n(t) undergoes\na Brownian motion on the unit sphere. In two dimensions, ˆ n(t) = (cos θ(t),sinθ(t)),\nwhere the orientation angle θ(t) undergoes a Brownian motion with diffusion constant\nDR. It has been shown that the position fluctuations of a DRABP shows distinctly\ndifferent behavior in different dynamical regimes characterized by the two active time-\nscales D−1\nRandγ−1[61]. From a strongly non-diffusive and anisotropic behavior at\nearly-times t≪(γ−1, D−1\nR), the DRABP crosses over to an effective diffusive behavior\nat late-times t≫(γ−1, D−1\nR). In fact, in the limit v0→ ∞ and ( DR+ 2γ)→ ∞ , while\nkeeping\nDeff=v2\n0\n2(DR+ 2γ), (2)\nfixed (which corresponds to the late-time regime), the DRABP typically behaves\nlike a passive Brownian particle, with a Gaussian position distribution,\nP(⃗ r, t) =1\n4πDefftexp\u0012\n−|⃗ r|2\n4Defft\u0013\n. (3)\nMost interestingly, for γ≫DR, a non-trivial scaling distribution emerges in the\nintermediate regime γ−1≪t≪D−1\nR.5\nIn this work, we consider a periodic chain of Nharmonically coupled direction\nreversing active Brownian particles, where each particle is uniquely identified by an\nindex α= 0,1,2, . . . , N −1. In particular, we focus on the fluctuations of x-components\nof positions {xα(t)}. The potential energy is given by,\nU(x0, x1, . . . x N−1) =k\n2N−1X\nα=0(xα−xα+1)2, (4)\nwith the periodic boundary condition xN=x0. The presence of the harmonic coupling\nintroduces another time-scale k−1, in addition to the two active time-scales D−1\nRand\nγ−1. The position of the α-th particle evolves via the Langevin equation,\n˙xα(t) =k[xα+1(t) +xα−1(t)−2xα(t)] +ξα(t), (5)\nwhere,\nξα(t) =v0σα(t) cosθα(t), (6)\ndenotes the active noise. The dichotomous noises {σα(t)}independently alternate\nbetween ±1 with a constant rate γ, and the orientations {θα(t)}undergo independent\nBrownian motions,\n˙θα(t) =p\n2DRηα(t), (7)\nwhere {ηα(t)}denote independent Gaussian white noises with ⟨ηα(t)⟩= 0, and\n⟨ηα(t)ηβ(t′)⟩=δα,βδ(t−t′). We consider the initial condition xα(0) = 0 and σα(0) = 1\nfor all αand initial orientations {θα(0)}to be either quenched or annealed. For the\nquenched case, we set the initial orientations of all the particles to a specific value θ0,\ni.e.,{θα(0) = θ0}. On the other hand, the initial orientation of each particle is drawn\nindependently from a uniform distribution in [0 ,2π] for the annealed case.\nThe objective of this work is to characterize the fluctuations of the position xα(t)\nof a tagged particle through its mean and variance. The presence of the three distinct\ntime scales leads to a set of different dynamical regimes, each characterized by a distinct\nbehavior of the position variance, ranging from subdiffusive to superdiffusive. These\nleading order dynamical behaviors, in each regime, also depend on the initial orientations\nof the particles. Tables 1 and 2 present a summary of the distinct dynamical behaviors,\nin thermodynamic limit, i.e., N→ ∞ , for the quenched and annealed initial orientations,\nrespectively. In particular, we find that, at short-time regime, i.e., at times much smaller\nthan all the time scales of the system, ⟨x2\nα(t)⟩c∼t3, reminiscent of the short time regime\nof the independent DRABP. On the other hand, at late times, i.e., at a time much larger\nthan all the time scales, ⟨x2\nα(t)⟩c∼√\nt, similar to the behavior of a tagged particle in\na harmonic chain of Brownian particles [18]. Furthermore, we study the effect of finite-\nsize on the position variance. An additional time scale, tN=N2/k, appears due to\nthe finiteness of the system, and we observe a crossover in variance from subdiffusive\nbehavior for t≪tNto diffusive behavior for t≫tN. This crossover is captured by6\na scaling behavior of the variance ⟨x2\nα(t)⟩c=Deffp\nt/k f (t/tN), where the crossover\nfunction is given by (74) exactly.\nWe also investigate the statistics of the separations between the adjacent particles\nyα(t) =xα+1(t)−xα(t), which eventually reaches a stationary state. In the passive\nlimit, i.e., when DR→ ∞ , and v0→ ∞ , keeping Defffixed, the stationary state of {yα}\nis given by the Boltzmann distribution,\nP({yα})∝exp\"\n−k\n2DeffN−1X\nα=0y2\nα#\n, (8)\nfor a thermodynamically large system. For finite DR, i.e., in the active regime,\nthe system reaches a nonequilibrium steady state which is no longer given by the\nabove Boltzmann distribution. We characterize the signatures of activity in this\nstationary state by computing the spatio-temporal two-point correlation, C(β, τ) =\nlimt→∞⟨y0(t)yβ(t+τ)⟩.We find that, in the thermodynamic limit, N→ ∞\nC(β, τ) =∞X\nn=0˜Cn(β)τn\nn!, (9)\nwhere the coefficients ˜Cn(β) can be computed explicitly [see Sec. 7]. Moreover, in the\nlarge activity limit, the equal-time spatial correlation decays exponentially,\nC(β,0) =Deff\nke−|β|/√µ\n2√µ,with µ=k\nDR+ 2γ. (10)\nOn the other hand, for large τ≫(DR+ 2γ)−1, we have,\nC(β, τ) =Deff\n2k√\nπke−β2/4kτ\n√τ. (11)\nIn the following sections, we provide detailed derivations of the results mentioned\nabove.\n3. Variance of the position of a tagged particle\nIn this section, we set up the formalism to compute the variance of the position xαof a\ngiven tagged particle with a fixed α. To compute the variance,\n\nx2\nα(t)\u000b\nc=\nx2\nα(t)\u000b\n−\nxα(t)\u000b2, (12)\nit is convenient to go to the normal modes of the harmonic chain. The decoupled normal\nmodes satisfy a set of Nfirst-order differential equations,\n˙˜xs(t) =−as˜xs(t) +˜ξs(t),with as= 4ksin2\u0010πs\nN\u0011\n, (13)7\nt≪τ1≪τ2≪τ3 τ1≪t≪τ2≪τ3 τ1≪τ2≪t≪τ3 τ1≪τ2≪τ3≪t\nShort-time regime Early-intermediate regime Late-intermediate regime Long-time regime\nτ1=k−1\nτ2=D−1\nR\nτ3=γ−1Strong Couplingτ1=k−1\nτ2=γ−1\nτ3=D−1\nRR-II\nt5/2\n[see (41)]R-III√\nt\n[see (47)]\nτ1=D−1\nR\nτ2=γ−1\nτ3=k−1Weak Couplingτ1=γ−1\nτ2=D−1\nR\nτ3=k−1R-VI\nt\n[see (53)]R-V\nt\n[see (52)]\nτ1=D−1\nR\nτ2=k−1\nτ3=γ−1R-VII\nt\n[see (52)]Moderate Couplingτ1=γ−1\nτ2=k−1\nτ3=D−1\nRR-I\nt3\n[see (33)]\nR-VIII\nt\n[see (53)]R-IX√\nt\n[see (47)]R-IV\n√\nt\n[see (37)]\nTable 1: Tabular representation of the leading order behavior of the variance in the\ndifferent dynamical regimes starting with quenched initial orientation ( θ0̸=π/2). The\nnine distinct regimes are indicated by R-I, R-II, . . . , R-IX. The first column indicates\nthe relative time-scales. The second column defines the three different time scales and\nthe topmost row indicates the specific regime considered. The equations describing the\ntheoretical predictions of the variance in the corresponding regimes are also mentioned.\nwhere {˜xs(t);s= 0,1, . . . N −1}denote the discrete Fourier transformation (DFT) of\n{xα(t)}and{˜ξs(t)}denotes the DFT of the active noise (6). We note that any arbitrary\n{fα(t)}and its DFT {˜fs(t)}with respect to α, are related by,\n˜fs(t) =1\nNN−1X\nα=0exp\u0012\n−i2πsα\nN\u0013\nfα(t) and fα(t) =N−1X\ns=0exp\u0012i2πsα\nN\u0013\n˜fs(t). (14)\nThe set of equations (13) can be formally solved to obtain,\n˜xs(t) = ˜xs(0)e−ast+e−astZt\n0east1˜ξs(t1)dt1, (15)\nwhere ˜ xs(0) denotes the DFT of the initial position profile. For annealed initial\norientation, cos θα(0) has a symmetric distribution, resulting in\nxα(t)\u000b\n= 0, for\ninitial position {xα(0) = 0 }. On the other hand, for the quenched initial orientation,8\nτ1≪τ2 t≪τ1≪τ2 τ1≪t≪τ2 τ1≪τ2≪t\nShort-time regime Intermediate regime Long-time regime\nτ1=k−1\nτ2= (DR+ 2γ)−1Strong CouplingR-II\nt3/2\n[see (66)]\nτ1= (DR+ 2γ)−1\nτ2=k−1Weak CouplingR-I\nt2\n[see (62)]R-III\nt\n[see (67)]R-IV\n√\nt\n[see (65)]\nTable 2: Tabular representation of the leading order behavior of the variance in the\ndifferent dynamical regimes starting with annealed initial orientation. The four distinct\nregimes are indicated by R-I, R-II, R-III, and R-IV. The first column indicates the\nrelative time-scales. The second column defines the two time-scales and the topmost\nrow indicates the specific regime considered. The equations describing the theoretical\npredictions of the variance in the corresponding regimes are also mentioned.\n{θα(0) = θ0}with{xα(0) = 0 }, taking the average over (15) and inverting it back via\n(14), we get,\nxα(t)\u000b\n=v0tcosθ0e−(DR+2γ)t. (16)\nUsing (14), the variance of the tagged particle position (12) can be expressed as,\n\nx2\nα(t)\u000b\nc=N−1X\ns=0N−1X\ns′=0exp\"\ni2πα(s−s′)\nN#\n\n˜xs(t)˜x∗\ns′(t)\u000b\nc, (17)\nwhere\n˜xs(t)˜x∗\ns′(t)\u000b\nc=\n˜xs(t)˜x∗\ns′(t)\u000b\n−\n˜xs(t)\u000b\n˜x∗\ns′(t)\u000b\n, (18)\nis the correlation of the Fourier modes. Here, ˜ x∗\ns′(t) denotes the complex conjugate of\n˜xs′(t) and\n...\u000b\ndenotes the statistical average over the active noise.\nThe correlation\n˜xs(t)˜x∗\ns′(t)\u000b\nccan be expressed in terms of the correlations of the\nFourier transforms of the active noise, using Eq. (15),\n\n˜xs(t)˜x∗\ns′(t)\u000b\nc=e−(as+as′)tZt\n0dt1Zt\n0dt2east1+as′t2\n˜ξs(t1)˜ξ∗\ns′(t2)\u000b\nc. (19)\nThe noise correlation in Fourier space, in turn, could be written in terms of the\ncorrelation of the noise in real space,\n\n˜ξs(t1)˜ξ∗\ns′(t2)\u000b\nc=1\nN2N−1X\nα=0N−1X\nα′=0exp\"\n−i2πα(s−s′)\nN#\n\nξα(t1)ξα(t2)\u000b\nc. (20)9\nWe note that the active noise ξα(t) for different particles are independent and\nthe two-time correlation, G(t1, t2) =\nξα(t1)ξα(t2)\u000b\ncis independent of αfor both the\nquenched and annealed initial conditions we have considered here. In particular, for the\nquenched initial orientation [see Appendix A for the detailed calculation], we have,\nG(t1, t2) =v2\n0\n2h\ne−(DR+2γ)|t1−t2|+ cos 2 θ0e−\u0000\nDR(t1+t2+2 min[ t1,t2])+2γ|t1−t2|\u0001\n−2 cos2θ0e−(DR+2γ)(t1+t2)i\n. (21)\nOn the other hand, for the annealed initial orientation [see Appendix A for a detailed\ncalculation],\nG(t1, t2) =v2\n0\n2e−(DR+2γ)|t1−t2|. (22)\nWe can express the noise auto-correlation in the Fourier space in (20), in terms of\nG(t1, t2), yielding,\n\n˜ξs(t1)˜ξ∗\ns′(t2)\u000b\nc=G(t1, t2)\nNδs,s′. (23)\nUsing (23) in (19) we get,\n\n˜xs(t)˜x∗\ns′(t)\u000b\nc=δs,s′\nNe−2asttZ\n0dt1tZ\n0dt2eas(t1+t2)G(t1, t2). (24)\nUsing the above equation in (17), we get a simplified expression for the variance of the\nposition of the tagged particle,\n\nx2\nα(t)\u000b\nc=N−1X\ns=0\n\f\f˜xs(t)\f\f2\u000b\nc. (25)\nIn the next two sections, we explicitly compute this variance for the quenched and\nannealed initial orientations.\n4. Quenched initial orientation\nFor the quenched initial orientation {θα(0) = θ0}, using (21) and (24) in (25), we get,\n\nx2\nα(t)\u000b\nc=v2\n0\nNN−1X\ns=0\u00141\n2(DR+ 2γ) \n1−e−2ast\nas+e−(DR+2γ)te−ast−1\nDR+ 2γ+as+e−ast(e−(DR+2γ)t−e−ast)\nDR+ 2γ−as!\n+cos 2θ0\n2(DR−2γ) \ne−4DRt−e−2ast\n2DR−as+e−(DR+2γ)te−ast−e−4DRt\n3DR−2γ−as+e−ast(e−ast−e−(DR+2γ)t)\nDR+ 2γ−as!\n−cos2θ0(e−(DR+2γ)t−e−ast)2\n(DR+ 2γ−as)2\u0015\n,\n(26)10\n100101102103\nt10−1100101102103/angbracketleftx2\nα(t)/angbracketrightcDR= 0.15\nDR= 0.015\nDR= 0.001\nFigure 1: Comparison between the theoretical expression for variance in (26) (shown by\nthe solid lines) with numerical simulation for different values of DRkeeping k= 1 and\nγ= 0.1 fixed. The symbols indicate the data obtained from numerical simulations with\nN= 4 and v0= 1.\nwhere asis defined in (13). The above equation is exact, and for any finite N, the\nposition variance of the tagged particle can be computed by numerically evaluating the\nsum. In figure 1 we compare this exact result with numerical simulations for a set of\ndifferent parameters and find excellent agreement, as expected.\nIt is particularly interesting to consider the limit of thermodynamically large system\nsize, i.e., N→ ∞ . In this limit, setting 2 πs/N =q, the sum in (26) can be converted\ninto an integral, which is most conveniently expressed as,\n\nx2\nα(t)\u000b\nc=v2\n0Zπ\n−πdq\n2π\u00141\n2(DR+ 2γ) \n1−e−2bqt\nbq+e−(DR+2γ)te−bqt−1\nDR+ 2γ+bq+e−bqt(e−(DR+2γ)t−e−bqt)\nDR+ 2γ−bq!\n+cos 2θ0\n2(DR−2γ) \ne−4DRt−e−2bqt\n2DR−bq+e−(DR+2γ)te−bqt−e−4DRt\n3DR−2γ−bq+e−bqt(e−bqt−e−(DR+2γ)t)\nDR+ 2γ−bq!\n−cos2θ0(e−(DR+2γ)t−e−bqt)2\n(DR+ 2γ−bq)2\u0015\n,\n(27)11\nwhere, we have defined,\nbq= 4ksin2\u0010q\n2\u0011\n. (28)\nThe first term and part of the second term in (27) can be integrated exactly, giving,\nB1(t)≡v2\n0\n2(DR+ 2γ)Zπ\n−πdq\n2π1−e−2bqt\nbq= 2Deffh\nI0(4kt) +I1(4kt)i\nt e−4kt, (29)\nand,\nB2≡v2\n0\n2(DR+ 2γ)Zπ\n−πdq\n2π1\u0002\n(D+ 2γ) +bq\u0003=Deffp\n(DR+ 2γ)(DR+ 2γ+ 4k), (30)\nwhere In(z) denotes the modified Bessel function of first kind and Deffis defined in (2).\nThis simplifies (27) to,\n\nx2\nα(t)\u000b\nc=B1(t)−B2+v2\n0Zπ\n−πdq\n2π\u0014e−bqt\n2(DR+ 2γ)(\ne−(DR+2γ)t\nDR+ 2γ+bq\n+e−(DR+2γ)t−e−bqt\nDR+ 2γ−bq)\n+cos 2θ0\n2(DR−2γ)(\ne−4DRt−e−2bqt\n2DR−bq+e−(DR+2γ)te−bqt−e−4DRt\n3DR−2γ−bq\n−e−bqt(e−(DR+2γ)t−e−bqt)\nDR+ 2γ−bq)\n−cos2θ0(e−(DR+2γ)t−e−bqt)2\n\u0002\nDR+ 2γ−bq\u00032\u0015\n. (31)\nWe now analyze the above equation in various dynamical regimes emerging\nfrom the interplay of the time-scales D−1\nR,γ−1and k−1. For any given distinct\nvalues of {D−1\nR, γ−1, k−1}, there are three different time-scales, the smallest τ1=\nmin(D−1\nR, γ−1, k−1), the largest τ3= max( D−1\nR, γ−1, k−1), and τ2, given by the third\none. We consider the most interesting scenario where the time-scales are well separated,\nsuch that τ1≪τ2≪τ3. Correspondingly, for each ordering of DR,γandk, there are\nfour dynamical regimes,\n(i) Short-time regime: t≪τ1\n(ii) Early-intermediate regime : τ1≪t≪τ2\n(iii) Late-intermediate regime : τ2≪t≪τ3\n(iv) Long-time regime: t≫τ3.\nTo analyse the behaviour of the tagged particle variance in the various regimes, it\nis convenient to recast (31) using a change of variable z2=bqt, as,\n\nx2\nα(t)\u000b\nc=B1(t)−B2+v2\n0\n2π√\nktZ√\n4kt\n−√\n4ktdz\u0014e−(DR+2γ)te−z2\n2(DR+ 2γ)\u0002\n(DR+ 2γ) + (z2/t)\u0003\n+e−(DR+2γ)te−z2−e−2z2\n2(DR+ 2γ)\u0002\n(DR+ 2γ)−(z2/t)\u0003+cos 2θ0(e−4DRt−e−2z2)\n(DR−2γ)(4DR−2(z2/t))\n+cos 2θ0(e−(DR+2γ)te−z2−e−4DRt)\n2(DR−2γ)\u0002\n(3DR−2γ)−(z2/t)\u0003+cos 2θ0(e−2z2−e−(DR+2γ)te−z2)\n2(DR−2γ)\u0002\n(DR+ 2γ)−(z2/t)\u0003\n−cos2θ0(e−(DR+2γ)t−e−z2)2\n\u0002\n(DR+ 2γ)−(z2/t)\u00032\u00151p\n1−z2/(4kt). (32)12\nBefore the intermediate regimes, we first discuss the short-time and long-time\nregimes, where the dynamical behaviors are, in fact, independent of the ordering of\nthe time-scales.\n4.1. Short-time regime (t≪τ1)(R-I)\nIn this regime the time tis much smaller than all the time-scales present in the system.\nHence, expanding (31) in Taylor series of t, we get the leading order behavior of the\ntagged particle variance,\n\nx2\nα(t)\u000b\nc=2v2\n0t3\n3\u0002\nDRsin2θ0+ 2γcos2θ0\u0003\n+O(t4). (33)\nNote that, this leading order behavior is independent of kand is the same as that of a\nsingle DRABP in the short-time regime ( t≪(k−1, D−1\nR, γ−1) [61], since the particles do\nnot feel the effect of the harmonic coupling. However, the effect of coupling shows up\nin the next order correction as,\nv2\n0\n12\u0014\n(DR−2γ)[7DR+ 6(k+γ)] cos 2 θ0−3(DR+ 2γ)[DR+ 2(k+γ)]\u0015\nt4. (34)\nIn figure 2 we compare the numerical simulation for the short-time behavior for different\norders of time scale with the asymptotic behavior (33) and get excellent agreement.\n4.2. Long-time regime (t≫τ3)(R-IV)\nIn the long-time regime, tis much larger than all the time-scales of the system, and\nconsequently, we have, DRt≫1, γt≫1 as well as kt≫1. Using these limits in (32),\nwe get,\n\nx2\nα(t)\u000b\nc=B1(t)−B2+v2\n0Z√\n4kt\n−√\n4ktdz e−2z2\n2π√\nkt\u0014cos 2θ0\n2(DR−2γ)\u0002\n(DR+ 2γ)−(z2/t)\u0003\n−cos 2θ0\n2(DR−2γ)(2DR−(z2/t))−1\n2(DR+ 2γ)\u0002\n(DR+ 2γ)−(z2/t)\u0003\n−cos2θ0\u0002\n(DR+ 2γ)−(z2/t)\u00032\u00151p\n1−z2/(4kt). (35)\nMoreover, the leading order behaviour of B1(t) in (29) is given by,\nB1(t) =Deff√\nπk\u0010√\n2t−1\n16k√\n2t\u0011\n+O(t−3/2). (36)\nClearly, the integral in (35) is dominated by contributions from near z= 0. In\nfact, to get the leading order contribution, it suffices to set z2/t→0, and extend the\nlimits of the integral to ±∞. Carrying out the resulting Gaussian integral and using13\n100101102103104\nt10−410−2100102104106/angbracketleftx2\nα(t)/angbracketrightct R-VI\nt3R-It5/2\nR-III\nt3\nR-Ik= 10−3,DR= 10−5,γ= 10−5\nk= 10−6,DR= 10−6,γ= 5×10−4\nFigure 2: The crossover behavior of the variance from the short-time regime to the\nearly-intermediate regime for quenched initial orientation. The solid lines are obtained\nby numerically integrating (31). The dotted lines correspond to the asymptotic behavior\ngiven by (33), (40), and (53). The symbols indicate the data obtained from numerical\nsimulations with N= 500 and v0= 1.\nthe large-time behaviour of B1(t), we finally get the long-time behaviour of the variance\nof the tagged particle position,\n\nx2\nα(t)\u000b\nc=Deffr\n2t\nπk−Deffp\n(DR+ 2γ)(DR+ 2γ+ 4k)\n−Deff√\n2πkt\"\n1\n16k+4DR+ (DR−2γ) cos 2 θ0\n4DR(DR+ 2γ)#\n+O(t−3/2). (37)\nNote that, similar to the short-time regime, the leading order behavior in the long-time\nregime is also independent of the ordering of the time-scales. As expected, the leading√\ntgrowth at late-times is the same as that of a tagged particle in a passive harmonic\nchain [18]. The correction terms, however, carry signatures of activity. In figure 3 we\nillustrate the√\ntgrowth in the long-time regime obtained from the numerical simulation\nalong with the analytical prediction (37).\nIn the following, we explore the behavior of the tagged particle in the remaining\ntwelve dynamical regimes. It is convenient to group them according to the relative14\n100101102103104\nt10−1100101102103/angbracketleftx2\nα(t)/angbracketrightc\nt1/2\nR-IV\nt1/2\nR-IIIt1/2R-IV\ntR-Vk= 1.0,DR= 5×10−4,γ= 0.8\nk= 5×10−4,DR= 1.0,γ= 0.8\nFigure 3: The crossover behavior of the variance from the late-intermediate regime to\nlong-time regime for quenched initial orientation for k≪DRandk≫DRwith fixed γ.\nThe solid lines are obtained by numerically integrating (31). The dotted lines indicate\nthe asymptotic behavior given by (37), (47), and (54). The symbols indicate the data\nobtained from numerical simulations with N= 500 and v0= 1.\nstrength of the coupling kwith respect to the activity parameters. We consider the three\nscenarios (i) Strong-coupling limit [ k≫(DR, γ)], (ii) Weak-coupling limit [ k≪(DR, γ)]\nand (iii) Moderate-coupling limit [min( DR, γ)≪k≪max( DR, γ)] below.\n4.3. Strong-coupling limit [k≫(DR, γ)]\nThe strong-coupling limit refers to the scenarios when the coupling strength kis larger\nthan both the activity parameters DRandγ. Correspondingly, we have,\nτ1=k−1≪ τ2= min( D−1\nR, γ−1)≪ τ3= max( D−1\nR, γ−1). (38)\nIn the intermediate regimes, t≫τ1and the leading order behavior of the tagged particle\nvariance can be obtained by taking the limit kt→ ∞ in (32). In this limit, the integrals15\ncan be performed explicitly [see (C.1)-(C.5) in Appendix C], yielding,\n⟨xα(t)2⟩=B1(t)−B2+Deff\n2p\n(DR+ 2γ)kt(\n√\nterfc\u0010p\n(DR+ 2γ)t\u0011\n+(DR+ 2γ)3/2cos 2θ0\n(DR−2γ)\nerf\u0010p\n(2γ−3DR)t\u0011\np\n(2γ−3DR)−erfi\u0000√4DRt\u0001\n√2DR\n√\nt e−4DRt\n+\"\u0012\n1−cos 2θ0(DR+ 2γ)\n(DR−2γ)\u0013h\nerfi\u0010p\n(DR+ 2γ)t\u0011\n−erfi\u0010p\n2(DR+ 2γ)t\u0011i\n+ cos2θo\u0012\u0014\n(DR+ 2γ)t+1\n2\u0015\nerfi\u0010p\n(DR+ 2γ)t\u0011\n−\u0014\n(DR+ 2γ)t+1\n4\u0015\nerfi\u0010p\n2(DR+ 2γ)t\u0011\u0013#\n√\nt e−2(DR+2γ)t\n+2t√πp\n2(DR+ 2γ) cos2θo\u0010\n1−√\n2e−(DR+2γ)t\u0011\n+O\u00121\nkt\u0013)\n. (39)\nThe leading behaviors in the early and late-intermediate regimes can be obtained by\ntaking the appropriate limits in the above equations.\nEarly intermediate regime (τ1≪t≪τ2≪τ3) (R-II).– We obtain the leading order\nbehavior in the early-intermediate regime by considering DRt≪1 and γt≪1 in (39)\nas,\n⟨xα(t)2⟩ ≃16\n15(√\n2−1)[DRsin2θ0+ 2γcos2θ0]v2\n0t5/2\n√\nπk. (40)\nClearly, for arbitrary initial orientation and any finite DRandγ, the leading order\nbehavior of the tagged particle variance ⟨xα(t)2⟩ ∼t5/2. Note that, γ= 0 corresponds\nto the ABP case, where t5/2behavior has been observed for θ0=π/2 [58].\nIn the special case γ= 0 and θ0= 0, the leading order term vanishes and we need\nto consider the subleading corrections to (40), which come from two sources: (i) the\nnext order terms in DRtandγtfrom (39) and (ii) subleading corrections in 1 /(kt) in\nthe expansion of [1 −z2/(4kt)]−1/2in (32) in the limit DRt≪1 and γt≪1. This results\nin,\n⟨xα(t)2⟩=v2\n0√τ1√π τ2t5/2\"\nL1+L2t\nτ2+15√\n2\n96L1τ1\nt+···#\n, (41)\nwhere τ1,τ2, and τ3are defined in (38) and the leading order coefficient L1has been\nalready obtained in (40). It is more conveniently expressed as,\nL1=16(√\n2−1)\n15×\n\nsin2θ0+ 2τ2\nτ3cos2θ0forDR> γ\nτ2\nτ3sin2θ0+ 2 cos2θ0forDR< γ.(42)16\nThe coefficient L2, appearing in the subleading term, is given by,\nL2=64(√\n2−1)\n105×\n\n\u0012\n1−2τ2\nτ3\u0013\"\n1 +7−√\n2\n2τ2\nτ3cos2θ0#\nforDR> γ\n\u0012τ2\nτ3−2\u0013\"\nτ2\nτ3+7−√\n2\n2cos2θ0#\nforDR< γ.(43)\nNote that, for any given values of DRandγ, depending on the relative strength of\nt/τ2andτ1/t, the two subleading terms could be of the same order. Interestingly, for\nthe special case γ= 0 and θ0= 0, the leading order behavior is given by\n⟨xα(t)2⟩=64(√\n2−1)\n105v2\n0D2\nR√\nπkt7/2, (44)\nwhich is consistent with the result obtained earlier for the ABP case with θ0= 0 [58].\nThet5/2growth of variance in the early intermediate regime for the strong coupling\nlimit is shown in figure 2 and figure 4 .\nLate intermediate regime (τ1≪τ2≪t≪τ3) (R-III).– Next, we consider the late-\nintermediate regimes τ1≪τ2≪t≪τ3. For τ2=D−1\nRandτ3=γ−1, i.e., DR≫γ, the\nleading order behavior can be obtained by taking the limit DRt≫1,γt≪1 in (39),\nas,\n\nx2\nα(t)\u000b\nc≃v2\n0√\nt\nDR√\n2πk. (45)\nThe subleading corrections to (45) can be obtained by considering the next order terms\nin (39). This results in,\n\nx2\nα(t)\u000b\nc=v2\n0√\nt\nDR√\n2πk\"\n1−rπτ2\n2t+O(τ2/t)#\n. (46)\nNote that, in this case, the tagged particle variance becomes independent of the initial\norientation θ0due to the large rotational diffusion constant. Incidentally, the above\nequation can also be obtained by considering the limit γ≪DR≪kin (37).\nOn the other hand, for τ2=γ−1andτ3=D−1\nR, i.e., γ≫DR, we have DRt≪1,\nγt≫1. Considering these limits in (39), the leading order behavior is given by,\n\nx2\nα(t)\u000b\nc≃v2\n0cos2θ0\nγ√\n2πk√\nt. (47)\nAgain the subleading corrections to (47) can be obtained by considering the next order\nterms in (39) which results in,\n\nx2\nα(t)\u000b\nc=v2\n0cos2θ0\nγ√\n2πk√\nt\"\n1−1\n2rπτ2\nt−4\n3(1−tan2θ0)t\nτ3+O(τ2/t)#\n. (48)17\nClearly, for arbitrary initial orientation, irrespective of the relative strength of DRand\nγ, the leading order behavior of the tagged particle variance ⟨xα(t)2⟩ ∼t1/2, except for\nthe special case γ= 0 and θ0=π/2, where this leading order term vanishes. In that\ncase, we need to consider the subleading corrections, ⟨xα(t)2⟩ ∼t3/2.\nNote that, in strong coupling limit, the subleading contributions coming from the\nexpansion of [1 −z2/(4kt)]−1/2in (32) is O(τ1/t)≪O(τ2/t). The crossover behavior of\nthe variance from the early-intermediate regime to the late-intermediate regime and the\nlate-intermediate regime to long-time behavior in the strong-coupling limit is shown in\nfigure 4 and figure 3 respectively.\n4.4. Weak coupling limit [k≪(DR, γ)]\nThe weak-coupling limit refers to the scenarios when the coupling strength kis smaller\nthan both the activity parameters DRandγand correspondingly the largest time-scale\nτ3=k−1. The other two time-scales are τ1= min( D−1\nR, γ−1),τ2= max( D−1\nR, γ−1). In\nthis case, we can expand (31) in powers of t/τ3,τ2/τ3andτ1/τ2. This expansion can be\nmost conveniently expressed in terms of the parameters k,DR,γas,\n\n|xα(t)|2\u000b\nc=B1(t)−B2+Deff∞X\nn=0∞X\nm=0A(m+n)(−4kt)n\nn!(\ne−(DR+2γ)t\nDR+ 2γ\u0012−4k\nDR+ 2γ\u0013m\n+2(DRsin2θ0−2γcos2θ0)\nD2\nR−4γ2(e−(DR+2γ)t−2n)\u00124k\nDR+ 2γ\u0013m\n−(DR+ 2γ) cos 2 θ0\nDR−2γ\u00142n−1\nDR\u00122k\nDR\u0013m\n−e−(DR+2γ)t\n3DR−2γ\u00124k\n3DR−2γ\u0013m\u0015\n+2(m+ 1) cos2θ0\nDR+ 2γ\u0000\n2e−(DR+2γ)t−2n\u0001\u00124k\nDR+ 2γ\u0013m)\n+Deff∞X\nm=0A(m)(\nDR+ 2γ\nDR−2γe−4DRtcos 2θ0\u00141\n2DR\u00122k\nDR\u0013m\n−1\n3DR−2γ\u00124k\nDR+ 2γ\u0013m\u0015\n−2(m+ 1) cos2θ0e−2(DR+2γ)t\nDR+ 2γ\u00124k\nDR+ 2γ\u0013m)\n,\n(49)\nwhere A(m) is a constant, given by\nA(m) =1\n2πZπ\n−πdqsin2m(q/2) =Γ\u0000\nm+1\n2\u0001\n√π m!. (50)\nAlthough the sum over min (49) can be performed explicitly [see (C.6)-(C.7)\nin Appendix C], the sum over nis hard to evaluate in a closed form. Nevertheless,\n(49) is exact for all parameters. In fact, the expansion as a power series in kt, as given\nin (49), is particularly useful in the intermediate regime of the weak-coupling limit,\nwhere kt≪1. In this limit, taking exp [ −(DR+ 2γ)t]→0, (49) reduces to a much18\nsimpler form\n\n|xα(t)|2\u000b\nc=B1(t)−B2−2Deff\nDR−2γ∞X\nn=0∞X\nm=0A(m+n)(−8kt)n\nn!\n×(\u0014DR\nDR+ 2γ+mcos2θ0\u0015\u00124k\nDR+ 2γ\u0013m\n+(DR+ 2γ) cos 2 θ0\n4DR\u00122k\nDR\u0013m)\n+e−4DRtDeff\n2DRDR+ 2γ\nDR−2γcos 2θ0∞X\nm=0A(m)\u0014\u00122k\nDR\u0013m\n−2DR\n3DR−2γ\u00124k\nDR+ 2γ\u0013m\u0015\n.(51)\nUnlike the strong-coupling limit, the behavior of the tagged particle variance in the\nintermediate regime in the weak-coupling limit depends on the relative strength of DR\nandγ. Hence we choose a particular order of DR, γand then examine (51) to get the\nleading order behavior of the position variance. In the following, we analyze the early\nintermediate and the late intermediate regimes separately.\nEarly intermediate regime (τ1≪t≪τ2≪τ3).– For DR≫γ, we have τ1=D−1\nR\nandτ2=γ−1(R-V). Considering the limit DRt≫1,γt≪1 and kt≪1 in (51) we get\nthe leading order behavior for this case as,\n\nxα(t)2\u000b\nc=v2\n0t\nDR\u0014\n1−(6 + cos 2 θ0)\n4DRt−2kt+···\u0015\n. (52)\nOn the other hand, for γ≫DR, we have τ1=γ−1andτ2=D−1\nR(R-VI).\nConsidering the limit DRt≪1,γt≫1 and kt≪1 in (51) we get the leading order\nbehavior for this case as,\n\nxα(t)2\u000b\nc=v2\n0t\nγcos2θ0\u0014\n1−3\n4γt−2kt−DRt(1−tan2θ0) +···\u0015\n. (53)\nInterestingly, for θ0=π/2, the tagged particle behaves ballistically at the leading order,\ni.e.,\nxα(t)2\u000b\nc≃v2\n0(DR/γ)t2.\nLate intermediate regime (τ1≪τ2≪t≪τ3) (R-V).– In this regime, both DRt≫1\nandγt≫1, while kt≪1. Considering these limits in (51), the leading order behavior\nof the variance can be written as,\n\nxα(t)2\u000b\nc≃2Defft, (54)\nindependent of the relative strength of DRandγ. The sub-leading corrections, however,\ndepend on the relative strength of DRandγ. In particular, for DR≫γthe tagged\nparticle behavior is the same as that in the early intermediate regime, given by (52).\nOn the other hand, for γ≫DR, we have,\n\nxα(t)2\u000b\nc=v2\n0t\n2γ\u0014\n1−3 cos2θ0\n2γt−2kt+···\u0015\n. (55)19\n100101102103104\nt10−310−1101103/angbracketleftx2\nα(t)/angbracketrightc√\nt R-IV\nt5/2\nR-II√\nt\nR-IV\ntR-VIIk= 1,DR= 5×10−4,γ= 5×10−4\nk= 5×10−4,DR= 5.0,γ= 10−6\nFigure 4: The crossover behavior of the variance from the early-intermediate regime to\nthe late-intermediate regime for quenched initial orientation. The solid lines are obtained\nby numerically integrating (31). The dotted lines correspond to the asymptotic behavior\ngiven by (37), (40), and (52). The symbols indicate the data obtained from numerical\nsimulations with N= 500 and v0= 1.\nNote that, in this regime, Deff, given by (2), becomes\nDeff→\n\nv2\n0\n2DRforγ≪DR\nv2\n0\n4γforγ≫DR.(56)\nFigure 5 shows the crossover of the variance from the early intermediate regime to the\nlate intermediate regime when γ≫DR, in the weak-coupling limit.\n4.5. Moderate-coupling limit [min( DR, γ)≪k≪max( DR, γ)]\nThe moderate-coupling refers to the scenarios when klies between the two activity\nparameters DRandγ. Consequently the coupling strength kdetermines the interme-\ndiate time scale, τ2=k−1, while the other two time-scales are τ1= min( D−1\nR, γ−1) and\nτ3= max( D−1\nR, γ−1).20\n100101102103104\nt100101102103/angbracketleftx2\nα(t)/angbracketrightctR-V\n√\nt\nR-IX\ntR-VI, R-VIIIk= 1×10−6,DR= 1×10−3,γ= 2.0\nk= 1×10−3,DR= 1×10−6,γ= 2.0\nFigure 5: The crossover behavior of the variance from the early-intermediate regime to\nthe late-intermediate regime for quenched initial orientation. The solid lines are obtained\nby numerically integrating (31). The dotted lines correspond to the asymptotic behavior\ngiven by (47), (52), and (53). The symbols indicate the data obtained from numerical\nsimulations with N= 100 and v0= 1.\nEarly intermediate regime (τ1≪t≪τ2≪τ3).– The behavior of the tagged par-\nticle in the early intermediate regime can be most conveniently obtained from (51),\nwhich was obtained in the limit kt≪1 and ( DR+ 2γ)t≫1. Therefore, the scenarios\ncorresponding to both the relative orders DR≫γ(R-VII) and γ≫DR(R-VIII) in\nthe moderate coupling limit are the same as the corresponding scenarios in the weak\ncoupling limit. Namely,\nxα(t)2\u000b\ncis given by (52) and (53), for DR≫γandγ≫DR,\nrespectively. Figure 4 and 5 show this early intermediate regime behavior, for DR≫γ\nandγ≫DR, respectively.\nLate intermediate regime (τ1≪τ2≪t≪τ3).– In this regime, kt≫1, and\nhence, the leading order behavior of the variance can be extracted from (39). Therefore,\nthe scenarios corresponding to both the relative orders DR≫γandγ≫DRin the\nmoderate coupling limit are the same as the corresponding scenarios in the strong\ncoupling limit. Namely, the leading order behavior of\nxα(t)2\u000b\ncis given by (47) and\n(45), for γ≫DRandDR≫γ, respectively. However, the subleading corrections differ\nfrom those obtained in the strong coupling limit and can be extracted directly from (32)21\nby considering the appropriate limits. For DR≫γ(R-IV), we get\n\nx2\nα(t)\u000b\nc=v2\n0√\nt\nDR√\n2πk\"\n1−1\n32kt−r\n2πk\nDR1√DRt+···#\n, (57)\nwhile for γ≫DR(R-IX), we get,\n\nx2\nα(t)\u000b\nc=v2\n0cos2θ0\n2γr\n2t\nπk\"\n1−s\nπk\n8γ2t−1\n32kt+4(1−2 cos2θ0)\n3 cos2θ0DRt+···#\n.(58)\nInterestingly, for θ0=π/2, leading order behaviour changes from√\nttot3/2. Figures 4\nand 5 show the crossover behavior from the early-intermediate regime to the late-\nintermediate regime in the moderate-coupling limit, for DR≫γand γ≫DR,\nrespectively.\n5. Annealed initial orientation\nIn this section, we consider the scenario where the initial orientation {θα(0)}are\nindependently drawn from a uniform distribution of [0 ,2π]. As a result, G(t1, t2) is\ngiven by (22). Putting (22) in (24) and using (25) we get,\n\nx2\nα(t)\u000b\nc=Deff\nNN−1X\ns=0\u00141−e−2ast\nas+e−(DR+2γ)te−ast−1\u0000\nDR+ 2γ+as\u0001+e−ast(e−(DR+2γ)t−e−ast)\u0000\nDR+ 2γ−as\u0001\u0015\n,(59)\nwhere asis defined in (13). Equation (59) can be converted into an integral in the large\nNlimit as,\n\nx2\nα(t)\u000b\nc=DeffZ2π\n0dq\n2π\u00141−e−2bqt\nbq+e−(DR+2γ)te−bqt−1\u0000\nDR+ 2γ+bq\u0001+e−bqt(e−(DR+2γ)t−e−bqt)\u0000\nDR+ 2γ−bq\u0001\u0015\n,\n(60)\nwhere bqis given by (28). As before, the first and part of the second terms can be\nintegrated exactly, given by (29) and (30) respectively. This simplifies (60) to,\n\nx2\nα(t)\u000b\nc=B1(t)−B2+DeffZ2π\n0dq\n2π\u0014e−(DR+2γ)te−bqt\n\u0000\nDR+ 2γ+bq\u0001+e−bqt(e−(DR+2γ)t−e−bqt)\u0000\nDR+ 2γ−bq\u0001\u0015\n(61)\nNote that, here the parameters DRand γappear together as ( DR+ 2γ).\nConsequently, we have two distinct time scales ( DR+ 2γ)−1andk−1, in contrast to\nthe quenched initial condition, where there are three distinct time scales set by D−1\nR,\nγ−1andk−1. In the following, we consider the three dynamical regimes emerging when\nthe two scales, τ1= min(( DR+ 2γ)−1, k−1) and τ2= max(( DR+ 2γ)−1, k−1), are well\nseparated:\n1. Short-time regime: t≪τ1\n2. Long-time regime: t≫τ2\n3. Intermediate regime: τ1≪t≪τ222\n100101102103104\nt100101102103104105106/angbracketleftx2\nα(t)/angbracketrightc\nt2R-It3/2\nR-IIR-IIItk= 2×10−3,DR= 1×10−5,γ= 5×10−6\nk= 1×10−6,DR= 4×10−3,γ= 5×10−4\n103104105106\nt3/2\nR-IIt\nR-III\nFigure 6: The crossover behavior of the variance from short-time regime to intermediate\nregime for annealed initial orientation. The solid lines are obtained by numerically\nintegrating (31). The dotted lines correspond to the asymptotic behavior given by (62),\n(66), and (67). The symbols indicate the data obtained from numerical simulations with\nN= 500 and v0= 1.\n5.1. Short-time regime (t≪τ1)(R-I)\nAt very short times, the particles do not feel the effect of the interaction. Consequently,\neach particle independently moves ballistically with the speed v0along its initial\norientation θα(0), which is drawn randomly from (0 ,2π). Hence, the average\ndisplacement is zero, and the variance\nxα(t)2\u000b\nc≈v2\n0t2\ncos2θα(0)\u000b\n=v2\n0t2/2. However,\nthe effect of the interaction is expected to show up in the subleading corrections. In\nfact, the leading order behavior and the subleading corrections can be systematically\nextracted by expanding (61) in power series of t,\n\nxα(t)2\u000b\nc=v2\n0t2\n2\u0014\n1−1\n3(DR+ 2γ+ 6k)t+O(t2)\u0015\n. (62)\nInterestingly, in the short-time regime, the position fluctuation in the quenched case\nis smaller than the annealed case by a factor proportional to t/τ2[see (33)]. Figure 6\nshows the t2growth of the variance at short-times.\nTo analyze the behavior of the variance in the remaining two regimes it is convenient23\nto recast (61) using a change of variable z2=bqt,\n\nxα(t)2\u000b\nc=B1(t)−B2+Deff\n2π√\nktZ√\n4kt\n−√\n4ktdz e−z2\u0014e−(DR+2γ)t\n(DR+ 2γ) +z2/t\n+e−(DR+2γ)t−e−z2\n(DR+ 2γ)−z2/t\u00151p\n1−z2/4kt. (63)\n5.2. Long-time regime (t≫τ2)(R-IV)\nIn the long-time regime, tis much larger than both the time-scales of the system.\nTherefore, setting e−(DR+2γ)t→0 in (63), we get,\n\nxα(t)2\u000b\nc=B1(t)−B2−Deff\n2π√\nktZ√\n4kt\n−√\n4ktdze−2z2\n\u0002\n(DR+ 2γ)−z2/t\u00031p\n1−z2/(4kt).(64)\nThe integral in (64) is dominated by the contribution from near z= 0. Consequently,\none can expand the integrand in powers of z2/[(DR+ 2γ)t] and z2/(4kt) and set the\ndomain of integral from −∞ to∞. Finally, we get the variance of the tagged particle\nin the long-time regime,\n\nx2\nα(t)\u000b\nc=Deffr\n2t\nπk−Deffp\n(DR+ 2γ)(DR+ 2γ+ 4k)\n−Deff√\n2πkt\"\n1\n16k+1\n2(DR+ 2γ)#\n+O(t−3/2). (65)\nFigure 7 shows the√\ntbehavior in the long-time regime.\nThe system eventually forgets the initial orientation, and the leading order behavior\nin the long time regime\nx2\nα(t)\u000b\nc≈Deffq\n2t\nπkfor both annealed and quenched initial\norientations. The difference due to the initial orientations shows up in the subleading\ncorrections [cf. (37) and (65)].\n5.3. Intermediate regime\nThe behavior of the tagged particle in the intermediate regime ( τ1≪t≪τ2) depends\non whether the coupling strength kis larger or smaller than the activity parameter\n(DR+ 2γ). In the strong coupling limit [ k≫(DR+ 2γ)], the two time-scales are\nτ1=k−1andτ2= (DR+ 2γ)−1, whereas in the weak coupling limit [ k≪(DR+ 2γ)],\nτ1= (DR+ 2γ)−1andτ2=k−1. In the following, we discuss the two limits separately.\n5.3.1. Strong-coupling limit [k≫(DR,2γ)](R-II) - In this limit, the intermediate\nregime is characterized by kt≫1 and ( DR+ 2γ)t≪1. The leading order behavior can\nbe obtained from (63) as,\n\nx2\nα(t)\u000b\nc=2(√\n2−1)v2\n0t3/2\n3√\nπk\"\n1− \n1−√\n2\n3!\n(DR+ 2γ)t−3√\n2\n32kt+···#\n. (66)\nFigures 6 and 7 show this t3/2growth in the variance.24\n100101102103104\nt10−1100101102103/angbracketleftx2\nα(t)/angbracketrightc\nt\nR−III√\nt\nR−IV\nt3/2R−II√\nt R−IVk= 1×10−3,DR= 1.0,γ= 1.0\nk= 2.0,DR= 5×10−3,γ= 2.5×10−3\nFigure 7: The crossover behavior of the variance from short-time regime to intermediate\nregime for annealed initial orientation. The solid lines are obtained by numerically\nintegrating (31). The dotted lines correspond to the asymptotic behavior given by (65),\n(66), and (67). The symbols indicate the data obtained from numerical simulations with\nv0= 1 and N= 500 for weak-coupling limit, while N=800 for strong-coupling limit.\n5.3.2. Weak-coupling limit [k≪(DR,2γ)](R-III) - On the other hand in the weak-\ncoupling limit, the intermediate regime is characterized by kt≪1 and ( DR+ 2γ)t≫1.\nThe leading order behavior can be obtained from (61) as,\n\nx2\nα(t)\u000b\nc= 2Defft\u0014\n1−1\n(DR+ 2γ)t−2kt+···\u0015\n(67)\nFigures 6 and 7 show this linear growth in variance.\nApart from the long-time regime, where the behavior is anyway expected to be\nindependent of the initial condition, the tagged particle variance in all the other\ndynamical regimes shows rather different behavior for the quenched and annealed initial\nconditions. In particular, the effect of the initial condition is drastically felt in the\nintermediate dynamical regime of the strong coupling limit, where randomizing the\ninitial orientation changes the behavior to t3/2from the t5/2observed for a quenched\ninitial condition. Moreover, at short-times also, the position variance of the tagged\nparticle with the annealed initial orientation shows a t2growth, as opposed to the t3\ngrowth for a quenched initial orientation.25\n6. Finite-size effects\nThere is an additional time scale tNassociated with any finite system of size N. This\nfinite-size time-scale tNdiverges in the thermodynamic limit N→ ∞ . Therefore, for a\nharmonic chain of NDRABPs, the behaviors we studied in earlier sections are expected\nto hold for t≪tN, for a large but finite N. On the other hand, for t≫tNone expects\na different behavior due to finite size effects. In this section, we study the finite-size\neffect and crossover behavior across tN, of the tagged particle variance.\nWe start with the exact expression for the position variance given by (26), which\nholds for an arbitrary value of N. We assume that the system size is large enough so\nthat tNis the largest time scale, i.e., {D−1\nR, γ−1, k−1} ≪ tN. Hence to study the finite\nsize effect and the cross-over behavior across tN, we study the behavior in the regime\n{D−1\nR, γ−1, k−1} ≪t. For t≫ {D−1\nR, γ−1}and large N, (26) simplifies to,\n\nx2\nα(t)\u000b\nc=Deff\nNN/2X\ns=−N/2\u00141−e−2ast\nas−1\nDR+ 2γ+as−e−2ast\nDR+ 2γ−as\n+(DR+ 2γ)e−2ast\nDR+ 2γ−as\u0012cos 2θ0\n2DR−as−2 cos2θ0\nDR+ 2γ−as\u0013\u0015\n, (68)\nwhere asis defined in (13). Note that, we have shifted the limits of summation using the\nfact that the sum in (26) is symmetric about N/2. Now, since t≫k−1, the summation\nin (68) is dominated by contributions from terms with s≪N. Hence, we can use the\napproximation e−2ast≃e−8π2s2t/tN, where the finite-size time-scale tN=N2/k. Clearly,\nfort≫tN,e−8π2s2t/tN→0 for s̸= 0. Then, from (68), we get, for t≫tN,\n\nx2\nα(t)\u000b\nc=Deff\nN\u0014\n2t+cos 2θ0\n2DR−1 + 2 cos2θ0\n(DR+ 2γ)\u0015\n+v2\n0\nNN/2X\ns=1\u00141\nas(DR+ 2γ+as)\u0015\n.(69)\nHence, for t≫tN, the leading order behavior of the variance grows linearly with time,\nas\nx2\nα(t)\u000b\nc≃2tDeff/N, which is consistent with earlier studies done on the harmonic\nchain of ABP, RTP, and AOUP [58].\nOn the other hand, for t≪tN, we cannot ignore e−8π2s2t/tN. However, since kt≫1,\nthe summation for terms containing e−4π2s2t/tNis still dominated by s≪N. Therefore\nEq. (26) becomes,\n\nx2\nα(t)\u000b\nc=Deff\nNN/2X\ns=−N/2\u00141−e−8π2s2t/tN\n4π2s2t/tN−1\nD+ 2γ+as\n+cos 2θ0e−8π2s2t/tN\n2DR−(2 cos2θ0+ 1)e−8π2s2t/tN\n2(DR+ 2γ)\u0015\n.(70)\nIn the thermodynamic limit N→ ∞ , (37) is recovered by converting the sum into an\nintegral by taking q= 2πs/N .26\n10−210−1100101\nt0.61.01.52.54.06.0\n2√z\n/radicalBig\n2\nπ/angbracketleftx2\nα(t)/angbracketrightc√\nk\nDeff√\ntN= 40\nN= 60\nN= 80\nN= 400\nFigure 8: Comparison between the theoretical expression for scaling function (74) (solid\nblack line) with numerical simulation for different values of N, keeping k= 1, DR= 1,\nγ= 1 and v0= 1 fixed.\nTo summarize, from (37) and (69), we have the leading order behavior of the\nvariance as\n\nx2\nα(t)\u000b\nc≃Deff×\n\nq\n2t\nπkfort≪tN\n2t\nNfort≫tN.(71)\nThus, in the scaling limit, t→ ∞ ,N→ ∞ , keeping t/tNfixed, suggests a scaling form,\n\nx2\nα(t)\u000b\nc=Deffr\nt\nkf\u0012t\ntN\u0013\n, (72)\nwhere the crossover function must have the limiting behavior,\nf(z)→(p\n2/πasz→0\n2√z asz→ ∞ .(73)\nIn fact, by taking the scaling limit in Eq. (70), we obtain the full scaling function as,\nf(z) =1\n4π2√z∞X\ns=−∞1−e−8π2s2z\ns2. (74)27\nIn figure 8 we compare this exact scaling function with the same obtained from numerical\nsimulations for different values of Nand find an excellent agreement.\nThe limiting behavior of f(z), mentioned in (73), can be obtained from the above\nequation. To see the large zbehavior, it is useful to separate the s= 0 term and recast\nthe above equation as,\nf(z) = 2√z+1\n12√z−1\n2π2√z∞X\ns=1e−8π2s2z\ns2, (75)\nwhere we have usedP∞\ns=1s−2=π2/6 and the symmetry of the summand for s→ −s.\nClearly, the first term gives the limiting behavior mentioned in (73), and the second\nterm is the leading order correction. The higher-order corrections can be systematically\nobtained from the series.\nOn the other hand, in the limit z≪1, with a change of variable 2 πs√z=u, the\nsummation in (74) can be converted to an integral as,\nf(z)z→0− − →1\n2πZ∞\n−∞1−e−2u2\nu2du=r\n2\nπ, (76)\nwhich is consistent with (73). However, it is not straightforward to obtain the corrections\nto the above limiting behavior systematically from (74). For this, one can use the Poisson\nsummation formula [63], to rewrite the sum in (74) as,\nf(z) =r\n2\nπ+∞X\nm=1\"\n2r\n2\nπexp\u0012\n−m2\n8z\u0013\n−m√zerfc\u0012m\n2√\n2z\u0013#\n, (77)\nwhich approaches the constantp\n2/π, asz→0. Furthermore, using the asymptotic\nexpansion of erfc( x), we have a systematic series expansion about z= 0,\nf(z) =r\n2\nπ\"\n1 + 8 z∞X\nm=11\nm2exp\u0012\n−m2\n8z\u0013∞X\nn=0(−4z)n\nm2n(2n+ 1)!!#\n. (78)\nTo summarize, we find that for t≫N2/kthe tagged particle performs a center of\nmass diffusion with an effective diffusion constant Deff/N. The exact scaling function\nf(z) — governing the crossover of the variance from sub-diffusive Deffq\n2t\nπkto diffusive\n2 (Deff/N)tbehavior across the finite-size time-scale — is equivalently given by (75),\n(77), and (78), each suitable for evaluating the function in different limiting scenarios.\n7. Statistics of the separations\nFor a chain of passive particles, while the center of mass diffuses freely in the absence\nof any global confining potential, the separations between the adjacent particles reach\nan equilibrium state. In fact, for a chain of Npassive particles with free boundary\nconditions (i.e., when x0andxN−1are only coupled to x1andxN−2respectively), at28\na temperature T, the N−1 separations, yα=xα+1−xα, with α= 0,1, . . . , N −2\neventually reach an equilibrium state given by the product measure,\nP({yα})∝exp\"\n−k\n2kBTN−2X\nα=0y2\nα#\n. (79)\nOn the other hand, with a periodic boundary condition, the Nseparations must satisfyPN−1\nα=0yα= 0, and hence are not independent. While this global constraint destroys the\nproduct measure of the equilibrium state for any finite N, one expects that in the limit\nN→ ∞ , the product measure is restored for any finite subset of {yα}. In particular,\nfor any α,\nP(yα) =r\nk\n2πkBTexp\u0014\n−k y2\nα\n2kBT\u0015\n, asN→ ∞ . (80)\nIt is interesting to ask how activity affects this behavior, which we explore in this section.\nFollowing (5), the equation of motion for the separation for the active chain is given\nby,\n˙yα=−k(2yα−yα+1−yα−1) +ηα(t), (81)\nwhere,\nηα(t) =ξα+1(t)−ξα(t). (82)\nSince the stationary state is independent of the initial condition, for simplicity, we set\n{yα(0) = 0 }for all α. Moreover, here, we are using the quenched initial orientation\n{θα(0) = θ0}and{σα(0) = 1 }for all αin the noise ηαabove. We begin by computing\ntwo-point spatio-temporal correlation function,\nyα(t)yβ(t+τ)\u000b\n. To proceed, we perform\nDFT [defined in (14)] on (81) with respect to α, so that we get Ndecoupled first order\ndifferential equations,\n˙˜ys(t) =−as˜ys(t) + ˜ηs(t),with, a s= 4ksin2\u0010πs\nN\u0011\n, (83)\nwhere {˜ys(t)}and{˜ηs(t)}(fors= 0,1, . . . N −1) denote the DFT of {˜yα(t)}and{˜ηα(t)}\nrespectively. Since {yα(0) = 0 }, we have {˜ys(0) = 0 }. The solution of (83) is given by,\n˜ys(t) =e−astZt\n0east1˜ηs(t1)dt1. (84)\nUsing (14), the spatio-temporal correlation can be expressed as,\n\nyα(t)yβ(t+τ)\u000b\n=N−1X\ns=0N−1X\ns′=0exp\"\ni2π(sα−s′β)\nN#\n\n˜ys(t)˜y∗\ns′(t+τ)\u000b\n. (85)\nNow, the correlation in the Fourier space,\n˜ys(t)˜y∗\ns′(t+τ)\u000b\ncan be obtained using (84),\n\n˜ys(t)˜y∗\ns′(t+τ)\u000b\n=e−(ast+as′(t+τ))Zt+τ\n0dt2Zt\n0dt1east1+as′t2\n˜ηs(t1)˜η∗\ns′(t2)\u000b\n, (86)29\nwhere,\n\n˜ηs(τ1)˜η∗\ns′(τ2)\u000b\n=1\nN2N−1X\nα,α′=0ei2π\nN(s′α′−sα)\nηα(τ1)ηα′(τ2)\u000b\n. (87)\nHere we note that,\n\nηα(τ1)ηα′(τ2)\u000b\n=\nξα+1(τ1)ξα′+1(τ2)\u000b\n+\nξα(τ1)ξα′(τ2)\u000b\n−\nξα+1(τ1)ξα′(τ2)\u000b\n−\nξα(τ1)ξα′+1(τ2)\u000b\n= [2δα,α′−δα+1,α′−δα−1,α′]G2(τ1, τ2), (88)\nwhere G2(τ1, τ2)≡\nξα(τ1)ξα(τ2)\u000b\nis given by,\nG2(τ1, τ2) =v2\n0\n2h\ne−(DR+2γ)|t2−t1|+ cos 2 θ0e−\u0000\nDR(t2+t1+2 min[ t1,t2])+2γ|t2−t1|\u0001i\n. (89)\nSubstituting (88) on (87) and performing the summations over α, α′, we get\n\n˜ηs(τ1)˜η∗\ns′(τ2)\u000b\n=4\nNsin2\u0010πs\nN\u0011\nG2(τ1, τ2)δs,s′. (90)\nTo calculate the spatio-temporal correlation, we substitute (90) in (86), and using\n(85) we get,\n\nyα(t)yβ(t+τ)\u000b\n=v2\n0\n2NkN−1X\ns=0cos (2 πs(α−β)/N)as\nas−DR−2γ\"\ne−as(t+2τ)(2γ−3DR+as) cos 2 θ0\n(as−2DR)(as−3DR+ 2γ)\n+ase−(DR+2γ)τ−(DR+ 2γ)e−asτ−e−(DR+2γ)(2t+τ)+ (as+DR+ 2γ)e−as(2t+τ)\nas(as+DR+ 2γ)\n+\u0002\n(DR−2γ)e−4DRt−asτ−(as−2DR)\u0000\ne−(DR+2γ)(2t+τ)−e−(2γτ+DR(4t+τ))\u0001\u0003\ncos 2θ0\n(as−2DR)(as−3DR+ 2γ)#\n.\n(91)\nHere we note that the imaginary part of\nyα(t)yβ(t+τ)\u000b\nturns out to be zero,\nas expected. To obtain the steady-state behavior of the correlation function, we take\nthe limit t→ ∞ in (91). Furthermore, since the correlation function depends only on\n|α−β|, we set α= 0 without loss of generality. This yields,\nC(β, τ) := lim\nt→∞\ny0(t)yβ(t+τ)\u000b\n=v2\n0\n2NkN−1X\ns=1cos (2 πsβ/N )\u0000\nase−(DR+2γ)τ−e−asτ(DR+ 2γ)\u0001\n(as−DR−2γ)(as+DR+ 2γ). (92)\nIn figures 9 and 10, we compare the steady-state behavior of the above-mentioned\ncorrelation function (92) with numerical simulation for varying τandβrespectively\nand find very good agreement.\nNext, we compute exactly the variance C(0,0), the equal-time spatial correlation\nC(β,0), and the spatio-temporal correction C(β, τ) in the thermodynamic limit N→ ∞ .30\n−8−6−4−2 0 2 4 6 8\nβ−0.050.000.050.100.15C(β,τ)\nτ= 0\nτ= 5\nτ= 10\nτ= 15\nτ= 20\nFigure 9: Comparison between the theoretical expression for C(β, τ) (solid lines) (92)\nwith the numerical simulation (symbols) for different values of τ, keeping k= 2.0,\nDR= 0.1,γ= 0.01,v0= 1 and N= 20 fixed.\n•Variance: Since the mean separation vanishes, i.e., ⟨yβ(t→ ∞ )⟩= 0, the variance is\ngiven by C(0,0). Substituting β= 0 and τ= 0 in (92) we get,\nC(0,0) =Deff\nNkN−1X\ns=11\n1 + 4 µsin2(πs/N ), (93)\nwhere Deffis given by (2) and\nµ=k\n(DR+ 2γ), (94)\ndenotes the ratio of the active time scale and the trap time scale. For any finite N,\nthe stationary state variance of yαcould be calculated by performing the summation in\n(93).\nNote that in the passive limit, v0→ ∞ and ( DR+2γ)→ ∞ while keeping Defffinite\nandµ→0. Consequently, in the passive limit, C(0,0) = ( Deff/k)(1−1/N)→Deff/k\nasN→ ∞ . Although the potential U({yα}) =k\n2PN−1\nα=0y2\nαsuggests a product measure\nequilibrium state,\nPeq({yα})∝exp [−U({yα})/Deff], (95)\nthe global constraintPN−1\nα=0yα= 0 weakly breaks the product measure, giving rise31\n0 5 10 15 20 25 30\nτ−0.20.00.20.40.60.8C(β,τ)\nβ= 0\nβ= 1\nβ= 5\nβ= 8\nFigure 10: Comparision between the theoretical expression for C(β, τ) (solid lines) (92)\nwith the numerical simulation (symbols) for different values of β, keeping k= 0.5,\nDR= 0.1,γ= 0.1,v0= 1 and N= 10 fixed\nto the 1 /Ncorrection in the variance. As expected, the correction disappears in the\nthermodynamic limit N→ ∞ .\nFor any finite activity µ, the summation over sin (93) can be converted to an\nintegration over q= 2πs/N in the large Nlimit. Then, we have,\nC(0,0) = lim\nt→∞\nN→∞\ny2\nα(t)\u000b\n=Deff\n2πkZ2π\n0dq\n1 + 4 µsin2(q/2)=Deff\nk√1 + 4 µ, (96)\nwhich implies that the typical fluctuation of the separations decreases with increasing\nactivity. It is interesting to compare the above result with that of a single DRABP in a\nharmonic trap of strength k, where the variance is given by Deff/(k(1 +µ)), which has\nthe same passive limit. It appears that, for large activity, the presence of the interaction\nallows for larger fluctuations.\n•Spatio-temporal correlation: Let us now consider the general spatio-temporal\ncorrelation function C(β, τ) in the thermodynamic limit. In the limit N→ ∞ the\nsummation in the expression (92) can be converted to an integral by taking q= 2πs/N ,\nC(β, τ) =v2\n0\n4πkZπ\n−πdqcos (βq)\u0014(DR+ 2γ)e−bqτ−bqe−(DR+2γ)τ\n(DR+ 2γ)2−b2\nq\u0015\n, (97)32\n100101\nτ0.10.20.3C(β,τ)N= 15\nN= 20\nN= 25\nFigure 11: Comparison between the integral expression for C(β, τ) (blue solid line) (97)\nwith the summation expression (symbols) (92) for different values of N, keeping k= 1,\nDR= 0.1,γ= 0.1,β= 1 and v0= 1. For any finite N, the integral (97) has a correction\n−Deff/(k N), we have added Deff/(k N) to the summation (92) in this plot.\nwhere bqis given by (28). Figure 11 shows how the summation expression (92)\napproaches the integral expression as Nis increased.\nThe integral is hard to compute explicitly for an arbitrary value of τ. Therefore,\nwe expand the integrand in Taylor’s series as a power of τand carry out the integral at\neach order. It turns out that it can be recast in the following form,\nC(β, τ) =∞X\nn=0Cn(β)\u0002\n(DR+ 2γ)τ\u0003n\nn!, (98)\nwhere, the coefficients Cn(β) are given below. First, for n= 0, we have,\nC0(β)≡C(β,0) =Deff\n2πkZπ\n−πdqcosβq\n4µsin2q/2 + 1(99)\n=Deff\nk(1 + 4 µ)3˜F2\u00121\n2,1,1; 1−β,1 +β;4µ\n1 + 4 µ\u0013\n, (100)\nwhere µis defined by (94). For a given β, the above expression of C0(β) has a series\nexpansion in powers of µ, starting from µβ. Next, it is straightforward to see that the33\ncoefficient of τis zero in the integrand in (97), resulting in C1(β) = 0. For n≥2, we\nhave,\nCn(β) =−(−1)nv2\n0\n4πkZπ\n−πdqcos (βq)Sn(q), (101)\nwhere,\n(DR+ 2γ)nSn(q) = (DR+ 2γ)bq(bq)n−1−(DR+ 2γ)n−1\nb2\nq−(DR+ 2γ)2. (102)\nAfter further algebraic manipulation, the integral can be performed [see Appendix B],\nwhich yields\nC2(β) =C0(β)−Deff\nkδβ,0, (103)\nand for n≥3,\nCn(β) =\n\n1 + (−1)n\n2C0(β)−(−1)n+βDeff\nkn−2X\nl=β1 + (−1)l+n\n2\u00122l\nl−β\u0013\nµlforβ≤n−2\n1 + (−1)n\n2C0(β) for β > n −2.\n(104)\nFrom the first line of (104), it is apparent that the summation over lcontributes only\nwhen l+nis even. For example, for n= 3, and 4 we have,\nC3(β) =Deff\nk(2δβ,0−δβ,1)µ,\nC4(β) =C0(β)−Deff\nk\u0002\nδβ,0+ (6δβ,0−4δβ,1+δβ,2)µ2\u0003\n.(105)\nIn fact, the summation over lin (104) can also be carried out, giving a closed-form\nexpression for Cn(β) for n≥3 and β≤n−2 as,\nCn(β) =1 + (−1)n\n2C0(β)\n−(−1)n+βDeff\n2k(\nµβ\u0014\n2F1\u0012\nβ+1\n2, β+ 1; 2 β+ 1; 4 µ\u0013\n+ (−1)n+β\n2F1\u0012\nβ+1\n2, β+ 1; 2 β+ 1;−4µ\u0013\u0015\n+µn−1\u00122(n−1)\nn−β−1\u0013\u0014\n3F2\u0012\n1, n−1\n2, n;n−β, n+β;−4µ\u0013\n−3F2\u0012\n1, n−1\n2, n;n−β, n+β; 4µ\u0013\u0015)\n. (106)\nFor any finite τ, the correlation function C(β, τ) can be evaluated up to arbitrary\naccuracy by taking sufficient number of coefficients Cn(β) in (98). However, this\nexpansion is not suitable for extracting the asymptotic large τbehavior of C(β, τ).34\n100101100110120130140150160\n(a)C(β,τ)\nτβ= 1\nβ= 2\nβ= 3\n10110210310−310−210−1\nt−1/2(b)C(β,τ)\nτβ= 1\nβ= 3\nβ= 5\nβ= 8\nFigure 12: Behaviour of C(β, τ) for different values of βat (a) short-times with k= 0.01,\nDR= 0.005, γ= 0.0025, and at (b) late-times with k= 1, DR= 0.5,γ= 0.25. The\nsymbols are obtained by numerically integrating (97). The dotted lines in (a) plot (98),\nkeeping the first three terms. On the right panel (b), the dotted lines plot the function\ngiven by (107). The dash-dotted line indicates the τ−1/2power law tail. We have taken\nv0= 1 for both the plots.\nThis can instead be done by taking τ≫ {(DR+ 2γ)−1, k−1}, where e−(DR+2γ)t→0\nande−bqτ→e−kq2τin (97). Consequently, the denominator in (97) can be further\napproximated by ( DR+ 2γ)2−b2\nq→(DR+ 2γ)2. This yields,\nC(β, τ) =Deff\n2πkZπ\n−πdqcos (βq)e−kq2τ=Deff\n2k√\nπke−β2/(4kτ)\n√τ. (107)\nIn figure 12, we compare the short-time and long-time behavior obtained from (98),\nby taking first three terms, and (107) respectively, with the exact integral expression\n(97) for spatio-temporal correlation.\n•Spatial correlation: The equal-time correlation C(β,0) is given by (100). It is\ninteresting to investigate the behavior of C(β,0) in the strongly active limit µ≫1.\nHowever, it is not straightforward to obtain the behavior of (100) in this limit. Hence,\nwe extract the limiting behavior from the integral in (99), which is dominated by the\ncontribution from the region |q| ≤1/√µ. Therefore, for large µ, the integral can be\napproximated by\nC(β,0)≃Deff\n2πkZ∞\n−∞dqcosβq\nµq2+ 1=Deff\nkexp (−|β|/√µ)\n2√µ. (108)\nOn the other hand, in the passive limit µ→0, we get from (99),\nC(β,0) =Deff\nkδβ,0, (109)35\n0 2 4 6 8 10\nβ10−710−610−510−410−310−210−1C(β,0)µ= 0.5\nµ= 1.0\nµ= 2.0\nFigure 13: Comparison between the exact expression (100) with the approximate\nexpression (108) for C(β,0) for different values of µ, keeping k= 1, Deff= 1, and\nv0= 1 fixed. The solid line shows the approximate expression, while the symbols shows\nthe exact expression evaluated at integer values ( β= 0,1, . . . , 10).\nconsistent with the product measure equilibrium state (95) obtained in the\nthermodynamic limit N→ ∞ . Interestingly, although (108) is derived using the limit\nµ≫1, taking µ→0 in (108) we get (109), which is also consistent with (96) in large N\nlimit. We see in the thermodynamic limit, the spatial correlation decays exponentially\nwith βin the active limit. In figure 13 we compare the approximate expression (108)\nwith the exact expression (100) evaluated numerically and find very good agreement for\nlarge µ.\n8. Conclusions\nWe investigate the dynamical behavior of a harmonic chain of direction reversing active\nBrownian particles, by characterizing the variance of the position of the tagged particle\nand the statistics of separation between two consecutive particles. There are three\nintrinsic time scales in the system ( k−1, D−1\nR, γ−1), given by the coupling strength k,\nrotational diffusion constant DR, and the direction reversal rate γ. The interplay of these\ntime-scales gives rise to multiple dynamical regimes [see Tables 1 and 2], characterized\nby qualitatively different behavior of the fluctuations, which we analyze in this paper. In36\nthe long times tmuch larger than the intrinsic time-scales, the system behaves similar to\na Rouse polymer— a harmonic chain of Brownian particles—exhibiting a√\ntsubdiffusive\nbehavior of the tagged particle variance. However, in all other dynamical regimes, the\nsignature of activity becomes apparent, giving rise to anomalous behavior tνwith a\nrange of values for νin the different regimes. In particular, we consider two different\nscenarios— one in which all the particles start with a quenched initial orientation θ0, and\nanother where initial orientations of the particles are chosen randomly from a uniform\ndistribution in [0 ,2π], independent of each other.\nFor the case of quenched initial orientation and well-separated time-scales, three\nlimiting scenarios emerge, depending on the relative strengths of the coupling time scale\nk−1, and the active time scales D−1\nRandγ−1. We refer to them as strong coupling\n[k≫(DR, γ)], weak coupling [ k≪(DR, γ)], and moderate coupling [ γ≪k≪DR\norDR≪k≪γ] limits. For a given order of coupling, there are four dynamical\nregimes, which we refer to as short-time, early-intermediate, late-intermediate, and\nlong-time regimes [see Table 1]. The short-time ( t≪ {k−1, D−1\nR, γ−1}) and long-\ntime ( t≫ {k−1, D−1\nR, γ−1}) behaviors are found to be independent of the coupling\nlimits. In the short-time regime, the position variance has a superdiffusive t3growth,\nsimilar to that of a single DRABP, as expected. On the other hand, the tagged particle\nexhibits the universal√\ntsubdiffusive behavior observed in single-file systems at long\ntimes. Contrarily, in the intermediate dynamical regimes, we observe different growth\nexponents in the three coupling limits. In the strong coupling limit, the variance grows\nast5/2during the early-intermediate regime, followed by a√\ntbehavior in the late-\nintermediate regime. The interplay of rotational diffusion and direction reversal gives\nrise to t5/2behavior during the early intermediate regime, which is also observed in\nactive Ornstein–Uhlenbeck particle (AOUP) in the intermediate regime of the strong\ncoupling limit [58]. In the moderate coupling limit, the variance grows as tin the\nearly intermediate regime, which crosses over to a subdiffusive√\ntgrowth in the late\nintermediate regime. In the weak coupling limit, irrespective of the relative order of\nactivity time scale, the variance grows linearly with time [see Table 1].\nFor annealed initial orientation, interestingly, DRandγappear together giving rise\nto one activity time-scale ( DR+ 2γ)−1in addition to the coupling time scale k−1. In\nthis case, there are only two limiting scenarios possible, namely, the strong coupling\nlimit, given by k≫(DR+ 2γ), and the weak coupling limit, given by k≪(DR+ 2γ).\nEvidently, there are three dynamical regimes in each coupling limit [see Table 2]. The\nshort-time ( t≪ {k−1,(DR+ 2γ)−1}) and long-time ( t≫ {k−1,(DR+ 2γ)−1}) behaviors\nare again independent of the coupling limits. In the short-time regime, the position\nvariance of the tagged particle grows as t2, similar to that of an independent DRABP\nwith annealed initial orientation. On the other hand, as expected, at long times the\nvariance grows subdiffusively as√\nt. The behavior in the intermediate regime depends on\nthe relative ordering of the time-scales— in the strong coupling limit, the variance grows\nsuperdiffusively as t3/2, while in the weak coupling limit, a linear growth is observed.\nWe also explore the finite-size effect on the tagged particle position variance. For37\na finite but large system size N, there is an additional time scale tN=N2/kand the\nfinite size effects appear for t≫tN. In this regime, the tagged particle exhibits center\nof mass motion with variance growing linearly with time, as 2( Deff/N)t. The crossover\nfrom the thermodynamic limit t≪tN, to the finite size dominated regime t≫tNis\ncaptured by a scaling behavior of the variance Deffp\nt/k f (t/tN), where the crossover\nfunction f(z) goes to a constant as z→0 and it diverges sublinearly as√zfor large z.\nFinally, we analyze the statistics of the separation yαbetween two consecutive\nparticles αandα+ 1. For a thermodynamically large harmonic chain of passive\nBrownian particles, the separation variables reach an equilibrium state given by the\nBoltzmann distribution, which has a Gaussian product measure. We find that,\nfor a harmonic chain of DRABPs, the activity breaks this product measure in the\nnonequilibrium stationary state, giving rise to nontrivial spatio-temporal correlations\namong the separation variables. First, we derive a series expansion of the spatio-\ntemporal correlation function C(β, τ) = lim t→∞⟨y0(t)yβ(t+τ)⟩in powers of τ. We\nalso show that for large τ,C(β, τ)∼e−β2/(4kτ)/√τ. Futhermore, we show that for large\nactivity, µ=k/(DR+ 2γ)≫1, the spatial correlation C(β,0) decays exponentially.\nAppendix A. Computation of effective noise correlation\nIn this Appendix, we provide the detailed calculation for the auto-correlation of the\neffective noise ξα(t) defined in (6). Since the σαandθαprocesses are independent, it\nsuffices to compute the correlations of σα(t) and cos ( θα(t)) separately and take the\nproduct to get correlation of ξα(t). The propagator for the θα(t) and σ(t) processes are\ngiven by,\nPθ(θα, t|θ0,0) =1√4π D Rtexp\u0014\n−(θα−θ0)2\n4DRt\u0015\n, (A.1)\nand\nPσ(σα, t|σ0,0) =1\n2\u0014\n1 +σασ0e−2γt\u0015\n. (A.2)\nUsing the above propagators, we get the mean and the auto-correlation of the noise for\nboth quenched and annealed initial orientations below.\n(i)Quenched initial orientation : From (A.1) and (A.2), we respectively get,\n\ncosθα(t)\u000b\n=Z∞\n−∞cosθα√4π D Rtexp\u0014\n−(θα−θ0)2\n4DRt\u0015\ndθα= cos θ0e−DRt, (A.3)\nand\n\nσα(t)\u000b\n=X\nσα=±1σα\n2\u0002\n1 +σαe−2γt\u0003\n=e−2γt. (A.4)38\nTherefore, from (6), we have,\n\nξα(t)\u000b\n=v0\ncosθα(t)\u000b\nσα(t)\u000b\n=v0cosθ0e−(2γ+DR)t. (A.5)\nThe two-time auto-correlations can also be calculated similarly, yielding,\n\ncosθα(t1) cosθα(t2)\u000b\n=e−DR|t1−t2|+ cos 2 θ0e−DR(t1+t2+2 min[ t1,t2]), (A.6)\nσα(t1)σα(t2)\u000b\n=e−2γ|t2−t1|, (A.7)\nConsequently,\n\nξα(t1)ξα(t2)\u000b\n=v2\n0\n2\u0002\ne−(DR+2γ)|t1−t2|+ cos 2 θ0e−DR(t1+t2+2 min[ t1,t2])−2γ|t1−t2|\u0003\n.(A.8)\n(ii)Annealed initial orientation : To find the correlations for annealed initial orientations,\nwe average over θ0with respect to a uniform distribution in [0 ,2π] in (A.5) and (A.8).\nNoting ⟨cosθ0⟩=⟨cos 2θ0⟩= 0,\n\nξα(t)\u000b\n= 0 and\nξα(t1)ξα(t2)\u000b\n=v2\n0\n2e−(DR+2γ)|t1−t2|. (A.9)\nFrom (A.5), (A.8), and (A.9), it is clear that G(t1, t2)≡\nξα(t1)ξα(t2)\u000b\n−\nξα(t1)\u000b\nξα(t2)\u000b\n, is given by (21) and (22) for the quenched and annealed initial\norientations respectively.\nAppendix B. Computation of Cn(β)\nIn (98), we have expressed the spatio-temporal correlation function of the separation\nvariables C(β, τ) in a power series of τwith coefficients Cn(β). The goal of this appendix\nis to evaluate Cn(β), starting from (101). These coefficients involve Sn(q), defined in\n(102), can be expressed as\nanSn(q) =n−2X\nr=0br+1\nqan−r−1\nbq+a,with a=DR+ 2γ. (B.1)\nWriting br+1\nq= (bq+a−a)r+1and performing binomial expansion in powers of bq+a\nandawe get,\nanSn(q) =n−2X\nr=0r+1X\nm=0(−1)r+1−m\u0012r+ 1\nm\u0013\n(bq+a)m−1an−m. (B.2)\nSeparating the m= 0,1 terms and performing another binomial expansion of ( bq+a)m−1\nform > 1 we get,\nanSn(q) =−(−a)n\nbq+a·1 + (−1)n\n2+(−1)nan−1\n4\u0002\n1 + (2 n−1)(−1)n\u0003\n−n−2X\nr=1r+1X\nm=2m−1X\nl=0(−1)r−m\u0012r+ 1\nm\u0013\u0012m−1\nl\u0013\nbl\nqan−l−1. (B.3)39\nNow, inserting the above expression of Sn(q) in (101) and carrying out the integration\noverqwe get,\nCn(β) =1 + (−1)n\n2C0(β)−\u0014\nn−1−(−1)n\n2\u0015Deff\n2kδβ,0+˜Sn, (B.4)\nwhere we used,\nZπ\n−πdqcos (βq)bl\nq=\n\n(−1)β(2l)! 2πkl\n(l−β)!(l+β)!forl≥β,\n0 for l < β,(B.5)\nand\n˜Sn=Deff\nkn−2X\nr=1r+1X\nm=2m−1X\nl=0(−1)n+β+r−m\u0012r+ 1\nm\u0013\u0012m−1\nl\u0013\u00122l\nl−β\u0013\nµl. (B.6)\nTo evaluate this sum, it is useful to change the order of the summations, which yields,\n˜Sn= (−1)n+βDeff\nkn−2X\nl=0\u00122l\nl−β\u0013\nµln−2X\nr=1r+1X\nm=2(−1)r+m\u0012r+ 1\nm\u0013\u0012m−1\nl\u0013\n, (B.7)\nwhere\u0000m−1\nl\u0001\n= 0 for m < l + 1. Furthermore, it is convenient to separate the l= 0 term\nas,\n˜Sn= (−1)n+βDeff\nk\"n−2X\nl=1\u00122l\nl−β\u0013\nµln−2X\nr=1r+1X\nm=l+1(−1)r+m\u0012r+ 1\nm\u0013\u0012m−1\nl\u0013\n+δβ,0n−2X\nr=1r+1X\nm=2(−1)r+m\u0012r+ 1\nm\u0013#\n. (B.8)\nThe summations over randmcan be performed explicitly, yielding,\n˜Sn= (−1)n+β+1Deff\nk\"n−2X\nl=11 + (−1)l+n\n2\u00122l\nl−β\u0013\nµl+1\n4δβ,0\u0000\n1−(2n−3)(−1)n\u0001#\n.\n(B.9)\nCombining (B.4) and (B.9) we get,\nCn(β) =1 + (−1)n\n2\u0014\nC0(β)−Deff\nkδβ,0\u0015\n−(−1)n+βDeff\nkn−2X\nl=11 + (−1)l+n\n2\u00122l\nl−β\u0013\nµl,\n(B.10)\nwhere,\u00002l\nl−β\u0001\n= 0 for l < β . Note that the term containing the summation over lcon-\ntributes only for n≥3. For n= 2, we have (103) whereas for n≥3 we get (104) in the\nmain text.40\nAppendix C. Some useful integrals and sums\nFor the convenience of the readers, we present a collection of integrals and summations,\nthat appear in the main text, below.\nZ∞\n−∞dze−(z2+a2)\na2+z2=π\na(1−erf(a)), (C.1)\nZ∞\n−∞dz(e−a2e−z2−e−2z2)\na2−z2=π\nae−2a2h\nerfi(a)−erfi(√\n2a)i\n, (C.2)\nZ∞\n−∞dze−a2−e−2z2\na2−2z2=−π√\n2ae−a2erfi(a), (C.3)\nZ∞\n−∞dze−(z2+b2)−e−a2\na2−b2−z2=π√\nb2−a2e−a2erf\u0010√\nb2−a2\u0011\n, (C.4)\nZ∞\n−∞dz\"\ne−a−e−z2\na−z2#2\n=−πe−2a\na3/2\"\n(2a+ 1) erfi\u0000√a\u0001\n−\u0012\n2a+1\n2\u0013\nerfi\u0010√\n2a\u0011#\n−√\n2π\na\u0010\n1−√\n2e−a\u0011\n,(C.5)\n∞X\nm=0Γ\u0000\nm+1\n2\u0001\n√π m!am=1√1−a, (C.6)\n∞X\nm=0Γ\u0000\nm+n+1\n2\u0001\n√π(m+n)!am=Γ(n+ 1/2)√π n!2F1\u0012\n1, n+1\n2; 1 + n;a\u0013\n. (C.7)\nIntegrals (C.1)-(C.5) are used in Sec. 4.3 to derive (39) in the strong coupling limit,\nby taking appropriate limit in (32). Summations (C.6)-(C.7) is used in Sec. 4.4, i.e.,\nweak coupling limit, to evaluate the sum in (49).\nReferences\n[1] Jepsen D W 1965 J. Math. Phys. 6405\n[2] Lebowitz J and Percus J 1967 Phys. Rev. 155122\n[3] Lebowitz J and Sykes J 1972 J. Stat. Phys. 6157\n[4] Roy A, Narayan O, Dhar A and Sabhapandit S 2013 J. Stat. Phys. 150851\n[5] Roy A, Dhar A, Narayan O and Sabhapandit S 2015 J. Stat. Phys. 16073\n[6] Harris T E 1965 J. Appl. Probab. 2323\n[7] Van Beijeren H, Kehr K and Kutner R 1983 Phys Rev. B 285711\n[8] Percus J K 1974 Phys Rev. A 9557\n[9] R¨ odenbeck C, K¨ arger J and Hahn K 1998 Phys. Rev. E 574382\n[10] Levitt D G 1973 Phys Rev. A 83050\n[11] Arratia R 1983 Ann. Probab. 11362\n[12] Liggett T M 2012 Interacting Particle Systems (Springer New York, NY)41\n[13] Spitzer F 1991 Random Walks, Brownian Motion, and Interacting Particle Systems (Birkh¨ auser\nBoston, MA)\n[14] Ferrari P A 1986 Ann. Probab. 141277\n[15] Richards P M 1977 Phys. Rev. B. 161393\n[16] Ferrari P A and Fontes L 1998 Electron. J. Probab. 31\n[17] Rajesh R and Majumdar S N 2001 Phys. Rev. E. 64036103\n[18] Alexander S and Pincus P 1978 Phys. Rev. B 182011\n[19] Buttiker M and Landauer R 1980 J. Phys. C: Solid State Phys. 13L325\n[20] De Masi A and Ferrari P 1985 J. Stat. Phys. 38603\n[21] Majumdar S and Barma M 1991 Phys. Rev. B 445306\n[22] Majumdar S and Barma M 1991 Phys. A: Stat. Mech 177366\n[23] Derrida B, Evans M and Mukamel D 1993 J. Phys. A Math. Gen. 264911\n[24] Derrida B and Mallick K 1997 J. Phys. A Math. Gen. 301031\n[25] Gupta S, Majumdar S N, Godr` eche C and Barma M 2007 Phys. Rev. E 76021112\n[26] Kollmann M 2003 Phys. Rev. Lett. 90180602\n[27] Krapivsky P, Mallick K and Sadhu T 2014 Phys. Rev. Lett. 113078101\n[28] Sadhu T and Derrida B 2015 J. Stat. Mech. Theory Exp. 2015 P09008\n[29] Hegde C, Sabhapandit S and Dhar A 2014 Phys. Rev. Lett. 113120601\n[30] Grabsch A, Berlioz T, Rizkallah P, Illien P and B´ enichou O 2023 Phys. Rev. Lett 132037102\n[31] Kundu A and Cividini J 2016 EPL11554003\n[32] Galanti M, Fanelli D, Maritan A and Piazza F 2014 Europhysics Letters 10720006\n[33] Rizkallah P, Grabsch A, Illien P and B´ enichou O 2023 J. Stat. Mech. Theory Exp. 2023 013202\n[34] Gupta S, Rosso A and Texier C 2013 Phys. Rev. Lett. 111210601\n[35] Ben-Naim E and Krapivsky P 2009 Phys. Rev. Lett. 102190602\n[36] Teomy E and Metzler R 2019 J. Phys. A Math. Theor. 52385001\n[37] Galanti M, Fanelli D and Piazza F 2013 Eur. Phys. J. B 861\n[38] Lacoste D and Lomholt M A 2015 Phys. Rev. E 91022114\n[39] Ramaswamy S 2010 Annu. Rev. Condens. Matter Phys. 1323\n[40] Marchetti M C, Joanny J F, Ramaswamy S, Liverpool T B, Prost J, Rao M and Simha R A 2013\nRev. Mod. Phys. 851143\n[41] Fodor ´E, Nardini C, Cates M E, Tailleur J, Visco P and Van Wijland F 2016 Phys. Rev. Lett. 117\n038103\n[42] Romanczuk P, B¨ ar M, Ebeling W, Lindner B and Schimansky-Geier L 2012 Eur. Phys. J. Spec.\nTop.2021\n[43] Bechinger C, Di Leonardo R, L¨ owen H, Reichhardt C, Volpe G and Volpe G 2016 Rev. Mod. Phys.\n88045006\n[44] Fodor ´E and Marchetti M C 2018 Phys. A: Stat. Mech. Appl. 504106\n[45] Dhar A, Kundu A, Majumdar S N, Sabhapandit S and Schehr G 2019 Phys. Rev. E 99032132\n[46] Basu U, Majumdar S N, Rosso A and Schehr G 2018 Phys. Rev. E 98062121\n[47] Santra I, Basu U and Sabhapandit S 2020 Phys. Rev. E 101062120\n[48] Szamel G 2014 Phys. Rev. E. 90012111\n[49] Basu U, Majumdar S N, Rosso A and Schehr G 2018 Phys. Rev. E 98062121\n[50] Basu U, Majumdar S N, Rosso A and Schehr G 2019 Phys. Rev. E 100062116\n[51] Santra I, Basu U and Sabhapandit S 2020 J. Stat. Mech. Theor. Exp. 2020 113206\n[52] Santra I, Basu U and Sabhapandit S 2023 J. Stat. Mech. Theory Exp. 2023 033203\n[53] Sevilla F J 2020 Phys. Rev. E 101022608\n[54] Basu U, Majumdar S N, Rosso A, Sabhapandit S and Schehr G 2020 J. Phys. A: Math. Theor.\n5309LT01\n[55] Majumdar S N and Meerson B 2020 Phys. Rev. E 102022113\n[56] Santra I, Basu U and Sabhapandit S 2022 J. Phys. A: Math. Theor. 55385002\n[57] Martin D and de Pirey T A 2021 J. Stat. Mech. Theory Exp. 2021 04320542\n[58] Singh P and Kundu A 2021 J. Phys. A: Math. Theor. 54305001\n[59] Marconi U M B, L¨ owen H and Caprini L 2024 ( Preprint arXiv:2401.07972 )\n[60] Chaki S and Chakrabarti R 2019 J. Chem. Phys. 150094902\n[61] Santra I, Basu U and Sabhapandit S 2021 Phys. Rev. E 104L012601\n[62] Santra I, Basu U and Sabhapandit S 2021 Soft Matter 1710108\n[63] Zygmund A 2002 Trigonometric Series v. 1 (Cambridge University Press)" }, { "title": "2402.11970v1.Port_Hamiltonian_modeling_and_control_of_a_curling_HASEL_actuator.pdf", "content": "Port-Hamiltonian modeling and control of\na curling HASEL actuator⋆\nNelson Cisneros ,Yongxin Wu ,Kanty Rabenorosoa ,\nYann Le Gorrec\nFEMTO-ST institute, UBFC, CNRS, Besan¸ con, France.(emails:\nnelson.cisneros@femto-st.fr, yongxin.wu@femto-st.fr,\nrkanty@femto-st.fr, yann.le.gorrec@femto-st.fr)\nAbstract: This paper is concerned with the modeling and control of a curling Hydraulically\nAmplified Self-healing Electrostatic (HASEL) actuator using the port-Hamiltonian (PH) ap-\nproach. For that purpose, we use a modular approach and consider the HASEL actuator as an\ninterconnection of elementary subsystems. Each subsystem is modeled by an electrical compo-\nnent consisting of a capacitor in parallel with an inductor connected through the conservation\nof volume of the moving liquid to a mechanical structure based on inertia, linear, and torsional\nsprings. The parameters are then identified, and the model is validated on the experimental\nsetup. Position control is achieved by using Interconnection and Damping Assignment-Passivity\nBased Control (IDA-PBC) with integral action (IA) for disturbance rejection. Simulation results\nshow the efficiency of the proposed controller.\nKeywords: Soft actuator, HASEL actuator, Port-Hamiltonian systems, IDA-PBC design.\n1. INTRODUCTION\nIn recent years, one of the most interesting technologies\nthat have been developed for soft robotic applications\nis the Hydraulically Amplified Self-healing Electrostatic\n(HASEL) actuator (Acome et al., 2018).\nHASEL actuators blend the advantages of Dielectric Elas-\ntomer Actuators (DEAs) and fluid-driven soft actuators,\ncombining the convenience of electrical control, excellent\nelectromechanical performances, extensive design flexibil-\nity, and various actuation modes (Rothemund et al., 2021).\nThere are different types of HASEL actuators, such as\npeano, planar, elastomeric donut, quadrant donut, high-\nstrain peano, and curling actuators. Some interesting\napplications of HASEL actuators can be found in the\nliterature: a soft gripper for aerial object manipulation\n(Kim and Cha, 2021), an actuator powering a robotic\narm (Acome et al., 2018), an electro-hydraulic rolling soft\nwheel (Ly et al., 2022), a peano actuator for enhanced\nstrain, load, and rotary motion (Tian et al., 2022) and soft-\nactuated joints based on the hydraulic mechanism used in\nspider legs (Kellaris et al., 2021).\nIn this paper, we consider, as a benchmark the design,\nmodeling, and control of a simple curling HASEL actuator\nthat can be used as a basic element in more complex\nrobotic structures such as robotic hands or soft grip-\npers. The considered curling HASEL actuator is based\non a strain limiting layer that is added to the traditional\nHASEL mechanism (Acome et al., 2018) to change its mo-\ntion from linear to angular deformation (Rothemund et al.,\n2021). It is important to derive a reliable model represent-\ning the system’s dynamics to control the actuator. Many\n⋆This work is supported by the EIPHI Graduate School (contract\nANR-17-EURE-0002).papers dealing with the modeling of HASEL actuators\nhave been recently proposed in the literature. In (Volchko\net al., 2022), Dynamic Mode Decomposition with Control\n(DMDc) is applied to derive a linear model, approximating\nthe system’s dynamics. In (Hainsworth et al., 2022), a non-\nlinear reduced-order mass-spring-damper (MSD) model\nfor a linear HASEL actuator is proposed. However, these\nworks do not take into account the non-linear behavior\n(such as the drift effect) or electrical dynamics of HASEL\nactuators in the model, which can make the control design\nmore challenging and difficult to implement in a real-world\napplication.\nPort-Hamiltonian (PH) formulations are particularly well\nadapted to represent multi-physical systems. The PH ap-\nproach is then an excellent candidate to represent the\nconsidered dynamics of the HASEL actuator. Intercon-\nnection and Damping Assignment-Passivity Based Control\n(IDA-PBC) serves as a highly effective tool for generating\nasymptotically stabilizing controllers for Port-Controlled\nHamiltonian (PCH) models. (Ortega et al., 2002). Pre-\nvious works used PHS to model soft robots with energy\nshaping and IDA-PBC controllers, showing good results.\nIn (Franco et al., 2021b) and (Franco et al., 2021a), energy\nshaping controllers are used to control the position of\na soft continuum manipulator with a large number of\ndegrees of freedom (DOF). In (Ayala et al., 2022), the\nIDA-PBC method has been successfully used to control\na nonlinear Cosserat rod model using an early lumping\napproach. More recently, in (Yeh et al., 2022), a PH for-\nmulation of a one DOF of HASEL planar actuator with\nposition control using an IDA-PBC with Integral Action\n(IA) has been proposed. Compare to (Yeh et al., 2022) we\nconsider here an actuator with bending motion instead of\nlinear deformation. This introduces nonlinearities in thearXiv:2402.11970v1 [math.DS] 19 Feb 2024interconnection matrix. Furthermore, we aim to capture\nthe end position drift effect. The main contributions of\nthis paper are:\n•We modeled a curling HASEL actuator using the\nport-Hamiltonian approach to capture the actuator’s\nelectrical and mechanical dynamics.\n•We identified the model compared with experimental\ndata and validated it with different input voltages.\n•We designed an IDA-PBC controller with integral\naction to control the end point position of the curling\nHASEL actuator and reject the input disturbances.\nThis paper is organized as follows: Section 2 presents the\nexperimental setup of the curling HASEL actuator and\nits modeling under the PH framework. The parameter\nidentification is detailed in Section 3. In Section 4, the\ncontroller design is presented. Section 5 presents the sim-\nulation results, and the conclusions are given in Section\n6.\n2. CURLING HASEL ACTUATOR AND ITS PH\nMODELING\nIn this section, we first introduce the experimental curling\nHASEL actuator that is used as a benchmark. We de-\nscribe the setup and its working principle with reasonable\nhypotheses that will be used for modeling purposes. We\nthen derive the PH model for this actuator.\n2.1 Experimental setup\nThe experimental setup is shown in Fig. 1. To measure the\nposition, we use a profile laser sensor, Keyence LJ-V7080.\nWe use the high voltage amplifier Trek model 610E. The\nHASEL actuator used in this work comes from Artimus\nRobotics . We use a dSPACE card CLP1104 to receive\nand send signals from/to the laser position sensor and\nhigh voltage amplifier. The pictures of Fig. 1 (right) show\nFig. 1. Experimental setup laser sensor and curling\nHASEL.the deformation of the actuator without (upper figure)\nand with an applied voltage (lower figure). Applying high\nvoltage, the actuator can achieve a horizontal displacement\nof approximately 3 cm.\n2.2 Curling HASEL actuator description and hypothesis\nThe curling HASEL actuator consists of a polymer shell\nfilled with dielectric liquid and half covered by a pair of\nelectrodes attached to a strain-limiting layer to get the\nbending motion. When an electric field is applied to the\nelectrodes, it creates Maxwell stress acting on the shell\nthat pushes the dielectric liquid inside the shell. This\nhydraulic pressure changes the shape of the shell and,\nfrom the strain-limiting layer, induces the bending of the\nactuator (Rothemund et al., 2021).\nWe consider that the actuator depth is uniform, so we\nproceed to a two-dimensional analysis. We model the\nactuator using interconnected subsystems. We separate\neach subsystem model into a chamber and a shell (cf Fig.\n2).\nFig. 2. Basic subsystem. Left: electrodes are totally un-\nzipped. Right: Electrodes are partially zipped when\nvoltage is applied. The shell is deformed.\nThe chamber is the area between the electrodes whilst\nthe shell receives the dielectric liquid when the electrodes\nare zipped. The total volume (the shell’s volume plus\nthe chamber’s volume) is considered constant, and the\ndielectric liquid is incompressible. The bending of the\nbottom film is modeled as a torsional spring. The top\nfilm of the shell is considered to be elongable and contains\nmechanical energy. The elongation is modeled as a linear\nspring. The shell will take on a specific shape based on the\nvolume transferred from the chamber to the shell, resulting\nfrom the zipping of the electrodes, which takes place\nwhen high voltage is applied. The electrodes are modeled\nas a variable capacitor. The model considers a variable\nlength of the zipped electrodes. The distance between the\nunzipped electrodes part is considered constant, see Fig.\n2.\n2.3 Geometric relations\nIn this part, we present the relations existing between\nthe angle θand the length of the zipped electrodes le.\nThen, we derive the actuator position h(θ) from θ, i.e.,\nthe displacement of the end position of the actuator.\nIt is crucial to obtain a relation between θandlebecause\nthe electrode’s capacitance depends on le. Therefore, it\nallows us to relate the electrical charge, that depends\non the capacitance, with the derivative of the electricalenergy respecting the angle θ, joining the electrical and\nthe mechanical part.\nWe represent the chamber as a rectangular area and the\nshell is modeled as two symmetric triangles. Fig. 2 shows\nthe model variables of a basic subsystem.\nThe area inside the shell is equal to:\nAs=1\n4lpLvsin(δ1) (1)\nwith\nδ1=π+θ\n2−sin−1\u0012Lv\nlpsin\u0012π−θ\n2\u0013\u0013\n. (2)\nThe total area is:\nAT=As+Xh(Le−le), (3)\nwhere Lvandlpare the lengths of the bottom and the top\nfilm. Xhis the height of the chamber and Leis the length\nof the chamber.\nThe zipped electrodes length is then:\nle=Le−1\nXh\u0012\nAT−Lvlp\n4sin(δ1)\u0013\n. (4)\n2.4 Curling HASEL port-Hamiltonian model\nThis section presents the port-Hamiltonian model for the\ncurling HASEL actuator. PH formulations consist in using\nthe energy variables as state variables and in writing the\ndynamics of the system on the form (van der Schaft, 2000):\n˙x= [J(x)−R(x)]∂H\n∂x(x) +g(x)u;\ny=gT(x)∂H\n∂x(x),(5)\nwhere J(x) =−JT(x) is the interconnection matrix,\nR(x) = RT(x)≥0 is the dissipation matrix and His\nthe total energy of the system (Hamiltonian).\nBy combining basic subsystems, we can represent the\noverall dynamic behavior of the HASEL actuator. In what\nfollows we consider four subsystems (cf Fig. 3) but the\nmodel can be extended to n∈Nsubsystems. We consider\nthat the subsystems share the same input voltage. The\ntotal energy of the system is given by:\nH(θ, lp, p, ϕ, Q ) =Hθ(θ) +Hlp(lp) +Hg(θ)+\nHp(p) +Hϕ(ϕ, Q)+HQ(Q, ϕ, θ, l p),(6)\nwhere\nHθ=1\n2nX\ni=1Kbiθ2\ni=1\n2θTKbθ (7)\nis the potential energy where Kb= diag[ Kb1Kb2. . . K bn]\nis the stiffness matrix and θ= [θ1θ2. . . θ n] represents\nthe angular vector of each subsystem, the second term is\nthe potential energy related to the linear springs:\nHlp=1\n4nX\ni=1Ki(lpi−Lpi)2=1\n4(lp−Lp)TK(lp−Lp),(8)hUin\nac1\na1\nm1\nm2\nm3\nm4θ1\nθ2\nθ3\nθ4hvert\nFig. 3. Four interconnected subsystems. The same voltage\nis applied to the entire system.\nwhere K= diag[ K1K2. . . K n] and lT\np= [lp1lp2. . . l pn],\nthe third term is the total potential energy related to\ngravity:\nHg=nX\ni=1Hgi, (9)\nand the fourth term the kinetic energy:\nHp=1\n2pTM−1p, (10)\nwhere Mis the matrix of inertia and pis the vector of\nangular momentum pT= [p1p2. . . p n].\nThe electrical energy has two components: the energy\nrelated to the magnetic flux that allows us to represent\nthe drift effect and the energy related to the charge. The\ninductor discharges the capacitor over time.\nHϕ=1\n2nX\ni=1ϕ2\ni\nLi=1\n2ϕTL−1ϕ (11)\nThe energy stored in the capacitor is:\nHQ=1\n2nX\ni=1Q2\ni\nCsi=1\n2QTC−1Q, (12)\nwhere ϕT= [ϕ1ϕ2. . . ϕ n] is the magnetic flux, L\nis the inductance of the equivalent electric circuit L=\ndiag[L1L2. . . L n].C= diag[ Cs1Cs2. . . C sn] is the\ncapacitance of the equivalent electric circuit and Q=\n[Q1Q2. . . Q n]Tis the charge. The capacitance of a\nsubsystem is Csi=C1i+C2iwhere C1i=ϵ0ϵrwlei\n2tis\nthe capacitance of the zipped part and C2i=ϵ0ϵrw(Le−lei)\n2t+Xhthe capacitance of the unzipped part.\nThe input gain is gaT= [ga1ga2... ga n]. To capture\nthe system’s nonlinearities, the input gain is a nonlinear\nfunction that depends on the angular position gai=\nγ1cos (γ2θi).\nThe conductance of the equivalent electric circuit is ¯R=\ndiag[1\nR11\nR2...1\nRn]. The damping coefficient of the system\nisb= diag[ b1b2... b n]. The resistance associated to\nthe inductance is rL= diag[ rL1rL2... rLn]. We definethe term d= diag\u0010\n2As\nlp\u0011\n. The proposed port-Hamiltonian\nmodel of the curling HASEL actuator is then:\n\n˙θ\n˙lp\n˙p\n˙ϕ\n˙Q\n\n|{z}\n˙x=\n0 0 I0 0\n0 0 d0 0\n−I−d−b0 0\n0 0 0 −rLI\n0 0 0 −I−¯R\n\n| {z }\nJ−R\n∇θH\n∇lpH\n∇pH\n∇ϕH\n∇QH\n\n|{z}\n∇xH+\n0\n0\n0\n0\n¯Rga(θ)\n\n|{z}\ngUin; (13)\ny= (¯Rga(θ))TC−1Q|{z }\ngT∇xH.\nThe output y=ieis the current that is power-conjugated\nto the input voltage. The energy balance equation can be\nwritten as:\n∂H\n∂t=−∂HT\n∂xR∂H\n∂x+yTu;\n∂H\n∂t≤yTu=ieUin.(14)\nThe displacement for ninterconnected subsystems is com-\nputed as\nh(θ) = (Lv+Le)\nnX\ni=1sin(iX\nj=1θj)\n (15)\n3. MODEL IDENTIFICATION AND VALIDATION\nWe identify the key parameters of the system using the\nexperimental data obtained from the experimental setup\nof Fig. 2.1. The Levenberg–Marquardt algorithm is used to\nfind the parameters Kb,b,L,γ1andγ2. The identification\nresults are shown in Fig. 4 with a fitting of 90 .7%. Two\ndatasets are used to validate the obtained parameters, one\nwith negative inputs and another with positive inputs, as\nshown in Fig. 5.\n0 5 10 15\nTime (seconds)01234h [cm]2 3 422.53\n(a)\n0 5 10 15\nTime (seconds)-6-4-20Voltage [KV] (b)\nFig. 4. (4a) Model identification, fitness: 90.7%. (4b) Input\nsignal.\nThe fitting between the model and the experimental data\nis computed using the normalized root mean squared error\n(NRMSE):\nfit(i) =∥xref(:)−xdata(:)∥\n∥xref(:)−(xref(:))∥(16)\nwhere ∥.∥is the 2-norm of a vector.\nOne can see the identified model can cope with the\nmain dynamics of the considered Curling HASEL actuator\nwith a fitting comprised between 85% and 89 .33%. The\nidentified parameters are listed in Table 1.\n0 5 10 15\nTime (seconds)012345h [cm]\n6 8 102.53(a)\n0 5 10 15\nTime (seconds)-6-4-20Voltage [KV] (b)\n0 5 10\nTime (seconds)-2024h [cm]4 6 822.53\n(c)\n0 5 10\nTime (seconds)0246Voltage [KV] (d)\nFig. 5. (5a) Model validation, negative input fitness:\n85.46% (5b) Input signal. 5c) Model validation, pos-\nitive input fitness: 89.33% (5d) Positive input signal.\nWe can observe the model’s behavior in response to a\nvariation of 10% around the nominal values.\nSymbol Value Units Definition\nLp 0.015 m Length of top film\nLv 0.015 m Length of bottom film\nLe 0.015 m Length of electrodes\nXh 0.002 m Chamber high\nm 0.047 kg Mass\nϵr 2.2 F/m Relative permittivity\nϵ0 8.854x10−12F/m Vacuum permittivity\nw 0.05 m Actuator width\nt 18x10−6 m Film thickness\nRi 10 Ω Resistance\nrL 20 Ω Resistance\nL 150 F Inductance\nK 400 N/m Spring constant\nKb 0.202 Nm/rad Torsional spring constant\nb 0.0199 kgs Damping\nγ1 104.33 - Gain parameter\nγ2 7.67 - Gain parameter\nTable 1. Model parameters.\n4. POSITION CONTROL DESIGN\nIn this work, we aim to control the endpoint position of the\ncurling HASEL actuator (denoted by h). To this end, we\npropose an IDA-PBC design method. This method aims\nto find a state feedback control law β(x) to map the open-\nloop system to a desired closed-loop system of the form:\n˙x= (Jd−Rd)∇xHd (17)\nwith the desired interconnection and damping matrices Jd,\nRdand the desired energy function Hdin the closed-loop\nsystem. The control scheme is shown in Fig. 6.\nThe desired equilibrium points x∗= [θ∗, l∗\np,0, ϕ∗, Q∗]T\nwhich can be computed from the desired endpoint position\nh∗(solving (15)) and the state variables x= [θ, lp, p, ϕ, Q ]T\nare the controller ( β(x)) inputs. We define as desired\ninterconnection and dissipation matrices:IDA-PBC\nControllerβ(x) x\nh(θ)h x∗\nx∗(h∗)h∗\n(J−R)∇xH+β(x)θCurling HASEL\nFig. 6. Closed-loop scheme with the controller β(x) inputs\nare the state variables xand the desired values x∗.\nThe system input is the necessary voltage computed\nby the controller. h(x) (15) is the function that allows\nus to find the final position as a function of each link\nangle.\nJd−Rd=\n0 0 J13 0α1\n0 0 J23 0α2\n−J13−J23−r33J43α3\n0 0 −J430α4\n−α1−α2−α3−α4−r55\n, (18)\nwhere J13,J23,J43,α1,α2,α3andα4are the control de-\nsign parameters to be determined. The desired closed loop\nenergy function is defined from the desired equilibrium\nposition of the actuator as:\nHd= (θ−θ∗)T˜Kb(θ−θ∗) + (lp−l∗\np)T˜K(lp−l∗\np)\n+pTM−1p+ (ϕ−ϕ∗)T˜Kϕ(ϕ−ϕ∗)\n+(Q−Q∗)T˜KQ(Q−Q∗)(19)\nThe derivative of Hdwith respect to xis given by:\n∇xHd=\n˜Kb(θ−θ∗)\n˜K(lp−l∗\np)\nM−1p\n˜Kϕ(ϕ−ϕ∗)\n˜KQ(Q−Q∗)\n. (20)\nTo get the state feedback matching the closed-loop system\nwith a desired PH system ˙ x= (Jd−Rd)∇xHddefined\nabove we need to solve the following matching equation:\ng⊥[J−R]∇xH=g⊥[Jd−Rd]∇xHd, (21)\nwith g⊥is a full rank annihilator of the input matrix g.\nWe choose the annihilator as follows:\ng⊥=\n1 0 0 0 0\n0 1 0 0 0\n0 0 1 0 0\n0 0 0 1 0\n. (22)\nWe find J13,J23,J43as a function of α1,α2,α3andα4.\nJ13=diag((diag( M−1p))−1(M−1p−α1˜KQ(Q−Q∗))); (23)\nJ23=diag((diag( M−1p))−1(dM−1p−α2˜KQ(Q−Q∗))); (24)\nr33=diag((diag( M−1p))−1(∇θH+d∇lpH+bM−1p (25)\n+α3˜KQ(Q−Q∗)−J13˜Kb(θ−θ∗)−J23˜K(lp−l∗\np)\n+J43˜Kϕ(ϕ−ϕ∗))).\nJ43=diag((diag( M−1p))−1(rLL−1ϕ−C−1Q+α4˜KQ(Q−Q∗));\n(26)\nWe obtain the control law considering the next design\nparameters α1=I,α2= 0,α3=Iandα4= 0.\nβ(x) = ( ¯RgaT¯Rga)−1¯RgaT(−˜Kb(θ−θ∗)−M−1p\n−r55˜KQ(Q−Q∗) +L−1ϕ+ (¯RC−1Q)),(27)Given fixed values for l∗\npandθ∗from the desired endpoint\nposition h∗, we can determine Q∗from the model at steady\nstate.\n4.1 Disturbance rejection using Integral Action\nIn this subsection, we propose to improve the robustness of\nthe controller (27) to two types of disturbances acting on\nthe actuator using a structure-preserving integral action.\nThe first one is the unknown mass load, which can be\nregarded as the unactuated external force disturbance\n(du). The other one is the disturbance on the actuated\ninput ( da) i.e. the input voltage. Thus, the disturbed\nclosed-loop system with the previous proposed IDA-PBC\ncontrol law (27) can be written as:\n˙Q\n˙θ\n˙lp\n˙p\n˙ϕ\n= [Jd−Rd]\n∇QHd\n∇θHd\n∇lpHd\n∇pHd\n∇ϕHd\n+\nda\n0\n0\ndu\n0\n, (28)\nwhere the desired interconnection and the damping matrix\nare defined as:\nJd(x) :=\"\nJaa(x)Jau(x)\n−JT\nau(x)Juu(x)#\n=\n0−α1−α2−α3−α4\nα10 0 −J13 0\nα20 0 −J23 0\nα3J13J23 0−J43\nα4J13 0J43 0\n; (29)\nRd(x) :=\"\nRaa(x)Rau(x)\nRT\nau(x)Ruu(x)#\n=\nr550 0 0 0\n00 0 0 0\n00 0 0 0\n00 0r330\n00 0 0 0\n. (30)\nUsing the method described in (Ferguson et al., 2017) we\nchoose the new closed-loop Hamiltonian as:\nHcl=Hd+Kint\n2(Q−xc)2(31)\nand the new closed loop system can be derived as:\n\n˙xa\n˙xu\n˙xc\n= (Jcl−Rcl)\n∇xaHcl\n∇xuHcl\n∇xcHcl\n+\nda\n0\n0\ndu\n0\n0\n. (32)\nThe structure-preserving Integral Action (IA) controller is\nthen given by:\n˙xc=−Rc2(x)∇xaH+ (Jau+Rau)∇xuH,\nuint= [−Jaa+Raa+Jc1(x)−Rc1(x)−\nRc2(x)]∇xaH+ [Jc1(x)−\nRc1(x)]Kint(xa−xc) + 2Rau∇xuH;(33)\nwhere uintis the output of the IA controller. xcis the\nIA controller state. The actuated state is the charge Qm\nwhilst the unactuated states are the angle θ, the length lp,\nthe angular momentum p, and the magnetic flux ϕ.\nFrom Jau=−[α10α30],Jc1=Rc2=Rau= 0 and Rc1=\nr55we obtain the control law:\nuint=−r55Kint(Q−xc);\n˙xc=−(α1˜Kb(θ−θ∗) +α3M−1p).(34)\nwhere the design parameter Kintis chosen as a vector of\ndimensions 1 ×n. The dimension of the controller β(x)IDA-PBC\nController(J−R)∇xH+β(x)+dβ(x) x∗\nx\nIntegral\nactionh(θ)h\ndθ x∗(h∗)h∗\n+\n+Curling HASEL\nFig. 7. Closed-loop scheme with IA.\nis 1×1. The control scheme is shown in Fig. 7 and the\ninterconnection and damping matrix are given by:\nJcl:=\n0Jau0\n−JT\nauJuu0\n0 0 0\n;Rcl:=\"r550r55\n0r330\nr550r55#\n. (35)\n5. NUMERICAL SIMULATION\nIn this section, we validate the proposed control meth-\nods with numerical simulations. The parameters of the\nactuator are given in Table. 1. We implement the IDA-\nPBC controller (27) with the Integral action controller\n(34) to achieve the desired endpoint position of the curling\nactuator. To show the different closed loop dynamics per-\nformances, we vary the tuning parameter ˜Kbwhile keeping\nthe rest of the tuning parameters constant. The controller\nparameters values are r55= diag([0 .1 0.1 0.1 0.1]) and\nKint= [0.5 11 1 .2 0.5]. One can observe the endpoint\nregulation to the desired position in Fig. 8 using the IDA-\nPBC method and the rejection of external disturbances in\nFig. 9 with the IDA-PBC+IA method.\nFig. 8 represents the actuator displacement when ˜Kbis\ntuned, while the parameter ˜KQis fixed to a constant value.\nThe desired endpoint position is h∗(θ) = 2 cm. From\nsimulation results shown in Fig. 8, the response time of\nthe closed-loop system decreases when ˜Kbincreases, since\n˜Kbcan be seen as the actuator’s stiffness in the closed-loop\nsystem.\n0 1 2 3 4\nTime (seconds)012h [cm]S e t p o i n t\nK b = 1 0\nK b = 8\nK b = 6\nK b = 4\nK b = 2\nFig. 8. Position control keeping constant the parameters\n˜KQ= 1000, the set-point equal to 2cm and varying\nthe tuning parameter related with the desired angle\n˜Kb.\nFig. 9 shows the actuator displacement to different desired\nset points. The external unactuated disturbance du=\n−0.04Nm is added at 3s during 2s , and the actuated\ndisturbance da=−30V is added at 7s during 2s (0.3%\nof full scale according to the amplifier specifications). The\nproposed controller with IA can reject the disturbances,\nwhile the controller without IA can not reject these dis-\nturbances. From the simulation results shown in Fig. 9(b),\nit is seen that the applied controlled voltage on the closed\n0 2 4 6 8 10 12\nTime (seconds)00.511.522.5h [cm]\n3 4 51.9822.022.042.06(a)\n0 2 4 6 8 10 12\nTime (seconds)0510Voltage [KV]\n(b)\nFig. 9. (9a) Position control ˜KQ= 1000, ˜Kb= 10 and\nKint= [0 .5 11 1 .2 0.5]. The simulation presents\ndisturbances duanddaat 3sand 7 srespectively. (9b)\nIDA-PBC and IDA-PBC+IA control signals.\nloop actuator always remains below 10kV, which aligns\nwith the physical consistency of the experimental setup.\n6. CONCLUSION\nIn this paper we use the port-Hamiltonian framework\nto model and control a curling HASEL actuator. The\nactuator’s dynamics is divided into two components. The\nmechanical part of the actuator is characterized by linear\nand torsional springs, while the deformable capacitor and\nthe inductor represent the electrical part of the system, the\ncoupling being done through the conservation of volume\nof the overall system. This model can cope with the main\ndynamic behavior of the actuator with nonlinearities such\nas the drift effect. An IDA-PBC controller with the integral\naction is proposed to control the position of the actuator. It\nis shown that the actuator endpoint position follows the set\npoint and that we can adjust the dynamic performances\nby varying the tuning parameters of the controller. The\nuse of integral action has improved the robustness of the\nclosed-loop system against external disturbances.\nThe perspectives of this work are to implement and\nvalidate the proposed IDA-PBC controller with IA in\nthe experimental setup. Furthermore, we intend to model\nand control more complex structures and soft robots\nbased on HASEL actuators (e.g., scorpion, fish, human\nhands-inspired designs) with the interconnection of basic\nsubsystems.\nREFERENCES\nAcome, E., Mitchell, S.K., Morrissey, T.G., Emmett, M.B., Ben-\njamin, C., King, M., Radakovitz, M., and Keplinger, C. (2018).\nHydraulically amplified self-healing electrostatic actuators with\nmuscle-like performance. Science , 359(6371), 61–65.Ayala, E.P., Wu, Y., Rabenorosoa, K., and Le Gorrec, Y. (2022).\nEnergy-based modeling and control of a piezotube actuated opti-\ncal fiber. IEEE/ASME Transactions on Mechatronics , 1–11.\nFerguson, J., Donaire, A., Ortega, R., and Middleton, R.H. (2017).\nNew results on disturbance rejection for energy-shaping controlled\nport-Hamiltonian systems.\nFranco, E., Casanovas, A.G., Tang, J., y Baena, F.R., and Astolfi, A.\n(2021a). Position regulation in cartesian space of a class of inex-\ntensible soft continuum manipulators with pneumatic actuation.\nMechatronics , 76, 102573.\nFranco, E., Garriga-Casanovas, A., Tang, J., y Baena, F.R., and\nAstolfi, A. (2021b). Adaptive energy shaping control of a class of\nnonlinear soft continuum manipulators. IEEE/ASME Transac-\ntions on Mechatronics , 27(1), 280–291.\nHainsworth, T., Schmidt, I., Sundaram, V., Whiting, G.L.,\nKeplinger, C., and MacCurdy, R. (2022). Simulating electro-\nhydraulic soft actuator assemblies via reduced order modeling.\nIn2022 IEEE 5th International Conference on Soft Robotics\n(RoboSoft) , 21–28. IEEE.\nKellaris, N., Rothemund, P., Zeng, Y., Mitchell, S.K., Smith, G.M.,\nJayaram, K., and Keplinger, C. (2021). Spider-inspired electrohy-\ndraulic actuators for fast, soft-actuated joints. Advanced Science ,\n8(14), 2100916.\nKim, S. and Cha, Y. (2021). Double-layered electrohydraulic actua-\ntor for bi-directional bending motion of soft gripper. In 2021 18th\nInternational Conference on Ubiquitous Robots (UR) , 645–649.\nLy, K., Mayekar, J.V., Aguasvivas, S., Keplinger, C., Rentschler,\nM.E., and Correll, N. (2022). Electro-hydraulic rolling soft wheel:Design, hybrid dynamic modeling, and model predictive control.\nIEEE Transactions on Robotics .\nOrtega, R., van Der Schaft, A., Maschke, B., and Escobar, G. (2002).\nInterconnection and damping assignment passivity-based control\nof port-controlled Hamiltonian systems. Automatica , 38(4), 585–\n596.\nRothemund, P., Kellaris, N., Mitchell, S.K., Acome, E., and\nKeplinger, C. (2021). HASEL artificial muscles for a new gener-\nation of lifelike robots—recent progress and future opportunities.\nAdvanced Materials , 33(19), 2003375.\nTian, Y., Liu, J., Wu, W., Liang, X., Pan, M., Bowen, C., Jiang, Y.,\nSun, J., McNally, T., Wu, D., et al. (2022). Peano-hydraulically\namplified self-healing electrostatic actuators based on a novel\nbilayer polymer shell for enhanced strain, load, and rotary motion.\nAdvanced Intelligent Systems , 2100239.\nvan der Schaft, A. (2000). L2-gain and passivity techniques in\nnonlinear control . Springer.\nVolchko, A., Mitchell, S.K., Morrissey, T.G., and Humbert, J.S.\n(2022). Model-based data-driven system identification and con-\ntroller synthesis framework for precise control of siso and miso\nHASEL-powered robotic systems. In 2022 IEEE 5th International\nConference on Soft Robotics (RoboSoft) , 209–216. IEEE.\nYeh, Y., Cisneros, N., Wu, Y., Rabenorosoa, K., and Gorrec, Y.L.\n(2022). Modeling and position control of the HASEL actuator\nvia port-Hamiltonian approach. IEEE Robotics and Automation\nLetters , 7(3), 7100–7107." }, { "title": "2402.12000v2.Thinking_Outside_the_Black_Box__Insights_from_a_Digital_Exhibition_in_the_Humanities.pdf", "content": "Thinking\nOutside\nthe\nBlack\nBo x:\nInsights\nfr om\na\nDigital\nExhibition\nin\nthe\nHumanities\nSebastian\nBarzaghi\n1\n,\nAlice\nBordignon\n2\n,\nBianca\nGualandi\n3\n,\nSilvio\nPeroni\n4\n1\nDepar tment\nof\nCultur al\nHeritage,\nUniversity\nof\nBologna,\nVia\nDegli\nAriani,\n1,\nRavenna,\nItaly\n-\nsebastian.barzaghi2@unibo.it\n2\nDepar tment\nof\nClassical\nPhilology\nand\nItalian\nStudies,\nUniversity\nof\nBologna,\nVia\nZamboni,\n32,\nBologna,\nItaly\n-\nalice.bor dignon2@unibo.it\n3\nDepar tment\nof\nClassical\nPhilology\nand\nItalian\nStudies,\nUniversity\nof\nBologna,\nVia\nZamboni,\n32,\nBologna,\nItaly\n-\nbianca.gualandi4@unibo.it\n4\nDepar tment\nof\nClassical\nPhilology\nand\nItalian\nStudies,\nUniversity\nof\nBologna,\nVia\nZamboni,\n32,\nBologna,\nItaly\n-\nsilvio.per oni@unibo.it\nABSTRACT\nOne\nof\nthe\nmain\ngoals\nof\nOpen\nScience\nis\nto\nmake\nresearch\nmore\nreproducible.\nThere\nis\nno\nconsensus,\nhowever,\non\nwhat\nexactly\n“reproducibility”\nis,\nas\nopposed\nfor\nexample\nto\n“replicability”,\nand\nhow\nit\napplies\nto\ndifferent\nresearch\nfields.\nAfter\na\nshort\nreview\nof\nthe\nliterature\non\nreproducibility/replicability\nwith\na\nfocus\non\nthe\nhumanities,\nwe\ndescribe\nhow\nthe\ncreation\nof\nthe\ndigital\ntwin\nof\nthe\ntemporary\nexhibition\n“The\nOther\nRenaissance”\nhas\nbeen\ndocumented\nthroughout,\nwith\ndifferent\nmethods,\nbut\nwith\nconstant\nattention\nto\nresearch\ntransparency,\nopenness\nand\naccountability.\nA\ncareful\ndocumentation\nof\nthe\nstudy\ndesign,\ndata\ncollection\nand\nanalysis\ntechniques\nhelps\nreflect\nand\nmake\nall\npossible\ninfluencing\nfactors\nexplicit,\nand\nis\na\nfundamental\ntool\nfor\nreliability\nand\nrigour\nand\nfor\nopening\nthe\n“black\nbox”\nof\nresearch.\nKEYWORDS\nReproducible\nresearch,\nreplicability ,\ntransparency ,\nOpen\nScience,\nCultural\nHeritage,\ndigital\ntwin\n1.\nINTRODUCTION\nIn\nthis\ncontribution,\nwe\naim\nto\nanchor\nthe\ndiscussion\naround\nopen\nand\nreproducible\nresearch\nin\nthe\nArts\nand\nHumanities\nby\npresenting\nas\na\ncase\nstudy\nthe\ncreation\nof\nthe\ndigital\ntwin\nof\nthe\ntemporary\nexhibition\n“The\nOther\nRenaissance:\nUlisse\nAldrovandi\nand\nthe\nWonders\nof\nthe\nWorld”\n1\n,\ncurrently\nunder\ndevelopment\nwithin\nthe\nPNRR\nProject\nCHANGES,\nand\nspecifically\nits\nSpoke\n4\n–\nVirtual\ntechnologies\nfor\nmuseums\nand\nart\ncollections\n[1].\nThe\noriginal\nexhibition,\nheld\nin\nPoggi\nPalace\nMuseum\n(Bologna,\nItaly)\nbetween\nDecember\n2022\nand\nMay\n2023,\nconsisted\nof\nmore\nthan\n200\nobjects,\nmostly\nbelonging\nto\nthe\nnaturalist\nUlisse\nAldrovandi\nand\nnever\nexhibited\nbefore.\nThe\ncreation\nof\nthe\ndigital\ntwin\n–\nvia\nthe\nacquisition,\nprocessing,\nmodelling,\nexport,\nmetadata\ncreation,\nand\nupload\nof\nthe\n3D\nmodels\nto\na\nweb-based\nframework\n–\nwas\ndocumented\nthroughout\nin\na\nstructured\nmanner\nin\norder\nto\nmake\nthe\nentire\nprocess\ntransparent\nand\nreproducible.\nIndeed,\nno\nreproducibility\nis\npossible\nwithout\ntransparency,\nor\nthe\ncareful\nand\ncomplete\ndocumentation\nof\nall\nrelevant\naspects\nof\nthe\nstudy\n[6,\np.5].\n2.\nTHEORETICAL\nBACKGROUND\nAND\nRELA TED\nWORKS\nGoodman\nand\ncolleagues\n[6]\nsuggest\nwe\nshould\ntalk\nabout\nthree\ntypes\nof\n“reproducibility”:\n(i)\nmethods\nreproducibility\n,\ni.e.\nthe\nability\nto\nexactly\nreproduce\na\nstudy\nby\nusing\nthe\nsame\nraw\ndata\nand\nthe\nsame\nmethodologies\nto\nobtain\nthe\nsame\nresults,\n(ii)\nresults\nreproducibility\n–\nalso\nreferred\nto\nas\nreplicability\n–\ni.e.\nthe\nability\nto\nobtain\nthe\nsame\nresults\nfrom\nan\nindependent\nstudy\nusing\nthe\nsame\nmethodologies\nas\nthe\noriginal\nstudy,\nand\n(iii)\ninferential\nreproducibility\n,\ni.e.\n“the\ndrawing\nof\nqualitatively\nsimilar\nconclusions\nfrom\neither\nan\nindependent\nreplication\nof\na\nstudy\nor\na\nreanalysis\nof\nthe\noriginal\nstudy”.\nIn\nexplaining\nhow\nthis\ndiffers\nfrom\nthe\ntwo\ncategories\npreviously\ndescribed,\nthe\nauthors\nadd\nthat\nscientists\nmight\n“draw\nthe\nsame\nconclusions\nfrom\ndifferent\nsets\nof\nstudies\nand\ndata\nor\ncould\ndraw\ndifferent\nconclusions\nfrom\nthe\nsame\noriginal\ndata,\nsometimes\neven\nif\nthey\nagree\non\nthe\nanalytical\nresults”\n[6,\np.4].\nThe\nreasons\ncan\nbe\na\npriori\n,\nsuch\nas\na\ndifferent\nassessment\nof\nthe\nprobability\nof\nthe\nhypothesis\nbeing\nexplored,\nor\ncan\nbe\nlinked\nto\ndifferent\nchoices\nabout\nhow\nto\nanalyse\nand\nreport\ndata.\nThis\nthird\ntype\nof\nreproducibility\n–\nwhich\nis\nalso\nthe\nmost\nimportant\naccording\nto\n1\nhttps://site.unibo.it/aldrovandi500/en/mostra-l-altro-rinascimentothe\nauthors\n–\nmight\nbe\nthe\nmost\ncommon\nwhen\ntalking\nabout\nresearch\nreproducibility\nin\nthe\nhumanities.\nPeels\nand\nBouter\n[12]\nlook\nat\nhow\nthese\nconcepts\ncan\nbe\napplied\nto\nthe\nhumanities,\na\nfield\nthat\nhas\noften\nbeen\noverlooked\nwhen\ntalking\nabout\nreproducible\nresearch.\nThey\nprefer\nthe\nterms\n“replicability”\nand\n“replication”,\nand\nagain\nthey\ndefine\nthree\ndifferent\nlevels:\n(i)\nreanalysis\n,\nthat\nis\nGoodman\net\nal.’s\nmethods\nreproducibility\n,\n(ii)\ndirect\nreplication\n,\nwhere\nthe\nsame\nstudy\nprotocol\nis\napplied\nto\nnew\ndata,\nand\n(iii)\nconceptual\nreplication\n,\nwhere\nresearch\ndata\nare\nnew\nand\nthe\nstudy\nprotocol\nis\nmodified\n[12].\nThese\ndefinitions\ndo\nnot\nperfectly\noverlap\nwith\nthose\nseen\nbefore\nbut\nwhat\nis\ncrucial\nto\nnote\nhere\nis\nthat\nthe\nauthors\nfind\nthat,\nwhile\nreplication\ncan\ntake\nvarious\nforms\nacross\nthe\nhumanities,\nit\nis\nnot\nfundamentally\ndifferent\nfrom\nreplication\nin\nthe\nbiomedical,\nnatural,\nand\nsocial\nsciences\nand\ncan\nbe\nachieved\nby\npre-registering\nthe\nstudies,\nand\ndocumenting\nand\nsharing\nmethodologies\nand\ndata\n[12].\nThanks\nto\nspecific\nfunding\nfrom\nthe\nresearch\nfunder\nNWO\n2\n,\na\ngroup\nof\nDutch\nresearchers\nconducted\nreplication\nstudies\nin\na\nnumber\nof\ndisciplines,\nincluding\nthe\nhumanities,\nand\nrecently\npublished\na\nset\nof\nrecommendations\nand\nlessons\nlearned\n[3].\nThey\nfound\nthat\nin\nall\ncases\nreplication\nstudies\nhelp\ncorroborate\nthe\nfindings\nof\nthe\noriginal\nstudies\n(e.g.,\nextending\nthe\nnumber\nof\nsources\nor\nusing\na\nmore\nstate-of-the-art\napproach)\nand\ncan\nprovide\na\nmore\nthorough\nunderstanding\nof\nthe\nrelevant\nresearch\nfield\nand\nthe\navailable\nmethodological\nchoices\n[3,\npp.6-7].\nThey\nalso\nnote,\nhowever,\nthat\n“even\nexperienced,\nhighly\nconscientious\nresearchers\noften\nfind\nit\ndifficult\nto\ndocument\ntheir\nprotocols\nin\nenough\ndetail\nto\nsupport\ndirect\nreplication”\n[3,\np.8].\nThose\nopposing\nthe\napplication\nof\nthe\nreproducibility\nor\nreplicability\ncategories\nacross\nall\nresearch\nareas\ncite\nthe\nfact\nthat,\nin\nseveral\nhumanities\ndomains,\nresearchers\nmay\nlack\ncontrol\nover\nthe\nexperimental\nconditions\nof\nthe\noriginal\nstudy,\nor\nhave\ndifferent\nviewpoints\nthat\nproduce\ndifferent\ndata\nand\ninterpretations\n[9,\npp.12-13;\n13,\np.7].\nCarefully\ndocumenting\nthe\noriginal\nstudy\ndesign,\ndata\ncollection\nand\nanalysis,\nand\nreflecting\non\nall\npossible\ninfluencing\nfactors\nis\nfundamental\nfor\nreliability\nand\nrigour\nbut\ndoes\nnot\nautomatically\nensure\nreplicability\n[13,\np.10].\nIndeed,\naccording\nto\nthis\nview,\nto\nrequire\nreplicability\nof\nall\nepistemic\ncultures\nis\nharmful\nand\nimposes\n“universal\npolicies\nthat\nfail\nto\naccount\nfor\nlocal\n(epistemic)\ndifferences”,\nultimately\ndenying\nauthority\n–\nand\nrelated\nrewards\n–\nto\nresearchers\nin\nthe\nhumanities.\nOn\nthe\nother\nhand,\nthe\n“umbrella\nof\nOpen\nScience”\nis\nwide\nenough\nand\nits\n“accountability\ntoolbox”\nis\nbig\nenough\nto\ndevelop\nplural\nmethods\nfor\nassessing\nthe\nquality\nof\ndiverse\nresearch\npractices\n[13,\np.12].\nLeaving\nthis\ndiscussion\naside\nfor\nnow,\nin\nan\nincreasingly\nopen\nresearch\nenvironment,\nwell-defined\npractices\nare\nessential\nfor\nensuring\ntransparency,\nreliability,\nand\nequitable\naccess\nto\nresearch\noutcomes.\nIn\nthe\ncase\nof\nthe\ndigital\ntwin\nof\n“The\nOther\nRenaissance”\nexhibition,\nwe\nlooked\nfor\nsome\noperational\nindications\non\nhow\nto\nachieve\nthis\ngoal\nin\nthe\nliterature\nproduced\nin\nresearch\nfields\nrelevant\nto\nthe\nproject.\nWilson\net\nal.\n[16]\noutline\na\nset\nof\nrecommendations\nfor\nscientific\ncomputing,\napplicable\nacross\ndifferent\ndisciplines\nand\nat\nvarying\nlevels\nof\ncomputational\nexpertise.\nRegarding\ndata\nmanagement\npractices,\ntheir\nsuggestions\nfocus\non\nthe\nimportance\nof\nincremental\ndocumentation\nand\ndata\ncleaning.\nIn\nparticular,\nthey\nadvocate\nfor\ncontinuous\nretention\nof\nraw\ndata,\nrobust\nbackup\nstrategies,\ndata\nmanipulation\nfor\nimproving\nmachine\nand\nhuman\nreadability\nand\nfacilitating\nanalysis,\nmeticulous\nrecording\nof\nthe\nsteps\nused\nto\nprocess\ndata,\nusing\nmultiple\ntables\nin\na\nway\nthat\neach\nrecord\nin\none\ntable\nis\ninterlinked\nwith\nits\nrespective\nrepresentation\nin\nanother\ntable\nvia\na\nunique\nand\npersistent\nidentifier,\nand\nusing\nrepositories\nthat\nissue\nDOIs\nto\nthe\nvarious\ndata\nartefacts\nused\nand\nproduced\nfor\neasy\naccess\nand\ncitation.\nIn\nthe\narchaeological\ncontext,\nKaroune\nand\nPlomp\n[8]\nidentify\nthree\ndistinct\nlevels\nof\nworkflow\nto\nmake\nresearch\nactivities\nreproducible,\ndepending\non\nthe\ncomputational\nskills\nrequired\nto\ncarry\nout\nsuch\nactivities.\nPublic\naccess\nto\nresearch\nmaterials\nand\nmethods\nis\nfacilitated\nby\nthe\nfirst\nlevel,\nwhich\nconsists\nof\ntransparent\nrecording\nthrough\ndocumentation,\nrequiring\nonly\nthe\ncreation\nand\nmaintenance\nof\na\nwritten\nrecord\nof\neach\nanalysis\nstep,\ndone\nin\na\nformat\nthat\nallows\nother\npeers\nto\nread,\ncomprehend,\nand\nreplicate\nthe\nwork\ndone,\nwhile\nrequiring\nthe\nleast\namount\nof\ncomputational\nexpertise.\nOutputs\nat\nthis\nlevel\nof\nworkflow\nusually\ninclude\ndocuments\ndescribing\nthe\nmethods\nand\nprocesses,\nraw\ndata\nfiles,\nand\nanalysis\noutput\nfiles.\nEnsuring\nversion\ncontrol\nthrough\na\nshared\nfile\nnaming\nsystem\nand/or\nsoftware\nwith\nhistory\ntracking\nis\nalso\na\ncommon\ncharacteristic\nof\ntransparent\nrecording\nsince\nit\nfacilitates\nthe\ndocumentation\nof\nthe\nprocess\nas\na\nwhole.\n3.\nMAKING\nTHE\nDIGITISA TION\nPROCESS\nMORE\nTRANSP ARENT\nTo\nensure\na\nsolid\nbasis\nfor\ntransparency\nand\nreplicability,\nour\napproach\nclosely\nfollowed\nthe\naforementioned\nsets\nof\nbest\npractices,\nin\nline\nwith\nthe\nindications\nlisted\nin\nthe\nData\nManagement\nPlan\nof\nthe\nproject\n[7].\nThe\ndigitisation\nworkflow\ninvolved\ncreating\ntwo\ndatasets\nas\nGoogle\nSheet\nfiles\nshared\nbetween\nthe\nteam\nmembers:\none\n(Object\nTable,\nor\nOT)\nfor\nstoring\ncatalogue\ndescriptions\nof\nthe\nphysical\nobjects\nin\nthe\ncollection,\nthe\nother\n(Process\nTable,\nor\nPT)\nfor\nstoring\ndata\nabout\nthe\ndigitisation\nprocess.\nAfter\ndefining\nthe\nstructure\nof\nthe\ntables,\nthe\nvariables\nrepresented\nby\ntheir\nheadings,\nand\nthe\nexpected\nrepresentation\nfor\neach\nvalue,\nthe\ndata\nwere\npopulated\nin\nparallel\nby\nthe\nteam\nmembers.\nOn\nthe\none\nhand,\nthe\nOT\nwas\npopulated\nwith\ndata\ngleaned\nfrom\nofficial\nmuseum\nrecords\nand\npreliminary\nnotes\nrelated\nto\nthe\nexhibition\n2\nhttps://www .nwo.nl/en/researchprogrammes/replication-studiesobjects,\nand\nthus\nwas\nstructured\naround\na\ncataloguing\ndescription\nof\neach\nobject\n(e.g.\n“title”,\n“author”,\nand\nso\non).\nWhere\npossible,\ncontrolled\ndata\nvalues\n(e.g.\npeople\nnames,\nterms\nused\nfor\nobject\ntypes,\netc.)\nwere\naligned\nwith\nexisting\nvocabularies\n(such\nas\nWikiData\n3\n)\nand\nauthority\nlists\n(like\nVIAF\n4\nand\nULAN\n5\n).\nOn\nthe\nother\nhand,\nthe\nPT\nwas\npopulated\nwith\ndata\ninserted\nby\nthe\nresearchers\nduring\nthe\nacquisition\nof\nthe\nobjects\nand\nthe\ncreation\nof\ntheir\n3D\nmodels\nand,\nthus,\nwas\nstructured\naround\nthe\nsteps\ninvolved\nin\nthe\noverall\ndigitisation\nprocess\nand\ntheir\nrelevant\nattributes.\nOverall,\nthe\nsteps\ninclude\nan\ninitial\nacquisition\nactivity\nfor\ncapturing\nanalogue\nmaterials\nand\nrealising\ntheir\npreliminary\ndigital\nrepresentations,\nand\na\nseries\nof\nsubsequent\nactivities\n(\nprocessing\n,\nmodelling\n,\nexport\n,\nmetadata\ncreation\n,\nand\nupload\n)\nwhich\ninvolved\nthe\nuse\nof\ntools\nfor\nrefining\nand\npublishing\nthe\n3D\nmodels\nas\nusable,\nfully\ndescribed\nscientific\nobjects.\nIn\nturn,\nthese\nactivities\nwere\nrepresented\nas\na\nset\nof\ninformation\nthat\nincluded:\nthe\norganisation\nresponsible\nfor\nthe\nactivity,\nthe\npeople\nresponsible\nfor\nactually\ncarrying\nout\nthe\nactivity,\nthe\ntechnique\nand/or\ntools\nused\nto\nperform\nthe\nactivity,\nand\nthe\ntimespan\nin\nwhich\nthe\nactivity\nwas\ncarried\nout.\nThis\npreliminary\nwork\nresulted\nin\nthe\ncreation\nof\na\nrecord\nof\nthe\nentire\ndigitisation\nprocess.\nGoogle\nSheets\nand\nMicrosoft\nExcel\nin\nthe\nMicrosoft\nOffice\n365\nplatform\nwere\nstrong\nfacilitators\nfor\ndata\nretention,\nbackup\nand\nversioning\n6\n.\nMoreover,\nshared\nformatting\npractices\non\nelements\nsuch\nas\ndates\nand\nnames\nwere\nessential\nfor\npreparing\nthe\ndata\nfor\nthe\nsubsequent\nphases\nof\nthe\nproject.\nAt\nthe\nend\nof\nthis\nstage,\neach\nobject\nhad\nits\nmetadata,\nrelated\ndigitisation\nphases\nwith\ntheir\nfeatures,\nand\nunique\nidentifiers\nthat\nallowed\nthe\ntwo\ndatasets\nto\nbe\nlinked\nto\neach\nother.\nAs\ninformation\nwas\nadded\nto\nboth\ndatasets,\nmore\nwork\nwent\ninto\ngetting\nthem\nready\nto\nbe\npublished\nas\nmachine-readable\nrepresentations\nof\nthe\nentire\nphysical\ncollection,\nits\ndigital\ncounterpart,\nand\nthe\nprocedure\nthat,\nfrom\nthe\nformer,\nproduced\nthe\nlatter.\nThe\nResource\nDescription\nFramework\n(RDF)\n7\nwas\nselected\nas\na\nformal\ndata\nrepresentation\nfor\nenabling\ntransparent\ndata\npublishing.\nHowever,\nin\norder\nto\ntransform\nthe\ncurrent\ndata\ninto\nRDF\nstatements,\nthe\ntable\nstructures\nfirst\nhad\nto\nbe\nmapped\nto\ndata\nmodels\nthat\ncould\nexpress\nand\ndeepen\nthe\nsemantics\nof\nthe\ndata\nabout\ncultural\nheritage\nand\ndigitisation\nactivities.\nWe\nchose\nto\nreuse\nthe\nCIDOC\nConceptual\nReference\nModel\n(CIDOC\nCRM)\n8\n[4]\nto\nrepresent\nthe\ndata\ndetailing\nthe\nphysical\nand\ncontextual\nattributes\nof\nthe\ncollection\nobjects,\nand\nits\nextension\nCRM\nDigital\n(CRMdig)\n9\n[5]\nto\ndepict\nthe\nstages\nof\nthe\ndigitisation\nworkflow.\nThe\nSimplified\nAgile\nMethodology\nfor\nOntology\nDevelopment\n(SAMOD)\n[14],\na\nmethodology\nto\nquickly\ncreate\nsemantic\nmodels\nthat\nare\nsupported\nby\nrich\ndocumentation\nand\ntest\ncases,\nwas\nused\nto\ndraw\nthe\nneeded\nconceptual\nconstructs\nfrom\nCIDOC\nCRM\nand\nCRMdig\nand\npack\nthem\ninto\ntwo\ndata\nmodels.\n4.\nMAKING\nINTERPRET ATION\nMORE\nTRANSP ARENT\nOne\nof\nthe\nmain\ngoals\nof\ncultural\nheritage\ndigitisation\nis\nthe\nselection\nof\nspecific\nelements\nof\nreality\nto\nstore\ndigitally.\nThe\nselection\nprocess\ninvolves\na\ndeliberate\nhuman\nchoice\nabout\nthe\nphysical,\ngeometric,\nchromatic,\nmechanical,\nand\nstylistic\ncharacteristics\nof\nthe\nobjects\nto\ndigitise.\nThese\naspects\nare\nrecorded\ninside\na\n“grid\nof\ninformation”,\nsuch\nas\nvectors,\nimages,\n3D\nmodels,\ndatabases,\nand\ntables,\namong\nothers\n[2,\np.127].\nAccording\nto\nthis\nlogic,\na\ndigital\ntechnology\nsurvey\nis\nexpected\nto\napproximate\nreality\nbased\non\nsome\npredetermined\nfeatures\nselected\nat\nthe\noutset\nof\nthe\nsurvey\nproject.\nThe\nquantity\nand\nquality\nof\nthe\ndata\nobtained\nduring\nthe\nsurvey\nsignificantly\nimpact\nhow\naccurate\nthe\ndigitisation\nwill\nbe.\nIn\nthis\ncontext,\na\ndigital\nreplica\nis\ndefined\nas\nan\napproximate,\naesthetically\nconvincing\ncopy\nof\na\ncultural\nsite\nor\nartefact\n[2,\np.127].\nIn\nour\ncase\nstudy,\nthe\nmain\naim\nwas\nto\nobtain\nthe\ndigital\nversion\nof\nthe\nexhibition’s\nexperience,\nstarting\nfrom\nthe\ncreation\nof\nits\ndigital\ntwin\n10\n,\nlinking\nto\nthe\ndigital\nassets\nof\nthe\nvarious\nobjects\n(3D\nand\nmultimedia)\nin\nthe\ncollections,\nenriched\nby\nmetadata,\ncatalogued\nand\naccessible\nonline\nusing\ndifferent\ndevices\n[1,\np.2].\nOur\napproach\nfor\ncreating\nthe\ndigital\ntwin\nof\nAldrovandi’s\nexhibition\nincluded\nin\nthe\nfirst\nplace\nthe\nimplementation\nof\nvarious\nsetups\nand\ninstruments\nto\ncreate\nmorphologically\nprecise\nmodels\nwith\nhighly\ndetailed\ntextures.\nPhotogrammetry\nand\nstructured\nlight\nscanner\n(SLS)\nacquisition\ntechniques\nhave\nbeen\nused\nto\nobtain\nthe\ndigital\nrepresentation\nof\neach\nitem.\nThe\nchoice\nof\nthese\nmethodologies\nhas\nbeen\ninfluenced\nby\ncontextual\nfactors\n(such\nas\nlimited\ntime\nand\navailable\nspace),\n10\nSince\ncultural\nheritage\nmay\nbe\nintangible\nor\ntemporary ,\nNiccolucci\net\nal.\n[11]\nsuggest\nseparating\nthe\ndata\nexchange\ndimension\nfrom \nthe\nrepresentation\ndimension\nfor\ndigital\ntwins.\nThis\nreconceptualisation\nrethinks\ndata\nflows\nand\nbi-directionality\nas\npossible\nand\nas\nnot \nmandatory\nrequirements\nfor\ndigital\ntwins\nof\ncultural\nheritage\nartefacts\nor\nlandscapes,\nopening\nthe\npossibility\nfor\naccurate\ndigital\nmodels \n(i.e.\ndigital\nreplicas)\nto\nevolve\ndynamically\ninto\na\nfully\ndeveloped\ndigital\ntwin.\n9\nhttp://www .ics.forth.gr/isl/CRMdig/\n8\nhttp://www .cidoc-crm.or g/cidoc-crm/\n7\nhttps://www .w3.or g/TR/rdf1 1-concepts/\n6\nSince\ntransparent\nrecording\ndoes\nnot\ninvolve\nany\ncomputational\ncode,\nproprietary\nsoftware\nlike\nGoogle\nSheets\nis\nacceptable\nas\nlong \nas\nit\nincludes\nfeatures\nlike\nversioning\nand\nexporting\noutputs\nto\nopen\nformats\n(e.g.,\n.txt,\n.rtf,\n.pdf)\n[7].\n5\nhttps://www .getty .edu/research/tools/vocabularies/ulan/\n4\nhttps://viaf.or g/\n3\nhttps://www .wikidata.or g/materials,\nand\nthe\nobjects’\nsize.\nWe\nprovided\ndocumentation\nabout\nthe\nchallenges\nfaced\nand\nrelated\nsolutions\nadopted\nin\nthe\nacquisition\nand\nprocessing\nphase.\nThe\ndocumentation\nof\nthe\nrisks\n(e.g.\nacquisition\nof\nnon-Lambertian\nmaterials,\nlimited\nobject’s\nmobility,\netc.)\nand\nthe\nsolutions\nadopted\n(e.g.\ncross\npolarisation\ntechniques,\nspecific\nsetup\nschemas,\netc.)\npermits\nothers\nto\nretrace\nand\nrepeat,\nat\nleast\nin\ntheory,\nthe\nactions\ninvolved\nin\na\ncertain\nresearch\neffort,\nproducing\nnew\ndata\n[15,\np.2].\nConcerning\nscanner\nacquisitions,\nwe\ndefined\nsome\ncommon\nlimits\nregarding\ntexture\nfinal\nresolution,\nand\nwe\ndecided\non\na\nspecific\nrange\nfor\ngeometry\ncomplexity.\nDuring\nthe\nentire\nprocess,\nopen\ntechnologies\nand\nsoftware\nwere\nemployed\nto\nmaximise\nthe\nworkflow’s\nre-adoption\nfor\nthe\ncreation\nof\na\nvirtual\nexhibition\nin\ndifferent\nsettings.\nHowever,\nfor\nsome\nspecific\ntasks\n(e.g.\nraw\ndata\nelaboration),\nproprietary\nsoftware\nwas\nrequired\nsince\nopen-source\nsoftware\nfails\nto\nproduce\nsatisfactory\nresults.\nDocumenting\nprocessing\ndecisions\nmade\nfor\nextra\ntransparency\nshould\nbe\na\npart\nof\nthe\nscientific\nworkflow\nand\ncultural\nheritage\npreservation.\nThis\ncan\nbe\ndone,\nas\nproposed\nby\nMoore\net\nal.\n[10],\nby\nextracting\na\nprocessing\nreport\nfrom\nthe\nphotogrammetry\nsoftware.\nMetashape\n11\nand\n3DF\nZephyr\n12\n,\nthe\nmain\nsoftware\nused\nfor\nthe\nphotogrammetric\nprocessing\nphase,\nprovide\nthis\noption.\nThe\nfunction\nhas\nnot\nbeen\ndeveloped\nyet\nfor\nthe\nopen-source\nalternative\nMeshroom\n13\n,\nwhose\nimplementation\nin\nthis\nproject\nis\nunder\ntest.\nHowever,\nsoftware\nfor\nprocessing\nphotogrammetric\ndata\nis\nconsidered\nmore\nopen\nand\ntransparent\ncompared\nto\nsoftware\nused\nfor\nscanned\ndata\nelaboration.\nScanned\ndata\nwere\nelaborated\nusing\ndifferent\nversions\nof\nArtec\nStudio\n14\n,\nwhich\nhas\nproven\nto\nbe\na\n“black\nbox”\nfor\nthose\nwho\ndo\nnot\nown\nthe\nsoftware\nand\nthe\nlicence\nrequired\nto\nuse\nit,\nallowing\nraw\ndata\nexport\nonly\nin\nproprietary\nformats\nand\nwithout\nproviding\nany\nprocessing\nreport.\nRegarding\nmodelling\ninterventions,\nto\nguarantee\ntransparency\nconcerning\nthe\nmanipulation\nof\nthe\nsource\ndata\nwe\nprovided\ndifferent\nderivative\nversions\nfor\neach\n3D\nmodel.\nLevel\n0\nrepresents\nthe\nrough\nresult\nobtained\nby\nthe\nacquisition\nsoftware,\nwhile\nlevel\n1\nincludes\nthe\nfinal\nhigh-definition\nmodel,\nwhere\ngeometry\nissues\nhave\nbeen\nfixed\nand\nlacking\nparts\nhave\nbeen\nreconstructed.\nThe\ncomparison\nbetween\nthese\nversions\nenables\none\nto\nidentify\nwhich\nparts\nwere\nmodelled\nand\nwhich\nparts\nbelong\nto\nlevel\n0.\nLevel\n2\ninstead\nincludes\nthe\noptimised\nmodel\nfor\nweb\npublication.\nFinally,\nwe\nused\nas\nmany\nstandard\nand\ninteroperable\nformats\nas\npossible\nfor\nthe\ngenerated\ndata\nto\nfacilitate\ntheir\nreuse\non\ndifferent\nplatforms.\nSpecifically,\nwe\nused\nglTF,\nglb,\nobj,\nand\nmtl\nfor\n3D\nmodels;\ntiff,\njpg,\nraw,\nand\npng\nfor\nimages;\nmp4\nand\nmov\nfor\nvideos;\nand\nmp3\nfor\naudios.\n5.\nDISCUSSION\nAND\nCONCLUSIONS\nWe\nhave\ndescribed\nhow\nthe\ndigitisation\nprocess\nof\nthe\nexhibition\n“The\nOther\nRenaissance”\nhas\nbeen\ndocumented\nthroughout,\nwith\ndifferent\nmethods,\nbut\nwith\nconstant\nattention\nto\nresearch\ntransparency,\nopenness\nand\naccountability.\nSince\nany\nreality-capture\nor\nsource-based\nmodel\nis\naffected\nby\nthe\nlens\nof\ninterpretation\n(of\na\nhuman\nor\nsoftware),\ntracking\nsteps\nfor\nthe\ncreation\nof\na\n3D\nmodel\nis\nessential\nto\ngive\ntransparency\nto\nthese\ninterpretations,\nfacilitating\nthe\nrepeatability\nof\nthe\ncreation\nprocess\n[10].\nFurthermore,\ndata\nrelating\nto\nthe\ndigitisation\nprocess\ncan\noftentimes\nbe\ncaptured\nonly\nonce,\nwhile\nthe\nprocess\nis\nongoing,\nand\nit\nis\ntherefore\ncrucial\nto\nretain\nas\nmuch\ninformation\nas\npossible,\nstructure\nit\nappropriately\nand\nmake\nit\navailable\nin\nan\nopen\nand\nmachine-readable\nformat\nto\nprovide\na\nrecord\nof\nthe\nentire\nphysical\ncollection,\nits\ndigital\ncounterpart,\nand\nthe\nprocedure\nthat,\nfrom\nthe\nformer,\nproduced\nthe\nlatter.\nA\nparticularly\ninteresting\naspect\nis\nthe\ntemporary\nnature\nof\n“The\nOther\nRenaissance”\nexhibition.\nAt\nthe\ntime\nof\nwriting,\nthe\nexhibition\nconcluded\nmore\nthan\n6\nmonths\nago,\nobjects\non\nloan\nhave\nbeen\nlong\nreturned,\nand\nthe\nrooms\nwhere\nthe\nexhibition\ntook\nplace\nhave\nchanged\nuse.\nThe\nsame\nmethodologies\ncannot\nbe\napplied\nto\nthe\nsame\ndata\n–\nGoodman\net\nal.’s\nmethods\nreproducibility\nor\nPeels\nand\nBouter’s\nreanalysis\n–\nbecause\nthe\nphysical\ncollection\ndoes\nnot\nexist\nin\nits\noriginal\nform\nanymore.\nWhat\nis\npossible,\nhowever,\nis\nthat\nthe\nmethodologies\ndescribed\nare\napplied\nto\nnew\ndata\n(different\ncultural\nheritage\nobjects,\nexhibitions,\netc.).\nAdditionally,\nthe\ncareful\ndocumentation\nof\nthe\nresearch\nprocess\nmakes\nit\npossible\nfor\nothers\nto\njudge\nthe\nrelationship\nbetween\nthe\ndigital\ntwin\nand\nthe\nphysical\ncollection,\na\npiece\nof\ninformation\nthat\nis\ncrucial\nfor\nscientific\nscrutiny\nbut\nthat\nwould\notherwise\nhave\nbeen\nirremediably\nlost\non\nthe\nday\nthe\ntemporary\nexhibition\nclosed.\nDocumenting\nthe\nproject\nworkflow\nin\nthis\nmanner\nis\nnot\nsimple:\nit\nrequires\ncareful\nplanning,\nspecific\ncompetencies,\nand\nit\nis\nextremely\ntime-consuming.\nThese\nefforts\nmust\nbe\nrewarded\nin\nthe\nacademic\nsetting,\nif\na\nculture\nof\naccountability,\ndata\ncuration\nand\nopen,\nreproducible\nresearch\nis\nto\nbecome\nthe\nnorm.\nInitiatives\nlike\nCoARA\n15\nare\nindeed\nnudging\nthe\nscientific\ncommunity\nin\nthis\ndirection,\nbut\nwhile\nsome\npractices\n–\nsuch\nas\nthe\npublication\nof\nresearch\ndata\n“as\nopen\nas\npossible”\nand\naccording\nto\nFAIR\nprinciples\n–\nare\ngarnering\nincreasing\nattention,\nthe\nfocus\nmust\nbe\nkept\non\nmethodologies,\ntoo,\nand\non\nthe\nneed\nof\ncarefully\ndocumenting\neach\nstep\nof\na\nresearch\nproject.\nFurther,\nas\nnoted\nby\nPeels\n15\nhttps://coara.eu/\n14\nhttps://www .artec3d.com/it/3d-software/artec-studio\n13\nhttps://alicevision.or g/\n12\nhttps://www .3dflow .net/it/\n11\nhttps://www .agisoft.com/and\nBouter\n[12],\nguidelines\non\nhow\nto\nreport\nstudy\nprotocols,\nmethodologies\nand\nprocedures\nare\nneeded,\nand\nthis\nis\nperhaps\nespecially\ntrue\nin\nthe\nhumanities.\nThe\nestablishment\nof\nprinciples,\nlike\nFAIR,\nand\ndiscipline-specific\nrecommendations\non\nhow\nto\nmanage\nand\ndocument\nresearch\ndata\nin\na\ntransparent\nand\ntraceable\nmanner\nis\na\ngreat\nfirst\nstep\nin\nthis\ndirection.\nFAIR\nprinciples,\nsupposedly\ndiscipline-agnostic,\nare\nbeing\ndiscussed\nand\nadapted\nto\nthe\ndifferent\nresearch\ncultures,\nData\nManagement\nPlans\nare\nbecoming\nincreasingly\ncommon,\nand\ntemplates\nand\nonline\ntools\nare\nbeing\nproduced\nto\nhelp\nresearchers\nfill\nthem\nout\nin\na\nstructured\nand\nmachine-actionable\nmanner.\nThere\nis\nstill\nmore\nto\nbe\ndone,\nand\nmore\nexplicit\nattention\nneeds\nto\nbe\ndevoted\nto\nresearch\nmethodologies\nand\nhow\nto\ndocument\nthem\nin\nsufficient\ndetail.\nWe\nrecognise\nthat\nthe\ndebate\naround\nthe\ndefinition\nof\nreproducibility\nand\nreplicability,\nand\nwhether\nthese\nterms\nshould\nbe\napplied\nto\nresearch\nas\na\nwhole,\nacross\nall\ndisciplines,\nis\nnot\nsettled\n[3;6;9;12;13].\nHowever,\nthere\nseems\nto\nbe\nan\nagreement\non\nthe\nfact\nthat\nresearch\ncan\nbe\nreproducible\nin\nvarying\ndegrees,\nfrom\nan\n“ideal”\ncomputational\nreproducibility\nall\nthe\nway\nto\nfields\nwhere\nmultiple\ninterpretations\nof\na\ncertain\nphenomenon\ncoexist.\nReplication\nhere\nmay\nhelp\n“filter\nout\nfaulty\nreasoning\nor\nmisguided\ninterpretations,\ndraw\nattention\nto\nunnoticed\ncrucial\ndifferences\nin\nstudy\nmethods”\n[12]\nbut\nit\nis\nnot\nalways\npossible\nto\nascertain\nwhich\ninterpretation\nis\ncorrect.\nCircling\nback\nto\nthe\ndefinition\nof\ninferential\nreproducibility\n[6]\nand\nthe\ncritique\nof\nthe\nconcept\nof\nreplicability\nin\na\nhumanities\ncontext\n[9;13],\nthe\nresearchers’\ndifferent\nviewpoints,\ntheoretical\nbackground\nor\nprevious\nassessments\nalways\nhave\na\nbearing\non\nhow\nthe\nstudy\nis\nconducted\nand\nhow\nthe\nresults\nare\ninterpreted.\nA\ncareful\ndocumentation\nof\nthe\nstudy\ndesign,\ndata\ncollection,\nand\nanalysis\ntechniques\nhelp\nreflect\nand\nmake\nexplicit\nall\npossible\ninfluencing\nfactors,\nand\nis\na\nfundamental\ntool\nfor\nreliability\nand\nrigour\nand\nfor\nopening\nthe\n“black\nbox”\nof\nresearch.\nACKNOWLEDGEMENTS\nThis\nwork\nhas\nbeen\npartially\nfunded\nby\nProject\nPE\n0000020\nCHANGES\n-\nCUP\nB53C22003780006,\nNRP\nMission\n4\nComponent\n2\nInvestment\n1.3,\nFunded\nby\nthe\nEuropean\nUnion\n-\nNextGenerationEU.\nREFERENCES\n[1]\nBalzani,\nRoberto,\nSebastian\nBarzaghi,\nGabriele\nBitelli,\nFederica\nBonifazi,\net\nal.\n2024.\n«Saving\nTemporary\nExhibitions\nin\nVirtual\nEnvironments:\nThe\nDigital\nRenaissance\nof\nUlisse\nAldrovandi\n–\nAcquisition\nand\nDigitisation\nof\nCultural\nHeritage\nObjects».\nDigital\nApplications\nin\nArchaeology\nand\nCultural\nHeritage\n32:\ne00309.\nhttps://doi.or g/10.1016/j.daach.2023.e00309\n.\n[2]\nDemetrescu,\nEmanuel,\nEnzo\nd’Annibale,\nDaniele\nFerdani,\ne\nBruno\nFanini.\n2020.\n«Digital\nReplica\nof\nCultural\nLandscapes:\nAn\nExperimental\nReality-Based\nWorkflow\nto\nCreate\nRealistic,\nInteractive\nOpen\nWorld\nExperiences».\nJournal\nof\nCultural\nHeritage\n41:\n125–41.\nhttps://doi.or g/10.1016/j.culher .2019.07.018\n.\n[3]\nDerksen,\nMaarten,\nStephanie\nMeirmans,\nJonna\nBrenninkmeijer ,\nJeannette\nPols,\nAnnemarijn\nde\nBoer ,\nHans\nVan\nEyghen,\nSurya\nGayet,\net\nal.\n2024.\n«Replication\nStudies\nin\nthe\nNetherlands:\nLessons\nLearned\nand\nRecommendations\nfor\nFunders,\nPublishers\nand\nEditors,\nand\nUniversities».\nhttps://doi.or g/10.31219/osf.io/bj8xz\n.\n[4]\nDoerr ,\nMartin,\nChristian-Emil\nOre,\ne\nStephen\nStead.\n2007.\n«The\nCIDOC\nConceptual\nReference\nModel\n-\nA\nNew\nStandard\nfor\nKnowledge\nSharing»,\n51–56.\nhttps://doi.or g/10.13140/2.1.1420.6400\n.\n[5]\nDoerr ,\nMartin,\ne\nMaria\nTheodoridou.\ns.d.\n«CRMdig:\nA\nGeneric\nDigital\nProvenance\nModel\nfor\nScientific\nObservation».\n[6]\nGoodman,\nSteven\nN.,\nDaniele\nFanelli,\ne\nJohn\nP.\nA.\nIoannidis.\n2016.\n«What\ndoes\nresearch\nreproducibility\nmean?»\n8\n(341).\n[7]\nGualandi,\nBianca,\ne\nSilvio\nPeroni.\n2023.\n«Data\nManagement\nPlan:\nFirst\nVersion».\nhttps://zenodo.or g/records/7977103\n.\n[8]\nKaroune,\nEmma,\ne\nEsther\nPlomp.\n2022.\n«Removing\nBarriers\nto\nReproducible\nResearch\nin\nArchaeology».\nhttps://doi.or g/10.5281/ZENODO.7320029\n.\n[9]\nLeonelli,\nSabina.\n2018.\n«Rethinking\nReproducibility\nas\na\nCriterion\nfor\nResearch\nQuality».\nIn\nResearch\nin\nthe\nHistory\nof\nEconomic\nThought\nand\nMethodology .\nIncluding\na\nSymposium\non\nMary\nMorgan:\nCuriosity ,\nImagination,\nand\nSurprise,\n36B:129–46.\nEmerald\nPublishing\nLimited.\nhttps://doi.or g/10.1 108/S0743-41542018000036B009\n.\n[10]\nMoore,\nJennifer ,\nAdam\nRountrey ,\ne\nHannah\nScates\nKettler .\ns.d.\n3D\nData\nCreation\nto\nCuration:\nCommunity\nStandar ds\nfor\n3D\nData\nPreservation\n.\nALA.\nhttps://www .alastore.ala.or g/content/3d-data-creation-curation-community-standards-3d-data-preservation\n.\n[11]\nNiccolucci,\nFranco,\nBéatrice\nMarkhof f,\nMaria\nTheodoridou,\nAchille\nFelicetti,\ne\nSorin\nHermon.\n2023.\n«The\nHeritage\nDigital\nTwin:\nA\nBicycle\nMade\nfor\nTwo.\nThe\nIntegration\nof\nDigital\nMethodologies\ninto\nCultural\nHeritage\nResearch».\nOpen\nResear ch\nEurope\n3:\n64.\nhttps://doi.or g/10.12688/openreseurope.15496.1\n.\n[12]\nPeels,\nRik,\ne\nLex\nBouter .\n2018.\n«The\nPossibility\nand\nDesirability\nof\nReplication\nin\nthe\nHumanities».\nPalgrave\nCommunications\n4\n(1):\n95.\nhttps://doi.or g/10.1057/s41599-018-0149-x\n.\n[13]\nPenders,\nHolbrook,\ne\nDe\nRijcke.\n2019.\n«Rinse\nand\nRepeat:\nUnderstanding\nthe\nValue\nof\nReplication\nacross\nDifferent\nWays\nof\nKnowing».\nPublications\n7\n(3):\n52.\nhttps://doi.or g/10.3390/publications7030052\n.[14]\nPeroni,\nSilvio.\n2017.\n«A\nSimplified\nAgile\nMethodology\nfor\nOntology\nDevelopment».\nIn\nOWL:\nExperiences\nand\nDirections\n–\nReasoner\nEvaluation\n,\na\ncura\ndi\nMauro\nDragoni,\nMaría\nPoveda-V illalón,\ne\nErnesto\nJimenez-Ruiz,\n55–69.\nLecture\nNotes\nin\nComputer\nScience.\nCham:\nSpringer\nInternational\nPublishing.\nhttps://doi.or g/10.1007/978-3-319-54627-8_5\n.\n[15]\nRahal,\nRima-Maria,\nHanjo\nHamann,\nHilmar\nBrohmer ,\ne\nFlorian\nPethig.\n2022.\n«Sharing\nthe\nRecipe:\nReproducibility\nand\nReplicability\nin\nResearch\nAcross\nDisciplines».\nResear ch\nIdeas\nand\nOutcomes\n8:\ne89980.\nhttps://doi.or g/10.3897/rio.8.e89980\n.\n[16]\nWilson,\nGreg,\nJennifer\nBryan,\nKaren\nCranston,\nJustin\nKitzes,\nLex\nNederbragt,\ne\nTracy\nK.\nTeal.\n2017.\n«Good\nEnough\nPractices\nin\nScientific\nComputing».\nPLOS\nComputational\nBiology\n13\n(6):\ne1005510.\nhttps://doi.or g/10.1371/journal.pcbi.1005510\n." }, { "title": "2402.12003v1.Quantum_K_theory_of_IG_2__2n_.pdf", "content": "arXiv:2402.12003v1 [math.AG] 19 Feb 2024QUANTUM K-THEORY OF IG(2,2n)\nV. BENEDETTI, N. PERRIN AND W. XU\nAbstract. We prove that the Schubert structure constants of the quantu mK-theory rings of\nsymplectic Grassmannians of lines have signs that alternat e with codimension and vanish for\ndegrees at least 3. We also give closed formulas that charact erize the multiplicative structure\nof these rings, including the Seidel representation and a Ch evalley formula.\nContents\n1. Introduction 1\n2. Preliminaries and proof strategy 4\n3. Replacing stable maps by evaluations 8\n4. Large degrees 14\n5. Degree 2 16\n6. Degree 1 22\n7. Non rationally connected cases 26\n8. Seidel representation 29\n9. Chevalley formula 30\nReferences 33\n1.Introduction\nTo a complex projective manifold Xone can attach various algebraic structures capturing\ndifferent kinds of information. For instance, cohomology rings enco de the behavior of (classes\nof) subvarieties: how they intersect (ordinary or equivariant coh omology) or how they are\nconnected by rational curves (quantum cohomology). In this pap er we are interested in K-\ntheory rings, which in turn encode information about coherent (or locally free) sheaves: how\nthey form short exact sequences and the behavior of their tenso r product. It turns out that\nclassicalK-theory can be seen as a refinement of classical cohomology - via th e Chern character\nhomomorphism. Moreover,onecan define aquantum K-theoryringwhich isboth adeformation\nof the classical K-theory ring and a refinement of the quantum cohomology ring. Ind eed, if\nquantum cohomology is an intersection theory of the space of genu s zero stable maps to X,\nquantumK-theory, which was introduced by [ Giv00], deals with the K-theory of this space\nand requires a more careful study of stable maps with reducible sou rces. Quantum cohomology\nand K-theory have gathered some attention in the context of hom ogeneous spaces where it\ngeneralizes classical Schubert calculus. We will focus on this case.\nFrom now on, X=G/PXwill be a rational projective homogeneous space. It is nowadays\nclassical that the transitive action of GonXimplies many positivity properties in cohomology\nand its various generalizations (see [ Gra01,Bri02,Buc02,Mih06,GK09,AGM11,BCMP22 ]\n2020Mathematics Subject Classification. Primary 14N35, 19E08; Secondary 14N15, 14M15, 14E08.\nKey words and phrases. Quantum K-theory, Gromov–Witten invariants, symplectic G rassmannians, Seidel\nrepresentation, Chevalley formula, rational connectedne ss.\n12 V. BENEDETTI, N. PERRIN AND W. XU\nand references therein). From previous positivity results and firs t explicit computations, it was\nsoon conjectured that positivity should also hold in quantum K-theory. To state a precise\nconjecture, we introduce a few notations. Schubert varieties in Xare indexed by WXand for\nu∈WX, letXube the Schubert variety with codim X(Xu) =ℓ(u) (see Subsection 2.1). Denote\nbyOu= [OXu] its class in QK( X), the (small) quantum K-theory ring of X. These classes\nform a basis for QK( X) and their products are defined by structure constants as follow s:\nOu⋆Ov=/summationdisplay\nd/summationdisplay\nw∈WXNw,d\nu,vqdOw,\nwhere the first sum runs over all effective classes d∈H2(X,Z) (see Subsection 2.2for more\ndetails). It can be proved (see [ BCMP13 ,Kat18,ACT22]) that this sum is actually finite.\nThe structure constants Nw,d\nu,vare expected to satisfy the following positivity property (see\n[LM06,BM11,BCMP18 ]):\nConjecture 1.1. Foru,v,w∈WXandd∈H2(X,Z), we have\n(−1)ℓ(uvw)+/integraltext\ndc1(TX)Nw,d\nu,v≥0.\nThis conjecture has been proven in a few cases: for minuscule spac es in [BCMP22 ] and for\nthe point/hyperplane incidence varieties in [ Ros22] and [Xu21]. In this paper, we consider the\ncase where X= IG(2,2n) is the variety of isotropic lines in a symplectic vector space. Our firs t\nresult is:\nTheorem 1.2. Conjecture 1.1is true forX= IG(2,2n).\nWe also obtain several more precise results on the structure of QK (X).\nProposition 1.3 (see Corollary 2.12and Remark 2.16).ForX= IG(2,2n)andu,v∈WX, in\nthe product Ou⋆Ov:\n(1) Terms with qdoccur only for d∈[0,2];\n(2) The powers of qthat occur form an interval.\nAlthough these properties also hold for the product [ Xu]⋆[Xv] in quantum cohomology,\nthe maximum power of qappearing in Ou⋆Ovis sometimes greater than that appearing in\n[Xu]⋆[Xv]. See Remark 7.2for more details.\nIn addition, we prove the following closed formula for multiplying with th e unique Schubert\ndivisor class. Recall that Schubert varieties in X= IG(2,2n) are indexed by pairs ( p1,p2) of\nintegers with 1 ≤p10 fori>0 and all elements\nwi∈WZfori∈[1,r] where we set wr+1=w. Note that this product is well-defined since the\nabove sum is finite (see [ BCMP13 ,Kat18,ACT22]).\nWe reformulate Conjecture 1.1as follows:\nConjecture 2.3. Foru,v,w∈WZ, we have\n(−1)ℓ(uvw)+/integraltext\ndc1(TZ)κw,d\nu,v≥0.\nRemark 2.4. We have the equality\nNw,d\nu,v=κw∨,d\nu∨,v,\nwithu∨=w0uw0,Zandℓ(u∨) = dimZ−ℓ(u). In particular, the constants Nw,d\nu,vandκw,d\nu,vare\nconjectured to share the same positivity properties.\nThe Grassmannian X= IG(2,2n) of isotropic lines for a symplectic form ωonC2nis homo-\ngeneous for the symplectic group G= Sp2n. One of our main results is a proof of Conjecture\n2.3forX= IG(2,2n). From now on we assume that Z=X= IG(2,2n). Forx∈X, we denote\nbyVx⊂C2nthe 2-dimensional subspace corresponding to x. Note that Pic( X)∼=Zso that we\ncan assume that the degree dof any stable map is a non-negative integer.\n2.3.A first reduction. Givennsubvarieties Ai⊂Xfori∈[1,n], define the n-point degree\ndGromov–Witten variety asMd,n+1(A1,···,An) = ev−1\n1(A1)∩···∩ev−1\nn(An) and then-point\ndegreedcurve neighborhood as Γd(A1,···,An) = ev n+1(Md,n+1(ev−1\n1(A1)∩ ··· ∩ev−1\nn(An)).\nForn= 2, we extend this definition to non-irreducible curves and drop the reference to n: set\nMd(A,B) =Md,3(A,B)∩Mdand Γd(A,B) = ev 3(Md(A,B)).\nWe will mainly considerthese definitions for Schubert varieties and pa irs ofopposite Schubert\nvarieties. In particular, it follows from [ BCMP13 , Proposition 3.2] that Γ d(Xu) and Γ d(Xv) are\nSchubert varieties. Define u(d),v(−d)∈WXviaXu(d)= Γd(Xu) andXv(−d)= Γd(Xv). For\nopposite Schubert varieties Xu,Xv⊂X, we have the Gromov–Witten varieties Md(Xu,Xv) =\nev−1\n1(Xu)∩ev−1\n2(Xv) andMd(Xu,Xv) =Md(Xu,Xv)∩Mdwith surjective evaluation maps\nevd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv).\n[BCMP13 , Corollaries 3.1 and 3.3] and the fact that Mdis irreducible with rational singularities\nimply that the Gromov–Witten varieties Md(Xu,Xv) are irreducible with rational singularities.\nIt follows from [ BCMP13 , Lemma 5.1] and the projection formula that the product in QK( X)\ncan be reformulated using the above maps via the formula\nOu⋆Ov=/summationdisplay\nd≥0/summationdisplay\nd,|d|=d(−1)rqd(ev3)∗[OMd(Zu,Zv)].\nWe prove that, in the above formula, for the quantum product we o nly need to consider\ncurves of degree d=dord= (d−1,1). We start with the following geometric result on curves.6 V. BENEDETTI, N. PERRIN AND W. XU\nLemma 2.5. Letx,y∈Xbe general points. Then there exists a conic as well as a chain of\ntwo lines through xandy.\nProof.LetV=Vx⊕Vybe the four dimensional subspace of C2nspanned by xandy. Becausex\nandyare general, the symplectic form has rank 4 on V. ThenX∩Gr(2,V) is a smooth quadric\nof dimension 3 containing xandy, and the result follows. /square\nCorollary 2.6. Any point in Γd(Xu)can be joint to Xuby a chain of dlines.\nRemark 2.7. This result is true for any cominuscule variety [ BCMP13 , Lemma 4.7]and for any\ncoadjoint non-adjoint variety [ CP11, Proposition 3.15]. However, it is not true for homogeneous\nspaces in general (see [ CP11, Proposition 3.10] for the case of adjoint varieties for which this\ndoes not hold).\nWe include a proof of [ Mih22, Corollary 2.5] for completeness.\nProposition 2.8. Assume that for all d≥0, any point in Γd(Xu)can be joint to Xuby a chain\nofdlines. Then\nκw,d\nu,v=/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nw/a\\}⌊ra⌋k⌉tri}htd−/summationdisplay\nκ/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nκ/a\\}⌊ra⌋k⌉tri}htd−1/a\\}⌊ra⌋k⌉tl⌉{tOκ,O∨\nw/a\\}⌊ra⌋k⌉tri}ht1.\nProof.Define\nSd−d0=/summationdisplay\n(−1)rr/productdisplay\ni=1/a\\}⌊ra⌋k⌉tl⌉{tOwi,O∨\nwi+1/a\\}⌊ra⌋k⌉tri}htdi\nwhere the sum is over all decompositions d−d0=d1+···+drwithdi>0 fori >0 and all\nelementswi∈WXfori∈[1,r]. We have\nκw,d\nu,v=/summationdisplay\nw1∈WXd/summationdisplay\nd0=0/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nw1/a\\}⌊ra⌋k⌉tri}htd0Sd−d0,\nthus we only need to prove that Sd−d0= 0 ford−d0≥2. As an easy consequence of [ BCMP13 ,\nProposition 3.2], we have /a\\}⌊ra⌋k⌉tl⌉{tOu,O∨\nw/a\\}⌊ra⌋k⌉tri}htd=δu(d),w. Hence,\nSd−d0=/summationdisplay\n(−1)rr/productdisplay\ni=1δwi(di),wi+1.\nForanyiandw, Γi(Xw) = Γ1(Γ1(···Γ1(Xw)···)), whereΓ 1isrepeated itimesintheright-hand\nside. By induction on i1andi2, this implies that w(i) = (w(i1))(i2) for anyi1+i2=i. Thus,\nfor any decomposition as above, we have ( ···(w1(d1))(d2)···)(dr) =w1(d1+···+dr). This\nultimately implies that/producttextr\ni=1δwi(di),wi+1=δw1(d1+···+dr),w=δw1(d−d0),wand is independent of\nthe decomposition. We thus have that Sd−d0= 0 ford−d0≥2. /square\nTo simplify notation, we set ( Ou⋆Ov)d=/summationtext\nd,|d|=d(−1)r(ev3)∗[OMd(Xu,Xv)] so that\nOu⋆Ov=/summationdisplay\nd≥0qd(Ou⋆Ov)d.\nProposition 2.8, the projection formula, and [ BCMP13 , Lemma 5.1] imply the following.\nCorollary 2.9. (Ou⋆Ov)d= (evd\n3)∗[OMd(Xu,Xv)]−(evd−1,1\n3)∗[OMd−1,1(Xu,Xv)].QUANTUM K-THEORY OF IG(2 ,2n) 7\n2.4.Proof outline. In this subsection, we prove Theorem 1.2assuming some rationality prop-\nerties that allow us to use the following theorem, which is a consequen ce of results of Koll´ ar\n[Kol86], see for example [ BCMP13 , Proposition 5.2]. We will prove these rationality properties\nin the next sections.\nTheorem 2.10. Iff:A→Bis a projective morphism of varieties with cohomologically trivial\ngeneral fiber (e.g. rationally connected) and such that AandBhave rational singularities, then\nf∗[OA] = [OB]inK-theory.\nWe will prove the following theorem in Sections 4,5and6(see Theorems 4.1,5.1and6.1).\nA dominant projective morphism f:A→BwithAirreducible is called GRCF (Generically\nRationally Connected Fibers) if a general fiber of fis rationally connected (see Definition 3.2).\nTheorem 2.11. Ford≥0, we have\n(1) The map evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv)isGRCF,\n(2) Assume that evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv)is birational, then\n(a)evd−1,1\n3(u,v) :Md−1,1(Xu,Xv)→Γd−1,1(Xu,Xv)is birational;\n(b)Γd−1,1(Xu,Xv)⊂Γd(Xu,Xv)is a divisor.\n(3) Assume that evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv)is not birational, then Γd(Xu,Xv) =\nΓd−1,1(Xu,Xv)has rational singularities.\n(4) Ifd≥3, then the map evd−1,1\n3(u,v) :Md−1,1(Xu,Xv)→Γd−1,1(Xu,Xv)isGRCF, and\nΓd(Xu,Xv) = Γd−1,1(Xu,Xv)has rational singularities.\nCorollary 2.12. We have (Ou⋆Ov)d= 0ford≥3.\nProof.Corollary 2.9and Theorems 2.10,2.11imply the equalities\n(Ou⋆Ov)d= (ev3)∗[OMd(Xu,Xv)]−(ev3)∗[OMd−1,1(Xu,Xv)] = [OΓd(Xu,Xv)]−[OΓd−1,1(Xu,Xv)] = 0\nford≥3. /square\nFord∈[1,2], the map evd−1,1\n3(u,v) :Md−1,1(Xu,Xv)→Γd−1,1(Xu,Xv) may fail to be\nGRCF. To deal with these cases, we need to give a more explicit descr iption of the Schubert\nvarietiesXuandXv. Choose a basis ( ei)i∈[1,2n]ofC2nsuch thatω(ei,ej) =δi,2n+1−jfor\ni∈[1,n]. DefineEp=/a\\}⌊ra⌋k⌉tl⌉{tei|i∈[1,p]/a\\}⌊ra⌋k⌉tri}htandEp=/a\\}⌊ra⌋k⌉tl⌉{tei|2n+1−i∈[1,p]/a\\}⌊ra⌋k⌉tri}ht. It is a classical result\n(see for example [ BKT09]) thatWXis in bijection with pairs of integers p1< p2such that\np1+p2/\\⌉}atio\\slash= 2n+1. Explicitly, there exist integers p12n+1andδq=/braceleftbigg0 ifq1+q2<2n+1\n1 ifq1+q2>2n+1.\nNotethatδp= 0ifandonlyif E⊥\np1⊇Ep2, andsimilarlyfor δq. We havedim Xu=p1+p2−3−δp,\nand similarly for Xv.\nConsider the following conditions on the pairs ( p1,p2) and (q1,q2):\n(C1) p1+q1= 2n=p2=q28 V. BENEDETTI, N. PERRIN AND W. XU\n(C2)/braceleftbigg\np1+q2= 2n=p2+q1,\np2−p1=q2−q1≥2 and max( δp,δq) = 1.\nThe following is proved in Sections 5and6, see Theorems 5.1and6.1. We denote by (C d)\nthe condition ( C1) ford= 1 and ( C2) ford= 2.\nTheorem 2.13. Assume that d∈[1,2].\n(1) If(Cd)holds, then evd−1,1\n3(u,v) :Md−1,1(Xu,Xv)→Γd−1,1(Xu,Xv)is generically\nfinite of degree 2.\n(2) Otherwise, the map evd−1,1\n3(u,v) :Md−1,1(Xu,Xv)→Γd−1,1(Xu,Xv)isGRCF.\nUsing this result, we compute ( Ou⋆Ov)qwhen (Cd), ford∈[1,2], does not hold.\nCorollary 2.14. Assume that neither (C1)nor(C2)holds, then\n(1)(Ou⋆Ov)d= 0if and only if evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv)is not birational.\n(2)(−1)ℓ(uvw)+/integraltext\ndc1(TX)κw,d\nu,v≥0.\nProof.(1) This follows from Corollary 2.9and Theorems 2.10,2.11and2.13.\n(2) If the map evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv) is birational, then evd−1,1\n3(u,v) :\nMd−1,1(Xu,Xv)→Γd−1,1(Xu,Xv) is also birational by Theorem 2.11. By a result of Brion (see\n[BCMP22 , Theorem 8.11]) and that Md(Xu,Xv) andMd−1,1(Xu,Xv) have rational singulari-\nties, we have that the coefficients cwanddwin the expansions\n(ev3)∗[OMd(Xu,Xv)] =/summationdisplay\nwcwOwand (ev 3)∗[OMd−1,1(Xu,Xv)] =/summationdisplay\nwdwOw\nsatisfy (−1)ℓ(w)−ccw≥0 and (−1)ℓ(w)−ddw≥0, wherecanddare the codimensions of\nΓd(Xu,Xv) and Γ d−1,1(Xu,Xv) inX. The result follows from this, Corollary 2.9, and The-\norem2.11.(2).(b). /square\nWhen (Cd) holds for d∈[1,2], we explicitly compute the product Ou⋆Ov, whereOq1,q2p1,p2=\nOv\nu= [OXvu].\nProposition 2.15 (see Proposition 7.1).The following holds in QK(X):\n(1) If(C1)holds, then Ou⋆Ov=Ov\nu−q+qO2n−2,2n.\n(2) If(C2)holds, then\nOp1,p2⋆Oq1,q2=qOp2+q2−2n,2n\np1+q1,2n−q2+q2O2n−2,2n.\nIt is easy to verify that the above products satisfy Conjecture 2.3, proving Conjecture 2.3in\nthe remaining cases, thus completing the proof of Theorem 1.2.\nRemark 2.16. Assume that d∈[1,2] and neither ( C1) nor (C2) holds. Then ( Ou⋆Ov)d/\\⌉}atio\\slash= 0 if\nand only if evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv) is birational. If ev2\n3(u,v) is birational, then by\nLemma5.6, we havep1+q1≤2n−1, which implies that ev1\n3(u,v) is birational (see Section 6).\nTogether with Corollary 2.12and Proposition 2.15, this implies that the powers of qappearing\ninOu⋆Ovform an interval. The same argument implies that this interval property also holds\nin quantum cohomology.\n3.Replacing stable maps by evaluations\nFor proving the GRCF results stated in Theorems 2.11and2.13, we need a reduction step\nreplacing stable maps by the images of marked points.QUANTUM K-THEORY OF IG(2 ,2n) 9\n3.1.Some results on general fibers. A property is true for the general fiber of fif it is true\nforf−1(b) forbin a dense open subset of B. We start with the following classical result.\nLemma 3.1. Letf:A→Bbe a dominant morphism between irreducible varieties and le t\nΩ⊂Abe open and dense. Then Ωmeets any component of a general fiber of f.\nProof.SetW=A\\Ω. Iff(W) is not dense in B, then forb∈B\\f(W), we havef−1(b)⊂Ω.\nOtherwise, by the Fiber Dimension Theorem let U⊂Bbe the open subset such that any\ncomponent of f−1(b) has dimension dim A−dimBand any component of f−1(b)∩Whas\ndimension dim W−dimBforb∈U. Then, since dim W 0, by Lemma 3.4, we can\nrestrict to the open subset of Mdgiven by stable maps of the form f:P1→Xof degreedwhich\nare birational onto their image. A degree 1 map P1→Xis an isomorphism onto its image, and\n3 general points in Γ(3)\n1determine a line. In particular, for d= 1, the map evd\n(3)is birational. A\nbirational degree 2 map P1→Xis an isomorphism onto its image. For ( x,y,z)∈Γ(3)\n2general,\nwe have dim( Vx+Vy+Vz) = 4 = Rk( ω|Vx+Vy+Vz) by Lemma 3.8. SetE=Vx+Vy+Vz, then\nx,y,z∈IG(2,E) which is a smooth quadric of dimension 3. Any conic passing though x,y,zis\ncontained in IG(2 ,E) and there is therefore a unique such conic. In particular, for d= 2, the\nmap evd\n(3)is birational.\nAssumed≥3. LetPk⊂C2n[s,t] be the subspace of homogeneous polynomials of degree k\nwith coefficients in C2nand let (p1,p2,p3) = (0,1,∞)∈(P1)3. Fora=⌊d\n2⌋andb=⌈d\n2⌉, we set\nx= (x1,x2,x3)∈X3and\nZ=\n\n(P,Q,x)∈Pa×Pb×X3/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingleFor [s,t]∈P1,/braceleftbigg(P∧Q)(s,t)/\\⌉}atio\\slash= 0,\nω(P,Q)(s,t) = 0,\nFori∈[1,3],[(P∧Q)(pi)] =xi\n\n.\nWe have a dominant map Z→Md, (P,Q,x)/mapsto→([s:t]/mapsto→[P(s,t)∧Q(s,t)]) with general fibers\nirreducible of constant dimension 4. In particular, dim Z=d(2n−1)+ 4n−1 and there is a\nunique irreducible component Z◦ofZof dimension dim Z. The component Z◦dominatesMd.\nLetπ:Z◦→Γ(3)\ndbe the projection on the last factors. By Lemma 3.1, the general fiber of π\ndominates the general fiber of evd\n(3). We therefore only need to prove that πis GRCF.\nLetY={(P,x)∈Pa×X3|P(s,t)/\\⌉}atio\\slash= 0 for all [ s,t]∈P1andP(pi)∈Vxifori∈[1,3]}.\nProjections induce maps p:Z→Y,p◦:Z◦→Yand ev P:Y→X3such thatπ= evP◦p◦.\nNote that ev−1\nP(x) is an open subset of a vector space and is therefore rational.\nWe first prove that Yis irreducible. Let S={P∈Pa|P(s,t)/\\⌉}atio\\slash= 0 for all [ s,t]∈P1}. The\nprojection on the first factor induces a map σ:Y→S, and we have a cartesian diagram:\nYθ/d47/d47\nσ\n/d15/d15Fl3\npr2\n/d15/d15\nSτ/d47/d47(P2n−1)3,\nwhereτ:S→(P2n−1)3is defined by τ(P) = ([P(p1)],[P(p2)],[P(p3)]), Fl = {(x,y)∈X×\nP2n−1|y⊂Vx}is the incidence variety between XandP2n−1, and the map θ:Y→Fl3is\ndefined byθ(P,x) = (x,[P(p1)],[P(p2)],[P(p3)]). Since pr2islocallytrivial with fibers( P2n−3)3,\nthe same is true for σ. Since furthermore Sis an open subset of Pa, we get that Yis irreducible\nof dimension 2 n(a+1)+3(2n−3).\nWe now consider the fibers of the map p:Z→Y. These fibers are given by an open subset\nin the set of solutions of the linear system on Qgiven by\n(1)/braceleftbiggω(P,Q)(s,t) = 0 for all [ s,t]∈P1,\nQ(pi)∈Vxifori∈[1,3].12 V. BENEDETTI, N. PERRIN AND W. XU\nNote that this linear system is generically of rank\ndimPb−(dimZ−dimp(Z))≤d−2+3(2n−2) = dim Pb−(dimZ−dimY).\nLet (ei)i∈[1,2n]be the standard basis of C2nso that the symplectic form is given by ω(ei,ej) =\nδj,2n+1−ifori∈[1,n], letP(s,t) =sae1+tae2nandletVx1=/a\\}⌊ra⌋k⌉tl⌉{te1,e2/a\\}⌊ra⌋k⌉tri}ht,Vx2=/a\\}⌊ra⌋k⌉tl⌉{te1+e2n,e2+e2n−1/a\\}⌊ra⌋k⌉tri}ht\nandVx3=/a\\}⌊ra⌋k⌉tl⌉{te2n−1,e2n/a\\}⌊ra⌋k⌉tri}ht. Then (P,x)∈Y. ForQ(s,t) =sbe2+tbe2n−1, we have ( P,Q,x)∈\np−1(P,x) and an easy check proves that the fiber p−1(P,x) is given by an open subset of the\nsolutions of a linear system of rank d−2+3(2n−2).\nLetY◦⊂Ybe the open subset where the system ( 1) has maximal rank d−2 +3(2n−2).\nThen the map p:p−1(Y◦)→Y◦is locally trivial with fiber an open subset of a vector space of\ndimension dim Z−dimY. This implies that Z◦is the unique component of Zdominating Y\nand that the map p:Z◦∩p−1(Y◦)→Y◦is locally trivial with fiber an open subset of a vector\nspace of dimension dim Z−dimY. We also have dimΓ(3)\nd= dimπ(Z◦) = dimev P(Y).\nPickx∈Γ(3)\ndgeneral. Note that ev−1\nP(x) is an opensubset ofavectorspaceand thus rational.\nSetF=π−1(x). Any irreducible component of Fmeetsp−1(Y◦) non-trivially by Lemma 3.1\nand is of dimension dim Z−dimΓ(3)\nd. LetF′be any such irreducible component. We have\na mapp:F′→ev−1\nP(x) whose general fiber over the image has dimension dim Z−dimY=\ndimF′−dimev−1\nP(x). In particular, p:F′→ev−1\nP(x) is dominant. On the other hand, since\nev−1\nP(x) meetsY◦, the mapp:F→ev−1\nP(x) is a locally trivial fibration with rational fibers over\na dense open subset of ev−1\nP(x). Therefore, Fmust be rational.\nBy Lemma 3.7, we have Γ(3)\n3dominatesX2with fibers of dimension at most 2 n. Hence,\ndimΓ(3)\n3≤2(4n−5)+2n= 10n−10. By Lemma 3.6, we have dimΓ(3)\nd= 3(4n−5) ford≥4.\nTherefore, dim Z−dimΓ(3)\n3≥6 and dimZ−dimΓ(3)\nd=d(2n−1)−8n+14≥10 whend≥4.\nThis implies that when d≥3, the fibers of evd\n(3)are of dimension at least 2. /square\nRecall that Md−1,1=Md−1×XM0,2(X,1)and considerthe map ev (4):Md−1,1→X4defined\nby ev(4)= ev1×ev2×evs×ev3, where ev sis the map induced by the fiber product structure\nand is obtained by evaluation at the singular point of the curve. Defin e Γ(4)\nd−1,1= ev(4)(Md−1,1).\nWe have a commutative diagram\n(2) Md−1,1\nev(4)\n/d41/d41❚❚❚❚❚❚❚❚❚❚❚❚❚❚❚❚❚❚\nevd−1\n(3)×id\n/d15/d15\nΓ(3)\nd−1×XM0,2(X,1)id×ev2/d47/d47Γ(4)\nd−1,1.\nLemma 3.11. The projection pr : Γ(4)\nd−1,1→Γ(3)\nd−1,1isGRCF.\nProof.We need to discuss cases depending on the degree d. Ifd >4, then by Lemma 3.6,\npr−1(x,y,z) = Γ1(z) is a Schubert variety thus rational. If d= 1, then pr−1(x,y,z) ={x}. For\nd= 2 and (x,y,z) general in Γ(3)\n1,1, thenE=Vx+Vy+Vzhas dimension 4 and the restriction ω|E\nhas rank 4. Therefore, x,y,zare points on a 3-dimensional quadric Q, given byQ= IG(2,E),\nwithxandyon a line (xy) andzgeneral. It is easy to check that pr−1(x,y,z) = (xy)∩z⊥is a\nunique point on Q. Ford= 3 and (x,y,z) general in Γ(3)\n2,1, thenVx+Vy+Vzhas dimension 5, the\nrestrictionω|Vx+Vyhas rank 4 and the intersection Vz∩(Vx+Vy) has dimension 1 (by Lemma\n3.7). It is easy to check that pr−1(x,y,z) ={t∈X|(Vx+Vy)∩Vz⊂Vt⊂Vx+Vy} ≃P1.\nFinally, for d= 4, we have Γ(3)\n3,1=X3(by Lemma 3.6). For (x,y,z)∈X3general, the fiber is\ngiven by pr−1(x,y,z) ={t∈X|Vt=/a\\}⌊ra⌋k⌉tl⌉{ta,b/a\\}⌊ra⌋k⌉tri}htwitha∈Vx+Vy,b∈Vzandω(a,b) = 0}, which is\na general hyperplane section of P3×P1in its Segre embedding and therefore rational. /squareQUANTUM K-THEORY OF IG(2 ,2n) 13\nCorollary 3.12. The map evd−1,1\n(3):Md−1,1→Γ(3)\nd−1,1isGRCF.\nProof.All maps in ( 2) are surjective and Md−1,1is irreducible, projective and normal. Further-\nmore, id ×ev2is birational and the vertical map is GRCF by Proposition 3.10. By Proposition\n3.3, the map ev (4)is therefore GRCF. Finally, use Lemma 3.11. /square\nWe conclude with the main reduction result of this section.\nProposition 3.13. We have the following implications.\n(1) Ifπd\n3(u,v)isGRCF, thenevd\n3(u,v)isGRCF;\n(2) Ifπd−1,1\n3(u,v)isGRCF, thenevd−1,1\n3(u,v)isGRCF.\nProof.We have the following diagrams of surjective maps\nMd(Xu,Xv)\n/d39/d39❖❖❖❖❖❖❖❖❖❖❖❖\n/d15/d15\nΓ(3)\nd(Xu,Xv) /d47/d47Γd(Xu,Xv)andMd−1,1(Xu,Xv)\n/d40/d40◗◗◗◗◗◗◗◗◗◗◗◗◗◗\n/d15/d15\nΓ(4)\nd−1,1(Xu,Xv) /d47/d47Γd−1,1(Xu,Xv).\nSince theG-orbit ofXu×Xvis dense in X2and the evaluation maps are G-equivariant, the\ngeneral fibers of the vertical maps are general fibers of the map s\nevd\n(3):Md→Γ(3)\ndand evd−1,1\n(4):Md−1,1→Γ(4)\nd−1,1.\nFurthermore, Md(Xu,Xv) andMd−1,1(Xu,Xv) are projective, irreducible and normal, thus the\nresult follows from Propositions 3.3and3.10, Lemma 3.11, and Corollary 3.12. /square\nCorollary 3.14. IfΓd(x,y) = Γd−1,1(x,y)/\\⌉}atio\\slash=∅forx,y∈Xin general position, then we have\nΓd(Xu,Xv) = Γd−1,1(Xu,Xv). If furthermore πd\n3(u,v)isGRCF, thenevd−1,1\n3(u,v)isGRCF.\nProof.SinceMd(Xu,Xv) andMd−1,1(Xu,Xv) are irreducible, the same is true for Γ(3)\nd(Xu,Xv)\nand Γ(3)\nd−1,1(Xu,Xv). Let Ω be the open subset of X2such that Γ d(x,y) = Γd−1,1(x,y)/\\⌉}atio\\slash=∅for\n(x,y)∈Ω. Since the G-orbit ofXu×Xvis dense in X2and the evaluation maps are G-\nequivariant, we may assume Ω ∩(Xu×Xv)/\\⌉}atio\\slash=∅. Then\n{(x,y,z)∈Xu×Xv×X|(x,y)∈Ω andz∈Γd(x,y)}\n={(x,y,z)∈Xu×Xv×X|(x,y)∈Ω andz∈Γd−1,1(x,y)}\nis a dense open subset of both Γ(3)\nd(Xu,Xv) and Γ(3)\nd−1,1(Xu,Xu), proving that Γ(3)\nd(Xu,Xv) =\nΓ(3)\nd−1,1(Xu,Xv). We deduce that Γ d(Xu,Xv) = Γ d−1,1(Xu,Xv) andπd\n3(u,v) =πd−1,1\n3(u,v).\nThe last assertion follows from Proposition 3.13. /square\n3.4.Results on curve neighborhoods. Before going on, let us prove some preliminary re-\nsults on curve neighborhoods. More precisely, the next result will b e useful for proving that\nΓd(Xu,Xv) and Γ d−1,1(Xu,Xv) have rational singularities when they are equal and dis small.\nProposition 3.15. LetVkbe anyk-dimensional subspace of C2n. The subvariety {z∈X|\nVz∩Vk/\\⌉}atio\\slash= 0} ⊂Xhas rational singularities.\nProof.LetS=G(k,2n) and fors∈S, denote by Vs⊂C2nthe corresponding subspace. Define\nY={(z,s)∈X×S|Vz∩Vs/\\⌉}atio\\slash= 0}. The map Y→XisG-equivariant and therefore locally\ntrivial. Furthermore, the fiber of this map is the Schubert variety {s∈S|Vs∩Vz/\\⌉}atio\\slash= 0}and\ntherefore has rational singularities. In particular Yhas rational singularities. On the other\nhand, the fibers of the map Y→Sare of the form {z∈X|Vz∩Vs/\\⌉}atio\\slash= 0}, and it is easy to\ncheck that these varieties have constant dimension k+ 2n−4 (a birational model is given by14 V. BENEDETTI, N. PERRIN AND W. XU\n{(a,z)∈P(Vs)×X|a⊂Vz⊂a⊥}, which is a locally trivial P2n−3-bundle over P(Vs)). In\nparticular,byMiracleFlatness, theprojection Y→Sisflat. Finally, thefamily( Ys)s∈Sadmitsa\nglobalresolutionofsingularitiesgivenby the variety ˜Y={(l,z,s)∈P2n−1×X×S|l⊂Vz∩Vs}.\nWe can thus apply [ Elk78, Theorem 3], and we deduce that Yshas rational singularities for any\ns∈S. /square\nOut next result will apply when evd\n3is birational, giving a useful relationship among curve\nneighborhoods for degree ( d−1,1) curves and degree dcurves.\nLemma 3.16. Let us assume that d≤2and that evd\n3(u,v)andevd−1,1\n3(u,v)are birational.\nThenΓd−1,1(Xu,Xv)is a divisor inside Γd(Xu,Xv).\nProof.Recall that Γ d−1,1(Xu,Xv) and Γ d(Xu,Xv) are irreducible. We thus only need to com-\npute the codimension of the former in the latter. By the birationality assumption, the di-\nmension of Γ d(Xu,Xv) and Γ d−1,1(Xu,Xv) are equal to the dimension of Md(Xu,Xv) and\nMd−1,1(Xu,Xv). Note that Md−1,1is a union of boundary divisors (see [ FP97]) an is therefore\na divisor in Md. Now by Kleiman-tBertini applied to ev 1×ev2:Md→X2, we get that if\nMd−1,1(Xu,Xv) is non-empty it is a divisor in Md(Xu,Xv). /square\n4.Large degrees\nThe aim of this section is to prove the following result.\nTheorem 4.1. Ford≥3, we have\n(1) The map evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv)isGRCFand never birational;\n(2) The map evd−1,1\n3(u,v) :Md−1,1(Xu,Xv)→Γd−1,1(Xu,Xv)isGRCF;\n(3)Γd(Xu,Xv) = Γd−1,1(Xu,Xv)has rational singularities.\nProof.The results follow from Propositions 3.10,3.13,4.2,4.4and Lemmas 3.6and4.3./square\nIn all cases of the Theorem above our strategy will be to use Propo sition3.13(and this\nstrategy will be used also for degree two and degree one curves). Since the case of degree d≥4\ncurves is much easier, let us deal with it separately.\nProposition 4.2. Ifd≥4, then the morphisms evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv)and\nevd−1,1\n3(u,v) :Md−1,1(Xu,Xv)→Γd−1,1(Xu,Xv)areGRCF.\nProof.By assumption and Lemma 3.6, we have Γ(3)\nd(Xu,Xv) = Γ(3)\nd−1,1(Xu,Xv) =Xu×Xv×X\nand Γd(Xu,Xv) = Γd−1,1(Xu,Xv) =X. The fibers of πd\n3(u,v) andπd−1,1\n3(u,v) are isomorphic\ntoXu×Xvandarethusrationallyconnected(evenrational). Theresultfollow sfromProposition\n3.13. /square\nNotice that when d≥4, Γd(Xu,Xv) = Γd−1,1(Xu,Xv) =Xis smooth. We now focus on\ndegreed= 3 curves. We start with a general statement describing the image of the evaluation\nmap for cubics. Recall that XuandXvas incidence varieties can be defined as Xu={V2∈\nX|dim(V2∩Ep1)≥1 andV2⊂Ep2}andXv={V2∈X|dim(V2∩Eq1)≥1 andV2⊂Eq2}\nand let◦Xu⊂Xuand◦Xv⊂Xvbe the Schubert cells.\nLemma 4.3. We have Γ2,1(Xu,Xv) = Γ3(Xu,Xv) ={z∈X|dim(Vz∩(Ep2+Eq2))≥1}\nand this variety has rational singularities.\nProof.The first equality is a consequence of Lemma 3.7and of the fact that the Gorbit of\nXu×Xvis dense in X2. The fact that {z∈X|dim(Vz∩(Ep2+Eq2))≥1}has rational\nsingularities is a consequence of Proposition 3.15. So let us prove the second equality. Assume\nthatz∈Γ3(Xu,Xv), then there exists x∈Xu,y∈XvandV5∈Gr(5,2n) such that Vx+Vy+QUANTUM K-THEORY OF IG(2 ,2n) 15\nVz⊂V5. In particular dim( Vz∩(Vx+Vy))≥1 andVx+Vy⊂Ep2+Eq2, proving the inclusion\nof the LHS in the RHS. Assume now that z∈Xsatisfies dim( Vz∩(Ep2+Eq2))≥1 and pick a\nnon-zeroa∈Vz∩(Ep2+Eq2). Writea=a′+a′′witha′∈Ep2anda′′∈Eq2. Forzgeneral,\nwe may assume that a′/\\⌉}atio\\slash∈Ep1anda′′/\\⌉}atio\\slash∈Eq1.\nAssume first that p1/\\⌉}atio\\slash= 1/\\⌉}atio\\slash=q1. ThenEp1∩(a′)⊥andEq1∩(a′′)⊥are non-trivial, and we\nmay pickb′∈Ep1∩(a′)⊥andb′′∈Eq1∩(a′′)⊥. Then set Vx=/a\\}⌊ra⌋k⌉tl⌉{ta′,b′/a\\}⌊ra⌋k⌉tri}htandVy=/a\\}⌊ra⌋k⌉tl⌉{ta′′,b′′/a\\}⌊ra⌋k⌉tri}ht. We\nhavex∈Xuandy∈Xvand dim(Vx+Vy+Vz)≤5 thusz∈Γ3(x,y)⊂Γ3(Xu,Xv). Ifp1= 1\nthenp2<2n. We have Ep2⊂E⊥\np1andEp1∩(a′)⊥=Ep1, so we may proceed as above. The\nsame works if q1= 1. /square\nIn order to prove Theorem 4.1, we are left to prove the following result.\nProposition 4.4. The morphisms ev3\n3(u,v) :M3(Xu,Xv)→Γ3(Xu,Xv)andev2,1\n3(u,v) :\nM2,1(Xu,Xv)→Γ2,1(Xu,Xv)areGRCF.\nWe want to use Proposition 3.13, but we also want to avoid dealing with “badly behav-\ning” curves. Because of Lemma 3.4, we can restrict to studying the fibers of π3\n3(u,v)|U3:\nΓ(3)\n3(Xu,Xv)→Γ3(Xu,Xv), where U3⊂Γ(3)\n3(Xu,Xv) is a well-chosen dense open subset.\nWe postpone the proof of Proposition 4.4to the construction of U3and the description of its\nproperties.\nFor (x,y,z)∈Γ(3)\n3(Xu,Xv), consider the following conditions:\n(1)Vx∩Vy= 0,\n(2) dim(Vx+Vy+Vz) = 5,\n(3)Vx∈◦XuandVy∈◦Xv,\n(4)Vz∩(Vx+Vy)/\\⌉}atio\\slash⊆[(Vx∩Ep1)+Vy]∪[Vx+(Vy∩Eq1)].\nCondition ( 1) is a non-empty open condition, and by Lemma 3.7,\n{(x,y,z)∈Γ(3)\n3(Xu,Xv)|(Vx,Vy,Vz) satisfies ( 1)}=\n={(x,y,z)∈Xu×Xv×X|Vx∩Vy= 0,dim(Vx+Vy+Vz)≤5}.\nThus, (2) and (3) are non-empty open conditions, and\n{(x,y,z)∈Γ(3)\n3(Xu,Xv)|(Vx,Vy,Vz) satisfies ( 1)-(3)}=\n={(x,y,z)∈◦Xu×◦Xv×X|Vx∩Vy= 0,dim(Vx+Vy+Vz) = 5}.\nFor (x,y,z) in the latter set, dim( Vx∩Ep1) = dim(Vy∩Eq1) = 1, and ( Vx∩Ep1) +Vyand\nVx+(Vy∩Eq1) are both 3-dimensional subspaces of the 4-dimensional space Vx+Vy, so (4) is\na non-empty open condition and\nU3:={(x,y,z)∈Γ(3)\n3(Xu,Xv)|(Vx,Vy,Vz) satisfies ( 1)-(4)}\nis an open dense subset of Γ(3)\n3(Xu,Xv).\nProposition 4.5. Forz∈Γ3(Xu,Xv)general,(π3\n3(u,v))−1(z)∩U3is unirational.\nProof.Set\nE◦=/braceleftbiggEp2\\Ep1 ifEp2⊆E⊥\np1\nEp2\\(Ep1∪E⊥\np1) otherwise,\nE◦=/braceleftbigg\nEq2\\Eq1 ifEq2⊆(Eq1)⊥\nEq2\\(Eq1∪(Eq1)⊥) otherwise.\nWe have that E◦andE◦are open subsets in Ep2andEq2, respectively. Consider the map\np:Ep2×Eq2→Ep2+Eq2defined by ( a′,a′′)/mapsto→a′+a′′. Note that, since p2≥2,q2≥2, and16 V. BENEDETTI, N. PERRIN AND W. XU\nE•andE•are opposite flags, this map is surjective with fiber isomorphic to Ep2∩Eq2. The\nrestrictionp◦:E◦×E◦→Ep2+Eq2is therefore dominant with fibers over an element in the\nimage isomorphic to a non-empty open subset of Ep2∩Eq2. Fix a general zin\nΓ3(Xu,Xv) ={z∈X|dim(Vz∩(Ep2+Eq2))≥1}\n(see Lemma 4.3); we have that p−1\n◦(Vz) = (E◦×E◦)∩p−1(Vz) is a non-empty open subset of a\nvector space.\nDefine\nP:={((a′,a′′),b,c)∈p−1\n◦(Vz)×(C2n)2|b∈Ep1∩(a′)⊥\\0, c∈Eq1∩(a′′)⊥\\0}\nand set\nP◦={((a′,a′′),b,c)∈ P |dim/a\\}⌊ra⌋k⌉tl⌉{ta′,a′′,b,c/a\\}⌊ra⌋k⌉tri}ht= 4,dim(Vz+/a\\}⌊ra⌋k⌉tl⌉{ta′,a′′,b,c/a\\}⌊ra⌋k⌉tri}ht) = 5}.\nNotethat P◦isanopensubsetof P. Lemma 4.6impliesthat P◦isnon-empty. ThenProposition\n4.5follows from Lemma 4.6and Lemma 4.7below. /square\nLemma 4.6. Forz∈Γ3(Xu,Xv)general, the map P◦→(π3\n3(u,v))−1(z)∩ U3defined by\n((a′,a′′),b,c)/mapsto→(x,y)withVx=/a\\}⌊ra⌋k⌉tl⌉{ta′,b/a\\}⌊ra⌋k⌉tri}htandVy=/a\\}⌊ra⌋k⌉tl⌉{ta′′,c/a\\}⌊ra⌋k⌉tri}htis surjective.\nProof.Let (x,y,z)∈(π3\n3(u,v))−1(z)∩U3. Then by assumptions ( 1) and (2), dim(Vz∩(Vx+\nVy)) = 1. Let a∈Vz∩(Vx+Vy) be a non-zero element and write a=a′+a′′witha′∈Vxand\na′′∈Vy. By assumption ( 1), this decomposition is unique.\nWe claim that ( a′,a′′)∈p−1\n◦(Vz). Clearly, we have a′∈Ep2anda′′∈Eq2. By assumption\n(4), we have a′/\\⌉}atio\\slash∈Ep1anda′′/\\⌉}atio\\slash∈Eq1. Furthermore, if Ep2/\\⌉}atio\\slash⊆E⊥\np1, then since x∈◦Xu, we have\nVx∩E⊥\np1=Vx∩Ep1anda′/\\⌉}atio\\slash∈E⊥\np1. By a symmetric argument, if Eq2/\\⌉}atio\\slash⊆(Eq1)⊥, we have\na′′/\\⌉}atio\\slash∈(Eq1)⊥. We thus have ( a′,a′′)∈p−1\n◦(Vz).\nLetb∈Vx∩Ep1andc∈Vy∩Eq1be non-zero elements. By assumption ( 4), we have\nVx=/a\\}⌊ra⌋k⌉tl⌉{ta′,b/a\\}⌊ra⌋k⌉tri}htandVy=/a\\}⌊ra⌋k⌉tl⌉{ta′′,c/a\\}⌊ra⌋k⌉tri}ht, thusb∈(a′)⊥andc∈(a′′)⊥. Furthermore, by assumptions ( 1)\nand (2), we have (( a′,a′′),b,c)∈ P◦mapping to ( x,y), proving the result. /square\nLemma 4.7. The setPis unirational.\nProof.Consider the map P →p−1\n◦(Vz),((a′,a′′),b,c)/mapsto→(a′,a′′). We first prove that this map\nis surjective. Note that the choice of cis independent of the choice of b, so by symmetry, we\ncan concentrate on the map (( a′,a′′),b)/mapsto→(a′,a′′). We only need to prove that Ep1∩(a′)⊥is\nalways non-zero. If p1>1 the result follows. If p1= 1, thenEp2⊂E⊥\np1thusa′∈E⊥\np1and\nEp1∩(a′)⊥=Ep1, proving the result. Now, by construction of E◦andE◦, this map is the\ncomposition of vector bundles (with zero section removed), provin g the statement. /square\nFinally, we can prove Proposition 4.4.\nProof of Proposition 4.4.The result about degree d= 3 curves follows from Proposition 4.5,\nLemma3.4and Proposition 3.13. The result about degree (2 ,1) curves follows from Proposi-\ntion4.5and Corollary 3.14. /square\nWe now deal with small degree (i.e. degree two and one) curves.\n5.Degree 2\nRecall that there existsintegers p12n. Consider the map ga:W → {([a1],[a2],z)∈P(Ep1)◦×\nP(Eq2)◦×X|a1/\\⌉}atio\\slash∈Vz∩/a\\}⌊ra⌋k⌉tl⌉{ta1,a2/a\\}⌊ra⌋k⌉tri}ht /\\⌉}atio\\slash= 0 andω(a1,a2)/\\⌉}atio\\slash= 0}obtained by projection, and let W◦be\nthe open subset in Wwhere this map has fibers of minimal dimension. It suffices to prove th at\nF=W◦∩π−1(z) is unirational of positive dimension for z∈Γ2(Xu,Xv) general. Consider\nthe restriction ga:F→P(q−1(Vz)). A general fiber of this map is an open subset of the\nprojective space {[b1,b2]∈P(p−1(Vz))|ω(a1,b2) = 0 =ω(a2,b1)}. This projective space has\ndimension 1 + p2+q1−2n−δp−δq≥0, thus the map is dominant. Furthermore, we know\nthat fibers of this map have constant dimension. It follows that Fis unirational of dimension\np1+p2+q1+q2−4n+2−δp−δq≥1.\nCase 2:p1+q2>2nandp2+q1≥2n. This is similar to Case 1.\nCase 3:p1+q2= 2n=p2+q1. In this case, min( δp,δq) = 0, and for fixed z∈Γ2(Xu,Xv), we\nhavedimp−1(Vz) = dimq−1(Vz) = 2. Therefore, π−1(z)isbirationalto P1×P1ifmax(δp,δq) = 0\nor an open subset of a hyperplane section of bidegree (1 ,1) inP1×P1if max(δp,δq) = 1. We\nare done in the former case, in the latter case, we only need to prov e that the defining form\nis non-degenerate. We may assume p1≤q1which implies p1+ 2≤q1, and we exhibit a Vz\nfor which the form is non-degenerate. Set Vz=/a\\}⌊ra⌋k⌉tl⌉{teq1+e2n+1−q1,eq2+e2n+1−q2/a\\}⌊ra⌋k⌉tri}htifp2≥q1\nandVz=/a\\}⌊ra⌋k⌉tl⌉{tep2+e2n+1−p2,eq2+e2n+1−q2/a\\}⌊ra⌋k⌉tri}htifp2≤q1. Both cases are similar, so we only deal\nwith the latter. We have q−1(Vz) =/a\\}⌊ra⌋k⌉tl⌉{t(0,ep2+e2n+1−p2),(0,eq2+e2n+1−q2)/a\\}⌊ra⌋k⌉tri}htandp−1(Vz) =\n/a\\}⌊ra⌋k⌉tl⌉{t(ep2,e2n+1−p2),(e2n+1−q2,eq2)/a\\}⌊ra⌋k⌉tri}ht. The condition ω(a1,b2) = 0 is always trivial and the condition\nω(a2,b1) = 0 is induced by a matrix of the form\n/parenleftbigg\n±1 0\n0±1/parenrightbigg\nproving the result in this case.\nCase 4:p1+q2<2nandp2+q1>2n. Note that dim W ≥p1+q2+ 2n−3. By Lemma 5.7,\ndimΓ2(Xu,Xv)≤p1+q2+ 2n−4. Therefore, fibers of πare positive dimensional. For\nz∈Γ2(Xu,Xv) general, by Lemma 3.8, we have dim( Vz∩(Ep1+Eq2)) = 1 and therefore a\nunique element [ a1+a2]∈P(Vz∩(Ep1+Eq2)).\nFor ([a1],[a2],[b1],[b2],z)∈π−1(z) the elements [ a1] and [a2] are fixed as above. Therefore,\nπ−1(z) is birational to the linear space\n{[b1,b2]∈P(p−1(Vz))|ω(a1,b2) =ω(a2,b1) = 0}.\nCase 5:p1+q2>2nandp2+q1<2n. This is similar to Case 4.\nCase 6:p1+q2= 2n,p2+q1<2nand max(δp,δq) = 0. This follows from the proof of Lemma\n5.6part (2).\nCase 7:p1+q2<2n,p2+q1= 2nand max(δp,δq) = 0. This is similar to Case 6. /square\nCorollary 5.9. Whenπis not birational, we have\nΓ2(Xu,Xv) ={z∈X|Vz∩(Ep1+(Ep2∩Eq2)+Eq1)/\\⌉}atio\\slash= 0}\nandΓ2(Xu,Xv)has rational singularities.20 V. BENEDETTI, N. PERRIN AND W. XU\nProof.Whenp1+q2≥2n, we haveEp1+(Ep2∩Eq2)+Eq1=Ep2+Eq1; whenp2+q1≥2n,\nwe haveEp1+(Ep2∩Eq2)+Eq1=Ep1+Eq2. The result follows from Lemma 5.7and the proof\nof Proposition 5.8. The rational singularities statement follows from Proposition 3.15./square\nLemma 5.10. We have\nΓ1,1(Xu,Xv)⊆ {z∈X|Vz∩(Ep1+(Ep2∩Eq2)+Eq1)/\\⌉}atio\\slash= 0}.\nProof.Note that there is no assumption on πhere. Let ( x,y,z,t)∈Γ(4)\n1,1(Xu,Xv) be general,\nthenVt⊂Vx+Vy,Vt∩Vz/\\⌉}atio\\slash= 0 andVx+Vy⊆Ep1+(Ep2∩Eq2)+Eq1, soVz∩(Ep1+(Ep2∩\nEq2)+Eq1)/\\⌉}atio\\slash= 0, proving the result. /square\nThe reverse inclusion will follow from the proof of the following Propos ition.\nProposition 5.11. (1)Γ1,1(Xu,Xv)is non-empty if and only if p2+q2>2n.\n(2) If(C2)does not hold, then π1,1\n3(u,v)is GRCF.\n(3) If(C2)holds, then π1,1\n3(u,v)is generically finite of degree 2.\nProof.Note that if p2+q2≤2n, then Γ 1,1(Xu,Xv) =∅. Now assume p2+q2>2n.\nLetz∈Γ1,1(Xu,Xv) be general. We look for a∈Vz∩(Ep1+ (Ep2∩Eq2) +Eq1)\\0 with\ndecompositions a=a[1]+a[2]+a′\n[1], wherea[1]∈Ep1\\0,a[2]∈(Ep2∩Eq2)\\(Ep1∪Eq1),\na′\n[1]∈Eq1\\0, and\n(3) ω(a[2],a[1]) = 0,\n(4) ω(a[2],a′\n[1]) = 0.\nThen forVx=/a\\}⌊ra⌋k⌉tl⌉{ta[1],a[2]/a\\}⌊ra⌋k⌉tri}htandVy=/a\\}⌊ra⌋k⌉tl⌉{ta′\n[1],a[2]/a\\}⌊ra⌋k⌉tri}ht, we have that ( x,y,z)∈(π1,1\n3(u,v))−1(z). Without\nloss of generality, we assume\np2+q1≥p1+q2.\nLet\nm= max(0,p1+q2−2n).\nWritea= (a1,···,a2n) in the basis ( ei)i∈[1,2n]. Then\na[1]= (a1,···,ap1−m,ap1−m+1+λp1−m+1,···,ap1+λp1,0,···,0),\na′\n[1]= (0,···,0,a2n+1−q1+µ2n+1−q1,···,ap2+µp2,ap2+1,···,a2n),\nanda[2]=a−a[1]−a′\n[1], where the variables λiandµjsatisfy equations ( 3) and (4).\nCase 1:p2+q1>2n. This condition guarantees that there is at least one variable µp2. We first\ncompute the coefficients c1\np2andc2\np2ofµp2in equations ( 3) and (4), respectively. We get\nc1\np2=\n\n0 if p2<2n+1−p1\n−(a2n+1−p2+λ2n+1−p2) if 2n+1−p1q2\nand\nc2\np2=\n\n±a2n+1−p2ifp2<2n+1−p1\n−λ2n+1−p2if 2n+1−p1q2.\nIfp1+p2<2n+1, then equation ( 3) is trivial, and we can solve equation ( 4) inµp2as long as\na2n+1−p2/\\⌉}atio\\slash= 0, proving the result in this case. Assume p1+p2>2n+1. Ifq1+q2<2n+ 1,\nthen equation ( 4) is trivial, and we can solve equation ( 3) inµp2as long as a2n+1−p2/\\⌉}atio\\slash= 0\nora2n+1−p2+λ2n+1−p2/\\⌉}atio\\slash= 0, proving the result in this case. We may therefore also assume\nq1+q2>2n+1. Sincep2+q1≥p1+q2, we get 2(p2+q1)≥p1+p2+q1+q2≥4n+4 thusQUANTUM K-THEORY OF IG(2 ,2n) 21\np2+q1≥2n+ 2. In particular p2−1≥2n+1−q1. We compute the coefficients c1\np2−1and\nc2\np2−1ofµp2−1in equations ( 3) and (4), respectively:\nc1\np2−1=/braceleftbigg−(a2n+2−p2+λ2n+2−p2) ifp2−1≤q2\n−a2n+2−p2 ifq22n, the intersection\nEp1∩Eq1is positive dimensional and contained in pr2p−1(/a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht) for anyw∈Vz. We claim that\nthere is no 0 /\\⌉}atio\\slash=w∈Vzsuch that pr2p−1(/a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht)⊂w⊥. Indeed, this would imply the inclusion\nEp1∩Eq1⊂w⊥and therefore the inclusion w⊂Vz∩(Ep1∩Eq1)⊥. This space is trivial except\nforp1+q1= 2n+ 1 for which /a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}htwould be uniquely determined. However, by genericity of\nz, thiswwill in general not satisfy the hyperplane condition pr2p−1(/a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht)⊂w⊥, proving the\nclaim.\nFrom the claim we deduce that everynon-zerow∈Vzdefines a (p1+q1−2n)-dimensional\naffine space w⊥∩pr2p−1(/a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht). This implies that Bis a locally trivial fibration over Vzwith\nfiber isomorphic to w⊥∩pr2p−1(/a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht), thus it is rational. There exists a birational map\nP(B) :={([a,b],[w])∈P(p−1(Vz))×P(Vz)|ω(b,w) = 0,a+b∈ /a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht} → U 0,1∩π0,1\n3(u,v)−1(z),\n([a,b],[w])/mapsto→([/a\\}⌊ra⌋k⌉tl⌉{ta,w/a\\}⌊ra⌋k⌉tri}ht],[/a\\}⌊ra⌋k⌉tl⌉{tb,w/a\\}⌊ra⌋k⌉tri}ht],z) which is dominant; by composing with the projection B→26 V. BENEDETTI, N. PERRIN AND W. XU\nP(B) we deduce that U0,1∩π0,1\n3(u,v)−1(z) is unirational. Since ( Ep1∩Eq1) is at least one-\ndimensional, the general fiber of P(B)→P(Vz) is non-empty, and thus P(B) - as well as\nU0,1∩π0,1\n3(u,v)−1(z) - is positive dimensional. /square\n6.3.The case of condition (C1).For lines, condition ( C1) holds exactly when ev0,1\n3(u,v) is\ngenerically finite but not birational. More precisely, the following resu lt holds.\nLemma 6.9. If(C1)holds, then Γ1(Xu,Xv) = Γ0,1(Xu,Xv) =Xandev0,1\n3(u,v)is generically\nfinite of degree 2.\nProof.By the proof of Corollary 3.12whend= 1, the map ev0,1\n(3)(u,v) is birational. Thus, it\nis sufficient to prove that π0,1\n3(u,v) is generically finite of degree 2, and by Lemma 3.1we are\nreduced to prove that, for z∈Xgeneral, U0,1∩π0,1\n3(u,v)−1(z) consists of two points. Then,\nthe first part of the proof goes as in the proof of Lemma 6.8: in this case the fiber over zof\nπ0,1\n3(u,v)|U0,1is{([a,b],w)∈P(p−1(Vz))×P(Vz)|b⊥wanda∧b/\\⌉}atio\\slash= 0,a+b∈ /a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht}. We again\nneed to look at elements 0 /\\⌉}atio\\slash=w∈Vzsuch that pr2p−1(/a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht)⊂w⊥. This condition is not empty\nanymore. In fact, it is a generic degree two hyperplane condition on Vz. Thus, there exist\nexactly two lines /a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}htand/a\\}⌊ra⌋k⌉tl⌉{tw′/a\\}⌊ra⌋k⌉tri}htthat satisfy it. Each of these two lines defines, modulo scalars,\na unique couple ( a,b) and (a′,b′), and therefore Vx=/a\\}⌊ra⌋k⌉tl⌉{ta,b/a\\}⌊ra⌋k⌉tri}htandVx′=/a\\}⌊ra⌋k⌉tl⌉{ta′,b′/a\\}⌊ra⌋k⌉tri}ht. We deduce that\nU0,1∩π0,1\n3(u,v)−1(z) ={(x,x,z),(x′,x′,z)}.\nThe fact that Γ 1(Xu,Xv) = Γ0,1(Xu,Xv) =Xis a consequence of the fact that throughout\ntheproof, the point zwasassumedtobe generalin X, andwehaveprovedthat π0,1\n3(u,v)−1(z)/\\⌉}atio\\slash=\n∅. /square\nThis was the last result needed to prove Theorem 6.1. Now we study the generically finite\ndegree 2 map above, as well as the similar one appearing for curves o f degree two, from the\npoint of view of quantum K-theory.\n7.Non rationally connected cases\nIn this section we prove positivity in QK( X) when the map evd−1,1\n3is not GRCF (which is,\nin cases ( C1) and (C2)). The reason why we need to single out these cases is the fact tha t we\nwould like to use Corollary 2.9, but we cannot apply Theorem 2.10since evd−1,1\n3(u,v) is not\nGRCF. We prove the following result.\nProposition 7.1 (see Proposition 2.15).The following holds in QK(X):\n(1) If(C1)holds, then Ou⋆Ov=Ov\nu−q+qO2n−2,2n.\n(2) If(C2)holds, then we have\nOp1,p2⋆Oq1,q2=qOp2+q2−2n,2n\np1+q1,2n−q2+q2O2n−2,2n.\nRemark 7.2. When (Cd) holds, by Theorems 5.1and6.1, fibers of evd\n3(u,v) is positive di-\nmensional. By the projection formula, this implies that the coefficient ofqdin [Xu]⋆[Xv] is\n0 in quantum cohomology. Proposition 7.1shows that in this case, the maximum power of\nqappearing in Ou⋆Ov, which isqd, is greater than the maximum power of qappearing in\n[Xu]⋆[Xv].\nTo compute the quantum product when ( C1) or (C2) holds, we will use Proposition 2.8. Our\nstrategy is to prove that the computation of the quantum produc tOu⋆Ovcan be essentially\nreduced to the computation of the class of OΓd−1(Xu,Xv). So we start with results express-\ning the class of OΓd−1(Xu,Xv)in terms of Schubert classes. For instance, for d= 1, we have\nΓd−1(Xu,Xv) =Xv\nu, and the following result expresses OXv\nuin terms of Schubert classes when\n(C1) holds.QUANTUM K-THEORY OF IG(2 ,2n) 27\nProposition 7.3. Letp∈[1,n],Xu={z∈X|Vz∩Ep/\\⌉}atio\\slash= 0}andXv={z∈X|Vz∩E2n−p/\\⌉}atio\\slash=\n0}.\n(1) Ifp2n+1 andr2≤2n−p,\n2 ifr1+r2= 2n+2 andr2>2n+1−p ,\n1 ifr1+r2= 2n+2 andr2= 2n+1−p,\n1 ifr1+r2>2n+2 andr2>2n−p.\nThe result then follows from Corollary 2.2.\nWe are left to prove the claim. Set Z=Y∩gXw. We have\nZ={z∈X|Vz∩Ep/\\⌉}atio\\slash= 0/\\⌉}atio\\slash=Vz∩E2n−p,Vz∩g.Er1/\\⌉}atio\\slash= 0 andVz⊂g.Er2}.\nFirst note that if z∈Z, thenEp∩g.Er2/\\⌉}atio\\slash= 0, thus we must have r2+p>2n. If this condition\nis satisfied, we have Vz⊂(Ep∩g.Er2)⊕(E2n−p∩g.Er2), thusg.Er1∩((Ep∩g.Er2)⊕(E2n−p∩\ng.Er2))/\\⌉}atio\\slash= 0. These subspaces are of dimension r1andp+r2−2n+2n−p+r2−2n= 2r2−2n\nare in general position in g.Er2, thus we also have r1+2r2−2n>r2,i.e.r1+r2>2n, proving\nthe first two cases.\nAssume that r1+r2≥2n+2. SetE=Ep∩g.Er2,F=E2n−p∩g.Er2andL=g.Er1. Let\nz∈Z, thenVz=/a\\}⌊ra⌋k⌉tl⌉{ta,b/a\\}⌊ra⌋k⌉tri}htfor somea∈E\\0 andb∈F\\0. Furthermore, there exists scalars\nλ,µ∈Csuch thatλa+µb∈L. Forzin a dense open subset of Z, we haveλ/\\⌉}atio\\slash= 0/\\⌉}atio\\slash=µ(otherwise\naorblies inL). Conversely, if c∈L∩(E⊕F) has a decomposition c=a+bwitha∈E\\0\nandb∈F\\0, thenVz=/a\\}⌊ra⌋k⌉tl⌉{ta,b/a\\}⌊ra⌋k⌉tri}htdefines a point z∈Zas soon asω(a,b) = 0. This proves that Z\nis birational to the following variety\nZ′={[c]∈P(L∩(E⊕F))|c=a+b,a∈E\\0,b∈F\\0 andω(a,b) = 0}.\nAssume that r1+r2≥2n+2 andr2= 2n+1−p, then dimE= 1 andE=/a\\}⌊ra⌋k⌉tl⌉{ta/a\\}⌊ra⌋k⌉tri}ht. We then have\nZ′={[c]∈P(L∩(E⊕F))|ω(c,a) = 0}=P(L∩(E⊕F)∩E⊥) proving the result in this case.\nFinally, assume that r1+r2≥2n+2 andr2>2n+1−p, then dimE >1. The condition\nc=a+bwithω(a,b) = 0 defines a quadratic form on P(L∩(E⊕F)), proving the result in this\ncase as well. Note that for r1+r2= 2n+2, we have P(L∩(E⊕F))≃P1so that the quadric\nis the union of two points. /square\nWe consider the case d= 2 and assume that ( C2) holds, i.e., we have p1+q2= 2n=p2+q1,\np2−p1=q2−q1≥2, and max( δp,δq) = 1. We may assume p1+p2≤q1+q2, the other case\nbeing symmetric. In this case, we have p1+p2≤2n−2,δp= 0,q1+q2≥2n+2, andδq= 1.\nNote that condition ( C2) implies the decomposition C2n=Ep1⊕(Ep2∩Eq2)⊕Eq1.\nLemma 7.4. If(C2)holds, then\nΓ1(Xu,Xv) ={z∈X|Vz∩(Ep2∩Eq2)/\\⌉}atio\\slash= 0/\\⌉}atio\\slash=Vz∩(Ep1+Eq1)}.28 V. BENEDETTI, N. PERRIN AND W. XU\nProof.Letz∈Γ1(Xu,Xv). Then there exists x∈Xuandy∈XvwithVx∩Vy/\\⌉}atio\\slash= 0 and\nVx∩Vy⊂Vz⊂Vx+Vy. In particular this proves the inclusion from left to right. Converse ly,\nletzin the right-hand side of the equality. Let a∈Vz∩(Ep2∩Eq2) andb∈Vz∩(Ep1+Eq1)\nwitha/\\⌉}atio\\slash= 0/\\⌉}atio\\slash=b. SinceEp2∩Eq2∩(Ep1+Eq1) = 0, we have Vz=/a\\}⌊ra⌋k⌉tl⌉{ta,b/a\\}⌊ra⌋k⌉tri}ht. Writeb=bp+bq\nwithbp∈Ep1andbq∈Eq1. Ifbp/\\⌉}atio\\slash= 0/\\⌉}atio\\slash=bq, then since ω(a,b) = 0 and δp= 0, we have\nω(a,bp) = 0 =ω(a,bq) and setting Vx=/a\\}⌊ra⌋k⌉tl⌉{ta,bp/a\\}⌊ra⌋k⌉tri}htandVy=/a\\}⌊ra⌋k⌉tl⌉{ta,bq/a\\}⌊ra⌋k⌉tri}ht, we havex∈Xu,y∈Xv, and\nzlies on the line joining xandy. Ifbq= 0, thenz∈Xuand sinceq1≥p1+2, we may choose\nc∈Eq1∩a⊥\\0 so that setting Vy=/a\\}⌊ra⌋k⌉tl⌉{ta,c/a\\}⌊ra⌋k⌉tri}ht, we havey∈Xv, proving the result. Finally, if\nbp= 0, thenz∈Xv. Choose any c∈Ep1\\0; sinceδp= 0, setting Vx=/a\\}⌊ra⌋k⌉tl⌉{ta,c/a\\}⌊ra⌋k⌉tri}ht, we havex∈Xu,\nproving the result. /square\nSetA=Ep1+Eq1,B=Ep2∩Eq2,p= dimA, andq= dimB. When ( C2) holds,\nwe havep=p1+q1,q=p2+q2−2n= 2n−p, andC2n=A⊕B=Ep⊕Eq. Define\nXλ={z∈X|Vz∩Ep/\\⌉}atio\\slash= 0},Xµ={z∈X|Vz∩Eq/\\⌉}atio\\slash= 0}, andXµ\nλ=Xλ∩Xµ.\nLemma 7.5. If(C2)holds, then OΓ1(Xu,Xv)=OXµ\nλ.\nProof.DefineZ1={([a],[b])∈P(Ep)×P(Eq)|ω(a,b) = 0}andZ0={([a],[b])∈P(A)×\nP(B)|ω(a,b) = 0}. We haveisomorphisms Z1→Xµ\nλandZ0→Γ1(Xu,Xv) givenby ([ a],[b])/mapsto→\n/a\\}⌊ra⌋k⌉tl⌉{ta,b/a\\}⌊ra⌋k⌉tri}ht.\nDefine the linear isomorphism ψ:C2n→C2nvia\nψ(ek) =\n\nek fork∈[1,p1]\nek+p2−p1fork∈[p1+1,p1+q1]\nek−q1fork∈[p1+q1+1,2n].\nFort∈Cdefineϕt=tIdC2n+ (1−t)ψ. We have ϕ0(Ep) =Aandϕ0(Eq) =B, while\nϕ1(Ep) =Epandϕ1(Eq) =Eq. Define\nZ={([a],[b],t)∈P(Ep)×P(Eq)×C|ω(ϕt(a),ϕt(b)) = 0}.\nThe formωt(a,b) =ω(ϕt(a),ϕt(b)) induces a bilinear form Ω t:Ep×Eq→C. This form\nhas maximal rank for t= 1 and rank 2 n−(p1+p2)≥2 fort= 0. Let U⊂Cbe the\nopen subset defined by U={t∈C|det(ϕt)/\\⌉}atio\\slash= 0 and Rk(Ω t)≥2}. Note that 0 ,1∈U.\nLetπ:Z→Cbe the third projection. We have π−1(0) =Z0andπ−1(1) =Z1. We have\na morphism e:Z→X,([a],[b],t)/mapsto→ /a\\}⌊ra⌋k⌉tl⌉{tϕt(a),ϕt(b)/a\\}⌊ra⌋k⌉tri}htwhich restricts to an isomorphism onto its\nimage onZt:=π−1(t). We therefore only need to prove that the map π−1(U)→Uis flat. Since\nZis defined by a unique non-trivial equation, any irreducible componen t ofZhas dimension\np+q−2. By Miracle Flatness, we only need to prove that the fibers of πhave dimension at\nmostp+q−3 which follows from the fact that Rk(Ω t)≥2. /square\nLemma 7.6. We have Γ1(Xv) ={W2∈X|dim(W2∩Eq2)≥1}.\nProof.IfW2∈Γ1(Xv), then there exists V2∈Xvsuch that dim( W2∩V2)≥1. SinceV2⊂Eq2,\nwe must have dim( W2∩Eq2)≥1. Therefore, Γ 1(Xv)⊆ {W2∈X|dim(W2∩Eq2)≥1}.\nFor the reverse containment, let W2∈X\\Xvsuch that dim( W2∩Eq2)≥1. Letu∈(W2∩\nEq2)\\0. IfW2∩Eq1= 0, letv∈(Eq1\\0)∩/a\\}⌊ra⌋k⌉tl⌉{tu/a\\}⌊ra⌋k⌉tri}ht⊥; otherwise, dim( W2∩Eq1) = dim(W2∩Eq2) = 1\nand letv∈(Eq2\\W2)∩ /a\\}⌊ra⌋k⌉tl⌉{tu/a\\}⌊ra⌋k⌉tri}ht⊥. By construction, dim /a\\}⌊ra⌋k⌉tl⌉{tu,v/a\\}⌊ra⌋k⌉tri}ht= 2 and /a\\}⌊ra⌋k⌉tl⌉{tu,v/a\\}⌊ra⌋k⌉tri}ht ∈Xv. Moreover,\nL={V2|dimV2= 2 and /a\\}⌊ra⌋k⌉tl⌉{tu/a\\}⌊ra⌋k⌉tri}ht ⊂V2⊂W2+/a\\}⌊ra⌋k⌉tl⌉{tv/a\\}⌊ra⌋k⌉tri}ht}is a line in Xconnecting W2andXv./square\nProof of Proposition 7.1.From Corollary 2.6and Proposition 2.8we deduce that\nκw,d\nu,v=/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nw/a\\}⌊ra⌋k⌉tri}htd−/summationdisplay\nκ/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nκ/a\\}⌊ra⌋k⌉tri}htd−1/a\\}⌊ra⌋k⌉tl⌉{tOκ,O∨\nw/a\\}⌊ra⌋k⌉tri}ht1.QUANTUM K-THEORY OF IG(2 ,2n) 29\nNote that /a\\}⌊ra⌋k⌉tl⌉{tOκ,O∨\nw/a\\}⌊ra⌋k⌉tri}ht1= 0 except for Γ 1(Xκ) =Xw.So fixingκwith this property, we get\nκw,d\nu,v=/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nw/a\\}⌊ra⌋k⌉tri}htd−/summationdisplay\nκ,Γ1(Xκ)=Xw/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nκ/a\\}⌊ra⌋k⌉tri}htd−1.\nBy Corollary 2.12, it suffices to compute κw,d\nu,vfor 0≤d≤2. Furthermore, by Theorems 2.10\nand2.11, for any degree r, we have\nOΓr(Xu,Xv)=/summationdisplay\nη/a\\}⌊ra⌋k⌉tl⌉{tOu,Ov,O∨\nη/a\\}⌊ra⌋k⌉tri}htrOη.\nIf (C1) holds, then Γ 1(Xu,Xv) =Xby Lemma 6.9; if (C2) holds, then Γ 2(Xu,Xv) =Xby\nCorollary 5.9, andOΓ1(Xu,Xv)=OXµ\nλby Lemma 7.5. The result then follows from Proposi-\ntion7.3and Lemma 7.6. /square\n8.Seidel representation\nForXsmooth and projective, Seidel introduced in [ Sei97] a representation of π1(Aut(X))\ninto the group of invertibles of QH( X)locwhere the quantum parameters are inverted. This\nrepresentation was computed explicitly in [ CMP09] (see also [ CP23]). Recently these results\nwere extended in the quantum K-theory of cominuscule spaces in [ BCP23]. We prove that these\nresults extend to X= IG(2,2n) for the quantum K-theory QK( X).\nNote thatπ1(Aut(X)) =Z/2Z. This group can be realized as a subgroup of the Weyl group\nas follows. Fix G= Sp2nandT⊂B⊂Ga maximal torus and a Borel subgroup. Let Wbe the\nWeyl group associated to ( G,T) andw0be the longest element for the length induced by B. For\nYprojective and homogeneous under G= Sp2n, letPYbe the parabolic subgroup containing a\nfixed Borel subgroup Bsuch thatY≃G/PY. For any such Y, letwYbe the minimal length\nrepresentative of w0inW/WPY. We callY=G/PYcominuscule if the unipotent radical of PY\nis abelian. We have\nπ1(Aut(X))≃Wcomin={1}∪{wY∈W|Ycominuscule }={1,wLG(n,2n)}.\nWe first prove the following geometric result. For u,w∈W, letdmin(u,w) be the smallest power\nofqappearing in the quantum product [ Xu]⋆[Xw]. By [CMP09], we have [ Xw0w]⋆[Xu] =\nqdmin(u,w)[Xwu].\nTheorem 8.1. Letu∈W,w∈Wcomin, thenΓdmin(u,w)(Xw0w,Xu) =w−1.Xwu.\nThis result is a special case of a conjecture stated in [ BCP23] (for more recent results on this\ntopic we refer to [ Tar23]). The statement is easily true for w= 1 so letw∈Wcomin\\{1}. We\nhaveXw={x∈X|Vx⊂En}andXw0w={x∈X|Vx⊂En}. We provethe following explicit\nresult which implies Theorem 8.1. LetXu=Xp1,p2:={x∈X|Vx∩Ep1/\\⌉}atio\\slash= 0 andVx⊂Ep2}\nwithp1n, thend= 0andΓd(Xw0w,Xu) =w−1.Xp1−n,p2−n.\nProof.Note that we have w−1=wand thatwacts as follows on ( ei)i∈[1,2n]:\nw(ei) =/braceleftbiggei+nfori≤n\nei−nfori>n.\nNote also that d=dmin(u,w) = min{d|Γd(Xw0w,Xu)/\\⌉}atio\\slash=∅}.\n(1) Assume p2≤n, note that this implies δp= 0. Fore≤1 and for any z∈Γe(Xw0w,Xu),\nwe haveVz∩En∩Ep2/\\⌉}atio\\slash= 0. But the condition p2≤nimplies the vanishing En∩Ep2= 030 V. BENEDETTI, N. PERRIN AND W. XU\nproving the equality Γ e(Xw0w,Xu) =∅. Forz∈Γ2(Xw0w,Xu) general, there exists x∈Xw0w\nandy∈Xusuch thatVz⊂Vx+Vyby Lemma 3.8. In particular Vz⊂En⊕Ep2and\nVz∩(En⊕Ep1)/\\⌉}atio\\slash= 0. Since w−1.En+p1=En⊕Ep1andw−1.En+p2=En⊕Ep2, we get the\ninclusion Γ 2(Xw0w,Xu)⊂w−1.Xwu. Conversely, for z∈w−1.Xwugeneral, then Vz⊂En⊕Ep2\nandVz∩(En⊕Ep1)/\\⌉}atio\\slash= 0. Pick a basis ( a,b) ofVzsuch thata∈Vz∩(En⊕Ep1). Write\na=a1+a2andb=b1+b2witha1,b1∈En,a2∈Ep1andb2∈Ep2. Then setting Vx=/a\\}⌊ra⌋k⌉tl⌉{ta1,b1/a\\}⌊ra⌋k⌉tri}ht\nandVy=/a\\}⌊ra⌋k⌉tl⌉{ta2,b2/a\\}⌊ra⌋k⌉tri}ht, we havex∈Xw0w,y∈XuandVz⊂Vx+Vy, proving the result.\n(2) Assume p1≤n0.\n(2)Γ0,1(Xu,Xv) = Γ1(Xv\nu).\n(3)Γd−1,1(Xu,Xv) = Γd(Xu,Xv) =Xfor alld>1.32 V. BENEDETTI, N. PERRIN AND W. XU\n(4) The general fibers of the maps evd\n3(u,v) :Md(Xu,Xv)→Γd(Xu,Xv)andevd−1,1\n3(u,v) :\nMd−1,1(Xu,Xv)→Γd−1,1(Xu,Xv)are rationally connected for all d≥0except for\nev0,1\n3(u,v)whenq1= 2andq2= 2n, whose general fibers consist of two points.\nProof.Part(1)followsfromthe factthatwhen d>0, adegreedcurvemustmeetthedivisor Xu.\nFor part ( 2), note that for a degree 0 curve meeting XuandXvis a point in Xu∩Xv=Xv\nu.\nFor Part ( 3), note that when d >1, Γd−1,1(Xu,Xv)⊇Γ1,1(Xu,Xv)⊇Γ1,1(Xv), where the\nlast containment follows from the fact that a degree 1 curve must m eetXu; by (1), we have\nΓd(Xu,Xv) = Γ d(Xv)⊇Γ2(Xv). Finally, Γ 1,1(Xv) = Γ 2(Xv) =Xby Lemma 2.5. Notice\nthat sinceXu=X2n,2n−2, (C2) is never satisfied and ( C1) is satisfied exactly when q1= 2 and\nq2= 2n; then part ( 4) follows from Theorem 2.11. /square\nNote that dim M1(Xu,Xv) = dimX+ 2n−1−1−codimXv= dimX+ 2n−1−1−\n(4n−2−q1−q2+δq) = dimX−2n+q1+q2−δq, and dimΓ 1(Xu,Xv) = dimΓ 1(Xv) =\ndimX−(4n−2−q2−2n+1) = dim X−2n+1+q2ifq2≤2n−1, and dimΓ 1(Xu,Xv) = dimX\nifq2= 2n. Therefore, as expected, dim M1(Xu,Xv) = dimΓ 1(Xu,Xv) if and only if ( L1) holds,\ni.e. if and only if\n(6) q1= 1, q2≤2n−1\nLemma 9.3. Γ1(Xv\nu) = Γ1(Xv)unlessq1= 1, in which case Γ1(Xv\nu) ={W2∈X|dim(W2∩\nEq2∩(E2n−2⊕E1))≥1}.\nProof.The fact that Γ 1(Xv\nu) = Γ1(Xv) is a consequence of Lemma 6.2whenq2/\\⌉}atio\\slash= 2nandq1>1\norq2= 2nandq1>2, and of Lemma 6.9whenq2= 2nandq1= 2. Therefore, let us assume\nthatq1= 1 andq2≤2n−1. Note that\nXv\nu={V2∈X|dim(V2∩E2n−2)≥1, E1⊂V2⊆Eq2}.\nSetA={W2∈X|dim(W2∩(E2n−2⊕E1)∩Eq2)≥1}. To see that Γ 1(Xv\nu)⊆A, let\nW2∈Γ1(Xv\nu); then dim( W2∩V2)≥1 for some V2∈Xv\nu. Note that V2=E1⊕(V2∩E2n−2∩\nEq2)⊆(E2n−2⊕E1)∩Eq2and it follows that Γ 1(Xv\nu)⊆A.\nFor Γ1(Xv\nu)⊇A, letW2∈A\\Xv\nuandw∈W2∩(E2n−2⊕E1)∩Eq2\\0. Ifw∈E1, then let\nz∈E2n−2∩Eq2\\0, andL={V2| /a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht ⊂V2⊂W2⊕/a\\}⌊ra⌋k⌉tl⌉{tz/a\\}⌊ra⌋k⌉tri}ht}is a line inXcontainingW2and the\npoint/a\\}⌊ra⌋k⌉tl⌉{tw,z/a\\}⌊ra⌋k⌉tri}htisinXv\nu. Ifw/\\⌉}atio\\slash∈E1, wecanwrite w=w1+w2, wherew1∈E1andw2∈E2n−2∩Eq2.\nSinceq1= 1 andq2≤2n−1,w1⊥w2. Therefore, L={V2| /a\\}⌊ra⌋k⌉tl⌉{tw/a\\}⌊ra⌋k⌉tri}ht ⊂V2⊂W2+/a\\}⌊ra⌋k⌉tl⌉{tw1,w2/a\\}⌊ra⌋k⌉tri}ht}is a\nline in X containing W2and the point /a\\}⌊ra⌋k⌉tl⌉{tw1,w2/a\\}⌊ra⌋k⌉tri}htis inXv\nu. /square\nRemark 9.4. The above lemma implies that [ OΓ1(Xvu)] = [Oq2−1,2n] whenq1= 1.\n9.3.Quantum Chevalley formula. By Corollary 2.9, Theorem 2.10and Proposition 9.2,\n(Ou⋆Ov)d=/braceleftBigg\n0d≥2\nOv\nud= 0\nWe thus only need to compute ( Ou⋆Ov)dwhend= 1. When ( C1) holds, i.e. when q1= 2 and\nq2= 2n, we can use Propositions 7.1and9.1to deduce:\nO2n−2,2n⋆O2,2n= 2·O1,2n−1+O2,2n−2−2·O1,2n−2−qO2n−1,2n+qO2n−2,2n.\nIf (L1) holds, i.e. if q1= 1,q2≤2n−1, because of Propositions 9.1,9.2and Lemmas 7.6,\n9.3, we have\nO2n−2,2n⋆O1,q2=O1,q2−1+qOq2,2n−qOq2−1,2n.\nIn all other cases, ( Ou⋆Ov)1= 0.QUANTUM K-THEORY OF IG(2 ,2n) 33\nLet us denote by\nOa,b=\n\n[OXa,b] 1≤a