[ { "title": "2401.17861v2.Sharp_pinching_theorems_for_complete_CMC_hypersurfaces_in_the_sphere.pdf", "content": "arXiv:2401.17861v2 [math.DG] 7 Feb 2024SHARP PINCHING THEOREMS FOR COMPLETE CMC HYPERSURFACES IN\nTHE SPHERE\nLUCIANO MARI ,FERNANDA ROING , ANDANDREAS SAVAS-HALILAJ\nAbstract. In this paper, we prove that every complete, minimally immersed hype rsurface\nf:Mn→Sn+1whose second fundamental form satisfies |A|2≤n, is either totally geodesic\nor (a covering of) a minimal Clifford torus, thereby extending the we ll-known result by\nSimons, Lawson and Chern, do Carmo & Kobayashi from compact to complete Mn. We\nalso extend the corresponding result for hypersurfaces with non vanishing constant mean\ncurvature, due to Alencar & do Carmo, to complete immersed CMC hy persurfaces, under\nthe optimal bound for their umbilicity tensor. Our approach is inspire d by the conformal\nmethod of Fischer-Colbrie and Catino, Mastrolia & Roncoroni.\n1.Introduction\nLetf:Mn→Sn+1,n≥2, be an immersed hypersurface of the unit sphere. According to a\nwell-known result due to Simons [ 24], ifMnis compact, minimal, and the square norm |A|2\nof the second fundamental form Asatisfies|A|2≤n, then either |A| ≡0 or|A|2≡n. If\n|A| ≡0, thenMnis a great sphere and if |A|2≡n, thenMnis a (Riemannian) covering of\nthe Clifford torus given by the natural embedding\nTn(k) =Sk/parenleftbig/radicalbig\nk/n/parenrightbig\n×Sn−k/parenleftbig/radicalbig\n(n−k)/n/parenrightbig\n֒→Sn+1,\nfor somek∈ {1,...,n−1}. The latter characterization is local and was obtained by Chern,\ndo Carmo & Kobayashi [ 10] and, independently, by Lawson [ 16]. This result is known in the\nliterature as Simons’ pinching theorem . This result was extended to compact hypersurfaces\nwith constant mean curvature in the sphere by Alencar & do Carmo [ 1]. More precisely,\nsupposethat f:Mn→Sn+1isacompactimmersed hypersurface with(normalized) constant\nmean curvature H≥0. For short we call such objects CMC hypersurfaces . Denote by g the\nRiemannian metric on Mnand by\nΦ =A−Hg\nthe traceless part of the second fundamental form of the hyper surface, and suppose that\n|Φ|2≤b2(n,H),\nwhereb(n,H) is the positive root of the polynomial\nP(n,H)(x) =x2+n(n−2)/radicalbig\nn(n−1)Hx−n(H2+1). (1.1)\n2000Mathematics Subject Classification. Primary 53C42, 53A10.\nKey words and phrases. CMC and minimal hypersurfaces, Clifford torus, pinching, umbilicity.\nA. Savas-Halilaj is supported by (HFRI) Grant No:14758. L. Mari is s upported by the PRIN 20225J97H5\n“Differential-geometric aspects of manifolds via Global Analysis”.\n12 L. MARI, F. ROING, AND A. SAVAS-HALILAJ\nThen, either |Φ| ≡0 andMnis a sphere or |Φ| ≡b(n,H) andMncovers a minimal Clifford\ntorus or a torus of the form\nSn−1(r)×S1(√\n1−r2)֒→Sn+1,\nof appropriate radius r∈(0,1). This particular example is called H(r)-torus.\nAll the above proofs heavily rely on the strong maximum principle applie d to the inequality\n∆|Φ|2≥ −2|Φ|2P(n,H)(|Φ|)+2|∇Φ|2, (1.2)\nwhereP(n,H)is the polynomial given in ( 1.1); see [1, page 1226]. Indeed, the assumption\n|Φ| ≤b(n,H) implies that P(n,H)(|Φ|)≤0, and therefore ∆ |Φ|2≥0. SinceMnis compact,\n|Φ|2must be constant and thus ∇Φ≡0. The conclusion follows from a careful analysis of\nhypersurfaces with ∇Φ≡0.\nA natural question is whether the same result also holds when the co mpactness of Mnis\nweakened to the assumption that Mnis complete. In this respect, a computation due to\nLeung [17] shows that the Ricci curvature of g satisfies\nRic≥ −n−1\nnP(n,H)(|Φ|)g.\nConsequently, under our assumption it follows that Ric ≥0 on (Mn,g). In dimension\nn= 2, Bishop-Gromov’s theorem implies that M2has quadratic area growth and is therefore\nparabolic, see [ 13,15]. Hence, from ( 1.2) we again obtain that M2is either a sphere or (a\ncovering of) a torus. However, in higher dimensions Ric ≥0 is not enough to guarantee\nthe parabolicity of Mn, and attempts were made to achieve the goal via the Omori-Yau\nmaximum principle at infinity (see [ 2,21] for a thorough investigation of the principle and\nits geometric applications). Although there are partial results, th e problem remains still\nopen. As a matter of fact, one can easily show from ( 1.2) thatMnis a sphere whenever\nsup|Φ|< b(n,H); see for instance [ 31] and [25]. Also, if |Φ(x0)|=b(n,H) for some x0,\nthen the strong maximum principle implies |Φ| ≡b(n,H) and the classification in [ 1] follows.\nConsequently, the main difficulty is to characterize the complete CMC hypersurfaces of the\nunit sphere with\n|Φ|0,\nto show that Mnis compact, from which it readily follows that Mnis a sphere. We obtain:\nTheorem 1.1. Letf:Mn→Sn+1be a complete immersed hypersurface with constant mean\ncurvatureH≥0. Suppose that the square norm |Φ|2of the traceless part of the second\nfundamental form of Mnsatisfies\n|Φ|2≤b2(n,H),\nwhereb(n,H)is the positive root of the polynomial (1.1) (in particular, b(n,0) =√n).CMC HYPERSURFACES 3\nThen, either |Φ| ≡0 (andMnis a totally umbilic sphere )or|Φ| ≡b(n,H). Furthermore,\n|Φ| ≡b(n,H)if and only if:\n(a)H= 0andMncovers a Clifford torus;\n(b)H >0,n≥3andMncovers anH(r)-torus with r2<(n−1)/n;\n(c)H >0,n= 2andMncovers anH(r)-torus with r2/ne}ationslash= (n−1)/n.\nRemark 1.2. Let us make some comments regarding our result.\n(1) In Theorem 1.1we are implicitly assuming that Mnis 2-sided if H/ne}ationslash= 0. On the other\nhand, ifH= 0, thenMnis not assumed to be 2-sided.\n(2) As discussed in [ 1], according to the chosen orientation, the mean curvature of an H(r)-\ntorus is given by either\nH=(n−1)−nr2\nnr√\n1−r2orH=nr2−(n−1)\nnr√\n1−r2.\nThe choice leading to positive His the first one if r2<(n−1)/n, and by direct com-\nputation these H(r)-tori satisfy |Φ| ≡b(n,H). On the other hand, if r2>(n−1)/nthe\nchoice is the second one, but for n≥3 a computation gives |Φ|> b(n,H). Hence, tori\nwith suchrdo not satisfy the assumptions in our theorem. The different behav iour is\ndue to the linear term in P(n,H)and does not occur if n= 2, motivating the presence of\nH(r)-tori with any r2/ne}ationslash= (n−1)/nin the classification.\n(3) Besides [ 8], the method introduced by Fischer-Colbrie in [ 12] was also used in higher\ndimensions by Shen & Ye [ 22], Shen & Zhu [ 23], Cheng [ 9] and Elbert, Nelli & Rosenberg\n[11]. It is worth-mentioning that in all these results it is required that th e manifold Mn\nhas dimension 3, 4 or 5. The absence of a dimensional constraint in ou r theorem was\nsomehow unexpected to us.\n(4) The constant b(n,H) in the theorem is sharp. For example, we infer that the complete\nminimal hypersurfaces constructed by Otsuki [ 19] and do Carmo & Dajczer [ 7] have\nbounded squared norm of the second fundamental form lying in a ra nge containing n;\nnamely\nn(n−1)a2\n0\n1−a2\n0≤ |A|2≤n(n−1)a2\n1\n1−a2\n1,\nwherea0anda1are constants such that\n0b+we deduce that, for x∈[0,b+],\nP(n,H)(x) = (x−b+)(x−b−)≤(x−b+)(x+b+) =x2−b2\n+,\nwhence ( 1.2) can be written in the form\n∆|Φ|2≥2(b2−|Φ|2)|Φ|2+2|∇Φ|2≥0, (2.1)\nwhere, hereafter, b=b+=b(n,H). As a consequence, the function\nu.=b2−|Φ|2,\nsatisfies\nu≥0 and ∆ u≤ −2|Φ|2uonM. (2.2)\nWe distinguish two cases:\nCase 1:Ifu(x0) = 0 for some x0∈Mn, by the strong maximum principle u≡0, whence\n|Φ|2≡b2and|∇Φ| ≡0.\nThen the conclusion follows from the results in [ 1, p. 1227-1228] or in [ 16, Theorem 4].\nMore precisely, it is shown that the hypersurface has two distinct p rincipal curvatures, both\nconstants, and that every x∈Mnhas a neighbourhood Ufor whichf(U) is a piece of\neither a Clifford torus Tn(k) or anH(r)-torus (with rin the range stated in the theorem),\naccording to the value of H. We show that f(Mn) is a single such torus. Indeed, any Clifford\norH(r)-torus is the zero set of an appropriate real analytic function on Sn+1; see for instance\n[18, Example 3, p.194]. Fix x∈MnandUas above and let Ψ : Sn+1→Rbe a real analytic\nfunction that vanishes on the torus containing f(U). BeingMnandfreal analytic as well,\nthen Ψ◦fis real analytic and vanishes on U, thus it vanishes on the entire Mn. This shows\nthatf(Mn) is contained in a single torus Σn. Asf:Mn→Σnis a local isometry and Mnis\ncomplete, Ambrose’s Theorem guarantees that fis onto and a Riemannian covering, which\nproves our claim.\nCase 2: Assume now that u >0 onMn. Our goal is to prove that Mnmust be a totally\numbilic sphere. To reach the goal, inspired by [ 8,12] we endow Mnwith the metric\ng =u2βg,\nwhere\nβ=\n\nany number in (0 ,1) ifn= 2,3,\n1\nn−2ifn≥4.(2.3)\nConsider a curve γ: [0,a]→Mparametrized by g-arclength s, and denote by stheg-\narclength of γ. From\n∂s=u−β∂sandds=uβdsCMC HYPERSURFACES 5\nthe length of γin the metric g is\nℓg(γ) =/integraldisplaya\n0uβds.\nWe split the proof into three claims:\nClaim 1: Assume that γis ag-geodesic with non-negative second variation of g-arclength.\nThen, there exist constants t0>1,c0>0depending on n,βsuch that\nc0/integraldisplaya\n0uβψ2ds≤ −2t0/integraldisplaya\n0uβψψssds,∀ψ∈C2\n0([0,a]), (2.4)\nwhereC2\n0([0,a])is the set of functions ψ∈C2([0,a])such thatψ(0) =ψ(a) = 0.\nProof of Claim 1. From the second variation formula, along γwe have\n/integraldisplays(a)\n0/braceleftbig\n(n−1)(ϕs)2−ϕ2Ric(γs,γs)/bracerightbig\nds≥0,∀ϕ∈C2\n0([0,a]),\nor, equivalently,/integraldisplaya\n0/braceleftbig\n(n−1)(ϕs)2−ϕ2Ric(γs,γs)/bracerightbig\nu−βds≥0,∀ϕ∈C2\n0([0,a]). (2.5)\nAs it is shown in [ 11, Appendix, eqn. (14)], along γthe following identity holds:\nRic(γs,γs) = Ric(γs,γs)−β(n−2)(lnu)ss−β∆lnu.\nFrom (2.2),\n∆lnu≤ −2|Φ|2−|∇lnu|2≤ −2|Φ|2−{(lnu)s}2,\nwhence\nRic(γs,γs)≥Ric(γs,γs)+2β|Φ|2−β(n−2)(lnu)ss+β{(lnu)s}2. (2.6)\nLet{e1=γs,e2...,en}be a g-orthonormal frame along γ. From the Gauss equation, we\nhave that the components of the Riemann curvature tensor are g iven by\nRijij= 1−δij+hiihjj−h2\nij, i,j∈ {1,...,n},\nwherehijare the components of the second fundamental form of Mn. The identity can\nequivalently be written in the form\nRijij= 1−δij+/parenleftbig\nΦii+H/parenrightbig\n(Φjj+H)−(Φij+Hδij)2, i,j∈ {1,...,n}.\nUsing the fact that Φ is traceless, we get\nRic(γs,γs) = (n−1)−Φ2\n11+(n−2)HΦ11+(n−1)H2−n/summationdisplay\nj=2Φ2\n1j.\nTo estimate the terms, notice that because tr(Φ) = 0, the Cauchy -Schwarz inequality gives\nΦ2\n11≤(n−1)n/summationdisplay\ni=2Φ2\nii.\nConsequently,\n|Φ|2≥n/summationdisplay\ni=1Φ2\nii+2n/summationdisplay\nj=2Φ2\n1j≥n\nn−1Φ2\n11+2n/summationdisplay\nj=2Φ2\n1j≥n\nn−1n/summationdisplay\nj=1Φ2\n1j.(2.7)6 L. MARI, F. ROING, AND A. SAVAS-HALILAJ\nFixτ∈(0,1] andε>0. Let us estimate the term HΦ11by means of Young inequality and\n(2.7) as follows\nHΦ11=H(1−τ)Φ11+τHΦ11\n≥ −H(1−τ)|Φ|/radicalbigg\nn−1\nn−τH2\n2ε−τεΦ2\n11\n2.\nTherefore,\nRic(γs,γs)≥(n−1)−(n−2)/radicalbigg\nn−1\nn(1−τ)|Φ|H+/parenleftbigg\nn−1−(n−2)τ\n2ε/parenrightbigg\nH2\n−/parenleftbigg\n1+(n−2)τε\n2/parenrightbigg\nΦ2\n11−n/summationdisplay\nj=2Φ2\n1j.(2.8)\nSinceP(n,H)(b) = 0 and |Φ| ≤b, we have\n(n−2)/radicalbigg\nn−1\nnH|Φ| ≤(n−1)(H2+1)−n−1\nn|Φ|2.\nHence,\nRic(γs,γs)≥τ(n−1)+τ/parenleftbigg\nn−1−n−2\n2ε/parenrightbigg\nH2\n+(1−τ)n−1\nn|Φ|2−/parenleftbigg\n1+(n−2)τε\n2/parenrightbigg\nΦ2\n11−n/summationdisplay\nj=2Φ2\n1j(2.9)\nand we conclude that\nRic(γs,γs)≥τ(n−1)+τ/parenleftbigg\nn−1−n−2\n2ε/parenrightbigg\nH2\n+/parenleftbigg\n2β+(1−τ)n−1\nn/parenrightbigg\n|Φ|2−/parenleftbigg\n1+(n−2)τε\n2/parenrightbiggn/summationdisplay\nj=1Φ2\n1j\n−β(n−2)(lnu)ss+β{(lnu)s}2.(2.10)\nBy (2.7),\n/parenleftbigg\n2β+(1−τ)n−1\nn/parenrightbigg\n|Φ|2−/parenleftbigg\n1+(n−2)τε\n2/parenrightbiggn/summationdisplay\nj=1Φ2\n1j\n≥/parenleftbigg2nβ\nn−1−τ−(n−2)τε\n2/parenrightbiggn/summationdisplay\nj=1Φ2\n1j.\nWe shall specify τandεso that\n\n\nn−1−n−2\n2ε≥0,\n2nβ\nn−1−τ−(n−2)τε\n2≥0.CMC HYPERSURFACES 7\nIndeed, it is enough to choose\nε=\n\n1 if n= 2,\nn−2\n2(n−1)ifn≥3,andτsmall enough.\nFor such a choice, setting c0=τ(n−1)>0, inequality ( 2.10) yields\nRic(γs,γs)≥c0−β(n−2)(lnu)ss+β{(lnu)s}2. (2.11)\nReplacing ( 2.11) in (2.5), we obtain\n(n−1)/integraldisplaya\n0(ϕs)2u−βds≥/integraldisplaya\n0ϕ2u−β/parenleftBig\nc0−β(n−2)(lnu)ss+β{(lnu)s}2/parenrightBig\nds.(2.12)\nIntegration by parts gives\n−β/integraldisplaya\n0ϕ2(lnu)ssu−βds=−/integraldisplaya\n0ϕ2(lnuβ)ssu−βds\n= 2β/integraldisplaya\n0ϕϕs(lnu)su−βds−β2/integraldisplaya\n0ϕ2{(lnu)s}2u−βds,\nand plugging into ( 2.12) yields\n(n−1)/integraldisplaya\n0(ϕs)2u−βds≥c0/integraldisplaya\n0ϕ2u−βds (2.13)\n+2β(n−2)/integraldisplaya\n0ϕϕsu−β−1usds+β/parenleftbig\n1−β(n−2)/parenrightbig/integraldisplaya\n0ϕ2u−β−2(us)2ds.\nWe follow ideas by Catino, Mastrolia & Roncoroni [ 8] to treat the integral inequality ( 2.13).\nSet\nϕ=uβψ,withψ∈C2\n0([0,a]).\nThen,\n\nϕs=βuβ−1usψ+uβψs,\nϕϕs=βu2β−1usψ2+u2βψψs,\n(ϕs)2=β2u2β−2(us)2ψ2+u2β(ψs)2+2βu2β−1usψψs.\nThen, (2.13) becomes\n(n−1)/integraldisplaya\n0(ψs)2uβds≥c0/integraldisplaya\n0ψ2uβds (2.14)\n+β(1−β)/integraldisplaya\n0uβ−2(us)2ψ2ds−2β/integraldisplaya\n0uβ−1usψψsds.\nDefine\nI.=/integraldisplaya\n0uβ−1usψψsds.\nIntegration by parts gives\nI=1\nβ/integraldisplaya\n0(uβ)sψψsds=−1\nβ/integraldisplayβ\n0uβ(ψs)2ds−1\nβ/integraldisplaya\n0uβψψssds.8 L. MARI, F. ROING, AND A. SAVAS-HALILAJ\nFor everyt>1 and every ε>0, from Young’s inequality we obtain\n2βI= 2βtI+2β(1−t)I\n=−2t/integraldisplaya\n0uβ(ψs)2ds−2t/integraldisplaya\n0uβψψssds+2β(1−t)/integraldisplaya\n0uβ−1usψψsds\n≤ −2t/integraldisplaya\n0uβ(ψs)2ds−2t/integraldisplaya\n0ψψssuβds\n+β(t−1)ε/integraldisplaya\n0uβ−2(us)2ψ2ds+β(t−1)\nε/integraldisplaya\n0uβ(ψs)2ds.\nChoosing\nε=1−β\nt−1\nwe obtain\n2βI≤ −2t/integraldisplaya\n0uβψψssds+β(1−β)/integraldisplaya\n0ψ2uβ−2(us)2ds\n+β(t−1)2−2t(1−β)\n1−β/integraldisplaya\n0uβ(ψs)2ds. (2.15)\nInserting ( 2.15) into (2.14), we arrive at\n/integraldisplaya\n0uβ/braceleftbig\nc0ψ2−p(n,t,β)(ψs)2+2tψψss/bracerightbig\nds≤0, (2.16)\nwhere\np(n,t,β) =β(t−1)2\n1−β−2(t−1)+(n−3).\nWith our choice of β, we get\np(n,t0,β)≤0 where t0=/braceleftBigg\n1+21−β\nβifn∈ {2,3},\nn−2 ifn≥4.\nNotice that t0>1, whence it is admissible. Then, ( 2.16) becomes ( 2.4). /square\nClaim 2: The manifold Mnis compact.\nProof of Claim 2. Assume by contradiction that Mnis non-compact. We follow [ 12] and\nconstruct the“smallest divergent curve”in ( Mn,g) issuing from a fixed point. For the sake\nof completeness, we include a simplified and a bit more general statem ent:\nLemma 2.1. Let(Mn,g)be a non-compact Remannian manifold. Then, for each o∈M,\nthere exists a divergent curve γ: [0,T)→Mnissuing from owhich is a g-geodesic, minimizes\ntheg-length on any compact subinterval of [0,T)and satisfies the following property:\ngis complete ⇐⇒T=∞.\nProof.The implication ⇒is obvious, since we know that for a complete Riemannian metric\ng every divergent g-geodesic is defined on the entire [0 ,∞). To prove the converse, we shall\nconstruct such a geodesic γ. Consider an exhaustion of Mnby relatively compact, smooth\nopen sets Ω jcontaining o. SinceΩjis a smooth manifold with boundary, there exists aCMC HYPERSURFACES 9\ng-minimizing rectifiable curve γj: [0,Tj]→Ωjjoiningoto∂Ωj, which we parametrize by\ng-arclength. Because γjis ag-geodesic, γj([0,Tj))⊂Ωj, and since Ωj⊂Ωj+1, we have that\n{Tj}is a strictly increasing sequence. Then, up to a subsequence,\nγj→γ: [0,T)→Mn,\nsmoothly on compact sets as j→ ∞. Since each γjminimizes g-length between any pair of\nits points, it follows that γis ag-geodesic that minimizes g-length between any pair of its\npoints as well. Moreover, let σ: [0,Tσ)→Mnbe any other divergent curve, parametrized\nbyg-arclength. Then, for each natural j, lettjbe the first time for which σ(tj)∈∂Ωj. By\nthe minimality of γj, and having fixed S >0, we have for large enough jthat\nTσ=ℓg(σ)≥ℓg(σ|[0,tj])≥ℓg(γj)≥ℓg((γj)[0,S])j→∞→ℓg(γ|[0,S])S→∞→ℓg(γ) =∞.\nWhence,Tσ=∞and thus the Riemannian metric g is complete. ⊛\nPick a smallest divergent curve γin (Mn,g) issuing from a fixed origin. Since ( Mn,g) is\ncomplete, reparametrizing γby g-arclength s, it turns out that γis defined for s∈[0,∞).\nWhence, because of Claim 1 and since γisg-minimizing between any pair of its points, along\nγit holds\nc0/integraldisplaya\n0uβψ2ds≤ −2t0/integraldisplaya\n0uβψψssds,∀a>0 andψ∈C2\n0([0,a]).\nChoosing as test function\nψ(s) = sin/parenleftBigπs\na/parenrightBig\n∈C2\n0([0,a]),\nwe get\n/parenleftBig\nc0−2t0π2\na2/parenrightBig/integraldisplaya\n0sin2/parenleftBigπs\na/parenrightBig\nuβ(γ(s))ds≤0,\nwhich gives a contradiction if\na>π/radicalbigg\n2t0\nc0.\nThis completes the proof of Claim 2. /square\nClaim 3: The Riemannian manifold (Mn,g)is a totally umbilic sphere.\nProof of Claim 3. SinceMnis compact and ∆ |Φ|2≥0, we deduce that |Φ|2is constant.\nInequalityu>0 implies |Φ|2500is in good agreement\nwith experimental tests and general relativity prediction s (for example, neutron stars, black\nholes, gravitational waves, binary pulsars, etc.) [ 32]. The BD theory of gravity reduces the\nGR theory in the ω→ ∞ limit [ 33,34].\nIn the following, we will use the ISG-method to solve the DEs o f the FLRW cosmological\nmodel in the framework of the BD theory. In fact, we will obtain the cosmological solutions\nof the BD equations ( 3.9) and ( 3.10) by the ISG-method.\n3.2 FLRW cosmological model in BD theory\nIn this subsection, the FLRW cosmological model is briefly st udied in the framework of the\nBD theory. We consider a homogeneous and isotropic universe a s a cosmological model for\nour study. To a good approximation, this universe is describ ed by the FLRW metric. This\nmetric in the coordinates xµ= (t,r,θ,ϕ)is defined as\nds2=−dt2+a2(t)/parenleftBigdr2\n1−kr2+r2dθ2+r2sin2θ dϕ2/parenrightBig\n, (3.11)\nwherea(t)is the scale factor, and the number kcan admits three values of −1,1,0for spaces\nof negative, positive and zero curvature, which represents closed, open and flat universes,\nrespectively [ 35,36]. The Weyl’s principle requires that the constituent mater ial of a homoge-\nneous and isotropic universe is a perfect fluid on large scale s with high accuracy. So, according\nto the Weyl’s principle, the FLRW universe can be considered as a perfect fluid with a good\napproximation. If the energy density of this fluid be ρc2and its pressure p, then its normal\nbarotropic equation of state is\np=wρc2, (3.12)\nwherewis called the perfect fluid state parameter and cis the velocity of light in vacuum.\nThe equation of state ( 3.12) includes most of the interesting states that are important in\ncosmology. For example, for dust: w= 0, for radiation: w= 1/3, for false vacuum: w=−1,\nand for stiff fluid: w= 1[37,38]. In the present work, a system of units is used in which the\nvelocity of light in vacuum is set to unity. Furthermore, the components of the EMT of the\nfluid will be as follows:\nTMµν= (ρ+p)UµUν+pgµν, (3.13)\nwhereUµ= (1,0,0,0)is the co-moving 4-velocity. The trace of this tensor is give n by\nTM= 3p−ρ. (3.14)\n10The non-vanishing components of the BDE ( 3.10) read\n3˙a2\na2−Λ =8π\nϕρ+ω\n2˙ϕ2\nϕ2−3˙a\na˙ϕ\nϕ, (3.15)\n−2¨a\na−˙a2\na2+Λ =8π\nϕp+ω\n2˙ϕ2\nϕ2+2˙a\na˙ϕ\nϕ+¨ϕ\nϕ. (3.16)\nAlso, using equation ( 3.14), one concludes that equation ( 3.9) becomes\n¨ϕ\nϕ+3˙a\na˙ϕ\nϕ=2Λ\n3+2ω+8π\nϕ/parenleftBigρ−3p\n3+2ω/parenrightBig\n. (3.17)\nNote that equation ( 3.17) is not an independent equation in BD theory, because it can be\nobtained by using Bianchi identities ∇µGµν= 0and equations ( 3.15) and ( 3.16). So, we\nhave only two independent equations to determine four unkno wn functions a(t),ϕ(t),ρ(t)\nandp(t). As such this system of equations does not seem to have a uniqu e solution. Hence,\nto find these unknowns uniquely, two equations are needed. On e of these is the equation of\nstate of the universe, ( 3.12). To obtain the second equation we use the following Corolla ry.\nCorollary1. In the spatially flat (k= 0)FLRW cosmological model in the framework of\nthe BD theory, the necessary and sufficient condition for the d eceleration parameter of the\nuniverse q:=−a¨a/˙a2to be a constant, is that a power-law between the cosmic scale factor\na(t)and the Brans-Dicke scalar field ϕ(t)holds in the following form [35–40]:\nϕan=C, (3.18)\nwherenandCare the functions of the parameters w,ωand constants GandΛ, that is,\nC:=C(w,ω,G,Λ)andn:=n(w,ω,G,Λ).\nProof. See Ref. [ 39].\nThe history of this Corollary backs to the Dirac’s hypothesi s that states the constant Gis\na variable quantity and should be related by a power-law rela tion such as G=´Canto the scale\nfactor of the universe, where ´Candnare some constants. Since in the BD theory, the scalar\nfieldϕis proportional to the inverse of the Newton’s gravitationa l constant, that is, ϕ=c0/G,\n(wherec0is the proportionality constant), combining this relation withG=C′anyields the\npower-law in the form ( 3.18) in which C:=c0/C′. By combining equations ( 3.15)-(3.17) with\nequation of state ( 3.12) and power-law relation ( 3.18), we then obtain\n8πρ\nCan=˙a2\na2/parenleftBig6−ωn2−6n\n2/parenrightBig\n−Λ, (3.19)\n8πwρ\nCan= (n−2)¨a\na+˙a2\na2/bracketleftBig2(n−1)−(ω+2)n2\n2/bracketrightBig\n+Λ, (3.20)\n8π\nCan(ρ−3wρ) = (3+2 ω)/bracketleftBig\n−n¨a\na+n(n−2)˙a2\na2/bracketrightBig\n−2Λ. (3.21)\n11The combination of these three differential equations after performing some algebraic calcu-\nlations leads to the following non-linear second-order ODE for the scale factor a(t)\n2(ωn+3)¨a\na+(6+4nω−ωn2)˙a2\na2= 2Λ, ωn +3/ne}ationslash= 0. (3.22)\nThis equation can be rewritten in the following form\n¨a=α˙a2\na+βa, (3.23)\nwhere the new parameters αandβin terms of the old parameters ω,w,nand the constant\nΛare defined by\nα:=−6+4nω−ωn2\n2(ωn+3), β :=Λ\nωn+3. (3.24)\nTherefore, the combination of BD equations with the fluid stat e equation of the universe\nand the power-law relation leads to a second-order ODE for th e cosmic scale factor a(t)in\nthe form ( 3.23). In this work, we call this equation, the “Friedman-Brans-D icke equation”\n(FBD-equation). The FBD-equation alone describes the dynami cs of spatially flat (k= 0)\nFLRW universe in the framework of the BD theory. Equation ( 3.23) can be imagined as the\nequation of motion of a particle with a unit mass in one-dimen sion. By defining the cosmic\nscale factor as the coordinate of this particle, i.e., q(t) :=a(t), equation ( 3.23) is the familiar\nform of Newton’s second law\n¨q=φ(t,q,˙q), (3.25)\nwhere\nφ(t,q,˙q) :=α˙q2\nq+βq, (3.26)\nis the component of the force function acting on the particle , and¨qis the component of its\nacceleration vector. Thus, to analyze the dynamics of cosmo logical model, it is enough to\nsolve only the FBD-equation by the ISG-method. We will do this in the next section.\n4 Solving the FBD-equation\nIn this section we employ the ISG-method to solve the FBD-equa tion (3.25). To this end, we\nuse the following steps:\n(1)-We re-consider spatially flat (k= 0) FLRW cosmological model in the framework of\nBD theory with a dynamical system S2\n1. As mentioned earlier, the governing equation of this\nsystem is ¨q=φ(t,q,˙q), whereφ(t,q,˙q)is the force function of a particle that moves in a\n121-dimensional mini-super space with configuration Q= (q)whereq:=a(t)is the coordinate\nof the particle.\n(2)-A one-parameter Lie group of point transformations Φ(t,q;ε)with the transformation\nequations ( 2.10) must be found (if there is a solution) such that the FBD-equat ion (3.25)\nremains invariant under this group of transformations. For this purpose, by using Lie’s in-\nvariance condition, a set of the PDEs should be extracted for the infinitesimals τandξof\ngroupΦ. By simultaneously solving this system of PDEs, the infinites imalsτandξas func-\ntions oftandqshould be obtained: τ=τ(t,q),ξ=ξ(t,q). For our case, these functions\nare obtained as τ=τ(t,q) =c1,ξ=ξ(t,q) =c2qwherec1andc1are some arbitrary con-\nstants [ 27]. Then, by using these results one must find all Lie point symm etry vectors of the\ntransformations group Φsuch that for our case these vectors are obtained to be X1=∂tand\nX2=q∂qwhich are respectively the infinitesimal generator of the tr anslation group along the\ntimeΦ1(t,q;ε) = (t+ε,q)and the scaling group Φ2(t,q;ε) = (t,eεq)[27].\n(3)-To calculate the first integral corresponding to the DE ¨q=φ(t,q,˙q)of the particle in\nthe configuration space Q= (q), which is equation ( 2.4) of Theorem 1, the null form Sand\nintegrating factor Rshould be obtained by using the determining equations ( 2.6)-(2.8). It is\ndifficult to solve these equations simultaneously, except in special simple cases. Therefore, to\nobtain these two basic functions in the extended PS method, w e must resort to other sym-\nmetry methods. The most important other symmetry methods, t hat can be used here, are:\n(a)Lie point symmetry, (b)λ-symmetry, (c)DPs. Therefore, the functions SandRshould\nbe calculated indirectly by the symmetry methods (a)-(c).\n(4)-Using the Lie point symmetry mentioned in section 2, the characteristic Q(t,q,˙q) :=ξ−˙qτ\nand then λ(t,q,˙q) :=D[Q]/Qmust be defined. It can be shown that −D[Q]/Qis a solution\nof the determining equation ( 2.6), in such a way that S(t,q,˙q) =−λ(t,q,˙q).\n(5)-By using Darboux’s eigenvalue equation ( 2.16) [21], the DP F(t,q,˙q)and the eigen-\nvalueK(t,q,˙q)(φ˙q(t,q,˙q))corresponding to this polynomial should be obtained. It can be\nshown that the ratio Q/F is a general solution of the determining equation ( 2.7). So,\nR(t,q,˙q) =Q/F. In this way, the null form Sand the integrating factor Rare obtained\nindirectly by the Lie point symmetry method and DPs, respect ively, without the need to\nsolve their determining equations.\nLet us turn into the main goal of this section which is nothing but calculating the first\nintegrals I1andI2corresponding to the FBD-equation ( 3.25). Since the FBD-equation ad-\nmits two Lie point symmetries, both λ-symmetries associated to FBD-equation can be only\ncalculated by using the relation λ=D[Q]/Qwithout solving the λ-symmetry condition [ 27].\nTherefore, both λ-symmetries associated to the Lie symmetry vectors X1=∂tandX2=q∂q\n13are, respectively,\nλ1(t,q,˙q) =D[Q1]\nQ1=D[−˙q]\n−˙q=α˙q\nq+βq\n˙q, (4.1)\nλ2(t,q,˙q) =D[Q2]\nQ2=D[q]\nq=˙q\nq. (4.2)\nIt can be easily check that functions −D[Qi]/Qiare solutions of the determining equations\n(2.6). Thus, for the FBD-equation, these functions are nothing bu t two null forms associated\nto the Lie symmetry vectors X1=∂tandX2=q∂q:\nS1(t,q,˙q) =−λ1(t,q,˙q) =−α˙q\nq−βq\n˙q, (4.3)\nS2(t,q,˙q) =−λ2(t,q,˙q) =−˙q\nq. (4.4)\nOn the other hand, the determining equation for DPs of the FBD- equation ¨q=φ(t,q,˙q)is\n(2.16). As mentioned above, Q/Fis a solution of the determining equation ( 2.7) such that\nR=Q/F, and hence by considering S=−D[Q]/Qwe arrive at\nD[Q\nF]+Q\nF/parenleftBig\n−D[Q]\nQ+φ˙q/parenrightBig\n= 0. (4.5)\nFurthermore, the characteristics Q=ξ−˙qτobtained from the λ-symmetry and the DPs F\nobtained from solving of the Darboux eigenvalue equation as sociated to the FBD-equation\ngives us the integrating factor RasR=Q/F. Therefore, by using λ-symmetry and DPs\nwithout solving the determining equations, we can obtain 2-tuple(S,R)as follows (S,R) =\n(−D[Q]/Q,Q/F ). In the ISG-method, the basic quantities of the Lie point sym metry, ex-\ntended PS method, λ-symmetry, and DPs read τ,ξ,λ,F,RandS. These quantities are\nrelated to each other as shown in [ 27].\nNow, we consider one of the Lie symmetries, for example X1=∂t. This vector is the\ninfinitesimal generator of the group of translation time: Φ1(t,q;ε) = (t+ε,q). The charac-\nteristic corresponding to this symmetry vector is Q1=ξ1−˙qτ1=−˙qandλassociated to\nthis characteristic is given by ( 4.1). Therefore, the null form associated to the infinitesimal\ngenerator X1=∂tis obtained from equation ( 4.3). We find the integrating factor R1corre-\nsponding to the null form S1. For this purpose, by using the characteristic Q1=−˙qand by\nconsidering DP5F(D)\n6=q2α, the integrating factor R1reads\nR1=Q1\nF(D)\n6=−˙q\nq2α, (4.6)\n5According to Table 1 of Ref. [ 27], by the characteristics Q1(t,q,˙q) =−˙q,Q2(t,q,˙q) =qand DPs\nF(D)\n1,F(D)\n2,···,F(D)\n6, two null forms Si:=−D[Qi]/Qi,(i= 1,2)and twelve integrating factors Rij:=\nQi/F(D)\nj,(i= 1,2,j= 1,2,...,6)can be defined.\n14and2-tuple(S1,R1)is then obtained to be of the form\n(S1,R1) = (−α˙q\nq−βq\n˙q,−˙q\nq2α). (4.7)\nBy substituting this 2-tuple in the Duarte’s integral formula ( 2.4), and then by calculating\nthe integrals, one can get the first integral associated to th e infinitesimal generator X1=∂t,\ngiving us\nI1(q,˙q) =1\n2˙q2q−2α−β\n2(1−α)q−2α+2=c1, (4.8)\nwherec1is an arbitrary constant. In the same way, the 2-tuple(S2,R2)corresponding to the\nsymmetry vector X2=q∂qcan be obtained as follows:\n(S2,R2) = (−λ2,Q2/F(D)\n1) =/parenleftbig\n−˙q\nq,q\nβ\nα−1q2+ ˙q2/parenrightbig\n. (4.9)\nI2(t,q,˙q) =\n\n(α−1)t+/radicalBig\nα−1\nβtan−1(q\n˙q/radicalBig\nβ\nα−1) =c2,β\nα−1>0,\n(α−1)t+q\n˙q=c2,β\nα−1= 0,\n(α−1)t+/radicalBig\n|α−1\nβ|tanh−1(q\n˙q/radicalBig\n|β\nα−1|) =c2,β\nα−1<0.(4.10)\nAccording to the above results and as earlier mentioned, a se t of twelve members of the null\nforms and integrating factors can be constructed, which we c all the PS set:\nSPS={(Si,Rij)}i=1,2,j=1,...,6={(S1,R11),(S1,R12),(S1,R13),(S1,R14),(S1,R15),\n(S1,R16),(S2,R21),(S2,R22),(S2,R23),(S2,R24),(S2,R25),(S2,R26)},(4.11)\nBy using the formula ( 2.4), a first integral can be constructed with each of the 2-tuple of this\nset. Therefore, for twelve first integrals we have\nIi,ij=r1;ij+r2;ij−/integraldisplay/bracketleftbig\nRij+∂\n∂˙q(r1;ij+r2;ij)/bracketrightbig\nd˙q=ci,ij, i= 1,2;j= 1,...,6,(4.12)\nwhereci,ij’s are some constants on the solutions of the DE ¨q=φ(t,q,˙q). Also, according to\n(2.5),r1;ij’s andr2;ij’s are defined as\nr1;ij(t,q,˙q) =/integraldisplay\nRij(φ+ ˙qSi)dt, (4.13)\nr2;ij(t,q,˙q) =−/integraldisplay\n[RijSi+∂\n∂q(ri;ij)]dq. (4.14)\nThe FBD-equation ¨q=φ(t,q,˙q)admits all members of the PS set ( 4.10) as2-tuple(S,R). The\nmembers of SPSand their corresponding first integrals have been listed in T able 2 in Ref. [ 27].\nAmong the first integrals of Table 2, only two of them, I1,16andI2,21, which we denoted by I1\n15andI2, respectively, are independent and the rest are dependent o n two first integrals I1and\nI2. In the PS set ( 4.11),(S1,R16)and(S2,R21)are actually the 2-tuples(S1,R1),(S2,R2),\nrespectively, and the first integrals associated to these 2-tuples are I1=I1,16andI2=I2,21,\nrespectively.\nAs was mentioned earlier, the infinitesimal generator of the translation group is the sym-\nmetry vector X1=∂t. Therefore, the first integral associated to this symmetry v ector gives\nthe energy of the dynamical system S2\n1. Thus, the invariant I1is the energy of the dynamical\nsystem. Now, consider the independent first integrals ( 4.8) and ( 4.10). We look at these two\nindependent invariants as a system of algebraic equations. To solve this system of equations\nwe must remove the variable ˙qamong the equations of this system. To do this, we find ˙qfrom\nthe equation I2(t,q,˙q) =c2, and then employ I1(q,˙q) =c1. Finally, the general solutions of\nthe FBD-equation, which include all three cases c <0,c= 0andc >0, are worked out\nq(t) =\n\n/parenleftBig\n2c1\n|c|/parenrightBig1\n2(1−α)sinh1\n1−α/bracketleftBig\n(α−1)/radicalbig\n|c|(t+´c2)/bracketrightBig\n, c < 0,\n/parenleftBig\n2c1(α−1)2/parenrightBig1\n2(1−α)/parenleftBig\nt+c′2/parenrightBig1\n1−α, c = 0,\n/parenleftBig\n2c1\nc/parenrightBig1\n2(1−α)sin1\n1−α/bracketleftBig\n(α−1)√c(t+´c2)/bracketrightBig\n, c > 0.(4.15)\nwhereαandβare given by ( 3.24). Moreover,\nc=β\nα−1, c′2:=c2\n1−α. (4.16)\nBy redefinition c′1:= (2c1)1\n2(1−α), the general solutions ( 4.15) can be written as follows:\nq(t) =\n\nc′\n1/parenleftBig−2Λ\ns/parenrightBig−wn+3\ns\nsin2(wn+3)\ns/bracketleftBig1\nwn+3/radicalBig\n−Λs\n2(t+c′\n2)/bracketrightBig\n, Λ<0,\nc′\n1/parenleftBigs\n2(wn+3)/parenrightBig2(wn+3)\ns/parenleftBig\nt+c′\n2/parenrightBig2(wn+3)\ns\n, Λ = 0,\nc′\n1/parenleftBig2Λ\ns/parenrightBig−wn+3\ns\nsinh2(wn+3)\ns/bracketleftBig1\nwn+3/radicalBig\nΛs\n2(t+c′\n2)/bracketrightBig\n, Λ>0.(4.17)\nwheres:= 12+6 nω−ωn2. As we expected, since the FBD-equation is an ODE of the second -\norder, its general solution contains two integration const antsc′1andc′2. These constants\ncan be determined by using the initial conditions of the prob lem, i.e., q(t= 0) = q0and\n˙q(t= 0) = ˙q0.\n5 Completing the solutions\nNow, we show that the parameter nin the power-law equation ( 3.18) with the parameter of\nstatewin equation ( 3.12), are consistent, provided that there is a relationship bet ween them.\n16For this purpose, subtracting both sides of equations ( 3.19) and ( 3.20) we obtain\n8πan\nCρ(1−w) =˙a2\na2/parenleftBig6−ωn2−6n\n2−2(n−1)−(ω+2)n2\n2/parenrightBig\n−(n−2)¨a\na−2Λ.(5.1)\nBy taking two consecutive times of the total derivative with r espect to cosmic time tfrom\nequation ( 3.18) one obtains\n˙a\na=−1\nn˙ϕ\nϕ, (5.2)\n¨a\na=n+1\nn2˙ϕ2\nϕ2−1\nn¨ϕ\nϕ. (5.3)\nBy substituting ( 3.18), (5.2) and ( 5.3) into equation ( 5.1) and after a little simplification we\narrive at\n¨ϕ−3\nn˙ϕ2\nϕ=2n\nn−2Λϕ+8πρ(1−w)n\nn−2. (5.4)\nIn addition, one may insert equations ( 3.12), (3.18) and ( 5.2) into ( 3.17) to get\n¨ϕ−3\nn˙ϕ2\nϕ=2Λϕ\n3+2ω+8π\n3+2ωρ(1−3w). (5.5)\nComparing equations ( 5.5) and ( 5.4) yields the following equation:\nn=\n\n1−3w\nω(w−1)−1,Λ = 0, w∈[−1,1],\n−1\nω+1, Λ/ne}ationslash= 0, w= 0.(5.6)\nIt can be seen that the parameter nin the power-law equation ( 3.18) cannot admit any value,\nbut only those values satisfying in ( 5.6). Thus, one may use ( 5.6) to write the general solution\n(4.17) in terms of the parameters ω,wandΛ, and hence by changing q(t)→a(t)we get\na(t) =\n\nc′1/parenleftBig\n−2Λ(ω+1)2\n(4+3ω)(3+2ω)/parenrightBig−ω+1\n3ω+4sin2(ω+1)\n3ω+4/bracketleftBig/radicalBig\n−(3ω+4\n2ω+3)Λ\n2(t+c′2)/bracketrightBig\n,Λ<0,\nc′1/parenleftBig\n4+3ω(1−w2)\n2[ω(1−w)+1]/parenrightBig2[ω(1−w)+1]\n4+3ω(1−w2)/parenleftbig\nt+c′2/parenrightbig2[ω(1−w)+1]\n4+3ω(1−w2), Λ = 0,\nc′1/parenleftBig\n2Λ(ω+1)2\n(4+3ω)(3+2ω)/parenrightBig−ω+1\n3ω+4sinh2(ω+1)\n3ω+4/bracketleftBig/radicalBig\n(3ω+4\n2ω+3)Λ\n2(t+c′2)/bracketrightBig\n,Λ>0.(5.7)\nAccording to ( 5.6), the above equation is actually the solution of the BD equati ons for the\nscale factor of the dust-dominated universe in both cases Λ<0andΛ>0, while the solution\n17of the case Λ = 0 can be included the universe fulfilling with the dust, radiat ion and false\nvacuum, as well as stiff fluid. Having the cosmic scale factor a(t), one can calculate the BD\nscalar field ϕ(t). Using equations ( 3.18), (5.6) and ( 5.7) and simplifying them we then get\nϕ(t) =\n\nCc′11\nω+1/parenleftBig\n−2Λ(ω+1)2\n(4+3ω)(3+2ω)/parenrightBig−1\n3ω+4sin2\n3ω+4/bracketleftBig/radicalBig\n−(3ω+4\n2ω+3)Λ\n2(t+c′2)/bracketrightBig\n,Λ<0,\nCc′13w−1\nω(w−1)−1/parenleftBig\n4+3ω(1−w2)\n2[ω(1−w)+1]/parenrightBig2(1−3w)\n4+3ω(1−w2)/parenleftbig\nt+c′2/parenrightbig2(1−3w)\n4+3ω(1−w2), Λ = 0,\nCc′11\nω+1/parenleftBig\n2Λ(ω+1)2\n(4+3ω)(3+2ω)/parenrightBig−1\n3ω+4sinh2\n3ω+4/bracketleftBig/radicalBig\n(3ω+4\n2ω+3)Λ\n2(t+c′2)/bracketrightBig\n,Λ>0.(5.8)\nIn order to calculate the energy density of the universe with the equation of state p=ωρ,\nin all three cases Λ<0,Λ = 0 , andΛ>0we use equations ( 3.19), (5.6) and ( 5.7). By\ndoing some algebraic calculations, we get the following sol ution for the energy density of the\nuniverse\nρ(t) =\n\n(−ΛC\n8π)c′1−1\nω+1/parenleftBig\n−2Λ(ω+1)2\n(4+3ω)(3+2ω)/parenrightBig−1\n3ω+4sin−6(ω+1)\n3ω+4/bracketleftBig/radicalBig\n−(3ω+4\n2ω+3)Λ\n2(t+´c2)/bracketrightBig\n,Λ<0,\nM(ω,w)X(ω,w)(t+c′2)N(ω,w), Λ = 0,\n(ΛC\n8π)c′1−1\nω+1/parenleftBig\n2Λ(ω+1)2\n(4+3ω)(3+2ω)/parenrightBig−1\n3ω+4sinh−6(ω+1)\n3ω+4/bracketleftBig/radicalBig\n(3ω+4\n2ω+3)Λ\n2(t+´c2)/bracketrightBig\n,Λ>0,(5.9)\nwhereM,X, andNare the functions of the parameters ωandwwhich are defined as\nM(ω,w) :=C c′13w−1\nω(w−1)−1\n4π/parenleftBig4+3ω(1−w2)\n2[ω(1−w)+1]/parenrightBig2(1−3w)\n4+3ω(1−w2), (5.10)\nX(ω,w) :=6(w−1)2ω2−ω[12(w−1)+(1−3w)(3w−5)]+12−18w\n[4+3ω(1−w2)]2,(5.11)\nN(ω,w) :=2(1−3w)−8−6(1−w2)ω\n4+3ω(1−w2). (5.12)\nAs mentioned earlier, the cases Λ<0andΛ>0of solution ( 5.9) give the energy density for\ndust dominated universe only, while the case Λ = 0 of this solution gives the energy density\nof the perfect fluid-filled universe with equation of state ( 3.12). Accordingly and also using\nthe equation of state p=wρand energy density ( 5.9), the pressure of the universe is worked\n18out to be\np(t) =\n\n0 Λ <0,\nwM(ω,w)X(ω,w)(t+c′2)N(ω,w), Λ = 0, w∈[−1,1]\n0 Λ >0.(5.13)\nAccording to this solution, the pressure of the dust univers e forΛ<0,Λ = 0 andΛ>0is\nzero as we expected. Furthermore, for Λ = 0 , this solution gives the pressure of a universe\nfilled by a perfect fluid. We call the solutions ( 5.7), (5.8), (5.9) and ( 5.13) in this article\nas cosmological solutions of the BD equations. It should be no ted that these solutions were\npreviously obtained in less detail without the use of the con cept of symmetry by one of the\nauthors of this article in [ 41,42]. Note that when the coupling constant ωtends to infinity in\nsolutions ( 5.7), (5.8), (5.9) and ( 5.13), one concludes that they are actually the cosmological\nsolutions of general relativity, which can be obtained from solving EFEs in the presence of\nthe cosmological constant for a universe filled with a perfec t fluid with the equation of state\np=wρ.\nBefore closing this section, let us assume that the perfect flu id, filling the universe, is\nradiation. For w= 1/3andΛ = 0 it follows from ( 5.6) thatn= 0. Then, equations ( 3.19)\nand (3.20) are reduced to\n8πρ\nC= 3˙a2\na2, (5.14)\n8πp\nC=−2¨a\na−˙a2\na2. (5.15)\nNow we compare these equations with the case Λ = 0 of the following Friedmann equations\nin the theory of general relativity\n8πGρ= 3˙a2\na2, (5.16)\n8πGρ=−2¨a\na−˙a2\na2. (5.17)\nIn order to be compatible with general relativity in this spe cial case (for radiation in the\nabsence of the Λ), the value of the constant Cshould be\nC(w=1\n3,ω,G,Λ = 0) =1\nG. (5.18)\nBy using condition ( 5.18), one can obtain the cosmological solutions of the BD equatio ns for\nradiation in the absence of the Λ, giving us\na(t) =c′1/radicalbig\n2(t+c′2), ϕ(t) =1\nG, p(t) =1\n32πGt2, ρ(t) = 3p(t). (5.19)\n19Therefore, when the condition ( 5.18) holds, then not only general relativity and Brans-Dicke\ntheories are compatible with each other, but also the soluti ons of both theories will be the\nsame for radiation. This result is indicative of the fact tha t for a universe full of radiation\nw= 1/3whose metric is FLRW flat (k= 0), in the absence of the cosmological constant Λ,\nthe coupling constant of the BD scalar field ϕwith the gravitational field gµνis at its lowest\npossible, so that the two fields ϕandgµνare completely separate and have no paining with\nother. In other words, the curvature of space-time is very la rge compared to the curvature of\nthe scalar field.\n6 Special solutions of the FBD-equation\nIn order to make sure the correctness of cosmological soluti ons of the BD equations ( 5.7),\n(5.8), (5.9) and ( 5.13), it is necessary to compare our solutions with special solu tions such\nas Nariai’s solutions [ 43], O’Hanlon-Tupper vacuum solutions [ 8] and the inflation solutions\nthat have been obtained before. It can be shown that when w∈[0,1/3]andc′2= 0, our\nsolutions include the Nariai’s solutions. Nariai’s soluti ons in the absence of the Λ, when the\nfluid constituting the universe is dust, include the BD dust so lutions\na(t) =c′1/parenleftBig4+3ω\n2(ω+1)/parenrightBig2(ω+1)\n4+3ω(t+c′2)2(ω+1)\n4+3ω, (6.1)\nϕ(t) =C/parenleftBig\nc′1(4+3ω)\n2(ω+1)/parenrightBig2\n4+3ω(t+c′2)2\n4+3ω, (6.2)\nρ(t) =M(ω,0)X(ω,0) (t+c′2)−6(ω+1)\n4+3ω, (6.3)\np(t) = 0. (6.4)\nwhereω/ne}ationslash=−4/3,−1.To obtain the vacuum solution ( p= 0,ρ= 0), we reconsider equation\n(3.19) that for the vanishing energy density we have\n3−3n−ω\n2n2= 0, (6.5)\nThe solutions of this quadratic equation are:\nn±=−3±/radicalbig\n3(3+2ω)\nω. (6.6)\nThe solutions a(t)andφ(t)obtained for these two values of nare called the “vacuum solutions”\nof the BD equations. By substituting ( 5.6) into equation ( 6.6) one may obtain the parameter\nof the equation of state win terms of the coupling parameter ω, expressing\nw±=−(2ω+3)±(ω+1)/radicalbig\n3(3+2ω)\n±ω/radicalbig\n3(3+2ω). (6.7)\n20For these two values of w±, the cosmological solutions of BD equations in the absence of the\nΛare worked out\na±(t) =a0(1+bt)q±, (6.8)\nϕ±(t) =ϕ0(1+bt)1−3q±, (6.9)\nwhere\nq±=ω+1±/radicalBig\n2ω+3\n3\n3ω+4,\nalso, the constants a0,ϕ0andbare\na0:=a(t= 0) =c′1/parenleftBigc′2\nq±/parenrightBigq±, ϕ 0:=ϕ(t= 0) =1\nGc′11−3q±\nq±/parenleftBigc′2\nq±/parenrightBig1−3q±, b:=1\nc′2,\nwe note that the range of parameter ωisω >−3/2withω/ne}ationslash=−4/3,0. These solutions are\nin agreement with the solutions of those of [ 15]. The special solutions ( 6.8) and ( 6.9) were\nfirst obtained by O’Hanlon and Tupper in 1972 and are usually c alled the vacuum solutions of\nO’Hanlon-Tupper [ 8]. These solutions are completely consistent with Chauvet’ s solutions [ 9].\nAt the end of this section, let us examine the inflation soluti ons of BD equations. For\nthe state parameter w=−1, the universe was passing through the false vacuum era [ 44–46].\nWe expect that the solutions obtained from the BD equations in this particular state to be\ninflationary. To this end, we begin with the case Λ = 0 of the cosmological solutions ( 5.7),\n(5.8) and ( 5.9) forw=−1, which are, respectively, given by\na(t) =c′1/parenleftBig1\nω+1\n2/parenrightBigω+1\n2(t+c′2)ω+1\n2, (6.10)\nϕ(t) =1\nGc′2\nω+1\n2\n1/parenleftBig2\n2ω+1/parenrightBig2\n(t+c′2)2, (6.11)\nρ(t) =1\n8πGc′2\nω+1\n2\n1(2ω+3)(6ω+5)\n(2ω+1)2:=ρ−1. (6.12)\nwhereω/ne}ationslash=−1/2,−3/2,−5/6. The last one shows that the energy density of the universe in\nthe false vacuum era is a constant. Here, we have denoted this constant value by ρ−1. Now,\nit is necessary to express the integration constant c′1in equations ( 6.10) and ( 6.11) in terms\nof cosmic scale factor of the universe at the time of the Big Bang t= 0, in which we denote\nbya0. For this purpose, by putting t= 0in cosmological solution ( 6.10) and according to the\ninitial condition a0=a(t= 0), we then get\nc′2=2ω+1\n2/parenleftBiga0\nc′1/parenrightBig2\n2ω+1. (6.13)\n21By substituting ( 6.12) and ( 6.13) into solutions ( 6.10) and ( 6.11), one can obtain\na(t) =a0(1+χt)ω+1\n2, (6.14)\nϕ(t) =1\nGa2\nω+1\n2\n0(1+χt)2, (6.15)\nwhere\nχ2:=32πGρ−1c′−2\nω+1\n2\n1\n(6ω+5)(2ω+3), (6.16)\nis a constant. The cosmic scale factor ( 6.14) and the BD scalar field ( 6.15) are the inflation\nsolutions of the BD equations in the absence of the cosmologic al constant, respectively. When\nthe coupling parameter ωtends to infinity, for very small times χt≪1, the limits of the\ninflation solutions of the BD equations become\nlim\nω→∞a(t) =a0lim\nω→∞/parenleftBig\n1+1\nω/radicalbigg\n8πGρ−1\n3t/parenrightBigω\n=a0e/radicalBig\n8πGρ−1\n3t, (6.17)\nlim\nω→∞ϕ(t) =1\nG. (6.18)\nIt can be seen that in the limit ω→ ∞, the cosmic scale factor a(t)changes exponentially\nwith cosmic time t, while the BD scalar field ϕ(t)is a constant. Notice that solutions ( 6.17)\nand (6.18) are the same solutions which are obtained from the theory of the GR in the absence\nof the cosmological constant in the case where the equation o f state of the universe is in the\nformp=−ρ−1. For the case that χt≫1, then the inflationary solutions ( 6.14) and ( 6.15)\nare as follows:\na(t) =a0(χt)ω+1\n2, (6.19)\nϕ(t) =ϕ0(χt)2, (6.20)\nwhere\nϕ0=1\nGa2\nω+1\n2\n0. (6.21)\nFor the universe in the false vacuum era (p=−ρ−1)and in the absence of cosmological\nconstant Λ, it follows from ( 5.6) that\nn|w=−1,Λ=0=−2\nω+1\n2. (6.22)\nThen, by substituting ( 6.22) into the power-law equation ( 3.18) and by using the fact that\nC= 1/G, we find\n1\nG=C=ϕ(t)an(t) =ϕ(t= 0)an(t= 0) =ϕ0an\n0=ϕ0a−2\nω+1\n2\n0.\n22which is nothing but equation ( 6.21). This issue can be a confirmation of the correctness of\nthe inflationary solutions obtained by solving the BD equatio ns for the false vacuum universe\nin the absence of the cosmological constant.\n7 Conclusions\nIn this work, we have focused on solving the BD equations for sp atially flat (k= 0)FLRW\nuniverse fulfilling a perfect fluid with the equation of state p=ωρ,(−1≤ω≤1). Using\nequations ( 3.12) and ( 3.18) we have solved the BD equations in both cases of the absence\nand presence of the cosmological constant to obtain functio nsa(t),ϕ(t),ρ(t)andp(t). As\nwas shown, the constant nin equation ( 3.18) and the state equation parameter win (3.12)\nare compatible with each other, provided that the condition (5.6) is held. Equations ( 3.12)\nand (3.18) helped us summarize all BD equations in one equation, ( 3.25), which we called\nFBD-equation. This equation alone could describe the dynami cs of the spatially flat FLRW\ncosmological model in the framework of BD theory. As we have se en, this cosmological model\ncould be imagined as a 1-dimensional dynamical system with the configuration space Q= (a)\nin which the governing equation of particle motion was given byF=φ(t,a,˙a)∂a. As the\nfirst step to solve the FBD-equation we found the correspondin g Lie point symmetries. Then,\nwe showed that the FBD-equation has two independent point sym metries with infinitesimal\ngenerators X1=∂tandX2=a∂a. Using DPs and λ-symmetries, we found two independent\n2-tuple(S1,R1)(equation ( 4.7)) and(S2,R2)(equation ( 4.9)) consisting of null form Sand\nintegrating factor R. Using these independent 2-tuples and applying Duarte’s integral formula\n(2.4), we obtained the two independent invariants ( 4.8) and ( 4.10) which were associated to\nthe infinitesimal generators X1andX2, respectively. We showed that these two independent\ninvariants, each of which was a first-order ODE for the cosmic scale factor a(t)in terms of\ncosmic time t, could be viewed as a system of algebraic equations for the un known functions\na(t)and˙a(t). By eliminating ˙a(t)between the two equations of the system, we obtained the\nanalytical solution ( 5.7) for the cosmological scale factor a(t). By employing this solution in\nthe BD equations, we were able to obtain the BD scalar field ϕ(t), the energy density of the\nuniverse ρ(t)and its pressure p(t), which were given by equations ( 5.8), (5.9), and ( 5.13),\nrespectively. Not only these solutions gave the scale facto ra(t), the BD scalar field ϕ(t), the\nenergy density ρ(t)and pressure of the universe p(t)for the dust, but also they gave us the\nmore general state of a perfect fluid with equation of state p=ωρ,(−1≤ω≤1).\nAs an interesting result, we have shown that when the couplin g parameter ωtends to\ninfinity, the cosmological solutions of GR theory can be obta ined from the analytical solu-\ntions of BD equations ( 5.7), (5.8), (5.9) and ( 5.13); this can be a confirmation of limω→∞\nBD = GR. Note that our cosmological solutions are rich, so that they include many well-\nknown special solutions that were previously obtained by ot her methods. For example, the\nsolutions presented by Uehara and Kim [ 12] are special cases of our solutions, when the cosmo-\nlogical constant Λis present for the dust dominated universe. In addition, as s hown, the case\nΛ = 0 of our solutions include the following famous solutions: Na riai’s solutions (w∈[0,1/3]),\n23BD dust solutions (w= 0), radiation solutions (w= 1/3), inflationary solutions (w=−1),\nO’Hanlon-Tupper vacuum solutions (w=w±)and general relativity solutions (ω→ ∞).\nAcknowledgements\nThis work has been supported by the research vice chancellor of Azarbaijan Shahid Madani\nUniversity under research fund No. 1402/917.\nReferences\n[1] J. B. Griffiths, J. Podolsky, Exact space-times in Einstein’s general relativity , New York:\nCambridge University Press, (2009); E. P. Wigner, Events, l aws of nature, and invariants\nprinciples, Science ,145(1964) 995-999.\n[2] Y. Fujii, and K. Maeda, The scalar-tensor theory of gravitation , Cambridge: Cambridge\nUniversity Press, (2007).\n[3] C. Brans and R. H. Dicke, Mach’s principle and a relativist ic theory of gravitation, Phys.\nRev.(series I), 124(3) (1961) 925-935.\n[4] C. H. Brans, Mach’s principle and a relativistic theory of gravitation. II, Phys. Rev.\n(series I), 125(6) (1962) 2194-2201.\n[5] P. A. M. Dirac, Cosmological models and the large numbers hypothesis, Proceedings of\nthe Royal Society of London A ,338(1974) 439-446.\n[6] A. B. Batista, Inhomogeneous distributions in the Brans-Di cke cosmology, Phys. Rev. D ,\n21(8) (1980) 2119-2121.\n[7] C. B. G. MacIntosh, Position dependent Robertson-Walker solutions of the Brans-Dicke\nfield equations, Phys. Lett. A ,43(1) (1973) 33-34.\n[8] J. O’Hanlon, B. O. J. Tupper, Vacuum-field solutions in the Brans-Dicke theory, IL\nNuovo Cimento B , (1971-1996), 7(2) (1972) 305-312.\n[9] P. Chauvet, General vacuum-universe solutions in Brans- Dicke cosmology, Astrophys.\nSpace Sci. ,90(1) (1983) 51-58.\n[10] J. M. Cervero and P. G. Estevez, General solutions for a c osmological Robertson-Walker\nmetric in the Brans-Dicke theory, Gen. Relativ. Gravit., 15(4) (1983) 351-356.\n[11] D. Lorentz-Petzold, Comment on the general vacuum solu tions in Brans-Dicke cosmology,\nAstrophys.Space Sci. ,96(2) (1983) 451-453.\n[12] K. Uehara and C. W. Kim, Brans-Dicke cosmology with cosmo logical constant, Phys.\nRev. D ,26(10) (1982) 2575-2579.\n24[13] S. M. M. Rasouli and P. V. Moniz, Exact cosmological solu tions in modified Brans-Dicke\ntheory, Class. Quantum Gravity, 33(3) (2016) 035006.\n[14] K. Atazadeh and F. Darabi, f(T)cosmology via Noether symmetry, Eur. Phys. J. C,\n72(5) (2012) 1-7.\n[15] S. Capozziello and V. Faraoni, Beyond Einstein Gravity: A survey of gravitational the-\nories for cosmology and astrophysics, Heidelberg: Springer Science+Business Media,\n(2011).\n[16] P. Rastall, Generalization of the Einstein theory, Phys. Rev. D, 6(1972) 3357.\n[17] V. K. Chandrasekar, M. Senthilvelan and M. Lakshmanan, On the complete integrability\nand linearization of certain second-order nonlinear ordin ary differential equations, Proc.\nR. Soc. A, 461(2005) 2451-2476.\n[18] V. K. Chandrasekar, M. Senthilvelan and M. Lakshmanan, Extended Prelle-Singer\nmethod and integrability/solvability of a class of nonline ar nth order ordinary differential\nequations, J. Non lin. Math. Phys., 12(suppl.) (2005) 184-201.\n[19] R. Mohanasubha, V. K. Chandrasekar, M. Senthilvelan an d M. Lakshmanan, Interplay\nof symmetries, null forms null, Darboux polynomials, integ rating factors and Jacobi\nmultipliers in integrable second-order differential equat ions,Proc. R. Soc. A, 470(2163)\n(2013) 20130656.\n[20] R. Mohanasubha, V. K. Chandrasekar, M. Senthilvelan, a nd M. Lakshmanan, Intercon-\nnections between various analytic analytic approaches app licable to third-order nonlinear\ndifferential equations, Proc. R. Soc. A, 471(2176) (2015) 20140720.\n[21] M. Manoranjani, R. Mohanasubha, V. K. Chandrasekar and M. Senthilvelan, Extended\nPrelle-Singer procedure and Darboux polynomials method: A n unknown interconnection,\nInt. J. Non Lin. Mech., 118(2020) 103284.\n[22] V. K. Chandrasekar, M. Senthilvelan and M. Lakshmanan, M., On the complete integra-\nbility and lineariz- ation of certain second-order nonline ar ordinary differential equations,\nProc. R. Soc. A, 461(2060) (2005) 2451-2476.\n[23] C. Muriel, and J. L. Romero, New methods of reduction for ordinary differential equa-\ntions, IMA J. Appl. Math., 66(2) (2001) 111-125.\n[24] C. Muriel and J. L. Romero, First integrals, integratin g factors, and λ-symmetries of\nsecond-order Differ- ential equations, J. Phys. A: Math. Theor., 42(36) (2009) 365207.\n[25] C. Muriel and J. L. Romero, Nonlocal symmetries, telesc opic vector fields and λ-\nsymmetries of ordinary differential equations, SIGMA, 8(2012) 106-127.\n25[26] A. Bhuvaneswari, R. A. Kraenkel and M. Senthilvelan, App lication of the λ-symmetries\napproach and time independent integral of the modified Emden equation, Nonlin. Anal.:\nReal World Appl, 13(3) (2012) 1102-1114.\n[27] E. Ahmadi-Azar, K. Atazadeh and A. Eghbali, Exact cosmo logical solutions via invariants\nof the symmetry groups, arXiv:2310.19772 [gr-qc].\n[28] L. G. S. Duarte, S. E. S. Duarte, A. C. P. Da Mota and J. E. F. Skea, Solving the\nsecond-order ordinary differential equations by extending the Prelle-Singer method, J.\nPhys. A: Math. Gen., 34(14) (2001) 3015-3024.\n[29] G. W. Bluman and S. Komei, Symmetries and differential equations , Vol. 81, New York:\nSpringer Science+Business Media, (1989).\n[30] N. H. Ibragimov, Elementary Lie groups and ordinary differential equations, Chichester:\nJohn Wiley, (1999).\n[31] S. Capozziello, M. De Laurentis, Extended theories of g ravity, Phys. Rep. ,509(4-5)\n(2011) 167-321.\n[32] C. M. Will, The confrontation between general relativi ty and experiment: An update,\nPhys. Rep. ,113(6) (1984) 345-422.\n[33] V. Faraoni, The ω→ ∞ limit of Brans-Dicke theory, Phys. Lett. A, 245(1998) 26-30.\n[34] N. Banerjee and S. Sen, Does Brans-Dicke theory always yie ld general relativity in the\ninfiniteωlimit? Phys. Rev. D, 56(2) (1997) 1334-1337.\n[35] H. Dehnen, and O. Obrego’s, Ecact cosmological solutio ns in Brans-Dicke’s scalar-tensor\ntheory, I, Astrophys. Space Sci. ,14(2) (1971) 454-459.\n[36] E. Gourgoulhon, 3+1 formalism in general relativity, Springer, (2012).\n[37] P. Chvanis, Cosmology with a stiff matter era, Phys. Rev. D, 92(10) (2015) 103004-\n103034.\n[38] G. Brando, J. C. Fabris, F. T. Falciano and O. Galkina, Sti ff matter solution in Brans-\nDicke theory and the general relativity limit, Int. J. Mod. Phys. D ,28(12) (2019)\n1950156.\n[39] V. B. Johri and D. Kalyyani, Cosmological models with con stant deceleration parameter\nin Brans-Dicke theory, Gen. Rela. Grav., 26(12) (1994) 1217-1232.\n[40] H. Kim, Brans-Dicke as a unified model for dark matter-dar k energy, Mon. Not. R. Astro.\nSoc.,364(3) (2005) 813-822.\n[41] E. Ahmadi-Azar and N. Riazi, A class of cosmological sol utions of Brans-Dicke theory\nwith cosmological constant, Astrophys. Space Sci. ,226(1) (1995) 1-5.\n26[42] I. Ahmadi-Azar, Cosmological solutions of Brans-Dicke equations with cosmological con-\nstant, Iranian J. Phys. Research, 3(3) (2002) 177-183.\n[43] H. Nariai, On the Green’s function in an expanding unive rse and its role in the problem\nof Mach’s principle, Prog. Theo. Phys. ,40(1) (1968) 49-59.\n[44] C. Mathiazhagan and V. B. Johri, An inflationary universe in Brans-Dicke theory: a\nhopeful sign of theortetical estimation of the gravitation al constant, Class. Quantum\nGravity, 1(1984) L29.\n[45] J. D. Barrow and K. Maeda, Extended inflationary universe s,Nucl. Phys. B ,341(1990)\n294-308.\n[46] R. G. Vishwakarma, A Machian model of dark energy, Class. Quantum Gravity, 19(18)\n(2002) 4747-4752.\n27" }, { "title": "2401.17943v1.Large_amplitude_traveling_waves_for_the_non_resistive_MHD_system.pdf", "content": "arXiv:2401.17943v1 [math.AP] 31 Jan 2024LARGE AMPLITUDE TRAVELING WAVES FOR THE NON-RESISTIVE MHD\nSYSTEM\nGENNARO CIAMPA, RICCARDO MONTALTO, AND SHULAMIT TERRACINA\nAbstract. We prove the existence of large amplitude bi-periodic trave ling waves (stationary in a\nmoving frame) of the two-dimensional non-resistive Magnet ohydrodynamics (MHD) system with a\ntraveling wave external force with large velocity speed λ(ω1,ω2) and of amplitude of order O(λ1+)\nwhereλ≫1 is a large parameter. For most values of ω= (ω1,ω2) and for λ≫1 large enough,\nwe construct bi-periodic traveling wave solutions of arbit rarily large amplitude as λ→+∞. More\nprecisely, we show that the velocity field is of order O(λ0+), whereas the magnetic field is close\nto a constant vector as λ→+∞. Due to the presence of small divisors, the proof is based on a\nnonlinear Nash-Moser scheme adapted to construct nonlinea r waves of large amplitude. The main\ndifficulty is that the linearized equation at any approximate solution is an unbounded perturbation\nof large size of a diagonal operator and hence the problem is n ot perturbative. The invertibility\nof the linearized operator is then performed by using tools f rom micro-local analysis and normal\nforms together with a sharp analysis of high and low frequenc y regimes w.r. to the large parameter\nλ≫1. To the best of our knowledge, this is the first result in whic h global in time, large amplitude\nsolutions are constructed for the 2D non-resistive MHD syst em with periodic boundary conditions\nand also the first existence results of large amplitude quasi -periodic solutions for a nonlinear PDE\nin higher space dimension.\nKey words: Fluid Mechanics, Magnetohydrodynamics, Traveling Waves, Normal Forms, Micro-\nlocal analysis.\nMSC 2020: 35Q35, 76W05, 35S50.\nContents\n1. Introduction 2\n1.1. Main result 4\n1.2. Main ideas, novelties and strategy of the proof 6\nRemarks and future perspectives 10\nOutline of the paper 10\nAcknowledgements 10\n2. Functions spaces, norms and linear operators 11\n2.1. Diophantine equations 12\n2.2. Linear operators 12\n2.3. Pseudo-differential operators and norms 13\n2.4. A quantitative Egorov Theorem 18\n3. The linearized operator 25\n4. Decoupling of linearized operator up to a smoothing remai nder 26\n4.1. Decoupling of the first order part 27\n4.2. The iterative step 35\n5. Inversion of the first equation 39\n5.1. Inversion of the operator L(1)\n1 39\n5.2. Reduction to a scalar transport-type operator 42\n6. Normal form reduction and inversion of the transport oper atorP 43\n6.1. Reduction of the transport operator of order one 43\n6.2. Reduction of the lower order terms 45\n6.3. Inversion of the operator P 47\n7. Inversion of the linearized operator L 49\n8. Construction of an approximate solution 50\n12 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\n9. The Nash Moser scheme 51\n10. Measure estimates 55\n11. Proof of Theorems 1.1, 1.2 57\nReferences 59\n1.Introduction\nInthispaperweconsiderthetwodimensionalnon-resistive MHDequationsonthetwo-dimensional\ntorusT2,T:=R/(2πZ)\n\n\n∂tu+(u·∇)u+∇p= ∆u+(b·∇)b+f(t,x),\n∂tb+(u·∇)b= (b·∇)u,\ndivu= 0,divb= 0,(1.1)\nwhere the unknowns are the velocity field of the fluid u:R×T2→R2, the magnetic field\nb:R×T2→R2and the pressure p:R×T2→R, whereas the external force acting on the\nfluidf:R×T2→R2is given. This system describes the behavior of a viscous, el ectrically\nconducting, incompressible fluid, whose resistivity is neg ligible and it is commonly used to model\nstrongly collisional plasmas in astrophysics. We refer to [ 14, 43] for a derivation of the model,\nhowever we recall that the equations are given by a combinati on of the Navies-Stokes equations\nand the Faraday-Maxwell system via Ohm’s law. The equations (1.1) were analyzed by Moffat [46]\nin the context of topological hydrodynamics with the aim to c onstruct magneto-static equilibria\n(and thus also steady solutions of the Euler equations) with arbitrary prescribed topology. In fact,\nthe second equation in (1.1) is “topology preserving” since the integral lines of the magnetic field b\nare transported by the flow of the velocity uas they evolve in time. Indeed, as long as one considers\nsmooth solutions, the flow of uis a diffeomorphism and then the magnetic lines keep their topo logy\nunchanged during the evolution. This is also known in the lit erature as Alfven’s Theorem. The\nambitious program of Moffat was to construct magneto-static e quilibria in the infinite limit (w.r.t.\ntime) of solutions to a topology preserving diffusive equatio n. We point out that Moffat’s original\nproposal did not involve external forces in the system (1.1) , but we refer to [42] for the forced\ncase. This procedure is known as magnetic relaxation and some partial results have been obtained\nin recent years, see [3, 11, 13, 42]. We also point out that Enc iso and Peralta-Salas [18] proved\nthe existence of (infinite energy) stationary solutions of t he Euler equations with vortex lines of\nprescribed topology, however it is an open problem whether s uch solutions arise as limits of the\nsystem (1.1). In contrast, in the resistive case the topolog y of magnetic lines is expected to change\nleading to magnetic reconnection phenomena. Thelatter are of extreme relevance to astrophys icists\nbeing a phenomenon observed virtually everywhere in the uni verse. We refer to [12, 48, 49] and\nreferences therein for an overview of this topic from a numer ical and analytical point of view.\nThemathematical aspectsof theMHDequations havebeenexte nsively studiedinrecent decades,\nespecially withregard to theCauchy problem. Before going i nto thedetails of our result, we provide\na (non-exhaustive) review of the literature on the problem, with a particular focus on the two-\ndimensional case. In the presence of the resistive term ∆ bin the second equation, global existence\nand uniqueness of finite energy weak solutions (in 2D) has bee n proved in [16]. Furthermore, if\nthe initial datum and the external force are smooth, the well -posedness of (1.1) (with the resistive\nterm ∆b) in 2D has been shown in [52]. In contrast, for the three-dime nsional case we only have\nuniquelocalsmooth solutions, see again [16, 52]. For the non-resistive case, the local existence of\nsmooth solutions in 2D has been proved in [40] when the initia l datum and the body force belong\nto the space Hswiths≥3, while the 3D case was treated in [21, 22] at a sharp level of S obolev\nregularity. Moreover, global weak solutions in 2D for the sy stem without the viscous term ∆ u\nin the first equations but the resistive term ∆ bin the second equations have been constructed in\n[30]. This case is less difficult than (1.1). Indeed in (1.1), t he equations for the magnetic field look\nlike the vorticity formulation of the 3D Euler equation (the termb·∇uis similar to the strechingLARGE AMPLITUDE TRAVELING WAVES MHD 3\nterm). Global well-posedness results in the three-dimensi onal (1.1) equations are available under\nsome geometrical constraints on the initial datum. In parti cular, special type of axisymmetric\nsolutions have been constructed for the system (1.1) in [41] . See also [32] for the analogous result\nfor the system with no viscosity ∆ uin the first equations but with resistive term ∆ bin the second\nequation.\nFinally, assuming that the initial datum b0is a small perturbation of a constant steady state,\nthe existence of global-in-time smooth smallsolutions (namely the velocity field is small and the\nmagnetic field is close to a constant steady state) of (1.1) ha s been established in [44, 50]. See also\n[45, 57] for similar results in the three dimensional case. H owever, the existence of global-in-time\nsmooth solutions for (1.1) with generic periodic initial da ta (no perturbation of a constant steady\nstate, big velocity) is still open even in 2D.\nThe aim of this paper is to construct quasi-periodic solutio ns (global-in-time) of large amplitude\nfor the system (1.1) on the bi-dimensional torus T2. We consider the case of bi-periodic traveling\nwave solutions. We shall assume that the external force fis a smooth bi-periodic traveling wave\npropagating in the direction ω= (ω1,ω2)∈R2, with large amplitude λ1+η(0<η≪1,λ≫1) and\nwith large velocity speed λω. More precisely, we take\nf(t,x) =λ1+ηf(x+λωt) where\nf∈ C∞(T2,R2),/integraldisplay\nT2f(x)dx= 0,\nω= (ω1,ω2)∈ OwhereO ⊂R2is a bounded domain ,\nλ≫1 is a large parameter and 0 <η≪1 is a small parameter .(1.2)\nNote thatλ1+ηrepresents the amplitude of the forcing term and λis the size of the frequency\n(velocity speed). We shall prove that for λ≫1 large enough, 0 < η≪1 small enough and for a\nfull measure set of frequencies ω∈ O, the system (1.1) admits traveling wave solutions u(x+λωt),\nb(x+λωt),p(x+λωt) oflarge amplitude of orderO(λ0+) asλ→+∞. This is a small divisors\nproblem, typical in the KAM (Kolmogorov-Arnold-Moser) the ory for PDEs, since the linearized\nequation at the origin has spectrum accumulating to zero for most values of the parameter ω.\nThe major difficulty in this problem is that we look for large quasi-periodic solutions and hence the\nproblem is not perturbative: indeed, even at a formal level, if one tries to construct by perturbation\ntheory the solution (by expanding in decreasing powers of λ), one gets that the size of the expected\nsolution is essentially given by the ratio\nsize of the solution =size of the perturbation\nsize of the frequency=O(λ1+)\nO(λ)=O(λ0+). (1.3)\nOther difficulties are: the equations (1.1) are strongly coup led, this makes quite difficult their\nanalysis; the system (1.1) is a system of PDEs in higher space dimension with derivatives in the\nnonlinearity, for which it is particularly difficult to prove KAM-type results. Indeed the problem\nthat we study is even non trivial for small amplitude solutio ns.\nWe overcome the afore-mentioned difficulties by implementin g a Nash-Moser scheme adapted for\nconstructing solutions of large amplitude. The key difficult y is the inversion of the linearized\noperator at any approximate solution which is the sum of a dia gonal operator plus a large variable\ncoefficients operator of size O(λ0+). In order to invert such an operator we develop normal form\nmethods based on micro-local analysis and pseudo-differenti al calculus which allows to use the\nstabilizing effect of the large velocity speed λω. This requires some sharp analysis in high and low\nfrequency regimes w.r. to the large parameter λcombined with tools from micro-local analysis.\nWe refer to the next section for a more precise description of the main ideas of the proof.\nWe conclude this part of the introduction with the following remarks. Our result is the first one\nin which one shows the existence of large amplitude quasi-periodic solutions for a non-integrable\nPDE with a perturbation (forcing term) of large size. Up to no w large amplitude quasi-periodic\nsolutions have been constructed only for small perturbatio nsof defocusingNLSand KdVequations,\nby exploiting the integrable structures of these two equati ons, see [9], [10]. We also mention that\nKAM and Normal Form techniques have been developed to study t he dynamics of one dimensional4 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nlinear wave and Klein Gordon equations with a time dependent quasi-periodic potential of size\nO(1) and large frequencies (in which the ratio (1.3) is small f orλ≫1 large enough), see [26], [29].\n1.1.Main result. We are interested in the existence of large amplitude traveling wave solutions\nof (1.1). As we have already mentioned, the unknowns are the m agnetic field b:R×T2→R2, the\nvelocity of the fluid u:R×T2→R2and the pressure p:R×T2→R, whereas, the data of the\nproblem are the large parameter λ≫1, the small parameter 0 <η≪1,ω= (ω1,ω2)∈ O ⊂R2\nis the two-dimensional frequency vector in a bounded domain O ⊂R2and the external force fis\na bi-periodic traveling wave of the form (1.2). We then look f or smooth solutions ( u,b,p) of the\nsystem (1.1), having the form\nu(t,x) :=U(x+λωt), U:T2→R2,/integraldisplay\nT2U(x)dx= 0,\nb(t,x) :=b+B(x+λωt),b/\\e}atio\\slash= 0, B:T2→R2,/integraldisplay\nT2B(x)dx= 0,\np(t,x) :=P(x+λωt),/integraldisplay\nT2P(x)dx= 0,\nwith frequency ω= (ω1,ω2)∈ O ⊆R2.(1.4)\nThe main feature of solutions of the form (1.4) is that they look steady in the reference frame\ny1=x1+λω1t,y2=x2+λω2t. This implies that plugging the ansatz (1.4) in the equation s (1.1),\nwe obtain a stationary problem of the form\n\n\nλω·∇U+(U·∇)U+∇P= ∆U+(b+B)·∇B+λ1+ηf,\nλω·∇B+(U·∇)B= (b+B)·∇U,\ndivU= divB= 0(1.5)\nwhereω· ∇=ω1∂x1+ω2∂x2. We look for large amplitude solution (growing as λ→+∞)\n(U,B,P)∈Hs\n0(T2,R2)×Hs\n0(T2,R2)×Hs\n0(T2,R) fors≫0 large enough where\nHs(T2,Rn) :=/braceleftBig\nu(x) =/summationdisplay\nk∈Z2/hatwideu(k)eik·x∈L2(T2,Rn) :/ba∇dblu/ba∇dbls:=/parenleftBig/summationdisplay\nk∈Z2/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2s|/hatwideu(k)|2/parenrightBig1\n2<∞/bracerightBig\n,\nHs\n0(T2,Rn) :=/braceleftBig\nu∈Hs(T2,Rn) :/integraldisplay\nT2u(x)dx= 0/bracerightBig\n.(1.6)\nwhere/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht:= (1 +|k|2)1\n2. As a notation, we often write Hs≡Hs(T2)≡Hs(T2,R) andHs\n0≡\nHs\n0(T2)≡Hs\n0(T2,R). We denote by M(n)the Lebesgue measure on Rn.\nWe shall make the following assumption on the forcing term fand on the average of the magnetic\nfieldbthat guarantees that we construct non trivial solutions.\n•Assumption. Letb∈R2\\ {0}be the average of the magnetic field and let f:=\n(f1,f2)∈ C∞(T2,R2),/integraltext\nT2f(x)dx= 0. Let F:= curl(f) :=∂x1f2−∂x2f1,F(x) =/summationtext\nk∈Z2\\{0}/hatwideF(k)eix·k.\nThere exists k∈Z2\\{0}such that\nb·k/\\e}atio\\slash= 0 and/hatwideF(k)/\\e}atio\\slash= 0.(1.7)\nOur main result is the following.\nTheorem 1.1. Letf∈ C∞(T2,R2)with zero average and b∈R2\\ {0}satisfies (1.7). There\nexist¯S >0,η∈(0,1)such that for any S≥¯S, there exist λ0≡λ0(f,η,S,b)≫1andC1≡\nC1(f,η,S,b), C2≡C2(f,η,S,b)≫1such that for any λ>λ0the following holds. There exists a\nBorel set Oλ⊂ Oof asymptotically full Lebesgue measure, i.e. limλ→+∞M(2)(O \\Oλ) = 0, such\nthat for every ω∈ Oλthere exists/parenleftBig\nU(·;ω),B(·;ω),P(·;ω)/parenrightBig\n∈HS\n0(T2,R2)×HS\n0(T2,R2)×HS\n0(T2),LARGE AMPLITUDE TRAVELING WAVES MHD 5\nU,B,P/\\e}atio\\slash= 0that solves the MHD equations (1.5). Moreover\ninf\nω∈Oλ/parenleftBig\n/ba∇dblU(·;ω)/ba∇dblS+/ba∇dblB(·;ω)/ba∇dblS/parenrightBig\n≥inf\nω∈Oλ/ba∇dblU(·;ω)/ba∇dblS≥C1λη,\nifdiv(f)/\\e}atio\\slash= 0then inf\nω∈Oλ/ba∇dblP(·;ω)/ba∇dblS≥C1λ1+η\nsup\nω∈Oλ/ba∇dblU(·;ω)/ba∇dblS≤C2λ3η,sup\nω∈Oλ/ba∇dblB(·;ω)/ba∇dblS≤C2λ−3η,sup\nω∈Oλ/ba∇dblP(·;ω)/ba∇dblS≤C2λ1+η.(1.8)\nWe now make some comments on the assumption (1.7). This assum ption is verified for instance\nifb∈R2\\{0}is an irrational vector, i.e. b·k/\\e}atio\\slash= 0 for any k∈Z2\\{0}and ifF= curl(f)/\\e}atio\\slash= 0\nis a non trivial forcing term. If bis a rational vector, for instance b= (1,0), then the assumption\n(1.7) holds if (for instance) the forcing term Fsatisfies/hatwideF(k)/\\e}atio\\slash= 0 fork= (k1,0),k1∈Z\\{0}.\nTheorem 1.1 will be obtained by Theorem 1.2 below, dealing wi th the vorticity formulation of the\nsystem (1.10). We define the vorticity and the current densit y as\nΩ :=∂x1U2−∂x2U1, U(x) = (U1(x),U2(x)),\nJ:=∂x1B2−∂x2B1, B(x) = (B1(x),B2(x)).(1.9)\nApplying the curl operator to both the equations in (1.1), we obtain the following system\n\n\nλω·∇Ω+(U·∇)Ω = ∆Ω+( b+B)·∇J+λ1+ηF,\nλω·∇J+(U·∇)J= (b+B)·∇Ω+2H(U,B),\nU=UΩ :=∇⊥(−∆)−1Ω, B=UJ:=∇⊥(−∆)−1J,(1.10)\nwhere we recall that F= curlf=∂x1f2−∂x2f1, the orthogonal gradient is defined as ∇⊥:=\n(∂x2,−∂x1), (−∆)−1denotes the inverse of the Laplacian (i.e. the Fourier multi plier with symbol\n|ξ|−2forξ∈Z2\\{0}), and the bilinear form His defined by\nH(U,B) :=∂x1B·∇U2−∂x2B·∇U1. (1.11)\nWe remark that, once (1.10) is solved, the pressure is recove red from the first equation in (1.5) via\nthe elliptic equation\n∆P=λ1+ηdivf+div[(B·∇)B]−div[(U·∇)U]. (1.12)\nSince/integraltext\nT2Ω(x)dxand/integraltext\nT2J(x)dxare conserved quantities, we shall restrict to the space of z ero\naverage vector fields in x. We look for large amplitude waves of order O(λ0+), therefore it is\nconvenient to rescale the variables\nΩ/mapsto→λδΩ, J/mapsto→λδJ,\nwhere we fix δ:= 3η.(1.13)\nUnder the latter rescaling, the system (1.10) reads as\nF(Ω,J) = 0,\nF(Ω,J) :=\nλω·∇Ω−∆Ω−b·∇J+λδ/bracketleftBig\nU·∇Ω−B·∇J/bracketrightBig\n−λ1−2\n3δF\nλω·∇J−b·∇Ω+λδ/bracketleftBig\n(U·∇)J−B·∇Ω−2H(U,B)/bracketrightBig\n,\nU=UΩ :=∇⊥(−∆)−1Ω, B=UJ:=∇⊥(−∆)−1J(1.14)\nand we look for solutions Ω ,J∈Hs\n0(T2) fors≫1 large enough. The following theorem holds.\nTheorem 1.2. Letf∈ C∞(T2,R2)with zero average and b∈R2\\ {0}satisfies (1.7). There\nexist¯S >0,δ∈(0,1)such that for any S≥¯S, there exist λ0=λ0(f,δ,S,b)≫1andC1≡\nC1(f,δ,S,b), C2≡C2(f,δ,S,b)>0such that for any λ>λ0the following holds. There exists a\nBorel set Oλ⊂ Oof asymptotically full Lebesgue measure, i.e. limλ→∞M(2)(O \\ Oλ) = 0, such6 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nthat for any ω∈ Oλ, there exists (Ω(·;ω),J(·;ω))∈HS\n0(T2)×HS\n0(T2)withΩ,J/\\e}atio\\slash= 0which is a\nzero ofFdefined in (1.14), namely F/parenleftBig\nΩ(·;ω),J(·;ω)/parenrightBig\n= 0for anyω∈ Oλ. Moreover\ninf\nω∈Oλ/parenleftBig\n/ba∇dblΩ(·;ω)/ba∇dblS+/ba∇dblJ(·;ω)/ba∇dblS/parenrightBig\n≥inf\nω∈Oλ/ba∇dblΩ(·;ω)/ba∇dblS≥C1λ−2\n3δ,\nsup\nω∈Oλ/ba∇dblΩ(·;ω)/ba∇dblS≤C2,sup\nω∈Oλ/ba∇dblJ(·;ω)/ba∇dblS≤C2λ−2δ(1.15)\nOur approach is based on a set of techniques and tools (normal forms, microlocal analysis, Nash-\nMoser implicit function theorem, etc.) that are now commonl y referred to as KAM (Kolmogorov-\nArnold-Moser) techniques for PDEs. In recent years, these t echniques have been successfully\ndeveloped to construct nonlinear periodic and quasi-perio dic waves of small amplitude in Fluid\nMechanics. This has been the case of the two-dimensional wat er waves equations, see [1, 8] for\ntime quasi-periodic standing waves, [6, 7, 23] for time quas i-periodic traveling wave solutions\nand [38], [39] for diamond waves in the three-dimensional wa ter waves equations. Moreover,\nwe also mention the recent results on the evolution of vortex -patches for active-scalar equations\n[5, 17, 31, 33, 34, 35, 37, 51]. By considering quasi-periodi c external forces, time quasi-periodic\nsolutions of the forced Euler equations have been construct ed in [2], in [47] for the Navier-Stokes\nequations and in [27] quasi-periodic solutions of 2D Navier -Stokes equations were constructed in\nthe vanishing viscosity limit and it was proved the converge nce to quasi-periodic solutions of the\nforced Euler equation (uniformly and globally in time) as th e viscosity goes to zero.\nWe finally remark that quasi-periodic solutions to the (unfo rced) Euler equations were con-\nstructed also in [15, 19] with a completely different approach (see also the recent extension to\nalmost periodic solutions [28]). In particular, the soluti ons are built by suitably gluing localized\ntraveling profiles, so they are not of KAM type since no small d ivisors are involved.\n1.2.Main ideas, novelties and strategy of the proof. We construct large amplitude bi-\nperiodic solutions of the 2D non-resistive MHD equations (w e work in the vorticity-current formu-\nlation (1.14)) of size O(λδ), 0<δ≪1,λ≫1. Due to the presence of small divisors , the scheme\nof the proof is based on a Nash-Moser iteration scheme in scal e of Sobolev spaces Hs. The main\ndifficulty compared with previous works is that, since we prod uce solutions of large amplitude, the\nproblem is not perturbative. The heart of the proof lies in th e analysis of the linearized operator\nL, associated to (1.10), arising at each step of the Nash-Mose r iteration.\nFor the whole introduction, we use the following notation. G ivenκ,m∈Rwe writeO(λκ|D|m) to\ndenote an operator of size λκand of order m.\nThe linearized operator Lis a variable coefficients perturbation of large size of a diag onal operator,\nnamely it has the form\nL:=D+P,\nD:=/parenleftbigg\nλω·∇−∆ 0\n0λω·∇/parenrightbigg\n,P:=/parenleftbigg\na(x)·∇d(x)·∇\nd(x)·∇a(x)·∇/parenrightbigg\n+/parenleftbigg\nR1R2\nR3R4/parenrightbigg\n,\nwhered(x),a(x) =O(λδ) and\nR1,R2=O(λδ|D|−1)...,R3,R4=O(λδ|D|0).(1.16)\nWe want to show the invertibility of Land provide tame estimates for its inverse L−1. Theformal\nideabehind the procedure is the following. By imposing the stand ard diophantine condition on ω,\ni.e.\n|ω·k| ≥γ\n|k|τ,∀k∈Z2\\{0},0<γ≪1, τ≫0, (1.17)\none has that Dis invertible with loss of derivatives and/ba∇dblD−1/ba∇dblB(Hs+τ,Hs)=O(λ−1). Hence formally\nD−1P=O(λδ−1)≪1 ifδ≪1 is small enough and λ≫1 is large enough. This heuristic\nargument suggests that the fact that the velocity speed is of sizeO(λ) is the key point to enter in a\nperturbative regime. On the other hand, due to the small divi sors, the Neumann series argument\ncannot be implemented directly and hence one needs to implem ent normal form arguments based\non pseudo-differential calculus in order to reduce to a situat ion in which the heuristic argumentLARGE AMPLITUDE TRAVELING WAVES MHD 7\ndescribed above can be made rigorous. As we mentioned alread y before, the major difficulty in this\nprocedure is that the perturbation is large for λ≫1. Now, we shall describe more in details the\nmain ideas and points of such a procedure.\nIn order to invert the operator Lwe have to solve the linear system of 2 equations in 2 unknowns\n(recall (1.16)) of the type\n/braceleftBigg\nL(1)h1+L(2)h2=g1,\nL(3)h1+L(4)h2=g2,\nL(1):=λω·∇−∆+a(x)·∇+R1,\nL(2):=d(x)·∇+R2,L(3):=d(x)·∇+R3,\nL(4):=λω·∇+a(x)·∇+R4.(1.18)\nThe leading idea to solve this system is to try to reduce it to t he invertibility of a scalar transport\ntype operator with large variable coefficients, that can be in verted by extending the strategy devel-\noped in [2], [27] in the framework of small amplitude solutio ns. This reduction can be done since\nL(1)isdissipative , due to the presence of the Laplacian and this avoid the small divisors problem at\nleast in the first equation. On the other hand, we mention that this inversion is anyway subtle since\nthe perturbation has large variable coefficients and require s a splitting in high and low frequencies\nwith respect to the large parameter λ. We can summarize the strategy of the inversion in three\nmain steps that we shall describe separately below:\n(1) decoupling of the equations up to an arbitrarily regular izing remainder;\n(2) inversion of the first equation;\n(3) inversion of the second equation.\nDecoupling of the equations up to an arbitrarily regularizing remainder.\nFirst of all, in Section 4, we implement an iterative procedu re that decouples the equations up to\na remainder of large size but regularizing, namely we use pse udo-differential operators in order to\nconjugate Lto another linear operator of the form\nL1=/parenleftBigg\nL(1)\n1L(2)\n−N\nL(3)\n−NL(4)\n1/parenrightBigg\n, (1.19)\nwith\nL(1)\n1=λω·∇−∆+a(x)·∇+R(1)\n0,\nL(1)\n4=λω·∇+a(x)·∇+R(4)\n0,(1.20)\nwhereR(1)\n0,R(4)\n0=O(λδM|D|0) are operators of order 0 andof size O(λδM) for someM≡M(N)≫\n1 large enough, whereas the remainders L(2)\n−N,L(3)\n−N=O(λδM|D|−N) are smoothing operators of\norder−N(meaningthattheyareboundedlinearoperatorsfrom HsintoHs+N)andofsize O(λδM).\nThe presence of the Laplacian in the first equation is crucial in this procedure, since it makes\npossible to solve homological equations which in turn provides the generator of the transformations\nthat decouple the equations. In order to simplify the exposi tion we shall describe the first step of\nsuch an iterative procedure in which we eliminate from Lin (1.16), the highest order off-diagonal\nterm\nQ1:=/parenleftbigg\n0d(x)·∇\nd(x)·∇0/parenrightbigg\n. (1.21)\nWe look for a map\nΦ := exp(Ψ) ,Ψ :=/parenleftbigg\n0 Op( ψ1(x,ξ))\nOp(ψ2(x,ξ)) 0/parenrightbigg\n,\nin such a way to eliminate-normalize the off-diagonal term Q1. If one computes Φ−1LΦ, by a\ndirect calculation, using pseudo-differential calculus, it turns out that in order to cancel the new8 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\noff-diagonal term of order one, the symbols ψ1(x,ξ) andψ2(x,ξ) has to satisfy\nλω·∇ψ1(x,ξ)+|ξ|2ψ1(x,ξ)+id(x)·ξ= lower order terms ,\nλω·∇ψ2(x,ξ)−|ξ|2ψ2(x,ξ)+id(x)·ξ= lower order terms .(1.22)\nThe two latter equations are solved in the same way, hence let us discuss how to solve the first\none. The main issue is that d(x) =O(λδ)≫1, but one needs estimates on ψ1which are uniformly\nbounded w.r. to λ, in such a way that exp(Ψ) has not bad divergences w.r. to the l arge parameter\nλ. A convenient way to proceed is then to introduce a suitable c ut-off function χλ(ξ) which is\nsupported on |ξ| ≥λ6δ. Then, we split the symbol id(x)·ξas\nid(x)·ξ=iχλ(ξ)d(x)·ξ+i(1−χλ(ξ))d(x)·ξ.\nThe symbol (1 −χλ(ξ))d(x)·ξis smoothing and it is of order −N,N≫1 with estimates\n|(1−χλ(ξ))d(x)·ξ|/lessorsimilarλ6δ(N+1)/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−N,\nand hence we shall solve\nλω·∇ψ1(x,ξ)+|ξ|2ψ1(x,ξ)+iχλ(ξ)d(x)·ξ= 0. (1.23)\nThis equation can be solved by expanding ψ1anddin Fourier series w.r. to xand one obtains that\nψ1(x,ξ) =/summationdisplay\nk∈Z2/hatwideψ1(k,ξ)eik·x, d(x) =/summationdisplay\nk∈Z2/hatwided(k)eik·x,/hatwideψ1(k,ξ) =−iχλ(ξ)/hatwided(k)·ξ\niλω·k+|ξ|2.\nBy the latter formula, one has that ψ1is supported on |ξ| ≥λ6δand (recall that d(x) =O(λδ)),\n|ψ1(x,ξ)|/lessorsimilarλδ|ξ|−1|ξ|1\n2≥λ3δ\n/lessorsimilarλδλ−3δ|ξ|−1\n2/lessorsimilarλ−2δ|ξ|−1\n2.\nWe then find ψ1,ψ2of order1\n2and of size O(λ−2δ)≪1 forλ≫1 large enough. The outcome of\nthis procedure, by estimating all the terms in the expansion ofL(0):= Φ−1LΦ is then given by\nL(0):=D+/parenleftbigg\na(x)·∇0\n0a(x)·∇/parenrightbigg\n+/parenleftBigg\n0O(λ3δ|D|1\n2)\nO(λ3δ|D|1\n2) 0/parenrightBigg\n+O(λ3δ|D|0)+O(λMδ|D|−N),\nM:= 6(N+1).\nWe remark that in L(0), the size of the remainders is O(λ3δ), which is worse than the ones in L\n(which is of order O(λδ)), cf. (1.16). This is due to the presence of the term Op/parenleftBig\nid(x)·ξ/parenleftbig\nψ1−ψ2/parenrightbig/parenrightBig\nwhich is of order O(λ3δ|D|0), see (4.42), which follows from the fact that Op( ψ1−ψ2) is of order\n−1, thanks to a cancellation exploited in Lemma 4.2-( ii) (even ifψ1,ψ2are only of order −1\n2). In\norder to normalize the lower order terms, the procedure is qu ite similar to the one described above\nand the equations to be solved are similar to (1.22), (1.23). The only difference is that the size\nof the remainders to be normalized is O(λ3δ). In order to get uniform estimates w.r. to λof the\nmaps along the iteration, one uses that the cut-off function χλis supported on |ξ| ≥λ6δ. We refer\nto sub-section 4.2 for more details.\nInversion of the first equation and reduction to the second component.\nAfter the previous decoupling procedure, we can invert the fi rst equation (namely the operator\nL(1)\n1in (1.20)) by implementing a Neumann series argument. This i s done in subsection 5.1. The\noperator L(1)\n1is of the form\nL(1)\n1:=Lλ+R(1)\n1,\nLλ:=λω·∇−∆,R(1)\n1=O(λδM|D|).(1.24)\nIn order to invert this operator by Neumann series we need tha tL−1\nλR(1)\n1is of order zero and small\nin size. Clearly\nLλ= diagk/\\e}atio\\slash=0iλω·k+|k|2,LARGE AMPLITUDE TRAVELING WAVES MHD 9\nand hence |iλω·k+|k|2| ≥ |k|2for anyk∈Z2\\{0}, meaning that L−1\nλ∼(−∆)−1gains two space\nderivatives. Thisfact thenbalance thefactthat R(1)\n1is unboundedoforder one. Ontheother hand,\nthis argument is not enough to use Neumann series, since in th is wayL−1\nλR(1)\n1=O(λδM|D|−1),\nwhose size is still large w.r. to λ≫1. Hence, in order to overcome this problem we require a gain\nof only one derivative in the estimate of L−1\nλand we gain also in size, in such a way to compensate\nO(λδM). This is done in Lemma 5.1. More precisely, for some constan tp>0 (depending on the\nconstantτappearing in the small divisors (1.17)), One shows that\nL−1\nλ=O(λ−p|D|−1),\nby analyzing separately the regimes |k| ≥λpand|k| ≤λp. For large frequencies one uses that\n|k|2≥λp|k|and for low frequencies one uses the diophantine condition o nω. We remark that the\ndissipation provided by the laplacian −∆ is used in a crucial way to analyze the high frequency\nregime|k| ≥λp. One then obtains that\nL−1\nλR(1)\n1=O(λ−p+δM|D|0),\nwhich is small and bounded by choosing 0 < δ≪p\nMandλ≫1 large enough. The precise,\nquantitative Neumann series argument is performed in Lemma 5.2 and one shows that ( L(1)\n1)−1=\nO(λ−p|D|−1). The inversion of L(1)\n1then reduces the invertibility of L1in (1.19), (1.20) to the\ninvertibility of a transport type operator with large varia ble coefficients of the form\nP:=λω·∇+a(x)·∇+R0,R0=O(λδM|D|0), (1.25)\nsee (5.21)-(5.23) and Lemma 5.3 in sub-section 5.2.\nInversion of the transport operator P.\nThe inversion of the transport operator Pis done in section 5.2. This is an adaptation of the\nmethods developed in [2], [27] (for small amplitudewaves). We implement a normal form procedure\ntransforming PtoP1where the operator P1is a smoothing perturbation of size λδMof a diagonal\noperator, namely it has the form\nP1=D1+R1,\nD1:= diagk/\\e}atio\\slash=0µ(k), µ(k) =iλω·k+O(λδM), k∈Z2\\{0},\nR1=O(λδM|D|−N).(1.26)\nThis is proved in Propositions 6.1, 6.2 and 6.3. Also in this s teps, it is essential that the size\nof the frequency is of order O(λ). This allows to estimate uniformly in λthe size of the normal\nform transformations that we need in order to transform PinP1. Then in sub-section 6.3, we\ninvertP1(and then P) by a Neumann series argument. By imposing diophantine cond itions on\nthe eigenvalues of D1\n|µ(k)| ≥λγ\n|k|τ, k∈Z2\\{0},\nand by choosing N∼τ, one gets that\nD−1\n1R1=O(λδM−1|D|0),\nwhich is small for δ≪1\nMandλ≫1 large enough. This last step then conclude the whole\ninvertibility procedure of the linearized operator Lwhich is summarized in Section 7. We point\nout that by an appropriate choice of the parameters which ent ers in the procedure, L−1has size\n/ba∇dblL−1/ba∇dblB(Hs+¯σ,Hs)=O(λ−δM) (for some large constant ¯ σ≫1).\nThe nonlinear Nash-Moser scheme. We conclude this explanation of the scheme of the proof\nwith some comments on the nonlinear Nash-Moser scheme imple mented on the map F. The first\nproblem is already in the first approximation of the solution . Indeed (Ω ,J) = (0,0) is not a good\napproximation, since F(0,0) =O(λ1+η−δ) =O(λ1−) is not uniformly bounded w.r. to λ. Hence in\nsection 8, we construct a non trivial approximate solution ( Ωapp,0), with Ω app/\\e}atio\\slash= 0 satisfying the\nproperty that F(Ωapp,0) satisfies estimates which are uniform w.r. to the large par ameterλ. This\nis enough in order to implement a rapidly convergent Nash-Mo ser scheme in Section 9. A crucial10 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\npoint is actually the gain of size O(λ−δM) in the estimate of L−1, described above. This gain is\nactually used in order to obtain that the difference between tw o consecutive approximate solutions\nconverges to zero super exponentially and it is uniformly bo unded w.r. to λ≫1. We point out\nthat the average of the magnetic field b/\\e}atio\\slash= 0 in (1.4) and the forcing term Fhave to satisfy the\nnon-degeneracy condition (1.7) in order to guarantee that t he solutions (Ω ,J) that we produce are\ndifferent from zero, see Proposition 8.1 and Section 11. Indee d, to show that Ω /\\e}atio\\slash= 0, one provides\na lower bound on Ω app(in Proposition 8.1) and then by a perturbative argument one also shows\nthat Ω satisfies the same lower bound since the difference Ω −Ωappis small. The proof that J/\\e}atio\\slash= 0\nis more delicate and it is done by contraddiction. The key poi nt is to shows that b· ∇Ω is not\nidentically zero. This is true (by the assumption (1.7)) for the approximate solution Ω appand it is\nproved also for Ω by a perturbative argument.\nRemarks and future perspectives. We conclude this introduction with some final remarks\nand future perspectives. By using the techniques developed in this paper (with some techinal\nadaptations), one can also prove the same kind of result for t he inviscid, resistive MHD system,\nnamely there is not the viscous term ∆ uin the first equations of (1.1) whereas, there is the resistiv e\nterm ∆bin the second equations of (1.1). As we described above, the p resence of the dissipation\nin one of the two equations is used in a crucial way in the analy sis of the linearized equation\nand in particular it allows to (approximately) decouple the system in a parabolic equation and a\ntrasnport equation. The decoupling procedure for the non re sistive inviscid case (no ∆ uin the\nfirst equation, no ∆ bin the second equation) seems to be quite difficult and require s new ideas.\nA natural extension of our result would be to analyze the gene ral case of quasi periodic solutions\nwith an arbitrary number of frequencies ω= (ω1,...,ω ν). In this case the solutions one look for\nare not stationary in a moving frame, hence space and time are really independent unlike the case\nof diamond waves where the time derivative becomes a space de rivative. A major issue in the\nextension of our strategy seems to be in the reduction proced ure to the scalar transport equation,\nin which one has to invert the dissipative operator ∂t−∆ on the space of time quasi-periodic\nfunctionsu(ωt,x),u:Tν×T2→R. In this inversion then one loses the “structure of dynamica l\nsystem” and this seems to be a non-trivial technical problem in implementing KAM-Normal forms\nmethods for reducing the linearized equation to constant co efficients. Other future perspectives are\nthe analysis of the three dimensional case and the analysis o f the inviscid case.\nOutline of the paper. The paper is organized as follows. In Section 2 we recall the f unctional\nsetting and some general lemmata which will then be used cons istently throughout the paper. In\nSection 3, we compute the linearized operator Lof the vorticity-current system (1.10) and we state\nsome properties of it that will be used in the sequel. We then i mplement the decoupling procedure\nofL(up to smoothing remainders) in Section 4. Section 5 will be d evoted to the inversion of\nthe first equation of the decoupled linear operator, whereas in Section 6 we invert the transport\noperator Pand in Section 7 we conclude the invertibility of the lineari zed operator L. In Section 8,\nwe construct an approximate solution that will be the starti ng point of the Nash-Moser iteration.\nThe convergence of the Nash-Moser scheme and the measure est imates on the set of non-resonant\nfrequencies will be shown in Section 9 and 10 respectively. F inally, the proof of the main theorems\nis provided in Section 11.\nAcknowledgements. G. Ciampa, R. Montalto and S. Terracina are supported by the E RC\nSTARTING GRANT 2021 “Hamiltonian Dynamics, Normal Forms an d Water Waves” (HamDy-\nWWa), ProjectNumber: 101039762. Viewsandopinionsexpres sedarehoweverthoseoftheauthors\nonly and do not necessarily reflect those of the European Unio n or the European Research Council.\nNeither the European Union nor the granting authority can be held responsible for them.\nThe work of the author Riccardo Montalto is also supported by PRIN 2022 “Turbulent effects vs\nStability in Equations from Oceanography” (TESEO), projec t number: 2022HSSYPN.\nRiccardo Montalto and Shulamit Terracina are also supporte d by INDAM-GNFM and Gennaro\nCiampa is supported by INDAM-GNAMPA.LARGE AMPLITUDE TRAVELING WAVES MHD 11\nThe authors warmly thank Luca Franzoi, Renato Luc` a and Mich ela Procesi for many useful dis-\ncussions and comments.\n2.Functions spaces, norms and linear operators\nIn this section we fix the notation and we state some techincal tools concerning function spaces\nand pseudo-differential operators. We consider\ns0>5 that can be arbitrarily large but fixed for the whole paper (2 .1)\nNotations. In the whole paper, the notation A/lessorsimilars,m,αBmeans that A≤C(s,m,α)Bfor some\nconstantC(s,m,α)>0 depending on the Sobolev index s, the constants α,m. Ifs=s0we simply\nwrite/lessorsimilar,/lessorsimilarm,αinstead of/lessorsimilars0,/lessorsimilars0,m,α. We always omit to write the dependence on τ, which is the\nconstant appearing in the non-resonance conditions (see fo r instance (1.17) in the introduction).\nWe denote by Nthe set of the positive integer numbers N={1,2...}andN0:=N∪{0}. Givenf:\nΩ→C, Ω⊆Rdand a multi-index β= (β1,...,β d)∈Nd\n0, we write∂β\nxf=∂β1x1...∂βdxdf(x1,...,x d).\nWe also define the lenght of a multi-index as |β|=β1+...+βd.\nFor anys≥0 we define the scale of Sobolev spaces\nHs(T2,Kn) :=/braceleftBig\nu(x) =/summationdisplay\nk∈Z2/hatwideu(k)eik·x∈L2(T2,Kn) :/ba∇dblu/ba∇dbls:=/parenleftBig/summationdisplay\nk∈Z2/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2s|/hatwideu(k)|2/parenrightBig1\n2<∞/bracerightBig\n,\nHs\n0(T2,Kn) :=/braceleftBig\nu∈Hs(T2,Kn) :/integraldisplay\nT2u(x)dx= 0/bracerightBig\n.(2.2)\nwhereK=C,R. As a notation, we often write Hs≡Hs(T2)≡Hs(T2,K) andHs\n0≡Hs\n0(T2)≡\nHs\n0(T2,K).\nFors>s0one hasHs(T2)⊂ C0(T2) whereC0(T2) is the set of continuous functions on T2, and\nHs(T2) is an algebra and they have the interpolation structure\n/ba∇dbluv/ba∇dbls≤C(s)/ba∇dblu/ba∇dbls/ba∇dblv/ba∇dbls0+C(s0)/ba∇dblu/ba∇dbls0/ba∇dblv/ba∇dbls, (2.3)\nwhereC(s),C(s0) are positive constants independent from u,v.\nWe also denote by L2\n0(T2,Kn), the space of L2functions from T2toKnwith zero average.\nGiven two Banach spaces X1,X2, we denote by B(X1,X2) the space of bounded, linear operators\nfromX1toX2equipped by the standard operator norm /ba∇dbl · /ba∇dblB(X1,X2). IfX1=X2we write\nB(X1)≡ B(X1,X2).\nDefinition 2.1 (Weighted norms) .LetO⊂R2be a bounded subset of R2and let(X,/ba∇dbl·/ba∇dblX)be a\nBanach space. Given γ∈(0,1)and a Lipschitz function u:O→X, we define\n/ba∇dblu/ba∇dblsup\nX:= sup\nω∈O/ba∇dblu(ω)/ba∇dblX,/ba∇dblu/ba∇dblLip\nX:= sup\nω1,ω2∈O\nω1/\\e}atio\\slash=ω2/ba∇dblu(ω1)−u(ω2)/ba∇dblX\n|ω1−ω2|,\n/ba∇dblu/ba∇dblLip(γ)\nX:=/ba∇dblu/ba∇dblsup\nX+γ/ba∇dblu/ba∇dblLip\nX.\nIfX=Hs(T2), we write /ba∇dbl·/ba∇dblsup\ns,/ba∇dbl·/ba∇dblLip\nsinstead of /ba∇dbl·/ba∇dblsup\nHs,/ba∇dbl·/ba∇dblLip\nHsand\n/ba∇dblu/ba∇dblLip(γ)\ns:=/ba∇dblu/ba∇dblsup\ns+γ/ba∇dblu/ba∇dblLip\ns−1. (2.4)\nIfX=R,C, we write |·|sup,|·|Lip,|·|Lip(γ)instead of /ba∇dbl·/ba∇dblsup\nX,/ba∇dbl·/ba∇dblLip\nX,/ba∇dbl·/ba∇dblLip(γ)\nX.\nFor anyN∈Nwe define the smoothing operators (Fourier truncations)\nΠNu(x) :=/summationdisplay\n|k|≤N/hatwideu(k)eik·x,Π⊥\nN= Id−ΠN. (2.5)\nLemma 2.2 (Smoothing estimates) .The operators ΠN,Π⊥\nNsatisfy the smoothing estimates\n/ba∇dblΠNu/ba∇dblLip(γ)\ns≤Na/ba∇dblu/ba∇dblLip(γ)\ns−a,0≤a≤s, (2.6)\n/ba∇dblΠ⊥\nNu/ba∇dblLip(γ)\ns≤N−a/ba∇dblu/ba∇dblLip(γ)\ns+a,∀a≥0. (2.7)12 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nLemma 2.3. For alls≥s0,u,v∈Hs(T2)\n/ba∇dbluv/ba∇dblLip(γ)\ns≤C(s)/ba∇dblu/ba∇dblLip(γ)\ns/ba∇dblv/ba∇dblLip(γ)\ns0+C(s0)/ba∇dblu/ba∇dblLip(γ)\ns0/ba∇dblv/ba∇dblLip(γ)\ns. (2.8)\nMoreover for s1≤s≤s2one has the following interpolation inequality\n/ba∇dblu/ba∇dblLip(γ)\ns/lessorsimilar(/ba∇dblu/ba∇dblLip(γ)\ns1)λ(/ba∇dblu/ba∇dblLip(γ)\ns2)1−λ, λ=s2−s\ns2−s1,1−λ=s−s1\ns2−s1. (2.9)\nAs a consequence, one has that for any a0,b0≥0,p,q>0\n2.1.Diophantine equations. LetO⊂R2be a bounded domain of R2. Givenγ∈(0,1),τ >0,\nwe define the set of Diophantine vectors DC( γ,τ), where\nDC(γ,τ) :=/braceleftbigg\nω∈O:|ω·k| ≥γ\n|k|τ,∀k∈Z2\\{0}/bracerightbigg\n, (2.10)\nthe equation\nω·∇v=u, (2.11)\nwithusatisfying/integraltext\nT2u(x)dx= 0, has the periodic solution\nv(x) := (ω·∇)−1u(x) =/summationdisplay\nk∈Z2\\{0}/hatwideu(k)\niω·keix·k.\nThe following estimates hold (see [9, Lemma 2.2]).\nLemma 2.4. Lets≥s0andω∈DC(γ,τ). Then, for any u∈Hs+τ(T2)withˆu(0) = 0, the linear\nequation (2.11)has a unique solution v:= (ω·∇)−1u∈Hs\n0(T2)withˆv(0) = 0such that\n/ba∇dbl(ω·∇)−1u/ba∇dbls≤Cγ−1/ba∇dblu/ba∇dbls+τ, (2.12)\nIfu=uω∈Hs+2τ+1\n0(T2)is Lipschitz continuous in ω∈O⊆R2, then the solution v=vω∈Hs\n0(T2)\nis Lipschitz continuous in DC(γ,τ)and satisfies the estimate\n/ba∇dbl(ω·∇)−1u/ba∇dblLip(γ)\ns≤Cγ−1/ba∇dblu/ba∇dblLip(γ)\ns+2τ+1. (2.13)\n2.2.Linear operators.\nDefinition 2.5. LetAbe a linear operator acting on L2(T2). We say that an operator Ais real if\nit maps real valued functions into real valued functions.\nLemma 2.6. GivenA1,A2real linear operators, then A1◦A2andA−1\n1are real operators.\nWe represent a real linear operator Racting on (f,g)∈L2(T2,R2) by a matrix\nR/parenleftbiggf\ng/parenrightbigg\n=/parenleftbigg\nA1A2\nA3A4/parenrightbigg/parenleftbiggf\ng/parenrightbigg\n, (2.14)\nwhereA1,A2,A3,A4are real operators acting on the scalar components f,g∈L2(T2). The action\nof an operator A ∈ B(L2(T2)) on a function u∈L2(T2,R2) can be defined as\nAu(x) =/summationdisplay\nk,k′∈Z2ˆAk′\nkˆu(k′)eix·k. (2.15)\nSo, we can identify an operator Awith the matrix ( ˆAk′\nk)k,k′∈Z2.\nDefinition 2.7. LetAbe an operator as in (2.15). We define DAas the operator\nDA:= diagk∈Z2ˆAk\nk,(DA)k′\nk=/braceleftBiggˆAk′\nkk=k′,\n0otherwise.(2.16)\nIn particular, we say that the operator Ais diagonal if DA=A.LARGE AMPLITUDE TRAVELING WAVES MHD 13\n2.3.Pseudo-differential operators and norms.\nDefinition 2.8 (Pseudo-differential operators and symbols) .Letm∈R,s≥0andα∈N0. We\nsay that a function a:T2×R2→Cbelongs to Sm\ns,αif there exists a constant C(s,α)>0such that\nfor anyβ∈N2,|β| ≤αsatisfies the inequality\n/ba∇dbl∂β\nξa(·,ξ)/ba∇dbls≤C(s,α)/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htm−|β|,∀ξ∈R2. (2.17)\nWe say that a linear operator Abelongs to the class OPSm\ns,αif there isa∈ Sm\ns,αsuch that A= Op(a),\nnamely\nAu(x) :=/summationdisplay\nk∈Z2a(x,k)/hatwideu(k)eix·k, u(x) =/summationdisplay\nk∈Z2/hatwideu(k)eix·k.\nWe set\nSm:=/intersectiondisplay\ns≥0\nα∈NSm\ns,α,OPSm:=/intersectiondisplay\ns≥0\nα∈NOPSm\ns,α,\nwhich are the classes of classical symbols and classical pse udo-differential operators of order m. We\nalso denote by S−∞:=∩m∈RSmthe class of smoothing symbols and OPS−∞:=∩m∈ROPSmthe\nclass of smoothing pseudo-differential operators.\nFor a matrix of pseudo-differential operators\nA=/parenleftbigg\nA1A2\nA3A4/parenrightbigg\n, (2.18)\nwe say that A ∈ OPSm\ns,αifAi∈ OPSm\ns,αandA ∈ OPSmifAi∈ OPSm,i= 1,2,3,4.\nWe will say that Ais a block diagonal matrix operator if A2=A3= 0. On the other hand, we\nwill say that that Ais a block off-diagonal matrix operator if A1=A4= 0. If instead an operator\nis diagonal in the sense of the Definition 2.7, it will be speci fied.\nThe following characterization for real pseudo-differentia l operators holds.\nLemma 2.9 (Lemma 2.10 [8]) .LetA= Op(a(x,ξ))be a pseudo-differential operator. Then Ais\nreal if and only if the symbol a(x,ξ) =a(x,−ξ)for any(x,ξ)∈T2×R2.\nWe now introduce a norm which controls the regularity in x, and the decay in ξ, of the symbol\na(x,ξ)∈ Sm\ns,α, together with its derivatives ∂β\nξa(x,ξ)∈ Sm−|β|\ns,α,|β| ≤αin the Sobolev norm /ba∇dbl·/ba∇dbls.\nDefinition 2.10 (Weighted norms) .Letm∈R,s≥0,α∈N0. IfA= Op(a)∈ OPSm\ns,α, we\ndefine the norm\n|A|m,s,α:= sup\n|β|≤αsup\nξ∈R2/ba∇dbl∂β\nξa(·,ξ)/ba∇dbls/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−m+|β|<∞; (2.19)\nIfA=A(ω)depends in a Lipschitz way on a parameter ω∈O⊂R2, we define\n|A|Lip(γ)\nm,s,α:= sup\n|β|≤αsup\nξ∈R2/ba∇dbl∂β\nξa(·,ξ)/ba∇dblLip(γ)\ns/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−m+|β|. (2.20)\nThe norm of a 2×2matrix of pseudo-differential operators in OPSm\ns,αof the form (2.18)is\n|A|Lip(γ)\nm,s,α:= max{|Ai|Lip(γ)\nm,s,α,i= 1,2,3,4}. (2.21)\nThepseudo-differential norm |·|Lip(γ)\nm,s,αsatisfies thefollowing elementary properties: for any s≤s′,\nα≤α′, andm≤m′,\n|·|Lip(γ)\nm,s,α≤ |·|Lip(γ)\nm,s′,α,|·|Lip(γ)\nm,s,α≤ |·|Lip(γ)\nm,s,α′,|·|Lip(γ)\nm′,s,α≤ |·|Lip(γ)\nm,s,α. (2.22)\nFor a Fourier multiplier Op( g(ξ)) of order m, one has\n|Op(g)|Lip(γ)\nm,s,α=|Op(g)|Lip(γ)\nm,0,α≤C(m,α),∀s≥0, (2.23)\nand for a function a(x;ω),\n|Op(a)|Lip(γ)\n0,s,α=|Op(a)|Lip(γ)\n0,s,0/lessorsimilar/ba∇dbla/ba∇dblLip(γ)\ns. (2.24)14 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nComposition. IfA= Op(a)∈ OPSmandB= Op(b)∈ OPSm′, then the composition\nAB:=A◦Bis a pseudo-differential operator with symbol σAB∈ Sm+m′\nσAB(x,ξ) :=/summationdisplay\nk∈Z2a(x,ξ+k)/hatwideb(k,ξ)eix·k=/summationdisplay\nk,k′∈Z2ˆa(k′−k,ξ+k)/hatwideb(k,ξ)eix·k′,(2.25)\nwhere the symbol ˆ·denotes the Fourier coefficient with respect to x. We will also use the notation\na#btoexpressthesymbolofthecomposition. Moreover, forany N≥0,σABadmitstheasymptotic\nexpansion\nσAB(x,ξ) :=/summationdisplay\n|β|≤N−11\ni|β|β!∂β\nξa(x,ξ)∂β\nxb(x,ξ)+rN(x,ξ), (2.26)\nwith remainder rN∈ Sm+m′−N. The remainder rNhas the explicit formula\nrN(x,ξ) :=1\niN(N−1)!/integraldisplay1\n0(1−τ)N−1/summationdisplay\n|β|=N/summationdisplay\nk∈Z2(∂β\nξa)(x,ξ+τk)/hatwidest∂β\nxb(k,ξ)eix·kdτ.(2.27)\nWe recall the following tame estimate for the composition of two pseudo-differential operators.\nLemma 2.11 (Composition of pseudo-differential operators) .Lets≥s0,m,m′∈R,α∈N0.\n(i) LetA= Op(a)∈ OPSm\ns,α,B= Op(b)∈ OPSm′\ns,α. Then the product σab(x,ξ) :=a(x,ξ)b(x,ξ)\nsatisfies for any s≥s0,α∈N0the estimate\n|Op(σab)|Lip(γ)\nm+m′,s,α/lessorsimilars,α|A|Lip(γ)\nm,s,α|B|Lip(γ)\nm′,s0,α+|A|Lip(γ)\nm,s0,α|B|Lip(γ)\nm′,s,α. (2.28)\n(ii) Lets≥s0,α∈N0,A= Op(a)∈ OPSm\ns,α,B= Op(b)∈ OPSm′\ns+|m|+α,α. Then, the\ncomposition operator ABbelongs to OPSm+m′\ns,αand it satisfies the estimate\n|AB|Lip(γ)\nm+m′,s,α/lessorsimilars,m,α|A|Lip(γ)\nm,s,α|B|Lip(γ)\nm′,s0+|m|+α,α+|A|Lip(γ)\nm,s0,α|B|Lip(γ)\nm′,s+|m|+α,α.(2.29)\nMoreover if A= Op(a)∈ OPSm\ns,N,B= Op(b)∈ OPSm′\ns+2N+|m|,0then the remainder\nRN= Op(rN)∈ OPSm+m′−N\ns,0satisfies the estimates\n|RN|Lip(γ)\nm+m′−N,s,0/lessorsimilars,N|A|Lip(γ)\nm,s,N|B|Lip(γ)\nm′,s0+2N+|m|,0+|A|Lip(γ)\nm,s0,N|B|Lip(γ)\nm′,s+|m|,0(2.30)\n(iii) The estimates (2.28)-(2.30)hold verbatim for matrices of pseudo-diffrential operators A ∈\nOPSm\ns,αandB ∈ OPSm′\ns,α.\n(iv) Lets≥s0,α∈N0,A= Op(a)∈ OPSm\ns+|m|+|m′|+α+1,α+1,B= Op(b)∈ OPSm′\ns+|m|+|m′|+α+1,α+1.\nThen, the commutator [A,B] :=AB−BA ∈ OPSm+m′−1\ns,αand it satisfies the estimate\n|[A,B]|Lip(γ)\nm+m′−1,s,α/lessorsimilars,m,m′,α|A|Lip(γ)\nm,s+|m|+|m′|+α+1,α+1|B|Lip(γ)\nm′,s0+|m|+|m′|+α+1,α+1\n+|A|Lip(γ)\nm,s0+|m|+|m′|+α+1,α+1|B|Lip(γ)\nm′,s+|m|+|m′|+α+1,α+1.(2.31)\nProof.See Lemma 2.13 in [8]. /square\nLemma 2.12 (Exponential map) .Lets≥s0,α∈N0,A= Op(a(x,ξ;ω))∈ OPS0\ns+α,α, then\nΦ = exp( A)satisfies the estimate\n|Φ−Id|Lip(γ)\n0,s,α≤ |A|Lip(γ)\n0,s,αexp(C(s,α)|A|Lip(γ)\n0,s0+α,α). (2.32)\nThe same statement holds even for matrix valued symbol A=/parenleftbigg\nA1A2\nA3A4/parenrightbigg\n∈ OPS0\ns+α,α.\nProof.See Lemma 2.13 in [10]. /squareLARGE AMPLITUDE TRAVELING WAVES MHD 15\nWe also define, for 0 ≤n≤N−1,\na#nb:=/summationdisplay\n|β|=n1\nβ!i|β|(∂β\nξa)(∂β\nxb)∈ Sm+m′−n,\na#0,m′∈R,ℓ,N∈N,α∈N0,ℓ≤N,s≥s0. Then there exists a constant\nσ≡σ(N,m,m′)>0large enough such that if A=/parenleftbigg\nA1A2\nA3A4/parenrightbigg\n∈ OPS−m\ns+σ,α+σ,B=/parenleftbigg\nB1B2\nB3B4/parenrightbigg\n∈\nOPSm′\ns+σ,α+σ, one has that\nAdℓ(A)B=Cℓ,N+Rℓ,N,\nwhere\n|Cℓ,N|Lip(γ)\nm′−ℓm,s,α/lessorsimilars,α,N|A|Lip(γ)\nm,s+σ,α+σ/parenleftBig\n|A|Lip(γ)\nm,s0+σ,α+σ/parenrightBigℓ−1\n|B|Lip(γ)\nm′,s0+σ,α+σ\n+/parenleftBig\n|A|Lip(γ)\nm,s0+σ,α+σ/parenrightBigℓ\n|B|Lip(γ)\nm′,s+σ,α+σ,\nand\n|Rℓ,N|Lip(γ)\nm′−mN,s,0/lessorsimilars,N|A|Lip(γ)\nm,s+σ,σ/parenleftBig\n|A|Lip(γ)\nm,s0+σ,σ/parenrightBigℓ−1\n|B|Lip(γ)\nm′,s0+σ,σ\n+/parenleftBig\n|A|Lip(γ)\nm,s0+σ,σ/parenrightBigℓ\n|B|Lip(γ)\nm′,s+σ,σ.\nIn particular AdN(A)Bsatisfies the estimate\n|AdN(A)B|Lip(γ)\nm′−mN,s,0/lessorsimilarm,m′,s,N|A|Lip(γ)\nm,s+σ,σ/parenleftBig\n|A|Lip(γ)\nm,s0+σ,σ/parenrightBigN−1\n|B|Lip(γ)\nm′,s0+σ,σ\n+/parenleftBig\n|A|Lip(γ)\nm,s0+σ,σ/parenrightBigN\n|B|Lip(γ)\nm′,s+σ,σ.(2.37)\nLemma 2.16 (Conjugation by an exponential map) .Letm>0,m′∈R,ℓ,N∈N,α∈N0,s≥s0.\nThen there exists a constant σ≡σ(N,m,m′)>0large enough such that if A=/parenleftbigg\nA1A2\nA3A4/parenrightbigg\n∈\nOPS−m\ns+σ,α+σ,B=/parenleftbigg\nB1B2\nB3B4/parenrightbigg\n∈ OPSm′\ns+σ,α+σ. If|A|Lip(γ)\n−m,s0+σ,α+σ≤Cfor some constant C >0,\nthen one has the following expansion\ne−ABeA=B+CN+RN,\nwhere for any s≥s0, α∈N0,\n|CN|Lip(γ)\nm′−m,s,α/lessorsimilars,α,N|A|Lip(γ)\n−m,s+σ,α+σ|B|Lip(γ)\nm′,s0+σ,α+σ+|A|Lip(γ)\n−m,s0+σ,α+σ|B|Lip(γ)\nm′,s+σ,α+σ,\nand\n|RN|Lip(γ)\nm′−Nm,s,0/lessorsimilars,α,N|A|Lip(γ)\n−m,s+σ,σ|B|Lip(γ)\nm′,s0+σ,σ+|A|Lip(γ)\n−m,s0+σ,σ|B|Lip(γ)\nm′,s+σ,σ.\nProof.By the Lie expansion, one has that\ne−ABeA=B+N−1/summationdisplay\nℓ=1Adℓ(A)B\nℓ!+QN,\nQN:=1\n(N−1)!/integraldisplay1\n0(1−τ)N−1e−τA◦AdN(A)B ◦eτAdτ.(2.38)\nThen by applying Lemma 2.15 in order to expand any termAdℓ(A)B\nℓ!, we then obtain there exists\nσ≡σ(N,m,m′)≫0 large enough such that if |A|Lip(γ)\nm,s0+σ,α+σ/lessorsimilar1, then\nAdℓ(A)B\nℓ!=Cℓ,N+Rℓ,N,\n|Cℓ,N|Lip(γ)\nm′−ℓm,s,α/lessorsimilars,α,N|A|Lip(γ)\nm,s+σ,α+σ|B|Lip(γ)\nm′,s0+σ,α+σ+|A|Lip(γ)\nm,s0+σ,α+σ|B|Lip(γ)\nm′,s+σ,α+σ,\n|Rℓ,N|Lip(γ)\nm′−mN,s,0/lessorsimilars,α,N|A|Lip(γ)\n−m,s+σ,σ|B|Lip(γ)\nm′,s0+σ,σ+|A|Lip(γ)\n−m,s0+σ,σ|B|Lip(γ)\nm′,s+σ,σ.\nMoreover by the estimate (2.12) (applied for α= 0), the estimate (2.37) and by the composition\nestimate (2.29) (still applied for α= 0), one obtains the bound for QNin (2.38)\n|QN|Lip(γ)\nm′−mN,s,0/lessorsimilars,α,N|A|Lip(γ)\n−m,s+σ,σ|B|Lip(γ)\nm′,s0+σ,σ+|A|Lip(γ)\n−m,s0+σ,σ|B|Lip(γ)\nm′,s+σ,σ.LARGE AMPLITUDE TRAVELING WAVES MHD 17\nThe claimed statement then follows by defining\nCN:=N−1/summationdisplay\nℓ=1Cℓ,N,RN:=QN+N−1/summationdisplay\nℓ=1Rℓ,N.\n/square\nGiven an operator A= Op(a(x,ξ))∈ OPSm\ns,α, we define the averaged symbol /a\\}b∇acketle{ta/a\\}b∇acket∇i}htx(ξ) as\n/a\\}b∇acketle{ta/a\\}b∇acket∇i}htx(ξ) :=1\n(2π)d/integraldisplay\nTda(x,ξ)dx. (2.39)\nThe following elementary lemma holds.\nLemma 2.17. LetA= Op(a(x,ξ))∈ OPSm\ns,α,s≥s0,α∈N0. Then\n|Op(/a\\}b∇acketle{ta/a\\}b∇acket∇i}htx)|Lip(γ)\nm,s,α/lessorsimilar|A|Lip(γ)\nm,s0,α.\nMoreover, if Ais real, then one has that /a\\}b∇acketle{ta/a\\}b∇acket∇i}htx(ξ) =/a\\}b∇acketle{ta/a\\}b∇acket∇i}htx(−ξ).\nFollowing the argument used in Lemma 2 .21 of [8] one can prove the following result.\nLemma 2.18 (Action of a pseudo-differential operator ).LetN >0,A= Op(a)∈ S−N\ns,0,\ns≥s0. Then\n/ba∇dblAh/ba∇dblLip(γ)\ns+N/lessorsimilars,m|A|Lip(γ)\n−N,s0,0/ba∇dblh/ba∇dblLip(γ)\ns+|A|Lip(γ)\n−N,s,0/ba∇dblh/ba∇dblLip(γ)\ns0.\nWe now collect some properties of composition operators. We consider a diffeomorphism of the\n2-dimensional torus defined by\ny=x+α(x)⇐⇒x=y+ˇα(y), (2.40)\nwhereαis a small real valued smooth vector function, and the induce d operators\n(Au)(x) :=u(x+α(x)),(A−1u)(y) :=u(y+ˇα(y)). (2.41)\nLemma 2.19. Lets≥s0,α(·;ω)∈Hs,ω∈O⊂R2,/ba∇dblα/ba∇dblLip(γ)\ns0≤δ(s0)small enough. Then, the\ncomposition operator Asatisfies the following tame estimates\n/ba∇dblAu/ba∇dblLip(γ)\ns/lessorsimilars/ba∇dblu/ba∇dblLip(γ)\ns+/ba∇dblα/ba∇dblLip(γ)\ns/ba∇dblu/ba∇dblLip(γ)\ns0, (2.42)\nand the function ˇαdefined by the inverse diffeomorphism satisfies\n/ba∇dblˇα/ba∇dblLip(γ)\ns/lessorsimilars/ba∇dblα/ba∇dblLip(γ)\ns, (2.43)\nand as a consequence\n/ba∇dblA−1u/ba∇dblLip(γ)\ns/lessorsimilars/ba∇dblu/ba∇dblLip(γ)\ns+/ba∇dblα/ba∇dblLip(γ)\ns/ba∇dblu/ba∇dblLip(γ)\ns0. (2.44)\nProof.It follows by the same argument of Lemma 2.30 in [8]. /square\nSince the linearized operator has invariance properties on the space of zero average function we\nintroduce the projections Π 0and Π⊥\n0as follows\nΠ0h:=1\n(2π)2/integraldisplay\nT2h(x)dx,Π⊥\n0:= Id−Π0. (2.45)\nNote that given an even cut-off function η0such that\nη0∈ C∞(R2,R), η0is even,\nη0(ξ) = 1,∀|ξ| ≤1\n2, η0(ξ) = 0∀|ξ| ≥2\n3,(2.46)\none has that\nΠ0= Op(η0(ξ))∈ OPS−∞,\n|Π0|−m,s,α/lessorsimilarm,s,α1,∀m,s≥0, α∈N0,\n|Π⊥\n0|0,s,α/lessorsimilars,α1,∀s≥0, α∈N0.(2.47)\nFinally, one has that Π 0is real since η0is even inξand therefore |Π⊥\n0is so. We state the following\nlemma, see Lemma 4.2 in [27]18 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nLemma 2.20. LetAbe the map in (2.41)and let us define A⊥:= Π⊥\n0AΠ⊥\n0. Then under the same\nassumptions of Lemma 2.19, one has that A⊥:Hs\n0→Hs\n0is invertible and A−1\n⊥= Π⊥\n0A−1Π⊥\n0:\nHs\n0→Hs\n0and ifu(·;ω)∈Hs\n0, then\n/ba∇dblA±1\n⊥u/ba∇dblLip(γ)\ns/lessorsimilars/ba∇dblu/ba∇dblLip(γ)\ns+/ba∇dblα/ba∇dblLip(γ)\ns/ba∇dblu/ba∇dblLip(γ)\ns0.\nWe also prove the following lemma that we shall use in the sequ el.\nLemma 2.21. LetN >0,m∈R,s≥s0. Then there is σ≫0large enough such that if A=\nOp(a)∈ OPSm\ns+σ,0then the operator A⊥:= Π⊥\n0AΠ⊥\n0(recall(2.45)-(2.47)) satisfies A⊥=A+R⊥\nwhereR⊥satisfies the estimate |R⊥|Lip(γ)\n−N,s,0/lessorsimilarN,s|A|Lip(γ)\nm,s+σ,0. Finally, if Ais real, then the operators\nA⊥andR⊥are real.\nProof.One has\nA⊥=A+R⊥,R⊥:=−Π0AΠ⊥\n0−AΠ0,\nhencetheclaimedboundon R⊥followsby (2.47)andthecompositionestimate(2.29). Theo perator\nA⊥is real by composition with Π⊥\n0andR⊥by difference. /square\nWe now mention some elementary properties of the Laplacian o perator−∆ and of its inverse\n(−∆)−1acting on functions with zero average in x:\n−∆u(x) =/summationdisplay\nk/\\e}atio\\slash=0|k|2/hatwideu(k)eix·k,(−∆)−1u(x) =/summationdisplay\nk/\\e}atio\\slash=01\n|k|2/hatwideu(k)eix·k. (2.48)\nBy the properties of the cut off function η0we can identify ( −∆)−1with Op/parenleftBig1−η0(ξ)\n|ξ|2/parenrightBig\nsince the\naction of these two operators on functions with zero average is the same. By recalling Definition\n2.10 one easily checks that\n|−∆|2,s,α/lessorsimilarα1,|(−∆)−1|−2,s,α/lessorsimilarα1. (2.49)\nIn what follows, we denote by U:Hs(T2)→Hs+1(T2) the Biot-Savart operator, which is defined\non zero average functions as follows\nUf(x) :=∇⊥(−∆)−1f(x) =/parenleftbigg\n∂x2(−∆)−1f\n−∂x1(−∆)−1f/parenrightbigg\n. (2.50)\nOne asily verifies that U ∈ OPS−1and satisfies\n|U|−1,s,α/lessorsimilarα1,∀s≥0, α∈N0. (2.51)\nFinally, given f∈ C∞(T2) we define the operator R(f) acting on h∈Hs(T2) as follows\nR(f)h= [∇⊥(−∆)−1h·∇]f=Uh·∇f, (2.52)\nwhich is a pseudo-differential operator of order −1 satisfying\n|R(f)|−1,s,α/lessorsimilarα/ba∇dblf/ba∇dbls+1,∀s≥0, α∈N0. (2.53)\n2.4.A quantitative Egorov Theorem. We also prove a quantitative version of the Egorov\ntheorem. The proof follows word by word the arguments in [4] ( See also Theorem 3 .4 of [25] for\nthe main idea). All the following sums over k1,k2,k3∈N0such thatk1+k2+k3=sare actually\nsums overk1,k2,k3∈N0such thatk1+k2+k3=s,k1+k2≥1.\nTheorem 2.22. (Egorov Theorem). Fixm∈R,M >max{0,−m}. There exists σ:=\nσ(m,M)≫0large enough such that for any S≥s0+σand for any α≥0there exists\nε=ε(S,m,M)≪1small enough such that, if (recall the definition of Ain(2.41))\n/ba∇dblα/ba∇dblLip(γ)\ns0+σ≤ε, (2.54)\nthen given a symbol w(x,ξ)∈ Sm\nS,α+σ, Lipschitz in the variable ω∈O,then the following hold.\nA−1Op(w(x,ξ))A= Op/parenleftBig\nq(x,ξ)/parenrightBig\n+R (2.55)LARGE AMPLITUDE TRAVELING WAVES MHD 19\nwhere, for any s∈[s0,S−σ]and for any α≥0,q∈ Sm\ns,αand satisfies the estimates\n|Op(q)|Lip(γ)\nm,s,α/lessorsimilarm,M,s,α|Op(w)|Lip(γ)\nm,s,α+σ+/summationdisplay\nk1+k2+k3=s|Op(w)|Lip(γ)\nm,k1,α+k2+σ/ba∇dblα/ba∇dblLip(γ)\nk3+σ,(2.56)\n|∆12Op(q)|m,s,α/lessorsimilarm,M,s,α|Op(w)|m,s+1,α+σ/ba∇dbl∆12α/ba∇dbls+1+|∆12Op(w)|m,s,α+σ\n+/summationdisplay\nk1+k2+k3=s+1|Op(w)|m,k1,α+k2+σ/ba∇dblα/ba∇dblk3+σ1/ba∇dbl∆12α/ba∇dbls0+1\n+/summationdisplay\nk1+k2+k3=s|∆12Op(w)|m,k1,α+k2+σ/ba∇dblα/ba∇dblk3+σ.(2.57)\nFurthermore the remainder R ∈ B(Hs,Hs+M), for anys∈[s0,S−σ], satisfies the estimate\n/ba∇dblRh/ba∇dblLip(γ)\ns+M/lessorsimilarm,s,MM(s)/ba∇dblh/ba∇dblLip(γ)\ns0+M(s0)/ba∇dblh/ba∇dblLip(γ)\ns (2.58)\nwhere\nM(s) :=/summationdisplay\nk1+k2+k3=s|Op(w)|Lip(γ)\nm,k1,k2+σ/ba∇dblα/ba∇dblLip(γ)\nk3+σ\nFinally, if Op(w(x,ξ))is a real operator, then Op(q(x,ξ))andRare a real operators.\nIn the proof we use the following lemma proved in the Appendix of [25, Lemma A.7]. Given a\nsquare matrix A, we denote by ATthe transpose matrix and if Ais invertible we denote by A−T\nthe inverse of the transpose matrix.\nLemma 2.23. There exists σ≫0such that for any S≥s0+σ, ifα∈CS(T2,R2)is a real\nfunction satisfying /ba∇dblα/ba∇dblLip(γ)\ns0+σ<1then, for any symbol w∈ Sm\nS,α,\nAw:=w/parenleftBig\nx+α(x),(Id+∇xα(x))−Tξ/parenrightBig\n(2.59)\nis a symbol in Sm\nS,αsatisfying, for any s∈[s0,S−σ]and for any α≥0,\n|Op(Aw)|Lip(γ)\nm,s,α≤ |Op(w)|Lip(γ)\nm,s,α+C/summationdisplay\nk1+k2+k3=s|Op(w)|Lip(γ)\nm,k1,α+k2/ba∇dblα/ba∇dblLip(γ)\nk3+σ,(2.60)\nfor someC=C(s,α)>0. Fors=s0we have the rougher estimate |Op(Aw)|Lip(γ)\nm,s0,α/lessorsimilar|Op(w)|Lip(γ)\nm,s0,α+s0.\nProof of Thm. 2.22. Let us consider for τ∈[0,1] the composition operators\nAτh(x) :=h(x+τα(x)),(Aτ)−1h(y) :=h(y+˘α(τ;y)), (2.61)\nFor anyτ∈[0,1], the conjugated operator\nPτ:=Aτ◦Op(w)◦(Aτ)−1\nsolves the Heisenberg equation\n∂τPτ= [Xτ,Pτ], P0= Op(w), (2.62)\nwhere1\nXτ:=b(τ;x)·∇x= Op(χ), χ:=χ(τ;x,ξ) :=χ(τ;x,ξ) :=ib(τ;x)·ξ,(2.64)\nand\nb(τ;x) = (I+τ∇xα)−1α. (2.65)\nNotice that\n|Op(χ)|Lip(γ)\n1,s,α/lessorsimilars/ba∇dblb/ba∇dblLip(γ)\ns/lessorsimilars/ba∇dblα/ba∇dblLip(γ)\ns+1,∀p≥0. (2.66)\n1By using the definition of Aτin (2.61) and (2.64)-(2.65) one can easily check that\n∂τAτ=XτAτ,A0= Id. (2.63)20 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nFor simplicity we omit the dependence of the symbols on the va riablesω∈O⊂R2. We look for\nan approximate solution of (2.62) of the form2\nQτ:= Op(q(τ;x,ξ)), q=q(τ;x,ξ) =m+M−1/summationdisplay\nk=0qm−k(τ;x,ξ), (2.67)\nwhereqm−kare symbols in Sm−kto be determined iteratively so that\n∂τQτ= [Xτ,Qτ]+Mτ, Q0= Op(w), (2.68)\nwhereMτ= Op(r−M(τ;x,ξ)) with symbol r−M∈ S−M. Passing to the symbols we obtain (recall\n(2.25), (2.67) and (2.34))\n/braceleftBigg\n∂τq(τ;x,ξ) =χ(τ;x,ξ)⋆q(τ;x,ξ)+r−M(τ;x,ξ)\nq(0;x,ξ) =w(x,ξ).(2.69)\nwhere the unknowns are now q(τ;x,ξ),r−M(τ;x,ξ).\nWe expand χ(τ;x,ξ)⋆q(τ;x,ξ) into a sum of symbols with decreasing orders. Using that χis\nlinear inξ∈R2(see (2.64)), (2.26), (2.27), and by the expansion (2.67) (t ogether with the ansatz\nthatqm−k∈Sm−k) we note that\nχ⋆q=χ#q−q#χ=χq+1\ni∇ξχ·∇xq−q#χ\n(2.67)=χq+m+M−1/summationdisplay\nk=01\ni∇ξχ·∇xqm−k−/parenleftBigm+M−1/summationdisplay\nk=0qm−k(τ;x,ξ)/parenrightBig\n#χ\n(2.33)=m+M−1/summationdisplay\nk=01\ni{χ,qm−k}−m+M−1/summationdisplay\nk=0m−k+M/summationdisplay\nn=2qm−k#nχ−m+M−1/summationdisplay\nk=0qm−k#≥m−k+M+1χ.\nBy rearranging the sums we can write\nχ⋆q=−i{χ,qm}/bracehtipupleft/bracehtipdownright/bracehtipdownleft/bracehtipupright\nordm−ordersfrom −M+1 tom−1/bracehtipdownleft /bracehtipupright/bracehtipupleft /bracehtipdownright\nm+M−1/summationdisplay\nk=1/parenleftbig\n−i{χ,qm−k}+rm−k/parenrightbig\n/bracehtipupleft/bracehtipdownright/bracehtipdownleft/bracehtipupright\nordm−k−r−M/bracehtipupleft/bracehtipdownright/bracehtipdownleft/bracehtipupright\nord−M(2.70)\nwhere we defined, denoting w=w(k,h) :=k−h+1,\nrm−k:=−k−1/summationdisplay\nh=0qm−h#wχ(2.33)\n∈ S(m−h)+1−(k−h+1)\ns,α ≡ Sm−k\ns,α, (2.71)\nr−M:=m+M−1/summationdisplay\nk=0qm−k#≥M+m−k+1χ(2.33)\n∈ Sm−k+1−(m−k+1+M)\ns,α ≡ S−M\ns,α. (2.72)\nWe have reduced the problem to finding symbols qm−k∈ Sm−k\ns,α, 0≤k≤m+M−1, which solve\nfork= 0 (recall the form of χin (2.64))\n/braceleftBigg\n∂τqm(τ;x,ξ) ={b(τ;x)ξ,qm(τ;x,ξ)}\nqm(0;x,ξ) =w(x,ξ),(2.73)\nwhile for 1 ≤k≤m+M−1/braceleftBigg\n∂τqm−k(τ;x,ξ) ={b(τ;x)ξ,qm−k(τ;x,ξ)}+rm−k(τ;x,ξ)\nqm−k(0;x,ξ) = 0.(2.74)\nWe note that the symbols rm−kin (2.71) with 1 ≤k≤m+M−1 depend only on qm−hwith\n0≤h0,\n/ba∇dbl[L(I),Π⊥\nN][/hatwideI]/ba∇dblLip(γ)\ns0/lessorsimilarsλδN1−a/parenleftBig\n/ba∇dbl/hatwideI/ba∇dblLip(γ)\ns0+a+/ba∇dblI/ba∇dblLip(γ)\ns0+a/ba∇dbl/hatwideI/ba∇dblLip(γ)\ns0+1/parenrightBig\n,\nand\n/ba∇dbl[L(I),ΠN][/hatwideI]/ba∇dblLip(γ)\ns0+a/lessorsimilarsλδN/parenleftBig\n/ba∇dbl/hatwideI/ba∇dblLip(γ)\ns0+a+/ba∇dblI/ba∇dblLip(γ)\ns0+a+1/ba∇dbl/hatwideI/ba∇dblLip(γ)\ns0+1/parenrightBig\n.\n(iii)Lets≥s0,I(ω),/hatwideI(ω)∈Hs+1\n0×Hs+1\n0and let us define\nQ(/hatwideI,/hatwideI) :=F(I+/hatwideI)−F(I)−L(I)[/hatwideI].\nThen, one has\n/ba∇dblQ(/hatwideI,/hatwideI)/ba∇dblLip(γ)\ns/lessorsimilarsλδ/ba∇dbl/hatwideI/ba∇dblLip(γ)\ns+1/ba∇dbl/hatwideI/ba∇dblLip(γ)\ns0+1.\nProof.The fact that if Ihas zero average, then F(I) has zero average follows by explicit intgration\nby parts, using that Ω ,J,U,Bhave zero average and U=UΩ,B=UJare zero divergence vector\nfields. All the claimed bounds follow by explicit calculatio ns, by applying interpolation estimates\n(2.8), the smoothing estimates of Lemma 2.2, The estimates o f Lemma 3.1 and using the trivial\nfact that Π Nand Π⊥\nNcommute with the diagonal operator/parenleftbigg\nλω·∇−∆ 0\n0λω·∇/parenrightbigg\n./square\n4.Decoupling of linearized operator up to a smoothing remaind er\nTheaimofthissectionistodecoupletheequationsfortheve locity andthemagneticfield. Wewill\nimplement an iterative procedure whose goal is to remove the operators in the off-diagonal entries\nofLup to an arbitrary regularizing term of order −N, for someN∈Nfixed. The trickiest part\ncomes from the decoupling of the order 1 which we present in Su bsection 4.1. Then, we illustrate\nthe iterative procedure in Subsection 4.2. We use the notati onFto denote block diagonal matrix\noperators, while we denote with Qblock off-diagonal matrix operators. Lastly, we denote with R\nthe remainders term.LARGE AMPLITUDE TRAVELING WAVES MHD 27\n4.1.Decoupling of the first order part. We look for a transformation which removes the\ntransport term d(x)·∇from the off-diagonal entries of Lup to a remainder of order1\n2. The main\ntechnical obstruction comes from the fact that d(x) =O(λδ),λ≫1 large enough.\nThen, we consider a transformation Ψ ⊥of the form\nΨ⊥:= Π⊥\n0ΨΠ⊥\n0,Ψ :=/parenleftbigg\n0 Ψ1\nΨ20/parenrightbigg\n, (4.1)\nwhere Ψ 1= Op(ψ1(x,ξ)),Ψ2= Op(ψ2(x,ξ)) whereψ1,ψ2∈ S−1\n2have to be determined in order\nto cancel the highest order off diagonal term/parenleftbigg\n0d(x)·∇\nd(x)·∇0/parenrightbigg\n. We split Las\nL=D+F1+Q1+R0,\nD:=/parenleftbigg\nλω·∇−∆ 0\n0λω·∇/parenrightbigg\n,\nF1:=/parenleftbigg\na·∇0\n0a·∇/parenrightbigg\n,\nQ1:=/parenleftbigg\n0d·∇\nd·∇0/parenrightbigg\n,\nR0:=/parenleftbigg\nR1R2\nR3R4/parenrightbigg\n.(4.2)\nNote that Dis a diagonal operator in the sense of Definition 2.7. We compu teL(0):=e−Ψ⊥LeΨ⊥:\nwe apply the Lie expansion and we get that\ne−Ψ⊥DeΨ⊥=D+[D,Ψ⊥]+1\n2[[D,Ψ⊥],Ψ⊥]+R(0)\n1,\ne−Ψ⊥(F1+Q1)eΨ⊥=F1+Q1+[F1,Ψ⊥]+[Q1,Ψ⊥]+R(1)\n2,\nR(0)\n1:=1\n2/integraldisplay1\n0(1−τ)2e−τΨ⊥[[[D,Ψ⊥],Ψ⊥],Ψ⊥]eτΨ⊥dτ,\nR(0)\n2:=1\n2/integraldisplay1\n0(1−τ)2e−τΨ⊥[[F1+Q1,Ψ⊥],Ψ⊥]eτΨ⊥dτ.(4.3)\nThus we have that\nL(0)=D+F1+[D,Ψ⊥]+Q1+1\n2[[D,Ψ⊥],Ψ⊥]+[F1,Ψ⊥]+[Q1,Ψ⊥]\n+R(0)\n1+R(0)\n2+e−Ψ⊥R0eΨ⊥.(4.4)\nWe shall construct Ψ in such a way that\n[D,Ψ⊥]+Q1= an operator of order1\n2.\nMoreover, by exploiting the explicit formulas for ψ1andψ2, we will show that there is a regular-\nization effect for which1\n2[[D,Ψ⊥],Ψ⊥],[Q1,Ψ⊥] are operators of order zero.\n4.1.1.Construction of Ψ.We define an even cut-off function χ∈C∞(R2) such that\n0≤χ≤1, χ(ξ) = 1,∀|ξ| ≥1,\nχ(ξ) = 0,∀|ξ| ≤1\n2,\nand defineχλas\nχλ(ξ) :=χ/parenleftBigξ\nλ6δ/parenrightBig\n. (4.5)\nWe need the following lemmas.28 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nLemma 4.1. Letm∈R,f∈ Smand let us consider the symbol fλ(x,ξ) :=/parenleftbig\n1−χλ(ξ)/parenrightbig\nf(x,ξ).\nThen one has that for any N∈N,fλ∈ S−Nand for any s≥0,α∈N0,\n|Op(fλ)|Lip(γ)\n−N,s,α/lessorsimilars,N,αλ6δ(m+N)|Op(f)|Lip(γ)\nm,s,α.\nProof.By the properties of the cut-off function χλone has that for any K∈N,β∈N2\n|/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htK∂β\nξ(1−χλ(ξ))|/lessorsimilarK,βλ6δ(K−|β|). (4.6)\nHence for any β∈N2,s≥s0, for anyξ∈R2, one has that\n/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htN+|β|/ba∇dbl∂β\nξfλ(·,ξ)/ba∇dbls/lessorsimilars,β/summationdisplay\nβ1+β2=β/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htN+|β||∂β1\nξ(1−χλ)(ξ)|/ba∇dbl∂β2\nξf(·,ξ)/ba∇dbls\n/lessorsimilars,β/summationdisplay\nβ1+β2=β/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htN+|β||∂β1\nξ(1−χλ)(ξ)|/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htm−|β2||Op(f)|m,s,|β2|\n/lessorsimilars,β|Op(f)|m,s,|β|/summationdisplay\nβ1+β2=β/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htN+|β1|+|β2|+m−|β2||∂β1\nξ(1−χλ(ξ))|\n/lessorsimilars,βλ6δ(m+N)|Op(f)|m,s,|β|,\nwhere in the last line we used the property (4.6) and that for β1/\\e}atio\\slash= 0 and the function ∂β1\nξ(1−\nχλ(ξ))/\\e}atio\\slash= 0 as long asλ6δ\n2≤ |ξ| ≤λ6δ. The Lipschitz estimate can be proved similarly. /square\nIn the next lemma we establish some properties of the solutio ns of the homological equations\nthat one has to solve in the reduction procedure of this secti on and the one of section 4.2.\nLemma 4.2. (i). Letω∈DC(γ,τ)anda1,a2∈ Sm. Then there exist ψ1,ψ2∈ Sm−3\n2such that\n/braceleftBigg/parenleftbig\nλω·∇+|ξ|2/parenrightbig\nψ1(x,ξ)+χλ(ξ)a1(x,ξ) = 0,/parenleftbig\nλω·∇−|ξ|2/parenrightbig\nψ2(x,ξ)+χλ(ξ)a2(x,ξ) = 0.(4.7)\nMoreover, for any s≥s0,α∈N0,i= 1,2, one gets that |Op(ψi)|Lip(γ)\nm−3\n2,s,α/lessorsimilars,αλ−3δ|Op(ai)|Lip(γ)\nm,s+τ+1,α.\nFinally, if Op(a1(x,ξ)),Op(a2(x,ξ))are real operators then Op(ψ1(x,ξ)),Op(ψ2(x,ξ))are real op-\nerators.\n(ii)Letω∈DC(γ,τ)and let us assume that a1(x,ξ) =a2(x,ξ) =id(x)·ξwhere the function\ndis defined in (3.7). Then, the two corresponding solutions ψ1,ψ2of(4.7)satisfy the following\nproperty:ψ1−ψ2∈ S−1and\n|Op(ψ1−ψ2)|Lip(γ)\n−1,s,α/lessorsimilars,αλδγ−1/parenleftbig\n1+/ba∇dblI/ba∇dblLip(γ)\ns+2τ+3/parenrightbig\n,∀s≥s0, α∈N0. (4.8)\nProof.Proof of (i).We prove the lemma for ψ1. The corresponding properties of ψ2can be\nproved in a similar way. To shorten notations we write ψ≡ψ1anda≡a1. We expand a(x,ξ) and\nψ(x,ξ) in Fourier series\na(x,ξ) =/summationdisplay\nk∈Z2/hatwidea(k,ξ)eix·k, ψ(x,ξ) =/summationdisplay\nk∈Z2/hatwideψ(k,ξ)eix·k.\nThen we need to determine /hatwideψ(k,ξ),k∈Z2,ξ∈R2in such a way that\n/parenleftBig\niλω·k+|ξ|2/parenrightBig\n/hatwideψ(k,ξ)+χλ(ξ)/hatwidea(k,ξ) = 0,\nand therefore we define\n/hatwideψ(k,ξ) =−χλ(ξ)/hatwidea(k,ξ)\niλω·k+|ξ|2,(k,ξ)∈Z2×R2. (4.9)\nNote that by the definition of the cut-off function χλ, one has that\nχλ(ξ)/\\e}atio\\slash= 0 =⇒ |ξ| ≥1\n2λ6δ,\n∂β\nξχλ(ξ)/\\e}atio\\slash= 0 =⇒ |ξ| ∼λ6δ, β∈N2,(4.10)LARGE AMPLITUDE TRAVELING WAVES MHD 29\nand\n|∂β\nξχλ(ξ)|/lessorsimilarλ−6δ|β|/lessorsimilarβ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−|β|,∀β∈N2,∀ξ∈R2. (4.11)\nA direct computation shows that (use that χand all its derivatives vanish near the origin) for any\nk∈Z2,λ6δ/lessorsimilar|ξ|, one has that\n/vextendsingle/vextendsingle/vextendsingle∂β\nξ/parenleftBig1\niλω·k+|ξ|2/parenrightBig/vextendsingle/vextendsingle/vextendsingle/lessorsimilarβ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−2−|β|/lessorsimilarβλ−3δ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β|,∀β∈N2. (4.12)\nHence, the estimates (4.11), (4.12) imply that\n/vextendsingle/vextendsingle/vextendsingle∂β\nξ/parenleftBigχλ(ξ)/hatwidea(k,ξ)\niλω·k+|ξ|2/parenrightBig/vextendsingle/vextendsingle/vextendsingle/lessorsimilarβλ−3δ/summationdisplay\nβ1+β2=β/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β1||∂β2\nξ/hatwidea(k,ξ)|,\nwhich implies that\n/ba∇dbl∂β\nξψ(·,ξ)/ba∇dbls/lessorsimilarβλ−3δ/summationdisplay\nβ1+β2=β/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β1|/ba∇dbl∂β2\nξa(·,ξ)/ba∇dbls\n/lessorsimilarβλ−3δ|Op(a)|m,s,|β|/summationdisplay\nβ1+β2=β/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β1|/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htm−|β2|\n/lessorsimilarβλ−3δ|Op(a)|m,s,|β|/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htm−3\n2−|β|.\nThe latter chain of inequalities then implies the bound\n|Op(ψ)|m−3\n2,s,α/lessorsimilarαλ−3δ|Op(a)|m,s,α,∀s≥s0, α∈N0. (4.13)\nNow we compute the Lipschitz norm w.r.t. the variable ω. Letω1,ω2∈DC(γ,τ), we have that\nψ(x,ξ;ω1)−ψ(x,ξ;ω2) =/summationdisplay\nk∈Z2χλ(ξ)/bracketleftbigg/hatwidea(k,ξ;ω2)\niλω2·k+|ξ|2−/hatwidea(k,ξ;ω1)\niλω1·k+|ξ|2/bracketrightbigg\neix·k\n= Φ1(x,ξ)+Φ2(x,ξ),\nΦ1(x,ξ) :=/summationdisplay\nk∈Z2χλ(ξ)\niλω2·k+|ξ|2/parenleftBig\n/hatwidea(k,ξ;ω2)−/hatwidea(k,ξ;ω1)/parenrightBig\neix·k,\nΦ2(x,ξ) :=/summationdisplay\nk∈Z2Γ(k,ξ)/hatwidea(k,ξ;ω1)eix·k,\nΓ(k,ξ) :=χλ(ξ)/bracketleftbiggiλ(ω1−ω2)·k\n(iλω2·k+|ξ|2)(iλω1·k+|ξ|2)/bracketrightbigg\n.(4.14)\nArguing as in (4.13), one gets that for any s≥s0,α∈N0,\nγ|Op(Φ1)|m−3\n2,s,α/lessorsimilars,αλ−3δγ|Op(a)|Lip\nm−3\n2,s,α|ω1−ω2|/lessorsimilars,βλ−3δ|Op(a)|Lip(γ)\nm−3\n2,s,α|ω1−ω2|.(4.15)\nWe then estimate Φ 2. Arguing by induction, one can show that since ω1∈DC(γ,τ), one gets that\nforλ6δ/lessorsimilar|ξ|\n/vextendsingle/vextendsingle/vextendsingle∂β\nξ/parenleftBig1\niλω1·k+|ξ|2/parenrightBig/vextendsingle/vextendsingle/vextendsingle/lessorsimilarβ|k|τ\nλγ|ξ||β|∀β∈N2. (4.16)\nTherefore, the estimates (4.11), (4.12), (4.16) imply that for anyξ∈R2,β∈N2,ω1,ω2∈DC(γ,τ),\n|∂β\nξΓ(k,ξ)|/lessorsimilarβλ|k||ω1−ω2|/summationdisplay\nβ1+β2+β3=β|∂β1\nξχλ(ξ)|/vextendsingle/vextendsingle/vextendsingle∂β2\nξ/parenleftBig1\niλω1·k+|ξ|2/parenrightBig/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle∂β3\nξ/parenleftBig1\niλω2·k+|ξ|2/parenrightBig/vextendsingle/vextendsingle/vextendsingle\n/lessorsimilarβλ|k||ω1−ω2|/summationdisplay\nβ1+β2+β3=β/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−|β1|λ−3δ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β2||k|τλ−1γ−1/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−|β3|\n/lessorsimilarα|k|τ+1γ−1λ−3δ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β||ω1−ω2|.\n(4.17)30 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nHence, for any s≥s0,β∈N2, one obtains that\n/ba∇dbl∂β\nξΦ2(·,ξ)/ba∇dbl2\ns/lessorsimilarβ/summationdisplay\nβ1+β2=β/summationdisplay\nk∈Z2/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2s|∂β1\nξΓ(k,ξ)|2|∂β2\nξ/hatwidea(k,ξ;ω1)|2\n(4.17)\n/lessorsimilarβ/parenleftBig\nγ−1λ−3δ|ω1−ω2|/parenrightBig2/summationdisplay\nβ1+β2=β/parenleftbig\n/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β1|/parenrightbig2/summationdisplay\nk∈Z2/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2(s+τ+1)|∂β2\nξ/hatwidea(k,ξ;ω1)|2\n/lessorsimilarβ/parenleftBig\nγ−1λ−3δ|ω1−ω2|/parenrightBig2/summationdisplay\nβ1+β2=β/parenleftbig\n/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β1|/parenrightbig2/ba∇dbl∂β2\nξa(·,ξ;ω1)/ba∇dbl2\ns+τ+1\n/lessorsimilarβ/parenleftBig\nγ−1λ−3δ|ω1−ω2|/parenrightBig2/summationdisplay\nβ1+β2=β/parenleftbig\n/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−3\n2−|β1|/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htm−|β2|/parenrightbig2|Op(a)|2\nm,s+τ+1,|β2|\n/lessorsimilarβ/parenleftBig\nγ−1λ−3δ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}htm−3\n2−|β||Op(a)|m,s+τ+1,|β||ω1−ω2|/parenrightBig2\n.\n(4.18)\nHence (4.13), (4.14), (4.15), (4.18) imply the claimed boun d\n|Op(ψ)|Lip(γ)\nm−3/2,s,α/lessorsimilars,αλ−3δ|Op(a)|Lip(γ)\nm,s+τ+1,α,∀s≥s0, α∈N0.\nBy (4.9) and by the fact that χλ(ξ) is even, one can see that Op( ψ1) is a real operator. For ψ2one\ncan reason as above.\nProof of (ii).By the proof of the item ( i), one gets that for any k∈Z2,ξ∈R2\nψ1(x,ξ) =/summationdisplay\nk∈Z2/hatwideψ1(k,ξ)eix·ξ, ψ2(x,ξ) =/summationdisplay\nk∈Z2/hatwideψ2(k,ξ)eix·ξ,\n/hatwideψ1(k,ξ) =−χλ(ξ)i/hatwided(k)·ξ\niλω·k+|ξ|2,/hatwideψ2(k,ξ) =−χλ(ξ)i/hatwided(k)·ξ\niλω·k−|ξ|2,\nand hence\np(x,ξ) :=ψ1(x,ξ)−ψ2(x,ξ) =/summationdisplay\nk∈Z2/hatwidep(k,ξ)eik·ξ,\n/hatwidep(k,ξ) :=/hatwideψ1(k,ξ)−/hatwideψ2(k,ξ) =−2i/hatwided(k)·ξχλ(ξ)|ξ|2\nλ2(ω·k)2+|ξ|4.\nA direct calculation shows that (recall (4.11)) for any β∈N2, one gets\n|∂β\nξ/hatwidep(k,ξ)|/lessorsimilarβ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−1−|β||/hatwided(k)|,\nimplying that for any s≥s0,α∈N0,\n|Op(p)|−1,s,α/lessorsimilars,α/ba∇dbld/ba∇dbls(3.10)\n/lessorsimilars,αλδ(1+/ba∇dblI/ba∇dbls+1). (4.19)\nand for any given ω1,ω2∈DC(γ,τ), one has that\n/hatwidep(k,ξ;ω1)−/hatwidep(k,ξ;ω2) =−2i/hatwided(k;ω1)·ξχλ(ξ)|ξ|2\nλ2(ω1·k)2+|ξ|4+2i/hatwided(k;ω2)·ξχλ(ξ)|ξ|2\nλ2(ω2·k)2+|ξ|4\n= Γ1(k,ξ)+Γ2(k,ξ),\nΓ1(k,ξ) :=−2i[/hatwided(k;ω1)−/hatwided(k;ω2)]·ξχλ(ξ)|ξ|2\nλ2(ω1·k)2+|ξ|4\nΓ2(k,ξ) := 2i/hatwided(k;ω2)·ξχλ(ξ)|ξ|2λ2/bracketleftbig\n(ω1−ω2)·k/bracketrightbig/bracketleftbig\n(ω1+ω2)·k/bracketrightbig\n(λ2(ω1·k)2+|ξ|4)(λ2(ω2·k)2+|ξ|4).\nLetω1,ω2∈DC(γ,τ),λ6δ/lessorsimilar|ξ|. Then, one can easily show by induction that\n/vextendsingle/vextendsingle/vextendsingle∂β\nξ/parenleftBig1\nλ2(ω1·k)2+|ξ|4/parenrightBig/vextendsingle/vextendsingle/vextendsingle/lessorsimilarβ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−4−|β|,∀β∈N2,\n/vextendsingle/vextendsingle/vextendsingle∂β\nξ/parenleftBig1\nλ2(ω2·k)2+|ξ|4/parenrightBig/vextendsingle/vextendsingle/vextendsingle/lessorsimilarβλ−2γ−2|k|2τ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−|β|,∀β∈N2.(4.20)LARGE AMPLITUDE TRAVELING WAVES MHD 31\nIn the first estimate above, one always estimate the denomina tors asλ2(ω1·k)2+|ξ|4≥ |ξ|4whereas\nin the second one, λ2(ω2·k)2+|ξ|4≥λ2(ω2·k)2≥λ2γ2|k|−2τfork∈Z2\\{0}, by using that ω2is\ndiophantine.\nBy using the estimate in (4.20) and the estimate (4.11) on χλ, one proves that\n|∂β\nξΓ1(k,ξ)|/lessorsimilarβ/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−1−|β||/hatwided(k;ω1)−/hatwided(k;ω2)|,∀β∈N2, (4.21)\nand\n|∂β\nξΓ2(k,ξ)|/lessorsimilarβ|k|2(τ+1)γ−2/a\\}b∇acketle{tξ/a\\}b∇acket∇i}ht−1−|β||/hatwided(k;ω2)||ω1−ω2|,∀β∈N2. (4.22)\nHence, by the estimates (4.21), (4.22) one deduces that for a nys≥s0,α∈N0\nγ/vextendsingle/vextendsingle/vextendsingleOp/parenleftBig\np(·;ω1)−p(·;ω2)/parenrightBig/vextendsingle/vextendsingle/vextendsingle\n−1,s,α/lessorsimilarαγ/ba∇dbld(·;ω1)−d(·;ω2)/ba∇dbls+γ−1/ba∇dbld/ba∇dblsup\ns+2τ+2|ω1−ω2|\n/lessorsimilars,αγ−1/ba∇dbld/ba∇dblLip(γ)\ns+2τ+2|ω1−ω2|\n(3.10)\n/lessorsimilars,αλδγ−1/parenleftbig\n1+/ba∇dblI/ba∇dblLip(γ)\ns+2τ+3/parenrightbig\n|ω1−ω2|.(4.23)\nThe claimed statement then follows by the bounds (4.19), (4. 23). /square\nWe are now in position to define the operator Ψ.\nLemma 4.3. Assume that (3.3)holds for some σ≫0large enough and let ω∈DC(γ,τ). Then\nthere exist two real operators Ψ1= Op(ψ1(x,ξ)),Ψ2= Op(ψ2(x,ξ))whereψ1,ψ2∈ S−1/2such that\nthe operator Ψ⊥defined as\nΨ⊥= Π⊥\n0ΨΠ⊥\n0,Ψ =/parenleftbigg\n0 Op( ψ1(x,ξ))\nOp(ψ2(x,ξ)) 0/parenrightbigg\n,\nsatisfies the equation\n[D,Ψ⊥]+Q1= Π⊥\n0/parenleftBig\nQΨ+RΨ/parenrightBig\nΠ⊥\n0, (4.24)\nwithΨ∈ OPS−1/2such that\n|Ψ|Lip(γ)\n−1/2,s,α/lessorsimilars1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, α∈N0,\nΨ⊥= Ψ+RΨ\n⊥,\n|RΨ\n⊥|Lip(γ)\n−N,s,0/lessorsimilars,N1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, N∈N,(4.25)\nand the matrix operators QΨ,RΨare off-diagonal, real, and satisfy the estimates\n|QΨ|Lip(γ)\n1/2,s,α/lessorsimilars1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, α∈N0,\n|RΨ|Lip(γ)\n−N,s,0/lessorsimilarN,sλ6δ(N+1)(1+/ba∇dblI/ba∇dblLip(γ)\ns+σ),∀s≥s0.(4.26)\nMoreover let s1≥s0,α∈N0and let us assume that I1,I2satisfy(3.3)withs1+σinstead of\ns0+σ. Then we also have that\n|∆12Ψ|−1/2,s1,α,|∆12QΨ|1/2,s1,α/lessorsimilar/ba∇dblI1−I2/ba∇dbls1+σ, (4.27)\nProof.First of all, we define ψ1andψ2to be, respectively, the solutions of the equation (4.7) wit h\na1anda2given by\na1(x,ξ) =a2(x,ξ) :=id(x)·ξ. (4.28)\nThus, since ai∈ S1and are their associated pseudo-differential operators are r eal, we can apply\nLemma 4.2 and Lemma 3.1 obtaining the existence of ψ1,ψ2∈ S−1/2such that Ψ 1,Ψ2are real and\nsatisfy for some σ≫0 large enough\n|Ψi|Lip(γ)\n−1/2,s,α/lessorsimilars,αλ−3δ/ba∇dbld/ba∇dblLip(γ)\ns+τ+1/lessorsimilars,α1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, α∈N0. (4.29)\nIn particular, it follows that\n|Ψ|Lip(γ)\n−1/2,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, α∈N0. (4.30)\nThe expansion of Ψ ⊥and the estimate of RΨ\n⊥then follows by applying Lemma 2.21.32 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nNow, we consider [ D,Ψ⊥]+Q1. Using that [ D,Π⊥\n0] = 0 and that Q1= Π⊥\n0Q1Π⊥\n0(recall (3.8)), one\nhas that\n[D,Ψ⊥]+Q1= Π⊥\n0/parenleftBig\n[D,Ψ]+Q1/parenrightBig\nΠ⊥\n0. (4.31)\nand by splitting id(x)·ξ=iχλ(ξ)d(x)·ξ+i(1−χλ(ξ))d(x)·ξ,i= 1,2 (recall (4.5)), and by using\nthat by a direct calculation\n−∆◦Op/parenleftBig\nψ1(x,ξ)/parenrightBig\n= Op/parenleftBig\nψ1(x,ξ)|ξ|2−2iξ·∇xψ1(x,ξ)−∆xψ1(x,ξ)/parenrightBig\n,\nOp(ψ2)◦(−∆) = Op/parenleftBig\nψ2(x,ξ)|ξ|2/parenrightBig\n,(4.32)\none obtains that\n[D,Ψ]+Q1\n=/parenleftbigg\n0 [ λω·∇,Op/parenleftbig\nψ1/parenrightbig\n]−∆◦Op/parenleftbig\nψ1/parenrightbig\n[λω·∇,Op/parenleftbig\nψ2/parenrightbig\n]+Op/parenleftbig\nψ2/parenrightbig\n◦∆ 0/parenrightbigg\n+/parenleftbigg\n0 Op/parenleftbig\niχλ(ξ)d(x)·ξ/parenrightbig\nOp/parenleftbig\niχλ(ξ)d(x)·ξ/parenrightbig\n0/parenrightbigg\n+/parenleftbigg\n0 Op/parenleftbig\ni/parenleftbig\n1−χλ(ξ)/parenrightbig\nd(x)·ξ/parenrightbig\nOp/parenleftbig\ni/parenleftbig\n1−χλ(ξ)/parenrightbig\nd(x)·ξ/parenrightbig\n0/parenrightbigg\n(4.32)=/parenleftbigg\n0 Op/parenleftbig/parenleftbig\nλω·∇+|ξ|2/parenrightbig\nψ1(x,ξ)+iχλ(ξ)d(x)·ξ/parenrightbig\nOp/parenleftbig/parenleftbig\nλω·∇−|ξ|2/parenrightbig\nψ2(x,ξ)+iχλ(ξ)d(x)·ξ/parenrightbig\n0/parenrightbigg\n+QΨ+RΨ,\nQΨ:=/parenleftBigg\n0 Op/parenleftBig\n−2iξ·∇xψ1(x,ξ)−∆xψ1(x,ξ)/parenrightBig\n0 0/parenrightBigg\n,\nRΨ:=\n0 Op/parenleftBig\ni/parenleftbig\n1−χλ(ξ)/parenrightbig\nd(x)·ξ/parenrightBig\nOp/parenleftBig\ni/parenleftbig\n1−χλ(ξ)/parenrightbig\nd(x)·ξ/parenrightBig\n0\n.\n(4.33)\nBy the explicit form in (4.33), by the fact that χλ(ξ) is even and by the reality of the symbol ψ1\nand the function d(x), we have that QΨandRΨare real matrix operators.\nBy applying the estimate (4.30), together with Lemma 4.1 and the estimates (3.10) on d(x), one\nobtains that\n|QΨ|1/2,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dbls+σ,∀s≥s0, α∈N0,\n|RΨ|−N,s,0/lessorsimilarN,sλ6δ(N+1)(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0,(4.34)\n(for some constant σ≫0 large enough). Moreover, we apply Lemma 4.2 to get that\n/parenleftbig\nλω·∇+|ξ|2/parenrightbig\nψ1(x,ξ)+iχλ(ξ)d(x)·ξ= 0,\n/parenleftbig\nλω·∇−|ξ|2/parenrightbig\nψ2(x,ξ)+iχλ(ξ)d(x)·ξ= 0,\nand hence we have obtained that\n[D,Ψ]+Q1=QΨ+RΨ\nand this concludes the proof. The estimates (4.27) can be pro ved by similar arguments, by using\nalso the estimates (3.11). /square\nWe now analyze the conjugation of Lby means of the map Φ := exp(Ψ ⊥) (recall (4.1)). This is\nthe content of the following lemma.\nLemma 4.4 (Conjugation of L).LetN∈N,γ∈(0,1),τ >0,λ−δγ−1≤1,ω∈DC(γ,τ). Then\nthere exists σ≡σN≫0such that if (3.3)is fulfilled the following holds. There exists an invertible\nreal map Φsatisfying\nΦ±1:Hs\n0→Hs\n0,|Φ±1|Lip(γ)\n0,s,0/lessorsimilars1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, (4.35)LARGE AMPLITUDE TRAVELING WAVES MHD 33\nsuch that the operator L(0):= Φ−1LΦin(4.4)admits the expansion\nL(0)=D+F1+Π⊥\n0/parenleftBig\nQ(0)\n1/2+R(0)\n0+R(0)\n−N/parenrightBig\nΠ⊥\n0, (4.36)\nwhereF1=/parenleftbigg\na·∇0\n0a·∇/parenrightbigg\nis defined in (4.2),Q(0)\n1/2∈ OPS1/2is a block off-diagonal matrix-\noperator, R(0)\n0∈ OPS0andR(0)\n−Nis an operator of order −Nsatisfying\n|Q(0)\n1/2|Lip(γ)\n1/2,s,α,|R(0)\n0|Lip(γ)\n0,s,α/lessorsimilars,αλ3δ(1+/ba∇dblI/ba∇dblLip(γ)\ns+σ),∀s≥s0, α∈N0,\n|R(0)\n−N|Lip(γ)\n−N,s,0/lessorsimilars,Nλ6δ(N+1)(1+/ba∇dblI/ba∇dblLip(γ)\ns+σ),∀s≥s0.(4.37)\nMoreover let s1≥s0,α∈N0and letI1,I2satisfy(3.3)withs1+σinstead ofs0+σ. Then\n|∆12Φ±1|0,s1,0/lessorsimilar/ba∇dblI1−I2/ba∇dbls1+σ,\n|∆12Q(0)\n1/2|1/2,s1,α,|∆12R(0)\n0|0,s1,α/lessorsimilars1,αλ3δ/ba∇dblI1−I2/ba∇dbls1+σ.(4.38)\nFinally the operators L(0),F1,Q(0)\n1/2,R(0)\n0andR(0)\n−Nare real matrix operators.\nProof.To simplify the notations we write /ba∇dbl·/ba∇dblsinstead of /ba∇dbl·/ba∇dblLip(γ)\nsand|·|m,s,αinstead of |·|Lip(γ)\nm,s,α.\nFirst of all, by the estimates (4.25) and by Lemma 2.12, one im mediately gets the estimates (4.35)\non Φ := exp(Ψ ⊥). Moreover, since Ψ ⊥is real, then also Φ is so. Then, we analyze all the terms\nappearing in the expansions (4.3), (4.4) of L(0)= Φ−1LΦ.\nExpansion of the term1\n2[[D,Ψ⊥],Ψ⊥] + [F1,Ψ⊥] + [Q1,Ψ⊥].By applying Lemma 4.3, one\nobtains that\n1\n2[[D,Ψ⊥],Ψ⊥]+[Q1,Ψ⊥]+[F1,Ψ⊥] = [F1,Ψ⊥]+1\n2[Q1,Ψ⊥]\n+1\n2[Π⊥\n0QΨΠ⊥\n0,Ψ⊥]+1\n2[Π⊥\n0RΨΠ⊥\n0,Ψ⊥].\nBy the estimates (4.25), (4.26) and by applying the composit ion Lemmata 2.11 (to estimate\n[Π⊥\n0RΨΠ⊥\n0,Ψ⊥]), 2.14 (to expand [Π⊥\n0QΨΠ⊥\n0,Ψ⊥]) together with the ansatz (3.3), one easily ob-\ntains that\n1\n2[Π⊥\n0QΨΠ⊥\n0,Ψ⊥] = Π⊥\n0/parenleftbig\nF(1)\n1+R(1)\n−N/parenrightbig\nΠ⊥\n0whereF(1)\n1∈ OPS0has zero off-diagonal entries\n|F(1)\n1|0,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dbls+σ,∀s≥s0, α∈N0,\n|R(1)\n−N|−N,s,0/lessorsimilars,N1+/ba∇dblI/ba∇dbls+σ,∀s≥s0,\n|[Π⊥\n0RΨΠ⊥\n0,Ψ]|−N,s,0/lessorsimilars,Nλ6δ(N+1)(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0.\n(4.39)\nWe analyze in more details the terms [ Q1,Ψ⊥],[F1,Ψ⊥]. By the properties (3.8), [Π⊥\n0,Q1] = 0,\n[Π⊥\n0,F1] = 0 and therefore\n[F1,Ψ⊥] = Π⊥\n0[F1,Ψ]Π⊥\n0,[Q1,Ψ⊥] = Π⊥\n0[Q1,Ψ]Π⊥\n0. (4.40)\nMoreover, byanexplicitcalculation, onehasthat(recalli ngthatΨ 1= Op(ψ1(x,ξ)),Ψ2= Op(ψ2(x,ξ)))\n[Q1,Ψ] =/parenleftbigg\n0d·∇\nd·∇0/parenrightbigg/parenleftbigg\n0 Ψ1\nΨ20/parenrightbigg\n−/parenleftbigg\n0 Ψ1\nΨ20/parenrightbigg/parenleftbigg\n0d·∇\nd·∇0/parenrightbigg\n=/parenleftbigg\n(d·∇)◦Ψ2−Ψ1◦(d·∇) 0\n0 ( d·∇)◦Ψ1−Ψ2◦(d·∇)/parenrightbigg\n.34 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nThen by applying Lemma 2.14 and by using the estimates on m(x) and Ψ 1of Lemmata 3.1, 4.3,\none obtains the expansion\n[Q1,Ψ]\n=\nOp/parenleftBig\nid(x)·ξ/parenleftbig\nψ2(x,ξ)−ψ1(x,ξ)/parenrightbig/parenrightBig\n0\n0 Op/parenleftBig\nid(x)·ξ/parenleftbig\nψ1(x,ξ)−ψ2(x,ξ)/parenrightbig/parenrightBig\n\n+F(2)\n1+R(2)\n−N,\nF(2)\n1∈ OPS−1\n2,|F(2)\n1|−1\n2,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, α∈N0,\n|R(2)\n−N|−N,s,0/lessorsimilars,N1+/ba∇dblI/ba∇dbls+σ,∀s≥s0.(4.41)\nFurthermore, by using Lemmata 2.11-( i), 3.1, 4.2-( ii) one obtains that\nid·ξ/parenleftbig\nψ1−ψ2/parenrightbig\n∈ S0,/vextendsingle/vextendsingle/vextendsingleOp/parenleftBig\nid·ξ/parenleftbig\nψ1−ψ2/parenrightbig/parenrightBig/vextendsingle/vextendsingle/vextendsingle\n0,s,α/lessorsimilars,αλ2δγ−1(1+/ba∇dblI/ba∇dbls+σ)\nλ−δγ−1≤1\n/lessorsimilars,αλ3δ(1+/ba∇dblI/ba∇dbls+σ)∀s≥s0, α∈N0.(4.42)\nMoreover, by applying Lemma 2.14 and by using the estimates o na(x) and Ψ 1,Ψ2of Lemmata\n3.1, 4.3, one obtains the expansion\n[F1,Ψ] =/parenleftbigg\n0 [a·∇,Ψ1]\n[a·∇,Ψ2] 0/parenrightbigg\n=Q(3)\n1+R(3)\n−N,\nQ(3)\n1∈ OPS−1\n2,|Q(3)\n1|−1\n2,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dbls+σ,∀s≥s0, α∈N0,\n|R(3)\n−N|−N,s,0/lessorsimilars,N1+/ba∇dblI/ba∇dbls+σ,∀s≥s0.(4.43)\nHence, by summarizing (4.39), (4.40), (4.41), (4.43), (4.4 2), one gets the final expansion\n1\n2[[D,Ψ⊥],Ψ⊥]+[F1,Ψ⊥]+[Q1,Ψ⊥] = Π⊥\n0/parenleftbig\nS(4)\n1+R(4)\n−N/parenrightbig\nΠ⊥\n0,\nS(4)\n1∈ OPS0,|S(4)\n1|0,s,α/lessorsimilars,αλ3δ(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0, α∈N0,\n|R(4)\n−N|−N,s,0/lessorsimilars,Nλ6δ(N+1)(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0.(4.44)\nAnalysis of the term R(0)\n1+R(0)\n2+e−Ψ⊥R0eΨ⊥in(4.3),(4.4).By using Lemmata 2.14, 2.16,\n3.1, 4.3, the expansions (4.41), (4.43), (4.44), one obtain s that\nR(1)\n1+R(1)\n2+e−Ψ⊥R0eΨ⊥= Π⊥\n0/parenleftbig\nS(5)\n1+R(5)\n−N/parenrightbig\nΠ⊥\n0,\nS(5)\n1∈ OPS0,|S(5)\n1|0,s,α/lessorsimilars,αλ3δ(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0, α∈N0,\n|R(5)\nN|−N,s,0/lessorsimilars,Nλ6δ(N+1)(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0.(4.45)\nThe claimed expansion (4.36) and the claimed bounds (4.37) t hen follows by Lemma 4.3, the\nexpansions (4.44), (4.45) and by defining\nQ(0)\n1\n2:=QΨ,R(0)\n0:=S(4)\n1+S(5)\n1,R(0)\n−N:=RΨ+R(4)\n−N+R(5)\n−N.\nThe bounds (4.38) follows by similar arguments, using also t he estimates (3.11), (4.27). Finally\nwe discuss the algebraic properties of the operators. L(0)is real by composition, F1by definition,\nQ(0)\n1/2by Lemma 4.3. By Remark 2.13 we have that S(4)\n1,S(5)\n1are real and therefore also R(0)\n0and\nfinally by difference RΨ,R(4)\n−N,R(5)\n−Nare real and hence R(0)\n−N. /squareLARGE AMPLITUDE TRAVELING WAVES MHD 35\n4.2.The iterative step. We now describe the iterative argument that will eventually allow us to\ndecouple the equations up to an arbitrary smoothing operato r of order −N.\nLemma 4.5. LetN∈N,γ∈(0,1),τ >0and assume that λ−δγ−1≤1. Then there exists\nσ≡σN≫0large enough such that if (3.3)holds, then the following statements holds for all\nn∈ {0,...,2N+1}. There exists a linear operator\nL(n)=D+F1+Π⊥\n0/parenleftBig\nF(n)\n0+Q(n)\n1−n\n2+R(n)\n−N/parenrightBig\nΠ⊥\n0, (4.46)\ndefined for all ω∈DC(γ,τ), whereF(n)\n0∈ OPS0is a block diagonal matrix-operator, Q(n)\n1−n\n2∈\nOPS1−n\n2is a block off-diagonal matrix-operator, and R(n)\n−Nis an operator of order −Nsatisfying\nthe estimates\n|F(n)\n0|Lip(γ)\n0,s,α,|Q(n)\n1−n\n2|Lip(γ)\n1−n\n2,s,α/lessorsimilars,αλ3δ/parenleftbig\n1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/parenrightbig\n,∀s≥s0, α∈N0,\n|R(n)\n−N|Lip(γ)\n−N,s,0/lessorsimilars,Nλ6δ(N+1)/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0.(4.47)\nForn∈ {1,2,...,2N+1}there exists a real, linear and invertible map Φn−1satisfying\nΦ±1\nn−1:Hs\n0→Hs\n0,|Φ±1\nn−1|Lip(γ)\n0,s,0/lessorsimilars1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0, (4.48)\nsuch that the operator L(n)satisfies the conjugation\nL(n)= Φ−1\nn−1L(n−1)Φn−1.\nLets1≥s0,α∈N0and letI1,I2satisfy(3.3)withs1+σinstead ofs0+σ. Then\n|∆12Φ±1\nn−1|0,s1,0/lessorsimilars1/ba∇dblI1−I2/ba∇dbls1+σ,\n|∆12F(n)\n0|0,s1,α,|∆12Q(n)\n1−n\n2|1−n\n2,s1,α/lessorsimilars1,αλ3δ/ba∇dblI1−I2/ba∇dbls1+σ.(4.49)\nFinally, the opeators L(n),F(n)\n0,Q(n)\n1−n\n2andR(n)\n−Nare real matrix operators.\nProof.To simplify notations we write /ba∇dbl·/ba∇dblsfor/ba∇dbl·/ba∇dblLip(γ)\nsand|·|m,s,αfor|·|Lip(γ)\nm,s,α.\nPROOF OF THE STATEMENT FOR n= 0. The claimed statement follows from Lemma 4.4.\nPROOF OF THE INDUCTION STEP. Let n≥0 and we assume that we have an operator of\nthe form\nL(n)=D+F1+Π⊥\n0/parenleftBig\nF(n)\n0+Q(n)\n1−n\n2+R(n)\n−N/parenrightBig\nΠ⊥\n0, (4.50)\nwhereF(n)\n0,Q(n)\n1−n\n2,R(n)\n−Nsatisfy the properties (4.47). Our goal is to normalize the o ff-diagonal part\nQ(n)\n1−n\n2=\n0 Op/parenleftBig\nqn,1(x,ξ)/parenrightBig\nOp/parenleftBig\nqn,2(x,ξ)/parenrightBig\n0\n∈ OPS1−n\n2. (4.51)\nWe look for\nΨn,⊥:= Π⊥\n0ΨnΠ⊥\n0,Ψn=\n0 Op/parenleftBig\nψn,1(x,ξ)/parenrightBig\nOp/parenleftBig\nψn,2(x,ξ)/parenrightBig\n0\n∈ OPS−n\n2−1,(4.52)36 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nwhere the symbols ψn,1andψn,2have to be determined and we consider Φ n= exp(Ψ n,⊥). We\nanalyze the conjugation L(n+1):= Φ−1\nnL(n)Φn. By Lie expansion one computes\nL(n+1)=D+F1+[D,Ψn,⊥]+Π⊥\n0/parenleftBig\nQ(n)\n1−n\n2+F(n)\n0/parenrightBig\nΠ⊥\n0+S(n)\n1+S(n)\n2+S(n)\n3,\nS(n)\n1:=1\n2/integraldisplay1\n0(1−τ)e−τΨn,⊥[[D,Ψn,⊥],Ψn,⊥]eτΨn,⊥dτ\nS(n)\n2:=/integraldisplay1\n0e−τΨn,⊥/bracketleftBig\nF1+Π⊥\n0F(n)\n0Π⊥\n0+Π⊥\n0Q(n)\n1−n\n2Π⊥\n0,Ψn,⊥/bracketrightBig\neτΨn,⊥dτ\nS(n)\n3:= Φ−1\nnΠ⊥\n0R(n)\n−NΠ⊥\n0Φn.(4.53)\nConstruction of Ψnand expansion of [D,Ψn,⊥]+Π⊥\n0Q(n)\n1−n\n2Π⊥\n0.Since [D,Π⊥\n0] = 0, one has\nthat\n[D,Ψn,⊥]+Π⊥\n0Q(n)\n1−n\n2Π⊥\n0= Π⊥\n0/parenleftBig\n[D,Ψ]+Q(n)\n1−n\n2/parenrightBig\nΠ⊥\n0.\nBy Lemma 4.2 and using the induction estimates (4.47) on Q(n)\n1−n\n2, We choose ψn,i,i= 1,2 so that\n/parenleftbig\nλω·∇+|ξ|2/parenrightbig\nψn,1(x,ξ)+χλ(ξ)qn,1(x,ξ) = 0,\n/parenleftbig\nλω·∇−|ξ|2/parenrightbig\nψn,2(x,ξ)+χλ(ξ)qn,2(x,ξ) = 0,(4.54)\nwithψn,1,ψn,2∈S−n\n2−1satisfy\n|Op(ψn,i)|−n\n2−1,s,α/lessorsimilarαλ−3δ|Op(qn,i)|1−n\n2,s+τ+1,α/lessorsimilars,α1+/ba∇dblI/ba∇dbls+σ,∀s≥s0, α∈N0.(4.55)\nMoreover the latter properties, together with Lemma 2.21 im ply that\nΨn,⊥= Ψn+RΨn\n⊥,\n|RΨn\n⊥|−N,s,0/lessorsimilars,N1+/ba∇dblI/ba∇dbls+σ,∀s≥s0.(4.56)\nFurthermore, by splitting qn,i=χλqn,i+(1−χλ)qn,i,i= 1,2 (recall (4.5)), and by using that by a\ndirect calculation\n−∆◦Op/parenleftBig\nψn,1(x,ξ)/parenrightBig\n= Op/parenleftBig\nψn,1(x,ξ)|ξ|2−2iξ·∇xψn,1(x,ξ)−∆xψn,1(x,ξ)/parenrightBig\n,\nOp(ψn,2)◦(−∆) = Op/parenleftBig\nψn,2(x,ξ)|ξ|2/parenrightBig\n,(4.57)\none obtains that\n[D,Ψn]+Q(n)\n1−n\n2\n=/parenleftbigg\n0 [ λω·∇,Op/parenleftbig\nψn,1/parenrightbig\n]−∆◦Op/parenleftbig\nψn,1/parenrightbig\n[λω·∇,Op/parenleftbig\nψn,2/parenrightbig\n]+Op/parenleftbig\nψn,2/parenrightbig\n◦∆ 0/parenrightbigg\n+/parenleftbigg\n0 Op/parenleftbig\nχλ(ξ)qn,1(x,ξ)/parenrightbig\nOp/parenleftbig\nχλ(ξ)qn,2(x,ξ)/parenrightbig\n0/parenrightbigg\n+/parenleftbigg\n0 Op/parenleftbig/parenleftbig\n1−χλ(ξ)/parenrightbig\nqn,1(x,ξ)/parenrightbig\nOp/parenleftbig/parenleftbig\n1−χλ(ξ)/parenrightbig\nqn,2(x,ξ)/parenrightbig\n0/parenrightbigg\n=/parenleftbigg\n0/parenleftbig\nλω·∇+|ξ|2/parenrightbig\nψn,1(x,ξ)+χλ(ξ)qn,1(x,ξ)/parenleftbig\nλω·∇−|ξ|2/parenrightbig\nψn,2(x,ξ)+χλ(ξ)qn,2(x,ξ) 0/parenrightbigg\n+QΨn+RΨn,\n(4.57)=QΨn+RΨn,\n(4.58)\nQΨn:=/parenleftBigg\n0 Op/parenleftBig\n2iξ·∇xψn,1(x,ξ)−∆xψn,1(x,ξ)/parenrightBig\n0 0/parenrightBigg\n,\nRΨn:=/parenleftbigg\n0 Op(/parenleftbig\n1−χλ(ξ)/parenrightbig\nqn,1(x,ξ))\nOp/parenleftbig/parenleftbig\n1−χλ(ξ)/parenrightbig\nqn,2(x,ξ)/parenrightbig\n0/parenrightbigg\n.(4.59)LARGE AMPLITUDE TRAVELING WAVES MHD 37\nBy using Lemma 4.1, by the estimates (4.54) and by the inducti on estimates (4.47), one easily gets\nthat\nQΨn∈ OPS−n\n2,|QΨn|−n\n2,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dbls+σ,∀s≥s0, α∈N0,\n|RΨn|−N,s,0/lessorsimilars,Nλ6δ(N+1−n\n2)λ3δ(1+/ba∇dblI/ba∇dbls+σ)\n/lessorsimilars,Nλ6δ(N+1\n2)λ3δ(1+/ba∇dblI/ba∇dbls+σ)\n/lessorsimilars,Nλ6δ(N+1)(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0.(4.60)\nThe estimates (4.54), (2.47), together with Lemma 2.12 and t he ansatz (3.3) allows to deduce that\nsup\nτ∈[−1,1]|eτΨn,⊥|0,s,0/lessorsimilars1+/ba∇dblI/ba∇dbls+σ,∀s≥s0, (4.61)\nform which one deduces the claimed bound (4.48) for Φ±1\nn=e±Ψn,⊥.\nSince by induction one has that Q(n)\n1−n\n2, then by using Lemma 4.2 one deduce that Φ nis real and\ntherefore by composition also L(n+1)is so.\nAnalysis of S(n)\n1.By recalling (4.53) and using (4.58), (4.59), (4.60) one wri tes\nS(n)\n1=S(n)\na+S(n)\nb,\nS(n)\na:=1\n2/integraldisplay1\n0(1−τ)e−τΨn,⊥[Π⊥\n0QΨnΠ⊥\n0,Ψn,⊥]eτΨn,⊥dτ,\nS(n)\nb:=1\n2/integraldisplay1\n0(1−τ)e−τΨn,⊥[Π⊥\n0RΨnΠ⊥\n0,Ψn,⊥]eτΨn,⊥dτ.\nClearlyS(n)\n1is invariant on the space of zero average functions, namely S(n)\n1= Π⊥\n0S(n)\n1Π⊥\n0,S(n)\na=\nΠ⊥\n0S(n)\naΠ⊥\n0andS(n)\nb= Π⊥\n0S(n)\nbΠ⊥\n0. By theestimates (4.54), (4.60), (4.61), (2.47) by thecomp osition\nestimate (2.29) (using also the ansatz (3.3)), one gets that the operator S(n)\nbis of order −Nand it\nsatisfies the estimate\n|S(n)\nb|−N,s,0/lessorsimilars,Nλ6δ(N+1)(1+/ba∇dblI/ba∇dbls+σ),∀s≥s0. (4.62)\nMoreover, by (4.54), (4.60), Lemma 2.14 (to expand [Π⊥\n0QΨnΠ⊥\n0,Ψn,⊥]), Lemma 2.16 (to expand\ne−τΨn,⊥[Π⊥\n0QΨnΠ⊥\n0,Ψn,⊥]eτΨn,⊥,τ∈[0,1]) ,using again (3.3)), one obtains the following expansio n\nfor the operator S(n)\na:\nS(n)\na= Π⊥\n0/parenleftBig\nS(n)\nc+S(n)\nd/parenrightBig\nΠ⊥\n0,\nS(n)\nc∈ OPS−n−1,|S(n)\nc|−n−1,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dbls+σ,∀s≥s0,∀α∈N0,\n|S(n)\nd|−N,s,0/lessorsimilars1+/ba∇dblI/ba∇dbls+σ,∀s≥s0.(4.63)\nThis concludes the analysis of the remainder S(n)\n1.\nAnalysis of S(n)\n2.Recall the formula(4.53) for S(n)\n2. By recalling the expressionof F1in(4.2), the\nestimates of a(x) in Lemma 3.1 and by the induction estimates (4.47) on F(n)\n0,Q(n)\n1−n\n2, one obtains\nthat\nF1+F(n)\n0+Q(n)\n1−n\n2∈ OPS1and\n/vextendsingle/vextendsingle/vextendsingleF1+F(n)\n0+Q(n)\n1−n\n2/vextendsingle/vextendsingle/vextendsingle\n1,s,α/lessorsimilars,αλ3δ/parenleftbig\n1+/ba∇dblI/ba∇dbls+σ/parenrightbig\n,∀s≥s0, α∈N0.(4.64)\nHence by (4.64), (4.54), Lemma 2.14 (to expand [Π⊥\n0/parenleftbig\nF1+F(n)\n0+Q(n)\n1−n\n2/parenrightbig\nΠ⊥\n0,Ψn,⊥]), 2.16 (to ex-\npande−τΨn,⊥[Π⊥\n0/parenleftbig\nF1+F(n)\n0+Q(n)\n1−n\n2/parenrightbig\nΠ⊥\n0,Ψn,⊥]eτΨn,⊥), using again (3.3), one obtains the following38 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nexpansion for the operator S(n)\n2:\nS(n)\n2= Π⊥\n0/parenleftBig\nS(n)\ne+S(n)\nf/parenrightBig\nΠ⊥\n0,\nS(n)\ne∈ OPS−n\n2,|S(n)\ne|−n\n2,s,α/lessorsimilars,αλ3δ/parenleftbig\n1+/ba∇dblI/ba∇dbls+σ/parenrightbig\n,∀s≥s0,∀α∈N0,\n|S(n)\nf|−N,s,0/lessorsimilarsλ3δ/parenleftbig\n1+/ba∇dblI/ba∇dbls+σ/parenrightbig\n/lessorsimilarsλ6δ(N+1)/parenleftbig\n1+/ba∇dblI/ba∇dbls+σ/parenrightbig\n,∀s≥s0.(4.65)\nThis concludes the analysis of the remainder S(n)\n2.\nAnalysis of S(n)\n3.By (4.53), by the estimates (4.61), the induction estimate ( 4.47) on R(n)\n−N, and\nby the composition estimate (2.29) (together with the ansat z (3.3)), one deduces the S(n)\n3is an\noperator of order −Nand it satisfies the estimate\n|S(n)\n3|−N,s,0/lessorsimilarsλ6δ(N+1)/parenleftbig\n1+/ba∇dblI/ba∇dbls+σ/parenrightbig\n,∀s≥s0. (4.66)\nFinally, by collecting (4.53), (4.58), (4.59), (4.60), (4. 62), (4.63), (4.65), (4.66) one gets that\nL(n+1)= Φ−1\nnL(n)Φn=D+F1+Π⊥\n0/parenleftBig\nF(n)\n0+R(n+1)\n−n\n2+R(n+1)\n−N/parenrightBig\nΠ⊥\n0,\nR(n+1)\n−n\n2:=QΨn+S(n)\nc+S(n)\ne,\nR(n+1)\n−N:=RΨn+S(n)\nb+S(n)\nd+S(n)\nf+S(n)\n3,\n|R(n+1)\n−n\n2|−n\n2,s,α/lessorsimilars,αλ3δ/parenleftbig\n1+/ba∇dblI/ba∇dbls+σ/parenrightbig\n,∀s≥s0, α∈N0,\n|R(n+1)\n−N|−N,s,0/lessorsimilars,Nλ6δ(N+1)/parenleftbig\n1+/ba∇dblI/ba∇dbls+σ/parenrightbig\n,∀s≥s0.(4.67)\nfor someσ≡σN≫0 large enough. Then the claimed properties (4.47) for L(n+1)then follows\nby (4.67) by splitting R(n+1)\n−n\n2=F(n+1)\n−n\n2+Q(n+1)\n−n\n2whereF(n+1)\n−n\n2is the diagonal part of R(n+1)\n−n\n2and\nQ(n+1)\n−n\n2is the off-diagonal part of R(n+1)\n−n\n2and by defining F(n+1)\n0:=F(n)\n0+F(n+1)\n−n\n2. The claimed\nexpansion (4.46) and the claimed estimates (4.47) at the ste pn+ 1 has then been proved. The\nestimates (4.49) at the step n+1 follows by similar arguments.\nTo prove that F(n+1)\n0,Q(n+1)\n−n\n2are real one can reason as donein Lemma 4.4 by usingtheinduct ive\nhypothesis on F(n)\n0,Q(n)\n1−n\n2and finally R(n+1)\n−n\n2is real by difference. /square\nProposition 4.6. LetN∈N,M:= 6(N+ 1),γ∈(0,1),τ >0,λ−δγ−1≤1,ω∈DC(γ,τ).\nThen there exists σ≡σN≫0such that if (3.3)holds, then there exists a real, invertible map ΦN\nsatisfying\nΦ±1\nN:Hs\n0→Hs\n0,|Φ±1\nN|Lip(γ)\n0,s,0/lessorsimilars,N1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s≥s0 (4.68)\nand such that the linear operator Lin(3.9)transforms as follows:\nL1:=Φ−1\nNLΦN=/parenleftBigg\nL(1)\n1L(2)\n−N\nL(3)\n−NL(4)\n1/parenrightBigg\n,\nL(1)\n1:=λω·∇−∆+a(x)·∇+Π⊥\n0S(1)\n0Π⊥\n0+S(1)\n−N,\nL(1)\n4:=λω·∇+a(x)·∇+Π⊥\n0S(4)\n0Π⊥\n0+S(4)\n−N,(4.69)LARGE AMPLITUDE TRAVELING WAVES MHD 39\nwhereS(1)\n0,S(4)\n0∈ OPS0, whereas the remainders L(2)\n−N,L(3)\n−N,S(1)\n−N,S(4)\n−Nare operators of order −N\nsatisfying\n|S(1)\n0|Lip(γ)\n0,s,α,|S(4)\n0|Lip(γ)\n0,s,α/lessorsimilars,αλ3δ/parenleftbig\n1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/parenrightbig\n,∀s≥s0, α∈N0,\nL(2)\n−N,L(3)\n−N,S(1)\n−N,S(1)\n−N∈ B(Hs\n0, Hs+N\n0),∀s≥s0and\n/ba∇dblL(2)\n−Nh/ba∇dblLip(γ)\ns+N,/ba∇dblL(3)\n−Nh/ba∇dblLip(γ)\ns+N,/ba∇dblS(1)\n−Nh/ba∇dblLip(γ)\ns+N,/ba∇dblS(4)\n−Nh/ba∇dblLip(γ)\ns+N\n/lessorsimilarsλMδ/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightBig\n,∀s≥s0.(4.70)\nLets1≥s0,α∈N0and letI1,I2satisfy(3.3)withs1+σinstead ofs0+σ. Then\n|∆12S(1)\n0|0,s1,α,|∆12S(4)\n0|0,s1,α/lessorsimilars1,αλ3δ/ba∇dblI1−I2/ba∇dbls1+σ (4.71)\nFinally, the operators L1,S(1)\n0,S(4)\n0,L(2)\n−N,L(3)\n−N,S(1)\n−N,S(4)\n−Nare real.\nProof.We apply Lemmata 4.4, 4.5. We set\nΦN:= Φ◦Φ0◦...◦Φ2N.\nThe estimate (4.68) then follows by (4.35), (4.48) and by app lying the composition estimate (2.29)\n(usingalso (3.3)). Moreover, the operator L1≡ L(2N+1)=Φ−1\nNLΦNis of the form (4.69) by setting\nF(2N+1)\n0≡/parenleftBigg\nS(1)\n00\n0S(4)\n0/parenrightBigg\n,Π⊥\n0/parenleftBig\nQ(2N+1)\n−N+R(2N+1)\n−N/parenrightBig\nΠ⊥\n0≡/parenleftBigg\nS(1)\n−NL(2)\n−N\nL(3)\n−NS(4)\n−N/parenrightBigg\n.\nThen by the estimate (4.47) and using also Lemma 2.18 one dedu ces the estimates (4.70). Finally,\nthe estimates (4.71) are a direct consequence of the estimat es (4.49) for ∆ 12F(2N+1)\n0. Since the\nmaps Φ,Φ0,...,Φ2Nare real by Lemmata 4.5 and 4.4, then the map ΦNis real by composition,\ntogether with L(2N+1). To prove the realty of S(1)\n0,S(4)\n0,L(2)\n−N,L(3)\n−N,S(1)\n−N,S(4)\n−None reasons as done\nin the proof of Lemma 4.4. /square\n5.Inversion of the first equation\n5.1.Inversion of the operator L(1)\n1.In order to invert the operator L1, we first invert the\noperator\nL(1)\n1:=λω·∇−∆+R(1)\n1,R(1)\n1:=a(x)·∇+Π⊥\n0S(1)\n0Π⊥\n0+S(1)\n−N, (5.1)\ngiven in (4.69). Note that by Lemma 3.1, by Lemma 2.18 and by th e estimates (4.70), and by the\nansatz (3.3), one obtains that\nR(1)\n1∈ B(Hs+1\n0,Hs\n0),∀s≥s0and\n/ba∇dblR(1)\n1h/ba∇dblLip(γ)\ns/lessorsimilarsλδM/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+1/parenrightBig\n,∀s≥s0.(5.2)\nThen, we write L(1)\n1as\nL(1)\n1:=Lλ+R(1)\n1, Lλ:=λω·∇−∆. (5.3)\nWe have the following.\nLemma 5.1. Letλ >1,γ∈(0,1),00. In the high frequency regime, we\nhave that\n|Λ(k)| ≥ |k|2≥λp|k|for|k| ≥λp. (5.7)\nOn the other hand, for low frequencies |k| ≤λpwe use the Diophantine condition, obtaining that\n|Λ(k)| ≥λ|ω·k| ≥λγ\n|k|τ≥γλ1−τpfor|k| ≤λp. (5.8)\nThus, for any h∈Hs\n0(T2), one has that\n/ba∇dblL−1\nλh/ba∇dbl2\ns+1=/summationdisplay\nk/\\e}atio\\slash=0/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2(s+1)|ˆh(k)|2\n|Λ(k)|2\n=/summationdisplay\n0<|k|≤λp/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2(s+1)|ˆh(k)|2\n|Λ(k)|2+/summationdisplay\n|k|≥λp/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2(s+1)|ˆh(k)|2\n|Λ(k)|2\n/lessorsimilarγ−2λ2(τp−1)/summationdisplay\n|k|≤λp/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2(s+1)|ˆh(k)|2\n+λ−2p/summationdisplay\n|k|≥λp/a\\}b∇acketle{tk/a\\}b∇acket∇i}ht2(s+1)|ˆh(k)|2\n|k|2\n/lessorsimilar/parenleftBig\nγ−2λ2(τp+p−1)+λ−2p/parenrightBig\n/ba∇dblh/ba∇dbl2\ns/lessorsimilarλ−2pγ−2/ba∇dblh/ba∇dbl2\ns,(5.9)\nsinceγ∈(0,1), 00,N∈Nandω∈DC(γ,τ). Then there exists σ≡σN≫0large\nenough such that if (3.3)holds, then for any S >s0+σthere exists ε(S)≪1small enough such\nthat ifλ−δγ−1≤ε(S), then the following holds\n•Invertibility of L(1)\n1with gain of regularity. The operator L(1)\n1is invertible with inverse/parenleftBig\nL(1)\n1/parenrightBig−1\n:Hs\n0(T2)→Hs+1\n0(T2), for anys0≤s≤S−σand it satisfies the estimate\n/vextenddouble/vextenddouble/vextenddouble/parenleftBig\nL(1)\n1/parenrightBig−1\nh/vextenddouble/vextenddouble/vextenddouble\ns+1/lessorsimilarsλ−δM/parenleftBig\n/ba∇dblh/ba∇dbls+/ba∇dblI/ba∇dbls+σ/ba∇dblh/ba∇dbls0/parenrightBig\n,∀s0≤s≤S−σ. (5.11)\n•Lipschitz estimate of (L(1)\n1)−1with loss of derivatives. For anys0≤s≤S−σ, for\nh(·;ω)∈Hs+2τ+1\n0,ω∈DC(γ,τ), the operator (L(1)\n1)−1satisfies the estimate\n/vextenddouble/vextenddouble/vextenddouble/parenleftBig\nL(1)\n1/parenrightBig−1\nh/vextenddouble/vextenddouble/vextenddoubleLip(γ)\ns/lessorsimilarsλ−δM/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+2τ+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+2τ+1/parenrightBig\n. (5.12)LARGE AMPLITUDE TRAVELING WAVES MHD 41\nProof.Proof of (5.11).First of all, by recalling (5.3), we rewrite the operator L(1)\n1as\nL(1)\n1=Lλ/parenleftBig\nId+Pλ/parenrightBig\n,Pλ:=L−1\nλR(1)\n1. (5.13)\nIn order to invert L(1)\n1, we need to invert the operator Id + Pλ. We will make this by Neumann\nseries. Indeed, by the definition of pin (5.10), by the estimate (5.2) and by the estimate (5.4) in\nLemma 5.1, one has that for σ≡σN≫0 large enough, /ba∇dblI/ba∇dbls0+σ/lessorsimilar1 (see (3.3)), for any S≥s0+σ,\nfor anys0+1≤s≤S−σ, one has that\nPλ:Hs\n0→Hs\n0,\n/ba∇dblPλh/ba∇dbls/lessorsimilarλ−δ(M+1)γ−1/ba∇dblR(1)\n1h/ba∇dbls−1\n/lessorsimilarsλ−δ(M+1)γ−1λδM/parenleftBig\n/ba∇dblh/ba∇dbls+/ba∇dblI/ba∇dbls+σ/ba∇dblh/ba∇dbls0/parenrightBig\n,\n/lessorsimilarsλ−δγ−1/parenleftBig\n/ba∇dblh/ba∇dbls+/ba∇dblI/ba∇dbls+σ/ba∇dblh/ba∇dbls0/parenrightBig\n.(5.14)\nThe estimate (5.14) together with the ansatz (3.3) gives the estimate\n/ba∇dblPλh/ba∇dbls0/lessorsimilarλ−δγ−1/ba∇dblh/ba∇dbls0. (5.15)\nBy iterating the estimates (5.14), (5.15), one gets that for any integer n∈N\n/ba∇dblPn\nλh/ba∇dbls≤/parenleftBig\nC(s)λ−δγ−1/parenrightBign/parenleftBig\n/ba∇dblh/ba∇dbls+/ba∇dblI/ba∇dbls+σ/ba∇dblh/ba∇dbls0/parenrightBig\n,∀s0+1≤s≤S−σ,\n/ba∇dblPn\nλh/ba∇dbls0≤/parenleftBig\nC(s0)λ−δγ−1/parenrightBign\n/ba∇dblh/ba∇dbls0,(5.16)\nfor some constants C(s)≫C(s0)≫0 large enough. Hence by expanding (Id + Pλ)−1=/summationtext\nn≥0(−1)nPn\nλby Neumann series and by using the estimates (5.16) one obtai ns that for any\ns0≤s≤S−σ, and by taking λ≫1 large enough in such a way that C(S)λ−δγ−1≪1\n/ba∇dbl(Id+Pλ)−1h/ba∇dbls/lessorsimilars/ba∇dblh/ba∇dbls+/ba∇dblI/ba∇dbls+σ/ba∇dblh/ba∇dbls0,∀s0+1≤s≤S−σ. (5.17)\nBytheestimateofLemma5.1,usingthat p=δ(M+1)andλ−δγ−1≪1, onehasthat /ba∇dblL−1\nλ/ba∇dblB(Hs\n0,Hs+1\n0)/lessorsimilar\nλ−δMand therefore the claimed bound (5.11) on the operator ( L(1)\n1)−1follows by (5.13), (5.17).\nProof of (5.12).Lets0≤s≤S−σ,h(·;ω)∈Hs+2τ+1\n0,ω∈DC(γ,τ). By the estimate (5.5) in\nLemma 5.1 and by the estimate (5.17), one gets that\n/vextenddouble/vextenddouble/vextenddouble/parenleftBig\nL(1)\n1/parenrightBig−1\nh/vextenddouble/vextenddouble/vextenddoublesup\ns/lessorsimilarsλ−1γ−1/parenleftBig\n/ba∇dblh/ba∇dblsup\ns+τ+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblsup\ns0+τ/parenrightBig\n. (5.18)\nNow letω1,ω2∈DC(γ,τ). Since by (5.10), 0 < δ <1\nM+1, forλ−δγ−1≪1, one has that\nλδMγ−1/lessorsimilarλ. Hence, by (5.2), (5.3), one obtains for s≥s0,h∈Hs+1\n0\n/vextenddouble/vextenddouble/vextenddouble/parenleftBig\nL(1)\n1(ω2)−L(1)\n1(ω1)/parenrightBig\nh/vextenddouble/vextenddouble/vextenddouble\ns/lessorsimilarsλ/ba∇dblh/ba∇dbls+1|ω1−ω2|\n+λδMγ−1/parenleftBig\n/ba∇dblh/ba∇dbls+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dbls0+1/parenrightBig\n|ω1−ω2|\n/lessorsimilarsλ/parenleftBig\n/ba∇dblh/ba∇dbls+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dbls0+1/parenrightBig\n|ω1−ω2|.(5.19)\nThen, we write\n(L(1)\n1(ω1))−1h(·;ω1)−(L(1)\n1(ω2))−1h(·;ω2) =G1h(·;ω1)+(L(1)\n1(ω2))−1[h(·;ω1)−h(·;ω2)],\nG1:= (L(1)\n1(ω1))−1−(L(1)\n1(ω2))−1= (L(1)\n1(ω1))−1/parenleftBig\nL(1)\n1(ω2)−L(1)\n1(ω1)/parenrightBig\n(L(1)\n1(ω2))−1.42 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nBy the estimates (5.18), (5.19), one then obtains that for an ys0≤s≤S−σ(use also the ansatz\n(3.3)),\nγ/vextenddouble/vextenddouble/vextenddouble(L(1)\n1(ω1))−1h(·;ω1)−(L(1)\n1(ω2))−1h(·;ω2)/vextenddouble/vextenddouble/vextenddouble\ns\n/lessorsimilarsλ−1γ−1/parenleftBig\n/ba∇dblh/ba∇dblsup\ns+2τ+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblsup\ns0+2τ+1/parenrightBig\n|ω1−ω2|\n+λ−1γ−1/parenleftBig\nγ/ba∇dblh/ba∇dbllip\ns+τ+/ba∇dblI/ba∇dblLip(γ)\ns+σγ/ba∇dblh/ba∇dbllip\ns0+τ/parenrightBig\n|ω1−ω2|\n/lessorsimilarsλ−1γ−1/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+2τ+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+2τ+1/parenrightBig\n|ω1−ω2|.(5.20)\nThe claimed bound (5.12) then follows by (5.18), (5.20), usi ng again that λ−1γ−1/lessorsimilarλ−δM./square\n5.2.Reduction to a scalar transport-type operator. In order to invert the linear operator\nL1in (4.69), we need to solve the system\n/braceleftBigg\nL(1)\n1h1+L(2)\n−Nh2=g1,\nL(3)\n−Nh1+L(4)\n1h2=g2.(5.21)\nBy Lemma 5.2, we have that\nh1= (L(1)\n1)−1g1−(L(1)\n1)−1L(2)\n−Nh2, (5.22)\nand we can replace the latter expression of h1in the second equation of (5.21), by obtaining the\nequation\nP[h2] =g2−L(3)\n−N(L(1)\n1)−1[g1],\nP:=L(4)\n1−L(3)\n−N(L(1)\n1)−1L(2)\n−N.(5.23)\nHence, in order to conclude the invertibility of L1, it is enough to solve the equation (5.23), namely\nto invert the linear operator P. The following lemma holds.\nLemma 5.3. Letγ∈(0,1),τ >0,N≥2τ+1andω∈DC(γ,τ). There exists σ≡σN≫0large\nenough such that if (3.3)holds then the linear operator Phas the form\nP=λω·∇+a(x)·∇+Π⊥\n0QΠ⊥\n0+R (5.24)\nwhereQ ∈ OPS0andRis a smoothing operator of order −Nsatisfying the following properties.\nThe operator Qsatisfies the estimate\n|Q|Lip(γ)\n0,s,α/lessorsimilars,αλδM(1+/ba∇dblI/ba∇dblLip(γ)\ns+σ),∀s≥s0, α∈N0, (5.25)\nand for any S >s0+σthere exists ε(S)≪1small enough such that if λ−δγ−1≤ε(S), then\nR ∈ B(Hs\n0,Hs+N\n0),∀s0≤s≤S−σ,\n/ba∇dblRh/ba∇dblLip(γ)\ns+N/lessorsimilars,NλδM/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightBig\n,∀s0≤s≤S−σ.(5.26)\nLets1≥s0,α∈N0and assume that I1,I2satisfies (3.3)withs1+σinstead ofs0+σ. Then\n|∆12Q|0,s1,α/lessorsimilars1,αλδM/ba∇dblI1−I2/ba∇dbls1+σ. (5.27)\nFinally, the operators P,QandRare real.\nProof.To simplify the notations we write /ba∇dbl · /ba∇dblsinstead of /ba∇dbl · /ba∇dblLip(γ)\ns. By recalling (4.69), (4.70),\n(4.71), (5.23), the estimates (5.25), (5.27) on Q ≡ S(4)\n0immediately follows, hence we estimate the\noperator R:=−L(3)\n−N(L(1)\n1)−1L(2)\n−N+S(4)\n−N. LetS > s0+σ, then ifλ−δγ−1≤ε(S)≪1 is smallLARGE AMPLITUDE TRAVELING WAVES MHD 43\nenough, we can apply the estimate (5.12) in Lemma 5.2 and by us ing the estimates (4.70), Lemma\n2.18 and the ansatz (3.3), one gets\n/ba∇dblL(3)\n−N(L(1)\n1)−1L(2)\n−Nh/ba∇dbls+N≤ /ba∇dblL(3)\n−N(L(1)\n1)−1L(2)\n−Nh/ba∇dbls+2N−2τ−1\n/lessorsimilarsλδM/parenleftBig\n/ba∇dbl(L(1)\n1)−1L(2)\n−Nh/ba∇dbls+N−2τ−1+/ba∇dblI/ba∇dbls+σ/ba∇dbl(L(1)\n1)−1L(2)\n−Nh/ba∇dbls0+N−2τ−1/parenrightBig\n/lessorsimilarsλδMλ−δM/parenleftBig\n/ba∇dblL(2)\n−Nh/ba∇dbls+N+/ba∇dblI/ba∇dbls+σ/ba∇dblL(2)\n−Nh/ba∇dbls0+N/parenrightBig\n/lessorsimilarsλδMλ−δMλδM/parenleftBig\n/ba∇dblh/ba∇dbls+/ba∇dblI/ba∇dbls+σ/ba∇dblh/ba∇dbls0/parenrightBig\n/lessorsimilarsλδM/parenleftBig\n/ba∇dblh/ba∇dbls+/ba∇dblI/ba∇dbls+σ/ba∇dblh/ba∇dbls0/parenrightBig\nwhich imply the claimed bound for R. By Proposition 4.6 and by composition we have that Qand\nRare real and therefore Pis so, since it is a sum of real operators. The proof of the lemm a is then\nconcluded. /square\n6.Normal form reduction and inversion of the transport operat orP\nIn this section we discuss the invertibility of the linear op eratorPin (5.24). The first step to\nbe implemented is to reduce the highest order part to constan t coefficients, namely the transport\noperator\nTλ:=λω·∇+a(x)·∇=λT,T:=ω·∇+aλ(x)·∇,\naλ(x) :=λ−1a(x).(6.1)\nBy (3.6) and Lemma 3.1, one clearly has that aλsatisfies\n/ba∇dblaλ/ba∇dblLip(γ)\ns/lessorsimilarsλδ−1/ba∇dblI/ba∇dblLip(γ)\ns,∀s≥s0,\nand ifs1≥s0,/ba∇dblaλ(I1)−aλ(I2)/ba∇dbls1/lessorsimilars1λδ−1/ba∇dblI1−I2/ba∇dbls1.(6.2)\nWe also recall that the function a(x) has zero average and zero divergence\n/integraldisplay\nT2a(x)dx= 0,div(a) = 0. (6.3)\n6.1.Reduction of the transport operator of order one. We recall the following result from\n[2, Proposition 4.1] (see also [24]).\nProposition 6.1. LetTas in(6.1)and assume (6.3). Then there exists σ≡σ(τ)≫0large\nenough such that if (3.3)holds, forS >s0+σthere exists ε≡ε(S)≪1small enough such that if\nλδ−1γ−1≤ε, (6.4)\nthen the following holds. There exists an invertible diffeomo rphismx∈T2/mapsto→x+α(x;ω)∈T2with\ninversey/mapsto→y+ˇα(y;ω), defined for all ω∈DC(γ,τ), satisfying, for any s0≤s≤S−σ,\n/ba∇dblα/ba∇dblLip(γ)\ns,/ba∇dblˇα/ba∇dblLip(γ)\ns/lessorsimilarsλδ−1γ−1/ba∇dblI/ba∇dblLip(γ)\ns+σ, (6.5)\nsuch that, by defining\nAh(x) :=h(x+α(x)),withA−1h(y) =h(y+ˇα(y)), (6.6)\none gets the conjugation\nA−1(ω·∇+aλ(x)·∇)A=ω·∇.\nMoreover, let s1≥s0and let us assume that I1,I2satisfy(3.3)withs1+σinstead ofs0+σ. Then\n/ba∇dbl∆12α/ba∇dbls1,/ba∇dbl∆12ˇα/ba∇dbls1/lessorsimilars1λδ−1γ−1/ba∇dblI1−I2/ba∇dbls1+σ,\n/ba∇dbl(∆12A)h/ba∇dbls1,/ba∇dbl(∆12A−1)h/ba∇dbls1/lessorsimilars1λδ−1γ−1/ba∇dblI1−I2/ba∇dbls1+σ/ba∇dblh/ba∇dbls1+1.(6.7)\nIn the next lemma we provide the full conjugation of the opera torPby means of the map\nA⊥:= Π⊥\n0AΠ⊥\n0.44 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nProposition 6.2. Letγ∈(0,1),τ >0,N≥2τ+ 1,ω∈DC(γ,τ). There exists σ≡σN≫0\nlarge enough such that for any S > s0+σthere exists ε(S)≪1such that if λ−δγ−1≤ε(S)and\n(3.3)holds then for any ω∈DC(γ,τ), the linear operator Pin(5.24)transforms under the action\nof the map A⊥:= Π⊥\n0AΠ⊥\n0as follows.\nP0:=A−1\n⊥PA⊥=λω·∇+Π⊥\n0Q0Π⊥\n0+R0, (6.8)\nwhereQ0∈ OPS0\nS−σ,αfor anyα∈N0andR0is a smoothing operator of order −Nsatisfying\n|Q0|Lip(γ)\n0,s,α/lessorsimilars,αλδM(1+/ba∇dblI/ba∇dblLip(γ)\ns+σ),∀s0≤s≤S−σ,∀α∈N0,\nR0∈ B(Hs\n0,Hs+N\n0),∀s0≤s≤S−σ,\n/ba∇dblR0h/ba∇dblLip(γ)\ns+N/lessorsimilarsλδM/parenleftbig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightbig\n,∀s0≤s≤S−σ.(6.9)\nLets1≥s0,α∈N0and assume that I1,I2satisfy(3.3)withs1+σinstead ofs0+σ. Then\n|∆12Q0|0,s1,α/lessorsimilars,αλδM/ba∇dblI1−I2/ba∇dbls1+σ. (6.10)\nFinally, the operators P0,Q0andR0are real.\nProof.To simplify notations we write /ba∇dbl · /ba∇dblsfor/ba∇dbl · /ba∇dblLip(γ)\nsand| · |m,s,αfor| · |Lip(γ)\nm,s,α. By (5.10),\n0< δ <1\n2hence forλ≫1 large enough, λδ−1γ−1≤λ−δγ−1≪1 and hence the smallness\ncondition of Proposition 6.1 is verified. By (3.8) [ a(x)·∇,Π⊥\n0] = 0, one has that\nΠ⊥\n0/parenleftbig\nλω·∇+a(x)·∇/parenrightbig\nΠ⊥\n0=λω·∇+a(x)·∇\nand by applying Lemma 2.20 ( A−1\n⊥= Π⊥\n0A−1Π⊥\n0) and Proposition 6.1, one gets that\nA−1\n⊥/parenleftbig\nλω·∇+a(x)·∇/parenrightbig\nA⊥= Π⊥\n0A−1/parenleftbig\nλω·∇+a(x)·∇/parenrightbig\nAΠ⊥\n0=λω·∇,\nA−1\n⊥QA⊥= Π⊥\n0A−1Π⊥\n0QΠ⊥\n0AΠ⊥\n0= Π⊥\n0A−1QAΠ⊥\n0+R(1)\nQ,\nR(1)\nQ:=−Π⊥\n0A−1Π0QΠ⊥\n0AΠ⊥\n0−Π⊥\n0A−1QΠ0AΠ⊥\n0,(6.11)\ntherefore\nA−1\n⊥PA⊥=λω·∇+Π⊥\n0A−1QAΠ⊥\n0+A−1\n⊥RA⊥+R(1)\nQ.\nWe now analyze the conjugation A−1QAofQ= Op(q(x,ξ)). By Theorem 2.22 we have that\nA−1QA= Op(q0(x,ξ))+R(2)\nQ, (6.12)\nand there exists σ≡σN≫µ≫0 such that if (3.3) holds then for any S > s 0+σ, for any\ns0≤s≤S−σ, for anyα∈N0, one has\n|Op(q0)|0,s,α/lessorsimilars,α|Q|0,s,α+µ+/summationdisplay\nk1+k2+k3=s|Q|0,k1,α+k2+µ/ba∇dblα/ba∇dblk3+µ,\n/ba∇dblR(2)\nQh/ba∇dbls+N/lessorsimilars,NM(s)/ba∇dblh/ba∇dbls0+M(s0)/ba∇dblh/ba∇dbls,\nM(s) :=/summationdisplay\nk1+k2+k3=s|Q|0,k1,k2+µ/ba∇dblα/ba∇dblk3+µ(6.13)\nand furthermore, by applying the estimates (5.25), (6.5) on Qandα, one obtains that for k1+\nk2+k3=s\n|Q|0,s,α+µ,|Q|0,s+µ,µ/lessorsimilars,αλδM(1+/ba∇dblI/ba∇dbls+σ),\n|Q|0,k1,α+k2+µ,|Q|0,k1,k2+µ/lessorsimilars,αλδM(1+/ba∇dblI/ba∇dbls1+σ),\n/ba∇dblα/ba∇dbls3+µ/lessorsimilarsλδ−1γ−1/ba∇dblI/ba∇dbls3+σ,\nfor someσ≡σN≫µ≫0 large enough. Hence by the latter estimates and by (6.13), u sing that\nλδ−1γ−1≤λ−δγ−1≪1, one immediately obtains that\n|Op(q0)|0,s,α,M(s)/lessorsimilars,αλδM/parenleftBig\n/ba∇dblI/ba∇dbls+σ+/summationdisplay\nk1+k2+k3=s/ba∇dblI/ba∇dblk1+k2+σ/ba∇dblI/ba∇dblk3+σ/parenrightBig\n.(6.14)LARGE AMPLITUDE TRAVELING WAVES MHD 45\nFinally by the interpolation estimate (2.9) one gets that fo rk1+k2+k3=s\n/ba∇dblI/ba∇dblk1+k2+σ/ba∇dblI/ba∇dblk3+σ≤ /ba∇dblI/ba∇dbls−k1−k2\nsσ/ba∇dblI/ba∇dblk1+k2\ns\ns+σ/ba∇dblI/ba∇dbls−k3\nsσ/ba∇dblI/ba∇dblk3\ns\ns+σk1+k2+k3=s\n≤ /ba∇dblI/ba∇dbl σ/ba∇dblI/ba∇dbls+σ(3.3)\n/lessorsimilar/ba∇dblI/ba∇dbls+σ,\nwhich implies that by (6.13), (6.14), Q0= Op(q0) andR(2)\nQsatisfy the claimed estimate (6.9). By\ntheestimates (5.26), Lemma2.19, theestimates(6.5)on α,˘α,theproperty(2.47)onΠ 0andLemma\n2.18 (using also (3.3) and λδ−1γ−1≤1), one obtains that also the remainders R(1)\nQandA−1\n⊥RA⊥\nsatisfy the claimed bound (6.9). The claimed estimate (6.9) onR0:=R(1)\nQ+R(2)\nQ+A−1\n⊥RA⊥then\nfollows. The claimed bound (6.10) follows by similar argume nts, using also (5.27), (6.7).\nThe operators Q0= Op(q0) andRare real by Theorem 2.22 and therefore Pis so./square\n6.2.Reduction of the lower order terms. In this section we shall prove the following propo-\nsition in which one reduces the operator P0to a diagonal one plus a smoothing remainder.\nProposition 6.3. Letγ∈(0,1),τ >0,N≥2τ+1,ω∈DC(γ,τ). Then there exists σ≡σN≫0\nsuch that for any S >s0+σthere exists ε=ε(S)≪1such that if (3.3)andλ−δγ−1≤ε(S)are\nfullfilled then the following holds. There exists a real, inve rtible map Vsatisfying\nV±1:Hs\n0→Hs\n0,|V±1|Lip(γ)\n0,s,0/lessorsimilars1+/ba∇dblI/ba∇dblLip(γ)\ns+σ,∀s0≤s≤S−σ, (6.15)\nand such that the linear operator P0in(6.8)transforms as follows:\nP1:=V−1P0V=λω·∇+Z+R1, (6.16)\nwhereZ(ω) := diagk∈Z2\\{0}z(k;ω)is a diagonal operator whose eigenvalues satisfy the estima te\nsup\nk∈Z2\\{0}|z(k;·)|Lip(γ)/lessorsimilarλδM, (6.17)\nand the remainder satisfies\nR1∈ B(Hs\n0,Hs+N\n0),∀s0≤s≤S−σ,\n/ba∇dblR1h/ba∇dblLip(γ)\ns+N/lessorsimilarsλδM/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightBig\n,∀s0≤s≤S−σ.(6.18)\nMoreover, let I1,I2satisfy(3.3). Then\nsup\nk∈Z2\\{0}|∆12z(k)|/lessorsimilarλδM/ba∇dblI1−I2/ba∇dbls0+σ.(6.19)\nFinally, the operators P1,ZandR1are real.\nProposition 6.3 follows by the iterative normal form Lemma 6 .5. Before proving this, we prove a\nlemma in which we give study the homological equations requi red in this normal form procedure.\nLemma 6.4. Letγ∈(0,1),τ >0,m∈R,α∈N0,ω∈DC(γ,τ)anda≡a(·,·;ω)∈ Sm\ns+2τ+1,α.\nThen there exists a unique symbol f∈ Sm\ns,αwith zero average in x, that solves the equation\nλω·∇f(x,ξ)+a(x,ξ) =/a\\}b∇acketle{ta/a\\}b∇acket∇i}htx(ξ). (6.20)\nMoreover\n|Op(f)|Lip(γ)\nm,s,α/lessorsimilarλ−1γ−1|Op(a)|Lip(γ)\nm,s+2τ+1,α. (6.21)\nFinally, if Op(a)is real, then Op(f)is real.\nProof.By expanding in Fourier series, one gets that the only soluti on with zero average of the\nequation (6.20) is given by\nf(x,ξ) =−/summationdisplay\nk∈Z2\\{0}/hatwidea(k,ξ)\niλω·keix·kdefined for ω∈DC(γ,τ).\nBy applying Lemma 2.4, one gets that for any β∈N2,|β| ≤α,\n/ba∇dbl∂β\nξf(·,ξ)/ba∇dblLip(γ)\ns/lessorsimilarλ−1γ−1/ba∇dbl∂β\nξa(·,ξ)/ba∇dblLip(γ)\ns+2τ+1.\nThe claimed bound (6.21) then immediately follows by recall ing Definition 2.10. By the hypothesis\nonawe have that Op( f) is a real operator by definition. /square46 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nLemma 6.5. Letα∈N0,γ∈(0,1),τ >0,N≥2τ+ 1,ω∈DC(γ,τ). Then there exists\nσi≡σi(α,τ)≫0,i= 1,2,...,Nlarge enough, σ1<σ2<...<σ Nsuch that for any S >s0+σN,\nthere exists ε(S)≪1small enough such that if (3.3)holds andλ−δγ−1≤ε(S)≪1, then the\nfollowing holds. For any n= 0,...,N, there exists a linear operator P(n)\n0of the form\nP(n)\n0:=λω·∇+Π⊥\n0Z(n)Π⊥\n0+Π⊥\n0Q(n)\n0Π⊥\n0+R(n)\n0, (6.22)\nwhereZ(n)= Op(z(n)(ξ))∈ OPS0\nS−σn,α,Q(n)\n0= Op(q(n)\n0(x,ξ))∈ OPS−n\nS−σn,αandR(n)\n0satisfy for\nanys0≤s≤S−σn, the estimates\n|Z(n)|Lip(γ)\n0,s,α/lessorsimilars,nλδM(1+/ba∇dblI/ba∇dblLip(γ)\ns0+σn),\n|Q(n)\n0|Lip(γ)\n−n,s,α/lessorsimilars,n,αλδM(1+/ba∇dblI/ba∇dblLip(γ)\ns+σn),\nR(n)\n0∈ B(Hs\n0,Hs+N\n0),\n/ba∇dblR(n)\n0h/ba∇dblLip(γ)\ns+N/lessorsimilars,NλδM/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σn/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightBig\n.(6.23)\nThe operators P(n)\n0,Z(n),Q(n)\n0,R(n)\n0are real. For any n= 1,...,Nthere exists a real, invertible\nmapTndefined for any ω∈DC(γ,τ), satisfying\nT±1\nn:Hs\n0→Hs\n0,|T±1\nn|Lip(γ)\n0,s,α/lessorsimilars,n,α1+/ba∇dblI/ba∇dblLip(γ)\ns+σn,∀s0≤s≤S−σn (6.24)\nand\nP(n)\n0=T−1\nn−1P(n−1)\n0Tn−1∀ω∈DC(γ,τ). (6.25)\nLets1≥s0,α∈N0and assume that I1,I2satisfy(3.3)withs1+σninstead ofs0+σ. Then, for\nanyω∈DC(γ,τ),\n|∆12T±1\nn−1|−n,s1,α/lessorsimilars1,n,α/ba∇dblI1−I2/ba∇dbls1+σn,\n|∆12Z(n)|0,s1,α,|∆12Q(n)\n0|−n,s1,α/lessorsimilars1,n,αλδM/ba∇dblI1−I2/ba∇dbls1+σn.(6.26)\nProof.The proof is made by implementing an induction normal form pr ocedure. We describe the\ninduction step. Assume that the claimed statement holds at t he stepn. We look for a transforma-\ntion\nTn:= exp(Mn,⊥),Mn,⊥:= Π⊥\n0MnΠ⊥\n0,Mn= Op(mn(x,ξ))∈ OPS−n\nwhere the symbol mn(x,ξ) has to be determined in order to normalize Q(n)\n0= Op/parenleftbig\nq(n)\n0(x,ξ)/parenrightbig\n∈\nOPS−n. By conjugating the operator P(n)\n0by means of Tn, one obtains that\nP(n+1)\n0: =T−1\nnP(n)\n0Tn\n=λω·∇+Π⊥\n0Z(n)Π⊥\n0+[λω·∇,Π⊥\n0MnΠ⊥\n0]+Π⊥\n0Q(n)\n0Π⊥\n0\n+Q(n+1)\n0+R(n+1)\n0,(6.27)\nwhere\nQ(n+1)\n0:=/integraldisplay1\n0(1−τ)e−τMn,⊥[[λω·∇,Mn,⊥],Mn,⊥]eτMn,⊥dτ\n+/integraldisplay1\n0e−τMn,⊥[Π⊥\n0Z(n)Π⊥\n0+Π⊥\n0Q(n)\n0Π⊥\n0,Mn,⊥]eτMn,⊥dτ,\nR(n+1)\n0:=T−1\nnR(n)\n0Tn.(6.28)\nNote that\nQ(n+1)\n0= Π⊥\n0Q(n+1)\n0Π⊥\n0and [λω·∇,Π⊥\n0] = 0, (6.29)\ntherefore, the term of order −nis then given by\n[λω·∇,Π⊥\n0MnΠ⊥\n0]+Π⊥\n0Q(n)\n0Π⊥\n0= Π⊥\n0/parenleftBig\n[λω·∇,Mn]+Q(n)\n0/parenrightBig\nΠ⊥\n0\n= Π⊥\n0Op/parenleftBig\nλω·∇mn(x,ξ)+q(n)\n0(x,ξ)/parenrightBig\nΠ⊥\n0.LARGE AMPLITUDE TRAVELING WAVES MHD 47\nWe choose the symbol mn(x,ξ) in such a way that\nλω·∇mn(x,ξ)+q(n)\n0(x,ξ) =/a\\}b∇acketle{tq(n)\n0/a\\}b∇acket∇i}htx(ξ),/a\\}b∇acketle{tq(n)\n0/a\\}b∇acket∇i}htx(ξ) :=1\n(2π)2/integraldisplay\nT2q(n)\n0(x,ξ)dx. (6.30)\nThis can be done by applying Lemma 6.4 and using that, since 1 −δM > δ (see (5.10)) and\nλδM−1γ−1≤λ−δγ−1≤1, one gets\n|Mn|Lip(γ)\n−n,s,α/lessorsimilarλ−1γ−1|Q(n)\n0|Lip(γ)\n−n,s+2τ+1,α(6.23)\n/lessorsimilars,n,αλδM−1γ−1(1+/ba∇dblI/ba∇dblLip(γ)\ns+σn+2τ+1)\n/lessorsimilars,n,α1+/ba∇dblI/ba∇dblLip(γ)\ns+σn+2τ+1,∀s0≤s≤S−σn−2τ−1.\nFurthermore, by using also the composition estimate (2.29) and the estimates (2.47) on Π⊥\n0, the\nlatter estimate together with Lemma 2.12 and the ansatz (3.3 ) imply that\n|Mn,⊥|Lip(γ)\n−n,s,α/lessorsimilars,n,α1+/ba∇dblI/ba∇dblLip(γ)\ns+σn+µ(α),∀s0≤s≤S−σn−µ(α),\nsup\nτ∈[−1,1]|eτMn,⊥|Lip(γ)\n0,s,α/lessorsimilars,α1+/ba∇dblI/ba∇dblLip(γ)\ns+σn+µ(α),∀s0≤s≤S−σn−µ(α),(6.31)\nfor some constant µ(α)≫0 large enough. By inductive hypothesis on q(n)\n0and by using Lemma\n6.4 we have that the maps Mn,Mn,⊥andTnare real. Then by composition and by using the\ninductive hypotesis on P(n)\n0one also has that P(n+1)\n0is real. By (6.27), (6.30), one gets that P(n+1)\n0\ntakes the form\nP(n+1)\n0=λω·∇+Π⊥\n0Z(n+1)Π⊥\n0+Π⊥\n0Q(n+1)\n0Π⊥\n0+R(n+1)\n0,\nZ(n+1):=Z(n)+Op/parenleftbig\n/a\\}b∇acketle{tq(n)\n0/a\\}b∇acket∇i}htx(ξ)/parenrightbig\n,\nQ(n+1)\n0=/integraldisplay1\n0(1−τ)e−τMn,⊥[Π⊥\n0Z(n)Π⊥\n0−Π⊥\n0Q(n)\n0Π⊥\n0,Mn,⊥]eτMndτ\n+/integraldisplay1\n0e−τMn,⊥[Π⊥\n0Z(n)Π⊥\n0+Π⊥\n0Q(n)\n0Π⊥\n0,Mn,⊥]eτMn,⊥dτ,\nR(n+1)\n0=T−1\nnR(n)\n0Tn.(6.32)\nThe estimate of Z(n+1)follows by the induction estimates (6.23) on Z(n),Q(n)\n0and by Lemma\n2.17. The estimate of Q(n+1)\n0can be done by using Lemma 2.11, the estimate (6.31), the indu ction\nestimates (6.23), the estimates (2.47), together with the a nsatz (3.3). The estimate of R(n+1)\n0\nfollows by Lemma 2.18, together with the estimates (6.31) an d the induction estimate on R(n)\n0.\nTheestimate (6.26) at thestep n+1can beprovedby similar arguments. Z(n+1)isreal by inductive\nhypothesis and Lemma 2.17, R(n)\n0is real by composition and by difference Q(n)\n0is so./square\nProof of Proposition 6.3. We set\nV ≡ VN:=T0◦T1◦...◦TN−1.\nTheestimate(6.15)thenfollowsby (6.24), byLemma2.11and byusingtheansatz(3.3). ByLemma\n6.5 and by composition one has that Vis real. Moreover the operator P1≡ P(N)\n0=V−1P0Vis\nof the form (6.16) with Z:= Π⊥\n0Z(N)Π⊥\n0andR1:= Π⊥\n0Q(N)\n0Π⊥\n0+R(N)\n0and by composition it is\na real operator. Then ZandR1satisfies the desired properties (6.17), (6.18), (6.19) by a pplying\n(6.23), (6.26) with n=N.\n6.3.Inversion of the operator P.In this section we prove the invertibility of the operator Pin\n(5.24). We define the non-resonant set\nGλ(γ,τ)≡ Gλ(γ,τ;I) :=/braceleftBig\nω∈DC(γ,τ) :|iλω·k+z(k;ω)| ≥λγ\n|k|τ,∀k∈Z2\\{0}/bracerightBig\n.(6.33)48 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nForτ >0, we fix the constants N,M,δas\nN:= 2τ+2, M= 6(N+1) = 6(2τ+3),\n0<δ<1\n(M+1)(τ+2)(6.34)\nwhere we recall (5.10). We prove the following proposition.\nProposition 6.6. Letγ∈(0,1),τ >0andM,δas in(6.34). Then there exists σ≡σ(τ)≫0\nlarge enough such that for any S >s0+σ, there exists ε(S)≪1small enough such that if (3.3)\nholds andλ−δγ−1≤ε(S)≪1, then the following holds. For any ω∈ Gλ(γ,τ), the operator Pis\ninvertible and its inverse P−1is a real operator which satisfies for any s0≤s≤S−σ, the estimate\n/ba∇dblP−1h/ba∇dblLip(γ)\ns/lessorsimilarsλ−1γ−1/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+2τ+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+2τ+1/parenrightBig\n.\nProof.First of all P−1is real since the operator Pis real. Then, since by Propositions 6.2, 6.3,\nP=A⊥VP1V−1A−1\n⊥, we need to invert the operator P1constructed in Proposition 6.3. We write\nP1=D+R1,D:=λω·∇+Z.\nThe first thing that we discuss is the invertibility of D.\nInvertibility of D.We consider the operator D(ω) = diagk/\\e}atio\\slash=0µ(k;ω) whereµ(k;ω) =iλω·k+\nz(k;ω),k∈Z2\\{0}. Ifω∈ Gλ(γ,τ) (see (6.33)), then |µ(k;ω)| ≥λγ\n|k|τ,j∈Z2\\{0}, implying that\nD(ω)−1= diagk/\\e}atio\\slash=01\nµ(k;ω),\nsatisfies the bound\n/ba∇dblD−1h/ba∇dbls/lessorsimilarλ−1γ−1/ba∇dblh/ba∇dbls+τ,∀s≥0, h∈Hs+τ\n0(T2). (6.35)\nMoreover, if ω1,ω2∈ Gλ(γ,τ), one has that\n/vextendsingle/vextendsingle/vextendsingle1\nµ(k;ω1)−1\nµ(k;ω2)/vextendsingle/vextendsingle/vextendsingle=|µ(k;ω1)−µ(k;ω2)|\n|µ(k;ω1)||µ(k;ω2)|\n≤λ−1γ−2|k|2τ+1|ω1−ω2|+λ−2γ−2|k|2τ|z(k;ω1)−z(k;ω2)|\n(6.17)\n/lessorsimilarλ−1γ−2|k|2τ+1|ω1−ω2|+λMδ−2γ−3|k|2τ|ω1−ω2|\nλMδ−1γ−1≪1\n/lessorsimilarλ−1γ−2|k|2τ+1|ω1−ω2|.\nThe latter estimate then implies that\n/ba∇dbl(D(ω1)−1−D(ω2)−1)h/ba∇dbls/lessorsimilarγ−2λ−1/ba∇dblh/ba∇dbls+2τ+1|ω1−ω2|,∀s≥0,∀h∈Hs+2τ+1\n0(T2).(6.36)\nThe estimates (6.35), (6.36) imply that\n/ba∇dblD−1/ba∇dblLip(γ)\nB(Hs+2τ+1\n0,Hs\n0)/lessorsimilarλ−1γ−1,∀s≥0. (6.37)\nInvertibility of P1.Forω∈ Gλ(γ,τ), we write\nP1=D/parenleftbig\nId+F/parenrightbig\n,F:=D−1R1.\nBy the hypotheses of the proposition, we choose the order of r egularization in Proposition 6.3 as\nN= 2τ+2≥2τ+1. By (5.10), since 0 <δ<1\n1+M,λδM−1γ−1≤λ−δγ−1, hence, by the estimates\n(6.18), (6.37), one has that for for any s0≤s≤S−σ,\n/ba∇dblFh/ba∇dblLip(γ)\ns≤C(s)λδM−1γ−1/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightBig\n,\n≤C(s)λ−δγ−1/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightBig\n,\n/ba∇dblFh/ba∇dblLip(γ)\ns0≤C(s0)λδM−1γ−1/ba∇dblh/ba∇dblLip(γ)\ns0≤C(s0)λ−δγ−1/ba∇dblh/ba∇dblLip(γ)\ns0LARGE AMPLITUDE TRAVELING WAVES MHD 49\nforσ≫0 andC(s)≫C(s0)≫1. By iterating the latter estimate, using (3.3), one gets th at for\nanyn∈N,\n/ba∇dblFnh/ba∇dblLip(γ)\ns≤/parenleftBig\nC(s)λ−δγ−1/parenrightBign/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0/parenrightBig\n,∀s0≤s≤S−σ,\n/ba∇dblFnh/ba∇dblLip(γ)\ns0≤/parenleftBig\nC(s0)λ−δγ−1/parenrightBign\n/ba∇dblh/ba∇dblLip(γ)\ns0\nHence for any s0≤s≤S−σ, by using the smallness condition λ−δγ−1≤ε(S)≪1, the operator\nId+Fis invertible by Neumann series and\n/ba∇dbl(Id+F)−1h/ba∇dblLip(γ)\ns/lessorsimilars/ba∇dblh/ba∇dblLip(γ)\ns+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0,∀s0≤s≤S−σ. (6.38)\nThen by the estimates (6.37), (6.38), the operator P−1\n1= (Id+F)−1D−1satisfies the bound\n/ba∇dblP−1\n1h/ba∇dblLip(γ)\ns/lessorsimilarsγ−1λ−1/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+2τ+1+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+2τ+1/parenrightBig\n,∀s0≤s≤S−σ.(6.39)\nEstimate of P−1.By using that P−1=AVP−1\n1V−1A−1, the estimate (6.39), together with the\nestimates (6.5), (6.15) and Lemmata 2.19, 2.18 (to estimate A,V) imply the claimed bound on\nP−1. /square\n7.Inversion of the linearized operator L\nWe now invert the linear operator L1in (4.69). The following proposition holds.\nProposition 7.1. Letγ∈(0,1),τ >0andM,δas in(6.34). Then there exists σ≡σ(τ)≫0\nlarge enough such that for any S >s0+σ, there exists ε(S)≪1small enough such that if (3.3)\nholds andλ−δγ−1≤ε(S)≪1, then the following holds. For any ω∈ Gλ(γ,τ), the operator L1is\ninvertible and its inverse L−1\n1is a real operator and satisfies the estimate\n/ba∇dblL−1\n1h/ba∇dblLip(γ)\ns/lessorsimilarsλ−δM/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+σ+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+σ/parenrightBig\n,∀s0≤s≤S−σ. (7.1)\nProof.To shorten notations we write /ba∇dbl·/ba∇dblsinstead of /ba∇dbl·/ba∇dblLip(γ)\ns. By Proposition 6.6, one gets that\nforω∈ Gλ(γ,τ), the operator Pis invertible and hence the equation (5.23) can be solved by s etting\nh2=P−1[g2]−P−1L(3)\n−N(L(1)\n1)−1[g1].\nBy replacing the latter expression of h2in formula (5.22), one obtains that\nh1= (L(1)\n1)−1g1−(L(1)\n1)−1L(2)\n−NP−1[g2]+(L(1)\n1)−1L(2)\n−NP−1L(3)\n−N(L(1)\n1)−1[g1],\nand hence for any ω∈ Gλ(γ,τ)\nL−1\n1=/parenleftBigg\n(L(1)\n1)−1+(L(1)\n1)−1L(2)\n−NP−1L(3)\n−N(L(1)\n1)−1−(L(1)\n1)−1L(2)\n−NP−1\n−P−1L(3)\n−N(L(1)\n1)−1P−1/parenrightBigg\n.\nBy applying (5.12) in Lemma 5.2 to estimate ( L(1)\n1)−1, Proposition 6.6 to estimate P−1, the esti-\nmates (4.70) on L(2)\n−N,L(3)\n−N, using also (3.3), one obtains that for any s0≤s≤S−σ\n/ba∇dbl(L(1)\n1)−1L(2)\n−NP−1L(3)\n−N(L(1)\n1)−1h/ba∇dbls,/ba∇dbl(L(1)\n1)−1L(2)\n−NP−1h/ba∇dbls,/ba∇dblP−1L(3)\n−N(L(1)\n1)−1h/ba∇dbls\n/lessorsimilarsλ−1γ−1/parenleftBig\n/ba∇dblh/ba∇dbls+σ+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+σ/parenrightBig\n.\nforσ≡σ(τ)≫0. By sing that λ−1γ−1≤λ−δM, since by (5.10), 0 <δ<1\nM, one then obtains the\nclaimed bound on L−1\n1. /square\nWe can finally invert the linearized operator Lin (3.9). The following Proposition holds.\nProposition 7.2. Letγ∈(0,1),τ >0andM,δas in(6.34). Then there exists σ≡σ(τ)≫\n2τ+ 1≫0large enough such that for any S > s0+σ, there exists ε(S)≪1small enough such\nthat if(3.3)holds andλ−δγ−1≤ε(S)≪1, then the following holds. For any ω∈ Gλ(γ,τ), the\noperator Lis invertible and its inverse L−1satisfies for any s0≤s≤S−σ, the estimate\n/ba∇dblL−1h/ba∇dblLip(γ)\ns/lessorsimilarsλ−δM/parenleftBig\n/ba∇dblh/ba∇dblLip(γ)\ns+σ+/ba∇dblI/ba∇dblLip(γ)\ns+σ/ba∇dblh/ba∇dblLip(γ)\ns0+σ/parenrightBig\n. (7.2)50 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nProof.First of all L−1is real since the operator Lis real. Then, by Propositions 4.6, 7.1, for any\nω∈ Gλ(γ,τ), one has that L−1=ΦNL−1\n1Φ−1\nN. Then the claimed bound follows by the estimate\n(4.68), Lemma 2.18 and by the estimate (7.1), using also (3.3 ). /square\n8.Construction of an approximate solution\nIn this section we construct an approximate solution of the n onlinear equation F(Ω,J) = 0\nwhere the nonlinear operator Fis defined in (1.14). This is the starting point to implement t he\nnonlinear Nash-Moser scheme of Section 9. The following pro position holds.\nProposition 8.1 (Approximate solutions). Letλ>1,γ∈(0,1),τ >0,δ∈(0,1)and assume\nthatλ−δ\n3γ−1≤1. Then, there exists Iapp(·;ω) := (Ω app(·;ω),0),Ωapp∈ C∞(T2)with zero average\ndefined for ω∈DC(γ,τ)such that Ωapp/\\e}atio\\slash= 0and for any s≥s0\n/ba∇dblIapp/ba∇dblLip(γ)\ns=/ba∇dblΩapp/ba∇dblLip(γ)\ns/lessorsimilarsλ−2\n3δγ−1,/ba∇dblF(Iapp)/ba∇dblLip(γ)\ns/lessorsimilarsλ−δ\n3γ−2. (8.1)\nMoreover, for any s≥2, one has the following lower bound on the approximate soluti on\ninf\nω∈DC(γ,τ)/ba∇dblIapp(·;ω)/ba∇dbls= inf\nω∈DC(γ,τ)/ba∇dblΩapp(·;ω)/ba∇dbls/greaterorsimilarsλ−2\n3δ. (8.2)\nMoreover, there exists K(f,b)>0such that\n/ba∇dblb·∇Ωapp/ba∇dblL2≥λ−2\n3δK(f,b). (8.3)\nProof.We determine Ω appas the only solution with zero average of the following equat ion\nLλΩapp=λ1−2\n3δF,\nLλ:=λω·∇−∆ = diagk∈Z2\\{0}Λ(k),\nΛ(k)≡Λ(k;ω) =iλω·k+|k|2, k∈Z2\\{0}.(8.4)\nBy using that ω∈DC(γ,τ), one has that\nL−1\nλ= diagk∈Z2\\{0}1\niλω·k+|k|2,\nand\n|Λ(k)|=|iλω·k+|k|2| ≥λ|ω·k| ≥λγ|k|−τ,∀k∈Z2\\{0}. (8.5)\nMoreover if ω1,ω2∈DC(γ,τ),k∈Z2\\{0}, one estimates\n|Λ(k;ω1)−1−Λ(k;ω2)−1| ≤|Λ(k;ω1)−Λ(k;ω2)|\n|Λ(k;ω1)||Λ(k;ω2)|\n(8.5)\n/lessorsimilarλ−1γ−2|k|2τ+1|ω1−ω2|.(8.6)\nThe bounds (8.5), (8.6) easily imply that\n/ba∇dblL−1\nλ/ba∇dblB(Hs+τ\n0,Hs\n0),/ba∇dblL−1\nλ/ba∇dblLip(γ)\nB(Hs+2τ+1\n0,Hs\n0)/lessorsimilarλ−1γ−1,∀s≥0.\nTherefore Ω app:=λ1−2\n3δL−1\nλFsatisfies the bound\n/ba∇dblΩapp/ba∇dblLip(γ)\ns/lessorsimilarλ−2\n3δγ−1/ba∇dblF/ba∇dblLip(γ)\ns+2τ+1/lessorsimilarsλ−2\n3δγ−1,∀s≥0. (8.7)\nClearly, by the Assumption (1.7), the forcing term F/\\e}atio\\slash= 0 and hence one also has that Ω app/\\e}atio\\slash= 0.\nBy (8.4) and by recalling (1.14), one has that\nF(Ωapp,0) =/parenleftbigg\nλδUapp·∇Ωapp\n−b·∇Ωapp/parenrightbigg\n,\nUapp=UΩapp= (−∆)−1∇⊥Ωapp.\nClearly the estimates (8.7) also implies that\n/ba∇dblUapp/ba∇dblLip(γ)\ns/lessorsimilarsλ−2\n3δγ−1,∀s≥0. (8.8)LARGE AMPLITUDE TRAVELING WAVES MHD 51\nHence, the estimates (8.7), (8.8), together with the interp olation estimate (2.8), allow to deduce\nthat\nλδ/ba∇dblUapp·∇Ωapp/ba∇dblLip(γ)\ns/lessorsimilarsλ−δ\n3γ−2,/ba∇dblb·∇Ωapp/ba∇dblLip(γ)\ns/lessorsimilarsλ−2\n3δγ−1,∀s≥0.(8.9)\nSinceλ−δ\n3γ−1≤1,λ>1,γ∈(0,1),δ∈(0,1) one has\nλ−2\n3δγ−1≤λ−δ\n3γ−2\ntherefore the estimates (8.7), (8.9) imply the claimed uppe r bound (8.2) on Ω app,F(Iapp). Now,\nwe prove the lower bound on Ω app. One has that\nΩapp(x) =λ1−2\n3δL−1\nλF=λ1−2\n3δ/summationdisplay\nk∈Z2\\{0}/hatwideF(k)\niλω·k+|k|2eix·k. (8.10)\nNote that for λ>1 large enough, k∈Z2\\{0}, one has the estimate\n|iλω·k+|k|2|/lessorsimilarλ|ω·k|+|k|2/lessorsimilarλ|k|+|k|2/lessorsimilarλ|k|2, (8.11)\ntherefore\n/ba∇dblΩapp/ba∇dbl2\ns=λ2(1−2\n3δ)/summationdisplay\nk∈Z2\\{0}|k|2s\n|iλω·k+|k|2|2|/hatwideF(k)|2\n/greaterorsimilarλ2(1−2\n3δ)λ−2/summationdisplay\nk∈Z2\\{0}|k|2(s−2)|/hatwideF(k)|2\n/greaterorsimilarλ−4\n3δ/ba∇dblF/ba∇dbl2\ns−2/greaterorsimilarsλ−4\n3δ\nwhich then implies the lower bound (8.2). We now prove (8.3). By the assumption (1.7), one has\nthat there exists k∈Z2\\{0}such that\nb·k/\\e}atio\\slash= 0,/hatwideF(k)/\\e}atio\\slash= 0. (8.12)\nHence, by (8.10)\n/ba∇dblb·∇Ωapp/ba∇dblL2/greaterorsimilarλ1−2\n3δ/parenleftBig/summationdisplay\nk∈Z2\\{0}|b·k|2|/hatwideF(k)|2\n|iλω·k+|k|2|2/parenrightBig1\n2\n(8.11)\n/greaterorsimilarλ−2\n3δ/parenleftBig/summationdisplay\nk∈Z2\\{0}|b·k|2|/hatwideF(k)|2\n|k|4/parenrightBig1\n2\n≥Cλ−2\n3δ|b·k|2|/hatwideF(k)|2\n|k|2.\nThe claimed bound then follows by defining K(f,b) :=C|b·k|2|/hatwideF(k)|2\n|k|2>0, by (8.12). The proof\nof the Lemma is then concluded. /square\n9.The Nash Moser scheme\nIn this section we construct solutions of the equation F(I) = 0,I= (Ω,J) in (1.14) by means\nof a Nash Moser nonlinear iteration. We define the constants\nN0>0, Nn:=Nχn\n0, n≥0, N−1:= 1, χ:= 3/2,\nτ >0, M:= 6(2τ+3),0<δ<1\n(M+1)(τ+2),\nµ:= 3σ+3,a:= max{3µ+1,2(2σ+τ+1)},b:=µ+a+1(9.1)\nwhere ¯σ≫1 is given in Proposition 7.2 and we recall (6.34). We denote b y Πnthe orthogonal\nprojector Π Nn(see (2.5)) on the finite dimensional space\nHn:=/braceleftbig\nI ∈L2\n0(T2,R2) :I= ΠnI= (ΠnΩ,ΠnJ)/bracerightbig\n,52 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nand Π⊥\nn:= Id−Πn. The projectors Π n, Π⊥\nnsatisfy the usual smoothing properties (cf. Lemma\n2.2), namely\n/ba∇dblΠnI/ba∇dblLip(γ)\ns+a≤Na\nn/ba∇dblI/ba∇dblLip(γ)\ns,/ba∇dblΠ⊥\nnI/ba∇dblLip(γ)\ns≤N−a\nn/ba∇dblI/ba∇dblLip(γ)\ns+a, s,a≥0. (9.2)\nNotethatProposition8.1providesanapproximatesolution Iappofthefunctionalequation F(I) = 0\nand such that /ba∇dblF(Iapp)/ba∇dblLip(γ)\nsis uniformly bounded with respect to the large parameter λ≫1 for\nanys≥0. The following lemma is a direct consequence of Propositio n 8.1.\nLemma 9.1. (Initialization of the Nash-Moser iteration). Letλ >1,γ∈(0,1),τ >0,\nδ∈(0,1)and assume that λ−δ\n3γ−2≤1.For anys≥0, there exists a constant C(s)>0such that\n/ba∇dblF(Iapp)/ba∇dblLip(γ)\ns,/ba∇dblIapp/ba∇dblLip(γ)\ns≤C(s),\ninf\nω∈DC(γ,τ)/ba∇dblIapp(·;ω)/ba∇dbls= inf\nω∈DC(γ,τ)/ba∇dblΩapp(·;ω)/ba∇dbls≥C(s)λ−2\n3δ, s≥2(9.3)\nuniformly w.r. to λ.\nProposition 9.2. (Nash-Moser) There exist ε∈(0,1),N0>0,λ>0,C∗>0such that if\nλ≥λ, λ−δ\n3γ−2≤ε, (9.4)\nthen the following properties hold for all n≥0.\n(P1)nThere exists a constant C0>0large enough and a sequence (In)n≥0withI0:=Iapp,\nIn−I0:Gn→ Hn−1, satisfying\n/ba∇dblIn/ba∇dblLip(γ)\ns0+σ≤C0. (9.5)\nIfn≥1, the difference hn:=In−In−1satisfies\n/ba∇dblhn/ba∇dblLip(γ)\ns0+σ/lessorsimilarN2σ\nn−1N−a\nn−2λ−δM,forn≥1. (9.6)\nThe sets {Gn}n≥0are defined as follows. If n= 0we define G0:= DC(γ,τ)(recall(2.10)). If\nn≥1, we define\nGn+1:=Gn∩Gλ(γn,τ;In) (9.7)\nwhereγn:=γ(1+2−n)and the sets Gλ(γn,τ;In)are defined in (6.33).\n(P2)nOn the set Gn, one has the estimate\n/ba∇dblF(In)/ba∇dblLip(γ)\ns0≤C∗N−a\nn−1; (9.8)\n(P3)nOn the set Gn, one has the estimate\n/ba∇dblIn/ba∇dblLip(γ)\ns0+b+/ba∇dblF(In)/ba∇dblLip(γ)\ns0+b≤C∗Na\nn−1 (9.9)\nProof.To simplify notations, in this proof we write /ba∇dbl·/ba∇dblsinstead of /ba∇dbl·/ba∇dblLip(γ)\ns.\nProof of (P1,2,3)0. By (9.3), we have /ba∇dblI0/ba∇dbls=/ba∇dblIapp/ba∇dbls≤C(s) and/ba∇dblF(I0)/ba∇dbls=/ba∇dblF(Iapp)/ba∇dbls≤\nC(s) for anys≥0. Then (9.5), (9.8) and (9.9) hold taking1\n2C0,C∗(s0+σ)≥C(s0+σ). In\nparticular, we have\n/ba∇dblI0/ba∇dbls0+¯σ≤1\n2C0≤C0. (9.10)\nAssume that (P1,2,3)nhold for some n≥0, and prove (P1,2,3)n+1.By (P1)n, one\nhas/ba∇dblIn/ba∇dbls0+¯σ≤C0, for someC0≫0 large enough. The assumption (9.4) implies the smallness\nconditionλ−δγ−1≪1 of Proposition 7.2. Indeed γ∈(0,1),δ >δ\n3,λ≫1 implies that λ−δγ−1≤\nλ−δ\n3γ−2≪1. Then Proposition 7.2 applies to the linearized operator\nLn:=DF(In). (9.11)\nThis implies that, for any ω∈ Gn+1, the operator Ln(ω)≡ L(ω,In(ω)) admits a right inverse\nLn(ω)−1satisfying the tame estimates, for any s0≤s≤s0+b+1 (choose S:=s0+b+1),\n/ba∇dblL−1\nnh/ba∇dbls/lessorsimilarsλ−δM/parenleftbig\n/ba∇dblh/ba∇dbls+σ+/ba∇dblIn/ba∇dbls+σ/ba∇dblh/ba∇dbls0+σ/parenrightbig\n, (9.12)LARGE AMPLITUDE TRAVELING WAVES MHD 53\nusing the bound γn=γ(1+2−n)∈[γ,2γ]. Note that since Iapp=I0∈ C∞(T2,R2) satisfies (9.3),\nsinceIn−I0∈ Hn−1, by (9.2) one obtains that for any s,µ≥0,\n/ba∇dblIn/ba∇dbls+µ≤ /ba∇dblIapp/ba∇dbls+µ+/ba∇dblIn−Iapp/ba∇dbls+µ\n/lessorsimilars,µ1+Nµ\nn−1/ba∇dblIn−Iapp/ba∇dbls\n/lessorsimilars,µ1+Nµ\nn−1(/ba∇dblIn/ba∇dbls+/ba∇dblIapp/ba∇dbls)\n/lessorsimilars,µNµ\nn(1+/ba∇dblIn/ba∇dbls).(9.13)\nBy (9.12), (9.5) and (9.13), for s=s0ands=s0+1, one gets that one has\n/ba∇dblL−1\nnh/ba∇dbls0/lessorsimilarλ−δM/ba∇dblh/ba∇dbls0+σ,\n/ba∇dblL−1\nnh/ba∇dbls0+1/lessorsimilarλ−δM/parenleftBig\n/ba∇dblh/ba∇dbls0+σ+1+/ba∇dblIn/ba∇dbls0+σ+1/ba∇dblh/ba∇dbls0+σ/parenrightBig\n/lessorsimilarNnλ−δM/ba∇dblh/ba∇dbls0+σ+1.(9.14)\nWe define the next approximation as\nIn+1:=In+hn+1, hn+1:=−ΠnL−1\nnΠnF(In)∈ Hn, (9.15)\ndefined for any ω∈ Gn+1, and the remainder\nQn:=F(In+1)−F(In)−Lnhn+1.\nWe now estimate hn+1. By the estimates (9.12), (9.14), (9.5), (9.2), (9.1), (9.4 ), (9.13) and (using\nalso thatγ−1=N0≤Nn), we get that\n/ba∇dblhn+1/ba∇dbls0/lessorsimilarλ−δM/ba∇dblΠnF(In)/ba∇dbls0+σ/lessorsimilarN¯σ\nnλ−δM/ba∇dblF(In)/ba∇dbls0\n/ba∇dblhn+1/ba∇dbls0+¯σ/lessorsimilarN¯σ\nn/ba∇dblL−1\nnΠnF(In)/ba∇dbls0/lessorsimilarN2¯σ\nnλ−δM/ba∇dblF(In)/ba∇dbls0,(9.16)\nand\n/ba∇dblhn+1/ba∇dbls0+b/lessorsimilarλ−δM/parenleftBig\n/ba∇dblΠnF(In)/ba∇dbls0+b+σ+/ba∇dblIn/ba∇dbls0+b+σ/ba∇dblΠnF(In)/ba∇dbls0+σ/parenrightBig\n/lessorsimilarλ−δMN2¯σ\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b−2+/ba∇dblIn/ba∇dbls0+b/ba∇dblF(In)/ba∇dbls0/parenrightBig\n/lessorsimilarλ−δMN2¯σ\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+C∗N−a\nn−1/ba∇dblIn/ba∇dbls0+b/parenrightBig\n/lessorsimilarN2¯σ\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightBig\n.(9.17)\nMoreover, (9.15) and the estimate (9.17) imply that\n/ba∇dblIn+1/ba∇dbls0+b≤ /ba∇dblIn/ba∇dbls0+b+/ba∇dblhn+1/ba∇dbls0+b/lessorsimilarN2¯σ\nn/parenleftbig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightbig\n.(9.18)\nNext, we estimate /ba∇dblF(In+1)/ba∇dbls0and/ba∇dblF(In+1)/ba∇dbls0+b. By the definition of hn+1in (9.15), we obtain\nthat, for any ω∈ Gn+1,\nF(In+1) =F(In)+Lnhn+1+Qn\n=F(In)−LnΠnL−1\nnΠnF(In)+Qn\n=F(In)−ΠnLnL−1\nnΠnF(In)+[Ln,Πn]L−1\nnΠnF(In)+Qn\n= Π⊥\nnF(In)+[Ln,Πn]L−1\nnΠnF(In)+Qn\nΠn=Id−Π⊥\nn= Π⊥\nnF(In)+[Π⊥\nn,Ln]L−1\nnΠnF(In)+Qn(9.19)\nWe estimate separately the three terms in (9.19). By (9.2), w e have\n/ba∇dblΠ⊥\nnF(In)/ba∇dbls0≤N−b\nn/ba∇dblF(In)/ba∇dbls0+b,/ba∇dblΠ⊥\nnF(In)/ba∇dbls0+b≤ /ba∇dblF(In)/ba∇dbls0+b. (9.20)54 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nBy (9.5), (9.8), Lemma 3.2-( ii), (9.2), (9.12), (9.4), (9.13), we have\n/ba∇dbl[Π⊥\nn,Ln]L−1\nnΠnF(In)/ba∇dbls0/lessorsimilarλδN1−b\nn/parenleftBig\n/ba∇dblL−1\nnΠnF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/ba∇dblL−1\nnΠnF(In)/ba∇dbls0+1/parenrightBig\n/lessorsimilarλδN1−b\nnλ−δM/parenleftBig\n/ba∇dblΠnF(In)/ba∇dbls0+b+¯σ\n+/ba∇dblIn/ba∇dbls0+b+¯σ/ba∇dblΠnF(In)/ba∇dbls0+¯σ+Nn/ba∇dblΠnF(In)/ba∇dbls0+¯σ+1/parenrightBig\n/lessorsimilarN2−b\nnλ−(M−1)δ/parenleftBig\n/ba∇dblΠnF(In)/ba∇dbls0+b+¯σ\n+/ba∇dblIn/ba∇dbls0+b+¯σ/ba∇dblΠnF(In)/ba∇dbls0+¯σ+/ba∇dblΠnF(In)/ba∇dbls0+¯σ+1/parenrightBig\n/lessorsimilarN2¯σ+3−b\nnλ−(M−1)δ/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+C∗N−a\nn−1/ba∇dblIn/ba∇dbls0+b/parenrightBig\n/lessorsimilarN2¯σ+3−b\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightBig\nand\n/ba∇dbl[Π⊥\nn,Ln]L−1\nnΠnF(In)/ba∇dbls0+b=/ba∇dbl[Ln,Πn]L−1\nnΠnF(In)/ba∇dbls0+b\n/lessorsimilarλδNn/parenleftBig\n/ba∇dblL−1\nnΠnF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/ba∇dblL−1\nnΠnF(In)/ba∇dbls0+1/parenrightBig\n/lessorsimilarNnλ−(M−1)δ/parenleftBig\n/ba∇dblΠnF(In)/ba∇dbls0+b+¯σ+/ba∇dblIn/ba∇dbls0+b+¯σ/ba∇dblΠnF(In)/ba∇dbls0+¯σ/parenrightBig\n+Nnλ−(M−1)δ/ba∇dblIn/ba∇dbls0+b/ba∇dblΠnF(In)/ba∇dbls0+¯σ+1\nM>1,λ≫1\n/lessorsimilarN2¯σ+2\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/ba∇dblF(In)/ba∇dbls0/parenrightBig\n/lessorsimilarN2¯σ+2\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+C∗N−a\nn−1/ba∇dblIn/ba∇dbls0+b/parenrightBig\n/lessorsimilarN2¯σ+2\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightBig\n.\n(9.21)\nBy Lemma 3.2-( iii), (9.2), (9.5), (9.16), (9.17) and (9.4), we have\n/ba∇dblQn/ba∇dbls0/lessorsimilarλδN2\nn/ba∇dblhn+1/ba∇dbl2\ns0/lessorsimilarλδN2¯σ+2\nnλ−2δM/ba∇dblF(In)/ba∇dbl2\ns0\n/lessorsimilarN2¯σ+2\nnλ−(2M−1)δ/ba∇dblF(In)/ba∇dbl2\ns0and\n/ba∇dblQn/ba∇dbls0+b/lessorsimilarλδ/ba∇dblhn+1/ba∇dbls0+b+1/ba∇dblhn+1/ba∇dbls0+1/lessorsimilarN2\nnλδ/ba∇dblhn+1/ba∇dbls0+b/ba∇dblhn+1/ba∇dbls0\n/lessorsimilarN2¯σ+2\nnλδ/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightBig\nN¯σ\nnλ−δM/ba∇dblF(In)/ba∇dbls0\n/lessorsimilarN3¯σ+2\nnλ−(M−1)δ/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightBig\nN−a\nn−1\n/lessorsimilarN3¯σ+2\nn/parenleftBig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightBig(9.22)\nTherefore, by collecting (9.18)-(9.22), we have proved the following inductive inequalities for any\nn≥0 and on the set Gn+1:\n/ba∇dblF(In+1)/ba∇dbls0+b+/ba∇dblIn+1/ba∇dbls0+b/lessorsimilarN¯µ\nn/parenleftbig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightbig\n,\n/ba∇dblF(In+1)/ba∇dbls0/lessorsimilarN¯µ−b\nn/parenleftbig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightbig\n+N¯µ\nnλ−(2M−1)δ/ba∇dblF(In)/ba∇dbl2\ns0,\n¯µ:= 3¯σ+3.(9.23)\nProof of (P1)n+1.By (9.16), (9.8), (9.4) and (9.1), we obtain\n/ba∇dblhn+1/ba∇dbls0+¯σ/lessorsimilarN2¯σ\nnN−a\nn−1λ−δM(9.24)LARGE AMPLITUDE TRAVELING WAVES MHD 55\nwhich proves (9.6) at the step n+1. By (9.10), by the definition of the constants in (9.1) and b y\nthe smallness condition in (9.4), the estimate (9.5) at the s tepn+1 follows since\n/ba∇dblIn+1/ba∇dbls0+¯σ≤ /ba∇dblI0/ba∇dbls0+¯σ+n+1/summationdisplay\nk=1/ba∇dblhk/ba∇dbls0+¯σ\n≤1\n2C0+C∗∞/summationdisplay\nk=1N2σ\nk−1N−a\nk−2λ−δM≤1\n2C0+C1λ−δM≤C0(9.25)\nforλ≫1 large enough.\nProof of (P2)n+1,(P3)n+1.By the induction estimate (9.23) and using the induction hyp othesis\non (P2)n,(P3)n, we obtain that\n/ba∇dblF(In+1)/ba∇dbls0+b+/ba∇dblIn+1/ba∇dbls0+b/lessorsimilarN¯µ\nn/parenleftbig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightbig\n≤CC∗N¯µ\nnNa\nn−1≤C∗Na\nn\nby the choice of the constants in (9.1) and taking N0≫1 large enough. This latter chain of\ninequalities proves ( P3)n+1. Moreover, by (9.23) and by the induction estimates (9.8), ( 9.9), we\nhave\n/ba∇dblF(In+1)/ba∇dbls0/lessorsimilarN¯µ−b\nn/parenleftbig\n/ba∇dblF(In)/ba∇dbls0+b+/ba∇dblIn/ba∇dbls0+b/parenrightbig\n+N¯µ\nnλ−(2M−1)δ/ba∇dblF(In)/ba∇dbl2\ns0\n≤CC∗N¯µ−b\nnNa\nn−1+CC2\n∗N¯µ\nnN−2a\nn−1λ−(2M−1)δ\n≤C∗N−a\nn\nprovided\nNb−¯µ−a\nn≥2C, λ−(2M−1)δ≤N2a\nn−1N−a−¯µ\nn\n2CC∗,∀n≥0.\nThe latter condition is verified by the smallness condition ( 9.4), forN0,λ≫1 large enough and by\nthe choice of the constants in (9.1). The proof of the claimed statement is then concluded. /square\n10.Measure estimates\nIn this section we estimate the measure of the resonant set O \\G∞where the set G∞is defined\nas\nG∞:=∩n≥0Gn (10.1)\nwhere the sets Gnare given in Proposition 9.2. We recall that we denote by M(d)the Lebesgue\nmeasure on Rd. The main result of this section is the following\nProposition 10.1. Let\nτ:= 2. (10.2)\nUnder the same assumption of Proposition 9.2, we have that M(2)(O\\G∞)/lessorsimilarγ.\nThe rest of this section is devoted to the proof of Propositio n 10.1. By the definition (10.1), one\nhas\nO\\G∞⊆(O\\G0)∪/uniondisplay\nn≥0(Gn\\Gn+1). (10.3)\nHence, it is enough to estimate the measure of O\\G0andGn\\Gn+1for anyn≥0. By (9.7), (6.33),\none gets that G0= DC(γ,2), therefore it is standard the fact that\nM(2)(O\\G0)/lessorsimilarγ. (10.4)\nMoreover for n≥0, one has that Gn\\Gn+1can be written as\nGn\\Gn+1=/uniondisplay\nk∈Z2\\{0}Rk(In),\nRk(In) :=/braceleftBig\nω∈ Gn:|iλω·k+z(k;ω,In(ω))|<λγn\n|k|2/bracerightBig\n, k∈Z2\\{0}.(10.5)\nIn the next lemma, we estimate the measure of the resonant set sRk(In),k∈Z2\\{0}defined\nin (10.5).56 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nLemma 10.2. For anyn≥0, one has that\nM(2)(Rk(In))/lessorsimilarγ\n|k|3.\nProof.Fork∈Z2\\{0}, we writez(k;ω)≡z(k;ω,In(ω)), and we set\nφ(ω) :=iλω·k+z(k;ω).\nSincek/\\e}atio\\slash= 0, we write\nω=k\n|k|s+v, v·k= 0,\nand we estimate the measure of the set\nQ:=/braceleftBig\ns:|ψ(s)|<γnλ\n|k|2,k\n|k|s+v∈ Gn/bracerightBig\n,\nψ(s) :=φ/parenleftBigk\n|k|s+v/parenrightBig\n=iλ|k|s+z(k;s),\nz(k;s)≡z/parenleftBig\nk;k\n|k|s+v/parenrightBig\n.\nBy the estimate (6.17) of Proposition 6.3, one has that\n|z(k;s1)−z(k;s2)|/lessorsimilarγ−1λδM|s1−s2|,∀k∈Z2\\{0},\nand therefore\n|ψ(s1)−ψ(s2)| ≥/parenleftBig\nλ|k|−CλδMγ−1/parenrightBig\n|s1−s2| ≥λ|k|\n2|s1−s2|,\nsince, by (9.1), (9.4), one has that λδM−1γ−1≤λ−δ\n3γ−2≪1. This implies that the measure of the\nsetQsatisfies\nM(1)(Q)/lessorsimilarλγn\nλ|k|3/lessorsimilarγ\n|k|3\nand by the Fubini theorem one also gets that the claimed bound on the measure M(2)(Rk(In))./square\nLemma 10.3. Letn≥1,k∈Z2\\{0},|k| ≤Nn−1. ThenRk(In) =∅.\nProof.Letω∈ Gn. We shall prove that\n|iλω·k+z(k;ω,In(ω))| ≥λγn\n|k|2, k∈Z2\\{0},|k| ≤Nn−1, (10.6)\nimplying that Rk(In) =∅. We shall prove the bound (10.6). By applying the estimate (6 .19) in\nProposition 6.3, one has\n|iλω·k+z(k;ω,In(ω))| ≥ |iλω·k+z(k;ω,In−1(ω))|−|z(k;ω,In(ω))−z(k;ω,In−1(ω))|\n≥λγn−1\n|k|2−CλδM/ba∇dblIn−In−1/ba∇dbls0+σ\n(9.6)\n≥λγn−1\n|k|2−CN2σ\nn−1N−a\nn−2≥λγn\n|k|2,\nprovided that\nC|k|2N2σ\nn−1\nNa\nn−2λ(γn−1−γn)≤1,∀0<|k| ≤Nn−1.\nSince|k| ≤Nn−1andγn−1−γn=γ\n2nand 2n/lessorsimilarNn−1, the latter condition reads\nC′N2σ+3\nn−1N−a\nn−2λ−1γ−1≤1.\nfor some constant C′≫0 large enough. This latter condition is satisfied by the smal lness condition\n(9.4) and since a≥2(2σ+τ+1)>χ(2σ+τ+1) =χ(2σ+3) (recall (9.1) and that τ= 2). The\nclaimed bound (10.6) has then been proved. /square\nProposition 10.4. One has M(2)(G0\\G1)/lessorsimilarγand for any n≥1,M(2)(Gn\\Gn+1)/lessorsimilarγN−3\nn−1.LARGE AMPLITUDE TRAVELING WAVES MHD 57\nProof.By (10.5), Lemma 10.2 and by recalling (10.2), one gets\nM(2)(G0\\G1)≤/summationdisplay\nk∈Z2\\{0}M(2)(Rk(I0))/lessorsimilarγ/summationdisplay\nk∈Z2\\{0}1\n|k|3/lessorsimilarγ.\nMoreover, (10.5) and Lemma 10.3 imply that for any n≥1\nGn\\Gn+1⊆/uniondisplay\n|k|≥Nn−1Rk(In)\nand hence, using again Lemma 10.2 and (10.2), one gets\nM(2)(Gn\\Gn+1)≤/summationdisplay\n|k|≥Nn−1M(2)(Rk(In))/lessorsimilarγ/summationdisplay\n|k|≥Nn−11\n|k|3/lessorsimilarγN−3\nn−1.\nThe proof of the lemma is then concluded. /square\nProof of Proposition 10.1 .It follows by the inclusion (10.3), the estimate (10.4), Pro position\n10.4, and the fact that the series/summationtext\nn≥1N−3\nn−1<+∞converges. /square\n11.Proof of Theorems 1.1, 1.2\nProof of Theorem 1.2.\nFixγ:=λ−c, see (9.1), (9.4). Then\nλ−δ\n3γ−2=λ−δ\n3+2c≪1\nby takingλ≫1 large enough, and 0 0 such that\n/ba∇dblIapp/ba∇dbls0+σ=/ba∇dblΩapp/ba∇dbls0+σ≥C1λ−2\n3δ,\n/ba∇dblΩ−Ωapp/ba∇dbls0+σ+/ba∇dblJ/ba∇dbls0+σ≤ /ba∇dblI∞−Iapp/ba∇dbls0+σ/lessorsimilarλ−δM/lessorsimilarλ−2δ(11.4)\nforλ≫1 large enough where we recall that by (9.1), (10.2), M≥2. Therefore\n/ba∇dblI∞/ba∇dbls0+σ≥ /ba∇dblΩ/ba∇dbls0+σ≥ /ba∇dblΩapp/ba∇dbls0+σ−/ba∇dblΩ−Ωapp/ba∇dbls0+σ\n/greaterorsimilarλ−2\n3δ−λ−2δ/greaterorsimilarλ−2\n3δ58 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\nforλ≫1 large enough, uniformly w.r. to ω∈ Oλ. The latter estimate then implies the claimed\nbound (11.3) and also that clearly Ω /\\e}atio\\slash= 0. We also prove that J/\\e}atio\\slash= 0. Indeed, assume that by\ncontradiction J= 0. Then F(Ω,0) = 0, implying that the second component in (1.14) becomes\nb·∇Ω≡0 is identically zero. (11.5)\nOn the other hand, by (8.3) and by the estimate (11.4), using t hats0+σ≥1, one has that\n/ba∇dblb·∇Ωapp/ba∇dblL2≥λ−2\n3δK(f,b),\n/ba∇dblb·∇Ω−b·∇Ωapp/ba∇dblL2/lessorsimilar/ba∇dblΩ−Ωapp/ba∇dbl1/lessorsimilar/ba∇dblΩ−Ωapp/ba∇dbls0+σ≤Cλ−2δ\ntherefore\n/ba∇dblb·∇Ω/ba∇dblL2≥ /ba∇dblb·∇Ωapp/ba∇dblL2−/ba∇dblb·∇Ω−b·∇Ωapp/ba∇dblL2\n≥K(f,b)λ−2\n3δ−Cλ−2δ≥K(f,b)\n2λ−2\n3δ\nby takingλ4\n3δ≥K(f,b)\n2C. The latter lower bound then implies that b·∇Ω is not identically zero\nand this is a contraddiction with (11.5). The proof of Theore m 1.2 is then concluded.\nProof of Theorem 1.1. We deduce Theorem 1.1 from Theorem 1.2. Let (Ω( ·;ω),J(·;ω))∈\nHS\n0(T2,R2),S≫0,ω∈ Oλbe the solution of F/parenleftBig\nΩ(·;ω),J(·;ω)/parenrightBig\n= 0 constructed in Theorem 1.2\nand satisfying the estimate (1.15). Then, by (1.10), (1.12) , (1.13), (1.14)\nU:=λδ(−∆)−1∇⊥Ω, B:=λδ(−∆)−1∇⊥J,\nP:= ∆−1/parenleftBig\nλ1+ηdivf+div[(B·∇)B]−div[(U·∇)U]/parenrightBig\n, δ= 3η\nsolves the system (1.5). By the form of the Fourier multiplie r (−∆)−1∇⊥, one clearly has that\nU,B∈HS+1\n0(T2,R2) and\n/ba∇dblU/ba∇dbls+1≃λδ/ba∇dblΩ/ba∇dbls,/ba∇dblB/ba∇dbls+1≃λδ/ba∇dblJ/ba∇dbls,∀0≤s≤S.(11.6)\nHence, the latter estimate, together with the second estima te in (1.15) and the interpolation esti-\nmate (2.8) (and δ= 3η) imply that\n/ba∇dblU/ba∇dblS+1/lessorsimilarSλ3η,/ba∇dblB/ba∇dblS+1/lessorsimilarSλ−3ηand\n/ba∇dblP/ba∇dblS+1/lessorsimilarλ1+η/ba∇dblf/ba∇dblS+/ba∇dblB·∇B/ba∇dblS+/ba∇dblU·∇U/ba∇dblS\n/lessorsimilarSλ1+η+/ba∇dblB/ba∇dbl2\nS+1+/ba∇dblU/ba∇dbl2\nS+1\n/lessorsimilarSλ1+η+λ6η0<η≪1\n/lessorsimilarSλ1+η.\nTheupperboundfor U,B,Pin(1.8) thenfollows. Wenow prove thelower bounds. By thees timate\n(11.6) and by the first estimate in (1.15), one has that\n/ba∇dblU/ba∇dblS+1+/ba∇dblB/ba∇dblS+1≥ /ba∇dblU/ba∇dblS+1≃λδ/ba∇dblΩ/ba∇dblS/greaterorsimilarSλδλ−2\n3δδ=3η\n/greaterorsimilarSλη.\nNow by assumingthat div f/\\e}atio\\slash= 0, usingthat f∈HS\n0(T2,R2), divf∈HS−1\n0(T2,R2), by the estimate\n(2.8), using that /ba∇dblU/ba∇dblS+1/lessorsimilarSλ3η,/ba∇dblB/ba∇dblS+1/lessorsimilarSλ−3η/lessorsimilarS1,\n/ba∇dblP/ba∇dblS+1/greaterorsimilarλ1+η/ba∇dbldivf/ba∇dblS−2−/ba∇dblU·∇U/ba∇dblS−/ba∇dblB·∇B/ba∇dblS\n/greaterorsimilarSλ1+η−/ba∇dblU/ba∇dbl2\nS+1−/ba∇dblB/ba∇dbl2\nS+1\n/greaterorsimilarSλ1+η−λ6ηλ≫1,0<η≪1\n/greaterorsimilarSλ1+η.\nThe proof of the claimed theorem is then concluded.LARGE AMPLITUDE TRAVELING WAVES MHD 59\nReferences\n[1]P. Baldi, M. Berti, E. Haus, R. Montalto :Time quasi-periodic gravity water waves in finite depth . Invent.\nMath.214(2), 739-911 (2018).\n[2]P. Baldi, R. Montalto :Quasi-periodic incompressible Euler flows in 3D . Adv. Math. 384, 107730 (2021).\n[3]R. Beekie, S. Friedlander, V. Vicol :On Moffatt’s magnetic relaxation equations . Comm. Math. Phys.\n390(3), 1311-1339 (2022).\n[4]M. Berti, R. Feola, M. Procesi, S. Terracina :Reducibility of Klein-Gordon Equations with maximal order\nperturbations . In preparation.\n[5]M. Berti, Z. Hassainia, N. Masmoudi :Time quasi-periodic vortex patches of Euler equation in the plane.\nInvent. Math. 233, 1279-1391 (2023).\n[6]M. Berti, L. Franzoi, A. Maspero :Traveling quasi-periodic water waves with constant vortic ity. Arch. Rat.\nMech. Anal. 240, 99-202 (2021).\n[7]M. Berti, L. Franzoi, A. Maspero :Pure gravity traveling quasi-periodic water waves with con stant vorticity .\nComm. Pure Appl. Math. 77(2), 990-1064 (2024).\n[8]M. Berti, R. Montalto :Quasi-Periodic Standing Wave Solutions of Gravity Capilla ry Standing Water Waves .\nMem. Amer. Math. Soc., vol. 263(1273), 2019.\n[9]M. Berti, T. Kappeler, R. Montalto :Large KAM tori for perturbations of the defocusing NLS equat ion.\nAst´ erisque 403, (2018).\n[10]M. Berti, T. Kappeler, R. Montalto :Large KAM Tori for Quasi-linear Perturbations of KdV . Arch.\nRational Mech. Anal. 239, 1395-1500 (2021).\n[11]Y. Brenier :Topology-preserving diffusion of divergence-free vector fie lds and magnetic relaxation . Comm. Math.\nPhys.330(2), 757-770 (2014).\n[12]P. Caro, G. Ciampa, R. Luc `a:Magnetic reconnection in Magnetohydrodynamics .\nhttps://arxiv.org/abs/2209.09600\n[13]P. Constantin, F. Pasqualotto :Magnetic Relaxation of a Voigt-MHD System . Comm. Math. Phys. 402,\n1931-1952 (2023).\n[14]T. G. Cowling :Magnetohydrodynamics . Hilger, London, 1976.\n[15]N. Crouseilles, E. Faou :Quasi-periodic solutions of the 2D Euler equation . Asympt. Anal. 81, 31-34 (2013).\n[16]G. Duraut, J.-L. Lions :In´ equations en thermo´ elasticit´ e et magn´ etohydrodyna mique. Arch. Rational Mech.\nAnal.46, 241-279 (1972).\n[17]E. Roulley :Periodic and quasi-periodic Euler-alpha flows close to Rank ine vortices. Dynamics of Partial\nDifferential Equations 20, no. 4, 311-366 (2023).\n[18]A. Enciso, D. Peralta-Salas :Knots and links in steady solutions of the Euler equation . Ann. of Math. 175,\n345–367, (2012).\n[19]A. Enciso, D. Peralta-Salas, F. Torres de Lizaur :Quasi-periodic solutions to the incompressible Euler\nequations in dimensions two and higher . Journal Diff. Eq. 354, 170-182 (2023).\n[20]D. Faraco, S. Lindberg, L. Sz `ekelyhidi :Bounded solutions of ideal MHD with compact support in space -time.\nArch. Ration. Mech. Anal. 239, 51-93 (2020).\n[21]C. Fefferman, D. McCormick, J. Robinson, J. Rodrigo :Higher order commutator estimates and local\nexistence for the non-resistive MHD equations and related m odels. J. Funct. Anal. 267(4), 1035-1056 (2014).\n[22]C. Fefferman, D. McCormick, J. Robinson, J. Rodrigo :Local Existence for the Non-Resistive MHD\nEquations in Nearly Optimal Sobolev Spaces . Arch. Rational Mech. Anal. 223, 677–691 (2017).\n[23]R. Feola, F. Giuliani :Quasi-periodic traveling waves on an infinitely deep fluid un der gravity . To appear on\nMemoirs AMS (2022).\n[24]R. Feola, F. Giuliani, R. Montalto, M. Procesi :Reducibility of first order linear operators on tori via\nMoser’s theorem . J. Funct. Anal. 276(3), 932-970 (2019).\n[25]R. Feola, F. Giuliani, M. Procesi :Reducibility for a class of weakly dispersive linear operat ors arising from\nthe Degasperis Procesi equation . Dynamics of Partial Differential Equations, Vol.16, No.1, 25-94 (2019).\n[26]L. Franzoi, A. Maspero :Reducibility for a fast-driven linear Klein–Gordon equati on. Annali di Matematica\n198(4), 1407–1439 (2019).\n[27]L. Franzoi, R. Montalto :A KAM approach to the inviscid limit for the 2D Navier-Stokes equations . To\nappear in Annales Henri Poincar´ e, available at https://arxiv.org/abs/2207.11008v1 .\n[28]L. Franzoi, R. Montalto: Time almost-periodic solutions of the incompressible Eule r equations.\nhttps://arxiv.org/abs/2312.10514 .\n[29]L. Franzoi :Reducibility for a linear wave equation with Sobolev smooth fast-driven potential . Discrete and\nContinuous Dynamical Systems- Series A 43(9), 3251–3285 (2023).\n[30]H. Kozono :Weak and classical solutions of the two-dimensional magnet o-hydrodynamic equations . Tohoku\nMath. J. (2) 41(3), 471-488 (1989).\n[31]J. G´omez-Serrano, A. D. Ionescu, J. Park :Quasiperiodic solutions of the generalized SQG equation .\nhttps://arxiv.org/abs/2303.03992\n[32]Z. Hassainia :On the Global Well-Posedness of the 3D Axisymmetric Resisti ve MHD Equations . Ann. Henri\nPoincar´ e 23, 2877-2917 (2022).60 G. CIAMPA, R. MONTALTO, AND S. TERRACINA\n[33]Z. Hassainia, T. Hmidi, N. Masmoudi :KAM theory for active scalar equations .\nhttps://arxiv.org/abs/2110.08615\n[34]Z. Hassainia, T. Hmidi, E. Roulley :Invariant KAM tori around annular vortex patches for 2D Eule r equa-\ntions.https://arxiv.org/abs/2302.01311\n[35]Z. Hassainia, E. Roulley :Boundary effects on the emergence of quasi-periodic solution s for Euler equations .\nhttps://arxiv.org/abs/2202.10053\n[36]T. Hmidi :On the Yudovich solutions for the ideal MHD equations . Nonlinearity 27, 3117-3158 (2014).\n[37]T. Hmidi, E. Roulley :Time quasi-periodic vortex patches for quasi-geostrophic shallow-water equations .\nhttps://arxiv.org/abs/2110.13751\n[38]G. Iooss, P. Plotnikov :Small divisor problem in the theory of three-dimensional wa ter gravity waves. Mem.\nAm. Math. Soc. 200 (940), viii+128 (2009).\n[39]G. Iooss, P. Plotnikov :Asymmetrical tridimensional traveling gravity waves . Arch. Rat. Mech. Anal. 200(3),\n789–880 (2011).\n[40]Q. Jiu, D. Niu :Mathematical results related to a two-dimensional magneto -hydrodynamic equations . ActaMath.\nSci. Ser. B Engl. Ed. 26(4), 744-756 (2006).\n[41]Z. Lei:On axially symmetric incompressible magnetohydrodynamic s in three dimensions . J. Differ. Equ. 259,\n3202-3215 (2015).\n[42]M. N`u˜nez:The limit states of magnetic relaxation . J. Fluid Mech. 580, 251-260 (2007).\n[43]L. D. Landau, E. M. Lifshitz :Electrodynamics of continuous media . Second edition. Pergamon, Oxford, 1984.\n[44]F. Lin, L. Xu, P. Zhang :Global small solutions of 2-D incompressible MHD system . J. Differ. Equ. 259(10),\n5440-5485 (2015).\n[45]F. Lin, P. Zhang :Global Small Solutions to an MHD-Type System: The Three-Dim ensional Case . Comm. Pure\nAppl. Math. 67, 531-580 (2014).\n[46]H. K. Moffat :Magnetostatic equilibria and analogous Euler flows of arbit rarily complex topology. Part 1.\nFundamentals. J. Fluid Mech. 159, 359-378 (1985).\n[47]R. Montalto :The Navier-Stokes Equation with Time Quasi-Periodic Exter nal Force: Existence and Stability\nof Quasi-Periodic Solutions . J. Dyn. Differ. Equations 33, 1341-1362 (2021).\n[48]L. Ni, H. Ji, N. Murphy, J. Jara-Almonte :Magnetic reconnection in partially ionized plasmas . Proc. R.\nSoc. A. Vol. 476 Issue 2236 (2020).\n[49]E. Priest and T. Forbes :Magnetic Reconnection, MHD Theory and Applications . Cambridge University\nPress, Cambridge (2000).\n[50]X. Ren, J. Wu, Z. Xiang, Z. Zhang :Global existence and decay of smooth solution for the 2-D MHD equations\nwithout magnetic diffusion . J. Funct. Anal. 267(2), 503-541 (2014).\n[51]E. Roulley :Periodic and quasi-periodic Euler- αflows close to Rankine vortices.\nhttps://arxiv.org/abs/2208.13109\n[52]M. Sermange, R. Temam :Some mathematical questions related to the MHD equations . Comm. Pure Appl.\nMath.36(5), 635-664 (1983).\n[53]P. G. Schmidt :On a magnetohydrodynamic problem of Euler type . J. Differential Equations 74(2), 318-335\n(1988).\n[54]P. Secchi :On the equations of ideal incompressible magnetohydrodyna mics. Rend. Sem. Mat. Univ. Padova 90,\n103-119 (1993).\n[55]A. E. Taylor, D. C. Lay :Introduction to Functional Analysis , 2nd edition, John Wiley & Sons, New York,\nChichester, Brisbane, Toronto, 1980.\n[56]G. Wu:Regularity criteria for the 3D generalized MHD equations in terms of vorticity . Nonlinear Analysis 71,\n4251-4258 (2009).\n[57]L. Xu, P. Zhang :Global Small Solutions to Three-Dimensional Incompressib le Magnetohydrodynamical System .\nSIAM J. Math. Anal. 47, 26-65 (2015).\n[58]V.I. Yudovich. Non-stationary flow of an incompressible liquid. Vychisl. Mat. Mat. Fiz. 3, 1032-1066, 1963.\n(G. Ciampa) Dipartimento di Matematica “Federigo Enriques”, Universi t`a degli Studi di Milano,\nVia Cesare Saldini 50, 20133 Milano, Italy.\nEmail address :gennaro.ciampa@unimi.it\n(R. Montalto) Dipartimento di Matematica “Federigo Enriques”, Universi t`a degli Studi di Milano,\nVia Cesare Saldini 50, 20133 Milano, Italy.\nEmail address :riccardo.montalto@unimi.it\n(S. Terracina) Dipartimento di Matematica “Federigo Enriques”, Universi t`a degli Studi di Milano,\nVia Cesare Saldini 50, 20133 Milano, Italy.\nEmail address :shulamit.terracina@unimi.it" }, { "title": "2401.18014v1.Bayesian_regularization_for_flexible_baseline_hazard_functions_in_Cox_survival_models.pdf", "content": "arXiv:2401.18014v1 [stat.ME] 31 Jan 2024Biometrical Journal 52(2010) 61, zzz–zzz / DOI: 10.1002/bimj.200100000\nBayesian regularization for flexible baseline hazard funct ions in\nCox survival models\nElena L ´azaro∗,1, Carmen Armero1,andDanilo Alvares2\n1Department of Statistics and Operation Research, Universi ty of Valencia, 46100 Burjassot, Spain\n2Department of Statistics, Pontificia Universidad Cat´ olic a de Chile, 7820436 Macul, Chile\nReceived zzz, revised zzz, accepted zzz\nFully Bayesian methods for Cox models specify a model for the baseline hazard function. Parametric ap-\nproaches generally provide monotone estimations. Semi-pa rametric choices allow for more flexible patterns\nbut they can suffer from overfitting and instability. Regula rization methods through prior distributions with\ncorrelated structures usually give reasonable answers to t hese types of situations.\nWe discuss Bayesian regularization for Cox survival models defined via flexible baseline hazards spec-\nified by a mixture of piecewise constant functions and by a cub ic B-spline function. For those “semi-\nparametric” proposals, different prior scenarios ranging from prior independence to particular correlated\nstructures are discussed in a real study with micro-virulen ce data and in an extensive simulation scenario\nthat includes different data sample and time axis partition sizes in order to capture risk variations. The pos-\nterior distribution of the parameters was approximated usi ng Markov chain Monte Carlo methods. Model\nselection was performed in accordance with the Deviance Inf ormation Criteria and the Log Pseudo-Marginal\nLikelihood.\nThe results obtained reveal that, in general, Cox models pre sent great robustness in covariate effects and\nsurvival estimates independent of the baseline hazard spec ification. In relation to the “semi-parametric”\nbaseline hazard specification, the B-splines hazard functi on is less dependent on the regularization process\nthan the piecewise specification because it demands a smalle r time axis partition to estimate a similar be-\nhaviour of the risk.\nKey words: Correlated prior process; Cubic B-splines; Piecewise func tions; Survival analysis;\nWeibull distribution.\nSupporting Information for this article is available from t he author or on the WWW under\nhttp://dx.doi.org/10.1022/bimj.XXXXXXX (please delete if not applicable)\n1 Introduction\nThe Cox proportional hazards model (Cox, 1972) is the most po pular regression model in survival analysis.\nIt expresses the hazard function h(t)of the survival time of each individual in the target populat ion as\nthe product of a common baseline hazard function h0(t), which determines the shape of h(t), and an\nexponential regression term which includes the relevant co variates.Baseline hazard misspecification can\nimply a loss of valuable information that is necessary to ful ly report the estimation of the outcomes of\ninterest, such as probabilities or survival curves (Roysto n, 2011). This issue is especially important in\nsurvival studies where h0(t)represents the natural course of a disease or an infection, o r even the control\ngroup when comparing several treatments.\nThe frequentist estimation of the Cox model focuses on the re gression coefficients β, which can be\nobtained without specifying a model for h0(t)by using the partial likelihood methodology (Cox, 1972;\n∗Corresponding author: e-mail: elena.lazaro@uv.es , Phone: +34-665-813-113\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com2 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\nvan Houwelingen and Stijnen, 2014). Frequentist Cox can als o provide a point estimation of h0(t)by\nmeans of the Breslow estimator by plugging the estimate ˆβintoβand point estimations of the survival\nfunction via analogues of the Nelson-Aalen and the Kaplan-M eier estimators (van Houwelingen and Stijnen,\n2014). Uncertainty about these estimates is assessed throu gh confidence intervals which rely on asymp-\ntotics (Andersen and Gill, 1982; Tsiatis, 1981).\nBayesian analysis of the Cox model needs to specify a model fo rh0(t)(Christensen et al., 2011). It\nprovides a natural framework to jointly analyse all the unce rtainties in the statistical modelling, h0(t)\nandβ, by means of its joint posterior distribution. This posteri or contains all the relevant information\nfrom the study and it is usually the starting point for the sub sequent estimation and prediction of the out-\ncomes of interest. In this regard, Bayesian inference, unli ke frequentist statistics, does not generally use\nasymptotic arguments to assess the variability of the estim ates (Ibrahim et al., 2001). Baseline hazard\nfunctions can be defined through parametric or semi-paramet ric approaches. Parametric models give re-\nstricted shapes which do not allow for the presence of irregu lar behaviours (Dellaportas and Smith, 1993;\nKim and Ibrahim, 2000). Semi-parametric choices result in fl exible baseline shapes (Sahu et al., 1997;\nIbrahim et al., 2001) but they may suffer from overfitting and instability (Breiman, 1996). Regularization\nmethods modify the estimation procedures to solve these typ es of problems. Frequentist regularization\nintroduces some changes in the likelihood function. Bayesi an reasoning accounts for this issue through\nprior distributions.\nIn fully Bayesian studies, the joint posterior distributio n is obtained via Bayes’ theorem from the like-\nlihood function and the prior distribution. This is why the p rior can be considered as the element that\nregularizes the likelihood and the reason why the elicitati on of prior distributions is relevant, particularly\nin survival analysis when h0(t)is defined in terms of flexible modelling. The selection of dif ferent base-\nline hazard functions implies different likelihood specifi cations and different prior distributions, which for\na givenh0(t)can range from prior independence to some particular correl ated prior distributions in order\nto avoid overfitting.\nThe prior distribution is a fundamental element of Bayesian methodology that serves as a starting point\nfor any Bayesian study. In general terms, prior distributio ns can be non-informative (or almost) or in-\nformative. Non-informative distributions try to play a neu tral role in the inferential process and give full\nprominence to the data. Informative prior distributions ar e relevant in the statistical procedure, especially\nin studies with little data. In these cases, it is especially important to add sensitivity analyses to the study\nin order to check the robustness of the results with regard to the elicited prior distributions. A non-robust\nprior distribution can be the source of important biases in t he results (Berger et al., 1994; Ibrahim et al.,\n2011).\nRegularization methods originated in mathematical settin gs and were fruitfully and widely dissemi-\nnated to the world of statistics, providing many different a pproaches and concepts (Girosi et al., 1993;\nBenner et al., 2010). All of them share the general and easy id ea of combining the aim of simultaneously\nlooking for a function that is close to the data and also smoot h. The statistical background on the subject,\nBayesian and mainly frequentist, is so extensive that revie wing and understanding the concepts, issues and\nrelationships within each statistical approach is beyond t he scope of this paper (see Bickel (2006) for an\nup-to-date review).\nWe have a twofold objective in this paper: to assess the role o f the specification of h0(t)and to discuss\nthe effect of the Bayesian regularization in the case of semi -parametric modelling of h0(t). We consider\ntwo flexible specifications for h0(t)that allow for multimodal patterns: a mixture of piecewise c onstant\nfunctions (Sahu et al., 1997) and a cubic B-spline function ( Hastie et al., 2009). A Weibull baseline hazard\ndistribution, the usual parametric proposal for h0(t), is also included for comparison purposes. The base-\nline risk functions with which we work in this paper, as well a s the different prior distributions considered,\nare methodological proposals known in Bayesian literature that, as far as we know, have not been compared\nto date. The novelty of our work lies in this comparison, whic h we carry out through different criteria of\ngoodness for the estimated models.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 3\nPiecewise constant functions for h0(t)have a long tradition in Bayesian survival (Kalbfleisch and P rentice,\n1973; Sahu et al., 1997). Relevant proposals that induce cor related structures in the subsequent prior\ndistribution for the coefficients of the piecewise function s are based on discrete time martingale pro-\ncesses, Gamma process priors, and random-walk priors (Ibra him et al., 2001). Cubic B-spline functions\nforh0(t)are far more recent. They come from the world of generalized a dditive models (Hastie et al.,\n2009) and are widely used in spatial and spatio-temporal ana lysis. Their use in survival settings was\nproposed by Cai et al. (2002), Fahrmeir and Hennerfeind (200 3) and Sharef et al. (2010) by means of\nfirst or second random walk smoothness priors with Gaussian e rrors. Other flexible models for base-\nline hazard functions are based on low-rank thin plate linea r splines (Murray et al., 2016), truncated basis\nsplines (Crainiceanu et al., 2005), M-splines (Benner et al ., 1988) or the popular P-splines (P. H. C. Eilers and Durb´ an ,\n2015), particular B-splines with penalties in the frequent ist setting.\nThe remainder of this article is organized as follows. Secti on 2 introduces Weibull, piecewise constant\nand B-spline baseline hazard functions for the Cox model as w ell as the most common prior distributions\nfor these scenarios. Section 3 explores non-penalized freq uentist and Bayesian estimation with piecewise\nconstant and cubic B-spline functions and discusses Bayesi an regularization for h0(t)for a real microbial\nvirulence study. Section 4 explores various simulation sce narios to compare the behaviour of the different\nh0(t)and prior distributions. These last two sections deal with r egularization in the semi-parametric set-\ntings with regard to different partitions of the time axis in which a mixture of piecewise constant and cubic\nB-spline functions are defined. The article ends with some ge neral remarks and conclusions.\n2 Cox proportional hazards model\nLetTibe the random variable that accounts for the observed event t ime for individual i,i= 1,...,n .\nIt is defined as Ti=min(T∗\ni,Ci), the minimum between the true failure time for individual i,T∗\ni, and\nthe right-censoring time, Ci, determined by the end of the study (administrative censori ng). The event\nindicatorδi=I(T∗\ni≤Ci)is 1 if the survival time is observed, and 0 otherwise. We assu me thatT∗\ni\nis a continuous random variable with survival function, Si(t) =P(T∗\ni> t), and hazard function hi(t),\n∀t≥0, which represents the instantaneous rate of occurrence of t he event.\nThe Cox proportional hazards model for T∗\niexpresses the hazard function for individual iin the form\nhi(t|h0,xi,β) =h0(t)exp{x′\niβ}, (1)\nwherexiis a vector of Jcovariates, βis the vector of regression coefficients, and h0(t)is the baseline\nhazard function.\n2.1 Baseline hazard function\nWe discuss three different proposals for h0(t), a Weibull hazard function and two semi-parametric ones,\nnamely a mixture of piecewise constant functions and a cubic B-spline function.\nWeibull function\nThe most popular parametric model for h0(t)is the Weibull distribution, We (α,λ), with shape parameter\nα>0and scaleλ>0, and baseline hazard function\nh0(t|α,λ) =λαtα−1, t>0. (2)\nThis is a traditional model for survival data in biometrical applications. It is highly suitable thanks to\nits computational simplicity, especially in small-sample settings, but it has no flexibility to represent risks\naway from monotonicity (Lee et al., 2016).\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com4 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\nMixture of piecewise constant functions\nPiecewise functions are defined by polynomial functions. Th ey generate a flexible framework for mod-\nelling survival data with a long tradition (Henschel et al., 2009; Ibrahim et al., 2001) in the Bayesian liter-\nature as alternative models to Weibull h0(t). The overall shape of the baseline hazard function does not\nhave to be imposed in advance as is the case with the parametri c models.\nWe assume a finite partition of the time axis with knots c0≤c1≤...≤cK, wherec0= 0, andcKare\nusually taken as the last observed survival or censoring tim e. The hazard function is a mixture of piecewise\nconstant functions defined as\nh0(t|ϕ) =K/summationdisplay\nk=1ϕkI(ck−1,ck](t), t>0, (3)\nwhereϕ= (ϕ1,...,ϕ K),I(ck−1,ck](t)is the indicator function defined as 1 when t∈(ck−1,ck]and 0\notherwise. This baseline hazard function is usually known a s the piecewise constant (PCfrom now on).\nCubic B-spline functions\nWe assume the same finite partition of the time axis as specifie d for the PCbaseline hazard function. The\nspline function for the baseline hazard function is usually defined in logarithmic scale (Murray et al., 2016)\nto accommodate normality and positivity for the subsequent selection of prior distributions. It is defined as\nlog(h0(t|γ)) =K+3/summationdisplay\nk=1γkB(k,4)(t), t>0, (4)\nwhereγ= (γ1,...,γ K+3),{B(k,4)(t),k= 1,...,K+ 3}is a cubic basis of B-splines with boundary\nknotsc0andcKand internal knots ck, k= 1,..,K−1defined recursively by means of the de Boor\nformula (Boor, 1978) as\nB(k,4)(t) =t−τk\nτk+3−τkB(k,3)(t)+τk+4−t\nτk+4−τk+1B(k+1,3)(t), k= 1,...,K+3, (5)\nwhereB(k,1)(t) = 1 ifτk≤t≤τk+1,k= 1,2,...,K and zero otherwise. It is worth noting that the\ndefinition of this B-spline function needs augmentation of t he original knot sequence c= (c0,c1,...,c K)\ntoτ, defined as (Hastie et al., 2009)\nτ1≤...≤τ4≤c0;τj+4=cj, j= 1,2,...,K−1;cK≤τK+4≤...≤τK+7. (6)\nThis modelling strategy is known as a piecewise cubic B-spline function (PSfrom now on). Note that\nfunctions in hazard (3) are B-spline functions of order 1.\n2.2 Bayesian inferential process\nRegularization\nPCandPSbaseline hazard functions can accommodate different shape s depending on the particular char-\nacteristics of the partition of the time axis. This is a relev ant issue with a great amount of research ac-\ntivity: Breslow (1974) considered various failure times as end points of intervals; Kalbfleisch and Prentice\n(1973) supported the theory that the grid should be selected independently of the data; Murray et al. (2016)\nproposed equally-spaced partitions; Henschel et al. (2009 ) fixed the intervals assuming the condition that\nall the intervals contain comparable information, i.e. a si milar number of events; and Lee et al. (2016)\navoided reliance on fixed partitions of the time scale by intr oducing the number of splits as a parameter\nto be estimated. When Kis large, the model has so many parameters that it could suffe r from overfit-\nting problems. On the contrary, choices of Kthat are too small will lead to poor model fitting. When\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 5\nusing a shrinkage or regularization procedure, the effect o f increasing Koften diminishes. Regularization\nprocesses in the Bayesian setting are usually carried out by means of informative prior distributions that\nrestrict the freedom of the parameters.\nThe elicitation of prior distributions for PCandPSbaseline hazard functions includes different prior\ndistribution proposals for the coefficients ϕandγin (3) and (4), respectively. They range from a default\nsituation of prior independence among all the coefficients t o a correlated prior distribution that accounts\nfor shape restrictions in order to avoid overfitting and stro ng irregularities in the estimation process.\nWe consider four prior scenarios for h0(t)defined in terms of a mixture of piecewise constant functions\nbased on different correlation patterns among the coefficie nts associated with the piecewise functions.\nScenario PC1. Independent gamma prior distributions\nπ(ϕk) =Ga(ηk,ψk), k= 1,2,...,K. (7)\nThis is the most flexible and general prior scenario. A common selection isηk=ψk= 0.01.\nScenario PC2. Independent gamma prior distributions\nπ(ϕk) =Ga(w0η0(ck−ck−1),w0(ck−ck−1)), k= 1,...,K. (8)\nAll these marginal prior distributions share the same prior expectation, η0, but the prior variance of each\nϕkis inversely proportional to the corresponding interval le ngth,ck−ck−1. The selection w0= 0.01is\na usual value which provides the prior distribution with a hi gh level of uncertainty. We will assume the ad\nhocproposal by Christensen et al. (2011) for the elicitation of η0that considers η0= 0.69315/˜t, where˜t\nis the median survival time of the reference group.\nScenario PC3. Correlated conditional gamma prior distributions\nπ(ϕk|ϕ1,...,ϕ k−1) =Ga(ηk, ηk/ϕk−1), k= 2,...,K. (9)\nThis prior is based on a discrete-time martingale process (S ahu et al., 1997) which correlates the ϕ’s\nof adjacent intervals with E (ϕk|ϕ1,...,ϕ k−1) =ϕk−1and Var(ϕk|ϕ1,...,ϕ k−1) =ϕ2\nk−1/ηk. The\nparameterηkis very important because it controls the level of smoothnes s, which decreases as ηkreaches\nzero. A common elicitation is ηk= 0.01, k= 2,...,K andπ(ϕ1) =Ga(0.01,0.01).\nScenario PC4. Correlated conditional normal prior distributions for the ϕcoefficients in a logarithmic\nscale\nπ(log(ϕk)|ϕ1,...,ϕ k−1) =N(log(ϕk−1),σ2\nϕ), k= 2,...,K, (10)\nwithπ(log(ϕ1)) = N(0,σ2\nϕ). This is also a proposal based on a discrete-time martingale process. It comes\nfrom the areas of spatial statistics (Banerjee et al., 2014) and Bayesian B-splines (Lang and Brezger, 2004),\nwhere it is better known as a first-order random walk. Correla tion between the log (ϕk)corresponding to\nneighbouring intervals is expressed assuming conditional normal prior distributions.\nNon-informative prior distributions for σ2\nϕhave generally been taken as inverse gamma distributions,\nIG(ν0,ν0), with small values for ν0. However, some research questions the role of these distrib utions for\ndescribing lack of prior information. Gelman (2006) propos ed the use of proper uniforms and half-t dis-\ntributions for the standard deviations as sensible choices , which were understood as reference models to\nbe used as a standard of comparison or a starting point of the i nferential process (Bernardo, 1979). We\nalso considered different prior specifications for the coef ficients of the PSmodelling of baseline hazard\nfunctions that follow the idea of smoothing its level of flexi bility and prevent overfitting. These scenarios\nare not a mere repetition of those considered for PCbaseline hazard functions. They have been chosen\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com6 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\nbecause they are usual proposals in the statistical literat ure regarding cubic B-splines specifications.\nScenario PS1. Independent normal prior distributions\nπ(γk) =N(0,σ2\nk), k= 1,...,K+3. (11)\nThis is the simplest scenario, similar to PC1, in whichγkare considered as independent and normally\ndistributed with a known variance.\nScenario PS2. Hierarchical normal prior distributions\nπ(γk|σ2\nγ) =N(0,σ2\nγ), k= 1,...,K+3, (12)\nwhereσ2\nγis the common variance population. As mentioned previously , a usual choice for the hyperprior\ndistribution for σ2\nγis an inverse gamma distribution or also a proper uniform dis tribution (Gelman, 2006).\nScenario PS3. Correlated conditional normal prior distributions defined as\nπ(γk|γ1,...,γ k−1) =N(γk−1,σ2\nγ), k= 2,...,K+3, (13)\nand based on a first-order Gaussian random walk which involve s an intrinsic Gaussian Markov random\nfield as the conditional joint prior distribution for the spl ine coefficients given σ2\nγ. This proposal comes\nfrom the so-called Bayesian P-splines (Lang and Brezger, 20 04; Fahrmeir and Kneib, 2011). It has been\nwidely used in Bayesian spatial statistics (Banerjee et al. , 2014), where it is usually expressed in terms of\nconditional distributions in the form\nπ(γk|γ−k) =N/parenleftbigg1\n2(γk−1+γk+1),2σ2\nγ/parenrightbigg\n, k= 2,...,K+3, (14)\nwhereγ−kdenotes all spline coefficients except γk. Popular marginal prior distribution choices for σγ\nthat try to be as neutral as possible are Ga (1,0.0005) (Lang and Brezger, 2004) and Ga(0.001, 0.001)\nas a default option in the software BayesX (Belitz et al., 2015). This scenario is analogous to Scenario\nPC4. Consequently, all the discussion regarding the elicitati on of the prior distribution for the variance σ2\nγ\n(precision or standard deviation τγandσγ, respectively) also applies here.\nPosterior distribution\nWe considered a prior independent scenario between the para meters inh0(t)and the regression coefficients\nassociated to covariates. We also reckoned prior independe nce between the regression coefficients within\nanon-informative scenario, with normal distributions centred at zero and a wi de known variance:\nπ(h0,β) =π(h0)π(β) =π(h0)/producttextJ\nj=1N(βj|0,σ2\nj), (15)\nwhereπ(h0)is the prior distribution of all parameters and hyperparame ters inh0(t). The model needs\nto be fed with data D={(ti,δi,xi),i= 1,...,n}, wheretiis the observed survival time for the ith\nindividual,δiis the indicator taking 1 if the event has occurred and 0 other wise, and xiare the subsequent\ncovariates.\nBayes’ theorem combines prior knowledge and experimental i nformation in the posterior distribution\nπ(h0,β| D)∝ L(h0,β)π(h0,β),\nwhereL(h0,β)is the likelihood function of (h0,β)given by Ibrahim et al. (2001) as\nL(h0,β) =n/productdisplay\ni=1h0(ti)δiexp{−H0(ti)}[exp{x′\niβ}]δiexp{exp{x′\niβ}}, (16)\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 7\nwithH0(t) =/integraltextt\n0h0(u)duas the cumulative baseline hazard function.\nIn the case of a Weibull hazard baseline function, the cumula tive baseline hazard function is H0(t) =\nλtα,t>0.When the baseline function is defined via a mixture of piecewi se constant functions, as in (3)\nH0(t) =/summationtextk−1\nm=1ϕm(cm−cm−1)+ϕk(t−ck−1), ck−1≤t0,\nwhereϕ1= 0.5in0< t≤0.2,ϕ2= 2.5in0.2< t≤0.4,ϕ3= 0.5in0.4< t≤0.6,ϕ4= 1 in\n0.60.8.\nScenario 3 . A mixture of two Weibull distributions\nh0(t|α1,α2,λ1,λ2) =λ1α1tα1−1pexp{−λ1tα1}+λ2α2tα2−1(1−p)exp{−λ2tα2}\npexp{−λ1tα1}+(1−p)exp{−λ2tα2}, t>0\nwith shapeα1= 3,α2= 1, scaleλ1=λ2= 0.5, and mixing probability parameter p= 0.2.\nThese scenarios included an indicator covariate with regre ssion coefficient β= 1. Data were assigned\nto each group according to a Bernoulli distribution with pro bability 0.5. We considered right censoring\nat timeCR. It was previously fixed for each scenario from the condition S0(CR) = 0.3for the baseline\nsurvival function. Each scenario was replicated R= 100 times for sample sizes of N= 100 andN= 300 .\nAll the simulated dataset were analysed via each of the state d modellings discussed in Section 2. The\nestimation of the PCandPSmodels was based on two different partitions of the time axis withK= 5 and\n15 knots with intervals of the same length ((Murray et al., 20 16)). The last knot in all models corresponds\nto the previously referred censored time ( CR), which is the longest survival time observed.\n4.2 Generating survival times\nWe follow the inversion method (Bender et al., 2005; Austin, 2012; Crowther and Lambert, 2013) to sim-\nulate survival data for Scenarios 1 and2. This method is based on the relationship between the cumula tive\ndistribution function (CDF) of a survival random variable a nd a standard uniform random variable. It\ncan be directly applied when the subsequent CDF has a closed f orm expression and can be directly in-\nverted and easily implemented with R(R Core Team, 2013) packages simsurv (Brilleman, 2013) and\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 11\nSimSCRPiecewise (Chapple, 2016). The inversion method for Scenario 3 is not directly suitable.\nThe subsequent cumulative hazard function cannot be direct ly inverted and we have used iterative root-\nfinding techniques (Crowther and Lambert, 2013) to solve it. This procedure is implemented for the R\nsoftware (R Core Team, 2013) in the simsurv (Brilleman, 2013) package. Further details of the inver-\nsion method and its corresponding extension to simulate com plex baseline hazard functions are described\nin the supporting information.\n4.3 Posterior inferences\nEach simulation dataset was used to estimate all the surviva l models with all the specifications of h0(t)\nand the different prior scenarios in Section 2. Posterior di stributions were approximated by JAGS soft-\nware (Plummer, 2003) based on three parallel chains with 20, 000 iterations each plus another 2,000 for\nthe burn-in period. Moreover, the chains were additionally thinned by storing every 10th draw to reduce\nautocorrelation in the sequences. Convergence of the chain s to the posterior distribution was guaranteed\nby monitoring in all inferences to ensure that the potential scale reduction factor was close to 1 and the\neffective number of independent simulation draws was great er than 100.\n4.4 Regression coefficients and baseline hazard function\nWe considered R= 100 replicas of each inferential process and, consequently, we constructed 100 ap-\nproximate random samples of the posterior distribution for β. Let{β(1)\n(r),...,β(N)\n(r)}be the approximate\nMCMC sample of size Nof the posterior marginal distribution for βcorresponding to the replica r.\nThe stability of the posterior distribution for the regress ion coefficients were assessed by means of the\nfollowing measures:\n•Bias: Difference between the average of the posterior sample mea ns of the replicas and the true\nregression coefficient, (/summationtextR\nr=1¯β(r)/R)−β, where¯β(r)is the sample mean of the posterior sample\ncorresponding to the replica r.\n•Standard error (SE) : Square root/radicalBig/summationtextR\nr=1s2\n(r)/Rof the average of the posterior variances s2\n(r)of\nthe replicas.\n•Standard deviation (SD) : Standard deviation of the set {¯β(1),...,¯β(R)}that includes the posterior\nsample mean of the regression coefficient of all replicas.\n•Coverage probability (CP) : Proportion of the R= 100 95%credible intervals which contain the\ntrue value of the regression coefficient.\nThe performance of the set of models considered was also eval uated in terms of the posterior baseline\nhazard estimates (logarithmic transformation). For the po sterior sample of each replica we construct an\napproximate posterior sample of the log baseline hazard fun ction at each time, whose average can be used\nas a point estimate of the true baseline hazard at that time. W e then merge the information of all the replicas\nto obtain a global estimation, log (/hatwideh0(t)), by calculating their average. This procedure is also usefu l for\nextracting information about the posterior variability an d constructing, for example, 95 %credible intervals\nfor the posterior of the baseline hazard at each time.\nThe accuracy of the estimation was measured through the diff erence between the posterior estimation\nof the baseline hazard and the true hazard function. A genera l measure that accounts for this difference\nover the time period of the study is the root-mean squared dev iation (RMSD), computed as\nRMSD=/radicalBigg/summationtextM\nm=1[log(/hatwideh0(tm))−log(h0(tm))]2\nM, (19)\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com12 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\na discrete approximation based on the idea of the Riemann sum s to approach an integral. At this point,\nwe would like to note that we have used a wide partition of the t ime axis, with knots spaced at 0.01time\npoints from 0 to the maximum time value of each scenario. This maximum time value is determined by\nthe corresponding censoring time ( CR).\nTABLES 3, 4, 5 AROUND HERE\nTables 3, 4 and 5 display the values of the average, bias, SE, S D and CP (related to βand RMSD (related\nto log(h0(t))) referring to the three simulation scenarios. In relation to theβestimate, the Wemodel is\nvery stable for the three scenarios and the effect of Nis not appreciated. PCandPSmodels approximate\nthe regression coefficient quite well, which is slightly aff ected by the number of knots ( K) and the sample\nsize (N).\nUnder Scenario 1 , theWe models provide the closest fit to the true function with the lo west RMSD\nvalues. PSmodels are generally better than PC’s, which show the worst performance, possibly because of\ntheir non-continuous behaviour. Under Scenario 2 ,PC4models (for N= 100 andN= 300 ) provide the\nclosest fit to the true function with the lowest RMSD values, t hereby underlining the relevance of sensitivity\nto prior scenarios. PSmodels also seem to capture the behaviour of the true functio n, on the whole, showing\nRMSD values lower than the PC1,PC2,PC3 models. The Wemodels present the highest RMSD. Under\nScenario 3 ,PSmodels provide the lowest RMSD values as a general rule. PS3 specification shows the\nlowest values for all Kconfigurations. The Wemodels present higher RMSD estimates in relation to PS’s.\nBetween PC’s,PC4specification improves the RMSD values of its PCcounterparts. For all scenarios,\nthe prior distribution has a strong effect on the baseline ha zard estimation of PCmodels.\nFigures 5, 6 and 7 show the posterior mean of the baseline haza rd function and a 95% credible bound\nfor the best models (based on RMSD criterion) between the thr ee generich0(t)specifications and for both\nNvalues for Scenario 1 ,Scenario 2 andScenario 3 . In general, models under N= 300 present lower\nRMSD values than their N= 100 counterparts as well as more accurate baseline hazard e stimates (95% of\ncredible bounds are narrower).\nFIGURES 5, 6, 7 AROUND HERE\n5 Conclusions\nWe have discussed different proposals for performing a full y time-to-event Bayesian analysis in the con-\ntext of the CPH model via parametric and semi-parametric defi nitions of the baseline hazard function. The\nBayesian methodology allows the baseline hazard functions to be implemented in an easy conceptual way,\neven semi-parametric proposals that are necessary in conte xts in which a certain complexity in the shape of\nthe underlying function is expected. On this matter, we have examined some of the most popular proposals\nin the literature related to the subject: the Weibull distri bution as the most common parametric model,\nand piecewise constant and cubic B-spline baseline hazards as semi-parametric definitions. Flexibility\nand overfitting were discussed within both semi-parametric options with regard to different regularization\nschemes expressed in terms of prior distributions and time a xis partition configurations. These develop-\nments provide a unified framework to conduct a fully Bayesian analysis of complex survival data that will\nsurely encourage more comprehensive analyses, which curre ntly often rely on some versions of the CPH\nmodel without further examination. The flexibility of our ap proach allows for easy subsequent research\non prior sensitivity, different criteria for determining t he axis partition of non-parametric proposals and\nrelationships between covariates and baseline hazard func tions. Additionally, we have also incorporated\na comparison with the frequentist approach to evaluate the p erformance of both methodologies under the\nCPH model.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 13\nThe virulence database in Section 3 illustrates the main goa ls of this paper. All inferential processes\nagree with the conclusions in Sanz-Puig et al. (2017) that th e cauliflower by-product infusion can be an al-\nternative preservation treatment. This fact evidences the robustness (regardless of the h0(t)specification)\nof the Cox model in estimating covariate effects. However, PCmodels show a certain sensitivity to axis\npartition in estimating covariate effects. The outcomes al so highlight the fact that piecewise constant and\nB-splines specifications allow us to capture and introduce ( dealing with different axis partition configura-\ntions) more flexibility in h0(t). However, piecewise constant options exhibit less flexibil ity, thus requiring\na higher number of Kas well as a prior correlation specification to behave in a sim ilar way to B-splines.\nHence, in this illustrative example the PCmodel underlines the efficacy of regularization Bayesian me th-\nods (based on defining correlation by means of prior definitio n) to overcome overfitting and instability in\nbaseline hazard estimation under high Kvalues. In relation to the survival function estimation, th is derived\nquantity shows greater robustness regardless of the baseli ne hazard specification. Both DIC and LPML re-\ninforce the evidence observed in sensitivity analyses in wh ichPSmodels show better behaviour than PC\nmodels irrespective of the number of pre-fixed knots. Freque ntist methods showed similar performance to\nthe Bayesian in the Cox inferential process within a framewo rk of non-regularization in relation to Weibull\nand B-spline specification.\nWe have also exemplified our proposals through different sim ulated data generated by Weibull, piecewise\nconstant and mixtures of Weibull baseline hazard functions . In general, the outcomes indicate that moder-\nate bias can be observed in estimates of the regression coeffi cient for a treatment effect when the baseline\nhazard function specification does not match the origin spec ification. For baseline hazard estimates, we\nappreciate small differences between the true baseline haz ard and their point estimates, and lower RMSD\nvalues have a close relationship with the data-generating m odel. In terms of RMSD estimates the Weibull\nmodel provides the best results with Weibull simulated data , althoughPSmodels also exhibit good be-\nhaviour. In the case of piecewise constant simulated data, t hePC4 model is the best model, although PS\nmodels present a very good behaviour in terms of RMSD values. PS3 models provide the best estimates\nfor the Weibull mixture data. In relation to the performance of the different number of knot configurations\n(K) explored, it is generally noticeable that PC models requir e a higher number of KthanPSmodels\nwithin the same scenario. Thus, the need for regularization becomes more evident under PCmodels. In\nall scenarios, the impact of the database size has generally been evident mainly in the estimation of the\nbaseline hazard function, but has been less evident in the re gression coefficient estimate.\nAlthough in this article we have extolled the potential of Ba yesian inference in dealing with semi-parametric\nspecifications for the baseline hazard in the context of the C PH model, it must be stated that in many set-\ntings a simpler distribution may be suitable. However, usin g a more complex distribution can provide far\nmore realistic inferences in certain situations. Some inte resting issues that are beyond the scope of this pa-\nper deal with introducing uncertainty in the number of knots , including new regularization proposals such\nas penalized complexity priors, carrying out a sensitivity analysis within each scenario and also exploring\nin greater depth the performance of the frequentist approac h under the “semi-parametric” specification of\nthe baseline hazard function.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com14 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\n0 5 10 15 20 250.0 0.2 0.4 0.6 0.8 1.0\nTime (days)Survival probability (%)\nFigure 1 Kaplan-Meier survival curve, in days, for individuals fed o n a)ST0(black), b) ST1(dark gray),\nand c) ST3(gray).0.6 0.8 1.0 1.2\n0.6 0.8 1.0 1.2\n0.6 0.8 1.0 1.2\n0.6 0.8 1.0 1.20.6 0.8 1.0 1.2\n0.6 0.8 1.0 1.2\n0.6 0.8 1.0 1.2\n0.6 0.8 1.0 1.20.6 0.8 1.0 1.2\nWePC1 PC2 PC3 PC4 PS1 PS2 PS3\n(a)K=5\n0.6 0.8 1.0 1.2\nWePC1 PC2 PC3 PC4 PS1 PS2 PS3\n(b)K=10\n0.6 0.8 1.0 1.2\nWePC1 PC2 PC3 PC4 PS1 PS2 PS3\n(c)K=25\n0.6 0.8 1.0 1.2\nWePC1 PC2 PC3 PC4 PS1 PS2 PS3\n(d)K=40\nFigure 2 Posterior mean and 95% credible interval for the hazard rati os, HR ST1(row one), HR ST3(row\ntwo) and HR ST1/ST3(row three), for all survival models under evaluation.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 15−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(a)We−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(b)PC1\n−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(c)PC2\n−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(d)PC3\n−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(e)PC4−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(f)PS1\n−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(g)PS2\n−6 −3 0 3 60 5 10 15 20 25\nTime (days)\n(h)PS3\nFigure 3 Posterior mean and 95% credible interval for the log baselin e hazard function under Weibull\n(row one),PC(row two) and PS(row three) scenarios. PCandPSmodels are estimated with K= 25\nandK= 5knots, respectively.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com16 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions0.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(a)We0.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(b)PC1\n0.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(c)PC2\n0.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(d)PC3\n0.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(e)PC40.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(f)PS1\n0.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(g)PS2\n0.00 0.25 0.50 0.75 1.000 5 10 15 20 25\nTime (days)\n(h)PS3\nFigure 4 Posterior mean and 95% credible interval for the baseline su rvival function under Weibull (row\none),PC(row two) and PS(row three) scenarios. PCandPSmodels are estimated with K= 25 and\nK= 5knots, respectively.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 17−4 −2 0 2\n0.0 0.5 1.0 1.5\nTime\n(a)We. RMSD=0.039\n−4 −2 0 2\n0.0 0.5 1.0 1.5\nTime\n(b)PC1(K= 5). RMSD=0.205\n−4 −2 0 2\n0.0 0.5 1.0 1.5\nTime\n(c)PS2(K= 5). RMSD=0.095−4 −2 0 2\n0.0 0.5 1.0 1.5\nTime\n(d)We. RMSD=0.007\n−4 −2 0 2\n0.0 0.5 1.0 1.5\nTime\n(e)PC3 (K= 15 ). RMSD=0.130\n−4 −2 0 2\n0.0 0.5 1.0 1.5\nTime\n(f)PS1(K= 5). RMSD=0.063\nFigure 5 Average replica pointwise of the posterior approximate mea ns of the log-baseline hazard es-\ntimate (black solid line), average replica of the posterior 95% credible intervals (dark grey area), and\ntrue log-baseline hazard function (grey dash-dotted line) in the simulated Scenario 1 under theWe,PC1\n(K= 5),PS2(K= 5) forN=100 (row 1) and under the We,PC3(K= 15 ),PS1(K= 5) forN=\n300 (row 2).\n−4 −2 0 2\n0.00 0.25 0.50 0.75 1.00\nTime\n(a)We. RMSD=0.626\n−4 −2 0 2\n0.00 0.25 0.50 0.75 1.00\nTime\n(b)PC4 (K= 5). RMSD=0.095\n−4 −2 0 2\n0.00 0.25 0.50 0.75 1.00\nTime\n(c)PS2(K= 15 ). RMSD=0.289−4 −2 0 2\n0.00 0.25 0.50 0.75 1.00\nTime\n(d)We. RMSD=0.626\n−4 −2 0 2\n0.00 0.25 0.50 0.75 1.00\nTime\n(e)PC3 (K= 5). RMSD=0.042\n−4 −2 0 2\n0.00 0.25 0.50 0.75 1.00\nTime\n(f)PS2(K= 15 ). RMSD=0.254\nFigure 6 Average replica pointwise of the posterior approximate mea ns of the log-baseline hazard esti-\nmate (black solid line), average replica of the posterior 95 % credible intervals (grey area), and true log-\nbaseline hazard function (grey dash-dotted line) in the sim ulated Scenario 2 under theWe,PC4(K= 5),\nPS2(K= 15 ) forN= 100 (row 1) and under the We,PC3(K= 5),PS2(K= 15 ) forN= 300 (row\n2).\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com18 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions−4 −2 0 2\n0.0 0.5 1.0 1.5 2.0\nTime\n(a)We. RMSD=0.131\n−4 −2 0 2\n0.0 0.5 1.0 1.5 2.0\nTime\n(b)PC4 (K= 5). RMSD=0.116\n−4 −2 0 2\n0.0 0.5 1.0 1.5 2.0\nTime\n(c)PS3(K= 5). RMSD=0.074−4 −2 0 2\n0.0 0.5 1.0 1.5 2.0\nTime\n(d)We. RMSD=0.132\n−4 −2 0 2\n0.0 0.5 1.0 1.5 2.0\nTime\n(e)PC1 (K= 5). RMSD=0.066\n−4 −2 0 2\n0.0 0.5 1.0 1.5 2.0\nTime\n(f)PS3(K= 5). RMSD=0.043\nFigure 7 Average replica pointwise of the posterior approximate mea ns of the log-baseline hazard esti-\nmate (black solid line), average replica of the posterior 95 % credible intervals (grey area), and true log-\nbaseline hazard function (grey dash-dotted line) in the sim ulated Scenario 3 under theWe,PC4(K= 5),\nPS3(K= 5) forN= 100 (row 1) and under the We,PC1(K= 5),PS3(K= 5) forN= 300 (row 3).\nModel K DIC pD LPML Model K DIC pD LPML\nWe - 4553.309 3.960 -2276.334\nPC1 5 4484.455 7.030 -2241.921 PS1 5 4460.598 9.930 -2230.660\n10 4478.040 12.067 -2238.658 10 4462.866 14.368 -2231.988\n25 4469.406 27.313 -2235.836 25 4462.494 29.007 -2236.958\n40 4488.393 43.036 -2249.157 40 4419.711 42.537 -2230.357\nPC2 5 4484.457 7.030 -2241.917 PS2 5 4460.024 9.537 -2230.207\n10 4478.069 12.081 -2238.661 10 4462.249 13.831 -2231.412\n25 4469.371 27.295 -2236.586 25 4463.873 26.345 -2233.509\n40 4488.417 43.047 -2249.814 40 4463.732 38.084 -2235.947\nPC3 5 4484.439 7.021 -2241.905 PS3 5 4459.578 8.572 -2229.787\n10 4477.979 12.036 -2238.632 10 4458.998 10.467 -2229.443\n25 4469.221 27.219 -2235.719 25 4460.255 13.471 -2230.112\n40 4487.049 42.356 -2245.979 40 4458.403 15.583 -2229.296\nPC4 5 4484.445 7.014 -2241.894\n10 4477.070 11.508 -2238.193\n25 4463.265 22.566 -2231.649\n40 4471.340 29.782 -2235.798\nTable 1 DIC, pD and LPML values for the survival models defined by mean s of Weibull, PCandPS\nspecifications of the baseline hazard function with number o f knotsK= 5, 10, 25, and 40.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 19\nBayesian approach Frequentist approach\nModel K HRST1 HRST3 HRST1 HRST3\nWe – 0.640 (0.533, 0.760) 0.654 (0.546, 0.774) 0.637 (0.534, 0.760) 0.652 (0.546, 0.777)\n5 0.604 (0.503, 0.722) 0.619 (0.515, 0.737) 0.601 (0.503, 0.719) 0.616 (0.515, 0.736)\nPC1 10 0.598 (0.498, 0.712) 0.615 (0.513, 0.732) 0.596 (0.498, 0.713) 0.613 (0.512, 0.733)\n25 0.594 (0.495, 0.707) 0.607 (0.505, 0.723) 0.592 (0.495, 0.708) 0.605 (0.506, 0.723)\n40 0.594 (0.494, 0.708) 0.608 (0.507, 0.725) 0.593 (0.496, 0.709) 0.608 (0.508, 0.727)\nPS15 0.596 (0.496, 0.709) 0.610 (0.508, 0.725) 0.593 (0.495, 0.709) 0.607 (0.508, 0.726)\n10 0.592 (0.493, 0.706) 0.605 (0.505, 0.719) 0.593 (0.495, 0.709) 0.606 (0.506, 0.725)\n25 0.592 (0.493, 0.705) 0.610 (0.509, 0.725) 0.592 (0.495, 0.709) 0.606 (0.507, 0.725)\n40 0.590 (0.491, 0.702) 0.603 (0.501, 0.719) 0.592 (0.495, 0.709) 0.606 (0.507, 0.725)\nTable 2 HRST1and HR ST3: posterior mean and 95% credible interval (Bayesian approa ch), and estimate\nand 95% confidence intervals (Frequentist approach).\nAcknowledgements L´ azaro’s work was supported by a predoctoral FPU fellowshi p (FPU2013/02042) from the\nSpanish Ministry of Education, Culture and Sports. This res earch work was funded by grant MTM2016-77501-P from\nthe Spanish Ministry of Economy and Competitiveness co-fina nced with FEDER funds.\nConflict of Interest\nThe authors have declared no conflict of interest.\nReferences\nAndersen, P. K., and R. D. Gill. 1982. Cox’s regression model for counting processes: A large sample study. Annals of\nStatistics 10: 1100–1120.\nAustin, P. C. 2012. Generating survival times to simulate Co x proportional hazards models with time-varying covari-\nates. Statistics in Medicine 31 (29): 3946–3958.\nBanerjee, S., B. P. Carlin, and Alan E A. E. Gelfand. 2014. Hierarchical modeling and analysis for spatial data . Boca\nRaton, Chapman & Hall Crc Press.\nBelitz, C., A. Brezger, T. Kneib, S. Lang, and N. Umlauf. 2015 . Bayesx software for Bayesian inference in structured\nadditive regression models version 2.0.1. URL http://www. bayesx. org .\nBender, R., T. Augustin, and M. Blettner. 2005. Generating s urvival times to simulate Cox proportional hazards models.\nStatistics in Medicine 24 (11): 1713–1723.\nBenner, A., M. Zucknick, T. Hielscher, C. I., and U. Mansmann . 1988. Monotone regression splines in action. Statisti-\ncal Science 3: 425–461.\nBenner, A., M. Zucknick, T. Hielscher, C. I., and U. Mansmann . 2010. High-dimensional cox models: the choice of\npenalty as part of the model building process. Biometrical Journal 52: 50–69.\nBerger, James, El´ ıas Moreno, Luis Pericchi, M. Bayarri, Jo se Bernardo, Juan Cano, Juli´ an Horra, Jacinto Mart´ ın, Dav id\nRios, Bruno Betr` o, A. Dasgupta, Paul Gustafson, Larry Wass erman, Joseph Kadane, Cid Srinivasan, Michael\nLavine, Anthony O’Hagan, Wolfgang Polasek, Christian Robe rt, and Siva Sivaganesan. 1994. An overview of\nrobust bayesian analysis. Test3: 5–124.\nBernardo, Jose M. 1979. Reference posterior distributions for Bayesian inference. Journal of the Royal Statistical\nSociety. Series B (Methodological) .\nBickel, P. J. 2006. Regularization in statistics. Test15: 271–344.\nBogaerts, K., A. Komarek, and E. Lesaffre. 2017. Survival analysis with interval-censored data: A practica l approach\nwith examples in R, SAS, and BUGS . Chapman and Hall/CRC.\nBoor, C. De. 1978. A practical guide to splines . New York, Springer-Verlag.\nBranscum, A., and T. E. Hanson. 2008. Bayesian nonparametri c meta-analysis using Polya tree mixture models. Bio-\nmetrics 64 (3): 825–833.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com20 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\nModel N Kβ log(h0(t))\nAverage Bias SE SD CP RMSD\nWe100 – 1.035 0.035 0.230 0.211 0.97 0.039\n300 – 1.008 0.008 0.132 0.136 0.95 0.007\nPC11005 1.037 0.037 0.233 0.216 0.96 0.205\n15 1.049 0.049 0.234 0.216 0.97 2.158\n3005 1.004 0.004 0.133 0.140 0.95 0.198\n15 1.013 0.013 0.133 0.142 0.95 0.131\nPC21005 1.038 0.038 0.233 0.215 0.96 0.205\n15 1.051 0.051 0.234 0.216 0.97 3.607\n3005 1.004 0.004 0.133 0.140 0.96 0.198\n15 1.013 0.013 0.134 0.141 0.97 0.131\nPC31005 1.037 0.037 0.234 0.216 0.95 0.205\n15 1.050 0.050 0.234 0.216 0.96 1.083\n3005 1.004 0.004 0.133 0.140 0.96 0.198\n15 1.014 0.014 0.134 0.142 0.97 0.130\nPC41005 0.946 -0.054 0.234 0.210 0.97 0.212\n15 0.882 -0.118 0.233 0.203 0.96 0.206\n3005 0.970 -0.030 0.134 0.140 0.96 0.204\n15 0.944 -0.056 0.133 0.139 0.93 0.145\nPS11005 1.031 0.031 0.232 0.211 0.98 0.117\n15 0.996 -0.004 0.228 0.203 0.97 0.205\n3005 1.010 0.010 0.133 0.140 0.95 0.063\n15 0.994 -0.006 0.132 0.137 0.96 0.120\nPS21005 0.925 -0.075 0.231 0.205 0.96 0.095\n15 0.788 -0.212 0.225 0.189 0.88 0.201\n3005 0.967 -0.033 0.133 0.139 0.95 0.064\n15 0.902 -0.098 0.131 0.134 0.86 0.116\nPS31005 1.027 0.027 0.233 0.210 0.97 0.096\n15 1.023 0.023 0.234 0.209 0.97 0.121\n3005 1.007 0.007 0.134 0.140 0.97 0.071\n15 1.005 0.005 0.134 0.140 0.97 0.089\nTable 3 Average, bias, SE, SD and CP of the regression coefficient βand RMSD of the log (h0(t))\ncorresponding to all inferential and replicate processes f or the Scenario 1 simulated data.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 21\nModel N Kβ log(h0(t))\nAverage Bias SE SD CP RMSD\nWe100 – 1.077 0.077 0.234 0.251 0.93 0.626\n300 – 1.074 0.074 0.133 0.163 0.88 0.626\nPC11005 1.018 0.018 0.234 0.232 0.94 0.276\n15 1.018 0.018 0.235 0.229 0.95 7.933\n3005 1.012 0.012 0.133 0.149 0.95 0.058\n15 1.013 0.013 0.134 0.150 0.92 0.889\nPC21005 1.018 0.018 0.234 0.232 0.94 0.760\n15 1.017 0.017 0.235 0.229 0.95 13.085\n3005 1.011 0.011 0.133 0.149 0.94 0.058\n15 1.013 0.013 0.134 0.151 0.92 1.291\nPC31005 1.017 0.017 0.233 0.232 0.94 0.345\n15 1.017 0.017 0.235 0.229 0.95 4.381\n3005 1.012 0.012 0.134 0.149 0.94 0.058\n15 1.013 0.013 0.134 0.150 0.92 0.276\nPC41005 1.001 0.001 0.230 0.226 0.94 0.095\n15 0.973 -0.027 0.228 0.216 0.95 0.202\n3005 1.006 0.006 0.133 0.148 0.94 0.042\n15 0.996 -0.004 0.133 0.147 0.92 0.102\nPS11005 1.012 0.012 0.233 0.225 0.94 0.421\n15 0.992 -0.008 0.231 0.223 0.95 0.402\n3005 1.013 0.013 0.134 0.150 0.92 0.387\n15 1.003 0.003 0.133 0.147 0.94 0.303\nPS21005 1.001 0.001 0.226 0.211 0.96 0.405\n15 0.975 -0.025 0.214 0.190 0.97 0.289\n3005 1.008 0.008 0.132 0.147 0.92 0.386\n15 0.993 -0.007 0.128 0.137 0.94 0.254\nPS31005 1.018 0.018 0.234 0.229 0.94 0.424\n15 1.015 0.015 0.235 0.229 0.94 0.305\n3005 1.014 0.014 0.134 0.151 0.92 0.388\n15 1.012 0.012 0.134 0.150 0.92 0.261\nTable 4 Average, bias, SE, SD and CP of the regression coefficient βand RMSD of the log (h0(t))\ncorresponding to all inferential and replicate processes f or the Scenario 2 simulated data.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com22 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\nModel N Kβ log(h0(t))\nAverage Bias SE SD CP RMSD\nWe100 – 0.955 -0.045 0.230 0.234 0.93 0.131\n300 – 0.960 -0.040 0.131 0.119 0.94 0.132\nPC11005 0.983 -0.017 0.234 0.254 0.93 0.309\n15 0.989 -0.011 0.235 0.254 0.93 4.524\n3005 0.979 -0.021 0.133 0.120 0.95 0.066\n15 0.984 -0.016 0.133 0.121 0.95 0.245\nPC21005 0.985 -0.015 0.234 0.255 0.93 0.831\n15 0.992 -0.008 0.235 0.255 0.93 7.012\n3005 0.980 -0.020 0.133 0.121 0.95 0.066\n15 0.984 -0.016 0.133 0.122 0.96 0.313\nPC31005 0.984 -0.016 0.234 0.254 0.93 0.466\n15 0.991 -0.009 0.235 0.255 0.94 3.962\n3005 0.979 -0.021 0.133 0.120 0.95 0.066\n15 0.984 -0.016 0.133 0.122 0.96 0.102\nPC41005 0.865 -0.135 0.236 0.251 0.88 0.116\n15 0.802 -0.198 0.232 0.240 0.83 0.141\n3005 0.938 -0.062 0.133 0.121 0.94 0.077\n15 0.902 -0.098 0.133 0.118 0.91 0.075\nPS11005 0.978 -0.022 0.232 0.251 0.93 0.136\n15 0.941 -0.059 0.228 0.243 0.93 0.224\n3005 0.980 -0.020 0.133 0.121 0.96 0.053\n15 0.967 -0.033 0.132 0.121 0.94 0.129\nPS21005 0.822 -0.178 0.233 0.252 0.84 0.127\n15 0.675 -0.325 0.223 0.236 0.71 0.235\n3005 0.917 -0.083 0.133 0.123 0.91 0.058\n15 0.844 -0.156 0.132 0.122 0.80 0.114\nPS31005 0.966 -0.034 0.233 0.244 0.92 0.074\n15 0.964 -0.036 0.233 0.242 0.92 0.084\n3005 0.974 -0.026 0.133 0.120 0.95 0.043\n15 0.973 -0.027 0.133 0.119 0.95 0.048\nTable 5 Average, bias, SE, SD and CP of the regression coefficient βand RMSD of the log (h0(t))\ncorresponding to all inferential and replicate processes f or the Scenario 3 simulated data.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.comBiometrical Journal 52(2010) 61 23\nBreiman, L. 1996. Bagging predictors. Machine Learning 24 (2): 123–140.\nBreslow, N. 1974. Covariance analysis of censored survival data. Biometrics 30 (1): 89–99.\nBrilleman, S. 2013. simsurv: Simulate Survival Data . R package version 0.1.0.\nCai, T., R. J. Hyndman, and M. P. Wand. 2002. Mixed model-base d hazard estimation. Journal of Computational and\nGraphical Statistics 11 (4): 784–798.\nChapple, A. G. 2016. SimSCRPiecewise: Simulates Univariate and Semi-Competin g Risks Data Given Covariates and\nPiecewise Exponential Baseline Hazards . R package version 0.1.1.\nChristensen, R., J. Wesley, A. Branscum, and T. E. Hanson. 20 11.Bayesian Ideas and Data Analysis: An Introduction\nfor Scientists and Statisticians . Boca Raton, Chapman & Hall/CRC Press.\nCox, D. 1972. Regression models and life tables (with discus sion). Journal of the Royal Statistical Society 34: 187–\n220.\nCrainiceanu, C. M., D. Ruppert, and M. P. Wand. 2005. Bayesia n Analysis for Penalized Spline Regression Using\nWinBUGS. Journal of Statistical Software 14 (14): 1–24.\nCrowther, M. J., and P. C. Lambert. 2013. Simulating biologi cally plausible complex survival data. Statistics in\nMedicine 32 (23): 4118–4134.\nDellaportas, P., and A. F. M. Smith. 1993. Bayesian inferenc e for generalized linear and proportional hazards models\nvia Gibbs sampling. Applied Statistics .\nFahrmeir, L., and A. Hennerfeind. 2003. Nonparametric Baye sian hazard rate models based on penalized splines, Tech-\nnical report, Discussion paper//Sonderforschungsbereic h 386 der Ludwig-Maximilians-Universit¨ at M¨ unchen.\nFahrmeir, L., and T. Kneib. 2011. Bayesian smoothing and regression for longitudinal, spati al and event history data .\nOxford, Oxford University Press.\nGeisser, S., and W. F. Eddy. 1979. A predictive approach to mo del selection. Journal of the American Statistical\nAssociation 74 (365): 153–160.\nGelfand, A. E. 1996. Markov chain monte carlo in practice, 14 6–151. London, Chapman & Hall/CRC Press.\nGelman, A. 2006. Prior distributions for variance paramete rs in hierarchical models (comment on article by Browne\nand Draper). Bayesian Analysis 1 (3): 515–534.\nGirosi, F., M. Jones, T. Poggio, J. A. Doornik, and H. Hansen. 1993. Priors stabilizers and basis functions: From\nregularization to radial, tensor and additive splines, C. b . c. l. paper no. 75, Artificial Intelligence Laboratory\nMassachusetts Institute of Technology.\nHanson, T., and M. Yang. 2007. Bayesian semiparametric prop ortional odds models. Biometrics 63 (1): 88–95.\nHastie, T., R. Tibshirani, and J. Friedman. 2009. The Elements of Statistical Learning . New York, Springer-Verlag.\nHenschel, V ., J. Engel, D. H¨ olzel, and U. Mansmann. 2009. A s emiparametric Bayesian proportional hazards model\nfor interval censored data with frailty effects. BMC Medical Research Methodology 9 (1): 9.\nHolford, Theodore R. 1980. The analysis of rates and of survi vorship using log-linear models. Biometrics 36 (2):\n299–305.\nIbrahim, J. G., M. H. Chen, and D. Sinha. 2001. Bayesian survival analysis . New York, Springer-Verlag.\nIbrahim, J. G., H. Zhu, and N. Tang. 2011. Bayesian local influ ence for survival models. Lifetime Data Analysis 17\n(1): 43–70.\nJeffreys, H. 1961. The theory of probability . Oxford University Press.\nKalbfleisch, J. D., and R. L. Prentice. 1973. Marginal likeli hoods based on Cox’s regression and life model. Biometrika\n60 (2): 267–278.\nKass, R. E., and A. E. Raftery. 1995. Bayes factors. Journal of the American Statistical Association 90 (430): 773–795.\nKim, S. W., and J. G. Ibrahim. 2000. On Bayesian inference for proportional hazards models using noninformative\npriors. Lifetime Data Analysis 6 (4): 331–341.\nLaird, N., and D. Olivier. 1981. Covariance analysis of cens ored survival data using log-linear analysis techniques.\nJournal of the American Statistical Association 76 (374): 231–240.\nLang, S., and A. Brezger. 2004. Bayesian P-splines. Journal of Computational and Graphical Statistics 13 (1): 183–\n212.\nLee, K. H., F. Dominici, D. Schrag, and S. Haneuse. 2016. Hier archical models for semicompeting risks data with\napplication to quality of end-of-life care for pancreatic c ancer. Journal of the American Statistical Association\n111 (515): 1075–1095.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com24 Elena L´ azaro et al. : Bayesian regularization for flexible baseline hazard func tions\nMurray, T. A., B. P. Hobbs, D. J. Sargent, and B. P. Carlin. 201 6. Flexible Bayesian survival modeling with semipara-\nmetric time-dependent and shape-restricted covariate eff ects. Bayesian Analysis 11 (2): 381.\nP. H. C. Eilers, B. D. Marx, and M. Durb´ an. 2015. Twenty years of p-splines. SORT, Statistics & Operations Research\nBiometrical Journal 39: 149–186.\nPlummer, M. 2003. JAGS: a program for analysis of Bayesian gr aphical models using Gibbs sampling. In Proceedings\nof the 3rd international workshop on distributed statistic al computing .\nR Core Team. 2013. R: A Language and Environment for Statistical Computing . Vienna, Austria. R Foundation for\nStatistical Computing. http://www.R-project.org/.\nRoyston, P. 2011. Estimating a smooth baseline hazard funct ion for the Cox model. Department of Statistical Science,\nUniversity College London Research report 314.\nSahu, S. K., D. K. Dey, H. Aslanidou, and D. Sinha. 1997. A Weib ull regression model with gamma frailties for\nmultivariate survival data. Lifetime Data Analysis 3 (2): 123–137.\nSanz-Puig, M., E. L´ azaro, C. Armero, D. Alvares, A. Mart´ ın ez, and D. Rodrigo. 2017. S. Typhimurium virulence\nchanges caused by exposure to different non-thermal preser vation treatments using C. elegans .International\nJournal of Food Microbiology 262: 49–54.\nSharef, E., R. L. Strawderman, D. Ruppert, M. Cowen, and L. Ha lasyamani. 2010. Bayesian adaptative b-spline\nestimationin proportional hazards frailty models. Electronic Journal of Statistics 4: 606–642.\nSherar, P. A. 2004. Variational based analysis and modellin g using B-splines. PhD diss, School of Engineering. Cran-\nfield University.\nSpiegelhalter, D. J., N. G. Best, B. P. Carlin, and A. Van Der L inde. 2002. Bayesian measures of model complexity\nand fit. Journal of the Royal Statistical Society: Series B (Statist ical Methodology) 64 (4): 583–639.\nTsiatis, A. A. 1981. A large sample study of cox’s regression model. Annals of Statistics 9: 93–108.\nvan Houwelingen, H. C., and T. Stijnen. 2014. Cox regression model. In Handbook of survival analysis , ed. Ibrahim\nJG Scheike TH (eds) Klein J van Houwelingen H, 5–26. Boca Rato n, Chapman & Hall.\nZhao, L., D. Feng, E. L. Bellile, and J. M. G. Taylor. 2014. Bay esian random threshold estimation in a Cox proportional\nhazards cure model. Statistics in medicine 33 (4): 650–661.\n© 2010 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim www.biometrical-journal.com" }, { "title": "2401.18015v1.Nanomechanically_induced_nonequilibrium_quantum_phase_transition_to_a_self_organized_density_wave_of_a_Bose_Einstein_condensate.pdf", "content": "Nanomechanically-induced nonequilibrium quantum phase transition\nto a self-organized density wave of a Bose-Einstein condensate\nMilan Radonji´ c,1, 2,∗Leon Mixa,1, 3,†Axel Pelster,4,‡and Michael Thorwart1, 3,§\n1I. Institut f¨ ur Theoretische Physik, Universit¨ at Hamburg, Notkestr. 9, 22607 Hamburg, Germany\n2Institute of Physics Belgrade, University of Belgrade, Pregrevica 118, 11080 Belgrade, Serbia\n3The Hamburg Center for Ultrafast Imaging, Luruper Chaussee 149, 22761 Hamburg, Germany\n4Physics Department and Research Center OPTIMAS, University Kaiserslautern-Landau,\nErwin-Schr¨ odinger Str. 46, 67663 Kaiserslautern, Germany\n(Dated: February 1, 2024)\nWe report on a nonequilibrium quantum phase transition (NQPT) in a hybrid quantum many-\nbody system consisting of a vibrational mode of a damped nanomembrane interacting optomechan-\nically with a cavity, whose output light couples to two internal states of an ultracold Bose gas held\nin an external quasi-one-dimensional box potential. For small effective membrane-atom couplings,\nthe system is in a homogeneous Bose-Einstein condensate (BEC) steady state, with no membrane\ndisplacement. Depending on the transition frequency between the two internal atomic states, ei-\nther one or both internal states are occupied. By increasing the atom-membrane couplings, the\nsystem transitions to a symmetry-broken self-organized BEC phase, which is characterized by a\nconsiderably displaced membrane steady-state and density wave-like BEC profiles. This NQPT can\nbe both discontinuous and continuous for a certain interval of transition frequencies, and is purely\ndiscontinuous outside of it.\nI. INTRODUCTION\nMany physical systems can be classified in terms of\ntheir emergent collective behavior when they undergo\nphase transitions [1–3]. While equilibrium phase tran-\nsitions are fairly well understood, nonequilibrium quan-\ntum phase transitions (NQPTs) are a relatively new and\nexciting field of research [4, 5]. Such phase transitions oc-\ncur in a nonequilibrium steady state of driven quantum\nsystems in contact with an environment, so that their\nenergy is not conserved due to external driving and dis-\nsipation [6–16]. Among other cases, NQPTs have been\nstudied in ultracold atoms in an optical cavity [17–24],\nin driven-dissipative Bose-Einstein condensates [25, 26],\nin microcavity-polariton systems [27–29], and in photon\nBose-Einstein condensates [30–32]. Additionally, dynam-\nical quantum phase transitions and universal scaling have\nbeen observed both in the nonequilibrium dynamics of\nisolated quantum systems after a quench, with time play-\ning the role of the control parameter [33], and recently in\nopen quantum systems, whose dynamics is driven by the\ndissipative contact to an environment [34].\nHybrid atom-optomechanical systems, which combine\noptomechanics with atom optics, represent one recent\npromising platform for studying NQPTs [35–43]. In these\nsystems, a nanomembrane in an optical cavity is coupled\nto the motional [35] or to the internal [36] degrees of free-\ndom of a distant cloud of cold atoms that are trapped\nin the optical lattice of the outcoupled light field. By\n∗milan.radonjic@physik.uni-hamburg.de\n†lmixa@physnet.uni-hamburg.de\n‡axel.pelster@rptu.de\n§michael.thorwart@physik.uni-hamburg.deemploying different cooling mechanisms, such as sym-\npathetic cooling [35, 37–39] and optical feedback cool-\ning [39, 44, 45], the nanomembrane can be cooled down\nalmost to its quantum ground state. Moreover, hybrid\natom-optomechanical systems are a versatile playground\nfor various quantum phenomena, such as indirect quan-\ntum measurement, atom-membrane entanglement and\ncoherent state transfer [46–50].\nThe internal state coupling scheme [36] is realized by\na nanomembrane that is coupled to transitions between\ninternal states of the atoms via translating the phase\nshift of the light, caused by the membrane displacement,\ninto a polarization rotation using a polarizing beam split-\nter. This scheme allows for resonant coupling and miti-\ngates the drawbacks of the motional coupling scheme [35],\nlike strong frequency mismatch between the nanooscil-\nlator and the atomic motion in the optical trap. It has\nbeen utilized for membrane cooling [36, 51], displacement\nsqueezing [52], the realization of a effective negative mass\noscillator [53], and quantum back-action evading mea-\nsurements [54]. In addition, a peculiar NQPT, whose\norder can be controlled by changing a directly accessi-\nble experimental parameter, has recently been proposed\nin this scheme [55]. It has been found that the system\ncan undergo both a first- and a second-order phase tran-\nsition in the same physical setup, by tuning the atomic\ntransition frequency.\nIn this work, we examine NQPTs in a hybrid atom-\noptomechanical system in the internal state coupling\nscheme. We consider an ultracold atomic gas trapped in a\nlarge quasi-1D box, where the lattice potentials generated\nby the light fields have been canceled. Since the mem-\nbrane is naturally damped by its suspension, the atoms\nrelax into a steady state whose features critically depend\non the state of the membrane. For large enough trap-\nping box and weak effective coupling between the atomsarXiv:2401.18015v1 [cond-mat.quant-gas] 31 Jan 20242\nand the nanomembrane, we find that the atomic conden-\nsates are essentially uniform and the membrane is not\ndisplaced. When the atom-membrane couplings become\nstrong enough, the system transitions into a symmetry-\nbroken self-organized phase that exhibits density wave-\nlike condensate profiles and significant nanomembrane\ndisplacement. Depending on the values of the readily\ncontrollable experimental parameters, this NQPT can be\nof either first or second order. We map out the relevant\nparts of the parameter space and study the hallmarks\nof the phase transition. Hence, the rest of the paper\nis organized as follows. In Sec. II we outline the basic\nmean-field theory. In the following Sec. III we examine\nthe homogeneous steady states. Next, in Sec. IV we fo-\ncus on the inhomogeneous steady state and its features.\nWe also address and examine the occurring 1st and 2nd\norder phase transitions. We discuss our results in Sec. V\nand provide an outlook.\nII. MODEL AND EQUATIONS OF MOTION\nThe system under consideration [36] consists of N\nidentical ultracold bosonic atoms held in an external\nquasi-1D trap (see Fig. 1). The relevant atomic states\n{|−⟩,|+⟩,|e⟩}constitute a Λ level scheme, where the two\nlower states are energetically separated by the atomic\ntransition frequency Ωa. An applied σ−circularly polar-\nized laser of frequency ωLdrives the internal transition|+⟩ ↔ | e⟩at a finite large detuning ∆. The passing\nbeam is sent to a polarizing beam splitter (PBS), which\nsplits the circularly polarized light into linearly polarized\nπxandπylight beams in two perpendicular directions.\nIn the vertical arm, a fixed mirror simply reflects light\nwith conserved polarization πx. The horizontal beam en-\nters a low-finesse cavity which hosts a semitransparent\nnanomembrane with the mechanical resonance frequency\nΩm. The lengths of the two arms are made equal when\nthe membrane is undisplaced. In that case, the cavity\nreflects πylight without any relative phase shift. In a\nquasistatic picture, any finite displacement of the mem-\nbrane induces a relative phase shift between the πxand\nπylight beams from the two arms. This relative phase is\nconverted to a polarization rotation after the two beams\nhave passed backwards through the PBS. The emerging\nσ+polarized light then drives the internal atomic tran-\nsition |−⟩ ↔ | e⟩and may induce a two-photon Raman\ntransition between the two lower states of the Λ scheme\nvia the excited state |e⟩. On the other hand, an inter-\nnal transition between the two lower atomic states leads\nto the emission of a σ+polarized photon which alters\nthe radiation pressure on the membrane after reaching\nit, which leads to an effective atom-membrane coupling.\nAn adiabatic elimination of the excited state and the\nlight field results [55] in an effective Hamiltonian involv-\ning the membrane and the low-energy atomic degrees of\nfreedom ( ℏ=c= 1)\nˆHeff= Ωmˆa†ˆa+X\nν=±Z\ndzˆψ†\nν(z)\u0014\nνΩa\n2−ωR∂2\nz+Vν(z) +1\n2X\nν′=±gνν′ˆψ†\nν′(z)ˆψν′(z)\u0015\nˆψν(z)\n−(ˆa+ ˆa†)Z\ndzsin(2z)\u0014λ\n2\u0000ˆψ†\n+(z)ˆψ−(z) +ˆψ†\n−(z)ˆψ+(z)\u0001\n+λexˆψ†\n+(z)ˆψ+(z)\u0015\n, (1)\nwhere the position coordinate has been re-scaled as z→z/ωL. The bosonic operator ˆ adenotes the annihilation\noperator of the excitations of one single mechanical mode of the nanomenbrane, while ˆψν(z) denotes the field operator\nof the atoms in the state ν. The atomic recoil frequency reads ωR=ω2\nL/(2m), the external trapping potentials are\ndenoted by V±(z), while gνν′are atomic state-dependent contact interaction strengths, and the effective membrane-\natom coupling strengths are λandλex. Note that the effective cavity-mediated global atom-atom interaction [56] has\nbeen neglected. Taking into account that the membrane is damped at the rate Γm, we derive the following equations\nof motion for the membrane and the atomic operators\ni∂tˆa=\u0000\nΩm−iΓm\u0001\nˆa−Z\ndzsin(2z)\u0014λ\n2\u0000ˆψ†\n+(z)ˆψ−(z) +ˆψ†\n−(z)ˆψ+(z)\u0001\n+λexˆψ†\n+(z)ˆψ+(z)\u0015\n−ˆξm, (2a)\ni∂tˆψ−(z) =\u0014\n−Ωa\n2−ωR∂2\nz+V−(z) +X\nν=±g−νˆψ†\nν(z)ˆψν(z)\u0015\nˆψ−(z)−λ\n2sin(2z)\u0000\nˆa+ ˆa†\u0001ˆψ+(z), (2b)\ni∂tˆψ+(z) =\u0014Ωa\n2−ωR∂2\nz+V+(z) +X\nν=±g+νˆψ†\nν(z)ˆψν(z)\u0015\nˆψ+(z)−λ\n2sin(2z)\u0000\nˆa+ ˆa†\u0001ˆψ−(z)\n−λexsin(2z)\u0000\nˆa+ ˆa†\u0001ˆψ+(z), (2c)\nwhere we have omitted the time argument for brevity. In accordance with the damping of the membrane mode,3\nFIG. 1. A semitransparent nanomembrane in an optical cav-\nity is coupled to the internal states of a distant atomic ensem-\nble that is trapped in an external quasi-1D trap. The internal\nstates of the atoms constitute a Λ level scheme according to\nthe inset. The figure is adapted from Ref. [55].\nwe have introduced the corresponding bosonic noise op-erator ˆξmthat is characterized by the zero mean fluctua-\ntions⟨ˆξm⟩=⟨ˆξ†\nm⟩= 0, as well as by the auto-correlations\n⟨ˆξm(t)ˆξ†\nm(0)⟩= 2Γm(nm+ 1)δ(t), (3a)\n⟨ˆξ†\nm(t)ˆξm(0)⟩= 2Γmnmδ(t). (3b)\nThe environment occupation number nmdetermines the\nsteady-state occupation of the membrane mode when it\nis affected only by its environment [57].\nWe assume that the atoms are at ultra-low tempera-\nture and that the atom-membrane coupling is such that a\nlarge fraction of atoms condenses. Thus, the system dy-\nnamics can be described by the following coupled mean-\nfield equations of motion\ni∂tα=\u0000\nΩm−iΓm\u0001\nα−Z\ndzsin(2z)\u0014√\nNλ\n2\u0000\nψ∗\n+(z)ψ−(z) +ψ∗\n−(z)ψ+(z)\u0001\n+√\nNλex|ψ+(z)|2\u0015\n, (4a)\ni∂tψ−(z) =\u0014\n−Ωa\n2−ωR∂2\nz+V−(z) +NX\nν=±g−ν|ψν(z)|2\u0015\nψ−(z)−√\nNλ\n2sin(2z)\u0000\nα+α∗\u0001\nψ+(z), (4b)\ni∂tψ+(z) =\u0014Ωa\n2−ωR∂2\nz+V+(z) +NX\nν=±g+ν|ψν(z)|2\u0015\nψ+(z)−√\nNλ\n2sin(2z)\u0000\nα+α∗\u0001\nψ−(z)\n−√\nNλexsin(2z)\u0000\nα+α∗\u0001\nψ+(z), (4c)\nwhere we have neglected all mutual correlations and introduced the complex membrane amplitude α=⟨ˆa⟩/√\nN, and\nthe wave functions of the two condensates ψ±(z) =⟨ˆψ±(z)⟩/√\nN. We assume that the membrane damping is so fast\nthat the membrane almost instantaneously relaxes to its steady state determined by the condensate wave functions\n¯α=1\nΩm−iΓmZ\ndzsin(2z)\u0014√\nNλex|ψ+(z)|2+√\nNλ\n2\u0000\nψ∗\n+(z)ψ−(z) +ψ∗\n−(z)ψ+(z)\u0001\u0015\n, (5)\nso that we obtain the following coupled equations for the two condensates\ni∂tψ−(z) =\u0014\n−Ωa\n2−ωR∂2\nz+V−(z) +NX\nν=±g−ν|ψν(z)|2\u0015\nψ−(z)−√\nNλ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001\nψ+(z), (6a)\ni∂tψ+(z) =\u0014Ωa\n2−ωR∂2\nz+V+(z) +NX\nν=±g+ν|ψν(z)|2\u0015\nψ+(z)−√\nNλ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001\nψ−(z)\n−√\nNλexsin(2z)\u0000\n¯α+ ¯α∗\u0001\nψ+(z). (6b)\nDue to the damping of the membrane, the atoms also eventually reach the minimal-energy steady state, i.e., the\nground steady state (GSS), described by the ansatz ψ±(z, t) =e−iµtψ±(z). It involves the chemical potential µthat\nis fixed by the normalization condition\nZ\ndz\u0000\n|ψ−(z)|2+|ψ+(z)|2\u0001\n= 1. (7)\nIt follows that the GSS solutions of the equations of motion (6) can be obtained either by solving the stationary\nequations\n0 =\u0014\n−Ωa\n2−ωR∂2\nz−µ+V−(z) +NX\nν=±g−ν|ψν(z)|2\u0015\nψ−(z)−√\nNλ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001\nψ+(z), (8a)4\n0 =\u0014Ωa\n2−ωR∂2\nz−µ+V+(z) +NX\nν=±g+ν|ψν(z)|2\u0015\nψ+(z)−√\nNλ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001\nψ−(z)\n−√\nNλexsin(2z)\u0000\n¯α+ ¯α∗\u0001\nψ+(z), (8b)\nor, equivalently, by minimizing the energy functional\nEN[ψ±] =NX\nν=±Z\ndz ψ∗\nν(z)\u0014\nνΩa\n2−ωR∂2\nz+Vν(z) +N\n2X\nν′=±gνν′|ψν′(z)|2\u0015\nψν(z)\n−N2Ωm\nΩ2m+ Γ2m\u001aZ\ndzsin(2z)\u0014λ\n2\u0000\nψ∗\n+(z)ψ−(z) +ψ∗\n−(z)ψ+(z)\u0001\n+λex|ψ+(z)|2\u0015\u001b2\n, (9)\nwith respect to ψ∗\n±(z) and under the normalization constraint (7). This minimization justifies our notion of the GSS.\nThe chemical potential stems from the relation µ=∂EN[ψ±]/∂N and reads\nµ=X\nν=±Z\ndz ψ∗\nν(z)\u0014\nνΩa\n2−ωR∂2\nz+Vν(z) +NX\nν′=±gνν′|ψν′(z)|2\u0015\nψν(z)\n−2NΩm\nΩ2m+ Γ2m\u001aZ\ndzsin(2z)\u0014λ\n2\u0000\nψ∗\n+(z)ψ−(z) +ψ∗\n−(z)ψ+(z)\u0001\n+λex|ψ+(z)|2\u0015\u001b2\n. (10)\nLet us next examine the ground steady state of the system. The external trapping potentials are designed to cancel\nthe lattice potentials due to the driving laser and result in the box-like traps V±(z) with the hard walls at z∈ {z1, z2},\nwhere z1=−π/4−ℓπ,z2=−π/4+ℓπfor some large integer ℓ≳100. That imposes the Dirichlet boundary conditions\nψ±(z1) =ψ±(z2) = 0. According to our assumption ℓ≫1, we can safely neglect any edge effects that significantly\naffect the condensates only within a few healing lengths of the walls. Since the atom-membrane interaction is periodic\nwith the period of π, we can reduce our attention onto the single period [ −π/4,3π/4]. We impose the periodic\nboundary conditions ψ−(−π/4) = ψ−(3π/4),ψ+(−π/4) = ψ+(3π/4) and take V±(z) = 0 henceforward. Note that\nthe spatial dependence of the atom-membrane interaction, ∝sin(2z), is even with respect to the center of the chosen\nperiod. This brings us to the energy per period\n˜E˜N[˜ψ±]≡EN[ψ±]\n2ℓ=˜NX\nν=±Z\nπdz˜ψ∗\nν(z)\u0014\nνΩa\n2−ωR∂2\nz+˜N\n2X\nν′=±gνν′|˜ψν′(z)|2\u0015\n˜ψν(z)\n−˜N2Ωm\nΩ2m+ Γ2m\u001aZ\nπdzsin(2z)\u0014˜λ\n2\u0000˜ψ∗\n+(z)˜ψ−(z) +˜ψ∗\n−(z)˜ψ+(z)\u0001\n+˜λex|˜ψ+(z)|2\u0015\u001b2\n, (11)\nwhere we introduced the rescaled quantities\nN= 2ℓ˜N, ψ±(z) =˜ψ±(z)/√\n2ℓ, λ =˜λ/√\n2ℓ, λex=˜λex/√\n2ℓ. (12)\nThe integrals in Eq. (11) run over one single period of length π. In terms of the above, the membrane amplitude\nbecomes\n¯α=1\nΩm−iΓmZ\nπdzsin(2z)\u0014p\n˜N˜λex|˜ψ+(z)|2+p\n˜N˜λ\n2\u0000˜ψ∗\n+(z)˜ψ−(z) +˜ψ∗\n−(z)˜ψ+(z)\u0001\u0015\n, (13)\nwhile the rescaled wave functions evolve in accordance with\ni∂t˜ψ−(z) =\u0014\n−Ωa\n2−ωR∂2\nz+˜NX\nν=±g−ν|˜ψν(z)|2\u0015\n˜ψ−(z)−p\n˜N˜λ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001˜ψ+(z), (14a)\ni∂t˜ψ+(z) =\u0014Ωa\n2−ωR∂2\nz+˜NX\nν=±g+ν|˜ψν(z)|2\u0015\n˜ψ+(z)−p\n˜N˜λ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001˜ψ−(z)\n−p\n˜N˜λexsin(2z)\u0000\n¯α+ ¯α∗\u0001˜ψ+(z), (14b)\nand are normalized according to\nZ\nπdz\u0000\n|˜ψ−(z)|2+|˜ψ+(z)|2\u0001\n= 1. (15)5\nThe stationary wave function equations, which determine the GSS, turn into\n0 =\u0014\n−Ωa\n2−ωR∂2\nz−µ+˜NX\nν=±g−ν|˜ψν(z)|2\u0015\n˜ψ−(z)−p\n˜N˜λ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001˜ψ+(z), (16a)\n0 =\u0014Ωa\n2−ωR∂2\nz−µ+˜NX\nν=±g+ν|˜ψν(z)|2\u0015\n˜ψ+(z)−p\n˜N˜λ\n2sin(2z)\u0000\n¯α+ ¯α∗\u0001˜ψ−(z)\n−p\n˜N˜λexsin(2z)\u0000\n¯α+ ¯α∗\u0001˜ψ+(z), (16b)\nwhere the chemical potential is given by\nµ=X\nν=±Z\nπdz˜ψ∗\nν(z)\u0014\nνΩa\n2−ωR∂2\nz+˜NX\nν′=±gνν′|˜ψν′(z)|2\u0015\n˜ψν(z)\n−2˜NΩm\nΩ2m+ Γ2m\u001aZ\nπdzsin(2z)\u0014˜λ\n2\u0000˜ψ∗\n+(z)˜ψ−(z) +˜ψ∗\n−(z)˜ψ+(z)\u0001\n+˜λex|˜ψ+(z)|2\u0015\u001b2\n. (17)\nIn the following, we will assume that the rescalings (12)\nhave been performed, and, for the sake of brevity, we will\nomit the tildes. All extensive quantities addressed below\nare therefore per period.\nIII. HOMOGENEOUS GROUND STEADY\nSTATES\nWe first analyze the homogeneous solutions using the\nansatz ψ±(z) =p\nn±/π, where n±are the occupation\nfractions of the two atomic states. In such a case, the\nnormalization condition simply reads n−+n+= 1 and\nthe membrane is not excited, i.e., ¯ α= 0. The stationary\nequations (16) become\n0 =\u0014\n−Ωa\n2−µ+N\nπX\nν=±g−νnν\u0015p\nn−, (18a)\n0 =\u0014Ωa\n2−µ+N\nπX\nν=±g+νnν\u0015p\nn+. (18b)\nWe will be considering the on average repulsive regime\nwhere g−−, g++>0> g+−andg−−g++> g2\n+−. Three\nsolutions are possible, which read\nn−= 1, n+= 0, µ =−Ωa\n2+N\nπg−−,(19a)\nn−= 0, n+= 1, µ =Ωa\n2+N\nπg++,(19b)\nas well as\nn−=g++−g+−+πΩa/N\ng−−+g++−2g+−,\nn+=g−−−g+−−πΩa/N\ng−−+g++−2g+−,µ=Ωa\n2g−−−g++\ng−−+g++−2g+−\n+N\nπg−−g++−g2\n+−\ng−−+g++−2g+−. (19c)\nThe first solution is the lowest in energy when πΩa/N >\ng−−−g+−holds, while for πΩa/N < g+−−g++, the\nsecond one takes over. The third solution exists only if\ng+−−g++< πΩa/N < g−−−g+−is satisfied and has the\nlowest energy of the three. For πΩa/N < (g−−−g++)/2\nwe have n−< n+, while for πΩa/N≥(g−−−g++)/2\nwe get n−≥n+. Thus, it is convenient to introduce the\nreference transition frequency Ωa,0=N(g−−−g++)/(2π)\nand study the behavior of the system as a function of the\nrelative detuning\nδΩa≡Ωa−Ωa,0, (20)\nof the atomic transition frequency from it. For strong\nenough couplings λandλexthe system transitions into a\nself-organized GSS. The membrane becomes excited and\nthe condensates become inhomogeneous. The nature of\nthis phase transition is what we are going to investigate\nnext.\nIV. PHASE TRANSITIONS TO AND FROM\nINHOMOGENEOUS GROUND STEADY STATE\nLet us now explore the self-organized phase. To this\nend, we evolve the equations of motion (14) in imagi-\nnary time starting with a suitable initial state until the\nground steady state is reached. As can be seen from these\nequations, the membrane couples to the condensates via\nthe combination Re[¯ α] sin(2 z). The inhomogeneous GSS\nwave functions have to reach their maximum together\nwith sin(2 z), i.e., in the middle of the chosen period.\nAlso, ψ±(z) have to be even functions with respect to the\nsame point, in the same manner as sin(2 z). In this way,6\nFIG. 2. Spatial profiles of Re[¯ α] sin(2 z) (green) and the\nground steady state condensate wave functions ψ−(z) (red)\nandψ+(z) (blue) over one period for large negative (a) and\nlarge positive (b) relative detuning. Parameters: Ω m=\n100ωR, Γm= 10 ωR,Ng−−=Ng++= 100 ωR,Ng+−=\n−90ωR,√\nNλex= 35ωR, while in (a) δΩa=−40ωR,√\nNλ=\n5ωRand in (b) δΩa= 70ωR,√\nNλ= 70ωR.\nthe atom-membrane interaction term in Eq. (11) con-\ntributes most to the minimization of the energy of the\nsystem. Thus, the combination Re[¯ α] sin(2 z) captures\nthe essence of the membrane’s influence on the atoms,\nboth in terms of its spatial behavior and its relative\nstrength. Figure 2 shows two exemplary cases of spatial\nprofiles of Re[¯ α] sin(2 z), together with the two GSS wave\nfunctions ψ±(z) over the chosen period. In the panel\n(a) we present the case of a negative relative detuning\nδΩa, where the |+⟩state usually has higher occupation.\nThe panel (b) displays the opposite case with the |−⟩\nstate being more populated. As can be seen, larger spa-\ntial variances of the wave functions correspond to larger\nmembrane amplitude. For large negative relative de-\ntunings, the condensate is homogeneous and the atoms\noccupy exclusively the |+⟩state. Likewise, for large posi-\ntiveδΩathe atoms homogeneously condense into the |−⟩\nstate. In between, both atomic states exhibit a macro-\nscopic population, while the system may transition from\nthe homogeneous to the self-organized phase. Such tran-\nsitions occur for sufficiently large couplings to the mem-\nbrane λandλex. Their values determine whether the\ntransitions are continuous or discontinuous.\nIn Fig. 3 we showcase the behavior of Re[¯ α] and the\n-200 -100 0 100 2000.00.20.40.6\n-200 -100 0 100 200-1.0-0.50.00.51.0FIG. 3. Dependence of the real part of the membrane ampli-\ntude Re[¯ α] (a) and the population imbalance d−+≡(N−−\nN+)/N(b) between the |−⟩and the |+⟩state on the relative\ndetuning δΩafor a fixed value of the coupling√\nNλex= 40ωR\nand for three values of the coupling√\nNλ∈ {20,70,120}ωR\n(green, red, blue curves). Other parameters: Ω m= 100 ωR,\nΓm= 10ωR,Ng−−=Ng++= 100 ωR,Ng+−=−90ωR.\npopulation imbalance d−+≡(N−−N+)/Nwhen the\nrelative detuning is scanned across zero, for a fixed value\nof the coupling√\nNλex= 40ωRand for three values of\nthe coupling√\nNλ∈ {20,70,120}ωR(green, red, blue\ncurves). Here, we defined N±as the population per pe-\nriod of the state |±⟩. The green curves depict a case of a\ncontinuous second-order phase transition on the negative\nside, followed by a continuous second-order transition on\nthe positive side as well. This feature is manifest in both\nRe[¯α] and d−+. For a larger value of λ(red curves),\nthe transition on the negative side becomes discontinu-\nous and of first order, while on the positive side it is still\ncontinuous. For even larger value of λ(blue curves), the\nlatter transition also becomes a discontinuous first-order\none.\nIn order to acquire additional insight into the proper-\nties of the system, in Fig. 4 we show the behavior of the\ncondensate spatial profiles ψ±(z) along the three curves\nshown in Fig. 3 as we sweep the detuning from nega-\ntive to positive values. One can visually distinguish the\nhomogeneous and the self-organized phases. The wave\nfunctions ψ±(z) are symmetric and maximal in the cen-\nter of the period. The sharpness of the color gradients\naround the transition points reflects the (dis)continuity of\nthe respective transition. The width of ψ+(z) decreases7\nFIG. 4. Spatial profiles of the condensate wave functions ψ+(z) (left panels) and ψ−(z) (right panels) depending on the relative\ndetuning δΩafor a fixed value of the coupling√\nNλex= 40ωRand for three values of the coupling√\nNλ∈ {20,70,120}ωR(top,\nmiddle, bottom row). The remaining parameters are Ω m= 100 ωR, Γm= 10ωR,Ng−−=Ng++= 100 ωR,Ng+−=−90ωR.\nuntil shortly before the second transition, while the width\nofψ−(z) increases monotonically. Stronger couplings λ\nandλextypically lead to narrower wave function profiles\nψ±(z) due to the membrane-induced localization of the\natoms.\nWe extend the study of the transitions discussed above\nto a range of values of the coupling strength λ. Figure 5\ndisplays the dependence of Re[¯ α] (left panels) and d−+\n(right panels) on δΩaandλfor two values of the coupling√\nNλex= 40ωR(top row) and√\nNλex= 25ωR(bottom\nrow). The horizontal dashed lines in the top left panelmark explicitly those cases shown in Figs. 3 and 4. The\nsingle-colored blue (red) regions in the right panels cor-\nrespond to the homogeneous phase where the atoms con-\ndense into the |+⟩(|−⟩) state. Careful inspection of the\nleft panels reveals that there are blue intermediate re-\ngions where the condensates are homogeneous and both\natomic states have significant population. These appear\nfor√\nNλ≲20ωRand only around |δΩa| ≈50ωRfor\nthe larger coupling λex, as opposed to the entire range\n|δΩa|≲50ωRfor the smaller coupling λex. Therefore,\nto discriminate experimentally between the homogeneous\nand the inhomogeneous phase, one has first to measure8\n0 0.2 0.4 0.6 0.81.0\n-1.0 -0.5 0 0.51.0\n0 0.2 0.4 0.6 0.8\n-1.0 -0.5 0 0.51.0\nFIG. 5. Dependence of the real part of the membrane amplitude Re[¯ α] (left panels) and the population imbalance d−+=\n(N−−N+)/N(right panels) on the relative detuning δΩaand the coupling strength√\nNλ, for√\nNλex= 40 ωR(top row)\nand√\nNλex= 25ωR(bottom row). The horizontal dashed lines in the top left panel mark those cases shown in Figs. 3 and\n4. The black solid lines in the right panels correspond to N−=N+. Other parameters are: Ω m= 100 ωR, Γm= 10 ωR,\nNg−−=Ng++= 100 ωR,Ng+−=−90ωR.\nthe membrane displacement. If it turns out to be essen-\ntially zero, further characterization of the homogeneous\nphase can be done by measuring the population imbal-\nance d−+.\nThe continuous nature of the transitions to the self-\norganized phase is manifest in the gradual changes of\nthe color-coding on both the negative and the positive\ndetuning side for√\nNλ≲40ωRin the former case and\nfor√\nNλ≲110ωRin the latter case. In the top row,\nthe transition on the negative side becomes sharp and\ndiscontinuous within the strip 40 ωR≲√\nNλ≲110ωR,\nwhile the one on the positive side is still continuous.\nAbove that, both transitions become discontinuous. For\nthe smaller coupling λexin the bottom row, the cor-responding coupling strengths are√\nNλ≈110ωRand√\nNλ≈160ωR, respectively.\nFurther understanding can be gained by investigat-\ning the energy behavior. Figure 6 portrays the energy\nper period, given by Eq. (11), as a function of the rel-\native detuning δΩaand the coupling strength√\nNλ, for√\nNλex= 40ωR(top panel) and√\nNλex= 25ωR(bottom\npanel). Noticeably, there are no discontinuities within\nthe energy landscape. However, the energy features gra-\ndient jumps along the curves that correspond to discon-\ntinuous phase transitions observed in Fig. 5. This is il-\nlustrated both by the shading and the non-smoothness\nof the contour lines. The energy is maximal when both\nthe relative detuning and the coupling λare zero. As ex-9\n-100 -80 -60 -40 -20 0\n-125 -100 -75 -50 -25 0\nFIG. 6. Dependence of the energy per period, Eq. (11), on\nthe relative detuning δΩaand the coupling strength√\nNλ,\nfor√\nNλex= 40ωR(top panel) and√\nNλex= 25ωR(bottom\npanel). The black curves represent the contour lines. Used\nparameters: Ω m= 100 ωR, Γm= 10 ωR,Ng−−=Ng++=\n100ωR,Ng+−=−90ωR.\npected, the larger either of the couplings λorλexis, the\nlower is the energy due to the stabilizing atom-membrane\ninteraction. We also observe that for the fixed couplings\nthe energy of the homogeneous phases decreases with in-\ncreasing magnitude of δΩa, while the self-ordered phase\nexhibits a non-monotonic dependence in this respect.\nIt is worth illustrating the asymmetric role played by\nthe couplings λandλex, which is obvious from the equa-\ntions of motion (14). Figure 7 shows Re[¯ α] as a function\nof the two coupling strengths, for δΩa=−120ωR(top\npanel) and δΩa= 120 ωR(bottom panel). For presen-\ntation purposes, and different than in other plots, we\nhave chosen in this context the imbalanced contact in-\n0 0.5 1.0 1.5 2.0\n0 0.5 1.0 1.5 2.0\nFIG. 7. Dependence of the real part of the membrane am-\nplitude Re[¯ α] on the coupling strengths√\nNλand√\nNλex,\nforδΩa=−120ωR(top panel) and δΩa= 120 ωR(bottom\npanel). Other parameters are: Ω m= 100 ωR, Γm= 10 ωR,\nNg−−= 50ωR,Ng++= 200 ωR,Ng+−=−90ωR.\nteraction strengths Ng−−= 50ωRandNg++= 200 ωR.\nThe regions that correspond to the homogeneous phase\nare not symmetric with respect to λandλex. For large\nenough relative detuning, increasing λexleads to a first-\norder transition for small λand potentially to a second-\norder transition for larger λ. Conversely, increasing λ\nleads to a second-order transition for small λexand to a\nfirst-order transition for larger λex.\nV. DISCUSSION AND OUTLOOK\nThe above examples demonstrate that the considered\nsystem is versatile and offers multiple tuning knobs for10\nchanging the order of the phase transition between the\nhomogeneous and the self-organized density wave-like\nstate. These include, but are not limited to, the rela-\ntive detuning δΩaof the atomic transition frequency Ωa\nand the coupling strengths λandλex. The two states\ncan be experimentally distinguished by measuring the\nmembrane displacement. To further characterize the ho-\nmogeneous state, one can resort to the population im-\nbalance d−+. We have not explored the corresponding\nrole of the atomic contact interaction strengths gνν′in\nthis work. They represent, of course, further means of\ncontrolling the behavior of the system. The asymmet-\nric nature of the atom-membrane coupling can either be\nfurther enhanced or effectively suppressed by an appro-\npriate asymmetric choice of gνν′. Depending on the path\ntaken through the experimental parameter space, one can\nencounter either first- or second-order transition hyper-\nsurfaces. A possible future work could involve dynamics\nbeyond the studied nonequilibrium steady state. In such\na case, the system parameters could be dynamically con-\ntrolled along different open or closed paths. In certain\nscenarios, hysteresis should appear and can be studied.\nIt would be interesting to investigate how the above\nmean-field analysis may be amended once quantum fluc-\ntuations have been taken into account. The spatial pro-\nfiles of the two condensates critically determine which\natomic normal modes are coupled to the membrane.\nThose that are coupled should exhibit enhanced occu-\npation and may significantly alter primarily the homoge-\nneous state. Therefore, the order of the observed phase\ntransitions should be reanalyzed. Moreover, quantum\nfluctuations may lead to the emergence of new phases,\nakin to the formation of self-bound quantum droplets in\nBose-Bose mixtures and dipolar Bose gases [58, 59]. In\nthe considered system the membrane may have an essen-tial role to play. Beyond mean-field quantum effects may\nalso reveal the imprint of NQPTs and their order on the\nstatistics of the outcoupled light.\nWe find it important to note the differences between\nthe NQPT reported here and the one studied in Ref. [55].\nFirst, in the cited work it was essential to have a lattice\npotential present for the atoms. This led to exclusively\ndensity wave-like condensate steady states. Second, only\nthe special case of atomic contact interaction strengths\ngνν′=gwas considered. Moreover, the phase transition\nstudied therein would occur even in the absence of atom-\natom interactions within the BEC, i.e., for gνν′= 0. Ob-\nviously, our present scenario requires the overall repulsive\ninteractions.\nIn conclusion, in this paper we have presented a flexible\nhybrid atom-optomechanical experimental platform for\nthe study of both continuous and discontinuous NQPTs.\nImportantly, it is possible to choose between the two by\ntuning readily accessible experimental parameters. The\npresent work lays the foundation for further exploration\nof possible quantum phases of ultracold atomic gases\nalong the lines of self-bound quantum droplets.\nACKNOWLEDGMENTS\nThis work was supported by the Deutsche Forschungs-\ngemeinschaft (DFG, German Research Foundation) via\nthe Collaborative Research Center SFB/TR185 (Project\nNo. 277625399) (A.P.) and via the Research Grant\n274978739 (M.R. and M.T.). We also acknowledge the\nsupport from the DFG Cluster of Excellence “CUI: Ad-\nvanced Imaging of Matter” −EXC 2056 (Project ID\n390715994).\n[1] S. Sachdev, Quantum Phase Transitions , 2nd ed. (Cam-\nbridge University Press, Cambridge, 2011).\n[2] J. Zinn-Justin, Quantum Field Theory and Critical Phe-\nnomena , 4th ed (Oxford University Press, Oxford, 2002).\n[3] H. Kleinert and V. Schulte-Frohlinde, Critical Properties\nofϕ4-Theories , (World Scientific, Singapore, 2001).\n[4] L. M. Sieberer, M. Buchhold, and S. Diehl, Keldysh\nfield theory for driven open quantum systems , Rep. Prog.\nPhys. 79, 096001 (2016).\n[5] L. M. Sieberer, M. Buchhold, J. Marino, and S.\nDiehl, Universality in driven open quantum matter ,\narXiv:2312.03073 (2023).\n[6] A. Mitra, S. Takei, Y. B. Kim, and A. J. Millis, Nonequi-\nlibrium Quantum Criticality in Open Electronic Systems ,\nPhys. Rev. Lett. 97, 236808 (2006).\n[7] A. Mitra and A. J. Millis, Coulomb gas on the Keldysh\ncontour: Anderson-Yuval-Hamann representation of the\nnonequilibrium two-level system , Phys. Rev. B 76, 085342\n(2007).\n[8] V. M. Bastidas, C. Emary, G. Schaller, and T. Brandes,\nNonequilibrium quantum phase transitions in the Isingmodel , Phys. Rev. A 86, 063627 (2012).\n[9] F. Brennecke, R. Mottl, K. Baumann, R. Landig, T.\nDonner, and T. Esslinger, Real-time observation of fluc-\ntuations at the driven-dissipative Dicke phase transition ,\nProc. Natl. Acad. Sci. USA 110, 11763 (2013).\n[10] J. Marino and S. Diehl, Driven Markovian Quantum\nCriticality , Phys. Rev. Lett. 116, 070407 (2016).\n[11] M. F. Maghrebi and A. V. Gorshkov, Nonequilibrium\nmany- body steady states via Keldysh formalism , Phys.\nRev. B 93, 014307 (2016).\n[12] J. Hannukainen and J. Larson, Dissipation-driven quan-\ntum phase transitions and symmetry breaking , Phys. Rev.\nA98, 042113 (2018).\n[13] R. Rota, F. Minganti, C. Ciuti, and V. Savona, Quan-\ntum Critical Regime in a Quadratically Driven Nonlinear\nPhotonic Lattice , Phys. Rev. Lett. 122, 110405 (2019).\n[14] T. O. Puel, S. Chesi, S. Kirchner, and P. Ribeiro, Mixed-\nOrder Symmetry-Breaking Quantum Phase Transition\nFar from Equilibrium , Phys. Rev. Lett. 122, 235701\n(2019).\n[15] C. Kl¨ ockner, C. Karrasch, and D. M. Kennes, Nonequilib-11\nrium Properties of Berezinskii-Kosterlitz-Thouless Phase\nTransitions , Phys. Rev. Lett. 125, 147601 (2020).\n[16] T. Behrle, T. L. Nguyen, F. Reiter, D. Baur, B. de Neeve,\nM. Stadler, M. Marinelli, F. Lancellotti, S. F. Yelin, and\nJ. P. Home, Phonon Laser in the Quantum Regime , Phys.\nRev. Lett. 131, 043605 (2023).\n[17] D. Nagy, G. Szirmai and P. Domokos, Self-organization\nof a Bose-Einstein condensate in an optical cavity , Eur.\nPhys. J. D 48, 127 (2008).\n[18] C. Maschler, I. B. Mekhov, and H. Ritsch, Ultracold\natoms in optical lattices generated by quantized light\nfields , Eur. Phys. J. D 46, 545 (2008).\n[19] K. Baumann, C. Guerlin, F. Brennecke, and T. Esslinger,\nDicke quantum phase transition with a superfluid gas in\nan optical cavity , Nature 464, 1301 (2010).\n[20] H. Ritsch, P. Domokos, F. Brennecke, and T. Esslinger,\nCold atoms in cavity-generated dynamical optical poten-\ntials, Rev. Mod. Phys. 85, 553 (2013).\n[21] J. Klinder, H. Keßler, M. Reza Bakhtiari, M. Thorwart,\nand A. Hemmerich, Observation of a Superradiant Mott\nInsulator in the Dicke-Hubbard Model , Phys. Rev. Lett.\n115, 230403 (2015).\n[22] M. Reza Bakhtiari, A. Hemmerich, H. Ritsch, and M.\nThorwart, Nonequilibrium Phase Transition of Interact-\ning Bosons in an Intra-Cavity Optical Lattice , Phys. Rev.\nLett.114, 123601 (2015).\n[23] F. Mivehvar, F. Piazza, T. Donner, and H. Ritsch, Cavity\nQED with quantum gases: new paradigms in many-body\nphysics , Adv. Phys. 70, 1 (2021).\n[24] N. Defenu, T. Donner, T. Macr` ı, G. Pagano, S. Ruffo,\nand A. Trombettoni, Long-range interacting quantum\nsystems , Rev. Mod. Phys. 95, 035002 (2023).\n[25] C. D. Mink, A. Pelster, J. Benary, H. Ott, and M. Fleis-\nchhauer, Variational truncated Wigner approximation for\nweakly interacting Bose fields: Dynamics of coupled con-\ndensates, SciPost Phys. 12, 051 (2022).\n[26] J. Benary, C. Baals, E. Bernhart, J. Jiang, M. R¨ ohrle,\nand H. Ott, Experimental observation of a dissipative\nphase transition in a multi-mode many-body quantum\nsystem , New J. Phys. 24, 103034 (2022).\n[27] G. Dagvadorj, J. M. Fellows, S. Matyjaskiewicz, F. M.\nMarchetti, I. Carusotto, and M. H. Szymanska, Tuning\nacross Universalities with a Driven Open Condensate ,\nPhys. Rev. X 5, 041028 (2015).\n[28] A. Zamora, L. M. Sieberer, K. Dunnett, S. Diehl, and\nM. H. Szymanska, Tuning across Universalities with a\nDriven Open Condensate , Phys. Rev. X 7, 041006 (2017).\n[29] P. Comaron, G. Dagvadorj, A. Zamora, I. Carusotto, N.\nP. Proukakis, and M. H. Szymanska, Dynamical Criti-\ncal Exponents in Driven-Dissipative Quantum Systems ,\nPhys. Rev. Lett. 121, 095302 (2018).\n[30] H. J. Hesten, R. A. Nyman, and F. Mintert, Deconden-\nsation in Nonequilibrium Photonic Condensates: When\nLess Is More , Phys. Rev. Lett. 120, 040601 (2018).\n[31] J. D. Rodrigues, H. S. Dhar, B. T. Walker, J. M. Smith,\nR. F. Oulton, F. Mintert, and R. A. Nyman, Learning\nthe Fuzzy Phases of Small Photonic Condensates , Phys.\nRev. Lett. 126, 150602 (2021).\n[32] F. ¨Ozt¨ urk, T. Lappe, G. Hellmann, J. Schmitt, J. Klaers,\nF. Vewinger, J. Kroha, and M. Weitz, Observation of a\nnon-Hermitian phase transition in an optical quantum\ngas, Science 372, 6537 (2021).\n[33] M. Heyl, Dynamical quantum phase transitions , Rep.Prog. Phys. 81, 054001 (2018).\n[34] L.-N. Wu, J. Nettersheim, J. Feß, A. Schnell, S. Bur-\ngardt, S. Hiebel, D. Adam, A. Eckardt, and A. Widera,\nIndication of critical scaling in time during the relaxation\nof an open quantum system , arXiv:2208.05164 (2023).\n[35] B. Vogell, K. Stannigel, P. Zoller, K. Hammerer, M. T.\nRakher, M. Korppi, A. J¨ ockel, and P. Treutlein, Cavity-\nenhanced long-distance coupling of an atomic ensemble to\na micromechanical membrane , Phys. Rev. A 87, 023816\n(2013).\n[36] B. Vogell, T. Kampschulte, M. T. Rakher, A. Faber, P.\nTreutlein, K. Hammerer, and P. Zoller, Long distance\ncoupling of a quantum mechanical oscillator to the in-\nternal states of an atomic ensemble , New J. Phys. 17,\n043044 (2015).\n[37] A. J¨ ockel, A. Faber, T. Kampschulte, M. Korppi, M. T.\nRakher, and P. Treutlein, Sympathetic cooling of a mem-\nbrane oscillator in a hybrid mechanical–atomic system ,\nNat. Nanotechnol. 10, 55 (2015).\n[38] H. Zhong, G. Fl¨ aschner, A. Schwarz, R. Wiesendanger, P.\nChristoph, T. Wagner, A. Bick, C. Staarmann, B. Abeln,\nK. Sengstock, and C. Becker A millikelvin all-fiber cav-\nity optomechanical apparatus for merging with ultra-cold\natoms in a hybrid quantum system , Rev. Sci. Instrum.\n88, 023115 (2017).\n[39] P. Christoph, T. Wagner, H. Zhong, R. Wiesendanger,\nK. Sengstock, A. Schwarz, and C. Becker, Combined\nfeedback and sympathetic cooling of a mechanical oscilla-\ntor coupled to ultracold atoms , New J. Phys. 20, 093020\n(2018).\n[40] A. Vochezer, T. Kampschulte, K. Hammerer, and P.\nTreutlein, Light-Mediated Collective Atomic Motion in\nan Optical Lattice Coupled to a Membrane , Phys. Rev.\nLett.120, 073602 (2018).\n[41] N. Mann, M. Reza Bakhtiari, A. Pelster, and M. Thor-\nwart, Nonequilibrium Quantum Phase Transition in a\nHybrid Atom-Optomechanical System , Phys. Rev. Lett.\n120, 063605 (2018).\n[42] C. Gao and Z. Liang, Steady-state phase diagram of quan-\ntum gases in a lattice coupled to a membrane , Phys. Rev.\nA99, 013629 (2019).\n[43] T. M. Karg, B. Gouraud, C. T. Ngai, G.-L. Schmid, K.\nHammerer, and P. Treutlein, Light-mediated strong cou-\npling between a mechanical oscillator and atomic spins 1\nmeter apart , Science 369, 174 (2020).\n[44] G.-L. Schmid, C. T. Ngai, M. Ernzer, M. B. Aguilera, T.\nM. Karg, and P. Treutlein, Coherent Feedback Cooling of\na Nanomechanical Membrane with Atomic Spins , Phys.\nRev. X 12, 011020 (2022).\n[45] M. Ernzer, M. B. Aguilera, M. Brunelli, G.-L. Schmid, T.\nM. Karg, C. Bruder, P. P. Potts, and P. Treutlein, Optical\nCoherent Feedback Control of a Mechanical Oscillator ,\nPhys. Rev. X 13, 021023 (2023).\n[46] K. Hammerer, M. Aspelmeyer, E. S. Polzik, and P. Zoller,\nEstablishing Einstein-Poldosky-Rosen Channels between\nNanomechanics and Atomic Ensembles , Phys. Rev. Lett.\n102, 020501 (2009).\n[47] K. Hammerer, M. Wallquist, C. Genes, M. Ludwig, F.\nMarquardt, P. Treutlein, P. Zoller, J. Ye, and H. J. Kim-\nble,Strong Coupling of a Mechanical Oscillator and a\nSingle Atom , Phys. Rev. Lett. 103, 063005 (2009).\n[48] M. Wallquist, K. Hammerer, P. Rabl, M. Lukin, and P.\nZoller, Hybrid quantum devices and quantum engineering ,\nPhys. Scr. T137 , 014001 (2009).12\n[49] M. Paternostro, G. De Chiara, and G. M. Palma,\nCold-Atom-Induced Control of an Optomechanical De-\nvice, Phys. Rev. Lett. 104, 243602 (2010).\n[50] C. Genes, H. Ritsch, M. Drewsen, and A. Dantan, Atom-\nmembrane cooling and entanglement using cavity elec-\ntromagnetically induced transparency , Phys. Rev. A 84,\n051801(R) (2011).\n[51] H. K. Lau, A. Eisfeld, and J. M. Rost, Cavity-free quan-\ntum optomechanical cooling by atom-modulated radiation ,\nPhys. Rev. A 98, 043827 (2018).\n[52] C. F. Ockeloen, R. Schmied, M. F. Riedel, and P. Treut-\nlein, Quantum Metrology with a Scanning Probe Atom\nInterferometer , Phys. Rev. Let. 111, 143001 (2013).\n[53] E. S. Polzik and K. Hammerer, Trajectories without\nquantum uncertainties , Ann. Phys. (Leipzig) 527, A15\n(2015).\n[54] C. B. Møller, R. A. Thomas, G. Vasilakis, E. Zeuthen,\nY. Tsaturyan, M. Balabas, K. Jensen, A. Schliesser,\nK. Hammerer, and E. S. Polzik, Quantum back-action-\nevading measurement of motion in a negative mass ref-\nerence frame , Nature 547, 191 (2017).[55] N. Mann, A. Pelster, and M. Thorwart, Tuning the or-\nder of the nonequilibrium quantum phase transition in\na hybrid atom-optomechanical system , New J. Phys. 21,\n113037 (2019).\n[56] J.-M. Cheng, Z.-W. Zhou, G.-C. Guo, H. Pu, and\nX.-F. Zhou, Bose-Einstein condensates in an atom-\noptomechanical system with effective global nonuniform\ninteraction , Phys. Rev. A 103, 023328 (2021).\n[57] C. W. Gardiner and P. Zoller, Quantum Noise: A\nHandbook of Markovian and Non-Markovian Quantum\nStochastic Methods with Applications to Quantum Optics ,\nSpringer Series in Synergetics (Springer, Berlin, 2004).\n[58] Z.-H. Luo, W. Pang, B. Liu, Y.-Y. Li, B. A. Malomed,\nA new form of liquid matter: Quantum droplets , Front.\nPhys. 16, 32201 (2021).\n[59] F. B¨ ottcher, J.-N. Schmidt, J. Hertkorn, K. S. H. Ng,\nS. D. Graham, M. Guo, T. Langen, and T. Pfau, New\nstates of matter with fine-tuned interactions: quantum\ndroplets and dipolar supersolids , Rep. Prog. Phys. 84,\n012403 (2021)." }, { "title": "2401.18052v1.New_theoretical_Fe_II_templates_for_bright_quasars.pdf", "content": "Draft version February 1, 2024\nTypeset using L ATEX default style in AASTeX631\nNew theoretical Fe II templates for bright quasars\nAshwani Pandey\n ,1Mary Loli Mart ´ınez-Aldama\n ,2Bo˙zena Czerny\n ,1Swayamtrupta Panda\n ,3,∗and\nMichal Zaja ˇcek\n4\n1Center for Theoretical Physics, Polish Academy of Sciences, Al. Lotnik´ ow 32/46, 02-668 Warsaw, Poland\n2Astronomy Department, Universidad de Concepci´ on, Barrio Universitario S/N, Concepci´ on 4030000, Chile\n3Laborat´ orio Nacional de Astrof´ ısica, MCTI, Rua dos Estados Unidos, 154, 37504-364 Itajub´ a, MG, Brazil\n4Department of Theoretical Physics and Astrophysics, Faculty of Science, Masaryk University, Kotl´ aˇ rsk´ a 2, 611 37 Brno, Czech Republic\nABSTRACT\nWe present a set of new theoretical Fe II templates for bright quasars covering a wavelength range\nof 1000-10000 ˚A, based on the recent atomic database available in the C23.00 version of the photoion-\nization code CLOUDY . We compute a grid of models for a range of incident photon flux and gas density\nand for multiple microturbulence velocities. We analyze the ratios of Fe II emission over a variety of\nwavebands and compare them with observations. Our key results are: (1) Despite the use of the newest\natomic data we still confirm the long-standing problem that the predicted Fe II UV/optical ratio is\nsignificantly larger than that observed in the AGN spectra. (2) The ratio is not significantly affected by\nthe variations in the microturbulence and the metallicity. (3) The turbulence can create an additional\napparent velocity shift of up to 1000 km/s in the spectra. (4) There is no single Fe II template that\ncan fit the observational data covering UV to optical wavelength range. We shortly discuss the most\nlikely effects responsible for the Fe II UV/optical mismatch problem: the assumption of the constant\ncolumn density and the assumption of the isotropic emission implying equal contribution of the bright\nirradiated faces and the dark shielded faces of the clouds.\nKeywords: Line: formation — methods: numerical — galaxies: active —quasars: emission lines;\nRadiative transfer simulations; Photoionization\n1.INTRODUCTION\nThe dominant component of the bright active galactic nuclei (AGN) in the optical/UV band is the continuum\ncomponent coming from the cold optically thick geometrically thin disk (see e.g. Krolik 1999; Karas et al. 2021;\nZajaˇ cek et al. 2023a, for reviews). Locally this component is well described as a power law although at high quality\nand/or in broadband data some curvature of the component is visible (e.g. Capellupo et al. 2015). Superimposed on\nthis continuum component are numerous strong and broad emission lines like H β, Mg II, C IV, and Ly α, depending\non the redshift range covered by the data. These lines are easy to identify in the individual spectra of AGN and quasar\ncomposite spectra (e.g. Francis et al. 1991; Vanden Berk et al. 2001; Telfer et al. 2002; Scott et al. 2004; Ren et al.\n2022). These lines come from the Broad Line Region (BLR) which is located at a fraction of a parsec from the central\nsupermassive black hole (SMBH). This region reprocesses the bulk of the radiation from the central parts very close\nto the SMBH.\nApart from these well-resolved strong individual lines, we have a contribution from transitions in weakly ionized\nheavy elements, predominantly iron. These transitions are so numerous that they form a pseudo-continuum well visible\nin the near-IR (NIR), optical and UV bands. This pseudo-continuum affects considerably the fitting of the strong\nindividual emission lines from BLR. The issue has been identified a long time ago (Sargent 1968; Collin-Souffrin et al.\n1979; Wills et al. 1985, 1980). The important role of Fe II diagnostics has been recognized by Boroson & Green (1992)\nCorresponding author: Ashwani Pandey\nashwanitapan@gmail.com\n∗CNPq FellowarXiv:2401.18052v1 [astro-ph.GA] 31 Jan 20242\nin their studies of the many AGN parameters using the Principal Component Analysis (PCA) approach. Their study\nled to the identification of the key role of the Eigenvector 1 (EV1) in the quasar sequence. The ratio, RFeII, of the\nequivalent width (EW) of the Fe II in the 4434-4684 ˚A wavelength range to the EW of H βplayed a key role in EV1,\nand later it became the foundation of the optical Quasar Main Sequence plots showing the Full Width Half Maximum\n(FWHM) of H βvsRFeII(Sulentic et al. 2000; Shen & Ho 2014; Marziani et al. 2018; Panda et al. 2018, 2019b).\nSince Fe II transitions are so numerous, certain standard templates were developed separately for the optical and for\nthe UV bands which were used for detailed modeling of AGN spectra. Some of the templates were purely observational,\ni.e. created by selecting the object with relatively narrow lines and subtracting the known lines and continuum. The\nresidual was considered as coming from Fe II (e.g. Vestergaard & Wilkes 2001; Marziani et al. 2003; Park et al. 2022).\nOther templates were mostly theoretical, based on computing the transition rates (e.g. Bruhweiler & Verner 2008;\nKovaˇ cevi´ c-Dojˇ cinovi´ c & Popovi´ c 2015). Some templates were a combination of both approaches (Tsuzuki et al. 2006,\nbut also partially Kovaˇ cevi´ c-Dojˇ cinovi´ c & Popovi´ c 2015).\nThe main issue with the empirical or observational templates is that these templates are limited by the signal-to-\nnoise ratio (SNR) and the wavelength coverage of the spectra. There is not yet a single empirical template that can\ncover the entire optical to UV bands simultaneously.\nIn this paper, we use the latest version C23.00 of the photoionization code CLOUDY (Chatzikos et al. 2023), which\ncontains a large database of the Fe II transitions, to develop a new theoretical Fe II template that covers a wide\nwavelength range of 1000-10000 ˚A. This new template will be useful to fit the AGN spectra simultaneously from\noptical to UV bands. Some properties of Fe II emission, like the ratio of the Fe II to Mg II line in UV and the trends\nwith the EV1 were studied by Sarkar et al. (2021); Dias dos Santos et al. (2024) but here we study systematically\nseveral correlations which can also be tested against observational data in the NIR to UV wavebands.\n2.METHOD\nWe use the latest version C23.00 of the photoionization code CLOUDY (Chatzikos et al. 2023). CLOUDY code has\nfour different Fe II atomic data sets reported by Verner et al. (1999), Bautista et al. (2015), Tayal & Zatsarinny (2018)\nand Smyth et al. (2019). A comparison of these four data sets is presented in Sarkar et al. (2021). For our model\ncalculations, we use the Fe II data set of Smyth et al. (2019) which is the default Fe+ dataset in CLOUDY C23.00. The\nSmyth et al. (2019) Fe II data set includes 716 levels extended up to 26.4 eV generating 255974 emission lines.\nWe computed several grids of photoionization models that span five decades in the hydrogen gas density, 9 ≤\nlognH(cm−3)≤14, and the incident hydrogen-ionizing photon flux, 17 ≤log Φ H(cm−2s−1)≤22, with a step size\nof 0.25 dex. We adopted a fixed hydrogen column density of 1024cm−2and set the abundance to the default solar\nabundance, as in Sarkar et al. (2021). For the description of the spectral shape of the incident radiation, we used\nthe standard AGN.SED available in the CLOUDY database, which is similar to the continuum of Mathews & Ferland\n(1987).\nWe generated such models with different values of microturbulence velocity (V turb). We used six values of microtur-\nbulence velocity: 0, 10, 20, 30, 50, and 100 km/s. Such range for the microturbulence velocity was inspired by previous\nworks (Baldwin et al. 2004; Bruhweiler & Verner 2008; Panda et al. 2018). For a certain set of values of log Φ Hand\nlognH, we did not get any Fe II emission. We listed these values in Table 1.\nHaving the set of computed spectra, we constructed several ratios of Fe II emission by integrating the spectra over\nthe selected wavelength ranges. Such ratios are frequently studied in the observed spectra, and we aim to analyze the\ntrends in these ratios as functions of the density and the ionizing flux.\nWe also examine the effect of metallicity on these ratios by varying metallicity as 2, 5, 7, 10 and 20 times the solar\nmetallicity.\n2.1. Definitions of optical and UV Fe II\nSince the Fe II emission is of a broad band character the integrated value depends critically on the adopted range\nof integration. In our computations, we use several such ranges that were frequently considered in the literature.\nTo characterize the broadband emission in the optical range we integrate Fe II from 3500 to 7200 ˚A (V´ eron-Cetty\net al. 2004). Some of the studies concentrate on much narrower ranges. For example, the range from 4434 - 4684\n˚A was introduced to parameterize the Fe II emission close and bluewards of the H βline and to characterize the\nrelative importance of the Fe II to H βemission by the corresponding RFeIIratio (Boroson & Green 1992). This ratio\nwas well studied observationally in many papers (e.g. Osterbrock 1977; Bergeron & Kunth 1984; Shen & Ho 2014;\n´Sniegowska et al. 2018; Mart´ ınez-Aldama et al. 2021; Marziani et al. 2022).3\nTable 1. The set of parameters, for which no Fe II emission was obtained.\nlog Φ HlognH\n21.25 9.00\n21.50 9.00\n21.50 9.25\n21.75 9.00\n21.75 9.25\n21.75 9.50\n22.00 9.00\n22.00 9.25\n22.00 9.50\n22.00 9.75\nNote: This set of parameters is valid for all the turbulence velocities except for zero. In case of no turbulence velocity in\naddition to the upper parameters, Fe II emission was also not obtained for log Φ H(cm−2s−1)= 22 and log nH(cm−3) = 10.\nBroad UV Fe II range can be well characterized by the Fe II emission integrated in the wavelength range from 1250\nto 3090 ˚A (Vestergaard & Wilkes 2001). This range contains the Fe II bump at ∼2500 ˚A seen in the spectra as well\nas in early models of Fe II emission (Wills et al. 1985).\nWe also conduct a systematic analysis of two UV and two optical wavelength ranges that may be used to determine\nthe spectral shape. The UV ranges, 2650-2800 ˚A and 2800-3090 ˚A characterize the Fe II emission on each side of the\nMg II line. The optical ranges are 4434-4684 ˚A and 5150-5350 ˚A corresponding to the Fe II emission at the blue and\nred sides of the H βline, respectively. The Fe II emission on both sides of Mg II and H βforms clear local bumps or\npeaks. Therefore, for convenience, we refer to these regions as blue and red wings (e.g. Sarkar et al. 2021).\n3.RESULTS\n3.1. UV to optical Fe II emission\nWe calculated the ratio of the UV to optical broadband Fe II emission with the integration range specified in\nSection 2.1. The results are shown in Figure 1 using contour plots. The representative value in the central parts of\nthe plot is 0.7 in the log space, i.e. the ratio is typically of the order of 5 in linear space. As already argued by Joly\n(1981) and Wills et al. (1985), a ratio of the order of 1 in the relative intensities of the optical to UV lines implies a\ncolumn density of about 1023to 1024cm−2to balance Fe II line optical depths and the Balmer opacity. This value is\nonly weakly sensitive to the ionization flux or density. However, we see that this ratio rises rapidly when either the\nionization parameter becomes very high or very low, and the cloud density rises. At higher values of the ionization\nparameter, above 1020cm−2s−1, this steep rising wall forms a linear trend in the log nH−log Φ Hdiagram, with the\ncharacteristic position correlated with the density. The ratio at this wall exceeds 100. At low values of the ionization\nflux, below 1018cm−2s−1, the ratio depends mostly on the density, changing from the factor 2.5 in the linear scale\nfor densities below 1010cm−3to values above 100 for densities above ∼3×1013cm−3. Lines are almost vertical\nthere, so for low values of the ionization flux this ratio can serve as a density indicator. At intermediate values of the\nionization flux, above 1018cm−2s−1, the dependence on the two parameters is more complex. Thus, when we do not\nhave an estimate of the ionization parameter in the source, high values of the UV to optical Fe II emission can indicate\neither very high or very low ionization flux. Sarkar et al. (2021) stressed the role of the turbulent velocity in the Fe II\nintensity but the global ratio of the UV to optical is relatively unaffected.\nThe ratio shown in Figure 1 represents the expectations based on the assumption of a single zone responsible for\nboth UV and optical emission, which may not be the case in actual objects. We address this issue in the discussion.\n3.2. Red-to-blue UV Fe II wings ratio\nIn our next plot, we concentrate on the global properties of the UV part of Fe II emission which is important for the\nproper modelling of the Mg II line. The Fe II emission under the Mg II line is never close to zero, even right under the\ncentral parts of the Mg II, at 2800 ˚A, as adopted in the creation of UV Fe II observational templates (e.g. Vestergaard\n& Wilkes 2001). However, due to the overlap of the Fe II and Mg II there, it is much easier to measure the strong4\n10 12 14171819202122Vturb=0 km/s\n0.250.500.75\n1.001.251.25\n1.501.50\n1.751.752.00\n2.252.50\n10 12 14171819202122Vturb=10 km/s\n0.500.751.00\n1.00\n1.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.25\n2.50\n10 12 14171819202122Vturb=20 km/s\n0.500.751.00\n1.001.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.25\n2.50\n10 12 14171819202122Vturb=30 km/s\n0.500.751.00\n1.00\n1.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.252.50\n10 12 14171819202122Vturb=50 km/s\n0.500.751.00\n1.00\n1.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.25\n2.502.50\n10 12 14171819202122Vturb=100 km/s\n0.500.751.00\n1.001.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.25\n2.502.500.00.51.01.52.02.5\n0.00.51.01.52.02.53.0\n0.250.751.251.752.252.75\n0.250.751.251.752.252.75\n0.250.751.251.752.252.75\n0.250.751.251.752.252.75\nlognH (cm3)\nlogH (cm2 s1)\nFigure 1. Contour plots for the logarithmic ratio of UV Fe II to optical Fe II emission for different turbulence velocities.\n10 12 14171819202122Vturb=0 km/s\n0.00\n0.250.25\n0.500.50 0.75\n0.75\n1.00\n1.25\n1.50\n1.75\n2.00\n10 12 14171819202122Vturb=10 km/s\n0.00\n0.250.25\n0.500.50\n0.750.75\n1.001.00\n1.25\n1.50\n1.75\n2.002.25\n10 12 14171819202122Vturb=20 km/s\n0.00\n0.250.25\n0.500.50\n0.750.75\n1.001.00\n1.251.25\n1.50\n1.75\n2.00\n10 12 14171819202122Vturb=30 km/s\n0.0\n0.20.2\n0.40.4\n0.60.6\n0.80.8\n1.01.0\n1.21.21.2\n1.4\n1.61.8\n2.0\n10 12 14171819202122Vturb=50 km/s\n0.0\n0.20.2\n0.40.4\n0.60.6\n0.80.8\n1.01.0\n1.21.2\n1.4 1.61.8\n10 12 14171819202122Vturb=100 km/s\n0.0\n0.20.2\n0.40.4\n0.60.6\n0.80.8\n1.01.0\n1.2 1.41.60.000.250.500.751.001.251.501.752.002.25\n0.00.51.01.52.02.5\n0.00.51.01.52.02.5\n0.00.40.81.21.62.0\n0.00.40.81.21.62.0\n0.00.20.40.60.81.01.21.41.61.8\nlognH (cm3)\nlogH (cm2 s1)\nFigure 2. Contour plots for the ratio of red (2800-3090 ˚A) to blue (2650-2800 ˚A) part of the UV Fe II spectra for different\nturbulence velocities.5\nwings that Fe II forms at both the red and blue sides of Mg II. Proper modeling of the underlying Fe II may affect the\nconclusions about the dynamics of the Mg II emitting region (e.g. Joni´ c et al. 2016; Popovi´ c et al. 2019).\nThe contour plots for the ratio of red (2800-3090 ˚A) to blue (2650-2800 ˚A) wings of UV Fe II are shown in Figure 2.\nThe plot of the ratio shows a complicated structure. We again see a trend similar to the one displayed in Figure 1.\nThe same values of the ratio are found at low-density high ionization flux and high-density low ionization flux. At\nlow ionization flux, the ratio again depends mostly on the density. However, in this case, we additionally observe the\ndependence on the turbulent velocity, as in the central parts the ratio is initially rising, and finally decreasing when\nthe turbulent velocity crosses the value 50 km s−1. Maybe this is connected with the fact that the overall range in the\nmeasured ratio is much smaller for the red to the blue wing (typical range between 0.3 and 1.8) than in the case of\nthe entire UV to optical range covering a broad range of magnitudes.\nThe two wings represent different multiplets in templates of Kovaˇ cevi´ c-Dojˇ cinovi´ c & Popovi´ c (2015), so they may,\nor may not, come from the same region (see Section 4.\n3.3. The effect of the UV Fe II broadening on the measurements of the outflow properties\nIn the analysis of their Sloan Digital Sky Survey (SDSS) sample, Kovaˇ cevi´ c-Dojˇ cinovi´ c & Popovi´ c (2015) noticed\na systematic averaged redshift in the UV Fe II to the optical Fe II. To check if such a shift can be caused just by\nthe shape of the Fe II emission when broadened with the turbulence effect included, we used a specific Fe II template\ncharacterized by the ionization flux, log Φ H(cm−2s−1) = 20 .5, and the density, log nH(cm−3) = 12. We applied the\nGaussian smearing to the template, and we determined the peak wavelength of the blue wing of UV Fe II. The peak\nis usually located close to ∼2750 ˚A , and it is dominated by the multiplets 62 and 63 (see Kovaˇ cevi´ c-Dojˇ cinovi´ c &\nPopovi´ c 2015). However, when we model the entire Fe II emission of the blue wing we see that the position of the peaks\nmoves with the adopted smear velocity. We plot this effect in Figure 3 simply in ˚A units, and in Figure 4 in velocity\nspace. The shift corresponds to the apparent velocity from 100 km s−1up to 300 km s−1when the turbulence is not\nincluded, and the presence of the turbulence affects the apparent direction of the outflow and its amplitude. Apparent\nvelocity shifts up to 1000 km s−1are possible even though no velocity is present in the model which corresponds in\neach case to the rest frame spectrum. In Kovaˇ cevi´ c-Dojˇ cinovi´ c & Popovi´ c (2015) more than half of the sources show a\nkinematic offset above 1000 km s−1. We do not see such large shifts due to the Fe II smoothing but we experimented\nonly with a single template.\n3.4. Red-to-blue optical Fe II wings ratio\nThis part of Fe II emission is important for accurate modelling of the H βzone, as recently stressed by Popovi´ c et al.\n(2023). Proper modelling of the Fe II pseudo-continuum may strongly affect the conclusions about the dynamics of\nthe BLR (like the presence or absence of the very broad line component to H β, and the role of the intermediate line\nregion), and the modelling of the quasar main sequence (Panda et al. 2018, 2019a,b; Marziani et al. 2021).\nWe show contour plots for the ratio of red (5150-5350 ˚A) to blue (4434-4684 ˚A) parts of optical Fe II in Figure 5. This\nratio shows again the non-monotonic dependence of the ionization parameter but interestingly, almost no dependence\non the density. The minimum value of around 1.0 is present at the ionization parameter 1020cm−2s−1, increasing\nwhen we move both up and down in the ionization flux. The dependence on the turbulent velocity is marginally\nnoticeable, particularly for this minimum value. Some traces of dependence on the density are only seen for very low\nionization flux, below 1018cm−2s−1, and only for very high densities. The value of the turbulent velocity affects the\nextension of this region.\n3.5. RFeIIin the optical band\nWhen computing the Fe II emission with CLOUDY we also have, as a by-product, the intensities of other emission\nlines. The ratio RFeIIof the optical Fe II emission to H βplays an exceptional role in the EV1 of the quasar sequence\n(Boroson & Green 1992; Sulentic et al. 2000; Shen & Ho 2014; Marziani et al. 2018; Panda et al. 2018, 2019b; Du\n& Wang 2019; Panda & Marziani 2023). We estimated RFeIIas the ratio of the integrated optical Fe II flux in the\nstandard wavelength range 4434-4684 ˚A to the flux of H βat 4861.32 ˚A. We present the corresponding contour maps\nin Figure 6.\nThese plots show that most of the map area corresponds to the value of RFeIIsmaller than 1. Higher values, above\n3, are only predicted for the intermediate values of the turbulent velocity (20 - 30 km s−1), and only for very high\nvalues of the ionization parameter (log Φ H(cm−2s−1)>21) which supports the earlier findings by Panda et al. (2018)6\n1000 2000 3000 40004849\nVturb=0 km/s\n1000 2000 3000 4000485052\nVturb=10 km/s\n1000 2000 3000 40004648505254\nVturb=20 km/s\n1000 2000 3000 400048505254\nVturb=30 km/s\n1000 2000 3000 40004648505254\nVturb=50 km/s\n1000 2000 3000 400040.042.545.047.5\nVturb=100 km/s\nSmear velocity (km/s)Peak wavelength (2700+ Å)\nFigure 3. Variation of UV Fe II peak wavelength with the smear velocity for log Φ H(cm−2s−1) = 20 .5,log n H(cm−3) = 12,\nand different turbulence velocities.\n1000 2000 3000 4000300\n200\n100\nVturb=0 km/s\n1000 2000 3000 4000200\n0200\nVturb=10 km/s\n1000 2000 3000 4000400\n200\n0200400\nVturb=20 km/s\n1000 2000 3000 4000200\n0200400\nVturb=30 km/s\n1000 2000 3000 4000500\n250\n0250500\nVturb=50 km/s\n1000 2000 3000 40001000\n500\nVturb=100 km/s\nSmear velocity (km/s)Peak (km/s)\nFigure 4. Variation of UV Fe II peak around 2750 ˚A wavelength in velocity space with the smear velocity for log Φ H(cm−2s−1) =\n20.5,log n H(cm−3) = 12, and different turbulence velocities. Here, a negative peak value represents an outflow, while a positive\nvalue denotes an inflow.7\n10 12 14171819202122Vturb=0 km/s\n0.00.30.6\n0.9\n0.90.9\n1.21.21.2\n1.5\n1.8\n2.1\n2.42.4\n2.7\n10 12 14171819202122Vturb=10 km/s\n0.00.3\n0.60.60.6\n0.9\n0.90.9\n1.21.21.2\n1.5\n1.82.1\n2.42.7\n10 12 14171819202122Vturb=20 km/s\n0.00.3\n0.60.6\n0.6\n0.9\n0.90.9\n1.2\n1.21.2\n1.5 1.8\n2.1\n2.4\n2.72.7\n10 12 14171819202122Vturb=30 km/s\n0.00.3\n0.60.6\n0.9\n0.90.9\n1.21.21.2\n1.5\n1.82.1\n2.42.4\n2.7\n10 12 14171819202122Vturb=50 km/s\n0.00.30.6 0.9\n0.90.9\n1.2\n1.21.2\n1.5\n1.8\n2.12.1\n2.42.4\n2.7\n3.0\n10 12 14171819202122Vturb=100 km/s\n0.00.30.6 0.9\n0.90.9\n1.2\n1.21.2\n1.5\n1.8\n2.12.1\n2.42.4\n2.72.7\n3.00.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.61.21.82.43.0\nlognH (cm3)\nlogH (cm2 s1)\nFigure 5. Contour plots for the ratio of red (5150-5350 ˚A) to blue (4434-4684 ˚A) part of the optical Fe II spectra for different\nturbulence velocities.\n10 12 14171819202122Vturb=0 km/s\n0.000.00\n0.150.15\n0.300.30\n0.450.45\n0.600.60\n0.750.75\n0.900.901.051.20\n10 12 14171819202122Vturb=10 km/s\n0.00.0\n0.30.3\n0.60.6\n0.90.9\n1.21.21.5\n1.82.12.4\n2.73.0\n10 12 14171819202122Vturb=20 km/s\n0.00.0\n0.40.4\n0.80.8\n1.21.2\n1.62.02.42.8\n3.23.6\n10 12 14171819202122Vturb=30 km/s\n0.00.0\n0.40.4\n0.80.8\n1.21.21.62.02.4\n2.83.2\n10 12 14171819202122Vturb=50 km/s\n0.00.0\n0.40.4\n0.80.8\n1.21.21.62.0\n2.42.83.2\n10 12 14171819202122Vturb=100 km/s\n0.000.00\n0.250.25\n0.500.50\n0.750.75\n1.001.001.251.501.752.002.250.000.150.300.450.600.750.901.051.201.35\n0.00.61.21.82.43.0\n0.00.81.62.43.24.0\n0.00.81.62.43.24.0\n0.00.40.81.21.62.02.42.83.23.6\n0.00.51.01.52.02.5\nlognH (cm3)\nlogH (cm2 s1)\nFigure 6. Contour plots for R FeIIi.e. the ratio of Fe II 4434-4684 ˚A to H β(λ4861.32) fluxes for different turbulence velocities.8\n0 0:5 1:0 1:5 2:0 2:5 3:0 3:5 4:0\nRFeII0500100015002000NRakshit+20\nShen+11\nFigure 7. Histogram of the RFeIIdistribution in SDSS quasar spectra based on Shen et al. (2011) (blue) and Rakshit et al.\n(2020) (green).\nTable 2. The model predicted ratios of Fe II emission for various abundances, with a fixed microturbulence velocity of 20\nkm/s, in different wavebands considered in this work.\nAbundance (in Z⊙) log Φ H,lognHUV Fe II/optical Fe II UV red/blue wings Optical red/blue wings R FeII\n1 18,10 2.56 2.13 1.81 0.91\n20.5,12 8.98 1.26 0.84 1.09\n5 18,10 2.28 2.05 1.99 1.27\n20.5,12 5.63 1.21 0.75 2.49\n20 18,10 3.03 1.77 1.88 0.99\n20.5,12 4.94 1.03 0.76 4.42\nand Panda (2021). Smaller values of RFecorrespond to the intermediate A-type quasars. The basic classification of\nquasars into class A and B, introduced by Sulentic et al. (2000) was analogous to the older classification of Seyfert\ngalaxies into Narrow Line Seyfert 1 (NLS1) class and other Seyfert 1 galaxies (Osterbrock & Pogge 1985), only the\nlimiting velocity was different (4000 km s−1vs. 2000 km s−1), which reflected the systematic difference in the mass\nof the central black hole. In both cases, one class (NLS1 and type A) of objects corresponded to relatively higher\nEddington rate sources than the other class, which was reflected in line properties (intensities and shapes). Later, the\nspecific ranges of RFewere used to explore full 2-D classification (see e.g., Marziani et al. 2018). A-type quasars with\nRFeII≳1 were named Extreme Population A (xA) sources, and they were found to be applicable as standard candles\nfor cosmology (Marziani & Sulentic 2014; Dultzin et al. 2020; Marziani 2023; Panda & Marziani 2023). Most of the\nxA sources have the values of RFeIIbetween 1 and 2 (Marziani et al. 2018) but ´Sniegowska et al. (2018) found one\nsource with a large ratio. A few more such sources were reported by Shen et al. (2011) but as discussed in ´Sniegowska\net al. (2018), those measurements were not of high quality. Moreover, the sources with RFeII≳2 are reported in the\nnewer catalogs (e.g. Negrete et al. 2018; Rakshit et al. 2020, 2021; Wu & Shen 2022).\nWe, thus, could conclude, from Figure 5, that xA sources require high-density BLR (log nH(cm−3) = 12 −13) and\nvery high radiation flux. However, our templates were composed of solar metallicity. Some authors argued (e.g. Panda\net al. 2019b; ´Sniegowska et al. 2021; Panda 2021; Marziani et al. 2024) that these sources, in addition, require highly\nsuper-solar metallicity.\nWe compared these predictions with the statistical distribution of the RFeIIreported on the basis of SDSS quasar\nstudies. We used two data sets: older massive fits to the SDSS quasars, based on data release 7 (DR 7), were reported\nby Shen et al. (2011). Newer results, based on DR 14, were reported by Rakshit et al. (2020). The results are based\non the spectral decomposition of the Fe II emission integrated within the traditional range 4434-4684 ˚A (Boroson &\nGreen 1992). In both cases, we selected only the sources with reliable spectra decomposition by requiring that the\nrelative error of the FWHM of H βand the RFeIImeasurement are below 20%. The resulting histograms, shown in9\nTable 3. Basic properties of the sources.\nSource RA Dec Redshift log(L 3000[erg/s]) log ( MBH[M⊙])λEdd Reference\nHE 0413-4031 4h15m14s−40◦23′41′′1.39117∗46.74 8.87 1.66 Prince et al. (2023)\nSDSS RM102 14h13m53s+52◦34′44′′0.86114 45.00 7.92 0.329 Shen et al. (2019)\n∗The redshift to this source was recently firmly established from the narrow [OIII] line using the near-IR spectrum (Zajaˇ cek\net al. 2023b).\nFigure 7, consistently show the peak of the RFeIIvalues at about 0.6 in both samples. There are very few objects with\nvalues above 4.0 which we ignored for better clarity of the plot. Such values are present either in the region of higher\ndensity and high ionization flux, above ∼1020cm−2s−1, or low ionization flux and low density (lower left corner of\nplots in the Figure 6). The first location seems more likely as it is smoothly connecting to even larger values of RFeII\nthan the average value, and the observational histogram also smoothly extends to higher values. However, we should\nstress that the observational results are not based on the Fe II emission models presented in this paper. Results of\nboth Shen et al. (2011) and Rakshit et al. (2020) are based on the use of the optical Fe II template from Boroson &\nGreen (1992).\n3.6. The effect of metallicity\nTo investigate the effect of metallicity on Fe II emission, we rebuild our models for abundances equal to 2, 5, 7,\n10, and 20 times solar abundances, with a fixed microturbulence velocity of 20 km/s. We plot contours for the ratios\nestimated in the previous sections in Figures 8-11 for various abundances. The values of these ratios at two arbitrary\npositions are given in Table 2 to quantify their variations with abundances.\nThe UV Fe II to optical Fe II contours, shown in Figure 8, exhibit marginal changes with abundances. The ratio\ndecreases with increasing abundance at (log Φ H,lognH)=(20.5,12), however at no such trend is seen at lower incident\nflux, and lower density (log Φ H,lognH)=(18,10). Verner et al. (2003) investigated the effect of varying abundance on\nthe ratio of UV Fe II to optical Fe II and found that the ratio decreases from 8 to 5.6 when abundance increases from\nsolar to 10 times solar abundance for log Φ H(cm−2s−1) = 20 .5,log n H(cm−3) = 9 .5 and a microturbulence velocity of 1\nkm/s. They concluded that the optical Fe II emission increases more than the UV Fe II emission when the abundance\nincreases which is supported by the findings from Panda et al. (2019a).\nFigure 9 shows the contours for the ratio of UV wings, whereas Figure 10 shows those of optical wings. As seen\nfrom the Figures and Table 2, both ratios are essentially unaffected by the abundance.\nThe contours for R FeIIare plotted in Figure 11 which shows small variations with abundance. The ratio increases\nwith increasing abundance at high ionization flux and high density (log Φ H,lognH)=(20.5,12), but no such trend is\nseen at (log Φ H,lognH)=(18,10).\n3.7. Fe II templates\nFor convenient use in future spectral fitting, we created a new family of Fe II templates. They come from the\nsimulations as described in Section 2, i.e. those are 2646 models covering the range of the local density, ionization flux\nand turbulent velocity. Output files from CLOUDY are usually large, and data fitting does not require full resolution\navailable in these output files since most of AGN have broad Fe components. Therefore, we binned the output spectra\nusing the 2 ˚A bins. We tested whether this does not lead to a considerable problem in data fitting by assuming that\nthe AGN spectrum comes from the medium with the velocity dispersion 2000 km s−1and we compared the Fe II\nspectrum in the 2650 - 2850 ˚A range without any prior binning, and with a bin size of 1, 2 and 5 ˚A. The result is\nshown in Figure 12. Up to the bin size of 2 ˚A there is no net difference in the broadened spectra but the bin size of 5\n˚A seems to imply already a systematic difference, so we adopted the 2 ˚A bin size optimizing between the accuracy and\nthe size of the file. The complete set of Fe II templates for solar metallicity is available through zenodo1and GitHub2\nlinks.\n3.8. Exemplary cases\n1https://zenodo.org/doi/10.5281/zenodo.10532690\n2https://github.com/Ashwani-88/Fe2 template10\n10 12 14171819202122Z=Z\n0.500.751.00\n1.001.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.25\n2.502.75\n10 12 14171819202122Z=2Z\n0.500.751.00\n1.001.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.252.502.75\n10 12 14171819202122Z=5Z\n0.500.751.00\n1.00\n1.251.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.252.502.75\n10 12 14171819202122Z=7Z\n0.500.75\n1.001.00\n1.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.252.502.75\n10 12 14171819202122Z=10Z\n0.500.75\n1.001.00\n1.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.252.50\n2.75\n10 12 14171819202122Z=20Z\n0.50\n0.75\n1.001.001.001.00\n1.251.251.25\n1.501.50\n1.751.75\n2.002.00\n2.252.252.502.750.00.51.01.52.02.53.0\n0.00.51.01.52.02.53.0\n0.250.751.251.752.252.75\n0.250.751.251.752.252.75\n0.250.751.251.752.252.75\n0.250.751.251.752.252.75\nlognH (cm3)\nlogH (cm2 s1)\nFigure 8. Contour plots for the logarithmic ratio of UV Fe II to optical Fe II emission for turbulence velocity V turb= 20\nkm/s and different metallicities. The white diamonds in the plots show that the ratio cannot be estimated because there is no\nFe II emission available for the specified set of parameters.\n10 12 14171819202122Z=Z\n0.00\n0.250.25\n0.500.50\n0.750.75\n1.001.00\n1.251.25\n1.50\n1.75\n2.00\n10 12 14171819202122Z=2Z\n0.00\n0.250.25\n0.500.50\n0.750.75\n1.001.00\n1.251.50\n1.75\n2.00\n10 12 14171819202122Z=5Z\n0.0\n0.20.2\n0.40.4\n0.60.6\n0.80.8\n1.01.01.21.2\n1.41.6\n1.82.0\n10 12 14171819202122Z=7Z\n0.0\n0.20.2\n0.40.4\n0.60.6\n0.80.8\n1.01.0\n1.21.4\n1.61.8\n2.0\n10 12 14171819202122Z=10Z\n0.0\n0.20.2\n0.40.4\n0.60.6\n0.80.8\n1.01.0\n1.21.4\n1.61.8\n2.0\n10 12 14171819202122Z=20Z\n0.0\n0.20.2\n0.40.4\n0.60.6\n0.80.80.8\n1.01.01.0\n1.21.4\n1.61.80.00.51.01.52.02.5\n0.000.250.500.751.001.251.501.752.002.25\n0.00.40.81.21.62.0\n0.00.40.81.21.62.0\n0.00.40.81.21.62.0\n0.00.40.81.21.62.0\nlognH (cm3)\nlogH (cm2 s1)\nFigure 9. Contour plots for the ratio of red (2800-3090 ˚A) to blue (2650-2800 ˚A) part of the UV Fe II spectra for turbulence\nvelocity V turb= 20 km/s and different metallicities.11\n10 12 14171819202122Z=Z\n0.00.3\n0.60.6\n0.6\n0.9\n0.90.9\n1.2\n1.21.2\n1.5 1.8\n2.1\n2.4\n2.72.7\n10 12 14171819202122Z=2Z\n0.00.3\n0.60.60.60.9\n0.90.9\n1.21.21.2\n1.5\n1.82.1\n2.42.4\n2.7 2.7\n10 12 14171819202122Z=5Z\n0.00.3\n0.60.60.6\n0.6\n0.90.90.9\n1.21.2 1.2\n1.2\n1.51.8\n2.12.4\n2.72.7\n10 12 14171819202122Z=7Z\n0.00.3\n0.60.6\n0.90.9 0.9\n1.21.21.2\n1.5\n1.8\n2.1\n2.42.72.7\n3.0\n10 12 14171819202122Z=10Z\n0.00.3\n0.60.6\n0.6\n0.90.9 0.9\n1.21.2 1.2\n1.5\n1.8\n2.1 2.4\n2.72.7\n3.0\n10 12 14171819202122Z=20Z\n0.00.40.4\n0.8\n0.80.8\n1.21.21.2\n1.2\n1.6\n2.02.4\n2.82.8\n3.23.60.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.61.21.82.43.0\n0.00.81.62.43.24.0\nlognH (cm3)\nlogH (cm2 s1)\nFigure 10. Contour plots for the ratio of red (5150-5350 ˚A) to blue (4434-4684 ˚A) part of the optical Fe II spectra for turbulence\nvelocity V turb= 20 km/s and different metallicities.\n10 12 14171819202122Z=Z\n0.00.0\n0.40.4\n0.80.8\n1.21.2\n1.62.02.42.8\n3.23.6\n10 12 14171819202122Z=2Z\n0.00.0\n0.50.5\n1.01.0\n1.52.02.53.03.5\n4.04.5\n10 12 14171819202122Z=5Z\n0.00.0\n0.80.81.6\n2.43.24.04.85.6\n6.47.2\n10 12 14171819202122Z=7Z\n00\n112\n234\n56 7 8\n10 12 14171819202122Z=10Z\n00\n11 234\n56 789\n10 12 14171819202122Z=20Z\n0.00.0\n1.53.04.56.07.5\n9.010.512.00.00.81.62.43.24.0\n012345\n0.01.63.24.86.48.0\n0123456789\n0246810\n03691215\nlognH (cm3)\nlogH (cm2 s1)\nFigure 11. Contour plots for R FeIIi.e. the ratio of Fe II 4434-4684 ˚A to H β(λ4861.32) fluxes for turbulence velocity V turb= 20\nkm/s and different metallicities.12\n2650 2700 2750 2800 2850\nWavelength (Å)0.50.60.70.80.91.0FFeII (a.u.)unbinned\n2A-bin\n5A-bin\n1A-bin\nFigure 12. Plot showing the justification of the choice of 2 ˚A bin size. The larger bin size (5 ˚A) already shows a visible\ndeparture in the smoothed shape from the denser grid.\nWe test how the new Fe II templates compare with the observed AGN spectra. Since we use the SED more\nappropriate for bright quasars to construct the Fe II templates, we selected two exemplary sources of this type namely,\nHE 0413-4031 and SDSS RM102. The basic properties of these sources are mentioned in Table 3. In the case of HE\n0413-4031, only narrow UV band data are available while the spectrum of SDSS RM102 continuously covers the broad\nUV-to-optical band.\n3.8.1. HE 0413-4031\nThis quasar has been observed with the Southern African Large Telescope (SALT) for 13 years with the aim of\nperforming the reverberation mapping of the Mg II line and the UV Fe II (Zajaˇ cek et al. 2020; Prince et al. 2023;\nZajaˇ cek et al. 2023b). The obtained spectra cover a narrow range around the Mg II line but the spectral shape did not\nshow any strong variability apart from the normalization of the spectrum. We thus constructed the mean spectrum of\nthis quasar by combining all 32 available data sets for a better S/N ratio. The shape of the Mg II line in this source\nis particularly simple, well fitted as a single kinematic component of the Lorentzian shape.\nWe fit all the parameters together (slope and normalization of the power law, normalization and the broadening of\nthe Fe II template, the position, normalization and FWHM of the Mg II) since in case of such a short data range we\ndo not have any possibility to find parts of the spectrum unaffected by Fe II and fit first the underlying power law.\nThe narrow spectral range makes the fits not strongly constraining the Fe II templates but the fits are very satisfac-\ntory. The results of the spectral fitting are shown in Figure 13. The best solution corresponds to log Φ H(cm−2s−1) =\n18.25, shown in the middle panel of Figure 13. The best fit FWHM of the Fe II (5400 km s−1) is broader than the\nFWHM of Mg II (4280 km s−1) but it comes with a large error. Higher turbulent velocity (100 km s−1) gives fits with\nsomewhat higher reduced χ2, and pushes the FWHM of Fe II toward even higher values, at the same time increasing\nthe Fe II intensity. This results from considerable degeneracy between the Fe II normalization and the underlying\npower law. A lower value of the turbulent velocity (20 km s−1) gives narrower Fe II lines but the quality of the fit is\nmuch worse.\nFor comparison, we show two other fits, for higher (log Φ H(cm−2s−1) = 19) and lower (log Φ H(cm−2s−1) = 18)\nionization fluxes in the upper and lower panels of Figure 13, respectively. The fit quality is good in all these cases\n(χ2differences ∼1.0), and the value of the EW of the Mg II line is similar (31.2 ˚A, 30.2 ˚A and 28.4 ˚A), but slowly\nrising towards larger ionization fluxes. We calculated also EW(Fe II) but only in the fitted range. EW(Fe II) is more\naffected by the change of the ionizing flux (the corresponding values are 37.9 ˚A, 31.2 ˚A and 15.9 ˚A), and all these\nvalues are larger than achieved with the use of different templates by Zajaˇ cek et al. (2023b). Such a large change is\nrelated to a corresponding change in the slope and normalization of the underlying power law.\nThe chosen fit density (log nH(cm−3) = 12) is consistent with the best fit theoretical template d12-m20-20-5.dat\nselected from the collection of Bruhweiler & Verner (2008) in our previous papers, including Prince et al. (2023).\nHowever, the ionization flux is now lower by more than two orders of magnitude.13\nHE 0413-4031\nHE 0413-4031\nHE 0413-4031\nFigure 13. The exemplary fits to the SALT spectrum with the Fe II template phi19.0-nH12.0-m50.dat, FWHM = 5400 km\ns−1(upper panel), phi18.25-nH12.0-m50.dat, FWHM = 5400 km s−1(middle panel), and phi18.0-nH12.0-m50.dat, FWHM =\n5800 km s−1(lower panel). The middle panel shows the best fit.\nWe compared the requested value for the ionizing flux from Fe II modelling with the expected ionizing flux based on\nSED of this object and the Mg II time delay of 302.6 days for Mg II (Zajaˇ cek et al. 2020) but the obtained ionization\nflux from the SED best fit presented in Figure 9 of Zajaˇ cek et al. (2020) gave only log Φ H(cm−2s−1) = 14 .6, since the\nspectrum appeared to decrease rapidly in the UV band.\nThe narrow available spectral range on one hand guarantees that a range of templates fits well the spectrum but it\nopens a question of how reliable is such a decomposition.14\nTable 4. The ratios of Fe II intensities measured in the rest frame of the object RM102\nwavelength range 1 wavelength range 2 ratio 1 to 2\n2800-3090 ˚A 2650-2800 ˚A 1.939\n5150-5350 ˚A 4434-4684 ˚A 0.713\n2000-3090 ˚A 4000-5350 ˚A 2.151\n3.8.2. SDSS RM102\nAs a second example, we selected the quasar SDSS J141352.99+523444.2 (SDSS RM102) from the SDSS Reverber-\nation Mapping (SDSS-RM) catalogue (Shen et al. 2019) considering a high signal-to-noise, moderate Fe II emitter\n(RFeII>0.5), and a reliable time lag for H βor Mg II λ2800 (maximum Pearson correlation coefficient >0.4). The\nspectrum of the source covers a broad wavelength range (2000-5500 ˚A). This allowed us to cover both the rest-frame\noptical Fe II as well as UV Fe II and to test the feasibility of using the same Fe II template to fit the entire UV-to-optical\nspectral range. The size of its BLR region has been estimated by different methods, in this paper we took the one\nestimated by the Interpolated Cross-Correlation Function (ICCF), τMgII−ICCF = 101 .7+11.6\n+10.3andτHβ−ICCF = 104 .6+20.5\n+18.5\ndays in the observed-frame (Shen et al. 2023). Using the SDSS Science Archive Server (SAS) from the DR163, we\nfound 70 spectroscopic epochs observed during four years. All the spectra were combined in a single one to obtain a\nhigh signal-to-noise spectrum, S/N=30 and 35 at 3000 ˚A and 4000 ˚A, respectively. Due to the presence of spikes around\n5100˚A, it was not possible to estimate the S/N at this wavelength.\nIn the spectral fitting, we considered all the emission lines reported by Vanden Berk et al. (2001) between 2000\nand 5500 ˚A, 31 emission lines in total. We also included a model of the Balmer Continuum with an optical depth of\n1 plus the High-Order Balmer lines (Bernal et al in prep.). The continuum was fitted with a single power law. To\ndecrease the number of free parameters, we fixed the same FWHM for each family of emission lines: Balmer lines,\nHelium transitions, forbidden lines (narrow emission lines), and coronal lines. Flux intensities, FWHM, and shift sum\na total of 63 free parameters. We applied Gaussian smearing to the UV and optical Fe II template and a single flux\nintensity value was taken for the UV and optical wavelengths. In the first attempt, we noticed that it was not possible\nto fit the UV and optical Fe II contribution with the same flux intensity. Thus, we performed a careful fitting of all\nthe other spectral features and what remained can be considered as the Fe II component. Due to the overlapping\nof the emission lines and the Fe II pseudocontinuum in some ranges, the flux intensity of the emission line would\nbe underestimated. So, we considered the semiempirical UV/optical Fe II templates implemented in the fitting code\nPyQSOFit (Guo et al. 2018) to constrain the intensity of the emission lines. As we previously noticed, even with these\nempirical Fe II templates, a different flux intensity value is needed to fit the Fe II contribution. The flux intensity\nfactor has a difference of 3.5 between the UV and the optical Fe II contribution. The final spectral fitting is shown in\nFigure 14. The potential Fe II contribution is shown at a zero level. As a reference, we also plotted the UV (dotted\nline) and optical (dashed-line) Fe II templates implemented in PyQSOFit . There is good agreement in the optical Fe\nII, while slight variations are seen in the UV part.\nThe new spectral fitting indicates a RFeII=1.24, which is approximately twice the value reported by Shen et al.\n(2019). On the other hand, this source shows a moderate Eddington ratio λEdd=0.329 (Shen et al. 2019). The weak\ncontribution of the doublet [OIII] λλ5007,4959 suggests that RM102 has a moderate Eddington ratio and is close to\nthe xA sources (Marziani 2023).\nTo locate the source in the log nH−log Φ Hplane, we measured three ratios: red to blue wings of UV Fe II, red to\nblue wings of optical Fe II, and UV to optical Fe II. The first two ratios were measured in the same wavelength range\nas used to create the general maps in Figure 2 and Figure 5. The last ratio had to be modified since the data cover\nthe wavelength range only up to 2000 ˚A. The measured ratios are given in Table 4. Looking at the plots in Section 3\nabove we could not easily identify the most likely parameters of the successful template. We thus created a new map,\nshown in Figure 15, where all the three ratios given in Table 4 are shown as contour plots, each for all 6 turbulent\nvelocities.\nWe see that the three families of lines in Figure 15 never cross. This means that there is no single template in our\ncollection which could fit the data for the quasar RM102. The blue lines representing the ratio of red to blue wings\n3https://dr16.sdss.org/optical/spectrum/search15\n2000 3000 4000 5000\nrestframe(Å) \n0204060F (1017 erg s1 cm2 Å1)\nFigure 14. Spectral fitting of the sources RM102. The cyan line corresponds to the best fit of the emission lines (dotted line)\nand the continuum (dashed line). The Fe II pseudocontinuum is shown at the zero level (red line). For reference, we also show\nthe semi-empirical UV (dotted line) and optical (dashed) templates implemented in PyQSOfit in dark red.\n9 10 11 12 13 14171819202122\nt=0t=10\nt=20t=30\nt=0t=10t=20t=30t=0t=0\nt=0t=0t=10\nt=10t=10\nt=20t=20t=20\nt=30t=30t=30\nt=50t=50\nt=50\nt=100t=100\nt=100\nlognH (cm3)\nlogH (cm2 s1)\nFigure 15. Contours corresponding to the ratios observed in the source RM102 of Fe II UV-to-optical ratio (denoted by black\nlines), red to blue wings of UV Fe II (denoted by red lines) and red to blue wings of optical Fe II (denoted by blue lines).\nThe values of microturbulent velocity are labelled on each contour. The three families do not cross, with the optical wing ratio\nimplying much higher ionization than the other two.\nof optical Fe II occupy a narrow range of high ionization flux values. This reflects the fact that the measured ratio\nis low and the corresponding solutions are located in the upper part of the general diagram (see Figure 5). On the\nother hand, the UV wings ratio in general forms a two-family solution for low values (see Figure 2), but for high values\nas the one measured in our source there is only an island located at low ionization flux and low density. The global\nUV to optical ratio (although measured in a slightly different wavelength range than the generic Figure 1) also points\ntoward low density and low ionization flux. The results for densities of the order of 1011−1012cm−3and moderate\nionization fluxes of the order of 1018cm−2s−1are similar to the parameter range concluded for HE 0413-4031, but\nthe optical wing ratio remains unexplained.\nWe estimated the ionization flux from this source at the distance corresponding to the BLR position as given by\nthe H βline delay. However, the SDSS spectrum does not cover the spectral range above 1 Rydberg, needed for this\npurpose. We thus extrapolated the spectrum of RM102 using the AGN SED template from CLOUDY. The observed16\n2000 2500 3000 3500 4000 4500 5000 55000.6\n0.4\n0.2\n0.00.20.40.60.81.0\nWavelength (Å)f (a.u.)\nFigure 16. A comparison of the observed Fe II emission in RM102 (blue points) with the two options for a theoretical template\nfrom our set (see text). The red curve denotes the Fe II flux in the wavelength range 1989-4000 ˚A for log Φ H(cm−2s−1) = 18\nwhile the black curve represents the Fe II emission in the wavelength range 4000-5530 ˚A for log Φ H(cm−2s−1) = 20. The\nmagenta curve is obtained using the second approach.\nspectrum is only marginally bluer in the optical band. Matching the two spectra at UV part we obtained the ionization\nflux of 1 .99×1020cm−2s−1. We also tested another way of extension, using the HST composite spectrum of Zheng\net al. (1997) which covers the rest frame range from 350 ˚A up to 2200 ˚A, and they give the broken power law fit.\nMatching this broken power law to the shortest wavelengths with our spectrum we obtained the ionization flux of\n1.35×1020cm−2s−1. The two values are comparable, they eventually favour the value implied by the red-to-blue\noptical Fe II ratio, although at (rather likely) higher densities than 1010cm−3they are not in full agreement with\nany of the ratios. However, some composites predict a stronger decrease of the quasar far-UV flux towards shorter\nwavelengths (see Cai & Wang 2023, and the references there).\nOverall, Figure 15 implies that a single Fe II template is unlikely to fit well the whole spectrum. In particular, the\nmismatch in the values of the ionization flux is by a factor of 100. The metallicity is not affecting the ratios strongly\nenough. We thus set the density at the likely value of 1011cm−3, and we took two approaches to set the ionizing flux.\nIn the first case, we allowed for a discontinuity in the ionizing flux at 4000 ˚A, where the Fe II emission is very low,\nand we used low ionizing flux in UV band (log Φ H(cm−2s−1) = 18) and high ionizing flux (log Φ H(cm−2s−1) = 20) in\nthe optical band. Separate fitting of the Fe II and optical is usually done when modelling a specific source. The result\nof this approach is shown in Figure 16. In the second approach, we allowed for a linear change of the ionizing flux\nwith the wavelength in the log-log scale. This result is shown in the same plot (magenta line). None of these attempts\nare fully satisfactory. However, the discontinuous model seems to work much better. Still, in both cases, we face a\nconsiderable mismatch between the model and the data in the region 3000 - 3500 ˚A. Semi-empirical models do include\nconsiderable emission there (see Figure 14, dotted line). The spike close to ∼2000 ˚A is most likely a Fe III emission.\nWe did not try a more complex approach in the form of the Locally Optimized Cloud (LOC) model of Baldwin et al.\n(1995) since we do not include Fe III emission which may be important for exact data fitting. We address this issue\nand additional likely effects in the discussion.\n4.DISCUSSION17\nWe used the most recent version of the code CLOUDY C23.00 to construct the grid of theoretical Fe II templates cov-\nering the broad UV to NIR range from 1000 ˚A to 10000 ˚A. The templates represent single-zone emitters, parametrized\nby the local density and ionization flux. We consider a range of turbulent velocities and for a fixed turbulent velocity of\n20 km−1we calculated the results for different metallicities. For the other turbulent velocity the considered metallicity\nis solar.\nThe advantage of the theoretical templates is that they predict the Fe II emission underlying the strong emission\nlines while purely observational templates, modelling first the lines, force low Fe II emission at the position of lines\nlike H βor Mg II. In addition, the construction of the observational templates is thus most successful for the objects\nwith extremely narrow emission lines like I Zw 1 (Vestergaard & Wilkes 2001) or Mrk 493 (Park et al. 2022). Line\nwidths of these spectra imply high Eddington ratio, strong Fe II emission and the incident SED shape not necessarily\nrepresentative for the majority of quasars.\nThe availability of the Fe II templates in the full spectral range will address better the issue of the production of\nthe Fe II in the BLR. In the case of the observational data covering a narrow spectral range, the templates allow us to\nfit the data and obtain an estimate of the density and the ionization flux in the BLR, as we showed in Section 3.8.1.\nHowever, our attempt to use these templates for a quasar spectrum covering both optical and UV ranges was not\nsuccessful (see Section 3.8.2). The problem seems generic since the selected quasar is rather a typical object, and the\nissue of the UV to optical ratio in the models and the data has been present in the literature for many years.\nAlready the early papers asked the question of whether the Fe II emission actually forms as a result of the irradiation\nby the central source or due to mechanical heating. For example, Joly (1981) in her paper argued that either mechanical\nheating is the dominating channel of production, or the clouds must be very optically thick, in which case the irradiation\nflux is thermalized and the mechanism is similar to the mechanical heating. However, those early models were not\nsuitable for column densities larger than 1024cm−2.\nVerner et al. (2003) calculated the predicted ratio of the UV to optical Fe II emission from their model of the Fe II\natomic transitions. The adopted ranges were 2000–3000 ˚A and 4000–6000 ˚A range, the range is comparable although\nnot identical to the one studied in Section 3.8.2. The UV/optical ratio obtained in this paper is similar to what\nwe measure from RM102 in the case of collisional heating, but radiative heating gives much higher values, 8 - 11,\ndepending on the number of transitions. These values were obtained under a turbulent velocity of 1 km s−1. They\nnoted that Fe II optical emission flux is more sensitive to abundance than the Fe II (UV) band. Conversely, the Fe II\n(UV) band is more sensitive to microturbulence than the Fe II optical band.\nBaldwin et al. (2004) investigated the Fe II emission in the UV (2200-2800 ˚A) and optical (4450-4750 and 5080-\n5460 ˚A) ranges. They obtained the observed Fe II UV/optical ratio of 1-2, which is significantly lower than the\nmodel-predicted ratio of 40-50. Using the LOC model, they found that the observed UV Fe II emission requires a\nhigh microturbulence velocity ( ≥100 km/s). They examined collisional heating as an alternate excitation mechanism,\nhowever only the Fe II lines were visible in the UV range, which has the disadvantage of adding another specialised\nregion to the already complicated structure of the inner region of AGN. They noticed that other complex ions, such\nas Ni II, might have created similar patterns despite their lower abundance, but their atomic data was not available.\nAs a result, they favoured a microturbulence-based model for explaining UV Fe II emissions and concluded that the\noptical Fe II emission originates from an entirely different region compared to the UV Fe II emission.\nThe problem of matching the theoretical templates over the full optical to UV spectral range is not likely due to the\nuse of a single-zone approximation, particularly as some of the papers mentioned above used a multi-zone approach.\nThe standard LOC model can in principle represent both the broad range of radii as well as the broad range of densities\nbut may not be actually appropriate to solve the physical problem.\nThe radially very extended emission is unlikely. Kovaˇ cevi´ c-Dojˇ cinovi´ c & Popovi´ c (2015) argued that there is a\nkinematic correlation between the UV and the optical Fe II emissions, although they reported considerable positive\nshift of the UV Fe II with respect to the systemic redshift for the majority of their sources (their Fig. 10). The\nradius-luminosity relation discussed by Zajaˇ cek et al. (2023b) for both spectral ranges looks roughly similar, so the\ntwo regions cannot be considerably shifted. Furthermore, the possibility of measuring the Fe II delay in the optical and\nUV bands contradicts the major collisional origin of the emission, but some contributions cannot be ruled out. The\natomic content of the recent version C23.00 of CLOUDY used in this paper does not seem questionable, and apparently,\nthe systematic improvement in the data did not solve the long-standing issue of UV and optical discrepancy. The\nmetallicity dependence also does not seem to be strong enough to account for the issue.18\nThere are thus two remaining issues which can solve the problem but they were not modelled in this paper since our\nprimary goal was to provide a set of theoretical templates for further use.\nThe first weakness in the simulation is the use of a constant density assumption. Such an approach is widely\nemployed, yet it is not physically warranted. The higher temperature of the illuminated face of the cloud and the\nconsiderably lower temperature of the dark side would create an enormous pressure gradient which could disrupt the\ncloud during the dynamical timescale. Instead, the illuminated cloud must be in pressure equilibrium which also\ntakes into account the radiation pressure (R´ o˙ za´ nska et al. 2006; Baskin et al. 2014). Overall, the bright face has a\nmuch lower density, and the density is rising towards the dark side. Clouds in pressure equilibrium were considered\nin several papers. Some of these computations were done in the context of the warm absorber (R´ o˙ za´ nska et al. 2006;\nAdhikari et al. 2015, 2019) but this medium may be the same as BLR. The change of the density and temperature\nis not like a power law but rather like a rapid transition (see e.g. Fig. 1 of Baskin et al. 2014, or Fig. 3 of Adhikari\net al. 2019), so the LOC model would not reproduce it well, and eventually, a discontinuous jump in density and\nionization parameter might be a better approximation. Computations of clouds under constant pressure are possible\nwithin CLOUDY environment, and this could be possibly done in the future.\nThe second weakness is the assumption of isotropic emission. If the clouds are few and randomly distributed around\nthe central source, then we will see clouds at all angles with respect to their orientation towards the source. The entire\ncontribution summed up is well represented by the isotropic emission. If cloud distribution is flattened, but our line\nof sight is not passing through the cloud region the dark sides may contribute a little stronger to the total emission in\nterms of the effective surface but most of the cloud emission comes from the bright sides. Such expectations were given,\nfor example, by Czerny & Hryniewicz (2011) in the context of the time delay. However, the bright sides contribute\nmore to the isotropic part, therefore overexposure of the cloud’s bright sides may not have a significant impact on Fe\nII emission. However, Ferland et al. (2009) suggested that we predominantly see the dark side of the clouds. They\nconnected this to the Fe II emission in the optical band showing predominantly the redshift (Hu et al. 2008) and\nthus implying the inflow. Also in Panda et al. (2018), in Section 4.3, they discussed the issue that the optical Fe\nII is produced predominantly in the dark side of a cloud, and the dominance of the dark side helped to reproduce\nRFeIIratio without metallicity enhancement. However, the requested geometrical setup is not simple since the line of\nsight does not cross the BLR. It may require a highly ionized absorber, between the black hole and the BLR, almost\n‘invisibly’ shielding the well-irradiated bright sides of clouds.\n5.SUMMARY\nOne of the most prominent characteristic features of the quasar spectrum is the iron emission. In this work, we\nexamine the properties of Fe II emission using CLOUDY version C23.00 and generate new theoretical Fe II templates\nthat can be used to model Fe II emission in the quasar spectra covering the wavelength range 1000-10000 ˚A. We study\nthe impact of microturbulence and metallicity on iron emission and compare our model predictions with observational\ndata. The primary outcomes of our study are outlined below.\n1. The long-standing problem of a mismatch between the expected and observed values of Fe II UV to optical ratio\nunder the single zone approximation could not be resolved by the updated atomic database available in CLOUDY\nC23.00.\n2. Microturbulence has less impact on the UV to optical Fe II emission ratio.\n3. An additional apparent velocity shift of up to 1000 km/s can be added to the spectrum by microturbulence.\n4. The ionisation flux has a more significant impact on the ratio of red-to-blue parts of optical Fe II around H β\nthan does the gas density.\n5. High-density BLR (log nH(cm−3) = 12 - 13) and extremely high radiation fluxes are needed for the highly\naccreting (xA) sources.\n6. The ratios of Fe II emissions are not significantly affected by the metallicity.\n7. The observed UV-to-optical spectra of a quasar cannot be well fitted by a single theoretical Fe II template\ngenerated assuming fixed column density and isotropic cloud emission.19\nThe project was partially supported by the Polish Funding Agency National Science Centre, project\n2017/26/A/ST9/00756 (MAESTRO 9). This project has received funding from the European Research Council\n(ERC) under the European Union’s Horizon 2020 research and innovation program (grant agreement No. [951549]).\nBC and MZ acknowledge the OPUS-LAP/GA ˇCR-LA bilateral project (2021/43/I/ST9/01352/OPUS 22 and GF23-\n04053L). MLM-A acknowledges financial support from Millenium Nucleus NCN19-058 and NCN2023 002 (TITANs).\nSP acknowledges the financial support of the Conselho Nacional de Desenvolvimento Cient´ ıfico e Tecnol´ ogico (CNPq)\nFellowships 164753/2020-6 and 300936/2023-0. 32 spectroscopic observations of HE 0413-4031 used in this paper were\nobtained with the Southern African Large Telescope (SALT). They were made with the SALT under programs 2012-2-\nPOL-003, 2013-1-POL-RSA-002, 2013-2-POL-RSA-001, 2014-1-POL-RSA-001, 2014-2-SCI-004, 2015-1-SCI-006, 2015-\n2-SCI-017, 2016-1- SCI-011, 2016-2-SCI-024, 2017-1-SCI-009, 2017-2-SCI-033, 2018-1-MLT-004 (PI: B. Czerny). Polish\nparticipation in SALT is funded by grant No. MEiN nr 2021/WK/01.\nSoftware: CLOUDY (Chatzikos et al. 2023)\nREFERENCES\nAdhikari, T. P., R´ o˙ za´ nska, A., Hryniewicz, K., Czerny, B.,\n& Behar, E. 2019, ApJ, 881, 78,\ndoi: 10.3847/1538-4357/ab2dfc\nAdhikari, T. P., R´ o˙ za´ nska, A., Sobolewska, M., & Czerny,\nB. 2015, ApJ, 815, 83, doi: 10.1088/0004-637X/815/2/83\nBaldwin, J., Ferland, G., Korista, K., & Verner, D. 1995,\nApJL, 455, L119, doi: 10.1086/309827\nBaldwin, J. A., Ferland, G. J., Korista, K. T., Hamann, F.,\n& LaCluyz´ e, A. 2004, ApJ, 615, 610, doi: 10.1086/424683\nBaskin, A., Laor, A., & Stern, J. 2014, MNRAS, 438, 604,\ndoi: 10.1093/mnras/stt2230\nBautista, M. A., Fivet, V., Ballance, C., et al. 2015, ApJ,\n808, 174, doi: 10.1088/0004-637X/808/2/174\nBergeron, J., & Kunth, D. 1984, MNRAS, 207, 263,\ndoi: 10.1093/mnras/207.2.263\nBoroson, T. A., & Green, R. F. 1992, ApJS, 80, 109,\ndoi: 10.1086/191661\nBruhweiler, F., & Verner, E. 2008, ApJ, 675, 83,\ndoi: 10.1086/525557\nCai, Z.-Y., & Wang, J.-X. 2023, Nature Astronomy, 7,\n1506, doi: 10.1038/s41550-023-02088-5\nCapellupo, D. M., Netzer, H., Lira, P., Trakhtenbrot, B., &\nMej´ ıa-Restrepo, J. 2015, MNRAS, 446, 3427,\ndoi: 10.1093/mnras/stu2266\nChatzikos, M., Bianchi, S., Camilloni, F., et al. 2023, arXiv\ne-prints, arXiv:2308.06396,\ndoi: 10.48550/arXiv.2308.06396\nCollin-Souffrin, S., Joly, M., Heidmann, N., & Dumont, S.\n1979, A&A, 72, 293\nCzerny, B., & Hryniewicz, K. 2011, A&A, 525, L8,\ndoi: 10.1051/0004-6361/201016025Dias dos Santos, D., Panda, S., Rodr´ ıguez-Ardila, A., &\nMarinello, M. 2024, arXiv e-prints, arXiv:2401.02936,\ndoi: 10.48550/arXiv.2401.02936\nDu, P., & Wang, J.-M. 2019, ApJ, 886, 42,\ndoi: 10.3847/1538-4357/ab4908\nDultzin, D., Marziani, P., de Diego, J. A., et al. 2020,\nFrontiers in Astronomy and Space Sciences, 6, 80,\ndoi: 10.3389/fspas.2019.00080\nFerland, G. J., Hu, C., Wang, J.-M., et al. 2009, ApJL, 707,\nL82, doi: 10.1088/0004-637X/707/1/L82\nFrancis, P. J., Hewett, P. C., Foltz, C. B., et al. 1991, ApJ,\n373, 465, doi: 10.1086/170066\nGuo, H., Shen, Y., & Wang, S. 2018, PyQSOFit: Python\ncode to fit the spectrum of quasars, Astrophysics Source\nCode Library. http://ascl.net/1809.008\nHu, C., Wang, J.-M., Ho, L. C., et al. 2008, ApJ, 687, 78,\ndoi: 10.1086/591838\nJoly, M. 1981, A&A, 102, 321\nJoni´ c, S., Kovaˇ cevi´ c-Dojˇ cinovi´ c, J., Ili´ c, D., & Popovi´ c,\nL.ˇC. 2016, Ap&SS, 361, 101,\ndoi: 10.1007/s10509-016-2680-9\nKaras, V., Svoboda, J., & Zajaˇ cek, M. 2021, in RAGtime:\nWorkshops on black holes and netron stars, E1,\ndoi: 10.48550/arXiv.1901.06507\nKovaˇ cevi´ c-Dojˇ cinovi´ c, J., & Popovi´ c, L. ˇC. 2015, ApJS,\n221, 35, doi: 10.1088/0067-0049/221/2/35\nKrolik, J. H. 1999, Active galactic nuclei : from the central\nblack hole to the galactic environment (Princeton\nUniversity Press)\nMart´ ınez-Aldama, M. L., Panda, S., Czerny, B., et al. 2021,\nApJ, 918, 29, doi: 10.3847/1538-4357/ac03b620\nMarziani, P. 2023, in Physical Sciences Forum, Vol. 7,\nPhysical Sciences Forum, 39,\ndoi: 10.3390/ECU2023-14040\nMarziani, P., Berton, M., Panda, S., & Bon, E. 2021,\nUniverse, 7, 484, doi: 10.3390/universe7120484\nMarziani, P., & Sulentic, J. W. 2014, MNRAS, 442, 1211,\ndoi: 10.1093/mnras/stu951\nMarziani, P., Sulentic, J. W., Zamanov, R., et al. 2003,\nApJS, 145, 199, doi: 10.1086/346025\nMarziani, P., Dultzin, D., Sulentic, J. W., et al. 2018,\nFrontiers in Astronomy and Space Sciences, 5, 6,\ndoi: 10.3389/fspas.2018.00006\nMarziani, P., Olmo, A. d., Negrete, C. A., et al. 2022,\nApJS, 261, 30, doi: 10.3847/1538-4365/ac6fd6\nMarziani, P., Floris, A., Deconto-Machado, A., et al. 2024,\narXiv e-prints, arXiv:2401.02266,\ndoi: 10.48550/arXiv.2401.02266\nMathews, W. G., & Ferland, G. J. 1987, ApJ, 323, 456,\ndoi: 10.1086/165843\nNegrete, C. A., Dultzin, D., Marziani, P., et al. 2018, A&A,\n620, A118, doi: 10.1051/0004-6361/201833285\nOsterbrock, D. E. 1977, ApJ, 215, 733, doi: 10.1086/155407\nOsterbrock, D. E., & Pogge, R. W. 1985, ApJ, 297, 166,\ndoi: 10.1086/163513\nPanda, S. 2021, A&A, 650, A154,\ndoi: 10.1051/0004-6361/202140393\nPanda, S., Czerny, B., Adhikari, T. P., et al. 2018, ApJ,\n866, 115, doi: 10.3847/1538-4357/aae209\nPanda, S., Czerny, B., Done, C., & Kubota, A. 2019a, ApJ,\n875, 133, doi: 10.3847/1538-4357/ab11cb\nPanda, S., & Marziani, P. 2023, Frontiers in Astronomy\nand Space Sciences, 10, 1130103,\ndoi: 10.3389/fspas.2023.1130103\nPanda, S., Marziani, P., & Czerny, B. 2019b, ApJ, 882, 79,\ndoi: 10.3847/1538-4357/ab3292\nPark, D., Barth, A. J., Ho, L. C., & Laor, A. 2022, ApJS,\n258, 38, doi: 10.3847/1538-4365/ac3f3e\nPopovi´ c, L. ˇC., Kovaˇ cevi´ c-Dojˇ cinovi´ c, J., Dojˇ cinovi´ c, I., &\nLaki´ cevi´ c, M. 2023, A&A, 679, A34,\ndoi: 10.1051/0004-6361/202347043\nPopovi´ c, L. ˇC., Kovaˇ cevi´ c-Dojˇ cinovi´ c, J., &\nMarˇ ceta-Mandi´ c, S. 2019, MNRAS, 484, 3180,\ndoi: 10.1093/mnras/stz157\nPrince, R., Zajaˇ cek, M., Panda, S., et al. 2023, A&A, 678,\nA189, doi: 10.1051/0004-6361/202346738\nRakshit, S., Stalin, C. S., & Kotilainen, J. 2020, ApJS, 249,\n17, doi: 10.3847/1538-4365/ab99c5\nRakshit, S., Stalin, C. S., Kotilainen, J., & Shin, J. 2021,\nApJS, 253, 28, doi: 10.3847/1538-4365/abd9bbRen, W., Wang, J., Cai, Z., & Guo, H. 2022, ApJ, 925, 50,\ndoi: 10.3847/1538-4357/ac3828\nR´ o˙ za´ nska, A., Goosmann, R., Dumont, A. M., & Czerny, B.\n2006, A&A, 452, 1, doi: 10.1051/0004-6361:20052723\nSargent, W. L. W. 1968, ApJL, 152, L31,\ndoi: 10.1086/180172\nSarkar, A., Ferland, G. J., Chatzikos, M., et al. 2021, ApJ,\n907, 12, doi: 10.3847/1538-4357/abcaa6\nScott, J. E., Kriss, G. A., Brotherton, M., et al. 2004, ApJ,\n615, 135, doi: 10.1086/422336\nShen, Y., & Ho, L. C. 2014, Nature, 513, 210,\ndoi: 10.1038/nature13712\nShen, Y., Richards, G. T., Strauss, M. A., et al. 2011,\nApJS, 194, 45, doi: 10.1088/0067-0049/194/2/45\nShen, Y., Hall, P. B., Horne, K., et al. 2019, ApJS, 241, 34,\ndoi: 10.3847/1538-4365/ab074f\nShen, Y., Grier, C. J., Horne, K., et al. 2023, arXiv e-prints,\narXiv:2305.01014, doi: 10.48550/arXiv.2305.01014\nSmyth, R. T., Ramsbottom, C. A., Keenan, F. P., Ferland,\nG. J., & Ballance, C. P. 2019, MNRAS, 483, 654,\ndoi: 10.1093/mnras/sty3198\n´Sniegowska, M., Czerny, B., You, B., et al. 2018, A&A, 613,\nA38, doi: 10.1051/0004-6361/201730433\n´Sniegowska, M., Marziani, P., Czerny, B., et al. 2021, ApJ,\n910, 115, doi: 10.3847/1538-4357/abe1c8\nSulentic, J. W., Zwitter, T., Marziani, P., &\nDultzin-Hacyan, D. 2000, ApJL, 536, L5,\ndoi: 10.1086/312717\nTayal, S. S., & Zatsarinny, O. 2018, PhRvA, 98, 012706,\ndoi: 10.1103/PhysRevA.98.012706\nTelfer, R. C., Zheng, W., Kriss, G. A., & Davidsen, A. F.\n2002, ApJ, 565, 773, doi: 10.1086/324689\nTsuzuki, Y., Kawara, K., Yoshii, Y., et al. 2006, ApJ, 650,\n57, doi: 10.1086/506376\nVanden Berk, D. E., Richards, G. T., Bauer, A., et al. 2001,\nAJ, 122, 549, doi: 10.1086/321167\nVerner, E., Bruhweiler, F., Verner, D., Johansson, S., &\nGull, T. 2003, ApJL, 592, L59, doi: 10.1086/377571\nVerner, E. M., Verner, D. A., Korista, K. T., et al. 1999,\nApJS, 120, 101, doi: 10.1086/313171\nV´ eron-Cetty, M. P., Joly, M., & V´ eron, P. 2004, A&A, 417,\n515, doi: 10.1051/0004-6361:20035714\nVestergaard, M., & Wilkes, B. J. 2001, ApJS, 134, 1,\ndoi: 10.1086/320357\nWills, B. J., Netzer, H., Uomoto, A. K., & Wills, D. 1980,\nApJ, 237, 319, doi: 10.1086/157871\nWills, B. J., Netzer, H., & Wills, D. 1985, ApJ, 288, 94,\ndoi: 10.1086/162767\nWu, Q., & Shen, Y. 2022, ApJS, 263, 42,\ndoi: 10.3847/1538-4365/ac9ead21\nZajaˇ cek, M., Czerny, B., Martinez-Aldama, M. L., et al.\n2020, ApJ, 896, 146, doi: 10.3847/1538-4357/ab94ae\nZajaˇ cek, M., Czerny, B., Jaiswal, V. K., et al. 2023a, arXiv\ne-prints, arXiv:2306.15082,\ndoi: 10.48550/arXiv.2306.15082\nZajaˇ cek, M., Panda, S., Pandey, A., et al. 2023b, arXiv\ne-prints, arXiv:2310.03544,\ndoi: 10.48550/arXiv.2310.03544Zheng, W., Kriss, G. A., Telfer, R. C., Grimes, J. P., &\nDavidsen, A. F. 1997, ApJ, 475, 469, doi: 10.1086/303560" }, { "title": "2401.18068v1.Renormalization_group_flow_and_fixed_point_in_tensor_network_representations.pdf", "content": "Renormalization group flow and fixed-point in tensor\nnetwork representations\n(テンソルネットワークによる 繰り込み群フローと\n固定点の研究)\nA Dissertation Submitted for the Degree of Doctor of Philosophy\nDecember 2023\n令和5年12月博士(理学)申請\nDepartment of Physics, Graduate School of Science, The University of Tokyo\n東京大学大学院理学系研究科物理学専攻\nAtsushi Ueda\n上田篤arXiv:2401.18068v1 [cond-mat.stat-mech] 31 Jan 2024ACKNOWLEDGEMENTS\nI would like to express my profound gratitude to my supervisor, Prof. Oshikawa,\nforhisinvaluablementorshipthroughoutmyPhDjourney. Hiselegantandprofound\napproach to studying physics has profoundly shaped my research philosophy and\nkindled my enthusiasm for discovery. His generosity in providing opportunities for\ninternational exposure and networking has been instrumental in my professional\ndevelopment. I particularly value his advice on mastering both numerical and\nanalyticaltechniques,astrategythatmarkedaturningpointinmyresearchtrajectory.\nHisamiablenatureandcharmhavenotonlymadehimabelovedfigureinthephysics\ncommunitybuthavealsofosteredacollaborativeandinspiringenvironmentforme.\nThe conferences and seminars I attended under his guidance were fertile grounds\nfor the research ideas I am zealously pursuing today.\nI would also like to extend my heartfelt thanks to Prof. Tada, a former assistant\nprofessor in our lab. His support and regular check-ins during the challenging\nCOVID-19 pandemic were a great source of comfort and encouragement. His\nkindness, along with the support of his family, played a crucial role in helping me\nnavigate through this difficult period. Additionally, I am deeply thankful to my\nfriends who provided unwavering support and companionship during these trying\ntimes, making the journey less daunting.\nI am grateful for the financial support provided by the MERIT-WINGS program\nand the JSPS fellowship (DC1), which were pivotal in facilitating my studies.\nOn a personal note, I owe a tremendous debt of gratitude to my family. To my\nparents, my sister, and her husband, whose concern and regular check-ins were\na constant source of reassurance. The delicious meals and moments of joy they\nshared with me have been both a comfort and an inspiration. I extend my deepest\nappreciation to my wife, whose unwavering support, cheer, and love have been my\npillars of strength. Her presence in my life is a blessing I cherish immensely.\nIn summary, my journey through my PhD has been enriched and made possible\nby each of these individuals and their unique contributions to my life, for which I\nam eternally grateful.\niiABSTRACT\nWe propose the integration of an energy-based finite-size scaling methodology\nwith tensor network renormalization (TNR) techniques. TNR, serving as a numer-\nical implementation of real-space renormalization group (RG) methods, provides\na pathway to access the low-lying energy spectrum of various systems. By meld-\ning TNR with conformal perturbation theory, we can effectively calculate running\ncoupling constants. This combined methodology is particularly valuable in prac-\ntical calculations, as it adeptly navigates around the numerical errors commonly\nencountered in TNR applications.\nA primary objective of numerical simulations in the study of lattice models is\noften the precise determination of their phase diagrams. The demarcation of phase\ntransition points within these diagrams often necessitates simulations of systems\nwith very large sizes. For example, accurately identifying the phase boundary of\nthe Ising model through spontaneous magnetization typically requires simulating\nthousands of lattice sites. While TNR is capable of handling large system sizes, it\nis also known to suffer from amplified numerical errors as the size of the system\nincreases.\nIncontrast,ourproposedmethodologyrequiresonlyafewstepsofRG,therebyin-\nducingfewernumericalerrorsandreducingcomputationalcosts. Theenergy-based\nfinite-sizescalingapproachdoesnotrelyonlargesystemsizes,unlikeconventional\nmethodsthatuseobservablessuchasmagnetizationandheatcapacitytodetermine\nphasetransitions. Thisapproachisnotonlymoreefficientbutalsomoreresilientto\nthechallengesposedbythescaleofthesimulations,offeringasignificantadvantage\nin the study of critical phenomena in lattice models.\nAdditionally,wewilldelveintotheoriginsofnumericalerrorsinTNRsimulations\nfromafield-theoreticalperspective. Thisanalysiswillshedlightonhowtheseerrors\nscale with the approximation parameter, denoted as 𝐷. Understanding this scaling\nis critical for accurately estimating and managing errors in simulation results.\nThrough the application of this methodology, we aim to provide a more accurate\nand computationally efficient means of exploring phase transitions and the critical\npropertiesoflatticemodels,enhancingourunderstandingofthesecomplexsystems.\nIn the subsequent discussion, we delve into the tensor structure of fixed points in\nthe context of lattice models. A significant challenge in this area arises from the\niiieffectsoffinitebonddimensions,whichmakethetruefixed-pointtensorpractically\nunattainable through direct numerical methods. To circumvent this issue, we adopt\nan analytical approach, employing conformal mappings to study the fixed-point\ntensors.\nThisanalyticalexplorationleadstoarevealinginsight: thetensorelementsofthe\nfixed-pointtensorcorrespondtothefour-pointfunctionsofprimaryoperatorswithin\nthe framework of conformal field theory (CFT). This correspondence is not just a\ntheoretical conjecture; it is corroborated by empirical observations showing that\ntensors renormalized for finite sizes tend to align with our theoretical predictions.\nThe significance of this finding cannot be overstated. It suggests that the tensor\nrepresentations of fixed points in lattice models embody the universality of non-\ntrivial infrared (IR) physics at the lattice level. Our approach thus is not only a\nnewsolutiontoadecade-oldproblem,butalsobridgesthegapbetweentheabstract\ntheoretical constructs of CFT and the practical, computable structures in lattice\nmodels. By demonstrating this universal behavior, we provide robust support for\nthe concept of universality in critical phenomena, particularly as it manifests in the\nintricate world of lattice models.\nThrough this investigation, we aim to offer a deeper understanding of the funda-\nmental principles underlying critical phenomena, specifically highlighting how the\nuniversal aspects of CFT are reflected in the practical, numerical realm of lattice\nmodel simulations.\nivPUBLISHED CONTENT AND CONTRIBUTIONS\n1A.UedaandM.Oshikawa,“Finite-sizeandfinitebonddimensioneffectsoftensor\nnetwork renormalization”, Phys. Rev. B 108, 024413 (2023).\n2A. Ueda and M. Yamazaki, “Fixed-point tensor is a four-point function”, 10.\n48550/arXiv.2307.02523 (2023).\n3A.UedaandM.Oshikawa,“Tensornetworkrenormalizationstudyonthecrossover\nin classical heisenberg and RP2models in two dimensions”, Phys. Rev. E 106,\n014104 (2022).\n4A. Ueda and M. Oshikawa, “Resolving the Berezinskii-Kosterlitz-Thouless tran-\nsition in the two-dimensional XY model with tensor-network-based level spec-\ntroscopy”, Phys. Rev. B 104, 165132 (2021).\nThe main content of this thesis is the first paper on this list(Phys. Rev. B 108,\n024413 (2023)).\nContributions\n1A.U participated in the conception of the project, coding of the numerical imple-\nmentations, and participated in the writing of the manuscript.\n2A.U participated in the conception of the project, analytical calculations, coding\nofthenumericalimplementations,andparticipatedinthewritingofthemanuscript.\n3A.U participated in the coding of the numerical implementations, analysis of the\nresults, and participated in the writing of the manuscript.\n4A.U participated in the conception of extending level-spectroscopy to visualizing\nRG flows using TNR, coding of the numerical implementations, upgrading level-\nspectroscopy, performing third-order perturbations, and participated in the writing\nof the manuscript.\nvTABLE OF CONTENTS\nAcknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii\nAbstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii\nPublished Content and Contributions . . . . . . . . . . . . . . . . . . . . . . v\nTable of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v\nList of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii\nList of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi\nChapter I: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1\n1.1 Renormalization group theory in statistical mechanics . . . . . . . . 3\n1.2 Review on tensor network renormalization . . . . . . . . . . . . . . 17\nChapter II: Finite-size and finite bond dimension effects of tensor network\nrenormalization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38\n2.1 Operator product expansion coefficients . . . . . . . . . . . . . . . . 39\n2.2 Precise determination of the transition temperature . . . . . . . . . . 43\n2.3 Renormalization group flow . . . . . . . . . . . . . . . . . . . . . . 49\n2.4 Finite bond-dimension effects . . . . . . . . . . . . . . . . . . . . . 51\nChapter III: Tensor network representation of fixed-point tensors . . . . . . . 57\n3.1 Fixed-point tensor . . . . . . . . . . . . . . . . . . . . . . . . . . . 57\n3.2 Main results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59\n3.3 Numerical fixed point tensor . . . . . . . . . . . . . . . . . . . . . . 61\n3.4 Tests on critical lattice models . . . . . . . . . . . . . . . . . . . . . 62\nChapter IV: Conclusion and discussion . . . . . . . . . . . . . . . . . . . . . 67\nBibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71\nAppendix A: Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75\nA.1 Perturbation theory on the finite-size spectrum . . . . . . . . . . . . 75\nA.2 Finite-entanglement scaling of the three-state potts model. . . . . . . 78\nA.3 Supplemental information on the fixed-point tensor . . . . . . . . . . 80\nviLIST OF FIGURES\nNumber Page\n1.1 ThesketchofMigdal-Kadanofftransformation. Itaimstoanalytically\nsee how the coupling 𝐾=𝛽𝐽changes when the system is coarse-\ngrained by a factor of two. . . . . . . . . . . . . . . . . . . . . . . . 6\n1.2 The RG flow of the two-dimensional Ising model following Eq. (1.9). 7\n1.3 A schematic figure of fusing of operators. . . . . . . . . . . . . . . 13\n1.4 A schematic picture of the tensor network renormalization. The\neffectivelocalBoltzmannweightat 𝑛-thRGstep𝑇(𝑛)isdecomposed\nintothetwothree-legtensorsandrecombinedas 𝑇(𝑛+1). Theeffective\nsystem size enlarges by√\n2each RG step. . . . . . . . . . . . . . . . 20\n1.5 An example of singular values of the four-leg tensor 𝑇𝑖𝑗𝑘𝑙. The blue,\norange, and green lines show the decay of 𝑠𝑚for the classical Ising\nmodelatthelow,critical,andhigh-temperatureregimes,respectively\nat𝑑=𝐷=10after six RG steps. . . . . . . . . . . . . . . . . . . . 22\n1.6 TheCDLtensorsafterTRG.Thelocalloop,markedbyaredsquare,\npersists after the TRG steps, indicating that ultraviolet information\nremains even after extensive coarse-graining. . . . . . . . . . . . . . 24\n1.7 The conformal mapping from a plane to a cylinder. The black and\nred dotted circles on the plane correspond to different time slices on\nthe cylinder. As a result, the scale translation indicated by the red\narrow on the 𝑧-plane transforms into a translation in imaginary time\non the𝑤-axis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33\n1.8 The scaling dimensions of the critical Ising model that are obtained\nfromthetransfermatrixspectrumofLoop-TNR.Thebluedottedline\nare the theoretical values from the character. . . . . . . . . . . . . . 36\n2.1 The scaling dimension obtained from the first and second leading\neigenvalue of the transfer matrix of the Ising model as 𝑥𝜎(𝐿)=\n1\n2𝜋ln𝜆0\n𝜆1. At the critical temperature, denoted by a red dotted line,\nthevalueisconsistentwiththescalingdimension1\n8regardlessofthe\nsystem sizes. Away from criticality, however, the deviation from1\n8\ngrows as𝐿increases. . . . . . . . . . . . . . . . . . . . . . . . . . . 44\nvii2.2 Example of estimating the transition temperature using Loop-TNR.\nWe set𝑇−=2.66and𝑇+=2.68as an initial estimate. The level-\ncrossing temperature 𝑇∗(𝐿)is linearly fitted to extrapolate the tran-\nsition temperature. The insert shows how we compute 𝑇∗(𝐿)for\nvarious system sizes. . . . . . . . . . . . . . . . . . . . . . . . . . . 48\n2.3 (Left panel) The system size dependence of 𝛿𝑥cmb=𝛿𝑥𝜎+𝛿𝑥𝜖/16\nforℎ=±10−5(purple and green), 𝑇=1.0001𝑇𝑐(red) and𝑇=\n0.9999𝑇𝑐(blue). The purple and green dots are on top of each other,\nand “+\" denotes the data with a negative sign. After removing the\n𝐿−2irrelevantperturbations,thenextleading 𝐿−4perturbationshown\nwithabluedottedlineappears. ThedatawasobtainedviaLoop-TNR\nwith a bond dimension of 𝐷=24, which was deemed sufficient for\nthe finitely-correlated systems being considered. (Right panel) The\nresulting renormalization group flow. Only data after six steps are\nexhibited, where the 𝐿−4perturbations disappear. . . . . . . . . . . . 50\n2.4 Shift|𝛿𝑥𝜎(𝐿)|for the Ising model at 𝑇=𝑇𝑐,ℎ=0computed by\nLoop-TNR with 𝐷=32. There is little finite- 𝐷effect for small\nsystemsizes 𝐿 <256. Theemergentperturbationsof 𝜖and𝜎appear\nat𝐿∼256and𝐿∼104,scalingas𝐿and𝐿15/4. Theinducedgapby\nfinite-𝐷goestowardsconstantat 𝐿 >105asdenotedwiththepurple\ndotted line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52\nviii2.5(𝑎)The scaling of the shift 𝛿𝑥𝜎in TNR of the Ising model at the\ncritical point, for various bond dimensions 𝐷=4,..., 28. The\nverticalaxisisscaledas 𝐿2𝛿𝑥𝜎sothatitisconstantwhen 𝐿≪𝜉(𝐷).\nWhen𝐿≪𝜉(𝐷), the shift is dominated by the emergent relevant\nperturbation 𝜖; this is confirmed by the scaling 𝐿2𝑔𝜖∝𝐿3. The\nhorizontal axis is scaled as 𝐿/𝜉(𝐷), where the correlation length\n𝜉(𝐷)is hypothesized as in Eqs. (2.21) and (2.22). The collapse\nof the data for different bond dimensions is strong evidence of the\nhypothesizedscalingofthecorrelationlength 𝜉(𝐷). Thebluedotted\nlineindicates 𝐿/𝜉(𝐷)=1. Weset𝜉(𝐷)=2.0𝐷𝜅sothat𝐿/𝜉(𝐷)=1\nbecomes the crossover scale between the finite-size scaling regime\nand the finite- 𝐷scaling regime.(𝑏)Similar scaling analysis of\nthe shift𝛿𝑥𝜖in TNR of the three-state Potts model at the critical\npoint, for various bond dimensions 𝐷=16,..., 40with𝜉(𝐷)=\n0.067𝐷𝜅. The scaled shift 𝐿0.8𝛿𝑥𝜖behaves as a constant in the\nfinite-size scaling regime 𝐿/𝜉(𝐷)<1, whereas it scales as 𝐿3.2\nin the finite- 𝐷scaling regime 𝐿/𝜉(𝐷)>1, as expected from the\nCFT analysis (see Appendix A.2 for details). The data for different\nbond dimensions collapse again, giving compelling evidence for the\nscaling of the correlation length (2.21) and (2.22) . . . . . . . . . . 55\n3.1 Thepath-integralrepresentationofthetensorelements (𝑎)𝑆∗\n𝛼𝛽𝛾and\n(𝑏)𝑇∗\n𝛼𝛽𝛾𝛿. Thefixed-pointtensorlivesatthecenterofcylinders,and\nsurroundingcylindersarebravectorsofprimaryfields. SincetheFP\ntensorcorrespondstotheidentityoperator,“insertionofnooperator\"\nisillustratedasemptyspace. Thisidentityoperatorattheoriginin 𝑧\ncoordinate will be mapped to the infinity in 𝑤. . . . . . . . . . . . . 62\n3.2 Estimationof 𝑥𝑆(𝐿)fromLevin-TRG( 𝐷=96)andEvenbly-TNR( 𝐷=\n40). The values of 𝑥(𝐿)from the Ising and three-state Potts model\nconvergetothetheoreticalvalue 𝑥𝑆=𝑒𝜋/4denotedbyablackdotted\nline. We plot 𝑥𝑆=2.23035obtained from Loop-TNR [10] on the\ncritical 9-state clock model [19] with a lime dashed line. The three-\nstatePottsmodelexhibitsadeviationfor 𝐿 >100becausesimulating\nsystems with higher central charges involves larger numerical errors. . 63\nix3.3 The OPEcoefficients of thecritical Isingmodel evaluated bysetting\n𝑥𝑆=𝑒𝜋/4. Theblackdottedlinesdenotethetheoreticalvalues0,0.5,\nand1. Thedatapoints,denotedbyfilledcircles\" ◦\"andcrosses\"+,\"\nare obtained from Levin-TRG( 𝐷=96) and Evenbly-TNR( 𝐷=40),\nrespectively. Relativelylargefinite-sizeeffectshaveuniversalscaling\nas tested in Sec. A.3. . . . . . . . . . . . . . . . . . . . . . . . . . . 64\n3.4 Thefinite-sizeeffectofthefixedpointtensor 𝛿𝑇𝛼𝛽𝛾𝛿≡⟨𝜙𝛼𝜙𝑗𝛽𝜙𝛾𝜙𝛿⟩−\n𝑇𝛼𝛽𝛾𝛿(𝐿)from Levin-TRG( 𝐷=96, red) and Evenbly-TNR( 𝐷=40,\nblue). We plot 𝛿𝑇𝛼𝛽𝛾𝛿of𝜎𝜎𝜎𝜎(“+\"),𝜎𝜎𝜖 1(“★\"), and𝜎𝜎11(“×\")\nwith different colors depending on the algorithm. The difference\nconverges to zero for 𝐿→∞with the power-law ∼𝐿−1/3. . . . . . . 66\n4.1 The RG flow of the classical XY model in two dimensions stands\nas a quintessential example of a topological phase transition. This\nparticular type of RG flow is commonly referred to as the Kosterlitz\nRG flow. The right panel is numerically obtained RG flow in a\nsimilar manner. However, a key distinction lies in the consideration\nof up to third-order perturbations in our computational approach.\nThe deviation in the smaller system size is due to the irrelevant\nperturbations. Further details can be found in Ref. [26]. . . . . . . . 67\n4.2 (Left panel) A schematic picture of the reduced density matrix 𝜌𝐴\nfor a bipartition of the system in the path integral picture. The\nuncontracted legs correspond to the indices of the reduced density\nmatrix. (Right panel) Each of the four quadrants of the space-time\nin the left panel may be replaced by the renormalized tensor in TNR\nwith appropriate boundary conditions. . . . . . . . . . . . . . . . . 69\nA.1 The size dependence of the (a) 𝛿𝑥𝜎and (b)𝛿𝑥𝜖at𝑇=0.999995𝑇𝑐\nand𝑇=1.000005𝑇𝑐. The pink and green dotted lines denote 𝐿−0.8,\n(a)𝐿1.2, and (b)𝐿2.4fittings respectively. For the low-temperature\nphase, the sign of 𝛿𝑥𝜎is negative at 𝐿 > 100. The dip on the left\npanelaround 𝐿∼102correspondstothezeropointofEq.(A.17). (b)\nThefinite-sizeeffecttothe 𝑥𝜖sufferslessfrom 𝑇2\ncyl+¯𝑇2\ncylinamplitude.\nThe scaling of Eq. (A.18) is clearly observed. . . . . . . . . . . . . . 77\nxA.2 36𝛿𝑥𝜎−𝛿𝑥𝜖for the high temperature phase. “+” is used when the\nsignisnegative. Thereddottedlinedenotesthe 𝐿−2fittingwhilethe\nlightgreenoneisjustarelevant 𝐿1.2contributionfrom 𝜖. Loop-TNR\nrotatesthelatticeby𝜋\n4ateachRGstep,andthetiltedsystemisplotted\nwith the blue dots. . . . . . . . . . . . . . . . . . . . . . . . . . . . 79\nA.3 Rescaled 𝛿𝑥𝜎by𝜉(𝐷)=𝐷𝜅atthecriticaltemperature. Theresulting\ndatacollapseontoauniversalfunctionthatisindependentof 𝐿/𝜉(𝐷).\nIf𝐿/𝜉(𝐷)<1,thesystemisintheFSSregion,whileif 𝐿/𝜉(𝐷)≥1,\nitisintheFESregion. IntheFESregion,thescalingofthefirst-order\nandsecond-orderperturbationsareindicatedbyagrayandpinkline,\nrespectively. 𝑥𝜎is computed as an average value of the first and\nsecond excitation energy. . . . . . . . . . . . . . . . . . . . . . . . . 81\nA.4 The contraction of the fixed-point tensors. We obtain 𝑆from TRG\nand combine together to make 𝑆∗and𝑇∗. In this way, 𝑇∗respects\nreflection symmetry along the dotted lines in addition to 𝐶4rotation\nsymmetry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83\nA.5 The finite-size corrections 𝛿𝐶𝛼𝛽𝛾(𝐿)obtained from the numerical\nsimulation of the critical Ising model. The numerical results for\nhigher energy levels 𝛿𝐶𝜖𝜖1(𝐿)and𝛿𝐶1𝜖𝜖(𝐿)suffer from finite- 𝐷\neffects for𝐿 > 100. The scalings of the finite-size corrections are\nnevertheless universal, which is consistent with Table III in Ref. [34] 84\nA.6 TheOPEcoefficientsofthecriticalthree-statePottsmodelevaluated\nby setting𝑥𝑆=𝑒𝜋/4. The black dotted lines denote the theoretical\nvalues0,0.546,and1[50]. Thedatapoints,denotedbyfilledcircles\n\"◦\" and crosses \"+,\" are obtained from Levin-TRG( 𝐷=88) and\nEvenbly-TNR( 𝐷=40), respectively. . . . . . . . . . . . . . . . . . . 86\nxiLIST OF TABLES\nNumber Page\n2.1 The numerically obtained OPE coefficients of the Ising CFT from\nTRG. The bond dimension and the system size are 𝐷=56and\n𝐿=16√\n2(9 RG steps), respectively. . . . . . . . . . . . . . . . . . 40\n2.2 The finite-size scaling dimension of the Ising model. 𝛼is a constant\ndetermined from the second-order perturbation. Since 𝑔𝑇2and𝑔¯𝑇2\ndecay in the same manner, we write them as 𝑔. . . . . . . . . . . . . 49\n3.1 Thecomparisonofthenumerically-obtainedfixed-pointtensor 𝑇𝛼𝛽𝛾𝛿\nat𝐿=2048andtheexactfour-pointfunction ⟨𝜙𝛼(−𝑥𝑇)𝜙𝛽(𝑖𝑥𝑇)𝜙𝛾(𝑥𝑇)𝜙𝛿(−𝑖𝑥𝑇)⟩pl\nof the Ising model with 𝑥𝑇=𝑒𝜋/2/2. . . . . . . . . . . . . . . . . . 65\nA.1 A set of primary operators of the three-state Potts model. . . . . . . . 77\nxiiC h a pte r 1\nINTRODUCTION\nPhase transitions hold a particular fascination in the field of statistical mechanics\ndue to their display of universality. This universality is most notably observed\nin the behavior of systems undergoing continuous phase transitions, which are\ncharacterized by the divergence of derivatives of the partition function. These\ndivergences are quantified by critical exponents, which are key indicators of the\nsystem’s behavior near the critical point.\nWhat makes these critical exponents particularly intriguing is their universality\nacross different physical systems. Despite the diverse nature of these systems,\nthe critical exponents of certain systems tend to exhibit the same values. For\ninstance, a striking example of this universality is seen when comparing the liquid-\nvaportransitioninwaterwiththeferromagnetictoparamagnetictransitioninthree-\ndimensional magnets. Remarkably, these vastly different systems share the same\ncriticalexponents. However,thisconceptofuniversalityinphasetransitionspresents\na somewhat counter-intuitive picture at first glance. Consider the stark differences\nbetween substances like water and magnets: water is composed of hydrogen and\noxygen,whilemagnetscanbemadefrommaterialslikeneodymium. Moreover,the\ntemperaturesatwhichthesesubstancesundergophasetransitionsarevastlydifferent.\nImagine measuring the critical exponents of water in a national laboratory in the\nU.S. and then measuring those for magnets in a makeshift lab in your basement.\nDespitethedifferencesinsubstances,environments,andmethodologies,theresults\nwould be surprisingly consistent.\nThisphenomenonalmostsuggeststhatnaturepossessesaninnateunderstandingof\ntheessenceofphasetransitions. Itisasthoughtheunderlyingprinciplesgoverning\nthese phenomena inherently “ know” to discard irrelevant details, focusing instead\non fundamental aspects that are common across diverse systems. This remarkable\naspect of universality in phase transitions not only challenges our intuitive under-\nstandingbutalsohighlightstheprofoundsimplicityandelegancewithwhichnature\noperates at a fundamental level.\nNature’s method of simplifying complex phenomena can be likened to how we\nperceive images in our daily lives. Consider, for example, the iconic Windows XP\n1wallpaper “Bliss 1.,” which depicts a serene landscape of a green hill and blue sky.\nAt first glance, we see just these broad elements. However, upon closer inspection,\none might notice finer details like yellow flowers dotting the hill. With an even\nmorefocusedview,likethroughamicroscope,onecouldobservebeesaroundthese\nflowers or even delve into the atomic structures of these elements.\nYet,fromanormalviewingdistance,theseminutedetailsareeffectivelyinvisible.\nOurperceptionsimplifiesthescene,focusingonthemostsignificantelementswhile\n“ignoring”thesmaller,lessimpactfulones. Thisisakintohowweapproachphase\ntransitions in statistical mechanics. In the study of phase transitions, we often\nconsiderthethermodynamiclimit,whichimpliesobservingthesystemasifitwere\ninfinitelylarge. Thisperspectiverequiresusto“stepback”andviewthesystemfrom\na great distance, thereby making any finite-sized clusters or features with limited\ncorrelation lengths appear increasingly smaller and less significant.\nThis“steppingback”inobservingphysicalsystemsisanalogoustoobservingthe\n“Bliss” wallpaper from a distance. Just as we see only the broad strokes of the\nhill and sky rather than the minute details, in phase transitions, the focus is on\nmacroscopic properties that emerge when viewing the system in its entirety, from\nafar. Small-scale variations and details become irrelevant at this scale, allowing us\ntodiscerntheuniversalaspectsthatdominatethebehaviorofthesystemasawhole.\nToquantitativelyexplorehowsystemsappeartotransformwhenwe“stepback\"and\nobserve them from a larger scale, the renormalization group (RG) theory becomes\nindispensable. This chapter is dedicated to reviewing RG theory, with a specific\nemphasis on its application in statistical mechanics.\nRG theory provides a framework to understand how the behavior of physical\nsystems changes across different scales. It allows us to systematically “zoom out”\nfrom the microscopic details and observe how the collective properties of a system\nevolve. Thisperspectiveiscrucialforgraspingtheessenceofphasetransitions,asit\nrevealstheunderlyinguniversalitiesthatmanifestwhenmicroscopicdetailsbecome\nless relevant at macroscopic scales.\nFinally,asapreludetodelvingintothedetailedtheoreticalaspectsofRGtheoryand\nits applications in statistical mechanics, it can be beneficial for readers to visualize\nhowtheconceptof“seeingfromadistance\"manifestsinphysicalsystems. Toaidin\n1It was a wallpaper of my first computer. https://en.wikipedia.org/wiki/Bliss_\n(image). They now have a 4K version of it. https://msdesign.blob.core.windows.net/\nwallpapers/Microsoft_Nostalgic_Windows_Wallpaper_4k.jpg\n2this visualization, we recommend viewing a short YouTube video 2that illustrates\nhow it happens in the Ising model.\n1.1 Renormalization group theory in statistical mechanics\nIn this section, we delve into critical aspects of phase transition and RG theory\nwithin the realm of statistical mechanics, using the Ising model as a foundational\nexample. A key element in this context is the partition function, particularly when\nexpressed in the transfer matrix formalism, and its intricate relationship with the\ncorresponding action or Hamiltonian. This conceptual framework, central to our\ndiscussion, paves the way for a natural extension to and incorporation within the\ntensor-network language, which will be explored in the following section.\nWe begin our exploration with the classical one-dimensional Ising model, a fun-\ndamental and illustrative example in the study of magnetism. In this model, local\nspin states are characterized by a binary variable, 𝜎𝑖=±1, where each spin can be\nthought of as a miniature magnet. The values of ±1can be metaphorically equated\ntothenorth(N)andsouth(S)polesofamagnet. Thisanalogyisusefulinvisualiz-\ning how each local spin, akin to a tiny magnet, contributes to the overall magnetic\nproperties of the system. In the one-dimensional Ising model, each spin aligns\nalong a single direction in an array. By considering these local spins collectively,\nwe gain insight into the emergent magnetic behavior of the entire system, where\nthe alignment or randomness of these “mini magnets\" underpins the macroscopic\nproperties observed. Specifically, the system is classified as ferromagnetic if the\naverage spin, calculated as1\n𝑁Í𝑁\n𝑖=1𝜎𝑖, is non-zero. This non-zero average indicates\na net alignment in one direction, characteristic of ferromagnetic ordering. Con-\nversely, if this average equals zero,1\n𝑁Í𝑁\n𝑖=1𝜎𝑖=0, the system is said to be in a\nparamagnetic state. Inthisstate,thespinsareorientedrandomly,resultinginnonet\nmagnetization. This binary representation not only simplifies the analysis but also\nprovidesprofoundinsightsintotheunderlyingmechanismsofmagneticinteractions\nand phase transitions.\nIntherealmofstatisticalmechanics,thebehaviorofspinsintheIsingmodelisgov-\nerned by local Boltzmann weights. The probability of a specific spin configuration\noccurringisquantifiedbytheseBoltzmannweights. Theseweightsaremathemati-\ncally defined as exp[−𝛽𝜖{𝜎𝑖}], where𝛽=1/𝑇represents the inverse temperature,\nand𝜖{𝜎𝑖}denotes the energy associated with a particular spin configuration. Con-\n2https://www.youtube.com/watch?v=MxRddFrEnPc&t=1s\n3sequently, the probability of observing a certain configuration, 𝑝{𝜎𝑖}, is calculated\nusing the formula 𝑝{𝜎𝑖}=exp[−𝛽𝜖{𝜎𝑖}]\n𝑍(𝛽). Here,𝑍(𝛽)=Í\n{𝜎𝑖}exp[−𝛽𝜖{𝜎𝑖}]is the\npartition function, which serves as a normalization factor ensuring that the sum of\nprobabilities over all possible configurations equals one.\nTheenergyoftheIsingmodelinperiodicboundarycondition(PBC)isdefinedas\n𝜖{𝜎𝑖}=−𝐽𝑁−1∑︁\n𝑖=1𝜎𝑖𝜎𝑖+1−𝐽𝜎𝑁𝜎1. (1.1)\nThis definition ensures that the energy is minimized when all spins are aligned in\nthe same direction, making this configuration highly favored at low temperatures.\nIn contrast, at higher temperature regimes, where 𝛽∼0, the probability becomes\nignorantoftheenergyconfiguration. Asaresult,undertheseconditions,theprefer-\nential status of spin alignment dictated by lower energy considerations diminishes.\nInstead, the system tends to favor states that are more ’typical’ or statistically com-\nmon, reflecting a shift from energy-driven order to entropy-driven disorder. These\ntwo distinct phases – the ordered, low-temperature phase and the disordered, high-\ntemperature phase – are typically delineated by a critical point known as the phase\ntransition. Around this point, various singularities emerge in the derivatives of\nthe free energy, which is defined as 𝑓(𝛽)=−1\n𝛽ln𝑍(𝛽). These singularities are\nindicative of drastic changes in the system’s behavior and are a hallmark of phase\ntransitions in statistical mechanics.\nLet us compute the partition function for the one-dimensional Ising model as\ndefined in Eq. (1.1). We denote the partition function for a system of 𝑁spins with\nfixedspinsatbothendsas 𝑍𝑁(𝜎1,𝜎𝑁). Calculatingthisfunctionisstraightforward\nfor a system with only two spins. Let us set 𝐽=1and then, we have 𝑍2(+,+)=\n𝑍2(−,−)=𝑒𝛽,𝑍2(+,−)=𝑍2(−,+)=𝑒−𝛽, where+and−denotes𝜎=1and−1,\nrespectively. Now, consider adding an additional spin at site 𝑖=3. The resulting\npartitionfunctionforthreespinscanbedeterminedbyconsideringcaseswherethe\nsecond and third spins are either aligned or opposite. This yields the following\nequations:\n𝑍3(+,+)=𝑒−𝛽𝑍2(+,−)+𝑒𝛽𝑍2(+,+),\n𝑍3(+,−)=𝑒𝛽𝑍2(+,−)+𝑒−𝛽𝑍2(+,+).\nThe above equations are rewritten using matrix multiplications as\n \n𝑍3(+,+)\n𝑍3(+,−)!\n= \n𝑒𝛽𝑒−𝛽\n𝑒−𝛽𝑒𝛽! \n𝑍2(+,+)\n𝑍2(+,−)!\n.\n4We can repeat this procedure to obtain the partition function of 𝑁spin systems as\n \n𝑍𝑁(+,+)\n𝑍𝑁(+,−)!\n= \n𝑒𝛽𝑒−𝛽\n𝑒−𝛽𝑒𝛽! \n𝑍𝑁−1(+,+)\n𝑍𝑁−1(+,−)!\n,\n= \n𝑒𝛽𝑒−𝛽\n𝑒−𝛽𝑒𝛽!𝑁−2 \n𝑍2(+,+)\n𝑍2(+,−)!\n,\n= \n1\n2\u0002\n(2 cosh𝛽)𝑁−1+(2 sinh𝛽)𝑁−1\u0003\n1\n2\u0002\n(2 cosh𝛽)𝑁−1−(2 sinh𝛽)𝑁−1\u0003!\n,(1.2)\nwhere the remaining two boundary conditions, 𝑍𝑁(−,−)and𝑍𝑁(−,+)are respec-\ntively equal to 𝑍𝑁(+,+)and𝑍𝑁(+,−). Thus, the partition function for PBC is\n𝑍𝑁(𝛽)=𝑍𝑁+1(−,−)+𝑍𝑁+1(+,+)\n=(2 cosh𝛽)𝑁+(2 sinh𝛽)𝑁(1.3)\nThisresultcanbefurtherelucidatedbyemployingtheconceptofa transfermatrix .\nThe transfer matrix, denoted as T, is defined by the matrix:\nT= \n𝑒𝛽𝑒−𝛽\n𝑒−𝛽𝑒𝛽!\n. (1.4)\nThismatrixeffectively transfersthepartitionfunctionfrom 𝑍𝑁to𝑍𝑁+1,servingasa\ntooltocalculatethepartitionfunctionforalargersystembasedontheknownresults\nof a smaller system. The eigenvalues of the transfer matrix, T, are particularly\nsignificant as they dictate the thermodynamic properties of the system. In fact, it\ncanbedemonstratedthatthepartitionfunctioncanbesuccinctlyexpressedusing T\nin the following manner:\n𝑍𝑁(𝛽)=TrT𝑁(1.5)\n=1∑︁\n𝑛=0𝜆𝑁\n𝑛, (1.6)\nwhere𝜆0=2 cosh𝛽and𝜆1=2 sinh𝛽are the eigenvalues of T. This elucidates an\nimportant concept: the partition function is essentially the sum of the 𝑁-th powers\nof the eigenvalues of the transfer matrix. This concept is applicable to any spatial\ndimension.\nReal-space renormalization: Migdal-Kadanoff transformaiton\nThetwo-dimensionalIsingmodelpresentsahigherlevelofcomplexitycompared\ntoitsone-dimensionalcounterpart. Toaddressthis,MigdalandKadanoffdeveloped\n5Figure 1.1: The sketch of Migdal-Kadanoff transformation. It aims to analytically\nseehowthecoupling 𝐾=𝛽𝐽changeswhenthesystemiscoarse-grainedbyafactor\nof two.\na methodology to simplify the problem [1, 2]. Kadanoff’s approach focused on\nunderstanding how the effective coupling constant 𝐾=𝛽𝐽evolves with changes\nin scale, rather than attempting to directly calculate the partition function. This is\nschematically illustrated in Figure 1.1, where the method involves tracing out the\ndegrees of freedom at the ⊗sites while retaining the spins at the ◦sites. Notably,\nthespinatthecenterofeachnewsquarelatticeisignored,enablingexacttreatment\nof the system. Kadanoff’s key assumption is that during the coarse-graining of the\nsystem, the effective coupling effectively doubles. This doubling occurs as a result\nof bundling together two interaction bonds from the original lattice. Moreover,\nthere are spins situated at the center of the new bonds, denoted as ⊗. These central\nspins need to be traced out to determine the new coupling constant. Then, the new\ncoupling constant 𝐾′is derived as follows:\n𝐴exp[𝐾′𝜎1𝜎3]=Tr𝜎2exp[2𝐾𝜎1𝜎2+2𝐾𝜎 2𝜎3]\n=2 cosh(2𝐾(𝜎1+𝜎3))\n=2𝜎1𝜎3sinh2(2𝐾)+2 cosh2(2𝐾) (1.7)\nGiven that𝜎2=1, we can express the left-hand side of the equation as:\nexp[𝐾′𝜎1𝜎3]=cosh(𝐾′)+𝜎1𝜎3sinh(𝐾′) (1.8)\n6Figure 1.2: The RG flow of the two-dimensional Ising model following Eq. (1.9).\nThis leads us to the relation between the old and new couplings:\ntanh(𝐾′)=tanh2(2𝐾) (1.9)\nEquation (1.9) is fundamental to understanding how coupling constants transform\nunder scale transformations in the two-dimensional Ising model. It indicates that\nwith each coarse-graining of the lattice by two sites, the coupling constants evolve\naccording to the relation 𝐾′=arctanh(tanh2(2𝐾)). This process of evolution is\ndepicted in Fig. 1.2.\nAt the critical point 𝐾𝑐, marked by a black dotted line, there is no evolution of 𝐾\nsince tanh(𝐾𝑐)=tanh2(2𝐾𝑐)holds true. This point is identified as a fixed-point ,\ncorresponding to the critical temperature. In the high-temperature regime where\n𝐾 <𝐾𝑐, as shown by the red arrows, the effective coupling decreases towards zero\nwith increasing scale. Since 𝐾=0corresponds to the 𝐽→0or𝑇→∞limit, this\nindicates each spin is decoupled, being a phase of complete disorder. Conversely,\nstarting from a low-temperature regime where 𝐾 > 𝐾𝑐,𝐾increases upon coarse-\ngraining, as indicated by the blue arrows. This behavior, aligning with the 𝐽→∞\nor𝑇→0limits, corresponds to a phase characterized by spontaneous symmetry\nbreaking.\nFigure 1.2 effectively illustrates the concept of renormalization group flow (RG\nflow) in the context of the coupling constant 𝐾in the Ising model. As depicted,\n7when the scale increases, the couplings 𝐾that start from values below the critical\npoint(𝐾 < 𝐾𝑐)and above it(𝐾 > 𝐾𝑐)appear to “flow\" towards 𝐾=0and\n𝐾=∞,respectively. Thisdynamicbehaviorofthecouplingconstantunderscaling\ntransformations is a fundamental aspect of RG flow.\nThepoints𝐾=0,𝐾𝑐,and∞areidentifiedasfixed-pointswithinthisflow. These\npoints are unique in that they remain invariant under scale transformations as for-\nmulated in Eq. (1.9). They can be conceptualized as “the terminal stations” of the\nscaletransformationprocess. Whenreachingthesepoints,thesystemhaseffectively\ndiscarded all irrelevant information through an infinite series of scale transforma-\ntions. Drawing a parallel to the ’Bliss’ wallpaper analogy, each step we take back\nfrom the image can be likened to each step of scale transformation in physical sys-\ntems. As we step back, finite-sized clusters within the wallpaper appear smaller\nand smaller. Similarly, in physical systems undergoing scale transformations, the\ncorrelation length, denoted as 𝜉, reduces by half with each coarse-graining step.\nThis process leads the system towards a “simpler theory”, where 𝜉=0, represents\na state devoid of significant correlations at large scales.\nAnotableexceptionarisesatthepointofcriticality,where 𝜉reachesinfinity. This\ninfinitecorrelationlengthisadefiningfeatureofcontinuousphasetransitions,mark-\ning a state where correlations extend across all scales. The fixed-point associated\nwiththiscriticalityisofparticularinterest,asitembodiesthekeyprinciplesofuni-\nversalityandscaleinvariancefundamentaltounderstandingthesephasetransitions.\nDespite the microscopic differences between systems like water and magnets, the\nmacroscopic behaviors of these systems converge to the same fixed-points. This\nconvergence to common fixed-points is what gives rise to the universal properties\nobserved in critical phenomena across different physical systems.\nTo further understand this concept, consider linearizing Eq. (1.9) near the critical\npoint𝐾=𝐾𝑐. This linearization yields:\n(𝐾′−𝐾𝑐)≈1.68(𝐾−𝐾𝑐).\nThis relationship indicates that, after 𝑛-steps of scale transformation, the effective\ncoupling constant increases exponentially as:\n(𝐾′−𝐾𝑐)≈1.68𝑛(𝐾−𝐾𝑐).\nExtending this to a continuous scale transformation 𝑛, we can describe how the\n8deviation𝛿𝐾=𝐾−𝐾𝑐grows with scale:\n𝑑(𝛿𝐾(𝑛))\n𝑑𝑛≈ln(1.68)𝛿𝐾(𝑛). (1.10)\nSince the system size scales as 𝐿=2𝑛, Eq. (1.10) can be reformulated in terms of\nthe logarithmic scale 𝑙=ln(𝐿):\n𝑑(𝛿𝐾(𝑙))\n𝑑𝑙≈ln(1.68)\nln(2)𝛿𝐾(𝑙),\n≈0.75𝛿𝐾(𝑙). (1.11)\nThis formulation represents the RG equation. Phase transitions that belong to the\nsameuniversalityclassarecharacterizedbythesameRGequation,eventhoughthey\nmay have different specific scale transformations as in Eq. (1.9). The coefficient\n∼0.75in this equation is referred to as the RG dimension, which plays a crucial\nrole in determining the critical exponents of the system. It is noteworthy that while\nthe exact RG dimension for the Ising universality class is one as\n𝑑(𝛿𝐾(𝑙))\n𝑑𝑙=𝛿𝐾(𝑙). (1.12)\nNamely, Kadanoff’s approximation yields a close value, demonstrating the effec-\ntiveness of this simplified approach.\nIn the following sections, we will delve deeper into this concept, interpreting\nit through the lens of field theory. This approach will provide a more nuanced\nand comprehensive understanding of the dynamics at play in phase transitions and\ncritical phenomena.\nField theory describing two-dimensional fixed-point\nUniversality at criticality can be exemplified by examining the behavior of the\ncorrelation function in critical systems. In the specific case of the critical two-\ndimensional Ising model, the spin-spin correlation function exhibits a polynomial\ndecay characterized by:\n⟨𝜎(𝑟𝑖)𝜎(𝑟𝑗)⟩∝1\n|𝑟𝑖−𝑟𝑗|1/4, (1.13)\nwhere𝑟𝑖and𝑟𝑗denote the positions of spins. This equation illustrates how, at\ncriticality, the correlation between spins decays in a manner inversely proportional\nto the distance raised to the power of 1/4.\n9Incontrast,forsystemsthatarenotatcriticality,whichpossessafinitecorrelation\nlength𝜉, the correlation function typically exhibits an exponential decay:\n⟨𝜎(𝑟𝑖)𝜎(𝑟𝑗)⟩∝𝑒−|𝑟𝑖−𝑟𝑗|/𝜉.\nIn this scenario, the correlation diminishes exponentially with increasing distance\nbetween spins, governed by the correlation length 𝜉.\nTherefore,thecorrelationfunctioninEq.(1.13)forthecriticalIsingmodelcanbe\nunderstood as the limit where 𝜉→∞. This infinite correlation length at criticality\nis what leads to the power-law decay of the correlation function, distinguishing\nit from the exponential decay observed in systems with finite correlation lengths.\nThis behavior exemplifies the concept of universality at criticality, where different\nsystemsexhibitsimilarlong-rangecorrelationsastheyapproachtheircriticalpoints.\nIn field theory, correlation functions are expressed in terms of operators. For\ninstance, Eq. (1.13) in the field theory framework is represented as:\n⟨ˆ𝜎(𝑟𝑖)ˆ𝜎(𝑟𝑗)⟩=1\n|𝑟𝑖−𝑟𝑗|1/4, (1.14)\nwhere ˆ𝜎denotes the spin operator and the brackets indicate the expectation value\nofinsertingtwosuchspinoperatorsintothevacuumstate. Thisformulationreflects\nhow the correlation between spins decays with distance in the critical Ising model.\nAnothercrucialoperatorinthecriticalIsingmodelistheenergyoperator,denoted\nasˆ𝜖. The correlation function for this operator is given by:\n⟨ˆ𝜖(𝑟𝑖)ˆ𝜖(𝑟𝑗)⟩=1\n|𝑟𝑖−𝑟𝑗|2. (1.15)\nThis equation demonstrates that the correlation of the energy operator also decays\nwith distance, but at a different rate compared to the spin operator.\nOnthelattice,thecorrelationfunctioncorrespondingtotheenergyoperatortakes\nthe form:\n⟨(𝜎(𝑟𝑖)𝜎(𝑟′\n𝑖))(𝜎(𝑟𝑗)𝜎(𝑟′\n𝑗))⟩∝1\n|𝑟𝑖−𝑟𝑗|2, (1.16)\nwhere𝑟′\n𝑖is a neighboring site of 𝑟𝑖. The product 𝜎(𝑟𝑖)𝜎(𝑟′\n𝑖)represents the local\nenergyintheIsingmodel,whichexplainswhy ˆ𝜖isreferredtoastheenergyoperator.\nIn addition to the above operators, there is also the identity operator denoted as 𝐼\nthat represents “inserting nothing.\"\n10The exact values of the exponents in Eqs. (1.14) and (1.15), specifically 1/4\nand2, naturally lead to speculation about an underlying theoretical framework that\nexplainstheseprecisefigures. Indeed,fortwo-dimensionalcriticalsystems,thereis\naprofoundtheoreticalbasisbehindtheseexponents. Theconceptofscaleinvariance,\nwhichisinherenttofixedpoints,extendstoabroaderprincipleknownasconformal\ninvariance in two dimensions. Conformal invariance imposes strict constraints on\noperators and their correlation functions, often enabling the precise determination\nof critical exponents.\nThefieldtheorythatincorporatesthisinvarianceisknownasconformalfieldtheory\n(CFT).ThekeytoCFT’seffectivenessliesinitsexploitationofconformalinvariance,\nwhich significantly enhances the symmetry of the system and, consequently, its\nanalytical traceability.\nIn CFT, each universality class corresponds to a specific CFT. For example, the\nIsinguniversalityclassisdescribedbytheIsingCFT,whichincludesthreeprimary\noperators 3:𝐼,𝜎, and𝜖(hereafter, we will refer to operators without the hat\nnotation). More generally, primary operators in CFT are denoted as Φ𝑖. These\noperators exhibit the following characteristics: The two-point correlation function\nis defined as\n⟨Φ𝑖(𝑟𝑖)Φ𝑗(𝑟𝑗)⟩=𝛿𝑖,𝑗\n|𝑟𝑖−𝑟𝑗|2𝑥𝑖, (1.17)\nwhere𝑥𝑖represents the scaling dimension of the operator Φ𝑖. In the case of the\nIsing CFT, the scaling dimensions are 𝑥𝐼=0,𝑥𝜎=1/8, and𝑥𝜖=1. Similarly, the\nthree-point correlation function is expressed in a universal form:\n⟨Φ𝑖(𝑟𝑖)Φ𝑗(𝑟𝑗)Φ𝑘(𝑟𝑘)⟩=𝐶𝑖𝑗𝑘\n|𝑟𝑖−𝑟𝑗|Δ𝑘\n𝑖𝑗|𝑟𝑗−𝑟𝑘|Δ𝑖\n𝑗𝑘|𝑟𝑘−𝑟𝑖|Δ𝑗\n𝑘𝑖, (1.18)\nwhere𝐶𝑖𝑗𝑘isanoperatorproductexpansion(OPE)coefficient,and Δ𝑘\n𝑖𝑗=𝑥𝑖+𝑥𝑗−𝑥𝑘.\nNotable OPE coefficients for the Ising CFT include:\n𝐶𝐼𝐼𝐼=𝐶𝐼𝜎𝜎=𝐶𝐼𝜖𝜖=1, (1.19)\n𝐶𝜎𝜎𝜖=1\n2. (1.20)\n3Primary operators are a specific class of operators that play an important role in elementary\nexcitations. While we will only discuss this class of operators in this section, there is another class\nnamed descendants that govern higher excited states.\n11It is important to note that the permutation of indices in these coefficients does not\nalter their values, preserving the Z2symmetry 4.\nEmphasizingthephysicalsignificanceofOPEcoefficientsinRGtheoryiscrucial,\nasthesecoefficientsplayapivotalroleinunderstandinghowlocaloperatorsinteract\nand combine, or “fuse,\" within the field theory framework. To grasp this concept,\nconsider an analogy involving a canvas with blue and red dots placed close to each\nother. When viewed from a close distance, these dots are seen as distinct entities.\nHowever, as one steps back, the dots may appear to merge into a single purple dot.\nThisphenomenonofblendingor“fusion\"ofthedotsmirrorshowoperatorsinfield\ntheory can be combined.\nInfieldtheory,thefusionofoperatorsismathematicallyrepresentedbythemixing\nof two local operators situated in close proximity. Let Φ𝑖andΦ𝑗be two such\noperators. The fusion of these operators can be expanded in terms of the local\noperator basis, as illustrated below:\nΦ𝑖(𝑟𝑖)Φ𝑗(𝑟𝑗)≈∑︁\n𝑘𝐶𝑖𝑗𝑘\n|𝑟𝑖−𝑟𝑗|𝑥𝑖+𝑥𝑗−𝑥𝑘Φ𝑘\u0010𝑟𝑖+𝑟𝑗\n2\u0011\n. (1.21)\nIn this equation, the exponents with respect to |𝑟𝑖−𝑟𝑗|are chosen to ensure con-\nsistency with the two-point correlation function, as described in Eq. (1.17). This\nexpansionsignifieshowtwolocaloperatorswhenincloseproximity,caneffectively\ncombine to form a different operator, Φ𝑘, with the OPE coefficients 𝐶𝑖𝑗𝑘dictating\nthe nature and strength of this fusion.\nIn the Ising CFT, the fusion of two spin operators 𝜎results in the formation\nof the energy operator 𝜖. This concept aligns intuitively with the corresponding\nlattice model of the Ising system. Recall that in the lattice model, the individual\nspin operator 𝜎𝑖and the product of adjacent spin operators 𝜎𝑖𝜎𝑖+1correspond to\nthe CFT operators 𝜎and𝜖, respectively. Consequently, when two spin operators\npositioned close to each other on the lattice are multiplied, the resulting interaction\nclosely resembles 𝜎𝑖𝜎𝑖+1, which is the lattice analog of the energy operator 𝜖. This\ninteraction is mirrored in the CFT framework, as evidenced by the non-zero OPE\ncoefficient𝐶𝜎𝜎𝜖, indicating a significant fusion between two 𝜎operators into 𝜖.\nAdditionally, in CFT, the identity operator 𝐼represents the concept of inserting\nno operator into the system. As such, fusing any operator with 𝐼does not result in\n4For a detailed discussion on CFT, readers are referred to Ref. [3]. In this chapter, we aim to\ngive a practical introduction to CFT.\n12Figure 1.3: A schematic figure of fusing of operators.\nanychangetotheoriginaloperator. ThisisreflectedintheOPEcoefficients,where\nfusing an operator with the identity operator maintains the operator unchanged,\nleading to𝐶𝑖𝑖𝐼=1. This property highlights the foundational role of the identity\noperator in maintaining the integrity of the system’s operators during the fusion\nprocess.\nBuilding upon our understanding of OPE coefficients and their role in operator\nfusion, we can discern the rationale behind their appearance in the three-point\ncorrelationfunction,asshowninEq.(1.18). Considerthesituationwherethepoints\n𝑟𝑖and𝑟𝑗are in close proximity to each other. Under this condition, Eq. (1.18) can\nbe approximated as:\n⟨Φ𝑖(𝑟𝑖)Φ𝑗(𝑟𝑗)Φ𝑙(𝑟𝑙)⟩≈𝐶𝑖𝑗𝑙\n|𝑟𝑖−𝑟𝑗|𝑥𝑖+𝑥𝑗−𝑥𝑙1\n|𝑟𝑖−𝑟𝑙|2𝑥𝑙. (1.22)\nThis approximation effectively combines the principles outlined in Eqs. (1.17) and\n(1.18). Specifically, it demonstrates that a three-point correlation function can be\ninterpreted as a two-point function following the fusion of the first two operators,\nΦ𝑖andΦ𝑗.\nThis fusion process results in a single operator, which then interacts with the\nthird operator, Φ𝑙. The corresponding correlation function thus encapsulates this\ninteraction, with the OPE coefficient 𝐶𝑖𝑗𝑘playing a crucial role in quantifying the\nstrength and nature of the fusion between Φ𝑖andΦ𝑗. This concept is graphically\nrepresentedinFig.1.3,wherethefusionofthefirsttwooperatorsbeforeinteracting\nwith the third is illustrated. Through this lens, the three-point function can be\nunderstoodasamanifestationoftheunderlyingfusiondynamicsamongtheoperators\nin the field theory framework.\nIn CFT, conformal mapping plays a crucial role, especially in two-dimensional\ncontexts. In such systems, the physical 𝑥-𝑦plane is effectively represented using a\ncomplexplanewithcoordinates 𝑧=𝑥+𝑖𝑦anditscomplexconjugate ¯𝑧=𝑥−𝑖𝑦. In\n13thisframework,primaryoperatorstransformwhenweperformaconformalmapping\n𝑤=𝑓(𝑧)as:\n˜Φ𝑖(𝑤,¯𝑤)=\u0012𝜕𝑤\n𝜕𝑧\u0013−ℎ𝑖\u0012𝜕¯𝑤\n𝜕¯𝑧\u0013−¯ℎ𝑖\nΦ𝑖(𝑧,¯𝑧), (1.23)\nIn this formula, ℎ𝑖and ¯ℎ𝑖are known as the conformal weights of the operator\nΦ𝑖, determining its scaling dimension 𝑥𝑖=ℎ𝑖+¯ℎ𝑖and conformal spin 𝑠𝑖=ℎ𝑖−¯ℎ𝑖.\nConsiderascaletransformationdescribedby 𝑤=𝑏−1𝑧5. Underthistransformation,\nthe primary operator Φ𝑖behaves as:\n˜Φ𝑖(𝑤,¯𝑤)=𝑏𝑥𝑖Φ𝑖(𝑧,¯𝑧). (1.24)\nThis relationship illustrates how the operator scales with the transformation factor\n𝑏. Setting𝑏=|𝑧|, we can derive the power-law decay of the two-point correlation\nfunction, as observed in Eq. (1.17):\n⟨Φ𝑖(𝑧,¯𝑧)Φ𝑖(0)⟩=|𝑧|−2𝑥𝑖⟨Φ𝑖(1)Φ𝑖(0)⟩. (1.25)\nThis outcome highlights how the decay rate of the two-point function is directly\nlinkedtothescalingdimensionoftheoperator,demonstratingtheprofoundinfluence\nofconformalmappinginCFT.Suchinsightsarepivotalforunderstandingcorrelation\nfunctions in critical phenomena and the symmetry principles that underpin them.\nThe collection of scaling dimensions 𝑥𝑖and OPE coefficients 𝐶𝑖𝑗𝑘, collectively\nreferred to as CFT data, is crucial for a comprehensive understanding of critical\nphenomena. Therefore, the determination of this CFT data, particularly from a\nnumerical perspective, is a fundamental objective in the study of critical systems.\nRenormalization group and CFT\nThe concept of CFT is intrinsically linked to the RG theory. Specifically, CFT\nprovidesaframeworktocalculatehowdeviationsfromcriticalvalues,suchas 𝛿𝐾(𝑙)\nin Eq. (1.12), evolve through scale transformations. When considering Kadanoff’s\nreal-spaceRGapproach,onemightquestionwhytheanalysisisfocusedsolelyonthe\ncouplingconstant 𝐾. Inanexactcoarse-grainingofthemodel,othercouplingcon-\nstants, like the next nearest-neighbor coupling, could emerge. However, Eq. (1.11)\n5𝑏is the factor of scale transformation, where Kadanoff’s RG corresponds to 𝑏=2. This is\nbecause 2𝑐𝑚in𝑧-plane becomes 1𝑐𝑚in𝑤-coordinate.\n14still qualitatively represents the correct RG flow for Ising criticality. So, why is it\nvalid to concentrate only on 𝐾? Field theory answers this by identifying 𝐾as a\nrelevantparameter,whereasothersarenot. Tounderstandthisindetail,Wilsonfirst\nintroduced the concept of considering allpossible perturbations that might arise\nfromthemicroscopicdetailsoftheHamiltonian[4,5]. Deviationssuchas 𝛿𝐾from\nthe scale-invariant action 𝑆∗are expressed by 𝑔𝑗with corresponding operators Φ𝑗.\nHence, the action can be formulated as:\n𝑆=𝑆∗+∫\n𝑑𝑑𝑟∑︁\n𝑗𝑔𝑗Φ𝑗, (1.26)\nwhereΦ𝑗are normalized operators, and the sum of 𝑗goes through all possible\nperturbations. Weareinterestedinhowonlyafewofthesebecomerelevantduring\nthe scale transformation. To do this, we expand the Euclidean action around the\nfixed point as follows:\nTr𝑒−𝑆=Tr𝑒−𝑆∗*\n1−∑︁\n𝑖∫\n𝑑𝑑𝑟𝑔𝑖Φ𝑖+1\n2∑︁\n𝑖,𝑗∫\n𝑑𝑑𝑟𝑖𝑑𝑑𝑟𝑗𝑔𝑖𝑔𝑗Φ𝑖Φ𝑗+···+\n𝑆∗\nUnder scale transformations 𝑟→𝑏𝑟, the second and third terms transform as:\n∑︁\n𝑖∫\n𝑑𝑑𝑟𝑔𝑖Φ𝑖→∑︁\n𝑖∫\n𝑑𝑑𝑟𝑏𝑑−𝑥𝑖𝑔𝑖Φ𝑖,\n1\n2∑︁\n𝑖,𝑗∫\n𝑑𝑑𝑟𝑖𝑑𝑑𝑟𝑗𝑔𝑖𝑔𝑗Φ𝑖Φ𝑗→𝑆𝑑\n2(𝑏−1)∑︁\n𝑖,𝑗∫\n𝑑𝑑𝑟𝑖𝑔𝑖𝑔𝑗𝐶𝑖𝑗𝑘Φ𝑘,\nwhere𝑆𝑑is the surface area of a (𝑑−1)-dimensional sphere, with 𝑆2=2𝜋in\ntwo dimensions. In the analysis of the third term, we integrate over the region\n𝑎 <|𝑟𝑖−𝑟𝑗|< 𝑏𝑎, thereby accounting for the short-range physics. Here, 𝑎\nrepresents the lattice spacing at the current scale. We define 𝑔𝑘such that𝑎is\nnormalizedtounity. Uponapplyinganinfinitesimalscaletransformation 𝑏≈1,the\neffective coupling 𝑔𝑘evolves to𝑔𝑘(𝑏), given by\n𝑔𝑘(𝑏)=𝑏𝑑−𝑥𝑘𝑔𝑘−𝑆𝑑\n2(𝑏−1)∑︁\n𝑖,𝑗𝐶𝑖𝑗𝑘𝑔𝑖𝑔𝑗,\nConsequently, the RG equation up to 1-loop expansion becomes:\n𝑑𝑔𝑘\n𝑑𝑙=𝑏𝑑𝑔𝑘\n𝑑𝑏\n=(𝑑−𝑥𝑘)𝑔𝑘−𝑆𝑑\n2∑︁\n𝑖,𝑗𝐶𝑖𝑗𝑘𝑔𝑖𝑔𝑗, (1.27)\n15To this order, the RG equation (beta function) is universally determined by the\nscaling dimension 𝑥𝑘and the OPE coefficients 𝐶𝑖𝑗𝑘.\nRevisiting the justification for concentrating solely on 𝛿𝐾in Eq. (1.12), it is\nessential to understand the dynamics of operators near criticality, as defined by the\nfixed-point CFT. The Ising CFT, although potentially allowing for infinite kinds of\nperturbations,hasaspecificcriterionforwhichperturbationsaresignificantduring\nscaletransformations. AccordingtoEq.(1.27),therunningcouplingconstantsscale\nas\n𝑔𝑘(𝐿)∝𝐿𝑑−𝑥𝑘,\nand thereby only operators with scaling dimensions 𝑥𝑘< 𝑑remain influential\nthrough these transformations. Such operators are termed “relevant operators.”\nTherationalebehindfocusingonalimitednumberofparametersinRGanalysisis\nrootedinthefactthattypically,onlyafewrelevantoperatorsexistinthefixed-point\nCFT.InthecaseoftheIsingCFT,forinstance,theoperator 𝜖istheprimaryrelevant\noperatorthatpersists 6,whichcorroboratesthevalidityofKadanoff’sapproach. This\nfocus on a few relevant parameters simplifies the RG analysis while still capturing\nthe critical behavior of the system.\nConversely, operators with scaling dimensions 𝑥𝑘> 𝑑, known as “irrelevant op-\nerators,\" tend to diminish and become negligible throughout scale transformations.\nThese operators do not significantly influence the macroscopic properties of the\nsystemandthereforedonotneedtobeconsideredintheRGanalysis. Thisselective\napproach,focusingonlyonrelevantoperatorslike 𝜖intheIsingCFT,iswhatmakes\ncritical phenomena universal across diverse systems.\nTosummarizethissection,theuniversalityobservedincriticalphenomenacanbe\ntracedbacktothesharedRGfixedpointsamongdifferentsystems. TheseRGfixed\npoints,conceptualizedas’terminalstations’inthescaletransformationprocess,are\ncharacterizedbyalimitedsetofparameterscorrespondingtorelevantoperators. In\ncontrast, other microscopic details, which are associated with irrelevant operators,\ndiminish and lose significance through the coarse-graining process.\nThisparadigmhighlightsthefundamentalprinciplethat,atthemacroscopiclevel,\nthe critical behavior of a system is governed not by the myriad of its microscopic\ndetails, but by a select few relevant parameters. These parameters, represented\n6𝜖and𝜎respectively corresponds to the shift of temperature and applying a uniform magnetic\nfield. Under the Z2spin flip symmetry, only 𝜖is allowed.\n16by the relevant operators at the RG fixed point, dictate the universal aspects of the\nsystem’scriticalbehavior. Asaresult,systemswithdifferentmicroscopicstructures\ncanexhibitthesamemacroscopiccriticalphenomena,providedtheyconvergetothe\nsameRGfixedpoint. Thisconvergenceiswhatunderliestheuniversalityofcritical\nphenomena, emphasizing the profound impact of scale and relevant operators in\ndetermining the nature of phase transitions and critical behavior.\nMovingtothenextsection,ourfocusshiftstothemethodologiesforextractinguni-\nversal information from critical lattice models. A particularly promising approach\nis the tensor network formalism. This method can be seen as a generalization of\nthe transfer matrix formalism, which we previously discussed in the context of the\none-dimensional Ising model. When combined with recent advances in computa-\ntional techniques, tensor network formalism enables a more sophisticated form of\nreal-space RG analysis.\nThis enhanced RG approach transcends Kadanoff’s methodology by its ability\nto retain multiple parameters throughout the scale transformation process. This\ncharacteristic aligns more closely with Wilson’s original vision for RG theory,\nprovidingamorecomprehensiveandfaithfulrepresentationofscaletransformations\nin physical systems.\nIn the upcoming section, we will review the fundamental concepts underlying\ntensor network-based RG. This will set the stage for the main chapter, where we\npropose a novel approach to calculate the RG flow using tensor networks. This\napproach not only leverages the strengths of tensor network formalism but also\naddressessomeofthelimitationsofpreviousmethodologies,offeringamorerobust\nand accurate tool for analyzing critical behavior in lattice models.\n1.2 Review on tensor network renormalization\nWhat is a tensor?\nBefore delving into the intricacies of our study, it is essential to establish a fun-\ndamental understanding of what a tensor is. A tensor can be seen as a generalized\nformofvectorsandmatrices. Toillustrate,considerthefollowingexamples,which\n17are referred to as one-leg and two-leg tensors, respectively:\n𝑉=©\n«1\n2\n3ª®®\n¬,\n𝑀= \n𝑎00𝑎01\n𝑎10𝑎11.!\nFor clarity in this thesis, these tensors are denoted as 𝑉𝑖and𝑀𝑖𝑗, indicating their\nrespective number of legs. The indices run as 𝑖=0,1,2for𝑉𝑖and(𝑖,𝑗)=(0,0),\n(0,1),(1,0), and(1,1)for𝑀𝑖𝑗. This notation allows us to interpret the values as\n𝑉𝑖=𝑖+1and𝑀𝑖𝑗=𝑎𝑖𝑗. Thedimensionassociatedwitheachindexisknownasthe\nbond dimension 𝐷. Accordingly, we denote 𝐷=3for𝑉𝑖and𝐷=2for𝑀𝑖𝑗.\nAnother example is the anti-symmetric tensor 𝜖𝑖𝑗𝑘, defined as:\n𝜖𝑖𝑗𝑘= \n1for(𝑖,𝑗,𝑘)=(0,1,2),(1,2,0),(2,0,1),\n−1for(𝑖,𝑗,𝑘)=(2,1,0),(1,0,2),(0,2,1),\n0otherwise.\nThistensorrepresentsa3-legtensorwithabonddimensionof 𝐷=3. Theconcept\nof tensors, as previously introduced, extends to structures with any number of legs,\nknown as𝑛-leg tensors. These multi-dimensional tensors play a pivotal role in\nthe discussions that follow in this thesis. To aid in the comprehension of tensors,\nespecially in more complex scenarios, we often employ a graphical representation.\nInthisvisualdepiction,tensorsareillustratedascircleswithacorrespondingnumber\nof legs emanating from them.\nFor instance, the tensors 𝑉,𝑀, and𝜖, previously defined, would be represented\ngraphically as follows:\n.\nSimilarly, the multiplication of tensors is represented as a contraction of legs.\n.\nThese graphical representations provide an intuitive way to visualize the connec-\ntions between tensors, particularly when dealing with complex tensor networks or\n18operations involving multiple tensors. By utilizing these diagrams, we can more\neasily conceptualize the multi-dimensional relationships and transformations that\ntensors undergo in our analyses.\nTensor network renormalization\nThetensornetworkisanumericaltechniqueusedtorepresentthepartitionfunction\nof statistical models. The partition functions of two-dimensional statistical models\nwith a system size of 𝐿can be expressed through the contraction of 𝐿2tensors 7.\nEach tensor represents a local Boltzmann weight, and its dimensions correspond\nto physical degrees of freedom. For instance, the local tensor of the Ising model\non the square lattice is a 𝐷=2four-leg tensor 𝑇(1)\n𝑖𝑗𝑘𝑙=𝑒𝛽(𝑠𝑖𝑠𝑗+𝑠𝑗𝑠𝑘+𝑠𝑘𝑠𝑙+𝑠𝑙𝑠𝑖), where\n𝑠𝛼=2𝛼−1. The tensor network representation often provides an efficient method\nfor simulating complex systems.\nHowever, the exact contraction of 𝐿2tensors is generally impracticable for larger\nsystemsizesduetotheconstraintsimposedbythehigh-dimensionalHilbertspace 8.\nTNR aims to circumvent this issue by utilizing the principles of renormalization\ngroup theory. During each step of the RG process, 𝑇(𝑛)is coarse-grained to 𝑇(𝑛+1)\nviaaseriesofdecompositionsandrecombinations,asillustratedinFig.1.4. Starting\nfrom the local tensor 𝑇(1), we can simulate a system size of 𝐿=√\n2𝑛after𝑛RG\nsteps. Thecoarse-grainingprocessinTNRinvolvesnumericaltruncation,reducing\nthenumberofdegreesoffreedomwhilepreservingessentialphysics. Consequently,\nTNR facilitates efficient numerical simulation of complex systems.\nTensor Renormalization Group\nLevin and Nave were the pioneers in applying the technique of singular value\ndecomposition (SVD) to the decomposition of tensor networks [6]. SVD offers\na straightforward yet effective method for the tensor decomposition of a four-leg\ntensor𝑇𝑖𝑗𝑘𝑙.\n7Tensors can be understood as a generalization of vectors and matrices, extending into higher\ndimensions and complexities. A tensor characterized by 𝑛indices is referred to as an 𝑛-leg tensor.\nIn this framework, vectors, and matrices are special cases of tensors: a vector is a 1-leg tensor,\npossessing a single index, while a matrix is a 2-leg tensor, defined by two indices.\n8The one-dimensional Ising model was the simplest case, where we could perform exact con-\ntractions\n19Figure1.4: Aschematicpictureofthetensornetworkrenormalization. Theeffective\nlocal Boltzmann weight at 𝑛-th RG step𝑇(𝑛)is decomposed into the two three-leg\ntensors and recombined as 𝑇(𝑛+1). The effective system size enlarges by√\n2each\nRG step.\nThe decomposition of 𝑇𝑖𝑗𝑘𝑙using SVD can be represented as follows:\n𝑇𝑖𝑗𝑘𝑙=𝑑2∑︁\n𝑚,𝑛=1𝑈𝑖𝑗𝑚Σ𝑚𝑛𝑉†\n𝑛𝑘𝑙, (1.28)\nwhere𝑈𝑖𝑗𝑚and𝑉𝑛𝑘𝑙are unitary matrices, and Σ𝑚𝑛=𝛿𝑚,𝑛𝑠𝑚is a diagonal matrix.\nThediagonalelementsof Σarethesingularvaluesthatisnon-negativerealnumbers,\nandSVDeffectivelygeneralizestheconceptofmatrixdiagonalizationtorectangular\nmatrices. In the context of tensor networks, when the bond dimension of 𝑇𝑖𝑗𝑘𝑙is\n𝑑, the summation in Eq. (1.28) runs over 𝑑2terms. This new index 𝑚represents a\nnew bond dimension, which necessitates a truncation process to prevent the bond\ndimensionfrombecomingexcessivelylargeduringsuccessivecoarse-grainingsteps.\nTruncation is thus a crucial aspect of maintaining computational efficiency and\nfeasibility in TRG.\n20Now, we want to truncate the index 𝑚to minimize the Hilbert-Schmidt norm of\nthe difference between the original and truncated tensors as follows:\n(1.29)\nWe truncate the singular values when 𝑑2is larger than the desired bond dimension\n𝐷. LetΣ𝐷\n𝑚𝑛bethetruncatedmatrixthatkeepsonly 𝐷leadingsingularvalues. Then,\nEq. (1.29) is\n(1.30)\n=Tr\u0002\n𝑈†𝑈(Σ2+(Σ𝐷)2−2ΣΣ𝐷)𝑉†𝑉\u0003\n=𝑑2∑︁\n𝑚=1𝑠2\n𝑚+𝐷∑︁\n𝑚=1𝑠2\n𝑚−2𝐷∑︁\n𝑚=1𝑠2\n𝑚\n=𝑑2∑︁\n𝑚=𝐷+1𝑠2\n𝑚 (1.31)\nIn statistical mechanics systems, the singular values 𝑠𝑚typically exhibit an expo-\nnential decay as a function of 𝑚. This characteristic decay pattern implies that,\nas𝑚increases, the singular values become progressively smaller. Consequently,\nwhen evaluating the sum in Eq. (1.31), this exponential decay of 𝑠𝑚ensures that\nthe cumulative sum remains extremely small, particularly when a sufficiently large\nbond dimension 𝐷is considered. Therefore, for practical computations, a large 𝐷\neffectivelycapturesthesignificantcontributionsofthesum,whilethecontributions\nfrom higher values of 𝑚become negligibly small due to this exponential decay.\nFigure 1.5 presents a typical example of singular value distributions in TRG for\nthe two-dimensional classical Ising model. The blue and green lines represent the\nsingular values 𝑠𝑚for the low and high-temperature phases, respectively. In this\ncase, the bond dimension is set to ten, resulting in a total of one hundred singular\nvalues. However, it is observed that for 𝑚 > 10, the values of 𝑠𝑚drop below 10−6,\naffirming the efficacy and validity of this truncation method in these phases.\nConversely,thecriticalphase,depictedbytheorangeline,exhibitsaslowerdecay\nin𝑠𝑚. At the same bond dimension of 𝐷=10, the singular values are still around\n21Figure 1.5: An example of singular values of the four-leg tensor 𝑇𝑖𝑗𝑘𝑙. The blue,\norange, and green lines show the decay of 𝑠𝑚for the classical Ising model at the\nlow,critical,andhigh-temperatureregimes,respectivelyat 𝑑=𝐷=10aftersixRG\nsteps.\n10−2, highlighting a marked difference from the non-critical phases. This slower\ndecayatcriticalityunderscoresacrucialchallengeinTRGcalculations: thedifficulty\nin effectively capturing critical phenomena. Truncation of tensors at criticality can\nlead to systems with finite correlations, potentially introducing significant errors.\nGiven the importance of accurately estimating errors, especially in the context of\ncritical systems, we will delve into a more detailed discussion on this topic in a\nlatersection. ThisanalysisiscrucialforbothunderstandingthelimitationsofTRG\nat criticality and for developing strategies to mitigate error propagation in practical\ncalculations.\nGiventhevalidityoftheSVDtruncationsinstatisticalmechanics,LevinandNave\nproposed the following algorithm:\n22Algorithm 1 Algorithm for TRG\nInput:Initial tensor 𝑇(0)representing local Boltzmann weights\nOutput: Renormalized tensor 𝑇(𝑛)\nTRG 1-step: First, decompose the four-leg tensor 𝑇with bond dimension 𝑑as\nfollows:\n𝑇𝑖𝑗𝑘𝑙=𝑑2∑︁\n𝑚=1𝑈𝑖𝑗𝑚Σ𝑚𝑛𝑉†\n𝑛𝑘𝑙,\n𝑆1\n𝑖𝑗𝑛=𝑚𝑖𝑛(𝑑2,𝐷)∑︁\n𝑚=1𝑈𝑖𝑗𝑚√︁\nΣ𝑚𝑛\n𝑆2\n𝑛𝑘𝑙=𝑚𝑖𝑛(𝑑2,𝐷)∑︁\n𝑚=1√︁\nΣ𝑚𝑛𝑉†\n𝑛𝑘𝑙\n√︁\nΣ𝑚𝑛=𝛿𝑚,𝑛√𝑠𝑚\nRepeatthesameproceduretomake 𝑆3and𝑆4bydoingSVDwithapairofindices\n{𝑗𝑘}and{𝑙𝑖}. Then, contract 𝑆1∼𝑆4inside the red dotted square and rotate by\n45degrees as below:\nfor𝑖=1to𝑛do\nRepeat TRG 1-step\nend for\nreturn𝑇(𝑛)\nThe practical implementation in Python is presented in my GitHub repository\n23Figure 1.6: The CDL tensors after TRG. The local loop, marked by a red square,\npersists after the TRG steps, indicating that ultraviolet information remains even\nafter extensive coarse-graining.\n(https://github.com/dartsushi/Loop-TNR_RGflow/tree/main/TRG_tutorial ).\nApplications to a honeycomb lattice are also discussed in the original paper [6].\nLimitation of TRG\nDespite the successes of TRG in various applications, it is not without its limita-\ntions. AsignificantshortcomingofTRG,asnotedinreferences[6,7],isitsinability\nto accurately reproduce the fixed-points of disorder phases. Levin attributed this\nlimitation to the inherent nature of SVD-based TRG, which tends to produce un-\nphysical fixed-point tensors, referred to as corner double line (CDL) tensors. The\nstructure of CDL tensors is illustrated as follows:\n(1.32)\n24InSVD-typeTRG,thereisanotablechallengeineliminating localentanglement,\nas depicted by the red square in Fig. 1.6. This figure demonstrates that ultraviolet\ninformation persists throughout successive coarse-graining steps. Consequently,\nthesedegreesoffreedomconsumevaluablebonddimensions,leadingtosuboptimal\napproximations after multiple RG steps.\nThis inherent limitation of TRG underscores the need for more sophisticated\ncoarse-graining algorithms that transcend the local tensor approximation presented\nin Eq. (1.29). Such advanced algorithms are encompassed under the umbrella of\nTNR, which aims to address these specific challenges and improve the accuracy of\ncoarse-graining in complex systems.\nTensor network renormalization\nThe field has witnessed the development of numerous algorithms aimed at over-\ncoming the CDL problem, a known limitation in TRG applications [8–13]. While\nthese algorithms vary in their technical details, they generally embrace two core\nprinciples: employing a larger unit-cell for optimization processes and effectively\nfiltering out local entanglement. Let us focus on Loop-TNR [10], known to be one\nof the best ones for two-dimensional TNR.\nOptimization with a larger unit-cell\nLoop-TNR aims to perform the approximation of the following:\n. (1.33)\nContrastingwiththeapproachdescribedinEq.(1.29),TNRfocusesonatwo-by-two\nunitcellcomposedoftwodistincttensors. Inthisprocess,an8-legtensor(asshown\non the left side) is approximated through the contraction of eight 3-leg tensors,\ndenoted as𝑆1∼𝑆8(as depicted on the right side).\nThismethodologyiscentraltotheconceptofTNR:ratherthanoptimizingindivid-\nual tensors, the focus is on optimizing contracted tensor networks. This approach\nallows for a more nuanced and effective handling of complex tensor structures,\nparticularly in addressing the limitations of traditional SVD methods in TRG. By\n25optimizing the entire network of tensors, TNR provides a more robust framework\nfor accurately capturing the intricate interactions within these systems.\nIn TRG,𝑆1∼𝑆8are constructed through SVD as explained in the algorithm. As\nthosetensorsfromSVDareagoodenoughapproximationoflocaltensors,weadopt\nthemasinitialtensorsofoptimizations. LettheleftandrightsidesofEq.(1.33)be\n|Ψ𝐴⟩and|Ψ𝐵⟩. Then, the cost function is rewritten in the following forms.\n||Ψ𝐴⟩−|Ψ𝐵⟩|2=⟨Ψ𝐴|Ψ𝐴⟩+⟨Ψ𝐵|Ψ𝐵⟩−⟨Ψ𝐴|Ψ𝐵⟩−⟨Ψ𝐵|Ψ𝐴⟩, (1.34)\n.(1.35)\nNow,wewanttooptimize 𝑆1∼𝑆8tominimizethecostfunction. Forconvenience,\nwe define𝐶,𝑁𝑖,𝑊𝑖, and𝑊†\n𝑖as followings:\n.\nThis allows to rewrite Eq. (1.35) as\n𝑓({𝑆𝑖})=||Ψ𝐴⟩−|Ψ𝐵⟩|2\n=𝐶+(𝑆𝑖)†𝑁𝑖𝑆𝑖−𝑊†\n𝑖𝑆𝑖−(𝑆𝑖)†𝑊𝑖. (1.36)\nThis function is quadratic if we fix every tensor except for 𝑆𝑖. In this case, the\nminimum can be found by solving𝛿𝑓({𝑆𝑖})\n𝛿𝑆𝑖=0. It is straightforward to check that it\nis equivalent to solving the following linear equation:\n𝑁𝑖𝑆𝑖=𝑊𝑖. (1.37)\nEntanglement filtering\n26AnotherimportantingredientofTNRisentanglementfiltering. Thisisaprocedure\nto discard the local degrees of freedom under the existence of CDL tensors. When\nthetensorhastheformoftheCDLtensorsshowninEq.(1.32),thecontractedfour\ntensors can be expressed as the following:\n,\nwhere(𝑇1,𝑇2,𝑇3,𝑇4)=(𝑇𝐴,𝑇𝐵,𝑇𝐴,𝑇𝐵), and the red loop corresponds to the local\nloop in Fig. 1.6. In scenarios where the red loop encompasses 𝑛dimensions, each\ntensorwithinthisredloopisassociatedwitharank- 𝑛diagonalmatrix,asillustrated\nin the following diagram:\n. (1.38)\nHere,each𝜆𝑖isarrangedindescendingorderbasedonabsolutevalues. Theprimary\nobjectiveinentanglementfilteringistoeffectivelycompressthismatrixtoarank-1\nconfiguration. Thiscompressionisachievedbyconstructingaprojectorbetween 𝑇𝑖\nand𝑇𝑖+1thattargetsthesubspacecorrespondingto 𝜆1,thelargestsingularvalue. To\ndothis,weuseaQRdecomposition. Considertheprocedureofinsertingaprojector\nbetween tensors 𝑇4and𝑇1in a TNR setup, where we denote 𝑇𝑖+4=𝑇𝑖for cyclic\nconsistency. Thefirststepinvolvesplacingarank- 𝑑identitymatrix,denotedas 𝐿[1]\n1\n, to the left of 𝑇1. Subsequently, we apply QR decomposition to the tensor product\nof𝐿[1]\n1and𝑇1, resulting in:\n𝐿[1]\n1𝑇1=˜𝑇1𝐿[2]\n1, (1.39)\nwhere ˜𝑇1isanorthogonalmatrixand 𝐿[2]\n1isanuppertriangularmatrix. Thenextstep\ninvolves normalizing 𝐿[2]\n1appropriately and repeating a similar QR decomposition\nprocess with 𝐿[2]\n1and𝑇2, and then proceeding with 𝐿[3]\n1and𝑇3. This iterative\nprocess is continued until convergence is achieved, resulting in the final projector\n𝐿[∞]\n1(The convergence is checked when 𝐿1comes back to between 𝑇4and𝑇1.\nDuring this process, 𝐿accumulates the matrix in Eq. (1.38) to end up having\nlim\n𝑚→∞©\n«𝜆𝑚\n10··· 0\n0𝜆𝑚\n2··· ···\n··· ··· ··· 0\n0··· 0𝜆𝑚\n𝑛ª®®®®®\n¬∝©\n«1 0··· 0\n0 0··· ···\n··· ··· ··· 0\n0··· 0 0ª®®®®®\n¬.\n27Werepeatthesamethingtotheleftstartingfrom 𝑅[1]\n4and𝑇4toobtain𝑅[∞]\n4. Finally,\nwe obtain the projectors using SVD as follows:\n𝐿[∞]\n1𝑅[∞]\n4=𝑈41Λ41𝑉†\n41,\n𝑃4𝑅=𝑅∞\n4𝑉411√Λ41, (1.40)\n𝑃1𝐿=1√Λ41𝑈†\n41𝐿∞\n1, (1.41)\nObtaining all projectors in hand, we redefine 𝑇𝐴/𝐵by contracting four projectors\naround as below:\n.\nFormoredetails,readersshallconsulttheoriginalpaper[10]. However,itisimpor-\ntanttonotethatwecanreducetheCDLloopstructurethroughthisprocedure. Loop-\nTNR’s algorithm is summarized in Algorithm. 2. The practical implementation\nin Python is in my GitHub repository( https://github.com/dartsushi/Loop-\nTNR_RGflow ).\n28Algorithm 2 Algorithm for Loop-TNR\nInput:Initial tensor 𝑇(0)\n𝐴/𝐵representing local Boltzmann weights\nOutput: Renormalized tensor 𝑇(𝑛)\n𝐴/𝐵\nLoop-TNR 1-step:\n1. Entanglement filtering\n2. Decomposition of 𝑇𝐴/𝐵into𝑆1∼𝑆8using SVD.\n3. Optimize 𝑆𝑖using from 1 to 8.\n𝑁𝑖𝑇𝑖=𝑊𝑖. (1.42)\n4. Repeat 3 until you reach the desired accuracy.\n5. Combine(𝑆1,𝑆4,𝑆5,𝑆8)and(𝑆2,𝑆3,𝑆6,𝑆7)to make new 𝑇𝐴/𝐵respectively.\nfor𝑖=1to𝑛do\nRepeat Loop-TNR 1-step\nend for\nreturn𝑇(𝑛)\n𝐴/𝐵\nLimitation of TNR\nWhile TNR effectively removes CDL tensors, another significant limitation arises\nfrom computational constraints, often termed finite bond dimension effects. For\nexample, the computational cost of Loop-TNR scales as 𝑂(𝐷6), limiting practical\ncomputationsonatypicaldesktopcomputertobonddimensionsuptoapproximately\n𝐷≈40. Although TNR achieves exactness in the limit of 𝐷=∞, the necessity\nof using a finite bond dimension inevitably introduces numerical errors. Prior to\nour research, the methodology for estimating these numerical errors was not well-\nestablished. Addressing this gap, we will delve into the strategies for estimating\nnumerical errors in the context of tensor-network based methodologies in Chapter\n2.\n29CFT data from TRG/TNR\nUptothispoint,wehavediscussedtheimplementationofTRGandTNRmethods\nin the context of real-space RG analysis. A key aspect of these methods is their\nability to reveal the properties of fixed points in critical lattice models. In practice,\nwhenTRGandTNRareappliedtosimulatecriticallatticemodels,therenormalized\ntensor𝑇(𝑛)is observed to converge rapidly to a specific tensor, denoted as 𝑇∗. This\nconvergence behavior is indicative of the system approaching a fixed point in its\nparameter space.\nThe tensor𝑇∗, aptly referred to as a fixed-point tensor, is believed to encapsulate\nthe properties associated with the fixed-point of the system. Notably, Gu and Wen\nhaveproposedmethodologiestocalculatethescalingdimensionsdirectlyfromthis\nfixed-point tensor [7]. In our review, we will adopt a slightly different notation to\nfacilitate a more seamless integration with the main content of our discussion 9.\nThepivotaloutcomeofGuandWen’sresearchconcernstheanalysisofthefixed-\npointtensorforasquarelattice,whichisafour-leggedtensormirroringthestructure\nof the original lattice. A critical step in their methodology involves contracting the\nlegsalongtheverticalaxisofthistensor. Thiscontractionprocessleadstoamatrix,\nfrom which the scaling dimensions can be inferred based on the eigenvalues. The\nprocess can be represented as:\n∑︁\n𝑛𝑇𝛼𝑛𝛽𝑛=\n,(1.43)\nIn this formulation, the largest eigenvalue is normalized to one, aligning with the\nscaling dimension of the identity operator, 𝑥𝐼=0. Subsequently, the scaling\ndimensions associated with other operators can be derived from the ratio of the\neigenvalues, denoted as 𝜆𝑛, using the equation:\n𝑥𝑛=1\n2𝜋ln𝜆0\n𝜆𝑛. (1.44)\nHere, the eigenvalues 𝜆𝑛are arranged in descending order. This methodology\noffers a robust means to extract scaling dimensions from the fixed-point tensor,\nproviding a valuable tool for analyzing the critical properties of the system. By\n9While our explanation is fundamentally equivalent to that of Gu and Wen, we approach the\ntopic using the energy basis, in contrast to their use of the character basis of CFTs.\n30utilizingtheeigenvalueratios,onecaneffectivelydeterminethescalingdimensions\ncorresponding to various operators, thereby gaining deeper insights into the nature\nof the critical points in the lattice model.\nTounderstandwhyscalingdimensionsarereflectedintheeigenvaluesofrenormal-\nizedtensors,letusrevisitthenatureofrenormalizedtensorsinTRG/TNRschemes,\nas discussed in the previous section. In these schemes, each RG step corresponds\nto a scale transformation with a factor of 𝑏=√\n2. Consequently, after 𝑛steps of\ncoarse-graining, the renormalized tensor effectively represents the tensor networks\nof a system whose size has been scaled to 𝐿=√\n2𝑛. This process can be visualized\nschematically as shown below:\n(1.45)\nInthis𝐿×𝐿tensornetwork,contractingtheverticalindicestransformsthenetwork\nintoacylindricalshape. Theeigenvaluesoftheresultantmatrixareessentiallythe 𝐿\nrepetitionsofthecolumn-to-columntransfermatrix,whichIwillhenceforthreferto\nsimplyasthe’transfermatrix’. Inthecontextofclassical-quantumcorrespondence,\na single layer of the transfer matrix equates to a translation in imaginary time. In\none-dimensionalquantumsystems,thistranslationcorrespondstotheHamiltonian.\nConsequently, there exists a relationship between the eigenvalues of the transfer\nmatrix and the spectrum of the one-dimensional Hamiltonian, 𝐸𝑛(𝐿), as follows:\n𝜆𝑛=𝑒−𝐿𝐸𝑛(𝐿), (1.46)\nwhere the𝐸𝑛values are arranged in ascending order, such that 𝐸0represents the\ngroundstate. Thisperspectiveenablesthesubsequentchapterstoanalyzethetransfer\nmatrix spectrum within the framework of Hamiltonian formalism.\nAt criticality, the system’s conformal invariance enables the computation of the\nenergy spectrum, 𝐸𝑛(𝐿). Consider an infinitesimal transformation defined as 𝑟′\n𝜇=\n𝑟𝜇+𝜖𝜇. Within this framework, the variation of the action can be articulated as:\n𝛿𝑆=−∫𝑑2𝑟\n2𝜋𝑇𝜇𝜈(𝑟)𝜕𝜇𝜖𝜈(𝑟), (1.47)\n31where𝑇𝜇𝜈denotes the stress tensor. In two-dimensional systems at criticality, con-\nformal invariance is a key characteristic. This invariance includes transformations\nsuch as translations, rotations, dilatations, and special conformal transformations.\nAsaresult,conformaltransformationsinthesesystemscanberepresentedthrough\nanalyticfunctionsonthecomplexplane,usingthetransformation 𝑧→𝑤(𝑧),where\n𝑧=𝑥+𝑖𝑦and¯𝑧=𝑥−𝑖𝑦.\nThegeneratorsoftheseconformaltransformationsareexpressedas 𝑇(𝑧)=1\n4(𝑇𝑥𝑥−\n𝑇𝑦𝑦−2𝑖𝑇𝑥𝑦)and ¯𝑇(¯𝑧)=1\n4(𝑇𝑥𝑥−𝑇𝑦𝑦+2𝑖𝑇𝑥𝑦). The variation of an operator 𝐴\nunderconformaltransformationsiseffectivelyencapsulatedbytheWard-Takahashi\nidentity:\n𝛿𝜖𝐴(𝑧,¯𝑧)=∮\n𝐶𝑧𝑑𝜁\n2𝜋𝑖𝜖(𝜁)𝑇(𝜁)𝐴(𝑧,¯𝑧). (1.48)\nThis equation implies that the variation of 𝐴(𝑧,¯𝑧)can be computed by applying\nthe product of 𝜖and the stress tensor 𝑇to𝐴, followed by performing a contour\nintegration around the point 𝑧. To facilitate this calculation, it is useful to express\nthe stress tensor through Laurent expansions:\n𝑇(𝑧)=∑︁\n𝑛∈Z𝑧−𝑛−2𝐿𝑛,¯𝑇(¯𝑧)=∑︁\n𝑛∈Z¯𝑧−𝑛−2¯𝐿𝑛.\nHere,𝐿𝑛and¯𝐿𝑛serve as the generators of conformal transformations and obey the\nVirasoro algebra, a cornerstone of CFT. The Virasoro algebra is given by:\n[𝐿𝑚,𝐿𝑛]=(𝑚−𝑛)𝐿𝑚+𝑛+𝑐\n12(𝑚3−𝑚)𝛿𝑚+𝑛,0, (1.49)\nwhere𝑐representsthecentralcharge,afundamentalcharacteristicoftheCFT.The\ncentral charge is a critical parameter that helps classify the universality class of\nthe theory. It provides an intuitive measure of the number of bosonic excitations\npresent: for instance, a theory with 𝑛decoupled free bosons has a central charge of\n𝑐=𝑛, while a theory with 𝑛decoupled fermions has 𝑐=𝑛/2.\nIn this framework using the stress tensor, the dilatation ˆ𝐷is defined as following:\nˆ𝐷=∮𝑑𝑧\n2𝜋𝑖𝑧𝑇(𝑧)+∮𝑑¯𝑧\n2𝜋𝑖¯𝑧𝑇(¯𝑧), (1.50)\n=𝐿0+¯𝐿0. (1.51)\nThe eigenvalues of 𝐿0and ¯𝐿0are conformal weights denoted as (ℎ,¯ℎ), and the\nscaling dimension 𝑥=ℎ+¯ℎbecomes indeed the eigenvalue of the dilatation.\n32Figure 1.7: The conformal mapping from a plane to a cylinder. The black and red\ndotted circles on the plane correspond to different time slices on the cylinder. As\na result, the scale translation indicated by the red arrow on the 𝑧-plane transforms\ninto a translation in imaginary time on the 𝑤-axis.\nThe intriguing aspect of dilatation in two-dimensional conformal field theory is\nthatitsgenerator, ˆ𝐷,canbereinterpretedasthegeneratoroftranslationinimaginary\ntime, denoted as ˆ𝐻𝑃, in a (1+1)-dimensional context. This relationship becomes\nevidentwhenconsideringtheconformalmapping 𝑤=𝐿\n2𝜋ln𝑧,asdepictedinFig.1.7.\nIn this mapping, the original 𝑧-plane is transformed onto a cylinder with circum-\nference𝐿. Thecylindercanbeviewedasaquantumsystemwithsize 𝐿andperiodic\nboundary conditions in one dimension. The translation in scale, represented by the\nred arrow on the left panel of Fig. 1.7, corresponds to a translation in time on the\ncylinder. Sincetheenergydensityinaquantumsystemisthediagonal 𝑡component\nofthestresstensor,itfollowsthattheenergyofafinitequantumsystemcanbecal-\nculated using ˆ𝐷. Conversely, if we know how the stress tensor 𝑇transforms under\nconformaltransformations,wecandeducethesystem’senergy. Thistransformation\nis known and is given by:\n𝑇(𝑧)=\u0012𝑑𝑤\n𝑑𝑧\u00132\n˜𝑇(𝑤)+𝑐\n12{𝑤,𝑧}, (1.52)\nwhere{𝑤,𝑧}is the Schwarzian derivative.\nThe Hamiltonian on the cylinder is then expressed as:\n𝐻𝑃=∫𝐿\n0𝑑𝑥\n2𝜋(𝑇cyl(𝑤)+𝑇cyl(𝑤))\n=2𝜋\n𝐿(𝐿0+𝐿0−𝑐\n12), (1.53)\n33yieldingtheenergy 𝐸𝑛=2𝜋\n𝐿(𝑥𝑛−𝑐\n12)[14,15]. Therefore,thescalingdimension/the\nenergy spectrum can be calculated from the energy spectrum of the transfer matrix\nin𝑦direction𝜆𝑖=𝑒−2𝜋(𝑥𝑖−𝑐\n12), being consistent with Eq. (1.46).\nIn lattice models, it is crucial to consider the contribution of bulk energy when\nanalyzingtheenergyspectrum. Thisconsiderationleadstothefollowingexpressions\nfor the energy spectrum:\n𝐸𝑛−𝐸0=2𝜋\n𝐿𝑥𝑛, (1.54)\n𝐸0=𝜖0𝐿−𝜋𝑐\n6𝐿. (1.55)\nHowever, a challenge arises in determining the central charge 𝑐due to the lack\nof a sufficient number of equations to separate the contribution of the bulk energy.\nTo address this, one can utilize the partition function from the previous RG step,\ndenoted as𝑍(𝑛−1):\n𝑍(𝑛−1)=Tr𝑥𝑖exp\u0010\n−2𝜋\u0010\n𝑥𝑖−𝑐\n12\u0011\n−𝜖0𝑏2𝑛−2\u0011\n. (1.56)\nFor the fixed-point tensor, it is reasonable to assume that both 𝑐and𝜖0remain\nconstant. Under this assumption, the central charge can be determined as follows:\n𝑐=6\n𝜋1\n𝑏2−1\u0010\n𝑏2ln𝜆(𝑛−1)\n0−ln𝜆(𝑛)\n0\u0011\n. (1.57)\nA widely used formula for calculating the central charge is given by [7]:\n𝑐=6\n𝜋\"\n𝑏2\n𝑏2−1\u0012\nln𝑍(𝑛−1)−ln𝑍(𝑛)\n𝑏2\u0013\n+ln𝜆(𝑛)\n0\n𝑍(𝑛)#\n. (1.58)\nIn the critical case, Eqs.(1.57) and (1.58) are equivalent since𝜆(𝑛)\n0\n𝑍(𝑛)=𝜆(𝑛−1)\n0\n𝑍(𝑛−1). How-\never,Eq.(1.58)maybecomeunstablewhenthesystemsizesurpassesthecorrelation\nlength. Inthisthesis,wehavecalculatedtheeffectivecentralchargeusingEq.(1.58).\nThroughthismethodology,weareabletoextractthecentralcharge,akeyparam-\neter in conformal field theory that characterizes the universality class of the model.\nThis approach enables a deeper understanding of the critical properties of lattice\nmodels,particularlyinthecontextoftensornetworkrenormalizationandfinite-size\nscaling theory.\n34How to read CFT dictionaries: Character\nTodeterminetheapplicabilityofaspecificConformalFieldTheory(CFT)toyour\nmodels,oneeffectiveapproachistoutilizetheconceptofthe’character’,atoolthat\nallowsyoutodeciphertheenergyspectrumofthemodel. Bycomparingtheenergy\nspectrumofyourmodelwithknownresultsinCFTliterature,youcanascertainthe\nuniversality class of the model in question. This method offers a practical solution\nto the often esoteric nature of CFT literature, facilitating its application to specific\nmodels.\nIn the previous section, we discussed how the partition function, excluding bulk\nenergy contributions, is expressed as:\n𝑍(𝐿,𝐿)=Tr exph\n−2𝜋(𝐿0+¯𝐿0−𝑐\n12)i\n, (1.59)\nwheretheeigenvalueof (𝐿0+¯𝐿0)correspondstothescalingdimension 𝑥𝑖. Thekey\ntakeaway is that the trace in Eq. (1.59) is calculated using the transfer matrix basis,\nmeaning the eigenvalues of the transfer matrix in the 𝑦-direction are predicted to\nbe𝑒−2𝜋(𝑥𝑖−𝑐\n12). For the partition function of a rectangular shape, such as 𝑍(𝐿,2𝐿),\nthe eigenvalue becomes 𝑒−4𝜋(𝑥𝑖−𝑐\n12), reflecting the squaring of eigenvalues due to\nthe double transfer distance. Moreover, the spectrum of 𝑍(2𝐿,2𝐿)is identical to\nthat of𝑍(𝐿,𝐿), and𝑍(2𝐿,4𝐿)mirrors𝑍(𝐿,2𝐿). This uniformity results from the\nscale-invariance inherent in CFT, with the shape ratio𝐿𝑦\n𝐿𝑥being the critical factor.\nTherefore, the partition function is often represented in CFT literature as:\n𝑍(𝑞)=Tr𝑞𝐿0−𝑐\n24¯𝑞¯𝐿0−𝑐\n24, (1.60)\nwhere𝜏=𝑖𝐿𝑦\n𝐿𝑥,𝑞=𝑒2𝜋𝑖𝜏, and ¯𝑞=𝑒−2𝜋𝑖𝜏∗. Here,𝜏is known as the modular\nparameter. Defining this parameter allows for the generalization of the partition\nfunction concept to parallelograms, as illustrated below:\n35Figure1.8: ThescalingdimensionsofthecriticalIsingmodelthatareobtainedfrom\nthe transfer matrix spectrum of Loop-TNR. The blue dotted line are the theoretical\nvalues from the character.\nWithperiodicboundaryconditionsonbothedges,thissetupequatestothepartition\nfunction on a torus, a phenomenon termed modular invariance. This principle\nimposes significant constraints on CFT. In the context of transfer matrix spectra,\nconsideringthespectrumonaparallelogramisinsightful,asEq.(1.60)encapsulates\ninformation about the conformal spin. This arises from the phase acquired by the\noperator due to momentum when the real part of 𝜏is non-zero. As depicted in\nFig. 1.7,this shift onthe plane correspondsto the additionalphase acquired during\noperator rotation around the origin. Here, we specifically address the case where\n𝜏=𝑖. For a broader understanding encompassing more generic cases, readers are\nencouraged to consult comprehensive CFT literature [3].\n\"An essential aspect to understand is that Eq.(1.60) possesses a universal form,\nand its specifics are precisely known for certain universality classes. For instance,\nthe partition function of the Ising CFT is expressed as:\n𝑍(𝑞)=|𝜒0(𝑞)|2+\f\f\f𝜒1\n16(𝑞)\f\f\f2\n+\f\f\f𝜒1\n2(𝑞)\f\f\f2\n. (1.61)\nHere,𝜒0(𝑞),𝜒1\n16(𝑞), and𝜒1\n2(𝑞)correspond to the excitations of the 𝐼,𝜎, and𝜖\nfamilies, respectively, and are known as characters. These characters often con-\ntain known quantities, allowing for the prediction of low-lying energies or scaling\n36dimensions. For the Ising model, the characters are as follows:\n𝑞𝑐/24𝜒0(𝑞)=1+𝑞2+𝑞3+2𝑞4+2𝑞5+···, (1.62)\n𝑞𝑐/24𝜒1\n16(𝑞)=𝑞1/16(1+𝑞+𝑞2+2𝑞3+2𝑞4+3𝑞5+···),(1.63)\n𝑞𝑐/24𝜒1\n2(𝑞)=𝑞1/2(1+𝑞+𝑞2+𝑞3+2𝑞4+2𝑞5+···). (1.64)\nBysubstitutingEqs.(1.62-1.64)intoEq.(1.60)andcomparingitwithEq.(1.59),we\ncan identify low-lying scaling dimensions from the exponents of 𝑞. For the Ising\nmodel, we obtain 𝑍(𝑞)=𝑞−𝑐/12(1+𝑞1/8+𝑞1+2𝑞9/8+4𝑞2+···), leading to the\nscaling dimensions 𝑥0,𝑥1,𝑥2,𝑥3,𝑥4,𝑥5,···=0,1\n8,1,9\n8,9\n8,2,···. This aligns with\nthe numerical results of the critical Ising model, as demonstrated in Fig. 1.8.\nIn a similar vein, by comparing the character of a potential universality class\nfrom CFT literature with your numerical data, you can accurately determine the\nuniversality class of an unknown phase transition in lattice models.\n37C h a pte r 2\nFINITE-SIZE AND FINITE BOND DIMENSION EFFECTS OF\nTENSOR NETWORK RENORMALIZATION\nIn this chapter, we introduce a comprehensive procedure aimed at extracting the\nrunning coupling constants denoted as 𝑔𝑛(𝐿)of the underlying field theory for\nclassical statistical models on two-dimensional lattices. This approach synergizes\nTNR with the finite-size scaling principles of CFT. Our methodology extends Gu\nand Wen’s analysis, originally focused on the transfer matrix spectrum of critical\nsystems, to encompass off-critical systems.\nIn systems away from criticality, the spectral properties exhibit a departure from\nscale invariance during the RG steps, deviating from the universal values charac-\nteristic of CFT. We propose that these deviations are indicative of the RG flow.\nBy meticulously analyzing these deviations, we can calculate the running coupling\nconstants with extremely high precision at each scale. This process enables us to\ntrack the evolution of these coupling constants through successive scales, thereby\noffering a detailed visualization of the RG flow. To demonstrate the efficacy of our\napproach,weapplyittoclassicallatticemodelssuchastheIsingandthree-statePotts\nmodels. This concept is also extended to determine the transition with extremely\nhigh precision.\nFurthermore, we explore the potential of utilizing the eigenvectors of the transfer\nmatrix to compute another critical component of CFT data: the OPE coefficients.\nThis advancement in our methodology allows us to derive a complete set of CFT\ndata from the TRG/TNR scheme. The ability to obtain both the running coupling\nconstantsandOPEcoefficientsmarksasignificantstepforwardinourunderstanding\nof these models, bridging the gap between tensor network approaches and the rich\ntheoretical framework of CFT.\nFinally,utilizingournewmethodology,werevealthelimitationsduetofinitebond\ndimension𝐷on TNR applied to critical systems. We find that a finite correlation\nlength is induced by the finite bond dimension in TNR, and it can be attributed\nto an emergent relevant perturbation that respects the symmetries of the system.\nThe correlation length shows the same power-law dependence on 𝐷as the \"finite\nentanglementscaling\"oftheMatrixProductStates. Usingthis,wecanestimatethe\n38errors arising from TRG/TNR scheme, which was unclear before.\nThe following sections mainly discuss the Ising and three-state Potts models on\nthe square lattice. The energy (classical Hamiltonian) of the Ising and three-state\nPotts models are\nE𝐼𝑠𝑖𝑛𝑔=−∑︁\n⟨𝑖,𝑗⟩𝜎𝑖𝜎𝑗−ℎ∑︁\n𝑖𝜎𝑖, (2.1)\nE𝑃𝑜𝑡𝑡𝑠=−∑︁\n⟨𝑖,𝑗⟩𝛿𝑠𝑖,𝑠𝑗, (2.2)\nwhere𝜎𝑖=±1(Ising) and𝑠𝑖=0,1,2(three-state Potts). The first terms and ℎrep-\nresentthenearest-neighborinteractionsandtheuniformmagneticfield. Employing\nthetemperature 𝑇,theBoltzmannweightisdefinedas 𝑒−E/𝑇,wherewesettheBoltz-\nmann constant to unity. Our primary focus in this chapter is the Ising model, while\nadetaileddiscussionofthethree-statePottsmodelisprovidedintheappendix. The\nIsing model reaches its critical point at (𝑇,ℎ)=(𝑇𝑐,0), where𝑇𝑐=2/ln(1+√\n2).\nAt this criticality, physical quantities like the spin-spin correlation function are\ngoverned by the Ising CFT, which comprises three primary operators: the identity\noperator𝐼, magnetic operator 𝜎, and energy operator 𝜖.\nIn the context of the lattice model, a shift from the critical temperature and the\napplication of a magnetic field correspond to the perturbative insertion of 𝜖and\n𝜎into the effective Hamiltonian. As a result, 𝜎is odd in the Z2spin-flip, while\n𝐼and𝜖are even. Given the operator structure of the CFT, certain quantities are\nconsequently fixed.\n2.1 Operator product expansion coefficients\nOperator product expansion is another fundamental concept in field theory and\nstatistical mechanics as explained in the previous chapter [16, 17]. Since OPE\ncoefficients determine the structure of the field theory, their computation is quite\nimportant. Numerical computation of OPE coefficients [18, 19] has not been so\nstraightforwardcomparedtothatofscalingdimensions. Here,wepresentasimpler\nway to compute them, which is applicable to TRG [6], HOTRG [20], and Loop-\nTNR [10].\nThe renormalized tensor 𝑇(𝑛)contracted in 𝑥-direction is a transfer matrix in the\n𝑦-direction. While the eigenvalues of the transfer matrix correspond to the energy\nor scaling dimension of the primary operators, the eigenvectors thereof are the\nwavefunctions of the corresponding “primary states” |𝜓𝑛(𝐿)⟩. This is graphically\n39𝜓𝛼𝜓𝛽,𝜓𝛾𝐶𝛼𝛽𝛾 22𝑥𝛽+2𝑥𝛾−𝑥𝛼𝐴𝛼𝛽𝛾/𝐴𝐼𝐼𝐼\n𝐼 𝜎,𝜎 1 0.8938\n𝜎 𝜎,𝐼 1 0.9473\n𝐼 𝜖,𝜖 1 0.9966\n𝜖 𝜖,𝐼 1 0.9968\n𝜖 𝜎,𝜎 0.5 0.5007\n𝜎 𝜎,𝜖 0.5 0.2705\nTable 2.1: The numerically obtained OPE coefficients of the Ising CFT from TRG.\nThe bond dimension and the system size are 𝐷=56and𝐿=16√\n2(9 RG steps),\nrespectively.\nrepresented below.\nNote that the tensor has been rotated for ease of viewing. We do not change the\ncontracted index. Likewise, we can compute the wavefunctions of the system size\n2𝐿as depicted below.\n|𝜓𝑛(𝐿)⟩and|𝜓𝑛(2𝐿)⟩are one-leg and two-leg tensors, respectively. Thus, we\nproposeanovelmethodforcalculatingOPEcoefficients,utilizingthecontractionof\neigenstatesderivedfromthetransfermatrixoftherenormalizedtensor. Specifically,\nthis method involves computing the overlaps between the states |𝜓𝛼(2𝐿)⟩and the\ntensor product|𝜓𝛽(𝐿)⟩⊗|𝜓𝛾(𝐿)⟩by contracting their respective indices. This\ncomputed quantity is directly proportional to the OPE coefficients. This approach\nalignswiththediscussionontheoverlapofquantumwavefunctionsinRef.[21–23].\nIn CFT, the overlap of wavefunctions, denoted as ⟨𝜓𝛼(2𝐿)|𝜓𝛽(𝐿)𝜓𝛾(𝐿)⟩, is pro-\nportionaltothe’pantsdiagram’ofpathintegrals. Thisrelationshipcanbeelucidated\nthrough a review of how eigenstates |𝜓𝑛(𝐿)⟩are expressed in CFT.\n40For the ground state, the process begins with a random initial state |𝜓𝑖𝑛𝑖⟩, which\nundergoes imaginary time evolution:\n|𝜓0⟩∝lim\n𝜏→∞𝑒−𝜏𝐻|𝜓𝑖𝑛𝑖⟩, (2.3)\nwhere the dominance of the smallest eigenvalue of the Hamiltonian after sufficient\nimaginary time evolution ensures the ground state is attained. To obtain primary\nstates corresponding to excited states, initial eigenstates are prepared, with state-\noperator correspondence in CFT allowing the creation of states by inserting the\ncorresponding operator into the vacuum. On a cylinder, these operators acquire\na prefactor\u0010\n2𝜋\n𝐿\u0011−𝑥𝑛, derived from Eq. (1.24). Additionally, an exponential factor\n𝑒2𝜋\n𝐿𝑥𝑛𝜏should be placed to ensure normalization relative to the ground state as in\nEq. (1.53) 1. Consequently, the eigenstate at the 𝜏=0slice is given by:\n|𝜓𝑛(𝐿)⟩=lim\n𝜏→−∞𝑒−2𝜋\n𝐿𝑥𝑛𝜏\u00122𝜋\n𝐿\u0013−𝑥𝑛\n𝜓𝑐𝑦𝑙\n𝑛(𝜏)|𝐼𝑐𝑦𝑙⟩, (2.4)\n=𝜓𝑛(−∞)|𝐼𝑐𝑦𝑙⟩.\nThisformulationappliesto |𝜓𝛽(𝐿)⟩and|𝜓𝛾(𝐿)⟩. Similarly,|𝜓𝛼(2𝐿)⟩isconstructed\nfrom the infinite future:\n|𝜓𝛼(2𝐿)⟩=lim\n𝜏→∞𝑒−𝜋\n𝐿𝑥𝛼𝜏\u0010𝜋\n𝐿\u0011−𝑥𝛼𝜓𝑐𝑦𝑙\n𝛼(𝜏)|𝐼𝑐𝑦𝑙⟩, (2.5)\n=𝜓𝛼(∞)|𝐼𝑐𝑦𝑙⟩.\nIn this setup, these three vectors meet at the 𝜏=0slice, forming the basis for the\n’pants diagram’ path integral representation. (It does look like a pair of pants!)\n1Inessence,Eq.(1.53)states 𝐸𝑛−𝐸0=2𝜋\n𝐿𝑥𝑛. Weimplementthefactorinadvancetocompensate\n𝑒−𝜏𝐻=𝑒−2𝜋\n𝐿𝑥𝑛𝜏.\n41Inthiscontext,theoverlapoftheeigenstatescanbeconceptualizedasathree-point\nfunction on the ’pants’ manifold:\n𝐴𝛼𝛽𝛾\n𝐴𝐼𝐼𝐼=⟨𝜓𝛼(∞)𝜓𝛽(−∞)𝜓𝛾(−∞)⟩𝑝𝑎𝑛𝑡𝑠, (2.6)\nwhere𝐴𝛼𝛽𝛾representstheoverlap ⟨𝜓𝛼(2𝐿)|𝜓𝛽(𝐿)𝜓𝛾(𝐿)⟩. Tocomputethisquantity,\na conformal mapping from the ’pants’ manifold to a plane is required. This type\nof mapping, common in string theory calculations for string interactions, is well-\nunderstood. The conformal mapping, known as the Mandelstam mapping [24], is\ndefined as:\n𝑧=𝐿\n2𝜋[ln(𝑤−𝑖)+ln(𝑤+𝑖)−2 ln(𝑤)], (2.7)\nwherethepoints 𝑧=−∞and𝑧=∞correspondto 𝑤=±𝑖and𝑤=0,respectively 2.\nThis mapping, which effectively stitches three cylinders to a plane after opening\nthem,callsfortheadditionalfactor (𝑑𝑤\n𝑑𝑧)𝑥𝑛tothecorrelationfunctionasinEq.(1.24).\nThus, Eq. (2.6) is transformed to:\n𝐴𝛼𝛽𝛾\n𝐴𝐼𝐼𝐼=|𝐽𝛼|𝑥𝛼|𝐽𝛽|𝑥𝛽|𝐽𝛾|𝑥𝛾⟨𝜓𝛼(0)𝜓𝛽(𝑖)𝜓𝛾(−𝑖)⟩𝑝𝑙𝑎𝑛𝑒, (2.8)\nwhere the three-point function is now evaluated on the plane. The prefactor 𝐽is\nderived from a combination of Eqs. (2.4-2.5) and the (𝑑𝑤\n𝑑𝑧)𝑥𝑛factor:\n|𝐽𝛼|=\f\f\f\flim\n𝑧→∞𝑒−𝜋\n𝐿𝑧\u0010𝜋\n𝐿\u0011−1\u0012𝑑𝑤\n𝑑𝑧\u0013\f\f\f\f\n𝑤→0, (2.9)\n|𝐽𝛽|=\f\f\f\f\flim\n𝑧→−∞𝑒−2𝜋\n𝐿𝑧\u00122𝜋\n𝐿\u0013−1\u0012𝑑𝑤\n𝑑𝑧\u0013\f\f\f\f\f\n𝑤→𝑖, (2.10)\n|𝐽𝛾|=\f\f\f\f\flim\n𝑧→−∞𝑒−2𝜋\n𝐿𝑧\u00122𝜋\n𝐿\u0013−1\u0012𝑑𝑤\n𝑑𝑧\u0013\f\f\f\f\f\n𝑤→−𝑖. (2.11)\nUpon evaluation, it is straightforward to verify that |𝐽𝛼|=1and|𝐽𝛽|=|𝐽𝛾|=1/2,\nand⟨𝜓𝛼(0)𝜓𝛽(𝑖)𝜓𝛾(−𝑖)⟩𝑝𝑙𝑎𝑛𝑒=2𝑥𝛼−𝑥𝛽−𝑥𝛾𝐶𝛼𝛽𝛾. Consequently, the relationship\nbetween the OPE coefficient and the overlap becomes:\n𝐴𝛼𝛽𝛾\n𝐴𝐼𝐼𝐼=2𝑥𝛼−2𝑥𝛽−2𝑥𝛾𝐶𝛼𝛽𝛾, (2.12)\n2The coefficients of the logarithmic of 𝑤terms correspond to the length of the string, whereas\nits sign is negative for the states in the infinite future. The sum of the prefactors should be zero so\nthat the total length of the strings from the infinite past is equal to that of the infinite future.\n42illustrating how the OPE coefficients are intimately connected to the eigenstate\noverlaps within the ’pants’ manifold framework. (For more generic cases, readers\nshall consult Ref. [21–23].)\nIn most cases, the identity operator denoted as 𝐼, corresponds to the ground state\nor equivalently the leading eigenvector. Thus, the OPE coefficients 𝐶𝛼𝛽𝛾can be\ncomputedfromtheratiooftheoverlap 𝐴𝛼𝛽𝛾and𝐴𝐼𝐼𝐼,giventhescalingdimensions\nfrom the transfer matrix. We benchmark our method by the critical Ising model.\nTable.2.1showsthenumericallyobtainedOPEcoefficientsbyTRG[6]at 𝐿=16√\n2\nand𝐷=56. Naturally, there are finite-size corrections to Eq. (2.12). Since\nEq. (2.12) is exact in the thermodynamic limit, using a very large system size 𝐿\nmightappeardesirable. However,aswewilldiscusslaterinSec.2.4,correctionsdue\nto the finite bond-dimension effect appear for system sizes larger than a correlation\nlength𝜉(𝐷)3. AsreportedinRef.[23],thefinite-sizeeffectsaresignificantfor 𝐶𝜎𝜎𝜖\nand𝐶𝜖𝜖𝐼. Nevertheless,evenwiththemoderatesize 𝐿=16√\n2,theobtainedvalues\n𝐶𝐼𝜖𝜖=0.9966and𝐶𝜖𝜎𝜎=0.5007are rather close to exact CFT results. While we\ntestedourmethodbythesimplestalgorithm,LevinandNave’sTRG,themethodfor\ncalculatingOPEisstraightforwardlyapplicabletootherTRGandTNRalgorithms,\nsuch as HOTRG [20].\n2.2 Precise determination of the transition temperature\nAswehavementionedearlier,theratiosofthetransfermatrixspectrumrepresent\nthe scaling dimension as𝜆𝑛\n𝜆0=exp(−2𝜋𝑥𝑛)at criticality after sufficient coarse-\ngraining. However,therescaledenergylevelsofalatticemodelgenerallydependon\nthesystemsize 𝐿,astheeffectiveHamiltonianofthesystemcontainsperturbations\ntotheCFT.Thisletsusdefineageneralizedconceptofthescalingdimension,which\ndepends on the system size. We denote it as “rescaled energy\" defined as\n𝜆𝑛(𝐿)\n𝜆0(𝐿)=exp(−2𝜋𝑥𝑛(𝐿)). (2.13)\nFigure2.1exhibits“therescaledenergy\"ofthefirstexcitedstateoftheIsingmodel,\ncorresponding to 𝑥𝜎. At the critical temperature, which we denote with a red\ndotted line, this scaling dimension consistently aligns with the expected value of\n1\n8, a characteristic feature of the Ising universality class in two dimensions. This\nconsistency is observed regardless of the variations in system size 𝐿.\n3Thiseffectisevenstrongerandnon-trivialforTRGduetotheCDLtensorsasdiscussedinthe\nprevious chapter.\n43Figure 2.1: The scaling dimension obtained from the first and second leading\neigenvalue of the transfer matrix of the Ising model as 𝑥𝜎(𝐿)=1\n2𝜋ln𝜆0\n𝜆1. At the\ncritical temperature, denoted by a red dotted line, the value is consistent with the\nscalingdimension1\n8regardlessofthesystemsizes. Awayfromcriticality,however,\nthe deviation from1\n8grows as𝐿increases.\nHowever, a notable shift in behavior occurs when the system deviates from the\ncritical temperature. This observed shift in the behavior of the rescaled energy\n𝑥𝜎(𝐿)is a key aspect of critical phenomena. In off-critical scenarios, 𝑥𝜎(𝐿)starts\nto diverge from its critical value of1\n8. Notably, as the system size 𝐿increases, this\ndeviationbecomesmoresignificant. Thistrendisnotjustasimpleanomaly;rather,\nitsignifiestheevolutionoftherunningcouplingconstants,denotedas 𝑔𝑛(𝐿),inthe\nsystem.\nThis relationship between the deviation in scaling dimensions and the running\ncoupling constants is deeply rooted in the theoretical framework combining pertur-\nbation theory with CFT. The perturbation theory, when applied within the context\nof CFT, provides a robust explanation for this phenomenon. It elucidates how the\nchanges in the system’s parameters, as it moves away from criticality, influence the\nrunning coupling constants and consequently, the scaling dimensions.\nFor a detailed exploration of this relationship and the underlying theoretical prin-\nciples, readers are directed to Sec. A.1 in the appendix. Here, we only use Cardy’s\nresults[14,15]. Therescaledenergylevelsinafinite-sizeperturbedCFTaregiven\n44as\n𝑥𝑛(𝐿)=𝑥𝑛+2𝜋∑︁\n𝑗𝐶𝑛𝑛𝑗𝑔𝑗(𝐿), (2.14)\nwhere𝑔𝑗(𝐿)scales as∝𝐿2−𝑥𝑗4. Comparing Eq. (2.13) from TNR and Eq. (2.14)\nfrom the conformal perturbation theory, we can obtain the running coupling con-\nstants𝑔𝑗(𝐿)at each scale from the finite-size effect 𝛿𝑥𝑛(𝐿)=𝑥𝑛(𝐿)−𝑥𝑛.\nAn immediate and practical application of our observations is the precise deter-\nmination of critical points. This approach, often referred to as ’level spectroscopy,’\nwas originally developed to address the complexities of the Berezinskii-Kosterlitz-\nThouless(BKT)transition,particularlynotedforitschallengesinstandardfinite-size\nscalinganalysis. Initially,thistechniquewasappliedtoquantumspinsystemsinone\ndimension, as demonstrated by Nomura in 1994 [25]. More recently we extended\nfor classical statistical systems in two dimensions using TNR [26].\nThecoreprincipleoflevelspectroscopyisthecarefulanalysisoftheenergylevels\noreigenvalues,particularlyhowtheyshiftandevolveasthesystemapproachesand\nmoves away from criticality. While this technique was conceived in the context of\nthe BKT transition, its basic concept is broadly applicable to more conventional\ntypes of critical phenomena, such as those observed in the Ising model.\nTheRGfixed-pointforthetwo-dimensionalIsingmodelhastworelevantoperators,\ntheenergydensity 𝜖andthemagnetizationdensity 𝜎. Thecouplingconstant 𝑔𝜖for\n𝜖isproportionaltothedeviationofthetemperaturefromthecriticalpoint,andalso\nscaled∼𝐿in the small coupling limit 𝑔𝜖≪1because𝑥𝜖=1. Thus\n𝑔𝜖(𝐿)∼𝛼(𝑇−𝑇𝑐)𝐿, (2.15)\nwhen𝑔𝜖(𝐿)≪ 1. Likewise, the coupling 𝑔𝜎is proportional to the magnetic field\nℎand scaled∼𝐿15/8because𝑥𝜎=1/8. When determining the critical point, we\nfocus on the critical temperature with zero magnetic fields, where 𝑔𝜎=0.\nAlthough the Ising critical phenomena are mostly described by the two relevant\ncouplingconstants 𝑔𝜖and𝑔𝜎,moreaccuratedescriptioncanbeobtainedbyinclud-\ning irrelevant perturbations. Including the leading irrelevant operators, namely the\n4The second term in Eq. (2.14) is the first-order perturbation term. In CFT, the unperturbed\neigenstates and perturbations correspond to the primary states and Φ𝑗. In this framework, the\ncorrections to the energy are expressed as ⟨𝑛|𝑔𝑗Φ𝑗|𝑛⟩, which yields the OPE coefficients 𝐶𝑛𝑛𝑗\n45irrelevant operators with the smallest scaling dimension permitted by the symme-\ntries, the effective Hamiltonian of the Ising model is described as following:\n𝐻=𝐻∗\n𝐼𝑠𝑖𝑛𝑔+∫𝐿\n0𝑑𝑥[𝑔𝜎𝜎(𝑥)+𝑔𝜖𝜖(𝑥)\n+𝑔𝑇2𝑇2\ncyl(𝑥)+𝑔¯𝑇2¯𝑇2\ncyl(𝑥)], (2.16)\nwhere𝑇cyland ¯𝑇cylare the holomorphic and anti-holomorphic parts of stress tensor\non a cylinder [15]. The holomorphic part 𝑇cylof the stress tensor on a cylinder is\nrelated to that on the infinite plane 𝑇𝑧𝑧(𝑧)via the conformal mapping 𝑧=𝑒2𝜋𝑤/𝐿,\nwhere𝑤=𝜏+𝑖𝑥and0≤𝑥 < 𝐿. More explicitly, 𝑇𝑧𝑧(𝑧)transforms as\n𝑇cyl(𝑤)=\u00122𝜋\n𝐿\u00132\u0010\n𝑧2𝑇𝑧𝑧(𝑧)−𝑐\n24\u0011\n. (2.17)\nThis leads to\n𝑇cyl(𝑥)=2𝜋\n𝐿 ∞∑︁\n𝑛=−∞𝐿𝑛𝑒2𝜋𝑖𝑥/𝐿−𝑐\n24!\n, (2.18)\nwhere𝑐isthecentralchargecharacterizingtheCFT,and 𝐿𝑛’saregeneratorsofthe\nVirasoro algebra defined by\n𝑇𝑧𝑧(𝑧)=∞∑︁\n𝑛=−∞𝐿𝑛\n𝑧𝑛+2, (2.19)\nintermsoftheholomorphicpart 𝑇𝑧𝑧oftheenergy-momentumtensorontheinfinite\nplane. Inserting the above 𝑇cyland integrating over 0≤𝑥 < 𝐿with an appropriate\nregularization, the 𝑔𝑇2-term of the perturbation is given as [27]\n∫\n𝑑𝑥𝑇2\n𝑐𝑦𝑙(𝑥)=𝐿2\n0−𝑐+2\n12𝐿0+2∞∑︁\n𝑛=1𝐿−𝑛𝐿𝑛+𝑐(22+5𝑐)\n2880\nOnly the first and second terms affect the energy levels, and the contributions\nto𝑥𝜎(𝐿)and𝑥𝜖(𝐿)are calculated to be −7\n768𝑔𝑇2and7\n48𝑔𝑇2respectively. The\ncomputation of the contributions from ¯𝑇2is exactly the same, and we denote their\nsum as𝑔. These operators are the leading irrelevant operators for the Ising model\nonthesquarelattice. Animportantaspecttoconsideristheoriginandimplications\nof the squared terms of the stress tensor on the cylinder, 𝑇2\ncyland ¯𝑇2\ncyl. These\nterms possess conformal spins of +4and−4, respectively. The presence of these\nconformal spins is significant because they lead to the breaking of continuous\nrotational symmetry, which is the breaking of Lorentz invariance in Minkowski\n46space-time. However,inthecontextofasquarelattice,whichonlypossessesdiscrete\n𝐶4rotational symmetry, the inclusion of these terms is permissible. The presence\nof𝑇2\ncyland ¯𝑇2\ncylservestoadjustthesymmetryofthecontinuumtheorytomatchthat\nof the discrete lattice model. Essentially, these ’irrelevant’ operators play a crucial\nroleinaligningthetheoreticalmodel’ssymmetrywiththeinherentsymmetryofthe\nsquare lattice. This aspect of conformal spin becomes particularly evident during\nodd-numberedRGsteps. Atthesestages,thelatticeundergoesa45-degreerotation,\nleadingtoasignchangeintheseoperators,asindicatedbythefactor (𝑒𝑖𝜋/4)4=−1.\nThisrotation-inducedsignchangehasobservableconsequences. Forinstance,when\nexamining finite-size corrections at criticality, we notice an alternating sign in the\ncorrections to the scaling dimension, 𝛿𝑥𝜎, at each RG step.\nIncluding the contributions from relevant perturbations, the resulting finite-size\ncorrections to 𝑥𝜎(𝐿)and𝑥𝜖(𝐿)are shown in Table. 2.2 5. While the exact critical\npoint is known for the Ising model on the square lattice, let us demonstrate the\ndetermination of the critical point from the TNR spectrum without using prior\nknowledgeofthecriticalpoint(bututilizingtheCFTdata,assumingthatweidentify\ntheuniversalityclass). Sinceweareinterestedinthecriticalpointatzeromagnetic\nfields, we can set 𝑔𝜎∝ℎ=0. The simplest way to determine the critical point\nis to look at the lowest rescaled energy level 𝑥𝜎(𝐿)in the lowest order of the\nrelevant coupling constant 𝑔𝜖, ignoring the irrelevant perturbation 𝑔. Within this\napproximation, the shift 𝛿𝑥𝜎(𝐿)=𝑥𝜎(𝐿)−𝑥𝜎vanishes at the critical point 𝑇=\n𝑇𝑐where𝑔𝜖=0. Away from the critical point, 𝛿𝑥𝜎(𝐿)is non-zero and grows\nproportionally to 𝐿because𝑔𝜖(𝐿)scales as𝐿. Because of this, we can identify\nthe critical point with the temperature where 𝛿𝑥𝜎(𝐿)=0is observed in the TNR\nspectrum. However, this estimate suffers from the corrections due to the leading\nirrelevant perturbations 𝑇2\ncyland ¯𝑇2\ncyl. Since they have scaling dimension 4, the\ncorrespondingcouplingconstantisrenormalizedas 𝑔∝𝐿−2. Thisleadstoanerror\nof𝑂(𝐿−2)in the naive estimate of the critical point using 𝛿𝑥𝜎(𝐿)=0.\nWe can improve the accuracy by removing the effects of the leading irrelevant\nperturbation 𝑔. This can be done by combining the shifts of the rescaled energy\nlevels𝛿𝑥𝜎(𝐿)and𝛿𝑥𝜖(𝐿)following Table. 2.2 as\n𝛿𝑥cmb≡𝛿𝑥𝜎(𝐿)+1\n16𝛿𝑥𝜖(𝐿)\n=𝜋𝑔𝜖+(𝛼𝜎\n𝜎+1\n16𝛼𝜎\n𝜖)𝑔2\n𝜎+(𝛼𝜖\n𝜎+1\n16𝛼𝜖\n𝜖)𝑔2\n𝜖. (2.20)\n5As𝑇2\ncyland ¯𝑇2\ncylare not primary operators, we need to pay special attention.\n47Figure2.2: ExampleofestimatingthetransitiontemperatureusingLoop-TNR.We\nset𝑇−=2.66and𝑇+=2.68as an initial estimate. The level-crossing temperature\n𝑇∗(𝐿)is linearly fitted to extrapolate the transition temperature. The insert shows\nhow we compute 𝑇∗(𝐿)for various system sizes.\nNotethatthefirst-ordercorrectionintheirrelevantcoupling 𝑔iscanceledout. Now\nwe can identify the critical point by finding the temperature for which 𝛿𝑥cmb∝\n𝑔𝜖(𝐿)=0. Having eliminated the effects of the leading irrelevant perturbation\n𝑇2\ncyl,¯𝑇2\ncyl, the dominant error is now caused by the next-leading irrelevant operator\nwith scaling dimension 6and thus should be scaled as 𝐿−4.\nIn practice, the determination of the critical point can be efficiently implemented\nas follows. First, we pick up one temperature from each phase: 𝑇+> 𝑇𝑐and\n𝑇−<𝑇𝑐, and calculate the combined shift 𝛿𝑥cmbat these temperatures. The phase\nofthesystemcanbeconfirmedbyobservingthegrowthof 𝛿𝑥cmbasthesystemsize\nincreasesbecauseitincreases/decreasesifthesystemisinthehigh-temperature/low-\ntemperature phase (if the initial choice of the temperature turns out to be wrong,\nchange the temperature and restart the process). Next, linear interpolations of the\ncombined shift between the two temperatures 𝑇±are made, and the crossing of\nthe lines for system sizes 𝐿and√\n2𝐿is found, as shown in the insert of Fig. 2.2.\nWe denote the temperature where the two lines cross as 𝑇∗(𝐿). Because of the\nsecond-order contribution 𝑂(𝑔𝜖2)in Eq. (2.20), the crossing temperature 𝑇∗(𝐿)\nobtained by the linearinterpolation deviates from the true critical point 𝑇𝑐as\n48model operator Rescaled energy level\nIsing model 𝑥𝜎(𝐿)1\n8+𝛼𝜎\n𝜎𝑔2\n𝜎+𝜋𝑔𝜖+𝛼𝜖\n𝜎𝑔2\n𝜖−7\n768𝜋𝑔\n𝑥𝜖(𝐿) 1+𝛼𝜎\n𝜖𝑔2\n𝜎+𝛼𝜖\n𝜖𝑔2\n𝜖+7\n48𝜋𝑔\nTable 2.2: The finite-size scaling dimension of the Ising model. 𝛼is a constant\ndetermined from the second-order perturbation. Since 𝑔𝑇2and𝑔¯𝑇2decay in the\nsame manner, we write them as 𝑔.\n𝑇∗(𝐿)−𝑇𝑐∝𝑔𝜖∝𝐿, when𝑔𝜖≪16. The critical point 𝑇𝑐is estimated by fitting\n𝑇∗(𝐿)byalinearfunctionof 𝐿as𝑇∗(𝐿)∼𝑇𝑐+const.𝐿. Whilethe“extrapolation”\nto𝐿=0used here might look unusual, this procedure is done to remove the\neffect of the nonlinearity due to 𝑂(𝑔𝜖2)in Eq. (2.20), and the condition 𝛿𝑥cmb=0\nitself is accurate for 𝑇𝑐up to the error of 𝑂(𝐿−4)due to the next-leading irrelevant\nperturbations. An example of the estimate of 𝑇𝑐with the above procedure with\nthe choice of the temperatures 𝑇+=2.68and𝑇−=2.66and with system sizes\n16≤𝐿 < 64is depicted in Fig. 2.2. The final estimate of the critical point is\n𝑇est\n𝑐=2.269177. Remarkably, even with the choice of two temperatures differ by\n10−2and the relatively low bond-dimension 𝐷=20, the estimated critical point is\nquiteaccurate: 𝑇est\n𝑐−𝑇𝑐=−8.11×10−6. Thisisthankstothesuppressionoftheerror\nto𝑂(𝐿−4)by eliminating the contributions from the leading irrelevant operators.\nOnce the critical point is estimated with good accuracy with this procedure, the\naccuracy can be further improved by choosing 𝑇±closer to the estimated critical\ntemperature and then applying the same procedure.\n2.3 Renormalization group flow\nThe comparison between the TNR spectrum in Eq. (2.13) and the conformal per-\nturbationtheoryinEq.(2.14)canalsobeusedtoextractrunningcouplingconstants\nand their scale dependence, enabling visualization of the RG flow. This analysis\nwill be particularly useful in investigating the effects of finite bond dimensions in\ndetail, a topic we plan to explore comprehensively in Sec. 2.4.\nFor the Ising model, the extraction of running coupling constants is based on\nobserving shifts in the rescaled energy levels, as detailed in Table 2.2. It is also\nbeneficial to consider the combined shift as described in Eq. (2.20). Given that 𝑔𝜎\nand𝑔𝜖aresmallnearthecriticality,wesimplifyourcalculationsbyneglecting 𝑔2\n𝜖for\n6It is proportional to 𝐿2−𝑥thermal, where𝑥thermalis the scaling dimension of the thermal operator.\n49Figure 2.3: (Left panel) The system size dependence of 𝛿𝑥cmb=𝛿𝑥𝜎+𝛿𝑥𝜖/16for\nℎ=±10−5(purple and green), 𝑇=1.0001𝑇𝑐(red) and𝑇=0.9999𝑇𝑐(blue). The\npurple and green dots are on top of each other, and “ +\" denotes the data with a\nnegative sign. After removing the 𝐿−2irrelevant perturbations, the next leading\n𝐿−4perturbation shown with a blue dotted line appears. The data was obtained\nvia Loop-TNR with a bond dimension of 𝐷=24, which was deemed sufficient\nfor the finitely-correlated systems being considered. (Right panel) The resulting\nrenormalization group flow. Only data after six steps are exhibited, where the 𝐿−4\nperturbations disappear.\nℎ=0. Consequently, we redefine two relevant coupling constants for convenience:\n𝑔𝑡=𝜋𝑔𝜖and𝑔ℎ=√︃\n(𝛼𝜎𝜎+1\n16𝛼𝜎𝜖)𝑔𝜎. In this way, the combined shift Eq. (2.20)\nsimplygives 𝑔𝑡whenℎ=0and𝑔ℎ2when𝑇=𝑇𝑐,inthelowestorderof 𝑔𝑡,𝑔ℎ. Using\nthese relations, we can read off the relevant coupling constants 𝑔𝑡or𝑔ℎfrom the\nTNRdata,asshowninFig.2.3( 𝑏). Aswehavediscussedintheprevioussubsection,\ntheeffectsoftheleadingirrelevantperturbations 𝑇2\ncyl,¯𝑇2\ncylwithscalingdimension 4\nareeliminatedinthecombinedshiftEq.(2.20),andthusthefinite-sizecorrectionis\nnowof𝑂(𝐿−4),duetothenext-leadingirrelevantoperatorswithscalingdimension\n6. This𝑂(𝐿−4)scaling is indeed observed in Fig. 2.3 near the critical point for\nsmall system size 𝐿when relevant perturbations are still negligible. Since it is safe\nto say that these contributions disappear after five RG steps, we can conclude that\nthe origin of 𝑔𝑡and𝑔ℎare purely from 𝜖and𝜎after six steps.\nThe right panel illustrates the scale-dependence of the coupling constants 𝑔𝑡and\n𝑔ℎ. ItisnothingbuttheRGflowoftheIsingcriticalpoint,andweconcludethatwe\nsucceed in calculating the RG flow of the celebrated Ising fixed-point.\n50There is one thing to note on the left panel of Fig. 2.3. While the combined\nshift (2.20), which is an estimator for |𝑔ℎ|2, scales as𝐿3.75at𝐿 < 103, it starts to\nflatten and scales as 𝐿at𝐿 > 103. This behavior has a rather simple origin. Since\nthe magnetic perturbation is relevant, the system has a finite correlation length or\nequivalently, a non-zero gap Δ. This implies that the rescaled energy levels are\nproportional to 𝐿for sufficiently large system size 𝐿≫Δ−1. As a consequence,\nthe shift Eq. (2.20) also grows proportionally to 𝐿. In this regime, the conformal\nperturbationtheorybreaksdown(higher-ordercontributionsareimportant),andwe\nnolongeridentifytheshiftEq.(2.20)with |𝑔ℎ|2. Thisshouldbedistinguishedfrom\nthe𝐿-linear behavior of the combined shift Eq. (2.20) observed for 𝐿 > 10with\nℎ=0and𝑇≠𝑇𝑐, which corresponds to the renormalization of 𝑔𝑡∝𝐿because of\n𝑥𝜖=1. The𝐿-linear behavior due to the gap is observed in the non-perturbative\nregime𝛿𝑥𝜖,𝜎≫𝑥𝜖,𝜎, whereas the 𝐿-linear behavior due to the scaling is observed\nin the perturbative regime 𝛿𝑥𝜖,𝜎≪𝑥𝜖,𝜎.\n2.4 Finite bond-dimension effects\nLet us examine the impacts of a finite bond-dimension 𝐷on TNR from the per-\nspective of our method. In any computation that employs tensor networks, it is\nnecessary to restrict the bond dimension to a finite value 𝐷due to the increasing\nstorage requirements and computational costs associated with larger bond dimen-\nsions. Thefinitenessofthebonddimensioninevitablyleadstoalossofinformation\nineachstepofrenormalizationafteracertainnumberofiterations. AlthoughTNR\ncannominallyhandlearbitrarylargesystems,andtheTNR-typecalculationsareof-\ntenusedtostudyextremelylargesystems,wehavetobecarefulaboutthelimitations\ndue to the finite bond dimension.\nThelimitationofthefinitebonddimension 𝐷onthematrixproductstate(MPS)is\ncharacterizedbythefinite(maximum)correlationlength 𝜉(𝐷)oftheMPS[28–30].\nThe correlation length of MPS is known to obey the scaling law\n𝜉(𝐷)∼𝐷𝜅, (2.21)\n𝜅=6\n𝑐(1+√︃\n12\n𝑐). (2.22)\nWhile the TNR-type calculation of two-dimensional statistical systems appears\nrather different from the MPS applied to one-dimensional quantum systems, the\nemergenceofthefinitecorrelationlength 𝜉(𝐷)obeyingthesimilarscalinglaw(2.21)\nwasreportedinRef.[31]foraHOTRGcalculationofthecriticalIsingmodelintwo\n51Figure 2.4: Shift|𝛿𝑥𝜎(𝐿)|for the Ising model at 𝑇=𝑇𝑐,ℎ=0computed by Loop-\nTNR with𝐷=32. There is little finite- 𝐷effect for small system sizes 𝐿 < 256.\nThe emergent perturbations of 𝜖and𝜎appear at𝐿∼256and𝐿∼104, scaling\nas𝐿and𝐿15/4. The induced gap by finite- 𝐷goes towards constant at 𝐿 > 105as\ndenoted with the purple dotted line.\ndimensions. Theexponent 𝜅fortheIsingmodelwasestimatedtobeapproximately\n2,whichisclosetotheMPSexponent(2.22) 𝜅=2.03425...fortheIsingCFTwith\ncentral charge 𝑐=1/2. A similar emergence of the finite correlation length 𝜉(𝐷)\nwas also reported in our TNR finite-size scaling study of the two-dimensional XY\nmodel [26], with the MPS exponent (2.22) for 𝑐=1.\nIn the following, using our TNR finite-size scaling methodology, we will demon-\nstrate that the emergence of the finite correlation length due to the finite bond\ndimension in TNR can be attributed to an emergent relevant perturbation. Further-\nmore, we present evidences for the scaling (2.21) with the MPS exponent (2.22) in\nTNR of Ising and three-state Potts models.\nEmergent relevant perturbation\nIfafinitecorrelationlengthemergesintheTNR,itwouldbenaturaltoidentifythe\nrenormalizedtensorwithaHamiltonianforthesystemawayfromthecriticalpoint,\n52that is, an RG fixed-point (CFT) Hamiltonian perturbed with relevant operators\n𝐻FB(𝐷)=𝐻∗\nCFT+∑︁\n𝑖∫𝐿\n0𝑑𝑥𝑔𝑖(𝐷,𝐿)Φ𝑖(𝑥,𝐷), (2.23)\nwhere𝐻𝐹𝐵istheeffectiveHamiltonianofthefinite- 𝐷systemandΦ𝑖(𝑥,𝐷)arethe\nscaling operators representing the perturbations. In this view, we expect relevant\nperturbations to emerge in order to mimic the finite correlation length imposed by\nthe finite bond dimension.\nTo demonstrate the emergence of the relevant perturbation, we investigate the\nsystem-size dependence of the shift in the rescaled energy levels 𝛿𝑥𝜎. In Fig. 2.4,\nwe show the absolute value of the shift |𝛿𝑥𝜎|as a function of the system size 𝐿\nusedincalculatingthetransfermatrixspectruminTNRexactlyatthecriticalpoint\nℎ=0,𝑇=𝑇𝑐. The conformal perturbation theory in Eq. (2.14) implies that the\nshift𝑥𝜎contains contributions from the irrelevant perturbations. Since the leading\nirrelevant operators at the critical points are 𝑇2\ncyland ¯𝑇2\ncylwith scaling dimension\n4, we expect𝛿𝑥𝜎(𝐿)decays as𝐿−2. (This is to be contrasted with Eq. (2.20) and\nFig.2.3,inwhichthecontributionsfrom 𝑇2\ncyland ¯𝑇2\ncylareeliminated.) Theexpected\n𝐿−2behaviorintheshift 𝛿𝑥𝜎(𝐿)isindeedobservedforsmallsystemsizes 𝐿 <256.\nFor larger system sizes, however, |𝛿𝑥𝜎(𝐿)|starts to increase, deviating from the\nconformal perturbation theory scaling 𝐿−2. We identify the finite bond-dimension\n𝐷effects as the origin of this deviation. More remarkably, we can observe a clear\nscaling behavior of the deviation. That is, the shift |𝛿𝑥𝜎(𝐿)|scales with the system\nsizes as𝐿and𝐿15/4for256< 𝐿 < 104and104< 𝐿, respectively. Compared with\nthe off-critical cases in Fig. 2.3, we realize that these scalings are identical to those\ninduced by the thermal and magnetic perturbations. In other words, the relevant\nperturbations emerge in the TNR calculation.\nLet us first discuss the 𝐿15/4scaling of the shift, observed for 𝐿 > 104. This\ncan be understood as the effect of an emerging magnetic perturbation ℎbecause its\nsecondorderperturbationscalesas 𝑔2\n𝜎∝𝐿15/4. Althoughthemagneticperturbation\nℎis forbidden by the Z2spin-flip symmetry, the symmetry could be broken by the\nlimitations in the machine precision. Once the spin-flip symmetry is broken, the\nmagnetic field ℎ, which is a relevant perturbation, is effectively generated. Even if\ntheeffectivemagneticfield ℎisextremelysmall,itwillbeenhancedateachRGstep\nand eventually dominate the system at sufficiently large length scales. This is what\nwe observe for 𝐿 > 104. This phenomenon should be related to machine precision\n53andnotintrinsictothealgorithm. Ifweareinterestedina Z2symmetricsystem,we\ncan impose the symmetry at each step of TNR in order to avoid this effect.\nIncontrast,the 𝐿scalingobservedfor 256< 𝐿 < 104ismoreintrinsic. Themost\nrelevantperturbationallowedunderthe Z2symmetrytothecriticalIsingfixed-point\nisthethermaloperator. Thus,weexpectthatthefinitebonddimensioneffectcanbe\nmimickedbythethermalperturbation 𝜖tothefixed-pointHamiltonian 𝐻∗\nCFT. Ifthis\nisthecase,theeffectivecoefficient 𝑔𝜖growsproportionallyto 𝐿asthesystemsize 𝐿\nisincreased,becausethethermaloperator 𝜖hasthescalingdimension 1. According\nto Eq. (2.14), this will lead to a correction proportional to 𝐿in the rescaled energy\nlevel𝛿𝑥𝜎(𝐿). This is indeed supported by the numerical result shown in Fig. 2.4.\nIngeneral,thefinite- 𝐷effectinTNRwouldbedescribedintermsoftheemergence\nof relevant perturbation(s) to the fixed-point Hamiltonian, which induces the finite\ncorrelation length 𝜉(𝐷). In addition to the emergence of the relevant operator 𝜖in\nthecriticalIsingmodeldiscussedabove,asimilaremergenceoftherelevantoperator\nisobservedinthecriticalthree-statePottsmodel,asdemonstratedinAppendixA.2.\nScaling of the emergent correlation length\nNowletusdemonstratethatthefinitecorrelationlength 𝜉(𝐷)inducedbythefinite\nbonddimension 𝐷inTNRobeysthesamescaling(2.21)and(2.22)asintheMPS,\nas suggested in Refs. [26, 31].\nIn Fig. 2.5, we demonstrate the scaling of the correlation length induced by the\nfinite bond dimension in TNR of the critical Ising and the three-state Potts models.\nIn Fig. 2.5(a), we plot the shift 𝛿𝑥𝜎in the Ising model obtained by the TNR of\nthe Ising model at the critical point, which was also studied in Fig. 2.4, with the\nseveral different bond dimensions 𝐷=4,..., 28. Here, we rescaled the vertical\naxis as𝐿2𝛿𝑥𝜎so that the constant behavior is observed for system size smaller\nthanthecorrelationlength,wheretheleadingirrelevantperturbation(whichcauses\n𝛿𝑥𝜎∝𝐿−2) is dominant. The deviation from the constant at larger system sizes\n𝐿can be attributed to the emergent relevant perturbation 𝜖induced by the finite\nbond dimension 𝐷, as discussed in the previous subsection. This is confirmed\nby the𝐿3scaling (𝐿2times𝛿𝑥𝜎∝𝑔𝜖∝𝐿). Most importantly, the horizontal\naxis is the rescaled system size 𝐿/𝜉(𝐷)using the hypothesized correlation length\n𝜉(𝐷)=𝑎𝐷𝜅given by Eqs. (2.21) and (2.22). The collapse of the data for different\nbond dimensions strongly supports our hypothesis on the correlation length. Note\nthat we roughly fit the prefactor 𝑎so that the cross-over occurs at 𝐿=𝜉(𝐷).\n54Figure 2.5:(𝑎)The scaling of the shift 𝛿𝑥𝜎in TNR of the Ising model at the\ncritical point, for various bond dimensions 𝐷=4,..., 28. The vertical axis is\nscaled as𝐿2𝛿𝑥𝜎so that it is constant when 𝐿≪𝜉(𝐷). When𝐿≪𝜉(𝐷), the\nshift is dominated by the emergent relevant perturbation 𝜖; this is confirmed by the\nscaling𝐿2𝑔𝜖∝𝐿3. The horizontal axis is scaled as 𝐿/𝜉(𝐷), where the correlation\nlength𝜉(𝐷)is hypothesized as in Eqs. (2.21) and (2.22). The collapse of the\ndata for different bond dimensions is strong evidence of the hypothesized scaling\nof the correlation length 𝜉(𝐷). The blue dotted line indicates 𝐿/𝜉(𝐷)=1. We\nset𝜉(𝐷)=2.0𝐷𝜅so that𝐿/𝜉(𝐷)=1becomes the crossover scale between the\nfinite-size scaling regime and the finite- 𝐷scaling regime.(𝑏)Similar scaling\nanalysis of the shift 𝛿𝑥𝜖in TNR of the three-state Potts model at the critical point,\nfor various bond dimensions 𝐷=16,..., 40with𝜉(𝐷)=0.067𝐷𝜅. The scaled\nshift𝐿0.8𝛿𝑥𝜖behaves as a constant in the finite-size scaling regime 𝐿/𝜉(𝐷)<1,\nwhereas it scales as 𝐿3.2in the finite- 𝐷scaling regime 𝐿/𝜉(𝐷)>1, as expected\nfrom the CFT analysis (see Appendix A.2 for details). The data for different\nbond dimensions collapse again, giving compelling evidence for the scaling of the\ncorrelation length (2.21) and (2.22)\nInordertoconfirmthefinite- 𝐷scalingofthecorrelationlengthanditsuniversality,\nwehavealsostudiedthethree-statePottsmodelatthecriticalpoint. Asanexample,\nin Fig. 2.5(b), we plot the shift of the rescaled energy level corresponding to the\nenergy operator 𝜖in the three-state Potts model. For this shift 𝛿𝑥𝜖, the contribution\nfromtheleadingirrelevantoperatoris ∼𝐿−4/5,andthedominantcontributionfrom\nthe emergent relevant perturbation 𝜖is expected to be proportional to 𝑔𝜖2∝𝐿12/5.\n(See Appendix A.2 for details). We rescaled the vertical axis as 𝐿0.8𝛿𝜖so that it is\nconstantinthefinite-sizescalingregime 𝐿 <𝜉(𝐷). Thehorizontalaxisisagainthe\n55rescaledsystemsize 𝐿/𝜉(𝐷),withthecorrelationlength 𝜉(𝐷)definedinEqs.(2.21)\nand (2.22) with the central charge 𝑐=4/5for the three-state Potts model. The data\nfordifferentbonddimensionsagainshowacollapse,providingcompellingevidence\nfor our hypothesis on the correlation length scaling. For 𝐿/𝜉(𝐷)>1, the data fits\nwell the expected behavior 𝐿0.8×𝑔𝜖2∝𝐿0.8×𝐿2.4=𝐿3.2.\n56C h a pte r 3\nTENSOR NETWORK REPRESENTATION OF FIXED-POINT\nTENSORS\nTNR, while a powerful tool in the study of critical phenomena, encounters lim-\nitations when dealing with systems at criticality. A key challenge arises from the\nemergence of finite correlation lengths, which inherently restrict the effectiveness\nof TNR in capturing the true nature of the critical point. This limitation is com-\npounded by the practical inability to simulate an infinite bond dimension ( 𝐷=∞),\neffectively creating a sort of ’no-go theorem’ for TNR in accurately obtaining the\ntrue fixed-point tensor.\nFixed-point tensors, being invariant under RG transformations, are expected to\nexhibitcertaindistinctproperties. RecognizingtheconstraintsofTNRatcriticality,\nwe propose in this chapter an analytical approach aimed at uncovering the tensor\nelements of these fixed-point tensors. This method is designed to complement the\nRG techniques employed in tensor networks.\nOur approach leverages analytical methods to probe deeper into the structure of\nfixed-point tensors, enabling us to bypass some of the limitations posed by finite\ncorrelation lengths and finite bond dimensions. By analytically determining the\ntensor elements of fixed-point tensors, we aim to provide a more comprehensive\nunderstanding of the behavior of systems at criticality. This method not only\nenhances our ability to study critical phenomena using tensor networks but also\ncontributes to a more nuanced understanding of the universal properties associated\nwith RG fixed points.\n3.1 Fixed-point tensor\nTo simulate two-dimensional statistical models, we use the tensor network meth-\nods, where the local Boltzmann weight is represented as a four-legged tensor 𝑇(0).\nWeobtainthetransfermatrixinthe 𝑦-directionifwecontract 𝐿copiesofthefour-leg\ntensorsalongacircleinthe 𝑥-direction;weobtainthepartitionfunction 𝑍(𝐿,𝑇(0))\nif we contract 𝐿×𝐿copies along the torus in the 𝑥,𝑦-directions. In practical sim-\nulations, the exact contraction of two-dimensional tensor networks is notoriously\nchallenging, often proving to be exponentially hard. To address this, we consider a\n57tensor RG map that effectively coarse-grains the local tensors, as illustrated below:\nIntheinitialRGstep,weapplytheRGmaptotheoriginalBoltzmanntensor,denoted\nas𝑇(0), to yield𝑇(1). Subsequently, 𝑇(1)is used to generate the next tensor in the\nsequence. ThisRGmapisdesignedtoensurethattherenormalizedtensorremainsa\nclose approximation of theoriginal tensor group, while selectively discarding local\nentanglement. While the specifics of the technical implementation vary depending\non the chosen algorithms, it is established that 𝑇(𝑛)converges to a universal tensor,\n𝑇∗,atcriticalpoints. Thisuniversallyconvergenttensor, 𝑇∗,isreferredtoastheFP\ntensor. ItssignificanceliesinitscloseassociationwiththeRGfixed-point,reflecting\ntheunderlyingprinciplesofscaleinvarianceanduniversalityintherenormalization\ngroup theory.\nIf the original tensor 𝑇(0)hasD4symmetry(reflection and 𝜋/2rotation),𝑇∗also\nrespectsit. ThisallowsthedecompositionoftheFPtensorintoapairoftwoidentical\nthree-leg tensors 𝑆∗:\n(3.1)\nThe FP tensor 𝑇∗has gauge degrees of freedom that change the basis of each leg.\nThe insertion of the gauge transformation (unitary operators) does not change the\nspectral property of the FP tensor. In the following, we fix the gauge so that each\nindexoftheFPtensorislabeledbytheeigenstatesoftheHamiltonian 𝐿0+¯𝐿0ona\ncylinder,where 𝐿𝑛(¯𝐿𝑛)arethestandardgeneratorsoftheleft-moving(right-moving)\nVirasoro algebras. By the state-operator correspondence, we can label these states\nbyasetofoperators 𝜙𝛼,amongwhichwewillfindtheidentityoperator 𝜙1withthe\nlowest scaling dimension 1. In tensor-network representations, the projector to this\n1Note that the label 𝛼refers to both the primaries and the descendants of the Virasoro algebra.\n58basis can be found by diagonalizing the transfer matrix as follows [7]:\n(3.2)\nIn the following, we choose the states 𝛼,𝛽,...to be primary operators.\n3.2 Main results\nLet us now state the main results of this chapter. First, the three-leg tensor 𝑆∗\nis proportional to the three-point functions of the FP CFT on the complex plane\ndenoted as pl:\n𝑆∗\n𝛼𝛽𝛾\n𝑆∗\n111=⟨𝜙𝛼(−𝑥𝑆)𝜙𝛽(𝑖𝑥𝑆)𝜙𝛾(0)⟩pl. (3.3)\nSecond,thefour-legFPtensordeterminesthefour-pointfunctionsoftheFPCFTas\n𝑇∗\n𝛼𝛽𝛾𝛿\n𝑇∗\n1111=⟨𝜙𝛼(−𝑥𝑇)𝜙𝛽(𝑖𝑥𝑇)𝜙𝛾(𝑥𝑇)𝜙𝛿(−𝑖𝑥𝑇)⟩pl. (3.4)\nTheseequalitiesholdwhenwechoosethevalues 𝑥𝑆=𝑒𝜋/4and𝑥𝑇=𝑒𝜋/2/2.𝑥𝑆and\n𝑥𝑇are just numbers. Do not confuse them with scaling dimensions.\nWe can now reproduce the fulldefining data for the FP CFT. Recall that we can\nextract the scaling dimensions 𝑥𝛼operators from Eq. (3.2). The remaining data is\nthe OPE coefficients 𝐶𝛼𝛽𝛾of the operators 𝜙𝛼, which can be extracted by applying\na conformal transformation to Eq. (3.3):\n𝑆∗\n𝛼𝛽𝛾\n𝑆∗\n111=𝐶𝛼𝛽𝛾\n𝑥𝑥𝛽+𝑥𝛾−𝑥𝛼\n𝑆𝑥𝑥𝛾+𝑥𝛼−𝑥𝛽\n𝑆(√\n2𝑥𝑆)𝑥𝛼+𝑥𝛽−𝑥𝛾,\n=2𝑥𝛾𝐶𝛼𝛽𝛾\n(√\n2𝑥𝑆)𝑥𝛼+𝑥𝛽+𝑥𝛾. (3.5)\nEquation(3.1)representstheequivalenceoftwodifferentdecompositions( 𝑠-and\n𝑡-channels) of the four-point function into a pair of three-point functions, i.e. the\ncelebrated crossing relation of the CFT.\n59To better understand Eqs. (3.3-3.4), we apply conformal transformations to the\ntwo equations to obtain\n𝑆∗\n𝛼𝛽𝛾\n𝑆∗\n111=𝑒−𝜋\n4(𝑥𝛼+𝑥𝛽+𝑥𝛾)⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(0)⟩pl, (3.6)\n𝑇∗\n𝛼𝛽𝛾𝛿\n𝑇∗\n1111=\u0012𝑒𝜋\n2\n2\u0013−𝑥tot\n⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(1)𝜙𝛿(−𝑖)⟩pl, (3.7)\nwhere𝑥tot≡𝑥𝛼+𝑥𝛽+𝑥𝛾+𝑥𝛿.\nEquations(3.6-3.7)naturallyarisefromthefollowingarguments. Oncewefixthe\nbasisfortheFPtensor,eachindexcorrespondstothestatesofCFT.Thus,thetensor\nelements of the FP tensor are the coefficients of each basis:\n𝑇∗=𝑇∗\n𝛼𝛽𝛾𝛿|𝜙𝛼⟩|𝜙𝛽⟩|𝜙𝛾⟩|𝜙𝛿⟩ (3.8)\nOn the other hand, the FP tensor itself is a lattice representation of the identity\noperator 1. InRef.[18,32,33],theyconfirmedthatlocalscale-transformationcould\nbe realized using the FP tensors.\nThescaletransformationofafour-legtensor,comprisingtheFPtensor(coloredblue)\nandisometry(coloredorange),resultsinprimaryoperatorsemergingaseigenstates.\nNotably, the scale-invariant FP tensor corresponds to 𝑥𝛼=0. This specific cor-\nrespondence is significant, equating the FP tensor to the identity operator 2. This\nobservationleadsustoaconceptualizationwheretheelementsofthetensorcanbe\nexpressedasanoverlapbetweenthefour-legidentityoperatorandfourone-legpri-\nmary operators as 𝑇∗\n𝛼𝛽𝛾𝛿=⟨𝜙𝛼𝜙𝛽𝜙𝛾𝜙𝛿|𝜙4−𝑙𝑒𝑔\n1⟩. The same argument can be applied\nto the three-leg FP tensor 𝑆∗. To calculate these values, we employ a technique\nsimilartotheonedescribedinthereferencedliterature,specificallyinRef.[21,34].\nFirst,utilizingstate-operatorcorrespondence,thenormalizedwavefunctionofthe\nfirst index of 𝑆∗, for instance, is created by inserting 𝜙𝛼in the future infinity of the\n2unitary CFTs have ground states corresponding to the identity operator\n60cylinder as follows:\n|𝜙1⟩=\u00122𝜋\n𝐿\u0013−𝑥𝛼\nlim\n𝑧→∞𝑒2𝜋𝑧𝑥𝛼/𝐿𝜙𝛼(∞)|𝐼cyl⟩,\nwhere|𝐼cyl⟩represents the ground state corresponding to the identity operator.\nSubsequently,theFPtensors 𝑆∗and𝑇∗canbeexpressedbythepathintegralonthe\nmanifoldsΣ𝑆andΣ𝑇, respectively, as illustrated in Fig. 3.1. Then, the FP-tensor\nelements are\n𝑆∗\n𝛼𝛽𝛾\n𝑆∗\n111=⟨𝜙𝛼(∞)𝜙𝛽(𝑖∞)𝜙𝛾(−(1+𝑖)∞)⟩Σ𝑆, (3.9)\n𝑇∗\n𝛼𝛽𝛾𝛿\n𝑇∗\n1111=⟨𝜙𝛼(−∞)𝜙𝛽(𝑖∞)𝜙𝛾(∞)𝜙𝛿(−𝑖∞)⟩Σ𝑇. (3.10)\nΣ𝑆andΣ𝑇canbemappedtothecomplexplane 𝑤byusing(generalized)Mandelstam\nmapping [24, 35],\n𝑧𝑆=𝐿\n2𝜋[−ln(𝑤−𝑖)−𝑖ln(𝑤+1)+(1+𝑖)ln𝑤], (3.11)\n𝑧𝑇=𝐿\n2𝜋\u0014\nln\u0012𝑤+𝑖\n𝑤−𝑖\u0013\n+𝑖ln\u0012𝑤−1\n𝑤+1\u0013\u0015\n. (3.12)\nEach operator in the 𝑧-coordinate transforms accordingly as\n𝑆∗\n𝛼𝛽𝛾\n𝑆∗\n111=⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(0)⟩plÖ\n𝑛∈(𝛼,𝛽,𝛾)|𝐽𝑛|𝑥𝑛,\n𝑇∗\n𝛼𝛽𝛾𝛿\n𝑇∗\n1111=⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(1)𝜙𝛿(−𝑖)⟩plÖ\n𝑛∈(𝛼,𝛽,𝛾,𝛿)|𝐽𝑛|𝑥𝑛,\nwhere|𝐽𝑛|=|\u0010\n2𝜋\n𝐿\u0011−1\nlim𝑧→𝜁∞𝑒2𝜋𝑧𝜁∗/(𝐿|𝜁|)|𝑤′(𝑧)|, and𝜁∞is the coordinate of the\nindexintheoriginalmanifold. Theresulting |𝐽𝑛|are𝑒−𝜋/4and2𝑒−𝜋/2,respectively,\nbeing consistent with Eqs. (3.6-3.7). Detailed calculations are presented in the\nappendix.\n3.3 Numerical fixed point tensor\nLet us provide numerical confirmations of our main results using Levin’s tensor\nrenormalization group (TRG) [6] and Evenbly’s TNR [10]. TRG and TNR are\nnumerical techniques that calculate effective 𝐿×𝐿tensor networks. In our study,\nour interest lies in computing those of large system sizes to obtain a tensor that is\nas close as possible to the FP tensor. However, performing an exact contraction is\n61Figure 3.1: The path-integral representation of the tensor elements (𝑎)𝑆∗\n𝛼𝛽𝛾and\n(𝑏)𝑇∗\n𝛼𝛽𝛾𝛿. The fixed-point tensor lives at the center of cylinders, and surrounding\ncylinders are bra vectors of primary fields. Since the FP tensor corresponds to\nthe identity operator, “insertion of no operator\" is illustrated as empty space. This\nidentity operator at the origin in 𝑧coordinate will be mapped to the infinity in 𝑤.\nexponentiallydifficult,promptingustofocusonextractinglow-lyingspectralprop-\nerties. TRG/TNR seeks to circumvent this issue by employing the principles of the\nrenormalizationgrouptheory. Eachcoarse-grainingstepentailsdecompositionsand\nrecombinations. Truncation,parameterizedbythebonddimension 𝐷,isperformed\nto maintain the tractability of numerical computation. However, it is important to\nnote that this scheme is considered exactwhen𝐷=∞, and thus, employing larger\n𝐷improvesthenumericalaccuracy. Additionally,weimposespecial 𝐷4symmetry\nin TRG. The details can be found in the appendix. It is crucial to acknowledge\nthat the TRG method is known to exhibit instabilities, primarily due to its inherent\nlimitations in eliminating certain types of local entanglement. In contrast, TNR,\nwhich includesa local entanglementfiltering process,typically demonstrates supe-\nrior performance in extracting infra-red information. This enhanced capability of\nTNR is attributed to its more effective handling of local entanglement, making it a\nmore robust approach for studying systems at criticality.\n3.4 Tests on critical lattice models\nLet us first test the value 𝑥𝑆=𝑒𝜋/4in Eq. (3.6), by computing 𝑥𝑆from the critical\nIsing and three-state Potts models. Given Eq. (3.6), we can numerically compute\nthe OPE coefficients 𝐶𝛼𝛽𝛾from Eq. (3.5). We define 𝑥𝑆(𝐿)by solving Eq. (3.5) to\nbe\n𝑥𝑆(𝐿)≡1√\n2\u00122𝑥𝛾𝐶𝛼𝛽𝛾\n𝑆𝛼𝛽𝛾(𝐿)\u00131/(𝑥𝛼+𝑥𝛽+𝑥𝛾)\n. (3.13)\nEach model has a primary operator 𝜖, called the energy and the thermal operator,\nrespectively. Since 𝐶𝜖𝜖1=1,𝑥𝑆(𝐿)can be computed from the finite-size three-leg\n62Figure 3.2: Estimation of 𝑥𝑆(𝐿)from Levin-TRG( 𝐷=96) and Evenbly-TNR( 𝐷=\n40). The values of 𝑥(𝐿)from the Ising and three-state Potts model converge to the\ntheoretical value 𝑥𝑆=𝑒𝜋/4denoted by a black dotted line. We plot 𝑥𝑆=2.23035\nobtained from Loop-TNR [10] on the critical 9-state clock model [19] with a lime\ndashed line. The three-state Potts model exhibits a deviation for 𝐿 > 100because\nsimulating systems with higher central charges involves larger numerical errors.\ntensor𝑆𝜖𝜖1(𝐿).\nFigure 3.2 shows the value of 𝑥𝑆(𝐿)obtained from TRG and TNR at the bond\ndimension𝐷=96and𝐷=40, respectively. The numerically derived 𝑥𝑆(𝐿)’s for\nboth models converge to the theoretical value of 𝑒𝜋/4. The noticeable increase in\namplitude for the three-state Potts model by TRG at 𝐿 > 102is attributed to the\neffectofthefinitebonddimensionandtheremaininglocalentanglement. Itisworth\nnotingthatourvaluefor 𝑥𝑆deviatesslightlyfromthevalue 𝑥𝑆=2.23035 3obtained\nin a previous study on the 9-state clock model [19]. We speculate that this minor\ndeviation is due to the finite bond-dimension effect because higher central charges\nlead to more pronounced numerical errors [36]. For the system size 𝐿=2048and\nbond dimension 𝐷=96, we ascertain 𝑥𝑆=2.193257for the Ising model, a value\nremarkably close to 𝑒𝜋/4=2.193280. Once we are certain of the value 𝑥𝑆=𝑒𝜋/4,\nwe can verify Eq. (3.6) for all the OPE coefficients, which are computed from the\n3Their paper showed that the three-leg FP tensor 𝑆∗had the same structure as a three-point\nfunction by numerical experiments. In this process, they treat 𝑥𝑆as a fitting parameter to reproduce\nknown OPE coefficients. Our results show that they are indeed three-point functions and 𝑥𝑆is a\nuniversal number and not a fitting parameter.\n63Figure 3.3: The OPE coefficients of the critical Ising model evaluated by setting\n𝑥𝑆=𝑒𝜋/4. The black dotted lines denote the theoretical values 0, 0.5, and 1. The\ndata points, denoted by filled circles \" ◦\" and crosses \"+,\" are obtained from Levin-\nTRG(𝐷=96) and Evenbly-TNR( 𝐷=40), respectively. Relatively large finite-size\neffects have universal scaling as tested in Sec. A.3.\nthree-leg tensor 𝑆as\n𝐶𝛼𝛽𝛾(𝐿)=(√\n2𝑒𝜋/4)𝑥𝛼+𝑥𝛽+𝑥𝛾2−𝑥𝛾𝑆𝛼𝛽𝛾(𝐿). (3.14)\nThe results for the critical Ising model are exhibited in Fig. 3.3. The obtained\nOPE coefficients are consistent with our theory with the finite-size effects of ex-\npectedscaling. Thefinite-sizeeffectoriginatesfromthetwistoperatoratthebranch\npoints [21, 34], whose scaling is universal. The detailed analysis is discussed in\nthe appendix. The same plot for the critical three-state Potts model is shown in the\nsupplemental information in the appendix. While it has less accuracy due to the\nstronger finite bond dimension effect for higher central charges, the result is still\nconsistent with the expected OPE coefficients.\nWe next computed four-point tensors 𝑇𝛼𝛽𝛾𝛿and compared with the theoretical\nvalues from Eq. (3.7), where the explicit forms of the four-point functions of the\ncriticalIsingmodelarelistedinthesupplementalinformationintheappendix. The\nresultisconsistentuptotwodigitsformosttensorelements,asshowninTable3.1.\nTheexceptionsare 𝑇𝜎𝜎𝜎𝜎and𝑇𝜎𝜎11,whosenumericalvaluesdeviateapproximately\n64Table 3.1: The comparison of the numerically-obtained fixed-point tensor 𝑇𝛼𝛽𝛾𝛿at\n𝐿=2048and the exact four-point function ⟨𝜙𝛼(−𝑥𝑇)𝜙𝛽(𝑖𝑥𝑇)𝜙𝛾(𝑥𝑇)𝜙𝛿(−𝑖𝑥𝑇)⟩plof\nthe Ising model with 𝑥𝑇=𝑒𝜋/2/2.\n𝛼𝛽𝛾𝛿𝑇𝛼𝛽𝛾𝛿(𝐿=2048)⟨𝜙𝛼𝜙𝛽𝜙𝛾𝜙𝛿⟩\n1111 1 1\n𝜎𝜎𝜎𝜎 0.610 0.645\n𝜎𝜎𝜖𝜖 0.0714 0.0716\n𝜎𝜖𝜎𝜖 0.000 0\n𝜖𝜖𝜖𝜖 0.0168 0.0168\n𝜎𝜎𝜖 10.0618 0.0765\n𝜎𝜖𝜎 10.133 0.140\n𝜎𝜎𝜎 10.000 0\n𝜖𝜖𝜖10.001 0\n𝜎𝜎110.708 0.736\n𝜎1𝜎10.639 0.675\n𝜖𝜖110.0863 0.0864\n𝜖1𝜖10.0439 0.0432\n𝜖𝜎110.000 0\n5% from the theoretical values. As for 𝑇𝜎𝜎𝜖 1, the deviation is almost 24% 4. This\ndiscrepancy,however,canbeattributedtofinite-sizeeffectsandbecomesnegligible\nfor infinite system sizes. To illustrate this, we define the finite-size deviation as (do\nnot confuse with temperature)\n𝛿𝑇𝛼𝛽𝛾𝛿≡𝑇∗\n𝛼𝛽𝛾𝛿−𝑇𝛼𝛽𝛾𝛿(𝐿).\nFigure 3.4 presents the values of 𝛿𝑇𝜎𝜎𝜎𝜎(𝐿),𝛿𝑇𝜎𝜎𝜖 1(𝐿), and𝛿𝑇𝜎𝜎11(𝐿)obtained\nfrom TRG calculations. A clear power-law decay with respect to the system size is\nobserved,supportingtheclaimthatthelargedeviationsforthoseelementsarefinite-\nsizeeffects. However,itisworthmentioningthattheexponentcloselyapproximates\n∼𝐿−1/3,hintingattheexistenceofanunderlyingtheorythatmightaccountforthis.\n4The TNR scheme has a similar performance at the same length-scale as seen in Fig. 3.4.\n65Figure3.4: Thefinite-sizeeffectofthefixedpointtensor 𝛿𝑇𝛼𝛽𝛾𝛿≡⟨𝜙𝛼𝜙𝑗𝛽𝜙𝛾𝜙𝛿⟩−\n𝑇𝛼𝛽𝛾𝛿(𝐿)from Levin-TRG( 𝐷=96, red) and Evenbly-TNR( 𝐷=40, blue). We plot\n𝛿𝑇𝛼𝛽𝛾𝛿of𝜎𝜎𝜎𝜎(“+\"),𝜎𝜎𝜖 1(“★\"),and𝜎𝜎11(“×\")withdifferentcolorsdepending\non the algorithm. The difference converges to zero for 𝐿→∞with the power-law\n∼𝐿−1/3.\n66C h a pte r 4\nCONCLUSION AND DISCUSSION\nIn the first part of Chapter 2, we discussed a method for computing the coupling\nconstantsusingrenormalizedtensorsbasedonthefinite-sizescalingtheoryofCFT.\nByplottingtheresultingvaluesateachscale,wewereabletovisualizetheRGflow,\nandweconfirmedthatthetheoreticalRGflows,asshowninFig.2.3,areconsistent\nwith the Ising models. Our methodology has undergone further validation through\nits application to the three-state Potts model and the XY model, as detailed in the\nappendixandinRef.[26],respectively. InthecaseoftheXYmodel,particularcare\nisrequiredintheperturbativecalculationsduetothemarginalnatureoftherunning\ncouplingconstantsunderconsideration. Despitethesecomplexities,wesuccessfully\ndemonstratethattheRGflowintheXYmodelalignswiththeKosterlitzRGflow[37],\nas confirmed by our inclusion of third-order perturbative effects. This finding is\ndepictedinFig.4.1,offeringavisualrepresentationoftheKosterlitzRGflowinthe\ncontext of the XY model.\nFigure 4.1: The RG flow of the classical XY model in two dimensions stands as\na quintessential example of a topological phase transition. This particular type\nof RG flow is commonly referred to as the Kosterlitz RG flow. The right panel is\nnumericallyobtainedRGflowinasimilarmanner. However,akeydistinctionliesin\nthe consideration of up to third-order perturbations in our computational approach.\nThe deviation in the smaller system size is due to the irrelevant perturbations.\nFurther details can be found in Ref. [26].\n67Ourmethodhastheadvantageofbeingabletoextractbothultravioletandinfrared\ninformation, making it a valuable tool for investigating gapped and crossover sys-\ntems. We applied this idea to reveal the asymptotic freedom of the Heisenberg and\nexotic cross-over behavior of RP2models in Ref. [38].\nIn the second part of the chapter, applying the methodology developed in the\nfirst part, we explored the impact of finite bond-dimension 𝐷on the RG flow.\nThe finiteness of the bond-dimension results in a finite correlation length 𝜉(𝐷), or\nequivalently in a non-zero gap in the energy spectrum of the corresponding one-\ndimensional quantum system. We find that this gap formation can be attributed\nto the emergence of a relevant perturbation enforced by the finite bond dimension.\nThis is demonstrated by the RG flow of the emergent relevant coupling.\nThe finite-size scaling of TNR shows a crossover at 𝐿∼𝜉(𝐷), above which the\nsystem is governed by the finite correlation length. The correlation length 𝜉(𝐷)\ninducedbythefinitebonddimensioninTNRshowsthesamescaling(2.21),(2.22)\nas the correlation length of MPS. While such scaling in TNR was suggested earlier\nin Refs. [26], in this thesis, we presented more convincing evidence.\nAlthough we do not have a mathematical proof for the scaling of 𝜉(𝐷)in TNR\nat this point, it may be natural from the following point of view. Besides the\nconstruction of the transfer matrix by contracting horizontal legs, the renormalized\ntensorobtainedinTNRcangivethecornertransfermatrixbycontractingtheupper\nand left legs. The same finite- 𝐷scaling (2.21), (2.22) as in MPS was observed\nin corner transfer matrix renormalization group (CTMRG) [39–41]. Moreover, the\nentanglement spectrum for the half-bipartition of the system of length 2𝐿can be\nrelatedtoacontractionoffourrenormalizedtensorsoflinearsize 𝐿[42],asshown\nin Fig. 4.2. These relations are suggestive of the identical scaling of 𝜉(𝐷)in MPS,\nCTMRG, and TNR as we have observed.\nOur study highlights the importance of considering the impact of the finite bond\ndimensionintheTNR-typeapproach. Inparticular,adirectstudyofthethermody-\nnamic limit with TNR would be prone to errors due to the finite correlation length\n𝜉(𝐷)imposed by the finite bond dimension. As a resolution of this problem, we\nhave demonstrated that accurate data for the thermodynamic limit can be extracted\nby finite-size scaling of TNR spectra obtained for system sizes smaller than 𝜉(𝐷),\ncombined with conformal field theory. Even with this limitation, the tractable sys-\ntemsizeisgreatlyincreasedfrom ∼log𝐷withexactdiagonalizationto 𝜉(𝐷)∼𝐷𝜅\nin TNR.\n68Figure 4.2: (Left panel) A schematic picture of the reduced density matrix 𝜌𝐴\nfor a bipartition of the system in the path integral picture. The uncontracted legs\ncorrespond to the indices of the reduced density matrix. (Right panel) Each of the\nfourquadrantsofthespace-timeintheleftpanelmaybereplacedbytherenormalized\ntensor in TNR with appropriate boundary conditions.\nMeanwhile, the unattainability of true critical fixed-point tensors in numerical\nsimulations does not prohibit their calculation by analytical approach. In Chapter\n3,wehavesuccessfullycomputedexplicitelementsofthecriticalfixed-pointtensor\nby field theory, which we have identified as the four-point function in CFT. This\nachievement enables us to directly extract the OPE coefficients from these tensor\nelements. When combined with the scaling dimensions derived from the transfer\nmatrix, this approach allows us to determine a complete set of CFT data for any\ncritical unitary lattice model.\nOne of the key strengths of our method for extracting OPE coefficients is its\nsimplicityandeffectivefinite-sizescalingproperties. Thesecharacteristicsmakeour\napproachparticularlyusefulforextrapolatingother,morecomplexOPEcoefficients.\nAsanexampleofthismethod’sapplication,wehavecomputedtheOPEcoefficients\nfor the three-state Potts model, detailed in Sec. A.3.\nDeterminingtheinfraredCFTsforlatticemodelsstandsasacornerstonechallenge\nin theoretical physics. This problem has garnered widespread attention across var-\nious domains of physics, including high energy physics, condensed matter physics,\nand statistical physics, due to its fundamental nature and broad implications.\nIn our research, we have introduced a novel solution to this long-standing is-\nsue, employing a synergistic blend of analytical and numerical techniques. This\napproach not only addresses the immediate problem at hand but also opens new\navenuesforexplorationandinquiryintherealmsofformalconformalfieldtheories\n69and numerical tensor networks. Our work, therefore, not only contributes to the\nresolution of a decade-old problem but also poses many intriguing questions for\nfuture research, potentially leading to significant advancements in both theoretical\nand applied physics\nLookingtothefuture,exploringthetensorelementscorrespondingtodescendants\nwithin the CFT framework presents an exciting avenue for further research. This\nexplorationcoulddeepenourunderstandingoftheintricatestructureswithinlattice\nmodels. Infact,followingourwork,Ref.[43]hasexamineddescendantsinasimilar\ncontext, indicating the growing interest and potential in this area of study.\nUltimately, our approach, which combines the exact treatment of RG and fixed-\npoint tensors in tensor networks, could significantly contribute to a more profound\nunderstanding of universality in lattice models. By leveraging these advanced\nmethods, we open up new possibilities for exploring and elucidating the complex\nand fascinating behaviors inherent in critical systems.\n70BIBLIOGRAPHY\n1A. A. Migdal, “Recursion equations in gauge field theories”, 114–119 (1996).\n2L. P. Kadanoff, “Notes on migdal’s recursion formulas”, Annals of Physics 100,\n359–394 (1976).\n3P. Francesco, P. Mathieu, and D. Sénéchal, “Conformal field theory”, (2012).\n4K. G. Wilson, “The renormalization group and critical phenomena”, Rev. Mod.\nPhys.55, 583–600 (1983).\n5A. B. Zamolodchikov, “Renormalization Group and Perturbation Theory Near\nFixed Points in Two-Dimensional Field Theory”, Sov. J. Nucl. Phys. 46, 1090\n(1987).\n6M. Levin and C. P. Nave, “Tensor renormalization group approach to two-\ndimensional classical lattice models”, Phys. Rev. Lett. 99, 120601 (2007).\n7Z.-C. Gu and X.-G. Wen, “Tensor-entanglement-filtering renormalization ap-\nproach and symmetry-protected topological order”, Phys. Rev. B 80, 155131\n(2009).\n8G.EvenblyandG.Vidal,“Tensornetworkrenormalization”,Phys.Rev.Lett. 115,\n180405 (2015).\n9G. Evenbly, “Algorithms for tensor network renormalization”, Phys. Rev. B 95,\n045117 (2017).\n10S. Yang, Z.-C. Gu, and X.-G. Wen, “Loop optimization for tensor network renor-\nmalization”, Phys. Rev. Lett. 118, 110504 (2017).\n11M.Bal,M.Mariën,J.Haegeman,andF.Verstraete,“Renormalizationgroupflows\nof hamiltonians using tensor networks”, Phys. Rev. Lett. 118, 250602 (2017).\n12M.Hauru,C.Delcamp,andS.Mizera,“Renormalizationoftensornetworksusing\ngraph-independent local truncations”, Phys. Rev. B 97, 045111 (2018).\n13K. Homma and N. Kawashima, “Nuclear norm regularized loop optimization for\ntensor network”, (2023).\n14J.L.Cardy,“Conformalinvarianceanduniversalityinfinite-sizescaling”,Journal\nof Physics A: Mathematical and General 17, L385 (1984).\n15J.L.Cardy,“Operatorcontentoftwo-dimensionalconformallyinvarianttheories”,\nNuclear Physics B 270, 186–204 (1986).\n16L.P.Kadanoff,“Operatoralgebraandthedeterminationofcriticalindices”,Phys.\nRev. Lett. 23, 1430–1433 (1969).\n17K.G.Wilson,“Non-lagrangianmodelsofcurrentalgebra”,Phys.Rev. 179,1499–\n1512 (1969).\n7118G. Evenbly and G. Vidal, “Local scale transformations on the lattice with tensor\nnetwork renormalization”, Phys. Rev. Lett. 116, 040401 (2016).\n19G. Li, K. H. Pai, and Z.-C. Gu, “Tensor-network renormalization approach to the\n𝑞-state clock model”, Phys. Rev. Res. 4, 023159 (2022).\n20Z.Y.Xie,J.Chen,M.P.Qin,J.W.Zhu,L.P.Yang,andT.Xiang,“Coarse-graining\nrenormalization by higher-order singular value decomposition”, Phys. Rev. B 86,\n045139 (2012).\n21Y. Zou and G. Vidal, “Multiboundary generalization of thermofield double states\nand their realization in critical quantum spin chains”, Phys. Rev. B 105, 125125\n(2022).\n22Y.Zou,“Universalinformationofcriticalquantumspinchainsfromwavefunction\noverlap”, Phys. Rev. B 105, 165420 (2022).\n23Y.Liu,Y.Zou,andS.Ryu,“Operatorfusionfromwave-functionoverlap:universal\nfinite-size corrections and application to the haagerup model”, Phys. Rev. B 107,\n155124 (2023).\n24S. Mandelstam, “Interacting String Picture of Dual Resonance Models”, Nucl.\nPhys. B64, 205–235 (1973).\n25K.NomuraandK.Okamoto,“Criticalpropertiesofs=1/2antiferromagneticXXZ\nchainwithnext-nearest-neighbourinteractions”,JournalofPhysicsA:Mathemat-\nical and General 27, 5773 (1994).\n26A. Ueda and M. Oshikawa, “Resolving the Berezinskii-Kosterlitz-Thouless tran-\nsition in the two-dimensional XY model with tensor-network-based level spec-\ntroscopy”, Phys. Rev. B 104, 165132 (2021).\n27A. Poghosyan, “Shaping lattice through irrelevant perturbation: ising model”,\nJournal of High Energy Physics 2019, 1–17 (2019).\n28L. Tagliacozzo, T. R. de Oliveira, S. Iblisdir, and J. I. Latorre, “Scaling of entan-\nglement support for matrix product states”, Phys. Rev. B 78, 024410 (2008).\n29F. Pollmann, S. Mukerjee, A. M. Turner, and J. E. Moore, “Theory of finite-\nentanglementscalingatone-dimensionalquantumcriticalpoints”,Physicalreview\nletters102, 255701 (2009).\n30B. Pirvu, G. Vidal, F. Verstraete, and L. Tagliacozzo, “Matrix product states for\ncritical spin chains: finite-size versus finite-entanglement scaling”, Phys. Rev. B\n86, 075117 (2012).\n31H. Ueda, K. Okunishi, and T. Nishino, “Doubling of entanglement spectrum in\ntensor renormalization group”, Phys. Rev. B 89, 075116 (2014).\n32X.Lyu,R.G.Xu,andN.Kawashima,“Scalingdimensionsfromlinearizedtensor\nrenormalization group transformations”, Phys. Rev. Res. 3, 023048 (2021).\n7233W. Guo and T.-C. Wei, “Tensor network methods for extracting cft data from\nfixed-point tensors and defect coarse graining”, (2023).\n34Y.Liu,Y.Zou,andS.Ryu,“Operatorfusionfromwave-functionoverlap:universal\nfinite-size corrections and application to the haagerup model”, Phys. Rev. B 107,\n155124 (2023).\n35Y.Baba,N.Ishibashi,andK.Murakami,“Light-conegaugestringfieldtheoryin\nnoncritical dimensions”, Journal of High Energy Physics 2009, 010–010 (2009).\n36A.UedaandM.Oshikawa,“Finite-sizeandfinitebonddimensioneffectsoftensor\nnetwork renormalization”, Phys. Rev. B 108, 024413 (2023).\n37J.M.Kosterlitz,“Thecriticalpropertiesofthetwo-dimensionalxymodel”,Journal\nof Physics C: Solid State Physics 7, 1046–1060 (1974).\n38A.UedaandM.Oshikawa,“Tensornetworkrenormalizationstudyonthecrossover\nin classical heisenberg and RP2models in two dimensions”, Phys. Rev. E 106,\n014104 (2022).\n39T. Nishino, K. Okunishi, and M. Kikuchi, “Numerical renormalization group at\ncriticality”, Physics Letters A 213, 69–72 (1996).\n40H.Ueda,K.Okunishi,R.Krčmár,A.Gendiar,S.Yunoki,andT.Nishino,“Critical\nbehavior of the two-dimensional icosahedron model”, Phys. Rev. E 96, 062112\n(2017).\n41H. Ueda, K. Okunishi, K. Harada, R. Kr čmár, A. Gendiar, S. Yunoki, and T.\nNishino,“Finite- 𝑚scalinganalysisofBerezinskii-Kosterlitz-Thoulessphasetran-\nsitions and entanglement spectrum for the six-state clock model”, Phys. Rev. E\n101, 062111 (2020).\n42P. Calabrese and A. Lefevre, “Entanglement spectrum in one-dimensional sys-\ntems”, Phys. Rev. A 78, 032329 (2008).\n43G.Cheng,L.Chen,Z.-C.Gu,andL.-Y.Hung,“Exactfixed-pointtensornetwork\nconstruction for rational conformal field theory”, (2023).\n44V.Dotsenko,“Criticalbehaviourandassociatedconformalalgebraofthez3potts\nmodel”, Nuclear Physics B 235, 54–74 (1984).\n45V. Dotsenko and V. Fateev, “Conformal algebra and multipoint correlation func-\ntions in 2D statistical models”, Nuclear Physics B 240, 312–348 (1984).\n46V. Dotsenko and V. Fateev, “Four-point correlation functions and the operator\nalgebra in 2d conformal invariant theories with central charge 𝑐≤1”, Nuclear\nPhysics B 251, 691–734 (1985).\n47V. Dotsenko and V. Fateev, “Operator algebra of two-dimensional conformal\ntheories with central charge 𝑐≤1”, Physics Letters B 154, 291–295 (1985).\n48J.FuchsandA.Klemm,“Thecomputationoftheoperatoralgebrainnon-diagonal\nconformal field theories”, Annals of Physics 194, 303–335 (1989).\n7349I.Esterlis,A.L.Fitzpatrick,andD.M.Ramirez,“Closureoftheoperatorproduct\nexpansion in the non-unitary bootstrap”, Journal of High Energy Physics 2016,\n1–34 (2016).\n50J. McCabe and T. Wydro, “Critical Correlation Functions of the 2-Dimensional,\n3-State Potts Model”, Int. J. Mod. Phys. A 13, 1013–1030 (1998).\n74A p p e n d i x A\nAPPENDIX\nA.1 Perturbation theory on the finite-size spectrum\nIn the realm of effective field theory, particularly for lattice models or condensed\nmattersystems,thetheoryoftenencompassesvariousperturbationstotheConformal\nField Theory (CFT). Let us consider the effective Hamiltonian as follows:\nˆ𝐻=ˆ𝐻∗+∑︁\n𝑗𝑔𝑗∫\n𝑑𝑣ˆΦ𝑗(𝑣). (A.1)\nIn this formulation, 𝐻∗represents the Hamiltonian of the unperturbed CFT, and\nthe additional terms correspond to various perturbations, each characterized by a\ncoupling constant 𝑔𝑗and a field operator ˆΦ𝑗(𝑣). When all these perturbations are\ndeemed irrelevant in the RG context, the behavior of the system asymptotically\napproaches that described by the CFT in the large-distance or low-energy limit.\nHowever,itiscrucialtonotethattheseirrelevantperturbationscanstillsignificantly\ninfluencethefinite-sizespectrumofthesystem. Thisaspectwasextensivelystudied\nby Cardy, who delved into the effects of such perturbations on the finite-size spec-\ntrum[14]. Hisworkprovidesadeeperunderstandingofhowminordeviationsfrom\nthe idealized CFT can have measurable impacts in finite systems.\nNow,weapplythestandardRayleigh-Schrödingerperturbationtheorytoourgen-\neral Hamiltonian framework:\nH=H0+𝑉, (A.2)\nwhere𝑉is treated as a perturbation. The unperturbed eigenstates are defined as\nH0|𝑛(0)⟩=𝐸(0)\n𝑛|𝑛(0)⟩, (A.3)\nand the perturbative expansion of the energy eigenvalue is given by\n𝐸𝑛=𝐸(0)\n𝑛+𝜖𝐸(1)\n𝑛+𝜖2𝐸(2)\n𝑛, (A.4)\nwhere the first-order correction is\n𝐸(1)\n𝑛=⟨𝑛(0)|𝑉|𝑛(0)⟩. (A.5)\n75In this context, the unperturbed eigenstate corresponds to a primary state of CFT:\n|𝑛(0)⟩=|Φ𝑛⟩, (A.6)\nand the perturbation 𝑉is represented as\n𝑉=∑︁\n𝑗𝑔𝑗∫\n𝑑𝑣ˆΦ𝑗(𝑣), (A.7)\nUsing conformal mapping for the three-point correlation function, we obtain\n⟨Φ𝑖|ˆΦ𝑗(𝑣)|Φ𝑘⟩=𝐶𝑖𝑗𝑘\u00122𝜋\n𝐿\u0013𝑥𝑗\n𝑒2𝜋𝑖(𝑠𝑖−𝑠𝑘)𝑣/𝐿. (A.8)\nThus, for the matrix element of 𝑉, we have\n⟨𝑙(0)|𝑉|𝑛(0)⟩=∑︁\n𝑗𝑔𝑗∫𝐿\n0𝑑𝑣⟨Φ𝑙|ˆΦ𝑗(𝑣)|Φ𝑛⟩ (A.9)\n=𝛿𝑠𝑙,𝑠𝑛∑︁\n𝑗𝑔𝑗𝐶𝑛𝑗𝑙𝐿\u00122𝜋\n𝐿\u0013𝑥𝑗\n(A.10)\n=𝛿𝑠𝑙,𝑠𝑛2𝜋∑︁\n𝑗𝑔𝑗𝐶𝑛𝑗𝑙\u00122𝜋\n𝐿\u0013𝑥𝑗−1\n. (A.11)\nHence, for𝑙=𝑛, the first-order energy correction is\n𝐸(1)\n𝑛=2𝜋∑︁\n𝑗𝑔𝑗𝐶𝑛𝑛𝑗\u00122𝜋\n𝐿\u0013𝑥𝑗−1\n. (A.12)\nTherefore, to the first order in perturbation theory, the energy difference relative\nto the ground state is\n𝐸𝑛−𝐸0=2𝜋\n𝐿 \n𝑥𝑛+2𝜋∑︁\n𝑗𝑔𝑗𝐶𝑛𝑛𝑗\u00122𝜋\n𝐿\u0013𝑥𝑗−2!\n. (A.13)\nWhen the perturbations are irrelevant ( 𝑥𝑗>2), they give subleading corrections\nto the CFT scaling (A.13). In contrast, relevant perturbations with 𝑥𝑗<2eventu-\nally dominates the CFT scaling for a sufficiently large system size 𝐿, signalling a\nbreakdownoftheperturbationtheory. Nevertheless,theperturbationtheorycanbe\nusefulforsmallperturbations(atthemicroscopicscale)whenthesystemsizeisnot\nvery large. When 𝑥𝑗=2, the perturbation is marginal.\nThe formula (A.13) may be interpreted in an alternative way. We can apply the\nscale transformation so that the length of the system becomes 2𝜋. The scaled gap\n76Symbol Dimension Meaning\n𝐼 0 identity\n𝜖2\n5thermal op.\n𝜎1\n15spin\n𝑋7\n5\n𝑌 3\n𝑍2\n3\nTable A.1: A set of primary operators of the three-state Potts model.\nFigure A.1: The size dependence of the (a) 𝛿𝑥𝜎and (b)𝛿𝑥𝜖at𝑇=0.999995𝑇𝑐and\n𝑇=1.000005𝑇𝑐. Thepinkandgreendottedlinesdenote 𝐿−0.8,(a)𝐿1.2,and(b)𝐿2.4\nfittings respectively. For the low-temperature phase, the sign of 𝛿𝑥𝜎is negative at\n𝐿 > 100. The dip on the left panel around 𝐿∼102corresponds to the zero point\nof Eq. (A.17). (b) The finite-size effect to the 𝑥𝜖suffers less from 𝑇2\ncyl+¯𝑇2\ncylin\namplitude. The scaling of Eq. (A.18) is clearly observed.\nis𝐿(𝐸𝑛−𝐸0)/(2𝜋). Applying the perturbation theory to the system on the ring of\nradius 1,\n𝐿\n2𝜋(𝐸𝑛−𝐸0)=𝑥𝑛+2𝜋∑︁\n𝑗𝑔𝑗(𝐿)𝐶𝑛𝑛𝑗. (A.14)\nUsing the scale-dependent coupling constant\n𝑔𝑗(𝐿)=\u00122𝜋\n𝐿\u0013𝑥𝑗−2\n𝑔𝑗, (A.15)\nwhere𝑔𝑗is the “bare” value of the coupling constant that we find in Eq. (A.13).\n77A.2 Finite-entanglement scaling of the three-state potts model.\nDefinition of the model and its CFT\nWe can further verify the emergence of relevant perturbations by applying it to\nthe three-state Potts model. It is a natural extension of the Ising model to the Z3\nsymmetry, and the Hamiltonian is\n𝐻=−∑︁\n⟨𝑖,𝑗⟩𝛿𝑠𝑖,𝑠𝑗, (A.16)\nwhere𝑠𝑖takes 0, 1, and−1. It has a phase transition of Z3symmetry breaking at\n𝑇𝑐=1/log(1+√\n3). The critical theory of the three-state Potts model is another\ntype of the minimal model M(6,5)with𝑐=4\n5[3, 44]. A set of primary operators\nare shown in Table. A.1.\nAsopposedtotheIsingmodel,thereareoff-diagonaloperatorsas Φ2\n5,7\n5,Φ7\n5,2\n5and\nΦ3,0,Φ0,3(currents).\nLet us first examine the RG flow in a gapped system. Similar to the Ising model,\nthe phase transition is identified by spontaneous symmetry breaking. The high-\ntemperature phase is a trivial phase, whereas the low-temperature region is Z3\nsymmetry breaking phase. Thus, the fixed-point tensor is a stacking of three states\nwith their Z3charge 0,−1, and 1.\nConstruction of the effective Hamiltonian\nThe RG flow can be seen by investigating the scaling dimensions. For instance,\nwe can take the spin operator 𝜎= Φ 1\n15,1\n15and plot the value of 𝛿𝑥𝜎=𝑥𝜎(𝐿)−\n2\n15. Similarly, as in the Ising model, there is competition between irrelevant and\nrelevant operators: 𝑋=Φ 7\n5,7\n5and𝜖=Φ 2\n5,2\n5. The thermal operator separates the Z3\nsymmetry-breakingphasefromthetrivialone. Thefinite-sizecorrectionsof 𝑋and𝜖\nto𝑥𝜎are𝐿−0.8and𝐿1.2,respectively. Thefusionrulesare 𝜎×𝜎=1+𝜖+𝜎+𝑋+𝑌+𝑍,\n𝜖×𝜖=1+𝑋, and𝜖×𝜎=𝜎+𝑍. Hence,𝛿𝑥𝜎has the following form:\n𝛿𝑥𝜎=2𝜋𝐶𝜎𝜎𝑋𝑔𝑋\u0012𝐿\n2𝜋\u0013−0.8\n+2𝜋𝐶𝜎𝜎𝜖𝑔𝜖\u0012𝐿\n2𝜋\u00131.2\n. (A.17)\nOn the other hand, the perturbation of 𝜖appears as a second-order term for 𝛿𝑥𝜖\nbecause the fusion rule says 𝜖×𝜖=1+𝑋. Consequently, 𝛿𝑥𝜖can be computed as\n𝛿𝑥𝜖=2𝜋𝐶𝜖𝜖𝑋𝑔𝑋\u0012𝐿\n2𝜋\u0013−0.8\n+𝛼𝑔2\n𝜖\u0012𝐿\n2𝜋\u00132.4\n, (A.18)\nwhere𝛼is a constant determined from the second-order calculation.\n78FigureA.2: 36𝛿𝑥𝜎−𝛿𝑥𝜖forthehightemperaturephase. “+”isusedwhenthesign\nis negative. The red dotted line denotes the 𝐿−2fitting while the light green one is\njust a relevant 𝐿1.2contribution from 𝜖. Loop-TNR rotates the lattice by𝜋\n4at each\nRG step, and the tilted system is plotted with the blue dots.\nFigure. A.1 shows the computed 𝛿𝑥𝜎by TNR. As expected, it exhibits the com-\npetition between irrelevant and relevant operators. The sign of 𝑔𝜖is the opposite\nbetween two phases, which is a manifest indication of the RG flow in the opposite\ndirection due to the thermal operator. 𝑥𝜎has doubly degenerate states with Z3\ncharge±1. In the low-temperature phase, these two states flow to 𝑥𝜎(𝐿)→ 0, and\nthe fixed-point tensor becomes three-fold degenerate. As for the irrelevant pertur-\nbation, there seems to be a discrepancy between 𝛿𝑥𝜎in Fig. A.1 and Eq. (A.17).\nThe data points are scattered for small system sizes and not precisely on the fitting\nlines. Thisisduetotheleadingirrelevantoperatorwehavenotconsidered. Wecan\nidentify it as 𝑇2\ncyl+¯𝑇2\ncylas followings. Just as we did in the left panel of Fig. 2.3,\nthe contributions from 𝑔𝑋can be eliminated by combining 𝛿𝑥𝜎and𝛿𝑥𝜖. The OPE\ncoefficients for the three-state Potts model are known, and the ratio of the two OPE\ncoefficients is 𝐶𝜖𝜖𝑋/𝐶𝜎𝜎𝑋=36[45–49]. Thus, the origin of the \"scattering\" shall\nbe observed by plotting 36𝛿𝑥𝜎−𝛿𝑥𝜖.\nFigure. A.2 displays the result for the high-temperature phase. It is now obvious\nthat the scattering of Fig. A.1 comes from the 𝐿−2perturbation denoted with the\nred dotted line. Also, it has a conformal spin 𝑠because it flips a sign at each step\n79and𝑠≡4(mod 8) 1. As a result, we can conclude the irrelevant operator has the\nconformal weights as (ℎ,¯ℎ)=(4,0)and(0,4), which are𝑇2\ncyland ¯𝑇2\ncyl. Finally, the\neffectiveHamiltonianofthecriticalthree-statePottsmodelonthesquarelatticecan\nbe constructed as\n𝐻=𝐻∗\n𝑃𝑜𝑡𝑡𝑠+∫𝐿\n0𝑑𝑥h\n𝑔𝑋Φ7\n5,7\n5(𝑥)+𝑔𝑇(𝑇2\ncyl+¯𝑇2\ncyl)i\n. (A.19)\nFinite-Entanglement scaling\nAt the critical temperature of the Ising model, the finite- 𝐷effect proves to be a\nperturbation from the thermal operator. Let us verify it for the critical three-state\nPottsmodel. Duetotheirrelevantperturbationsfrom 𝑇2\ncyl+¯𝑇2\ncyl,thefinite-𝐷effects\nare clearer for 𝑥𝜖(𝐿)as seen in Fig. A.1( 𝑏). This is shown in Fig. 2.5 of the main\ntext. Here, we demonstrate that 𝛿𝑥𝜎(𝐿)also shows the universal behavior with\n𝐿/𝜉(𝐷). Figure. A.3 shows the rescaled correction to 𝛿𝑥𝜎(𝐿). For𝐿 > 𝜉(𝐷), the\nperturbation grows as 𝐿2denoted by a gray line, which means that the emergent\nperturbationscalesas 𝐿1.2. ComparedwithEq.(A.17),itisclearthattheemergent\nperturbationisfromthethermaloperator. However,asthesystemsizeincreases,the\nsecond-orderperturbationbecomespredominantasshownwithapinkline. As 𝜖is\nthemostrelevantoperatorthatispermittedbysymmetry,itsupportsourconjecture\nstated in the main text.\nA.3 Supplemental information on the fixed-point tensor\nConformal mapping of S\nThethree-legtensor 𝑆∗\n𝛼𝛽𝛾representsthethree-sidedthermofielddoublestate[21]\ncorresponding to the geometry in Fig. 1(a) in the main text. This manifold Σ𝑆is\nmapped to the plane by a conformal mapping\n𝑧=𝐿\n2𝜋[−ln(𝑤−𝑖)−𝑖ln(𝑤+1)+(1+𝑖)ln𝑤], (A.20)\nwhichmapsthethreepointsin Σ𝑆,(𝑧1,𝑧2,𝑧3)=(∞,𝑖∞,−(1+𝑖)∞),to(𝑤1,𝑤2,𝑤3)=\n(𝑖,−1,0). Then, the tensor element is\n𝑆∗\n𝛼𝛽𝛾\n𝑆∗\n111=|𝐽1|𝑥𝛼|𝐽2|𝑥𝛽|𝐽3|𝑥𝛾⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(0)⟩p𝑙, (A.21)\n1For each iteration, the lattice rotates by 45 degrees, and it corresponds to the conformal\ntransformation 𝑤=𝑒𝑖𝜋\n4𝑧on a complex plane. As the irrelevant perturbations 𝑇2\ncyland ¯𝑇2\ncylhave a\nconformal spin 4and−4, they get an additional factor (𝑒𝑖𝜋\n4)4=(𝑒𝑖𝜋\n4)−4=−1for an odd number of\nsteps. We can see this by plotting the data from even steps (original) and odd steps (tilt) separately.\n80Figure A.3: Rescaled 𝛿𝑥𝜎by𝜉(𝐷)=𝐷𝜅at the critical temperature. The resulting\ndatacollapseontoauniversalfunctionthatisindependentof 𝐿/𝜉(𝐷). If𝐿/𝜉(𝐷)<\n1, the system is in the FSS region, while if 𝐿/𝜉(𝐷)≥1, it is in the FES region.\nIn the FES region, the scaling of the first-order and second-order perturbations are\nindicated by a gray and pink line, respectively. 𝑥𝜎is computed as an average value\nof the first and second excitation energy.\nwhere𝐽𝑖is the Jacobian of the conformal mapping (A.20). The initial states are\n|𝜙1⟩=\u00122𝜋\n𝐿\u0013−𝑥𝛼\nlim\n𝑧→∞𝑒2𝜋𝑧𝑥𝛼/𝐿𝜙𝛼(𝑧)|𝐼c𝑦𝑙⟩,\n|𝜙2⟩=\u00122𝜋\n𝐿\u0013−𝑥𝛽\nlim\n𝑧→𝑖∞𝑒−𝑖2𝜋𝑧𝑥𝛽/𝐿𝜙𝛽(𝑧)|𝐼c𝑦𝑙⟩,\n|𝜙3⟩= √\n2𝜋\n𝐿!−𝑥𝛾\n(A.22)\nlim\n𝑧→(−𝑖−1)∞𝑒(𝑖−1)√\n22𝜋√\n2𝐿𝑧𝑥𝛾𝜙𝛾(𝑧)|𝐼c𝑦𝑙⟩.\nThe Jacobian can be computed as\n|𝐽1|=\f\f\f\f\f\u00122𝜋\n𝐿\u0013−1\nlim\n𝑧→∞𝑒2𝜋𝑧/𝐿𝑤′(𝑧)\f\f\f\f\f\n=\f\f\f\f\f\u00122𝜋\n𝐿\u0013−1\nlim\n𝑤→𝑖𝑒2𝜋𝑧/𝐿\u0012𝑑𝑧\n𝑑𝑤\u0013−1\f\f\f\f\f. (A.23)\n81Using Eq. (10) in the main text, the first and second term is\n𝑒2𝜋𝑧/𝐿=exp[ln𝑤\n𝑤−𝑖+𝑖ln𝑤\n𝑤+1], (A.24)\n𝑑𝑧\n𝑑𝑤=𝐿\n2𝜋\u0014\n−1\n𝑤−𝑖−𝑖\n𝑤+1+(1+𝑖)\n𝑤\u0015\n. (A.25)\nSubstituting these into Eq. (A.23),\n|𝐽1|=\f\f\f\flim\n𝑤→𝑖𝑤\n𝑤−𝑖exph\n𝑖ln𝑤\n𝑤+1i\u0012\u0014\n−1\n𝑤−𝑖−𝑖\n𝑤+1+(1+𝑖)\n𝑤\u0015\u0013−1\f\f\f\f\n=\f\f\f\fexp\u0012\n𝑖ln𝑖\n1+𝑖\u0013\f\f\f\f\n=𝑒−𝜋/4. (A.26)\nIn the same way, we can show |𝐽2|=|𝐽3|=𝑒−𝜋/4. Thus, the 3-leg tensor is\n𝑆∗\n𝛼𝛽𝛾=𝑒−𝜋\n4(𝑥𝛼+𝑥𝛽+𝑥𝛾)⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(0)⟩p𝑙. (A.27)\nConformal mapping of T\nThe conformal mapping from the four-sided thermofield double state is\n𝑧=𝐿\n2𝜋[−ln(𝑤−𝑖)+log(𝑤+𝑖)−𝑖ln(𝑤+1)+𝑖ln(𝑤−1)]\n=𝐿\n2𝜋\u0014\nln\u0012𝑤+𝑖\n𝑤−𝑖\u0013\n+𝑖ln\u0012𝑤−1\n𝑤+1\u0013\u0015\n. (A.28)\nTo compute the Jacobian, we compute\n𝑒2𝜋𝑧/𝐿=exp\u0014\nln𝑤+𝑖\n𝑤−𝑖+𝑖ln𝑤−1\n𝑤+1\u0015\n, (A.29)\n𝑑𝑧\n𝑑𝑤=𝐿\n2𝜋\u0014\n−1\n𝑤−𝑖+1\n𝑤+𝑖−𝑖\n𝑤+1+𝑖\n𝑤−1\u0015\n. (A.30)\nThe Jacobian is then computed similarly as before:\n|𝐽1|−1=lim\n𝑤→𝑖\f\f\f\f𝑒−2𝜋𝑧/𝐿\u0014\n−1\n𝑤−𝑖+1\n𝑤+𝑖−𝑖\n𝑤+1+𝑖\n𝑤−1\u0015\f\f\f\f\n=𝑒𝜋/2\n2. (A.31)\nThe four-point function thus transforms as\n𝑇∗\n𝛼𝛽𝛾𝛿\n𝑇∗\n1111=|𝐽1|𝑥𝛼|𝐽2|𝑥𝛽|𝐽3|𝑥𝛾|𝐽4|𝑥𝛿⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(1)𝜙𝛿(−𝑖)⟩p𝑙,\n=\u0012𝑒𝜋\n2\n2\u0013−𝑥t𝑜𝑡\n⟨𝜙𝛼(−1)𝜙𝛽(𝑖)𝜙𝛾(1)𝜙𝛿(−𝑖)⟩p𝑙. (A.32)\n82Figure A.4: The contraction of the fixed-point tensors. We obtain 𝑆from TRG and\ncombine together to make 𝑆∗and𝑇∗. In this way, 𝑇∗respects reflection symmetry\nalong the dotted lines in addition to 𝐶4rotation symmetry.\n𝐷4-symmetric TRG\nWe use the TRG scheme which aligns closely with the original paper’s method-\nology [6]. In principle, singular-value decomposition (SVD) of the four-leg tensor\nshouldyieldtwoidenticalsymmetrictensors,giventhe 𝐷4symmetryoftheoriginal\ntensor. However,numericalerrorssometimesmakethesetwotensorsnon-identical.\nTo mitigate this, we consistently select one of the three-leg tensors and supplement\nthe other with its reflection. By adopting this approach, the fixed-point tensors,\ndepicted in Fig. A.4, maintain the 𝐷4symmetry at every RG step by construction.\nFour-point function of the critical Ising model\nHere,welistthefour-pointfunctionoftheIsingmodel. Giventhefourcoordinates\n𝑧𝑖anditscross-ratio 𝑥≡(𝑧12𝑧34)/(𝑧13𝑧24),thefour-pointfunctionsoftheIsingCFT\nare\n⟨𝜖4⟩=\f\f\f\f\f\fÖ\n1≤𝑖<𝑗≤4𝑧−1\n3\n𝑖𝑗1−𝑥+𝑥2\n𝑥2\n3(1−𝑥)2\n3\f\f\f\f\f\f2\n,\n⟨𝜎2𝜖2⟩=\f\f\f\f\f\u0014\n𝑧1\n4\n12𝑧−5\n8\n34(𝑧13𝑧24𝑧14𝑧23)−3\n16\u00151−𝑥\n2\n𝑥3\n8(1−𝑥)5\n16\f\f\f\f\f2\n,\n⟨𝜎4⟩=|𝑧13𝑧24|−1/4|1+√\n1−𝑥|+|1−√\n1−𝑥|\n2|𝑥|1\n4|1−𝑥|1\n4.\n83Figure A.5: The finite-size corrections 𝛿𝐶𝛼𝛽𝛾(𝐿)obtained from the numerical\nsimulation of the critical Ising model. The numerical results for higher energy\nlevels𝛿𝐶𝜖𝜖1(𝐿)and𝛿𝐶1𝜖𝜖(𝐿)sufferfromfinite- 𝐷effectsfor𝐿 >100. Thescalings\nof the finite-size corrections are nevertheless universal, which is consistent with\nTable III in Ref. [34]\nThefunctionsaboveareusedtoevaluatetheanalyticFPtensorelementsinthemain\ntext.\nUniversal finite-size corrections\nHere, we discuss the finite-size corrections to Eq. (13) in the main text. The\nfinite-size corrections of the OPE coefficients are defined as\n𝛿𝐶𝛼𝛽𝛾(𝐿)=|𝐶𝛼𝛽𝛾−𝐶𝛼𝛽𝛾(𝐿)|, (A.33)\nwhere𝐶𝛼𝛽𝛾(𝐿)is defined in Eq. (13) in the main text. We found that 𝛿𝐶𝛼𝛽𝛾(𝐿)\nexhibits a universal power-law decay as\n𝛿𝐶𝛼𝛽𝛾(𝐿)∼𝐿−𝑝𝛼𝛽𝛾. (A.34)\nOurnumericalresultssuggest 𝑝𝛼𝛽𝛾=1/2for(𝛼,𝛽,𝛾)=(1,1,𝜖),(1,𝜖,1),(𝜖,𝜖,𝜖),\n(1,𝜎,𝜎),(𝜎,𝜖,𝜎),(𝜎,𝜎, 1),and(𝜎,𝜎,𝜖), and𝑝𝛼𝛽𝛾=2for(𝛼,𝛽,𝛾)=(𝜖,𝜖,1)\nand(1,𝜖,𝜖)as shown in Fig. A.5. Similar universal scalings were discussed in\nRef. [34], where they considered the overlap of critical wavefunctions 𝐴𝛼𝛽𝛾=\n⟨𝜙3∗\n𝛾|𝜙1\n𝛼𝜙2\n𝛽⟩. Thethreewavefunctionsaredefinedonaringwithacircumferenceof\n84𝐿1,𝐿2, and𝐿3=𝐿1+𝐿2, respectively, and the lower indices are the label of the\ncorresponding primary states. Ref. [34] found the overlap of wavefunctions to be\n𝐴𝛼𝛽𝛾\n𝐴111∼\u0012𝐿3\n𝐿1\u0013𝐿1\n𝐿3\u0012𝐿3\n𝐿2\u0013𝐿2\n𝐿3−𝐿3\n𝐿1𝛼−𝐿3\n𝐿2𝛽+𝛾\n𝐶𝛼𝛽𝛾+ ˜𝐴(𝑝)\n𝛼𝛽𝛾𝐿−𝑝𝛼𝛽𝛾\n3,(A.35)\nwhere𝑝𝛼𝛽𝛾is the leading finite-size correction and ˜𝐴(𝑝)\n𝛼𝛽𝛾is a prefactor that is\nindependent of 𝐿3.\nOur scaling exponents 𝑝𝛼𝛽𝛾in Eq. (A.34) coincide with those from the previous\nworkinEq.(A.35)forallfusionchannels(seeTableIIIofRef.[34]). Thisuniversal\nscaling can be explained by considering rings 1 and 2 as an orbifold theory. The\nscaling𝑝𝛼𝛽𝛾=1/2is then attributed to the difference in the scaling dimensions\nof the orbifold theory, which is 𝑥𝜖/2=1/2. (See Ref. [34] for details.) Similarly,\nwe conjecture that the universal scaling for 𝛿𝑇𝛼𝛽𝛾𝛿∼𝐿−1/3can be understood by\nconsidering the three of four legs to be an orbifold theory.\nThe three-State Potts model\nHere,wepresenttheOPEcoefficientsobtainedfromnumericalsimulationsofthe\nclassicalcriticalthree-statePottsmodel. Thelow-lyingprimarystatesofthismodel\nare the identity operator \"1\", the two spin operators \" 𝜎,\" and the thermal operator\n\"𝜖,\" whose scaling dimensions are 0, 2/15, and 4/5. The non-trivial coefficients is\n𝐶𝜎𝜎𝜖=0.546[50]. Figure.A.6exhibitsthenumericalresultsfromLevin-TRGand\nEvenbly-TNR as the Ising model in the main text. TRG/TNR schemes, generally\nspeaking, have finite- 𝐷effects for larger system sizes, and this effect is larger in\nhigher central charges. Since the central charge 𝑐=0.8of the three-state Potts\nmodel is larger than 𝑐=0.5of the Ising model, these numerical errors manifest\nin the data plots. In particular, the TRG data is unstable due to CDL tensors and\nquickly diverts from the theoretical values. However, Evenbly-TNR’s results still\nconverge to the correct values.\n85FigureA.6: TheOPEcoefficientsofthecriticalthree-statePottsmodelevaluatedby\nsetting𝑥𝑆=𝑒𝜋/4. Theblackdottedlinesdenotethetheoreticalvalues0,0.546,and\n1 [50]. The data points, denoted by filled circles \" ◦\" and crosses \"+,\" are obtained\nfrom Levin-TRG( 𝐷=88) and Evenbly-TNR( 𝐷=40), respectively.\n86" }, { "title": "2401.18076v3.Searching_for_scalar_field_dark_matter_with_LIGO.pdf", "content": "Searching for scalar field dark matter with LIGO\nAlexandre S. Göttel1,†, Aldo Ejlli2, Kanioar Karan2, Sander M.\nVermeulen3, Lorenzo Aiello4,5, Vivien Raymond1, and Hartmut Grote1\n1Gravity Exploration Institute, Cardiff University, Cardiff CF24 3AA, United Kingdom\n2Max-Planck-Institute for Gravitational Physics and Leibniz University Hannover, Callinstr. 38, 30167 Hannover, Germany\n3California Institute of Technology, Department of Physics, Pasadena, California 91125, USA\n4Università di Roma Tor Vergata, I-00133 Roma, Italy\n5INFN, Sezione di Roma Tor Vergata, I-00133 Roma, Italy and\n†gottela@cardiff.ac.uk\n(Dated: March 11, 2024)\nWe report on a direct search for scalar field dark matter using data from LIGO’s third observing\nrun. We analyse the coupling of size oscillations of the interferometer’s beamsplitter and arm test\nmasses that may be caused by scalar field dark matter. Using new efficient search methods to\nmaximise sensitivity for signatures of such oscillations, we set new upper limits for the coupling\nconstants of scalar field dark matter as a function of its mass, which improve upon bounds from\nprevious direct searches by several orders of magnitude in a frequency band from 10 Hzto180 Hz.\nLaser interferometers, with their extreme sensitivity to\nminute length changes, have revolutionized astronomy\nwith a wide range of gravitational-wave (GW) detections\nover the last years [1]. Due to their capabilities at or\nbeyond quantum limits, GW detectors can also be used\ndirectly in the search for new physics, without the media-\ntion of gravitational waves, for example in the search for\ndark matter (DM). Several ideas have been put forward\nas to how different candidates of DM can directly cou-\nple to GW detectors, ranging from scalar field DM [2–4]\nto dark photon DM [5, 6], and to clumpy DM coupling\ngravitationally or through an additional Yukawa force [7].\nScalar field DM influences objects by accelerating them\nwhen a field gradient exists, and by expanding them (and\naltering their refractive index) without net acceleration.\nUpper limits for scalar field DM have been set using data\nfromtheGEO600GWdetector[8], theFermilabHolome-\nter [9], and LIGO [10]. The scalar field searches of the\nGEO600 and Holometer instruments used the dominant\nexpansion (and refractive index) effect in those instru-\nments, while the work of [10] used the acceleration effect.\nLikewise, upper limits on Dark photon DM, which is in\nsimplified terms represented by a vector field causing ob-\njects to accelerate, have been set using data from the first\n(O1) and third (O3) observing runs of the LIGO detec-\ntors [11, 12].\nInthiswork, weanalysethe expansion effectofscalarfield\nDM on dual-recycled Fabry-Pérot Michelson interferom-\neters such as LIGO [13], Virgo [14], or KAGRA [15]. We\nalso develop enhanced spectral search techniques that are\noptimised to search efficiently at a lower frequency ( i.e.\nmass) range of DM, and apply these to search for DMsignatures using data of the third observing run of the\ntwo LIGO observatories. Not finding viable candidates,\nwe set new upper limits that surpass existing bounds by\nup to three orders of magnitude in a frequency band from\n10 Hzto180 Hz, and are competitive up to 5000 Hz.\nExpected dark matter signal\nThe astronomically-inferred mass density associated with\nDMmaybeattributedtoanundiscoveredscalarfieldwith\nahighoccupationnumber. Modelsofweakly-coupledlow-\nmass( ≪1 eV)scalarfieldspredictthatsufficientparticles\ncouldbeproducedintheearlyuniversethroughavacuum\nmisalignment mechanism and manifest as the observed\nDM. This scalar field DM would behave as a coherently\noscillating classical field [2, 16]:\nϕ(t,⃗ r) =ϕ0cos\u0010\nωϕt−⃗kϕ·⃗ r\u0011\n, (1)\nwhere ωϕ=mϕc2/ℏis the angular Compton frequency,\n⃗kϕ=mϕ⃗ vobs/ℏis the wave vector, mϕis the mass of the\nfield, and ⃗ vobsthe velocity relative to the observer. The\namplitudeofthefieldcanbesetas ϕ0=ℏ√2ρlocal/(mϕc),\nunder the assumption that this scalar field constitutes the\nlocal DM density ρlocal[17].\nMoreover, dynamical models of scalar field DM pre-\ndict that such matter would be trapped and virialised in\ngravitationalpotentials,leadingtoaMaxwell-Boltzmann-\nlike distribution of velocities ⃗ vobsrelative to an observer.\nAs non-zero velocities produce a Doppler-shift of the ob-\nserved DM field frequency, this virialisation results in the\nDM field having a finite coherence time or, equivalently, a\nspread in observed frequency (linewidth) [5, 18]. The ex-\npectedlinewidthis ∆ωobs/ωobs∼10−6forDMtrappedinarXiv:2401.18076v3 [astro-ph.CO] 8 Mar 20242\nthe galactic gravity potential, as in the standard galactic\nDM halo model. Similarly, the observed frequency ωobs\nshifts from ωϕby a∝v2\nobsterm, negligible in our analysis.\nScalar field DM could couple to the fields of the Stan-\ndard Model (SM) in various ways. These couplings are\nmodelled by the addition of a parameterised interaction\nterm to the SM Lagrangian [19, 20]. In this paper, we\nconsider linear interaction terms with the electromagnetic\nfield tensor Fµνand the electron rest mass me:\nLint⊃ϕ\nΛγFµνFµν\n4−ϕ\nΛeme¯ψeψe, (2)\nwhere ψe,¯ψearetheSMelectronfieldanditsDiracconju-\ngate, respectively, and Λγ,Λeparameterise the coupling.\nThey can also be expressed in terms of the dimensionless\nparameters deanddme, with de,m e=MPl/(√\n4πΛγ,e),\nwhere MPlis the Planck mass. The terms in Eq. (2)\ncause effective changes of the fine structure constant α\nand the effective rest mass me[16, 21]. These changes in\nturn modify the lattice spacing and electronic modes of\nsolids, driving modulations of size land refractive index\nn:\nδl\nl=−\u0012δα\nα+δme\nme\u0013\n, (3)\nδn\nn=−5·10−3\u0012\n2δα\nα+δme\nme\u0013\n, (4)\nwhere δxdenotes a change of the parameter x:\nx→x+δx. Eqs. 3, 4 hold in the adiabatic limit, which\napplies for solids with a mechanical resonance frequency\nmuch higher than the driving frequency ωϕ[3, 22, 23].\nIn the LIGO interferometers, light from a laser source im-\npinges on a beamsplitter (BS) and splits into two orthog-\nonal arms, each containing a Fabry-Pérot cavity (com-\nprised of two mirrors, referred to as test masses) to in-\ncrease the effective optical path length and optical power\nof the arms. A sketch of this optical layout can be seen\nin Fig. 1. While all components of the interferometers\ncan be affected by DM, the BS has been identified as a\ndominant coupling element for scalar field dark matter, as\nargued in [3]. This is because the “splitting” effect occurs\non one surface of the BS and not at its centre of mass,\nsee Fig. 1. This results in DM causing a path length dif-\nference between the arms.\nFor a BS of thickness tBand index of refraction n, one\nexpects from Eqs. (1) and (3) a length change to be pro-\nduced in the LIGO interferometers [3]:\nδ(Lx−Ly)≈\u00121\nΛγ+1\nΛe\u0013\n·n tBℏ√2ρlocal\nmϕc,(5)where δ(Lx−Ly)is the optical path difference between\nboth arms and we have neglected the contribution of the\nrefractive index changes to the signal, as it is more than\ntwo orders of magnitude smaller than that of the size\nchanges. In this work, for the first time, we also take\ninto account the contribution of the four arm test masses,\nwhich predominantly produce a signal by changing the\noptical path lengths within the arms. While this effect\nmostly cancels out if the test masses have identical thick-\nnesses, as pointed out in [3], we find that the real small\nthickness differences between LIGO’s test masses lead to\nnon-negligible additions to the BS-induced coupling.\nLengthfluctuations,suchasthosecausedbytheBSand\nthe test mass couplings, are transduced by the optical in-\nterferometric setup into signals on the photodetector (see\nFig. 1). This conversion can be represented by so-called\ntransfer functions , which describe how the interferometer\nresponds to signals of different frequencies. In LIGO, the\nphotodetector signal IPD(ω)is calibrated to GW-induced\nstrain h(ω)according to:\nh(ω) =IPD(ω)\nLTGW(ω)eiϕGW, (6)\nwhere Lis the arm length of the interferometer ( ≈4 km),\nand T GWis the optical transfer function from GW-\ninduced strain (with phase ϕGW) to photodetector signal.\nHowever, to search for the expansion effect of scalar field\ndark matter, we are interested in a different type of strain\nthat corresponds to thickness changes of the optical com-\nFIG. 1. Simplified optical layout of a LIGO-type inter-\nferometer. A beamsplitter BS splits a laser beam into\ntwo long arms that contain Fabry-Pérot cavities com-\nposed of test masses ITMX/Y and ETMX/Y, respec-\ntively. The interferometric output is read by a photode-\ntector PD.3\nponents of the interferometer, as described by Eq. (5) for\nthe beamsplitter. To also take into account the effect of\nthe arm test masses, we define:\ntM= (tETMY +tITMY )−(tETMX +tITMX ),(7)\nwhere tETMY,tITMY,tETMX, and tITMXrepresent the\nmirror thicknesses for the End Test Mass (ETM) and In-\nput Test Mass (ITM) in the Y- and X- interferometer\narms, respectively. The thickness variations of the op-\ntics under the effect of DM, i.e.the DM-induced strain\nsDM(ω), can then be expressed as:\nsDM(ω) =IPD(ω)\n|n tBTBeiϕB+tMTMeiϕM|,(8)\nwhere T Band T Mare the transfer functions correspond-\ning to the beamsplitter and test mass effects, respectively,\nandϕBandϕMare the phases of those transfer functions.\nSince we have access to the GW-induced strain h(ω)only\n(and not IPD(ω)), we express the DM-induced strain as:\nsDM(ω) =h(ω)·\f\f\f\fLTGWeiϕGW\nn tBTBeiϕB+tMTMeiϕM\f\f\f\f.(9)\nFinally, we can express h(ω)in relation to the coupling\nconstants ΛγandΛe:\nh(ω)·Acal(ω)≈\u00121\nΛγ+1\nΛe\u0013\n·\u0012ℏ√2ρlocal\nmϕc\u0013\n,(10)\nwhere\nAcal=TGW·L/(n tBTB)p\n1 + 2 ψcos(ϕB−ϕM) +ψ2;ψ=tMTM\nn tBTB.\nWe derive the required GW and DM transfer functions\nconsidering both the BS and test mass effects using a\nsimulation-based approach. While the underlying prin-\nciples of the transfer function calculation are rigorously\nunderstood analytically, see [24], this approach is bet-\nter suited for handling the many complexities specific to\nindividual optical setups. We achieve this using the Fi-\nnesse [25] software package, which was designed to model\noptical-interferometric systems in the frequency domain\nand has been widely corroborated experimentally. We\nnote that the simulation also takes into account any ef-\nfects stemming from the light travel time, as have been\npointed out in [6]. We also considered the phase differ-\nence between end test masses that is caused by the finite\nde Broglie wavelength of the DM field. This increases the\ntotal transfer function’s magnitude by about 5%at5 kHzwhen averaged over Earth’s sky coverage. Given its neg-\nligible impact on our results below, when compared to\nstatistical uncertainty, we disregard this effect here.\nThe obtained transfer functions, as well as individual re-\nsults for BS and test mass effects are shown in Fig. 2 for\nthe LIGO Livingston (LLO) and Hanford (LHO) obser-\nvatories, respectively. The most relevant optical data for\nthis simulation are listed in Table I. As can be seen from\nLHO LLO\nThickness Transm. Thickness Transm.\n(mm) (%) (mm) (%)\nBS 60.41 50 59.88 50\nITMX 199.763 1.5 199.960 1.48\nETMX 199.846 3.9e-4 199.245 7.1e-4\nITMY 199.904 1.5 199.290 1.48\nETMY 199.792 3.8e-4 199.954 7.6e-4\nTABLE I. Relevant thickness and transmission val-\nues [26] of relevant optical components in LHO and\nLLO, as used for our transfer function simulations. See\nFig. 1 for an overview of the different components and\ntheir meaning.\nFIG. 2. Simulated transfer functions as a function of\nfrequency. a)TGWfor both interefometers, b) and c):\nTMfor the test-mass effect (dashed line) and TSfor the\nBS effect (dot-dashed line), see text, and their in-phase\ncombination (dotted line) for LLO and LHO, respec-\ntively.\nthe middle and bottom panels in Fig. 2, the influence of4\nthe BS in both detectors becomes dominant at 10 Hzto\n20 Hz. The differences between the detectors is caused by\nsmall differences in test mass thicknesses.\nLogarithmic spectral analysis\nGiven the frequency-dependence of the expected DM sig-\nnal, with ∆ωobs/ωobs∼10−6, maximising signal to noise\nratio in our analysis implies a bin spacing in frequency\nspace with the same constant width-to-frequency ratio as\nthat expected from the signal [8, 27]. The dataset used\nin this paper is from LIGO’s third observing run [1]. We\nuse 40 segments of data that are at least 28 hin length,\nto ensure integration over at least one coherence time at\nour lower frequency bound ( 10 Hz), with a total of about\n1500 hof data sampled at 16 kHz. The calculation of Dis-\ncrete Fourier Transforms (DFT) we thus require presents\na unique technical challenge, as it explores unprecedented\nfrequencies (below 50 Hz) for this kind of analysis. It\nfor example needs to use amounts of data ( O(100GB))\nexceeding typical memory capacities. More importantly,\nthe cost of this calculation scales as O(N2), where N\nis the number of data points, leading to a prohibitively\nexpensive regime. While methods exist to accelerate log-\narithmic DFT calculations [28, 29], none reach the Fast\nFourierTransforms’(FFT)speed,andnoexistingpackage\nsatisfies this analysis’ requirements (including memory).\nThe use of logarithmic bin spacing precludes the use of\nthe FFT due to the resultant frequency-dependent terms\nand variable data points in the DFT calculations. How-\never, we observed that this frequency-dependence was rel-\natively weak, allowing us to implement small approxima-\ntions to modify the DFT. This adjustment allowed for\nthe effective use of FFTs, significantly enhancing compu-\ntational efficiency. For details about this calculation and\nthe aforementioned software requirements see [30]. Over-\nall, we achieve a speed-up factor of O(104)with negligible\nimpact on the results.\nSince the effect of DM on the detector cannot be\n“turned off”, it is necessary to build a background model\nthat is resistant to the influence of existing peaks in the\ndata (see [18]). This is done, after having calculated the\nPSD, by implementing a recursive procedure making use\nofsplinefitssimilartothatusedbyLIGOcalibration[31].\nIn each iteration, bins containing identified peaks are re-\nmoved and the fits are repeated on the “cleaned” data,\nuntil the solutions converge. The method was validated\nby varying the degrees of freedom of the aforementioned\napproximation.\nWe find empirically that the residuals of the background\nmodel with respect to the log of the observed PSD arewell described by a skew-normal distribution. While the\nparameters of said distribution vary over frequency, this\nvariationissmall: thefollowinganalysisisthusperformed\nin chunks of 10,000 frequency bins in which the distribu-\ntion parameters can safely be viewed as constant. We\nuse a likelihood-based analysis in order to combine data\nfrom different segments (in time) and from the different\ninterferometers. The likelihood is defined as:\nL(µ,⃗θ,˜⃗θ) =X\nseg,ifoX\nj=0logfseg\u0010\ngj,seg,ifo (µ,⃗θ),˜⃗θ\u0011\n,(11)\nwhere the sums are over data segments and frequency, re-\nspectively, µis proportional to the amplitude of the DM\npeak, fsegis a skew normal distribution with parameters\nheldby˜⃗θ, thesubscript jdenotesthefrequencybinindex,\nseg the data segment, and ifo the corresponding interfer-\nometer. gseg,iforepresents the residuals between the data\nand the expected background, with a term to allow for\nDM effects:\ngj,seg,ifo = log Yseg−log\u0000\nebkgseg+µ·βifo\u0001\n,(12)\nwhere Y(ω)is the PSD data based on h(ω),bkg(ω)refers\nto the fitted background shape in log space, and βifo(ω)\nis an interferometer-specific calibration term based on\nEq. (10). Frequency-dependence throughout the equation\nis left implicit for simplicity. The parameter µ= Λ−2\niwas\nchosen because, as can be seen in Eq. (10), it is not possi-\nble to differentiate between a non-zero Λ−1\nγorΛ−1\ne.Λ−1\ni\ncan thus be interpreted as being either one of the two cou-\npling constants, under the assumption that the other is\nnull. Although the proximity of the interferometers could\nallow us to exploit coherence effects, the abundance of\nnon-coincident data segments in our dataset prompted us\nto disregard this method, as we estimated that it would\nlead to only a roughly 10% improvement in our results.\nIn this framework, finding a DM signal is thus equivalent\nto rejecting the hypothesis that µ= 0. Additionally, in\norder to correctly make use of the fact that physically,\nµcannot be negative, we use the profile-likelihood-ratio\nbased test statistic q0, as described in eq. (12) in [32],\nand corresponding asymptotic methods, to search for a\npositive signal.\nConversely, in order to calculate the upper limit on Λ−1\ni,\nthe complementary test-statistic ˜qµas described in eq.\n(16) in [32], was used. This test-statistic correctly ac-\ncounts for cases where the value of µmaximizing the like-\nlihood is greater than the hypothesized value, ensuring\nthat upward noise fluctuations are not considered as less\ncompatible with a given upper limit.5\nThis approach enabled the search for DM signals by\nidentifying local excesses in the q0value across different\nfrequency bins. A 5σthreshold, corrected for the look-\nelsewhere-effect , resulted in 349 candidates, which was re-\nduced to 159 by associating neighbouring over-threshold\nbins to single candidates. Finally, since the reconstructed\namplitude of DM should not vary much over time, the\nconsistency of the results was further probed with a t=5\nthreshold on a student-t test comparing results from dif-\nferentsegmentcombinations. Afinalcutontheremaining\n42candidateswasthensetonrequiringthatbothinterfer-\nometers have results that are significantly different from\nzero. Faced with the lack of surviving candidates, our\nupper limits can be seen in the context of other measure-\nments in Fig. 3 for Λ−1\neandΛ−1\nγ, respectively.\nThese results assume a local dark matter density ρCDM =\na)\nb)\nFIG. 3. Upper limit on Λ−1\ni(95% C.L.) as a function of\nfrequency. a) and b) depict our results in the context\nof other experimental results on Λe,Λγ, respectively.\nOur results are shown by the thick blue line, constraints\nfrom direct experimental searches for DM [8–10, 33–43]\nare shown in thin grey, and constraints from searches\nfor ‘fifth forces’ [44, 45] are depicted by the dashed red\nlines. Our results were smoothed for visual purposes.0.4GeV/cm3(as in [46] for the standard smooth DM halo\nmodel). Models in which DM forms a relaxion halo [47,\n48] predict local DM overdensities of up to ρRH/ρCDM≤\n1016[49]. Our results impose significantly more stringent\nconstraints on the coupling constants for higher assumed\nvalues of the DM density ρA> ρ CDM: the constraint\nbecomes more stringent by a factor (ρA/ρCDM)1/2(see\nEq. 5).\nOur limits represent a several order of magnitude im-\nprovement on other direct searches in a band from 10 Hz\nto180 Hz(roughly 5×10−14eVto1×10−12eV). The\nmain limiting factor being detector noise, we expect those\nresults to be improved greatly in future LIGO runs and\nwith future gravitational wave detectors. We emphasise\nin particular that the results could also be improved dras-\ntically by increasing mirror thickness differences in the\ninterferometer arms, for which this study paves the way.\nAcknowledgements\nThe authors are grateful for support from the Sci-\nence and Technology Facilities Council (STFC), grants\nST/T006331/1 and ST/W006456/1 for the Quantum\nTechnologiesforFundamentalPhysicsprogram, aswellas\nST/I006285/1, and ST/L000946/1, and the Leverhulme\nTrust, grant RPG-2019-022. This work was supported in\npart by Oracle Cloud credits and related resources pro-\nvided by the Oracle Corporation. This research has made\nuse of data or software obtained from the Gravitational\nWave Open Science Center (gwosc.org), a service of the\nLIGO Scientific Collaboration, the Virgo Collaboration,\nandKAGRA.Thismaterialisbaseduponworksupported\nby NSF’s LIGO Laboratory which is a major facility fully\nfunded by the National Science Foundation, as well as\nthe Science and Technology Facilities Council (STFC)\nof the United Kingdom, the Max-Planck-Society (MPS),\nand the State of Niedersachsen/Germany for support of\nthe construction of Advanced LIGO and construction and\noperation of the GEO600 detector. Additional support\nfor Advanced LIGO was provided by the Australian Re-\nsearch Council. Virgo is funded, through the European\nGravitational Observatory (EGO), by the French Cen-\ntre National de Recherche Scientifique (CNRS), the Ital-\nian Istituto Nazionale di Fisica Nucleare (INFN) and the\nDutch Nikhef, with contributions by institutions from\nBelgium, Germany, Greece, Hungary, Ireland, Japan,\nMonaco, Poland, Portugal, Spain. KAGRA is supported\nby Ministry of Education, Culture, Sports, Science and\nTechnology (MEXT), Japan Society for the Promotion of6\nScience (JSPS) in Japan; National Research Foundation\n(NRF)andMinistryofScienceandICT(MSIT)inKorea;\nAcademia Sinica (AS) and National Science and Technol-\nogy Council (NSTC) in Taiwan. This document has been\nassigned LIGO document number LIGO-P2400010.\n[1] R. Abbott et al. (LVK Collaboration), ApJS 267, 29\n(2023).\n[2] Y. Stadnik and V. Flambaum, Phys. Rev. Lett. 115,\n201301 (2015).\n[3] H. Grote and Y. Stadnik, Phys. Rev. Res. 1, 033187\n(2019).\n[4] S. Morisaki and T. Suyama, Phys. Rev. D 100, 123512\n(2019).\n[5] A. Pierce, K. Riles, and Y. Zhao, Phys. Rev. Lett. 121,\n061102 (2018).\n[6] S. Morisaki et al., Phys. Rev. D 103, L051702 (2021).\n[7] E. Hall et al., Phys. Rev. D 98, 083019 (2018).\n[8] S. Vermeulen et al., Nature 600, 424-428 (2021).\n[9] L. Aiello et al., Phys. Rev. Lett. 128, 121101 (2022).\n[10] K. Fukusumi, S. Morisaki, and T. Suyama, Preprint at\narXiv:2303.13088 (203).\n[11] H. Guo, K. Riles, F. Yang, and Y. Zhao, Comm. Phys. 2,\n1-7 (2019).\n[12] R. Abbott et al. (LVK Collaboration), Phys. Rev. D 105,\n063030 (2022).\n[13] J. Aasi et al. (LIGO Collaboration), Class. Quantum\nGravity 32, 074001 (2015).\n[14] A. F et al., Class. Quantum Gravity 32, 024001 (2014).\n[15] T. Akutsu et al., Progress of Theoretical and Experimen-\ntal Physics 2021, 05A101 (2020).\n[16] A. Arvanitaki, J. Huang, and T. Van, Phys. Rev. D 91,\n015015 (2015).\n[17] J. I. Read, J. Phys. G: Nucl. Part. Phys. 41, 063101\n(2014).\n[18] A. Derevianko, Phys. Rev. A 97, 042506 (2018).\n[19] A. Ringwald, Physics of the Dark Universe 1, 116-135\n(2012).\n[20] A. Hees et al., Phys. Rev. D 98, 064051 (2018).[21] A. Derevianko and M. Pospelov, Nat. Phys. 10, 933-936\n(2014).\n[22] A. Geraci et al., Phys. Rev. Lett. 123, 031304 (2019).\n[23] A. Arvanitaki, S. Dimopoulos, and T. Van, Phys. Rev.\nLett.116, 031102 (2016).\n[24] J. Mizuno et al., Physics Letters A 175, 273-276 (1993).\n[25] D. Brown and A. Freise, Finesse www.gwoptics.org/\nfinesse (2014).\n[26] https://galaxy.ligo.caltech.edu/optics .\n[27] K. Dooley et al., Class. Quantum Gravity 33, 075009\n(2016).\n[28] J. Brown and M. Puckette, J. Acoust. Soc. Am. 92, 2698-\n2701 (1992).\n[29] N. Holighaus, M. Dörfler, G. Velasco, and T. Grill,\nIEEE/ACM Trans. Audio Speech Lang. Process. 21, 775-\n785 (2013).\n[30] A. S. Göttel et al., In preparation for publication (2024).\n[31] L. Sun et al., Class. Quantum Gravity 37, 225008 (2020).\n[32] G. Cowan, K. Cranmer, E. Gross, and O. Vitells, Eur.\nPhys. J. C 71, 1554 (2011).\n[33] S. Aharony et al., Phys. Rev. D 103, 075017 (2021).\n[34] E. Savalle et al., Phys. Rev. Lett. 126, 051301 (2021).\n[35] C. Kennedy et al., Phys. Rev. Lett. 125, 201302 (2020).\n[36] D. Antypas et al., Phys. Rev. Lett. 123, 141102 (2019).\n[37] D. Antypas et al., Preprint at {arXiv}:2012.01519\n(2021).\n[38] O.Tretiak et al., Preprintat {arXiv}:2201.02042 (2022).\n[39] R. Oswald et al., Phys. Rev. Lett. 129, 031302 (2022).\n[40] W. Campbell et al., Phys. Rev. Lett. 126, 071301 (2021).\n[41] K. Beloy et al., Nature 591, 564-569 (2021).\n[42] X. Zhang et al., Phys. Rev. Lett. 130, 251002 (2023).\n[43] N. Sherrill et al., New J. Phys. 25, 093012 (2023).\n[44] J. Bergé et al., Preprint at arXiv:2102.00022 (2021).\n[45] A. Hees et al., Phys. Rev. D 98, 064051 (2018).\n[46] K. Freese, M. Lisanti, and C. Savage, Rev. Mod. Phys.\n85, 1561-1581 (2013).\n[47] P. Graham, D. Kaplan, and S. Rajendran, Phys. Rev.\nLett.115, 221801 (2015).\n[48] E. Kolb and I. Tkachev, Phys. Rev. Lett. 71, 3051-3054\n(1993).\n[49] E. Savalle et al., Preprint at arXiv.1902.07192 (2019)." }, { "title": "2402.00117v1.Spontaneously_Broken____1___Form_U_1__Symmetries.pdf", "content": "arXiv:2402.00117v1 [hep-th] 31 Jan 2024Spontaneously Broken (−1)-Form U(1)\nSymmetries\nDaniel Alonia,bEduardo Garc´ ıa-Valdecasasa,cMatthew ReeceaMotoo Suzukia,d\naJefferson Physical Laboratory, Harvard University,\nCambridge, MA 02138, USA\nbPhysics Department, Boston University, Boston, MA 02215, U SA\ncSISSA, Via Bonomea 265, Trieste 34136, Italy\ndKEK Theory Center, Tsukuba 305-0801, Japan\nAbstract: Spontaneous breaking of symmetries leads to universal phenomen a. We\nextend this notion to ( −1)-form U(1) symmetries. The spontaneous breaking is diag-\nnosed by a dependence of the vacuum energy on a constant backg round field θ, which\ncan be probed by the topological susceptibility. This leads to a reinte rpretation of the\nStrong CP problem as arising from a spontaneously broken instanto nic symmetry in\nQCD. We discuss how known solutions to the problem are unified in this f ramework\nand explore some, so far unsuccessful , attempts to find new solutions.Contents\n1 Introduction and summary 2\n1.1 Defining a ( −1)-form U(1) global symmetry 3\n1.2 Spontaneous breaking of a ( −1)-form U(1) symmetry 6\n1.3 Application to the Strong CP problem 8\n1.4 Outline 9\n2 Gauge theories as spontaneously broken phases 9\n2.1 4dMaxwell theory 10\n2.2 3dMaxwell theory 12\n2.3 2dMaxwell theory 13\n2.4 The Schwinger model 15\n2.5 The massive Schwinger model 17\n3 A different look at the Strong CP problem 18\n3.1 Low energy effective theory in 4d Yang-Mills theory and QCD 18\n3.2 SSB of the ( −1)-form U(1) symmetry in 4d Yang-Mills theory and QCD 20\n3.3 Reformulation of the Strong CP problem 21\n4 Solutions to the Strong CP problem and its analogues 22\n4.1 Solving the problem by gauging with an axion 22\n4.2 Solving the problem by gauging with massless fermions 23\n4.3 Solving the problem with non-compact symmetries 24\n4.4 Failing to solve the problem with explicit breaking 25\n4.5 Solving the problem with gauged reflection symmetries 28\n5 Outlook 29\nA The 2dAbelian-Higgs model 31\nB The CPN−1model 32\nC A SymTFT for 2dMaxwell theory. 33\n– 1 –1 Introduction and summary\nSymmetries are extremely useful for understanding quantum the ories. In quantum\nfield theory, symmetries have traditionally been taken to act on loca l operators and\nto obey a group law multiplication, but recent years have seen many g eneralizations,\nstarting with p-form generalized global symmetries [ 1,2]. The subsequent literature\nis too large to comprehensively cite here; instead, we refer reader s to several recent\npedagogical reviews [ 3–9]. Generalized symmetries have proved to be useful for char-\nacterizing phase transitions, strong dynamics, and other nonper turbative aspects of\nquantum field theory. Quantum gravity, in contrast to quantum fie ld theory, is be-\nlieved to lack such symmetries (though approximate symmetries are common). The\nabsence of global symmetries has powerful implications, for examp le requiring a com-\nplete spectrum of charged objects in quantum gravity [ 10–14]. Our goal in this paper is\nto argue that an apparently degenerate case of generalized symm etry, namely the case\nof (−1)-form U(1) global symmetry, is a useful concept that provides a unifying lan-\nguage for discussing many interesting dynamical phenomena in quan tum field theory.\nAlthough this degenerate case has received relatively little attentio n in the literature,\nit has previously made an appearance in [ 15–19], and our discussion will build on ideas\nintroduced therein.1\nThe case of p-form invertible global symmetries in d-dimensional quantum field\ntheory, with 0 ≤p≤d−2, is well-established. A p-form global symmetry with group\nGis associated with a family of topological operators U(g,Σ), known as symmetry\noperators, labeled by a group element g∈Gand a closed (i.e., compact and without\nboundary) ( d−p−1)-manifold Σ. These operators are topological, in the sense that\ncorrelation functions are invariant under deformations of Σ provid ed that Σ does not\ncross another operator insertion when deformed. The symmetry operatorU(g,Σ) acts\nonp-dimensional charged operators living on p-manifolds that are linked by Σ. Al-\nthough the symmetry charge in general is defined on a ( d−p−1)-manifold, in many\ncases it is localized to the ( p+1)-dimensional worldvolumes of massive charged objects\ncreatedby thecharged p-dimensional operators. Inthespecial caseofa U(1)symmetry,\nthe symmetry operators take the form\nU(eiα,Σ) = exp/parenleftbigg\niα/integraldisplay\nΣ⋆jp+1/parenrightbigg\n, (1.1)\nwherejp+1is a conserved ( p+1)-form current. In other words, jp+1is co-closed:\nd⋆jp+1= 0. (1.2)\n1Other recent discussions of ( −1)-form global symmetries, with less overlap with our current focu s,\nappear in [ 20,21]. (d−1)-form global symmetry is another interesting special case; see [22].\n– 2 –The topological nature of the operator follows from this local cons ervation equation.\n(In some literature, the ( d−p−1)-form operator Jd−p−1=⋆jp+1is referred to as the\nconserved current, and it is closed rather than co-closed. Here w e follow the classic\nconvention in which an ordinary conserved current for a symmetry acting on local\noperators is a 1-form.) For a U(1) symmetry, the charge Q=/integraltext\nΣ⋆jp+1is an integer,\nwhich is equivalent to saying that the right-hand side of ( 1.1) is invariant under α/mapsto→\nα+2π, anecessary conditionfortheoperatortobeawell-defined funct ionofeiα∈U(1).\nEvery symmetry is associated with topological operators, even if it is a traditional\nNoether symmetry that is conserved only on the equations of motio n. The topolog-\nical nature of the operator is a statement about correlation func tions in the theory.\nHowever, in special cases the symmetry itself is topological in natur e. For example, in\nMaxwell theory, the magnetic flux1\n2π/integraltext\nΣF∈Zis an integer topological invariant for\nany U(1) bundle and any closed 2-manifold Σ, without the need to use equations of\nmotion. In such cases, the path integral decomposes into topolog ical sectors, and the\nsymmetry operator insertion is identical for all field configurations in a given sector.\nWhether a symmetry is topological in this sense can depend on the du ality frame in\nwhich one works, so it is not a physical invariant. On the other hand, many ordinary\nsymmetries are not topological in anyduality frame. In this paper, we focus on sym-\nmetries that are topological in the strong sense, in the duality fram e in which we define\nthe theory.\nAp-form U(1) global symmetry (without an ’t Hooft anomaly) can be co upled to\na background ( p+ 1)-form gauge field (U(1) connection) Ap+1by adding a coupling\nAp+1∧⋆jp+1. We can gauge the symmetry by making Ap+1dynamical, i.e., by summing\nover U(1) bundles with connection Ap+1in the path integral (and generally including\na kinetic term for Ap+1, which will typically be generated by loops). In this case,\nMaxwell’s equation1\ne2d⋆Fp+2=⋆jp+1indicates that the would-be co-closed current has\nbecome co-exact, and as a result the symmetry operators becom e trivial.\n1.1 Defining a (−1)-formU(1)global symmetry\nThe special case p=−1 ofp-form global symmetry is somewhat degenerate, in a few\nsenses. At first glance, one may reasonably be skeptical that it is a useful notion at all.\nA standard p-form global symmetry acts on p-dimensional charged operators. There\nis, apparently, no such thing as a ( −1)-dimensional operator, so a ( −1)-form symmetry\nwould appear to have nothing to act on. On the other hand, a p-form symmetry is\nalso associated to dynamical charged objects with a ( p+1)-dimensional worldvolume,\nand wedohave a notion of a dynamical object with a 0-dimensional worldvolume ,\nnamely, an instanton. (For example, it is common to speak interchan geably of D( −1)-\nbranes or D-instantons in Type IIB string theory [ 23].) A related concern is that the\n– 3 –symmetry operators U(g,Σ) for a ( −1)-form symmetry are associated with closed d-\ndimensional spacetime manifolds Σ; in other words, they are integra ted over the entire\nspacetime. In this case, the question of whether the operator’s c orrelation functions\nare topological is not obviously meaningful, because we cannot locally deform Σ while\nkeeping the spacetime background of our theory fixed.2Similarly, in the case of a\ncontinuous symmetry, a ( −1)-form symmetry is associated with a conserved 0-form\ncurrent, d⋆j0= 0. However, this condition is trivial, because ⋆j0is a top form in the\ntheory. Thus, everyscalar operator in the theory defines, in some sense, a ( −1)-form\nglobal symmetry, which threatens to render the concept vacuou s. There may still be\nsome merit to this concept, even in the extremely general case, wh ere the absence of\nsuch (−1)-form global symmetries has been identified with the longstanding claim that\nthere are no free parameters in quantum gravity [ 18].\nIn this paper, we focus on the case of ( −1)-form U(1) global symmetries, which\nretain enough structure to be a useful concept [ 15–17,19]. The U(1) case is associated\nwith integer charges,/integraltext\nΣ⋆j0∈Z. Correspondingly, these theories can be coupled to a\nbackground axion field, i.e., a compact scalar θ(x)∼=θ(x) +2π, which we think of as\na 0-form U(1) gauge field. The gauge redundancies of θare simplyθ(x)/mapsto→θ(x)+2πn\nforn∈Z. These are the analogues of “large” or winding gauge transformat ionsAp/mapsto→\nAp+2πnωpwith [ωp]∈Hp(M,Z) for ap-form gauge field; the axion has no analogue\nof the local gauge transformations Ap/mapsto→Ap+dλp−1.3\nWewill followthepragmaticapproachoftakingthepossibility tocouple atheoryto\nabackgroundaxionfieldasourworking definition ofa(−1)-formU(1)globalsymmetry:\nDefinition. We say that a theory has a ( −1)-formU(1)global symmetry when it\ncontains an operator j0that can be consistently linearly coupled to a background field\nθ(x) taking values in a circle ( θ∼=θ+2π),\ne−SE/mapsto→e−SEexp/parenleftbigg\ni/integraldisplay\nMθ(x)⋆j0(x)/parenrightbigg\n. (1.3)\nWereferto j0(x)asthe(−1)-formU(1)symmetrycurrent and(forthecaseoforientable\nspacetime manifolds M) we refer to/integraltext\nM⋆j0(x)∈Zas the (−1)-form symmetry charge.\nThe canonical example, and the case of greatest relevance to par ticle physics, is a\n4dgauge theory with\n⋆j0=1\n8π2tr(F∧F), (1.4)\n2There may be useful perspectives in which the deformation occurs in configuration space, or in\nsome type of auxiliary extra dimension. We will not make use of such pe rspectives in this paper.\n3See for instance [ 24].\n– 4 –for which the ( −1)-form symmetry charge is the instanton number of a gauge field\nconfiguration. We will point out a number of other examples as we go a long.\nA few comments about our definition are in order. We require that th e theory\ncan be defined on arbitrary orientable spacetime manifolds Mfor arbitrary θ(x) back-\ngrounds, which in general are bundles over spacetime—i.e., they adm it configurations\nin whichθ(x) winds around a cycle.4In some cases, turning on other background fields\ncan clash with turning on general θbackgrounds; in that case, we say that there is a\nmixed ’t Hooft anomaly involving the ( −1)-form symmetry, or an anomaly in the space\nof coupling constants, as discussed extensively in [ 15,16].\nWe have referred to orientable spacetime manifolds because in a the ory with an\norientation-reversing spacetime symmetry like parity (by which we m ean reflection of\nan odd number of spatial dimensions) or time reversal, there are ad ditional subtleties.\nSuch theories may be defined on non-orientable manifolds (see, e.g., [26–28] for recent\ndiscussions). In this case, the quantity that we can integrate ove rMis a pseudoform\nor twisted form, i.e., one that transforms with an extra minus sign un der parity. If\n⋆j0is an ordinary form, then θ(x) must be a pseudoscalar in order for ( 1.3) to make\nsense. Our definition is valid in that case, but the charge/integraltext\nM⋆j0(x) is not defined on\narbitrary spacetime backgrounds, and in particular it does not mak e sense to couple\nthe theory to a constant θ-term on a general background. This is as expected: such a\nterm violates parity.\nThe definition of a ( −1)-form U(1) global symmetry that we have chosen is useful,\nbecausetheorieswiththispropertyhavemanyfeaturesincommon withtheorieswith p-\nform U(1) global symmetries for higher p. For example, the symmetry can be gauged.\nIn our context, we can do this by making the field θ(x) dynamical, summing over\nθfield configurations in the path integral. In some theories we can also gauge the\nsymmetry by introducing massless chiral fermions [ 19]. In theses cases, as in ordinary\nelectromagnetism, gaugingthesymmetry renders thecurrent co -exact instead ofmerely\nco-closed. The central point of this paper is that the analogy also e xtends to the notion\nof spontaneous breaking of the global symmetry, and correspon dingly, to higgsing (and\ndual confinement) when the symmetry is gauged.\nForanordinaryU(1)globalsymmetry, itispossibletogaugeasubgr oupZk⊂U(1).\nThis operation also extends to the ( −1)-form case, where it corresponds to summing\n4One might wonder if a weaker notion of ( −1)-form symmetry is of interest, in which a theory need\nonly admit a coupling to a constant background θterm. An interesting candidate is discussed in [ 25]:\ntheCP1sigma model in 3d has a topological invariant characterized by π3(CP1)∼=Z, which one might\nexpect can be coupled to a constant θ, but this topological invariant is not given by an integral of a\nlocal term. It turns out that the theory is only consistent with the choicesθ= 0 and θ=π. We do\nnot know any theory admitting a coupling to generic constant θbut not to a background axion.\n– 5 –over only field configurations with topological charge a multiple of k[17,29–32].\n1.2 Spontaneous breaking of a (−1)-form U(1) symmetry\nThe spontaneous breaking of p-form global symmetries for p≥0 has been exten-\nsively discussed in the literature [ 2,33–35]. A standard diagnostic for breaking of\nan ordinary 0-form symmetry is that a charged operator obtains a vacuum expec-\ntation value. When the symmetry is continuous, we also find massless , propagating\nNambu-Goldstone bosons that nonlinearly realize the symmetry. Th is picture extends\nto higher-form symmetries: for example, a Wilson loop generally has a n expectation\nvalue that obeys a perimeter law or an area law. In the case of a perim eter law, a\ncounterterm in the definition of the Wilson loop can cancel the perime ter dependence,\nleaving behind a constant expectation value even for arbitrarily larg e loops. This is\nthe case of spontaneous breaking of a 1-form global symmetry, a nd the photon can be\nviewed as a massless Nambu-Goldstone mode. For a confining theory with an area law\nfor the Wilson loop, on the other hand, the expectation value decay s for large loops,\nand the 1-form global symmetry is considered to be unbroken.\nSuch diagnostics cannot be extended to the case of ( −1)-form global symmetries,\nbecause there is no ( −1)-dimensional charged operator that can obtain a vacuum ex-\npectation value. Similarly, there is no possibility of a propagating Namb u-Goldstone\nboson created by a ( −1)-formfield nonlinearly realizing the symmetry. Nonetheless, we\nwill argue that there is a useful notion of spontaneous symmetry b reaking for a ( −1)-\nform U(1) symmetry, and even a sense in which there is an emergent Nambu-Goldstone\nfieldin the infrared (though not a propagating boson).\nWe propose that a useful diagnostic of spontaneous symmetry br eaking for a ( −1)-\nform global symmetry is that the vacuum energy for the theory in Minkowski space\ndepends on the value of a constant θbackground . In particular, one order parameter\nfor such spontaneous symmetry breaking is the topological susceptibility , defined as\nX=−i/integraldisplay\nddx/an}bracketle{tT{j0(x)j0(0)}/an}bracketri}htconn.=∂\n∂θ/an}bracketle{tj0/an}bracketri}ht=∂2\n∂θ2V(θ), (1.5)\nwhere, conn .denotes the connected two-point function. One suggestive link be tween\nthis expression and familiar cases of spontaneous symmetry break ing is that of the\nKogut-Susskind pole [ 36,37], which we briefly review here. Specifically, in many the-\nories, the ( −1)-form topological charge density j0is a total derivative of a (gauge-\ndependent) quantity vµ(x),\nj0(x) =∂µvµ(x). (1.6)\n– 6 –In this context, a nonzero value of Xsignals the existence of a pole in the two-point\nfunction of vµ(x):\nX= lim\nq→0−iqµqν/integraldisplay\nddxeiq·x/an}bracketle{tT{vµ(x)vν(0)}/an}bracketri}htconn., (1.7)\nwhich implies that\nlim\nq→0/integraldisplay\nddxeiq·x/an}bracketle{tT{vµ(x)vν(0)}/an}bracketri}htconn.= iqµqν\nq2X\nq2. (1.8)\nThat is, the topological susceptibility is the residue of a pole at q2= 0 in a (gauge-\ndependent) two-point function. Because of the gauge dependen ce, this pole does not\nsignal the existence of a propagating particle, but it does relate to important long-\ndistance correlations in the theory [ 37].\nAn interesting perspective on the Kogut-Susskind pole is that it sign als that the\ninfrared theory has a description in terms of an emergent ( d−1)-form gauge field [ 38–\n41]:\n⋆j0→IRdCd−1. (1.9)\nA (d−1)-form gauge field has no propagating degrees of freedom, but t here can be\ndomain walls carrying a gauge charge under it, and such fields prove u seful in various\napplications (see, e.g., [ 42–45]).\nWe would like to propose a reinterpretation of the emergent ( d−1)-form gauge\ntheory. Ingeneral, spontaneousbreakingofa p-formU(1)globalsymmetryisassociated\nwith the emergence of a p-formNambu-Goldstone gauge field in the IR. Inthe standard\ncase of a 0-form symmetry, we think of this simply as a compact boso n, but as we have\nargued, such bosons can also be thought of as 0-form gauge fields . Ap-form gauge field\nhas a complementary description in terms of a magnetic dual ( d−p−2)-form gauge\nfield, whose field strength is the Hodge dual of the original field stre ngth:\n⋆dap∼dbd−p−2. (1.10)\nIt is unclear what it would mean to seek a ( −1)-form gauge field emerging in the IR\ndescription of a spontaneously broken ( −1)-form global symmetry, but the magnetic\ndual makes perfect sense: it should be a ( d−1)-form gauge field, precisely as in ( 1.9).\nThus, we argue that the Kogut-Susskind pole can be thought of as signaling that the\nIR theory admits an emergent description in terms of a ( d−1)-form Nambu-Goldstone\ngauge field. There is no Nambu-Goldstone boson, because there are no propagating\ndegrees of freedom; nonetheless, the Nambu-Goldstone fieldcan be useful.\nOneexample oftheutility ofsuch adescription ariseswhen wegauget he(−1)-form\nglobal symmetry. When we gauge a spontaneously broken p-form global symmetry, the\n– 7 –resulting theory is in the Higgs phase. We can summarize the phenome non of higgsing\nand its magnetic dual, confinement, by saying that in this phase elect rically charged\nworldvolumes haveboundaries (they can end on a vacuum insertion) and magnetically\ncharged worldvolumes areboundaries (they are confined by a higher-dimensional ob-\nject). Manyoftheconsequences ofhiggsinghaveanalogueswhen wecoupleadynamical\naxion field to a spontaneously broken ( −1)-form global symmetry. To name a few:\n•The gauge field acquires a mass. For the axion, this is apparent: the re is a\npotentialV(θ) and the axion mass is proportional to Xat the minimum of the\npotential.\n•Electric charges are screened. In the axion case, the electrically c harged objects\nare instantons. We can think of the local operator eiθ(x)as the analogue of a\nWilson line: it inserts a static instanton configuration at a point. The e ffects of\nthis insertion in correlation functions fall off at long distances, beca use the axion\nis massive.\n•Magnetic charges are confined. In the axion case, these are vort ices, codimension-\ntwo objects in spacetime around which the axion field winds. They are charged\nunder the gauge field Bd−2dual toθ. This field is eaten by the emergent ( d−1)-\nform gauge field via a Stueckelberg structure of the form |dBd−2−Cd−1|2[41].\nEquivalently, axion vortices are the boundaries of domain walls, which carry\ncharge under Cd−1.\nWe consider this set of parallels to be a strong argument that our de finition of sponta-\nneous breaking of a ( −1)-form global symmetry is a useful one, allowing us to success-\nfully apply intuition from more standard cases in a different context.\n1.3 Application to the Strong CP problem\nThe language that we have introduced above provides a useful fra mework for thinking\nabout the Strong CP problem. The Strong CP problem is the puzzle th at the Standard\nModel admits a CP-violating term of the form1\n8π2¯θ/integraltext\ntr(G∧G),5but experiment finds\nthat this term is extraordinarily small, |¯θ|/lessorsimilar10−10[46,47]. This cries out for some\nexplanation in terms of symmetries or dynamics. Because the CKM ph ase in the quark\nmixing matrix has been measured to be an O(1) number, the simplest answer that our\nuniverse respects CP is not a viable one. A number of solutions to this puzzle have\nbeen proposed over the years.\n5The physical quantity ¯θin fact is a linear combination of the coefficient of tr( G∧G) and the phase\nof the determinant of the quark mass matrix; here we assume we ha ve rephased the quarks to move\nthe physical quantity entirely into the gluonic term.\n– 8 –From our perspective, the Strong CP problem is closely related to th e existence of\na spontaneously broken ( −1)-form U(1) global symmetry of the Standard Model, with\ncharge the QCD instanton number. The symmetry itself allows us to t urn on a ¯θterm\n(in the absence of an additional symmetry like CP, which would forbid a constantθ(x)\nbackground field on generic spacetimes). The spontaneous break ing of the symmetry\nallows¯θto affect physical observables like the neutron EDM. This suggests that a\nuseful strategy for solving the Strong CP problem is to seek mecha nisms for eliminating\nthis global symmetry. A global symmetry can be eliminated by effects that explicitly\nbreak the symmetry, or by gauging. As already noted in [ 19], two different classic\nsolutions to the Strong CP problem, the QCD axion and the massless u p quark, can\nbe understood as different ways of gauging the ( −1)-form global symmetry. Explicitly\nbreaking the symmetry is more challenging, since the underlying char ge is topological.\nNonetheless, there are physical mechanisms that can break such symmetries. We will\ndiscuss some of these mechanisms, and see that for the most part they do not offer a\nsatisfactory resolution of the Strong CP problem. A final, classic se t of solutions to\nthe Strong CP problem rely on the spontaneous breaking of an orien tation-reversing\nspacetime symmetry (parity or CP). These mechanisms, again, are linked to the fate\nof the (−1)-form symmetry, since the topological charge is not defined on t he non-\norientable spacetime backgrounds that are allowed in such theories .\n1.4 Outline\nThe remainder of this text is structured as follows. In section 2we present a discussion\non how generic abelian gauge theories in the Coulomb phase can be und erstood as\ndescribing spontaneously broken higher form symmetries. We argu e that this still\nholds in 2d, where Maxwell theory realizes a spontaneously broken ( −1)-form U(1)\nsymmetry. We examine several deformations of this theory and pr opose universal\nfeatures of spontaneously broken ( −1)-form symmetries. In section 3we argue that\nthe instantonic symmetry of SU( N) Yang Mills and QCD is spontaneously broken and\nlink this fact with the Strong CP problem. In section 4we explore solutions to the\nStrong CP problem from this point of view. We list some open questions and provide\nan outlook in section 5.\n2 Gauge theories as spontaneously broken phases\nStandard lore holds that abelian gauge theories in the Coulomb phase describe spon-\ntaneously broken higher form symmetries. The lore further specifi es that the Nambu-\nGoldstone bosons realizing the spontaneously broken symmetries n onlinearly are the\n– 9 –photons themselves.6This section aims to show that this lore holds even in 2 dtheories,\nwhere the higher-form symmetry is a ( −1)-form symmetry. To gain some intuition we\nreview Maxwell’s theory in 4 dand 3d, making our way to the two-dimensional world.\nThen we describe abelian gauge theories in 2 dand give explicit realizations of the con-\ncepts introduced in Sec. 1. As we will describe, 2 dgauge theories have instantons that\nare charged under a ( −1)-form symmetry that is spontaneously broken.\n2.14dMaxwell theory\nFree electromagnetism is a theory of a U(1) gauge field Awith field strength F= dA\nand the following action,\nS=/integraldisplay\n−1\n2e2F∧⋆F. (2.1)\nThe equation of motion for the gauge field is d ⋆F= 0. This equation signals the\nexistence of a conserved 2-form current Je=1\ne2Fthat generates a 1-form U(1)(1)\ne\nsymmetry. The topological symmetry operator can be construct ed by exponentiation\nof the current,\nUα(Σ2) = eiα\ne2/integraltext\nΣ2⋆F. (2.2)\nThis symmetry operatorcounts theelectric charge inside Σ 2andactsby linking onnon-\ndynamical probe electric charges dubbed Wilson lines. If massless ele ctrically charged\ndynamical matter, such as the electron, is added to this theory, t he electric charge of\nWilson lines is screened and the U(1)(1)\nesymmetry is explicitly broken. Provided that\nthe gauge group is U(1), electric charge is quantized and α∈[0,2π), as befits a U(1)(1)\ne\nsymmetry. The gauge field obeys a topological constraint, the Bian chi identity d F= 0.\nAs before, this equation signals the existence of a conserved 2-fo rm magnetic current\nJm=⋆Fthat generates a U(1)(1)\nmsymmetry. Exponentiation of the current yields the\nsymmetry operators ˜Uα(Σ2) that measure the magnetic charge inside of Σ 2. If the\ngauge group is U(1),/contintegraltextF\n2π∈Z, which is a topological invariant labeling gauge bundles\nby their monopole number. The topological nature of the magnetic s ymmetry makes\nexplicitly breaking it a non-perturbative statement in the action in Eq uation (2.1).\nIn other words, no modification of the Lagrangian, no matter how d rastic it is, can\nexplicitly break this symmetry as long as Ais a U(1) gauge field.\nA 1-form symmetry is generated by codimension 2 topological opera tors. There\nis no invariant way of defining an action of an operator of such dimens ionality on\nlocal operators. This implies that a local operator can’t transform under a 1-form\nsymmetry. This is not true for local operators that are not gauge invariant, which\n6This also holds for the compact scalar, which we understand as a gau ge boson for a ( −1)-form\nU(1) symmetry. It nonlinearly realizes a spontaneously broken 0-f orm symmetry.\n– 10 –do not correspond to physical observables. In fact the action of the electric 1-form\nsymmetry can be encoded as a shift of the gauge field by a closed but not quantized\n1-formΛ 1,A→A+Λ1,/contintegraltext\nΛ1∈[0,2π). Note that if Λ 1was quantized this shift would\ncorrespond to a largegaugetransformation. The gaugeinvariant operator transforming\nunder the symmetry is the Wilson line, defined as Wq(γ) = eiq/integraltext\nγAfor some integer q\nand its transformation rules follow from those of A. This is one of the nice features of\ngauge fields: they allow for the description of line operators in terms of local (but not\ngauge invariant) ones. A further important lesson follows from the transformation of\nA; it realizes the 1-form symmetry non-linearly. This is a familiar proper ty of Nambu-\nGoldstone bosons φin phases with spontaneously broken U(1) 0-form symmetries.\nGiven a symmetry transformation with compact parameter c∈[0,2π) the Nambu-\nGoldstone boson shifts as φ→φ+c. The lesson that follows from this observation is\nthatAis the Nambu-Goldstone boson of a spontaneously broken U(1)(1)\nesymmetry [ 2].\nThis heuristic observation can be made precise by computing the exp ectation value\nof an object charged under U(1)(1)\ne, a Wilson line. It obeys a perimeter law in the\nCoulomb phase, signaling the spontaneous breaking of the symmetr y. The Goldstone\ntheorem implies that, in a phase with a spontaneously broken U(1) 0- form symmetry,\nthe conserved current creates Nambu-Goldstone bosons from t he vacuum, which prop-\nagate a massless excitation. In the case at hand the conserved cu rrent creates a 1-form\nNambu-Goldstone boson, the photon [ 2],\n/an}bracketle{t0|Je,µν(x)|λ,p/an}bracketri}ht= (λµpν−λνpµ)eipx. (2.3)\nThe equation of motion and the Bianchi identity are exchanged unde r1\n2πF↔1\ne2⋆F.\nOne can introduce a magnetic photon ˜Aby defining a Hodge dual field strength1\n2π˜F=\n1\ne2Fand a dual coupling ˜ e= 2πe−1and the action remains invariant. In the electric\nframe an ’t Hooft line is defined as a boundary condition for the gauge field along a\n1-dimensional locus. In the dual frame however it can be defined in t erms of the dual\ngauge field Hq(γ) = eiq/integraltext\nγ˜A. If one substitutes U(1)(1)\newith U(1)(1)\nm,Awith˜Aand the\nWilson lines with ’t Hooft lines all the discussion regarding the spontane ous breaking\nof the symmetry remains unchanged. It follows that both U(1)(1)\neand U(1)(1)\nmare\nspontaneously broken in the Coulomb phase giving rise to a single Namb u-Goldstone\nboson in either the electric or magnetic frame.\nIt is interesting to note that the photon remains exactly massless e ven if both\nsymmetries are explicitly broken at some scale by adding fundamenta l matter and\ndynamical monopoles. Indeed this is plausibly what happens in our univ erse. Since\nlocal operators may not carry 1-form charge, no relevant (or irr elevant) couplings can\nspoil the emergent 1-formsymmetry, making it exact at low energie s. This fact protects\nthe masslessness of the photon. For related references see for instance [ 35,48–54].\n– 11 –2.23dMaxwell theory\nThe symmetries of 3 delectromagnetism follow a similar pattern to its 4 dcounterpart.\nThere is a U(1)(1)\ne1-form symmetry under which Wilson lines are charged. In this\ncase, however, the magnetic symmetry is 0-form U(1)(0)\nm. Magnetic charge is sourced\nby local operators called monopole operators which are defined by e xcising a point of\nspacetime and prescribing a boundary condition for Asourcing magnetic flux. Due\nto the change in dimensionality the gauge field Ais dual to a compact scalar field\nσ. In terms of this field the monopole operator is defined as Mp(x) = eipσ(x). In\nthe 3dworld a continuous 1-form symmetry can’t spontaneously break an d give rise to\nNambu-Goldstonemodes, aresultwhichfollowsfromageneralization oftheHohenberg-\nMermin-Wagner-Coleman theorem [ 2,33,55,56]. This implies that the electric 1-\nform symmetry can’t be spontaneously broken in 3 d. This result is made apparent by\nintroducing dynamical monopoles which give rise to a confining force b etween electric\nparticles [ 57]. The Wilson line then follows an area law, which in the large area limit\nvanishes, and the U(1)(1)\nesymmetry remains unbroken. This means that the 3 dphoton\ncan’t be understood as the Nambu-Goldstone boson for the spont aneous breaking of\nthe electric symmetry. This result follows from monopole proliferatio n, which in turn\nimplies that the vacuum is magnetically charged and the magnetic 0-fo rm symmetry\nis spontaneously broken. Furthermore, explicit computation in the magnetic frame\nshows that the matrix element between the magnetic current Jm,µ= (⋆F)µand the\ndual photon is,\n/an}bracketle{t0|Jm,µ(x)|p/an}bracketri}ht=pµeipx. (2.4)\nThe lesson is that 3 delectromagnetism can be understood as in the magnetic Coulomb\nphase and describes a spontaneously broken U(1)(0)symmetry.\nAs already mentioned, addition of magnetic monopoles leads to their p roliferation\nand the onset of confinement of electric charges. A further effec t of this proliferation\nis to give the photon a mass exponentially small in the monopole action Smon. This is\nunderstood by noticing that once dynamical monopoles are included , the magnetic 0-\nformsymmetryisonlyemergentatenergiesbelow Smon. Anemergent0-formsymmetry,\nunlike an emergent 1-form symmetry, is not enough to protect the masslessness of the\nphoton. This was beautifully exemplified by Polyakov in [ 57]. He studied how the\nphoton, when embedded in SU(2) through adjoint Higgsing gets a ma ss from vortices.\nThe magnetic symmetry is absent in the SU(2) theory and, corresp ondingly, the U(1)\nphoton is massive.\n– 12 –2.32dMaxwell theory\nWe arenow ready to tackle the wacky two dimensional world. In2 dthe Maxwell theory\nadmits aθ-term, which we omitted in the 4 dcase. It will play a starring role in our\ndiscussion, so let us spell it out,\nS=/integraldisplay\n−1\n2e2F∧⋆F+1\n2π/integraldisplay\nθF. (2.5)\nThe equation of motion is unchanged, d ⋆F= 0, and gives rise to a conserved 2-\nform current Je. The Bianchi identity is more subtle than in the higher dimensional\ncounterparts. It still reads d F= 0 but it is a tautological equation, since every top\nform is closed. As in higher dimensions, the first Chern class of a U(1) gauge bundle\nin 2 dimensions is quantized/contintegraltext\nF= 2πZ. This is what allows for the introduction of\ntheθ-term in the first place. We can use this fact to identify 2 πF=⋆j0as a magnetic\n(−1)-form U(1) current and the θ-term as the coupling to a background gauge field\nfor it,7following our definition in Equation ( 1.3). In our terminology the symmetry\nof 2dMaxwell theory is then U(1)(1)\ne×U(1)(−1)\nm.8Furthermore, in analogy with the\nhigher dimensional counterparts, it is natural to expect the ( −1)-form symmetry to be\nspontaneously broken. In the following we explore this possibility in de tail. The field\nstrength in 2 dhas a single component F01, and the action can be rewritten.\nS=/integraldisplay\nd2x/bracketleftbigg1\n2e2F2\n01+1\n2πθF01/bracketrightbigg\n. (2.6)\nIt is useful to quantize the theory by choosing the space manifold t o be a circle S1\nof radius R. By a suitable choice of gauge A0= 0 one can argue that only the zero\nmode survives and the theory can be rewritten in terms of an angula r variableφ(t) =/integraltext2πR\n0dxA1(x,t). The angular nature follows from the large gauge transformation s ofA\nwinding along the circle, which become φ→φ+2π. In terms of φthe action becomes,\nS=/integraldisplay\ndt/bracketleftbigg1\n4πe2R˙φ2+θ\n2π˙φ/bracketrightbigg\n. (2.7)\nThis is just the action for a particle in a circle in the presence of a magn etic field. The\nsystem can be quantized and has energy eigenstates ψl= eilφwith energy,\nEl=πe2R/parenleftbigg\nl−θ\n2π/parenrightbigg2\n. (2.8)\n7Given that θis a background gauge field, the meaning of the transformations θ→θ+ 2πis\nclear, they are just the large gauge transformations of the back ground gauge field. These large gauge\ntransformations shift the scalar background gauge field by a close d but not exact 0-form: a constant.\nIn the (−1)-form symmetry case this is all there is, since small gauge transf ormations, described by\nshifts by an exact 0-form, are trivially zero.\n8A SymTFT realization of this symmetry can be found in appendix C.\n– 13 –The ground state is ψ0, which we denote |0/an}bracketri}ht=|ψ0/an}bracketri}ht. The system in state ψlis charac-\nterized by a constant electric field,\nF01=e2/parenleftbigg\nl−θ\n2π/parenrightbigg\n. (2.9)\nThe ground state is the state with lowest electric field,\n/an}bracketle{tF01/an}bracketri}ht0=−e2θ\n2π. (2.10)\nThis result is hardly surprising since the classical equations of motion forA0,A1in\neq. (2.6) are∂0F01=∂1F01, whose only solution is a constant electric field. This also\nagrees with the photon not propagating any degree of freedom in 2 d. In free Maxwell\ntheory there are no electric particles but one can consider adding h eavy particles, or\nWilson lines, to probe the theory. On the circle we must add at least tw o, of opposite\ncharge and separated by a distance L. Regardless of the chosen state, the electric field\nbetween them will increase by one unit, giving rise to an energy that g rows linearly\nwithL. This shows that, even if the photon does not propagate any degr ee of freedom\nthere is a long range force that confines probe charges classically.\nClassic confinement implies that large Wilson loops obey an area law and t he elec-\ntric 1-form symmetry is not spontaneously broken. A similar check is not available for\nthe magnetic ( −1)-form symmetry. We would need a charged operator that is analo -\ngous to the ’t Hooftloopin 4 dor the monopoleoperator in 3 dbut such a thing does not\nseem to exist. As discussed in Sec. 1, we propose instead that the spontaneous breaking\nof the (−1)-form symmetry is diagnosed by an explicit dependence of the vac uum en-\nergyV(θ) on the value of the background θ. The leading measure of such dependence\nis the topological vacuum susceptibility X=∂2\n∂θ2V(θ). Given the topological density\n⋆F, the topological susceptibility can be rewritten as,\nX=−i1\n4π2/integraldisplay\nd2x/an}bracketle{tT(⋆F(X)⋆F(0))/an}bracketri}htconn.=1\n2π∂\n∂θ/an}bracketle{t⋆F/an}bracketri}ht=e2\n4π2, (2.11)\nwhich is nonzero in the present case, signaling spontaneous breakin g of the ( −1)-form\nsymmetry. So far we have linked the spontaneous breaking of the ( −1)-form symmetry\nwith a physical dependence on its gauge background. A further mo tivation for this\ndefinition is the relation between a non-vanishing Xand the appearance of a double\npole at zero momentum in the 2-point function of the photon. By con sidering the\ngauge-dependent two point function /an}bracketle{tAµ(x)Aν(y)/an}bracketri}ht, one can show that it is written in\nterms of a propagator G(q2) that satisfies,\nlim\nq2→0q2G(q2)∼ X. (2.12)\n– 14 –AlthoughG(q2) is gauge dependent, this limit matches the manifestly gauge invarian t\nquantity ( 2.11) and so the pole at q2= 0 is independent of the gauge [ 37]. While\nin higher dimensions the Kogut-Susskind pole is somewhat mysterious , there is no\nmystery in the abelian two dimensional case where the role of the non -propagating\nphoton field is well understood. In particular, it is responsible for th e long-range force\nthat confines probe particles. In this sense, the gauge field Aµmediates a long range\nforce thanks to a pole in its “propagator,” in complete analogy with Ma xwell theory in\nhigher dimensions. We conclude that the non-vanishing of the topolo gical susceptibility\nsignals the spontaneous breaking for the ( −1)-form symmetry giving rise to a Nambu-\nGoldstone fieldthat creates a long range force, even if it does not propagate.\nAfter explicitly establishing the connection between free 2 dMaxwell theory and\nthe (−1)-form symmetries introduced in sec. 1, in the following we explore the fate of\nthese universal features in theories with fermions, both massless and massive. We have\nalso considered two other 2 dmodels displaying interesting low energy dynamics that\ncan be understood in terms of the magnetic ( −1)-form symmetry but, for deference to\nthe exhausted reader, those discussions are left to the appendic es. In appendix Awe\nreview the 2 dAbelian-Higgs model while in appendix Bwe review the CPN−1model.\n2.4 The Schwinger model\nIf we couple the 2 dU(1) gauge theory with a massless Dirac fermion we obtain the\nSchwinger model. The action is,\nS=/integraldisplay\n−1\n2e2F∧⋆F+1\n2πθF+i¯ψ/Dψ. (2.13)\nExplicit computation of the equation of motion shows that the electr ic current is no\nlongerconserved. Ontheotherhandthereisstilla θ-termconsistent withourdefinition\nof (−1)-form symmetry. There is also a would-be chiral U(1) symmetry t hat is ABJ\nanomalous. The symmetry of this theory is just U(1)(−1)\nm.\nThe gauge coupling is dimensionful in two dimensions and the theory is s trongly\ncoupled in the IR. Nonetheless, it is simple enough for Schwinger to be able to solve\nit explicitly using the operator formalism [ 58]. If you are not Schwinger, a simpler\napproach was pioneered by Coleman [ 59] taking advantage of 2 dbosonization. This\nduality states that a strongly coupled fermion can be exchanged wit h a weakly coupled\nboson, provided that adictionaryisused. The fermiontheoryconfi nes classically atlow\nenergies but it is equivalently described by a theory of a free scalar w hich only couples\nto the gauge field through a topological term. In the present case the bosonized version\nof the theory takes the following form,\nS′=/integraldisplay\n−1\n2e2F∧⋆F+1\n2π(θ+φ)F+1\n8π(dφ)2. (2.14)\n– 15 –One could naively think that there is still a ground state electric field g iven by,\nF01=−e2\n2π(θ+φ). (2.15)\nHowever, we can redefine φ→φ−θto absorbθ, signaling that θis unphysical. In fact,\nthis was already apparent in the original formulation of the theory, which has an ABJ\nanomaly that allows θto be absorbed in a chiral rotation. The bottom line is that the\nelectric field in the ground state, which was proportional to θin the free Maxwell case,\ncan now relax to a vanishing value.\n/an}bracketle{t0|(⋆F)|0/an}bracketri}ht= 0. (2.16)\nIn more detail, in 2 dthe ABJ anomaly is computed by the vacuum polarization dia-\ngram. The vacuum polarizes and the electric field is screened. We high light that this\nscreening is not mediated by Schwinger pair production since the elec tric field to be\nscreened is fractional in units of the charges of the massless ferm ions.9Consequently,\nthe topological susceptibility Xvanishes and the Schwinger model does not sponta-\nneously break the ( −1)-form symmetry. By virtue of eq. ( 2.12) the vanishing of the\ntopological susceptibility implies that the pole disappears from the ga uge 2-point func-\ntion, signaling that the Nambu-Goldstone fieldhas been lifted and we are no longer in\nthe Coulomb phase. Hence we also expect the long-range force bet ween probe particles\nto vanish.\nIndeed the polarized vacuum can also screen the electric field sourc ed by probe\nparticles and the long-range force is well known to be absent in the S chwinger model\n[58,62]. We see that all our expectations regarding a theory that sponta neously breaks\na (−1)-form symmetry are negated in this model.\nWe finish our discussion by noting that the Schwinger model is equivale nt, through\nthe bosonization dictionary, to a theory where the ( −1)-form symmetry has been\ngauged. In eq. ( 2.14) the (−1)-form symmetry current J0=⋆Fhas been coupled\nto a dynamical gauge field φ(a compact scalar), which is the canonical way of gauging\nsymmetries associated to conserved currents. From this point of view, it is very natural\nthat the Schwinger model cannot possibly realize a spontaneously b roken (−1)-form\nsymmetry, since it has been gauged! This observation will be useful when we leverage\nthe knowledge gained from this toy model to understand QCD and th e Strong CP\nproblem.\n9One can also argue for this by noticing that the constant electric fie ld becomes F01=−e2\n2πφ, which\ngives a non-zero energy. Another way to argue for the field relaxin g to zero is by integrating out\nF=dAfrom2.14. One finds a quadratic potential for φ, which naturally relaxes to zero setting\nF01= 0. For related discussions see for instance [ 60,61].\n– 16 –2.5 The massive Schwinger model\nA further twist can be made by adding a mass to the Dirac fermion in th e Schwinger\nmodel. In the massless Schwinger model the vanishing of the topolog ical susceptibility\nwas intimately tied with the ABJ anomaly, which is absent in this case due to the\nfermionshavingamass. Forthisreason, weexpectthismodeltore alizeaspontaneously\nbroken (−1)-form global symmetry. If the fermion is massive enough m2≫e2, we\nrecover free Maxwell theory in the IR and our expectation is trivially satisfied. A more\ninteresting question is what happens in the opposite case of m2≪e2. Consider the\nfollowing action of a massive Dirac fermion coupled to a U(1) gauge field ,\nS=/integraldisplay\n−1\n2e2F∧⋆F+1\n2πθF+i¯ψ/Dψ−im¯ψψ. (2.17)\nIn them2≪e2regime the theory is strongly coupled in the IR. Luckily, Coleman\ntaught us how to solve it using the bosonization dictionary. The boso nized theory is\n[59,63],\nS′=/integraldisplay\n−1\n2F∧⋆F+1\n2π(θ+φ)F+1\n8π|dφ|2+m\nπǫcosφ. (2.18)\nThe only difference with the bosonized action of the massless Schwing er model is the\nlast term in Equation ( 2.18) which is absent in Equation ( 2.14). This term obstructs\nthe absorption of θby aφfield redefinition, so we expect θto be physical and to give\nrise to a vacuum electric field. As discussed in [ 59,63], this is precisely what happens.\nThere is a non-zero electric field in the vacuum, which can’t be screen ed in this case,\n/an}bracketle{t0|(⋆F)|0/an}bracketri}ht=e2\n2π(θ+φ). (2.19)\nFrom Equation ( 2.11) it follows that there is a non-zero topological susceptibility and,\nconsequently a zero momentum pole in the 2-point function of the ga uge field. Further-\nmore, this theory displays a long-range force between probe part icles. The bottom line\nis by now clear, the magnetic ( −1)-form symmetry, which was gauged in the massless\ncase, is now ungauged and spontaneously broken, giving rise to a Na mbu-Goldstone\nfieldand a long-range force.\nA difference with the pure Maxwell case is that the long range force b etween two\nparticles vanishes if the difference of their charges is a multiple of 2. T he reason is that\na Schwinger pair of massive fermions may nucleate, screening the ele ctric field created\nby the particles. We learn that the long range characteristic of spo ntaneously broken\n(−1)-form symmetries may be dynamically screened but will be present for improperly\nquantized probes. Asimilar phenomenon happens withthevacuumele ctric field, giving\na physical explanation for the periodicity of θin this model.\n– 17 –Anexplicit, numerical computation of the topologicalsusceptibility w as carried out\nin the recent work [ 61] by using a tensor network approach in the lattice, where it was\nindeed found to be non-vanishing.\n3 A different look at the Strong CP problem\nWhile 2 dimensions are fun, they are somewhat detached from the hig h energy physics\nof our universe. In this section we present two 4 dgauge theories whose low energy dy-\nnamics are governed by a spontaneously broken ( −1)-form symmetry. Namely, SU( N)\nYang-Mills theory and QCD. We will see how the low energy dynamics in th ese theo-\nries have similarities with the physics of 2 dMaxwell theory, particularly in the large N\nlimit of Yang-Mills. In the last part of this section we use this insight to r eformulate\nthe Strong CP problem as a consequence of the spontaneous brea king of a ( −1)-form\nsymmetry.\n3.1 Low energy effective theory in 4d Yang-Mills theory and QC D\nFor concreteness, let us consider SU( N) Yang-Mills theory with no light matter, which\nserves us as a toy model for QCD. The action is,\nS=/integraldisplay\ntr/parenleftbigg\n−1\ng2F∧⋆F+θ\n8π2F∧F/parenrightbigg\n. (3.1)\nAnimportantpropertyofSU( N)YMtheory, isthatthe θ-termleadstophysical effects.\nNote that this property lies at the core of the Strong CP problem. S uch a physical\ndependence on θis probed by the topological susceptibility of the vacuum Xwhich can\nbe defined as [ 64],\nX ≡/parenleftbiggd2E\ndθ2/parenrightbigg\n= lim\nq→0−i/parenleftbigg1\n16π2/parenrightbigg2/integraldisplay\nd4xeiqx/an}bracketle{t0|T(tr(Fµν˜Fµν(x))tr(Fρσ˜Fρσ(0)))|0/an}bracketri}ht.\n(3.2)\nThe low energy dynamics of 4 dYang-Mills theory is strongly coupled and notoriously\ndifficult to study. Nonetheless, the non-vanishing of the topologica l susceptibility for\ngenericθgives us important hints about the vacuum structure. As noticed b y L¨ uscher\nin [37], the 2-point function above can be recast in terms of a 2-point fun ction of the\nChern-Simons 1-form current K1, which is the Hodge dual of the Chern Simons 3-form\nK1=⋆C3, at vanishing momentum. Using the fact that ∂µKµ=1\n16π2tr(Fµν˜Fµν) one\ncan rewrite eq. ( 3.2) as,\nX= lim\nq→0−iqµqν/integraldisplay\neiqx/an}bracketle{t0|TKµ(x)Kν(0)|0/an}bracketri}htd4x. (3.3)\n– 18 –As discussed in the introduction, the non-vanishing of the topologic al susceptibility\nimplies that the two point function has a pole at q2= 0. Given that the 2-point\nfunction in question is not gauge invariant, one may be wary that this pole may be\nunphysical. Luscher argued that the pole remains in any gauge and, as we will explain,\nits physical implications are profound. The existence of this pole at z ero momentum\nsignals the appearance of a massless mode for C3in the IR. Since we believe that\nYang-Mills theory is otherwise gapped, it is natural to expect the va cuum structure of\nSU(N) Yang-Mills theory to be captured by an effective theory of a massle ss 3-form\ngauge field C3. In fact, this observation should hold for QCD as well, since Xis also\nnonzero in that case. For related discussions in Yang-Mills and QCD se e [38,65–67].\nThe precise form of the Lagrangian describing this effective theory will depend on\nstrongly coupled dynamics and is, in general, not available to us. In th e large N limit\nmatters are simpler, as discussed in [ 38,39,65,66]. At small momenta only terms\nwith less than two derivatives will be relevant. One can assume that a kinetic term is\ngenerated and all other 2-derivative terms are in fact suppresse d in the large N limit.\nIn this limit the effective theory takes the following form,\nL=−1\n2XF4∧⋆F4+1\n2πθF4. (3.4)\nWhereF4= dC3is anabelian4-formfield strength that should not be confused with F,\nthe 2-form non-abelian field strength. This action describes a 3-fo rm gauge field in 4 d\nwith a topological coupling or θ-term. This theory is reminiscent to electromagnetism\nin 2d, see2.3. In fact, the physics of both theories is very similar, as explored in, for\ninstance [ 68]. Like its 2 dcounterpart, a 3-form gauge field in 4 ddoes not propagate\nand the different vacua are characterised by a constant electric fi eld,\n/an}bracketle{t⋆F4/an}bracketri}htl= (θ+2πl)X. (3.5)\nThe energy density of these vacua is\nEl(θ) =1\n2(θ+2πl)2X. (3.6)\nThe true vacuum, or ground state, is selected by minimizing the expr ession above. One\nthen finds a non-zero electric field in the ground state,\n/an}bracketle{t⋆F4/an}bracketri}ht0=Xθ. (3.7)\nReassuringly these results match the expectations that one infer s from holography [ 69].\nAwayfromthelarge Nlimit, thepreciseformoftheactionforsuchafieldisunknown.10\n10Its form may be determined in some approximations such as the dilute instanton gas; see [ 41].\n– 19 –In general the Lagrangian will take the following form,\nL=−1\n2|F4|2+1\n2πθF4+K(F4), (3.8)\nwhereK(F4) denotes higher order contributions with F4. For instance, in QCD θand\nK(F4) will depend explicitly on the quark masses. Regardless of the precis e form of the\nLagrangian the equations of motion still admit a constant solution fo r⋆F4such that\nthe physical picture remains unchanged.\n3.2 SSB of the (−1)-formU(1)symmetry in 4d Yang-Mills theory and QCD\nAn important property of any theory with a Lagrangian of the form 3.8is that it has a\nmagnetic ( −1)-form U(1) symmetry. The existence of this symmetry follows fr om the\nBianchi identity of the C3gauge field and the quantization of/contintegraltext\nF4. From the Biachi\nidentity we identify the conserved current as,\nj0=⋆F4, (3.9)\nwhich we can couple to a background gauge field θwhich is periodic. This symmetry\nin the IR effective theory is already present in the UV of both SU( N) Yang-Mills and\nQCD: it is a Chern-Weil symmetry with conserved current [ 19],\n⋆j0=1\n8π2tr(F∧F), (3.10)\nwhere now Fis the non-abelian field strength. This symmetry is sometimes called th e\ninstantonic symmetry, as it measures the instanton number. The n on-vanishing of the\ntopologicalsusceptibility inSU( N)YMandQCDimpliesthatthephysics dependsnon-\ntrivially on the value of the background field θ. Following our discussion in section 2.3\nwe take this dependence to signal the spontaneous breaking of th e (−1)-form U(1)\nsymmetry. Finally, we identify the 3-form gauge field C3as the Nambu-Goldstone field\nof the spontaneously broken ( −1)-form symmetry.\nA further way of arguing that the ( −1)-form symmetry is spontaneously broken is\nby considering its gauging. It can be explicitly gauged by introducing a kinetic term\nfor the gauge field θ(x) and summing over it in the path integral. This is equivalent to\ncoupling the Chern-Weil current to an axion. Importantly, the axio n has a non-trivial\npotential arising from the θdependence of the vacuum energy density, i.e., the non-\nvanishing X. This potential endows the axion with a non-zero mass, signaling tha t the\ngauged(−1)-form symmetry is spontaneously broken giving rise to a Higgs mec hanism.\nFurthermore, an electric Higgs phase is dual to magnetic confineme nt. This can be\nexplicitly checked in this case by replacing θ(x) by its Hodge dual 2-form gauge field\n– 20 –dθ∼⋆dB2. The 3-form field C3is no longer massless as it picks up a mass from a\nStueckelberg-like mass term of the form,\n|dB2−C3|2, (3.11)\nwhich implies that the would-be Nambu-Goldstone field C3is eaten by the gauge field\nB2. Asimilar Stueckelberg-like massisobtainedin, e.g., thedualdescript ion ofgauging\nthe magnetic 1-form U(1) symmetry. From 3.11it follows that, to preserve gauge\ninvariance, axion strings must be attached to C3domain walls. These domain walls\nhave a finite tension, giving rise to a confining force between strings . We conclude\nthat axionic strings are confined, in agreement with the gauge ( −1)-form symmetry\nbeing spontaneously broken and Higgsed. Note that, were Xto vanish, the effective\nfield theory would not have a massless 3-form gauge field which we hav e associated\nwith the spontaneous breaking of the ( −1)-form U(1) symmetry. Furthermore, in the\ngauged ( −1)-form symmetry theory, the axion would remain massless and the (−1)-\nform symmetry unhiggsed. These two facts, together with similar c onsiderations in\nsection2lead us to propose Xas an order parameter for the spontaneous breaking of\nthe (−1)-form symmetry.\nSpontaneous Breaking of a ( −1)-form U(1) symmetry.\nA (−1)-form U(1) symmetry with background gauge field θis spontaneously\nbroken if the vacuum energy in Minkowski space Vdepends on θ. An order\nparameter for such spontaneous breaking is the topological susc eptibility:\nX=∂2\n∂θ2V(θ). (3.12)\n3.3 Reformulation of the Strong CP problem\nAn important consequence of the non-vanishing of Xin QCD is that physical observ-\nables can depend on ¯θ=θ+ Arg(det M), where Mis the quark mass matrix. An\nexample of such observable is the neutron electric dipole moment (nE DM). Experi-\nmental measurements of the nEDM place stringent constraints,\n|¯θ|/lessorsimilar10−10. (3.13)\nIn the following we will refer to ¯θasθ. That is, we take θto be the physical parameter.\nGiven that θis a free angular parameter of the quantum theory, its experiment al\nvalue is unnaturally small, giving rise to the Strong CP problem. We have argued\nthat the non-vanishing of Xand, more generally, a partition function that depends\n– 21 –onθsignal the spontaneous breaking of the ( −1)-form U(1) Chern-Weil symmetry of\nQCD. More broadly, a theory with a spontaneously broken ( −1)-form symmetry has a\nphysical dependence on a circle valued background field θ. Ifθis measured to be too\nsmall, a naturalness problem arises. The Strong CP problem is the QCD avatar of this\nnaturalness problem. We can now extract a necessary condition fo r the QCD Strong\nCP problem to arise.\nA necessary condition for the Strong CP problem in QCD.\nA necessary condition for Quantum Chromodynamics to have a Stro ng CP prob-\nlem is that the global ( −1)-form U(1) symmetry is spontaneously broken.\nIn the next section we will use this necessary condition for the Stro ng CP problem\nto arise in QCD to provide a new perspective on the problem and its solu tions.\n4 Solutions to the Strong CP problem and its analogues\nWe have argued that the Strong CP problem is intimately tied with a spo ntaneously\nbroken (−1)-form U(1) symmetry that arises in the Standard Model. If the p hysics\nassociated with this spontaneous breaking is prevented in some way , the Strong CP\nproblem should be solved. This problem has direct analogues in various other theories\nwith spontaneously broken, global ( −1)-form symmetries, some of which are easier to\nanalyze because they are low-dimensional, as we have discussed abo ve. In this section,\nwe discuss various solutions to the Strong CP problem from this pers pective.\n4.1 Solving the problem by gauging with an axion\nThe classic Peccei-Quinn-Weinberg-Wilczek solution to the Strong CP problem [ 70–73]\nmay be thought of as gaugingthe (−1)-form global U(1) symmetry with a dynamical\naxion field θ(x). The existence of a ( −1)-form global U(1) symmetry means that our\ntheory can be consistently coupled to a background axion field θ(x); we now simply\nsum over all such possible backgrounds in the path integral.\nIn the analogue problem in 2 dMaxwell theory, we have already introduced the\nrelevant action in ( 2.14), where the field φplays the role of the dynamical axion. Such\na coupling explicitly removes the physical dependence on θby polarizing the vacuum\nand screening the constant electric field. In this case, the original 0-form U(1) gauge\nsymmetry is Higgsed. One can see this explicitly by dualizing φto˜φ. The resulting\nkinetic term is ∼ |d˜φ−A|2, which shows that Ais made massive by a Stueckelberg\nmechanism. However, the ( −1)-form U(1) gauge symmetry is alsohiggsed, eliminating\n– 22 –the Kogut-Susskind pole. Wecan see this by dualizing thefield streng thF= dAto a 0-\nform integer field strength n, which acquires a Stueckelberg-type “kinetic term” |n−φ|2\nthat can also be interpreted as a potential that makes the gauge fi eldφfor the (−1)-\nformsymmetry massive. Ingeneral, we expect higgsing ofa ( −1)-formgaugesymmetry\ntocorrespond toconfinement ofaxionvortices bydomainwalls. Int he(1+1)dcase, the\ndomainwallsaresimplyparticleschargedunder A, whiletheoperatorei˜φinsertsastatic\nvortex at a point in spacetime. Because ˜φshifts under Agauge transformations, such\na vortex musthave an attached domain wall. This is the expected dual confinement\nphenomenon. Higher-dimensional analogues of this have been exte nsively discussed in\nthe literature on inflation [ 44,45].\nFor the Strong CP problem in QCD, the relevant coupling takes the fo llowing form:\nS⊂1\n8π2/integraldisplay\nθ(x)tr(G∧G). (4.1)\nThe Vafa-Witten theorem [ 74] ensures that the axion potential generated by QCD\ndynamics sets the effective low-energy θangle to zero. As in the 2 dcase, this term\ndescribes the coupling of the ( −1)-form symmetry current j0=1\n8π2⋆tr(G∧G) to a\ndynamical gauge field, the axion. The net effect is that the ( −1)-form symmetry is\ngauged. The axion equation of motion then shows that the instanto n number current\nbecomes co-exact,\nf2d⋆dθ=1\n8π2tr(G∧G). (4.2)\nThis exactness conditionisequivalent to gauging: anexact current integrates tozero on\nany closed manifold, implying that there are no charged operators t hat may link with\nthe symmetry operators ei/contintegraltext⋆j. There are thus no objects charged under a symmetry\ngenerated by an exact current. This is the chief property of a gau ge symmetry in gauge\ntheory. As discussed in §3.2, the gauged ( −1)-form symmetry is in a higgsed phase,\nwhich is reflected in the confinement of magnetically charged object s (axionic strings)\nby axion domain walls.\n4.2 Solving the problem by gauging with massless fermions\nA second canonical solution to the Strong CP problem is to postulate a chiral massless\nfermion. In the case of 2 dMaxwell theory the resulting theory is the Schwinger model,\nwhose action we wrote in ( 2.13). Such a massless chiral fermion comes with an ABJ\nanomaly for the chiral symmetry that allows the θangle to be rotated away, making\nit an unphysical parameter. This effect is particularly explicit in the 2 dcase thanks to\nthe 2dbosonization by which the Schwinger model is equivalent to the boson ic theory\nin eq. (2.14), where the θis absorbed by a redefinition of the compact scalar field. It\n– 23 –is now clear what is happening in terms of the ( −1)-form symmetry. The ( −1)-form\nsymmetry hasbeen gauged, making its spontaneous breaking innoc uous. It followsthat\nthe ground state electric field is screened by a polarized vacuum and the Strong CP\nproblem is avoided. In 2 dimensions it is clear that these two solutions t o the Strong\nCP problem are really the same. Furthermore, the lesson that addin g massless fermions\ngauges (−1)-formsymmetries holds more generally. Forinstance, in Yang-Mills , adding\na massless fermion produces an ABJ anomaly for the chiral current Jc,\nd⋆Jc=1\n8π2tr(F∧F). (4.3)\nThis equation implies that ⋆j0=1\n8π2F∧Fis (globally) exact, and hence (as explained\nin [19]) the (−1)-form symmetry is gauged. As in Sec. 4.1, this gauged ( −1)-form\nsymmetry is in a Higgs phase. In this case, although there is no elemen tary axion\nfield, there is still a magnetic confinement phenomenon. The confine d vortices are the\nboundaries of η′domain walls, which have chiral excitations carrying baryon number,\nas described in [ 75].\n4.3 Solving the problem with non-compact symmetries\nAn alternative solution to the CP problem was proposed in [ 76]. As discussed there,\nif one considers a 2 dabelian gauge theory with gauge group Rinstead of U(1), the\nanalogue of the Strong CP problem is immediately solved. The reason f or this to work\nis most easily understood in terms of the ( −1)-form symmetry, which we recall, is the\nmagnetic symmetry of the U(1) gauge theory in 2 d. As is well known, for the gauge\ngroup Rthe would-be magnetic symmetry operators act trivially.11In more detail,\nthere is a topological constraint that/integraltext\nMF= 0 for any closed 2-manifold M, so a/integraltext\nMθF\nterm for constantθdoes not affect the physics. In particular, the vacuum energy is\nindependent ofconstant θandsowewouldnotsaythatthetheoryspontaneouslybreaks\na (−1)-form symmetry. Physically, a background electric field on a non- compact space\ncan be screened by combinations of particles with mutually irrational electric charges.\nAn analogous 4 dsetup to this 2 dtheory requires modifying the instanton sum by\ncoupling to a topological theory (TQFT) with a non-compact 3-form gauge field [ 32].\n11Equivalently one maysaythat an Rgaugetheoryis obtained fromthe U(1) theoryby performinga\ntopologicalgaugingofthe U(1) magnetic symmetry. This gaugingise nforced bycouplingthe magnetic\ncurrent to a non-dynamical (i.e. with no kinetic term) U(1) gauge fie ld with only flat connections and\nsumming over it. In the present case this auxiliary field is a flat compac t scalar. From this point\nof view, the Strong CP problem is avoided also in this case by gauging th e (−1)-form symmetry. A\nSymTFT discussion of this model and the topological gauging can be f ound in appendix C. We thank\nAndrea Antinucci for comments on this point and for careful expla nation of his recent paper [ 77].\n– 24 –As in the 2dtheory however, a dynamical mechanism, i.e., adding mutually irration ally\ncharged domain walls, is needed to relax θand fully solve the Strong CP problem.\nFor the Strong CP problem of the Standard Model, [ 76] also proposed a related\nmechanism, relying on a non-compact axion fielda(x), which has couplings\n/integraldisplay1\n8π2[ξHa(x)tr(GH∧GH)+ξa(x)tr(G∧G)]. (4.4)\nHereG(x) is the usual Standard Model gluon field strength, while GHis the field\nstrength of a hidden Yang-Mills group that confines at a much higher scale. This\nconfinement generates a potential with a set of minima for a(x). IfξHandξare\nmutuallyirrational, thentheinfinitesetofminimaofthe GH-generatedpotentialallows\nthe effective theta term of QCD to scan over a dense discretuum of values, some of\nwhich will be very small. One then must invoke a cosmological argument for why\nwe find ourselves in a universe with such a small value. In our language , this model\nhas gauged a ( −1)-form Rglobal symmetry, which is an irrational combination of two\n(−1)-form U(1) global symmetries. This is only possible with an axion field that is\nnon-compact.\nThe common feature of the models of [ 32,76] is the introduction of non-compact\ngauge fields (either an ordinary gauge field, or an axion, or a three- form field). This\ncan enable novel solutions of CP problems in quantum field theory, bu t we expect that\nsuch models do not have consistent UV completions in quantum gravit y (see, e.g., [ 11]).\n4.4 Failing to solve the problem with explicit breaking\nAs we have discussed, standard solutions to the Strong CP problem rely on gauging the\n(−1)-form global symmetry. One might wonder if, instead, we could sim ply break the\nsymmetry explicitly. In the following we discuss a couple of strategies that implement\nthis idea but that ultimately fail to solve the problem.\n4.4.1 Explicit breaking via gauging and mixed anomalies\nFirst, itisoftenthecasethatwecanbreakasymmetry bygauginga different symmetry\nwith which it has a mixed anomaly.12One can attempt this strategy for solving the\n2dMaxwell theory analogue of the Strong CP problem, as follows. A well known fact\nabout Maxwell theory in any number of dimensions is that it has a U(1)(1)\ne×U(1)(d−3)\nm\nsymmetry under which Wilson lines and ’t Hooft operators are charge d. There is an\nobstruction to gauging these two symmetries at the same time, or a mixed ’t Hooft\n12There are many exceptions to this statement when gauging gives ris e to a 2-group structure or\nnon-invertible symmetries, see for instance [ 78–82]. Here we restrict to anomalies that break the\nungauged symmetry.\n– 25 –anomaly, that can be succinctly encapsulated in terms of the backg round gauge fields\nBeandBmby its anomaly polynomial,\nA=1\n2πdBe∧dBm. (4.5)\nIn the 2dcase these facts also hold, with the background field for the magne tic sym-\nmetry being θitself. In this case the anomaly polynomial is,\nA2d=1\n2πdBe∧dθ. (4.6)\nIt follows that an easy way of breaking the magnetic ( −1)-form symmetry is to gauge\nthe electric symmetry. The gauging is implemented by coupling the elec tric symmetry\nto a background gauge field Be, adding suitable local counterterms and summing over\nthe background field configurations in the path integral. The result ing action is13\nS=/integraldisplay\n−1\n2e2(F−Be)∧⋆(F−Be)+1\n2πθ(F−Be). (4.7)\nA first observation is that the kinetic term for the gauge field becom es a Stueckelberg-\nlike coupling and the U(1) gauge field is “eaten” by Be. This mass term removes the\npole from the photon 2-point function, destroying the long range f orce. Thus, the\ninfrared physics of the theory is trivial, and X= 0. Whether one considers this to be\na solution of the 2d CP problem or not is perhaps a matter of semantic s: the problem\nis gone, but so is all of the physics, since the photon is gapped.\nEven this pyrrhic victory is lost in the case of the actual Strong CP p roblem for\nQCD. The analogue would be to gauge a U(1) 3-form symmetry that h as an anomaly\npolynomial of the form\nA4d=1\n2πdB4∧dθ, (4.8)\nwithB4a background gauge field for the 3-form symmetry. However, QCD has no\nsuch 3-form symmetry! The 3-form gauge field associated with the Kogut-Susskind\npole emerges in the IR, rather than existing as a fundamental UV fie ld. There is no\nelectric 3-form global symmetry associated with it that we can gaug e.\n4.4.2 Explicit breaking in the UV\nIt ispossible that the( −1)-formU(1) globalsymmetry associated withQCD instantons\nis explicitly broken in the UV. Because the symmetry is topological, we e xpect that this\nwill occur only when thegaugegroup itself issomehow modified in theUV . Anexample\n13A similar computation has recently appeared in section 4.1.2 of [ 83].\n– 26 –was discussed in [ 19]. Suppose that the Standard Model gauge group is embedded in\nSU(5) (and let us ignore fermions for the moment, which slightly comp licate the story\nwithout changing the punchline). The UV theory has a single ( −1)-form Chern-Weil\nsymmetry with current\nj0SU(5)=1\n8π2⋆tr(FSU(5)×FSU(5)). (4.9)\nIn the IR however, there are three such Chern-Weil symmetries, one for each field\nstrength. Clearly, two linear combinations thereof are emergent in the low energy\ntheory, and explicitly broken in the UV. One could then ask: could the UV breaking of\nan emergent ( −1)-form symmetry be sufficient to remove the Nambu-Goldstone po le\nand solve the Strong CP problem? From one point of view, the answer should be no,\nas it would be a dramatic failure of decoupling if physics at the GUT scale could set\nthe topological susceptibility computed in the infrared limit of QCD to z ero. From a\ndifferent point of view, however, one may have the intuition that Nam bu-Goldstone\npoles are fragile and easily removed by UV effects. Thus, it is worth dis cussing this\npoint in more detail.\nA well-known fact about Nambu-Goldstone bosons parametrizing th e degenerate\nvacua of a spontaneously broken 0-form symmetry is that, if the s ymmetry is not\nexact in the UV, they get a small mass [ 84]. Consider for instance a symmetry that\nis explicitly broken by some irrelevant coupling with a characteristic sc ale ΛUV. If\nthe emergent symmetry is spontaneously broken at a scale Λ IR, the pseudo-Goldstone\nboson will typically have a mass scaling like ∼(ΛIR/ΛUV)p, wherepis some power\ndepending on the specific details.\nA surprising feature of Nambu-Goldstone bosons for spontaneou sly broken 1-form\nsymmetries is that their masslessness remains protected even if th e symmetry is only\napproximate in the sense above. In other words, 1-form symmetr ies (and higher) are\nexact emergent symmetries [ 54]. An example of this fact is the electromagnetic field\nthat we observe in nature. At low energies there are two U(1) symm etries, electric and\nmagnetic. At high energies these two symmetries are explicitly broke n by the presence\nof electric fermions and, presumably, magnetic monopoles. Those t wo symmetries are\nspontaneously broken and the Nambu-Goldstone boson is the phot on, which is exactly\nmassless despite the explicit breaking in the UV. More detailed example s were given\nin [54]. A difference with 0-form symmetries is that no local operator can b e charged\nunder a 1-form symmetry, which implies that emergent 1-form symm etries are exact\nin perturbation theory. The standard lore is that this helps in keepin g the photon\nmassless.\nFor the case of ( −1)-form symmetries one can pose a similar question: If the ( −1)-\nformsymmetry isemergent intheIR, isthemassless natureofthee mergent gaugefield,\n– 27 –i.e., the pole, protected? In other words, are emergent ( −1)-form symmetries exact?\nThis question is relevant because the pole is behind all the features o f spontaneously\nbroken (−1)-form symmetries and, in particular, if there is no pole, there is no vacuum\nelectric field and, thus, no Strong CP problem. If ( −1)-form symmetries behave like\n0-form symmetries it should be possible to lift the pole by changing the UV physics in\nsuch a way that the ( −1)-form symmetry is explicitly broken.\nAgain, it is useful to consider the case of Maxwell theory in various d imensions.\nIn 3d, where the photon is dual to a compact scalar, Maxwell theory has an electric\n1-form symmetry and a magnetic 0-form symmetry. The magnetic 0 -form symmetry\ncan be explicitly broken in the UV by embedding U(1) gauge theory in SU (2) gauge\ntheory, higgsed by a real adjoint scalar field. This theory admits a f amous semiclassical\nanalysis of confinement due to Polyakov [ 57], in which magnetic monopoles (which are\ninstantons in 3 d) produce an exponentially small mass for the dual photon. Thus, in\nthis case, the would-be Nambu-Goldstone boson is removed by the e xplicit breaking of\na 0-form symmetry.\nOn the other hand, in 2 dMaxwell theory, the magnetic symmetry is a ( −1)-form\nsymmetry. Again, the magnetic symmetry can be explicitly broken by embedding the\nU(1) gauge theory in SU(2); no axion coupling that UV completes1\n2πθFis possible\nin that theory, because the SU(2) field strength is not gauge invar iant. There are no\ninstanton effects in this theory, and the photon should remain mass less. Thus, in this\ncase we expect that thepole associated with the spontaneous bre aking of the ( −1)-form\nsymmetry is still present in the IR, despite the explicit breaking of th e symmetry in\nthe UV. We expect a similar behavior in the case of SU(5) breaking into the SM gauge\ngroup in 4d, and leave a detailed investigation for a future study.\nWe expect that the lesson here generalizes: a Nambu-Goldstone po le can be re-\nmoved only in the case where the Nambu-Goldstone is protected by a 0-form symmetry\nthatisexplicitlybrokenintheUV.TheKogut-Susskindpoleisassociat edwithanemer-\ngent (d−1)-formgauge field, and can be protected by either a ( d−1)-formsymmetry or\na (−1)-form symmetry, and hence its existence is robust against UV sy mmetry break-\ning ind >1 spacetime dimensions. Thus, embedding the Standard Model in a GU T\nshould not have any impact on the Strong CP problem.\n4.5 Solving the problem with gauged reflection symmetries\nAside fromthe axion, the most well-studied solutionto the Strong CP problem assumes\na fundamental spacetime reflection symmetry, which is either a gen eralized parity sym-\nmetry [85] or CP symmetry [ 86–89]. Here we will refer to the latter case, generally\nknown as Nelson-Barr models, though our remarks will apply more br oadly. Theories\nwith a spacetime reflection symmetry can be defined on non-orienta ble manifolds. On\n– 28 –such a space,1\n8π2tr(F∧F) is not defined, because F∧Fis an ordinary differential\nform, but only pseudo-forms can be integrated without a choice of orientation. Thus,\nthe instanton number is not well-defined (although a topological inva riant valued in Z2\nsurvives). However, by our definition, these theories still have a ( −1)-form U(1) global\nsymmetry, becausetheycanbeconsistentlycoupledtoabackgro undpseudoscalar axion\nfieldθ(x), which transforms with a minus sign under spacetime reflections. F urther-\nmore, the symmetry is still spontaneously broken, because on Minkowski space we can\nstill turn on an arbitrary constant ¯θterm and evaluate a nonzero topological suscep-\ntibility (3.2). However, the only constant θ(x) backgrounds that can be defined on an\narbitrary space are¯θ= 0 and ¯θ=π. Thus, the reflection symmetry requires that the\ntheory be defined with one of these two special ¯θterms, and the Strong CP problem\ncould, in principle, be solved.\nThe difficulty begins when we recall that the world in which we live is not CP\nsymmetric, and indeed the CP-violating phase in the CKM matrix is an O(1) number.\nThus, if we live in a universe with an underlying CP symmetry, the symme try must be\nspontaneously broken, and (at least as measured by the CKM phas e) badly so. Below\nthe scale of CP breaking, we should match the fundamental theory onto a theory\nwithout CP, and such a theory in principle admits an arbitrary consta nt¯θterm. The\nlow-energy value of ¯θneed not be one of the special values ¯θ= 0 orπdefining the\ntheory in the ultraviolet, because integrating out massive particles that couple to CP-\nbreaking can generate effective contributions to ¯θin the IR. Nelson-Barr models are\nengineered so that such effects are small, whereas the CKM phase is large. It is difficult\ntogiveapurelysymmetry-based explanationofhowtheywork, with outdelvingintothe\ndetailed structure of the quark mass matrices, which must be enfo rced with additional\n(model-dependent) gauge symmetries.\n5 Outlook\nIn this work we have extended the notion of spontaneous breaking to (−1)-form U(1)\nsymmetries and started the exploration of its applications. We finish this text with\nsome open questions.\n•We have provided a useful working definition of a ( −1)-form U(1) symmetry and\nits spontaneous breaking, but it would be useful to put ( −1)-form symmetries\nin general on a more similar footing to other p-form symmetries in QFT. For\nexample, the SymTFT approach could be a useful way to formulate ( −1)-form\nsymmetries. Itwouldalsobeinterestingtogainabetterunderstan dingofwhether\n(−1)-form Rsymmetries are a useful concept in QFT.\n– 29 –•We have explored several solutions to the Strong CP problem which, broadly\nspeaking, aim at removing the Nambu-Goldstone fieldby either gauging or ex-\nplicitly breaking the ( −1)-form symmetry. It turns out that gauging has been\nextensively covered in the literature. On the other hand, it seems t o us that ex-\nplicit breaking is still poorly understood and we hope to study it furth er in future\nwork. Besides, theexplicit breaking ofthe( −1)-formsymmetry bymonopoleshas\nnot been thoroughly investigated except in the case of U(1) gauge theory [19]. It\nwould be interesting to examine the case of more general gauge gro ups, including\nGrand Unified Theories.\n•A fundamental ingredient in our understanding of spontaneous br eaking of con-\ntinuous (higher form) symmetries is the Goldstone Theorem. While we have\nestablished the presence of a pole in the 2-point function of a Nambu -Goldstone\nfieldwhenever a ( −1)-form U(1) symmetry is spontaneously broken, we have\nnot been able to explicitly prove a theorem that follows the reasoning of the\nusual Goldstone theorem. Difficulties arise because the symmetry o perator fills\nthe entire spacetime and cannot be deformed, and because there are no (−1)-\ndimensional charged operators that can obtain vacuum expectat ion values. A\nbetter understanding of the formalism of ( −1)-form symmetries may overcome\nthese obstacles and provide a more direct Goldstone Theorem.\n•While most of the solutions to the Strong CP-problem that are discus sed in\nour paper are concentrated on lifting the ( −1)-form U(1) symmetry, Nelson-Barr\nmodels are conceptually different. Unlike the other solutions that lea d to no\ndependence of the vacuum energy on θ, Nelson-Barr models are constructed such\nthat the value of θis small. It remains an open question to understand a generic\nsymmetry-based explanation for such models.\n•Axion-like fields play a role in several solutions to longstanding natura lness prob-\nlems in particle physics. A prime example is the hierarchy problem, which sees\npotential mitigation through the relaxion model [ 90,91]. This model introduces\nan axion-like field having a coupling with the Higgs mass term. Another e xample\nis the axion monodromy framework for inflation [ 43]. In these models the axion\ncouplings appear to violate the axionperiodicity but it is restored by m onodromy,\nmuch as in the 2 dMaxwell example we discussed in Sec. 2.3. Understanding the\ninterplay between monodromy and SSB of ( −1)-form symmetries in such models\nwould be interesting.\nWe hope that this novel case of spontaneous symmetry breaking w ill prove a useful\nunifying tool for physical phenomena.\n– 30 –Acknowledgements\nWe wish to thank Andrea Antinucci, Riccardo Argurio, Diego Delmastr o, Ben Heiden-\nreich, Ohad Mamroud, Jake McNamara, Miguel Montero, Tom Rudeliu s, John Stout,\nHo Tat Lam, Angel Uranga, and Irene Valenzuela for insightful con versations. The\nwork of DA is supported by the U.S. Department of Energy (DOE) un der Award DE-\nSC0015845. The work of EGV has been partially supported by Marga tita Salas award\nCA1/RSUE/2021-00738 and by MIUR PRIN Grant 2020KR4KN2 “Str ing Theory as\na bridge between Gauge Theories and Quantum Gravity”. MR is suppo rted by the\nDOE Grant DE-SC0013607. MS is supported by JSPS KAKENHI Grant Numbers\nJP22J00537. EGV also thanks the Simons Center for Geometry and Physics and its\nSummer Physics Workshop for kind hospitality where part of this wor k was completed.\nMS would like to thank Fermilab theory division for their hospitality.\nA The 2dAbelian-Higgs model\nA nice exposition of this model, which we follow, may be found in [ 92,93]. Consider\nthe action,\nS=/integraldisplay\nd2x1\n2e2F2\n01+θ\n2πF01+|Dφ|2−m2|φ|2−λ\n2|φ|4. (A.1)\nAs already mentioned, in 2 dthe gauge coupling is dimensionful and the theory is\nstrongly coupled in the IR. Hence, the regime |m2|/lessorsimilare2will be complicated to solve.\nConsider instead |m2|≫e2. There are then two regimes to consider,\n•m2≫e2: In this case the gauge symmetry is not spontaneously broken and the\ntheoryisjustelectrodynamicswithaheavyscalarmeson. Thebeha viourissimilar\nto the massive Schwinger model. In particular, there is a vacuum elec tric field, a\nnon-zero topological susceptibility and a long range constant forc e mediated by\nthe photon. We conclude that there is a magnetic ( −1)-form symmetry in the IR\nwhich is spontaneously broken.\n•m2≪ −e2: In this case the gauge symmetry is spontaneously broken by the\ncondensationofthescalarfield. Thenaiveexpectationisthatthep hotonbecomes\nmassive, the long-range force is screened, the topological susce ptibility vanishes\nand there is no electric field in the vacuum. We therefore expect tha t the (−1)-\nform symmetry is not spontaneously broken. It turns out that th is expectation\nis wrong. Due to non-perturbative effects mediated by instantons (which are\nvortices in 2 dimensions), the gauge symmetry is restored, there is a long-range\nforce between probe particles and there is a vacuum electric field wh ich depends\n– 31 –linearly with θ. In fact the physics is the same as in the m2≫e2regime but all\neffects are exponentially suppressed. We learn that the ( −1)-form symmetry is,\ncontrary to expectation, realized in the IR and spontaneously bro ken!\nB The CPN−1model\nThis model has been extensively discussed in the literature, we follow [94,95]. The\nCPN−1model can be defined by the following Euclidean action,\nS=/integraldisplay\nd2x1\n2e2|F|2+iθ\n2πF+N/summationdisplay\na=1|Dφa|2+λ\n2/parenleftBiggN/summationdisplay\na=1|φa|2−v2/parenrightBigg2\n,(B.1)\nwhichdescribesasetof NmassivecomplexscalarfieldswithanSU( N)globalsymmetry\nand coupled to a U(1) gauge field. Classically we expect the scalar pot ential to be\nminimized, spontaneously breaking the SU( N) symmetry to SU( N−1)×U(1),\n|φa|2=v2. (B.2)\nThus, classically, the low energy is described by N−1 massless scalar fields (Goldstone\nbosons) with target space,\nCPN−1=SU(N)\nSU(N−1)×U(1). (B.3)\nThis is of course in contradiction with the MWC theorem and it is well kno wn that\nstrong dynamics radically change the low energy physics of this theo ry. We will not\nreview the computations but merely state the result. It turns out that the low energy\ndynamics is that of Nmassive scalar fields coupled to a U(1) gauge field, whose dy-\nnamics is emergent in the IR14. The mass is given by a dynamically generated scale\nΛCPN−1analog to Λ QCD. The resulting dynamics are pretty much the same as the ones\nof the abelian-Higgs model in the unbroken phase:\n•There is an electric field in the vacuum. In the large N limit it was compute d in\n[37,96],\n/an}bracketle{tF01/an}bracketri}ht ∼Λ2\nCPN−1\nNθ+O(1/N). (B.4)\n•It follows that the topological susceptibility, which is the order para meter for the\n(−1)-form symmetry SSB, takes a non-zero value,\nX ∼Λ2\nCPN−1\nN. (B.5)\n14In fact, if one starts with no kinetic term for the UV gauge field a non zero kinetic term is dynam-\nically generated in the IR. In this sense, the U(1) dynamics are emer gent.\n– 32 –•There is a long range force between fractionally quantized probe pa rticles. Inte-\nger quantized particles don’t experience such force because they are screened by\nSchwinger pair production.\n•The spectrum is composed of mesons. As the θangle is dialed from 0 to 2 πaφφ⋆\npair is created and the spectrum undergoes a flow.\n•Interestingly all these phenomena are not exponentially suppress ed as befits an\ninstanton effect, signaling that one can’t hope to explain them using s emiclassical\ntechniques.\n•We conclude that there is a ( −1)-form symmetry which is spontaneously broken\nand all the expected features are present.\nNote that this model has many of the salient features of QCD. It is w ell-known that\nit hasθ-vacua, a dynamically generated scale and instantons that are insu fficient to\nexplain the low energy physics. We learn now that it shares a further feature with\nQCD, namely an ( −1)-form symmetry which is spontaneously broken.\nC A SymTFT for 2dMaxwell theory.\nThe SymTFT [ 97–99] of a given ddimensional Quantum Field Theory Tdis ad+ 1\nTQFT that encodes the (categorical) symmetry of Tdand of all other theories that can\nbe obtained from Tdby a topological manipulation. The SymTFT is placed on a ( d+1)\nslab with two boundaries. On one of them the boundary condition is no t topological\nand the local degrees of freedom live. On the other boundary a top ological boundary\ncondition is imposed that prescribes the symmetry of Tdonce the slab is collapsed to\nrecoverTd. Different topological boundary conditions encode the symmetry o f theories\nobtained from Tdby a topological manipulation.\nThis construction has recently been extended to abelian continuou s symmetries\nin [77,100]. In this appendix we present the SymTFT for 2 dabelian gauge theories,\nwhich is an application of [ 77]. This construction puts ( −1)-form U(1) symmetries in\nthe same footing as more familiar symmetries and also clarifies the rela tion between\nthe (−1)-form symmetries of abelian gauge theories with different global f orms of the\ngauge group.\nConsider a 3 dBF theory with action,\nS=1\n2π/integraldisplay\nφdb2, (C.1)\n– 33 –where both φandb2areRgauge fields15. This means that they don’t have any large\ngauge transformations and charged operators with arbitrary re al coefficients are al-\nlowed. In this case there are local operators and surfaces,\nUα(x) = eiαφ(x),˜Uβ(Σ2) = eiβ/integraltext\nΣ2b2, (C.2)\nwhereα,βare real-valued. The braiding between these operators is,\n/an}bracketle{tUα(x)˜Uβ(Σ2)/an}bracketri}ht=e2παβ·Link(x,Σ2). (C.3)\nThis SymTFT encodes the symmetry of continuous free abelian gaug e theories in 2 d.\nDifferent topological boundary conditions correspond to a choice o f mutually transpar-\nent bulk operators that can terminate on the boundary, i.e. their b raiding is trivial.\nDifferent boundary conditions give different symmetries on the boun dary. Here we\nmention those corresponding to the global forms that we have enc ountered in the main\ntext16.\n•DirichletBoundaryConditions(DBC’s)for b2allowtheWilsonsurfaces ˜Uβ(Σ2) =\neiβ/contintegraltext\nΣ2b2to endonthe boundary, giving rise toa R1-formsymmetry. Thetopolog-\nical symmetry operators on the boundary are Uα(x). For the variational problem\nto be well posed φmust obey Neumann Boundary Conditions (NBC’s), which\nimply that it must be summed over in the 2 dtheory. This sum explicitly imple-\nments the topological gauging mentioned in footnote 11. The total symmetry of\nthe 2dtheory is an R1-form symmetry, which is the symmetry of the R2dgauge\ntheory that we met in section 4.3.\n•Mixed boundary conditions are allowed. In particular, one may impose NBC’s\nfor the Zpiece of both fields and DBC’s for the remaining U(1) ≃R/Zpieces\n[100]. These boundary conditions allow operators ˜Uβ(Σ2) withβ∈Zto end on\ntheboundary. The endpoints becomethe chargedlines under a U(1 )(1)symmetry.\nThe remaining operators ˜Uβ(Σ2) withβ∈U(1) can be placed on the boundary\nand correspond to symmetry operators generating a U(1)(−1)symmetry. The\noperatorsUα(x) = eiαφ(x),α∈Zcan’t end onthe boundarybecause they arezero-\ndimensional, so the U(1)(−1)symmetry does not have charged operators . Finally,\nthe operators Uα(x) = eiαφ(x),α∈U(1) are topological on the boundary and\ngenerate the U(1)(1)symmetry. We conclude that the total symmetry is,\nU(1)(1)×U(1)(−1), (C.4)\n15For the case of φthis means that it is a non-compact scalar field.\n16The different boundary conditions can be expressed in terms of a va riational problem that must\nbe well-defined, see [ 82,100] for a similar discussion. We refrain from going into such details and\nmerely state the results here.\n– 34 –which matches the symmetry of the U(1) gauge theory discussed in section2.3.\nThe SymTFT of the gauge theories with electric matter can be similarly realized by\nturningφinto a compact scalar. Through this exercise we see that ( −1)-form symme-\ntries are very similar to more usual symmetries, at least from the Sy mTFT point of\nview. We plan to return to these considerations in more generality an d depth in future\nwork.\n– 35 –References\n[1] A. Kapustin and N. Seiberg, “Coupling a QFT to a TQFT and Du ality,”\nJHEP04(2014) 001 ,arXiv:1401.0740 [hep-th] .\n[2] D. Gaiotto, A. Kapustin, N. Seiberg, and B. Willett, “Gen eralized Global\nSymmetries,” JHEP02(2015) 172 ,arXiv:1412.5148 [hep-th] .\n[3] P. R. S. Gomes, “An Introduction to Higher-Form Symmetri es,”\narXiv:2303.01817 [hep-th] .\n[4] M. Reece, “TASI Lectures: (No) Global Symmetries to Axio n Physics,”\narXiv:2304.08512 [hep-ph] .\n[5] S. Schafer-Nameki, “ICTP Lectures on (Non-)Invertible Generalized Symmetries,”\narXiv:2305.18296 [hep-th] .\n[6] T. D. Brennan and S. Hong, “Introduction to Generalized G lobal Symmetries in QFT\nand Particle Physics,” arXiv:2306.00912 [hep-ph] .\n[7] S.-H. Shao, “What’s Done Cannot Be Undone: TASI Lectures on Non-Invertible\nSymmetry,” arXiv:2308.00747 [hep-th] .\n[8] L. Bhardwaj, L. E. Bottini, L. Fraser-Taliente, L. Gladd en, D. S. W. Gould,\nA. Platschorre, and H. Tillim, “Lectures on generalized sym metries,”\nPhys. Rept. 1051(2024) 1–87 ,arXiv:2307.07547 [hep-th] .\n[9] R. Luo, Q.-R. Wang, and Y.-N. Wang, “Lecture Notes on Gene ralized Symmetries\nand Applications,” 7, 2023. arXiv:2307.09215 [hep-th] .\n[10] J. Polchinski, “Monopoles, duality, and string theory ,”\nInt. J. Mod. Phys. A 19S1(2004) 145–156 ,arXiv:hep-th/0304042 .\n[11] T. Banks and N. Seiberg, “Symmetries and Strings in Fiel d Theory and Gravity,”\nPhys. Rev. D 83(2011) 084019 ,arXiv:1011.5120 [hep-th] .\n[12] D. Harlow and H. Ooguri, “Symmetries in quantum field the ory and quantum\ngravity,” Commun. Math. Phys. 383no. 3, (2021) 1669–1804 ,\narXiv:1810.05338 [hep-th] .\n[13] T. Rudelius and S.-H. Shao, “Topological Operators and Completeness of Spectrum\nin Discrete Gauge Theories,” JHEP12(2020) 172 ,arXiv:2006.10052 [hep-th] .\n[14] B. Heidenreich, J. McNamara, M. Montero, M. Reece, T. Ru delius, and I. Valenzuela,\n“Non-invertible global symmetries and completeness of the spectrum,”\nJHEP09(2021) 203 ,arXiv:2104.07036 [hep-th] .\n[15] C. C´ ordova, D. S. Freed, H. T. Lam, and N. Seiberg, “Anom alies in the Space of\nCoupling Constants and Their Dynamical Applications I,”\nSciPost Phys. 8no. 1, (2020) 001 ,arXiv:1905.09315 [hep-th] .\n– 36 –[16] C. C´ ordova, D. S. Freed, H. T. Lam, and N. Seiberg, “Anom alies in the Space of\nCoupling Constants and Their Dynamical Applications II,”\nSciPost Phys. 8no. 1, (2020) 002 ,arXiv:1905.13361 [hep-th] .\n[17] Y. Tanizaki and M. ¨Unsal, “Modified instanton sum in QCD and higher-groups,”\nJHEP03(2020) 123 ,arXiv:1912.01033 [hep-th] .\n[18] J. McNamara and C. Vafa, “Baby Universes, Holography, a nd the Swampland,”\narXiv:2004.06738 [hep-th] .\n[19] B. Heidenreich, J. McNamara, M. Montero, M. Reece, T. Ru delius, and I. Valenzuela,\n“Chern-Weil global symmetries and how quantum gravity avoi ds them,”\nJHEP11(2021) 053 ,arXiv:2012.00009 [hep-th] .\n[20] T. Vandermeulen, “Lower-Form Symmetries,” arXiv:2211.04461 [hep-th] .\n[21] T. Vandermeulen, “Gauge Defects,” arXiv:2310.08626 [hep-th] .\n[22] E. Sharpe, “An introduction to decomposition,” arXiv:2204.09117 [hep-th] .\n[23] J. Polchinski, “Dirichlet Branes and Ramond-Ramond ch arges,”\nPhys. Rev. Lett. 75(1995) 4724–4727 ,arXiv:hep-th/9510017 .\n[24] M. Bauer, G. Girardi, R. Stora, and F. Thuillier, “A Clas s of topological actions,”\nJHEP08(2005) 027 ,arXiv:hep-th/0406221 .\n[25] D. S. Freed, Z. Komargodski, and N. Seiberg, “The Sum Ove r Topological Sectors\nandθin the 2+1-Dimensional CP1σ-Model,”\nCommun. Math. Phys. 362no. 1, (2018) 167–183 ,\narXiv:1707.05448 [cond-mat.str-el] .\n[26] E. Witten, “The ”Parity” Anomaly On An Unorientable Man ifold,”\nPhys. Rev. B 94no. 19, (2016) 195150 ,arXiv:1605.02391 [hep-th] .\n[27] J. McNamara and M. Reece, “Reflections on Parity Breakin g,”\narXiv:2212.00039 [hep-th] .\n[28] D. Harlow and T. Numasawa, “Gauging spacetime inversio ns in quantum gravity,”\narXiv:2311.09978 [hep-th] .\n[29] T. Pantev and E. Sharpe, “Notes on gauging noneffective gr oup actions,”\narXiv:hep-th/0502027 .\n[30] T. Pantev and E. Sharpe, “String compactifications on Ca labi-Yau stacks,”\nNucl. Phys. B 733(2006) 233–296 ,arXiv:hep-th/0502044 .\n[31] T. Pantev and E. Sharpe, “GLSM’s for Gerbes (and other to ric stacks),”\nAdv. Theor. Math. Phys. 10no. 1, (2006) 77–121 ,arXiv:hep-th/0502053 .\n[32] N. Seiberg, “Modifying the Sum Over Topological Sector s and Constraints on\nSupergravity,” JHEP07(2010) 070 ,arXiv:1005.0002 [hep-th] .\n– 37 –[33] E. Lake, “Higher-form symmetries and spontaneous symm etry breaking,”\narXiv:1802.07747 [hep-th] .\n[34] D. M. Hofman and N. Iqbal, “Goldstone modes and photoniz ation for higher form\nsymmetries,” SciPost Phys. 6no. 1, (2019) 006 ,arXiv:1802.09512 [hep-th] .\n[35] N. Iqbal and J. McGreevy, “Mean string field theory: Land au-Ginzburg theory for\n1-form symmetries,” SciPost Phys. 13(2022) 114 ,arXiv:2106.12610 [hep-th] .\n[36] J. B. Kogut and L. Susskind, “How to Solve the η→3πProblem by Seizing the\nVacuum,” Phys. Rev. D 11(1975) 3594 .\n[37] M. Luscher, “The Secret Long Range Force in Quantum Fiel d Theories With\nInstantons,” Phys. Lett. B 78(1978) 465–467 .\n[38] G. Gabadadze, “On field / string theory approach to theta dependence in large n\nYang-Mills theory,” Nucl. Phys. B 552(1999) 194–208 ,arXiv:hep-th/9902191 .\n[39] G. Gabadadze and M. A. Shifman, “Vacuum structure and th e axion walls in\ngluodynamics and QCD with light quarks,” Phys. Rev. D 62(2000) 114003 ,\narXiv:hep-ph/0007345 .\n[40] G. Gabadadze and M. Shifman, “QCD vacuum and axions: Wha t’s happening?,”\nInt. J. Mod. Phys. A 17(2002) 3689–3728 ,arXiv:hep-ph/0206123 .\n[41] G. Dvali, “Three-form gauging of axion symmetries and g ravity,”\narXiv:hep-th/0507215 .\n[42] R. Bousso and J. Polchinski, “Quantization of four form fluxes and dynamical\nneutralization of the cosmological constant,” JHEP06(2000) 006 ,\narXiv:hep-th/0004134 .\n[43] E. Silverstein and A. Westphal, “Monodromy in the CMB: G ravity Waves and String\nInflation,” Phys. Rev. D 78(2008) 106003 ,arXiv:0803.3085 [hep-th] .\n[44] N. Kaloper and L. Sorbo, “A Natural Framework for Chaoti c Inflation,”\nPhys. Rev. Lett. 102(2009) 121301 ,arXiv:0811.1989 [hep-th] .\n[45] N. Kaloper, A. Lawrence, and L. Sorbo, “An Ignoble Appro ach to Large Field\nInflation,” JCAP03(2011) 023 ,arXiv:1101.0026 [hep-th] .\n[46] C. Abel et al., “Measurement of the Permanent Electric Dipole Moment of th e\nNeutron,” Phys. Rev. Lett. 124no. 8, (2020) 081803 ,arXiv:2001.11966 [hep-ex] .\n[47]Particle Data Group Collaboration, R. L. Workman et al., “Review of Particle\nPhysics,” PTEP2022(2022) 083C01 .\n[48] D. Forster, H. B. Nielsen, and M. Ninomiya, “Dynamical S tability of Local Gauge\nSymmetry: Creation of Light from Chaos,” Phys. Lett. B 94(1980) 135–140 .\n– 38 –[49] X.-G. Wen, “Emergent anomalous higher symmetries from topological order and from\ndynamical electromagnetic field in condensed matter system s,”\nPhys. Rev. B 99no. 20, (2019) 205139 ,arXiv:1812.02517 [cond-mat.str-el] .\n[50] N. Seiberg and S.-H. Shao, “Exotic Symmetries, Duality , and Fractons in\n2+1-Dimensional Quantum Field Theory,” SciPost Phys. 10no. 2, (2021) 027 ,\narXiv:2003.10466 [cond-mat.str-el] .\n[51] J. McGreevy, “Generalized Symmetries in Condensed Mat ter,”\narXiv:2204.03045 [cond-mat.str-el] .\n[52] Y. Hidaka and D. Kondo, “Emergent higher-form symmetry in Higgs phases with\nsuperfluidity,” arXiv:2210.11492 [hep-th] .\n[53] R. Verresen, U. Borla, A. Vishwanath, S. Moroz, and R. Th orngren, “Higgs\nCondensates are Symmetry-Protected Topological Phases: I . Discrete Symmetries,”\narXiv:2211.01376 [cond-mat.str-el] .\n[54] S. D. Pace and X.-G. Wen, “Exact emergent higher-form sy mmetries in bosonic\nlattice models,” arXiv:2301.05261 [cond-mat.str-el] .\n[55] N. D. Mermin and H. Wagner, “Absence of ferromagnetism o r antiferromagnetism in\none-dimensional or two-dimensional isotropic Heisenberg models,”\nPhys. Rev. Lett. 17(1966) 1133–1136 .\n[56] S. R. Coleman, “There are no Goldstone bosons in two-dim ensions,”\nCommun. Math. Phys. 31(1973) 259–264 .\n[57] A. M. Polyakov, “Quark Confinement and Topology of Gauge Groups,”\nNucl. Phys. B 120(1977) 429–458 .\n[58] J. S. Schwinger, “Gauge Invariance and Mass. 2.,” Phys. Rev. 128(1962) 2425–2429 .\n[59] S. R. Coleman, “More About the Massive Schwinger Model, ”\nAnnals Phys. 101(1976) 239 .\n[60] C. Adam, “Massive Schwinger model within mass perturba tion theory,”\nAnnals Phys. 259(1997) 1–63 ,arXiv:hep-th/9704064 .\n[61] L. Funcke, K. Jansen, and S. K¨ uhn, “Topological vacuum structure of the Schwinger\nmodel with matrix product states,” Phys. Rev. D 101no. 5, (2020) 054507 ,\narXiv:1908.00551 [hep-lat] .\n[62] J. H. Lowenstein and J. A. Swieca, “Quantum electrodyna mics in two-dimensions,”\nAnnals Phys. 68(1971) 172–195 .\n[63] S. R. Coleman, R. Jackiw, and L. Susskind, “Charge Shiel ding and Quark\nConfinement in the Massive Schwinger Model,” Annals Phys. 93(1975) 267 .\n– 39 –[64] E. Witten, “Current Algebra Theorems for the U(1) Golds tone Boson,”\nNucl. Phys. B 156(1979) 269–283 .\n[65] G. Veneziano, “U(1) Without Instantons,” Nucl. Phys. B 159(1979) 213–224 .\n[66] P. Di Vecchia and G. Veneziano, “Chiral Dynamics in the L arge n Limit,”\nNucl. Phys. B 171(1980) 253–272 .\n[67] C. Rosenzweig, J. Schechter, and C. G. Trahern, “Is the E ffective Lagrangian for\nQCD a Sigma Model?,” Phys. Rev. D 21(1980) 3388 .\n[68] A. Aurilia, H. Nicolai, and P. K. Townsend, “Hidden Cons tants: The Theta\nParameter of QCD and the Cosmological Constant of N=8 Superg ravity,”\nNucl. Phys. B 176(1980) 509–522 .\n[69] E. Witten, “Theta dependence in the large N limit of four -dimensional gauge\ntheories,” Phys. Rev. Lett. 81(1998) 2862–2865 ,arXiv:hep-th/9807109 .\n[70] R. D. Peccei and H. R. Quinn, “Constraints Imposed by CP C onservation in the\nPresence of Instantons,” Phys. Rev. D16(1977) 1791–1797 .\n[71] R. D. Peccei and H. R. Quinn, “CP Conservation in the Pres ence of Instantons,”\nPhys. Rev. Lett. 38(1977) 1440–1443 .\n[72] S. Weinberg, “A New Light Boson?,” Phys. Rev. Lett. 40(1978) 223–226 .\n[73] F. Wilczek, “Problem of Strong P and T Invariance in the P resence of Instantons,”\nPhys. Rev. Lett. 40(1978) 279–282 .\n[74] C. Vafa and E. Witten, “Restrictions on Symmetry Breaki ng in Vector-Like Gauge\nTheories,” Nucl. Phys. B 234(1984) 173–188 .\n[75] Z. Komargodski, “Baryons as Quantum Hall Droplets,”\narXiv:1812.09253 [hep-th] .\n[76] T. Banks, M. Dine, and N. Seiberg, “Irrational axions as a solution of the strong CP\nproblem in an eternal universe,” Phys. Lett. B 273(1991) 105–110 ,\narXiv:hep-th/9109040 .\n[77] A. Antinucci and F. Benini, “Anomalies and gauging of U( 1) symmetries,”\narXiv:2401.10165 [hep-th] .\n[78] C. C´ ordova, T. T. Dumitrescu, and K. Intriligator, “Ex ploring 2-Group Global\nSymmetries,” JHEP02(2019) 184 ,arXiv:1802.04790 [hep-th] .\n[79] Y. Choi, C. Cordova, P.-S. Hsin, H. T. Lam, and S.-H. Shao , “Noninvertible duality\ndefects in 3+1 dimensions,” Phys. Rev. D 105no. 12, (2022) 125016 ,\narXiv:2111.01139 [hep-th] .\n[80] C. Cordova and K. Ohmori, “Noninvertible Chiral Symmet ry and Exponential\nHierarchies,” Phys. Rev. X 13no. 1, (2023) 011034 ,arXiv:2205.06243 [hep-th] .\n– 40 –[81] Y. Choi, H. T. Lam, and S.-H. Shao, “Noninvertible Globa l Symmetries in the\nStandard Model,” Phys. Rev. Lett. 129no. 16, (2022) 161601 ,\narXiv:2205.05086 [hep-th] .\n[82] J. A. Damia, R. Argurio, and E. Garcia-Valdecasas, “Non -invertible defects in 5d,\nboundaries and holography,” SciPost Phys. 14no. 4, (2023) 067 ,\narXiv:2207.02831 [hep-th] .\n[83] T. Pantev and E. Sharpe, “Decomposition and the Gross-T aylor string theory,”\narXiv:2307.08729 [hep-th] .\n[84] S. Weinberg, “Approximate symmetries and pseudoGolds tone bosons,”\nPhys. Rev. Lett. 29(1972) 1698–1701 .\n[85] R. N. Mohapatra and G. Senjanovic, “Natural Suppressio n of Strong PandT\nNoninvariance,” Phys. Lett. B 79(1978) 283–286 .\n[86] A. E. Nelson, “Naturally Weak CP Violation,” Phys. Lett. B 136(1984) 387–391 .\n[87] A. E. Nelson, “Calculation of θBarr,”Phys. Lett. B 143(1984) 165–170 .\n[88] S. M. Barr, “Solving the Strong CP Problem Without the Pe ccei-Quinn Symmetry,”\nPhys. Rev. Lett. 53(1984) 329 .\n[89] S. M. Barr, “A Natural Class of Non-Peccei-Quinn Models ,”\nPhys. Rev. D 30(1984) 1805 .\n[90] P. W. Graham, D. E. Kaplan, and S. Rajendran, “Cosmologi cal Relaxation of the\nElectroweak Scale,” Phys. Rev. Lett. 115no. 22, (2015) 221801 ,\narXiv:1504.07551 [hep-ph] .\n[91] L. E. Ibanez, M. Montero, A. Uranga, and I. Valenzuela, “ Relaxion Monodromy and\nthe Weak Gravity Conjecture,” JHEP04(2016) 020 ,arXiv:1512.00025 [hep-th] .\n[92] S. Coleman, Aspects of Symmetry: Selected Erice Lectures . Cambridge University\nPress, Cambridge, U.K., 1985.\n[93] D. Tong, “Gauge theory,” Lecture notes, DAMTP Cambridge 10(2018) .\n[94] E. Witten, “Instantons, the Quark Model, and the 1/n Exp ansion,”\nNucl. Phys. B 149(1979) 285–320 .\n[95] D. Tong. https://www.damtp.cam.ac.uk/user/tong/gaugetheory/g t.pdf.\n[96] A. D’Adda, M. Luscher, and P. Di Vecchia, “A 1/n Expandab le Series of Nonlinear\nSigma Models with Instantons,” Nucl. Phys. B 146(1978) 63–76 .\n[97] D. Gaiotto and J. Kulp, “Orbifold groupoids,” JHEP02(2021) 132 ,\narXiv:2008.05960 [hep-th] .\n– 41 –[98] F. Apruzzi, F. Bonetti, I. n. Garc´ ıa Etxebarria, S. S. H osseini, and S. Schafer-Nameki,\n“Symmetry TFTs from String Theory,”\nCommun. Math. Phys. 402no. 1, (2023) 895–949 ,arXiv:2112.02092 [hep-th] .\n[99] D. S. Freed, G. W. Moore, and C. Teleman, “Topological sy mmetry in quantum field\ntheory,”arXiv:2209.07471 [hep-th] .\n[100] T. D. Brennan and Z. Sun, “A SymTFT for Continuous Symme tries,”\narXiv:2401.06128 [hep-th] .\n– 42 –" }, { "title": "2402.00125v1.Migration_of_low_mass_planets_in_inviscid_disks__the_effect_of_radiation_transport_on_the_dynamical_corotation_torque.pdf", "content": "MNRAS 000, 1–11 (2023) Preprint 2 February 2024 Compiled using MNRAS L ATEX style file v3.0\nMigration of low-mass planets in inviscid disks:\nthe effect of radiation transport on the dynamical corotation torque\nAlexandros Ziampras1⋆, Richard P. Nelson1, Sijme-Jan Paardekooper1,2\n1Astronomy Unit, School of Physics and Astronomy, Queen Mary University of London, London E1 4NS, UK\n2Faculty of Aerospace Engineering, Delft University of Technology, Kluyverweg 1, 2600 AA Delft, The Netherlands\nAccepted XXX. Received YYY; in original form ZZZ\nABSTRACT\nLow-mass planets migrate in the type-I regime. In the inviscid limit, the contrast between the vortensity trapped inside the\nplanet’s corotating region and the background disk vortensity leads to a dynamical corotation torque, which is thought to slow\ndown inward migration. We investigate the e ffect of radiative cooling on low-mass planet migration using inviscid 2D hydro-\ndynamical simulations. We find that cooling induces a baroclinic forcing on material U-turning near the planet, resulting in\nvortensity growth in the corotating region, which in turn weakens the dynamical corotation torque and leads to 2–3 ×faster in-\nward migration. This mechanism is most e fficient when cooling acts on a timescale similar to the U-turn time of material inside\nthe corotating region, but is nonetheless relevant for a substantial radial range in a typical disk ( R∼5–50 au). As the planet\nmigrates inwards, the contrast between the vortensity inside and outside the corotating region increases and partially regulates\nthe effect of baroclinic forcing. As a secondary e ffect, we show that radiative damping can further weaken the vortensity barrier\ncreated by the planet’s spiral shocks, supporting inward migration. Finally, we highlight that a self-consistent treatment of ra-\ndiative di ffusion as opposed to local cooling is critical in order to avoid overestimating the vortensity growth and the resulting\nmigration rate.\nKey words: planet–disc interactions — accretion discs — hydrodynamics — methods: numerical\n1 INTRODUCTION\nMore than 5500 exoplanets have been discovered so far1, and\ntheir population shows remarkable diversity in orbital parameters,\nmasses, and multiplicity. The idea that these planets formed in cir-\ncumstellar disks is supported by both the direct observation of plan-\nets embedded in the disk around PDS 70 with VLT (Keppler et al.\n2018; Ha ffert et al. 2019), as well as kinematic signatures in ob-\nservations of gas emission with ALMA (e.g., Teague et al. 2018).\nUnderstanding how planets formed and evolved to their current state\nis a key goal of modern astrophysics.\nThe final orbital configuration of a planet is directly a ffected by its\ninteraction with the disk it is embedded in. The disk exerts a torque\non the planet, which causes it to migrate through the disk (Goldreich\n& Tremaine 1979; Ward 1997a; Tanaka et al. 2002). The migration\nrate depends on the disk’s properties as well as on the planet’s mass,\nwith low-mass planets migrating in the rapid type-I regime (Ward\n1997a). For a recent review, see Paardekooper et al. (2022).\nModeling planet–disk interaction over long timescales is not an\neasy task. The population synthesis approach (e.g., Mordasini et al.\n2009a,b) and N-body modeling (e.g., Coleman & Nelson 2014;\nIzidoro et al. 2017) are computationally inexpensive and cover a\nwide range of parameters in a relatively short time, but rely on\nanalytical prescriptions for the torques acting on the embedded\n⋆E-mail: a.ziampras@qmul.ac.uk\n1https://exoplanetarchive.ipac.caltech.edu/planet(s). Hydrodynamical simulations, on the other hand, are sig-\nnificantly more computationally restrictive, but allow a full treat-\nment of planet–disk interaction that yields more accurate results.\nHydrodynamical modeling is favorable for massive-enough plan-\nets, where planet–disk interaction becomes nonlinear (Rafikov 2002)\nand gap opening can occur (Crida et al. 2006). It is also crucial\nfor low-viscosity disks, where the corotation torque can desaturate\n(Paardekooper et al. 2011) and dynamical corotation torques can\ncome into play (McNally et al. 2017), as well as for non-isothermal\ndisks, where thermal e ffects can even reverse the direction of mi-\ngration (Kley & Crida 2008; Pierens 2015). In light of the recent\nparadigm shift towards low-turbulence disks, where accretion is\nthought to be powered by MHD-driven winds (Bai & Stone 2013),\nand the constraints on the radiative properties of protoplanetary disks\nthrough their dust distribution (Birnstiel et al. 2018), the need for un-\nderstanding how radiative e ffects can a ffect planet migration in the\nnearly inviscid limit is more relevant than ever.\nA simplified thermodynamics model that is often employed in\nsimulations of planet–disk interactions is the locally isothermal\nequation of state, which assumes instant cooling of the gas towards\nan equilibrium temperature. However, recent models (Miranda &\nRafikov 2019, 2020a; Ziampras et al. 2020), based on observations\n(e.g., Andrews et al. 2018; Öberg et al. 2021), highlight the impor-\ntance of a more realistic treatment of thermodynamics and therefore\nradiative e ffects, even in regions where cooling occurs on dynami-\ncal time scales. Further work has showcased the impact of thermal\ndiffusion (Ziampras et al. 2023; Miranda & Rafikov 2020b) in disk\n©2023 The AuthorsarXiv:2402.00125v1 [astro-ph.EP] 31 Jan 20242 A. Ziampras et al.\nthermodynamics. It therefore becomes clear that an investigation of\nhow radiation transport and in particular thermal di ffusion influence\nplanet migration in the marginally optically thin 20–40 au range is\nnecessary.\nIn this study, we carry out inviscid radiation hydrodynamics sim-\nulations of planet–disk interaction, with the focus being the e ffect\nof radiation transport in the type-I regime of planet migration. Our\ngoal is to investigate the source of torques related to radiative e ffects\nusing a realistic prescription of radiation transport in 2D, extend-\ning works that have focused on viscous models (e.g., Kley & Crida\n2008; Pierens 2015) but also providing an explanation on the origin\nof these “radiative” torques and constraining where in the disk they\nmight be important.\nWe describe our physical and numerical setup in Sect. 2. We\npresent our results in Sect. 3, and discuss them in Sect. 4. We then\nsummarize our findings in Sect. 5.\n2 PHYSICS AND NUMERICS\nIn this section we lay out our physical and numerical framework. We\nlist the vertically integrated hydrodynamical equations, introduce the\nsources of cooling used in our models, and describe our numerical\nsetup.\n2.1 Physics\nWe consider a disk of ideal gas with adiabatic index γ=7/5 and\nmean molecular weight µ=2.35 around a star with mass M⋆and\nluminosity L⋆. The inviscid Navier–Stokes equations then read\n∂Σ\n∂t+u·∇Σ =−Σ∇·u, (1a)\n∂u\n∂t+(u·∇)u=−1\nΣ∇P−∇(Φ⋆+ Φ p), (1b)\n∂e\n∂t+u·∇e=−γe∇·u+Q, (1c)\nwhere Σ,uandPdenote the surface density, velocity vector, and\npressure of the gas, and the internal energy density is given by the\nideal gas law as e=P/(γ−1). The stellar potential at distance R\nisΦ⋆=−GM⋆/R, where G is the gravitational constant. We can\nalso define the gas isothermal sound speed cs=√P/Σ =p\nRT/µ,\nwhere Tis the gas temperature and Ris the ideal gas constant. The\npressure scale height is then H=cs/ΩK, where ΩK=p\nGM⋆/R3is\nthe Keplerian angular velocity, and the disk aspect ratio is h=H/R.\nThe planetary potential follows a Plummer-like prescription with\na smoothing length ϵ=0.6Hpsimilar to Müller & Kley (2012) to\naccount for the vertical disk stratification:\nΦp=−GMp√\nd2+ϵ2,d=R−Rp. (2)\nFinally, Qcontains any additional radiative terms. In our models\nthe disk is heated by stellar irradiation following the passive, irradi-\nated disk model of Menou & Goodman (2004)\nQirr=2L⋆\n4πR2(1−ε)θ\nτeff, θ =Rdh\ndR, (3)\nwhereθis the flaring angle with θ=2h/7 (as T∝R−3/7, see Chiang\n& Goldreich 1997), εis the disk albedo (here ε=1/2), andτeffis an\neffective optical depth following Hubeny (1990)\nτeff=3τR\n8+√\n3\n4+1\n4τP. (4)Here,τR,P=1\n2κR,PΣis the optical depth due to the Rosseland and\nPlanck mean opacities κRandκP. We assume κR=κP=κ, following\nthe opacity model of Lin & Papaloizou (1985).\nWe then treat thermal cooling through the disk surfaces as\nQcool=−2σSBT4\nτeff, (5)\nand in-plane radiation transport with a flux-limited di ffusion ap-\nproach (FLD, Levermore & Pomraning 1981)\nQrad=√\n2πH∇· \nλ4σSB\nκRρmid∇T4!\n, ρ mid=1√\n2πΣ\nH, (6)\nwith the flux limiter λfollowing Kley (1989). The balance between\nQirr,Qcool, and Qradresults in a temperature profile T∝R−3/7.\n2.2 Vortensity growth due to cooling\nIn this study we often use the vertical component of the gas vorten-\nsity, defined in 2D as ϖ=∇×u/Σ·ˆz, to interpret our results. Taking\nthe curl of Eq. (1b) and dividing by Σyields the vortensity equation,\nwhich, for a 2D flow with uz=0, reads\n∂ϖ\n∂t+(u·∇)ϖ=∇Σ×∇P\nΣ3=S, (7)\nwhereS∝∇ Σ×∇Pis a vortensity source term due to baroclinic\nforcing. For a barotropic flow ( P=P(Σ)),ϖis conserved along\nstreamlines.\nLet us now consider a gas parcel in the planet’s corotating region.\nIn the planet’s corotating frame this parcel follows a streamline with\na horseshoe pattern (see e.g., Kley & Nelson 2012), performing a\nU-turn once behind and once ahead of the planet before completing\na closed loop. We can now analyze what happens to the vortensity of\nthe gas parcel during the U-turn at R=Rp, along the radial direction\n(see schematic in Fig. 1).\n2.2.1 Locally isothermal limit\nIn the limit where cooling happens on timescales much shorter than\nthe orbital timescale Ω−1\nK, we can assume that T(R)∝Rqis set by a\nbalance between the radiative terms listed in Sect. 2.1, and U-turning\nmaterial is expected to drive vortensity growth for q,0 (Casoli\n& Masset 2009). The vortensity of gas U-turning behind the planet\n(ϖb) will change according to\nSiso\nb=P\nTΣ3∇Σb×∇T|p=−Pb\nTbΣ3\nb ∂Σ\n∂ϕ∂T\n∂R!\f\f\f\f\f\fb=−qPb\nRpΣ3\nb∂Σ\n∂ϕ\f\f\f\f\f\nb,(8)\nwhere a subscript ‘p’ denotes the value at the planet’s radial loca-\ntion. Assuming a dense, circular envelope around the planet such\nthat∂ϕΣ|b>0 and q<0, this implies that Siso\nb>0. In other words,\nϖwill increase as material U-turns behind the planet. In a similar\nway, the vortensity of gas U-turning ahead of the planet ( ϖa) will\nchange as\nSiso\na=−qPa\nRpΣ3\na∂Σ\n∂ϕ\f\f\f\f\f\na, (9)\nresulting in a decrease in ϖsince∂ϕΣ|a<0.\nFinally, assuming that the U-turns are symmetric such that ∂ϕΣ|b=\n−∂ϕΣ|aandxa=xbforx∈[P,Σ,T], we have thatSiso\na+Siso\nb=\n0. In other words, while ϖwill increase (decrease) as material U-\nturns behind (ahead of) the planet, the total change along a closed\nhorseshoe loop is zero and ϖis ultimately conserved.\nMNRAS 000, 1–11 (2023)Planet migration in radiative disks 3\n1.0\n 0.5\n 0.0 0.5 1.0\n-1.00.01.0(RRp)/xh\n0.2\n 0.1\n 0.0 0.1 0.2\n( p)/\n-1.00.01.0(RRp)/xh\nFigure 1. Gas streamlines around an embedded planet (marked with a black\ndot) in the{R,ϕ,z=0}plane. Material just outside the planet’s corotating\nregion (CR) feels a kick as it shears past the planet (green curves). Inside the\nCR, material follows closed orbits as it U-turns behind (orange) and ahead\n(blue) of the planet. Purple orbits mark the L4 and L5 Lagrange points. The\nbottom panel is a zoom-in of the top between the dashed lines, showing that\nmaterial U-turning closer to the planet librates closer to the edge of the CR.\n2.2.2 Adiabatic limit\nWhen cooling is ine fficient, the parcel contracts (expands) adiabati-\ncally as it approaches (recedes from) the planet. This process is re-\nversible and entropy is conserved along the streamline. Each stream-\nline therefore retains its own entropy. Defining the entropy function\nK=P/Σγ, with Σ∝Rs, we initially have that K(R)∝Rξ, with\nξ=q+(1−γ)s. Assuming, without loss of generality, that ξ <0,\na high-entropy streamline at RRp, resulting in\nan entropy discontinuity near R≈Rpand a nonzeroSb. The low-\nentropy streamline will, of course, also U-turn ahead of the planet\ninto the high-entropy zone at R1.525 with a damping timescale of 0.1 orbits at the\nrespective boundary.\nThe planet is integrated using an adaptation of the N-body module\nby Thun & Kley (2018), where the correction due to the neglect of\ndisk self-gravity by Baruteau & Masset (2008b) is applied to mod-\nels where the planet is allowed to migrate. The indirect term by the\nplanet and star orbiting their common center of mass is included in\nMNRAS 000, 1–11 (2023)4 A. Ziampras et al.\nall models, but the star feels the gravitational influence of the disk\nonly in models where the planet can migrate (Crida et al. 2022). The\nplanet grows to its final mass over 10 orbits using the formula in de\nVal-Borro et al. (2006).\nIn all runs we use the FARGO algorithm (Masset 2000), imple-\nmented in PLUTO by Mignone et al. (2012). We use the hllc Rie-\nmann solver (Toro et al. 1994) with the VAN_LEER limiter (Van Leer\n1974), 2nd-order RK2timestepping and the 3rd-order WENO3 recon-\nstruction (Yamaleev & Carpenter 2009).\nWe run two sets of models, where the planet is either fixed or\nallowed to migrate through the disk. In each set we carry out the\nfollowing models:\nradiative : realistic disk with Q=Qirr+Qcool+Qrad,\nadiabatic : no radiative terms in Eq. (1c) (i.e., Q=0),\nlocally isothermal : Eq. (1c) is not solved; T=T0(R).\nThese models are sometimes tagged “ rad”, “adb”, and “ iso” in\nour plots. For consistency, we always use orange, blue, and green\nrespectively to refer to each model in all plots.\n3 RESULTS\nIn this section we present the results of our numerical models. We\nfirst focus on the vortensity evolution in models with fixed planets,\nbefore moving on to models where the planet is allowed to migrate.\nWe then investigate how di fferent cooling regimes a ffect the vorten-\nsity evolution.\n3.1 Fixed planet\nWe first compare the vortensity evolution in our models with a fixed\nplanet. Even though there is initially a radial vortensity gradient\nthrough the disk ( ϖ0(R)≈ΩK/2), the vortensity is mixed in the\nplanet’s corotating region. This process happens over the libration\ntimescale\nτlib=8πRp\n3Ωpxh. (14)\nAfter a few τlib,ϖis flat inside the corotating region and the corota-\ntion torque vanishes.\nIn Fig. 2 we compare the vortensity evolution in our fiducial mod-\nels with a fixed planet after 1 τlib. In all models ϖundergoes phase\nmixing and is roughly constant in the corotating region after a few\nlibration timescales. In the radiative model, however, a vortensity\nexcess is visible (in red) at R≈Rp±xh, indicating that vorten-\nsity is not conserved. We plot the azimuthally averaged vortensity in\nFig. 3, where we show that the excess grows with time and a ffects\nthe vortensity profile in the entire corotating region.\nThis excess, driven by cooling and unrelated to vortensity growth\ndue to the Rossby Wave Instability (Lovelace et al. 1999), is due to\nthe source termSin Eq. (7), which acts to increase ϖas material\nU-turns near the planet (see Sect. 2.2). To verify this, we plot Sfor\nall models at t=τlibin Fig. 4. Our findings agree with the expec-\ntations in Sect. 2.2: Sis zero in the adiabatic model, nonzero but\nantisymmetric about the planet in the locally isothermal model such\nthat it averages to zero, and asymmetric in the radiative model such\nthatS>0 in the corotating region. As a result, ϖin the corotating\nregion only increases in models with cooling, and in particular on\nstreamlines that U-turn very close to the planet. Since these stream-\nlines librate at the edges of the corotating region, the excess piles up\natR≈Rp±xh(see Figs. 2, 3).Given that the dynamical corotation torque for an inwardly mi-\ngrating planet is proportional to ϖp/ϖ h−1, whereϖpis the\nbackground disk vortensity at the planet’s location and ϖhis the\ncharacteristic vortensity trapped in the corotating region (McNally\net al. 2017), the vortensity growth we found in our radiative mod-\nels should result in faster inward migration. We investigate this in\nSect. 3.2.\n3.2 Migrating planet\nWe now repeat the models in Sect. 3.1, allowing the planet to migrate\nafter 10 orbits. The migration tracks for these models are shown in\nFig. 5.\nInitially, the planet migrates inwards faster in the radiative model\nthan in the adiabatic. This can be attributed to a combination of a\nweaker dynamical corotation torque due to the vortensity growth\nmechanism we described in Sects. 2.2 & 3.1, as well as an e ffec-\ntively smaller γdue to cooling (Paardekooper et al. 2010).\nAfter 200 orbits, migration in the radiative model slows down to\nmatch the adiabatic model. This becomes clear when comparing the\nmigration timescales τmig=a/˙a, which become equal for the ra-\ndiative and adiabatic models for t∼200–600 orbits. This can be\ninterpreted as the result of a combination of e ffects. For one, the dy-\nnamical corotation torque scales with the planet’s migration speed,\nsee Eq. (11), therefore partially slowing the planet down. In addi-\ntion, the vortensity excess via baroclinic forcing becomes less im-\nportant as the planet migrates inwards, because the contrast to the\nlocal vortensity ( ϖp/ϖ h) increases faster than the vortensity input\nvia baroclinic forcing in the corotating region when the planet mi-\ngrates quickly.\nTo support this argument we show that vortensity growth is not as\nefficient in the case of a migrating planet. In part, this happens be-\ncause the mechanism relies on material U-turning near the planet\nrepeatedly. As the planet migrates inwards, however, material U-\nturning behind the planet is no longer trapped in the corotating re-\ngion. Instead, the latter is now a tadpole-shaped zone in front of the\nplanet (Masset & Papaloizou 2003; Papaloizou et al. 2007), and the\nvortensity-rich streamlines behind the planet are simply left behind\nthe planet’s wake, unable to sustain the feedback loop that led to sub-\nstantial vortensity growth in the fixed case in Sect. 3.1. We illustrate\nthis picture in Fig. 6.\nHowever, after t∼600 orbits, the planet speeds up in the ra-\ndiative model, migrating roughly 3 ×and 2×faster compared to\nthe adiabatic and locally isothermal models, respectively. We in-\nterpret this as a combination of two e ffects: a rapidly migrating\nplanet will not capture as many U-turning streamlines, weakening\nvortensity growth due to cooling. This results in the planet slow-\ning down over time as the vortensity contrast to the background\ndisk increases and the dynamical corotation torque becomes more\npositive ( Γh∝dRp/dt), which is why the radiative model briefly\nmatches the adiabatic migration timescale at t∼200 orbits. By\nslowing down, however, the planet can capture more vortensity-rich\nU-turning streamlines, enhancing ϖhand weakening the dynami-\ncal corotation torque, causing the planet to speed up once again.\nThe two e ffects seemingly reach a balance after ∼1000 orbits, with\nthe planet migrating inwards without slowing down. We neverthe-\nless stress that this is only a qualitative explanation, and as such we\ncannot rule out the possibility of runaway migration in the radiative\nmodel (e.g., Pierens 2015).\nMNRAS 000, 1–11 (2023)Planet migration in radiative disks 5\n0.04\n 0.00 0.040.00.51.01.52.0( p)\nloc. iso: 65 orb.\n0.04\n 0.00 0.04adiabatic: 65 orb.\n0.04\n 0.00 0.04radiative: 65 orb.\n0.04\n 0.00 0.04radiative: 130 orb.\n0.04\n0.02\n0.000.020.04\n( p)/p\n(RRp)/Rp\nFigure 2. Two-dimensional heatmaps showing the vortensity ϖin the planet’s corotating region (CR). The first three panels from left to right compare di fferent\nmodels at t=τlib(see Eq. (14)), showing that ϖis being mixed throughout in the CR but an excess develops in the radiative run. The rightmost panel shows\nthat the excess grows with time in the radiative model. Vertical dashed lines mark the edges of the CR at ±xh(see Eq. (12)).\n0.04\n 0.00 0.04\n(RRp)/Rp\n0.03\n0.000.030.060.090.12( p)/p\nadb: 2lib\niso: 2lib\nrad: 2lib\nrad: 4lib\nFigure 3. Azimuthally averaged perturbed vortensity in the planet’s corotat-\ning region (CR) for the models in Fig. 2. The vortensity excess in the radiative\nmodel grows with time and a ffects the entire CR.\n3.3 Di fferent cooling timescales\nIn the previous sections we showed how cooling can speed up inward\nmigration. We also showed that in the limit of both ine fficient and\nrapid cooling (adiabatic and isothermal, respectively), this e ffect is\nabsent. We therefore expect that the e ffect depends on the cooling\ntimescaleβcool=tcoolΩK, and is maximized for a critical value.\nTo measure this dependency of vortensity growth on βcool, we run\na set of radiative models where we vary the reference surface den-\nsityΣrefto controlβcool. For these models, the planet is kept fixed at\nR0. We compute the cooling timescale following the prescription in\nMiranda & Rafikov (2020b)\nβ−1\ncool=β−1\nsurf+β−1\nmid, (15)\nwhereβsurfandβmidare the cooling timescales for surface and in-\n0.04\n0.000.04\nadiabatic\n0.04\n0.000.04(RRp)/Rp\nloc. iso\n0.04\n 0.02\n 0.00 0.02 0.04\n( p)/\n0.04\n0.000.04\nradiative\n0.75\n 0.50\n 0.25\n 0.00 0.25 0.50 0.75100×[pp]\nFigure 4. The baroclinic forcing term Sin Eq. (7), which leads to vortensity\ngrowth. This term is zero throughout the corotating region in the adiabatic\nmodel, averages to zero in the locally isothermal model, but is asymmetric in\nthe radiative model such that vortensity grows over time. Black curves mark\nthe position of the planetary spirals following Rafikov (2002).\nplane cooling and are given by (Ziampras et al. 2023)\nβsurf=ΣcvT\n|Qcool|ΩK,cv=R\nµ(γ−1)\nβmid=ΩK\nη \nH2+l2\nrad\n3!\n, η =16σSBT3\n3κRρ2\nmidcv,lrad=1\nκPρmid.(16)\nMNRAS 000, 1–11 (2023)6 A. Ziampras et al.\n0.60.70.80.91.0ap [30 au]adiabatic\nloc. iso\nradiative\n cooling\nLindblad\n0 1000 2000 3000 4000\ntime [orbits at 30 au]12mig=a/a [Myr]\n0.00 0.16 0.33 0.49 0.66time [Myr]\nFigure 5. Migration tracks for the models with migrating planets. The radia-\ntive model (orange) initially migrates at the locally isothermal rate (green)\nfort≲200P0, then matches the adiabatic rate (blue) until t∼600P0, and\nafterwards diverges significantly as the planet speeds up. This is also evident\nin the migration timescales τmig(bottom), which match between the radiative\nand adiabatic models for t∼200–600 P0, but then show that the planet mi-\ngrates roughly 2–3 ×as fast in the radiative model compared to the adiabatic.\nThe dashed curve marks the migration rate without corotation torques. The\npurple curve (discussed in detail in Sect. 3.4) shows a model where thermal\ndiffusion was omitted, resulting in unphysically rapid migration at the rate\ngiven by Lindblad torques only. Given that we use a wave damping zone for\nR<0.53R0, we exclude data for ap<0.55R0. The damping zone interface\nis also the reason why migration slows down in all models for ap≲0.6R0\n.\nWe then compute the quantity Ssimilar to Fig. 4 after 20 plane-\ntary orbits and integrate it over the corotating region for each model\nto obtain a proxy for the vortensity growth rate. We plot the results\nin Fig. 7 (orange curve), where we show that this integral peaks at\nβcool≈4.3 and approaches zero in the adiabatic and locally isother-\nmal limits.\nThe peak agrees very well with the estimate of the U-turn\ntimescaleβU-turn≈hτlibΩK≈3.65 in Baruteau & Masset (2008a),\nhighlighted with a vertical line in Fig. 7. This suggests that the\nvortensity growth rate is maximized when the cooling timescale is\ncomparable to the U-turn timescale of material in the corotating re-\ngion. In other words, the e ffect of cooling is strongest when it hap-\npens over a timescale similar to the time over which U-turning ma-\nterial interacts dynamically with the planet.\n3.4 The e ffect of thermal di ffusion\nOur radiative models discussed above include a treatment of ther-\nmal di ffusion along the disk plane through the flux-limited di ffusion\n(FLD) approximation. Thermal di ffusion serves to smooth out tem-\nperature gradients in the disk, and therefore could a ffect the vorten-\nsity growth rate.\nA more simplistic (but less accurate) approach would be to im-\nplement radiation transport as a local cooling term in the energy\nequation, similar to the method in Miranda & Rafikov (2020b) (see\n0.00 0.050.00.51.01.52.0( p)/\nadiabaticRp=28.50 au\n0.00 0.05radiative\n0.03\n 0.00 0.03/0\n(RRp)/Rp\nFigure 6. Similar to Fig. 2, but for the models with migrating planets. The\ncorotating region is now tadpole-shaped, with a vortensity excess around it\n(resembling a flame) in the radiative model. The vortensity-rich streamlines\nU-turning behind the planet are no longer confined to the corotating region,\nas the planet has drifted inwards by the time they would have reached the\nplanet from the front.\n101\n100101102103104\ncooling timescale cool\n108\n107\n106\n105\nxhdV[R2\nppp]\nadiabatic isothermalradiative\nlocal cooling\nUturn\n1 2 5 10 20 50R [au]\nFigure 7. The baroclinic source term Sin Eq. (7), integrated over the corotat-\ning region, as a function of the cooling timescale βcoolor the corresponding\ndistance Rfor our models. The function peaks where βcool≈βU-turn (vertical\nline), or R∼10–35 au for our setup. The orange curve shows the results for\nour radiative models, while the purple curve shows models without thermal\ndiffusion (discussed in Sect. 3.4).\nMNRAS 000, 1–11 (2023)Planet migration in radiative disks 7\nZiampras et al. 2023, for a comparison). This approach, however,\nmisses the di ffusive component of in-plane radiation transport. To\ninvestigate the di fference, we run a set of models where we replace\nQirr+Qcool+Qradin Eq. (6) with a local cooling term Qrelaxgiven by\n(e.g., Gammie 2001)\nQrelax=−4ΣcvT−T0\nβΩK, (17)\nwhere cvis the heat capacity at constant volume and β=βcoolis\nthe cooling timescale for both surface and in-plane cooling (see\nEqs. (15) & (16)). The factor of 4 is a correction following Zi-\nampras et al. (2023), obtained by linearizing Qcoolin Eq. (5). We\nnote that Dullemond et al. (2022) cite a correction of 4 +bwith\nb=dlogκ\ndlog T≈2 instead, but this applies only in the optically thin\nlimit where τeff∝τ−1∝κ−1(see Eq. (4)). In the optically thick\nlimit one would instead use 4 −bsinceτeff∝τ, but since we have\nτ∼2⇒τeff∼1 atR=R0in our models we ignore b.\nIn Fig. 5 we also plot the migration tracks for a run with local, β\ncooling. We find that the planet migrates much faster when thermal\ndiffusion is omitted, leading to drastically faster migration. In addi-\ntion, we compute the integrated baroclinic term as a function of βcool\nsimilar to Sect. 3.3 and include it in Fig. 7 (purple curve). While the\nfunction also peaks at βcool≈βU-turn, it consistently overestimates the\nvortensity growth rate compared to our radiative models where ther-\nmal di ffusion is included. This suggests that, while cooling results\nin vortensity growth due to baroclinic forcing and therefore faster\ninward migration, thermal di ffusion acts to partially suppress this\neffect.\n3.5 Radiative damping of spiral shocks\nWhile the focus of this study has been how radiative cooling can in-\nduce vortensity growth via baroclinic e ffects, it is worth highlighting\nthat an additional source of vortensity exists in the planet’s vicin-\nity. The planet’s spiral arms will steepen into shocks as they propa-\ngate through the disk (Rafikov 2002), resulting in a vortensity excess\n(Lin & Papaloizou 2010). This creates a vortensity pileup about ±xsh\naway from the planet, where xshis the shock distance following Zhu\net al. (2015) (see also Goodman & Rafikov 2001)\nxsh≈0.93 γ+1\n12/5Mp\nMth!−2/5\nH, Mth=2c3\ns\n3GΩp≈h3\npM⋆. (18)\nHere, Mthis the thermal mass at the location of the planet (Goodman\n& Rafikov 2001).\nHowever, radiative cooling is expected to weaken the spiral\nshocks (Miranda & Rafikov 2020a; Zhang & Zhu 2020; Ziampras\net al. 2023), possibly resulting in weaker vortensity growth. This\nwould imply that, while a planet in an adiabatic or isothermal model\nwould also need to overcome the dynamical corotation torque due to\nthe vortensity “barrier” created by its own spiral shocks, this e ffect\nis mitigated or even absent in a radiative model. The result would\nbe faster inward migration when β∼1, where the damping e ffect of\nradiative cooling on spiral shocks is maximized (Miranda & Rafikov\n2020a; Ziampras et al. 2023). This condition is met in our models,\nas we haveβ∼1.5 atR=30 au (see Fig. 7).\nFigure 8 shows a comparison of the azimuthally averaged per-\nturbed vortensity for our fiducial models similar to Fig. 3, but cover-\ning a wider radial range and normalized to the Keplerian vortensity\nto highlight any excess. Here, it becomes clear that radiative cooling\ninterferes with the damping of spiral shocks, resulting in a vorten-\nsity excess that is weaker and closer to the planet. Finally, in Fig. 9\n0.3\n 0.2\n 0.1\n 0.0 0.1 0.2 0.3\n(RRp)/Rp\n0.02\n0.000.020.040.06/0\nadb\niso\nradFigure 8. Azimuthally averaged perturbed vortensity for static planet models\natt=2τlib, similar to Fig. 3 but normalized to the Keplerian vortensity.\nColored bands mark the location where spiral shocks deposit vortensity in\nthe disk. The radiative model shows a weaker vortensity excess due to spiral\nshocks, closer to the planet.\n0.20.61.01.41.8( p)/\nadiabaticRp=25.50 au\nradiative\n0.1\n 0.00.20.61.01.41.8( p)/\nloc. iso\n0.1\n 0.0local cooling\n0.1\n 0.0 0.1/0\n(RRp)/Rp\nFigure 9. Similar to Fig. 6, with a focus on the vortensity profile ahead of\n(inside) the planet’s orbit. Models with radiative cooling (right) show practi-\ncally no vortensity excess due to spiral shocks.\nwe show a heatmap of the perturbed vortensity for models with mi-\ngrating planets, where we find that the excess due to spiral shocks is\npractically absent in models with radiative cooling.\nWe expect that this e ffect is of secondary importance compared\nto the baroclinic forcing we discuss in this paper. Nevertheless, we\nstress that this can further enhance the e ffect of radiative cooling\non inward migration such that baroclinic forcing in the horseshoe\nMNRAS 000, 1–11 (2023)8 A. Ziampras et al.\nregion (β∼βU-turn∼10) and radiative damping of shocks ( β∼1)\ncan operate e fficiently together for β∼1–10. Such an investigation\nis beyond the scope of this paper, but could be the subject of future\nwork.\n4 DISCUSSION\nIn this section we discuss our findings in the context of previous\nstudies and more realistic physics. We also highlight the relevance\nof our results in planet migration.\n4.1 Previous radiative models\nLega et al. (2014) showed that radiative cooling results in the “cold\nfinger” e ffect in the corotating region, as material is colder and\ndenser after a U-turn compared to an adiabatic case. This would\nformally result in vortensity generation due to the e ffect discussed\nin this paper, but only if the cooling timescale is right (see Fig. 7).\nPierens (2015) also investigated the e ffect of radiation transport on\nplanet migration, but did not report on the mechanism described\nhere. Yun et al. (2022) similarly carried out 3D radiative hydrody-\nnamic simulations of planet migration, showcasing the “cold finger”\neffect but not finding evidence of cooling-induced vortensity growth.\nThis is likely due to the fact that all of these studies probed the in-\nner 1–5 au, where the cooling timescale is βcool∼103–104≫βU-turn,\nsuch that the e ffect we describe was too ine fficient (see Fig. 7). For\na solar-type star, we expect cooling-induced vortensity growth to be\nmost e fficient at R∼10–35 au (see Fig. 7).\n4.2 More realistic physics\nIn this paper we aimed to isolate the e ffect of radiative cooling on\nthe migration rate of low-mass planets. In reality, however, many\nmore processes that we did not include and which can directly or\nindirectly a ffect migration could come into play.\nFor example, accretion heating can give rise to thermal torques\n(Benítez-Llambay et al. 2015; Masset 2017, who also included ther-\nmal di ffusion) or even result in vortex formation (Cummins et al.\n2022) that could a ffect migration (Lega et al. 2021). The Hall e ffect\nin non-ideal MHD can lead to a torque in the disk midplane, which\nstrongly a ffects migration (McNally et al. 2017, 2018). In addition,\nthe torque by an MHD-driven wind could reverse the direction of\nmigration (Kimmig et al. 2020). Finally, including the vertical di-\nrection can give rise to buoyancy-related torques (Zhu et al. 2012;\nMcNally et al. 2020) as well as introducing a vertical dependence of\nthe MHD wind-driven torques (Wa fflard-Fernandez & Lesur 2023).\nWe expect that a more realistic picture should include all such\neffects, but also note that a treatment of cooling—and in particular\nradiative di ffusion—would likely regulate their contribution to the\ntotal torque. This could be an interesting topic for future work.\n4.3 Sustaining, retriggering, or exaggerating the e ffect\nWhile the dynamical corotation torque will not fully halt inward mi-\ngration, it can slow the planet down enough for it to open a partial\ngap and slowly transition into the much slower type-II migration\n(Ward 1997b). Alternatively, migration can halt as the planet ap-\nproaches the inner edge of its gap and the (negative) outer Lindblad\ntorque is suppressed (though see McNally et al. 2019, for a discus-\nsion on the e ffect of vortices).\nIn both cases the corotating region will span the full disk azimuth,trapping trailing vortensity-rich streamlines and retriggering rapid\ninward migration if the planet can break the stall (e.g., McNally et al.\n2019). This could lead to a sustained faster inward migration, or\na series of migration stalls and restarts. Investigating this scenario\ncould be the subject of future work.\nIn the case of a more traditionally viscous disk, one or more zero-\ntorque regions (“migration traps”) could exist in the disk, such as\nnear icelines where the background disk density and temperature\nprofiles change (e.g., Coleman & Nelson 2016). In such a scenario,\nthe (static, outward) corotation torque remains unsaturated and bal-\nances against the (inward) Lindblad torque, allowing the planet to\nremain stationary. Here, the cooling-induced vortensity growth we\ndiscuss could result in the planet migrating either inwards or out-\nwards (depending on the accretion velocity of the disk, see Eq. (11))\nat a rate that will strongly depend on the disk properties (Pierens\n2015).\nOur analysis in Sect. 3.4 further showed that thermal di ffusion\nplays a critical role in the vortensity generation and subsequent\ntorque by smoothing temperature gradients. It is therefore important\nto treat radiation transport appropriately (using e.g., FLD instead of\na local cooling prescription for the in-plane cooling component) to\navoid exaggerating the related torque.\nIn the more realistic scenario of a planet migrating through the\ndisk as it grows, we expect that the e ffect discussed in this work will\nbe less important during the earlier stages of migration, when the\nplanet is still small and the corotating region is not yet fully devel-\noped. However, as the planet grows, the corotating region widens,\nand the cooling-induced vortensity growth becomes stronger, its im-\npact on migration will quickly become relevant. Finding a critical\nmass beyond which this happens is beyond the scope of our work,\nhowever.\nFinally, as we have discussed, it becomes apparent that holding\nthe planet in a fixed radial location would both hide the contribution\nof this e ffect to the total torque, as it mainly a ffects the dynami-\ncal corotation torque, but also artificially speed up inward migration\nonce the planet is released due to the pileup of vortensity in the coro-\ntating region. For this reason, we recommend that numerical models\nof planet migration allow the planet to migrate as soon as possible\nafter the start of the simulation.\n4.4 Connecting to population synthesis models\nAs discussed in Sect. 1, we expect that dynamical corotation\ntorques will be important for low- to moderate-mass planets in low-\nturbulence disks. In order to investigate its e ffects on planet pop-\nulations, however, a recipe for the dynamical corotation torque is\nrequired. McNally et al. (2018) provided such a recipe for a planet\nmigrating in a disk where the Hall e ffect drives a Lorentz accelera-\ntion on the disk, resulting in a background radial velocity uRand a\nvortensity source term on the planet given by\ndϖh\ndt=−ϖ2\nh\"1\nΣRd\ndR\u0010\nRaϕ\u0011#\n, aϕ=√GM⋆R\n2R2uR. (19)\nThe vortensity source term Sand the associated torque that we dis-\ncuss in this paper is not related to magnetic fields as in the work of\nMcNally et al. (2018), but it would be useful to parametrize Sas\na function of planet and disk properties such that its e ffects can be\nincluded in population synthesis models. This will be the focus of\nfollowup work.\nAt the same time, it is important to note that our models focus\non disks with a single planet. In a multiple-planet configuration, on\nMNRAS 000, 1–11 (2023)Planet migration in radiative disks 9\ntop of planet–planet interactions, it is possible that the vortensity-\nrich streamlines left behind by the innermost, inwardly-migrating\nplanet can interfere with the migration of planets further out by in-\ncreasing the local disk vortensity above its nominal Keplerian value.\nThis could enhance the dynamical corotation torque on the remain-\ning planets, slowing them down.\n5 SUMMARY\nWe carried out numerical simulations of planet–disk interaction in\ninviscid disks, and investigated the e ffect of cooling on the vorten-\nsity evolution in the planet’s corotating region. We summarize our\nfindings below.\nWe found that radiative cooling interferes with the otherwise adi-\nabatic compression and expansion of material in the planet’s coro-\ntating region as it U-turns near the planet. The result is a net increase\nin vortensity in the corotating region, which weakens the stalling ef-\nfect of the dynamical corotation torque (McNally et al. 2017) and\nsubstantially speeds up inward migration. We identified the reason\nfor this vortensity growth as baroclinic forcing along streamlines U-\nturning very close to the planet, causing the vortensity excess to pile\nup at the edges of the corotating region.\nWe then compared models of migrating planets with and without\nradiative cooling, and found that this baroclinic forcing results in\nslightly faster inward migration for the first 200 orbits. As the planet\ncontinues to migrate inwards, a competition between the dynamical\ncorotation torque becoming stronger for a rapidly-migrating planet\nand baroclinic forcing enhancing vortensity growth for a slowly-\nmigrating planet prevents the planet from stalling and instead allows\nit to sustain a migration rate 2–3 ×faster than the isothermal or adia-\nbatic rates. We also found that the vortensity growth rate (and there-\nfore inward migration rate) is maximized when the cooling timescale\nis comparable to the U-turn timescale of material in the corotating\nregion, making this mechanism relevant in a quite broad radial range\nin the disk ( R∼5–50 au).\nFurthermore, we showed that thermal di ffusion acts to suppress\nvortensity growth due to baroclinic forcing. We therefore conclude\nthat the e ffect of radiative cooling on inward migration is twofold:\nit acts to speed up inward migration via vortensity growth, but this\ngrowth is partly suppressed by thermal di ffusion.\nFinally, we discussed how radiative damping of spiral shocks can\nfurther enhance the e ffect of cooling on inward migration by weak-\nening the vortensity barrier created by the planet’s own spiral shocks.\nWhile this e ffect is of secondary importance compared to the baro-\nclinic forcing we discuss in this paper, we expect that it will be rel-\nevant in the radial range where β∼0.1–10 (Miranda & Rafikov\n2020a; Ziampras et al. 2023), and note that the two e ffects could\noperate e fficiently together for β∼1–10.\nOur results highlight the importance of radiative e ffects in planet–\ndisk interaction, and in particular the role of thermal di ffusion.\nAn important take-home message is that type-I migration in low-\nturbulence, radiative disks might be more challenging to understand\nthan previously thought, and mechanisms that can naturally lead to\noutward migration (e.g., magnetic fields, planetary accretion lumi-\nnosity) will become necessary from a modeling perspective in order\nto explain the population of low-mass planets at R∼1–10 au. We\nalso expect that the e ffect of thermal di ffusion will be even more\ncentral when additional thermal e ffects are considered.ACKNOWLEDGEMENTS\nAZ would like to thank Roman Rafikov, Kees Dullemond and\nJosh Brown for their suggestions and helpful discussions. This re-\nsearch utilized Queen Mary’s Apocrita HPC facility, supported by\nQMUL Research-IT (http: //doi.org /10.5281 /zenodo.438045). This\nwork was performed using the DiRAC Data Intensive service at Le-\nicester, operated by the University of Leicester IT Services, which\nforms part of the STFC DiRAC HPC Facility (www.dirac.ac.uk).\nThe equipment was funded by BEIS capital funding via STFC cap-\nital grants ST /K000373 /1 and ST /R002363 /1 and STFC DiRAC\nOperations grant ST /R001014 /1. DiRAC is part of the National\ne-Infrastructure. AZ and RPN are supported by STFC grant\nST/P000592 /1, and RPN is supported by the Leverhulme Trust\nthrough grant RPG-2018-418. This project has received funding\nfrom the European Research Council (ERC) under the European\nUnion’s Horizon 2020 research and innovation programme (grant\nagreement No 101054502). All plots in this paper were made with\nthe Python library matplotlib (Hunter 2007).\nDATA A VAILABILITY\nData from our numerical models are available upon reasonable re-\nquest to the corresponding author.\nREFERENCES\nAndrews S. M., et al., 2018, ApJ, 869, L41\nBai X.-N., Stone J. M., 2013, ApJ, 769, 76\nBaruteau C., Masset F., 2008a, ApJ, 672, 1054\nBaruteau C., Masset F., 2008b, ApJ, 678, 483\nBenítez-Llambay P., Masset F., Koenigsberger G., Szulágyi J., 2015, Nature,\n520, 63\nBirnstiel T., et al., 2018, The Astrophysical Journal, 869, L45\nCasoli J., Masset F. S., 2009, ApJ, 703, 845\nChiang E. I., Goldreich P., 1997, ApJ, 490, 368\nColeman G. A. L., Nelson R. P., 2014, MNRAS, 445, 479\nColeman G. A. L., Nelson R. P., 2016, MNRAS, 460, 2779\nCrida A., Morbidelli A., Masset F., 2006, Icarus, 181, 587\nCrida A., Griveaud P., Lega E., Masset F., Morbidelli A., Kloster D., Marques\nL., Minker K., 2022, in Richard J., et al., eds, SF2A-2022: Proceedings\nof the Annual meeting of the French Society of Astronomy and Astro-\nphysics. Eds.: J. Richard. pp 315–317\nCummins D. P., Owen J. E., Booth R. A., 2022, MNRAS, 515, 1276\nDullemond C. P., Ziampras A., Ostertag D., Dominik C., 2022, A&A, 668,\nA105\nGammie C. F., 2001, ApJ, 553, 174\nGoldreich P., Tremaine S., 1979, ApJ, 233, 857\nGoodman J., Rafikov R. R., 2001, ApJ, 552, 793\nHaffert S. Y ., Bohn A. J., de Boer J., Snellen I. A. G., Brinchmann J., Girard\nJ. H., Keller C. U., Bacon R., 2019, Nature Astronomy, 3, 749\nHubeny I., 1990, ApJ, 351, 632\nHunter J. D., 2007, Computing In Science & Engineering, 9, 90\nIzidoro A., Ogihara M., Raymond S. N., Morbidelli A., Pierens A., Bitsch\nB., Cossou C., Hersant F., 2017, MNRAS, 470, 1750\nKeppler M., et al., 2018, A&A, 617, A44\nKimmig C. N., Dullemond C. P., Kley W., 2020, A&A, 633, A4\nKley W., 1989, A&A, 208, 98\nKley W., Crida A., 2008, A&A, 487, L9\nKley W., Nelson R. P., 2012, ARA&A, 50, 211\nLega E., Crida A., Bitsch B., Morbidelli A., 2014, MNRAS, 440, 683\nLega E., et al., 2021, A&A, 646, A166\nLevermore C. D., Pomraning G. C., 1981, ApJ, 248, 321\nMNRAS 000, 1–11 (2023)10 A. Ziampras et al.\nLin D. N. C., Papaloizou J., 1985, in Black D. C., Matthews M. S., eds,\nProtostars and Planets II. pp 981–1072\nLin M.-K., Papaloizou J. C. B., 2010, MNRAS, 405, 1473\nLovelace R. V . E., Li H., Colgate S. A., Nelson A. F., 1999, ApJ, 513, 805\nMasset F., 2000, A&AS, 141, 165\nMasset F. S., 2017, MNRAS, 472, 4204\nMasset F. S., Papaloizou J. C. B., 2003, ApJ, 588, 494\nMcNally C. P., Nelson R. P., Paardekooper S.-J., Gressel O., Lyra W., 2017,\nMNRAS, 472, 1565\nMcNally C. P., Nelson R. P., Paardekooper S.-J., 2018, MNRAS, 477, 4596\nMcNally C. P., Nelson R. P., Paardekooper S.-J., Benítez-Llambay P., 2019,\nMNRAS, 484, 728\nMcNally C. P., Nelson R. P., Paardekooper S.-J., Benítez-Llambay P., Gressel\nO., 2020, MNRAS, 493, 4382\nMenou K., Goodman J., 2004, ApJ, 606, 520\nMignone A., Bodo G., Massaglia S., Matsakos T., Tesileanu O., Zanni C.,\nFerrari A., 2007, The Astrophysical Journal Supplement Series, 170, 228\nMignone A., Flock M., Stute M., Kolb S. M., Muscianisi G., 2012, A&A,\n545, A152\nMiranda R., Rafikov R. R., 2019, ApJ, 878, L9\nMiranda R., Rafikov R. R., 2020a, ApJ, 892, 65\nMiranda R., Rafikov R. R., 2020b, ApJ, 904, 121\nMordasini C., Alibert Y ., Benz W., 2009a, A&A, 501, 1139\nMordasini C., Alibert Y ., Benz W., Naef D., 2009b, A&A, 501, 1161\nMüller T. W. A., Kley W., 2012, A&A, 539, A18\nÖberg K. I., et al., 2021, ApJS, 257, 1\nPaardekooper S. J., 2014, MNRAS, 444, 2031\nPaardekooper S.-J., Lesur G., Papaloizou J. C. B., 2010, ApJ, 725, 146\nPaardekooper S. J., Baruteau C., Kley W., 2011, MNRAS, 410, 293\nPaardekooper S.-J., Dong R., Du ffell P., Fung J., Masset F. S., Ogilvie G.,\nTanaka H., 2022, arXiv e-prints, p. arXiv:2203.09595\nPapaloizou J. C. B., Nelson R. P., Kley W., Masset F. S., Artymowicz\nP., 2007, in Reipurth B., Jewitt D., Keil K., eds, Protostars and Plan-\nets V . p. 655 ( arXiv:astro-ph/0603196 ), doi:10.48550 /arXiv.astro-\nph/0603196\nPierens A., 2015, MNRAS, 454, 2003\nRafikov R. R., 2002, ApJ, 569, 997\nTanaka H., Takeuchi T., Ward W. R., 2002, ApJ, 565, 1257\nTeague R., Bae J., Bergin E. A., Birnstiel T., Foreman-Mackey D., 2018,\nApJ, 860, L12\nThun D., Kley W., 2018, A&A, 616, A47\nToro E. F., Spruce M., Speares W., 1994, Shock waves, 4, 25\nVan Leer B., 1974, Journal of computational physics, 14, 361\nWafflard-Fernandez G., Lesur G., 2023, arXiv e-prints, p. arXiv:2305.11784\nWard W. R., 1997a, Icarus, 126, 261\nWard W. R., 1997b, ApJ, 482, L211\nYamaleev N. K., Carpenter M. H., 2009, Journal of Computational Physics,\n228, 3025\nYun H.-G., Kim W.-T., Bae J., Han C., 2022, ApJ, 938, 102\nZhang S., Zhu Z., 2020, MNRAS, 493, 2287\nZhu Z., Stone J. M., Rafikov R. R., 2012, ApJ, 758, L42\nZhu Z., Dong R., Stone J. M., Rafikov R. R., 2015, ApJ, 813, 88\nZiampras A., Kley W., Dullemond C. P., 2020, A&A, 637, A50\nZiampras A., Nelson R. P., Rafikov R. R., 2023, arXiv e-prints, p.\narXiv:2305.14415\nde Val-Borro M., et al., 2006, MNRAS, 370, 529\nAPPENDIX A: VORTENSITY GROWTH WITH COOLING\nWe follow a similar approach to Sect. 2.2, where we look at a gas\nparcel U-turning ahead of or behind the planet. We can rewrite the\nsource termSin Eq. (7) using the ideal gas law as\nS=P\nTΣ3∇Σ×∇T=P\nTΣ3 ∂Σ\n∂R∂T\n∂ϕ−∂Σ\n∂ϕ∂T\n∂R!\n. (A1)Similar to Sect. 2.2, we now assume a hot and dense circular en-\nvelope around the planet such that ∂ϕΣ|b=−∂ϕΣ|a=σϕand\n∂ϕT|b=−∂ϕT|a=τϕ. We also assume that the gas parcel in a disk\nwith cooling contracts and heats up in the same way that it would in\nan adiabatic disk, except that the expansion and cooling phases are\ndifferent. In other words, σadb\nϕ=σcool\nϕ=σϕandτadb\nϕ=τcool\nϕ=τϕ,\nwhere the superscripts denote the adiabatic and cooling cases.\nIn the adiabatic limit, S=0 and therefore\nSadb\na=Pa\nTaΣ3\na \n−∂Σ\n∂R\f\f\f\f\fadb\naτϕ+∂T\n∂R\f\f\f\f\fadb\naσϕ!\n=0, (A2)\nSadb\nb=Pb\nTbΣ3\nb ∂Σ\n∂R\f\f\f\f\fadb\nbτϕ−∂T\n∂R\f\f\f\f\fadb\nbσϕ!\n=0. (A3)\nIn the case with cooling, we assume that thermal emission and\nin-plane cooling happen alongside adiabatic expansion. The heated\ngas parcel will then cool faster (and expand less) than it would have\nadiabatically. We then write that\n∂T\n∂R\f\f\f\f\fcool\n≈∂T\n∂R\f\f\f\f\fadb\n−|δT|\nδR,∂Σ\n∂R≈∂Σ\n∂R\f\f\f\f\fadb\n+|δΣ|\nδR. (A4)\nWe then obtain ahead of the planet ( δR<0)\nScool\na≈Pa\nTaΣ3\na \n−∂Σ\n∂R\f\f\f\f\fcool\naτϕ+∂T\n∂R\f\f\f\f\fcool\naσϕ!\n≈1\n|δR|Pa\nTaΣ3\na\u0010\n|δΣ|τϕ+|δT|σϕ\u0011\n,(A5)\nand behind the planet ( δR>0)\nScool\nb≈1\n|δR|Pb\nTbΣ3\nb\u0010\n|δΣ|τϕ+|δT|σϕ\u0011\n. (A6)\nAs we have defined τϕandσϕto be positive, we find that Scool>0\nduring a U-turn both ahead of and behind the planet. In other words,\nvortensity will always increase along streamlines during a U-turn.\nWe note, however, that this is a crude approach as, in principle, the\nassumption that σadb\nϕ=σcool\nϕandτadb\nϕ=τcool\nϕwill not hold. We also\ndid not take into account the presence of a background temperature\nand density gradient, which would further complicate this calcula-\ntion. We can nevertheless expect that, in any case, the two terms in\nEqs. (A5) & (A6) will sum to a positive value such that there is a net\nvortensity growth.\nAPPENDIX B: VORTENSITY GROWTH IN ADIABATIC\nMODELS WITH A RADIAL ENTROPY GRADIENT\nIn Sect. 2.2.2, we argued that a radial entropy gradient K∝Rξ\nshould result in a vortensity source term about the planet’s azimuthal\nlocation. This term should however average to zero for each pair of\nstreamlines U-turning ahead of and behind the planet, and only exist\nuntil the horseshoe is completely phase-mixed to a constant entropy\nstate.\nIn Fig. B1 we show the vortensity source term similar to Fig. 4\natt=20 orbits for three adiabatic models with di fferent surface\ndensity radial profiles Σ∝Rs, where s∈{−2,−1,0}. We find that the\nsource term is zero throughout the corotating region for our fiducial\nmodel with s=−1 andξ≈0, but nonzero for the models with\nξ,0, where the source term is antisymmetric about the planet such\nthat it averages to zero. This is consistent with our expectations in\nSect. 2.2.2.\nWe further run a set of models with di fferent surface density ex-\nponents sto investigate the long-term evolution of Sadbfor di fferent\nMNRAS 000, 1–11 (2023)Planet migration in radiative disks 11\n0.04\n0.000.04\ns=2, =0.37\n0.04\n0.000.04(RRp)/Rp\ns=1, =0.03\n0.04\n 0.02\n 0.00 0.02 0.04\n( p)/\n0.04\n0.000.04\ns=0, =0.43\n0.75\n 0.50\n 0.25\n 0.00 0.25 0.50 0.75100×[pp]\nFigure B1. The baroclinic forcing term Sin Eq. (7), similar to Fig. 4, for\nadiabatic models with di fferent radial entropy exponents ξ, controlled by the\nsurface density exponent s.\nvalues ofξ. We compute the integrated vortensity source term inside\nthe horseshoe similar to Sect. 3.3 and Fig. 7, and plot the results as a\nfunction of sand time in Fig. B2. In line with our expectations, the\nsource term is very small (about 100 ×smaller than a typical value\nin a radiative model) and further decreases with time.\nThis paper has been typeset from a T EX/LATEX file prepared by the author.\n0.4\n 0.2\n 0.0 0.2 0.4\nentropy exponent (KR)\n1.0\n0.5\n0.00.5106×xhdV[R2\nppp]\n0.3lib\n1lib\n2lib\n2.0\n 1.5\n 1.0\n 0.5\n 0.0surface density exponent s (Rs)\nFigure B2. The baroclinic source term Sin Eq. (7), integrated over the coro-\ntating region similar to Fig. 7, as a function of the radial entropy exponent ξ\nand time. This term is very small compared to radiative models and decreases\nwith time, consistent with our expectations in Sect. 2.2.2.\nMNRAS 000, 1–11 (2023)" }, { "title": "2402.00133v2.On_the_Constant_Depth_Circuit_Complexity_of_Generating_Quasigroups.pdf", "content": "arXiv:2402.00133v2 [cs.CC] 14 Feb 2024On the Constant-Depth Circuit Complexity of Generating\nQuasigroups∗\nNathaniel A. Collins1, Joshua A. Grochow2,3, Michael Levet4, and Armin Weiß5\n1Department of Mathematics, Colorado State University\n2Department of Computer Science, University of Colorado Boulder\n3Department of Mathematics, University of Colorado Boulder\n4Department of Computer Science, College of Charleston\n5Universit¨ at Stuttgart, FMI\nFebruary 15, 2024\nAbstract\nWe investigate the constant-depth circuit complexity of th eIsomorphism Problem ,Minimum Gen-\nerating Set Problem (MGS), andSub(quasi)group Membership Problem (Membership ) for\ngroups and quasigroups (=Latin squares), given as input in t erms of their multiplication (Cayley) tables.\nDespite decades of research on these problems, lower bounds for these problems even against depth-2\nACcircuits remain unknown. Perhaps surprisingly, Chattopad hyay, Tor´ an, and Wagner (FSTTCS 2010;\nACM Trans. Comput. Theory , 2013) showed that Quasigroup Isomorphism could be solved by AC\ncircuits of depth O(loglogn) usingO(log2n) nondeterministic bits, a class we denote ∃log2nFOLL. We\nnarrow this gap by improving the upper bound for many of these problems to quasiAC0, thus decreasing\nthe depth to constant.\nIn particular, we show that Membership can be solved in NTIME(polylog( n)) and use this to prove\nthe following:\n•MGSfor quasigroups belongs to ∃log2n∀lognNTIME(polylog( n))⊆quasiAC0. Papadimitriou and\nYannakakis ( J. Comput. Syst. Sci. , 1996) conjectured that this problem was ∃log2nP-complete; our\nresults refute a version of that conjecture for completenes s underquasiAC0reductions uncondition-\nally, and under polylog-space reductions assuming EXP/negationslash=PSPACE.\nIt furthermore implies that this problem is not hard for any c lass containing Parity. The analogous\nresults concerning Parity were known for Quasigroup Isomorphism (Chattopadhyay, Tor´ an, &\nWagner, ibid.) andSubgroup Membership (Fleischer, Theory Comput. 2022), though not for\nMGS.\n•MGSfor groups belongs to AC1(L). OurAC1(L) boundimproves on the previous, veryrecent, upper\nbound of P(Lucchini & Thakkar, J. Algebra , 2024). Our quasiAC0upper bound is incomparable to\nP, but has similar consequences to the above result for quasig roups.\n•Quasigroup Isomorphism belongs to ∃log2nAC0(DTISP(polylog( n),log(n)))⊆quasiAC0. As a\nconsequence of this result and previously known AC0reductions, this implies the same upper bound\nfor theIsomorphism Problems for: Steiner triple systems, pseudo-STS graphs, Latin Square\nIsotopy , Latin square graphs, and Steiner ( t,t+ 1)-designs. This improves upon the previous\nupper bound for these problems, which was ∃log2nL∩ ∃log2nFOLL⊆quasiFOLL (Chattopadhyay,\nTor´ an, & Wagner, ibid.; Levet,Australas. J. Combin. 2023).\n•As a strong contrast, we show that MGS for arbitrary magmas is NP-complete.\nOur results suggest that understanding the constant-depth circuit complexity may be key to resolving\nthe complexity of problems concerning (quasi)groups in the multiplication table model.\n∗JAG and ML were partially supported by JAG’s NSF CAREER award CISE-204775 during this work.1 Introduction\nTheGroup Isomorphism (GpI) problem is a central problem in computational complexity and compu ter\nalgebra. When the groups are given as input by their multiplication (a.k .a. Cayley) tables, the problem\nreduces to Graph Isomorphism (GI), and because the best-known runtimes for the two are quite clos e\n(nO(logn)[Mil78]1vs.nO(log2n)[Bab16]2), the former stands as a key bottleneck towards further improv e-\nments in the latter.\nDespite this, GpIseems quite a bit easierthan GI. For example, Tarjan’s nlogn+O(1)algorithm for groups\n[Mil78] can now be given as an exercise to undergraduates: every gr oup is generated by at most ⌈log2|G|⌉\nelements, so the algorithm is to try all possible/parenleftbign\nlogn/parenrightbig\n≤nlogngenerating sets, and for each, check in nO(1)\ntime whether the map of generating sets extends to an isomorphism . In contrast, the quasi-polynomial time\nalgorithm for graphs was a tour de force that built on decades of cu tting-edge research into algorithms and\nthe structure of permutation groups. Nonetheless, it remains un known whether the problem for groups is\nactually easier than that for graphs, or even whether both proble ms are in P!\nUsing a finer notion of reduction, Chattopadhyay, Tor´ an, and Wa gner [CTW13] proved that there was no\nAC0reduction from GItoGpI. This gave the first (and still only known) unconditional evidence th at there\nissome formal sense (namely, the AC0sense) in which GpIreally is easier than GI. The key to their result\nwas that the generator-enumerationtechnique described above can be implemented by non-deterministically\nguessing log2nbits (describing the log ngenerators, each of log nbits), and then verifying an isomorphism\nby a non-deterministic circuit of depth only O(loglogn), a class we denote ∃log2nFOLL. Observe that\n∃log2nFOLL⊆quasiFOLL (by trying all 2O(log2n)settings of the non-deterministic bits in parallel), which\ncannot compute Parity [Raz93, Smo87, CTW13]. As GIisDET-hard [Tor04]—and hence can compute\nParity—there can be no AC0reduction from GItoGpI.\nSuch a low-depth circuit was quite surprising, although that surpris e is perhaps tempered by the use of\nnon-determinism. Nonetheless, it raises the question:\nIs it possible that Group Isomorphism is inAC0?\nThe authors would be shocked if the answer were “yes,” and yet we d o not even have results showing that\nGroup Isomorphism cannot be computed by polynomial-size circuits of (!) depth 2. Indee d, the upper\nbound of ∃log2nFOLLrules out most existing lower bound techniques against AC0, as most such techniques\nalso yield similar lower bounds against ∃log2nFOLL.\nIn this paper, we aim to close the gap between AC0and∃log2nFOLLin the complexity of Group Iso-\nmorphism and related problems. Our goal is to obtain constant-depth circuit s of quasipolynomial size, a\nnatural benchmark in circuit complexity [Bar92]. We leave it for futur e work to focus on reducing the size\nof the circuits. Our first main result along these lines is:\nTheorem A. (Quasi)Group Isomorphism can be solved in quasiAC0.\n(We discuss quasigroups more below.)\nRemark 1.1. We in fact get a more precise bound of ∃log2nAC0(DTISP(polylog( n),log(n))) (Theorem 4.1\ngives an even more specific bound). This more precise bound is notab le because it is contained in both\nquasiAC0and∃log2nFOLL∩∃log2nL, the latter thus improving on [CTW13]. We get similarly precise bounds\nwith complicated-looking complexity classes for the other problems m entioned in the introduction, but we\nomit the precise bounds here for readability.\nThe prior best results in terms of depth complexity all had super-co nstant depth (with quasipolynomial\nsize):∃log2nSC2by Tang [Tan13] yields (by a standard simulation argument) circuits o f depth log2n, while\n∃log2nL∩∃log2nFOLL[CTW13] has depth loglog n.\n1Miller [Mil78] credits Tarjan for nlogn+O(1).\n2Babai [Bab16] proved quasi-polynomial time, and the expone nt of the exponent was analyzed and improved by Helfgott\n[HBD17]\n1Minimum generating set. Another very natural problem in computational algebra is the Min Gen-\nerating Set (MGS) problem. Given a group, this problem asks to find a generating set o f the smallest\npossible size. Given that many algorithms on groups depend on the siz e of a generating set, finding a mini-\nmum generating set has the potential to be a widely applicable subrou tine. Despite this, the MGSproblem\nfor groups was shown to be in Pby Lucchini & Thakkar very recently [LT24]. We improve their complex ity\nbound to:\nTheorem B. Min Generating Set for groups can be solved in quasiAC0and inAC1(L)(O(logn)-depth,\nunbounded fan-in circuits with a logspace oracle).\nWenotethat, although quasiAC0isincomparableto Pbecauseofthequasi-polynomialsize(whereas AC1(L)⊆\nP), the key we are focusing on here is reducing the depth.\nFor nilpotent groups (widely believed to be the hardest cases of GpI), if we only wish to compute the\nminimum numberofgenerators,wecanfurtherimprovethiscomplexityto L∩AC0(NTISP(polylog( n),log(n)))\n(Proposition 7.3).\nWhile our AC1(L) bound above is essentially a careful complexity analysis of the polyn omial-time algo-\nrithm of Lucchini & Thakkar [LT24], the quasiAC0upper bound is in fact a consequence of our next, more\ngeneral result for quasigroups, which involves some new ingredients.\nEnter quasigroups. Quasigroups can be defined in (at least) two equivalent ways: (1) an algebra whose\nmultiplication table is a Latin square,3or (2) a group-like algebra that need not have an identity nor be\nassociative, but in which left and right division are uniquely defined, th at is, for all a,b, there are unique x\nandysuch that ax=bandya=b.\nIn the paper in which they introduced log2(n)-bounded nondeterminism, Papadimitriou and Yannakakis\nshowed that for arbitrary magmas4, testing whether the magma has log ngenerators was in fact complete\nfor∃log2nP, and conjectured:\nConjecture (Papadimitriou & Yannakakis [PY96, p. 169]) .Min Generating Set for Quasigroups is\n∃log2nP-complete.\nThey explicitly did notconjecture the same for MGSforgroups, writing:\n“We conjecture that this result [ ∃log2nP-completeness] also holds for the more structured MIN-\nIMUM GENERATOR SET OF A QUASIGROUP problem. In contrast, QUAS IGROUP ISO-\nMORPHISM was recently shown to be in DSPACE(log2n) [Wol94]. Notice that the corre-\nsponding problems for groups were known to be in DSPACE(log2n) [LSZ77].”—Papadimitriou\n& Yannakakis [PY96, p. 169]\nWe thus turn our attention to the analogous problems for quasigro ups:MGSfor quasigroups, Quasigroup\nIsomorphism ,andthekeysubroutine, Sub-quasigroup Membership . Wenotethatthe ∃log2nFOLLupper\nbound of Chattopadhyay, Tor´ an, and Wagner [CTW13] actually ap plies toQuasigroup Isomorphism and\nnot just GpI; we perform a careful analysis of their algorithm to put Quasigroup Isomorphism into\nquasiAC0as well.\nTheorem C. Min Generating Set for Quasigroups is inquasiAC0∩DSPACE(log2n).\nTo the best of our knowledge, MGS for Quasigroups has not been studied from the complexity-\ntheoretic viewpoint previously. While a DSPACE(log2n) upper bound for MGSforgroupsfollows from\n[Tan13, AT06], as far as we know it remained open for quasigroups pr ior to our work.\nAs with prior results on Quasigroup Isomorphism andGroup Isomorphism [CTW13], and other\nisomorphism problems such as Latin Square Isotopy andLatin Square Graph Isomorphism [Lev23],\nThm. C shows that Paritydoes not reduce to MGS for Quasigroups , thus ruling out most known lower\nbound methods that might be used to prove that MGS for Quasigroups is not in AC0. We also observe\na similar bound for MGS for Groups using Fleischer’s technique [Fle22].\n3A Latin square is an n×nmatrix where for each row and each column, the elements of [ n] appear exactly once\n4A magma is a set Mtogether with a function M×M→Mthat need not satisfy any additional axioms.\n2Papadimitriou and Yannakakis did not specify the type of reduction u sed in their conjecture, though\ntheir∃log2nP-completeness result for Log Generating Set of a Magma works in both logspace and AC0\n(under a suitable input encoding). Ourtwo upper bounds rule out (u nconditionally in one case, conditionally\nin the other) such reductions for MGS for Quasigroups :\nCorollary C. The conjecture of Papadimitriou & Yannakakis [PY96, p. 169] is false under quasiAC0re-\nductions. It is also false under polylog-space reductions a ssuming EXP/\\⌉}atio\\slash=PSPACE.\nIn strong contrast, we show that MGS for Magmas isNP-complete (Thm. 7.13).\nA key ingredient in our proof of Thm. C is an improvement in the complex ity of another central problem\nin computational algebra: the Sub-quasigroup Membership problem ( Membership ,5for short):\nTheorem D. Membership for quasigroups is in NTIME(polylog( n))⊆quasiAC0.\nMembership forgroupsis well-known to belong to L, by reducing to the connectivity problem on the\nappropriate Cayley graph (cf. [BM91, Rei08]), but as Lsits in between AC0andAC1, this is not low enough\ndepth for us.\nAdditional results. We also obtain a number of additional new results on related problems , some of\nwhich we highlight here:\n•By known AC0reductions (see, e.g., Levet [Lev23] for details), our quasiAC0analysis of Chattopadhyay,\nTor´ an, and Wagner’s algorithm for Quasigroup Isomorphism yields the same upper bound for the\nisomorphism problems for Steiner triple systems, pseudo-STS grap hs, Latin square graphs, and Steiner\n(t,t+1)-designs, as well as Latin Square Isotopy . Prior to our work, Quasigroup Isomorphism\nwas not known to be solvable using quasiACcircuits of depth o(loglogn).\n•Group Isomorphism for simple groups or for groups from a dense set Υ of orders can be solved\ninAC0(DTISP(polylog( n),log(n)))⊆quasiAC0∩L∩FOLL. For groups in a dense set of orders, this\nimproves the parallel complexity compared to the original result of D ietrich & Wilson [DW22]. As in\ntheir paper, note that Υ omits large prime powers. Thus, we essent ially have that for groups that are\nnotp-groups, Group Isomorphism belongs to a propersubclass of DET. This evidence fits with the\nwidely-believed idea that p-groups are a bottleneck case for Group Isomorphism .\n•Abelian Group Isomorphism is in∀loglognMAC0(DTISP(polylog( n),log(n))). The key novelties\nhere are (1) a new observation that allows us to reduce the number of co-nondeterministic bits from\nlogn(as in [GL23]) down to loglog n, and (2) using an AC0(DTISP(polylog( n),log(n))) circuit for order\nfinding, rather than FOLLas in [CTW13].\n•Membership for nilpotent groups is in NTISP(polylog( n),log(n))⊆FOLL∩quasiAC0.\n1.1 Methods\nSeveralof our results involvecareful analysis of the low-levelcirc uit complexity ofextant algorithms, showing\nthat they in fact lie in smaller complexity classes than previously known . One important ingredient here is\nthat we use simultaneous time- and space-restricted computation s. This not only facilitates several proofs\nand gives better complexity bounds, but also gives rise to new algorit hms such as for Membership for\nnilpotent groups, which previously was not known to be in FOLL.\nOnesuchinstanceisinourimprovedboundfororder-findingandexp onentiationinasemigroup(Lem.3.1).\nThe previous proof [BKLM01] (still state of the art 23 years later) used a then-novel and clever “double-\nbarrelled” recursive approach to compute these in FOLL. In contrast, our proof uses standard repeated\ndoubling, noting that it can be done in DTISP(polylog( n),log(n))⊆FOLL∩quasiAC0, recovering their result\nwith standard tools and reducing the depth. We use this improved bo und on order-finding to improve the\ncomplexity of isomorphism testing of Abelian groups (Thm. 5.1), simple groups (Cor. 3.3), and groups of\nalmost all orders (Thm. 6.1).\n5In the literature, the analogous problem for groups is somet imes called Cayley Group Membership orCGM, to highlight\nthat it is in the Cayley table model.\n3For a few of our results, however, we need to develop new tools to w ork with quasigroups. In partic-\nular, for the quasiAC0upper bound on MGSfor quasigroups, we cannot directly adapt the technique of\nChattopadhyay, Tor´ an, and Wagner. Indeed, their analysis of t heir algorithm already seems tight to us in\nterms of having depth Θ(loglog n). The first key is Thm. D, putting Membership for quasigroups into\nNTIME(polylog( n)). To do this, we replace the use of a cube generating sequences f rom [CTW13] with\nsomething that is nearly as good for the purposes of MGS: we extend the Babai–Szemer´ edi Reachability\nLemma [BS84, Thm. 3.1] from groups (its original setting) to get str aight-line programs in quasigroups.\nDivision in quasigroups is somewhat nuanced, e.g., despite the fact th at for any a,b, there exists a unique x\nsuch that ax=b, this does not necessarily mean that there is an element “ a−1” such that x=a−1b, because\nof the lack of associativity. Our proof is thus a careful adaptation of the technique of Babai & Szemer´ edi,\nwith a few quasigroup twists that result in a slightly worse, but still su fficient, bound.\n1.2 Prior work\nIsomorphism testing. The best known runtime bound for GpIisn(1/4)logp(n)+O(1)-time due to Rosem-\nbaum [Ros13] (see [LGR16, Sec. 2.2]), though this tells us little about p arallel complexity. In addition\nto Tarjan’s result mentioned above [Mil78], Lipton, Snyder, & Zalcste in [LSZ77] independently observed\nthat if a group is d-generated, then we can decide isomorphism by considering all poss ibled-element sub-\nsets. This is the generator enumeration procedure. Using the fact that every group admits a generating\nset of size ≤logp(n) (where pis the smallest prime dividing n), Tarjan obtained a bound of nlogp(n)+O(1)-\ntime for Group Isomorphism , while Lipton, Snyder, & Zalcstein [LSZ77] obtained a stronger boun d of\nDSPACE(log2n). Miller [Mil78] extended Tarjan’s observation to the setting of quas igroups. There has been\nsubsequent work on improving the parallel complexity of generator enumeration for quasigroups, resulting\nin bounds of ∃log2nAC1(AC1circuits that additionally receive O(log2n) non-deterministic bits, denoted by\nother authors as β2AC1) due to Wolf6[Wol94], ∃log2nSAC1due to Wagner [Wag10], and ∃log2nL∩∃log2nFOLL\ndue to Chattopadhyay, Tor´ an, & Wagner [CTW13]. In the special case of groups, generator enumeration is\nalso known to belong to ∃log2nSC2[Tan13]. There has been considerable work on polynomial-time, isomor -\nphism tests for several families of groups, as well as more recent w ork onNCisomorphism tests—we refer\nto recent works [GQ17, DW22, GL23] for a survey. We are not awar e of work on isomorphism testing for\nspecific families of quasigroups that are not groups.\nMin Generating Set. As every (quasi)group has a generating set of size ≤ ⌈logn⌉,MGSadmits an\nnlog(n)+O(1)-time solution for (quasi)groups. In the case of groups, Arvind & T or´ an [AT06] improved the\ncomplexity to DSPACE(log2n). They also gave a polynomial-time algorithm in the special case of nilpo tent\ngroups. Tang further improved the general bound for MGSfor groups to ∃log2nSC2[Tan13]. We observe\nthat Wolf’s technique for placing Quasigroup Isomorphism intoDSPACE(log2n) also suffices to get MGS\nfor Quasigroups into the same class. Very recently, Das & Thakkar [DT23] improved the algorithmic\nupper bound for MGSin the setting of groups to n(1/4)log(n)+O(1). A month later, Lucchini & Thakkar\n[LT24] placed MGSfor groups into P. Prior to [LT24], MGS for Groups was considered comparable to\nGroup Isomorphism in terms of difficulty. Our AC1(L) bound (Thm. C) further closes the gap between\nMembership Testing in groups and MGS for Groups , and in particular suggests that MGSis of\ncomparable difficulty to Membership for groups rather than GpI. Note that Membership for groups has\nlong been known to belong to L[BM91, Rei08].\n2 Preliminaries\n2.1 Algebra and Combinatorics\nGraph Theory . Astrongly regular graph with parameters ( n,k,λ,µ) is a simple, undirected k-regular, n-\nvertex graph G(V,E) where any two adjacent vertices share λneighbors, and any two non-adjacent vertices\nshareµneighbors. The complement of a strongly regular graph is also stron gly regular, with parameters\n6Wolf actually claims a bound of ∃log2nNC2; however, he uses NC1circuits to multiply two elements of a quasigroup rather\nthanAC0circuits.\n4(n,n−k−1,n−2−2k+µ,n−2k+λ).\nAmagmaMis an algebraic structure together with a binary operation ·:M×M→M. We will frequently\nconsider subclasses of magmas, such as groups, quasigroups, an d semigroups.\nQuasigroups . Aquasigroup consists of a set Gand a binary operation ⋆:G×G→Gsatisfying the\nfollowing. For every a,b∈G, there exist unique x,ysuch that a⋆x=bandy⋆a=b. We write x=a\\band\ny=b/a, i.e.,a⋆(a\\b) =band (b/a)⋆a=b. When the multiplication operation is understood, we simply\nwriteaxfora⋆x. Asub-quasigroup of a quasigroup is a subset that itself is a quasigroup. This means it is\nclosed under the multiplication as well as under left and right quotient s. Given X⊆G, the sub-quasigroup\ngenerated by Xis denoted as /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht. It is the smallest sub-quasigroup containing X.\nUnless otherwise stated, all quasigroups are assumed to be finite a nd represented using their Cayley\n(multiplication) tables.\nAs quasigroups are non-associative, the parenthesization of a giv en expression may impact the resulting\nvalue. For a sequence S:= (s0,s1,...,s k) and parenthesization Pfrom a quasigroup, define:\nCube(S) ={P(s0se1\n1···sek\nk) :e1,...,e k∈ {0,1}}.\nWe say that Sis acube generating sequence if each element gin the quasigroup can be written as\ng=P(s0se1\n1···sek\nk), fore1,...,e k∈ {0,1}. Here,s0\niindicates that siis not being considered in the product.\nFor every parenthesization, every quasigroup is known to admit a c ube generating sequence of size O(logn)\n[CTW13].\nALatin square of ordernis ann×nmatrixLwhere each cell Lij∈[n], and each element of [ n] appears\nexactly once in a given row or a given column. Latin squares are precis ely the Cayley tables correspondingto\nquasigroups. We willabusenotationbyreferringtoaquasigroupan ditsmultiplication tableinterchangeably.\nAnisotopyof Latin squares L1andL2is an ordered triple ( α,β,γ), where α,β,γ:L1→L2are bijections\nsatisfying the following: whenever ab=cinL1, we have that α(a)β(b) =γ(c) inL2. Alternatively, we may\nviewαas a permutation of the rows of L1,βas a permutation of the rows of L1, andγas a permutation of\nthe values in the table. Here, L1andL2are isotopic precisely if (i) the ( i,j) entry of L1is the (α(i),β(j))\nentry of L2, and (ii) xis the (i,j) entry of L1if and only if γ(x) is the ( α(i),β(j)) entry of L2.\nFor a given Latin square Lof order n, we associate a Latin square graph G(L) that has n2vertices; one\nfor each triple ( a,b,c) that satisfies ab=c. Two vertices ( a,b,c) and (x,y,z) are adjacent in G(L) precisely\nifa=x,b=y, orc=z. Miller showed that two Latin square graphs G1andG2are isomorphic if and only\nif the corresponding Latin squares, L1andL2, aremain class isotopic ; that is, if L1andL2can be placed\ninto compatible normal forms that correspond to isomorphic quasig roups [Mil78]. A Latin square graph on\nn2vertices is a strongly regular graph with parameters ( n2,3(n−1),n,6). Conversely, a strongly regular\ngraph with these same parameters ( n2,3(n−1),n,6) is called a pseudo-Latin square graph . Bruck showed\nthat forn >23, a pseudo-Latin square graph is a Latin square graph [Bru63].\nAlbert showed that a quasigroup Qis isotopic to a group Gif and only if Qis isomorphic to G. In\ngeneral, isotopic quasigroups need not be isomorphic [Alb43].\nGroup Theory . For a standard reference, see [Rob82]. All groups are assumed t o be finite. For a group\nG,d(G) denotes the minimum size of a generating set for G. TheFrattini subgroup Φ(G) is the set of\nnon-generators of G. IfGis ap-group, the Burnside Basis Theorem (see [Rob82, Theorem 5.3.2]) pr ovides\nthat (i)G=Gp[G,G], (ii)G/Φ(G)∼=(Z/pZ)d(G), and (iii) if Sgenerates ( Z/pZ)d(G), then any lift of S\ngenerates G. Achief series ofGis an ascending chain ( Ni)k\ni=0of normal subgroups of G, whereN0= 1,\nNk=G, and each Ni+1/Ni(i= 0,...,k−1) is minimal normal in G/Ni. Forg,h∈G, thecommutator\n[g,h] :=ghg−1h−1. Thecommutator subgroup [G,G] =/a\\}⌊ra⌋k⌉tl⌉{t{[g,h] :g,h∈G}/a\\}⌊ra⌋k⌉tri}ht.\nAlgorithmic Problems. A multiplication table of a magma G={g1,...,g n}of order nis an array Mof\nlengthn2where each entry M[i+(j−1)n] fori,j∈ {1,...,n}contains the binary representation of ksuch\nthatgigj=gk. In the following all magmas are given as their multiplication tables.\nWe will consider the following algorithmic problems. The Quasigroup Isomorphism problem takes\nas input two quasigroups Q1,Q2given by their multiplication tables, and asks if there is an isomorphism\nϕ:Q1∼=Q2. TheMembership problem for groups takes as input a group Ggiven by its multiplication\n5table, a set S⊆G, and an element x∈G, and asks if x∈ /a\\}⌊ra⌋k⌉tl⌉{tS/a\\}⌊ra⌋k⌉tri}ht. We may define the Membership problem\nanalogously when the input is a semigroup or quasigroup, and /a\\}⌊ra⌋k⌉tl⌉{tS/a\\}⌊ra⌋k⌉tri}htis considered as the sub-semigroup or\nsub-quasigroup, respectively.\nTheMinimum Generating Set (MGS) problem takes as input a magma Mgiven by its multiplication\ntable and asks for a generating set S⊆Mwhere|S|is minimum. At some point we will also consider the\ndecision variant ofMGS: here we additionally give an integer kin the input and the question is whether\nthere exists a generating set of cardinality at most k.\nWe will be primarily interested in Minimum Generating Set andMembership in the setting of\n(quasi)groups, with a few excursions to semigroups and magmas. N ote that Membership for groups is\nknown to be in L∩quasiAC0[BM91, Rei08, Fle22]. Here the containment in Lfollows from the deep result by\nReingold [Rei08] that symmetric logspace (nondeterministic logspace where each transition is also allowed\nto be applied backward) coincides with L.\n2.2 Computational Complexity\nWe assume that the reader is familiar with standard complexity classe s such as L,NL,NP, andEXP. For\na standard reference on circuit complexity, see [Vol99]. We consider Boolean circuits using the AND,OR,\nNOT, andMajority, whereMajority(x1,...,x n) = 1 if and only if ≥n/2 of the inputs are 1. Otherwise,\nMajority(x1,...,x n) = 0. In this paper, we will consider DLOGTIME -uniform circuit families ( Cn)n∈N. For\nthis, one encodes the gates of each circuit Cnby bit strings of length O(logn). Then the circuit family\n(Cn)n≥0is called DLOGTIME -uniform if (i) there exists a deterministic Turing machine that computes for\na given gate u∈ {0,1}∗ofCn(|u| ∈O(logn)) in time O(logn) the type of gate u, where the types are\nx1,...,x n,NOT,AND,OR,Majority, or oracle gates, and (ii) there exists a deterministic Turing machine\nthat decides for two given gates u,v∈ {0,1}∗ofCn(|u|,|v| ∈O(logn)) and a binary encoded integer iwith\nO(logn) many bits in time O(logn) whether uis thei-th input gate for v.\nDefinition 2.1. Fixk≥0. We say that a language Lbelongs to (uniform) NCkif there exist a (uniform)\nfamily of circuits ( Cn)n∈Nover the AND,OR,NOTgates such that the following hold:\n•TheANDandORgates take exactly 2 inputs. That is, they have fan-in 2.\n•Cnhas depth O(logkn) and uses (has size) nO(1)gates. Here, the implicit constants in the circuit\ndepth and size depend only on L.\n•x∈Lif and only if C|x|(x) = 1.\nThe complexity class ACkis defined analogously as NCk, except that the AND,ORgates are permitted to\nhave unbounded fan-in. That is, a single ANDgate can compute an arbitrary conjunction, and a single\nORgate can compute an arbitrary disjunction. The class SACkis defined analogously, in which the OR\ngates have unbounded fan-in but the ANDgates must have fan-in 2. The complexity class TCkis defined\nanalogously as ACk, except that our circuits are now permitted Majority gates of unbounded fan-in. We also\nallow circuits to compute functions by using multiple output gates.\nFurthermore, for a language Lthe class ACk(L), apart from Boolean gates, also allows oracle gates for L\n(an oracle gate outputs 1 if and only if its input is in L). IfK∈ACk(L), thenKis said to be ACkTuring\nreducible to L. Finally, for some complexity class CdenoteACk(C) to be the set of decision problems that\nareACk-Turing reducible to problems in C. Be aware that here we follow the notation of [Vol99], which is\ndifferent from [Wag10, GL23] (where ACk(C) is used to denote composition of functions).\nFor every k, the following containments are well-known:\nNCk⊆SACk⊆ACk⊆TCk⊆NCk+1.\nIn the case of k= 0, we have that:\nNC0/subset⋉oteqlAC0/subset⋉oteqlTC0⊆NC1⊆L⊆NL⊆SAC1⊆AC1.\nWe note that functions that are NC0-computable can only depend on a bounded number of input bits. Thu s,\nNC0is unable to compute the ANDfunction. It is a classical result that AC0is unable to compute Parity\n6[Smo87]. The containment TC0⊆NC1(and hence, TCk⊆NCk+1) follows from the fact that NC1can\nsimulate the Majority gate.\nWe will crucially use the following observation throughout the paper.\nObservation 2.2. The product of O(logn)-many integers each of O(logn)bits can be computed in AC0.\nProof.By [HAM02], the iterated multiplication of k k-bit integers is in TC0. In our setting, k=m∈\nO(logn). Thus, each Majority gate can be implemented using an ACcircuit of constant depth and size\n2O(logn)= poly(n). The result now follows.\nFurther circuit classes. The complexity class MAC0is the set of languages decidable by constant-depth\nuniform circuit families with a polynomial number of AND,OR, andNOTgates, and a single Majority gate\nat the output. The class MAC0was introduced (but not so named) in [ABFR91], where it was shown th at\nMAC0/subset⋉oteqlTC0. This class was subsequently given the name MAC0in [JKS02].\nThe complexity class FOLLis the set of languages decidable by uniform ACcircuit families of depth\nO(loglogn) and polynomial size. It is known that AC0/subset⋉oteqlFOLL/subset⋉oteqlAC1, and it is open as to whether FOLL\nis contained in NL[BKLM01].\nWe will be particularly interested in NCcircuits of quasipolynomial size (i.e., 2O(logkn)for some constant\nk). For a circuit class C ⊆NC, the analogous class permitting a quasipolynomial number of gates is denoted\nquasiC. We will focus specifically on quasiAC0. Here, we stress that our results for quasiAC0will be stated for\nthe nonuniform setting. Note that DLOGTIME uniformity does not make sense for quasiAC0, as we cannot\nencode gate indices using O(logn) bits. Nonetheless, there exist suitable notions of uniformity for quasiAC0\n[Bar92, FGSTT20].\nBounded nondeterminism. For a complexity class C, we define ∃loginCto be the set of languages Lsuch\nthat there exists an L′∈ Csuch that x∈Lif and only if there exists yof length at most O(logi|x|) such\nthat (x,y)∈L′. Similarly, define ∀loginCto be the set of languages Lsuch that there exists an L′∈ Csuch\nthatx∈Lif and only if for all yof length at most O(logi|x|), (x,y)∈L′. For any i≥0 and any c≥0, both\n∃loginFOLLand∀loginFOLLare contained in quasiFOLL , and so cannot compute Parity[CTW13, Smo87].\nNote that ∀lognC ∪∃lognC ⊆AC0(C).\nTime and space-restricted Turing machines. When considering complexity classes defined by Turing\nmachines with a time bound t(n)∈o(n), we use Turing machine with random access and a separate addres s\n(orindex) tape. After writing an address, the machine can go to a query sta te reading the symbol from the\ninput at the location specified by the address tape.\nFor functions t(n),s(n)∈Ω(logn), the classes DTISP(t(n),s(n)) andNTISP(t(n),s(n)) are defined by\ndeterministic (resp. nondeterministic) t(n) time and s(n) space bounded Turing machines. Note that there\nmust be one Turing machine that simultaneously satisfies the time and space bound. For details we refer to\n[Vol99, Section 2.6]. For further reading on the connection to quasiAC0, we refer to [Bar92, FGSTT20].\nRemark 2.3. Because DTISP(polylog( n),log(n)) is such a small class, when we say some function is com-\nputable in DTISP(polylog( n),log(n)), there is some ambiguity as to what this might mean (e.g., is there a\nseparate output tape? Does it output one bit at a time?). Through out this paper, where relevant (e.g.,\nLemma 3.1), it means that at the end of the computation, the result is written on the work tape of the\nTuring machine (and, hence, also is subject to the space bound).\nFact 2.4. NTISP(polylog( n),log(n))⊆NTIME(polylog( n))⊆quasiAC0.\nProof sketch. Take the OR over all 2polylog( n)possible computation histories, of the AC0circuit that verifies\na computation history (the latter as in the proof of the Cook–Levin Theorem).\nLemma 2.5. NTISP(polylog( n),log(n))⊆FOLL.\nProof.This is essentially the proof of Savitch’s Theorem: A configuration of a Turing machine consist of the\ncurrent state, the work and index tape content, but notthe content of the input tape. For configurations\n7α,βdefine the Reach predicate as follows:\nReach(α,β,0)⇐⇒βis reachable from αin at most one computation step\nReach(α,β,i)⇐⇒ ∃γ:/parenleftbig\nReach(α,γ,i−1)∧Reach(γ,β,i−1)/parenrightbig\nfori≥1. Thus, Reach( α,β,i) holds if and only if βcan be reached from αin at most 2icomputation steps.\nSince the running time is bounded by logknfor some k, by letting Start( w) denote the initial configuration\nfor the input w∈Σ∗and Accept the accepting configuration of M(which can be assumed to be unique after\na suitable manipulation of M), we have\nReach(Start( w),Accept,loglogkn)⇐⇒w∈L.\nNow, it remains to observe that the inductive definition of the Reach predicate can be evaluated in FOLL\nsince the recursiondepth is O(loglogn), each recursion step is clearly in AC0and there are only polynomially\nmany configurations (because of the space bound of log n).\nBy the very definition we have DTISP(polylog( n),log(n))⊆LandNTISP(polylog( n),log(n))⊆NL.\nThus, we obtain\nFact 2.6.\n•AC0(DTISP(polylog( n),log(n)))⊆L∩FOLL∩quasiAC0and\n•AC0(NTISP(polylog( n),log(n)))⊆NL∩FOLL∩quasiAC0.\nDisjunctive truth-table reductions. We finally recall the notion of a disjunctive truth-table reduction.\nAgain let L1,L2be languages. We say that L1isdisjunctive truth-table (dtt) reducible to L2, denoted\nL1≤dttL2, if there exists a function gmapping a string xto a tuple of strings ( y1,...,y k) such that x∈L1\nif and only if there is some i∈ {1,...,k}such that yi∈L2. Whengis computable in a complexity class C,\nwe call this a C-dtt reduction, and write L1≤C\ndttL2. For any class C,C-dtt reductions are intermediate in\nstrength between C-many-one reductions and C-Turing reductions.\nFact 2.7. ∃log2nAC0(C)is closed under ≤AC0\ndttreductions for any class C.\nProof.LetL∈ ∃log2nAC0(C), and suppose L′≤AC0\ndttviag. We show that L′is also in ∃log2nAC0(C). Let\nV∈AC0(C) be a predicate such that x∈L⇐⇒[∃log2|x|w]V(x,w) for all strings x. Then we have\nx∈L′iff∃i∈ {1,...,k},∃w∈ {0,1}log2n:V(g(x)i,w), where g(x)idenotes the i-th string output by\ng(x) = (y1,...,y k). Since gis, in particular, polynomial size, we have k≤poly(|x|), so we have the bit-\nlengthoftheindex iisatmost O(log|x|). Finally, since AC0(C) denotestheoracleclass, it isclosedunder AC0\nreductions, and thus the function ( x,w,i)/ma√sto→V(g(x)i,w) is inAC0(C), and therefore L′∈ ∃log2nAC0(C).\n3 Order Finding and Applications\nIn this section, we consider the parallel complexity of order finding. We begin with the following lemma.\nLemma 3.1. The following problem is in DTISP(polylog( n),log(n)): On input of a multiplication table of\na semi-group S, an element s∈S, and a unary or binary number k∈Nwithk≤ |S|, compute sk(NB:\nRemark 2.3).\nProof.Ifkis given in unary, we first compute its binary representation using a b inary search (note that we\ncan write it on the work tape as is uses at most ⌈log|S|⌉bits). We identify the semigroup elements with the\nnatural numbers 0 ,...,|S|−1. Now, we compute skusing the standard fast exponentiation algorithm. Note\nthat the multiplication of two semigroup elements can be done in DTIME(logn) as we only need to write\ndown two log nbit numbers on the address tape (if the multiplication table is not padd ed up to a power of\ntwo, this is still in DTISP(polylog( n),log(n)) because we need to multiply two log nbit numbers to compute\nthe index in the multiplication table).\nIt is well-known that the fast exponentiation algorithm needs only O(logk) elementary multiplications\nandO(logk+logn) space; hence, the lemma follows.\n8Note that Lem. 3.1 together with Lem. 2.5 gives a new proof that the problem of computing a power sk\nin a semigroup can be done in FOLL. This approach seems easier and more general than the double-ba rrelled\nrecursive approach in [BKLM01].\nLem. 3.1 also yields the following immediate corollary:\nCorollary 3.2. On input of a multiplication table of a group G, an element g∈G, andk∈N, we may\ndecide whether ord(g) =kin∀lognDTISP(polylog( n),log(n)). The same applies if, instead of k, another\ngroup element h∈Gis given with the question whether ord(g) = ord(h).\nProof.First check whether gk= 1 using Lem. 3.1. If yes (and k >1), we use O(logn) universally quantified\nco-nondeterministic bits to verify that for all 1 ≤i < kthatgi/\\⌉}atio\\slash= 1 using again Lem. 3.1. For the second form\nof input observe that ord( g) = ord(h) if and only if for all i≤ |G|we have gi= 1 if and only if hi= 1.\n3.1 Application to isomorphism testing\nUsing Cor. 3.2, we can improve the upper bound for isomorphism test ing of finite simple groups. Previously,\nthis problem was known to be in L[Tan13] and FOLL[GL23]. We obtain the following improved bound.\nCorollary 3.3. LetGbe a finite simple group and Hbe arbitrary. We can decide isomorphism between G\nandHinAC0(DTISP(polylog( n),log(n))).\nProof.AsGis a finite simple group, Gis determined up to isomorphism by (i) |G|, and (ii) the set of orders\nof elements of G: spec(G) :={ord(g) :g∈G}[VGM09]. We may check whether |G|=|H|inAC0. By\nCor. 3.2, we may compute and compare spec( G) and spec( H) inAC0(DTISP(polylog( n),log(n))). The result\nnow follows.\nIn light of Cor. 3.2, we obtain an improved bound for testing whether a group Gis nilpotent. Testing\nfor nilpotency was previously known to be in L∩FOLL[BKLM01].\nCorollary 3.4. LetGbe a finite group given by its multiplication table. We may dec ide whether Gis\nnilpotent in AC0(DTISP(polylog( n),log(n))).\nProof.A finite group Gis nilpotent if and only if it is the direct product of its Sylow subgroups. Thus, for\neach prime pdividing |G|, we identify the elements Xp:={g: ord(g) is a power of p}and then test whether\nXpforms a group. By Cor. 3.2, we can identify XpinAC0(DTISP(polylog( n),log(n))). Verifying the group\naxioms is AC0-computable. The result follows.\n3.2 Application to membership testing\nA group Ghas the log npower basis property (as defined in [BKLM01, Fle22]) if for every subset X⊆G\neveryg∈ /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}htcan be written as g=ge1\n1···gemmwithm≤lognand suitable gi∈Xandei∈Z.\nObservation 3.5. Membership testingfor semigroups withthe lognpower basis property is in NTISP(polylog( n),log(n)).\nProof sketch. This follows by guessing suitable exponents and using Lem. 3.1 to comp ute the respective\npowers.\nThisobservationallowsustoimproveseveralresultsfrom[BKLM01 ,Fle22]from FOLLtoNTISP(polylog( n),log(n)).\nCorollary 3.6. Membership for commutative semigroups is in NTISP(polylog( n),log(n)).\nCorollary 3.7. Letdbe aconstant. Membership for solvable groups of class boundedby dis inNTISP(polylog( n),log(n)).\nProof.LetXbe the input set for Membership andGthe input group. Theorem 3.5 in [BKLM01] is proved\nby showing that /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht=XdwhereX0=Xand for some suitable constant C\nXi={xe1\n1···xemm|m≤Clogn,xj∈Xi−1,ej∈Zforj∈ {1,...,m}}.\nNow, as in Observation 3.5, we can guess an element of XiinNTISP(polylog( n),log(n)) given that we\nhavetheelementsof Xi−1. Asdisaconstant, wecanguessthe elementsof Xi−1inNTISP(polylog( n),log(n))\nby induction. Thus, we can decide membership in /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht=XdinNTISP(polylog( n),log(n)).\n9For nilpotent groups, we can do even better and show NTISP(polylog( n),log(n)) even without a bound\non the nilpotency class—thus, improving considerably over [BKLM01 ]. This also underlines that the class\nNTISP(polylog( n),log(n)) is useful not only because it provides a better complexity bound t hanFOLL, but\nit also facilitates some proofs.\nTheorem 3.8. Membership for nilpotent groups is in NTISP(polylog( n),log(n)).\nProof.LetXbe the input set for Membership andGthe input group. Write n=|G|. Note that the\nnilpotency class of Gis at most log n. Define C={[x1,...,x ℓ]|xi∈X,ℓ≤logn}where [x1,...,x ℓ] is\ndefined inductively by [ x1,...,x ℓ] = [[x1,...,x ℓ−1],xℓ] forℓ≥3.\nWe claim that there is a subset C′={c1,...,c m} ⊆Cwithm≤lognsuch that every g∈ /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}htcan be\nwritten as g=ce1\n1···cemmwithei∈Z.\nLet Γmdenote the m-th term of the lower central series of /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht(meaning that Γ 0=/a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}htand Γ m+1=\n[Γm,/a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht]). Then Γ mis generated by Cm={[x1,...,x k]|xi∈X,k≥m}(e.g., [CMZ17, Lemma 2.6]).\nObserve that, although kis unbounded, the terms with k >lognare trivial because log nis a bound on the\nnilpotency class. We obtain the desired set C′by first choosing a minimal generating set for the Abelian\ngroup Γ 0/Γ1, then a minimal generating set of Γ 1/Γ2and so on (meaning that ( c1,...,c m) is a so-called\npolycyclic generating sequence of/a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht). Note that mis bounded by log nsince/a\\}⌊ra⌋k⌉tl⌉{tci,...,c m/a\\}⌊ra⌋k⌉tri}htis a proper\nsubgroup of /a\\}⌊ra⌋k⌉tl⌉{tci−1,...,c m/a\\}⌊ra⌋k⌉tri}htfor alli.\nNext, let us show that we can guess an element of C′inNTISP(polylog( n),log(n)). This is not difficult:\nwe start by guessing x1and seta=x1. Then, as long as we guess to continue, we guess xiand compute\na:= [a,xi]. Asℓ(in the definition of C) is bounded by log n, we can guess any element of C′in this way in\npolylogarithmic time. Moreover, note that at any point we only need t o store a constant number of group\nelements.\nOnce we have guessed an element of C′, we can guess a power of it as in Observation 3.5 and then guess\nthe next element of C′and so on. As m≤logn, this gives an NTISP(polylog( n),log(n)) algorithm.\n4 Quasigroup Isomorphism\nIn this section, we establish the following.\nTheorem 4.1. Quasigroup Isomorphism belongs to ∃log2n∀logn∃lognDTISP(polylog( n),log(n)).\nNote that we have ∃log2n∀logn∃lognDTISP(polylog( n),log(n))⊆ ∃log2nAC0(DTISP(polylog( n),log(n)))⊆\nquasiAC0∩∃log2nL∩∃log2nFOLL.\nThis statement is inspired by [DEP+22] where a similar problem is shown to be in the third level of the\npolynomial-time hierarchy using the same approach. Our proof follow s closely the algorithm for [CTW13,\nTheorem 3.4].\nProof of Thm. 4.1 . LetGandHbe quasigroups given as their multiplication tables. We assume that\nthe elements of the quasigroups are indexed by integers 1 ,...,|G|. If|G| /\\⌉}atio\\slash=|H|(this can be tested in\nDTIME(logn) by a standard binary search), we know that GandHare not isomorphic. Otherwise, let us\nwriten=|G|andk=⌈2logn⌉+1.\nThe basic idea is to guess cube generating sequences ( g0,...,g k) and (h0,...,h k) forGandHand verify\nthat the map gi/ma√sto→hiinduces an isomorphism between GandH. Hence, we start by guessing cube gener-\nating sequences ( g0,...,g k) and (h0,...,h k) with respect to the parenthesization Pwhere the elements are\nevaluated left-to-right (so P(g1g2g3) = (g1g2)g3), withgi∈G,hi∈H. This amounts to guessing k·log(n)∈\nO(log2n)manybits(thus, ∃log2n). Now,weneedtoverifytwopointsin ∀logn∃lognDTISP(polylog( n),log(n)):\n•that these sequences are actually cube generating sequences,\n•thatgi/ma√sto→hiinduces an isomorphism.\nLet us describe the first point for G(forHthis follows exactly the same way): we universally verify for\nevery element g∈G(which can be encoded using O(logn) bits, hence, ∀logn) that we can existentially guess\n10a sequence ( e1,...,e k)∈ {0,1}k(i.e.∃logn) such that g=P(g0ge1\n1···gek\nk). We can compute this product in\nDTISP(log3n,logn) by multiplying from left to right.7Each multiplication can be done in time O(log2n)\nbecause we simply need to compute i+j·nfor two addresses i,jof quasigroup elements, write the result\non the index tape and then read the corresponding product of gro up elements from the multiplication table.\nMoreover, note that for this procedure we only need to store one intermediate result on the working tape at\nany time. Thus, computing the product P(g0ge1\n1···gek\nk) can be done in time O(log3n) and space O(logn)\nand it can be checked whether the result is g.\nTocheck the secondpoint, by [CTW13], we need to verifyuniversallyt hat for all ( c1,...,c k), (d1,...,d k),\n(e1,...,e k)∈ {0,1}k(hence,∀logn) whether\nP(g0gc1\n1···gck\nk)·P(g0gd1\n1···gdk\nk) =P(g0ge1\n1···gek\nk).\nAgain the products can be computed in time O(polylog n) and space O(logn) as outlined above. Now, it\nremains to observe that we can combine the two ∀lognblocks into one ∀lognblock because the check whether\ngi/ma√sto→hiinduces an isomorphism does not depend on the existentially guessed bits in the first check.\nWe obtain several corollaries.\nCorollary 4.2. Isomorphism testing of two Steiner triple systems is in ∃log2nAC0(DTISP(polylog( n),log(n))).\nProof.Given a Steiner triple system, we may write down a quasigroup Qin the following manner. For each\nblock{a,b,c}in the Steiner triple system, we include the products ab=c,ba=c,ac=b,ca=b,bc=a,cb=\na. Thus, we may write down the multiplication table for QinAC0. The Steiner triple system determines Q\nup to isomorphism. The result now follows.\nBose [Bos63] previously showed that pseudo-STS graphs with >67 vertices are STS graphs. Now given a\nblock-incidence graph from a Steiner 2-design with bounded block siz e, we can recover the underlying design\ninAC0[Lev23, Proposition 4.7]. This yields the following.\nCorollary 4.3. Isomorphism testing of pseudo-STS graphs belongs to ∃log2nAC0(DTISP(polylog( n),log(n))).\nAs isomorphism testing of Steiner ( t,t+ 1)-designs is ∃log2nAC0-reducible to isomorphism testing of\nSteiner triple systems [BW13] (cf., [Lev23, Corollary 4.11]), we obtain the following corollary.\nCorollary 4.4. Isomorphism testing of Steiner (t,t+1)-designs is in ∃log2nAC0(DTISP(polylog( n),log(n))).\nGiven two Latin square graphs G1,G2, we may recover corresponding Latin squares L1,L2inAC0(cf.\n[Lev23, Lemma 3.9]). Now G1∼=G2if and only if L1andL2are main class isotopic [Mil78, Lemma 3]. We\nmay decide whether L1,L2aremain classisotopic using an AC0-computable disjunctive truth-table reduction\ntoQuasigroup Isomorphism (cf. [Lev23, Remark1.6]). As ∃log2nAC0(DTISP(polylog( n),log(n))) is closed\nunderAC0-computable dtt reductions (Fact 2.7), we get the following corollar y.\nCorollary 4.5. Isomorphism testing of Latin square graphs belongs to ∃log2nAC0(DTISP(polylog( n),log(n))).\nRemark 4.6. Latin square graphs are one of the four families of strongly regular graphs under Neumaier’s\nclassification[Neu79] (the other families being line graphsofSteiner 2 -designs, conference graphs, and graphs\nwhoseeigenvaluessatisfy the clawbound). Levet [Lev23] previou slyestablished an upper bound of ∃log2nAC0\nforisomorphismtestingofconferencegraphs,whichisastronger upperboundthanweobtainforLatinsquare\ngraphs. In contrast, the best known algorithmic runtime for isomo rphism testing of conference graphs is\nn2log(n)+O(1)due to Babai [Bab80], whereas isomorphism testing of Latin square g raphs is known to admit\nannlog(n)+O(1)-time solution [Mil78].\nWe note that the reduction outlined in [Mil78, Theorem 2] and [Lev23, R emark 1.6] in fact allow us to\ndetermine whether two quasigroup are isotopic, and not just main c lass isotopic. Thus, we have an AC0-\ncomputable disjunctive truth-table reduction from Latin Square Isotopy toQuasigroup Isomorphism .\nWe now obtain the following corollary.\nCorollary 4.7. Latin Square Isotopy belongs to ∃log2nAC0(DTISP(polylog( n),log(n))).\n7Here, we could impose the additional requirement that the le ngth of each row/column of the multiplication table is padde d\nup to a power of two in order to get a bound of ∃log2n∀logn∃lognDTISP(log2n,logn))\n115 Abelian Group Isomorphism\nIn this section, we consider isomorphism testing of Abelian groups. O ur main result in this regard is:\nTheorem 5.1. LetGbe an Abelian group, and let Hbe arbitrary. We can decide isomorphism between G\nandHin∀loglognMAC0(DTISP(polylog( n),log(n))).\nChattopadhyay, Tor´ an, and Wagner [CTW13] established a TC0(FOLL) upper bound on this problem.\nGrochow & Levet [GL23, Theorem 5] gave a tighter analysis of their a lgorithm, placing it in the sub-class\n∀lognMAC0(FOLL).8We note that Chattopadhyay, Tor´ an, & Wagner also established a n upper bound of L\nfor this problem, which is incomparable to the result of Grochow & Lev et (ibid.). We improve upon both\nthese bounds by (i) showing that O(loglogn) non-deterministic bits suffice instead of O(logn) bits, and\n(ii) using an AC0(DTISP(polylog( n),log(n))) circuit for order finding rather than an FOLLcircuit. We note\nthat while ∀lognMAC0(FOLL) is contained in TC0(FOLL), it is open whether this containment is strict. In\ncontrast, Cor. 5.3 shows that our new bound of ∀loglognMAC0(DTISP(polylog( n),log(n))) is a class that is\nin factstrictlycontained in L∩TC0(FOLL).\nProof of Thm. 5.1 . Following the strategy of [GL23, Theorem 7.15], we show that non-isomorphism can be\ndecided in the same class but with existentially quantified non-determ inistic bits.\nWe may check in AC0whether a group is Abelian. So if His not Abelian, we can decide in AC0that\nG/\\⌉}atio\\slash∼=H. So suppose now that His Abelian. By the Fundamental Theorem of Finite Abelian Groups, Gand\nHare isomorphic if and only if their multiset of orders are the same. In p articular, if G/\\⌉}atio\\slash∼=H, then there\nexists a prime power pesuch that there are more elements of order peinGthan inH. We first identify the\norder of each element, which is AC0(DTISP(polylog( n),log(n)))-computable by Lem. 3.1.\nWe will show how to nondeterministically guess and check the prime pow erpesuch that Ghas more\nelementsoforder pethanHdoes. Let n=pe1\n1···peℓ\nℓbe the primefactorizationof n. We havethat ℓ≤log2n,\nand the number of distinct prime powers dividing nise1+···+eℓ≤log2n. Nondeterministically guess a\npair (i,e) with 1 ≤i≤ ⌊log2n⌋and 1≤e≤ ⌊log2n⌋. We treat this pair as representing the prime power pe\ni\nat which we will test that Ghas more elements of that order than H. Because both iandeare bounded in\nmagnitude by log2n, the number of bits guessed is at most log2log2n. So we may effectively guess peusing\nO(loglogn) bits to specify p(implicitly, i.e., by its index i) and to specify e(explicitly, i.e., in its binary\nexpansion).\nHowever, to identify elements of order pe, we will need the number peexplicitly, in its full binary\nexpansion. First we show that we can get peexplicitly if we can get pexplicitly. Once we have pin its binary\nexpansion, the function ( p,e)/ma√sto→peis a function of O(logn) bits, so can be computed by an AC0circuit of\nsize 2O(logn)=nO(1)(see Obs. 2.2). Thus all that remains is to get pexplicitly.\nBecause all the numbers involved are only O(logn) bits, any arithmetic function of these numbers can\nbe computed in AC0, in particular, testing if an O(logn)-bit number is prime, testing if one O(logn)-bit\nnumber divides another. So, in parallel, for all numbers x= 2,3,...,n/2, anAC0checks which ones are\nprime and divide n. Now, consider the surviving primes as a list of length O(logn), consisting of numbers\neach ofO(logn) bits. Now for each pair of primes pj,ph, we define an indicator X(j,h) = 1⇐⇒pj> ph.\nAspj,phare representable using O(logn) bits, we may compute X(j,ℓ) inAC0. Now as the number of\nprimesℓ≤log2(n), we may in AC0find a prime jwith:\nℓ/summationdisplay\nh=1X(j,h) =i.\nThe result now follows.\nAs with many of our other results, we show that this class is restrict ive enough that it cannot compute\nParity. To do this, we appeal to the following theorem of Barrington & Stra ubing:\n8Grochow & Levet consider ∀lognMAC0◦FOLL, where◦denotes composition (see [GL23] for a precise formulation) . We note\nthat asAC0◦FOLL=FOLL=AC0(FOLL), we have that ∀lognMAC0◦FOLL=∀lognMAC0(FOLL). Thus, Thm. 5.1 improves\nupon the previous bound of ∀lognMAC0(FOLL) obtained by Grochow & Levet.\n12Theorem 5.2 (Barrington & Straubing [BS94, Thm. 7]) .Letk >1. AnyTCcircuit family of constant\ndepth, size 2no(1), and with at most no(1)Majority gates cannot compute the MOD kfunction.\nCorollary 5.3. Letk >1, and let Qo(logn)be any finite sequence (of O(1)length) of alternating ∃and∀\nquantifiers, where the total number of bits quantified over is o(logn). Then\nModk/∈Qo(logn)MAC0(DTISP(polylog( n),log(n))).\nProof.LetL∈Qo(logn)MAC0(DTISP(polylog( n),log(n))). ByFact2.4, DTISP(polylog( n),log(n))⊆quasiAC0,\nsoMAC0(DTISP(polylog( n),log(n)))⊆quasiMAC0, that is, quasi-polynomial size circuits of constant depth\nwith a single Majority gate at the output. Thus L∈Qo(logn)quasiMAC0.\nLetCbe thequasiMAC0circuit such that x∈L⇐⇒(Qy)C(x,y), where |y|< o(log|x|), for all strings\nx. There are 2o(logn)=no(1)possible choices for y; letCy(x) =C(x,y), where Cydenotes the circuit Cwith\nthe second inputs fixed to the string y.\nNow, to compute L, the quantifiers Qo(logn)can be replaced by a constant-depth circuit (whose depth is\nequal to the number of quantifier alternations), and whose total size is 2o(logn)=no(1), where at each leaf of\nthis circuit, we put the corresponding circuit Cy. The resulting circuit is a quasiTC0circuit with only no(1)\nMajority gates, hence by Theorem 5.2, cannot compute Parity.\n6 Isomorphism for Groups of Almost All Orders\nDietrich & Wilson [DW22] previously established that there exists a den se set Υ⊆Nsuch that if n∈Υ and\nG1,G2are magmas of order ngiven by their multiplication tables, we can (i) decide if G1,G2are groups,\nand (ii) if so, decide whether G1∼=G2in timeO(n2log2n), which is quasi-linear time relative to the size of\nthe multiplication table.\nIn this section, we establish the following.\nTheorem 6.1. Letn∈Υ, and let G1,G2be groups of order n. We can decide isomorphism between G1\nandG2inAC0(DTISP(polylog( n),log(n))).\nNote that verifying the group axioms is AC0-computable.\nRemark 6.2. Theorem 6.1 provides that for almost all orders, Group Isomorphism belongs to\nAC0(DTISP(polylog( n),log(n))), which is contained within L∩FOLL/subset⋉oteqlPand cannot compute Parity.\nWhile it is known that Group Isomorphism belongs to complexity classes such as ∃log2nL∩∃log2nFOLL\n[CTW13] and quasiAC0(Theorem 4.1) that cannot compute Parity, membership within P—let alone a\nsubclass of Pthat cannot compute Parity—is a longstanding open problem.\nProof of Theorem 6.1. Dietrich & Wilson showed [DW22, Theorem 2.5] that if Gis a group of order n∈Υ,\nthenG=H⋉B, where:\n•Bis a cyclic group of order p1···pℓ, where for each i∈[ℓ],pi>loglognandpiis the maximum power\nofpidividing n.\n•|H|= (logn)polyloglog n; and in particular, if a prime divisor pofnsatisfiesp≤loglogn, thenpdivides\n|H|.\nAsG1,G2aregivenbytheirmultiplicationtables, wemayin AC0compute(i)the primedivisors p1,...,p k\nofn, and (ii) determine whether, for each i∈[k],piis the maximal power of pidividing n. Furthermore, in\nAC0, we may write down ⌊loglogn⌋and test whether pi>⌊loglogn⌋.\nFix a group Gof order n. We will first discuss how to decompose G=H⋉B, as prescribed by [DW22,\nTheorem 2.5]. Without loss of generality, suppose that p1,...,p ℓ(ℓ≤k) are the unique primes where pi(i∈\n[ℓ]) divides nonly once and pi>loglogn. Now as each pican be representedas a string of length ≤ ⌈log(n)⌉,\nwe may in AC0compute p:=p1···pℓ(Obs. 2.2). Using Lem. 3.1, we may in AC0(DTISP(polylog( n),log(n)))\nidentify an element g∈Gof order p.\nNow inAC0, we may write down the multiplication table for Hj∼=Gj/Bj. As|Hj| ≤(logn)polyloglog n,\nthere are poly( n) possible generating sequences for Hjof length at most log |Hj|. By [BS84] it actually\n13suffices to consider cube generating sequences for Hj. Now given cube generating sequences xjforHj,\nwe may by the proof of Theorem 4.1 decide whether x1/ma√sto→x2extends to an isomorphism of H1andH2\nin∀logn∃lognDTISP(polylog( n),log(n))⊆AC0(DTISP(polylog( n),log(n))). As there are only poly( n) such\ngenerating sequences to consider, we may decide whether H1∼=H2inAC0(DTISP(polylog( n),log(n))).\nSuppose H1∼=H2,B1∼=B2, and gcd( |Bj|,|Hj|) = 1 for j= 1,2. We have by the Schur–Zassenhaus\nTheorem that Gj=Hj⋉θjBj(j= 1,2). By Taunt’s Lemma [Tau55], it remains to test whether the action s\nθ1andθ2are equivalent in the following sense. We first note that, as Bjis Abelian, for any two elements\nh1,h2ofGjbelonging to the same coset of Gj/Bjand any element b∈Bj, thath1bh−1\n1=h2bh−1\n2. Thus,\ngiven an isomorphism α:H1∼=H2(whereα(h1) =h2is represented using arbitrary coset representatives\nofh1,h2), we may by Lemma 3.1, search in AC0(DTISP(polylog( n),log(n))) for generators b1∈B1,b2∈B2\nand write down the isomorphism β:B1∼=B2induced by the map b1/ma√sto→b2. We may now check in AC0\nwhether for all h1∈H1and allb∈Bjwhether\nβ(h1bh−1\n1) =α(h1)β(b)α(h−1\n1).\nHere, we abuse notation, where h1bh−1\n1is evaluated using the coset representatives h1∈h1andh−1\n1∈h−1\n1.\nThe result now follows.\n7 Minimum Generating Set\nIn this section, we consider the Minimum Generating Set (MGS) problem for quasigroups, as well as\narbitrary magmas.\n7.1 MGS for Groups in AC1(L)\nIn this section, we establish the following.\nTheorem 7.1. MGSfor groups belongs to AC1(L).\nWe begin with the following lemma.\nLemma 7.2. LetGbe a group. We can compute a chief series for GinAC1(L).\nProof.We will first show how to compute the minimal normal subgroups N1,...,N ℓofG. We proceed as\nfollows. We first note that the normal closure ncl( x) is the subgroup generated by {gxg−1:g∈G}. Now we\nmay write down the elements of {gxg−1:g∈G}inAC0, and then compute ncl( x) inLusing a membership\ntest. Now in L, we may identify the minimal (with respect to inclusion) subgroups am ongst those obtained.\nGivenN1,...,N ℓ, we may easily in Lcompute/producttextk\ni=1Nifor each k≤ℓ. In particular, we may compute\nSoc(G) inL. We claim that/producttextk\ni=1Ni, fork= 1,...,ℓ, is in fact a chief series of Soc( G) (which will then\nfit into a chief series for G). To see this, we have that/producttextk\ni=1Niis normal in/parenleftBig/producttextk\ni=1Ni/parenrightBig\n×Nk+1and that\n(/producttextk+1\ni=1Ni)/(/producttextk\ni=1Ni)∼=Nk+1is a normal subgroup of G//producttextk\ni=1Ni. By the Lattice Isomorphism Theorem,\n(/producttextk+1\ni=1Ni)/(/producttextk\ni=1Ni) is in fact minimal normal in G//producttextk\ni=1Ni.\nWe iterate on this process starting from G/Soc(G). Note that, as we have computed Soc( G) from the\nprevious paragraph, we may write down the cosets for G/Soc(G) inAC0. Furthermore, given a subgroup\nH≤G/Soc(G), we may write down the elements of HSoc(G) inAC0. By the above, the minimal normal\nsubgroups of a group are computable in L. As there are at most log nterms in a chief series, we may compute\na chief series for GinAC1(L), as desired. (Recall that we use this notation to mean an AC1circuit with\noracle gates calling a Loracle, not function composition such as AC1◦L.)\nWe now prove the Theorem 7.1.\nProof of Theorem 7.1. By Lem. 7.2, we can compute a chief series for GinAC1(L). So let N1⊳···⊳ Nk\nbe a chief series SofG. Lucchini and Thakkar [LT24] showed that minimum generating sets ofG/Ni+1\nhave specific structure depending on whether or not Ni+1/Niis Abelian. We proceed inductively down S\nstarting from Nk−1. AsG/Nk−1is a finite simple group, and hence at most 2-generated, we can write all\n14/parenleftbign\n2/parenrightbig\npossible generating sets in parallel with a single AC0circuit and test whether each generates the group\nwith a membership test. This can be done in L.\nFixi < k. Suppose we are given a minimum generating sequence g1,...,g d∈GforG/Ni. We will\nconstruct a minimum generating sequence for G/Ni−1as follows. We consider the following cases:\n•Case 1: Suppose that N=Ni/Ni−1is Abelian. By [LM94, Theorem 4], we have three cases:\n– Case 1a: G/Ni−1=/a\\}⌊ra⌋k⌉tl⌉{tg1,···,gd/a\\}⌊ra⌋k⌉tri}ht. We may test whether this holds in Lusing a membership test.\n– Case 1b: We have G/Ni−1=/a\\}⌊ra⌋k⌉tl⌉{tg1,···,gi,gjn,gj+1,···,gd/a\\}⌊ra⌋k⌉tri}htfor some j∈[d] and some n∈N.\nThere are at most d·(|N| −1) generating sets to consider in this case and we can test each of\nthem inL.\n– Case 1c: If neither Cases 1a or 1b hold, then we necessarily have that G/Ni−1=/a\\}⌊ra⌋k⌉tl⌉{tg1,···,gd,x/a\\}⌊ra⌋k⌉tri}ht\nfor some any non-identity element x∈N.\nNote that there are at most d·|N|generating sets to consider, we may construct a minimum generatin g\nset forG/Ni−1inLusing a membership test.\n•Case 2: Suppose instead that N=Ni/Ni−1is non-Abelian. Then by [LT24, Corollary 13] we have\nthe following cases:\n– Case 2a: G/Ni−1=/a\\}⌊ra⌋k⌉tl⌉{tg1,···,gd/a\\}⌊ra⌋k⌉tri}ht. We may test whether this holds in Lusing a membership test.\n– Case 2b: If Case 2a does not hold, then we have the following case. Let ηG(N) denote the\nthe number of factors in a chief series with order |N|. Letu= max{d,2}andt= min{u,⌈8\n5+\nlog|N|ηG(N)⌉}. Thenthereexist n1,...,n t∈Ni−1suchthat G/Ni−1=/a\\}⌊ra⌋k⌉tl⌉{tg1n1,···,gtnt,gt+1,···,gd/a\\}⌊ra⌋k⌉tri}ht.\nBy [LT24, Corollary 13], there are at most |N|⌈8\n5+log|N|ηG(N)⌉generating sets of this form. We\nmay write down these generating sets in parallel with a single AC0circuit and test whether each\ngenerate G/Ni−1inLusing a membership test.\nDescendingalongthe chiefseriesinthis fashion, wecompute quotien tsNi/Ni−1andcomputeagenerating\nset forG/Ni−1. The algorithm terminates when we’ve computed a generating set fo rG/N0=G. Since a\nchief series has O(logn) terms, this algorithm requires O(logn) iterations and each iteration is computable\ninL. Hence, we have an algorithm for MGSinAC1(L).\nImproving upon the AC1(L) bound on MGSfor groups appears daunting. It is thus natural to inquire as\nto families of groups where MGSis solvable in complexity classes contained within AC1(L). To this end, we\nexamine the class of nilpotent groups. Arvind & Tor´ an previously es tablished a polynomial-time algorithm\nfor nilpotent groups [AT06, Theorem 7]. We improve their bound as fo llows.\nProposition 7.3. For a nilpotent group G, we can compute d(G)inL∩AC0(NTISP(polylog( n),log(n))).\nProof.LetGbe our input group. Recall that a finite nilpotent group is the direct p roduct of its Sylow\nsubgroups (which by the Sylow theorems, implies that for a given prim epdividing |G|, the Sylow p-subgroup\nofGis unique). We can, in AC0(DTISP(polylog( n),log(n))) (using Cor. 3.2), decide if Gis nilpotent; and if\nso, compute its Sylow subgroups. So we write G=P1×P2×···×Pℓ, where each Piis the Sylow subgroup\nofGcorresponding to the prime pi. Arvind & Tor´ an (see the proof of [AT06, Theorem 7]) established t hat\nd(G) = max 1≤i≤ℓd(Pi). Thus, it suffices to compute d(Pi) for each i∈[ℓ].\nThe Burnside Basis Theorem provides that Φ( P) =Pp[P,P]. We may compute Ppin\nL∩AC0(DTISP(polylog( n),log(n))) (the latter using Cor. 3.2). We now turn to computing [ P,P]. Us-\ning a membership test, we can compute [ P,P] inL. By [Ser97, I. §4 Exercise 5], every element in [ P,P]\nis the product of at most log |P|commutators. Therefore, we can also decide membership in [ P,P] in\nNTISP(polylog( n),log(n)), andsowecanwritedowntheelementsof[ P,P]inAC0(NTISP(polylog( n),log(n))).\nThus, we may compute Φ( P) inL∩AC0(NTISP(polylog( n),log(n))). Given Φ( P), we may compute\n|P/Φ(P)|inAC0. Thus, we may recover d(P) from|P/Φ(P)|inAC0, by iterated multiplication of the\nprime divisor pof|P|. As the length of the encoding of pis at most log |P|and we are multiplying pby\nitself log |P|times, iterated multiplication is AC0-computable. Thus, in total, we may compute d(P) in\nL∩AC0(NTISP(polylog( n),log(n))). It follows that for an arbitrary nilpotent group G, we may compute\nd(G) inL∩AC0(NTISP(polylog( n),log(n))).\n15Remark 7.4. While Prop. 7.3 allows us to compute d(G) for a nilpotent group G, the algorithm is non-\nconstructive. It is not clear how to find such a generating set in L. We can, however, provide such a\ngenerating set in AC1(NTISP(polylog( n),log(n))). Note that this bound is incomparable to AC1(L). We\noutline the algorithm here.\nThe Burnside Basis Theorem provides that for a nilpotent group G, (i) every generating set of Gprojects\nto a generating set of G/Φ(G), and (ii) for every generating set SofG/Φ(G),everylift ofSis a generating\nset ofG. Furthermore, every minimum generating set of Gcan be obtained from the Sylow subgroups in\nthe following manner. Write G=P1× ··· ×Pℓ, wherePiis the Sylow pi-subgroup of G. Suppose that\nPi=/a\\}⌊ra⌋k⌉tl⌉{tgi1,...,g ik/a\\}⌊ra⌋k⌉tri}ht(where we may have gij= 1 for certain values of j). Write gj=/producttextℓ\ni=1gij. As in the proof\nof [AT06, Theorem 7] we obtain G=/a\\}⌊ra⌋k⌉tl⌉{tg1,...,g k/a\\}⌊ra⌋k⌉tri}ht.\nGiven generating sets for P1,...,P ℓ, we may in L∩AC0(NTISP(polylog( n),log(n))) recover a generating\nset forG. Thus, it suffices to compute a minimum generating set P/Φ(P)∼=(Z/pZ)d(P), where Pis\nap-group. Note that we may handle each Sylow subgroup of Gin parallel. To compute a minimum\ngenerating set of P/Φ(P), we use the generator enumeration strategy. As P/Φ(P) is Abelian, we may check\ninAC0(NTISP(polylog( n),log(n))) Cor. 3.6whether a set ofelements generatesthe group. As d(P)≤log|P|,\nwe have log |P|steps where each step is AC0(NTISP(polylog( n),log(n)))-computable. Thus, we may compute\na minimum generating set for PinAC1(NTISP(polylog( n),log(n))), as desired.\n7.2 MGS for Quasigroups\nInthissection, weconsiderthe Minimum Generating Set problemforquasigroups. Ourgoalistoestablish\nthe following.\nTheorem 7.5. ForMGSfor quasigroups,\na. The decision version belongs to ∃log2n∀lognNTIME(polylog( n));\nb. The decision version belongs to ∃log2nSAC1⊆DSPACE(log2n);9and\nc. The search version belongs to quasiAC0.\nIn the paper in which they introduced (polylog-)limited nondeterminis m, Papadimitriou and Yannakakis\nconjectured that MGS for quasigroups was ∃log2nP-complete [PY96, after Thm. 7]. While they did not\nspecify the type of reductions used, it may be natural to consider polynomial-time many-one reductions.\nTheorem 7.5 refutes two versions of their conjecture under othe r kinds of reductions, that are incomparable\nto polynomial-time many-one reductions: quasiAC0reductions unconditionally and polylog-space reductions\nconditionally. We note that their other ∃log2nP-completeness result in the same section produces a reduction\nthat in fact can be done in logspace and (with a suitable, but natural, encoding of the gates in a circuit)\nalso inAC0, so our result rules out any such reduction for MGS. (We also note: assuming EXP/\\⌉}atio\\slash=PSPACE,\nshowing that this problem is complete under polynomial-time reduction s would give a separation between\npoly-time and log-space reductions, an open problem akin to P/\\⌉}atio\\slash=L.)\nCorollary 7.6. MGSfor quasigroups and Quasigroup Isomorphism are\na. not∃log2nP-complete under quasiAC0Turing reductions.\nb. not∃log2nP-complete under polylog-space Turing reductions unless EXP=PSPACE.\nProof.(a) Thm. 7.5 (a) for MGS, resp. Thm. 4.1 for Quasigroup Isomorphism , place both problems into\nclasses that are contained in quasiAC0by Fact 2.4. The result then follows by noting that quasiAC0is closed\nunderquasiAC0Turing reductions, Parity∈P⊆ ∃log2nP, butParity /∈quasiAC0.\n(b) Both MGSfor quasigroups and Quasigroup Isomorphism are inDSPACE(log2n) by Thm. 7.5 (b),\nresp. [CTW13]. The closure of DSPACE(log2n) under poly-log space reductions is contained in polyL=/uniontext\nk≥0DSPACE(logkn). If either of these two quasigroup problems were complete for ∃log2nPunder polylog-\nspace Turing reductions, we would get ∃log2nP⊆polyL. Under the latter assumption, by a straightforward\npadding argument, we now show that EXP=PSPACE.\n9Wolf [Wol94] showed the containment ∃log2nSAC1⊆DSPACE (log2n).\n16LetL∈EXP; letkbe such that L∈DTIME(2nk+k). Define Lpad={(x,12|x|k+k) :x∈L}. By\nconstruction, Lpad∈P. Let us use Nto denote the size of the input to Lpad, that is, N= 2nk+k+n. By\nassumption, we thus have Lpad∈polyL. Suppose ℓis such that Lpad∈DSPACE(logℓN). We now give a\nPSPACE algorithm for L. In order to stay within polynomial space, we cannot write out the p adding 12nk+k\nexplicitly. What we do instead is simulate the DSPACE(logℓN) algorithm for Lpadas follows. Whenever\nthe head on the input tape would move off the xand into the padding, we keep track of its index into\nthe padding, and the simulation responds as though the tape head were reading a 1. When the tape head\nmoves right the index increases by 1, when it moves left it decreases by 1, and if the index is zero and the\ntape head moves left, then we move the tape head onto the right en d of the string x. The index itself is a\nnumber between 0 and 2nk+k, so can be stored using only O(nk) bits. The remainder of the Lpadalgorithm\nuses only O(logℓN) =O(nkℓ) additional space, thus this entire algorithm uses only a polynomial a mount of\nspace, so L∈PSPACE, and thus EXP=PSPACE.\nNow we return to establishing the main result of this section, Thm. 7.5 . To establish Thm. 7.5 (a) and\n(c), we will crucially leverage the Membership for quasigroups problem. To this end, we will first establish\nthe following.\nTheorem 7.7. Membership for quasigroups belongs to NTIME(polylog( n)).\nRemark 7.8. A natural approach to Thm. 7.5 (b) is also to attempt to use Thm. 7.7 . For comparison\nto the approach we take instead, we note that a careful analysis o f the proof for Thm. 7.7 only yields a\nDSPACE(log3n) bound for MGSfor quasigroups.\nThm. 7.7 immediately yields the following corollary.\nCorollary 7.9. For quasigroups, Membership andMGSare not hard under AC0-reductions for any com-\nplexity class containing Parity.\nThe proofs of Theorem 7.7 and Theorem 7.5 rely crucially on the followin g adaption of the Babai–\nSzemer´ edi Reachability Lemma [BS84, Theorem 3.1] to quasigroups . We first generalize the notion of\na straight-line program for groups [BS84] to SLPs for quasigroups . LetXbe a set of generators for a\nquasigroup G. We call a sequence of elements g1,...,g ℓ∈Gastraight-line program (SLP for short) if each\ngi(i∈[ℓ]) either belongs to X, or is of the form or gjgk,gj\\gk, orgj/gkfor some j,k < i(wheregj\\gk, resp.\ngj/gk, denotes the quasigroup division as defined in Section 2.1). An SLP is s aid tocompute orgenerate a\nsetS(or an element g) ifS⊆ {g1,...,g ℓ}(resp.g∈ {g1,...,g ℓ}).\nLemma 7.10 (Reachability Lemma for quasigroups) .LetGbe a finite quasigroup and let Xbe a set of\ngenerators for G. For each g∈G, there exists a straight-line program over Xgenerating gwhich has length\nO(log2|G|).\nProof.We follow the same strategy as in the proof of [BS84, Theorem 3.1], bu t there are some subtle, yet\ncrucial, modifications due to the fact that quasigroups are non-as sociative and need not posses an identity\nelement. We will inductively construct a sequence z0,z1,...,z t(similar to a cube generating sequence).\nFor any sequence of elements z1,...,z k, letP(z1z2···zk) denote the left-to-right parenthesization, e.g.,\nP(z1z2z3) = (z1z2)z3. For some initial segment z0,z1,...,z idefine the cube\nK(i) ={P(z0ze1\n1···zei\ni) :e1,...,e i∈ {0,1}},\nwhereej= 0 denotes omitting zjfrom the product (since there need not be an identity element).\nDefineL(i) =K(i)\\K(i) ={g\\h:g,h∈K(i)}. We will construct a sequence z0,z1,...,z tsuch that\nt≤ ⌈log2(n)⌉andL(t) =G. Moreover, we derive a bound on the straight-line cost c(i) for{z0,z1,...,z i}\n(1≤i≤t), which is defined as the length of the shortest SLP generating {z0,z1,...,z i}.\nWe take z0as an arbitrary element from X. Hence, K(0) ={z0}, and soc(0) = 1. Next, let us construct\nK(i+1)from K(i). IfL(i)/\\⌉}atio\\slash=G, we setzi+1to be the element z′/∈L(i) that minimizes c(i+1)−c(i). We first\nclaim that |K(i+1)|= 2·|K(i)|. Note that K(i+1) =K(i)∪K(i)zi+1by definition. As right-multiplication\nby a fixed element is a bijection in a quasi-group, it suffices to show tha tK(i)∩K(i)zi+1=∅. So, suppose\n17that there exists some a∈K(i)∩K(i)zi+1. Then a=gzi+1for some g∈K(i). Hence, zi+1=g\\a,\ncontradicting zi+1/\\⌉}atio\\slash∈L(i), since both aandgare inK(i).\nIt now follows that |K(i)|= 2iand, hence, t≤ ⌈log2(|G|)⌉andL(t) =G. Moreover, for every g∈Gwe\nobtain an SLP of length at most c(t)+2t+1: write g=a\\bfora,b∈K(t) and start with the SLP computing\n{z0,z1,...,z t}. We obtain an SLP for a=z0ze1\n1···zet\ntby adding a new element for each z0ze1\n1···zei\niwith\nei= 1 (1≤i≤t, thus, at most tnew elements). Likewise, we get an SLP for b. Adding a last element\ng=a\\b, we obtain an SLP computing g.\nIt remains to bound the straight-line cost c(i) of{z0,z1,...,z i}. Here, we claim that that c(i+1)−c(i)≤\n4i+3 (note that this is slightly worse than the bound c(i+1)−c(i)≤2i+1 for groups [BS84]). It follows\nfrom this claim that c(i)∈O(i2). We will now turn to proving our claim.\nProof of Claim. IfG/\\⌉}atio\\slash=L(i), then either X/\\⌉}atio\\slash⊆L(i) orL(i) is not a sub-quasigroup. Hence, we have one of\nthe following cases:\n•Case 1: Suppose that there is some g∈XL(i). In this case, there is an SLP of length one for g.\nThus, given an SLP for {z0,...,z i}at costc(i), we may construct an SLP for {z0,...,z i,g}of length\nc(i)+1 and we obtain c(i+1)−c(i)≤1 in this case.\n•Case 2: Suppose there exist g,h∈L(i) with one of gh,g/h, org\\h/\\⌉}atio\\slash∈L(i). For simplicity, suppose\ngh/\\⌉}atio\\slash∈L(i).The argument is identical for g/handg\\h. As above, given a straight-line program to\ncompute {z0,z1,...,z i}, we may construct straight-line programs for gandheach of additional length\n2i+1. This yields a straight-line program for ghof total length at most c(i)+4i+3, and shows that\nc(i+1)−c(i)≤4i+3.\nThe result now follows.\nForprovingTheorem7.7 wefollowessentiallythe ideasof[Fle22] (thou gh weavoidintroducingthe notion\nof Cayley circuits). Fleischer obtained a quasiAC0bound for Membership for groups by then showing that\nthe Cayley circuits for this problem can be simulated by a quasiAC0circuit. We will instead directly analyze\nthe straight-line programs using an NTIME(polylog( n)) (sequential) algorithm.\nProof of Theorem 7.7. To decide whether g∈ /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht, we guess a sequence of elements g1,...,g ℓ∈Gwith\nℓ∈O(log2|G|) andgℓ=gand in a next step verify whether this, indeed, is a straight-line prog ram. Clearly,\nthe conditions ( gi(i∈[ℓ]) either belongs to X, or is of the form gjgk,gj\\gk, orgj/gkfor some j,k < i) can\nbe checked in time polynomial in the length of the straight-line progra m and, thus, in time polylogarithmic\nin the input length.\nThe proof of Thm. 7.5 (a) and (c) below is by describing a reduction fr omMGStoMembership . To\nestablish Thm. 7.5 (b), we use the following result of Wagner:\nLemma 7.11 ([Wag10, Theorem 10.2.1]) .LetQbe a quasigroup, and let X⊆Q. We can compute /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}htin\nSAC1.\nWe now have all the ingredients we need to prove all three parts of T hm. 7.5.\nProof of Theorem 7.5. (a) LetGdenote the input quasigroup (of order n). First, observe that every quasi-\ngroup has a generating set of size ≤ ⌈logn⌉[Mil78]. Therefore, we start by guessing a subset X⊆Gof size\nat most≤ ⌈logn⌉(resp. the size bound given in the input). For the decision version, w e useO(log2n) exis-\ntentially quantified non-deterministic bits ( ∃log2n) to guess a generating sequence. To find a minimum-sized\ngenerating sequence, we can enumerate all possible generating se quences in quasiAC0. In the next step, we\nverify whether Xactually generates G. This is done by checking for all g∈G(universally verifying O(logn)\nbits,∀logn) whether g∈ /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}ht, which can be done in NTIME(polylog( n))⊆quasiAC0by Theorem 7.7. This\nconcludes the proof of the bound (a) for the decision variant.\n(c) If we want to compute the minimum generating set, we have to ch eck whether it is actually of smallest\npossible size. To do this, in a last step, we use the same technique as a bove to check that all Y⊆Gwith\n|Y|<|X|do not generate G.\n(b) Every quasigroup has a generating set of size ≤ ⌈logn⌉. Existentially guess the generating set using\nlog2nbits, then use Lem. 7.11 to compute /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}htinSAC1. With a log-depth tree of bounded fan-in AND\ngates, we then check that /a\\}⌊ra⌋k⌉tl⌉{tX/a\\}⌊ra⌋k⌉tri}htis indeed the whole quasigroup.\n18Remark 7.12. We may similarly reduce Quasigroup Isomorphism toMembership for quasigroups.\nThis formalizes the intuition that membership testing is an essential s ubroutine for isomorphism testing\nandMGS. In particular, in the setting of quasiAC0, we have that isomorphism testing and MGSreduce\ntoMembership . This latter consequence might seem surprising, as in the setting of groups,Membership\nbelongs to L, whileMGSbelongs to AC1(L) (Thm. 7.1) and it is a longstanding open problem whether\nGroup Isomorphism is inP.\n7.3 MGS for Magmas\nIn this section, we establish the following.\nTheorem 7.13. The decision variant of Minimum Generating Set for magmas is NP-complete.\nThisNP-completeness result helps explain the use of Integer Linear Progr amming in practical heuristic\nalgorithms for the search version of this problem, e.g., [JMV23].\nFor the closely related problem they called Log Generators —given the multiplication table of a binary\nfunction (=magma) of order n, decide whether it has a generating set of size ≤ ⌈log2n⌉—Papadimitriou\nand Yannakakis proved that Log Generators of Magmas is∃log2nP-complete under polynomial-time\nreductions [PY96, Thm. 7]. Our proof uses a generating set of size r oughly√n, wherenis the order of\nthe magma; this is analogous to the situation that Log-Clique is in∃log2nP, while finding cliques of size\nΘ(√n) in ann-vertex graph is NP-complete.\nProof.It is straightforward to see that the problem is in NPby simply guessing a suitable generating set.\nTo show NP-hardness we reduce 3SATtoMinimum Generating Set for magmas. Let F=/logicalandtextm\nj=1Cjwith\nvariables X1,...,X nbe an instance of 3SAT. Our magma Mconsists of the following elements:\n•for each variable Xi, two elements Xi,Xi,\n•for each clause Cjan element Cj,\n•for each 1 ≤j≤k≤man element Tj,k, and\n•a trash element 0.\nWe useTas an abbreviation for T1,m.\nWe define the multiplication as follows:\nCjX=Tj,jif the literal Xappears in Cj\nTXi=Xi,\nTXi=Xi,\nTj,kTk+1,ℓ=Tj,ℓ.\nall other products are defined as 0.\nNote that any generating set for Mmust include all the Cj, since without them, there is no way to\ngenerate them from any other elements. Similarly, any generating s et must include, for each i= 1,...,n, at\nleast one of XiorXi, since again, without them, there is no way to generate those from any other elements.\nWhenFis satisfiable, we claim that Mcan be generated by precisely n+melements. Namely, include\nallCjin the generating set. Fix a satisfying assignment ϕtoF. Ifϕ(Xi) = 1, then include Xiin the\ngenerating set, and if ϕ(Xi) = 0, include Xiin the generating set. Since ϕis a satisfying assignment, for\neachj, there is a literal Xin our generating set that appears in Cj, and from those two we can generate\nCjX=Tj,j. Next,Tj,jTj+1,j+1=Tj,j+1, and by induction we can generate all Tj,k. In particular, we can\ngenerate T=T1,m, and then using Tand our literal generators, we can generate the remaining literals.\nConversely, suppose Mis generated by n+melements; we will show that Fis satisfiable. As argued\nabove, those elements must consist of {Cj:j∈[m]}together with precisely one literal corresponding to each\nvariable. Since the final defining relation can only produce elements Tj,ℓwithjstrictly less than ℓ, the only\nway to generate Tj,jfrom our generating set is using the first relation. Namely, at least o ne of the literals in\nour generating set must appear in Cj. But then, reversing the construction of the previous paragrap h, the\nliterals in our generating set give a satisfying assignment to F.\n19As with most NP-complete decision versionsof optimization problems, we expect tha t theexactversion—\ngiven a magma Mand an integer k, decide whether the minimum generating set has size exactly k—is\nDP-complete, but we leave that as a (minor) open question.\n8 Conclusion\nThe biggest open question about constant-depth complexity on alg ebras given by multiplication tables is,\nin our opinion, still whether or not Group Isomorphism is inAC0in the Cayley table model. Our results\nmake salient some more specific, and perhaps more approachable, o pen questions that we now highlight.\nQuestion 8.1. DoesMGSfor groups belong to L?\nQuestion 8.2. DoesMembership for quasigroups belong to L?\nThe analogousresult is known forgroups, by reducingto the conne ctivity problem on Cayleygraphs. The\nbest knownbound forquasigroupsis SAC1due to Wagner[Wag10]. Improvementsin this directionwould im-\nmediately yield improvements in MGSfor quasigroups. Furthermore, a constructive membership test would\nalso yield improvements for isomorphism testing of O(1)-generated quasigroups. Note that isomorphism\ntesting of O(1)-generated groups is known to belong to L[Tan13].\nReferences\n[ABFR91] James Aspnes, Richard Beigel, Merrick Furst, and Steven Rudich. The expressive power of\nvoting polynomials. In Proceedings of the Twenty-Third Annual ACM Symposium on The ory of\nComputing , STOC ’91, page 402–409, New York, NY, USA, 1991. Association fo r Computing\nMachinery. doi:10.1145/103418.103461 .\n[Alb43] A. A. Albert. Quasigroups. I. Transactions of the American Mathematical Society , 54(3):507–\n519, 1943. doi:10.2307/1990259 .\n[AT06] Vikraman Arvind and Jacobo Tor´ an. The complexity of quasig roup isomorphism and the\nminimum generating set problem. In Tetsuo Asano, editor, Algorithms and Computation,\n17th International Symposium, ISAAC 2006, Kolkata, India, December 18-20, 2006, Pro-\nceedings, volume 4288 of Lecture Notes in Computer Science , pages 233–242. Springer, 2006.\ndoi:10.1007/11940128\\_25 .\n[Bab80] L´ aszl´ o Babai. On the complexity of canonical labeling of str ongly regular graphs. SIAM Journal\non Computing , 9(1):212–216, 1980. doi:10.1137/0209018 .\n[Bab16] L´ aszl´ o Babai. Graph isomorphism in quasipolynomial time [ext ended abstract]. In STOC’16—\nProceedings of the 48th Annual ACM SIGACT Symposium on Theor y of Computing , pages\n684–697. ACM, New York, 2016. Preprint of full version at arXiv:15 12.03547v2 [cs.DS].\ndoi:10.1145/2897518.2897542 .\n[Bar92] D.A.M. Barrington. Quasipolynomial size circuit classes. In [1992] Proceedings of\nthe Seventh Annual Structure in Complexity Theory Conferen ce, pages 86–93, 1992.\ndoi:10.1109/SCT.1992.215383 .\n[BKLM01] David A. Mix Barrington, Peter Kadau, Klaus-J¨ orn Lange , and Pierre McKenzie. On the\ncomplexity of some problems on groups input as multiplication tables. J. Comput. Syst. Sci. ,\n63(2):186–200, 2001. doi:10.1006/jcss.2001.1764 .\n[BM91] DavidA. Mix Barringtonand PierreMcKenzie. Oraclebranching programsandLogspaceversus\nP.Inf. Comput. , 95(1):96–115, 1991. doi:10.1016/0890-5401(91)90017-V .\n[Bos63] R. C. Bose. Strongly regular graphs, partial geometries a nd partially balanced designs. Pacific\nJournal of Mathematics , 13(2):389 – 419, 1963. doi:pjm/1103035734 .\n20[Bru63] R. H. Bruck. Finite nets. II. Uniqueness and imbedding. Pacific Journal of Mathematics ,\n13(2):421 – 457, 1963. doi:10.2140/pjm.1963.13.421 .\n[BS84] L´ aszl´ o Babai and Endre Szemer´ edi. On the complexity of m atrix group problems I. In 25th An-\nnual Symposium on Foundations of Computer Science, West Pal m Beach, Florida, USA, 24-26\nOctober 1984 , pages 229–240.IEEEComputer Society, 1984. doi:10.1109/SFCS.1984.715919 .\n[BS94] DavidA. MixBarringtonandHowardStraubing. Complexpolyno mialsandcircuitlowerbounds\nfor modular counting. Comput. Complex. , 4:325–338, 1994. doi:10.1007/BF01263421 .\n[BW13] L´ aszl´ o Babai and John Wilmes. Quasipolynomial-time canonica l form for Steiner designs. In\nSTOC 2013 , pages 261–270, New York, NY, USA, 2013. Association for Compu ting Machinery.\ndoi:10.1145/2488608.2488642 .\n[CMZ17] Anthony E. Clement, Stephen Majewicz, and Marcos Zyman .The theory of nilpotent groups .\nBirkh¨ auser/Springer, Cham, 2017.\n[CTW13] Arkadev Chattopadhyay, Jacobo Tor´ an, and Fabian Wag ner. Graph isomorphism is not AC0-\nreducible to group isomorphism. ACM Trans. Comput. Theory , 5(4):Art. 13, 13, 2013. Prelimi-\nnary version appeared in FSTTCS ’10; ECCC Tech. Report TR10-117 .doi:10.1145/2540088 .\n[DEP+22] HeikoDietrich, MurrayElder,AdamPiggott,YoumingQiao,andAr minWeiß. Theisomorphism\nproblemfor plain groupsis in Σp\n3. In PetraBerenbrinkand Benjamin Monmege, editors, 39th In-\nternational Symposium on Theoretical Aspects of Computer S cience, STACS 2022, March 15-18,\n2022, Marseille, France (Virtual Conference) , volume 219 of LIPIcs, pages 26:1–26:14. Schloss\nDagstuhl - Leibniz-Zentrum f¨ ur Informatik, 2022. doi:10.4230/LIPIcs.STACS.2022.26 .\n[DT23] Bireswar Das and Dhara Thakkar. Algorithms for the minimum g enerating set problem, 2023.\narXiv:2305.08405 .\n[DW22] Heiko Dietrich and James B. Wilson. Group isomorphism is nearly- linear time for most orders.\nIn2021 IEEE 62nd Annual Symposium on Foundations of Computer S cience (FOCS) , pages\n457–467, 2022. doi:10.1109/FOCS52979.2021.00053 .\n[FGSTT20] Flavio Ferrarotti, Sen´ en Gonz´ alez, Klaus-Dieter Sche we, and Jos´ e Mar´ ıa Turull-Torres. Proper\nhierarchies in polylogarithmic time and absence of complete problems. In Andreas Herzig and\nJuha Kontinen, editors, Foundations of Information and Knowledge Systems , pages 90–105,\nCham, 2020. Springer International Publishing.\n[Fle22] Lukas Fleischer. The Cayley semigroupmembership problem. Theory of Computing , 18(8):1–18,\n2022.doi:10.4086/toc.2022.v018a008 .\n[GL23] Joshua A. Grochow and Michael Levet. On the Parallel Comple xity of Group Isomorphism via\nWeisfeiler-Leman. In Henning Fernau and Klaus Jansen, editors, Fundamentals of Computation\nTheory - 24th International Symposium, FCT 2023, Trier, Ger many, September 18-21, 2023,\nProceedings , volume14292of Lecture Notes in Computer Science , pages234–247.Springer, 2023.\nPreprint of full version at arXiv:2112.11487 [cs.DS]. doi:10.1007/978-3-031-43587-4\\_17 .\n[GQ17] Joshua A. Grochow and Youming Qiao. Algorithms for group iso morphism via group extensions\nand cohomology. SIAM J. Comput. , 46(4):1153–1216, 2017. Preliminary version in IEEE Con-\nference on Computational Complexity (CCC) 2014 (DOI:10.1109/CC C.2014.19).Also available\nas arXiv:1309.1776 [cs.DS] and ECCC Technical Report TR13-123. doi:10.1137/15M1009767 .\n[HAM02] William Hesse, Eric Allender, and David A. Mix Barrington. Unifor m constant-\ndepth threshold circuits for division and iterated multiplication. Journal of Com-\nputer and System Sciences , 65(4):695–716, 2002. Special Issue on Complexity 2001.\ndoi:10.1016/S0022-0000(02)00025-9 .\n21[HBD17] Harald Andr´ es Helfgott, Jitendra Bajpai, and Daniele Dona . Graph isomorphisms in quasi-\npolynomial time, 2017. doi:10.48550/ARXIV.1710.04574 .\n[JKS02] Jeffrey C. Jackson, Adam R. Klivans, and Rocco A. Servedio . Learnability beyond AC0. In\nProceedings of the Thiry-Fourth Annual ACM Symposium on The ory of Computing , STOC\n’02, page 776–784, New York, NY, USA, 2002. Association for Comp uting Machinery.\ndoi:10.1145/509907.510018 .\n[JMV23] Mikol´ as Janota, Ant´ onio Morgado, and Petr Vojtechovs k´ y. Computing generat-\ning sets of minimal size in finite algebras. J. Symb. Comput. , 119:50–63, 2023.\ndoi:10.1016/J.JSC.2023.02.002 .\n[Lev23] Michael Levet. On the complexity of identifying strongly reg ular\ngraphs. Australasian Journal of Combinatorics , 87:41–67, 2023. URL:\nhttps://ajc.maths.uq.edu.au/pdf/87/ajc_v87_p041.pdf .\n[LGR16] Fran¸ cois Le Gall and David J. Rosenbaum. On the group and color isomorphism problems.\narXiv:1609.08253 [cs.CC], 2016.\n[LM94] Andrea Lucchini and Federico Menegazzo. Computing a set o f generators of minimal\ncardinality in a solvable group. Journal of Symbolic Computation , 17(5):409–420, 1994.\ndoi:10.1006/jsco.1994.1027 .\n[LSZ77] R. J. Lipton, L. Snyder, and Y. Zalcstein. The complexity of word and isomorphism problems\nfor finite groups. Yale University Dept. of Computer Science Resea rch Report # 91, 1977. URL:\nhttps://apps.dtic.mil/dtic/tr/fulltext/u2/a053246.p df.\n[LT24] AndreaLucchini andDharaThakkar. The minimum generating setproblem. Journal of Algebra ,\n640:117–128, 2024. doi:10.1016/j.jalgebra.2023.11.012 .\n[Mil78] Gary L. Miller. On the nlognisomorphism technique (a preliminary report). In Proceedings\nof the Tenth Annual ACM Symposium on Theory of Computing , STOC ’78, pages 51–58, New\nYork, NY, USA, 1978. Association for Computing Machinery. doi:10.1145/800133.804331 .\n[Neu79] A. Neumaier. Strongly regular graphs with smallest eigenvalu e−m.Archiv der Mathematik ,\n33:392–400, 1979. doi:10.1007/BF01222774 .\n[PY96] Christos H. Papadimitriou and Mihalis Yannakakis. On limited nond eterminism and\nthe complexity of the V-C dimension. J. Comput. Syst. Sci. , 53(2):161–170, 1996.\ndoi:10.1006/JCSS.1996.0058 .\n[Raz93] Alexander A Razborov. An Equivalence between Second Ord er Bounded Domain Bounded\nArithmeticandFirstOrderBoundedArithmetic. In Arithmetic, proof theory, and computational\ncomplexity . Oxford University Press, 05 1993. doi:10.1093/oso/9780198536901.003.0012 .\n[Rei08] Omer Reingold. Undirected connectivity in log-space. J. ACM , 55(4), sep 2008.\ndoi:10.1145/1391289.1391291 .\n[Rob82] D. Robinson. A Course in the Theory of Groups . Springer, 1982.\n[Ros13] David J. Rosenbaum. Bidirectional collision detection and fas ter deterministic isomorphism\ntesting. arXiv:1304.3935 [cs.DS], 2013.\n[Ser97] Jean-Pierre Serre. Galois Cohomology . Springer Berlin, Heidelberg, 1 edition, 1997.\ndoi:10.1007/978-3-642-59141-9 .\n[Smo87] Roman Smolensky. Algebraic methods in the theory of lower b ounds for boolean circuit\ncomplexity. In Alfred V. Aho, editor, Proceedings of the 19th Annual ACM Symposium\non Theory of Computing, 1987, New York, New York, USA , pages 77–82. ACM, 1987.\ndoi:10.1145/28395.28404 .\n22[Tan13] Bangsheng Tang. Towards Understanding Satisfiability, Group Isomorphism\nand Their Connections . PhD thesis, Tsinghua University, 2013. URL:\nhttp://papakonstantinou.org/periklis/pdfs/bangsheng _thesis.pdf .\n[Tau55] D. R. Taunt. Remarks on the isomorphism problem in theories of construction of finite\ngroups. Mathematical Proceedings of the Cambridge Philosophical S ociety, 51(1):16–24, 1955.\ndoi:10.1017/S030500410002987X .\n[Tor04] Jacobo Tor´ an. On the hardness of graph isomorphism. SIAM J. Comput. , 33(5):1093–1108,\n2004.doi:10.1137/S009753970241096X .\n[VGM09] Valery Vasil’ev, Maria Grechkoseeva, and V. Mazurov. Char acterization of the fi-\nnite simple groups by spectrum and order. Algebra and Logic , 48:385–409, 12 2009.\ndoi:10.1007/s10469-009-9074-9 .\n[Vol99] Heribert Vollmer. Introduction to Circuit Complexity - A Uniform Approach . Texts in Theoret-\nical Computer Science. An EATCS Series. Springer, 1999. doi:10.1007/978-3-662-03927-4 .\n[Wag10] F. Wagner. On the complexity of isomorphism testing for restricted\nclasses of graphs . PhD thesis, Universit¨ at Ulm, 2010. URL:\nhttps://oparu.uni-ulm.de/xmlui/bitstream/handle/123 456789/3923/vts_7264_10267.pdf .\n[Wol94] Marty J. Wolf. Nondeterministic circuits, space complexity an d quasigroups. Theoretical Com-\nputer Science , 125(2):295–313, 1994. doi:10.1016/0304-3975(92)00014-I .\n23" }, { "title": "2402.00134v2.Investigations_of__Λ__states_with_spin_parity___frac_3__2____pm__.pdf", "content": "arXiv:2402.00134v2 [hep-ph] 4 Apr 2024Investigations of Λstates with spin-parity3\n2±\nK. Azizi∗\nDepartment of Physics, University of Tehran, North Karegar Avenue, Tehran 14395-547, Iran\nDepartment of Physics, Doˇ gu¸ s University, Dudullu- ¨Umraniye, 34775 Istanbul, Turkey and\nSchool of Particles and Accelerators, Institute for Resear ch in Fundamental Sciences (IPM) P.O. Box 19395-5531, Tehra n, Iran\nY. Sarac†\nElectrical and Electronics Engineering Department, Atili m University, 06836 Ankara, Turkey\nH. Sundu‡\nDepartment of Physics Engineering, Istanbul Medeniyet Uni versity, 34700 Istanbul, Turkey\n(Dated: April 5, 2024)\nThe present study provides spectroscopic investigations o f spin-3\n2Λ baryons with both positive\nand negative parities. The analysis mainly focuses on three states, namely 1 P, 2P, and 2S, and\ncorresponding masses are calculated using the QCD sum rule m ethod. To implement the method,\nwe apply two types of interpolating currents with octet and s inglet quantum numbers and compare\nthe corresponding results with the reported masses of exper imentally observed states. From the\ncomparisons, it is extracted that the results of interpolat ing current with octet quantum numbers\nare in good agreement with the experimentally measured mass es. The masses obtained with this\ninterpolating current are m= 1513.64±8.76 MeV for 1 Pstate with JP=3\n2−,m′= 1687.91±\n0.31 MeV for 2 Pstate with JP=3\n2−and ˜m= 1882.37±11.95 MeV for 2 Sstate with JP=3\n2+and\nthey are consistent with the experimental masses of Λ(1520) , Λ(1690) and Λ(1890), respectively,\nwhich confirm their spin-parity quantum numbers. Besides, w e calculate the corresponding current\ncoupling constants, which are utilized as inputs in the calc ulations of different form factors defining\nthe widths of the states under study.\nI. INTRODUCTION\nThe advances in experimental researchareashave broughtmany new observations ofboth conventionaland noncon-\nventional hadrons. As a result of the improved experimental tech niques and analyses, the excited states of light and\nheavy baryons have been observed with progressively higher confi dence levels, and our understanding of the strong\ninteraction has been enhanced via the investigations conducted to comprehend the properties of these observed states.\nThe discrepancy between the numbers of the observed excited nu cleon and other resonance states and the expectation\nof the quark model keeps the subject hot and collects interest in t heir investigation. Consequently, comprehending\nthe spectroscopic characteristics, substructures, and intera ctions of the present or newly observed states is crucial for\ngaining a deeper understanding of both the strong interaction and the absent resonances.\nThe studies on the hyperon resonances and their excited states a re of importance to enhance our understanding of\nthese states. The need for the investigation of these states is au gmented by our poor knowledge of their properties\ncompared to those of non-strange baryons such as Nand ∆ resonances. The presence of squark with a mass\nheavier than the mass of uanddquarks and lighter than that of candbquarks puts these states in an interesting\nplace among the other baryons. The excited states of baryons ha ve been among the recent focus of investigations\nas a result of new observations pointing out possible excited states of heavy and light baryons [ 1–4]. Positive and\nnegative parity excitations of these baryons have been investigat ed in several works using different methods, such\nas the quark model [ 5–17], lattice QCD [ 18–20], basis lattice front quantization approach [ 21], covariant three-body\nFadeev approach [ 22], using Dyson-Schwinger and Bethe-Salpeter equations [ 23] and QCD sum rules method [ 24–\n32]. To advance our understanding of particle physics and the nonper turbative regime of QCD, understanding the\nstructure and interaction mechanisms of both heavy baryons and baryons with light quark content have been of\ninterest. Looking at the light baryons in Particle Data Group (PDG) [ 33], it is seen that there exist fifteen N\nresonances, eight ∆ resonances, ten Λ resonances, eight Σ reso nances, three Ξ resonances, and one Ω resonance with\n4-star status. However, the quark model predicts more states in these energy regions [ 5], whose reason may be the\neffective degrees of freedom of the model. These indicate a need fo r deeper investigation of the present and missing\n∗kazem.azizi@ut.ac.ir ; Corresponding author\n†yasemin.sarac@atilim.edu.tr\n‡hayriyesundu.pamuk@medeniyet.edu.tr2\nlight baryon resonances to understand their nature, structure , and interactions. With these motivations, these states\nwere investigated via different approaches [ 5,34,35].\nAmong these light baryons are the Λ hyperon and its excited states . These states have been investigated in the\nlast decades via the data coming from K−pinvariant mass spectra of hyperons [ 36–38], partial wave analyses of K−p\nreactions [ 39] and photo-production of Λ(1405) from JLab [ 40,41]. The recent couple channel analyses resulted in\nmore hyperons [ 42–49]. Besides experimental analyses, the spectrum of the Λ baryons w as investigated via various\ntheoretical models, such as the quark model [ 5,50–59] and lattice QCD [ 60–62]. The QCD sum rule method was\napplied to study the mass of Λ baryons [ 63–65]. The masses of the excited states of light strange baryons, includ ing\nΛ baryon, were studied in Ref. [ 66] using the Regge phenomenology with quasi-linear Regge trajector ies. In Ref. [ 57],\nit was pointed out that Λ(1405), Λ(1520), Λ(1670), and Λ(1690) are possible mixtures of the p-wave q2sstates and\ngroundq3¯sqpentaquark states. In Ref. [ 67], 71 Λ∗’s were predicted by lattice QCD calculations. Previous analyses\nwith the constituent quark models provided similar predictions [ 5,10]. All these put the baryon states containing\nstrange quarks among the focus of experimental and theoretica l researches for either the investigation of missing\nhyperon states or better understanding the observed ones. Be sides, these studies improve our understanding of the\nnonperturbativeregimeofQCD.Theirinvestigationsprovideuswith abetterunderstandingoftheirintrinsicstructure\nand the degrees of freedom in a baryon and help us improve our unde rstanding of confinement mechanisms as well.\nWith this motivation, baryon states with strange quarks have been the subject of investigations in many experimental\nfacilities around the world to investigate their spectroscopy and int erection mechanisms (for some recent experimental\ninvestigations, see, for instance, the Refs. [ 66,68–73]).\nIn this work, our main purpose is to study the Λ states with spin J=3\n2. With this aim, we make spectrum analyses\nfor Λ state with this spin and investigate not only the ground state b ut also the corresponding first orbital and first\nradial excitations. Among Λ states, our analyses with the consider ed spin-parity may supply relevant information\nabout the states Λ(1520) with spin-parity JP=3\n2−, Λ(1690) with spin-parity JP=3\n2−, and Λ(1890) with spin-\nparityJP=3\n2+which have the same spin-parity quantum numbers with the consider ed states in the present work.\nSuch analyses require a nonperturbative method, and in this work, we apply the QCD sum rule method [ 74–76] as\nit is among the successful nonperturbative methods with predictio ns exhibiting good consistency with experimental\nobservations. To apply the method, the main ingredient is a proper in terpolating current describing the considered\nstate, which is composed of the quark fields according to the valenc e quark content of the state. We investigate the\nmasses and current coupling constants with two types of interpola ting currents with octet or flavor-singlet quantum\nnumbers [ 65]. The comparison of the results with the present experimental mas s values helps us understand the\nstructure of these states, gain information about the interactio n mechanisms of the quarks in the low energy domain\nof the QCD, and may also contribute to future investigations of miss ing states.\nThe outline of the present work is as follows: In next section, the de tails of the QCD sum rule calculations for the\nmasses and current coupling constants of all considered states a re given. The numerical analyses for the results are\nattained in Sec. III. SecIVis devoted to the summary and conclusion.\nII. THE QCD SUM RULE FOR THE ΛSTATES\nAmong the efficient approaches for elucidating the structure and p roperties of a particular resonance is determining\nits mass by assigning a proper structure to the resonance. The co mparison of the computed mass results with\nexperimental findings significantly helps us understand their natur e and substructures. With this angle, our purpose\nin the present work is to calculate the masses for the Λ states with s pin-3\n2and both negative and positive parities. To\naccomplish this task, we choose proper interpolating fields comprise d of the quark fields consistent with the valence\nquark content and quantum numbers of the Λ states. To this end, we choose two types of interpolating currents with\noctet and flavor-singlet quantum numbers given as [ 65]:\nηo\nµ=/radicalbigg\n1\n6ǫabc[2(uaTCσκδdb)σκδγµsc+(uaTCσκδsb)σκδγµdc−(daTCσκδsb)σκδγµuc],\nηs\nµ=/radicalbigg\n1\n3ǫabc[(uaTCσκδdb)σκδγµsc−(uaTCσκδsb)σκδγµdc+(daTCσκδsb)σκδγµuc]. (1)\nIn these currents, Cdenotes charge conjugation operator; a, b, cindices are used to represent the color indices of the\nquark fields u, dands, ando(s) inηo(s)denotes octet (singlet)-type current. These two currents are used in the\nfollowing correlation function to obtain the mass sum rules:\nΠµν(q) =i/integraldisplay\nd4xeiq·x/an}bracketle{t0|T {ηo(s)\nµ(x)¯ηo(s)\nν(0)}|0/an}bracketri}ht, (2)3\nwhereTrepresents the time ordering operator.\nThe calculation of the correlation function, Eq. ( 2), is performed in two ways called the Hadronic and the QCD\nsides, respectively. The results obtained from these two sides are matched via a dispersion relation to obtain the\nQCD sum rules for the physical parameters under quest. These re sults contain various Lorenz structures, and in\nthe matching procedure, one equates the coefficients of one of th ese Lorentz structures. The contributions coming\nfrom the higher states and continuum are suppressed by the applic ation of the Borel transformation and continuum\nsubtraction operations to both sides.\nIn the hadronic side, the correlator is calculated treating the inter polating currents as creation and annihilation\noperators, which create or annihilate the considered states from the vacuum. To proceed in the calculation a complete\nset of hadronicstates with same quantum numbers carried by the in terpolatingcurrents is inserted into the correlation\nfunction. Then, the integral over four- xis performed giving the following result:\nΠHad\nµν(q) =/an}bracketle{t0|ηo(s)\nµ|Λ(q,s)/an}bracketri}ht/an}bracketle{tΛ(q,s)|¯ηo(s)\nν|0/an}bracketri}ht\nm2−q2+/an}bracketle{t0|ηo(s)\nµ|Λ′(q,s)/an}bracketri}ht/an}bracketle{tΛ′(q,s)|¯ηo(s)\nν|0/an}bracketri}ht\nm′2−q2+/an}bracketle{t0|ηo(s)\nµ|˜Λ(q,s)/an}bracketri}ht/an}bracketle{t˜Λ(q,s)|¯ηo(s)\nν|0/an}bracketri}ht\n˜m2−q2\n+···, (3)\nwhere the explicitly presented terms denote the contributions of n egative parity spin-3\n2ground state as well as its\nexcitations with negative and positive parities, respectively, and ···shows the contributions of higher resonances and\ncontinuum. |Λ(q,s)/an}bracketri}ht,|Λ′(q,s)/an}bracketri}htand|˜Λ(q,s)/an}bracketri}htcorrespond to their one-particle states with respective masses m,m′and\n˜m. The matrix elements in Eq. ( 3) are defined in terms of current coupling constants and spin-vect ors,uµ, in Rarita\nSchwinger representation as:\n/an}bracketle{t0|ηo(s)\nµ|Λ(q,s)/an}bracketri}ht=λγ5uµ(q,s),\n/an}bracketle{t0|ηo(s)\nµ|Λ′(q,s)/an}bracketri}ht=λ′γ5uµ(q,s),\n/an}bracketle{t0|ηo(s)\nµ|˜Λ(q,s)/an}bracketri}ht=˜λuµ(q,s). (4)\nOnce these matrix elements are used in the Eq. ( 3), the summation over spin is required to proceed, which has the\nfollowing form:\n/summationdisplay\nsuµ(q,s)¯uν(q,s) =−(/ne}ationslashq+m)/bracketleftBig\ngµν−1\n3γµγν−2qµqν\n3m2+qµγν−qνγµ\n3m/bracketrightBig\n. (5)\nAt this point we need to mention that the interpolating currents tha t we use couple also to spin-1\n2positive and\nnegative parity states with their corresponding matrix elements giv en as:\n/an}bracketle{t0|ηo(s)\nµ|1\n2+\n(q)/an}bracketri}ht=A1\n2+(γµ+4qµ\nm1\n2+)γ5u(q,s), (6)\nand\n/an}bracketle{t0|ηo(s)\nµ|1\n2−\n(q)/an}bracketri}ht=A1\n2−(γµ+4qµ\nm1\n2−)u(q,s), (7)\nrespectively. From these matrix elements, it can be seen that the c oefficients of the Lorentz structures containing γµ\nandqµget contributions from spin-1\n2states also. To avoid these contributions and to select the ones on ly coming\nfrom the spin-3\n2states, we make a proper choice of Lorentz structure giving mere spin-3\n2states’ contribution. Using\nthe above relations, the result of hadronic side becomes\nΠHad\nµν(q) =λ2\nq2−m2(/ne}ationslashq−m)/bracketleftBig\ngµν−1\n3γµγν−2qµqν\n3m2−qµγν−qνγµ\n3m/bracketrightBig\n+λ′2\nq2−m′2(/ne}ationslashq−m′)/bracketleftBig\ngµν−1\n3γµγν−2qµqν\n3m′2−qµγν−qνγµ\n3m′/bracketrightBig\n+˜λ2\nq2−˜m2(/ne}ationslashq+ ˜m)/bracketleftBig\ngµν−1\n3γµγν−2qµqν\n3˜m2+qµγν−qνγµ\n3˜m/bracketrightBig\n+···. (8)\nAs it is seen, this expression contain many Lorentz structures, ho wever, only gµνand/ne}ationslashqgµνstructures are free from\nspin-1\n2pollution and give contributions only to spin-3\n2states. In principle, as the standard application of QCD sum4\nrule method, both of these structures can be selected to predict the mass of the desired states. However, in our case,\nboth of these structures lead to roughly the same results. To this end, we consider the structure gµνin our analyses\nto extract the physical parameters of the states under study. Hence, we have\nΠHad\nµν(q) =−λ2\nq2−m2mgµν−λ′2\nq2−m′2m′gµν+˜λ2\nq2−˜m2˜mgµν+other structures+ ···. (9)\nAfter the Borel transformation with respect to −q2, which is applied to suppress the contribution coming from higher\nstates and continuum, the final result becomes\n/hatwideBΠHad\nµν(q) =λ2e−m2\nM2mgµν+λ′2e−m′2\nM2m′gµν−˜λ2e−˜m2\nM2˜mgµν+other structures+ ···. (10)\nAs for the QCD side of the calculation, the operator product expan sion (OPE) is applied, and the correlation\nfunction is computed using the interpolating currents explicitly in Eq. (2). This gives a result in terms of quark fields,\nand, applying Wick’s theorem, possible contractions between the qu ark fields are obtained. So, the results turn into\nthe ones given in terms of the quark propagators. The correspon ding result for the octet current is provided here to\nexemplify the form of the results:\nΠQCD\nµν(q) =i/integraldisplay\nd4xeiq·x1\n6ǫabcǫa′b′c′σκδγµ/braceleftBig\n4Scc′\ns(x)γνσκ′δ′Tr[Sbb′\nd(x)σκ′δ′˜Saa′\nu(x)σκδ]\n−2Scb′\ns(x)σκ′δ′˜Saa′\nu(x)σκδSbc′\nd(x)γνσκ′δ′−2Scb′\ns(x)σκ′δ′˜Sba′\nd(x)σκδSac′\nu(x)γνσκ′δ′\n−2Scb′\nd(x)σκ′δ′˜Saa′\nu(x)σκδSbc′\ns(x)γνσκ′δ′+Scc′\nd(x)γνσκ′δ′Tr[Sbb′\ns(x)σκ′δ′˜Saa′\nu(x)σκδ]\n+Sca′\nd(x)σκ′δ′˜Sbb′\ns(x)σκδSac′\nu(x)γνσκ′δ′−2Sca′\nu(x)σκ′δ′˜Sab′\nd(x)σκδSbc′\ns(x)γνσκ′δ′\n+Sca′\nu(x)σκ′δ′˜Sbb′\ns(x)σκδSac′\nd(x)γνσκ′δ′+Scc′\nu(x)γνσκ′δ′Tr[Sbb′\ns(x)σκ′δ′˜Saa′\nd(x)σκδ]/bracerightBig\n,(11)\nwhere˜Saa\nqrepresents CSaa′T\nqC. The quark propagator for light quark has the following form in xspace:\nSab\nq(x) =ix /\n2π2x4δab−mq\n4π2x2δab−/an}bracketle{tqq/an}bracketri}ht\n12/parenleftBig\n1−imq\n4x //parenrightBig\nδab−x2\n192m2\n0/an}bracketle{tqq/an}bracketri}ht/parenleftBig\n1−imq\n6x //parenrightBig\nδab−igsGθη\nab\n32π2x2/bracketleftBig\nx /σθη+σθηx //bracketrightBig\n−x /x2g2\ns\n7776/an}bracketle{tqq/an}bracketri}ht2δab−x4/an}bracketle{tqq/an}bracketri}ht/an}bracketle{tg2\nsG2/an}bracketri}ht\n27648δab+mq\n32π2[ln(−x2Λ2\n4)+2γE]gsGθη\nabσθη. (12)\nIn the light quark propagator, Eq. ( 12),γE≃0.577 is the Euler constant and Λ is the QCD scale parameter. The\ncalculation of this side is straightforward using this propagator in th e correlator. After the applications of the Fourier\nand Borel transformations as well as continuum subtraction, the result takes the following form:\n/hatwideBΠQCD(s0,M2) =/integraldisplays0\n(mu+md+ms)2e−s\nM2ρ(s)ds+Γ(M2), (13)\nwhereρ(s) and Γ(M2) are the results obtained considering the coefficient of the struct uregµνas in the hadronic side\nands0is the continuum threshold parameter. Note that we apply the quar k-hadron duality assumption to omit the\nsuppressedcontributions ofthe higherstates and continuum fro m the hadronicside with their equivalent contributions\nfrom the QCD side above the threshold s0.\nThe match of the coefficients of the selected structure from both the hadronic and QCD sides gives the following\nQCD sum rule:\nmλ2e−m2\nM2+m′λ′2e−m′2\nM2−˜m˜λ2e−˜m2\nM2=/hatwideBΠQCD(s0,M2). (14)\nTo extract masses and current coupling constants from Eq. ( 14), we consider each state one by one and follow such\nan approach: First, we calculate the mass for the ground state fr om the first term in the left-hand side of Eq. ( 14),\nkeeping others in continuum, namely the ground state + continuum f rame. To get the mass of the ground state, after\ntaking the derivative of Eq. ( 14) with respect to −1\nM2, we divide this by Eq. ( 14) itself, i.e.:\nm2=d\nd(−1\nM2)/hatwideBΠQCD(s0,M2)\n/hatwideBΠQCD(s0,M2). (15)5\nThe mass predicted in this way is applied together with Eq. ( 14), and the current coupling constant for this state is\nattained as\nλ2=em2\nM2/hatwideBΠQCD(s0,M2). (16)\nThe mass and current coupling constants for the excited states a re obtained similarly: To get results for the first\nradial excitation, the first two terms in Eq. ( 14) are considered, and the remaining term is treated to be inside the\ncontinuum, which means ground state + first radial (2 P) excitation + continuum frame is applied using the results\nfor the ground state as input. And finally, the same treatment is ap plied for the next excited state, namely the 2 S\nstate; that is, ground state + first radial excitation + 2 S+ continuum frame is now taken into account to get the\nphysical parameters for the 2 Sstate. The numerical analyses of the results for these states ar e given in the next\nsection.\nIII. NUMERICAL ANALYSES\nThe QCD sum rules, attained for masses and current coupling const ants in the previous section, are numerically\nanalyzed in this section with the necessary input parameters. Some of these parameters are given in Table I. The\nParameters Values\nmu 2.16+0.49\n−0.26MeV [33]\nmd 4.67+0.48\n−0.17MeV [33]\nms 93.4+8.6\n−3.4MeV [33]\n/angbracketleft¯qq/angbracketright(1GeV) (−0.24±0.01)3GeV3[77]\n/angbracketleft¯ss/angbracketright 0.8/angbracketleft¯qq/angbracketright[77]\nm2\n0 (0.8±0.1) GeV2[77]\n/angbracketleftqgsσGq/angbracketright m2\n0/angbracketleft¯qq/angbracketright\n/angbracketleftαs\nπG2/angbracketright(0.012±0.004) GeV4[78]\nTABLE I. Some input parameters required for the numerical an alyses.\nparameters present in Table Iare necessary but not the only required parameters. Besides, th e results contain\ntwo more auxiliary parameters: the Borel parameter M2and the threshold parameter s0. To be able to fix these\nparameters, the QCD sum rules have some prescriptions that are s tandard for the method. These are the weak\ndependence of the results on these auxiliary parameters, the con vergence of the OPE, and pole dominance. By OPE\nconvergence, we mean: The perturbative part exceeds the nonp erturbative contributions and the higher the dimension\nof the nonperturbative operator, the lower its contribution. Pole dominance guarantees the dominant contributions\nof the considered resonances compared to the higher states and continuum.\nIndeed, the Borel parameter is fixed by the dominance of the cons idered first three resonances over the higher states\nand continuum, which sets its upper limit, as well as the OPE converge nce, which sets its lower limit. The Borel\nmass intervals obtained considering these restrictions are presen ted in Table II. In this table, we also present the\nworking intervals of the threshold parameters fixed by the ground state + 2 Pexcitation + 2 Sexcitation + continuum\napproach, as explained in the previous section. First, considering t he relation of the threshold parameter to the\nenergy of the next excited state, we fix the threshold parameter by ground state + continuum frame and get the\nmass and corresponding current coupling constant for the groun d state, whose values are also present in Table II.\nThese results are used as inputs in the calculations of the mass and c urrent coupling constant for the next excited\nstate. To make this calculation, now the ground state + 2 Pexcitation + continuum frame is taken into account, and\nsimilar to the previous calculation, the interval for the new thresho ld parameter is determined. With this threshold\nparameter interval, again, the mass and current coupling constan t for this excited state are obtained and presented\nin Table II. Finally, the mass and current coupling constant for the next excit ed state are obtained from ground state\n+ 2Pexcitation + 2 Sexcitation + continuum frame, and the threshold parameter interv al for this new consideration\nis decided in a similar way. With this new threshold interval, the results f or mass and current coupling constant in\nthis case are also obtained and given in Table II. The errors of the results are presented in Table II, as well, and these\nerrors are due to the uncertainties present in the input paramete rs and the determination of the working intervals of\nthe auxiliary parameters.\nIt is instructive to find the first three resonance’ contribution (F TRC) at average values of the Borel parameter and6\nResults for octet current\nΛ state M2(GeV2)s0(GeV2)Mass (MeV) Current Coupling Constant (GeV3)\nΛ(JP=3\n2−)(1P)3.0−4.02.7−2.91513.64±8.76 (3.35±0.15)×10−2\nΛ(JP=3\n2−)(2P)3.0−4.03.1−3.31687.91±0.31 (2.05±0.27)×10−2\nΛ(JP=3\n2+)(2S)3.0−4.03.5−3.71882.37±11.95 (2.08±0.30)×10−2\nResults for singlet current\nΛ state M2(GeV2)s0(GeV2)Mass (MeV) Current Coupling Constant (GeV3)\nΛ(JP=3\n2−)(1P)3.0−4.02.7−2.91470.44±16.08 (4.85±0.20)×10−2\nΛ(JP=3\n2−)(2P)3.0−4.03.1−3.31732.56±11.55 (2.90±0.39)×10−2\nΛ(JP=3\n2+)(2S)3.0−4.03.5−3.71843.47±11.21 (3.00±0.41)×10−2\nTABLE II. The working windows of the Borel masses and thresho ld values and the mass and current coupling constant results\nobtained using the octet and singlet currents for the Λ state s with spin-3\n2and different parities\ncontinuum threshold. It is defined as\nFTRC =/hatwideBΠQCD(s0,M2)\n/hatwideBΠQCD(∞,M2). (17)\nBy using the average values of the auxiliary parameters, we find FTR C = 0.91 indicating that the main contribution\nin the QCD side comes from the first three resonances and the highe r states contribute with only 9%. This well\nsatisfies the corresponding requirement of the method. To depict the behavior and stability of the results in the\nworking intervals of the auxiliary parameters, we present the figur es1,2,3,4,5, and6for the masses and current\ncoupling constants of all the considered states. From these figur es, we see good stability of the results with respect to\nthe auxiliary parameters. The mild variations of the results with resp ect to the variations of these parameters, seen\nin these figures, are reflected in the errors of the predictions pre sented in Table IIas mentioned before.\n●●●●●●●●●●●■■■■■■■■■■■◆◆◆◆◆◆◆◆◆◆◆\n●s0=2.9GeV2\n■s0=2.8GeV2\n◆s0=2.7GeV2\n3.03.23.43.63.84.01.01.21.41.61.82.0\nM2(GeV2)m(GeV)\n●●●●●●●●●●●●●●●●●●●●●■■■■■■■■■■■■■■■■■■■■■◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆\n●M2=4.0GeV2\n■M2=3.5GeV2\n◆M2=3.0GeV2\n2.702.752.802.852.901.01.21.41.61.82.0\ns0(GeV2)m(GeV)\nFIG. 1. Left:The dependence of the mass of the ground state Λ on M2at different values of s0.Right:The dependence of\nthe mass of the ground state Λ on s0at different values of M2.\nIV. SUMMARY AND CONCLUSION\nIn the present work, among the light hyperon states, we focused on the Λ state with spin-parity quantum numbers\nJ=3\n2−and its excitations with negative and positive parities. In the analyse s, we especially targeted to account\nfor the Λ(1520) through its spectroscopic property, together with to see whether any experimentally observed state\npossessing the identical quantum numbers can be explained via the r esults attained for the excited states. To analyze\nthese states, we applied the QCD sum rule method with two possible cu rrents that may define these states with\noctet and singlet quantum numbers. From the analyses, we got the mass values of the three lowest lying states.\nThe results were obtained using the current with octet quantum nu mbers as: m= 1513.64±8.76 MeV for the 1 P7\n●●●●●●●● ● ●●■■■■■■■■ ■ ■■◆◆◆◆◆◆◆ ◆ ◆ ◆ ◆●s0=2.9GeV2\n■s0=2.8GeV2\n◆s0=2.7GeV2\n3.03.23.43.63.84.0123456\nM2(GeV2)λ×10-2(GeV3)\n●●●●●●●●●●●●●●●●●●●●●\n■■■■■■■■■■■■■■■■■■■■■\n◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆●M2=4.0GeV2\n■M2=3.5GeV2\n◆M2=3.0GeV2\n2.702.752.802.852.90123456\ns0(GeV2)λ×10-2(GeV3)\nFIG. 2.Left:The dependence of the current coupling constant of the groun d state Λ on M2at different values of s0.Right:\nThe dependence of the current coupling constant of the groun d state Λ on s0at different values of M2.\n●●●●●●●●●●● ■■■■■■■■■■■ ◆◆◆◆◆◆◆◆◆◆◆\n●s0=3.3GeV2\n■s0=3.2GeV2\n◆s0=3.1GeV2\n3.03.23.43.63.84.01.21.41.61.82.02.2\nM2(GeV2)m'(GeV)\n●●●●●●●●●●●●●●●●●●●●●■■■■■■■■■■■■■■■■■■■■■ ◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆\n●M2=4.0GeV2\n■M2=3.5GeV2\n◆M2=3.0GeV2\n3.103.153.203.253.301.21.41.61.82.02.2\ns0(GeV2)m'(GeV)\nFIG. 3.Left:The dependenceof the mass of the (2 P) exited state of Λ on M2at different values of s0.Right:The dependence\nof the mass of the (2 P) exited state of Λ on s0at different values of M2.\n●●●●●●●●●●●\n■■■■■■■■■■■\n◆◆◆◆◆◆◆◆◆◆◆●s0=3.3GeV2\n■s0=3.2GeV2\n◆s0=3.1GeV2\n3.03.23.43.63 \u0000 \u00014.0012\n345\nM2(GeV2)λ'×10-2(GeV3)\n●●●●●●●●●●●●●●●●●●●●●\n■■■■■■■■■■■■■■■■■■■■■\n◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆●M2=4.0GeV2\n■M2=3.5GeV2\n◆M2=3.0GeV2\n3.103.153.203.253.30012345\ns0(GeV2)λ'×10-2(GeV3)\nFIG. 4. Left:The dependence of the curent coupling constant of the (2 P) exited state of Λ on M2at different values of s0.\nRight:The dependence of the curent coupling constant of the (2 P) exited state of Λ on s0at different values of M2.\nstate with JP=3\n2−,m′= 1687.91±0.31 MeV for the 2 Pstate with JP=3\n2−and ˜m= 1882.37±11.95 MeV\nfor the 2 Sstate with JP=3\n2+. The mass values using current with singlet quantum numbers were o btained as:\nm= 1470.44±16.08 MeV for the 1 Pstate with JP=3\n2−,m′= 1732.56±11.55 MeV for the 2 Pstate with JP=3\n2−\nand ˜m= 1843.47±11.21MeV for the 2 Sstate with JP=3\n2+. In other works present in the literature, the masses for8\n●●●●●●●●●●●■■■■■■■■■■■◆◆◆◆◆◆◆◆◆◆◆\n●s0=\u0002 \u0003 \u0004GeV2\n■s0=3.6GeV2\n◆s0=3.5GeV2\n3.03.23.43.6 \u0005 \u0006 \u00074.01.51.61.71.81.92.02.12.2\nM2(GeV2)m˜(GeV)\n●●●●●●●●●●●●●●●●●●●●● ■■■■ ■ ■ ■■■■■■■■■■■■■■■ ◆◆◆◆◆◆◆◆◆◆◆ ◆ ◆ ◆◆◆◆◆◆◆◆\n●M2=4.0GeV2\n■M2=3.5GeV2\n◆M2=3.0GeV2\n3.503.553.603.65\b \t \n \u000b1.51.61.71.81.92.02.12.2\ns0(GeV2)m˜(GeV)\nFIG. 5.Left:The dependence of the mass of the (2 S) exited state of Λ on M2at different values of s0.Right:The dependence\nof the mass of the (2 S) exited state of Λ on s0at different values of M2.\n●●●●●●●●●●●\n■■■■■■■■■■■\n◆◆◆◆◆◆◆◆◆◆◆●s0=3.7GeV2\n■s0=3.6GeV2\n◆s0=3.5GeV2\n3.03.23.43.6 \f \r \u000e4.0012\n\f45\nM2(GeV2)λ˜\n×10-2(GeV\n\u000f)\n●●●●●●●●●●●●●●●●●●●●●\n■■■■■■■■■■■■■■■■■■■■■\n◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆●M2=4.0GeV2\n■M2=3.5GeV2\n◆M2=3.0GeV2\n3.503.553.603.65\u0010 \u0011 \u0012 \u0013012\n\u001045\ns0(GeV2)λ˜\n×10-2(GeV\n\u0014)\nFIG. 6. Left:The dependence of the curent coupling constant of the (2 S) exited state of Λ on M2at different values of s0.\nRight:The dependence of the curent coupling constant of the (2 S) exited state of Λ on s0at different values of M2.\nthe lowest lying Λ states with spin-3\n2consistent with the ones we search for in the present work were pr edicted. For\ncompleteness and comparison with our predictions, we present the results of some of these works here. In Ref. [ 7], the\nmasses for the lowest lying P-waveΛ states with spin-3\n2were given as m= 1490MeV and m= 1690MeV. In Ref. [ 10],\nthe masses for the same negative parity lowest lying states were ob tained as m= 1545 MeV and m= 1645 MeV\nfor3\n2−states, and the mass was obtained as m= 1900 MeV for JP=3\n2+positive parity state. The spectral values\nwere predicted in Ref. [ 11] asm= 1498 MeV and m= 1629 MeV for3\n2−states and m= 1855 MeV for JP=3\n2+\nstate. In Ref. [ 50] the masses were given as m= 1490 MeV, and m= 1690 MeV for3\n2−states. In Ref. [ 54] the\nmasses for spin-parity3\n2−states were attained as m= 1508 MeV, and m= 1662 MeV, and for spin-parity3\n2+as\nm= 1823 MeV. The masses were given as m= 1549 MeV and m= 1693 MeV for3\n2−states and m= 1854 MeV\nforJP=3\n2+state in Ref. [ 55]. In Ref. [ 59] the mass predictions for JP= 3/2−state corresponding to Λ(1520)\nwere calculated as m= 1534 MeV and m= 1544 MeV, the masses for JP= 3/2−state given for Λ(1690) were\npredicted to be m= 1819 MeV and m= 1841 MeV and the masses for JP= 3/2+state for Λ(1890) were predicted\nasm= 1769 MeV and m= 1789 MeV. The mass values were given in Ref. [ 56] asm= 1431 MeV, m= 1650 MeV,\nandm= 1896 MeV for Λ(1520), Λ(1690), and Λ(1890) spin-3\n2states, respectively. The mass for the 1 Pspin-3\n2state\nwas given in Ref. [ 66] asm= 1551.23±0.43 MeV.\nCompared to the experimental findings, our predictions obtained f rom the current with octet quantum numbers\nare consistent with the masses of Λ(1520), Λ(1690) and Λ(1890) states possessing mass values and quantum numbers\nmΛ(1520)≈1519 MeV and JP=3\n2−,mΛ(1690)≈1690 MeV and JP=3\n2−, andmΛ(1890)≈1890 MeV and JP=3\n2+,\nrespectively [ 33]. Given the consistency of these results with experimental observ ations, it is also pertinent to compare\nthem with the predictions of other studies. The mass result obtaine d using the interpolating current with octet\nquantum number in the present work for the 2 Pstate is consistent with that of Ref. [ 7] given for the excited state,9\nPresent Work\n(Results of\noctet current)Present Work\n(Results of\nsinglet current )[7][10][11][50][54][55][56][59][66]Exp.\n[33]\nm(JP=3\n2−)1513.64±8.761470.44±16.0814901545149814901508154914311534\n15441551.23±0.431519\nm′(JP=3\n2−)1687.91±0.311732.56±11.5516901645162916901662169316501819\n1841- 1690\n˜m(JP=3\n2+)1882.37±11.951843.47±11.21-19001855-1823185418961769\n1789- 1890\nTABLE III. The mass results of the present work and that of diff erent works and experimental masses for the Λ states with\nspin-parity quantum numbers JP=3\n2±in units of MeV.\nhowever, the 1 Pstate is larger than their corresponding result. Compared to the r esults of Ref. [ 10], our value for\nthe 1Pstate is smaller, and the 2 Pstate is larger than their corresponding predictions. In Ref. [ 11], the reported\nresult for Λ(1520) state is close to our prediction, but their predic tions for Λ(1690) and Λ(1890) are smaller than ours.\nThe results given in Ref. [ 50] are close to those of the present work obtained for 2 Pand 2Scases, and their result\ncorresponding to the 1 Pcase is smaller than our prediction. While the result we obtained for Λ( 1520) is consistent\nwith that of Ref. [ 54], the results obtained for the other two states in that work are sm aller than the predictions of\nthe present work. The predictions for the mass of negative parity states in Ref. [ 55] are larger, on the other hand,\nthe positive parity state is smaller than our corresponding predictio ns. In Ref. [ 59], the mass predictions given for\nΛ(1520) and Λ(1690) states are larger, and that for Λ(1890) is s maller than ours. The reported masses for Λ(1520)\nand Λ(1690) in Ref. [ 56] are smaller than our corresponding results, while the result given f or Λ(1890) is in agreement\nwithin the errors with our prediction. To provide a more explicit illustra tion of the aforementioned comparison, we\npresent the Table IIIlisting the results from other methods, experiment, and the result s obtained from our analyses.\nAs is seen, though there are various studies in literature with altern ative methods about the Λ baryon with spin3\n2such as Λ(1520), Λ(1690), and Λ(1890), the discrepancies amon g the results necessitate more such works to provide\nfurther information over these particles. Studying the propertie s of these states helps us better identify these states,\nunderstand their nature, and interactions with other particles. T hese studies may contribute to the understanding of\nthe underlying mechanisms of the interactions of these particles wit h others and their role in various particle physics\nprocesses. These investigations may help to gain information about the spin structure of these particles and the role\nof spin in their interactions with other particles and also be used to te st the validity of various theoretical models in\nparticle physics. Besides, these studies deliver useful information that may be helpful to compare and comprehend\nthe results of future experiments related to these baryons and t heir spin-parity quantum number assignments.\nACKNOWLEDGEMENTS\nK. Azizi is grateful to Iran National Science Foundation (INSF) fo r the partial financial support provided under\nthe elites Grant No. 4025036.\n[1] J. Yelton et al.[Belle],Phys. Rev. Lett. 121, no.5, 052003 (2018) [arXiv:1805.09384 [hep-ex]] .\n[2] R. Aaij et al.[LHCb Collaboration], Phys. Rev. Lett. 118, no. 18, 182001 (2017) [arXiv:1703.04639 [hep-ex]] .\n[3] R. Aaij et al.[LHCb Collaboration], Phys. Rev. Lett. 122, no. 1, 012001 (2019) [arXiv:1809.07752 [hep-ex]] .\n[4] R. Aaij et al.[LHCb Collaboration], Phys. Rev. Lett. 121, no. 7, 072002 (2018) [arXiv:1805.09418 [hep-ex]] .\n[5] S. Capstick and W. Roberts, Prog. Part. Nucl. Phys. 45, S241 (2000) [nucl-th/0008028] .\n[6] A. Valcarce, H. Garcilazo and J. Vijande, Phys. Rev. C 72, 025206 (2005) [hep-ph/0507297] .\n[7] N. Isgur, G. Karl, Phys. Rev. D 18, 4187 (1978) ;19, 2653 (1979); 20, 1191 (1979) .\n[8] I. G. Aznauryan, Phys. Rev. C 76, 025212 (2007) [nucl-th/0701012] .\n[9] I. G. Aznauryan and V. D. Burkert, Phys. Rev. C 85, 055202 (2012) [arXiv:1201.5759 [hep-ph]] .\n[10] S. Capstick and N. Isgur, Phys. Rev. D 34, 2809 (1986) [AIP Conf. Proc. 132, 267 (1985)].\n[11] L. Y. Glozman and D. O. Riska, Phys. Rept. 268, 263-303 (1996) [arXiv:hep-ph/9505422 [hep-ph]] .\n[12] M. M. Giannini, E. Santopinto and A. Vassallo, Eur. Phys. J. A 12, 447 (2001) [nucl-th/0111073] .\n[13] G. Galata and E. Santopinto, Phys. Rev. C 86, 045202 (2012) .10\n[14] M. De Sanctis, J. Ferretti, E. Santopinto and A. Vassall o,Eur. Phys. J. A 52, no. 5, 121 (2016)\n[arXiv:1410.0590 [hep-ph]] .\n[15] G. Eichmann, Few Body Syst. 58, no. 2, 81 (2017) [arXiv:1611.10118 [hep-ph]] .\n[16] G. Ramalho, Phys. Rev. D 95, no. 5, 054008 (2017) [arXiv:1612.09555 [hep-ph]] .\n[17] Z. Shah, K. Gandhi and A. K. Rai, Chin. Phys. C 43, no. 3, 034102 (2019) [arXiv:1812.04858 [hep-ph]] .\n[18] A. Walker-Loud, H. W. Lin, D. G. Richards, R. G. Edwards, M. Engelhardt, G. T. Fleming, P. Hagler, B. Musch, M. F. Lin\nand H. Meyer, et al.Phys. Rev. D 79, 054502 (2009) [arXiv:0806.4549 [hep-lat]] .\n[19] H. W. Lin et al.[Hadron Spectrum], Phys. Rev. D 79, 034502 (2009) [arXiv:0810.3588 [hep-lat]] .\n[20] R. G. Edwards, J. J. Dudek, D. G. Richards and S. J. Wallac e,Phys. Rev. D 84, 074508 (2011) [arXiv:1104.5152 [hep-ph]] .\n[21] J. P. Vary, L. Adhikari, G. Chen, S. Jia, M. Li, Y. Li, P. Ma ris, W. Qian, J. R. Spence and S. Tang, et al.\nFew Body Syst. 59, no.4, 56 (2018) [arXiv:1804.07865 [nucl-th]] .\n[22] H. Sanchis-Alepuz and C. S. Fischer, Phys. Rev. D 90, no.9, 096001 (2014) [arXiv:1408.5577 [hep-ph]] .\n[23] G. Eichmann and C. S. Fischer, Few Body Syst. 60, no.1, 2 (2019)\n[24] D. Jido, N. Kodama and M. Oka, Phys. Rev. D 54, 4532-4536 (1996) [arXiv:hep-ph/9604280 [hep-ph]] .\n[25] M. Oka, D. Jido and A. Hosaka, Nucl. Phys. A 629, 156C-159C (1998) [arXiv:hep-ph/9702351 [hep-ph]] .\n[26] F. X. Lee and D. B. Leinweber, Nucl. Phys. B Proc. Suppl. 73, 258-260 (1999) [arXiv:hep-lat/9809095 [hep-lat]] .\n[27] Y. Kondo, O. Morimatsu and T. Nishikawa, Nucl. Phys. A 764, 303-312 (2006) [arXiv:hep-ph/0503150 [hep-ph]] .\n[28] T. M. Aliev and M. Savcı, Phys. Rev. D 90, no.11, 116006 (2014) [arXiv:1409.5252 [hep-ph]] .\n[29] K. Azizi and H. Sundu, Phys. Rev. D 91, no.9, 093012 (2015) [arXiv:1501.07691 [hep-ph]] .\n[30] K. Azizi, Y. Sarac and H. Sundu, Eur. Phys. J. A 52, no.4, 114 (2016) [arXiv:1510.05432 [hep-ph]] .\n[31] K. Azizi, Y. Sarac and H. Sundu, J. Phys. G 47, no.9, 095005 (2020) [arXiv:1909.03323 [hep-ph]] .\n[32] V. M. Braun, S. Collins, B. Gl¨ aßle, M. G¨ ockeler, A. Sch ¨ afer, R. W. Schiel, W. S¨ oldner, A. Sternbeck and P. Wein,\nPhys. Rev. D 89, 094511 (2014) [arXiv:1403.4189 [hep-lat]] .\n[33] R. L. Workman et al.[Particle Data Group], PTEP2022, 083C01 (2022)\n[34] I. G. Aznauryan, A. Bashir, V. Braun, S. J. Brodsky, V. D. Burkert, L. Chang, C. Chen, B. El-Bennich, I. C. Cloet and\nP. L. Cole, et al.Int. J. Mod. Phys. E 22, 1330015 (2013) [arXiv:1212.4891 [nucl-th]] .\n[35] I. G. Aznauryan and V. D. Burkert, Prog. Part. Nucl. Phys. 67, 1-54 (2012) [arXiv:1109.1720 [hep-ph]] .\n[36] A. Starostin et al.[Crystal Ball], Phys. Rev. C 64, 055205 (2001)\n[37] S. Prakhov, B. M. K. Nefkens, C. E. Allgower, V. Bekrenev , W. J. Briscoe, M. Clajus, J. R. Comfort, K. Craig, D. Grosnic k\nand D. Isenhower, et al.Phys. Rev. C 69, 042202 (2004)\n[38] S. Prakhov, B. M. K. Nefkens, V. Bekrenev, W. J. Briscoe, N. Knecht, A. Koulbardis, N. Kozlenko, S. Kruglov, G. Lolos\nand I. Lopatin, et al.Phys. Rev. C 80, 025204 (2009) [arXiv:0812.1888 [hep-ex]] .\n[39] H. Zhang, J. Tulpan, M. Shrestha and D. M. Manley, Phys. Rev. C 88, no.3, 035204 (2013) [arXiv:1305.3598 [hep-ph]] .\n[40] K. Moriya et al.[CLAS], Phys. Rev. C 87, no.3, 035206 (2013) [arXiv:1301.5000 [nucl-ex]] .\n[41] K. Moriya et al.[CLAS], Phys. Rev. Lett. 112, no.8, 082004 (2014) [arXiv:1402.2296 [hep-ex]] .\n[42] H. Zhang, J. Tulpan, M. Shrestha and D. M. Manley, Phys. Rev. C 88, no.3, 035205 (2013) [arXiv:1305.4575 [hep-ph]] .\n[43] H. Kamano and T. S. H. Lee, Phys. Rev. C 94, no.6, 065205 (2016) [arXiv:1608.03470 [nucl-th]] .\n[44] H. Kamano, S. X. Nakamura, T. S. H. Lee and T. Sato, Phys. Rev. C 92, no.2, 025205 (2015) [erratum: Phys. Rev. C 95,\nno.4, 049903 (2017)] [arXiv:1506.01768 [nucl-th]] .\n[45] C. Fernandez-Ramirez, I. V. Danilkin, D. M. Manley, V. M athieu and A. P. Szczepaniak,\nPhys. Rev. D 93, no.3, 034029 (2016) [arXiv:1510.07065 [hep-ph]] .\n[46] A. V. Sarantsev, M. Matveev, V. A. Nikonov, A. V. Anisovi ch, U. Thoma and E. Klempt,\nEur. Phys. J. A 55, no.10, 180 (2019) doi:10.1140/epja/i2019-12880-5 [arXiv:1907.13387 [nucl-ex]] .\n[47] M. Matveev, A. V. Sarantsev, V. A. Nikonov, A. V. Anisovi ch, U. Thoma and E. Klempt,\nEur. Phys. J. A 55, no.10, 179 (2019) [arXiv:1907.03645 [nucl-ex]] .\n[48] A. V. Anisovich, A. V. Sarantsev, V. A. Nikonov, V. Burke rt, R. A. Schumacher, U. Thoma and E. Klempt,\nEur. Phys. J. A 56, no.5, 139 (2020)\n[49] E. Klempt et al.[Baryon@PDG Group], Eur. Phys. J. A 56, no.10, 261 (2020) [arXiv:2007.04232 [nucl-ex]] .\n[50] N. Isgur and G. Karl, Phys. Rev. D 18, 4187 (1978)\n[51] R. Koniuk and N. Isgur, Phys. Rev. D 21, 1868 (1980) [erratum: Phys. Rev. D 23, 818 (1981)]\n[52] D. Gromes, Z. Phys. C 18, 249 (1983)\n[53] L. Y. Glozman, W. Plessas, K. Varga and R. F. Wagenbrunn, Phys. Rev. D 58, 094030 (1998)\n[arXiv:hep-ph/9706507 [hep-ph]] .\n[54] U. Loring, B. C. Metsch and H. R. Petry, Eur. Phys. J. A 10, 447-486 (2001) [arXiv:hep-ph/0103290 [hep-ph]] .\n[55] R. N. Faustov and V. O. Galkin, Phys. Rev. D 92, no.5, 054005 (2015) [arXiv:1507.04530 [hep-ph]] .\n[56] E. Santopinto and J. Ferretti, Phys. Rev. C 92, no.2, 025202 (2015) [arXiv:1412.7571 [nucl-th]] .\n[57] K. Xu, A. Kaewsnod, Z. Zhao, T. Y. Htun, A. Limphirat and Y . Yan, J. Phys. G 50, no.8, 085002 (2023)\n[arXiv:2203.04871 [hep-ph]] .\n[58] C. Menapara and A. K. Rai, Int. J. Mod. Phys. A 38, no.09n10, 2350053 (2023)\n[59] C. Menapara and A. K. Rai, Chin. Phys. C 45, no.6, 063108 (2021) [arXiv:2104.00439 [hep-ph]] .\n[60] G. P. Engel et al.[BGR (Bern-Graz-Regensburg)], Phys. Rev. D 87, no.3, 034502 (2013) [arXiv:1212.2032 [hep-lat]] .\n[61] B. J. Menadue, W. Kamleh, D. B. Leinweber and M. S. Mahbub ,Phys. Rev. Lett. 108, 112001 (2012)\n[arXiv:1109.6716 [hep-lat]] .\n[62] P. Gubler, T. T. Takahashi and M. Oka, Phys. Rev. D 94, no.11, 114518 (2016) [arXiv:1609.01889 [hep-lat]] .11\n[63] K. Azizi, Y. Sarac and H. Sundu, [arXiv:2306.07393 [hep-ph]] .\n[64] J. P. Singh and F. X. Lee, Phys. Rev. C 76, 065210 (2007) [arXiv:nucl-th/0612059 [nucl-th]] .\n[65] F. X. Lee and X. y. Liu, Phys. Rev. D 66, 014014 (2002) [arXiv:nucl-th/0203051 [nucl-th]] .\n[66] J. Oudichhya, K. Gandhi and A. K. Rai, Nucl. Phys. A 1035, 122658 (2023) [arXiv:2204.09257 [hep-ph]] .\n[67] R. G. Edwards et al.[Hadron Spectrum], Phys. Rev. D 87, no.5, 054506 (2013) [arXiv:1212.5236 [hep-ph]] .\n[68] V. Crede [GlueX], Few Body Syst. 64, no.2, 32 (2023)\n[69] S. Yang, J. Korean Phys. Soc. 82, no.6, 530-536 (2023)\n[70] S. Dobbs [KLF], Rev. Mex. Fis. Suppl. 3, no.3, 0308032 (2022) [arXiv:2207.10779 [nucl-ex]] .\n[71] A. Thiel and E. Klempt, [arXiv:2005.06971 [nucl-ex]] .\n[72] R. Aaij et al.[LHCb], Phys. Rev. Lett. 131, no.15, 151801 (2023) [arXiv:2302.08262 [hep-ex]] .\n[73] K. Sch¨ onning [PANDA], EPJ Web Conf. 241, 01015 (2020)\n[74] M. A. Shifman, A. I. Vainshtein and V. I. Zakharov, Nucl. Phys. B 147, 385 (1979) .\n[75] M. A. Shifman, A. I. Vainshtein and V. I. Zakharov, Nucl. Phys. B 147, 448 (1979) .\n[76] B. L. Ioffe, Nucl. Phys. B 188, 317 (1981) Erratum: [Nucl. Phys. B 191, 591 (1981)] .\n[77] V. M. Belyaev and B. L. Ioffe, Sov. Phys. JETP 56, 493 (1982) [Zh. Eksp. Teor. Fiz. 83, 876 (1982)].\n[78] V. M. Belyaev and B. L. Ioffe, Sov. Phys. JETP 57, 716 (1983) [Zh. Eksp. Teor. Fiz. 84, 1236 (1983)]." }, { "title": "2402.00141v2.Unimodular_gravity_as_an_initial_value_problem.pdf", "content": "Unimodular Gravity as an initial value problem\nJ.E. Herrera and Y. Bonder∗\nInstituto de Ciencias Nucleares, Universidad Nacional Aut´ onoma de M´ exico\nApartado Postal 70-543, Cd. Mx., 04510, M´ exico\nUnimodular gravity is a compelling modified theory of gravity that offers a natural solution to the\ncosmological constant problem. However, for unimodular gravity to be considered a viable theory of\ngravity, one has to show that it has a well-posed initial value formulation. Working in vacuum, we\napply Dirac’s algorithm to find all the constraints of the theory. Then we prove that, for initial data\ncompatible with these constraints, the evolution is well posed. Finally, we find sufficient conditions\nfor a matter action to preserve the well-posedness of the initial value problem of unimodular gravity.\nAs a corollary, we argue that the “unimodular” restriction on the spacetime volume element can be\nsatisfied by a suitable choice of the lapse function.\nI. INTRODUCTION\nGeneral relativity (GR) is nowadays accepted as the\ntheory of gravity. However, GR is not problem-free. In\nparticular, it requires a cosmological constant to describe\nthe universe at cosmological scales whose measured value\ndeparts, by many orders of magnitude, from the value\nestimated by considering vacuum state contributions [1].\nUnimodular gravity (UG) is a modified theory of gravity\nwhere the cosmological constant arises as an integration\nconstant, which is independent of vacuum state contri-\nbutions.\nOne important property of any fundamental physical\ntheory is its ability to predict a system’s evolution from\ninitial data. Given some initial data, perhaps subject\nto some constraints, this evolution ought to be unique.\nHowever, for some theories, these properties are not\nenough; the evolution must also be continuous and causal\nin the following sense: we expect that small perturbations\non initial data should produce small changes in the solu-\ntions, where the notion of “smallness” is given by certain\nSobolev norms [2]. In other words, we require the solu-\ntions to depend continuously on the initial data to avoid\nlosing predictability given that initial data can only be\nmeasured with finite precision. Also, changes in initial\ndata supported in a given spacetime region should only\naffect its causal future (and past). This notion is rele-\nvant in relativistic theories for consistency with space-\ntime causal structure. A theory in which the evolution is\nunique, continuous, causal in the above described sense\nis said to have a well-posed initial value formulation.\nA very important feature of GR is that it has a well-\nposed initial value formulation [3]. This is not a trivial re-\nsult since the metric, which is a dynamical field, contains\nthe causal information. Nevertheless, the well-posedness\nof the initial problem of GR can be shown by writing the\nequation of motion, via a judicious choice of coordinates,\nin a form where one can prove that the above-mentioned\nproperties hold.\n∗bonder@nucleares.unam.mxIt is worth mentioning that, besides GR, there is a\nrelatively small set of modified gravity theories for which\nproofs of well-posed initial value formulation are known.\nExamples of modified gravity theories where such results\nhave been obtained include scalar-tensor theories [4], k-\nessence theory [5], Einstein-æther theory [6], Horndeski\ntheories [7, 8], and a 4-derivative scalar-tensor theory [9].\nStill, to the best of our knowledge, there are no previous\nproofs of a proper initial value formulation for theories\nwith nondynamical tensors.\nThe goal of this work is to show that UG has a well-\nposed initial value formulation. We must stress that the\nproof we present is not a simple application of the GR\ntechniques, since the UG constraints are different from\nthose of GR. In this sense, this work introduces methods\nthat may be used when investigating the initial value\nformulation of other modified gravity theories.\nWe structured the paper as follows: in Sec. II, to have a\nself-contained paper, we introduce the UG theory and the\nmathematical tools to study a relativistic theory of grav-\nity in terms of 3-dimensional geometrical objects. The\nmost important part of this paper is the identification\nof the evolution and constraint equations of the theory,\nwhich is presented in Sec. III. In this section, we also\nperform the constraint analysis for UG and we carry out\nthe analysis of the evolution equations, relying on the\nwell-known BSSN formulation. Finally, we present our\nconclusions in Sec. IV.\nII. PRELIMINARIES\nA. Unimodular Gravity\nHistorically, UG dates back to Einstein [10] and Pauli\n[11] who were interested in possible interplays between\ngravity and elementary particles (for historical remarks\nsee Ref. 12). Yet, the framework that is close to what is\npresented here emerged some fifty years later [13] when\nthe theory was studied in the context of field theory [14–\n16]. In 2011, attention was drawn into UG with the ob-\nservation that the energy associated with the vacuum\nstate does not gravitate (in a semiclassical framework),arXiv:2402.00141v2 [gr-qc] 21 Feb 20242\nbypassing the cosmological constant problem [17]. This\nclaim, however, is not free of criticisms [18].\nRecent works rekindled the interest in UG. For ex-\nample, it has been shown that energy nonconservation\navoids some incompatible features with Quantum Me-\nchanics and could give rise to an effective cosmological\nconstant that has an adequate sign and size [19, 20].\nAlso, cosmological diffusion models in the UG framework\naffect the value of the Hubble constant [21], among other\ninteresting features [22].\nHere, we work on a 4-dimensional spacetime M\nequipped with the pseudo-Riemannian metric gab(we fol-\nlow the notation and conventions of Ref. 2 and, in par-\nticular, pairs of indexes in between parenthesis/brackets\nstand for its symmetric/antisymmetric part with a 1 /2\nfactor). Moreover, spacetime is assumed to be globally\nhyperbolic, which allows us to foliate Mby constant time\n(Cauchy) hypersurfaces Σ t.\nThere are several ways to introduce UG [23]; the UG\naction we consider here is\nS\u0002\ngab, λ,Φ\u0003\n=1\n2κZ\nd4x\b√−gR+λ\u0000√−g−f\u0001\t\n+SM\u0002\ngab,Φ\u0003\n, (1)\nwhere gabis the inverse of gab,λis a scalar field that\nacts as a Lagrangian multiplier, κis the gravitational\ncoupling constant, Ris the curvature scalar associated\nwith the metric-compatible and torsion-free derivative\n∇a. Moreover, gis the determinant of gab, and fis a\nnondynamical positive scalar density, i.e., a real function\nthat transforms under coordinate transformations mim-\nicking√−g. Also, S Mis the matter action, which takes\nthe form\nSM\u0002\ngab,Φ\u0003\n=Z\nd4x√−gLM\u0000\ngab,Φ\u0001\n, (2)\nwhere LM\u0000\ngab,Φ\u0001\nis the matter Lagrangian and Φ col-\nlectively describes all matter fields.\nWe want to emphasize that the only difference of the\nUG action when compared with that of GR is the pres-\nence of the term with the Lagrange multiplier. This term\nfixes the differential spacetime volume element√−gd4x\nto coincide with fd4x, which is only consistent if f >0,\nwhich is something we assume.\nAn arbitrary variation of the action (1) has the form\nδS =Z\nd4x\u001a√−g\u00141\n2κ(Gab−1\n2gabλ)−1\n2Tab\u0015\nδgab\n+1\n2κ\u0000√−g−f\u0001\nδλ+δLM\nδΦδΦ\u001b\n, (3)\nwhere we omit the boundary terms, something we\ndo throughout the paper, and we define the energy-\nmomentum tensor as\nTab:=−2√−gδ(LM√−g)\nδgab. (4)Hence, the metric equation of motion is\nRab−1\n2Rgab−1\n2λgab=κTab, (5)\nNotice that λenters this last equation as a cosmological\nconstant, even though at this point there is no reason for\nit to be constant. Furthermore, the equation of motion\nassociated with λyields the “unimodular constraint”\n√−g=f. (6)\nOf course, there are also matter field equations that can\nbe written generically as\nδSM\nδΦ= 0. (7)\nThe trace of Eq. (5) takes the form\nR+ 2λ+κT= 0, (8)\nwhere T:=gabTabis the trace of the energy-momentum\ntensor. Introducing this trace into Eq. (5) yields\nEab:=Rab−1\n4Rgab−κ\u0012\nTab−1\n4Tgab\u0013\n= 0,(9)\nwhich is explicitly traceless, namely,\nEabgab= 0. (10)\nOn the other hand, the divergence of Eq. (5) produces\nκ∇aTab=−1\n2∇bλ, (11)\nwhere we use the Bianchi identity. If ∇aTab= 0, λbe-\ncomes a constant, which acts as the cosmological con-\nstant. However, UG allows for more general matter so-\nlutions where ∇aTabis not necessarily zero, opening the\ndoor to interesting phenomenological applications [24].\nThe main difference between GR and UG is the the-\nories’ symmetries and conservation laws. As it is well\nknown, GR is invariant under all diffeomorphisms, which\nin turn implies that ∇aTab= 0. This is not the case in\nUG where the nondynamical function f, which does not\ntransform under (active) diffeomorphisms, by assump-\ntion, partially breaks invariance under diffeomorphisms\n[25]. To show this, we first consider theory in vacuum,\nnamely, S M= 0. The variation of the vacuum UG action\nwith respect to a diffeomorphism associated with ξais\ngiven by Eq. (3) with\nδgab=£ξgab=−2∇(aξb), (12)\nδλ=£ξλ=ξa∇aλ, (13)\nwhere £vis the Lie derivative along va. Then, the UG\naction variation with respect to a diffeomorphism takes\nthe form\nδS =Z\nd4x\u001a\u00141\nκ(−Gab+1\n2gabλ)\u0015\n∇aξb\n+1\n2κ\u0000√−g−f\u0001\nξa∇aλ\u001b\n. (14)3\nAfter we integrate by parts (with the appropriate volume\nform), this variation can be written as\nδS =1\n2κZ\nd4x√−gλ∇a\u0012\nξaf√−g\u0013\n, (15)\nwhere we use the Bianchi identity. On shell, Eq. (6) is\nvalid, and thus,\nδS =1\n2κZ\nd4x√−gλ∇aξa. (16)\nHence, the vacuum action is only invariant under diffeo-\nmorphisms associated with divergence-free vector fields,\nnamely, vector fields such that ∇aξa= 0. This restricted\nset of diffeomorphisms goes by the name of volume-\npreserving diffeomorphisms.\nTo obtain the matter conservation law associated with\nvolume-preserving diffeomorphisms, we notice that a\ndivergence-free vector field ξacan be written in terms of\nageneric antisymmetric tensor αabasξa=ϵabcd∇bαcd,\nwhere ϵabcdis the volume form associated with gab. Thus,\nthe on-shell variation of S Mwith respect to a volume-\npreserving diffeomorphism can be written as\nδSM=Z\nd4x√−gTabϵbcde∇a∇cαde\n=Z\nd4x√−gαdeϵbcde∇c∇aTab, (17)\nwhere, in the last step, we integrate by parts twice.\nTherefore, the matter action is invariant under all\nvolume-preserving diffeomorphisms if\n∇[b∇aTc]a= 0. (18)\nThis last equation is the UG matter conservation law,\nwhich is more general than that of GR. What is more,\nusing the Poincar´ e Lemma [26] and under the hypothe-\nsis that Mis simply connected, which we assume, this\nconservation law implies that there exists a scalar Qsuch\nthat\n∇aTab=∇bQ. (19)\nWhen Qis constant, we recover the GR matter conserva-\ntion law. However, in UG, Qcan be arbitrary. We turn\nto present the framework to describe gravity theories in\nterms of an evolving 3-dimensional geometry.\nB. Space and time decomposition\nUnlike other physical theories fields propagate on a\nfixed spacetime, in relativistic theories of gravity, space-\ntime is a priori unknown and the goal is to deduce its\ngeometry from initial data. In this section, we discuss\nfundamental aspects of the 3 + 1-formalism we use to\ndescribe these theories by evolving geometrical objects,\nclosely following Ref. 2, chapter 10.2.\nFigure 1. A spacetime diagram illustrating the definition of\nthe field ta, the shift vector, Na, and the lapse function, N.\nRecall that we work under the assumption that Mcan\nbe foliated by Cauchy surfaces, Σ t, parameterized by a\nglobal time function, t. We further assume that the nor-\nmal vector nato Σ tis timelike and is normalized accord-\ning to gabnanb=−1. On each Σ t, the spacetime metric\ninduces a Riemannian metric\nhab=gab+nanb. (20)\nThe inverse of this metric is hab=gab+nanb, where gabis\nthe only metric used throughout the text to raise/lower\nindices. Additionally, habna= 0 and ha\nbis a projector\nonto Σ t.\nConsider an arbitrary spacetime vector field va. We\ncan express this field as\nva=v⊥na+va\n∥, (21)\nwhere va\n∥is the part parallel to Σ t. When va=va\n∥, we\ncan think of va, restricted on Σ t, as a vector field on Σ t.\nMore generally, a spacetime tensor τa1···ak\nb1···blis said to be\ntangent to Σ tif\nτa1···ak\nb1···bl=ha1\nc1···hakckhd1\nb1···hdl\nblτc1···ck\nd1···dl. (22)\nLettabe a timelike vector field in Mdefined by\nta∇at= 1. (23)\nThis vector field identifies points on infinitesimally close\nhypersurfaces of constant t, providing a flow of time that\nis used for the evolution. We can decompose tainto its\nnormal and tangential parts as\nta=Nna+Na, (24)\nwhere Nis the lapse function and Na, which is tangen-\ntial, is the shift vector. Relevantly, the fact that tamust\nbe timelike implies that N > 0. Broadly speaking, N\ngives the rate of change of physical time as compared\nwith t. On the other hand, Natells us how the coordi-\nnates are transported from Σ tto Σ t+dt. Fig. 1 illustrates\nthis construction.4\nWe define the derivative operator on Σ t,Da, by\nDeτa1···ak\nb1···bl=ha1\nc1···hakckhd1\nb1···hdl\nblhf\ne∇fτc1···ck\nd1···dl,(25)\nwhere τa1···ak\nb1···blis a tangential tensor. Importantly, one can\nreadily show that this is the only (torsionless) derivative\noperator such that Dahbc= 0 [2]. Moreover, the time\nderivative of any tangential tensor is defined by\n˙τa1···ak\nb1···bl=ha1\nc1···hakckhd1\nb1···hdl\nbl£tτc1···ck\nd1···dl,(26)\nwhich is, by construction, a tangential tensor.\nOne of the dynamical variables we use to describe the\nevolution of spacetime’s geometry is hab; thus, we need\nto calculate its time derivative. We define\nKab:=hc\na∇cnb, (27)\nwhich can be shown to be symmetric. The tensor Kab\nis known as the extrinsic curvature and it describes the\nembedding of Σ tinM. If we use the time derivative on\nhab, we obtain\n˙hab= 2NKab+ 2D(aNb), (28)\nshowing that Kabis related to the time derivative of hab.\nGiven that the equations of motion for UG are second\norder, it is natural to propose that the appropriate initial\ndata for UG should be given by habandKab.\nTo end this subsection, we state some expressions that\nrelate the Riemann tensor associated with gab,Rd\nabc,\nwith objects in Σ t. One can show that the purely tangen-\ntial projection of the Riemann tensor satisfies a Gauss-\nCodazzi relation [2]:\nRd\nabcha\nehb\nfhc\nghj\nd=(3)Rj\nefg+KegKj\nf−KfgKj\ne,(29)\nwhere(3)Rd\nabcis the Riemann tensor associated with hab.\nIn addition,(3)Raband(3)Rrespectively represent the\n3-dimensional Ricci tensor and curvature scalar. Other\nprojections of the Riemann tensor are\nRd\nabcha\nehb\nfhc\ngnd=DeKfg−DfKeg, (30)\nRd\nabcnahb\nehc\nfnd=hb\nehc\nfna∇aKbc−aeaf\n−D(eaf)+Ka\neKaf,(31)\nwhere aa:=nb∇bnais a tangential vector field. Some\nuseful relations concerning the projections and the trace\nof the Ricci tensor are given by\nRcdhc\nahd\nb=(3)Rab+KKab−2Kc\naKcb+N−1˙Kab\n−N−1NcDcKab−2N−1Kc(aDb)Nc\n−aaab−D(aab), (32)\nRcdncnd=−N−1hcd˙Kcd+N−1NcDcK+acac\n+2N−1KcdDcNd+KcdKcd+Dcac,\n(33)\nRbcnbhc\na=DbKb\na−DaK, (34)\nR=(3)R+K2−3KcdKcd+ 2N−1hcd˙Kcd\n−2N−1NcDcK−4N−1KcdDcNd\n−2acac−2Dcac, (35)where K:=Ka\na. Also, we can show that\n˙Kef=Nhb\nehc\nfna∇aKbc+NaDaKef\n+2Ka(eDf)Na+ 2NKa\neKaf. (36)\nWith this result, Eq. (31) can be written as\nRd\nabcnahb\nehc\nfnd=N−1˙Kef−N−1NaDaKef\n−2N−1Ka(eDf)Na−Ka\neKaf\n−aeaf−D(eaf). (37)\nThese are all the technical results we require. In the\nnext section, we classify the UG equations of motion as\nevolution or constraints, and study the Cauchy problem\nfor UG.\nIII. INITIAL VALUE PROBLEM\nThe first task when studying the initial value prob-\nlem of a theory is to identify the constraints. In this\nsection, we classify the UG field equations into evolu-\ntion equations and constraints. When working with a\ngeometrical gravity theory with second-order equations\nof motion, an evolution equation, by definition, contains\ntime derivatives of the extrinsic curvature, which can be\nthought of as second-time derivatives of hab. Conversely,\nan equation with no time derivatives of Kabis a con-\nstraint, which must be imposed on the initial data, and,\nfor consistency, must be kept valid under evolution. No-\ntice that we cannot perform the initial value study for\ngeneric matter fields without specifying the matter ac-\ntion. Thus, in what follows, vacuum UG is considered;\nwe present the sufficient conditions for the matter action\nto respect the well-posedness of UG in Subsec. III C.\nIn most parts of this section, we consider Tab= 0.\nThus, we define E(v)\nabas the tensor that, when it vanishes,\ngives the metric equations of motion, Eq. (9), in the case\nwhere Tab= 0. Importantly, in this part of our study,\nE(v)\nabisnotassumed to be zero throughout M. Instead, a\nweaker assumption is considered: the constraints are only\nvalid on the initial data hypersurface, while the evolution\nequations are satisfied all over M. Interestingly, we find\nthat dynamical consistency implies E(v)\nab= 0 in M.\nFrom the Bianchi identity, we can show that\n∇aE(v)\nab=1\n4∇bR. (38)\nRecall that, since we do not assume that E(v)\nabvanishes\nthroughout M, we cannot claim that its divergence also\nvanishes, and thus, we cannot argue, at this stage, that\nRis constant. Also, from Eq. (10), we can show that\nhabE(v)\nab=E(v)\nabnanb. (39)\nThis last equation allows us to identify the 3-dimensional\ntrace of tangential-tangential projection with the normal-\nnormal projection, rendering the latter redundant; in5\nwhat follows, we omit the normal-normal projection.\nThus, there are only nine independent components of\nE(v)\nab= 0. These components, together with the unimod-\nular constraint, amount to ten equations, which coincides\nwith the number of independent equations of GR.\nWe separate E(v)\nab= 0 into its tangential-tangential\nprojection and its normal-tangential projection, which\nare respectively given by\n0 =(3)Rab+KKab−2Kc\naKcb+N−1˙Kab−aaab\n−N−1NcDcKab−2N−1Kc(aDb)Nc−D(aab)\n−1\n4\u0002(3)R+K2−3KcdKcd+ 2N−1hcd˙Kcd\n−2N−1NcDcK−4N−1KcdDcNd−2acac\n−2Dcac\u0003\nhab, (40)\n0 = DbKb\na−DaK, (41)\nwhere we use Eqs. (32) and (34). The tangential-\ntangential projection of the field equation, Eq. (40), has\ntime derivatives of Kab. Therefore, it is an evolution\nequation. On the other hand, the normal-tangential pro-\njection, Eq. (41), does not contain time derivatives of\nKab, and it is thus a constraint, which is reminiscent of\nthe GR momentum constraint.\nNotice that the unimodular constraint, Eq. (6), is a\nconstraint in the sense that it does not have time deriva-\ntives of Kab. Still, it is not a relation that can be im-\nposed on the initial data and that is automatically satis-\nfied throughout spacetime by the evolution. This is be-\ncause the values of f, which is nondynamical, are given\na priori all over M. However, we will show that the uni-\nmodular constraint can be satisfied by choosing the lapse\nfunction.\nIn summary, in terms of components, six of the field\nequations of vacuum UG, the tangent-tangent projec-\ntions, are evolution equations, while the remaining three,\nthe normal-tangential projections, are constraints. In the\nnext subsection, we analyze the evolution of the con-\nstraints.\nA. Constraint equations\nWe now study if the constraint, Eq. (41), is maintained\nunder evolution. In other words, given initial data on Σ t\nthat satisfies Eq. (41), we must check if the fields ob-\ntained by evolving this initial data still satisfy the con-\nstraint. This can be done by proving that the constraints\non the initial data hypersurface have zero time derivative.\nWithout loss of generality, we take the initial value hy-\npersurface to be Σ 0.\nWe define the tangential tensors\nEab:=hc\nahd\nbE(v)\ncd, (42)\nCa:=DbKb\na−DaK. (43)\nLetA1be the following set of assumptions: the evolution\nequations, Eab= 0, are valid throughout M, and theconstraint, Ca= 0, is only valid on Σ 0. What remains to\ncheck is if, under A1,˙Ca= 0 on Σ 0. From the definition\nof the time derivative, we readily obtain\n˙Ca=Nhd\nane∇eCd+NeDeCa\n+NCeKe\na+CeDaNe. (44)\nGiven that Ca= 0 = DaCbon Σ 0, Eq. (44), when re-\nstricted to Σ 0, takes the form\n˙Ca\f\f\f\nΣ0=Nhb\nanc∇cCb, (45)\nwhich is notautomatically zero under A1.\nLet\nSa:=hb\nanc∇cCb. (46)\nClearly, the time derivative of Cavanishes if Sa= 0. We\ncan show that, under A1,Sa=−DaR/4 on Σ 0:\nProof. We can verify that\nhd\na∇b\u0010\nE(v)\nbchc\nd\u0011\n=DbEab+Eabab−Sa−KCa,(47)\nwhere we use K=∇cnc. Now, using Eq. (38), we obtain\nhd\na∇b\u0010\nE(v)\nbchc\nd\u0011\n=1\n4DaR+Kb\naCb−aaE, (48)\nwhere\nE:=Eabhab\n=1\n4(3)R+1\n4K2+1\n4KabKab−1\n2N−1hab˙Kab\n+1\n2aaaa+1\n2N−1NcDcK+N−1KabDaNb\n+1\n2Daaa. (49)\nCombining Eqs. (47) and (48) produces\nSa=−1\n4DaR−Kb\naCb−KCa+Eabab\n+aaE+DbEab. (50)\nHence, on Σ 0and assuming A1,\nSa|Σ0=−1\n4DaR|Σ0. (51)\nAccording to Dirac’s method [27], it is necessary to\npromote Sa= 0 as a constraint; in Dirac’s terminology,\nSa= 0 is a “secondary constraint.” This, of course, im-\nplies that the 4-dimensional curvature scalar, R, must\nbe constant throughout Σ 0. Namely, R= 4Λ 0, where\nDaΛ0= 0. Notice that we must consider Ras a short-\nhand notation for the right-hand side of Eq. (35), which\nonly contains tangential objects. Also, as the notation6\nsuggests, Λ 0will end up playing the role of the cosmolog-\nical constant. However, at this stage, we can only claim\nthat Λ 0is constant along Σ 0and there is noreason to\nassume that ˙Λ0= 0; dynamical consistency fixes Λ 0to\nbe constant throughout spacetime, as we show next.\nWe now prove that, under A1,˙R= 0 on Σ 0:\nProof. Using the fact that hb\na−nanbis the identity tensor\nin spacetime, we can verify that\nE(v)\nabnb=Ca−naE. (52)\nThe divergence of this last equation produces\n∇a(E(v)\nabnb) =∇aCa−KE −na∇aE. (53)\nAlternatively, we can calculate ∇a(E(v)\nabnb) using the\nLeibniz rule and Eq. (38), producing\n∇a\u0010\nE(v)\nabnb\u0011\n=1\n4na∇aR+E(v)\nabKab−Caaa.(54)\nWhen we compare Eqs. (53) and (54), we obtain\nDaCa+2Caaa−KE−na∇aE=1\n4na∇aR+EabKab,(55)\nwhere we use ∇aCa=DaCa+Caaa. Hence, on Σ 0and\nassuming A1,\nna∇aR|Σ0= 0. (56)\nThis result, together with the fact that DaR= 0 on Σ 0,\nimplies that ˙R= 0 on Σ 0.\nThe lesson from the last proof is that, under A1, Λ0is\nconstant throughout M. Recall that A1is a significantly\nweaker set of assumptions than assuming that E(v)\nab= 0\nthroughout M. We now need to check if ˙Sa= 0 on\nΣ0, assuming A1andSa|Σ0= 0; we refer to this set of\nassumptions by A2. Clearly, under A2, the vanishing of\n˙Sais equivalent to\nhb\nanc∇cSb\f\f\nΣ0= 0, (57)\nwhich we show to hold:\nProof. Using Eq. (50), we get\nhb\nanc∇cSb=−1\n4hb\nanc∇cDbR−Cdhb\nanc∇cKd\nb\n−Kb\naSb−Canb∇bK−KSa\n+adhb\nanc∇cEbd+Eabnc∇cab+aanb∇bE\n+Ehb\nanc∇cab+hb\nanc∇cDdEbd, (58)\nwhere we write nc∇cKabandna∇aKin terms of R=\n4Λ0and other tangential objects using Eqs. (35) and (36).\nNotice that, except for the first term, all the terms in\nEq. (58) are proportional to Ca,Sa,E,Eabor derivativesofEandEab, all of which vanish under A2. Thus, we\nneed to focus on\nhb\nanc∇cDbR=hb\nanc∇c(hd\nb∇dR)\n=hb\na(nc∇chd\nb)∇dR+hb\nanc∇c∇bR\n=aanb∇bR+Da(nb∇bR)−Kb\naDbR,\n(59)\nwhere we repeatedly use the definition of the tangen-\ntial derivative, the Leibniz rule, and the fact that co-\nvariant derivatives acting on scalars commute; this is a\nconsequence of the torsion-free hypothesis (a study of an\nunimodular theory with torsion is presented in Ref. 28).\nWhen we evaluate on Σ 0, the first and last terms in\nEq. (59) can be seen to vanish using R= 4Λ 0. More-\nover, if we take the tangential derivative of Eq. (55), we\ncan write the second term in terms of objects that also\nvanish under A2. With all this, we can show that, under\nA2,hb\nanc∇cSb= 0 on Σ 0.\nRelevantly, the secondary constraint Sa= 0 can be\nwritten in a more familiar way. Starting from R= 4Λ 0,\nwhich, under A2, is equivalent to Sa= 0, and using E= 0\nand Eqs. (35) and (49), it is possible to obtain\n4Λ0= 2(3)R+ 2K2−2KcdKcd, (60)\nwhich has the form of the Hamiltonian constraint of GR\nwith a cosmological constant. However, in vacuum UG,\nEq. (60) appeared for dynamical consistency and not as\na (primary) constraint. The main conclusion of this sub-\nsection is that, for consistency, initial data in vacuum\nUG must be subject to Eqs. (41) and (60). In the next\nsubsection, we verify that the evolution predicted in vac-\nuum UG is unique, continuous, and causal in the above-\ndescribed sense.\nB. Evolution equations\nIn this subsection, we study the evolution equations,\nnamely, the tangential-tangential projection of the vac-\nuum field equations, and the unimodular constraint. We\nhave taken habandKabas the dynamic variables for vac-\nuum UG. However, an approach that better adapts to our\nneeds is the BSSN formulation, developed for GR initially\nby Shibata and Nakamura [29] and later by Baumgarte\nand Shapiro [30]. The BSSN formulation consists of sepa-\nrating the conformal factor for the spatial metric and the\ntrace of the extrinsic curvature, and studying their evo-\nlution separately. Also, we decompose the tensors into\ntheir components on the foliation hypersurfaces, which\nare denoted with Latin indexes i, j, k, . . . . Also, for sim-\nplicity, we take Na= 0, a condition that can be trivially\nrelaxed.\nLet˜hijbe such that\nhij=ψ4˜hij, (61)7\nwhere\nψ=h1/12, (62)\nso that the determinant of ˜hijis˜h= 1 (hthe determinant\nassociated with hij). Notice that\n˜hij=ψ4hij=h1/3hij. (63)\nis the inverse of ˜hij. Moreover, let Aijbe the symmetric\ntensor field defined by\nAij:=Kij−1\n3Khij. (64)\nClearly Aij˜hij= 0, namely, Aijis the traceless part of\nthe extrinsic curvature.\nIn the BSSN formulation the dynamical varialbes are\nϕ,K,˜hab,˜Aaband˜Γa, which are given by\nϕ:= ln ψ=1\n12lnh, (65a)\nK=hijKij, (65b)\n˜hij= e−4ϕhij, (65c)\n˜Aij= e−4ϕAij, (65d)\n˜Γi:=˜hjk˜Γi\njk. (65e)\nThe first expression is a redefinition of the conformal fac-\ntor, the second is the trace of the extrinsic curvature, the\nthird is the conformal transformation given in Eq. (61),\nthe fourth is a rescaling of the traceless part of the extrin-\nsic curvature, and finally, ˜Γiare the conformal connection\nfunctions, where\n˜Γi\njk=1\n2˜hil\u0010\n−∂l˜hjk+∂j˜hkl+∂k˜hlj\u0011\n, (66)\nare the Christoffel symbols associated with ˜hij. Further-\nmore, we can show that Eq. (65e) is equivalent to\n˜Γi=−∂j˜hji. (67)\nWhat remains to be done is to rewrite the constraint and\nevolution equations in terms of the BSSN variables; this\nallows us to argue when comparing with the GR evolution\nequations, that vacuum UG has a well-posed initial value\nformulation.\nUsing Eq. (60) we can cast the evolution equation,\nEq. (40), as\n0 =(3)Rab+KKab−2Kc\naKcb+N−1˙Kab\n−N−1NcDcKab−2N−1Kc(aDb)Nc\n−N−1DaDbN−Λ0hab, (68)\nwhich coincides with the evolution equation of GR with\na cosmological constant. Thus, the system of evolutionequations of vacuum UG, in BSSN variables, takes the\nsame form of the corresponding GR equations, namely,\n∂t˜hij= 2N˜Aij, (69a)\n∂tϕ=1\n6NK, (69b)\n∂t˜Aij= e−4ϕ\u0010\nDiDjN−N(3)Rij\u0011TL\n−\nN\u0010\nK˜Aij−2˜Ak\ni˜Akj\u0011\n, (69c)\n∂tK=DkDkN−N\u0012\n˜Aij˜Aij+1\n3K2−Λ0\u0013\n,(69d)\n∂t˜Γi=−2N\u0012\n˜Γi\njk˜Ajk+ 6˜Aij∂jϕ−2\n3˜hij∂jK\u0013\n+2˜Aij∂jN. (69e)\nGiven that GR with a cosmological constant is strongly\nhyperbolic [31], then, it follows from our analysis that the\nevolution equations of vacuum UG are also strongly hy-\nperbolic, and thus, this theory has a well-posed evolution\nin the sense of being unique, continuous, and causal.\nWe turn now to discuss the unimodular constraint.\nUsing the well-known expression√−g=N√\nhand\nEq. (65a), we get√−g=Ne6ϕ. On the other hand,\nthe unimodular constraint is√−g=f. By direct com-\nparison, we can conclude that the unimodular constraint\nis satisfied as long as\nN=fe−6ϕ. (70)\nNotably, both sides of Eq. (70) must be positive. More-\nover, the fact that the unimodular constraint can be\nsolved by simply choosing the lapse function is compati-\nble with the result of Ref. [32] where it is noted that one\ncomponent of the metric is sufficient to solve the unimod-\nular constraint.\nWith this analysis, we shown that vacuum UG has an\nevolution that is unique, continuous, and causal. How-\never, there are cases where the initial data must be given\non different charts covering Σ 0. In this case, a “gluing”\nof the different “evolutions” must be made. Fortunately,\nthis procedure can be carried out in the same manner as\nin GR [2], since this procedure relies on making coordi-\nnate transformations, which are available in UG. Like-\nwise, there is no obstruction to applying the GR proof\n[3] that shows that there is a maximal evolution of the\ninitial data. Therefore, we can conclude that vacuum UG\nhas a well-posed initial value formulation which gives rise\nto a maximal evolution of the initial data. In the next\nsubsection, we discuss UG with matter.\nC. Initial value formulation with matter\nThe initial value formulation of a UG theory with mat-\nter can only be studied once the relevant matter action\nis given. Still, we provide a set of sufficient conditions to8\nhave a well-posed initial value formulation for a UG the-\nory with a generic matter action. Of course, the methods\nwe present can be used for a particular matter action.\nThe metric field equation is equivalent to Eab= 0, as\nin Eq. (9). Again, we do notassume that Eabvanishes\ninM, but only a weaker assumption: the constraints\nvanish on Σ 0and the evolution equations vanish in M.\nImportantly, we can check that\n∇aEab=1\n4∇b(R−4κQ+κT). (71)\nwhere we use Eq. (19).\nThe tangential-tangential projection and normal-\ntangential projection of Eab= 0 are respectively given\nby\n0 =Eab−κ\u0012\nTcdhc\nahd\nb−1\n4Thab\u0013\n, (72)\n0 = Ca−κTbcnbhc\na, (73)\nwhich are tangential tensors. Recall that, since Eabgab=\n0, the normal-normal projection of Eab= 0 can be ob-\ntained from Eq. (72).\nWe know, from the vacuum UG analysis, that Eq. (72)\nis an evolution equation. On the other hand, the normal-\ntangential projection, Eq. (73), is a constraint provided\nthat Tbcnbhc\nacan be written in such a way that it does\nnot contain second time derivatives of habor the matter\nfields. Assuming this is the case, we find the conditions\nnecessary for the constraint to remain valid under evolu-\ntion. This analysis can be done as in Subsec. III A, the\nmain difference is that now 4Λ 0=R−4κQ+κTis con-\nstant, as expected from Eq. (71). The conclusion is that,\nto have dynamical consistency, the initial data must be\nsubject to\nDbKb\na−DaK=κTbcnbhc\na, (74)\n(3)R+K2−KabKab= 2( κTabnanb+ Λ 0+κQ),(75)\nwhere, to write Eq. (75) in this form, we take the trace of\nEq. (72) and we use that T=Tabhab−Tabnanb. Equation\n(75) looks like the Hamiltonian constraint with matter\nand a cosmologican constant but it depends on Q, which,\nrecall, is closely related to ∇aTab; this is an important\ndifference when comparing with GR.\nWe can study the well-posedness of the evolution equa-\ntions with matter in a simple way. Mimicking the analysis\nof vacuum UG in terms of BSSN variables, we can show\nthat the UG evolution equations have the same form as\nthose of GR with matter and a cosmological constant,\nbut in this case Λ 0+κTabnanb+κQplays the role of the\ncosmological constant. Now, it is known that GR with\nmatter and a cosmological constant has a well-posed ini-\ntial value formulation, in a weak hyperbolic sense [33, 34],\nprovided that Tabonly depends on the fields and its\nfirst derivatives and that the matter equations of mo-\ntion, Eq. (7), are also well-posed by themselves. To prove\nthis result one can use the fact that the evolution equa-\ntions are quasilinear, diagonal, second-order hyperbolic(QDSOH), and apply Leray’s theorem [35], as done in\nRef. 2. We can thus conclude that UG has a well-posed\ninitial value formulation as long as neither TabnorQ,\nwhich also appears in the dynamical equations, have sec-\nond derivatives of the fields, and the matter field equa-\ntions are well posed. Observe that this restriction on the\nenergy-momentum tensor is enough for Eq. (73) to be\na constraint. Of course, these are sufficient conditions;\nthere could be cases that do not meet this hypothesis and\nstill have a well-posed initial value formulation.\nIV. CONCLUSIONS\nOne of the most important properties of any theory\nis its capacity to make predictions out of initial data.\nTherefore, if UG is to be considered as a viable physical\ntheory, it needs to have a well-posed initial value formu-\nlation. Moreover, to utilize this theory, we need to find\nall the constraints. Here, we show that UG is well-posed\nand we find all the constraints. For the latter, we fol-\nlowed the well-known Dirac method; the result is that\nthere are primary constraints, Ca= 0, and secondary\nconstraints, Sa= 0. Then, we used these constraints in\nthe evolution equations to cast them in the form of those\nin GR, which have a well-posed initial value formulation,\ncompleting the proposed analysis.\nRemarkably, the unimodular constraint does not be-\nhave as a constraint in the sense that it is not imposed\non the initial data and preserved under evolution. This\nfeature ought to be present in any theory with nondy-\nnamical fields, like the gravitational sector of the Stan-\ndard Model Extension [36]. In the present case, the uni-\nmodular constraint can always be satisfied by a choice of\nthe lapse function, shedding some light on the role of the\nUG nondynamical function.\nWe also found interesting that the equivalence between\nGR and vacuum UG, in the context of an initial value\nproblem, is not a priori obvious even when Qis con-\nstant. Interestingly, only by requiring dynamical consis-\ntency does a spacetime constant emerge (e.g., R= 4Λ 0in\nvacuum) that can be used to show this equivalence. Still,\nUG can be a suitable test theory to perform numerical\ncomputation of modified geometrical gravity theories. In\naddition, the results we obtain suggest that one can run\nGR numerical calculations using only the traceless part\nof the Einstein equations. Of course, the relevant case\nwhen looking for new physical phenomena is to allow for\n∇aTab̸= 0.\nFinally, UG has more constraints than the 4 con-\nstraints of GR. This enhanced number should be related\nto the reduced symmetries of UG [37], but a detailed\ncounting of constraints is not direct [38]. For that, we\nwould need to use Hamiltonian methods, which have been\nused to study the problem of time in UG [39, 40]. Un-\nfortunately, other studies of theories with nondynamical\nfields [41, 42] suggest that a full Hamiltonian analysis\nshould not be straightforward.9\nACKNOWLEDGMENTS\nWe acknowledge getting valuable feedback from M.\nChernicoff, U. Nucamendi, N. Ortiz, M. Salgado, O. Sar-\nbach, and D. Sudarsky. This project used financial sup-\nport from CONAHCyT FORDECYT-PRONACES grant\n140630 and UNAM DGAPA-PAPIIT grant IN101724.\n[1] S. Weinberg, Rev. Mod. Phys. 61, 1 (1989).\n[2] R. M. Wald, General Relativity (Chicago Univ. Press,\n1984).\n[3] Y. Choquet-Bruhat and R. Geroch, Comm. Math. Phys.\n14, 329 (1969).\n[4] M. Salgado, Class. Quantum Grav. 23, 4719 (2006).\n[5] A. D. Rendall, Class. Quantum Grav. 23, 1557 (2006).\n[6] O. Sarbach, E. Barausse, and J. A. Preciado-L´ opez,\nClass. Quantum Grav. 36, 165007 (2019).\n[7] A. D. Kov´ acs, Phys. Rev. D 100, 024005 (2019).\n[8] A. D. Kov´ acs and H. S. Reall, Phys. Rev. D 101, 124003\n(2020).\n[9] L. A. Sal´ o, K. Clough, and P. Figueras, Phys. Rev. Lett.\n129, 261104 (2022).\n[10] A. Einstein, Sitzungsber. Preuss. Akad. Wiss. Berlin ,\n349 (1919), with an English translation in The Principle\nof Relativity (Dover Publications, 1952).\n[11] W. Pauli, Theory of relativity (Courier Dover Publica-\ntions, 1981).\n[12] E. ´Alvarez and E. Velasco-Aja, “A primer on unimodular\ngravity,” (2023), arXiv:2301.07641 [gr-qc].\n[13] J. L. Anderson and D. Finkelstein, Am. J. Phys. 39, 901\n(1971).\n[14] J. J. van der Bij, H. van Dam, and Y. J. Ng, Physica\n116A , 307 (1982).\n[15] W. Buchmuller and N. Dragon, Phys. Lett. B 207, 292\n(1988).\n[16] W. Buchmuller and N. Dragon, Phys. Lett. B 223, 313\n(1989).\n[17] G. F. R. Ellis, H. van Elst, J. Murugan, and J.-P. Uzan,\nClass. Quantum Grav. 28, 225007 (2011).\n[18] J. Earman, “Trace-free gravitational theory (aka unimod-\nular gravity) for philosophers,” (2022), https://philsci-\narchive.pitt.edu/20765.\n[19] T. Josset, A. Perez, and D. Sudarsky, Phys. Rev. Lett.\n118, 021102 (2017).\n[20] A. Perez and D. Sudarsky, Phys. Rev. Lett. 122, 221302\n(2019).\n[21] F. X. Linares Cede˜ no and U. Nucamendi, Phys. Dark\nUniverse 32, 100807 (2021).[22] F. X. Linares Cede˜ no and U. Nucamendi, JCAP 2023 ,\n036 (2023).\n[23] R. Carballo-Rubio, L. J. Garay, and G. Garc´ ıa-Moreno,\nClass. Quantum Grav. 39, 243001 (2022).\n[24] Y. Bonder, J. E. Herrera, and A. M. Rubiol, Phys. Rev.\nD107, 084032 (2023).\n[25] C. Corral and Y. Bonder, Class. Quantum Grav. 36,\n045002 (2019).\n[26] M. Nakahara, Geometry, Topology and Physics , 3rd ed.\n(Taylor & Francis, 2016).\n[27] P. Dirac, Lectures on Quantum Mechanics (Dover Pub-\nlications, 2001).\n[28] Y. Bonder and C. Corral, Phys. Rev. D 97, 084001\n(2018).\n[29] M. Shibata and T. Nakamura, Phys. Rev. D 52, 5428\n(1995).\n[30] T. W. Baumgarte and S. L. Shapiro, Phys. Rev. D 59,\n024007 (1998).\n[31] O. Sarbach, G. Calabrese, J. Pullin, and M. Tiglio, Phys.\nRev. D 66, 064002 (2002).\n[32] G. R. Bengochea, G. Le´ on, A. Perez, and D. Sudarsky,\nJCAP 2023 , 011 (2023).\n[33] G. Nagy, O. E. Ortiz, and O. A. Reula, Phys. Rev. D\n70, 044012 (2004).\n[34] O. A. Reula, Liv. Rev. Rel. 1, 1998 (1998).\n[35] J. Leray, “Hyperbolic differential equations,” (1953),\nhttps://hdl.handle.net/20.500.12111/8019.\n[36] V. A. Kosteleck´ y, Phys. Rev. D 69, 105009 (2004).\n[37] M. Henneaux and C. Teitelboim, Quantization of Gauge\nSystems (Princeton University Press, 1992).\n[38] M. Henneaux and C. Teitelboim, Phys. Lett. B 222, 195\n(1989).\n[39] W. G. Unruh, Phys. Rev. D 40, 1048 (1989).\n[40] L. Smolin, Phys. Rev. D 80, 084003 (2009).\n[41] C. M. Reyes and M. Schreck, Phys. Rev. D 104, 124042\n(2021).\n[42] Y. Bonder, in Proceedings of the Ninth Meeting on CPT\nand Lorentz Symmetry (World Scientific, 2023) p. 176." }, { "title": "2402.00146v2.Collapse_and_expansion_kinetics_of_a_single_polyelectrolyte_chain_with_hydrodynamic_interactions.pdf", "content": "Collapse and expansion kinetics of a single polyelectrolyte chain with\nhydrodynamic interactions\nJiaxing Yuan1and Tine Curk2,a)\n1)Research Center for Advanced Science and Technology, The University of Tokyo, 4-6-1 Komaba,\nMeguro-ku, Tokyo 153-8904, Japan\n2)Department of Materials Science and Engineering, Johns Hopkins University, Baltimore, Maryland 21218,\nUSA\nWe investigate the collapse and expansion dynamics of a linear polyelectrolyte (PE) with hydrodynamic\ninteractions. Using dissipative particle dynamics with a bead-spring PE model, long-range electrostatics\nand explicit ions we examine how the timescales of collapse tcoland expansion texpdepend on the chain\nlength N, and obtain scaling relationships tcol∼Nαandtexp∼Nβ. For neutral polymers, we derive values\nofα= 0.94±0.01 and β= 1.97±0.10. Interestingly, the introduction of electrostatic interaction markedly\nshifts αtoα≈1.4±0.1 for salt concentrations within c= 10−4M to 10−2M. A reduction in ion-to-monomer\nsize ratio noticeably reduces α. On the other hand, the expansion scaling remains approximately constant,\nβ≈2, regardless of salt concentration or ion size considered. We find β > α for all conditions considered,\nimplying that expansion is always slower than collapse in the limit of long polymers. This asymmetry is\nexplained by distinct kinetic pathways of collapse and expansion processes.\nPolyelectrolytes (PE) are charged polymers that con-\nstitute a class of materials with profound significance in\nbiological systems (such as proteins, DNA, and RNA)\nand diverse industrial applications.1,2A substantial body\nof theoretical and computational research has been ded-\nicated to unraveling the structural attributes of these\npolymers1,3and gaining insights into their expansion-\ncollapse transition.4–6In particular, the non-equilibrium\nkinetics governing the PE expansion-collapse transition\nholds vital implications for elucidating the folding dy-\nnamics of biomolecules7–9and for designing responsive\nsmart materials.10,11\nThe non-equilibrium phase ordering kinetics of soft\nmaterials can be significantly influenced by hydrody-\nnamic interactions (HI) induced by solvent flow.12–16\nFor a neutral polymer in a solvent a collapse can be\ninduced by a change in the solvent quality, in which\ncase HI were shown to accelerate the collapse kinetics\ncompared to Brownian dynamics (BD) simulations.17–20\nStarting from the fully expanded chain Kikuchi et al.\nprovided an analytical prediction asserting that the col-\nlapse timescale tcolfollows a power-law relationship,\ntcol∼N4/3, with Nrepresenting the chain length.19\nGuo et al. employed dissipative particle dynamics (DPD)\nsimulations and reported a different scaling behavior,\ntcol∼N0.98±0.09, if the initial condition is an equilibrated\npolymer.\nHowever, it is not clear how the presence of electro-\nstatic interactions impacts the scaling relationship of\nPE collapse. The full hydrodynamic simulation of the\nexpansion–collapse kinetics of charged PE is complex due\nto the necessity of properly accounting for long-range and\nmany-body electrostatic interactions as well as HI. Such\ninvestigations are relatively rare with only one recent\na)Electronic mail: tcurk@jhu.educomputational study21delving into PE collapse kinetics\nusing fluid particle dynamics method,22which revealed\nthat HI significantly speeds up PE collapse but did not\nexplore how HI changes the scaling behavior. Moreover,\nthe dependence of expansion timescale texp, the reverse\nprocess of collapse, on the chain length Nhas to our\nknowledge not been investigated.\nIn this work, we conduct DPD simulations of a coarse-\ngrained (CG) bead-spring PE23,24to investigate how the\ncollapse time tcoland expansion time texpscales with\nthe chain length N. Our CG model comprises an an-\nionic PE, monovalent counterions, and additional mono-\nvalent salt at concentration ccontained in a cubic three-\ndimensional periodic box of size L. The PE is represented\nas a bead-spring chain23,24composed of Nmonomers,\neach carrying a charge of −e. The PE monomers and\nions are treated as spherical particles with diameter σ\nandσs, respectively. We primarily focus on the case of\nσ=σs, but we also explore the impact of a smaller\nion size ( σs= 0.5σ). The particles interact through\na standard 12-6 Lennard-Jones (LJ) potential charac-\nterized by an energy coupling constant εand a cutoff\ndistance rcut. We choose rcut= 3σto represent the\nshort-range hydrophobic attraction between monomers,\nwhereas rcut= 21/6(σ+σs)/2 and rcut= 21/6σsare\nset for purely repulsive monomer–ion and ion–ion LJ\ninteraction. The electrostatic coupling is controlled by\nthe Bjerrum length lBgiven by lB=e2/(4πkBTεsol)\nwhere εsolrepresents the permittivity of the solvent, kB\nis Boltzmann’s constant, and Tis the absolute tem-\nperature. We set σ=lB= 0.72 nm to represent a\ntypical monomer size and electrostatic coupling in an\naqueous electrolyte at room temperature.24,25Neighbor-\ning monomers along a chain are connected through har-\nmonic potential Ubond(rij) = ( K/2)(rij−R0)2with\nspring constant K= 400 kBT/σ2and bond length R0=\n21/6σ, where rijrepresents the center-to-center distance\nbetween monomer iandj. Electrostatic interactions\n1arXiv:2402.00146v2 [cond-mat.soft] 4 Apr 2024are calculated using the particle-particle-particle-mesh\n(PPPM) algorithm with a relative force accuracy of\n10−3.26,27Each simulation contains a single polymer\nchain in a box size of L= 120 σforN≤100 and\nL= 180 σforN= 200, which is sufficiently large to\navoid polymer–polymer interaction through periodic im-\nages (see Table S1 and Fig. S1 in Supplemental Informa-\ntion (SI) for details).\nTo account for hydrodynamic interactions, we employ\nthe computational method based on dissipative particle\ndynamics (DPD)28that couples the polymers to the DPD\nsolvent (DPDS).29The monomers and ions are immersed\nin a DPD solvent characterized by parameters typical\nfor an aqueous solution: particle density ρ= 3r−3\nc, cut-\noff distance rc=λ= 0.646 nm, friction parameter\nγ= 4.5kBTτ/r2\nc, with τ=λp\nm/(kBT) the standard\nmolecular dynamics simulation time unit, mthe mass of\nthe particles, and interaction prefactor aij= 78kBT; see\nRef. 29 for more details). The coupling between the so-\nlute particles (monomers and ions) and the DPD solvent\nis achieved by friction parameter γs= 5γand cutoff dis-\ntance rs=rc. This setting captures the hydrodynamic\ninteractions and yields the typical diffusion constant of\nions and monomers D≈0.07λ2/τ≈1.1 nm2/ns (τ≈\n0.027ns). The system is evolved using the velocity-Verlet\nintegrator with a time step of ∆ t= 0.005τ. When plot-\nting the results, we scale the time in terms of the Brow-\nnian time for a free particle τBD=σ2/(24D)≈0.74τ.\nWe first perform equilibrium simulations to prepare\ninitial equilibrated configurations of the polymer. When\ninvestigating the collapse process, we initially employ\npurely repulsive LJ interactions between the polymer\nsegments ( rcut= 21/6σandε= 3kBT) while incor-\nporating full electrostatic interactions. To initiate the\ncollapse, we introduce an attractive LJ interaction be-\ntween the monomers by setting rcut= 3σand keeping\nε= 3kBT. This attractive interaction is activated in-\nstantaneously, leading to a sudden quench that drives\nthe polymer collapse. Conversely, when studying expan-\nsion, we follow the opposite protocol. The equilibrium\nstructures are generated using attractive LJ interactions\n(rcut= 3σ) with ε= 3kBT. Subsequently, we change the\nmonomer–monomer LJ interaction to a purely repulsive\n(rcut= 21/6σ) to investigate the expansion kinetics.\nUsing this setup, we examine the collapse and expan-\nsion dynamics of both neutral polymer and charged PE\nat different salt concentrations c= 10−4M (Debye length\nlD≈30.4nm), 10−3M (lD≈9.61nm), and 10−2M\n(lD≈3.04nm). The temporal change of Rgas a function\nof elapsed time tfor the collapse and expansion of a single\nneutral polymer and a charged PE at salt concentration\nc= 10−3M are shown in Fig. 1 and Fig. 2, respectively.\nThe raw data of PE collapse and expansion at different\nsalt concentrations c= 10−4M and c= 10−2M are pro-\nvided in Fig. S2 in SI. Comparing PE with a neutral poly-\nmer, we observe that the electrostatic repulsion between\nmonomers significantly slows the collapse kinetics, while\nexpansion is accelerated. This effect becomes particu-larly important when the salt concentration is low since\nelectrostatic repulsion is not effectively screened. More-\nover, the equilibrium configurations depend sensitively\non the electrostatic repulsion and salt concentrations c:\nneutral polymer forms a globule, but the PE forms an\nelongated rod or a bead-spring configuration with larger\nRgat lower c, in agreement with previous studies.30,31\nThis change in equilibrium Rgsignificantly affects the\ncollapse and expansion timescales in addition to direct\nelectrostatic interactions.\nFor these simulations (Fig. 2) we employed the stan-\ndard choice with salt ions of the same size as the\nmonomers, σs=σ. However, ion size can impact ion\nbinding, as it determines the closest distance between\nions and monomers. In Fig. 3, we explore the influ-\nence of ion size. It is evident that a smaller ion size\n(σs= 0.5σ) yields more compact structures in the col-\nlapsed PE due to stronger electrostatic attraction be-\ntween ions and monomers, consistent with previous sim-\nulations of PE.31–33Compared to PE collapse where ions\nand monomers have identical sizes (Fig. S1(b)), smaller\nion size substantially accelerates the collapse since elec-\ntrostatic repulsion between monomers is screened more\neffectively. Moreover, smaller ions can more easily incor-\nporate into the globular polymer thus yielding compact\nequilibrium globular structures that are similar to neu-\ntral polymer configurations (compare configurations in\nFig. 3b with Fig. S1(d)and Fig. 1b)\nBased on the time evolution of Rgin Fig. 1–Fig. 3, we\ncalculate how the collapse and expansion timescale de-\npend on the chain length N. The collapse and expansion\ntimescale tcolandtexpare defined by the time t∗required\nfor the change in the radius of gyration Rg(t) to reach a\nfraction fcof the maximum change,19\nRg(t∗) =Rg,init−fc(Rg,init−Rg,final), (1)\nwhere Rg,initandRg,finalare, respectively, the initial and\nthe final equilibrated values of Rg. In the present work,\nwe set fc= 0.9 and fit the obtained timescales to a power-\nlaw scaling ( tcol∼Nαandtexp∼Nβ) using the non-\nlinear Levenberg-Marquardt algorithm34that takes into\naccount the error bars when fitting the data. We employ\nthe implementation of this algorithm in Gnuplot.35For\nthe collapse process, we conduct 15 independent simula-\ntions. Conversely, for the expansion process, owing to the\nabsence of driving force and larger variance, we conduct\na range of 25 to 35 independent runs. This enables us\nto acquire high-resolution data concerning Rg(t) and its\nassociated timescale. Note the choice of fc= 0.9 ensures\nthe extracted timescales are not affected by the slow local\narrangements of the collapsed globule in the late stage.19\nThe scaling behaviors of collapse and expansion\ntimescales are summarized in Fig. 4. For a neutral\npolymer we obtain α= 0.94±0.01 (Fig. 4(a)) and\nβ= 1.97±0.10 (Fig. 4(e)). This agrees with previ-\nous reported simulation results36of neutral polymer col-\nlapse starting from an initially equilibrated conformation,\ntcol∼N0.98±0.09.\n2(a)neutral polymer collapse(b)neutral polymer expansion\n110100100010000051015t [τBD]Rg [σ]N=10N=20N=40N=100N=200110100100010000100000051015t [τBD]Rg [σ]\nFIG. 1. The temporal change of Rgas a function of elapsed time tfor a single neutral polymer of different chain lengths N\nundergoing (a) collapse and (b) expansion. The dashed lines show the equilibrium collapsed (a) and expanded (b) Rg. The\ninsets in (b) show the equilibrium collapsed and expanded polymer configurations for N= 100. Error bars denote standard\nerrors obtained from 10 independent simulations. Error bars in (a) are smaller than the symbol size.\n110100100010000110100t [BD]Rg [](a)c=10-3 M(b)c=10-3 M\n110100100010000110100t [BD]Rg []\nFIG. 2. The temporal change of Rgfor a single PE of various chain lengths Nundergoing collapse (a) and expansion (b) at salt\nconcentration c= 10−3M. The insets in (b) show the representative equilibrated collapsed and expanded PE configurations for\nN= 100. Salt ions are not shown for clarity. The monomer size and ion size are identical ( σs=σ). Error bars show standard\nerrors, for most points they are smaller than the symbol size.\n(a)c=10-2 M (small ion size)(b)c=10-2 M (small ion size)\n1101001000100000.1110100t [BD]Rg []\n1101001000100000.1110100t [τBD]Rg [σ]N=20N=40N=100N=200N=10\nFIG. 3. The temporal change of Rgfor a single PE undergoing (a) collapse and (b) expansion at c= 10−2Mand smaller ion\nsize ( σs= 0.5σ). The insets in (b) show the collapsed and expanded PE for N= 100.\n3Notably, we find the collapse scaling for PE is α≈\n1.4±0.1 (Fig. 4b–d) for different salt concentrations, indi-\ncating that the incorporation of electrostatic interactions\nnot only shifts the absolute values of timescales but also\nmarkedly changes the scaling behavior compared to the\nneutral polymer case. We speculate that α≈1.4±0.1\nscaling may be a result of the initial state resembling a\nfully expanded polymer with Rg∼Ndue to electrostatic\nrepulsion between segments. Consequently, α≈1.4±0.1\nis close to the theoretical prediction of α= 4/3 for\nneutral polymer collapse starting from a fully expanded\nstate.19We speculate that scaling could change to lower\nvalues of αfor very long polymers N > 200 and high salt\nconcentration c > 10−2M. Conversely, the expansion\nscaling does not change appreciably with the introduc-\ntion of electrostatics and we find β≈2 (Fig. 4f–h) for\nthe charged PE under different salt concentrations.\nIn the case of smaller ion-to-monomer size ratio,\nσs/σ= 0.5, we obtain α= 1.15±0.04 at c= 10−2M\n(Fig. 4a), which is closer to the corresponding values\nfor neutral polymers, while the expansion scaling re-\nmains unaffected within statistical accuracy of our re-\nsults, β= 1.94±0.09 (Fig. 4e). We attribute the reduced\nαto enhanced screening and the ability of small ions to be\nincorporated into the globule, enabling a charge-neutral\nglobule configuration. In contrast, with larger ion-to-\nmonomer size ratio ( σs/σ= 1), the ions cannot incorpo-\nrate into a collapsed globule, leading to more expanded,\npearl-necklace-like equilibrium structures. These find-\nings suggests that the collapse scaling is sensitive to the\nshort-range ion–polymer interaction and whether ions\ncan incorporate in, or are excluded from, the collapsed\npolymer globule. We anticipate that the scaling exponent\nαvaries continuously with the size ratio σs/σand that by\nfurther decreasing the size ratio, the strengthened screen-\ning would result in αcloser to that of a neutral polymer\n(α≈1).\nInterestingly, we find β > α for all conditions inves-\ntigated, implying that expansion is always slower than\ncollapse for long polymers. This intriguing observation\ncan be understood by considering the kinetic pathways\nfor collapse and expansion (Fig. 5a). The pathway is\nquantified by a Rg–ncparametric plot where ncis the\nnumber of contacts per monomer defined as the average\nnumber of neighbors within a distance 1 .5σ(Fig. 5b).\nNotably, we find that a closed circle emerges confirming\nthat collapse and expansion follow distinct kinetic path-\nways. The collapse behavior resembles a shrinking pro-\ncess along the backbone where small pearls form whose\nhydrodynamic drag is proportional to the pearl diameter\n(N1/3) and in addition HI induce directional flow acceler-\nating the merging of local pearls.19,21Conversely, during\nexpansion the coil expands isotropically where the total\ndrag scales as the sum over monomers ( N) and there is no\ndirectional flow along the backbone, resulting in a longer\ntimescale compared to the collapse.\nFurthermore, while collapse scaling is substantially af-\nfected by electrostatics and ion–polymer interaction, theexpansion scaling remains β≈2 regardless of polymer\ncharge, salt concentration and ion size (Fig. 4e–h). This\nsuggests that the expansion scaling is governed by the\ndiffusive expansion of the polymer and electrostatic re-\npulsion does not appear to noticeably alter this scaling,\neven at very low salt concentrations. We analyze the\nRg–ncplot for the collapse and expansion of PE under\nsalt concentrations of c= 10−4M (Fig. 5c, top) and\nc= 10−2M (Fig. 5d, top). For expansion, we observe\na two-step process: initially, the coil experiences slight\nswelling, during which the number of contacts per par-\nticlencis significantly reduced. Subsequently, diffusion-\ndriven expansion occurs, constituting the rate-limiting\nstage, which is only weakly influenced by electrostatics\ndue to the relatively small monomer contacts nc. Con-\nversely, nccontinues to rise during the entire collapse\nprocess, which underscores the critical role of electro-\nstatics on the collapse. The structural analysis of radial\ndensity distribution for polymer and charged PE during\ncollapse and expansion collectively support the above sce-\nnario (Fig. S3 in SI). These findings also align with the\nevolution of electrostatic energy Vele(Fig. 5c–d, bottom)\nwhere Velereaches saturation much earlier in the expan-\nsion compared to the collapse. Note Veleis defined for\nthe entire system encompassing monomers, counterions,\nand salt ions and its value depends on the relative num-\nber of ions to monomers in the system. Veleis positive\nin the low-salt regime, which is dominated by monomer–\nmonomer repulsion, but it becomes negative in the high\nsalt case where electrostatics is dominated by ion–ion at-\ntractive interactions. The meaningful aspect lies in the\ntemporal change of Veleduring the collapse/expansion\nprocess, which is related to the conformational change\nof the PE. The different kinetic pathways of collapse and\nexpansion can explain why the collapse scaling αis sensi-\ntive to electrostatics, while the expansion scaling, β≈2,\nis not.\nFollowing previous works on polymer collapse,17–21,37\nwe immediately quench the system to initiate collapse\nor expansion. For a typical real PE with chain length\nN≈104, based on the predicted scaling relationships\ntcol∼Nαandtexp∼Nβ, we infer that the timescales\nfor collapse and expansion under the salt concentration of\nc= 10−2M are tcol≈13µsandtexp≈1350µs. Thus, our\nwork should be relevant to experimental conditions where\nthe rapid quenching into a new regime can be achieved\nwithin microseconds.\nTo summarize, we systematically examined the col-\nlapse and expansion timescales of neutral polymers and\ncharged polyelectrolytes with long-range electrostatics,\nexplicit salt ions and hydrodynamic interactions. Our\nfindings illustrate that the inclusion of electrostatic in-\nteractions alters the scaling behaviors tcol∼Nαof col-\nlapse, while it does not noticeably affect the expansion\nscaling texp∼Nβ. Specifically, in neutral polymer sys-\ntems, we obtain α= 0.94±0.01, consistent with the\nprevious prediction36andβ= 1.97±0.10. The inclusion\nof electrostatic interactions significantly shifts the value\n41101001000101102103104\nNtcol [τBD]c=10-2mol/Lslope:1.38±0.07(a)(b)\n1101001000101102103104\nNtcol [τBD]neutral slope:0.94±0.01slope:1.15±0.04c=10-2mol/L(small ion)\n1101001000101102103104\nNtcol [τBD]c=10-3mol/Lslope:1.42±0.081101001000101102103104\nNtcol [τBD]slope:1.38±0.07c=10-4mol/L(c)(d)1101001000101102103104\nNtexp [τBD]c=10-2mol/Lslope:2.09±0.05(e)(f)\n1101001000101102103104105\nNtexp [τBD]neutralc=10-2mol/L(small ion)slope:1.97±0.10slope:1.94±0.09(g)(h)\n1101001000101102103104\nNtexp [τBD]c=10-3mol/L\nslope:2.14±0.071101001000101102103104\nNtexp [τBD]c=10-4mol/Lslope:1.91±0.05collapseexpansionFIG. 4. Collapse and expansion timescales of charged polymer and neutral polymer calculated by applying Eq. (1) to data\nin Figs. 1–3. The exponents for collapse αand expansion βare obtained by fitting the data to tcol∝Nαandtexp∝Nβ\nrespectively.\n110100100010000-2.0-1.5-1.0-0.50.0\nt [BD]Vele [kBT]collapseexpansion(b)neutral polymer\n(d)charged PE (N=100; c=10-2M)(c)charged PE (N=100; c=10-4M)\n(a)\ncollapse kinetic pathwayexpansion kinetic pathway02468100246810\nRg []ncexpansioncollapse\n101520250246\nRg []ncexpansioncollapse510152002468\nRg []ncexpansioncollapse\n1101001000100000.00.51.01.52.0\nt [BD]Vele [kBT]collapseexpansion\nFIG. 5. Characterization of kinetic pathways in collapse and expansion processes for a polymer and PE with N= 100. (a)\nSnapshots from simulations depicting polymer collapse and expansion kinetic pathways for a neutral polymer. (b) Relationship\nbetween the radius of gyration Rgand the number of contacts per monomer ncduring collapse and expansion of a neutral\npolymer. (c)–(d) Top panels: The same analysis as in panel (b) conducted for the collapse and expansion of a charged PE at\nsalt concentrations of c= 10−4M and c= 10−2M. Bottom panels: The temporal change of the average electrostatic energy\nper charged particle (i.e., PE and salt ions), denoted as Vele, for the collapse and expansion of a PE at salt concentrations of\nc= 10−4M (bottom left) and c= 10−2M (bottom right).\n5of collapse scaling to α≈1.4. Interestingly, changes\nin salt concentration ranging from 10−4M to 10−2M do\nnot have a substantial impact on the scaling relationships\nof both collapse and expansion timescales. However, re-\nducing ion-to-monomer size ratio changes the scaling to\nα≈1.15 at c= 10−2M, which we mainly attribute to\nthe ability of small ions to incorporate into the collapsed\npolymer globule. This highlights that non-electrostatic\nshort-range ion–polymer interaction can substantially in-\nfluence the collapse scaling. The expansion scaling, how-\never, remains constant with β≈2 regardless of the\ncharge, salt concentration or ion size. We find that β > α\nfor all conditions considered implying that expansion is\nalways slower than collapse for long polymers. We eluci-\ndate these observations by contrasting the distinct kinetic\npathways of collapse and expansion (Fig. 5), highlighting\nthat these two processes are not simply opposites of each\nother. Our study provides fundamental insights into the\ncollapse and expansion kinetics of linear polyelectrolytes,\nuseful for rationalizing the dynamics of polyelectrolytes\nin solution and understanding the folding and unfolding\nprocess of charged biopolymers.\nI. SUPPLEMENTARY MATERIAL\nSupplemental material provides the raw Rg(t) data\nused to calculate the collapse and expansion timescales,\nsystem-size comparison and simulation details.\nACKNOWLEDGMENTS\nThis work was supported by the startup funds pro-\nvided by the Whiting School of Engineering at JHU and\nperformed using the Advanced Research Computing at\nHopkins (rockfish.jhu.edu), which is supported by the\nNational Science Foundation (NSF) grant number OAC\n1920103.\nREFERENCES\n1M. Rubinstein and G. A. Papoian, “Polyelectrolytes\nin biology and soft matter,” Soft Matter 8, 9265–9267\n(2012).\n2M. Muthukumar, Physics of Charged Macromolecules:\nSynthetic and Biological Systems (Cambridge Univer-\nsity Press, 2022).\n3A. V. Dobrynin and M. Rubinstein, “Theory of poly-\nelectrolytes in solutions and at surfaces,” Prog. Polym.\nSci.30, 1049–1118 (2005).\n4N. Lee and D. Thirumalai, “Dynamics of collapse\nof flexible polyelectrolytes in poor solvents,” Macro-\nmolecules 34, 3446–3457 (2001).\n5N.-K. Lee and S. Obukhov, “Collapse dynamics of a\npolyelectrolyte,” Europhys. Lett. 66, 350 (2004).6S. Ghosh and S. Vemparala, “Kinetics of charged poly-\nmer collapse in poor solvents,” J. Phys.: Condens. Mat-\nter34, 045101 (2021).\n7V. A. Bloomfield, “Condensation of DNA by multiva-\nlent cations: Considerations on mechanism,” Biopoly-\nmers31, 1471–1481 (1991).\n8R. Russell, I. S. Millett, M. W. Tate, L. W. Kwok,\nB. Nakatani, S. M. Gruner, S. G. Mochrie, V. Pande,\nS. Doniach, D. Herschlag, et al. , “Rapid compaction\nduring RNA folding,” Proc. Natl. Acad. Sci. U.S.A.\n99, 4266–4271 (2002).\n9J. Yuan and H. Tanaka, “Impact of hydrodynamic in-\nteractions on the kinetic pathway of protein folding,”\nPhys. Rev. Lett. , In Press (2024).\n10M. Tagliazucchi and I. Szleifer, “Transport mechanisms\nin nanopores and nanochannels: can we mimic na-\nture?” Materials Today 18, 131–142 (2015).\n11M. Li, A. Pal, A. Aghakhani, A. Pena-Francesch, and\nM. Sitti, “Soft actuators for real-world applications,”\nNature Reviews Materials 7, 235–249 (2022).\n12M. Manghi, X. Schlagberger, Y.-W. Kim, and R. R.\nNetz, “Hydrodynamic effects in driven soft matter,”\nSoft Matter 2, 653–668 (2006).\n13G. Gompper, T. Ihle, D. M. Kroll, and R. G. Winkler,\n“Multi-particle collision dynamics: A particle-based\nmesoscale simulation approach to the hydrodynamics\nof complex fluids,” Advanced computer simulation ap-\nproaches for soft matter sciences III , 1–87 (2009).\n14M. C. Marchetti, J. F. Joanny, S. Ramaswamy, T. B.\nLiverpool, J. Prost, M. Rao, and R. A. Simha, “Hydro-\ndynamics of soft active matter,” Rev. Mod. Phys. 85,\n1143–1189 (2013).\n15J. Yuan, K. Takae, and H. Tanaka, “Impact of in-\nverse squeezing flow on the self-assembly of oppositely\ncharged colloidal particles under electric field,” Phys.\nRev. Lett. 129, 248001 (2022).\n16J. Yuan, M. Tateno, and H. Tanaka, “Mechanical slow-\ning down of network-forming phase separation of poly-\nmer solutions,” ACS Nano 17, 18025–18036 (2023).\n17R. Chang and A. Yethiraj, “Solvent effects on the col-\nlapse dynamics of polymers,” J. Chem. Phys. 114,\n7688–7699 (2001).\n18C. F. Abrams, N.-K. Lee, and S. Obukhov, “Collapse\ndynamics of a polymer chain: Theory and simulation,”\nEurophys. Lett. 59, 391 (2002).\n19N. Kikuchi, J. F. Ryder, C. M. Pooley, and J. M.\nYeomans, “Kinetics of the polymer collapse transition:\nThe role of hydrodynamics,” Phys. Rev. E 71, 061804\n(2005).\n20K. Kamata, T. Araki, and H. Tanaka, “Hydrody-\nnamic selection of the kinetic pathway of a polymer\ncoil-globule transition,” Phys. Rev. Lett. 102, 108303\n(2009).\n21J. Yuan and H. Tanaka, “Hydrodynamic effects on\nthe collapse kinetics of flexible polyelectrolytes,” Phys.\nRev. Lett. 132, 038101 (2024).\n22H. Tanaka and T. Araki, “Simulation method of col-\nloidal suspensions with hydrodynamic interactions:\n6Fluid particle dynamics,” Phys. Rev. Lett. 85, 1338–\n1341 (2000).\n23M. J. Stevens and K. Kremer, “Structure of salt-free\nlinear polyelectrolytes,” Phys. Rev. Lett. 71, 2228–\n2231 (1993).\n24M. J. Stevens and K. Kremer, “The nature of flexible\nlinear polyelectrolytes in salt free solution: A molecu-\nlar dynamics study,” J. Chem. Phys. 103, 1669–1690\n(1995).\n25M. J. Stevens and S. J. Plimpton, “The effect of added\nsalt on polyelectrolyte structure,” Eur. Phys. J. B 2,\n341–345 (1998).\n26T. Darden, D. York, and L. Pedersen, “Particle mesh\nEwald: An N·log(N) method for Ewald sums in large\nsystems,” J. Chem. Phys. 98, 10089–10092 (1993).\n27M. Deserno and C. Holm, “How to mesh up Ewald\nsums. I. A theoretical and numerical comparison of\nvarious particle mesh routines,” J. Chem. Phys. 109,\n7678–7693 (1998).\n28R. D. Groot and P. B. Warren, “Dissipative particle\ndynamics: Bridging the gap between atomistic and\nmesoscopic simulation,” J. Chem. Phys. 107, 4423–\n4435 (1997).\n29T. Curk, “Dissipative particle dynamics for coarse-\ngrained models,” (2024), arXiv:2401.04932 [cond-\nmat.soft].30H. J. Limbach and C. Holm, “Single-chain properties\nof polyelectrolytes in poor solvent,” J. Phys. Chem. B\n107, 8041–8055 (2003).\n31P.-Y. Hsiao and E. Luijten, “Salt-induced collapse\nand reexpansion of highly charged flexible polyelec-\ntrolytes,” Phys. Rev. Lett. 97, 148301 (2006).\n32J. Yuan, H. S. Antila, and E. Luijten, “Dielectric ef-\nfects on ion transport in polyelectrolyte brushes,” ACS\nMacro Lett. 8, 183–187 (2019).\n33J. Yuan, H. S. Antila, and E. Luijten, “Structure\nof polyelectrolyte brushes on polarizable substrates,”\nMacromolecules 53, 2983–2990 (2020).\n34D. W. Marquardt, “An algorithm for least-squares es-\ntimation of nonlinear parameters,” SIAM Journal on\nApplied Mathematics 11, 431–441 (1963).\n35T. Williams, C. Kelley, and many others, “Gnuplot 4.4:\nAn interactive plotting program,” http://gnuplot.\nsourceforge.net/ (2010).\n36J. Guo, H. Liang, and Z.-G. Wang, “Coil-to-globule\ntransition by dissipative particle dynamics simulation,”\nJ. Chem. Phys. 134(2011).\n37S. Majumder, J. Zierenberg, and W. Janke, “Kinetics\nof polymer collapse: Effect of temperature on cluster\ngrowth and aging,” Soft Matter 13, 1276–1290 (2017).\n7" }, { "title": "2402.00189v1.The_clique_number_of_the_exact_distance__t__power_graph__complexity_and_eigenvalue_bounds.pdf", "content": "arXiv:2402.00189v1 [math.CO] 31 Jan 2024The clique number of the exact distance t-power\ngraph: complexity and eigenvalue bounds\nAida Abiad∗Afrouz Jabal Ameli†Luuk Reijnders‡\nAbstract\nThe exact distance t-power of a graph G,G[♯t], is a graph which has the same\nvertex set as G, with two vertices adjacent in G[♯t]if and only if they are at distance\nexactlytin the original graph G. We study the clique number of this graph, also\nknown as the t-equidistant number. We show that it is NP-hard to determine the\nt-equidistant number of a graph, and that in fact, it is NP-har d to approximate it\nwithinaconstant factor. Wealsoinvestigate howthe t-equidistantnumberrelates to\nanother distance-based graph parameter; the t-independencenumber. In particular,\nwe show how large the gap between both parameters can be. The h ardness results\nmotivate deriving eigenvalue bounds, which compare well ag ainst a known general\nbound. In addition, the tightness of the proposed eigenvalu e bounds is studied.\nKeywords: Exact distance graphpower; Clique number; Complexity; Eigenvalue bounds\n1 Introduction\nA setSof vertices of a graph Gis at-equidistant set ifd(u,v) =tfor allu,v∈S,\nwhereu/\\e}atio\\slash=v. A set S⊆V(G) is anequidistant set if there exists t∈Nsuch that\nSis at-equidistant set; we will say that a t-equidistant set Shasdiameter t, which\nwe will denote by D(S) =t. Thet-equidistant number of a graph Gis the number of\nvertices in a largest t-equidistant set of Gand theequidistant number eq(G) is defined\nby eq(G) = max{eqt(G) : 1≤t≤D(G)}. Astrict equidistant set Sis an equidistant set\nsuch that if Sinduces a clique then |S|= 1; the strict equidistant number eq′(G) is the\nsize of a largest strict equidistant set in G.\nFor a positive integer t, thepower graph ofG, denoted by Gt, is a graph which has\nthe same vertex set as G, with two vertices adjacent in Gtif and only if they are at\n∗a.abiad.monge@tue.nl , Department of Mathematics and Computer Science, Eindhoven Un iversity\nof Technology, The Netherlands\n†a.jabal.ameli@tue.nl , Department of Mathematics and Computer Science, Eindhoven Un iversity\nof Technology, The Netherlands\n‡l.e.r.m.reijnders@student.tue.nl , Department of Mathematics and Computer Science, Eind-\nhoven University of Technology, The Netherlands\n1distance at least tin the original graph G. A similar, but less studied, notion is the exact\ndistance t-powerof a graph G. This is denoted by G[♯t], and is a graph which has the\nsame vertex set as G, with two vertices adjacent in G[♯t]if and only if they are at distance\nexactlytin the original graph G. One of the first explicit definitions of this concept is\ndue to Simi´ c [25], who studied graphs which had an exact distance po wer isomorphic to\ntheir line graph. Other work includes the investigation of graphs tha t are isomorphic to\ntheir exact square [4] and the structure of exact distance power s of products of graphs\n[6]. Also, the notion of exact distance powers often appears in the c ontext of the theory\nof sparse graphs, see [22, Section 11.9]. The main focus in earlier inve stigations of exact\ndistance graphs was on their chromatic number, see for instance [ 16, 23, 11, 19]. Note\nthat a connected graph Ghasχeq(G) = 1 if and only if it is a clique.\nUsing the exact distance- tpower graph we have an alternative definition of the t-\nequidistant number: eqt(G) =ω(G[♯t]). In this work we focus on investigating the clique\nnumber of the exact distance t-power of a graph, a parameter that has been investigated\nbefore. Instances of it are the work by Foucaud et al. [12], who st udied the problem of\nfinding the maximum possible clique number among exact distance t-powers of graphs\nof given maximum degree. Haemers [13] studied a similar parameter re lated to the t-\nequidistant number.\nIn this paper we show that the problem of determining the t-equidistant number is\nNP-hard, and also that it is impossible to approximate the t-equidistant number with a\nconstant factor unless P=NP. We also investigate the relation between the equidistant\nnumber and the well studied t-independence number of a graph G, which is the maximum\nsize of a set of vertices in Gat pairwise distance greater than t. In particular, we focus\non understanding how large the gap between both parameters can be. The hardness\nresults motivate deriving eigenvalue bounds, since these can be com puted in polynomial\ntime. Using the results on the parameters’ relationship and eigenva lue interlacing, we\nderive several eigenvalue bounds on the t-equidistant number. We show that, for several\ninstances, the obtained bounds compare favorably to previously k nown bounds. Finally,\nwe study the tightness of the proposed eigenvalue bounds.\nSome applications of the parameter eqt(G)\nThe parameter of interest, eqt(G), has a direct application in the field of Information\nTheory. Let Aq={0,...,q−1}for an integer q≥2. A non-empty subset C⊂An\nqis\ncalled a q-ary code. If|C|=Nanddis the minimum Hamming distance in C, then\nCis called a ( n,d,N)q-Hamming code . ByAq(n,d) we denote the largest N∈Nfor\nwhich there exists a ( n,d,N)q-Hamming code. If the Hamming distance between any\ncodewords in Cis exactly d, then the code Cis calledequidistant . A quantity of interest\nin the study of q-ary codes is Aq(n,d), which is the largest N∈Nfor which there exists\na (n,d,N)q-Hamming code. A similar quantity exists for equidistant codes specifi cally,\nBq(n,d) is the largest N∈Nfor which there exists an equidistant ( n,d,N)q-Hamming\ncode. Much like the ( t−1)-independence number of the hypercube graph Qnis equal\nA2(n,t)[3],thet-equidistantnumberof Qnisequalto B2(n,t). Hence, thespectralbounds\n2on the equidistant number presented here can be applied in the cont ext of equidistant\ncodes. Equidistant codes have been extensively studied, see for in stance [5, 21], and their\ninterest is a consequence of their application in random network cod ing [18].\nAnotherapplicationisto equidistant subspace codes ,i.e., subspace codeswiththeprop-\nerty that the intersection of any pair of codewords has the same d imension. Equidistant\nsubspace codes were shown to have relevant applications in distribu ted storage in [24].\n2 Complexity of eqt(G)\nWe investigate the complexity of the t-equidistant number, and show that it is NP-hard\nto determine eqt. We do this by constructing auxiliary graphs where edges in the origin al\ngraphs become paths of length t. We remark that the gadget used for this reduction for\nodd values of tresembles the gadget used for the NP-hardness proof of ω(Gt) by Lin and\nSkiena [20, Theorem 5.2]. Finally, we show that it is NP-hard to approxim ate eqtwithin\na constant factor.\nWe begin this section by exploiting some properties of a well-studied fa mily of graphs\nknown as split graphs. Such properties will be useful in particular fo r our reduction when\ntis even.\nDefinition 1 (Split graph) .A graphG= (V,E)is called splitif there exists a partition\nof the vertices into subsets V1,V2such that V1is a clique and V2is an independent set.\nSplit graphs were defined and characterized by F¨ oldes and Hammer [8, 10]. These\ngraphs were also introduced independently by Tyshkevich and Cher nyak [7] under the\nnamepolar graphs .\nLemma 2. Whether or not a graph Gis split can be determined in polynomial time.\nFurthermore if Gis split, we can find a partition of V(G)into a clique and independent\nset in polynomial time.\nProof.Letd1≥d2...≥dnbe the degree sequence of Gand letv1,v2,...,vnbe a labeling\nof vertices such that vihas degree di. Hammer and Simeone [9] showed that a graph is a\nsplit iff for largest index ksuch that dk≥k−1, we have:\nk(k−1)−k/summationdisplay\ni=1di+n/summationdisplay\ni=k+1di= 0.\nFurthermore the authors showed that if Gis split, then (/uniontextk\ni=1vi,/uniontextn\nj=k+1vj) is a partition\nofGinto a clique and an independent set. Note that the above-mentione d process can\nclearly be done in polynomial time.\nTheorem 3. LetG= (V,E)be a graph. For any fixed integer t≥1finding a maximum\nt-equidistant number of Gis an NP-hard problem.\n3Proof.IfGis split, then determining the clique number of Gcan be done in polynomial\ntime. Let ( V1,V2) be a partition of the vertices of Gsuch that V1is a clique and V2is\nan independent set. Note that we can obtain such a partition (if it ex ists) in polynomial\ntime using Lemma 2. Note that as V2is an independent set of nodes any clique of Gcan\ncontain at most one vertex in V2. Furthermore, we already know V1is a clique. Hence if\nV1∪{v}is a clique for any v∈V2then this is the maximum clique and otherwise V1itself\nis the maximum clique of G.\nNow assume Gis not split. We will give a reduction of determining the clique number\nofGto determining the t-equidistant number of a graph H. We split into two cases, t\neven and todd.\n•tis odd: Construct a graph H= (V′,E′) fromGby replacing every edge e∈E\nby a path of length t, that is add t−1 additional vertices into every edge. We\nhenceforth call the vertices in Voriginal vertices, and the vertices in V′\\Vdummy\nvertices. Note that the distance of original vertices uandvisdinGthen their\ndistance is k×tinH.\nWe now want to show that Ghas a clique of size mif and only if Hhas at-\nequidistant set of size m. The first implication follows directly from the definition\nofH. For the second, note that:\n(i) IfU⊂Vis at-equidistant set in H, thenUis a clique in G.\n(ii) IfU⊂V′is at-equidistant set in H, thenUeither consists entirely of original\nvertices, or entirely ofdummy vertices. This is due to the fact that the distance\nof a dummy vertex from an original vertex can not be a multiple of t.\nMeaning we only need to consider the additional case when U⊂V′\\Vis at-\nequidistant set in H. Form= 1 or 2 this is trivial, hence assume |U|=m≥3.\nNow, consider a t-equidistant set in H, for which U⊂V′\\Vand|U|= 3. Consider\ntwo vertices u1,u2∈U. By construction, they must lie on two distinct paths corre-\nsponding to two distinct edges in Gthat share an endpoint, say ( v1,v2),(v1,v3)∈E.\nNow,\nt=d(u1,u2) =dH(u1,v1)+dH(u2,v1) =⇒dH(u1,v1)/\\e}atio\\slash=dH(u2,v1).\nThis is because tis odd. Hence, for the third vertex u3∈Uit cannot be on a path\ncorresponding to an edge incident to v1, as it could never be at distance tfrom both\nu1andu2in this case. Instead, it must be on the path corresponding to the e dge\n(v2,v3). For this to occur, v1v2v3must be a triangle in G, meaning we have a clique\nof size 3 in G.\nFinally, assume in the above that m≥4. Then there exists a fourth vertex u4∈U,\nhowever, just as u3, this vertex must lie on the path corresponding to the edge\n(v2,v3). But then dH(u3,u4)< twhich is a contradiction and hence this case\ncannot occur.\nThusω(G) = eqt(H) and hence we can find ω(G) by computing eqt(H).\n4•tis even: Just as in the odd case, construct a graph H= (V′,E′) fromGby\nreplacing every edge e∈Eby a path of length t, that is add t−1 additional\nvertices into every edge. However, now we additionally connect all t he ”central”\ndummy vertices, i.e. the vertices in the center of the paths of lengt htreplacing\nthe edges. We now want to show that Ghas a clique of size mif and only if H\nhas at-equidistant set of size m. The first implication still follows directly from the\ndefinition of H. For the second we use a few observations:\n(i)U⊆Vis at-equidistant set in Hif and only if Uis a clique in G.\n(ii) Any t-equidistant set U⊆V′inHcan at most have 1 dummy vertex.\n(iii) For any clique U⊆VinG, there exists an edge e∈Esuch that ehas no\nendpoint in U.\nThese are true because:\n(i) Follows directly from the construction of H.\n(ii) Ifv∈V′\\Vis a dummy vertex, then it will be at distance at mostt\n2−1 from\na central dummy vertex. But since this holds for all dummy vertices , and all\ncentral dummy vertices form a clique, we conclude any two dummy ve rtices\nare within distance (t\n2−1)+(t\n2−1)+1 = t−1 from each other, and hence\nno two dummy vertices could be in the same t-equidistant set of H.\n(iii) By assumption, Gis not split and thus if Uis a clique in G, thenV\\Uis not\nan independent set in G. In other words, there exist two vertices u,v∈V\\U\nsuch that ( u,v)∈E.\nFrom assertions (i) and (ii) we find ω(G) = eqt(H) orω(G)+1 = eqt(H). Assertion\n(iii) tells us we are always in the latter case. Indeed, let Ube a clique in Gof size\nω(G), thenUis at-equidistant set in H. Now consider the edge ( v1,v2)∈Esuch\nthat{v1,v2}∩U=∅, andinparticular consider its corresponding dummy vertices in\nH. Denote by wthe dummy vertex in Hfor which d(v1,w) = 1 and d(v2,w) =t−1.\nNow, any vertex in Uwill be at distance exactlyt\n2to some central dummy vertex in\nH, andhence at distancet\n2+1tothecentral dummy vertex corresponding to e. This\nin turn means they are all at distance exactly tfrom the dummy vertex w. Thus\nU∪{w}is at-equidistant set in Hof sizeω(G)+1 and hence ω(G)+1 = eqt(H).\nThis means we can exactly determine ω(G) by computing eqt(H), as we wanted.\nNow since ωis NP-hard, eqtmust be NP-hard as well.\nInfact, inthenextresultweshowthatitisimpossibletoapproximate thet-equidistant\nnumber with a constant factor unless P=NP.\nTheorem 4. For every fixed integer tandǫ≥0, there exists no constant approximation\nfor computing the t-equidistant number of a graph H, wherenis the number of vertices\nofH, unlessP=NP.\n5Proof.For this purpose we show that if such an approximation algorithm exis t then there\nexists a constant approximation for the maximum clique problem wher ekis the number\nof vertices of the input graph. Now to prove use we use a similar argu ment to the proof\nof Theorem 3. Let Gbe the input graph of a maximum clique instance. We first use\nLemma 2 to check whether Gis split or no. If Gis split then we can find its maximum\nclique in polynomial time. Hence we assume that Gis not split. Assume there exists\nac-approximation for eqtfor some constant c >1. Now we use the same reduction as\ndiscussed in the proof of Theorem 3. We distinguish the following case s:\n•tis odd:Note that our reduction constructs an instance HofGsuch that the size\nofHis polynomial in terms of size of G. Furthermore for every feasible solution\nofGwe can compute in polynomial time a feasible solution with the same size\nforHand vice versa. Therefore given a c-approximation for H, we can obtain a\nc-approximation for Gas well.\n•tis even: Again our reduction constructs an instance HofGsuch that the size\nofHis polynomial in terms of size of G. However now for every feasible solution\nofHwe can compute in polynomial time a feasible solution that is at most one\nunit smaller for G. Furthermore we know that ω(G) = eqt(H) + 1. Now we can\nuse thec-approximation algorithm for maximum t-equidistant set to compute a t-\nequidistant set Sof size eqt(H)/c. Then we can use this to find a clique Cof size\nat least eqt(H)/c−1 inG. Observe that eqt(H)/c−1 = (ω(G)+ 1)/c−1. Now\nasGis not split it has at least one edge. Therefore we can compute a clique of size\nmax{2,(ω(G) + 1)/c−1}> ω(G)/2c. Thus this leads to a 2 c-approximation for\nmaximum clique problem.\nHowever under the assumption of P/\\e}atio\\slash=NPthere exists no constant approximation for\nmaximum clique problem ([27]), hence the claim.\n3 The relation between the equidistant number and\nthet-independence number\nA setUof vertices of a graph Gis called a t-independence set ifd(u,v)> tfor all\nu,v∈U. Thet-independence number of a graph G, denoted αt, is the size of the\nlargestt-independence set of G. Clearly, the t-equidistant number is closely related to the\n(t−1)-independence number, but with the underlying set having strict er requirements.\nThe following lemmas make this connection more precise.\nThe following lemmas investigate the relation between the above para meters.\nLemma 5. [26] For any graph Gwith clique number ω(G)we have ω(G) = eq1(G)≤\neq(G)≤max{ω(G),α(G)}. For graphs with diameter two we have the equality eq(G) =\nmax{ω(G),α(G)}.\nA straight-forward extension of Lemma 5, using αt(G), is as follows.\n6Lemma 6. LetGbe a graph. Then, at least one of the following holds\n1.eq(G) = eqi(G), for some i∈[1,t],\n2.eq(G)≤αt(G).\nLemma 7. LetGbe a graph. Then for t,t∗∈N+witht < t∗we haveαt(G)≥eqt∗(G).\nProof.IfUis at∗-equidistant set, then all its vertices are at pairwise distance at lea stt,\nmeaning it is also a t-independent set. Hence αt(G)≥eqt∗(G).\nLemma 8. LetGbe a graph. If t≥D(G), thenαt−1(G) = eqt(G).\nProof.The case t > D(G) is trivial, as in this case no two vertices are far enough apart\nto form a ( t−1)-independent set or t-equidistant set, and hence αt−1(G) = 1 = eqt(G).\nNext ist=D(G).αt−1(G)≥eqt(G) follows from Lemma 7. To prove the converse, let\nUbe a (t−1)-independent set. Then for all u,v∈Uwe haved(u,v)> t−1, additionally,\nsincet=D(G), we have d(u,v)≤D(G) =t. Thusd(u,v) =tfor allu,v∈U, and thus\nUis at-equidistant set. Since this holds for arbitrary U, we conclude αt−1(G)≤eqt(G),\nand thus αt−1(G) = eqt(G).\nLemma 9. LetGbe a graph. Then there exists a t∗∈N+such that for all t < t∗we\nhaveαt(G)≥eq(G).\nProof.By definition, there is a t∗∈N+such that eq( G) = eqt∗(G). The desired inequality\nfollows from applying Lemma 7.\nBy way of the above lemmas, we are able to apply eigenvalue bounds fo r the indepen-\ndence number, such as the ones seen in [1] and its optimization from [2], to the equidistant\nnumber. We will investigate this further in Section 4.\nThanks to Lemma 7, we have an easy way to apply bounds on αt−1to eqt. However, a\nquick look at the two definitions suggests that αt−1can in general be significantly larger\nthan eqt. Thus, next we will investigate how this gap behaves, and we will also lo ok at\nthe extremal cases, i.e. the graphs of given order for which αt−1−eqtis maximal.\nFirst, we define the main quantity we are interested in:\nDefinition 10. Letk≥1,t≥2, we denote the maximum distance between αt−1andeqt\nover all connected graphs of order kby:\nAE(k,t) = max{αt−1(G)−eqt(G) :Ghas order k}.\nIn particular, we will focus on studying\nlim\nk→∞AE(k,t)\nk. (1)\nThefollowingresultshowsthat(1)isentirelydeterminedbyhowfast thet-independence\nnumber grows relative to the amount of vertices.\n7Theorem 11.\nlim\nk→∞AE(k,t)\nk= lim\nk→∞max/braceleftbiggαt−1(G)\nk:Gis of order k/bracerightbigg\n.\nProof.The inequality\nlim\nk→∞AE(k,t)\nk≤lim\nk→∞max/braceleftbiggαt−1(G)\nk:Gis of order k/bracerightbigg\n.\nfollows trivially from αt−1−eqt≤αt−1.\nFor the other inequality, fix some t∈N+. Now choose the graphs G(n,t) such that\nG(n,t) hasnvertices, and\nαt−1(G(n,t)) = max {αt−1(G) :Gis of order n}.\nNext, define the graphs H(m,n,t) by connecting mcopies of G(n,t) in a line, by way of\npathsof length t. This graphhas m(n+t)−tvertices, forthe mcopies of G(n,t) that have\nnvertices, and the m−1 paths of length tconnecting them. Since none of these copies are\nwithin distance t, we can take the union of the largest t-independence sets of the copies of\nG(n,t) as at-independence set of H(m,n,t). Hence, αt−1(H(m,n,t))≥m·αt−1(G(n,t)).\nFurthermore, note that eqt(H(m,n,t)) will be bounded by some constant Cn,twhich\ndoes not depend on m. This is because for any arbitrary vertex v∈V(H(m,n,t)), the\namount of vertices within distance t(and subsequently those at exactly t) does not grow\nas you add more copies of G(n,t) in the way described here.\nNow, fix an nand observe\nlim\nk→∞AE(k,t)\nk≥lim\nm→∞αt−1(H(m,n,t))−eqt(H(m,n,t))\n|V(H(m,n,t))|≥lim\nm→∞m·αt−1(G(n,t))−Cn,t\nm(n+t)−t\n=αt−1(G(n,t))\nn+t\nSince this holds for arbitrary n, it must also hold in the limit.\nlim\nk→∞AE(k,t)\nk≥lim\nn→∞αt−1(G(n,t))\nn+t= lim\nn→∞αt−1(G(n,t))\nn\n= lim\nn→∞max/braceleftbiggαt−1(G)\nn:Gis of order n/bracerightbigg\nwhere this last equality is by definition of G(n,t).\nIn view of Theorem 11, it would be of interest to know how\nlim\nk→∞max/braceleftbiggαt(G)\nk:Gis of order k/bracerightbigg\n(2)\nbehaves. For t= 1, the classical independence number, we know this limit is equal to 1 ,\ntake for instance the star graphs Sn. For larger thowever, this remains an open problem.\n84 Eigenvalue bounds for the ( t-)equidistant number\nWe have seen in Section 2 that the t-equidistant number is hard to compute. Thus, it\nmakes sense to derive bounds for this parameter using eigenvalues , since these can be\ncomputed in polynomial time. In particular, we will investigate how kno wn bounds on\nαtandωcan be used to derive bounds on eqtand eq. In addition, we will introduce a\ncompletely different bound using the distance matrix spectra (Theo rem 22). We will also\nshow graph classes that attain equality for our bounds and show th at our bounds compare\nfavorably to a previous bound on the t-equidistant number.\n4.1 Bounds on eqt\nAs a point of comparison, we will use the following bound on eqt, which is a straight\nforward generalization of a bound on eq2by Foucaud et al. [12, Theorem 2.1].\nProposition 12. LetGbe a graph with maximum degree ∆. Then\neqt(G)≤∆(∆−1)t−1+1.\nProof.For some vertex v∈V, consider the maximum amount of vertices that can be at\ndistance exactly tfromv, this is ∆(∆ −1)t−1. Hence, the size of any t-equidistant set is\nat most ∆(∆ −1)t−1+1.\nAswehaveseeninSection3, wecanrelatetheequidistant number to theindependence\nnumberandthecliquenumber. Therearetwomainwaysofdoingthis. WecanuseLemma\n7 and we can use Lemma 5.\nFirst, we will look at the bounds we can obtain on eqt+1using bounds on αt; and we\nwill do it applying Lemma 7.\nProposition 13 (Inertial-type bound) .LetG= (V,E)be a graph with adjacency eigen-\nvaluesλ1≥λ2≥ ··· ≥ λnand adjacency matrix A. Letp∈Rt[x]with corresponding\nparameters W(p) := max u∈V{(p(A))uu}andw(p) := min u∈V{(p(A))uu}. Then, the (t+1)-\nequidistant number of Gsatisfies the bound\neqt+1(G)≤min{|{i:p(λi)≥w(p)}|,|{i:p(λi)≤W(p)}|}.\nProof.Use Lemma 7, and then bound αtwith [1, Theorem 3.1].\nThe implementation of the Inertial-type bound from Proposition 13 u sing Mixed In-\nteger Linear Programming (MILP) is analogous to the MILP for the s ame bound for αt\n[2]. More details can be found in Section 5.1 of the Appendix.\nProposition14 (Ratio-typebound) .Lett≥1andletGbe a regular graphwith nvertices\nand adjacency eigenvalues λ1≥λ2≥ ··· ≥ λnand adjacency matrix A. Letp∈Rt[x]\nwith corresponding parameters W(p) := max u∈V{(p(A))uu}andλ(p) := min i∈[2,n]{p(λi)},\nand assume p(λ1)> λ(p). Then\neqt+1(G)≤nW(p)−λ(p)\np(λ1)−λ(p).\n9Proof.Use Lemma 7, and then bound αtwith [1, Theorem 3.2].\nMore details on the MILP implementation of this Ratio-type bound can be found in\nSection 5.2 from the Appendix.\nFortheoriginalRatio-typeboundon αt[1, Theorem3.2], thebest choiceofpolynomial\nis known for α2[1, Corollary 3.3] and α3[17]. These polynomials are also the best choice\nfor bounding eq3and eq4respectively. This follows because in Proposition 14 we directly\napply the bound from αt. If a different polynomial were to give a better bound on eqt+1,\nthen it must automatically also give a better bound on αt−1, a contradiction. Thus we\nobtain the following two straight forward corollaries.\nCorollary 15 (Best Ratio-type bound, t= 3).LetGbe ak-regular graph with nvertices\nwith distinct adjacency eigenvalues k=θ0> θ1>···> θdwithd≥2. Letθibe the\nlargest eigenvalue such that θi≤ −1. Then, using p(x) =x2−(θi+θi−1)xin Proposition\n14 gives the following bound:\neq3(G)≤nθ0+θiθi−1\n(θ0−θi)(θ0−θi−1).\nThis is the best possible bound for t= 3that can be obtained from Proposition 14.\nCorollary 16 (Best Ratio-type bound, t= 4).LetGbe ak-regular graph with nvertices\nwith distinct adjacency eigenvalues k=θ0> θ1>···> θd, withd≥3. Letθsbe\nthe largest eigenvalue such that θs≤ −θ2\n0+θ0θd−∆3\nθ0(θd+1), where∆3= max u∈V{(A3)uu}. Let\nb=−(θs+θs−1+θd)andc=θdθs+θdθs−1+θsθs−1. Then, using p(x) =x3+bx2+cx\nin Proposition 14 gives the following bound:\neq4(G)≤n∆3−θ0(θs+θs−1+θd)−θsθs−1θd\n(θ0−θs)(θ0−θs−1)(θ0−θd).\nThis is the best possible bound for t= 4that can be obtained from Proposition 14.\nIn the Appendix we will illustrate the tightness of the Ratio-type bou nd from Propo-\nsition 14.\nNext we show that the bounds from Corollaries 15 and 16 are tight fo r certain John-\nson graphs. A Johnson graph , denoted J(n,k), is a graph where the vertices represent\nthek-element subsets of a set of size n. Two vertices are adjacent if and only if their\ncorresponding subsets differ by exactly 1 element. The graph J(n,k) has/parenleftbign\nk/parenrightbig\nvertices and\neigenvalues {(k−j)(n−k−j)−j:j∈[0,min{k,n−k}]}.\nProposition 17. The bound from Corollary 15 is tight for the Johnson graphs J(n,3),\nn >6, and the bound from Corollary 16 is tight for the Johnson grap hsJ(n,4),n >8.\nProof.First, we will determine the exact value of eqk(J(n,k)) (note that we use eqkhere\ninsteadofeqttohighlightthefactthatitmatchesthe kfromJ(n,k)). Usingthe k-element\nsubset representation of the vertices, we find a set U⊂V(J(n,k)) is ak-equidistant set\nif and only if the subsets are disjoint. From this we find eqk(J(n,k)) =/floorleftbign\nk/floorrightbig\n.\n10Nowwewillshowourboundsmeetthisexactvalue. For J(n,3)wehavetheeigenvalues\n(θ0,θ1,θ2,θ3) = (3n−9,2n−9,n−7,−3). Since n >6, we find θ3is thelargest eigenvalues\nless than −1. By plugging these values into the bound from Corollary 15 we obtain\neq3(J(n,3))≤n\n3,\nwhich of course can be rounded down to/floorleftbign\n3/floorrightbig\n, since eq3is an integer.\nNow we move on to the case eq4(J(n,4)). Here we have eigenvalues ( θ0,θ1,θ2,θ3,θ4) =\n(4n−16,3n−16,2n−8,n−10,−4). Further, we have ∆ 3=k(n−k)(n−2), which can\nbe obtained by a simple counting argument. For Corollary 16 we find θsis the largest\neigenvalues less than n−6. Since n >8, we find θs=θ3=n−10. By plugging these\nvalues into the bound from Corollary 16 we obtain\neq4(J(n,4))≤n\n4,\nwhich can be rounded down to/floorleftbign\n4/floorrightbig\n, since eq4is an integer.\nWe can also make use of the relation eqt(G) =ω(G[♯t]) to extend a bound on the clique\nnumber by Haemers [15, Theorem 3.5].\nProposition 18. [15, Theorem 3.5] Let Gbe a regular graph with adjacency eigenvalues\nλ1≥ ··· ≥λn. Then the clique number of Gsatisfies:\nω(G)≤n1+λ2\nn−λ1+λ2.\nProposition 19. LetGbe a graph such that its exact distance t-power,G[♯t]is regular.\nLetG[♯t]have adjacency eigenvalues β1≥ ··· ≥βn. Then the t-equidistant number of G\nsatisfies\neqt(G)≤n1+β2\nn−β1+β2.\nProof.Apply Proposition 18 to G[♯t], then use the fact that eqt(G) =ω(G[♯t]).\nAnother parameter that Haemers [13] looked at is Φ( G). LetA,B⊂V(G), thenA\nandBare called disconnected if there is no edge between AandB. The quantity Φ( G)\nis defined as the maximum of/radicalbig\n|A||B|whereA,Bare disjoint and disconnected. We can\nrelate Φ( G) to thet-equidistant number and apply [13, Theorem 2.4] to obtain a bound\non eqt(G). First, we state the original bound on Φ( G):\nProposition 20. [13, Theorem 2.4] Let Gbe a graph with Laplacian eigenvalues µ1≤\n··· ≤µn, then\nΦ(G)≤n\n2/parenleftbigg\n1−µ2\nµn/parenrightbigg\n.\n11Proposition 21. LetGbe a graph, and let µ1≤ ··· ≤µnbe the Laplacian eigenvalues\nofG[♯t]. Then\neqt(G)≤n/parenleftbigg\n1−µ2\nµn/parenrightbigg\n+1.\nProof.LetUbe at-equidistant set of size eqt(G). Then, in G[♯t], any two vertices in U\nwill not be adjacent. Hence, if we split UintoU1,U2, such that |Ui| ≥eqt(G)−1\n2, then\nU1,U2are disconnected, and hence\neqt(G)−1\n2≤/radicalbig\n|U1||U2| ≤Φ(G[♯t]).\nFinally, apply Proposition 20 to G[♯t]to obtain the desired bound.\nIt is of interest to investigate how well these bounds induced from t he different pa-\nrameters perform in practice, especially in view of the results from S ection 3 which tell us\nthe gap between αt−1and eqtcan grow very large. For this reason, it is worth considering\nan alternative and more direct approach to derive eigenvalue bound s. Instead of using\ninterlacing on the adjacency matrix (as we did to derive Propositions 13 and 14), in the\nfollowing result (and its corollaries in the next section) we apply the int erlacing method to\nthe distance matrix of a graph. This makes sense, as the adjacenc y eigenvalue interlacing\nmay not fully capture the properties of an equidistant set, wherea s the distance matrix\nmight. While eigenvalue interlacing using the adjacency matrix is a widely used tool, the\ndistance matrix is much less studied when it comes to using eigenvalue in terlacing for\nbounding graph parameters.\nTheorem 22. LetGbe a graph, and let Dbe its distance matrix, with eigenvalues ˜λ1≥\n··· ≥˜λn. Then the t-equidistant number satisfies:\neqt(G)≤/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −t/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1.\nProof.Assume eqt≥2, else the result is trivial. Let Ube at-equidistant set of size eqt.\nThen, we can label the vertices in such a way that Dhas principal eqt×eqtsubmatrix:\nB=t(J−I),\nwhereJis the all 1 matrix and Ithe identity matrix, both of appropriate size. Bhas\nspectrum {(t(eqt−1))[1],(−t)[eqt−1]}. Cauchy interlacing then tells us:\n˜λn−eqt+i≤ −tfori∈[2,eqt].\nHence, we must have at least eqt−1 eigenvalues less than −t, meaning\neqt≤/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −t/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1.\n124.2 Bounds on eq\nUsing the bound on eqtfrom Theorem 22, we can obtain a bound on eq, captured in the\nfollowing corollary.\nCorollary 23. LetGbe a graph, and let Dbe its distance matrix, with eigenvalues\n˜λ1≥ ··· ≥˜λn. Then the equidistant number satisfies:\neq(G)≤/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −1/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1.\nProof.By Theorem 22 we have\neqt(G)≤/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −t/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1≤/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −1/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1\nfor allt. Hence, eq( G) will also be bounded by the above.\nAninteresting consequence ofTheorem 22, isthatifwe knowthebo undfromTheorem\n22 is tight for some t∗, then we can reduce the number of values for tthat need to be\nconsidered when determining eq. This is illustrated in the following resu lt.\nCorollary 24. LetGbe a graph, and let Dbe its distance matrix, with eigenvalues\n˜λ1≥ ··· ≥˜λn. Then, if there exists a t∗∈[1,D(G)]such that\neqt∗=/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −t∗/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1,\nthen\neq(G) = max{eqt(G) : 1≤t≤t∗}.\nProof.Fort > t∗, we have\neqt≤/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −t/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1≤/vextendsingle/vextendsingle/vextendsingle/braceleftBig\ni:˜λi≤ −t∗/bracerightBig/vextendsingle/vextendsingle/vextendsingle+1 = eqt∗.\nHence\neq(G) = max{eqt(G) : 1≤t≤D(G)}= max{eqt(G) : 1≤t≤t∗}.\nFor obtaining the next bound on eq we will use Lemma 5 combined with a b ound on\nαand a bound on ω.\nTheorem 25 (Ratio bound, unpublished, see e.g. [14]) .LetGbe a regular graph with n\nvertices and adjacency eigenvalues λ1≥ ··· ≥ λn. Then the independence number of G\nsatisfies:\nα(G)≤n−λn\nλ1−λn.\nFor bounding ωwe will use the earlier stated result by Haemers (Proposition 18).\nCorollary 26. LetGbe a regular graph with adjacency eigenvalues λ1≥ ··· ≥λn. Then\nthe equidistant number of Gsatisfies:\neq(G)≤n·max/braceleftbigg−λn\nλ1−λn,1+λ2\nn−λ1+λ2/bracerightbigg\n.\nProof.Use Lemma 5, and then bound αandωwith Theorem 25 and Proposition 18,\nrespectively.\n134.3 Bounds performance\nFinally, using a computational approach, we investigate the tightne ss of our bounds, how\nthey compare with each other and with the previous bound from Pro position 12. The\nresults can be found in the Appendix 5.3.\nIn Tables 1 and 2, the performance of the distance spectrum boun d on eqt(Theorem\n22) is compared to the performance of the induced adjacency spe ctrum bounds from αt\n(Propositions 13 and 14) and the induced spectral bounds from ωand Φ (Propositions 19\nand 21) for t= 2,3, respectively. In Table 3 the performance of the distance spect rum\nbound on eq (Corollary 23) is compared to the performance of the in duced adjacency\nspectrum bound from αandω(Corollary 26). These bounds were computed using Sage-\nMath.\nIn these three tables, a graph name is in boldface when at least one o f the new bounds\nis tight. Note that while Proposition 21 is only tight for trivial cases in T ables 1 and 2,\nwe have found several smaller graphs for which Proposition 21 gives a non-trivial tight\nbound.\nAcknowledgements\nThe authors thank James Tuite for bringing the equidistant number to their attention,\nand Sjanne Zeijlemaker for her help with the MILP from Section 5.2. A ida Abiad is\nsupported by the Dutch Research Council through the grant VI.V idi.213.085.\nReferences\n[1] A. Abiad, G. Coutinho, and M. Fiol. On the k-independence number of graphs.\nDiscrete Mathematics 342(10):2875–2885, 2019.\n[2] A. Abiad, G. Coutinho, M. A. Fiol, B. D. Nogueira, S. Zeijlemaker. O ptimization\nof eigenvalue bounds for the independence and chromatic number o f graph powers.\nDiscrete Mathematics 345(3):112706, 2022.\n[3] A. Abiad, A.P. Khramova, A. Ravagnani. Eigenvalue Bounds for Su m-Rank-Metric\nCodes.IEEE Transactions on Information Theory , to appear, 2024.\n[4] A. Azimi, G. M. Farrokhi Derakhshandeh Ghouchan. Self 2-dista nce graphs. Cana-\ndian Mathematical Bulletin 60:26–42, 2017.\n[5] G.T. Bogdanova, V.A. Zinoviev, T.J. Todorov. On the constructio n ofq-ary equidis-\ntant codes. Problems of Information Transmission 43(4):280–302, 2007.\n[6] B. Breˇ sar, N. Gastineau, S. Klavˇ zar, O. Togni. Exact distanc e graphs of product\ngraphs.Graphs and Combinatorics 35:1555–1569, 2019.\n14[7] Z.A. Chernyak, A.A. Chernyak. About recognizing ( α,β)-classes of polar graphs.\nDiscrete Mathematics 62:133–138, 1986.\n[8] S. Foldes, P.L. Hammer. Split graphs having Dilworth number two. Can. J. Math.\n24(3):666–672, 1977.\n[9] P.L.Hammer, B.Simeone. Thesplittanceofagraph. Combinatorica 1:275–284,1981.\n[10] S. Foldes, P.L. Hammer. Split graphs, in: Proceedings of the 8th South-Eastern Con-\nference on Combinatorics, Graph Theory and Computing , 1977, pp. 311–315.\n[11] F. Foucaud, H. Hocquard, S. Mishra, N. Narayanan, R. Naser asr,´E. Sopena, P. Val-\nicov. Exact square coloring of subcubic planar graphs. Discrete Applied Mathematics\n293:74-89, 2021.\n[12] F. Foucaud, S. Mishra, N. Narayanan, R. Naserasr, P. Valicov . Cliques in exact\ndistance powers of graphs of given maximum degree. Procedia Computer Science\n195:427–436, 2021.\n[13] W.H. Haemers Disconnected Vertex Sets and Equidistant Code P airs.The Electronic\nJournal of Combinatorics 4(1):#R7, 1997\n[14] W.H. Haemers. Hoffman’s ratio bound. Linear Algebra and its Applications 617:215-\n219, 2021.\n[15] W.H. Haemers. Interlacing eigenvalues and graphs. Linear Algebra and its Applica-\ntions226-228:593–616, 1995.\n[16] J.vandenHeuvel, H.A.Kierstead, D.A.Quiroz.Chromaticnumbe rsofexactdistance\ngraphs.Journal of Combinatorial Theory, Series B 134:143–163, 2018.\n[17] L.C. Kavi, M. Newman. The optimal bound on the 3-independence number obtain-\nable from a polynomial-type method. Discrete Mathematics 346(7):113471, 2023.\n[18] R. Koetter and F.R. Kschischang. Coding for errors and erasu res in random network\ncoding.IEEE Transactions on Information Theory 54:3579–3591, 2008.\n[19] X.H. La. 2-distance coloring of sparse graphs. PhD thesis Unive rsit´ e de Montpellier,\n2022.\n[20] Y.-L. Lin, S. Skiena. Algorithms for Square Roots of Graphs. SIAM Journal on\nDiscrete Mathematics 8(1):99–118, 1995.\n[21] J.H. van Lint. A Theorem on Equidistant Codes. Discrete Math 6:353–358, 1973.\n[22] J. Neˇ setˇ ril, P. Ossona de Mendez. Sparsity - Graphs, Struc tures, and Algorithms.\nSpringer, 2012.\n15[23] D.A.Quiroz.Colouringexact distancegraphsofchordal graph s.Dicrete Mathematics\n343(5):111769, 2020.\n[24] N. Raviv, T. Etzion, Distributed storage systems based on equ idistant subspace\ncodes. arXiv:1406.6170\n[25] S.K. Simi´ c. Graph equations for line graphs and n-distance gra phs.Publications de\nl’Institut de Math´ ematiques de Beograd 33(47):203–216, 1983.\n[26] J.Tuit, G.Erskine, V.Taranchuk, C.Tompkins, N.Salia.Equidis tancesetsingraphs.\nIn preparation (private communication), 2024.\n[27] D. Zuckerman. Linear Degree Extractors and the Inapproxim ability of Max Clique\nand Chromatic Number. Theory of Computing 3:103–128, 2007.\n165 Appendix\n5.1 MILP for the Inertial-type bound (Proposition 13)\nBelow is an MILP implementation by Abiad et al. [2] for the Inertial-typ e bound on αt,\nwhich can also be used for finding the best polynomial in Proposition 13 .\nLetG= (V,E) have adjacency matrix Ahaving distinct eigenvalues θ0>···> θd\nwith multiplicities m= (m0,...,m d). Letu∈V, and let p(x) =atxt+···+a0,b=\n(b0,...,b d)∈ {0,1}d+1,M∈Rlarge, and ε∈Rsmall, then we have the following MILP:\nvariables: ( a0...,at),(b0,...,b d)\nparameters: t,M,ε\ninput: For a regular graph G, its adjacency matrix A,\nits spectrum {θm0\n0,...,θmd\nd},a vertex u∈V\noutput: ( a0...,at), the coefficients of a polynomial p\nminimize m⊤b\nsubject tot/summationdisplay\ni=0ai(Ai)vv≥0, v∈V\\{u}\nt/summationdisplay\ni=0ai(Ai)uu= 0\nt/summationdisplay\ni=0aiθi\nj−Mbj+ε≤0, j= 0,...,d\nb∈ {0,1}d+1(3)\nImplementing such an MILP for all u∈Vwill find the best pforG. Note that when the\ngraph is walk-regular, this MILP only needs to be run once.\n175.2 MILP for the Ratio-type bound (Proposition 14)\nThe following MILP can be used to compute the optimal polynomial of P roposition 14.\nLetG= (V,E) have adjacency matrix Aand distinct eigenvalues θ0>···> θd. Then,\nfor some u∈Vandl∈[1,d] we have the MILP:\nvariables: ( a0...,at)\nparameters: t\ninput: For a graph G, its adjacency matrix Aand its spectrum {θ0,...,θ d}.\nA vertex u∈V.Anl∈[1,d]\noutput: ( a0...,at), the coefficients of a polynomial p\nmaximizet/summationdisplay\ni=0aiθi\n0−t/summationdisplay\ni=0aiθi\nl\nsubject tot/summationdisplay\ni=0ai((Ai)vv−(Ai)uu)≤0, v∈V\\{u}\nt/summationdisplay\ni=0ai((Ai)uu−θi\nl) = 1\nt/summationdisplay\ni=0ai(θi\n0−θi\nj)>0, j∈[1,d]\nt/summationdisplay\ni=0ai(θi\nj−θi\nl)≥0, j∈[1,d](4)\nSolving this for all u∈Vandl∈[1,d] yields the best polynomial.\n185.3 The performance of the eigenvalue bounds from Section 4\nGraph Proposition 12 Proposition 13 Proposition 14 Proposi tion 19 Proposition 21 Theorem 22 eq2\nBalaban 10-cage 7 36 35 7 10 37 3\nFrucht graph 7 6 5 - 41 4 3\nMeredith Graph 13 45 34 6 9 40 5\nMoebius-Kantor Graph 7 8 8 11 36 9 4\nBidiakis cube 7 8 5 - 42 4 3\nGosset Graph 703 8 5 7 27 8 4\nBalaban 11-cage 7 59 54 6 6 52 3\nMoser spindle 13 3 - - 54 3 2\nGray graph 7 35 27 7 12 25 3\nNauru Graph 7 14 12 8 27 16 3\nBlanusa First Snark Graph 7 8 8 5 29 7 4\nGrotzsch graph 21 5 - - 47 6 5\nPappus Graph 7 11 9 10 36 7 3\nBlanusa Second Snark Graph 7 8 7 4 27 6 3\nHall-Janko graph 1261 37 10 10 18 37 10\nPoussin Graph 31 6 - - 38 4 4\nBrinkmann graph 13 9 8 8 43 10 5\nHarborth Graph 13 20 20 - 17 15 4\nPerkel Graph 31 20 19 7 21 19 6\nBrouwer-Haemers 381 20 21 21 24 61 15\nHarries Graph 7 35 35 7 9 31 3\nPetersen graph 7 4 4 4 43 6 4\nBucky Ball 7 30 27 5 10 25 3\nHarries-Wong graph 7 35 35 7 9 31 3\nRobertson Graph 13 8 7 9 49 10 7\nHeawood graph 7 7 7 14 36 8 7\nSchl¨ afli graph 241 7 3 3 24 7 3\nHerschel graph 13 7 - - 39 6 6\nShrikhande graph 31 7 4 4 36 7 4\nHigman-Sims graph 463 22 26 26 24 78 22\nHoffman Graph 13 11 8 - 36 8 8\nSousselier Graph 21 6 - - 45 7 5\nClebsch graph 21 5 6 6 36 11 5\nHoffman-Singleton graph 43 21 15 15 36 29 15\nSylvester Graph 21 17 13 9 29 17 5\nCoxeter Graph 7 13 12 4 16 9 3\nHolt graph 13 10 10 5 27 11 4\nSzekeres Snark Graph 7 24 23 5 11 17 4\nDesargues Graph 7 10 10 9 29 6 4\nHorton Graph 7 50 48 7 7 40 4\nThomsen graph 7 5 3 6 36 5 3\nTietze Graph 7 6 5 - 41 6 4\nDouble star snark 7 15 13 5 17 10 3\nKrackhardt Kite Graph 31 4 - - 49 4 3\nDurer graph 7 7 5 - 39 4 3\nKlein 3-regular Graph 7 29 25 4 9 16 3\nTruncated Tetrahedron 7 6 4 3 29 4 3\nDyck graph 7 16 16 8 18 17 3\nKlein 7-regular Graph 43 9 6 6 30 9 6\nTutte 12-Cage 7 77 63 7 5 71 3\nEllingham-Horton 54-graph 7 29 27 7 12 24 4\nTutte-Coxeter graph 7 20 15 8 22 19 3\nEllingham-Horton 78-graph 7 40 39 7 9 30 4\nLjubljana graph 7 63 56 7 6 43 3\nErrera graph 31 7 - - 35 5 4\nWagner Graph 7 3 3 3 45 5 3\nF26A Graph 7 13 13 8 23 7 3\nM22 Graph 241 21 21 21 26 56 21\nFlower Snark 7 10 9 5 27 8 4\nMarkstroem Graph 7 10 10 - 20 7 3\nWells graph 21 13 12 10 36 9 5\nFolkman Graph 13 15 10 - 36 10 10\nWiener-Araya Graph 13 19 - - 17 14 4\nFoster Graph 7 50 45 7 7 42 3\nMcGee graph 7 12 11 5 22 10 3\nHexahedron 7 4 4 8 36 4 4\nDodecahedron 7 11 8 3 22 8 3\nOctahedron 13 4 2 2 24 4 2\nIcosahedron 21 4 3 4 34 4 3\nTable 1: Comparison of eq2bounds for Sage named graphs. Graph names are in bold\nwhen one of the new bounds is tight.\n19Graph Proposition 12 Proposition 13 Proposition 14 Proposi tion 19 Proposition 21 Theorem 22 eq3\nBalaban 10-cage 13 19 17 5 19 28 2\nFrucht graph 13 3 3 - 39 4 3\nMeredith Graph 37 10 14 - 16 15 2\nMoebius-Kantor Graph 13 6 4 3 38 5 2\nBidiakis cube 13 4 3 - 36 4 2\nGosset Graph 18253 8 2 2 3 8 2\nBalaban 11-cage 13 39 27 5 9 52 2\nMoser spindle 37 2 - 1 1 2 1\nGray graph 13 19 11 5 24 7 2\nNauru Graph 13 8 6 4 46 7 2\nBlanusa First Snark Graph 13 4 4 - 31 5 3\nGrotzsch graph 81 1 - 1 1 6 1\nPappus Graph 13 7 3 3 40 7 2\nBlanusa Second Snark Graph 13 4 4 - 29 5 4\nHall-Janko graph 44101 1 1 1 1 37 1\nPoussin Graph 151 4 - - 28 4 2\nBrinkmann graph 37 6 3 3 21 8 3\nHarborth Graph 37 13 10 - 21 12 3\nPerkel Graph 151 18 5 7 16 19 5\nBrouwer-Haemers 7221 1 1 1 1 61 1\nHarries Graph 13 18 17 5 19 27 2\nPetersen graph 13 1 1 1 1 6 1\nBucky Ball 13 16 14 5 11 15 3\nHarries-Wong graph 13 18 17 5 19 27 2\nRobertson Graph 37 5 3 3 15 8 3\nHeawood graph 13 2 2 2 34 8 2\nSchl¨ afli graph 3601 1 1 1 1 7 1\nHerschel graph 37 3 - - 28 4 2\nShrikhande graph 151 1 1 1 1 7 1\nHigman-Sims graph 9703 1 1 1 1 78 1\nHoffman Graph 37 5 2 3 31 5 2\nSousselier Graph 81 5 - - 36 6 3\nClebsch graph 81 1 1 1 1 11 1\nHoffman-Singleton graph 253 1 1 1 1 29 1\nSylvester Graph 81 10 6 6 14 17 6\nCoxeter Graph 13 7 7 7 22 9 7\nHolt graph 37 7 4 4 25 7 3\nSzekeres Snark Graph 13 13 12 - 15 13 2\nDesargues Graph 13 6 5 3 36 5 2\nHorton Graph 13 30 24 - 13 32 2\nThomsen graph 13 1 1 1 1 1 1\nTietze Graph 13 4 3 - 36 6 3\nDouble star snark 13 9 7 6 21 10 4\nKrackhardt Kite Graph 151 4 - - 43 3 2\nDurer graph 13 3 2 - 30 4 2\nKlein 3-regular Graph 13 19 13 6 13 16 3\nTruncated Tetrahedron 13 4 3 3 31 4 3\nDyck graph 13 8 8 4 33 7 2\nKlein 7-regular Graph 253 9 3 3 9 9 3\nTutte 12-Cage 13 44 28 5 10 71 2\nEllingham-Horton 54-graph 13 20 13 - 20 16 2\nTutte-Coxeter graph 13 10 6 4 50 10 2\nEllingham-Horton 78-graph 13 27 19 - 16 26 2\nLjubljana graph 13 35 27 5 11 43 2\nErrera graph 151 4 - - 30 4 2\nWagner Graph 13 1 2 1 1 3 1\nF26A Graph 13 7 6 3 41 7 2\nM22 Graph 3601 1 1 1 1 56 1\nFlower Snark 13 7 5 - 31 6 3\nMarkstroem Graph 13 7 6 - 25 6 3\nWells graph 81 9 3 3 13 9 2\nFolkman Graph 37 5 3 4 36 5 2\nWiener-Araya Graph 37 12 - - 21 10 3\nFoster Graph 13 23 22 5 14 14 2\nMcGee graph 13 7 6 7 36 9 5\nHexahedron 13 2 2 2 18 4 2\nDodecahedron 13 4 4 4 21 4 4\nOctahedron 37 1 1 1 1 1 1\nIcosahedron 81 4 2 2 12 4 2\nTable 2: Comparison of eq3bounds for Sage named graphs. Graph names are in bold\nwhen one of the new bounds is tight.\n20Graph Corollary 23 Corollary 26 eq\nBalaban 10-cage 37 35 9\nFrucht graph 6 5 3\nMeredith Graph 46 34 5\nMoebius-Kantor Graph 9 8 4\nBidiakis cube 7 5 3\nGosset Graph 8 14 7\nBalaban 11-cage 60 54 7\nMoser spindle 5 - 3\nGray graph 31 27 6\nNauru Graph 16 12 4\nBlanusa First Snark Graph 8 8 4\nGrotzsch graph 8 - 5\nPappus Graph 8 9 3\nBlanusa Second Snark Graph 10 7 4\nHall-Janko graph 37 10 10\nPoussin Graph 7 - 4\nBrinkmann graph 12 8 5\nHarborth Graph 24 20 4\nPerkel Graph 19 19 6\nBrouwer-Haemers 61 21 15\nHarries Graph 31 35 10\nPetersen graph 6 4 4\nBucky Ball 28 27 3\nHarries-Wong Graph 31 35 9\nRobertson Graph 11 7 7\nHeawood Graph 8 7 7\nSchl¨ afli Graph 7 9 6\nHerschel graph 6 - 6\nShrikhande Graph 7 4 4\nHigman-Sims Graph 78 26 22\nSims-Gewirtz Graph 36 16 16\nChvatal Graph 9 5 4\nHoffman Graph 9 8 8\nSousselier Graph 7 - 5\nClebsch Graph 11 6 5\nHoffman-Singleton Graph 29 15 15\nSylvester Graph 26 13 6\nCoxeter Graph 16 12 7\nHolt Graph 11 10 4\nSzekeres Snark Graph 21 23 5\nDesargues Graph 6 10 4\nHorton Graph 46 48 4\nThomsen graph 5 3 3\nDejter Graph 8 56 8\nKittell Graph 10 23 4\nTietze Graph 8 5 4\nDouble star snark 14 13 4\nKrackhardt Kite Graph 6 - 4\nDurer Graph 5 5 3\nKlein 3-regular Graph 29 25 7\nTruncated Tetrahedron 9 4 3\nDyck Graph 17 16 4\nKlein 7-regular Graph 9 6 6\nTutte 12-Cage 71 63 9\nEllingham-Horton 54-Graph 26 27 4\nTutte-Coxeter Graph 19 15 5\nEllingham-Horton 78-Graph 37 39 5\nLjubljana Graph 50 56 8\nErrera Graph 9 - 4\nWagner Graph 6 3 3\nF26A Graph 13 13 3\nM22 Graph 56 21 21\nFlower Snark 12 9 4\nMarkstroem Graph 12 10 3\nWells Graph 9 12 5\nFolkman Graph 11 10 10\nWiener-Araya Graph 19 - 4\nFoster Graph 42 45 5\nMcGee Graph 12 11 5\nFranklin Graph 7 6 6\nHexahedron 4 4 4\nDodecahedron 8 8 4\nOctahedron 4 3 3\nIcosahedron 4 4 3\nTable 3: Comparison of eq bounds for Sage named graphs. Graph na mes are in bold\nwhen one of the new bounds is tight.\n21" }, { "title": "2402.00215v1.Schrödinger_Operators_with_Potentials_Generated_by_Hyperbolic_Transformations__II__Large_Deviations_and_Anderson_Localization.pdf", "content": "arXiv:2402.00215v1 [math.SP] 31 Jan 2024SCHR¨ODINGER OPERATORS WITH POTENTIALS\nGENERATED BY HYPERBOLIC TRANSFORMATIONS:\nII. LARGE DEVIATIONS AND ANDERSON LOCALIZATION\nARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nAbstract. We consider discrete one-dimensional Schr¨ odinger operat ors\nwhose potentials are generated by H¨ older continuous sampl ing along the orbits\nof a uniformly hyperbolic transformation. For any ergodic m easure satisfying\na suitable bounded distortion property, we establish a unif orm large deviation\nestimate in a large energy region provided that the sampling function is locally\nconstant or has small supremum norm. We also prove full spect ral Anderson\nlocalization for the operators in question.\nContents\n1. Introduction 1\n2. The Setting and the Main Results 3\n2.1. The Base Dynamical System 3\n2.2. Measures With the Bounded Distortion Property 4\n2.3. The Associated Operator Family 6\n2.4. The Main Results 7\n3. Large Deviation Estimates – Proof of Theorem 2.10 10\n3.1. Stable and Unstable Holonomies 10\n3.2. Reduction of the Uniform LDT 11\n3.3. Proof of Theorem 3.6 14\n4. Establishing Localization – Proof of Theorem 2.12 22\n4.1. Bounding the Green Function 23\n4.2. Elimination of Double Resonances 30\n5. Applications – Proof of Corollaries 2.14 and 2.15 34\nReferences 35\n1.Introduction\nIt is a well-known phenomenon that the one-dimensional Anderson m odel is\nlocalized throughout the spectrum. Given a compactly supported p robability mea-\nsureνonR, the Anderson model is given by the discrete Schr¨ odinger operat or on\nℓ2(Z), acting as\n(1) [ Hωψ](n) =ψ(n+1)+ψ(n−1)+Vω(n)ψ(n),\nD. D. was supported in part by NSF grants DMS–1700131 and DMS– 2054752.\nZ. Z. was supported in part by NSF grant DMS–1764154.\n12 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nwhere the random potential Vω(n) is given by independent random variables,\neach distributed according to ν. Formally this can be modeled by consider-\ning the compact product Ω = (supp ν)Z, the shift transformation T: Ω→Ω,\n[Tω](n) =ω(n+1), and the T-ergodic measure µ=νZon Ω, as the potential can\nthen be written in the form of a dynamically defined potential in the se nse of [DF],\n(2) Vω(n) =f(Tnω),\nwhere the sampling function f: Ω→Ris given by the evaluation at the origin,\n(3) f(ω) =ω(0).\nThe localization statement for the operator family {Hω}ω∈Ωtypically takes two\nforms. Spectral localization means that for µ-almost every ω∈Ω, the operator\nHωhas pure point spectrum with exponentially decaying eigenfunctions . Dynami-\ncal localization means that the unitary group associated with Hωhas exponential\noff-diagonal decay relative to the standard orthonormal basis {δn}n∈Zofℓ2(Z) uni-\nformly in time, either in an almost sure sense or in expectation with res pect toµ.\nSpectral localization and dynamical localization are not equivalent fo r general\noperators, but they both hold for the Anderson model. Proving th ese localization\nstatements for the Anderson model is most difficult in the case of a s ingular single-\nsite distribution, for example the Bernoulli case, where supp νhas cardinality 2.\nIn fact it is true that the Bernoulli case is the most difficult case to ha ndle, as\nany localization proof that covers the Bernoulli case will also cover t he general\ncase. We refer the reader to [CKM] for the first proof of spectra l localization in\nthe Bernoulli case and to [BDF+, GZ, GK, JZ] for recent treatment s of this model,\nwhich establish both spectral and dynamical localization and are simp ler and more\nconceptual (in that they rely on one-dimensional tools, rather th an verifying the\ninput necessary to run a multi-scale analysis).\nGiven this state of affairs, one might say that the one-dimensional A nderson\nmodel is completely understood. Under the hood, however, all the proofs rely\ncrucially on the independence of the potential values, and hence on ly apply to\nthe special choice (3) of the sampling function f. From the perspective of the\ngeneral theory of ergodic Schr¨ odinger operators in ℓ2(Z), [DF], it is natural to ask\nwhether localization extends to more general choices of f. Indeed, this should even\nbe expected to be the case, based on the heuristics of the situatio n. Alas, prior\nto the present work, such an extension was well outside the scope of the existing\napproaches. One could arguethat it is the independence ofthe und erlyingentries of\nωthat is responsible for localization phenomena, as long as the sampling function is\nstill sufficiently “local” in the sense that the values of f(ω) should be most heavily\ninfluenced by the values of ωnfornnot too large. Of course this will be true for any\ncontinuous sampling function f: Ω→R, but upon closer inspection, quantitative\ncontinuity properties of fbecome relevant, as many exotic spectral phenomena\nturn out to occur for a generic continuous sampling function.\nAs a very specific example of interest, consider the case of locally co nstantf∈\nC(Ω,R), which are those for which f(ω) only depends on the values of ωnin a fixed\nfinite range of n’s. The localization problem for the associated operators {Hω}ω∈Ω\nwas previously inaccessible, but it will be fully covered by our work.\nThe approach to proving localization developed in the current series of papers\napplies to a much larger class of models. This is relevant as this class inc ludes\nadditionalspecific examplesofinterest that areformallydistinct fr om the AndersonANDERSON LOCALIZATION 3\nmodel, but share the feature that is crucial to our method, namely the fact that\nthe underlying ergodic base dynamical system (Ω ,T,µ) is a subshift of finite type\nwith the ergodic measure having the bounded distortion property. We will give\nprecise definitions in Section 2 but mention here that this allows us to e stablish\na localization result throughout the entire spectrum for Arnold’s ca t map. For\nthis particular example, there was only the previous work [BS] that h ad to exclude\nenergy intervals of positive length from consideration.\nThe general structure of our localization proof follows the outline o f previous\nworks (e.g., [B, BG, BS]):\n(i) Establish the positivity of the Lyapunov exponent, L(E), for sufficiently\nmany energies (i.e., the exceptional set {E:L(E) = 0}should be shown to\nbe discrete).\n(ii) Prove large deviation estimates for the Lyapunov exponent.\n(iii) Eliminate double resonances.\nItem (i) was addressed in part I of this series [ADZ]. In the present follow-up\nwork we address items (ii) and (iii).\nTo summarize, together with part I of the series, [ADZ], the presen t paper suc-\nceeds in establishing spectral and dynamical localization for Schr¨ o dinger operators\nthat were expected to share these features with the Anderson m odel, but were\nstructurally so different from it that previous methods were insuffic ient to make\nprogress towards results of this kind.\nWe give precise definitions and statements of our results in Section 2 . As we can\nquotepositivityresultsforthe Lyapunovexponentfrom[ADZ], wen eed toestablish\nlarge deviation estimates and eliminate double resonances, which the n completes\nthe proof of localization. We do the former in Section 3 and the latter in Section 4.\nFinally, we discuss applications to concrete examples in Section 5.\n2.The Setting and the Main Results\n2.1.The Base Dynamical System. LetA={1,2,...,ℓ}withℓ≥2beequipped\nwith the discrete topology. Consider the product space AZ, whose topology is\ngenerated by the cylinder sets, which are the sets of the form\n[n;j0,···,jk] ={ω∈ AZ:ωn+i=ji,0≤i≤k}\nwithn∈Zandj0,...,j k∈ A. The topology is metrizable and for definiteness we\nfix the following metric on AZ. Set\nN(ω,˜ω) = max{N≥0 :ωn= ˜ωnfor all|n|n+kand [n;j0,...,j k]∩[l;,i0,...,is]/\\⌉}atio\\slash=∅, we have\n(6) C−1≤µ([n;j0,...,j k]∩[l;i0,...,is])\nµ([n;j0,...,j k])·µ([l;i0,...,is])≤C.\nThe bounded distortion property implies local product structure; see, for exam-\nple, [ADZ, Section 2.1]. Equilibrium states of H¨ older continuous poten tials have\nthe bounded distortion property; compare, for example, [ADZ, Le mma 3.4]. It is\na standard result that if an invariant measure µof aC2transitive Anosov diffeo-\nmorphism (or a C2transitive, uniformly expanding map) is absolutely continuous\nwith respect to the volume measure, then it is an equilibrium state of a H¨ older\ncontinuous potential; see, for example, [B]. In particular, it include s hyperbolic\nendomorphisms on the d-dimensional torus, for all d≥1, such as the doubling map\nonR/Zor Arnold’s cat map on ( R/Z)2, where the ergodic measure is simply taken\nto be the Lebesgue measure . It is alsowell-known that Markovchain s with Markov\nmeasures have locally constant potentials, which are clearly H¨ older continuous.\nRecall that (Ω ,T) istopologically mixing if for any pair of nonempty open sets\nU,V⊂Ω, there is an N≥1 such that Tn(U)∩V/\\⌉}atio\\slash=∅for alln≥N. Following\n[ADZ, Section 2.1.4], we can assume without loss of generality that (Ω ,T) is topo-\nlogically mixing in Section 3. Concretely, by the spectral decompositio n theorem\nfor hyperbolic basic sets, we can decompose Ω as Ω =/unionsqtexts\nl=1Ω(l)for somes≥1\nand for closed subsets Ω(l), so that the following holds true: T(Ω(l)) = Ω(l+1)for\n1≤l\n0 for some 1 ≤l≤simplies that L(A,µ)>0. Moreover, large deviation estimates\non each (Ts,Ω(l),µ(l)) imply large deviation estimates on ( T,Ω,µ) as follows. For\nn≥1, we may write n=sk+rfor some 0 ≤r0, there is a n0=n0(ε,Γ) such that for all n≥n0, we have\n/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnlog/bar⌈blAn(ω)/bar⌈bl−1\nkslog/bar⌈blAks(ω)/bar⌈bl/vextendsingle/vextendsingle/vextendsingle/vextendsingle<ε\n2.\nIn particular, we have\n/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnlog/bar⌈blAn(ω)/bar⌈bl−L(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε⇒/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nklog/bar⌈blAks(ω)/bar⌈bl−sL(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>s\n2ε,\nwhich implies for all n≥n0that\n/braceleftbigg\nω:/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnlog/bar⌈blAn(ω)/bar⌈bl−L(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε/bracerightbigg\n⊂s/uniondisplay\nl=1/braceleftbigg\nω∈Ω(l):/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nklog/bar⌈blAks(ω)/bar⌈bl−sL(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>s\n2ε/bracerightbigg\n.6 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nExponential decay of the measure of the set at the right side abov e is clearly a\ndirect consequence of the LDT of ( Ts,As) on each (Ts,Ω(l),µ(l)).\nThe main consequence of topological mixing that we will use is the follow ing.\nThere isr0∈Z+so that for all [ k;j0,...,j n]⊂Ω and all [l;i0,...,im]∈Ω, where\nl−(k+n)≥r0, we have\n(7) [ k;j0,...,j n]∩[l;i0,...,im]/\\⌉}atio\\slash=∅.\n(7) could be an easy consequence of the specification property of such systems; see,\nfor example, [ADZ, Proposition 2.7]. In Section 3, for our (Ω ,T,µ), we letr0be a\nnumber satisfying (7), which will be used in the proof of Lemma 3.7.\n2.3.The Associated Operator Family. In this paper, we are mainly con-\ncerned with the Anderson localization phenomenon for one-dimensio nal discrete\nSchr¨ odinger operators Hωinℓ2(Z) acting by\n(8) [ Hωu](n) =u(n+1)+u(n−1)+Vω(n)u(n).\nHere we assume Ω to be any compact metric space, T: Ω→Ω a homeomorphism,\nandf: Ω→Rcontinuous. We consider potentials Vω:Z→Rdefined by\nVω(n) =f(Tnω) forω∈Ω andn∈Z. Let\nσ(Hω) ={E:Hω−Edoes not have a bounded inverse }\nbe the spectrum of Hω. Choose a T-ergodic measure µ. Then there is a com-\npact set Σ such that σ(Hω) = Σ for µ-a.e.ω. We say that Hωhas (spectral)\nAnderson localization if it has pure point spectrum with exponentially decaying\neigenfunctions.\nA continuous map A: Ω→SL(2,R) gives rise to the cocycle ( T,A) : Ω×R2→\nΩ×R2, (ω,v)/ma√sto→(Tω,A(ω)v). Forn∈Z, we let (T,A)n= (Tn,An). In particular,\nwe have\n(9) An(ω) =\n\nA(Tn−1ω)···A(ω), n≥1;\nI2, n = 0;\n[A−n(Tnω)]−1, n ≤ −1,\nwhereI2is the identity matrix. The Lyapunov exponent is given by\nL(A,µ) = lim\nn→∞1\nn/integraldisplay\nlog/bar⌈blAn(ω)/bar⌈bldµ(ω)\n= inf\nn≥11\nn/integraldisplay\nlog/bar⌈blAn(ω)/bar⌈bldµ(ω)≥0.\nBy Kingman’s subaddive ergodic theorem, we have\nlim\nn→∞1\nnlog/bar⌈blAn(ω)/bar⌈bl=L(A,µ)\nforµ-a.e.ω. By linearity and invertibility of each A(ω), we can projectivize the\nsecond component and consider ( T,A) : Ω×RP1→Ω×RP1.\nSpectral properties of the operators Hωcan be investigated in terms of the\nbehavior of the solutions to the difference equation\n(10) u(n+1)+u(n−1)+Vω(n)u(n) =Eu(n), n∈Z,ANDERSON LOCALIZATION 7\nwithE∈R. These solutions in turn can be described with the help of the\nSchr¨ odingercocycle ( T,AE) with the cocycle map AE: Ω→SL(2,R) being defined\nas\nAE(ω) =A(E−f)(ω) :=/parenleftbiggE−f(ω)−1\n1 0/parenrightbigg\n,\nwhere we often leave the dependence on f: Ω→Rimplicit as it will be fixed\nmost of the time. Such cocycles describe the transfer matrices as sociated with\nSchr¨ odinger operators with dynamically defined potentials. Specifi cally,usolves\n(10) if and only if\n/parenleftbigg\nu(n)\nu(n−1)/parenrightbigg\n=AE\nn(ω)/parenleftbigg\nu(0)\nu(−1)/parenrightbigg\n, n∈Z.\nWe setL(E) =L(AE,µ) and let Zf={E:L(E) = 0}.\n2.4.The Main Results. As mentioned in the introduction, there are two key\ningredients to a localization proof – positivity of the Lyapunov expon ent and large\ndeviation estimates. Let us formulate precisely the two statement s that are needed.\nDefinition 2.4. LetI⊂R. We sayAEhas PLE on Iif\ninf\nE∈IL(E)>0.\nWe sayAEhas ULD on Iif for every ε>0, there are constants C,c>0, depending\nonly onεandf, such that it for all E∈Iandn≥1, we have\nµ/braceleftbig\nω∈Ω :/vextendsingle/vextendsingle1\nnlog/bar⌈blAE\nn(ω)/bar⌈bl−L(E)/vextendsingle/vextendsingle>ε/bracerightbig\n0, we have PLE on\n(12) Jη:=J\\B(Ff,η),\nwhich consists of a finite number of connected compact intervals. H ere,B(Ff,η)\ndenotes the open η-neighborhood of Ff.\nThe first main result of the present paper addresses the ULD prop erty:\nTheorem 2.10. LetΩbe a subshift of finite type and µbe aT-ergodic measure\nthat has the bounded distortion property. Assume that Thas a fixed point. Let\nf∈LC∪SHbe nonconstant. Then there is a connected compact interval J⊃Σf\nsuch thatAEsatisfies ULDonJηfor allη>0.\nRemark 2.11. Large deviation estimates in similar contexts were previously ob-\ntained by several authors, see for example [DKP, GS, PP]. In partic ular, [DKP]\nproved a local uniform version, which enabled them to obtain H¨ older continuity\nof the Lyapunov exponent. However, they all assumed certain ty pical conditions\nof the cocycles that were first introduced by [BGV, BV], while in the co ntext of\nTheorem 2.10, we do not necessarily have these typical conditions f orAE,E∈Jη.\nIndeed, typical conditions were used in [BGV, BV] to prove positivity of the Lya-\npunov exponent (or simplicity of the Lyapunov spectrum in case of h igher dimen-\nsional cocycles), whereas the proof of positivity of the Lyapunov exponent on Jηin\n[ADZ] does not use any perturbation argument. What [ADZ] uses ins tead is a cer-\ntain analyticity argument together with certain aspects of inverse spectral theory.\nIn fact, Theorem 2.10 is stronger than the previous results in the s ense that the\ntypical conditions of [BGV, BV] imply the uniqueness of the u-state, which is the\ncondition needed to prove our ULD. Although we do not pursue a loca l uniform\nversion of LDT in the space of Cα(Ω,SL(2,R)), our proof does imply that without\nany extra work since uniformity is a direct consequence of the uniqu eness of the u-\nstate. We refer the reader to Section 3.1 for a more detailed descr iption. Moreover,\nour techniques, which are different from those of the previous wor ks, can be further\ndeveloped to obtain stronger results concerning ULD which we shall explore in the\nthird paper of this series.ANDERSON LOCALIZATION 9\nOur second main result deduces localization from PLE and ULD:\nTheorem 2.12. LetΩbe a subshift of finite type and µbe aT-ergodic measure that\nsatisfies the bounded distortion property. Let f∈Cα(Ω,R). LetI⊂Ron which\nwe have PLEandULD. Then,Hωhas spectral localization on Iforµ-almost every\nω∈Ω.\nRemark 2.13. In fact, our proof implies exponential dynamical localization of Hω\nonIforµ-a.e.ωwhich is known to be stronger than the spectral localization. More\nconcretely, for any µ-a.e.ω, allε >0, and 0< β < γ = infE∈IL(E), there is a\nconstant/tildewideC=/tildewideCω,β,ε>0 such that\n(13) sup\nt∈R|/a\\}brack⌉tl⌉{tδn,e−itHωPI,ωδm/a\\}brack⌉tri}ht| ≤/tildewideCeǫ|m|e−β|n−m|\nfor allm,n∈Z, wherePI,ωdenotes the spectral projection of HωtoI.\nCorollaries 2.14 and 2.15 below are direct consequences of Theorems 2.10\nand 2.12. We state them separately to facilitate reference to one o f them.\nCorollary 2.14. Let(Ω,µ)be as in Theorem 2.10. If f∈LCis nonconstant, then\nforµ-almost every ω∈Ω,Hωhas full spectral localization.\nCorollary 2.15. Let(Ω,µ)be as in Theorem 2.10. If f∈SHis nonconstant, then\nforµ-almost every ω∈Ω,Hωhas full spectral localization.\nIn the same spirit, for ease of reference, let us formulate the follo wing sample\napplications to specific base dynamics.\nCorollary 2.16. ConsiderT: (R/Z)m→(R/Z)mwhereTis the doubling map\nifm= 1or Arnold’s cat map if m= 2. Letµbe the Lebesgue measure. Let\nf: (R/Z)m→Rbe H¨ older continuous and nonconstant, and consider the pot entials\ngiven byVω(n) =λf(Tnω). Then there is a λ0>0such that for all 0< λ≤λ0,\nHωhas full spectral localization for µ-a.e.ω∈(R/Z)m.\nCorollary 2.17. Let(Ω,T,µ)be a Markov chain with a Markov measure µ. Sup-\nposeThas a fixed point and f∈LCis nonconstant. Consider the potentials given\nbyVω(n) =λf(Tnω). Then for all λ>0,Hωhas full spectral localization for µ-a.e.\nω.\nRemark 2.18. We wish to point out that according to Definition 2.9 in Corol-\nlary 2.15,f∈SH simply means f∈Cα(Ω,R) and/bar⌈blf/bar⌈bl∞≤λ0, where\nλ0=(eα\n2−1)2\n9.\nBut in Corollary 2.16 the λ0might be different due to the coding process that\nconverts the smooth hyperbolic systems to their corresponding s ubshifts of finite\ntype. Take the doubling map for example, by [ADZ, Remark 7.4] we may choose\nλ0to be\nλ0=(2α\n2−1)2\n9.\nIn any case, λ0is not too small if αis not small.\nRemark 2.19. Corollary 2.17 covers in particular our initial motivating example\nfrom the introduction: for the Bernoulli shift with the Bernoulli mea sure, any\nnonconstant locally constant sampling function will produce an oper ator family10 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nthat is almost surely spectrally localized throughout the spectrum. One should\nremark, though, that dynamical localization will only hold away from a discrete set\nof exceptional energies. There are examples where such energies are indeed present\nand may produce transport at a rate that is understood; compar e [ADZ, DT1,\nDT2, JS, JSS] for relevant discussions of this phenomenon. We also emphasize that\nCorollary 2.16 fully covers the main results of [BS] and fills in the energy intervals\non which [BS] was inconclusive regarding the localization statement.\n3.Large Deviation Estimates – Proof of Theorem 2.10\nIn this section, we prove Theorem 2.10. Thus, we focus on sampling f unctions\nf∈LC orf∈SH. For simplicity, we denote the projectivized action of B∈\nSL(2,R) onRP1byB·v,v∈RP1.\n3.1.Stable and Unstable Holonomies. Let us recall the following central con-\ncept.\nDefinition 3.1. Astable holonomy hsfor a continuous A: Ω→SL(2,R) is a\nfamily of matrices\n{hs\nω,ω′∈SL(2,R) :ω∈Ω,ω′∈Ws\nloc(ω)},\nsuch that\n(i)hs\nω′,ω′′hs\nω,ω′=hs\nω,ω′′andhs\nω,ω= id,\n(ii)A(ω′)hs\nω,ω′=hs\nTω,Tω′A(ω),\n(iii) (ω,ω′)/ma√sto→hs\nω,ω′is uniformly continuous for all ω∈Ω and allω′∈Wu\nloc(ω).\nAnunstable holonomy {hu\nω,ω′:ω∈Ω,ω′∈Wu\nloc(ω)}forAis a stable holonomy for\nA−1overT−1.\nIfAis locally constant or fiber bunched, then it is a standard result (see e.g.\nthe proof of [ADZ, Lemma 4.1]) that the stable and unstable holonomie s can be\ndefined as\n(14)Hs\nω,ω′= lim\nn→∞An(ω′)−1An(ω), Hu\nω,ω′= lim\nn→∞A−n(ω′)−1A−n(ω)\nforω,ω′in the same stable and unstable sets, respectively. Moreover, the con-\nvergence is uniform for all ω∈Ω and allω′∈Ws\nloc(ω) and allω′∈Wu\nloc(ω),\nrespectively. The properties (i)–(iii) for Hs\nω,ω′,Hu\nω,ω′follow directly from the con-\nstruction. Holonomies that arise from (14) are called canonical holonomies ofA.\nDefinition 3.2. Suppose we are given a ( T,A)-invariant probability measure m\non Ω×RP1that projects to µin the first component. A disintegration ofmalong\nthe fibers is a measurable family {mω:ω∈Ω}of conditional probability measures\nonRP1such thatm=/integraltext\nmωdµ(ω), that is,\nm(D) =/integraldisplay\nΩmω({z∈RP1: (ω,z)∈D})dµ(ω)\nfor each measurable set D⊂Ω×RP1.\nBy Rokhlin’s disintegration theorem, such a disintegration exists. Mo reover,\n{˜mω:ω∈Ω}is another disintegration of mif and only if mω= ˜mωforµ-almost\neveryω∈Ω. By a straightforward calculation one checks that {A(ω)∗mω:ω∈Ω}\nis a disintegration of ( T,A)∗m. In particular, the facts above imply that mis\n(T,A)-invariant if and only if A(ω)∗mω=mTωforµ-almost every ω∈Ω.ANDERSON LOCALIZATION 11\nSuch a measure mwill be called an s-state(resp., au-state) if it is in addition\ninvariant under the stable (resp., unstable) holonomies. That is, th e disintegration\n{mω:ω∈Ω}satisfies (hs\nω,ω′)∗mω=mω′forµ-almost every ω∈Ω and every\nω′∈Ws\nloc(ω) (resp., (hu\nω,ω′)∗mω=mω′forµ-almost every ω∈Ω and every ω′∈\nWu\nloc(ω)). In this case, we say that {mω}iss-invariant (resp.,u-invariant ). A\nmeasure that is both an s-state and a u-state is called an su-state.\nDefinition 3.3. We say that a function defined on Ω only depends on the future\n(resp.,past) if it is constant on every local stable (resp., unstable) set.\nWe can use the stable or unstable holonomy to reduce Aso that it is constant\non local unstable or stable sets as follows. For each 1 ≤j≤ℓ, fix a choice of\nω(j)∈[0;j]. We define ϕ(ω) =ω∧ω(ω0), which depends only on the past. We\ndefine a new cocycle map as follows.\n˜A−1(ω) :=Hu\nT−1ω,ϕ(T−1ω)·A−1(ω)·Hu\nϕ(ω),ω.\nIt is clear that ( T−1,˜A−1) is conjugate to ( T−1,A−1) via the unstable holonomy.\nBy property (iii), ˜A−1is continuous. By conditions (i) and (ii), we have that\n˜A−1(ω) =Hu\nT−1ω,ϕ(T−1ω)·A−1(ω)·Hu\nϕ(ω),ω\n=Hu\nT−1ω,ϕ(T−1ω)·Hu\nT−1ϕ(ω),T−1ω·A(ϕ(ω))\n=Hu\nT−1φ(ω),ϕ(T−1ω)·A(ϕ(ω)),\nwhich implies that ˜A(ω) depends only on the past. Similary, we can conjugate\n(T,A) to (T,¯A) via the stable holonomy so that ¯Adepends only the future.\nThe mapsHu,E\nω,ω′are continuous and uniformly bounded for all Ein any compact\nset. It is then straightforward to see that large deviation estimat es as stated in\nDefinition 2.4 are preserved under such a conjugacy. Hence, from now on, we may\nwithout loss of generality assume that AEdepends only the past. In particular, for\nsuch matrices, we have\nHu\nω,ω′=I2\nfor allω∈Ω and allω′∈Wu\nloc(ω).\nIn the context of Theorem 2.10, f∈LC orf∈SH. Hence, AEis fiber bunched\nthroughout some connected compact interval Jcontaining the almost sure spec-\ntrum Σ f. So we may let Hs,E\nω,ω′andHu,E\nω,ω′be their canonical stable and unstable\nholonomies, respectively.\n3.2.Reduction of the Uniform LDT. LetFE: Ω×RP1→Ω×RP1be given\nbyFE(ω,v) = (Tω,AE(ω)·v). For a continuous function ϕ: Ω×RP1, we let\nSE\nn(ϕ)(ω,v) =/summationtextn−1\nk=0ϕ((FE)k(ω,v)) be its Birkhoff sum with respect to the dy-\nnamicsFE. Thus a measure νon Ω×RP1is (T,AE)-invariant if and only if\n(FE)∗ν=ν. Throughout this section, we may sometimes leave the dependence of\nAE,FE, andHs(u),EonEimplicit if it is clear from the context.\nLemma 3.4. For everyE∈Jη,AEhas a unique u-state. Moreover, the unique\nu-state is continuous in Ewith respect to the weak*-topology.\nProof.LetE∈Jηbe arbitrary. By the definition of Jηin (12) and the discussion\nsurrounding (12), we have L(E)>0. Thus, by Oseledec’s multiplicative ergodic\ntheorem,Ahas stable and unstable directions for µ-almost every ω. We consider\nthe Dirac measures δs(ω) andδu(ω) onRP1, whereδs(ω) andδu(ω) are Dirac12 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nmasses concentrated on the stable and unstable directions, resp ectively. We can\ndefine twoFE-invariant probability measures msandmson Ω×RP1as follows:\nms=/integraldisplay\nδs(ω)dµ(ω) andmu=/integraldisplay\nδu(ω)dµ(ω).\nThe invariance of msandmufollows from the ( T,A)-invariance of the stable\nand unstable directions, respectively. Property (ii) of Definition 3.1 implies\nAn(ω′)Hs\nω,ω′=Hs\nTnω,Tnω′An(ω),\nwhich in turn implies that the length of the vector An(ω′)Hs\nω,ω′vdecays exponen-\ntially for any vector v∈suppδs(ω). ThusHs\nω,ω′δs(ω) =δs(ω′), which implies that\nmsis ans-state (with disintegration {δs(ω)}ω∈Ω). Applying the same argument\nto (T−1,A−1) and the unstable holonomies Hu\nω,ω′, we obtain that muis au-state\n(with disintegration {δu(ω)}ω∈Ω). Moreover, it is not difficult to see that any F-\ninvariant measure mon Ω×RP1is a convex combination of muandms; see, for\nexample, [BBB].\nWe claim that muis the unique u-state ofA. Indeed, suppose there is a u-state\nm/\\⌉}atio\\slash=mu. Thenm=tmu+(1−t)msfor some 0 ≤t<1. Thus\nms=1\n1−tm+t\n1−tmu,\nwhich implies msis au-state, hence an su-state, ofAE. Thus,E∈ Ff, which\ncontradicts our choice of E.\nTo show the continuity of muinE, we letmu,Edenote the unique u-state ofAE\nfor eachE∈Jη. Let{En}be a convergent sequence in Jηand lim\nn→∞En=E0∈Jη.\nTo show that mu,Enconverges to mu,E0in the weak*-topology, it suffices to show\nthat the limit of any convergent subsequence is mu,E0. Without loss of generality,\nwe may just assume that {mu,En}is convergent with the limit denoted by m; we\nneed to show that m=mu,E0. Note that\nAEn(ω)−AE0(ω) =/parenleftbiggEn−E00\n0 0/parenrightbigg\n,\nwhich clearly implies\nlim\nn→∞/bar⌈blAEn−AE0/bar⌈bl∞= 0.\nNote by our assumption, Hu,E\nω,ω′=I2for all parameters. Thus, by a special case of\n[BBB, Lemma 4.3], it follows that mis au-state with respect to ( T,AE0). By the\nuniqueness of the u-state, we have m=mu,E0, as desired. /square\nBy the definition of a local unstable set, we may think of Wu\nlocas a map on Ω−:\nWu\nloc(ω−) ={ω∈Ω :π−(ω) =ω−}.\nThus we may decompose Ω as a disjoint union of local unstable sets as follows:\nΩ =/unionsqdisplay\nω−∈Ω−Wu\nloc(ω−).\nAdisintegration ofµalong the local unstable sets is a measurable family\n{µu\nω−: a probablity measure on Wu\nloc(ω−)}ω−∈Ω−ANDERSON LOCALIZATION 13\nsuch thatµ=/integraltext\nΩ−µu\nω−dµ−(ω−). In other words,\n(15) µ(D) =/integraldisplay\nΩ−µu\nω−/parenleftbig\n{ω∈D:π−(ω) =ω−}/parenrightbig\ndµ−(ω−)\nfor each measurable set D⊂Ω. Again by Rokhlin’s disintegration theorem, such a\ndisintegration exists. For v∈RP1, we letvbe a unit vector in the direction of v.\nThen we have:\nTheorem 3.5. For everyε >0, there exist C,c >0such that uniformly for all\n(ω−,v)∈Ω−×RP1and allE∈Jη, we have\nµu\nω−/braceleftbigg\nω∈Wu\nloc(ω−) :/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnlog/bar⌈blAE\nn(ω)v/bar⌈bl−L(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε/bracerightbigg\nε/bracerightbigg\nε/bracerightbigg\n0, andE0∈Jη, there exist\nC,c,r> 0such that uniformly for all (ω−,v)∈Ω−×RP1and allE∈(E0−r,E0+\nr)∩Jη, we have that\nµu\nω−/braceleftbigg\nω∈Wu\nloc(ω−) :/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnSE\nn(ϕ)(ω,v)−/integraldisplay\nϕdmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε/bracerightbigg\n0, we obtain some positive constants r0,c,Csuch that\nµu\nω−/braceleftbigg\nω∈Wu\nloc(ω−) :/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnSE\nn(ϕE0)(ω,v)−/integraldisplay\nϕE0dmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε\n3/bracerightbigg\n0, there\nexistsr1>0 such that for all Ewith|E−E0|ε/bracerightbigg\n0.\nBy the bounded distortion property, we then have\n(Tk\n∗µj)([n;j0,···,js]) =µ(T−k([i;j0,···,js]∩[0;j])\n=µ([i+k;j0,···,js]∩[0;j])\n≥C−1µ([i+k;j0,···,js])·µ([0;j])\n≥C−1µ([i+k;j0,···,js]).\nThus byT-invariance of µ, for every cylinder set [ i;j0,···,js], we have for each\nlargenthat\nC−1≤1\nn/summationtextn−1\nk=0(Tk\n∗µj)([i;j0,···,js])\nµ([i;j0,···,js])≤C.\nThus by (18), the estimates above hold true if we replace µjbyν=1\nµ−\nj(Ω−\nj)νj. This\nfurther implies that if ν′is a limit point of the sequence {1\nn/summationtextn−1\nk=0(Tk\n∗ν)}n, then we\nhave\n(19) C−1≤dν′\ndµ≤C.\nSince Ω is a compact metric space, by the Stone-Weierstrass theor em the set\nC(Ω,R) is separable, which in turn implies that the weak- ∗topology on the set of\nBorel probability measures on Ω is metrizable. For instance, such a m etric may be\nchosen as\nρ(ν,ν′) :=∞/summationdisplay\ns=12−s/vextendsingle/vextendsingle/vextendsingle/vextendsingle/integraldisplay\nfsdν−/integraldisplay\nfsdν′/vextendsingle/vextendsingle/vextendsingle/vextendsingle,\nwhere{fs:s∈Z+}is a dense subset of the set {f∈C(Ω,R) :/bar⌈blf/bar⌈bl∞≤1}.\nNote that by the Banach-Alaoglu theorem, the weak- ∗topology on the set of Borel\nprobability measures on any topological space is compact. Combining the two facts\nabove, we see that the the weak- ∗topology on the set of Borel probability measures\non Ω is sequentially compact.\nNow letν(n)=1\nn/summationtextn−1\nk=0Tk\n∗νfor anyn∈Z+. By the discussion above and (19),\nthe sequence {ν(n)}has a weak- ∗accumulation point ν(0)that is equivalent to µ.\nIt is clear that ν(0)is alsoT-invariant. Set g=dν(0)\ndµ, which isT-invariant since\nbothν(0)andµareT-invairant. By ergodicity of µ, there is a constant csuch that16 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\ng(ω) =cforµ-a.e.ω. Since both ν(0)andµare probability measures, we must\nhavec= 1, which implies ν(0)=µ.\nThus, by uniqueness of the accumulation point, we have ν(n)→µasn→ ∞in\nthe weak- ∗topology. Applying uniqueness of the limit and metrizability of the set\nof Borel probability measures, we have that the convergence is un iform inν. That\nis, the convergence is uniform in the choices of νusatisfying (16) and the choices\nofω−,j. Indeed, assume for the sake of contradiction that the converg ence is not\nuniform. Then there is ε0>0 and a strictly increasing sequence {nl}l≥1inZ+\nwith the following property. For every l, there isν(l) satisfying (19) such that\nρ(ν(nl)(l),µ)≥ε0,\nwhereν(n)(l) :=1\nn/summationtextn−1\nk=0Tk\n∗ν(l). Without loss of generality, we may assume\n{ν(nl)(l)}l≥1is convergent and the limit is /tildewideν. Thus/tildewideνsatisfies (19) and ρ(/tildewideν,µ)≥ε0.\nMoreover,/tildewideνisT-invariant. Indeed,\nρ(T∗ν(nl)(l),ν(nl)(l)) =1\nnl∞/summationdisplay\ns=12−s/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsinglenl−1/summationdisplay\nk=0/integraldisplay\nfsd(Tk+1\n∗ν(l))−/integraldisplay\nfsd(Tk\n∗ν(l))/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle\n=1\nnl∞/summationdisplay\ns=12−s/vextendsingle/vextendsingle/vextendsingle/vextendsingle/integraldisplay\nfsd(Tnl∗ν(l))−/integraldisplay\nfsd(ν(l))/vextendsingle/vextendsingle/vextendsingle/vextendsingle\n≤2\nnl,\nwhich implies\nT∗/tildewideν= lim\nl→∞T∗ν(nl)(l) = lim\nl→∞ν(nl)(l) =/tildewideν.\nThus the same argument above showing ν(0)=µimplies that/tildewideν=µ, which contra-\ndictsρ(/tildewideν,µ)≥ε0. In summary, so far we have obtained the estimate (17) except\nthat we only did so for ν. The final step is to replace νbyνu. To this end, it\nsuffices to prove the following claim.\nIf we letνu,(n)=1\nn/summationtextn−1\nk=0Tk\n∗νu, then for any continuous ϕ, we claim that\nlim\nn→∞/parenleftbigg/integraldisplay\nϕdνu,(n)−/integraldisplay\nϕdν(n)/parenrightbigg\n= 0,\nwhere the convergence is also uniform in ω−,jandνu. Indeed, we have\n/integraldisplay\nϕdνu,(n)−/integraldisplay\nϕdν(n)=1\nnn−1/summationdisplay\nk=1/parenleftBigg/integraldisplay\nϕd(Tk\n∗νu)−1\nµ−\nj(Ω−\nj)/integraldisplay\nϕd(Tk\n∗νj)/parenrightBigg\n,ANDERSON LOCALIZATION 17\nwhich implies that it suffices to show/integraltext\nϕd(Tk\n∗νu)−1\nµ−\nj(Ω−\nj)/integraltext\nϕd(Tk\n∗νj)→0, uni-\nformly inω−andνu. To this end, we have/integraldisplay\nϕd(Tk\n∗νu)−1\nµ−\nj(Ω−\nj)/integraldisplay\nϕd(Tk\n∗νj)\n=/integraldisplay\nϕ◦Tkdνu−1\nµ−\nj(Ω−\nj)/integraldisplay\nϕ◦Tkdνj\n=/integraldisplay\nϕ◦Tkdνu−1\nµ−\nj(Ω−\nj)/integraldisplay\nϕ◦Tkd/parenleftbig\nµ−\nj×(π+)∗νu/parenrightbig\n=/integraldisplay\nWu\nloc(ω−,j)ϕ◦Tkdνu−/integraldisplay\nΩ+\nj/parenleftBigg\n1\nµ−\nj(Ω−\nj)/integraldisplay\nΩ−\njϕ◦Tk(ω−,ω+)dµ−\nj(ω−)/parenrightBigg\nd/parenleftbig\n(π+)∗νu/parenrightbig\n(ω+)\n=/integraldisplay\nΩ+\nj/parenleftBigg\nϕ◦Tk(ω−,j,ω+)−1\nµ−\nj(Ω−\nj)/integraldisplay\nΩ−\njϕ◦Tk(ω−,ω+)dµ−\nj(ω−)/parenrightBigg\nd/parenleftbig\n(π+)∗νu/parenrightbig\n(ω+).\nClearly, we have/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingleϕ◦Tk(ω−,j,ω+)−1\nµ−\nj(Ω−\nj)/integraldisplay\nΩ−\njϕ◦Tk(ω−,ω+)dµ−\nj(ω−)/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle\n=/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nµ−\nj(Ω−\nj)/integraldisplay\nΩ−\njϕ◦Tk(ω−,j,ω+)−ϕ◦Tk(ω−,ω+)dµ−\nj(ω−)/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle\n≤1\nµ−\nj(Ω−\nj)/integraldisplay\nΩ−\nj/vextendsingle/vextendsingleϕ◦Tk(ω−,j,ω+)−ϕ◦Tk(ω−,ω+)/vextendsingle/vextendsingledµ−\nj(ω−),\nwhich tends to 0 uniformly in ω+ask→ ∞by uniform continuity of ϕand the\nfactd(Tk(ω−,j,ω+),Tk(ω−,ω+))→0 ask→ ∞. The estimates above imply that/integraltext\nϕd(Tk\n∗νu)−1\nµ−\nj(Ω−\nj)/integraltext\nϕd(Tk\n∗νj)→0, uniformly in ω−,jandνu, as desired. /square\nLemma 3.8. LetE∈Jηandω−,j∈Ω−\nj. Supposemis a probability measure on\nWu\nloc(ω−,j)×RP1, whose projection νutoWu\nloc(ω−,j)satisfies the assumptions of\nLemma 3.7. Then, we have\n1\nnn−1/summationdisplay\nk=0(FE)k\n∗m→mu,E\nin the weak- ∗topology, uniformly in ω−,j,E∈Jη, and such choices of m.\nProof.By compactness of Ω ×RP1and the same reasoning as in the proof of\nLemma 3.7, we see that weak- ∗accumulation points of1\nn/summationtextn−1\nk=0(FE)k\n∗mexist.\nConsider such an accumulation point and denote it by /tildewidem. Without loss of gen-\nerality, we may just assume that1\nn/summationtextn−1\nk=0(FE)k\n∗mconverges to /tildewidem. Clearly,/tildewidemis\ninvariantunder FEand it projects to an accumulation point of1\nn/summationtextn−1\nk=0Tk\n∗νuin the\nfirstcomponent. Byourassumptionon νuandLemma3.7,1\nn/summationtextn−1\nk=0Tk\n∗νuconverges\ntoµasn→ ∞. That is,/tildewidemprojects to µin the first coordinate.\nNext, we show that any disintegration {/tildewidemω}ω∈Ωof/tildewidemis invariant under the\nunstable holonomy. By our assumption that Adepends only on the past, this is\nequivalent to having /tildewidemω=/tildewidemω′forωandω′in the same local unstable set. To\nthis end, we let /tildewidem−= (π−×id)∗(/tildewidem), which is a measure on Ω−×RP1. First, we18 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nnote thatAEnaturally descends to a map on Ω−since it depends only on the past.\nThat is,AE(ω) =˜AE(π−ω) for some map ˜AE: Ω−→SL(2,R). Abusing notation\nslightly, we still let AEdenote the map on Ω−. LetFE\n−denote the projectivized\naction of (T−,(AE)−1) on Ω−×RP1whereT−is the right shift on Ω−. Then we\nnaturally have\n(π−×id)◦(T,AE)−1= (T−,(AE)−1)◦(π−×id),\nwhich implies ( π−×id)◦(FE)−1=FE\n−◦(π−×id). We claim that /tildewidem−is invariant\nunderFE\n−. Indeed,\n(FE\n−)∗/tildewidem−= (FE\n−)∗(π−×id)∗(/tildewidem)\n= (FE\n−◦(π−×id))∗/parenleftbig\nlim\nn→∞1\nnn−1/summationdisplay\nk=0(FE)k\n∗m/parenrightbig\n= ((π−×id)◦(FE)−1)∗/parenleftbig\nlim\nn→∞1\nnn−1/summationdisplay\nk=0(FE)k\n∗m/parenrightbig\n= (π−×id)∗/parenleftbig\nlim\nn→∞1\nnn−1/summationdisplay\nk=0(FE)k−1\n∗m/parenrightbig\n= (π−×id)∗/tildewidem\n=/tildewidem−.\nLet{/tildewidem−\nω−}be a disintegration of /tildewidem−. ByFE\n−-invariance, we then have\n(AE(T−ω−)−1)∗/tildewidem−\nω−=/tildewidem−\nT−ω−,\nor equivalently,\n(20) ( AE\n−1(ω−))∗/tildewidem−\nω−=/tildewidem−\nT−ω−.\nByaspecialcaseof[AV, Lemma3.4], thedisintegration {/tildewidemω}of/tildewidemcanberecovered\nfrom the disintegration {/tildewidem−\nω−}of/tildewidem−via\n/tildewidemω= lim\nn→∞(AE\n−n(π−(Tnω)))∗/tildewidem−\nπ−(Tnω)\nforµ-a.e.ω. But (20) and the fact T−◦π−=π−◦T−1imply that\n(AE\n−n(π−(Tnω)))∗/tildewidem−\nπ−(Tnω)=/tildewidem−\nπ−ω\nfor alln≥1. Thus we have\n/tildewidemω=/tildewidem−\nπ−ω,\nwhich stays constant for all ω′∈Wu\nloc(π−ω). This concludes the proof that /tildewidem\nis au-state. Therefore, by uniqueness of the u-state, it must be equal to mu,E.\nUniform convergence follows again from uniqueness of the limit as in th e proof of\nLemma 3.7. /square\nThe final piece needed to prove Theorem 3.6 is the following large devia tion\nestimate for martingale difference sequences; see, for example, [ AEP, BS].\nLemma 3.9. Let{dn}n≥1be a martingale difference sequence adapted to some\nfiltration. That is, {dn}n≥1is a sequence of variables such that\n(21) E(dn+1|Fn) = 0,ANDERSON LOCALIZATION 19\nwhereFnis theσ-algebra generated by d1,...,d n. Then for every ε>0, there is a\nc>0such that for all N≥1,\n(22) P\n/vextendsingle/vextendsingle/vextendsingle/vextendsingleN/summationdisplay\n1dn/vextendsingle/vextendsingle/vextendsingle/vextendsingle>εN1\n2/parenleftBiggN/summationdisplay\n1/bar⌈bldn/bar⌈bl2\n∞/parenrightBigg1\n2\nε/parenrightBig\n≤e−cε2\n2a2n,\nwhich is alreadyknown; compare, for example, [Az] or [LV]. In fact, cmay be taken\nto be 1 in (24).\nWe are now ready to prove Theorem 3.6.\nProof of Theorem 3.6. By the bounded distortion property of µ, there exists C≥1\nsuch that for each 1 ≤j≤ℓandµ−-almost every ω−,j∈Ω−\nj,\n(25) C−1≤d(π+\n∗µu\nω−,j)\ndµ+\nj≤C.\nSince the estimates on a zero µ−-measure subset of Ω−are negligible when we\npass the estimates to µvia (15), we may without loss of generality assume that\n(25) holds uniformly for all ω−,j∈Ω−\nj. Thusµu\nω−,jsatisfies the assumption of\nLemma 3.7. Choose any v∈RP1and letmbe the lift of µu\nω−,jtoWu\nloc(ω−,j)×{v}.\nThenmsatisfies the assumption of Lemma 3.8. Since π+T=T+π+, we have\nπ+\n∗T∗µu\nω−,j= (T+)∗π+\n∗µu\nω−,jwhich implies\nC−1≤d(π+\n∗T∗µu\nω−,j)\nd((T+)∗µ+\nj)≤C.\nByT+-invariance of µ+, forjiadmissible we have (( T+)∗µ+\nj)|[0;i]+=µ+\ni. Hence,\nthe above estimate implies that1\nµu\nω−,j([0:ji])T∗µu\nω−,j|[0;i]is a probability measure\nthat satisfies (25), hence the assumption of Lemma 3.7. Note that\nFE\n∗m|[0;i]×RP1= (FE|[0;j,i]×RP1)∗m= (FE|(Wu\nloc(w−,j)∩[0;j,i])×RP1)∗m\nis the lift of T∗µu\nω−,j|[0:i]to (T(Wu\nloc(ω−,j))∩[0 :i])×{AE(ω)v}, whereAE(ω)vis\na constant since ω∈Wu\nloc(ω−,j)∩[0;j,i] andAEdepends only on the past. Thus\n1\nµu\nω−,j([0 :ji])FE\n∗m|[0:i]×RP1=1\nm([0 :j,i]×RP1)FE\n∗m|[0:i]×RP1\nsatisfies the assumptions of Lemma 3.8 as well. By induction, if ji1···isis admis-\nsible, then\n1\nµu\nω−,j([0 :j,i1,...,is])Ts\n∗µu\nω−,j|[0;i1,...,is]\nsatisfies the assumption of Lemma 3.7. Likewise,\n(FE)s\n∗m|[0;i1,...,is]=/parenleftbig\n(FE)s|Wu\nloc(w−,j)∩[0;j,i1,...,is]/parenrightbig\n∗m20 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nis the lift of Ts\n∗µu\nω−,j|[0:i1,...,is]toTs(Wu\nloc(ω−,j))∩[0 :i1,...,is]×{AE\ns(ω)v}, where\nagainAE\ns(ω)vstays constant since ω∈Wu\nloc(ω−,j)∩[0;j,i1,...,is−1,is]. Hence,\n1\nm([0 :j,i1,...,is]×RP1)(FE)s\n∗m|[0:i1,...,is]\nsatisfies the assumption of Lemma 3.8. Now for each ω∈Wu\nloc(ω−,j), we define\nDi(ω) :=/parenleftbig\n[0;ω0,...,ω i]∩Wu\nloc(ω−,j)/parenrightbig\n×RP1.\nNote that for every integrable function ψ, we have\n/integraldisplay\nDi−1(Tω)ψ(˜ω)d(FE)i\n∗m(˜ω) =/integraldisplay\nDi(ω)ψ◦(FE)i(˜ω)dm(˜ω),\nwhere ˜ωis the variable of the integrand, which should not be confused with ω. We\nleave ˜ωimplicit wheneveris it clear from the context. Consider a H¨ older cont inuous\nfunctionϕ∈Cα(Ω×RP1,R). By Lemma 3.8 and the facts described above, given\nε>0, there isN≥1 such that for every i≥0 and every ω∈Ω,\n(26)/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nm(Di(ω))/integraldisplay\nDi(ω)1\nNSN(ϕ◦(FE)i)dm−/integraldisplay\nϕdmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle<ε\n4.\nLet us rewrite this as follows. Define Yi:Wu\nloc(ω−,j)→Rby\nYi(ω) =1\nm(Di(ω))/integraldisplay\nDi(ω)Si(ϕ)dm,\nwhich depends only on ω0,...,ω i. LetBibe theσ-algebra generated by Y0,...,Y i,\nwhich is basically generated by the cylinder sets [0; n0,...,n i]. In particular, the\nconditional expectation of Yi+Nrespect to Biis\nE/parenleftBig\nYi+N/vextendsingle/vextendsingle/vextendsingleBi/parenrightBig\n=1\nm(Di(ω))/summationdisplay\n˜ω∈Di(ω)m(Di+N(˜ω))Yi+N(˜ω)\n=1\nm(Di(ω))/summationdisplay\n˜ω∈Di(ω)/integraldisplay\nDi+N(˜ω)Si+N(ϕ)dm (27)\n=1\nm(Di(ω))/integraldisplay\nDi(ω)Si+N(ϕ)dm.\nClearly,E/parenleftBig\nYi/vextendsingle/vextendsingle/vextendsingleBi/parenrightBig\n=Yi. Thus the estimate (26) reads\n(28)/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nNE/parenleftBig\nYi+N−Yi/vextendsingle/vextendsingle/vextendsingleBi/parenrightBig\n−/integraldisplay\nϕdmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle<ε\n4.\nIf we define\nXn=YnN−n/summationdisplay\nk=1E/parenleftbig\nYkN−Y(k−1)N|B(k−1)N/parenrightbig\n,\nit follows that {Xn}is a martingale, that is, (21) holds for {Xn}. Indeed,\nXn+1−Xn=Y(n+1)N−YnN−E/parenleftBig\nY(n+1)N−YnN/vextendsingle/vextendsingle/vextendsingleBnN/parenrightBig\n=Y(n+1)N−E/parenleftBig\nY(n+1)N/vextendsingle/vextendsingle/vextendsingleBnN/parenrightBig\n. (29)ANDERSON LOCALIZATION 21\nSince theσ-algebra Fngenerated by X1,...,X nis precisely BnN, the above equa-\ntion implies that for all n≥1,\nE/parenleftBig\nXn+1−Xn/vextendsingle/vextendsingle/vextendsingleFn/parenrightBig\n= 0.\nWe claim that (23) also holds true for {Xn}because of the H¨ older continuity of ϕ.\nIndeed, it is clear that |X1|=|YN−E(YN−Y0/vextendsingle/vextendsingle/vextendsingleB0)|=|YN−Y0−E(YN/vextendsingle/vextendsingle/vextendsingleB0)|0 and alln≥1, we have\n(30) µu\nω−,j/braceleftbigg\nω:/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnXn/vextendsingle/vextendsingle/vextendsingle/vextendsingle>δ/bracerightbigg\n=P/parenleftbigg/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnXn/vextendsingle/vextendsingle/vextendsingle/vextendsingle>δ/parenrightbigg\nε.\nThen by the same argument above bounding |Xn+1−Xn|, we have for all ω′∈\n[0;ω0,...,ω nN]∩Wu\nloc(ω−,j) that\n|SnN(φ)(ω,v)−SnN(φ)(ω′,v)|ε\n2,\nwhereN0depends only on ϕandε. By the estimate above and (28), we have for\nallωsatisfying (31) that\n/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnNXn/vextendsingle/vextendsingle/vextendsingle/vextendsingle=/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnNYnN−1\nnn/summationdisplay\nk=11\nNE/parenleftBig\nYkN−Y(k−1)N/vextendsingle/vextendsingle/vextendsingleB(k−1)N/parenrightBig/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle\n≥/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnNYnN−/integraldisplay\nϕdmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle−1\nnn/summationdisplay\nk=1/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nNE/parenleftbig\nYkN−Y(k−1)N|B(k−1)N/parenrightbig\n−/integraldisplay\nϕdmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle\n>ε\n4.\nApplying (30) to δ=εN\n4, we obtain for all n≥N0,\nµu\nω−,j/braceleftbigg\nω:/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnNSnN(ϕ)(ω)−/integraldisplay\nϕdmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε/bracerightbigg\n≤µu\nω−,j/braceleftbigg\nω:/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnXn/vextendsingle/vextendsingle/vextendsingle/vextendsingle≥Nε\n4/bracerightbigg\n≤e−Nε2\n16a2nN.\nAbsorbingthe statement for 1 ≤n≤N0into some constant C=C(ϕ,ε), we obtain\nthe desired estimate\nµu\nω−,j/braceleftbigg\nω:/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nnNSnN(ϕ)(ω)−/integraldisplay\nϕdmu,E/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε/bracerightbigg\n0,β >0 depending on fandIsuch that\n(32) |L(E)−L(E′)| ≤C|E−E′|β\nfor allE,E′∈I. First, we define\ngn(ω,E) =1\nnlog/bar⌈blAE\nn(ω)/bar⌈bl.\nLet Γ = supω∈Ω,E∈I/bar⌈blAE(ω)/bar⌈bl. Sincef∈Cα(Ω,R), a direct computation shows\nthat\n(33) |gn(ω′,E′)−gn(ω,E)|<Γn−1/parenleftbig\nCd(ω,ω′)α+|E′−E|/parenrightbig\nuniformly for all E∈I. Then we have:\nLemma 4.1. For everyε>0, there is a n0=n0(ε)such that\nµ/braceleftBig\nω:/vextendsingle/vextendsingle/vextendsingleL(E)−1\nrr−1/summationdisplay\ns=0gn(Tns+s0ω,E)/vextendsingle/vextendsingle/vextendsingle>ε/bracerightBig\n≤e−cε2\nn2r\nfor allE∈I,r≥Cn\nε,s0∈Zand alln≥n0.\nUsing the techniques of [ADZ, Section 3], we can reduce gn(·,E) to a family of\nfunctions in Cα\n2(Ω+,R). We briefly introduce the reduction process since we need\na bit more information than what is discussed in [ADZ, Section 3]. Follow ing the\ndiscussion after Definition 3.3, for each 1 ≤j≤ℓ, we fix a choice ω(j)∈[0;j] and\nconsiderϕ(ω) =ω(ω0)∧ω∈Wu\nloc(ω(ω0))∩Ws\nloc(ω). For each n, we construct a\nfamily of functions hn(ω,E) via\n(34) hs\nn(ω,E) :=∞/summationdisplay\nk=0/bracketleftbig\ngn(Tkω,E)−gn(Tkϕ(ω),E)/bracketrightbig\n.\nThen\n(35) g+\nn(ω,E) :=gn(ω,E)+hn(Tω,E)−hn(ω,E)\nis constant on every local stable set Ws\nloc(ω). By the estimate of [ADZ, Section 3],\nwe see that/vextendsingle/vextendsingleh(ω,E)−h(ω′,E)/vextendsingle/vextendsingle0, there is a n0=n0(ε)such that\nµ+/braceleftBig\nω+:/vextendsingle/vextendsingle/vextendsingleL(E)−1\nrr−1/summationdisplay\ns=0g+\nn(Tns\n+ω+,E)/vextendsingle/vextendsingle/vextendsingle>ε/bracerightBig\n≤e−cε2\nn2r\nfor allE∈I,r∈Z+, and alln≥n0.\nThe proof of Lemma 4.2 relies on Lemma 4.3 below, whose proof again us es\nLemma 3.9.\nLemma 4.3. LetK >1and assume that Fisα-H¨ older continuous on Ω+with\n/bar⌈blF/bar⌈bl∞<1and|F(ω)−F(ω′)|0and allr,n≥1,\nwe have\nµ+/braceleftBigg\nω+:/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nrr−1/summationdisplay\ns=0F(Tns\n+ω+)−/integraldisplay\nFdµ+/vextendsingle/vextendsingle/vextendsingle/vextendsingle/vextendsingle<ε/bracerightBigg\n0\nsmall. Thus we may choose an integer Nsuch that\nlog10K\nε<αnN < 2log10K\nε.\nIn particular, we have\n(39) Ke−αnN<ε\n10and1\nN>cn\nlogK\nε.\nBy H¨ older continuity of F, we have\n(40) /bar⌈blF−EN[F]/bar⌈bl∞0 andm∈Z+that\nP\n/vextendsingle/vextendsingle/vextendsingle/vextendsinglem/summationdisplay\n1di/vextendsingle/vextendsingle/vextendsingle/vextendsingle>δm1\n2/parenleftBiggm/summationdisplay\n1/bar⌈bldi/bar⌈bl2\n∞/parenrightBigg1\n2\nε\n10/bracerightBigg\n=P\n/vextendsingle/vextendsingle/vextendsingle/vextendsinglem/summationdisplay\n1di/vextendsingle/vextendsingle/vextendsingle/vextendsingle>δm1\n2/parenleftBiggm/summationdisplay\n1/bar⌈bldi/bar⌈bl2\n∞/parenrightBigg1\n2\n\nε/bracerightBigg\n0, there are c,C >0 such that\nµ+/braceleftbig\nω+:/vextendsingle/vextendsingleg+\nn(ω+,E)−L(E)/vextendsingle/vextendsingle>ǫ/bracerightbig\nε\n10/bracerightBigg\nε/bracerightBigg\nε/bracerightbigg\n.\nIn view of (35) and (37), for r≥Cn\nε, we have\n/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nrr−1/summationdisplay\ns=0gn(Tnsω,E)−L(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε⇒/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nrr−1/summationdisplay\ns=0g+\nn(Tns\n+ω+,E)−L(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε\n2,ANDERSON LOCALIZATION 27\nwhich implies for all n≥n0(ε),r≥Cn\nε, and allE∈Ithat\nµ/braceleftbigg\nω∈Ω :/vextendsingle/vextendsingle/vextendsingle/vextendsingle1\nrr−1/summationdisplay\ns=0gn(Tnsω,E)−L(E)/vextendsingle/vextendsingle/vextendsingle/vextendsingle>ε/bracerightbigg\n≤µ[(π+)−1B+\nn(ε/2)]\n=µ+(B+\nn(ε/2))\n0 andN∈Z+, let\nDN=DN(ε) denote the set of all those ω∈Ω such that\n(57) /bar⌈blGE\nTsω,[−N1,N2]/bar⌈bl ≥eK2\nand\n(58)1\nmlog/bar⌈blAm(Ts+rω,E)/bar⌈bl ≤L(E)−ε\nfor some choice of s∈Z,K≥max(N,log2(|s|+ 1)), 0 ≤N1,N2≤K9,E∈I,\nK10≤r≤K, andm∈ {K,2K}.\nProposition 4.6. For all0<ε<1, there exist constants C >0and/tildewideη >0such\nthat\nµ(DN(ε))≤Ce−/tildewideηN\nfor allN∈Z+.\nTo prove Proposition 4.6, we first need the following lemma from [ADZ]. R ecall\nthat for an admissible l= (l1,...,ln), we have defined at the begining of proof of\nLemma 4.3 that Ω+\nl:= [0;l]+. We further define\n(59) µ+\nl=1\nµ+/parenleftbig\nΩ+\nl/parenrightbig(T|l|\n+)∗µ+/vextendsingle/vextendsingle\nΩ+\nl.\nIn other words, µ+\nlis the normalized push-forward of µ+under the injective map\nT|l|\n+: Ω+\nl→Ω+. By definition, we have\n/integraldisplay\nΩ+fdµ+\nl=1\nµ+(Ω+\nl)/integraldisplay\nΩ+\nlf◦T|l|\n+dµ+.\nIf we viewT−|l|\n+as a map from T|l|\n+(Ω+\nl) to Ω+\nl, we obtain\n(60) µ+(Ω+\nl)/integraldisplay\nT|l|\n+(Ω+\nl)f◦T−|l|\n+dµ+\nl=/integraldisplay\nΩ+\nlfdµ+.ANDERSON LOCALIZATION 31\nNote thatµ+\nlis concentrated on T|l|\n+(Ω+\nl). Then we have [ADZ, Lemma 3.3]; stated\nas Lemma 4.7 below. We point out that although in the statement of Le mma 3.3,\n[ADZ] assumes the topological mixing property, it is not needed since the proof\nthere did not use it.\nLemma 4.7. Consider a one-sided subshift of finite type (Ω+,T+,µ+), whereµ+\nhas the bounded distortion property. There exists a C≥1so that, uniformly for\nall admissible l, we have\n(61)dµ+\nl\ndµ+(ω+)≤Cforµ-a.e.ω+,\nwheredµ+\nl\ndµ+is the Radon-Nikodym derivative of µ+\nlwith respect to µ+. In particular,\nwe have for all nonnegative measurable functions fand all admissible l,\n(62)/integraldisplay\nfdµ+\nl≤C/integraldisplay\nfdµ+.\nProof of Proposition 4.6. Define auxiliary “bad sets” for fixed sandK:\nDK,s={ω: (57),(58) are satisfied for some choice of E,N1,N2,r,mas above}.\nFixε∈(0,1) and begin by noticing that\n(63) DK,s⊂/uniondisplay\nK10≤r≤K/uniondisplay\n0≤N1,N2≤K9/tildewideD1(N1,N2,r,s)∪/tildewideD2(N1,N2,r,s),\nwhere/tildewideDj(N1,N2,r,s) denotes the collection of all ω∈Ω for which there exists\nE∈Isuch that (57) and (58) hold with m=jK.\nWe will estimate µ(/tildewideD1). The estimates for /tildewideD2are completely analogous. To that\nend, suppose ω∈/tildewideD1(N1,N2,r,s), that is, (57) and (58) hold for some E∈I. By\nthe spectral theorem, there exists E0∈σ(HTsω,[−N1,N2]) with\n(64) |E−E0| ≤/vextenddouble/vextenddouble/vextenddoubleGE\nTsω,[−N1,N2]/vextenddouble/vextenddouble/vextenddouble−1\n≤e−K2.\nOn the other hand, choosing Klarge enough that CΓKe−αK2≤ε\n6andCe−αβK2≤\nε\n6(whereC,βare from (32) and (33) and the αin the second inequality will be\nused later), we get\ngK(Ts+rω,E0)≤gK(Ts+rω,E)+ε\n6\n≤L(E)−ε+ε\n6(65)\n≤L(E0)−2ε\n3,\nwhere we have used (33) in the first line, (58) in the second line, and ( 32) in the\nfinal line. Thus, when Kis large enough, we get\n(66)/tildewideD1(N1,N2,r,s)⊆ˆD1(N1,N2,r,s) for allN1,N2,r,ands,\nwhereˆD1=ˆD1(N1,N2,r,s) denotes the set of all ω∈Ω such that\ngK(Ts+rω,E0)≤L(E0)−ε\n232 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nfor someE0∈σ/parenleftbig\nHTsω,[−N1,N2]/parenrightbig\n. To estimate the measure of ˆD1, byT-invariance,\nwe may instead consider\nTs(ˆD1) =/uniondisplay\nE0∈σ/parenleftbig\nHω,[−N1,N2]/parenrightbig/braceleftbig\nω:gK(Trω,E0)≤L(E0)−ε\n2/bracerightbig\n.\nDivideΩintoΩ =/uniontext\nlΩl, wherelisadmissiblewith |l|= 2K2+1andΩ l= [−K2:l].\nFix someω(l)∈Ωl. Then for all ω∈Ωl, we haved(ω,ω(l))≤e−K2. Thus for each\nE0∈σ/parenleftbig\nHω,[−N1,N2]/parenrightbig\n, there is a E′∈σ/parenleftbig\nHω(l),[−N1,N2]/parenrightbig\nsuch that\n|E′−E0| ≤ /bar⌈blHω,[−N1,N2]−Hω(l),[−N1,N2]/bar⌈bl2K2+1, we obtain\nµ/parenleftbig\nΩl/intersectiondisplay\nT−r/parenleftbig\nSK(E′,ε/3)/parenrightbig/parenrightbig\n=µ/parenleftBig\nT−K2/parenleftbig\nΩl/intersectiondisplay\nT−rSK(E′,ε/3)/parenrightbig/parenrightBig\n≤µ+/parenleftBig\nΩ+\nl/intersectiondisplay\nT−r\n+/parenleftbig˜S+(E′)/parenrightbig/parenrightBig\n=/integraldisplay\nΩ+\nlχT−r\n+(˜S+(E′))dµ+\n=/integraldisplay\nΩ+\nlχ˜S+(E′)◦Tr\n+dµ+\n=µ+(Ω+\nl)/integraldisplay\nΩχ˜S+(E′)◦Tr−2K2−1\n+dµ+\nl\n≤Cµ+(Ω+\nl)/integraldisplay\nΩχ˜S+(E′)◦Tr−2K2−1\n+dµ+\n=Cµ+(Ω+\nl)/integraldisplay\nΩχ˜S+(E′)dµ+\n=Cµ+(Ω+\nl)·µ+/parenleftbig˜S+(E′)/parenrightbig\n=Cµ(Ωl)·µ/parenleftbig˜S(E′)/parenrightbig\n≤Cµ(Ωl)µ(T−K2SK(E′,ε/6))\n=Cµ(Ωl)µ(SK(E′,ε/6))\n≤Cµ(Ωl)e−cK,\nwhere the last line follows from ULD. Then, we have\nµ(ˆD1) =µ(TsˆD1)\n≤C/summationdisplay\nlµ(Ωl)K9e−cK\n≤CK9e−cK\n≤Ce−η1K.\nThus, we obtain µ(/tildewideD1(N1,N2,r,s))≤Ce−η1Kby applying (66).\nApplying similar reasoning to /tildewideD2, one can estimate µ(/tildewideD2(N1,N2,r,s))≤\nCe−η2K.34 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\nPutting everything together yields\nµ(DK,s)≤/summationdisplay\n0≤N1,N2≤K9/summationdisplay\nK10≤r≤K/parenleftBig\nµ(/tildewideD1(N1,N2,r))+µ(/tildewideD2(N1,N2,r))/parenrightBig\n≤CK18Ke−η3K\n≤Ce−2/tildewideηK\nfor some suitable choice of /tildewideη. Changing the order of Kands, we have\nDN=/uniondisplay\ns∈Z/uniondisplay\nK≥max{N,log2(|s|+1)}DK,s⊆/uniondisplay\nK≥N/uniondisplay\n|s|≤e√\nKDK,s.\nThen, the estimates above yield\nµ(DN)≤/summationdisplay\nK≥N(2e√\nK+1)Ce−2/tildewideηK≤Ce−/tildewideηN\nfor large enough N. Adjusting the constants to account for small Nconcludes the\nproof. /square\nOnce we have Corollary 4.5 and Proposition 4.6, we can then mimic the pr o-\ncess after the proof of Proposition 6.1 of [BDF+, Section 6] to prov e (13), hence\nTheorem 2.12.\nRemark 4.8. An analogous proof can be given for half-line operators associated\nwith non-invertible maps. The changes are relatively simple. In partic ular, mod-\nulo these modifications, the arguments presented in this paper will e stablish the\nlocalization result for the doubling map model stated in Corollary 2.16.\n5.Applications – Proof of Corollaries 2.14 and 2.15\nThe two corollaries can be proved together. In both cases, we may letJ⊂R\nbe a compact interval so that it contains the almost sure spectrum Σ andAEis\neither locally constant or fiber bunched over J. LetFfbe the finite set and Jη,\nη >0, be the finite union of compact intervals as described before the s tatement\nof Theorem 2.10. In the same description, we know that PLE holds tr ue onJη,\nand by Theorem 2.10, ULD holds true on Jη. Hence, by Theorem 2.12 Hωhas\nexponential dynamical localization on Jηforµ-a.e.ω.\nThus for every n∈Z+, there is a full measure set Ω(n)⊂Ω so thatHωhas\nspectral localization for all ω∈Ω(n)onJ1\nn. Also, for every E∈R, the set\nΩE:={ω:Eis not an eigenvalue of Hω}\nhas full measure. This is an easy consequence of Oseledec’s theore m or it follows\ndirectly from [P]. Now let\nΩ∗=\n/intersectiondisplay\nn∈Z+Ω(n)\n∩\n/intersectiondisplay\nE∈FfΩE\n.\nThen it is clear that µ(Ω∗) = 1. Moreover, for each ω∈Ω∗,Hωhas pure point\nspectrumon R\\Ff, exponentiallydecayingeigenfunctionsforalleigenvalues z∈R\\\nFf, andFfcontains no eigenvalue of Hω. HenceHωexhibits Anderson localization\nfor eachω∈Ω∗, concluding the proof.ANDERSON LOCALIZATION 35\nFinally, Corollary 2.16 is a special case of Corollary 2.15, again noting th e brief\ndiscussion of half-line localization in Remark 4.8, while Corollary 2.17 is a sp ecial\ncase of Corollary 2.14.\nReferences\n[AEP] N. Alon, P. Erd¨ os, J. Spencer, The Probabilistic Method , John Wiley & Sons, New-York,\n1992.\n[ADZ] A. Avila, D. Damanik, Z. Zhang, Schr¨ odinger operator s with potentials generated by\nhyperbolic transformations: I. Positivity of the Lyapunov exponent, Invent. Math. 231\n(2023), 851–927.\n[AV] A. Avila, M. Viana, Extremal Lyapunov exponents: an inv ariance principle and applica-\ntions,Invent. Math. 181(2010), 115–189.\n[Az] K. Azuma, Weighted sums of certain dependent random var iables,Tˆ ohoku Math. Journ.\n19(1967), 357–367.\n[BBB] L. Backes, A. Brown, C. Butler, Continuity of Lyapunov exponents for cocycles with\ninvariant holonomies, J. Mod. Dyn. 12(2018), 223–260.\n[B] J. Bourgain, Green’s Function Estimates for Lattice Schr¨ odinger Opera tors and Appli-\ncations, Annals of Mathematics Studies 158, Princeton University Press, Princeton, NJ,\n2005.\n[BGV] C. Bonatti, X. G´ omez-Mont, M. Viana, G´ en´ ericit´ e d ’exposants de Lyapunov non-nuls\npour des produits d´ eterministes de matrices, Ann. Inst. H. Poincar´ e Anal. Non Lin´ eaire\n20(2003), 579–624.\n[BV] C. Bonatti, M. Viana, Lyapunov exponents with multipli city 1 for deterministic products\nof matrices, Ergodic Theory Dynam. Systems 24(2004), 1295–1330.\n[BG] J.Bourgain, M.Goldstein, On nonperturbative localiz ation with quasi-periodicpotential,\nAnn. of Math. 152(2000), 835–879.\n[BS] J. Bourgain, W. Schlag, Anderson localization for Schr ¨ odinger operators on Zwith\nstrongly mixing potentials, Commun. Math. Phys. 215(2000), 143–175.\n[B] R. Bowen, Equilibrium States and the Ergodic Theory of Anosov Diffeomo rphisms, Lec-\nture Notes in Mathematics 470, Springer-Verlag, 1975.\n[BDF+] V. Bucaj, D. Damanik, J. Fillman, V. Gerbuz, T. Vanden Boom, F. Wang, Z. Zhang,\nLocalization for the one-dimensional Anderson model via po sitivity and large deviations\nfor the Lyapunov exponent, Trans. Amer. Math. Soc. 372(2019), 3619–3667.\n[CKM] R. Carmona, A. Klein, F. Martinelli, Anderson localiz ation for Bernoulli and other sin-\ngular potentials, Commun. Math. Phys. 108(1987), 41–66.\n[DF] D. Damanik, J. Fillman, One-Dimensional Ergodic Schr¨ odinger Operators – I. Gen-\neral Theory , Graduate Studies in Mathematics 221, American Mathematical Society,\nProvidence, RI, 2022.\n[DT1] D. Damanik, S. Tcheremchantsev, Power-law bounds on t ransfer matrices and quantum\ndynamics in one dimension, Commun. Math. Phys. 236(2003), 513–534.\n[DT2] D. Damanik, S. Tcheremchantsev, Upper bounds in quant um dynamics, J. Amer. Math.\nSoc.20(2007), 799–827.\n[DKP] P. Duarte, S. Klein, M. Poletti, H¨ older continuity of the Lyapunov exponents of linear\ncocycles over hyperbolic maps, Math. Z. 302(2022), 2285–2325.\n[GZ] L. Ge, X. Zhao, Exponential dynamical localization in e xpectation for the one dimen-\nsional Anderson model, J. Spectr. Theory 10(2020), 887–904.\n[GK] A. Gorodetski, V. Kleptsyn, Parametric Furstenberg th eorem on random products of\nSL(2,R) matrices, Adv. Math. 378(2021), Paper No. 107522, 81 pp.\n[GS] S. Gou¨ ezel, L. Stoyanov, Quantitative Pesin theory fo r Anosov diffeomorphisms and\nflows,Ergodic Theory Dynam. Systems 39(2019), 159–200.\n[JS] S. Jitomirskaya, H. Schulz-Baldes, Upper bounds on wav epacket spreading for random\nJacobi matrices, Commun. Math. Phys. 273(2007), 601–618.\n[JSS] S. Jitomirskaya, H. Schulz-Baldes, G. Stolz, Delocal ization in random polymer models,\nComm. Math. Phys. 233(2003), 27–48.\n[JZ] S. Jitomirskaya, X. Zhu, Large deviations of the Lyapun ov exponent and localization for\nthe 1D Anderson model, Commun. Math. Phys. 370(2019), 311–324.36 ARTUR AVILA, DAVID DAMANIK, AND ZHENGHE ZHANG\n[LV] E. Lesigne, D. Voln´ y, Large deviations for martingale s,Stochastic Process. Appl. 96\n(2001), 143–159.\n[PP] K. Park, M. Piraino, Transfer operators and limit laws f or typical cocycles Commun.\nMath. Phys. 389(2022), 1475–1523.\n[P] L. Pastur, Spectral properties of disordered systems in the one-body approximation,\nCommun. Math. Phys. 75(1980), 179–196.\n[V] M. Viana, Almost all cocycles over any hyperbolic system have non-vanishing Lyapunov\nexponents, Ann. of Math. 167(2008), 643–680.\nInstitut f ¨ur Mathematik, Universit ¨at Z¨urich, Winterthurerstrasse 190, 8057 Z ¨urich,\nSwitzerland and IMPA, Estrada D. Castorina 110, Jardim Bot ˆanico, 22460-320 Rio de\nJaneiro, Brazil\nEmail address :artur@math.sunysb.edu\nDepartment of Mathematics, Rice University, Houston, TX 7700 5, USA\nEmail address :damanik@rice.edu\nDepartment of Mathematics, University of California, River side, CA-92521, USA\nEmail address :zhenghe.zhang@ucr.edu" }, { "title": "2402.00252v1.Reformulating_polarized_radiative_transfer___I__A_consistent_formalism_allowing_non_local_Magnus_solutions.pdf", "content": "Astronomy &Astrophysics manuscript no. aanda ©ESO 2024\nFebruary 2, 2024\nReformulating polarized radiative transfer\nI. A consistent formalism allowing non-local Magnus solutions\nE.S. Carlin1, S. Blanes2, F. Casas3\n1Instituto de Astrofísica de Canarias (IAC), E-38205, La Laguna, Tenerife, Spain\ne-mail: ecarlin@iac.es\n2Instituto de Matemática Multidisciplinar, Universitat Politècnica de Valencia, E-46022 Valencia, Spain\n3Departament de Matemàtiques, Universitat Jaume I, E-12071 Castellón, Spain\nReceived January 1, 2024; accepted XXXX\nABSTRACT\nThe physical diagnosis of the solar atmosphere is achieved by solving the polarized radiative transfer problem for plasmas in Non-\nLocal Thermodynamical Equilibrium (NLTE). This complex scenario poses theoretical challenges for integrating the radiative transfer\nequation (RTE) e fficiently and demands better numerical methods for synthesis and inversion of polarization spectra. Indeed, the\ncurrent theory and methods are limited to constant propagation matrices, thus imposing local solutions. To spark significant advances,\nwe propose a formalism that reformulates the polarized transfer problem. Namely, this paper lays the foundations to achieve a non-\nlocal geometrical integration of the RTE based on the Magnus expansion. First, we revisit the statement of the problem and its general\nsolutions in Jones and Stokes formalisms to clarify some inconsistencies in the literature, and to unify and update the nomenclature.\nLooking at both formalisms as equivalent representations of the Lorentz /Poincaré group of rotations, we interpret the RTE in terms\nof Lie group theory to remark the suitability of the Magnus expansion for obtaining accurate non-local solutions. We then present a\ndetailed algebraic characterization of the propagation matrix involving a new generalized Lorentz matrix. Combining this, our \"basic\nevolution\" theorem, and the Magnus expansion, we reformulate the homogenous solution to the RTE in Stokes formalism. Thus,\nwe obtain the first compact analytical evolution operator that supports arbitrary spatial variations of the propagation matrix to first\norder in the Magnus expansion, paving the road to higher orders. Finally, we also reformulate the corresponding inhomogeneous\nsolution as an exact equivalent homogeneous system, which is then solved analytically with the Magnus expansion. This gives the\nfirst e fficient and consistent formal solution of the RTE that furthermore is non-local, natively accurate (prevents any numerical break\ndown of the group structure of the solution), and that separates the integration from the formal solution. Such disruptive formulation\nleads to a new whole family of numerical radiative transfer methods and suggests accelerating NLTE syntheses and inversions with\nnon-local radiative transfer. With minor cosmetic changes, our results are valid for other universal physical problems sharing the\nLorentz /Poincaré algebra of the RTE and special relativity (e.g., motion of charges in inhomogeneous electromagnetic fields).\nKey words. Sun: atmosphere – radiative transfer – polarization. ......\n1. Introduction\nAstrophysics studies the distant universe through light. There-\nfore, it is of upmost importance to have a precise understanding\nof how light is a ffected by di fferent physical processes. In the\nframework of Maxwell’s electromagnetic wave theory, a light\nbeam is fully characterized by the spectra of intensity and of po-\nlarization, as described either by the Stokes /Müller formalism\nor equivalently by the Jones formalism (Landi Degl’Innocenti &\nLandolfi 2004; Stenflo 1994). Currently, the measurement and\ninterpretation of Stokes spectropolarimetry in atomic and molec-\nular spectral lines is the preferred and best known way of di-\nagnosing astrophysical plasmas. Namely, the Stokes vector is a\npractical and powerful way to describe any partially (i. e. natu-\nrally) polarized light beam by providing four vector components\nquantifying the number of photons and their direction of oscilla-\ntion in the reference frame of the light beam and using common\n(intensity) units (Born & Wolf 1980).\nHaving a way of quantifying polarization, the next step is\nto describe its transference through a plasma with the polarized\nradiative transfer equation (RTE). The best scenario to investi-\ngate this key astrophysical problem is the near solar atmosphere.In such a context with spatial resolution, radiative transfer is\na fundamental part of the Non-Local Thermodynamical Equi-\nlibrium (NLTE) problem, in which radiation emitted at a given\npoint modifies, via radiative transfer, the physical state of other\ndistant points in the solar atmosphere. The polarized RTE con-\ntains a four-dimensional propagation matrix quantifying the mi-\ncroscopic physics through optical coe fficients that depend on an-\ngle, wavelength, and distance along the ray. This makes the in-\ntegration of the RTE the most frequent and complex operation\ncarried out in NLTE iterative schemes, specially when consider-\ning multidimensional solar models. One of the motivations for\nthe present paper is to accelerate the NLTE calculations by solv-\ning the RTE with more consistent, robust, and accurate methods.\nBut this implies to beat a more fundamental goal: solving the\nRTE consistently in spatially resolved solar models without as-\nsuming constant local properties . Let us see why this is the next\nfrontier in polarized radiative transfer.\nAfter Unno (1956) pioneered the first derivation of the RTE\naccounting for magnetic fields, Rachkovsky (1967) completed\nthe equation and gave a first analytical solution valid for spa-\ntially homogeneous (Milne-Eddington) atmospheres with con-\nstant propagation matrix. Later, van Ballegooijen (1985) and\nArticle number, page 1 of 22arXiv:2402.00252v1 [astro-ph.SR] 1 Feb 2024A&A proofs: manuscript no. aanda\nLandi Deglinnocenti & Landi Deglinnocenti (1985) provided\nspecific evolution operators solving the homogeneous RTE with\nconstant spatial properties. However, spatial variations are not\nnegligible in the solar atmosphere. Soon it was known that the\nnumerical solutions of the RTE improved when subdividing the\natmosphere into numerous layers (e.g., Rees et al. 1989; Bellot\nRubio et al. 1998) and the need for models with spatial varia-\ntions was confirmed by numerical inversions of observed solar\nStokes profiles (Collados et al. 1994; Del Toro Iniesta & Ruiz\nCobo 1996).\nAt the beginning, the inhomogeneous character of the solar\natmosphere was mainly attributed to the large-scale stratification\nin density, temperature, and magnetic field. However, the evolu-\ntion of telescopes and simulations has also shown omnipresent\nsmall-scale variations. In particular, synthetic MHD solar mod-\nels started to support large inhomogeneity due to macroscopic\nmotions, especially in the dynamic chromosphere (e.g., Carlsson\n& Stein 1997). Indeed, plasma velocity gradients in sound /shock\nwaves are main sources of solar small-scale variations and dis-\ncontinuities, having a large and specific impact in the polariza-\ntion via radiative transfer e ffects (Carlin et al. 2013), either due\nto their modulation of radiation field anisotropy (Carlin & Asen-\nsio Ramos 2015) and /or due to a relatively new phenomenon that\nwe call dynamic dichroism (Carlin 2019).\nIn order to cope with spatial atmospheric variations in re-\nsolved atmospheres with formalisms based on constant proper-\nties, strategies such as \"ray characteristics\" (e.g., Kunasz & Auer\n1988) and several integration numerical methods have been de-\nveloped. Some of the most representative are: the piecewise con-\nstant Evolution Operator method (van Ballegooijen 1985; Landi\nDeglinnocenti & Landi Deglinnocenti 1985, hereafter vB85 and\nLD85), the “DELO” methods (Rees et al. 1989) of linear, semi-\nparabolic, and parabolic kind (see Janett et al. 2017, and refer-\nences therein); and the order-3 DELO-Bezier (De la Cruz Ro-\ndríguez & Piskunov 2013) and Hermite (Bellot Rubio et al.\n1998) methods. Numerically, these schemes are considered ad-\nvantageous against older standards, such as the diagonalization\nof the propagation matrix (Šidlichovsky,1976) or the Runge-\nKutta scheme, which demands a too large number of grid points\ncontrolled by the eigenvalues of the propagation matrix (Landi\nDegl’Innocenti 1976).\nHence, despite nowadays we know that both large and small\nscale spatial variations are needed to represent stellar atmo-\nspheres, all existing numerical methods for solving the polarized\nRTE in solar physics and astrophysics remain limited to constant\nspatial properties. The bottleneck is in a theory based on an evo-\nlution operator constrained to constant propagation matrix. Thus,\nin order to approach the limit of constant properties in every nu-\nmerical cell, the current methods demand to sequentially solve\nthe RTE many times along every ray. This process scales with\nthe resolution of the models, becoming a main source of compu-\ntational cost. In addition, the approach cannot be exact because\nthe limit of constant properties is never fully achieved due to the\nfact that the radiative transfer depends on several atmospheric\nphysical quantities with di fferent sources of gradients and scales\nof variation. Furthermore, it cannot be achieved simultaneously\nand equally for all wavelengths (e.g.around a spectral line) be-\ncause the integration step of any numerical cell change with\nwavelength (e.g. because opacity does it). This fact is reinforced\nby the sensitivity of the optical depth step to Doppler shifts and\nopacity variations in the atmospheres.\nAnother issue that is never mentioned is that current methods\npropagate the physical solution along the light beam by imposing\nan emissivity that does change continuously while the propaga-tion matrix is locally constant, which is inconsistent. Physically,\nit is incorrect because emissivity cannot change if the propaga-\ntion matrix is constant, but it also corrupts indirectly the mathe-\nmatical meaning of the RTE by breaking its Lie group structure.\nIn other words, current methods are actually not solving the tar-\nget physical problem, but a di fferent one.\nFor reasons like these, it should be expected that the numer-\nical properties of current methods are limited by construction:\nthey are not designed for spatial variations. Obviously, all this\nhas negative consequences in the more general NLTE problem.\nIn the work starting here, we clarify these limitations while mov-\ning to the real case in which arbitrary spatial variations can be\nconsistently accounted in the RTE. Until now, the only attempt to\nsolve this general problem was made by Semel & López Ariste\n(1999) and López Ariste & Semel (1999), hereafter SLA99 and\nLAS99. Considering the group structure of the RTE, they applied\nthe Wei & Norman (1963) method to formally pose a non-local\nevolution operator based on products of exponentials. However,\ntheir formulation does not provide a closed formula for the ra-\ndiative transfer solution and demands to solve several di fferential\nequations for the optical coe fficients of the RTE, such that they\ndid not materialize it numerically arguing that it would not be\neconomic. Without discarding their results, which will be com-\npared with ours a posteriori, we present a di fferent approach.\nHere we must mention the key problem of commutativity:\nwhen an atmosphere varies spatially, its propagation matrices\ndo not generally commute between points, which complicates\nan exact solution. SLA99 saw this as a limitation, arguing that,\nwithout commuting layers, the solution requires constant propa-\ngation matrices and forces a discretization of the atmosphere. In\nour work, we assume a discretization and arbitrary spatial vari-\nations as requirements. Consequently, we fully embrace non-\ncommutativity as part of the problem, posing the foundations\nto incorporate it in the theory. To do this, we use the Magnus\nexpansion (Magnus 1954), an approach that SLA99 explicitly\nintended to avoid due to its complexity. Among its several re-\nmarkable aspects (e.g., Blanes et al. 2009), this object preserves\nthe algebraic group structure and intrinsic properties of the exact\nsolution after truncation in the algebra of a Lie group. As will\nbe seen later, its group elements are neatly defined with a single\nexponential, thus avoiding products of exponentials, di fferential\nformulations, and (inexact) perturbative developments.\nThis paper has to be understood as the first of a series where\nwe reformulate the radiative transfer problem with the Magnus\nexpansion. Here, we present the general theory of our formalism:\n1) In Section 2, we re-derive the RTE and its general so-\nlutions both in Stokes and Jones formalisms, using a common\nframework and nomenclature and stating some relations that are\nunclear in the literature. This introductory step is also necessary\nto motivate the future extension of our approach to the Jones\nformalism, where the solution and the Magnus expansion could\nadopt an advantageous analytical form.\n2) In section 3, we set a minimal framework to work with\nLie group rotations, showing the limitations of current evolution\noperators, and introducing the Magnus solution and our Basic\nEvolution theorem to solve the exact exponential of any integral\nof the propagation matrix.\n3) Section 4 combines some aspects of Lie group representa-\ntion and multidimensional rotations, leading to a detailed charac-\nterization of the propagation vector and the propagation matrix.\n5) In Section 5, we calculate our compact analytical evolu-\ntion operator using the Magnus solution to first order.\n6) Finally, Section 6 reformulates and calculates the inhomo-\ngeneous formal solution in Stokes formalism.\nArticle number, page 2 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\n2. A brief description of natural polarized light\nElectromagnetic waves travel along the direction of propagation\nk=E×B, as the electric field oscillates and rotates in the plane\nΠ⊥k. We adopt a right-handed reference system ( ˆe1,ˆe2,k) with\ntwo perpendicular unit vectors ˆe1andˆe2contained in Π. Natural\nlight is then described as an incoherent superposition of waves in\na wave packet constrained to a small range of wavenumbers ∆k\naround k, hence having a finite but small (quasi-monochromatic)\nfrequency bandwidth ∆ω≈c|∆k|and an angular spread in the\nsolid angle ∆Ω≈|∆k|/k. Integrating in δkall waves in the range\n∆k, the total electric oscillation at any point P in Πis:\nE(P,t)=Reh\n(E1(P,t)ˆe1+E2(P,t)ˆe2)e±i(k·rP−ωt)i\n, (1)\nwhere\nEi(P,t)=Z\nd3(δk) n(δk) Ei(k+δk) e±i(ϕi+δk·rP−δωt)(2)\nare the total complex electric field amplitudes of the wave\npacket along each reference axis, while Ei(k+δk) andϕiare\nthe corresponding real electric amplitudes and phases for every\nsingle wave with wavenumber k′=k+δkand angular frequency\nω+δω=c|k′|. Finally, n(δk) is the number density of waves in\nthe three-dimensional wavenumber space.\nTwo signs are possible in the above exponentials. Following\nLandi Degl’Innocenti & Landolfi (2004), we choose as conven-\ntion the positive sign (i.e., negative temporal exponent).\nWith products of the electric amplitudes given by Eq. (2)\nwe can define the average polarization tensor J i j. From it, we\nalso define the Stokes vector I=(I,Q,U,V)⊺, which quantifies\nthe observable properties of the average polarization ellipse pro-\nduced by the total electric field vector oscillating in Π. These\ntwo quantities1are related as ( uis a constant converting from\nsquared electric field to intensity units):\nJ=u· \n \n !\n=1\n2· \nI+Q U−iV\nU+iV I−Q!\n(3a)\nI=J11+J22, Q=J11−J22,\nU=J12+J21, V=i(J12−J21), (3b)\nThus, a light beam propagating along khas a total number of\nphotons quantified by Stokes I, a linear polarization defined by\nboth Stokes Q and U along two reference directions in Π, and\na circular polarization given by Stokes V , which is the di ffer-\nence between right-handed and left-handed circularly polarized\nphotons using kas reference direction. Hence, Stokes V quan-\ntifies the rotation of the electric field vector around k. By con-\nvention, it is defined positive /negative when that field is seen\nrotating clockwise /counter-clockwise from the observer (right-\nhanded /left-handed circular polarization).\nA consequence of considering a realistic superposition of\nquasi-monochromatic waves to quantify polarization is that the\nideal physical relation I2=Q2+U2+V2, holding for a\nmonochromatic wave, is substituted by the constrain:\nI2>Q2+U2+V2(|J|,0). (4)\nEquation (4) defines the Poincaré sphere by mapping the Stokes\nvector with points in the three-dimensional space Q/I,U/I,V/I\n1The average character of JandScomes from averaging (with the\noperator<...> ) the bilinear products of electric amplitudes in Eq. (3a)\nover time scales much larger than the period of the waves.(Shurcli ff2013). The polarization degree is the radius of such\nsphere p=p\nQ2+U2+V2/I<1, meaning that the wave\npacket has become partially polarized because there are photons\nthat do not contribute to Q, U or V .\n2.1. The evolution equation for polarized radiation\nWe now consider a general atmosphere with di fferent complex\nrefractive indices nαalong each perpendicular spatial direction\nαin an atmosphere reference frame. From Eq.(1), one can then\nderive the spatial evolution of the transverse components of the\nelectric field for a stationary quasi-monochromatic wave in our\nbasis ( ˆe1,ˆe2,k) as a function of the optical properties of the\nmedium, and from there the components Ji jin Eq.(3a). Assum-\ning the physical conditions associated to astrophysical plasmas\n(natural light in linear optics regime2), and calling sthe geomet-\nrical distance along the ray k, the result is (Landi Degl’Innocenti\n& Landolfi 2004, Sect. 5.2) :\ndJi j\nds=−2X\nk=1(P∗\nikJk j+PjkJik),(i,j=1,2) (5)\nwhere the propagation tensor is3Pjk=−ikgα\njknαwith real and\nimaginary parts ¯Pjk+i˘Pjk. However, in astrophysics we use opti-\ncal coe fficients instead of the propagation tensor. We have found\nthe following succint relations holding between them:\nηI=P∗\n11+P∗\n22, η Q+iρQ=P∗\n11−P∗\n22, (6a)\nηU+iρU=P∗\n12+P∗\n21, η V+iρV=i(P∗\n12−P∗\n21), (6b)\nwhere we shall call propagation vector to that with components:\nak=ηk+iρk, k=1,2,3 (7)\nHereafter, k=0,1,2,3 refer to quantities associated to Stokes\nvector components I,Q,U,V. Thus, the above coe fficients de-\nscribe total absorption ( η0), dichroism ( η1,2,3) and anomalous\ndispersion ( ρ1,2,3) for the corresponding Stokes parameter. Since\nlight propagates through an anisotropic plasma while oscillating\ntransversally, the complex components of the electric field, ε1\nandε2, find di fferent refraction indexes along the transfer, which\nexplains the meaning of each optical coe fficient.4.\nThe RTE is completed adding to Eq.(5) a term with emis-\nsivity coe fficientsϵ0,1,2,3quantifying the sources of photons. The\nemissivity and the seven propagation coe fficients are involved\nfunctions of wavelength, propagation angle, and other parame-\nters defining the micro-physics of the atmosphere (temperature,\nvelocity, density, and magnetic field). We shall assume them al-\nready calculated for every wavelengh and spatial point along a\ngiven ray of light.\n2This means that the dielectric properties of the medium does not de-\npend on the amplitude of the electric field, and that the dielectric con-\nstants of the medium are close to one.\n3This summation changes from the basis of the atmosphere ( ˆuα) to that\nof the electric field ( ˆej), with coe fficients gα\njkquantifying the geometry\nof propagation.\n4Dichroism is explained as the preference of the plasma to absorbe\nphotons oscillating along a given direction (selective absorption of po-\nlarization states) and it is connected with a di fferential attenuation be-\ntween the modulus of ε1andε2. Anomalous dispersion ( ρQ,U,V) is the\nability of the plasma element to dephase ε1andε2, which couples polar-\nization states, inducing mutual conversions as they propagate. Finally,\nthe absorption η0quantifies the total number of photons absorbed per\nunit distance in any polarization state (intensity), and it is related to\nvariations in the total modulus of the refraction index. Emissivity quan-\ntifies the opposite process in which the atoms re-emit energy previously\nabsorbed from collisional and radiative processes.\nArticle number, page 3 of 22A&A proofs: manuscript no. aanda\n2.2. Radiative transfer equation in the Jones formalism\nDeveloping Eq.(5), adding the source term, and considering the\nrelations in Eqs.(3b) and (6), we obtain the RTE in terms of 2x2\nmatrices (Jones formalism; see Shurcli ff2013):\nd\ndsJ=E−(˜KJ+J˜K+), (8)\nwhere the emissivity term is\nE=1\n2· \nϵI+ϵQϵU−iϵV\nϵU+iϵVϵI−ϵQ!\n, (9)\nthe 2x2 propagation matrix is:\n˜K=1\n2· \nηI+aQaU−iaV\naU+iaVηI−aQ!\n. (10)\nandJwas written in terms of the Stokes parameters in Eq.(3a).\nThese equations di ffer from those in van Ballegooijen (1985)\n(also Kalkofen 1987) in some aspects. First of all, we use a more\nconvenient, modern and general nomenclature. Namely, we do\nnot constrain the equations to the particular geometry of a strat-\nified atmosphere, we use geometrical distance along the optical\npath instead of optical depth as the evolution parameter, and we\ndo not assume yet any particular expressions for the optical co-\nefficients, allowing to represent any general physical situation\nto describe the plasma element (e.g. to consider scattering po-\nlarization, Hanle physics, etc.). Secondly, we use the definition\nak=ηk+iρkin Eq. (7), instead of the frequency profiles associ-\nated toηk−iρk, to obtain compact and cleaner expressions. This\nalso allows us to present similar treatments for both Stokes and\nJones formalisms and thus compare them using similar quan-\ntities agreeing with the monograph of Landi Degl’Innocenti &\nLandolfi (2004).\nFinally, with respect to vB85’s, our expressions have non-\nobvious sign di fferences in all ϵV,aV, and Stokes V, which de-\nmands an explanation. The convention of signs mentioned after\nEq. (2) for the temporal exponentials of the electric field sets\nthe handedness (sign) of Stokes V: inverting the convention is\nequivalent to complex conjugation in the polarization tensor and\ntherefore in Stokes V , as obvious from Eqs. (3). Despite vB85’s\nspecifies our same (right-handed) basis for the electric field, that\nauthor does not specify a sign convention. A direct calculation\nshows that the sign di fferences comes from that issue, and that\nour choice leads to the same 2 ×2 system of matrices if akis\ndefined as we did. In summary, one convention corresponds to\nour equations, while the other one uses instead ak=ηk−iρkand\nnegative signs for the exponentials in Eqs. (1) and (2). These lat-\nter choice would imply doing J→J∗,iV↔− iV,iaV↔− iaV,\nandiϵV↔− iϵVin our Jones formulation.\n2.3. Radiative transfer equation in Stokes formalism\nCarrying out the matrix products in Eq.(8) and separating real\nand imaginary parts, we obtain the polarized RTE in Stokes’\nformalism. It is a system of four coupled first-order, ordinary\ndifferential equations whose homogeneous /inhomogeneous term\ncontains the propagation /emissivity matrix /vector (e.g., Landi\nDegl’Innocenti & Landolfi 2004, chapter 8):\nd\ndsI=ϵ−KI, (11)with ϵthe emissivity vector and Kthe 4x4 propagation matrix:\nd\ndsI\nQ\nU\nV=ϵI\nϵQ\nϵU\nϵV−ηIηQηUηV\nηQηIρV−ρU\nηU−ρVηIρQ\nηVρU−ρQηII\nQ\nU\nV.(12)\nThe Stokes and Jones formalisms are equivalent in that they de-\nscribe the same physical problem (e.g., Sanchez Almeida 1992).\nThe fact that one can derive the Stokes RTE from Jones’ proves\nthis. Historically, the solar and astrophysical community has pre-\nferred the Stokes formalism. The reason to include them both in\nthis first paper is to facilitate a posterior comparison from the\nstandpoint of our formulation, because the algebraic properties\nof the Jones 2×2 matrices could imply advantages when working\nwith the Magnus expansion.\n2.4. Generic solution in Jones formalism\nIn order to solve the RTE, one first consider its homogeneous\npart, i.e. the RTE without emissivity, and then use it to solve\nthe inhomogeneous part. For the Jones formalism, we follow a\nderivation similar to that of vB85, but adapting it to our general\nnomenclature and adding small improvements. First, we assume\nan homogeneous solution to Eq. (8) as the following variation of\na certain auxiliar Jaalong the trajectory parameter s:\nJ(s)=O(s,s0)Ja(s)O†(s,s0), (13)\nwhere5the evolution operator O≡O(s,s0;˘K) is a 2×2 complex\nmatrix fulfilling:\ndO\nds=−˘K(s)O, \n⇒dO†\nds=−O†˘K†(s)!\n, (14)\nDifferentiating Eq. (13) with respect to s, substituting Jand its\nderivative in Eq. (8), and removing terms cancelling each other,\nwe obtain:\ndJa(s)\nds=O−1E(s) [O−1]†, (15)\nwhose integral\nJa(s)=Ja(s0)+Zs\ns0ds′O−1(s′,s0)E(s′) [O−1]†(s′,s0), (16)\nis then inserted into Eq. (13). Now, we improve the result of\nvB85 by specifying the boundary term and combining evolution\noperators to the left and to the right into a total evolution operator\nOT. Thus, we obtain our generic inhomogenous solution in Jones\nformalism:\nJ(s)=J(s0)+Zs\ns0ds′OT(s,s′)E(s′)O†\nT(s,s′), (17)\nwhere\nOT(s,s′)=O(s,s0)·O−1(s′,s0). (18)\nand where the first term is the boundary contribution, which in\nanalogy with Eq.(13), has been called\nJ(s0)=O(s,s0)Ja(s0)O†(s,s0). (19)\nVB85 did not specify the boundary term because applied the so-\nlution to an optically thick atmosphere as a whole piece, in which\n5A†denote the conjugate transpose or Hermitian adjoint of A.\nArticle number, page 4 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\ncase the boundary term cancels out due to the physical properties\nof the boundaries (zero illumination for incoming rays and op-\ntically thick atmosphere for emerging rays). But in practice, the\natmosphere is discretized and the integrals are applied sequen-\ntially to every cell of a reduced physical domain that is optically\nthin. Hence, we need to retain and specify the changing bound-\nary contribution for each step. Note that in Eq. (17) the total solu-\ntion is the direct addition of an integral to the previous solution\nat the boundary, without multiplying the latter by an evolution\noperator as in the Eq. (23) of the Stokes formalism.\n2.5. Generic solution in Stokes formalism\nFrom Eq.(11), the homogenous RTE in Stokes formalism is\nposed as the initial value problem:\ndI(s)\nds=−K(s)I(s); I(s0)=I0, (20)\nIntegrating in an interval ∆s=s−s0, its homogeneous formal\nsolution is given by an evolution operator O(s,s0;K) applied to\nthe initial value\nI(s)=O(s,s0;K)·I(s0), (21)\nwith Os\ns0≡O(s,s0;K) being solution to6\nd\ndsOs\ns0=−K(s)Os\ns0, Os0s0=1 (22)\nOnce the evolution operator is known, the general formal inho-\nmogenous solution to the RTE is posed\nI(s)=O(s,s0)I(s0)+Zs\ns0ds′O(s,s′)ϵ(s′). (23)\nThe suitability of this solution is physically and numerically de-\ntermined by the specific expressions adopted for the evolution\noperator and for the above integral. In the following sections, we\nwill both reformulate the evolution operator and the inhomoge-\nneous solution to develop better ways of solving the RTE.\n3. Foundations for reformulating the radiative\ntransfer solution with the Magnus expansion\nIn astrophysics, the term evolution operator has been used to re-\nfer both to a very general concept and to very particular meth-\nods, which is confusing. The concept was originally known in\nmatrix theory as the matricant (Gantmacher 1959), and refers to\nthe matrix advancing the solution of a di fferential equation along\na trajectory of integration. For instance, in Stokes formalism, Eq.\n(21) defines the evolution operator as the 4 ×4 real matrix that,\nwhen multiplied by the Stokes vector at s0, gives the Stokes vec-\ntor solution at point s. Therefore it fully characterizes the final\nsolution, both physically and numerically.\nInstead, the methods associated to the evolution operator\nwere introduced in solar physics by vB85 (see also Kalkofen\n2009) and later by LD85 to approximate explicit analytical evo-\nlution operators for the RTE in the Jones and Stokes formalism,\nrespectively. Essentially, these methods consists in conveniently\ndecomposing a constant propagation matrix to approximate its\nexponential. Thereafter, a numerical representation of it can be\n6This is seen derivating the homogenous equation with respect to s(or\ns0) and using Eq.(21)implemented to obtain the inhomogeneous solution for the trans-\nfer between s0andsfrom Eqs. (23) or (17). Thus, to solve them\nwe need an explicit expression for the evolution operator (homo-\ngeneous solution), and a way of solving the integrals (inhomo-\ngeneous solution).\nThe numerical approximations to the evolution operator are\napparently easier than the analytical ones in their formulation,\nwhich made them dominate in our field. However, an analyt-\nical approach as the one we are going to develop can lead to\nmore accurate numerical implementations because part of the\nresult has been already calculated analytically and exactly. Fur-\nthemore, it allows to study the theoretical dependence of the so-\nlution on some parameters. The key to develop a suitable analyti-\ncal solution that can later be translated into a powerful numerical\nmethod is to respect the Lie group structure of the RTE, which\npreserves the qualitative properties of the exact solution. As part\nof the foundations supporting our work with the Magnus expan-\nsion, we present now a brief conceptual framework to interpret\nthe evolution of the solution to the RTE from the point of view\nof Lie groups7.\nIn particular, a Lie group is a group of elements with a main\ngroup operation mapping its elements smoothly to form a di ffer-\nentiable manifold M(topological condition), but also fulfilling\nan algebraic condition: the result of combining the elements of\nMtogether with the operation of commutation stays in M. The\ninterest in Lie groups for solving di fferential equations is that be-\ning di fferentiable, hence analytical, there exists tangents to them\nat any point p∈M . A tangent vector at pcan be defined by dif-\nferentiating a smooth parametric curve γ(s) such thatγ(0)=p\n7In general, a group Gis a set of elements Ai∈G that together with\na binary operation fulfills the axioms of closure ( A1·A2=A3∈G),\nassociativity ( A·(B·C)=(A·B)·C), and existence of neutral, identity,\nand inverse ( A·A−1=1). We shall only consider Lie groups of invert-\nible (hence square) N×Nmatrices with the ordinary product as group\noperation and the commutator as the Lie bracket.\nFig. 1. Solution to the RTE evolving in the ordinary 3D space of the ray\n(orange) and in the 4D space of the Poincaré group (red). A local solu-\ntion (white circles) is an element of the Lie group and an exponential\nmap of vector fields (blue) associated to the corresponding Lie algebra.\nArticle number, page 5 of 22A&A proofs: manuscript no. aanda\nFig. 2. Examples of basic vector fields (arrows) and corresponding flow solutions (red lines) to the homogeneous RTE for di fferent wavelengths.\nLeft: rotational flow due to magneto-optical e ffects for constant Kin plane Q-U. The trajectory, which should be circular, deviates to describe a\nspiral due to the accumulated inaccuracy error in the standard integration method employed here. Middle: hyperbolic flow due to dichroism in I-V\nplane for constant K. Right: combination of vector fields and evolution of solution in QUV space for non-constant K.\n(e.g., Bonfiglioli & Fulci 2011):\nv=dγ(s−s0)\nds\f\f\f\f\fs=s0(24)\nAs illustrated in Fig. 1, the set of all possible tangent vectors\natpforms the linear vector spaceT(the tangent space of the\ngroup). If locally (in the neighourghood of each p) we associate\nγ(s) with the evolution of the solution to a linear ODE on M,\nthen the infinitesimal advance of the solution at poccurs in a di-\nrection contained in its tangent space. Hence, instead of working\nin the non-linear manifold M, Lie groups o ffer the mathematical\nfoundation for solving the ODE in a linear vector space while\npreserving the local structure of the group.\nThe key to do this is that the elements in Mcan also be ob-\ntained by mapping (e.g., exponentiating) those of the so-called\nLie algebra gof the group. The algebra is defined as the com-\nbination of the tangent vector space around the group identity\nelement with the operation of commutation. In that way, the al-\ngebraic structure of a Lie group is captured by its Lie algebra, a\nsimpler object (since it is a vector space).\nTo particularize these basic ideas, consider the homogeneous\nRTE and its formal solution in Stokes formalism given by Eqs.\n(20) and (21) with system matrix A=−K:\nI′(s)=A(s)I(s); I(s0)=I0, (25)\nI(s)=O(s,s0;A)I0. (26)\nAs the l.h.s. of the RTE is a first derivative with respect to s,A\ncan be seen as a vector field tangent to the s-parametric stream-\nline followed by the system when transiting from I(s0) toI(s) in\nM, while the evolution operator O(s,s0;A) is called the flow of\nAbecause it advances the solution following A. The matrix A\nrepresents a vector field (a.k.a. infinitesimal generator ) when is\nseen as the derivative of the flow at s=s0:\nA=dO(s,s0;A)\nds\f\f\f\f\fs=s0. (27)\nThis operation represents a local coordinate map between the el-\nements of the group and its tangent linear space Tformed by\nthe set of all possible vector fields A. Namely, one can see that\nsuch a coordinate map is possible at the identity of the group,\ni.e. where O(s,s0;A)=1ins=s0. In general, this condition is\nsatisfied if the evolution operator is an exponential map. Then,as commutators of system matrices at points nearby the identity\nelement ([ A1,A2]=A1A2−A2A1) represent the total deriva-\ntive of the vector field Aing, their exponentiation is equivalent\nto infinitesimal translations in the group. A more specific repre-\nsentation of the evolution of the solution to the RTE in terms of\nvector fields and flows is presented in Fig. 2(see caption).\nIn the rest of this section we make the evolution operator\nmore explicit. As it is formally the same in both the Stokes and\nJones formalisms, we shall focus in the former.\n3.1. The universal solution to the evolution operator is a\nseries\nIn general, the evolution operator solving the homogeneous RTE\nin Eq. (25) is given by the V olterra (1887)’s integral equation\nO(s,s0;A)=1+Zs\ns0dtA(t)O(t,s0,A),\n(28)\nafter applying the fundamental theorem of calculus to Eq.(26)\nwith O(s0,s0)=1. A Picard iteration on Eq. (28) can start with\nO(t,s0,A)=0 and be continued up to infinity. Thus, an expres-\nsion for O(s,s0) was first obtained by Peano (1888) (also Peano\n(1890) or translation in Kannenberg (2000)) and further studied\nby Baker (1902, 1905). It is the funny Peano-Baker series:\nO(s,s0;A)=1+HA+HAHA+HAHAHA+...(29)\nwhere H Ais the result of applying the integral operator Hfor in-\ntegrating the matrix A=(a)i jin∆s, i.e. (H A)ij(s)=Rs\ns0dt a i j(t).\nEach term of the series can be recursively written in terms of\nmatrix components:\na(1)\ni j=Zs\ns0dt a i j(t), a(2)\ni j=Zs\ns0dtdX\nn=1ain(t)a(1)\nn j(t), ...\nor directly as:\nO(s,s0;A)=1+Zs\ns0A(t)dt+Zs\ns0A(t1)Zs\ns0A(t2)dt2dt1+...(30)\nWhen A=−Kis constant, Eq. (30) is easily reduced to:\nO(s)=1+A(s−s0)+...+An(s−s0)n\nn!+...=e−K(s−s0)(31)\nArticle number, page 6 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\nThe Peano-Baker series is unique and converges absolutely\nand uniformly in every closed interval where A(s) is continu-\nous and bounded (Ince 1956; Gantmacher 1959). This solution is\nemployed in di fferent contexts, where is often known as the Neu-\nmann series or the Dyson perturbative solution (Dyson 1949).\nThe problem with this series is that, when truncated (either nu-\nmerically or analytically), it stops evolving in the Lie group of\nthe RTE, no longer preserving the algebraic properties of the ex-\nact solution (see e.g. Blanes et al. 2009).\n3.2. The limitations of assuming constant K\nLet us see now how the Peano-Baker evolution operator has been\napproximated to solve the radiative transfer problem in astro-\nphysics. Landi Degl’Innocenti & Landolfi (2004) starts rewriting\nEq. (30) in Stokes formalism. Noting the minus sign acompany-\ningK, one has ( Step-1 ):\nO(s,s0)=1+∞X\nn=1(−1)nZs\ns0ds1Zs1\ns0ds2···\n···Zsn−1\ns0dsnK(s1)K(s2)···K(sn) (32)\nMaking the integration regions independent on the integration\nvariables , one obtains the so-called \"time-ordered\" exponential\nin terms of the (time-)ordered8or chronological product of op-\neratorsP(Step-2 ):\nO(s,s0)=1+∞X\nn=1(−1)n\nn!Zs\ns0ds1Zs\ns0ds2···\n···Zs\ns0dsnP{K(s1)K(s2)···K(sn)}=P\be−Rs\ns0dtK(t)\t(33)\nHere, the Dyson chronological operator Pis such that\nP{K(s1)K(s2)···K(sn)}=K(sj1)K(sj2)···K(sjn)\nsj1≤sj2≤···≤ sjn (34)\nThe ordered exponential can only become an ordinary exponen-\ntial when the products inside the integral commute among all of\nthem ([ K(si),K(sj)]=0), thus setting us free to reorder them. In\nthat case, the products inside the integral become ordinary prod-\nucts of identical integrals and the expression becomes the Taylor\nexpansion of the exponential of such repeated integral( Step-3 ):\nO(s,s0)=1+∞X\nn=1(−1)n\nn!\u0014Zs\ns0dtK(t)\u0015n\n=e−Rs\ns0dtK(t)(35)\nAs it is imposible that all propagation matrices commute among\nthem for all rays inside a realistic solar atmosphere, the only\nplausible assumption to achieve commutation is that the propa-\ngation matrix Kis constant along the whole integration path of\ngeometrical length ∆s=s−s0. But this was already implicit\nin the previous step and any further assumption on the variation\nofK(e.g. to design a numerical method) would be inconsistent.\nThe remaining step now is actually part of assuming a constant\nK, just extracting Kout of the integral to obtain ( Step-4 ):\nO(s,s0)=e−K·(s−s0)(36)\nUntil now, this has been the starting expression to solve any po-\nlarized radiative transfer problem. When calculated numerically,\n8In our case, it is a space-ordered product of operators.it is truncated, and hence it is equivalent to the Peano-Baker se-\nries, with the same truncation problems as Eqs. (30) and (31).\nIn addition, this evolution operator limits the consistency of cur-\nrent approaches to numerical cells with constant properties (lo-\ncal methods of solution). Here, a fully consistent inhomogeneous\nsolution should imply both Kand the emissivity to be constant,\nsimplifying Eq. (23) to the poor approximation\nI(s)=e−K(s−s0)I0+e−Ks\u0014Zs\ns0eKtdt\u0015\nϵ=\n=e−K(s−s0)I0+(1−e−K(s−s0))K−1ϵ (37)\nWe see then that current formal solutions and methods for the\nRTE are physically and mathematically inconsistent because\nthey start from an expression obtained with Kconstant while\nlater assuming that its exponential and the emissivity vary in-\nside the cell when a numerical method is defined. Furthermore,\na simple inspection of the physical dependences driving emis-\nsivity and the propagation matrix shows that one cannot change\nif the other is constant. Thus, the numerical approximations im-\nposed by common radiative transfer methods to pose and calcu-\nlate Eqs. (36) and (23) break the inhomogeneous group structure,\ni.e. their solution does not evolve in its true physical algebraic\ngroup, rendering them both numerically and analytically inac-\ncurate. This shows that the numerical properties of a radiative\ntransfer method should be quantified with a reference solution\nbased on an exact method, i.e. one that respects the evolution in\nthe Lie group to a su fficiently high level of accuracy. To allow\nthis, we need an exact evolution operator: the Magnus solution.\n3.3. Magnus solution: an exact Lie-friendly evolution operator\nInstead of solving Eq. (22) in the Lie group with Eq. (30), Haus-\ndorff(1906) did it generically in the Lie algebra ( g). His general\nsolution was an exponential evolution operator9O=eΩ(s), with\nΩ(s)∈g. From (here A=−Kto avoid confusion with the sign)\ndO\nds=AO⇒\u0012deΩ(s)\nds\u0013\ne−Ω(s)=A, (38)\nhe derived the non-linear di fferential Hausdor ff’s equation for Ω:\ndΩ\nds=∞X\nn=0Bn\nn![A,Ω[n]]. (39)\nTheBnare the Bernoulli numbers10and\n[A,Ω[n]]=[···[[A,nz }| {\nΩ],Ω]···,Ω], (40)\nis the adjoint of Ωwritten as right-nested commutators with\n[A,Ω[0]]=A. The infinite recursive series in Eq. (39) is analytic\nin allCexcept in the points P={2πni,n∈Z>0}. Iteration on\nEq. (39) led Magnus (1954) to the solution Ω(s)=P∞\nk=1Ωk(s)\n9AsΩ(s0)=0⇒O(s0)=1, and O(s) is continuous and invertible\naround s=s0. Then, the inverse evolution operator is O−1=e−Ω(s).\n10The first values are Bn=1,−1/2,1/6,0,−1/30,0,1/42,0,−1/30,...\nwith Bn=0 for any odd n di fferent than 1 (Abramowitz & Stegun 1972).\nArticle number, page 7 of 22A&A proofs: manuscript no. aanda\nwith the Magnus expansion being such that Ω(0)=0and\nΩ1(s)=Zs\ns0d1A1,\nΩ2(s)=−1\n2Zs\ns0\u0014Zs1\ns0d2A2,A1\u0015\nd1,\nΩ3(s)=1\n4Zs\ns0\u0014Zs1\ns0\u0014Zs2\ns0A3d3,A2\u0015\nd2,A1\u0015\nd1,\nΩ4(s)=1\n12Zs\ns0\u0014Zs1\ns0A2d2,\u0014Zs1\ns0A2d2,A1\u0015\u0015\nd1,\nΩ5(s)=−1\n8Zs\ns0\u0014Zs1\ns0\u0014Zs2\ns0\u0014Zs3\ns0A4d4,A3\u0015\nd3,A2\u0015\nd2,A1\u0015\nd1,\nΩ6(s)=−1\n24Zs\ns0\u0014Zs1\ns0\u0014Zs2\ns0A3d3,\u0014Zs2\ns0A3d3,A2\u0015\u0015\nd2,A1\u0015\nd1,\n...\n(41)\nwith dn=dsnandAn=A(sn). This series converges in the\nneighborhood of eΩ(s0)if the di fferences between any two eigen-\nvalues of Ω(s0) is not in P. In general, di fferent terms Ωncom-\npose a certain order kof the expansion. Any of such terms con-\ntains kpropagation matrices, a multivariate integral with knested\nintegrals, and k−1 nested commutators. For n≥3, more than\none term Ωn(s) is always necessary to fully account for any given\norder of the expansion. Thus, conveniently, in this paper we shall\nonly consider Ω1andΩ2, because they alone fully quantify the\norder 1 and 2 of the expansion respectively, something that does\nnot change in any other formulation of the Magnus expansion.\nIt should be clear that the order we are talking about is that of\nthe Magnus series, not the one of the corresponding numerical\nmethods to be developed to solve the integrals and the RTE.\nA key point here is that, if a truncated Magnus expansion is\nused in approximation of Ω, then the subsequent Magnus meth-\nods shall yet preserve peculiar geometric properties of the solu-\ntion (e.g., preservation of a norm). As the Magnus solution, i.e.\nthe homogeneous solution to the RTE, is in the Lie group, and\nany commutator of A=−Kis in the associated algebra g, then a\nsuitable numerical discretization can also stay on the manifold.\nBy the properties of the integrals, the Magnus expansion also\naccomplishes Ω(s0,s1)+Ω(s1,s2)=Ω(s0,s2) andΩ(s,s0)=\n−Ω(s0,s). Hence, the Magnus evolution operator allows seri-\nalization and preserves a symmetric homogeneous evolution.\nNamely, calling Osj\nsi≡O(si,sj),:\nOs2s0=Os2s1Os1s0, (42a)\nOs0s0=1=Os\ns0·[Os\ns0]−1, [Os\ns0]−1=Os0s, (42b)\nThis could in principle allow using the same homogeneous\nsolution for both outgoing and incoming rays along a same di-\nrection in the solar atmosphere, which might be e fficient when\napplying our methods to the full NLTE problem.\nA deeper analysis of the Magnus expansion is not necessary\nnow (see e.g., Blanes et al. 2009). However, we should point out\nthat there are many ways of formulating it. Interestingly, we havefound that the terms in (41) can be neatly written as\nΩ1(s)=Zs\ns0d1A(s1),\nΩ2(s)=1\n2Zs\ns0\u0014\nA(s1),Ω1(s1)\u0015\nds1,\nΩ3(s)=1\n2Zs\ns0\u0014\nA(s1),Ω2(s1)\u0015\nds1,\nΩ4(s)=1\n12Zs\ns0\u0014\u0014\nA(s1),Ω1(s1)\u0015\n,Ω1(s1)\u0015\nds1,\nΩ5(s)=1\n2Zs\ns0\u0014\nA(s1),Ω3(s1)\u0015\nds1,\nΩ6(s)=1\n2Zs\ns0\u0014\nA(s1),Ω4(s1)\u0015\nds1,\n...(43)\nWith this way of presentation, we point out that the Magnus\nexpansion is a peculiar object that, as a result of the Hausdor ff\niteration, seems to exhibit a certain fractal formal character: its\nterms can be written as functions of lower-order terms chang-\ning at smaller integration scales11. Despite such a character is\npurely formal, it arises our interest in investigating the Magnus\nexpansion from the point of view of fractality.\n3.4. The Basic Evolution (BE) theorem\nThe simplest evolution operator resulting from the Magnus ex-\npansion includes only the first term of the expansion after trun-\ncation of higher-order terms12. A Magnus solution based on at\nleast that first term would be significantly better than one based\non Eq.(36), because the presence of the integral in the Magnus\noperator consistently preserves memory of the evolution, i.e. of\nthe variation of the propagation matrix along the ray. To specify\nthis operator we need to calculate the matrix exponential of in-\ntegrals of the propagation matrix, for which we have derived the\nfollowing theorem.\nConsider the decomposition of an arbitrary matrix N=f# »n·# »σin terms of a real constant f, a vector# »n=(n1,..., nd) with\nmodule n, and a vector# »σ=(σ1,...,σ d) of basis matrices of an\nalgebra g. Our theorem states that if these matrices fulfill\nσi·σj=δi j1+c·ϵi jk·σk, (c=constant) (44)\nthen the exact exponential of the integral of the matrix N is given\nby (see demo in Appendix):\ne±R\nds f·# »n(s)·# »σ=ch(f b)1±sh(f b)# »u·# »σ, (45)\nwhere# »uis the unitary vector resulting of integrating# »nalong\nthe trajectory, such that:\n# »u=# »b\nb=(b1,b2,···,bd)\n[b2\n1+b2\n2+···+b2\nd]1/2(46a)\nbk=Z\nds n k(s) (46b)\n11The formal form of any term always results of substituting a matrix\nAof a term of previous orders by the simplest elemental commutator in\nΩ2. In that sense, the structure of terms could be seen as fractal.\n12This is not the same as assuming constant propagation matrices,\nwhich would also cancel higher-order terms but reducing the first term\nto the common oversimplification given by Eq.(36)\nArticle number, page 8 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\nThe particularization of this general solution to the case of con-\nstant N(i.e., constant nk) gives bk=s·nk,# »u=# »n/nandb=s·n.\nWe identify our solution (45) with a rotor, an element of Clif-\nford geometric algebra. Geometric algebra allows to associate\nalgebraic transformations with space properties (e.g., volumes)\nand to extend the treatment of rotations and the concept of vec-\ntor to an arbitrary number of dimensions without the need of\nimaginary numbers (Hestenes 2003). One of the insights that we\nobtain from identifying Eq. (45) with a rotor is that the evolu-\ntion of the homogeneous solution behaves as a rotation around a\ndirection defined by the vector# »u.\n4. Algebraic representations for the polarization\nApplying the BE theorem to the polarized RTE, one can explain\nthe evolution of the homogeneous solution of the RTE as rota-\ntions in a Lie algebra around the identity of a group. It will be\nthen useful now to consider the basic groups and algebraic struc-\ntures capable of representing rotations (e.g., Hall 2015). Groups\ncan be represented by mapping their elements onto linear op-\nerators (e.g., matrices) acting on some vector space V. But it\nis possible to represent the same group elements using di ffer-\nent kinds of operators, as we do for instance when expressing\nthe RTE in Stokes or Jones formalisms. To easily connect this\nwith rotations, we start considering the simplest example of an\northonormal basis β={(1,0),(0,1)}forV=R2and the coun-\nterclockwise rotation Rθby an angle θ. Applying trigonometry,\nthe basis vectors transform as:\nRθ(1,0)=(cosθ,sinθ), (47a)\nRθ(0,1)=(−sinθ,cosθ). (47b)\nAnd using the transformed vectors as matrix columns we can\nconstruct a parameterized matrix representation of Rθforβ:\nU= \ncosθ−sinθ\nsinθcosθ!\n←→ cosθ+isinθ=eiθ, (48)\nwhere we have also considered that any complex number a+ib\n(with a,b∈R) can also be represented as a real 2 ×2 matrix13\na+ib←→ \na−b\nb a!\n. (49)\nThus, rotations of a vector v=(v1,v2) in a plane can be alge-\nbraically quantified both as Uvor as ( v1+iv2)·eiθ. From here, ro-\ntations in any number of dimensions can be seen as linear super-\npositions of two-dimensional rotations embedded into the higher\ndimensions (any nD rotation is a superposition of 2D rotations\nin planes formed by each couple of dimensions in the space).\n4.1. Rotations in 3D and 4D\nThe group of rotations in ndimensions is the special orthogo-\nnal group SO( n), which leads to the ordinary vector represen-\ntation inRn, whose operators are orthogonal ( UTU=1)Un×n\nmatrices with|U|=1. The corresponding algebra so(n) is com-\nposed by skew-symmetric matrices. Hence, in vector representa-\ntion, three-dimensional rotations can be represented with SO(3).\nHere the Lie algebra so(3) can be expressed either as the Eu-\nclidean space R3with the vector product as the Lie bracket, or\n13This is a ring isomorphism from the field of complex numbers to the\nring of these matrices.as the set of all skew-symmetric matrices with the matrix com-\nmutator as the Lie bracket. Thus the elements of their algebras\nare linked by the map:\n# »n=(n1,n2,n3)←→ N=0−n3n2\nn3 0−n1\n−n2n1 0, (50)\nsuch that a rotation of a vector# »vin a plane with normal vector# »n\nis# »n×# »vorN# »v. An important extension of the group of rotations\nto four dimensions is the Lorentz group SO(1,3), whose elements\nsatisfy\nUTJU=J, (51)\nwith J=diag{1,−1,−1,−1}. Its Lie algebra so(1,3) is deter-\nmined by computing the tangent vectors to parametric curves\ns7→U(s) on SO(1,3) through the identity 1. Hence, di fferen-\ntiating Eq.(51) with U(0)=1, the elements H≡U′(0) of the\nalgebra satisfy:\nHTJ+JH=0, (52)\nwhich implies that JHandHare symmetric in the first dimen-\nsion and skew-symmetric in the others:\nso(1,3)=( 0u\nuTB!\n|u∈R3,BT=−B)\n. (53)\nThis condition is satisfied by the propagation matrix in Stokes\nformalism, and Eq. (51) can then be used to check whether a\nsolution to the RTE belong to its corresponding Lorentz group.\nAn alternative way of representing n-dimensional rotations\nis the special unitary group SU(n), which is the set of all n×n\ncomplex unitary14matrices with unit determinant and whose al-\ngebra su(n) is composed by skew-Hermitian traceless matrices.\nNamely, three-dimensional rotations can be represented in SU(2)\n(spinorial representation). This group uses traceless Hermitian\nmatrices in a vector space H, which maps the vector representa-\ntion in R3through the correspondence:\n# »n=(n1,n2,n3)←→ N= \nn1 n2−in3\nn2+in3−n1!\n∈H, (54)\nThus, from a right-handed base in R3, we construct one in H:\nˆe1=(1,0,0)←→σ1= \n1 0\n0−1!\n, (55a)\nˆe2=(0,1,0)←→σ2= \n0 1\n1 0!\n, (55b)\nˆe3=(0,0,1)←→σ3= \n0−i\ni0!\n, (55c)\nwhereσiare the Pauli matrices15. They satisfy:\nσiσj=δi j1+iϵi jkσk, (56a)\n[σi,σj]=2iϵi jkσk, (56b)\nwithϵi jkthe Levi-Civita permutation symbol16. Defining the\nPauli vector# »σ=(σ1,σ2,σ3), any element of the algebra su(2)\n14A matrix is unitary when A†A=AA†=1.\n15These definitions only di ffer from those used in quantum mechanics\nin the labels: our basis is defined such that the Pauli matrix with complex\nunit is associated to the third axis of the right-handed cartesian base.\n16It is+1/−1 if the number of permutations of ( i,j,k) to obtain (1 ,2,3)\nis odd /even, or 0 if two indices are equal.\nArticle number, page 9 of 22A&A proofs: manuscript no. aanda\nFig. 3. Geometry associated to a±anda2\n±.Right panel : deduction of the triangle r-q-h assuming one of its corners at λ1. To obtain the figure: 1)\nAsa+fits the side of the romboid, we associate it with the distance from η0to the point λ1+iλ3(i.e., as if the origin were at η0); 2) We obtain\nαthrough the area of the romboid A♢=2|ˆa||˜a|=|q|=hsin(2α); 3) As h2=q2+r2and sin(2α)=q/h, we associate h, q, and r with the sides\nof a rectangular triangle with a corner in λ1; 4) We identify auxiliary triangles with sides ˆd,˜dand ˆD,˜D, finding: ˆd+i˜d=(√\nh−1)·(|ˆa|+i|˜a|)\nand ˆD+i˜D=√\nh·(|ˆa|+i|˜a|). 5) Finally, we identify a vector a2\n±=r+iqenclosed in the diagonal of the rectangle of sides r-q-h with origin in\nO′=ˆO′+i˜O′=λ1−reiα. The distance C=OO′is then: C=[(ˆO′)2+(˜O′)2]1/2=[λ2\n1−2rcos(α)λ1+r2]1/2.Left panel :a2\n+anda2\n−when their\norigin O′is chosen at λ2. .\n(i.e., the matrices in Eq.(54)) can be written as N=# »n·# »σ. Ex-\nponentiating and applying the BE theorem (Section 3.4) with\nconstant# »n, one obtains the elements of the group SU(2):\nes# »n·# »σ=ch(θ)1+sh(θ)# »u·# »σ= (57a)\n= \nch(θ)+sh(θ)u1sh(θ) (u2−i u3)\nsh(θ) (u2+i u3) ch(θ)−sh(θ)u1!\n, (57b)\nwith normalized (unitary) vector# »u=# »n/n=(u1,u2,u3), and\na parameter θ=s·n. The latter matrix describes the evolu-\ntion of group elements as hyperbolic rotations by an angle θ\nin a plane with normal unit vector# »uembedded in R3. Thus,\nrotations in R3can be seen as compositions of three indepen-\ndent two-dimensional rotations, one per plane perpendicular to\na cartesian basis axes17. To describe polarized light in Jones for-\nmalism, we work with the special linear group SL(2 ,C), com-\nposed by 2×2 complex matrices with unit determinant. In other\nwords, the Jones formalism is the result of considering the SU(2)\ngroup elements of Eq.(57) with a complex, instead of real, vector# »u. We shall see that in the case of the polarization, the role of# »u\nis played by the (normalized) propagation vector.\n17Pure rotations around such axes would be\nes# »n1·# »σ= \neθ0\n0e−θ!\n(θ=s·n1)\nes# »n2·# »σ= \nch(θ) sh(θ)\nsh(θ) ch(θ)!\n(θ=s·n2)\nes# »n3·# »σ= \nch(θ)−ish(θ)\nish(θ) ch(θ)!\n(θ=s·n3).4.2. The propagation vector\nFor notational compactness, the propagation vector# »a, defined\nin Eq.(7), and its complex conjugate shall be denoted with +and\n−symbols, respectively:\n# »a±=# »η±i# »ρ=(η1±iρ1,η2±iρ2,η3±iρ3). (59)\nThe module aof the complex vectors# »a+and# »a−is a real num-\nber with:\na2=# »a+·# »a−=X\nkaka∗\nk=X\nk|ak|2=η2+ρ2, (60a)\na4=(η2−ρ2)2+(2ηρ)2, (60b)\nwhereη2=# »η2andρ2=# »ρ2. Instead, the vector modules of# »a+\nand# »a−are the complex numbers a+anda−, fulfilling\na2\n±=# »a±·# »a±=r±iq⇒ a±=ˆa±i˜a, (61)\nwith (see Appendix A):\nˆa=ˆs h+r\n2!1/2\n,˜a=˜s h−r\n2!1/2\n(62a)\nh=[r2+q2]1/2=a−·a+=ˆa2+˜a2(∈R) (62b)\nr=ˆa2−˜a2=η2−ρ2(62c)\nq=2ˆa˜a=2(# »η·# »ρ)=2ηρcos(θ) (62d)\nˆs˜s=sign(# »η·# »ρ) (62e)\nHere the signs ˆ sand ˜sare only constrained to Eq. (62e) (see\nAppendix A). Additional relations are:\n|ˆa|4+|˜a|4=h2+r2\n2, (63a)\na2\n±=r±iq=a±2# »ρ·#»a±. (63b)\nArticle number, page 10 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\nFig. 4. Mandelbrot fractal arising from iterating the square of the propa-\ngation vector C+a2\n±shifted for di fferent values of C. The iteration only\nconverges in the white region.\nNote that the real and imaginary parts of a±define the four eigen-\nvalues of the propagation matrix λ1,2,3,4={η0±|ˆa|, η0±i|˜a|},\nsuch that they form an equilateral romboid of side√\nhin the\ncomplex plane. This and the above algebraic relationships can\nbe translated into the geometry of Fig. (3). As explained there,\nthe distances between the eigenvalues of Kcan be related with\nthe propagation vector and its square, given by randqin Eq.\n(61). By choosing a reference system defined by the distance\nC=OO′and inclined with respect to the original real axis by\nan angleα, the projections randqofa2\n+can be made coincident\nwithλ1and be related to the romboid sides. Once the relative\nsize and inclination between r, q, and h has been obtained, we\ncould arbitrarily move and rotate their triangle to a di fferent ori-\nginO′, as shown in the second panel of Fig.(3). Interestingly,\nas the values of randqcompose the squared complex number\na2\n±, they form the Mandelbrot fractal (Mandelbrot 1982) when\n(a2\n±)n+1=(a2\n±)n+Cis iterated for all values of Cin the com-\nplex plane (see Fig. 4). We suspect a possible application of the\nMandelbrot fractal to understand certain aspects of the Magnus\nexpansion (e.g., its convergence properties, or an eventual rela-\ntion among its terms, rotations, and the powers of a±).\n4.3. Algebraic characterization of the propagation matrix\nIn this section, we present the engine of our formalism, a bat-\ntery of decompositions and calculations that allows to under-\nstand the algebra of the propagation matrix and operate con-\nveniently within it. Semel & López Ariste (1999) and López\nAriste & Semel (1999) investigated the RTE in Stokes formal-\nism and found important to investigate the algebraic structure of\nthe polarized RTE. One of their insights was that the Stokes 4-\nvector can be seen as an element of a Minkowski-like R1,3space\n(with Iplaying the role of the temporal dimension) with a metric\nhaving the norm18∥I∥≤I2−Q2−U2−V2. Thus, the RTE\nquantifies all possible infinitesimal transformations between two\nnearby points lying inside the “Stokes cone of light”. Such trans-\n18In the solar atmosphere this norm is close to one because intensity\nand all its related quantities ( I,ηI,ρI) are normally much larger than the\npolarization counterparts because the light is only partially polarized.formations are divided in 11 kinds composing a Poincaré group\n(the inhomogeneous generalization of a Lorentz group) in which\ndilatations are allowed. The inhomogeneous character is given\nby the inhomogeneous term in the RTE, i.e. ϵ, which quantifies\ntranslations along each of the four dimensions. Dilatations ap-\npear due to the diagonal of the absorption matrix in Eq. (12):\nK(s)=η0(s)1+ˆL(s), (64)\nwhich reduces /amplifies the number of reemitted photons\nthrough indiscriminated positive /negative absorption of photons\nin any polarization states as of η0=η(A)\n0−η(S)\n0is dominated by\nordinary absorption ( η(A)\n0as in the solar atmosphere, or by stim-\nulated emission ( η(S)\n0).\nThe remaining (i.e. the homogeneous) part of the Poincaré\ngroup is given by the Lorentz group19SO(1,3), whose elements\nUcan be expressed as exponentials of Lorentz matrices ˆL, ac-\ncomplishing (see Section 4.1):\nUTJU=J, (65a)\nˆLTJ+JˆL=0. (65b)\nwith J=diag(1,−1,−1,−1). The Lorentz matrix ˆLis com-\nposed of the 6 infinitesimal generators of rotations of the Lorentz\ngroup, i.e. the three 4 ×4 matrices ˜G1,˜G2,˜G3generating ordinary\n3D rotations (anomalous dispersion) in the QUV space, plus the\nthree 4×4 matrices ˆG1,ˆG2,ˆG3producing hyperbolic rotations\n(i.e., rotations involving the first dimension) due to dichroism\n(Lorentz boosts in special relativity theory).\nFrom here, our characterization of the propagation matrix\ndistinguishes four algebraic levels associated to decompositions\nin: 1) individual Lorentz generators; 2) base matrices; 3) hy-\nperbolic and circular subspaces; and 4) Lorentz matrices. The\nLorentz generators in the first level are encoded in ˆLas20:\nˆG1+ˆG2+ˆG3+˜G1+˜G2+˜G3=\n=0 1 1 1\n1 0 1−1\n1−1 0 1\n1 1−1 0. (66)\nHere the geometrical symbols point out the only elements of\nthe corresponding generator matrices that are not zero. They de-\nscribe rotations in every subspace and they are all orthogonal\namong them. For all k, we find:\nˆG2\nk−˜G2\nk=1 (67a)\nˆGk·˜Gk=0 (67b)\nˆG2\nk=1k⇒ ˜G2\nk=1k−1, (67c)\nwhere\n1k=1 0 0 0\n0δ1,k0 0\n0 0δ2,k0\n0 0 0 δ3,k. (68)\n19Actually, the group representing the polarization in Stokes formalism\nis SO+(1,3) because, as I≥0, one only needs the positive part of the\n\"Stokes cone of light\" to describe polarization.\n20Our notation emphasizes that they are real and imaginary part of a\nsame complex matrix.\nArticle number, page 11 of 22A&A proofs: manuscript no. aanda\nEquivalently, all the above implies ( ˆGk±i˜Gk)2=1. We also\nintroduce a set of dual generators:\nˆD1+ˆD2+ˆD3+˜D1+˜D2+˜D3=\n=0 1−1 1\n−1 0 1 1\n1 1 0 1\n−1 1 1 0. (69)\nAs before, every dual generator ˆDkor˜Dkis a 4×4 matrix whose\nonly entries di fferent than zero are those pointed out with the\ncorresponding geometrical symbol. Thus, the anticommutators\nof the original generators can be neatly expressed as:\n[ˆGi,ˆGj]+=2·δi j1i+|ϵi jk|˜Dk(∀i,j) (70a)\n[˜Gi,˜Gj]+=2(1i−1)+|ϵi jk|˜Dk(∀i,j) (70b)\n[ˆGi,˜Gj]+=ϵi jk(−1)kˆDk(∀i,j) (70c)\nAnd their ordinary commutators are:\n[ˆGi,˜Gj]=−ϵi jkˆGk(∀i,j) (71a)\n[ˆGi,ˆGj]=ϵi jk˜Gk(∀i,j) (71b)\n[˜Gi,˜Gj]=−ϵi jk˜Gk(∀i,j) (71c)\nInstead of infinitesimal generators, sometimes it is more con-\nvenient to use denser matrices. Thus, our second algebraic level\nconsiders a decomposition in larger subspaces. Namely, we de-\nfine vectors of hyperbolic and ordinary 4 ×4 rotation matrices\n# »ˆG=(ˆG1,ˆG2,ˆG3) (72a)\n# »˜G=(˜G1,˜G2,˜G3), (72b)\nsuch that any Lorentz matrix ˆL(si)≡ˆLi=Hi+Riat a point i\ncan be neatly decomposed into a hyperbolic rotation Hi=# »ηi·# »ˆG\nand an ordinary rotation Ri=# »ρi·# »˜G:\nˆLi=0η1,iη2,iη3,i\nη1,i0 0 0\nη2,i0 0 0\nη3,i0 0 0+0 0 0 0\n0 0 ρ3,i−ρ2,i\n0−ρ3,i 0ρ1,i\n0ρ2,i−ρ1,i 0.\n(73)\nRemarkably, any power n∈ZofHandRcan be reduced to\nH2n=η2(n−1)H2(74a)\nH2n+1=η2nH (74b)\nR2n=(−1)n−1ρ2(n−1)R2(74c)\nR2n+1=(−1)nρ2nR, (74d)\nwhich allows to use power series to calculate exactly any func-\ntion of HorRin terms of only H,R,H2,R2, where H2,R2are\neasily obtained with\nH2=C(# »η), (75a)\nR2=C(# »ρ)−ρ21, (75b)andCis the generic correlation matrix defined as:\nC(# »u)=u20 0 0\n0 u2\n1u1u2u1u3\n0u1u2u2\n2u2u3\n0u1u3u2u3u2\n3. (76)\nFor the crossed products, we find interesting that\nHRH =RHR =(HR)n=(RH)n=0(n∈Z), (77)\nwhile the basic product RHis\n−QT=RH=0 0 0 0\n(# »η×# »ρ)10 0 0\n(# »η×# »ρ)20 0 0\n(# »η×# »ρ)30 0 0, (78)\nforQ=HR. Here the oriented surface vector# »S=# »η×# »ρhas\nas module the area of the paralellogram enclosed by# »ηand# »ρ.\nFurthermore, HandRdo not commute:\n[Hi,Rj]=Q+QT=−(# »ηi×# »ρj)·# »ˆG (H−like) (79a)\n[Hi,Hj]=(# »ηi×# »ηj)·# »˜G (R−like) (79b)\n[Ri,Rj]=−(# »ρi×# »ρj)·# »˜G (R−like). (79c)\nWe also obtain nested commutators that are useful to describe\nthe algebra of the Magnus expansion:\n[...[[H1,R1],R2]...,Rn]=\n=(−1)n(...((# »η1×# »ρ1)×# »ρ2)×...×# »ρn)·# »ˆG (H−like) (80a)\n[...[[H0,H1],H2]...,Hn]=\n=(...((# »η0×# »η1)×# »η2)×...×# »ηn)·# »˜G (R−like) (80b)\n[...[[R0,R1],R2]...,Rn]=\n=(−1)n(...((# »ρ0×# »ρ1)×# »ρ2)×...×# »ρn)·# »˜G (R−like) (80c)\nFinally, we need the anti-commutator [ Hi,Rj]+. Despite being\nskew-symmetric in the hyperbolic space, it cannot be neatly ex-\npressed in terms of vector of matrices with the generators that\nwe have defined, due to an alterning sign:\n[Hi,Rj]+=X\nk(# »ηi×# »ρj)k(−1)kˆDk= (81a)\n=0−S1−S2−S3\nS1 0 0 0\nS2 0 0 0\nS3 0 0 0. (81b)\nThe third algebraic level to consider involves a decomposition in\nbasis matrices. When the vector field of any d-dimensional Lie\nalgebra gis expressed in terms of basis matrices Bi(i=1,..., d),\nthe algebra is characterized by its structure constants ci jk:\n[Bi,Bj]=X\nkci jkBk(∈g)\nWe define our basis matrices in terms of generators as:\nBk=ˆGk−i˜Gk, (k=1,2,3) (82a)\n# »B=(B1,B2,B3), (82b)\nArticle number, page 12 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\nsatisfying\nBiBj=δi j1+iϵi jkBk=[Bi,Bj]++[Bi,Bj]\n2(∀i,j) (83a)\nB∗\niB∗\nj=δi j1−iϵi jkB∗\nk=[B∗\ni,B∗\nj]++[B∗\ni,B∗\nj]\n2(∀i,j) (83b)\nBk·B∗\nk=1+2˜G2\nk=21k−1(∀k) (83c)\n[Bi,B∗\nj]=[B∗\ni,Bj]=0 (∀i,j) (83d)\n[Bi,Bj]=2iϵi jkBk(∀i,j) (83e)\n[B∗\ni,B∗\nj]=−2iϵi jkB∗\nk(∀i,j) (83f)\n[Bi,Bj]+=2δi j1(∀i,j) (83g)\n[Bi,B∗\nj]+=2|ϵi jk|˜Dk+2iϵi jk(−1)kˆDk(∀i,j) (83h)\nThis decomposition leads to a fourth algebraic level involving\nLorentz matrices and the propagation vector. Here, we propose\nthe existence of a generalized (complex) Lorentz matrix:\nL=# »a# »B=ˆL+i˜L. (84)\nIts real part is the ordinary Lorentz matrix ˆLin Eq. (64). How-\never, the imaginary part is a new dual Lorentz matrix containing\nthe same physical information as ˆLbut reorganized such that\n˜L=(# »η·# »ρ)ˆL−1(85a)\nˆL=L+L∗\n2=# »η·# »ˆG+# »ρ·# »˜G (85b)\ni˜L=L−L∗\n2=i(# »ρ·# »ˆG−# »η·# »˜G) (85c)\n[L,L∗]=[˜L,ˆL]=0. (85d)\nThese expressions can be verified with a direct calculation. They\nshow that both Lorentz matrices can be decomposed not only\nin terms of non-commuting Lorentz generators but also in terms\nofLandL∗, which always commute in a same spatial point. The\ninverse of the Lorentz matrix in Eq. (85a) does not exist when the\ndeterminant|ˆL|=0. The determinant of a matrix is the product\nof all its eigenvalues, which for ˆLandKare given by the sets\nλ′\n1,2,3,4={±|ˆa|,±i|˜a|} (86a)\nλ1,2,3,4={η0±|ˆa|, η0±i|˜a|}, (86b)\ncontaining the components of a±(see Eq.61). Multiplying all\nvalues in each set, we obtain the determinants:\n|ˆL|=|˜L|=−p2(87a)\n|K|=η2\n0[η2\n0−r]+|ˆL|. (87b)\nwith p=# »η·# »ρandr=η2−ρ2(see Eqs. 62). Hence, ˆL−1\ndoes not exist when p=0, i.e. when ηorρare zero21, or when# »η⊥# »ρ. This omnipresent quantity p=# »η·# »ρis actually de-\ntermining whether the algebraic systems represented by ˆLand\nˆL−1have a unique solution. A null determinant implies eigen-\nvalues with larger degeneracy because one of the matrix rows or\ncolumns is not linearly independent, which reduces the dimen-\nsionality of the problem (the volumen enclosed by the column\nvectors collapses along at least one dimension).\n21The wavelength dependence and symmetry properties of# »ηor# »ρ\nmakes them zero in a small set of wavelengths (e.g.# »ρ=0 at the line\ncenter of the atomic transition considered).Several useful relationships arise from relating the basis and\nthe Lorentz matrices. Considering the normalized vector\n# »u=# »a\na+=a−·# »a\nh=(ˆa−i˜a)·# »a\nh(88)\nit is direct to show that:\n# »u# »B=a−·L\nh(89a)\n# »u∗# »B∗=a+·L∗\nh(89b)\n# »u# »B+# »u∗# »B∗\n2=ˆaˆL+˜a˜L\nh(89c)\n# »u# »B−# »u∗# »B∗\n2=iˆa˜L−˜aˆL\nh(89d)\n(# »u# »B)·(# »u∗# »B∗)=L·L∗\nh. (89e)\nAnd using the commutation rules obtained, we discover that:\nL2=a2\n+1; (L∗)2=a2\n−1 (90a)\nˆL2−˜L2=r·1 (90b)\n[˜L,ˆL]+\n2=ˆL·˜L=i(L2−(L∗)2)\n4=p·1 (90c)\n[L,L∗]+\n2=L·L∗=ˆL2+˜L2=2K2−4η0K+(2η2\n0−r)1(90d)\nTo obtain the last equality22of Eq.(90d), we made use of Eq.\n(90b) and of ˆL2=(K−η01)2=K2−2η0K+η2\n01.\nUsing the latter expressions, the powers of ˆLcan be recur-\nsively calculated as functions of ˆL,ˆL2, and ˜L:\nˆL3=rˆL+p˜L (91a)\nˆL4=rˆL2+p21 (91b)\nˆL5=(r2+p2)ˆL+rp˜L (91c)\nˆL6=(r2+p2)ˆL2+rp21 (91d)\nˆL7=(r2+2p2)rˆL+(r2+p2)p˜L (91e)\n...\nForn≥2 and starting from an odd power of the kind ˆL2n−1=\nαˆL+β˜L, the rules to obtain the next even and odd powers are:\nˆL2n=αˆL2+pβ1 (92a)\nˆL2n+1=(rα+pβ)ˆL+pα˜L (92b)\nAnd from previous relations, we obtain:\nˆL2+˜L2=2ˆL2−r1 (93a)\nˆL3+˜L3=(p+r)ˆL+(p−r)˜L (93b)\nˆL4+˜L4=(2p2+r2)1 (93c)\n...\nWe shall need to have an insight into the specific structure\nofˆL2andˆL3. The latter (and any odd power of ˆL) can be neatly\ndecomposed by subspaces with ( H+R)3=H3+R3+[H2,R]++\n[R2,H]++(HRH +RHR ), which using Eqs. (74a) and (77) gives:\nˆL3=[η2# »η+(# »S×# »ρ)]·# »ˆG−[ρ2# »ρ+(# »S×# »η)]·# »˜G, (94)\n22Note that while L2and (L∗)2are diagonal, LandL∗are not: there can\nbe an infinite set of nondiagonal square roots to a square matrix.\nArticle number, page 13 of 22A&A proofs: manuscript no. aanda\nForˆL2, we wrote that ˆL2=K2−2η0K+η2\n0. To obtain a more\ndirect expression, using Eqs. (75a) and (81), the structure of ˆL2\ncan be calculated as ( H+R)2=H2+R2+[H,R]+:\nˆL2=(U(a)−ρ21)+# »d# »˜D+X\nkSk(−1)kˆDk, (95)\nwith U(a)=diag{a2,a2\n1,a2\n2,a2\n3}(akgiven in Eq.60a), dk=ηiηj+\nρiρj(i,j,k) and# »S=# »η×# »ρ. This shows that the structure of\nˆL2(and hence of any even power of ˆL) cannot be expressed only\nin terms of 1,# »ˆD, and# »˜D(due to U(a) and (−1)k).\nTo obtain a neater expression reflecting the structure of ˆL2,\nwe combine Eqs. (93a) and (90d) to see that ˆL2=1\n2(LL∗+r1).\nDeveloping the summations appearing in L·L∗, we reach:\nL·L∗=2X\nk|ak|21k−a21+X\nk=1,2,3(gkDk+g∗\nkD∗\nk),\nwhere Dk=˜Dk+i(−1)kˆDkare basis matrices obtained from dual\ngenerators and gk=aia∗\njϵi jkhas coe fficients cyclically ordered\nto giveϵi jk=1. Writting them as vectors, we finally see that\nˆL2=\u0012\nU(a)−ρ21\u0013\n+ℜe{# »g·# »D}. (96)\n4.4. Brief characterization of the Jones propagation matrix\nAlthough we shall focus in the Stokes formalism, in this brief\nsection we present a minimal characterization of the propagation\nmatrix in Jones formalism, with the aim of motivating the study\nof Magnus solutions in it.\nWe have said that the Jones formalism uses SL(2 ,C) to rep-\nresent the four-dimensional rotations associated to the evolution\nof the polarization. Now the mapping between a point in R1,3\nand the matrix vector space is sometimes called spinor map23.\nThen, the correspondence between the Stokes vector emissivity\nand the Jones emissivity matrix is:\n# »ϵ=(ϵ0,ϵ1,ϵ2,ϵ3)←→ E= \nϵ0+ϵ1ϵ2−iϵ3\nϵ2+iϵ3ϵ0−ϵ1!\n, (97)\nwhere we can separate diagonal and non-diagonal parts using\nPauli matrices (Eqs.(55)) and the auxiliar vector# »e=(ϵ1,ϵ2,ϵ3):\nE=1\n2[ϵ01+# »e# »σ], (98)\nThe map between the full propagation vector (associated to\nStokes I,Q,U,V) and the Jones propagation matrix is:\n# »α=(η0,a1,a2,a3)←→ ˘K= \nη0+a1a2−ia3\na2+ia3η0−a1!\n, (99)\nwith a1,a2,a3∈C. This matrix can also be decomposed as:\n˘K=1\n2[η01+# »a·# »σ]=1\n2[η01+a+X], with (100a)\nX=1\na+· \na1 a2−ia3\na2+ia3−a1!\n=# »u·# »σ, (100b)\n23With this map one could define# »σas a four vector of Pauli matri-\nces withσ0=1, but we keep the vector with only three components\nbecause it is more useful for separating diagonal and non-diagonal ma-\ntrices in the calculations.with normalized propagation vector# »u=# »a/a+. Note that\nX2=1andX=X−1, which makes the calculation of the\npowers of ˘Kand its functions a simple task. However, while\nthe Pauli matrices and the Jones emissivity matrix are Hermi-\ntian (σk=σ†\nk,E=E†),Xis not, because the akcomponents in\nits complex entries are themselves complex:\nX†=1\na−· \na∗\n1a∗\n2−ia∗\n3a∗\n2+ia∗\n3−a∗\n1!\n=# »u∗·# »σ. (101)\nThe eigenvalues of Xand ˘Kareλ′\n±=±1 andλ±=(η0±a+)/2,\nrespectively. This implies the determinant |˘K|=(η2\n0−a2\n+)/4.\nIn the spirit of what we did in the analysis of the Stokes\npropagation matrix, we can calculate several quantities that ap-\npear when operating with the Jones propagation matrix. Calling\nz:=# »a a−=ˆz+i˜z, we define and calculate:\nˆY:=X+X†\n2=ˆz\nh# »σ (102a)\n˜Y:=X−X†\n2=˜z\nh# »σ (102b)\n˜Y·ˆY=[X,X†]\n4=−(# »η×# »ρ)·# »σ\nh(102c)\n(a+X)·(a−X†)=a·1−2(# »η×# »ρ)·# »σ (102d)\nˆX:=a+X+a−X†\n2= \nηQηU−iηV\nηU+iηV−ηQ!\n=# »η·# »σ(102e)\n˜X:=a+X−a−X†\n2=i \nρQρU−iρV\nρU+iρV−ρQ!\n=i# »ρ·# »σ\n(102f)\nˆX·(−i˜X)=(# »η·# »σ)(# »ρ·# »σ)=(# »η·# »ρ)1−i(# »η×# »ρ)·# »σ.(102g)\nThe vector products can be substituted by commutators with:\n−(# »η×# »ρ)·# »σ=i\n2[# »η·# »σ,# »ρ·# »σ]=[ˆX,˜X]\n2. (103)\nSuch vector products give a vector perpendicular to the plane\ndefined by# »ηand# »ρ, and its mutiplication by# »σgives a ma-\ntrix describing three-dimensional rotations around such a nor-\nmal vector (see Section 4.1). The above quantities are simpler\nand more compact than their counterparts in Stokes formalism.\nThey also gives a better insight because are easy to interpret in\nterms of rotors and base Pauli matrices. Furthermore, the simple\ndecomposition in Eq. (100) allows to obtain the corresponding\nMagnus evolution operator in Jones formalism by just applying\nEq. (45)(BE theorem) with# »uthe normalized propagation vector.\nComparing with the Stokes formalism, the only step that could\nparallel its complexity in the Jones formalism seems to be the\ninhomogeneous solution in Eq. (17), which involves a double\nmultiplication by the evolution operator. These reasons justify\nour interest in using the Magnus expansion to reformulate the\nradiative transfer problem also in Jones formalism, as we do in\nthe following sections for the Stokes formalism.\nArticle number, page 14 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\n5. Reformulation of the homogeneous solution in\nthe Lorentz group (Stokes formalism)\n5.1. Derivation of the evolution operator for non-constant K\nWe can finally derive an analytical evolution operator that allows\nfor arbitrary variations of K. We start truncating the Magnus ex-\npansion in Eq. (41) to retain its first term. The algebraic analy-\nsis performed in Section (4.3) allows to calculate it explicitly in\nmore than one way. Our approach begins decomposing K(s) in\nterms of generalized Lorentz matrices with Eqs. (64) and (85b):\nK(s)=η0(s)1+L(s)+L∗(s)\n2. (104)\nThe commutation among LandL∗allows to divide the Magnus\nevolution operator in three exponentials:\nO(s)=e−Rs\ns0dtK(t)=\n=e−Rs\ns0dtη0(t)·e−1\n2Rs\ns0dt# »a(t)# »B·e−1\n2Rs\ns0dt# »a∗(t)# »B∗\n(105)\nThis step is not obvious because the exponents contain integrals\ncombining all points along the ray, so let us be more specific.\nCalling# »b=Rs\ns0dt# »a(t), the two latter exponents are matrices\nthat can be written together as\n−1\n2[# »B# »b+# »B∗# »b∗]\nbecause# »Bis a vector of basis (hence constant) matrices. To di-\nvide in two exponentials, any component of# »B# »bmust commute\nwith any other of# »B∗# »b∗, which occurs due to Eq. (83d) because\n[Bibi,B∗\njb∗\nj]=(biBi)(b∗\njB∗\nj)−(b∗\njB∗\nj)(biBi)=\n=bib∗\njBiB∗\nj−bib∗\njB∗\njBi=bib∗\nj[Bi,B∗\nj]=0,(106)\nThen, we can apply the BE theorem (Sec. 3.4) to each matrix\nexponential24in Eq. (105), obtaining\nO(s)=e−η′\n0·[ch(b) 1−sh(b)# »u# »B]·[ch(b∗)1−sh(b∗)# »u∗# »B∗],\n(107)\nwith band# »ucasting a+and# »a/a+in Sec. 4.2, but built from\nintegrated coe fficientsη′\nk(k=0,1,2,3) andρ′\nk(k=1,2,3):\n# »u=# »b\nb=(b1,b2,b3)\n[b2\n1+b2\n2+b2\n3]1/2=(ˆb−i˜b)\nh(b1,b2,b3) (108a)\nbk(s)=Zs\ns0ak(t)dt=Zs\ns0ηk(t)dt+iZs\ns0ρk(t)dt=η′\nk+iρ′\nk\n(108b)\nˆb2=(h+r)/2 (108c)\n˜b2=(h−r)/2 (108d)\nh=[r2+q2]1/2(=ˆb2+˜b2) (108e)\nr=(# »η′)2−(# »ρ′)2(=ˆb2−˜b2) (108f)\nq=2(# »η′·# »ρ′) (=2ˆb˜b) (108g)\nThis move allows to express everything in terms of the seven\nbasic integrals bkas elementary coe fficients. Next, we perform\nthe products in Eq. (107), identify matrix terms with Eqs. (89),\n24The conditions of the theorem are fulfilled because the Bkmatrices\nform a basis of the Lorentz algebra that accomplishes with Eq. (83a).and apply Appendix C to separate the real ( ˆb) and imaginary ( ˜b)\nparts of bandb∗. This leads to:\nO(s)=e−η′\n0·n\nc01−1\nhh\nc1ˆL+c2˜L+c3(ˆL2+˜L2)io\n, (109)\nwith\nc0,3=ch(2ˆb)±cos(2 ˜b)\n2\nc1,2=sh(2ˆb)∓isin(2 ˜b)\n2. (110a)\nFinally, substituting Eq. (93) for ˆL2+˜L2and operating, we find\nO(s)=e−η′\n0·n\nf01+f1aˆL+f1b˜L+f2ˆL2o\n, (111)\nwith scalar functions25\nf0=˜b2ch(2ˆb)+ˆb2cos(2 ˜b)\nˆb2+˜b2;f1a=−\"ˆbsh(2ˆb)+˜bsin(2 ˜b)\nˆb2+˜b2#\nf2=ch(2ˆb)−cos(2 ˜b)\nˆb2+˜b2;f1b=ˆbsin(2 ˜b)−˜bsh(2ˆb)\nˆb2+˜b2.\n(112)\nAlternative expressions for the evolution operator can be ob-\ntained using Eqs. (91) to remove the ˜Lin Eq.(111), writting it\nas function of any odd power of ˆL. For instance, substituting it\nin terms of ˆLandˆL3with Eq. (91a), we obtain:\nO(s)=e−η′\n0·n\nf01+f1ˆL+f2ˆL2+f3ˆL3o\n, (113)\nwhere the new functions are just\nf1=−\"˜b2sh(2ˆb)+ˆb2sin(2 ˜b)\nˆb2+˜b2#\nf3=−\"sh(2ˆb)\nˆb+sin(2 ˜b)\n˜b.#\n(114)\nThe two expressions for the evolution operator can be simpli-\nfied further by identifying subspaces of constant infinitesimal\ngenerators(# »ˆG,# »˜G), which allows a convenient integration of the\nevolution operator in the next sections. Namely, dividing the ma-\ntrices in Eq. (111) in subspaces, operating, and regrouping, we\nfind the remarkable expression:\nO(s)=e−η′\n0·n˚K+f2ˆL2o\n, (115)\nwhose new matrix ˚K=f01+# »ˆα·# »ˆG+# »˜α·# »˜Ghas same structure\nasKbut with a new propagation vector\n# »α=# »ˆα+i# »˜α=−[sh(2 ˆb)+isin(2 ˜b)]# »u, (116)\nbeing# »ustill given by Eq.(108) and ˆL2by Eq.(95).\nOur three expressions for the evolution operator, Eqs. (111),\n(113), and (115), are fully equivalent. They all are more general\nand significantly simpler than the one given by LD85. They are\ngeneral because they preserve memory of the spatial variations\n(of any arbitrary K) encoded as ray path integrals of optical co-\nefficients, as defined in Eq.(108b). They express everything in\n25An alternative set of relative parameters β=r/q,γ=[1+β2]1/2,\nδ2=(˜b/ˆb)2=(γ−β)(γ+β)−1, andε=(1+δ2)−1, could be defined to\nexpress or calculate f0,f1a,f1b,f2succintely in terms of εand (1−ε).\nArticle number, page 15 of 22A&A proofs: manuscript no. aanda\nterms of the seven basic scalar integrals in bk, which seems to be\nthe minimal and most e fficient integration possible to solve the\nRTE for non-constant properties. Thus, by separating the inte-\ngration from the algebraic calculation of the evolution operator,\nwe expect to obtain more general and e fficient numerical solu-\ntions for the RTE.\nWe remark that the Lorentz matrices in our expressions also\ncontain those integrated coe fficients (although the matrices are\nstill called as in previous sections). Indeed, the relative simplic-\nity of our expressions comes from writing them in terms of the\n(integrated) Lorentz matrix ˆL=K′(s)−η′\n0(s)1=# »η′·# »ˆG+# »ρ′·# »˜G.\nThis is also true for the dual Lorentz matrix ˜Lin Eq. (111)\nbecause it has the same algebraic structure as ˆL. Namely, re-\ncalling Eqs.(85), ˜Lis not only proportional to ˆL−1but also\n˜L=# »ρ′·# »ˆG−# »η′·# »˜G, hence both ˜Land ˆLare effortlessly built\nfrom each other by exchanging η′\nk↔ρ′\nkandρ′\nk↔−η′\nk.\nConsidering also that we know the specific elements of ˆL2\nby Eq.(95), or that it can be cheaply calculated multiplying ˆL\nby itself, we see that our solution for the exponential evolu-\ntion operator is optimal. In essence, it is just a matter of adding\nup two composed matrices ( ˆL2and ˚K), half of them contain-\ning redundant information (due to their symmetries). Hence, our\ncalculation of the matrix exponential is not only analytical, but\nalso seems ideal for numerical applications, because involves the\nminimal number of operations to solve exactly an evolution op-\nerator accounting for arbitrary spatial variations of K.\nOur evolution operator in Eq. (115) reveals other insight: ˆL2\nis the only term whose algebra di ffers from that of Kin the ho-\nmogeneous solution, making explicit that ˆL2is the only alge-\nbraic di fference between the Lorentz group (where the evolution\noperator belongs) and its Lie algebra, where Kbelongs. To ver-\nify that our result belongs to the Lorentz group, one could use\nEq. (51). Particularizing our expressions to the case of constant\npropagation matrix, one recovers the result of LD85.\n5.2. Higher order terms of the Magnus expansion\nThe BE theorem allows to calculate the exponential of the Mag-\nnus expansion including only its first order term Ω1. Here we\ngive a preliminar exploration of our Magnus solution when Ω2\nis included. Decomposing with Eqs. (85b) and (85d), the Ω2for\nthe RTE becomes:\nΩ2(s)=−1\n2Zs\ns0d1Zs1\ns0d2\u0014\nK(s1)K(s2)−K(s2)K(s1)\u0015\n=\n(117a)\n=−1\n2Zs\ns0d1Zs1\ns0d2\u0014\nˆL(s1),ˆL(s2)\u0015\n. (117b)\nThe latter commutator can be worked out with the relation\n[# »v1·# »B,# »v2·# »B]=2i(# »v1×# »v2)·# »B, (118)\nbeing# »Bour vector of basis matrices. Thus, we obtain (calling\ngenerically XitoX(si))\n[ˆL1,ˆL2]=i\n2\u0014\n(# »a1×# »a2)# »B−(# »a∗\n1×# »a∗\n2)# »B∗\u0015\n=ℜe(i\n2# »a1x2·# »B)\n=\n=\u0014\n(# »η1×# »η2)−(# »ρ1×# »ρ2)\u0015# »˜G−\u0014\n(# »η1×# »ρ2)+(# »ρ1×# »η2)\u0015# »ˆG,\n(119)with# »a1x2=# »a(s1)×# »a(s2). Then,\nΩ2(s)=\u0014Zs\ns0ds1(# »η1×# »ρ′\n1)+(# »ρ1×# »η′\n1)\n2\u0015# »ˆG+\n+\u0014Zs\ns0ds1(# »ρ1×# »ρ′\n1)−(# »η1×# »η′\n1)\n2\u0015# »˜G. (120)\nwith\n# »η′\n1=# »η′(s1)=Zs1\ns0ds2# »η(s2) (121a)\n# »ρ′\n1=# »ρ′(s1)=Zs1\ns0ds2# »ρ(s2). (121b)\nComparison of this result with the di fferent decompositions\nof the Lorentz matrix (Section 4.3) shows explicitly that the ma-\ntrix structure of Ω2is that of the Lorentz matrix, as expected in\nthis Lie algebra. As the same is true for all terms of the Magnus\nexpansion, their addition to Ω1will give an exponential evolu-\ntion operator of the same form as Eq.(115), but with f0,f2and# »αincreasingly complicated by the presence of nested integrals\nof nested vector products, in a similar fashion to Eq. (120). It\nis a matter of ongoing numerical investigation to find out how\nto calculate such integrals e fficiently to avoid significant penalty\nwhen extending our methods to higher orders of the expansion.\n6. Reformulation of the inhomogeneous problem\nwith Magnus in Stokes formalism\nThe general evolution operator derived analytically in the previ-\nous section can be directly inserted into Eq. (23) to obtain a new\nfamily of numerical methods based on the Magnus expansion.\nSuch methods would already represent a fundamental improve-\nment to solve the RTE. However, there are certain issues that\nmotivate an alternative formulation of the inhomogeneous prob-\nlem too. The inhomogeneous RTE:\nI′(s)=A(s)I(s)+ϵ(s) ; I(0)=I0 (122)\nwith A(s)=−K(s) can be solved with Eq. (23). In the most\ngeneral case, the evolution operators in it are substituted by the\nfull Magnus exponential. In this paper we shall start considering\nEq. (123) as a result of truncating the Magnus expansion to first\norder, in consistency with our previous section, and yet allowing\nfor variations of the K(s) matrix in A(s). Then:\nI(s)=eRs\n0A(τ)dτI0+Zs\n0eRs\ntA(τ)dτϵ(t)dt. (123)\nOnce we study and test our methods for this case, we will study\nhigher orders. The problem here is that the calculation of the\ninhomogeneous integral with the nested integral in the inner ex-\nponent is costly and of di fficult evaluation because we need two\ndifferent sets of quadrature points for nested integrals changing\nin different intervals. To solve this problem, we reformulate it.\n6.1. Reformulating the case with constant properties\nForAconstant, the typical formal inhomogeneous solution given\nby Eq.(23) can be considered local because is restricted to small\nregions /cells of constant properties. As we anticipated, it is also\ninconsistent and innacurate, because it breaks the inhomoge-\nneous group structure when Ais constant but ϵis not. In order\nArticle number, page 16 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\nto introduce our method of solution for the general case, we first\nconsider the simplest consistent system, given by Eq. (123) with\nboth Aandϵconstant. Its solution can be written in terms of a\nmatrix function ϕ1(sA), both as\nI(s)=esAI0+Zs\n0e(s−t)Aϵdt=esAI0+sϕ1(sA)ϵ (124)\nor as\nI(s)=esAI0+(esA−1)A−1ϵ=esA(I0+A−1ϵ)−A−1ϵ=\n=I0+sϕ1(sA)(AI0+ϵ), (125)\nwhere we define ϕ1(sA) in several ways:\nϕ1(sA)=1\nsZs\n0e(s−t)Adt=1\nsZs\n0etAdt= (126a)\n=∞X\nn=0(sA)n\n(n+1)!= (126b)\n=(esA−1)(sA)−1=\u0012\n≡ex−1\nx\u0013\n(126c)\n=Z1\n0ezsAdz. (126d)\nEq. (126a) shows the relation of ϕ1(sA) with Eq. (125), while\nEq. (126b) shows its relation with the exponential\nesA=∞X\nn=0(sA)n\nn!.\n(127)\nAlternatively, Eq. (126c) gives an ine fficient way of calculating\nϕ1(sA), while Eq. (126d) gives an e fficient integral definition in\nterms of a parameter z.\nOur method of solution is based on the realization that the\nEq. (123) with both Aandϵconstant is equivalent to a 5 ×5\nhomogeneous system\nd\nds \nI(s)\nIt!\n= \nAϵ\n0⊺0! \nI(s)\nIt!\n(128)\nwith I(0)=I0,It(0)=1,Ita mere auxiliar value, and whose new\n5×5 propagation matrix A5contains A≡A4×4. Correspond-\ningly, the solution in Eq. (124) can be seen to be equivalent to\n(see also Eq. (26))\nI5(s)=esA5I5,0= \nesAsϕ1(sA)ϵ\n0⊺0!\nI5,0 (129)\nwith I5,0=I5(0)=(I0,1)⊺. Eq. (129) tells us that the inho-\nmogeneous solution for A5constant can be written as a 5 ×5\nevolution operator containing both the corresponding 4 ×4 evo-\nlution operator and a special product involving ϕ1. Let us now\napply this to the general case.\n6.2. Reformulating the general case with variable properties\nThe method that we propose consists in extending by one the\ndimension of the inhomogeneous problem to convert it in a five-\ndimensional homogeneous one, and thus solve it with the Mag-\nnus expansion. Namely, Eq. (123) is equivalent to a 5 ×5 homo-\ngeneous system\nd\nds \nI(s)\nIt!\n= A(s)ϵ(s)\n0T0! \nI(s)\nIt!\n(130)with I5,0=I5(0)=(I0,1)⊺, and where again we call I5(s) to the\nsolution vector of unknowns and A5(s) to the new propagation\nmatrix containing the original A(s)=−K(s). Being homoge-\nneous, this system can be solved applying the Magnus expan-\nsion toA5(s). We do this considering only Ω1in the Magnus\nexpansion, to keep consistency with the evolution operator that\nwe derived in the previous section. Thus, we have to calculate:\nO5(s)=eRs\ns0A5(t)dt=e¯A5=∞X\nn=0¯An\n5\nn!. (131)\nwhere the overbars mean integration hereafter:\n¯A5= ¯A ¯ϵ\n0⊺0!\n(132a)\n¯A=−Zs\ns0K(t)dt (132b)\n¯ϵ=Zs\ns0ϵ(t)dt=(ϵ′\n0,ϵ′\n1,ϵ′\n2,ϵ′\n3)⊺(132c)\nThe integral of Kcontains the seven ray-path scalar integrals of\nEq.(108),η′\nk(k=0,1,2,3) andρ′\nk(k=1,2,3), while ¯ϵcontains\nthe four equivalent scalar integrals ϵ′\nk(k=0,1,2,3).\nAs the powers of ¯A5show the simple general form\n¯An\n5= ¯An¯An−1¯ϵ\n0⊺0!\n, (133)\nall terms in Eq. (131) can be readily resummed to obtain\nO5(s)=e¯A\"P∞\nn=0¯An\n(n+1)!#\n¯ϵ\n0⊺1= \ne¯Aϕ1(¯A)¯ϵ\n0⊺1!\n(134a)\n=15+ \nϕ1(¯A)¯Aϕ1(¯A)¯ϵ\n0⊺0!\n, (134b)\nInserting these two equivalent expressions into the general solu-\ntion I5(s)=O5(s)I5,0, and taking the 4 ×4 subspace, we find:\nI(s)=e¯AI0+ϕ1(¯A)¯ϵ= (135a)\n=I0+ϕ1(¯A)(¯AI0+¯ϵ), (135b)\nwhich reduces to Eqs. (124) and (125) when both A(i.e.,−K)\nandϵare constant.\nWhat has just happened in Eqs. (135)? The inhomogeneous\nformal integral that has always characterized the solution to the\nradiative transfer problem and its numerical methods has van-\nished. Eq. (135) substitutes it by the product of an integrated\nemissivity vector and a special function of an integrated prop-\nagation matrix. We can explain this saying that, by solving the\n4×4 inhomogeneous problem as the Magnus solution to a 5 ×5\nhomogeneous problem, we are solving the translations given by\nthe emissivity term in the Poincaré space of the solution as if they\nwere rotations quantified by the new algebra of the 5 ×5 Mag-\nnus expansion. Thus, Eq. (135) gives a radically di fferent way of\nsolving the radiative transfer problem (see next subsection 6.4).\nLet us also comment on Eq. (134a), which shows that the al-\ngebra of the 5D propagation matrix is such that the 4D subspace\ncontaining the homogeneous solution (i.e. the evolution opera-\ntor) is always independent on the inhomogeneous part of the sys-\ntem containing the special function ϕ1and the emissivity. This\nimplies that if we extend the Magnus expansion to higher orders,\nArticle number, page 17 of 22A&A proofs: manuscript no. aanda\nwe can always continue using the corresponding evolution oper-\nator because the only thing that changes is how the function ϕ1\nis combined with the emisivity. For instance, if we add Ω2to\nthe Magnus expansion we would be adding a term of the kind of\nEq.(120), with the commutator :\n[A5(s1),A5(s2)]=A5(s1)A5(s2)−A 5(s2),A5(s1)=\n= \n[A(s1),A(s2)]A(s1)ϵ(s2)−A(s2)ϵ(s1)\n0⊺0!\n.(136)\nThis shows that the 4 ×4 subspace is preserved, containing a\ncommutator similar to that with A5. Thus, after integrating and\nexponentiating, the new solution will have the new evolution op-\nerator (now including Ω2) and a composition of matrix-vector\nproducts between ϕ1and integrals of Aandϵ. We will have to\nfind the right balance between more general theoretical descrip-\ntion (higher order in Magnus) and more e fficient computational\nrepresentation (higher numerical order of integration and fastest\ncalculation).\n6.3. Calculation of ϕ1: integrating the evolution operator\nTaking now Eq. (135a) as an e fficient general expression, we\nmake it fully explicit by calculating ϕ1(¯A)=ϕ1(−¯K). Namely,\nintegrating along a parameter zwith Eq. (126d)\nϕ1(−¯K)=Z1\n0ez¯A(s)dz=Z1\n0e−Rs\ns0zK(t)dtdz=Z1\n0O(t,z)dz,\n(137)\nwe see that ϕ1(−¯K) is obtained integrating our evolution opera-\ntor in Eq. (115) after assigning the parameter zto every matrix\ncomponent of K, i.e. to every integrated optical coe fficientη′and\nρ′in Eqs. (108c). Guided by Eq. (107), and propagating zto all\nthe subsequent quantities, we see that the only place where the\npropagated parameter zdoes not cancel out is inside the trigono-\nmetrical expressions, because any other quantity depending on\nη′andρ′(i. e. the normalized vector# »u, and bk,ˆb, or˜b) has a\ndenominator that always cancels out the zdependence. We make\nthis clear by specifying all the subspaces in Eq. (115) for the\nevolution operator and adding the parameter z where it remains:\nO(s,z)=e−η′\n0z·(˜b2ch(2ˆbz)+ˆb2cos(2 ˜bz)\nˆb2+˜b21+\n−ℜen\n[sh(2 ˆbz)+isin(2 ˜bz)]# »uo\n·# »ˆG+\n−ℑmn\n[sh(2 ˆbz)+isin(2 ˜bz)]# »uo\n·# »˜G+\n+ch(2ˆbz)−cos(2 ˜bz)\nˆb2+˜b2\u0012\nU(a)−ρ21+ℜe{# »g·# »D}\u0013)\n,(138)with U(a)=diag{a2,a2\n1,a2\n2,a2\n3},gk=aia∗\njϵi jk, and akgiven in\nEq.(60a). Hence, the only integrals that appear are\nZ1\n0e−η′\n0zch(2ˆbz)dz=e−η′\n0[−η′\n0ch(2ˆb)−2ˆbsh(2ˆb)]+η′\n0\nη′\n02−(2ˆb)2\n(139a)\nZ1\n0e−η′\n0zcos(2 ˜bz)dz=e−η′\n0[−η′\n0cos(2 ˜b)+2˜bsin(2 ˜b)]+η′\n0\nη′\n02+(2˜b)2\n(139b)\nZ1\n0e−η′\n0zsh(2ˆbz)dz=e−η′\n0[−η′\n0sh(2ˆb)−2ˆbch(2ˆb)]+2ˆb\nη′\n02−(2ˆb)2\n(139c)\nZ1\n0e−η′\n0zsin(2 ˜bz)dz=e−η′\n0[−η′\n0sin(2 ˜b)−2˜bcos(2 ˜b)]+2˜b\nη′\n02+(2˜b)2\n(139d)\nOnce substituted the integrals and the vector# »u(see Eq.108a):\n# »u=# »b\nb=(ˆb−i˜b)\nh(# »η′+i# »ρ′), (140)\nwe rearrange and identify terms. First, we arrange things to iden-\ntify the trigonometric functions:\nˆc=ch(2ˆb)\nη′\n0ˆd; ˜c=cos(2 ˜b)\nη′\n0˜d(141a)\nˆs=sh(2ˆb)\n2ˆbˆd; ˜s=sin(2 ˜b)\n2˜b˜d, (141b)\ncontaining well-behaving sync functions\nlim\nˆb→0sh(2ˆb)\n2ˆb=lim\n˜b→0sin(2 ˜b)\n2˜b=1 (142)\nand\nˆd=η′\n02−(2ˆb)2;˜d=η′\n02+(2˜b)2. (143)\nRecombining subspaces for# »ˆGand# »˜G, and keeping terms in 1\nandˆL2, we identify the Lorentz matrices ˆL,˜LandˆL2. Thus, after\na cumbersome calculation, we obtain:\nϕ1(−¯K)=ϕA+ϕB=\n=η′\n02e−η′\n0\nˆb2+˜b2·(\nn11+n2ˆL+n3˜L+n4ˆL2)\n+\n+4η′\n0\nˆd˜d·(\u0012η′\n0\n2−r\u0013\n1−η′\n0\n2ˆL+nr˜L+ˆL2)\n, (144)\nwith nr=2ˆb˜b\nη′\n0and\nn1=(˜b2ˆc+ˆb2˜c)+n2\nr(ˆs−˜s) (145a)\nn2=2\nη′\n0h\n(ˆs+ˆc)ˆb2+(˜s+˜c)˜b2i\n(145b)\nn3=nrh\n(ˆs+ˆc)−(˜s+˜c)i\n(145c)\nn4=4(ˆb2ˆs+˜b2˜s)−(ˆc−˜c) (145d)\nFor the sake of clarity, we have divided Eq. (144) into two matri-\ncesϕAandϕB, showing di fferent external dependence on η′\n0, but\nArticle number, page 18 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\nFig. 5. Research prospects.\nboth belonging to the Lorent group. I.e., their algebraic structure\nmatch that of the evolution operator, thus depending on the same\nbasic Lorentz matrices that were already built from integrated\noptical coe fficients, but multiplied by simple scalar functions.\nWith this explicit analytical calculation, the computational cost\nof building our formal solution in Eq. (135a), which furthermore\nonly contains two matrix-vector products, should be minimal.\nNote also that, once the order of the Magnus expansion is set,\nour whole development of the evolution operator and of the in-\nhomogeneous solution with ϕ1has been mathematically exact.\n6.4. Additional comments and prospects\nIn summary, we have reformulated the radiative transfer prob-\nlem to obtain consistent integral solutions based on the Magnus\nexpansion. Starting by truncating the expansion to first order, we\nhave arrived to Eq. (135)\nI(s)=e−¯KI0+ϕ1(−¯K)¯ϵ,\nwith the exponential evolution operator given explicitly by Eq.\n(115), ϕ1(−¯K) given by Eq. (144), and ¯Kand¯ϵcontaining the\neleven basic scalar ray-path integrals of the optical coe fficients.\nBy having an exact analytical formula for both a consistent in-\nhomogeneous solution and an evolution operator considering ar-\nbitrary variations of K, we now can (see Fig. 5):\n–1) Find consistent solutions respecting the Lie group struc-\nture at any step of the calculations, thus solving accurately\nthe exact physical problem, instead of a similar one. The ob-\nvious prospect here is to extend our formulation to include\nhigher order terms of the Magnus expansion26.\n–2) Define a new family of numerical methods implementing\nEq. (135a). These methods should be advantageous from the\nstart, simply because they are based on a more accurate, com-\npact, and e fficient representation of the physical and mathe-\nmatical problem. However, one of the numerical aspects that\nshould be investigated is how non-local is our theory for the\norder of the Magnus expansion considered. A key to investi-\ngate this is the convergence of the Magnus expansion, which\n26Remind that in general the order of the Magnus expansion is not the\norder of the numerical methods to solve it.could set a limiting range that depends on our specific ap-\nplication. Our research and numerical developments are on-\ngoing and will be available to the astrophysical community\nwhen ready.\n–3) Understand polarized radiative transfer in depth. As our\nformal solution is analytical and non-local (not restricted\nto relatively small regions or cells of constant properties),\nthe general long-range solution to the RTE can be stud-\nied theoretically as a function of its parameters, thus tran-\nscending previous approximate radiative transfer models.\nFor instance, now it would be possible to explain without\nstrong approximations the joint action of magneto-optical\nand dichroic e ffects in certain wavelengths of the polariza-\ntion profiles, something that could only be done indepen-\ndently for every mechanism (as made for dichroism in Carlin\n2019).\n–4) Incorporate a defined geometry in the radiative trans-\nfer problem analytically, thus building analytical models of\ncomplex astrophysical objects (e.g., a whole star) that can\nhowever be taylored to the physical information available.\nThus, we can study the physics of these objects with polar-\nization fingerprints transparently, without radiative transfer\nitself being a source of error. This is possible because the\nmain input for our equations, the eleven ray-path scalar in-\ntegrals of the optical coe fficients, cannot only be provided\nby realistic atmosphere models but also by exact prescribed\nfunctional variations of the atmosphere.\n–5) Reformulate the methods of solution for the NLTE prob-\nlem with polarization to make them non-local. This novel\nidea seems very interesting. By considering variations of K,\nboth our evolution operator and the final inhomogeneous so-\nlution are non-markovian in space , i.e. they preserve mem-\nory of the atmospheric physics in previous locations along\nthe ray27. This memory can be used, at least in principle, to\naccelerate the NLTE interation between the RTE and the rate\nequations in the theory of scattering polarization. Of interest\nhere is that our theory separates the integration of the optical\n27This problem is equivalent to considering partial redistribution ef-\nfects in the derivation of the equations defining the NLTE radiative\ntransfer problem. However, in that case the non-markovian character\narises from integrating along time the Schrödinger equation describing\nthe evolution of matter-radiation interaction.\nArticle number, page 19 of 22A&A proofs: manuscript no. aanda\ncoefficients from the algebraic construction of the formal so-\nlution, which permits to compute the latter only once directly\nat the end of the ray (or at any intermediate location), and re-\nduces the numerical task to the simplest integration possible,\ni.e. to the scalar integration of the eleven basic optical coef-\nficients of the problem.\n–6) Solve general physical problems with a similar alge-\nbraic structure to that of the RTE. With small cosmetic\nchanges (reinterpreting the physical quantities), our equa-\ntions also give novel solutions for other homogeneous and\ninhomogeneous problems of universal interest that share the\nLorentz /Poincaré group structure, again allowing arbitrary\nvariations of their system matrix. Well-known examples are\nthe motion of masses at relativistic speeds, and the calcu-\nlation of Lorentz forces on charged particles moving in an\nelectromagnetic field.\n7. Conclusions\nWe have laid the foundations to solve the polarized radiative\ntransfer problem in a new, e fficient, and fully consistent way\nusing the Magnus expansion. First, we presented a succint red-\nerivation of the radiative tranfer equations (RTE) in Stokes and\nJones formalisms using a common nomenclature and consistent\nphysical conventions for the phase of the electric field and the\nsigns of Stokes V . We believe that now the equations of both\nformalism can be used and compared on a more clear basis.\nTruncating the Magnus expansion to first order, and applying\nour BE theorem (Sec. 3.4), we have obtained three equivalent an-\nalytical expressions of a new and more general evolution opera-\ntor that allows for arbitrary spatial variations of the propagation\nmatrix (Sec. 5.1). Our Basic Evolution theorem calculates ana-\nlytically the exact exponential of any integral of the propagation\nmatrix, illustrating the possibility of introducing the scalar inte-\ngrals of the optical coe fficients inside the terms of our solutions.\nThis ends up being equivalent to separate the integration from\nthe composition of the formal solution. Furthermore, it allows\nto calculate the solution at the end of a ray without necessarily\ndoing matrix calculations or solving the formal solution at ev-\nery intermediate point. Developing the order two of the Magnus\nexpansion, we have shown some prospects for generalizing the\nevolution operator to higher orders of the expansion.\nAs an insight, we interpret the evolution of the solution to\nthe RTE as complex multidimensional rotations in the Lie alge-\nbra of the Lorentz /Poincaré group. Such rotations are quantified\nby rotors whose direction and strength of rotation are given by\nthe normalized propagation vector. As shown by the compact\nformulation of our evolution operator, such a rotational evolu-\ntion is neatly expressed at the level of the Lie group with a linear\ncombination of our generalized Lorentz matrix and the square of\nthe ordinary Lorentz matrix (the only factor in the solution that\ndoes not belong to the Lie algebra). Here we remark that our cal-\nculations were made easier by our algebraic characterization of\nthe propagation matrix, including its generators, powers, com-\nmutators, and the di fferent ways in which we can decompose it\nto operate (Sec. 4.3).\nFinally, by increasing the dimensionality of the 4 ×4 prob-\nlem to 5×5, we have reformulated the inhomogeneous solution\nas an homogeneous one, which is again solved with the Magnus\nexpansion to first order. Thus, the typical formal integral of pre-\nvious formulations is substituted by an integral function of our\nevolution operator. Calculating it analytically and exactly, we ar-\nrive to an explicit radiative transfer solution whose inputs are thesimple ray-path scalar integrals of the eleven optical coe fficient\nof the radiative transfer problem.\nFor several reasons, our approach is potentially disruptive for\nsolar spectropolarimetry. First of all, it is the first one that fully\nsolves the RTE consistently, explicitly, and allowing for arbitrary\nray-path variations of the propagation matrix. Secondly, it poses\nthe integration of the RTE in a radically new way. Instead of inte-\ngrating an standard formal solution to solve the inhomogeneous\nproblem many times along every ray, our theory is built in such a\nway that in principle allows to integrate directly and exactly the\nscalar optical coe fficients of the problem for the whole ray and,\nonly then, substitute the result in an analytical expression with\nminimal algebraic complexity.\nFurthermore, by including a Magnus evolution operator and\na Magnus inhomogeneous solution, our results natively pre-\nserves the full Lie group structure of the problem. On one hand,\nthis means that the evolution of the solution follows its correct\ngeometrical space in the algebra. In other words, we should now\nbe able to integrate over large distances along the ray with a sig-\nnificantly smaller departure from the right solution. On the other\nhand, in principle we could use our new evolution operator to\ncalculate more general response functions in the NLTE problem.\nThese two key aspects suggests a reformulation of the NLTE\nproblem with polarization that could allow to solve this non-\nlocal problem in a non-local way for the first time. This is critical\nfor accelarating inversions of Stokes profiles, on which solar di-\nagnosis is based. Besides, our preliminar calculations (Sec. 4.4)\nsuggests to investigate whether is advantageous to reformulate\nour Magnus-based solutions in Jones formalism, whose algebra\ninvolves simpler 2 ×2 matrices. In that case, a reformulation of\nthe NLTE problem in Jones formalism could be advisable.\nUsing the Magnus expansion, our formulation allows to nat-\nurally generalize our evolution operator for higher orders of ac-\ncuracy even before considering to increase the numerical order,\nsomething that previous methods were unable to do. We specu-\nlate that if the new terms of such generalization could be ideally\nresummed into tractable scalar functions, we could be opening\nthe door to solve the radiative transfer problem in the most gen-\neral, e fficient, and exact way possible.\nGiven the algebraic similarity with other physical universal\nproblems with Lorentz /Poincaré algebra, our results are applica-\nble to them after a mere reinterpretation of the physical quanti-\nties.\nAcknowledgements. E.S.C. acknowledges financial support from the Spanish\nMinistry of Science and Innovation (MICINN) through the Spanish State Re-\nsearch Agency, under Severo Ochoa Centres of Excellence Programme 2020-\n2023 (CEX2019-000920-S). Part of his work has been funded by Ministe-\nrio de Ciencia e Innovación (Spain) through project PID2022-136585NB-C21,\nMCIN /AEI/10.13039 /501100011033 /FEDER, UE, and also by Generalitat Va-\nlenciana (Spain) through project CIAICO /2021/180.\nReferences\nAbramowitz, M. & Stegun, I. A. 1972, Handbook of Mathematical Functions\n(New York: Dover)\nBaker, H. 1902, Proc. London Math. Soc., 35, 334\nBaker, H. F. 1905, Proceedings of the London Mathematical Society, s2-2, 293\nBellot Rubio, L. R., Ruiz Cobo, B., & Collados, M. 1998, ApJ, 506, 805\nBlanes, S., Casas, F., Oteo, J., & Ros, J. 2009, Physics Reports, 470, 151\nBonfiglioli, A. & Fulci, R. 2011, Topics in Noncommutative Algebra: The Theo-\nrem of Campbell, Baker, Hausdor ffand Dynkin, Lecture Notes in Mathemat-\nics (Springer Berlin Heidelberg)\nBorn, M. & Wolf, E. 1980, Principles of Optics: Electromagnetic Theory of Prop-\nagation of Light (Oxford: Pergamon Press)\nCarlin, E. S. 2019, A&A, 627, A47\nCarlin, E. S. & Asensio Ramos, A. 2015, The Astrophysical Journal, 801, 16\nArticle number, page 20 of 22E.S. Carlin, S. Blanes, F. Casas: Reformulating polarized radiative transfer\nCarlin, E. S., Asensio Ramos, A., & Trujillo Bueno, J. 2013, ApJ, 764, 40\nCarlsson, M. & Stein, R. F. 1997, ApJ, 481, 500\nCollados, M., Martínez Pillet, V ., Ruiz Cobo, B., del Toro Iniesta, J. C., &\nVázquez, M. 1994, A&A, 291, 622\nDe la Cruz Rodríguez, J. & Piskunov, N. 2013, ApJ, 764, 33\nDel Toro Iniesta, J. C. & Ruiz Cobo, B. 1996, Sol. Phys., 164, 169\nDyson, F. J. 1949, Phys. Rev., 75, 486\nGantmacher, F. 1959, The Theory of Matrices: V ol.: 1 (Chelsea Publishing Com-\npany)\nHall, B. C. 2015, Lie Groups, Lie Algebras, and Representations: an elementary\nintroduction, 2nd edn. (Springer Cham)\nHausdor ff, F. 1906, Ber. Verh. Kgl. Sächs. Ges. Wiss. Leipzig., Math.-phys.\nKl., 58, 19\nHestenes, D. 2003, American Journal of Physics, 71, 104\nInce, E. L. 1956, Ordinary di fferential equations (Reedition of 1920 book) (New\nYork: Dover Publications)\nJanett, G., Carlin, E. S., Steiner, O., & Belluzzi, L. 2017, The Astrophysical\nJournal, 840, 107\nKalkofen, W. 1987, Numerical radiative transfer\nKalkofen, W. 2009, Numerical Radiative Transfer\nKannenberg, L. t. 2000, Geometric calculus (Translation of 1888 Peano’s Geo-\nmetrical calculus). (Birkhäuser Boston, Boston,MA)\nKunasz, P. & Auer, L. H. 1988, J. Quant. Spectrosc. Radiat. Transfer, 39, 67\nLandi Degl’Innocenti, E. 1976, A&A, 25, 379\nLandi Deglinnocenti, E. & Landi Deglinnocenti, M. 1985, Sol. Phys., 97, 239\nLandi Degl’Innocenti, E. & Landolfi, M. 2004, Polarization in Spectral Lines\n(Kluwer Academic Publishers)\nLópez Ariste, A. & Semel, M. 1999, A&A, 350, 1089\nMagnus, W. 1954, Communications on Pure and Applied Mathematics, 7, 649\nMandelbrot, B. B. 1982, The Fractal Geometry of Nature (San Francisco: W. H.\nFreeman)\nPeano. 1890, Mathematische Annalen, 37, 182\nPeano, G. 1888, Calcolo geometrico secondo l’ Ausdehnhungslehre di H. Grass-\nman precedoto dalle operazioni della logica deduttiva. (Bocca, Torino)\nRachkovsky, D. N. 1967, Izvestiya Ordena Trudovogo Krasnogo Znameni\nKrymskoj Astrofizicheskoj Observatorii, 37, 56\nRees, D. E., Durrant, C. J., & Murphy, G. A. 1989, ApJ, 339, 1093\nSanchez Almeida, J. 1992, Sol. Phys., 137, 1\nSemel, M. & López Ariste, A. 1999, A&A, 342, 201\nShurcli ff, W. A. 2013, in Polarized Light (Harvard University Press)\nStenflo, J. O. 1994, Solar Magnetic Fields. Polarized Radiation Diagnostics\n(Dordrecht: Kluwer Academic Publishers)\nUnno, W. 1956, PASJ, 8, 108\nvan Ballegooijen, A. A. 1985, in NASA Conference Publication, V ol. 2374,\nNASA Conference Publication, 322–334\nWei, J. & Norman, E. 1963, Journal of Mathematical Physics, 4, 575\nArticle number, page 21 of 22A&A proofs: manuscript no. aanda\nAppendix A: Calculation of real and imaginary\nparts of the propagation module\nIf# »a=# »η+i# »ρ=(η1+iρ1,η2+iρ2,η3+iρ3), the modules of# »a(≡# »a+) and# »a∗(≡# »a−) are complex numbers that we call a+\nanda−, respectively. To calculate them we state:\na±=ˆa±i˜a (ˆa,˜a∈R),\na2\n±=# »η2−# »ρ2±i2# »η·# »ρ=ˆa2−˜a2±i2ˆa˜a\nwhere we identify the real numbers\nr=# »η2−# »ρ2=ˆa2−˜a2\nq=2# »η·# »ρ=2ˆa˜a,\nh=[r2+q2]1/2=a−·a+=ˆa2+˜a2\nSubstituting ˆ a=q/(2˜a) inr=ˆa2−˜a2we obtain 4˜ a4+4r˜a2−q2=\n0 and find the solutions:\nˆa=± ±h+r\n2!1/2\n,˜a=± ±h−r\n2!1/2\n.\nThe signs acompanying hmust be chosen positive for ˆ a, ˜a∈R.\nRegarding the outer signs of the roots, one is tempted to choose\nthe sign of ˆ apositive because ˆ aworks as an attenuation fac-\ntor. Landi Deglinnocenti & Landi Deglinnocenti (1985) solved\na similar problem to this before us, imposing positive sign for\na proportional quantity equivalent to our ˆ a(which they called\nα). However such imposition is unnecesary to solve the above\nequations and would be wrong in a general case in which stim-\nulated emission could dominate. Note that the total absorption\ncoefficientη0±|ˆa|>0, appearing e.g. in the eigenvalues of the\npropagation matrix or in the expressions of the evolution opera-\ntor, is always positive with η0>0 and|ˆa|< η 0when stimulated\nemission does not dominate. We then avoid to impose the outer\nsigns, labelling them as ˆ sand ˜s:\nˆa=ˆs h+r\n2!1/2\n, ˜a=˜s h−r\n2!1/2\n.\nThe signs are however constrained by the angle θbetween# »ηand# »ρin the QUV space, because ˆ s·˜s=sign(ˆa·˜a)=sign(# »η·# »ρ)=\nsign(cosθ). Thus, when# »η⊥# »ρthe signs are undetermined, but\nthen the expressions involucrating them will become indepen-\ndent on them.\nAppendix B: Proof of the Basic Evolution theorem\nThe evolution theorem gives the solution to the exponential of\nthe integral of an arbitrary matrix N. To demonstrate the theo-\nrem, we start decomposing the matrix as N=f# »n·# »σ, with fan\narbitrary constant,# »n=(n1,..., nd) a vector of components, and# »σ=(σ1,...,σ d) a vector of basis matrices with algebra gthat\nmust fulfill:\nσk·σℓ=δkℓ1+h·ϵkℓm·σm, (h=ct.) (B.1)\nThis condition implies both σ2\nk=1and vanishing anticommuta-\ntors [σk,σℓ]+=σkσℓ+σℓσk=0 for all k,ℓ. The following\nstep is now to calculate the generic integral of N:\nI=Z\ndsN(s)=Z\nds f# »n(s)·# »σ=fdX\nk=1bkσk=f# »b·# »σ\n(B.2a)where we defined the integrated vector# »b=(b1,..., bd), having\nmodule band components:\nbk=Z\nnk(s)ds (B.3)\nCondition (B.1) simplify calculation of I2as:\nI2\nf2=dX\nk=1bkσk2\n=X\nk=ℓb2\nkσ2\nk+X\nk,ℓbkbℓ[σk,σℓ]+=b21(B.4a)\nHence, the even and odd powers of the integral are I2k=(f b)2k1\nandI2k+1=I2k·I=(f b)2k+1# »u·# »σ, in terms of the unitary vector\n# »u=# »b\nb. (B.5)\nThus, the exponential of Ican be finally calculated as:\ne±R\ndsN(s)=∞X\nk=0(±I)k\nk!=∞X\nk=0I2k\n(2k)!±∞X\nk=0I2k+1\n(2k+1)!=\n=∞X\nk=0(f b)2k\n(2k)!1±∞X\nk=0(f b)2k+1\n(2k+1)!# »u·# »σ=\n=ch(f b)1±sh(f b)U, (B.6a)\nwhere the matrix U=# »u·# »σ, and band# »uare given by Eqs. (B.3)\nand (B.5).\nAppendix C: Trigonometrical expressions for the\ncoefficients of the analytical EO\nThe following four coe fficients with complex argument x=ˆx+i˜x\nare developed to find several equivalent convenient expressions:\nc0=cosh( x) cosh( x∗)=cosh2( ˆx)+sinh2(i˜x)=\n=cosh2( ˆx)−sin2( ˜x)=\n=cosh(2 ˆ x)+cos(2 ˜ x)\n2\nc1=cosh( x) sinh( x∗)=sinh(2 ˆ x)−isin(2 ˜ x)\n2\nc2=cosh( x∗) sinh( x)=sinh(2 ˆ x)+isin(2 ˜ x)\n2\nc3=sinh( x) sinh( x∗)=cosh2( ˆx)−cosh2(i˜x)=\n=cosh2( ˆx)−cos2( ˜x)\n=cosh(2 ˆ x)−cos(2 ˜ x)\n2. (C.1a)\nAs trigonometrical expressions for double angle miminimizes\nnumerical error for small arguments, we choose:\nc0,3=cosh(2 ˆ x)±cos(2 ˜ x)\n2\nc1,2=sinh(2 ˆ x)∓isin(2 ˜ x)\n2. (C.2a)\nArticle number, page 22 of 22" }, { "title": "2402.00355v1.Adaptive_Primal_Dual_Method_for_Safe_Reinforcement_Learning.pdf", "content": "Adaptive Primal-Dual Method for Safe Reinforcement Learning\nWeiqin Chen\nRensselaer Polytechnic Institute\nTroy, NY, USA\nchenw18@rpi.eduJames Onyejizu\nRensselaer Polytechnic Institute\nTroy, NY, USA\nonyejj@rpi.eduLong Vu\nIBM T.J. Watson Research Center\nYorktown Heights, NY, USA\nlhvu@us.ibm.com\nLan Hoang\nIBM Research\nDaresbury, Warrington, UK\nlan.hoang@ibm.comDharmashankar Subramanian\nIBM T.J. Watson Research Center\nYorktown Heights, NY, USA\ndharmash@us.ibm.comKoushik Kar\nRensselaer Polytechnic Institute\nTroy, NY, USA\nkark@rpi.edu\nSandipan Mishra\nRensselaer Polytechnic Institute\nTroy, NY, USA\nmishrs2@rpi.eduSantiago Paternain\nRensselaer Polytechnic Institute\nTroy, NY, USA\npaters@rpi.edu\nABSTRACT\nPrimal-dual methods have a natural application in Safe Reinforce-\nment Learning (SRL), posed as a constrained policy optimization\nproblem. In practice however, applying primal-dual methods to\nSRL is challenging, due to the inter-dependency of the learning\nrate (LR) and Lagrangian multipliers (dual variables) each time an\nembedded unconstrained RL problem is solved. In this paper, we\npropose, analyze and evaluate adaptive primal-dual (APD) methods\nfor SRL, where two adaptive LRs are adjusted to the Lagrangian\nmultipliers so as to optimize the policy in each iteration. We theo-\nretically establish the convergence, optimality and feasibility of the\nAPD algorithm. Finally, we conduct numerical evaluation of the\npractical APD algorithm with four well-known environments in\nBullet-Safey-Gym employing two state-of-the-art SRL algorithms:\nPPO-Lagrangian and DDPG-Lagrangian. All experiments show that\nthe practical APD algorithm outperforms (or achieves comparable\nperformance) and attains more stable training than the constant\nLR cases. Additionally, we substantiate the robustness of selecting\nthe two adaptive LRs by empirical evidence.\nKEYWORDS\nSafe Reinforcement Learning; Adaptive Primal-Dual; Adaptive Learn-\ning Rates\nACM Reference Format:\nWeiqin Chen, James Onyejizu, Long Vu, Lan Hoang, Dharmashankar Sub-\nramanian, Koushik Kar, Sandipan Mishra, and Santiago Paternain. 2024.\nAdaptive Primal-Dual Method for Safe Reinforcement Learning. In Proc.\nof the 23rd International Conference on Autonomous Agents and Multiagent\nSystems (AAMAS 2024), Auckland, New Zealand, May 6 – 10, 2024 , IFAAMAS,\n13 pages.\n1 INTRODUCTION\nReinforcement learning (RL) has a rich history of solving a wide\nrange of decision-making problems. Recently, RL has succeeded in\nProc. of the 23rd International Conference on Autonomous Agents and Multiagent Systems\n(AAMAS 2024), N. Alechina, V. Dignum, M. Dastani, J.S. Sichman (eds.), May 6 – 10, 2024,\nAuckland, New Zealand .©2024 International Foundation for Autonomous Agents\nand Multiagent Systems (www.ifaamas.org). This work is licenced under the Creative\nCommons Attribution 4.0 International (CC-BY 4.0) licence.training large language models such as ChatGPT [ 1], playing video\ngames at superhuman level [ 2–4], mastering Go [ 5,6], and manip-\nulating robotics [ 7,8]. RL problems, in general, are formulated as\nMarkov Decision Processes (MDPs). In this work, we are interested\nin conditions where the underlying dynamics are unknown, the\noptimal policy thus needs to be learned from data (samples). The\ngoal for an agent is to explore the environment so that it is able to\nmaximize the expected cumulative reward.\nNevertheless, classical RL techniques might lead to risky/unsafe\nactions [ 9–11], if they are only concerned with the reward. There-\nfore, safety constitutes a foundational aspect in realistic domains\nor physical entities. Specifically, in the realm of robot navigation,\nensuring collision avoidance [ 12,13] is essential for their proper\nfunctioning, and to ensure the preservation of human safety in the\nvicinity. Taking into account the safety requirements motivates the\ndevelopment of policy optimization under safety guarantees [ 14–\n16].\nA common approach is to employ the framework of Constrained\nMDPs (CMDPs) [ 17] where auxiliary costs (analogous to reward)\nare considered in the constraints. This framework has gained wide-\nspread adoption for inducing safe behaviors [ 16,18–22]. We briefly\nintroduce these work below.\n1.1 Related Work\nThe state-of-the-art algorithms for solving CMDPs commonly in-\nclude two types of methods: primal methods and primal-dual meth-\nods.\n1.1.1 Primal Methods. [18] develops a constrained policy opti-\nmization (CPO) algorithm for SRL that searches the feasible policy\nwithin the confines of the trust region while guaranteeing a mono-\ntonic performance improvement as well as constraint satisfaction.\nProjection-based constrained policy optimization (PCPO) [ 19] em-\nploys TRPO [ 23], the cutting-edge unconstrained RL algorithm first,\nand then projects the policy back into the feasible set. Nevertheless,\nboth CPO and PCPO suffer from the approximation error and ex-\npensive computation of the inversion of high-dimensional Hessian\nmatrices. To address these issues, [ 20] proposes first-order con-\nstrained optimization in policy space (FOCOPS), which optimizesarXiv:2402.00355v1 [cs.LG] 1 Feb 2024the constrained policy in the non-parametric space, and subse-\nquently derives the first-order gradients of the ℓ2loss function\nin the parameterization space. Another alternative is the penal-\nized proximal policy optimization (P3O) [ 24], which solves the\nconstrained policy iteration based on the minimization of an equiv-\nalent unconstrained problem. However, both FOCOPS and P3O\nintroduce more auxiliary parameters that need to be learned.\n1.1.2 Primal-Dual Methods. Lagrangian-based primal-dual algo-\nrithms like primal-dual optimization (PDO) [ 16] and reward con-\nstrained policy optimization (RCPO) [ 21] have succeeded in solv-\ning CMDP optimization problems. Nevertheless, the convergence\nguarantees of these algorithms are limited to either local (locally\noptimal policies or stationary-point) [ 16,21,25] or asymptotic sce-\nnarios [ 26]. [22] establishes the analysis on the duality gap for\nCMDPs within the policy space and provides a provably dual de-\nscent algorithm under the assumption of access to a non-convex\noptimization oracle. However, obtaining the solution to a primal\nnon-convex problem remains an issue, thus lacking global con-\nvergence guarantees. To tackle these challenges, [ 27] proposes a\nnatural policy gradient primal-dual (NPG-PD) method that achieves\nnon-asymptotic global convergence with sublinear rates regarding\nboth the optimality gap and the constraint violation. [ 28] provides\nthe first provably efficient online policy optimization algorithm–\noptimistic primal-dual proximal policy optimization (OPDOP) and\nestablishes the bounds on the regret and constraint violation. [ 29]\nproposes a safe primal-dual (SPG) algorithm that is used to solve a\nCMDP problem with probabilistic safety constraints. Nonetheless,\nachieving satisfactory performance with the existing primal-dual\nmethods remains challenging, mainly due to their sensitivity to\nhyper-parameters such as learning rates.\n1.2 Main Contribution\nThis paper addresses a core challenge in applying primal-dual meth-\nods to SRL problems, the inter-dependence of the primal Learning\nRate (LR) and Lagrangian Multiplier (LM) (dual variable) param-\neters in the primal-dual method. We provide analytical expres-\nsions (bounds) of the amount of progress made in each step of\nthe primal-dual algorithm, based on which we develop two adap-\ntive LR choices that optimize these bounds. The two LR choices\nhave an inverse-linear and inverse-quadratic dependence on the\nLM, and are incorporated into the proposed adaptive primal-dual\n(APD) algorithm. We provide theoretical analyses of the conver-\ngence, return optimality, and constraint feasibility of the APD algo-\nrithm. Finally, we numerically evaluate the practical version of APD\n(PAPD) algorithm using four environments in the Bullet-Safety-\nGym[ 30], and compare the performance of PAPD with constant-\nLR solutions using two state-of-the-art constrained RL methods:\nPPO-Lagrangian (PPOL) and DDPG-Lagrangian (DDPGL). We also\nnumerically demonstrate the robustness of PAPD algorithm with\nrespect to certain key parameter choices.\n2 SAFE REINFORCEMENT LEARNING\nMDPs are defined by a tuple ( 𝑆,𝐴,𝑅, P,U,𝛾) [31], where𝑆is the\nstate space, 𝐴is the action space, 𝑅:𝑆×𝐴×𝑆→Ris the reward\nfunction describing the quality of the decision. For any ˆ𝑆⊂𝑆,𝑠𝑡∈\n𝑆,𝑎𝑡∈𝐴,𝑡∈ {0,1,···},P(𝑠𝑡+1∈ˆ𝑆|𝑠𝑡,𝑎𝑡)(i.e., the probabilityof𝑠𝑡+1being in ˆ𝑆given𝑠𝑡and𝑎𝑡) is the transition probability\ndescribing the dynamics of the system, U(ˆ𝑆):=P(𝑠∈ˆ𝑆)is the\nstarting state distribution, and 𝛾is the discount factor. Note that a\ntable of notations is provided in the supplementary material, which\nserves to facilitate tracking and enhance comprehension for the\nreaders.\nConsider a parameterization space Θand a probability density\nfunction𝑃(·). Given𝜃∈Θ, a parameterized stationary policy\n𝜋𝜃:𝑆→𝑃(𝐴)maps states to probability distributions over the set\nof actions, and 𝜋𝜃(𝑎|𝑠)indicates the probability density of drawing\naction𝑎∈𝐴in the corresponding state 𝑠∈𝑆. Common parameter-\nizations include neural networks (NN) and Radial Basis Functions\n(RBFs). In this work, we are particularly interested in situations\nwhere the state transition distributions are unknown, and thus the\npolicies need to be computed through interacting with the environ-\nment.\nIn the context of MDPs, the objective is to find an optimal pa-\nrameter that maximizes the expected discounted return\n𝐽𝑅(𝜋𝜃)=E𝜏∼𝜋𝜃\"∞∑︁\n𝑡=0𝛾𝑡𝑅(𝑠𝑡,𝑎𝑡,𝑠𝑡+1)#\n, (1)\nwhere𝜏=(𝑠0,𝑎0,𝑠1,𝑎1,···) denotes a sample trajectory. Given\nfixed initial state distribution 𝑠0∼U and transition distribution\n𝑠𝑡+1∼P(·|𝑠𝑡,𝑎𝑡), let us define a shorthand 𝜏∼𝜋𝜃indicating that\nthe distribution over trajectories depends on the policy through\n𝑎𝑡∼𝜋𝜃(·|𝑠𝑡).\nCMDPs [ 17] impose additional constraints on the allowable poli-\ncies. More concretely, auxiliary cost functions 𝐶𝑖:𝑆×𝐴×𝑆→\nR,𝑖=1,2,···,𝑚are introduced. We make the following assump-\ntion about the costs.\nAssumption 1. Consider𝐵>0and𝐶=[𝐶1,···,𝐶𝑚]𝑇, assume\nwe have bounded costs such that ||𝐶||≤𝐵.\nAnalogous to the expected discounted return, define the expected\ndiscounted cost as\n𝐽𝐶𝑖(𝜋𝜃)=E𝜏∼𝜋𝜃\"∞∑︁\n𝑡=0𝛾𝑡𝐶𝑖(𝑠𝑡,𝑎𝑡,𝑠𝑡+1)#\n. (2)\nDenote by𝑑𝑖,𝑖=1,2,···,𝑚the desired threshold for the ex-\npected discounted cost. Accordingly, SRL problems can be formu-\nlated as\n𝜃∗∈arg max\n𝜃∈Θ𝐽𝑅(𝜋𝜃)\ns.t.𝐽𝐶𝑖(𝜋𝜃)≤𝑑𝑖,𝑖=1,2,···,𝑚. (3)\nThe SRL problem posed in (3)can be solved by applying gradient-\nbased methods on a regularized objective function [ 32] or using\nprimal-dual methods [ 16,29] to achieve local optimal solutions. The\nperformance of the first type of method can heavily depend on the\nchoice of the regularization parameter, and this choice is problem\ndependent for which there is no easy method. In general, for a given\nchoice of regularization parameter, the first type of method may\nnot produce optimal results. In this work, therefore, we focus on\nthe primal-dual method, where the regularization parameter is the\nLM (dual variable) that is progressively updated. We introduce this\nmethod in the next section and motivate the need for an adaptive\nLR in the primal update step.(a) Return\n (b) Cost\nFigure 1: Learning curves of PPOL over five independent\nruns with fixed LM values of 1 and 5. The horizontal axis\nrepresents time steps. Cost limit d=10(black dashed line) in\nall experiments. LR = 0.0006 outperforms LR = 0.0003 at LM\n=1 (red curve is infeasible), while the opposite holds when\nLM = 5.\n3 ADAPTIVE PRIMAL-DUAL ALGORITHM\n3.1 Motivation\nPrimal-dual methods rely on iterative training of the policy param-\neters𝜃to minimize the Lagrangian of (3):\nL(𝜃,𝜆)¤=−𝐽𝑅(𝜋𝜃)+𝜆𝑇(𝐽𝐶(𝜋𝜃)−d), (4)\nwhere𝐽𝐶(·)=[𝐽𝐶1(·),𝐽𝐶2(·),···,𝐽𝐶𝑚(·)]𝑇,d=[𝑑1,𝑑2,···,𝑑𝑚]𝑇,\nand𝜆∈R𝑚is the LM.\nAs stated in Section 1, despite the impressive capabilities demon-\nstrated by state-of-the-art algorithms like PDO [ 16] and RCPO [ 21]\nin addressing a wide range of SRL problems, these primal-dual like\nalgorithms still encounter challenges of selecting an appropriate LR\nfor the embedded RL problem during the training process. Indeed,\nit is natural to posit that employing a constant LR throughout the\ntraining process might not be optimal, given that the LM under-\ngoes continuous changes. We illustrate this through a numerical\nexample in Figure 1. Figure 1 presents learning curves (both Return\nand Cost) for the PPOL method over five independent runs using\nfixed LM values of 1 and 5. We use the SafetyCarRun-v0 environ-\nment from the Bullet-Safety-Gym [ 30] for this test. Notably, as LM\ntransitions from 1 to 5, the LR needs adjustment from 0.0006 to\n0.0003 for optimal results (in terms of return and cost). This means,\nmaintaining a consistent LR across varying LMs might lead to sub-\noptimal results. Specifically, deploying an optimized LR tailored for\nan LM value of 5 (green curve) in a scenario meant for LM value\nof 1 (red curve) and vice versa leads to compromised performance.\nTherefore, accounting for the dependence between LM and LR is\ncrucial for achieving good performance in SRL.\n3.2 Adaptive Learning Rate\nA naive approach to addressing the above challenge is to solve the\nprimal problem in (4)for different values of 𝜆(LM), each with its\noptimized LR. However, this approach does not scale when the LM\nis multi-dimensional (i.e., there are multiple safety constraints) or\nhas a large range. Primal-dual algorithms offer a practical way tofind the LM (dual variable) 𝜆∗that maximizes the dual function\n𝑑(𝜆)=min\n𝜃∈R𝑑−𝐽𝑅(𝜋𝜃)+𝜆𝑇(𝐽𝐶(𝜋𝜃)−d). (5)\nConsequently the optimal policy (primal variable) 𝜃∗is computed\nthrough iterative coordinated updates of the primal and dual vari-\nables\n\u001a𝜃𝑘+1=𝜃𝑘−𝜂𝑘∇𝜃L(𝜃𝑘,𝜆𝑘), (6)\n𝜆𝑘+1=[𝜆𝑘+𝜁𝑔(𝜃𝑘+1)]+, (7)\nwhere𝑔(·)is the constraint function, i.e.,\n𝑔(𝜃𝑘+1)¤=𝐽𝐶(𝜋𝜃𝑘+1)−d, (8)\nand𝜂𝑘,𝜁denote the primal and dual LRs, respectively. Note the\ndependence of the primal LR 𝜂𝑘on iteration 𝑘in (6); this is because\nin our adaptive primal-dual algorithm, described next, 𝜂𝑘depends\non the LM𝜆𝑘.\nWe have reached the phase where we articulate the convergence\nof (7). This is formally established in the following theorem.\nTheorem 1. Consider the dual function 𝑑(·)defined in (5), the con-\nstraint function 𝑔(·)and cost limit din(8). Let𝜆∗∈arg max𝜆∈R𝑚+𝑑(𝜆)\nand define𝐷∗=𝑑(𝜆∗). Let𝜃𝑘and𝜆𝑘be the sequences generated\nby(6)and (7). Denote by 𝜖𝑘the primal error of updating the La-\ngrangian given 𝜆𝑘, i.e.,𝜖𝑘=L(𝜃𝑘+1,𝜆𝑘)−min𝜃L(𝜃,𝜆𝑘). Define\n𝜆best=arg max𝜆∈{𝜆𝑘}𝐾\n𝑘=0𝑑(𝜆), it holds that\n0≤𝐷∗−𝑑(𝜆best)≤∥𝜆0−𝜆∗∥2\n2𝜁𝐾+𝜁(𝐵+(1−𝛾)∥d∥)2\n2(1−𝛾)2\n+1\n𝐾𝐾−1∑︁\n𝑘=0𝜖𝑘. (9)\nProof. The proof follows the standard stochastic gradient descent\nanalysis. See the supplementary material for details. □\nNote that the first two terms on the right-hand side of (9)depend\nexclusively on the problem and on the dual LR. The last term,\nhowever, depends on the primal error 𝜖𝑘. Our goal is to minimize\nthis error through an adaptive selection of the primal LR 𝜂𝑘. We\nresort to two different analyses to bound these errors (see Lemma 1).\nFrom these, we derive two adaptive LRs. Before stating Lemma 1,\nwe require the following assumptions.\nAssumption 2. Assume the gradients of the objective and cost\nfunctions in (3)are Lipschitz continuous with constants 𝐿𝑅,𝐿𝐶1,···,𝐿𝐶𝑚.\nLet𝐿𝐶=\u0002\n𝐿𝐶1,···,𝐿𝐶𝑚\u0003𝑇. This implies that the gradient of La-\ngrangian (4)is Lipschitz on 𝜃\n∥∇𝜃L(𝜃1,𝜆)−∇𝜃L(𝜃2,𝜆)∥≤𝐿(𝜆)∥𝜃1−𝜃2∥. (10)\nwhere𝐿(𝜆)=𝐿𝑅+𝜆𝑇𝐿𝐶.\nAssumption 3. Assume the Lagrangian function L(𝜃,𝜆)is𝜇-\nstrongly convex on 𝜃. This is,L(𝜃1,𝜆𝑘)≥L(𝜃2,𝜆𝑘)+∇𝜃L(𝜃2,𝜆𝑘)𝑇\n(𝜃1−𝜃2)+𝜇/2∥𝜃1−𝜃2∥2.\nLemma 1. Assume the Lagrangian function L(𝜃𝑘,𝜆𝑘)is𝐿′-Lipschitz\ncontinuous. Define 𝛿𝑘=\r\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r\r2\n. Then, the following boundshold for𝜖𝑘given the assumptions that the term inside the square root\nis non-negative.\n𝜖𝑘≤𝐿′√︄\n2\n𝜇\u0012\n𝐿(𝜆)𝛿𝑘+\u0012\n𝐿(𝜆)\u0010\n𝜂1\n𝑘\u00112\n−𝜂1\n𝑘\u0013\n∥∇𝜃L(𝜃𝑘,𝜆𝑘)∥2\u0013\n,\n(11)\n𝜖𝑘≤𝐿′√︄\u0012\n1+\u0010\n𝜂2\n𝑘\u00112\n𝐿(𝜆)2−𝜂2\n𝑘𝜇\u0013\n𝛿𝑘. (12)\nProof. We start the proof by employing the 𝐿′-Lipschitz continuity\nof the Lagrangian to bound 𝜖𝑘\n𝜖𝑘=L(𝜃𝑘+1,𝜆𝑘)−L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\n≤𝐿′\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r. (13)\nHence, to bound 𝜖𝑘, one can instead investigate\r\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r\r.\nWe first focus on (11). It follows from the strong convexity of\nthe Lagrangian with respect to 𝜃that\nL(𝜃𝑘+1,𝜆𝑘)≥L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\n+∇𝜃L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011𝑇\u0010\n𝜃𝑘+1−𝜃∗\n𝑘+1\u0011\n+𝜇\n2\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2. (14)\nSince∇𝜃L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\n=0the previous inequality reduces to\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤2\n𝜇\u0010\nL(𝜃𝑘+1,𝜆𝑘)−L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\u0011\n.(15)\nWe apply the Taylor expansion on both terms on the right-hand\nside of the previous expression around 𝜃𝑘\nL(𝜃𝑘+1,𝜆𝑘)=L(𝜃𝑘,𝜆𝑘)+∇𝜃L(𝜃𝑐,𝜆𝑘)𝑇(𝜃𝑘+1−𝜃𝑘), (16)\nwhere𝜃𝑐=𝜉𝜃𝑘+(1−𝜉)𝜃𝑘+1, 𝜉∈[0,1], and\nL(𝜃∗\n𝑘+1,𝜆𝑘)=L(𝜃𝑘,𝜆𝑘)+∇𝜃L(𝜃′\n𝑐,𝜆𝑘)𝑇\u0010\n𝜃∗\n𝑘+1−𝜃𝑘\u0011\n, (17)\nwhere𝜃′𝑐=𝜉′𝜃𝑘+(1−𝜉′)𝜃∗\n𝑘+1, 𝜉′∈[0,1]. Substituting (16)and\n(17) into (15) reduces to\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤2\n𝜇\u0010\n∇𝜃L(𝜃′\n𝑐,𝜆𝑘)𝑇(𝜃𝑘−𝜃∗\n𝑘+1) (18)\n+∇𝜃L(𝜃𝑐,𝜆𝑘)𝑇(𝜃𝑘+1−𝜃𝑘)\u0011\n.\nBy virtue of∇𝜃L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\n=0(18) reduces to\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤2\n𝜇\u0012\u0010\n∇𝜃L\u0000𝜃′\n𝑐,𝜆𝑘\u0001−∇𝜃L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\u0011𝑇\n\u0010\n𝜃𝑘−𝜃∗\n𝑘+1\u0011\n+∇𝜃L(𝜃𝑐,𝜆𝑘)𝑇(𝜃𝑘+1−𝜃𝑘)\u0011\n.\n(19)\nwhere the last inequality follows from the Lipschitz continuity of\nthe gradient of Lagrangian (see Assumption 2).\nBy adding and subtracting ∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇(𝜃𝑘+1−𝜃𝑘)we obtain\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤2\n𝜇\u0010\n𝐿(𝜆)\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2+\n(∇𝜃L(𝜃𝑐,𝜆𝑘)−∇𝜃L(𝜃𝑘,𝜆𝑘))𝑇(𝜃𝑘+1−𝜃𝑘)\n+∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇(𝜃𝑘+1−𝜃𝑘)\u0011\n. (20)Employing Lipschitz continuity of the gradient of Lagrangian yields\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤2\n𝜇\u0010\n𝐿(𝜆)\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2+𝐿(𝜆)∥𝜃𝑘+1−𝜃𝑘∥2\n+∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇(𝜃𝑘+1−𝜃𝑘)\u0011\n. (21)\nBy definition of 𝛿𝑘the previous inequality can be rewritten as\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤2\n𝜇\u0012\n𝐿(𝜆)𝛿𝑘+𝐿(𝜆)\u0010\n𝜂1\n𝑘\u00112\n∥∇𝜃L(𝜃𝑘,𝜆𝑘)∥2\n−𝜂1\n𝑘∥∇𝜃L(𝜃𝑘,𝜆𝑘)∥2\u0011\n. (22)\nTaking the square root on the previous inequality and combining\nwith (13) completes the proof of (11).\nWe then turn our attention to proving (12). Note that\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2=\r\r𝜃𝑘−𝜂2\n𝑘∇𝜃L(𝜃𝑘,𝜆𝑘)−𝜃∗\n𝑘+1\r\r2\n=\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2+\u0010\n𝜂2\n𝑘\u00112\n∥∇𝜃L(𝜃𝑘,𝜆𝑘)∥2\n−2𝜂2\n𝑘∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇\u0010\n𝜃𝑘−𝜃∗\n𝑘+1\u0011\n. (23)\nBy∇𝜃L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\n=0the previous equation is equivalent to\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2=\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2\n+\u0010\n𝜂2\n𝑘\u00112\r\r\r∇𝜃L(𝜃𝑘,𝜆𝑘)−∇𝜃L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\r\r\r2\n−2𝜂2\n𝑘∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇\u0010\n𝜃𝑘−𝜃∗\n𝑘+1\u0011\n. (24)\nAssumption 2 indicates that the gradient of Lagrangian function is\n𝐿(𝜆)-Lipschitz continuous, and we thus obtain\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2\n+\u0010\n𝜂2\n𝑘\u00112\n𝐿(𝜆)2\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2\n−2𝜂2\n𝑘∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇\u0010\n𝜃𝑘−𝜃∗\n𝑘+1\u0011\n.(25)\nIn addition, the strong convexity of the Lagrangian with respect\nto𝜃shows that\n∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇\u0010\n𝜃∗\n𝑘+1−𝜃𝑘\u0011\n≤L\u0010\n𝜃∗\n𝑘+1,𝜆𝑘\u0011\n−L(𝜃𝑘,𝜆𝑘)\n−𝜇\n2\r\r𝜃∗\n𝑘+1−𝜃𝑘\r\r2\n≤−𝜇\n2\r\r𝜃∗\n𝑘+1−𝜃𝑘\r\r2, (26)\nwhere the last inequality follows from the fact that 𝜃∗\n𝑘+1is the\nminimizer of the Lagrangian. Subsequently, combining (25)and\n(26) yields\n\r\r𝜃𝑘+1−𝜃∗\n𝑘+1\r\r2≤\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2−𝜂2\n𝑘𝜇\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2\n+\u0010\n𝜂2\n𝑘\u00112\n𝐿(𝜆)2\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2\n=\u0012\n1+\u0010\n𝜂2\n𝑘\u00112\n𝐿(𝜆)2−𝜂2\n𝑘𝜇\u0013\r\r𝜃𝑘−𝜃∗\n𝑘+1\r\r2.(27)\nTaking the square root and combining with (13)completes the proof\nof the result. □\nBy virtue of Assumptions 2, 3 and Lemma 1, we are able to derive\ntwo optimal LRs that minimize the two bounds in (11)and(12). We\nformalize this claim in the following theorem.Theorem 2. Let Assumption 2 and Assumption 3 hold. Then, the\nlearning rates 𝜂1\n𝑘=1\n2𝐿(𝜆)and𝜂2\n𝑘=𝜇\n2𝐿(𝜆)2minimize the bounds in\n(11) and (12), respectively. Denote by 𝜖1\n𝑘and𝜖2\n𝑘the bounds on the\nprimal error using 𝜂1\n𝑘and𝜂2\n𝑘. Consider the 𝐿′-Lipschitz continuity of\nthe LagrangianL(𝜃𝑘,𝜆𝑘)and𝛿𝑘in Lemma 1. Then, it holds that\n𝜖1\n𝑘≤𝐿′√︄\n2𝛿𝑘\n𝜇\u0012\n𝐿(𝜆)−𝜇2\n16𝐿(𝜆)\u0013\n, (28)\n𝜖2\n𝑘≤𝐿′√︄\n𝛿𝑘\u0012\n1−𝜇2\n4𝐿(𝜆)2\u0013\n. (29)\nProof. We start by establishing two LRs 𝜂1\n𝑘and𝜂2\n𝑘. As observed\nin(11), the right-hand side is convex with respect to 𝜂1\n𝑘since\n𝐿′,𝐿(𝜆),𝛿𝑘are independent of 𝜂1\n𝑘. To minimize it one can com-\npute the derivative and make it zero. Then the minimizer of the\nright-hand side of (11) is given by\n𝜂1\n𝑘=1\n2𝐿(𝜆). (30)\nLikewise, the right-hand side of (12)is convex with respect to\n𝜂2\n𝑘, and the optimal LR (minimizer) takes the form of\n𝜂2\n𝑘=𝜇\n2𝐿(𝜆)2. (31)\nHaving established 𝜂1\n𝑘and𝜂2\n𝑘, we are now in the stage of proving\n𝜖1\n𝑘and𝜖2\n𝑘. For𝜖1\n𝑘, substituting 𝜂1\n𝑘into(11)yields the tightest upper\nbound, i.e.,\n𝜖1\n𝑘≤𝐿′√︄\n2\n𝜇\u0012\n𝐿(𝜆)𝛿𝑘−∥∇𝜃L(𝜃𝑘,𝜆𝑘)∥2\n4𝐿(𝜆)\u0013\n. (32)\nStrong convexity indicates that\n−∇𝜃L(𝜃𝑘,𝜆𝑘)𝑇\u0010\n𝜃∗\n𝑘+1−𝜃𝑘\u0011\n≥𝜇\n2\r\r𝜃∗\n𝑘+1−𝜃𝑘\r\r2. (33)\nSquaring both sides of the previous inequality, using the Cauchy-\nSchwartz inequality and the definition of 𝛿𝑘it follows that\n∥∇𝜃L(𝜃𝑘,𝜆𝑘)∥2≥𝜇2\n4\r\r𝜃∗\n𝑘+1−𝜃𝑘\r\r2=𝜇2\n4𝛿𝑘. (34)\nCombining the previous inequality with (32) yields\n𝜖1\n𝑘≤𝐿′√︄\n2𝛿𝑘\n𝜇\u0012\n𝐿(𝜆)−𝜇2\n16𝐿(𝜆)\u0013\n. (35)\nOur focus now shifts towards the derivation of 𝜖2\n𝑘. Substituting\n𝜂2\n𝑘into (12) yields the tightest upper bound on 𝜖2\n𝑘\n𝜖2\n𝑘≤𝐿′√︄\n𝛿𝑘\u0012\n1−𝜇2\n4𝐿(𝜆)2\u0013\n. (36)\nThese complete the proof of Theorem 2. □\nNotice that both LRs proposed by Theorem 2 demonstrate an in-\nverse relationship with respect to the LM, which is also empirically\nvalidated by our preliminary observations in Figure 1. Moreover, 𝜂1\n𝑘\nhas an inverse-linear dependence on LM while 𝜂2\n𝑘has an inverse-\nquadratic dependence on LM. We therefore term them InvLin and\nInvQua , respectively. It is important to point out that we assume\nthat the Lagrangian is strongly convex. This is generally not the\ncase for RL problems. However, one can assume local convexityAlgorithm 1 Adaptive Primal-Dual (APD)\n1:Input :𝜃0,𝜆0,𝜁,𝐿𝑅,𝐿𝐶,𝜇(optional)\n2:for𝑘=0,1,···,do\n3: Choose primal LR from (30) or (31)\n4: Update primal variable (policy parameter) as in (6)\n5: Update dual variable (LM) as in (7)\n6:end for\nAlgorithm 2 Practical Adaptive Primal-Dual (PAPD)\n1:Input :𝜃0,𝐻1(𝐻′\n1),𝐻2(𝐻′\n2),𝐾𝑃,𝐾𝐼,𝐾𝐷\n2:for𝑘=0,1,···,do\n3: Choose primal LR from (39)\n4: Update primal variable (policy parameter) as in (6)\n5: Update dual variable (LM) as in (40)\n6:end for\naround a local minimum. We chose this stronger assumption for\nsimplicity in the exposition.\nHaving established InvLin andInvQua as well as corresponding\nbounds𝜖1\n𝑘and𝜖2\n𝑘, we are able to propose an adaptive primal-dual\n(APD) algorithm, which is summarized under Algorithm 1. Notice\nthat Theorem 1 indicating the (approximate) convergence of the\nLM also holds for the APD algorithm. Furthermore, with 𝜖1\n𝑘and𝜖2\n𝑘,\nwe can further establish the guarantee of proximity to the primal\noptimum𝐽𝑅(𝜋𝜃∗). The following theorem addresses this aspect\nexplicitly.\nTheorem 3. Consider𝜃∗and𝐽𝑅(𝜋𝜃)in(3). Let the hypotheses of\nTheorem 1 hold, and consider the sequence of the LM generated by\nAlgorithm 1. Then, it holds that\nlim inf\n𝐾→∞1\n𝐾𝐾−1∑︁\n𝑘=0𝐽𝑅(𝜋𝜃𝑘+1)≥𝐽𝑅(𝜋𝜃∗)−1\n𝐾 𝐾−1∑︁\n𝑘=0𝜖𝑘!\n−𝜁(𝐵+(1−𝛾)∥d∥)2\n2(1−𝛾)2. (37)\nProof. See the supplemental material. □\nNotice that𝜖𝑘in(37)can be bounded by (28)or(29), depending\nonInvLin orInvQua is selected. Theorem 3 demonstrates that the\nlimit inferior of the average of the sequence derived by Algorithm 1\napproximates well the value of 𝐽𝑅(𝜋𝜃∗). In principle, the limit supe-\nrior has the potential to be significantly larger than 𝐽𝑅(𝜋𝜃∗), which\nwould lead to constraint violations. In the following result, we prove\nthat this is not the case, i.e., the sequence generated by Algorithm 1\nis feasible on average.\nTheorem 4. Let hypotheses of Theorem 1 hold. It holds that\nlim sup\n𝐾→∞1\n𝐾𝐾−1∑︁\n𝑘=0𝐽𝐶𝑖(𝜋𝜃𝑘)≤𝑑𝑖,𝑖=1,2,···,𝑚. (38)\nProof. See the supplemental material. □\nDespite the theoretical guarantees on APD (Algorithm 1) re-\ngarding the convergence, optimality, and feasibility, estimating the\nLipschitz constant 𝐿(𝜆)and the strongly convex constant 𝜇in the\nLRs (30)and (31)is, in general, computationally expensive. Wethus consider a practical version of adaptive LRs. Under the single\nconstraint, the adaptive LRs in (30) and (31) can be written as\n𝜂1\n𝑘=𝐻1/(𝜆𝑘+𝐻2), 𝜂2\n𝑘=𝐻′\n1/(𝜆𝑘+𝐻′\n2)2, (39)\nwhere𝐻1,𝐻2,𝐻′\n1,𝐻′\n2are hyper-parameters.\nNote that the update on the policy parameter is updated by run-\nning a step of any RL algorithm with the adaptive LRs in (39). In\nparticular, we consider state-of-the-art algorithms such as PPOL\nand DDPGL. However, the dual variables frequently exhibit tenden-\ncies to overshoot and oscillate, thereby hindering performance. To\naddress these challenges, we adopt the Proportional Integral Deriv-\native (PID) Lagrangian strategies as introduced by [ 33]. Drawing\ninspiration from the feedback control, the LM is updated as\n𝜆𝑘=\u0010\n𝐾𝑃(𝐽𝑘\n𝐶−𝑑)+𝐾𝐼𝐼𝑘+𝐾𝐷(𝐽𝑘\n𝐶−𝐽𝑘−1\n𝐶)\u0011\n+, (40)\nwhere𝐼𝑘is recursively defined as 𝐼𝑘=(𝐼𝑘−1+𝐽𝑘\n𝐶−𝑑)+and sub-\nscript+indicates projection onto the non-negative orthant. The\nthree hyper-parameters 𝐾𝑃,𝐾𝐼, and𝐾𝐷represent the proportional,\nintegral, and derivative gains. In particular, selecting 𝐾𝑃=𝐾𝐷=0\nthe update reduces to gradient descent on the dual domain.\nWith the practical adaptive LRs ( InvLin andInvQua ) defined as in\n(39), as well as the dual update rule (40)using PID-Lagrangian, the\npractical version of APD (PAPD) algorithm, which we implement\nand evaluate in the subsequent section, is described in Algorithm 2.\n4 EXPERIMENTS\nThe experimental details are deferred to the supplementary mate-\nrial.\n4.1 Environment\nTo validate our findings, we consider the Bullet-Safety-Gym envi-\nronments [ 30] and the Fast Safe Reinforcement Learning (FSRL)\nframework [ 34] in this work. The Bullet-Safety-Gym is a platform\ndesigned to train and evaluate safety features in constrained RL\nscenarios. Meanwhile, the FSRL library offers structured modules\nfor implementing SRL algorithms including PPOL and DDPGL.\nTable 1: Running time (seconds) using PPOL for all experiments.\nEach case contains five independent runs.\nEnvironment BallRun CarRun BallCircle CarCircle\nInvLin 128.1±5.2159.0±5.6 223.8±5.6 861.0±28.2\nInvQua 128.1±2.7 161.9±14.5 228.2±11.1 993.2±33.8\nLR=0.0001 127.1±1.5 162.0±13.8 234.4±2.6 984.5±56.1\nLR=0.00025 125.8±4.3 164.0±18.4 230.3±9.1 961.9±61.1\nLR=0.0005 124.4±3.9 170.9±17.7 222.8±13.6 908.8±35.1\nLR=0.001 120.5±6.3163.6±22.7214.7±14.5868.9±27.9\n4.2 Results\nWe compare Algorithm 2 with the constant LR primal-dual algo-\nrithm in four environments of Bullet-Safety-Gym: SafetyBallRun-v0 ,\nSafetyCarRun-v0 ,SafetyBallCircle-v0 ,SafetyCarCircle-v0 (described\nin the supplementary material). For a fair comparison, we maintainuniformity in all parameters and hyper-parameters (except for the\nLR) across each case (see the supplementary material for details\nof the hyper-parameters). While Algorithm 2 relies on five hyper-\nparameters (other than 𝜃0), its performance is fairly robust to the\nchoice of these parameter values. We employ the default values\nof𝐾𝑃,𝐾𝐼,𝐾𝐷in FSRL across all experiments. In addition, we nu-\nmerically substantiate the robustness of the algorithm performance\nagainst variations in 𝐻1(𝐻′\n1),𝐻2(𝐻′\n2)values in Section 4.3.\nFigure 2 depicts the training curves of return, cost, and LR using\nPPOL over five random seeds. The solid line illustrates the mean and\nthe shaded area depicts the minimum and maximum values across\nseeds. More specifically, the smallest constant LR (LR = 0.0001) has\nthe worst performance in all four environments. Despite the stable\ntraining process, this LR makes significant sacrifices in both aspects\nof convergence rate and optimal value (return). To some extent,\nthe above issue can be alleviated by using a larger LR. The purple\ncurves in Figure 2 show a better performance achieved by LR =\n0.00025. Nevertheless, the performance is not maintained as one\nkeeps increasing LR. Indeed, the experiments in SafetyBallCircle-v0\npresent that the training processes become more unstable (larger\nvariance) and/or converge to a worse solution when LR = 0.0005\nis selected. Ultimately, if LR is continuously raised until it reaches\n0.001, all experiments exhibit either a significant fluctuation in re-\nturn and cost, or in some cases, an even worse average performance\ncompared to using a LR of 0.0005.\nOn the contrary, PAPD with InvLin andInvQua outperform all\nconstant-LR cases in SafetyBallCircle-v0 andSafetyCarCircle-v0 , and\nachieve comparable performance in terms of return and cost with\nthe best constant-LR trials in SafetyBallRun-v0 andSafetyCarRun-v0 .\nThis stems from the common criterion in the optimization literature,\nwhere the solutions with higher returns but violating constraints (in-\nfeasible) are regarded as having “inferior performance”. Moreover,\nwe present the running time employing PPOL for all experiments,\nas detailed in Table 1, where BallRun ,CarRun ,BallCircle ,CarCir-\ncleserve as succinct abbreviations for the corresponding environ-\nments, namely SafetyBallRun-v0 ,SafetyCarRun-v0 ,SafetyBallCircle-\nv0,SafetyCarCircle-v0 . Table 1 unveils the absence of substantial\ndifference in running time between our PAPD algorithm and the\nconstant-LR baselines. In addition, it is noteworthy that we use\nthe same hyper-parameters 𝐻1=0.001,𝐻2=3inInvLin and same\n𝐻′\n1=0.015,𝐻′\n2=6inInvQua across all experiments.\nWe also apply DDPGL to update policy parameters in the PAPD\nalgorithm. Similar to what we observe in Figure 2, InvLin andIn-\nvQua employing DDPGL surpasses or matches the best perfor-\nmance of all constant-LR cases. Given the limited space, the results\nof DDPGL experiments are meticulously detailed and analyzed\nin the supplementary material. Likewise, we maintain uniformity\nin hyper-parameter values throughout all conducted experiments.\nThis consistency, despite the varied experimental scenarios, speaks\nto the robustness of our PAPD approach. Further evidence sup-\nporting this robustness statement will be discussed in the next\nsubsection.\n4.3 Robustness Verification\nHaving observed the sensitivity of experimental results with respect\nto the constant-LR, one might naturally find themselves intriguedReturn- SafetyBallRun-v0\n Return- SafetyCarRun-v0\n Return- SafetyBallCircle-v0\n Return- SafetyCarCircle-v0\nCost- SafetyBallRun-v0\n Cost- SafetyCarRun-v0\n Cost- SafetyBallCircle-v0\n Cost- SafetyCarCircle-v0\nLR-SafetyBallRun-v0\n LR-SafetyCarRun-v0\n LR-SafetyBallCircle-v0\n LR-SafetyCarCircle-v0\nFigure 2: Learning curves for PPOL over four environments with five independent runs. In all figures, the horizontal axis is the\nnumber of time step. The solid line illustrates the mean and the shaded area depicts the maximum and the minimum. In all\nexperiments, 𝐻1=0.001,𝐻2=3forInvLin ,𝐻′\n1=0.015,𝐻′\n2=6forInvQua , and cost limit d =10(black dashed line).\nby the sensitivity exhibited by 𝐻1(𝐻′\n1),𝐻2(𝐻′\n2). As shown in (39),\n𝐻1(𝐻′\n1)plays a similar role to constant-LR in a natural way. There-\nfore, a compelling point of interest would involve their comparison\nwith the constant-LR. On the other hand, 𝐻2(𝐻′\n2)is added to the LM\n𝜆𝑘. Indeed, for large values of 𝜆𝑘,𝐻2(𝐻′\n2)becomes more negligible,\nwhereas for small values of 𝜆𝑘, the LR will focus on 𝐻2(𝐻′\n2)itself.\nThe LM describes the level of complexity involved in solving the\nproblem, which indicates that 𝐻2(𝐻′\n2)generally depends on the\nproblems/tasks. In this subsection, we substantiate the robustness\nof𝐻1(𝐻′\n1)and𝐻2(𝐻′\n2), respectively. The results are summarized in\nTables 2, 3 and 4.\nTable 2 summarizes the experimental results of PPOL algorithm\ninSafetyCarRun-v0 , where each case contains five independent runs.\nMore concretely, the parameters in the first block are the same as\nin Figure 2, where constant LR (0.00025) has the most comparable\nperformance with InvLin (𝐻1=0.001) and InvQua (𝐻′\n1=0.015), andwe thus select it for robustness verification. In the next three blocks,\nthe constant LR, 𝐻1, and𝐻′\n1are reduced by the same proportion,\nand we also increase the three parameters by the same scale in the\nlast four blocks. These 8 blocks contain a wide range of constant\nLR,𝐻1,𝐻′\n1, and thus enable us to fairly compare their sensitivity.\nThe goal of problem (3)is to maximize the expected return while\nsatisfying the constraint, i.e., cost<10in our experiments. With\nthis in mind, Table 2 shows that InvLin achieves the best perfor-\nmance in the first, second, and fifth blocks, while InvQua stands\nout as the epitome of exceptional performance in the rest of blocks.\nThe fifth block is the specialty, where all three cases are infeasible.\nIn this case, InvLin is selected to be the best due to the smallest\nconstraint violations and almost the largest return. To summarize,\nour proposed InvLin andInvQua outperform the constant LR in a\nwide range of values.Table 2: Robustness verification for 𝐻1/𝐻′\n1using SafetyCarRun-v0 and PPOL. Each\ncase contains five independent runs. In all experiments, 𝐻2=3/𝐻′\n2=6are fixed as in\nFigure 2. The first block showcases three baselines: constant LR = 0.00025 (Baseline1),\nInvLin𝐻1=0.001(Baseline2), InvQua𝐻′\n1=0.015(Baseline3), as selected in Figure 2. In\nthe rest of blocks, constant LR, 𝐻1,𝐻′\n1are decreased/increased by the same proportion.\nParameter Return Cost Parameter Return Cost\nBaseline1 538.10±8.71 12.48±10.96 Baseline1×0.2 421.26±40.82 9.64±4.90\nBaseline2 537.59±11.40 9.98±5.98 Baseline2×0.2 502.48±27.43 8.80±5.15\nBaseline3 545.22±4.93 13.40±4.78 Baseline3×0.2 513.93±7.35 11.50±4.55\nBaseline1×0.32 492.65±15.78 7.66±5.34 Baseline1×0.4 510.41±13.62 9.22±6.14\nBaseline2×0.32 511.41±22.70 11.46±7.22 Baseline2×0.4 526.35±4.30 18.42±8.38\nBaseline3×0.32 509.91±29.01 8.94±5.74 Baseline3×0.4 519.52±11.61 8.04±5.66\nBaseline1×1.6 545.26±4.50 15.22±7.48 Baseline1×2.4 539.62±19.01 10.02±10.87\nBaseline2×1.6 548.04±8.59 14.32±7.21 Baseline2×2.4 528.23±28.56 4.74±5.68\nBaseline3×1.6 548.45±7.52 15.96±11.93 Baseline3×2.4 542.24±8.92 8.28±8.27\nBaseline1×3.2 536.08±12.57 6.42±8.25 Baseline1×4.0 529.97±15.72 1.26±1.08\nBaseline2×3.2 544.97±8.28 10.70±5.69 Baseline2×4.0 533.70±19.98 9.56±10.51\nBaseline3×3.2 538.08±11.93 5.66±6.96 Baseline3×4.0 534.07±20.06 7.70±11.52\nTable 3: Summary of Table 2\nParamter Best Performance Overall Return Overall Cost\nConstant LR 536.08/6.42 514.17±41.45 8.99±4.15\nInvLin -𝐻1 537.59/9.98 529.10±15.74 10.99±4.03\nInvQua -𝐻′\n1542.24/8.28 531.43±14.92 9.94±3.41\nTable 4: Robustness verification for 𝐻2/𝐻′\n2using SafetyCarRun-\nv0and PPOL. Each case contains five independent runs. In all\nexperiments, 𝐻1=0.001/𝐻′\n1=0.015are fixed as in Figure 2. The\ntwo baselines, denoted as BS1andBS2, correspond to InvLin\n𝐻2=3andInvQua𝐻′\n2=6as selected in Figure 2. Starting from\nthe first block, 𝐻2/𝐻′\n2are increased by 10%.\n𝐻2/𝐻′\n2Return Cost 𝐻2/𝐻′\n2Return Cost\nBS1×0.8 543.05±10.21 12.40±8.66 BS1×0.9 531.73±12.61 5.80±6.15\nBS2×0.8 545.09±3.82 6.56±5.05 BS2×0.9 543.58±6.84 8.04±5.26\nBS1×1.1 538.27±5.70 8.86±6.90 BS1×1.2 531.27±8.97 7.90±6.14\nBS2×1.1 547.12±2.44 13.28±2.49 BS2×1.2 537.37±7.68 9.50±4.40\nWe further analyze Table 2 from the perspective of all blocks.\nIndeed, Table 3 extracts the best performance of three parameters\nacross all blocks. All of them attain feasible solutions, with InvQua\nemerging as the optimal choice by achieving return =542.24,cost=\n8.28. On the other hand, we collect the mean values of the return\nand the cost in each block of Table 2, and compute their mean and\nstandard deviation across all eight blocks. These are shown in the\nlast two columns: “Overall Return” and “Overall Cost”. Notice that\nthe best “overall performance”, i.e., the best overall return-cost pair\ngoes to InvQua again. In addition, InvLin andInvQua yield smaller\nstandard deviation than the constant LR case in terms of both return\nand cost.Furthermore, Table 4 tests the robustness of 𝐻2(𝐻′\n2). We also use\nthe same𝐻1(𝐻′\n1),𝐻2(𝐻′\n2)as in Figure 2 as our baselines. Then, we\nincrease𝐻2(𝐻′\n2)by10%starting from the first block in Table 4, while\nkeeping𝐻1(𝐻′\n1)constant. Note that we maintain the satisfactory\nperformance in three of the blocks and encounter small loss in\nthe worst case while changing 𝐻2(𝐻′\n2). Moreover, InvQua shows\nlarger sensitivity to 𝐻′\n2, which could be naturally explained by its\nquadratic format.\nIn summary, we are able to employ the same 𝐻1(𝐻′\n1),𝐻2(𝐻′\n2)in\nfour different Bullet-Safety-Gym environments for both PPOL and\nDDPGL algorithms. In addition, Tables 2 and 3 indicate that InvLin\nandInvQua outperform the constant LR baselines in a wide range\nof𝐻1(𝐻′\n1)that are selected, and Table 4 validates the robustness of\n𝐻2(𝐻′\n2)as well. Therefore, these numerical results substantiate the\nrobustness of our proposed PAPD algorithm.\n5 CONCLUDING REMARKS\nIn this work, we propose the Adaptive Primal-Dual (APD) algorithm\nand its practical version (PAPD) that leverage adaptive learning\nrates for safe reinforcement learning (SRL). Theoretically, we pro-\nvide the analyses of the APD algorithm in terms of the convergence,\noptimality and feasibility. We also numerically evaluate the PAPD\nalgorithm across four well-known SRL environments in the Bullet-\nSafety-Gym. Our experiments show that the PAPD algorithm out-\nperforms the primal-dual algorithm with constant learning rates.\nIn addition, we validate the robustness of our proposed algorithm\nby testing across various environments, different RL methods, and\na wide range of hyper-parameters associated with the two adaptive\nlearning rates.\nACKNOWLEDGMENTS\nThis work is supported by the Rensselaer-IBM AI Research Collabo-\nration. The authors thank Zuxin Liu for his thoughtful suggestions\nand valuable insights.REFERENCES\n[1]John Schulman, Barret Zoph, Christina Kim, Jacob Hilton, Jacob Menick, Jiayi\nWeng, Juan Felipe Ceron Uribe, Liam Fedus, Luke Metz, Michael Pokorny, et al.\nChatgpt: Optimizing language models for dialogue. OpenAI blog , 2022.\n[2]Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis\nAntonoglou, Daan Wierstra, and Martin Riedmiller. Playing atari with deep\nreinforcement learning. arXiv preprint arXiv:1312.5602 , 2013.\n[3]Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness,\nMarc G Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg\nOstrovski, et al. Human-level control through deep reinforcement learning.\nnature , 518(7540):529–533, 2015.\n[4]Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timo-\nthy Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous\nmethods for deep reinforcement learning. In International conference on machine\nlearning , pages 1928–1937. PMLR, 2016.\n[5]David Silver, Julian Schrittwieser, Karen Simonyan, Ioannis Antonoglou, Aja\nHuang, Arthur Guez, Thomas Hubert, Lucas Baker, Matthew Lai, Adrian Bolton,\net al. Mastering the game of go without human knowledge. nature , 550(7676):354–\n359, 2017.\n[6]David Silver, Thomas Hubert, Julian Schrittwieser, Ioannis Antonoglou, Matthew\nLai, Arthur Guez, Marc Lanctot, Laurent Sifre, Dharshan Kumaran, Thore Graepel,\net al. A general reinforcement learning algorithm that masters chess, shogi, and\ngo through self-play. Science , 362(6419):1140–1144, 2018.\n[7]Hai Nguyen and Hung La. Review of deep reinforcement learning for robot\nmanipulation. In 2019 Third IEEE International Conference on Robotic Computing\n(IRC) , pages 590–595. IEEE, 2019.\n[8]Sergey Levine, Chelsea Finn, Trevor Darrell, and Pieter Abbeel. End-to-end\ntraining of deep visuomotor policies. The Journal of Machine Learning Research ,\n17(1):1334–1373, 2016.\n[9]Javier Garcıa and Fernando Fernández. A comprehensive survey on safe re-\ninforcement learning. Journal of Machine Learning Research , 16(1):1437–1480,\n2015.\n[10] Shangding Gu, Long Yang, Yali Du, Guang Chen, Florian Walter, Jun Wang,\nYaodong Yang, and Alois Knoll. A review of safe reinforcement learning: Methods,\ntheory and applications. arXiv preprint arXiv:2205.10330 , 2022.\n[11] Weiqin Chen, Dharmashankar Subramanian, and Santiago Paternain. Policy\ngradients for probabilistic constrained reinforcement learning. In 2023 57th\nAnnual Conference on Information Sciences and Systems (CISS) , pages 1–6. IEEE,\n2023.\n[12] Gregory Kahn, Adam Villaflor, Bosen Ding, Pieter Abbeel, and Sergey Levine. Self-\nsupervised deep reinforcement learning with generalized computation graphs\nfor robot navigation. In 2018 IEEE International Conference on Robotics and\nAutomation (ICRA) , pages 5129–5136. IEEE, 2018.\n[13] Kai Zhu and Tao Zhang. Deep reinforcement learning based mobile robot navi-\ngation: A review. Tsinghua Science and Technology , 26(5):674–691, 2021.\n[14] Peter Geibel. Reinforcement learning for mdps with constraints. In European\nConference on Machine Learning , pages 646–653. Springer, 2006.\n[15] Yoshinobu Kadota, Masami Kurano, and Masami Yasuda. Discounted markov\ndecision processes with utility constraints. Computers & Mathematics with\nApplications , 51(2):279–284, 2006.\n[16] Yinlam Chow, Mohammad Ghavamzadeh, Lucas Janson, and Marco Pavone. Risk-\nconstrained reinforcement learning with percentile risk criteria. The Journal of\nMachine Learning Research , 18(1):6070–6120, 2017.\n[17] Eitan Altman. Constrained Markov decision processes , volume 7. CRC press, 1999.\n[18] Joshua Achiam, David Held, Aviv Tamar, and Pieter Abbeel. Constrained policy\noptimization. In International conference on machine learning , pages 22–31. PMLR,\n2017.\n[19] Tsung-Yen Yang, Justinian Rosca, Karthik Narasimhan, and Peter J Ramadge.\nProjection-based constrained policy optimization. arXiv preprint arXiv:2010.03152 ,\n2020.\n[20] Yiming Zhang, Quan Vuong, and Keith Ross. First order constrained optimization\nin policy space. Advances in Neural Information Processing Systems , 33:15338–\n15349, 2020.\n[21] Chen Tessler, Daniel J Mankowitz, and Shie Mannor. Reward constrained policy\noptimization. arXiv preprint arXiv:1805.11074 , 2018.\n[22] Santiago Paternain, Luiz Chamon, Miguel Calvo-Fullana, and Alejandro Ribeiro.\nConstrained reinforcement learning has zero duality gap. Advances in Neural\nInformation Processing Systems , 32, 2019.\n[23] John Schulman, Sergey Levine, Pieter Abbeel, Michael Jordan, and Philipp Moritz.\nTrust region policy optimization. In International conference on machine learning ,\npages 1889–1897. PMLR, 2015.\n[24] Linrui Zhang, Li Shen, Long Yang, Shixiang Chen, Bo Yuan, Xueqian Wang, and\nDacheng Tao. Penalized proximal policy optimization for safe reinforcement\nlearning. arXiv preprint arXiv:2205.11814 , 2022.\n[25] Shalabh Bhatnagar and K Lakshmanan. An online actor–critic algorithm with\nfunction approximation for constrained markov decision processes. Journal of\nOptimization Theory and Applications , 153:688–708, 2012.[26] Vivek S Borkar. An actor-critic algorithm for constrained markov decision\nprocesses. Systems & control letters , 54(3):207–213, 2005.\n[27] Dongsheng Ding, Kaiqing Zhang, Tamer Basar, and Mihailo Jovanovic. Natural\npolicy gradient primal-dual method for constrained markov decision processes.\nAdvances in Neural Information Processing Systems , 33:8378–8390, 2020.\n[28] Dongsheng Ding, Xiaohan Wei, Zhuoran Yang, Zhaoran Wang, and Mihailo\nJovanovic. Provably efficient safe exploration via primal-dual policy optimization.\nInInternational Conference on Artificial Intelligence and Statistics , pages 3304–3312.\nPMLR, 2021.\n[29] Weiqin Chen, Dharmashankar Subramanian, and Santiago Paternain. Prob-\nabilistic constraint for safety-critical reinforcement learning. arXiv preprint\narXiv:2306.17279 , 2023.\n[30] Sven Gronauer. Bullet-safety-gym: A framework for constrained reinforcement\nlearning. 2022.\n[31] Richard S Sutton and Andrew G Barto. Reinforcement learning: An introduction .\nMIT press, 2018.\n[32] Yair Censor. Pareto optimality in multiobjective problems. Applied Mathematics\nand Optimization , 4(1):41–59, 1977.\n[33] Adam Stooke, Joshua Achiam, and Pieter Abbeel. Responsive safety in reinforce-\nment learning by pid lagrangian methods. In International Conference on Machine\nLearning , pages 9133–9143. PMLR, 2020.\n[34] Zuxin Liu, Zijian Guo, Haohong Lin, Yihang Yao, Jiacheng Zhu, Zhepeng Cen,\nHanjiang Hu, Wenhao Yu, Tingnan Zhang, Jie Tan, et al. Datasets and benchmarks\nfor offline safe reinforcement learning. arXiv preprint arXiv:2306.09303 , 2023.\n[35] Miguel Calvo-Fullana, Santiago Paternain, Luiz FO Chamon, and Alejandro\nRibeiro. State augmented constrained reinforcement learning: Overcoming the\nlimitations of learning with rewards. arXiv preprint arXiv:2102.11941 , 2021.\n[36] Alla Dita Raza Choudary and Constantin P Niculescu. Real analysis on intervals .\nSpringer, 2014.\n[37] John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov.\nProximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 , 2017.6 SUPPLEMENTARY MATERIAL\nTo make this work self-contained and easy to read, the supplemen-\ntary material is organized as follows. In the first subsection, we\nshowcase a table of notations for the reader’s effortless tracking.\nIn Sections 6.2 - 6.4, we provide the detailed proofs of theorems\nclaimed in the main body of paper. In Section 6.5, we present the de-\ntails of experiments including environment, methodology, results,\nand implementation.\n6.1 Table of Notations\nWe present a table of notations, as outlined in Table 5, which serves\nto facilitate tracking and enhance comprehension for the readers.\nTable 5: Table of Notations\nNotation Definition Notation Definition\n𝑆 state space 𝐴 action space\n𝑠 state 𝑎 action\n𝑅 reward function 𝐶 cost function\nP transition probability 𝛾 discount factor\nU initial state distribution 𝜋 policy\nΘ parameterization space 𝜏 trajectory\n𝜃 primal variable 𝜆 dual variable\n𝐽𝑅 expected return 𝐽𝐶 expected cost\n𝐵 cost bound L Lagrangian\nLM Lagrangian multiplier LR learning rate\nd constraint threshold 𝑑 dual function\n𝜂𝑘 primal stepsize 𝜁 dual stepsize\n𝜆∗optimal dual variable 𝐷∗dual optimum\n𝑔 constraint function 𝜖𝑘 Lagrangian error\n𝜇 strongly convex constant 𝐿 Lipschitz constant\n𝐻1(𝐻2) practical LR constant 𝐾𝑃 proportional gain\n𝐾𝐼 integral gain 𝐾𝐷 derivative gain\n6.2 Proof of Theorem 1\nWe start by recalling the dual update (7)\n𝜆𝑘+1=[𝜆𝑘+𝜁𝑔(𝜃𝑘+1)]+. (41)\nThen, we obtain\n||𝜆𝑘+1−𝜆∗||2=||[𝜆𝑘+𝜁𝑔(𝜃𝑘+1)]+−𝜆∗||2\n≤||𝜆𝑘−𝜆∗+𝜁𝑔(𝜃𝑘+1)||2, (42)\nwhere the last inequality follows from the non-expansiveness of\nthe projection.\nExpanding the norm square yields\n||𝜆𝑘+1−𝜆∗||2≤||𝜆𝑘−𝜆∗||2+𝜁2||𝑔(𝜃𝑘+1)||2\n+2𝜁(𝜆𝑘−𝜆∗)𝑇𝑔(𝜃𝑘+1). (43)\nCombining Assumption 1 and (2) yields ||𝐽𝐶||≤𝐵/(1−𝛾). By the\ndefinition of 𝑔(𝜃𝑘+1)in (8) and the triangle inequality we obtain\n||𝑔(𝜃𝑘+1)||2≤(||𝐽𝐶||+|| d||)2≤(𝐵\n1−𝛾+||d||)2. (44)Then we have\n||𝜆𝑘+1−𝜆∗||2≤||𝜆𝑘−𝜆∗||2+𝜁2(𝐵\n1−𝛾+||d||)2\n+2𝜁(𝜆𝑘−𝜆∗)𝑇𝑔(𝜃𝑘+1). (45)\nTo proceed, we rely on the following technical lemma.\nLemma 2. Consider the dual function 𝑑(·)defined in (5).∀𝜆1,𝜆2∈\nR𝑚, denote by𝜃∗(𝜆1)and𝜃∗(𝜆2)the optimizer of the Lagrangian\nwith respect to 𝜆1and𝜆2. Suppose that there exists a 𝜖>0and a\n𝜃†(𝜆1)such that\nL(𝜃†(𝜆1),𝜆1)−L(𝜃∗(𝜆1),𝜆1)=𝜖. (46)\nThen, it holds that\n𝑑(𝜆2)≤𝑑(𝜆1)+(𝜆2−𝜆1)𝑇𝑔(𝜃†(𝜆1))+𝜖. (47)\nProof. We proceed by recalling the definition of the dual function\n𝑑(𝜆1)and𝑑(𝜆2)and computing their difference\n𝑑(𝜆1)−𝑑(𝜆2)=L(𝜃∗(𝜆1),𝜆1)−L(𝜃∗(𝜆2),𝜆2), (48)\nBy virtue of the optimality of 𝜃∗(𝜆2), (48) can be rewritten as\n𝑑(𝜆1)−𝑑(𝜆2)≥L(𝜃∗(𝜆1),𝜆1)−L(𝜃†(𝜆1),𝜆2). (49)\nSubstituting (46) into the previous inequality yields\n𝑑(𝜆1)−𝑑(𝜆2)≥L(𝜃†(𝜆1),𝜆1)−L(𝜃†(𝜆1),𝜆2)−𝜖. (50)\nBy expanding the Lagrangian the previous inequality reduces to\n𝑑(𝜆1)−𝑑(𝜆2)≥−𝐽𝑅(𝜋𝜃†(𝜆1))+𝜆𝑇\n1𝑔(𝜃†(𝜆1))−\n\u0010\n−𝐽𝑅(𝜋𝜃†(𝜆1))+𝜆𝑇\n2𝑔(𝜃†(𝜆1))\u0011\n−𝜖\n=(𝜆1−𝜆2)𝑇𝑔(𝜃†(𝜆1))−𝜖. (51)\nReordering (51) completes the proof of Lemma 2. □\nEmploy Lemma 2 with 𝜆∗and𝜆𝑘yields\n𝑑(𝜆∗)≤𝑑(𝜆𝑘)+(𝜆∗−𝜆𝑘)𝑇𝑔(𝜃𝑘+1)+𝜖𝑘, (52)\nwhere𝑔(𝜃𝑘+1)=𝑔(𝜃†(𝜆𝑘))and𝜖𝑘denotes the primal error of\nupdating the Lagrangian, as stated in Theorem 1.\nCombing (45) and (52) yields\n||𝜆𝑘+1−𝜆∗||2≤||𝜆𝑘−𝜆∗||2+𝜁2(𝐵\n1−𝛾+||d||)2\n+2𝜁(𝑑(𝜆𝑘)−𝐷∗+𝜖𝑘). (53)\nwhere𝐷∗=𝑑(𝜆∗).Unrolling the previous inequality starting from\n𝜆𝐾to𝜆0yields\n0≤||𝜆𝐾−𝜆∗||2≤||𝜆0−𝜆∗||2+𝐾𝜁2(𝐵\n1−𝛾+||d||)2\n+2𝜁(𝐾−1∑︁\n𝑘=0𝑑(𝜆𝑘)−𝐾𝐷∗+𝐾−1∑︁\n𝑘=0𝜖𝑘). (54)\nReordering terms in the previous expression yields\n𝐷∗−1\n𝐾𝐾−1∑︁\n𝑘=0𝑑(𝜆𝑘)≤||𝜆0−𝜆∗||2\n2𝜁𝐾+𝜁(𝐵+(1−𝛾)||d||)2\n2(1−𝛾)2\n+1\n𝐾𝐾−1∑︁\n𝑘=0𝜖𝑘. (55)Note that𝜆best∈arg max𝜆∈{𝜆𝑘}𝐾\n𝑘=0𝑑(𝜆), it holds that\n0≤𝐷∗−𝑑(𝜆best)≤||𝜆0−𝜆∗||2\n2𝜁𝐾+𝜁(𝐵+(1−𝛾)||d||)2\n2(1−𝛾)2\n+1\n𝐾𝐾−1∑︁\n𝑘=0𝜖𝑘. (56)\nwhere the leftmost inequality follows from the definition of the\ndual function. This completes the proof of Theorem 1.\n6.3 Proof of Theorem 3\nFor∀𝑘>0, the following chain of inequalities holds due to the fact\nthat the dual function is a lower bound on the value of the primal\nand it is concave\n−𝐽𝑅(𝜋𝜃∗)≥𝑑 \n1\n𝐾𝐾−1∑︁\n𝑘=0𝜆𝑘!\n≥1\n𝐾𝐾−1∑︁\n𝑘=0𝑑(𝜆𝑘). (57)\nSince the primal variable 𝜃𝑘+1is updated by the APD algo-\nrithm (Algorithm 1) with primal error 𝜖𝑘and by definition 𝑑(𝜆𝑘)=\nL(𝜃∗(𝜆𝑘),𝜆𝑘), we obtain\n𝑑(𝜆𝑘)=L(𝜃𝑘+1,𝜆𝑘)−𝜖𝑘\n=−𝐽𝑅(𝜋𝜃𝑘+1)+𝜆𝑇\n𝑘𝑔(𝜃𝑘+1)−𝜖𝑘. (58)\nSubstituting the previous equation into (57) yields\n−𝐽𝑅(𝜋𝜃∗)≥1\n𝐾𝐾−1∑︁\n𝑘=0\u0010\n−𝐽𝑅(𝜋𝜃𝑘+1)+𝜆𝑇\n𝑘𝑔(𝜃𝑘+1)−𝜖𝑘\u0011\n.(59)\nBy reordering terms the previous inequality reduces to\n1\n𝐾𝐾−1∑︁\n𝑘=0𝐽𝑅(𝜋𝜃𝑘+1)≥𝐽𝑅(𝜋𝜃∗)+1\n𝐾𝐾−1∑︁\n𝑘=0𝜆𝑇\n𝑘𝑔(𝜃𝑘+1)\n−1\n𝐾𝐾−1∑︁\n𝑘=0𝜖𝑘. (60)\nBy virtue of Lemma 1 in [ 35] and the fact that ||𝑔(𝜃𝑘+1)||2≤\n(𝐵/(1−𝛾)+||d||)2as described in (44), we obtain\n1\n𝐾𝐾−1∑︁\n𝑘=0𝜆𝑇\n𝑘𝑔(𝜃𝑘+1)≥−𝜁(𝐵+(1−𝛾)||d||)2\n2(1−𝛾)2−||𝜆0||2\n2𝜁𝐾. (61)\nCombining (60) and (61) yields\n1\n𝐾𝐾−1∑︁\n𝑘=0𝐽𝑅(𝜋𝜃𝑘+1)≥𝐽𝑅(𝜋𝜃∗)−1\n𝐾𝐾−1∑︁\n𝑘=0𝜖𝑘\n−𝜁(𝐵+(1−𝛾)||d||)2\n2(1−𝛾)2−||𝜆0||2\n2𝜁𝐾.(62)\nThe proof is completed by taking the limit inferior in both sides of\nthe previous inequality.\n6.4 Proof of Theorem 4\nConsider𝑔(·)as defined in (8). By virtue of the non-expansiveness\nof the projection, (7) can be re-written as\n𝜆𝑘+1≥𝜆𝑘+𝜁𝑔(𝜃𝑘+1). (63)Note that𝜆𝑘,𝜆𝑘+1,𝑔(𝜃𝑘+1)are𝑚-dimensional vectors, and the in-\nequality holds for every entry of the vectors, i.e.,\n𝜆(𝑖)\n𝑘+1≥𝜆(𝑖)\n𝑘+𝜁𝑔(𝜃𝑘+1)(𝑖), 𝑖=1,2,···,𝑚. (64)\nUnrolling the previous inequality recursively starting from 𝜆(𝑖)\n𝐾to\n𝜆(𝑖)\n0yields\n𝜆(𝑖)\n𝐾≥𝜆(𝑖)\n0+𝜁𝐾−1∑︁\n𝑘=0𝑔(𝜃𝑘+1)(𝑖), 𝑖=1,2,···,𝑚. (65)\nRearranging the previous inequality and dividing by 𝜁𝐾on both\nsides results in\n1\n𝐾𝐾−1∑︁\n𝑘=0𝑔(𝜃𝑘+1)(𝑖)≤𝜆(𝑖)\n𝐾−𝜆(𝑖)\n0\n𝜁𝐾, 𝑖=1,2,···,𝑚. (66)\nTo proceed, we rely on the following technical lemma.\nLemma 3. Assume that there exists a strictly feasible policy 𝜋˜𝜃\nsuch that for 𝑖=1,2,···,𝑚,∃𝐶𝑖>0so that𝑔(𝜋˜𝜃)𝑖≤−𝐶𝑖and\n𝐽𝑅(𝜋˜𝜃)is bounded. Then, it holds that\nlim sup\n𝐾→∞𝜆(𝑖)\n𝐾/𝐾=0,𝑖=1,2,···,𝑚. (67)\nProof. Let𝐶=[𝐶1,𝐶2,···,𝐶𝑚]𝑇. By definition of the dual function\nin (5),𝑑(𝜆)can be upper bounded as\n𝑑(𝜆)≤−𝐽𝑅(𝜋˜𝜃)+𝜆𝑇𝑔(𝜋˜𝜃)≤−𝐽𝑅(𝜋˜𝜃)−𝜆𝑇𝐶. (68)\nThe previous inequality is equivalent to\n𝜆𝑇𝐶≤−𝐽𝑅(𝜋˜𝜃)−𝑑(𝜆),∀𝜆∈R𝑚. (69)\nSince𝜆(𝑖)≥0,𝐶𝑖>0(𝑖=1,2,···,𝑚), then we obtain\n𝜆(𝑖)𝐶𝑖≤𝜆𝑇𝐶≤−𝐽𝑅(𝜋˜𝜃)−𝑑(𝜆),𝑖=1,2,···,𝑚. (70)\nThe previous inequality indicates that\n𝜆(𝑖)≤−𝐽𝑅(𝜋˜𝜃)−𝑑(𝜆)\n𝐶𝑖,𝑖=1,2,···,𝑚. (71)\nSince𝑑(𝜆∗)i.e.,𝐷∗and𝐽𝑅(𝜋˜𝜃)are bounded, (71)shows that 𝜆∗\nis bounded as well. On the other hand, the definition of the dual\nfunction yields\n𝑑 \n1\n𝐾𝐾−1∑︁\n𝑘=0𝜆(𝑖)\n𝑘!\n≤𝐷∗. (72)\nCombining the previous inequality and (71)further reveals that\n1/𝐾Í𝐾−1\n𝑘=0𝜆(𝑖)\n𝑘is bounded. Taking the limit superior yields\nlim sup\n𝐾→∞1\n𝐾𝐾−1∑︁\n𝑘=0𝜆(𝑖)\n𝑘<∞. (73)\nBy virtue of the Stolz–Cesàro Theorem [36], it holds that\nlim sup\n𝐾→∞𝜆(𝑖)\n𝐾<∞. (74)\nUltimately, dividing by 1/𝐾completes the proof of Lemma 3. □\nSince𝜆(𝑖)\n0,𝜁in(66)are bounded constants, by virtue of Lemma 3\nthe limit superior of the right-hand side of (66)is zero. Then, the\ndefinition of 𝑔(·)completes the proof of Theorem 4.(a) Ball\n (b) Car\n (c) Run\n (d) Circle\nFigure 3: Agents and Tasks from [30]: (a) The Ball agent; (b) The Car agent; (c) The Run task; (d) The Circle task.\nReturn- SafetyBallRun-v0\n Return- SafetyCarRun-v0\n Return- SafetyBallCircle-v0\n Return- SafetyCarCircle-v0\nCost- SafetyBallRun-v0\n Cost- SafetyCarRun-v0\n Cost- SafetyBallCircle-v0\n Cost- SafetyCarCircle-v0\nLR-SafetyBallRun-v0\n LR-SafetyCarRun-v0\n LR-SafetyBallCircle-v0\n LR-SafetyCarCircle-v0\nFigure 4: Learning curves for DDPGL over four environments with five independent runs. In all figures, the horizontal axis is\nthe number of time step. The solid line illustrates the mean and the shaded area depicts the maximum and the minimum. In all\nexperiments, 𝐻1=0.003,𝐻2=4.5forInvLin ,𝐻′\n1=0.045,𝐻′\n2=7.5forInvQua , and cost limit d =10(black dashed line).\n6.5 Additional Experimental Details\n6.5.1 Environment. We consider the tasks Run and Circle using\nthe agents Ball and Car from the Bullet-Safety-Gym [ 30] as shownin Figure 3. The experiments are performed on a workstation with\nan NVIDIA RTX 3070 GPU, 32GB memory, and an Intel Core i7-\n10750H clocked at 2.60 GHz. In the two tasks, both the Ball and\nCar agents utilize states that encompass their position, linear, andTable 6: Summary of Experimental Parameters\nParameters PPOL DDPGL\nCost Limit 10 10\nNumber of Hidden Layers 2 2\nHidden Layer Size 128 128\nStep Per Epoch 10000 10000\nDiscount Factor 0.99 0.97\n𝐾𝑃,𝐾𝐼,𝐾𝐷 (0.05, 0.0005, 0.1) (0.05, 0.0005, 0.1)\nBatch Size 256 256\nGAE Lambda 0.95 N/A\nTarget KL 0.02 N/A\nClip Ratio 0.2 N/A\nSoft Update Ratio N/A 0.05\nExploration Noise N/A 0.1\nangular velocities. The Ball agent’s action is determined by a two-\ndimensional external force, while the Car agent’s action is defined\nby its target velocity and steering angle.\nIn the Run task, the objective is to maintain a constant speed\nwhile keeping its position within the boundaries illustrated in Fig-\nure 3(c). To induce this behavior the reward and the cost with\nrespect to the agent’s current state ( 𝑠𝑡) are defined as:\n𝑟(𝑠𝑡)=\r\r𝒑𝒕−1−𝒈\r\r2−\r\r𝒑𝒕−𝒈\r\r2+𝑟robot(𝑠𝑡),\n𝑐(𝑠𝑡)=1\u0010\n|𝑝𝑡\n𝑦|>𝑦lim\u0011\n+1\u0010\r\r𝒗𝒕\r\r2>𝑣lim\u0011\n,(75)\nwhere𝑟robot(𝑠𝑡)specifies the unique reward for various robots,\n𝒑𝒕=h\n𝑝𝑡𝑥,𝑝𝑡𝑦i\ndefines the position of the agent at time step 𝑡,𝒈=\n\u0002\n𝑔𝑥,𝑔𝑦\u0003represents the position of a fictitious target, 𝑦limdefines\nthe safety region, 𝒗𝒕=h\n𝑣𝑡𝑥,𝑣𝑡𝑦i\ndenotes the agent’s velocity at time\n𝑡, and𝑣limdenotes the speed limit.\nIn the Circle task, the agent earns rewards for moving in a circular\npath but must remain within a confined area that has a smaller\nradius than that of the target circle. The reward and cost functions\nfor this task are delineated as follows:\n𝑟(𝑠𝑡)=−𝑝𝑡𝑦𝑣𝑡𝑥+𝑝𝑡𝑥𝑣𝑡𝑦\n1+|\r\r𝒑𝒕∥2−𝑜\f\f+𝑟robot(𝑠𝑡),\n𝑐(𝑠𝑡)=1\u0000|𝑝𝑡\n𝑥|>𝑥lim\u0001,(76)\nwhere𝑜represents the radius of the circle and 𝑥limdelineates the\nboundaries of the safety region.\n6.5.2 Methodology. To underscore our algorithm’s adaptability\nand independence from specific methods, we employ two state-\nof-the-art SRL methods: PPOL and DDPGL to update the policy\nparameter𝜃. Before proceeding, let us define the advantage func-\ntions for reward and cost as follows\n𝐴𝜋𝜃\n𝑅(𝑠,𝑎)=𝑄𝜋𝜃\n𝑅(𝑠,𝑎)−𝑉𝜋𝜃\n𝑅(𝑠), (77)\n𝐴𝜋𝜃\n𝐶(𝑠,𝑎)=𝑄𝜋𝜃\n𝐶(𝑠,𝑎)−𝑉𝜋𝜃\n𝐶(𝑠), (78)where𝑉𝜋𝜃\n𝑅(𝑠)and𝑄𝜋𝜃\n𝑅(𝑠,𝑎)symbolize the state-value function\nand the action-value function for reward, respectively. 𝑉𝜋𝜃\n𝐶(𝑠)and\n𝑄𝜋𝜃\n𝐶(𝑠,𝑎)play similar roles for cost.\nDenote byℓ𝑝𝑝𝑜andℓ𝑑𝑑𝑝𝑔 the objectives of PPO and DDPG. Ac-\ncording to [37], ℓ𝑝𝑝𝑜is structured as\nℓppo=min \n𝜋𝜃(𝑎|𝑠)\n𝜋old\n𝜃(𝑎|𝑠)𝐴𝜋old\n𝜃\n𝑅(𝑠,𝑎),\nclip \n𝜋𝜃(𝑎|𝑠)\n𝜋old\n𝜃(𝑎|𝑠),1−𝜖,1+𝜖!\n𝐴𝜋old\n𝜃\n𝑅(𝑠,𝑎)!\n,(79)\nwhere𝜋𝜃(𝑎|𝑠)and𝜋old\n𝜃(𝑎|𝑠)characterize the current and old policy,\nrespectively. 𝜖is a hyper-parameter ensuring the new policy does\nnot deviate too much from the old policy. Then, the loss of the\nPPOL is formally defined as\nℓ𝑝𝑝𝑜𝑙=1\n1+𝜆\u0012\nℓ𝑝𝑝𝑜−𝜆𝐴𝜋old\n𝜃\n𝐶(𝑠,𝑎)\u0013\n. (80)\nIn an analogous fashion, the objective of DDPGL is given by\nℓ𝑑𝑑𝑝𝑔𝑙 =1\n1+𝜆\u0012\nℓ𝑑𝑑𝑝𝑔−𝜆𝐴𝜋old\n𝜃\n𝐶(𝑠,𝑎)\u0013\n. (81)\n6.5.3 Results. Figure 4 displays the training curves of return, cost,\nand LR where we apply DDPGL to update policy parameters in\nthe PAPD algorithm. Analogous to our observation from Figure 2,\nInvLin andInvQua surpasses or matches the best performance of all\nconstant-LR cases. The similar trends on performance are observed\nwhen we change the LR. Furthermore, Figure 4 illustrates that\nDDPGL displays a heightened sensitivity to the LR when compared\nto PPOL. Indeed, there is no constant-LR that can effectively operate\nacross all environments, which underscores the significance of\nemploying our PAPD approach. As in the PPOL experiments, we\nmaintain consistent hyper-parameter values across all tests: 𝐻1=\n0.003,𝐻2=4.5forInvLin and𝐻′\n1=0.045,𝐻′\n2=7.5forInvQua .\n6.5.4 Implementation (Codes). All experiments are implemented\nvia the existing framework FSRL [ 34], exactly as is with the default\nparameter settings (see Table 6) and the sole change consisting\nof the learning rates. The FSRL is available at https://github.com/\nliuzuxin/FSRL." }, { "title": "2402.00378v1.On_the_Minimum_Depth_of_Circuits_with_Linear_Number_of_Wires_Encoding_Good_Codes.pdf", "content": "On the Minimum Depth of Circuits with Linear Number of Wires\nEncoding Good Codes\nAndrew Drucker∗Yuan Li†\nAbstract\nLetSd(n) denote the minimum number of wires of a depth- d(unbounded fan-in) circuit\nencoding an error-correcting code C:{0,1}n→ {0,1}32nwith distance at least 4 n. G´ al,\nHansen, Kouck´ y, Pudl´ ak, and Viola [IEEE Trans. Inform. Theory 59(10), 2013] proved that\nSd(n) = Θ d(λd(n)·n) for any fixed d≥3. By improving their construction and analysis, we\nprove Sd(n) =O(λd(n)·n). Letting d=α(n), a version of the inverse Ackermann function, we\nobtain circuits of linear size. This depth α(n) is the minimum possible to within an additive\nconstant 2; we credit the nearly-matching depth lower bound to G´ al et al., since it directly follows\ntheir method (although not explicitly claimed or fully verified in that work), and is obtained by\nmaking some constants explicit in a graph-theoretic lemma of Pudl´ ak [Combinatorica, 14(2),\n1994], extending it to super-constant depths.\nWe also study a subclass of MDS codes C:Fn→Fmcharacterized by the Hamming-distance\nrelation dist( C(x), C(y))≥m−dist(x, y) + 1 for any distinct x, y∈Fn. (For linear codes this\nis equivalent to the generator matrix being totally invertible.) We call these superconcentrator-\ninduced codes , and we show their tight connection with superconcentrators. Specifically, we\nobserve that any linear or nonlinear circuit encoding a superconcentrator-induced code must be\na superconcentrator graph, and any superconcentrator graph can be converted to a linear circuit,\nover a sufficiently large field (exponential in the size of the graph), encoding a superconcentrator-\ninduced code.\nKeywords: error-correcting codes, circuit complexity, superconcentrator.\n1 Introduction\nUnderstanding the computational complexity of encoding error-correcting codes is an important\ntask in theoretical computer science. Complexity measures of interest include time, space, and\nparallelism. Error-correcting codes are indispensable as a tool in computer science. Highly ef-\nficient encoding algorithms (or circuits) are desirable in settings studied by theorists including\nzero-knowledge proofs [Gol+21], circuit lower bounds [CT19], data structures for error-correcting\ncodes [Vio19], pairwise-independent hashing [Ish+08], and secret sharing [DI14]. Besides that, the\nexistence of error-correcting codes with efficient encoding circuits sheds light on the designing of\npractical error-correcting codes.\n∗Independent. Email:andy.drucker@gmail.com.\n†School of Computer Science, Fudan University. Email: yuan li@fudan.edu.cn. An earlier version of this work\nappeared as Chapter 2 of the author’s Ph.D. thesis [Li17]. Part of this work was done while the authors were affiliated\nwith the University of Chicago Computer Science Dept.\n1arXiv:2402.00378v1 [cs.CC] 1 Feb 2024We consider codes with constant rate and constant relative distance, which are called asymptot-\nically good error-correcting codes or good codes for short. The complexity of encoding good codes\nhas been studied before. Bazzi and Mitter [BM05] proved that branching programs with linear\ntime and sublinear space cannot encode good codes. By using the sensitivity bounds [Bop97], one\ncan prove that AC0circuits cannot encode good codes; Lovett and Viola proved that AC0circuits\ncannot sample good codes [LV11]; Beck, Impagliazzo and Lovett [BIL12] strengthened the result.\nDobrushin, Gelfand and Pinsker [DGP73] proved that there exist linear-size circuits encoding\ngood codes. Sipser and Spielman [Spi96; SS96] explicitly constructed good codes that are encod-\nable by bounded fanin circuits of depth O(logn) and size O(n), and decodable by circuits of size\nO(nlogn). For bounded fan-in, the depth O(logn) is obviously optimal. Henceforth, unless other-\nwise stated, we consider circuits with unbounded fan-in, where the size is measured by the number\nofwires instead of gates.\nG´ al, Hansen, Kouck´ y, Pudl´ ak, and Viola [Gal+13] investigated the circuit complexity of en-\ncoding good codes. G´ al et al. constructed circuits recursively and probabilistically, with clever\nrecursive composition ideas, which resemble the construction of superconcentrators in [Dol+83].\nThey also proved size lower bounds for bounded depth, by showing that any circuit encoding good\ncodes must satisfy some superconcentrator-like properties; the lower bound follows from the size\nbounds for a variant of bounded-depth superconcentrators studied by Pudl´ ak [Pud94]. Their con-\nstruction’s wire upper bounds are of form Od(n·λd(n)) (in our notation1) and their lower bounds\nare of form Ω d(n·λd(n)), matching up to a multiplicative constant cdfor constant values d. They\nalso proved that there exist Od(n)-size O(logλd(n))-depth circuits encoding good codes. Here λd(n)\nare slowly growing inverse Ackermann-type functions, e.g., λ2(n) = Θ(log n),λ3(n) = Θ(log log n),\nλ4(n) = Θ(log∗n).\nDruk and Ishai [DI14] proposed a randomized construction of good codes meeting the Gilbert-\nVarshamov bound, which can be encoded by linear-size logarithmic-depth circuits (with bounded\nfan-in). Their construction is based on linear-time computable pairwise independent hash functions\n[Ish+08].\nChen and Tell [CT19] constructed explicit circuits of depth dencoding linear codes with constant\nrelative distance and code rate Ω\u0010\n1\nlogn\u0011\nusing n1+2−Ω(d)wires, for every d≥4. They used these\nexplicit circuits to prove bootstrapping results for threshold circuits.\n1.1 Background and results\nTo encode good error-correcting codes, linear size is obviously required. It is natural to ask, what\nis the minimum depth required to encode goods using a linear number of wires? This question is\naddressed, but not fully answered, by the work of G´ al et al. [Gal+13].\nWe show that one can non-explicitly encode error-correcting codes with constant rate and\nconstant relative distance using O(n) wires, with depth at most α(n), for sufficiently large n. Here,\nα(n) is a version of the inverse Ackermann function. This is nearly optimal, by a lower bound of\nα(n)−2 that we credit to G´ al et al. [Gal+13] as discussed below. Our new upper bound states:\nTheorem 1.1. (Upper bound) Let r∈(0,1) and δ∈(0,1\n2) such that r <1−h(δ). For sufficiently\nlarge nand for any d≥3, not necessarily a constant, there exists a linear circuit C:{0,1}n→\n1Our definition of λd(n) follows Raz and Shpilka [RS03]. It is slightly different from G´ al et al. ’s. In [Gal+13], the\nfunction λi(n) is actually λ2i(n) in our notation.\n2{0,1}⌊n\nr⌋of size Or,δ(λd(n)·n) and depth dthat encodes an error-correcting code with relative\ndistance ≥δ. In particular, when d=α(n), the circuit is of size Or,δ(n).\nOur upper bound improves the construction and the analysis by G´ al et al. [Gal+13]. Specifically,\nletSd(n) denote the minimum size of a depth- dlinear circuit encoding a code C:{0,1}n→ {0,1}32n\nwith distance 4 n. G´ al et al. proved that Sd(n) =Od(λd(n)·n), where the hidden constant in\nOd(λd(n)·n) grows rapidly as an Ackermann-type function (if one follows their arguments and\nexpand the computation straightforwardly in Lemma 26 in [Gal+13].) They also proved that, for\nanyfixed m, when the depth d=O(log(λm(n))),Sd(n) =Om(n). Their upper bound is strong, but\nsuboptimal. Our main technical contribution is to prove Sd(n) =O(λd(n)·n), where the hidden\nconstant is an absolute constant. Explaining how this improvement is obtained is a bit technical,\nand defeered to the next subsection.\nTurning to the lower bounds: we credit the lower bound in the result below to G´ al et al.\n(although it was not explicitly claimed or fully verified in that work), since it is directly obtainable\nby their size lower-bound method and the tool of Pudl´ ak [Pud94] on which it relies, when that tool\nis straightforwardly extended to super-constant depth.2\nTheorem 1.2. (Lower bound) [Gal+13] Let ρ∈(0,1) and δ∈(0,1\n2), and let constant c >0. Let\nCn:{0,1}n→ {0,1}⌊n/ρ⌋be a family of circuits of size at most cnthat encode error-correcting\ncodes with relative distance ≥δ. Arbitrary Boolean-function gates of unrestricted fanin are allowed\ninCn. Ifnis sufficiently large, i.e., n≥N(r, δ, c ), the depth of the circuit Cnis at least α(n)−2.\nThe proof for Theorem 1.2 closely follows [Gal+13] and is an application of a graph-theoretic\nargument in the spirit of [Val77; Dol+83; Pud94; RS03]. In detail, we use Pudl´ ak’s size lower bounds\n[Pud94] on “densely regular” graphs, and rely on the connection between good codes and densely\nregular graphs by G´ al et al. [Gal+13]. Pudl´ ak’s bound was originally proved for bounded depth;\nto apply it to unbounded depth, we explicitly determine the hidden constants by directly following\nPudl´ ak’s work, and verify that their decay at higher unbounded depths is moderate enough to allow\nthe lower-bound method to give superlinear bounds up to depth α(n)−3. Even after our work,\nthe precise asymptotic complexity of encoding good codes remains an open question for din the\nrange [ ω(1),α(n) - 3].\nStepping back to a higher-level view, the strategy of the graph-theoretic lower-bound arguments\nin the cited and related works is as follows:\n•Prove any circuit computing the target function must satisfy some superconcentrator-like\nconnection properties;\n•Prove any graph satisfying the above connection properties must have many edges;\n•Therefore, the circuit must have many wires.\nValiant [Val75; Val76; Val77] first articulated this kind of argument, and proposed the definition\nof superconcentrators. Somewhat surprisingly, Valiant showed that linear-size superconcentrators\nexist. As a result, one cannot prove superlinear size bounds using this argument (when the depth is\n2The Ω( ·) notation in the circuit size lower bound of G´ al et al. , for example, Theorem 1 in [Gal+13], involves\nan implicit constant which decays with the depth d, as can be suitable for constant depths; similarly for the tool\nof Pudl´ ak, Theorem 3.(ii) in [Pud94], on which it relies. For general super-constant depths, more explicit work is\nrequired to verify the decay is not too rapid.\n3unbounded). Dolev, Dwork, Pippenger, and Wigderson [Dol+83] proved Ω( λd(n)·n) lower bounds\nfor bounded-depth (weak) superconcentrators, which implies circuit lower bounds for functions sat-\nisfying weak-superconcentrator properties. Pudl´ ak [Pud94] generalized Dolev et al. ’s lower bounds\nby proposing the definition of densely regular graphs , and proved lower bounds for bounded-depth\ndensely regular graphs, which implies circuit lower bounds for functions satisfying densely regular\nproperty, including shifters, parity shifters, and Vandermonde matrices. Raz and Shpilka [RS03]\nstrengthened the aforementioned superconcentrator lower bounds by proving a powerful graph-\ntheoretic lemma, and applied it to prove superlinear lower bounds for matrix multiplication. (This\npowerful lemma can reprove all the above lower bounds.) G´ al et al. [Gal+13] proved that any\ncircuits encoding good error-correcting codes must be densely regular. They combined this with\nPudl´ ak’s lower bound on densely regular graphs [Pud94] to obtain Ω( λd(n)·n) size bounds for\ndepth- dcircuits encoding good codes.\nAll the circuit lower bounds mentioned above apply even to the powerful model of arbitrary-gate\ncircuits, that is,\n•each gate has unbounded fanin,\n•a gate with fanin scan compute any function from {0,1}sto{0,1},\n•circuit size is measured as the number of wires.\nIn this “arbitrary-gates” model, any function from {0,1}nto{0,1}mcan be computed by a circuit\nof size mn.\nIt is known that any circuits encoding good codes must satisfy some superconcentrator-like\nconnection properties [Spi96], [Gal+13]. Our other result is a theorem in the reverse direction in the\nalgebraic setting over large finite fields. Motivated by this connection, we study superconcentrator-\ninduced codes (Definition 5.1), a subclass of maximum distance separable (MDS) codes [LX04;\nGRS12], and observe its tight connection with superconcentrators.\nTheorem 1.3. (Informal) Given any ( n, m)-superconcentrator, one can convert it to a linear\narithmetic circuit encoding a code C:Fn→Fmsuch that\ndist(C(x), C(y))≥m−dist(x, y) + 1 ∀x̸=y∈Fn(1)\nby replacing each vertex with an addition gate and assigning the coefficient for each edge uniformly\nat random over a sufficiently large finite field (where d2Ω(n+m)suffices, and dis the depth of the\nsuperconcentrator).\nWe also observe that any arithmetic circuit, linear or nonlinear, encoding a code C:Fn→Fm\nsatisfying (1), viewed as a graph, must be a superconcentrator.\nThe proof of Theorem 1.3 relates the connectivity properties with the rank of a matrix, and\nuses the Schwartz-Zippel lemma to estimate the rank of certain submatrices; these techniques are\nwidely used, for example, in [CKL13; Lov18]. In addition, the idea of assigning uniform random\ncoefficients (in a finite field) to edges, to form linear circuits, has appeared before in e.g. network\ncoding [Ahl+00; LYC03]. The question we study is akin to a higher-depth version of the GM-MDS\ntype questions about matrices with restricted support [Lov18].\nObserve that any code satisfying the distance inequality (1) is a good code. The existence of\ndepth- dsize-O(λd(n)·n) superconcentrators [Dol+83; AP94], for any d≥3, immediately implies\n4the existence of depth- d(linear) arithmetic circuits of size O(λd(n)·n) encoding good codes over\nlarge finite field .\nIn a subsequent work [Li23], inspired by this connection and using similar techniques, the second\nauthor proved that any ( n, m)-superconcentrator can compute the shares of an ( n, m) linear thresh-\nold secret sharing scheme. In other words, any ( n, m)-superconcentrator-induced code induces an\n(n, m) linear threshold secret sharing scheme. Results in [Li23] can be viewed as an application of\nsuperconcentrator-induced codes.\n1.2 Circuit construction techniques\nIn terms of techniques, G´ al et al. proposed the notion of range detectors (Definition 3.6). They use\nprobabilistic methods to prove certain linear-size depth-1 range detectors exist and then compose\nthe range detectors recursively to construct circuits encoding good codes. We improve the recursive\nconstruction by tuning the parameters and changing the way range detectors are composed (in the\ninductive step), which leads to an absolute constant in the size bound O(λd(n)·n), eliminating\nthe dependency on d. By utilizing a property of the inverse Ackermann function, we immediately\nobtain circuits of depth α(n) and size O(n), avoiding a size-reduction argument.\nLet us give an overview of the construction, highlighting the difference between G´ al et al. ’s.\nFirst, we distill some notions to facilitate the construction, each of which is either explicit or\npresent in essence in [Gal+13].\n•Partial good code (i.e., Definition 3.1), or PGC for short: when the weight of an input is\nwithin a certain range, a PGC outputs a codeword whose relative weight is above an absolute\nconstant.\n•Condenser: a condenser function reduces the number of inputs while preserving the minimum\nabsolute weight. Using probabilistic arguments, G´ al et al. proved that certain unbalanced\nunique-neighbor expanders exist, and converted the expanders to linear-size condensers, that\nis,\u0000\nn,⌊n\nr⌋, s,n\nr1.5, s\u0001\n-range detectors. We reuse their condensers.\n•Amplifier: these amplify the number of inputs while preserving the relative distance . G´ al et\nal.uses a probabilistic argument and applies the Chernoff bound to show linear-size amplifiers\nexist (e.g., in the proof of Theorem 22 and Lemma 26). We choose to decouple the argument\nby using the disperser graphs given by [RT00], choosing the coefficients at random, and then\napplying a union bound.\n•Rate booster: these do not change the number of inputs, but can boost the rate close to\nthe Gilbert-Varshamov bound. Lemma 17 in [Gal+13] embodies a rate booster, although a\nnot fully optimized one; G´ al et al. also state3that a tighter analysis would approach the\nGilbert-Varshamov bound. Using a probabilistic argument similar to that with the amplifiers\nand to the argument in [Gal+13], we provide a verification of this claim.\n•Composition Lemma: this tool allows us to combine hpartial good codes into a larger one,\nat the cost of increasing the depth by 1, and the size by O(n). Furthermore, if each partial\ngood code has bounded output fanin O(1), then one can collapse the last layer at the cost\n3In the conference version (COCOON 2023), we mistakenly stated that such rate-boosting is not discussed by G´ al\net al. (based on non-journal versions of the paper), but in fact it is discussed in Section 4 of the journal version.\n5of increasing the size by O(hn). The composition idea was implicit in G´ al et al. ’s (e.g., in\nTheorem 22 and Lemma 26 in [Gal+13]).\nWith the these concepts, the task is to construct the circuits using these building blocks. Our\nanalysis framework is also inspired by [Dol+83]; we show the minimal size of a depth- d(n, r, s )-\nPGC satisfies a similar recursion as that of partial superconcentrators . For the base case when the\ndepth is small (i.e., d≤4), we completely reuse G´ al et al. ’s construction. In the key inductive step,\nG´ alet al. construct a depth-( d+ 2) circuits encoding an\u0000\nn,n\nr, n\u0001\n-PGC by composing a number of,\nsayh, PGCs. Assuming each smaller PGC is of size O(n), the total size would be O(hn). They let\n(\nk1 = min {r,⌈m3/4⌉}\nki+1=λd(ki)3,(2)\nwhere his the least integer such that khis below a particular universal constant. Each inner part is\nan\u0010j\nn\nλd(ki)2k\n,n\nki,n\nλd(ki)2\u0011\n-PGC of depth dand size Od(n), topped by a condenser, appended by an\nampilifier. Then they argue that h= 2λd+2(n) +Od(1), and thus the total size of the depth-( d+ 2)\ncircuit becomes Od+2(λd+2(n)·n). They did not mention the constant in Od(1); if one works out\nthe constant straightforwardly, it is a very fast-growing constant depending on d.\nOur remedy is to choose the parameters and compose the PGCs differently in the inductive\nconstruction. To obtain a depth-( d+ 2) circuit encoding an\u0000\nn,n\nr, n\u0001\n-PGC, we compose at most\nλd+2(n) PGCs that are of the parameter\u0012\nn,n\nA(i)\nk−1(c0),n\nA(i−1)\nk−1(c0)\u0013\n, and of size O(n), where 1 ≤i≤\nλd+2(n). In addition, we ensure that each PGC has bounded output fanin O(1), which allows us to\ncollapse the last layer in the composition lemma without blowing up the size. Let r=A(i−1)\nk−1(c0). To\nconstruct a depth-( d+ 2)\u0010\nn,n\nAk−1(r),n\nr\u0011\n-PGC, we cannot reduce it to a depth- dPGC directly, due\nto the parameter restriction in the condenser. (Recall that the linear-size condenser constructed\nis an\u0000\nn,⌊n\nr⌋, s,n\nr1.5, s\u0001\n-range detector, not an\u0000\nn,⌊n\nr⌋, s,n\nr, s\u0001\n-range detector.) We work around\nthis by composing two PGCs: an\u0010\nn,n\nA(k−1,r),n\n4r2\u0011\n-PGC, and an\u0000\nn,n\n4r2,n\nr\u0001\n-PGC, where each is\nof linear size, and have bounded output fanin O(1). The former can be constructed by a linear-\nsize condenser, an\u0010\u0004n\n2r\u0005\n,n\nA(k−1,r),n\n2r\u0011\n-PGC of depth d, and an amplifier; the latter we construct\ndirectly by a simple argument. This composition is inspired by the superconcentrator construction\nby Dolev et al. [Dol+83], who constructed superconcentrators of depth dand size O(λd(n)·n).\nIndeed, the encoding circuits have to resemble the superconcentrators, since it was known that the\ncircuits must be a (weak) superconcentrators.\nThe above sketch leads to a construction of depth- dsize-O(λd(n)·n) circuits encoding good\ncodes, where dis not necessarily a constant; by letting d=α(n), one immediately gets depth-\nα(n) size- O(n) circuits. This improves the analysis, getting rid of an additive O(logα(n)) factor\nin the depth (compared with Corollary 32 in [Gal+13], or Corollary 1.1 in [Dol+83]). But a tight\nanalysis to prove this requires one small new ingredient compared to prior works. Specifically, we\nobserve that, if λd(n)≤d, then λd+2(n) =O(1) (See Proposition A.2 (ii) for details.) The above\nobservation can also improve the depth bound on the linear-size superconcentrators in [Dol+83]\nfrom α(n) +O(logα(n)) to α(n) (without change in the construction). In contrast, G´ al et al.\ndeployed a different strategy to achieve linear size. Having constructed an encoding circuit of depth\nd=O(1) and size Od(λd(n)·n), they then apply a size-reduction transformation O(logλd(n)) times,\n6a transformation which reduces a size- minstance to a size m/2 instance with additional cost O(m)\nwires. In this way they obtain a circuit of depth 2 d+O(logλd(n)) and size Od(n).\nWe verify our codes can obtain any constant rate and constant relative distance within the\nGilbert-Varshamov bound, by using a disperser graph at the bottom layer and collapsing that layer\nafterward (for linear circuits). A similar rate-boosting by probabilistic construction is described\nin [Gal+13]; see their (quantitatively somewhat weaker) Lemma 17 and Corollary 18 and the\ncomments following, stating an improved analysis is possible.\n2 Inverse Ackermann functions\nDefinition 2.1. (Definition 2.3 in [RS03]) For a function f, define f(i)to be the composition of f\nwith itself itimes. For a function f:N→Nsuch that f(n)< nfor all n >0, define\nf∗(n) = min {i:f(i)(n)≤1}.\nLet\nλ1(n) = ⌊√n⌋,\nλ2(n) = ⌈logn⌉,\nλd(n) = λ∗\nd−2(n).\nAsdgets larger, λd(n) becomes extremely slowly growing, for example, λ3(n) = Θ(log log n),\nλ4(n) = Θ(log∗n),λ5(n) = Θ(log∗n), etc.\nWe define a version of the inverse Ackermann function as follows.\nDefinition 2.2 (Inverse Ackermann Function) .For any positive integer n, let\nα(n) = min {even d:λd(n)≤6}.\nThere are different variants of the inverse Ackermann function; they differ by at most a multi-\nplicative constant factor.\nWe need the definition of the Ackermann function. We put some relevant properties in Appendix\nA.\nDefinition 2.3. (Ackermann function [Tar75; Dol+83]) Define\n\n\nA(0, j) = 2 j, forj≥1\nA(i,1) = 2 , fori≥1\nA(i, j) =A(i−1, A(i, j−1)),fori≥1, j≥2.(3)\nThe Ackermann function grows rapidly. From the definition, one can easily verify that A(0, i) =\n2i,A(1, i) = 2iandA(2, i) = 22...2\n|{z}\nicopies of 2.For notational convenience, we often write A(i, j) as\nAi(j).\n73 Upper bound\nIn this section, we prove Theorem 1.1. That is, we non-explicitly construct, for any rate r∈(0,1)\nand relative distance δ∈(0,1\n2) satisfying r <1−h(δ), circuits encoding error-correcting codes\nC:{0,1}n→ {0,1}⌊n/r⌋with relative distance δ, where the circuit is of size Or,δ(λd(n)·n) and\ndepth d. In particular, when the depth d=α(n), the circuit is of size Or,δ(n).\nFirst, we construct circuits encoding codes C:{0,1}n→ {0,1}32nwith relative distance1\n8,\nwhere the constants 32 and1\n8are picked for convenience. Then, we verify that one can boost the\nrate and the distance to achieve the Gilbert-Varshamov bound (without increasing the depth of\nthe circuit).\nNote that random linear codes achieve the Gilbert-Varshamov bound. However, circuits encod-\ning random linear codes have size O(n2). In contrast, our circuits have size O(n). Our circuits\nconsist of XOR gates only; we call these linear circuits hereafter. We point out that the construc-\ntion generalizes to any finite field, where XOR gates are replaced by addition gates (over that finite\nfield).\nRecall that let Sd(n) denote the minimum size of a depth- dlinear circuit encoding a code\nC:{0,1}n→ {0,1}32nwith distance 4 n.\nDefinition 3.1. (Partial good code) C:{0,1}n→ {0,1}32nis called ( n, r, s )-partial good code , or\n(n, r, s )-PGC for short, if for all x∈ {0,1}nwith wt( x)∈[r, s], we have wt( C(x))≥4n.\nDenote by Sd(n, r, s ) the minimum size of a linear circuit of depth- dthat encodes an ( n, r, s )-\nPGC, where r, sare real numbers.\nDefinition 3.2. [Sip88; CW89] Bipartite graph G= (V1= [n], V2= [m], E) is a ( k, ϵ)-disperser\ngraph if for any X⊆V1with|X| ≥k,|Γ(X)| ≥(1−ϵ)m.\nWe rely on the following probabilistic construction of dispersers.\nTheorem 3.3. (Theorem 1.10 in [RT00]) For every n≥k >1,m≥1, and ϵ >0, there exists a\n(k, ϵ)-disperser graph G= (V1= [n], V2= [m], E) with left degree\nD=\u00181\nϵ\u0010\nln\u0010n\nk\u0011\n+ 1\u0011\n+m\nk\u0012\nln\u00121\nϵ\u0013\n+ 1\u0013\u0019\n.\nAprobabilistic (linear) circuit is a linear circuit with random coefficients. That is, each XOR\ngate computes c1x1+c2x2+. . .+cmxm, where x1, x2, . . . , x mare incoming wires, coefficients\nc1, c2, . . . , c n∈ {0,1}are chosen independently and uniformly at random. A probabilistic circuit\ncan be viewed as a distribution of linear circuits. Our work in what follows relies on the following\nsimple observation: if one of the incoming wires is nonzero, the output is uniformly distributed in\n{0,1}.\nLemma 3.4. (Rate booster) Let δ∈(0,32), and let c >1,γ∈(0,1\n2) be such that h(γ)<1−1\nc.\nFor sufficiently large n≥N(c, γ), there exists a probabilistic circuit C:{0,1}32n→ {0,1}⌊cn⌋of\ndepth 1 and size Oδ,c,γ(n) such that\nPr\nC[wt(C(x))≥γ· ⌊cn⌋]>1−2−n\nfor any x∈ {0,1}32nwith wt( x)≥δn. Moreover, the output gates have bounded fanin Oδ,c,γ(1).\n8Figure 1: Gate in a probabilistic circuit\nProof. Letc′=⌊cn⌋\nn. Let nbe sufficiently large such that h(γ)<1−1\nc′.\nBy Theorem 3.3, there exists a ( δn, ϵ)-disperser graph G′= (V1= [32 n], V′\n2= [(c′+ 1)n], E),\nwhere ϵ >0 is small constant to be determined. After removing nvertices in V′\n2= [(c′+ 1)n] with\nthe largest degree, we are left with a bipartite graph G= (V1= [32 n], V2= [c′n], E) such that\n|Γ(X)| ≥c′n−ϵ(c′+ 1)n=c′n\u0010\n1−ϵ−ϵ\nc′\u0011\n(4)\nfor all X⊆V1of size at least δn. Moreover, the degree of the vertices in V2is bounded by 32 D,\nwhere D=l\n1\nϵ(ln(32\nδ) + 1) +c′+1\nδ(ln(1\nϵ) + 1)m\n=Oδ,c,ϵ(1).\nWe transform bipartite graph Ginto a probabilistic circuit by identifying vertices in V1with 32 n\ninputs, denoted by x1, x2, . . . , x 32n, and replacing each vertex in V2by an XOR gate with random\ncoefficients. That is, if vertex j∈V2is connected to i1, i2, . . . , i k∈V1, then vertex jcomputes an\noutput\nyj=cj,i1xi1+cj,i2xi2+. . .+cj,ikxik(mod 2) ,\nwhere cj,i1, cj,i2, . . . , c j,ik∈ {0,1}are chosen independently and uniformly at random.\nFor any x∈ {0,1}32nwith wt( x)≥δn, letX= supp( x). By the expansion property (4), we\nhave|Γ(X)| ≥c′n(1−ϵ′), where ϵ′= (1 +1\nc′)ϵ. For every j∈Γ(X), vertex jis incident to at least\none vertex in X; pick an arbitrary neighbor, denoted by i∈X, and leave coefficient ci,junfixed.\nIn other words, we fix all the coefficients except those |Γ(X)|coefficients (that are incident to X).\nObserve that C(x), restricted to Γ( X), is uniformly distributed in {0,1}|Γ(X)|. Thus,\nPr\nC[wt(C(x))< γc′n]≤\u0000⌈c′n(1−ϵ′)⌉\n0\u0001\n+\u0000⌈c′n(1−ϵ′)⌉\n1\u0001\n+. . .+\u0000⌈c′n(1−ϵ′)⌉\n⌊γc′n⌋\u0001\n2⌈c′n(1−ϵ′)⌉\n≤2−c′n(1−ϵ′)(1−h(γ\n1−ϵ′)). (5)\nRecall that ϵ′= (1 +1\nc′)ϵ. Let ϵ >0 be sufficiently small such that c′(1−ϵ′)(1−h(γ\n1−ϵ′))>1,\nthe probability (5) would be less than 2−n. (Such ϵ′>0 clearly exists, since h(γ)<1−1\nc′⇔\nc′(1−h(γ))>1).\nNext, a “composition lemma” allows us to combine several partial good codes into a larger one.\nThe lemma is already implicit in [Gal+13].\n9Lemma 3.5. (Composition Lemma) For any n, d≥1,ℓ≥2, and any 1 ≤r1≤r2≤. . . r ℓ+1≤n,\nassume there exist linear circuits of size siand depth dencoding some ( n, ri, ri+1)-PGC, i=\n1,2, . . . , ℓ . We have\nSd+1(n, r1, rℓ+1)≤ℓX\ni=1si+O(n). (6)\nMoreover, if the output gates of the linear circuits encoding ( n, ri, ri+1)-PGCs have bounded\nfan-in D, for all i= 1,2, . . . , ℓ , then we have\nSd(n, r1, rℓ+1)≤ℓX\ni=1si+O(Dℓn). (7)\nIn addition, the fanin of the output gates (of the depth- dcircuit encoding the ( n, r1, rℓ+1)-PGC) is\nbounded by O(ℓD).\nProof. Denote the linear circuit encoding an ( n, ri, ri+1)-PGC by Ci,i= 1,2, . . . , ℓ . Recall that\neach Ci:{0,1}n→ {0,1}32nhas 32 noutputs, denoted by w(i)\n1, w(i)\n2, . . . , w(i)\n32n.\nCreate 32 ngates, denoted by y1, y2, . . . , y 32n. Let\nyj=ℓX\ni=1c(i)\njw(i)\nj(mod 2) ,\nwhere coefficients c(i)\nj∈ {0,1}are chosen independently and uniformly at random. See Figure 2 for\nillustration.\nFigure 2: Partial good codes composition\nFigure 2 is a bit misleading. Instead of creating 32 nnew gates y1, y2, . . . , y 32n, we merge\nw(1)\nj, w(2)\nj, . . . , w(ℓ)\nj, for each j= 1,2, . . . , 32n. Fixing j, independently for each i∈ {1,2, . . . , ℓ},\nwith probability1\n2, merge w(i)\njwith yj, and with probability1\n2, do nothing. As such, the depth of\nthe circuit is still d, and the size is at mostPℓ\ni=1si.\nLet us analyze the weight of y= (y1, y2, . . . , y 32n)∈ {0,1}32n. For any x∈ {0,1}nwith\nwt(x)∈[r1, rℓ+1], there exists ksuch that wt( x)∈[rk, rk+1]. By the definition of PGC, Ck(x) has\nweight at least 4 n. Fix all coefficients c(i)\njexcept for those i=kandj∈supp( Ck(x)), one can\n10easily see that {yj:j∈supp( Ck(x))}is uniformly distributed in {0,1}|supp( Ck(x))|. Thus, for any\nfixed x,\nPrh\nwt(y)