text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
Stochastic Input Models in Online Computing
arXiv:1709.07601v1 [cs.DS] 22 Sep 2017
Yasushi Kawase∗
Tokyo Institute of Technology, Tokyo, Japan
kawase.y.ab@m.titech.ac.jp
Abstract
In this paper, we study twelve stochastic input models for online problems and reveal the relationships
among the competitive ratios for the models. The competitive ratio is defined as the worst ratio between
the expected optimal value and the expected profit of the solution obtained by the online algorithm where
the input distribution is restricted according to the model. To handle a broad class of online problems, we
use a framework called request-answer games that is introduced by Ben-David et al. The stochastic input
models consist of two types: known distribution and unknown distribution. For each type, we consider
six classes of distributions: dependent distributions, deterministic input, independent distributions, identical independent distribution, random order of a deterministic input, and random order of independent
distributions. As an application of the models, we consider two basic online problems, which are variants
of the secretary problem and the prophet inequality problem, under the twelve stochastic input models.
We see the difference of the competitive ratios through these problems.
1
Introduction
In online computing, we are given a sequence of requests, and we need to choose an action in each step
based on the current information without knowing the full information which will be completely obtained in
the future [6, 25]. Since an online algorithm is forced to make decisions without knowing the entire inputs,
they may later turn out not to be optimal. The quality of an online algorithm is usually measured by the
competitive ratio [35], which is the worst ratio between the optimal value and the profit of the solution
obtained by the online algorithm. However, for practical application, it is too pessimistic because the worstcases rarely occur in real-world. Thus, an average-case analysis is more suitable than the worst one in such a
situation. In order to analyze average performance, we need to assume some distribution of inputs. Hence, in
this paper, we consider stochastic input models. In 2004, Hajiaghayi, Kleinberg, and Parkes [16] studied the
case where requests are drawn independently from some unknown distribution and the case where the requests
sequence is determined by picking a multi-set of requests and then permuting them randomly. However, we
can define various stochastic input models, and we need to consider which should we use depending on
analysis objective.
Various studies related to online problems with a stochastic input have been extensively conducted on
statistics literature. A most famous example of the problems is secretary problem [14, 15, 34]. In the
(classical) secretary problem, a decision-maker is willing to hire the best secretary out of n applicants that
arrive in a random order, and the goal is to maximize the probability of choosing the best applicant. As
each applicant appears, it must be either selected or rejected, and the decision is irrevocable. It is assumed
that the decision must be based only on the relative ranks (without ties) of the applicants seen so far and
the number of applicants n. It is well known that one can succeed with the optimal probability 1/e by the
following algorithm: observe the first n/e applicants without selecting, and then select the next applicant
who is the best among the observed applicants [12].
∗ Supported
by a Grant-in-Aid for Young Scientists (B) (No. 16K16005).
1
The above setting is also referred to the no-information case because there is no information about the
value of applicants. When the decision-maker is allowed to observe the actual values of the applicants, the
problem is called the full-information secretary problem if the values are chosen independently and identically
from a known distribution. Also, if the values are chosen independently and identically from a distribution
with an unknown parameter, it is called the partial-information secretary problem. Moreover, when the
values are chosen independently from known (not necessarily identical) distributions, the problem is studied
as prophet inequality. Krengel, Sucheston, and Garling [27] provided a tight 2-competitive algorithm: select
the first value that is at least half of the expected maximum.
There are also a huge number of researches on the stochastic input models in online learning literature, such
as online (convex) optimization, online prediction, online classification, and multi-armed bandit [10, 9, 18].
In many studies in the literature, it is assumed that input is drawn from an unknown distribution and one
repeatedly performs the same task.
The main purpose of this paper is to compare stochastic input models in the sense of competitive ratios.
As a previous result, Mehta [32] provided a relation between four models: unknown deterministic input,
random order of an unknown deterministic input, unknown i.i.d., and known i.i.d. However, he considered
only the online allocation problems. On the other hand, this paper studies a more general form of online
problems through request-answer games.
Our results
In this paper, we provide twelve stochastic input models for online problems and reveal the relationships
among the competitive ratios for the models. The models consist of two types: known distribution and
unknown distribution. For each type, we consider six classes of distributions: dependent distributions (dep),
deterministic input (det), independent distributions (ind), identical independent distribution (i.i.d.), random
order of a deterministic input (r.d.), and random order of independent distributions (r.i.). The competitive
ratio is defined as the worst ratio between the expected optimal value and the expected profit of the solution
obtained by the online algorithm where the input (request) distribution is restricted according to the model.
We will denote by CRmodel (resp. CRmodel ) the competitive ratio with unknown (resp. known) distribution
model. For example, CRdet , CRr.d. , CRi.i.d. , CRi.i.d. represent competitive ratios for unknown deterministic
input, random order of an unknown deterministic input, unknown i.i.d., and known i.i.d., respectively. Then,
our results can be summarized as Figure 1.
CRind
CRdep
CRdet
CRdet
CRi.i.d.
CRi.i.d.
CRr.d.
CRr.d.
CRr.i.
CRr.i.
CRind
CRdep
Figure 1: The relationships of the competitive ratios. Each arrow represents an inequality (the value at the
head of each arrow is at most the one at its tail) and ratios in the same region have the same value.
Related work
Ben-David et al. [5] introduced a general framework of online problems, which is called request-answer games.
They compared oblivious, adaptive-online, and adaptive-offline adversaries. The request-answer games can
be seen as the following two-person zero-sum games. The first player seeks an online algorithm that minimizes
2
the competitive ratio; the second player seeks a request sequence that maximizes the competitive ratio. We
can view a randomized online algorithm as a mixed strategy of the first player. By using von Neumann’s
minimax theorem [38] and Loomis’s lemma [29], we can get a technique to obtain an upper bound of the
competitive ratio. This technique is called Yao’s principle [39] and used for various online problems.
Many generalizations of the secretary problem, i.e., problems in the random order model, have been studied in the competitive analysis literature. As a natural generalization, Hajiaghayi, Kleinberg, and Parkes [16]
introduced the multiple-choice secretary problem and Kleinberg [23] provided an asymptotically optimal
competitive algorithm when the objective is to maximize the sum of the k choices. Babaioff, Immorlica, and
Kleinberg [4] introduced the matroid secretary problem. In this model, the set of selected applicants must
be an independent set in an underlying matroid. Lachish [28] provided O(log log r)-competitive algorithm
where r is the rank of given matroid. Korula and Pál [26] presented 8-competitive algorithm for bipartite
matching and then Kesselheim et al. [22] provide a tight e-competitive algorithm. Babaioff et al. [2] introduced knapsack secretary problem and proposed 10e-competitive algorithm. For more details, see Dinitz [11]
and Babaioff et al. [3].
There are also a number of researches for generalizations of prophet inequalities. Hajiaghayi, Kleinberg,
and Sandholm [17] considered multiple-choice variant and they provided a prophet inequality when the objective is to maximize the sum of the k choices. Kleinberg and Weinberg [24] studied the matroid constrained
version and gave a tight 2-competitive algorithm. Rubinstein and Singla [33] introduced framework for combinatorial valuation functions. Moreover, Esfandiari et al. [13] introduced a prophet secretary problem, which
is a natural combination of the prophet inequality problem and the secretary problem. In their setting, the
values are chosen independently from known (not necessarily identical) distributions but arrive in a random
order.
Paper Organization
Section 2 describes formal definitions of our models via request-answer games. Section 3 discusses some
variants of the secretary problem and the prophet inequality problem for our models. In Section 4, we give
the proof of our results shown in Figure 1 and show that we cannot simplify the relations.
2
Model
In this section, we introduce request-answer games with stochastic input models.
A request-answer system is a tuple (R, A, f, n) where each component is defined as follows. There is a set
of requests R and a set of answers A. Throughout the paper, we assume that the sets R and A are finite. A
positive integer n represents the number of rounds. Let f : Rn × An → R+ denote a utility function, where
R+ is the set of nonnegative real numbers.
A deterministic online algorithm ALG is a sequence of functions gi : Ri → A (i = 1, 2, . . . , n). Given a
deterministic online algorithm ALG = (g1 , . . . , gn ) and a request sequence r = (r1 , . . . , rn ) ∈ Rn , the output
is an answer sequence ALG[r] = (a1 , . . . , an ) ∈ An where ai = gi (r1 , . . . , ri ) for i = 1, . . . , n. The utility
incurred by ALG on r, denoted by ALG(r) is defined as
ALG(r) = f (r, ALG[r]).
A randomized online algorithm ALG is defined as a probability distribution over the set of all deterministic
online algorithms A = {(g1 , . . . , gn ) | gi : Ri → A (i = 1, . . . , n)}. The utility incurred by ALG on r, denoted
by ALG(r) is defined as
ALG(r) = Ex [f (r, ALGx [r])]
where we use Ex to denote the expectation with respect to the distribution over the set A = {ALGx }, which
defines ALG. We will denote by A the set of randomized algorithms. We remark that A is a convex compact
set since A is a finite set by the assumption that R and A are finite.
3
The performance of an online algorithm is measured by the competitive ratio—the ratio between its value
and the optimal value for the worst request sequence. Note that we only discuss in this paper the oblivious
adversary, i.e., the request sequence does not depend on the randomized results of the algorithm. This is
because we want to consider weaker adversaries than the standard model and the adaptive adversary and
stochastic input models are incompatible in most cases.
Given a request sequence r ∈ Rn , the optimal offline utility on r is defined as
OPT(r) = max{f (r, a) | a ∈ An }.
Let Sn be the set of permutations of [n], where [n] = {1, . . . , n}. For a permutation σ ∈ Sn and a sequence
x = (x1 , . . . , xn ), let us denote xσ = (xσ(1) , . . . , xσ(n) ).
Definition 2.1 (Competitive Ratios). For a request-answer game (R, A, f, n), a randomized online algorithm
ALG ∈ A is ρ-competitive for a distribution D over the request sequences Rn if
Er∼D [OPT(r)] ≤ ρ · Er∼D [ALG(r)].
Let D be a compact subset1 of the distributions over the request sequences Rn .
We define the competitive ratio of (R, A, f, n) for unknown distribution in D as
CRD (R, A, f, n) =
inf
sup
ALG∈A D∈D
Er∼D [OPT(r)]
Er∼D [ALG(r)]
(1)
where we define 0/0 = 1. In other words, there exists a randomized online algorithm that is CRD (R, A, f, n)competitive for any D ∈ D, and this is best possible. Similarly, we define the competitive ratio of (R, A, f, n)
for known distribution in D as
Er∼D [OPT(r)]
.
D∈D ALG∈A Er∼D [ALG(r)]
CRD (R, A, f, n) = sup
inf
(2)
Namely, for any D ∈ D, there exists a CRD (R, A, f, n)-competitive algorithm, and this is best possible. We
often omit the argument (R, A, f, n) if there is no confusion.
The value of the competitive ratio is at least 1 and smaller is better. It should be noted that, for
minimization problems, a randomized online algorithm ALG is ρ-competitive for a distribution D over the
request sequences Rn if
Er∼D [ALG(r)] ≤ ρ · Er∼D [OPT(r)].
We can also define the competitive ratio of a minimization version of request-answer games in the same
manner.
By the max-min inequality, the following inequality holds.
Lemma 2.2. For any request-answer game (R, A, f, n) and a set of distributions D over the request sequences
Rn , we have
CRD (R, A, f, n) ≥ CRD (R, A, f, n).
Moreover, if D is a compact convex set, the equality in the above inequality holds.
Lemma 2.3. For any request-answer game (R, A, f, n) and a compact convex set of distributions D over the
request sequences Rn , we have
CRD (R, A, f, n) = CRD (R, A, f, n).
1 We
assume compactness to simplify the exposition.
4
Proof. Since CRD (R, A, f, n) ≥ CRD (R, A, f, n) holds by Lemma 2.2, it is sufficient to prove CRD (R, A, f, n) ≤
CRD (R, A, f, n). Let c = CRD (R, A, f, n) and let h(D, ALG) = Er∼D [OPT(r) − c · ALG(r)]. Since
[OPT(r)]
, it holds that for any ALG ∈ A there exists D ∈ D
c = CRD (R, A, f, n) = inf ALG∈A supD∈D EEr∼D
r∼D [ALG(r)]
such that h(D, ALG) ≥ 0. Thus we have
inf
sup h(D, ALG) ≥ 0.
ALG∈A D∈D
Moreover, by von Neumann’s minimax theorem [38], we have
sup h(D, ALG) = sup
inf
ALG∈A D∈D
inf
h(D, ALG)
D∈D ALG∈A
since A and D are compact convex sets, and h(D, ALG) is linear by the linearity of expectations. Thus,
supD∈D inf ALG∈A h(D, ALG) ≥ 0 and hence there exists D∗ ∈ D such that h(D∗ , ALG) ≥ 0 for any ALG ∈ A.
Therefore, we obtain
Er∼D [OPT(r)]
D∈D ALG∈A Er∼D [ALG(r)]
Er∼D∗ [OPT(r)]
≥ inf
ALG∈A Er∼D∗ [ALG(r)]
CRD (R, A, f, n) = sup
inf
≥ c = CRD (R, A, f, n),
which proves the lemma.
P
A distribution over a (finite) domain Ω is a function D : Ω → [0, 1] such that x∈Ω D(x) = 1. We denote
by ∆(Ω) the set of all such distributions. For x ∈ Ω, let δx be a distribution such that δx (x) = 1 and δx (y) = 0
for any x, y ∈ Ω such that y 6= x. In this paper, we consider the following six classes of distributions.
1. Dependent distribution:
∆dep (Rn ) = ∆(Rn ).
2. Deterministic input :
∆det (Rn ) = {δr | r ∈ Rn }.
3. Independent distribution:
∆ind (Rn ) =
(
D ∈ ∆(Rn ) D(r) =
4. Identical independent distribution:
(
n
∆i.i.d.(R ) =
n
D ∈ ∆(R ) D(r) =
n
Y
i=1
)
Di (ri ), Di ∈ ∆(R) .
n
Y
i=1
′
′
)
D (ri ), D ∈ ∆(R) .
5. Random order of deterministic input :
∆r.d. (Rn ) = {ψr | r ∈ Rn }
where ψr ∈ ∆(Rn ) (r ∈ Rn ) is a distribution such that ψr (r ′ ) = |{σ ∈ Sn | r ′ = r σ }|/n! for r ′ ∈ Rn .
Here, recall that r σ = (rσ(1) , . . . , rσ(n) ).
6. Random order of independent distribution:
(
n
∆r.i. (R ) =
n
D ∈ ∆(R ) D(r) =
5
n
X Y
σ∈Sn i=1
)
Dσ(i) (ri )/n!, Di ∈ ∆(R) .
We will omit the argument Rn when no confusion can arise. In addition, we abbreviate CR∆dep (Rn ) (R, A, f, n)
to CRdep and also we abbreviate the other competitive ratios in the same way.
Now, we can formally state our main results, which was depicted in Figure 1.
Theorem 2.4. For any request-answer game (R, A, f, n), we have
CRdet ≤ CRi.i.d. ≤ CRi.i.d. ≤ CRr.d. = CRr.i. ≤ CRdep = CRdet = CRind = CRdep ,
CRdet ≤ CRr.d. ≤ CRr.i. ≤ CRr.i. ,
(4)
CRi.i.d. ≤ CRind ≤ CRdep .
(6)
CRi.i.d. ≤ CRr.i. ,
3
(3)
(5)
Examples of the Stochastic Input Models
Before proving our main results, we see some examples of the stochastic input models.
3.1
Online selection problem
Suppose that a decision-maker sequentially observes a sequence of random variables X1 , X2 , . . . , Xn and is
allowed to choose only one number, which can be done only upon receiving that number. The goal is to
maximize the expectation of the chosen value. We formalize the problem as a request-answer game. Let
Rm = {0, 1, . . . , m} (where m is a sufficiently large integer), A = {0, 1}, and
(
ri∗ (if {i∗ } = {i | ai = 1}),
f (r, a) =
0
(otherwise).
ai = 1 (resp. ai = 0) represents that the decision-maker selects (resp. rejects) ith value.
The problem in the known independent distributions model is introduced by Krengel and Sucheston,
and it is eagerly studied under the name of the prophet inequalities. It is well known that this problem is
2-competitive when n ≥ 2, i.e., lim supm→∞ CR∆ind (Rnm ) = 2 for any n ≥ 2 [21]. Hill and Kertz [19] gave a
better upper bound of the competitive ratio in the known i.i.d. model and the current best upper bound is
1.354 [1].
For the known dependent distributions model, Hill and Kertz [20] proved that there exists no constant
competitive algorithm, i.e., lim supn,m→∞ CR∆dep (Rnm ) = ∞. By Theorem 2.4, this implies that
lim sup CR∆dep (Rnm ) = lim sup CR∆ind (Rnm ) = lim sup CR∆det (Rnm ) = ∞.
n,m→∞
n,m→∞
n,m→∞
For random order of known independent distributions model (prophet secretary problem), Esfandiari
et al. [13] provided e/(e − 1)-competitive algorithm and there is no online algorithm that can achieve a
competitive ratio better than 15/11. Hence, it holds that 15/11 ≤ lim supn,m→∞ CR∆r.i. (Rnm ) ≤ e/(e − 1).
When the given input is random order or i.i.d. distribution, it is easy to see that the secretary algorithm
is e-competitive. On the other hand, Stewart [36] proves that no algorithm can select the best number with
probability 1/e − o(1) when X1 , X2 , . . . , Xn are chosen i.i.d. from a uniform distribution on the interval (α, β)
and (α, β) is chosen from a certain Pareto distribution. Transforming the variables Xi to M Xi , where M is
a sufficient large number, implies that there is no online algorithm that is better than e-competitive. Thus
we have lim supn,m→∞ CR∆r.d. (Rnm ) = lim supn,m→∞ CR∆r.i. (Rnm ) = lim supn,m→∞ CR∆i.i.d. (Rnm ) = e.
For the other models, we can easily check that CR∆r.d. (Rnm ) = CR∆det (Rnm ) = 1 for any n, m because we
can deterministically pick the maximum number.
6
3.2
Odds problem
We show that the odds problem—a generalization of the classical secretary problem—can be formulated as the
known identical distribution model. In the odds problem, a decision-maker sequentially observes a sequence
of independent 0/1 random variables X1 , X2 , . . . , Xn , where Pr[Xi = 1] = pi (1) and Pr[Xi = 0] = pi (0) (=
1 − pi (1)). We say success if Xi = 1 and failure if Xi = 0. The goal is to find an optimal stopping rule to
maximize the probability of win—the probability of obtaining the last success. Note that the special case
pi = 1/i corresponds to the classical secretary problem and several generalizations of the odds problem have
been studied [8, 37, 30, 31].
Let us consider a request-answer game (R, A, f, n) where R = {0, 1}, A = {0, 1}, and
(
1 (if r = (0, . . . , 0) or {i | ai = 1} = arg max{i | ri = 1}),
f (r, a) =
0 (otherwise).
Qn
Then, for a distribution D∗ such that D∗ (r) = i=1 pi (ri ), the expected value Er∼D∗ [ALG(r)] is the probability of win2 . Note that OPT(r) = 1 for any r ∈ Rn and hence the competitive ratio is the inverse value
of the probability of win.
Bruss [7] proved that ALG∗ = (g1∗ , . . . , gn∗ ) is e-competitive when
(
Pn
pj (1)
1 (ri = 1 and
j=i+1 pj (0) < 1),
∗
gi (r1 , . . . , ri ) =
0 (otherwise)
and this is asymptotically best possible. Moreover, no online algorithm can achieve a competitive ratio better
than e even if the input is a known i.i.d. distribution when n goes to infinity (see Lemma A.1 in Appendix).
Namely, we can conclude that
lim sup CRind = lim sup CRi.i.d. = e.
n→∞
n→∞
Next, let us consider the following distribution D∗ :
. . . , 1, 0, . . . , 0), i = 1, 2, . . . , n),
1/n (r = (1,
| {z } | {z }
∗
D (r) =
i
n−i
0
(otherwise).
Then, it is easy to see that any algorithm wins with probability at most 1/n. On the other hand, selecting
a variable uniformly at random is an n-competitive algorithm. Thus, we obtain CRdep = CRdet = CRind =
CRdep = n.
For known deterministic inputs or known random order distribution, it holds that CRdet = CRr.d. = 1
because the algorithm can distinguish whether a current success is the last one or not.
For the other models CRi.i.d. , CRr.d. , CRr.i. , and CRr.i. , we can observe, by Theorem 2.4, that the values
are at least e when n goes to infinity and they are at most n. However, any good bounds are not known, to
the best of the author’s knowledge.
4
Relating the Competitive Ratios
In this section, we give the proof of Theorem 2.4 and we show that the relations (3)–(6) cannot be merged
into one sequence.
2 More
precisely, we add extra probability Pr[r = (0, . . . , 0)] to simplify later discussion.
7
4.1
Proof of Theorem 2.4
Let us start with an easy part.
Lemma 4.1. For any request-answer game (R, A, f, n), we have
CR∆det (Rn ) = 1.
Proof. As the online algorithm knows the whole request sequence in advance, it can output the optimal
answer sequence. More precisely, we get
CRdet =
Er′ ∼δr [OPT(r ′ )]
′
δr ∈∆det (Rn ) ALG∈A Er ′ ∼δr [ALG(r )]
sup
inf
OPT(r)
ALG(r)
maxa∈An f (r, a)
= sup
r∈Rn maxALG∈A ALG(r)
= sup
inf
r∈Rn ALG∈A
= sup
r∈Rn
maxa∈An f (r, a)
= 1.
maxa∈An f (r, a)
As the competitive ratios are at least 1, the lemma implies that CRdet is the smallest one.
We use the convex hull of a set of distributions to prove the rest part of the theorem. For a set of
distributions D, the convex hull is the set
(
)
X
X
conv(D) =
λD · D
λD = 1 and λD ≥ 0 (∀D ∈ D) .
D∈D
D∈D
The following lemma connects the unknown distribution model and the known distribution model.
Lemma 4.2. For any compact set of distributions D, we have
CRD = CRconv(D) = CRconv(D) .
Proof. CRconv(D) = CRconv(D) holds by Lemma 2.3 since conv(D) is a compact convex set.
Since D ⊆ conv(D), we have
inf
sup
ALG∈A D∈D
Er∼D [OPT(r)]
Er∼D [OPT(r)]
≤ inf
.
sup
Er∼D [ALG(r)] ALG∈A D∈conv(D) Er∼D [ALG(r)]
(7)
Thus, it is sufficient to prove the reverse inequality of (7).
Let us fix ALG ∈ A. Let D1 , D2 , · · · ∈ conv(D) be a sequence of distributions satisfying
lim
i→∞
Er∼Di [OPT(r)]
Er∼D [OPT(r)]
.
=
sup
Er∼Di [ALG(r)] D∈conv(D) Er∼D [ALG(r)]
By the definition
for each i ∈ {1, 2, . . . },there exist coefficients λiD such that Di =
P of thei convex closure,
P
i
i
D∈D λD = 1, and λD ≥ 0 (∀D ∈ D). Thus, we have
D∈D λD · D,
P
i
Er∼Di [OPT(r)]
n D (r) · OPT(r)
= Pr∈R
i
Er∼Di [ALG(r)]
r∈Rn D (r) · ALG(r)
P
P
λi · D(r) · OPT(r)
n
= Pr∈R PD∈D D
i
D∈D λD · D(r) · ALG(r)
r∈Rn
P
λi · Er∼D [OPT(r)]
= PD∈D D
i
D∈D λD · Er∼D [ALG(r)]
≤ sup
D∈D
Er∼D [OPT(r)]
.
Er∼D [ALG(r)]
8
Hence we obtain
i [OPT(r)]
E
Er∼D [OPT(r)]
Er∼D [OPT(r)]
= lim r∼D
.
≤ sup
i→∞
i
E
[ALG(r)]
E
[ALG(r)]
D∈D Er∼D [ALG(r)]
r∼D
D∈conv(D) r∼D
sup
By taking infimum over ALG ∈ A, we have
Er∼D [OPT(r)]
Er∼D [OPT(r)]
≤ inf sup
,
ALG∈A D∈D Er∼D [ALG(r)]
ALG∈A D∈conv(D) Er∼D [ALG(r)]
inf
sup
which proves the lemma.
Next, we examine relationships between our intended sets of distributions.
Lemma 4.3. For any request-answer game (R, A, f, n), we have
conv(∆i.i.d. ) ⊆ conv(∆r.d. ) = conv(∆r.i. ) ⊆ conv(∆det ) = conv(∆ind ) = ∆dep = conv(∆dep ).
Proof. We first prove that conv(∆det ) = conv(∆ind ) = conv(∆dep ) = ∆dep . By the definition, we have
∆det ⊆ ∆ind ⊆ ∆dep .
P
Also, for D ∈ ∆dep , it holds that D =
r∈Rn D(r)δr and hence ∆dep ⊆ conv(∆det ). Thus, ∆dep =
conv(∆dep ) = conv(∆ind ) = conv(∆det ) holds.
Next, we observe that conv(∆r.d. (Rn )) ⊆ ∆dep (Rn ). As ∆dep (Rn ) = conv(∆dep (Rn )), it is sufficient to
prove that ∆r.d. (Rn ) ⊆ ∆dep (Rn ). Let ψr ∈ ∆r.d. (Rn ). Recall that ψr (r ′ ) = |{σ ∈ Sn | r ′ = r σ }|/n! for
r ′ ∈ Rn . Thus we obtain
ψr =
X |{σ ∈ Sn | r ′ = r σ }|
· δr′ ∈ ∆dep (Rn ).
n!
′
n
r ∈R
Furthermore, we show conv(∆r.d. ) = conv(∆
r.i.
Q).n Since ∆r.d. ⊆ ∆r.i. , it is sufficient to prove that ∆r.i. ⊆
P
conv(∆r.d. ). Let D ∈ ∆r.i. where D(r) = σ∈Sn i=1 Dσ(i) (ri )/n! and Di ∈ ∆(R). Also, let D′ ∈ ∆ind be a
Qn
distribution such that D′ (r) = i=1 Di (ri ). Then we have
X
D=
D′ (r ′ )ψr′ ∈ conv(∆r.d. ).
r ′ ∈Rn
n
n
n
Finally, we show
r.d. (R )). Let D ∈ ∆i.i.d. (R ) and D(r) =
Qn ) ⊆ conv(∆
Qn that′ ∆i.i.d.(R
′
σ
we have D(r) = i=1 D (ri ) = i=1 D (rσ(i) ) = D(r ) for any σ ∈ Sn and hence
D=
X
D(r)δr =
r∈Rn
X 1 X
D(r σ )δrσ
n!
n
σ∈Sn
r∈R
X
X δr σ
X X D(r)δrσ
=
D(r)
=
n!
n!
n
n
r∈R σ∈Sn
=
X
r∈Rn
=
X
r∈Rn
D(r)
σ∈Sn
r∈R
′
X |{σ ∈ Sn | r = r σ }|
· δr ′
n!
′
n
r ∈R
D(r) · ψr ∈ conv(∆r.d. (Rn )),
which proves the claim.
9
!
Qn
i=1
D′ (ri ). Then
We remark that ∆i.i.d. (Rn ) ( conv(∆i.i.d. (Rn )) in general. For example, if R = {0, 1} and n = 2, then
+ 21 δ(1,1) ∈ conv(∆i.i.d. (Rn )) while 21 δ(0,0) + 12 δ(1,1) 6∈ ∆i.i.d. (Rn ).
Now we are ready to prove Theorem 2.4. By Lemmas 4.2 and 4.3, we obtain
1
2 δ(0,0)
CRi.i.d. ≤ CRr.d. = CRr.i. ≤ CRdep = CRdet = CRind = CRdep
since D ⊆ D′ implies CRD ≤ CRD′ . Moreover, CRi.i.d. ≤ CRi.i.d. holds by Lemma 2.2 and CRi.i.d. ≥ 1 (=
CRdet ) by the definition of competitive ratio. Thus, (3) holds. Also, (4) holds by ∆r.d. ⊆ ∆r.i. , (5) holds by
∆i.i.d. ⊆ ∆r.i. , and (6) holds by ∆i.i.d. ⊆ ∆ind ⊆ ∆dep .
4.2
Inequalities for incomparable ratios
We show that the relations (3)–(6) cannot be merged into one sequence. To prove this, we observe some
examples of request-answer games.
Lemma 4.4. For each following statement, there exists a request-answer game (R, A, f, n) that satisfies it:
(a) CRr.i. < CRi.i.d. , (b) CRind < CRi.i.d. , (c) CRr.d. < CRi.i.d. , (d) CRi.i.d. < CRr.d. , and (e) CRr.d. < CRind .
Proof. (a) CRr.i. < CRi.i.d.. This inequality holds for an online selection problem instance since CRr.i. ≤
e/(e − 1) (≈ 1.582) and CRi.i.d. ≥ e (≈ 2.718) when n and m go to infinity (see Section 3.1).
(b) CRind < CRi.i.d.. This inequality holds for an online selection problem instance since CRind ≤ 2 and
CRi.i.d. ≥ e when n and m go to infinity (see Section 3.1).
(c) CRr.d. < CRi.i.d. . This inequality holds for an odds problem instance since CRr.d. → 1 and CRi.i.d. → e
as n goes to infinity (see Section 3.2).
To prove the other cases, we consider request-answer games of the form G = (R, A, fS , n) where S ⊆ Rn ,
A = {0, 1}, and
(
1 ((r ∈ S and a1 = 1) or (r 6∈ S and a1 = 0)),
fS (r, a) =
0 (otherwise).
By the definition of the game, the task of the online algorithm is to predict r ∈ S or not. The prediction
is answered as a1 . The profit is one if the prediction is correct and is zero otherwise. Here, we remark that
OPT(r) = 1 for any r ∈ Rn .
(d) CRi.i.d. < CRr.d. . We consider the game G with
R = {1, 2, . . . , n} and S = {(σ(1), . . . , σ(n)) ∈ Rn | σ ∈ Sn , σ(n) > σ(n − 1)}.
Then, for any i.i.d. distribution, the request sequence does not belong to S with high probability. Thus, by
predicting that the request sequence does not belong to S, one can obtain an expected profit 1 − o(1). On the
other hand, when the input distribution is ψ(1,2,...,n) , we cannot predict that the request sequence belongs to
S or not with probability better than 1/2. Thus, CRi.i.d. = 1 + o(1) and CRr.d. = 2 and hence the inequality
holds.
(e) CRr.d. < CRind . We consider the game G with R = {0, 1} and S = {(0, 0, . . . , 0, 1)}. Then, for any
random order distribution, the request sequence belong to S with probability at most 1/n. Thus, by predicting
that the request sequence does not belong to S, one canQ
get an expected profit 1 − 1/n. On the other hand,
when the input distribution D ∈ ∆ind satisfies D(r) = ni=1 Di (ri ) where D1 (0) = · · · = Dn−1 (0) = 1 and
Dn (0) = Dn (1) = 1/2, we cannot predict that the request sequence belongs to S or not with probability
better than 1/2. Thus, CRr.d. = n/(n − 1) and CRind = 2 and hence the inequality holds.
10
References
[1] M. Abolhassani, S. Ehsani, H. Esfandiari, M. HajiAghayi, R. Kleinberg, and B. Lucier. Beating 1 − 1/e
ordered prophets. In Proceedings of STOC, pages 16–71, 2017.
[2] M. Babaioff, N. Immorlica, D. Kempe, and R. Kleinberg. A knapsack secretary problem with applications. In Proceedings of APPROX and RANDOM, pages 16–28, 2007.
[3] M. Babaioff, N. Immorlica, D. Kempe, and R. Kleinberg. Online auctions and generalized secretary
problems. ACM SIGecom Exchange, 7(2):7:1–7:11, 2008.
[4] M. Babaioff, N. Immorlica, and R. Kleinberg. Matroids, secretary problems, and online mechanisms. In
Proceedings of SODA, pages 434–443, 2007.
[5] S. Ben-David, A. Borodin, R. M. Karp, G. Tardos, and A. Wigderson. On the power of randomization
in on-line algorithms. Algorithmica, 11(1):2–14, 1994.
[6] A. Borodin and R. El-Yaniv. Online computation and competitive analysis. Cambridge university press,
2005.
[7] F. T. Bruss. Sum the odds to one and stop. The Annals of Probability, 28(3):1384–1391, 2000.
[8] F. T. Bruss and D. Paindaveine. Selecting a sequence of last successes in independent trials. Journal of
Applied Probability, 37(02):389–399, 2000.
[9] S. Bubeck and N. Cesa-Bianchi. Regret analysis of stochastic and nonstochastic multi-armed bandit
problems. Foundations and Trends in Machine Learning, 5(1):1–122, 2012.
[10] N. Cesa-Bianchi and G. Lugosi. Prediction, learning, and games. Cambridge university press, 2006.
[11] M. Dinitz. Recent advances on the matroid secretary problem. SIGACT News, 44(2), 2013.
[12] E. B. Dynkin. The optimum choice of the instant for stopping a Markov process. Soviet Mathematics
Doklady, 4:627–629, 1963.
[13] H. Esfandiari, M. Hajiaghayi, V. Liaghat, and M. Monemizadeh. Prophet secretary. In Proceedings of
ESA, pages 496–508, 2015.
[14] T. S. Ferguson. Who solved the secretary problem? Statical Science, 4(3):282–289, 1989.
[15] P. R. Freeman. The secretary problem and its extensions: A review. International Statistical Review,
51(2):189–206, 1983.
[16] M. Hajiaghayi, R. Kleinberg, and D. C. Parkes. Adaptive limited-supply online auctions. In Proceedings
of EC, pages 71–80. ACM, 2004.
[17] M. Hajiaghayi, R. Kleinberg, and T. Sandholm. Automated online mechanism design and prophet
inequalities. In Proceedings of AAAI, volume 7, pages 58–65, 2007.
[18] E. Hazan. Introduction to Online Convex Optimization. Foundations and Trends in Optimization Series.
2016.
[19] T. P. Hill and R. P. Kertz. Comparisons of stop rule and supremum expectations of i.i.d. random
variables. The Annals of Probability, 10(2):336–345, 1982.
[20] T. P. Hill and R. P. Kertz. Stop rule inequalities for uniformly bounded sequences of random variables.
Transactions of the American Mathematical Society, 278(1):197–207, 1983.
[21] T. P. Hill and U. Krengel. A prophet inequality related to the secretary problem. Strategies for Sequential
Search and Selection in Real Time, pages 209–215, 1992.
11
[22] T. Kesselheim, K. Radke, A. Tönnis, and B. Vöcking. An optimal online algorithm for weighted bipartite
matching and extensions to combinatorial auctions. In Proceedings of ESA, pages 589–600, 2013.
[23] R. Kleinberg. A multiple-choice secretary algorithm with applications to online auctions. In Proceedings
of SODA, pages 630–631, 2005.
[24] R. Kleinberg and S. M. Weinberg. Matroid prophet inequalities. In Proceedings of STOC, pages 123–136,
2012.
[25] D. Komm. An Introduction to Online Computation: Determinism, Randomization, Advice. Springer
International Publishing, 2016.
[26] N. Korula and M. Pál. Algorithms for secretary problems on graphs and hypergraphs. In Proceedings
of ICALP, pages 508–520, 2009.
[27] U. Krengel and L. Sucheston. Semiamarts and finite values. Bulletin of the American Mathematical
Society, 83(4):745–747, 1977.
[28] O. Lachish. O(log log rank) completitive-ratio for the matroid secretary problem. In Proceedings of
FOCS, pages 326–335, 2014.
[29] L. H. Loomis. On a theorem of von neumann. In Proceedings of the National Academy of Sciences of
the U.S.A., volume 32, pages 213–215, 1946.
[30] T. Matsui and K. Ano. A note on a lower bound for the multiplicative odds theorem of optimal stopping.
Journal of Applied Probability, 51(03):885–889, 2014.
[31] T. Matsui and A. Katsunori. Lower bounds for bruss’ odds problem with multiple stoppings. Mathematics
of Operations Research, 41(2):700–714, 2016.
[32] A. Mehta. Online matching and ad allocation. Foundations and Trends in Theoretical Computer Science,
8(4):265–368, 2013.
[33] A. Rubinstein and S. Singla. Combinatorial prophet inequalities. In Proceedings of SODA, pages 1671–
1687, 2017.
[34] S. M. Samuels. Secretary problems. In Handbook of Sequential Analysis. Marcel Dekker, 1991.
[35] D. D. Sleator and R. E. Tarjan. Amortized efficiency of list update and paging rules. Communications
of the Association for Computing Machinery, 28(2):202–208, 1985.
[36] T. J. Stewart. Optimal selection from a random sequence with learning of the underlying distribution.
Journal of the American Statistical Association, 73(364):775–780, 1978.
[37] M. Tamaki. Sum the multiplicative odds to one and stop. Journal of Applied Probability, 47(03):761–777,
2010.
[38] J. von Neumann. Zur Theorie der Gesellschaftsspiele. Mathematische Annalen, 100:295–320, 1928.
[39] A. Yao. Probabilistic computations: Toward a unified measure of complexity. In Proceedings of FOCS,
pages 222–227. IEEE, 1977.
12
A
Omitted Proof
Lemma A.1. No online algorithm can achieve a competitive ratio better than e even if the input is a known
i.i.d. distribution.
√
√
Proof. Let us assume that Pr[Xi = 1] = 1/ n and Pr[Xi = 0] = 1 − 1/ n for each i = 1, . . . , n. Consider
the following linear programming (LP):
max
s.t.
Pn
1−
√1
n
n−i
qi
Pi−1
√
n · qi ≤ 1 − j=1 qj
qi ≥ 0
i=1
(i ∈ [n]),
(i ∈ [n])
where [n] = {1, 2, . . . , n}.
We claim that the optimal value for the LP gives an upper bound of the probability of win for the problem.
Let qi be the probability of selecting the ith random variable as success. Then the probability of win is
n−i
n
X
1
1− √
qi
n
i=1
because if Xi+1 = · · · = Xn = 0 with probability 1 −
√1
n
n−i
. Also, pij must satisfy the following relation:
pi ≤ Pr[1, . . . , i − 1 are not selected] · Pr[Xi = 1] = 1 −
Thus, the LP present an upper bound of the success probability.
To evaluate the optimal value, now we consider the dual problem:
Pn
min
i=1 ri
n−i
Pn
√
s.t.
n · ri + j=i+1 rj ≥ 1 − √1n
ri ≥ 0
i−1
X
1
qj · √ .
n
j=1
(i ∈ [n]),
(i ∈ [n]).
√ n−i−1
√ n−i n−i
− n · (1 − 1/ n)
, 0}. Then it is easy to check that ri∗ is a feasible
Let ri∗ = max{ √1n · (1 − 1/ n)
solution for the dual LP.
Thus, the optimal value of the LP (and the dual LP) is upper bounded by
n
X
ri∗
=
n
X
max
i=1
i=1
=
n
X
√ n−i n − i
√ n−i−1
1
√ · (1 − 1/ n)
−
,0
· (1 − 1/ n)
n
n
√ n−i n − i
√ n−i−1
1
√ · (1 − 1/ n)
· (1 − 1/ n)
−
n
n
√
i=n−⌊ n⌋+1
√ ⌊√n⌋
√ ⌊√n⌋
√ ⌊√n⌋
1 1 − (1 − 1/ n)
1 1 − (1 − 1/ n)
− (1 − 1/ n)
√
=√ ·
− ·
n
1 − (1 − 1/ n)
n
1/n
√
√ ⌊ n⌋
1
(n → ∞).
→
= (1 − 1/ n)
e
Hence, 1/e is an upper bound of the probability of win for the problem.
Moreover, since Pr[X1 = · · · = Xn = 0] → 0 as n → ∞, there exists no online algorithm that can achieve
a competitive ratio better than e.
13
| 8cs.DS
|
arXiv:1704.00990v2 [math.CO] 7 Apr 2017
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
OVER ALMOST SIMPLE GROUPS IN POLYNOMIAL TIME
ILIA PONOMARENKO AND ANDREY VASIL’EV
In memory of Sergei Evdokimov
Abstract. A Cayley graph over a group G is said to be central if its connection set is a normal subset of G. It is proved that for any two central
Cayley graphs over explicitly given almost simple groups of order n, the set
of all isomorphisms from the first graph onto the second can be found in time
poly(n).
1. Introduction
In the present paper, we are interested in a special case of the following restriction
of the Graph Isomorphism Problem to the class of Cayley graphs.
Cayley Graph Isomorphism Problem. For two explicitly given finite groups
G and G′ and two sets X ⊂ G and X ′ ⊂ G′ , construct the set Iso(Γ, Γ′ ), where
Γ = Cay(G, X) and Γ′ = Cay(G, X ′ ).
Here the input consists of the multiplication tables of G and G′ and the sets
X and X ′ , whereas the output is either empty or given by an element of the
set Iso(Γ, Γ′ ) and a generating set of the group Aut(Γ) (of size polynomial in the
order n of the group G). Obviously, the Luks algorithm [12] solves the Cayley
Graph Isomorphism Problem in polynomial time for every group G, whenever the
set X is of constant sizes. If G is cyclic, then the problem with no restriction for X
is also solvable in polynomial time (see [6] and [13]). It should be noted that if
G = G′ and G is a so-called CI-group, then an obvious algorithm solves the Cayley
Graph Isomorphism Problem in time polynomial in | Aut(G)| (for details, see [10]).
The aforementioned special case is formed by the two following conditions imposed on the input graphs and groups. First, we assume that Γ is a central Cayley
graph over G, which means that X is a normal subset of G, i.e., X g = X for every
g ∈ G. Second, the group G is assumed to be almost simple, i.e., the socle of G
is a nonabelian simple group. The same conditions are imposed on the graph Γ′
and group G′ . Even in this rather restrictive case, the problem is still nontrivial;
at least the number of possible input graphs is exponential in n.
Example. Let G = Sym(m) be a symmetric group of degree m. Then the
number N (m) of central colored Cayley graphs over G is equal to 2p(m) , where p(m)
is the number
of all partitions of the set {1, . . . m}. Since p(m) is approximately
√
equal to 2 m , the number N (m) is exponential in n = m!.
By technical reasons, it is more convenient to deal with colored Cayley graphs.
Such a graph is given by a partition P of the group G into k ≥ 2 classes X0 , . . . , Xk−1
with X0 = {1}, and can be thought as arc-colored complete graph with vertex set
1
2
ILIA PONOMARENKO AND ANDREY VASIL’EV
G and the ith color class of arcs coinciding with the arc set of the Cayley graph
Cay(G, Xi ), i = 0, . . . , k − 1. We say that P is the Cayley partition of this graph
and denote the latter by Cay(G, P). In what follows, all Cayley graphs are assumed
to be colored: the graph Cay(G, X) is treated as Cay(G, P) for k = 3 and X1 = X.
Theorem 1.1. For any two central Cayley graphs Γ and Γ′ over explicitly given
almost simple groups G and G′ of order n, the set Iso(Γ, Γ′ ) can be found in time
poly(n).
Corollary 1.2. The automorphism group of a central Cayley graph over an explicitly given almost simple group of order n can be found in time poly(n).
The proof of Theorem 1.1 is a mix of combinatorial and permutation group
techniques. Section 2 provides a relevant background for the combinatorial part
including coherent configurations and Cayley schemes. In Section 3, we use a
classification of regular almost simple subgroups of primitive groups [11] to prove
(Lemma 3.2) that except for one special case, if K ≤ Sym(G) is a 2-closed primitive
group containing regular almost simple subgroup, then
(1)
K = Sym(G)
or K ≤ D(2, G),
where D(2, G) is the subgroup of Sym(G) generated by the holomorph of G and
the permutation σ : g 7→ g −1 , g ∈ G. We extend this result to non-primitive groups
in Sections 4 and 5 by showing that in this case, either formula (1) holds or K is a
nontrivial generalized wreath product (Theorems 4.1 and 5.1). We apply this fact
in Section 6 to the automorphism group K of a central Cayley graph Γ over the
group G to establish that
(2)
K S = Sym(S) or K S ≤ D(2, S),
where S = Soc(G) is the socle of G and K S is the restriction to S of the setwise
stabilizer of S in K. Note that if G is a symmetric group of degree at least 5, then
the group D(2, G) is isomorphic to the group G ≀ Sym(2). Thus as a byproduct
of (2), we obtain the following generalization of the result [9, Theorem 1.1] on the
automorphism group of the Cayley graph Cay(G, X), where G is a symmetric group
and X is the set of its transpositions.
Theorem 1.3. Let G be a symmetric group of degree at least 5, X a proper normal
subset of G \ Soc(G), and Γ = Cay(G, X). Then Aut(Γ) = D(2, G).
In Sections 7 and 8, we develop algorithmic tools to find the above structure of
the group K with the help of the related Cayley scheme and the group G. The
main algorithm providing the proof of Theorem 1.1 is given in Section 9.
Notation.
The diagonal of the Cartesian product Ω × Ω is denoted by 1Ω .
For s ⊆ Ω × Ω, set s∗ = {(β, α) : (α, β) ∈ s}.
For α ∈ Ω and s ⊆ Ω × Ω, set αs = {β ∈ Ω : (α, β) ∈ s}.
For ∆ ⊆ Ω and s ⊆ Ω × Ω, set s∆ = s ∩ (∆ × ∆).
For a partition E of a set Ω and s ⊆ Ω × Ω, set sE to be the relation consisting
of the pairs (∆, ∆′ ) ∈ E × E such that s meets ∆ × ∆′ .
For a set S of binary relations, put S ∪ to be the set of all unions of relations
from S.
The symmetric and alternating groups on Ω are denoted by Sym(Ω) and Alt(Ω),
respectively.
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
3
For f ∈ Sym(Ω) and s ⊆ Ω × Ω, set sf = {(αf , β f ) : (α, β) ∈ s}.
For a group G and its subgroup L, set Llef t and Lright to be the subgroups
of Sym(G) induced by left and right multiplications of L, respectively, and L∗ =
Llef t Lright .
For a group G, set D(2, G) to be the subgroup of Sym(G) generated by the group
Hol(G) = NSym(G) (Gright ) and the permutation σ : g 7→ g −1 .
For a group K ≤ Sym(G) and a set H ⊆ G, the restriction to H of the setwise
stabilizer of H in K is denoted by K H .
For an imprimitivity system L of a transitive group K, set KL and K L to be,
respectively, the intersection of all K H with H ∈ L and the permutation group
induced by the action of K on L.
For a group G and a permutation group K, set Reg(K, G) to be the set of all
regular subgroups of K that are isomorphic to G.
2. Coherent configurations and Cayley schemes
This section contains well-known basic facts on coherent configurations. All of
them can be found in [7] and papers cited there.
2.1. Main definitions. Let Ω be a finite set and S a partition of Ω × Ω. The pair
X = (Ω, S) is called a coherent configuration on Ω if the following conditions hold:
(C1) 1Ω ∈ S ∪ ,
(C2) S ∗ = S,
(C3) given r, s, t ∈ S, the number ctrs = |αr ∩ βs∗ | does not depend on the choice
of the pair (α, β) ∈ t.
The elements of Ω and S, and the numbers ctrs are called the points and basis
relations, and the intersection numbers of X , respectively. The numbers |Ω| and
|S| are called the degree and the rank of X . The coherent configuration X is said
to be homogeneous if 1Ω ∈ S.
Denote by Φ = Φ(X ) the set of Λ ⊆ Ω such that 1Λ ∈ S. The elements of Φ are
called the fibers of X . In view of condition (C1), the set Ω is the disjoint union of all
of them. Moreover, for each s ∈ S, there exist uniquely determined fibers Λ and ∆
such that s ⊆ Λ × ∆. Note that the coherent configuration X is homogeneous if
and only if |Φ| = 1.
Let e ∈ S ∪ be an equivalence relation and E the set of its classes. Given ∆ ∈ E
denote by S∆ the set of all nonempty relations s∆ with s ∈ S. Then the pair
X∆ = (∆, S∆ )
is a coherent configuration called the restriction of X to ∆. This enables to define
the restriction of X to a set Λ ∈ Φ∪ : the corresponding equivalence relation is
equal to the union of ∆ × ∆, where ∆ runs over the fibers contained in Λ. Another
coherent configuration associated with e is obtained as follows. Denote by SE the
set of all nonempty relations sE , s ∈ S. Then
XE = (E, SE )
is a coherent configuration called the quotient of X modulo e.
4
ILIA PONOMARENKO AND ANDREY VASIL’EV
2.2. Combinatorial and algebraic isomorphisms. A bijection f : Ω → Ω′
is called the (combinatorial) isomorphism from X onto a coherent configuration
X ′ = (Ω′ , S ′ ) if the set S ′ contains the relation sf for each s ∈ S. The set of all
isomorphisms f is denoted by Iso(X , X ′ ). The group of all isomorphisms of X to
itself contains a normal subgroup
Aut(X ) = {f ∈ Sym(Ω) : sf = s, s ∈ S}
called the automorphism group of X . Conversely, let G ≤ Sym(Ω) be a permutation
group, and let S be the set of orbits of the component-wise action of G on Ω × Ω.
Then the pair X = (Ω, S) is a coherent configuration; we say that X is associated
with G and denote it by Inv(G).
According to Wielandt [17], a permutation group G on Ω is said to be 2-closed
if it is equal to its 2-closure
G(2) = Aut(Inv(G)),
or, equivalently, if G is an automorphism group of a family of binary relations
on Ω (such a family can always be chosen as the set of basis relations of a coherent
configuration on Ω). If G is 2-closed and L is an imprimitivity system of G, then
the group GL is 2-closed. However, the group GL is not always 2-closed.
A bijection ϕ : S → S ′ , r 7→ r′ is called an algebraic isomorphism from X
onto X ′ if
′
ctrs = ctr′ s′ ,
(3)
′
r, s, t ∈ S.
In this case, X and X are said to be algebraically isomorphic. Each isomorphism f
from X onto X ′ induces an algebraic isomorphism ϕf : r 7→ rf between these
configurations. The set of all isomorphisms inducing the algebraic isomorphism ϕ
is denoted by Iso(X , X ′ , ϕ). In particular,
(4)
Iso(X , X , idS ) = Aut(X ),
where idS is the identity mapping on S.
An algebraic isomorphism ϕ induces a bijection from S ∪ onto (S ′ )∪ : the union
r∪s∪· · · of basis relations of X is taken to r′ ∪s′ ∪· · · . This bijection is also denoted
by ϕ. It preserves the equivalence relations e ∈ S ∪ ; moreover, the equivalence
relations e and ϕ(e) have the same number of classes as well as the same multiset
of their sizes. In this case, if E and E′ are the sets of classes of e and ϕ(e),
respectively, and ∆ ∈ E, then ϕ induces the algebraic isomorphisms
′
ϕ∆ : X∆ → X∆
′ , s 7→ ϕ(s)∆′
for a suitable ∆′ ∈ E′ .
and ϕE : XE → XE′ ′ , sE 7→ ϕ(s)E′
2.3. Direct sum and wreath product. Let X = (Ω, S) and X ′ = (Ω′ , S ′ ) be
coherent configurations. Denote by Ω ⊔ Ω′ the disjoint union of Ω and Ω′ , and by
S ⊞ S ′ the union of the set S ⊔ S ′ and the set of all relations ∆ × ∆′ and ∆′ × ∆
with ∆ ∈ Φ(X ) and ∆′ ∈ Φ(X ′ ). Then the pair
X ⊞ X ′ = (Ω ⊔ Ω′ , S ⊞ S ′ )
is a coherent configuration called the direct sum of X and X ′ . The automorphism
group of this configuration equals the direct product Aut(X ) × Aut(X ′ ) acting on
the set Ω⊔Ω′ . Furthermore, if ϕ is an algebraic isomorphism from X ⊞X ′ to another
coherent configuration, then the latter is also the direct sum Y ⊞ Y ′ and ϕ induces
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
5
algebraic isomorphisms X → Y and X ′ → Y ′ coinciding with the restrictions of ϕ
on Ω and Ω′ , respectively.
Let X be a homogeneous coherent configuration, e ∈ S ∪ an equivalence relation,
and E the set of classes of e. We say that X is the wreath product with respect to e
if for each s ∈ S such that s 6⊆ e,
[
Λ × ∆.
s=
(Λ,∆)∈sE
In what follows, we always assume that the classes of e can be identified with the
help of a family of the isomorphisms fΛ,∆ : XΛ → X∆ , Λ, ∆ ∈ E, such that
(5)
(sΛ )fΛ,∆ = s∆ ,
s ∈ S.
In this case, X is isomorphic to the usual wreath product X∆ ≀ XE for all ∆ ∈ E
(see [15, p.45]). The automorphism group of this coherent configuration is permutation isomorphic to the wreath product Aut(X∆ ) ≀ Aut(XE ) in imprimitive action.
Furthermore, if ϕ is an algebraic isomorphism from the wreath product X with
respect to e to another coherent configuration, then the latter is also the wreath
product X ′ with respect to e′ = ϕ(e) and ϕ induces algebraic isomorphisms X∆ →
′
′
X∆
′ and XE → XE′ coinciding with the restrictions of ϕ on ∆ and E, respectively,
′
where E is the set of classes of e′ and ∆′ ∈ E′ .
2.4. Cayley schemes. A coherent configuration X = (Ω, S) is called the Cayley
scheme over a group G if
Ω = G and Gright ≤ Aut(X ).
In this case, X is homogeneous and each basis relation s is the set of arcs of
Cayley graph Cay(G, X), where X is the neighborhood of the identity of G in
relation s. In particular, X can be treared as a color graph Cay(G, P), where
classes of the Cayley partition P are the neighborhoods of the identity of G in
basis relations of X .
the
the
the
the
The class of Cayley schemes is closed with respect to taking restrictions and
quotients. Namely, if X is a Cayley scheme over a group G and e ∈ S ∪ is an
equivalence relation, then the class H of e containing the identity of G is a subgroup
of G. Moreover, the set E of classes of e coincides with the right H-cosets of G. It
follows that
with
XH = Cay(H, EH ) and XE = Cay(G/H, EG/H ),
EH = {X ∈ E : X ⊂ H} and EG/H = {π(X) : X ∈ E},
where in the latter case, H is a normal subgroup of G and π : G → G/H is the
canonical epimorphism.
Assume that the Cayley scheme X is the wreath product with respect to an
equivalence relation e ∈ S ∪ . Then for any two classes Λ, ∆ ∈ E, there exists a
permutation f ∈ Gright taking Λ to ∆; set fΛ,∆ to be the restriction of f to Λ. Since
all these f are automorphisms of X , the family {fΛ,∆ }Λ,∆∈E satisfies conditions (5).
The Cayley scheme X is said to be central if Glef t ≤ Aut(X ) which is by definition of a Cayley scheme is equivalent to G∗ ≤ Aut(X ). One can see that X is
central if and only if the colored Cayley graph associated with X is central.
6
ILIA PONOMARENKO AND ANDREY VASIL’EV
2.5. Partial order and the WL-algorithm. There is a natural partial order ≤
on the set of all coherent configurations on the same set Ω. Namely, given two
coherent configurations X = (Ω, S) and X ′ = (Ω, S ′ ), we set
X ≤ X ′ ⇔ S ∪ ⊆ (S ′ )∪ .
The minimal and maximal elements with respect to this order are, respectively,
the trivial and discrete coherent configurations. The first one is a unique coherent
configuration TΩ with at most two basis relations: 1Ω and its complement to Ω×Ω (if
Ω consists of at least two points). Every basis relation of the discrete configuration
is a singleton. With respect to this order, the direct sum X ⊞ X ′ is the minimal
coherent configuration on Ω ⊔ Ω′ , the restrictions of which to Ω and Ω′ are equal
to X and X ′ , respectively.
One can prove that given a set T ⊆ 2Ω×Ω , there exists a unique minimal coherent
configuration X ′ such that every relation of T is the union of some basis relations
of X ′ . This coherent configuration is called the coherent closure of T and can
be constructed by the well-known Weisfeiler-Leman algorithm (WL-algorithm) [15,
Section B] in time polynomial in sizes of T and Ω. To stress this fact, the coherent
closure of T is denoted by WL(T ). For a color graph Γ with the set S of color
classes, we set
WL(Γ, T ) = WL(S ∪ T )
and write WL(Γ) instead of WL(Γ, ∅). It is important to note that the automorphism group of the coherent configuration WL(Γ, T ) is equal to the subgroup of
Aut(Γ) leaving each relation of T fixed (as a set). This implies that if Γ is a Cayley
graph over G, then the coherent configuration WL(Γ) is a Cayley scheme over G.
Since any coherent configuration X can be considered as a color graph, we extend
our notation to write WL(X , T ). Concerning the following statement, we refer
to [14, Theorem 2.4].
Theorem 2.1. Let S and S ′ be m-sets of binary relations on an n-element set.
Then given a bijection ψ : S → S ′ , one can check in time mnO(1) whether or not
there exists an algebraic isomorphism ϕ : WL(S) → WL(S ′ ) such that ϕ|S = ψ.
Moreover, if ϕ does exist, then it can be found within the same time.
3. Almost simple groups
In this section, we collect several known facts on finite almost simple groups and
deduce some auxiliary results to be used throughout the paper.
Lemma 3.1. Let G be an almost simple group of order n. Then
(i) |G/L| ≤ log n, where L = Soc(G),
(ii) | Reg(K, G)| = nO(1) for every K ≤ Sym(G) containing G as a normal
regular subgroup.
Proof. From the description of the automorphism groups of simple groups (see, e.g.,
[4, Introduction]), it follows that | Aut(L)/L| ≤ log |L|. Therefore, statement (i) is
a consequence of the inclusions L ≤ G ≤ Aut(G) ≤ Aut(L). The inclusions also
imply that | Aut(G)| ≤ n log n. Since the centralizer of G in Sym(G) is of order n
[16, Exercise 4.5’], we have
|K| ≤ |NSym(G) (G)| ≤ |CSym(G) (G)| · | Aut(G)| ≤ n2 log n.
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
7
On the other hand, the group G is 3-generated
[5]. Thus, the number of regular
subgroups of K isomorphic to G is at most K
3 and statement (ii) follows.
In the following statement, we use the classification of regular almost simple
subgroups of a primitive group [11, Theorem 1.4].
Lemma 3.2. Let G be an almost simple group and G∗ ≤ K ≤ Sym(G). Suppose
that K is primitive. Then one of the following holds:
(i) K ≥ Alt(G),
(ii) G = Soc(G) and K ≤ D(2, G),
(iii) G = Sym(5) and K = Sp8 (2) is 2-transitive.
Proof. Without loss of generality, we assume that neither K ≥ Alt(G), nor G =
Soc(G) and K ≤ D(2, G). Then by aforementioned classification, exactly one of
the following pairs (G, Soc(K)) occurs:
(a) (Alt(p2 − 2), Alt(p2 + 1)), where p = 3 (mod 4) is prime,
(b) (Sym(p − 2), Alt(p)) or (Sym(p − 2), Alt(p + 1)), where p ≥ 7 is prime,
(c) the twelve pairs in the table below.
N o.
G
Soc(K)
1
Alt(5) L2 (59)
2
Alt(7) Alt(11)
3
Alt(7) Alt(12)
4
Sym(5) Alt(9)
5
Sym(5) Sp4 (4)
6
Sym(5) Sp6 (2)
N o.
G
Soc(K)
7
Sym(5)
Ω+
8 (2)
8
Sym(5) Sp8 (2)
9
L2 (16).4 Sp6 (4)
10 L2 (16).4 Ω+
8 (4)
11
L3 (4).2
M23
12
L3 (4).2
M24
The assumption G∗ ≤ K, in particular, implies that |G|2 ≤ |K|. By straightforward
check this excludes cases (a) with p > 3, (b) with p > 7, and cases 11 and 12 from
the table. Similarly, the remaining cases in (a) and (b) as well as cases 1–4, and 9
are impossible because |G|2 must divide |K|.
In cases 5, 6, 7, and 10 from the table, we check the maximal subgroups of K and
show that none of them includes the subgroup isomorphic to G∗ . Indeed, in cases 5
and 6 none of the maximal subgroups contains Alt(5) × Alt(5) [2, Tables 8.14, 8.28,
8.29]. In case 10, information from [11, Table 2] shows that K is an extension of
Ω+
8 (4) by a field automorphism. This group contains the only (up-to conjugation)
maximal subgroup with section isomorphic to L2 (16) × L2 (16) [2, Table 8.50], but
the order of this subgroup is less than |G∗ |. In case 7, we make use of [11, Table 2]
to see that K = Ω+
8 (2). Again this group includes up to conjugation the only
maximal subgroup M with section isomorphic to Alt(5)×Alt(5) (see [2, Table 8.50]).
However, |M | = |G∗ | but M ≃ D(2, Alt(5)) is not isomorphic to G∗ ≃ Sym(5) ×
Sym(5).
This leaves us with case 8 of the table where Soc(K) = Sp8 (2) = K and we
arrive at case (iii) of the conclusion of the lemma.
8
ILIA PONOMARENKO AND ANDREY VASIL’EV
4. The structure of automorphism groups: the principal section
4.1. Preliminaries. Let G be a finite group. The automorphism group of every
central Cayley graph over G contains a subgroup G∗ (see Notation). In this section,
we establish some basic facts on the permutation groups K satisfying the following
condition:
(6)
G∗ ≤ K ≤ Sym(G),
where G is an almost simple group. We use a concept of the generalized wreath
product of permutation groups introduced and studied in [8]. Namely, a transitive
group K is the generalized wreath product if it has two imprimitivity systems L
and U such that every block of L is contained in a block of U and
Y
KL =
(KL )X .
X∈U
The generalized wreath product is said to be trivial if either L consists of singletons
or U = {Ω}. When L = U, the group K is permutation isomorphic to the wreath
product K X ≀ K L in imprimitive action, where X ∈ U.
Theorem 4.1. Let G be an almost simple group, and let K be a 2-closed group
satisfying condition (6). Then one of the following statements holds:
(i) K = Sym(G) or G∗ E K,
(ii) K is a nontrivial generalized wreath product.
The proof of Theorem 4.1 is given in the end of Section 6.
4.2. The minimal block. Let K satisfy condition (6) and X a K-block containing
the identity of G. Since K is a permutation group on G that includes Gright , the
block X is a subgroup of G [16, Theorem 24.12]. Taking into account that Glef t
also lies in K, we conclude that X is normal. Denote by L the intersection of all
non-singleton K-blocks containing the identity of the group G. Then L is a K-block
and we call it the minimal block of K.
Lemma 4.2. Let K satisfy condition (6) and L the minimal block of K. Then
L is normal subgroup of G including Soc(G). In particular, L is an almost simple
group such that Soc(L) = Soc(G).
Proof. According to the above remark, every K-block containing the identity of G is
a normal subgroup of G. If the block is not a singleton, then this normal subgroup
is nontrivial and hence contains Soc(G), because the group G is almost simple.
Thus, the minimal block L being the intersection of nontrivial normal subgroups
of G is a normal subgroup and contains Soc(G).
Denote by L the imprimitivity system containing L. Obviously,
Orb(L∗ , G) = L.
Recall that according to the definition, KL is a normal subgroup of K leaving each
block of L fixed (as a set), and given X ∈ L, the group (L∗ )X ≤ Sym(X) is induced
by right multiplications of L.
Lemma 4.3. For any X ∈ L, the group (KL )X is primitive and contains (L∗ )X .
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
9
Proof. The normality of L in G implies that the orbits of the action of L∗ on G
coincide with the L-cosets. It follows that the permutation group induced by this
action is contained in KL . This proves the second statement. To prove the first
statement, in view of the transitivity of K, we may assume that X = L.
Assume on the contrary that the group K ′ = (KL )L is not primitive. Then
there exists a minimal non-singleton K ′ -block L′ < L. Taking into account that
K ′ E K L , we conclude that L′′ = (L′ )k is a also K ′ -block for every k ∈ K [16,
Proposition 6.2]. The imprimitivity system L′ of the group K ′ that contains L′
coincides with the imprimitivity system containing L′′ , for otherwise by the minimality of L′ and Lemma 4.2 applied for the group K ′ , one can choose the block L′′
so that
1 = L′ ∩ L′′ ⊇ Soc(L) = Soc(G) ) 1,
a contradiction. Thus, L′ is an imprimitivity system of the group K L . Consequently, L′ is a non-singleton K-block strictly contained in L, which is impossible
by the definition of L.
4.3. The wreath decomposition of KL . For every two sets X, X ′ ∈ L, we write
X ∼ X ′ if the restriction epimorphisms
(7)
′
(KL )X∪X → (KL )X
′
and (KL )X∪X → (KL )X
′
′
are isomorphisms. In particular, the groups (KL )X and (KL )X are isomorphic. It
is easily seen that ∼ is an equivalence relation on L. This relation is K-invariant,
because KL is a normal subgroup of K. Denote by U the union of L-cosets belonging
to the class of ∼ that contains L. Then U is obviously a K-block and hence is a
normal subgroup of G. Thus,
L E U E G.
The imprimitivity system of the group K that contains the block U is denoted by U.
We say that U/L is the principal K-section of G, and U and L are the associated
partitions.
Theorem 4.4. Let G be an almost simple group, K a 2-closed group satisfying
condition (6), and U, L are the partitions associated with the principal K-section.
Then the coherent configuration Inv(KL ) is the direct sum of the coherent configurations Inv(KL )Y , where Y ∈ U. In particular,
Y
(8)
KL =
(KL )Y ,
Y ∈U
i.e., K is generalized wreath product.
Proof. The subgroup KL of 2-closed group K is 2-closed too (see Subsection 2.2).
Therefore, equality (8) follows from the first statement of the theorem, because the
automorphism group of the direct sum equals the direct product of the summands
(see Subsection 2.3). To prove the first statement, it suffices to verify that given
X, X ′ ∈ Orb(KL , G),
(9)
X 6∼ X ′
⇒
X × X ′ ∈ Orb(KL , X × X ′ ).
′
To this end, we note that the group (KL )X∪X is the subdirect product of the
′
transitive constituents M = (KL )X and M ′ = (KL )X . Therefore, there exist
10
ILIA PONOMARENKO AND ANDREY VASIL’EV
uniquely determined normal subgroups H and H ′ of M and M ′ , respectively, and
a group isomorphism ϕ : M/H → M ′ /H ′ such that
(10)
′
(KL )X∪X = {(k, k ′ ) ∈ M × M ′ : ϕ(k) = k ′ }.
Now if X 6∼ X ′ , then at least one of the epimorphisms (7) is not an isomorphism.
Therefore, one of the groups H and H ′ , say H, is nontrivial. It follows that H
being a normal subgroup of the primitive group M (Lemma 4.3) acts transitively
′
on X. By (10), this implies that (KL )X∪X contains the subgroup H × 1. Thus,
(x, x′ )H×1 = X × {x′ }
′
for all x′ ∈ X ′ and hence the group (KL )X∪X is transitive on the set X × X ′ .
5. The normalizer of Soc(G)∗ in Sym(G)
The goal of this section is to prove the following theorem that shows (as we will
see) that the case U = G is very similar to the case where the group K is primitive.
Theorem 5.1. Let G be an almost simple group, S = Soc(G), and N = NSym(G) (S ∗ ).
Then
(11)
N = D(2, G).
Clearly, N is a proper subgroup of Sym(G) and condition (6) is satisfied for
K = N . In particular, the minimal block of N coincides with S.
Lemma 5.2. In the above notation, CSym(G) (S ∗ ) = 1.
Proof. Set C = CSym(G) (S ∗ ). Then obviously, C = CN (S ∗ ). Since N is transitive
and C is normal in N , the orbits of C form an imprimitivity system of N . Denote
by X the block of this system that contains the identity of G. We may assume
that the block X is not a singleton, for otherwise C = 1 and we are done. Then
S ⊆ X, because S is the minimal N -block. Since C is transitive on X and S is a
block of C X , there exists c ∈ C such that S c = S and cS 6= 1. However, the latter
is impossible, because cS centralizes the subgroups Slef t and Sright .
Proof of Theorem 5.1. By Lemma 5.2, there exists a monomorphism from
N = NSym(G) (S ∗ ) to Aut(S ∗ ). Since the latter is isomorphic to the wreath product
W = Aut(S) ≀ Sym(2), this monomorphism induces a monomorphism
ϕ : N → W.
Clearly, ϕ can be chosen so that the subgroups Slef t and Sright of the group N
go to the subgroup Inn(S) × 1 of the group A = Aut(S) × 1 and to the subgroup
1 × Inn(S) of the group B = 1 × Aut(S), respectively. Set
W1 = im(ϕ)
and W0 = im(ϕ) ∩ (A × B).
Then since the index of A × B in W equals 2 and W1 is not contained in A × B,
we conclude that
(12)
|W1 : W0 | = 2.
Note that the centralizer of the group ϕ(Sright ) ≤ B in the group W0 is contained in
A, because the group B is almost simple with the socle ϕ(Sright ). Since the group
Glef t ≤ N centralizes Sright , this proves the first of the two following inclusions
(the second one can be proved in a similar way):
ϕ(Glef t ) ≤ A and ϕ(Gright ) ≤ B.
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
11
The first inclusion implies that ϕ(Glef t ) ≤ W0 ∩ A. The reverse inclusion follows from the fact that the centralizer of Glef t in Sym(G) is equal to Gright [16,
Proposition 4.3]. Thus, we obtain the equalities:
(13)
ϕ(Glef t ) = W0 ∩ A and ϕ(Gright ) = W0 ∩ B.
This immediately implies that ϕ(Glef t ) and ϕ(Gright ) are normal in W0 . This
group has trivial center and hence can be identified with a subgroup of the direct
product of the groups A′ = Aut(ϕ(Glef t )) and B ′ = Aut(ϕ(Gright )) (isomorphic to
Aut(G)). It follows that
′
′
′
W 0 = W0 /ϕ(G∗ ) ≤ A × B ,
′
where A = A′ /ϕ(Glef t ) and B = B ′ /ϕ(Gright ). Moreover in view of formulas (13),
′
′
the group W 0 intersects each of the groups A and B trivially. Therefore,
(14)
|W 0 | = | Aut(G)/G|.
Now, the inclusion ϕ(Aut(G)) ≤ W0 and formula (14) show that W0 = ϕ(Hol(G)).
Formula (12) yields that |N : Hol(G)| = 2. Since the permutation σ : g 7→ g −1 lies
in N , formula (11) holds.
6. Symmetric and normal types of the automorphism group
Let G be an almost simple group, K be a 2-closed group satisfying condition (6), and U/L the principal K-section of G. Then the group L is almost simple
(Lemma 4.2) and K L is primitive (Lemma 4.3). We say that K is of symmetric
type if either K L ≥ Alt(L), or G = Sym(5) and K = Sp8 (2) is 2-transitive; if
L = Soc(L) and K L ≤ D(2, L), the group K is said to be of normal type. The
following statement is a straightforward consequence of Lemma 3.2 and the above
definitions.
Proposition 6.1. Let G be an almost simple group, and let K ≤ Sym(G) be a
2-closed group containing G∗ . Then K is of symmetric or normal type.
Let us study a group of symmetric and normal types in detail. As the following
statement shows, any group of symmetric type is, in fact, the wreath product in
imprimitive action. In what follows, U and L are the partitions associated with the
principal K-section of G.
Theorem 6.2. Let K be a group of symmetric type. Then
L=U
and
(KL )L = Sym(L).
In particular, K is permutation isomorphic to the wreath product Sym(L) ≀ K L in
imprimitive action.
Proof. Let X, X ′ ∈ L and X ∼ X ′ . We claim that there exists a bijection f : X →
X ′ , for which
(15)
sf ∈ Orb(KL , X × X ′ ),
where sf = {(α, αf ) : α ∈ X} is the graph of f . Indeed, consider the group
′
M = (KL )X∪X . Since X ∼ X ′ , the group M acts faithfully on X and X ′ . As the
group K is of symmetric type, each of these actions is 2-transitive. However, M
has a unique faithful 2-transitive representation of degree d = |X|: this is obvious if
M ≥ Alt(d) and follows from the classification of 2-transitive groups if M = Sp8 (2)
12
ILIA PONOMARENKO AND ANDREY VASIL’EV
(see, e.g., [3, Table 7.4]). Consequently, among 2d point stabilizers Mβ , β ∈ X ∪X ′ ,
there are exactly d distinct, and also Mβ 6= Mγ whenever β and γ are distinct points
in X. Therefore, for every α ∈ X there is the only α′ ∈ X ′ such that
Mα = Mα′ = Mα,α′ .
Thus, the required bijection f takes α to α′ .
To prove that L = U, assume on the contrary that U contains a block X ∈ L
other than L. Denote by f : L → X the bijection defined in the above claim for
X = L and X ′ = X. Then by the assumption, the element f (1), where 1 is the
identity of the group G, does not belong to L. The binary relation sf is invariant
with respect to the group KL ≥ L∗ and hence for all x ∈ L,
(x, f (1)x) = (1, f (1))xr = (x, f (x)) = (1, f (1))xl = (x, xf (1)),
where xr and xl are the permutations of L∗ induced by the right and left multiplication by x. This implies that the element f (1) ∈ X ⊂ U centralizes L. However,
this is impossible, because f (1) 6= 1 and the group U is almost simple.
Let us prove the second equality. The 2-closedness of K implies that KL is
2-closed. Furthermore, in view of the 2-transitivity of the group (KL )X its the
2-closure equals Sym(X). By Theorem 4.4 and equality L = U, this implies that
Y
Y
Y
KL = (KL )(2) = (
(KL )X )(2) =
((KL )X )(2) =
Sym(X).
X∈L
X
Thus, (KL )
X∈L
= Sym(X) for all X ∈ L and we are done.
X∈L
U
Theorem 6.2 shows that in the case of symmetric type, the group K = Sym(U )
is the largest possible. In the normal type case, the group K U is quite small. More
exactly, the following statement holds.
Theorem 6.3. Let K be a group of normal type. Then K U ≤ D(2, U ).
Proof. By the hypothesis of the theorem, L = Soc(L) and K L ≤ D(2, L). By
Lemma 4.2, the first equality implies that L = Soc(G) and hence
(16)
L = Soc(U ).
The second inclusion implies that (L∗ )X is a characteristic subgroup of the group
(KL )X for all X ∈ L. By the definition of U , this implies that (L∗ )U is a characteristic subgroup of the group (KL )U . However, the latter group is normal in K U .
Thus,
(L∗ )U E K U .
It follows that K U is contained in the normalizer of (L∗ )U in Sym(U ). However,
this normalizer is contained in D(2, U ) by Theorem 5.1 applied for G = U with
taking into account equality (16).
Proof of Theorem 4.1. Let U/L be the principal K-section of the group G.
By Proposition 6.1, the group K is of symmetric or normal type. Suppose first that
U = G. Then statement (i) of Theorem 4.1 holds. Indeed, if K is of symmetric
type, then K = Sym(G) (Theorem 6.2), whereas if K is of normal type, then
K ≤ D(2, G) (Theorem 6.3) and the required statement follows from the fact that
G∗ is normal in D(2, G). Finally, if U < G, then statement (ii) of Theorem 4.1
holds by Theorem 4.4.
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
13
Proof of Theorem 1.3. First, assume that the group K = Aut(Γ) is a nontrivial generalized wreath product. Note that S = Soc(G) is a unique proper normal
subgroup in G and |G/S| = 2. Therefore the generalized wreath product must be a
usual one and the group K is permutation isomorphic to the wreath product M ≀ C2
in imprimitive action for some group M ≤ Sym(S). It follows that G \ S is an orbit
of the point stabilizer Kα , where α is the identity of G. Since X ⊂ G \ S is a union
of some orbits of Kα , we conclude that X = G \ S, a contradiction.
The group K is 2-closed as the automorphism group of a graph. The normality
of X implies that K satisfies condition (6) with G = Sym(m) for m ≥ 5. Finally, K
is not a nontrivial generalized wreath product by above, and K 6= Sym(G), because
the graph Γ is neither complete nor empty. Thus, by Theorem 4.1, the group G∗
is normal in K and
G∗ ≤ K ≤ D(2, G),
hence K = G∗ or K = D(2, G), because |D(2, G) : G∗ | = 2. However, since X is
a normal subset of a symmetric group, we have X = X −1 , so the graph Γ has the
automorphism σ : g 7→ g −1 , g ∈ G. Thus, K = hG∗ , σi = D(2, G), as required.
7. Finding the principal section in a Cayley scheme
7.1. The main resut. Let X be a central Cayley scheme over an almost simple
group G. Then the group K = Aut(X ) is 2-closed and satisfies condition (6).
Therefore, K is of symmetric or normal type by Proposition 6.1. In this section,
we develop an algorithmic technique to determine (with no K in hand) which of
these cases occurs for the scheme X . The main result here is Theorem 7.1 below
which immediately follows from Corollaries 7.3 and 7.5 proved in Subsections 7.2
and 7.3, respectively.
Theorem 7.1. Given a central Cayley scheme X over an almost simple group G
of order n, one can determine the type of K = Aut(X ) and find the principal
K-section of G in time poly(n).
7.2. The case of symmetric type. For a group H ≤ G, denote by H and
WL(X , H) the partition of G into the right H-cosets and the Cayley scheme WL(X , T )
with T = {1X : X ∈ H}, respectively. Recall that TX is the trivial coherent configuration on X. Denote by H0 the set of groups H such that Soc(G) ≤ H ≤ G
and
(17)
WL(X , H) = ⊞ TX .
X∈H
Lemma 7.2. In the above notation, the following statements hold:
(i) if the group K is of symmetric type, then the set H0 is nonempty and the
minimal block L of K is the largest (by inclusion) element of H0 ,
(ii) K is of symmetric type if and only if H0 contains S = Soc(G),
Proof. To prove statement (i), assume that the group K is of symmetric type. Set
U and L to be the partitions associated with the principal K-section of G. Then by
Theorem 6.2, we have L = U and Inv(K X ) = TX for all X ∈ L. By Theorem 4.4,
this implies that
(18)
Inv(KL ) = ⊞ TX .
X∈L
14
ILIA PONOMARENKO AND ANDREY VASIL’EV
The minimality of the direct sum implies that WL(X , L) = Inv(KL ), which proves
formula (17) for H = L and H = L, in particular, H0 is nonempty. If L is not the
largest element of H0 , then there exists H ∈ H0 such that H \ L 6= ∅. It follows
that
K ≥ Sym(H) × idG\H ,
where idG\H is the identity subgroup of Sym(G \ H). Hence there is a permutation
k ∈ K that moves the identity of G to H \ L and leaves all non-identity elements
of L fixed. But this is impossible, because L is a K-block.
To prove the necessity for statement (ii), let K be of symmetric type. Then
formula (18) holds. Therefore, if S is the partition of G into the cosets of S, then
S refines L and hence
WL(X , S) = WL(WL(X , L), S) = ⊞ WL(TX , SX ) = ⊞ TX ,
X∈L
X∈S
where SX is the partition of X induced by S. Consequently, S ∈ H0 . Conversely,
assume on the contrary that K is of normal type. Then K U ≤ D(2, U ) by Theorem 6.3. Therefore K S ≤ Hol(S). On the other hand, since S ∈ H0 , we have
Sym(S) = K S ≤ Hol(S), a contradiction.
From statement (i) of Lemma 3.1, it follows that the number of groups H ≤ G
containing Soc(G) is at most log n, where n is the order of G; in particular, |H0 | ≤
log n. Moreover, for each H, the coherent configuration WL(X , H) can be efficiently
found by the WL-algorithm and condition (17) can be verified by checking at most
|H|2 ≤ n2 basis relations. Therefore, the set H0 can be found in time poly(n). By
statement (ii) of Lemma 7.2, this is enough to test efficiently whether or not K is of
symmetric type, and if it so, then to find the minimal block L = U of the group K
(statement (i) of the same lemma).
Corollary 7.3. Given a central Cayley scheme X over an almost simple group G
of order n, one can test in time poly(n) whether the group Aut(X ) is of symmetric
type, and (if so) find the principal section of Aut(X ) within the same time.
7.3. The case of normal type. In view of Corollary 7.3 and Proposition 6.1,
one can efficiently test whether the automorphism group K of a central Cayley
scheme X is of normal type. Denote by H1 the set of all groups H such that
Soc(G) ≤ H E G and
(19)
H ∗ × idG\H ≤ K,
where the left-hand side denotes the subgroup of Sym(G) that leaves each point of
G \ H fixed and coincides with H ∗ on H.
Lemma 7.4. Suppose that the group K is of normal type and U/L is the principal
K-section of G. Then L = Soc(G), the set H1 is nonempty, and U is the smallest
element of H1 .
Proof. Lemma 3.2 yields that L = Soc(G). From Theorem 4.4, it is easily follows
that U ∈ H1 . Assume on the contrary that the group U is not the smallest in H1 .
Then there is a group V ∈ H1 such that L ≤ U ∩ V < U . Take a non-identity
element w ∈ U ∩V and denote by kU (respectively, kV ) the permutation on G acting
on U (respectively, V ) by right multiplication by w and acting trivially outside U
(respectively, V ). Then kU , kV ∈ K, the permutation
k = kU kV−1
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
15
is not identity on U , and U k = U and k U∩V = idU∩V . Clearly, k U belongs
to K U , and hence to D(2, U ) because K is of normal type. However, as is easily
seen, the identity element is the only element of D(2, U ) that leaves all points of
L ≤ U ∩ V fixed, a contradiction.
Again from statement (i) of Lemma 3.1 it follows that the number of groups H
such that Soc(G) ≤ H E G is at most log n, and so is |H1 |. For every H and each
k ∈ H ∗ × idG\H one can efficiently test whether k is an automorphism of X . Thus,
Lemma 7.4 immediately implies the following statement.
Corollary 7.5. Given a central Cayley scheme X over an almost simple group G
of order n, one can test in time poly(n) whether the group Aut(X ) is of normal
type, and (if so) find the principal section of Aut(X ) within the same time.
8. A majorant for the coset of isomorphisms
Throughout this section, we assume that X is a central Cayley scheme over
an almost simple group G and K = Aut(X ). The principal K-section of G and
the associated partitions are denoted by U/L and U and L, respectively. The
equivalence relations corresponding to the partitions U and L, are denoted by eU
and eL . Let ϕ be an algebraic isomorphism from X onto a Cayley scheme X ′ over
an almost simple group G′ . Assume that
(20)
ϕ(eU ) = eU′
and ϕ(eL ) = eL′ ,
′
where in what follows, the group K , the principal section U ′ /L′ , the partitions U′
and L′ , and the equivalence relations eU′ and eL′ are defined for the scheme X ′ in
a similar way.
Lemma 8.1. In the above notation, |U| = |U′ | and |L| = |L′ |. Moreover, the groups
K and K ′ either both of symmetric type, or both of normal type.
Proof. The first statement follows from assumption (20). To prove the second one,
we note that by Lemma 7.2 the group K is of symmetric type if and only if the
scheme X is isomorphic to the wreath product TU ≀ Y, where Y is the quotient of X
modulo the equivalence relation eL . Since algebraic isomorphisms respect wreath
products, we are done.
For all Y ∈ U and Y ′ ∈ U′ , the algebraic isomorphism ϕ induces an algebraic
isomorphism
ϕY ,Y ′ : XY → XY′ ′ ,
that takes a relation sY to the relation s′Y ′ for all basis relations s ⊆ eU of the
scheme X , where s′ = ϕ(s). It follows that if X ′ = X and ϕ is trivial, then ϕY,Y is
trivial for all Y ∈ U.
For each Y ∈ U, set
(
Sym(Y )
DY =
D(2, U Y ) ∩ Aut(XY )
if K is of symmetric type,
otherwise,
where, for brevity, U Y denotes the restriction of the permutation group Uright to
the set Y . Note that the form of the group DY does not depend on Y ∈ U, and
DY contains K Y for all Y (Theorems 6.2 and 6.3). Furthermore, if Z ∈ U, then
any permutation of G∗ taking Y to Z induces a permutation isomorphism from the
group DY onto the group DZ .
16
ILIA PONOMARENKO AND ANDREY VASIL’EV
Lemma 8.2. (DY )f = DY f for all Y ∈ U and all f ∈ Iso(X , X ′ , ϕ).
Proof. Without loss of generality, we may assume that both K and K ′ are of normal
types (Lemma 8.1). Let Y ∈ U and f ∈ Iso(X , X ′ , ϕ). Then in view of (20),
Aut(XY )f = Aut(XY′ ′ ),
(21)
where Y ′ = Y f . Thus, it suffices to verify that D(2, V )f = D(2, V ′ ), where V = U Y
′
and V ′ = (U ′ )Y . However, by the definition of U, we have V = U g for suitable
g ∈ G and
D(2, V ) = D(2, U gr ),
where gr : U → V is the bijection induced by right multiplication by g. A similar
statement holds for V ′ , U ′ , and a suitable bijection (g ′ )r . Therefore, without loss
of generality, we may assume that Y = U and Y ′ = U ′ .
Recall that U is an almost simple group with Soc(U ) = L, and also U ∗ ≤ K U .
Therefore, Soc(K U ) = L∗ . The same is true with K, U , and L, replaced by K ′ , U ′ ,
′
and L′ , respectively. Taking into account that f takes K U to (K ′ )U , we conclude
that
(L∗ )f = (L′ )∗ .
This implies that f takes the normalizer of the group L∗ ≤ Sym(U ) to the normalizer of the group (L′ )∗ ≤ Sym(U ′ ). However by Theorem 5.1, these normalizers
are equal to D(2, U ) and D(2, U ′ ). Thus, f takes the first of these groups to the
second, and we are done.
Definition 8.3. Denote by Cϕ (X , X ′ ) the set of all bijections f : G → G′ taking
U to U′ and satisfying the following conditions for every Y ∈ U:
(22)
f Y ∈ Iso(XY , XY′ f , ϕY ,Y f )
and
(DY )f = DY f .
Let us find the explicit form of the set C = Cϕ (X , X ′ ) when X = X ′ and ϕ = id.
In this case, C is obviously a subgroup of Sym(G) preserving the partition U.
Condition (22) means that f Y belongs to the intersection of Aut(XY ) and the
normalizer of DY in Sym(Y ) for all f ∈ CU . This proves the first of the equalities
Y
DY = CU and C U = Sym(U);
Y ∈U
the second equality follows from the fact that any g ∈ G induces the permutation
isomorphism from DY onto DY g that induces ϕY ,Y g . Thus, the group C is permutation isomorphic to the wreath product DU ≀ Sym(U) (in imprimitive action). For
arbitrary X ′ and ϕ, an for each f ∈ Cϕ (X , X ′ ), we obviously have
(23)
Cϕ (X , X ′ ) = Cid (X , X )f.
Thus if the set Cϕ (X , X ′ ) is not empty, then it can be given by a generator set
of the group C = Cid (X , X ) and the bijection f . In the sense of the following
statement, the set Cϕ (X , X ′ ) can be called a majorant of Iso(X , X ′ , ϕ).
Theorem 8.4. Iso(X , X ′ , ϕ) ⊆ Cϕ (X , X ′ ). Moreover, the set Cϕ (X , X ′ ) can be
found in time poly(n).
Proof. The first statement immediately follows from Lemma 8.2. To prove the
second one, it suffices to find the set
C0 = {f0 ∈ Isoψ (XU , XU′ ′ ) : (DU )f0 = DU ′ },
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
17
where ψ = ϕU ,U ′ . Indeed, if this set is empty, then obviously so is the majorant
Cϕ (X , X ′ ). On the other hand, if f0 ∈ C0 , then to construct the majorant given
by formula (23) it suffices to find DU and the bijection f defined as follows:
f Y = (gY )−1 f0 gY′ ′ ,
Y ∈ U,
′
where Y 7→ Y is an arbitrary bijection from U onto U′ taking U to U ′ , and the
bijections gY : U → Y and gY′ ′ : U ′ → Y ′ are induced by the right multiplications
by the elements g ∈ G and g ′ ∈ G′ such that Y = U g and Y ′ = U ′ g ′ .
To find the sets DU and C0 , assume first that K is of symmetric type (recall that
this can efficiently checked by Theorem 7.1). Then the coherent configurations XU
and XU′ ′ are trivial. Thus, DU = Sym(U ) and for any bijection f0 : U → U ′ ,
C0 = Sym(U )f0 .
Let now K be of normal type. Then DU ≤ D(2, U ) and DU ′ ≤ D(2, U ′ ). In
particular, DU = D(2, U ) ∩ Aut(XU ) can be found in time poly(n). Furthermore,
every element f0 ∈ C0 takes DU to DU ′ (Lemma 8.2), and induces a permutation
group isomorphism from Uright onto a group
V ′ ∈ Reg(DU ′ , U ′ ).
By statement (ii) of Lemma 3.1, the set Reg(DU ′ , U ′ ) is of cardinality at most
|U ′ |c ≤ nc for some constant c > 0, and all its elements can be found by exhaustive
search of all 3-generated subgroups of the group DU ′ . Since for a fixed V ′ , there
are at most | Aut(V ′ )| ≤ nc distinct elements f0 ∈ C0 taking Uright to V ′ , one can
test in time poly(n), whether the set C0 is not empty and (if so) find it in the form
C0 = DU f0
with arbitrary f0 ∈ C0 .
9. Proof of Theorem 1.1
9.1. Reduction to Cayley schemes. Let Γ be a central Cayley graph over an
almost simple group G, {ei : i ∈ I} the set of color classes of Γ, and K = Aut(Γ).
The principal K-section of G and the associated partitions are denoted by U/L and
U and L, respectively. Set
X = WL(Γ, {eU , eL }),
where eU and eL are the equivalence relations corresponding to the partitions U
and L. For other central Cayley graphs Γ′ , we use similar notation, e.g., G′ and K ′
denote the underlying group and the automorphism group of Γ′ , respectively.
Lemma 9.1. Given central Cayley graphs Γ and Γ′ over almost simple groups G
and G′ , respectively, one can construct in time poly(n) the Cayley schemes X
and X ′ over the same underlying groups and check whether there exists a (unique)
algebraic isomorphism ϕ : X → X ′ such that
(24)
ϕ(ei ) = e′i for all i ∈ I
and
ϕ(eU ) = eU′ , ϕ(eL ) = eL′ ,
and (if so) find ϕ within the same time. Moreover, K = Aut(X ), K ′ = Aut(X ′ ),
and also
(25)
Iso(Γ, Γ′ ) = Iso(X , X ′ , ϕ).
18
ILIA PONOMARENKO AND ANDREY VASIL’EV
Proof. By Theorem 7.1, the principal sections and hence the equivalence relations
eU , eL and eU′ , eL′ can be found in time poly(n). Therefore the first part of the
statement immediately follows from Theorem 2.1. To prove the second one, we
observe that every f ∈ Iso(Γ, Γ′ ) takes the group K to the group K ′ . By the
definition of the minimal block (Subsection 4.2) this implies that f takes eL to
eL′ and hence takes eU to eU′ . Thus, the isomorphism f induces ϕ. This means
that f ∈ Iso(X , X ′ , ϕ) and hence the left-hand side of (25) is contained in the
right-hand side. Since the reverse inclusion is obvious, equality (25) is completely
proved. Next, if Γ′ = Γ, then ϕ = id and equality (25) shows that K = Aut(X ).
Similarly, K ′ = Aut(X ′ ).
9.2. Determining the coset of isomorphisms. Denote by π the canonical epimorphism from G onto G = G/L = L. Then π induces a map taking the set S of
basis relations of the Cayley scheme X over G to the set S of basis relations of the
∪
quotient Cayley scheme X over G. In particular, π takes S ∪ to S . Set Γ to be the
Cayley graph over G with color classes π(ei ), i ∈ I. For any set C of the bijections
f : G → G′ taking eU to eU′ and eL to eL′ , we denote by C the set of bijections
′
f : G → G induced by f ∈ C.
Theorem 9.2. Let Γ and Γ′ be central Cayley graphs over almost simple groups G
and G′ , respectively. Assume that the algebraic isomorphism ϕ from Theorem 9.1
does exist. Then
Iso(Γ, Γ′ ) = π −1 (C ∩ B),
(26)
′
where B = Iso(Γ, Γ ), C = Cϕ (X , X ′ ), and the right-hand side consists of all f ∈ C
for which f ∈ B.
Proof. To prove that that the left-hand side of (26) is contained in the right-hand
side, let f ∈ Iso(Γ, Γ′ ). Then the uniqueness of the principal sections implies that
(eU )f = eU′
and (eL )f = eL′ .
Therefore, the isomorphism f induces the algebraic isomorphism ϕ. By Theo′
rem 8.4, this implies that f ∈ C. Consequently, the induced bijection f : G → G
belongs to the set C. Since obviously f ∈ B, we conclude that f belongs to the
right-hand side of (26), as required.
Conversely, let f belong to the right-hand side of (26). By formula (25) in
Lemma 9.1, it suffices to verify that f induces ϕ. To this end, let s ∈ S. Assume
first that s ⊆ eU . Then s equals the union of sY , Y ∈ U. Therefore since f ∈ C,
conditions (22) are satisfied for all Y and hence
[
[
[
sf = (
sY )f =
(sY )f =
ϕY,Y f (sY ) = ϕ(s).
Y ∈U
Y ∈U
Y ∈U
Now assume that s is outside the equivalence relation eU . Let us prove that
[
[
X ×Y
and
sf =
(27)
s=
X ′ × Y ′,
X,Y ∈L,
(X,Y )∈s
X ′ ,Y ′ ∈L′ ,
(X ′ ,Y ′ )∈s′
where s = π(s) and s′ = π ′ (sf ). Since (eU )f = eU′ , the relation sf is outside the
equivalence relation eU′ . Therefore, it suffices to verify the first equality of (27);
denote the right-hand side of this equality by t. Clearly, s ⊆ t. Conversely, let
TESTING ISOMORPHISM OF CENTRAL CAYLEY GRAPHS
19
(X, Y ) ∈ t for some (X, Y ) ∈ s. Since s is outside eU , we conclude that X × Y
is a basis relation of the coherent configuration Inv(KL ) (Theorem 4.4). Since
Inv(KL ) ≥ X , it follows that this basis relation is contained in a basis relation of
X which equals s, because (X, Y ) ∈ s. Therefore, t ⊆ s. This completes the proof
of (27) implying s = π −1 (s) and sf = (π ′ )−1 (s′ ).
On the other hand, the graph isomorphism f ∈ B ∩ C induces an algebraic
′
isomorphism ϕ : X → X that coincides with the restriction of the algebraic isomorphism ϕ modulo eL . Thus,
ϕ(s) = ϕ(π −1 (s)) = (π ′ )−1 (ϕ(s)) = (π ′ )−1 ((s)f ) = (π ′ )−1 (s′ ) = sf ,
as required.
9.3. The algorithm. In the algorithm below, the input is given by two central
Cayley graphs Γ and Γ′ over almost simple groups G and G′ , respectively. It is
assumed that these groups are presented by the multiplication tables. The output
consists of the set Iso(Γ, Γ′ ), which is either empty or equals the set Aut(Γ)f for
some f ∈ Iso(Γ, Γ′ ). Here, the group Aut(Γ) is presented by a generating set.
Central Cayley graph isomorphism test
Step 1. Find the principal sections of the automorphism groups of the (central
Cayley) schemes WL(Γ) and WL(Γ′ ) (Theorem 7.1); denote by U, L and U′ , L′ the
associated partitions of G and G′ , respectively.
Step 2. Find the schemes X = WL(Γ, {eU , eL }) and X ′ = WL(Γ′ , {eU′ , eL′ }) and
the algebraic isomorphism ϕ satisfying condition (24); if ϕ does not exist, output
Iso(Γ, Γ′ ) = ∅.
Step 3. Find the set C = Cϕ (X , X ′ ) (Theorem 8.4).
Step 4. Using the graph isomorphism and coset intersection algorithms from [1],
′
find the set B = Iso(Γ, Γ ) and then the set B ′ = B ∩ C.
Step 5. Output Iso(Γ, Γ′ ) = π −1 (B ′ ).
To complete the proof of Theorem 1.1, we show that the above algorithm correctly finds the set Iso(Γ, Γ′ ) in time poly(n). Note that every graph isomorphism
f ∈ Iso(Γ, Γ′ ) induces an algebraic isomorphism ϕ satisfying condition (24). Therefore, the output at Step 2 is correct. Thus, the correctness of the output at Step 5
and hence of the algorithm immediately follows from Theorem 9.2.
To estimate the running time, we note that all the steps except for Step 4 run in
polynomial time (Theorem 7.1, Lemma 9.1, and Theorem 8.4). Furthermore, the
graph isomorphism and coset intersection algorithms from [1] are applied at Step 4
to graphs with m = |L| vertices and to the cosets contained in√Sym(m), respectively.
Each of these algorithms runs in time at most exp((log m)c m). Since m ≤ log n,
the complexity of this step does not exceed
√
exp((log m)c m) ≤ exp((log log n)c (log n)1/2 ) ≤ exp(log n) ≤ n
for sufficiently large n and a suitable constant c > 0. Thus, the running time of the
algorithm is polynomial in n, as required.
20
ILIA PONOMARENKO AND ANDREY VASIL’EV
References
[1] L. Babai, W. Kantor, and E. M. Luks, “Computational complexity and the classification of
finite simple groups,” in: Proceedings of the 24th Ann. Symp. Found. Comput. Sci (1983),
pp. 162–171.
[2] J. Bray, J. Holt, and D. Roney-Dougal, The Maximal Subgroups of the Low-Dimensional
Finite Classical Groups, Cambridge University Press, Cambridge (2013).
[3] P. J. Cameron, Permutation Groups, Cambridge University Press (1999).
[4] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker, and R. A. Wilson, An ATLAS of
Finite Groups, Oxford University Press, Oxford (1985).
[5] F. Dalla Volta and A. Lucchini, “Generation of almost simple groups,” J. Algebra, 178, No. 1,
194–223 (1995).
[6] S. Evdokimov and I. Ponomarenko, “Recognizing and isomorphism testing circulant graphs
in polynomial time,” Algebra Analiz, 15, No. 6, 1–34 (2003).
[7] S. Evdokimov and I. Ponomarenko, “Permutation group approach to association schemes,”
Eur. J. Combin., 30,1456–1476 (2009).
[8] S. Evdokimov and I. Ponomarenko, “Schurity of S-rings over a cyclic group and generalized
wreath product of permutation groups,” Algebra Analiz, 24, No. 3, 84–127 (2012).
[9] A. Ganesan, “Automorphism group of the complete transposition graph,” J. Algebr. Combin.,
42, No. 3, 793–801 (2015).
[10] C. H. Li, “On isomorphisms of finite Cayley graphs – a survey,” Discrete Math., 256, 301-334
(2002).
[11] M. W. Liebeck, Ch. E. Praeger, and J. Saxl, “Regular subgroups of primitive permutation
groups,” Memoirs Amer. Math. Soc., 203, No. 952, 1–88 (2010).
[12] E. M. Luks, “Isomorphism of graphs of bounded valence can be tested in polynomial time,”
J. Comp. Sys. Sci., 25, 42–65 (1982).
[13] M. Muzychuk, “A solution of the isomorphism problem for circulant graphs,” Proc. London
Math. Soc., 88, 1–41 (2004).
[14] I. Ponomarenko, “Bases of schurian antisymmetric coherent configurations and isomorphism
test for schurian tournaments,” J. Math. Sci., 192, No. 3, 316–338 (2013).
[15] B. Weisfeiler (editor), On Construction and Identification of Graphs, Lecture Notes Math.,
558 (1976).
[16] H. Wielandt, Finite Permutation Groups, Academic press, New York - London (1964).
[17] H. Wielandt Permutation Groups Through Invariant Relations and Invariant Functions,
Lect. Notes Dept. Math. Ohio St. Univ., Columbus (1969).
St.Petersburg Department of the Steklov Mathematical Institute, St.Petersburg,
Russia
E-mail address: inp@pdmi.ras.ru
Sobolev Institute of Mathematics, Novosibirsk, Russia
Novosibirsk State University, Novosibirsk, Russia
E-mail address: vasand@math.nsc.ru
| 4math.GR
|
Extending LTE into the Unlicensed Spectrum:
Technical Analysis of the Proposed Variants
Mina Labib*, Vuk Marojevic*, Jeffrey H. Reed*, Amir I. Zaghloul*†
*Virginia Tech, Blacksburg, VA, USA
arXiv:1709.04458v1 [cs.NI] 13 Sep 2017
†
US Army Research Laboratory, Adelphi, MD, USA
Abstract
The commercial success of the Long Term Evolution (LTE) and the resulting growth in mobile data
demand have urged cellular network operators to strive for new innovations. LTE in unlicensed spectrum
has been proposed to allow cellular network operators to offload some of their data traffic by accessing
the unlicensed 5 GHz frequency band. Currently, there are three proposed variants for LTE operation
in the unlicensed band, namely LTE-U, Licensed Spectrum Access (LAA), and MulteFire. This paper
provides a comparative analysis of these variants and explains the current regulations of the 5 GHz band
in different parts of the world. We present the technical details of the three proposed versions and analyze
them in terms of their operational features and coexistence capabilities to provide an R&D perspective
for their deployment and coexistence with legacy systems.
Index Terms
Long Term Evolution (LTE), LTE-Advanced, LTE-U, LAA, MulteFire, Spectrum sharing, Wi-Fi.
I. I NTRODUCTION
The demand in mobile traffic has been growing tremendously since the introduction of smartphones
in 2007. Since then, cellular network operators have been looking for new technologies to meet the
demand. At that time, the 4G Long Term Evolution (LTE) standard had almost been completed by the
3rd Generation Partnership Project (3GPP). LTE specifications were finalized by the 3GPP in March
2009 (3GPP Rel-8). Cellular network operators quickly deployed LTE, starting in December 2009 by
the Swedish-Finnish operator (TeliaSonera), as the enabling technology to meet the demand for more
wireless data. True to its namesake, LTE has been able to keep pace with the growing demand for
capacity through several added features and modifications. 3GPP Rel-10 for LTE-Advanced (LTE-A)
was finalized in June 2011 and fully meets the 4G system requirements. LTE-A includes features such
1
as carrier aggregation (CA), which allows mobile operators to aggregate several frequency chunks into a
larger bandwidth. In October 2015, the 3GPP announced the plan to further evolve LTE for paving the
path towards 5G through LTE-Advanced Pro (LTE-A Pro). LTE-A Pro refers to LTE enhanced with the
new features included in the 3GPP specifications starting from Rel-13 (which was finalized in March
2016), Rel-14 (which was released in January 2017 and expected to be finalized before September 2017),
and onwards.
One of the salient features of LTE-A Pro is extending LTE into the 5 GHz unlicensed spectrum,
comprising the frequency range between 5150 MHz and 5925 MHz. The 5 GHz band, which is also
known as the U-NII (Unlicensed National Information Infrastructure) band, is currently utilized by various
radar systems, in addition to Wireless Local Area Networks (WLAN), specifically the ones that are based
on IEEE 801.11a/g/n/ac technologies, which are also referred to as Wi-Fi systems.
Currently, there are three proposed variants of LTE in unlicensed bands [1]. The first is called LTEU and is developed by the LTE-U Forum to work with the existing 3GPP Releases 10/11/12. LTE-U
was designed for quick launch in countries, such as the United States and China, that do not mandate
implementing the listen-before-talk (LBT) technique. The second variant is Licensed Assisted Access
(LAA) and has been standardized by the 3GPP in Rel-13. LAA adheres to the requirements of the LBT
protocol, which is mandated in Europe and Japan. It promises to provide a unified global framework that
complies with the regulatory requirements in the different regions of the world. Both variants, LTE-U and
LAA, use licensed spectrum as the primary carrier for signaling (control channels) and to deliver data
for users with high Quality-of-Service (QoS) requirements. Carrier aggregation is used to add secondary
component carriers in the unlicensed spectrum to deliver data to users with best-effort QoS requirements.
MulteFire is the third variant of LTE in unlicensed bands and has been proposed as a standalone version
of LTE for small cells. This variant will use only the unlicensed spectrum as the primary and only carrier,
and it will provide an opportunity for neutral hosts to deploy LTE in the future.
As opposed to other survey papers on this topic, such as [2] and [3], this paper identifies the motivation
for introducing different modes of LTE operation in the unlicensed spectrum, analyzes them with respect
to regulations and coexistence capabilities, and identifies research issues and the way forward. The rest
of the paper is organized as follows: Section II summarizes the current regulations for the unlicensed
5GHz band in the different parts of the world as the basis for our analysis. Section III provides a general
overview of extending LTE into the unlicensed spectrum in terms of potentials and challenges. Sections
IV-VI discuss the technical details of each of the proposed variants of LTE for unlicensed band operation.
We present numerical results in Section VII, comparing the performance of the three variants in terms
2
of coexistence with Wi-Fi. Section VIII provides the conclusions and an R&D perspective on future
deployment and coexistence of radios in unlicensed spectrum.
II. R EGULATIONS IN THE 5 GH Z BAND
The regulatory requirements to access the spectrum are different in every region in the world, and the
same applies for the 5 GHz band. In general, there are several compliance rules that have been defined
around the world for regulating the use of the unlicensed spectrum. These rules can be summarized as
follows:
•
Limitations of the maximum transmission power and the maximum power spectrum density (PSD).
•
Use indoor only or use both indoor and outdoor.
•
Dynamic Frequency Selection (DFS).
•
Listen-Before-Talk (LBT).
•
Transmission Power Control (TPC).
DFS is a mechanism that is specifically designed to avoid causing interference to non-IMT (International Mobile Telecommunications) systems, such as radars. According to the Federal Communications
Commission (FCC) regulations in the United States, any device (working in certain sub-bands of the
5 GHz band) must sense the channel before using it, and sense it periodically to ensure there is no
radar system using this channel. If a radar signal is detected, i.e. the received power levels is above a
certain threshold, the operating channel must be vacated. The device must not utilize that channel for the
non-occupancy period of thirty minutes [4].
LBT is a mechanism introduced for fair co-existence with other wireless communication systems (such
as Wi-Fi). In Europe and Japan, there is a mandatory requirement to implement LBT when accessing
the unlicensed spectrum. According to the European Telecommunications Standards Institute (ETSI), and
based on the Load Based Equipment rules, any device that wants to access the unlicensed spectrum,
needs to perform Clear Channel Assessment (CCA) beforehand, which translates to spectrum sensing
for certain period (called CCA period and it is greater than 20 µs). If the detected energy is lower than
a certain threshold (which equals -73 dBm/MHz for the case of a transmitter with an EIRP of 23 dBm
and assuming receiver antenna gain of 0), the device can access the channel for a period called channel
occupancy time (which should be less than
13
32 q,
where q is selected by the manufacturer and it is in the
range 4-32). Then the device has to stay idle for a minimum period of CCA multiplied by a number that
is randomly selected between 1 and q [5].
3
Table I captures the regulatory requirements in the major regions of the world [5]. The maximum
transmission power in every sub-band is limited by regulatory requirements, which motivates designing
the LTE in unlicensed bands for the small cell network deployment.
III. B ENEFITS AND C HALLENGES OF LTE IN U NLICENSED BANDS
Extending the use of LTE in the 5-GHz unlicensed band can achieve several benefits compared to
Wi-Fi. The benefits can be summarized as [2]:
•
Better spectrum efficiency: LTE is using scheduled-based channel access compared to the contentionbased scheme used by Wi-Fi. That leads to offering more efficient multiuser channel access and
improves improve system capacity. Recent simulation results have shown that both LTE-U and LAA
can achieve twice the capacity offered by Wi-Fi [1].
•
Larger coverage area: LTE uses the more effective 1/3 turbo coding to overcome low SINR, has a
more robust control channel design, and implements the HARQ (Hybrid Automatic Repeat Request)
protocol, which makes it more robust to interference.
•
Unified LTE network: Operators will be able to use a single platform for authentication, registration
and management.
•
Security: LTE offers more security than Wi-Fi due to the enhanced authentication procedures.
•
Better user experience: LTE offers good mobility management (which is not well supported in WiFi), so user will experience less service interruptions during mobility. Furthermore, the switch from
using LTE in the licensed bands to the unlicensed one will be transparent to the users.
However, LTE faces several challenges if it is extended into the 5 GHz unlicensed band in terms
of coexistence with both radar and Wi-Fi systems. Wi-Fi systems are widely deployed in the 5 GHz
band, and it is crucial that LTE in unlicensed bands does not cause degradation of Wi-Fi performance.
Wi-Fi was designed to operate in the unlicensed spectrum and employs Carrier Sense Multiple Access
with Collision Avoidance (CSMA/CA) to access the channel and to ensure fair coexistence with other
technologies.
Recently, the coexistence between LTE and Wi-Fi in unlicensed bands has become an important area
of research, from both industry and academia. The authors in [6] have conducted system-level analysis to
evaluate the performance of both LTE and Wi-Fi when working in the same band. They concluded that,
if no modifications were done to LTE, the performance of Wi-Fi may be severely degraded, while the
performance of LTE would remain almost unchanged. The authors in [7] suggest using the almost-blank
subframe (ABS) feature, which was introduced in LTE Rel-10, to improve the coexistence between LTE
4
TABLE I
R EGULATORY REQUIREMENTS IN D IFFERENT W ORLD R EGIONS .
5150-5250 MHz
5250-5350 MHz
53505470
5470-5725 MHz
5725-5850 MHz
5850-5925 MHz
WAS/RLAN
FWA (Allowing
WAS is under
ITS
(Allowing
WAS is under
Indoor/Outdoor,
TPC (max EIRP
is
30
dBm,
max PSD is
consideration)
Indoor/Outdoor,
TPC (max EIRP
is
33
dBm,
max PSD is
consideration) (1)
Indoor/Outdoor,
TPC (max EIRP
is 36 dBm), DFS
(none for 5850-
17 dBm/MHz),
DFS, LBT
23 dBm/MHz),
DFS, No LBT
5875
LBT
U-NII-2C
U-NII-3
Indoor/Outdoor,
max Tx Power
is 30 dBm, max
PSD is 30 dBm
U-NII-4
MHz
Usage
WAS/RLAN
WAS/RLAN
Under
consideration
Europe
Rules
Indoor only, max
Tx Power is 23
dBm, max PSD
is 10 dBm/MHz,
No TPC,
DFS, LBT
Usage
USA
Rules
No
U-NII-1
Indoor/Outdoor,
max Tx Power
is
30
dBm,
max PSD is 17
dBm/MHz, No
TPC, No DFS,
No LBT
Usage
Canada
(mx EIRP is 23
dBm, max PSD
is 10 dBm/MHz),
DFS, LBT
U-NII-2A
Indoor/Outdoor,
max Tx Power
is
24
dBm,
max PSD is 11
dBm/MHz, TPC,
DFS, No LBT
U-NII-2B
(Under
consideration)
Indoor/Outdoor,
max Tx Power
is
24
dBm,
max PSD is 11
dBm/Mhz, TPC,
DFS, No LBT
(2)
in 500 KHz, No
TPC, No DFS,
No LBT
RLAN
RLAN
RLAN
Indoor only, max
EIRP 200 mW,
max PSD is 4
dBm/MHz, No
Indoor/Outdoor,
max Tx Power
is
24
dBm,
max PSD is 11
Indoor/Outdoor,
max Tx Power
is
24
dBm,
max PSD is 11
TPC, No DFS,
No LBT
dBm/MHz, TPC,
DFS, No LBT
dBm/MHz, TPC,
DFS, No LBT
Usage
RLAN
RLAN
RLAN
RLAN
Rules
Indoor only, max
EIRP 200 mW,
max EIRP PSD is
10 mW/MHz, no
DFS
Indoor only, max
EIRP 200 mW,
max EIRP PSD
is 10 mW/MHz,
DFS
Indoor/Outdoor,
max Tx power
is 250 mW, max
EIRP PSD is 50
mW/MHz, DFS
Indoor/Outdoor,
max Tx power is
1W
Usage
WAS/RLANs
WAS/RLANs
Rules
Indoor only, max
EIRP 200 mW,
max EIRP PSD
is 10 dBm/MHz,
TPC, DFS, no
LBT
Indoor only, max
EIRP 200 mW,
max EIRP PSD
is 10 dBm/MHz,
TPC, DFS, no
LBT
RLAN
Indoor
only,
max Tx power
depends on BW,
no TPC, no DFS,
LBT
RLAN
RLAN
Indoor
only,
max Tx power
Indoo/Outdoor,
max Tx power
Rules
Brazil
China
Usage
Japan
Indoor only, TPC
Rules
depends on BW,
TPC, DFS, LBT
N/A
N/A
(Under consideration)
RLAN
Indoor/Outdoor,
max Tx Power
is
30
dBm,
max PSD is 17
dBm/MHz, No
TPC, No DFS,
No LBT
N/A
N/A
RLAN
N/A
N/A
Under Consideration
depends on BW,
TPC, DFS, LBT
Rules
not
formally issued
N/A
N/A
N/A
(1) In Europe, FWA is utilizing the 5725-5875 MHz range, and ITS is utilizing the 5855-5925 MHz range.
(2) In Canada, RLAN is forbidden in the frequency range 5600-5650 MHz.
Abbreviations:
WAS: Wireless Access Systems, RLAN: Radio Local Area Networks, FWA: Fixed Wireless Access,
U-NII: Unlicensed National Information Infrastructure.
MHz),
5
and Wi-Fi technologies. ABS is a feature that allows the LTE base station (eNodeB) to transmit subframes
that contain only the basic system information messages, and it is used for better coordination between
macro-cells and small-cells. It can be considered as a sort of static muting mechanism. The authors in
[8] show that a simple LBT algorithm will provide better coexistence performance than the static muting
algorithm. Reference [3] surveys the coexistence mechanisms proposed for LTE and Wi-Fi systems in
unlicensed bands.
IV. LTE-U
LTE-U is developed by the LTE-U Forum, which was formed in 2014 by Verizon, Alcatel-Lucent,
Ericsson, Qualcomm Technologies Inc., and Samsung Electronics. The goal of LTE-U is to use the existing
features in the latest LTE 3GPP specifications and adapt them to unlicensed operation in countries, such
as the US and China, that do not mandate LBT. LTE-U supports supplemental downlink (SDL) only
within the frequency bands 5150-5250 MHz and 5725-5850 MHZ, whereas the frequency bands 52505725 MHz has been reserved for future use. The last set of specifications for LTE-U (issued in October
2015) provides general technical guidelines and benchmarks for testing scenarios, but does not specify
certain implementation mechanisms [9].
LTE-U specifications were designed for the case when a single eNodeB has access to licensed spectrum
(called Primary Cell or PC) and unlicensed spectrum (called Secondary Cell or SC). Without modifying
the 3GPP LTE specifications, there are several mechanisms that are used for LTE-U to better coexist
with Wi-Fi [1], such as carrier selection, on-off switching, and Carrier-Sensing Adaptive Transmission
(CSAT).
A. Carrier Selection
The eNodeB performs carrier selection at startup, periodically and based on performance triggers.
Carrier selection implies scanning the spectrum and measuring the power level in each channel to find
the channel that is free of interference. If all channels are occupied by other systems, the eNodeB choses
the channel with the lowest detected signal power level. The eNodeB will continue monitoring channel
activities and select a more suitable channel when available. Carrier selection algorithm was left to be
implementation specific.
B. On-Off Switching
When the traffic demand is low, the small cell eNodeB can stop transmitting in the unlicensed spectrum
and relies only on the licensed spectrum. Doing this will reduce the amount of interference to Wi-Fi
6
users. LTE-U specifications define two states for the LTE-U SC [10]:
•
Off-State: The SC stops any type of transmission.
•
On-States: The SC is either transmitting full LTE frames according to the 3GPP specifications
or transmitting the LTE-U Discovery Signal (LDS). The LDS is transmitted by the SC at a certain
subframe (subframe number 5) and with fixed time intervals defined by the LDS periodicity parameter
(which can be either 40, 80, or 160 ms). LDS contains the physical signals and channels required
for the LTE User Equipment (UE) to obtain time and frequency synchronization and to perform SC
measurements.
C. Carrier-Sensing Adaptive Transmission
CSAT is a mechanism that allows the eNodeB to share the spectrum with other systems using the same
channel in a Time Division Multiplex (TDM) manner. Qualcomm proposed CSAT as a spectrum sharing
technique to be used with LTE-U [1]. CSAT, in concept, is a sort of adaptive muting algorithm, where
the eNodeB initially and periodically senses the channel for relatively long time periods (anywhere in
the rage between 0.5 and 200 ms). As a function of the channel activity and detection of Wi-Fi signals
above the energy threshold level (which is -62 dBm), SC will adjust its duty cycle and define a time
cycle for transmission. Since Wi-Fi stations use carrier sensing, they will be able to adjust their own
transmissions in the periods when the duty cycle of LTE-U SC is off. The CSAT duty cycle can change
over time based on channel usage, but the constraint values are [10]:
•
Minimum Off-State Period: 1 ms.
•
Maximum Off-State Period: Determined by the LDCS periodicity, which can be either 40, 80, or
160 ms.
•
Minimum On-State Period: 4 ms in case of available user data and 1 ms (LDS period), otherwise..
•
Maximum On-State Period: 20 ms.
•
Energy detection threshold: -62 dBm.
An obvious drawback of CSAT is the long latency that may not be suitable for real-time applications
over Wi-Fi. Another drawback is that the eNodeB can extend its transmission until the duty cycle reaches
90% when it cannot detect the Wi-Fi signal (hidden node problem), which will lead to diminishing the
Wi-Fi signal.
Recently, the FCC approved that Qualcomm and Verizon perform small-scale testing for LTE-U in
real-world scenarios at two different locations. If test results show that LTE-U can coexist fairly with
Wi-Fi systems, LTE-U might be commercially deployed in 2017.
7
V. L ICENSED A SSISTED ACCESS (LAA)
Licensed Assisted Access (LAA) was standarized in 3GPP Rel-13. The operating frequency band for
LAA spans the frequency range 5150 MHz - 5925 MHz (channel numbers 46 and 47 in the 3GPP
specifications). The current allowable bandwidths for LAA operation in unlicensed spectrum are 10 and
20 MHz [11]. Rel-13 defines LAA only for the downlink (DL). One of the main features of 3GPP
Rel-14 is the introduction of enhanced-Licensed Assisted Access (eLAA), which includes uplink (UL)
operation for LAA. LAA has a different frame structure type (Frame Sturcture Type 3) for operation in
the unlicensed band. Frame Structure Type 3, similar to the one defined for FDD, has a duration of 10
ms and consists of 20 slots, each slot duration is 0.5 ms and each two adjacent slots form one subframe.
Any subframe may be available for DL or UL transmission, however the transmission may or may not
start at the boundary of the subframe, and it may or may not end at the boundary of the subframe [12].
This is due to the fact that the eNodeB has to sense the spectrum before transmitting and transmits only
if the channel is free. Since one of the goals of LAA is ensuring fair coexistence with Wi-Fi, we will
further examine the channel access procedures for eNodeB in the unlicensed spectrum as detailed in [13].
3GPP Rel-13 has identified two different modes for the eNodeB to transmit in the unlicensed spectrum.
The first mode is for transmitting the Physical Downlink Shared Channel (PDSCH), which is the channel
that carries user data on the DL. The second mode is for transmitting a Discovery Reference Signal
(DRS) without the PDSCH.
For the case of transmitting the PDSCH, Figure 1 illustrates the main procedures that need to be
followed by the eNodeB. These procedures are based on the LBT algorithm with random back-off and a
variable contention window size (LBT Category 4), where the eNodeB generates a random number within
the contention window size to identify the period it needs to sense the spectrum before transmission. The
size of the contention window is variable as the device will increase the window size when it finds the
spectrum occupied. The 3GPP specifications have identified four different priority access classes, which
define the channel sensing parameters. It is worth mentioning that these parameters are very similar to
those used for the different access categories in IEEE 802.11, with the aim of achieving fair coexistence
among the two technologies.
To elaborate more, the eNodeB starts by sensing the channel for a period called defer duration time
Td , then selects a random number N that is uniformly distributed between 0 and CWp , where CWp
is the contention window size that has a minimum and maximum values, which are determined by the
channel access priority class. The eNodeB senses the channel for an additional period of N + 1 times
8
Fig. 1.
eNodeB procedures to access the unlicensed spectrum before transmitting PDSCH.
the slot duration, which equals 9 µs. If the channel is found to be idle during all the slot durations of
Td and during the N + 1 slot durations, the eNodeB can start transmitting with a maximum duration of
Tmcot,p (which ranges between 2 and 10 ms depending on the priority channel access class). The channel
is determined to be idle during a certain time slot if the detected power is less than a certain energy
detection threshold XT hresh for at least 4 µs of the slot duration time. If the channel is found to be busy
during any time slot, the eNodeB continues sensing the channel for an additional defer duration time Td .
The defer duration time Td consists of a duration Tf , which equals 16 µs, followed immediately by mp
additional slot durations Tsl . Each slot duration Tsl is 9 µs and Tf includes an idle slot duration Tsl at
its start, wile mp ranges between 1 and 7, where its value depends on the priority channel access class.
For the choice of the contention window size CWp , the eNodeB starts with the minimum value CWmin
and if the data was not received correctly by the users, the eNodeB chooses the next higher CWp , and so
9
on until reaching the maximum allowable value CWmax and continues using it until the data is correctly
received.
For the case of transmitting a DRS, the eNodeB needs to sense the channel for a period of 25 µs and
if the channel is found to be idle for the entire period, the eNodeB can transmit a discovery signal for
a maximum period of 1 ms. The DRS is identified for Frame Structure Type 3 and contains 12 OFDM
symbols within one non-empty subframe. It carries the primary synchronization signal (PSS), secondary
synchronization signal (SSS) and cell specific reference signal (CRS) [12].
The value of the energy detection threshold XT hresh is determined differently in two different cases.
For the case where there is no other technology occupying the channel on a long term basis (as in the
case of regulations in certain regions) and for 20 MHz bandwidth,
XT hresh = min
−52dBm,
(1)
Xr
where Xr is the maximum energy detection threshold defined by regulation requirements in dBm (if
defined).
For the case where multiple technologies are allowed to share the channel and for the 20 MHz
bandwidth,
−72dBm,
−62dBm,
XT hresh = max
min −62 − TA + (23 − PT x )dBm,
(2)
where TA is either 10 dBm in case of transmitting PDSCH or 5 dBm in case of transmitting DRS, and
PTx is the maximum eNodeB output power in dBm.
For UL transmission, which was defined in Rel-14, the UE also is allowed to use one of two modes
to transmit in the unlicensed spectrum. These two modes of sensing the spectrum are similar to the ones
used by the eNodeB. In most cases, the eNodeB informs the UE of the mode that it needs to use before
accessing the spectrum along with the UL grant. It is worth mentioning that the 3GPP specifications
have also identified the procedures for the eNodeB when accessing multiple channels in the unlicensed
spectrum, allowing the eNodeB to choose the channel that has that lowest detected signal power level to
10
reduce interfering with other existing systems within the unlicensed spectrum. Qualcomm has performed
a laboratory tests to evaluate the performance of the coexistence algorithm implemented in LAA. The
results show that when an operator switches from Wi-Fi to LAA, the throughput for this operator increases
by 100%, and even the throughput for the Wi-Fi operators increases by approximately 10% [1].
VI. M ULTE F IRE
MulteFire was proposed as a standalone version of LTE for small cells. In December 2015, MulteFire
alliance was formed by Qualcomm, Nokia, Ericsson and Intel to promote the MulteFire technology and
several companies have joined the alliance since then. The first release of the technical specifications for
MulteFire was issued in Jan. 2017 [14]. MulteFire, similar to Wi-Fi, relies only the unlicensed spectrum
and can provide service to users with or without USIM (Universal Subscriber Identity Module) card.
Hence, MulteFire will combine the benefits of the advanced LTE technology and the simplicity of Wi-Fi
deployment [1].
MulteFire can be deployed either by traditional mobile operators or by neutral hosts. Accordingly,
MulteFire specifies two different architectures:
•
Public Land Mobile Network (PLMN) access mode, which allows mobile network operators to
extend their coverage into the unlicensed band, specially in case where licensed spectrum is not
available at certain locations.
•
Neutral Host Network (NHN) access mode, which is similar to Wi-Fi, a self-contained network
deployment that provides access to the Internet.
Because of the nature of transmission in the unlicensed band and the need to adhere to the LBT
requirements, MulteFire has introduced several modifications in the radio air interface compared to LTE.
A. Downlink Operation
As for LAA, a MulteFire eNodeB will need to perform LBT before transmitting any signal. The LBT
procedure is similar to the one of LAA and has the same four channel access priority classes. Also similar
to LAA, the eNodeB can transmit a DRS that contains critical data for synchronization and acquiring
the system information. DRS for MulteFire is also 12 OFDM symbols long, but its structure is different
when compared to LAA. The components of DRS for MulteFire are:
•
Primary Synchronization Signal (PSS): transmitted on the seventh OFDM symbol of the DRS
subframe.
11
•
Secondary Synchronization Signal (SSS): transmitted on the sixth OFDM symbol of the DRS
subframe.
•
MulteFire Primary Synchronization Signal (MF-PSS): transmitted on the fourth OFDM symbol of
the DRS subframe.
•
MulteFire Secondary Synchronization Signal (MF-SSS): transmitted on the third OFDM symbol of
the DRS subframe. MF-PSS and MF-SSS support the UE in performing frequency/time synchronization and also allow differentiating between an LAA eNodeB and a MulteFire eNodeB.
•
Cell-specific reference signals (CRS).
•
Configurable channel state information reference signals (CSI-RS).
•
Master information broadcast (MIB-MulteFire) through the MulteFire Physical Broadcast Channel
(MulteFire-PBCH), which is transmitted over six OFDM symbols (the fifth, eighth, ninth, tenth,
eleventh and last OFDM symbol).
•
MulteFire system information broadcast (SIB-MulteFire) which is transmitted through PDSCH and
carries information similar to the SIB1 and SIB2 messages of LTE Rel-13.
MulteFire allows sending the DRS in two modes:
•
During the serving cell DRS measurement and timing configuration (DMTC) window, which can
be up to 10 ms long and during which the UE expects to receive the DRS. The DMTC periodicity
is 40, 80 or 160 ms. MulteFire will transmit the DRS during the DMTC window after sensing the
channel for a period of 25 µs.
•
Just like for the downlink PDSCH, opportunistic transmission of DRS is allowed only on subframe
number 0, after performing the LBT mechanism.
B. Dynamic DL/UL Configuration
MulteFire adopts a very flexible frame structure to dynamically adapt to the DL and UL traffic loads.
Accordingly, the ratio between DL and UL transmission can vary from one frame to the next. The eNodeB
will broadcast whether a subframe is DL or UL through the Common Physical Downlink Control Channel
(C-PDCCH).
C. Uplink Operation
MulteFire uses Block Interleaved FDMA (B-IFDMA) as the UL transmission scheme, where the
bandwidth is divided into N interlaces (N = 10 for 20 MHz, and N = 5 for 10 MHz), each interlace
consists of 10 equally spaced physical resource blocks. MulteFire introduces two different formats for the
12
Physical Uplink Control Channel (PUCCH): Short-PUCCH (MF-sPUCCH) and Extended PUCCH (MFePUCCH). MF-sPUCCH is transmitted by the UE during the last four OFDM symbols of a DL subframe.
In other words, the UE is allowed to transmit the MF-sPUCCH immediately on the gap between DL
and UL transmission, and, therefore, does not need to perform LBT. This is allowed according to the
ETSI regulations in the unlicensed band, as long as the UE is transmitting within 16 µs after the DL
transmission. Due to its compact design, MF-sPUCCH will be used to carry small control information
such as reception acknowledgments. On the other hand, MF-ePUCCH will be used by the UE to transmit
large control information such as the channel state information (CSI). The UE will transmit MF-ePUCCH
based on the UL resource assignment given by the eNodeB, the same way the UE transmits the Physical
Uplink Shared Channel (PUSCH).
Because of the huge demand for high data rates and for higher capacity, MulteFire has the potential to use spectrum opportunities and leverage LTE-A techniques to access the unlicensed spectrum.
Furthermore, MulteFire supports mobility management and can provide a better user experience than
Wi-Fi. However, MulteFire faces several challenges. Wi-Fi is already very widely used nowadays, not
only in cellphones, but also in portable computing devices (laptops), so Wi-Fi chips are manufactured at
low cost because of it high penetration. Furthermore, MulteFire will not be backward compatible with
legacy LTE devices. Moreover, there are still lots of design issues need to be considered, such as the
control channel design and their reliability in the unlicensed band. One of these issues is handling the
unintentional interference generated among several eNodeBs in dense deployment as illustrated in [15].
VII. C OMPARATIVE A NALYSIS
The objective of this analysis is to compare the coexistence performance of CSMA/CA (used in Wi-Fi),
LBT (used in LAA and MulteFire), and CSAT (used in LTE-U). The performance is compared based
on the normalized total time of transmission opportunities (TTTO) that is granted (free of collision) to
an operator, who is either deploying Wi-Fi, LAA/MulteFire, or LTE-U. Table II shows the simulation
parameters. TTTO is calculated based on the summation of transmission opportunity durations that an
operator gets free of collision, normalized by the total analysis time. The coexistence performance of
LAA/MulteFire or LTE-U is evaluated based on the average TTTO that a Wi-Fi operator will get (when
adding an LAA/MulteFire or LTE-U eNodeB) compared to the case when adding another Wi-Fi operator.
The simulation results are presented in Figure 2 and illustrate the following: When deploying three Wi-Fi
operators, the average TTTO per operator is 33.01%. When one operator switches to LAA, the TTTO
for each of the remaining operators increases to 36.728% on average. When one of three Wi-Fi operators
13
TABLE II
S IMULATION PARAMETERS
General Simulation Parameters
Wi-Fi Specific Parameters
LAA Specific Parameters
LTE-U Specific Parameters
Sampling Time
1 µs
Simulation Time
100 s
Traffic Model
Full Buffer
Access Category
Video
Minimum Contention Window
7
Maximum Contention Window
15
Arbitration Inter-Frame Spacing Number
2
Short Inter-Frame Spacing (SIFS)
16 µs
DCF Inter-Frame Spacing (DIFS)
34 µs
Data transmission time (based on maximum PPDU frame)
5.484 ms
Acknowledgment Transmission Time
34 µs
Priority Class
2
Minimum Contention Window
7
Maximum Contention Window
15
mp
1
Tmcot,p
3 ms
On-State Period
12 ms
Off-State Period
24 ms
switches to LTE-U, this TTTO decreases to 30.95%. This means that LAA and MulteFire are better
neighbors to Wi-Fi than Wi-Fi itself and than LTE-U. It is worth mentioning that the TTTO metric can
be a good indicator of DL throughput for operators with the same technology, but this is not true for
operators using different technologies. The throughput in this case will depend on the spectral efficiency
of each technology and how efficient each technology can utilize the time when granted access to the
channel. Although LAA and MulteFire perform the same in terms of TTTO, the throughput will be
different for the two variants, since LAA uses the licensed spectrum to transmit the control messages.
In our simulations, it was assumed that the received power of the other operators is always above the
detection threshold level. In reality that may not always be true. Actually, since the detection threshold
level is -62 dBm for LTE-U and -72 dBm for LAA/MulteFire, LAA/MulteFire operators will have larger
detection range for Wi-Fi signal and outperform LTE-U even more in terms of fair coexistence.
Table III and Figure 3 provide a comparison of the three proposed variants of LTE in unlicensed
bands. Note that the radar chart of Figure 3 reflects the current state of the art. The shapes may change
14
Operator A
Opeator B
Operator C
Average For WiFi Operators
40.00%
36.728%
35.00%
33.01%
30.953%
30.00%
25.00%
20.00%
15.00%
10.00%
5.00%
0.00%
WiFi
Fig. 2.
WiFi
WiFi
WiFi Avg
WiFi
WiFi
LTE-U
WiFi Avg
WiFi
WiFi
LAA
WiFi Avg
Performance comparison in terms of normalized total time of transmission opportunities (free of collision).
as research, regulation and standardization evolves.
VIII. C ONCLUSION
This paper has discussed LTE in unlicensed spectrum as the next big milestone in the evolution of
LTE. We have presented the different regulatory requirements for the 5 GHz unlicensed bands in different
world regions and analyzed the benefits and the challenges for operating LTE in unlicensed spectrum.
We have explained the technical details of the three proposed variants of LTE for unlicensed spectrum
and have compared the coexistence mechanism used in these variants. Our numerical analysis has shown
that LAA and MulteFire offer better coexistence to Wi-Fi than LTE-U.
This paper has highlighted the differences and uniquenesses of each variant of LTE operating in
unlicensed spectrum. LAA is the most unified solution and will be operable worldwide. LTE-U is less
regulated and thus expected to be introduced first. MulteFire is most flexible and will be as simple to
deploy as Wi-Fi. Moreover, MulteFire has the potential to play a big role in the future of wireless communications, especially for enterprises and industrial applications, as several major high-tech companies
15
LTE-U
LAA
MuLTEfire
Faster Time to Market
Simplicity of
Deployment
Backward Compatibility
Fig. 3.
Coexistence with Wi-Fi
Unified Solution
Comparison between the three variants of LTE in unlicensed bands.
are currently collaborating to improve performance and simplify deployment and configuration. MulteFire
also has the potential to enhance the future of the Internet of Things (IoT), as it can enable new IoT
deployment scenarios, hence creating new business opportunities.
It is expected that LTE in unlicensed bands will become more important and the technology be leveraged
for LTE moving into additional unlicensed bands. This can be expected with the ongoing spectrum
relocation in the US and worldwide. Moreover, history has shown that popular technologies (such as
LTE or Wi-Fi) expand. For example, Wi-Fi has gone through several generations and expanded from the
2.4 GHz band to the 5 GHz, 60 GHz (WiGig) and former TV bands (Super-Wifi). We will likely see
different variants of LTE in unlicensed bands in the market because of different regulations and incentives.
This diversity will help gaining experience for next generation wireless networks. Furthermore, LTE and
Wi-Fi will both evolve and once radars are relocated, there will be more room for improvement and
efficiency to make better use of spectrum opportunities. LTE in unlicensed spectrum is not competing
with Wi-Fi; they complement each other, have their pros and cons and may cooperate in the future.
16
TABLE III
C OMPARISON BETWEEN THE THREE DIFFERENT VERSIONS OF LTE IN UNLICENSED BANDS
LTE-U
LAA
MulteFire
Devloped By
LTE-U Forum
3GPP
MulteFire Alliance
Mode of Opera-
Supplemental downlink (SDL)
DL is supported in Rel-13, UL
DL and UL (using Time Divi-
tion
only
is standardized in Rel-14
sion Multiplexing (TDD))
5150-5250 MHz and 5725-5850
Frequency Bands
The 5 GHz, and the 3.5 GHz
MHZ, whereas the frequency
5150 MHz- 5925 MHz (Chan-
in the US. The 1.9 & 2.4 GHz
bands 5250- 5725 MHz has
nels 46 and 47)
bands are expected to be sup-
been reserved for future use.
Bandwidths Allowed
Purpose
Coexistence
Mechanisms
20 MHz.
10 MHz and 20 MHz.
10 MHz and 20 MHz.
Use of the existing LTE specifi-
Single unified global framework
Standalone version that operates
cations in countries that do not
that complies with regulations
without a primary carrier in li-
impose LBT.
in the different world regions.
censed band.
Carrier selection and LBT.
LBT (similar to LAA).
Carrier selection, on-off switching, Carrier-Sensing Adaptive
Transmission (CSAT).
Will likely be the first version
Main Advantage
ported in subsequent releases
in the market; Samsung and
Verzion announced their plans
to implement it in 2016.
Will be a single unified global
framework for LTE in unlicensed bands worldwide.
Combines benefits of LTE with
simplicity of Wi-Fi.
Backward
compatibility
Yes, since using the licensed spectrum as the primary carrier.
No.
with 3GPP Rel-9
R EFERENCES
[1] Qualcomm Technologies, Inc., “LTE-U/LAA, MuLTEfire and Wi-Fi; making best use of unlicensed spectrum,” Sept. 2015.
[2] R. Zhang, M. Wang, L. Cai, Z. Zheng, and X. Shen, “LTE-unlicensed: the future of spectrum aggregation for cellular
networks,” IEEE Wireless Commun., vol. 22, no. 3, pp. 150–159, June 2015.
[3] B. Chen, J. Chen, Y. Gao, and J. Zhang, “Coexistence of LTE-LAA and Wi-Fi on 5 GHz with Corresponding Deployment
Scenarios: A Survey,” IEEE Communications Surveys Tutorials, vol. PP, no. 99, pp. 1–27, 2016.
[4] FCC, “Revision of Part 15 of the Commissions rules to permit Unlicensed National Information Infrastructure (U-NII)
devices in the 5 GHz band,” Federal Communications Commission, First Report and Order, April 2014.
[5] 3GPP, “Study on Licensed-Assisted Access to Unlicensed Spectrum; (Release 13),” 3rd Generation Partnership Project
(3GPP), TS 36.889, Jun. 2015. [Online]. Available: http://www.3gpp.org/dynareport/36889.htm
[6] A. Cavalcante, E. Almeida, R. Vieira, F. Chaves, R. Paiva, F. Abinader, S. Choudhury, E. Tuomaala, and K. Doppler,
17
“Performance evaluation of LTE and Wi-Fi coexistence in unlicensed bands,” in Proc. IEEE VTC ’13-Spring, June 2013,
pp. 1–6.
[7] E. Almeida, A. Cavalcante, R. Paiva, F. Chaves, F. Abinader, R. Vieira, S. Choudhury, E. Tuomaala, and K. Doppler,
“Enabling LTE/WiFi coexistence by LTE blank subframe allocation,” in Proc. IEEE ICC ’13, June 2013, pp. 5083–5088.
[8] J. Jeon, H. Niu, Q. Li, A. Papathanassiou, and G. Wu, “LTE in the unlicensed spectrum: evaluating coexistence mechanisms,”
in Proc. IEEE Globecom Workshops ’14, Dec 2014, pp. 740–745.
[9] LTE-U Forum, “LTE-U SDL Coexistence Specifications V1.3,” Oct. 2015.
[10] ——, “LTE-U CSAT Procedure TS V1.0,” Oct. 2015.
[11] 3GPP, “Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and
reception (Release 14),” 3rd Generation Partnership Project (3GPP), TS 36.101, 2017. [Online]. Available:
http://www.3gpp.org/dynareport/36101.htm
[12] ——, “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation (Release 14),” 3rd
Generation Partnership Project (3GPP), TS 36.211, 2017. [Online]. Available: http://www.3gpp.org/dynareport/36211.htm
[13] ——, “Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer procedures (Release 14),” 3rd Generation
Partnership Project (3GPP), TS 36.213, 2017. [Online]. Available: http://www.3gpp.org/dynareport/36213.htm
[14] MulteFire Alliance, “MulteFire Release 1.0 Technical Paper: A new way to wireless,” Jan. 2017.
[15] M. Labib, V. Marojevic, J. H. Reed, and A. I. Zaghloul, “Enhancing the Robustness of LTE Systems: Analysis and Evolution
of the Cell Selection Process,” IEEE Communications Magazine, vol. 55, no. 2, pp. 208–215, February 2017.
| 7cs.IT
|
Comparison of Volumes of Siegel Sets and
Fundamental Domains for SLn(Z)
arXiv:1604.03613v4 [math.GR] 23 Mar 2018
Gisele Teixeira Paula
Instituto Nacional de Matemática Pura e Aplicada. Est. Dona Castorina, 110. CEP
22460-320. Rio de Janeiro-RJ. Brazil.
Correspondence to be sent to: e-mail: giseletp@impa.br
Abstract
The purpose of this paper is to calculate explicitly the volumes of
Siegel sets which are coarse fundamental domains for the action of SLn (Z)
in SLn (R), so that we can compare these volumes with those of the fundamental domains of SLn (Z) in SLn (R), which are also computed here,
for any n ≥ 2. An important feature of this computation is that it requires keeping track of normalization constants of the Haar measures. We
conclude that the ratio between volumes of fundamental domains and volumes of Siegel sets grows super-exponentially fast as n goes to infinity.
As a corollary, we obtained that this ratio gives a super-exponencial lower
bound, depending only on n, for the number of intersecting Siegel sets.
We were also able to give an upper bound for this number, by applying
some results on the heights of intersecting elements in SLn (Z).
Keywords: Arithmetic Groups, Siegel Sets, Coarse Fundamental Domains, Volumes.
1
Introduction
Siegel sets were first introduced in the study of quadratic forms by Siegel [9] in
1939, with some results following from previous works of Hermite and KorkineZolotarreff. In a fundamental paper [2], Borel and Harish-Chandra have generalised this notion and used Siegel domains to prove finiteness of covolumes of
non-cocompact arithmetic subgroups.
The simple structure of Siegel sets, compared to those of the actual fundamental domains makes them appealing for applications. For example, in his
recent paper [14], R. Young exploited their properties to obtain new results in
geometric group theory. Still very little is known about the geometry of Siegel
sets in general. In his book [7], Morris describes algebraically examples of Siegel
sets not only for SLn (R), with n ≥ 2 , but also in the case of any semisimple
Lie group G with a given Iwasawa decomposition.
In this paper we recall one of the main properties of Siegel sets – the finiteness of their volumes. We evaluate these volumes explicitely in the basic case
of Siegel sets for SLn (Z) in SLn (R) for any n ≥ 2. We then compare these
volumes with the actual covolumes of SLn (Z). To this end, we have to deal
with an essential difficulty related to the normalization of the Haar measure.
1
For calculating the volumes of Siegel sets, the main difficulty is to find a nice
way to describe the region of integration, which we solve with an appropriate
change of coordinates. Most of the volume computations that followed Siegel’s
original approach were not careful about the normalization constants, just noting that they are computable and could be calculated from the proof. In Section
5, we follow Garret’s notes on Siegel’s method [4] to compute the volumes of
the quotients SLn (Z)\SLn (R) for n ≥ 3 using induction and the volume of
SL2 (Z)\SL2 (R), that is computed in [4]. Our main goal here is to keep a careful
track of the normalization constants. The main tools we use are the Poisson
Summation formula, the Iwasawa decomposition of G and the choice of a good
Haar measure normalization on each group. At the end of the section we discuss
the relation between the normalization of the measure we used and the canonical normalization that comes from the metric associated to the Killing form on
sln (R).
By comparing the volumes of Siegel sets and the volumes of fundamental
domains of SLn (Z), we conclude that somewhat surprinsingly the ratio between
them grows super-exponentially fast with n.
As an application of the computations presented here, in Section 6 we show
that given a Siegel set Σ of SLn (Z), we have an explicit lower bound for the
number of elements γ ∈ SLn (Z) such that γΣ intersects Σ. This bound is given
by the ratio between vol(Σ) and vol(SLn (Z)\SLn (R)) – see Corollary 6.1. We
also give a proof that this result is consistent with a recent work of M. Orr [8],
which generalizes a previous result of P. Habegger and J. Pila [5] on the height of
such elements γ, motivated by the study of Shimura varieties and their unlikely
intersections. More precisely, Orr’s result gives, as a corollary, an upper bound
for the number of intersecting Siegel sets while our work provides a lower bound
for this number (see Corollary 6.2).
It would be interesting to compute the volumes of Siegel sets in other cases,
for example for the action of well known Bianchi groups Γd = SL2 (Od ) on the
hyperbolic three-dimensional space H3 . In this case we should have to deal
with another difficulty when describing Siegel sets, because of the fact that as d
grows the quotients Γd \H3 have a growing number of cusps. It would be worth
doing these computations in the future, and then comparing them to the results
obtained in this paper.
2
The Iwasawa decomposition of SLn (R)
Let n ≥ 2, G = SLn (R) and Γ = SLn (Z). Consider the action of Γ by left
translations on G and let
K = SOn ;
(
A=
diag(a1 , . . . , an );
n
Y
)
ai = 1; ai > 0, for any i = 1, . . . , n ;
i=1
N = {(nij )i,j ∈ G; nii = 1 and nij = 0 for i > j} .
Lemma 2.1. The product map
Φ : K × A × N −→ G
2
(k, a, n) 7→ kan
is a homeomorphism.
Proof. We can construct an inverse map for Φ by using the Gram-Schmidt
orthonormalization process.
Take g ∈ G and let x1 , . . . , xn be its columns. Then define inductively
y1 , . . . , yn by
x1
y1 =
;
kx1 k
i−1
yi =
X
yei
, where yei = xi −
hxi , yl iyl ; for i = 2, . . . , n.
ke
yi k
l=1
Let e1 , . . . , en be the standard orthonormal basis of Rn . Then there exists
an unique k ∈ SOn such that k(yi ) = ei , for any i = 1, . . . n. Therefore
k(e
yi ) = k(ke
yi k yi ) = ke
yi k k(yi ) = ke
yi k ei , for any i = 1, . . . , n.
So there is a diagonal matrix a = diag(ke
y1 k , . . . , ke
yn k), such that
k(e
yi ) = a(ei ), for any i = 1, . . . , n.
Also, it is easy to see that yi ∈ hx1 , . . . , xi i , for any i = 1, . . . , n. Thus we have:
g −1 yei = g −1 (xi −
i−1
X
hxi , yl iyl ) ∈ g −1 xi + g −1 hx1 , . . . , xi−1 i
l=1
⇒ g −1 yei ∈ ei + he1 , . . . , ei−1 i .
From this, we conclude that there exists u ∈ N such that g −1 yei = uei , for
every i = 1, . . . , n. Therefore,
u−1 g −1 yei = ei = a−1 k(e
yi ), for any i ⇒ u−1 g −1 = a−1 k ⇒ g = k −1 au−1 .
It is easy to see now that det(a) = 1, so a ∈ A and thus we can define a
continuous inverse map g ∈ G 7→ (k −1 , a, u−1 ) ∈ K × A × N .
The previous lemma gives us the Iwasawa decomposition G = KAN of
SLn (R). Note that K ∩ A = K ∩ N = A ∩ N = {I} and that for this Iwasawa
decomposition, AN = N A and K(AN ) = (AN )K (see [7], page 148).
3
Haar measure on SLn (R)
Given a locally compact Hausdorff topological group G, a left invariant Haar
measure on G is, by definition, a regular Borel measure µ on G such that for
all g ∈ G and all Borel sets E ⊂ G we have µ(gE) = µ(E). It is well known
that every connected Lie group admits such a Haar measure. Moreover, it is
unique up to scalar multiples. We can define analogously right-invariant Haar
measures. See [13] for more results about Haar measures on Lie groups.
Since G = SLn (R) is unimodular, i.e. the left and right invariant Haar
measures coincide, and dg is invariant under left translation by elements of K
and under right translation by elements of AN , we get that the Haar measure
3
of G in k, v, a coordinates is given by the product measure dg = dk du da, where
da, du and dk are the Haar measures on A, N and K, repectively. This means
that for every compactly supported and continuous function f on G, we have
Z
Z Z Z
f (g)dg =
f (kau)du da dk.
G
K
A
N
It canY
be proved by induction on n that the Haar measure on N is given
by du =
duij . It is usually convenient to change the order of integration on
i<j
the variables a and u, and to this end we can change the coordinates from u to
v = aua−1 . Then v is also an upper triangular unipotent matrix of the form
X ai
uij Eij .
v = Id +
aj
i<j≤n
It is easily seen that dv =
Y
dvij =
i<j
Z
Y ai
duij . This gives us
a
i<j j
Z Z Z
f (g)dg =
G
Z Z Z
f (kva)dv da dk =
K
A
N
f (kau)
K
N
A
Y ai
da du dk.
a
i<j j
Also for convenience, we change coordinates from au to k −1 auk in the last
integral. This has Jacobian equal to 1 (for each k ∈ K), so we get:
Z
Z Z Z
Y ai
f (g)dg =
f (auk)
dk da du.
a
G
N A K
i<j j
In this work, we will consider the Haar measure in K to be the following: it
is easy to see that the isotropy group of en = (0, . . . , 0, 1) by the action of SOn
in Sn−1 is isomorphic to SOn−1 . Then Sn−1 ∼
= SOn−1 \SOn . We have that the
natural map π : SOn → Sn−1 is a Riemannian submersion if we rescale it by a
factor of √12 . Thus
1
vol(SOn ) = 2 2 (n−1) vol(Sn−1 ) · vol(SOn−1 ).
By using induction and the fact that vol(Sn−1 ) =
vol(SOn ) = 2
1
4 n(n−1)
n−1
vol(S
n−2
) · vol(S
1
n
2π 2
,
Γ( n
2)
) . . . vol(S ) = 2
we obtain
(n−1)( n
4 +1)
It remains to define a Haar measure on A. We claim that da =
i
n
Y
π2
.
Γ( 2i )
i=2
n−1
Y
i=1
dai
is
ai
such a measure. Indeed, let φ : A → Rn−1 be the map
a1 0 . . .
0
0
0 a2 · · ·
0
0
..
.. . .
..
..
.
.
.
.
.
7→ (t1 , . . . , tn−1 ) = (log a1 , . . . , log an−1 ).
a=
0 0 · · · an−1
0
n−1
Y
0 0 ···
0
a−1
i
i=1
4
As φ is a group isomorphism and Haar measure is preserved by isomorphisms
n−1
n−1
Y
Y dai
we get that da =
dti =
is a Haar measure on A.
ai
i=1
i=1
Siegel Sets for SLn (R)
4
Definition 4.1. Let Γ be some group acting properly discontinuously on a
topological space X. We call F ⊂ X a coarse fundamental domain for Γ if:
• ΓF = X;
• {γ ∈ Γ; γF ∩ F =
6 ∅} is finite.
Definition 4.2. A Siegel set in SLn (R) is a set Σt,λ of the form
Σt,λ = At Nλ K,
where t, λ are positive real numbers,
ai
≤ t, for any i = 1, . . . , n
At = a ∈ A;
ai+1
and
Nλ = {u ∈ N | |uij | ≤ λ, for any i, j = 1, . . . , n} .
For certain parameters t, λ the Siegel sets Σt,λ are coarse fundamental domains for SLn (Z). Another important property is that they have finite volume.
Siegel sets can be also defined in a more general way for lattices in other semisimple Lie groups, as it can be seen in Chapter 19 of Morris [7]. In many cases,
a finite union of copies of Siegel sets glue together to form coarse fundamental
domains for general lattices.
In this section we compute the volumes of the Siegel sets in SLn (R). We will
use the Haar measure on G given in Section 3 in v, a, k coordinates.
Theorem 4.1.
n(n2 −1)
n(n−1)
1
t 6
vol(Σt,λ ) = vol(SOn )(2λ) 2
.
2
((n − 1)!)2
Proof.
Z
Z
vol(Σt,λ ) =
|uij |≤λ
ai
ai+1
= vol(K)(2λ)
Z Y
n−1
Y dai
ai
dk
ai
≤t K i<j aj
i=1
n(n−1)
2
Z
ai
ai+1
Y
Y ai n−1
Y dai
.
≤t i<j aj i=1 ai
To compute the integral over a1 , . . . , an (with the condition
change variables from a1 , . . . , an to the variables
bi =
ai
, for any i = 1, . . . , n − 1.
ai+1
5
duij .
1≤i<j≤n
n
Y
i=1
ai = 1), we
By elementary computation, we get
n−1
Y ai
Y i(n−i)
=
bi
.
a
i<j j
i=1
Moreover, as ai = bi ai+1 , the Jacobian of the change of coordinates from ai to
bi is 2a11 . The integral then becomes
n−1
Y
Z
bi ≤t i=1
1
=
2
Z
n−1
Y
bi ≤t i=1
i(n−i)
bi
1
1 Y
dbi
b1 a2 b2 a3 . . . bn−1 an 2a1
i≤n−1
2
[i(n−i)−1]
bi
Y
i≤n−1
n(n −1)
2
n−1
1 t 6
1 Y tni−i
.
=
dbi =
2 i=1 (ni − i2 )
2 ((n − 1)!)2
Thus we get to
n(n2 −1)
n(n−1)
1
t 6
vol(Σt,λ ) = vol(SOn )(2λ) 2
.
2
((n − 1)!)2
(1)
Borel proves in [1] the following theorem:
Theorem 4.2. For t ≥ √23 and λ ≥ 12 , one has Σt,λ Γ = G. Moreover, Σt,λ is a
coarse fundamental domain for Γ in G.
Corollary 4.1. The quotient Γ\G has finite volume, which satisfies
3
vol(Γ\G) ≺ ecn , as n → ∞,
(2)
for some positive constant c.
Proof. It is clear that vol(Γ\G) < ∞, since Σt,λ has finite volume and it contains
a fundamental domain for SLn (Z) if t ≥ √23 and λ ≥ 12 . Thus vol(Γ\G) ≤
vol(Σt,λ ) for these values of t and λ.
By taking λ = 21 and t = √23 in formula (1), we get that
n(n2 −1)
vol(Σ √2
,1
3 2
)=2
(n−1)( n
4 +1)−1
2
=
3
2
i
n
Y
π 2 ( √3 ) 6
Γ( 2i ) ((n − 1)!)2
i=2
2n3 +3n2 +7n−24
12
n(n2 −1)
12
((n −
π
n2 +n−2
2
1)!)2
n
Y
i
Γ( )
2
i=2
Using Stirling’s formula, this volume is easily seen to grow assymptotically like
3
ecn , for some positive constant c and this finishes the proof.
On the other hand, as we will see in the next section, vol(SLn (Z)\SLn (R))
computed with respect to the same normalization of the Haar measure goes to
zero as n grows.
6
5
Volume of SLn (Z)\SLn (R)
It is a well-known fact that vol(SLn (Z)\SLn (R)) is finite. Our goal is to calculate it, with respect to the same normalization of the Haar measure used in
the previous section. The whole computation follows the original approach
of Siegel [11], but we have to be careful with the normalization constants.
We use Poisson summation,
induction and the previously known fact that
√
vol(SL2 (Z)\SL2 (R)) = 2ζ(2), which can be proved in a similar way (see [4],
being careful with respect to the different normalization of vol(SO2 ) we are
considering).
We will state first the Poisson Summation Formula, which will play a fundamental role in the computations, and for which the reader can refer to [12].
Given a lattice Λ in Rn , we define |Λ| to be the covolume of Λ, i.e. the
volume of Rn /Λ and the dual lattice of Λ by
Λ∗ = {y ∈ Rn ; hx, yi ∈ Z for any x ∈ Λ} .
Theorem 5.1 (Poisson Summation Formula). Given any lattice Λ in Rn , a
vector w ∈ Rn and an adimissible function f : Rn → R in L1 , we have
X
f (x + w) =
t∈Λ
x∈Λ
Here, fˆ(t) =
1 X −2πihw,ti ˆ
e
f (t),
|Λ|
∗
f (x)e2πihx,ti dx is the Fourrier transform of f and admissibilty of f means that there exist constants , δ > 0 such that |f (x)| and fˆ(x)
R
Rn
are bounded above by (1 + |x|)−n−δ .
Let then f ∈ L1 be an admissible function on Rn . We can ask f to be a C ∞
function with compact support. We then define F : G 7→ R by
X
F (g) =
f (vg).
v∈Zn
Here we are considering the multiplication of line-vectors v ∈ Rn by elements
of G by the right. Clearly, F is left Γ-invariant, as Zn Γ = Zn under the action
of SLn (Z) on Rn by right multiplication of line vectors by the inverse elements
of SLn (Z). R
Consider Γ\G F (g)dg. We will use this integral to calculate vol(Γ\G).
Let
h v
Q = stabG (e) =
; h ∈ SLn−1 (R), v ∈ Rn−1 ,
0 1
where e = (0, . . . , 0, 1) ∈ Rn , and write QZ = Q ∩ Γ. Using linear algebra over
Z, note that
[ [
Zn − {0} =
`eγ,
`>0 γ∈QZ \Γ
where ` runs over positive integers.
Then we can write
Z
Z
Z
F (g)dg =
f (0)dg +
Γ\G
Γ\G
X X
Γ\G `>0 γ∈Q \Γ
Z
7
f (`eγg)dg
= vol(Γ\G)f (0) +
XZ
`>0
f (`eg)dg.
QZ \G
For the second equality note that a fundamental domain for QZ in G is
the union of images of a fundamental domain for Γ in G by representatives of
classes in QZ \Γ. In addition, the Schwartz condition on f ensures that the
integral over QZ \G is finite. Indeed, in his article [10], Siegel proves that the
function F (g) is integrable over a fundamental domain for Γ\G. On pages 344345 of [loc. cit.] we can see that the integrals over QZ \G are also convergent
(for any fixed l ∈ N). We observe that although he uses different decomposition
of G and normalization of Haar measures, this does not change the finiteness of
the integrals.
Write
)
!
(
h
∗
n−1
; h ∈ GLn−1 (R), det(h) > 0 and ∗ ∈ R
;
P =
0 det1(h)
0
N =
In−1
0
v
1
;v ∈ R
n−1
, NZ0 = N 0 ∩ Γ.
M=
h 0
; h ∈ SLn−1 (R) , MZ = M ∩ Γ;
0 1
1
t n−1 In−1
0
A0 =
;
t
>
0
;
0
t−1
Note that P = N 0 M A0 ⊃ N A, Q = N 0 M and G = N 0 M A0 K. However this
time we have that N 0 M A0 intersects K non-trivially, i.e. this is not an Iwasawa
decomposition. The product N 0 M A0 K projects on G with fiber SO(n − 1).
Therefore we get the following
Lemma 5.1. For every left G-invariant function Φ, we have
Z
Z
1
Φ(n0 ma0 k)dn0 dm da0 dk
Φ(g)dg =
vol(SOn−1 ) QZ \(N 0 M A0 K)
QZ \G
where dg is the Haar measure in G coming from its Iwasawa decomposition (as
in Section 4).
Here dn0 , dm, da0 and dk are the left Haar measures on N 0 , M , A0 and K,
n−1
Y
respectively. We see that dn0 =
vi and that M is isomorphic to SLn−1 (R)
i=1
and thus dm will appear as the measure of this group. This allows us to use
induction in the calculations. On the other hand, A0 is isomorphic to R>0 via
the isomorphism
1
0
t n−1 In−1
∈ A0 7→ t ∈ R>0 .
0
t−1
Thus we have da0 = dt
t where dt is the usual measure in R.
Again it will be convenient to change the order of integration, by letting the
variable a0 ∈ A0 to be the last one. This will give us d(a0 qa0−1 ) = tn dq, for q =
8
1
h v
t n−1 In−1
0
0
n m ∈ N M . Indeed, for a =
∈ A and q =
∈
0 1
0
t−1
n
h t n−1 v
, and thus the M -contribuction to the
Q, we have a0 q(a0 )−1 =
0
1
n
measure doesn’t change, but the N 0 -contribution is multiplied by (t n−1 )n−1 = tn
and we get to d(a0 qa0−1 ) = tn dq as stated.
R
Then, if we require f to be K-invariant, the integral Γ\G F (g)dg becomes
equal to
0
0
0
vol(Γ\G)f (0) +
X
1
vol(SOn−1 )
Z
`>0
= vol(Γ\G)f (0) +
f (`en0 ma0 k)dn0 dm da0 dk
QZ \(N 0 M A0 K)
vol(QZ \K) X
vol(SOn−1 )
Z
Z
QZ
`>0
\(N 0 M )
f (`en0 ma0 )tn da0 dn0 dm.
A0
We have K ∩ QZ = SOn−1 (Z). Noting that
SOn−1 (Z)\SOn
,
Sn−1 ∼
= SOn−1 \SOn ∼
=
SOn−1 (Z)\SOn−1
we get
vol(Sn−1 ) = vol(SOn−1 \SOn ) =
vol(SOn−1 (Z)\SOn )
.
vol(SOn−1 (Z)\SOn−1 )
As SOn (Z) acts properly and freely in SOn , for any n ∈ N we have that
SOn −→ SOn (Z)\SOn
is a finite covering with #SOn (Z) sheets, which gives us
vol(SOn ) = #(SOn (Z))vol(SOn (Z)\SOn ).
Altogether, we obtain:
vol(QZ \K) = vol(SOn−1 (Z)\SOn ) =
vol(Sn−1 )vol(SOn−1 )
.
#(SOn−1 (Z))
As the integrand is invariant under N 0 M (en0 m = e, for any n0 ∈ N 0 and
m ∈ M ) and the volume of NZ0 \N 0 is 1, this implies
vol(Γ\G)f (0) +
vol(QZ \K) X
vol(SOn−1 )
`>0
Z
Z
QZ \(N 0 M )
f (`en0 ma0 )tn da0 dn0 dm
A0
XZ
vol(QZ \K)
vol(SLn−1 (Z)\SLn−1 (R))
f (`ea0 )tn da0
vol(SOn−1 )
0
A
`>0
Z
X
vol(Sn−1 )
vol(SLn−1 (Z)\SLn−1 (R))
f (`ea0 )tn da0
= vol(Γ\G)f (0) +
#(SOn−1 (Z))
A0
= vol(Γ\G)f (0) +
`>0
By replacing a0 ∈ A0 by t ∈ R>0 and using the description of da0 , we get to
XZ ∞
vol(Sn−1 )
dt
vol(Γ\G)f (0) +
vol(SLn−1 (Z)\SLn−1 (R))
f (`et)tn .
#(SOn−1 (Z))
t
0
`>0
9
By replacing t by `t , we obtain
X 1
vol(Sn−1 )
vol(Γ\G)f (0) +
vol(SLn−1 (Z)\SLn−1 (R))
#(SOn−1 (Z))
`n
`>0
∞
Z
f (et)tn
0
dt
.
t
By using polar coordinates in Rn = {(v, t), v ∈ Sn−1 , t ∈ R>0 }, we get
Z
Z ∞
Z ∞
Z
n−1
n dt
n−1
vol(S
=
)
f (et)t
f (v, t)t
dtdv =
f (x)dx = fˆ(0).
t
Sn−1 0
Rn
0
Thus what we get until now is the following
Proposition 5.1. The initial integral becomes
Z
vol(SLn−1 (Z)\SLn−1 (R))
ζ(n)fˆ(0),
F (g)dg = vol(Γ\G)f (0) +
#(SOn−1 (Z))
Γ\G
where ζ(n) =
X 1
is the Riemman zeta function.
ln
l∈Z
Corollary 5.1. The previous result allows us to compute explicitely the value
of vol(Γ\G):
vol(Γ\G) =
n
n−1
Y
√ Y
1
vol(SLn−1 (Z)\SLn−1 (R))
ζ(n) = 2
ζ(i)
.
#(SOn−1 (Z))
#(SO
i (Z))
i=2
i=1
Proof. For every g ∈ G, we are going to apply the Poisson summation formula
to the lattice Λ = {vg; v ∈ Zn } in Rn , the vector w = 0 and the initial function
f . Note that Λ∗ = {vg ∗ ; v ∈ Zn }, where g ∗ =>g −1 . Then we get
X
X
F (g) =
f (vg) =
fˆ(vg ∗ ) = F̂ (g ∗ ), for any g ∈ G.
v∈Zn
v∈Zn
The automorphism g 7→ g ∗ preserves the measure on G and stabilizes Γ, so
we can do an analogous computation with the roles of f and fˆ reversed. Since
R
R
ˆ
fˆ(0) = f (0) and Γ\G F (g)dg = Γ\G F̂ (g)dg, we obtain
vol(SLn−1 (Z)\SLn−1 (R))
vol(Γ\G)f (0) +
ζ(n)fˆ(0) =
#(SOn−1 (Z))
Z
F (g)dg
Γ\G
Z
=
vol(SLn−1 (Z)\SLn−1 (R))
F̂ (g)dg = vol(Γ\G)fˆ(0) +
ζ(n)f (0).
#(SOn−1 (Z))
Γ\G
By asking additionally that f is such that f (0) 6= fˆ(0) and using indution
on n, we get to the desired result.
We observe that for every i ∈ N, #(SOi (Z)) = 2i−1 i!. Indeed, the group
SOi (Z) consists of monomial matrices whose nonzero entries are equal to ±1 and
which have determinant equal to 1. The first condition gives us 2i i! matrices.
Now if we look at the surjective group homomorphism
det : B = {monomial matrices with nonzero entries ∈ {±1}} → {±1},
10
we get B/Ker(det) ∼
= {±1}, which implies
#(SOi (Z)) = #(Ker(det)) =
#(B)
2i i!
=
= 2i−1 i!.
2
2
Thus we have proved the following
Theorem 5.2. The explicit volume of Γ\G, by considering the Haar measures
described in Section 3 is given by
n
Y
n
n−1
Y
√ Y
ζ(i)
vol(SLn (Z)\SLn (R)) = 2
i=2
i=1
1
2i−1 i!
ζ(i)
i=2
=
2
n
Y
n2 −3n+1
2
.
i!
i=2
0
2
It is not difficult to see that this function goes to zero like e−c n as n grows,
where c0 is a positive constant. It has a completely different behaviour from the
volume growth of Siegel Sets described by formula (1). What we can conclude
directly from all this is that although the geometry of a Siegel set is simpler
than that of the actual fundamental domain for a lattice, their volumes can
differ dramatically as n grows. Thus we should be careful if we want to replace
fundamental domains of any lattice by simpler structures such as Siegel sets, due
to the possibility that some of their relevant geometric features, e.g. volume,
may have different behavior to that of fundamental domains.
As a consequence of Sections 4 and 5, we obtain:
Corollary 5.2. The ratio between volumes of the minimal Siegel sets Σ =
Σ 21 , √2 for SLn (Z) and the actual fundamental domains for these groups in
3
SLn (R) is given by
2
vol(Σ)
C(n) =
=
vol(Γ\G)
3
2n3 +9n2 +25n−30
12
n3 −n
12
((n −
1)!)2
π
n2 +n−2
4
n
Y
n−1
Y
i=1
n
Y
i!
i
Γ( )
ζ(i)
2
i=2
i=2
.
3
Moreover, C(n) ∼ ec̃n for some constant c̃ that does not depend on n.
A natural question arising here is the following: “How is our normalization
of the Haar measure related to the canonical normalization defined by using the
Killing form on sln (R)?”
To answer to this question we can compare our formula with a result of
Harder [6], who computed the volume of SLn (Z)\X, where X is the symmetric
space SLn (R)/SOn . In order to do this comparison, note that by equation (5.2)
we have
n
Y 1 Y
√ n−1
2
ζ(i)
2i−1 i! i=2
vol(Γ\G)
i=1
=
.
(3)
vol(SLn (Z)\X) =
i
n
Y
vol(SOn )
π2
n
(n−1)(
+1)
4
2
Γ( 2i )
i=2
11
By Harder’s formula, we obtain that this volume in the canonical normalization is given by
n−1
Y
vol1 (SLn (Z)\X) =
i!
n
Y
i=1
i=2
(2π)
n(n+3)
2
ζ(i)
2τ n!
,
(4)
where τ = n if n is odd and τ = n − 1 if n is even.
We see that these volumes differ by a factor given by
2
vol1 (SLn (Z)\X)
=
C1 (n) =
vol(SLn (Z)\X)
n2 −5n−2 −τ
4
n−1
Y 2
i!
i=1
n!π
n2 +5n+2
4
n
i ,
Y
Γ
2
i=2
(5)
where τ = n if n is odd and τ = n − 1 if n is even. We note that again
by using Stirling’s formulas, we obtain that C1 (n) grows assymptotically with
2
n like eκn , for some positive constant κ.
The same renormalization can be applied to (1) in order to obtain the volumes of Siegel sets in the symmetric spaces with respect to the standard normalization of the measure.
6
Bounding the number of intersecting domains
Another relevant consequence of this work is the following corollary:
Corollary 6.1. Let N be the cardinality of the set I := {γ ∈ Γ; γΣ ∩ Σ 6= ∅},
vol(Σ)
where Σ = Σ 21 , √2 . Then N ≥ C(n) = vol(Γ\G)
.
3
Proof. As Σ is a S
Siegel set, it must contain a fundamental domain F for Γ. We
affirm that Σ ⊂
γF.
γ∈I
Indeed, given x ∈ Σ, if x ∈ F, there is nothing to prove. If x ∈
/ F, as the
images of F tesselate SLn (R) we must have x ∈ γF, for some Id 6= γ ∈ Γ. As
γF ⊂ γΣ, we obtain x ∈ γΣ ∩ Σ, and thus γ ∈ I. Therefore the inclusion above
is true.
From this we obtain N vol(Γ\G) = N vol(F) ≥ vol(Σ) and thus N ≥ C(n),
as stated.
In his recent work [8], Martin Orr shows in a more general setting that given
a reductive algebraic group G defined over Q, a general Siegel set Σ ⊂ G(R)
for some arithmetic subgroup Γ ⊂ G(Q), and θ ∈ G(Q), there exists an upper
bound for the height of elements γ ∈ Γ such that θΣ ∩ γΣ 6= ∅. The height of
an element is defined by:
H(γ) = max H(γij ),
1≤i,j≤n
where given a rational number a/b, H(a/b) is defined as the maximum of the
absolute values of a and b. Orr shows that, given any element γ of the set
ΣN,D := ΣΣ−1 ∩ {γ ∈ G(Q), detγ ≤ N and the denominators of γ are ≤ D} ,
12
there exists some constant C1 , depending on the group G, on the Siegel set Σ
and on the way the group G is embedded in some GLn (R), such that
2
H(γ) ≤ C1 N n Dn ,
where N = |detγ| and D is the maximum of the denominators of entries of γ.
Note that for Γ = SLn (Z), the set I defined above is contained in ΣN,D .
In this section we are going to compare this result with ours, i.e., to see what
happens in the case when G = SLn (R) and Γ = SLn (Z). Note that in this case,
for any γ ∈ Γ, we have N = |detγ| = 1 and also D = 1 because the entries of γ
are all integers. Thus Orr’s result gives us, for this case,
H(γ) ≤ C1 (n).
By the definition, the height of an element γ ∈ SLn (Z) is equal to |γ|max .
Therefore, his result turns to
|γ|max ≤ C1 (n), for any γ ∈ ΣΣ−1 .
By Example 1.6 on page 5 of [3], the set {γ ∈ SLn (Z); kγk ≤ C1 (n)} has
2
cardinality of assymptotic order cn C1 (n)(n −n) , with cn → 0 as n → ∞. Thus
if we assume that n is sufficiently large, we can suppose that cn < for some
> 0 fixed. Therefore, we have
2
|{γ ∈ SLn (Z); kγk ≤ C1 (n)}| ≺ C1 (n)(n
−n)
,
where the notation f (n) ≺ g(n) used above means that there exists a positive
constant C such that for sufficiently big n, we have f (n) ≤ Cg(n).
Note that the result in [3] is proved for the Euclidean norm k.k in Mn×n and
we know that kγk ≤ n |γ|max . Thus
2
|{γ ∈ SLn (Z); |γ|max ≤ C1 (n)}| ≺ (nC1 (n))(n
−n)
.
We are going to show that
C1 (n) ≤ e
From this we obtain that |I| ≺ e
n4
2
ln(n)
n2 −n
ln(n)
2
.
. Hence we have:
Corollary 6.2. For Γ = SLn (Z) in SLn (R) and I defined above, there exist
constants c1 , c2 > 0 such that
3
ec1 n ≤ |I| ≤ ec2 n
4
ln(n)
.
In order to obtain the second inequality we adapt the proofs in [8] for the
SLn (R) case, with the difference that we give explicit values for the constants.
Definition 6.1. Let γ ∈ I. From this element, we can define:
• A partition of {1, . . . , n} (with respect to γ) is a list of disjoint subintervals
of {1, . . . , n}, which we call components, whose union is all of {1, . . . , n}
and such that:
13
– γ is block upper triangular with respect to the chosen partition;
– γ is not block upper triangular with respect to any other finer partition of {1, . . . , n};
2
• A leading entry of γ is a pair (i, j) ∈ {1, . . . , n} such that γij is the
leftmost non-zero entry of the i-th row of γ.
For a concrete description of what are the possible partitions in the GL3
case see Section 3.2 of [8].
We will make use of the following lemma whose proof can be found in [8]:
Lemma 6.1. If i, j are in the same component, then there exists a sequence of
indices i1 , . . . , is such that i1 = i, is = j and
(∗) For every p ≤ s − 1, either ip ≤ ip+1 or (ip , ip + 1) is a leading entry.
In the proof of the following lemmas for the GLn case, Martin Orr uses the
notation A B meaning that there exists a constant C, depending on n, such
that |A| ≤ C |B|. Our point here is to compute such constants so that we can
make explicit the value of C1 (n).
√
Lemma 6.2. If (i, j) is a leading entry of γ, then αj ≤ nβi .
Proof. For any γ ∈ ΣΣ−1 , we can write γ = νβκα−1 µ−1 , with κ ∈ SOn ,
ν, µ ∈ N 12 and α, β ∈ A √2 . This gives us the equation γµα = νβκ. We will
3
compare the lengths of the i-th rows on each side of this equation.
As κ ∈ SOn , multiplying by κ on the right does not change the length of
each row. If we expand out lengths we obtain
n X
n
n
X
X
2 2
γiq µqp αp2 =
νip
βp .
p=1
q=1
p=1
As ν is upper triangular, the non-zero terms on the right hand side of the
last equation must have p ≥ i. By the definition of At , for all p ≥ i we have
βp ≤
1
βi ≤ βi ,
t(p−i)
where in the second inequality we used that t =
Since ν ∈ N 21 , |νip | ≤ 1 for any i, p. Alltogether,
n
X
2 2
νip
βp ≤
p=1
n
X
p=1
2 2
νip
βp ≤
n
X
√2
3
and p ≥ i imply
1
t(p−i)
≤ 1.
βp2 ≤ (n − i)βi2 ≤ nβi2 .
p≥i
On the other hand, by looking at the left hand side of the equation, we
obtain:
n
n X
n
X
X
2
γiq µqj αj ≤
γiq µqp αp2 .
q=1
p=1
q=1
As (i, j) is a leading entry, we can only have γiq 6= 0 if q ≥ j. But as µ is upper
triangular, µqj 6= 0 implies q ≤ j. Thus the only non-zero term in the first sum
is the one for q = j and then we get
n
X
2 2 2
2 2
γiq µqj αj2 = γij
µjj αj = γij
αj .
q=1
14
Note that γij 6= 0 and that as γ has integer entries, we must have |γij | ≥ 1,
2
which implies γij
≥ 1.
Altogether, we obtain
√
2
αj2 ≤ αj2 γij
≤ nβi2 ⇒ αj ≤ nβi ,
from what we conclude the proof.
Lemma 6.3. For all k ∈ {1, . . . , n}, αk ≤
√
nβk .
Proof. We affirm that there must exist a leading entry (i, j) such that j ≤ k ≤ i.
To prove this notice that as γ is invertible, there must exist i ≥ k such that
the i-th row of γ contains a non-zero entry in the k-th column or to its left
(otherwise the leftmost k columns of γ would have rank less than k). Choose j
so that γij is the leading entry of γ in the i-th line and it will satisfy j ≤ k as
claimed.
By Lemma 6.2 and by the definition of At we obtain
√
√
√
1
1
αk ≤ (k−j) αj ≤ nβi ≤ n (i−k) βk ≤ nβk .
t
t
√
Lemma 6.4. For all j ∈ {1, . . . , n}, βj ≤ ( n)n−1 αj .
Proof. As α and β are diagonal with positive real entries, we have (by using
Lemma 6.3 in the inequality)
βj det(α) = βj
n
Y
Y
√
√
αk ≤ βj αj ( n)n−1
βk = ( n)n−1 αj det(β).
k=1
But as det(β) = det(α) = 1,
k6=j
√
βj ≤ ( n)n−1 αj
and the lemma is proved.
√ 2
Lemma 6.5. If i and j are in the same component, βj ≤ ( n)n −n αi .
Proof. We can apply Lemma 6.1 to obtain a sequence i1 = i, . . . , is = j such
that for any p ∈ {1, . . . , s} , we have either ip ≤ ip+1 or (ip , ip+1 ) is a leading
entry. We take this subsequence as the
√ smallest possible.
If ip ≤ ip+1 then as α ∈ At and ( n)n ≥ 1, we get
√
αip
≥ tip+1 −ip ≥ 1 ⇒ αip+1 ≤ αip ≤ ( n)n αip .
αip+1
On the other hand if (ip , ip+1 ) is a leading entry then by Lemmas 6.2 and 6.4
we have
√
√
αip+1 ≤ nβip ≤ ( n)n αip .
If we apply the last inequality successively we get to
√
αj = αis ≤ ( n)n(s−1) αi .
Now we just apply Lemma 6.4 and notice that s ≤ n to obtain
√
√ 2
βj ≤ ( n))n−1 αj ≤ ( n)n −1 αi .
15
We write
Q = {g ∈ G; g is block upper triangular according to the components of γ} ;
L = {g ∈ G; g is block diagonal according to the components of γ} .
We affirm that κ ∈ L. Indeed, as the matrices γ, µ, α, β and ν are in Q by
the construction, we also have κ ∈ Q. On the other hand, if a matrix is block
upper triangular and is also orthogonal, then it is block diagonal. Thus κ ∈ L.
Lemma 6.6. If i, j ∈ {1, . . . , n}, then |γij | ≤ C1 (n) = n
n2 −n
2
.
Proof. Write γ = νβκα−1 µ−1 . Because α, β are diagonal, the pq-th entry of
βκα−1 is βp κpq αq−1 .
If p and q are not in the same component, as κ ∈ L, we get that κpq = 0.
On the other hand, if they are in the same component, then by Lemma 6.5
√ 2
βp κpq αq−1 ≤ κpq ( n)n −1 .
By the definition of SOn , |κ|max ≤ 1 for every κ ∈ SOn . Therefore
√ 2
βp κpq αq−1 ≤ ( n)n −1 .
As we have µ, ν ∈ N 12 , we have |µ|∞ , |ν|∞ ≤ 1. Altogether, we obtain
√ 2
|γij | ≤ ( n)n −1 .
Therefore we conclude the proof that H(γ) ≤ C1 (n), where
√ 2
n2 −1
C1 (n) = ( n)n −1 = e 2 ln(n)
and this finishes the proof of Corollary 6.2.
Acknowledgements
I would like to thank Professor Mikhail Belolipetsky for several suggestions on
the development of this paper and also on the text. I also thank Paul Garret
and Martin Orr for their very helpful works and for always answering my emails
with good suggestions, and Cayo Dória for helping me to understand better
some topics. Finally, I also thank the refferee for carefully reading the paper
and for giving suggestions that improved the presentation of the results.
References
[1] Borel, A.: Introduction aux Groupes Arithmètiques. Hermann, Paris (1969).
[2] Borel, A. and Harish-Chandra.: Arithmetic subgroups of algebraic groups.
Ann. of Math. 75, 485–535 (1962).
16
[3] Duke, W.; Rudinick, Z. and Sarnak, P.: Density of Integer Points on Affine
Homogeneous Varieties. Duke Math. J., Vol.71, No.1, 143-179 (1993).
[4] Garret, P.: Volume of SLn (Z)\SLn (R) and Spn (Z)\Spn (R). Paul Garrett’s
homepage
http://www-users.math.umn.edu/∼garrett/m/v/volumes.pdf
(2014). Accessed 07 November 2017.
[5] Habegger, P. and Pila, J.: Some unlikely intersections beyond André–Oort.
Compos. Math. 148, 1-27 (2012).
[6] Harder, G.: A Gauss-Bonnet formula for discrete arithmetically defined
groups. Ann. Sci. Ec. Norm. Supér. 4e série, tome 4, n° 3, 409-455 (1971).
[7] Morris, D. W.: Introduction to Arithmetic Groups. Deductive Press, United
States (2015).
[8] Orr, M.:
Height bounds
arXiv:1609.01315v3 (2016).
and
the
Siegel
property.
Preprint,
[9] Siegel, C.L.: Einführung in die Theorie der Modulfunktionen n-ten Grades.
Math. Ann 116, 617–657 (1939).
[10] Siegel, C.L.: A Mean Value Theorem in Geometry of Numbers. Annals of
Mathematics Vol 45, No 2 (1945).
[11] Siegel, C.L.: Lectures on the Geometry of Numbers. Springer-Verlag, Berlin
(1989).
[12] Stein, E. M. and Weiss, G. L.: Introduction to Fourier Analysis on Euclidean Spaces. Princeton Math. Ser. 32, Princeton Univ. Press, Princeton,
NJ (1971).
[13] Venkataramana, T.N.: Lattices in Lie Groups. In Workshop on Geometric
Group Theory, India (2010).
[14] Young, R.: The Dehn function of SLn (Z). Ann. of Math. 177, 969–1027
(2013).
17
| 4math.GR
|
1
Degrees-of-Freedom of the MIMO
Three-Way Channel with Node-Intermittency
Joachim Neu, Anas Chaaban, Aydin Sezgin, Mohamed-Slim Alouini
Abstract
arXiv:1708.08161v1 [cs.IT] 28 Aug 2017
The characterization of fundamental performance bounds of many-to-many communication systems in which
participating nodes are active in an intermittent way is one of the major challenges in communication theory. In
order to address this issue, we introduce the multiple-input multiple-output (MIMO) three-way channel (3WC)
with an intermittent node and study its degrees-of-freedom (DoF) region and sum-DoF. We devise a non-adaptive
encoding scheme based on zero-forcing, interference alignment and erasure coding, and show its DoF region (and
thus sum-DoF) optimality for non-intermittent 3WCs and its sum-DoF optimality for (node-)intermittent 3WCs.
However, we show by example that in general some DoF tuples in the intermittent 3WC can only be achieved
by adaptive schemes, such as multi-hop or decode-forward relaying. This shows that non-adaptive encoding
is sufficient for the non-intermittent 3WC and for the sum-DoF of intermittent 3WCs, but adaptive encoding
is necessary for the DoF region of intermittent 3WCs. Our work contributes to a better understanding of the
fundamental limits of multi-way communication systems with intermittency and the impact of adaptation therein.
Index Terms
Degrees-of-freedom, three-way channel, intermittency, multiple-input multiple-output (MIMO), interference
alignment, zero forcing, relaying.
I. I NTRODUCTION
In multi-way communication scenarios multiple nodes communicate with each other, each acting as a source,
a destination, and possibly a relay at the same time. This mode of communication is especially important for
future systems employing full-duplex and device-to-device (D2D) communication, [2]–[4]. It is an important
technique for efficient resource utilization that is expected to gain more prominence in future communication
systems, especially with the rise of mesh networks, e.g., in industrial and vehicular networks.
Parts of the results of this paper were presented at ISIT 2017 [1].
The work of J. Neu, a student at Technische Universität München (TUM), 80333 München, Germany, was conducted during a research
internship at King Abdullah University of Science and Technology (KAUST). Email: joachim.neu@tum.de.
A. Chaaban and M.-S. Alouini are with the Division of Computer, Electrical, and Mathematical Sciences and Engineering (CEMSE) at
King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia. Email: {anas.chaaban,slim.alouini}@kaust.edu.sa.
A. Sezgin is with the Institute of Digital Communication Systems at the Ruhr-Universität Bochum (RUB), 44780 Bochum, Germany.
Email: aydin.sezgin@rub.de.
This work was supported in part by the German Research Foundation (DFG), under grant SE 1697/16.
2
1
1
2
1
1
1
τ
3
2
(a) no intermittency
τ
1
3
(b) node-intermittency
Fig. 1: MIMO 3WC with no intermittency such that all nodes are always connected (a) and node-intermittency
where node 1 is available only τ fraction of the time (b)
Several multi-way communication scenarios have been studied in the literature, [5]. It started with the twoway channel which was first studied by Shannon in [6] and subsequently in [7]–[10] for instance. Then, the
scope was extended to two-way networks where two groups of nodes communicate with each other in a two-way
fashion [11]–[13], and two-way relay networks where two nodes communicate with each other in a two-way
fashion via a relay node [14]–[17]. This line of research has been further extended to multi-way networks
where multiple nodes communicate with each other in a multi-way fashion, each node being a source and a
destination at the same time [18]–[22], and to multi-way relay networks where the same communication as in
multi-way networks takes place via a relay node [23]–[34].
A. The Three-Way Channel with Intermittency
In this work, we focus on the multiple-input multiple-output (MIMO) three-way channel (3WC) which can
be described as follows: Consider a system consisting of three terminals communicating with each other in a
multi-way fashion, e.g., two D2D user terminals and a base station (BS) where the D2D users communicate
with each other while exchanging signals with the BS (control signals or data). This 3WC is an extension of
Shannon’s two-way channel [6] and has been studied in [20]–[22].
Therein, it is assumed that the three nodes are connected all the time (Fig. 1a). In practice however,
connectivity might be intermittent. For instance, a pair of D2D users, commonly chosen to be nearby users
[3], [4], might be both disconnected from the BS due to shadowing (Fig. 1b). Future generations of mobile
communication systems (e.g., using mmWaves, where line-of-sight (LOS) propagation will become dominant)
are expected to be heavily susceptible to this type of shadowing. In another scenario, the D2D users might
operate in an underlay mode over a resource block used by the BS to communicate to cellular users (CUs). The
BS connects to the D2D users whenever it does not communicate with a CU, and disconnects from the D2D
users otherwise (see Fig. 2). Note that D2D users are chosen so that they cause/receive negligible interference
(relative to the desired signals) to/from other nodes using the same resource block [35], [36]. In both cases the
two links from the D2D users to the BS are jointly intermittent, i.e., both are available or blocked at the same
time. We call this node intermittency and call the BS an intermittent node (from the D2D users’ perspective).
Motivated by these scenarios, we study the 3WC with this type of intermittency. The impact of intermittency
in various networks was studied in [37]–[40] for instance.
3
D2D
ere
interf
gible
negli
BS
D2D
BS
nce
D2D
(a) BS serving D2D users
CU
D2D
(b) BS serving CU
Fig. 2: A D2D pair sharing the same resources with a cellular user (CU), where the BS communicates with
the D2D pair part of the time (a) and with the CU the rest of the time (b). The D2D pair is far enough from
both the BS and the CU and thus causes/receives negligible interference (dotted).
B. Degrees-of-Freedom and Intermittency
In many previously mentioned works, the focus is generally on the capacity of the studied network. Since
finding the capacity is elusive in most cases, some works (and also this work) focus on the degrees-offreedom (DoF) which provide a good capacity approximation at high signal-to-noise ratio (SNR) [41], thereby
highlighting the interaction between the signals of the different nodes while diminishing the impact of noise.
This is of interest since state-of-the-art wireless communication systems operate in a regime where they are
essentially interference-limited rather than noise-limited.
The concept of intermittency as a form of channel impairment also fits well with the philosophy of DoFs:
With increasing SNR, signal components ‘harden’ in the sense that some allow (almost) noise- and interferencefree communication at a rate that scales with SNR on a logarithmic scale, while others are hopelessly burried
in uncancelable interference and are therefore useless. This effect is exactly what the DoF perspective captures as it essentially counts available Shannon-Hartley communication ‘units’. Intermittency is the channel
impairment that goes well together with this ‘all or nothing’ perspective, capturing the notion that some signal
dimensions might become useless due to stochastic processes in the channel, such as shadowing of dominant
LOS components.
C. Scope of this Work
Here, we study the impact of node-intermittency on the DoF region and sum-DoF, i.e., the capacity scaling
versus SNR in a dB scale, of a full-duplex MIMO 3WC. In this MIMO network, each node generally has two
independent messages, each intended for one of the remaining two nodes. We pay particular attention to the
necessity (or the lack thereof) of adaptive encoding for reaching DoF region/sum-DoF. Adaptive encoding
enables cooperative communication schemes by allowing the transmit signal of a node to depend on its
previously received signals, which can be interpreted as a form of feedback. In contrast, with non-adaptive
encoding transmit signals depend only on the messages to be sent, and cooperation (e.g., in the form of
4
relaying) is excluded. The issue of (non-)adaptive encoding has been studied for other networks earlier in
[9]–[11] for instance.
We assume that nodes have causal knowledge of the intermittency state of adjacent links. This can be
obtained by estimating the connectivity from the receive signals (e.g., signal strength). Note that in some cases
the intermittency state can be known without the need for estimation, occasionally even ahead of time, e.g., in
the scenario of D2D/CU/BS users, where the BS knows its scheduling of users in advance and can anticipate
when it will not be able to receive the D2D user signals.
D. Outline and Overview of Results
After introducing the details of the system model in Section II and highlighting the main results in Section III,
we examine the (node-)intermittent 3WC in Section IV. We devise a non-adaptive encoding scheme based on
zero-forcing (ZF), interference alignment (IA) and erasure coding (EC) and derive its achievable DoF region
and sum-DoF. We present the genie-aided converse techniques used to derive DoF region and sum-DoF upper
bounds, both under non-adaptive and adaptive encoding. We conclude that for the intermittent 3WC the presented
non-adaptive scheme is sum-DoF optimal, so adaptation is not necessary to achieve sum-DoF. Then, we provide
examples of adaptive relaying schemes that can achieve a DoF region point that no non-adaptive scheme can
achieve. This shows that adaptive schemes can achieve strictly larger DoF regions, and therefore adaptation
is required to achieve the DoF region of intermittent 3WCs. To complete the picture, we examine the nonintermittent 3WC as special case of intermittent 3WCs in Section V. We show that for the non-intermittent 3WC
the presented scheme is DoF region optimal (and thus also sum-DoF optimal) and therefore adaptive encoding
is not required. This reveals an interesting interplay between intermittency and adaptation. In Section VI we
provide conclusive remarks and directions for future research.
E. Notation
Throughout the paper, we use xni := (xi,1 , . . . , xi,n ) for some index i, and xni,` := (xi,` , . . . , xi,n ). We use
regular letters to denote scalar-valued quantities, boldface letters to denote vector- und matrix-valued quantities;
lowercase letters for scalar and vector values (e.g., realizations of random variables), uppercase letters for matrix
values and for random variables. The N × N identity matrix is denoted IN , the N × N all-zero matrix is 0N .
We write X ∼ CN (0, Q) to indicate that X is a multivariate complex Gaussian random variable with zero
mean and covariance matrix Q, and S ∼ Bern(τ ) to indicate that S is Bernoulli distributed with Pr[S = 1] = τ
and Pr[S = 0] = 1 − τ =: τ . We write x+ to denote max{0, x} for some x ∈ R, and H † , H T , H H , and
span(H) to denote the Moore-Penrose pseudo-inverse, the transpose, the Hermitian transpose, and the subspace
spanned by the columns of the matrix H. By log(x) we denote the logarithm of x to base 2, by i → j the
communication from node i to node j one-way, and by i ↔ j both i → j and j → i. By pX (x) we denote the
probability density function (PDF) of random variable X.
II. T HE MIMO T HREE -WAY C HANNEL WITH N ODE -I NTERMITTENCY
Throughout this section we assume i, j, k ∈ {1, 2, 3} and mutually distinct, and n is the number of channel
accesses. The MIMO 3WC with node-intermittency is comprised of three terminals 1, 2 and 3 communicating
5
with each other in full-duplex mode over a shared medium. Each node i has two messages wij and wik
(wi := (wij , wik )) to be delivered to the remaining nodes j and k, and two messages ŵji and ŵki to be
decoded from the receive signals (Fig. 3). Each message wij is a realization of the random variable Wij . All
random variables Wij are independent. In the (node-)intermittent 3WC one link is always available and two
links are jointly intermittent with probability of being available τ (Fig. 1b and 3).
Our objects under investigation (sum-DoF and DoF region of the intermittent 3WC – both are introduced
in the sequel) depend on how the numbers of antennas at each node relate to each other, i.e., whether the
intermittent node has most, second most, or least antennas. To reduce the number of cases one has to analyze,
yet study the system without loss of generality (w.l.o.g.), two symmetries come to mind that can be exploited:
Either a) fix a certain node to be intermittent (e.g., node 1 is intermittent), and investigate all possible relations
among the numbers of antennas, or b) fix a relation between the numbers of antennas, and allow any one of
the three nodes to be intermittent. The respective remaining cases follow by renaming. Preliminary work [1]
fixed node 1 to be intermittent and further assumed a relation on the numbers of antennas, which is not w.l.o.g.
We fix node 1 to be intermittent, but allow for any combination of numbers of antennas, which is approach a)
and w.l.o.g.
Node i is equipped with Mi antennas that are used for reception and transmission simultaneously. We assume
channel accesses of the nodes are synchronized and time-discretized: At time instance ` the transmit signal
xi,` ∈ CMi is a realization of a random vector Xi,` satisfying the power constraint
n
X
E[kXi,` k22 ] ≤ nP.
(1)
`=1
The receive signals yi,` ∈ CMi are (Fig. 4)
y1,`
0M1
y = s H
2,` ` 12
y3,`
s` H13
s` H21
s` H31
0M2
H32
H23
0M3
x1,`
z1,`
x + z .
2,` 2,`
x3,`
z3,`
(2)
Hij ∈ CMj ×Mi represents the channel matrix from node i to node j and is constant over time and known
to all nodes in advance. The elements of these matrices are drawn independently from the same continuous
distribution, such that rank(Hij ) = min(Mj , Mi ) almost surely. zi,` ∈ CMi is a realization of the noise process
Zi,` ∼ CN (0, σ 2 IMi ) independent and identically distributed (i.i.d.) with respect to (w.r.t.) `, and s` ∈ {0, 1}
is a realization of the intermittency state process S` . S` ∼ Bern(τ ) is assumed to be i.i.d. w.r.t. `. The state
sequence sn is causally known at all nodes (i.e., in time instance ` all nodes know s`−1 ). All random variables
Hij , Zin and S n are mutually independent. We denote ρ :=
P
σ2
and call it SNR (signal-to-noise-power-ratio)
throughout the paper.
The messages Wij are each uniformly distributed over Wij = {1, . . . , |Wij (ρ)|}. Using an encoding function
Ei,` node i constructs xi,` either from (wij , wik ) (non-adaptive encoding) or from (wij , wik , yi`−1 ) (adaptive
encoding). After n transmissions (where n is the code length), node i decodes its desired messages using a
decoding function Fi to obtain (ŵji , ŵki ) = Fi (sn , yin , wij , wik ). Transmission is considered successful if all
messages are recovered successfully (wij = ŵij ), otherwise an error is reported. The average over all messages
of the error probability is denoted by Pe,n .
6
W12 , W13
Ŵ21 , Ŵ31
Node 1
S
Node 2
W21 , W23
Node 3
Ŵ12 , Ŵ32
W31 , W32
Ŵ13 , Ŵ23
Fig. 3: Every node i in the MIMO 3WC with node-intermittency sends messages wij and wik to nodes j and
k, respectively (with i, j, k ∈ {1, 2, 3} mutually distinct). W.l.o.g. node 1 is assumed to be intermittent.
M1
Y1
X1
H12
Z1
H13
S
S
Z3
H21
X2
Y3
H23
H31
M2
M3
H32
Y2
Z2
X3
Fig. 4: AWGN channel model of the shared medium in the MIMO 3WC with node-intermittency, with channel
inputs Xi and outputs Yi , channel gains Hij , noise Zi and intermittency state S (time index ` omitted)
A rate tuple
R(ρ) := (R12 (ρ), R13 (ρ), R21 (ρ), R23 (ρ), R31 (ρ), R32 (ρ)) ∈ R6+
with Rij (ρ) =
log(|Wij (ρ)|)
n
(3)
is said to be achievable if there exists a sequence of encoder-decoder pairs for
increasing code length n, where Pe,n → 0 as n → ∞. The capacity region C(ρ) is the set of all achievable
rate tuples.
The DoF region D is the set of achievable DoF tuples
d := (d12 , d13 , d21 , d23 , d31 , d32 ) ∈ R6+
(4)
7
defined as in [42]. Roughly speaking, if a rate tuple R(ρ) as a function of ρ is achievable, i.e., R(ρ) ∈ C(ρ) for
all ρ > 0, then the DoF tuple d with dij = lim supρ→∞
Rij (ρ)
log(ρ)
is achievable. We denote DoF regions with D
and use suitable subscripts when further restricting assumptions apply (e.g., under non-adaptive encoding). We
P
define the corresponding sum-DoF as dsum = maxd∈D i,j∈{1,2,3},i6=j dij . The DoF perspective only captures
rate contributions that are non-vanishing relative to log(ρ) as we let ρ → ∞. It neglects vanishing rate portions
f (ρ) that grow sublinear in log(ρ) and are therefore o [log(ρ)], i.e., where limρ→∞
f (ρ)
log(ρ)
= 0.
III. M AIN R ESULTS
In this section, we summarize the main results of this paper. We denote the DoF region of the intermittent
3WC under adaptive encoding by DI , the DoF region of the intermittent 3WC under non-adaptive encoding
I
I
, and the sum-DoF by dIsum . Obviously, DA
⊆ DI . We denote the DoF region of the non-intermittent
by DA
3WC by DN and the sum-DoF by dN
sum . In Section IV-A we devise a non-adaptive encoding scheme whose
I
achievable DoF region we denote by DIB,A
. We start with this achievable DoF region given in the following
theorem.
I
satisfying the
Theorem 1 (DoF Region Inner Bound for Node-Intermittent 3WC). All DoF tuples d ∈ DIB,A
following set of inequalities are achievable in the node-intermittent 3WC using non-adaptive encoding:
max{d12 + d13 , d21 + d31 } ≤ τ M1
max{d21 + τ d23 , d12 + τ d32 } ≤ τ M2
max{d31 + τ d32 , d13 + τ d23 } ≤ τ M3
max{d12 + d13 + τ d23 , d21 + d31 + τ d32 } ≤ τ max {M1 , M3 }
max{d12 + d13 + τ d32 , d21 + d31 + τ d23 } ≤ τ max {M1 , M2 }
max{d12 + d31 + τ d32 , d21 + d13 + τ d23 } ≤ τ max {M2 , M3 }
min{d12 , d13 , d21 , d23 , d31 , d32 } ≥ 0
I
Therefore, DIB,A
constitutes an inner bound on the DoF region of the node-intermittent 3WC, such that
I
I
DIB,A
⊆ DA
⊆ DI .
Proof. This theorem follows by the construction in Section IV-A.
Subsequently we investigate whether this non-adaptive scheme is optimal. For the intermittent 3WC it turns
out to be sum-DoF optimal, establishing the sum-DoF of the intermittent 3WC and the fact that adaptive
encoding is not necessary to achieve it.
Theorem 2 (Sum-DoF of Node-Intermittent 3WC). A non-adaptive encoding scheme achieves the sum-DoF of
the node-intermittent 3WC given by
dIsum = 2τ min{M2 , M3 } + 2τ (M1 + M2 + M3 − min{M1 , M2 , M3 } − max{M1 , M2 , M3 }).
Proof. The theorem follows from achievability and converse results developed in Sections IV-B1 and IV-B2
(Lemmas 1 and 2).
8
From a DoF region perspective however it turns out that non-adaptive schemes cannot be optimal, and
therefore the presented scheme is not DoF region optimal in the intermittent 3WC.
Theorem 3 (Necessity of Adaptive Encoding for DoF Region of Node-Intermittent 3WC). Adaptive encoding
is required to achieve the DoF region of the node-intermittent 3WC, i.e.
I
6= ∅
D I \ DA
Proof. The theorem follows from an upper bound on d31 under non-adaptive encoding, presented in Section IV-C1, and counterexamples of adaptive schemes exceeding this bound, devised in Section IV-C2.
Theorems 2 and 3 show that non-adaptive encoding is sufficient to achieve sum-DoF, but not sufficient to
achieve the DoF region of the intermittent 3WC. This is particularly interesting in light of the fact, that nonadaptive encoding is sufficient to achieve the DoF region of the non-intermittent 3WC, which the presented
non-adaptive scheme does.
Theorem 4 (DoF Region of Non-Intermittent 3WC). The DoF region of the non-intermittent 3WC DN (with
M1 ≥ M2 ≥ M3 w.l.o.g.) is given by
max{d12 + d13 + d23 , d12 + d13 + d32 } ≤ M1
max{d21 + d31 + d32 , d21 + d31 + d23 } ≤ M1
max{d21 + d13 + d23 , d12 + d31 + d32 } ≤ M2
max{d31 + d32 , d13 + d23 } ≤ M3
min{d12 , d13 , d21 , d23 , d31 , d32 } ≥ 0
and achievable using a non-adaptive encoding scheme.
Proof. The theorem follows from Lemmas 5 and 6 in Sections V-A and V-B.
This complements earlier work [18] that characterized the sum-DoF of the non-intermittent 3WC and showed
its achievability using non-adaptive encoding. Our results show that intermittency does not decrease sum-DoF
as long as node 1 has the smallest number of antennas. Otherwise, intermittency does affect sum-DoF, which
is affine-linearly increasing in τ .
Fig. 5 and 6 plot sum-DoF of non-intermittent and node-intermittent 3WC against M3 , for different values
of τ and M2 , respectively, in a scenario where node 1 has the largest number of antennas. The resulting graphs
are piecewise linear with a change in slope at M3 = M2 . For M3 < M2 the sum-DoF of the 3WC is a constant
depending only on M2 , for M3 > M2 it is linear in M3 . The slope of the sum-DoF of the intermittent 3WC
is proportional to τ for M3 < M2 and proportional to τ for M3 > M2 .
The sum-DoF of the intermittent 3WC with 0 < τ < 1 is a convex time-sharing combination of the two
extreme cases τ = 0 and τ = 1 (Fig. 5). Note, that such a time-sharing combination is the best any non-adaptive
coding scheme can achieve, when each node knows the intermittency state ahead of time and codes optimally
for the respective state in each time instance `. The achievability scheme presented in this work does not use
intermittency state information at all, yet achieves the same sum-DoF, averaging out intermittency state through
9
M1 = 10, M2 = 7
20
18
14τ + 18τ = 15
Sum-DoF
15
14
14
10
6τ + 14τ = 8
6
5
0
0
2
3WC
τ = 0.00
τ = 0.25
τ = 1.00
4
6
8
10
M3
Fig. 5: Sum-DoF of 3WC (red) and intermittent 3WC (blue) with varying τ (marks show case τ = 0.25 as
convex combination of extreme cases τ = 0 and τ = 1)
M1 = 10, τ = 0.7
20
Sum-DoF
15
10
M2
M2
M2
M2
M2
M2
5
0
0
2
4
6
8
=2
=5
=9
=2
=5
=9
10
M3
Fig. 6: Sum-DoF of 3WC (red) and intermittent 3WC (blue) with varying M2
erasure coding. This shows that intermittency state information is dispensable for the non-adaptive scheme in
this case. Furthermore, note that the sum-DoF of the 3WC is larger than the sum-DoF of the intermittent 3WC
(Fig. 6).
In the sequel we provide detailed derivations and proofs of our main results highlighted in this section.
10
Node 1
S3 ∼ Bern(τ3 )
Node 2
S2 ∼ Bern(τ2 )
Node 3
S1 ∼ Bern(τ1 )
Fig. 7: Rationale behind the aliases s1,` := 1, s2,` := s3,` := s` , τ1 := 1, τ2 := τ3 := τ introduced in
Section IV-A: treating every link j ↔ k as potentially intermittent with intermittency state variable si,`
(marginally distributed as Bern(τi )) allows to derive general expressions for, e.g., yi,` based on xj,` , xk,` ,
sj,` and sk,` , independent of whether i = 1, i = 2 or i = 3
IV. N ODE I NTERMITTENCY
In this section we first introduce a non-adaptive ZF/IA/EC-based scheme and derive its achievable sumDoF and DoF region. We then show, using enhanced genie-aided bounds for both adaptive and non-adaptive
encoding, that this scheme is sum-DoF optimal, but not DoF region optimal. Furthermore, no non-adaptive
scheme can be DoF region optimal, since tighter outer bounds hold for non-adaptive schemes, that however can
be exceeded by adaptive schemes, as we show by examples of multi-hop and decode-forward relaying. This
establishes that adaptive encoding is necessary from a DoF region perspective, but non-adaptive encoding is
sufficient to achieve sum-DoF.
A. A Non-Adaptive Scheme Based on ZF, IA and EC
In this subsection we present a non-adaptive transmission scheme based on ZF, IA and EC that provides an
inner bound on sum-DoF and DoF region of 3WCs. Throughout this section we continue to assume i, j, k ∈
{1, 2, 3} and mutually distinct. For notational simplicity (capturing the symmetries inherent in the model thereby
avoiding case distinctions), we introduce the following aliases that will be resubstituted towards the end of the
section:
s1,` := 1
s2,` := s3,` := s`
τ1 := 1
τ2 := τ3 := τ
(5)
The idea behind these aliases is visualized in Fig. 7: Using these aliases we can, for instance, find a general
expression for the receive signal yi,` of node i in terms of the transmit signals xj,` and xk,` of nodes j and
k, and the intermittency states sk,` and sj,` (marginally distributed as Bern(τk ) and Bern(τj ), respectively) of
the links j ↔ i and k ↔ i, respectively. The fact that 2 ↔ 3 is not intermittent, and 1 ↔ 2 and 1 ↔ 3 are
jointly intermittent, is accounted for by the appropriate resubstitution at due time.
[ZF]
1) Encoding: Each node splits each message wij into wij
interference alignment, respectively. At node i, the four messages
[q]n
codewords xij
[q]
with symbols xij,` ∈ C
[q]
aij
[IA]
and wij
[q]
wij
to be sent via zero-forcing and
(q ∈ {ZF, IA}) are encoded into
[q]
each, for some vector lengths aij ∈ N0 . The symbols of these
11
TX space
Z12
Z13
A21
TX space
A31
Z21
Z23 A12 A32
Node 1
Node 2
Node 3
Z13 Z23 A31 A32
Z23
A21
A32
A12
τ
A12
τ
RX space
Fig. 8: Visualization of transmit (TX) signal spaces at nodes 1 and 2 and receive (RX) signal space at node 3
depending on intermittency state of 1 ↔ 3 where the first and second row are received with probability τ and
[IA]
[ZF]
τ , respectively (Zij denotes wij , Aji denotes wij , desired signals in red, interfering signals in blue)
codewords are chosen i.i.d. CN (0, pi Ia[q] ) respectively, where pi is the power. The power constraints on xni
ij
stated in Section II are satisfied by choosing
pi =
P
[ZF]
aij
+
[IA]
aij
[ZF]
+ aik
[IA]
.
(6)
+ aik
For encoding, the codes are designed to employ EC to be able to tolerate a certain number of symbol erasures
(e.g., caused by intermittency), by not using all codeword symbols for net user data, but deliberately adding
some redundancy. The rates and DoFs are thereby reduced accordingly. While for the non-intermittent 3WC
this additional layer of EC is not required, it is made use of for intermittent 3WCs to cope with intermittency.
2) Transmission: At time `, node i sends
h
X
xi,` =
[q]
[q]
[q]
[q]
Vij xij,` + Vik xik,`
i
(7)
q∈{ZF,IA}
[q]
[q]
where Vij ∈ CMi ×aij are pre-coding matrices with unit-norm column vectors. Zero-forcing is achieved by
[ZF]
choosing the Vij
such that
[ZF]
Hik Vij
[ZF]
Such matrices Vij
= 0.
(8)
[ZF]
exist if node i has enough antennas to send aij
streams to node j without interfering
with node k, i.e.
[ZF]
aij
≤ (Mi − Mk )+ .
(9)
To avoid any overlap of the different transmit signal subspaces, we require furthermore that
[ZF]
aij
[IA]
[ZF]
+ aij + aik
[IA]
+ aik ≤ Mi .
(10)
12
3) Decoding: Node i receives (Fig. 8)
yi,` = sk,` Hji xj,` + sj,` Hki xk,` + zi,`
(11)
[IA]
h
i
x
X
jk,`
[q] [q]
[q] [q]
=
sk,` Hji Vji xji,` + sj,` Hki Vki xki,` + Gi
+ zi,`
[IA]
xkj,`
q∈{ZF,IA}
[IA]
with Gi = [ sk,` Hji Vjk
[IA]
sj,` Hki Vkj
[ZF]
[ZF]
[ZF]
(12)
[ZF]
]. Note that the terms Hji Vjk xjk,` and Hki Vkj xkj,` vanished due to
the zero-forcing condition (8). The first summand represents the four desired signals from j → i and k → i,
the second summand represents occasional interference from j ↔ k, and the third summand is noise.
[q]n
To decode a desired signal xji , node i zero-forces the remaining signals by multiplying yin with a suitable
[q]
[q]
post-coder Tji ∈ Caji ×Mi with unit-norm row vectors satisfying:
[q]
[q]H
Tji Tji
[q]
Tji
h
[q]
Hji Vji
[ZF]
Hki Vki
[IA]
Hki Vki
[q]
= Ia[q]
(13)
ji
i
with q ∈ {ZF, IA} \ {q}
Gi = 0
[q]
[q]
rank(Tji Hji Vji ) = aji
(14)
(15)
Here, (14) ensures zero-forcing of the remaining three messages and the interference and (15) ensures post[q]
coding without loss of meaningful signal dimensions. The existence of such post-coders Tji is guaranteed as
long as the columns of
h
[ZF]
Hji Vji
[IA]
[ZF]
Hji Vji
Hki Vki
[IA]
Hki Vki
Gi
i
[IA]
(16)
[IA]
are linearly independent. Let γi be the dimension of span(Hji Vjk ) ∩ span(Hki Vkj ). Then, the dimension
[IA]
[IA]
of span(Gi ) is ajk + akj − γi , and the above linear independence is possible almost surely if we choose
[ZF]
aji
[IA]
[ZF]
+ aji + aki
[IA]
[IA]
[IA]
+ aki + (ajk + akj − γi ) ≤ Mi .
(17)
[q]
To minimize the impact of interference, we choose the pre-coders Vij such that all γi are maximized, i.e.,
we ‘maximally’ align the interference subspaces at the receivers. The γi cannot be chosen arbitrarily large,
the dimension of the intersection of the interference subspaces (γi ) is upper bounded by the dimensions of the
[IA]
[IA]
interference subspaces (ajk and akj ). Furthermore, γi needs to be smaller than the dimension of span(Hji )∩
span(Hki ), which is (Mj + Mk − Mi )+ almost surely. Therefore, we require that
[IA]
[IA]
γi ≤ min{ajk , akj , (Mj + Mk − Mi )+ }.
(18)
After post-coding, node i is left with the signals
[q]
[q]
[q]
[q]
[q]
yji,` = sk,` Tji Hji Vji xji,` + Tji zi,` .
(19)
The resulting channel is an erasure-Gaussian MIMO channel with erasure probability τ k , i.e., a channel whose
output is
[q]
[q]
[q]
[q]
[q]
Yji = Sk Tji Hji Vji Xji + Tji Zi
(20)
13
[q]
with random variables Sk ∼ Bern(τk ), Xji ∼ CN (0, pj Ia[q] ) and Zi ∼ CN (0, σ 2 IMi ). We treat this as a
ji
channel with state known causally to the receiver [43, ch. 7.4], such that for large n, the achievable rate over
[q]
[q]
this channel is the mutual information between Xji and (Yji , Sk ):
[q]
[q]
[q]
[q]
I(Xji ; Yji Sk ) = I(Xji ; Yji | Sk )
[q]
(21)
[q]
[q]
[q]
= τk I(Xji ; Yji | Sk = 1) + τ k I(Xji ; Yji | Sk = 0)
pj [q]
[q] [q]H
H [q]H
Tji
= τk log det Ia[q] + 2 Tji Hji Vji Vji Hji
ji
σ
(22)
(23)
[q]
Due to (6) and (15), this leads to a DoF of τk aji , and the code that achieves it is an EC.
[ZF]
4) Achievable DoF Region: For n large, i → j has a total of τk aij
[ZF]
dij = τk aij
[IA]
+ τk aij
DoFs per channel use,
[IA]
+ τk aij .
(24)
[q]
Collecting (9), (10), (17) and (18) as well as non-negativity of every aij , we obtain:
[ZF]
aij
[ZF]
aji
[IA]
[ZF]
+ aji + aki
[IA]
[ZF]
+ aij + aik
[IA]
[IA]
[IA]
+ aik ≤ Mi
(25)
[IA]
+ aki + (ajk + akj − γi ) ≤ Mi
[ZF]
aij
(26)
≤ (Mi − Mk )+
[IA]
(27)
[IA]
γi ≤ min{ajk , akj , (Mj + Mk − Mi )+ }
[q]
0 ≤ aij
(28)
(29)
Using (24), we obtain:
τj dij + τk dik ≤ τj τk Mi
[ZF]
[ZF]
τj τi dji + τk τi dki + τj τk djk + τk τj dkj − τi τj τk ajk − τi τk τj akj − τi τj τk γi ≤ τi τj τk Mi
[ZF]
τi (γi + ajk ) ≤ djk
(30)
(31)
(32)
γi ≤ (Mj + Mk − Mi )+ (33)
[ZF]
aij
[ZF]
≤ (Mi − Mk )+
min{aij , dij , γi } ≥ 0
(34)
(35)
Instantiating these constraints for every possible combination of i, j, k ∈ {1, 2, 3} mutually distinct, resubstituting all τi from (5), collecting the resulting bounds and eliminating redundant bounds, finally yields (for
both (i, i) ∈ {(2, 3), (3, 2)}):
[ZF]
d12 + d13 ≤ τ M1
(36)
di1 + τ dii ≤ τ Mi
(37)
[ZF]
(38)
d21 + d31 + τ d23 + τ d32 − τ a23 − τ a32 − τ γ1 ≤ τ M1
[ZF]
d1i + τ dii + d1i + di1 − τ a1i
[ZF]
− τ ai1
− τ γi ≤ τ Mi
(39)
[ZF]
(40)
[ZF]
(41)
0 ≤ (γ1 + aii ) ≤ dii
0 ≤ τ (γi + a1i ) ≤ d1i
14
[ZF]
0 ≤ τ (γi + ai1 ) ≤ di1
(42)
0 ≤ γ1 ≤ (M2 + M3 − M1 )+
(43)
0 ≤ γi ≤ (M1 + Mi − Mi )+
(44)
[ZF]
≤ (M1 − Mi )+
(45)
[ZF]
≤ (Mi − Mi )+
(46)
[ZF]
≤ (Mi − M1 )+
(47)
0 ≤ a1i
0 ≤ ai1
0 ≤ aii
In order to resolve the (.)+ expressions, we do the following for each of the twelve cases of Mi ≥ Mj +Mk ≥
Mj ≥ Mk and Mj + Mk ≥ Mi ≥ Mj ≥ Mk (for all possible combinations i, j, k ∈ {1, 2, 3} mutually distinct):
1) Instantiate the (.)+ expressions under the respective assumption on the numbers of antennas, therefore
[ZF]
some of the aij
and γi will be forced to zero.
[ZF]
2) Perform Fourier-Motzkin’s elimination to remove all remaining aij
and γi and obtain the achievable
DoF region.
We then combine the resulting achievable DoF regions into the following compact formulation:
max{d12 + d13 , d21 + d31 } ≤ τ M1
(48)
max{d21 + τ d23 , d12 + τ d32 } ≤ τ M2
(49)
max{d31 + τ d32 , d13 + τ d23 } ≤ τ M3
(50)
max{d12 + d13 + τ d23 , d21 + d31 + τ d32 } ≤ τ max {M1 , M3 }
(51)
max{d12 + d13 + τ d32 , d21 + d31 + τ d23 } ≤ τ max {M1 , M2 }
(52)
max{d12 + d31 + τ d32 , d21 + d13 + τ d23 } ≤ τ max {M2 , M3 }
(53)
min{d12 , d13 , d21 , d23 , d31 , d32 } ≥ 0
(54)
This region is achievable for tuples d with non-negative integer entries. Tuples with non-negative real entries
(such as the corner points of the region) are first approximated by non-negative rationals which then can be
achieved using symbol extension, as in [44].
I
. This proves Theorem 1.
The set of all DoF tuples d satisfying constraints (48) to (54) is denoted by DIB,A
What is the rationale behind the DoF region inner bound (48) to (54)?
The first three inequalities constrain the sum-DoF of outbound and inbound streams at each node, similar to
cut-set bounds. The next three inequalities follow this rule: For each of the three links 1 ↔ 2, 1 ↔ 3 and 2 ↔ 3
there are two DoF variables, one for each direction (i.e., d12 and d21 , etc.). For each link pick one direction.
There are eight such combinations. Whenever a combination contains both DoF variables that occur in a node’s
outbound or inbound sum-DoF constraint, the number of antennas at this node appears in the max{.} operator
at the right side of the inequality. This means that whenever a node’s index appears two times as left or two
times as right index, this node’s index appears also in the max{.} on the right side.
As can be seen above, there are six cases where each case applies to two nodes each, while for the third
node it does not, because the third node’s index appears once as left and once as right index. There are two
cases missing altogether, d12 + d31 + τ d23 and d21 + d13 + τ d32 , where the indices of all three nodes appear
15
once as left and once as right index. Depending on numbers of antennas, this achievable DoF region yields
four bounds for the largest and two bounds for the second largest node from the inequalities (51) to (53), and
two bounds for the third largest node from (48) to (50). The remaining bounds from (48) to (50) are inactive
due to the tighter bounds from (51) to (53).
Although we proved that the above region is achievable, it is still useful to provide a ‘recipe’ which describes
[q]
how a specific DoF tuple can be achieved. To obtain the actual allocation of signal dimensions aij for a DoF
tuple d satisfying (48) to (54), proceed as follows: First, use as many ZF resources as possible. Only once the
ZF dimensions are exhausted, assign IA resources and align as much of the resulting interference as possible.
Throughout the process, account for redundancy required by EC to be able to tolerate intermittency. As an
example (Fig. 9), assume (M1 , M2 , M3 , τ ) = (5, 7, 4, 0.5). There is one ZF dimension 1 → 2, three ZF
dimensions 2 → 1 and two ZF dimensions 2 → 3, all other communication cannot be zero-forced. We try to
achieve d = (0.5, 0, 0.5, 4, 0, 4). To transmit on average half a symbol per channel access full-duplex over the
intermittent 1 ↔ 2, we use a rate
1
2
[ZF]
[ZF]
EC over one available ZF dimension in each direction (a12 = a21 = 1),
[IA]
[IA]
the remaining two ZF dimensions 2 → 1 remain unused. IA is not required for 1 ↔ 2 (a12 = a21 = 0). No
[ZF]
communication 1 ↔ 3 takes place (a13
[IA]
[ZF]
= a13 = a31
[IA]
= a31 = 0). To transmit four symbols per channel
[ZF]
access 2 → 3, we use the two available ZF dimensions for two of them (a23
= 2), and two IA dimensions
[IA]
(a23 = 2) that occupy a two-dimensional interference subspace at node 1. To transmit four symbols per channel
[IA]
[ZF]
access 3 → 2, we use four IA dimensions (a32 = 4), since ZF is not possible (a32 = 0). All of them create
interference at node 1, but this four-dimensional interference subspace can be aligned with the two-dimensional
interference subspace caused by 2 → 3 (γ1 = 2). As a result, four of the five receive dimensions at node 1
are interference of 2 ↔ 3 communication, while the remaining was used for zero-forced and erasure-coded
communication 2 → 1. At nodes 2 and 3 no interference is caused, such that no interference alignment takes
place (γ2 = γ3 = 0).
B. Sum-DoF
The devised non-adaptive encoding scheme based on ZF, IA and EC is sum-DoF optimal in the intermittent
3WC, as we will prove in this section.
1) Lower Bounds: Using (36) to (47), we derive a lower bound on the sum-DoF of the intermittent 3WC with
intermittent node 1. For each of the six cases of Mi ≥ Mj ≥ Mk (for all possible combinations i, j, k ∈ {1, 2, 3}
mutually distinct), we solve the linear program maximizing sum-DoF using, e.g., the simplex algorithm.
Definition 1. We denote
dIsum,LB,A := max [d12 + d13 + d21 + d23 + d31 + d32 ] .
d∈D I
IB,A
The resulting lower bounds for each of the different cases are listed in Table I, and are condensed into a
single expression in the following lemma:
Lemma 1 (Sum-DoF Lower Bound for Node-Intermittent 3WC). The sum-DoF
dIsum,LB,A = 2τ min{M2 , M3 } + 2τ (M1 + M2 + M3 − min{M1 , M2 , M3 } − max{M1 , M2 , M3 }) ≤ dIsum
16
TX Z12
RX Z21
A32
A23
τ
τ
Node 1
Node 3
Node 2
TX Z21
RX Z12
Z23
A32
A23
TX
A23
τ RX
Z23
A32
τ
A23
τ
Z23
A32
τ
Fig. 9: Visualization of transmit (TX) and receive (RX) signal spaces achieving d = (0.5, 0, 0.5, 4, 0, 4) under
the assumption of (M1 , M2 , M3 , τ ) = (5, 7, 4, 0.5) (depending on intermittency state, where the first and second
[ZF]
[IA]
row are received with probability τ and τ , respectively; Zij denotes wij , Aji denotes wij )
TABLE I: Achievable Sum-DoFs of Intermittent 3WC
Case
Sum-DoF Lower Bound
M1 ≥ M2 ≥ M3
dI
= 2M3 + 2τ M2 − 2τ M3
M2 ≥ M1 ≥ M3
dI
= 2M3 + 2τ M1 − 2τ M3
M2 ≥ M3 ≥ M1
M1 ≥ M3 ≥ M2
M3 ≥ M1 ≥ M2
M3 ≥ M2 ≥ M1
sum,LB,A
sum,LB,A
dI
sum,LB,A
dI
sum,LB,A
dI
sum,LB,A
dI
sum,LB,A
= 2M3
= 2M2 + 2τ M3 − 2τ M2
= 2M2 + 2τ M1 − 2τ M2
= 2M2
is achievable in the node-intermittent 3WC and therefore constitutes a lower bound on the sum-DoF of the
node-intermittent 3WC.
2) Upper Bounds: We first motivate the converse techniques used throughout this section and in the sequel
provide rigorous proofs. The general approach for upper bounding the sum-DoF of the intermittent 3WC is as
follows: Partition the DoF sum dij + dik + dji + djk + dki + dkj into two partial sums dij + dkj + dki and
dik + djk + dji (Fig. 10), where wij , wkj , wki are to be decoded by node j and wik , wjk , wji are to be decoded
by node k. There are three such partitions, and the partition is fully determined by choosing which node takes
the role of node i. While nodes j and k function exclusively as source and sink in any one of the partial sums,
node i is an intermediary node in both.
Have an imaginary genie provide just enough side information to node j and k (hence the name ‘genie-aided’
bound), respectively, such that they can recover the receive signal yin of node i, then (assuming existence of
a suitable coding scheme) nodes j and k can decode the additional messages wki and wji , respectively. The
details of this decoding process and the required side information will be presented in due course. Here we
17
i
j
i
k
(a)
j
k
(b)
Fig. 10: Partition the DoF sum dij + dik + dji + djk + dki + dkj into two partial sums dij + dkj + dki to be
decoded at node j (a) and dik + djk + dji to be decoded at node k (b), where nodes j and k are provided
enough side information such that they can recover the receive signal yin of node i and from it decode the one
message not originally intended for them (additional dki and dji DoFs, respectively).
only remark, that the side information can serve for the following four purposes (some cases might not require
some of the types of side information):
1) An additional message is required such that node j (or k) can decode the additional message wki (or
wji ) from the recovered yin , because decoding requires knowledge of wi , and node j (or k) only knows
wij (or wik ) from decoding its own receive signal yjn (or ykn ).
2) Node j (or k) might be incapable of capturing enough information about yin because Mj (or Mk ) is
small. In this case, additional measurements about yin (or alternatively about the unknown ‘ingredient’
of interest, xnk or xnj , respectively) need to be provided by side information.
3) Node j (or k) might be incapable of capturing enough information about yin because of intermittency. In
this case, additional measurements about yin for those time instances ` where s` = 0 need to be provided
by side information.
4) For rather technical reasons a noise correction signal is required to accurately recover yin . However, the
information contained in this signal about the three desired messages in question scales only o [log(ρ)].
Assuming reliable communication, the partial DoF sum of each three messages is necessarily upper bounded
by a mutual information expression, using Fano’s inequality. Adding the two resulting bounds yields an upper
bound on the sum-DoF. The challenge with this approach is two-fold: a) provide as little side information as
possible to the respective nodes, b) use tight bounding when expanding the mutual information expression from
Fano’s inequality.
For the intermittent 3WC the partition that yields the tightest upper bound on the sum-DoF depends on the
numbers of antennas. The node with largest number of antennas should take the role of the intermediary node
i (Fig. 11). The order among the remaining two nodes decides about which side information to give to which
node, to compensate for insufficient number of antennas or intermittency. We prove upper bounds for the three
cases M1 ≥ M2 ≥ M3 , M2 ≥ M1 ≥ M3 and M2 ≥ M3 ≥ M1 , the remaining three cases go by renaming
node 2 and 3.
a) Case 1: M1 ≥ M2 ≥ M3 : For the case where M1 is the largest number of antennas, we develop two
partial sums around nodes 3 and 2 (Fig. 11a and 11b), respectively. We start with the bound around node 2
(Fig. 11b), as it requires less side information and is therefore simpler to argue, and in the sequel extend the
18
1
2
1
3
2
3
(a)
(b)
1
1
2
3
2
(c)
3
(d)
Fig. 11: Partition of sum-DoF into partial sums for case M1 ≥ M2 ≥ M3 (a)/(b) and cases M2 ≥ M1 ≥ M3
and M2 ≥ M3 ≥ M1 (c)/(d).
sn , w2 , y2n
Enc. E1,`
Dec. F2
x1,`
Enc. E2,`
Cancel x1,`
H32 x3,` + z2,`
w13
ŵ32 , ŵ12
`++
Invert
x3,` +
ŵ31
Dec. F1
y1,`
x2,`
†
H32
z2,` ,
if s` = 1
Combine
zcorr,`
Fig. 12: Decoding of w31 at node 2 by iterative reconstruction of y1n from a-priori knowledge w2 and
n
observations (y2n , sn ) using side information (w13 , zcorr
) (grey box: a-priori knowledge and channel output,
dashed boxes: side information): successively obtain x1,` , cancel its effect from y2,` to obtain a noisy version
of x3,` , and combine this with x2,` and zcorr,` to finally obtain y1,` ; repeat for next `.
basic technique to develop the bound around node 3 (Fig. 11a), which requires more side information and is
therefore slightly more involved.
Which side information does node 2 need to be able to recover y1n and decode w31 from it, assuming a
scheme allowing every node to decode its desired messages with high probability? We present a suitable process
depicted in Fig. 12. At the end of the transmission, node 2 has w2 , y2n , sn and xn2 , as shown on the top left
of the figure. Using the decoder F2 it can decode (ŵ12 , ŵ32 ) = (w12 , w32 ) with high probability. Assume we
provide w13 as side information, so that node 2 can decode messages intended for node 1 using F1 as soon
as it obtains y1n , as shown on the bottom left of the figure. Node 2 can now obtain x1,1 from w1 using E1,1 .
19
From (s1 , y2,1 ) it can obtain H32 x3,1 + z2,1 using x1,1 . Since H32 is a tall matrix, a noisy version of x3,1
†
can be obtained from H32 x3,1 + z2,1 using the pseudo-inverse H32
, i.e.,
†
†
z2,1 .
(H32 x3,1 + z2,1 ) = x3,1 + H32
H32
Using the noisy version of x3,1 , node 2 can obtain a noisy version of y1,1 , i.e.,
†
†
z2,1 .
z2,1
= s1 H21 x2,1 + s1 H31 x3,1 + s1 H31 H32
s1 H21 x2,1 + H31 x3,1 + H32
†
Given a suitably formed noise correction term zcorr,1 := z1,1 − s1 H31 H32
z2,1 as side information, node 2
can finally obtain y1,1 , i.e.
†
z2,1 + zcorr,1 .
y1,1 = s1 H21 x2,1 + s1 H31 x3,1 + s1 H31 H32
Then, this reconstruction cycle repeats for the next ` = 2, ..., n, where all previous y1`−1 are used to obtain x1,`
using E1,` . From the four abstract types of side information introduced before, only two are required for the
reconstruction and subsequently for this bound: a message and a noise correction term. No side information to
compensate for insufficient number of antennas or intermittency is required.
n
In a nutshell, side information w13 and zcorr
is provided to node 2 by a genie, defined as
†
Zcorr,` := Z1,` − S` H31 H32
Z2,` .
Since the scheme ought to be reliable, we bound the sum rate of w12 , w32 and w31 using Fano’s inequality:
side information
n(R12 + R32 + R31 −
ε(1)
n )
≤
I(W12 W32 W31 ; W2 Y2n S n
z }| {
n
W13 Zcorr
)
(a)
n
= I(W12 W32 W31 ; Y2n | W13 W2 S n Zcorr
)
n
X
(b)
n
=
I(W12 W3 ; Y2,` | Y2`−1 S n W13 W2 Zcorr
)
`=1
n
X
n
n
h(Y2,` | Y2`−1 S n W13 W2 Zcorr
) − h(Y2,` | Y2`−1 S n W1 W2 W3 Zcorr
)
=
`=1
n
X
n
≤
h(Y2,` | S` ) − h(Y2,` | Y2`−1 S n W1 W2 W3 Zcorr
X1,` X3,` )
(c)
(d)
=
=
(b)
=
`=1
n
X
`=1
n
X
`=1
n
X
[h(Y2,` | S` ) − h(Y2,` | S` Zcorr,` X1,` X3,` )]
I(Zcorr,` X1,` X3,` ; Y2,` | S` )
[I(X1,` X3,` ; Y2,` | S` ) + I(Zcorr,` ; Y2,` | S` X1,` X3,` )]
`=1
(e)
=
n
X
=o[log(ρ)]
z
}|
I(X1,` X3,` ; Y2,` | S` ) + I(Zcorr,` ; Z2,`
`=1
(f)
≤ n [τ M2 + τ M3 ] log(ρ) + no [log(ρ)]
These steps are justified as follows:
n
(a) (W12 , W3 ) is independent of (W13 , W2 , S n , Zcorr
)
{
| S` )
20
(b) Chain rule for mutual information
(c) Conditioning reduces entropy
n
`−1
n
(d) Y2,` is independent of (Y2`−1 , S `−1 , S`+1
, Zcorr
, Zcorr,`+1
, W1 , W2 , W3 ) given (S` , X1,` , X3,` )
(e) Zcorr,` is independent of (X1,` , X3,` ) and Y2,` given (X1,` , X3,` ) is only noise with a mean Z2,` + const
(f) (X1,` , X3,` )
Y2,` is a MIMO channel with min{M1 + M3 , M2 } = M2 DoFs if s` = 1, and min{0 +
M3 , M2 } = M3 DoFs if s` = 0
Dividing both sides by n log(ρ) and letting ρ, n → ∞ we obtain
d12 + d32 + d31 ≤ τ M2 + τ M3 .
(55)
We turn to the second partial sum, developed around node 3 (Fig. 11a). This bound is slightly more involved,
as an additional type of side information is required which compensates for the small number of antennas M3 .
Which side information does node 3 need to be able to recover y1n and decode w21 from it, assuming a scheme
allowing every node to decode its desired messages with high probability? A suitable process is depicted in
Fig. 13. At the end of the transmission, node 3 has w3 , y3n , sn and xn3 , as shown on the top left of the figure.
Using the decoder F3 it can decode (ŵ13 , ŵ23 ) = (w13 , w23 ) with high probability. Assume we provide w12 as
side information, so that node 3 can decode messages intended for node 1 using F1 as soon as it obtains y1n ,
as shown on the bottom left of the figure. Node 3 can now obtain x1,1 from w1 using E1,1 . From (s1 , y3,1 )
it can obtain H23 x2,1 + z3,1 using x1,1 . Assume we ‘virtually’ increase the number of antennas at node 3 so
that it can fully observe x2,1 whenever node 1 can, by providing ỹ3,1 = H̃23 x2,1 + z̃3,1 as side information
h
i
H
if s1 = 1, with H̃23 ∈ C(M2 −M3 )×M2 such that rank( H̃23
) = M2 . Note that if s1 = 0 then x2,1 does not
23
contribute to y1,1 . In this case, x2,1 does not need to be reconstructed, and therefore no side information to
compensate for insufficient number of antennas is required. We define shortcuts to group receive signal y3n and
side information ỹ3n into a joint signal ŷ3n , i.e.,
i
h
i
h
y3,1
H
,
ŷ3,1 := ỹ3,1 ,
Ĥ23 := H̃23
23
ẑ3,1 :=
h
z3,1
z̃3,1
i
.
−1
ẑ3,1 if
A matrix H̃23 satisfying rank(Ĥ23 ) = M2 exists almost surely and it allows to obtain x2,1 + Ĥ23
−1
s1 = 1. Assume we provide zcorr,1 = z1,1 − s1 H21 Ĥ23
ẑ3,1 as side information. Then node 3 can obtain y1,1
−1
from zcorr,1 if s1 = 0, and from x3,1 , x2,1 + Ĥ23
ẑ3,1 and zcorr,1 if s1 = 1, i.e.,
−1
y1,1 = s1 H21 (x2,1 + Ĥ23
ẑ3,1 ) + s1 H31 x3,1 + zcorr,1 = s1 H21 x2,1 + s1 H31 x3,1 + z1,1 .
Using (y1,1 , w1 ) and the encoder E1,2 node 3 can obtain x1,2 and the cycle repeats, for ` = 2, ..., n. Finally,
node 3 obtains y1n , and decodes w21 from (y1n , w1 , sn ). Side information to compensate for intermittency is
not required.
n
In a nutshell, side information w12 , ỹ3n and zcorr
is provided to node 3 by a genie, following the definitions
Ỹ3,` := S` (H̃23 X2,` + Z̃3,` ),
−1
Zcorr,` := Z1,` − S` (H21 Ĥ23
Ẑ3,` ),
where
Z̃3,`
h
H23
H̃23
i
H̃23 ∈ C(M2 −M3 )×M2 s.t. rank(Ĥ23 ) = M2 ,
hZ i
hY i
3,`
3,`
∼ CN (0, σ 2 IM2 −M3 ),
Ẑ3,` := Z̃3,` ,
Ŷ3,` := Ỹ3,` .
Ĥ23 :=
,
21
sn , w3 , y3n
x1,`
Enc. E1,`
Dec. F3
Enc. E3,`
Cancel x1,`
H23 x2,` + z3,`
w12
ŵ23 , ŵ13
`++
ỹ3,`
Invert
x3,`
−1
ẑ3,` , if s` = 1
x2,` + Ĥ23
Dec. F1
ŵ21
Combine
y1,`
zcorr,`
Fig. 13: Decoding of w21 at node 3 by iterative reconstruction of y1n from a-priori knowledge w3 and
n
observations (y3n , sn ) using side information (w12 , ỹ3n , zcorr
) (grey box: a-priori knowledge and channel output,
dashed boxes: side information): successively obtain x1,` , cancel its effect from y3,` (using side information
ỹ3,` ) to obtain a noisy version of x2,` , and combine this with x3,` and zcorr,` to finally obtain y1,` ; repeat for
next `.
Since the scheme ought to be reliable, we again bound the sum rate of w13 , w23 and w21 using Fano’s
inequality, and following similar steps as before (for details see appendix A) we obtain
d13 + d23 + d21 ≤ τ M2 + τ M3 .
(56)
The two bounds on partial DoF sums are combined into a sum-DoF upper bound for the case M1 ≥ M2 ≥ M3 :
Proposition 1 (Sum-DoF of Node-Intermittent 3WC for M1 ≥ M2 ≥ M3 ).
dIsum ≤ 2τ M2 + 2τ M3
Proof. The proposition follows by adding (55) and (56).
b) Case 2: M2 ≥ M1 ≥ M3 : Since M2 is the largest number of antennas, we develop two partial sums
around nodes 3 and 1 (Fig. 11c and 11d), respectively.
The reasoning around node 3 in this case proceeds in close analogy to the bound around node 3 in the
previous case, just with 1 and 2 interchanged. We provide as side information w21 (to allow for decoding using
n
F2 ), ỹ3n (to compensate for small number of antennas M3 ) and zcorr
(a noise correction), defined as
Ỹ3,` := S` (H̃13 X1,` + Z̃3,` ),
−1
Zcorr,` := Z2,` − S` (H12 Ĥ13
Ẑ3,` ),
where
Z̃3,`
h
H13
H̃13
i
H̃13 ∈ C(M1 −M3 )×M1 s.t. rank(Ĥ13 ) = M1 ,
hZ i
hY i
3,`
3,`
∼ CN (0, σ 2 IM1 −M3 ),
Ẑ3,` := Z̃3,` ,
Ŷ3,` := Ỹ3,` .
Ĥ13 :=
,
With this information, node 3 can construct x2,1 from w2 using E2,1 (since w23 is a message intended for node
3 and assumed to have been decoded from y3n using F3 , and w21 is side information), obtain a noisy version
22
of x1,1 from channel output y3,1 and side information ỹ3,1 as necessary for y2,1 (i.e., if s1 = 1), combine all
relevant signals into y2,1 , encode w2 using E2,2 and y2,1 to obtain x2,2 , and continue this cycle for the next
` = 2, ..., n until y2n is complete, from which w12 can be decoded with the help of w2 using F2 .
After similar steps as before (see appendix B for details) we obtain
d13 + d23 + d12 ≤ τ M1 + τ M3 .
(57)
We turn to the second partial sum, developed around node 1 (Fig. 11d), where node 1 should be enabled to
decode w32 . The main difference to the previous cases is that the link 3 ↔ 2 is always available, while the
link 3 ↔ 1 is intermittent. Therefore, y1,` does not contain information about x3,` if s` = 0; this needs to be
compensated for by side information, here ỹ1n defined as
ỹ1,` := s` (H31 x3,` + z̃1,` ),
which provides measurements of xn3 for those time instances where node 1 is intermittent, i.e., s` = 0. This
is an instance of the fourth type of side information, that for previous bounds was not necessary, namely side
information that compensates for intermittency. Given this side information and the customary side information
(a message, to allow for decoding, and a noise correction signal), the reconstruction proceeds in analogy to the
n
to node 1, defined as
previous cases. In a nutshell, the genie provides w23 , ỹ1n and zcorr
†
Zcorr,` := Z2,` − H32 H31
(S` Z1,` + S ` Z̃1,` ),
Ỹ1,` := S ` (H31 X3,` + Z̃1,` ),
with
Z̃1,` ∼ CN (0, σ 2 IM1 ),
Ẑ1,` := (Z1,` , S ` Z̃1,` ),
Ŷ1,` := (Y1,` , Ỹ1,` ).
At the end of the transmission, node 1 has w1 , y1n , sn and xn1 . It decodes (w21 , w31 ) from y1n using its decoder
F1 , and gets w23 from side information. It generates x2,1 , then uses its channel output y1,1 (if s1 = 1) or side
information ỹ1,1 (if s1 = 0) to obtain a noisy version of x3,1 , and with it y2,1 . From there the cycle repeats,
until y2n is obtained and w32 can be decoded.
After similar steps as before (see appendix C for details) we obtain
d21 + d31 + d32 ≤ τ M1 + τ M3 .
(58)
Proposition 2 (Sum-DoF of Node-Intermittent 3WC for M2 ≥ M1 ≥ M3 ).
dIsum ≤ 2τ M1 + 2τ M3
Proof. The proposition follows by adding (57) and (58).
c) Case 3: M2 ≥ M3 ≥ M1 : Since M2 is still the largest number of antennas, we again develop two
partial sums around nodes 3 and 1 (Fig. 11c and 11d), respectively. The only difference to the previous case
is that this time M3 ≥ M1 , therefore the number of antennas at node 1 needs to be augmented ‘virtually’ to
obtain sufficient measurements of xn3 , while node 3 remains unchanged.
n
We turn to the partial sum around node 3 and provide as side information w21 and zcorr
with
†
Zcorr,` := Z2,` − S` (H12 H13
Z3,` ).
23
Note that x1,` contributes to y2,` only if s` = 1. In these instances, node 3 has sufficient information about
x1,` from y3,` . If s` = 0, node 3 does not have information about x1,` , but x1,` does not contribute to y2,`
anyhow, so node 3 does not need additional side information in these cases. Therefore, with the given side
information, node 3 can construct x2,1 from w2 , obtain a noisy version of x1,1 from channel output y3,1 as
necessary for y2,1 (i.e., if s1 = 1), generate y2,1 , and continue this cycle for the next ` = 2, ..., n until y2n is
complete, from which w12 can be decoded with the help of w2 .
After similar steps as before (see appendix D for details) we obtain
d13 + d23 + d12 ≤ M3 .
(59)
We turn to the second partial sum, developed around node 1 (Fig. 11d), where node 1 should be enabled
to decode w32 . Again the main difference to the previous cases is that the link 3 ↔ 2 is always available,
while the link 3 ↔ 1 is intermittent. Therefore, y1,` does not contain information about x3,` if s` = 0; this
effect of intermittency needs to be compensated for by side information, here ỹ1n (a formal definition follows).
Furthermore, the number of antennas at node 1 needs to be increased to fully capture x3,` , here accomplished
by side information y̆1n (a formal definition follows). In addition, the genie provides the message w23 and noise
n
to node 1. In a nutshell, side information variables are defined as
correction zcorr
Ỹ1,` := S ` (H31 X3,` + Z̃1,` ),
Y̆1,` := H̆31 X3,` + Z̆1,` ,
−1
Zcorr,` := Z2,` − H32 Ĥ31
h
S` Z1,` +S ` Z̃1,`
Z̆1,`
i
,
with auxiliary variables
Z̃1,` ∼ CN (0, σ 2 IM1 ),
Z̆1,` ∼ CN (0, σ 2 IM3 −M1 ),
i
h
H
,
H̆31 ∈ C(M3 −M1 )×M3 s.t. rank(Ĥ31 ) = M3 ,
Ĥ31 := H̆31
31
Ŷ1,` := (Y1,` , Ỹ1,` , Y̆1,` ),
Ẑ1,` := (Z1,` , S ` Z̃1,` , Z̆1,` ).
At the end of the transmission, node 1 has w1 , y1n , sn and xn1 . It decodes (w21 , w31 ) using F1 , and gets w23
from side information. It generates x2,1 using E2,1 , then uses side information y̆1,1 and channel output y1,1 (if
s1 = 1) or side information y̆1,1 and ỹ1,1 (if s1 = 0) to obtain a noisy version of x3,1 , and with it y2,1 using
zcorr,1 . From there the cycle repeats, until y2n is obtained and w32 can be decoded using F2 .
After similar steps as before (see appendix E for details) we obtain
d21 + d31 + d32 ≤ M3 .
Proposition 3 (Sum-DoF of Node-Intermittent 3WC for M2 ≥ M3 ≥ M1 ).
dIsum ≤ 2M3
Proof. The proposition follows by adding (59) and (60).
Lemma 2 (Sum-DoF Upper Bound for Node-Intermittent 3WC).
dIsum ≤ 2τ min{M2 , M3 } + 2τ (M1 + M2 + M3 − min{M1 , M2 , M3 } − max{M1 , M2 , M3 })
Proof. The lemma follows by Propositions 1, 2 and 3, and symmetry of node 2 and 3.
(60)
24
Using the achievability and converse results developed in Sections IV-B1 and IV-B2, we establish the sumDoF of the intermittent 3WC for which non-adaptive encoding is sufficient, i.e.
dIsum,LB,A = 2τ min{M2 , M3 } + 2τ (M1 + M2 + M3 − min{M1 , M2 , M3 } − max{M1 , M2 , M3 }) = dIsum .
This proves Theorem 2.
C. DoF Region
In this section we first derive an upper bound on d31 under the assumption of non-adaptive encoding. We
then show adaptive schemes that can exceed this bound, namely multi-hop and decode-forward relaying. This
proves that some DoF region points are only achievable by adaptive encoding schemes, hence adaptive encoding
is in general required to achieve the DoF region of the intermittent 3WC.
1) Upper Bound on d31 under Non-Adaptive Encoding: Node 1 is able to decode w31 from its channel
output (y1n , sn ) and a-priori knowledge w1 with high probability. We further provide w2 as side information
and bound the rate of w31 using Fano’s inequality:
side information
n(R31 − εn ) ≤
I(W31 ; W1 Y1n S n
z}|{
W2
)
(a)
= I(W31 ; Y1n | W1 W2 S n )
n
(b) X
=
I(W31 ; Y1,` | Y1`−1 W1 W2 S n )
`=1
n
X
h(Y1,` | Y1`−1 W1 W2 S n ) − h(Y1,` | Y1`−1 W1 W2 W31 S n )
=
`=1
n
X
≤
h(Y1,` | W2 S` ) − h(Y1,` | Y1`−1 W1 W2 W31 S n X2,` X3,` )
(c)
`=1
(d)
≤
=
n
X
`=1
n
X
(b)
`=1
n
X
(e)
`=1
n
X
=
=
[h(Y1,` | W2 S` ) − h(Y1,` | W2 S` X2,` X3,` )]
I(X2,` X3,` ; Y1,` | W2 S` )
[I(X2,` ; Y1,` | W2 S` ) + I(X3,` ; Y1,` | X2,` W2 S` )]
I(X3,` ; Y1,` | X2,` W2 S` )
`=1
(f)
≤ nτ M3 log(ρ) + nτ o [log(ρ)]
(61)
These steps are justified as follows:
(a) W31 is independent of (W1 , W2 , S n )
(b) Chain rule for mutual information
(c) Conditioning reduces entropy
n
(d) Y1,` is independent of (Y1`−1 , S `−1 , S`+1
, W1 , W31 ) given (S` , X2,` , X3,` )
(e) X2,` is independent of Y1,` given (W2 , S` ) because x2,` = E2,` (w2 ) under the assumption of non-adaptive
encoding
25
2
1
w31
3
τ
τ
ŵ31
1
Fig. 14: All messages except w31 are fixed to 0, node 2 supports node 3 in communicating w31 to node 1
(f) X3,`
Y1,` given X2,` is a MIMO channel with maximum DoF M3 and 0 for s` = 1 and s` = 0,
respectively
The following lemma provides the desired upper bound.
Lemma 3 (Upper Bound on d31 under Non-Adaptive Encoding). The achievable DoFs of non-adaptive encoding
schemes are restricted by
d31 ≤ τ M3 .
(62)
Proof. We divide both sides of (61) by n log(ρ) and take ρ, n → ∞.
2) Adaptive Schemes Achieving d31 > τ M3 : We assume all messages are fixed to 0, except for w31 , which
node 3 wants to convey to node 1, potentially with the help of node 2 (Fig. 14).
If τ M2 ≥ M3 , multi-hop relaying can be used to achieve M3 DoFs: Assume a block-Markov transmission
scheme over B blocks consisting of n channel accesses each. In each of the first B − 1 blocks, nM3 symbols
are transmitted 3 → 2. In the final block B node 3 remains silent, as does node 2 in block b = 1. In each
block b ≥ 2, node 2 retransmits the message it received in the previous block b − 1, using EC to protect against
intermittency. If τ M2 ≥ M3 , 2 → 1 can carry all nM3 symbols it received in the previous block. Node 1 uses
backwards-decoding to successively cancel the interference from 3 → 1 and decode the messages.
While multi-hop relaying achieves d31 larger than τ M3 if τ M2 ≥ M3 , this condition can be relaxed: Consider
using decode-forward relaying at node 2. This can be used to achieve min{τ M1 , τ (M2 + M3 ), M3 } DoFs and
outperforms any non-adaptive scheme as soon as M1 > M3 . We derive the achievable DoF for d31 based on
the well-known lower bound for decode-forward relaying [45]:
C ≥ max min{I(X3 X2 ; Y1 S), I(X3 ; Y2 S | X2 )}
pX 3 X 2
≥ min{I(X3 X2 ; Y1 | S), I(X3 ; Y2 | X2 )}
with X2 , X3 Gaussian
= min{τ min{M1 , (M2 + M3 )}, M3 } log(ρ) + o [log(ρ)]
= min{τ M1 , τ (M2 + M3 ), M3 } log(ρ) + o [log(ρ)]
(63)
The following lemma provides the desired lower bound.
Lemma 4 (Lower Bound on d31 under Adaptive Encoding). Decode-forward relaying achieves
d31 ≥ min{τ M1 , τ (M2 + M3 ), M3 }.
Proof. We divide both sides of (63) by log(ρ) and take ρ → ∞.
(64)
26
Note that if τ M2 > τ M3 and τ M1 > M3 , then we can transmit at M3 DoF from node 3 to node 1 using
this adaptive scheme, compensating all the the loss due to intermittency.
We proved in Lemma 3 that the DoF region point
d = (0, 0, 0, 0, d31,A , 0)
d31,A := min{τ M1 , τ (M2 + M3 ), M3 }
is not achievable for any non-adaptive encoding scheme if M1 > M3 , while we showed in Lemma 4 that there
exist adaptive schemes that achieve it. This proves Theorem 3, which states that adaptive encoding is in general
required to achieve the DoF region of the intermittent 3WC.
Theorems 2 and 3 show that non-adaptive encoding is sufficient to achieve sum-DoF, but not sufficient to
achieve the DoF region of the intermittent 3WC. This is particularly interesting in light of the next section,
where we show that adaptive encoding is not beneficial in the non-intermittent 3WC even from a DoF region
perspective.
V. N O I NTERMITTENCY
The sum-DoF of the non-intermittent 3WC was investigated in [18]. We present the DoF region of the nonintermittent 3WC and show that the non-adaptive encoding scheme presented in Section IV-A is sufficient to
achieve it; therefore, adaptive encoding is neither required from a sum-DoF nor from a DoF region perspective
in the non-intermittent 3WC. The non-intermittent 3WC is a special case of the intermittent 3WC with τ = 1.
We may assume without loss of generality M1 ≥ M2 ≥ M3 .
A. Achievability
From (48) to (54) we obtain with τ = 1:
d12 + d13 + d23 ≤ M1
(65)
d12 + d13 + d32 ≤ M1
(66)
d21 + d31 + d32 ≤ M1
(67)
d21 + d31 + d23 ≤ M1
(68)
d21 + d13 + d23 ≤ M2
(69)
d12 + d31 + d32 ≤ M2
(70)
d31 + d32 ≤ M3
(71)
d13 + d23 ≤ M3
(72)
min{d12 , d13 , d21 , d23 , d31 , d32 } ≥ 0
(73)
N
Definition 2. We denote the set of all DoF tuples d satisfying constraints (65) to (73) by DIB,A
.
N
Lemma 5 (DoF Region Inner Bound for Non-Intermittent 3WC). All d ∈ DIB,A
are achievable in the nonN
intermittent 3WC. Therefore, DIB,A
constitutes an inner bound on the DoF region of the non-intermittent 3WC,
i.e.
N
DIB,A
⊆ DN .
27
Proof. The lemma follows by construction in Section IV-A.
B. Converses
Besides cut-set outer bounds [46] on pairs of DoFs (involving two messages either intended for or originating
at a certain node), we use tighter genie-aided outer bounds [18], [19], [21] on triplets of DoFs (involving two
messages either intended for or originating at a certain node, and one message exchanged between the remaining
two nodes):
R13 + R23 ≤ M3 log(ρ) + o [log(ρ)]
(74)
R31 + R32 ≤ M3 log(ρ) + o [log(ρ)]
(75)
R21 + R31 + R32 ≤ min{M1 , M2 + M3 } log(ρ) + o [log(ρ)]
(76)
R21 + R31 + R23 ≤ min{M1 , M2 + M3 } log(ρ) + o [log(ρ)]
(77)
R12 + R32 + R13 ≤ M1 log(ρ) + o [log(ρ)]
(78)
R13 + R23 + R12 ≤ M1 log(ρ) + o [log(ρ)]
(79)
R12 + R32 + R31 ≤ M2 log(ρ) + o [log(ρ)]
(80)
R13 + R23 + R21 ≤ M2 log(ρ) + o [log(ρ)]
(81)
Note that if M2 + M3 ≤ M1 , then (76) and (77) are redundant given (75) and (81), therefore min{M1 , M2 +
M3 } can be replaced with M1 in (76) and (77). Dividing these bounds by log(ρ) and taking ρ → ∞ yields to
the following DoF region outer bounds:
d21 + d31 + d32 ≤ M1
(82)
d21 + d31 + d23 ≤ M1
(83)
d12 + d32 + d13 ≤ M1
(84)
d13 + d23 + d12 ≤ M1
(85)
d12 + d32 + d31 ≤ M2
(86)
d13 + d23 + d21 ≤ M2
(87)
d13 + d23 ≤ M3
(88)
d31 + d32 ≤ M3
(89)
Note that (86) and (87) can also be obtained from (55) and (56), respectively, with τ = 1.
N
Definition 3. We denote the set of all DoF tuples d satisfying constraints (82) to (89) by DOB
.
N
Lemma 6 (DoF Region Outer Bound for Non-Intermittent 3WC). None of the d 6∈ DOB
are achievable in the
N
non-intermittent 3WC. Therefore, DOB
constitutes an outer bound on the DoF region of the non-intermittent
3WC, i.e.
N
DN ⊆ DOB
.
Proof. The lemma follows by the DoF region outer bounds (82) to (89).
28
1
1
2
τ1
1
1
τ3
3
2
(a) 1-link interm.
τ2
τ1
3
(b) 3-link interm.
Fig. 15: Examples of different link-intermittent MIMO 3WCs
C. DoF Region and Sum-DoF of Non-Intermittent 3WC
The previous achievability and converse results establish the DoF region (and thus sum-DoF) optimality of
non-adaptive schemes, rendering adaptive encoding dispensable, i.e.
N
N
= DN = DOB
DIB,A
.
This proves Theorem 4. From the DoF region of the 3WC and using the sum-DoF of the intermittent 3WC,
we reproduce the sum-DoF of the 3WC given in [18]:
Corollary 1 (Sum-DoF of Non-Intermittent 3WC).
= 2M2 = dN
dN
sum
sum,LB,A
Proof. The statement follows as corollary of Theorems 2 and 4.
VI. C ONCLUSION
We introduced the MIMO 3WC with node-intermittency and studied its DoF region and sum-DoF. In
particular, we devised a non-adaptive encoding scheme based on zero-forcing, interference alignment and erasure
coding, and showed its DoF region (and thus sum-DoF) optimality for non-intermittent 3WCs and its sumDoF optimality for node-intermittent 3WCs. This shows that adaptive encoding is not required in those cases.
However, we showed by example that in general there are DoF region points in the node-intermittent 3WC
that can only be achieved by adaptive schemes, such as multi-hop or decode-forward relaying, making adaptive
encoding a necessity. Our work contributes to a better understanding of the necessity of adaptive schemes such
as relaying in multi-way communications with intermittency.
As remarked in the introduction, node-intermittency is only one of a multitude of practically relevant intermittency scenarios. Links might be intermittent independently of each other, e.g., moving objects passing by only
interrupt the link between the two D2D users from time to time, while the other links remain intact (Fig. 15a).
Or all links being intermittent, but independently of each other, and with different probabilities (Fig. 15b). Here,
we speak of link intermittency and intermittent links. Intermittent 3WCs with other intermittency models are
interesting directions for future research.
29
A PPENDIX
A. Sum-DoF Upper Bound for Intermittent 3WC with M1 ≥ M2 ≥ M3 (Part II)
Since the scheme ought to be reliable, we bound the sum rate of w13 , w23 and w21 using Fano’s inequality:
side information
}|
{
z
n n
n n
n(R13 + R23 + R21 − ε(2)
n ) ≤ I(W13 W23 W21 ; W3 Y3 S W12 Ỹ3 Zcorr )
(a)
n
= I(W13 W23 W21 ; Y3n Ỹ3n | W12 W3 S n Zcorr
)
n
(b) X
n
=
I(W13 W2 ; Ŷ3,` | Ŷ3`−1 S n W12 W3 Zcorr
)
`=1
n h
i
X
n
n
=
h(Ŷ3,` | Ŷ3`−1 S n W12 W3 Zcorr
) − h(Ŷ3,` | Ŷ3`−1 S n W1 W2 W3 Zcorr
)
`=1
n h
i
X
n
≤
h(Ŷ3,` | S` ) − h(Ŷ3,` | Ŷ3`−1 S n W1 W2 W3 Zcorr
X1,` X2,` )
(c)
`=1
n h
i
(d) X
=
h(Ŷ3,` | S` ) − h(Ŷ3,` | S` Zcorr,` X1,` X2,` )
`=1
=
(b)
=
n
X
I(Zcorr,` X1,` X2,` ; Ŷ3,` | S` )
`=1
n h
X
I(X1,` X2,` ; Ŷ3,` | S` ) + I(Zcorr,` ; Ŷ3,` | S` X1,` X2,` )
i
`=1
(e)
=
=o[log(ρ)]
}|
z
n
X
I(X1,` X2,` ; Ŷ3,` | S` ) + I(Zcorr,` ; Ẑ3,`
`=1
{
| S` )
(f)
≤ n [τ M2 + τ M3 ] log(ρ) + no [log(ρ)]
These steps are justified as follows:
n
(a) (W13 , W2 ) is independent of (W12 , W3 , S n , Zcorr
)
(b) Chain rule for mutual information
(c) Conditioning reduces entropy
n
`−1
n
, Zcorr,`+1
, W1 , W2 , W3 ) given (S` , X1,` , X2,` )
, Zcorr
(d) Ŷ3,` is independent of (Ŷ3`−1 , S `−1 , S`+1
(e) Zcorr,` is independent of (X1,` , X2,` ) and Ŷ3,` given (X1,` , X2,` ) is only noise with a mean Ẑ3,` + const
(f) (X1,` , X2,` )
(Y3,` , Ỹ3,` ) is a MIMO channel with min{M1 + M2 , M3 + (M2 − M3 )} = M2 DoFs if
s` = 1, and min{M1 + M2 , M3 + 0} = M3 DoFs if s` = 0
Dividing both sides by n log(ρ) and letting ρ, n → ∞ we obtain
d13 + d23 + d21 ≤ τ M2 + τ M3 .
B. Sum-DoF Upper Bound for Intermittent 3WC with M2 ≥ M1 ≥ M3 (Part I)
Since this scheme ought to be reliable, we bound the sum rate of w13 , w23 and w12 using Fano’s inequality:
side information
z
}|
{
n n
n n
n(R13 + R23 + R12 − ε(1)
n ) ≤ I(W13 W23 W12 ; W3 Y3 S W21 Ỹ3 Zcorr )
(a)
n
= I(W13 W23 W12 ; Y3n Ỹ3n | W21 W3 S n Zcorr
)
30
(b)
=
n
X
n
I(W1 W23 ; Ŷ3,` | Ŷ3`−1 S n W21 W3 Zcorr
)
`=1
=
n h
X
i
n
n
h(Ŷ3,` | Ŷ3`−1 S n W21 W3 Zcorr
) − h(Ŷ3,` | Ŷ3`−1 S n W1 W2 W3 Zcorr
)
`=1
(c)
≤
n h
X
n
h(Ŷ3,` | S` ) − h(Ŷ3,` | Ŷ3`−1 S n W1 W2 W3 Zcorr
X1,` X2,` )
i
`=1
n h
i
(d) X
=
h(Ŷ3,` | S` ) − h(Ŷ3,` | S` Zcorr,` X1,` X2,` )
`=1
=
(b)
=
n
X
I(Zcorr,` X1,` X2,` ; Ŷ3,` | S` )
`=1
n h
X
i
I(X1,` X2,` ; Ŷ3,` | S` ) + I(Zcorr,` ; Ŷ3,` | S` X1,` X2,` )
`=1
(e)
=
n
X
`=1
I(X1,` X2,` ; Ŷ3,`
=o[log(ρ)]
}|
{
z
| S` ) + I(Zcorr,` ; Ẑ3,` | S` )
(f)
≤ n [τ M1 + τ M3 ] log(ρ) + no [log(ρ)]
These steps are justified as follows:
n
)
(a) (W1 , W23 ) is independent of (W21 , W3 , S n , Zcorr
(b) Chain rule for mutual information
(c) Conditioning reduces entropy
n
`−1
n
(d) Ŷ3,` is independent of (Ŷ3`−1 , S `−1 , S`+1
, Zcorr
, Zcorr,`+1
, W1 , W2 , W3 ) given (S` , X1,` , X2,` )
(e) Zcorr,` is independent of (X1,` , X2,` ) and Ŷ3,` given (X1,` , X2,` ) is only noise with a mean Ẑ3,` + const
(f) (X1,` , X2,` )
(Y3,` , Ỹ3,` ) is a MIMO channel with min{M1 + M2 , M3 + (M1 − M3 )} = M1 DoFs if
s` = 1, and min{M1 + M2 , M3 + 0} = M3 DoFs if s` = 0
Dividing both sides by n log(ρ) and letting ρ, n → ∞ we obtain
d13 + d23 + d12 ≤ τ M1 + τ M3 .
C. Sum-DoF Upper Bound for Intermittent 3WC with M2 ≥ M1 ≥ M3 (Part II)
We bound the sum rate of w21 , w31 and w32 using Fano’s inequality:
side information
z
}|
{
n n
n n
n(R21 + R31 + R32 − ε(2)
)
≤
I(W
W
W
;
W
Y
S
W
Ỹ
Z
21
31
32
1
23
1
corr )
n
1
(a)
n
= I(W21 W31 W32 ; Ŷ1n | W1 W23 S n Zcorr
)
n
X
(b)
n
=
I(W21 W3 ; Ŷ1,` | Ŷ1`−1 S n W1 W23 Zcorr
)
`=1
n h
i
X
n
n
=
h(Ŷ1,` | Ŷ1`−1 S n W1 W23 Zcorr
) − h(Ŷ1,` | Ŷ1`−1 S n W1 W2 W3 Zcorr
)
`=1
n h
i
X
n
≤
h(Ŷ1,` | S` ) − h(Ŷ1,` | Ŷ1`−1 S n W1 W2 W3 Zcorr
X2,` X3,` )
(c)
`=1
31
(d)
=
n h
X
h(Ŷ1,` | S` ) − h(Ŷ1,` | S` Zcorr,` X2,` X3,` )
i
`=1
=
(b)
=
n
X
I(Zcorr,` X2,` X3,` ; Ŷ1,` | S` )
`=1
n h
X
i
I(X2,` X3,` ; Ŷ1,` | S` ) + I(Zcorr,` ; Ŷ1,` | S` X2,` X3,` )
`=1
(e)
=
n
X
`=1
(b)
=
I(X2,` X3,` ; Ŷ1,`
=o[log(ρ)]
}|
{
z
| S` ) + I(Zcorr,` ; Ẑ1,` | S` )
n h
i
X
I(X2,` X3,` ; Y1,` | S` ) + I(X2,` X3,` ; Ỹ1,` | S` Y1,` )
`=1
(f)
≤ n [τ M1 + τ M3 ] log(ρ) + no [log(ρ)]
These steps are justified as follows:
n
(a) (W21 , W3 ) is independent of (W1 , W23 , S n , Zcorr
)
(b) Chain rule for mutual information
(c) Conditioning reduces entropy
n
n
`−1
, Zcorr,`+1
, W1 , W2 , W3 ) given (S` , X2,` , X3,` )
(d) Ŷ1,` is independent of (Ŷ1`−1 , S `−1 , S`+1
, Zcorr
(e) Zcorr,` is independent of (X2,` , X3,` ) and Ŷ1,` given (X2,` , X3,` ) is only noise with a mean Ẑ1,` + const
(f) (X2,` , X3,` )
Y1,` is a MIMO channel with min{M2 + M3 , M1 } = M1 DoFs if s` = 1, and 0 DoFs
if s` = 0; (X2,` , X3,` )
Ỹ1,` is a MIMO channel with 0 DoFs if s` = 1 (because then Ỹ1,` = 0), and
min{0 + M3 , M1 } = M3 DoFs if s` = 0 (because then Y1,` is noise, and Ỹ1,` is independent of X2,` )
Dividing both sides by n log(ρ) and letting ρ, n → ∞ we obtain
d21 + d31 + d32 ≤ τ M1 + τ M3 .
D. Sum-DoF Upper Bound for Intermittent 3WC with M2 ≥ M3 ≥ M1 (Part I)
We bound the sum rate of w13 , w23 and w12 using Fano’s inequality:
side information
n(R13 + R23 + R12 −
ε(1)
n )
≤
I(W13 W23 W12 ; W3 Y3n S n
z }| {
n
W21 Zcorr
)
(a)
n
= I(W13 W23 W12 ; Y3n | W21 W3 S n Zcorr
)
n
X
(b)
n
=
I(W1 W23 ; Y3,` | Y3`−1 S n W21 W3 Zcorr
)
`=1
n
X
n
n
=
h(Y3,` | Y3`−1 S n W21 W3 Zcorr
) − h(Y3,` | Y3`−1 S n W1 W2 W3 Zcorr
)
`=1
n
X
n
≤
h(Y3,` | S` ) − h(Y3,` | Y3`−1 S n W1 W2 W3 Zcorr
X1,` X2,` )
(c)
(d)
=
=
`=1
n
X
`=1
n
X
`=1
[h(Y3,` | S` ) − h(Y3,` | S` Zcorr,` X1,` X2,` )]
I(Zcorr,` X1,` X2,` ; Y3,` | S` )
32
(b)
=
n
X
[I(X1,` X2,` ; Y3,` | S` ) + I(Zcorr,` ; Y3,` | S` X1,` X2,` )]
`=1
=o[log(ρ)]
n
}|
{
z
X
(e)
=
I(X1,` X2,` ; Y3,` | S` ) + I(Zcorr,` ; Z3,` | S` )
`=1
(f)
≤ n [M3 ] log(ρ) + no [log(ρ)]
These steps are justified as follows:
n
(a) (W1 , W23 ) is independent of (W21 , W3 , S n , Zcorr
)
(b) Chain rule for mutual information
(c) Conditioning reduces entropy
n
`−1
n
(d) Y3,` is independent of (Y3`−1 , S `−1 , S`+1
, Zcorr
, Zcorr,`+1
, W1 , W2 , W3 ) given (S` , X1,` , X2,` )
(e) Zcorr,` is independent of (X1,` , X2,` ) and Y3,` given (X1,` , X2,` ) is only noise with a mean Z3,` + const
(f) (X1,` , X2,` )
Y3,` is a MIMO channel with min{M1 + M2 , M3 } = M3 DoFs if s` = 1, and
min{M2 , M3 } = M3 DoFs if s` = 0 (because X1,` is independent of Y3,` )
Dividing both sides by n log(ρ) and letting ρ, n → ∞ we obtain
d13 + d23 + d12 ≤ M3 .
E. Sum-DoF Upper Bound for Intermittent 3WC with M2 ≥ M3 ≥ M1 (Part II)
We bound the sum rate of w21 , w31 and w32 using Fano’s inequality:
side information
n(R21 + R31 + R32 −
ε(2)
n )
≤
I(W21 W31 W32 ; W1 Y1n S n
}|
{
z
n
W23 Ỹ1n Y̆1n Zcorr
)
(a)
n
= I(W21 W31 W32 ; Ŷ1n | W1 W23 S n Zcorr
)
n
X
(b)
n
I(W21 W3 ; Ŷ1,` | Ŷ1`−1 S n W1 W23 Zcorr
)
=
`=1
n h
i
X
n
n
=
h(Ŷ1,` | Ŷ1`−1 S n W1 W23 Zcorr
) − h(Ŷ1,` | Ŷ1`−1 S n W1 W2 W3 Zcorr
)
`=1
n h
i
X
n
≤
h(Ŷ1,` | S` ) − h(Ŷ1,` | Ŷ1`−1 S n W1 W2 W3 Zcorr
X2,` X3,` )
(c)
`=1
n h
i
(d) X
=
h(Ŷ1,` | S` ) − h(Ŷ1,` | S` Zcorr,` X2,` X3,` )
`=1
=
(b)
=
n
X
I(Zcorr,` X2,` X3,` ; Ŷ1,` | S` )
`=1
n h
X
i
I(X2,` X3,` ; Ŷ1,` | S` ) + I(Zcorr,` ; Ŷ1,` | S` X2,` X3,` )
`=1
(e)
=
n
X
`=1
I(X2,` X3,` ; Ŷ1,`
=o[log(ρ)]
z
}|
{
| S` ) + I(Zcorr,` ; Ẑ1,` | S` )
(f)
≤ n [M3 ] log(ρ) + no [log(ρ)]
33
These steps are justified as follows:
n
(a) (W21 , W3 ) is independent of (W1 , W23 , S n , Zcorr
)
(b) Chain rule for mutual information
(c) Conditioning reduces entropy
n
`−1
n
(d) Ŷ1,` is independent of (Ŷ1`−1 , S `−1 , S`+1
, Zcorr
, Zcorr,`+1
, W1 , W2 , W3 ) given (S` , X2,` , X3,` )
(e) Zcorr,` is independent of (X2,` , X3,` ) and Ŷ1,` given (X2,` , X3,` ) is only noise with a mean Ẑ1,` + const
(f) (X2,` , X3,` )
(Y1,` , Ỹ1,` , Y̆1,` ) is a MIMO channel with min{M2 + M3 , M1 + 0 + (M3 − M1 )} = M3
DoFs if s` = 1, and min{M2 + M3 , 0 + M1 + (M3 − M1 )} = M3 DoFs if s` = 0
Dividing both sides by n log(ρ) and letting ρ, n → ∞ we obtain
d21 + d31 + d32 ≤ M3 .
R EFERENCES
[1] A. Chaaban, A. Sezgin, and M.-S. Alouini, “On the Degrees-of-Freedom of the MIMO Three-Way Channel with Intermittent
Connectivity,” Proc. IEEE Int. Symp. Inf. Theory (ISIT), 2017.
[2] A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and R. Wichman, “In-band full-duplex wireless: Challenges and
opportunities,” IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652, Sep. 2014.
[3] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communications in 5G cellular networks: Challenges, solutions,
and future directions,” IEEE Commun. Mag., pp. 86–92, May 2014.
[4] A. Asadi, Q. Wang, and V. Mancuso, “A Survey on Device-to-Device Communication in Cellular Networks,” IEEE Commun. Surveys
Tuts., vol. 16, no. 4, pp. 1801–1819, 4th quarter 2014.
[5] A. Chaaban and A. Sezgin, “Multi-way communications: An information theoretic perspective,” Found. Trends Commun. Inf. Theory,
vol. 12, no. 3-4, pp. 185–371, 2015.
[6] C. E. Shannon, “Two-way communication channels,” in Proc. of 4th Berkeley Symp. Math. Stat. Probab., vol. 1, 1961, pp. 611–644.
[7] A. P. Hekstra and F. M. J. Willems, “Dependence balance bounds for single output two-way channels,” IEEE Trans. Inf. Theory,
vol. 35, no. 1, pp. 44–53, Jan. 1989.
[8] T. S. Han, “A general coding scheme for the two-way channel,” IEEE Trans. Inf. Theory, vol. 30, no. 1, pp. 35–44, 1984.
[9] L. R. Varshney, “Two way communication over exponential family type channels,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), July
2013, pp. 2795–2799.
[10] L. Song, F. Alajaji, and T. Linder, “Adaptation is useless for two discrete additive-noise two-way channels,” in Proc. IEEE Int. Symp.
Inf. Theory (ISIT), July 2016, pp. 1854–1858.
[11] Z. Cheng and N. Devroye, “Two-way networks: When adaptation is useless,” IEEE Trans. Inf. Theory, vol. 60, no. 3, pp. 1793–1813,
March 2014.
[12] C. Suh, I.-H. Wang, and D. Tse, “Two-way Interference Channels,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Cambridge, MA,
USA, July 2012, pp. 2801–2805.
[13] Z. Cheng and N. Devroye, “On constant gaps for the two-way Gaussian interference channel,” in Ann. Allerton Conf. Commun.,
Control, and Comput., Oct. 2012, pp. 1783–1789.
[14] W. Nam, S.-Y. Chung, and Y. H. Lee, “Capacity of the Gaussian two-way relay channel to within 1/2 bit,” IEEE Trans. Inf. Theory,
vol. 56, no. 11, pp. 5488–5494, Nov. 2010.
[15] Y. Song, N. Devroye, H. R. Shao, and C. Y. Ngo, “Lattice coding for the two-way line network,” IEEE J. Sel. Areas Commun.,
vol. 32, no. 9, pp. 1707–1720, Sep. 2014.
[16] R. Vaze and J. Robert W. Heath, “On the capacity and diversity-multiplexing tradeoff of the two-way relay channel,” IEEE Trans.
Inf. Theory, vol. 57, no. 7, pp. 4219–4234, July 2011.
[17] M. P. Wilson, K. Narayanan, H. D. Pfister, and A. Sprintson, “Joint physical layer coding and network coding for bidirectional
relaying,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5641–5654, Nov. 2010.
[18] H. Maier, A. Chaaban, and R. Mathar, “Degrees of Freedom of the MIMO 3-way channel,” in Proc. Int. Symp. Inf. Theory Appl.
(ISITA), Melbourne, Australia, Oct. 2014, pp. 625–629.
34
[19] ——, “Symmetric degrees of freedom of the MIMO 3-Way channel with MT × MR antennas,” in Proc. IEEE Inf. Theory Workshop
(ITW), Hobart, Tasamania, Australia, Nov. 2014.
[20] A. Chaaban, H. Maier, A. Sezgin, and R. Mathar, “Three-Way Channels With Multiple Unicast Sessions: Capacity Approximation
via Network Transformation,” IEEE Trans. Inf. Theory, vol. 62, no. 12, pp. 7086–7102, Dec. 2016.
[21] A. M. Elmahdy, A. El-Keyi, Y. Mohasseb, T. ElBatt, M. Nafie, and K. G. Seddik, “Asymmetric degrees of freedom of the full-duplex
MIMO 3-way channel,” in Proc. IEEE Inf. Theory Workshop (ITW), Sep. 2016, pp. 469–473.
[22] L. Ong, “Capacity results for two classes of three-way channels,” in Proc. IEEE Int. Symp. Commun. Inf. Tech. (ISCIT), Gold Coast,
QLD, Oct. 2012.
[23] D. Gündüz, A. Yener, A. Goldsmith, and H. V. Poor, “The multi-way relay channel,” IEEE Trans. Inf. Theory, vol. 59, no. 1, pp.
51–63, Jan. 2013.
[24] L. Ong, C. M. Kellett, and S. J. Johnson, “On the equal-rate capacity of the AWGN multiway relay channel,” IEEE Trans. Inf. Theory,
vol. 58, no. 9, pp. 5761–5769, Sep. 2012.
[25] A. Sezgin, A. S. Avestimehr, M. A. Khajehnejad, and B. Hassibi, “Divide-and-conquer: Approaching the capacity of the two-pair
bidirectional Gaussian relay network,” IEEE Trans. Inf. Theory, vol. 58, no. 4, pp. 2434–2454, Apr. 2012.
[26] A. Zewail, Y. Mohasseb, M. Nafie, and H. El-Gamal, “The deterministic multicast capacity of 4-node relay networks,” in Proc. IEEE
Int. Symp. Inf. Theory (ISIT), Istanbul, Turkey, July 2013.
[27] B. Matthiesen, A. Zappone, and E. A. Jorswieck, “Resource allocation for energy-efficient 3-way relay channels,” IEEE Trans. Wireless
Commun., vol. 14, no. 8, pp. 4454–4468, Aug. 2015.
[28] H. Q. Ngo and E. G. Larsson, “Large-scale multipair two-way relay networks with distributed AF beamforming,” IEEE Commun.
Lett., vol. 17, no. 12, pp. 1–4, 2013.
[29] L. Ong, G. Lechner, S. J. Johnson, and C. M. Kellett, “The three-user Finite-field multi-way relay channel with correlated source,”
IEEE Trans. Commun., vol. 61, no. 8, pp. 3125–3135, Aug. 2013.
[30] R. Wang and X. Yuan, “MIMO multiway relaying with pairwise data exchange: A degrees of freedom perspective,” IEEE Trans.
Signal Process., vol. 62, no. 20, pp. 5294–5307, Oct. 2014.
[31] Y. Tian and A. Yener, “Degrees of freedom for the mimo multi-way relay channel,” IEEE Trans. Inf. Theory, vol. 60, no. 5, pp.
2495–2511, May 2014.
[32] N. Lee and J. Chun, “Degrees of freedom for the MIMO Gaussian K-way relay channel: Successive network code encoding and
decoding,” IEEE Trans. Inf. Theory, vol. 60, no. 3, pp. 1814–1821, Mar. 2014.
[33] C. Wang, “Beyond one-way communication: Degrees of freedom of multi-way relay MIMO interference networks,” IEEE Trans.
Wireless Commun., vol. 15, no. 10, pp. 7174–7186, Oct. 2016.
[34] Z. Cheng, N. Devroye, and T. Liu, “The Degrees of Freedom of full-duplex bidirectional interference networks with and without a
MIMO relay,” IEEE Trans. Wireless Commun., vol. 15, no. 4, pp. 2912–2924, April 2016.
[35] P. Mach, Z. Becvar, and T. Vanek, “In-Band Device-to-Device Communication in OFDMA Cellular Networks: A Survey and
Challenges,” IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 1885–1922, Nov. 2015.
[36] A. Celik, R. M. Radaydeh, F. S. Al-Qahtani, and M.-S. Alouini, “Joint interference management and resource allocation for Deviceto-Device (D2D) communications underlying Downlink/Uplink Decoupled (DUDe) heterogeneous networks,” in Proc. IEEE Int. Conf.
Commun. (ICC), Paris, France, May 2017, to appear.
[37] C. Karakus, I. H. Wang, and S. Diggavi, “Gaussian interference channel with intermittent feedback,” IEEE Trans. Inf. Theory, vol. 61,
no. 9, pp. 4663–4699, Sep. 2015.
[38] I. H. Wang, C. Suh, S. Diggavi, and P. Viswanath, “Bursty interference channel with feedback,” in Proc. IEEE Int. Symp. Inf. Theory
(ISIT), July 2013, pp. 21–25.
[39] A. Vahid, M. A. Maddah-Ali, and A. S. Avestimehr, “Binary fading interference channel with no CSIT,” in Proc. IEEE Int. Symp.
Inf. Theory (ISIT), June 2014, pp. 666–670.
[40] S. Y. Yeh and I. H. Wang, “Degrees of freedom of the bursty MIMO X channel without feedback,” in Proc. IEEE Int. Symp. Inf.
Theory (ISIT), July 2016, pp. 1312–1316.
[41] V. R. Cadambe and S. A. Jafar, “Interference alignment and the degrees of freedom of wireless X networks,” IEEE Trans. Inf. Theory,
vol. 55, no. 9, pp. 3893–3908, Sep. 2009.
[42] S. A. Jafar and S. Shamai, “Degrees of freedom region for the MIMO X channel,” IEEE Trans. Inf. Theory, vol. 54, no. 1, pp.
151–170, Jan. 2008.
[43] A. E. Gamal and Y.-H. Kim, Network Information Theory.
Cambridge University Press, 2011.
35
[44] A. Chaaban and A. Sezgin, “The approximate capacity region of the Gaussian Y-Channel via the deterministic approach,” IEEE
Trans. Inf. Theory, vol. 61, no. 2, pp. 939–962, Feb. 2015.
[45] T. M. Cover and A. El-Gamal, “Capacity theorems for the relay channel,” IEEE Trans. Inf. Theory, vol. IT-25, no. 5, pp. 572–584,
Sep. 1979.
[46] T. Cover and J. Thomas, Elements of Information Theory (Second Edition).
John Wiley and Sons, Inc., 2006.
| 7cs.IT
|
STDP Based Pruning of Connections and Weight
Quantization in Spiking Neural Networks for EnergyEfficient Recognition
Nitin Rathi, Priyadarshini Panda, Student Member, IEEE, and Kaushik Roy, Fellow, IEEE
Abstract— Spiking Neural Networks (SNNs) with a large
number of weights and varied weight distribution can be
difficult to implement in emerging in-memory computing
hardware due to the limitations on crossbar size (implementing
dot product), the constrained number of conductance levels in
non-CMOS devices and the power budget. We present a sparse
SNN topology where non-critical connections are pruned to
reduce the network size and the remaining critical synapses are
weight quantized to accommodate for limited conductance
levels. Pruning is based on the power law weight-dependent
Spike Timing Dependent Plasticity (STDP) model; synapses
between pre- and post-neuron with high spike correlation are
retained, whereas synapses with low correlation or uncorrelated
spiking activity are pruned. The weights of the retained
connections are quantized to the available number of
conductance levels. The process of pruning non-critical
connections and quantizing the weights of critical synapses is
performed at regular intervals during training. We evaluated
our sparse and quantized network on MNIST dataset and on a
subset of images from Caltech-101 dataset. The compressed
topology achieved a classification accuracy of 90.1% (91.6%) on
the MNIST (Caltech-101) dataset with 3.1x (2.2x) and 4x (2.6x)
improvement in energy and area, respectively. The compressed
topology is energy and area efficient while maintaining the same
classification accuracy of a 2-layer fully connected SNN
topology.
Index Terms— Pruning, Spiking Neural Network, Spike Timing
Dependent Plasticity, Unsupervised Learning, Weight Quantization.
1.
INTRODUCTION
Human brain consisting of 20 billion neurons and 200 trillion
synapses is by far the most energy-efficient neuromorphic
system with cognitive intelligence. The human brain
consumes only ~20W of power which is nine orders of
magnitude lower compared to a computer simulating human
brain activity in real time [1]. This had led to the inspiration
and development of Spiking Neural Networks (SNNs) which
tries to mimic the behavior of human brain and process inputs
in real time [2]. SNNs may provide an energy-efficient
solution to perform neural computing. However, recent works
have shown that to get reasonable accuracy compared to nonspiking Artificial Neural Networks (nANNs), the complexity
and size of SNNs is enormous. In [3] to improve the
classification accuracy for MNIST dataset by 12%, the
number of neurons in 2-layer SNN had to be increased by 64x.
The authors in [4] achieved an average accuracy of 98.6% for
MNIST dataset with two hidden layers consisting of 800
neurons in each layer. The quest of making SNNs larger and
deeper for higher accuracy have compromised their energy
efficiency and introduced challenges as mentioned below:
1. Large SNNs implemented on emerging memristive
crossbar structures [5] are limited by the crossbar size. Large
crossbars suffer from supply voltage degradation, noise
generated from process variations, and sneak paths [6, 7].
2. SNNs with numerous synapses involve higher number of
computations making them slower and energy inefficient.
SNNs are driven by the synaptic events and the total
computation, memory, communication, power, area, and
speed scale with the number of synapses [2]. We propose a
pruned and weight quantized SNN topology with self-taught
Spike Timing Dependent Plasticity (STDP) based learning.
STDP, in turn, is also used to classify synapses as critical and
non-critical. The non-critical synapses are pruned from the
network, whereas the critical synapses are retained and weight
quantized. Such pruning of connections and weight
quantization can lead to their efficient implementations in
emerging cross-bar arrays such as resistive random access
memories (R-RAMs) [8, 9], magnetic tunnel junctions [10],
or domain-wall motion based magnetic devices [11]. Such
cross-bars, even though suitable for implementing efficient
dot-products required for neural computing, are constrained
in size, because of non-idealities such as sneak paths, weight
quantization, and parameter variations [6, 7]. The resulting
sparse SNN can achieve 2-3x improvement in energy, 2-4x in
area and 2-3x in testing speed.
Synaptic pruning is commonly observed during the
development of human brain. The elimination of synapses
begins at the age of two and continues till adulthood, when
synaptic density stabilizes and is maintained until old age
[12]. From hardware implementation of neural networks,
synapses are a costly resource and needs to be efficiently
utilized for energy efficient learning. If synapses or
connections are properly pruned, the performance decrease
due to synaptic deletion is small compared to the energy
savings [13]. This has motivated researchers to apply the
technique of pruning [14] and weight quantization [15] to
compress nANNs. Pruning and quantization performed on
state-of-the-art network AlexNet trained for ImageNet dataset
provided 7x benefit in energy efficiency along with 35x
reduction in synaptic weight storage without any loss of
accuracy [15]. The authors in [14] prune the connections of
an nANN trained using backpropagation based on the Hessian
of the loss function. The number of parameters were reduced
Fully Connected
membrane potential
output spike
threshold potential
Excitatory
Layer
Input
Layer
Compressed
Inhibitory
Layer
w1
refractory period
rest potential
input spikes
reset potential
w2
.
.
. w3
.
time
Fig. 1. Leaky-Integrate-and-Fire (LIF) model of a single neuron’s
membrane potential dynamics in response to input spikes in SNN.
by a factor of two while maintaining the same test accuracy.
The supervised learning algorithm in [16] pruned the hidden
layer neurons with low dominance to reduce network size.
The network achieved similar performance with 4x less
parameters for Fisher Iris problem compared to other spiking
networks. The idea of pruning is based on identifying
parameters with small saliency, whose deletion will have
minimal effect on the error. These networks were trained with
supervised learning algorithms, but in SNNs with
unsupervised training it is difficult to calculate such
parameters since there is no such defined error function. In
real world, obtaining unlabeled images for unsupervised
learning is much easier than gathering labelled images for
supervised learning. The novelty of our approach lies in selftaught STDP based weight pruning where the connections to
be pruned are decided based on their weights learnt by the
unsupervised STDP algorithm. Connections having STDP
weights above a threshold are considered critical while others
are temporarily pruned. The threshold is fixed before training
and it referred as pruning threshold. The critical connections
are weight quantized to further reduce network complexity.
The resulting compressed topology is energy-efficient while
maintaining accuracy and alleviates the issues that constrain
the scalability of crossbar structure, leading to robust design
of neuromorphic systems.
The rest of the paper is organized as follows. Section 2
provides background information on the neuron and the
synapse models and the STDP learning algorithm employed
in this work. The network topology and the training and
testing schemes are also briefly discussed. Section 3 presents
the proposed compression techniques; STDP based pruning
and weight quantization and sharing. The experiments on the
proposed topology are presented in Section 4. The results of
the experiments are analyzed in Section 5. Conclusions are
drawn in Section 6.
2.
BACKGROUND
2.1. Neuron & Synapse Model and STDP Learning
We employ the Leaky-Integrate-and-Fire (LIF) model [3] to
simulate the membrane potential dynamics of a neuron in our
spiking network model. Fig. 1 shows the change in membrane
Excitatory
Layer
Input
Layer
Inhibitory
Layer
w
.
.
.
.
.
.
wn
.
.
.
Pruning
&
.
Weight
Quantization .
.
.
.
.
.
w
w
w
w
.
.
.
.
.
.
.
.
.
.
.
.
w
Fig. 2 SNN topology with lateral inhibition. Input to excitatory is fully
connected which is later pruned. Excitatory to inhibitory is one-to-one
connected, whereas inhibitory is backward connected to all the excitatory
except the one it receives the connection from. Pruning is performed only
on the input to excitatory connections.
potential of a single post-neuron in response to input spikes
(blue arrows) from pre-neurons. The membrane potential
increases at the onset of a spike and exponentially decays
towards rest potential in the absence of spiking activity. The
post-neuron fires or emits a spike when its potential crosses
the threshold and immediately its potential is set to a reset
value. After firing the post-neuron goes into a period of
inactivity known as refractory period during which it is
abstained from spiking, irrespective of input activity as shown
in Fig. 1.
The connection between two neurons is termed a synapse and
is modelled by the conductance change which is modulated
by the synaptic weight (w). The synaptic weight between a
pair of neurons increases (decreases) if the post-neuron fires
after (before) the pre-neuron has fired. This phenomenon of
synaptic plasticity where the weight change is dependent on
the inter spike timing of pre- and post-neuron is termed STDP.
We adopt the power law weight-dependent STDP model,
where the weight change is exponentially dependent on the
spike timing difference of the pre- and post-neuron (𝑡𝑝𝑟𝑒 −
𝑡𝑝𝑜𝑠𝑡 ) as well as the previous weight value [3].
2.2. Network Topology
The SNN topology for this work is shown in Fig. 2. It consists
of input layer followed by excitatory and inhibitory layer. The
input layer is fully connected to the excitatory layer, which in
turn is one-to-one connected to the inhibitory layer. The
number of neurons in the excitatory layer are varied to achieve
better accuracy, whereas the number of neurons in the
inhibitory layer is the same as the number in the excitatory
layer. Each inhibitory neuron is backward connected to all the
excitatory neurons except for the one from which it receives
a connection from. Thus, the inhibitory layer provides lateral
inhibition which discourages simultaneous firing of multiple
excitatory neurons and promotes competition among them to
learn different input features. The process of pruning and
weight quantization is applied to the excitatory synapses to
obtain the compressed topology as shown in Fig. 2. The fully
connected topology serves as the baseline design and we
compare the results for the compressed design with baseline.
To ensure similar firing rates for all neurons in the excitatory
layer we employ an adaptive membrane threshold mechanism
called homoeostasis [3]. The threshold potential is expressed
as 𝑉𝑡ℎ𝑟𝑒𝑠ℎ = 𝑉𝑡 + θ, where 𝑉𝑡 is a constant and θ is changed
dynamically. θ increases every time a neuron fires and decays
exponentially. If a neuron fires more often, then its threshold
potential increases and it requires more inputs to fire again.
This ensures that all neurons in the excitatory layer learn
unique features and avoids few neurons from dominating the
response pattern.
2.3. Training & Testing
The connections from input to excitatory layer are trained
using the STDP weight update rule to classify an input pattern.
The training is unsupervised as we do not use any labels to
update the weights. The weight update is given by the formula
described in section 3.1. The input image is converted into a
Poisson spike train based on individual pixel intensities. The
excitatory neurons are assigned a class/label based on their
average spiking activity over all the images. During testing,
the class prediction is inferred by averaging the response of
all excitatory neurons per input. The class represented by the
neurons with the highest spiking rate is predicted as the image
label. The prediction is correct if the actual label matches the
one predicted by the SNN. This is similar to the approach
followed in [3].
3.
COMPRESSION TECHNIQUES
In this section, we describe the two compression techniques
(pruning and weight quantization) employed in this work to
convert the 2-layer fully connected SNN into a compact and
sparse topology for digit and image recognition.
3.1. STDP Based Pruning
Spike Timing Dependent Plasticity (STDP) is widely used as
an unsupervised Hebbian training algorithm for SNNs. STDP
postulates that the strength of the synapse is dependent on the
spike timing difference of the pre- and post-neuron. The
power law weight update for an individual synapse is
calculated as
𝑤 = × [𝑒
(
𝑡𝑝𝑟𝑒 −𝑡𝑝𝑜𝑠𝑡
)
− 𝑜𝑓𝑓𝑠𝑒𝑡] × [𝑤𝑚𝑎𝑥 − 𝑤]𝜇
where 𝑤 is the change in weight, is the learning rate, 𝑡𝑝𝑟𝑒
and 𝑡𝑝𝑜𝑠𝑡 are the time instant of pre- and post-synaptic spikes,
is the time constant, 𝑜𝑓𝑓𝑠𝑒𝑡 is a constant used for
depression, 𝑤𝑚𝑎𝑥 is the maximum constrained imposed on the
synaptic weight, 𝑤 is the previous weight value, 𝜇 is a
constant which governs the exponential dependence on
Decrease in weight
(Depression)
Increase in weight
(Potentiation)
-
(ms)
Fig. 3 Change in synaptic weight based on temporal correlation in pre- and
post-synaptic spikes. ( = 0.002, = 20 ms, 𝑜𝑓𝑓𝑠𝑒𝑡 = 0.4, 𝑤𝑚𝑎𝑥 =
1, 𝑤 = 0.5, 𝜇 = 0.9)
previous weight value. The weight update is positive
(potentiation) if the post-neuron spikes immediately after the
pre-neuron and negative (depression) if the spikes are far apart
(Fig. 3). We employ STDP to train the excitatory synapses as
well as to classify them as critical or non-critical. The
synapses whose weights do not increase for a set of inputs are
likely to have not contributed towards learning and thus can
be potential candidates for deletion. On the other hand,
synapses with higher weights have most likely learned the
input pattern and can be classified as critical (provided they
were initialized with small weights). The characteristic
features of the input is captured in connections with higher
weights and are critical for correct classification. Thus,
synapses with STDP trained weights ( 𝑤 + 𝑤) above
pruning threshold are considered critical and all other
synapses are marked as non-critical. The process of pruning
and training is performed repeatedly by dividing the entire
training set into multiple batches. After each batch the weights
of all non-critical synapses are reduced to zero (they still
remain in the network) and the network is trained with the
next batch. The synapses with zero weight continue to
participate in training, thus a non-critical synapse may
become critical for different inputs. The process of reducing
the weight to zero instead of eliminating the connection is
essential for the network to learn the representation of inputs
which appear in latter batches. The elimination of synapses
will either make the network not learn the new representations
or force the network to forget previous representations in
order to learn new inputs. The process of retaining non-critical
synapses with zero weight makes the network scalable. In the
final training step when all the training images have been
presented to the network any remaining non-critical
connections are permanently removed from the network. The
training starts with a fully connected network and the number
of critical connections gradually decrease over time. At the
end of training only the critical connections capturing the
characteristic features of the inputs remain.
Fully connected
input to
excitatory layer
Divide training images into
N batches. Each batch
containing equal number of
images
Synaptic connections from
input to excitatory layer
trained using STDP for M
batches. (M<N)
Check learned synaptic weights. Is
weight greater than pruning
threshold?
Yes
No
Mark the synapses as noncritical
Mark the synapses as
critical
Quantize the weights of the critical synapses to k-levels (0, w1, w2 ,….., wk-1)
w1 = Average of critical weights from 0 to (100/(k-1))th percentile weight. All synapses
with critical weights between 0 to (100/(k-1))th percentile weight are assigned with w1
Reduce the weights of noncritical synapses to zero.
Thus, temporarily removing
them from network.
w2 = Average of critical weights from (100/(k-1))th percentile to 2×(100/(k-1))th
percentile weight. Similarly, all these synapses share the same weight w2
.
.
wk-1 = Average of critical weights from (k-1) ×(100/(k-1))th percentile to k×(100/(k-1))th
percentile weight. Synapses with weights in this range are assigned w k-1
Yes
Anymore training
batches remaining?
Train the critical and noncritical synapses with STDP
for next batch of images.
No
Training ends. The noncritical synapses are pruned
permanently. Sparse
topology consists of only
the quantized critical
synapses
Fig. 4 Flowchart of the proposed algorithm for compressing SNN using pruning and weight quantization.
3.2. Weight Sharing and Quantization
The process of pruning reduces the overall connectivity, but
as mentioned in section 1, SNNs with continuous weight
values are difficult to implement in crossbar structures due to
limitations on the number of available conductance levels in
devices implementing the synapse. Weight sharing and
quantization discretizes the weights to the available number
of conductance levels. For example, network with 2-level
weight quantization has only two values of weights: 0 (no
connection) and w. All the synapses share the same weight (w)
and the entire network can be represented as a sparse binary
matrix. A 2-level weight quantized SNN can be implemented
in crossbar architecture with a single fixed resistor [17], where
w is the conductance of the resistor. The value of w is the
average weight of all the critical connections trained using
STDP. For example, we start with a network with n number
of synapses and after training (with pruning) m critical
synapses remain. The weights of the m critical synapses (w1,
w2, ….., wm) are continuous and computed based on the STDP
formula. The common weight value w is the average of w1 to
wm. The average is calculated after each pruning step and all
1.0
0.8
0.6
(a)
(b)
(c)
0.4
0.2
(d)
(e)
(f)
0.0
Fig. 5 Rearranged weights of the connections from input to excitatory for (a) MNIST baseline; (b) MNIST pruning; (c) MNIST pruning and quantization; (d)
Caltech 101 baseline; (e) Caltech 101 pruning; (f) Caltech 101 pruning and quantization
the critical connections share the same average weight (w1 to
wm is replaced with w). Like pruning, the process of weight
quantization and sharing is performed repeatedly after each
training batch. The value of w changes at every quantization
step
and the final value is obtained after training the network
5
for all the input batches. Similarly, the weights can be
quantized to 3-levels: 0, w1, w2, where w1 (w2) is the low
(high) conductance value. The conductance values are
computed by calculating the 50th percentile or the median
weight of all the critical connections. The lower conductance
value w1 is the average of all weights between 0 and the
median weight, w2 is the average of rest of the weights. The
critical synapses with weights between 0 and the median
weight are assigned w1. The critical synapses with weights
between median weight and the maximum weight share the
quantized vale of w2. The accuracy of the network is directly
proportional to the number of quantization levels. The
performance of the system improves with more number of
conductance levels. In a quantized SNN most of the
connections share the same weight which reduces the
implementation complexity.
Fig. 4 summarizes the proposed algorithm for achieving a
pruned and weight quantized SNN. The 2-layer untrained
network is initialized with full connectivity from input to
excitatory layer. The weights are randomly assigned from a
uniform distribution. The training images are divided into N
batches of equal number of images. The excitatory synapses
are trained with STDP weight update rule for M (M<N)
training batches. The connections with current weights above
the pruning threshold are classified as critical, rest of the
connections are marked as non-critical. The non-critical
connections are pruned by reducing their weights to zero. The
weights of the critical synapses are quantized to the required
number of conductance levels. The pruned and quantized
network is trained with STDP weight update rule for the next
training batch. The process of pruning and quantization is
performed at regular intervals for all the remaining training
batches. The training ends when all the batches have been
presented to the network. The first pruning and quantization
step is delayed for M batches to ensure proper detection of
critical connections and to mitigate the bias due to random
initialization of weights. The randomly initialized synapses
require more training images to capture the input
characteristic features. Once the input features have been
captured the pruning can be performed more often (after every
batch). Once the critical connections are identified, they more
or less remain the same during training. So, the first pruning
step is very crucial and more than one training batch is needed
to identify the critical synapses. The baseline design is trained
in a similar fashion with no pruning and quantization. All the
training images are presented in one batch and the weights are
trained using STDP.
baseline
baseline
(a)
(b)
baseline
baseline
(c)
(d)
(e)
(f)
Fig. 6 Variation in network connectivity with pruning threshold for (a) MNIST; (b) Caltech 101. Classification accuracy for different network connectivity
for (c) MNIST; (d)Caltech 101. Classification accuracy for different number of excitatory neurons for (e) MNIST; and (f) Caltech 101.
4.
EXPERIMENTAL METHODOLOGY
The proposed SNN topology is simulated in the open source
spiking neuron simulator BRIAN implemented in Python
[18]. BRIAN allows the modelling of biologically plausible
neurons and synapses defined by differential equations. The
parameters for the models are same as [3]. We tested our
network for digit recognition on the MNIST dataset [19] and
image recognition on a subset of images from the Caltech 101
dataset [20].
A. MNIST Dataset
MNIST dataset contains 28×28-pixel sized grayscale images
of digits 0-9. Thus, the input layer has 784 (28×28) neurons
fully connected with 100 excitatory neurons. The dataset is
divided into 60,000 training and 10,000 testing images. We
further divide the 60,000 training images into batches of 5,000
images (N=12). The baseline design is trained with entire
60,000 images presented one after another. The compressed
topology is initially trained for three training batches totaling
15,000 images (M=3). STDP based critical connections are
weight quantized and the weights of the non-critical
connections is reduced to zero. The pruned and quantized
network is trained with the next training batch. The process of
pruning and quantization is performed after every batch
henceforth. The rearranged input to excitatory synaptic
weights of the trained baseline topology with 100 excitatory
neurons is shown in Fig. 5(a). Fig. 5(b) shows the rearranged
(a)
(b)
Fig. 7 Classification accuracy for different network sparsity achieved by pruning the connections during training and before training for (a) MNIST; and (b)
Caltech 101.
synaptic weights of the same network compressed with
pruning threshold=0.3 and having continuous weight values.
The rearranged synaptic weights of the pruned and 2-level
weight quantized network is shown in Fig. 5(c).
B. Caltech 101 Dataset
Caltech 101 dataset is a collection of images of objects
belonging to 101 different categories. Each category consists
of 40 to 800 of around 300×200-pixel sized RGB images. The
dataset also provides annotations for the object in the image
which we use to separate the object from the background.
Unlike MNIST images, we preprocess the Caltech 101 images
to obtain 28×28-pixel sized grayscale images. Maintaining the
same image size across datasets ensures that we do not need
to change the network parameters. Out of 101, we selected 10
categories (yin yang, saxophone, stop sign, wrench, revolver,
Buddha, airplanes, pigeon, motorbikes, umbrella) and
randomly divided the total images in each category with 80%
training and 20% testing images. Since each category has
different number of images we create copies of images so that
each category has similar number of training and testing
images. This is necessary to avoid categories with more
images to dominate the learning in the network. The
preprocessing steps involved converting the images to
grayscale, averaging the pixels with Gaussian kernel of size
3×3 to suppress the noise and resizing the image to 28×28
pixels. All the preprocessing steps are performed using the
OpenCV library [21] in python. The training set consists of
10,000 images with 1000 images per category. The 10,000
images are further divided into batches of 500 images (N=20).
The baseline fully connected design is trained with entire
10,000 images. The compressed topology is initially trained
with ten training batches totaling 5000 images (M=10). The
critical connections are identified using STDP and weight
quantized. The non-critical synapses are pruned. The pruned
and quantized network is trained with all the remaining
batches with pruning and quantization performed after every
training batch. Fig. 5(d), (e) and (f) show the rearranged
synaptic weights for the baseline, pruned and weight
quantized topologies, respectively. Compression is performed
with pruning threshold of 0.2 and 2-level weight quantization.
5. RESULTS & ANALYSES
In this section, we analyze the results and compare the
performance of compressed topology with the baseline
design. The results are evaluated based on different
parameters like pruning threshold and number of excitatory
neurons. The removal of connections during training is
compared with training a sparse network, both having similar
connectivity.
5.1. Comparison with varying pruning threshold
The network connectivity is a strong function of the pruning
threshold; higher the threshold, sparser is the network. The
network connectivity is defined as the ratio of the actual
number of connections to the total number of possible
connections. The total number of possible connections with
100 excitatory neurons is 78400 (784×100). The number of
actual connections depend on the pruning steps. Fig. 6(a) and
(b) shows the variation in final network connectivity with
pruning threshold for MNIST and Caltech 101 datasets,
respectively. The red dot in Fig. 6(a) and (b) with zero pruning
threshold denotes the baseline design with no compression
techniques applied. Ideally, the connectivity should be 1 since
the connections are not pruned during training. The reduction
in connectivity results from the inherent depression in the
STDP learning rule. The further reduction in connectivity is
achieved by increasing the pruning threshold. The
compressed topologies are less sparse for low pruning
threshold compared to baseline. This is due to weight
quantization and sharing in early training stages. The shared
weight is the average of all critical weights which is higher
than almost half the critical weights. Thus, the average weight
replaces half the STDP learnt weights which were supposed
to be much lower. This reduces the effect of inherent STDP
depression on these synapses and reduces the probability of
their removal. Fig. 6(c) and (d) show the test accuracy for
different network connectivity for MNIST and Caltech 101
datasets, respectively. The baseline topology has an accuracy
of 81.6% (MNIST) and 84.2% (Caltech 101) which is
consistent with the results shown in [3]. The highest
5.2. Comparison with varying number of neurons
The change in classification accuracy with the number of
excitatory neurons for MNIST and Caltech 101 datasets is
shown in Figs. 6(e) and 6(f), respectively. The compressed
topology has 27% connectivity for MNIST and 42% for
Caltech 101 datasets, also the weights are quantized to 3levels. These parameters correspond to the best performance
of compressed topology (Fig. 6(c-d)). The baseline design
with 6400 neurons achieved an accuracy of 93.2% for MNIST
and 94.2% for Caltech 101 datasets. The pruned topology
achieved an accuracy of 91.5% with 8% connectivity and
92.8% with 12% connectivity for MNIST and Caltech 101
datasets, respectively.
5.3. Pruning while training
The objective of pruning is to increase the sparsity in the
network. This can be achieved in two ways: removing
connections during training of a fully connected network or
training a sparse network. The second approach is performed
by randomly removing connections from a fully connected
topology to produce a sparse network. In first case the
connections are removed systematically based on some
parameters whereas in the second approach the removal is
completely random. Nevertheless, in both the cases the final
network connectivity is same. Fig. 7(a) and (b) shows the
classification accuracy with varying network connectivity for
both the approaches for MNIST and Caltech 101 datasets,
respectively. The network with initial pruning is trained
similar to baseline with no compression techniques. The
pruning while training is the approach followed in rest of the
paper, where pruning is performed at regular intervals during
training. The results for both the networks are shown for
continuous weight distribution. Pruning the connections
during training performs better since only the non-critical
connections are removed. The network with initial sparsity is
constructed by randomly removing connections. This shows
that STDP successfully identifies the non-critical
connections.
5.4. Reduction in spike count or energy
The decrease in connectivity due to pruning leads to reduced
spiking activity in the excitatory layer. The active power of a
SNN is proportional to the firing activity in the network [2].
Thus, the energy can be quantified as the reduction in spike
count of excitatory neurons during testing. Fig. 8 shows the
normalized reduction in spiking activity or energy for
compressed topology with respect to baseline. The pruned
topology shows 3.1x and 2.2x improvement in energy
Normalized Energy
classification accuracy achieved for the compressed topology
is 79.5% (MNIST) and 82.8% (Caltech 101). The accuracy
degrades slightly compared to baseline but at the same time
there is immense drop in network connectivity. The
compressed topology is 75% (36%) sparser than the baseline
topology for MNIST (Caltech 101) dataset.
MNIST
Caltech 101
Fig. 8 Normalized improvement in energy with pruning and weight
quantization compared to baseline topology.
whereas the 2-level weight quantized network achieves 2.4x
and 1.92x improvement for MNIST and Caltech101 datasets,
respectively. The compressed topology may achieve
additional energy benefits from implementation in crossbar
structures with low power devices. The emerging post-CMOS
devices like MTJ, R-RAM and domain wall motion based
devices consume very low power in idle state due to
elimination of leakage. But these devices have limited number
of programmable conductance levels. The compressed
topology quantized to the available number of conductance
levels can reap the energy benefits provided by these devices.
The baseline design with continuous weight distribution is
difficult to implement with these devices.
6.
CONCLUSIONS
In this paper, we propose two compression techniques,
pruning and weight quantization to compress SNNs.
Compressed SNNs not only provide energy benefits but also
mitigate the issue of limited programmable conductance
levels of post-CMOS devices for neuromorphic
implementation. The novelty of our approach lies in fact that
STDP learning rule is used to decide the network pruning and
the weights of the critical connections are quantized to
specific levels depending on device and technology
requirements. The compressed topology is compared with the
2-layer fully connected topology for digit recognition with
MNIST dataset and image recognition with Caltech 101
dataset. The proposed topology achieves 3.1x and 2.2x
improvement in energy for MNIST and Caltech 101 datasets,
respectively, compared to baseline fully connected SNN. The
optimal compression parameters like pruning threshold and
weight quantization levels are decided by performing multiple
experiments with different images. Additionally, it is worth
mentioning that the proposed topology reduced the training
time by 3x and 2x for MNIST and Caltech 101 datasets,
respectively, by achieving faster training convergence.
ACKNOWLEDGEMENT
The research was funded in part by National Science
Foundation, Intel Corporation, Vannevar Bush Faculty
Fellowship, and by the Center for Spintronics (C-SPIN)
funded by DARPA/MARCO.
References
[1] D. S. Modha, “Introducing a brain-inspired computer,” Published
online at http://www.research.ibm.com/articles/brain-chip.shtml,
2017.
[2] P. A. Merolla, J. V. Arthur, R. Alvarez-Icaza, A. S. Cassidy, J.
Sawada, F. Akopyan, B. L. Jackson, N. Imam, C. Guo, Y. Nakamura
et al., “A million spiking-neuron integrated circuit with a scalable
communication network and interface,” Science, vol. 345, no. 6197,
pp. 668–673, 2014.
[3] P. U. Diehl and M. Cook, “Unsupervised learning of digit
recognition using spike-timing-dependent plasticity,” Frontiers in
computational neuroscience, vol. 9, 2015.
[4] J. H. Lee, T. Delbruck, and M. Pfeiffer, “Training deep spiking
neural networks using backpropagation,” Frontiers in neuroscience,
vol. 10, 2016.
[5] P. Merolla, J. Arthur, F. Akopyan, N. Imam, R. Manohar, and D.
S. Modha, “A digital neurosynaptic core using embedded crossbar
memory with 45pj per spike in 45nm,” in Custom Integrated Circuits
Conference (CICC), 2011 IEEE. IEEE, 2011, pp. 1–4.
[6] B. Liu, W. Wen, Y. Chen, X. Li, C.R. Wu, and T.Y. Ho, “Eda
challenges for memristor-crossbar based neuromorphic computing,”
in Proceedings of the 25th edition on Great Lakes Symposium on
VLSI. ACM, 2015, pp. 185–188.
[7] E. Linn, R. Rosezin, C. Kugeler, and R. Waser, “Complementary
resistive switches for passive nanocrossbar memories,” Nature
materials, vol. 9, no. 5, p. 403, 2010.
[8] M. Hu, H. Li, Y. Chen, Q. Wu, G. S. Rose, and R. W. Linderman,
“Memristor crossbar-based neuromorphic computing system: A case
study,” IEEE transactions on neural networks and learning systems,
vol. 25, no. 10, pp. 1864–1878, 2014.
[9] S. Park, H. Kim, M. Choo, J. Noh, A. Sheri, S. Jung, K. Seo, J.
Park, S. Kim, W. Lee et al., “Rram-based synapse for neuromorphic
system with pattern recognition function,” in Electron Devices
Meeting (IEDM), 2012 IEEE International. IEEE, 2012, pp. 10–2.
[10] P. Krzysteczko, J. Munchenberger, M. Schafers, G. Reiss, and
A. Thomas, “The memristive magnetic tunnel junction as a
nanoscopic synapse-neuron system,” Advanced Materials, vol. 24,
no. 6, pp. 762– 766, 2012.
[11] M. Sharad, C. Augustine, G. Panagopoulos, and K. Roy, “Spinbased neuron model with domain-wall magnets as synapse,” IEEE
Transactions on Nanotechnology, vol. 11, no. 4, pp. 843–853, 2012.
[12] P. R. Huttenlocher et al., “Synaptic density in human frontal
cortex- developmental changes and effects of aging,” Brain Res, vol.
163, no. 2, pp. 195–205, 1979.
[13] G. Chechik, I. Meilijson, and E. Ruppin, “Synaptic pruning in
development: a computational account,” Neural computation, vol.
10, no. 7, pp. 1759–1777, 1998.
[14] Y. LeCun, J. S. Denker, and S. A. Solla, “Optimal brain
damage,” in Advances in Neural Information Processing Systems 2,
1990,
pp.
598–605.
[Online].
Available:
http://papers.nips.cc/paper/250-optimalbrain-damage.pdf
[15] S. Han, H. Mao, and W. J. Dally, “Deep compression:
Compressing deep neural networks with pruning, trained
quantization
and
huffman
coding,”
arXiv
preprint
arXiv:1510.00149, 2015.
[16] S. Dora, S. Sundaram, and N. Sundararajan, “A two stage
learning algorithm for a growing-pruning spiking neural network for
pattern classification problems,” in International Joint Conference on
Neural Networks (IJCNN), 2015. IEEE, 2015, pp. 1–7.
[17] H. Graf, L. Jackel, R. Howard, B. Straughn, J. Denker, W.
Hubbard, D. Tennant, and D. Schwartz, “Vlsi implementation of a
neural network memory with several hundreds of neurons,” in AIP
conference proceedings, vol. 151, no. 1. AIP, 1986, pp. 182–187.
[18] D. Goodman and R. Brette, “Brian: a simulator for spiking
neural networks in python,” Frontiers in neuroinformatics, vol. 2,
2008.
[19] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradientbased learning applied to document recognition,” Proceedings of the
IEEE, vol. 86, no. 11, pp. 2278–2324, 1998.
[20] L. Fei-Fei, R. Fergus, and P. Perona, “One-shot learning of
object categories,” IEEE transactions on pattern analysis and
machine intelligence, vol. 28, no. 4, pp. 594–611, 2006.
[21] G. Bradski, “The opencv library.” Dr. Dobb’s Journal: Software
Tools for the Professional Programmer, vol. 25, no. 11, pp. 120–123,
2000.
| 9cs.NE
|
arXiv:0807.1835v4 [math.AC] 2 Sep 2015
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH
ZERO-DIVISORS
PEYMAN NASEHPOUR
A BSTRACT. Let M be an R-module and c the function from M to the ideals of R defined
by c(x) = ∩{I : I is an ideal of R and x ∈ IM}. M is said to be a content R-module if
x ∈ c(x)M, for all x ∈ M. B is called a content R-algebra, if it is a faithfully flat and
content R-module and it satisfies the Dedekind-Mertens content formula. In this article,
we prove some new results for content modules and algebras by using ideal theoretic
methods.
C ONTENTS
1. Introduction
2. Content Modules and Algebras
3. Prime Ideals in Content Algebras
4. Rings and modules having few zero-divisors
5. Gaussian and Armendariz Algebras
6. Nilradical and Jacobson radical of content algebras
7. Acknowledgment
References
1
3
7
8
10
12
14
14
1. I NTRODUCTION
This preprint is a collection of some of the definitions and results that the author was
working on them during his studentship at the Department of Mathematics and Computer
Science at the University of Osnabrück. Though this preprint was never submitted for
publication, but its definitions and results were reproduced and used in a couple of different papers composed by the author and were published in different journals. Since the
author has cited to this preprint in some of his papers, it was necessary to update and edit
it for the convenience of the readers of his papers.
Throughout this paper, all rings are commutative with unit and all modules are assumed
to be unitary. In this paper, we discuss the ideal theoretic properties of some special
algebras called content algebras. This concept stems from Dedekind-Mertens content
1
2
PEYMAN NASEHPOUR
formula for polynomial rings. For doing this, we need to know about content modules
introduced in [22], which in the next section, we introduce them and then we start the
main theme of the paper that is on content algebras over rings with zero-divisors. Our
main goal is to show that a couple of ideal theoretic results of polynomial rings, also hold
for content algebras.
The class of content modules are themselves considerable and interesting in the field of
module theory. For example, all projective modules are content and a kind of Nakayama
lemma holds for content modules.
Let R be a commutative ring with identity, and M a unitary R-module and the content
function, c from M to the ideals of R defined by
c(x) =
\
{I : I is an ideal of R and x ∈ IM}.
M is called a content R-module if x ∈ c(x)M, for all x ∈ M.
In Section 2, we prove that if M is a content R-module and Jac(R) is the Jacobson
radical of R and I, an ideal of R such that I ⊆ Jac(R), then IM = M implies M = (0).
Also we introduce content and weak content algebras and mention some of their basic
properties that we need them in the rest of the paper for the convinience of the reader. Let
R be a commutative ring with identity and R′ an R-algebra. R′ is defined to be a content
R-algebra, if the following conditions hold:
(1) R′ is a content R-module.
(2) (Faithfully flatness) For any r ∈ R and f ∈ R′ , the equation c(r f ) = rc( f ) holds
and c(R′ ) = R.
(3) (Dedekind-Mertens content formula) For each f and g in R′ , there exists a natural
number n such that c( f )n c(g) = c( f )n−1 c( f g).
In this section, also we prove that if R is a ring and S, a commutative monoid, then the
monoid ring B = R[S] is a content R-algebra if and only if one of the following conditions
satisfies:
(1) For f , g ∈ B, if c( f ) = c(g) = R, then c( f g) = R.
(2) (McCoy’s Property) For g ∈ B, g is a zero-divisor of B iff there exists r ∈ R − {0}
such that rg = 0.
(3) S is a cancellative and torsion-free monoid.
In Section 3, we discuss about prime ideals of content and weak content algebras (Cf.
[23]) and we show that in content extensions, minimal primes extend to minimal primes.
More precisely, if B is a content R-algebra, then there is a correspondence between Min(R)
and Min(B), with the function ϕ : Min(R) −→ Min(B) defined by p −→ pB.
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH ZERO-DIVISORS
3
In Section 4, we introduce a family of rings and modules who have very few zerodivisors. It is a well-known result that the set of zero-divisors of a finitely generated
module over a Noetherian ring is a finite union of the associated primes of the module
[16, p. 55]. Rings having few zero-divisors have been introduced in [8]. We define that
a ring R has very few zero-divisors, if Z(R) is a finite union of prime ideals in Ass(R). In
this section, we prove that if R is a ring that has very few zero-divisors and B is a content
R-algebra, then B has very few zero-divisors also.
Another celebrated property of Noethering rings is that every ideal entirely contained
in the set of its zero-divisors has a nonzero annihilator. A ring R has Property (A), if
each finitely generated ideal I ⊆ Z(R) has a nonzero annihilator [15]. In Section 5, also
we prove some results for content algebras over rings having Property (A) and then we
discuss on rings and modules having few zero-divisors in more details.
In Section 5, we discuss Gaussian and Armendariz content algebras that are natural
generalization of the same concepts in polynomials rings. In this section we show that if
B is a content R-algebra, then B is a Gaussian R-algebra iff for any ideal I of R, B/IB is
an Armendariz (R/I)-algebra. This is a generalization of a result in [3].
In Section 6, we prove some results about Nilradical and Jacobson radical of content algebras, i.e., statements about content algebras over domainlike and presimplifiable rings.
Also we show some results similar to what we have for the ring R(X ) = R[X ]S, where
S = { f ∈ R[X ] : c( f ) = R}.
Some of the results of the present paper can be generalized to monoid modules. Whenever it is possible, we bring those results, though their similar proofs are omitted. Unless
otherwise stated, our notation and terminology will follow as closely as possible that of
Gilmer [11].
2. C ONTENT M ODULES
AND
A LGEBRAS
In this section, first we give the definition of content modules and prove Nakayama
lemma for them and then we introduce content and weak content algebras with some
results that we need in the rest of the paper for the convinience of the reader. More on
content modules and algebras can be found in [22] and [23].
Definition 1. Let R be a commutative ring with identity, and M a unitary R-module and
the content function, c from M to the ideals of R defined by
c(x) =
\
{I : I is an ideal of R and x ∈ IM}.
4
PEYMAN NASEHPOUR
M is called a content R-module if x ∈ c(x)M, for all x ∈ M, also when N is a non-empty
subset of M, then by c(N) we mean the ideal generated by all c(x) that x ∈ N.
Theorem 2. Nakayama Lemma for Content Modules: Let M be a content R-module
and Jac(R) be the Jacobson radical of R and I be an ideal of R such that I ⊆ Jac(R). If
IM = M, then M = (0).
Proof. Let x ∈ M. Since M is a content R-module, x ∈ c(x)M, but IM = M, so x ∈ c(x)IM
and therefore c(x) ⊆ c(x)I, but c(x) is a finitely generated ideal of R [22, 1.2, p. 51], so by
Nakayama lemma for finitely generated modules, c(x) = (0) and consequently x = 0.
Corollary 3. Let P be a projective R-module and Jac(R) be the Jacobson radical of R and
I be an ideal of R such that I ⊆ Jac(R). If IP = P, then P = (0).
Proof. Any projective module is a content module [22, Corollary 1.4].
Lemma 4. Let M be an R-module. The following statements are equivalent:
(1) M is a content R-module, i.e. x ∈ c(x)M, for all x ∈ M.
T
T
(2) For any non-empty family of ideals {Ii } of R, (Ii )M = (Ii M).
Moreover when M is a content R-module, c(x) is a finitely generated ideal of R, for all
x ∈ M.
Theorem 5. Let M be a content R-module. Then the following are equivalent:
(1) M is flat.
(2) For every r ∈ R and x ∈ M, rc(x) = c(rx).
Moreover, M is faithfully flat iff M is flat and c(M) = R.
Proof. Proof at [22, Corollary 1.6, p. 53] and [22, Remark 2.3(d), p. 56].
The application of the above theorem will appear in the next section on content algebras. Also with the help of the above theorem, we will describe some of the prime and
primary submodules of faithfully flat and content modules.
Definition 6. Let M be an R-module and P be a proper R-submodule of M. P is said to
be a prime submodule of M, if rx ∈ P implies x ∈ P or rM ⊆ P, for each r ∈ R and x ∈ M.
Definition 7. Let M be an R-module and P be a proper R-submodule of M. P is said to
be a primary submodule of M, if rx ∈ P then x ∈ P or there exists a natural number n such
that rn M ⊆ P, for each r ∈ R and x ∈ M.
Theorem 8. Let M be a content and faithfully flat R-module and p be an ideal of R. Then
pM is a primary (prime) R-submodule of M iff p is a primary (prime) ideal of R.
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH ZERO-DIVISORS
5
Proof. Let p be a prime ideal of R and r ∈ R and x ∈ M such that rx ∈ pM. Therefore
c(rx) ⊆ p and since c(rx) = rc(x) we have rc(x) ⊆ p and this means that c(x) ⊆ p or
(r) ⊆ p and at last x ∈ pM or rM ⊆ pM. Notice that since M is a faithfully flat R-module,
pM 6= M. The other assertions can be proved in a similar way.
Content algebras and later weak content algebras were introduced and discussed in [22]
and [23] respectively. Content algebras are actually a natural generalization of (almost)
polynomial rings [9]. Let R be a commutative ring with identity. For f ∈ R[X ], the content
of f , denoted by c( f ), is defined as the R-ideal generated by the coefficients of f . One
can easily check that c( f g) ⊆ c( f )c(g) for the two polynomials f , g ∈ R[X ] and may
ask when the equation c( f g) = c( f )c(g) holds. Tsang, a student of Kaplansky, proved
that if D is an integral domain and c( f ), for f ∈ D[X ], is an invertible ideal of D, then
c( f g) = c( f )c(g), for all g ∈ D[X ]. Tsang’s guess was that the converse was true and
the correctness of her guess was completely proved some decades later [17]. Though the
equation c( f g) = c( f )c(g) does not hold always, a weaker formula always holds that is
called the Dedekind-Mertens content formula [4].
Theorem 9. Dedekind-Mertens Lemma. Let R be a ring. For each f and g in R[X ], there
exists a natural number n such that c( f )n c(g) = c( f )n−1 c( f g).
For a history of Dedekind-Mertens lemma, refer to [13] and its combinatorial proof,
refer to [6, Corollary 2]. Now we bring the definition of content algebras from [22, 6, p.
63]:
Definition 10. Let R be a commutative ring with identity and R′ an R-algebra. R′ is
defined to be a content R-algebra, if the following conditions hold:
(1) R′ is a content R-module.
(2) (Faithfully flatness) For any r ∈ R and f ∈ R′ , the equation c(r f ) = rc( f ) holds
and c(R′ ) = R.
(3) (Dedekind-Mertens content formula) For each f and g in R′ , there exists a natural
number n such that c( f )n c(g) = c( f )n−1 c( f g).
A good example of a content R-algebra is the group ring R[G] where G is a torsion-free
abelian group [19]. This is actually a free R-module. For some examples of content Ralgebras that as R-modules are not free, one can refer to [22, Examples 6.3, p. 64]. Rush
defined weak content algebras as follows [23, p. 330]:
Definition 11. Let R be a commutative ring with identity and R′ an R-algebra. R′ is
defined to be a weak content R-algebra, if the following conditions hold:
(1) R′ is a content R-module.
6
PEYMAN NASEHPOUR
(2) (Weak content formula) For all f and g in R′ , c( f )c(g) ⊆ rad(c( f g)) (Here rad(A)
denotes the radical of the ideal A).
Also he gave an equivalent condition for when an algebra that is a content module is a
weak content algebra [23, Theorem 1.2, p. 330]:
Theorem 12. Let R′ be an R-algebra such that R′ is a content R-module. The following
are equivalent:
(1) R′ is a weak content R-algebra.
(2) For each prime ideal p of R, either pR′ is a prime ideal of R′ , or pR′ = R′ .
It is obvious that content algebras are weak content algebras, but the converse is not
true. For more on this interesting topic, refer to [10, Example 4.1]. We end our introductory section with the following results:
Theorem 13. Let R be a ring and S be a commutative monoid. Then the following statements about the monoid algebra B = R[S] are equivalent:
(1)
(2)
(3)
(4)
B is a content R-algebra.
B is a weak content R-algebra.
For f , g ∈ B, if c( f ) = c(g) = R, then c( f g) = R.
(McCoy’s Property) For g ∈ B, g is a zero-divisor of B iff there exists r ∈ R − {0}
such that rg = 0.
(5) S is a cancellative and torsion-free monoid.
Proof. (1) → (2) → (3) and (1) → (4) are obvious ([22] and [23]). Also according to
[19] (5) implies (1). Therefore the proof will be complete if we prove that (3) and also (4)
implies (5).
(3) → (5): We prove that if S is not cancellative nor torsion-free then (3) cannot hold.
For the moment, suppose that S is not cancellative, so there exist s,t, u ∈ S such that
s +t = s + u while t 6= u. Put f = X s and g = (X t − X u ). Then obviously c( f ) = c(g) = R,
while c( f g) = (0). Finally suppose that S is cancellative but not torsion-free. Let s,t ∈ S
be such that s 6= t, while ns = nt for some natural n. Choose the natural number k minimal
(k−i−1)s+it ).
so that ns = nt. Then we have 0 = X ks − X kt = (X s − X t )(∑k−1
i=0 X
Since S is cancellative, the choice of k implies that (k −i1 −1)s+i1t 6= (k −i2 −1)s+i2t
(k−i−1)s+it 6= 0, and this completes the proof.
for 0 ≤ i1 < i2 ≤ k − 1. Therefore ∑k−1
i=0 X
In a similar way one can prove (4) → (5) [12, p. 82].
Remark 14. Let S be a commutative monoid and M be a nonzero R-module. It is trivial
that M[S] is an R[S]-module. Let g ∈ M[S] and put g = m1 s1 + m2 s2 + · · · + mn sn , where
m1 , . . ., mn ∈ M and s1 , . . . , sn ∈ S. We define the content of g to be the R-submodule of M
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH ZERO-DIVISORS
7
generated by the coefficients of g, i.e. c(g) = (m1 , . . . , mn ). The following statements are
equivalent:
(1) S is a cancellative and torsion-free monoid.
(2) For all f ∈ R[S] and g ∈ M[S], there exists a natural number k such that c( f )k c(g) =
c( f )k−1 c( f g).
(3) (McCoy’s Property) For all f ∈ R[S] and g ∈ M[S] − {0}, if f g = 0, then there
exists an m ∈ M − {0} such that f · m = 0.
Proof. (1) → (2) and (2) → (3) have been proved in [19] and [18] respectively. For
(3) → (1) use the technique in the previous theorem.
3. P RIME I DEALS
IN
C ONTENT A LGEBRAS
Let B be a weak content R-algebra such that for all m ∈ Max(R) (by Max(R), we mean
the maximal ideals of R), we have mB 6= B, then by Theorem 12, prime ideals extend
to prime ideals. Particularly in R-content algebras - that are faithfully flat R-modules by
definition - primes extend to primes. We recall that when B is a content R-algebra, then g
is a zero-divisor of B, iff there exists an r ∈ R − {0} such that rg = 0 [22, 6.1, p. 63]. Now
we give the following theorem about associated prime ideals. We assert that by AssR (M),
we mean the associated prime ideals of R-module M.
Theorem 15. Let B be a content R-algebra and M a nonzero R-module. If p ∈ AssR (M)
then pB ∈ AssB (M ⊗R B).
Proof. Let p ∈ AssR (M), therefore 0 −→ R/p −→ M is an R-exact sequence. Since B is
a faithfully flat R-module, we have the following B-exact sequence:
0 −→ B/pB −→ M ⊗R B
with pB = Ann(x ⊗R 1B ). Since B is a content R-algebra, pB is a prime ideal of B.
We give a general theorem on minimal prime ideals in algebras. One of the results of
this theorem is that in faithfully flat weak content algebras (including content algebras),
minimal prime ideals extend to minimal prime ideals and more precisely, there is actually
a correspondence between the minimal prime ideals of the ring and their extensions in the
algebra.
Theorem 16. Let B be an R-algebra with the following properties:
(1) For each prime ideal p of R, the extended ideal pB of B is prime.
(2) For each prime ideal p of R, pB ∩ R = p.
Then the function ϕ : Min(R) −→ Min(B) given by p −→ pB is a bijection.
8
PEYMAN NASEHPOUR
Proof. First we prove that if p is a minimal prime ideal of R, then pB is also a minimal
prime ideal of B. Let Q be a prime ideal of B such that Q ⊆ pB. So Q ∩ R ⊆ pB ∩ R = p.
Since p is a minimal prime ideal of R, we have Q ∩ R = p and therefore Q = pB. This
means that ϕ is a well-defined function. Obviously the second condition causes ϕ to
be one-to-one. The next step is to prove that ϕ is onto. For showing this, consider Q ∈
Min(B), so Q∩R is a prime ideal of R such that (Q∩R)B ⊆ Q and therefore (Q∩R)B = Q.
Our claim is that (Q ∩ R) is a minimal prime ideal of R. Suppose p is a prime ideal of R
such that p ⊆ Q ∩ R, then pB ⊆ Q and since Q is a minimal prime ideal of B, pB = Q =
(Q ∩ R)B and therefore p = Q ∩ R.
Corollary 17. Let B be a weak content and faithfully flat R-algebra, then the function
ϕ : Min(R) −→ Min(B) given by p −→ pB is a bijection.
Proof. Since B is a weak content and faithfully flat R-algebra, then for each prime ideal p
of R, the extended ideal pB of B is prime and also c(1B ) = R by [22, Corollary 1.6] and
[23, Theorem 1.2]. Now consider r ∈ R, then c(r) = c(r · 1B) = r · c(1B ) = (r). Therefore
if r ∈ IB ∩ R, then (r) = c(r) ⊆ I. Thus for each prime ideal p of R, pB ∩ R = p.
Corollary 18. Let R be a Noetherian ring. Then ϕ : Min(R) −→ Min(R[[X1, . . . , Xn ]])
given by p −→ p.(R[[X1, . . . , Xn]]) is a bijection.
4. R INGS
AND MODULES HAVING FEW ZERO - DIVISORS
For a ring R, by Z(R), we mean the set of zero-divisors of R. In [8], it has been defined
that a ring R has few zero-divisors, if Z(R) is a finite union of prime ideals. We present
the following definition to prove some other theorems related to content algebras.
Definition 19. A ring R has very few zero-divisors, if Z(R) is a finite union of prime ideals
in Ass(R).
Theorem 20. Let R be a ring that has very few zero-divisors. If B is a content R-algebra,
then B has very few zero-divisors also.
Proof. Let Z(R) = p1 ∪ p2 ∪ · · · ∪ pn , where pi ∈ AssR (R) for all 1 ≤ i ≤ n. We will
show that Z(B) = p1 B ∪ p2 B ∪ · · · ∪ pn B. Let g ∈ Z(B), so there exists an r ∈ R − {0}
such that rg = 0 and so rc(g) = (0). Therefore c(g) ⊆ Z(R) and this means that c(g) ⊆
p1 ∪ p2 ∪ · · · ∪ pn and according to Prime Avoidance Theorem, we have c(g) ⊆ pi , for
some 1 ≤ i ≤ n and therefore g ∈ pi B. Now let g ∈ p1 B ∪ p2 B ∪ · · · ∪ pn B so there exists
an i such that g ∈ pi B, so c(g) ⊆ pi and c(g) has a nonzero annihilator and this means that
g is a zero-divisor of B. Note that pi B ∈ AssB (B), for all 1 ≤ i ≤ n.
Remark 21. Let R be a ring and consider the following three conditions on R:
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH ZERO-DIVISORS
9
(1) R is a Noetherian ring.
(2) R has very few zero-divisors.
(3) R has few zero-divisors.
Then, (1) → (2) → (3) and none of the implications are reversible.
Proof. For (1) → (2) use [16, p. 55]. It is obvious that (2) → (3).
Suppose k is a field, A = k[X1 , X2, X3 , . . ., Xn , . . .] and m = (X1, X2 , X3, . . . , Xn , . . .) and at
last I = (X12, X22 , X32, . . . , Xn2, . . .). Since A is a content k-algebra and k has very few zerodivisors, A has very few zero-divisors while it is not a Noetherian ring. Also consider the
ring R = A/I. It is easy to check that R is a quasi-local ring with the only prime ideal m/I
and Z(R) = m/I and finally m/I ∈
/ AssR (R). Note that AssR (R) = 0.
/
Now we bring the following definition from [15] and prove some other results for
content algebras.
Definition 22. A ring R has Property (A), if each finitely generated ideal I ⊆ Z(R) has a
nonzero annihilator.
Let R be a ring. If R has very few zero-divisors (for example if R is Noetherian), then R
has Property (A) [16, Theorem 82, p. 56], but there are some non-Noetherian rings which
have not Property (A) [16, Exercise 7, p. 63]. The class of non-Noetherian rings having
Property (A) is quite large [14, p. 2].
Theorem 23. Let B be a content R-algebra such that R has Property (A). Then T (B) is a
content T (R)-algebra, where by T (R), we mean total quotient ring of R.
Proof. Let S′ = B − Z(B). If S = S′ ∩ R, then S = R − Z(R). We prove that if c( f ) ∩ S = 0,
/
′
then f 6∈ S . In fact when c( f ) ∩ S = 0,
/ then c( f ) ⊆ Z(R) and since R has Property (A),
c( f ) has a nonzero annihilator. This means that f is a zero-divisor of B and according to
[22, Theorem 6.2, p. 64], the proof is complete.
Theorem 24. Let B be a content R-algebra such that the content function c : B −→ FId(R)
is onto, where by FId(R), we mean the set of finitely generated ideals of R. The following
statements are equivalent:
(1) R has Property (A).
(2) For all f ∈ B, f is a regular member of B iff c( f ) is a regular ideal of R.
Proof. (1) → (2): Let R has Property (A). If f ∈ B is regular, then for all nonzero r ∈ R,
r f 6= 0 and so for all nonzero r ∈ R, rc( f ) 6= (0), i.e. Ann(c( f )) = (0) and according to
the definition of Property (A), c( f ) 6⊆ Z(R). This means that c( f ) is a regular ideal of R.
Now let c( f ) be a regular ideal of R, so c( f ) 6⊆ Z(R) and therefore Ann(c( f )) = (0). This
10
PEYMAN NASEHPOUR
means that for all nonzero r ∈ R, rc( f ) 6= (0), hence for all nonzero r ∈ R, r f 6= 0. Since
B is a content R-algebra, f is not a zero-divisor of B.
(2) → (1): Let I be a finitely generated ideal of R such that I ⊆ Z(R). Since the content
function c : B −→ FId(R) is onto, there exists an f ∈ B such that c( f ) = I. But c( f ) is not
a regular ideal of R, therefore according to our assumption, f is not a regular member of
B. Since B is a content R-algebra, there exists a nonzero r ∈ R such that r f = 0 and this
means that rI = (0), i.e. I has a nonzero annihilator.
Remark 25. In the above theorem the surjectivity condition for the content function c is
necessary, because obviously R is a content R-algebra and the condition (2) is satisfied,
while one can choose the ring R such that it does not have Property (A) [16, Exercise 7,
p. 63].
Theorem 26. Let R have property (A) and B be a content R-algebra. Then Z(B) is a finite
union of prime ideals in Min(B) iff Z(R) is a finite union of prime ideals in Min(R).
Proof. The proof is similar to the proof of Theorem 20 by considering Theorem 16.
Please note that if R is a Noetherian reduced ring, then Z(R) is a finite union of prime
ideals in Min(R) (Refer to [16, Theorem 88, p. 59] and [14, Corollary 2.4]). Now we
generalize the definition of rings having very few zero-divisors in the following way and
prove the monoid module version of the above theorem.
Definition 27. An R-module M has very few zero-divisors, if ZR (M) is a finite union of
prime ideals in AssR (M).
Remark 28. Examples of modules having very few zero-divisors. If R is a Noetherian
ring and M is an R-module such that AssR (M) is finite, then obviously M has very few
zero-divisors. For example AssR (M) is finite if M is a finitely generated R-module [16, p.
55]. Also if R is a Noetherian quasi-local ring and M is a balanced big Cohen-Macaulay
R-module, then AssR (M) is finite [7, Proposition 8.5.5, p. 344].
Theorem 29. Let R-module M have very few zero-divisors. If S is a commutative, cancellative, torsion-free monoid then the R[S]-module M[S] has very few zero-divisors also.
Proof. The proof is similar to the proof of Theorem 20.
5. G AUSSIAN
AND
A RMENDARIZ A LGEBRAS
Definition 30. Let B be an R-algebra that is a content R-module. B is said to be a Gaussian
R-algebra if c( f g) = c( f )c(g), for all f , g ∈ B.
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH ZERO-DIVISORS
11
For example if B is a content R-algebra such that every nonzero finitely generated ideal
of R is cancellation ideal of R, then B is a Gaussian R-algebra. Another example is given
in the following remark:
Remark 31. Let (R, m) be a quasi-local ring with m2 = (0). If B is a content R-algebra,
then B is a Gaussian R-algebra.
Proof. Let f , g ∈ B such that c( f ) ⊆ m and c(g) ⊆ m, then c( f g) = c( f )c(g) = (0), otherwise one of them, say c( f ), is R and according to Dedekind-Mertens content formula,
we have c( f g) = c(g) = c( f )c(g).
Theorem 32. Let M be an R-module such that every finitely generated R-submodule of M
is cyclic and S be a commutative, cancellative, torsion-free monoid. Then for all f ∈ R[S]
and g ∈ M[S], c( f g) = c( f )c(g).
Proof. Let g ∈ M[S] such that g = m1 g1 + m2 g2 + · · · + mn gn , where m1 , m2 , . . . , mn ∈ M
and g1 , g2 , . . ., gn ∈ S. Then there exists an m ∈ M, such that c(g) = (m1 , m2 , . . . , mn ) =
(m). From this, we can get mi = ri m and m = ∑ si mi , where ri , si ∈ R. Put d = ∑ si ri , then
m = dm. Since S is an infinite set, it is possible to choose gn+1 ∈ S − {g1 , g2, . . . , gn } and
put g′ = r1 g1 + r2 g2 + · · · + rn gn + (1 − d)gn+1 . One can easily check that g = g′ m and
c(g′ ) = R and c( f g) = c( f g′ m) = c( f g′ )m = c( f )m = c( f )c(g).
Corollary 33. Let R be a ring such that every finitely generated ideal of R is principal
and S be a commutative, cancellative, torsion-free monoid. Then R[S] is a Gaussian Ralgebra.
For more about content formulas for polynomial modules, refer to [21] and [5].
In the next step, we define Armendariz algebras and show their relationships with
Gaussian algebras. Armendariz rings were introduced in [24]. A ring R is said to be
an Armendariz ring if for all f , g ∈ R[X ] with f = a0 + a1 X + · · · + an X n and g = b0 +
b1 X + · · · + bm X m , f g = 0 implies ai b j = 0, for all 0 ≤ i ≤ n and 0 ≤ j ≤ m. This is equivalent to say that if f g = 0, then c( f )c(g) = 0 and our inspiration to define Armendariz
algebras.
Definition 34. Let B be an R-algebra such that it is a content R-module. We say B is an
Armendariz R-algebra if for all f , g ∈ B, if f g = 0, then c( f )c(g) = (0).
For example if B is a weak content R-algebra and R is a reduced ring, then B is an
Armendariz R-algebra.
Theorem 35. Let R be a ring and (0) a p-primary ideal of R such that p2 = (0) and B a
content R-algebra. Then B is an Armendariz R-algebra.
12
PEYMAN NASEHPOUR
Proof. Let f , g ∈ B, where f g = 0. If f = 0 or g = 0, then definitely c( f )c(g) = 0,
otherwise suppose that f 6= 0 and g 6= 0, therefore f and g are both zero-divisors of B.
Since (0) is a p-primary ideal of R, so (0) is a pB-primary ideal of B [23, R, p. 331] and
therefore pB is the set of zero-divisors of B. So f , g ∈ pB and this means that c( f ) ⊆ p
and c(g) ⊆ p. Finally c( f )c(g) ⊆ p2 = (0).
In order to characterize Gaussian algebras in terms of Armendariz algebras, we should
mention the following useful remark.
Remark 36. Let R be a ring and I an ideal of R. If B is a Gaussian R-algebra then B/IB
is a Gaussian (R/I)-algebra also.
Theorem 37. Let B be a content R-algebra. Then B is a Gaussian R-algebra iff for any
ideal I of R, B/IB is an Armendariz (R/I)-algebra.
Proof. (→) : According to the above remark, since B is a Gaussian R-algebra, B/IB is
a Gaussian (R/I)-algebra and obviously any Gaussian algebra is an Armendariz algebra
and this completes the proof.
(←) : One can easily check that if B is an algebra such that it is a content R-module,
then for all f , g ∈ B, c( f g) ⊆ c( f )c(g) [23, Proposition 1.1, p. 330]. Therefore we need to
prove that c( f )c(g) ⊆ c( f g). Put I = c( f g), since B/IB is an Armendariz (R/I)-algebra
and c( f g + IB) = I so c( f + IB)c(g + IB) = I and this means that c( f )c(g) ⊆ c( f g).
For more about Armendariz and Gaussian rings, one can refer to [3].
6. N ILRADICAL
AND JACOBSON RADICAL OF CONTENT ALGEBRAS
Definition 38. A ring R is said to be domainlike if any zero-divisor of R is nilpotent, i.e.
Z(R) ⊆ Nil(R) [2, Definition 9].
Theorem 39. If B is a content R-algebra, then R is domainlike iff B is domainlike.
Proof. The ring R is domainlike iff (0) is a primary ideal of R [2, Lemma 10]. Also it is
easy to prove that if B is a content R-algebra, then q is a p-primary ideal of R iff qB is a
pB-primary ideal of B [R, p. 331].
In a similar way one can see:
Remark 40. Let S be a commutative, cancellative and torsion-free monoid and M be an
R-module. Then ZR (M) ⊆ Nil(R) iff ZR[S] (M[S]) ⊆ Nil(R[S]).
Remark 41. If B is a weak content R-algebra, then Nil(B) = Nil(R)B, particularly R is a
reduced ring iff B is a reduced ring.
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH ZERO-DIVISORS
13
Proof. It is obvious that Nil(R)B ⊆ Nil(B). Also it is easy to prove that for all f ∈ B and
natural number n, we have c( f )n ⊆ rad(c( f n )) and therefore if f ∈ B is nilpotent, then
c( f ) ⊆ Nil(R) and consequently f ∈ Nil(R)B.
Definition 42. A ring R is called presimplifiable if any zero-divisor of R is a member of
the Jacobson radical of R, i.e. Z(R) ⊆ Jac(R).
For more about presimplifiable rings, one can refer to [2]. In the following, our aim is
show when some of the content algebras are presimplifiable. For doing that, we need to
know about localization of content algebras that have been discussed in [22, Section 3, p.
56-58]. Actually we are interested in the following special case of localization:
Let B be a content R-algebra and S′ = { f ∈ B : c( f ) = R}. It is easy to check that
S
S′ = B − m∈Max(R) mB and S = S′ ∩ R = U (R), where by U (R), we mean the units of R.
According to [22, Theorem 6.2, p. 64], it is clear that BS′ is also a content R-algebra and
B is a subring of BS′ . This special content R-algebra has some interesting properties:
Theorem 43. Let B be a content R-algebra such that S′ = { f ∈ B : c( f ) = R} and put
R′ = BS′ , then the following statements hold:
(1)
(2)
(3)
(4)
(5)
The map ϕ : Max(R) −→ Max(R′ ), defined by I −→ IR′ is a bijection.
Jac(R′ ) = Jac(R)R′ .
U (R′ ) = { f /g : c( f ) = c(g) = R}
The ring R′ is presimplifiable iff R is presimplifiable.
The ring R′ is 0-dimensional iff R is 0-dimensional.
Proof. The first proposition is actually a special case of [11, 4.8]. For the proof of the
second proposition, notice that the Jacobson radical of a ring is the intersection of all
maximal ideals. Now use [22, 1.2, p. 51].
It is obvious that if c( f ) = c(g) = R, then f /g is a unit of R′ . Now let f /g be a unit of
R′ , where c(g) = R and assume that there exists a member of R′ , say f ′ /g′ with c(g′ ) = R,
such that ( f /g) · ( f ′ /g′ ) = 1/1. According to McCoy’s property for content algebras,
S′ ⊆ B − ZB (B). So f f ′ = gg′ and f f ′ ∈ S′ . This means that f ∈ S′ and the proof of the
third proposition is complete.
For the proof of the forth proposition, suppose R is presimplifiable and let f ∈ Z(R′ ).
Therefore there exists a nonzero r ∈ R such that r f = 0 and so rc( f ) = (0). This means
that c( f ) ⊆ Z(R). Since R is presimplifiable, c( f ) ⊆ Jac(R) and at last f ∈ Jac(R)R′
and according to (2), f ∈ Jac(R′ ). It is easy to check that if R′ is presimplifiable then R
is presimplifiable also. For the proof of the fifth proposition note that a ring, say T , is
0-dimensional iff Min(T ) = Max(T ).
14
PEYMAN NASEHPOUR
Theorem 44. Let B be a content R-algebra with the property that if f ∈ B with c( f ) = (a)
where a ∈ R, then there exists an f1 ∈ B such that f = a f1 and c( f1 ) = R and put S′ =
{ f ∈ B : c( f ) = R} and R′ = BS′ . Then the idempotent members of R and R′ coincide.
Proof. Let f /g be an idempotent member of R′ , where f , g ∈ B and c(g) = R. Therefore
f g2 = g f 2 and since g is a regular member of B, we have f g = f 2 . So c( f 2 ) = c( f g) =
c( f ), but c( f 2 ) ⊆ c( f )2 , therefore c( f )2 = c( f ). We know that every finitely generated
idempotent ideal of a ring is generated by an idempotent member of the ring [G1, p. 63].
Therefore we can suppose that c( f ) = (e) such that e2 = e. On the other side we can find
an f1 ∈ B such that f = e f1 and c( f1 ) = R. Consider e f1 /g = f /g = f 2 /g2 = e2 f12 /g2 .
Since f1 and g are both regular, and e is idempotent, we have e = e f1 /g = f /g ∈ R.
Corollary 45. Let R be a ring and M a commutative, cancellative and torsion-free monoid
and put S′ = { f ∈ R[M] : c( f ) = R} and R′ = BS′ . Then the idempotent members of R and
R′ coincide.
Definition 46. A commutative ring R is said to be a valuation ring if for any a and b in R
either a divides b or b divides a ([16, p. 35]).
Theorem 47. Let B be a content R-algebra with the property that if f ∈ B with c( f ) = (a)
where a ∈ R, then there exists an f1 ∈ B such that f = a f1 and c( f1 ) = R and put S′ =
{ f ∈ B : c( f ) = R} and R′ = BS′ . If R is a valuation ring, then so is R′ = BS′ .
Proof. Let f /g be a member of R′ , where f , g ∈ B and c(g) = R. Since c( f ) is a finitely
generated ideal of R and R is a valuation ring, there exists an r ∈ R such that c( f ) = (r)
and therefore there exists an f1 ∈ B such that f = r f1 and c( f1 ) = R. By considering this
fact that f1 /g is a unit in R′ , it is obvious that R′ is also a valuation ring and the proof is
complete.
7. ACKNOWLEDGMENT
The author wishes to thank Prof. Winfried Bruns for his useful advice.
R EFERENCES
[1] E. P. Armendariz, A note on extensions of Baer and p.p.-rings, J. Austral. Math. Soc. 18 (1974),
470–473.
[2] D. D. Anderson, M. Axtell, S. F. Forman and Joe Stickles, Commutative rings with domain-type
properties, preprint.
[3] D. D. Anderson and V. Camillo, Armendariz rings and Gaussian rings, Comm. Algebra. 26 (1998),
2265–2272.
[4] J. T. Arnold and R. Gilmer, On the content of polynomials, Proc. Amer. Math. Soc. 40 (1970), 556–
562.
CONTENT ALGEBRAS OVER COMMUTATIVE RINGS WITH ZERO-DIVISORS
15
[5] D. D. Anderson and B. G. Kang, Content formulas for polynomials and power series and complete
integral closure, J. Algebra, 181 (1996), 82–94.
[6] W. Bruns and A. Guerrieri, The Dedekind-Mertens formula and determinantal rings, Proc. Amer.
Math. Soc. 127 (1999), no. 3, 657–663.
[7] W. Bruns and J. Herzog, Cohen-Macaulay Rings, revised edn., Cambridge, 1998.
[8] E. Davis, Overrings of commutative rings II. Integrally closed overrings, Trans. Amer. Math. Soc,
110 (1964), 196–212.
[9] P. Eakin and J. Silver, Rings which are almost polynomial rings, Trans. Amer. Math. Soc. 174 (1974),
425–449.
[10] N. Epstein and J. Shapiro, A Dedekind-Mertens theorem for power series rings, to appear in Proc.
Amer. Math. Soc.
[11] R. Gilmer, Multiplicative Ideal Theory, Marcel Dekker, New York, 1972.
[12] R. Gilmer, Commutative Semigroup Rings, The University of Chicago Press, 1984.
[13] W. Heinzer and C. Huneke, The Dedekind-Mertens Lemma and the content of polynomials, Proc.
Amer. Math. Soc. 126 (1998), 1305–1309.
[14] J. A. Huckaba, Commutative Rings with Zero Divisors, Marcel Dekker, 1988.
[15] J. A. Huckaba and J. M. Keller, Annihilation of ideals in commutative rings, Pac. J. Math. 83 (1979),
375–379.
[16] I. Kaplansky, Commutative Rings, Allyn and Bacon, Boston, 1970.
[17] K. A. Loper and M. Roitman, The content of a Gaussian polynomial is invertible, Proc. Amer. Math.
Soc. 133 (2005), 1267–1271.
[18] N. H. McCoy, Remarks on divisors of zero, Amer. Math. Monthly, 49 (1942), 286–295.
[19] D. G. Northcott, A generalization of a theorem on the content of polynomials, Proc. Cambridge Phil.
Soc. 55 (1959), 282–288.
[20] A. G. Naoum and A. S. Mijbass, Weak cancellation modules, Kyungpook Math. J., 37 (1997), 73–82.
[21] P. Nasehpour and S. Yassemi, M-cancellation Ideals, Kyungpook Math. J., 40 (2000), 259–263.
[22] J. Ohm and D. E. Rush, Content modules and algebras, Math. Scand. 31 (1972), 49–68.
[23] D. E. Rush, Content algebras, Canad. Math. Bull. Vol. 21 (3) (1978), 329–334.
[24] M. B. Rege and S. Chhawchharia, Armendariz rings, Proc. Japan Acad. Ser. A Math. Sci. 73, Number
1 (1997), 14–17.
[25] H. Tsang, Gauss’ lemma, dissertation, University of Chicago, Chicago, 1965.
U NIVERSIT ÄT O SNABR ÜCK , FB M ATHEMATIK /I NFORMATIK , 49069 O SNABR ÜCK , G ERMANY
E-mail address: pnasehpo@uni-osnabrueck.de
E-mail address: nasehpour@gmail.com
| 0math.AC
|
Optimal experimental design that minimizes the width
of simultaneous confidence bands
arXiv:1704.03995v2 [math.ST] 26 Mar 2018
Satoshi Kuriki∗ and Henry P. Wynn†
Abstract
We propose an optimal experimental design for a curvilinear regression model
that minimizes the band-width of simultaneous confidence bands. Simultaneous
confidence bands for curvilinear regression are constructed by evaluating the volume
of a tube about a curve that is defined as a trajectory of a regression basis vector
(Naiman, 1986). The proposed criterion is constructed based on the volume of
a tube, and the corresponding optimal design that minimizes the volume of tube
is referred to as the tube-volume optimal (TV-optimal) design. For Fourier and
weighted polynomial regressions, the problem is formalized as one of minimization
over the cone of Hankel positive definite matrices, and the criterion to minimize
is expressed as an elliptic integral. We show that the Möbius group keeps our
problem invariant, and hence, minimization can be conducted over cross-sections of
orbits. We demonstrate that for the weighted polynomial regression and the Fourier
regression with three bases, the tube-volume optimal design forms an orbit of the
Möbius group containing D-optimal designs as representative elements.
Key words: D-optimality, Fourier regression, Hankel matrix, Möbius group, volumeof-tube method, weighted polynomial regression.
1
Introduction
Suppose that we observe pairs of explanatory variables xi ∈ X and response variables
yi ∈ R, i = 1, . . . , N. Here, X ⊂ R is a domain of explanatory variables, and typically, a
segment of R. For such data, we consider the regression model
yi = b⊤ f (xi ) + εi ,
εi ∼ N(0, σ 2 (x)) i.i.d.,
where b = (b1 , . . . , bn )⊤ is an unknown coefficient vector, and f (x) = (f1 (x), . . . , fn (x))⊤ ,
x ∈ X , is a piecewise smooth regression basis vector. For the problem of this paper, we
∗
The Institute of Statistical Mathematics, 10-3 Midoricho, Tachikawa, Tokyo 190-8562, Japan, Email:
kuriki@ism.ac.jp
†
The London School of Economics and Political Science, Houghton Street, London WC2A 2AE, UK,
Email: h.wynn@lse.ac.uk
1
assume that the variance function σ 2 (x) > 0 is known. When σ 2 (x) is not a constant, the
regression model is called weighted .
In the case of experimental data, the explanatory variables xi can be chosen arbitrarily
within its domain X ⊂ R. The allocation of {x1 , . . . , xN } ⊂ X to optimize some target
function is called optimal experimental design. For example, for D-optimality, we take a
function det(Σ) with Σ = Var(bb), where bb is the ordinary least square (OLS) estimator of
b. Here,
N
X
1
−1
Σ=M
with M =
f (xi )f (xi )⊤ 2
,
σ
(x
)
i
i=1
the information matrix.
Following Kiefer and Wolfowitz (1959), in an optimal design, allocation {x1 , . . . , xN }
is regarded as the probability measure over X with mass pi = 1/N at each point xi . We
write this discrete probability measure as
x1 · · · xN
xi
.
= 1
· · · N1
pi 1≤i≤N
N
Viewed from this point, the problem is formalized as that of optimization with respect
to the probability measure over X . Most criteria in the literature including the criterion
mentioned above are convex or concave functionals of the probability measure, and can
be considered in the framework of convex analysis (Wynn, 1985; Pukelsheim, 2006).
In this paper, we propose a new non-convex criterion based on simultaneous confidence
bands. The pointwise confidence band is based on the confidence region for regressor
b⊤ f (x) at a fixed point x. On the other hand, the simultaneous confidence band is the
confidence region for the full regression curve {(x, b⊤ f (x)) | x ∈ X } ⊂ R2 . The standard
form of the simultaneous confidence band of hyperbolic-type is of the form
p
b⊤ f (x) ∈ bb⊤ f (x) ± cα f (x)⊤ Σf (x),
(1.1)
where u ± v stands for the region (u − v, u + v). The threshold cα is determined so that
the event (1.1) holds for all x ∈ X with given probability 1 − α (Working and Hotelling,
1929; Scheffé, 1959; Wynn and Bloomfield, 1971; Liu, 2010). The simultaneous confidence
bands are useful when x cannot be determined in advance. (See van Dyk (2014) for
an application in experimental particle physics.) As shown in the next section, cα is
also a functional of the allocation {x1 , . . . , xN }, and hence, we can consider an optimal
design that in some way minimizes both the threshold cα and f (x)⊤ Σf (x). In fact,
from the general equivalence theorem of Kiefer and Wolfowitz (1959), the design measure
that minimizes maxx∈X f (x)⊤ Σf (x) coincides with the D-optimal design. Therefore, we
propose the use of cα as a criterion of optimal design, and consider the corresponding
optimal design as the tube-volume optimal (TV-optimal) design. If a design is optimal
under both the tube-volume criterion and the D-criterion, it becomes the universal optimal
design to minimize the width of confidence bands (1.1). Indeed cα substantially depends
on the design. In Table 4.3 of Section 4.3, we will show how the difference in design affects
the width of the simultaneous confidence band.
2
From its definition, cα is a complicated function of Σ. However, when α is small,
cα tends to a simpler function. This approximation is due to the volume-of-tube method
used to construct simultaneous confidence bands in curvilinear regression curves (Naiman,
1986; Johansen and Johnstone, 1990; Sun and Loader, 1994; Lu and Kuriki, 2017). The
volume-of-tube method is a methodology to approximate the probability of the maximum
of a Gaussian random field (Sun, 1993; Kuriki and Takemura, 2001, 2009; Takemura and Kuriki,
2002; Adler and Taylor, 2007). As shown later, cα corresponds to the upper tail probability of the maximum of a Gaussian field, and hence, the volume-of-tube method works
well.
As concrete regression models, weighted polynomial and Fourier regressions are mainly
covered here. In these models, we will see that there is a group referred to as the Möbius
transform that keeps the tube-volume optimal design problem invariant. In general, a
group action simplifies problems. (See Section 13 of Pukelsheim (2006) for invariant
optimal experimental design.) The use of such group invariance is another subject of this
paper.
The outline of this paper is as follows. Section 2 summarizes the volume-of-tube formula to construct approximate simultaneous confidence bands, and formalizes the tubevolume criterion and the corresponding optimal design. Section 3 analyzes the tubevolume optimal designs for Fourier and weighted polynomial regressions. The Möbius
group is proved to keep the optimization problem invariant, and hence can be used to
reduce the dimension of the problem. Using this consideration, Section 4 identifies the
tube-volume optimal design in the weighted polynomial regression and the Fourier regression when n = 3. Some proofs are given in Appendix.
2
2.1
Tube-volume optimal design
Volume-of-tube formula for simultaneous confidence bands
In this subsection, we briefly summarize the volume-of-tube method. This is a general
methodology used to approximate the probability of the maximum of a smooth Gaussian
random process or random field. Here, we describe how this method is used to determine
threshold cα .
As mentioned in Section 1, threshold cα should be determined as a solution c = cα of
b⊤
| b f (x) − b⊤ f (x)|
p
Pr
< c, ∀x ∈ X = 1 − α,
f (x)⊤ Σf (x)
which is equivalent to
1
| (bb − b)⊤ f (x)|
Pr max
> c = α,
1
x∈X
kΣ 2 f (x)k
1
1
where Σ 2 is a square-root matrix such that (Σ 2 )⊤ Σ 2 = Σ.
3
(2.1)
(2.2)
We define the normalized basis vector and its trajectory as
1
ψΣ (x) =
Σ 2 f (x)
1
kΣ 2 f (x)k
,
γΣ = ±ψΣ (x) | x ∈ X ,
(2.3)
respectively. From this definition, the trajectory is a subset of the (n − 1)-dimensional
unit sphere:
γΣ ⊂ Sn−1 = {u ∈ Rn | kuk = 1}.
In particular, when X is a segment, γΣ is a curve on the unit sphere. Let Vol1 (·) denote
the one-dimensional volume, that is, the length. Then, when c is large, the volume-of-tube
method provides an approximation to the upper tail probability of the maximum in (2.2).
Further, let χ2ν denote the chi-square random variable with ν degrees of freedom.
Proposition 2.1. (i) As c → ∞,
| (bb − b)⊤ f (x)|
Vol1 (γΣ )
Pr χ22 > c2 .
Pr max
>c ∼
1
x∈X
2π
kΣ 2 f (x)k
(2.4)
(ii) For all c > 0, the left-hand side of (2.4) is bounded above by
Vol1 (γΣ )
Pr χ22 > c2 + χ(γΣ ) Pr χ21 > c2 ,
2π
(2.5)
where χ(γΣ ) is the number of the connected components of the set γΣ (⊂ Sn−1 ).
If we admit approximation (2.4), an approximate threshold cα can be determined from
the equation
Vol1 (γΣ )
Pr χ22 > c2α = α.
2π
This means that the smaller the value of Vol1 (γΣ ), the smaller is cα .
The statement (ii) above is due to Naiman (1986). Alternative proofs of the inequality
can be found in Johnstone and Siegmund (1989) and Takemura and Kuriki (2002). See
Lu and Kuriki (2017) for a generalization of Naiman’s inequality. By equating (2.5) to
be α, we have a conservative threshold for the simultaneous confidence band.
2.2
Tube-volume criterion
From (2.5), we find that the smaller the value of Vol1 (γΣ ), the narrower is the width of the
confidence band. In this subsection, we formalize the experimental design optimization
problem of the allocation of explanatory variables to minimize Vol1 (γΣ ).
Here, we give our assumptions on f (x).
Assumption 2.2. f : X → Rn is a continuous and piecewise C 1 -function. Image f (X )
spans Rn .
4
From elementary geometry, the volume of γΣ in (2.3) is given by
Z
dψΣ (x)
Vol1 (γΣ ) = 2
dx
dx
X
1
Z
d
Σ 2 f (x)
=2
dx
1
X dx kΣ 2 f (x)k
Z p
(f (x)⊤ Σf (x))(g(x)⊤ Σg(x)) − (f (x)⊤ Σg(x))2
=2
dx
f (x)⊤ Σf (x)
X
1
2
f (x)⊤
Σ f (x), g(x)
Z det
g(x)⊤
2×2
dx,
=2
⊤
f (x) Σf (x)
X
(2.6)
where g(x) = df (x)/dx. We call (2.6) the tube-volume (TV) criterion.
Note that (2.6) is invariant with respect to scale Σ 7→ kΣ (k > 0). Because of this, we
introduce the set of all nonnegative measures (not necessarily probability measures) on X
denoted by P. Each element of ρ ∈ P corresponds to an experimental design. This is an
extension of the design measure of Kiefer and Wolfowitz (1959). We also extend the set
of moment matrices. Thus, the set of all non-singular information matrices is denoted by
Z
1
⊤
f (x)f (x) 2 dρ(x) ≻ 0 | ρ ∈ P
M=
σ (x)
X
Z
⊤
=
f (x)f (x) dρ(x) ≻ 0 | ρ ∈ P ,
X
where “≻ 0” denotes positive definiteness. From its definition, M forms a convex cone.
Our optimal design problem is formulated as minimizing Vol1 (γΣ ) in (2.6) subject to
Σ−1 ∈ M. The lemma below is a direct consequence of this invariance.
xi
xi
2
with variance function σ1 (x), and the design
Lemma 2.3. The design
qi 1≤i≤N
pi 1≤i≤N
2
2
2
with variance function
Pσ2 (x), qi = kpi σ2 (xi )/σ1 (xi ), give the same volume, where k > 0
is a constant so that i qi = 1.
Proof. The information matrices M1 and M2 of the two designs satisfy M1 = kM2 .
A difficulty with this optimization problem is that this is not a convex problem. Figure
2.1 depicts the volume Vol1 (γM (c)−1 ) for a mixing design connecting two Fourier designs
with three bases ((3.1) with n = 3) with weights 1 − c and c :
1
1
1
− 3 0 13
− 12 0 12
ti
=
and
.
1
1
1
1
1
1
pi i=1,2,3
3
3
3
3
3
3
The information matrix is
1 0 0
1
0
M(c) = (1 − c) 0 1 0 + c √ 0√ 13
2+ 6
0 0 1
0
3
5
√ √
2+ 6
3
0
5
3
.
We see that Vol1 (γM −1 (c) ) is not convex in c.
c
Figure 2.1: Vol1 (γM (c)−1 ) for a mixing design.
3
3.1
Tube-volume optimal design for polynomial and
Fourier regressions
Equivalence between weighted polynomial regression and
Fourier regression
From this section, we focus on Fourier regression and weighted polynomial regression. In
linear optimal design theory, the Fourier regression model has been used as one of the
standard models to see the performance of the proposed criteria. The weighted polynomial
used here is closely connected to the Fourier regression model, as is shown later.
The Fourier (trigonometric) regression has basis vector
f (x) =fF (x)
( √
√
√
√
(1, 2 sin(2πx), 2 cos(2πx), 2 sin(4πx), . . . , 2 cos(2πmx))⊤
√
√
√
= √
( 2 cos(πx), 2 sin(πx), 2 cos(3πx), . . . , 2 cos(π(n − 1)x))⊤
(n = 2m + 1),
(n = 2m)
(3.1)
defined on the domain X = (−1/2, 1/2]. For the Fourier regression, we only deal with
the constant variance σ 2 (x) = σF2 (x) ≡ 1. Although the Fourier regression is not used for
even values of n in practice, we define it for the sake of consistency.
The polynomial regression is a regression model with basis vector
f (x) = fP (x) = (1, x, x2 , . . . , xn−1 )⊤ ∈ R[x]n .
(3.2)
Here, we set the domain X to be the whole real line R. For the polynomial regression,
we assume the variance function of form σ 2 (x) = Q(x)n−1 , where Q(x) is an arbitrary
6
positive quadratic function. As a canonical form of this class of variance functions, we
use
σP2 (x) = (1 + x2 )n−1 .
(3.3)
Later, we introduce a parameterization for Q(x) (see (3.20)).
In this subsection, we see that under the tube-volume criterion, the optimization problem for the Fourier regression is equivalent to that for the weighted polynomial regression.
That is, the optimization problem in the Fourier regression can be translated to one in
the weighted polynomial regression, and vice versa.
The model we discuss is a special case of the model proposed by Dette, et al. (1999),
Section 2.2, who study the D-optimality. Further, Dette and Melas (2003) make use of
the connection between the weighted polynomial and Fourier regressions. We will return
briefly to question on the D-optimality in Section 3.5 below.
From the lemma below, the transformation x = tan(πt) connects the two regression
models.
Lemma 3.1. There exists an n × n non-singular matrix B such that for all x ∈ R and
t ∈ (−1/2, 1/2] satisfying x = tan(πt), we have
fF (t) = BfP (x)λ0 (x),
λ0 (x) = 1/(1 + x2 )(n−1)/2 .
(3.4)
Proof. Note that
sin(2πt) =
2x
,
1 + x2
cos(2πt) =
1 − x2
,
1 + x2
dt =
dx
.
π(1 + x2 )
(3.5)
It is known that
k
sin(2πkt) =
sin2r+1 (2πt) cosk−2r−1 (2πt),
(−1)
2r
+
1
r=0
[k/2]
X
k
r
sin2r (2πt) cosk−2r (2πt)
cos(2πkt) =
(−1)
2r
r=0
[(k−1)/2]
X
r
(Moriguti, et al., 1957, pages 186–187). Substituting the formulas for sin(2πt) and cos(2πt)
in (3.5) and expressing fF (t) as a rational function in x, we have formula (3.4).
To prove that B is non-singular, consider the integral
Z ∞
Z 1/2
dx
⊤
2
⊤
fF (t)fF (t) dt = B
fP (x)λ0 (x) fP (x)
B⊤.
(3.6)
2)
π(1
+
x
−1/2
−∞
Here, we used (3.5). The left-hand side is the identity matrix In by standard orthogonality.
Hence, it is enough to check that the integrals in the parentheses of the right-hand side
exist. The matrix in the parentheses of the right-hand side of (3.6) is (B ⊤ B)−1 with (i, j)
element
Γ n − i+j−1
Γ i+j−1
Z ∞
i+j−2
2
2
x
(i + j is even),
dx =
(B ⊤ B)−1
(3.7)
πΓ(n)
i,j =
2
n
−∞ π(1 + x )
0
(i + j is odd),
7
which exists for i, j ≤ n. Hence, B is non-singular.
When n = 3, 4,
1
1
0
1
0
√
0 ,
B = √0 2 2
1
√
2 0 − 2
0
0 1
0
1 0
1
,
0 −3 0
3 0 −1
respectively.
The set of information matrices for the polynomial regression
Z ∞
⊤
MP =
fP (x)fP (x) dρ(x) ≻ 0 | ρ ∈ P
(3.8)
−∞
is referred to as the moment cone (Karlin and Studden, 1966). The set of information
matrices for the Fourier regression is given by
Z 1/2
⊤
MF =
fF (t)fF (t) dρ(t) ≻ 0 | ρ ∈ P
−1/2
= {BMB ⊤ | M ∈ MP } = BMP B ⊤ .
(3.9)
The following lemma gives the equivalence of the Fourier regression and the polynomial
regression as the optimization problem for the tube-volume criterion.
Theorem 3.2. Let VolF (γM −1 ) and VolP (γM −1 ) be the length of γM −1 given in (2.6)
with f (x) being fF (x) in (3.1), and fP (x) in (3.2), respectively. Then, it holds that
VolP (γM −1 ) = VolF (γ(BM B⊤ )−1 ).
Proof. The derivatives of fF (t) and fP (x) are denoted by gF (t) = dfF (t)/dt and gP (x) =
dfP (x)/dx, respectively. Then,
λ0 (x) λ̇0 (x)
1 0
.
fF (t), gF (t) = B fP (x), gP (x)
0 dx
0
λ0 (x)
dt
Therefore,
fF (t)⊤ (BMB ⊤ )−1 fF (t) = fP (x)⊤ M −1 fP (x) × λ0 (x)2 ,
fP (x)⊤
fF (t)⊤
−1
⊤ −1
M
fP (x), gP (x)
(BMB ) fF (t), gF (t) = det
det
gP (x)⊤
gF (t)⊤
dx 2
× λ0 (x)4
,
dt
8
and
21
fF (t)⊤
Z 1/2 det
(BMB ⊤ )−1 fF (t), gF (t)
gF (t)⊤
dt
fF (t)⊤ (BMB ⊤ )−1 fF (t)
−1/2
1
2
fP (x)⊤
−1
Z ∞ det
M
fP (x), gP (x)
gP (x)⊤
=
dx.
fP (x)⊤ M −1 fP (x)
−∞
Theorem 3.2 and (3.9) imply that
M ∈ MP is the minimizer of VolP (M)
⇔ M ′ = BMB ⊤ ∈ MF is the minimizer of VolP (M ′ ).
That is, the optimization problems for the polynomial regression and the Fourier regression
are mathematically equivalent. For example, the information matrix M =
P
⊤
f
(t
)f
i F i F (ti ) pi ∈ MF for the Fourier regression, and the information matrix for the
polynomial regression
X
B −1 fF (ti )(B −1 fF (ti ))⊤ pi
MP ∋ B −1 M(B ⊤ )−1 =
i
=
X
fP (xi )fP (xi )⊤ λ0 (xi )2 pi ,
xi = tan(πti ),
i
=
X
fP (xi )fP (xi )⊤
i
1
pi
σP2 (xi )
give the same volume.
This equivalence is stated in terms of design measure as follows.
ti
xi
Theorem 3.3. The design
for the Fourier regression, and the design
,
pi 1≤i≤N
pi 1≤i≤N
xi = tan(πti ), for the weighted polynomial regression with variance function σP2 (x) give
the same volume. If the former is tube-volume optimal in the Fourier regression, then so
is the latter in the polynomial regression with variance σP2 (x), and vice versa.
In this paper, the (discrete) uniform designs in the Fourier regression and their counterparts in the polynomial regression play important roles. It is known that, in the
Fourier regression, the uniform design in which xi are allocated as equally spaced with
equal weights is D-optimal (Guest, 1958). Because of the symmetry, it is conjectured that
the uniform design is the tube-volume optimal design as well. In Section 4, we prove that
this is true for n = 3, and conjecture that it is true for all n.
9
The n-point discrete uniform design for the Fourier regression symmetric about the
origin is
0
n+1
i
ti
.
(3.10)
, t0i = −
1
n
2n
n 1≤i≤n
For later use, we provide the concrete forms of the information matrix M for the weighted
polynomial designs with σ 2 (x) = σP2 (x) in (3.3),
0
xi
, x0i = tan(πt0i ) with t0i given in (3.10).
(3.11)
1
n
1≤i≤n
Lemma 3.4. The information matrix M = (Mi,j ) of the weighted polynomial design
(3.11) scaled such that M1,1 = 1 is given by
k+1
k+1
Γ √2 Γ n − 2
(k is even),
M = (Mi,j ) = (mi+j−2 )1≤i,j≤n , mk =
πΓ n − 12
0
(k is odd).
For the proof, see Appendix A.1. When n = 3 and 4,
1 0 51 0
1
1 0 3
0 1 0 1
5
5 ,
M = 0 31 0 ,
1
1
0
0
1
5
5
0
1
1
3
0 5 0 1
(3.12)
respectively.
The key transform connecting Fourier and polynomial regressions was the tangent
transform x = tan(πt). For the same purpose, generalized transforms x = q tan(π(t −
θ)) + r, q 6= 0, can be used. This is a composite map of the tangent transform and the
Möbius transform to be discussed below.
3.2
The Möbius group action on the moment cone
In this subsection, we introduce the Möbius group (transformation) acting on the set of
design measures and the set of information matrices in polynomial regression. We will
show that the Möbius group action reduces the dimension of the minimization problem
for the tube-volume criterion. For a recent paper in which the Möbius transformation
acts on polynomials, see Mackey, et al (2015).
The real Möbius transformation is defined on the extended real numbers R = R ∪
{±∞} as follows:
ax + b
(ad − bc 6= 0).
x 7→ ϕ(x; a, b, c, d) =
cx + d
Here, we assume that
a
d
±∞ 7→ , − 7→ ±∞.
c
c
10
This forms a group with product
ϕ(·; a′ a + b′ c, a′ b + b′ d, c′a + d′ c, c′ b + d′ d) = ϕ(·; a′ , b′ , c′ , d′ ) ◦ ϕ(·; a, b, c, d).
(3.13)
The inverse is ϕ−1 (·; a, b, c, d) = ϕ(·; d, −b, −c, a). The identity element is e = ϕ(·; a, 0, 0, a),
a 6= 0. This is a subgroup of the complex Möbius group referred to as projective general
linear group PGL(2, C).
Now, let fP (x) = (1, x, . . . , xn−1 )⊤ be the polynomial basis. We define an n × n matrix
A = A(a, b, c, d) as
fP ϕ(x; a, b, c, d) = λ(x; a, b, c, d)AfP (x),
λ(x; a, b, c, d) =
1
.
(cx + d)n−1
(3.14)
We write the factor λ as λ(x; a, b, c, d) instead of λ(x; c, d) to clarify that this is an invariant
function under the group action (3.13) in the sense that
λ ϕ(x; a, b, c, d); a′, b′ , c′ , d′ λ(x; a, b, c, d)
= λ(x; a′ a + b′ c, a′ b + b′ d, c′ a + d′ c, c′ b + d′ d).
(3.15)
Proposition 3.5. The (i, j) element of A = A(a, b, c, d) is
max(i−1,j−1)
(A)i,j =
X
l=max(0,i+j−n−1)
n−i
i−1
al bi−1−l c j−1−l d n+1−i−j+l.
j−1−l
l
The proof is straightforward and omitted. When n = 3 and n = 4,
3
2
d
3cd2
3c2 d
c3
2
d
2cd
c
bd2 2bcd + ad2 bc2 + 2acd ac2
A = A(a, b, c, d) = bd bc + ad ac ,
b2 d b2 c + 2abd 2abc + a2 d a2 c , (3.16)
2
2
b
2ab
a
b3
3ab2
3a2 b
a3
respectively.
The set
A = {A(a, b, c, d) | ad − bc 6= 0}
is a representation of general linear group GL(2, R) and hence forms a group (Gross and Holman,
1980). The proof of the proposition below is straightforward and omitted.
Proposition 3.6. Set A forms a matrix algebraic group. The identity matrix is A(1, 0, 0,
1) = (−1)n−1 A(−1, 0, 0, −1) = In , and the inverse of A = A(a, b, c, d) is given by (ad −
bc)−(n−1) A(d, −b, −c, a).
Proposition 3.7. For A = A(a, b, c, d) ∈ A, det(A) = (ad − bc)n(n−1)/2 .
11
Proof. For different x1 , . . . , xn , we have
A(fP (x1 ), . . . , fP (xn )) = (fP (y1 ), . . . , fP (yn ))diag((cxi + d)n−1 ),
By taking determinants,
Y
det(A) × (−1)n
(xi − xj ) = (−1)n
1≤i<j≤n
Y
(yi − yj )
1≤i<j≤n
Y
yi =
axi + b
.
cxi + d
(cxi + d)n−1 .
(3.17)
1≤i≤n
Substituting
Y
Y axi + b axj + b
Y (ad − bc)(xi − xj )
=
−
cxi + d cxj + d
(cxi + d)(cxj + d)
1≤i<j≤n
1≤i<j≤n
Q
(xi − xj )
n(n−1)/2
Q 1≤i<j≤n
= (ad − bc)
n−1
1≤i≤n (cxi + d)
(yi − yj ) =
1≤i<j≤n
into (3.17) yields det(A) = (ad − bc)n(n−1)/2 .
Proposition 3.8. The Möbius group is reparameterized as
{ϕ(·; a, b, c, d) | ad − bc 6= 0} ={ϕ(·; q, r, 0, 1) ◦ ϕ(·; s, −t, t, s) | q 6= 0, s2 + t2 = 1}
⊔ {ϕ(·; q, r, 0, 1) ◦ ϕ(·; −s, t, t, s) | q 6= 0, s2 + t2 = 1},
where ⊔ is the disjoint union. Group A is reparameterized as
A ={kA(q, r, 0, 1)A(s, −t, t, s) | k > 0, q 6= 0, s2 + t2 = 1}
⊔ {kA(q, r, 0, 1)A(−s, t, t, s) | k > 0, q 6= 0, s2 + t2 = 1}.
det A(q, r, 0, 1) = q n(n−1)/2 and det A(±s, ∓t, t, s) = ±1 for s2 + t2 = 1.
Proof. We have the following relations:
and
ad − bc ac + bd
,
,
0,
1
ϕ(x; a, b, c, d) = ϕ ϕ(x; ±d, ∓c, c, d); ± 2
c + d 2 c2 + d 2
ad − bc ac + bd
A(±d, ∓c, c, d)
A(a, b, c, d) = (c2 + d2 )(n−1)/2 A ± 2
,
,
0,
1
.
c + d 2 c2 + d 2
(c2 + d2 )(n−1)/2
The results in the proposition follow by letting
k = (c2 + d2 )(n−1)/2 ,
q=
ad − bc
,
c2 + d 2
r=
ac + bd
,
c2 + d 2
12
s= √
c2
d
,
+ d2
t= √
c2
c
.
+ d2
The sets of transformations {ϕ(·; ±s, ∓t, t, s) | s2 + t2 = 1} and {ϕ(·; q, r, 0, 1) | q 6=
0} form subgroups of the Möbius group, which are isomorphic to the orthogonal group
O(2, R) and the affine group acting on R, respectively.
Theorem 3.9. Let A ∈ A and M ∈ MP be n × n matrices. Then, AMA⊤ ∈ MP .
Moreover,
AMP A⊤ = {AMA⊤ | M ∈ MP } = MP .
That is, group A acts on the moment cone MP .
P
⊤
Proof. Suppose that M =
i fP (xi )fP (xi ) wi . Let yi = ϕ(xi ; a, b, c, d). Note that
λ(y; d, −b, −c, a)λ(x; a, b, c, d) = (ad − bc)−(n−1) . Then,
X
AMA⊤ =
AfP (xi )(AfP (xi ))⊤ wi
i
=
X
fP (yi )fP (yi )⊤ λ(xi ; a, b, c, d)−2 wi
i
=
X
i
=
X
i
fP (yi )fP (yi )⊤ (ad − bc)2(n−1) λ(yi ; d, −b, −c, a)2 wi
fP (yi )fP (yi )⊤ vi ∈ MP ,
where
vi = λ(xi ; a, b, c, d)−2wi = (ad − bc)2(n−1) λ(yi ; d − b, −c, a)2 wi .
(3.18)
Therefore, AMP A⊤ ⊂ MP . Because A is a group, AMP A⊤ = MP .
The Möbius group action on the polynomial basis f (x) has been introduced by (3.14).
Similarly, we define the Möbius group action on the variance function σ 2 (x) = Q(x)n−1 .
This provides a parameterization for the variance function.
Using σP2 (x) = (1 + x2 )n−1 in (3.3), for ad − bc 6= 0, we define
σP2 (ϕ(x; a, b, c, d)) = σP2 (x; a, b, c, d)λ(x; a, b, c, d)2,
or
σP2 (x; a, b, c, d) = (b2 + d2 ) + 2(ab + cd)x + (a2 + c2 )x2
(3.19)
n−1
.
(3.20)
Note that σP2 (x) = σP2 (x; 1, 0, 0, 1). This is always positive because of ad − bc 6= 0. For
ϕ(·; a′, b′ , c′ , d′ ) = ϕ(·; a0 , b0 , c0 , d0 ) ◦ ϕ(·; a, b, c, d),
as well as (3.15), we have
σP2 (ϕ(x; a, b, c, d); a0, b0 , c0 , d0 ) = σP2 (x; a′ , b′ , c′ , d′ )λ(x; a, b, c, d)2 .
(3.21)
The parameterization (3.20) with (a, b, c, d) is redundant, since Q(x) has only three
parameters. The lemma below shows that the stabilizer keeping the variance σP2 (·; a, b, c, d)
invariant is the orthogonal subgroup with dimension one.
13
Lemma 3.10. σP2 (·; a, b, c, d) = σP2 (·; a′ , b′ , c′ , d′ ) if and only if there exist s, t, s2 + t2 = 1
such that
ϕ(·; a′, b′ , c′ , d′) = ϕ(·; ±s, ∓t, t, s) ◦ ϕ(·; a, b, c, d).
Proof. By direct calculations,
σP2 (·; a0 , b0 , c0 , d0) = σP2 (·; 1, 0, 0, 1) ⇔ (a0 , b0 , c0 , d0 ) = (±s, ∓t, t, s).
On the other hand, “σP2 (·; a0 , b0 , c0 , d0 ) = σP2 (·; 1, 0, 0, 1)” ⇔ “σP2 (ϕ(·; a, b, c, d); a0, b0 , c0 , d0)
= σP2 (ϕ(·; a, b, c, d); 1, 0, 0, 1)” ⇔ “σP2 (x; a′ , b′ , c′ , d′) = σP2 (x; a, b, c, d) with ϕ(·; a′ , b′ , c′ , d′ ) =
ϕ(·; a0 , b0 , c0 , d0) ◦ ϕ(·; a, b, c, d)” by (3.21).
Remark 3.11. When n = 2, |ad−bc|/{πσP2 (x; a, b, c, d)} is a probability density of Cauchy
distribution family on x ∈ R. Noting that ϕ̇(x; a, b, c, d) = (ad − bc)λ(x; a, b, c, d)2 , and
that a′ d′ − b′ c′ = (ad − bc)(a0 d0 − b0 c0 ), (3.21) reads
|a′ d′ − b′ c′ |
|a0 d0 − b0 c0 |
|ϕ̇(x; a, b, c, d)| dx =
dx.
πσP2 (ϕ(x; a, b, c, d); a0 , b0 , c0 , d0 )
πσP2 (x; a′ , b′ , c′ , d′)
This means that the Cauchy distribution family is closed under the Möbius transform
(McCullagh, 1996). See also Kato and McCullagh (2014) for Cauchy families in directional statistics.
3.3
Canonical parameterizations for information matrices
As we have shown in Section 2.1, the optimal design problem is optimization
with respect
R
⊤ 1
to matrix M over the set of information matrices M. Here, M = X f (x)f (x) σ2 (x) dρ(x) ∈
M and the design measure ρ ∈ P is one-to-many. For the sake of optimization, we need
to parameterize the set M.
We first consider MP in (3.8) for the polynomial regression, and then interpret the
results in terms of MF in (3.9) for the Fourier regression.
The structure of the moment cone MP is well-studied in the context of the classical
moment problem. One canonical parameterization for MP is given in Chapter II, Section
3 of Karlin and Studden (1966). The statement is summarized in Proposition 3.1 of
Kato and Kuriki (2013).
Proposition 3.12. M ∈ MP is uniquely represented with 2n−1 parameters (w0 , . . . , wn−1 ,
x1 , . . . , xn−1 ) as
M=
n−1
X
wi fP (xi )fP (xi )⊤ + w0 fP (±∞)fP (±∞)⊤ , wi > 0,
i=1
−∞ < x1 < · · · < xn−1 < ∞,
where we let fP (±∞) = (0, . . . , 0, 1)⊤ .
14
(3.22)
Note that fP (±∞) = limx→±∞ fP (x)/xn−1 = limx→±∞ fP (x)/(1 + x2 )(n−1)/2 .
Let x0 = ±∞. From the same argument of the proof of Theorem 3.9, by considering
the Möbius transform xi 7→ (axi + b)/(cxi + d), i = 0, 1, . . . , n − 1, we find that the fixed
point x0 = ±∞ in (3.22) can be moved to an arbitrary point in R.
Theorem 3.13. Let x0 ∈ R∪{±∞} be fixed arbitrarily. M ∈ MP is uniquely represented
with 2n − 1 parameters (w0 , . . . , wn−1 , x1 , . . . , xn−1 ) as
M=
n−1
X
wi fP (xi )fP (xi )⊤ + w0 fP (x0 )fP (x0 )⊤ , wi > 0,
i=1
xi 6= x0 , −∞ < x1 < · · · < xn−1 ≤ ∞,
where we assume that fP (±∞) = (0, . . . , 0, 1)⊤ .
The counterpart for the moment cone (3.9) for trigonometric functions is obtained
using Lemma 3.1.
Theorem 3.14. Let t0 ∈ (− 21 , 21 ] be fixed arbitrarily. M ∈ MF is uniquely represented
with 2n − 1 parameters (w0 , . . . , wn−1 , t1 , . . . , tn−1 ) as
M=
n−1
X
wi fF (ti )fF (ti )⊤ + w0 fF (t0 )fF (t0 ), wi > 0,
i=1
1
1
ti 6= t0 , − < t1 < · · · < tn−1 ≤ .
2
2
A square matrix M = (mi,j ) is said to be Hankel if mi,j = mk,l when i + j = k + l. For
example, matrices M in (3.12) and (4.1) are Hankel. Obviously, each M ∈ MP should
be an n × n positive definite Hankel matrix. It is known that the converse is also true.
Proposition 3.15. The moment cone MP in (3.8) is characterized as
MP = M ≻ 0 | M is Hankel .
For the proof, see (9.1) of Karlin and Studden (1966), p. 199. This also gives a unique
representation of MP with 2n − 1 parameters (m0 , m1 , . . . , m2n−2 ).
Theorem 3.9 combined with Proposition 3.15 implies that group A acts on the cone
of (positive definite) Hankel matrices. For the Möbius group action on Hankel matrices,
see also Heinig and Rost (1989, 2010).
3.4
Invariance under the Möbius group
In this subsection, we consider the polynomial regression. We formalized our optimal
experimental design problem to find the minimizer M ∈ MP of Vol1 (γM −1 ) in (2.6).
Theorem 3.16. For M ∈ MP and A ∈ A,
Vol1 (γM −1 ) = Vol1 (γ(AM A⊤ )−1 ).
15
Theorem 3.16 and Theorem 3.9 imply that the minimizer of Vol1 (γM −1 ) with respect
to M ∈ MP forms an orbit (or a union of orbits) on MP .
Proof. Let y = ϕ(x) = ϕ(x; a, b, c, d) = (ax + b)/(cx + d). Then, fP (y) = fP (ϕ(x)) =
AfP (x)λ(x), where A = A(a, b, c, d), λ(x) = λ(x; a, b, c, d). Taking derivatives with respect
to x,
ad − bc
gP (y)ϕ̇(x) = AfP (x)λ̇(x) + AgP (x)λ(x), ϕ̇(x) =
.
(cx + d)2
Therefore,
and
λ̇(x)
λ(x) ϕ̇(x)
fP (y), gP (y) = A fP (x), gP (x)
λ(x)
0
ϕ̇(x)
1
2
fP (y)⊤
−1
M
fP (y), gP (y)
det
gP (y)⊤
1
2 λ(x)2
fP (x)⊤
−1
−1 ⊤ −1
(A M(A ) ) fP (x), gP (x)
= det
.
gP (x)⊤
ϕ̇(x)
By combining this with
fP (y)⊤ M −1 fP (y) = fP (x)⊤ (A−1 M(A−1 )⊤ )−1 fP (x)λ(x)2
and dy = ϕ̇(x)dx, we have
12
fP (y)⊤
Z ∞ det
M −1 fP (y), gP (y)
gP (y)⊤
dy
Vol1 (γM −1 ) = 2
fP (y)⊤ M −1 fP (y)
−∞
1
2
fP (x)⊤
−1
−1 ⊤ −1
Z ∞ det
(A M(A ) ) fP (x), gP (x)
gP (x)⊤
dx
=2
fP (x)⊤ (A−1 M(A−1 )⊤ )−1 fP (x)
−∞
= Vol1 (γA−1 M (A−1 )⊤ ).
xi
with variTheorem 3.17. The volumes of the weighted polynomial design
pi 1≤i≤N
yi
ance σP2 (x; a0 , b0 , c0 , d0), and the design
, y = ϕ(xi ; a, b, c, d) with variance
pi 1≤i≤N i
σP2 (y; a′, b′ , c′ , d′ ) are the same, where (a′ , b′ , c′ , d′ ) is determined by
ϕ(·; a′, b′ , c′ , d′) = ϕ(·; a0, b0 , c0 , d0 ) ◦ ϕ−1 (·; a, b, c, d).
16
Proof. In (3.18) of the proof of Theorem 3.9, let wi = pi /σP2 (xi ; a0 , b0 , c0 , d0 ). Then, by
(3.21),
1
pi
pi
vi =
= 2
.
2
2
λ(xi ; a, b, c, d) σP (xi ; a0 , b0 , c0 , d0 )
σP (yi ; a′ , b′ , c′ , d′)
This means that information matrices M1 and M2 of the two designs satisfy M1 = AM2 A⊤
and hence have the same volume by Theorem 3.16.
3.5
D-optimal design for weighted polynomial regression
We characterize the D-optimal design for the weighted polynomial regression as an orbit
of the Möbius group action. We start from the fact that in the Fourier regression, the
uniform design is D-optimal.
Proposition 3.18 (Guest (1958)). In the Fourier regression with the basis (3.1), among
the n-point discrete design, only the uniform design
0
i
n+1
ti − θ
, t0i = −
,
(3.23)
1
n
2n
n
1≤i≤n
1
1
is D-optimal, where θ ∈ − 2n
, 2n
is an arbitrary constant. The information matrix at
the optimal point is the identity In .
t
Let MF be an information matrix of a Fourier design i
. By making a change
pi 1≤i≤n
of variables yi = tan(πti ) and yi = ϕ(xi ; a, b, c, d), we have from (3.4), (3.14), and (3.19)
that
X
MF =
fF (ti )fF (ti )⊤ pi
i
1
pi B ⊤
=B
fP (yi )fP (yi ) 2
σ
(y
)
i
P
iX
λ(xi ; a, b, c, d)2
⊤
=BA
fP (xi )fP (xi ) 2
p A⊤ B ⊤
2 i
σ
(x
;
a,
b,
c,
d)λ(x
;
a,
b,
c,
d)
i
i
P
i
X
⊤
=BAMP A⊤ B ⊤ ,
where
MP =
X
fP (xi )fP (xi )⊤
i
1
pi
σP2 (xi ; a, b, c, d)
xi
is the information matrix of the design
for the weighted polynomial regression
pi 1≤i≤n
with variance function σP2 (x; a, b, c, d). Because det(MF ) = det(AB)2 det(MP ), the Doptimal problem for searching optimal ti and pi in the Fourier regression are equivalent to
searching for optimal xi and pi in the weighted polynomial regression. Hence, Proposition
3.18 is translated into the weighted polynomial regression as follows.
17
Theorem 3.19. In the weighted polynomial regression of degree n − 1 with
variance
x
σP2 (x; a0 , b0 , c0 , d0), among the n-point discrete design, only the design 1i
with
n
1≤i≤n
xi = ϕ−1 (ϕ(tan(πt0i ); s, −t, t, s); a0 , b0 , c0 , d0 )) is D-optimal, where t0i is given in (3.23),
and s, t are arbitrary numbers such that s2 + t2 = 1. The information matrix at the D⊤
−1
⊤ −1
⊤
−1
optimal point is A−1
is given
0 (B B) (A0 ) , where A0 = A(a0 , b0 , c0 , d0 ), and (B B)
in (3.7).
Proof. Note that
yi = tan(π(t0i − θ)) =
cos(πθ) tan(πt0i ) − sin(πθ)
= ϕ(tan(πt0i ); s, −t, t, s),
sin(πθ) tan(πt0i ) + cos(πθ)
where s = cos(πθ), t = sin(πθ). xi = ϕ−1 (yi ; a0 , b0 , c0 , d0).
When (a0 , b0 , c0 , d0 ) = (1, 0, 0, 1), Theorem 3.19 reduces to Theorem 3.3 of Dette, et al.
(1999).
4
Tube-volume optimal design for n = 3
In the previous section, we discussed the Fourier regression and the polynomial regression
having the basis of (3.1) and (3.2), respectively, of a general dimension n. In this section,
we treat the case n = 3. This is the simplest non-trivial case, because when n = 2,
Vol1 (γM −1 ) = 2π irrespective of M.
When n = 3, the problem is reduced to the minimization of
12
1 0
2
1 x x
M −1 x 1
det
Z ∞
0 1 2x
x2 2x
Vol1 (γM −1 ) = 2
dx
1
−∞
1 x x2 M −1 x
x2
Z ∞ p
h1 (x)
=2
dx,
−∞ h0 (x)
where
h1 (x) =m4 (−m0 m23 + m0 m2 m4 + 2m1 m2 m3 − m21 m4 − m32 )
+ 4m3 (−m0 m2 m4 + m0 m23 − 2m1 m2 m3 + m21 m4 + m32 )x
+ 6m2 (m0 m2 m4 − m0 m23 + 2m1 m2 m3 − m21 m4 − m32 )x2
+ 4m1 (m0 m23 − m0 m4 m2 − 2m1 m2 m3 + m21 m4 + m32 )x3
+ m0 (m0 m2 m4 − m0 m23 + 2m1 m2 m3 − m21 m4 − m32 )x4 ,
h0 (x) =m2 m4 − m23 + 2(−m1 m4 + m2 m3 )x + (m0 m4 + 2m1 m3 − 3m22 )x2
+ 2(−m0 m3 + m1 m2 )x3 + (m0 m2 − m21 )x4 ,
18
with respect to
m0 m1 m2
M = m1 m2 m3 ≻ 0.
m2 m3 m4
(4.1)
The volume becomes an elliptic integral, which does not have an explicit expression in
general. Moreover,
the number of parameters to be optimized is four. (Note that the
p
integrand h1 (x)/h0 (x) is a homogeneous function in m0 , . . . , m4 ). We will solve this
minimization problem using the Möbius invariance.
4.1
Orbital decomposition
The Möbius group action defines an equivalent class on the moment cone MP . We define
M0 ∼ M1 for M0 , M1 ∈ MP if M1 = AM0 A⊤ for some A ∈ A. The orbit passing through
M is denoted by
A(M) = {AMA⊤ | A ∈ A} = {M1 | M1 ∼ M}.
The goal of this subsection is to prove the orbital decomposition of the polynomial moment
cone MP . Let
1 0 v
Mv = 0 v 0 .
(4.2)
v 0 1
Theorem 4.1.
MP =
G
v∈(0, 13 ]
A(Mv ) =
G
v∈[ 13 ,1)
A(Mv ),
where ⊔ is the disjoint union.
Proof. This is a consequence of Lemmas 4.2 and 4.3 below.
Lemma 4.2. For any M ∈ MP and 0 < v < 1, there exists A ∈ A such that AMA⊤ =
Mv . That is, M ∼ Mv .
Lemma 4.3. Mv′ ∼ Mv if and only if v ′ = v or v ′ = (1 − v)/(1 + 3v).
The proofs of Lemmas 4.2 and 4.3 are given in Appendix A.2 and A.3, respectively.
Note that the map
1−v
v 7→
1 + 3v
defines a one-to-one correspondence between (1, 1/3) and (1/3, 1), and v = 1/3 is the
fixed point of this map.
The stabilizer of A at M ∈ MP is defined as
AM = {A ∈ A | AMA⊤ = M}.
This is a subgroup of A.
19
Theorem 4.4. When v 6= 1/3,
A Mv
0 0 1
1 0 0
= {A(±1, 0, 0, ±1), A(0, ±1, ±1, 0)} = 0 ±1 0 , 0 ±1 0 ,
0 0 1
1 0 0
and when v = 1/3,
AMv = {A(s, −t, t, s) | s2 + t2 = 1} ⊔ {A(−s, t, t, s) | s2 + t2 = 1}.
In particular,
dim AMv =
(
0 (v ∈ (0, 31 ) ∪ ( 13 , 1)),
1 (v = 13 ).
Proof. The proof follows from the proof of Lemma 4.3. The details are omitted.
Theorem 4.5. The dimension of orbit A(Mv ) passing through Mv is
(
4 (v ∈ (0, 13 ) ∪ ( 13 , 1)),
dim A(Mv ) =
3 (v = 31 ).
f = (m
Proof. Let M = (mi+j−2 )i,j=1,2,3 and M
e i+j−2 )i,j=1,2,3 be 3 × 3 Hankel matrices, and
f = AMA⊤ . Picking up the
let A = A(a, b, c, d) (3 × 3 matrix in (3.16)). Assume that M
(1, 1), (1, 2), (1, 3), (2, 3), and (3, 3) elements and rearranging them, we have m
e = F m,
⊤
⊤
where m = (m0 , m1 , m2 , m3 , m4 ) , m
e = (m
e 0, m
e 1, m
e 2, m
e 3, m
e 4 ) , and
4
d
4cd3
6c2 d2
4c3 d
c4
3
2
bd3
3bdc2 + 3ad2 c
bc3 + 3adc2
ac3
2 2 ad 2+ 3bcd 2
2 2
2 2
2
2
2 2
b
d
2cdb
+
2ad
b
b
c
+
4abdc
+
a
d
2cda
+
2bc
a
a
c
F = F (a, b, c, d) =
.
3
b d
cb3 + 3adb2
3bda2 + 3b2 ca
da3 + 3bca2
a3 c
b4
4ab3
6a2 b2
4a3 b
a4
Let mv = (1, 0, v, 0, 1)⊤. The tangent space of the orbit at
column vectors of
0 0
∂ ∂ ∂ ∂
0 1
F (1, 0, 0, 1)mv =
, , ,
2v 0
∂a ∂b ∂c ∂d
0 3v
4 0
Mv is spanned by the four
0 4
3v 0
0 2v
.
1 0
0 0
The rank of this matrix is 4 when v 6= 1/3 and 3 when v = 1/3.
From Theorems 4.4 and 4.5, we see that dim AMv + dim A(Mv ) = 4 = dim A as
expected (e.g., Kawakubo (1992)).
20
4.2
Minimization over cross-section
From the orbital decomposition (Theorem 4.1) and the invariance of the volume on
an orbit (Theorem 3.16), the optimization problem is reduced to the minimization of
Vol1 (γMv−1 ) with respect to v, where Mv is defined in (4.2). The range of v is taken to be
(0, 13 ] or [ 13 , 1). We write Vol1 (γMv−1 ) = len(v) shortly. From the definition (2.6),
Z ∞
len(v) = Vol1 (γMv−1 ) = 2
s(x; v)dx,
−∞
where
s(x; v) =
q
1−v2
v
√
1 + 6vx2 + x4
1 + ( v1 − 3v)x2 + x4
.
Note that len(v) is an elliptic integral. The following is the main theorem of this section.
Theorem 4.6. The minimizer of Vol1 (γM −1 ) in (2.6) over M ∈ MP is given if and only
if M is in the orbit
1 0 13
M ∼ M1/3 = 0 13 0 .
1
0 1
3
p
The minimum volume is 4π 2/3.
Proof. Because of Theorem 4.1, it is enough to take the range v ∈ (0, 31 ]. We use the
inequality
z
1
√
≥ 1 − , |z| < 1.
(4.3)
2
1+z
The equality holds iff z = 0. Noting that
1
1
(1 − 3v)x2
1
√
q
=
1+
,
≥
2
1 + x2
(1 + x2 )2
1 + 6vx2 + x4
(1 + x2 ) 1 − 2(1−3v)x
2
2
(1+x )
s(x; v) is bounded below by
s(x; v) =
q
(1 +
1−v2
(1 + 6vx2 + x4 )
v
( v1 − 3v)x2 + x4 )(1 +
(1 − 3v)x2
1+
.
(1 + x2 )2
x2 )
Therefore, len(v) is bounded below by
len(v) = 2
Z
∞
s(x; v)dx.
−∞
This integral can be evaluated by counting the residues. When v < 1/3, the poles are
r
r
(1 − v)(1 + 3v)
(1 + v)(1 − 3v)
i
,
−
±ix1 = ±
2
v
v
21
i
±ix2 = ±
2
r
(1 − v)(1 + 3v)
+
v
r
(1 + v)(1 − 3v)
,
v
and ±ix0 = ±i.
Denote the residues for +ix1 , +ix2 , and +ix0 by Res(+ix1 ), Res(+ix2 ), and Res(+ix0 ),
respectively. Then, the integral is evaluated as
len(v) = 2 × 2πi(Res(+ix1 ) + Res(+ix2 ) + Res(+ix0 ))
q
q
v(1+3v)
1−v2
3
2
2π
3v + 6v − 5v + 8
v
1−v
=
.
2
4(1 + v)
The derivative is
2
3
4
5 − 38v + 14v + 18v + 9v + 48v
d
p
len(v) = −2π
dv
8(1 + v)2 v(1 − v 2 )
q
v(1−v)
1+3v
.
(4.4)
By applying inequality (4.3),
r
3
n
o
v(1 − v)
v(1 − v)
19
3
2
=q
v(1 − v)(1 + 3v) − 1
≥ v(1 − v) 1 −
1 + 3v
2
2 4
9
v(1 − v)(1 + 3v)
4
(the equality holds iff v = 1/3), the numerator of (4.4) is bounded below by
n
o
19
3
v(1 − v)(1 + 3v) − 1
5 − 38v + 14v 2 + 18v 3 + 9v 4 + 48v v(1 − v) 1 −
2
2 4
2
3
4
= (1 − 3v)(5 − 23v + 53v − 12v − 108v + 81v 5 ),
which is positive for 0 < v < 1/3. Therefore,
has the unique minimum at v = 1/3.
Since s(x; v) ≥ s(x; v),
d
len(v)
dv
< 0 for 0 < v < 1/3, and len(v)
min len(v) ≥ min len(v) = len(1/3).
v∈(0,1/3]
v∈(0,1/3]
Moreover, since s(x; v) = s(x; v) at v = 1/3,
min len(v) ≤ len(1/3) = len(1/3).
v∈(0,1/3]
Therefore,
min len(v) = len(1/3) = 4π
v∈(0,1/3]
p
2/3.
Point v = 1/3 is the unique minimizer, because this is the unique minimizer of len(v).
Figure 4.1 depicts the objective function len(v) and its lower bound len(v) for v ≤
1/3.
22
Figure 4.1: len(v) (solid line) and its lower bound len(v) for v ≤ 1/3 (dashed line).
As shown in (3.12), the information matrix M1/3 is the counterpart of the information
matrix for the uniform design in the Fourier regression.
Recall the decomposition of A(a, b, c, d) in Proposition 3.8. We already know from
Theorem 4.4 that, for s2 + t2 = 1,
A(s, −t, t, s)M1/3 A(s, −t, t, s)⊤ = A(−s, t, t, s)M1/3 A(−s, t, t, s)⊤ = M1/3 .
Moreover,
A(q, r, 0, 1)M1/3 A(q, r, 0, 1)⊤ =
q2
3
q2
2
1
r
+
r
3
q2
2
2
r
+
r
r(q
+ r 2 ) .
3
+ r 2 r(q 2 + r 2 ) (q 2 + r 2 )2
Theorem 4.6 can be written in the following form.
Theorem 4.7. The minimizer of Vol1 (γM −1 ) in (2.6) over M ∈ MP is given when and
only when M is of the form:
q2
2
1
r
+
r
3
q2
2
2
M = k r
+
r
r(q
+ r 2 ) , q 6= 0, k > 0.
3
q2
+ r 2 r(q 2 + r 2 ) (q 2 + r 2 )2
3
Remark 4.8. The minimum tube-volume M ∈ MP is attained when and only when the
curve
1
1
(γM −1 )+ = ψM −1 (x) = M − 2 f (x)/kM − 2 f (x)k | x ∈ X = (−∞, ∞)
p
forms a circle. Moreover, in that case, the circle length is 2π 2/3.
Finally, we characterize the tube-volume optimal design as a three-point design. The
polynomial design corresponding to the Fourier uniform design is given in (3.12). The
23
tube-volume optimal design is obtained as an orbit of the transformation passing through
the design in (3.12). In the following, let
0
1
ti
− 3 0 13
=
,
(4.5)
1
1
1
1
3
3
i=1,2,3
3
3
a three-point uniform design in the Fourier regression.
2
Theorem 4.9. In the weighted polynomial regression
with
variance function σP (x; a0 , b0 , c0 ,
xi
d0 ), the three-point tube-volume optimal design is
, where
pi i=1,2,3
xi = ϕ−1 (tan(πt0i ); a, b, c, d),
pi = k
σP2 (xi ; a0 , b0 , c0 , d0 )
.
σP2 (xi ; a, b, c, d)
(4.6)
Here, t0i is defined in P
(4.5), a, b, c, d are arbitrarily given so that ad − bc 6= 0, and k > 0
is a constant so that
pi = 1. The tube-volume optimal design includes the D-optimal
designs as special cases where
ϕ(·; a, b, c, d) = ϕ(·; s, −t, t, s) ◦ ϕ(·; a0, b0 , c0 , d0 )
holds for some s2 + t2 = 1.
Proof. The
optimal design is the orbit of the Möbius group passing through the deyi
, yi = tan(πt0i ), with variance function σP2 (y; 1, 0, 0, 1). By Theorem
sign 1
3 i=1,2,3
x
′ ′ ′ ′
is an optimal design under
3.17 with (a , b , c , d ) = (1, 0, 0, 1), we see that 1i
3
i=1,2,3
variance function σP2 (x; a, b, c, d). By Lemma 2.3 with σ12 (x) = σP (x; a, b, c, d), σ22 (x) =
σP (x; a0 , b0 , c0 , d0), we have pi in (4.6). The results for D-optimality is proved in Theorem
3.19.
Theorem 4.10. In the Fourier regression, the three-point tube-volume optimal design is
given as
)
(1
−1
0
tan
(q
tan(π(t
−
θ))
+
r)
i
π
ti
2
,
(4.7)
=
1+(q tan(π(t0i −θ))+r)2
pi i=1,2,3
k
0
2
1+tan (π(t −θ))
i
where k is a normalizing constant so that
P
i=1,2,3
pi = 1, q 6= 0,and r,θ are arbitrarily
t0i − θ
given. In particular, the uniform design (D-optimal design)
is a tube1
i
3
volume optimal design.
i=1,2,3
Proof. Let xi and pi be given in (4.6) when (a0 , b0 , c0 , d0 ) = (1, 0, 0, 1).
σP2 (x; a0 , b0 , c0 ,
Then,
t
d0 ) = σP2 (x), and from Theorem 3.3, the optimal design is given by i , ti = π1 tan−1 (xi ).
pi
24
Let (a, b, c, d) be chosen such that ϕ−1 (·; a, b, c, d) = ϕ(·; q, r, 0, 1) ◦ ϕ(·; s, −t, t, s) with
s = cos(πθ), t = sin(πθ). Then, ϕ(tan(πt0i ); s, −t, t, s) = tan(π(t0i − θ)) and xi =
q tan(π(t0i − θ)) + r, and we have ti = π1 tan−1 (xi ) in (4.7).
On the other hand, since ϕ(·; a, b, c, d) = ϕ(·; s, −t, t, s)◦ϕ ·; 1q , − rq , 0, 1 , σP2 (xi ; a, b, c, d)
2
= σP2 xi ; 1q , − qr , 0, 1 = 1 + q12 (xi − r)2 . Therefore,
pi = k
(1 + x2i )2
σP2 (xi ; 1, 0, 0, 1)
=
k
2 ,
σP2 (xi ; a, b, c, d)
1 + q12 (xi − r)2
which is equivalent to pi in (4.7). The uniform design corresponds to the case (q, r) =
(1, 0).
4.3
Numerical comparisons
Here we conduct a small numerical experiment to see the difference of the width of the
simultaneous confidence band under optimal
and non-optimal
designs. The model we
√
√
use is the Fourier regression f (x) = (1, 2 sin(2πx), 2 cos(2πx))⊤ , x ∈ X = (−1/2, 1/2]
with the variance function σ 2 (x) = 1. Three designs
1
1
1
1
−√4
0√
− 4 0 41
− 3 0 31
, D2 =
, D3 = 1+ 3 2− 3 1+4√3
D1 =
1
1
2
1
1
1
3
3
3
6
3
6
6
3
6
xi
, the information matrix is given by Σ−1 =
are compared. For each design
pi i=1,2,3
P3
⊤
2
i=1 pi f (xi )f (xi ) /σ (xi ).
Design D1 is the
pD-optimal and tube-volume (TV-) optimal design with det(Σ) = 1
and Vol1 (γΣ ) = 4π 2/3 = 10.260. Design D2 is TV-optimal, but is not D-optimal with
det(Σ) = 27/8 = 3.375. Design D3 is considered so that the value of det(Σ) is equal to
that of D2 , and is neither D-optimal nor TV-optimal. The value of D-criterion det(Σ),
the tube-volume criterion Vol1 (γΣ ), and the width wα (α = 0.1, 0.05, 0.01) of 100(1 − α)%
simultaneous confidence bands are listed in Table 4.3. wα is estimated by the upper
α quantile of the random variable maxx∈X |bb⊤ f (x) − b⊤ f (x)| by simulation with 10,000
replications.
Table 4.1: Comparisons of optimal/non-optimal designs.
design
D1
D2
D3
D-opt TV-opt det(Σ)
✓
✓
1.000
✗
✓
3.375
✗
✗
3.375
Vol1 (γΣ ) w0.1 w0.05 w0.01
10.260
6.99 7.94 9.55
10.260 19.86 23.15 30.59
11.262 26.06 30.58 40.35
As the theorems state, design D1 has the shortest simultaneous confidence band. By
comparing designs D2 and D3 having the same value of det(Σ), we see how the design
affects the width of the simulations confidence bands.
25
4.4
Summary and remaining problems
In this paper, we have proposed the tube-volume (TV) criterion Vol1 (γΣ ) in (2.6) in
experimental design. If a design is tube-volume optimal and simultaneously, D-optimal
minimizing maxx∈X f (x)⊤ Σ−1 f (x), the design is optimal that attains the minimum bandwidth of simultaneous confidence bands.
Then, the proposed criterion was applied to Fourier regression model that is a standard
model in linear optimal design theory, and weighted polynomial regression model that is
mathematically equivalent to the Fourier regression model. The Möbius group keeps the
tube-volume criterion invariant, whereas the subgroup O(2, R) of the Möbius group keeps
the D-criterion invariant.
Using the Möbius invariance, when n = 3, we found that the tube-volume optimal
designs in the Fourier regression and the weighted polynomial regression form an orbit of
the Möbius group. The tube-volume optimal designs contain D-optimal designs as special
cases. This means that in the Fourier regression, the uniform design is a universal optimal
design minimizing both tube-volume criterion and D-criterion.
We conjecture that for all n, the tube-volume optimal design is characterized as an
orbit of the Möbius group containing D-optimal designs. One supporting observation is
that for small n (n ≤ 6), tube-volume local optimality at the D-optimal designs can be
proved by direct calculations. That is, the Hessian matrix of the tube-volume criterion
evaluated at the D-optimal design is positive semi-definite, and the null space of the
Hessian matrix corresponds to the tangent space of the orbit of Möbius group action.
However, the proof for general n remains outstanding.
Throughout the paper, we just dealt with the case where the explanatory variable is
one-dimensional. However, the volume-of-tube method works for the construction of the
simultaneous confidence bands for regression with multidimensional explanatory variables
except for the conservativeness (ii) of Proposition 2.1, and the volume-optimality is welldefined. For example, we can discuss the volume-optimality of the p-variate polynomial
regression model with the basis vector
f (x) = 1, (xi )1≤i≤p , (xi xj )1≤i≤j≤p , . . . , (xi1 · · · xid )1≤i1 ≤···≤id ≤p
⊤
∈ R[x1 , . . . , xp ](
).
p+d
d
By the same argument as the univariate case, we can prove that the multivariate Möbius
p
p
transform ϕ : R → R defined by
Ax + b
A b
⊤
x = (x1 , . . . , xp ) 7→ ϕ(x; A, b, c, d) = ⊤
6= 0
, det ⊤
c d
c x+d
where A ∈ Rp×p , b, c ∈ Rp×1, d ∈ R (e.g., Kato and McCullagh (2014)) remains the
invariance (volume preserving property) Volp (γM −1 ) = Volp (γ(AM A⊤ )−1 ) of Theorem 3.16.
However, the treatment of the multidimensional case (see, e.g., Lasserre (2009) for the
moment cone) remains a future topic of research.
26
A
Appendix: Proofs
A.1
Proof of Lemma 3.4
Proof. Let tk = k/n − (n + 1)/(2n) and xk = tan(πtk ). The (i, j) element of M is
n
mi,j
n
1 X (i−1)+(j−1)
1
1 X i+j−2
=
xk
sin
(πtk ) cosn−i−j (πtk ).
=
n k=1
(1 + x2k )2(n−1)
n k=1
Then, apply Lemma A.1 below.
Lemma A.1. Let ti = i/n − d, i = 1, . . . , n, where d is a constant. Then,
n
Γ(k + 12 )Γ(n − k − 21 )
1 X 2k
sin (πti ) cos2n−2k−2 (πti ) =
.
n i=1
πΓ(n)
Proof. From the duplication formula for the gamma function, it suffices to show that
n
1 X 2k
(2k)!(2n − 2k − 2)! −2n+2
2
.
sin (πtj ) cos2n−2k−2 (πtj ) =
n j=1
k!(n − k − 1)!(n − 1)!
Let ω = eiπ/n , c = e−iπd . The left-hand side times (2i)2k 22n−2k−2 = 22n−2 (−1)k is
n
1X j
(cω − c−1 w −j )2k (cω j + c−1 w −j )2n−2k−2
n j=1
n
1 X X 2k
(−1)s cs ω sj c−(2k−s) ω −(2k−s)j
=
n j=1 0≤s≤2k s
X
2n − 2k − 2 t tj −(2n−2k−2−t) −(2n−2k−2−t)j
cω c
ω
.
×
t
(A.1)
0≤t≤2n−2k−2
Here, the contribution of the summation with respect to j is
(
n
1 (s + t = n − 1),
1 X (−2n+2+2s+2t)j
ω
=
n j=1
0 (otherwise).
Hence, (A.1) is equal to
X
(−1)
max(0,2k−n+1)≤s≤min(2k,n−1)
s
2k
s
(2k)!(2n − 2k − 2)!
2n − 2k − 2
= (−1)k
.
n−1−s
k!(n − k − 1)!(n − 1)!
The last equality follows from (1.41) of Gould (2010).
27
A.2
Proof of Lemma 4.2
The proof of Lemma 4.2 is divided into three parts (lemmas).
Lemma A.2. For M ∈ MP , there exist u, w > 1 such that
u 1 1
M ∼ 1 1 1 .
1 1 w
Lemma A.3. For u, w > 1, there
u
1
1
√
exist ũ, ṽ, w̃ > 0, ṽ < ũw̃ such that
1 1
ũ 0 ṽ
1 1 ∼ 0 ṽ 0 .
1 w
ṽ 0 w̃
√
Lemma A.4. For ũ, ṽ, w̃ > 0, ṽ < ũw̃,
ũ 0
0 ṽ
ṽ 0
there exist v ∈ (0, 1) such that
ṽ
0 ∼ Mv .
w̃
Proof of Lemma A.2. We start from a canonical form in (3.22):
M = w1 fP (x1 )fP (x1 )⊤ + w2 fP (x2 )fP (x2 )⊤ + w0 fP (±∞)fP (±∞)⊤ ,
1/4
where fP (x) = (1, x, x2 )⊤ , fP (±∞) = (0, 0, 1)⊤ . For A = A(a, b, c, d) with a = w2 (x1 −
1/4
1/4
x2 ), b = −w2 x1 , c = 0, d = −w2 , we have
u 1 1
A 1 1 1 A⊤ = M, u = w1 d−4 + 1, w = w0 a−4 + 1.
1 1 w
Proof of Lemma A.3. Let
u 1 1
M = 1 1 1 ,
1 1 v
ũ 0 ṽ
f = 0 ṽ 0 ,
M
ṽ 0 w̃
d2
2cd
c2
A = bd bc + ad ac .
b2
2ab
a2
f has a solution (a, b, c, d) such that ad − bc 6= 0. It
We confirm that equation AMA⊤ = M
is enough to show that under the assumption a, d 6= 0, a solution (a, b, c, d) satisfies
(AMA⊤ )1,2 = 0, (AMA⊤ )2,3 = 0, ad − bc 6= 0.
28
(A.2)
Solving (AMA⊤ )1,2 = 0 with respect to b yields
b = −a
c3 v + 3c2 d + 3cd2 + d3
,
d3 f1 (c/d; u)
(A.3)
where
f1 (c; u) = (c + 1)3 + (u − 1)
if f1 (c/d; u) 6= 0. Substituting (A.3) into (AMA⊤ )2,3 , we have
0 = (AMA⊤ )2,3 =
a{(v − 1)c4 + (u − 1)d4 + (c + d)4 }d6 f (c/d; u, v)
,
{d3 f1 (c/d; u)}3
(A.4)
where
f (c; u, v) =c6 (−2 + 3v − v 2 ) + c5 (−6 + 7v − uv 2 ) + c4 (−10 + 15v − 5uv)
+ c3 (−10u + 10v) + c2 (10 − 15u + 5uv) + c(6 − 7u + u2 v) + (2 − 3u + u2 ).
Substituting (A.3) into ad − bc, we have
d4 f2 (c/d; u, v)
,
0 6= ad − bc = a 3
d f1 (c/d; u)
f2 (c; u, v) = 4c + 6c2 + 4c3 + u + c4 v.
In the numerator of (A.4), if (v − 1)c4 + (u − 1)d4 + (c + d)4 = 0, then c = d = 0, and
hence, ad − bc = 0.
Now, we examine whether for all u, v > 1, there is a real x such that
f (x; u, v) = 0,
f1 (x; u) 6= 0,
f2 (x; u) 6= 0.
(A.5)
Once a solution x = x∗ is obtained, we have a solution that a, d 6= 0 are given arbitrarily,
c = dx∗ , and b is determined from (a, c, d) in (A.3).
Write f (·) = f (·; u, v) shortly. It is easily shown that when u, v > 1, neither
f (0) =(u − 2)(u − 1) > 0,
f (−1) = − (u − v)(u − 1)(v − 1) > 0,
f (±∞) = − (v − 2)(v − 1) > 0
nor
f (0) < 0, f (−1) < 0, f (±∞) < 0
is true, where f (±∞) = limc→±∞ c−6 f (c). This means that f (x; u, v) = 0 has a real
solution x = x∗ .
In order to check f1 (x∗ ; u) 6= 0 and f2 (x∗ ; u, v) 6= 0, we need to check whether f and
f1 (or f2 ) have a common factor. For this purpose, we calculate the resultants R(f, f1 )
and R(f, f2 ):
R(f, f1 ) = (u − 2)(u − 1)h(u, v)2,
29
R(f, f2 ) = h(u, v),
where
h(u, v) = −28 + 54u − 27u2 + 54v − 105uv + 54u2v − 27v 2 + 54uv 2 − 30u2v 2 + u3 v 3 . (A.6)
(For resultant, see, e.g., Prasolov (2004). Applications in statistics can be found in
Drton, et al. (2009).) As shown in Lemma A.5 later, in the region u, v > 1, h(u, n) = 0
iff u = 2. Therefore, when u 6= 2, we have established that x = x∗ satisfying (A.5) exists,
and hence, a solution (a, b, c, d) satisfying (A.2) exists.
When u = 2, (A.4) is reduced to
0=
f (c; 2, v)
(2 − v)c(−2 − 4c − 3c2 − c3 − c4 + c4 v)
=
f1 (c; 2)3
(2 + c)2 (1 + c + c2 )3
and c = 0 is a solution. From (A.3), b = −a/2, and a 6= 0, d 6= 0 are arbitrarily given. In
fact, for A = A(a, −a/2, 0, d),
2 1 1
2d4
0
a2 d2 /2
.
a2 d2 /2
0
A 1 1 1 A⊤ = 0
2 2
4
1 1 v
a d /2
0
a (v − 7/8)
Lemma A.5. Let h(u, v) be defined in (A.6). When u, v > 1, h(u, v) ≥ 0, and the
equality holds iff u = v = 2.
Proof. Fix u and consider h(u, v) as a function of v. Note that h(u, 1) = (u − 1)3 > 0.
∂
h(u, v)
∂v
= 54 − 105u + 54u2 + (−54 + 108u − 60u2 )v + 3u3 v 2 .
hv (u, v) =
hv (u, 1) = 3u(u − 1)2 > 0. It is easy to see that hv (u, v) = 0 has a real solution iff
3/2 ≤ u ≤ 3. Therefore, when u ≤ 3/2 or u ≥ 3, hv (u, v) is always positive. Combined
with h(u, 1) > 0, this means that h(u, v) > 0.
Consider the case 3/2 < u < 3. The largest zero of hv (u, v) is
p
9 − 18u + 10u2 + 3 (u − 1)3 (3 − u)(2u − 3)
v∗ (u) =
> 1.
u3
At this point, the function h(u, v) takes a local minimum
27
h(u, v∗ (u)) = 6 (u − 1)4 (−54 + 108u − 72u2 + 18u3 − u4 )
u
p
− 2(3 − u)(2u − 3) (u − 1)(3 − u)(2u − 3)
=27(u − 1)4 (u − 2)2 (−54 + 108u − 72u2 + 18u3 − u4 )
p
−1
+ 2(3 − u)(2u − 3) (u − 1)(3 − u)(2u − 3)
.
It is easy to check that −54 + 108u − 72u2 + 18u3 − u4 > 0 for 3/2 < u < 3. Hence,
h(u, v∗ (u)) ≥ 0 for 3/2 < u < 3 and the equality holds when u = 2. When u = 2,
v∗ (2) = 2.
30
Proof of Lemma A.4. For A = A(a, b, c, d) with b = c = 0,
4
ũ 0 ṽ
d ũ
0
a2 d2 ṽ
a2 d2 ṽ
0 .
A 0 ṽ 0 A⊤ = 0
ṽ 0 w̃
a2 d2 ṽ
0
a4 w̃
√
By letting a = w̃ −1/4 , d = ũ−1/4 , v = a2 d2 ṽ = ṽ/ ũw̃, we obtain the result.
√
Remark
A.6. In the proof of Lemma A.4, by letting d = ũ−1/4 , a = ṽ −1/2 / 3d =
√
ũ1/4 / 3ṽ 1/2 , w = a4 w̃ = ũw̃/9ṽ 2 , we have another representative group element
1 0 31
0 1 0 , w > 1 .
3
9
1
0 w
3
A.3
Proof of Lemma 4.3
Proof. The (1, 1), (2, 1), (3, 2), (3, 3) components of the equation Mv′ = AMv A⊤ are
(AMv A⊤ )1,1 = c4 + d4 + 6vc2 d2 ,
(AMv A⊤ )2,1 = ac3 + bd3 + 3vcd(bc + ad),
(AMv A⊤ )3,2 = a3 c + b3 d + 3vab(bc + ad),
(AMv A⊤ )3,3 = a4 + b4 + 6va2 b2 ,
respectively. By solving (AMv A⊤ )2,1 = 0, we have
b=−
ac(c2 + 3d2 v)
d(d2 + 3c2 v)
when d 6= 0. (c and d cannot be 0 simultaneously because ad − bc 6= 0.) Suppose first
that d 6= 0. Substituting this into (AMv A⊤ )3,2 , we have
(AMv A⊤ )3,2 =
a3 c(c4 − d4 )(c4 + d4 + 6c2 d2 v)(−1 + 9v 2 )
.
d2 (d2 + 3c2 v)3
This becomes 0 when (i) c = 0, (ii) c = ±d, or (iii) v = 1/3. We try to solve the equation
(AMv A⊤ )1,1 = (AMv A⊤ )3,3 = 1 in each case. Note that a = 0 cannot be a solution,
because b becomes 0 and ad − bc = 0.
(i) If c = 0, then b becomes 0 and (AMv A⊤ )1,1 = d4 , (AMv A⊤ )3,3 = a4 . Hence,
(a, b, c, d) = (±1, 0, 0, ±1) (four ways) are the solutions. In each case,
v ′ = (AMv A⊤ )3,1 = v.
(ii) If c = ±d, then b = ∓a, (AMv A⊤ )1,1 = 2c4 (1 + 3v) = 1 = (AMv A⊤ )3,3 =
2a (1 + 3v), and hence, c = ±a. Therefore,
(1, −1, 1, 1),
(1,
−1, −1, −1),
(a, b, c, d) = 1/(2 + 6v)1/4 ×
(−1, 1, 1, 1),
(−1, 1, −1, −1)
4
31
are solutions. In each case,
v ′ = (AMv A⊤ )3,1 =
1−v
.
1 + 3v
(iii) When v = 1/3 and d 6= 0, we have b = −ac/d and
(AMv A⊤ )1,1 = (c2 + d2 )2 = 1,
(AMv A⊤ )3,3 = (a2 + b2 )2 =
a4 (c2 + d2 )
a4
=
= 1.
d4
d4
√
√
2 . When d = a, c = −b = ∓ 1 − a2 . When d = −a, c = b =
1
−
a
Hence,
b
=
±
√
± 1 − a2 . In summary,
√
√
√
√
(a, b, c, d) = a, 1 − a2 , − 1 − a2 , a ,
a, − 1 − a2 , 1 − a2 , a ,
√
√
√
√
a, 1 − a2 , 1 − a2 , −a ,
a, − 1 − a2 , − 1 − a2 , −a .
In each case,
1
= v.
3
(iii’) When v = 1/3 and d = 0, (AMv A⊤ )2,1 = ac3 = 0. Because ad − bc 6= 0, c =
6 0,
⊤
⊤
4
⊤
4
and a = 0. In this case, (AMv A )3,2 = 0, (AMv A )1,1 = c = 1, (AMv A )3,3 = b = 1.
Hence, (a, b, c, d) = (0, ±1, ±1, 0) (four ways) are the solutions. In each case,
v ′ = (AMv A⊤ )3,1 =
v ′ = (AMv A⊤ )3,1 =
1
= v.
3
Acknowledgment
The authors are grateful to Yasuhiro Omori for his helpful comments.
References
Adler, R. J. and Taylor, J. E. (2007). Random Fields and Geometry, Springer.
Dette, H., Haines, L. M. and Imhof, L. (1999). Optimal designs for rational models and
weighted polynomial regression, The Annals of Statistics, 27 (4), 1272–1293.
Dette, H. and Melas, V. B. (2003). Optimal designs for estimating individual coefficients
in Fourier regression models, The Annals of Statistics, 31 (5), 1669–1692.
Drton, M., Sturmfels, B. and Sullivant, S. (2009). Lectures on Algebraic Statistics, Oberwolfach Seminars 39, Springer.
van Dyk, D. A. (2014). The role of statistics in the discovery of a Higgs boson, Annual
Review of Statistics and Its Application, 1, 41–59.
32
Gould, H. W. (2010). Combinatorial Identities: Table I: Intermediate Techniques for Summing Finite Series: From the seven unpublished manuscripts of H. W. Gould Edited
and Compiled by Jocelyn Quaintance.
http://www.math.wvu.edu/~ gould/Vol.4.PDF
Gross, K. I. and Holman III, W. J. (1980). Matrix-valued special functions and representation theory of the conformal group, I: The generalized gamma function, Transactions
of the American Mathematical Society, 258 (2), 319–350.
Guest, P. G. (1958). The spacing of observations in polynomial regression, The Annals of
Mathematical Statistics, 29 (1), 294–299.
Heinig, G. and Rost, K. (1989). Matrices with displacement structure, generalized Bezoutians, and Möbius transformations, Operator Theory: Advances and Applications,
40, 203–230.
Heinig, G. and Rost, K. (2010). Introduction to Bezoutians, Operator Theory: Advances
and Applications, 199, 25–118.
Johansen, S. and Johnstone, I. M. (1990). Hotelling’s theorem on the volume of tubes:
Some illustrations in simultaneous inference and data analysis, The Annals of Statistics,
18 (2), 652–684.
Johnstone, I. and Siegmund, D. (1989). On Hotelling’s formula for the volume of tubes
and Naiman’s inequality, The Annals of Statistics, 17 (1), 184–194.
Karlin, S. and Studden, W. (1966). Tchebycheff Systems: With Applications in Analysis
and Statistics, Interscience Publishers, Wiley.
Kato, N. and Kuriki, S. (2013). Likelihood ratio tests for positivity in polynomial regressions, Journal of Multivariate Analysis, 115, 334–346.
Kato, S. and McCullagh, P. (2014). A characterization of a Cauchy family on the complex
space, arXiv:1402.1905 [math.ST].
Kawakubo, K. (1992). The Theory of Transformation Groups, Oxford University Press.
Kiefer, J. and Wolfowitz, J. (1959). Optimum designs in regression problems, The Annals
of Mathematical Statistics, 30 (2), 271–294.
Kuriki, S. and Takemura, A. (2001). Tail probabilities of the maxima of multilinear forms
and their applications, The Annals of Statistics, 29 (2), 328–371.
Kuriki, S. and Takemura, A. (2009). Volume of tubes and the distribution of the maximum
of a Gaussian random field, Selected Papers on Probability and Statistics, American
Mathematical Society Translations Series 2, Vol. 227, No. 2, 25–48.
33
Lasserre, J. B. (2009). Moments, Positive Polynomials and Their Applications, Imperial
College Press.
Liu, W. (2010). Simultaneous Inference in Regression, Chapman & Hall/CRC.
Lu, X. and Kuriki, S. (2017). Simultaneous confidence bands for contrasts between several
nonlinear regression curves, Journal of Multivariate Analysis, 155, 83–104.
Mackey, D. S., Mackey, N., Mehl, C. and Mehrmann, V. (2015). Möbius transformations
of matrix polynomials, Linear Algebra and Its Applications, 470, 120–184.
McCullagh, P. (1996). Möbius transformation and Cauchy parameter estimation, The
Annals of Statististics, 24 (2), 787–808.
Moriguti, S., Udagawa, K. and Hitotumatu, S. (1957). Iwanami Sugaku Koshiki , II (in
Japanese), Iwanami.
Naiman, D. Q. (1986). Conservative confidence bands in curvilinear regression, The Annals
of Statistics, 14 (3), 896–906.
Prasolov, V. V. (2004). Polynomials, Algorithms and Computation in Mathematics 11,
Springer.
Pukelsheim, F. (2006). Optimal Design of Experiments, Classics in Applied Mathematics
50, SIAM.
Scheffé, H. (1959). The Analysis of Variance, Wiley.
Sun, J. (1993). Tail probabilities of the maxima of Gaussian random fields, The Annals
of Probability, 21 (1), 34–71.
Sun, J. and Loader, C. R. (1994). Simultaneous confidence bands for linear regression and
smoothing, The Annals of Probability, 22 (3), 1328–1345.
Takemura, A. and Kuriki, S. (2002). On the equivalence of the tube and Euler characteristic methods for the distribution of the maximum of Gaussian fields over piecewise
smooth domains, The Annals of Applied Probability, 12 (2), 768–796.
Working, H. and Hotelling, H. (1929). Applications of the theory of error to the interpretation of trends, Journal of the American Statistical Association, 24 (165), 73–85.
Wynn, H. P. (1985). Jack Kiefer’s contributions to experimental design, in Jack Carl
Kiefer Collected Papers III: Design of Experiments, L. D. Brown, O. Olkin, J. Sacks,
H, P. Wynn eds, Springer and the Institute of Mathematical Statistics, 1985, pages
xvii–xxiii.
Wynn, H. P. and Bloomfield, P. (1971). Simultaneous confidence bands in regression analysis (with discussions), Journal of the Royal Statistical Society, Ser. B, 33 (2), 202–221.
34
| 10math.ST
|
RELATIONAL EXCHANGEABILITY
arXiv:1607.06762v2 [math.ST] 28 Apr 2017
HARRY CRANE AND WALTER DEMPSEY
Abstract. A relationally exchangeable structure is a random combinatorial
structure whose law is invariant with respect to relabeling its relations,
as opposed to its elements. Aside from exchangeable random partitions,
examples include edge exchangeable random graphs and hypergraphs,
path exchangeable processes, and a range of other network-like structures
that arise in statistical applications. We prove a de Finetti-type structure
theorem for the general class of relationally exchangeable structures.
1. Introduction
Consider a random sequence X = (X1 , . . . , Xn ) taking values in an at most
countable set S. For concreteness, we may regard S as a set of species, so
that X records the species for a random sample of animals from a certain
population. From X, we define an equivalence relation ∼X on [n] := {1, . . . , n}
by
(1)
i ∼X j
if and only if Xi = X j .
We write Π(X) = {B1 , B2 , . . .} to denote the set partition whose blocks
B1 , B2 , . . . are the equivalence classes induced by ∼X . We sometimes write
∼Π in place of ∼X when convenient.
Suppose now that X = (X1 , . . . , Xn ) is exchangeable, meaning that
(Xσ(1) , . . . , Xσ(n) ) =D (X1 , . . . , Xn )
for all permutations σ : [n] → [n], where =D denotes equality in law.
Exchangeability of X induces exchangeability on the equivalence relation Π := Π(X) as in (1) in the sense that Πσ =D Π for all permutations
σ : [n] → [n], with Πσ defined by
i ∼Πσ j
if and only if σ−1 (i) ∼Π σ−1 ( j).
Below we present a theory of general relationally exchangeable structures which
contains the above example as a special case and generalizes Kingman’s
correspondence for exchangeable random partitions [4].
To appreciate the generality in which we work, let S again be a countable
set but now consider a sequence X = (X1 , . . . , Xn ) taking values in S × S, so
Date: May 1, 2017.
Key words and phrases. Edge exchangeable graph; Kingman’s correspondence; paintbox
process; exchangeable random partition.
H. Crane is partially supported by NSF grants CNS-1523785 and CAREER DMS-1554092.
1
2
HARRY CRANE AND WALTER DEMPSEY
Figure 1. (a) Representation of sequence of ordered pairs in
S = {a, b, c, d, e} with X1 = (a, b), X2 = (c, a), X3 = (d, e), X4 =
(a, c). (b) Representation of sequence of ordered pairs in
S = {a, b, c, d, e} with X10 = (c, a), X20 = (d, e), X30 = (a, c), X40 =
(a, b). The object in (b) can be obtained from that in (a) by
reordering (X1 , X2 , X3 , X4 ) as (X2 , X3 , X4 , X1 ). In both (a) and
(b), the edges are labeled according to where they appear in
sequence.
that each Xi is an ordered pair (ci , ri ). For a concrete application, we can
think of each Xi = (ci , ri ) as identifying the caller and receiver of a phone
call sampled uniformly at random from a telephone call log. While the data
comes in the form of a sequence X, the structure relating the calls can be
represented by a network-like object as in Figure 1. Since the sequence X
is exchangeable, the model assigns equal probability to structures that are
isomorphic up to relabeling edges as in Figures 1(a) and 1(b).
Just as we disregarded the species names in passing from X to its induced
equivalence relation ∼X in (1), we may also disregard the vertex labels in
Figure 1 to obtain an edge-labeled graph, as shown in Figure 2. The edgelabeled graph is defined formally as the equivalence class X of all sequences
X 0 that yield the same structure as X after removing vertex labels:
(2)
X := {X 0 : [n] → S × S : ρ X 0 = X for some bijection ρ : S → S},
where here we overload notation by allowing the bijection ρ : S → S to act on
S × S by (c, r) 7→ (ρ(c), ρ(r)), so that ρ X 0 := ρ ◦ X 0 : [n] → S × S is well-defined
by composition of functions. Exchangeability of X immediately implies edge
exchangeability of the edge-labeled graph associated to X [1].
For another example, let S represent a set of scientists and let X =
(X1 , . . . , Xn ) record names of coauthors on a collection of n scientific journal
articles sampled uniformly from a database (e.g., arXiv). Each Xi is a finite
subset {si,1 , . . . , si,ki } ⊂ S. The assumption of uniform sampling again makes
X an exchangeable sequence, which in turn induces exchangeability on
the associated edge-labeled hypergraph constructed by disregarding vertex
labels in the induced hypergraph structure in a manner analogous to the
construction of edge-labeled graphs from the equivalence class (2).
For another example, let S be a set of Internet Protocol (IP) addresses and
let each entry of X = (X1 , . . . , Xn ) correspond to the path taken by a message
sent between two IP addresses over the Internet. Each Xi corresponds to
RELATIONAL EXCHANGEABILITY
3
Figure 2. (a) Edge-labeled graph induced by disregarding
vertex labels in Figure 1(a). (b) Edge-labeled graph induced
by disregarding vertex labels in Figure 1(b). The graphs in (a)
and (b) have equal probability under an edge exchangeable
model.
a path (si , ai,1 , . . . , ai,ki , ti ) from source si to target ti by passing through the
intermediate nodes ai,1 , . . . , ai,ki , altogether indicating that the path traversed
s to ai,1 to ai,2 and so on until passing from si,k1 to ti . If X was obtained,
for example, by uniform random sampling of source-target pairs (si , ti ) and
then by applying an algorithm, such as traceroute, to obtain a path between
si and ti , then the sequence of paths X is exchangeable and, therefore, so is
the induced path-labeled structure shown in Figure 3.
Another example in the realm of networks is to take each Xi to be an
r-step ego network, obtained, e.g., by snowball sampling a neighborhood
of size r from a randomly chosen vertex. The relationally labeled structure
is constructed by piecing together the neighborhoods obtained from the
r-neighborhoods of n randomly chosen “egos” in this population. We omit
the details of this example and instead move on to our general treatment.
Myriad other data structures arise according to a similar recipe: let S be
a set of elements and R be a set of relations on the elements in S; sample an
exchangeable sequence X taking values in R; construct a structure from X
(as in Figure 1) and obtain the corresponding relationally labeled structure
by removing the vertex labels (as in Figure 2). The resulting structure is
exchangeable with respect to relabeling of its relations, a property which we
call relational exchangeability. We now define this notion formally and prove
a generic structure theorem for infinite relationally exchangeable structures.
The formal statement is given in Theorem 2.6.
2. Relational Exchangeability
Let (S, S) be any Borel space. A countably infinite sequence of S-valued
random variables X = (X1 , X2 , . . .) is exchangeable if X σ =D X for every
permutation σ : N → N, where =D denotes equality in distribution and
X σ := (Xσ(1) , Xσ(2) , . . .) is the reordering of X according to σ. By de Finetti’s
theorem [3], the distribution of every such countably infinite sequence can
be expressed as a mixture of independent, identically distributed (i.i.d.) sequences. In particular, with P(S) denoting the space of probability measures
4
HARRY CRANE AND WALTER DEMPSEY
Figure 3. (a) and (b) both correspond to the structures induced by taking the equivalence class over paths between
vertices. In this illustration, all paths have the same source
vertex and each path is labeled by a different color, so that
the structure in (b) can be obtained by recoloring the paths
from (a) (i.e., green to orange, red to green, and orange to
red).
on (S, S), there is a unique probability measure φ on P(S) such that the
distribution of X can be expressed as
Z
(3)
P(X ∈ ·) =
ν∞ (·)φ(dν),
P(S)
where ν∞ denotes the infinite product measure induced by ν on S∞ . We call
the measure φ in (3) the de Finetti measure of X.
de Finetti’s theorem figures into our treatment of relationally exchangeable structures, which we now define. Note that all of the examples in
Section 1, and many more that could arise in practice, involve relational
structures as they are defined in the coming section. Example 2.2 provides
a concrete illustration.
2.1. Relational structures. Let α : N → N ∪{0} be a signature such that
α( j) = 0 implies α(k) = 0 for all k ≥ j. An α-structure with domain A is a
collection A = (RA
, RA
, . . .), where A is a set and each RA
⊆ Aα(j) is a relation
2
1
j
of arity α(j) on A. We adopt the convention A0 := ∅ so that RA
= ∅ whenever
j
α( j) = 0.
We write dom A := A for the domain of A and Finα for the P
set of all αA
structures A with finite dom A ⊂ Z = {. . . , −1, 0, 1, . . .} such that ∞
j=1 |R j | <
∞, where |S| denotes the cardinality of a set S. Writing dom A ⊂ f Z to denote
that dom A is a finite subset of Z, we have
Finα := {A =
(RA
, RA
2 , . . .)
1
: dom A ⊂ f Z and
∞
X
j=1
|RA
| < ∞}.
j
RELATIONAL EXCHANGEABILITY
5
A
j≥1 |R j | < ∞ implies that to every A ∈ Finα there is an rA :=
max{k ≥ 1 : RA
, ∅} < ∞, making it convenient to sometimes express A ∈
k
A
Finα as (R1 , . . . , RA
rA ) by omitting the infinite sequence of empty relations
Condition
P
after rA .
For any A∗ ⊇ A and any injection ρ : A∗ → A0 there is an induced action
ρ(A)
ρ(A)
on A = (RA
, RA
, . . .) by A 7→ ρ(A) = (R1 , R2 , . . .) with dom ρ(A) =
2
1
ρ(A) := {ρ(a) : a ∈ A} and
(4)
ρ(A)
(ρ(a1 ), . . . , ρ(aα(j) )) ∈ R j
if and only if
(a1 , . . . , aα(j) ) ∈ RA
j
for each j = 1, 2, . . ..
For n ≥ 1 and any at most countable subset of finite α-structures R ⊆ Finα
for which each A ∈ R has dom A ⊆ Z + := {1, 2, . . .}, we consider the set
of equivalence classes of R-valued sequences x : [n] → R obtained
R[n]
as follows. Any x : [n] → R determines a relationally labeled structure by
removing the labels of the elements contained in each of the x(i) while
maintaining the integrity of the overall structure induced by x. Formally,
we define the relationally labeled structure induced by x as the equivalence
class
(5)
x := {x 0 : [n] → R : ρ x 0 = x for some bijection ρ : Z → Z},
where ρ x : [n] → R is defined by (ρ x)(i) = ρ(x(i)) as in (4) above. We write
as the set of all x constructed from some x : [n] → R in this way.
R[n]
Remark 2.1 (Notation). Below we reserve lowercase letters x, y, . . . for generic
(non-random) objects and uppercase letters X, Y, . . . for random objects. We use
bold letters x, y, . . . for generic (non-random) functions x : [n] → R and X, Y, . . .
for random functions X : [n] → R.
Example 2.2. In this example, we demonstrate how the structures in Section 1
fit into the framework of α-structures. For this we write A = (RA
, RA
, . . .) as an
2
1
α-structure with dom A = A and α varying according to the context.
For α(1) = 1 and α(k) = 0 for k ≥ 2, each α-structure A is determined by a
subset RA
⊆ A. If we then choose R ⊆ Finα to consist of all singleton subsets of N,
1
so that each RA
has the form {i}, i ≥ 1, then the equivalence class of x : [n] → R in
1
(5) corresponds to the equivalence relation induced by x as in (1).
For α(1) = 2, α(k) = 0 for k ≥ 2, each α-structure A with dom A = A
corresponds to a binary relation RA
⊆ A2 . Taking R ⊆ Finα to consist of all
1
A
structures with R1 = {(i, j)} for i , j corresponds to sampling from the phone call
database in Section 1: each sampled Xk = {(i, j)} corresponds to a caller-receiver pair
(i, j). The equivalence class x gives an edge-labeled (directed) graph as in Figure 2.
(To get an undirected graph we would take each RA
to consist of symmetric pairs
1
{(i, j), ( j, i)}.)
Taking α( j) = j for all j ≥ 1 means that any α-structure is determined by a
collection RA
⊆ A j of subsets of j-tuples for every j ≥ 1. If we take R ⊂ Finα
j
6
HARRY CRANE AND WALTER DEMPSEY
to consist only of those α-structures of the form RA
= {(aσ(1) , aσ(2) , . . . , aσ(k) ) :
k
A
permutations σ : [k] → [k]} for some k ≥ 1 and R j = ∅ for all j , k, then the
elements A ∈ R can be used to represent the set of coauthors in a sample of articles.
Also for α( j) = j for all j ≥ 1, if we take R ⊂ Finα to consist only of those
α-structures of the form RA
= {(a1 , a2 , . . . , ak )} for some k ≥ 1 and RA
= ∅ for all
j
k
j , k, then each A ∈ R corresponds to a path from a1 to ak , as discussed at the end
of Section 1.
Our discussion below specializes to the case of random structures labeled
by the countable set N, which are those structures constructed just as in (5)
but for a countable sequence x : N → R. (Note well the difference between
the index set N and the domain of the structures in R, which we take to be
Z + . The domain labeling is “quotiented out” in (5), while the indexing N
remains, serving as the “edge labels” in the associated interpretation as an
edge-labeled graph in Figure 2.)
to denote the set of such structures and we equip R with
We write RN
N
the Borel σ-field associated to its product-discrete topology induced by the
and n ≥ 1, we define the restriction R x
following metric. For any x ∈ RN
n
as the structure obtained by taking any x 0 ∈ x (i.e., x 0 : N → R
of x to R[n]
for which there exists ρ such that ρ x 0 = x), restricting its domain to [n]
by x 0|[n] : [n] → R, i 7→ x 0 (i), and putting Rn x := (x 0|[n] ) as in (5). By the
, it is clear that this is well-defined and does not depend on
definition of RN
by
the specific choice of x 0 ∈ x . We then define the metric on RN
d(x , x 0 ) := 1/(1 + sup{n ≥ 1 : Rn x = Rn x 0 }),
x , x 0 ∈ RN
,
is compact.
with the convention that 1/∞ = 0, under which RN
by
For any permutation σ : N → N, we define the relabeling of x ∈ RN
σ
0
σ as the structure x obtained by first choosing any x ∈ x and putting
x σ := (x 0 ◦σ) , where x 0 ◦σ : N → R is defined by usual composition of
functions, (x 0 ◦σ)(i) := x 0 (σ(i)). It is once again clear that this does not
depend on the specific choice of representative x 0 ∈ x since the actions of
ρ : N → N and σ : N → N commute for all x 0 , i.e., ρ(x 0 ◦σ) = (ρ x 0 ) ◦ σ.
is
Definition 2.3 (Relational exchangeability). A random structure X ∈ RN
relationally exchangeable if X σ =D X for all permutations σ : N → N.
2.2. Representation theorem. Our main theorem establishes a generic con . The
struction for infinite relationally exchangeable structures X in RN
construction proceeds by sampling a sequence X1 , X2 , . . . conditionally i.i.d.
in a related space R? and then modifying these observations to obtain a
new sequence X † := (X1† , X2† , . . .). We then construct the equivalence class
X † based on the sequence X1† , X2† , . . . as in (5). Since stating the theorem
formally requires some new ideas and notation, we give the construction
and key ideas of the proof prior to stating the result in Theorem 2.6.
RELATIONAL EXCHANGEABILITY
7
As above, let α : N → N ∪{0} and R ⊆ Finα be an at most countable set of
α-structures such that α(j) = 0 implies α(k) = 0 for all k ≥ j and each A ∈ R
has dom A ⊂ f Z + . Since R is at most countable, we may fix an ordering
R = {Rn }n≥1 of its elements. Given any A = (RA
, RA
, . . .) ∈ Finα and any
2
1
[0, 1]-valued sequence (Ti )i∈Z , we define TA :≡ T ◦ A as the α-structure TA
with dom(TA) := {Ti : i ∈ dom A} and relations RTA
given by
j
(6)
(Ta1 , . . . , Taα( j) ) ∈ RTA
j
if and only if
(a1 , . . . , aα(j) ) ∈ RA
j
for each j = 1, 2, . . .. We then define
[
R[0,1] :=
{TRn : T = (Ti )i∈Z ∈ [0, 1]Z }
n≥1
as the set of α-structures obtained by associating [0, 1]-valued labels to
the elements of R. More generally, if (Ξi )i∈dom A is a collection of subsets
Ξi ⊆ [0, 1], then we define ΞA by
ΞA := {TA : Ti ∈ Ξi for each i ∈ dom A}.
We equip R[0,1] with the σ-field on R[0,1] generated by all sets of the form
ΞA with A ∈ R and Ξ = (Ξi )i∈dom A a collection of Borel subsets of [0, 1].
and any sequence ξ = (ξ )
From any x ∈ RN
i i∈Z of i.i.d. Uniform[0, 1]
random variables, we write ξ x to denote a random R[0,1] -valued sequence
(Zi )i≥1 obtained by first taking any representative x 0 ∈ x and then putting
Zi = ξ x 0 (i) for each i ≥ 1, with ξ x 0 (i) defined as in (6). Since x is fixed
in this example, each ξ x 0 (i) corresponds to an assignment of Uniform[0, 1]
random labels to the elements in the domain of x 0 (i). Since ξi , ξ j with
probability 1 for all i , j, it is immediate that the distribution of ξ x does
not depend on the manner in which the representative x 0 is chosen. Now for
and a sequence ξ of
any infinite relationally exchangeable structure X ∈ RN
Uniform[0, 1] random variables independent of X , ξ X = (Zi )i≥1 defines a
random sequence obtained by putting Zi = ξ x 0 (i) for a representative x 0 ∈ x
on the event X = x . By exchangeability of X , the sequence Z = (Zi )i≥1
obtained in this way is also exchangeable and de Finetti’s theorem implies
that Z is distributed as an i.i.d. sequence from a random measure ν on R[0,1] ,
as described in (3).
Given ν, we define the propensity of u ∈ [0, 1] in Z by
(7)
ν? (u) := ν({A ∈ R[0,1] : u ∈ dom A}),
which equals the conditional probability of the event {u ∈ dom Z j } given ν,
for each j ≥ 1. It is clear that each u ∈ [0, 1] appears in either 0, 1, or infinitely
many of the relations (Zi )i≥1 with probability 1. First, if ν? (u) > 0, then the
strong law of large numbers implies that u occurs in infinitely many of the
relations Zi with proportion ν? (u). If ν? (u) = 0 and u ∈ Zi for some i, then
the probability that u occurs in Z j is ν? (u) = 0 independently for each j , i
and therefore u appears only once in Z with probability 1.
8
HARRY CRANE AND WALTER DEMPSEY
Clearly the set U = {u : ν? (u) > 0} is at most countable since | dom(Zi )| <
∞ for each i = 1, 2, . . .. We can, therefore, order the elements of U as u1 , u2 , . . .
such that ν? (u j ) ≥ ν? (u j+1 ) for j ≥ 1, breaking ties ν? (v) = ν? (w) as follows.
For each A ∈ R, we define
ν? (u; A) := ν({TA : T = (Ti )i∈Z ∈ [0, 1]Z such that u ∈ dom(TA)}),
u ∈ [0, 1],
to be the measure assigned to the subset of R[0,1] whose structure is consistent
with A and which contains u in its domain. Assuming ν? (v) = ν? (w), we
assign the smaller label to v if there is some k ≥ 1 such that ν? (v; R j ) =
ν? (w; R j ) for all j < k and ν? (v; Rk ) > ν? (w; Rk ). If ν? (v; R j ) = ν? (w; R j ) for all
j ≥ 1, then we label v and w in increasing order, i.e., if we are to assign labels
j and j + 1 to v and w and if v < w, then we shall put u j = v and u j+1 = w;
otherwise, we put u j = w and u j+1 = v. The ordering U = (u j ) j≥1 is thus
uniquely determined by ν and the fixed ordering of R chosen at the outset.
Now given U, for any A ∈ R[0,1] we define A? (suppressing the dependence on ν) by replacing each occurrence of u j ∈ U by j and replacing each occurrence of v0 < U in A by a unique non-positive integer z(v0 ) = 0, −1, −2, . . .
so that for v0 , v00 < U and both in dom A with v0 ≤ v00 we have z(v0 ) ≤ z(v00 )
and the z(v0 ) are chosen to be the largest possible non-positive integers that
satisfy this condition. (For example, if v1 < v2 < v3 are the only elements in
dom A that are not in U, we assign z(v3 ) = 0, z(v2 ) = −1, and z(v1 ) = −2.)
Every A ∈ R[0,1] thus corresponds to a unique such A? and we define
R? as the set of all structures A? obtained in this way. Note that since
R is at most countable, so is R? . Also, although we have constructed R?
using U (and therefore ν), the set R? depends only on R, justifying the term
R-simplex in our definition of FR in (8) below.
The elements of R? are thus α-structures A? with dom A? ⊆ Z. We
define the R-simplex FR by
X
? : fB ≥ 0 and
(8)
FR :=
(
f
)
f
=
1
,
B
B
B∈R
?
B∈R
on which we equip the metric
dFR ( f, f 0 ) :=
X
| fB − fB0 |,
f, f 0 ∈ FR ,
B∈R?
and the associated Borel σ-field.
by first
Any f ∈ FR determines a unique probability measure ε f on RN
drawing X = (X1 , X2 , . . .) i.i.d. from
(9)
P(Xi = B | f ) = fB ,
B ∈ R? ,
and then constructing X † = (X1† , X2† , . . .) from X as follows. We initialize by
putting m0 = 0. For each n ≥ 1, given mn−1 , we replace the non-positive
elements in dom Xn according to the rule:
(i) If dom Xn has no non-positive elements, then put mn = mn−1 and
Xn† := Xn .
RELATIONAL EXCHANGEABILITY
9
(ii) If dom Xn has non-positive elements 0, . . . , −k for k ≥ 0, then define
Xn† by replacing each occurrence of −i, for 0 ≤ i ≤ k, in Xn by
mn−1 −i, then putting mn = mn−1 −k−1 and keeping positive elements
unchanged. See Example 2.5 below for an illustration.
Note the distinction between the use of non-positive elements in construction
of Xi and Xi† respectively. The non-positive elements of each Xi ∈ R? serve
to denote the non-recurring particles that appear only within this particular
relation. The non-positive elements of Xi† , on the other hand, serve to denote
the non-recurring particles across all relations in the sequence X † . We define
ε f to be the distribution of X † constructed by applying (5) to the sequence
X†.
From ν, we define f ν = ( fBν )B∈R? ∈ FR by
(10)
fBν := ν({A ∈ R[0,1] : A? = B}),
B ∈ R? .
This choice of f ν = ( fBν )B∈R? is uniquely determined by ν and the fixed
ordering of R. Conversely, given f = ( fB )B∈R? ∈ FR we construct a measure
ν f on R[0,1] to be the distribution of ξY from (6) for Y drawn from distribution
(9) and ξ = (ξi )i∈Z i.i.d. Uniform[0, 1] independent of Y. Proposition 2.4
proves that the above procedure does not alter the random, relationally
labeled structure.
Proposition 2.4. Let X be relationally exchangeable and let θ = (θi )i∈Z be i.i.d.
Uniform[0, 1] independent of X . Then (((θ X )? )† ) = X a.s., where (θ X )?
denotes the application of ? : R[0,1] → R? to each component of the sequence θ X .
Proof. Let θ = (θi )i∈Z be i.i.d. Uniform[0, 1] independently of X . Each event
X = x gives rise to a probability measure ν on R[0,1] through the de Finetti
measure of θ x ; see (3). Let U = (ui )i≥1 be the ordered subset of [0, 1]
corresponding to the atoms of ν? as in (7). Since θ are i.i.d. Uniform[0, 1],
we have
P{θi , θ j for all i , j} = 1,
which implies that distinct i, j ∈ Z are labeled distinctly in θ x with probability 1. In particular, the non-positive labels in (θ x )? account for all those
elements that appear in only one entry of the sequence θ x . It follows
that ((θ x )? )† ∈ x with probability 1 and, thus, (((θ x )? )† ) = x with
probability 1 for all possible outcomes X = x .
Example 2.5. To illustrate the above procedure, let R consist of the singleton
sets ({i}), i ≥ 1, just as in the first part of Example 2.2, written as {1}, {2}, . . . for
simplicity. Let U = (ui )i≥1 be a countable subset of [0, 1]. From R = {{1}, {2}, . . .},
we obtain R? = {{0}, {1}, . . .} since for any sequence T = (Ti )i∈Z and any {i}, i ≥ 1,
the transformed relation T{i} ≡ {Ti } has either Ti ∈ U or Ti < U. If Ti = uk ∈ U,
then {Ti }? = {k} for k ≥ 1; and if Ti = v < U, then {Ti }? = ({0}).
Given ( f{0} , f{1} , . . .) ∈ FR , we generate a sequence X1 , X2 , . . . of singleton sets
i.i.d. as in (9), from which we obtain X1† , X2† , . . . by reassigning occurrences of 0
10
HARRY CRANE AND WALTER DEMPSEY
to the greatest negative integer that has not yet appeared in the sequence. For
example, if the sequence begins {4}, {0}, {2}, {0}, {2}, {2}, {0}, . . ., then we reassign
labels to obtain {4}, {0}, {2}, {−1}, {2}, {2}, {−2}, . . .. Delabeling according to (5) (or
equivalently (1)) yields the equivalence classes {1}, {2}, {3, 5, 6}, {4}, {7}.
For another example, let R consist of ordered pairs {(i, j)}, 1 ≤ i , j < ∞, so that
we are in the phone call example of Section 1. Let U = (ui )i≥1 be a countable subset
of [0, 1]. Then R = {{(i, j)} : i , j ≥ 1} and
R? = {{(i, 0)} : i ≥ 1} ∪ {{(0, i)} : i ≥ 1} ∪ {{(0, −1)}, {(−1, 0)}} ∪ R
since any T = (Ti )i∈Z and any {(i, j)} ∈ R is transformed by T{(i, j)} = {(Ti , T j )},
which may have Ti = ui0 ∈ U and T j = u j0 ∈ U in which case {(Ti , T j )}? = {(i0 , j0 )}.
If Ti = ui0 ∈ U and T j < U, then {(Ti , T j )}? = {(i0 , 0)}. If Ti < U and T j = u j0
then {(Ti , T j )}? = {(0, j0 )}. If Ti , T j < U then {(Ti , T j )}? will equal {(0, −1)} or
{(−1, 0)} depending on whether T j < Ti or Ti < T j , respectively.
The above construction gives the following representation theorem.
Theorem 2.6. Let α be a signature, R ⊆ Finα , and fix an ordering R = (Rn )n≥1 .
. Then there exists a
Let X be a relationally exchangeable random structure in RN
probability measure φ on FR such that X ∼ εφ , where
Z
(11)
εφ (·) =
ε f (·)φ(d f ).
FR
A canonical version of the measure φ in Theorem 2.6 can be constructed
as in (10) above, and this is the measure we construct in the following proof.
Proof. We proceed by constructing φ as in (10) and showing that Y † ∼ εφ
satisfies Y † =D X .
To see this, we first let ψ be the de Finetti measure on P(R[0,1] ) (i.e., the
space of probability measures on R[0,1] ) associated to ξ X for ξ = (ξi )i∈Z
i.i.d. Uniform[0, 1] independently of X . In particular, the distribution of
ξ X is conditionally i.i.d. from ν ∼ ψ. The measure ψ determines a measure
φ on FR through (10).
Given f ∼ φ, we construct Y = (Y1 , Y2 , . . .) as conditionally i.i.d. from the
distribution in (9) and Y † as in (i) and (ii) above. Let U = (ui )i≥1 be the atoms
of θ Y † for θ = (θi )i∈Z i.i.d. Uniform[0, 1] independent of Y † , let ζ = (ζk )k≤0 be
i.i.d. Uniform[0, 1] independently of everything else, and define ξ f = (ξi )i∈Z
by
(
ui ,
i ≥ 1,
ξi =
ζi , otherwise.
First note that the conditional distribution of ξ f Y † given f is the same as the
conditional law of θ Y † given ν f , since the ξi for i ≥ 1 were constructed from
the atoms of θ Y † . Writing D(X | Y) to denote the conditional distribution
RELATIONAL EXCHANGEABILITY
11
of X given Y, we thus have
(12)
D(ξ f Y † | f ) = D(θ Y † | ν f )
(13)
D(ξ f Y † | f ) = D(θ X | ν f ),
and
where (13) follows from the construction of φ from the de Finetti measure ψ
of ξ X . From (12) and (13) it follows that
D((((ξ f Y † )? )† ) | f ) = D((((θ Y † )? )† ) | ν f )
D((((ξ f Y † )? )† )
and
? †
| f ) = D((((θ X ) ) ) | ν f ),
and thus
D((((θ Y † )? )† ) | ν f ) = D((((θ X )? )† ) | ν f ).
By Proposition 2.4, we have (((θ Y † )? )† ) = Y † a.s. and (((θ X )? )† ) = X ,
implying Y † =D X as desired.
2.3. Special cases. As discussed in Example 2.5, the case in which R corresponds to the singleton sets {i} for i ≥ 1 gives FR equal to the ranked
simplex
X
↓
∆ :=
(
f
,
f
,
.
.
.)
:
f
≥
f
≥
·
·
·
≥
0,
f
≥
0,
f
=
1
.
0 1
2
0
1
i
i≥0
To see this note that R[0,1] is the set of singleton elements of [0, 1], i.e.,
R[0,1] := {{u} : u ∈ [0, 1]}.
An exchangeable sequence X = (X1 , X2 , . . .) in R[0,1] gives rise to a random
countable subset U ⊂ [0, 1] of elements that appear infinitely often among
the Xi and its complement [0, 1] \ U consisting of all elements appearing at
most once among the Xi . In the construction of X † from X described above,
any occurrence Xi = {u} for u < U gives rise to Xi? = {0}, explaining why the
definition of FR in (8) corresponds to the simplex of elements ( fi )i≥0 .
Following Example 2.2, the case of edge exchangeable random (directed)
graphs corresponds to R ⊂ Finα with α(1) = 2 and α(k) = 0 for k ≥ 2, with
each A ∈ R having RA
= {(i, j)}, i , j. In this case, R[0,1] corresponds to all
1
pairs (u, v) for u, v ∈ [0, 1]. An exchangeable sequence X in R[0,1] determines
a random subset U ⊂ [0, 1]. Now, in each Xi there can be 0, 1, or 2 elements
v < U. Occurrences of such elements are replaced by 0 and −1, as explained
in Example 2.5.
In general, we call the occurrences of any u < U in the sequence X blips.
These elements are merely a ‘blip’ in the overall sequence X—they occur only
for an instant and then never again. Our labeling convention in defining R?
is that the non-positive labels correspond to the blips. Theorem 2.6 describes
how blips arise in general relationally exchangeable structures.
12
HARRY CRANE AND WALTER DEMPSEY
3. Concluding
Recent work in the statistical analysis of network data underscores the
significance of relationally labeled structures in applications, as many data
structures which are typically represented graphically, such as social networks and networks detailing email correspondence and professional collaborations, arise from a process by which interactions or relations accumulate
within a population of otherwise indistinguishable individuals. The work in
[1] focused on the case of edge and hyperedge exchangeable random graphs,
but the additional examples in Section 1 involving repeated path sampling
and snowball sampling are also highly relevant in networks applications.
The representation theorem serves two immediate statistical purposes. First,
the representation characterizes a general class of nonparametric statistical
models of potential interest in the aforementioned applications. Second,
it establishes that vertices arrive in size-biased random order in relationally exchangeable structures, explaining why the common assumption of
exchangeable vertex labeling, as presented in graphon models [5], is not
tenable in many applications. We reserve discussion of these practical
implications for other work; see [1, 2].
References
[1] H. Crane and W. Dempsey. Edge exchangeable models for network data. arXiv:1603.04571,
2015.
[2] H. Crane and W. Dempsey. A framework for statistical network modeling.
arXiv:1509.08185, 2015.
[3] B. de Finetti. La prévision: ses lois logiques, ses sources subjectives. Annales de l’Institut
Henri Poincaré, 7:1–68.
[4] J. F. C. Kingman. Random partitions in population genetics. Proc. Roy. Soc. London Ser. A,
361(1704):1–20, 1978.
[5] L. Lovász and B. Szegedy. Limits of dense graph sequences. J. Comb. Th. B, 96:933–957,
2006.
Department of Statistics & Biostatistics, Rutgers University, 110 Frelinghuysen Avenue, Piscataway, NJ 08854, USA
E-mail address: hcrane@stat.rutgers.edu
URL: http://stat.rutgers.edu/home/hcrane
Department of Statistics, University of Michigan, 1085 S. University Ave, Ann Arbor,
MI 48109, USA
E-mail address: wdem@umich.edu
| 10math.ST
|
1
Joint Investment and Operation of Microgrid
arXiv:1511.01984v1 [cs.SY] 6 Nov 2015
Hao Wang, Student Member, IEEE, and Jianwei Huang, Senior Member, IEEE
Abstract—In this paper, we propose a theoretical framework
for the joint optimization of investment and operation of a
microgrid, taking the impact of energy storage, renewable energy
integration, and demand response into consideration. We first
study the renewable energy generations in Hong kong, and
identify the potential benefit of mixed deployment of solar and
wind energy generations. Then we model the joint investment and
operation as a two-period stochastic programming program. In
period-1, the microgrid operator makes the optimal investment
decisions on the capacities of solar power generation, wind
power generation, and energy storage. In period-2, the operator
coordinates the power supply and demand in the microgrid to
minimize the operating cost. We design a decentralized algorithm
for computing the optimal pricing and power consumption
in period-2, based on which we solve the optimal investment
problem in period-1. We also study the impact of prediction error
of renewable energy generation on the portfolio investment using
robust optimization framework. Using realistic meteorological
data obtained from the Hong Kong observatory, we numerically
characterize the optimal portfolio investment decisions, optimal
day-ahead pricing and power scheduling, and demonstrate the
advantage of using mixed renewable energy and demand response
in terms of reducing investment cost.
Index Terms—Smart grid, microgrid, renewable energy, solar,
wind, energy storage, demand response, investment, pricing.
N OMENCLATURE
Acronyms
P1
P2
Pui
EP1
RP1
RP2
Sets
N
H
T
Ω
Period-1 problem for investment
Period-2 problem for operation
User i’s cost minimizing problem
Equivalent problem of P1
Period-1 problem for robust optimization
Period-2 problem for robust optimization
Set of users
Investment horizon
Operational horizon
Set of scenarios
Indices
i
Index of users
t Index of hours
ω Index of scenarios
This work is supported by a grant from the Research Grants Council of
the Hong Kong Special Administrative Region, China, under Theme-based
Research Scheme through Project No. T23-407/13-N. Part of the results have
appeared in IEEE SmartGridComm 2014 [1].
H. Wang and J. Huang (corresponding author) are with the Network
Communications and Economics Lab (NCEL), Department of Information
Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong SAR,
China, e-mails: {haowang, jwhuang}@ie.cuhk.edu.hk.
Parameters
N
T
D
cs
cw
ce
B
βo
βi
bt
Di
dti
t
di
yit
ω,t
rmax
ηsω,t
ω,t
ηw
max
rc
rdmax
ηc
ηd
SOCmin
SOCmax
DODmax
eω,t
s,min
eω,t
s,max
eω,t
w,min
eω,t
w,max
Variables
αs
αw
αe
xω,t
i
rω,t
q ω,t
SOC ω,t
rcω,t
rdω,t
Qω,t
pω,t
eω,t
s
eω,t
w
η̂sω,t
ω,t
η̂w
Number of electricity users
Number of hours in the operational horizon
Number of days in the investment horizon
Investment cost of solar power
Investment cost of wind power
Investment cost of energy storage
Investment budget
Coefficient of the operator’s cost
Coefficient of user i’s discomfort cost
Aggregate inelastic load in time slot t
Total elastic load of user i
Minimum power load of user i in time slot t
Maximum power load of user i in time slot t
Preferred power load of user i in time slot t
Maximum renewable power in t and ω
Solar power supply per unit capacity in t and ω
Wind power supply per unit capacity in t and ω
Maximum charging amount per unit capacity
Maximum discharging amount per unit capacity
Conversion efficiency of charging
Conversion efficiency of discharging
Minimum state-of-charge
Maximum state-of-charge
Maximum depth-of-discharge
Minimum solar power prediction error in t and ω
Maximum solar power prediction error in t and ω
Minimum wind power prediction error in t and ω
Maximum wind power prediction error in t and ω
Generation capacity of solar power
Generation capacity of wind power
Capacity of energy storage
User i’s elastic load in t and ω
Renewable power supply in t and ω
Grid power procurement in t and ω
State-of-charge of battery in t and ω
Charging amount in t and ω
Discharging amount in t and ω
Aggregate power supply in t and ω
Day-ahead price in t and ω
Solar power prediction error in t and ω
Wind power prediction error in t and ω
Actual solar power generation in t and ω
Actual wind power generation in t and ω
I. I NTRODUCTION
Aiming at reducing greenhouse gas emissions and enhancing the power grid reliability, many countries are building
2
new power infrastructures known as the smart grid [2]. The
major features of the smart grid include more distributed power
generations (especially from renewable energy sources), smart
charging/discharging of energy storage, two-way communications between the utility company and consumers for a better
demand side management, and decentralized operations of
power grid in the form of microgrids [2]. It’s essential to
understand the impact of these new features, and how to make
optimal economic and technology decisions on the planning
and operation of the smart grid.
Recently, there are many studies on power grid planning
(e.g. [3], [4]), integration of renewable energy and energy
storage (e.g. [5]–[8]), and demand response (e.g. [10]–[12]).
However, the existing literature did not consider these important issues in a holistic fashion. For example, in [3]–[8],
microgrid planning is studied without considering flexible load
and microgrid operation. While in [9]–[12], only microgrid
operation is studied under given microgrid facilities. However,
all those new features including renewable energy, storage, and
demand response affect the optimal planning and operation of
the microgrid, and have to be taken into account at various
different time scales. In this paper, we will jointly consider
the optimal investment and operation of renewable generation,
energy storage, and demand response optimization in the smart
grid.
In particular, this paper will focus on the mixed investment
in renewable energy (both solar energy and wind energy) and
energy storage. The optimal mix of solar and wind energy
investment will depend on the stochastic nature of these two
sources, which is highly location dependent. Hence we will
rely on the meteorological data in Hong Kong to validate
the practical relevance of our study. Energy storage provides
flexibility in terms of coordinating supply and demand in the
microgrid. Through smart charging and discharging of the
energy storage, the microgrid operator is able to better utilize
the renewable energy generation and reduce dependency on
the main grid. The key question we want to answer is the
following: What is the optimal investment portfolio?
In this paper, we develop a theoretical framework that
captures the economic impact of renewable energy, storage,
and demand response in the smart grid, and derive the optimal
investment strategy and optimal demand response scheme
based on realistic data. The main contributions of this paper
are as follows.
• Correlation and scenarios of renewable energy: Based
on the meteorological data acquired from the Hong
Kong Observatory, we study the correlation between solar
power and wind power at certain locations of Hong Kong,
and suggest mixed renewable energy investment.
• Framework development: We develop a theoretical framework that enables us to derive the optimal investment of
mixed enewable generation and energy storage, and the
optimal operation in a demand-responsive microgrid. The
problem is challenging due to the coupling of decisions
of investment and operation at different time scales.
• Modeling and solution methods: We formulate the
joint investment and operation problem as a two-period
stochastic program. We design a distributed algorithm
to attain the optimal power scheduling in period-2, and
derive a single-level optimization formulation to solve the
optimal investment portfolio in period-1.
• Impact of uncertainty in renewable energy: We analyze
the impact of the prediction error of renewable energy
generation by the worst-case scenario analysis.
• Case studies in Hong Kong: Numerical studies based on
realistic meteorological data illustrate the optimal portfolio investment decisions, and demonstrate the benefits
of mixed renewable investment and demand response in
terms of saving investment.
The remainder of this paper is organized as follows. We
review the related work in Section II. Then we analyze the
renewable power generation of Hong Kong in Section III,
and formulate the system model as a two-period stochastic
optimization problem in Section IV. We present the detailed
models for period-1 and period-2 in Section V and VI,
respectively. We propose the solution method in Section VII.
In Section VIII, we analyze the impact of the prediction
error of renewable energy generations on the energy portfolio
investment. Numerical results are presented in Section IX. This
paper is concluded in Section X.
II. R ELATED WORK
There are several related recent studies on power grid
planning, integration of renewable energy, and demand response. Specifically, studies in [3] and [4] examined investment strategies on renewable energy generation through
empirical (or numerical) approaches, without considering the
power scheduling operation. Studies in [5] and [6] formulated cost minimization problems to determine the optimal
investment of solar-storage system and wind-storage system,
respectively. Wang et al. in [7] considered the optimal planning
problem for mixed solar-wind energy in microgrids using
robust optimization. Yang and Nehorai in [8] formulated a
cost optimization problem to decide the optimal capacities for
renewable energy generation and energy storage, and solved
the problem in a distributed fashion. However, none of these
studies took the proactive operation (such as demand response)
into consideration. Optimal demand response for residential
consumers and energy storage have been studied to derive the
proper incentive schemes through either game theoretic models
[9], [10] or optimization models [11], [12]. The key idea of
these studies is to design incentive mechanisms such that costaware users schedule their elastic demands as responses to
price changes.
The existing literature focused on either renewable energy
and energy storage investment at a large time scale (years),
or power scheduling and demand response optimization under
given energy capacity at a small time scale (hours and days).
However, the decisions at these two different time scales are
actually tightly coupled. The portfolio investment determines
the time-varying power supply availability and power scheduling flexibility, and thus affects operator’s power dispatch and
users’ demand response at a smaller time scale. Meanwhile,
demand response can try to match the demand with the time
varying renewable energy supply, and hence can maximize
3
TMT
New Territories
TPK
SKG
SHA
SKG
Kowloon TC
KP
Lantau Island
Hong Kong
Island
WGL
Meteorological station measuring solar radiation and wind speed
Meteorological station measuring wind speed
Fig. 1: Locations of meteorological stations
the benefit of renewable energy and even reduce unnecessary
investment expenditure at a large time scale. Therefore, the
investment and operation at various time scales should be
jointly optimized.
Recently, joint optimization of investment and operation has
been considered in [13]–[15] to study the wind power investment and network expansion at a transmission-level. Different
from [13]–[15], our work aims to study the energy portfolio
investment in microgrids at a distribution-level. Specifically,
we consider a holistic configuration of the microgrid to incorporate the latest technologies of smart grid, which includes
not only renewable energy but also energy storage and demand
response. Moreover, we construct an investment portfolio that
consists of different technologies (e.g., solar power, wind
power, and storage), and provide a systematic framework to
jointly determine the optimal portfolio investment strategy and
optimal pricing scheme for demand response.
III. S OLAR POWER AND WIND POWER IN H ONG KONG
Aiming at studying the renewable power patterns in Hong
Kong, we acquire meteorological data from the Hong Kong
Observatory. The data include the hourly solar radiation in
King’s Park (KP) of Hong Kong, and hourly wind speed at
seven different locations (KP, TMT, TPK, SHA, SKG, TC,
WGL) of Hong Kong, as shown in Fig. 1. Based on the data,
we analyze the correlations of solar power and wind power
generations across different locations of Hong Kong, which
motivate us to study the mixed renewable energy investment
in microgrids.
A. Correlation between solar power and wind power
Both solar power and wind power are intermittent power
sources, and their stochastic features could be highly
locational-dependent. Since Hong Kong is relatively small,
we assume that the solar radiation is the same across Hong
Kong and is represented by the data measured in KP. The
wind power, however, has clearly different patterns at different
locations.
In this paper, we will focus on one year of meteorological
data (from Sep. 1 2012 to Aug. 31 2013) to study the solar
power and wind power productions. Based on the solar power
model [16] and wind power model [17], we calculate the
hourly solar and wind power productions in 365 days based on
the measurement of data of solar radiation and wind speed.1
To study the statistical correlation between the hourly solar
and wind power productions over one year, we calculate the
sample correlation coefficient [18] as
P
Y (k) − Ȳ
k X(k) − X̄
ρX,Y = qP
2 qP
2 ,
X(k)
−
X̄
Y
(k)
−
Ȳ
k
k
where X and Y are data series with k = 1, ..., K terms, X̄
and Ȳ are the mean values of X and Y , respectively, and
ρX,Y measures the correlation coefficient between X and Y .
We substitute the one-year hourly solar power production into
X, and the one-year hourly wind power production of each
location into Y , and calculate their correlations. We find that
the wind powers in four locations (KP, TPK, SHA, SKG) of
Hong Kong have positive correlations with solar power, while
the correlation is negative in two locations (TC, WGL), and
the correlation is close to zero in location TMT.
Motivated by the Markowitz portfolio selection theory in
Finance [19], we will study the mixed investment strategy of
solar power and wind power in the following two locations:
TC and SKG. Specifically, TC and SKG are two representative
examples for negative and positive correlations (with correlation coefficient −0.22 and 0.15) between solar and wind power
generations, respectively.
B. Scenario generation of solar power and wind power
To study the mixed investment of solar power and wind
power, we need to model the solar power and wind power
generations. Usually, the renewable energy investment is made
for years of operation. Therefore, we use one-year historical data to empirically model the distributions of solar and
wind power generations, similar as [13], and assume that the
future renewable generations in each year follow the same
distribution of the one-year historical data. Each daily power
production realization (solar power production in KP, wind
power productions in TC and SKG) is called a scenario,
and thus we obtain 365 scenarios for solar power and wind
power respectively. As a large number of scenarios will reduce
the computational tractability of the investment optimization
problem, it is useful to choose a smaller subset of scenarios
that can well approximate the original entire scenario set. Such
technique has been widely used in economics and engineering
research [20], [21] for the purpose of modeling stochastic
processes.
We applied the forward scenario reduction algorithm [21] to
find a best scenario subset, and assign new probabilities to the
smaller number scenarios. The key idea is to select a subset
of scenarios to preserve, such that the corresponding reduced
probability measure is the closest to the original measure. We
set the number of preserved scenarios as 10,2 and generate
1 The technical parameters of the solar power model and wind power model
are shown in the online technical report [31].
2 The persevered number of scenarios depends on the tradeoff between
performance and computational complexity in practice.
1
0.5
0.8
0.8
0.4
0.6
0.4
0.2
0
1
5
10
15
20
24
Wind Power (kW)
1
Wind Power (kW)
Solar Power (kW)
4
0.6
0.4
0.2
0
1
5
Time (Hour)
10
15
20
0.3
0.2
0.1
0
1
24
5
Time (Hour)
Fig. 2: Solar power scenarios in KP
(per 1kW capacity)
Fig. 3: Wind power scenarios in TC
(per 1kW capacity)
selected scenarios for the solar power production in KP (which
we assume is the same as in TC and SKG since Hong Kong is
relatively small geographically) and wind power productions
in TC and SKG, shown in Fig. 2, 3, and 4. Therefore, we have
a set of 10 scenarios denoted as Ω for the renewable energy
generation, and each renewable generation scenario ω ∈ Ω
consists of solar power and wind power productions in TC
and SKG.3 Comparing Fig. 3 and 4 with Fig. 2, we can see
that the solar power has a peak at noontime, while wind power
productions show dramatic locational differences. Wind power
in TC is often adequate during night time, while wind power in
SKG reaches a higher output level during day time. Therefore,
solar power and wind power have high locational dependence,
which motivates us to study the optimal mixed investment of
both cases. The data we use can be found at [32].
IV. S YSTEM OVERVIEW
In this section, we present the system model for the joint
investment and operation problem. Fig. 5 illustrates a typical
microgrid, which connects to the main power grid, and consists
of different local power supplies and responsive demand.
Solar Power Wind Power
Microgrid
Energy Storage
10
15
20
24
Time (Hour)
Fig. 4: Wind power scenarios in SKG
(per 1kW capacity)
energy storage device is also implemented in the microgrid
to charge and discharge power properly to reduce the system
operating cost. The demand side consists of a set of electricity
users N = {1, ..., N }, and each user i ∈ N is equipped with a
smart meter and energy scheduling module. The operator runs
the microgrid, determines the investment in renewable energy
and energy storage capacities at a large time scale (years), as
well as energy prices at a small time scale (hours in one day).
The users determine their energy consumptions based on the
prices set by the operator (as the demand response).
From the operator’s perspective, it needs to decide the
optimal capacity investment and power scheduling. Fig. 6
depicts the investment and operation horizons. An investment
horizon usually corresponds to several years. The operation
horizon is one day, which includes T = {1, ..., T } of T
time slots (say 24 hours). To model both investment and
operation, we propose a two-period stochastic program that
jointly optimizes capacity investment and power scheduling
in the microgrid. Specifically, the period-1 problem is a longterm capacity investment problem, with the objective of minimizing the expected overall cost over an investment horizon
H = {1, ..., D} of D days, subject to a budget constraint. The
period-2 problem is a power scheduling problem, with the
objective of minimizing the operating costs of both operator
and users under a specific realization of renewable power
generation within a smaller time window.
Investment horizon
Main Power Grid
Operator
1
2
1
v
s
Smart
Meters
Demand
Response
Power
Communications
Fig. 5: System model
Within the microgrid, there is a local generation system,
consisting of solar and wind renewable power generation. An
3 For the detailed scenario generation and reduction, please refer to the
technical report [31].
D
2
Operation horizon
T
Days
Hours
Fig. 6: Investment and operation horizons
Note that the investment and operation problems are closely
coupled, as the investment decision affects the operational cost,
and the expected recurring operational cost affects the investment decision. Fig. 7 shows the connection between period1 investment problem and period-2 operational problem. In
period-2, the optimal power scheduling is affected by both
power supply and demand, and in particular the renewable
power supply depends on the capacity investment decision
made in period-1. On the other hand, the overall cost in
period-1 includes both the one-time investment cost and the
5
Renewable generation capacity
Period 1 (years):
Investment
price time slots to low price time slots. The corresponding
discomfort (or inconvenience) [22] is
X ω,t
2
Ci (xω
xi − yit ,
(3)
i ) = βi
Period 2 (daily):
Operation
t∈T
Capital Investment + Operating Cost
where βi is the coefficient of discomfort cost, which indicates
the sensitivity of user i towards its deviation from the preferred
power consumption.
Total cost minimization over investment horizon
(incorporating operational decisions)
Fig. 7: Two-periods optimization problem
B. Operator’s model
recurring operating cost of all D days in period-2. Hence the
decisions in two periods are coupled. In the following, we will
first formulate the operation problem in period-2, and then
formulate the investment problem in period-1.
V. P ERIOD -2 PROBLEM FOR MICROGRID OPERATIONS
In this section, we first present the models of users and
the operator, and then formulate the operator’s operating cost
minimization problem.
A. User’s model
We classify each user’s load into two types: the elastic load
and the inelastic load. The elastic load corresponds to the
energy usage of those appliances such as electric vehicles,
washing machines, and HVAC (heating, ventilation and air
Conditioning) systems, as a user may shift the flexible load
over time. The inelastic load corresponds to the energy usage
of appliances such as lighting, refrigerators, and such load
cannot be easily shifted over time. The demand response can
only control the elastic load. We denote the corresponding
ω,t
ω,t
decisions as xω
is user i’s
i = {xi , ∀t ∈ T }, where xi
elastic energy consumption in time slot t ∈ T under renewable
energy generation scenario ω.
The elastic load scheduling for all users needs to satisfy the
following two constraints:
t
dti ≤ xω,t
≤ di , ∀t ∈ T , i ∈ N ,
i
X ω,t
xi = Di , i ∈ N .
(1)
(2)
t∈T
Constraint (1) provides a minimum power consumption dti and
t
a maximum power consumption di for the user i in each time
slot t.4 Constraint (2) corresponds to the total elastic energy
demand Di for user i in the entire operation horizon.
We further introduce a discomfort cost Ci (·), which meaω,t
sures user i’s experience under xω
i = {xi , ∀t ∈ T }
which deviates from his preferred power consumption y i =
{yit , ∀t ∈ T } under a time-independent flat price environment.
We assume that the operator can control the demand to
minimize the operating cost. Later in Section VII, we will
discuss how such control can be realized through a properly
designed pricing mechanism. If the operator sets time-varying
prices, energy users will schedule their elastic loads to minimize users’ costs, i.e. shifting power consumption from high
4 Constraint (1) is general and can model the staring time and ending time
of an elastic load by setting proper parameters.
We assume that the operator can predict the renewable
energy production scenario ω accurately at the beginning
of an operation horizon (a day).5 In scenario ω and each
time slot t, the operator determines the renewable power
supply, conventional power procurement, and energy storage
charging and discharging to meet the total users’ demand,
which consists of the elastic power consumption xω
i from each
user i ∈ N and the aggregate inelastic load {bt , t ∈ T } of
all the users.
1) Power supply: The renewable power supply r ω =
ω,t
{r , ∀t ∈ T } and conventional power procurement q ω =
{q ω,t , ∀t ∈ T } should satisfy the following constraints:
ω,t
0 ≤ rω,t ≤ rmax
, ∀t ∈ T ,
(4)
q ω,t ≥ 0, ∀t ∈ T ,
(5)
ω,t
in constraint (4) depends on the invested capacities
where rmax
of solar power αs and wind power αw , which are the operator’s
decision variables in period-1. For each unit of invested
solar capacity and wind capacity, the corresponding solar
power and wind power in scenario ω and time t will be
ω,t
ω
ω,t
ηω
s = {ηs , ∀t ∈ T } and η w = {ηw , ∀t ∈ T }, respectively.
ω,t
ω,t
ω,t
Hence we have rmax = ηs αs +ηw αw . Constraint (5) means
that the operator can only purchase power from the main grid,
but cannot sell power to the main grid, assuming that the
main grid does not accommodate distributed generations in
the microgrid. We assume that the main grid has adequate
power to meet the demand of the microgrid, hence there is no
upper-bound of q ω,t in (5). Different from the conventional
power generation, the renewable power generation does not
consume fuel sources, so we assume zero cost of generating
renewable power [5]. Therefore, the operator will try to use
as much renewable power as possible to meet the demand.
2) Energy storage: It’s well-known that energy storage
(such as batteries) can smooth out the intermittent renewable power generation, match demand and supply by smart
charge/discharge, and exploit time-varying energy generation
costs for arbitrage. In our paper, energy storage is regarded
as an energy asset in the investment portfolio, as it can complement time-varying renewable energy generation to provide
relatively stable power supply, and can also work in parallel
with demand response programs to help balance demand and
5 The short-run (day-ahead) renewable energy forecast can be quite accurate
in practice [23], [24]. We will also consider the impact of prediction error
in Section VIII. In addition, this paper focuses on the microgrid energy
management instead of the transient dynamics and stability of the sysetem.
Therefore, we assume that the microgrid operator is able to manage the
intermittency of renewable generations, such that the stability of the microgrid
system can always be guaranteed.
6
supply. We assume that the microgrid operator has decided in
period-1 to install energy storage devices with a total capacity
αe , and let SOC ω,t , rcω,t , and rdω,t denote the state-of-charge
of the storage, charging amount, discharging amount in time
slot t and scenario ω, respectively.
First, the energy charging and discharging amounts are
bounded, and satisfy the following constraints:
0 ≤ rcω,t ≤ αe rcmax , ∀t ∈ T ,
0≤
rdω,t
≤
αe rdmax ,
∀t ∈ T ,
(6)
(7)
where rcmax > 0 and rdmax > 0 denote the maximum charging and discharging amount per unit capacity of the energy
storage, respectively. Hence, αe rcmax and αe rdmax indicate the
maximum charging and discharging amount after the operator
decides to deploy energy storage facilities with the capacity
of αe .
Second, there are power losses when electricity is charged
into and discharged from the battery. We denote ηc ∈ [0, 1]
and ηd ∈ [0, 1] as the conversion efficiencies of charging and
discharging. Therefore, we obtain the energy storage dynamics
of the microgrid i in time slot t as
rω,t
ηc rcω,t
− d ∀t ∈ T ,
αe
ηd αe
≤ SOCmax , ∀t ∈ T ,
SOC ω,t = SOC ω,t−1 +
(8)
SOCmin ≤ SOC ω,t
(9)
SOC
ω,0
= SOC
ω,T
,
(10)
where SOC ω,t evolves with charging and discharging of the
battery according to (8). It is shown in (9) that SOC ω,t is
bounded between SOCmin and SOCmax , which are lower and
upper bounds [25] for the level of energy storage in percentage, respectively. For example, we can set SOCmax as 100%,
which means the battery can be charged to reach its full capacity. We can set SOCmin = 1 − DODmax , where DODmax is
the maximum depth-of-discharge (DOD) allowed.6 Moreover,
we set the terminal state-of-charge SOC ω,T at the end of each
day to be equal to its initial value SOC ω,0 at the beginning of
each day, such that the battery can be operated independently
across days.
3) Operator’s cost: The power supply and demand should
satisfy the following power balance constraint in time slot t.
X ω,t
rω,t + q ω,t + rdω,t = rcω,t + bt +
xi , ∀t ∈ T , (11)
i∈N
ω
ω,t
We let Q = {Q
i.e.,
, t ∈ T } denote the aggregate supply,
Qω,t = rω,t + q ω,t ≥ 0, ∀t ∈ T ,
(12)
and we can rewrite the power balance constraint (11) as
follows:
X ω,t
Qω,t = bt +
xi + rcω,t − rdω,t , ∀t ∈ T .
(13)
i∈N
6 DOD is defined as the ratio of maximum discharge to the battery capacity
[26]. Usually, the lifetime of a battery can be measured by the number of
charge-discharge cycles it can sustain at a given DoDmax . High DODmax
causes fast depreciation of battery storage. Therefore, we set a low DODmax
(thus a high SOCmin ) for the battery operation to reduce the impact of battery
degradation, so as to make sure that the lifetime of battery is no shorter than
the investment horizon.
If the operator has enough renewable generation to meet
ω,t
the aggregate demand, i.e. rmax
≥ Qω,t , then there is no need
to purchase any conventional power, i.e. q ω,t = 0. On the
ω,t
other hand, if rmax
< Qω,t , the operator will first use all the
ω,t
ω,t
renewable power r = rmax
, and then purchase conventional
ω,t
ω,t
ω,t
power q
= Q − rmax to meet the power deficit. The
production cost of conventional power has a quadratic form
[27], and thus we define the operator’s cost as
Xh
+ i 2
ω,t
Co (Qω ) = βo
Qω,t − ηsω,t αs − ηw
αw
, (14)
t∈T
where (z)+ = max{z, 0} for any value z, and βo is the
coefficient of the operator’s cost.
C. The period-2 problem
Next we state the period-2 problem, where the operator
coordinates aggregate power supply Qω and schedules users’
power consumptions xω
i to minimize the operating cost, which
consists of the operator’s cost Co (Qω ) and all the users’ costs
Ci (xω
i ) as follows.
P2: Operating cost minimization in period-2
X
ω
min
C
(Q
)
+
Ci (xω
o
i )
ω
ω
Q ,xi
subject to
i∈N
Constraints (1), (2), (6)-(10), (13).
Problem P2 is convex, and can be solved efficiently if
a centralized optimization is possible. However, this may
not be feasible in practice, as the operator cannot directly
control users’ power consumptions {xω
i , ∀i ∈ N }. We will
discuss the design of a pricing scheme to derive the optimal
power consumptions of users and the implementation of a
decentralized algorithm in Section VII.
VI. P ERIOD -1 PROBLEM FOR PORTFOLIO INVESTMENT
In the period-1 investment problem, the operator needs
to determine the capacities of the solar power, wind power,
and energy storage facilities (αs , αw , and αe ) for the entire
investment horizon, subject to a budget constraint B.7 These
capacity decisions will determine the renewable power production and energy storage flexibility in each day of period-2,
and consequently affect the power scheduling and operating
cost. The operator wants to make optimal investment decisions to minimize the overall cost, including both the capital
investment and the expected operating cost in period-2.
The capital investment cost can be represented as
CI (αs , αw , αe ) = cs αs + cw αw + ce αe ,
(15)
where cs , cw and ce denote the investment costs of solar
power, wind power and energy storage per kW , respectively.
The investment cost covers all expenditures, e.g., deployment,
installation and maintenance of photovoltaic panel for solar
energy, turbine for wind energy, inverters, controllers, and
cables.
7 we assume that the microgrid operator makes direct investment for the
next long period of operation.
7
The daily expected operating cost Eω [f (·)] is a function of
the invested capacities αs , αw and αe ,
X
Eω∈Ω [f (αs , αw , αe , ω)] =
πω f (αs , αw , αe , ω), (16)
ω∈Ω
where ω ∈ Ω denotes the renewable power scenario with a
realization probability πω , which is obtained by the scenario
reduction algorithm in Section II. Specifically, the operating
cost function in scenario ω is the optimized objective value
(i.e. minimized operating cost) of the period-2 problem in
scenario ω:
X
ω
f (αs , αw , αe , ω) = min
[C
(Q
)
+
Ci (xω
(17)
o
i )],
ω
ω
Q ,xi
i∈N
where the cost depends on the renewable power supply in
scenario ω and users’ demand responses in period-2.
The period-1 optimization problem is subject to a budget
constraint and capacity constraints as follows:
(18)
min
ω
ω
Ce (xω
i ) + Ci (xi )
αs ≥ 0, αw ≥ 0, αe ≥ 0,
(19)
subject to
Constraints (1) and (2),
P1: Joint investment and operation in period-1
CI (αs , αw , αe ) + D · Eω∈Ω [f (αs , αw , αe , ω)]
min
subject to
Pui : User i’s cost minimization problem
cs αs + cw αw + ce αe ≤ B,
where (18) indicates that the total investment expense cannot
be greater than the budget B, and the capacity investment must
be non-negative.
To summarize, the period-1 problem is as follows.
αs ,αw ,αe
In particular, the operator can set day-ahead prices pω =
{pω,t , t ∈ T } for the users in scenario ω, and let users
choose the proper power scheduling accordingly to minimize
their own costs. In the following, we first present a user’s
total cost minimization problem given the prices. Then we
discuss the operator’s optimal choices of prices so that the
users’ power scheduling decisions coincide with the optimal
solution of Problem P2.
1) User’s problem: In scenario ω, user i receives the
price signals pω and schedules the power consumption xω
i
to minimize the total cost. Specifically, user i’s total cost
consists of two parts: energy cost Ce and discomfort cost
Ci . The energy cost8 of user i depends on the price and
user i’s power
which can be represented as
P consumption,
ω,t ω,t
xi . Therefore, we have the following
Ce (xω
i ) =
t∈T p
total cost minimization problem for user i in scenario ω.
Constraints (18) and (19),
where the objective function consists of capital investment cost
CI and expected operating cost D·Eω [f (·)] under all scenarios
ω ∈ Ω over a total D days of operation in the entire investment
horizon.
xi
where each user solves its optimal power consumption as a
response to the price signal set by the microgrid operator.
2) Optimal pricing and decentralized algorithm: We denote
pω∗ = {pω,t∗ , ∀t ∈ T } as the optimal pricing that induces
the socially optimal power consumption {xω∗
i , ∀i ∈ N } in
scenario ω (i.e. the optimal solution of Problem P2). We have
the following theorem.
Theorem 1. In each scenario ω, the optimal pricing scheme
pω∗ that induces the socially optimal power consumptions xω∗
i
for each user i satisfies the following relationship,
ω
)
ω,t
∂Co (Q
,
, when Qω,t∗ > rmax
∂Qω,t
ω,t∗
Qω,t =Qω,t∗
(20)
p
=
0,
when Qω,t∗ ≤ rω,t .
max
VII. S OLUTION M ETHOD
To solve the above two-period stochastic programming
problem, we start with solving the period-2 problem P2 using
a distributed algorithm. Then we solve the period-1 problem
P1 to obtain the optimal portfolio investment.
A. Period-2: Optimal power scheduling
As mentioned in Section V, it is not practical for the
operator to solve Problem P2 centrally and control users’
power consumptions directly. Instead, the operator and users
compute the price and power consumption in an iterative
fashion, as shown in Fig. 8.
Operator determines the optimal day-ahead prices
Pricing
Power consumption
Consumers decide the optimal power scheduling
Fig. 8: Iterative pricing and scheduling
Theorem 1 motivates us to design a decentralized algorithm
in Algorithm 1, where the operator sets the day-ahead prices
and users respond to the prices by determining their power
consumptions. At the beginning of each day, the operator
and each user’s smart meter compute the hourly electricity
prices and the corresponding hourly power consumptions
iteratively for the whole-day operation. In Algorithm 1, we
consider a sequence of diminishing stepsizes, γk ’s, which
satisfy the
P following conditions: limk→∞ γ(k) = 0 and
limk→∞ k γ(k) = ∞.9
We can see that the decentralized Algorithm 1 requires
minimum information exchange between the operator and
users. The users only report their power consumptions to the
operator, and the operator broadcasts the prices to all users
based on the aggregate power load. There is no need for the
users to directly coordinate with each other or to reveal their
private information (such as cost function and consumption
8 The user cannot change the energy cost related to inelastic load, hence we
do not consider that in user’s optimization problem.
9 Problem P2 is convex, and the corresponding decentralized algorithm
that is executed once a day can coverage fast in the microgrid context with
thousands of electricity users.
8
Algorithm 1 Decentralized algorithm in the microgrid
Initialization: iteration index k = 0, error tolerance > 0,
t
stepsize γ(k) > 0, predicted scenario ω, and xω,t
i (0) = yi .
2: repeat
3:
Operator: At the k-th iteration, the operator collects
each user’s consumption and computes the aggregate
supply Qω , and sets the prices pω,t (k) according to (20).
4:
Users: Each user i solves Problem Pui by updating
the power consumption xω,t
i (k + 1) based on the price
pω,t (k):
∂Ci (xi ω (k))
ω,t
ω,t
ω,t
+ p (k) .
x̂i (k + 1) = xi (k) − γ(k)
∂xω,t
i (k)
1:
5:
Project the power consumption on the feasible set by
solving the following problem:
min
xω
i (k+1)
subject to
6:
7:
8:
ω
k xω
i (k + 1) − x̂i (k + 1) k
Constraints (1) and (2).
k = k + 1;
until k pω (k) − pω (k − 1) k≤ .
end
constraints). The prices set by the operator are the same for
all users, and reflect the total power load without disclosing
individual user’s power consumption. Induced by the optimal
pricing scheme set by the microgrid operator, the optimal
power consumption of each individual user is the socially
optimal power consumption, which minimizes the social cost.
Theorem 2. Algorithm 1 is a sub-gradient projection algorithm for solving Problem P2, and (with a diminishing
stepsize) it converges to the socially optimal price and power
consumption {pω∗ , xω∗ } for each ω.
B. Period-1: Optimal energy portfolio investment
After solving the period-2 problem P2, we solve the period1 problem P1 as follows.
Theorem 3. The operator’s investment problem P1 is equivalent to the following optimization problem EP1:
min
(cs αs + cw αw + ce αe )
h
i
X
+ D · Eω Co (Qω ) +
Ci (xω
)
i
subject to
Constraints (1), (2), (6)-(10), (13), (18), (19),
i∈N
Varaibles: αs , αw , αe , Qω , xω ,
in which we assume that the operator can estimate the information about user’s power consumption behaviors through
a survey or daily operations, and the parameters in (1) and
(2) are known to the operator. Then the operator solves
the equivalent problem EP1 for the optimal investment in
a centralized manner. Note that EP1 is a convex quadratic
program and can be solved efficiently using a standard interiorpoint method [28].
For the proofs of Theorems, please refer to the online
technical report [31].
VIII. U NCERTAINTY IN R ENEWABLE G ENERATION
In the previous sections, we have assumed that the operator
can predict the solar power generation and wind power generation accurately. Nevertheless, the actual renewable energy
generation may deviate from the predicted values due to
uncertain weather conditions and different prediction methodologies. Therefore, it is necessary to study the impact of
such prediction errors on the optimal operation and investment
decisions. In this section, we use the worst-case uncertainty
approach [29] to analyze such an issue, by assuming that the
uncertain variables are assumed to be bounded in a given
uncertainty set. Our aim is to maximize the performance by
considering the worst case in the uncertainty set. Note that
the robust optimization problem is formulated in period-2
to incorporate the impact of prediction errors of renewable
power generations. The period-1 problem, on the other hand,
minimizes the overall cost of investment and operation. The
detailed formulation is presented in the following.
We define the prediction errors for solar power generation
and eω,t
and wind power generation as eω,t
w in time slot t
s
and each scenario ω. Then we can represent the actual solar
ω,t
as the
power generation η̂sω,t and wind power generation η̂w
summation of predicted generations and corresponding errors:
η̂sω,t = ηsω,t + eω,t
s ,
ω,t
ω,t
η̂w
= ηw
+ eω,t
w .
We assume that the prediction errors are bounded in the
following uncertainty sets in scenario ω:
n
o
ω,t
ω,t
Esω = eω,t
,
(21)
s,min ≤ es ≤ es,max , t ∈ T
n
o
ω,t
ω,t
Ewω = eω,t
,
(22)
w,min ≤ ew ≤ ew,max , t ∈ T
ω,t
where eω,t
s,min and es,max denote the lower bound and upper
bound of the solar power prediction error in time slot t and
ω,t
scenario ω, respectively; eω,t
w,min and ew,max denote the lower
bound and upper bound of the wind power prediction error in
time slot t and scenario ω, respectively.
ω,t
ω
ω,t
Firstly, we let eω
s = {es , t ∈ T } and ew = {ew , t ∈ T }
denote the prediction error vectors in scenario ω for the solar
power generation and wind power generation, respectively. We
define the actual operating cost of the microgrid operator in
period-2 as
Xh
+ i 2
ω
ω,t
Ĉo (Qω , eω
Qω,t − η̂sω,t αs − η̂w
αw
.
s , e w ) = βo
t∈T
(23)
Then, we aim to maximize the worst-case performance of
the microgird operation, under all possible prediction errors Esω
and Ewω , using robust optimization techniques [29]. Since the
investment cost does not explicitly contain prediction errors,
we will focus on the worst operating cost minimizing problem.
Based on (23), we formulate the operating cost minimization
problem in period-2 as a robust optimization problem denoted
as RP2:
9
A. Optimal investment
ω,∗
We substitute the worst-case prediction errors {eω,∗
s , ew }
into RP2, and denote the minimized actual operating cost as
X
ω,∗
fˆ(αs , αw , αe , ω) = min
[Ĉo (Qω , eω,∗
Ci (xω
s , ew ) +
i )].
ω
ω
Q ,xi
i∈N
(25)
Based on the minimized actual operating cost (25) in period2, we write the worst-case overall cost minimizing problem in
period-1 as
Invested Capacity
First, we study the optimal investment strategies of solar
RP2: Robust optimization for operating cost minimization
power,
wind power, and energy storage in TC and SKG under
"
#
X
different
budget constraints, as shown in Fig. 9 and Fig. 10,
ω
min
max
Ĉo (Qω , eω
Ci (xω
s , ew ) +
i )
respectively.
When the budget is tight (e.g., below 3 million
ω
ω
ω
ω
Q ,xi es ,ew
i∈N
HKD), the investment priority at location TC is wind power as
subject to
Constraints (1), (2), (6)-(10), (13), (21), (22). it’s more economical. While the budget increases, investments
To solve RP2, we first solve the inner maximization prob- in solar power and energy storage capacities also increase,
lem of RP2, which aims to maximize the actual operating but wind power still dominates the energy portfolio. This is
because the wind power output is higher than solar power
ω
cost with respect to prediction errors eω
s and ew . Observing
the objective function of RP2, we see that users’ total cost at location TC, and the demand response scheme as well as
P
energy storage can help better utilize the wind power. The
ω
i∈N Ci (xi ) is independent of prediction errors. Therefore,
we focus on the first term which is the operator’s cost. Given optimal investment expense is 4.6 million HKD at TC, and
the operator’s actual power scheduling Qω , we denote the even given more budget (e.g., greater than 5 million HKD), the
optimal capacity investment remains the same. From Fig. 10,
worst-case prediction errors as
we see that the optimal investment strategy at location SKG is
ω
ω,∗
ω
ω
different, with the main difference that more investment is put
{eω,∗
,
e
}
=
arg
max
Ĉ
(Q
,
e
,
e
).
(24)
o
s
w
s
w
ω
ω
ω
eω
s ∈Es , ew ∈Ew
into solar power generation. This is because the wind power
ω
ω
ω
Since the operator’s actual cost Ĉo (Q , es , ew ) in (23) is a output at SKG is not as adequate as that at TC and solar
ω
ω
power fits the daily demand better at SKG. As a result, wind
convex function of eω
s and ew (under a given Q ), the optimal
ω
solution must hit the boundary of the uncertainty sets Es and power generation becomes less competitive at SKG. When
Ewω . Moreover, we observe that the actual cost of the operator the budget is less than 4 million HKD, all the investment goes
ω
to solar power, and when the budget further increases, the
Ĉo (Qω , eω
s , ew ) is a non-increasing function with respect to
ω
ω
investments in wind power and energy storage increase. The
es and ew . Thus we have the following theorem:
optimal investment expense is 5.1 million HKD at SKG.
Theorem 4. The optimal solutions of (24) hit the lower
ω,∗
= {eω,t
=
bounds, i.e. eω,∗
s
s,min , ∀t ∈ T } and ew
800
ω,t
{ew,min , ∀t ∈ T }.
Solar power (kW)
400
200
0
1
RP1: Robust optimization for overall cost minimization
h
i
min
CI (αs , αw , αe ) + D · Eω∈Ω fˆ(αs , αw , αe , ω)
Wind power (kW)
Energy storage (kWh)
600
2
3
4
5
6
7
8
Investment Budget (Million HKD)
Fig. 9: Capacity investment at TC
αs ,αw ,αe
Constraints (18) and (19),
which solves the optimal capacity investment under the worstcase prediction of renewable energy scenarios. Note that RP1
shares the same structure as Problem P1, and thus can be
solved by the same methodology presented in Section VII.
IX. S IMULATION R ESULTS
We assume that the investment horizon includes D = 3650
days (10 years). We use the load curve in [30] as the preferred
power consumption, and set βo = 0.005 and βi = 0.5 for
i ∈ N . The investment costs of solar energy, wind energy
and energy storage are set as cs = 12, 480 HKD per kW,
cw = 7, 800 HKD per kW and ce = 1, 950 HKD per kWh.
We obtain renewable power scenarios as discussed in Section
II, with details described in the online technical report [31].
500
Invested Capacity
subject to
Solar power (kW)
Wind power (kW)
Energy storage (kWh)
400
300
200
100
0
1
2
3
4
5
6
7
8
Investment Budget (Million HKD)
Fig. 10: Capacity investment at SKG
10
B. Benefit of demand response
8
Solar power
Wind power
6
C. Optimal power scheduling and pricing
Next we focus on the numerical studies of the power
scheduling in period-2. First, we plot the energy supply and
power load at location TC of a typical day in Fig. 13 and
Fig. 14, respectively. Note that we treat the aggregate supply
from both solar power and wind power as renewable power in
period-2. Fig. 13 shows that the renewable energy generation
provides high energy supply, especially at night time during
hour 7PM-5AM. Renewable energy generation drops drastically during hour 9AM-5PM, because location TC is mainly
supplied by wind power and wind power produces less at day
time. During this time period, the microgrid operator needs to
compensate the loss of renewable energy generation through
discharging the energy storage and purchasing energy from
the main grid, as we can see that the energy storage level
decreases. From Fig. 14, we see that the users respond to the
day-ahead prices by optimizing the power load (demand), so
that to shift the original peak power load during hour 9AM5PM to other time slots when there is more renewable energy
available.
Energy storage
300
Total investment
4
2
0
Without incentive
With incentive
Fig. 11: Energy portfolio investment at TC
Energy scheduling (kWh)
Optimal Investment (Million HKD)
We study the benefit of adopting demand response schemes,
and depict the results in Fig. 11 and Fig. 12 for locations TC
and SKG, respectively. The investment budget in period-1 is
set as 6 million HKD. At location TC, without incentives (in
which case we keep the prices low and the same for 24 hours),
a user i will choose the power consumption according to the
preferred power consumption y i . In that case, it is optimal for
the operator to use 5.1 million HKD budget for investment
in period-1. With price incentives, the operator sets time
dependent day-ahead prices so that to steer the users’ power
consumptions to the socially optimal values. Comparing with
the case without incentives, optimal demand response under
incentives enables the operator to invest more wind power,
which has a lower investment cost than solar power. Energy
storage investment also decreases with incentives, because
the elastic demand can be shifted proactively, which reduces
the dependence on the energy storage. The total optimal
investment expenditure reduces by 9.4% to 4.6 million HKD,
which implies that the demand response may significantly
reduce the system cost and avoid over-investment.
The total optimal investment expenditure reduces by 6.1%
to 5.1 million HKD, demonstrating the benefit of demand
response.
Renewable energy supply
Main grid energy supply
Battery energy level
250
200
150
100
50
0
1
5
10
15
20
24
Fig. 13: Energy supply and storage at TC
8
Solar power
Wind power
Energy storage
Total investment
6
4
2
0
300
Power load (kW)
Optimal Investment (Million HKD)
Time (Hour)
250
200
150
100
50
Without incentive
With incentive
Fig. 12: Energy portfolio investment at SKG
At location SKG, Fig. 12 shows that it is optimal to use
5.4 million HKD budget for investment in period-1 without
incentives. However, with price incentives, optimal demand
response under incentives enables the operator to invest more
solar power but less energy storage, because the solar power
fits the demand better compared with the wind power at SKG.
0
1
Original power load
Optimized power load
5
10
15
20
24
Time (Hour)
Fig. 14: Power load at TC
We also study the energy supply and power load of a
typical day at location SKG, shown in Fig. 15 and Fig.
16, respectively. Fig. 15 shows that the renewable energy
generation provides high supply during day-time, especially
11
Pricing in SKG
1.5
1
0.5
5
10
15
Time (Hour)
20
24
Fig. 17: Day-ahead prices at TC and SKG
200
150
D. Impact of prediction errors
100
We take location TC as an example to study the impact of
prediction errors on the optimal investment, as shown in Fig.
18. When there is zero prediction error of renewable generations, the optimal investment is 4.6 million HKD. With the
increase of prediction errors, the optimal investment expense
increases, as the operator over-invests to hedge the risk of
renewable generation shortage caused by prediction errors. For
example, when the error is 10%, the operator invests 4.1% over
the 4.6 million HKD benchmark. This shows the importance
of accurate predication for achieving an optimal investment
decisions.
50
0
1
5
10
15
20
24
Time (Hour)
Fig. 15: Energy supply and storage at SKG
300
Power load (kW)
Pricing in TC
0
1
Renewable energy supply
Main grid energy supply
Battery energy level
250
2
250
200
150
100
Original power load
Optimized power load
50
0
1
5
10
15
20
24
Time (Hour)
Fig. 16: Power load at SKG
Fig. 17 shows the internal day-ahead prices at TC and
SKG. The prices indicate the marginal operating cost of the
microgrid. We see that the microgrid operator does not charge
the users when the demand can be satisfied by local renewable
energy generation (e.g., hour 1AM-3AM at TC). At location
TC, the operator charges high prices during day time, but
low prices at night time. The reason is that the renewable
portfolio consists of more wind power at TC, which has higher
power output at night than that during day time. The operator
needs to import more main grid power during hour 9AM6PM, which incurs operating cost. At location SKG, the price
trend is opposite to the price at TC. Because more solar power
is invested at SKG, which produces more renewable power
during day time. However, during night time, when there is
no solar power supply, the operator relies on main grid power,
and thus charges relatively high prices at night. The day-ahead
prices set by the operator provide efficiently incentivize users
to shift their flexible loads. In Fig. 14 and Fig. 16, we see that
users’ flexible loads deviate from the original patterns and are
Optimal Investment (Million HKD)
Energy scheduling (kWh)
300
shifted from high-price time slots to other low-price time slots
at both TC and SKG.
Day−ahead price (HKD/kWh)
during hour 10AM-4PM. During other time slots, the microgrid operator needs to make sure all the demand can be
satisfied, and thus purchases energy from the main grid. The
microgrid operator also charges energy storage during high
renewable supply periods (11AM-1PM), and discharges the
energy storage afterwards as we can see that the energy storage
level decreases after hour 7PM. Since location SKG has a large
portion of solar power, and there is a power supply peak during
day-time, we see from Fig. 16 that the original load during
evening-time after hour 6PM is shifted to day-time when there
is more renewable energy available.
6
11.1%
5.9% 7.5%
2.1% 4.1%
5
4
3
2
1
0
0
5
10 15 20
Prediction error (%)
25
Fig. 18: Impact of prediction errors
E. Comparison with existing studies
We add new simulations to compare our proposed method
with existing studies in the simulation. Specifically, we consider four benchmark methods, which are motivated by [5],
[6], [7] and [8], respectively. We first compute the optimal
capacity investment for all the benchmark methods, and then
calculate the corresponding investment cost and the actual
operational cost using one-year renewable energy data. The
simulation results (including the optimal capacity investment,
investment cost, operational cost, and overall cost) are summarized in Table I.
Benchmark 1 method focuses on the solar-storage investment, and benchmark 2 method focuses on the wind-storage
12
TABLE I: Performance comparison
Methods
Benchmark 1
Benchmark 2
Benchmark 3
Benchmark 4
Our method
[5]
[6]
[7]
[8]
Demand
response
N
N
N
N
Y
Solar power
(kW)
304.4
N
77.8
71.8
42.4
Wind power
(kW)
N
536.9
494.6
481.4
503.5
Energy storage
(kWh)
473.1
298.4
N
233.1
86.5
investment. We see that benchmark 2 achieves a much lower
overall cost than benchmark 1 (7.6 vs. 18.9 Million HKD),
because wind power is more abundant than solar power,
and the investment cost of wind power per unit capacity is
also lower than that of the solar power. Benchmark 3 and
benchmark 4 show the mixed renewable energy investment
with and without energy storage, respectively. We see that
benchmark 4 achieves a lower overall cost than benchmark
3 (7.6 vs. 8.4 Million HKD), because the energy storage
can help deal with the stochastic nature of renewable energy
by proper charging and discharging. Our proposed method
considers a comprehensive configuration of microgrids (solar
power, wind power, and energy storage), and also optimizes
demand response. Hence our proposed method has the minimum investment cost and operational cost, and achieves the
minimum overall cost compared with all other benchmark
methods. The simulation results in Table I demonstrate the
advantage of our proposed method over the existing literature.
X. C ONCLUSION
We proposed a theoretical framework to study the joint
investment and operation problem in the microgrid. The
two-period stochastic program models the renewable energy
uncertainty, and captures the coupled nature of investment
and operation. With realistic meteorological data, our model
provides the optimal investment decisions on renewable energy
and energy storage capacities, and the optimal demand response scheme (pricing and power scheduling) in a microgrid.
The simulation studies demonstrate the economic benefit of
demand response and the impact of prediction accuracy.
R EFERENCES
[1] H. Wang and J. Huang, “Hybrid renewable energy investment in microgrid,” in Proc. of IEEE SmartGridComm, Venice, Italy, 2014.
[2] X. Fang, S. Misra, G. Xue, and D. Yang, “Smart grid-the new and
improved power grid: a survey,” IEEE Communications Surveys and
Tutorials, 14: 944-980, 2012.
[3] H. Xu, U. Topcu, S.H. Low, C.R. Clarke, and K.M. Chandy, “Loadshedding probabilities with hybrid renewable power generation and energy storage,” in Proc. of Allerton Conference, 2010.
[4] Q. Fu et al., “Microgrid generation capacity design with renewables and
energy storage addressing power quality and surety,” IEEE Trans. on
Smart Grid, 3(4): 2019-2027, 2012.
[5] Y. Ru, J. Kleissl, and S. Martinez, “Storage size determination for gridconnected photovoltaic systems,” IEEE Trans. on Sustainable Energy,
4(1): 68-81, 2013.
[6] M. Dicorato, G. Forte, M. Pisani, and M. Trovato, “Planning and
operating combined wind-storage system in electricity market,” IEEE
Trans. on Sustainable Energy, 3(2): 209-217, 2012.
[7] Z. Wang, B. Chen, J. Wang, J. Kim, and M.M. Begovic, “Robust
optimization based optimal DG placement in microgrids,” IEEE Trans.
on Smart Grid, 5(5): 2173-2182, 2014.
[8] P. Yang and A. Nehorai, “Joint optimization of hybrid energy storage and
generation capacity with renewable energy,” IEEE Trans. on Smart Grid,
5(4): 1566-1574, 2014.
Investment cost
(Million HKD)
4.7
4.8
4.8
5.1
4.6
Operational cost
(Million HKD)
14.2
2.8
3.6
2.5
2.0
Overall
cost
(Million HKD)
18.9
7.6
8.4
7.6
6.6
[9] Y. Wang, W. Saad, Z. Han, H.V. Poor and T. Başar, “A game-theoretic
approach to energy trading in the smart grid,” IEEE Trans. on Smart Grid,
5(3): 1439-1450, 2014.
[10] A.H. Mohsenian-Rad, V.W.S. Wong, J. Jatskevich, R. Schober, and A.
Leon-Garcia, “Autonomous demand-side management based on gametheoretic energy consumption scheduling for the future smart grid,” IEEE
Trans. on Smart Grid, 1(3): 320-331, 2010.
[11] N. Li, L. Chen, and S.H. Low, “Optimal demand response based on
utility maximization in power networks,” in Proc. of IEEE PES General
Meeting, 2011.
[12] L. Qian, Y. Zhang, J. Huang, and Y. Wu, “Demand response management
via real-time electricity price control in smart grids,” IEEE Journal on
Selected Areas in Communications, 31(7): 1268-1280, 2013.
[13] L. Baringo and A.J. Conejo, “Risk-constrained multi-stage wind power
investment,” IEEE Trans. on Power Systems, 28(1): 401-411, 2013.
[14] L. Baringo and A.J. Conejo, “Strategic wind power investment,” IEEE
Trans. on Power Systems, 29(3): 1250-1260, 2014.
[15] Y. Cao, M. He, Z. Wang, T. Jiang, and J. Zhang, “Multiple resource
expansion planning in smart grids with high penetration of renewable
generation,” in Proc. of IEEE SmartGridComm, 2012.
[16] F.O. Hocaoglu, O.N. Gerek, and M. Kurban, “A novel hybrid (windphotovoltaic) system sizing procedure,” Solar Energy, 83: 2019-2028,
2009.
[17] Y. Li, V.G. Agelidis, and Y. Shrivastava, “Wind-solar resource complementarity and its combined correlation with electricity load demand,” in
Proc. of IEEE ICIEA, 2009.
[18] J. Widén, “Correlations between large-scale solar and wind power in a
future scenario for Sweden,” IEEE Trans. on Sustainable Energy, 2(2):
177-184, 2011.
[19] D.G. Luenberger, “Investment science (2nd edition),” Oxford University
Press, 2013.
[20] A. Möller, W. Römisch, and K. Weber, “A new approach to O & D
revenue management based on scenario trees,” Journal of Revenue and
Pricing Management, 3(3): 265-276, 2004.
[21] N. Gröwe-Kuska, H. Heitsch, and W. Römisch, “Scenario reduction and
scenario tree construction for power management problems,” in Proc.
IEEE Bologna Power Tech Conference, 2003.
[22] L. Jiang and S.H. Low, “Multi-period Optimal Energy Procurement and
Demand Response in Smart Grid with Uncertain Supply,” in Proc. of
IEEE CDC, 2011.
[23] R.H. Inman, H.T.C. Pedro, and C.F.M. Coimbra, “Solar forecasting
methods for renewable energy integration,” Progress in Energy and
Combustion Science, 39(6): 535-576, 2013.
[24] A.M. Foley, P.G. Leahy, A. Marvuglia, and E.J. McKeogh, “Current
methods and advances in forecasting of wind power generation,” Renewable Energy, 37(1): 1-8, 2012.
[25] A. Mishra et al., “Integrating energy storage in electricity distribution
networks,” in Proc. of ACM e-Energy, 2015.
[26] X. Ke, N. Lu, and C. Jin, “Control and size energy storage systems
for managing energy imbalance of variable generation resources,” IEEE
Trans. on Sustainable Energy, 6(1): 70-78, 2015.
[27] D. Kirschen and G. Strbac, “Fundamentals of power system economics,”
Wiley, 2004.
[28] S. Boyd and L. Vandenberghe, “Convex Optimization,” Cambridge Univ.
Press, 2004.
[29] A. Ben-tal and A. Nemirovski, “Selected topics in robust convex
optimization,” Mathematical Programming, 112(1): 125-158, 2008.
[30] G. Carpinelli et al., “Optimal integration of distributed energy storage
devices in smart grids,” IEEE Trans. on Smart Grid, 4(2): 985-995, 2013.
[31] H. Wang and J. Huang, Technical Report.[Online]
http://jianwei.ie.cuhk.edu.hk/publication/MicrogridInvestment.pdf
[32] Summary of Wind and Solar Meteorological Data in Hong Kong, http:
//jianwei.ie.cuhk.edu.hk/energy.html
| 3cs.SY
|
Are You Talking to Me? Reasoned Visual Dialog Generation
through Adversarial Learning
Qi Wu1 , Peng Wang2 , Chunhua Shen1 , Ian Reid1 , and Anton van den Hengel1
arXiv:1711.07613v1 [cs.CV] 21 Nov 2017
1
Australian Centre for Robotic Vision, The University of Adelaide, Australia
2
Northwestern Polytechnical University, China
Abstract
The Visual Dialogue task requires an agent to engage
in a conversation about an image with a human. It represents an extension of the Visual Question Answering task
in that the agent needs to answer a question about an image, but it needs to do so in light of the previous dialogue
that has taken place. The key challenge in Visual Dialogue is thus maintaining a consistent, and natural dialogue
while continuing to answer questions correctly. We present
a novel approach that combines Reinforcement Learning
and Generative Adversarial Networks (GANs) to generate
more human-like responses to questions. The GAN helps
overcome the relative paucity of training data, and the
tendency of the typical MLE-based approach to generate
overly terse answers. Critically, the GAN is tightly integrated into the attention mechanism that generates humaninterpretable reasons for each answer. This means that the
discriminative model of the GAN has the task of assessing
whether a candidate answer is generated by a human or
not, given the provided reason. This is significant because
it drives the generative model to produce high quality answers that are well supported by the associated reasoning.
The method also generates the state-of-the-art results on the
primary benchmark.
Question
Human-like Responses
Machine-like
Are there any large No tall buildings but large one or Yes there are.
building nearby?
two story buildings, and one clock
is in front of looks like church of.
With the clock does Yes, I think so because it’s made by I don’t know.
it look expensive? stained glass.
Do you see any
signs for church?
Yes, there is a sign with light on, Yes there are.
but not clear enough.
Figure 1: Human-like vs. Machine-like responses in a visual dialog. The
human-like responses clearly answer the questions more comprehensively,
and help to maintain a meaningful dialogue.
a dialogue about an image. This is significant because it demands that the agent is able to answer a series of questions,
each of which may be predicated on the previous questions
and answers in the dialogue. Visual Dialogue thus reflects
one of the key challenges in AI and Robotics, which is to
enable an agent capable of acting upon the world, that we
might collaborate with through dialogue.
Due to the similarity between the VQA and Visual Dialog tasks, VQA methods [19, 40] have been directly applied to solve the Visual Dialog problem. The fact that the
Visual Dialog challenge requires an ongoing conversation,
however, demands more than just taking into consideration
the state of the conversation thus far. Ideally, the agent
should be an engaged participant in the conversation, cooperating towards a larger goal, rather than generating single
1. Introduction
The combined interpretation of vision and language has
enabled the development of a range of applications that
have made interesting steps towards Artificial Intelligence,
including Image Captioning [11, 34, 37], Visual Question
Answering (VQA) [1, 22, 38], and Referring Expressions
[10, 12, 41]. VQA, for example, requires an agent to answer a previously unseen question about a previously unseen image, and is recognised as being an AI-Complete
problem [1]. Visual Dialogue [5] represents an extension to
the VQA problem whereby an agent is required to engage in
1
word answers, even if they are easier to optimise. Figure 1
provides an example of the distinction between the type of
responses a VQA agent might generate and the more involved responses that a human is likely to generate if they
are engaged in the conversation. These more human-like
responses are not only longer, they provide reasoning information that might be of use even though it is not specifically
asked for.
Previous Visual Dialog systems [5] follow a neural translation mechanism that is often used in VQA, by predicting
the response given the image and the dialog history using
the maximum likelihood estimation (MLE) objective function. However, because this over-simplified training objective only focus on measuring the word-level correctness, the
produced responses tend to be generic and repetitive. For
example, a simple response of ‘yes’,‘no’, or ‘I don’t know’
can safely answer a large number of questions and lead to
a high MLE objective value. Generating more comprehensive answers, and a deeper engagement of the agent in the
dialogue, requires a more engaged training process.
A good dialogue generation model should generate responses indistinguishable from those a human might produce. In this paper, we introduce an adversarial learning
strategy, motivated by the previous success of adversarial
learning in many computer vision [3, 21] and sequence generation [4, 42] problems. We particularly frame the task as
a reinforcement learning problem that we jointly train two
sub-modules: a sequence generative model to produce response sentences on the basis of the image content and the
dialog history, and a discriminator that leverages previous
generator’s memories to distinguish between the humangenerated dialogues and the machine-generated ones. The
generator tends to generate responses that can fool the discriminator into believing that they are human generated,
while the output of the discriminative model is used as a
reward to the generative model, encouraging it to generate
more human-like dialogue.
Although our proposed framework is inspired by generative adversarial networks (GANs) [9], there are several
technical contributions that lead to the final success on the
visual dialog generation task. First, we propose a sequential co-attention generative model that aims to ensure that
attention can be passed effectively across the image, question and dialog history. The co-attended multi-modal features are combined together to generate a response. Secondly, and significantly, within the structure we propose the
discriminator has access to the attention weights the generator used in generating its response. Note that the attention
weights can be seen as a form of ‘reason’ for the generated
response. For example, it indicates which region should be
focused on and what dialog pairs are informative when generating the response. This structure is important as it allows
the discriminator to assess the quality of the response, given
the reason. It also allows the discriminator to assess the response in the context of the dialogue thus far. Finally, as
with most sequence generation problems, the quality of the
response can only be assessed over the whole sequence. We
follow [42] to apply Monte Carlo (MC) search to calculate
the intermediate rewards.
We evaluate our method on the VisDial dataset [5] and
show that it outperforms the baseline methods by a large
margin. We also outperform several state-of-the-art methods. Specifically, our adversarial learned generative model
outperforms our strong baseline MLE model by 1.87% on
recall@5, improving over previous best reported results by
2.14% on recall@5, and 2.50% recall@10. Qualitative evaluation shows that our generative model generates more informative responses and a human study shows that 49% of
our responses pass the Turing Test. We additionally implement a model under the discriminative setting (a candidate
response list is given) and achieve the state-of-the-art performance.
2. Related work
Visual dialog is the latest in a succession of vision-andlanguage problems that began with image captioning [11,
34, 37], and includes visual question answering [1, 22, 38].
However, in contrast to these classical vision-and-language
tasks that only involve at most a single natural language
interaction, visual dialog requires the machine to hold a
meaningful dialogue in natural language about visual content. Mostafazadeh et al. [20] propose an Image Grounded
Conversation (IGC) dataset and task that requires a model
to generate natural-sounding conversations (both questions
and responses) about a shared image. De Vries et al. [7]
propose a GuessWhat game style dataset, where one person asks questions about an image to guess which object
has been selected, and the second person answers questions
in yes/no/NA. Das et al. [5] propose the largest visual dialog dataset, VisDial, by pairing two subjects on Amazon
Mechanical Turk to chat about an image. They further formulate the task as a ‘multi-round’ VQA task and evaluate
individual responses at each round in a retrieval or multiplechoice setup. Recently, Das et al. [6] propose to use RL to
learn the policies of a ‘Questioner-Bot’ and an ‘AnswererBot’, based on the goal of selecting the right images that the
two agents are talking, from the VisDial dataset.
Concurrent with our work, Lu et al. [18] propose a
similar generative-discriminative model for Visual Dialog.
However, there are two differences. First, their discriminative model requires to receive a list of candidate responses
and learns to sort this list from the training dataset, which
means the model only can be trained when such information is available. Second, their discriminator only considers the generated response and the provided list of candidate responses. Instead, we measure whether the generated
Weighted
Sum
CNN
Discriminator
+
𝑣
What color are
the jeans?
V: 7 × 7 × 512
Image I
Question Q
What color are the jeans?
Question Q
Weighted
Sum
LSTM
+
𝑞
𝑄: 𝐿 × 512
A woman riding on the back of a white horse.
Does horse have saddle? Yes it does.
How old it woman? I would say maybe 30s or 40s.
MC
search
Is she wearing jeans? Yes she’s wearing jeans.
LSTM
T rounds of History H
((Caption),(𝑸𝟏 , 𝑨𝟏 ),…, (𝑸𝒕−𝟏 , 𝑨𝒕−𝟏 ))
LSTM
Human
or
Machine
Reward
+
𝑢
LSTM
LSTM
F
C
Weighted
Sum
LSTM
Is she wearing boots? Yes she is.
𝑢𝑄𝐴
Answer A
LSTM
What color is saddle? Black and brown.
What color is horses mane and tail? Both are
bright white color.
Decoder
They are black.
Co-attention
Encoder
LSTM
LSTM
𝐹
softmax
U: 𝑇 × 512
Sequential Co-attention Generator
Figure 2: The adversarial learning framework of our proposed model. Our model is composed of two components, the first being a sequential co-attention
generator that accepts as input image, question and dialog history tuples, and uses the co-attention encoder to jointly reason over them. The second
component is a discriminator tasked with labelling whether each answer has been generated by a human or the generative model by considering the attention
weights. The output from the discriminator is used as a reward to push the generator to generate responses that are indistinguishable from those a human
might generate.
response is valid given the attention weights which reflect
both the reasoning of the model, and the history of the dialogue thus far. As we show in our experiments in Sec. 4,
this procedure results in our generator producing more suitable responses.
Dialog generation in NLP Text-only dialog generation
[15, 16, 23, 30, 39] has been studied for many years in
the Natural Language Processing (NLP) literature, and has
leaded to many applications. Recently, the popular ‘Xiaoice’ produced by Microsoft and the ‘Its Alive’ chatbot
created by Facebook have attracted significant public attention. In NLP, dialog generation is typically viewed as
a sequence-to-sequence (Seq2Seq) problem, or formulated
as a statistical machine translation problem [23, 30]. Inspired by the success of the Seq2Seq model [32] in the machine translation, [26, 33] build end-to-end dialog generation models using an encoder-decoder model. Reinforcement learning (RL) has also been applied to train a dialog
system. Li et al. [15] simulate two virtual agents and handcraft three rewards (informativity, coherence and ease of answering) to train the response generation model. Recently,
some works make an effort to integrate the Seq2Seq model
and RL. For example, [2, 31] introduce real users by combining RL with neural generation.
Li et al. in [16] were the first to introduce GANs for
dialogue generation as an alternative to human evaluation.
They jointly train a generative (Seq2Seq) model to produce
response sequences and a discriminator to distinguish between human, and machine-generated responses. Although
we also introduce an adversarial learning framework to the
visual dialog generation in this work, one of the significant differences is that we need to consider the visual content in both generative and discriminative components of
the system, where the previous work [16] only requires textual information. We thus designed a sequential co-attention
mechanism for the generator and an attention memory access mechanism for the discriminator so that we can jointly
reason over the visual and textual information. Critically,
the GAN we proposed here is tightly integrated into the attention mechanism that generates human-interpretable reasons for each answer. It means that the discriminative model
of the GAN has the task of assessing whether a candidate
answer is generated by a human or not, given the provided
reason. This is significant because it drives the generative
model to produce high quality answers that are well supported by the associated reasoning. More details about our
generator and discriminator can be found in Sections 3.1
and 3.2 respectively.
Adversarial learning Generative adversarial networks
[9] have enjoyed great successes in a wide range of applications in Computer Vision, [3, 21, 24], especially in
image generation tasks [8, 43]. The learning process is
formulated as an adversarial game in which the generative
model is trained to generate outputs to fool the discriminator, while the discriminator is trained not to be fooled.
These two models can be jointly trained end-to-end. Some
recent works have applied the adversarial learning to sequence generation, for example, Yu et al. [42] backpropagate the error from the discriminator to the sequence generator by using policy gradient reinforcement learning. This
3. Adversarial Learning for Visual Dialog Generation
In this section, we describe our adversarial learning approach to generating natural dialog responses based on
an image. There are several ways of defining the visual based dialog generation task [7, 20]. We follow the
one in [5], in which an image I, a ‘ground truth’ dialog history (including an image description C) H =
(C, (Q1 , A1 ),...,(Qt−1 , At−1 )) (we define each QuestionAnswer (QA) pair as an utterance Ut , and U0 = C), and the
question Q are given. The visual dialog generation model
is required to return a response sentence  = [a1 ,a2 ,...,aK ]
to the question, where K is the length (number of words)
of the response answer. As in VQA, two types of models may be used to produce the response — generative and
discriminative. In a generative decoder, a word sequence
generator (for example, an RNN) is trained to fit the ground
truth answer word sequences. For a discriminative decoder,
an additional candidate response vocabulary is provided and
the problem is re-formulated as a multi-class classification
problem. The biggest limitation of the discriminative style
decoder is that it only can produce a response if and only if
it exists in the fixed vocabulary. Our approach is based on
a generative model because a fixed vocabulary undermines
the general applicability of the model, but also because it
offers a better prospect of being extensible to the problem
of generating more meaningful dialogue in future.
In terms of reinforcement learning, our response sentence generation process can be viewed as a sequence of
prediction actions that are taken according to a policy defined by a sequential co-attention generative model. This
model is critical as it allows attention (and thus reasoning)
to pass across image, question, and dialogue history equally.
A discriminator is trained to label whether a response is human generated or machine generated, conditioned on the
image, question and dialog attention memories. Considering here that as we take the dialog and the image as a whole
into account, we are actually measuring whether the generated response can be fitted into the visual dialog. The
output from this discriminative model is used as a reward to
the previous generator, pushing it to generate responses that
𝑞1 𝑞2
𝑄
LSTM
𝑄
𝑞𝐿
𝒒
…
෩ 𝒖
)
𝑪𝒐𝑨𝒕𝒕𝒆𝒏𝟑 (𝑸, 𝒗′,
𝑣1 𝑣2
𝐻
𝐼
CNN
𝑈0
LSTM
…
model shows outstanding performance on several sequence
generation problems, such as speech generation and poem
generation. The work is further extended to more tasks such
as image captioning [4, 28] and dialog generation [16]. Our
work is also inspired by the success of adversarial learning,
but we carefully extend it according to our application, i.e.
the Visual Dialog. Specifically, we redesign the generator
and discriminator in order to accept multi-modal information (visual content and dialog history). We also apply an
intermediate reward for each generation step in the generator, more details can be found in Sec. 3.3.
𝑈𝑡−1 LSTM
𝑉
𝑣𝑁
…
𝑢1 𝑢2
𝑈
෩
𝑣′
𝑢𝑇
…
𝑪𝒐𝑨𝒕𝒕𝒆𝒏𝟏 (𝑽, 𝑸, 𝟎)
෩ 𝒖
, 𝒒
)
𝑪𝒐𝑨𝒕𝒕𝒆𝒏𝟒 (𝒗′,
𝒗
෩ 𝑸)
𝑪𝒐𝑨𝒕𝒕𝒆𝒏𝟐 (𝑼, 𝒗′,
𝒖
Figure 3: The sequential co-attention encoder. Each input feature is coattend by the other two features in a sequential fashion, using the Eq.1-3.
The number on each function indicates the sequential order, and the final
attended features ũ,ṽ and q̃ form the output of the encoder.
are more fitting with the dialog history. In order to consider
the reward at the local (i.e. word and phase) level, we use
a Monte Carlo (MC) search strategy and the REINFORCE
algorithm [36] is used to update the policy gradient. An
overview of our model can be found in the Fig. 2. In the
following sections, we will introduce each component of
our model separately.
3.1. A sequential co-attention generative model
We employ the encoder-decoder style generative model
which has been widely used in the sequence generation
problems. In contrast to text-only dialog generation problem that only needs to consider the dialog history, however,
visual dialog generation additionally requires the model to
understand visual information. And distinct from VQA that
only has one round of questioning, visual dialog has multiple rounds of dialog history that need to be accessed and
understood. It suggests that an encoder that can combine
multiple information sources is required. A naive way of
doing this is to represent the inputs - image, history and
question separately and then concatenate them to learn a
joint representation. We contend, however, that it is more
powerful to let the model selectively focus on regions of the
image and segments of the dialog history according to the
question.
Based on this, we propose a sequential co-attention
mechanism [35]. Specifically, we first use a pre-trained
CNN [29] to extract the spatial image features V =
[v1 , . . . , vN ] from the convolutional layer, where N is the
number of image regions. The question features is Q =
[q1 , . . . , qL ], where ql = LST M (wl , ql−1 ), which is the
hidden state of an LSTM at step l given the input word wl
of the question. L is the length of the question. Because
the history H is composed by a sequence of utterance, we
extract each utterance feature separately to make up the dialog history features, i.e., U = [u0 , . . . , uT ], where T is the
number of rounds of the utterance (QA-pairs). And each
u is the last hidden state of an LSTM, which accepts the
utterance words sequences as the input.
Given the encoded image, dialog history and question
feature V, U and Q, we use a co-attention mechanism to
generate attention weights for each feature type using the
other two as the guidance in a sequential style. Each coattention operation is denoted as x̃ = CoAtten(X, g1 , g2 ),
which can be expressed as follows:
Hi
=
αi
softmax(WT Hi ),
PM
=
i=1 αi xi ,
x̃
=
tanh(Wx xi +Wg1 g1 +Wg2 g2 ),
i = 1, . . . ,M,
(1)
(2)
(3)
where X is the input feature sequence (i.e., V , U or Q), and
g1 , g2 ∈ Rd represent guidances that are outputs of previous
attention modules. Here d is the feature dimension. Wx ,
Wg1 , Wg2 ∈ Rh×d and W ∈ Rh are learnable parameters.
Here h denotes the size of hidden layers of the attention
module. M is the input sequence length that corresponding
to the N, L and T for different feature inputs.
As shown in Fig. 3, in our proposed process, the initial
question feature is first used to attend to the image. The
weighted image features and the initial question representation are then combined to attend to utterances in the dialog
history, to produce the attended dialog history (ũ). The attended dialog history and weighted image region features
are then jointly used to guide the question attention (q̃). Finally, we run the image attention (ṽ) again, guided by the
attended question and dialog history, to complete the circle.
All three co-attended features are concatenated together and
embedded to the final feature F :
F = tanh(Weg [ṽ; ũ; q̃])
(4)
where [; ] is a concatenation operator. Finally, this vector
representation is fed to an LSTM to compute the probability of generating each token in the target using a softmax
function, which forms the response Â. The whole generation process is denoted as π(Â|V,U,Q).
3.2. A discriminative model with attention memories
Our discriminative model is a binary classifier that is
trained to distinguish whether the input dialog is generated
by humans or machines. In order to consider the visual
information and the dialog history, we allow the discriminator to access to the attention memories in the generator.
Specifically, our discriminator takes {ṽ, ũ, Q, Â} as the input, where ṽ, ũ are the attended image and dialog history
features produced in the generative model1 , given the question Q. And  is the generated response in the generator.
The Q-Â pair is further sent to an LSTM to obtain a vector
1 we also tested to use the question memory q̃, but we find the discriminator result is not as good as when using the original question input Q.
representation uQÂ . All three features are embedded together and sent to a 2-way softmax function, which returns
the probability distribution of whether the whole visual dialog is human-natural or not:
O
=
tanh(Wed [ṽ; ũ; uQÂ ])
(5)
P
=
softmax(O)
(6)
The probability of the visual dialog being recognised as
a human-generated dialog is denoted as r({ṽ, ũ, Q, Â}).
3.3. Adversarial REINFORCE with an intermediate reward
In adversarial learning, we encourage the generator to
generate responses that are close to human generated dialogs, or, in our case, we want the generated response can
fit into the visual dialog as good as possible. The policy gradient methods are used here to achieve the goal. The probability of the visual dialog being recognised as a humangenerated dialog by the discriminator (i.e., r({ṽ, ũ, Q, Â}))
is used as a reward for the generator, which is trained to
maximize the expected reward of generated response using
the REINFORCE algorithm [36]:
J(θ) = EÂ∼π(Â|V,U,Q) (r({ṽ, ũ, Q, Â})|θ)
(7)
Given the input visual information (V ), question (Q) and
dialog history utterances (U ), the generator generates an response answer  by sampling from the policy. The attended
visual (ṽ) and dialog (ũ) memories with the Q and generated answer  are concatenated together and fed to the discriminator. We further use the likelihood ratio trick [36] to
approximate the gradient of Eq. 7:
∇J(θ) ≈ ∇ log π(Â|V,U,Q) · [r({ṽ, ũ, Q, Â}) − b]
X
=∇
log p(ak |V,U,Q,a1:k−1 ) · [r({ṽ, ũ, Q, Â}) − b]
k
(8)
where p is the probability of the generated responses words,
ak is the k-th word in the response. b denotes the baseline
value. Following [16], we train a critic neural network to
estimate the baseline value b by given the current state under the current generation policy π. The critic network takes
the visual content, dialog history and question as input, encodes them to a vector representation with our co-attention
model and maps the representation to a scalar. The critic
neural network is optimised based on the mean squared loss
between the estimated reward and the real reward obtained
from the discriminator. The entire model can be trained
end-to-end, with the discriminator updating synchronously.
We use the human generated dialog history and answers as
the positive examples and the machine generated responses
as negative examples.
Intermediate reward An issue in the above vanilla REINFORCE is it only considers a reward value for a finished
sequence, and the reward associated with this sequence is
used for all actions, i.e., the generation of each token. However, as a sequence generation problem, rewards for intermediate steps are necessary. For example, given a question
‘Are they adults or babies?’, the human-generated answer is
‘I would say they are adults’, while the machine-generated
answer is ‘I can’t tell’. The above REINFORCE model will
give the same low reward to all the tokens for the machinegenerated answer, but a proper reward assignment way is to
give the reward separately, i.e., a high reward to the token
‘I’ and low rewards for the token ‘can’t’ and ‘tell’.
Considering that the discriminator is only trained to assign rewards to fully generated sentences, but not intermediate ones, we propose to use the Monte Carlo (MC) search
with a roll-out (generator) policy π to sample tokens. An
N-time MC search can be represented as:
{Â11:K , . . . ,ÂN
1:K }
Ân1:k
π
= MC (Â1:k ; N )
(9)
Ânk+1:K
where
= (a1 , . . . ,ak ) and
are sampled based
on the roll-out policy π and the current state. We run the
roll-out policy starting from the current state till the end
of the sequence for N times and the N generated answers
share a common prefix Â1:k . These N sequences are fed to
the discriminator, the average score
rak =
N
1 X
r({ṽ, ũ, Q, Ân1:K })
N n=1
(10)
of which is used as a reward for the action of generating
the token ak . With this intermediate reward, our gradient is
computed as:
∇J(θ) = ∇
X
log p(ak |V,U,Q,a1:k−1 ) · [rak − b] (11)
Algorithm 1 Training Visual Dialog Generator with REINFORCE
Require: Pretrained generator Gen and discriminator Dis
1: for Each iteration do
2:
# Train the generator Gen
3:
for i=1, steps do
4:
Sample (I,H,Q,A) from the real data
5:
Sample (ṽ,ũ,Â) ∼ Genπ (·|I,H,Q)
6:
Compute Reward r for (ṽ,ũ,Q,Â) using Dis
7:
Evaluate ∇J(θ) with Eq. 8 or 11 depends on whether the intermediate reward (Eq. 10) is used
8:
Update Gen parameter θ using ∇J(θ)
9:
Update baseline parameters for b
10:
Teacher-Forcing: Update Gen on (I,H,Q,A) using MLE
11:
# Train the discriminator Dis
12:
Sample (I,H,Q,A) from the real data
13:
Sample (ṽ,ũ,Â) ∼ Genπ (·|I,H,Q)
14:
Update Dis using (ṽ,ũ,Q,A) as positive examples and (ṽ,ũ,Q,Â)
as negative examples
4. Experiments
We evaluate our model on a recently published visual dialog generation dataset, VisDial [5]. Images in Visdial are
all from the MS COCO [17], which contain multiple objects
in everyday scenes. The dialogs in Visdial are collected by
pairing 2 AMT works (a ‘questioner’ and an ‘answerer’)
to chat with each other about an image. To make the dialog measurable, the image remains hidden to the questioner and the task of the questioner is to ask questions
about this hidden image to imagine the scene better. The
answerer sees the image and his task is to answer questions
asked by the questioner. Hence, the conversation is more
like multi-rounds of visual based question answering and it
only can be ended after 10 rounds. There are 83k dialogs in
the COCO training split and 40k in the validation split, for
totally 1,232,870 QA pairs, in the Visdial v0.9, which is the
latest available version thus far. Following [17], we use 80k
dialogs for train, 3k for val and 40k as the test.
k
where we can see the intermediate rewards for each generation action are considered.
Teacher forcing Although the reward returned from the
discriminator has been used to adjust the generation process, we find it is still important to feed human generated
responses to the generator for the model updating. Hence,
we apply a teacher forcing [14, 16] strategy to update the
parameters in the generator. Specifically, at each training
iteration, we first update the generator using the reward
obtained from the sampled data with the generator policy.
Then we sample some data from the real dialog history and
use them to update the generator, with a standard maximum
likelihood estimation (MLE) objective. The whole training
process is reviewed in the Alg. 1.
4.1. Evaluation Metrics
Different from the previous language generation tasks
that normally use BLEU, MENTOR or ROUGE score for
evaluation, we follow [17] to use a retrieval setting to evaluate the individual responses at each round of a dialog.
Specifically, at test time, besides the image, ground truth
dialog history and the question, a list of 100 candidates answers are also given. The model is evaluated on retrieval
metrics: (1) rank of human response, (2) existence of the
human response in top-k ranked responses, i.e., recall@k
and (3) mean reciprocal rank (MRR) of the human response.
Since we focus on evaluating the generalization ability of
our generator, we simply rank the candidates by the generative model’s log-likelihood scores.
Image+Caption
Question
Human Answer
CoAtt-G-MLE
Ours
A bathroom with a white bath tub,
sink and large window.
What color is the bathroom?
Are there any people in there?
Are there towels hanging?
Is there any soap on the sink?
What color are the towels?
What kind of bathtub is it?
Can you see anything out the bathroom window?
Are there curtains on the window?
Is the bathroom light on?
Is there anything else on the sink?
The walls are gray
No
No folded up
I do n’t think so
White
A fancy rectangular
No
No
Yes
No
White
No
No
No soap
White
It ’s a tub
No
No
Yes
No
Most white
No
No, on the floor
I do n’t think so
White
It ’s a shower tub with a shower
No, just the wall
No curtains
Yes
No
What color is the motorcycle?
Is this on a busy street with shops and people?
Is it daylight or night time?
Is the photo in color?
What color are the other cars?
Are there any people walking?
Can you tell what shops businesses they are?
Do you see any traffic lights?
Do you think the motorcycle should be parked on
the sidewalk?
Do you see any signs?
It is black and white
It looks like it is not
Daytime
Yes it is
I see a white van and a blue
Not that i can see
Not really
No, i do not
Yes
One, but only a picture
White and blue
No
It ’s daytime
Yes
white and black
no
i ’m not sure
No i do n’t
No
Yes
It’s black and white
No it is not
It is daytime
Yes
One is blue and the other is white
no, there are no people
I ’m not sure , they are in the background
No i do n’t
No, it looks like it ’s parked
I see a sign on the side of road
Is the photo in color?
How old does the man appear to be?
What color wetsuit?
What color surfboard?
Do the rocks appear to be smooth or sharp?
Is he close to the water?
Does it appear to be a beach or private section?
What color is the water dark or light blue?
Does he have any shoes on?
Does he appear to be wet or dry?
Yes
I would estimate late 30s
Dark blue
White and red
I would guess they are smooth
Moderately close
Private area
It is blurry so it appears black
I ca n’t see his feet
Dry
Yes
20 ’s
Black
White with red
Smooth
No
I ca n’t tell
light blue
I ca n’t see his feet
Dry
Yes
I would say 20 ’s
Black
It ’s white with red
They look smooth
Yes
I ca n’t tell
It ’s light blue
I ca n’t see his feet
He looks dry
A motorcycle, moped and a bus
parked by the street.
A man in a wet suit carrying a
surfboard by some rocks.
Figure 4: Qualitative results of our model (CoAtt-GAN-w/ Rinte -TF) comparing to human ground-truth answer and our baseline model.
4.2. Implementation Details
To pre-process the data, we first lowercase all the texts,
convert digits to words, and remove contractions, before tokenizing. The captions, questions and answers are further
truncated to ensure that they are no longer than 40, 20 and
20, respectively. We then construct the vocabulary of words
that appear at least 5 times in the training split, giving us
a vocabulary of 8845 words. The words are represented
as one-hot vector and 512-d embeddings for the words are
learned. These word embeddings are shared across question, history, decoder LSTMs. All the LSTMs in our model
are 1-layered with 512 hidden states. The Adam [13] optimizer is used with the base learning rate of 10−3 , further decreasing to 10−5 . We use 5-time Monte Carlo (MC) search
for each token. The co-attention generative model is pretrained using the ground-truth dialog history for 30 epochs.
We also pre-train our discriminator (for 30 epochs), where
the positive examples are sampled from the ground-truth dialog, the negative examples are sampled from the dialog
generated by our generator. The discriminator is updated
after every 20 generator-updating steps.
4.3. Experiment results
Baselines and comparative models We compare our
model with a number of baselines and state-of-the-art models. Answer Prior [5] is a naive baseline that encodes answer options with an LSTM and scored by a linear classifier, which captures ranking by frequency of answers in the
training set. NN [5] finds the nearest neighbor images and
questions for a test question and its related image. The op-
Model
Answer Prior [5]
NN [5]
LF [5]
HRE [5]
HREA [5]
MN [5]
HCIAE [18]
CoAtt-G-MLE
CoAtt-GAN-w/o Rinte
CoAtt-GAN-w/ Rinte
CoAtt-GAN-w/ Rinte -TF
MRR
0.3735
0.4274
0.5199
0.5237
0.5242
0.5259
0.5386
0.5411
0.5415
0.5506
0.5578
R@1
23.55
33.13
41.83
42.29
42.28
42.29
44.06
44.32
44.52
45.56
46.10
R@5
48.52
50.83
61.78
62.18
62.33
62.85
63.55
63.82
64.17
65.16
65.69
R@10
53.23
58.69
67.59
67.92
68.17
68.88
69.24
69.75
70.31
71.07
71.74
Mean
26.50
19.62
17.07
17.07
16.79
17.06
16.01
16.47
16.28
15.30
14.43
Table 1: Performance of generative methods on VisDial v0.9. Higher is
better for MRR and recall@k, while lower is better for mean rank.
tions are then ranked by their mean-similarity to answers
to these questions. Late Fusion (LF) [5] encodes the image, dialog history and question separately and later concatenated together and linearly transformed to a joint representation. HRE [5] applies a hierarchical recurrent encoder [27] to encode the dialog history and the HREA [5]
additionally adds an attention mechanism on the dialogs.
Memory Network (MN) [5] maintains each previous question and answer as a ‘fact’ in its memory bank and learns
to refer to the stored facts and image to answer the question. A concurrent work [18] proposes a HCIAE (HistoryConditioned Image Attentive Encoder) to attend on image
and dialog features.
From Table 1, we can see our final generative model
CoAtt-GAN-w/ Rinte -TF performs the best on all the evaluation metrics. Comparing to the previous state-of-the-art
model MN [5], our model outperforms it by 3.81% on R@1.
We also produce better results than the HCIAE [18] model,
Model
LF [5]
HRE [5]
HREA [5]
MN [5]
SAN-QI [40]
HieCoAtt-QI [19]
AMEM [25]
HCIAE-NP-ATT [18]
Ours
MRR
0.5807
0.5846
0.5868
0.5965
0.5764
0.5788
0.6160
0.6222
0.6398
R@1
43.82
44.67
44.82
45.55
43.44
43.51
47.74
48.48
50.29
R@5
74.68
74.50
74.81
76.22
74.26
74.49
78.04
78.75
80.71
R@10
84.07
84.22
84.36
85.37
83.72
83.96
86.84
87.59
88.81
Mean
5.78
5.72
5.66
5.46
5.88
5.84
4.99
4.81
4.47
Table 2: Performance of discriminative methods on VisDial v0.9. Higher
is better for MRR and recall@k, while lower is better for mean rank.
which is the previous best results that without using any
discriminative knowledges. Figure 4 shows some qualitative results of our model. More results can be found in the
supplementary material.
Ablation study Our model contains several components.
In order to verify the contribution of each component, we
evaluate several variants of our model.
• CoAtt-G-MLE is the generative model that uses our
co-attention mechanism shown in Sec. 3.1. This model
is trained only with the MLE objective, without any
adversarial learning strategies. Hence, it can be used
as a baseline model for other variants.
• CoAtt-GAN-w/o Rinte is the extension of above
CoAtt-G model, with an adversarial learning strategy.
The reward from the discriminator is used to guide the
generator training, but we only use the global reward
to calculate the gradient, as shown in Equ. 8.
• CoAtt-GAN-w/ Rinte uses the intermediate reward as
shown in the Equ. 10 and 11.
• CoAtt-GAN-w/ Rinte -TF is our final model which
adds a ‘teacher forcing’ after the adversarial learning.
Our baseline CoAtt-G-MLE model outperforms the previous attention based models (HREA, MN, HCIAE) shows
that our co-attention mechanism can effectively encode the
complex multi-source information. CoAtt-GAN-w/o Rinte
produces slightly better results than our baseline model by
using the adversarial learning network, but the improvement
is limited. The intermediate reward mechanism contributes
the most to the improvement, i.e., our proposed CoAttGAN-w/ Rinte model improves over our baseline by average 1%. The additional Teacher-Forcing model (our final
model) brings the further improvement, by average 0.5%,
achieving the best results.
Discriminative setting We additionally implement a
model for the discriminative task on the Visdial dataset [5].
In this discriminative setting, there is no need to generate
a string, instead, a pre-defined answer set is given and the
problem is formulated as a classification problem. We modify our model by replacing the response generation LSTM
(can be treated as a multi-step classification process) as a
single-step classifier. HCIAE-NP-ATT [18] is the origi-
M1: Percentage of responses that
pass the Turing Test
M2: Percentage of responses that
are evaluated as better or equal to
human responses.
MN [5]
CoAtt-G-MLE
Ours
0.39
0.46
0.49
0.36
0.42
0.45
Table 3: Human evaluation on 1000 sampled responses on VisDial v0.9
nal HCIAE model with a n-pair discriminative loss and a
self-attention mechanism. AMEM [25] applies a more advanced memory network to model the dependency of current question on previous attention. Additional two VQA
models [19, 40] are used for comparison. Table 2 shows
that our model outperforms the previous baseline and stateof-the-art models on all the evaluation metrics.
4.4. Human study
Above experiments verify the effectiveness of our proposed model on the Visdial [5] task. In this section, to check
whether our model can generate more human-like dialogs,
we conduct a human study.
We randomly sample 1000 results from the test dataset
in different length, generated by our final model, our
baseline model CoAtt-G-MLE, and the Memory Network
(MN)2 [5] model. We then ask 3 human subjects to guess
whether the last response in the dialog is human-generated
or machine-generated and if at least 2 of them agree it is
generated by a human, we say it passed the Truing Test.
Table 3 summarizes the percentage of responses in the dialog that passes the Turing Test (M1), we can see our model
outperforms both the baseline model and the MN model.
We also apply our discriminator model in Sec. 3.2 on these
1000 samples and it recognizes that nearly 70% percent of
them as human-generated responses (random guess is 50%),
which suggests that our final generator successfully fool the
discriminator in this adversarial learning. We additionally
record the percentage of responses that are evaluated as better than or equal to human responses (M2), according to the
human subjects’ manual evaluation. As shown in Table 3,
45% of the responses fall into this case.
5. Conclusion
Visual Dialog generation is an interesting topic that requires machine to understand visual content, natural language dialog and have the ability of multi-modal reasoning.
More importantly, as a human-computer interaction interface for the further robotics and AI, apart from the correctness, the human-like level of the generated response is a
significant index. In this paper, we have proposed an adversarial learning based approach to encourage the generator
to generate more human-like dialogs. Technically, by combining a sequential co-attention generative model that can
2 we use the author provided code and pre-trained model provided on
https://github.com/batra-mlp-lab/visdial
jointly reason the image, dialog history and question, and
a discriminator that can dynamically access to the attention
memories, with an intermediate reward, our final proposed
model achieves the state-of-art on VisDial dataset. A Turing
Test fashion study also shows that our model can produce
more human-like visual dialog responses.
References
[1] S. Antol, A. Agrawal, J. Lu, M. Mitchell, D. Batra, C. L.
Zitnick, and D. Parikh. VQA: Visual Question Answering.
In Proc. IEEE Int. Conf. Comp. Vis., pages 2425–2433, 2015.
1, 2
[2] N. Asghar, P. Poupart, J. Xin, and H. Li. Online sequence-tosequence reinforcement learning for open-domain conversational agents. arXiv preprint arXiv:1612.03929, 2016. 3
[3] X. Chen, Y. Duan, R. Houthooft, J. Schulman, I. Sutskever,
and P. Abbeel. Infogan: Interpretable representation learning
by information maximizing generative adversarial nets. In
Advances in Neural Information Processing Systems, pages
2172–2180, 2016. 2, 3
[4] B. Dai, D. Lin, R. Urtasun, and S. Fidler. Towards diverse
and natural image descriptions via a conditional gan. arXiv
preprint arXiv:1703.06029, 2017. 2, 4
[5] A. Das, S. Kottur, K. Gupta, A. Singh, D. Yadav, J. M.
Moura, D. Parikh, and D. Batra. Visual dialog. In Proc.
IEEE Int. Conf. Comp. Vis., 2017. 1, 2, 4, 6, 7, 8
[6] A. Das, S. Kottur, J. M. Moura, S. Lee, and D. Batra. Learning cooperative visual dialog agents with deep reinforcement
learning. Proc. IEEE Int. Conf. Comp. Vis., 2017. 2
[7] H. de Vries, F. Strub, S. Chandar, O. Pietquin, H. Larochelle,
and A. Courville. Guesswhat?! visual object discovery
through multi-modal dialogue. Proc. IEEE Conf. Comp. Vis.
Patt. Recogn., 2017. 2, 4
[8] E. L. Denton, S. Chintala, R. Fergus, et al. Deep generative image models using a laplacian pyramid of adversarial
networks. In Advances in neural information processing systems, pages 1486–1494, 2015. 3
[9] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu,
D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Proc. Advances in Neural Inf.
Process. Syst., pages 2672–2680, 2014. 2, 3
[10] R. Hu, H. Xu, M. Rohrbach, J. Feng, K. Saenko, and T. Darrell. Natural language object retrieval. In Proc. IEEE Conf.
Comp. Vis. Patt. Recogn., June 2016. 1
[11] A. Karpathy and L. Fei-Fei. Deep visual-semantic alignments for generating image descriptions. In Proc. IEEE
Conf. Comp. Vis. Patt. Recogn., pages 3128–3137, 2015. 1,
2
[12] S. Kazemzadeh, V. Ordonez, M. Matten, and T. L. Berg.
Referit game: Referring to objects in photographs of natural scenes. In EMNLP, 2014. 1
[13] D. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. 7
[14] A. M. Lamb, A. G. A. P. GOYAL, Y. Zhang, S. Zhang, A. C.
Courville, and Y. Bengio. Professor forcing: A new algorithm for training recurrent networks. In Advances In Neural
Information Processing Systems, pages 4601–4609, 2016. 6
[15] J. Li, W. Monroe, A. Ritter, M. Galley, J. Gao, and D. Jurafsky. Deep reinforcement learning for dialogue generation.
arXiv preprint arXiv:1606.01541, 2016. 3
[16] J. Li, W. Monroe, T. Shi, A. Ritter, and D. Jurafsky. Adversarial learning for neural dialogue generation. arXiv preprint
arXiv:1701.06547, 2017. 3, 4, 5, 6
[17] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick. Microsoft coco: Common objects in context. In European conference on computer
vision, pages 740–755. Springer, 2014. 6
[18] J. Lu, A. Kannan, J. Yang, D. Parikh, and D. Batra. Best
of both worlds: Transferring knowledge from discriminative
learning to a generative visual dialog model. arXiv preprint
arXiv:1706.01554, 2017. 2, 7, 8
[19] J. Lu, J. Yang, D. Batra, and D. Parikh. Hierarchical
question-image co-attention for visual question answering.
In Proc. Advances in Neural Inf. Process. Syst., pages 289–
297, 2016. 1, 8
[20] N. Mostafazadeh, C. Brockett, B. Dolan, M. Galley, J. Gao,
G. P. Spithourakis, and L. Vanderwende. Image-grounded
conversations: Multimodal context for natural question and
response generation. arXiv preprint arXiv:1701.08251,
2017. 2, 4
[21] A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015. 2,
3
[22] M. Ren, R. Kiros, and R. Zemel. Image Question Answering:
A Visual Semantic Embedding Model and a New Dataset.
In Proc. Advances in Neural Inf. Process. Syst., volume 1,
page 5, 2015. 1, 2
[23] A. Ritter, C. Cherry, and W. B. Dolan. Data-driven response
generation in social media. In Proc. Conf. Empirical Methods in Natural Language Processing, pages 583–593. Association for Computational Linguistics, 2011. 3
[24] T. Salimans, I. Goodfellow, W. Zaremba, V. Cheung, A. Radford, and X. Chen. Improved techniques for training gans. In
Advances in Neural Information Processing Systems, pages
2234–2242, 2016. 3
[25] P. H. Seo, A. Lehrmann, B. Han, and L. Sigal. Visual reference resolution using attention memory for visual dialog.
arXiv preprint arXiv:1709.07992, 2017. 8
[26] I. V. Serban, A. Sordoni, Y. Bengio, A. C. Courville, and
J. Pineau. Building end-to-end dialogue systems using generative hierarchical neural network models. In AAAI, pages
3776–3784, 2016. 3
[27] I. V. Serban, A. Sordoni, R. Lowe, L. Charlin, J. Pineau,
A. C. Courville, and Y. Bengio. A hierarchical latent variable
encoder-decoder model for generating dialogues. In AAAI,
pages 3295–3301, 2017. 7
[28] R. Shetty, M. Rohrbach, L. A. Hendricks, M. Fritz, and
B. Schiele. Speaking the same language: Matching machine
to human captions by adversarial training. arXiv preprint
arXiv:1703.10476, 2017. 4
[29] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. arXiv preprint
arXiv:1409.1556, 2014. 4
[30] A. Sordoni, M. Galley, M. Auli, C. Brockett, Y. Ji,
M. Mitchell, J.-Y. Nie, J. Gao, and B. Dolan. A neural network approach to context-sensitive generation of conversational responses. arXiv preprint arXiv:1506.06714, 2015. 3
[31] P.-H. Su, M. Gasic, N. Mrksic, L. Rojas-Barahona, S. Ultes,
D. Vandyke, T.-H. Wen, and S. Young. Continuously
learning neural dialogue management.
arXiv preprint
arXiv:1606.02689, 2016. 3
[32] I. Sutskever, O. Vinyals, and Q. V. Le. Sequence to sequence
learning with neural networks. In Proc. Advances in Neural
Inf. Process. Syst., pages 3104–3112, 2014. 3
[33] O. Vinyals and Q. Le. A neural conversational model. arXiv
preprint arXiv:1506.05869, 2015. 3
[34] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan. Show and
tell: A neural image caption generator. In Proc. IEEE Conf.
Comp. Vis. Patt. Recogn., pages 3156–3164, 2014. 1, 2
[35] P. Wang, Q. Wu, C. Shen, and A. v. d. Hengel. The vqamachine: Learning how to use existing vision algorithms to
answer new questions. Proc. IEEE Conf. Comp. Vis. Patt.
Recogn., 2017. 4
[36] R. J. Williams. Simple statistical gradient-following algorithms for connectionist reinforcement learning. Machine
learning, 8(3-4):229–256, 1992. 4, 5
[37] Q. Wu, C. Shen, A. v. d. Hengel, L. Liu, and A. Dick. What
Value Do Explicit High Level Concepts Have in Vision to
Language Problems? In Proc. IEEE Conf. Comp. Vis. Patt.
Recogn., pages 203–212, 2016. 1, 2
[38] Q. Wu, P. Wang, C. Shen, A. Dick, and A. v. d. Hengel. Ask
Me Anything: Free-form Visual Question Answering Based
on Knowledge from External Sources. In Proc. IEEE Conf.
Comp. Vis. Patt. Recogn., pages 4622–4630, 2016. 1, 2
[39] Z. Xu, B. Liu, B. Wang, C. Sun, and X. Wang. Incorporating loose-structured knowledge into lstm with recall gate for
conversation modeling. arXiv preprint arXiv:1605.05110,
2016. 3
[40] Z. Yang, X. He, J. Gao, L. Deng, and A. Smola. Stacked
Attention Networks for Image Question Answering. In Proc.
IEEE Conf. Comp. Vis. Patt. Recogn., pages 21–29, 2016. 1,
8
[41] L. Yu, P. Poirson, S. Yang, A. C. Berg, and T. L. Berg. Modeling context in referring expressions. In Proc. Eur. Conf.
Comp. Vis., pages 69–85. Springer, 2016. 1
[42] L. Yu, W. Zhang, J. Wang, and Y. Yu. Seqgan: Sequence generative adversarial nets with policy gradient. In Proc. Conf.
AAAI, pages 2852–2858, 2017. 2, 3
[43] H. Zhang, T. Xu, H. Li, S. Zhang, X. Huang, X. Wang, and
D. Metaxas. Stackgan: Text to photo-realistic image synthesis with stacked generative adversarial networks. arXiv
preprint arXiv:1612.03242, 2016. 3
| 2cs.AI
|
Age-Minimal Online Policies for Energy Harvesting
Sensors with Incremental Battery Recharges
Ahmed Arafa1 , Jing Yang2 , Sennur Ulukus3 , and H. Vincent Poor1
1
arXiv:1802.02129v2 [cs.IT] 22 Feb 2018
2
Electrical Engineering Department, Princeton University
School of Electrical Engineering and Computer Science, Pennsylvania State University
3
Department of Electrical and Computer Engineering, University of Maryland
Abstract— A sensor node that is sending measurement updates regarding some physical phenomenon to a destination is
considered. The sensor relies on energy harvested from nature
to transmit its updates, and is equipped with a finite B-sized
battery to save its harvested energy. Energy recharges the battery
incrementally in units, according to a Poisson process, and one
update consumes one energy unit to reach the destination. The
setting is online, where the energy arrival times are revealed
causally after the energy is harvested. The goal is to update
the destination in a timely manner, namely, such that the long
term average age of information is minimized, subject to energy
causality constraints. The age of information at a given time is
defined as the time spent since the latest update has reached the
destination. It is shown that the optimal update policy follows a
renewal structure, where the inter-update times are independent,
and the time durations between any two consecutive events of
submitting an update and having k units of energy remaining
in the battery are independent and identically distributed for a
given k ≤ B − 1. The optimal renewal policy for the case of
B = 2 energy units is explicitly characterized, and it is shown
that it has an energy-dependent threshold structure, where the
sensor updates only if the age grows above a certain threshold
that is a function of the amount of energy in its battery.
I. I NTRODUCTION
An energy harvesting sensor monitors some physical phenomenon and sends measurement updates about it to a destination. Updates are to be sent such that the long term average age
of information is minimized. The age of information is the time
spent since the freshest update has reached the destination. The
sensor relies on energy harvested from nature to measure and
send its updates, and is equipped with a finite B-sized battery
to save its incoming energy. We characterize optimal online
policies for this problem, where the sensor has only causal
knowledge of the energy harvesting process.
In this work, we connect results from the energy harvesting
communication literature and the age of information minimization literature by using the age of information metric as
a means to assess the performance of a single-user energy
harvesting communication channel. The energy harvesting
communication literature is broadly categorized into offline
and online settings, depending on whether the energy arrival
times/amounts are known prior to the start of communication.
This research was supported in part by the National Science Foundation
under Grants ECCS-1549881, ECCS-1647198, ECCS-1650299, CCF 1422111, and CNS 15-26608.
Offline energy management works consider, e.g., single-user
channels [1]–[4]; multiuser channels [5]–[9]; and multi hop
and relay channels [10]–[14]. Recent online works include
the near-optimal results for single-user and multiuser channels
[15]–[18], systems with processing costs [19], and systems
with general utilities [20].
Age of information minimization is generally studied in a
queuing-theoretic framework, including a single source setting
[21]; multiple sources [22]; variations of the single source
setting such as randomly (out of order) arriving updates
[23], update management and control [24], and nonlinear age
metrics [25], [26]; multi hop networks [27]; broadcasting, multicasting, and multi streaming [28]–[30]; coding over erasures
[31]; and caching systems [32].
Assessing the performance of energy harvesting communication systems by the age of information metric has recently gained some attention [33]–[40]. Except for [36], an
underlying assumption in these works is that energy expenditure is normalized, i.e., it takes one energy unit to send
an update to the destination. References [33], [34] study a
system with an infinite-sized battery, with [33] considering
online scheduling with random service times (time for the
update to take effect), and [34] considering offline and online
scheduling with zero service times. The offline policy in
[34] is extended to fixed non-zero service times in [35] for
single and multi hop settings, and to energy-controlled service
times in [36]. The online policy in [34] is found by dynamic
programming in a discrete-time setting, and was shown to be
of a threshold structure, where an update is sent only if the
age of information is higher than a certain threshold. Motivated
by the results in the infinite battery case, [37] then analyzes
the performance of threshold policies under a finite-sized
battery and varying channel assumptions, yet with no claim of
optimality. Reference [38] proves the optimality of threshold
policies when the battery size is equal to one unit using
tools from renewal theory; it also provides an asymptotically
optimal update policy when the battery size grows infinitely
large. In our recent work [39], we extend the results of [38]
and formally prove the optimality of threshold policies for
any finite-sized battery in an online setting where the battery
is randomly fully recharged over time, i.e., whenever energy
is harvested, it completely fills up the battery. An interesting
result is recently reported in [40], where status updates send
information, other than that related to measurements, in an
energy harvesting single-user channel.
In this work, we complement our results in [39] and
study age-optimal online policies for an energy harvesting
sensor with a finite battery with random incremental battery
recharges; that is, energy is harvested in units as in [37], [38],
as opposed to full chunks as in [39]. We extend the unit
battery results of [38] and show that for a finite battery of
size B, the optimal status update policy that minimizes the
long term average age of information is a renewal policy:
the times in between the two consecutive events where the
sensor sends an update and has k energy units remaining
in its battery, for some 0 ≤ k ≤ B − 1, are independent
and identically distributed (i.i.d.). Further, we show that interupdate times are independent. Based on these results, we
explicitly solve the case of B = 2 energy units, and formally
prove, using optimization tools, that the optimal policy is
an energy-dependent threshold policy: the sensor submits an
update only if the instantaneous age of information is above
a certain threshold that depends on the energy in its battery.
age
0
s1
x1
Fig. 1.
s2
x2
s3
t
time
x3
Example of the age evolution versus time with n(t) = 3.
The age at time t is formally defined as
a(t) , t − u(t)
(3)
where u(t) is the time stamp of the latest update received
before time t. Let n(t) denote the total number of updates sent
by time t. We are interested in minimizing the area under the
age curve, see Fig. 1 for a possible sample path with n(t) = 3.
At time t, this area is given by
n(t)
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
We consider a sensor node that collects measurements from
a physical phenomenon and sends updates to a destination
over time. The sensor relies on energy harvested from nature to
acquire and send its updates, and is equipped with a battery of
finite size B to save its incoming energy. The sensor consumes
one unit of energy to measure and send out an update to the
destination. We assume that updates are sent over an errorfree link with negligible transmission times as in [34], [37]–
[39]. Energy arrives (is harvested) one unit at a time, at times
{t1 , t2 , . . . } according to a Poisson process of rate 1. Our
setting is online in which energy arrival times are revealed
causally over time; only the arrival rate is known a priori.
Let si denote the time at which the sensor acquires (and
transmits) the ith measurement update, and let E(t) denote
the amount of energy remaining in the battery at time t. We
then have the following energy causality constraint [1]
E s−
≥ 1, ∀i
(1)
i
We assume that we begin with an empty battery at time 0, and
that the battery evolves as follows over time
(2)
= min E s−
E s−
i−1 − 1 + A (xi ) , B
i
where xi , si −si−1 , and A(xi ) denotes the amount of energy
harvested in [si−1 , si ). Note that A(xi ) is a Poisson random
variable with parameter xi . We denote by F , the set of feasible
transmission times {si } described by (1) and (2) in addition
to an empty battery at time 0, i.e., E(0) = 0.
The goal is to choose an online feasible transmission policy
{si } (or equivalently {xi }) such that the long term average
of the age of information experienced at the destination is
minimized. The age of information is defined as the time
elapsed since the latest update has reached the destination.
2
1X 2 1
r(t) ,
x +
t − sn(t)
2 i=1 i
2
(4)
and therefore the goal is to characterize the following quantity
r̄ , min lim sup
x∈F T →∞
1
E [r(T )]
T
(5)
where E(·) is the expectation operator. In the next section, we
characterize the structure of the optimal policy.
III. O PTIMAL S OLUTION S TRUCTURE :
R ENEWAL T YPE P OLICIES
In this section, we show that the optimal update policy
that solves problem (5) has a renewal structure. Namely, we
show that it is optimal to transmit updates in such a way that
the inter-update delays are independent over time; and that
the time durations in between the two consecutive events of
transmitting an update and having k ≤ B − 1 units of energy
left in the battery are i.i.d., i.e. these events occur at times that
constitute a renewal process. We first introduce some notation.
Let the pair (E(t), a(t)) represent the state of the system at
time t. Fix k ∈ {0, 1, . . . , B −1}, and consider the state (k, 0),
which means that the sensor has just submitted an update and
has k units of energy remaining in its battery. Let li denote
the time at which the system visits (k, 0) for the ith time.
We use the term epoch to denote the time in between two
consecutive visits to (k, 0). Observe that there can possibly be
an infinite number of updates occurring in an epoch, depending
on the energy arrival pattern and the update time decisions. For
instance, in the ith epoch, which starts at li−1 , one energy unit
may arrive at some time li−1 + τ1,i , at which the system goes
to state (k + 1, τ1,i ), and then the sensor updates afterwards to
get the system state back to (k, 0) again. Another possibility
(if k ≥ 1) is that the sensor first updates at some time li−1 +
xk,i , at which the system goes to state (k − 1, 0), and then
two consecutive energy units arrive at times li−1 + τ1,i and
li−1 +τ1,i +τ2,i , respectively, at which the system goes to state
(k+1, τ1,i +τ2,i ), and then the sensor updates afterwards to get
the system state back to (k, 0) again. Depending on how many
energy arrivals occur in the ith epoch, how far apart from each
other they are, and the status update times, one can determine
the length of the ith epoch and how many updates it has.
Observe that the update policy in the ith epoch may depend on
the history of events (energy arrivals and transmission updates)
that occurred in previous epochs, which we denote by Hi−1 .
Our main result in this section shows that this is not the case,
under some mild technical conditions, and that epoch lengths
should be i.i.d. We first have the following definition.
Definition 1 (Uniformly Bounded Policy) An online policy
whose inter-update times, as a function of the energy arrival
times, have a bounded second moment.
We focus on uniformly bounded policies as per Definition 1.
Such policies were also considered in [38] in the analysis of
the B = 1 case. We now have the following theorem; the
proof is in Appendix A.
age
age
l0
τ2
τ1
Based on Theorem 1, the following corollary now follows.
Corollary 1 In the optimal solution of problem (5), the interupdate times are independent.
Proof: Observe that whenever an update occurs the system
enters state (j, 0) for some j ≤ B − 1. The system then starts
a new epoch with respect to state (j, 0). Since the choice
of k energy units in Theorem 1 is arbitrary, the results of
the theorem now tell us that the update policy in that epoch,
and therefore its length, is independent of the past history, in
particular the past inter-update lengths.
In the next section, we show how to use the results of
Theorem 1 and Corollary 1 to provide an explicit solution
for the case of B = 2 energy units.
IV. T HE C ASE B = 2
Based on Corollary 1, we now introduce the following
notation regarding the update policy in a given epoch. Starting
from state (0, 0) at time l0 , the sensor has to wait for the first
energy arrival in the epoch, which occurs after some time τ1 ,
and at which the system state becomes (1, τ1 ). Since the sensor
now has energy, it schedules its next update at l0 + y1 (τ1 ),
for some function y1 (·) to be optimally characterized. Now if
another energy arrival occurs at time l0 + τ1 + τ2 , with τ2 >
y1 (τ1 ) − τ1 , the sensor transmits the update as scheduled at
l0 + y1 (τ1 ) and the system state returns to (0, 0) again. On the
other hand, if this second energy arrival occurs relatively early,
i.e., τ2 ≤ y1 (τ1 ) − τ1 , the system state becomes (2, τ1 + τ2 )
at l0 + τ1 + τ2 , and the sensor reschedules its update to be at
l0
τ1
τ2
time
ȳ2 (τ1 , τ2 )
y1 (τ1 )
Fig. 2. Age of information versus time under the two possible ways of
updating starting from state (0, 0) at time l0 . On the left, the second energy
arrival occurs late, and hence we have one energy arrival followed by one
update, returning to state (0, 0) again at l0 + y1 (τ1 ). On the right, the second
energy arrival occurs early, and hence we have two energy arrivals followed
by one update, entering state (1, 0) at l0 + ȳ2 (τ1 , τ2 ). The yellow boxes
represent energy units in the battery.
age
age
l1
τ1
x1
Theorem 1 In the optimal solution of problem (5), any
uniformly bounded policy is a renewal policy. That is, the
sequence {li } denoting the times at which the system visits
state (k, 0) forms a renewal process.
time
time
l1
τ1
time
y2 (τ1 )
Fig. 3. Age of information versus time under the two possible ways of
updating starting from state (1, 0) at time l1 . On the left, the first energy
arrival occurs late, and hence the sensor updates and enters state (0, 0) at
l1 + x1 . On the right, the first energy arrival occurs early, and hence we
have one energy arrival followed by an update, returning to state (1, 0) at
l1 + y2 (τ1 ). The yellow boxes represent energy units in the battery.
l0 + ȳ2 (τ1 , τ2 ) instead of l0 + y1 (τ1 ). Note that it is not clear
so far whether ȳ2 (τ1 , τ2 ) depends only on the age τ1 + τ2 ; we
leave it as a general function of the pair (τ1 , τ2 ) for now. The
above two cases are illustrated in Fig. 2.
Once the sensor has two energy units in its battery, it will
eventually send an update making the system state become
(1, 0) at some time l1 . The sensor then schedules its next
update at l1 + x1 , for some x1 to be optimally characterized.
If the first energy arrival after l1 occurs at time l1 + τ1 with
τ1 > x1 , the sensor transmits the update at l+x1 as scheduled,
whence the state becomes (0, 0). Note that by energy causality,
x1 cannot depend on τ1 , and since it also does not depend on
the past history before l1 (by Corollary 1), it is therefore a
constant. On the other hand, if the first energy arrival occurs
relatively early, i.e., τ1 ≤ x1 , the state becomes (2, τ1 ) at l1 +
τ1 , and the sensor reschedules the update to be at l1 + y2 (τ1 )
instead of l1 + x1 . Note that it is not clear so far whether
y2 (·) and ȳ2 (·, ·) are identical, since the former depends on
only one random variable, as opposed to depending on two
random variables in the latter; we optimally characterize both
functions later on in the analysis. The above two cases are
illustrated in Fig. 3.
In summary, the optimal update policy for the case B = 2
in a given epoch is completely characterized by the constant
x1 , and the functions y1 (·), y2 (·), and ȳ2 (·, ·). Since these
represent the possible inter-update delays, we conclude by
Corollary 1 that they do not depend on each other. We denote
age
age
τ1
time
τ2
y1 (τ1 )
τ1
Fig. 4.
First possible way to return to state (0, 0).
ȳ2 (τ1 , τ2 )
by R (x1 , y1 , y2 , ȳ2 ) and L (x1 , y1 , y2 , ȳ2 ) the area under the
age curve in the epoch and its length, respectively, as a
function of the policy (x1 , y1 , y2 , ȳ2 ). By Theorem 1 (and
Corollary 1), one can use the strong law of large numbers
of renewal processes [41] to reduce problem (5) to be an
optimization over a single epoch as follows
min
x1 ,y1 ,y2 ,ȳ2
s.t.
Fig. 5.
τ1
Second possible way to return to state (0, 0).
τ2
ȳ2 (τ1 , τ2 )
∀τ
∀τ
ȳ2 (τ1 , τ2 ) ≥ τ1 + τ2 ,
Fig. 6.
∀τ1 , τ2
x1
age
E [R (x1 , y1 , y2 , ȳ2 )]
E [L (x1 , y1 , y2 , ȳ2 )]
x1 ≥ 0
y1 (τ ) ≥ τ,
y2 (τ ) ≥ τ,
time
τ3
τ2
τ3
τ4
y2 (τ3 )
time
x1
Third possible way to return to state (0, 0).
(6)
where the expectation is on the energy arrival patterns in the
epoch. Note that the constraints on the functions y1 , y2 , and
ȳ2 , represent the energy causality constraints. Next, in order to
evaluate the expectations in the objective function, one needs
to study the different patterns that can occur in a single epoch.
We do so in the following subsection.
A. Renewal State Analysis
Consider the state (0, 0) as the renewal state1 , and without
loss of generality assume that we start at time 0. Let us now
state the possible ways of returning to that state. Note that
the sensor has to wait for at least one energy arrival to update
since it starts with no energy at state (0, 0).
• The first way to return to (0, 0) is to receive an energy
arrival after τ1 time units, and then update at y1 (τ1 ). This
could happen if and only if the following energy arrival,
occurring at τ2 time units after the first arrival, arrives
after y1 (τ1 ) − τ1 . See Fig. 4.
• The second way is to receive another energy arrival after
the first one, before using the first energy unit to update.
Then, submit the first update at ȳ2 (τ1 , τ2 ), which makes
the state become (1, 0), and then submit another update
after x1 time units. This could happen if and only if the
following energy arrival, occurring at τ3 time units after
the first update, is such that τ3 > x1 . See Fig. 5.
• The third way is exactly as the second way, but with
τ3 ≤ x1 , and hence the system goes to state (2, τ3 ) with
1 From Theorem 1, we know that both states (0, 0) and (1, 0) are renewal
states. While we choose to perform our analysis using state (0, 0), we note
that one can reach the same results if state (1, 0) is chosen instead.
•
the third energy arrival. Then, the sensor updates after
y2 (τ3 ) time units from the first update (as opposed to x1
in the second way), which makes the state become (1, 0),
and then finally submit a third update after x1 time units.
As before, this could happen if and only if the following
energy arrival, occurring at τ4 time units after the second
update, is such that τ4 > x1 . See Fig. 6.
In general, the mth way, m ≥ 3, begins exactly as in the
second way by submitting the first update at ȳ2 (τ1 , τ2 ).
Then, the second phase of the third way, namely, going
from state (1, 0) to (2, τ3 ) to (1, 0) again, keeps repeating
for m−2 times. By the end of these repetitions the system
will be in state (1, 0). This is finally followed by the mth
(and last) update after x1 time units. See Fig. 7.
Based on the above, one can write the area under the age
curve, R, in a single epoch as in equation (7) at the top
of the next page2 . There, 1A = 1 if event A is true, and
is 0 otherwise. Taking expectations and simplifying (mainly
through using the fact that τi ’s are i.i.d.), we get
Z x1
1
1 2
x1
2 −τ
x +e
y2 (τ ) e dτ
E [R] =
2 1
2
Z ∞
Z ∞ 0
1
y1 (τ )2 e−y1 (τ ) dτ
× 1−
e−y1 (τ ) dτ +
2
0
0
Z ∞ Z y1 (τ1 )−τ1
1
+
ȳ2 (τ1 , τ2 )2 e−τ1 e−τ2 dτ1 dτ2
2
τ1 =0 τ2 =0
(9)
2 From now onwards, we drop the dependency on the tuple (x , y , y , ȳ )
1 1 2 2
from R and L for convenience.
mth triangle
age
...
τ1
y2 (τ4 )
y2 (τ3 )
ȳ2 (τ1 , τ2 )
Fig. 7.
time
τm+1
τ4
τ3
τ2
x1
General mth possible way to return to state (0, 0), m ≥ 3.
1 2
1
1
2
2
ȳ2 (τ1 , τ2 ) + x1 1τ2 ≤y1 (τ1 )−τ1 1τ3 >x1
R = y1 (τ1 ) 1τ2 >y1 (τ1 )−τ1 +
2
2
2
1
1
1
+
ȳ2 (τ1 , τ2 )2 + y2 (τ3 )2 + x21 1τ2 ≤y1 (τ1 )−τ1 1τ3 ≤x1 1τ4 >x1
2
2
2
1
1
1
1
ȳ2 (τ1 , τ2 )2 + y2 (τ3 )2 + y2 (τ4 )2 + x21 1τ2 ≤y1 (τ1 )−τ1 1τ3 ≤x1 1τ4 ≤x1 1τ5 >x1
+
2
2
2
2
+ ...
L =y1 (τ1 )1τ2 >y1 (τ1 )−τ1 + (ȳ2 (τ1 , τ2 ) + x1 ) 1τ2 ≤y1 (τ1 )−τ1 1τ3 >x1
(7)
+ (ȳ2 (τ1 , τ2 ) + y2 (τ3 ) + x1 ) 1τ2 ≤y1 (τ1 )−τ1 1τ3 ≤x1 1τ4 >x1
+ (ȳ2 (τ1 , τ2 ) + y2 (τ3 ) + y2 (τ4 ) + x1 ) 1τ2 ≤y1 (τ1 )−τ1 1τ3 ≤x1 1τ4 ≤x1 1τ5 >x1
+ ...
Equation (9) is justified in Appendix B. Similarly, the epoch
length L is given by (8) at the top of this page, and its
expectation is given by
Z x1
E [L] = x1 + ex1
y2 (τ )e−τ dτ
Z ∞
Z ∞0
−y1 (τ )
× 1−
e
dτ +
y1 (τ )e−y1 (τ ) dτ
0
+
Z
∞
τ1 =0
Z
0
y1 (τ1 )−τ1
ȳ2 (τ1 , τ2 )e−τ1 e−τ2 dτ1 dτ2 (10)
τ2 =0
We use the above results to characterize the structure of the
optimal policy for problem (6) in the next subsection.
B. Optimal Solution for Problem (6): Threshold Policies
We define the following parameterized problem to characterize the optimal solution of problem (6)
p2 (λ) ,
min
x1 ,y1 ,y2 ,ȳ2
s.t.
E [R] − λE [L]
x1 ≥ 0
y1 (τ ) ≥ τ,
y2 (τ ) ≥ τ,
∀τ
∀τ
ȳ2 (τ1 , τ2 ) ≥ τ1 + τ2 ,
∀τ1 , τ2
(11)
where the subscript 2 in p2 (λ) denotes the B = 2 case that
we consider here. This approach has also been used in [42].
We now have the following lemma.
(8)
Lemma 1 p2 (λ) is decreasing in λ, and the optimal solution
of problem (6) is given by λ∗ that solves p2 (λ∗ ) = 0.
Proof: Let λ1 > 0, and let the solution of problem (11)
(1) (1) (1) (1)
for λ = λ1 , with the
be given by x1 , y1 , y2 , ȳ2
corresponding average area under the age curve
in the epoch
and the average epoch length given by E R(1) and E L(1) ,
respectively. Now for some λ2 > λ1 , one can write
h
i
h
i
p2 (λ1 ) = E R(1) − λ1 E L(1)
i
i
h
h
> E R(1) − λ2 E L(1)
≥ p2 (λ2 ).
(1)
(1)
(1)
(12)
(1)
where the last inequality follows since x1 , y1 , y2 , ȳ2
is also feasible in problem (11) for λ = λ2 .
Next, note that both problems (11) and (6) have the same
feasible set. In addition, if p2 (λ) = 0, then the objective
function of (6) satisfies E [R] /E [L] = λ. Hence, the objective
function of (6) is minimized by minimizing λ ≥ 0 such that
p2 (λ) = 0. Finally, by the first part of lemma, there can only
be one such λ, which we denote λ∗ .
By Lemma 1, one can simply use a bisection method to
find λ∗ that solves p2 (λ∗ ) = 0. This λ∗ certainly exists since
p2 (0) > 0 and limλ→∞ p2 (λ) = −∞. We focus on problem
(11) in the rest of this subsection, for which we introduce the
following Lagrangian [43]
Z
∞
L =E [R] − λE [L] − η1 x1 −
γ1 (τ ) (y1 (τ ) − τ ) dτ
0
Z ∞
−
γ2 (τ ) (y2 (τ ) − τ ) dτ
Z0 ∞ Z ∞
−
γ̄2 (τ1 , τ2 ) (ȳ2 (τ1 , τ2 ) − τ1 − τ2 ) dτ1 dτ2
0
0
(13)
where η1 , γ1 (·), γ2 (·), γ̄2 (·, ·) are Lagrange multipliers. Using (9) and (10), we take the (functional) derivative of the
Lagrangian with respect to ȳ2 (t1 , t2 ) and equate it to 0 to get
γ̄2 (t1 , t2 )
(14)
e−(t1 +t2 )
Now if t1 +t2 < λ, then ȳ2 (t1 , t2 ) has to be larger than t1 +t2 ,
for if it were equal, the right hand side of the above equation
would be larger than the left hand side. By complementary
slackness [43], we conclude that in this case γ̄2 (t1 , t2 ) = 0,
and hence ȳ2 (t1 , t2 ) = λ. On the other hand, if t1 + t2 ≥ λ,
then ȳ2 (t1 , t2 ) has to be equal to t1 + t2 , for if it were larger,
then by complementary slackness γ̄2 (t1 , t2 ) = 0 and the right
hand side of the above equation would be smaller than the left
hand side. In conclusion, we have
(
λ,
t1 + t2 < λ
ȳ2 (t1 , t2 ) =
(15)
t1 + t2 ,
t1 + t2 ≥ λ
ȳ2 (t1 , t2 ) = λ +
The above result says that starting from state (0, 0) the
sensor has to wait at least for λ time units before submitting
an update, provided that it received two consecutive energy
units (without using the first one to send an update) in that
epoch. If these two energy arrivals occur relatively early, i.e.,
t1 + t2 < λ, then the sensor updates exactly after λ time units
from the beginning of the epoch. Otherwise, if t1 + t2 ≥ λ,
then the sensor updates instantly after receiving the second
energy unit. We coin this type of policies λ-threshold policy,
where the sensor can only update if the age grows above a
certain threshold λ. Such policies were first introduced in the
solution of the case of B = 1 energy unit in [38], and have
also appeared in the random full battery recharges analysis in
[39]. We also note from the result in (15) that ȳ2 (t1 , t2 ) only
depends on the age at the second energy arrival, t1 + t2 .
Next, we take the derivative of the Lagrangian with respect
to y2 (t) and equate to 0 to get
y2 (t) = λ +
γ2 (t)
qex1 e−t
(16)
R∞
where q , 1 − 0 e−y1 (τ ) dτ . Note that q ∈ [0, 1] since
y1 (τ ) ≥ τ . Following the same arguments as in the ȳ2 case,
we get that
(
λ,
t<λ
y2 (t) =
(17)
t,
t≥λ
That is, y2 is also a λ-threshold policy, and ȳ2 (t1 , t2 ) =
y2 (t1 + t2 ). This settles the earlier question we posed at the
beginning of this section of whether receiving two energy
arrivals starting from state (0, 0) would lead to a different
policy than receiving one energy arrival starting from state
(1, 0); the optimal policy when the sensor has a full battery is
only a function of the age at the time of receiving the second
energy unit in the battery. Next, we take the derivative of the
Lagrangian with respect to x1 and equate to 0 to get
Z x1
1
2
x1
x1 =λ + e
λy2 (τ ) − y2 (τ ) e−τ dτ
2
0
1
η1
− 2
+ λy2 x−
+
(18)
1 − y2 x1
2
q
We now make an assumption that x1 > λ, and verify that assumption below. Based on that, y2 x−
1 = x1 from (17). One
can also use (17) to evaluate the integral in the above equation
in terms of λ and x1 . After some algebraic manipulations, we
get that for x1 > 0, η1 = 0 by complementary slackness, and
the following holds
1
(19)
x1 = log −λ 1 2
e − 2λ
where log is the natural logarithm. It is direct to see from (19)
that x1 > λ as assumed above.
Finally, we take the derivative of the Lagrangian with
respect to y1 (t) and equate to 0 to get
Z x1
1
1
x1
2
λy2 (τ ) − y2 (τ ) e−τ dτ + λx1 − x21
y1 (t) =λ + e
2
2
0
2
1
1
+ y1 (t)2 − ȳ2 t, (y1 (t) − t)−
2
2
γ1 (t)
−
− λy1 (t) + λȳ2 t, (y1 (t) − t)
+ −y (t)
(20)
e 1
We now make another assumption that y1 (t) > λ, ∀t, and
verify it below.
assumption, we conclude by
Based on this
−
= y1 (t). We substitute this in
(15) that ȳ2 t, (y1 (t) − t)
(20), and use (18) to get
γ1 (t)
(21)
e−y1 (t)
which verifies that y1 (t) > λ, ∀t, since x1 > λ. Similar to the
arguments used in deriving (15) and (17), we conclude from
(21) that y1 is an x1 -threshold policy given by
(
x1 ,
t < x1
y1 (t) =
(22)
t,
t ≥ x1
y1 (t) = x1 +
Similar to the discussion regarding the equivalence of ȳ2 and
y2 , we conclude from (22) that starting from state (0, 0) and
receiving one energy unit is equivalent to starting from state
(1, 0) and receiving no energy units; in both cases, the sensor
has the same threshold x1 after which it can update. Using
(15), (17), (19), and (22) we get that
1
p2 (λ) = λ2 + (λ + 1)e−λ + λ
2
1 2
1
−λ
− e − λ + 1 log
2
e−λ − 21 λ2
(23)
Long term average age
1.5
1
0.5
0
Optimal
z=0 (uniform)
z=1
z=2
Update policy
Fig. 8. Comparison of the optimal policy for B = 2 to other policies:
uniform updating, and energy-aware adaptive updating of [38].
It now remains to find λ∗ . Towards that, we first note that
we have an upper bound on λ∗ given by 0.9012, the solution
of the B = 1 case derived in [38]. We also have a lower bound
of 0.5, which is the optimal solution in the case of having an
infinite battery, also derived in [38]. Using bisection, we find
that the optimal solution at which p2 (λ∗ ) = 0 is given by
λ∗ ≈ 0.72, with the corresponding x∗1 ≈ 1.48. Observe that
the fact that x∗1 is larger than λ∗ implies the intuitive behavior
that the sensor is less eager to send an update if it has only
one energy unit, compared to when it has a full battery of two
energy units.
C. Comparison to Other Policies
We now compare the optimal result derived above with
other schemes and system models in the literature. We first
compare it to the energy-aware adaptive status update policy
introduced and analyzed in [38]. In there, the sensor schedules
its next update based on the amount of energy in its battery;
if the energy is less than B/2, it schedules the next update
after 1/(1 − β) time units, for some constant β < 1; if the
energy is larger than B/2, it schedules the next update after
1/(1 + β) time units; and if the energy is exactly equal to
B/2, it schedules the next update after 1 time unit. Then,
if the sensor has no energy at its scheduled update time, it
stays silent, and reschedules its following update accordingly
after 1/(1−β) time units. We note that for β = 0, this energyaware status update policy transforms into a best effort uniform
update policy, which is the optimal solution for the infinite
battery case [38]. We also note that the constant β is chosen
in [38] such that the policy is asymptotically optimal in the
battery size. Specifically, it is chosen equal to z log B/B for
some positive integer z that controls the policy’s asymptotic
behavior. We compare our optimal policy to the energy-aware
policy above for z = 2, z = 1, and z = 0 (uniform update
policy) in Fig. 8. We see that it outperforms all of them.
Finally, we compare the optimal policy to our recent results
on an altered system model of the same problem [39]. There,
the battery is fully recharged randomly over time, i.e., energy
arrives in chunks of B energy units, as opposed to the incremental unit recharges considered in this work. We consider
two situations of this random battery recharges to compare
with. The first is when the Poisson arrival process is of unit
rate, and the second is when it is of rate 1/2. The second
case corresponds to an average recharge rate of B/2 = 1
energy unit per unit time, as considered in this work. From
[39], the optimal long term average age for the first situation
is given by r1∗ = 0.59. While the analysis in [39] is done for a
Poisson arrival process of unit rate, it can be directly extended
to account for that of rate 1/2; this gives the optimal long term
average age for the second situation by r2∗ = 1.18, which is
double r1∗ , since the average recharge rate is reduced to half.
We conclude from this that while it is clearly better to have
the battery recharged by 2 energy units, as opposed to only 1,
every one time unit on average (r1∗ < λ∗ ), it is worse to be
recharged by 2 energy units every 2 time units on average, as
opposed to 1 energy unit per unit time (r2∗ > λ∗ ), although the
recharge rate is the same. The latter conclusion for the second
situation is due to the fact that the system with 1 energy unit
recharge per unit time considered in this work gives more
flexibility to the sensor on when to update compared to the
system with 2 energy units recharge every 2 time units. This
flexibility allows the sensor to submit updates more uniformly
over time, which achieves better age by convexity of the square
function that governs the areas of the triangles constituting the
total area under the age curve to be minimized.
V. C ONCLUSION
AND
F UTURE D IRECTIONS
We have characterized optimal online policies for energy
harvesting sensors with B-sized batteries that minimize the
long term average age of information, subject to energy
causality constraints. We have considered a noiseless channel
where a transmission update consumes one energy unit and
arrives instantaneously at the receiver. Under a Poisson energy
arrival process with unit rate, energy units arrive at the sensor’s
battery in an incremental fashion, i.e., one energy unit per
arrival. We first have shown that the optimal status update
policy has a renewal structure. Specifically, the times between
the two consecutive events of submitting an update and having
k energy units remaining in the battery afterwards, 0 ≤ k ≤
B − 1, are i.i.d. Then, we have thoroughly studied the specific
scenario of B = 2 energy units and further shown that the
optimal renewal policy has an energy-dependent threshold
structure: the sensor submits an update only if the age of
information surpasses a certain threshold which is a function
of the energy available in its battery.
From the analysis of the B = 2 case, it is amenable to
show that threshold policies are also optimal for any B ≥
3. One main difficulty in showing that is the combinatorial
nature of how the different B random variables that govern the
energy arrivals in between inter-updates are related. Similar
to the approaches in [15]–[20], it is therefore of interest to
study near-optimal renewal-type policies that provably perform
within a constant gap from the optimal solution of problem
(5) in future works.
A PPENDIX
A. Proof of Theorem 1
We prove this by showing that any given status update
policy that is uniformly bounded according to Definition 1 is
outperformed by a renewal policy as defined in the theorem.
Let us consider the ith epoch (time between two consecutive
visits to state (k, 0)); we introduce the following notation
regarding the energy arrivals occurring in it. Let τ1,i denote
the time until the first energy arrival after the epoch starts, and
let there be j1 status updates after that energy arrival before
a second energy arrival occurs. If j1 ≥ 1, then let τ2,i denote
the time until the first energy arrival after the j1 th update.
Otherwise, if j1 = 0, then let τ2,i denote the inter-arrival time
between the first and the second energy arrivals in the epoch.
Similarly, let there be j2 status updates after the second energy
arrival before a third energy arrival occurs. If j2 ≥ 1, then let
τ3,i denote the time until the first energy arrival after the j2 th
update. Otherwise, if j2 = 0, then let τ3,i denote the interarrival time between the second and the third energy arrivals
in the epoch. We continue defining τj,i ’s, j = 1, 2, . . . , until
the epoch ends by retuning back to state (k, 0) again. Finally,
in the event that the jth energy arrival in the epoch makes the
battery full, then we wait until the first status update occurs
after that event and denote by τj+1,i the time until the first
energy arrival after that update, i.e., we do not account for
energy arrivals that cause battery overflows.
As noted before Theorem 1, there can possibly be an infinite
number of updates before the system returns back to state
(k, 0), depending on the energy arrival pattern and the update
time decisions. For a given status update policy, one can
enumerate all such patterns. For instance, following the above
notation, the first pattern could be when the system goes from
state (k, 0) to state (k + 1, τ1,i ) and then to state (k, 0) again;
the second pattern could be when the system goes through
the following sequence of states: (k, 0) − (k + 1, τ1,i ) − (k +
2, τ1,i +τ2,i )−(k+1, 0)−(k, 0); and so on. Let the vector τm,i
contain all the τj,i ’s in the mth pattern. Note that this vector’s
length varies with the pattern. For instance, we have τ1,i = τ1,i
and τ2,i = [τ1,i , τ2,i ] for the above two pattern examples,
respectively. For a given status update policy, one can also
compute the probability of occurrence P
of the mth pattern in
∞
the ith epoch, denoted by pm,i , with
m=1 pm,i = 1. Let
us also denote by Rm,i the area under the age curve in that
epoch, given that it went through the mth pattern.
Next, for a fixed history Hi−1 and a pattern m, let us group
all the status updating sample paths that have the same τm,i
and perform a statistical averaging over all of them to get
the following average age in the ith epoch given that it went
through the mth pattern
R̂m,i (γm , Hi−1 ) , E [Rm,i |τm,i = γm , Hi−1 ]
(24)
Now for a given time T , let NT denote the number of epochs
that have already started by time T . Then, we have
E [Rm,i · 1i≤NT ]
i
h
h
i
= EHi−1 Eτm,i R̂m,i (γm , Hi−1 ) · 1i≤NT Hi−1 (25)
where equality follows since 1i≤NT is independent of τm,i
given Hi−1 . Similarly, let xk,m,i denote the length of the
ith epoch under the mth pattern, and define its (conditional)
average as
x̂k,m,i (γm , Hi−1 ) , E [xk,m,i |τm,i = γm , Hi−1 ]
(26)
Finally, we denote by Ri and xk,i the area under the age
curve in the ith epoch and its length, respectively, irrespective
of which pattern it went through.
Next, note that by (4), the following holds
∞
∞
1 X
1 X
r(T )
Ri 1i≤NT −1 ≤
Ri 1i≤NT
≤
T i=1
T
T i=1
(31)
Following similar analysis as in [38, Appendix C-1], one can
show that
E [RNT ]
=0
(32)
lim
T →∞
T
for any uniformly bounded policy as in Definition 1. Hence,
the expected values of the upper and lower bounds in (31)
are equal as T → ∞.
P∞Hence, in the sequel, we derive a
lower bound on T1 E [ i=1 Ri 1i≤NT ] and use the above note
)]
as T → ∞.
to conclude that it is also a lowerPbound on E[r(T
T
∞
Towards that end, note that E [ i=1 xk,i 1i≤NT ] ≥ T . Then,
we have
#
"∞
P∞
X
E [ i=1 Ri 1i≤NT ]
1
P∞
Ri 1i≤NT ≥
E
(33)
T
E [ i=1 xk,i 1i≤NT ]
i=1
We now proceed by lower bounding the right hand side
of the above equation through a series of equations at the
top of the next page. In there, (27) follows from (25) and
the monotone convergence
theorem, together with the fact
P
that E [Ri ] = P∞
p
E
[Rm,i ]; R∗ (Hi−1 ) is the minim,i
m=1
∞
p
E
[R̂m,i (γm ,Hi−1 )]
m,i
τ
mum value of P∞m=1pm,i Eτ m,i[x̂k,m,i (γm ,Hi−1 )] ; and Rmin is
m=1
m,i
the minimum value of R∗ (Hi−1 ) over all possible epochs
and their corresponding histories, i.e., the minimum over all
iPand Hi−1 . This, together with the fact that E [xk,i ] =
∞
m=1 pm,i E [xk,m,i ], gives the last inequality.
Observe that a policy achieving R∗ (Hi−1 ) is a policy which
is a function of the possible energy arrival patterns in the
ith epoch τm,i ’s only, since the history Hi−1 is fixed. Since
the energy arrival process is Poisson with rate 1, it follows
that the random vector τm,i consists of i.i.d. exponential
random variables with parameter 1, and that {τm,i } are also
independent across epochs. Therefore, if we repeat the policy
that achieves Rmin over all epochs, we get a renewal policy
where the epoch lengths are also i.i.d., and {li } forms a
renewal process. This completes the proof.
i
i
h
hP
P∞
∞
P∞
m=1 pm,i Eτm,i R̂m,i (γm , Hi−1 ) · 1i≤NT Hi−1
i=1 EHi−1
E [ i=1 Ri 1i≤NT ]
P
P
=
(27)
E[ ∞
E[ ∞
i=1 xk,i 1i≤NT ]
i=1 xk,i 1i≤NT ]
P∞
P∞
P∞
m=1 pm,i Eτm,i [R̂m,i (γm ,Hi−1 )]
P∞
· 1i≤NT Hi−1
i=1 EHi−1
m=1 pm,i Eτm,i [x̂k,m,i (γm , Hi−1 )] ·
m=1 pm,i Eτm,i [x̂k,m,i (γm ,Hi−1 )]
P∞
=
E [ i=1 xk,i 1i≤NT ]
(28)
i
hP
P∞
∞
∗
i=1 EHi−1
m=1 pm,i Eτi [x̂k,m,i (γ, Hi−1 )] · R (Hi−1 ) · 1i≤NT Hi−1
P
(29)
≥
E[ ∞
i=1 xk,i 1i≤NT ]
≥ Rmin
(30)
B. Justification of (9)
First, we have
1
2
E y1 (τ1 ) 1τ2 >y1 (τ1 )−τ1
2
Z ∞ Z ∞
1
y1 (τ1 )2 e−τ1 e−τ2 dτ2 dτ1
=
2
τ1 =0 τ2 =y1 (τ1 )−τ1
Z ∞
1
=
y1 (τ1 )2 e−τ1 e−(y1 (τ1 )−τ1 ) dτ1
τ1 =0 2
Z ∞
1
y1 (τ1 )2 e−y1 (τ1 ) dτ1
(34)
=
2
τ1 =0
Next, let us define
1 2
1
2
ȳ2 (τ1 , τ2 ) + x1 1τ2 ≤y1 (τ1 )−τ1
α,E
2
2
(35)
Since τm is independent of τ1 and τ2 for m ≥ 3, and
are
Pthey
∞
all i.i.d., we have that the term α gets multiplied by i=1 (1−
e−x1 )i−1 e−x1 = 1 when we compute E[R]. Note that
E 1τ2 ≤y1 (τ1 )−τ1 = 1 − P [τ2 > y1 (τ1 ) − τ1 ]
Z ∞ Z ∞
e−τ1 e−τ2 dτ2 dτ1
=1−
τ =0 τ2 =y1 (τ1 )−τ1
Z 1∞
e−τ1 e−(y1 (τ1 )−τ1 ) dτ1
=1−
Zτ1∞=0
=1−
e−y1 (τ1 ) dτ1
(36)
τ1 =0
and hence the term α can be expanded to
Z ∞
1 2
−y1 (τ1 )
e
dτ1
α = x1 1 −
2
τ1 =0
Z ∞ Z y1 (τ1 )−τ1
1
+
ȳ2 (τ1 , τ2 )2 e−τ1 e−τ2 dτ1 dτ2 (37)
2
τ1 =0 τ2 =0
Next, let us define
Z x1
1
y2 (τm )2 e−τm dτm ,
βm ,
2
0
m≥3
(38)
Now observe that, again by the fact that τi ’s are i.i.d., the
terms βm ’s appear as follows when we take E[R]
β3 E
1τ2 ≤y1 (τ1 )−τ1 +
= β3 E
x1
∞
X
m=4
∞
X
1τ2 ≤y1(τ1 )−τ1
= e β3 1 −
Z
∞
βm E
e
τ1 =0
1τ2 ≤y1 (τ1 )−τ1
i=0
dτ1
E [1τi ≤x1 ]
i=3
1 − e−x1
−y1 (τ1 )
m
Y
i
(39)
where the second equality follows since βm is the same for
all m. Equations (34), (37), and (39) yield E[R] in (9).
R EFERENCES
[1] J. Yang and S. Ulukus. Optimal packet scheduling in an energy
harvesting communication system. IEEE Trans. Commun., 60(1):220–
230, January 2012.
[2] K. Tutuncuoglu and A. Yener. Optimum transmission policies for
battery limited energy harvesting nodes. IEEE Trans. Wireless Commun.,
11(3):1180–1189, March 2012.
[3] O. Ozel, K. Tutuncuoglu, J. Yang, S. Ulukus, and A. Yener. Transmission
with energy harvesting nodes in fading wireless channels: Optimal
policies. IEEE JSAC, 29(8):1732–1743, September 2011.
[4] C. K. Ho and R. Zhang. Optimal energy allocation for wireless
communications with energy harvesting constraints. IEEE Trans. Signal
Process., 60(9):4808–4818, September 2012.
[5] J. Yang, O. Ozel, and S. Ulukus. Broadcasting with an energy harvesting
rechargeable transmitter. IEEE Trans. Wireless Commun., 11(2):571–
583, February 2012.
[6] O. Ozel, J. Yang, and S. Ulukus. Optimal broadcast scheduling for an
energy harvesting rechargebale transmitter with a finite capacity battery.
IEEE Trans. Wireless Commun., 11(6):2193–2203, June 2012.
[7] M. A. Antepli, E. Uysal-Biyikoglu, and H. Erkal. Optimal packet
scheduling on an energy harvesting broadcast link. IEEE JSAC,
29(8):1721–1731, September 2011.
[8] J. Yang and S. Ulukus. Optimal packet scheduling in a multiple
access channel with energy harvesting transmitters. Journal of Commun.
Networks, 14(2):140–150, April 2012.
[9] K. Tutuncuoglu and A. Yener. Sum-rate optimal power policies for
energy harvesting transmitters in an interference channel. Journal
Commun. Networks, 14(2):151–161, April 2012.
[10] C. Huang, R. Zhang, and S. Cui. Throughput maximization for the
Gaussian relay channel with energy harvesting constraints. IEEE JSAC,
31(8):1469–1479, August 2013.
[11] D. Gunduz and B. Devillers. Two-hop communication with energy
harvesting. In Proc. IEEE CAMSAP, December 2011.
[12] B. Gurakan and S. Ulukus. Cooperative diamond channel with energy
harvesting nodes. IEEE JSAC, 34(5):1604–1617, May 2016.
[13] B. Varan and A. Yener. Delay constrained energy harvesting networks
with limited energy and data storage. IEEE JSAC, 34(5):1550–1564,
May 2016.
[14] A. Arafa, A. Baknina, and S. Ulukus. Energy harvesting two-way
channels with decoding and processing costs. IEEE Trans. Green
Commun. and Networking, 1(1):3–16, March 2017.
[15] D. Shaviv and A. Ozgur. Universally near optimal online power control
for energy harvesting nodes. IEEE JSAC, 34(12):3620–3631, December
2016.
[16] H. A. Inan and A. Ozgur. Online power control for the energy harvesting
multiple access channel. In Proc. WiOpt, May 2016.
[17] A. Baknina and S. Ulukus. Energy harvesting multiple access channels:
Optimal and near-optimal online policies. IEEE Trans. Commun. To
appear.
[18] A. Baknina and S. Ulukus. Optimal and near-optimal online strategies
for energy harvesting broadcast channels. IEEE JSAC, 34(12):3696–
3708, December 2016.
[19] A. Baknina and S. Ulukus. Online scheduling for energy harvesting
channels with processing costs. IEEE Trans. Green Commun. and
Networking, 1(3):281–293, September 2017.
[20] A. Arafa, A. Baknina, and S. Ulukus. Energy harvesting networks with
general utility functions: Near optimal online policies. In Proc. IEEE
ISIT, June 2017.
[21] S. Kaul, R. Yates, and M. Gruteser. Real-time status: How often should
one update? In Proc. IEEE Infocom, March 2012.
[22] R. Yates and S. Kaul. Real-time status updating: Multiple sources. In
Proc. IEEE ISIT, July 2012.
[23] C. Kam, S. Kompella, and A. Ephremides. Age of information under
random updates. In Proc. IEEE ISIT, July 2013.
[24] M. Costa, M. Codreanu, and A. Ephremides. On the age of information
in status update systems with packet management. IEEE Trans. Inf.
Theory, 62(4):1897–1910, April 2016.
[25] A. Kosta, N. Pappas, A. Ephremides, and V. Angelakis. Age and value
of information: Non-linear age case. In Proc. IEEE ISIT, June 2017.
[26] Y. Sun, E. Uysal-Biyikoglu, R. Yates, C. E. Koksal, and N. B. Shroff.
Update or wait: How to keep your data fresh. IEEE Trans. Inf. Theory,
63(11):7492–7508, November 2017.
[27] A. M. Bedewy, Y. Sun, and N. B. Shroff. Age-optimal information
updates in multihop networks. In Proc. IEEE ISIT, June, 2017.
[28] Y. Hsu, E. Modiano, and L. Duan. Age of information: Design and
analysis of optimal scheduling algorithms. In Proc. IEEE ISIT, June
2017.
[29] J. Zhong, E. Soljanin, and R. D. Yates. Status updates through multicast
networks. In Proc. Allerton, October 2017.
[30] E. Najm and E. Telatar. Status updates in a multi-stream M/G/1/1
preemptive queue. Available Online: arXiv1801.04068.
[31] R. Yates, E. Najm, E. Soljanin, and J. Zhong. Timely updates over an
erasure channel. In Proc. IEEE ISIT, June 2017.
[32] R. D. Yates, P. Ciblat, A. Yener, and M. A. Wigger. Age-optimal
constrained cache updating. In Proc. IEEE ISIT, June 2017.
[33] R. D. Yates. Lazy is timely: Status updates by an energy harvesting
source. In Proc. IEEE ISIT, June 2015.
[34] B. T. Bacinoglu, E. T. Ceran, and E. Uysal-Biyikoglu. Age of information under energy replenishment constraints. In Proc. ITA, February
2015.
[35] A. Arafa and S. Ulukus. Age-minimal transmission in energy harvesting
two-hop networks. In Proc. IEEE Globecom, December 2017.
[36] A. Arafa and S. Ulukus. Age minimization in energy harvesting
communications: Energy-controlled delays. In Proc. Asilomar, October
2017.
[37] B. T. Bacinoglu and E. Uysal-Biyikoglu. Scheduling status updates to
minimize age of information with an energy harvesting sensor. In Proc.
IEEE ISIT, June 2017.
[38] X. Wu, J. Yang, and J. Wu. Optimal status update for age of information
minimization with an energy harvesting source. IEEE Trans. Green
Commun. and Networking. To appear.
[39] A. Arafa, J. Yang, and S. Ulukus. Age-minimal online policies for
energy harvesting sensors with random battery recharges. In Proc. IEEE
ICC, May 2018.
[40] A. Baknina, O. Ozel, J. Yang, S. Ulukus, and A. Yener. Sending
information through status updates. Available Online: arXiv:1801.04907.
[41] S. M. Ross. Stochastic Processes. Wiley, 1996.
[42] Y. Sun, Y. Polyanskiy, and E. Uysal-Biyikoglu. Remote estimation of
the wiener process over a channel with random delay. In Proc. IEEE
ISIT, June 2017. Longer version available: arXiv:1701.06734.
[43] S. P. Boyd and L. Vandenberghe. Convex Optimization. Cambridge
University Press, 2004.
| 7cs.IT
|
COMPUTATIONAL POWER AND THE SOCIAL
IMPACT OF ARTIFICIAL INTELLIGENCE
Tim Hwang1
Machine learning is a computational process. To that end, it is inextricably
tied to computational power - the tangible material of chips and
semiconductors that the algorithms of machine intelligence operate on.
Most obviously, computational power and computing architectures shape
the speed of training and inference in machine learning, and therefore
influence the rate of progress in the technology. But, these relationships are
more nuanced than that: hardware shapes the methods used by researchers
and engineers in the design and development of machine learning models.
Characteristics such as the power consumption of chips also define where
and how machine learning can be used in the real world.
In a broader perspective, computational power is also important because of
its specific geographies. Semiconductors are designed, fabricated, and
deployed through a complex international supply chain. Market structure
and competition among companies in this space influence the progress of
machine learning. Moreover, since these supply chains are also considered
significant from a national security perspective, hardware becomes an
arena in which government industrial and trade policy has a direct impact
on the fundamental machinery necessary for artificial intelligence (AI).
This paper aims to dig more deeply into the relationship between
computational power and the development of machine learning.
Specifically, it examines how changes in computing architectures, machine
learning methodologies, and supply chains might influence the future of AI.
In doing so, it seeks to trace a set of specific relationships between this
underlying hardware layer and the broader social impacts and risks around
AI. On one hand, this examination shines a spotlight on how hardware
works to exacerbate a range of concerns around ubiquitous surveillance,
technological unemployment, and geopolitical conflict. On the other, it also
highlights the potentially significant role that shaping the development of
computing power might play in addressing these concerns.
***
1
Research Affiliate, MIT Media Lab.
1
Introduction
1
Part I
Machine Learning and Computational Power
The Tropes of Computational Power
6
7
Part II
Specialization in Computational Power
Impact: The Geography of Training and Inference
14
14
Part III
Supply Chain and Computational Power
Impact: The Geopolitics of Machine Learning
18
32
Part IV
Computational Power as Data Substitute
Impact: Computational Power and Economic Impact
36
36
Conclusion: Prospects for Governance
43
***
INTRODUCTION
Machine learning is a computational process. To that end, it is
inextricably tied to computational power - the tangible material of chips and
semiconductors that the algorithms of machine intelligence operate on.
Most obviously, computational power and computing architectures shape
the speed of training and inference in machine learning, and therefore
influence the rate of progress in the technology. But, these relationships are
more nuanced than that: hardware shapes the methods used by researchers
and engineers in the design and development of machine learning models.
Characteristics such as the power consumption of chips also define where
and how machine learning can be used in the real world.
In a broader perspective, computational power is also important
because of its specific geographies. Semiconductors are designed,
fabricated, and deployed through a complex international supply chain.
Market structure and competition among companies in this space influence
the progress of machine learning. Moreover, since these supply chains are
also considered significant from a national security perspective, hardware
2
becomes an arena in which government industrial and trade policy has a
direct impact on the fundamental machinery necessary for artificial
intelligence (AI).
Despite this, many analyses of the social impact of the current wave
of progress in AI have not substantively brought the dimension of hardware
into their accounts. While a common trope in both the popular press and
scholarly literature is to highlight the massive increase in computational
power that has enabled the recent breakthroughs in machine learning, the
analysis frequently goes no further than this observation around magnitude.
This paper aims to dig more deeply into the relationship between
computational power and the development of machine learning.
Specifically, it examines how changes in computing architectures, machine
learning methodologies, and supply chains might influence the future of AI.
In doing so, it seeks to trace a set of specific relationships between this
underlying hardware layer and the broader social impacts and risks around
AI. On one hand, this examination shines a spotlight on how hardware
works to exacerbate a range of concerns around ubiquitous surveillance,
technological unemployment, and geopolitical conflict. On the other, it also
highlights the potentially significant role that shaping the development of
computing power might play in addressing these concerns.
Part I will examine the role that computational power has played in
the progress of machine learning, arguing that its impact has been
somewhat flattened in recent accounts looking at the social impact of the
technology. Part II will look at trends towards increasing specialization in
the hardware used for machine learning, and its implications for control and
privacy in the space. Part III will look at the semiconductor supply chain,
and its implications for the geopolitics of machine learning. Part IV will
examine research developments changing the balance between data and
computational power in the workflow of machine learning, and its influence
on the economic impact of the technology. It will then conclude with some
remarks on the potential role of hardware as a lever for policy action in the
space.
PART I: MACHINE LEARNING AND COMPUTATIONAL POWER
3
AI has historically moved through multiple cycles of progress and
optimism followed by setbacks and pessimism, so called “AI winters”.2
Present-day excitement around AI, and more specifically the recent
breakthroughs in the subfield of machine learning, represent only the latest
upswing in this historical pattern.
Machine learning itself, the study of algorithms which improve
themselves through data, is not a new domain of research. The
fundamentals underlying the modern advances in the field were established
by researchers in the 1950s and developed throughout the subsequent
decades.3
However, neural networks - the specific technique of machine
learning driving much of the commercial interest in AI today - were still
considered a niche area of research only until relatively recently. As one
popular account has put it, “for much of its history most computer scientists
saw it [neural networks] as vaguely disreputable, even mystical.”4 It was
recognized early in this history that the neural networks proposed during the
1950s and 1960s were limited by the comparatively minimal processing
power available at the time.5 The continued growth of computational power,
along with the accumulation of large datasets during the 1990s and 2000s,
played a major role in revitalizing progress in neural networks and
motivating significant investment within the field of AI more broadly.
The field of computer vision, which focuses on advancing the ability
for machines to extract understanding from images and video, offers one
representative example on this point. “Traditional” approaches to these
tasks in the 1990s and early 2000s focused on algorithms which specified a
set of defined features that would be used to process and classify an image.6
For an account of this history, see generally John Markoff, Machines of Loving Grace:
The Quest for Common Ground Between Humans and Robots (2015).
3 See, e.g., B. Farley & W. Clark, Simulation of self-organizing systems by digital
computer, 4 Transactions of the IRE Professional Group on Information Theory 76–84
(1954).
4 Gideon Lewis-Kraus, The Great A.I. Awakening, The New York Times, December 14,
2016, https://www.nytimes.com/2016/12/14/magazine/the-great-ai-awakening.html (last
visited Mar 20, 2018).
5 See Marvin Minsky & Seymour A. Papert, Perceptrons: An Introduction to
Computational Geometry (1969) (noting these limitations).
6 See, e.g., D.G. Lowe, Object recognition from local scale-invariant features, 1150–1157
vol.2 (1999), http://ieeexplore.ieee.org/document/790410/ (last visited Mar 20, 2018)
(describing the SIFT algorithm, one representative approach).
2
4
Neural networks, in contrast, learn the relevant features for classification
rather than having them pre-designed into the algorithm.7
Expanding computational power and the availability of data changed
the practice of computer vision. On the data front, the growth of the
consumer web produced a vast library of images for machine learning
systems to train on. ImageNet, an annotated dataset of 14 million images in
20 thousand categories assembled by workers on the Amazon Mechanical
Turk platform, provided a common dataset for researchers to work with.8
Computational power also continued to increase in the 2000s, rising from
37 million transistors per chip in 2000 to 2.3 billion transistors per chip by
2009.9 This was augmented by the finding that a particular kind of
computational architecture - the GPU - was particularly well-suited as a
platform for neural networks, a development discussed in more detail in
Part II.10
Leveraging both of these assets, neural networks were able to
significantly surpass the performance of earlier techniques in the space.11
The ImageNet Large Scale Visual Recognition Challenge is a commonly
cited marker of this transition. Hosted since 2010, the Challenge brings
together researchers to compete in designing systems to solve a set of visual
recognition tasks.12 Performance in 2010 and 2011, which featured teams
using traditional techniques in the space, were never able to reduce error
rates below 25%, with most teams showing much higher rates of error.13
See, e.g., Alex Krizhevsky, Ilya Sutskever & Geoffrey E. Hinton, ImageNet classification
with deep convolutional neural networks, 60 Communications of the ACM 84–90 (2017)
(demonstrating this learned feature approach).
8 Dave Gershgorn, The data that transformed AI research—and possibly the world Quartz,
https://qz.com/1034972/the-data-that-changed-the-direction-of-ai-research-and-possiblythe-world/ (last visited Mar 20, 2018).
9 Moore’s Law: Transistors per microprocessor, Our World in Data,
https://ourworldindata.org/grapher/transistors-per-microprocessor (last visited Mar 20,
2018).
10 See Rajat Raina, Anand Madhavan & Andrew Y. Ng, Large-scale deep unsupervised
learning using graphics processors, 1–8 (2009),
http://portal.acm.org/citation.cfm?doid=1553374.1553486 (last visited Mar 20, 2018).
11 Cf. From not working to neural networking, The Economist, 2016,
https://www.economist.com/news/special-report/21700756-artificial-intelligence-boombased-old-idea-modern-twist-not (last visited Mar 20, 2018).
12 ImageNet Large Scale Visual Recognition Challenge (ILSVRC), http://www.imagenet.org/challenges/LSVRC/ (last visited Mar 20, 2018).
13 Id.
7
5
AlexNet, a system submitted to the competition by researchers
Geoffrey Hinton, Ilya Sutskever, and Alex Krizhevsky in 2012, was both
the first entry to apply neural networks in the Challenge and the first to
achieve a below 25% error rate.14 The excitement around these results, and
the margin of improvement over established techniques, led one researcher
to state that the “Imagenet 2012 event was definitely what triggered the big
explosion of AI today”.15
Computational power has for this reason been fundamental to the
present-day breakthroughs in machine learning. Even if the necessary data
been widely available at an earlier point historically, a lack of
computational power would have effectively prevented neural networks
from achieving their current level of performance.
The Tropes of Computational Power
The narrative of computational power and machine learning typically
ends here. Recent pieces examining these technological breakthroughs have
often focused more on the implications of what the technology can do,
rather than the implications of how it is being done.16 To the extent that
computational power is mentioned, it is typically addressed simply as an
enabling factor in the emergence of machine learning. The prevailing
attribute highlighted in these accounts has tended to be one of magnitude:
the processing power of the chips running machine learning have been seen
as their primary contribution.
The 2016 White House report Preparing for the Future of Artificial
Intelligence is illustrative. The paper focuses on computational power only
in passing as one of the three factors enabling the present-day
breakthroughs in machine learning. “[T]he availability of big
data…dramatically improved machine learning approaches and
algorithms…the capabilities of more powerful computers.”17 An
Id.
See supra note 8 (for a visualization of these results).
16 See, e.g., JURI Committee, European Civil Law Rules in Robotics (2016), available at
http://www.europarl.europa.eu/RegData/etudes/STUD/2016/571379/IPOL_STU(2016)571
379_EN.pdf; Urs Gasser, AI and the Law: Setting the Stage, Medium (2017),
https://medium.com/berkman-klein-center/ai-and-the-law-setting-the-stage-48516fda1b11
(last visited Mar 20, 2018).
17 White House National Science and Technology Council, Preparing for the Future of
Artificial Intelligence 6 (2016), available at
14
15
6
accompanying paper released at the same time, The National Artificial
Intelligence Research and Development Plan, highlights improved
hardware for machine learning as a priority, but only to the extent that chips
with higher levels of performance are needed to drive the technology
forwards.18 Other reports from the European Union, civil society groups,
and researchers on the topic of AI have followed a similar set of themes
when considering the role of computational power.19
This narrative perhaps leaves out an important part of the story. Such
a shorthand enables a focus on the numerous problematic ways that
machine learning might be applied and the implications of those
applications for justice, equity, and a host of other values. However, it also
flattens out the role that computational power plays in these issues to simply
that of a trigger for technological progress. This may miss the significant
and nuanced ways that hardware influences the impact of AI on these
broader values and social concerns.
Computational power does more than simply make the present-day
breakthroughs in machine learning possible. The medium is a significant
message here: hardware actively shapes the landscape of what can be done
with the technology of machine learning, and plays a significant role in
influencing how it will evolve going forwards.
The contours of computational power play a role in defining who has
control over and access to the benefits of machine learning, and the actors
that will play a role in its governance. It plays a role in the politics of the
technology, both at the level of an individual citizen and in the broader
competition between states. Computational power, in defining the speed at
which machine learning models may trained and experimented on, shapes
the speed at which the technology advances and therefore serves to define
https://obamawhitehouse.archives.gov/sites/default/files/whitehouse_files/microsites/ostp/
NSTC/preparing_for_the_future_of_ai.pdf.
18 White House National Science and Technology Council, The National Artificial
Intelligence Research and Development Strategic Plan 21 (2016).
19 See e.g., Royal Society (Great Britain), Machine learning: the power and promise of
computers that learn by example (2017) available at
https://royalsociety.org/~/media/policy/projects/machine-learning/publications/machinelearning-report.pdf; House of Commons Science and Technology Committee, Robotics and
Artificial Intelligence (2016),
https://publications.parliament.uk/pa/cm201617/cmselect/cmsctech/145/145.pdf; World
Economic Forum, Assessing the Risk of Artificial Intelligence, Global Risks Report 2017,
http://wef.ch/2izSQRP (last visited Mar 22, 2018); David Bollier, Artificial Intelligence:
The Great Disruptor, Aspen Institute (2018) available at
http://csreports.aspeninstitute.org/documents/AI2017.pdf.
7
its broader economic impact. These impacts turn on more than simply the
amount of processing power available, but on the details of computational
architecture, supply chains, and the co-evolution of the machine learning
field itself.
To that end, the evolving research and commercial ecosystem around
hardware is more than just a sideshow: shifts in these underlying
technologies have a significant place in understanding the impact of AI on
society as a whole. Parts II, III, and IV work to map these many connections
by drawing the lines from the changing landscape of computational power
to the bigger social challenges surrounding AI.
PART II: SPECIALIZATION IN COMPUTATIONAL POWER
Computational power is not a simple matter of magnitude. The
specific architecture of a chip plays a major role in determining whether or
not it is effective in dealing with a given computational task. In general, the
industry has tended towards increasingly specialized platforms for machine
learning as the field continues to grow and attract commercial interest. In
this sense, hardware has moved in a direction opposite to software: a shift
towards narrower specialization in chips has proceeded even as the research
field has been focused on building ever more general learning systems.
Two dynamics shape this marketplace for machine learning hardware.
One is an inverse relationship between performance and flexibility.20 While
general purpose computing power can take on a wide range of tasks and can
be easily configured to take on new tasks, it tends to be outpaced by
hardware which is built for a specific purpose.21 However, this increased
performance comes at a cost: specialized hardware accommodates a
relatively smaller set of use cases and has an architecture which is less easy
to change after it is deployed.22 These specialized platforms are also
frequently more expensive than commodified general platforms.23 One
overarching question is whether the demand for machine learning driven
See generally Inside the Microsoft FPGA-based configurable cloud, Channel 9,
https://channel9.msdn.com/Events/Build/2017/B8063 (last visited Mar 20, 2018)
(discussing these trade-offs).
21 See Griffin Lacey, Graham W. Taylor & Shawki Areibi, Deep Learning on FPGAs:
Past, Present, and Future, arXiv:1602.04283, 6 (2016), http://arxiv.org/abs/1602.04283
(last visited Feb 13, 2018) (discussing cost differentials).
22 Id.
23 Id.
20
8
products and the research community will tend over time to favor
architectures that are more or less flexible given this tradeoff.
A second important dynamic is that the hardware for training a
machine learning model to accomplish a task can differ significantly from
the hardware used to conduct inference with an already trained model. This
is due to the different demands at each step of the machine learning
workflow. For instance, energy consumption may matter for a computer
vision system operating on a mobile device, though it may not matter when
that computer vision system is being trained initially in a data center.24
Latency - the time delay between input and output of a system - might be a
significant factor in a high-speed navigation context, where speed of
inference would reduce the time needed for a course correction.25 However,
as with energy consumption, latency may not prove to be as significant
when the navigation system is being trained. These considerations influence
what kinds of hardware are used at which points in the lifecycle of a
machine learning system. They can be viewed as separate though
overlapping markets, with hardware platforms being offered either for
training or inference, and some offering support for both.26
Background: CPUs to GPUs
Graphics processing units (GPUs) form the present-day backbone of
the machine learning workflow.27 GPUs are the primary platform for both
training and inference, and are widely used both for basic research and in
the practical development and deployment of machine learning driven
products in the marketplace.28
The outsize role that GPUs play in machine learning is the result of an
unexpected historical convergence. As their name suggests, GPUs were
24 See Vivienne Sze et al., Efficient Processing of Deep Neural Networks: A Tutorial and
Survey, arXiv:1703.09039, 5-6 (2017), http://arxiv.org/abs/1703.09039 (last visited Feb 13,
2018).
25 Id at 26.
26 See, e.g., Jeff Dean and Urs Hölzle, Build and train machine learning models on our new
Google Cloud TPUs, Google (2017), https://www.blog.google/topics/google-cloud/googlecloud-offer-tpus-machine-learning/ (last visited Mar 20, 2018) (earlier generations of
Google’s specialized machine learning chips were focused on inference, with the latest
version supporting both inference and training).
27 See Deloitte, Hitting the Accelerator: The Next Generation of Machine-Leaning Chips
(2017), available at
https://www2.deloitte.com/content/dam/Deloitte/global/Images/infographics/technologyme
diatelecommunications/gx-deloitte-tmt-2018-nextgen-machine-learning-report.pdf.
28 Id. at 1.
9
originally designed to support computer graphics and image processing
applications.29 To accomplish this, GPUs feature an architecture which
distributes computational tasks across a large number of cores to be
processed in parallel.30 This is in contrast to central processing units
(CPUs), which feature a smaller number of more powerful cores that are
optimized for handling just a few tasks simultaneously.31
This parallel architecture allows the GPU to be uniquely well suited
for machine learning applications. At its root, neural network training and
inference relies on the execution of a large number of identical matrix
multiplication calculations.32 This uniformity enables these operations to be
parallelized and distributed across the many cores offered by the GPU.33
This enables the GPU to outperform CPU architectures which have
comparatively more powerful processors but manage tasks in a more serial
format.34
Increasing Specialization: FPGAs and ASICs
The repurposing of GPUs as the primary hardware platform for
machine learning reflects a selection among available technologies. As
interest in machine learning has continued to grow, so has the notion of
developing hardware entirely purpose-built for these applications become
more attractive. Discussion within the industry has focused on the
possibility of using field-programmable gate arrays (FPGAs) and
application-specific integrated circuits (ASICs) as the next primary
platforms for machine learning.35
FPGAs are distinct from CPUs and GPUs in that they do not run
programs in stored memory. Instead, they are collection of standardized
“logic blocks” whose relationships can be configured by a programmer
Id. at 2.
See supra note 10.
31 Id.
32 See supra note 22 at 12.
33 See supra note 10.
34 See Cade Metz, The Race To Build An AI Chip For Everything Just Got Real, WIRED,
https://www.wired.com/2017/04/race-make-ai-chips-everything-heating-fast/ (last visited
Feb 13, 2018) (describing some of the limitations of the CPU).
35 See, e.g., Karl Freund, Will ASIC Chips Become The Next Big Thing In AI?, Forbes,
https://www.forbes.com/sites/moorinsights/2017/08/04/will-asic-chips-become-the-nextbig-thing-in-ai/ (last visited Mar 20, 2018).
29
30
10
once the chip is received from a manufacturer.36 ASICs are purpose-built
chip boards which are specific to a purpose and cannot be easily
reconfigured after they are manufactured.37
FPGAs and ASICs are particularly attractive in the context of
machine learning inference. Both devices consume less energy than CPUs
and GPUs, and their specialization allows for greater speed.38 These gains
come at the loss of flexibility and an increased cost. FPGAs and ASICs
cannot be as easily and quickly configured to run a wide range of tasks.
Both are relatively more expensive when compared with CPUs and GPUs.
This is particularly the case with ASICs, which are “bespoke” projects that
are expensive and time-consuming to produce. This makes them costeffective as a platform only in significant quantities.39
However, these benefits may outweigh the costs, particularly in
circumstances where a specific kind of machine learning inference is
reliably needed at a mass scale. Project Catapult, an initiative launched by
Microsoft, has shown high performance for FPGAs as the core computing
unit in their data centers.40 FPGAs and ASICs have also been considered a
promising approach in the autonomous vehicles context, where the tasks a
machine learning system will need to take on will be relatively stable and
where chips will be needed for a large number of vehicles.41
36 See What is an FPGA? Field Programmable Gate Array,
https://www.xilinx.com/products/silicon-devices/fpga/what-is-an-fpga.html (last visited
Mar 20, 2018).
37 Jeff Dean, Machine Learning for Systems and Systems for Machine Learning, NIPS
2017, available at http://learningsys.org/nips17/assets/slides/dean-nips17.pdf (noting the
design challenges with ASICs).
38 See supra notes 19-20.
39 Id.
40 See Kalin Ovtcharov et al., Accelerating deep convolutional neural networks using
specialized hardware, Microsoft Research Whitepaper, 2 (2015), available at
https://www.microsoft.com/en-us/research/wpcontent/uploads/2016/02/CNN20Whitepaper.pdf.
41 See, e.g., ASIC might be the mainstream chip for autonomous driving, a chance for
Chinese start-ups, VehicleTrend, https://www.vehicle-trend.com/Knowledge/201801081131.html (last visited Mar 21, 2018); Phil Kalaf, Self-Driving Cars, Wireless Data? It’s
Time to Thank the Humble FPGA. IDS (2017), http://www.idsforward.com/wireless-datathank-humble-fpga/ (last visited Mar 21, 2018); Yu Wang et al, Reconfigurable Processor
for Deep Learning in Autonomous Vehicles,
https://www.itu.int/en/journal/001/Documents/itu2017-2.pdf (2017); Harsh Chauhan,
Can Intel Dominate This Market by Overcoming This Smaller Rival? The Motley Fool
(2017), https://www.fool.com/investing/2017/11/24/can-intel-dominate-this-market-by-
11
While FPGAs and ASICs seem to show promise in the inference
context, they have traditionally had some limitations that have made them
less attractive as platforms for training. For one, FPGAs and ASICs have
tended to be less accurate, relying on “fixed point” computation or featuring
comparatively limited floating-point performance.42 This has made them
comparatively limited in performing the accurate level of calculation
needed in the training process. These devices have also had limited external
memory bandwidth, preventing them from efficiently conducting the matrix
multiplication needed for training.43
However, the potential speed and energy consumption gains presented
by FPGA and ASIC architectures have encouraged research which appears
to be eliminating some of these limitations over time. In 2017, Intel
researchers released software which maximizes data reuse and minimizes
external memory bandwidth to boost training performance on FPGAs.44 The
latest generation of Google’s “Tensor Processing Unit” (TPU), a specialized
ASIC, supports both training and inference.45 The claimed improvements
are quite significant. One recent talk from Google in 2017 noted that the
TPU ASIC was able to execute training tasks at ten to fourteen times the
speed of their previous production setups with a relatively smaller number
of machines.46
Moving Forwards
It remains unclear whether or not more specialized, less flexible
hardware will unseat the preeminent place of the GPU in machine learning
training and inference. Producers of FPGAs and ASICs are releasing
performance benchmarks showing significant improvements over the GPU
for both kinds of tasks. Google claims that its TPU ASIC is able to conduct
overcoming-this.aspx (last visited Feb 20, 2018) (noting the application of FPGAs in the
autonomous vehicles context).
42 See Brian Bailey, Machine Learning’s Growing Divide, Semiconductor Engineering,
https://semiengineering.com/machine-learnings-growing-divide/ (last visited Mar 12, 2018)
(reviewing these issues); Understanding Peak Floating-Point Performance Claims,
https://www.altera.com/en_US/pdfs/literature/wp/wp-01222-understanding-peak-floatingpoint-performance-claims.pdf (last visited Feb 15, 2018) (reviewing the floating point
issues in more depth).
43 Id.
44 Utku Aydonat et al., An OpenCL(TM) Deep Learning Accelerator on Arria 10,
arXiv:1701.03534 [cs] (2017), http://arxiv.org/abs/1701.03534 (last visited Mar 12, 2018).
45 See supra note 34.
46 See supra note 34 (describing these improvements).
12
inference fifteen to thirty times faster than contemporary GPUs and CPUs.47
In a similar vein, Graphcore - one prominent startup focusing on specialized
machine learning hardware - claims that eight of its proprietary “IPU” cards
are equivalent to 128 contemporary GPUs.48
Despite this, benchmarking issues persist and it is challenging to
evaluate these claims in a systematic way.49 For its part, GPU leader Nvidia
has challenged the performance claimed by Google of its TPUs, noting that
it failed to compare its chips against its latest generation of hardware.50 At
the moment, the semiconductor industry does not yet have a common
scheme for evaluating the performance of machine learning specialized
hardware as it does in the CPU space.51 This is significant because the
specific architecture of the neural network and how it is implemented can
have a significant impact on reported performance.52
Though some commentators have framed the industry choices
between GPUs, FPGAs, and ASICs as a mutually exclusive ones, it is not
clear that this will be the case in practice.53 Even if FPGA and ASIC
designs do not ultimately become a new standard for training and inference
in machine learning writ large, it seems likely that they will become a
natural option for certain applications of machine learning systems,
particularly in the consumer products context. Recent moves by industry
leaders seems to recognize this reality. Despite its leadership and
championing of a GPU-focused model, Nvidia’s latest Drive PX product
features a specialized “Deep Learning Accelerator” (DLA) module as it
Norman P. Jouppi et al, In-Datacenter Performance Analysis of a Tensor Processing
Unit, https://arxiv.org/ftp/arxiv/papers/1704/1704.04760.pdf (last visited Feb 15, 2018).
48 Graphcore Benchmarks, Presentation at NIPS 2017, available at
https://cdn2.hubspot.net/hubfs/729091/NIPS2017/NIPS%2017%20%20benchmarks%20final.pdf?t=1521107772551.
49 See supra note 22, at 26-27 (describing the many influences on chip performance).
50 Jensen Huang, AI Drives the Rise of Accelerated Computing in Data Centers, Nvidia
Blog, https://blogs.nvidia.com/blog/2017/04/10/ai-drives-rise-accelerated-computingdatacenter/ (Apr 10, 2017).
51 See, e.g., SPEC CPU 2017, https://www.spec.org/cpu2017/.
52 See supra note 22, at 26-27.
53 See, e.g., FPGA Based Deep Learning Accelerators Take on ASICs, The Next Platform
(2016), https://www.nextplatform.com/2016/08/23/fpga-based-deep-learning-acceleratorstake-asics/ (last visited Feb 13, 2018); Does the future lie with CPU+GPU or
CPU+FPGA?, Scientific Computing World, https://www.scientificcomputing.com/news/analysis-opinion/does-future-lie-cpugpu-or-cpufpga (last visited Feb
20, 2018).
47
13
attempts to cater to applications in autonomous vehicles.54 Nvidia has also
open-sourced its designs for the DLA, a move likely to drive down the cost
of this specialized hardware going forwards by enabling others to
manufacture the same designs.55
These trends provide a framework for thinking about the economics
of various machine learning applications, and how and where the
technology might be used in practice. To that end, it begs the question of
how these shifts in hardware specialization might influence the overall
impact of machine learning on society and the governance of the
technology.
Impact: The Geography of Training and Inference
Machine learning is not an abstract force, but a computational task
that takes place somewhere. Hardware capabilities and the particular
economics of processors are critical since they define the spatial dimensions
of machine learning and what it likely to be applied towards.
Power consumption defines whether or not machine learning
computation can be done on a small, mobile device, or must have access to
a reliable and continuous power source. High energy costs limit the ability
to embed machine learning systems directly on a device. In the very least, it
limits the application of machine learning to situations with sufficient
connectivity for a device to communicate with a larger pool of
computational power hosted in the “cloud.”56
Latency is also crucial in this respect. Even if a chip is able to operate
at low power on a mobile device, it may be ineffectual for a particular use in
the field if it is insufficiently responsive for the intended purpose. This acts
as a bar to certain real-time or mission-critical uses of machine learning
where an alternative cloud architecture would also produce similarly
unacceptable levels of latency.
Karl Freund, Why Nvidia is Building Its Own TPU, Forbes,
https://www.forbes.com/sites/moorinsights/2017/05/15/why-nvidia-is-building-its-own-tpu
(last visited Mar 20, 2017).
55 See Tom Simonite, To Compete With New Rivals, Chipmaker Nvidia Shares Its Secrets,
WIRED, Sept 29, 2017, https://www.wired.com/story/to-compete-with-new-rivalschipmaker-nvidia-shares-its-secrets/ (last visited Feb 20, 2018).
56 See supra note 22, at 5-6 (discussing these different configurations).
54
14
Power consumption and latency are barriers to the application of
machine learning within certain domains. This includes the placement of
these systems on small devices with an untethered power source, and in low
bandwidth situations with poor connectivity. The rise of ASICs and FPGAs
- as well as ongoing improvements to GPUs - suggest that machine learning
hardware will erode these limitations on the placement of machine learning
systems over time, particularly for mass produced consumer products that
have economies of scale.
The Geography of Inference
These developments offer a mixed blessing to those concerned about
the harmful possibilities of machine learning inference. Machine learning
can increasingly be integrated into a range of different products and services
and used in situations where it was previously considered impractical to do
so. For civil libertarians, FPGAs and ASICs enable the expansion of
machine learning as a means of conducting surveillance: small, low power
devices can now incorporate the advances of computer vision to recognize
people and objects even in areas with low bandwidth. For those worried
about the misuse of machine learning by “bad actors”, specialized hardware
makes it more possible to benefit from the technology without reliance on
cloud services where harmful activity might be more easily tracked and
halted.57
Also concerning is the fact that the more inflexible architectures of
FPGAs and ASICs might potentially make it more challenging to repair
machine learning systems when flaws are discovered. A growing body of
research continues to highlight the point both that machine learning systems
frequently can render biased, discriminatory results, and are potentially
vulnerable to malicious manipulation.58 Where a trained machine learning
model is “hard wired” into a chip, the discovery that it has these flaws may
make repair a more expensive and protracted process as it requires a
For a review of these concerns, see, e.g., Miles Brundage et al, The Malicious Use of
Artificial Intelligence (2018), available at https://maliciousaireport.com/.
58 See, e.g., Joy Buolamwini & Timnit Gebru, Gender Shades: Intersectional Accuracy
Disparities in Commercial Gender Classification, PMLR 81:1–15, 2018, available at
http://proceedings.mlr.press/v81/buolamwini18a/buolamwini18a.pdf; Solon Barocas &
Andrew D. Selbst, Big Data’s Disparate Impact (2016),
https://papers.ssrn.com/abstract=2477899 (last visited Mar 21, 2018); Ian Goodfellow et al,
Attacking Machine Learning with Adversarial Examples, OpenAI Blog (2017),
https://blog.openai.com/adversarial-example-research/ (last visited Mar 21, 2018); Tom B.
Brown et al., Adversarial Patch, arXiv:1712.09665 [cs] (2017),
http://arxiv.org/abs/1712.09665 (last visited Mar 21, 2018).
57
15
replacement of the processor itself, rather than modification of software.
This problem applies with particular force in an “embedded” setting where
chips are sold and distributed with a product and there is no centralized
means of changing their behavior once they have left the factory.
At the same time, FPGAs and ASICs also raise the possibility that
machine learning may be architected in a more robustly privacy-protecting
ways going forwards. Since specialized computing power enables machine
learning inference to be done on the device itself, it also opens the
possibility that machine learning capabilities might be provided without
ever having personal data leave a device. Consider a computer vision
system which helps users quickly sort through their photos to find friends
and family members. At present, the energy costs of inference might require
that these photos be uploaded from a smartphone to a central server to be
processed and tagged.59 Specialized hardware might enable an alternative
architecture in which the machine learning model is embedded on the
smartphone itself, such that the photos themselves do not need to be shared
with a third-party to be analyzed by the system.60
This remains up the air as FPGAs and ASICs for machine learning
enter the scene and attempt to find viable niches in the application of the
technology. The economics of these hardware platforms will influence the
viability of alternative architectures in various markets, and in doing so will
inform whether advocates and policymakers are able to argue for the
feasibility of more privacy sensitive approaches to machine learning going
forwards.
The Geography of Training
It is important to recognize that the geography of training may look
quite different from the geography of inference.61 As discussed above,
FPGAs and ASICs have been traditionally somewhat limited as platforms
for the training of machine learning systems. While the possibilities of
using specialized hardware for training continue to be developed by Google
See supra note 22 at 5-6.
See, e.g., Ben Popper, Google’s new Clips camera is invasive, creepy, and perfect for a
parent like me The Verge (2017), https://www.theverge.com/2017/10/5/16428708/googleclips-camera-privacy-parents-children (last visited Mar 21, 2018) (describing an
architecture along these lines).
61 Nvidia, GPU-Based Deep Learning Inference: A Performance and Power Analysis, 4-5
(2015), available at https://www.nvidia.com/content/tegra/embeddedsystems/pdf/jetson_tx1_whitepaper.pdf (noting the differing demands of training and
inference).
59
60
16
and other companies, the reality in the near-term seems to be that training
will remain the province of the GPU for many researchers and practitioners.
Combined with the fact that training is likely to continue being
computationally intensive for the foreseeable future, it is likely that the
creation of machine learning models will continue to happen within
centralized data centers.
FPGAs and ASICs therefore seem likely to have a differential impact
on the geography of machine learning. In the past, pre-existing data center
infrastructure, business models, and the energy consumption of existing
processors tended to encourage an architecture where training and inference
were situated in the same, centralized locations. As this specialized
hardware matures, it seems likely to encourage a more distributed pattern in
inference, permitting the application of machine learning “on device” in a
broader set of contexts. At the same time, the continuing computational
costs and energy requirements of training mean that the creation of machine
learning systems will continue to largely take place in a relatively smaller
number of central facilities.
This geographic pattern has implications for the governance of
machine learning. Training of the most complex, sophisticated models will
continue to take place in a small number of locations among the set of
actors who have the financial resources to maintain or rent the
computational power necessary. However, once trained, machine learning
models can be increasingly diffused and distributed. No doubt some types
of machine learning models will continue to be offered “as a service,” with
inference taking place in the cloud. However, FPGAs and ASICs open the
door to inference no longer being tethered in this particular way.
Simultaneously, these platforms - ASICs in particular - are more inflexible,
making modifications after distribution more difficult.
Whereas in the past it was more possible to repair flaws in machine
learning models after training and deployment by directly modifying the
model provided to many endpoints through the cloud, the specialization of
hardware suggests an environment where these harms may be more
challenging to rectify in the post-training phase. “Hard-wired” chips may be
difficult to recall quickly, or otherwise difficult to modify when in the field.
This may put increased pressure on companies to engage in more thorough
pre-deployment checks and verification on these systems, rather than
adopting a development approach that takes a more “launch-and-iterate”
stance. From a governance perspective, these less easily rectifiable
downstream harms may push regulators towards an approach that puts a
17
growing set of responsibilities on the entities creating and providing
platforms for creating machine learning models to take precautions prior to
wider distribution.
It is worth recognizing that the continued development of the machine
learning field may alter this balance over time. Progress continues to be
made in the subfield of federated learning - which envisions an architecture
in which many independent, distributed processors train locally and share
updates to a model with one another.62 This work may become more
practically feasible to implement as ASICs for machine learning mature and
increasingly allow embedded training to happen on a device. Breakthroughs
in one-shot learning, which would enable the effective training of models
with a relatively smaller number of examples, might also lower the
computational bar to executing training tasks in a more distributed way.63
PART III: SUPPLY CHAIN AND COMPUTATIONAL POWER
CPUs, GPUs, FPGAs, and ASICs are all ultimately products in a
complex global supply chain for semiconductors. Beyond simply
connecting changing computational architectures to the social impact of
machine learning as we did in the previous section, we can dig deeper to
examine how the commercial specifics of its manufacture also has broader
implications.
Both the geography of semiconductor manufacturing and its place as a
strategic asset in the context of national security make it likely that
computing power will become an important arena in the geopolitics of AI.
This seems to be particularly the case as China increasingly invests in
becoming a leader in machine learning while continuing an ongoing effort
to reshape the global semiconductor industry.
The Semiconductor Supply Chain
The hardware platforms discussed in Part II are just one facet of the
much broader industry for semiconductors. Semiconductor chips, “tiny
62 See, e.g., Jakub Konečný et al., Federated Optimization: Distributed Machine Learning
for On-Device Intelligence, arXiv:1610.02527 [cs] (2016), http://arxiv.org/abs/1610.02527
(last visited Mar 21, 2018).
63 See, e.g., Adam Santoro et al., One-shot Learning with Memory-Augmented Neural
Networks, arXiv:1605.06065 [cs] (2016), http://arxiv.org/abs/1605.06065 (last visited Mar
21, 2018).
18
electronic device[s] comprised of billions of components that store, move,
and process data” are the “enabling technology of the information age.”64
These chips give computers the power to run software applications, and are
the key building block for a range of other devices “from cell phones and
gaming systems to aircraft and industrial machinery to military equipment
and weapons.”65 Not surprisingly given their broad scope of application,
semiconductors are a massive global industry. In 2015, worldwide
semiconductor sales were $335 billion, growing 15% since 2012.66
Many production steps are required to deliver a finished
semiconductor chip. Some companies are “integrated device
manufacturers”, or IDMs, which manage all aspects of semiconductor
production from start to finish. This includes design, manufacturing,
assembly, testing, and packaging.67 Companies adopting this model include
Intel, Samsung, and Texas Instruments.68
However, many businesses specialize only in a particular part of this
supply chain, contracting out tasks to other companies in the ecosystem as
needed. Of particular importance in the discussion of machine learning
hardware is the role of so-called “fabless foundries.” These businesses focus
on the design of semiconductor chips, and contract out the manufacturing,
often called “fabrication,” of the final product.69 Companies adopting this
model include AMD, Broadcom, and Qualcomm.70 Many of the companies
leading the development of machine learning specific hardware are
“fabless”. This allows these businesses to avoid the massive capital outlay
and expense of building and maintaining a chip “fab”. Building a single
advanced plant for fabricating semiconductors can cost up to $20 billion.71
Michaela D. Platzer and John F. Sargent Jr., U.S. Semiconductor Manufacturing:
Industry Trends, Global Competition, Federal Policy, Congressional Research Service 1
(2016) https://fas.org/sgp/crs/misc/R44544.pdf (last visited Feb 13, 2018).
65 Id.
66 Id. at 3.
67 Cf. Semiconductor Industry Association, Beyond Borders: The Global Semiconductor
Value Chain 7 (2016), available at
https://www.semiconductors.org/document_library_and_resources/trade/beyond_borders_t
he_global_semiconductor_value_chain/.
68 Id.
69 Id.
70 Id.
71 TSMC Ready to Spend $20 Billion on its Most Advanced Chip Plant, Bloomberg.com,
October 6, 2017, https://www.bloomberg.com/news/articles/2017-10-06/tsmc-ready-tospend-20-billion-on-its-most-advanced-chip-plant (last visited Mar 20, 2018).
64
19
The market for GPUs has been dominated by Nvidia, a fabless
foundry. One industry analysis concluded that, as of the third quarter of
2017, Nvidia represented 72.8% of the market share for GPUs, with the rest
being controlled by AMD, another fabless foundry.72 Both are
headquartered in Santa Clara, California.
The market for FPGAs has also been dominated by a small set of
fabless foundries. In 2016, Xilinx led this segment with a market share of
53%.73 Altera, another FPGA specialist, was purchased by Intel in 2015 and
accounted for 36% of the market.74 These were distantly followed by
competitors Microsemi (7%) and Lattice Semiconductor (3%).75 This
roughly holds stable from the market share in 2015.76 All of these
companies are based in the United States. All but one, Lattice
Semiconductor, are headquartered in California.77
Estimating market share in the context of specialized machine
learning ASICs is more challenging. For one, the market is still emerging:
no major player in the space is currently engaging in mass production and
public sale of ASICs as a platform for machine learning. At the time of
writing, Google is only distributing their TPU ASIC to a relatively small
circle of researchers, and offers limited access to TPU computing cycles via
its cloud services.78 In any case, because these chips are highly customized
for particular purposes, it may be challenging to eventually define a single
“market” which usefully groups together the different types of devices that
might be fabricated as an ASIC for machine learning.
Harsh Chauhan, Nvidia Is Running Away With the GPU Market The Motley Fool
(2017), https://www.fool.com/investing/2017/12/06/nvidia-is-running-away-with-the-gpumarket.aspx (last visited Feb 20, 2018).
73 And the Winner of Best FPGA of 2016 is... | EE Times, EETimes,
https://www.eetimes.com/author.asp?section_id=36&doc_id=1331443 (last visited Feb 20,
2018).
74 Id.
75 Id.
76 Id.
77 Xilinx, Corporate Locations, https://www.xilinx.com/about/contact/corporatelocations.html; Intel Programmable Solutions Group (PSG) Locations,
https://www.altera.com/about/contact/contact/altera-hq.html; Microsemi, Locations,
https://www.microsemi.com/locations; Lattice Semiconductor, Locations,
http://www.latticesemi.com/About.
78 Google is giving a cluster of 1,000 Cloud TPUs to researchers for free, TechCrunch
(2017), http://social.techcrunch.com/2017/05/17/the-tensorflow-research-cloud-programgives-the-latest-cloud-tpus-to-scientists/ (last visited Mar 21, 2018); Cloud TPUs - ML
accelerators for TensorFlow, Google Cloud, https://cloud.google.com/tpu/ (last visited Mar
21, 2018).
72
20
Since the major leaders in machine learning hardware are “fabless”,
they depend on a separate ecosystem of companies to provide the actual
fabrication of the chips they design. These companies, called “pure play
foundries” or simply “foundries”, are a highly consolidated marketplace. In
2016, Taiwan Semiconductor (TSMC) accounted for 59% of the global
market for fabrication.79 Running significantly behind were
GlobalFoundries (11%), United Microelectronics Corporation (UMC) (9%),
and Semiconductor Manufacturing International Corporation (SMIC) (6%).
80 TSMC and UMC are based in Taiwan, with SMIC in China and
GlobalFoundries in the US.81 While based in the US, GlobalFoundries is
owned by the Emirate of Abu Dhabi through its state-owned investment
arm Advanced Technology Investment Company (ATIC).82
There exists a network of somewhat stable relationships between this
handful of leading “fabless” foundries that are designing much of the
hardware that machine learning takes place on, and the small number of
companies that do their manufacturing. In the GPU space, Nvidia contracts
much of its high-performance GPU production to TSMC.83 In 2009,
GlobalFoundries was spun-off from AMD as part of a transition of the latter
towards a “fabless” model.84 As a result of this historical relationship, AMD
has traditionally worked closely with GlobalFoundries, though recently
Pure-Play Foundry Market Surges 11% in 2016 to Reach $50 Billion!, ,
http://www.icinsights.com/news/bulletins/PurePlay-Foundry-Market-Surges-11-In-2016To-Reach-50-Billion/ (last visited Feb 20, 2018).
80 Id.
81 TSMC, Business Contacts,
http://www.tsmc.com/english/aboutTSMC/business_contacts.htm; UMC, Locations,
http://www.umc.com/english/contact/index.asp; SMIC, About Us,
http://www.smics.com/eng/about/about.php; GlobalFoundries, About Us,
https://www.globalfoundries.com/about-us.
82 Mark LaPedus, ATIC takes control of GlobalFoundries | EE Times, EETimes,
https://www.eetimes.com/document.asp?doc_id=1258215 (last visited Mar 21, 2018).
83 See Nvidia: TSMC will remain a ‘very important’ foundry partner, KitGuru (2015),
https://www.kitguru.net/components/graphic-cards/anton-shilov/nvidia-tsmc-will-remaina-very-important-foundry-partner/ (last visited Feb 20, 2018); Ashraf Eassa, NVIDIA
Corp.’s Relationship With Taiwan Semiconductor Manufacturing Is Deepening The
Motley Fool (2017), https://www.fool.com/investing/2017/05/17/nvidia-corp-relationshiptaiwan-semiconductor.aspx (last visited Mar 21, 2018).
84 Benjamin Pimentel, GlobalFoundries created from AMD spin-off MarketWatch,
https://www.marketwatch.com/story/globalfoundries-created-amd-spin-off-the (last visited
Mar 21, 2018).
79
21
announced that they will be splitting their new GPU production between
them and TSMC.85
FPGA production operates with a slightly different set of connections
between chip designers and associated foundries. Xilinx has worked in the
past with UMC though increasingly partners with TSMC on its more recent
hardware.86 Altera was acquired by Intel in 2015 and relies in part on its
corporate parent for fabrication services.87 Microsemi announced in 2013
that it too would work with Intel for its fabrication needs.88 Lattice
Semiconductor works with both UMC and TSMC, along with some smaller
foundries.89
The geographic distribution of these players is mirrored in the overall
structure of the industry. US firms account for the largest share of the global
market, accounting for 50% of semiconductor sales in 2016.90 However, the
actual fabrication of semiconductor devices largely takes place outside of
the United States. In 2015, about three-quarters of the world’s advanced
semiconductor fabrication capacity was located in South Korea, Taiwan,
Japan, and China.91 This continues a historical trend of production capacity
moving from the US to the Asia-Pacific region. In 1980 the US accounted
for 42% of global manufacturing capacity, a number which dropped
consistently over subsequent years to 16% by 2007.92
US National Security and the Semiconductor Industry
See AMD are splitting 7nm Zen 2 CPU and Vega GPU manufacturing between TSMC
and GloFo | PCGamesN, , https://www.pcgamesn.com/amd-7nm-tsmc-globalfoundries
(last visited Feb 20, 2018).
86 Dylan McGrath, Xilinx confirms: Samsung, TSMC in, UMC out at 28-nm | EE Times,
EETimes, https://www.eetimes.com/document.asp?doc_id=1173112 (last visited Mar 21,
2018).
87 Can Intel Dethrone The Foundry Giants?, Semiconductor Engineering,
https://semiengineering.com/intel-dethrone-foundry-giants/ (last visited Mar 21, 2018).
88 Microsemi, Microsemi Selects Intel Corporation Foundry Services for the Development
of Digital Integrated Circuits, https://investor.microsemi.com/2013-05-01-MicrosemiSelects-Intel-Corporation-Foundry-Services-for-the-Development-of-Digital-IntegratedCircuits (last visited Mar 20, 2018).
89 Lattice Semiconductor, ISO 9001/ TS 16949/ ISO 14001 Certificates,
http://www.latticesemi.com/en/Support/QualityAndReliability/ManufacturingPartners/ISO
Certificates (last visited Mar 20, 2018).
90 See supra note 61 at 2.
91 Id. at 9.
92 Id. at 9-10.
85
22
Given the importance of semiconductors to the supply chain of
consumer and military electronics, the industry has “[f]or decades” been
considered relevant to national security within the US.93 Concerns about the
shift of semiconductor manufacturing capacity to the Asia-Pacific region
have also dominated this discussion for decades, beginning with the rise of
the Japanese semiconductor industry in the 1970s.94 Worries about this
transition has resulted in a range of different regulatory interventions in past
decades to bolster and secure the US semiconductor industry, and block
foreign access to the most cutting edge computational power.
Export controls in high-performance computing have been one
important way these concerns have manifested as policy. Under Executive
Order 13222, the US Commerce Department regulates exports of high
performance computers (HPC) to certain countries, which are grouped into
tiers.95 Computers exceeding certain thresholds of processor performance to
particular countries and end-users require prior government review for
export.96 These exports may be blocked on national security and antiterrorism grounds.97
Fears around reliance on foreign manufacturing have also resulted in
more extensive coordination between government and corporate actors. In
2004, the US Department of Defense (DOD) and the National Security
Agency (NSA) initiated a “Trusted Foundry Program”, which arranged for
long-term contracts with accredited US companies to ensure that the
government would have guaranteed access to trusted chips for its needs.98
In practice, this program would center on a sole-source contract with IBM,
which was deemed “the only U.S.-based company able to meet DOD and
intelligence community needs for trusted leading-edge microelectronics.”99
While the program eventually expanded to include other trusted suppliers,
one 2015 analysis by the Government Accountability Office (GAO)
observed that IBM remained the only supplier with cutting-edge fabrication
Supra note 61 at 21.
Id. at 18-19. For a contemporaneous review, see Warren E. Davis & Daryl G. Hatano,
The American Semiconductor Industry and the Ascendancy of East Asia, 27 California
Management Review 128 (1985).
95 Exec. Order No. 13,222, 66 Fed. Reg. 44025 (Aug 22, 2001); Bureau of Industry and
Security, US Department of Commerce, Legal Authority for the Export Administration
Regulations,
https://www.bis.doc.gov/index.php/documents/Export%20Administration%20Regulations
%20Training/876-legal-authority-for-the-export-administration-regulations/file.
96 15 CFR § 774, Supplement No. 1.
97 Id.
98 Supra note 61 at 22.
99 Id.
93
94
23
facilities and that “use of accredited suppliers other than IBM has been
minimal” as a result.100
This program is at present in transition. In 2014, IBM announced that
it would transfer ownership of its foundries to the foreign owned
GlobalFoundries.101 This sale followed significant losses for IBM on its
foundry business. During 2013 and 2014 the company lost $700 million on
its two primary chip fabrication facilities, and in the end IBM paid $1.5
billion to GlobalFoundries for the acquisition.102 This transfer was approved
and included a multi-year contract with the DOD to provide semiconductors
to the US government until 2023.103 However, the 2015 GAO analysis
concluded simply that “there are no near-term alternatives to the foundry
services formerly provided by IBM.”104 As of late 2018, efforts are ongoing
to identify “new approaches to retain trustable, leading-edge capabilities”.
105
Broader coordination has also happened in the past. During the 1980s
and 1990s, concern around rising Japanese dominance in the space
motivated the launch of SEMATECH, a public-private research consortium
of US semiconductor firms.106 Over subsequent years, $870 million in
public subsidies from the Defense Advanced Research Projects Agency
(DARPA) and augmented by matching funds from the participating
companies focused on accelerating research into semiconductor
manufacturing.107 In 1996, after a period of growing US market share in
semiconductors, the directors of SEMATECH voted to stop receiving
federal funding.108
Many factors enabled the resurgence of the US semiconductor
industry in the late 1980s and early 1990s, and the ultimate impact of
Marie A. Mak, Trusted Defense Microelectronics: Future Access and Capabilities Are
Uncertain, Congressional Research Service 4 (2015), available at
https://www.gao.gov/products/GAO-16-185T.
101 Supra note 61 at 22.
102 IBM-GlobalFoundries Deal Finalized | EE Times, EETimes,
https://www.eetimes.com/document.asp?doc_id=1327029 (last visited Mar 18, 2018).
103 Doug Cameron, Pentagon Hires Foreign Chips Supplier, Wall Street Journal, June 5,
2016, https://www.wsj.com/articles/pentagon-takes-foreign-chips-partner-1465159332.
104 See supra note 95 at 4.
105 Id.
106 See Larry D. Browning & Judy C. Shetler, Sematech: Saving the U.S. Semiconductor
Industry (2000).
107 See supra note 22 at 19.
108 Id. at 20.
100
24
SEMATECH has been disputed.109 However, consensus favors the positive
role the consortium played. One 2003 review by the National Academies
concluded that the public-private effort was “key among elements in the
industry’s revival—contributing respectively to the restoration of financial
health and product quality.”110
Recent US Focus in the Space: China
Concerns around the robustness of the US semiconductor industry
have persisted into the present as China has made a concerted push to
advance its own semiconductor industry in recent years. In 2014, the State
Council of China published National Guidelines for Development and
Promotion of the Integrated Circuit (IC) Industry, a strategic plan which
aims to establish national leadership across the semiconductor supply chain
by 2030.111 The plan allocates $100 to $150 billion from public and private
investment to support this effort.112 Goals declared later in 2015 would
imply ambitions that “roughly all incremental foundry capacity installed
globally over the next ten years would have to be in China.113
One result of this strategy has been a rapid expansion in acquisition
activity by Chinese investment and technology companies. Some larger
transactions in the space include a $2.3 billion acquisition of H3C, a Hong
Kong subsidiary of Hewlett-Packard114, a $2.75 billion acquisition of NXP
Semiconductor’s “Standard Products” division, and a $1.8 billion
acquisition of Omnvision, which specializes in semiconductors for imaging
applications.115 One analysis in late 2017 estimated that “the total volume of
transactions of China’s semiconductor overseas M&As (completed) so far
has exceeded US$11 billion.”116 It has also been reflected in a significant
increase in the construction of new chip fabrication plants in the country.
Id.
National Academies, Government-Industry Partnerships for the Development of New
Technologies 90 (2002), available at http://www.nap.edu/catalog/10584 (last visited Feb
15, 2018).
111 Christopher Thomas, A new world under construction: China and semiconductors,
McKinsey & Company, https://www.mckinsey.com/global-themes/asia-pacific/a-newworld-under-construction-china-and-semiconductors (last visited Mar 18, 2018).
112 Id.
113 Id.
114 C. P. Yue & T. Lu, China’s Latest Overseas M&A in the Semiconductor Industry, 9
IEEE Solid-State Circuits Magazine 8–12 (2017).
115 Id.
116 Id.
109
110
25
Roughly 40% of front-end semiconductor fabs slated to begin operation in
2017 to 2020 worldwide are located in China.117
This effort has also included the recruitment of several high-profile
leaders within the Taiwanese semiconductor industry. This includes the
recent move in 2017 by Shih-wei Sun, former CEO of Taiwan’s UMC
foundry, to China’s Tsinghua Unigroup.118 Similarly, Shang-Yi Chiang and
Liang Mong-song, both research leaders at Taiwan’s TSMC, were recruited
to China’s SMIC that same year.119 These moves have produced some
alarm within the Taiwanese semiconductor industry. TSMC chairperson
Morris Chang has voiced concerns that the industry may become a “one
way road” where “talent only departs and never arrives.”120
These efforts are directed towards catching up: China has not
traditionally been a leader in the semiconductor sector. While it accounts for
a large percentage of worldwide consumption (57% in 2014), it largely
relies on imports to meet this demand.121 As of 2015, China possessed only
around 6% of the most advanced semiconductor fabs globally.122 One report
noted that many fabrication plans continued to use “older technology and
used equipment”, which reflected China’s focus on products that “do not
require leading-edge semiconductors.”123 These recent efforts also follow
on earlier, less successful initiatives by the Chinese government to
accelerate the development of their national semiconductor base.124
However, the present effort differs in its focus on fostering a defined set of
Dylan McGrath, China to house over 40% of semi fabs by 2020, EE Times Asia,
https://www.eetasia.com/news/article/china-to-house-over-40-of-semi-fabs-by-2020 (last
visited Mar 19, 2018).
118 Cheng Ting-Fang, China poaches more Taiwanese chip talent, Nikkei Asian Review,
https://asia.nikkei.com/magazine/20171109/Business/China-poaches-more-Taiwanesechip-talent (last visited Feb 20, 2018); Alan Patterson, China Expected to Poach More
Taiwan Chip Execs, EETimes, https://www.eetimes.com/document.asp?doc_id=1331144
(last visited Feb 20, 2018).
119 Id.
120 The China Post, TSMC boss slams government over China brain drain The China Post
(2017), https://chinapost.nownews.com/20170125-11485 (last visited Mar 21, 2018).
121 See supra note 61 at 14.
122 Id. at 15.
123 Dieter Ernst, From Catching Up to Forging Ahead: China’s Policies for
Semiconductors, East-West Institute (2015), https://www.ssrn.com/abstract=2744974 (last
visited Mar 19, 2018).
124 Gordon Orr & Christopher Thomas, Semiconductors in China: Brave new world or
same old story?, McKinsey & Company,
https://www.mckinsey.com/industries/semiconductors/our-insights/semiconductors-inchina-brave-new-world-or-same-old-story (last visited Mar 21, 2018).
117
26
national “champions” to compete internationally, rather than spreading
financial support more thinly throughout the economy.125
The US has been active in attempting to counter these efforts. In
2016, then Secretary of Commerce Penny Pritzker declared that the US
would “not allow any nation to dominate this [the semiconductor] industry
and impede innovation through unfair trade practices and massive, nonmarket-based state intervention.”126 An expert committee convened by the
NSA and the Department of Energy (DOE) that same year agreed,
“expressing significant concern that – absent aggressive action by the U.S. –
the U.S. will lose leadership and not control its own future in HPC [highperformance computing].”127
Several steps were taken towards this end. President Obama
authorized the National Strategic Computing Initiative in 2015, which
directed the DOD, DOE, and the National Science Foundation to work to
“preserve [the US] leadership role in creating HPC technology”.128 In 2015,
the administration restricted the sales of advanced microprocessors to
several research sites associated with the Chinese supercomputer Tianhe-2.
129 The administration also blocked the acquisition of the US based assets of
Aixtron, a German semiconductor manufacturer, by China’s Fujian Grand
Chip Investment Fund.130 Similar deals were canceled on the threat of
Chips on their shoulders, The Economist, Jan 23, 2016,
https://www.economist.com/news/business/21688871-china-wants-become-superpowersemiconductors-and-plans-spend-colossal-sums (last visited Mar 21, 2018).
126 U.S. Secretary of Commerce Penny Pritzker Delivers Major Policy Address on
Semiconductors at Center for Strategic and International Studies, Department of
Commerce (2016), https://www.commerce.gov/news/secretary-speeches/2016/11/ussecretary-commerce-penny-pritzker-delivers-major-policy-address (last visited Feb 20,
2018).
127 U.S. Leadership in High Performance Computing (HPC), NSA-DOE Technical Meeting
on High Performance Computing,
https://www.nitrd.gov/nitrdgroups/images/b/b4/NSA_DOE_HPC_TechMeetingReport.pdf
(last visited Feb 13, 2018).
128 Office of Science and Technology Policy, Fact Sheet: National Strategic Computing
Initiative (2015),
https://obamawhitehouse.archives.gov/sites/default/files/microsites/ostp/nsci_fact_sheet.pd
f.
129 Don Clark, U.S. Agencies Block Technology Exports for Supercomputer in China, Wall
Street Journal, April 9, 2015, http://www.wsj.com/articles/u-s-agencies-block-technologyexports-for-supercomputer-in-china-1428561987 (last visited Mar 21, 2018).
130 Paul Mozur, Obama Moves to Block Chinese Acquisition of a German Chip Maker, The
New York Times, December 2, 2016,
125
27
rejection by the Obama administration through the Committee on Foreign
Investment in the United States (CFIUS), an inter-agency group “authorized
to review transactions that could result in control of a U.S. business by a
foreign person…in order to determine the effect of such transactions on the
national security of the United States.”131 This included the sinking of a
2015 offer by China Resources Microelectronics and Hua Capital
Management to acquire US-based Fairchild Semiconductor.132
The Trump administration has maintained the active stance of the
Obama administration in limiting foreign acquisition of US semiconductor
companies. In 2017, CFIUS blocked a proposed acquisition of Lattice
Semiconductor, a leading FPGA producer, by China Venture Capital Fund
Corporation (CVCF), a state-run investment arm.133 The decision cited
“credible evidence that the foreign interest exercising control might take
action that threatens to impair national security” and the “importance of
semiconductor supply chain integrity to the U.S. government, and the use of
Lattice products by the U.S. government.”134 In 2018, using the same
authority and citing similar concerns, the Trump administration blocked a
proposed $117 billion acquisition of Qualcomm by Singapore-based
competitor Broadcom.135 The administration similarly blocked a $580
million offer to acquire Xcerra, a Massachusetts-based semiconductor
company, by state-backed investment funds Sino IC Capital and Hubei
Xinyan that same year.136 In late 2017, a bipartisan group proposed the
https://www.nytimes.com/2016/12/02/business/dealbook/china-aixtron-obama-cfius.html
(last visited Mar 18, 2018).
131 US Department of the Treasury, The Committee on Foreign Investment in the United
States, https://www.treasury.gov/resource-center/international/Pages/Committee-onForeign-Investment-in-US.aspx (last accessed Mar 22, 2018).
132 Diane Bartz and Liana B. Baker, Fairchild rejects Chinese offer on U.S. regulatory
fears, Reuters, February 16, 2016, https://www.reuters.com/article/us-fairchild-semico-ma/fairchild-says-china-resources-offer-not-superior-to-on-semis-idUSKCN0VP1O8 (last
visited Mar 21, 2018).3
133 Timothy B. Lee, Trump blocks Chinese purchase of US chipmaker over national
security Ars Technica (2017), https://arstechnica.com/tech-policy/2017/09/trump-blockschinese-purchase-of-us-chipmaker-over-national-security/ (last visited Feb 13, 2018).
134 Statement On The President’s Decision Regarding Lattice Semiconductor Corporation,
Department of the Treasury, https://www.treasury.gov/press-center/pressreleases/Pages/sm0157.aspx (last visited Feb 13, 2018).
135 Kate O’Keeffe, Trump Orders Broadcom to Cease Attempt to Buy Qualcomm, Wall
Street Journal, March 13, 2018, https://www.wsj.com/articles/in-letter-cfius-suggests-itmay-soon-recommend-against-broadcom-bid-for-qualcomm-1520869867 (last visited Mar
21, 2018).
136 Raymond Zhong, U.S. Blocks a Chinese Deal Amid Rising Tensions Over Technology,
The New York Times, February 23, 2018,
28
Foreign Investment Risk Review Modernization Act (FIRRMA).137 The bill
would expand CFIUS review to include a range of transactions beyond
outright acquisition, and would raise review in situations where an
emerging technology prospectively “could be essential to national security.”
138
Impact: Computational Power and the Geopolitics of Machine Learning
From a geopolitical standpoint, the semiconductor industry finds itself
in the middle of a perfect storm. First, semiconductor manufacturing
capacity is considered a vital strategic asset, and the issue of who owns
these businesses and their intellectual property is considered a national
security matter. Second, the evolution of the industry has produced a
bifurcated geography, with design-focused “fabless” foundries largely
based in the US but with actual production taking place in the Asia-Pacific
region. The result is that the semiconductor industry, like others, has been
increasingly drawn into international politics as tensions escalate between
the US and China.
This broader backdrop suggests that the more specific technology of
machine learning is likely to be a flashpoint in the larger context of
semiconductor competition between the US and China. In July 2017, the
Chinese State Council released its “New Generation AI Development Plan”,
which sets out targets for development in AI and related industries. The
plan declares AI to be “a new focus of international competition” and “a
strategic technology that will lead in the future”.139 It plans for China to
“firmly seize the strategic initiative in the new stage of international
competition in AI development” and “effectively [protect] national
security.”140 Specifically, the plan aims for China to be the world’s
“primary” leader in the technology and for the technology to be a $150
billion industry in the country by 2030.141 As in the semiconductor context,
https://www.nytimes.com/2018/02/23/technology/china-microchips-cfius-xcerra.html (last
visited Mar 21, 2018).
137 Foreign Investment Risk Review Modernization Act of 2017, S. 2098, 115th Cong.
(2017), https://www.congress.gov/bill/115th-congress/senate-bill/2098.
138 Id.
139 State Council of China, A Next Generation Artificial Intelligence Development Plan 2
(2017), available at https://www.newamerica.org/cybersecurity-initiative/blog/chinas-planlead-ai-purpose-prospects-and-problems/.
140 Id.
141 Id. at 6-7.
29
this plan echoes and builds on a series of earlier published policies focusing
on robotics and other emerging technologies.142
There are a number of components to the State Council strategy. For
one, the Chinese government intends to ramp up spending to support the
development of AI in the country. Its Artificial Intelligence 2.0 program is
poised to deploy “billions to develop AI for commercial and military use.”
143 This will also be supported by a system of “government guidance funds”
that provide financial support to companies and new ventures working on
AI and related technologies.144 The plan also contemplates recruiting and
accelerating the training of leading AI researchers in the fields of “neural
awareness, machine learning, automatic driving, intelligent robots, and
other areas.”145
Advancing computational power appears as a consistent theme in
these plans. The State Council plan highlights the lack of “high-end chips”
as a factor in China lagging in the field of AI.146 The Ministry of Industry
and Information Technology (MIIT), in elaborating on the State Council
Plan, has explicitly laid out the “[development of] high-performance,
scalable, and low-power cloud neural network chips for machine learning
training applications” as a key priority.147 It also distinguishes between the
cloud and the separate need to advance chips to support “terminal”
embedded applications, where “low-power, high-performance neural
network chips suitable for machine learning algorithms” are needed.148 By
2020, MIIT targets chips which will have “performance levels of 128
TFLOPS (16-bit floating point), and the energy efficiency ratio of more
See, e.g., Central Committee of the Communist Party of China, The 13th Five-Year Plan
for the Economic and Social Development of the People’s Republic of China 67 (2016),
available at http://en.ndrc.gov.cn/newsrelease/201612/P020161207645765233498.pdf
(highlighting AI as a target “strategic emerging industry” for development); State Council
of China, Guiding Opinions on Actively Promoting the "Internet Plus" Initiative (2015),
available at http://www.gov.cn/zhengce/content/2015-07/04/content_10002.htm
(highlighting the development of AI as a priority).
143 Tom Simonite, The Trump Administration Can’t Stop China From Becoming an AI
Superpower, WIRED, Jun 29, 2018, https://www.wired.com/story/america-china-aiascension/ (last visited Mar 21, 2018).
144 Yuan Yang, China fuels boom in domestic tech start-ups Financial Times (2017),
https://www.ft.com/content/b63ee746-afc6-11e7-aab9-abaa44b1e130 (last visited Mar 21,
2018) (describing the government guidance funds ecosystem).
145 See supra note 133 at 14.
146 Id. at 4.
147 Translation: Chinese government outlines AI ambitions through 2020, New America,
https://www.newamerica.org/cybersecurity-initiative/blog/chinas-plan-lead-ai-purposeprospects-and-problems/ (last visited Mar 21, 2018).
148 Id.
142
30
than 1 TFLOPS/Watt” with “terminal” chips having a similar efficiency.149
Consistent with these policies, in August 2017 China’s State Development
& Investment Corporation led a $100 million round of funding in
Cambricon, a startup focusing on the development of specialized machine
learning hardware150.
National policies depend critically on what can be practically
controlled by a state.151 In a competitive environment, nations seek to
control levers to shape the prospects of their adversaries, or at least the
means of denying them access to key opportunities. Norms of open
publication in research, the existence of widely distributed open-source
toolkits, and the ever widening circle of those familiar with the practice of
machine learning suggest that efforts to control research, software, or
specialists in general will be challenging over time.152 Computational
power, with its small number of actors and large, fixed production facilities,
is likely to be a focal point for national competition in the space.
International rivalry around the technology of machine learning will
therefore in large part manifest itself in practice as international rivalry over
the supply chain of computational power.
This is particularly true in the US-China context, where US
companies depend on the manufacturing capability of a Chinese neighbor Taiwan - and China desires access to more advanced computing power to
support machine learning applications. Through market leaders Nvidia and
Xilinx, Taiwanese foundries TSMC and UMC play a critical role in the
manufacture of high-end GPUs and the FPGAs likely to support machine
learning applications going forwards.
As CFIUS seems poised to make it increasingly challenging for China
to pursue acquisitions of US semiconductor companies, shaping Taiwanese
trade and foreign investment policies in semiconductors will assume greater
Id.
Tom Simonite, China Challenges Nvidia’s Hold on Artificial Intelligence Chips |
WIRED, https://www.wired.com/story/china-challenges-nvidias-hold-on-artificialintelligence-chips/ (last visited Mar 19, 2018).
151 Cf. James Scott, Seeing Like a State: How Certain Schemes to Improve the Human
Condition Have Failed (New Ed edition ed. 1999).
152 See, e.g., arXiv, https://arxiv.org/ (open publication); Tensorflow,
https://www.tensorflow.org/ (toolkit); Pytorch, http://pytorch.org/ (toolkit); Fast.ai,
http://www.fast.ai/ (training); Deeplearning.ai, https://www.deeplearning.ai/ (training).
149
150
31
importance.153 The extent to which the US is able to successfully deny
China access to advanced computing power, and the extent to which China
is able to develop it domestically or acquire it otherwise, remains to be seen.
The outcome will play a major role in determining the availability and
sophistication of machine learning systems in different markets and among
companies globally.
These trends may be further exacerbated as the machine learning field
itself continues to evolve. In particular, there exist a rapidly developing set
of research areas within machine learning - simulation learning, self-play,
and meta-learning - which seem poised to heighten the importance of
computational power as the key element in advancing the effectiveness of
machine learning models. Moreover, meta-learning, which seeks to
automate the architecture of machine learning algorithms, may also enable
computational power to substitute somewhat for a lack of ready research
and engineering specialists in the space.
PART IV: COMPUTATIONAL POWER AS DATA SUBSTITUTE
Computational power is just one ingredient in the process of training
effective machine learning systems. Machine learning also requires
sufficient and appropriate data, the examples on which the system will learn
a good representation of the task it is attempting to accomplish.
The cost and availability of these inputs is crucial in thinking about
the distributional impact of machine learning. Depending on the resources
available to the practitioner and the presence of pre-existing data, acquiring
both of these critical inputs may be more or less feasible for solving a
particular problem. This influences both the set of actors that can generate
novel machine learning systems, as well as the set of domains that machine
learning can be effectively used in.
While computational power is increasingly commoditized and
available as a service, acquiring and cleaning data appropriate to training a
system to solve a given task remains stubbornly costly and time-consuming
in a number of domains. Insofar as commercial actors continue to be the
153 See supra note 113, Patterson (Quoting one industry analyst that “China will find it very
tough to buy U.S. high-tech companies and difficult to leverage Chinese joint ventures or
wholly-owned enterprises to access key U.S. intellectual property…We thus expect more
senior Taiwan veterans to join China’s semiconductor industry as a second wave of talent
moves to China.”)
32
primary investors in the development of machine learning, this may render
a set of potential machine learning applications infeasible or unprofitable to
invest in developing.
However, one significant recent trend on this front has been a set of
research successes which - in certain domains - are reducing a dependence
on acquiring real-world data and increasing the role of computational power
in the training of machine learning systems. This is significant since in these
situations leveraging machine learning will be limited by the cost and
availability of computing power, rather than the more fixed costs of
gathering data in a specific domain. There are three arenas of research
which seem particularly promising in this respect: simulation learning, selfplay, and meta-learning.
Simulation Learning
Simulation learning seeks to replace the need for collecting real-world
data by training an agent in a virtual space. For example, rather than
training a robot arm to grasp objects by having a real robot arm attempting
to pick up many different types of objects in the physical world, this
approach trains the machine by having it “experience” picking up virtual
objects in a computer simulation.154 Once the system learns a good
representation of the task, it can then be implemented to control a robot arm
in the real world.155 Successes in using this approach have prompted a
number of different simulation environments for training agents to be
released in recent years.156
The continuing advancement of simulation learning changes the
balance of data and computational power. From a practical perspective,
Compare Xue Bin Peng et al, Generalizing from Simulation, OpenAI Blog (2017),
https://blog.openai.com/generalizing-from-simulation/ (last visited Mar 21, 2018) with
Sergey Levine, Deep Learning for Robots: Learning from Large-Scale Interaction, Google
Research Blog, https://research.googleblog.com/2016/03/deep-learning-for-robotslearning-from.html (last visited Mar 21, 2018).
155 See, e.g., Xue Bin Peng et al., Sim-to-Real Transfer of Robotic Control with Dynamics
Randomization, (2017), https://arxiv.org/abs/1710.06537 (last visited Mar 21, 2018); Josh
Tobin et al., Domain Randomization for Transferring Deep Neural Networks from
Simulation to the Real World, arXiv:1703.06907 [cs] (2017),
http://arxiv.org/abs/1703.06907 (last visited Mar 21, 2018).
156 See Microsoft shares open source system for training drones, other gadgets to move
safely on their own, Microsoft AI Blog (2017), https://blogs.microsoft.com/ai/microsoftshares-open-source-system-training-drones-gadgets-move-safely/ (last visited Mar 21,
2018); DeepMind, DeepMind Lab, https://deepmind.com/research/publications/deepmindlab/ (last visited Mar 21, 2018).
154
33
effective simulation learning removes the costs and logistical challenges of
collecting data through sensors in the real world. In effect, it substitutes
computational power for data as an input in machine learning. This is
particularly promising since simulation learning might enable the collection
of data far beyond what would be practical in the real world. Taking the
example discussed above, a simulated approach may be able to run many
more trials with virtual arms and virtual objects than the constraints of
warehousing, maintenance, and energy in a real-world setting would allow.
This at least theoretically holds out the promise of creating more effective
machine learning systems which are trained on a more substantial simulated
dataset at a faster rate.
These gains may be limited to particular types of domains. One
obvious limitation of this approach is that it will only be effective in
situations in which the simulation acts as a sufficiently realistic proxy for
the actual challenge. A simulation which has unrealistic assumptions will
cause the agent to learn a poor representation that fails when it is finally
deployed “in the field.”157 Simulating a robot operating in the physical
world, for instance, may be relatively more straightforward than simulating
group social behavior or ecological systems where underlying forces are not
well understood.
Self-Play
Simulation learning avoids the need for collecting real-world data by
substituting a virtual environment for an agent to interact with. Self-play
avoids the need for real-world data by having an agent play itself in order to
improve and acquire “experience” in a given task. It therefore represents
another method which effectively substitutes computational power for data
as an input in the machine learning process.
At the time of writing, one notable demonstration of the use of selfplay as a technique for reducing a dependence on data has been AlphaZero,
a system designed by Google’s DeepMind research lab which was able to
achieve champion level skill at the board games of Go, chess, and shogi
without the use of any pre-existing data of human games.158 This marks a
departure from earlier versions of these systems, which required training on
data around historical examples of Go games to achieve a certain level of
See supra note 148 at 1.
David Silver et al., Mastering Chess and Shogi by Self-Play with a General
Reinforcement Learning Algorithm, arXiv:1712.01815 [cs] (2017),
http://arxiv.org/abs/1712.01815 (last visited Mar 21, 2018).
157
158
34
proficiency.159 These self-play methods have also enabled advancements in
transfer learning, allowing agents which learn skills in one environment to
apply it in a new, novel one.160
Like simulation learning, self-play is also somewhat domain limited
to situations in which the competitive action of two agents will generate the
data necessary to train the system to solve the desired problem. But, in these
contexts, computational power becomes a primary rate limiter of progress,
rather than the availability of data. As in the simulation learning case,
sufficient computational power enables a multitude of agents to rapidly play
a number of games which potentially outstrips the data that is available
from games played by humans.
Meta-Learning
Learning architectures - the system by which a machine learning
system extracts features and acquires a good representation of the task it is
intended to solve - are another key ingredient in the machine learning
workflow. For the purposes of this discussion, these architectures are
notable since they influence the efficiency of the training process, defining
how successful a trained machine learning system will be at a task for a
given amount of training examples given to it.
These learning architectures have traditionally been hand-crafted by
researchers and engineers developing these systems. Meta-learning seeks to
automate this work by treating the task of designing these architectures as
itself a machine learning task.161 This approach has seen a number of
promising successes, with machine generated learning architectures
outpacing the benchmarked performance of their human crafted
counterparts at the same task.162 Meta-learning has also been used to
Id.
See, e.g., Trapit Bansal et al., Emergent Complexity via Multi-Agent Competition,
arXiv:1710.03748 [cs] (2017), http://arxiv.org/abs/1710.03748 (last visited Mar 21, 2018).
161 See, e.g.,Marcin Andrychowicz et al., Learning to learn by gradient descent by gradient
descent, arXiv:1606.04474 [cs] (2016), http://arxiv.org/abs/1606.04474 (last visited Mar
21, 2018).
162 See, e.g., Esteban Real et al., Regularized Evolution for Image Classifier Architecture
Search, arXiv:1802.01548 [cs] (2018), http://arxiv.org/abs/1802.01548 (last visited Mar 21,
2018).
159
160
35
optimize the distributions of neural networks across CPUs and GPUs and
improve training and inference performance.163
Advancements in these techniques again have implications for the role
of computational power in the workflow of machine learning. For one,
meta-learning might improve the performance of machine learning systems
with a given dataset, or enable equivalent performance with less data.
Secondly, the automation of learning architecture design may also increase
the speed at which new machine learning systems can be designed by aiding
human technicians in creating the appropriate architecture for a given task.
Meta-learning does not offer a direct substitute to real-world data in
the same way that simulation learning and self-play seem to. But, metalearning is parallel to these methods insofar as it potentially reduces the
amount of data needed to train a system to successfully accomplish a task.
Meta-learning also accentuates the need for computational power, as a
training process is required for generating an effective learning architecture
as well as in learning how to accomplish the task itself.
Impact: Computational Power and Economic Impact
These shifts in the research field have broader significance because of
the role that the inputs of machine learning play in defining its economic
impact. Machine learning must be cost-effective and equivalently proficient
at accomplishing a given task before it can serve as a competitive substitute
for a human executing the same task. However, achieving this level of
proficiency requires a machine learning model to be trained - a process that
typically requires both sufficient computational power and sufficient data.
The availability of data and the cost of acquiring will vary depending
on the domain. Existing market forces may already make this data freely
available and structured for use. However, there are numerous reasons why
this may not be the case. Legal restrictions rooted in copyright or privacy
may make it expensive or challenging to acquire data.164 The specific
domain may itself make the practical tasks around acquiring the right data
difficult. This is important because the poor availability of data can make it
Azalia Mirhoseini et al., Device Placement Optimization with Reinforcement Learning,
arXiv:1706.04972 [cs] (2017), http://arxiv.org/abs/1706.04972 (last visited Feb 13, 2018).
164 See, e.g., Amanda Levendowski, How Copyright Law Can Fix Artificial Intelligence’s
Implicit Bias Problem (2017), https://papers.ssrn.com/abstract=3024938 (last visited Mar
21, 2018).
163
36
challenging for machine learning to produce a system which is an effective
automated substitute for a given task. In the very least, these barriers may
make the application of machine learning economically unviable for certain
tasks and domains.
The advancements in machine learning research discussed above are
significant because they reduce the dependence on data collection as a
necessary component for training a machine learning system effectively.
Simulation learning and self-play substitute computational power for data,
enabling a system to learn a skill effectively without the physical costs and
logistical requirements of real world collection. Meta-learning potentially
boosts the efficiency of models by adding more computational power.
These shifts have two economic impacts, one on the issue of technological
unemployment, and the other on the issue of the industrial organization of
machine learning.
Technological Unemployment
The economic literature examining the issue of technological
unemployment in the context of machine learning has often abstracted away
from the influence that inputs of data and compute have on the success of
machine learning systems.165 One method is to rely on surveys of expert
opinion about the likelihood that a given task is broadly subject to
automation by machines.166 Common sources for these skills include the
Dictionary of Occupational Titles (DOT) and its successor O*NET databases compiled by the US Department of Labor.167 These skills are
usually articulated in a broad way, such as “[t]he ability to see objects in the
presence of glare or bright lighting” or “[t]he ability to communicate
information and ideas in speaking so others will understand.”168
See, e.g., Anton Korinek and Joseph E Stiglitz, Artificial Intelligence, WorkerReplacing Technological Change and Income Distribution, NBER Economics of Artificial
Intelligence 2017, http://www.nber.org/conf_papers/f100963/f100963.pdf; David Autor &
Anna Salomons, Robocalypse Now–Does Productivity Growth Threaten Employment?,
NBER Economics of Artificial Intelligence 2017,
http://papers.nber.org/conf_papers/f100969/f100969.pdf.
166 See, e.g., Carl Benedikt Frey & Michael A. Osborne, The future of employment: How
susceptible are jobs to computerisation?, 114 Technological Forecasting and Social
Change 254–280 (2017).
167 Dictionary of Occupational Titles, https://occupationalinfo.org/; O*Net Online,
https://www.onetonline.org/.
168 O*Net, Sensory Abilities,
https://www.onetonline.org/find/descriptor/browse/Abilities/1.A.4/; O*Net, Cognitive
Abilities, https://www.onetonline.org/find/descriptor/browse/Abilities/1.A.1/.
165
37
However, examining whether or not machine learning would enable
the automation of “the handling of irregular objects” in such an abstract
way may fail to take into account the costs and practicality of assembling
the data necessary to train a system to an adequate level of proficiency in a
domain. It may also mask challenges in training a system to be sufficiently
robust to accomplish this task across a broad set of sectors and contexts.
The data needed to train a machine learning model to grasp an irregular
object in a well-lit, controlled environment may differ considerably from
the training data needed to teach it to do so underwater, or in the dark.
Examining the availability and cost of these data inputs therefore becomes
critical since it can determine the practical terms under which a human skill
is subject to automation.
The influence of data availability on machine learning performance
suggests that the impact of machine learning on labor automation will
proceed in a fragmentary, domain specific way. The data-replacing (or dataminimizing) techniques discussed above seem poised to accentuate this
differential development. Though impressive, simulation learning and selfplay are not all-purpose; they are most appropriate as learning schemes in
specific circumstances. Self-play is specific to a reinforcement learning
context with competing agents, and simulation learning is most effective in
situations where it is feasible to construct a virtual space analogous to the
real-world problem being solved. However, within these applicable
domains, the barrier to machine learning being applied to a situation may be
fixed by the cost of computing power, rather than the unpredictable costs
and occasionally absolute barriers to collecting data on a particular task.
That may accelerate displacement in those domains.
There are a scattered constellation of applicable domains suggested by
these two techniques. Applications in robotics - in which an agent needs to
accomplish a physical task in the real world, may be particularly benefitted
by the acceleration made possible by simulation learning.169 Competitive
marketplaces, from capital markets to programmatic advertising, may be
places where techniques such as self-play work to significantly improve
machine learning system performance. Military autonomy may also be
similarly impacted as self-play and simulation learning together allow the
training of drones and other robotics in a manner it would otherwise be
See, e.g., Cade Metz, A.I. Researchers Leave Elon Musk Lab to Begin Robotics StartUp, The New York Times, November 6, 2017,
https://www.nytimes.com/2017/11/06/technology/artificial-intelligence-start-up.html (last
visited Mar 22, 2018).
169
38
prohibitively expensive to do in the real-world. Within these types of
contexts, machine learning may begin to have a disproportionate impact.
Meta-learning impacts the relationship between machine learning,
automation, and labor in a related, but more general way. Meta-learning
may produce an overall improvement in the ability for systems to be trained
to an adequate level of proficiency on a task with less data. This may make
certain applications at the margin more viable than they would otherwise
be, particularly in situations where data is scarce. These techniques may
also lower the costs to creating new machine learning systems where
engineering and development costs would have previously made investment
in developing a capability unprofitable. Certain domains may have plentiful
data, but the costs of developing and tuning an appropriate learning
architecture and the potential profit of offering a product in that domain
may render the choice to actually invest in developing the product
unattractive. By aiding human domain experts in architecting these systems,
meta-learning impacts the engineering time and cost of developing new
systems and in doing so broadens the set of arenas that machine learning
will be deployed in.
It is important to recognize that the processes by which labor is
automated are complex, and not purely economic and technical. The ability
for machine learning to proficiently accomplish a task is a necessary but not
sufficient condition for that task to be actually automated in practice.
Business practices can take a long time to respond to technological
change.170 Work is a sociotechnical system - and many forces shape who is
employed and how work is accomplished. Automation may depend less on
the economic opportunities presented by the technology, and more on a
complex fabric of local historical and cultural factors171. Nevertheless, these
techniques may open opportunities to automate where it was previously
technically infeasible or cost-prohibitive to do so.
James Manyika et al, A Future That Works: Automation, Employment, and
Productivity, McKinsey Global Institute 70 (2017), available at
https://www.mckinsey.com/mgi/overview/2017-in-review/automation-and-the-future-ofwork/a-future-that-works-automation-employment-and-productivity (concluding that
“automation will be a global force, but adoption will take decades and there is significant
uncertainty on timing”).
171 See, e.g., Alex Rosenblat and Tim Hwang, Regional Diversity in Autonomy and Work:
A Case Study from Uber and Lyft Drivers (2016), available at
https://datasociety.net/pubs/ia/Rosenblat-Hwang_Regional_Diversity-10-13.pdf
(highlighting regional variation in machine learning driven workplaces); Marc Levinson,
The Box: How the Shipping Container Made the World Smaller and the World Economy
Bigger, Chapters 5-6 (2008) (discussing local political circumstances shaping industrial
outcomes in shipping automation).
170
39
Industrial Organization
We can look at the economic impact of these research developments
in two ways. Simulation learning, self-play, and meta-learning enable
computational power to play a bigger role not just in defining the impact of
machine learning on labor generally, but also in the competitive landscape
between various firms seeking to offer products and services driven by AI,
as well. To this end, computational power will play a role in shaping the
industrial organization of machine learning: the types of competition, its
level of consolidation, and the opportunities for new entrants.
Two “ingredients” serve as barriers to entry in machine learning: the
data necessary to train the systems, and the relatively small pool of qualified
talent necessary to build effective learning architectures.172 Possessors of
these assets have been able to generate some of the most impressive and
groundbreaking machine learning systems, while competitors lacking these
assets have been unable to compete on similar footing.173
These data-substituting and data-minimizing techniques are important
because they shift the competitive balances between companies looking to
lead in the latest generation of AI. For one, the advantages of data
incumbency may be significantly eroded in certain markets. Expansive
historical datasets on farm machinery to train agricultural robots, for
instance, may be offset by sufficient computational power to simply
simulate this farm machinery in a virtual space. As the research continues to
develop, these may represent two viable paths towards developing and
offering effective machine learning products in the space.
The benefits of these research developments might then redound to
the handful of large technology companies that have been already investing
most aggressively in the latest generation of machine learning such as
Google and Facebook. These are companies which already possess
significant endowments of computational power. On that count, the
improvement of simulation learning or self-play may enable these existing
technology leaders to enter new industries and provide products to meet use
172 See, e.g., Cade Metz, Tech Giants Are Paying Huge Salaries for Scarce A.I. Talent, The
New York Times, October 22, 2017,
https://www.nytimes.com/2017/10/22/technology/artificial-intelligence-expertssalaries.html (last visited Mar 21, 2018).
173 See, e.g., Tom Simonite, Apple’s Privacy Pledge Complicates Its Push Into Artificial
Intelligence, WIRED, Jul 14, 2017, https://www.wired.com/story/apple-ai-privacy/ (last
visited Mar 21, 2018).
40
cases even where they lack training data. In the very least, it provides
greater leverage to these technology companies in partnership negotiations
with existing companies within a sector that do possess real world data.
Meta-learning is likely to have a similar impact in practice, though in
theory it should act as a leveler in the space. Meta-learning enables
computational power to offset the advantages that a competitor may have in
human machine learning expertise and talent. As the research matures and
the techniques become increasingly commoditized, the autonomous
construction of learning architectures may allow industries with extensive
data and access to computing power to develop their own machine learning
driven products effectively.
But, it is unclear at what rate meta-learning will become more
commodified and usable by non-specialists. Though it seems poised to
accelerate development times and improve the performance of learning
architectures, meta-learning itself at the moment continues to require
technical expertise and computational power to leverage effectively.
Established technology companies may very well stand to gain again from
these research developments, given their existing endowments of compute
and expertise. In this view, meta-learning will tend to act as a force
multiplier for entities which already have machine learning talent on hand,
rather than democratizing the technology to entities with no experts at all.
These trends tend to suggest greater consolidation in the marketplace
of companies offering products and services driven by machine learning.
Simulation learning, self-play, and meta-learning all chip away at the
potential advantage that non-AI focused industries might have in competing
to offer their own machine learning systems: their data. In the very least,
these trends suggest that one likely outcome is an ecosystem in which other
industries rely on a handful of leading technology companies who provide
these technologies as an “as a service” platform. This already seems to be in
progress, as Google, Amazon, and a number of other companies compete to
offer machine learning capabilities as a series of commodified APIs.174
CONCLUSION: PROSPECTS FOR GOVERNANCE
See, e.g., Google, Google Cloud: Machine Learning at Scale,
https://cloud.google.com/products/machine-learning/; Amazon, Machine Learning on
AWS, https://aws.amazon.com/machine-learning/.
174
41
Computational power does more than simply enable the current
generation of breakthroughs in machine learning. Trends in computational
architecture, semiconductor supply chains, and the field of machine learning
itself suggest the multifaceted ways in which hardware plays a role in
influencing the immediate and long-term impact of the technology on
society.
These changes in the underlying hardware layer would appear to
accentuate many existing concerns that have been raised around AI.
Progression towards more specialized hardware seems to expand the
privacy concerns presented by the technology, and present challenges to the
nimble repair of these systems in the field. Evolving competition in the
semiconductor industry seems likely to make machine learning a flashpoint
in the broader economic conflicts between the US and China.
Breakthroughs in simulation learning, self-play, and meta-learning seem
likely to expand incumbent market power and potentially accelerate labor
displacement.
Simultaneously, seeing these issues through the lens of hardware also
raises opportunities for governance. Computational power is intimately
linked to a nexus of issues in civil rights, consumer safety, geopolitical
competition, labor policy, and corporate power. In contrast to the software
and data that the practice of machine learning relies on, hardware and its
production is more centralized, more able to be monitored, and less able to
evade efforts to govern it. Hardware therefore offers one tangible point of
control for those seeking to find levers on which to base policy and
effectively shape the social impact of the technology.
Public policy to shape the markets and design of machine learning
hardware might manifest in a range of different ways. Existing tools in the
form of export controls and trade policy will play a significant role,
especially given the specific political geography of the actors leading the
design and actual fabrication of these chips. Industrial policy which aims to
accelerate the development of a domestic semiconductor sector like
SEMATECH, or otherwise ensure reliable access to computational power
by companies and government actors working at the software layer of
machine learning, will also play an important role. As FPGAs and ASICs
broaden the potential range of contexts in which machine learning inference
might be deployed, new regulations and industry standards might also serve
to enshrine particular architectures for delivering machine learning products
and services.
42
It is important to recognize that the current affordance that
computational power provides to those thinking about the governance of AI
may not be permanent. The machine learning field continues to evolve at a
rapid rate, and new discoveries may change the relative importance and
economics of computational power going forwards. Rapid advances in
“one-shot learning”, which aim to enable machines to train effectively on
smaller numbers of examples; or “transfer learning”, which works to allow
machines to effectively use knowledge from one domain in another, may
reduce the need for computational power. Indeed, a dependence on machine
learning hardware and concerns about reliable access to it may itself
motivate increased investment and more rapid progress on solving these
types of technical problems.
As with simulation learning and self-play, it is possible that these
research areas may have a narrower influence, influencing only specific
domains and settings in which machine learning is deployed. Much of what
we currently understand about machine learning suggests that significant
computational power will continue to be a key component in building
effective systems.175 Regardless, any policy developed around such a fastmoving technology must take a potential future rewrite of our existing
assumptions into account.
Multiple efforts have been launched to construct a global structure of
governance around the research, development, and application of AI.176
Many of these efforts are developing standards or sets of principles to guide
the actions of the technology industry and the broader community of
researchers and engineers working on machine learning.177 The aim has
This is particularly the case given the increased performance that more data seems to
promise. See Chen Sun et al., Revisiting Unreasonable Effectiveness of Data in Deep
Learning Era, arXiv:1707.02968 [cs] (2017), http://arxiv.org/abs/1707.02968 (last visited
Mar 21, 2018).
176 See, e.g., The Partnership on AI, http://partnershiponai.org/; The IEEE Global Initiative
on Ethics of Autonomous and Intelligence Systems, https://ethicsinaction.ieee.org/;
Building Agile Governance for AI & Robotics (BGI4AI), https://bgi4ai.org/
177 See, e.g., Partnership on AI, Tenets, https://www.partnershiponai.org/tenets/; IEEE,
7000 - Model Process for Addressing Ethical Concerns During System Design,
http://standards.ieee.org/develop/project/7000.html; Future of Life, Asilomar AI Principles,
https://futureoflife.org/ai-principles/; The Conference Towards AI Network Society,
http://www.soumu.go.jp/main_content/000507517.pdf; DJ Patil, A Code of Ethics for Data
Science (2018), https://medium.com/@dpatil/a-code-of-ethics-for-data-sciencecda27d1fac1 (last visited Mar 22, 2018). For further sets of principles, see, e.g., Accenture,
An Ethical Framework for Responsible AI and Robots, https://www.accenture.com/gben/company-responsible-ai-robotics; The Future Computed: Artificial Intelligence and its
role in society, The Official Microsoft Blog (2018),
175
43
been to attempt to shape norms around how the technology is applied, and
the ethical responsibilities around the use of data as an input in the training
process. This is one approach, one which is likely to become increasingly
difficult to enforce effectively as the set of actors that might use the
technology for good or for ill, responsibly or irresponsibly, continues to
expand. As this transition occurs, governance efforts focused on shaping the
direction and availability of computational power may offer a useful
addition to the toolkit of policy options, and an increasingly important one
at that.
https://blogs.microsoft.com/blog/2018/01/17/future-computed-artificial-intelligence-rolesociety/ (last visited Mar 21, 2018); Larry Dignan, IBM’s Rometty lays out AI
considerations, ethical principles ZDNet, http://www.zdnet.com/article/ibms-rometty-laysout-ai-considerations-ethical-principles/ (last visited Mar 21, 2018).
44
| 2cs.AI
|
1
Efficient Enumeration of Unidirectional Cuts for
Technology Mapping of Boolean Networks
Abstract—In technology mapping, enumeration of subcircuits
or cuts to be replaced by a standard cell is an important step
that decides both the quality of the solution and execution speed.
In this work, we view cuts as set of edges instead of as set
of nodes and based on it, provide a classification of cuts. It is
shown that if enumeration is restricted to a subclass of cuts called
unidirectional cuts, the quality of solution does not degrade. We
also show that such cuts are equivalent to a known class of cuts
called strong line cuts first proposed in [14]. We propose an
efficient enumeration method based on a novel graph pruning
algorithm that utilizes network flow to approximate minimum
strong line cut. The runtimes for the proposed enumeration
method are shown to be quite practical for enumeration of a
large number of cuts.
I. I NTRODUCTION
T
c d
e
f
a
b
c
d
e
f
a b
c d
e f
G3
G2
G1
G4
G2
G3
G5
G4
G7
G7
G6
G6
G8
G8
G0
G0
This research is supported by NSF PFI award no. 1237856 and NSF FRP
award no. 1230401.
a b
G5
ECHNOLOGY mapping (TM) is a process of transforming a generic Boolean network, which is a network consisting of primitive gates (e.g. AND/OR), into an equivalent
mapped network, that consists of a network of cells from a
given technology library. Depending on the target implementation, the library cells can correspond to either lookup tables
(LUT) in the case of an FPGA, or to a pre-designed set of
standard cells in the case of an ASIC. The measures of delay,
power, area, or some combination of them serve as an objective
function to optimize during the transformation process.
TM is formalized as a graph covering problem. A given
Boolean network is represented as a directed acyclic graph
(DAG) G = (V, E), which is referred to as the subject graph.
The cells in the library, being single output Boolean functions,
are also represented by DAGs, and each is referred to as
a pattern graph. A feasible solution of TM is a complete
covering of the subject graph with one or more of the pattern
graphs (see Figure 1). A core step in this process is to identify
a subgraph in the subject graph to match with one or more
pattern graphs. In the structural approach to TM [24], the
selection of subgraphs is achieved by computing a cut.
The recent works on structural approaches to TM [4], [7],
[16], [19] are based on a particular type of a cut, called
minimal node-cut. A node-cut Cv associated with a node
v ∈ V is a subset of nodes in the transitive fanin cone of
v such that every path from the primary inputs to v includes a
node in Cv . Note that in the existing literature, the definition of
a node-cut restricts it to be minimal, i.e., no proper superset of
a node cut is a legal node cut. In this article we will explicitly
refer to a minimal node cut, if that is the case. By definition,
A k-feasible minimal node cut of a node v is a minimal node
cut of cardinality k [4].
A cut together with a node v defines a single-sink subgraph
that is either directly mappable onto a k-input LUT in the
case of an FPGA, or constitutes a match candidate for a NPNequivalent standard cell, for an ASIC design, provided such
an entity exists in the given library. In the literature k-feasible
node cuts are usually simply referred as k-feasible cuts as no
other type of cut is usually considered for technology mapping
[4], [7], [16], [19].
In Figure 1, associated with node G0, the sets {G6, G7},
and {G6, G8} are 2-feasible minimal node cuts, whereas
{G2, G5, G7} is a 3-feasible minimal node cut. When the
cut {G6, G7} is selected, the actual subgraph replaced by a
cell in TM consists of gates {G8, G0}. Similarly, when the
cut {G2, G5, G7} is chosen the subcircuit consisting of gates
{G8, G6, G0} is replaced.
G1
arXiv:1603.07371v1 [cs.DS] 23 Mar 2016
Niranjan Kulkarni, Sarma Vrudhula
School of Computing, Informatics and Decisions Systems Engineering
Arizona State University
Email: vrudhula@asu.edu
(a)
h
(b)
h
(c)
h
Fig. 1: a) A covered Boolean network. b) Its graph representation. c) The network mapped on the library gates.
A node may have many associated k-feasible node cuts,
which result in different coverings. In TM, the quality of
a covering is usually taken to be the delay of the critical
path, and/or the total area of the mapped circuit. Hence, to
evaluate the quality of the complete covering, cuts also need
to be evaluated. The quality of a cut is typically a combined
measure of the subcircuit that will be replaced by a library
cell and the subcircuit that feeds that cell. Since neither of
2
these can be evaluated without knowing the cut, enumeration
of cuts is a core task in TM. Consequently, there has been
a significant amount of effort devoted to the development of
efficient algorithms for enumerating k-feasible node cuts [4],
[5], [16], [22].
While structural technology mapping turned out to be very
successful, minimal node cuts bear some bias that eventually
limits the number of possible matches. As demonstrated in
[18], this may result in excluding many feasible, high quality
matches from the evaluation. The authors of [18] address this
problem by constructing so-called supergates i.e. single output
networks of library gates that are added to the library in order
to increase the number of matches. This demonstrates that
enhancing a match space could yield significant benefits for
structural technology mapping.
Existing work on TM focuses on minimal node cuts. However, including non-minimal node cuts can increase substantially increase the possible matches. Consider Figure 2. The
node cut C = {a, b, x, d} is not minimal since {a, b, d} is
also a (minimal) node cut. However C corresponds to the
function ab + x + d. This happens to be a linearly separable
(threshold) function, which would never be found by any cut
enumerator that enumerates only minimal node cuts. Another
representation of a cut, based on edges, is called a line cut,
which includes both minimal and non-minimal node cuts.
Definition 1: (a) A line cut is a minimal set of directed
edges in a single sink DAG which when removed,
eliminates all paths from any of source (primary input)
to the sink i.e. produces an “S-T bipartition”.
(b) A line cut is k-feasible if its cardinality (number of
edges) is k or smaller.
(c) A line cut is called a strong line cut [14] if no two edges
in the line cut are on the same directed path.
Note that line cuts and node cuts are simply two representations of same entity, and either form can be converted
into other. They both partition the nodes of the DAG into two
mutually exclusive sets S and T . In such an S-T partition,
the set S of nodes must contain primary inputs and T must
contain the sink node v.
In Figure 2(a) the line cut {(x, z), (a, y), (b, y), (d, w)}
(corresponding node cut being C = {a, b, x, d}) generates
S = {a, b, c, d, e, x}, and T = {y, z, w}, and is unidirectional.
In Figure 2(b), the line cut {(a, c), (b, g)} (corresponding
node cut is {a, b}) has S = {a, b} and T = {c, g}, and is
bidirectional since (b, g) is a “forward edge” and (c, b) is a
“backward edge”. Note also that the minimal node cut {a, b, d}
would identify ab + a0 b0 + d as a function to be replaced by
some cell from the library. However this is neither a member
of any well defined class of functions, e.g. threshold functions,
nor it is a function that would be in a typical cell library. Thus,
minimal cuts are not always the most useful or desirable. In
addition, we show that bidirectional cuts are not necessary
and discarding them does not degrade quality of TM with
regard to critical path delay. Thus we need only enumerate
unidirectional node cuts (minimal or non-minimal).
We establish a one-to-one correspondence between unidirectional nod cuts and strong line cuts [14]. This correspondence
is important because there exists a well established relation
between strong line cuts in a DAG and independent sets in
its corresponding line dependency graph (LDG) [14]. This
allows for construction of efficient strong line cut enumeration
techniques based on enumeration of independent sets. Since
the latter is a problem well researched in computational
graph theory, techniques exist that can be directly applied
to enumerating line cuts by enumerating independent sets.
Figure 3 shows classification of cuts and their relationships.
The proposed technique for enumerating strong line cuts was
used in [15] to find threshold functions in a logic circuit.
Conventionally
enumerated
Line cuts
Minimal node cuts
Bidirectional
Non-Minimal node cuts
Unidirectional Unidirectional
Bidirectional
Discardable set
Strong line cuts
Fig. 3: Classification of cuts and their relationships
Fig. 2: (a) Unidirectional node cut denoted as {a, b, x, d} (b)
Bidirectional node cut denoted by {a, b}
Figure 2 a) shows a line cut consisting of edges
{(x, z), (a, y), (b, y), (d, w)}. The node cut corresponding to
this line cut is C = {a, b, x, d}, which is not minimal. Since
minimal and non-minimal node cuts are useful, it appears that
line cuts are the cuts that should be enumerated. A cut can
also be classified as being unidirectional or bidirectional. It is
unidirectional if all the edges between S and T originate in
S and terminate in T . Otherwise it is bidirectional.
The main contributions of this article include:
• Introduction of unidirectional node cuts and a proof
showing that restricting the cut space to only unidirectional node cuts does not degrade the quality of mapping
for delay.
• Establishing the equivalence unidirectional node cuts and
strong line cuts.
• An efficient k-feasible strong line cut enumeration algorithm based on the relationship between a DAG and its
LDG.
• A general framework and the specific implementation
of a pruning technique for k-feasible strong line cut
enumeration.
• An efficient implicit representation of bounded size MISs
of a graph that allows for both unconstrained and con-
3
strained enumeration of such MISs.
II. R ELATED W ORK
The importance of cut computation in TM for FPGAs was
first identified by the Cong et al. [5]. They developed a
novel and elegant network flow based algorithm that directly
identified a single, depth-optimal, k-feasible node cut, without
enumerating cuts. Later, Pan et al. [21], [22] developed an
efficient algorithm for enumerating cuts that avoided the large
computational requirements of network flow. More recently,
Ling et. al [16] developed a novel scheme for implicitly
encoding cuts using Binary Decision Diagrams (BDD). This
representation allowed for extraction of cuts when the value
of a cut could be computed recursively. However, the authors
admit that BDD approach is not very well suited for cut
enumeration since non-cuts, which dominate cuts, are also
implicitly included and need to be pruned during enumeration.
Finding a computationally efficient way of encoding and
enumerating cuts is of fundamental importance to technology
mapping. Recently Takata et al. [25] proposed a top-down
scheme for the procedure of [22] and demonstrated speedups of 3x-8x for larger k = 8, 9. Unfortunately, since the
number of cuts of size at most k is of O(nk ), cut enumeration
algorithms inherently suffer from poor scalability. To alleviate
this problem, techniques for ranking and pruning of cuts were
first proposed by Cong et al. in [7]. The basic observation
of this work is that for certain optimization objectives it is
possible to narrow the search down efficiently and extract
depth-maximal or area-minimal cuts directly. Similar ideas,
referred to as priority cuts, were proposed by Mischenko et al.
in [19], where appropriate seeding of the procedure from [22]
assured enumeration of only O(n2 ) priority cuts instead of
O(nk ) cuts. These can be further sorted by quality, and pruned.
An alternative approach to pruning was proposed by Chatterjee
et al. in [4] where they introduced hierarchical partitioning
of the cut space based on a novel concept that is similar
to algebraic factorization. The authors showed that while
complete factorization may still suffer from poor scalability,
partial factorization of the cut space could yield good, practical
solutions with very short runtimes. Takata [25] proposed a
partial enumeration scheme that enumerates only a subset
called label cuts. The scheme improves scalability of cut
enumeration and guarantees to maintain the circuit’s depth, at
the expense of small increase in the estimated network area.
All the works identified above, and many others have
demonstrated that structural technology mapping, the core of
which involves cut enumeration, leads to far superior solutions
than the traditional graph/tree matching based algorithms. Cut
enumeration has also found uses in related applications such
as re-synthesis through rewriting [17], application specific
instruction set extension generation/optimization [6], hardware/software co-design [23], model checking in verification
[3], and SAT problem preprocessing for simplification [10].
The use of a line dependency graph (LDG) derived from
a DAG was proposed by Kagaris et al. [14] to compute
the maximum strong cut in a circuit for the purpose of
delay testing. Based on the observation that an LDG is a
transitively-oriented graph, hence a comparability graph [13],
they provide an efficient and elegant algorithm that computes
a maximum independent set of the LDG using network flow.
This set represents a maximum strong cut in the corresponding
DAG. While their approach generated interest in the area of
delay-testing, we will demonstrate that there is still greater
opportunity for further exploration and exploitation of the
DAG/LDG duality for strong cut enumeration.
III. S TRONG LINE CUTS
We now describe the relation between DAGs and their
corresponding line dependency graphs (LDG). An LDG is
an undirected graph derived from a DAG that encodes the
transitive dependencies between DAG edges [14]. Each edge
e of the DAG has a corresponding node v in the LDG.
Two nodes of an LDG are connected if and only if their
corresponding lines in the DAG are transitively dependent,
i.e., there exists a path in the DAG from any source to any
sink that contains both edges. Consequently, if an edge in
DAG is transitively dependent on another edge, by definition
the corresponding nodes in LDG will be neighbors. Since
LDGs are by definition transitively oriented, they are also
comparability graphs [13].
An independent set (IS) in a graph G(V, E) is a set S
of vertices no two of which share an edge. A maximal
independent set (MIS) is an independent set which is not a
proper subset of any other independent set in the graph.
Lemma 1: (From [14]) A strong line cut of a DAG forms
a maximal independent set (MIS) in its corresponding LDG.
Fig. 4 illustrates the relation between DAGs and LDGs
established by Lemma 1, on an example that we will use
throughout this article for illustration. The direct consequence
of this lemma is that enumerating all k-feasible strong line
cuts in a DAG is equivalent to enumerating all maximal
independent sets of size ≤ k in the LDG.
A
B
q
p
C
r
q
r
s
E
D
t
u
t
u
p
s
F
v
(a)
v
(b)
M
Fig. 4: a) a DAG with strong cuts annotated. b) The corresponding maximal independent sets in LDG.
A. Relationship between unidirectional node cuts and strong
line cuts
In this section, we show the equivalence between unidirectional node cuts and strong line cuts. We also establish the
fact that if the cut space is restricted to unidirectional node
cuts then the quality of technology mapping for minimizing
delay remains same.
In the following we restrict the DAG to be a transitive fanin cone of some gate in a circuit, since in TM only transitive
4
Fig. 5: a) Classification of edges in a bidirectional cut b) Replication after TM, (c) Classification of edges in corresponding
unidirectional cut.
fan-in cones of gates/nodes are considered for enumerating
cuts. v refers to the root node whose transitive fan-in cone is
being considered.
Lemma 2: A strong line cut corresponds to a unidirectional
set of edges crossing an S − T partition.
Proof: For an arbitrary node u ∈ S, there exists a path
u
v. This is straightforward from the definition of DAG
considered here which is the transitive fan-in cone of the node
v. Assume that the S − T partition corresponding to a strong
line cut Cv is bidirectional, i.e., there exists a directed edge
(p, q) such that p ∈ T and q ∈ S. Then for some x ∈ S and
y ∈ T , (x, y) ∈ Cv , there must exist a path x → y
p. Since
edge (p, q) exists, there must exist a path x → y
p → q.
Since q ∈ S, the root node v must be reachable from q through
another edge in the cut Cv , say (r, s). Therefore we have a
complete path that looks like x → y
p→q
r→s
v.
Note that edges (x, y) and (r, s) both belong to the cut. This is
clearly a contradiction, since no two lines in the cut Cv should
lie on same path. Also (x, y) 6= (r, s) because that would lead
to a directed cycle x → y
p → q
x in the directed
acyclic graph under consideration.
Conversely, assume a unidirectional node cut in which all
the edges are from S to T , and suppose the corresponding
line cut is not a strong line cut. Then there must exist at least
edges e1 = (x, y) and e2 = (u, w) in the line cut that are
on the same path to node v (the output). Assume e1 precedes
e2 in the path. By definition of a S − T partition, x ∈ S,
y ∈ T , u ∈ S and w ∈ T . However, since y
u, we have an
edge starting from T and ending in S, which contradicts the
assumption that it is a unidirectional node cut.
Lemma 2 confirms that a strong line cut must be unidirectional and a unidirectional cut must be a strong line cut. Note
that the cardinality of a strong line cut and the unidirectional
node cut can be different. The reason we convert back from a
strong line cut to a node cut (which is unidirectional) is that
eventually a node cut is what is mapped onto a cell. A node
cut form of a line cut would always require smaller library cell
whether mapping is done using standard Boolean functions or
threshold functions.
Next we show that restricting node cuts to unidirectional
node cuts will not increase the critical path delay when that is
the objective function being minimized by TM. Note that in
TM, the delay of path is the sum of the delays of gates in the
path. We show that the set of paths to the output node v in
a bidirectional cut is the same as those in the corresponding
unidirectional cut.
Figure 5(a) shows a classification of the edges in a bidirectional cut. T = X ∪Y , where X is the set of logic cones (node
and all nodes in its fanin cone) whose output has a directed
edge to some node in S, and Y is the set of nodes with no
paths to S. Note v ∈ Y . TM would replicate X in S and then
replace T with some appropriate cell in the library. This is
depicted in Figure 5(b). Four types of edges can be identified
in the S − T partition: (1) E1 are edges from S to X, (2) E2
are edges from X to S, (3) E3 are edges from S to Y , and
(4) E4 are edges from X to Y .
Now a path from input node in S to the output node v ∈ T
can be one three types:
E
E
1
4
1) S =⇒
X =⇒
Y =⇒ v.
E2
E3
2) S =⇒ S =⇒ Y =⇒ v.
E3
3) S =⇒
Y =⇒ v.
Note that every one of the above paths (sequence of nodes)
in the graph of Figure 5(a) also exists in the graph shown
in Figure 5(b). Now consider the corresponding unidirectional
cut shown in Figure 5(c). Every path that exists in Figure 5(a)
also exists in Figure 5(c), and visa versa. This shows that there
is no disadvantage to retaining only unidirectional cuts.
IV. C UT ENUMERATION
Enumerating MISs is a key step in many computational
graph theory problems [1], [2], [11]. In TM, because there
is a fixed library of functions, MIS enumeration needs to be
restricted to sets of size ≤ k. Without any restrictions, the
number of MISs in arbitrary graphs grows exponentially in the
size of the graph [2]. However, in TM, the size k of the MIS is
bounded above by some constant, and independent of n, which
is the size of the graph. Therefore the number of MISs of size
≤ k is ≤ nk . A brute force approach in which all subsets
of size ≤ k are examined and those that are not an MIS are
discarded, is not practical for even realistic values of n and k.
Existing algorithms exploit specific properties of small MISs
to facilitate enumeration [11]. We now describe a method that
can significantly speedup existing MIS enumeration algorithms
by pruning away many MISs that will not be part of the final
solution.
A. MIS pruning
The LDG of a DAG encodes MISs, many of which have
sizes > k. The basic idea in the pruning algorithm is to
5
(efficiently) transform an LDG into a new, smaller, and denser
graph G0 which contains all the MISs of size ≤ k of the
original LDG, and as few other (parasitic) MISs as possible.
The objective is to construct a transformation which is computationally efficient and would significantly reduce the runtime
of enumeration.
The graph G0 to be constructed must satisfy the following
conditions: every vertex v of G0 as well as every disconnected
pair of vertices in G0 must independently be a part of some
MIS of size ≤ k of the original graph G. This condition
translates into two steps of the pruning algorithm. In the first
step, for each vertex v we attempt to determine the size of the
smallest MIS to which v belongs. If this MIS is of size ≤ k
then v is included in G0 . The second step decides if any two
disconnected vertices in G may safely share an edge in G0 ,
implying that they will not be part of any MIS. Again for each
pair of disconnected vertices (u, v) we attempt to determine
the size of the smallest MIS containing both of the vertices.
If such MIS is of size > k then an edge (u, v) is added to G0 .
This is the key step in the of following pruning algorithm.
Input: A DAG D(VN , EN ), An LDG G = (V, E) and
an integer k
Output: Graph G0 = (V 0 , E 0 ) characterized above
dl = Φ, el = Φ;
for vertex v in G do
λ = Min-MIS(D, G, v);
if λ > k then
S
dl = dl
v;
end
end
for disconnected pair (u, v) in G such that u ∈
/ dl and
v∈
/ dl do
λ = Min-MIS(D, G, u, v);
if λ > k then
S
el = el
(u, v);
end
end
S
E0 = E
el;
V 0 = V − dl;
return G0 (V 0 , E 0 );
Algorithm 1: Algorithm to prune MISs of an LDG
There is no known polynomial procedure to compute the
size of the smallest MIS that contains a given vertex or
a pair of vertices for comparability graphs [9]. Hence we
approximate the size of the minimum MIS containing a vertex
v or a pair of vertices (u, v) of a given LDG by exploiting the
duality between MISs in LDGs and strong line cuts in DAGs.
The minimum MIS in an LDG is the minimum strong cut
in the DAG. We use this fact to approximate the minimum
MIS size in an LDG by means of a flow computation in its
corresponding DAG.
It is well known that a minimum s-t cut (min-cut) is
equivalent to the maximum flow the sink t receives from the
source s [8], [12]. The size of a cut is a sum of capacities
of edges involved in it. If unit edge capacities are assigned,
then the size of a cut is equivalent to number of edges. We
note that an edge with a capacity of ∞ can never be part
of a finite size cut. The size of the minimum MIS in an
LDG containing a vertex v or a pair of vertices (u, v) is
approximated by computing the min-cut in the DAG with unit
edge capacities. The procedure (Alg. 2) assigns a capacity of
∞ to the dependent lines of the given line (e.g. corresponding
to node v) and a capacity of 1 to all other lines. The capacities
of edges attached to s and t are always ∞. This is because
a min-cut must consist of circuit lines only. Finally it returns
the size of the minimum s-t cut of the network (λ).
Input: A DAG D(VN , EN ), LDG G and a line v
Output: Approximate size of minimum MIS (strong cut)
containing v
for u in G do
capacity[u] = 1;
end
for neighbor w of v in G do
capacity[w] = ∞;
end
return Min-cut(D,capacity);
Algorithm 2: Min-MIS procedure for single edge in DAG
Lemma 3: Let Smin be the minimum strong cut containing
line v. Let λ be the size of a min-cut of the network with
capacities modified based on line v. Then λ ≤ |Smin |.
Proof: The Min-MIS procedure never assigns a capacity
of ∞ to any line l ∈ Smin . Thus |Smin | is finite. It
immediately follows that Smin is an arbitrary s-t cut, and
cannot be smaller than the min-cut of the network.
Lemma 3 states that the size of the minimum strong cut is
guaranteed to be greater than or equal to the size of a mincut. Hence if the result of Min-MIS is > k then the size of
a minimum strong cut is also > k. Consequently, the vertex
in G for which Min-MIS was computed to be > k can be
safely discarded from G0 , or an unconnected pair of vertices
for which Min-MIS was computed can be connected in G0 .
As an example, consider the LDG in Fig. 4(b), and suppose
we wish to check whether vertex p belongs to an MIS of
size ≤ 2. This is equivalent to determining if line p belongs
to minimum strong cut of size at most 2 in the DAG. We
assign capacities to the edges, as shown in Fig. 6(a). Line p
is assigned a capacity of 1 and its dependent lines, t and v,
are assigned a capacity of ∞. After this, the s-t minimum cut
size (λ) is determined. In this example, it is lines p, q and u,
and its size is 3 — i.e. λ = 3.
Theorem 1: Let S be an MIS in G such that |S| ≤ k. Then
S is also an MIS in G0 .
Proof: From Lemma 3 every vertex of S must be present
in G0 and that no edge was added between any two of its
vertices. Thus S is an independent set in G0 . Assuming S is
not a MIS in G0 , there exists an independent set S 0 in G0 such
that S ⊂ S 0 . It follows that S 0 is also an independent set in
G contradicting the fact that S is an MIS in G.
Lemma 4: Pruning algorithm runs in O(n3 ).
6
small k. Hence, even the simple recursive algorithm that
we used is still efficient. More sophisticated approaches to
enumerate MISs of size ≤ k [1], [11] could be used to
improve runtime for with values of k. Their application on
the transformed graph may further improve total runtimes as
well as scalability of the solution.
S
∞
A
∞
∞
B
q
1
r
1
p
D
t
1
1
s
E
u
∞
C
1
t
F
v
u
C. Results
∞
G
∞
v
(b)
(a)
T
Fig. 6: a) Formation of s−t Boolean network for determination
of a cut containing line p. b) LDG from Fig. 4 pruned for
k ≤ 2.
Proof: Let n be the number of nodes, m be the number of
edges in DAG. The second for loop in pruning algorithm runs
in O(m2 ) and dominates the overall complexity. Determining
the min-cut takes O(km) time [8]. Since k ≤ n and is
independent of n, the pruning has fixed complexity of O(m3 ).
We know that m ≤ ∆n where ∆ is maximum degree found
in the DAG. For most of the circuits with limited fanin (and
fanout) capacities ∆ can be regarded as a small constant
independent of n. Hence the time complexity of the pruning
procedure is O(n3 ).
As a result of the pruning transformation we perform MIS
enumeration on G0 instead of G. Note that not all MISs in G0
are of size k in G. However, our experiments demonstrate that
using G0 instead of G to enumerate MISs significantly reduces
the enumeration time. In fact, the enumeration runtimes we
observe in our experiments are practical for all of the evaluated
benchmark circuits, suggesting that the approximation of a
Min-MIS used in pruning must be quite accurate.
B. Enumerating MISs
As stated earlier, there are many known MIS enumeration
techniques in computational graph theory. In fact, the choice of
enumeration algorithm is independent of MISs pruning. In our
experiments, we used a recursive procedure that is basically
a simplified form of the algorithm presented in [1]. The idea
is to recursively enumerate MISs that contain a specific node
and then those that do not contain that same node. Once we
designate a node to be part of the MIS, none of its neighbors
can be part of that MIS. Similarly, if a node is not a part of
the MIS, any of its neighbors can be part of the MIS.
Note, that due to the pruning transformation being approximate, G0 may still contain some MISs of size > k. Since we
are interested only in maximal independent sets of size ≤ k,
we simply discard, on the fly, the MISs whose size is greater
than k.
Unfortunately, the number of MISs of a graph increases
exponentially as a function of its size [20]. However in
practice we found that while running it on a pruned graph G0 ,
enumeration time is dominated by pruning time for sufficiently
The procedures described in this article were implemented
in C++ and run on a 2GHz PC with 2 GB of RAM. The results
of these runs are summarized in Table I. We ran the simple cut
enumeration algorithm after pruning the MISs, and enumerated
all cuts in the ISCAS benchmark circuits. The starting point
was an AND-INVERTER Graph (AIG) obtained from [19].
Note that MIS enumeration is not possible with any of the
existing MIS enumeration schemes. In fact, even a graph with
as few as a hundred nodes would not be practical.
The proposed pruning procedure makes it possible to exhaustively enumerate large numbers of strong line cuts in
reasonable time. We also evaluated the combined effect of
constraining the cone size and increasing the value of k.
The results demonstrate that for sufficiently small k, line
cut enumeration is dominated by our pruning transformation
and as such is practically polynomial. For larger values of k
however the procedure could however benefit from a more
efficient MIS enumeration procedures.
V. C ONCLUSION
In this work, we presented a novel cut enumeration framework that exploits duality between enumerable entities in
DAGs and LDGs. Apart from resource efficient computational
procedure, it also introduces into the area of technology
mapping, the concept of k-feasible strong line cuts (or unidirectional cuts) that are distinct from conventional node cuts.
The advantages are two-fold. On one hand they are enumerable
with low per-unit computational effort. On the other hand
they potentially open up a new space available to be explored
by the technology mapper without degrading the quality of
the mapping. Line cuts provide choices not available to node
cut based technology mappers. More importantly line cuts
inherently mitigate some of the structural bias of node cuts and
unlike node cuts they guarantee a mappable cut of a circuit.
R EFERENCES
[1] J. Byskov. Algorithms for k-colouring and finding maximal independent
sets. In Proc. Symp. on Discrete Algorithms, pages 456–457. PA, USA,
2003.
[2] J. M. Byskov. Enumerating maximal independent sets with applications
to graph colouring. Oper. Res. Lett., 32(6):547–556, Nov. 2004.
[3] M. L. Case, A. Mishchenko, and R. K. Brayton. Cut-based inductive
invariant computation. In Proc. IWLS’08, pages 172–179, 4–6 Jun. 2008.
[4] S. Chatterjee, A. Mishchenko, and R. K. Brayton. Factor cuts. In Proc.
ICCAD ’06, pages 143–150, 5–9 Nov. 2006.
[5] J. Cong and Y. Ding. FlowMap: an optimal technology mapping
algorithm for delay optimization in lookup-table based FPGA designs.
IEEE Trans. CAD, 13(1):1–12, Jan. 1994.
[6] J. Cong, G. Han, and Z. Zhang. Architecture and compiler optimizations
for data bandwidth improvement in configurable processors. IEEE Trans.
on VLSI Syst., 14(9):986–997, 2006.
7
TABLE I: Running times for enumeration
circuit
# inputs
# nodes
c432
c1355
c1908
c6288
c7552
36
41
33
32
207
356
1133
1793
4864
7233
K = 6, cone size = no
#cuts
pruning
after pruning
time (s)
4317
0.93
228,950
49.04
9,519,182
48.12
1,494,636
6085.06
5,949,016
182.96
limit
enum.
time (s)
0.02
3.22
9.43
190.86
17.43
K = 6, cone size = 300
#cuts
pruning
enum.
after pruning
time (s)
time (s)
4253
0.98
0.02
129,994
15
2.5
2,099,375
18.49
5.02
737,587
480.83
63.96
2,521,039
55.48
10.75
[7] J. Cong, C. Wu, and Y. Ding. Cut ranking and pruning: enabling a
general and efficient FPGA mapping solution. In Proc. FPGA’99, pages
29–35, New York, 21–23, Feb. 1999. ACM.
[8] T. Cormen, C. Leiserson, R. Rivest, and C. Stein. Introduction to
algorithms. MIT Press, Cambridge, MA, 2001.
[9] D. Corneil and Y. Perl. Clustering and domination in perfect graphs.
Discrete Applied Mathematics, 9(1):27–39, 1984.
[10] N. Een, A. Mishchenko, and N. Sorensson. Applying logic synthesis
for speeding up SAT. Lect. N. Comp. Sci., 4501:272, 2007.
[11] D. Eppstein. Small maximal independent sets and faster exact graph
coloring. Lect. N. Comp. Sci., pages 462–470, 2001.
[12] L. Ford and D. Fulkerson. Flow in networks. Princeton University
Press, Princeton, NJ, 1962.
[13] M. Golumbic. Algorithmic graph theory and perfect graphs. NorthHolland, 2004.
[14] D. Kagaris and S. Tragoudas. Maximum weighted independent sets
on transitive graphs and applications. Integration, the VLSI Journal,
27(1):77–86, 1999.
[15] N. Kulkarni, N. Nukala, and S. Vrudhula. Minimizing area and power of
sequential cmos circuits using threshold decomposition. In Proceedings
of the International Conference on Computer-Aided Design, ICCAD ’12,
pages 605–612, New York, NY, USA, 2012. ACM.
[16] A. C. Ling, J. Zhu, and S. D. Brown. BddCut: Towards scalable symbolic
cut enumeration. In Proc. ASP-DAC’07, pages 408–413, 23–26 Jan.
2007.
[17] A. Mishchenko, R. Brayton, J.-H. R. Jiang, and S. Jang. Scalable don’tcare-based logic optimization and resynthesis. In Proc. FPGA ’09, pages
151–160, NY, 21–23 Feb. 2009. ACM.
[18] A. Mishchenko, S. Chatterjee, R. Brayton, X. Wang, and T. Kam.
Technology mapping with boolean matching, supergates and choices.
[19] A. Mishchenko, S. Cho, S. Chatterjee, and R. Brayton. Combinational
and sequential mapping with priority cuts. In Proc. ICCAD’07, pages
354–361, 4–8 Nov. 2007.
[20] J. Moon and L. Moser. On cliques in graphs. Israel Journal of
Mathematics, 3(1):23–28, 1965.
[21] P. Pan and C.-C. Lin. A new retiming-based technology mapping
algorithm for LUT-based FPGAs. In Proc. FPGA ’98, pages 35–42,
New York, 22–24 Feb. 1998. ACM.
[22] P. Pan and C. L. Liu. Optimal clock period FPGA technology mapping
for sequential circuits. ACM TODAES, 3(3):437–462, 1998.
[23] J. Peddersen, S. Shee, A. Janapsatya, and S. Parameswaran. Rapid
embedded hardware/software system generation. In Int. Conf. on VLSI
Design, pages 111–116, 2005.
[24] S. Chatterjee. On Algorithms for Technology Mapping, PhD Thesis.
2007.
[25] T. Takata and Y. Matsunaga. An efficient cut enumeration for depthoptimum technology mapping for lut-based fpgas. In Proceedings of
the 19th ACM Great Lakes Symposium on VLSI, GLSVLSI ’09, pages
351–356, New York, NY, USA, 2009. ACM.
K = 10, cone size =
#cuts
pruning
after pruning
time (s)
382,697
2.22
26,194,458
29.25
1,311,442,759
36.46
150,921,850
379.75
3,113,268,991
193.59
100
enum.
time (s)
1.60
286.06
6510.5
4570.26
7046.68
| 8cs.DS
|
Evolution of Covariance Functions for Gaussian
Process Regression using Genetic Programming
Gabriel Kronberger and Michael Kommenda
arXiv:1305.3794v2 [cs.NE] 22 May 2013
School of Informatics, Communications and Media,
University of Applied Sciences Upper Austria,
Softwarepark 11, 4232, Hagenberg
{gabriel.kronberger,michael.kommenda}@fh-hagenberg.at
Abstract. In this contribution we describe an approach to evolve composite covariance functions for Gaussian processes using genetic programming. A critical aspect of Gaussian processes and similar kernel-based
models such as SVM is, that the covariance function should be adapted to
the modeled data. Frequently, the squared exponential covariance function is used as a default. However, this can lead to a misspecified model,
which does not fit the data well.
In the proposed approach we use a grammar for the composition of covariance functions and genetic programming to search over the space of
sentences that can be derived from the grammar.
We tested the proposed approach on synthetic data from two-dimensional
test functions, and on the Mauna Loa CO2 time series. The results show,
that our approach is feasible, finding covariance functions that perform
much better than a default covariance function. For the CO2 data set a
composite covariance function is found, that matches the performance of
a hand-tuned covariance function.
Keywords: Gaussian Process, Genetic Programming, Structure Identification
1
Introduction
The composition of covariance functions is a non-trivial task and has been described as a black art [2]. On the one hand, it is critical to tune the covariance
function to the data set, that should be modeled, because this is the primary
option to integrate prior knowledge into the learning process [10]; on the other
hand a lot of experience and knowledge about the modeled system is required
to do this correctly. Frequently, and especially for multi-dimensional data sets it
is far from obvious how the covariance function should be structured.
In this work we discuss the composition of covariance functions for Gaussian
processes, that can be used for nonparametric machine learning tasks e.g., for
regression or classification [10]. In this context a Gaussian process is used as a
Bayesian prior over functions, relating the input variables to the target variable.
Gaussian process regression allows modeling of non-linear functional dependencies through different covariance functions, and produces posterior probability
distribution estimates for the target values instead of point estimates only.
2
1.1
Evolution of Covariance Functions for Gaussian Process Regression
Our Contribution
The aim of this paper is to describe the idea of using a grammar for covariance
functions and genetic programming to search for a good covariance function for a
given data set. We also describe our prototype implementation using grammarguided tree-based GP, and finally, present results as a proof-of concept. We
have not yet evaluated the difficulty of this problem for genetic programming,
and in particular, if GP suited well for this kind of problem. The results of
our experiments indicate that the idea is feasible, producing good covariance
functions for low-dimensional data sets.
1.2
Previous Work
In a very recent contribution, the problem of structure identification for covariance functions has been approached using a grammar, or rather a set of rewriting
rules, as a basis for searching over composite covariance functions for Gaussian
processes [2]. This approach is actually very similar to our work; the main difference is, that in our work we use genetic programming to search over the set of
possible structures, while Duvenaud et al. enumerate over composite functions,
starting with standard functions.
Another recent contribution discusses more flexible families of covariance
functions, instead of composing covariance functions from simple terms [12].
Also related is earlier work that describes additive Gaussian processes [3], which
are equivalent to a weighted additive composition of base kernels, but can be
calculated efficiently.
Genetic programming has been used previously to evolve kernel functions for
SVMs with mixed results [4], [6]. The latest contribution found that genetic programming was able to “rediscover multiple standard kernels, but no significant
improvements over standard kernels were obtained” [7]. These results can, however, not be transfered directly to Gaussian processes because of several major
differences between Gaussian processes and SVMs. In particular, in the case of
Gaussian processes hyper-parameters are optimized using a ML-II approach, in
contrast to SVMs, where hyper-parameter values are usually tuned using crossvalidation and grid-search. Additionally, in contrast to all other previous work,
simple embeddings of covariance functions by masking dimensions are supported.
2
Gaussian Processes
A Gaussian process is a non-parametric model that produces predictions solely
from the specified mean and covariance functions and the available training
data [10]. The inference of function values f ∗ for observed input values X ∗ based
on observations of y and X involves the calculation of the covariance matrices K(X, X) and K(X, X ∗ ) and inference from the multi-dimensional Gaussian
shown in Equation 1.
y
m(X)
K(X, X) + σ 2 I K(X, X ∗)
∼
N
,
(1)
f∗
m(X ∗ )
K(X ∗ , X) K(X ∗ , X ∗ )
Evolution of Covariance Functions for Gaussian Process Regression
3
The term σ 2 I is necessary to account for Gaussian distributed noise with
variance σ 2 . From this definition it follows that the posterior for f ∗ is again
a multi-dimensional Gaussian. For model selection and hyper-parameter learning the marginal likelihood p(y|X) must be calculated. The model is a multidimensional Gaussian so an analytical form of the likelihood can be derived.
Calculation of the marginal likelihood requires a matrix inversion and, thus,
has asymptotic complexity O(n3 ). Usually, the covariance function K(x, x′ ) has
hyper-parameters that must optimized. This is often accomplished in a simple ML-II fashion, optimizing the hyper-parameters w.r.t. the likelihood using
a quasi-Newton method (e.g., BFGS). Since the gradients of the marginal likelihood for the hyper-parameters can be determined with an additional computational complexity of O(n2 ) for each hyper-parameter, it is feasible to use
gradient-based methods. The drawback is that the likelihood is typically multimodal, and especially for covariances with many hyper-parameters (e.g., ARD)
the optimizer can converge to a local optimum. Thus, it is typically suggested
to execute several random restarts. A better solution would be to include priors
on the hyper-parameters and optimizing w.r.t. posterior distribution (MAP).
However, this can only be accomplished using a MCMC approach which is computationally expensive.
Frequently used covariance functions for Gaussian processes include the linear, polynomial, squared exponential (SE), rational quadratic (RQ) and the
Matérn function. Covariance functions can be combined to more complex covariance functions, for instance as products or sums of different covariance functions [10].
3
Genetic Programming
Genetic programming generally refers to the automatic creation of computer
programs using genetic algorithms [8]. The basic principle is to evolve variablelength structures, frequently symbolic expression trees, which represent potential
solutions to the problem. One of the most prominent applications of genetic programming is symbolic regression, the synthesis of regression models without a
predetermined structure. Genetic programming makes it possible to optimize the
structure of solutions in combination with their parameters. Thus, it should also
be possible to synthesize composite covariance functions with genetic programming. In the following, we use a grammar-guided genetic programming system
to make sure that only valid covariance functions are produced. A good survey
of grammar-guided genetic programming is given in [9].
4
Grammar for Covariance Functions
The grammar for covariance functions has been derived from the rules for the
composition of kernels as e.g., discussed in [10]. It should be noted that the grammar shown below is not complete, meaning that several constructions that would
4
Evolution of Covariance Functions for Gaussian Process Regression
lead to a valid covariance function are not possible1 . The following represents
the grammar G(Cov) for covariance functions in EBNF notation2 :
Cov
-> "Prod" "(" Cov { Cov } ")" | "Sum" "(" Cov { Cov } ")" |
"Scale" Cov | "Mask" BitVector Cov | TerminalCov .
TerminalCov -> "SE" | "RQ" | "Matern1" | "Matern3" | "Matern5" |
"Periodic" | "Linear" | "Constant" | "Noise" .
BitVector
-> "[" {"0" | "1" } "]" .
The functions Prod and Sum produce the product and sum of multiple covariance functions, which can again be composite covariance functions. The scale
operator can be used to add a scaling factor to any covariance function. The Mask
operator selects a potentially empty subset of input variables from all possible
input variables. The non-terminal symbol BitVector can be derived to a list
of zeros and ones. The bit vector is used to mask selected dimensions in the
data set, effectively reducing the dimensionality. The length of the bit mask has
to match the total number of dimensions; this is checked when the resulting
covariance function is evaluated.
Finally, the non-terminal symbol TerminalCov can be derived to a range of
default covariance functions. Currently, we only included isometric covariance
functions, but other covariance functions can be added to the grammar easily.
The grammar does not include the hyper-parameters, because they are not optimized by genetic programming. Instead, hyper-parameters are optimized for
each potential solution, using a gradient-descent technique.
5
Experiments
For the experiments we implemented Gaussian processes, a set of commonly
used covariance functions, and the grammar for covariance functions in HeuristicLab3 [11] which already provides an implementation of grammar-guided treebased genetic programming.
The aim of the experiments presented in this contribution is mainly to test
the feasibility of the idea. Two different types of data sets are used for the experiments, and the forecasts of the synthesized covariance functions are compared
to a set of default covariance functions and also to hand-tuned covariance functions. The first data set is the univariate Mauna Loa atmospheric CO2 time
series. This data set has been chosen, because a hand-tuned covariance function
for this data set is presented in [10]. For the second experiment we created several
synthetic data sets sampled randomly from two-dimensional Gaussian process
priors shown in Equation 2. The data generated from these functions are difficult to model with a single isometric covariance function. Multiple covariance
functions have to be combined and the correct dimension masking vectors have
1
2
3
One example is vertical scaling of covariance functions: K ′ (x, x′ ) = a(x)K(x, x′ )a(x′ )
The grammar is largely based on the capabilities of the GPML package by Rasmussen
and Nickisch, http://gaussianprocess.org/gpml/code.
HeuristicLab version 3.3.8 is available from http://dev.heuristiclab.com/
Evolution of Covariance Functions for Gaussian Process Regression
5
to be identified. Each data set contains 882 samples of the function on a regular
two-dimensional grid.
SE+RQ(x, x′ ) = SE(x0 , x′0 ) + RQ(x1 , x′1 )
SE+Matérn(x, x′ ) = SE(x0 , x′0 ) + Matérn1(x1 , x′1 )
SE+Periodic(x, x′ ) = SE(x0 , x′0 ) + RQ(x1 , x′1 )
5.1
(2)
Genetic Programming Parameter Settings
Training of Gaussian processes is computationally expensive, and because it is
necessary to optimize the hyper-parameters for each evaluated covariance function the run time of the genetic programming algorithm grows quickly. Therefore,
we used very restrictive parameter settings, in particular a small population size
of only 50 individuals. All other parameter settings are shown in Table 1.
Table 1. Genetic programming parameter settings for all experiments.
Parameter
Population size
Max. length / height
Initialization
Parent selection
Mutation rate
ML-II iterations
Offspring selection [1]
Max. selection pressure
Max. generations
5.2
Value
50
25 / 7
PTC2
gender-specific (proportional + random )
15%
50
strict (success ratio = 1, comparison factor = 1)
100
20
Results on Mauna Loa CO2 Data Set
The results for the CO2 time series are positive. The algorithm was able to
consistently find covariance functions that fit well in the training period (1958 –
2004), accurate forecasts over the testing period (2004 – 2012). The structures
of two exemplary solutions are shown in Equation 3. The first solution (K1)
is actually very similar to the hand-tuned covariance solution proposed in [10].
The second covariance function is more complex and has only a slightly better
likelihood. Unfortunately, genetic programming often leads to overly complex
solutions which is a critical drawback of our approach. Both solutions have been
found after only 800 evaluated solution candidates and achieve a negative loglikelihood of 129.8 and 116, respectively. The correlation coefficients for the
forecasts in the test partition are above 0.99. Figure 1 shows the output of the
first model.
6
Evolution of Covariance Functions for Gaussian Process Regression
K1(x, x′ ) = SE(x, x′ ) + Periodic(x, x′ ) + Matérn1(x, x′ )+
SE(x, x′ ) + Matérn5(x, x′ ) + Const
K2(x, x′ ) = Matérn3(x, x′ ) ∗ Perioric(x, x′ ) ∗ RQ(x, x′ ) ∗
(Matérn1(x, x′ ) + Matérn3(x, x′ ) + Matérn5(x, x′ ) +
(3)
Perioric(x, x′ ) + Linear(x, x′ )) ∗
(Matérn1(x, x′ ) + Matérn3(x, x′ ) + RQ(x, x′ ))
Estimated Values (training)
Estimated Values (test)
80
60
40
20
0
-20
-40
0
149
298
447
596
745
Fig. 1. The output and forecast for the Mauna Loa CO2 time series of a Gaussian
process using the first evolved covariance function (K1) shown in Equation 3.
5.3
Results on Synthetic Data Sets
The results for the synthetic two-dimensional data set are shown in Table 2.
In this experiment we trained multiple Gaussian process models using several
frequently used covariance functions. We trained many models using random
restarts for each data set and covariance function, and report the best negative log-likelihood for each pair. As expected, the models with the isometric
covariance functions do not fit well. In contrast, the composite covariance functions produced by genetic programming fit much better. For comparison, we also
report the negative log-likelihood, that can be achieved with the optimal covariance function for each data set. In these experiments, the exact structure of the
covariance could not be rediscovered, thus, the evolved functions are worse than
the optimal solution.
6
Summary and Discussion
In this contribution we described an approach for the synthesis of composite covariance function for Gaussian processes using grammar-guided genetic programming. In the proposed approach a set of commonly used covariance functions is
Evolution of Covariance Functions for Gaussian Process Regression
7
Covariance
Table 2. Best negative log-likelihood achieved for the three synthetic two-dimensional
test functions, with default covariance functions and with evolved composite covariance
functions.
SE
RQ
Periodic
Matérn
Evolved
Optimal
Problem instance
SE+RQ SE+Matérn SE+Periodic
-204
-492
440
-272
-492
103
-221
-492
479
-27
31
304
-803
-760
-640
-2180
-2187
-2131
used to compose more complex covariance functions, using sums or products of
several covariance functions. The set of valid covariance functions is defined via a
grammar and genetic programming is used to search the space of possible derivations from this grammar. The hyper-parameters of covariance functions are not
subject to the evolutionary search, but are optimized w.r.t. the likelihood using
a standard gradient-descent optimizer (i.e., LBFGS).
The proposed approach was tested on two types of low-dimensional problems
as a proof of concept. We found, that for the univariate Mauna Loa CO2 time
series it is possible to consistently find good covariance functions with genetic
programming. The identified solutions perform as well as a hand-tuned covariance function for this problem. The results for our two-dimensional synthetic
functions show that it is possible to find composite covariance functions, which
perform much better than default covariance functions on these data sets.
In contrast to previous work by the genetic programming community [7],
which focused mainly on kernel synthesis for SVMs, this contribution discusses
kernel synthesis for Gaussian processes, which are non-parametric fully Bayesian
models. For Gaussian process models the hyper-parameters can be optimized
with a standard gradient-descent approach, and it is not strictly necessary to
execute cross-validation [10]. Previous work either used grid-search and crossvalidation to tune hyper-parameters, which is very computationally expensive, or
did not consider hyper-parameter optimization at all. Additionally, we are using
a grammar to compose covariance functions from simple covariance functions
instead of evolving the full function.
In the statistics community, a very recent contribution has also discussed
the usage of grammars for the composition of covariance functions [2]. The main
difference to this work is that here genetic programming is used to search over the
derivations of the grammar. Another relevant difference is that the grammar in
this contribution also supports simple embeddings through the masking function.
It should be noted, that we have not yet analyzed if genetic programming is well
suited for this task, and in particular we did not compare the approach to simple
enumeration or random search.
One question that remains for future work is whether composed covariance
functions also work well for data sets with more variables. We have observed that
8
Evolution of Covariance Functions for Gaussian Process Regression
simple covariance functions often work very well, and tuned covariance functions
do not have a strong beneficial effect for these data sets.
Another interesting topic for future research is to look at alternative ways for
searching over the space of covariance functions defined by a grammar. Recently,
an interesting approach has been described that uses variational methods for
Bayesian learning of probabilistic context free grammars for this task [5]. This
idea could be especially useful for Bayesian models such as Gaussian processes.
Acknowledgments The authors would like to thank Jeffrey Emanuel for the
initial idea leading to this contribution. This work has been supported by the
Austrian Research Promotion Agency (FFG), on behalf of the Austrian Federal
Ministry of Economy, Family and Youth (BMWFJ), within the program “Josef
Ressel-Centers”.
References
1. Affenzeller, M., Winkler, S., Wagner, S., Beham, A.: Genetic Algorithms and Genetic Programming: Modern Concepts and Practical Applications. Numerical Insights, CRC Press, Singapore (2009)
2. Duvenaud, D., Lloyd, J.R., Grosse, R., Tenenbaum, J.B., Ghahramani, Z.: Structure Discovery in Nonparametric Regression through Compositional Kernel Search.
ArXiv e-prints (Feb 2013)
3. Duvenaud, D., Nickisch, H., Rasmussen, C.E.: Additive Gaussian processes. arXiv
preprint arXiv:1112.4394 (2011)
4. Gagne, C., Schoenauer, M., Sebag, M., Tomassini, M.: Genetic programming for
kernel-based learning with co-evolving subsets selection. In: Proc. of PPSN IX.
LNCS, vol. 4193, pp. 1008–1017. Springer-Verlag (2006)
5. Hasegawa, Y., Iba, H.: Latent variable model for estimation of distribution algorithm based on a probabilistic context-free grammar. IEEE Transactions on
Evolutionary Computation 13(4), 858–878 (Aug 2009)
6. Howley, T., Madden, M.G.: An evolutionary approach to automatic kernel construction. In: Proc. of ICANN 2006. LNCS, vol. 4132, pp. 417–426. Springer-Verlag
(2006)
7. Koch, P., Bischl, B., Flasch, O., Beielstein, T., Weihs, C., Konen, W.: Tuning and
evolution of support vector kernels. Evolutionary Intelligence 5, 153–170 (2012)
8. Koza, J.R.: Genetic programming: on the programming of computers by means of
natural selection. MIT Press, Cambridge, MA, USA (1992)
9. McKay, R.I., Hoai, N.X., Whigham, P.A., Shan, Y., O’Neill, M.: Grammar-based
genetic programming: a survey. Genetic Programming and Evolvable Machines
11(3/4), 365–396 (Sep 2010)
10. Rasmussen, C.E., Williams, C.K.: Gaussian Processes for Machine Learning. MIT
Press (2006)
11. Wagner, S.: Heuristic optimization software systems – Modeling of heuristic optimization algorithms in the HeuristicLab software environment. Ph.D. thesis, Institute for Formal Models and Verification, Johannes Kepler University, Linz (2009)
12. Wilson, A.G., Prescott Adams, R.: Gaussian Process Covariance Kernels for Pattern Discovery and Extrapolation. ArXiv e-prints (Feb 2013)
| 9cs.NE
|
DETECTING THE INTEGER DECOMPOSITION PROPERTY AND EHRHART
UNIMODALITY IN REFLEXIVE SIMPLICES
arXiv:1608.01614v2 [math.CO] 8 Dec 2017
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
Abstract. A long-standing open conjecture in combinatorics asserts that a Gorenstein lattice polytope
with the integer decomposition property (IDP) has a unimodal (Ehrhart) h∗ -polynomial. This conjecture
can be viewed as a strengthening of a previously disproved conjecture which stated that any Gorenstein
lattice polytope has a unimodal h∗ -polynomial. The first counterexamples to unimodality for Gorenstein
lattice polytopes were given in even dimensions greater than five by Mustaţǎ and Payne, and this was
extended to all dimensions greater than five by Payne. While there exist numerous examples in support of
the conjecture that IDP reflexives are h∗ -unimodal, its validity has not yet been considered for families of
reflexive lattice simplices that closely generalize Payne’s counterexamples. The main purpose of this work is
to prove that the former conjecture does indeed hold for a natural generalization of Payne’s examples. The
second purpose of this work is to extend this investigation to a broader class of lattice simplices, for which
we present new results, data from computational experiments, and open problems.
1. Introduction
Two well-studied properties of the coefficients of polynomials with non-negative integer coefficients are
symmetry and unimodality. A polynomial a0 + a1 z + · · · + ad z d with ad 6= 0 is called symmetric if ai = ad−i
for all i ∈ [d]. A polynomial a0 + a1 z + · · · + ad z d with ad 6= 0 is called unimodal if there exists an index j
such that ai ≤ ai+1 for all i < j and ai ≥ ai+1 for all i ≥ j.
Given a finitely generated C-algebra A = ⊕∞
i=0 Ai , we say A is standard if A is generated by A1 and
semistandard if A is integral over the subalgebra generated by A1 . The Hilbert series of a graded algebra A
is the generating function
P
∞
j
X
j hj z
i
.
dimC (Ai )z =
H(A; z) :=
(1 − z)dim(A)
i=0
P
j
The polynomial h(A; z) :=
j hj z is called the h-polynomial of A. When A is Cohen-Macaulay, each
hj ∈ Z≥0 . An active topic of research is developing combinatorial interpretations of the h-polynomial
coefficients and their distribution. It is known that the h-polynomial of A is symmetric when A is Gorenstein,
but the unimodality property is more subtle. A long-standing open problem is the following conjecture posed
by Brenti [5, Conjecture 5.1], inspired by a conjecture of Stanley [18]. It also appears in [10, Conjecture 1.5].
Conjecture 1.1 (Brenti, [5]). For a standard graded Gorenstein integral domain A, h(A; z) is unimodal.
A subset P ⊂ Rn is a d-dimensional convex lattice polytope if P arises as the convex hull of finitely
many points in Zn that together span an affine d-flat in Rn . The Ehrhart function of P is the lattice point
enumerator i(P ; t) := |tP ∩ Zn |, where tP := {tp : p ∈ P } denotes the tth dilate of the polytope P . It is
well-known [8] that i(P ; t) is a polynomial in t of degree d, and the corresponding Ehrhart series of P is the
rational function
X
h∗ + h∗1 z + · · · + h∗d z d
EhrP (z) :=
i(P ; t)z t = 0
,
(1 − z)d+1
t≥0
where the coefficients h∗0 , h∗1 , . . . , h∗d are all nonnegative integers [17]. The polynomial h∗ (P ; z) := h∗0 +
h∗1 z + · · · + h∗d z d is called the (Ehrhart) h∗ -polynomial of P . Analogously, the coefficient vector h∗ (P ) :=
(h∗0 , h∗1 , . . . , h∗d ) is called the (Ehrhart) h∗ -vector of P . We will often say P is h∗ -unimodal whenever h∗ (P ; z)
is unimodal. Since h∗ (P ; z) arises via the enumeration of combinatorial data and has only nonnegative
Date: 8 December 2017.
2010 Mathematics Subject Classification. Primary: 52B20, 05E40, 05A20, 05A15.
Benjamin Braun was partially supported by grant H98230-16-1-0045 from the U.S. National Security Agency. Liam Solus
was partially supported by an NSF Division of Mathematical Sciences Postdoctoral Fellowship (DMS - 1606407).
1
2
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
integer coefficients, researchers have studied combinatorial interpretations of the h∗ -coefficients and their
distribution. A current challenge in Ehrhart theory is to understand the geometric properties of a polytope
that are necessary and/or sufficient for h∗ (P ; z) to be simultaneously symmetric and unimodal [3].
While Ehrhart series arise from a combinatorial context in polyhedral geometry, there is a well-known
connection to commutative algebra. The cone over P is
cone (P ) := spanR≥0 {(1, p) : p ∈ P } ⊂ R × Rn
where we consider the new variable to be indexed at 0, i.e. x ∈ R×Rn = R1+n is written x = (x0 , x1 , . . . , xn ).
Given a lattice polytope P in Rn , the semigroup algebra associated to P is C[P ] := C[xv : v ∈ cone (P )∩Z1+n ].
mn
0
We grade C[P ] by deg(xm
0 · · · xn ) = m0 . With this grading, C[P ] is a semistandard semigroup algebra,
where the algebra generated by C[P ]1 is C[xv : v ∈ (1, P ) ∩ Z1+n ], i.e. the semigroup algebra generated
by integer points in (1, P ). Given this, Conjecture 1.1 manifests itself in the setting of polytopes that have
symmetric h∗ -polynomials and the integer decomposition property, which is defined as follows.
Definition 1.2. A polytope P has the integer decomposition property, or is IDP, if for
P every positive integer
m and each x ∈ mP ∩ Zn , there exist m points x1 , . . . , xm ∈ P ∩ Zn for which x = xi .
It is straightforward to verify that a lattice polytope P is IDP if and only if C[P ] is standard. Regarding
symmetry, a lattice polytope P ⊆ Rn containing 0 in its interior is called reflexive if its polar P ∗ := {y ∈
Rn : xT y ≤ 1 for all x ∈ P } is also a lattice polytope. In [12], it is shown that a lattice polytope P ⊂ Rn
is reflexive if and only if P is full-dimensional (i.e. d = n), the origin is in its interior, and h∗ (P ; z) is
symmetric. Reflexive polytopes are a special case of the full-dimensional polytopes P ⊂ Rn for which
h∗ (P ; z) is symmetric, known as Gorenstein polytopes. In this setting, Conjecture 1.1 translates to the
following statement, which is often attributed to Hibi and Ohsugi [15].
Conjecture 1.3. If P is Gorenstein and IDP, then h∗ (P ; z) is unimodal.
As in the case of graded Cohen-Macaulay algebras, unimodality of h∗ (P ; z) has proven to be a more elusive
property to characterize than symmetry when using only the geometry of P . Since the symmetry property
of h∗ (P ; z) reduces the number of inequalities to be verified by one-half, there has been much research into
when h∗ (P ; z) is both symmetric and unimodal [3]. It was shown by Mustaţǎ and Payne [13] that there exist
reflexive polytopes whose h∗ -polynomials are not unimodal. These results were then extended to reflexive
simplices in every dimension greater than five by Payne [16]. This disproved the following (earlier) conjecture
of Hibi [11].
(Disproved) Conjecture 1.4 (Hibi, [11]). If P is Gorenstein then h∗ (P ; z) is unimodal.
Thus, Conjecture 1.3 is a reasonable strengthening of Conjecture 1.4 to consider in light of the counterexamples presented by Payne [16] and its previous proposal in the algebraic context by Brenti (Conjecture 1.1).
Indeed, one may show that none of the counterexamples provided by Mustaţǎ and Payne are IDP. While the
literature is ripe with examples of lattice polytopes supporting Conjecture 1.3, surprisingly, there has been
little investigation as to whether or not the conjecture holds for reflexive lattice simplices that closely generalize the counterexamples constructed by Payne. The purpose of the present paper is to carefully identify a
natural generalization of Payne’s examples, and prove that Conjecture 1.3 does indeed hold for this family
of reflexive lattice simplices.
The generalization of Payne’s examples that we will consider here is a subcollection Q of the reflexive
lattice simplices whose associated toric varieties are weighted projective spaces. Consequently, each simplex
∆ ∈ Q can be associated to an integer partition q(∆) by using a classification system for reflexive simplices
developed by Conrads [7]. The collection Q can be stratified by the number of parts used in the integer
partitions q(∆). We will see that Payne’s examples live within the subcollection of Q for which q(∆) is an
integer partition with two parts, making this subcollection a close generalization of Payne’s counterexamples.
Our first main result is to show that Conjecture 1.3 holds for this subcollection. Our second contribution is
to show that Conjecture 1.3 holds for many simplices in Q for which q(∆) is an integer partition with three
parts, and to provide both computational and theoretical evidence of the challenges that exist for proving
Conjecture 1.3 completely in this setting.
The remainder of this paper is outlined as follows: In Subsection 2.1, we recall the counterexamples to
Conjecture 1.4 presented by Payne in [16], and we present the generalizing family Q. In Subsections 2.2
DETECTING THE INTEGER DECOMPOSITION PROPERTY
3
and 2.3, we present a formula for the h∗ -polynomial and a characterization of IDP for all simplices in Q,
respectively. In Section 3, we will prove some first results on IDP and h∗ -unimodality for simplices in Q
whose associated integer partitions q(∆) have a fixed set of parts. In Section 4, we prove Conjecture 1.3 for
our closest generalization of Payne’s examples; i.e., for all simplices ∆ ∈ Q whose associated partitions q(∆)
have two parts. In Section 5, we extend the results of Section 4 by proving Conjecture 1.3 holds for simplices
in Q whose integer partitions q(∆) contain three parts in a number of fundamental cases. We then end with
a brief discussion of future directions in Section 6.
2. IDP and Ehrhart Theory for the Reflexive Simplices ∆(1,q)
2.1. The reflexive simplices ∆(1,q) . Given a polytope P ⊆ Rn with vertices v0 , . . . , vk , the height of
a point x ∈ cone (P ) is its first coordinate x0 . If P is a lattice simplex with vertices v0 , v1 , . . . , vn , the
fundamental parallelepiped of cone (P ) is
)
( n
X
λi (1, vi ) : 0 ≤ λi < 1 .
ΠP :=
i=0
The fundamental parallelepiped tiles cone (P ) through nonnegative integer combinations of {(1, vi )}ni=0 .
Consequently, if P is a lattice simplex then
X
(1)
h∗ (P ; z) =
z m0 .
m∈ΠP ∩Zn
In this paper, we will focus on a family of reflexive simplices Q that can be defined as follows. Let
q = (q1 , q2 , . . . , qn ) be a weakly increasing sequence of positive integers satisfying the condition
X
qj | (1 +
qi )
i6=j
for all j = 1, . . . , n. For such a vector, the simplex
(
∆(1,q) := conv e1 , e2 , . . . , en , −
n
X
i=1
qi ei
)
,
where ei ∈ Rn is the i-th standard basis vector, is reflexive.
When the q-vector is understood, we will often
P
label the vertices of ∆(1,q) as vi := ei and v0 := − ni=1 qi ei . The collection of simplices Q is important
in algebra and geometry since it is contained in the family of simplices whose associated toric varieties are
weighted projective spaces [7]. Combinatorially, they are significant since they contain the counterexamples
to Conjecture 1.4 developed by Payne [16]. In particular, Payne showed that for integers r ≥ 0, s ≥ 3, and
k ≥ r + 2 the reflexive simplex ∆(1,q) for
(2)
q = (1, 1, . . . , 1, s, s, . . . , s) .
| {z } | {z }
sk−1 times
r+1 times
is not h∗ -unimodal.
It follows from (1) that the normalized volume of ∆(1,q) (i.e. the value h∗ (∆(1,q) ; 1) = n! Vol(∆(1,q) )) is
equal to 1 + q1 + · · · + qn [14, Proposition 4.4]. Consequently, the simplices ∆(1,q) are naturally stratified
via their normalized volume by way of integer partitions; i.e., for every ∆(1,q) there exists a partition of the
integer n! Vol(∆(1,q) ) − 1 with parts r1 < r2 < · · · < rk such that
q = (r1x1 , r2x2 , . . . , rkxk ) := (r1 , r1 , . . . , r1 , r2 , r2 , . . . , r2 , . . . , rk , rk , . . . , rk ).
|
|
{z
} |
{z
}
{z
}
x1 times
x2 times
xk times
So as to speak formally from this perspective, we make the following definition.
Definition 2.1. We say that both q and ∆(1,q) are supported by the vector r = (r1 , . . . , rk ) (or the integers
therein) if there exist positive integers r1 < r2 < · · · < rk and x1 , . . . , xk such that
q = (q1 , . . . , qn ) = (r1x1 , r2x2 , . . . , rkxk ).
An r-vector is any vector of positive integers r = (r1 , . . . , rk ) in which r1 < r2 < · · · < rk .
4
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
It follows that the natural generalization of Payne’s examples are those ∆(1,q) supported by two integers.
In Section 4, we will prove Conjecture 1.3 for this generalization of Payne’s examples. In Section 3, we will
prove some results about q-vectors with a fixed support r, and in Section 5, we will extend many of the
results in Section 4 to those simplices supported on three integers.
2.2. The h∗ -polynomials for ∆(1,q) . In this subsection, we establish basic properties of ∆(1,q) with respect
to h∗ -polynomials. We begin with a formula for h∗ (∆(1,q) ; z) in terms of the entries of the vector q.
Theorem 2.2. The h∗ -polynomial of ∆(1,q) is
h∗ (∆(1,q) ; z) =
q1 +···+q
X n
z w(b)
b=0
where
w(b) := b −
n
X
i=1
Proof. Let v1 , v2 , . . . , vn , v0 denote the columns
1 1
1 0
0 1
0 0
.. ..
. .
0
qi b
1 + q1 + · · · + qn
.
of
1
0
0
1
..
.
0 0
···
···
···
···
..
.
1
0
0
0
..
.
1
−q1
−q2
−q2
..
.
· · · 1 −qn
.
By [14, Proposition 4.4] and Cramer’s rule, every point in Π∆(1,q) is of the form
p :=
n
X
λi (1, vi )
i=0
where 0 ≤ λi < 1 for all i and λi =
follow that for i ≥ 1
bi
1+q1 +···+qn
for some bi = 0, 1, . . . , q1 + · · · + qn . If p ∈ Z1+n , then it must
λi = qi λ0 − ⌊qi λ0 ⌋ .
Hence, the choice of λ0 determines the point p, and we write
b
λ0 :=
.
1 + q1 + · · · + qn
The height of the point corresponding to a given value of b is the first coordinate, which is easily computed
to be
n
X
qi b
.
b−
1 + q1 + · · · + qn
i=1
Recalling equation (1) completes the proof.
2.3. The Integer Decomposition Property and ∆(1,q) . The following theorem (Theorem 2.3) provides
a characterization of IDP reflexive ∆(1,q) in terms of the vector q. Our main tool for investigating ∆(1,q) is
given by Corollary 2.4 below, a necessary but not sufficient relaxation of Theorem 2.3.
Theorem 2.3. The reflexive simplex ∆(1,q) is IDP if and only if for every j = 1, . . . , n, for all b =
0, 1, . . . , qj − 1 satisfying
P
X
1 + i6=j qi
bqi
−
≥2
(3)
b
qj
qj
i6=j
there exists a positive integer c < b satisfying the following equations, where the first is considered for all
1 ≤ i ≤ n with i 6= j:
bqi
cqi
(b − c)qi
(4)
−
=
, and
qj
qj
qj
DETECTING THE INTEGER DECOMPOSITION PROPERTY
(5)
c
1+
P
i6=j
qi
qj
−
X cqi
i6=j
qj
5
= 1.
Proof. Recall that IDP for a lattice simplex P is equivalent to the property that every lattice point in
ΠP arises as a sum of lattice points in (1, P ). Let g ∈ Π∆(1,q) . Since ∆(1,q) is reflexive, we may subtract
(1, 0, 0, . . . , 0) from g until we reach a lattice point p on the boundary of cone ∆(1,q) . This point p must lie
in the fundamental parallelepiped for a face of ∆(1,q) , hence ∆(1,q) is IDP if and only if every facet of ∆(1,q)
is IDP.
Observe that the facet with vertices {e1 , . . . , en } is unimodular, hence it is IDP. The remaining facets are
of the form
)
(
n
X
qi ei
Fj := conv e1 , . . . , ej−1 , ej+1 , . . . , en , −
i=1
for j = 1, . . . , n. Thus we areP
looking for necessary and sufficient conditions for Fj to be IDP. For i ∈ [n]\{j},
n
set vi := ei , and set v0 := − i=1 qi ei . Every lattice point in ΠFj is of the form
X
r=
λi vi .
0≤i≤n
i6=j
Since the vector (1, ej ) is not a summand for r, and since r is an integer point, λ0 · (−qj ) must be an integer.
Hence, λ0 = b/qj for some b in {0, 1, 2, . . . , qj − 1}. Note that if b = 0, r is in the fundamental parallelepiped
for the facet with vertices {e1 , . . . , en }, and hence equal to the zero vector.
We next show that for every choice of b between 1 and qj − 1, setting λ0 = b/qj yields a unique lattice
point of ΠFj . Since every entry of r is integral and 0 ≤ λi < 1, it follows that
bqi
bqi
λi =
.
−
qj
qj
Thus, as in the proof of Theorem 2.2, the value of λ0 determines the remaining λi ’s. When λ0 = b/qj , the
height of the resulting point is
X bqi bqi
b
,
+
−
qj
qj
qj
1≤i≤n
i6=j
which is an integer if and only if
P
1 + 1≤i≤n qi
X
b
bqi
i6=j
+
= b
qj
qj
qj
1≤i≤n
i6=j
is an integer. Since ∆(1,q) is reflexive, we know that qj divides 1 +
X
qi , and thus this height is an integer.
0≤i≤n
i6=j
Hence, for every choice of b above, r is a lattice point given by
1+P q P j k
bqi
i6=j i
− i6=j
b
qj
qj
k
j
bq
1
− qj
..
. k
j
bqj−1
− qj
r = rb :=
−b
k
j
bq
− qj+1
j
..
j. k
− bqqjn
.
6
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
The simplex Fj is IDP if and only if for every rb at height greater than or equal to two, there exists an
rc ∈ ΠFj at height one and an rd ∈ ΠFj such that rb − rc = rd . Given b and considering this vector equation
entry-by-entry, this is equivalent to solving the following system with integers c and d between 1 and qj − 1:
P
P
X
X
1 + i6=j qi
1 + i6=j qi
bqi
dqi
(6)
−
−
=d
−1 + b
qj
qj
qj
qj
i6=j
(7)
(8)
c
1+
P
i6=j
qi
qj
i6=j
bqi
cqi
dqi
−
=
, i 6= j
qj
qj
qj
−
X cqi
qj
i6=j
=1
Substituting (8) for the “1” on the left-hand side of (6), and substituting (7) for each of the “
j
dqi
qj
k
” on
the right-hand side of (6), yields b − c = d. Thus, we can reduce this system of equations to an equivalent
system of equations:
bqi
cqi
(b − c)qi
(9)
−
=
, i 6= j
qj
qj
qj
(10)
c
1+
P
i6=j
qj
qi
−
X cqi
qj
i6=j
=1
Hence, ∆(1,q) is IDP if and only if each of its facets is IDP, which occurs if and only if for every j = 1, . . . , n,
for all b = 1, . . . , qj − 1 corresponding to a lattice point at height at least two there exists a positive integer
c solving (9) and (10).
At this point, we will frequently write
a
b
to denote the fractional part of a/b.
Corollary 2.4. Let ∆(1,q) be reflexive. If ∆(1,q) is IDP then for all j = 1, 2, . . . , n
X qi
1
= 1.
+
qj
qj
i6=j
For any vector q of increasing positive integers that satisfies these equations for all j = 1, 2, . . . , n, the simplex
∆(1,q) is reflexive. However, this condition is necessary but not sufficient for ∆(1,q) to be IDP.
Proof. By Theorem 2.3, ∆(1,q) is IDP if for all j = 1, . . . , n we have that for all b = 0, 1, . . . , qj − 1 satisfying
equation (3) there exists 0 < c < b satisfying equations (4) and (5). Therefore, if b = 1 satisfies (3) then
trivially no such c exists, meaning ∆(1,q) cannot be IDP. Thus, whenever ∆(1,q) is IDP, b = 1 must not
satisfy (3). Moreover, since the left-hand side of (3) is equivalent to
X qi
1
+
qj
qj
i6=j
and q1 , q2 , . . . , qn > 0 then if (3) is not satisfied for b = 1 it must be that
X qi
1
= 1.
+
qj
qj
i6=j
To see that these equations
imply reflexivity of ∆(1,q) , note that the j-th equation verifies that the divisibility
P
condition qj | (1 + i6=j qi ) holds. As this holds for all j, we conclude that ∆(1,q) is reflexive.
DETECTING THE INTEGER DECOMPOSITION PROPERTY
7
Finally, to show that this condition is not sufficient to establish IDP, consider the vector q = (2, 2, 15, 20, 20).
It is straightforward to compute that the lattice points in ∆(1,q) are the columns of the following matrix.
1 0 0 0 0 −2 0 0
0
0
0
0
−1 −1 −1
0 1 0 0 0 −2 0 0
0
0
0
0
−1 −1 −1
0 0 1 0 0 −15 0 0 −1 −1 −2 −3 −7 −8 −9 .
0 0 0 1 0 −20 0 −1 −1 −2 −3 −4 −10 −11 −12
0 0 0 0 1 −20 0 −1 −1 −2 −3 −4 −10 −11 −12
Further, the point
1
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
1
−2
−2
−15
−20
−20
1/15
1/15
0
2/3
2/3
8/15
=
−1
−1
−8
−10
−10
∈ 2∆(1,2,2,15,20,20) .
It is straightforward to verify that this point is not the sum of exactly two lattice points in ∆(1,2,2,15,20,20) ,
and thus this simplex is not IDP. However, (2, 2, 15, 20, 20) satisfies our linear system.
Remark 2.5. An equivalent formulation of Corollary 2.4 is that if q corresponds to a reflexive IDP simplex,
then for each j = 1, . . . , n the sum
X
1+
(qi mod qj )
i6=j
must be equal to qj . In order for the reflexive condition to be satisfied, this sum must be equal to a
multiple of qj . Thus, this necessary condition for IDP reflexive is a strengthening of the divisibility condition
characterizing reflexivity.
Remark 2.6. Corollary 2.4 implies that for IDP ∆(1,q) and b = 2, 3, . . . , qj − 1 the choice of c = 1 is always
a potential solution to (4), as it satisfies equation (5).
Example 2.7 (Revisiting Payne’s simplices). Recall that Payne presented the simplices ∆(1,q) with q as
defined in equation (2) as counterexamples to Conjecture 1.4. Using Proposition 2.2, we see that
s(k+r+1)−1
∗
h (∆(1,q) ; z) =
X
z b−(r+1)⌊sb/s(k+r+1)⌋
b=0
from which it is straightforward to compute that
h∗ (∆(1,q) ; z) = (1 + z k + z 2k + · · · + z (s−1)k )(1 + z + z 2 + · · · + z k+r ) .
Non-unimodality for most of these simplices follows immediately from the conditions on r, b, and s. One can
verify that ∆(1,q) is not IDP using the property that h∗1 = 1. Since this implies that the only lattice points
in ∆(1,q) are the vertices and the unique interior point of ∆(1,q) . Hence the vector (1, 0, 0, . . . , 0) is the only
vector in Π∆(1,q) at height 1. This prevents the existence of the “c” value required in Theorem 2.3.
3. q-Vectors With Fixed Support
In Subsection 2.1, we established a stratification of the simplices ∆(1,q) in terms of their support vectors
r. In this section, we present some first results on the IDP and h∗ -unimodality conditions for ∆(1,q) from
this perspective. Our observations in this section center around the interplay between ∆(1,q) admitting an
affine free sum decomposition into lower-dimensional ∆(1,q) and exhibiting IDP and/or h∗ -unimodality. As
described below, admitting the former property can allow one to recursively detect the latter properties. In
this section, we will show that only finitely many reflexive IDP ∆(1,q) with support vector r fail to admit
such a free sum decomposition. This suggests that the stratification of ∆(1,q) by their support vectors is a
desirable perspective from which to analyze Conjecture 1.3 for reflexive ∆(1,q) . In particular, we will use
these results to prove Conjecture 1.3 for ∆(1,q) supported on two integers in Section 4.
Our first two results in this section establish that there are infinitely many reflexive simplices supported
by each r-vector, and that the r-vector and multiplicity vector (x1 , . . . , xk ) can be used to test our necessity
condition for IDP.
8
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
Proposition 3.1. Fix an r-vector r = (r1 , . . . , rk ) with gcd(r1 , . . . , rk ) = 1. There are infinitely many
reflexive ∆(1,q) supported by r.
Proof. By the positive solution to the Frobenius coin exchange problem [2, Chapter 1], there exists a positive
Pk
integer M such that for all m ≥ M , there exist positive integers x1 , . . . , xk such that m = 1 + i=1 xi ri .
Thus, there exists a positive integer L such that for all ℓ ≥ L, there exist positive integers x1 , . . . , xk such
Pk
that ℓ lcm(r1 , . . . , rk ) = 1 + i=1 xi ri . For any such ℓ, for all i = 1, . . . , k we have that
ri | ℓ lcm(r1 , . . . , rk ) = 1 +
k
X
xj rj .
j=1
Hence, there are infinitely many q = (r1x1 , r2x2 , . . . , rkxk ) such that the divisibility condition for reflexivity of
∆(1,q) is satisfied.
The following lemma is equivalent to Corollary 2.4.
Lemma 3.2. If the r-vector r = (r1 , . . . , rk ) supports a reflexive IDP simplex ∆(1,q) then there exists a
vector of positive integers x = (x1 , . . . , xk ) satisfying the k × k system of linear equations Rx = b where
bi := ri − 1
and
Rj,i
0
ri
:=
ri mod rj
if i = j
if i < j
if i > j
.
If a solution to this system of equations consisting of positive integers exists, then it corresponds to a reflexive
∆(1,q) . However, this condition is necessary but not sufficient to establish IDP.
Proof. This lemma is a restatement of Corollary 2.4 using the notation (r1x1 , r2x2 , . . . , rkxk ).
It is important to observe that some reflexive IDP ∆(1,q) ’s admit decompositions into reflexive IDP
∆(1,q) ’s of smaller dimension, in the following sense. Let P, Q ⊂ Rn be two lattice polytopes. We say that
P ⊕ Q := conv {P ∪ Q} is an affine free sum if, up to unimodular equivalence, P ∩ Q = {0} and the affine
span of P and Q are orthogonal coordinate subspaces of Rn . Suppose further that P ⊂ Rn and Q ⊂ Rm are
reflexive polytopes with 0 ∈ P and the vertices of Q labeled as v0 , v1 , . . . , vm . For every i = 0, 1, . . . , m, we
define the polytope
P ∗i Q := conv {(P × 0m ) ∪ (0n × Q − vi )} ⊂ Rn+m .
The following theorem indicates that affine free sum decompositions can be detected from the q-vector
defining ∆(1,q) .
Theorem 3.3 (Braun, Davis [4]). If ∆(1,p) and ∆(1,q) are full-dimensional reflexive simplices with p =
(p1 , . . . , pn ) and q = (q1 , . . . , qm ), respectively, then ∆(1,p) ∗0 ∆(1,q) is a reflexive simplex ∆(1,y) with y =
Pn
(p1 , . . . , pn , sq1 , . . . , sqm ) where s = 1 + j=1 pj . Moreover, if ∆(1,y) arises in this form, then it decomposes
as a free sum. Further, if ∆(1,p) and ∆(1,q) are reflexive, IDP and h∗ -unimodal, then so is ∆(1,p) ∗0 ∆(1,q) .
Thus, many reflexive, IDP, h∗ -unimodal ∆(1,q) ’s have these properties because they arise as affine free
sums. If a reflexive IDP ∆(1,q) is an affine free sum of two reflexive IDP ∆(1,q) ’s of smaller dimension, then
in order to infer h∗ -unimodality of the sum, this property of the summands must be separately verified.
Nonetheless, it is reasonable to focus attention on those reflexive IDP ∆(1,q) ’s that do not arise as affine free
sums, as these are fundamental examples that must be dealt with in any proof of Conjecture 1.3. Fortunately,
as the following two results indicate, for each r-vector there are at most finitely many such reflexive IDP
simplices to consider.
Proposition 3.4. Fix an r-vector r = (r1 , . . . , rk ) for which ri | rk for all i ∈ {1, . . . , k − 1}. If q =
(r1x1 , . . . , rkxk ) corresponds to a reflexive IDP simplex, then ∆(1,q) is an affine free sum of the simplices defined
xk−1
xk−1
)
) and (1xk ). Further, the simplices defined by the q-vectors (r1x1 , . . . , rk−1
by the q-vectors (r1x1 , . . . , rk−1
and (1xk ) are both IDP reflexive simplices.
DETECTING THE INTEGER DECOMPOSITION PROPERTY
9
Proof. Using the notation of Lemma 3.2, observe that after canceling denominators in Rx = b our matrix
equation has the form
0 r2 mod r1 r3 mod r1 · · ·
rk−1 mod r1
0
..
r1
.
0
r3 mod r2 · · ·
rk−1 mod r2
r1 − 1
x1
..
.. x r − 1
..
r1
2
.
r2
0
.
.
2
r3 − 1
x
3
.
.
.
.
=
.
.
.
.
.
r1
.
.
r2
.
.
..
..
.
.
.
.
.
.
.
..
.. r
..
..
..
mod
r
k−1
k−2
rk − 1
xk
r1
r2
r3
···
0
0
r1
r2
r3
···
rk−1
0
Notice that the upper-left block of this matrix and the first k − 1 entries of the right-hand vector form the
system from Lemma 3.2 for the values r1 < r2 < · · · < rk−1 . Thus, the existence of a positive integer
solution (x1 , . . . , xk ) to our matrix equation above implies that (x1 , . . . , xk−1 ) are the multiplicities of a qvector supported by (r1 , r2 , . . . , rk−1 ). Further, the final row of the matrix equation above implies that rk =
Pk−1
xk−1
1 + i=1 xi ri , from which it follows that q = (r1x1 , . . . , rkxk ) arises from the free sum of p = (r1x1 , . . . , rk−1
)
xk
and q = (1 ) by Theorem 3.3.
It is straightfoward to see that the simplex defined by (1xk ) is always reflexive and IDP, so it only remains
xk−1
to check that the simplex given by (r1x1 , . . . , rk−1
) has the same properties. We know that ∆(1,q) = ∆(1,p) ∗0
xk−1
x1
∆(1,h) where we set p := (r1 , . . . , rk−1 ) and h := (1xk ). By the definition of affine free sums, we know the
free sum ∆(1,p) ∗0 ∆(1,h) is structured so that ∆(1,p) is a face of ∆(1,q) . We know that ∆(1,q) = ∆(1,p) ∗0 ∆(1,h)
is IDP, and so each of its faces must also be IDP. The reflexive condition follows immediately from the
analysis in the previous paragraph.
The final result in this section shows that for an r-vector such that ri ∤ rk for some i, there are at most
finitely many such IDP reflexive simplices supported on that vector. Each of these simplices may or may
not be decomposable as an affine free sum.
Theorem 3.5. For a fixed support vector r, there exist only finitely many reflexive and IDP ∆(1,q) supported
by r that do not admit a free sum decomposition into lower dimensional ∆(1,q) .
Proof. Fix a support vector r = (r1 , . . . , rk ). By Proposition 3.4 we know that if ri | rk for all i ∈
{1, . . . , k − 1}, then any ∆(1,q) supported by r is an affine free sum of lower-dimensional ∆(1,q) . Thus, it
remains to show that if ri ∤ rk for at least one i in {1, . . . , k − 1} then there are at most finitely many reflexive
and IDP ∆(1,q) such that q is supported by r = (r1 , . . . , rk ). To see this, notice that if ∆(1,q) is reflexive
and IDP and supported by r, then using the notation from Lemma 3.2 there is a positive integer vector x
that satisfies Rx = b. The set of ∆(1,q) that are reflexive and IDP and supported by r corresponds to the
integer points in Rk>0 ∩ (x + ker(R)). Since ker(R) is orthogonal to the image of RT , it follows from ri ∤ rk
for some i that there exists a strictly positive vector a ∈ im(RT ) orthogonal to ker(R), namely the vector a
obtained as the sum of the transpose of the k-th row of R and the transpose of the i-th row of R. Hence,
Rk>0 ∩ (x + ker(R)) is bounded, and therefore contains at most a finite number of integer points.
4. q-Vectors With Support on Two Integers
Using the results established in Sections 2 and 3, we are now able to prove our main theorem; i.e., we will
prove that all IDP and reflexive ∆(1,q) supported on two integers are h∗ -unimodal. Let q = (r1x1 , r2x2 ) denote
a q-vector supported on two vectors. By Lemma 3.2, in order to capture all IDP and reflexive simplices
supported on two integers we need to consider two cases given by the possible divisibility relations between
r1 and r2 . Table 1 summarizes the results of this section. For the two possible cases of q-vectors satisfying
the conditions of Lemma 3.2, the table indicates if these simplices exhibit h∗ -unimodality, the IDP, and/or
a known free sum decomposition.
We now classify all IDP and reflexive simplices supported on two integers in Theorem 4.1. We see there
are exactly two types of IDP and reflexive q-vectors, the former corresponding to the divisibility pattern
r1 | r2 and the latter corresponding to r1 ∤ r2 .
10
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
Case
(1) r1 | r2
(2) r1 ∤ r2
h∗ -unimodal
all vectors
all vectors
IDP
all vectors
all vectors
known free sum decomposition
all vectors
none
Table 1. IDP and h∗ -unimodality for q-vectors supported on two integers. The results are
classified by the two divisibility cases of Lemma 3.2.
Theorem 4.1. Let r < s be positive integers and let
q = (r, r, . . . , r, s, s, . . . , s) = (rm , sx ) .
| {z } | {z }
m times
x times
Then ∆(1,q) is reflexive if and only if r | (1 + sx) and s | (1 + rm). Further, ∆(1,q) is IDP and reflexive if
and only if either r 6= 1 with s = 1 + rm and x = r − 1 or r = 1 with s = 1 + m and x arbitrary.
Proof. The claim regarding reflexivity follows immediately from the condition that ∆(1,q) is reflexive if and
only if qj | (1 + q1 + · · · + qn ) for all j. To show that ∆(1,q) being reflexive IDP implies s = 1 + rm and
x = r − 1 when r 6= 1, we apply Corollary 2.4. First, applying the corollary with qj = s we see that
nro
n s o 1 + mr
1
+m
= 1,
+x
=
s
s
s
s
and thus we have 1 + mr = s. Second, setting qj = r and applying the corollary yields
nso 1
nro
1+x
1
1 + mr
+x
= +x
=
+m
= 1,
r
r
r
r
r
r
from which it follows that x = r − 1. A similar argument shows that if r = 1, then 1 + m = s and x can be
an arbitrary positive integer.
Next, assume that s = 1 + mr and q is formed with x = r − 1, which Corollary 2.4 guarantees to be
reflexive. To verify that ∆(1,q) is IDP in this case, we will directly apply Theorem 2.3. Consider the case
where qj = r, hence b = 0, 1, . . . , r − 1. In this case, since 0 ≤ b < r, it follows that (3) reduces to
brm + b
= b(rm − m + 1) − (r − 1)bm = b .
b(rm − m + 1) − (r − 1)
r
Thus, in this case, our only option for the c value in equations (4) and (5) is c = 1. When qi = r it is
immediate that cancellation implies (4). We therefore need to check that (4) holds when qi = rm + 1, c = 1,
and b = 2, 3, . . . , r − 1, which follows since
m + (b − 1)m = bm
if and only if
if and only if
(b − 1)mr + (b − 1)
brm + b
m+
=
r
r
rm + 1
(b − 1)(mr + 1)
b(rm + 1)
+
=
.
r
r
r
Next consider the case where qj = rm + 1, hence b = 0, 1, 2, . . . , rm. For this value of qj , (3) reduces to
the following expression, which we denote by h(b):
br
(11)
h(b) := b − m
mr + 1
It is straightforward to verify that when b = km + l with 0 ≤ l < m, we have h(0) = 0, we have h(km) = m
when l = 0, and we have
h(km + l) = l
for l 6= 0, which follows directly from the following claim.
DETECTING THE INTEGER DECOMPOSITION PROPERTY
Claim: If k < r, then
kmr + r
mr + 1
11
= k. This follows from the inequality
k(mr + 1) < kmr + r < (k + 1)(mr + 1) .
Thus, the viable candidates for c-values in (4) and (5) are
c = 1, m + 1, 2m + 1, . . . , (r − 1)m + 1 ,
and all other values of b give values greater than or equal to two. To complete our proof, we need to check
(4) and (5) for these values of b. We will show that for any such value of b, every viable c less than b will
satisfy these equations.
Fix b = am + d with 2 ≤ d ≤ m and 0 ≤ a ≤ (r − 1), and fix c = km + 1 with k ≤ a, which ensures that
c < b.
(am + d)r
= a. To prove this, we use the division algorithm to evaluate this quotient and
Claim:
rm + 1
obtain
amr + dr = a(rm + 1) + (dr − a) .
Because of the bounds on a and d we see that 0 ≤ dr − a ≤ mr, thus this is the correct representation using
the divisionalgorithm, hence theclaim follows.
r[(a − k)m + d − 1]
Claim:
= a − k. To prove this, we again use the division algorithm to evaluate
rm + 1
this quotient and obtain
(a − k)mr + (d − 1)r = (a − k)(rm + 1) + ((d − 1)r − (a − k)) .
Because of the bounds on a, d, and k, it follows that
1 ≤ (d − 1)r − (a − k) ≤ (m − 1)r ,
and thus this is the correct representation using the division algorithm. The claim follows.
Because k ≤ a < r, it follows that
(km + 1)r
= k.
rm + 1
Combining this with our two claims above, it follows that
(km + 1)r
r[(a − k)m + d − 1]
(am + d)r
+
= k + (a − k) = a =
,
rm + 1
rm + 1
rm + 1
which completes the proof. Note that this holds for any choice of k ≤ a, hence for all c < b with h(c) = 1.
Theorem 3.3 tells us that if q = (1m , (1 + m)x ) for any positive integer x, then ∆(1,q) is reflexive IDP.
To prove our main result, it remains to establish that all IDP reflexive ∆(1,q) supported on two integers
are h∗ -unimodal.
Theorem 4.2. Let ∆(1,q) be a reflexive simplex supported on two integers. If ∆(1,q) is IDP then it is
h∗ -unimodal.
Proof. By Theorem 4.1, we know that ∆(1,q) with q = (rm , sx ) is reflexive and IDP if and only if either r 6= 1
with s = 1 + rm and x = r − 1 or r = 1 with s = 1 + m and x arbitrary. In the latter case, ∆(1,q) is the
affine free sum ∆(1,q1 ) ∗0 ∆(1,q2 ) , where q1 = (1m ) and q2 = (1x ). By Theorem 3.3 it follows that ∆(1,q) is
h∗ -unimodal. Thus, it only remains to prove h∗ -unimodality for the former case.
For the sake of clarity, in the following we will let ∆r,m denote the simplex ∆(1,q) , where q = (rm , (rm +
r−1
1) ) with r 6= 1. We will also let
⌊ r+m−1
⌋
r−1
2
X
X
i
(i + 1)z + r
pr,m (z) :=
αi z i
i=0
where
αi :=
(
i=1
min{i, m − 1} if m < r,
min{i, r}
if m ≥ r.
12
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
To prove the desired result, it then suffices to show that
h∗∆r,m (z) = pr,m (z) + z r+m−1 pr,m
1
,
z
and that this sum is unimodal. To begin, recall that the formula given in Theorem 2.2 reduces to
r(rm+1)−1
h∗∆r,m (z)
=
X
z ω(b) ,
b=0
where
ω(b) = b − (r − 1)
b
b
−m
.
r
rm + 1
To compute the desired formula for h∗∆r,m (z) we first consider the sequence
r(rm+1)−1
b
W := b − (r − 1)
.
r b=0
We will now group the terms in this sequence into subsequences of length r, and collect these into blocks of
m subsequences as this will help make the desired
k more apparent. Following this, we will subtract
j formula
b
in order to produce the desired powers w(b), but
from each number in the sequence the value m rm+1
organized in a fashion which reveals the desired polynomial structure. We first note that
r(rm+1)−1
b
W = b − (r − 1)
r b=0
rm−1
r−1
= (i + j)j=0
i=0
s+m−1 r−1
r−1
=
(i + j)j=0
.
i=s
s=0
In this grouping, each sequence of m sequences of length r
s+m−1
r−1
Ws := (i + j)j=0
i=s
k
j
b
from each
accounts for rm powers w(b). To compute the powers of h∗∆r,m (z) we must subtract m rm+1
j
k
b
term in W . Since this subtraction causes the term to decrease by m each time rm+1
increases by 1 then
for all s = 0, 1, . . . , r − 1, for every i > sm
b
r−1
= (i + j − sm)r−1
(i + j)j=0 − m
j=0 .
rm + 1
Whereas, for i = sm
r−1
(i + j)j=0 − m
b
s−1
r
s−1
r
= (sm + j − (s − 1)m)j=0 , (j)j=s = (m + j)j=0 , (j)j=s .
rm + 1
So for every s = 0, 1, 2, . . . , r − 1, we have that
m−1
b
s−1
r
r−1
Ws − m
=
(m + j)j=0 , (j)j=s , (i + j)j=0
.
rm + 1
i=1
Ps−1
s−1
r
Notice that the sequence of coefficients (m + j)j=0 gives the polynomial z m j=0 z j , and the sequence (j)j=s
Pr
yields j=s z j . Varying over s = 0, 1, . . . , r − 1, the sum of these polynomials is
(12)
r−1
X
i=0
(i + 1)z i + z r+m−1
r−1
X
i=0
(i + 1)
i
1
.
z
DETECTING THE INTEGER DECOMPOSITION PROPERTY
(1)
(2)
(3)
(4)
(5)
(6)
r1
r1
r1
r1
r1
r1
| r2
| r2
∤ r2
∤ r2
∤ r2
∤ r2
Case
r1 | r3
r1 | r3
r1 | r3
r1 | r3
r1 ∤ r3
r1 ∤ r3
r2
r2
r2
r2
r2
r2
| r3
∤ r3
| r3
∤ r3
| r3
∤ r3
h∗ -unimodal
all vectors
all vectors
all vectors
some but not all
all vectors
?
IDP
all vectors
all vectors
all vectors
some but not all
all vectors
?
13
known free sum decomposition
all vectors
all vectors
all vectors
?
none
?
Table 2. IDP and h∗ -unimodality for q-vectors supported on three integers. The results
are classified by the six divisibility cases of Lemma 3.2 that capture IDP simplices.
m−1
The sequence of coefficients (i + j)r−1
yields the polynomial
j=0
i=1
z
r−1
X
zj + z2
r−1
X
z j + · · · + z m−1
zj ,
j=0
j=0
j=0
r−1
X
or equivalently,
(13)
⌊ r+m−1
⌋
2
X
j=1
i
αi z + z
r+m−1
⌊ r+m−1
⌋
2
X
i=1
αi
i
1
.
z
Since the sum of one copy of (12) and r copies of (13) is a unimodal polynomial and gives the desired formula
for h∗∆r,m (z), this completes the proof.
5. q-Vectors With Support on Three Integers
In this section, we study Conjecture 1.3 for the next most general family of ∆(1,q) in regards to Payne’s
counterexamples to Conjecture 1.4. Namely, we analyze IDP and h∗ -unimodality for reflexive ∆(1,q) supported on three integers r1 < r2 < r3 . Lemma 3.2 implies that in order for an r-vector r = (r1 , r2 , r3 ) to
be a candidate for supporting an IDP and reflexive ∆(1,q) , it must satisfy the following linear system with a
positive integer solution:
0 r2 mod r1 r3 mod r1
r1 − 1
x1
r1
0
r3 mod r2 x2 = r2 − 1 .
r1
r2
0
x3
r3 − 1
It is not clear in general how to identify the r-vectors for which a positive integer solution to this system
exists, let alone those for which both reflexivity and IDP hold. Thus, we consider our analysis by cases
based on divisibility among the ri ’s. Given that it is not possible for r1 | r2 , r2 | r3 , and r1 ∤ r3 , there are
seven possible divisibility relations among the ri ’s, leading to seven cases in which to consider the application
of Lemma 3.2. Furthermore, we will see in Proposition 5.1 that there are no IDP and reflexive simplices
supported on an r-vector satisfying r1 | r2 , r1 ∤ r3 , and r2 ∤ r3 . Thus, there are a total of six cases for
which we must check the validity of Conjecture 1.3, and they are numbered (1) to (6) in Table 2. Table 2
further indicates if the simplices satisfying each case exhibit h∗ -unimodality, IDP, and/or a known free sum
decomposition. As can be seen from this table, we will prove Conjecture 1.3 for cases (1), (2), (3), and (5).
Cases (1), (2), and (3) will be discussed in Subsection 5.1, case (5) will be discussed in Subsection 5.2, and
cases (4) and (6) will be discussed in Subsection 5.3. These results suggest that Conjecture 1.3 holds in the
next most general family of ∆(1,q) in relation to Payne’s counterexamples to Conjecture 1.4.
To begin, our first proposition shows that the linear system from Lemma 3.2 need not have a positive
integer solution, thereby eliminating the case r1 | r2 , r1 ∤ r3 , and r2 ∤ r3 (and so it is not presented in
Table 2).
Proposition 5.1. Suppose the r-vector r = (r1 , r2 , r3 ) satisfies r1 | r2 , r1 ∤ r3 , and r2 ∤ r3 . If r also satisfies
Lemma 3.2, then r does not support any q-vectors.
14
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
Proof. If such a q-vector were to exist, it would have the form
q = (sx1 , (st)x2 , ((mt + k)s + r)x3 )
for some integers s, m ≥ 1, t ≥ 2, 0 ≤ k < t, 0 < r < s, and x1 , x2 , x3 > 0. To solve for the xi ’s we consider
0 0
r
x1
s−1
s 0 ks + r x2 =
.
st − 1
s st
0
x3
(mt + k)s + r − 1
Solving the first row of this system forces rx3 = s − 1, hence there must exist some s − 1 ≥ d ≥ 1 such that
rd = s − 1, hence x3 = d. This forces the second row to imply x1 = t − kd − 1; if x1 is to be positive, this
implies t − kd − 1 > 0. These values of x2 and x3 lead to the third row having the form
mts + ks + r − 1 − st − skd − s
.
st
Since 0 < r < s and we must have that s divides the numerator of this expression, it follows that r = 1,
which forces d = s − 1, and thus s ≥ 2. Thus, the above fraction simplifies to
x2 =
x2 =
t(m − 1) + k − (kd + 1)
.
t
If x2 is to be a positive integer, we must have that t divides the numerator, hence t | k−(kd+1) = k(2−s)−1.
Since s ≥ 2, we have 2 − s ≤ 0, and hence
0 ≥ k(2 − s) − 1 = k − (kd + 1) ≥ −(kd + 1) < −t .
Thus t divides k(2 − s) − 1 only if k(2 − s) = 1, which is impossible since k > 0 and 2 − s ≤ 0. Thus, there
is no vector of this type supporting an IDP reflexive.
5.1. Cases (1), (2), and (3) by way of affine free sum decompositions. Propositions 5.2, 5.3, and 5.4
prove Conjecture 1.3 for cases (1), (2), and (3) of Table 2, respectively. The proofs utilize the affine free sum
construction, Theorem 3.3, and Proposition 3.4.
Proposition 5.2. Suppose the r-vector r = (r1 , r2 , r3 ) satisfies r1 | r2 | r3 . If r also satisfies the Lemma 3.2,
then any q-vector supported on r has the following form. For each s, m, x such that s, m, x > 1, set
q = (1m−1 , ms−1 , (sm)x ) .
Moreover, these simplices are all IDP and have unimodal h∗ -vectors.
Proof. Our linear system from Lemma 3.2 is
0 0
r1 0
r1 r2
of the form
0
x1
r1 − 1
0 x2 = r2 − 1 .
0
x3
r3 − 1
Thus, r1 = 1, hence x1 = r2 − 1 and x3 = x can be arbitrary. Setting (r1 , r2 , r3 ) = (1, m, ms), it follows that
q = (1m−1 , ms−1 , (sm)x ) .
Using Proposition 3.4, we know that these simplices may be expressed as the affine free sum (∆(1,q1 ) ∗0
∆(1,q2 ) ) ∗0 ∆(1,q3 ) , where q1 = (1m−1 ), q2 = (1s−1 ), and q3 = (1x ). From Theorem 3.3, we see that these
simplices are IDP, reflexive, and h∗ -unimodal.
Proposition 5.3. Consider r-vectors r = (r1 , r2 , r3 ) satisfying r1 | r2 , r1 | r3 , and r2 ∤ r3 . For any k, d > 1
such that kd = r, the vector (1k−1 , rm , (mr + k)d−1 ) corresponds to a reflexive simplex, and these are the only
reflexive simplices ∆(1,q) that simultaneously satisfy these divisibility conditions and Lemma 3.2. Moreover,
each of these simplices is IDP and h∗ -unimodal.
Proof. If r1 | r2 and r1 | r3 , then it follows that r1 = 1 by the first line of Rx = b, so we are in the case
where (r1 , r2 , r3 ) = (1, r, mr + k) for 0 < k < r. By Theorem 3.5, there are at most a finite number of
IDP reflexives supported by this vector. We first apply Lemma 3.2 to identify potential x1 , x2 , x3 -values; if
DETECTING THE INTEGER DECOMPOSITION PROPERTY
15
(1x1 , rx2 , (mr + k)x3 ) corresponds to an IDP reflexive, then there must be a positive integer solution to the
linear system
0
0
0
1 − 1/1
x1
1/r
0
k/r x2 =
1 − 1/r
1/(mk + r) r/(mk + r)
0
x3
1 − 1/(mr + k)
Noting that the first row is a zero equation, and scaling the other two rows to clear denominators, we obtain
x1
1 0 k
r−1
x2 =
1 r 0
mr + k − 1
x3
Because any solution to this system is restricted to positive integers, the first equation above forces 0 <
x1 < r − 1, which in turn when combined with the second equationforces x2 = m. Hence x1 = k − 1 and
x3 = (r − k)/k. Thus, if a positive integer solution is possible, it must be that k | r is a proper divisor of
r. Thus, for any k, d > 1 such that kd = r, we see that the vector (1k−1 , rm , (mr + k)d−1 ) corresponds to a
reflexive simplex.
Note that q1 = (1k−1 )and q2 = (dm , (md + 1)d−1 ) are both valid q-vectors. The former is well-known
to have an h∗ -vector of (1, . . . , 1). The latter corresponds to an IDP, reflexive, and h∗ -unimodal simplex
by Theorem 4.1 and Theorem 4.2. Thus, (1k−1 , rm , (mr + k)d−1 ) arises as the q-vector of the affine free
sum ∆(1,q1 ) ∗0 ∆(1,q2 ) , and from Theorem 3.3 we draw the conclusion that ∆(1,q) is also reflexive, IDP, and
h∗ -unimodal.
Proposition 5.4. Suppose the r-vector r = (r1 , r2 , r3 ) satisfies r1 ∤ r2 , r1 | r3 , and r2 | r3 . If r also satisfies
Lemma 3.2, then any q-vector supported on r has the following form. For each s, m, x such that s, m ≥ 1
and x ≥ 0, set
q = (sm , (ms + 1)s−1 , (s(ms + 1))x ) .
Moreover, these simplices are all IDP and have unimodal h∗ -vectors.
Proof. Suppose we set r1 = s, r2 = ms + t, and r3 = u(ms + t) for some 0 ≤ t < s and u ≥ 1. The second
equation in the linear system from Lemma 3.2 is of the form
sx1 = ms + t − 1.
This implies s | t − 1, but since t < s and s 6= 1, t must be 1. Therefore, x1 = m, and the first line of the
linear system is simply x2 = s − 1.
The last equation in the system gives
ms + (ms + 1)(s − 1) = u(ms + 1) − 1.
Solving for u, we get s = u, so then r3 = s(ms + 1). Since x3 is a free variable, we may have as many copies
of s(ms + 1) in q as we like.
Note that by Proposition 3.4, q = (sm , (ms + 1)s−1 , (s(ms + 1))x ) arises as the affine free sum (∆(1,q1 ) ∗0
∆(1,q2 ) ), where q1 = (sm , (ms + 1)s−1 ) and q2 = (1x ). This implies that these simplices are reflexive, IDP,
and h∗ -unimodal.
5.2. Proving Conjecture 1.3 for Case (5). Theorems 5.5 and 5.7 together establish that Conjecture 1.3
holds for all ∆(1,q) captured by case (5) of Table 2.
Theorem 5.5. Suppose the triple r1 < r2 < r3 satisfies r1 ∤ r2 , r1 ∤ r3 , and r2 | r3 . Every q-vector supported
on three integers satisfying these conditions that also satisfies Lemma 3.2 has the following form. For each
s, t, r such that s > 1, 0 < t < s with t | s, and r ≥ 1, set
q = (sr , (rs + 1)t−1 , (t(rs + 1))s/t−1 ) .
For every such q, ∆(1,q) is IDP.
Proof. Since r1 does not divide either of r2 , r3 , we see that r1 > 1. Thus, the divisibility conditions imply
that (r1 , r2 , r3 ) is of the form (s, rs + k, mrs + ℓs + t) for some s > 1, r ≥ 1, m > 1, where km = ℓs + t with
0 < k < s and 0 < t < s. Lemma 3.2 implies that our necessary linear system is
0
k
t
x1
s−1
s
.
0
0 x2 =
rs + k − 1
s rs + k 0
x3
mrs + ℓs + t − 1
16
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
Gaussian elimination on this system leads to the solutions
rs + k − 1
x1 =
,
s
((m − 1)r + ℓ)s + t − k
x2 =
,
rs + k
and
(s − 1)(rs + k) − k[((m − 1)r + ℓ)s + t − k]
.
x3 =
t(rs + k)
Since x1 must be a positive integer, we see that s | k − 1; by assumption 0 < k − 1 < s − 1, hence k = 1.
Thus, x1 = r. Knowing that k = 1, x2 simplifies to m − 1 and x3 = s−m
t . Since x3 is a positive integer, we
need that t | (s − m), which forces m < s. However, m = ℓs + t and m < s implies m = t. Thus, x2 = t − 1
and x3 = st − 1, which implies that t | s, completing the identification of the necessary x-values.
We next verify IDP using Theorem 2.3. Throughout, we use the notation
P
X
1 + i6=j qi
bqi
h(b) := b
−
.
qj
qj
i6=j
Case: qj = s. It is straightforward to verify that
h(b) = b − (s/t − 1)
and using this formula one can check that
bt
s
,
h(ks/t) = k .
Combining these two observations, it follows that h(b) = 1 only when b = 1 and b = s/t, thus identifying
the b-values we are required to check in (3). To verify that (4) always has the desired solution, we consider
three cases. If qi = s, the result is trivial. If qi = rs + 1, then we may select c = 1, from which it follows that
both sides of (4) are equal to r(b − 1). If qi = t(rs + 1), then we set c = s/t, from which it is straightforward
to compute that both sides of (4) are equal to btr − rs − 1 + ⌊bt/s⌋. This completes our first case.
Case: qj = rs + 1. It is straightforward to verify that
bs
.
h(b) = b − r
rs + 1
As we are considering values of b ranging from 1 to rs, we see that this analysis is identical to that undertaken
in the proof of Theorem 4.1 starting from (11). To verify that (4) always has the desired solution, we
consider three cases. If qi = rs + 1, the result is trivial. If qi = s, then the analysis is identical to that
given following (11) in our proof of Theorem 4.1. If qi = t(rs + 1), then we can set c = 1 and the result is
immediate. This completes our second case.
Case: qj = t(rs + 1). Set d = s/t. We first identify those values of b that satisfy (3) and (5). It is
straightforward to verify that
bd
b
h(b) = b − r
− (t − 1)
.
rs + 1
t
Writing b = mt + ℓ where 0 ≤ m ≤ rs and 0 ≤ ℓ ≤ t, it follows that
ms + ℓd
h(b) = h(mt + ℓ) = m + ℓ − r
.
rs + 1
We can now further divide into cases: either we have m = rs or we have m = kr + w where 0 ≤ k < s and
0 ≤ w < r, which yields
ws + ℓd − k
h(b) = h((kr + w)t + ℓ) = w + ℓ − r
.
rs + 1
For m j6= rs, observe
k that since 0 ≤ ws ≤ r−1 and 0 ≤ ℓd < s, with 0 ≤ k < s, we have that 0 ≤ ws+ℓd < rs.
ws+ℓd−k
is equal to either 0 or −1.
Thus,
rs+1
Subcase 1 of 3: Suppose m = rs. Since 0 ≤ ℓd < s, we have
ℓd − s
= ℓ + r.
h(srt + ℓ) = ℓ − r
rs + 1
DETECTING THE INTEGER DECOMPOSITION PROPERTY
17
If this is equal to 1, then it must be that ℓ = 0 and r = 1. Thus, if r = 1, we have that h(st) = 1.
Subcase 2 of 3: Suppose now that m 6= rs and that
ws + ℓd − k
= −1 .
rs + 1
Then since w, ℓ ≥ 0 and r ≥ 1, we have h(b) = w + ℓ + r = 1 which forces w = ℓ = 0 and r = 1. In this case,
h(kt) = 1 any time that k > 0. Thus, if r = 1, we have that h(kt) = 1 when 0 < k < s.
Subcase 3 of 3: Suppose again that m 6= rs and that
ws + ℓd − k
= 0.
rs + 1
Then 0 ≤ k ≤ ws + ℓd, which implies that either (A) 0 < w < r with 0 ≤ ℓ < t or (B) w = 0 with k ≤ ℓd.
If (A) holds, then h(b) = w + ℓ = 1 forces w = 1 and ℓ = 0 since w > 0, which means that h(b) = 1 when
b = (kr + 1)t for 0 ≤ k < s. If (B) holds, then our same equation forces w = 0 and ℓ = 1 when k ≤ d, which
means that h(b) = 1 when b = krt + 1 for 0 ≤ k < s and k ≤ d.
We summarize the values of b for which h(b) = 1 that were just derived:
• If r = 1 and 0 < k ≤ s we have b = kt.
• If r ≥ 1 and 0 ≤ k < s, we have b = (kr + 1)t.
• If r ≥ 1 and 0 ≤ k < s and k ≤ d, we have b = krt + 1.
Our next goal is to establish that (4) is always satisfied; recall that we are in the case where qj = t(rs + 1).
If qi = t(rs + 1), then (4) is trivially satisfied. If qi = rs + 1, we write b = mt + ℓ where 0 ≤ m < rs + 1 and
0 ≤ ℓ < t. Substituting this form of b into (4) yields the equation
jck ℓ − c
−
=
.
t
t
If b > t, we set c = t and the equation is satisfied. If 2 < b < t, then we set c = 1 and the equation is
satisfied.
If qi = s, the analysis becomes more complicated. We first define d = s/t and write b = mt + ℓ where
0 ≤ m < d and 0 ≤ ℓ < t. Our argument will proceed by considering r = 1 and r > 1 separately.
Suppose r = 1. Then the left-hand-side of (4) is reduced to
cd
ℓd − m
−
s+1
s+1
and the right-hand-side to
ℓd − m − cd
.
s+1
Since m < d, if ℓd − m < 0 this forces ℓ = 0 and 0 < m, thus b is a multiple of t, and we found earlier that
h(mt) = 1. Thus, we need proceed
no
j
k further. If ℓd − m ≥ 0, then since m < d we must have ℓ ≥ 1, and we
ℓd−m
also have ℓd − m < s. Thus, s+1 = 0, from which it follows that (4) reduces to
ℓd − m − cd
cd
=
.
−
s+1
s+1
If m = 0, set c = 1 and this equation is solved. If m ≥ 1, set c = mt + 1 which is less than b in this case,
and this equation is again satisfied. This completes our proof for r = 1.
We next consider when r ≥ 2, maintaining our previous notation of b = mt + ℓ. Write m = f r + g where
0 ≤ f ≤ ⌊d/r⌋ and 0 ≤ g < r except in the case where f = ⌊d/r⌋ in which case g is bounded above by
d − d⌊d/r⌋. This leads to the left-hand-side of (4) having the form
cd
gs + ℓd − f
−
f+
rs + 1
rs + 1
while the right-hand-side has the form
f+
gs + ℓd − f − cd
rs + 1
.
18
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
We thus need to solve the equation
cd
gs + ℓd − f − cd
gs + ℓd − f
−
=
rs + 1
rs + 1
rs + 1
subject to the constraints 0 ≤ g < r (with the exception mentioned above), 0 ≤ ℓ ≤ t, and ≤ f ≤ ⌊d/r⌋.
Note that the first two inequalities imply that 0 ≤ gs + ℓd < rs, and also f ≤ ⌊d/r⌋ ≤ s, hence
gs + ℓd − f
0
if gs + ℓd ≥ f
=
−1 if gs + ℓd < f
rs + 1
Subcase 1 of 2: Suppose gs + ℓd − f ≥ 0. Then (4) reduces to
gs + ℓd − f − cd
cd
=
.
−
rs + 1
rs + 1
Note that f ≤ ⌊d/r⌋ < d, and thus we can set c = f rt + 1 which is less than b. The left-hand-side of our
above equation is given by
f rs + d
−f rs + f + d − f
(f rt + 1)d
−
=−
=−
= −f .
rs + 1
rs + 1
rs + 1
Similarly, the right-hand-side of our equation is given by
f − d + gs + ℓd − f
−d + gs + ℓd
−f +
= −f +
,.
rs + 1
rs + 1
Since h(b) is assumed to be at least 2, we have that one or both of g and ℓ are non-zero. Combining
this observation with gs + ℓd − f ≥ 0 it follows that gs + ℓd > 0. Note that d | (gs + ℓd), and thus
rs + 1 > gs + ℓd − d ≥ 0, which forces the right-hand-side of our equation to equal −f , satisfying (4).
Subcase 2 of 2: Suppose gs + ℓd − f < 0. Note that since g, s, ℓ, d ≥ 0, it follows that f ≥ 1 and thus
b = (f r + g)t + ℓ ≥ t. Set c = t, which is less than b. With these conditions, the left-hand-side of (4) is
easily seen to equal −1. The right-hand-side of (4) is given by
gs + ℓd − f − s
.
rs + 1
Since gs + ℓd − f < 0 and −s < 0, the numerator above is strictly negative. Also, since g, s, ℓ, d ≥ 0, the
numerator is minimized by −f − s > −d − s ≥ −2s. But, since we assumed that r ≥ 2, it follows that
rs + 1 > 2s and thus the floor function above is equal to −1, satisfying equality for (4).
This completes the proof establishing IDP.
Remark 5.6 (IDP and reflexive ∆(1,q) that do not decompose as affine free sums). Note that the previous
theorem establishes that, in the case of q-vectors with support on three integers, classes of IDP reflexive
simplices arise that do not all decompose as affine free sums. For example, setting s = 6, t = 3, r = 1 in
Theorem 5.5 yields q = (6, 7, 7, 21) with h∗ -polynomial 1 + 11z + 18z 2 + 11z 3 + z 4 . Since this h∗ -polynomial
is irreducible over the integers, ∆(1,6,7,7,21) does not admit a free sum decomposition [1]. Note, however, the
close resemblance between these vectors and those formed by the affine free sum construction.
To prove Conjecture 1.3 for the ∆(1,q) satisfying case (5) of Table 2, it only remains to prove that they
are h∗ -unimodal. This is the content of the following theorem, for which the utilized proof techniques are
essentially the same as those of Theorem 4.2.
Theorem 5.7. For each triplet of integers s, t, and r satisfying s > 1, 0 < t < s with t | s, and r ≥ 1 the
reflexive lattice simplex ∆(1,q) with
q = (sr , (rs + 1)t−1 , (t(rs + 1))s/t−1 )
has a unimodal h∗ -polynomial.
Proof. Let s = φt for some integer φ > 1. Notice first that 1+
Pn
i=1 qi
s(rs+1)−1
h∗ (∆(1,q) ; z) =
X
b=0
z ω(b) ,
= s(rs+1). Therefore, by Theorem 2.2
DETECTING THE INTEGER DECOMPOSITION PROPERTY
where
Consider the sequence
19
b
b
b
ω(b) = b − r
− (t − 1)
− (φ − 1)
.
rs + 1
s
φ
s(rs+1)−1
b
.
b − (φ − 1)
φ b=0
We first group W into subsequences of length φ, which we then group into sequences of φ-sequences of length
t (so each t-sequence of φ-sequences consists of s terms of W ). Since W consists of s(rs + 1) terms, there are
exactly sr + 1 of these t-sequences. We group the first rs of these t-sequences into sequences of r t-sequences.
This presentation of W looks like
!
ℓt+t−1 kr+r−1 s−1
t−1
φ−1
φ−1
.
W =
(i + j)j=0
, (srt + i + j)j=0
W :=
i=ℓt
ℓ=kr
i=0
k=0
b
from each term in W . Since this subtraction causes each term to decrease by
We then subtract (t − 1)
s
b
(t − 1) every time
increases by 1, which happens at the start of each new t-sequence then
s
!
ℓt+t−1 kr+r−1 s−1
t−1
φ−1
φ−1
,
W =
(i + j + ℓ(t − 1))j=0
, (srt + i + j − rs(t − 1))j=0
i=ℓt
=
(i + j +
φ−1
ℓ)j=0
t−1 kr+r−1
i=0
ℓ=kr
ℓ=kr
!s−1
k=0
i=0
k=0
t−1
φ−1
.
, (i + j + rs)j=0
i=0
b
. Thus, we subtract one more copy of r each time
Now, from each term in W we must subtract r
sr + 1
b
b
increases by 1. For the first sr t-sequences (containing s elements of W each), the value
sr + 1
sr + 1
increases at the (ksr + k)th term of W for k = 1, 2, . . . , s − 1, and therefore is constant on each t-sequence
in the r-sequence
t−1 kr+r−1
φ−1
(i + j + ℓ)j=0
i=0
ℓ=kr
except for the very first t-sequence, corresponding to ℓ = kr. Thus, for a fixed k ∈ [s − 1], and all ℓ > kr we
subtract kr from each term of the t-sequence:
t−1 kr+r−1
t−1 r−1
φ−1
φ−1
(14)
(i + j + ℓ − kr)j=0
=
(i + j + ℓ)j=0
.
i=0
i=0
ℓ=kr+1
ℓ=1
th
Similarly, when k = 0, this reduction applies to all t-sequences in the 0 r-sequence:
t−1 kr+r−1
t−1 r−1
φ−1
(15)
(i + j + ℓ − kr)φ−1
=
(i
+
j
+
ℓ)
.
j=0
j=0
i=0
i=0
ℓ=kr+1
ℓ=0
As for the first t-sequence ofall r-sequences
with k = 1, 2, . . . , s − 1, the location of the (ksr + k)th term of W
b
increases from k − 1 to k. Notice, we can consider the final t-sequence
determines precisely where
sr + 1
(i.e. the (sr + 1)st t-sequence) with this collection simply by letting k = 1, 2, . . . , s. So we must determine
which φ-sequence of the t-sequence contains this term.
Recall that s = φt and k = 1, 2, . . . , s. So when the integer k lies in the interval [(α − 1)φ + 1, αφ] then the
b
first α − 1 φ-sequences lose r(k − 1) and the last t − α φ-sequences lose rk when we subtract off
.
sr + 1
Consider a fixed ℓ = kr for a fixed k = 1, 2, . . . , s. The corresponding t-sequence is
t−1
φ−1
(i + j + kr)j=0
.
i=0
20
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
As α ∈ [t] varies, we get the sequences
α−2
α−2
φ−1
φ−1
(i + j + kr − r(k − 1))j=0
= (i + j + r)j=0
,
i=0
i=0
th
for the φ-sequences before the α φ-sequence and
t−1
t−1
φ−1
φ−1
(i + j + kr − kr)j=0
= (i + j + r)j=0
,
i=α
i=α
for the φ-sequences following the αth φ-sequence. In consideration of all α ∈ [t] this collectively yields the
polynomial
t−1 φ−1
α−2
t
X
X
X
X φ−1
X
z r
z i+j .
z i+j +
(16)
α=1
i=α j=0
i=0 j=0
Finally, we must consider the αth φ-sequence for each fixed k = 1, 2, . . . , s. Here, the index i = α − 1,
whenever k lies in the corresponding interval [(α − 1)φ + 1, αφ]. Since k is fixed, then ℓ = kr is also fixed,
so the corresponding αth φ-sequence looks like
φ−1
(j + kr + α − 1)j=0 .
If α = (α − 1)φ + β for β ∈ [φ] then this φ-sequence is
φ−1
(j + αφ + β − 1)j=0 .
So from the first β − 1 terms we must subtract r(k − 1) and from the last z − β + 1 terms we must subtract
kr. Thus, this φ-sequence becomes
β−2
φ−1
(j + r + α − 1)j=0 , (j + α − 1)j=β−1 .
In consideration of all α ∈ [t] and β ∈ [φ] this yields the polynomial
!
φ−1
φ−1
φ−1
φ
β−2
t
t X
X 1 i
X
X
X
X
X
z α+r−1
(i + 1)z i + xr+φ−1
z α−1
z i + xα−1
zi =
(17)
.
z
α=1
α=1
i=0
i=0
i=0
i=β−1
β=1
Combining the results of equations (14), (15), (16), and (17), we see that h∗ (∆(1,q) ; z) is given by summing
equations (18), (19), and (20) presented below. Equation (18) accounts for both equations (14) and (15).
(18)
1 + ((r − 1)s)
r−1 X
t−1 φ−1
X
X
z i+j+ℓ .
ℓ=1 i=0 j=0
t
X
(19)
α=1
(20)
t
X
z
z r
α−1
α=1
α−2
X
X φ−1
t−1 φ−1
X
X
z i+j +
i=α j=0
i=0 j=0
φ−1
X
i
r+φ−1
(i + 1)z + x
i=0
z i+j .
φ−1
X
i=0
1
z
i !
.
Analogously, to the conclusion of Theorem 4.2 the sum of these three polynomials is unimodal.
5.3. Cases (4) and (6) of Table 2. In the following two remarks, we discuss the remaining divisibility
cases, which are significantly more complicated. While it would be interesting to observe that Conjecture 1.3
holds for all ∆(1,q) supported on three integers, it appears that new methods must be developed to deal with
these remaining two, and much more unruly, cases.
Remark 5.8 (Case (4) in Table 2). Suppose the r-vector r = (r1 , r2 , r3 ) satisfies r1 ∤ r2 , r1 | r3 , and r2 ∤ r3 .
Then r1 , r2 , and r3 are of the forms r1 = s for some s > 1, r2 = ms + t for some m ≥ 1 and 0 < t < s, and
r3 = u(ms + t) + v for some u ≥ 1 and 0 < v < ms + t. Moreover, since r1 | r3 , we must have ut + v = ks
for some k ∈ Z. Every q-vector supported on r1 , r2 , r3 that also satisfies Lemma 3.2 has the following form:
q = (smu+k−1−
m(s−1)
t
, (ms + t)(s−1)/t , (u(ms + t) + v)α ),
DETECTING THE INTEGER DECOMPOSITION PROPERTY
21
1
where α = tv
(ms(t − tu + s − 1) + t(t − 1 − s(k − 1))).
To see this, note that, since r3 mod r1 = 0, the linear system of Lemma 3.2 reduces to
0
t
0
s−1
x1
s
.
0
v x2 =
ms + t − 1
s ms + t 0
x3
u(ms + t) + v − 1
The first equation of this system gives us tx2 = s − 1, so x2 = (s − 1)/t. The third equation of the system
gives sx1 + (ms + t)x2 = u(ms + t) + v − 1, so solving for x1 , we get
x1
=
=
=
=
=
u(ms + t) + v − 1 − (ms + t) s−1
t
s
tu(ms + t) + tv − t − (ms + t)(s − 1)
st
−t − ms(s − 1) − t(s − 1)
mu + k +
st
−st − ms(s − 1)
mu + k +
st
m(s − 1)
mu + k − 1 −
.
t
Finally, the second equation of the linear system will give sx1 + vx3 = ms + t − 1, so solving for x3 yields
)
ms + t − 1 − s(mu + k − 1 − m(s−1)
t
v
tms + t2 − t − mstu − kst + st + ms(s − 1)
=
tv
ms(t − tu + s − 1) + t(t − 1 − s(k − 1))
.
=
tv
Unlike our previous cases, the above conditions on x1 , x2 , and x3 are necessary for ∆(1,q) to be IDP
but are not sufficient. For example, the vector q = (2, 2, 15, 20, 20) examined in the proof of Corollary 2.4
does produce a reflexive simplex ∆(1,q) and does satisfy the conditions of the previous result, yet fails
to be IDP. However, it is straightforward to verify that the h∗ -polynomial for ∆(1,2,2,15,20,20) has coefficients (1, 9, 20, 20, 9, 1), hence is unimodal. Other non-IDP q-vectors with unimodal h∗ -polynomials, all
found via computer search, include (2, 9, 12, 12), (2, 2, 15, 20, 20), (2, 2, 2, 21, 28, 28), (2, 15, 18, 18, 18, 18), and
(3, 16, 16, 36, 36, 36).
Even more striking is that the vector q = (3, 20, 24, 24, 24, 24) satisfies these divisibility conditions and
Lemma 3.2, yet is non-IDP and has a non-unimodal h∗ -vector, specifically
x3
=
h∗ (∆(1,q) ; z) = z 6 + 16z 5 + 29z 4 + 28z 3 + 29z 2 + 16z + 1 .
It remains a challenge to provide a more clear classification and description of the behavior of the q-vectors
satisfying Lemma 3.2 in this case.
Remark 5.9 (Case (6) in Table 2). The last case to check is when r1 ∤ r2 , r1 ∤ r3 , and r2 ∤ r3 . If we proceed
as usual, using Lemma 3.2, the linear system we produce is rather unwieldy. Computational data suggests
that when this is the support of q, the corresponding reflexive simplex is IDP. This has been checked using,
in part, the Normaliz interface in Macaulay2 [9] for all possible r1 = s, r2 = ms + t, r3 = u(ms + t) + v with
s ≤ 25 and m, u ≤ 10 satisfying r1 ∤ r2 , r1 ∤ r3 , and r2 ∤ r3 , and for every resulting q-vector ∆(1,q) was both
IDP and h∗ -unimodal. However, this search only resulted in 33 distinct reflexive simplices, listed in Table 3.
The main difficulty in verifying additional cases is due to having more lattice points in the high-dimensional
simplices than the software can handle.
Although the general status of Conjecture 1.3, remains very open, based on the observations and computational results given in this section, we believe the following conjecture should have a positive answer.
The comments given in Remark 5.8 and 5.9 suggest that new methodology must be developed to prove or
disprove it.
Conjecture 5.10. All reflexive IDP ∆(1,q) supported on three integers are h∗ -unimodal.
22
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
r-vector
(65 , 621 , 931 )
(64 , 501 , 751 )
(63 , 381 , 571 )
(62 , 261 , 391 )
(61 , 141 , 211 )
(105 , 1022, 2551 )
(104 , 822 , 2051)
(103 , 622 , 1551)
(102 , 422 , 1051)
(101 , 222 , 551 )
(123 , 1111, 1482 )
(122 , 751 , 1002)
(121 , 391 , 522 )
(145 , 1423, 4971 )
(144 , 1143, 3991 )
(143 , 863 , 3011)
(142 , 583 , 2031)
(141 , 303 , 1051)
(185 , 1824, 8191 )
(184 , 1464, 6571 )
(183 , 1104, 4951 )
(182 , 744 , 3331)
(181 , 384 , 1711)
(202 , 1641, 2053 )
(201 , 841 , 1053)
(213 , 1922, 4482 )
(212 , 1292, 3012 )
(211 , 662 , 1542)
(225 , 2225, 12211)
(224 , 1785, 9791 )
(223 , 1345, 7371 )
(222 , 905 , 4951)
(221 , 465 , 2531)
h∗ (∆(1,q) )
(1, 20, 36, 36, 36, 36, 20, 1)
(1, 20, 36, 36, 36, 20, 1)
(1, 20, 36, 36, 20, 1)
(1, 20, 36, 20, 1)
(1, 20, 20, 1)
(1, 28, 76, 100, 100, 100, 76, 28, 1)
(1, 28, 76, 100, 100, 76, 28, 1)
(1, 28, 76, 100, 76, 28, 1)
(1, 28, 76, 76, 28, 1)
(1, 28, 52, 28, 1)
(1, 40, 109, 144, 109, 40, 1)
(1, 40, 109, 109, 40, 1)
(1, 40, 74, 40, 1)
(1, 36, 100, 164, 196, 196, 164, 100, 36, 1)
(1, 36, 100, 164, 196, 164, 100, 36, 1)
(1, 36, 100, 164, 164, 100, 36, 1)
(1, 36, 100, 132, 100, 36, 1)
(1, 36, 68, 68, 36, 1)
(1, 44, 124, 204, 284, 324, 284, 204, 124, 44, 1)
(1, 44, 124, 204, 284, 284, 204, 124, 44, 1)
(1, 44, 124, 204, 244, 204, 124, 44, 1)
(1, 44, 124, 164, 164, 124, 44, 1)
(1, 44, 84, 84, 84, 44, 1)
(1, 72, 203, 268, 203, 72, 1)
(1, 72, 137, 137, 72, 1)
(1, 61, 225, 385, 385, 225, 61, 1)
(1, 61, 225, 329, 225, 61, 1)
(1, 61, 169, 169, 61, 1)
(1, 52, 148, 244, 340, 436, 436, 340, 244, 148, 52, 1)
(1, 52, 148, 244, 340, 388, 340, 244, 148, 52, 1)
(1, 52, 148, 244, 292, 292, 244, 148, 52, 1)
(1, 52, 148, 196, 196, 196, 148, 52, 1)
(1, 52, 100, 100, 100, 100, 52, 1)
Table 3. The 33 reflexive simplices described in Remark 5.9 and their h∗ -polynomials.
6. Future Directions
The results of this paper set the stage for a detailed investigation of Conjecture 1.3 in the special case of
the reflexive simplices of the form ∆(1,q) . As such, these results provide some obvious directions for future
work in discrete geometry as outlined by the following questions.
First, Remark 5.8 demonstrates that a q-vector satisfying Lemma 3.2 need not be h∗ -unimodal. However,
it is not clear in general what role Lemma 3.2 plays regarding h∗ -unimodality and the structure of Hilbert
bases for ∆(1,q) , leading to the following question.
Question 6.1. Suppose r = (r1 , . . . , rk ) supports a reflexive
simplex ∆(1,q) with q-vector satisfying Lemma 3.2.
What constraints on the Hilbert basis of cone ∆(1,q) , if any, are implied by the linear system in Lemma 3.2?
Further, for which divisibility patterns in the r-vector, if any, is Lemma 3.2 sufficient to imply h∗ -unimodality
for ∆(1,q) ? Which families of q-vectors, if any, both satisfy Lemma 3.2 and fail to be h∗ -unimodal?
Second, in Sections 4 and 5, h∗ -unimodality for some but not all of the cases studied follows from an affine
free sum decomposition of the simplices. Free sum constructions were used by Payne [16] to produce reflexive
polytopes with non-unimodal h∗ -polynomials, and by Braun and Davis [4] to study the IDP condition
DETECTING THE INTEGER DECOMPOSITION PROPERTY
23
for reflexive simplices. Given this, it is natural to ask when the free sum construction underlies the h∗ unimodality observed in the context of Section 3.
Question 6.2. For each fixed dimension d, what fraction of reflexive IDP simplices of the form ∆(1,q) arise
via affine free sums?
Third, the reflexive simplices satisfying the necessary condition of Lemma 3.2 correspond to positive
integral solutions to multivariate systems of algebraic equations. A full understanding of these simplices
may require tools from algebraic geometry and algebraic number theory.
Question 6.3. What are the integral solutions to the multivariate system of algebraic equations arising from
Lemma 3.2?
Fourth, as far as the authors know, in all published proofs that a family of polytopes is both IDP and
h∗ -unimodal, IDP and h∗ -unimodality are established separately. Thus, the IDP has only been observed to
correlate with h∗ -unimodality; no proofs have shown a causal link between the two properties. For example,
in well-known work of Bruns and Römer [6], the IDP condition is a consequence of the existence of a
regular unimodular triangulation, while h∗ -unimodality is established by using that triangulation to induce
an application of the g-theorem. Thus, there is a need for proofs that demonstrate explicitly how the IDP
condition might be used to prove h∗ -unimodality directly. The following question is a step in this direction.
Question 6.4. Do there exist q-vectors for which h∗ -unimodality of ∆(1,q) can be established using only the
conditions of Theorem 2.3?
As a final remark, the results of this paper offer new avenues by which to search for counterexamples to
Conjecture 1.3. In the special case of the simplices ∆(1,q) , the expression of the h∗ -polynomial arising from
Theorem 2.2 provides a direct link between the structure of a q-vector and the behavior of the associated h∗ polynomial. A deeper study of general polynomials of the form given in Theorem 2.2 might provide insight
leading to a counterexample, if one exists. Another possible direction in which to search for counterexamples
is suggested by Question 6.1, through the identification of broad families of q-vectors that simultaneously
satisfy Lemma 3.2 and fail to be h∗ -unimodal. Even if a counterexample is found to the general conjecture,
improved explanations of the broadly-observed h∗ -unimodality for reflexive polytopes, including in the special
case of ∆(1,q) , is needed.
References
[1] Matthias Beck, Pallavi Jayawant, and Tyrrell B. McAllister. Lattice-point generating functions for free sums of convex
sets. J. Combin. Theory Ser. A, 120(6):1246–1262, 2013.
[2] Matthias Beck and Sinai Robins. Computing the continuous discretely. Undergraduate Texts in Mathematics. Springer,
New York, second edition, 2015. Integer-point enumeration in polyhedra, With illustrations by David Austin.
[3] Benjamin Braun. Unimodality problems in Ehrhart theory. In Recent trends in combinatorics, volume 159 of IMA Vol.
Math. Appl., pages 687–711. Springer, [Cham], 2016.
[4] Benjamin Braun and Robert Davis. Ehrhart series, unimodality, and integrally closed reflexive polytopes. Ann. Comb.,
20(4):705–717, 2016.
[5] Francesco Brenti. Log-concave and unimodal sequences in algebra, combinatorics, and geometry: an update. In Jerusalem
combinatorics ’93, volume 178 of Contemp. Math., pages 71–89. Amer. Math. Soc., Providence, RI, 1994.
[6] Winfried Bruns and Tim Römer. h-vectors of Gorenstein polytopes. J. Combin. Theory Ser. A, 114(1):65–76, 2007.
[7] Heinke Conrads. Weighted projective spaces and reflexive simplices. Manuscripta Math., 107(2):215–227, 2002.
[8] Eugène Ehrhart. Sur les polyèdres rationnels homothétiques à n dimensions. C. R. Acad. Sci. Paris, 254:616–618, 1962.
[9] Daniel R. Grayson and Michael E. Stillman. Macaulay2, a software system for research in algebraic geometry. Available at
http://www.math.uiuc.edu/Macaulay2/.
[10] Takayuki Hibi. Flawless O-sequences and Hilbert functions of Cohen-Macaulay integral domains. J. Pure Appl. Algebra,
60(3):245–251, 1989.
[11] Takayuki Hibi. Algebraic Combinatorics on Convex Polytopes. Carslaw Publications, Australia, 1992.
[12] Takayuki Hibi. Dual polytopes of rational convex polytopes. Combinatorica, 12(2):237–240, 1992.
[13] Mircea Mustaţǎ and Sam Payne. Ehrhart polynomials and stringy Betti numbers. Math. Ann., 333(4):787–795, 2005.
[14] Benjamin Nill. Volume and lattice points of reflexive simplices. Discrete Comput. Geom., 37(2):301–320, 2007.
[15] Hidefumi Ohsugi and Takayuki Hibi. Special simplices and Gorenstein toric rings. J. Combin. Theory Ser. A, 113(4):718–
725, 2006.
[16] Sam Payne. Ehrhart series and lattice triangulations. Discrete Comput. Geom., 40(3):365–376, 2008.
[17] Richard P. Stanley. Decompositions of rational convex polytopes. Ann. Discrete Math., 6:333–342, 1980. Combinatorial
mathematics, optimal designs and their applications (Proc. Sympos. Combin. Math. and Optimal Design, Colorado State
Univ., Fort Collins, Colo., 1978).
24
BENJAMIN BRAUN, ROBERT DAVIS, AND LIAM SOLUS
[18] Richard P. Stanley. Log-concave and unimodal sequences in algebra, combinatorics, and geometry. In Graph theory and
its applications: East and West (Jinan, 1986), volume 576 of Ann. New York Acad. Sci., pages 500–535. New York Acad.
Sci., New York, 1989.
Department of Mathematics, University of Kentucky, Lexington, KY 40506–0027
E-mail address: benjamin.braun@uky.edu
Department of Mathematics, Michigan State University, East Lansing, MI 48824
E-mail address: davisr@math.msu.edu
Matematik, KTH, Stockholm, Sweden
E-mail address: solus@kth.se
| 0math.AC
|
Data-Driven Approximate Abstraction for Black-Box Piecewise Affine
Systems
arXiv:1801.09289v2 [cs.SY] 30 Jan 2018
Gang Chen and Zhaodan Kong
Abstract— How to effectively and reliably guarantee the
correct functioning of safety-critical cyber-physical systems in
uncertain conditions is a challenging problem. This paper
presents a data-driven algorithm to derive approximate abstractions for piecewise affine systems with unknown dynamics.
It advocates a significant shift from the current paradigm of
abstraction, which starts from a model with known dynamics.
Given a black-box system with unknown dynamics and a linear
temporal logic specification, the proposed algorithm is able to
obtain an abstraction of the system with an arbitrarily small
error and a bounded probability. The algorithm consists of
three components, system identification, system abstraction,
and active sampling. The effectiveness of the algorithm is
demonstrated by a case study with a soft robot.
I. I NTRODUCTION
The proliferation of cyber-physical systems (CPSs) brings
how to effectively and reliably guarantee their correct behaviors to the forefront of problems we as control engineers
need to address. One natural choice to attain correct functioning is to consider formal methods techniques, such as
model checking [1], [2], which have been successfully used
in the formal verification and synthesis of digital circuits
and software codes [3]. In recent years, we have seen
many efforts of extending formal methods to engineering
applications, e.g., automobiles [4], [5] and robotics [6], [7].
One crucial component of formal methods is a precise and
potentially concise mathematical model of the system under
investigation. However, in reality we rarely have full knowledge of complex CPSs during their design and even testing
phase. Thus how to attain formal guarantee for systems with
partially or fully unknown dynamics becomes a problem of
practical significance.
In this paper, we aim to address this problem in the
context of abstraction [1]. Given a system model T (which
can potentially have infinitely many states) and a formal
specification φ written, for instance, in linear temporal logic
(LTL), an abstract model of T is a simpler model T 0 ;
checking whether the simpler model T 0 satisfies φ suffices to
decide whether T satisfies φ [8], [9], [10], [11]. For systems
that can be described by discrete state models, abstraction
can be achieved by using the concepts of simulation and bisimulation [1], [2]. In control community, recently there have
been many successful efforts pertaining to the abstraction of
systems of more realistic dynamics, such as those that are
piecewise affine [12], [13], [14], [15]. All these studies, as
far as we know, assume models of known dynamics, which
Authors are with the Department of Mechanical and Aerospace Engineering, University of California, Davis. Z. Kong is the corresponding author
(email: zdkong@ucdavis.edu).
significantly impedes the application of abstraction in the
analysis and design of systems with inherent uncertainties,
e.g., those needing to interact with a variety of human users
and be deployed in a variety of environments.
One principle way of mitigating uncertainties is to utilize
machine learning techniques. Actually, the integration of formal methods and machine learning has shown great potential
in the formal specification, design, verification, and validation of CPS [16], [17], [18], [19], [20], [21]. In this paper, we
will focus on how to combine machine learning techniques,
particularly system identification and active learning, and
formal methods techniques to generate approximate abstractions for systems with black-box (unknown), piecewise affine
(PWA) dynamics. PWA models partition the state space into
a finite number of polyhedral regions and consider affine
dynamics in each region [22]. It has been shown that PWA
models can approximate nonlinear dynamics with arbitrary
accuracy [12]. Moreover, there exist efficient techniques for
the identification of PWA systems, e.g., optimization-based
methods and clustering-based methods [23].
The major contribution of this paper is that it addresses
many theoretical and algorithmic issues pertaining to the
integration of existing approximate abstraction techniques
[24] and system identification techniques [23]. Given a
system with unknown PWA dynamics, the paper shows that,
by following the algorithm prescribed in the paper, it is
possible to extract an abstract model with an arbitrarily small
error and a bounded probability (under certain mild assumptions). Even though the paper focuses on PWA systems, the
preliminary results obtained in it can potentially pave the
way for future developments for systems with more complex
dynamics.
The remainder of the paper is organized as follows.
In Section II, we provide preliminaries and notation used
throughout the paper. In Section III, we formally introduce
the abstraction problem that will be solved in the paper.
Section IV presents our data-driven approximate abstraction
algorithm, together with proofs demonstrating the effectiveness of our algorithm. Section V uses a soft robot system
as an example to showcase our proposed algorithm. We
conclude with final remarks in Section VI.
II. P RELIMINARIES AND N OTATION
A N dimensional polytope X is defined as the convex
hull of at least N + 1 affinely independent vectors in RN . A
complete partition of X is a set of open polytopes Xi , i ∈ I
(I is a finite index set) in RN such that Xi1 ∩ Xi2 = ∅
for all i1 , i2 ∈ I, i1 6= i2 and cl(X ) = ∪i∈I cl(Xi ), where
cl(Xi ) denotes the closure set of Xi . According to the Hrepresentation, each Xi , i ∈ I can be represented as Xi =
{x ∈ RN : Hi x ≺ Ki }, where ≺ denotes componentwise
inequality.
A piecewise affine (PWA) system [22] can be written as
follows:
xk+1
=
f (xk ) + e
A1 x + b1 if x ∈ X1
..
f (x) =
.
As x + bs if x ∈ Xs
(1)
where xk is the state of the system at step k; f : X → RN
is a PWA map; e ∈ N (0, σe2 ) is an independently, identically
distributed and zero mean Gaussian noise with standard
deviation σe ; s is the number of modes; Ai , bi are the
parameters of the i-th mode (Ai , i = 1, · · · , s is assumed
to be nonsingular in this paper); and all s modes together
constitute a complete partition of X .
A transition system is a tuple T = (Q, δ, O, o), where Q
is the state space; δ : Q → 2Q (2Q is the powerset of Q)
is a transition map assigning a state q ∈ Q to its next state
q 0 ∈ Q; O is the set of observations; and o : Q → O is
an observation map assigning each q ∈ Q an observation
o(q) ∈ O [1]. We denote a region of the state space as
P ⊂ Q. The embedding transition system of a PWA system
S described by Eqn. (1) is a tuple Te = (Qe , δe , Oe , oe ),
where Qe = ∪i∈I Xi ; δe : x → x0 iff there exists i ∈ I such
that the transition from x to x0 satisfies Eqn. (1); Oe = I;
and oe (x) = i iff x ∈ Xi [24].
For a transition system T , including embedding transition
systems of PWA systems, the successor of a region P ⊂ Q
is define as the set of states that can be reached from the
states in P in one step, i.e., P ost(P ) = {q ∈ Q | ∃p ∈
P with p → q}. The predecessor of a region P ⊂ Q can be
defined similarly as P re(P ) = {q ∈ Q | ∃q ∈ P with q →
p}. A state q ∈ Q is called reachable if there exists a finite
execution ending at q. We denote all the reachable states of
T by Reach(T ). Given an LTL formula φ over O and a
system T , if all the traces originating from a region P ⊂ Q
satisfy φ, then we denote the situation as T (P ) |= φ. Let
XTφ = {X ⊂ Q, T (X) |= φ} denote the largest region of T
from which all the traces satisfy φ [1].
The reachability metric over two transition systems T1 and
T2 is defined as [25]:
d(T1 , T2 ) = h(Reach(T1 ), Reach(T2 )),
where h is the Hausdorff distance. Given two transition
systems T1 and T2 with the same observation set O and
a reachability metric d defined over them, a relation Sσ ⊆
Q1 × Q2 is called a σ−approximate simulation relation of
T1 by T2 [25] if for all (q1 , q2 ) ∈ Sσ :
• d(o(q1 ), o(q2 )) ≤ σ,
0
0
• ∀q1 = P ost(q1 ), there exists q2 = P ost(q2 ), such that
0
0
(q1 , q2 ) ∈ Sσ .
Moreover, T1 is said to be σ−approximately simulated by
T2 , denoted T1 ≺σ T2 .
III. P ROBLEM S TATEMENT
Formally, in this paper, we wish to solve the following
problem:
Problem 1: Given a PWA system S with unknown dynamics, an LTL specification φ, and a bound σ > 0, find a
finite transition system T̂ such that p(T̂ ≺σ T ) > 1 − δ,
where p(.) stands for probability, T is the true abstract
transition system of S, and δ is bounded.
Remark 1: By unknown dynamics, we mean that the
following system characteristics are unknown: (i) the number
of modes, s, (ii) the parameters related to the dynamics of
each mode, {Ai , bi , i = 1, · · · , s}, (iii) the parameters related
to the partitions (regions) of the state space, {Hi , Ki , i =
1, · · · , s}, and (iv) the standard deviation of the Gaussian
noise, σe . But we assume that our algorithm, which will
be presented in the next section, can use the system as a
black-box simulator to generate samples. This is a reasonable
assumption since during system design and testing phases,
engineers can always get access to a full-scale system model,
a scaled system model, or a computer simulation to generate
samples [26], [21].
Remark 2: Notice that the requirement p(T̂ ≺σ T ) >
1 − δ is inspired by the concept of probably approximately
correct (PAC) models in machine learning [27]. It simply
says that the probability that the transition system T̂ (obtained by using our algorithm) is a σ-approximate simulation
by the PWA system S is higher than 1 − δ. In other words,
given a PWA system with unknown dynamics, we intend to
find out its approximate abstract transition system T̂ with a
high enough confidence.
IV. DATA -D RIVEN A BSTRACTION A LGORITHM
Black-Box PWA
System S
Sample Pairs (xi,yi)
System Identification
YES
Refine?
NO
LTL Formula φ
System Abstraction
NO
Active Sampling
YES
Terminated?
Abstraction T
Fig. 1: Architecture of our data-driven abstraction algorithm.
Fig. 1 illustrates the basic architecture of our data-driven
abstraction algorithm to solve Problem 1. The inputs of the
algorithm are a black-box PWA system S with unknown
dynamics and an LTL specification φ; the output of the
system is a transition system T . The algorithm can be
roughly divided into three components: system identification,
system abstraction, and active sampling. The goal of the
system identification component is to derive an estimated
PWA model Ŝ based on the data sampled from the black-box
system S (serving as a simulator); the goal of the system
abstraction component is to derive a transition system T
given the identified PWA model Ŝ and the specification
φ; one important procedure of the system identification
component is refinement, which refines the estimated model
Ŝ, until no significant improvement can be achieved, based
on the currently available data and the current abstraction
T ; finally, if no satisfactory abstraction T can be found
after the refinement, the active sampling component will be
implemented to draw new data points with the help of the
black-box simulator S.
In the following sub-sections, we will present each of the
three components. Proofs regarding the effectiveness of our
algorithm will be provided at the end of the section.
Algorithm 1: System Identification Initialization
Input : A bound σ̂, a set of samples
D := {(yk , xk )}, k ∈ {1, · · · , K}, a ratio
0 < r < 1, and a large number J
Output: Âi , b̂i , Di , Ĥi , K̂i , i = 1, · · · , s
1: Set l = 0 and I0 = {1, · · · , K};
2: for |Il+1 | ≥ rK do
3:
Randomly generate a set of parameters
{Aj , bj }, j ∈ {1, · · · , J};
4:
Construct sets
Σj = {k yk − (Aj xk + bj ) k≤ σ̂, k ∈ Il } for each
j ∈ {1, · · · , J};
5:
Set l = l + 1 and Σmax = argmaxJj=1 |Σj |;
6:
With Σmax , estimate Âl and b̂l by solving
|Σmax |
(Âl , b̂l ) = argmin
A,b
A. System Identification
Given a black-box PWA system S, or subsequently a set
of K samples D := {yk , xk }, k = 1, · · · , K, the system
identification component identifies a PWA model, specified
by the number of modes s as well as the mode parameters
Âi , b̂i , Ĥi and K̂i with i = 1, · · · , s. The problem itself is
a well-studied problem. Specifically, we need to find (i) a
minimum positive integer, s, (ii) a set of parameter matrices,
{Âi }si=1 and {Ĥi }si=1 , and (iii) a set of parameter vector
{b̂i }si=1 and {K̂i }si=1 (notice that {Ĥi }si=1 and {b̂i }si=1
together constitute a complete partition {Xi }si of the PWA
system’s state space S), such that the estimated parameters
are the solution of the following minimization problem:
(Âi , b̂i , Ĥi , K̂i ) =
K
1 X
c(yk − fˆ(xk )) (2)
(xk ,yk )∈(D∩Xi ) K
argmin
k=1
where fˆ(.) is specified by Âi , b̂i , Ĥi and K̂i , i = 1, · · · , s
and c is a given penalty function, which is chosen to be
c(·) = || · ||2 in this paper. Notice that solving the identification problem involves the simultaneous solving of two subproblems, data classification and parameter estimation. Once
the data points have been classified into clusters {Di }si=1
such that (yk , xk ) ∈ Di , i.e., (yk , xk ) is attributed to the ith mode, mode parameters Âi , b̂i , Ĥi and K̂i can be easily
estimated by solving Eqn. (2).
Our system identification component is modified from the
method proposed in [22]. It consists of two main procedures:
initialization and refinement. One major difference between
our method and the one in [22] is that we utilize the current
abstract transition system to guide the refinement.
1) Initialization: The pseudo code of the initialization
procedure is shown in Alg. 1. The steps are rather selfexplanatory. Here we would like to provide a few simple
comments for clarification. We need to randomly generate
a matrix Âj and a vector b̂j (Line 3) in each loop, which
is quite inefficient; thus the termination condition |Il+1 | ≥
rK (Line 2) can be set loosely, i.e., with a rather large
r. Such a practice is reasonable, given the fact that the
initialization procedure is only meant to generate some good
X
c(yk − (Axk + b));
k=1
Set Dl = {k ∈ Il :k yk − (Âl xk + b̂l ) k≤ σ̂} and
Il+1 = Il \ Dl ;
8: Find boundaries specified by {Ĥ}li=1 and {K̂}li=1
between sets {Di }li=1 ; set s = l.
7:
enough partitions (modes), which will be further refined in
the refinement procedure. As for the boundaries specified
by {Ĥ}li=1 and {K̂}li=1 between sets {Di }li=1 (Line 8),
standard support vector machines (SVM) regression methods
[28] can be used to compute them.
2) Refinement: Given the random nature of the way
Âi , b̂i , i = 1, · · · , s are generated in Alg. 1, it is quite
unlikely that we are able to identify all the correct modes
with the initialization procedure. Potentially there are two
main issues:
• Undecidable data points: these are the data points that
belong to more than one mode, i.e., they satisfy k yk −
(Âi xk + b̂i ) k≤ σ̂ for more that one i = 1, · · · , s;
• Unfeasible data points: these are the data points that
don’t belong to any mode, i.e., there is no i = 1, · · · , s
such that k yk − (Âi xk + b̂i ) k≤ σ̂.
We refine the identified system model by eliminating these
two types of data points as follows:
For undecidable points, we can reassign them based on
their maximum likelihood with respect to all modes, i.e., we
assign each undecidable point (xk , yk ) to the optimal mode
according to the following rule:
CR(k) = argmax CC(xk , yk )i /CC(xk , yk ),
(3)
i=1,··· ,s
where CC(xk , yk ) is the total number of data points that
are within D and inside the hyper ball region centered at
(xk , yk ) and with a predefined radius ρ, and CC(xk , yk )i is
the number of data points that are in CC(xk , yk ) and belong
to mode i.
For unfeasible points, given the current abstract transition
system T , we discard those points that meet the following
simply using the definition of embedding transition system.
Third, an observation map oe is created by partitioning the
state space of the system Te into uniform grids. Fourth, given
the system Te , the observation map oe , and the LTL formula
φ (or its corresponding Buchi automaton Bφ ), an initial
transition system T0 is constructed by following standard
abstraction procedures, such as those prescribed in [1]. Fifth,
a product automaton P is constructed as P = T0 × Bφ ,
which concerns both the initial transition system T0 and
the specification φ. The product automaton is a tuple P =
(Sp , Sp0 , δp , Fp ), where Sp is the set of states, Sp0 is the
set of initial states, δp is the transition map, and Fp is the
acceptance condition. Finally, refinement is conducted by
solving a deterministic Rabin game.
Algorithm 2: System Identification Refinement
Input : Current abstract transition system T ,
parameters Âi , b̂i , Di , Ĥi , K̂i , i = 1, · · · , s
obtained in Alg. 1, and a bound σ̂
Output: Âi , b̂i , Ĥi , K̂i , i = 1, · · · , s
Set β ≥ 0, µ ≥ 0, κ ≥ 0, 0 < θ < 1, l = 1;
while Not terminated do
1: Compute (i∗ , j ∗ ) = argmin1≤i<j≤s βi,j with
βi,j =k Âi − Âj k;
2: if βi∗ ,j ∗ ≤ θ t β then
3:
Merge modes i∗ and j ∗ ; Set s = s − 1;
4:
Recompute Di∗ = {k ∈ {1, · · · , K} :
k yk − (Âi∗ xk + b̂i∗ ) k≤ σ̂};
5: Use CR() and rule Dis() to reassign points;
/ ∗ CR() and Dis() are defined in the text as
Eqn. (3) and Eqn. (4), respectively∗/
6: Compute i∗ = argmini=1,··· ,s |Di |/|D|;
7: if |Di |/|D| ≤ θ t µ then
8:
Discard mode i∗ ; let s = s − 1;
9:
Go to Step 4;
s
10: Store {Âi }si=1 as {Âold
i }i=1 ;
11: Update Âi , b̂i , Ĥi , K̂i with new {Di }si=1 ;
12: if k Âi − Âold
k≤ κ then
i
13:
Terminated.
14: else
15:
l = l + 1;
end
Algorithm 3: System Abstraction Refinement
Input : Current abstract transition system T , current
product automaton P, an initial state q of T ,
and a ratio 0 < η < 1
Output: Refined abstract transition system T̂ and
refined product automaton P̂
Initialize T̂ = T , P̂ = P, and Su = ∅;
while |Su | ≥ η|Q| do
1:
2:
3:
4:
5:
6:
condition:
Dis(k)
= {(xk , yk ) ∈ D|d(yk , o−1 (P ost(o(xk )))) ≥ σ̂},
(4)
where d(., .) is the Hausdorff distance, o(xk ) maps a continuous state xk to a discrete state of the transition system T (it
would be helpful for the readers to review the definitions in
Section II), P ost(o(xk )) maps the region corresponding to
o(xk ) to its successor region, and finally o−1 (P ost(o(xk ))))
finds the set of continuous, PWA states corresponding to the
region P ost(o(xk )). The remaining unfeasible data points
are reassigned according to the rule CR(·) (Eqn. (3)). The
pseudo code of the whole refinement procedure is shown in
Alg. 2.
B. System Abstraction
Given an estimated PWA model Ŝ (or fˆ), parameterized
by Âi , b̂i , Ĥi and K̂i with i = 1, · · · , s, and an LTL
formula φ, the goal of the system abstraction component is
to generate a good enough abstraction T . We roughly follow
the approximate abstraction procedures described in [24] to
design and implement the system abstraction component.
Here we are just going to provide a rough outline of the
abstraction algorithm. Interested readers can refer to [24] for
more details. First, a deterministic Buchi automaton Bφ is
constructed from the formula φ. Second, the corresponding
embedding transition system Te is constructed for Ŝ by
7:
8:
9:
10:
11:
Compute S> and S⊥ for P̂;
Set Su := Pp \ (S> ∪ S⊥ );
/∗See text for the definitions of S> , S⊥ ,
and Su ∗ /
for all (q, g) ∈ Su do
if q ∈ Su then
Set q := q;
for all (∃qr ∈ q, q 0 ∈ P ost(qr ) and
(qr ∩ P re(q 0 )) 6= ∅) do
Construct states q1 , q2 such that
q1 := qr ∩ P re(q 0 ),
q2 := qr \ P re(q 0 );
q := (q \ qr ) ∪ {q1 , q2 };
q := q;
Update δ and o for T̂ ;
Update P̂ and T̂ .
end
The pseudo code of the abstraction refinement procedure is
shown in Alg. 3. Given the current abstract transition system
T and the current product automaton P, a state q ∈ Q of T
falls into one of the following three categories:
• S> : the set of states from which all traces are accepted
by P,
• S⊥ : the set of states from which no trace is accepted
by P,
• Su : the set of states from which some but not all traces
are accepted by P.
The goal of the refinement is thus to eliminate Su . This leads
to the termination condition of the refinement procedure as
|Su | < r|Q|, i.e., the refinement will be terminated once the
volume of Su , |Su |, is smaller than a fraction r (specified
by the user) of the volume of Q (the state space of T ).
C. Active Sampling
The system identification component and the system abstraction component described in the last two sub-sections
are based on a fixed data set D := {(yk , xk )}K
k=1 . It is
quite obvious that the quality of the system identification
and the system abstraction depends on the quality of the data
set. To improve the quality of the system identification (in
other words, to decrease the number of data points needed
for the system identification), we use an active learning
algorithm developed by our group [29] to sample high quality
(or “informative”) data points for the system identification
component after the initial round (see Fig. 1).
The strategy to find the next data point to sample for round
t + 1 has two steps. In the first step, the best candidate for
each mode is identified as follows:
1/2
xi := argmax(Ψi,t (x) + λt %i,t (x))
(5)
x∈X̂i
where Ψi,t (x) is the Gaussian process regression mean of the
prediction error defined over the data points in Di , %i,t (x)
is the Gaussian process regression variance of the prediction
error defined over the data points in Di , and λt is a regularization factor. In the second step, the active learning algorithm chooses mode i∗ = argmini=1,··· ,s (maxx∈X̂i Ψi,t (x))
and the corresponding best candidate xi∗ to sample.
second condition in the definition of approximate relation is
satisfied. Therefore, T̂ ≺ε T .
Lemma 2: Given an estimation fˆ(.) (or Ŝ) of the PWA
system f (.) (or S), if k fˆ(x) − y k≤ η1 holds with
probability > 1 − α1 , where α1 ∈ (0, 1), η1 > 0, then
the system abstraction component described in Section IVB can derive an abstract transition system T̂ such that it
is (η1 + ε)−approximately simulated by the real abstract
transition system with a probability greater than 1 − α1 .
Proof: Here for the sake of clarify, the notations in
this proof that are slightly different from the ones used
in the other parts of the paper. Let’s use f and fˆ to
denote the real and estimated dynamics of the PWA system,
respectively. Moreover, let’s call their true abstract transition
systems as Treal and T̂real , respectively. Finally, let’s call the
approximate abstract transition systems obtained by using
the system abstraction component described in Section IVB as Tapp and T̂app , respectively. According to Lemma
1, we have Tapp ≺ε Treal and T̂app ≺ε T̂true . Then set
k eB k=k fˆ(x) − y k≤ η1 , such that y = fˆ(x) + y − fˆ(x) =
fˆ(x) + eB , which can be seen a PWA system with bounded
noise, following [24], we have T̂real ≺η1 Treal . Since the
relationship ≺. is transitive, we have T̂app ≺η1 +ε Treal . The
conclusion regarding probability follows easily.
Lemma 3: Provided with Assumption 1, k fˆ(x) − y k≤
η2 holds with
≥ 1 − α2 , where α2 = 1 −
R η2 probability
2
√ 1
exp(−υ
/(2(σ
e + C)))dυ.
−η2
2π(σe +C)
D. Theoretical Results Regarding the Effectiveness of Our
Algorithm
We add the following assumption regarding the performance of the PWA system identification.
Assumption 1: Assume the prediction error of the system
identification component described in Section IV-A can be
characterized by a zero mean Gaussian with a bounded
variance, i.e., f (x) − fˆ(x) ∼ N (0, σp (x)2 ) and σp (x) ≤ C,
where f (x) is the real PWA dynamics and fˆ(x) is the
estimated PWA dynamics.
Remark 3: The system identification of PWA system is
still an open problem and has been proven to be NP-hard
[30], [31]. In [22], the authors were able to demonstrate that,
for a fixed data set, the error is bounded, i.e., |f (x)− fˆ(x)| <
σ for any σ > 0. Thus, we believe our assumption here, even
though unproven, is still reasonable.
We have the following three lemmas regarding the integration of identification and abstraction (without active sampling
in the loop).
Lemma 1: Given a PWA system S with known dynamics,
for any bound ε > 0, Alg.3 can derive an abstract transition
system T̂ that is ε−approximately simulated by the real
abstract transition system T of S, i.e., T̂ ≺ε T .
Proof:
Consider a relationship V (q1 , q2 )
=
{(q1 , q2 )|d(q1 , q2 ) ≤ ε}, and set r|Q| ≤ ε. As (q1 , q2 ) ∈ V
implies d(q1 , q2 ) ≤ ε, the first condition in the definition of
approximate relation is satisfied. Then for all d(q1 , q2 ) < ε,
the conclusion in [24] shows that the result of Alg.3 can
guarantee that d(P ost(q1 ), P ost(q2 )) ≤ |Su | ≤ ε. Then the
Proof: Set eT := y− fˆ(x) = f (x)+e− fˆ(x), where e is
the true Gaussian noise, e ∼ N (0, σe2 ). Since f (x) − fˆ(x) ∼
N (0, σp (x)2 ), we have eT ∼ N (0, σp2 +σe2 ). The probability
that k fˆ(x) − y k≤ η2 can then be computed. When σp = C,
the probability reach
value, such that α2 =
R η2 the minimum
2
1− √ 1
exp(−υ
/(2(σ
+ C)))dυ.
e
−η2
2π(σe +C)
We have the following two lemmas regarding the performance of our active sampling component.
Lemma 4: For any ρ ∈ (0, 1), if λt = 2B +
300γt log3 (t/ρ), where γt is the maximum information gain
defined in [29], then
1/2
k Ψi,t (x) k≤ λt %i,t (x)
(6)
holds with probability > 1 − ρ.
Proof: The lemma can be proved by following similar
steps as the proof of Lemma 2 in [29].
Lemma 5: For any σ > 0, if λt = 2B + 300γt log3 (t/ρ),
where t is the number of points in Di , then there exists
t ≤ T,
1/2
λt %i,t (x) ≤ σ, ∀x ∈ Di
(7)
holds with finite number of sample time T .
Proof: According to Theorem 5 in [32], for any
bounded Xi ⊂ X , the information gain for exponential kernel is γT = O((logT )d+1 ), where d is
the
of X . Lemma 7.1 in [32] shows that
PT dimension
2α
−2 2
min{σ
%
i,t−1 (x), α} ≤ log(1+α) γT , ∀α > 0. As the
t=1
information gain γT is convergent, such that the variance
%i,t (x) will be convergent to zero. As λt is bounded,
1/2
λt %t (x) will be convergent to zero, then the lemma has
been proved.
Finally, we can prove that the algorithm presented in this
paper can solve Problem 1 with the relatively moderate
Assumption 1.
Theorem 1: Given a PWA system S with unknown dynamics, for any σ > ε > 0, the algorithm described in
this paper (with the assumption that the standard deviation
of the prediction error for the system identification component is bounded by C) can obtain an approximate abstract
transition system T̂ that is σ-approximately simulated by
the true abstract transition system T of S with a bounded
probability Rthat is greater than 1 − δ, where δ = 1 −
σ−ε
√ 1
exp(−υ 2 /(2(σe + C)))dυ.
−σ+ε
2π(σe +C)
Proof: Set δ = α2 and η2 = σ − ε. According to
Lemma 3, Lemma 4, and Lemma 5, the system identification
component together with the active sampling component can
achieve an estimation k fˆ(x) − y k≤ η2 with probability
> 1 − α2 . Then with this estimation result, according to
Lemma 1 and Lemma 2, the system abstraction component
can generate an abstract transition system T̂ that is (η2 +
ε)−approximately simulated by the real abstract transition
system T with probability > 1 − δ.
V. C ASE S TUDY
In this section, we will use a soft robot driven by series
pneumatic artificial muscles as an example to demonstrate
our algorithm.
A. Model and LTL Specification
Fig. 2: (a) Geometrical model of the soft robot driven by
series pneumatic artificial muscles (sPAM) used in the case
study. (b) Simplified planar robot with x = (x(1), x(2))T as
the coordinate vector of the moving platform.
In this case study, we will focus on a particular type of
soft robots, those that are driven by series pneumatic artificial
muscles (sPAM) [33]. Fig. 2 shows an example of such a
robot. It has two polyethylene tubing sPAMs, each of which
is controlled by a corresponding actuator with pressurized
air. Even though the dynamics of such a robot is nonlinear,
in [34], the authors have shown that its closed-loop behavior
can be approximated by piecewise affine dynamics. Here let’s
assume that the robot under investigation has dynamics as
follows:
xk+1 = f (xk ) + e
(8)
and
1
0
x if 0 ≤ xk (1) ≤ 0.3
0 0.98
f (x) =
0.83 0.12
0.01
x
+
if xk (1) ≥ 0.3
0.12 0.81
0.03
where x = (x(1), x(2))T is the coordinate of the moving
platform and e is a Gaussian noise with a zero mean and a
standard deviation of 0.1. Please keep in mind that the model
is unknown to our algorithm but the model itself can be used
by our algorithm as a simulator to generate samples.
The specification that needs to be verified is written as
an LTL formula φ := (π1 ∧ ♦π2 ), where “π1 := x(1) is
below 0.3", “π2 := x(2) is above 0.6", and is the temporal
operator “Always”, ♦ is the temporal operator “Eventually”.
Put together, φ specifies that “it should always be true that
x(1) is below 0.3 and eventually x(2) is above 0.6”.
B. Implementation Results
The algorithm proposed in this paper is implemented as a
Matlab tool. The tool takes an LTL formula and a black-box
PWA system as inputs and it outputs an abstract transition
system. The active learning used in the tool is the Gaussian
Process Adaptive Confidence Bound (GP-ACB) algorithm
proposed and implemented by our group in [29]. Moreover,
a Gaussian kernel function is used in GP-ACB. In order to
demonstrate the effectiveness of our algorithm, here we will
provide two sets of implementation results, one regarding the
system identification component and the other one regarding
the entire algorithm.
1) Performance of the System Identification Component:
Here we compare the performance of our system identification component with an existing state-of-the-art black-box
system identification tool called the Hybrid Identification
Tool (HIT) [35]. One thing we would like to point out here
is that the evaluation of our system identification component
is conducted in conjunction with other components, e.g.,
abstraction and active sampling, in the loop. It should be
expected that, at worst, our component should have the
same performance as the HIT. However, it may also be
expected that factors such as active-learning based sampling
and abstraction-guided refinement can potentially improve
the identification performance, which turns out to be the case,
at least for this particular case study.
We use two metrics to quantify system identification
errors: parameter estimation error and region estimation
error. Given the parameters of a real PWA model (unknown
to the investigated algorithms), the parameter estimation
error is the sum of the Euclidean distances between the real
parameters and the estimated parameters. The region estimation error is defined the sum of the following Hausdorff
distance:
e(X̂i , Xi ) = max{ sup inf d(x, y), sup inf d(x, y)},
x∈Xi y∈X̂i
y∈X̂i
x∈Xi
(a)
(b)
Fig. 3: Comparison results of the system identification component used in this paper (green) and the HIT algorithm
(red): (a) Average parameter estimation error with respect
to the number of samples; (b) Average region (partition)
estimation error with respect to the number of samples.
where e(X̂i , Xi ) the region estimation error related to the
ith mode with Xi as the real region or partition and X̂i
as the estimated one, d(x, y) is the Euclidean distance
between x and y, and sup and inf stand for supremum and
infimum, respectively. To calculate the Hausdorff distance,
we randomly generate 100 samples inside the state space X̂i
and the state space Xi .
The comparison results based on 5 trials are shown in Fig.
3. It shows that, averagely speaking, the system identification
component proposed in this paper has a comparable or
better performance than HIT. Particularly, Fig. 3b shows
that our algorithm has a faster convergent rate regarding
the region estimation error. This is probably due to the fact
that, generally speaking, active learning, which is used in our
algorithm, out-performs its randomly sampling counterpart,
which is used in HIT.
2) Performance of the Entire Algorithm: As the true
abstract transition system of the system, described by Eqn.
(8), is unknown, here we use the abstract transition system
obtained by using the algorithm proposed in [24] as a
benchmark. We will call this abstract transition system as
T ∗ . In [24], the authors have shown that even though their
algorithm cannot attain the true abstract transition system, it
still can get an abstract transition system that is arbitrarily
close to the real one. Of course, we should point out that, in
order to get this abstract transition system T ∗ , the algorithm
in [24] should have access to the system model, i.e., T ∗
is generated with a known model. In parallel, we run our
algorithm to extract an abstract transition system T̂ without
access to the dynamics of the model, i.e., T̂ is generated
with a black-box system with unknown dynamics. Then in
order to demonstrate the effectiveness of our algorithm, we
need to show that T̂ should approach T ∗ . This turns out to
be the case, at least for this particular case study.
Based on the system dynamics, Eqn. (8), and the LTL
specification φ, we implement the abstraction algorithm
proposed in [24] and obtain an abstract transition system
T ∗ , which will be used as a benchmark. Then the algorithm
proposed in this paper is applied to the same system, but with
unknown dynamics, and the same LTL specification. The
output of the algorithm is another abstract transition system
T̂ . Here we use a metric that is inspired by the concept of
approximate simulation to quantify the difference between
the two transition systems. To be more specific, we set the
abstraction error to σ if T ∗ is σ−approximately simulated by
T̂ . Moreover, the metric σ is normalized to σ̄ by the volume
of the state space, i.e., σ̄ := σ/|X |.
TABLE I: Comparison result with respect to different number
of samples and a fixed number of refinement steps, which is
set to 20.
σ̄
Number of samples
20
40
60
0.046
0.042
0.035
TABLE II: Comparison result with respect to different number of refinement steps and a fixed number of samples in
active sampling component, which is set to 10.
σ̄
Refinement Steps
5
10
20
0.077
0.068
0.050
The comparison results are shown in Table I and Table II.
Table I shows the comparison results with respect to different
number of samples and a fixed number of refinement steps in
the system abstraction component. Table II shows the comparison results with respect to different number of refinement
steps and a fixed number of samples in the active sampling
component. The tables show the average normalized errors σ̄
based on 5 trials. The results show that the larger the number
of refinement steps, the smaller the abstraction error; and the
larger the number of samples, the smaller the abstraction
error. The results also show that, even with a black-box
system, our algorithm can attain an approximate abstract
transition system T̂ that is close to the benchmark abstract
transition system T ∗ .
Fig. 4: State space partitions of the abstract transition system
obtained by using our algorithm for the case study. The
number of refinement steps and the number of samples in
the active sampling component are both set at 20.
VI. C ONCLUSIONS
In this paper, we proposed a data-driven approximate
abstraction algorithm for piecewise affine systems with unknown dynamics. We demonstrated both theoretically and
empirically that given a black-box PWA system and an LTL
specification, we were able to derive an abstract transition
system that is approximately simulated by the true abstract
transition system. We demonstrated the effectiveness of our
proposed algorithm with a soft robot as a case study.
ACKNOWLEDGMENTS
This work was partially supported by the Hyundai Motor
Company.
R EFERENCES
[1] C. Baier, J.-P. Katoen, and K. G. Larsen, Principles of model checking.
MIT press, 2008.
[2] R. Alur, Principles of cyber-physical systems. MIT Press, 2015.
[3] D. A. Peled, Software reliability methods.
Springer Science &
Business Media, 2013.
[4] M. Kamali, L. A. Dennis, O. McAree, M. Fisher, and S. M. Veres,
“Formal verification of autonomous vehicle platooning,” Science of
Computer Programming, 2017.
[5] H. Abbas, B. Hoxha, G. Fainekos, and K. Ueda, “Robustness-guided
temporal logic testing and verification for stochastic cyber-physical
systems,” in Cyber Technology in Automation, Control, and Intelligent
Systems (CYBER), 2014 IEEE 4th Annual International Conference
on. IEEE, 2014, pp. 1–6.
[6] Y. K. Lopes, S. M. Trenkwalder, A. B. Leal, T. J. Dodd, and
R. Groß, “Supervisory control theory applied to swarm robotics,”
Swarm Intelligence, vol. 10, no. 1, pp. 65–97, 2016.
[7] A. Ulusoy, T. Wongpiromsarn, and C. Belta, “Incremental controller
synthesis in probabilistic environments with temporal logic constraints,” The International Journal of Robotics Research, vol. 33,
no. 8, pp. 1130–1144, 2014.
[8] A. Girard, G. Pola, and P. Tabuada, “Approximately bisimilar symbolic
models for incrementally stable switched systems,” IEEE Transactions
on Automatic Control, vol. 55, no. 1, pp. 116–126, 2010.
[9] E. Haghverdi, P. Tabuada, and G. J. Pappas, “Bisimulation relations
for dynamical, control, and hybrid systems,” Theoretical Computer
Science, vol. 342, no. 2-3, pp. 229–261, 2005.
[10] P. Prabhakar, G. Dullerud, and M. Viswanathan, “Stability preserving
simulations and bisimulations for hybrid systems,” IEEE Transactions
on Automatic Control, vol. 60, no. 12, pp. 3210–3225, 2015.
[11] G. Pola, P. Pepe, and M. D. Di Benedetto, “Symbolic models for timevarying time-delay systems via alternating approximate bisimulation,”
International Journal of Robust and Nonlinear Control, vol. 25, no. 14,
pp. 2328–2347, 2015.
[12] B. Yordanov, J. Tumova, I. Cerna, J. Barnat, and C. Belta, “Temporal
logic control of discrete-time piecewise affine systems,” IEEE Transactions on Automatic Control, vol. 57, no. 6, pp. 1491–1504, 2012.
[13] E. A. Gol, X. Ding, M. Lazar, and C. Belta, “Finite bisimulations for
switched linear systems,” IEEE Transactions on Automatic Control,
vol. 59, no. 12, pp. 3122–3134, 2014.
[14] J. A. DeCastro, V. Raman, and H. Kress-Gazit, “Dynamics-driven
adaptive abstraction for reactive high-level mission and motion planning,” in Robotics and Automation (ICRA), 2015 IEEE International
Conference on. IEEE, 2015, pp. 369–376.
[15] G. Pola and M. D. Di Benedetto, “Symbolic models and control of
discrete-time piecewise affine systems: An approximate simulation
approach,” IEEE Transactions on Automatic Control, vol. 59, no. 1,
pp. 175–180, 2014.
[16] T. Dreossi, A. Donzé, and S. A. Seshia, “Compositional falsification
of cyber-physical systems with machine learning components,” arXiv
preprint arXiv:1703.00978, 2017.
[17] K. Urayama, M. C. Fu, and S. I. Marcus, “Simulation-based work load
and job release control for semiconductor manufacturing,” in Decision
and Control (CDC), 2015 IEEE 54th Annual Conference on. IEEE,
2015, pp. 7329–7334.
[18] S. A. Seshia, S. Hu, W. Li, and Q. Zhu, “Design automation of cyberphysical systems: Challenges, advances, and opportunities,” IEEE
Transactions on Computer-Aided Design of Integrated Circuits and
Systems, 2016.
[19] S. Haesaert, A. Abate, and P. M. Van den Hof, “Data-driven and
model-based verification: A bayesian identification approach,” in Decision and Control (CDC), 2015 IEEE 54th Annual Conference on.
IEEE, 2015, pp. 6830–6835.
[20] A. Kozarev, J. Quindlen, J. How, and U. Topcu, “Case studies in
data-driven verification of dynamical systems,” in Proceedings of the
19th International Conference on Hybrid Systems: Computation and
Control. ACM, 2016, pp. 81–86.
[21] Z. Kong, A. Jones, and C. Belta, “Temporal logics for learning and
detection of anomalous behavior,” IEEE Transactions on Automatic
Control, vol. 62, no. 3, pp. 1210–1222, 2017.
[22] A. Bemporad, A. Garulli, S. Paoletti, and A. Vicino, “A bounded-error
approach to piecewise affine system identification,” IEEE Transactions
on Automatic Control, vol. 50, no. 10, pp. 1567–1580, 2005.
[23] A. Garulli, S. Paoletti, and A. Vicino, “A survey on switched and
piecewise affine system identification,” IFAC Proceedings Volumes,
vol. 45, no. 16, pp. 344–355, 2012.
[24] B. Yordanov, J. Tumova, I. Cerna, J. Barnat, and C. Belta, “Formal
analysis of piecewise affine systems through formula-guided refinement,” Automatica, vol. 49, no. 1, pp. 261–266, 2013.
[25] A. Girard and G. J. Pappas, “Approximation metrics for discrete
and continuous systems,” IEEE Transactions on Automatic Control,
vol. 52, no. 5, pp. 782–798, 2007.
[26] X. Jin, A. Donzé, J. V. Deshmukh, and S. A. Seshia, “Mining
requirements from closed-loop control models,” IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems, vol. 34,
no. 11, pp. 1704–1717, 2015.
[27] L. Valiant, Probably Approximately Correct: Nature’s Algorithms for
Learning and Prospering in a Complex World. Basic Books (AZ),
2013.
[28] C. Cortes and V. Vapnik, “Support-vector networks,” Machine learning, vol. 20, no. 3, pp. 273–297, 1995.
[29] G. Chen, Z. Sabato, and Z. Kong, “Active learning based requirement
mining for cyber-physical systems,” in Decision and Control (CDC),
2016 IEEE 55th Conference on. IEEE, 2016, pp. 4586–4593.
[30] L. Ljung, “Perspectives on system identification,” Annual Reviews in
Control, vol. 34, no. 1, pp. 1–12, 2010.
[31] F. Lauer, “On the complexity of piecewise affine system identification,”
Automatica, vol. 62, pp. 148–153, 2015.
[32] N. Srinivas, A. Krause, S. M. Kakade, and M. Seeger, “Gaussian
process optimization in the bandit setting: No regret and experimental
design,” arXiv preprint arXiv:0912.3995, 2009.
[33] F. Daerden and D. Lefeber, “The concept and design of pleated
pneumatic artificial muscles,” International Journal of Fluid Power,
vol. 2, no. 3, pp. 41–50, 2001.
[34] G. Andrikopoulos, G. Nikolakopoulos, I. Arvanitakis, and S. Manesis,
“Piecewise affine modeling and constrained optimal control for a pneumatic artificial muscle,” IEEE Transactions on Industrial Electronics,
vol. 61, no. 2, pp. 904–916, 2014.
[35] G. Ferrari-Trecate, “Hybrid identification Toolbox (HIT),” 2005.
| 3cs.SY
|
arXiv:1512.08452v1 [math.RA] 28 Dec 2015
Typical ranks for 3-tensors, nonsingular bilinear maps and
determinantal ideals
Toshio Sumi, Mitsuhiro Miyazaki and Toshio Sakata
Abstract
Let m, n ≥ 3, (m − 1)(n − 1) + 2 ≤ p ≤ mn, and u = mn − p. The set Ru×n×m of
all real tensors with size u × n × m is one to one corresponding to the set of bilinear maps
Rm × Rn → Ru . We show that Rm×n×p has plural typical ranks p and p + 1 if and only if
there exists a nonsingular bilinear map Rm × Rn → Ru . We show that there is a dense open
subset O of Ru×n×m such that for any Y ∈ O, the ideal of maximal minors of a matrix defined
by Y in a certain way is a prime ideal and the real radical of that is the irrelevant maximal
ideal if that is not a real prime ideal. Further, we show that there is a dense open subset T of
Rn×p×m and continuous surjective open maps ν : O → Ru×p and σ : T → Ru×p , where Ru×p
is the set of u × p matrices with entries in R, such that if ν(Y ) = σ(T ), then rank T = p if and
only if the ideal of maximal minors of the matrix defined by Y is a real prime ideal.
1
Introduction
For positive integers m, n, and p, we consider an m × n × p tensor which is an element of the tensor
product of Rm , Rn , and Rp with standard basis. This tensor can be identified with a 3-way array
(aijk ) where 1 ≤ i ≤ m, 1 ≤ j ≤ n and 1 ≤ k ≤ p. We denote by Rm×n×p the set of all m × n × p
tensors. This set is a topological space with Euclidean topology. Hitchcock [15] defined the rank
of a tensor. An integer r is called a typical rank of Rm×n×p if the set of tensors with rank r is a
semi-algebraic set of dimension mnp. In the other words, r is a typical rank of Rm×n×p if the set
of tensors with rank r contains an open set of Rm×n×p . In this paper we discuss the typical ranks
of 3-tensors and connect between plurality of typical ranks and existence of a nonsingular bilinear
map.
Let n ≤ p. A typical rank of R1×n×p is equal to an n × p matrix full rank, that is, n. If n ≥ 2,
then the set of typical ranks of R2×n×p is equal to {n, n + 1} if n = p and otherwise min{p, 2n}
[36]. This is also obtained from the equivalent class: almost all 2 × n × p tensors are equivalent to
((En , On×(p−n) ); (On×(p−n) , En )) which has rank min{p, 2n} if n < p (see [18] or [32]), see Section 2
for notation. Suppose that n ≥ m ≥ 3. The set of typical ranks of Rm×n×p is equal to min{p, mn}
if (m − 1)n < p [35]. If p = (m − 1)n then the set of typical ranks of Rm×n×p depends on the
existence of a nonsingular bilinear map Rm × Rn → Rn : It is equal to {p} if there is no nonsingular
bilinear map Rm × Rn → Rn and {p, p + 1} otherwise [33]. Here, a bilinear map f : Rm × Rn → Rr
is called nonsingular if f (x, y) = 0 implies x = 0 or y = 0.
Suppose that (m − 1)(n − 1) + 1 ≤ p ≤ (m − 1)n. A typical rank of Rm×n×p is unknown
except a few cases. First, p is a minimal typical rank, since p is a generic rank of Cm×n×p [5]. The
authors [34] showed that the Hurwitz-Radon function gives a condition that Rm×n×(m−1)n has
1
plural typical ranks. We [24] also showed that Rm×n×p has plural typical ranks for some (m, n, p)
by using the concept of absolutely full column rank tensors. We let m#n be the minimal integer
r such that there is a nonsingular bilinear map Rm × Rn → Rr . Then m#n ≤ m + n − 1 (see
Section 2). The set Rr×m×n of r × m × n tensors is one to one corresponding to the set of bilinear
maps Rm × Rn → Rr . By this map the set of absolutely full column rank tensors is one to one
corresponding to the set of nonsingular bilinear maps.
Theorem 1.1 Let m, n ≥ 3 and (m − 1)(n − 1) + 1 ≤ p ≤ mn.
(1) If there exists a nonsingular bilinear map Rm ×Rn → Rmn−p , then Rm×n×p has plural typical
ranks.
(2) If p ≥ (m − 1)(n − 1) + 2 and Rm×n×p has plural typical ranks, then there exists a nonsingular
bilinear map Rm × Rn → Rmn−p .
(1) of Theorem 1.1 is an extension of one of [24]. Furthermore, we completely determine the
set trank(m, n, p) of typical ranks of Rm×n×p for p≥(m − 1)(n − 1) + 2 by the number m#n.
Theorem 1.2 Let m, n ≥ 3, k ≥ 2, and p = (m − 1)(n − 1) + k. The set of typical ranks of
Rm×n×p is given as follows.
{p, p + 1}, 2 ≤ k ≤ m + n − 1 − (m#n)
trank(m, n, p) = {p},
max{2, (m + n) − (m#n)} ≤ k ≤ m + n − 2
{mn},
k ≥ m + n − 1.
Consider the case where p = (m − 1)(n − 1) + 1, Friedland [12] showed that Rn×n×((n−1)
has plural typical ranks. We extend this result.
2
+1)
Theorem 1.3 Let m, n ≥ 3 and p = (m − 1)(n − 1) + 1. Rm×n×p has plural typical ranks if m − 1
and n − 1 are not bit-disjoint.
This article is organized as follows. Sections 2–7 are preparation to show the above theorems.
In Section 2, we set notations and discuss the number m#n. In Section 3, we study absolutely
full column rank tensors. Since the set of absolutely full column rank tensors is an open set, there
exists a special form of an absolutely full column rank tensor if an absolutely full column rank
tensor exists. In Section 4, we state the other notions and deal with ideals of minors of matrices.
Theorem 4.31 in Section 4 which corresponds with the real radical ideals is quite interesting in its
own right. We show that for integers with 0 < t ≤ min{u, n} and m ≥ (u−t+1)(n−t+1)+2, there
exist open subsets O1 and O2 of Ru×n×m such that the union of them is dense, I(V(It (M (x, Y )))) =
It (M (x, Y )) for Y ∈ O1 and I(V(It (M (x, Y )))) = (x1 , . . . , xm ) for Y ∈PO2 , where It (M (x, Y ))
is the ideal generated by all t-minors of the u × n matrix M (x, Y ) = m
k=1 xk Yk given by the
indeterminates x1 , . . . , xm and Y = (Y1 ; . . . ; Ym ) ∈ Ru×n×m . From this, we can give a subset of
m × n × p tensors with rank p for 3 ≤ m ≤ n and (m − 1)(n − 1) + 2 ≤ p ≤ (m − 1)n. In Section 5
we discuss a property for the determinantal ideals by using monomial preorder. This property
plays an important role for proving Theorem 1.1. We characterize m × n × p tensors with rank
p in Section 6. In Section 7, we show that the existence of an absolutely full column rank tensor
with suitable size implies that p + 1 is a typical rank of Rm×n×p . Moreover there exist a nonempty
2
open subset T1 consisting of tensors with rank p and a possibly empty open subset T2 consisting
of tensors with rank greater than p, corresponding O1 and O2 respectively, such that the union of
them is a dense subset of Rm×n×p (see Theorem 7.14). Finally, in Section 8, we show that p + 2
is not a typical rank of Rm×n×p and complete proofs of the above theorems.
2
Nonsingular bilinear maps
We first recall some basic facts and establish terminology.
Notation (1) We denote by Rn (resp. R1×n ) the set of n-dimensional column (resp. row) real
vectors and by En the n × n identity matrix. Let ej be the j-th column vector of an identity
matrix.
P
(2) For a tensor x ∈ Rn ⊗ Rp ⊗ Rm with x = ijk aijk ei ⊗ ej ⊗ ek , we identify x with T =
(aijk )1≤i≤n,1≤j≤p,1≤k≤m and denote it by (A1 ; . . . ; Am ), where Ak = (aijk )1≤i≤n,1≤j≤p for
k = 1, . . . , m is an n × p matrix, and call (A1 ; . . . ; Am ) a tensor.
(3) We denote the set of n × p × m tensors by Rn×p×m and the set of typical ranks by
trank(n, p, m).
(4) For an n × p × m tensor T = (T1 ; . . . ; Tm ), an l × n matrix P and an k × p matrix Q,
we denote by P T the l × p × m tensor (P T1 ; . . . ; P Tp ) and by T Q⊤ the n × k × m tensor
(T1 Q⊤ ; . . . ; Tp Q⊤ ).
(5) For n × p matrices A1 , . . . , Am , we denote by (A1 , . . . , Am ) the n × mp matrix obtained by
aligning A1 , . . . , Am horizontally.
A1
O
A2
(6) We set Diag(A1 , A2 , . . . , At ) =
for matrices A1 , A2 , . . . , At .
..
.
O
At
(7) For an m × n matrix M , we denote by M≤j (resp. j< M ) the m × j matrix consisting of
the first j (resp. last n − j) columns of M . We denote by M ≤i (resp. i< M ) the i × n (resp.
(m−i)×n) matrix consisting of the first i (resp. last m−i) rows of M . We put M <i = M ≤i−1
M<i = M≤i−1 , and M =i = i−1< (M ≤i ) which is the i-th row vector of M .
T1
(8) We set fl1 (T ) = (T1 , . . . , Tm ) and fl2 (T ) = ... for a tensor T = (T1 ; . . . ; Tm ).
Tm
Definition 2.1 A bilinear map f : Rm × Rn → Rl is called nonsingular if f (x, y) = 0 implies
x = 0 or y = 0. For positive integers m and n, we set
m#n := min{l | there exists a nonsingular bilinear map Rm × Rn → Rl }.
3
Let g : R1×u × R1×v → R1×(u#v) be a nonsingular bilinear map. For positive integers m and
n, let f : R1×mu × R1×nv → R1×(m+n−1)(u#v)
be a map defined by f ((a1 , . . . , am ), (b1 , . . . , bn )) =
P
(g(a1 , b1 ), g(a1 , b2 ) + g(a2 , b1 ), . . . , i+j=k g(ai , bj ), . . . , g(am , bn )). It is easily verified that f is
a nonsingular bilinear map. Thus we have the following:
Lemma 2.2 (mu)#(nv) ≤ (m + n − 1)(u#v).
By applying this lemma to nonsingular bilinear maps obtained by multiplications of R, C,
quaternions and octanions respectively, we have the following:
Proposition 2.3 (cf. [30, Proposition 12.12 (3)]) For k = 1, 2, 4 and 8, it holds that
km#kn ≤ k(m + n − 1).
Let H (r, s, n) be the condition
on the binomial coefficients, called the Stiefel-Hopf criterion,
that the binomial coefficient nk is even whenever n − s < k < r. If there exists a continuous,
nonsingular, biskew map Rr × Rs → Rn then the Stiefel-Hopf criterion H (r, s, n) holds. Put
r ◦ s = min{n | H (r, s, n) holds}.
We have
max{r, s} ≤ r ◦ s ≤ r#s ≤ r + s − 1.
Putting n∗ =
⌈ n2 ⌉
for n ∈ Z, the number r ◦ s is easily obtained by the formula
(
2(r∗ ◦ s∗ ) − 1 if r, s are both odd and r∗ ◦ s∗ = r∗ + s∗ − 1,
r◦s=
2(r∗ ◦ s∗ )
otherwise
(cf. [30, Proposition 12.9]).
P∞
For a positive integer n, we put integers αj (n) = 0, 1, j ≥ 0 such that n = j=0 αj (n)2j is the
P∞
dyadic expansion of n and let α(n) := j=0 αj (n) be the number of ones in the dyadic expansion
of n. Two integers m and n are bit-disjoint if {j | αj (m) = 1} and {j | αj (n) = 1} are disjoint.
For k > h, let τ (k, h) be a nonnegative number defined as
τ (k, h) = #{j ≥ 0 | αj (k − h) = 0, αj (k) 6= αj (h)}.
Proposition 2.4 r#s = r + s − 1 if and only if r − 1 and s − 1 are bit-disjoint.
Proof If r − 1 and s − 1 are bit-disjoint, then r ◦ s = r#s = r + s − 1 (cf. [30, p. 257]).
Moreover, τ (k, h) = 0 if and only if h and k − h are bit-disjoint. There is a nonsingular bilinear
map Rh+1 × Rk−h+τ (k,h) → Rk for k > h ≥ 0 [20] and thus (h + 1)#(k − h + τ (k, h)) ≤ k. Putting
r = h + 1 and k = r + s − 2, we have r#(s − 1 + τ (r + s − 2, r − 1)) ≤ r + s − 2. In particular, if
r − 1 and s − 1 are not bit-disjoint then r#s ≤ r + s − 2.
Let ρ be the Hurwitz-Radon function defined as ρ(n) = 2b + 8c for nonnegative integers a, b, c
such that n = (2a + 1)2b+4c and 0 ≤ b < 4. There is a nonsingular bilinear map Rn × Rρ(n) → Rn
[17, 26] and is no nonsingular bilinear map Rn × Rρ(n)+1 → Rn for any n ≥ 1 [1]. Therefore,
n#ρ(n) ≤ n and n#(ρ(n) + 1) > n.
Corollary 2.5 n#n ≤ 2n − 2. In particular, the equality n#n = 2n − 2 holds for n = 2a + 1.
4
Proof The inequality n#n ≤ 2n − 2 is clear by Proposition 2.4 since n − 1 and n − 1 are not
bit-disjoint.
There is an immersion RPn → Rn+k if and only if there is a nonsingular biskew map Rn+1 ×
n+1
R
→ Rn+1+k (cf. [2, 30]). Note that ρ(2) = 2 and ρ(4) = 4. Then 2#2 = 2 and 3#3 = 4
which follows from 4#4 = 4. Suppose that a ≥ 2. Put m = 2a−1 . Since there is no immersion
RP2m →R4m−2 (cf. [21]), we have 4m = (2m + 1)#(2m + 1).
Many estimations for m#n are known from immersion problem for manifolds, as projective
spaces. For example, the existence of a nonsingular bilinear map Rn+1 × Rn+1 → Rn+1+k implies
that RPn immerses in Rn+k [13].
Proposition 2.6
(1) (n + 1)#(n + 1) ≤ 2n − α(n) + 1 [7].
(2) (2n + α(n))#(2n + α(n)) ≥ 4n − 2α(n) + 2 [8].
(3) (8n + 9)#(8n + 9) ≥ 16n + 6 and (16n + 12)#(16n + 12) ≥ 32n + 14 if α(n) = 2 [10, 31].
(4) (8n + 10)#(8n + 10) ≥ 16n + 1 and (8n + 11)#(8n + 11) ≥ 16n + 4 if α(n) = 3 [9, 10].
(5) (n + 1)#(m + 1) ≤ n + m + 1 − (α(n) + α(n − m) + min{k(n), k(m)}) if m, n are odd and
n ≥ m, where k(n) is a nonnegative function depending only in the mod 8 residue class of n
with k(8a + 1) = 0, k(8a + 3) = k(8a + 5) = 1 and k(8a + 7) = 4 [23].
(6) d(h + 1)#(d(k − h) + τ (k, h)) ≤ dk for k > h ≥ 0 and d = 1, 2, 4, 8 [20].
(7) (n + 1)#(n + τ (2n, n)) ≤ 2n.
3
Absolutely full column rank tensors
For a tensor T of Rn ⊗ Rp ⊗ Rm , we define the rank of T , denoted by rank T , the minimal number
r so that there exist ai ∈ Rn , bi ∈ Rp , and ci ∈ Rm for i = 1, . . . , r such that
T =
r
X
ai ⊗ bi ⊗ ci .
i=1
The set Rn×p×m has an action of GL(m) × GL(p) × GL(n) as
(A, B, C) ·
r
X
ai ⊗ bi ⊗ ci =
r
X
Aai ⊗ Bbi ⊗ Cci .
i=1
i=1
For tensors T1 , T2 ∈ Rm×n×p , T1 and T2 are said to be equivalent if T1 = (A, B, C) · T2 for some
(A, B, C) ∈ GL(n) × GL(p) × GL(m). The equivalence relation preserves the rank. For a subset
U and an open semi-algebraic subset S of Rm×n×p , we say that almost all tensors in S are
equivalent to tensors in U if there exists a semi-algebraic subset S0 of S with dim S0 < mnp
such that any tensor of S \ S0 is equivalent to a tensor of U . In particular, for a given tensor T0 ,
if almost all tensors in Rm×n×p are equivalent to {T0 }, then we say that any tensor is generically
equivalent to T0 .
5
An integer r is called a typical rank of n × p × m-tensors if there is a nonempty open subset O
of Rn×p×m such that rank X = r for X ∈ O. Over the complex number field C, it is known that
there is a unique typical rank, called the generic rank, of n × p × m-tensors for any n, p and m.
The set of typical ranks of n × p × m-tensors over R is denoted by trank(n, p, m) and the generic
rank of n × p × m-tensors over C is denoted by grank(n, p, m).
We recall the following facts.
Theorem 3.1 ([12, Theorem 7.1]) The space Rm1 ×m2 ×m3 , m1 , m2 , m3 ∈ N, contains a finite number of open connected disjoint semi-algebraic sets O1 , . . . , OM satisfying the following
properties.
SM
(1) Rm1 ×m2 ×m3 \ i=1 Oi is a closed semi-algebraic set Rm1 ×m2 ×m3 of dimension strictly less
than m1 m2 m3 .
(2) Each T ∈ Oi has rank ri for i = 1, . . . , M .
(3) min{r1 , . . . , rM } = grank(m1 , m2 , m3 ).
(4) trank(m1 , m2 , m3 ) = {r ∈ Z | min{r1 , . . . , rM } ≤ r ≤ max{r1 , . . . , rM }}.
Let T = (A1 ; . . . ; Ap ) be an m × n × p tensor over R. The tensor T is called an absolutely full
column rank tensor if
p
X
yj Aj ) = n
rank(
j=1
for any (y1 , . . . , yp )⊤ ∈ Rp \ {0}.
From the definition of the absolutely full column rank property, we see the following fact.
Lemma 3.2 Let T be an m × n × p tensor over R and P ∈ GL(m, R). Then T is absolutely full
column rank if and only if so is P T .
Lemma 3.3 (see Corollary 4.20 or [24, Theorem 3.6]) The set of m × n × p absolutely full
column rank tensors is an open subset of Rm×n×p .
Let T be an m × n × p-tensor. We define fT : Rn × Rp → Rm as
fT (x, y) =
p
X
yj Aj x,
j=1
where y = (y1 , . . . , yp )⊤ . Then fT is a bilinear map. This assignment T 7→ fT induces a bijection
from Rm×n×p to the set of all bilinear maps Rn ×Rp → Rm . It is easily verified that fT : Rn ×Rp →
Rm is nonsingular if and only if T is absolutely full column rank. Therefore
Corollary 3.4 There is an m × n × p absolutely full column rank tensor if and only if there is a
nonsingular bilinear map Rn × Rp → Rm , i.e., n#p ≤ m.
Lemma 3.5 Let n, m, and u be positive integers with u ≤ mn. Set p = mn − u. Then the
following conditions are equivalent.
6
(1) n#m ≤ u.
(2) There is a u × n × m absolutely full column rank tensor.
(3) There is a u × n × m absolutely full column rank tensor Y such that
p< fl1 (Y
) = −Eu .
Proof (1) ⇔ (2) follows from Corollary 3.4.
It is clear that (3) ⇒ (2).
(2) ⇒ (3): Let X = (X1 ; . . . ; Xm ) be a u × n × m absolutely full column rank tensor. By
Lemma 3.3, we may assume that p< fl1 (X) is nonsingular. Set Y = −p< fl1 (X)X. Then Y satisfies
the required conditions.
4
Ideals of minors
In this section, we state some results on ideals of minors, which we use in the following of this
paper and interesting in its own right.
First we recall the definition of normality of a ring.
Definition 4.1 (see [22, Section 9]) Let R be a commutative ring. We say that R is normal if
RP is an integrally closed integral domain for any prime ideal P of R.
Remark 4.2
(1) A Noetherian integral domain is normal if and only if it is integrally closed.
(2) If R is a Noetherian normal ring, then R ≃ R/P1 × · · · × R/Pr , where P1 , . . . , Pr are
associated prime ideals of R.
We recall a criterion of normality in terms of Serre’s condition.
Definition 4.3 ([22, page 183]) Let R be a Noetherian ring and i a nonnegative integer.
(1) We say that R satisfies (Ri ) if RP is regular for any prime ideal P of R with htP ≤ i.
(2) We say that R satisfies (Si ) if depthRP ≥ min{i, htP } for any prime ideal P of R.
Lemma 4.4 ([22, Theorem 23.8]) Let R be a Noetherian ring. Then R is normal if and only
if R satisfies (R1 )+(S2 ).
The condition (R1 )+(S2 ) is restated as follows.
Lemma 4.5 Let R be a Noetherian ring. Then R satisfies (R1 )+(S2 ) if and only if the following
condition is satisfied: if P is a prime ideal of R with depthRP ≤ 1, then RP is regular.
Proof First assume that R satisfies (R1 )+(S2 ). Let P be a prime ideal of R with depthRP ≤ 1.
Since R satisfies (S2 ), we see that depthRP ≥ min{htP, 2}. Therefore, htP ≤ 1. Thus by (R1 ), we
see that RP is regular.
Conversely, assume that RP is regular for any prime ideal P of R with depthRP ≤ 1. First
we show that R satisfies (R1 ). If P is a prime ideal with htP ≤ 1, then depthRP ≤ htP ≤ 1.
7
Thus by assumption, we see that RP is regular. Next we show that R satisfies (S2 ). Let P
be an arbitrary prime ideal of R. If depthRP ≤ 1, then by assumption, RP is regular. Thus
depthRP = htP = min{htP, 2}. If depthRP ≥ 2, then depthRP ≥ min{htP, 2} holds trivially.
Next we state notations and definitions used in this section.
Definition 4.6 We denote by u, n, m, and t positive integers with t ≤ min{u, n} and set v = (u −
t+ 1)(n− t+ 1). Let M = (mij ) be a u × n matrix with entries in a commutative ring A. We denote
by It (M )A, or simply It (M ), the ideal of A generated by t-minors of M . For α(1), . . . , α(t) ∈ {1,
. . . , u} and β(1), . . . , β(t) ∈ {1, . . . , n}, we set [α(1), . . . , α(t) | β(1), . . . , β(t)]M := det(mα(i)β(j) ),
and if u ≥ n and α(1), . . . , α(n) ∈ {1, . . . , u}, we set [α(1), . . . , α(n)]
PMm := det(mα(i)j ). For
a tensor T = (T1 ; . . . ; Tm ) and a = (a1 , . . . , am ) we set M (a, T ) :=
i=1 ai Ti and we define
Γ(u × n) = {[a1 , . . . , an ] | 1 ≤ a1 < · · · < an ≤ u, ai ∈ Z}. For γ = [a1 , . . . , an ] ∈ Γ(u × n), we set
suppγ = {a1 , . . . , an }. If B is a ring, A is a subring of B and T is a tensor (resp. matrix, vector)
with entries in B, we denote by A[T ] the subring of B generated by the entries of T over A. If
moreover, B is a field, we denote by A(T ) the subfield of B generated by the entries of T over A.
If the entries of a tensor (resp. matrix, vector) T are independent indeterminates, we say that T
is a tensor (resp. matrix, vector) of indeterminates.
Here we note the following fact, which is verified by using [3, Chapter 1 Exercise 2] or [25,
(6.13)].
Lemma 4.7 Let A be a commutative ring, X a square matrix of indeterminates. Then det X is
a non-zerodivisor of A[X].
Next we recall the following fact.
Lemma 4.8 ([16, Theorem 1 and Corollaries 3 and 4] see also [4, (6.3) Theorem]) Let A
be a Noetherian ring and X a u × n matrix of indeterminates.
(1) ht(It (X)A[X]) = grade(It (X)A[X]) = v.
(2) If A is a domain, then It (X)A[X] is a prime ideal of A[X].
(3) If A is a normal domain, then so is A[X]/It (X)A[X].
We also recall the following fact.
Lemma 4.9 ([16, Theorem 1 and Corollaries 2 and 4] see also [4, (2.1) Theorem]) Let A
be a Noetherian commutative ring and M a u × n matrix with entries in A. If It (M ) 6= A, then
htIt (M ) ≤ v. Moreover, if A is Cohen-Macaulay and htIt (M ) = v, then It (M ) is height unmixed.
The following Lemma is a generalization of [4, (12.4) Lemma].
Lemma 4.10 Let u, n, m, t and v be as in Definition 4.6, A a commutative Noetherian ring,
T = (tijk ) a u × n × m tensor of indeterminates and f1 , . . . , fm elements of A. Suppose that (f1 ,
. . . , fm ) 6= A. Set g = grade(f1 , . . . , fm )A, f = (f1 , . . . , fm ) and M = M (f , T ) = (mij ).
(1) grade It (M )A[T ] = min{g, v}.
8
(2) If g ≥ v + 1 and A is a domain, then It (M )A[T ] is a prime ideal.
(3) If g ≥ v + 2 and A is a Cohen-Macaulay normal domain, then A[T ]/It (M )A[T ] is a normal
domain.
Remark 4.11 If g ≥ v, then grade It (M ) = ht It (M ) = v by Lemma 4.10 (1) and [16, Theorem 1
and Corollary 4].
Proof of Lemma 4.10 Set R = A[T ].
First we prove (1). Set v ′ = min{g, v}. Since It (M ) ⊂ (f1 , . . . , fm )R, we see that
gradeIt (M )R ≤ grade(f1 , . . . , fm )R = g. Thus we see by Lemma 4.9, gradeIt (M )R ≤ v ′ .
To prove the converse inequality, it is enough to show that if P be a prime ideal of R with
P ⊃ It (M ), then depthRP ≥ v ′ . Since if P ⊃ (f1 , . . . , fm )R, then depthRP ≥ g ≥ v ′ , we
may assume that P 6⊃ (f1 , . . . , fm )R. Take l with fl 6∈ P . Then M is essentially a matrix of
indeterminates over A[fl−1 ][tijk | k 6= l]. Thus grade(It (M )R[fl−1 ]) = v by Lemma 4.8. Since RP
is a localization of R[fl−1 ], we see that depthRP ≥ v ≥ v ′ .
Next we prove (2). We may assume f1 , . . . , fm 6= 0. Set B = R/It (M )R. Since It (M )R is
grade unmixed by (1) and [16, Theorem 1 Corollaries 2 and 4] (see also [27, Corollary of Theorem
1.2] or [22, Exercise 16.3]), we see that every associated prime ideal of It (M )R is of grade v. In
particular any associated prime ideal of It (M )R does not contain (f1 , . . . , fm )R, since g > v by
assumption. Thus (f¯1 , . . . , f¯m )B has grade at least 1, where f¯k denote the natural image of fk in
B for 1 ≤ k ≤ m.
Since A[fl−1 ][tijk | k 6= l] is an integral domain and M is essentially a matrix of indeterminates
−1
over A[fl−1 ][tijk | k 6= l], we see that B[f¯l ] = R[fl−1 ]/It (M )R[fl−1 ] is an integral domain for any
l. Thus we see that f¯l is contained in all associated prime ideals of B but one. We denote this
prime ideal by Pl . Since B[(f¯l f¯l′ )−1 ] = R[(fl fl′ )−1 ]/It (M )R[(fl fl′ )−1 ] is not a zero ring by the
same reason as above, we see that Pl = Pl′ for any l and l′ . In particular, Pl = P1 for any l with
1 ≤ l ≤ m. Since grade(f¯1 , . . . , f¯m )B ≥ 1 and any associated prime of B other than P1 contains
(f¯1 , . . . , f¯m )B, we see that P1 is the only associated prime ideal of B.
−1
Therefore, B ⊂ B[f¯1 ] and we see that B is a domain.
Finally we prove (3). Assume that P is a prime ideal of B with depthBP ≤ 1. Since B is
Cohen-Macaulay by (1) and [16, Theorem 1 and Corollary 4] and ht(f¯1 , . . . , f¯m )B ≥ 2, we see that
P 6⊃ (f¯1 , . . . , f¯m )B.
Take l with f¯l 6∈ P . Then B[f¯l−1 ] is a normal domain by Lemma 4.8 and the same argument
as above. Since BP is a localization of B[f¯l−1 ], we see that BP is regular by Lemmas 4.4 and 4.5.
Thus B is normal by Lemmas 4.4 and 4.5.
Here we note the following fact, which can be verified by considering the associated prime ideals
of I and using [22, Theorems 15.5, 15.6].
Lemma 4.12 Let K be a field, x = (x1 , . . . , xm ) a vector of indeterminates and I a proper ideal
of K[x]. Then
dim K[x]/I = max{r | ∃i1 , . . . , ir ; x̄i1 , . . . , x̄ir are algebraically independent over K},
where x̄i denote the natural image of xi in K[x]/I.
9
Lemma 4.13 Let K be a field, T = (tijk ) a u × n × m-tensor of indeterminates, and x =
(x1 , . . . , xm ) a vector of indeterminates. Set R = K[T ], L = K(T ), M = M (x, T ) and
v ′ = min{m, v}. Then
L[x1 , . . . , xm−v′ ] ∩ It (M )L[x] = (0),
R[x1 , . . . , xm−v′ ] ∩ It (M )R[x] = (0),
L[x]/It (M )L[x] is algebraic over the natural image of L[x1 , . . . , xm−v′ ] in L[x]/It (M )L[x] and
R[x]/It (M )R[x] is algebraic over the natural image of R[x1 , . . . , xm−v′ ] in R[x]/It (M )R[x].
Proof Since It (M )L[x] is generated by homogeneous polynomials of positive degree with respect
to x1 , . . . , xm , we see that L ∩ It (M )L[x] = (0).
By Lemma 4.10, we see that It (M ) is an ideal of height v ′ . Thus by Lemma 4.12, we see
tr.degL L[x]/It (M )L[x] = m − v ′ .
Thus there is a permutation i1 , . . . , in of 1, . . . , n such that x̄i1 , . . . , x̄im−v′ are algebraically
independent over L and L[x]/It (M )L[x] is algebraic over L[x̄i1 , . . . , x̄im−v′ ], where x̄i denote the
natural image of xi in L[x]/It (M )L[x]. By symmetry, we see that x̄1 , . . . , x̄m−v′ are algebraically
independent over L and L[x]/It (M )L[x] is algebraic over L[x̄1 , . . . , x̄m−v′ ]. We also see that
R[x]/It (M )R[x] is algebraic over R[x̄1 , . . . , x̄m−v′ ].
Since x̄1 , . . . , x̄m−v′ are algebraically independent over L, we see that
L[x1 , . . . , xm−v′ ] ∩ It (M )L[x] = (0)
and therefore R[x1 , . . . , xm−v′ ] ∩ It (M )R[x] = (0).
Lemma 4.14 Let L/K be a field extension with charK = 0, x = (x1 , . . . , xm ) a vector of indeterminates and Y a u × n × m tensor with entries in L. Set M = M (x, Y ). Suppose that the entries
of Y are algebraically independent over K. Then the followings hold.
(1) If m ≥ v + 1, then L[x1 , . . . , xm−v ] ∩ It (M )L[x] = (0) and L[x]/It (M )L[x] is algebraic over
the natural image of L[x1 , . . . , xm−v ].
(2) If m ≥ v + 2, then L[x]/It (M )L[x] is a normal domain. In particular, It (M )L[x] is a prime
ideal of L[x] of height v.
Proof Since the entries of Y are algebraically independent over K, we see by Lemma 4.13 that
K(Y )[x]/It (M )K(Y )[x] is algebraic over K(Y )[x1 , . . . , xm−v ]. Thus L[x]/It (M )L[x] is algebraic
over L[x1 , . . . , xm−v ] since L[x]/It (M )L[x] = (K(Y )[x]/It (M )K(Y )[x]) ⊗K(Y ) L. On the other
hand, since tr.degL L[x]/It (M )L[x] = dim L[x]/It (M )L[x] ≥ m − v, by Lemmas 4.9 and 4.12, we
see that x̄1 , . . . , x̄m−v are algebraically independent over L, where x̄i denote the natural image of
xi in L[x]/It (M )L[x]. Thus L[x1 , . . . , xm−v ] ∩ It (M )L[x] = (0). This proves (1).
Next we prove (2). Take a transcendence basis S of L/K(Y ) and put
A =
C =
K(Y )[x]/It (M )K(Y )[x],
K(Y )(S)[x]/It (M )K(Y )(S)[x] and
B
L[x]/It (M )L[x].
=
10
By Lemma 4.10 (3), we see that A is a normal domain.
Since
K(Y )[S][x]/It (M )K(Y )[S][x] = (K(Y )[x]/It (M )K(Y )[x]) ⊗K(Y ) K(Y )[S] = A[S]
is a polynomial ring (with possibly infinitely many variables) over A, it is an integrally closed
integral domain. Since C is a localization of the above ring, C is a normal domain.
Now let P be a prime ideal of B with depthBP ≤ 1. By Lemmas 4.4 and 4.5, it is enough to
show that BP is regular. Set Q = C ∩ P . Then since B = C ⊗K(Y )(S) L is flat over C, we see that
depthCQ ≤ 1 by [22, Theorem 23.3 Corollary]. Thus CQ is regular since C is normal. The fiber
ring CQ /QCQ ⊗C BP is a localization of
CQ /QCQ ⊗C B = CQ /QCQ ⊗K(Y )(S) L
which is a 0-dimensional reduced ring, thus regular, since L is separably algebraic over K(Y )(S).
(Note that L is an inductive limit of finitely generated algebraic extension fields of K(Y )(S). Or
see [25, Theorem 3.2.6 and Theorem 3.2.8 (i)] and note the assumption of the existence of a field
containing M and N is not used in the proof of [25, Theorem 3.2.8 (i)].) Thus by [22, Theorem
23.7], we see that BP is regular.
Thus, B is a normal ring. Since B is a nonnegatively graded ring whose degree 0 component
is a field, B is not a direct product of 2 or more rings. Therefore, B is a domain by Remark 4.2.
Moreover, we see by (1), that htIt (M )L[x] = v.
Definition 4.15 Let u, n, m, t and v be as in Definition 4.6. We set
Atu×n×m := {Y ∈ Ru×n×m | It (M (a, Y )) 6= (0) for any a ∈ R1×m \ {0}},
Ctu×n×m := Ru×n×m \ Atu×n×m ,
I := {Y ∈ Ru×n×m | the entries of Y are algebraically independent over Q},
and for Y = (Y1 ; . . . ; Ym ) ∈ Ru×n×m and for integers k, k ′ with t ≤ k ≤ u and t ≤ k ′ ≤ n, we set
µk,k′ (x, Y ) := [1, . . . , t − 1, k | 1, . . . , t − 1, k ′ ]M(x,Y ) ,
where x is a vector of indeterminates. We also define
∂(µtt , µt,t+1 , . . . , µtn , µt+1,t , . . . , µt+1,n , . . . , µu,t , . . . , µun )
(x, Y ),
Jt (x, Y ) =
∂(xm−v+1 , . . . , xm )
<t
1×m
St (Y ) := a ∈ R
| det M (a, Y )<t 6= 0, Jt (a, Y ) 6= 0 and It (M (a, Y )) = (0)
Pt := {Y ∈ Ru×n×m | St (Y ) 6= ∅}.
Remark 4.16
,
u×n×m
(1) A1u×n×m ⊃ A2u×n×m ⊃ · · · ⊃ Amin{u,n}
.
(2) Atu×n×m is stabel under the action of GL(u, R) for any t.
(3) Ctu×n×m 6= ∅ for any t.
(4) Pt is a subset of Ctu×n×m and
det M (a, Y )<t
<t 6= 0, Jt (a, Y ) 6= 0
St (Y ) := a ∈ R1×m and there exist linearly independent vectors bt , . . . , bn ∈ Rn
such that M (a, Y )bj = 0 for any t ≤ j ≤ n
11
Lemma 4.17 Let u, n and t be as in Definition 4.6, A an integral domain and M a u × n matrix
<t
with entries in A. Suppose that det M<t
6= 0 and [1, . . . , t − 1, k | 1, . . . , t − 1, k ′ ]M = 0 for any
′
integer with t ≤ k ≤ u and t ≤ k ≤ n. Then It (M ) = (0). In particular,
det M (a, Y )<t
<t 6= 0, Jt (a, Y ) 6= 0
St (Y ) := a ∈ R1×m and [1, . . . , t − 1, k | 1, . . . , t − 1, k ′ ]M = 0 for any integer with
t ≤ k ≤ u and t ≤ k ′ ≤ n.
Proof
Set
(−1)t+1 [1, . . . , t − 1 | 2, . . . , t − 1, l]M
(−1)t+2 [1, . . . , t − 1 | 1, 3, . . . , t − 1, l]M
..
.
ξl := (−1)2t−1 [1, . . . , t − 1 | 1, . . . , t − 2, l]M ∈ An
0
(−1)2t [1, . . . , t − 1 | 1, . . . , t − 2, t − 1]M
0
for each l with t ≤ l ≤ n ((−1)2t [1, . . . , t − 1 | 1, . . . , t − 2, t − 1]M in the l-th position). Then, since
<t
[1, . . . , t − 1 | 1 . . . , t − 1]M = det M<t
6= 0, we see that ξt , . . . , ξn are linearly independent over
A. Since the k-th entry of M ξl is [1, . . . , t − 1, k | 1, . . . , t − 1, l]M , we see, by assumption, that
M ξl = 0 for t ≤ l ≤ n. Thus, rank M < t and we see that It (M ) = (0).
It is verified the following fact, since Q is a countable field.
Lemma 4.18 I is a dense subset of Ru×n×m .
We also see that Atu×n×m is an open subset of Ru×n×m . First note the following fact, which
is easily verified.
Lemma 4.19 Let X and Y be topological spaces with X compact and f : X×Y → R is a continuous
map. Set g : Y → R by g(y) := minx∈X f (x, y). Then, g is a continuous map.
Corollary 4.20 Atu×n×m is an open subset of Ru×n×m .
Proof
Since Atu×n×m is the set consisting of Y ∈ Ru×n×m such that
min (the maximum of the absolute values of t-minors of M (a, Y )) > 0,
a∈S m−1
we see the result by the previous lemma.
Lemma 4.21 If v < m, then Pt is a dense subset of Ctu×n×m . In particular, Pt 6= ∅.
Proof Let Y ∈ Ctu×n×m and U an open neighborhood of Y in Ru×n×m . In order to prove the
first assertion, it suffices to show that Pt ∩ U 6= ∅.
There exist a nonzero vector a ∈ R1×m and linearly independent vectors bt , . . . , bn ∈ Rn such
that M (a, Y )bj = 0 for t ≤ j ≤ n. Let g3 ∈ GL(m) and g2 ∈ GL(n) such that the first entry of
g3⊤ a is nonzero, t≤ (g2⊤ bt , . . . , g2⊤ bn ) is nonsingular and sufficiently close to Em and En respectively
so that (1, g2−1 , g3−1 ) · Y ∈ U . By replacing Y , a and bt , . . . , bn by (1, g2−1 , g3−1 ) · Y , g3⊤ a and g2⊤ bt ,
12
. . . , g2⊤ bn respectively, we may assume that the first entry of a is nonzero and t≤ (bt , . . . , bn ) is
nonsingular.
Let e ∈ R. We take a tensor P (e) = (pijk ) ∈ Ru×n×m as follows. For any i, j, k with j < t or
k 6= 1, we put
ij
e
(k = 1, i < t, j < t, )
e
((i, j, k) = (t + l, t + l′ , m − v + 1 + l + l′ (u − t + 1)),
pijk =
0 ≤ l ≤ u − t, 0 ≤ l′ ≤ n − t)
0
(otherwise)
and take pij1 for 1 ≤ i ≤ u and t ≤ j ≤ n so that M (a, P (e))bj = 0 for t ≤ j ≤ n. Note that we
can take such pij1 since the first entry of a is nonzero and t≤ (bt , . . . , bn ) is nonsingular.
Then we have
det M (a, Y + P (e))<t
<t 6= 0
and Jt (a, Y + P (e)) 6= 0
for e ≫ 0.
Therefore, since the entries of P (e) are polynomials of e, we see that for a real number e0 6= 0
which is sufficiently closed to 0,
det M (a, Y + P (e0 ))<n
<n 6= 0,
(4.1)
Jt (a, Y + P (e0 )) 6= 0,
Y + P (e0 ) ∈ U .
(4.2)
(4.3)
(4.1), (4.2) and the fact M (a, Y + P (e0 ))bj = M (a, Y )bj + M (a, P (e0))bj = 0 for t ≤ j ≤ n imply
that a ∈ S(Y + P (e0 )). Thus we have Y + P (e0 ) ∈ Pt and we see that Pt ∩ U 6= ∅.
The latter assertion follows from Remark 4.16.
Lemma 4.22 Suppose that v < m. Then the set Pt is an open subset of Ru×n×m and for any
Y ∈ Pt and a = (a1 , a2 ) ∈ St (Y ), where a1 ∈ R1×(m−v) and a2 ∈ R1×v , there exists an open
neighborhood O(a, Y ) of a1 ∈ R1×(m−v) such that for any b1 ∈ O(a, Y ), there exists b2 ∈ R1×v
such that (b1 , b2 ) ∈ St (Y ).
Proof Assume that Y ∈ Pt and a = (a1 , a2 ) ∈ St (Y ). Then µkk′ (a, Y ) = 0 for any t ≤ k ≤ u
and t ≤ k ′ ≤ n. Thus by implicit function theorem, we see that there is an open neighborhood U
of (a1 , Y ) in R1×(m−v) × Ru×n×m and a continuous map ν : U → R1×v such that ν(a1 , Y ) = a2 ,
and µkk′ (b, Z) = 0 for any (b1 , Z) ∈ U and any k, k ′ with t ≤ k ≤ u and t ≤ k ′ ≤ n, where
b := (b1 , ν(b1 , Z)). By replacing U by a smaller neighborhood if necessary, we may assume that
det M (b, Z)<t
<t 6= 0 and Jt (b, Z) 6= 0 for any (b1 , Z) ∈ U .
Assume (b1 , Z) ∈ U . Put b = (b1 , ν(b1 , Z)). By Lemma 4.17, we see that b ∈ St (Z). Thus
it suffices to set O(a, Y ) := {b1 ∈ R1×(m−v) | (b1 , Y ) ∈ U }. Moreover, since {Z ∈ Ru×n×m |
(a1 , Z) ∈ U } is an open subset of Pt containing Y , we see that Pt is an open subset of Ru×n×m .
By Corollary 4.20 and Lemmas 4.21 and 4.22, we see the following:
Corollary 4.23 If v < m, then Pt ⊂ int Ctu×n×m and P t = int Ctu×n×m = Ctu×n×m .
13
Definition 4.24 We set P̃t := {P Y | P ∈ GL(u, R), Y ∈ Pt }.
Lemma 4.25 P̃t is an open subset of Ru×n×m , stable under the action of GL(u, R) and P̃t =
Ctu×n×m .
S
Proof Since P̃t = P ∈GL(u,R) P Pt and P Pt is an open subset of Ru×n×m for any P ∈ GL(u, R)
by Lemma 4.22 and the fact that multiplication of a nonsingular matrix is a homeomorphism on
Ru×n×m . Therefore, P̃t is an open subset of Ru×n×m . The fact that P̃t is stable under the action
of GL(u, R) is clear from the definition of P̃t . Finally, since Atu×n×m is stable under the action
of GL(u, R), we see, by Remark 4.16, that P̃t ⊂ Ctu×n×m . Therefore, we see that P̃t = Ctu×n×m
by Lemma 4.21.
Lemma 4.26 Let L be an infinite field and x = (x1 , . . . , xm ) a vector of indeterminates.
Set v ′ = min{m, v} and v ′′ = min{m, (u − t + 2)(n − t + 2)}. Then there is a Zariski
dense open subset Q1 of Lu×n×m such that if Y ∈ Q1 , then L[x]/It (M (x, Y ))L[x] is algebraic over the natural image of L[x1 , . . . , xm−v′ ], L[x1 , . . . , xm−v′ ] ∩ It (M (x, Y ))L[x] = (0),
htIt (M )L[x] = v ′ , L[x]/It−1 (M (x, Y ))L[x] is algebraic over the natural image of L[x1 , . . . , xm−v′′ ],
L[x1 , . . . , xm−v′′ ] ∩ It−1 (M (x, Y ))L[x] = (0) and htIt−1 (M (x, Y ))L[x] = v ′′ .
Proof Let T = (tijk ) be the u × n × m tensor of indeterminates. Then by Lemma 4.13, we see
that L[T ][x]/It (M (x, T ))L[T ][x] is algebraic over the natural image of L[T ][x1 , . . . , xm−v′ ]. Denote
the natural image of xl in L[T ][x]/It (M (x, T ))L[T ][x] by x̄l . Take a nonzero polynomial fl (t) with
coefficient in L[T ][x1 , . . . , xm−v′ ] such that fl (x̄l ) = 0 for each l with m − v ′ + 1 ≤ l ≤ m. Let g be
the product of all nonzero elements of L[T ] appearing as the coefficient of at least one of fl and
set Q1′ = Lu×n×m \ V(g). Then Q1′ is a Zariski dense open subset of Lu×n×m .
Suppose that Y ∈ Q1′ . And let x̃i be the natural image of xi in L[x]/It (M (x, Y ))L[x] and f˜l
be an element of L[x1 , . . . , xm−v′ ] obtained by substituting Y to T . Then f˜l is a nonzero element
of L[x1 , . . . , xm−v′ ] and f˜l (x̃l ) = 0 for m − v ′ + 1 ≤ l ≤ m. Therefore, L[x]/It (M (x, Y ))L[x]
is algebraic over the natural image of L[x1 , . . . , xm−v′ ]. Thus htIt (M (x, Y ))L[x] = m −
dim L[x]/It (M )L[x] = m − tr.degL L[x]/It (M )L[x] ≥ v ′ . Thus, htIt (M (x, Y ))L[x] = v ′ by Lemma
4.9 and we see that tr.degL L[x]/It (M (x, Y ))L[x] = m − v ′ . Therefore x̃1 , . . . , x̃m−v′ are algebraically independent over L, that is, L[x1 , . . . , xm−v′ ] ∩ It (M (x, Y ))L[x] = (0).
We see by the same way that there is a Zariski dense open subset Q1′′ of Lu×n×m such that
if Y ∈ Q1′′ , then L[x]/It−1 (M (x, Y ))L[x] is algebraic over the natural image of L[x1 , . . . , xm−v′′ ],
L[x1 , . . . , xm−v′′ ] ∩ It−1 (M (x, Y ))L[x] = (0) and htIt−1 (M (x, Y ))L[x] = v ′′ . Thus it is enough to
set Q1 = Q1′ ∩ Q1′′ .
Let L be a field, x = (x1 , . . . , xm ) a vector of indeterminates
and M a u × n matrix with entries
p
<t −1
<t
) ] is
in L[x]. Suppose that htIt (M ) = v and det(M<t
) 6∈ It (M ). Then It (M )L[x][det(M<t
<t −1
a proper ideal of L[x][det(M<t ) ] and M is equivalent to the matrix of the following form in
<t −1
L[x][(det(M<t
) ].
Et−1 O
O
∗
<t −1
) ]. By symmetry, we see
In particular, It (M ) is a complete intersection ideal in L[x][(det(M<t
that if htIt−1 (M ) > v, then It (M ) is a generically complete intersection ideal.
14
We use the notation of [11, p. 219]. Let L be a field of characteristic 0, T a u × n × m tensor
of indeterminates and x = (x1 , . . . , xm ) a vector of indeterminates. Set M = L(T ). Suppose that
m > v. Then It (M (x, T ))M[x] is a prime ideal and htIt−1 (M (x, T ))M[x] > v by Lemma 4.10.
Thus
It (M (x, T )) : Jm−v (It (M (x, T ))) = It (M (x, T ))
by [11, Theorem 2.1] and the argument above.
Thus if we set I ′ = It (M (x, T )) +
′
Jm−v (It (M (x, T ))), then htI > v. Therefore the natural images of x1 , . . . , xm−v in M[x]/I ′
are algebraically dependent over M by Lemma 4.12. Take a transcendence basis xi1 , . . . xid of
M[x]/I ′ over M. By symmetry, we may assume that ik = k for 1 ≤ k ≤ d. Since htI ′ > v, we
see that d < m − v. Take a nonzero polynomial f (t) with coefficients in L[T ][x1 , . . . , xd ] such that
f (xm−v ) ∈ I ′ and let g be the product of all nonzero elements of L[T ] which appear in some nonzero
coefficient of f . Set Q2 = Lu×n×m \V(g). Then Q2 is a Zariski dense open subset of Lu×n×m and if
Y ∈ Q1 ∩Q2 , where Q1 is the one in Lemma 4.26, then ht(It (M (x, Y ))+Jm−v (It (M (x, Y )))) > v
since tr.degL L[x]/(It (M (x, Y )) + Jm−v (It (M (x, Y )))) < m − v.
Until the end of this section, assume that m ≥ v + 2 and let U be the m × m matrix of indeterminates, T the u × n × m tensor of indeterminates, x = (x1 , . . . , xm ) the vector of indeterminates
and L the algebraic closure of R(U ).
Set
′
x1
x1
..
..
. = U . .
x′m
xm
Then L(T )[x′1 , . . . , x′m ] = L(T )[x] and L(T )[x′1 , . . . , x′m−v+1 ] ∩ It (M (x, T )) is a principal ideal
generated by a polynomial F called the ground form of It (M (x, T )), since It (M (x, T )) is a prime
ideal therefore is unmixed of height v. See [29, parts 28 and 29].
Since L(T )[x′1 , . . . , x′m−v+1 ] ∩ It (M (x, T )) is the elimination ideal, F is obtained by the Buchberger’s algorithm. Let g3 be the products of all elements of L[T ] which appear as a numerator or
a denominator of a nonzero coefficient of at least one polynomial in the process of Buchberger’s algorithm to obtain the reduced Gröbner basis of It (M (x, T )) in L[T ][x]. Set Q3 = Lu×n×m \ V(g3 ).
Then Q3 is a Zariski dense open subset of Lu×n×m and if Y ∈ Q3 , then the Buchberger’s algorithm to obtain the reduced Gröbner basis of It (M (x, Y ))L[x] in L[x] is identical with that of
It (M (x, T ))L(T )[x] in L(T )[x]. In particular, L[x′1 , . . . , x′m−v+1 ] ∩ It (M (x, Y )) is a principal ideal
generated by FY , the polynomial obtained by substituting Y in T in the coefficients of F .
Let d = deg F and let PL (d, m − v + 1) (resp. PR (d, m − v + 1)) be the set of homogeneous
polynomials with coefficients in L (resp. R) with variables x′1 , . . . , x′m−v+1 and degree d. Since
m − v + 1 ≥ 3 and L is an algebraically closed field containing R, we see by [14] that
{G ∈ PR (d, m − v + 1) | G is absolutely irreducible}
= PR (d, m − v + 1) ∩ {G ∈ PL (d, m − v + 1) | G is irreducible}
is a Zariski dense open subset of PR (d, m − v + 1).
Definition 4.27 Set
Q = {Y ∈ Q1 ∩ Q2 ∩ Q3 ∩ Ru×n×m | FY is absolutely irreducible},
15
where Q1 is the one in Lemma 4.26 and Q2 , Q3 and FY are the ones defined after the proof of
Lemma 4.26.
Remark 4.28 Q is a Zariski open subset of Ru×n×m , since the correspondence Y to FY is a
rational map whose domain contains Q3 .
Moreover, we see the following fact.
Lemma 4.29 Q ⊃ I ∩ Q1 ∩ Q2 ∩ Q3 . In particular, Q is not an empty set.
Proof Suppose that Y ∈ I ∩ Q1 ∩ Q2 ∩ Q3 . Then we see, by applying Lemma 4.14 to L/Q,
that It (M (x, Y ))L[x] is a prime ideal. Thus the elimination ideal is also prime and therefore the
generator FY of the elimination ideal is an irreducible polynomial in L[x′1 , . . . , x′m−v+1 ]. Therefore,
Y ∈ Q. Since I is a dense subset of Ru×n×m by Lemma 4.18, we see that I ∩ Q1 ∩ Q2 ∩ Q3 6= ∅.
Thus, Q 6= ∅.
Thus we see that Q is a non-empty Zariski open subset of Ru×n×m . In particular, Q is dense.
Lemma 4.30 If Y ∈ Q, then It (M (x, Y ))R[x] is a prime ideal of height v.
Proof
Since Y ∈ Q, htIt (M (x, Y ))R[x] = v and L[x′1 , . . . , x′m−v+1 ] ∩ It (M (x, Y ))L[x] =
(FY )L[x′1 , . . . , x′m−v+1 ]. Thus R(U )[x′1 , . . . , x′m−v+1 ]∩It (M (x, Y ))R(U )[x] = (FY )R(U )[x′1 , . . . , x′m−v+1 ]
since L is faithfully flat over R(U ). Thus we see that FY is the ground form of It (M (x, Y ))R[x]
[29, part 28]. Since FY is an irreducible polynomial in L[x′1 , . . . , x′m−v+1 ] and therefore in
R(U )[x′1 , . . . , x′m−v+1 ], we see by [29, part 31], that It (M (x, Y ))R[x] is a primary ideal.
On the other hand, since Y ∈ Q1 ∩Q2 , we see that ht(It (M (x, Y ))+ Jm−v (It (M (x, Y )))) > v.
Since It (M (x, Y )) is a primary ideal of height v, we see that
It (M (x, Y )) : Jm−v (It (M (x, Y ))) = It (M (x, Y )).
Therefore, by [11, Theorem 2.1], we see that It (M (x, Y )) is a radical ideal. Thus It (M (x, Y )) is a
prime ideal.
Now we show the following result.
Theorem 4.31 Suppose that m ≥ v + 2. Set O1 = Q ∩ P̃t and O2 = Q ∩ Atu×n×m . Then the
followings hold.
(1) O1 and O2 are disjoint open subsets of Ru×n×m and O1 6= ∅.
(2) O1 ∪ O2 is a dense subset of Ru×n×m .
(3) O 1 = Ctu×n×m = Ru×n×m \ Atu×n×m .
(4) If Y ∈ O1 ∪ O2 , then It (M (x, Y ))R[x] is a prime ideal of height v.
(5) If Y ∈ O1 , then I(V(It (M (x, Y )))) = It (M (x, Y )).
(6) If Y ∈ O2 , then I(V(It (M (x, Y )))) = (x1 , . . . , xm ).
16
Proof The set Atu×n×m is an open subset of Ru×n×m by Corollary 4.20 and P̃t is a nonempty
open subset of Ru×n×m with Atu×n×m ∩ P̃t = ∅ by Lemmas 4.21 and 4.25. Further Q is a Zariski
open subset. Thus (1) holds.
(2): Since Q and Atu×n×m ∪ P̃t are dense open subsets of Ru×n×m by Corollary 4.20 and
Lemma 4.25, we see that O1 ∪ O2 ⊃ Q ∩ (Atu×n×m ∪ Pt ) is also a dense open subset of Ru×n×m .
(3): Since Q is a dense subset of Ru×n×m , and P̃t is an open set, we see that O 1 = Q ∩ P̃t =
P̃t = Ctu×n×m by Lemma 4.25.
(4) follows from Lemma 4.30.
(5): Assume the contrary and take g ∈ I(V(It (M (x, Y )))) with g 6∈ It (M (x, Y )). Set J =
(g)R[x] + It (M (x, Y )). Then J ) It (M (x, Y ))R[x]. Since It (M (x, Y ))R[x] is a prime ideal of
height v by Lemma 4.30, we see that htJ > v and therefore R[x1 , . . . , xm−v ] ∩ J 6= (0).
Take 0 6= f ∈ J ∩ R[x1 , . . . , xm−v ]. Since Y ∈ P̃t , we can take P ∈ GL(u, R) such that
P Y ∈ Pt . Take b ∈ St (P Y ). Since O(b, P Y ) defined in Lemma 4.22 is an open set and f is a nonzero polynomial, we can take (a1 , . . . , am−v ) ∈ O(b, P Y ) with f (a1 , . . . , am−v ) 6= 0. On the other
hand, we see that there are am−v+1 , . . . , am ∈ R such that It (M (a, Y )) = It (P M (a, Y )) =
It (M (a, P Y )) = (0) by Lemma 4.22, where a = (a1 , . . . , am ). Thus by assumption, we see
that g(a) = 0. This contradicts to the fact that f ∈ J = (g)R[x] + It (M (x, Y ))R[x] and
f (a1 , . . . , am−v ) 6= 0.
Finally, (6) is clear from the definition of Atu×n×m .
5
Monomial preorder
In this section, we introduce the notion of monomial preorder and prove a result about ideals of
minors by using it.
First we recall the notion of preorder.
Definition 5.1 Let S be a nonempty set and a binary relation on S. We say that is a
preorder on S or (S, ) is a preordered set if the following two conditions are satisfied.
(1) a a for any a ∈ S.
(2) a b, b c ⇒ a c.
If moreover,
(3) a b or b a for any a, b ∈ S.
is satisfied, then we say that (S, ) is a totally preordered set or is a total preorder.
Notation Let (S, ) be a preordered set. We denote by b a the fact a b. We denote by a ≺ b
or by b ≻ a the fact that a b and b a. We also denote by a ∼ b the fact that a b and b a.
Remark 5.2 The binary relation ∼ defined above is an equivalence relation and if a ∼ a′ and
b ∼ b′ , then
a b ⇐⇒ a′ b′ .
def
In particular, we can define a binary relation ≤ on the quotient set P = S/ ∼ by ā ≤ b̄ ⇐⇒ a b,
where ā is the equivalence class which a belongs to. It is easily verified that (P, ≤) is a partially
17
ordered set and (S, ) is a totally preordered set if and only if (P, ≤) is a totally ordered set. As
usual, we denote ā > b̄ the fact ā ≥ b̄ and ā 6= b̄.
Definition 5.3 Let x1 , . . . , xr be indeterminates. We denote the set of monomials or power
products of x1 , . . . , xr by PP (x1 , . . . , xr ). A monomial preorder on x1 , . . . , xr is a total preorder
on PP (x1 , . . . , xr ) satisfying the following conditions.
(1) 1 m for any m ∈ PP (x1 , . . . , xr ).
(2) For m1 , m2 , m ∈ PP (x1 , . . . , xr ),
m1 m2 ⇐⇒ m1 m m2 m.
Let ∼ be the equivalence relation on PP (x1 , . . . , xr ) defined by the monomial preorder . We
denote by P (x1 , . . . , xr ) the quotient set PP (x1 , . . . , xr )/ ∼ and by qdeg m the class of m in
P (x1 , . . . , xr ) and call it the quasi-degree of m, where m ∈ PP (x1 , . . . , xr ).
Remark 5.4 Our definition of monomial preorder may seem to be different from that of [19], but
it is identical except we allow m ∼ 1 for a monomial m 6= 1.
Example 5.5 (c.f. [19, Example 3.1]) Let x1 , . . . , xr be indeterminates, W = (w1 , . . . , ws )
an r × s matrix whose entries are real numbers such that the first nonzero entry of each row is
positive. If one defines
def
xa xb ⇐⇒ (a · w1 , . . . , a · ws ) ≤lex (b · w1 , . . . , b · ws ),
where · denotes the inner product and ≤lex denotes the lexicographic order, then is a monomial
preorder. In fact, one can prove by the same way as [28] that every monomial preorder is of this
type.
Definition 5.6 Let K be a field and x1 , . . . , xr indeterminates. If a monomial preorder on x1 ,
. . . , xr is defined, we say that K[x1 , . . . , xr ] is a polynomial ring with monomial preorder. Let f
be a nonzero element of K[x1 , . . . , xr ]. We say that f is a form if all the monomials appearing in
f have the same quasi-degree. We denote by qdeg f the quasi-degree of the monomials appearing
in f . Let g be a nonzero element of K[x1 , . . . , xr ]. Then there is a unique expression
g = g1 + g2 + · · · + gt
of g, where gi is a form for 1 ≤ i ≤ t and qdeg g1 > qdeg g2 > · · · > qdeg gt . We define the leading
form of g, denoted lf(g) as g1 .
Remark 5.7 Let K[x1 , . . . , xr ] be a polynomial ring with monomial preorder and f , g nonzero
elements of K[x1 , . . . , xr ]. Then lf(f g) = lf(f )lf(g).
Remark 5.8 It is essential to assume both implications in (2) of Definition 5.3. For example, let
x and y be indeterminates. We define total preorder on PP (x, y) by 1 ≺ y ≺ x and m1 ≺ m2 if
the total degree of m1 is less than that of m2 . Then it is easily verified that
(1) 1 ≺ m for any m ∈ PP (x, y) \ {1}.
18
(2) m1 m2 ⇒ m1 m m2 m.
Let f = x + y. Then lf(f ) = x while lf(f 2 ) = x2 + 2xy + y 2 6= x2 = (lf(f ))2 .
Definition 5.9 Let x1 , . . . , xr be indeterminates.
Suppose that a total preorder on
{x1 , . . . , xr } is defined.
Rewrite the set {x1 , . . . , xr } as follows.
{x1 , . . . , xr } =
{y11 , . . . , y1s1 , y21 , . . . , y2ss , . . . , yt1 , . . . , ytst }, s1 + · · · + st = r, y11 ∼ · · · ∼ y1s1 ≻ y21 ∼ · · · ∼
y2s2 ≻ · · · ≻ yt1 ∼ · · · ∼ ytst .
Qt Qsi aij
The lexicographic monomial preorder on PP (x1 , . . . , xr ) is defined as follows. i=1 j=1
yij
Qt Qsi bij
if
and
only
if
one
of
the
following
conditions
is
satisfied.
y
j=1 ij
i=1
Ps1
Ps1
•
j=1 a1j <
j=1 b1j .
Ps1
Ps1
Ps2
Ps2
•
j=1 a1j =
j=1 b1j and
j=1 a2j <
j=1 b2j .
Ps1
Ps1
Ps2
Ps2
Ps3
Ps3
•
j=1 a1j =
j=1 b1j ,
j=1 a2j =
j=1 b2j and
j=1 a3j <
j=1 b3j .
..
.
Ps1
Ps1
Ps2
Ps2
Pst−2
Pst−2
•
a1j =
j=1 at−2,j =
j=1 bt−2,j and
j=1 b1j ,
j=1 a2j =
j=1 b2j , . . .,
Pj=1
P
st−1
st−1
a
<
b
.
t−1,j
t−1,j
j=1
j=1
Ps1
Ps1
Ps2
Ps2
Pst−1
Pst−1
•
a1j =
b1j ,
a2j =
b2j , . . .,
at−1,j =
j=1
j=1 bt−1,j and
j=1
j=1
j=1
j=1
Pst
Pst
j=1 at,j ≤
j=1 bt,j .
Remark 5.10 Suppose that x1 , . . . , xr are indeterminates and total preorder on {x1 , . . . , xr }
is defined. Suppose also that
x1 ∼ · · · ∼ xm1 ≻ xm1 +1 ∼ · · · ∼ xm2 ≻ · · · ≻ xmt−1 +1 ∼ · · · ∼ xmt ,
mt = r. Then the lexicographic monomial preorder induced by this preorder on {x1 , . . . , xr } is the
one defined as in Example 5.5 by the r × t matrix whose j-th column has 1 in mj−1 + 1 through
mj -th position and 0 in others, where we set m0 = 0.
Definition 5.11 We set
k
[a1 , . . . , ai , . . . , an ] := [a1 , . . . , ai−1 , k, ai+1 , . . . , an ]
and
k
l
[a1 , . . . , ai , . . . , aj , . . . , an ] := [a1 , . . . , ai−1 , k, ai+1 , . . . , aj−1 , l, aj+1 , . . . , an ].
Lemma 5.12 Let K be a field, K[x1 , . . . , xr ] a polynomial ring with monomial preorder, S a subset
of {x1 , . . . , xr } and g1 , . . . , gt ∈ K[x1 , . . . , xr ]. Set L = K[S]. If lf(g1 ), . . . , lf(gt ) are linearly
independent over L, then g1 , . . . , gt are linearly independent over L.
Proof
Assume the contrary and suppose that
X
ci g i = 0
i
19
is a non-trivial relation where ci ∈ L and ci =
6 0 for any i which appears in the above sum. Then
X′
lf(ci )lf(gi ) = 0,
P′
where
runs through i’s with qdeg lf(ci gi ) are maximal. Since lf(ci ) ∈ L for any i, it contradicts
the assumption.
Lemma 5.13 (Plücker relations, see e.g. [4, (4,4) Lemma]) For every u × n-matrix M, u ≥
n, with entries in a commutative ring and all indices a1 , . . . , ak , bl , . . . , bn , c1 , . . . , cs ∈ {1, . . . , u}
such that s = n − k + l − 1 > n, t = n − k > 0 one has
X
sgn(i1 , . . . , is )[a1 , . . . , ak , ci1 , . . . , cit ]M [cit+1 , . . . , cis , bl , . . . , bn ]M = 0,
i1 <···<it
it+1 <···<is
{1,...,s}={i1 ,...,is }
where sgn(σ) is the signature of a permutation σ and the notations are defined in Definition 4.6.
An element a is called a non-zerodivisor if ab = 0 implies b = 0.
Lemma 5.14 Let A = A0 ⊕ A1 ⊕ · · · be a graded ring,
X
= (xij ) a u × n matrix with u > n and
X
1×n
entries in A1 and y = (y1 , . . . , yn ) ∈ A1 . Set X̃ =
and Γ = Γ(u × n). Suppose that
y
• δ = [1, 2, . . . , n]X is a non-zerodivisor of A,
• for any k1 and k2 with 1 ≤ k1 < k2 ≤ n,
δ X γX
(γ ∈ Γ),
n+1
[1, . . . , k2 , . . . , n]X γX
(γ ∈ Γ \ {δ}) and
n+1
[1, . . . , k1 , . . . , n]X γX
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n})
are linearly independent over A0 and
• In (X̃) = In (X),
where the notations are defined in Definition 4.6. Then, y is an A0 -linear combination of rows of
X.
X
X
Proof We denote γX̃ as γ and
as
for simplicity. Set
γ∈Γ
γ
u+1
[1, . . . , k , . . . , n] =
X
a(k)
γ γ
γ
and
n+1
u+1
[1, . . . , k1 , . . . , k2 , . . . , n] =
X
γ
20
1 ,k2 )
a(k
γ
γ
(k)
(k1 ,k2 )
where aγ , aγ
(k1 ,k2 )
(k)
∈ A. By considering the degree, we may assume that aγ , aγ
n+1
∈ A0 .
u+1
[1, . . . , k1 , . . . , k2 , . . . , n]X̃Cof(X ≤n )
=
=
n+1
u+1
det(Cof(X ≤n ))[1, . . . , k1 , . . . , k2 , . . . , n]
X
1 ,k2 )
δ n−1
a(k
γ,
γ
γ
where Cof(X ≤n ) denotes the matrix of cofactors of X ≤n . On the other hand, since
δ
δ
..
.
δ
n+1
n+1
≤n
n+1
X̃Cof(X ) = [ 1 , 2 . . . , n] [1, 2 , . . . , n] · · · [1, 2, . . . , n ] ,
n+2
n+2
[ 1 , 2 . . . , n] [1, 2 , . . . , n] · · · [1, 2, . . . , n+2
n
]
..
..
..
..
.
.
.
.
u+1
u+1
[ 1 , 2 . . . , n]
···
[1, 2 , . . . , n]
u+1
[1, 2, . . . , n ]
we see that
n+1
=
u+1
[1, . . . , k1 , . . . , k2 , . . . , n]X̃Cof(X ≤n )
n+1
n+1
[1,
.
.
.
,
k
,
.
.
.
,
n]
[1,
.
.
.
,
k
,
.
.
.
,
n]
1
2
.
δ n−2 det
u+1
u+1
[1, . . . , k1 , . . . , n] [1, . . . , k2 , . . . , n]
Since δ is a non-zerodivisor, we see that
X
1 ,k2 )
a(k
δγ
γ
γ
=
=
n+1
u+1
γ
=
n+1
u+1
[1, . . . , k1 , . . . , n][1, . . . , k2 , . . . , n] − [1, . . . , k2 , . . . , n][1, . . . , k1 , . . . , n]
X
X
n+1
n+1
aγ(k2 ) [1, . . . , k1 , . . . , n]γ −
aγ(k1 ) [1, . . . , k2 , . . . , n]γ
γ
(k )
−aδ 1 δ[1, . . . ,
n+1
k2 , . . . , n]
−
n+1
X
aγ(k1 ) [1, . . . , k2 , . . . , n]γ
γ∈Γ\{δ}
n+1
(k )
+aδ 2 δ[1, . . . , k1 , . . . , n]
X
+
suppγ∩{1,...,n}={1,...,k̂2 ,...,n}
+
X
n+1
aγ(k2 ) [1, . . . , k1 , . . . , n]γ
suppγ6⊃{1,...,k̂2 ,...,n}
21
n+1
aγ(k2 ) [1, . . . , k1 , . . . , n]γ
Suppose that suppγ ∩ {1, . . . , n} = {1, . . . , k̂2 , . . . , n}. Then γ = [1, . . . , k̂2 , . . . , n, l] for some l
l
with n + 1 ≤ l ≤ u. Thus γ = (−1)n−k2 [1, . . . , k2 , . . . , n]. By applying Lemma 5.13 to
l
n+1
[1, . . . , k2 , . . . , n][1, . . . , k1 , . . . , n],
by substituting u, n, k, s, l by u, n, k1 − 1, n + 1, k1 + 1 respectively, we see that
l
n+1
[1, . . . , k2 , . . . , n][1, . . . , k1 , . . . , n]
n+1
l
n+1
l
n+1
l
=
δ[1, . . . , k1 . . . , k2 , . . . , n] + [1, . . . , k2 , . . . , n][1, . . . , k1 , . . . , n]
=
δ[1, . . . , k1 . . . , k2 , . . . , n] + (−1)n−k1 [1, . . . , k2 , . . . , n][1, . . . , k̂1 , . . . , n, l]
n+1
Therefore, if we set
bγ(k1 )
=
(
(k )
(k1 )
2
− (−1)k2 −k1 a[1,...,
k̂
aγ
if γ = [1, . . . , k̂1 . . . , n, l]
2 ,...,n,l]
(k )
aγ 1
otherwise
for γ ∈ Γ \ {δ}, we see that there are bγ ∈ A0 such that
X
X
bγ δγ −
γ
n+1
bγ(k1 ) [1, . . . , k2 , . . . , n]γ
γ∈Γ\{δ}
n+1
X
+
aγ(k2 ) [1, . . . , k1 , . . . , n]γ = 0.
suppγ6⊃{1,...,k̂2 ,...,n}
Thus we see, by the assumption, that
bγ(k1 ) = 0 if γ ∈ Γ \ {δ}
and
aγ(k2 ) = 0
(k1 )
Therefore, by the definition of bγ
if suppγ 6⊃ {1, . . . , k̂2 , . . . , n}.
, we see that
(k )
(k )
1
(−1)n−k1 a[1,...,
k̂
1 ,...,n,l]
2
= (−1)n−k2 a[1,...,
k̂
2 ,...,n,l]
and
aγ(k1 ) = 0
if suppγ 6⊃ {1, . . . , k̂1 , . . . , n}.
Since these hold for any k1 , k2 with 1 ≤ k1 < k2 ≤ n, we see that if we set
(n)
cl = a[1,...,n−1,l]
for l with n + 1 ≤ l ≤ u,
u+1
(k)
[1, . . . , k , . . . , n] = aδ δ + (−1)n−k
u
X
cl [1, . . . , k̂, . . . , n, l]
l=n+1
(k)
= aδ δ +
u
X
l=n+1
22
l
cl [1, . . . , k, . . . , n]
for any k with 1 ≤ k ≤ n.
Set
z=y−
n
X
(s)
aδ X =s
−
s=1
and
u
X
cl X =l
l=n+1
X
Z=
.
z
Then
u+1
[1, . . . , k , . . . , n]Z
u+1
= [1, . . . , k , . . . , n]X̃ −
n
X
s
(s)
aδ [1, . . . k, . . . n]X −
s=1
= 0
u
X
l
cl [1, . . . k, . . . n]X
l=n+1
for any k with 1 ≤ k ≤ n. Thus zCof(X ≤n ) = 0 and we see that z = 0 since det Cof(X ≤n ) = δ n−1
is a non-zerodivisor.
Lemma 5.15 Let L be a field, n, m integers with n ≥ m ≥ 3, x1 , . . . , xm indeterminates and α,
β ∈ L with 0 6= α 6= β 6= 0. Then the following polynomials are linearly independent over L.
x2n
1
x2n−1
(x2 − βxm )
1
x2n−1
xs (3 ≤ s ≤ m − 1)
1
xn1 (x2 − αxm )(x2 − βxm )xb1 · · · xbn−2 (1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2)
xn1 (x2 − αxm )xb1 · · · xbn−2 xs (1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2, 3 ≤ s ≤ m − 1)
xn1 xb1 · · · xbn (1 ≤ b1 ≤ · · · ≤ bn ≤ m − 1, bn−1 ≥ 3)
x2n−2
(x2 − βxm )2
1
x2n−2
(x2 − βxm )xs (3 ≤ s ≤ m − 1)
1
n−1
x1 (x2 − αxm )(x2 − βxm )2 xb1 · · · xbn−2
x1n−1 (x2
x1n−1 (x2
x1n−2 (x2
x1n−2 (x2
x1n−2 (x2
− αxm )(x2 − βxm )xb1 · · · xbn−2 xs
− βxm )xb1 · · · xbn
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2)
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2, 3 ≤ s ≤ m − 1)
(1 ≤ b1 ≤ · · · ≤ bn ≤ m − 1, bn−1 ≥ 3)
2
− αxm ) (x2 − βxm )2 xb1 · · · xbn−2
2
− αxm ) (x2 − βxm )xb1 · · · xbn−2 xs
− αxm )(x2 − βxm )xb1 · · · xbn
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2)
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2, 3 ≤ s ≤ m − 1)
(1 ≤ b1 ≤ · · · ≤ bn ≤ m − 1, bn−1 ≥ 3)
Proof Set deg x1 = deg x2 = deg xm = 0 and deg x3 = · · · = deg xm−1 = 1. Then the
polynomials under consideration are homogeneous. Thus it is enough to show that for each integer
d, the polynomials of degree d in the above list are linearly independent over L.
First consider the polynomials with degree more than 1. They are
xn1 xb1 · · · xbn
x1n−1 (x2
x1n−2 (x2
(1 ≤ b1 ≤ · · · ≤ bn ≤ m − 1, bn−1 ≥ 3)
− βxm )xb1 · · · xbn (1 ≤ b1 ≤ · · · ≤ bn ≤ m − 1, bn−1 ≥ 3)
− αxm )(x2 − βxm )xb1 · · · xbn (1 ≤ b1 ≤ · · · ≤ bn ≤ m − 1, bn−1 ≥ 3).
23
By first substituting β −1 x2 to xm and next by substituting α−1 x2 to xm one sees that these
polynomials are linearly independent.
Next consider the polynomials with degree 1. They are
x2n−1
xs (3 ≤ s ≤ m − 1)
1
xn1 (x2 − αxm )xb1 · · · xbn−2 xs
(x2 − βxm )xs
x2n−2
1
n−1
x1 (x2 − αxm )(x2
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2, 3 ≤ s ≤ m − 1)
(3 ≤ s ≤ m − 1)
− βxm )xb1 · · · xbn−2 xs
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2, 3 ≤ s ≤ m − 1)
x1n−2 (x2 − αxm )2 (x2 − βxm )xb1 · · · xbn−2 xs
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2, 3 ≤ s ≤ m − 1).
By a similar but more subtle argument as above, one sees that these polynomials are linearly
independent.
Finally consider the polynomials with degree 0. They are
x2n
1
x2n−1
(x2 − βxm )
1
n
x1 (x2 − αxm )(x2 − βxm )xb1 · · · xbn−2
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2)
x2n−2
(x2 − βxm )2
1
n−1
x1 (x2 − αxm )(x2 − βxm )2 xb1 · · · xbn−2
x1n−2 (x2 − αxm )2 (x2 − βxm )2 xb1 · · · xbn−2
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2)
(1 ≤ b1 ≤ · · · ≤ bn−2 ≤ 2)
By a similar but more subtle argument, one sees that these polynomials are linearly independent.
Lemma 5.16 Let K be a field, T = (T1 ; · · · ; Tm ) = (tijk ) a u × n × m-tensor of indeterminates
with u > n ≥ m ≥ u − n + 2, x = (x1 , . . . , xm ) a vector of indeterminates. Set X = M (x, T ) (c.f.
Definition 4.6), Γ = Γ(u × n), δ = δ0 = [1, . . . , n] and A = K[T ][x]. Then δX is a non-zerodivisor
of A and for any k1 , k2 with 1 ≤ k1 , k2 ≤ n, k1 6= k2 ,
δ X γX
(γ ∈ Γ)
n+1
[1, . . . , k2 , . . . , n]X γX
(γ ∈ Γ \ {δ})
n+1
[1, . . . , k1 , . . . , n]X γX
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n})
are linearly independent over K[T ].
Proof The first assertion is clear since A is an integral domain and δX 6= 0. Next we prove
the second assertion. By symmetry, we may assume that k1 = n − 1 and k2 = n. Set δ1 =
[1, 2, . . . , n − 1, n + 1] and δ2 = [1, 2, . . . , n − 2, n, n + 1]. We introduce the lexicographic monomial
preorder induced by the preorder on the indeterminates defined as follows.
If one of the following is satisfied, we define tijk ≻ ti′ j ′ k′ .
24
• i < i′ .
• i = i′ and j < j ′ .
• i = i′ , j = j ′ , k < k ′ and “i < j or i > j + u − n”.
In case 0 ≤ i − j ≤ u − n and (i, j) 6= (n, n − 1), (n + 1, n), we define
ti,j,i−j+1 ≻ ti,j,i−j+2 ≻ · · · ≻ ti,j,m ≻ ti,j,1 ≻ · · · ≻ ti,j,i−j .
In case (i, j) = (n, n − 1) or (n + 1, n), we define
ti,j,2 ∼ ti,j,m ≻ ti,j,1 ≻ ti,j,3 ≻ · · · ≻ ti,j,m−1 .
And
tijk ≻ x1 ∼ x2 ∼ · · · ∼ xm
for any i, j and k.
Set
Γ0 = {[a1 , . . . , an ] ∈ Γ | an−1 = n − 1},
Γ1 = {[a1 , . . . , an ] ∈ Γ | an−1 = n},
Γ2 = {[a1 , . . . , an ] ∈ Γ | an−1 ≥ n + 1},
Γ00 = {[a1 , . . . , an ] ∈ Γ0 | an = n} = {δ0 },
Γ01 = {[a1 , . . . , an ] ∈ Γ0 | an = n + 1} = {δ1 },
Γ02 = {[a1 , . . . , an ] ∈ Γ0 | an ≥ n + 2},
Γ11 = {[a1 , . . . , an ] ∈ Γ1 | an = n + 1} = {δ2 },
Γ12 = {[a1 , . . . , an ] ∈ Γ1 | an ≥ n + 2}.
Then
Γ = Γ0 ⊔ Γ1 ⊔ Γ2
Γ0 = Γ00 ⊔ Γ01 ⊔ Γ02
Γ1 = Γ11 ⊔ Γ12 .
Set α1 = tn,n−1,2 , α2 = tn,n−1,m , β1 = tn+1,n,2 and β2 = tn+1,n,m . Then for γ = [a1 , . . . , an ] ∈ Γ,
lf(γX ) is, up to multiplication of nonzero element of K[T ], as follows.
xn1
if γ ∈ Γ00
x1n−1 (β1 x2 + β2 xm ) if γ ∈ Γ01
x1n−1 xan −n+1 if γ ∈ Γ02
xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )(β1 x2 +β2 xm ) if γ ∈ Γ11
xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )xan −n+1 if γ ∈ Γ12
xa1 xa2 −1 · · · xan −n+1
if γ ∈ Γ2 .
25
Therefore, for γ = [a1 , . . . , an ] ∈ Γ, lf(δX γX ) is, up to multiplication of nonzero element of K[T ],
x2n
1
if γ ∈ Γ00
x2n−1
(β1 x2 + β2 xm ) if γ ∈ Γ01
1
2n−1
x1
xan −n+1 if γ ∈ Γ02
xn1 xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )(β1 x2 +β2 xm ) if γ ∈ Γ11
xn1 xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )xan −n+1 if γ ∈ Γ12
xn1 xa1 xa2 −1 · · · xan −n+1
if γ ∈ Γ2 .
For γ = [a1 , . . . , an ] ∈ Γ \ {δ}, lf((δ1 )X γX ) is, up to multiplication of nonzero element of K[T ],
x2n−2
(β1 x2 + β2 xm )2
1
if γ ∈ Γ01
2n−2
x1
(β1 x2 + β2 xm )xan −n+1 if γ ∈ Γ02
n−1
x1 xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )(β1 x2 +β2 xm )2 if γ ∈
x1n−1 xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )(β1 x2 +β2 xm )xan −n+1
x1n−1 (β1 x2 +β2 xm )xa1 xa2 −1 · · · xan −n+1 if γ ∈ Γ2 .
Γ11
if γ ∈ Γ12
Finally, consider the leading form of (δ2 )X γX , where γ = [a1 , . . . , an ] ∈ Γ and suppγ 6⊃ {1, . . . , n −
1}. It is easily verified that suppγ 6⊃ {1, . . . , n − 1} if and only if γ ∈ Γ1 ⊔ Γ2 . Thus the leading
form of (δ2 )X γX is, up to multiplication of nonzero element of K[T ],
x1n−2 xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )2 (β1 x2 +β2 xm )2
if γ ∈ Γ11
x1n−2 xa1 xa2 −1 · · · xan−2 −n+3 (α1 x2 + α2 xm )2 (β1 x2 +β2 xm )xan −n+1
x1n−2 (α1 x2 + α2 xm )(β1 x2 +β2 xm )xa1 xa2 −1 · · · xan −n+1 if γ ∈ Γ2 .
if γ ∈ Γ12
Since
1 ≤ a1 ≤ a2 − 1 ≤ · · · ≤ an − n + 1 ≤ u − n + 1 ≤ m − 1
an−2 − n + 3 ≤ 2 if γ ∈ Γ1
an−1 − n + 2 ≥ 3 if γ ∈ Γ2
and
an − n + 1 ≥ 3 if γ ∈ Γ02 ⊔ Γ12 ,
we see by Lemma 5.15 that
lf(δX γX ) (γ ∈ Γ)
lf((δ1 )X γX ) (γ ∈ Γ \ {δ})
lf((δ2 )X γX )
(γ ∈ Γ, suppγ 6⊃ {1, . . . , n − 1})
are linearly independent over K[T ]. The assertion follows by Lemma 5.12.
Corollary 5.17 Let K be a field, T a u × n × m tensor of indeterminates with u > n ≥ m ≥
u − n + 2, R a commutative ring containing K(T ), x = (x1 , . . . , xm ) a vector of indeterminates.
26
Set M = M (x, T ) (c.f. Definition 4.6) and B = R[x]. Then δM is a non-zerodivisor of B and for
any k1 , k2 with 1 ≤ k1 , k2 ≤ n, k1 6= k2 ,
δ M γM
(γ ∈ Γ)
n+1
[1, . . . , k2 , . . . , n]M γM
(γ ∈ Γ \ {δ})
n+1
[1, . . . , k1 , . . . , n]M γM
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n})
are linearly independent over R.
Proof Set A = K[T ][x]. Then B = A ⊗K[T ] R.
Since R is flat over K[T ], we see that B is flat over A. By Lemma 5.16, we see that δM is a
non-zerodivisor of A and for any k1 , k2 with 1 ≤ k1 , k2 ≤ n, k1 6= k2 ,
δ M γM
(γ ∈ Γ)
n+1
[1, . . . , k2 , . . . , n]M γM
(γ ∈ Γ \ {δ})
n+1
[1, . . . , k1 , . . . , n]M γM
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n})
are linearly independent over K[T ]. Since R (resp. B) is flat over K[T ] (resp. A), we see that δM
is a non-zerodivisor of B and for any k1 , k2 with 1 ≤ k1 , k2 ≤ n, k1 6= k2 ,
δ M γM
(γ ∈ Γ)
n+1
[1, . . . , k2 , . . . , n]M γM
(γ ∈ Γ \ {δ})
n+1
[1, . . . , k1 , . . . , n]M γM
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n})
are linearly independent over R.
Corollary 5.18 Let x = (x1 , . . . , xm ) be a vector of indeterminates. Suppose that u > n and
Y ∈ I (c.f. Definition 4.15) and set M = M (x, Y ). Then δM is a non-zerodivisor of R[x] and
for any k1 , k2 with 1 ≤ k1 , k2 ≤ n, k1 6= k2 ,
δ M γM
(γ ∈ Γ)
n+1
[1, . . . , k2 , . . . , n]M γM
(γ ∈ Γ \ {δ})
n+1
[1, . . . , k1 , . . . , n]M γM
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n})
are linearly independent over R.
Definition 5.19 Let x = (x1 , . . . , xm ) be a vector of indeterminates.
{Y
∈
Ru×n×m
|
δM
6=
0 and δM γM
(γ ∈ Γ),
n+1
[1, . . . , k1 , . . . , n]M γM
We set Q ′ :=
n+1
[1, . . . , k2 , . . . , n]M γM
(γ ∈ Γ \ {δ}),
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n}) are linearly independent over R for
any k1 , k2 with 1 ≤ k1 < k2 ≤ n, where M = M (x, Y )}.
27
Remark 5.20 Q ′ is a Zariski open set of Ru×n×m and by Corollary 5.18, we see that Q ′ ⊃ I .
In particular, Q ′ is a Zariski dense open subset of Ru×n×m .
By Lemma 5.14, we see the following fact.
Proposition 5.21 Let u, n and m be integers with u > n ≥ m ≥ u−n+2 and let x = (x1 , . . . , xm )
be a vector of indeterminates. Suppose that Y ∈ Q ′ and y ∈ R1×n×m . Set
Y
Ỹ =
.
y
If In (M (x, Ỹ )) = In (M (x, Y )), then fl1 (y) is an R-linear combination of rows of fl1 (Y ).
Proof Set M = M (x, Y ). Since R[x] is a domain and δM 6= 0 by the definition of Q ′ , we see
that δM is a non-zerodivisor of R[x]. Moreover,
δ M γM
(γ ∈ Γ)
n+1
[1, . . . , k2 , . . . , n]M γM
(γ ∈ Γ \ {δ})
n+1
[1, . . . , k1 , . . . , n]M γM
(γ ∈ Γ, suppγ 6⊃ {1, . . . , k̂2 , . . . , n})
are linearly independent over R for any k1 , k2 with 1 ≤ k1 < k2 ≤ n by the definition of Q ′ . Thus
by Lemma 5.14, we see that M (x, y) is an R-linear combination of rows of M = M (x, Y ). Since
x1 , . . . , xm are indeterminates, we see that fl1 (y) is an R-linear combination of rows of fl1 (Y ).
6
Tensor with rank p
Let 3 ≤ m ≤ n, (m − 1)(n − 1) + 1 ≤ p ≤ (m − 1)n and set l = (m − 1)n − p and u = n + l. In the
following of this paper, we use the results of the previous sections by setting t = n. See Definition
4.6. Then v = l + 1 and it follows that v < m since l ≤ m − 2. Note also u + p = nm. We make
bunch of definitions used in the sequel of this paper.
Definition 6.1 We put
V = V n×p×m := {T ∈ Rn×p×m | fl2 (T )≤p is nonsingular}
and define σ : V → Ru×p be a map defined as
σ(T ) = (p< fl2 (T ))(fl2 (T )≤p )−1 .
We denote by A u×n×m the set of all u × n × m absolutely full column rank tensors and put
C
= Ru×n×m \ A u×n×m . Note that A u×n×m = Anu×n×m and C u×n×m = Cnu×n×m in the
notation of Definition 4.15.
Let M be the subset of Ru×nm consisting of all matrices W = (W1 , . . . , Wm ) satisfying that
there are A = (a1 , . . . , ap ) ∈ Rn×p and p × p diagonal matrices D1 , . . . , Dm such that Dk =
u×n×m
28
Diag(d1k , . . . , dpk ) for 1 ≤ k ≤ m, (dj1 W1 + · · · + djm Wm )aj = 0 for 1 ≤ j ≤ p, and
AD1
..
.
ADm−2
A≤n−l Dm−1
(6.1)
is nonsingular. Let ι : Ru×p → Ru×nm be a map which sends A to (A, −Eu ). Moreover put
C := {W ∈ Ru×nm | W ∈
/ fl1 (A u×n×m )} = {W ∈ Ru×n×m | W ∈ fl1 (C u×n×m )}.
We define φ : R1×m × Rn → Rp a map defined as
a1 b
a2 b
φ(a, b) =
∈ Rp , where a = (a1 , . . . , am−1 , am ).
..
.
am−1 b≤n−l
Recall that the set A u×n×m is an open subset of Ru×n×m by Lemma 3.3 or Corollary 4.20.
Proposition 6.2 σ is an open, surjective and continuous map.
Proof Clearly σ is surjective and continuous. Let O be an open subset of V and let h : Rnm×p →
Rp×p ×Ru×p be a homeomorphism defined as h(M ) = (M ≤p , p< M ). Then h(fl2 (O)) can be written
by
[
O1,λ × O2,λ
λ
for some open subsets O1,λ ⊂ R
p×p
and O2,λ ⊂ Ru×p and thus
[ [
σ(O) =
O2,λ A−1 .
λ A∈O1,λ
The set O2,λ A−1 is open and then σ(O) is open.
The following fact follows from the definition.
Lemma 6.3 M is stable under the action of GL(u, R).
Lemma 6.4 M ⊂ C.
By observing the first
column of (6.1),
we see that a1 6= 0 and at least one of d11 , d12 ,
AD1
..
.
. . . , d1,m−1 is nonzero, since
is nonsingular, where Dk = Diag(d1k , . . . , dpk ) for
ADm−2
A≤n−l Dm−1
1 ≤ k ≤ m − 1. Since d11 W1 + · · · + d1m Wm is singular, (W1 ; . . . ; Wm ) is not absolutely full column
rank, i.e., M ⊂ C.
Proof
29
Theorem 6.5 Let X ∈ V ⊂ Rn×p×m . Put (W1 , . . . , Wm−1 , Wm ) = ι(σ(X)), where W1 , . . . , Wm ∈
Ru×n . The following four statements are equivalent.
(1) rank X = p.
(2) There are an n × p matrix A, and diagonal p × p matrices D1 , . . . , Dm such that
W1 AD1 + W2 AD2 + · · · + Wm−1 ADm−1 + Wm ADm = O
and
N =
is nonsingular.
AD1
..
.
ADm−2
A≤n−l Dm−1
(6.2)
(6.3)
(3) ι(σ(X)) ∈ M.
Proof It holds that rank X ≥ p, since fl2 (X)≤p has rank p. Put (S1 ; . . . ; Sm ) = X(fl2 (X)≤p )−1
Then rank X = rank(S1 ; . . . ; Sm ) and
n−l<
Sm−1
= (W1 , W2 , . . . , Wm−2 , (Wm−1 )≤n−l ).
Sm
(1) ⇒ (2): Since rank(S1 ; . . . ; Sm ) = p, there are an n × p-matrix A, a p × p-matrix Q, and
p × p diagonal matrices D1 , . . . , Dm such that
ADk Q = Sk
Since
AD1
..
.
for k = 1, . . . , m.
S1
..
.
NQ =
= Ep ,
Q =
Sm−2
ADm−2
(Sm−1 )≤n−l
A≤n−l Dm−1
we see that N and Q are nonsingular and Q−1 = N . Since
n−l<
Sm−1
= σ(X) = (W1 , W2 , . . . , Wm−2 , (Wm−1 )≤n−l ),
Sm
and ADk = Sk N for k = m − 1, m, we see that
=
=
=
Ou×p
n−l<
n−l<
Sm−1
ADm−1
N−
Sm
ADm
W1 AD1 + · · · + Wm−2 ADm−2
−El n−l<
O
≤n−l
+(Wm−1 )≤n−l A
Dm−1 +
ADm
ADm−1 +
O
−En
W1 AD1 + · · · + Wm−2 ADm−2 + Wm−1 ADm−1 + Wm ADm .
30
Therefore the equation (6.2) holds.
(2) ⇒ (1): Set Q = N −1 . Then, since N Q = Ep , we see that
ADk Q = Sk
and
1≤k ≤m−2
≤n−l
A≤n−l Dm−1 Q = Sm−1
.
Furthermore, since
W1 AD1 + · · · + Wm−2 ADm−2
+(Wm−1 )≤n−l A≤n−l Dm−1 +
=
=
we see that
Thus
W1 AD1 + · · · + Wm ADm
Ou×p ,
−El n−l<
O
ADm
ADm−1 +
O
−En
n−l<
Sm−1
El n−l<
O
N=
ADm .
ADm−1 +
Sm
O
En
n−l<
Sm−1
ADm−1
Q=
Sm
ADm
n−l<
and we see that ADk Q = Sk for k = m − 1, m. Therefore, rank X = rank(S1 ; . . . ; Sm ) ≤ p and we
see (1).
Finally it is easy to see that (2) ⇔ (3).
Since M ⊂ C by Lemma 6.4, we see the following:
Proposition 6.6 For X ∈ V , if rank X = p, then ι(σ(X)) 6∈ fl1 (A u×n×m ).
7
Contribution of absolutely full column rank property
Let m, n and p be integers with 3 ≤ m ≤ n and (m − 1)(n − 1) + 1 ≤ p ≤ (m − 1)n. We set
u = nm − p and t = n and use the results of Sections 4 and 5. Note v = u − n + 1 = (m − 1)n − p + 1
in the notation of Definition 4.6.
It is known that the generic rank grank(n, p, m) of n × p × m tensors over C is equal to p ([5,
Theorem 3.1] or [6, Theorem 2.4 and Remark 2.5]) and it is also equal to the minimal typical rank
of n × p × m tensors over R. Thus if we discuss the plurality of typical ranks, it is enough to
consider whether there exists a typical rank that is greater than p or not.
Definition 7.1 We set A := ι−1 (fl1 (A u×n×m )) ⊂ Ru×p , where ι and A u×n×m are defined in
Definition 6.1.
Lemma 7.2 If Y ∈ V n×p×m and σ(Y ) ∈ A, then rank Y > p.
Proof
This follows from the fact that rank Y ≥ p if Y ∈ V n×p×m and Proposition 6.6.
31
Theorem 7.3 If A u×n×m 6= ∅, then there are plural typical ranks of n × p × m tensors over R.
Proof By Lemma 3.5, we see that A 6= ∅. Since A u×n×m is an open subset of Ru×n×m , we see
that A is an open subset of Ru×p . Moreover, since σ : V n×p×m → Ru×p is a surjective continuous
map, we see that σ −1 (A) is a nonempty open subset of V n×p×m . Thus, there is a typical rank
greater than p by Lemma 7.2.
Since p is a typical rank of n × p × m tensors over R, we see that there are plural typical ranks
of n × p × m tensors over R.
From now on until the end of this section, we assume that p ≥ (m − 1)(n − 1) + 2. Thus,
m ≥ v + 2.
Definition 7.4 Let Y ∈ Ru×n×m and let x = (x1 , . . . , xm ) be a vector of indeterminates. For i1 ,
. . . , in−1 ∈ {1, . . . , u}, we set
(−1)n+1 [i1 , . . . , in−1 | 2, . . . , n − 1, n]M(x,Y )
(−1)n+2 [i1 , . . . , in−1 | 1, 3, . . . , n − 1, n]M(x,Y )
ψi1 ,...,in−1 (x, Y ) :=
∈ R[x]n .
..
.
(−1)2n [i1 , . . . , in−1 | 1, . . . , n − 2, n − 1]M(x,Y )
We define ψ̂i1 ,...,in−1 : R1×m ×
For the definition [a1 , . . . , at | b1 , . . . , bt ], see Definition 4.6.
Ru×n×m → R[x]p by
x1 ψi1 ,...,in−1 (x, Y )
x2 ψi1 ,...,in−1 (x, Y )
..
.
≤p
ψ̂i1 ,...,in−1 (x, Y ) :=
xm−1 ψi1 ,...,in−1 (x, Y )
∈ R[x]p .
We also define the R-vector space U (Y ) by
U (Y ) := hψ̂i1 ,...,in−1 (u, Y ) |
u ∈ V(In (M (x, Y ))),
i ⊂ Rp .
i1 , . . . , in−1 ∈ {1, . . . , u}
For c = (c11 , . . . , cn1 , c12 , . . . , cn2 , . . . , c1m , . . . , cnm ) ∈ R
1×nm
, we set Zk =
1 ≤ k ≤ m, Z = (Z1 ; . . . ; Zm ) ∈ R(u+1)×n×m and
c1k
Yk
· · · cnk
for
gi1 ,...,in−1 (x, Y, c) = [i1 , . . . , in−1 , u + 1]M(x,Z)
for any i1 , . . . , in−1 ∈ {1, . . . , u}. For the definition [i1 , . . . , in−1 , u + 1]M(x,Z) , see Definition 4.6.
Lemma 7.5 Suppose that Y ∈ Ru×n×m . Then the following claims are equivalent.
(1) dim U (Y ) = p.
(2) If c ∈ R1×nm satisfies the following conditions, then c = 0.
(∗)
p< c
= 0 and
32
(∗∗) gi1 ,...in−1 (u, Y, c) = 0 for any u ∈ V(In (M (x, Y ))) and any i1 , . . . , in−1 ∈ {1, . . . , u}.
Proof
The vector d ∈ Rp is perpendicular to U (Y ) if and only if d is perpendicular to
ψ̂i1 ,...,in−1 (u, Y ) for any u ∈ V(In (M (x, Y ))) and any i1 , . . . , in−1 . Since the inner product of
ψ̂i1 ,...,in (u, Y ) with d is gi1 ,...,in−1 (u, Y, (d⊤ , 0)), the result follows.
Next we show the following result. For the definition of M, see Definition 6.1.
Lemma 7.6 If dim U (Y ) = p, then fl1 (Y ) ∈ M.
Proof Set Y = (Y1 ; . . . ; Ym ). Suppose that dim U (Y ) = p. Then there are u1 , . . . , up ∈
V(In (M (x, Y ))) and t11 , . . . , t1,n−1 , . . . , tp1 , . . . , tp,n−1 such that
ψ̂t11 ,...,t1,n−1 (u1 , Y ), . . . , ψ̂tp1 ,...,tp,n−1 (up , Y )
are linearly independent over R. Set uj = (uj1 , . . . , ujm ) for 1 ≤ j ≤ p, Dk = Diag(u1k , . . . , upk )
for 1 ≤ k ≤ m and
A = (ψt11 ,...,t1,n−1 (u1 , Y ), . . . , ψtp1 ,...,tp,n−1 (up , Y )).
Then,
≤p
AD1
..
.
=
= (ψ̂t11 ,...,t1,n−1 (u1 , Y ), . . . , ψ̂tp1 ,...,tp,n−1 (up , Y ))
ADm−2 ADm−2
A≤n−l Dm−1
ADm−1
AD1
..
.
is a nonsingular matrix and
[1, tj1 , . . . , tj,n−1 ]M(uj ,Y )
[2, tj1 , . . . , tj,n−1 ]M(uj ,Y )
(uj1 Y1 + · · · + ujm Ym )ψtj1 ,...,tj,n−1 (uj , Y ) =
=0
..
.
[u, tj1 , . . . , tj,n−1 ]M(uj ,Y )
since In (M (uj , Y )) = (0) for 1 ≤ j ≤ p.
Definition 7.7 Set U := {Y ∈ Ru×n×m | p< fl1 (Y ) is nonsingular}, O3 := U ∩ Q ∩ Q ′ ∩ P̃n =
O1 ∩ U ∩ Q ′ and O4 := U ∩ Q ∩ Q ′ ∩ A u×n×m = O2 ∩ U ∩ Q ′ , where Q, Q ′ and P̃n are the
ones defined in Definitions 4.27, 5.19, and 4.24 and O1 and O2 are the ones in Theorem 4.31 under
t = n. Define ν : U → Ru×p as ν(Y ) := −(p< fl1 (Y ))−1 fl1 (Y )≤p for i = 1, 2, where σ is the one
defined in Definition 6.1. Set Oi = ν(Oi+2 ) ⊂ Ru×p and Ti = σ −1 (Oi )⊂ V n×p×m for i = 1, 2.
The following fact is immediately verified.
Lemma 7.8 ι(ν(Y )) = fl1 (−(p< fl1 (Y ))−1 Y ).
By the same way as Theorem 4.31 (1), (2) and (3), we see the following fact.
Lemma 7.9 Then the followings hold.
33
(1) O3 and O4 are disjoint open subsets of Ru×n×m and O3 is nonempty.
(2) O3 ∪ O4 is a dense subset of Ru×n×m .
(3) O3 = C u×n×m = Ru×n×m \ A u×n×m .
Lemma 7.10 fl1 (O3 ) ⊂ M.
Proof Let Y ∈ O3 . By Lemmas 7.6 and 7.5, it is enough to show that if c ∈ R1×nm satisfies (∗)
and (∗∗), then c = 0.
Y
1×n
′
1×n×m
Set c = (c1 , . . . , cm ), where cj ∈ R
, c = (c1 ; · · · ; cm ) ∈ R
and Ỹ =
. Then by
c′
(∗∗), gi1 ,...,in−1 (x, Y, c) ∈ I(V(In (M (x, Y )))) for any i1 , . . . , in−1 ∈ {1, . . . , u}. Therefore, by the
definition of O3 and Theorem 4.31 (5), we see that gi1 ,...,in−1 (x, Y, c) ∈ In (M (x, Y )) for any i1 ,
. . . , in−1 ∈ {1, . . . , u}. Thus we see that In (M (x, Ỹ )) = In (M (x, Y )). Thus, by Proposition 5.21,
we see that fl1 (c) is an R-linear combination of rows of fl1 (Y ). Since p< c = 0 and Y ∈ U , we see
that c = 0.
By the same way as Proposition 6.2, we see the following:
Proposition 7.11 ν is an open, surjective and continuous map.
We see the following fact.
Lemma 7.12 Then the followings hold.
(1) Y ∈ A u×n×m if and only if ν(Y ) ∈ A for Y ∈ U .
(2) O1 and O2 are disjoint open subsets of Ru×p and O1 6= ∅.
(3) O1 ∪ O2 is a dense subset of Ru×p .
(4) O1 = Ru×p \ A.
(5) O2 ⊂ A and O2 = A.
Proof
(1): Suppose that Y ∈ U . Since A u×n×m and U are stable under the action
of GL(u, R), we see that Y ∈ A u×n×m if and only if −(p< fl1 (Y ))−1 Y ∈ A u×n×m . Since
ι(ν(Y )) = fl1 (−(p< fl1 (Y ))−1 Y ) and fl1 is a bijection, we see (1).
We see (2) by the facts that P̃n and A u×n×m are stable under the action of GL(u, R), Lemma
7.9, and Proposition 7.11. (3) also follows from Lemma 7.9 and Proposition 7.11. We see by (1)
that if Y ∈ O3 , then ν(Y ) 6∈ A. Thus O1 = ν(O3 ) ⊂ Ru×p \ A. Since O3 = Ru×n×m \ A u×n×m by
Lemmas 7.9 (3), we see that O1 ⊃ ν(O3 ∩ U ) = ν((Ru×n×m \ A u×n×m ) ∩ U ) = Ru×p \ A by (1)
and the surjectivity of ν. Thus we see (4). Therefore O2 ⊂ A by (2). Further, we see that O 2 ⊃ A
by (3) and (4). Thus we see (5).
Lemma 7.13 Let X and Y be topological spaces, f : X → Y a mapping and B a subset of Y .
(1) If f is continuous, then f −1 (B) ⊃ f −1 (B).
34
(2) If f is an open map, then f −1 (B) ⊂ f −1 (B).
Proof (1): Since f −1 (B) is a closed subset of X containing f −1 (B), we see that f −1 (B) ⊃
f −1 (B).
(2): Suppose that x ∈ f −1 (B) and let U be an open neighborhood of x. We show that
U ∩ f −1 (B) 6= ∅.
Since f (x) ∈ B, f (x) ∈ f (U ) and f (U ) is an open subset of Y , we see that f (U ) ∩ B 6= ∅. Take
b ∈ f (U ) ∩ B and a ∈ U such that f (a) = b. Then, since f (a) ∈ B, we see that a ∈ f −1 (B). Thus,
a ∈ U ∩ f −1 (B) and we see that U ∩ f −1 (B) 6= ∅.
Theorem 7.14 Let m, n and p be integers with 3 ≤ m ≤ n and (m − 1)(n − 1) + 2 ≤ p ≤ (m − 1)n.
The followings hold.
(1) T1 and T2 are disjoint open subsets of V n×p×m and T1 is nonempty.
(2) T1 ∪ T2 is a dense subset of Rn×p×m .
(3) T1 ∩ V n×p×m = V n×p×m \ σ −1 (A) and T2 ∩ V n×p×m = σ −1 (A) ∩ V n×p×m .
(4) If T ∈ T1 , then rank T = p.
(5) If T ∈ T2 , then rank T > p.
Proof First note that σ −1 (X ) ∩ V n×p×m = σ −1 (X ) for any subset X of Ru×p by Lemma 7.13,
since σ is an open continuous map.
(1) and (2) follow from Lemma 7.12 and the facts that σ is surjective and V n×p×m is a dense
subset of Rn×p×m .
(3): We see by Lemma 7.12 that T 1 ∩V n×p×m = σ −1 (O1 ) = σ −1 (Ru×p \A) = V n×p×m \σ −1 (A)
and T 2 ∩ V n×p×m = σ −1 (O2 ) = σ −1 (A) ∩ V n×p×m .
(4): Suppose that T ∈ T1 . Then σ(T ) ∈ O1 . Thus there exists Y ∈ O3 such that ν(Y ) = σ(T ).
By Lemma 7.10, we see that fl1 (Y ) ∈ M. Hence ι(σ(T )) = ι(ν(Y )) = −(p< fl1 (Y ))−1 fl1 (Y ) ∈ M,
since M is stable under the action of GL(u, R). Therefore rank T = p by Theorem 6.5.
(5): If T ∈ T2 , then σ(T ) ∈ O2 ⊂ A by Lemma 7.12. Thus rank T > p by Lemma 7.2.
8
Upper bound for typical ranks
In Lemma 7.2, we see a class of tensors with rank greater than p. To complete the proof of
Theorem 1.2, we give an upper bound of the set of typical ranks of Rn×p×m :
Theorem 8.1 Let 3 ≤ m ≤ n and (m − 1)(n − 1) + 1 ≤ p ≤ (m − 1)n. Any typical rank of Rn×p×m
is less than or equal to p + 1.
We prepare the proof.
Let 3 ≤ m ≤ n, (m − 1)(n − 1) + 1 ≤ p < (m − 1)n and u = mn − p. Let
σ ′ : V n×(p+1)×m → R(u−1)×(p+1) be the counterpart of σ : V n×p×m → Ru×p . Also, let A′ ⊂
R(u−1)×(p+1) and T1′ ⊂ V n×(p+1)×m be the counterparts of A ⊂ Ru×p and T1 ⊂ V n×p×m respectively. Let π : Rn×(p+1)×m → Rn×p×m be a canonical projection defined as π(Y1 ; . . . ; Ym ) =
((Y1 )≤p ; . . . ; (Ym )≤p ). Clearly π is a continuous, surjective and open map.
35
Lemma 8.2 π(T1′ ) is an open dense subset of Rn×p×m .
Proof Since T1′ is an open set and π is an open map, π(T1′ ) is an open subset of Rn×p×m .
We show that π(T1′ ) is dense. Let X ∈ V n×p×m . Consider the map f : V n×p×m → V n×(p+1)×m
defined as
f (X1 ; . . . ; Xm−2 ; Xm−1 ; Xm ) = ((X1 , 0); . . . ; (Xm−2 , 0); (Xm−1 , e); (Xm , 0))
where e is the (2n − u + 1)th column vector of the identity matrix En . Since the (p + 1)th
column vector of the matrix σ ′ (f (X)) is zero, f (X) ∈
/ σ ′−1 (A′ ) holds and by Theorem 7.14 (3),
′
f (X) ∈ T1 . Since π ◦ f is the identity map and π is continuous, X ∈ π(T1′ ) ⊂ π(T1′ ) holds.
Therefore V n×p×m ⊂ π(T1′ ) and thus Rn×p×m = π(T1′ ).
By Theorem 7.14 (5), and Lemma 8.2, we have immediately the following corollary.
Corollary 8.3 Let 3 ≤ m ≤ n and (m − 1)(n − 1) + 1 ≤ p < (m − 1)n. T2 6= ∅ if and only if
T2 ∩ π(T1′ ) 6= ∅, and rank T = p + 1 for any T ∈ T2 ∩ π(T1′ ).
Note that arbitrary tensor of π(T1′ ) has rank less than or equal to p + 1 by Theorem 7.14 (4).
Proof of Theorem 8.1 The assertion for p = (m − 1)n holds by [33]. Suppose that (m − 1)(n −
1) + 1 ≤ p < (m − 1)n. Then rank(T ) ≤ p + 1 for T ∈ π(T1′ ). Since π(T1′ ) is dense, arbitrary
integer greater than p + 1 is not a typical rank.
Recall that trank(m, n, p) = trank(n, p, m). We are ready to prove main theorems.
Proof of Theorem 1.1 (1) follows from Theorem 7.3 and Corollary 3.4.
(2): We may assume that 3 ≤ m ≤ n without the loss of generality. Ten Berge [35] showed that
Rm×n×p has a unique typical rank for p ≥ (m − 1)n + 1. Therefore, we see that p ≤ (m − 1)n. Set
u = mn − p. By Theorem 7.14 (2) and (4), we see that T2 6= ∅. Furthermore, T2 6= ∅ ⇒ O4 6= ∅ by
definitions and the surjectivity of σ. Since O4 ⊂ A u×n×m , we see that there exists an absolutely
full column rank u × n × m tensor. The result follows from Corollary 3.4.
Proof of Theorem 1.2
We may assume that 3 ≤ m ≤ n. Note that
trank(m, n, p) = {min{p, mn}}
for k ≥ m [35]. Suppose that 2 ≤ k ≤ m−1. By Theorem 8.1, the maximal typical rank of Rm×n×p
is less than or equal to p + 1. Since p is the minimal typical rank of Rm×n×p , trank(m, n, p) is {p}
or {p, p+ 1}. By Theorem 1.1, Rm×n×p has a unique typical rank if and only if m#n≥ mn − p + 1,
equivalently, k≥ m + n − (m#n). This completes the proof.
We immediately have Theorem 1.3 by Proposition 2.4 and Theorem 7.3. In the case where
p = (m − 1)(n − 1) + 1, we have many examples for having plural typical ranks.
Corollary 8.4 Let m, n ≥ 3 and a ≥ 1. If m ≡ 2a−1 + s (mod 2a ) and n ≡ 2a−1 + t (mod 2a )
for some integers s and t with 1 ≤ s, t ≤ 2a−1 then Rm×n×((m−1)(n−1)+1) has plural typical ranks.
Proposition 8.5 Let a = 4, 8. If m and n are divisible by a, then for each 1 ≤ k < a,
Rm×n×((m−1)(n−1)+k) has plural typical ranks.
36
Proof For a = 4, 8, if m and n are divisible by a, then m#n ≤ m + n − a by Proposition 2.3
and thus m + n − 1 − (m#n) ≥ a − 1. Then the assertion follows by Theorem 1.2.
Corollary 8.6
(1) R4×4×k has plural typical rank whenever 10 ≤ k ≤ 12.
(2) R8×8×k has plural typical rank whenever 50 ≤ k ≤ 56.
Proposition 8.7 Let m, n ≥ 3. If Rm×n×((m−1)(n−1)+1) has a unique typical rank, i.e., m#n =
m + n − 1, then trank(m, n, (m − 1)(n − 1) − k) = {(m − 1)(n − 1) + 1} holds whenever 0 ≤ k <
(m−1)(n−1)
m+n−1 .
Proof Let 0 ≤ k < (m−1)(n−1)
m+n−1 , q = (m − 1)(n − 1) − k and p = (m − 1)(n − 1) + 1. Suppose
m×n×p
that R
has a unique typical rank. Then trank(n, p, m) = {p}. Since the set of all n × p × m
tensors with rank p is a dense subset of Rn×p×m , the image of this set by a canonical projection
Rn×p×m → Rn×q×m is also a dense subset of Rn×q×m . Thus any typical rank of Rn×q×m is less
than or equal to p. On the other hand, by elementary calculation, we see that (m − 1)(n − 1) <
(m−1)(n−1)
mnq
n×q×m
is greater than or equal
m+n+q−2 ⇔ k <
m+n−1 . Thus the minimal typical rank of R
n×q×m
to p. Therefore R
has a unique typical rank p.
Corollary 8.8 Let 3 ≤ m ≤ n. Suppose that Rm×n×((m−1)(n−1)+1) has a unique typical rank, i.e.,
m#n = m + n − 1. If 0 ≤ k ≤ ⌊ m
2 ⌋ − 1 then trank(m, n, (m − 1)(n − 1) − k) = {(m − 1)(n − 1) + 1}.
m
m
Proof Let 0 ≤ k ≤ ⌊ m
2 ⌋ − 1. Then (m + n − 1)(k + 1) ≤ (m + n − 1) 2 ≤ (n + n − 1) 2 < mn
and thus (m + n − 1)k < (m − 1)(n − 1). Therefore the assertion follows from Proposition 8.7.
References
[1] J. F. Adams. Vector fields on spheres. Ann. of Math. (2), 75:603–632, 1962.
[2] J. Adem. Some immersions associated with bilinear maps. Bol. Soc. Mat. Mexicana (2),
13:95–104, 1968.
[3] M. F. Atiyah and I. G. Macdonald. Introduction to commutative algebra. Addison-Wesley
Publishing Co., Reading, Mass.-London-Don Mills, Ont., 1969.
[4] W. Bruns and U. Vetter. Determinantal rings, volume 1327 of Lecture Notes in Mathematics.
Springer-Verlag, Berlin, 1988.
[5] M. V. Catalisano, A. V. Geramita, and A. Gimigliano. Ranks of tensors, secant varieties of
Segre varieties and fat points. Linear Algebra Appl., 355:263–285, 2002; erratum: 367:347–348,
2003.
[6] M. V. Catalisano, A. V. Geramita, and A. Gimigliano. On the ideals of secant varieties to
certain rational varieties. J. Algebra, 319(5):1913–1931, 2008.
[7] R. L. Cohen. The immersion conjecture for differentiable manifolds. Ann. of Math. (2),
122(2):237–328, 1985.
37
[8] D. M. Davis. A strong non-immersion theorem for real projective spaces. Ann. of Math.,
120(3):517–528, 1984.
[9] D. M. Davis. Some new nonimmersion results for real projective spaces. Bol. Soc. Mat.
Mexicana (3), 17(2):159–166, 2011.
[10] D. M. Davis and M. Mahowald. Nonimmersions of RPn implied by tmf, revisited. Homology,
Homotopy Appl., 10(3):151–179, 2008.
[11] D. Eisenbud, C. Huneke, and W. Vasconcelos. Direct methods for primary decomposition.
Invent. Math., 110(2):207–235, 1992.
[12] S. Friedland. On the generic and typical ranks of 3-tensors. Linear Algebra Appl., 436(3):478–
497, 2012.
[13] M. Ginsburg. Some immersions of projective space in Euclidean space. Topology, 2:69–71,
1963.
[14] J. Heintz and M. Sieveking. Absolute primality of polynomials is decidable in random polynomial time in the number of variables. In Automata, languages and programming (Akko, 1981),
volume 115 of Lecture Notes in Comput. Sci., pages 16–28. Springer, Berlin-New York, 1981.
[15] F. L. Hitchcock. The expression of a tensor or a polyadic as a sum of products. J. Math.
Phys., 6(1):164–189, 1927.
[16] M. Hochster and J. A. Eagon. Cohen-Macaulay rings, invariant theory, and the generic
perfection of determinantal loci. Amer. J. Math., 93:1020–1058, 1971.
[17] A. Hurwitz. Über die Komposition der quadratischen Formen. Math. Ann., 88(1-2):1–25,
1922.
[18] J. Ja’Ja’. Optimal evaluation of pairs of bilinear forms. SIAM J. Comput., 8(3):443–462,
1979.
[19] G. Kemper and N. Viet Trung. Krull dimension and monomial orders. J. Algebra, 399:782–800,
2014.
[20] K. Y. Lam. Construction of some nonsingular bilinear maps. Bol. Soc. Mat. Mexicana (2),
13:88–94, 1968.
[21] J. Levine. Imbedding and immersion of real projective spaces. Proc. Amer. Math. Soc.,
14:801–803, 1963.
[22] H. Matsumura. Commutative ring theory, volume 8 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, second edition, 1989. Translated from the
Japanese by M. Reid.
[23] R. J. Milgram. Immersing projective spaces. Annals of Mathematics, 85(3):473–482, 1967.
[24] M. Miyazaki, T. Sumi, and T. Sakata. Typical ranks of certain 3-tensors and absolutely full
column rank tensors. preprint, arXiv:1103.0154v2, Dec. 2012.
38
[25] M. Nagata. Theory of commutative fields, volume 125 of Translations of Mathematical Monographs. American Mathematical Society, Providence, RI, 1993. Translated from the 1985
Japanese edition by the author.
[26] J. Radon. Lineare scharen orthogonaler matrizen. Abh. Math. Sem. Univ. Hamburg, 1(1):1–14,
1922.
[27] D. Rees. The grade of an ideal or module. Proc. Cambridge Philos. Soc., 53:28–42, 1957.
[28] L. Robbiano. Term orderings on the polynomial ring. In EUROCAL ’85, Vol. 2 (Linz, 1985),
volume 204 of Lecture Notes in Comput. Sci., pages 513–517. Springer, Berlin, 1985.
[29] A. Seidenberg. Constructions in algebra. Trans. Amer. Math. Soc., 197:273–313, 1974.
[30] D. B. Shapiro. Compositions of quadratic forms, volume 33 of de Gruyter Expositions in
Mathematics. Walter de Gruyter & Co., Berlin, 2000.
[31] N. Singh. On nonimmersion of real projective spaces. Topology and its Applications, 136:233–
238, 2004.
[32] T. Sumi, M. Miyazaki, and T. Sakata. Rank of 3-tensors with 2 slices and Kronecker canonical
forms. Linear Algebra Appl., 431(10):1858–1868, 2009.
[33] T. Sumi, M. Miyazaki, and T. Sakata. Typical ranks of m × n × (m − 1)n tensors with
3 ≤ m ≤ n over the real number field. Linear Multilinear Algebra, 63(5):940–955, 2015.
[34] T. Sumi, T. Sakata, and M. Miyazaki. Typical ranks for m × n × (m − 1)n tensors with m ≤ n.
Linear Algebra Appl., 438(2):953–958, 2013.
[35] J. M. F. ten Berge. The typical rank of tall three-way arrays. Psychometrika, 65(4):525–532,
December 2000.
[36] J. M. F. ten Berge and H. A. L. Kiers. Simplicity of core arrays in three-way principal
component analysis and the typical rank of p × q × 2 arrays. Linear Algebra Appl., 294(13):169–179, 1999.
39
| 0math.AC
|
Data-driven Workflows for Microservices
Larisa Safina∗ , Manuel Mazzara∗ , Fabrizio Montesi†
∗ Innopolis
arXiv:1511.02597v1 [cs.PL] 9 Nov 2015
University, Russia
{l.safina, m.mazzara}@innopolis.ru
† University of Southern Denmark
fmontesi@imada.sdu.dk
of a system is highly dependent on the structural design of the
organization producing it.
In the context of microservices the Jolie programming
language [5], [6] emerged as a paradigmatic solution tuned
at getting the best out of this architectural style. Jolie is
comprehensive and capable of implementing both simple
services and complex orchestrations. Everything in Jolie is
a microservice and all these microservices can be easily
reused or composed for obtaining in turn new microservices.
This approach supports distributed architecture and guarantees
simple managing of components, which reduces maintenance
and development costs.
This work is devoted to extend the Jolie programming
language in order to support data-driven workflow, i.e. moving
the control-flow decision-making from process-driven to datadriven. That means that control-flow can be directed at the
time of message passing according to the nature of the
message strucutre and type, instead of requiring post-reception
I. Introduction
processing. A typical example of process-driven workflow is
The increasing complexity of modern software requires new presented in [10]. In the microservice scenario this opportunity
approaches to architectural design and system modeling. Com- opens to novel programming patterns. Whether the processplex systems also show high level of concurrency, i.e. multiple driven or data-driven programming style is more suitable for an
intertwined threads of executions, often running on different application really depends on the specific problem domain and,
hardware, which need to be synchronized and coordinated, to same extent, to developers preferences and style. Data-driven
and which much share information, often through different flows have been realized in Jolie by means of an extension to its
paradigms of communication. Therefore improving software type system, which manifests as implementation of choice type.
quality and deploying reliable services is the consequence Further extensions can be implemented in order to strengthen
of an accurate use of optimal service-based architectural further this possibility.
styles and well-established software engineering techniques
Two major contributions appear as a result of this work.
for requirements elicitation, design, testing and verification, in The first is of scientific nature, i.e., moving from processparticular when it come to concurrent service-based systems. driven to data-driven and therefore open to new programming
In order to tackle these issues from the architectural viewpoint, patterns and styles. The second is of purely technical interest,
Microservices architecture appeared lately as a new paradigm and stands in the re-engineering of the Jolie interpreter as
for programming applications by means of the composition of a consequence of the extended data type. This represents a
small services, each running its own process and communi- relevant case study of interpreter re-engineering, and therefore
cating via light-weighted mechanisms [8]. This approach has can be valuable experience for the practitioners involved in
been built on the concepts of Service-oriented Architectures[14] activities of comparable complexity.
brought from crossing-boundaries workflows to the application
The paper is structured as follows: in section II a quick
level, and into the applications architectures, i.e. it Service- overview of Jolie programming language is given in order to
oriented Architecture and Programming from the large to the intorduce the unfamiliar reader with the main concepts and
small.
syntax. Far from being an exhaustive report, the section is
Microservices architecture still shows distinctive character- just a compendium providing the links for further study of
istics which blend into something unique and different from the topic. Section III presents a case study on top of which
SOA itself. The size is comparatively small versus a typical the major narrative of the paper is built and the contributions
service [8], supporting the belief that the architectural design are defined. In particular, two different kind of approaches
Abstract—Microservices is an architectural style inspired by
service-oriented computing that has recently started gaining
popularity. Jolie is a programming language based on the
microservices paradigm: the main building block of Jolie systems
are services, in contrast to, e.g., functions or objects. The
primitives offered by the Jolie language elicit many of the
recurring patterns found in microservices, like load balancers
and structured processes. However, Jolie still lacks some useful
constructs for dealing with message types and data manipulation
that are present in service-oriented computing. In this paper,
we focus on the possibility of expressing choices at the level
of data types, a feature well represented in standards for Web
Services, e.g., WSDL. We extend Jolie to support such type
choices and show the impact of our implementation on some of
the typical scenarios found in microservice systems. This shows
how computation can move from a process-driven to a datadriven approach, and leads to the preliminary identification of
recurring communication patterns that can be shaped as design
patterns.
computation are described: process-driven and data-driven, and
examples of both are explained in order to understand the
differences. Sections IV and V describe the architecture of
the Jolie interpreter and the changes that were necessary in
order to extend the type system. Finally, section VI wraps up
final considerations regarding the contribution of this work,
and presents ideas on how future developments may be built
up on top of current achievements.
II. Jolie language
In this section we brielfy recall the Jolie programming
language in order to simplify the reading of the remaining
part of the paper.
Each Jolie program is composed by two parts, a behavioral
part and a deployment part. A program can be formally
expressed as:
Program F Deployment Behavior
1) Deployment part: The deployment part contains directives
which help the Jolie program to receive and send messages and
be orchestrated among other microservices. The deployment
part is separated from the program behavioral part, so that the
same behavior may be reused later with a different deployment
configuration. Formally the deployment part is expressed as:
Deployment F DeploymentInstruction*
Where DeploymentInstruction can include
• Interfaces: sets of operations equipped with information
about their request (and sometimes response) types;
• Message types: can be represented as native types, linked
types or undefined. Message types are the main subject
of this report and shall be discussed later in section II-A.
• Communication ports: define how communications with
other services are actually performed.
2) Behavioral part: The behavioral part contains microservice implementation of the functionalities, containing both
computations and communication expressions. Examples of
expanded behavioral part utilization will be provided later in
section V-B. Formally, behavioral part can be expressed as:
Behavior
3) Communication: Communication of processes can be
performed by two possible patterns: one-way (the endpoint
receives a message) and request-response (the endpoint receives
a message, and sends a response back to the caller):
Process
F
|
InputStatement F
|
OutputStatement F
|
. . . | InputStatement
OutputStatement
op(x)
op(x)(y) Process
op@OPort(x)
op@OPort(x)(y)
(One-Way)
(R-Response)
(Notification)
(S-Response)
One-Way is used to receive a message for operation op in
variable x. Request-Response is used to receive a message for
operation op in variable x, execute a Process and then send
back a response to the caller containing the value of variable
y. Notification and Solicit-Response are the dual of the former
ones to be used, respectively, for sending a message to a OneWay statement or to a Request-Response one. OPort defines an
output port name of desired endpoint.
A. Jolie type system
Jolie provides a language for describing the types that are
allowed to be communicated over a network. Communications
are type checked at run-time when a message is received [13].
Message types are introduced in the deployment part of Jolie
programs:
DeploymentInstruction F . . .
|
type id : TypeDefinition
Where id is an identifier in order to use the message type in
other program parts and TypeDefinition can be a native type,
native type with subtypes, native type with undefined subnodes,
link type or can be undefined (means that variable is null until
a value is assigned to it):
TypeDefinition F
|
|
|
|
|
NativeType
F
...
NativeType
NativeType { SubTypeList }
NativeType { ? }
id
undefined
int | double | string | raw | void | any
F BehaviouralBlock*
Where {?} represents untyped subnodes and undefined stands
main {Process} BehaviouralBlock* a shortcut for any:{?}.
BehaviouralBlock F define id {Process}
Except commonly-used native types as int, double or string,
|
init {Process}
Jolie also has the following types:
Main is a procedure which defines an entry point of execution.
• raw (used for transmission of raw data streams as byte
Main can be followed or preceded by define procedures with
arrays)
id identifier.
• void (is used for indicating that no value is contained by
Init supports special procedures for initializing a service
the variable)
before it makes its behaviors available. Procedures specified
• any (means that any native type with which variable is
with define can be used many times, while the one specified
initialized will be accepted.
with init is executed only once, when the service is started.
Untyped subnodes, expressed as {?} construction, indicate
Process defines the activities to be performed by the service.
that
a node may have any kind of subtree. Already defined
Processes can be composed in sequences, parallels and (input
types
can be reused in other types definition as link types by
guarded) non-deterministic choices [5].
means of their ids.
Type may have any number of subtypes, which bnf-form is
the following:
•
•
SubTypeList F SubType
|
SubType SubTypeList
SubType
F .id Cardinality : TypeDefinition
Each subnode has its cardinality defined as one by default
or as following:
Cardinality F
|
|
|
|
[ int , int ]
[ int , * ]
*
?
(Range)
(Lower-bound)
(Shortcut for [0,*])
(Shortcut for [0,1])
III. Case Study
In this section we show how the extension to the Jolie type
system led to an enhanced arsenal at developers’ disposal. We
will proceed by examples. The short compendium of the Jolie
syntax as presented in the previous section, combined with the
code examples presented here, may be sufficient to grasp a
general understanding. For a more comprehensive information
the reader can refer to [6] and [3].
Let us consider an example implementing a car rental. This
consists of three parts:
• Server, which provides the rental service;
• Client, which wants to use it;
• Interface, which declares the operations by means of which
client and server can interact with each other.
customer: stores customers personal information (name,
age, and driving license number) necessary to rent a car;
car_return: holds the reference to customer’s profile who
has rent this car, the car’s identification number and the
state of the car after renting.
/ / Car r e n t i n t e r f a c e
type customer : void {
. name : s t r i n g
. age : i n t
. license : string
}
type c a r _ r e t u r n : void {
. car_state : string
. c ?: customer
. car_id : string
}
interface CarRentInterface {
RequestResponse :
get_car ( customer ) ( s t r i n g )
RequestResponse :
return_car ( car_return )( string )
}
the server indicates the useage of operations defined in the
above interface. This is done by the include directive at the
beginning of the source code. The server’s deployment part
contains declaration of input port, by means of which it can
be accessed with the name and the protocol provided on the
defined location. The behavior part of the program contains
definition of two operations, get_car and return_car. They are
placed inside the square brackets "[ .. ]", which are used in
input-guarded choice syntax. This means, that only one of the
operations can be executed at the time, while the others will
be deactivated.
/ / S e r v e r with input −guarded o p e r a t i o n s
include " carRentInterface . iol "
inputPort RentService {
Location : " socket : / / l o c a l h o s t :2001"
P r o t o c o l : sodep
Interfaces : CarRentInterface
}
execution { concurrent }
main {
Figure III.1.
[ get_car ( request ) ( response ){
r e s p o n s e = "43535"
}]
Client-service use-case diagram
We wil consider two possible approaches for the server to
handle clients’ requests: process-driven, implemented in Jolie
language by means of input-guarded operations, and data-driven
implemented by the newly added choice operator. We will then
add some considerations on the usage of both.
[ r e t u r n _ c a r ( request ) ( response ){
i f ( r e q u e s t . c a r _ s t a t e == " damaged " ) {
r e s p o n s e = " Car i s damaged ! "
} else {
r e s p o n s e = " Thank you ! "
}
}]
A. Process-driven approach
In this example, the Interface contains the definition of two
operations, dedicated to renting and returning the car, and
several data types:
}
The deployment part of the client describes how the
connection to the Rent Service works: the same interface,
protocol and Rent Service location. The behavioral part of the
client program executes the following operations:
• creating the request information
• sending this information to Rent Service to be processed
by get_car procedure
• Checking the response and printing it out
/ / Client . ol
include " carRentInterface . iol "
include " console . i o l "
interface CarRentInterface {
...
RequestResponse :
process ( request )( string )
}
process operation takes variable of request type, which itself
can be either of customer or car_return types
Let’s implement the new server, supporting process operation:
include " carRentInterface . iol "
outputPort RentService {
Location : " socket : / / l o c a l h o s t :2001"
P r o t o c o l : sodep
Interfaces : CarRentInterface
}
main {
/ / sending request for a car
c u s t o m e r . name = " J o h n S m i t h " ;
customer . age = 32;
customer . l i c e n s e = " l23454675 " ;
get_car@RentService ( customer ) ( response ) ;
println@Console
( " Car r e n t r e q u e s t i s a c c e p t e d . " ) ( ) ;
println@Console
( " Car i d i s " + r e s p o n s e ) ( )
/ / returing the car
return . car_id = response ;
r e t u r n . c a r _ s t a t e = " damaged " ;
return_car@RentService ( return )( response ) ;
println@Console
( " Car i s r e t u r n e d . " + r e s p o n s e ) ( )
}
In order to better understand the execution, we show here the
results of running the application:
Process −driven approach
Car r e n t r e q u e s t i s a c c e p t e d . Car i d i s 43535
Car i s r e t u r n e d . Car i s damaged !
The process-driven approach shows how, classically, the
action flows is directed via the use of input-guarded choice.
This approach is heavily influenced by the heritage of process
algebra, as described in [3]. Input-guarded choice directed
flow is indeed the basic mechanism in, for example, the
untyped π-calculus [11]. Consequently, for this approach to be
supported and implementable the langauge does not require
to be particularly rich in term of type system and language
primitives. Jolie itself originally supported only this mechanism.
B. Data-driven approach
In this case, the choice operator allows us to use a data-driven
approach to computations.
Let’s enrich the interface syntax with the following data type
and operation:
/ / Car r e n t i n t e r f a c e
...
type r e q u e s t : customer | c a r _ r e t u r n
inputPort RentService2 {
Location : " socket : / / l o c a l h o s t :2002"
P r o t o c o l : sodep
Interfaces : CarRentInterface
}
execution { concurrent }
main {
process_user_request ( request ) ( response ){
r e q u e s t match {
customer { r e s p o n s e = "43535" } ;
car_return {
i f ( r e q u e s t . c a r _ s t a t e == " damaged " ) {
r e s p o n s e = " Car i s damaged ! "
} else {
r e s p o n s e = " Thank you ! "
}
}
}
}
Please note that "match" directive is not in the stable version
of the project yet, so this example will be not compiled with
the current (1.4.1) version of the interpreter.
In this case we don’t need to separate execution of operations
by means of processes. Here it is done by means of the type
of the input request variable.
In order to test new approach, let’s change the client
program’s code:
/ / Client . ol
include " carRentInterface . iol "
include " console . i o l "
outputPort RentService {
...
}
outputPort RentService2 {
Location : " socket : / / l o c a l h o s t :2002"
P r o t o c o l : sodep
Interfaces : CarRentInterface
}
main {
/ / sending request for a car
println@Console ( " Process −driven approach " ) ( ) ;
...
/ / returing the car
...
/ / w o r k i n g w i t h s e r v e r b a s e d on d a t a t y p e
p r i n t l n @ C o n s o l e ( " Data − d r i v e n a p p r o a c h " ) ( ) ;
process@RentService2 ( customer ) ( response ) ;
println@Console
( " Car r e n t r e q u e s t i s a c c e p t e d . " ) ( ) ;
println@Console
( " Car i d i s " + r e s p o n s e ) ( ) ;
process@RentService2 ( r e t u r n ) ( response ) ;
println@Console
( " Car i s r e t u r n e d . " + r e s p o n s e ) ( )
}
The result of the execution will be the following:
Data − d r i v e n a p p r o a c h
Car r e n t r e q u e s t i s a c c e p t e d . Car i d i s 43535
Car i s r e t u r n e d . Car i s damaged !
The results are clearly the same than the process-driven
approach, showing how behaviorally the two implementations
appear undistinguishable for an external observer. However,
as we have seen, the internal computations actually differ,
and performances can differ too as long as other quality
attributes. It is beyond the scope of this paper to make any
quantitative assessment. It is enough to notice how enriched
language mechanisms offer alternative programming pattern –
and therefore desing patterns – to developers who adopt the
service-oriented paradigm. The development of specific design
guidelines is left as future work.
IV. Architecture of Jolie interpreter
In order to explain better the changes that were applied to
the interpreter, we have to describe how its basic components
are working together.
The Jolie interpreter is written in Java, and its architecture
is organized into several components [12], the most significant of which regard parsing the source files, establish the
communication between components and running them.
The Parser part scans and parses the source code, transforms
and organizes it as a tree of objects with desired semantics.
As a result, parser produces OOIT (Object oriented interpretation tree), which implements the execution of the semantic
rules relative to the input program. Runtime environment
instantiates other components and execute the OOIT. And
the Communication core part is in charge of performing
communication between different components abstracting from
the communication methods and protocols.
This section is dedicated to discussion of interpreter components in more details.
A. Parser
The parsing process follows the following stages and involve
the following components:
1) Scanner reads input and create token objects based on
the ones defined in token types enumeration;
2) OLParser is a recursive descent parser, which take created
tokens, checks them by the grammar rules and generate
the corresponding syntax node in the abstract syntax tree
(AST);
3) OLParseTreeOptimizer takes ready AST and optimizes
it by reducing the number of nodes or transforming the
code to more efficient versions;
4) SemanticVerifier checks whether the code is well-formed
and semantically correct.
Both OLParserTreeOptimizer and SemanticVerifier use visitor design pattern [2] to access AST (implement OLVisitor
class).
Types mentioned in section II-A are expressed as nodes
of AST. They are implemented by means of descendants of
abstract class TypeDefinition:
•
•
•
TypeInlineDefinition for expressing native types;
TypeDefinitionLink for linked types;
TypeDefinitionUndefined for undefined types.
B. Runtime environment
OOITBuilder reads the AST and produces object tree-like
data structure called object-oriented interpretation tree (OOIT),
that defines the semantics for program execution. OOIT nodes
implement Process interface, so that each node is responsible
for the semantics of a single statement.
Runtime Environment handles parallel execution by means
of native threads. Threads responsible for executing a part of
the OOIT can be of two types:
1) Session threads, which are used for handling different
sessions and retain a local state for variable values.
2) Parallel threads, which are used for handling parallel
composition and refer to their parent session thread for
state handling.
C. Communication core
Figure IV.1.
Jolie interpreter architecture
Communication Core component is used for performing
communications by means of such mechanisms as messages
and channels. Channels are used for the sending and receiving
of messages, which consist of resource path, name of operation
they are dedicated for, message content and in some cases fault
name. Channels are in charge of encoding/decoding messages
using the right protocol and sending/receiving them by means
of the right communication medium.
V. Towards data-driven Workflows for Microservices
applicable to choice type (like checking if a type has subtypes or
its native type), and which might raise null reference exception
while trying to access them. This is why these abstract methods
were removed.
Jolie still experiences lack of some data types and operations,
which could enrich its syntax and add extra flexibility, like,
for example, regular expressions or choice operator. This work
is dedicated to implementing the choice operator as the one
2) Extending parser: Extension of parser requires working
which is proved to be useful.
on Scanner, OLParser, OLParserTreeOptimizer and SemanThe idea of choice operator was taken from XML[7]. Choice ticVerifier.
operator in XML allows to put several elements in choice
Scanner. No changes to the scanner are needed, because the
element declaration, but to be presented with only one of them. pipe-symbol ("|"), which represents choice operator, is already
For example, there is a choice element called "animal" in in use as the parallel operator, so it is already present in the
example below, which can be either presented as a dog or as TokenType enum. Parallel operator, placed between operands,
a cat:
indicates that they are are executed concurrently.
<x s : e l e m e n t name=" a n i m a l ">
<x s : complexType >
<x s : c h o i c e >
<x s : e l e m e n t name=" c a t " t y p e =" c a t "/ >
<x s : e l e m e n t name=" dog " t y p e =" dog "/ >
</ x s : c h o i c e >
</ x s : complexType >
</ x s : e l e m e n t >
statementA | { statementB ; statementC }
However, execution relates to the behaviour part of the
program, while message types have to be defined in the
deployment part, and they are separately processed, so no
effort on pipe symbol processing redefinition is needed.
OLParser parses message types and their subtypes by means
of parseTypes and parseSubTypes methods correspondingly.
Despite choice element in XML allows to choose between These methods check that the sequence of tokens, generated
several types, in our implementation, this construction provides by Scanner, is correct regarding the type definition grammar,
possibility of choosing between two types only. The same as presented in section II and then generate a node in AST of
one of the TypeDefinition descendants. Since this grammar has
example will look in Jolie language in the following way:
been enriched, parseTypes and parseSubTypes methods have
t y p e a n i m a l : c a t | dog
been changed correspondingly, so that they could expect "|"
We use pipe character ("|") for choice operator. Note, that in token inside the type definition.
this case cat and dog are linked types and need to be declared
As OLParserTreeOptimizer and SemanticVerifier classes
explicitly or otherwise Jolie interpreter will raise an exception. works with AST by means of visitors, so visit method for
TypeDefinition formal grammar was enriched correspond- TypeChoiceDefinition type was added to OLVisitor class. In
ingly:
this case, no specific optimization is needed, so this visitor
simply does the same actions as the other TypeDefinition class
TypeDefinition F . . .
descendants.
|
TypeDefinition | TypeDefinition
SemanticVerifier checks whether the types with the same
name
have been already defined and checks cardinality of
A. Architectural changes
types. New visit method, added to deal with objects of
In this section we will describe the architectural changes
TypeChoiceDefinition type, is doing the same, except that
necessary to implement the new data type.
it also invoke semantic verification on both of its types inside.
1) Adding choice type to AST: In order to support possibility
3) Extending runtime facilities: Extending runtime facilities
of storing two types, TypeChoiceDefinition class was created
regards
mostly building OOIT process and message types
(extends TypeDefinition as TypeInlineDefinition and others).
themseleves.
Additions to building object-oriented interpretation tree process. OOITBuilder generates object oriented interpretation tree,
based on AST produced by OLParser. It also uses visitors to
access nodes of AST. Since new TypeChoiceDefinition type was
added, corresponding visitor was created, which is in charge
of creating type object based on current TypeChoiceDefinition
object. Type objects are discussed in the next section.
Figure V.1. TypeChoiceDefinition class diagram
Message types. As messages are being passed by means
of type objects, each of the TypeDefinition descendants in
AST should have corresponding representation in Type class
The TypeChoiceDefinition class contains two attributes left descendants (TypeImpl for TypeInlineDefinition, TypeLink for
and right representing two possible types, that can be any of TypeDefinitionLink).
TypeDefinition members. The addition of this class requires
For representing TypeChoiceDefinition, new Type descena change in the parent TypeDefinition class and its other dant, TypeChoice, has been created.
descendants, as they contain several methods, that are not
Figure V.2.
Jolie type system class diagram
B. Examples
1) Working with types and subtypes: Choice operator can
work with native types:
type numeric : i n t | long
Linked types:
type linked_type : s t r i n g
type linked_choice : linked_type | void
Subtypes:
It is also possible to use choice operator if you need two
support several versions of data structure. For example, it was
needed to process data related to Old-Software corporation,
later its title has been changed to New-Software, but some
customers can still use the old one.
t y p e Old − S o f t w a r e −Corp : v o i d { .
name : s t r i n g
address : string
}
t y p e New− S o f t w a r e −Corp : v o i d { .
name : v o i d {
. firstname : string
. lastname : s t r i n g
address : string
phone : i n t
}
t y p e c o r p o r a t i o n : Old − S o f t w a r e −Corp
| New− S o f t w a r e −Corp
person_info : void {. id : s t r i n g | i n t }
2) Functions genericity: One of the way of choice operator
utilization is for making functions generic. If we declare the
following choice type and function in interface
type choice : s t r i n g | i n t
fun_choice ( choice )( choice )
We can provide the same behaviour without considering
which type (string or int) was passed to the function:
fun_choice ( request ) ( response ){
response = request
}
Or imagine that we need to implement different behaviour
of the function based on the arguments passed. Let’s have an
interface with type person, able to be presented as element
with type personSSN or personCCN:
t y p e p e r s o n : personSSN | personCCN
t y p e personSSN : v o i d {
. ssn : i n t
}
t y p e personCCN : v o i d {
. ccn : s t r i n g
}
And a function pay, which takes input argument of person
type and run the corresponding code based on particular type
(personSSN or personCCN) of the argument passed.
pay ( p e r s o n ) ( r e s p o n s e ) {
p e r s o n match {
personCCN : . . .
|
personSSN : . . .
}
i f ( is_defined ( person . ssn ) ) {
/ / ask the person r e g i s t r y
} else {
/ / c o n t a c t t h e bank
}
}
VI. Conclusions and Future work
Jolie is a comprehensive programming language based on the
service-oriented paradigm [5], which emerged in the context
of an extended research effort aimed at formalizing ServiceOriented Computing on top of broadly accepted models of
concurrency in the EU Project SENSORIA (see, e.g., [3], [9]).
Due to its support for the quick prototyping of both simple
services and complex service coordination, Jolie has been
used in the development of other research projects involving
the programming and deployment of services (including [16],
[15]). However, it has been identified how the language still
lacks of data types and operations able to enrich the syntax
and add extra flexibility to program common SOA scenarios.
Regular expressions and choice operator are just examples of
this deficiency. This work has been devoted to extend the Jolie
type system in order to add the choice operator and realize the
necessary changes into the interpreter.
The major outcomes can be summarized as follows:
• Identification of data types able to support common SOA
programming scenarios
• Addition of choice operator in the syntax and semantics
of the language
• Analysis and reengineering of Jolie interpreter
This work shows how computation can move from a processdriven to a data-driven approach. Control-flow can be now
directed at the time of message passing and according to the
nature of the message structure and type, instead of requiring
post-reception processing, hence leading to a preliminary
identification of recurring communication patterns that can
be then shaped as design patterns. In the microservice scenario
this represent a novel opportunity opening to new programming
scenario.
Future work leaves space to both theoretical investigation
and practical realization. Implementing regular expressions
is a natural step in order to further enrich the type system
and manage a broader set of programming scenarios. For what
concerns theoretical aspects, formalization of the extended type
system is considered a priority.
Acknowledgements
We would like to thank Innopolis University for logistic and
financial support. This work was also partially supported by
CRC (Choreographies for Reliable and efficient Communication
software), grant no. DFF–4005-00304 from the Danish Council
for Independent Research. Our gratitude goes to colleagues of
the Institute of Technologies and Software Development who
participated in the discussion and the seminar, in particular
Bertrand Meyer, Victor Rivera, Daniel de Carvalho, Mohamed
Elwakil, Leonard Johard, Alexander Naumchev, Alexander
Chichigin and Rasul Tumyrkin.
References
[1] Choice operator, http://www.w3schools.com/schema/el_choice.asp.
[2] E. Gamma, R. Helm, R. Johnson, J. Vlissides, Design Patterns: Elements
of Reusable Object-Oriented Software, Addison-Wesley Professional; 1
edition, 1994.
[3] C. Guidi, R. Lucchi and M. Mazzara, A Formal Framework for Web
Services Coordination, Electronic Notes in Theoretical Computer Science,
180:2 pages 55-70, 2007.
[4] C. Guidi, R. Lucchi, R. Gorrieri, N. Busi, and G. Zavattaro, SOCK: A
Calculus for Service Oriented Computing., In Proceedings of ICSOC
2006, pages 327-338, 2006.
[5] F. Montesi, C. Guidi, G. Zavattaro, Service-oriented Programming with
Jolie, Book Chapter in Web Services Foundations, pages 81-107, 2014.
[6] Jolie Language Website, http://www.jolie-lang.org/.
[7] Jolie vision, http://www.italianasoftware.com/vision.html.
[8] J. Lewis and M. Fowler, Microservices. Common characteristics of
architectural style, http://martinfowler.com/articles/microservices.html.
[9] R. Lucchi and M. Mazzara, A pi-calculus based semantics for WS-BPEL,
Journal of Logic and Algebraic Programming, 70:1, pages 96-118, 2007.
[10] M. Mazzara, F. Abouzaid, N. Dragoni and A. Bhattacharyya Toward
Design, Modelling and Analysis of Dynamic Workflow Reconfigurations
- A Process Algebra Perspective, Web Services and Formal Methods 8th International Workshop, WS-FM 2011, Clermont-Ferrand, France,
September 1-2, 2011, Revised Selected Papers
[11] M. Robin,Communicating and Mobile Systems: The pi-calculus, Cambridge University Press, 1999.
[12] F. Montesi, Jolie: a Service-oriented Programming Language, Master’s
thesis, University of Bologna, Department of Computer Science, 2010.
[13] J. M. Nielsen, A Type System for the Jolie Language,
Technical
University of Denmark Informatics and Mathematical Modelling, 2013.
[14] Service-Oriented Architecture (SOA) Definition http://www.servicearchitecture.com/articles/web-services/service-oriented_architecture_soa_definition.html.
[15] M. Dalla Preda, S. Giallorenzo, I. Lanese, J. Mauro, M. Gabbrielli, AIOCJ:
A Choreographic Framework for Safe Adaptive Distributed Applications,
Proc. of SLE, pages 161-170, 2014.
[16] M. Gabbrielli, S. Giallorenzo, F. Montesi, Applied Choreographies, arXiv,
http://arxiv.org/abs/1510.03637, 2015.
[17] Web Services Description Language (WSDL), Version 2.0.
http://www.w3.org/TR/wsdl20/.
| 6cs.PL
|
King Saud University
College of Computer & Information Sciences
General-Purpose Visual Language and
Information System with Case-Studies in
Developing Business Applications
Mahmoud Fayed
Riyadh May 11, 2017
Master of Science Thesis
ii
DEDICATION
This Thesis is dictated to my Father; to my greatest Mather, to my lovely family.
iii
DECLARATION
I hereby declare that I am the sole author of this thesis. I authorize King Saud University to lend this
thesis to other institutions or individuals for the purpose of scholarly research.
iv
ACKNOWLEDGMENTS
I would like to express my gratitude to my supervisor Dr.Atif M. Alamri, for his inspired comments and
his patience to lead this thesis to the best level. Also, I would like to say thanks to all those who helped
me in this work.
Special Thanks to Dr. Ahmed Zayed Emam and Dr. Djamal Ziani for reviewing this thesis and
providing very valuable advices and comments.
Thanks to Dr. Muhammad S. Al-Qurishi and Dr. Ahmad A. Al-Daraiseh from our research team for
their great contributions.
Thanks to our Programming Without Coding Technology Team members:* Arcangelo Molinaro
* Stephen France
* Sameh Kamel
* Amine Debabsia
* Aboelsoud Abd Alraouf
* Ahmed Omar
* Abdulrazak Hussien
* Djardi Masoud
* Mouaddh Mebarki
* Ibrahim Abdelelah
* Dale Jones
* Rabeh Torchi
* Khalid Bentaleb
* Reem Mohamed
* Mohammed Fathy
* Shreen Hassan
* Sinan Qahtan
* Sozan Samy
* Vidlanovic Zlatko Aurel
* Waseem Salem
* Mohammed Al-Mahdi
* Antonio Fidel Perez Rubio
* Abobakar Ahmad Jallo
* Salama Mohammed Abo Mosslam
* Zerourou Bachir
* Navid Dezashibi
* Mahmoud Mohammed Hassan
* Belarir Abdelkader
* Mabrook AlRakhami
* Nabeel Hassanien
v
ABSTRACT
Learning computer programming has been always challenging. Since the sixties of
the last century, many researchers developed Visual Programming Languages (VPLs) to
help in this regard. In this thesis, ten VPLs were specifically selected, studied,
experimented with, and evaluated. A total of fifteen metrics were used to evaluate the tools.
Comparisons, classification, and gap analysis were then presented. A list of requirements
for a general-purpose VPL and a guide to help the novice programmer choose the right tool
were generated and finally the PWCT (Programming Without Coding Technology, a novel
general-purpose visual programming language) is developed and presented. The main
objective behind developing this tool was to create not only a general purpose VPL but one
that possesses textual language’s capabilities. A language that can be used to develop
similar programs to the ones developed in C++ or Java for example. As the name indicates,
PWCT requires no coding at all. A person needs only to know basic programming concepts
to be able to use the tool. PWCT has many attractive features such as: General Purpose,
Open source, easy to use, Exports code to different languages, allows customizing visual
components and creating new ones, uses keyboard shortcuts in addition to the mouse, and
generates automatic documentation. PWCT has been launched as a Sourceforge project,
which currently has more than 230,000 downloads for the language and more than
19,500,000 downloads for samples, tutorials and movies. Many business applications and
projects are developed using PWCT, Also we developed the Supernova programming
language and the Ring programming language using PWCT to prove that it can be used for
advanced and large projects. Feedback from developers and results from the studies
indicate that PWCT is a very appealing, competitive, and powerful language.
vi
الملخص
تعلم برمجة الكمبيوتر كان دائما تحدى ومنذ الستينات فى القرن الماضى اتجه الكثير من الباحثين نحو تطوير لغات
البرمجة المرئية (الصورية) للمساعدة فى هذا الجانب .فى هذه الرسالة تم إختيارعشرة لغات برمجة مرئية ثم تم بعناية
دراستهم وتجربتهم وعمل تقييم لهم وقد تم استخدام 15معيار فى عملية التقييم وعمل المقارنات والتصنيف ثم تم عمل
تحليل للفجوة الموجودة و تم تقديم قائمة من المتطلبات للغة برمجة مرئية متعددة األغراض باالضافة الى إرشاد لمساعدة
المبتدئين فى تعلم البرمجة على إختياراألداة المناسبة ثم تم تطوير و تقديم تقنية البرمجة بدون كود وهى لغة برمجة
مرئية متعددة االغراض و مبتكرة .الهدف من تطويرها ليس فقط انشاء لغة برمجة مرئية عامة ومتعددة األغراض ولكن
إنشاء لغة مرئية يمكن ان تقدم قوة وقدرات اللغات النصية على مستوى القدرة على تطوير التطبيقات والمشاريع التى
تطور بلغات مثل السى ++والجافا على سبيل المثال .كما يشير اإلسم فإن تقنية البرمجة بدون كود ال تتطلب كتابة كود
والمستخدم يحتاج فقط لمعرفة أساسيات مفاهيم البرمجة ليتمكن من إستخدامها .تقنية البرمجة بدون كود لها الكثير من
الخصائص مثل (عامة ومتعددة األغراض – مفتوحة المصدر – سهلة اإلستخدام – تنتج لنا الكود بلغات برمجة نصية
مختلفة – قابلة لتخصيص المكونات وإنشاء مكونات جديدة – تتيح استخدام لوحة المفاتيح بجانب الفارة النجاز المهام
بمرونة – تنتج توثيق تلقائى لخطوات انشاء التطبيقات( .تم نشر تقنية البرمجة بدون كود كمنتج حر مفتوح المصدر
على موقع السورس فورج للمشاريع مفتوحة المصدر وتم تحميل تقنية البرمجة بدون كود أكثر من 230الف مرة
باالضافة الى تحميل يتخطى 19مليون و 500ألف بالنسبة لالمثلة والدروس التعليمية الخاصة بتعلم التقنية .أيضا تم
تصميم و تطوير لغة البرمجة سوبرنوفا ولغة البرمجة رينج بإستخدام تقنية البرمجة بدون كود إلثبات أن التقنية يمكن
ان تستخدم فى المشاريع المتقدمة والكبيرة .نتائج الدراسات وردود الفعل من المطورين تشير الى أن تقنية البرمجة بدون
كود لغة برمجة مرئية قوية وقابلة للمنافسة.
vii
TABLE OF CONTENTS
Chapter 1 Introduction......................................................................................................................... 15
1.1. Introduction to Visual Programming Languages …………………….………….…………....... 16
1.2. Examples of Visual Programming Languages …...………….………………….….….……….. 17
1.3. Motivation………………………………………………...………………….….……………… 21
1.4. Research Questions………………………………………………………….…….……………. 21
1.5. Research Objectives……………………………………………………….…….…...…………. 22
1.6. Research Publications …………………………………………………….….……………….... 22
Chapter 2 Background......................................................................................................................... 23
2.1 Visual Programming Environment vs. Visual Programming Language…….……….……….… 23
2.2 Visual Programming Dimensions……………………………………….…………….……........ 25
2.3 Visual Representations…………………………………………………….……….…………… 25
2.4 Programming Paradigms……………………………………………………..…………………. 25
2.5 Syntax Directed Editor vs. Free Editor and VPL Compiler……………….….………………… 25
2.6 Visual Programming Languages’ Frameworks………………………….…….……………....... 26
2.7 Visual Programming Languages’ Issues ……………………………….…….………………… 26
Chapter 3 Literature Review............................................................................................................... 27
3.1 Previous Studies ……………………....………………………………..………………………. 27
3.2 Evaluation and Comparative Analysis for Selected Characteristics .………..…………………. 31
3.2.1 Selection Process …………………………………….…….…………..……………………... 31
3.2.1.1 Tools Selection …………………………………………………….….……………….…… 31
3.2.1.2 Metrics Selection ………………………………………………….….…………………...... 32
3.2.2 Comparative Analysis Process …..……………………………………..…………………….. 35
3.2.2.1 Scratch ………………………………….……………………………..……………………. 38
viii
3.2.2.2 Alice …………………………………………….….….…………………………………… 38
3.2.2.3 Prograph…………………………………………..…….…………………………………... 39
3.2.2.4 LabView………………………………………….……..…………………………………... 39
3.2.2.5 Forms/3………………………………………….…….…….………………………………. 40
3.2.2.6 VIPR………………………………………………..…….…………………………………. 40
3.2.2.7 Limnor……………………………………………..………….……………………………. 41
3.2.2.8 Tersus……………………………………………………………………………………….. 41
3.2.2.9 Envision………………………………………………….…...…………………………….. 42
3.2.2.10 Lava……………………………………………………………………………………….. 42
3.2.3 Implications ………………………………………………………...………………………... 42
3.2.3.1 The need for productive general purpose visual programming language ………..………... 43
3.2.3.2 A guide to help the novice programmer choose the right tool …..……………..………...... 45
Chapter 4 Proposed Solution and the Main Design .......................................................................... 46
4.1 The requirements for the new General Purpose Visual Programming Language...…..………... 46
4.2 Graphical Code Replacement ………………………………………………..…………............ 48
4.3 Graphical Code Replacement Method ……………………………………..………………….. 50
4.4 PWCT Architecture …………………………………………………………………………… 52
4.4.1 VPL Layer……………………………………………………………….…………………… 53
4.4.1.1 Goal/Module Designer …………………………………………….…………………......... 54
4.4.1.2 Components Browser…………………………………………….……………………........ 56
4.4.1.3 Interaction Pages…................................................................................................................ 58
4.4.1.4 Form Designer ……………………………………………….…………………………….. 58
4.4.2 PWCT Middleware Layer……………………………………….…………………………… 58
4.4.3 PWCT System Layer…………………………………………….………………………….... 62
Chapter 5 Implementation and validation........................................................................................... 63
ix
5.1 Usability and Capability Evaluation ……………………………..……………………………...
63
5.2 Efficiency Evaluation……………………………………………..……………………………... 65
5.3 Reputation Evaluation…………………………………………..……………………………….. 68
Chapter 6 Summary and Conclusion.................................................................................................... 77
6.1 Conclusion ………………………………………………………………………………………. 77
6.2 Future Direction………………………………………………………………………………….. 78
Bibliography......................................................................................................................................... 79
Appendices………………………………………………………...…………………………………. 88
A Guided Tour………………………………………………………….…..………………………………….. 88
A.1 Hello World Example………………………………………………..……………………………………. 88
A.2 How to maintain programs………………………………………………………………….…………….
97
A.3 GUI Applications……………………………………………………………………….………………… 98
A.4 Search in Visual Source………………………………………………………………….……………… 103
A.5 the Time Dimension…………………………………………………………………….………………. 103
A.6 See the code behind every step………………………………………………….………………………... 105
A.7 Dealing with multiple steps at the same time……………………………………….…………………… 107
A.8 the Time Machine and playing programs as movies…………………………….………………………. 108
B Students Progress In Learning PWCT…………………………………………….……………………….. 109
C Designers in our Visual Programming Languages’ Framework Designers …..….………………………… 118
x
Table of Figures
Figure 1: The Alice system ………………………………............................................. 17
Figure 2: The Scratch system………………………………………….….……………. 18
Figure 3: Application Modeling in the Tersus Platform…………….….…………….... 19
Figure 4: The Limnor system……………………………………….….…………….… 19
Figure 5: Visual Studio – Writing code using C#............................................................ 23
Figure 6: Netbeans – Using Java to create Mobile Application………….….……….… 24
Figure 7: Qt Creator – Using C++ to create multi-platform GUI Applications……...… 24
Figure 8: Evaluation and Comparative Analysis …………………………..………….. 31
Figure 9: Flowchart to help the novice programmer choose the right tool……..…….... 45
Figure 10: Source Code and the equivalent Steps Tree………………..……………..... 51
Figure 11: PWCT Architecture……………………………………..………………….. 53
Figure 12: A program in PWCT can have many goals………………..……………….. 55
Figure 13: Essential Use Case Model for Goal/Module Designer……..………………. 56
Figure 14: Components browser use case diagram……………………..…………….... 57
Figure 15: Components categories in PWCT Library…………………..…………….... 57
Figure 16: Time in seconds and Memory in MB and Number of user steps…..……….. 66
Figure 17: The difference of application source size between PWCT and VS……..….. 67
Figure 18: PWCT and Visual Studio actual interaction time in hours………..………... 67
Figure 19: Weekly downloads according to www.sourceforge.net.................................. 69
Figure 20: User satisfaction according to www.sourceforge.net...................................... 69
Figure 21: Multimedia applications screen snapshots developed using PWCT..………. 70
Figure 22: RVC Business applications screen snapshots developed using PWCT..….... 71
Figure 23: Multi-user client-server database application developed using PWCT…..….71
Figure 24: Production Follow-up Application developed using the GCR method…...... 72
Figure 25: Courses Management Application developed using the GCR method…....... 73
Figure 26: Critical Nodes Detection Application using the GCR method………..….… 74
Figure 27: The Supernova programming language developed using the GCR method... 75
Figure 28: The Ring programming language developed using the GCR method..…….. 75
Figure 29: The Ring Virtual Machine developed using the GCR method…………...… 76
Figure 30: The Ring Lists Implementation developed using the GCR method….…..… 76
Figure 31: PWCT – Goal/Module Designer………………………………………...…. .88
Figure 32: PWCT - Components Browser…………………………………………..…. 91
Figure 33: PWCT – Interaction Using Transporter window……………………..…...… 92
Figure 34: PWCT – Goal/Module Designer – Generated steps………………………... 93
xi
Figure 35: PWCT - Components Browser – Using Keyboard………………………… 94
Figure 36: PWCT – Interaction window………………………………………………. 95
Figure 37: PWCT – Goal/Module Designer – Generated steps……………………….. 96
Figure 38: Application during the runtime…………………………………………….. 96
Figure 39: PWCT – Goal/Module Designer – Steps Tree - GUI application………..... 98
Figure 40: PWCT – Form Designer…………………………………………………… 99
Figure 41: PWCT – Components inside the domain “Controls”……………………… 99
Figure 42: PWCT – Interaction Page for the component “Define new window”……...100
Figure 43: PWCT – Interaction Page for Multi pages component……………………..101
Figure 44: PWCT – Interaction Page for Multi pages component……….…………….103
Figure 45: PWCT – Search for a step inside the Goal/Module designer………….…...104
Figure 46: PWCT – Using the Time Machine to go backward ………………………..104
Figure 47: PWCT – Looking at the code behind a step………………….…………….105
Figure 48: PWCT – Code Extractor Application………………………………………106
Figure 49: PWCT – Goal/Module Viewer……………………………………………..107
Figure 50: PWCT – Goal/Module Designer - Using the Time Machine………………108
Figure 51: Students Level in PWCT Course…………………………………………...116
Figure 52: YouTube Playlist Statistics for Level 1 of PWCT Course…………………117
Figure 53: YouTube Playlist Statistics for Level 2 of PWCT Course…………………117
Figure 54: YouTube Playlist Statistics for Level 3 of PWCT Course…………………117
Figure 55: Interaction Designer………………………………………………………...118
Figure 56: Transporter/Component Designer – Interaction Pages……………………..119
Figure 57: Transporter/Component Designer – Code Mask (Script)…………………..119
Figure 58: Transporter/Component Designer – Matching……………………………..120
Figure 59: Transporter/Component Designer – Rules………………….……………...120
xii
List of Tables
Table 1: Evaluation Metrics…………………………………………………….………..32
Table 2: Evaluation and a Comparative Analysis………………………………….…….36
Table 3: the average results of a simple program ……………….……………………....44
Table 4: Requirements for General-Purpose VPL ………….….………………………..46
Table 5: shows the replacement process for one line of code…….…………………..… 51
Table 6: Textual Programming Language’s vs PWCT’s terms…….………………....... 55
Table 7: Sample of the variables and values……………………………….…………… 60
Table 8: Sample of the variables of Interaction Page Variable and Code Mask….…...... 61
Table 9: GCR Rules to write a Code Mask………………………………….………...... 61
Table 10: Usability and Capability Evaluation…………………………….…………… 64
Table 11: The average results of a simple program ……………………….…………… 65
Table 12: The results of large scale application …………………………….………...... 67
Table 13: Goal/Module Designer buttons and their description…..……….…………… 89
Table 14: Students progress in learning PWCT………………………………………...109
xiii
List of Abbreviation
VPL
Visual Programming Language
GUI
Graphical User Interface
GPVPL
General Purpose Visual Programming Language
VPE
Visual Programming Environment
VR
Visual Representation
SDE
Syntax Directed Editor
FE
Free Editor
VPLC
Visual Programming Language Compiler
VPLF
Visual Programming Language Framework
TPL
Textual Programming Language
PWCT
Programming Without Coding Technology
GCR
Graphical Code Replacement
GD
Goal/Module Designer
CB
Components Browser
IR
Interaction Designer
FD
Form Designer
VS
Visual Studio
xiv
Chapter 1: Introduction
1.1. Introduction to Visual Programming Languages
In the age of information technology, software development plays a vital role in responding
to companies’ and organizations’ needs for high-quality information systems. Providing highquality, reliable, scalable, efficient, easy to use, and cheap software is a nontrivial task. Meeting
the requirements of such software requires proficient programmers and more productive software
development tools. And so, there is an increasing need for software development tools that are
easy to learn, general purpose, and highly productive [1].
As a result of the complexity in software requirements, many aspects of the software
development process evolved and many tools were developed to help the programmers. Integrated
development environments (IDEs) like Microsoft Visual Studio, NetBeans and Eclipse are
essential for large projects. When using such tools, the programmers need to know not only the
general programming paradigms but also the strict syntax of each programming language used.
In these tools, the program representation in the source code is limited to text where photos and
graphics can’t be part of the source code. Moreover, the more expressive the programming
language is the more complicated its syntax becomes and this makes it harder to understand and
code with. This challenge made it more appealing to use VPLs, which attract more programmers,
and can increase the productivity of developing software [2-5].
A VPL combines the features of integrated development environments and information
systems to provide a visual tool for applications’ development [5]. In addition to that, VPLs enable
the development of applications and computer programs using more than one dimension, and
provide a programming system based on interaction with graphical elements that mix between
Text, Shapes, Colors, and Time, instead of typing text source code [6-10].
Currently, there are many VPLs in the market, but most of the successful and widely used
ones are educational tools such as: Scratch, Alice & Kodu; or domain-specific such as: Max/MSP
(Music and Multimedia) and LabView (Data Acquisition, Instrument Control and Industrial
Automation). General-purpose VPLs like Limnor, Tersus, and Envision exist as well, but these
languages are not widely used, According to TIOBE Index that measures the popularity of
15
programming languages. The TIOBE Index is updated once a month and uses rating based on
courses, skilled engineer and third party vendors. Also it uses the popular search engines to
calculate the ratings. [5, 11].
This survey is a step forward towards developing a new General-Purpose VPL that can be
used by novice and mainstream-programmers to get more productivity without adding significant
limitations that prevent the practical use of the proposed language. This research determines the
limitations in previous implementations and defines the requirements of the new general-purpose
VPL. In addition to that, a guide to help novice programming choose the right tool for their
application is provided.
1.2. Examples of Visual Programming Languages
VPLs improve the methods in which programmers convey the display and processing of
information. They allow the users to comprehend and then alter the results visually by utilizing
graphics, animations, drawings and icons [20]. Experts in computer graphics, programming
languages, and human-computer interaction need to collaborate to develop a VPL. The first VPL
was put into practice in the 1960s, however, the success of visual programming was not achieved
until the middle of the 1980s when graphics hardware became widely used [18, 19, 94].
Since 1960, more than 60 VPLs and visual programming environment have been developed in
several domains. These tools can be classified into three main categories, namely, Forms/Reports
based, Diagrammatic, and Iconic [8].
Most of the successful VPLs are domain-specific languages. For example, in the science and
industrial domains, LabVIEW is an eminent VPL, which is designed for automating the usage of
processing and measuring equipment in any laboratory setup [12]. Ladder Logic is also a VPL
used to develop software for Programmable Logic Controllers (PLCs) in industrial control
applications [13]. In the multimedia domain, OpenMusic is an object-oriented visual
programming environment for musical composition based on Common Lisp [14]. In the
educational domain, Alice [15] and Scratch [16, 17] are reputable VPLs that allow people of any
age to be familiar with the programming world. Besides being domain specific, many of the
existing solutions are unable to deal with large and complex programming problems let alone
preserving a reasonable level of readability and maintainability. Moreover, many of these VPLs
are still struggling to avoid frustrating programmers with strict limitations, unnecessary
complexity, low productivity, and problems related to the quality of the final product.
16
Alice is a VPL where objects are manipulated in a 3D world (as shown in figure 1). It was
developed at Carnegie Mellon University; it gives students the chance to learn about objectoriented programming concepts without the syntax frustrations imposed by text-based
programming languages. With Alice, a programmer using a Graphical User Interface (GUI)
environment selects program constructs and methods from lists of available choices [15, 21-22,
95].
Figure 1: the Alice System [15]
Scratch is developed at the Massachusetts Institute of Technology Media Laboratory. It is a
new VPL and environment that supports the creation of interactive stories, games, animations,
music and art projects (as shown in figure 2). Scratch allows educators to reduce the cognitive
load that learners experience when they are initially introduced to programming [23-24, 96].
17
Figure 2: the Scratch System [23]
Kodu is an educational tool that was developed by Microsoft Research in 2010 to teach the
basics of game development. Kodu is a new icon-based visual language programming made
especially for creating games. It was designed to be appealing to children and enjoyable by
everyone. The Kodu language is entirely event driven, where each line of programming is in the
form of a condition and an action [25, 97].
LabView is a licensed software and it targets scientists and engineers. It is a graphical
development environment with built-in functionality for data acquisition, instrument control,
measurement analysis, and data presentation (Li et al., 2011). In LabView, the execution is
determined by the structure of a graphical block diagram in which the programmer connects
different function-nodes by drawing wires [13].
Tersus is an open source VPL developed by Tersus Software Ltd. It is used to build rich web
and mobile applications by visually defining user interface, client side behavior, and server side
processing (as shown in figure 3). It is a general purpose language that utilizes flow diagrams [93,
98].
18
Figure 3: Application Modeling in the Tersus Platform [93]
Limnor (shown in figure 4) developed by Longflow Enterprises Limited is general-purpose
VPL. It is based on visual studio .NET. It can be used to create most applications, interactive
multimedia kiosks, sales presentations, database applications with interactive query and search,
business management systems, internet payphone kiosks, etc. Non-technically oriented users can
use it [26]. Limnor supports code generation only in C#.
Figure 4: the Limnor System [26]
19
Prograph is a popular general purpose VPL licensed under Prograph CPX and Marten. The
Object-Oriented, Data-flow & multi-paradigm language has long been known to reduce
development time through drag and drop of iconic symbols to create programs[38].
Envision is a general purpose VPL that integrates imperative and object oriented programming
paradigm in its design. It is an open source language that can be used in small and large scale
projects as it can adopt both a High Level and Low Level programming. It partially supports
Import/Export of Code from Java & C++. It’s still under development [5].
VIPR is visual programming language that can be leveraged in small to large scale projects
depending on the needs of a user. The language depicts both high level and low level
functionalities on the basis of TCL and C++/TCL extensions respectively [90].
Lava is a general purpose VPL language but it is not used for production in the sense that it is
only used for experimental purposes. As an open source language. The language is designed for
Ease of Learning, Use, and Program Comprehension [92].
Forms/3 is a Declarative and spreadsheet-based high-level language that has long been used for
general small and large projects. It is one of the language created to escalate development time in
project realization[37].
Scratch, Alice, and Kodu are limited to the educational environment. Moreover, Scratch and
Kodu were constricted at student level, while Alice can be used also at faculty level and other
novice programmers to explore learning concepts of algorithmic thinking.
20
1.3. Motivation
The requirements for software applications are increasing because computers are now very
large part of our everyday life. Software programs are more complex because of many factors.
Nowadays programs run on a wide variety of hardware like high-performance clusters, personal
computers, embedded devices and distributed systems. Applications are developed for different
fields and the cost can vary significantly as free open-source software compete with proprietary
software. Decreasing cost, improving reliability and increasing scalability are some of the
requirements facing software developers. In the age of information technology, software
development plays a vital role to respond to companies and organizations need of high quality
information systems. This leads to the need to more programmers and more productive software
development tools to be able to respond quickly to companies need with high quality [5].
After the success of many domain specific VPLs like Scratch, Alice by reaching millions
of users worldwide, it’s expected to find more interest in creating new VPLs that help novice
programmers to learn programming and help mainstream programmers to create high-quality
programs faster. Such languages must be designed carefully to solve current VPLs’ issues without
creating new problems and this is an important factor for new VPLs to gain popularity. Also, to
increase the usage of these new VPLs, they need to compete and/or integrate with mature
development tools that are based on popular programming languages such as C++, Java, C#,
Python and Ruby [5-7, 13, 23].
1.4. Research Questions
The questions that we aim to answer during this thesis are:
1. What are the problems that prevent mainstream programmers from using the current visual
programming languages?
2. What is the design of a general-purpose visual programming language that can solve
mainstream programmers problems and encourage them to use the proposed visual
programming language in developing practical software?
21
1.5. Research Objectives
The objectives of this research subject are:
1. Creating a Framework for creating visual programming languages to help us in creating the
visual programming language components faster. The framework must contains the
designers and domain-specific language to quickly create the visual programming language
components. The implementation of each component should be done in little minutes to
ensure the high-level of productivity.
2. Designing a General-Purpose visual programming language to make programming easier
to understand for audiences other than programmers and to help expert programmers to
quickly create programs and applications in less time.
3. Implementing the General-Purpose visual programming language through an information
system that support programs and applications creation and manipulation, to reduce errors
and to help users program faster.
4. Evaluating the system in developing business applications and comparing this to using
other traditional programming languages that are text based.
1.6. Research Publications
The author had participated in two International Conferences. These conferences provided
opportunities for the research to be shared with researchers. This first paper present the PWCT
software while the second paper present a novel algorithm that we implemented using PWCT.
(1) Mahmoud S. Fayed, Muhammad Al-Qurishi, Atif Alamri, Ahmad A. Al-Daraiseh ,
PWCT: Visual Language for IoT and Cloud Computing Applications and Systems , ICC
'17, March 22 2017, Cambridge, United Kingdom
(2) M Imran, MA Alnuem, Mahmoud S. Fayed, Atif Alamri, "Localized algorithm for
segregation of critical/non-critical nodes in mobile ad hoc and sensor networks",
Procedia Computer Science 19, 1167-1172
22
Chapter 2: Background
2.1 Visual Programming Environment (VPE) vs Visual Programming Language (VPL)
It is worth explaining the difference between VPLs and VPEs. Programming languages like
Visual Basic, Visual FoxPro, Visual C# and Visual J# are not VPLs. All of these languages are
textual languages. The programmer must write textual code using the language’s syntax. Other
environments such as Microsoft Visual Studio are Visual Programming Environments (VPE) not
VPLs [27]. Visual Studio (shown in figure 5), NetBeans (shown in figure 6) and Qt Creator (
shown in figure 7) provide designers and tools to create some parts of the application using visual
components, but the textual code is necessary to complete useful and real applications. On the
other hand, VPLs use different visual components instead of writing code.
Figure 5: Visual Studio – Writing code using C# [106]
23
Figure 6: Netbeans – Using Visual Programming + Java textual code to create Mobile
Application [106]
Figure 7: Qt Creator – using C++ and the Qt framework to create multi-platform GUI
Applications [106]
24
2.2 Visual Programming Dimensions
In textual programming languages like C, C++ and Java, the code is text based and is
unidimensional. In VPLs, the graphical code uses more than one dimension. Each graphical object
has its place in 2D or 3D worlds. Each object may have its shape, colors and images. There are
many relationships that can appear between objects such as: Inside, Outside, Touch, next-to, etc.
Some languages also use the time as another dimension in the graphical code [27].
2.3 Visual Representations
A VPL can have one of the following four representations [28]:
1. Diagrammatic: uses components of shapes and text and use links to connect between shapes
and represent the control or data flow.
2. Iconic: uses icons from the domain of the problem.
3. Form based: uses forms such as spreadsheet or data-entry forms.
4. Hybrid: uses a mixture of any of the above three.
2.4 Programming Paradigms
Many programming paradigms exist. Imperative, Declarative, Procedural, ObjectOriented, Functional, Concurrent, Data-Flow, and Event-Driven Programming paradigms are
common. All of these paradigms can be used in VPLs beside the visual programming approach.
Some VPLs use one paradigm only, while others are considered multi-paradigm [29].
2.5 Syntax Directed Editor vs Free Editor and VPL Compiler
Some VPLs use a syntax directed editor which is syntax-aware and prevents the
programmer from making syntax errors. When used, the user can’t make syntax errors, and after
each step, the visual source or the graphical code will be correct, and can be executed directly
after compiling without problems. Some VPLs compile the graphical code directly after each step
during the design process. Other VPLs provide a free editor where the programmer have freedom
to make mistakes during the development process and the VPL compiler can discover the errors
during the compiling process. While the syntax directed editor is more suitable for novice
programmers, the free editor provides more flexibility to the advanced ones [30].
25
2.6 Visual Programming Languages’ Frameworks
A VPL’s framework is a collection of tools that enable the developers to create new VPLs
in less time with less efforts and better quality by utilizing ready to use and well tested tools [31].
In this thesis we created a visual programming languages’ framework to use for developing
the general-purpose visual programming language. In the Appendix C. we shows the designers in
our visual programming languages’ framework.
2.7 Visual Programming Languages’ Issues
In general, four main issues need to be addressed when talking about the limitations of VPLs,
namely, space, static representation, domain, and comments. In terms of space, almost all visual
representations are physically larger than the text they generate, so the space used to show a
program in a VPL is greater when compared with a text based program. Regarding the static
representation, many programs created by VPLs look like a maze of wires that are hard to
understand. Concerning the domain, a VPL can be classified as General or Specific domain. The
most successful VPLs are designed for specific applications because general purpose languages
are difficult to design and implement. In regard to comments, many VPLs don’t provide a place
for writing comments [32-35].
26
Chapter 3: Literature Review
In a study about LabVIEW [36], the authors designed a survey to capture the cognitive
effects of visual programming representations. The research was centered on a well-designed
questionnaire to capture users’ perceptions on visual effects of LabVIEW. After collecting and
analyzing the data, it was found that most of the respondents felt that LabVIEW is an effective
tool. Moreover, it was clearly established that the users found the visual aspects of LabVIEW to
be more appealing than the other features rated during the survey.
In another study about Forms/3 and the Spreadsheet Paradigm [37], The main goal of the
authors in this article is to show that procedural abstraction, graphics, and data abstraction are
possible in the spreadsheet model. The authors presented a review based on forms/3 in a bid to
show how limitations in a spreadsheets paradigm of programming can be alleviated for better enduser functionality. The author utilizes forms/3 in this research as a prototype from a language
design perspective and from a human oriented perspective. It was found that it was actually
possible to improve spreadsheets beyond the state they were at the time of documentation of this
survey. Some of the features that were seen to have potency for improvement in spreadsheets
were graphical types, gestural programming, dynamically-sized grids, generalized abstractions,
graphical I/O, time travel, and steering.
In a Survey about Data Flow VPLs [18], The Authors did an in-depth review of fifteen data
flow VPLs. The tools were first categorized depending on their application domain. Then, they
were studied for characteristics and strengths. The authors argue that for a language to be
considered powerful it should have predefined functions and programming constructs. Lastly,
they gave an overview of unsolved problems in the topic such as, the large interfaces of such
VPLs.
The article concluded by giving a general overview of the characteristics of data flow VPLs,
the strengths and weaknesses at the time of research.
It’s worth mentioning here that the authors stated that the creation of visual languages that suit
a wide array of application domains can be a good area of research, not to mention that users
should also be allowed to choose their level of expertise rather than being presented with rigid
functionalities by languages.
27
In a Pleminary Report about PROGRAPH [38], the authors presented a review of
PROGRAPH which is a VPL based on data flow computational model. The main goal was to
provide the reader with a detailed analysis of the features of PROGRAPH plus its built-in
operations. And hence, the article was structured to make it easy for novice PROGRAPH
enthusiast to get an understanding of the core concepts of the language. The authors integrated
many examples in the discussion in a bid to cover the whole language and to ensure that the reader
understands this VPL better.
In a study about the Users of Scratch [39], the authors analyzed Scratch to identify the
problems faced by skilled programmers when using the software. The authors created four teams
of programmers and asked them to provide a comparison between Scratch and traditional
integrated development environments. They discussed the usability of the tool at the fundamental
programming level as well as at the graphical user interface level. Later, the experience of the
programmers on each of the two interfaces was categorized based on the Nielsen usability
framework. The authors found that there is a broader field for possible improvements in the
operation of Scratch based on the logical errors that were encountered by some of the users.
Furthermore, the developers of the tool need to do a better job in explaining some of the tool’s
aspects.
In a study about LabVIEW and Simulink [40], the authors evaluated both LabVIEW and
Simulink and did a comparison between them. Although there are many perceived differences
between these two tools, the authors tried to find the relationship between LabVIEW and Simulink
based on the criteria of their functionality as well as ease of use. The results showed that the
majority of the users preferred using LabVIEW over Simulink due to its capabilities and ease of
use. According to the authors, there is need to carry out a proportional study on LabVIEW and
Simulink based on other criteria apart from the ease of use and functionality. Furthermore, even
though LabVIEW has an advantage over Simulink based on graphical display and DSP hardware
integration tools, it is not necessarily the best deal among the two. Extensive research is needed
to develop a comprehensive analysis between the two languages.
In another study about Teaching Programming Concepts to High School Students with
Alice [22], the authors examined the possibility of using Alice to teach programming concepts to
high school students. In this study, the authors divided 166 students into two groups and taught
28
C++ to one group and Alice to the other. The results of the achievement test showed that the Alice
group scored higher than the C++ group. The results suggest that students who were taught Alice
had a better understanding of the concepts of programming and were more interested in exploring
the different aspects of programming on their own.
In a study about Student Opinions of Alice in CSI [42], using a questioner, the authors
studied the responses of eighty-four college students who were taught Alice first and then Java.
The authors discovered that the majority (59.5%) of the students felt that their experience with
Alice helped them learn Java, and 66.7% of the students felt that the department should keep using
Alice in the curricula.
In another study about Alice and Pair – Programming [43], the authors used 6 noncomputing major sections with a total of 89 students to determine to which extent the students
enjoyed the programming environment provided by Alice. In two sections the students were
asked to work separately, however, in the other four, the students worked in pairs. The authors
gave the students few assignments and later asked them to write an essay about their experience.
The results showed that the student enjoyed working with Alice, became more confident, and
had a better understanding of programming concepts.
In another study about Children Learning Computer Science Concepts via Alice Game
Programming [44], the authors studied 325 middle school students to see if they can gain
knowledge on the complex concepts of computer science. The students were asked to develop
simple games using Alice. The authors reported that the students were able to learn many concepts
such as, abstraction, modeling, control structure, and events’ handling.
In a study about the effects of the media to promote the scratch programming capabilities
creativity of elementary school students [87], the authors tried to see the effect of using Scratch
on elementary school student’s creativity. They developed a simple program using Scratch to
provide guidelines to students and used a sample of 60 students in their first grade to use it. The
authors reported that using such application had a positive impact on the students’ creativity.
In a study about Prograph 2.0 [88], the author expressed his opinion of a specific version
of Prograph that includes a compiler. The compiler facilitates the production of executable
29
applications that operate as standalone. The author stated that this tool is well thought out, well
integrated with Macintosh environment, and has good documentation.
In a Review on Teaching and Learning of Computational Thinking through Programming
[89], the authors reviewed 27 articles that focused on introducing computational thinking to K-12
curriculum. The authors found that the majority of the studies focused on introducing
computational thinking concepts and few considered practice and perspective. And hence, they
encouraged researchers to do more studies focusing on the latter two aspects.
In a study about Visual Programming Languages [90], the authors studied five VPL tools
namely, Ark, Vipr, Prograpgh, Forms/3, and Cube. They presented different classifications, and
touched on the theory of VPLs in general. Later, they showed where the five tools fall. Lastly,
they commented on VPLs related issues such as, control flow; and procedural and data
abstraction.
In a study about programming environments and languages for novice programmers [91],
the authors in this article provided a taxonomy of a large number of tools. Some of the tools are
VPLs and others are not. They categorized the tools in two major groups, tools to help teaching
programming and others to support the use of programming (empowering) to achieve other goals.
Then they divided the teaching category into multiple categories based “mechanics of
programming”, “social learning” and “providing reason to program”. The empowering category
was divided into two groups “mechanics of programming” and “activities enhanced by
programming”. Each of the group was later divided into other groups based on different aspects.
Each of the tools was classified according to the different categories mentioned above. Lastly, the
authors concluded that the majority of the tools focused on the mechanics of programming and
there is a need for tools to provide reasons so more people start learning programming.
30
3.2. Evaluation and Comparative Analysis for Selected Characteristics
In this section we will compare between different VPLs, We have three stages, In the first stage
we will do the selection process and In the second stage we will do the comparative analysis
process. And in the third stage we will provide the implications as demonstrated in figure 8.
Figure 8. Evaluation and Comparative Analysis
3.2.1. Selection Process
The selection process is divided into two stages, In the first stage we will select the tools and in
the second stage we will select the metrics.
3.2.1.1 Tools Selection
In this chapter, ten different VPLs were studied and analyzed to show their strengths and
weaknesses. The main goal of this study is to come up with a set of requirements for a generalpurpose VPL that is easy to learn, fast, can be appreciated by both novice and expert programmers,
used to develop small and large applications, and produces output code in different languages. A
minor goal of this study was to help a person decide which of the ten tools suits his needs.
31
There exist many visual programming languages. In this research, ten tools that cover different
types of visual representations and design goals were selected. The tools were selected for
different reasons, for example, Scratch, Alice and LabVIEW were selected because they are the
most popular VPLs according to TIOBE index. LabView, Prograph, VIPR and FORMS/3 were
selected because they are very popular in the literature. Tersus and Limnor were selected because
they are general purpose and used in practical and different types of applications. Finally, Lava
and Envision were selected because they look familiar to programmers with knowledge of textual
code and paradigms like object-oriented.
3.2.1.2 Metrics Selection
To start with, we had to decide on the criteria for assessment/evaluation. A team of researchers
backed with few experts in the field [107] suggested fifteen different criteria as shown in Table
1. Most of the criteria are based on the common non-functional requirements in every software
[108] and the common criteria of programming languages in general [109].
Criteria
Domain & Scope
Compatibility
(Exporting/
Importing
text code)
Programming
Paradigm
Code SubCr Description
SubCr
Description
Cr1 A Domain Specific
B General-Purpose
C High Level
D Low Level
Programming
Programming
E Can Create Large
F Creates only Small
Programs
Programs
Cr2 A Export to many
B Import from many
languages.
languages.
C Export to one
D Import from one
languages.
languages.
E Export not supported F Import not supported
G Allows scripts and
code.
Cr3 A Multi-paradigms
B One programming
paradigm
C Imperative
D Declarative
Programming
Programming
32
E
G
License & Cost
Cr4
Development Time
I
A
C
E
A
Cr5
(Decreased:Dec
C
Increased: Inc)
E
G
I
Size of programs
Cr6
A
C
Readability
(Decreased:Dec
Increased: Inc)
Cr7
Performance
Cr8
Event-Driven
Programming
Data-Flow
Programming
Spread-sheet based
Published Software
Free Software
Open Source
Dec by Drag-AndDrop
Dec by allowing
writing input such as
equations.
Dec by Keyboard
shortcuts
Inc: many ops to do
simple tasks such as
assignment.
Dec by providing
tools such as GUI
builder to create UI.
Small (uses small
blocks or icons).
Small (hides optional
details
A Inc: using (text,
colors, shapes &
icons)
C Dec due to the use of
many connections
between blocks.
A Fast enough for
applications
F
H
J
B
D
F
B
D
F
H
J
Object-Oriented
Programming
Procedural
Programming
Control-Flow
Not published
Commercial
Closed Source
Dec by High Level
components.
Dec by using other
dimensions such as the
Time dimension
Inc: Mouse only is
used.
Inc: missing editor
features like (Search,
Replace, etc.).
Dec using Liveness
B Large (uses large
components and many
connections).
D The size is dynamic
B Dec due to missing
features like changing
the font size
D Dec by allowing text
similar to textual code.
B Inc: compiles to
languages like C
33
C
Memory Usage
Portability
Inc: allows C
extensions
Cr9 A No critical problems
found
C Needs Large RAM
(>1 GB)
E Optimized by the
programmer
Cr10 A Multiplatform(Win,
Mac, etc.)
C Only MS-Windows
E
Only Apple Mac OS
X
Security and Safety Cr11 A No critical issues
B Some Critical Problems
D Needs small RAM
(256MB)
F Depends on the
application.
B One Platform
D Only Web Based
(Online)
F Only Sun/Solaris
B Depends on the
developed app’
C
Scalability
Extension
The tool is a
prototype (issues)
Cr12 A Suitable for small
applications
C Hard to manage large
projects (missing
OO)
E Divides Apps into
subroutines
G Uses containment or
nesting
Cr13 A Support Extension
D Application dependent
C
Documentation
uses HTTP and
JavaScript
E The Ch interpreter
Cr14 A Reference
B Suitable for large
applications
D OO is used to manage
large projects.
F
App can run across
multi-cores
H Uses Zoom in and
Zoom out
B No support for
extension
D Done by the Tool
Developers
B Getting Started
34
Support
C Tutorials
E Research Papers
G Documents for
Contributors
Cr15 A There is support
C Provided by a
Company
E No English Forum
Table 1. Evaluation Metrics
D Book
F No Documentation
H Online Documents
B No Support
D Provided by (Forums)
Table 1 shows all fifteen criteria and 92 sub-criteria. The majority of them are selfexplanatory, and hence, there is no need to define them. It is important to know that, generalpurpose here means the language can be used to develop similar programs to those done with
textual languages such as C++.
To evaluate the tools, each tool was evaluated by three different team members for all 15
criteria. The results of each of the evaluators were then gathered and compared. To claim whether
a tool has a specific feature or not, two of the evaluators at least needed to agree. Few randomly
chosen points were re-evaluated by the main author to make sure that the evaluation process is
accurate and complete.
To gather the required information, the evaluators had to download, install, and experiment
with the tools. They also visited the tools’ websites, read published articles about the tools,
searched the web, and sent questions to developers or to forums. Each of the evaluator did their
evaluation independently to be as comprehensive and unbiased as possible. The results of the
evaluation are discussed in the next section.
3.2.2. Comparative Analysis Process
Table 2 below shows the results of evaluating the ten tools. One of the main findings is that eight
of the tools claim to be general purpose. According to our definition above, a VPL is general
purpose if it can be in different domains and develop different types of applications. In other
words, it has to be comparable to a textual language such as C++. Only the authors of Scratch and
Alice state that they designed their VPLs to be used in education while the others claim to have
developed general purpose VPLs and not for a particular domain.
35
In practice Lava, VIPR and Forms/3 are just research tools and are known to be used for serious
development. Tersus is used in web and mobile database applications only. Prograph is used in
desktop database applications and only mac os x. Limnor is used in database applications for
windows – desktop and web but not for low level programming. LabView is used by engineers
for automating the usage of processing and measuring equipment in any laboratory setup.
Evaluating The other criteria doesn’t provide a proof that the above VPLs are general purpose
that can replace C++ and java for system programming and applications development.
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
Lava
Envision
T
Tersus
T
Limnor
Cr6
T
VIPR
Cr5
T
Forms/3
Cr4
T
L-VIEW
Cr3
T
ProGraph
Cr2
Description
Domain Specific
General-Purpose
High Level Programming
Low Level Programming
Can Create Large Programs
Creates only Small Programs
Export to textual code in many languages
Import from textual code in many languages.
Export to textual code in one languages.
Import from textual code in one languages.
No support to export to textual code.
No support to import from textual code.
You can write scripts and code too.
Multi-paradigms
One programming paradigm
Imperative Programming
Declarative Programming
Event-Driven Programming
Object-Oriented Programming
Data-Flow Programming
Procedural Programming
Spread-sheet based
Control-Flow
Published Software
Not published
Free Software
Commercial
Open Source
Closed Source
Increased using Drag-And-Drop
Increased using High Level components that hide the details.
Increased because some input can be written directly like equations.
Increased because of using other dimensions like the Time dimension
Increased because of using the Keyboard shortcuts to quickly create programs.
Decreased because of using the Mouse only in the interaction.
Decreased because of the need to connect between many components to create small tasks.
Decreased due to missing editor features like (Search, Replace & Multi selection).
Increased using the right tool for the right task like using GUI builder to create UI Forms.
Increased using Liveness
Small (for example: using small blocks or text and small icons).
Alice
Cr1
#
A
B
C
D
E
F
A
B
C
D
E
F
G
A
B
C
D
E
F
G
H
I
J
A
B
C
D
E
F
A
B
C
D
E
F
G
H
I
J
A
Scratch
Cr’
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
36
Cr7
Cr8
Cr9
Cr10
Cr11
Cr12
Cr13
Cr14
Cr15
B
C
D
A
B
C
D
A
B
C
D
A
B
C
D
E
F
A
B
C
D
E
F
A
B
C
A
B
C
D
E
F
G
H
A
B
C
D
E
A
B
C
D
E
F
G
H
A
B
C
D
E
Large (for example: using large components and many connections).
Small due to hiding details that are optional
The size is dynamic and can be changed by selecting more options
Enhanced using visual representation (text, colors, shapes & icons)
Decreased due to some missing features like changing the font size
Decreased due to the use of many lines and connections between blocks.
The text used in the visual representations looks like the textual code.
No critical problems (The speed is enough to run most of the applications
Increase Performance by creating Native Applications
Can be increased by better programmers (Like adding C extensions )
Depend on the application (can be compared to textual code)
No critical problems found that prevent using the software
Critical Problems in memory usage
Development tool need 1GByte RAM
Development tool need 256Mbyte RAM
Memory usage can be optimized by the programmer
Memory usage depend on the application.
Multiplatform(Windows, Linux & Mac OS X)
One Platform
MS-Windows
Web Based (Online)
Apple Mac OS X
Sun/Solaris
No critical problem the prevent using the software
Depend on the application under development and the programmer skills
The tool is just a prototype (bugs and problems are present)
Very suitable for small applications
Very suitable for large applications
The absence of object-orientation/functional programming makes it difficult to scale
The usage of Object-Orientation is good to manage large projects.
Dividing programs to subroutines
Applications Automatically scales and run across multiple cores
Containment or nesting (avoid the graph edge problem)
Scalable using Zoom in and Zoom out
Support Extension
No support for extension
Can be done using HTTP requests and JavaScript
Done by the Tool Developers
The Ch interpreter
Reference
Getting Started
Tutorials
Book
Research Papers
No Documentation
Documents for Contributors
Online Documents
There is support
No Support
Provided by a Company
Provided by open source community (Forums)
No English Forum
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
T
Table 2. Evaluation and a comparative analysis
37
Below we provide a brief description of the findings related to each tool.
3.2.2.1. Scratch
The first Language under the microscope is scratch-a domain specific high level language.
This language is domain specific in the sense that it is tailored to create Games, Stories &
Animations courtesy of an imperative and event driven programming paradigm. Written in
Written in Squeak and ActionScript, Scratch has a good number of advantages that makes it
attractive for use with one of them being the fact that it is open source under GPL v2. and Scratch
Source Code Licenses. The development time is scaled down a lot with this language thanks to
the use of components and drag-and-drop way of programming. Most of blocks depend on small
number of parameters that can be modified directly while the block size is compact to hide the
unnecessary detail. The readability in this platform is also enhanced due to use text, colors and
shapes. Its performance in terms of speed is also good enough to run most of applications
(presentations, stories & games) created by students. It is also very portable as it is supported on
Mac, Linux, Windows and on the Web. It also has free support and documentation that is also
quite palatable for both starters and advanced users-this is through Getting Started, Reference &
Video Tutorials.
On the downside, it should be noted that some features are missing that might decrease the
speed of maintaining programs. Some of these features are Search, Replace and multi-selection
of block, expand/collapse of inner blocks. It is also suitable for small programs and applications
given that the absence of object-orientation and functional programming makes it difficult to
manage large projects. There is also No Standard support to export or Import from text based
source code using languages like C/C++, C# & Java. However, this can be added by the aid of
library for reading/writing MIT's Scratch file format.
3.2.2.2. Alice
This is another domain specific high level language that is popular for programming in 3D
environment mainly for education purposes. Apart from the fact that this language is open source,
it has a wide array of features to put the icing on the cake. One of the most pronounced features
is the speed of creating programs using advanced components and drag-and-drop functionalities,
with most of blocks in use also depending on small number of parameters that can be modified
directly. The size of these blocks is also pretty compact to hide unnecessary details. It can also be
38
used for big projects but it is highly recommended for small projects thanks to its adoption of
object orientation. Furthermore, it is highly portable in the sense that it supports Mac, Linux and
Windows not to mention that it works well with normal memory specs. In terms of compatibility,
the language supports source code generation using Java. The presence of complete
documentation and free support is also welcome among the community members. It is however
important to note that for better performance, a 2 GB or more RAM, VGA graphics card capable
of high (32 bit) color and at least 1024x768 resolution and a sound card are recommended.
3.2.2.3. Prograph
This is a popular general purpose VPL licensed under Prograph CPX and Marten. The
Object-Oriented, Data-flow & multi-paradigm language has long been known to reduce
development time through drag and drop of iconic symbols to create programs. Though the size
of the programs may look larger, this platform design alleviates this through the use of text, colors
and shapes that increase readability. The ability to create classes or simply the object oriented
nature of the language makes it very ideal in dealing with small and large programs. When it
comes to portability, the language is supported in both Mac and Windows while it exhibits
awesome speeds performance wise. The other colossal aspect is that it comes with books that can
be handy not only to beginners but advanced users as well. On a negative dimension is that it
requires MacOS X 10.6.8 or better and it does not have an official support platform barring email
support. Also, it is not open source and one can only get trial versions for testing purposes.
3.2.2.4. LabView
This is yet another Object-Oriented, Data-flow & multi-paradigm language that is popular
among engineers and scientists. It is a high level general purpose language that has found great
use in Data acquisition, instrument control and industrial automation among other scientific and
engineering tasks. It was developed to accelerate development time among users through
sophisticated elements coupled by drag and drop functionalities. This time is also reduced given
the possibility to divide of programs into VI and the ability to run any written code to on multiple
with no changes. Perhaps one of the most advanced feature of LabView is in its extensibility and
Compatibility. In the realm of compatibility, the language can be integrated with graphical, textbased, and other programming approaches not to mention that users can write code and scripts
too! This is made possible through a variety of possible extensions such as the Ch interpreter that
39
can be added to Labview for scripting. Users are also afforded the possibility of buying add ons
for specific applications. The language also boosts a high quality documentation plus lots of
tutorials and forums for user support.
The only challenge is that large programs can grow complex especially with the presence of large
blocks, lines as connections between blocks. The complexity has however been mitigated by
enhanced readability through the use of text, colors, shapes and images in the visual
representation.
3.2.2.5. Forms/3
This is Declarative, spreadsheet-based high-level language that has long been used for
general small and large projects. It is one of the language created to escalate development time in
project realization. This has been well orchestrated by a declarative and drag and drop
programming capability it affords programmers. A good example of this is the ability to write or
demonstrate equations and the ability to use time dimension in cells. It performs quite well and it
does not consume much computer memory especially in research projects.
This open source language has however been pegged back by security issues from bugs and other
problems that is compounded by the lack of proper support and documentation since 2004. This
has also played a role in the difficulty of extension development. It is also not supported by
common Operating systems as it is only supported by Sun/Solaris and Hewlett-Packard/HP-UXat.
3.2.2.6. VIPR
This is yet another powerful VPL language that can be leveraged in small to large scale
projects depending on the needs of a user. The language depicts both high level and low level
functionalities on the basis of TCL and C++/TCL extensions respectively. This way, the language
is known to exhibit imperative, procedural and object oriented programming paradigms tailored
for improved development time. Some admirable advantages of these is that it is to execute runtime animation of the code. Code debugging is also made easy through single stepping through
program snapshots. The use of containment or nesting otherwise known as “Follow the Ring into
the nesting” has also made the language scalable in that eliminates graph edge problem in
programs. The language performance highly depends on the nature of program but it is worth
saying that reduced latency between command issue and execution has increased performance.
The readability of this platform rests on graphical primitives like rings, arrows, and parameter
40
rings. The memory requirements will also depend on the program being executed while its
security will also be influenced by the programmer.
The disadvantages of this platform is the lack of official support and documentation which has
been a drawback has far as extensibility is concerned. It is also limited to Mac platform only.
3.2.2.7. Limnor
This is another open source control flow VPL that can be leveraged for a wide array of
applications ranging from building Windows, Kiosk and Web Applications. One of the huge
advantages with language is the compatibility with common object oriented programming
languages like C#, ASP.NET, PHP & JavaScript conglomerated with a control-flow paradigm.
The drag and drop mode of programming coupled by use of the mouse for simple tasks-instead
of the keyboard, cuts development time by far. Programs are generally large as shapes and arrows
are used but readability is enhanced through text and color.
The negative aspect of this platform is the lack of documentation and the memory requirementsit needs a CPU speed of over 2GHZ and 1GB RAM. Regardless, most of the support can be found
in Limnor forum. The other disadvantage is the lack of third party extensions and plugins to scale
functionality. It is also limited to windows platform only.
3.2.2.8. Tersus
This is an open source data flow VPL language that is designed for creating mobile and
web applications by virtue of visual diagrams. Based on AJAX, the language generates java code
from visual programs meaning that it performs pretty well in with normal computer specs. Its
extensions can also be done using java code. The other positive aspect of this language is the fact
that it is supported by every common computer platform be it Linux, Unix, Mac and Windows.
Its interactive design is another strong point of the language as it deploys drag and drop
functionality in development. This plus the use of natural language for description and plenty of
well blended color makes it quite easy for a user to navigate around hence reducing development
time. Starters do not have to hassle a lot to learn as there is a documentation and lots of good
tutorials. For advanced users, there is a forum that helps solves problems in the realm of the
platform.
41
3.2.2.9. Envision
This is yet another general purpose VPL that integrates imperative and object oriented
programming paradigm in its design. It is an open source language that can be used in small and
large scale projects as it can adopt both a High Level and Low Level programming. It partially
supports Import/Export of Code from Java & C++.
It actually uses programs like that look like textual code but only this time the development
time is reduced as there are no syntax errors. Just like most of the VPL languages discussed,
Envision enhances interaction through a blend of color and texts. It also affords the user a chance
to zoom in and out of large code bases and millions of objects on screen. It is supported by
common operating systems namely: Windows, Linux & Mac OS X. Its security, performance
and memory requirements are all dependent on the kind of application being designed.
The only glitch with this language is the lack of proper documentation, forums and tutorials but
this is bound to change as a forum is under development.
3.2.2.10. Lava
This is one other general purpose VPL language but the only one in the bunch that is not
used for production in the sense that it is only used for experimental purposes. As an open source
language, it is exudes quality in building small and large scale projects courtesy of an object
oriented programming paradigm. The development time of a user is boosted with this platform
given that it uses point-and-click structure editor, a GUI builder etc. The program size is relatively
smaller as it uses Treeview enhanced with natural language text to boost readability. The language
is supported on Mac, Linux and in Mac. Its performance, scalability and memory usage will
depend on the application being developed.
To the negatives now and it can be seen that, the platform cannot be extended by third party
developers-it can only be done by the Lava team using C++ and Qt. There are lots of online
documentations to learn from but no English forum to get support from other developers.
3.2.3. Implications
In this section we will present the implications from the comparative study
42
3.2.3.1 The need for productive general purpose visual programming language
From the aforementioned tables, we see that there is a wide array of VPL languages in the
programming science to choose from depending on the needs and preferences. This paper presents
some of the most common of these languages with an in-depth analysis of these languages based
on a variety of metrics. The metrics of interests in this case are Domain & Scope, Compatibility,
Programming Paradigm, License & Cost, Development Time, Size of programs, Readability,
Performance, Memory Usage, Portability, Security and Safety, Scalability, Extension,
Documentation and Support.
It can be seen that this VPL vary depending on the metrics of interest. Alice and Scratch
are domain specific while the rest are general purpose. In terms of portability, Scratch, Alice,
Prograph, LabView, Tersus Envision and Lava cover Mac, Linux and windows platforms.
Forms/3 runs on Sun/Solaris and Hewlett-Packard/HP-UXat while Limnor and VIPR will only
run on Mac and Windows respectively.
Most of these VPL are open source except Prograph and LabView. Turning attention to support
and documentation, it is seen that VIPR, Envision and Lava lag behind the rest which have some
sort of support. As mentioned earlier, these VPL languages reduce development time but their
programs are generally large due to the use of visual graphics. It should however be distinguished
that Lava and Envision have relatively small visual representations than the others. LabView is
the most extensible of the bunch as it allows a variety of possible extensions such as the Ch
interpreter to be added for scripting. Users are also afforded the possibility of buying add ons for
specific applications.
In this section we conducted an evaluation between well-known general-purpose VPLs (Tersus
and Limnor) and two reputable VPE (Visual Studio and Net Beans). One professional
programmer for each language was hired to develop programs in that specific language. All
programmers were asked to develop 20 simple to intermediate applications. The authors
monitored the time and memory needed to complete each task. Table 3 shows the averages of all
tasks. We can find that the time required to create a simple application using VPE is the smallest
amount of time among the other languages. This criterion is very important because it tackles the
productivity. In terms of time, Visual Studio comes in the first place with approximately 117
seconds, then Tersus 140 seconds, Limnor with 144 second and lastly NetBeans 165 seconds.
43
With respect to the number of user steps used to build the application. We can notice that using
Visual Studio and NetBeans need 26, and 33 steps respectively, whereas Limnor, and Tersus need
41,56, and 46 steps respectively. Building applications in VPLs involves many steps; however,
most of these steps are duplicated and simple, which make them easy to learn for the novice user.
On the other hand, Visual Studio and NetBeans require less number of user steps but one of these
steps is writing code, which is complex and advanced. Regarding to the professionals, the
productivity is very important factor, and as we notice from the table, Visual Studio proof the
minimum development time regardless the number of user steps. Finally, memory usage by
Tersus is near to 12.12 MB which is the least size for the created application; however, Visual
Studio has 58 MB.
Criteria\ Alt.
Average time required to create
and test the application (Seconds)
The steps to create and test the
application (steps)
Average time required for each
step (Seconds)
Average Time spent using
keyboard in user steps (Seconds)
Memory used before application
design starts (Kbyte)
Memory used after the application
design (Kbyte)
Memory consumed in application
representation during design time
(Kbyte)
General Purpose
VPLs
Limnor
Tersus
Visual Programming
Environments
Visual Studio Netbeans
144
140
115.66
165
54
46
26
33
2.66
3.04
4.45
5
13
18
31.1
30
13460
50268
51276
156052
29292
62392
109420
173352
15832
12124
58144
17300
Table. 3 the average results of a simple program
44
3.2.3.2 A guide to help the novice programmer choose the right tool
The next flowchart (figure 9) provides a guide to help the novice programmer choose the
right tool based on the purpose (Educational, Development or Research) and age.
Start
1
Do you need VPL for educational purpose?
Yes
Scratch and Alice
No
2
Do you need the VPL for developing purpose?
Yes
Prograph, LabView, Limnor, envision and Tersus
No
3
Do you need the VPL for researching purpose?
Yes
Viper, Lava, Form3
No
4
Do you look for a VPL for children their ages <14 years?
Yes
Scratch
No
5
Do you look for a VPL for students their ages >14 years?
Yes
Alice
No
You have to refine the search parameters
Figure 9: Flowchart to help the novice programmer choose the right tool
45
Chapter 4: Main Design
4.1 The requirements for the new General Purpose Visual Programming Language
We talked about the progress in the visual programming languages, the success in different
programming domain, and the features of the most popular visual programming languages.
According to our literature review and comparative analysis we see a gap in attracting mainstream
programmers to using visual programming languages in each new programming task. The current
VPLs are not equivalent to the current textual programming languages at the practical side. Yes,
some limitations are a result of missing features that can be added but this doesn’t count only for
“what we can do?” but for “how we can do things with respect to the productivity of the
programmer during software development and the quality of the final software”.
We will provide the requirements of a general purpose visual programming tool that can
be used as replacement for the usage of popular programming languages like ( C,C++, C# and
Java) + visual programming environments like Visual Studio and Netbeans). We expect that after
the implementation and marketing of this new tool, many new software projects can be developed
using Visual Programming Language in less time with high quality. Also we expect attracting
more users to real programming industry after the existence of this tool.
The next table provides the requirements for the new general purpose VPL. These
requirements are the result of our comparative study where our research team selected the best
features that we need to have together in one visual programming language.
Index
1
Metric
Domain &
Scope
2
Compatibility
3
Programming
Paradigm
4
License &
Cost
•
•
•
•
•
•
•
•
•
Description
General Purpose
High Level Programming
Low Level Programming
Creating small and large systems and applications
• Generate Code in different programming
languages like C, C++ , C#, Java & Python
Imperative
Procedural
Object-Oriented Programming
Functional
Free Open Source (GPL version 2)
46
5
Development
Time
6
Size of
programs
Readability
7
8
9
10
11
12
13
14
15
Performance
Memory
Usage
Portability
Security and
Safety
Scalability
• Exception allows developing commercial
applications without releasing the source code
• Increased using the keyboard, Intellisense/Autocomplete, Cut/Copy/Paste/Search/Replace
• Interaction using Keyboard/Mouse
• Colors are useful for interaction
• Syntax Directed Editor (prevent errors)
• VPL Compiler help in discovering errors when the
Syntax directed editor is off.
• Small – using TreeView
• Better Using Text, Colors, Tree & Froms
• Change the font name / size
• Time Dimension
• Depend on the application
• Depend on the application
• Windows, Linux and Mac OS X
• Depend on the application
• Depend on the application
• Using Standard GUI controls like TreeView is
faster than owner drawn controls.
Extension
Comes with Designers and a scripting language called
creating new components or VPLs
Documentation
Complete documentation (Tutorials, Movies &
Reference)
Support
Forums
Table 4. Requirements for General-Purpose VPL
47
4.2 Graphical Code Replacement (GCR)
Many researchers believe that Visual Programming Languages are inevitable tools to attract
more people to the programming world. In the past half century, many Visual Programming
Languages were developed. A large number of the developed languages are domain specific while
only few are general purpose. In this chapter, PWCT (Programming Without Coding Technology,
a novel visual programming language) is presented. The main objective behind developing this
tool was to create not only a general purpose VPL but one that possesses textual language’s
capabilities. A language that can be used to develop similar programs to the ones developed in
C++ or Java for example. As the name indicates, PWCT requires no coding at all. A person needs
only to know basic programming concepts to be able to use the tool. PWCT has many attractive
features such as: General Purpose, Open source, easy to use, Exports code to different languages,
allows customizing visual components and creating new ones, uses keyboard shortcuts in addition
to the mouse, and generates automatic documentation
Most of the successful VPLs are domain-specific languages. For example, LabVIEW
(Laboratory Virtual Instrumentation Engineering Workbench), although it is claimed to be
general purpose it is only popular in data acquisition and control applications [12]. Ladder logic
is a VPL used to develop software for Programmable Logic Controllers (PLCs) in industrial
control applications [13]. In the multimedia domain, OpenMusic is an object-oriented visual
programming environment for musical composition based on Common Lisp [14]. In the
educational domain, Alice [15] and Scratch [16, 17] are reputable VPLs that allow even little kids
get familiar with the programming world. Besides being domain specific, developing software
with VPLs becomes much harder as the software gets larger and more complex due to their
inherent limitations and graphical representation.
One main limitation of VPLs is known as Deutsch Limit. It states that “The problem with visual
programming is that you can't have more than 50 visual primitives on the screen at the same
time”[41, 105]. And so, for any VPL to be comparable to textual programming languages it needs
to overcome this limitation at least. In fact, the authors believe that a superior VPL should have
the following features to be a rival to text-based languages:
• Pure visual language: the language should require no coding at all and no knowledge of syntax.
• General purpose: the language could be used to create any software just like text-based
language.
• Suitable graphical representation: the graphical representation used in the language should be
48
•
•
•
•
•
•
suitable for small and large software development.
Ease of use: the language should be easy to use and require short time to get mastered.
Open source: an open source VPL encourages people to use it and allows users to tailor it to
their needs.
Capability of creating new visual components: a developer should be able to create new
components easily.
Capability of producing (exporting) code in different programming languages such as C# and
java.
Provides multi-lingual interface.
Utilizes both mouse and keyboard interaction.
In this chapter, we propose a novel technique called Graphical Code Replacement (GCR) to
overcome Deutsch’s limit and to provide the needed scalability and flexibility. GCR was used in
building a new VPL called PWCT. The proposed technique facilitates the application construction
through a set of sequential interactions with visual components. GCR depends on a generated
Tree of Steps (Steps Tree) that describes the program under development. The manipulation of
TS is done through the interaction with visual components without the need to deal with text based
code. The code generation process is managed in the background by the visual components to
hide the complexity from the user. The visual representation of the program is constructed using
traditional GUI controls (Tree, labels, textbox, list box ...etc).
GCR replaces the common drag-and-drop technique to create an application by the give inputget generated representation technique. The input is accepted by visual components through
interaction pages (Forms to get users’ inputs).The drag-and-drop method enable the user to select
a component from a toolbox then drag it to be dropped in a design region. Here the visual
representation of the component is determined from the beginning and attributes of the object can
be changed from options available in the component representation as in scratch and Alice or
from properties window as in limnor. But, in the GCR the visual representation is completely
dynamic and is generated later after providing the options to the user through interaction pages
(forms) and after that we get the visual representation.
For example the if—elseif-else-endif component in GCR is one component which provides the
optional elseif and else operations. And based on the user selection of these operations in the
interaction page (forms) through checkbox the visual representation will be generated to include
49
elseif/else or not. In scratch we have separate components for the “else” operation.
The proposed work introduces a new general purpose visual programming language by
combining the strengths of the current successful VPLs. PWCT is completely visual. It uses a
standard graphical notation for building a program. The source editor is replaced by a TreeView
control with an adaptive and semantic representation. PWCT provides benefits for both novice
and expert programmers. It pays special attention to how expert programmers can easily adapt to
this new visual programming methodology. In addition, PWCT is built based on an open
architecture where users can easily add/modify his own components.
4.3 Graphical Code Replacement Method
NOTE: that the words "step", "control", and "component" are used interchangeably and they all
mean a graphical control also the words "goal" and "module" are used interchangeably to mean a
programming module.
The basic idea behind the Graphical Code Replacement (GCR) was to find a way to make the
visual programming language fully equivalent to a traditional textual programming language and
to overcome all the limitations and weaknesses of VPLs. Looking at the structure of code written
in textual programming languages, it can be easily seen that the code contains a set of instructions
and commands written as statements in a specific syntax. The statements are arranged in nested
structures similar to a computer tree with one or more nodes/leaves. A complex statement such as
“For Loop” can be represented with a node that can be expanded, while a simple statement such
as a “printf()” can be represented with a leaf. For example, the code shown in Figure 10 is written
50
in C. This code can be seen as a tree of statements or steps (a step here is defined as a visual
component) arranged in a way to print numbers from 1 to 3, print a message, and then continue
Printing 4 to 10. Keep in mind that each instruction in any programming language consists of
two parts: the operation, and the required data for the specification of that operation.
Figure 10: Source Code (in the right) and the equivalent Steps Tree (left).
To better describe the concept, the following equivalences can be used:
• Text code structure IS EQUIVALENT TO Nested structures of Instructions (Steps Tree)
• Instruction IS EQUIVALENT TO a function F(X), where F is the operation or the
function and X is the required data.
• Text code structure IS EQUIVALENT TO Nested structures of F(X). Notice that F
can be any function and X can be any input data.
When the above equivalences are applied to the C code shown in Figure 10, we can have a
clear view of the essential concept of the GCR technique.
printf( “ This message between number 3 and number 4 \n“) ;
Line of code (Source Code)
Print text in new line
The operation/function (F)
“ This message between number 3 and number 4 “
Data = X
Print Text “This message between number 3 and number 4”
Step’s Description/Label
Table 5. Shows the replacement process for one line of code.
51
At this point many questions need to be answered. How the steps will be generated
automatically? How will they determine what the program will do? How can the
developer/programmer control and manage the program as she does with traditional languages?
GCR uses the Nested Tree (Steps Tree) to represent the structure of the program. Instead of
using F(X) which is related to the syntax of the programming language, GCR uses natural
language (English, Arabic, etc) to describe the steps (i.e. the name and description of the step
or control which could be in any language). Therefore, it’s easy to understand and remember.
The last row in Table 5. Implies that a step (visual component) was added to the tree and it was
labeled “Print Text “This message between number 3 and number 4””.
4.4 PWCT architecture
PWCT is composed of three main layers: VPL Abstract Layer; Middleware Layer;
and System Layer. Figure 11. Shows each layer and its constituent components within
PWCT’s architecture. In the following sections, each layer and its components are
described in more detailes.
52
Figure 11: PWCT Architecture.
4.4.1. VPL Layer
The VPL layer is the presentation layer. It provides all the functionality needed to
allow a user to perform a specific task. It is composed of four important components: the
Goal/Module Designer; the Components Browser; the Interaction Pages; and the Form
53
Designer. A user would interact with at least three components to produce a meaningful
program. For example, a user starts with the Goal/Module Designer to create a new goal
(in other words module). Next, the user might choose a visual component from the
Components Browser. Then, the user might work with the Interaction Pages to provide the
needed data or to specify some attributes. If the user wants to develop a GUI, they can use
the Form Designer to do so.
4.4.1.1. Goal/Module Designer
The Goal Designer is the main component in the VPL layer. It can be thought of as
an equivalent one to the code editor in a textual programming language. Through the Goal
Designer, a developer can manipulate her program using the Steps Tree. The tree structure
was chosen to simplify the replacement process. Furthermore, the Treeview control has
some special advantages which distinguish it from other controls. These advantages are
listed below [99]:
• Hierarchical data structure and relationships between elements can be represented and
digested more clearly.
• All controls and their children (data, control structure, etc.) can be entirely seen together
in a single window.
• Navigation and paging to focus on a particular part of data are easily manageable with
expansion and collapsing functionalities when compared to alternative forms of viewing
(i.e. tabular form view, text editor view, or list view).
• The developer can arrange the controls in the run-time. She has the ability to move,
update, delete and add any kind of program’s control according to her needs.
Developers could have more than one goal and each goal could include more than one
step as shown in Figure 12. These steps provide a visual representation of the code which
is generated in the background. The developer doesn’t write the steps, instead, she selects
them from the Components Browser and manipulates them using the Interaction Pages.
54
Module 1
Step1
Module 2
Step1
Step2
Module 3
…
Step n
Module 4
Step2
Step1
……
Step2
…
Module n
Step m
Figure 12: A program in PWCT can have many goals/modules
To make it easier to understand, table 6 shows a comparison between few text-based
language’s terms and their PWCT counterparts.
TPL’s Terms
PWCT’s Terms
Problem
Goal/Module
Statement/ Line of code
Step
Coding
Selecting & interaction with
components
Code Editor
Goal/Module Designer
Table 6: Textual Programming Language’s vs Programming Without Coding
Technology’s terms
In the following, the use case diagram in figure 13 describes the behavior of the
Goal Designer when the developer interacts with it. The use case diagram is composed of
four main use cases addressing the interaction process. Goal Designer allows developers
55
to efficiently add, delete, or modify both goals and steps. Along with data processing, the
developer can arrange the program steps according to his needs, even in the run-time
(move-up, move-down, cut, paste, copy, etc.). The developer would need to open the
form designer, when he/she defines a new window, to deal with the components and tools
and modify their properties according to the requirements.
Developer
Figure 13: Essential Use Case Model for Goal/Module Designer
4.4.1.2. Components Browser
There are several definitions of the word component in the literature. In [100],
components are defined as units of independent production, acquisition, and deployment
that interact to form a functioning system. The authors of [101] define components as
executable units of code that provide a set of services through a specific interface. Lastly,
components were defined as self-contained replaceable parts of a system that encapsulate
their data and processes [102]. In PWCT, the last definition is adopted.
The second component of the VPL layer is the Component Browser. Developer uses the
Components Browser to search, select, and navigate amongst components in the
components’ library. Figure 14 shows how a programmer might interact with Components
Browser.
56
Figure 14: Components Browser Use Case Diagram
In PWCT, a large number of components (496) were built and stored in a library.
The developer can search the library for a specific component, select the component to be
included in her program, or just navigate through the library to see the available
components. The developer can use both the mouse and the keyboard to do such operations.
Furthermore, the developer can limit her search to a specific category of components by
selecting the required category. In addition to that, the developer can create a new
component or modify an existing one if needed.
In general, the components in PWCT are either controls (such as GUI controls like
Windows, Labels, Buttons, Textbox) or software modules (such as Database, Threads and
Sockets components) that perform a specific service needed by the programmer. A
component could be designed to generate code in any language such as Harbor, C#, Python,
etc. To better organize the components, several categories were created. Figure 15. Shows
the most important categories.
Basics
Structure
…
Datatypes
Consol
…
Windows
xBase
AdoDB
…
GUI
Database
Http
Socket
…
Networks
Paradigms
OOP
Procedural
…
Figure 15: Components’ Categories in PWCT Library
57
When selected, a component will be inserted as a step/s into the Steps Tree. Simultaneously,
a link will be created between the generated step in the goal designer and a file of the
selected component indicative of the step. The link information is stored in the data
repository independently. Users may change/delete some parameters without affecting the
component file.
4.4.1.3. Interaction Pages
The interactive pages are acting like a properties panel in traditional languages, but
they differ in their simplicity and ease of use. In addition, through the interactive page a
user can change and adjust not only a component properties but also its functionality.
For example we have the console application component that can be used to do different
tasks related to console applications like (Print text, clear screen, draw rectangles, get input,
and menus).
Also we have the classes’ components where each class is represent by one component
contains three pages to (Set Attributes, Get Attributes and Invoke methods).
5.3.1.4. Form Designer
When a Graphical User Interface (GUI) is needed, a developer can use the Form
Designer to create forms for her application. Similar to those that exist in Visual Studio;
Eclipse; and other programing environments, the Form Designer in PWCT allows the user
to build a form and add to it any typical component such as: a button, textbox, label, etc.
There are components for controls events that determine the procedure/method that
will be invoked when an event is fired. Using the events components the user can select
and event (click event for example) then determine the procedure that will be called when
the user click on the control. The procedure name can be written or selected from the list
of names that appears during typing (intellisense). Later the user define the procedure using
the define procedure component and add steps to the procedure that will be executed when
the procedure is called.
4.4.2. PWCT’s Middleware Layer
A Middleware is software that connects applications with the underlying operating
system or database. The software consists of a set of services that allows multiple processes
running on one or more machines to interact [103]. PWCT’s middleware connects the
user’s view (i.e. the four components in the VPL Layer) with the system’s view (i.e.
processes in the System Layer).
58
This layer (Middleware Layer) has four main functionalities: interpretation of user’s
interactions with components in the VPL Layer; generating the Steps Tree according to
user’s interactions; replacing variables in the script that generate the code with the values
entered during the user’s interactions with components; and generating the source code.
As demonstrated in figure 11, the Middleware layer consists of three units; the Step
Generator, a database, and the source code files. The most important part of the middleware
layer is the Step Generator. Generating the code in this layer if fairly simple and straight
forward, Algorithm 1 illustrates the mechanism to generate the source code and to store it
in a data repository.
Lib_file ¬ open library file (*.TRF)
InteractionPageTable ¬ load interaction pages data from (Lib_file)
CodeMaskTable ¬ load code mask data from (Lib_file)
CodeMatchTable ¬ load code match data from (Lib_file)
if InteractionPageTable is not empty then
tmpDataTable ¬ empty
for each page in InteractionPageTable, do
page_file ¬ open library file(*.IDF)
tmpDataTable ¬ load controls name and values from (page_file)
close the interaction page file
endfor
for each item in CodeMatchTable, do
Control_Name ¬ load controls name from CodeMatchTable
Control_Variable ¬ load controls variable from CodeMatchTable
Control_Value ¬ load controls value from tmpDataTable(Control_Name)
Codemask_Variable ¬ Control_Value
endfor
endif
for each item in CodeMaskTable, do
59
if the item is an instruction then
Execute the instruction with respect to GCR Rules
else
Add step code
endif
endfor
close the library file
Algorithm 1. Code Generation Algorithm
To illustrate how this layer works, a simple scenario is presented below:
When a developer selects a component using the components browser, an interaction
page will open which asks her to provide more details. For example, if the user selects a
print component, the interaction page will ask the user to insert the value she wants printed.
This interaction will be interpreted and fed to the Step Generator the results of the
interaction process will be an input for the process of generating new steps or updating an
existing one in the steps tree as describe in algorithm 1. The component may have more
than one interaction page. It depends on the type of the component, for examples if the
selected component is a class, it needs three interaction pages; set properties, get properties
and the data. Ultimately, when the data table is ready with the required variables, the
process of generating code starts by matching the variables with values then masking this
operation to get the new/updated code line. For example, printing “Hello World” will
proceed as shown in the following tables:
Variable
Value
Page1_Text1
"Hello World”
Table 7: Sample of the variables and values
The Code Mask Simple Script for printing text looks like the following:
60
<RPWI:NEWSTEP> Print Text – New Line – ( <T_V1> )
cout << <T_V1> << “\n” ;
The component file include a matching table to match between interaction pages variables
and Code Mask Variables.
Interaction Page Variable
Code Mask Variable
Page1_Text1
T_V1
Table 8: Sample of the variables of Interaction Page Variable and Code Mask
The Code Mask is written using simple rules which enables controlling and determining
the generated code. Table 9 depicts these rules.
Rule
Description
Put code mask variables between '<' and '>'
Syntax: <variable name> Example: <Name>
<RPWI:POSITIVE>
This command used to ensure Generating the code between <RPWI:TEST>
and <RPWI:ENDTEST> if the result of the test is true.
<RPWI:NEGATIVE>
This command used to ensure Generating the code between <RPWI:TEST>
AND <RPWI:ENDTEST> if the result of the test is false.
<RPWI:VALUE>
Determine that value that will be compared with the value of the variable
after <RPWI:TEST> , if the two values are typical , the test result is true, if
not, the test result is false.
Nested <RPWI:TEST> and <RPWI:ENDTEST>
<RPWI:INFORMATION>
Used to generate output in Information tab of the step details, in goal designer
<RPWI:NOTE> or <*>
This is not more than comment
<RPWI:NEWSTEP>
To create step in Goal Designer
<RPWI:TEST> <Variable>
more instruction
<RPWI:ENDTEST>
<RPWI:PUTMARK> NUMBER_FROM_1_TO_30
Save the ID of the current step (active step) to special area (Range 1-30)
<RPWI:SETMARK> NUMBER_FROM_1_TO_30
Set a step as the active/parent using a saved ID (Range 1-30)
<RPWI:IGNORELAST> <ANY CHARACTER>
Used for deleting the last occurrence character from the generated code
61
<RPWI:NEWVAR> VARIABLE_NAME
Used for creating new variable
<RPWI:SETVARVALUE> VARIABLE_VALUE
Used for setting the value of the variable (Active Variable)
<RPWI:SELECTVAR> VARIABLE_NAME
Set the active variable
<RPWI:REPLACEVARSWITHVALUES>
Replace variables with corresponding values
Table 9: GCR Rules to write a Code Mask
4.4.3 PWCT’s System Layer
This layer is a low-level layer that deals with the source code generated by the upper
layer. PWCT generates and executes code in four text-based programming languages
namely C#, Java, Harbour, and Python and hence, the System Layer had to support the
different mechanisms in all four languages to produce executable code.
Programs that were written by text-based languages are implemented either by an
interpreter, a compiler or a combination of both [104]. While Python uses only an
interpreter and C# uses a compiler, Scala uses both a compiler and an interpreter. .
Consequently, the System Layer support compilers and interpreters at the same time. After
generating the source code in any of the supported text-based language (C#, Java, Harbour
and Python), executing the code follows the procedures of that specific language. PWCT
doesn’t impose any restrictions on the process of building the source code.
62
Chapter 5: Implementation and Validation
5.1 Usability and Capability Evaluation
To assess the usability and capability of PWCT, a free online remote learning course was
offered. The goals of the course were to get feedback about the tool and to monitor the learning
and progress of the participants. A total of 298 participants were accepted. For each registered
participant, the team provided a folder where the participant’s work is stored. The course outline
was very simple. At the beginning, participants were asked to download the tool and install it
based on a short tutorial. Next, Participants were asked to watch videos that show how to develop
different programs using PWCT. At first, the programs are very simple and later they become
more advanced. After watching the video, the participants were asked to develop the program
they just saw in the video. If the participant was successful, he/she was asked to send the files
which were saved to the participant’s folder. Those who faced problems during the development
of the project sent their questions to the project’s team and got the needed help. The lessons were
classified into three levels of difficulty. The first level was an introduction to programming which
contained 32 lessons. The second level was an introduction on how to develop database
applications which contains 18 lessons. The third level was more advanced and introduced
developing database applications using templates which contained 20 lessons.
Table 14. In the Appendix B. shows some information about the all the participants such as the
number of developed applications as well as the level of expertise of the participant. All of the
developed
applications
can
be
found
at
URL:
http://sourceforge.net/projects/doublesvsoop/files/PWCT%20For%20MSWindows/PWCT%20Students/
The main results of the course can be summarized as follows:
63
• All students completed their first application without problems.
• 41 level-3 (advanced) students were able to develop real world database applications using
PWCT.
• 25 level-2 (intermediate) students were able to develop simple database applications using
PWCT.
• 232 level-1 (beginner) students were able to develop simple applications using PWCT.
46 level-1 students created only one application.
From the progress of the students. The main results are presented in table 10 below.
Ease-of-use Results
Students that don’t like PWCT
15% (Students created only one
application)
Students like to learn PWCT
85% (Students created more than
one application)
Gained Knowledge Results
Students learned programming basics only
78%
(Level 1)
Students learned basics of database
8%
programming (Level 2)
Students learned how to create professional
14%
database applications (Level 3)
Average Learning Curve (Time required for watching the Course)
Time required to learn programming basics
4 hours, 41 minutes and 42
according to the course (Level 1)
seconds
Time required to learn basics of database
2 hours, 39 minutes and 39
programming according to the course (Level
seconds
2)
Time required to learn how to create
4 hours, 37 minutes and 22
professional database applications according
seconds
to the course (Level 3)
Table 10: results from students
64
It is very clear from the data above that the majority of the participants liked the tool.
78% of the participants were able to learn the basics of programming by developing few
applications only. And finally the average learning curve was extremely short even for the
advanced lessons.
5.2 Efficiency Evaluation
To make sure that PWCT’s performance was comparable to that of other VPL’s and even
textual languages, a programming experiment was carried out. In this experiment PWCT
competed against two well-known general-purpose VPLs (Tersus and Limnor), and two reputable
VPE (Visual Studio and Net Beans). In the evaluation One professional programmer for each
language was hired to develop programs in that specific language. All programmers were asked
to develop 20 simple to intermediate applications. The authors monitored the time and memory
needed to complete each task. Table 7 shows the averages of all tasks. It is extremely obvious that
PWCT’s outperformed the other four languages by a considerable margin. Table 11. Shows that
PWCT’s time was 8.5% less than Visual Studio (the second best) and 55.6% better than Net
Beans. This criterion is very important as it hints at the productivity of the language. Similarly,
while PWCT used only 4.5 MB of RAM on average, the second best (Tersus) used 12.1 MB.
Figure 16 shows that PWCT outperforms all other languages as far as time and memory are
concerned.
Criteria\ Alt.
General Purpose Visual
Programming Languages
PWCT
Limnor
Tersus
Visual
Programming
Environments
Visual
Netbeans
Studio
Average time required to
106.66
144
140
115.66
165
create and test the
seconds seconds seconds Seconds seconds
application
The steps to create and test
41
46
26
54 steps
33 steps
the application
steps
steps
Steps
Average time required for
2.6
2.66
3.04
4.45
5
each step
seconds seconds seconds seconds seconds
65
Average Time spent using 106.66
13
18
31.1
keyboard in user steps
seconds Seconds seconds seconds
Memory used before
13356
13460
50268
51276
application design starts
Kbyte
Kbyte
Kbyte
Kbyte
Memory used after the
17880
29292
62392 109420
application design
Kbyte
Kbyte
Kbyte
Kbyte
Memory consumed in
4524
15832
12124
58144
application representation
Kbyte
Kbyte
Kbyte
Kbyte
during design time
30
seconds
156052
Kbyte
173352
Kbyte
17300
Kbyte
Table 11: The average results of a simple program developed three programmers with three
different levels
Comparison between PWCT and other VPLs and VPEs
(Time in seconds and Memory in MB and number of User steps )
165
144
140
115.66
106.66
Time
Memory
41
54
46
26
15.8
4.524
PWCT
12.124
Limnor
Steps
58.144
Tersus
Visual Studio
33
17.3
NetBeans
Figure 16: Time in seconds and Memory in MB and Number of user steps
To make sure that PWCT outperforms Visual Studio even on large applications, the authors
carried out a second experiment where two programmers were used to develop one large
application in both PWCT and VS (The application mange projects flow in the Riyadh Valley
Company Occupation). One programmer is used to develop in PWCT and the other one in VS.
Table 12 below illustrates the results of all programmers.
66
Visual Studio (CS
+ ASP.NET)
20606 lines
102 files
32 forms
PWCT
Lines of source code
20477 lines
No of source files
96 files
No of forms
26 forms
No of Generated steps
7616
NA
(Visual Source)
No of Interaction
4723
NA
Processes
Time required for
writing source code line 2 * 1.12(Average
in visual studio or doing time for user step) 2.07 seconds
Interaction process in
= 2.24 seconds
PWCT
Pure
2.24 * 4723 =
2.07 * 20606 =
Coding/Development
10579.52 seconds 42654.42 seconds
Time - Effort Time
= 2.94 hours
= 11.85 hours
only
Table 12: The results of large scale developed by two professional developers
Application Source Size
25000
20477
20000
20606
15000
10000
7616
5000
4723
0
PWCT
Interaction
Processes
PWCT
PWCT
Visual Studio
generated Steps generated LOC
LOC
Figure 17: The differences of Application source size between PWCT and Visual Studio
In Figure 17 visual studio LOC are 20606 lines, which have been written during the
development time. They also represent the source code managed by the programmers during
maintenance and any future development. On the other hand, PWCT LOC got almost the same
67
number 20477, and we expect this result as we developed the same application. Nevertheless,
LOC in PWCT generated, managed, and maintained in the background. The generated steps that
actually represent the application are 7616 which approximately near to one third of the LOC.
Thus, source in PWCT is more efficient to read and maintain.
PWCT and Visual Studio actual interaction time in
hourse
14
12
10
8
Hours
6
4
2
0
VS
PWCT
Figure 18: PWCT and Visual Studio actual interaction time in hours
Figure 18 depicts the actual average time consumed in the interaction with both VS and PWCT.
It is obvious that the average time to develop the application with PWCT was much less than that
of VS. in fact, only 25.38% of the time was needed to develop in PWCT.
5.3 Reputation Evaluation
PWCT is very popular on Sourceforge. Out 300,000 projects on Sourceforge, PWCT rank is 3
in the science and engineering category as of April 2016. The number of weekly downloads
(environment, samples and tutorials) according to Sourceforge is more than 70,000 downloads.
68
Weekly Download Regarding Different
Countries
2016-04-03 to 2016-04-09
United States
United States
16%
Italy…
Other
45%
Indi…
United Kingdom
4%
France
4%
Indonesia
Germany
3%
South Africa
3%
Algeria
Canada
3%
Egypt
3% 3%
Netherlands
3%
3%
Italy
India
United Kingdom
France
Germany
Algeria
Canada
Netherlands
South Africa
Indonesia
Figure 19: Weekly downloads according to www.sourceforge.net
According to Sourceforge’s information which is depicted in figure 19, USA has the highest
download rate of all countries followed by the Italy, India, United Kingdom, France, Germany,
Algeria and Canada in the 8th place. Moreover, according to Sourceforge’s user’s satisfaction
information, 93% of all users are satisfied with PWCT while only 7% are not as illustrated in
Figure 20.
User Satisfaction according to Sourceforge
statistic
7%
like
Unlike
93%
Figure 20: User satisfaction according to www.sourceforge.net
69
Many applications were developed using PWCT in several domains, such as: multi-media,
database, network, business management systems, and Mathematics (for more information please
see http://doublesvsoop.sourceforge.net/pwcthelp/main.htm). Figure 21 shows two applications
made by PWCT’s users. Both applications are related to multimedia. The first one is a movie
player and the second is an audio player.
(a)
(b)
(c)
(d)
(e)
(f)
Figure 21: Multimedia applications screen snapshots developed using PWCT
Using PWCT, one can create a console application and this feature is not available in the other
VPLs even the general-purpose ones as shown in the first screen snapshot in Figure 21. The
second snapshot depicts a famous puzzle game application, which was built by one of the users
of PWCT. The third application shows a computer-interfacing application to send SMS message
using an SMS Gateway connected to the computer through serial communication. The fourth
application is chatting software that uses TCP/IP protocol for establishing a connection between
70
two nodes, one works as client and the other works as server.
Figure 22: RVC Business applications screen snapshots developed using PWCT
PWCT has not ignored the business management systems, where a group of programmers in
Riyadh Valley Company, built a business application (Projects Management Application) for the
company to follow-up its projects and monitor the performance of its divisions as showing in the
dashboard in Figure 22. The screen snapshot in Figure 23. Depicts a multi-user client-server
database application for managing car-hiring companies. This software achieved by one of the
active users of PWCT in Netherlands.
Figure 23: Multi-user client-server database application developed using GCR method
71
The screen snapshot in Figure 24. Depicts a multi-user client-server database application
for a factory to manage orders data and their progress (Production Follow-up Application). The
application include items data and their amounts in the store. The application is designed based
on the requirements of the Al-Jabreen Factory in (Riyadh).
Figure 24: Production Follow-up Application developed using the GCR method.
The screen snapshot in Figure 25. Depicts a multi-user client-server database application
for a training center (Courses Management Application) includes data store & analysis of
(Courses, Trainers, Students, Courses review by students and Certifications). The application is
designed based on requirements of Izdehar Training Center in (Jeddah).
72
Figure 25: Courses Management Application developed using the GCR method.
Each application (Projects Management Application, Production Follow-up Application
and Courses Management Application) can work on one machine (for testing) and can be
deployed in a Client-Server environment for production. Applications comes with a control panel
to define users and set permissions. Also applications support changing the database management
system (DBMS) and tests are done using MS-Access, Microsoft SQL Server and MySQL. The
applications are real world application based on real requirements of the company that will uses
the application and during the design and the development we used the Object-Oriented
Programming (OOP) paradigm where each application contains a group classes and components.
73
The screen snapshot in Figure 26. Depicts an Implementation of a new Localized
Algorithm for detection of Critical Nodes using PWCT.
Figure 26: Critical Nodes Detection Application using the GCR method.
The screen snapshot in Figure 27. Depicts an Implementation of Natural Programming
Language called Supernova using PWCT based on the Harbour Language through the
HarbourPWCT visual programming language.
The screen snapshot in Figures 28, 29 and 30. Depicts an Implementation of Scripting
Language called Ring using PWCT based on the C Language through the CPWCT visual
programming language.
74
Figure 27: The Supernova programming language developed using the GCR method.
Figure 28: The Ring programming language developed using the GCR method.
75
Figure 29: The Ring Virtual Machine developed using the GCR method.
Figure 30: The Ring Lists Implementation developed using the GCR method.
76
Chapter 6: Summary and Conclusion
In this thesis we talked about the progress in the visual programming languages, the success
in different programming domain, and the features of the most popular visual programming
languages. According to our study we see a gap in attracting mainstream programmers to
using visual programming languages in each new programming task. The current VPLs are
not equivalent to the current textual programming languages at the practical side. Yes, some
limitations are a result of missing features that can be added but this doesn’t count only for
“what we can do?” but for “how we can do things with respect to the productivity of the
programmer during software development and the quality of the final software”.
We provided the requirements of a general purpose visual programming tool that can be used
as replacement for the usage of popular programming languages like ( C,C++, C# and Java)
+ (visual programming environments like Visual Studio and Netbeans). We expect that after
the implementation and marketing of this new tool, many new software projects can be
developed using Visual Programming Language in less time with high quality. Also we
expect attracting more users to real programming industry after the existence of this tool.
Also in this thesis, PWCT was presented. PWCT is a novel general purpose VPL that was
designed to compete with textual programming languages such as C++ and Java. The novelty
of this work comes from the invention of a technique called GCR. GCR uses graphical
components to replace textual code in an easy and seamless process. PWCT’s architecture,
design, and implementation were covered in this thesis.
Three types of evaluations were used to make sure that PWCT is a competitive VPL.
Usability and capability evaluation shows that PWCT is extremely easy to use and requires
a very short time for learning. Moreover, Efficiency evaluations show that PWCT requires
77
less time and memory to develop applications than the other used languages (VS, NB, Tersus
and Limnor). Finally, data from Sourceforge indicates that PWCT is a popular, well accepted,
and highly downloadable VPL.
The development of many business applications and some programming languages like
Supernova and Ring using PWCT demonstrates that the new VPL can be used in serious
development for creating real world projects.
PWCT include many features such as generating code in multiple languages and providing
record/replay functionality. Also PWCT allow the users to create their own VPLs based on
GCR. In the future, we will expand PWCT to support more platforms, web and mobile
development.
6.2 Future Direction
A more advanced version of PWCT is under development. It will support more platforms
and will provide code generation in more textual languages. The components will be
redesigned to provide more productivity. An interesting feature will be the support of our
new textual programming language that we designed for the development of PWCT 2.0. This
language called Ring. Using the Ring language we will have behind the Visual Programming
Language, a scripting language that uses Natural Language Programming and Declarative
Programming Paradigms. This will provide high-level of abstraction when the developer
decide to switch from visual programming and look at the generated source code. Also the
other textual programming languages will still be supported when the developer select them.
78
Bibliography
[1] Takao Shimomura, Visual design and programming for Web applications, Journal of
Visual Languages and Computing 16 (2005): p. 213-230.
[2] Melisa Koorsse, Charmain Cilliers, Andre Calitz, Programming assistance tools to
support the learning of IT programming in South African secondary schools, Computers &
Education 82 (2015): p. 162-178.
[3] Syahanim Mohd Salleh, Zarina Shukur, Hairulliza Mohamad Judi, Analysis of Research
in Programming Teaching Tools: An Initial Review, Procedia – Social and Behavioral
Science 103 (2013): p. 127-135.
[4] G. Costagliola et al, Assessing the usability of a visual tool for the definition of e-learning
processes, Journal of Visual Languages and Computing 19 (2008): p. 721-737.
[5] Dimitar Asenov, Design and implementation of Envision - a visual programming system
, Master Thesis, Chair of Programming Methodology ETH Zurich, (2011).
[6] T. R. G. Green & M. Petre, Usability Analysis of Visual Programming Environments: a
‘cognitive dimensions’ framework, Journal of Visual Languages and Computing (1996): p.
131-174.
[7] P. Bottoni et all, Dimensions of Visual Interaction Design. Visual Languages
Proceedings, IEEE Symposium on date 13-16 sept. (1999).
[8] K. Marriott & B. Myers (Eds.), Visual Language Theory, Springer-Verlag Publishers,
Berlin, 1997, Chapter 3, Towards a Human Computer Interaction Perspective, p. 85-127.
[9] Clement Leung, Visual Information Systems. Journal of Visual Languages and
Computing 8 (1997), p. 261-263.
[10] Levent V. Orman, Visual development of database applications. Interacting with
Computers Vol 3 no 3 (1991), p. 302-318.
79
[11] T. Software, Tiobe programming community index, http://www.tiobe.com/tpci.htm,
(2014).
[12] P. Ponce, D. Ramirez, Intelligent Control Systems With LabView™ , Springer, New
York (2010).
[13] Jeremy Garrett, Thomas Walker, Student attitudes towards the use of graphical
programming languages, Proceedings of the 2008 Annual ASEE Conference , Pittsburgh ,
PA, (2008) : p. 60-69.
[14] Jean Bresson, Carlos Agon, Gérard Assayag,Visual Lisp/CLOS programming in
OpenMusic, Higher-Order Symb Comput 22 (2009) : p. 81–111.
[15] Caitlin Kelleher, Motivating Programming: using storytelling to make computer
programming attractive to middle school girls, PhD thesis, in School of Computer Science,
Carnegie Mellon University, CMU-CS-06-171, (2006)
[16] Mitchel Resnick, et al., Scratch: Programming for All. Communications of the ACM
(CACM), New York, NY, USA, November (2009). 52 (11).
[17] Andrés Monroy Hernández, A. and M. Resnick, FEATURE: Empowering kids to
create and share programmable media, interactions, (2008). 15(2): p. 50-53.
[18] DANIEL D. HILS, Visual Languages and Computing Survey: Data Flow VPLs,
Journal of Visual Languages and Computing, 3 (1992) : p. 69-101.
[19] Brad Myers, Taxonomies of Visual Programming and Program Visualization, Journal
of Visual Languages and Computing, (1990), 1: p. 97-123.
[20] Burnett, M.M., et al., Scaling up VPLs. Computer, (1995). 28(3): p. 45-54.
80
[21] Caitlin Kelleher and Randy Pausch, Lessons Learned from Designing a Programming
System to Support Middle School Girls Creating Animated Stories. in Visual Languages and
Human-Centric Computing, 2006. VL/HCC 2006. IEEE Symposium on. (2006).
[22] Ting-Chung Wang, et al. Teaching programming concepts to high school students with
Alice, 39th ASEE/IEEE Frontiers in Education Conference. (2009).
[23] Brendan Tangney, et al., Pedagogy and Processes for a Computer Programming
Outreach Workshop - The Bridge to College Model, IEEE Transactions on Education,
(2010). 53(1): p. 53-60.
[24] Stuart Garner, Learning to Program from Scratch, 2009 Ninth IEEE International
Conference on Advanced Learning Technologies, (2009)
[25]
Stolee,
K.T.,
Kodu
Language
and
http://research.microsoft.com/en-us/projects/kodu/, (2010).
Grammar
Specifcation.
[26] Longflow, Limnor Tutorial http://www.limnor.com/. Longflow Enterprises Ltd., (2003).
[27] Margaret M. Burnett, Visual Programming, Encyclopedia of Electrical and Electronics
Engineering, New York, (1999).
[28] Margaret M. Burnett and Marla J. Baker, A Classification System for VPLs, Journal of
Visual Languages and Computing, (1994): p. 287-300.
[29] James D. Kiper, Elizabeth Howard and Chuck Ames, Criteria for Evalutation of VPLs,
Journal of Visual Languages and Computing (1997) , p. 175-192.
[30] Gennaro Costagliola, Vincenzo Deufemia,Giuseppe Polese and Michele Risi, Building
syntax-aware editors for visual languages, Journal of Visual Languages and Computing,
(2005) : p: 508-540.
[31] Luis A. Ortiz Ortiz, A Framework For VPLs, Master thesis in Electrical Engineering,
University of PUERTO RICO MAYAGUEZ CAMPUS, (1997).
81
[32] K. N. Whitly, VPLs and the Empirical Evidence for and against, Journal of Visual
Languages and Computing, (1997): p.109-142
[33] Stefano Levialdi, Visual Languages: Where Do We Stand? ,Proceedings of the
International Workshop on Applications of Graph Transformations with Industrial Relevance
,Springer-Verlag Berlin Heidelberg (2000) : p145-164
[34] RAQUEL NAVARRO-PRIETO, AND JOSE J. CAN3 AS, Are VPLs better? The role
of imagery in program comprehension, Int. J. Human-Computer Studies (2001): p 799-829
[35] Stefano Levialdi, Visual Languages: Concepts, Constructs and Claims, Information
Technology Interfaces, (2001).
[36] K. N. Whitley and Alan F. Backwell, Visual Programming in the Wild: A Survery of
LabVIEW Programmers, Journal of Visual Languages and Computing (2001): p. 435-472.
[37] Margaret Burnett, John Atwood, Rebecca Walpole Djang, Herkimer Gottfried, James
Reichwein and Sherry Yang, Forms/3: A First-Order Visual Language to Explore the
Boundaries of the Spreadsheet paradigm, Journal of Functional Programming (2001).
[38] S. Matwin and T. Pietrzykowski, PROGRAPH: A PRELIMINARY REPORT, Comput.
Lang. Vol. 10. No. 2, (1985): pp. 91-126
[39] Elif Tanrikulu, Bjorn Christian Schaefer, The users who touched the ceiling of scratch,
Procedia – Social and Behavioral Sciences 28 (2011): p. 764-769.
[40] N. Kehtarnavaz and C. Gope, DSP System Desing using LabVIEW and Simulink: A
Comparative Evaluation, IEEE, (2006).
[41] https://en.wikipedia.org/wiki/Deutsch_limit - last access 2016.03.26
[42] Daniel C. Cliburn, Student Opinions of Alice in CS1,38th ASEE/IEEE Frontiers in
Education Conference, (2008).
[43] Elizabeth V. Howard et all, A Qualitative Look at Alice and Pair-Programming,
Information Systems Education Journal, Vol. 7 (80), (2009).
[44] Linda Werner, Shannon Cample and Jill Denner, Children Learning Computer Science
Concepts via Alice Game Programming, Proceedings of the 43 rd ACM Technical
Symposium on Computer Science Education, SIGCSE, Raleigh, N. Carolina, USA, (2012).
82
[45] Python library for reading/writing MIT's Scratch file format, Retrieved Dec. (2015)
from https://github.com/tjvr/kurt
[46] Open source version of the Scratch 2.0 project editor, Retrieved Dec. (2015) from
https://github.com/LLK/scratch-flash
[47] Scratch Extensions, Retrieved Dec. (2015) from
http://wiki.scratch.mit.edu/wiki/Scratch_Extension
[48] Scratch Help, Retrieved Dec. (2015) from https://scratch.mit.edu/help/
[49] Discuss Scratch, Retrieved Dec. (2015) from https://scratch.mit.edu/discuss/
[50] The Alice Project, Retrieved Dec. (2015) from http://www.alice.org/index.php
[51] Alice Publications, Retrieved Dec. (2015) from
http://www.alice.org/index.php?page=publications/publications
[52] Alice Software Wikipedia, Retrieved Dec. (2015) from
https://en.wikipedia.org/wiki/Alice_%28software%29
[53] Alice 3 EULA, Retrieved Dec. (2015) from
http://alice3.pbworks.com/w/page/28830524/Alice%203%20EULA
[54] Download Alice 3, Retrieved Dec. (2015) from
http://www.alice.org/index.php?page=downloads/download_alice3.1
[55] How to Guide for Alice 3, Retrieved Dec. (2015) from
http://www.alice.org/3.1/materials_guide.php
[56] Alice Help, Retrieved Dec. (2015) from
http://alice3.pbworks.com/w/page/1756703/Alice%20help
[57] Alice Community Forums, Retrieved Dec. (2015) from
http://www.alice.org/community/
[58] Alice FAQ, Retrieved Dec. (2015) from
http://alice3.pbworks.com/w/page/59015092/Alice%203_1%20FAQ
83
[59] Martin, Graphical programming for Mac OS X, Retrieved Dec. (2015) from
http://www.andescotia.com/products/marten/
[60] Martin Video Lessons, Retrieved Dec. (2015) from
http://www.andescotia.com/lessons/
[61] Martin Tutorials, Retrieved Dec. (2015) from http://www.andescotia.com/tutorials/
[62] Visual Programming With Prograph Book, Retrieved Dec. (2015) from
www.andescotia.com/pdfs/Visual_Programming_With_Prograph_CPX_PDFs.zip
[63] Applications written in Prograph using the Martin IDE, Retrieved Dec. (2015) from
http://www.andescotia.com/examples/
[64] LabVIEW, use the right approach to solve any problem, Retrieved Dec. (2015) from
http://www.ni.com/labview/why/programming-approaches/
[65] LabVIEW System Design Software, Retrieved Dec. (2015) from
http://www.ni.com/labview/
[66] LabVIEW performance and memory management, Retrieved Dec. (2015) from
https://decibel.ni.com/content/docs/DOC-15425
[67] LabVIEW Security, Retrieved Dec. (2015) from http://www.ni.com/support/security/
[68] LabView Powerful Multithreaded Execution, Retrieved Dec. (2015) from
http://www.ni.com/labview/why/multicore/
[69] CH interpreter Wikipedia, Retrieved Dec. (2015) from
https://en.wikipedia.org/wiki/Ch_%28computer_programming%29
[70] LabVIEW Tookkits, Retrieved Dec. (2015) from http://zone.ni.com/reference/enXX/help/371361M-01/lvhelp/labview_toolkits/
[71] LabVIEW 2015 Help, Retrieved Dec. (2015) from
http://digital.ni.com/manuals.nsf/websearch/23F07E74C5B96E7286257E840050FD9E
84
[72] LabVIEW Technical Support, Retrieved Dec. (2015) from http://www.ni.com/support/
[73] LabVIEW Forums, Retrieved Dec. (2015) from http://forums.ni.com/
[74] Forms/3 License, Retrieved Dec. (2015) from
http://web.engr.oregonstate.edu/~burnett/Forms3/getForms3.license.html
[75] Forms3 Tour, Retrieved Dec. (2015) from
http://web.engr.oregonstate.edu/~burnett/Forms3/Tour/tour.html
[76] Limnor Download, Retrieved Dec. (2015) from
http://limnor.com/LimnorDownload.html
[77] Limnor Tutorials, Retrieved Dec. (2015) from
http://www.limnor.com/LimnorTutorial.html
[78] Limnor Forums, Retrieved Dec. (2015) from http://limnor.com/LimnorForum.html
[79] Tersus Documentation, Retrieved Dec. (2015) from http://www.tersus.com/#Id=12
[80] Tersus Forums, Retrieved Dec. (2015) from http://www.tersus.com/#Id=22
[81] Retrieved Dec. (2015) from http://www.pm.inf.ethz.ch/research/envision.html
[82] Envision Documentation Retrieved Dec. (2015) from http://dimitarasenov.github.io/Envision/
[83] Envision Source Code, Retrieved Dec. (2015) from https://github.com/dimitarasenov/Envision
[84] Envision Videos, Retrieved Dec. (2015) from
https://www.youtube.com/user/dimitarasenov/videos
[85] Lava FAQ, Retrieved Dec. (2015) from http://lavape.sourceforge.net/doc/index.htm
[86] Lava website, Retrieved Dec. (2015) from http://lavape.sourceforge.net/index.htm
85
[87] Worarit Kobsiripat, Effects of the media to promote the scratch programming
capabilities creativity of elementary school students, Procedia – Social and Behavioral
Sciences (2015) p. 227-232.
[88] Eric J. Golin, Tool Review : Prograph 2.0 from TGS Systems, Journal of visual
languages and computing, (1992) p. 189-194.
[89] Sze Yee Lye and Joyce Hwee Ling Koh, Review on teaching and learning of
computational thinking through programming: What is next for K-12? , Computers in
Human Behavior (2014), p. 51-61.
[90] Marat Boshernitsan and Michael Downes, Visual Programming Language: A Survery,
Computer science division, University of California, Report No. UCB/CSD-04-1368, Dec.
(2004).
[91] Caitlin Kelleher and Randy Pausch, Lowering the Barriers to Programming: A
taxonomy programming environments and languages for novice programmers, ACM
Computing Surveys (CSUR). (2005).
[92] Klaus D. Günther, Irmtraut Günther (GMD-SIT, Darmstadt), Lava - An ObjectOriented RAD Language Designed for Ease of Learning, Use, and Program comprehension
, the proceedings of a workshop of Gesellschaft für Informatik, May (2001).
[93] Ofer Brandes, Tersus visual programming platform, IEEE Symposium on Visual
Languages and Human-Centric Computing (VL/HCC). (2011).
[94] Shu, N.C. A visual programming language designed for automatic programming. in
System Sciences, 1988. Vol.II. Software Track, Proceedings of the Twenty-First Annual
Hawaii International Conference on. (1988).
[95] Johnsgard, K. and J. McDonald. Using Alice in Overview Courses to Improve Success
Rates in Programming I. in Software Engineering Education and Training, 2008. CSEET
'08. IEEE 21st Conference on. (2008).
[96] Kaucic, B. and T. Asic. Improving introductory programming with Scratch? in
MIPRO, 2011 Proceedings of the 34th International Convention. (2011).
86
[97] MacLaurin, M.B., The design of kodu: a tiny visual programming language for
children on the Xbox 360. SIGPLAN Not., (2011). 46(1): p. 241-246.
[98] Avraham, L., WebRB: A Different Way to Write Web Applications, T.R. James,
Editor (2008). p. 52-61.
[99] Cebeci, Z. and Y. Erdoðan, Tree view editing learning object metadata.
Interdisciplinary Journal of Knowledge and Learning Objects, (2005). 1(1): p. 99–108.
[100] Szyperski, C., Component Software: Beyond Object-Oriented Programming1998,
New York, N.Y.: ACM Press and Addison-Wesley.
[101] Vitharana, P., Risks and challenges of component-based software development.
Commun. ACM, (2003). 46(8): p. 67-72.
[102] Crnkovic, I. and M. Larsson, Challenges of component-based development. Journal
of Systems and Software, (2002). 61(3): p. 201-212.
[103] Wikipedia, http://en.wikipedia.org/wiki/Middleware. Retrieved April. (2016)
[104] Proebsting, T.A., et al., Toba: java for applications a way ahead of time (WAT)
compiler, in Proceedings of the 3rd conference on USENIX Conference on Object-Oriented
Technologies (COOTS) - Volume 31997, USENIX Association: Portland, Oregon. p. 3-3.
[105] Andrew Begel, LogoBlocks: A Graphical Programming Language for Interacting
with the World, Cambridge, MA: MIT Media Lab., (1996)
[106] Sampada K. Satav, S. K. Satpathy, K, J. Satao, A Comparative Study and Critical
Analysis of Various Integrated Development Environments of C, C++, and Java Languages
for Optimum Development, UNLASCIT, Vol 1(1), (2011), p09-15
[107] PWCT Researchers and Experts, Retrieved Dec. (2015) from
http://doublesvsoop.sourceforge.net/pwcthelp/team.htm.
[108] Roger S. PRESSMAN, Bruce R. MAXIM, Software Engineering A Practitioner’s
Approach, 8th Edition. ISBN-13: 978-0078022128
[109] Robert W. Sebesta, Concepts of programming languages (10th Edition), ISBN-13:
978-0131395312
87
Appendix A: Guided tour
A.1 Hello World Example
In this section, the concept of GCR is illustrated through a Hello World program using
PWCT. The application development process starts from the Goal/Module Designer where
the application contains one or more of visual source files and each visual source file contains
one or more of goals and each goal contains one or more of steps; the step maybe a visual
representation that present a computer instruction that do something or the step maybe a
comment written by the programmer to describe the process.
From the next figure we see that the active visual programming language is HarbourPWCT
and the active goal name is “main” and this goal contains a tree of steps that includes Start
Point (NOT STEP) which is not more than a visible root node for the steps tree. Inside the
steps tree by default there are a step called (The First Step) which is a step of type (comment)
written by the programmer to indicates that this is the first step in our program where we can
add more steps the do something (computer instructions).
88
Figure 31: PWCT – Goal/Module Designer
The next table describe the function of the most important buttons in the Goal/Module
designer window
Index
1
2
3
4
5
6
7
8
9
10
Table 13: Goal/Module Designer buttons and their description
Button Icon
Description
Create new step of type comment – the step name is
written by the programmer to describe something in the
program
Edit step name – the step name is modified by the
programmer – if the step type is a comment then this
feature is used to modify the comment but if the step type
is a computer instruction then this feature is used to
provide better description for the instruction.
Delete step from the steps tree to remove a comment or a
computer instruction.
Move step up in the steps tree to organise the visual source
and/or to control the flow of instructions execution during
the runtime
Move step down in the steps tree to organise the visual
source and/or to control the flow of instructions execution
during the runtime
Start new interaction process to generate new steps inside
the steps tree. These steps will do something during the
runtime because it’s from the type (computer instruction)
Modify a step. This features is available for steps of type
computer instructions to modify something in the
interaction process by changing attribute values
Open the form designer. This feature is available for steps
that are related to GUI programming (Windows,
controls,...etc)
Ignore/Enable a step. This feature is available for steps of
type computer instructions to include/exclude the step
from the designed program during runtime
Increase the font size of the steps names in the steps tree
89
11
12
13
14
15
Decrease the font size of the steps names in the steps tree
Cut a step, remove the step from the steps tree and keeping
it in the memeory
Copy a step to the memory without removing it from the
steps tree
Paste a step from the memory to be a child step to the
selected step in the steps tree
Search in the visual source by step name
Toward creating hello world program, after selecting the step (The First Step) which
is selected by default
Click the interact button which carry the icon
to start new interaction process.
After clicking the interact button the components browser window will be opened
The components are classified into different domains were each domain contains group of
components and using the component browser you can select a component to use.
From the domain tree select the domain (Print Text) then from the components list
select the component (Print Text to Console) Then click the Ok button.
90
Figure 32: PWCT - Components Browser
After selecting the component using the components browser and clicking Ok, The
interaction using transporter window will be opened to enter the data required for the selected
component. The transporter is another name of the component inside PWCT.
The component (Print Text To Console) presents simple interaction page (data entry
form) that ask the used to enter the text that will be printed on the screen. In our example we
will write the text “Hello World”. Then we will click Ok button.
91
Figure 33: PWCT – Interaction Using Transporter window
After entering the text and pressing Ok button we will return again to the goal designer
window but this time will notice that a new step is added to the steps tree. And the name of
the new step is Print text (“Hello World”) to console. The new step name can be changed by
the programmer using the edit step button
At this stage we can run our program. But running the program at this stage will not
give us the chance to see the message because the program will be executed and the execution
will done and the console screen will disappear before seeing the message.
To see the message we can run the program from the windows command line window
or we can add another step to the program to wait for a number of seconds to see the results.
To modify the program by adding a step for waiting for number of seconds we will do another
interaction process with another component but this time we will control the interaction
process using the keyboard instead of using the mouse to clear that the Coding Simulation
Method is designed to give us the ability to use the keyboard to get more productivity.
92
Figure 34: PWCT – Goal/Module Designer – Generated step as a result of interaction
process
To use the keyboard to start new interaction process we can press CTRL+T or we can
write the first letter of the component name while we still in the Goal Designer and the first
step is selected.
In our case we will press the letter “W” because the required component name is (Wait
Key/Seconds)
After pressing the letter “W” the components browser window will be opened and this
letter will be available in the search line where we can continue the search process by typing
more letters.
After typing the second letter in the component name, in our case it’s the letter “A” we
will see that the required component (Wait Key/Seconds) is selected.
93
Figure 35: PWCT - Components Browser – Using Keyboard to quickly find a component
Instead of clicking the ok button we will press Enter to use the selected component.
94
Figure 36: PWCT – Interaction using transporter window
Inside the interaction using transporter window and using arrows we can move to the
checkbox (Wait nSeconds) and this will be done after pressing the down arrow for two times.
Then we will press enter to set the checkbox (Wait nSeconds) to On.
Then press enter to move the textbox to determine the number of seconds
In our example we will type 3. Then press CTRL+W to end the interaction process to return
to the Goal Designer.
95
Figure 37: PWCT – Goal/Module Designer – Generated steps as a result of interaction
process.
After returning to the Goal designer we notice a new step added to the steps tree and
this step carry the name Wait (3 Seconds).
Now we can run the program by pressing CTRL+R or by click the (i) button from the toolbar.
Figure 38: Application during the runtime
96
A.2 How to maintain programs
Using the Goal/Module designer buttons we can add, edit and delete steps
And using the Modify button
after selecting a step the interaction using
transporter window will be opened where we can change the values (entered data) and this
change will be reflected in the step name inside the goal designer.
97
A.3 GUI Applications
The GCR is flexible enough to represent different types of applications and GUI
applications can be developed and represented simply using the steps tree and interaction
pages.
Also we can use a form designer to set controls positions and sizes
The next figure presents the steps tree of a simple GUI application
This applications contains a window carry the title (Welcome to PWCT) and this window
contains a label carry a caption the same as the window title. Also the window contains a
button to close the window.
When the button is clicked by the user a procedure called (myclose) will be invoked and
this procedure will close the window.
All of these steps are a result of interaction processes with visual components like (Define
new window, Label, Button, Button Events, Define Procedure and Window Class)
Figure 39: PWCT – Goal/Module Designer – Steps Tree for simple GUI application
98
Figure 40: PWCT – Form Designer
Figure 41: PWCT – Components Browser – Components inside the domain “Controls”
99
Figure 42: PWCT – Interaction using transporter window for the component “Define new
window”
The interaction page of the component (Define new window) is an example about
designing a large component with many features.
Note: the same component may contain a group of interaction pages like the (Window Class)
component which contain three interaction pages (Set Property page, Get Property Page &
Invoke method page).
100
Figure 43: PWCT – Interaction Page for Multi pages component
101
Figure 44: PWCT – Interaction Page for Multi pages component
102
A.4 Search in Visual Source
Figure 45: PWCT – Search for a step inside the goal designer
The programmer can do search operation in the visual source to quickly find and select
a step. The search process can be done in the step name (goal designer) or in the step data
(data entered through the interaction using transporter window).
A.5 The Time Dimension
One of the characteristics of visual programming is programming in more the one
dimension. One of the available dimensions for PWCT users is the time dimension where the
programmer can move forward/backward during the application construction process and the
programmer can run the application at any point on the time dimension to test the
programmer before or after adding a step to the steps tree. This can be done easily using a
slider control available in the Goal/Module Designer.
103
Figure 46: PWCT – Using the Time Machine to go backward at a time in the past during
the design process
104
A.6 See the code behind every step
PWCT is a hybrid system where we can design programs visually without writing source
code by hand but we still can see the generated textual source code which is generated and
managed in the background.
We can see the textual source code behind each step in the goal designer and we can get
the source code behind all the steps when we run the application or using a utility comes with
PWCT and called the Code Extractor application.
Figure 47: PWCT – Looking at the code behind a step
105
Figure 48: PWCT – Code Extractor Application
106
A.7 Dealing with multiple steps at the same time
PWCT Contains a tool called the Goal/Module Viewer which contains some of the features
available through the goal designer but enable the programmer to work with more than one
step at the same time where each node in the steps tree contains a checkbox for selecting the
step.
Using checkboxes more than one step can be selected then we can do different operations
of the selected steps like (Cut, Copy, Insert, Delete , Move Up, Move Down and
Enable/Disable).
Figure 49: PWCT – Goal/Module Viewer
107
A.8 The Time Machine and playing programs as movies
When you open any project/application developed using PWCT and instead of looking at
the design to see how to create like this program, simply you can see a movie that teach you
how to design the program using PWCT step by step
To do that from the Goal/Module designer press The Time Machine button then select the
item (Play as Movie from the first time frame).
Then the steps will disappear from the Goal/Module designer and you will see how every
step will be added by selecting the required component then entering the data to the
interaction pages.
This feature reduces the need for sample documentation because every sample developed
using PWCT is a movie that can be played.
Also this feature help in program understanding where the program can use this feature
and keep watching instead of manually moving through the visual representation
Figure 50: PWCT – Goal/Module Designer - Using the Time Machine
108
Appendix B: Students Progress In Learning PWCT
In Table 14 we see the students’ progress in learning PWCT through the free remote
learning course. The first column in the table represent the student ID (instead of the student
name) and the second column contains the number of applications made by the student using
PWCT. The third column contains the student level.
In figure 50 we see the graph that represent the number of students and the student
level and in figures 51, 52 and 53 we see the statistics of the YouTube Playlists for each level
in the course.
Table 14: Students progress in learning PWCT
Student ID
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
No. of Applications
1
7
47
29
2
4
64
24
19
4
6
18
2
1
7
9
4
7
1
42
25
10
46
3
19
4
1
Level
1
1
2
1
1
1
3
1
1
1
1
1
1
1
1
1
1
1
1
2
1
1
2
1
1
1
1
109
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
1
11
51
66
3
5
6
62
64
13
18
35
64
6
3
1
16
7
4
5
27
1
11
3
3
7
34
2
59
6
4
64
5
9
8
1
1
5
11
60
1
43
1
1
3
3
1
1
1
3
3
1
1
2
3
1
1
1
1
1
1
1
1
1
1
1
1
1
2
1
3
1
1
3
1
1
1
1
1
1
1
3
1
2
110
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
61
46
1
24
4
6
7
38
20
5
5
1
60
4
5
45
4
5
1
53
8
1
1
61
7
10
2
1
61
1
65
4
9
64
4
1
3
5
65
23
2
3
3
2
1
1
1
1
1
2
1
1
1
1
3
1
1
2
1
1
1
3
1
1
1
3
1
1
1
1
3
1
3
1
1
3
1
1
1
1
3
1
1
1
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
62
17
64
62
65
49
70
9
4
5
4
27
6
49
22
23
26
48
22
2
1
68
2
5
70
8
10
1
4
4
63
2
4
3
4
4
12
15
47
2
3
64
3
1
3
3
3
2
3
1
1
1
1
1
1
2
1
1
1
2
1
1
1
3
1
1
3
1
1
1
1
1
3
1
1
1
1
1
1
1
2
1
1
3
112
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
41
1
4
8
4
70
7
2
30
65
65
66
20
8
7
4
7
5
6
1
26
7
12
1
24
64
6
2
2
1
6
70
65
1
6
1
1
70
1
6
1
6
2
1
1
1
1
3
1
1
1
3
3
3
1
1
1
1
1
1
1
1
1
1
1
1
1
3
1
1
1
1
1
3
3
1
1
1
1
3
1
1
1
1
113
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
4
65
3
56
1
53
1
3
46
7
67
5
2
4
2
70
4
3
26
37
1
18
19
32
35
20
14
36
44
36
18
6
3
17
14
1
2
36
36
6
28
18
1
3
1
3
1
3
1
1
2
1
3
1
1
1
1
3
1
1
1
2
1
1
1
1
2
1
1
2
2
2
1
1
1
1
1
1
1
2
2
1
1
1
114
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
3
2
18
11
18
1
12
6
31
25
3
2
49
1
9
7
19
11
2
4
1
2
17
53
51
1
2
5
8
2
1
3
1
46
2
1
1
8
30
1
2
12
1
1
1
1
1
1
1
1
1
1
1
1
2
1
1
1
1
1
1
1
1
1
1
3
3
1
1
1
1
1
1
1
1
2
1
1
1
1
1
1
1
1
115
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
25
15
9
1
1
2
19
1
6
11
6
1
22
35
8
24
6
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
2
1
1
1
1
1
Students Level
3.5
3
2.5
2
1.5
1
0.5
1
12
23
34
45
56
67
78
89
100
111
122
133
144
155
166
177
188
199
210
221
232
243
254
265
276
287
298
0
Figure 51: Students Level in PWCT course.
116
Figure 52: YouTube Playlist Statistics for Level 1 of PWCT Course.
Figure 53: YouTube Playlist Statistics for Level 2 of PWCT Course.
Figure 54: YouTube Playlist Statistics for Level 3 of PWCT Course.
117
Appendix C: Designers in our Visual Programming Languages’ framework
(1) Interaction Designer (Component User Interface Designer)
Figure 55: Interaction Designer
118
(2) Transporter Designer (Component Designer)
Figure 56: Transporter/Component Designer – Interaction Pages
Figure 57: Transporter/Component Designer – Code Mask (Script)
119
Figure 58: Transporter/Component Designer – Matching
Figure 59: Transporter/Component Designer – Rules
120
| 6cs.PL
|
Joint Mixability of Elliptical Distributions and
arXiv:1706.05499v2 [math.ST] 18 Oct 2017
Related Families
Chuancun Yin
∗
School of Statistics, Qufu Normal University
Shandong 273165, China
e-mail: ccyin@mail.qfnu.edu.cn
Dan Zhu
School of Statistics, Qufu Normal University
Shandong 273165, China
October 19, 2017
Abstract
In this paper, we further develop the theory of complete mixability and
joint mixability for some distribution families. We generalize a result of Rüschendorf
and Uckelmann (2002) related to complete mixability of continuous distribution function
having a symmetric and unimodal density. Two different proofs to a result of Wang and
Wang (2016) which related to the joint mixability of elliptical distributions with the same
characteristic generator are present. We solve the Open Problem 7 in Wang (2015) by
constructing a bimodal-symmetric distribution. The joint mixability of slash-elliptical
distributions and skew-elliptical distributions is studied and the extension to multivariate
distributions is also investigated.
Keywords: Complete mixability, joint mixability, multivariate dependence, slash/skewelliptical distributions, elliptical distributions
AMS subject classifications: 60E05 60E10 60E15
∗
Corresponding author.
1
1
Introduction
In recent years, the problem of studying complete mixability and joint mixability of
distributions has received considerable attention. Complete mixability and joint mixability describe whether it is possible to generate random variables (or vectors) from given
distributions with constant sum. The formally definition of complete mixability for a
distribution was first introduced in Wang and Wang (2011) and then extended to an arbitrary set of distributions in Wang, Peng and Yang (2013), although the concept has been
used in variance reduction problems earlier (see Gaffke and Rüschendorf (1981), Knott
and Smith (2006), Rüschendorf and Uckelmann (2002)). The properties are particularly
of interest in quantitative risk management and optimization problems in the theory of
optimal couplings, where dependence between risks is usually unknown or partially und
known. Throughout the paper, we write X = Y if the random variables (or vectors) X
and Y have the same distribution. For a cumulative distributions function F , we write
X ∼ F to denote F (x) = P (X ≤ x). By convention, all vectors will be written in bold
and will be considered as column vectors, with the superscript ⊤ for transposition. Next
we introduce the concepts of completely mixable and jointly mixable distributions.
Definition 1.2 (Wang, Peng and Yang (2013)). Suppose n is a positive integer
The univariate distribution functions F1 , · · · , Fn are jointly mixable (JM) if there exist
n random variables X1 , · · · , Xn with distribution functions F1 , · · · , Fn , respectively, such
that
P (X1 + · · · + Xn = C) = 1,
(1.1)
for some C ∈ R. If (1.1) holds with Fj = F, 1 ≤ j ≤ n, the distribution F is said to be
n-completely mixable (n-CM). Any such C is called a joint center of (F1 , · · · , Fn ).
For a brief history of the concept of the complete mixability, we refer to the recent
papers of Wang (2015) and Wang and Wang (2016). Existing results on complete mixability and joint mixability are summarized in Wang and Wang (2011), Puccetti, Wang
and Wang (2012) and Wang and Wang (2016). As pointed out in Puccetti and Wang
(2015b), as a full characterization of completely mixable distribution is still out of reach,
there are even less results concerning sufficient conditions for joint mixable distributions.
The only available ones are given in the recent paper of Wang and Wang (2016).
The rest of the paper is organized as follows. In Section 2 we discuss the condi-
2
tions on a result of Rüschendorf and Uckelmann (2002) related to complete mixability
of continuous distribution function having a symmetric and unimodal density. Section 3
is dedicated to joint mixability of elliptical distributions and slash/skew-elliptical distributions, respectively. Section 4 extended the result to the class of multivariate elliptical
distributions.
2
Symmetric Distributions
It would be of interest to characterize the class of completely mixable distributions. Only
partial characterizations are known in the literature. One nice result for the complete
mixability is given by Rüschendorf and Uckelmann (2002), which is equivalent to state
that any continuous distribution function having a symmetric and unimodal density is nCM for any n ≥ 2. Wang (2014) provided a new proof using duality representation. The
property was also extended to multivariate distributions by Rüschendorf and Uckelmann
(2002). Wang and Wang (2016) based on a different technical approach to study the joint
mixability of unimodal-symmetric densities.
Lemma 2.1. (Rüschendorf and Uckelmann (2002)). Any continuous distribution function having a symmetric and unimodal density is n-CM for any n ≥ 2.
Lemma 2.2. (Wang and Wang (2016)). Suppose that F1 , · · · , Fn are distributions with
unimodal-symmetric densities from the same location-scale family with scale parameters
θ1 , · · · , θn , respectively. Then F1 , · · · , Fn is JM if and only if the scale inequality
n
X
i=1
is satisfied.
θi ≥ 2 max θi
(2.1)
1≤i≤n
Proof Using Theorem 3.1 in Wang and Wang (2016), we can give a more simple proof
d
to “if part” of Lemma 2.2. In fact, Xi ∼ Fi can be written as Xi = θi RUi + µ, where µ is a
constant, R is a random variable on (−∞, ∞) and Ui is uniformly distributed on (−1, 1)
independent of R. The result follows from Theorem 3.1 in Wang and Wang (2016) since
θi Ui ∼ U(−θi , θi ), i = 1, · · · , n. This ends the proof.
Suppose that Y has a distribution F and that θ has some distribution on (0, ∞) with a
distribution function H and, Y and θ are independent. Then the distribution of X = θY
3
is referred to as a scale mixture of F with a scale mixing distribution H. The following
corollary is a direct consequence of Lemma 2.1.
Corollary 2.1. The scale mixture of an unimodal-symmetric continuous distribution with
center µ is n-CM (n ≥ 2) with center µ.
In order to give the main results of this section, we first give a lemma which is closely
related to the φ-complete mixability and φ-joint mixability for some supermodular functions φ; see Bignozzi and Puccetti (2015).
Lemma 2.3. Suppose that F1 , · · · , Fn are n univariate continuous distribution functions,
g is a nonconstant continuous function on Rn , f is a nonconstant continuous function on
the real line. Then there exist n random variables Xi ∼ Fi and constant C such that
P (f (g(X1, · · · , Xn ))) = f (C)) = 1
(2.2)
P (g(X1, · · · , Xn ) = C) = 1.
(2.3)
if and only if
Proof. The proof of “if part” is obvious. Now we prove the “only if part”. Since
Fi ’s are continuous, for any n random variables Xi ∼ Fi (i = 1, 2, · · · , n), their joint
distribution function is continuous, and thus g(X1 , · · · , Xn ) is either an almost surely
constant random variable or a continuous random variable. So that f (g(X1, · · · , Xn ))
is either an almost surely constant random variable or a continuous random variable.
Whenever g(X1 , · · · , Xn ) is a continuous random variable, we have for any constant K,
P (f (g(X1, · · · , Xn )) = K) = 0.
Consequently, if (2.2) holds then it is necessary that (2.3) should hold, thus the result
follows.
Theorem 2.1. Suppose F is a continuous distribution with unimodal-symmetric density,
f is a nonconstant continuous function on the real line. For any integer n ≥ 2, there exist
n random variables Xi ∼ F (i = 1, 2, · · · , n) such that
!
!
n
X
P f
Xi = K = 1,
(2.4)
i=1
where K = f (C). Here C is the joint center of the n-tuple (F, · · · , F ). Moreover, if C is
unique, then K is unique.
4
Proof. Taking g(X1 , · · · , Xn ) =
Pn
i=1
Xi and Fi = F, i = 1, 2, · · · in Lemma 2.3, the
result follows from Lemma 2.1. This ends the proof.
Similarly, by using Lemmas 2.2 and 2.3 we get the following theorem.
Theorem 2.2. Suppose that F is a continuous distribution with unimodal-symmetric
density, θ1 , · · · , θn are positive constants, f is a piecewise continuous function on the real
line. Then there exist n random variables Xi ∼ F and constant K such that
!
!
n
X
P f
θi Xi = K = 1
(2.5)
i=1
if and only if the scale inequality (2.1) is satisfied.
The complete mixability and joint mixability is a concept of negative dependence
(cf. Puccetti and Wang (2015a)) and not all univariate distributions F are n-CM. If the
supports of Fi (i = 1, 2, · · · , n) are unbounded from one side, then (F1 , · · · , Fn ) is not JM
for any n ≥ 1; see Remark 2.2 in Wang and Wang (2016). Now we list more examples
(The proof learned largely from Ruodu Wang).
Example 2.1. Assume F1 , · · · , F2n+1 are 2n + 1 univariate distribution functions with
n
symmetric densities on the same interval [−a, a] (a > 0), if Fi ( n+1
a) ≤
n+1
2n+1
(i =
1, 2, · · · , 2n + 1), then (F1 , · · · , F2n+1 ) is not JM.
n
Proof For any Xi ∼ Fi (i = 1, 2, · · · , 2n + 1), the conditions Fi ( n+1
a) ≤
1, 2, · · · , 2n + 1) imply that
P |Xi | >
n
2n
a >
, i = 1, 2, · · · , 2n + 1.
n+1
2n + 1
n+1
2n+1
It follows that
2n+1
X
na
na
na
≥
P |Xi | >
− 2n
, · · · , |X2n+1| >
P |X1 | >
n+1
n+1
n+1
i=1
> (2n + 1)
Note that
(2n+1
X
i=1
Hence
Xi 6= 0
)
⊇
P
na
na
|X1 | >
, · · · , |X2n+1 | >
n+1
n+1
2n+1
X
i=1
Thus (F1 , · · · , F2n+1 ) is not JM.
2n
− 2n = 0.
2n + 1
Xi 6= 0
5
!
> 0.
.
(i =
Corollary 2.2. (Necessary Condition) Assume F1 , · · · , F2n+1 are 2n + 1 univariate dis-
tribution functions with symmetric densities on the same interval [−a, a] (a > 0), if
(F1 , · · · , F2n+1 ) is JM, then there exists some i (1 ≤ i ≤ 2n + 1) such that
1
n
a >
.
P |Xi | ≤
n+1
2n + 1
The interval [−a, a] in Example 2.1 can be changed as (−∞, ∞).
Example 2.2. Assume F1 , · · · , F2n+1 are 2n + 1 univariate distribution functions with
symmetric densities on the same interval (−∞, ∞), if there exists a > 0 such that
n
n
Fi (a) − Fi
a ≥
, i = 1, 2, · · · , 2n + 1,
n+1
2n + 1
then (F1 , · · · , F2n+1 ) is not JM.
The following example tells us the symmetry of F does not implied F is 3-CM and
that the unimodality assumption on the density can not removed.
Example 2.3 Assume that F has the following bimodal symmetric density
(
2r+1 2r
x , if x ∈ [−a, a],
2a2r+1
f (x) =
0,
if x ∈
/ [−a, a],
where r is a positive integer. The distribution is given by
if x < −a,
0,
1
F (x) =
(x2r+1 + a2r+1 ) , if − a ≤ x < a,
2a2r+1
1,
if x ≥ a.
It is easy to see that
1
1
2
+ 2r+2 < .
2
2 2
3
Thus (F, F, F ) is not JM. Or, equivalently, F is not 3-CM.
F
a
=
Example 2.4 Assume that F has the following bimodal symmetric density
(
2m
Cm √x1−x2 , if x ∈ (−1, 1),
fm (x) =
0,
if x ∈
/ (−1, 1),
where Cm is a normalizing constant and m ≥ 0 is an integer. When m = 0, fm is
the density of Pearson type II distribution, which is convex, bimodal and symmetric, so
6
that Lemma 2.1 can not applicable. Note that f0 is the density of cos θ or sin θ with
θ ∼ U(0, 2π) and thus it is n-CM for any integer n ≥ 2; see Puccetti, Wang and Wang
(2012) for more details. When m ≥ 1, using Example 2.1 one can checks that F is not
(2n + 1)-CM for not very large n. The (2n + 1)-complete mixability of this distribution is
not covered by any known theoretical results for large n. Further we consider a distribution
F with density
f (x) =
∞
X
αm fm (x),
m=1
where {αm }m≥1 is a sequence of positive values with
P∞
m=1
αm = 1. This distribution is
not (2n+1)-completely mixable for any n ≥ 1. Thus we give a counterexample to the Open
Problem 7 in Wang (2015) which states that are all absolutely continuous distributions
on a bounded interval n-CM for large enough n?
3
Elliptical Distributions and Related Families
3.1
Elliptical Distributions
Let Ψn be a class of functions ψ : [0, ∞) → R such that function ψ(|t|2 ), t ∈ Rn is an n-
dimensional characteristic function. It is clear that Ψn ⊂ Ψn−1 · · · ⊂ Ψ1 . Denote by Ψ∞
the set of characteristic generators that generate an n-dimensional elliptical distribution
for arbitrary n ≥ 1. That is Ψ∞ = ∩∞
n=1 Ψn .
Defination 3.1 The random vector X = (X1 , X2 , · · · , Xn )⊤ is said to have an elliptical
distribution with parameters µ and Σ, written as X ∼ En (µ, Σ, ψ), if its characteristic
function can be expressed as
ϕX (t) = exp it⊤ µ ψ t⊤ Σt⊤ , t ∈ Rn ,
(3.1)
for some column-vector µ, n × n positive semidefinite matrix Σ and for some function
ψ ∈ Ψn with ψ(0) = 1, which is called the characteristic generator. In general, elliptical
distributions can be bounded or unbounded, unimodal or multimodal. When ψ(u) =
exp(−u/2), En (µ, Σ, ψ) is the normal distribution Nn (µ, Σ) and when n = 1 the class of
elliptical distributions consists of the class of symmetric distributions. It is well known
that an n-dimensional random vector X ∼ En (µ, Σ, ψ) if and only if for any vector
7
α ∈ Rn , one has (Cambanis et al. (1981)) α⊤ X ∼ E1 (α⊤ µ, α⊤ Σα, ψ). In particular,
P
⊤
Xi ∼ E1 (µi , σi2 , ψ) and ni=1 Xi ∼ E1 (e⊤
n µ, en Σen , ψ).
The next result is due to Wang and Wang (2016) in which they proved the existence
of the dependence structure. Here we present two another proofs by finding the exact
dependence structure and by using Lemma 2.2, respectively.
Theorem 3.1. Suppose that Fi ∼ E1 (µi , σi2 , ψ), where µi ∈ R, σi > 0, ψ is a characteristic
generator for an n-elliptical distribution. Then (F1 , · · · , Fn ) is JM if the inequality
n
X
i=1
σi ≥ 2 max{σ1 , · · · , σn }
(3.2)
is satisfied.
Proof (First proof). Assume X ∼ En (µ, Σ, ψ), where µ = (µ1 , · · · , µn )⊤ and Σ =
(σij )n×n . Here
σij =
(
σi2 ,
if i = j,
1
(σk2
(n−1)(n−2)
−
P
l6=k
σl2 ),
if k 6= i 6= j.
It is straightforward to check that Σ is positive semidefinite under condition (3.2) and
the summation of all entries in Σ is zero. Each component Xi of X has distribution
P
E1 (µi , σi2 , ψ), i = 1, 2, · · · , n. The characteristic function of ni=1 Xi can be expressed as
!
!
n
n
X
X
ϕPni=1 Xi (t) = exp it
µi ψ(0) = exp it
µi , t ∈ R.
(3.3)
i=1
i=1
Hence,
P
n
X
i=1
and thus (F1 , · · · , Fn ) is JM.
Xi =
n
X
i=1
µi
!
= 1,
Second proof. We remark that if Fi ∼ E1 (µi , σi2 , ψ) has a density and ψ is a char-
acteristic generator for an n-elliptical distribution (n ≥ 2), then Fi is unimodal and
symmetric. Thus Theorem 3.1 is a direct consequence of Lemma 2.2.
The following result is a direct consequence of Theorem 3.1.
Corollary 3.1. Suppose that F ∼ E1 (µ, σ 2, ψ) with ψ ∈ Ψ∞ . Then F is n-CM for any
n ≥ 2.
8
Remark 3.1. Theorem 2.21 in Fang, Kotz and Ng (1990) shows that ψ ∈ Ψ∞ if and only
if F ∼ E1 (µ, σ 2 , ψ) is a mixture of normal distributions. Some such elliptical distributions
are normal distribution, the T -distribution, Cauchy distribution, Stable laws distribution
and Pearson type VII distribution; see Andrews and Mallows (1974) and Kano (1994).
Note that there are continuous, unimodal and symmetric densities do not belong to
the class of normal scale mixtures; see West (1987). Thus Corollary 3.1 is a special case
of Corollary 2.1. In the sequel, we list more examples.
Example 3.1 Consider the generalized logistic distribution with density
f (x) = C
exp(−αxβ )
, −∞ < x < ∞,
(1 + exp(−xβ ))2α
(3.4)
where C > 0, α > 0, β > 0 are constants. If α = 1 and β = 2, (3.4) is 1-dimensional
logistic distribution which is unimodal and symmetric but not a scale mixture of normal
densities; see Gómez-Sánchez-Manzano et al. (2006). If α = β = 1, (3.4) is standard
logistic distribution which is unimodal and symmetric and can be represented as a scale
mixture of normal densities; see Stefanski (1990).
Example 3.2 Kotz type distributions with density generator
g(r) = Cr N −1 exp(−mr β ), m, β > 0, N > 1
have symmetric and bimodal densities, the (2n + 1)-complete mixability of those Kotz
type distributions is not covered by any known theoretical results for n ≥ 1.
3.2
Slash-Elliptical Distributions
In this subsection, we investigate joint mixability of slash-elliptical distributions. We say
that a random variable X follows a slash elliptical distribution if it can be written as
X=
Z
1
Uq
+ µ,
(3.1)
where Z ∼ E1 (0, σ 2 , ψ) is independent of U ∼ U(0, 1) and q > 0 is the parameter related
to the distribution kurtosis. We use the notation X ∼ SE1 (µ, σ 2 , ψ; q). Similarly, we say
that a random vector X ∈ Rp has slash-elliptical multivariate distribution with vector
9
location parameter µ, positive semidefinite matrix scale parameter Σ, and tail parameter
q > 0, if it can be represented as
Z
(3.2)
1 + µ,
Uq
where Z ∼ Ep (0, Σ, ψ) is independent of U ∼ U(0, 1) and kurtosis parameter q > 0. We
X=
denote this as X ∼ SEp (µ, Σ, ψ; q). Properties of this family are discussed in Gómez,
Quintana and Torres (2007) and Bulut and Arslan (2015).
Using the representation (3.1), the following theorem is a consequence of Theorem 3.1.
Theorem 3.2. Suppose that Fi ∼ SE1 (µi , σi2 , ψ; q), where µi ∈ R, σi > 0, ψ is a charac-
teristic generator for an n-variate slash-elliptical distribution. Then (F1 , · · · , Fn ) is JM
if the inequality
n
X
i=1
is satisfied.
3.3
σi ≥ 2 max{σ1 , · · · , σn }
Skew-Elliptical Distributions
A univariate random variable Z has a skew-elliptical distribution if its probability density
function (pdf) is
2g(z)π(λz), −∞ < z < ∞,
where g is a pdf of univariate elliptical distribution with center 0, λ ∈ R and π is the
distribution function of g. We write Z ∼ SE1 (0, g, π, λ). In particular, if g is the pdf
of N(0, 1), then Z is called has a skew-normal distribution and write Z ∼ SN(µ, σ 2 , λ).
A random variable X follows a skew scale mixture of normal distribution with location
parameter µ ∈ R, scale parameter σ 2 and skewness parameter λ ∈ R if its pdf is given by
x−µ
g(x) = 2g0 (x)Φ λ
, x ∈ R,
σ
where λ ∈ R, Φ is the distribution function of N(0, 1) and g0 is the pdf of scale mixture
of normal distribution defined as
g0 (x) =
Z
∞
φ(x; µ, v 2 σ 2 )dH(v).
0
Here H is a (unidimensional) probability distribution function such that H(0) = 0. We
use the notation X ∼ SSMN(µ, σ 2 , λ, H). For more details see Andrews and Mallows
(1974) and Gómez-Sánchez-Manzano et al. (2006).
10
For complete mixability of skew-normal distribution, we have the following result.
Theorem 3.3. Suppose that F has the distribution SN(µ, σ 2 , λ), then F is not n-CM
(n ≥ 2) for sufficiently large |λ|.
d
Proof Assume random variable Xλ has the distribution F . Since Xλ = σX +µ, where
X ∼ SN(0, 1, λ), we prove the theorem for the case Xλ ∼ SN(0, 1, λ) only. It follows
from Henze (1986) that if Xλ ∼ SN(0, 1, λ), then it has the stochastic representation
d
Xλ = √
λ
1
|U| + √
V,
2
1+λ
1 + λ2
where U and V are independent N(0, 1) random variables. Moreover,
r
2
λ
.
E(Xλ ) = √
2
π
1+λ
Without loss of generality, we assume λ > 0. For any Ui and Vi are independent N(0, 1)
random variables, we have
P
√
λ
1 + λ2
n
X
i=1
|Ui | + √
n
X
1
1 + λ2
n
X
Vi > nE(Xλ )
i=1
n
X
!
n
\
1
λ
|Ui | + √
Vi ≥ 0}
2
1+λ
1 + λ2
i=1
i=1
i=2
!
n
\
λ
1
λ
1
≥P √
|U1 | + √
V1 > nE(Xλ ), { √
|Ui | + √
Vi ≥ 0}
2
1 + λ2
1 + λ2
1
+
λ
1 + λ2
i=2
1
λ
|U1 | + √
V1 ≤ nE(Xλ )
≥ 1−P √
1 + λ2
1 + λ2
n
X
λ
1
−
P √
|Ui | + √
Vi < 0 > 0,
2
2
1
+
λ
1
+
λ
i=2
≥P
√
λ
1 + λ2
|Ui | + √
1
1 + λ2
Vi > nE(Xλ ),
{√
for sufficiently large λ. This shows that the distribution SN(0, 1, λ) is not n-CM (n ≥ 2)
for sufficiently large |λ|.
Remark 3.2. For F ∼ SN(µ, σ 2 , λ), we conjecture that there exists an integer n0 (λ)
such that F is not n-CM for n ≤ n0 (λ) and, F is n-CM for n > n0 (λ); For an integer
n ≥ 2, there exists a λ0 (n) ≥ 0 such that F is n-CM whenever |λ| ∈ [0, λ0 (n)] and, F is
not n-CM whenever |λ| ∈ (λ0 (n), ∞).
Theorem 3.4. Suppose that F has the distribution SSMN(µ, σ 2 , λ, H), then F is not
n-CM (n ≥ 2) for sufficiently large |λ|.
11
!
Proof For any Xi ∼ SSMN(µ, σ 2 , λ, H) (i = 1, 2, · · · , n) and V ∼ H such that V is
independent of X1 , · · · , Xn . By the definition of skew scale mixture of normal distribution,
we have
Xi |V = v ∼ SN(µ, σ 2 v 2 , λv).
Then for any constant C and sufficiently large |λ|, using Theorem 3.3,
! Z
!
Z ∞
n
n
∞
X
X
P
Xi = C =
P
Xi = C|V = v dH(v) <
dH(v) = 1.
i=1
0
0
i=1
Thus F is not n-CM for sufficiently large |λ|.
4
Extensions to multivariate distributions
In this section we extent some results in Section 3 to the class of n-variate elliptically contoured distributions. We first introduce some notions. The notation vec(A) denotes the
⊤ ⊤
vector (a⊤
1 , · · · , an ) , where ai denotes the ith column of p × n matrix A, i = 1, 2, · · · , n.
we use A ⊗ B to denote the Kronecker product of the matrices A and B; We use tr(A)
to denote the trace of the square matrix A and etr(A) to denote exp(tr(A)) if A is a
square matrix. We use the following definition given in Gupta, Varga and Bodnar (2013).
Definition 4.1. Let X be a random matrix of dimensions p × n. Then, X is said to
have a matrix variate elliptically contoured distribution if its characteristic function has
the form
E(etr(iT⊤ X)) = etr(iT⊤ M)Ψ(tr(T⊤ ΣTΦ)).
(4.1)
with T : p × n, M : p × n, Σ : p × p, Φ : n × n, Σ ≥ 0 (positive semidefinite), Φ ≥ 0, and
Ψ : [0, ∞) → R. This distribution will be denoted by X ∼ Ep,n (M, Σ ⊗ Φ, Ψ).
The important special case of matrix variate elliptically contoured distribution is the
matrix variate normal distribution (X ∼ Np,n (M, Σ ⊗ Φ)), its characteristic function is
1 ⊤
⊤
⊤
(4.2)
E(etr(iT X)) = etr iT M − T ΣTΦ .
2
The next lemma shows that linear functions of a random matrix with matrix variate elliptically contoured distribution have elliptically contoured distributions also (see Theorem
2.2 in Gupta, Varga and Bodnar (2013)).
12
Lemma 4.1. Let X ∼ Ep,n (M, Σ ⊗ Φ, Ψ). Assume C : q × m, A : q × p, and B : n × m
are constant matrices. Then,
AXB + C ∼ Ep,n (AMB + C, AΣA⊤ ⊗ B⊤ ΦB, Ψ).
The next lemma gives the marginal distributions of a matrix variate elliptically contoured distribution (see Theorem 2.9 in Gupta, Varga and Bodnar (2013)).
Lemma 4.2. Let X ∼ Ep,n (M, Σ ⊗ Φ, Ψ), and partition X, M, and Φ as
X = (X1 , X2 ), M = (M1 , M2 ),
and
Φ=
"
Φ11 Φ12
Φ21 Φ22
#
,
where X1 is p × m, M1 is p × m, and Φ11 is m × m, 1 ≤ m < n. Then
X1 ∼ Ep,m (M1 , Σ ⊗ Φ11 , Ψ).
Theorem 4.1. Suppose that F ∼ Ep (0, Σ, Ψ), where Σ ≥ 0 is a p × p matrix, Ψ is a
characteristic generator for a p × n matrix variate elliptically contoured distribution (n ≥
2). Then there exist n p-dimensional random vectors X1 , · · · , Xn identically distributed
as F such that
P (X1 + · · · + Xn = 0) = 1.
Proof Using Lemma 4.2 we can choose X ∼ Ep,n (0, Σ ⊗ Φ, Ψ) with all marginals Xi ’s
(the ith column of X, i = 1, 2, · · · , n) have the same p-elliptical distribution Ep (0, Σ, Ψ),
where Φ ≥ 0 is an n × n matrix with diagonal elements are 1. Using Lemma 4.1 one finds
that X1 + · · · + Xn = Xen ∼ En (0, Σ ⊗ (etn Φen ), Ψ). Taking Φ = (1 − ρ)En + ρen eTn with
1
ρ = − n−1
, En is n × n identity matrix. It follows that
P (X1 + · · · + Xn = 0) = 1.
Acknowledgements.
We are grateful to Ruodu Wang for insightful comments and
valuable suggestions on the first manuscript. The research was supported by the National
Natural Science Foundation of China (No. 11571198, No. 11701319).
13
References
[1] Andrews, D. R. and Mallows, C. L. (1974). Scale mixtures of normal distributions.
Journal of the Royal Statistical Society, Series B 36, 99-102.
[2] Bignozzi, V. and Puccetti, G. (2015). Studying mixability with supermodular aggregating fuctions. Statistics and Probability Letters 100, 48-55.
[3] Bulut, Y. M. and Arslan, O. (2015). Matrix variate slash distribution. Journal of
Multivariate Analysis 137, 173-178.
[4] Cambanis, S., Huang, S. and Simons, G. (1981). On the theory of elliptically contoured distributions. Journal of Multivariate Analysis 11, 368-385.
[5] Fang, K. T., Kotz, S. and Ng, K. W. (1990). Symmetric Multivariate and Related
Distributions. Chapman & Hall, London.
[6] Gaffke, N. and Rüscherndorf, L. (1981). On a class of extremal problems in statistics.
Mathematische Operationsforschung und Statistik. Series Optimization 12(1), 123135.
[7] Gómez-Sánchez-Manzano, E., Gómez-Villegas, M. A. and Marı́n, J. M. (2006). Sequences of elliptical distributions and mixtures of normal distributions. Journal of
Multivariate Analysis 97, 295-310.
[8] Gómez, H.W., Quintana, F. A. and Torres, F. J. (2007). A new family of slashdistributions with elliptical contours. Statistics and Probability Letters 77(7), 717725.
[9] Gupta, A. K., Varga, T. and Bodnar, T. (2013). Elliptically Contoured Models in
Statistics and Portfolio Theory (Second Edition), Springer New York.
[10] Henze, N. (1986). A probabilistic representation of the ‘skew-Normal’ distribution.
Scandinavian Journal of Statistics 13(4), 271-275.
[11] Kano, Y. (1994). Consistancy property of elliptical probability density functions.
Journal of Multivariate Analysis 51,139-147.
[12] Knott, M. and Smith, C. S. (2006). Choosing joint distributions so that the variance
of the sum is small. Journal of Multivariate Analysis 97, 1757-1765.
14
[13] Puccetti, G., Wang, B. and Wang, R. (2012). Advances in complete mixability. Journal of Applied Probability 49 (2), 430-440.
[14] Puccetti, G., Wang, B. and Wang, R. (2013). Complete mixability and asymptotic
equivalence of worst-possible VaR and ES estimates. Insurance: Mathematics and
Economics 53(3), 821-828.
[15] Puccetti, G. and Wang, R. (2015a). Extremal dependence concepts. Statistical Science 30(4), 485-517.
[16] Puccetti, G. and Wang, R. (2015b). Detecting complete and joint mixability. Journal
of Computational and Applied Mathmatics 280, 174-187.
[17] Rüschendorf, L. and Uckelmann, L. (2002). Variance minimization and random
variables with constant sum, in: Cuadras, et al. (Eds.), Distributions with Given
Marginals, Kluwer, 211-222.
[18] Stefanski, L. A. (1990). A normal scale mixture representation of the logistic distribution. Statistics & Probability Letters 11, 69-70.
[19] Wang, R. (2014). Asymptotic bounds for the distribution of the sum of dependent
random variables. Journal of Applied Probability 51(3), 780-798.
[20] Wang, R. (2015). Current open questions in complete mixability. Probability Surveys
12, 13-32.
[21] Wang, R., Peng, L. and Yang, J. (2013). Bounds for the sum of dependent risks and
worst value-at-risk with monotone marginal densities. Finance and Stochastics 17
(2), 395-417.
[22] Wang, B. and Wang, R. (2011). The complete mixability and convex minimization
problems with monotone marginal densities. Journal of Multivariate Analysis 102
(10), 1344-1360.
[23] Wang, B. and Wang, R. (2016). Joint mixability. Mathematics of Operations Research
41(3), 808-826.
[24] West, M. (1987). On scale mixtures of normal distributions. Biometrika 74(3), 646648.
15
| 10math.ST
|
DISTRIBUTIONS AND STATISTICAL POWER OF
OPTIMAL SIGNAL-DETECTION METHODS IN FINITE
CASES
arXiv:1702.07082v1 [math.ST] 23 Feb 2017
By Hong Zhang∗,‡ , Jiashun Jin§ and Zheyang Wu∗,†,‡
Worcester Polytechnic Institute‡ and Carnegie Mellon University§
In big data analysis for detecting rare and weak signals among n
features, some grouping-test methods such as Higher Criticism test
(HC), Berk-Jones test (B-J), and φ-divergence test share the similar
asymptotical optimality when n → ∞. However, in practical data
analysis n is frequently small and moderately large at most. In order
to properly apply these optimal tests and wisely choose them for
practical studies, it is important to know how to get the p-values
and statistical power of them. To address this problem in an even
broader context, this paper provides analytical solutions for a general
family of goodness-of-fit (GOF) tests, which covers these optimal
tests. For any given i.i.d. and continuous distributions of the input
test statistics of the n features, both p-value and statistical power
of such a GOF test can be calculated. By calculation we compared
the finite-sample performances of asymptotically optimal tests under
the normal mixture alternative. Results show that HC is the best
choice when signals are rare, while B-J is more robust over various
signal patterns. In the application to a real genome-wide association
study, results illustrate that the p-value calculation works well, and
the optimal tests have potentials for detecting novel disease genes
with weak genetic effects. The calculations have been implemented
in an R package SetTest and published on the CRAN.
1. Introduction. In big data analysis, signals are often buried within
a large amount of noises and are thus relatively weak and rare. It is ideal
to apply the optimal tests that are capable of detecting the minimal signals required by statistics. Through asymptotics, many theoretical studies
have brought exciting results on designing such optimal tests. In particular,
under the Asymptotically Rare and Weak (ARW) setting, the Higher Criticism (HC) and its various modifications, the Berk-Jones (B-J) type tests,
a spectrum of φ-divergence type tests, etc. were studied and proven asymptotically optimal [1, 2, 3, 4]. These optimal tests are attractive in many
scientific researches. For example, in large-scale genetic association studies,
a main strategy to find disease-associated genes is to determine whether
∗
†
Partially supported by NSF grant DMS-1309960.
Corresponding author.
1
2
H. ZHANG ET AL.
some of the genetic variants within candidate genes could affect disease outcome. Such genetic effects are often weak and rare, especially relative to the
cumulated noise level in big data.
However, for practical applications under finite cases the questions remain
on 1) how to analytically calculate p-values as well as statistical power, and
2) what are the real performances of those methods that are asymptotically
equivalent. First, to obtain the p-value for error control, the Monte-Carlo
simulation or permutation tests have significant limitations: (A) they require
daunting computation, and (B) empirical p-values are discrete, causing ties
among candidates. These issues are especially concerned when very small
p-values are demanded to handle a huge number of simultaneous tests. Secondly, for those optimal tests with the same asymptotic property under
n → ∞, it is important to understand their relative performance for finite
n. In order to solve these problems we need to calculate the distributions
of these tests under both H0 and H1 at each given n. Comparing with the
literature, this paper gives a complete answer by providing a comprehensive
calculation for a broad family of relevant tests.
1.1. Limitations of current methods. In general there are two types of
methods for distribution calculation. The first is to calculate the exact distribution. Recursive methods (e.g., Noe’s recursion[5, 6], Bolshev’s recursion
[7, 8], Steck’s recursion [9, 10], Ruben’s recursion [11], etc.) were developed to calculate the distribution of Kolmogorov-Smirnov type statistics
under H0 . In a similar fashion, Barnett and Lin [12] provided a calculation
method specifically for HC. Such recursive methods have heavy computation load, with complexity of O(n3 ). Moscovich, Nadler and Spiegelman [13]
reduced the computation to O(n2 ). However, all these methods assume the
full domain R = {1 ≤ i ≤ n} in the supremum formula of the relevant
tests (see the HC statistic in (3) as an example). However, calculation that
allows arbitrary R is important, because many tests improve performance
by properly restricting R. For example, a modified version of HC is under
R = {1 < i ≤ n/2, p(i) ≥ 1/n}. This is because that including too small
p-values p(i) could make HC heavy tailed; while including too big p-values
may unnecessarily reduces computational efficiency (c.f. [1]). Moreover, these
methods did not give statistical power calculation under H1 yet.
The second type methods are to approximate the distribution. KolmogorovSmirnov type statistics have been proven to converge in law to an extremevalue distribution [15, 16]. However, such convergence is too slow to be
accurate for even moderately large n [12]. Recently, Li and Siegmund (LS)
[14] developed an asymptotic approximation method. One problems is that
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES
3
Fig 1: Comparison among different methods for calculating the right-side
probability of the modified HC test (MHC) in (3) with R = {1 < i ≤
i.i.d.
n/2, p(i) ≥ 1/n}[1] under H0 : Xi ∼ N (0, 1). Black solid curves: by simulation; red dashed curves: by Corollary 1; green dotted curves: by Li and
Siegmund’s method[14].
this method cannot approximate the whole distribution. Figure 1 shows
that the LS calculation (green dotted curves) fails to match the simulation
(black solid curves) at small thresholds, whereas our calculation (e.g., the
red dashed curves) reveal the whole distributions. Moreover, comparing with
our study setting, LS assumes slightly more restriction for the supremum
searching domain R, and covers a narrower range of test types. Again, literature studies did not yet provide satisfiable method for deriving the relevant
distributions under H1 for statistical power calculation.
1.2. Our contribution. This paper has two folds of contributions. First,
it provides techniques for calculating the distributions of a general family
of goodness-of-fit (GOF) tests, which covers the optimal tests described
above. We give calculation methods for the exact as well as the approximated
4
H. ZHANG ET AL.
Fig 2: The association p-values for genes by exact calculation of four tests.
First row: HC 2004 and Berk-Jones; second row: reverse Berk-Jones and
HC 2008 .
distributions, balancing between accuracy and computation burden. The
methods allow (A) arbitrary truncation strategies (e.g., R for HC in (3)),
and (B) arbitrary null and alternative hypotheses as long as they are i.i.d.
and continuous. With such techniques, p-values and statistical power can be
calculated at any testing threshold.
Second, based on analytical calculation we systematically compared the
power of the asymptotically optimal tests. Simulations were applied for examing these tests under various n values and signals patterns in practice. We
also demonstrated the application of these weak-signal-sensitive tests in a
real genome-wide association study (GWAS) for detecting genes associated
to the Crohn’s disease (see Figure 2).
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES
5
In summary, the innovative contribution of this work lies on providing
a more mature statistical framework that revolves the problem of calculating distributions for a broader family of GOF tests under both H0 and
H1 . Thus, those asymptotically equivalent tests for detecting weak signals
can be apply, as well as compared by power, in practical applications. The
paper is organized as follows. In section 2 we formulate the problem under
a general setup of hypotheses and GOF tests, and brief the essence of our
strategy. The analytical results are presented in Section 3 for both exact
and approximated calculations. Through simulations Section 4 numerically
evidences the calculation accuracy, and provides power comparisons among
the asymptotically optimal tests. We show the application of the GOF tests
in a real GWAS in Section 5. In Section 6 we discuss relevant theoretical
and practical issues. The techniques of relevant proofs and lemmas are given
in the Appendix.
2. Problem Formulation and General Strategy.
2.1. Background on Detection of Weak and Sparse Signals. We consider
the signal detection problem through testing whether there exist “signals”
in noisy background. Under the broadly applicable Gaussian Means Model,
signals refer to the nonzero means in the normally distributed data values (or
statistics) X1 , X2 , ..., Xn . A test is said of detecting signals if it successfully
concludes the alternative when it is true. A typical setting for the null and
the alternative is
(1)
i.i.d.
H0 : Xi ∼ N (0, 1),
i.i.d.
H1 : Xi ∼ N (µ, 1) + (1 − )N (0, 1),
where ∈ (0, 1) denotes the expected proportion of signals.
Under the Asymptotic Rare and Weak (ARW) setting, the
p proportion of
−α
signals is n = n , α ∈ (1/2, 1), and the mean is µn = 2r log(n), r ∈
(0, 1). Landmark studies [1, 17, 18] have provided the asymptotic detection
boundary in terms of a function curve of the signal strength and sparsity:
α − 1/2
1/2 < α ≤ 3/4
√
(2)
r = ρ? (α) =
3/4 < α < 1.
(1 − 1 − α)2
When the signals are below the curve, all tests will fail to distinguish H0
and H1 as n → ∞. Whenever signals are above the curve, the so-called
asymptotically optimal tests are able to make both the type I and the type II
error rates converge to zero. A particular optimal test is the Higher Criticism
(HC) test [19, 1]:
(3)
i/n − p(i)
√
HCn,R = sup n q
,
R
p(i) (1 − p(i) )
6
H. ZHANG ET AL.
where p(1) ≤ ... ≤ p(n) are the order statistics of pi = 2(1 − F0 (|Xi |)), i =
1, ..., n, the two-sided p-values of Xi . The supremum domain R regards to
the p-value magnitude, or the index i, or both. Note that in literature HC
formula could also be written as (e.g., [20, 12] )
P
i > t} − 2nΦ̄(t)
i {X
p
(4)
HC = sup
.
∗
t∈R
2nΦ̄(t)Φ(t)
Because the formula is monotone, the supremum domain R on p(i) is equivalent to the supremum domain R∗ on t.
Following that, a variety of modified Higher Criticism (HC), the BerkJones (B-J) type tests, a spectrum of φ-divergence type tests, etc. were
studied and proven asymptotically optimal [1, 2, 3, 4]. In this paper, we
provide calculation for the p-value and statistical power for relevant tests
under finite n.
2.2. Study Formulation. In this paper, we consider arbitrary i.i.d. and
continuous null and alternative hypotheses:
(5)
i.i.d.
H0 : Xi ∼ F0 ,
i.i.d.
Ha : Xi ∼ F1 , i = 1, ..., n.
We consider the goodness-of-fit (GOF) tests that evidence the distinction
between the data and any given null distribution. Consider either one-sided
p-values pi = 1 − F0 (Xi ) or two-sided p-values pi = 2(1 − F0 (|Xi |)). When
F0 is continuous, the null hypothesis is equivalent to
i.i.d.
H0 : pi ∼ Uniform(0, 1), i = 1, ..., n.
The typical idea of GOF is that if any Xi do not follow F0 , its p(i) shall
distinct from it expectation, which is roughly i/n. Following this idea we
consider a general family of tests,
(6)
i
Sn,R = sup f ( , p(i) ),
n
R
where the supremum domain
(7)
R = {i : k0 ≤ i ≤ k1 }
\
{p(i) : α0 ≤ p(i) ≤ α1 }
for given k0 ≤ k1 ∈ {1, ..., n} and α0 ≤ α1 ∈ [0, 1]. We assume that for fixed
x = i/n the function f (x, y) is monotonically decreasing in y = p(i) , so that
the smaller the input p-values, the larger the statistic and the stronger the
evidence against H0 .
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES
7
This GOF family contains lots of test statistics widely applicable to practice. For example, the simple one-sided Kolmogorov-Smirnov test statistic
(c.f. [21], page 447, denoted KS + here) is a classic GOF test, which directly measures the difference between p(i) and i/n. That is, the f function
is defined by
fKS + (x, y) = x − y.
(8)
To improve the test, the difference between p(i) and i/n should be scaled
with regard to p(i) or i/n. This is because smaller p(i) values are more important to evidence agains H0 . Such scaled KS tests are related to the Higher
Criticism (HC) statistics proposed in 2004 and 2008 [1, 2], respectively,
where the f functions are defined as
√
x−y
np
;
y(1 − y)
√
x−y
.
fHC 2008 (x, y) = n p
x(1 − x)
fHC 2004 (x, y) =
(9)
Jager and Wellner introduced a collection of φ-divergence statistics [4],
which are also based on the supremum of functions:
1
(1 − xs y 1−s − (1 − x)s (1 − y)1−s ), s 6= 0, 1,
s(1 − s)
x
1−x
f1φ (x, y) = x log( ) + (1 − x) log(
),
y
1−y
y
1−y
f0φ (x, y) = y log( ) + (1 − y) log(
).
x
1−x
fsφ (x, y) =
(10)
For certain s (e.g., s = 2 or −1) these statistics are two-sided in the sense
that switching the values of x = i/n and y = p(i) gives the same statistic.
However, this property is not appropriate in the scenario of signal detection.
It is the relationship p(i) < i/n, instead of the opposite, indicates signals.
Thus for signal detection purpose, one-sided test is more reasonable and
more powerful, as is the same idea for defining KS and HC. Thus, here
we consider the one-sided version of φ-divergence statistics, which can be
achieved by a simple adjustment of the f function to be, for example,
q
2nf φ (x, y)
y ≤ x,
q s
(11)
fs (x, y) =
− 2nf φ (x, y)
y > x.
s
Now for all s, fs (x, y) is guaranteed decreasing in y. Such one-sided φdivergence statistics cover HC exactly: f2 = fHC 2004 and f−1 = fHC 2008 .
8
H. ZHANG ET AL.
Also, s = 1 and 0 correspond to the Berk-Jones statistic [22, 1, 14] and the
reverse Berk-Jones statistic [22], respectively. Note that the input p-values
themselves could be two-sided in order to accommodate the consideration
of signal directionality in practical problems.
2.3. Calculation Strategy. In the following we first introduce the essential
idea of the calculation. Under various settings and assumptions, detailed
strategies for obtaining the exact and approximated distributions will be
described in Section 3.
For any given continuous CDFs in (5), we define a monotone transformation function in (0, 1):
x
under H0 : F0 ,
(12)
D(x) =
under H1 : F1 6= F0 .
1 − F1 (F0−1 (1 − x))
Note that for any p-value pi , we have D(pi ) ∼ U nif orm(0, 1) under either
H0 or H1 .
Consider the function f (x, y) of any statistic Sn,R in (6), for each fixed x
define its inverse function
(13)
g(x, ·) = f −1 (x, ·).
For example, for the HC statistics defined (9), the g functions are
√ √
b2 /n−(b/ n) b2 /n+4x(1−x)
1
gHC 2004 (x, b) = 1+b2 /n [x +
];
2
(14)
√ p
gHC 2008 (x, b) = x − (b/ n) x(1 − x).
In general if the closed form of g(x, ·) is not available, it can always be found
numerically, since f (x, y) is strictly decreasing in y.
Now under either H0 or H1 , the CDF function of Sn,R is
(15)
i
P (Sn ≤ b) = P (sup f ( , p(i) ) ≤ b)
n
R
\
i
= P ( {p(i) > g( , b)})
n
R
= P {D(p(i) ) > D(g( ni , b)), all i and p(i) in R}.
The key idea is that under either H0 or H1 , U(i) := D(p(i) ) is the ith order
statistic of Uniform(0, 1), and the joint distribution of U(i) , i = k0 , ...., k1 ,
can be studies one way or another for getting the final probability.
To simplify the presentation, we list below the notations to be referred
later on.
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES
9
(N1) uk := D(g( nk , b) ∨ α0 ), following the definitions in (12)–(15), and a
potential constant α0 ≥ 0 in (7).
(N2) F̄B(α,β) (x) denotes the survival function of Beta(α, β) distribution.
(N3) FΓ(α) (x) and F̄Γ(α) (x) denote the CDF and survival function of Gamma(α, 1)
distribution, respectively, where the shape parameter is α, the scale
parameter is 1.
(N4) Based on the notation (N3) define
hk (x) := xFΓ(k−1) (kx) − FΓ(k) (kx).
(N5) fP (λ) (x) denotes the probability mass function of P oisson(λ) distribution.
3. Analytical Results.
3.1. Exact Calculations. The first theorem provides the exact calculation
for the distribution of GOF in (6), where the supremum domain R involves
truncation of the index i. For example, the initial HC was defined with
R = {1 ≤ i ≤ n/2} [1].
Theorem 3.1. Consider any GOF statistic in (6) with R = {k0 ≤ i ≤
k1 } for given 1 ≤ k0 ≤ k1 ≤ n. Let m = n − k1 + 1. Following the notations
(N1), (N2), and
ak1 =
ak =
n!
(n−k1 +1)! F̄B(1,m) (uk1 ),
and
kX
1 −k
ujk+j−1
n!
F̄B(k1 −k+1,m) (uk1 ) −
ak+j ,
(n − k + 1)!
j!
k = k1 − 1, ..., 1.
j=1
Under either H0 or H1 we have
P (Sn ≤ b) = F̄B(k1 ,m) (uk1 ) −
kX
1 −1
i=k0
uii
ai+1 .
i!
Another type of truncation is based on the value of p(i) . In the case of HC
under the null of N (0, 1), this truncation is equivalent to the truncation on
t in (4). The following theorem gives the exact calculation for the general
GOF tests in (6) with such truncations.
Theorem 3.2. Consider any GOF with statistic in (6) with R = {α0 ≤
p(i) ≤ α1 } for given 0 ≤ α0 < α1 ≤ 1. Following the notations (N1) and
10
H. ZHANG ET AL.
(N2), define
β0 = D(α0 ),
aj (k) =
β1 = D(α1 ),
β0i−1 (1−β1 )n−j+1
(i−1)!(n−j+1)!
j−k l
X
uk+l−1
uj−1
cij =
n!
)−
β1j−k F̄B(j−k,1) (
(j − k)!
β1
aj (j) = 0,
l!
l=1
aj (k + l), and
1 ≤ i ≤ k1 , i < j ≤ n + 1, k = 1, ..., j − 1
Under either H0 or H1 , we have
P (Sn,R ≤ b) =
k1 n+1
X
X
cij aj (i)
i=1 j=i+1
The most general R is in (7), which defines the truncation for both the
index and the p-values. The following theorem provides the calculation for
exact distribution under this general setup, for which no literature has provided solution before.
Theorem 3.3. Consider any GOF with statistic in (6)with R = {α0 ≤
p(i) ≤ α1 } ∩ {k0 ≤ i ≤ k1 } for given 1 ≤ k0 ≤ k1 ≤ n and 0 ≤ α0 < α1 ≤ 1.
Following the notations in Theorem 3.2 and (N1) and (N2), define
(
(
i
i ≥ k0
j
j ≤ k1 + 1
ĩ =
, j̃ =
, β̃0 = β0 I{i<k0 } ,
k0 i < k0
k1 + 1 j > k1 + 1
j̃−k
aj (k) =
X ulk+l−1
uj̃−1
n!
(j−k)
β1
)−
aj (k + l), and
F̄B(j̃−k,j−j̃+1) (
(j − k)!
β1
l!
l=1
aj (j̃) = 0,
1 ≤ i ≤ k1 , ĩ < j ≤ n + 1, k = 1, ..., j̃ − 1.
Under either H0 or H1 , we have
P (Sn,R ≤ b)
=
k1 n+1
X
X
i=1 j=ĩ+1
j̃−1
j−i
k−i+1
X
˜
u
−
β̃
0
n!(β
−
β̃
)
(u
−
β
)
j̃−1
1
0
0
k
cij
)−
aj (k + 1) .
F̄B(j̃−i,j−j̃+1) (
(j − i)!
(k
−
i
+ 1)!
β1 − β̃0
k=ĩ
The study setting in Li and Siegmund [14] is a special case of the general
truncation with α1 = 1. For example, the “modified HC” is to take R =
{1 < i ≤ n/2, p(i) ≥ 1/n}[1]. Li and Siegmund’s calculation provided an
approximation for the modified HC under H0 . As shown in Figure 1, the
approximation does not give the whole distribution. For this setting, the
corollary below gives the exact distribution for the general GOF in (6) under
both H0 and H1 .
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 11
Corollary 1. Consider any GOF with statistic in (6) with R = {α0 ≤
p(i) } ∩ {k0 ≤ i ≤ k1 } for given 1 ≤ k0 ≤ k1 ≤ n and α0 > 0. Following the
notations in Theorem 3.1, 3.2 and (N1) and (N2), define
ci =
β0i−1
,
(i − 1)!
1 ≤ i ≤ k1 .
Under either H0 or H1 , we have
k1
kX
1 −1
n+1−i
k+1−i
X
n!(1
−
β̃
)
u
−
β̃
(u
−
β̃
)
0
0
0
k
k
P (Sn,R ≤ b) =
ci
F̄B(k1 +1−i,m) ( 1
)−
ak+1 .
(n + 1 − i)!
(k + 1 − i)!
1 − β̃0
i=1
k=ĩ
To sum up, Theorem 3.3 covers Theorem 3.1 by fixing i = 1, j = n + 1
(so that cij = 0) and α0 = 0, α1 = 1. It covers Theorem 3.2 by letting
k0 = 1, k1 = n, and covers Corollary 1 by fixing j = n + 1 and α1 = 1.
Regarding the computational complexity, the calculation given by Theorem 3.1 is equivalent to solving an upper triangular linear systems using
backward substitution, which is O(n2 ), an improvement from O(n3 ) required
by other exact distribution calculations [5, 6, 12]. More importantly, our
method can handle a more general family of GOFs defined in (6) with a
more flexible supremum domain R. When R is more complicated, Corollary
1 is still O(n2 ) because the inner loop ak is not dependent on i. Theorem
3.2 and Theorem 3.3 are O(n3 ).
3.2. Approximate the distributions. In this section, we provide several
calculation methods to approximate the distributions of the GOF family.
Under more restricted conditions, computation load could be significantly
reduced. For simplicity we provide results here for the supremum domain
R = {k0 ≤ i ≤ k1 }. More general results for R in (7) can be obtained by
following the similar idea of the calculation in Theorem 3.3.
The theorem below gives an approximated calculation based on a joint
Gamma distribution.
Theorem 3.4. Consider any GOF with statistic in (6) with R = {k0 ≤
i ≤ k1 }. Following the notations (N1) and (N3), define
dk = (n + 1)D(g( nk , b)), k = k0 , ..., k1 .
k−1 j
X
dk1 −k+j
ck = F̄Γ(k) (dk1 ) −
ck−j , k = 2, ..., k1 , and
j!
j=1
c1 = F̄Γ(1) (dk1 ).
12
H. ZHANG ET AL.
Under either H0 or H1 , we have
P (Sn ≤ b) = (1 + o(1))(F̄Γ(k1 ) (dk1 ) −
kX
1 −1
k=k0
dkk
ck −k ).
d! 1
To further reduce the computation, we can also deduce a one-step formula
under stronger assumptions. In particular, if D(g( nk , b)) is a linear function
of k, we can provide a closed-form formula for the distribution that gives
the same accuracy as the above theorem.
Theorem 3.5. Consider any GOF with statistic in (6) with R = {1 ≤
i ≤ k1 }. Assume the function D(g( nk , b)) = a+λk, for some λ ≥ 0. Following
the notation (N3) and (N4), under either H0 or H1 we have
P (Sn ≤ b) = (1 + o(1))e−a (1 − λ + hk1 (λ)).
One example that satisfies the linearity of D(g( nk , b)) is the simple KolmogorovSmirnov (KS + ) test in (8) under H0 , where a = −(n + 1)b and λ = n+1
n . In
this case, based on the above theorem we have the following corollary
Corollary 2. Consider the test statistic KS + in (8) under H0 . Following the notation (N3) and (N4), for b ≤ n1 , we have
P (KS + ≤ b) = (1 + o(1))e(n+1)b (−
1
n+1
+ hk1 (
)).
n
n
The requirement of linear D(g( nk , b)) in Theorem 3.5 is stringent. However,
if D(g( nk , b)) is close to linear, we can still further simplify the calculation
of Theorem 3.4. As one example, Theorem 3.6 below provides such a calculation formula for GOF and the conditions on D(g( nk , b)). The strategy for
proving this theorem largely follows the idea in Li and Siegmund [14]. The
key difference is that, instead of using the beta distribution in Li and Siegmund, we use the gamma distribution, which has a simpler density function
for addressing a wider family of the GOF tests. See Appendix for details.
Theorem 3.6. Consider GOF tests in (6) with R = {k0 ≤ i ≤ k1 }.
Follow notations (N1) – (N5), and define dk = (n + 1)D(g( nk , b)), d0k =
√
d
(n + 1) dx
D(g( nk , b)), and k ∗ = min{k1 − k, n}. Assume D(g(x, b)) satisfies
1. D(g(x, b)) < 1 is increasing and convex in x for
d
2. dx
D(g(x, b)) < 1, and
k0
n
≤x≤
k1
n,
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 13
3. D(g(k/n, b)) <
k
n+1 ,
for k > 1 and large n.
Under either H0 or H1 we have
P (Sn ≥ b) = (1 + o(1))
k1
X
k=k0
(1 −
d0k
d0
+ hk∗ ( k ))fP (dk ) (k).
n
n
Such a close-to-linear property of D(g( nk , b)) can be satisfied by HC 2004
under H0 . In this case, D(g( nk , b)) = g(x, b) is given in (14), and the condi√
tions can be satisfied when b is in the order of O( n). Thus, we can get a
computation-easy formula.
Corollary 3.
Consider the test statistic HC 2004 in (9) with R =
{k0 ≤ i ≤ k1 }. Let b0 = √bn be a positive constant > 2x − 1, kn0 < x < kn1 .
Define function
q
1
2
2
g(x, b0 ) =
[x
+
(b
−
b
0 b0 + 4x(1 − x))/2],
0
1 + b20
1
b0 (1 − 2x)
g 0 (x, b0 ) =
[1 − p 2
].
2
1 + b0
b0 + 4x(1 − x)
Following the notation (N2), under H0 , we have
k1
X
0 k
2004
0 k
P (HC
≥ b) = (1+o(1))
1 − g ( , b0 ) + hk∗ (g ( , b0 )) fP (g( k ,b0 )n) (k).
n
n
n
k=k0
The above formula is different from that given in Li and Sigmund [14].
However, for the HC under H0 , both formulas require the threshold b =
√
O( n). Thus, both methods do not get the whole distribution. Furthermore, the accuracy depends on the linear approximation of the D(g( nk , b))
function, which could be far from the truth under general H1 . Thus this
type of calculation may not be very attractive for calculation statistical
power. Meanwhile, numeric results in Section 4 show that both methods are
accurate for calculating small p-values under relatively large threshold b.
4. Numerical results. In this section we first evidence the accuracy
of our methods by comparing the calculations with the Monte-Carlo simulations under various settings of H0 and H1 . Then, based on calculation we
compare the finite-n performance of the asymptotically optimal tests over
various signal patterns. The supremum domain is R = {1 ≤ i ≤ n/2} by default, and will be specified otherwise. The simulations run 5,000 repetitions
by default.
14
H. ZHANG ET AL.
i.i.d.
4.1. Evaluate the accuracy of calculations. Under H0 : Xi ∼ N (0, 1), i =
1, ..., n. Figure 3 shows the right-tail probability of HC over the threshold
b. Comparing with simulation (black solid curves), the exact calculation by
Theorem 3.1 (cyan dashed curves) has a perfect match. The approximation
by Theorem 3.4 is accurate over the whole distribution when n is fairly big.
The closed-formula calculation methods by Li and Siegmund [14] (blue dotted curves) and by Corollary 3 (green dashed curves) do not fit the whole
distribution curve, but both can provide good approximation for calculation
small p-values at large threshold.
For distribution calculation under the alternative, we considered the null
of i.i.d. N (0, 1) (on which the input p-values are based) and the alternatives:
i.i.d.
H1 : Xi ∼ (1 − )N (0, 1) + N (1, 1), or
i.i.d.
H1 : Xi ∼ (1 − )N (0, 1) + tν .
Figure 4 shows the right-tail probability of HC under the normal mixture
alternative with µ = 1, = 0.1 (row 1), or under the Student’s t distribution with degrees of freedom ν = 5 (row 2). In both cases the distribution
curves by exact calculation (Theorem 3.1, cyan dashed curves) and by approximation (Theorem 3.4, red dot-dashed) are close to simulation (black
solid curves). As expected, the approximation is more accurate for larger n.
Besides the normal distributions, Theorems 3.1 – 3.4 can handle any given
continuous F0 and F1 . Here we test on four settings studied in the initial
paper of HC [1]. The first setting regards a Chi-squared model:
i.i.d.
H0 : Xi ∼ χ2ν (0),
vs.
i.i.d.
H1 : Xi ∼ (1 − )χ2ν (0) + χ2ν (δ).
where ν is the degree of freedom, δ is the non-centrality parameter. The
second setting is a Student’s t mixture model:
i.i.d.
H0 : Xi ∼ tν (0),
vs.
i.i.d.
H1 : Xi ∼ (1 − )tν (0) + tν (δ).
The third setting is a chi-squared-exponential mixture model,
i.i.d.
H0 : Xi ∼ exp(ν),
vs.
i.i.d.
H1 : Xi ∼ (1 − ) exp(ν) + χ2ν (δ).
The fourth setting concerns a generalized normal distribution (also known
as power exponential distribution) model,
i.i.d.
H0 : Xi ∼ GNp (0, σ),
vs.
i.i.d.
H1 : Xi ∼ (1 − )GNp (0, σ) + GNp (µ, σ),
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 15
Fig 3: Comparison among different calculations for the distributions of HC
i.i.d.
over various n value under H0 : Xi ∼ N (0, 1). Black solid curves: by
simulations; cyan dashed curves: by Theorem 3.1 for exact distribution; red
dot-dashed curves: by Theorem 3.4; blue dotted curves: by Li and Siegmund
[14]; green dashed curves: by Corollary 3 .
16
H. ZHANG ET AL.
i.i.d.
Fig 4: The alternative distributions of HC under H0 : Xi ∼ N (0, 1) vs.
H1 : Xi ∼ 0.9N (0, 1) + 0.1N (1, 1) (row 1), or H1 : Xi ∼ 0.5N (0, 1) + 0.5t5
(row 2). Column 1: n = 10; column 2: n = 100. Black solid curves: by
simulations; cyan dashed curves: by Theorem 3.1; red dot-dashed curves: by
Theorem 3.4.
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 17
where the probability density function of GNp (µ, σ) is
1
|x − µ|p
exp(−
),
Cp
pσ p
Cp = 2p1/p Γ(1 + 1/p)σ.
Notice that GN1 (µ, σ) is the Laplace distribution and GN2 (µ, σ) is N (µ, σ 2 ).
Each row of Figure 5 illustrates the alternative distribution of HC under each
of the four settings for n = 10 (left column) and 100 (right column). Again
the distribution calculation is fairly accurate in all cases.
For the closed-form calculation formula given by Theorem 3.5, the boundary is assumed linear: D(g( ni , b)) = a + λk ≥ 0 in (15). One example is the
KS + in (8) under H0 . Figure 6 demonstrates the accuracy of the calculation
based on either fixed slope λ = 0.5 or fixed intercept a = 0.5. Here k0 = 1,
k1 = n = 50. As the boundary a + λk increases, the probabilities from both
calculation and simulation decrease and well-matched as expected.
4.2. Compare statistical power of asymptotically optimal tests. All φdivergence statistics with s ∈ [−1, 2] possess the same asymptotic optimality property for detecting weak and sparse signals [4]. It is of interest
to know the performance of such statistics under finite n. Here we study
s = 2, 1, 0, −1, which correspond to HC 2004 , the Berk-Jones statistic, the
reverse Berk-Jones statistic, and HC 2008 , respectively.
To show the calculation accuracy, we calculated (by Theorem 3.1) the
critical values at the significance levels of 10%, 5% and 1%. Then at these
critical values we got the empirical type I error rates through simulation
(10,000 repetitions). Table 1 presents the thresholds by calculation and the
correspondingly empirical type I error rates. The closeness of these empirical
and nominal type I error rates evidences that the calculation for these tests
is accurate.
Now through the calculation based on Theorem 3.1, we systematically
compared the power of these tests under
i.i.d.
H0 : Xi ∼ N (0, 1),
vs.
i.i.d.
H1 : Xi ∼ (1 − )N (0, 1) + N (µ, 1).
With the type I error rate controlled at 5%, Figure 7 provides the statistical
power at various µ, n and . There are a few interesting observations. First,
HC 2004 performs well when signals are sparse. However, it seems more relevant to the average number of signals, i.e., n, rather than the proportion
itself. For example, at fixed n = 5 (panels in the first column), HC 2004
is always the best, while at fixed = 0.05 (panels in the diagonal), HC 2004
becomes worse when n increases. Second, Smaller s parameter (s = −1 for
18
H. ZHANG ET AL.
Fig 5: The alternative distributions of HC under four non-normal settings
for H0 and H1 . Column 1: n = 10; column 2: n = 100. Black solid curves:
by simulations; cyan dashed curves: by Theorem 3.1; red dot-dashed curves:
by Theorem 3.4.
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 19
Fig 6: Probability in (15) with boundary D(g( ni , b)) = a + λk. Black solid
curves: by simulations; red dot-dashed curves: by Theorem 3.5.
Table 1
Type I error rates: exact calculation vs. simulation.
s
2
1
0
-1
n
10
50
100
10
50
100
10
50
100
10
50
100
10%
threshold simulation
threshold
3.357
3.507
3.539
2.181
2.408
2.478
1.750
2.040
2.136
1.618
1.909
2.010
4.648
4.714
4.723
2.504
2.716
2.780
1.974
2.301
2.402
1.838
2.165
2.271
0.992
0.102
0.103
0.101
0.098
0.104
0.100
0.101
0.101
0.098
0.099
0.107
5%
simulation
0.049
0.050
0.049
0.050
0.048
0.049
0.049
0.047
0.051
0.051
0.049
0.052
threshold
10.088
10.102
10.102
3.110
3.300
3.354
2.390
2.803
2.915
2.227
2.662
2.777
1%
simulation
0.010
0.011
0.009
0.011
0.010
0.009
0.011
0.011
0.010
0.009
0.009
0.010
20
H. ZHANG ET AL.
HC 2008 and s = 0 for the reverse Berk-Jones) gives better power for denser
signals. However, when signals are sparse, they are less powerful because
these statistics are insensitive to small p-values as they are weighted by i/n
rather than p(i) . Third, Berk-Jones statistic has a more robust performance
over various µ, n and , which is consistent with the finding of Li and Siegmund [14].
Moreover, it is interesting to see the performance of these methods along
the asymptotic detection boundary. This is because the optimal tests are
most valuable for detecting subtle signals around the detection boundary,
for which sub-optimal tests will have asymptotically zero power. Here we
consider the ARW setting with the detection boundary given in (2). Figure
8 shows the power (calculated by Theorem 3.1) of the four methods over
the sparsity parameter α ∈ (1/2, 1) and r calculated accordingly. It shows
that the power curves of HC 2004 and B-J have the similar pattern, while
the performance of HC 2008 and reverse B-J are alike. In the less sparse case
with α ∈ (1/2, 3/4), B-J is preferred; in the sparser case with α ∈ (3/4, 1),
HC 2004 outperforms the others.
Last but not least, the supremum domain R in (6) is quite relevant in
constructing the test statistic. Here we compare HC 2004 under R = {1 ≤
i ≤ n/2} with the modified HC under R = {1 < i ≤ n/2, p(i) ≥ 1/n}. Figure
9 shows that the MHC performs poorly when the number of signals is small,
whereas it improves the performance when the number of signals increases.
When signals are sparse, MHC is less powerful because it tends to exclude
signals by considering only those p-values bigger than 1/n, the latter is a
fairly large value when n is small. Thus, in practice when n is not too big,
there may be no need to truncate p-values by 1/n.
5. A Genome-wide Association Study for Crohn’s Disease. According to the genetics of complex diseases, disease-associated markers usually have moderate to small effects[23]. In genome-wise studies that tend
to screen as many markers as possible, the number of true disease markers
often account for a small proportion of the total candidates. Therefore, it
is appealing to apply tests that are asymptotically optimal for detecting
rare and weak signals. In this section, based on a logistic regression model,
we applied optimal tests to a SNP-set association study at the gene level.
Specifically, for the ith individual, i = 1, ..., N , let yi = 1 (or 0) indicate
the case (or control), let Gi = (Gi1 , ..., Gin ) denote the genotype vector of
n SNPs in a given gene, and let Zi = (1, Zi1 , Zi2 ) contain the intercept
and the first two principal components of the genotype data, which serve
the purpose for controlling potential population structure [24]. The logis-
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 21
Fig 7: Comparison of statistical power (at type I error rate 5%).
22
H. ZHANG ET AL.
Fig 8: Statistical power along the ARW detection boundary (at type I error
rate 5%).
Fig 9: Power comparison for HC vs. MHC (at type I error rate 5%).
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 23
tic regression model is logit(E(yi |Gi , Zi )) = G0i β + Zi0 γ, where β and γ are
the coefficient parameters. A classic marginal-test statistic of the jth SNP,
adjusted for the non-genetic measures, is [25, 26]
Uj =
N
X
Gij (yi − ỹi ), j = 1, ..., n,
i=1
where ỹi is the fitted outcome value under H0 : β = 0, i.e., none SNPs in the
gene are associated. Under H0 , the vector of statistics U = (U1 , ..., Un )
N (0, Σ), where Σ can be estimated by
Σ̂ = G0 W G − G0 W Z(Z 0 W Z)−1 Z 0 W G,
where G = (Gij ) and Z = (Zij ) are the corresponding design matrices,
and W = diag(ỹi (1 − ỹi )). After de-correlation we get test statistics X =
1
Σ̂− 2 U
N (0, In×n ). Thus the i.i.d. condition of H0 in (5) is reasonably
satisfied, and our calculation methods can apply to obtain the p-value of a
GOF statistic in (6), which measures the association of the given gene.
We examined HC 2004 , B-J, reverse B-J, and HC 2008 (again, they corresponding to the φ-divergence statistics with s = 2, 1, 0, −1, respectively).
The GWAS data from NIDDK-IBDGC (National Institute of Diabetes, Digestive and Kidney Diseases - Inflammatory Bowel Disease Genetics Consortium) contain 1,145 individuals from non-Jewish population (572 Crohn’s
disease cases and 573 controls) [27]. After typical quality control for genotype data, 308,330 somatic SNPs were grouped into 15,857 genes according
to their physical locations.
Figure 2 gives the QQ plots of the gene-association-indicating p-values
calculated by Theorem 3.1. The genomic inflation factors, i.e., the ratios of
empirical median of -log(p-values) vs. the expected median under H0 , are
all close to 1, evidencing that the genome-wide type I errors were well controlled. Among the four tests, the B-J seemed having higher power because
it yielded more genes significantly above the red line of the H0 -expected
p-values. Among the top ranked genes, IL23R and CARD15 (also known as
NOD2) are well-known Crohn’s disease genes [28, 29, 27]. Gene NPTX2 was
top ranked by both HC 2004 and B-J. It hasn’t been reported to be directly
associated, but it encodes a member of the family of neuronal petraxins,
synaptic proteins that are related to C-reactive protein [30], while C-reactive
protein is an indicator for the activity level of Crohn’s disease [31]. Furthermore, NPTX2 has an important paralog gene APCS (www.genecards.org),
which is related to arthritis, a disease highly correlated with Crohn’s disease [32]. Gene SLC44A4 is also related to the pathophysiology of Crohn’s.
24
H. ZHANG ET AL.
Defects in this gene can cause sialidosis, a lysosomal storage disease [30]
that results from a deficiency of the enzyme sialidase, the later is important
for various cells to defend against infection [33]. Gene BMP2 was identified by B-J, reversed B-J, and HC 2008 . This gene could also be relevant
because it is associated with digestive phenotypes, especially colon cancer
[34, 35]. Meanwhile, for those top ranked genes, further studies are needed
to validate.
6. Discussion. This paper provides techniques to calculate the exact
and approximated null and alternative distributions of a general family of
GOF tests. Thus we can calculate both the p-value and the statistical power
of these tests. These calculations are important for both practical applications of GOF tests and for performance comparisons under finite n. Comparing with the relevant literature, our methods are novel, accurate, general
to broad statistic family and supremum domains.
To calculate the exact distribution, the result in Theorem 3.1 brings down
the computational complexity from O(n3 ) to O(n2 ) when comparing with
corresponding literature methods. In the meanwhile, when n and the search
range k1 −k0 are large, the calculation could suffer from the loss of significant
digits. In this case, we could truncate the summation to the first 25 - 30
terms, which yields a fairly accurate result and saves computation time too.
Moreover, we could also apply proper approximated calculations, for which
the accuracy increases together with n.
APPENDIX A: PROOFS
A.1. Proofs of the Main Theorems.
A.1.1. Proof of Theorem 3.1. For k = k1 , ..., 1, define
Z xk
Z xk+1
Z 1
1
n!
ak =
(1 − xk1 )n−k1
...
dxk ...dxk1 −1 dxk1 .
uk (n − k1 )!
uk −1
uk
1
1
n!
(n−k1 +1)! F̄B(1,m) (uk1 ),
Then obviously ak1 =
and for k ≤ k1 − 1,
Z 1
Z xk
Z xk+2
1
n!
n−k1
ak =
(1 − xk1 )
...
xk+1 dxk+1 ...dxk1 −1 dxk1 − uk ak+1
uk1 (n − k1 )!
uk1 −1
uk+1
Z 1
kX
1 −k
ujk+j−1
xkk11 −k
n!
n−k1
=
(1 − xk1 )
dxk1 −
ak+j
(k1 − k)!
j!
uk (n − k1 )!
j=1
1
=
n!
F̄
(uk ) −
(n − k1 + k)! B(k1 −k+1,m) 1
kX
1 −k
ujk+j−1
j=1
j!
ak+j
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 25
Now by Lemma 1,
P (Sn ≤ b) = P {U(k) > uk , k0 ≤ k ≤ k1 }
Z 1
Z xk +1
Z xk
xkk00 −1
0
1
n!
n−k1
=
...
(1 − xk1 )
dxk0 ...dxk1 −1 dxk1
(k0 − 1)!
uk0
uk1 (n − k1 )!
uk1 −1
Z xk +2 k0
Z xk
Z 1
xk0 +1
uk0
0
1
n!
n−k1
...
(1 − xk1 )
dxk0 +1 ...dxk1 −1 dxk1 − k0 ak0 +1
=
k0 !
k0 !
uk0 +1
uk1 −1
uk1 (n − k1 )!
Z 1
kX
1 −1
xk1 −1
n!
uii
=
(1 − xk1 )n−k1 k1
dxk1 −
ai+1
(k1 − 1)!
i!
uk (n − k1 )!
i=k0
1
kX
1 −1
=F̄B(k1 ,m) (uk1 ) −
i=k0
uii
ai+1 .
i!
A.1.2. Proof of Theorem 3.2. The idea is to use total probability theorem.
P (Sn,R ≤ b) =
k1 n+1
X
X
P {Sn,R ≤ b} ∩ {exactly p(i) ...p(j−1) fall in [α0 , α1 ]}
i=1 j=i+1
=
k1 n+1
X
X
Pij
i=1 j=i+1
Notice that 1 ≤ i ≤ n, i + 1 ≤ j ≤ n + 1, we have
Pij = P (U(i−1) < β0 , U(i) ≥ ui , ..., U(j−1) ≥ uj−1 , U(j−1) ≤ β1 , U(j) > β1 ),
where the joint density of U(i−1) , ..., U(j) is
f (xi−1 , ..., xj ) =
n!
xi−2 (1 − xj )n−j ,
(i − 2)!(n − j)! i−1
0 ≤ xi−1 ≤ ... ≤ xj ≤ 1.
Then
i−2
xi−1
Pij = n!
···
dxi−1 dxi ...dxj−1 dxj
(i − 2)!
β1
uj−1
ui
0
Z 1
Z β1
Z xi+1
Z β0
i−2
xi−1
(1 − xj )n−j
= n!
dxj
···
dxi ...dxj−1
dxi−1
(n − j)!
(i − 2)!
β1
uj−1
ui
0
Z β1
Z xi+1
= cij n!
···
dxi ...dxj−1 .
Z
1
(1 − xj )n−j
(n − j)!
uj−1
Z
β1
Z
xi+1
Z
β0
ui
Direct calculation similar to the proof of Theorem 3.1 gives the final result.
26
H. ZHANG ET AL.
A.1.3. Proof of Theorem 3.3. Following the idea in the proof of Theorem
3.2,
P (Sn,R ≤ b) =
k1 n+1
X
X
P {Sn,R ≤ b} ∩ {exactly p(i) ...p(j−1) fall in [α0 , α1 ]}
i=1 j=ĩ+1
=
k1 n+1
X
X
Pij .
i=1 j=ĩ+1
For each feasible pair of (i, j), direct calculation shows Pij can be concisely
written as
(β1 − xj̃−1 )j−j̃
β1
Z
Pij = cij n!
(j − j̃)!
uj̃−1
= cij n!
Z
)j−i
(β1 − β̃0
(j − i)!
xj̃−1
Z
···
uj̃−2
xĩ+1
(xĩ − β̃0 )ĩ−i
dxĩ ...dxj̃−2 dxj̃−1
(ĩ − i)!
uĩ
F̄B(j̃−i,j−j̃+1) (
uj̃−1 − β̃0
β1 − β̃0
)−
j̃−1
X
(uk − β̃0 )k−i+1
k=ĩ
(k − i + 1)!
aj (k + 1) ,
where
Z
β1
aj (k) = n!
uj̃−1
(β1 − xj̃−1 )j−j̃
(j − j̃)!
Z
xj̃−1
uj̃−2
Z
xk+1
···
uk
dxk ...dxj̃−2 dxj̃−1
j̃−k−1
X ulk+l−1
uj̃−1
β1j−k
= n!
F̄
(
)−
aj (k + 1).
(j − k)! B(j̃−k,j−j̃+1) β1
l!
l=1
A.1.4. Proof of Theorem 3.4. The main idea of the proofs of Theorem
3.4 and 3.5 is as follows. Note that U(i) := D(p(i) ) defined in (15) follow
P
i.i.d.
Γi
the same distribution of Γn+1
, where Γi = ij=1 εj , εj ∼ Exp(1), so that
Γi ∼ Gamma(i, 1). Thus we can approximate
k
P {U(k) > D(g( , b)), for all k0 ≤ k ≤ k1 }.
n
k
≈P {Γ(k) > (n + 1)D(g( , b)), for all k0 ≤ k ≤ k1 }.
n
We take advantage of the joint density of (Γk0 , ..., Γk1 ), which is given by
Lemma 2, while Γn+1 can be approximated by n + 1 when n is reasonably
large.
Accordingly, we apply similar calculation as the proof of Theorem 3.1
except using 5 and Lemma 6 instead.
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 27
A.1.5. Proof of Theorem 3.5. Note that
P (Γk > a + λk, 1 ≤ k ≤ k1 )
Z
Z zk
Z +∞
1
...
e−zk1
=
a+λk1
a+λ(k1 −1)
!
z2
dz1 ...dzk1 −1
dzk1
a+λ
By lemma 4,
Z +∞
(zk1 − a − (k1 − 1)λ) (zk1 − a)k1 −2
=
e−zk1
dzk1
(k1 − 1)!
a+λk1
Z +∞
k1 −1
k1 −2
−zk1 (zk1 − a)
−zk1 (k1 − 1)λ(zk1 − a)
=
e
dzk1
−e
(k1 − 1)!
(k1 − 1)!
a+λk1
Let x = zk1 − a,
Z +∞
Z +∞
k1 −1
k1 −2
−a
−x x
−x x
=e
e
dx − λ
e
dx
(k1 − 1)!
(k1 − 2)!
λk1
λk1
=e−a [1 − P (Γk1 ≤ λk1 ) − λ (1 − P (Γk1 −1 ≤ λk1 ))]
=e−a (1 − λ + λFΓ(k1 −1) (λk1 ) − FΓ(k1 ) (λk1 ))
=e−a (1 − λ + hk1 (λ)).
Thus Theorem 3.5 is proved by combining this equation and Lemma 5.
The idea of the proof of Theorem 3.6 is motivated by [14]. Instead of
directly considering the distribution function, we look at the right-tail probability which can be decomposed into the union of disjoint sets.
A.1.6. Proof of Theorem 3.6 and Corollary 3. Let event An,k be defined
S 1
as in Lemma 7. They are disjoint and {Sn ≥ b} = kk=k
An,k . In this proof
0
we mainly focus on approximating P (An,k )
Let dk = (n + 1)D(g( nk , b)), d0k = (n + 1)
k
dD(g( n
,b))
,
dx
d0k,max = (n + 1)
Notice that D(g(x, b)) is convex in x, so dk+j > dk +
and Lemma 7, we have for 1 ≤ k ≤ k1 − 1,
0
dk
n
j. From Lemma 6
dkk
(Γj > dk+j , 1 ≤ j ≤ k1 − k)
k!
0
dkk
dk
≤ P (Γj > dk + j, 1 ≤ j ≤ k1 − k)
k!
n
0
0
k
dk −dk
dk
dk
= e (1 −
+ hk1 −k ( ))
k!
n
n
0
0
dk
dk
= (1 −
+ hk1 −k ( ))fP (dk ) (k).
n
n
P (An,k ) =
dk1 −dk
k1 −k .
28
H. ZHANG ET AL.
Next we need to find the lower bound for P (An,k ).
√
√
We first consider k ≥ k1 − n, here n is chosen for covenience and the
proof works for any nγ , 0 < γ < 1. Note that, due to the convexity, dk+j ≤
0
dk+√n
√
dk + n j, 1 ≤ j ≤ n
0
dk+√n
√
dkk
P (Γj ≥ dk +
j, 1 ≤ j ≤ n)
k!
n
0 √
k
d
d0k+√n
dk −dk
k+ n
√
≥ e (1 −
+ h n(
)
k!
n
n
0
0
d
d
= (1 + o(1))(1 − k + h√n ( k ))fP (dk ) (k).
n
n
P (An,k ) ≥
The last equation is due to Theorem 3.5 and the continuity of D(g(x, b)). We
0
0
√
d
d
can see P (An,k ) → (1 − nk + h√n ( nk ))fP (dk ) (k) uniformly in k, k ≥ k1 − n.
√
We then consider k ≤ k1 − n. In this case, the proof is slightly more
complicated than the first case, however the idea is similar.
Let pn,k (y) = P (Γj > dk+j − dk + y, 1 ≤ j ≤ k1 − k), 0 ≤ y ≤ dk , and fΓk
Rd
be the density function of Γk , then P (An,k ) = 0 k pn,k (y)fΓk (dk − y)dy.
Similar to the proof in the first case,
pn,k (y) ≥ P (Γj ≥ y +
−y
≥e
(1 −
d0k+√n
n
d0k+√n
n
+
= (1 + o(1))e−y (1 −
,1 ≤ j ≤
√
n) − P (
k[
1 −k
√
{Γj ≤ y + dk+j − dk })
j= n
h√
n(
d0k+√n
n
)) −
kX
1 −k
√
j= n
0
Γj
y dk,max
P(
≤ +
)
j
j
n
kX
0
1 −k
d0k
d0
Γj
y dk,max
P(
+ h√n ( k )) −
≤ +
).
n
n
j
j
n
√
j= n
To prove the residual uniformly in k converges to 0, we need to apply
Lemma 3. For y of some lower order, say O(log n)
0
0
y dk,max
log n dk,max
+
≤ √ +
j
n
n
n
log n n + 1
dD(g(x, b))
< √ +
sup {
}
n k0 ≤x≤ k1
dx
n
n
≤δ<1
n
when n is large.
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 29
Then, by Lemma 3, we have the residual
resk ≤
kX
1 −k
√
e
−jI(δ)
√
j= n
e−I(δ) n
→ 0 exponentially uniformly in k.
≤
1 − e−I(δ)
From
(1 + o(1))e−y (1 −
d0k
d0
d0
d0
+ h√n ( k )) − resk ≤ pn,k ≤ e−y (1 − k + h√n ( k )),
n
n
n
n
we can conclude that
d0
d0k
+ h√n ( k )) uniformly in k,
n
n √
n
−I(δ)
e
with error bound resk ≤
.
1 − e−I(δ)
pn,k (y) → e−y (1 −
Let α denote log n for simplicity, α > 1, then, for some constant c > 1,
(16)
Z min{dk ,cα}
d0
d0
e−y (1 − k + h√n ( k ))fΓk (dk − y)dy
Iˆn,k =
n
n
0
√
Z min{dk ,cα}
ne−I(δ) n
→In,k =
pn,k (y)fΓk (dk − y)dy uniformly with error bound ≤
.
1 − e−I(δ)
0
When dk > cα, dk − y < dk < k − 1, fΓk (dk − y) is decreasing in y
P (An,k ) − In,k
(dk − cα)fΓk (dk − cα)
≤
In,k
αfΓk (dk − α)
(dk − cα)ecα−dk (dk − cα)k−1
αeα−dk (dk − α)k−1
(dk − cα) (c−1)α
(c − 1)α k−1
=
e
(1 −
)
α
dk − α
(dk − cα) (c−1)α (k−1) log(1− (c−1)α
)
dk −α
=
e
e
α
(c−1)α
dk
−(k−1)( d −α )
k
≤ eα(c−1) e
α
dk α(c−1)(1− k−1
)
dk
≤ e
α
k
Let x = , y = D(g(x, b)), then
n
nx−1
(n + 1)y −(c−1)( (n+1)y
−1)
=
n
.
α
=
30
H. ZHANG ET AL.
Notice that
nx−1
(n+1)y
is c = sup 2 ≤x≤ k1
n
n
nx−1
> 1, we need (c − 1)( (n+1)y
− 1) > 1 for all x, that
nx−1
nx−1−(n+1)D(g(x,b))
> 1. Therefore
P (An,k )−In,k
In,k
≤
y −γ
αn ,
γ > 0. For k = 1, the result follows d1 → 0,
(17)
In,k → P (An,k ) uniformly in k as n → ∞.
Define P̂ (An,k ) =
R dk
0
e−y (1 −
P̂ (An,k ) − Iˆn,k
P̂ (An,k )
d0k
n
d0
+ h√n ( nk ))fΓk (dk − y)dy,
(dk −y)k−1
(k−1)! dy
R dk (dk −y)k−1
0
(k−1)! dy
dk − (dk − cα)k
)
( k
dkk
k
R min{dk ,cα}
=1−
=1−
0
cα
= 1−
dk
k
≤ exp −c log n .
dk
Since c, dkk > 1, we have
(18)
Iˆn,k → P̂ (An,k ) uniformly in k as n → ∞.
k−1
−y)
Finally, notice that e−y fΓk (dk − y) = e−dk (dk(k−1)!
, then
(19)
d0
d0
P̂ (An,k ) = (1 − k + h√n ( k ))e−dk
n
n
0
Z
dk
0
(dk − y)k−1
dy
(k − 1)!
0
d
d
= (1 − k + h√n ( k ))fP (dk ) (k).
n
n
Combine lemma 5 and equations (16), (17), (18), and (19), we have
P (Sn ≥ b) =(1 + o(1))P (Γk ≤ dk , for some k0 ≤ k ≤ k1 )
=(1 + o(1))
k1
X
P̂ (An,k )
k=k0
=(1 + o(1))
k1
X
k=k0
√
where k ∗ = min{k1 − k, n}.
(1 −
d0k
d0
+ hk∗ ( k ))fP (dk ) (k),
n
n
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 31
To proof Corollary 3, by Theorem 3.6, we have
k1
X
n+1 0 k
n+1 0 k
P (HC 2004 ≥ b) = (1+o(1))
1−
g ( , b0 ) + hk∗ (
g ( , b0 )) fP ((n+1)g( k ,b0 )) (k) .
n
n
n
n
n
k=k0
A.2. Fundmental Lemmas and Proofs.
Lemma 1. Let U(i) be the ith order statistic of i.i.d. samples from Uniform(0,1), 1 ≤ k0 < k1 ≤ n. Then the joint density of (U(k0 ) , ..., U(k1 ) ) is
f(U(k
0)
,...,U(k1 ) ) (zk0 , ..., zk1 )
=
n!
z k0 −1 (1 − zk1 )n−k1 , 0 < zk0 < ... < zk1 < 1.
(n − k1 )!(k0 − 1)! k0
Proof. Standard result from formula (2.2.2) of the book Order Statistics[36].
Lemma
Pk2. Let εi be i.i.d. exponential random variables with parameter
1. Γk = i=1 εi , 1 ≤ k0 < k1 ≤ n. Then the joint density of (Γk0 , ..., Γk1 )
f (zk0 , ..., zk1 ) =
zkk00 −1
(k0 − 1)!
e−zk1 , 0 < zk0 < ... < zk1 < ∞.
Specially, when k0 = 1, the joint density is
f (z1 , ..., zk1 ) = e−zk1 , 0 < z1 < ... < zk1 < ∞.
Proof. The proof follows the deduction process shown in Theorem 1.1
by Mathai and Moschopoulos [37]. Note that their theorem only considers
the case of k0 = 1, but the deduction idea can be applied to general k0 .
P
Lemma 3. Let c < 1, I(c) = c − 1 − log(c) > 0, Γn = ni=1 i , where i
are i.i.d exponential distributed with parameter 1, then
P(
Γn
≤ c) ≤ e−nI(c) .
n
Proof. Let i be exp(1) distributed. The log moment generating function
of −i is Λ(t) = − log(1 + t), t > −1. Then the convex rate function is
Λ∗ (x) = sup tx − Λ(t)
t>−1
= −x − 1 − log(−x).
By Cramer’s theorem, let x = −c, we have desired result.
32
H. ZHANG ET AL.
Lemma 4.
Z
(Abel-Goncharov Polynomial)
zk 1
Z
z2
dz1 ...dzk1 −1 =
...
a+λ(k1 −1)
a+λ
(zk1 − a − λ(k1 − 1)) (zk1 − a)k1 −2
.
(k1 − 1)!
Proof. We will prove by induction.
When k1 = 2, it’s easily shown that
Z z2
(z2 − a − λ(2 − 1)) (z2 − a)2−2
dz1 = z2 − a − λ =
.
(2 − 1)!
a+λ
Assume it’s true for k1 = k,
Z zk
Z z2
(zk − a − λ(k − 1)) (zk − a)k−2
.
...
dz1 ...dzk−1 =
(k − 1)!
a+λ(k−1)
a+λ
Then for k1 = k + 1,
Z zk+1 Z
zk
Z
z2
...
a+λk
Z zk+1
=
a+λk
zk+1
Z
=
a+λk
a+λ(k−1)
dz1 ...dzk−1 dzk
a+λ
(zk − a − λ(k − 1)) (zk − a)k−2
dzk
(k − 1)!
Z zk+1
(zk − a)k−1
λ(zk − a)k−2
dk −
dk
(k − 1)!
(k − 2)!
a+λk
(λk)k
λ(zk+1 − a)k−1 λ(λk)k−1
(zk+1 − a)k
−
−
+
=
k!
k!
(k − 1)!
(k − 1)!
k−1
(zk+1 − a) (zk+1 − a − λk)
.
=
k!
This finished the proof.
Lemma 5. Let c = (ck0 , ..., ck1 ), 1 ≤ k0 < k1 ≤ n be a finite sequence of
increasing numbers. Then given > 0, as n → ∞
P(
Γj
> cj , k0 ≤ j ≤ k1 ) = (1 + O())P (Γj > (n + 1)cj , k0 ≤ j ≤ k1 ).
Γn+1
Proof. Given > 0, let L(c; n, ) and R(c; n, ) be the lower bound and
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 33
Γ
j
> cj , k0 ≤ j ≤ k1 ),
upper bound for P ( Γn+1
L(c; n, ) =P (Γj > (1 + )(n + 1)cj , k0 ≤ j ≤ k1 )
Γn+1
−P (
∈ [1 − , 1 + ]c ),
n+1
R(c; n, ) =P (Γj > (1 − )(n + 1)cj , k0 ≤ j ≤ k1 )
Γn+1
∈ [1 − , 1 + ]c ).
+P (
n+1
By Lemma 3,
P(
Γn+1
1
∈ [1 − , 1 + ]c ) ≤ 2 e−nΛ(1−) → 0 exponentially.
n+1
Because of the continuity of the multivariate gamma distribtution,
L(c; n, ) →(1 + O())P (Γj > (n + 1)cj , k0 ≤ j ≤ k1 ),
R(c; n, ) →(1 + O())P (Γj > (n + 1)cj , k0 ≤ j ≤ k1 ).
Lemma 6.
Let (d1 , ..., dk1 ) be a sequence of nondecreasing and nonnegative numbers. Qj (dj+1 , ..., dk1 ) = P {Γk ≥ dk+j , 1 ≤ k ≤ k1 − j},
0 ≤ j ≤ k1 − 1. F̄Γk (x) is the survival function of Gamma distribution
with shape parameter k and scale parameter 1. Then for l = 2, 3, ..., k1
Qk1 −l = F̄Γl (dk1 ) −
l−1 j
X
dk
1 −l+j
j=1
j!
Qk1 −l+j .
with Qk1 −1 = F̄Γ1 (dk1 ), and, for k0 ≥ 1, the joint survival probability
P {Γk ≥ dk , k0 ≤ k ≤ k1 } = F̄Γk1 (dk1 ) −
kX
1 −1
j=k0
djj
j!
Qj .
34
H. ZHANG ET AL.
Proof.
Q0 = P {Γk ≥ dk , 1 ≤ k ≤ k1 }
Z z2
Z zk
Z +∞
1
−zk1
dz1 ...dzk1 −1 dzk1
...
e
=
+∞
=
e−zk1
Z
+∞
e
=
−zk1
Z
+∞
=
e
−zk1
Z
+∞
=
dk1
e−zk1
zk 1
Z
z2 dz2 ...dzk1 −1 dzk1 − d1 Q1
d2
Z
...
djj
j!
zk0 +1
dk0
(k1 − 1)!
j=1
z3
...
zk 1
kX
1 −1
(z2 − d1 )dz2 ...dzk1 −1 dzk1
d2
zkk11 −1
= F̄Γk1 (dk1 ) −
z3
...
dk1 −1
dk1
Z
Z
dk1 −1
dk1
Z
zk 1
dk1 −1
dk1
Z
d1
dk1 −1
dk1
Z
dzk1 −
zkk00 −1
(k0 − 1)!
kX
1 −1
j=1
djj
j!
dzk0 ...dzk1 −1 dzk1 −
kX
0 −1
j=1
djj
j!
Qj
Qj
Qj .
The rest of recursive formulae can be derived similarly and from the last
third equation.
Also notice that {Γk ≥ dk , k0 ≤ k ≤ k1 } = {Γk ≥ dk , 1 ≤
S
k ≤ k1 } {some Γk < dk , 1 ≤ k ≤ k0 − 1 and Γk ≥ dk , k0 ≤ k ≤ k1 }, by
Lemma 7 we have
P {Γk ≥ dk , k0 ≤ k ≤ k1 } = Q0 +
kX
0 −1
j=1
djj
j!
= F̄Γk1 (dk1 ) −
Qj
kX
1 −1
j=k0
djj
j!
Qj .
Lemma 7. Let (d1 , ..., dk1 ) be a sequence of increasing numbers, An,k =
{Γk ≤ dk , Γk+l > dk+l , 1 ≤ l ≤ k1 − k}, 1 ≤ k ≤ k1 − 1. Then
P (An,k ) =
dkk
Qk .
k!
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 35
Proof.
P (An,k ) = P {Γk ≤ dk , Γk+l > dk+l for all 1 ≤ l ≤ k1 − k}
Z zk+1 Z dk
Z zk
Z +∞
1
zkk−1
...
e−zk1
=
dzk dzk+1 ...dzk1 −1 dzk1
(k − 1)!
0
dk+1
dk1 −1
dk1
Z zk+1 k
Z zk
Z +∞
1
dk
−zk1
...
e
=
dzk+1 ...dzk1 −1 dzk1
dk+1 k!
dk −1
dk
1
1
dk
= k P {Γl ≥ dk+l , 1 ≤ l ≤ k1 − k}
k!
dk
= k Qk .
k!
REFERENCES
[1] D. Donoho and J. Jin, “Higher criticism for detecting sparse heterogeneous mixtures,”
The Annals of Statistics, vol. 32, no. 3, pp. 962–994, 2004.
[2] D. Donoho and J. Jin, “Higher criticism thresholding: Optimal feature selection when
useful features are rare and weak,” Proceedings of the National Academy of Sciences
of the United States of America, vol. 105, pp. 14790–14795, Sep 30 2008.
[3] D. Donoho and J. Jin, “Higher criticism for large-scale inference: especially for rare
and weak effects,” Statistical Science, vol. 30, no. 1, pp. 1–25 DOI: 10.1214/14–
STS506, 2015.
[4] L. Jager and J. A. Wellner, “Goodness-of-fit tests via phi-divergences,” The Annals
of Statistics, pp. 2018–2053, 2007.
[5] M. Noé, “The calculation of distributions of two-sided kolmogorov-smirnov type
statistics,” The Annals of Mathematical Statistics, pp. 58–64, 1972.
[6] M. Noé and G. Vandewiele, “The calculation of distributions of kolmogorov-smirnov
type statistics including a table of significance points for a particular case,” The
Annals of Mathematical Statistics, vol. 39, no. 1, pp. 233–241, 1968.
[7] V. Kotel’Nikova and E. Chmaladze, “On computing the probability of an empirical
process not crossing a curvilinear boundary,” Theory of Probability & Its Applications,
vol. 27, no. 3, pp. 640–648, 1983.
[8] G. R. Shorack and J. A. Wellner, Empirical processes with applications to statistics,
vol. 59. SIAM, 2009.
[9] G. Steck, “The smirnov two sample tests as rank tests,” The Annals of Mathematical
Statistics, pp. 1449–1466, 1969.
[10] M. Breth, “On a recurrence of steck,” Journal of Applied Probability, pp. 823–825,
1976.
[11] H. Ruben, “On the evaluation of steck’s determinant for rectangle probabilities of
uniform order statistics,” Communications in Statistics-Theory and Methods, vol. 5,
no. 6, pp. 535–543, 1976.
[12] I. J. Barnett and X. Lin, “Analytical p-value calculation for the higher criticism test
in finite-d problems,” Biometrika, vol. 101, no. 4, pp. 964–970, 2014.
36
H. ZHANG ET AL.
[13] A. Moscovich, B. Nadler, C. Spiegelman, et al., “On the exact berk-jones statistics and
their p-value calculation,” Electronic Journal of Statistics, vol. 10, no. 2, pp. 2329–
2354, 2016.
[14] J. Li and D. Siegmund, “Higher criticism: p-values and criticism,” Annals of Statistics,
vol. 43, no. 3, pp. 1323–1350, 2015.
[15] F. Eicker, “The asymptotic distribution of the suprema of the standardized empirical
processes,” The Annals of Statistics, pp. 116–138, 1979.
[16] D. Jaeschke, “The asymptotic distribution of the supremum of the standardized empirical distribution function on subintervals,” The Annals of Statistics, vol. 7, no. 1,
pp. 108–115, 1979.
[17] Y. I. Ingster, “Some problems of hypothesis testing leading to infinitely divisible
distributions,” Mathematical Methods of Statistics, vol. 6, no. 1, pp. 47–69, 1997.
[18] Y. I. Ingster, “Minimax detection of a signal for in -balls,” Mathematical Methods of
Statistics, vol. 7, no. 4, pp. 401–428, 1998.
[19] J. Tukey, “The higher criticism.” Course Notes, Statistics 411, Princeton University.,
1976.
[20] E. Arias-Castro, E. J. Candès, and Y. Plan, “Global testing under sparse alternatives:
Anova, multiple comparisons and the higher criticism,” The Annals of Statistics,
vol. 39, no. 5, pp. 2533–2556, 2011.
[21] J. Shao, Mathematical Statistics. Springer Verlag, 2010.
[22] R. H. Berk and D. H. Jones, “Goodness-of-fit test statistics that dominate the kolmogorov statistics,” Probability Theory and Related Fields, vol. 47, no. 1, pp. 47–59,
1979.
[23] D. B. Goldstein, “Common genetic variation and human traits,” New England Journal of Medicine, vol. 360, no. 17, pp. 1696–1698, 2009.
[24] A. L. Price, N. J. Patterson, R. M. Plenge, M. E. Weinblatt, N. A. Shadick, and
D. Reich, “Principal components analysis corrects for stratification in genome-wide
association studies,” Nature genetics, vol. 38, no. 8, pp. 904–909, 2006.
[25] P. McCullagh and J. A. Nelder, Generalized linear models, vol. 37. CRC press, 1989.
[26] D. J. Schaid, C. M. Rowland, D. E. Tines, R. M. Jacobson, and G. A. Poland, “Score
tests for association between traits and haplotypes when linkage phase is ambiguous,”
The American Journal of Human Genetics, vol. 70, no. 2, pp. 425–434, 2002.
[27] R. Duerr, K. Taylor, S. Brant, J. Rioux, M. Silverberg, M. Daly, A. Steinhart,
C. Abraham, M. Regueiro, A. Griffiths, et al., “A genome–wide association study
identifies il23r as an inflammatory bowel disease gene,” Science Signalling, vol. 314,
no. 5804, p. 1461, 2006.
[28] J.-P. Hugot, M. Chamaillard, H. Zouali, S. Lesage, J.-P. Cézard, J. Belaiche, S. Almer,
C. Tysk, C. A. O’Morain, M. Gassull, et al., “Association of nod2 leucine-rich repeat
variants with susceptibility to crohn’s disease,” Nature, vol. 411, no. 6837, pp. 599–
603, 2001.
[29] Y. Ogura, D. K. Bonen, N. Inohara, D. L. Nicolae, F. F. Chen, R. Ramos, H. Britton,
T. Moran, R. Karaliuskas, R. H. Duerr, et al., “A frameshift mutation in nod2 associated with susceptibility to crohn’s disease,” Nature, vol. 411, no. 6837, pp. 603–606,
2001.
[30] D. Maglott, J. Ostell, K. D. Pruitt, and T. Tatusova, “Entrez gene: gene-centered
information at ncbi,” Nucleic acids research, vol. 39, no. suppl 1, pp. D52–D57, 2011.
[31] P. Chamouard, Z. Richert, N. Meyer, G. Rahmi, and R. Baumann, “Diagnostic value
of c-reactive protein for predicting activity level of crohns disease,” Clinical Gastroenterology and Hepatology, vol. 4, no. 7, pp. 882–887, 2006.
[32] G. Trikudanathan, P. G. Venkatesh, and U. Navaneethan, “Diagnosis and therapeu-
DISTRIBUTIONS OF SIGNAL-DETECTION METHODS IN FINITE CASES 37
[33]
[34]
[35]
[36]
[37]
tic management of extra-intestinal manifestations of inflammatory bowel disease,”
Drugs, vol. 72, no. 18, pp. 2333–2349, 2012.
W. D. James, T. Berger, and D. Elston, Andrew’s diseases of the skin: clinical dermatology. Elsevier Health Sciences, 2011.
S. Yuvaraj, S. H. Al-Lahham, R. Somasundaram, P. A. Figaroa, M. P. Peppelenbosch,
and N. A. Bos, “E. coli-produced bmp-2 as a chemopreventive strategy for colon
cancer: a proof-of-concept study,” Gastroenterology research and practice, vol. 2012,
2012.
M. L. Slattery, A. Lundgreen, J. S. Herrick, S. Kadlubar, B. J. Caan, J. D. Potter,
and R. K. Wolff, “Genetic variation in bone morphogenetic protein and colon and
rectal cancer,” International Journal of Cancer, vol. 130, no. 3, pp. 653–664, 2012.
H. David and H. Nagaraja, “Order statistics,” 2003.
A. M. Mathai and P. G. Moschopoulos, “On a multivariate gamma,” Journal of
Multivariate Analysis, vol. 39, no. 1, pp. 135–153, 1991.
Department of Mathematical Sciences and
Program of Bioinformatics and Computational Biology and
Program of Data Science
100 Institute Road
Worcester, MA 01609
E-mail: zheyangwu@wpi.edu
URL: https://www.wpi.edu/people/faculty/zheyangwu
| 10math.ST
|
1
Testing Optimality of
Sequential Decision-Making
Meik Dörpinghaus, Member, IEEE, Izaak Neri, Édgar Roldán,
arXiv:1801.01574v1 [cs.IT] 4 Jan 2018
Heinrich Meyr, Life Fellow, IEEE, and Frank Jülicher
Abstract
This paper provides a statistical method to test whether a system that performs a binary sequential
hypothesis test is optimal in the sense of minimizing the average decision times while taking decisions
with given reliabilities. The proposed method requires samples of the decision times, the decision
outcomes, and the true hypotheses, but does not require knowledge on the statistics of the observations
or the properties of the decision-making system. The method is based on fluctuation relations for decision
time distributions which are proved for sequential probability ratio tests. These relations follow from
the martingale property of probability ratios and hold under fairly general conditions. We illustrate these
tests with numerical experiments and discuss potential applications.
This work has been partly supported by the German Research Foundation (DFG) within the Cluster of Excellence EXC 1056
’Center for Advancing Electronics Dresden (cfaed)’ and within the CRC 912 ’Highly Adaptive Energy-Efficient Computing
(HAEC)’. The material in this paper has been presented in part at the IEEE International Symposium on Information Theory
(ISIT), Aachen, Germany, June 2017 [1].
M. Dörpinghaus is with the Vodafone Chair Mobile Communications Systems and with the Center for Advancing Electronics
Dresden (cfaed), Technische Universität Dresden, 01062 Dresden, Germany (e-mail: meik.doerpinghaus@tu-dresden.de).
Izaak Neri is with the Max-Planck-Institute for the Physics of Complex Systems, Dresden, Germany, with the Max-PlanckInstitute of Molecular Cell Biology and Genetics, Dresden, Germany, and with the Center for Advancing Electronics Dresden
(cfaed), Technische Universität Dresden, 01062 Dresden, Germany (e-mail: izaakneri@posteo.net).
Édgar Roldán is with the Max-Planck-Institute for the Physics of Complex Systems, Dresden, Germany, with the Center for
Advancing Electronics Dresden (cfaed), Technische Universität Dresden, 01062 Dresden, Germany, and with GISC – Grupo
Interdisciplinar de Sistemas Complejos, Madrid, Spain (e-mail: edgar@edgarroldan.com).
H. Meyr is an emeritus of the Institute for Integrated Signal Processing Systems, RWTH Aachen University, 52056 Aachen,
Germany and is now a grand professor of the Center for Advancing Electronics Dresden (cfaed) at Technische Universität
Dresden, 01062 Dresden, Germany (e-mail: meyr@iss.rwth-aachen.de).
Frank Jülicher is with the Max-Planck-Institute for the Physics of Complex Systems, Dresden and with the Center
for Advancing Electronics Dresden (cfaed), Technische Universität Dresden, 01062 Dresden, Germany, Germany (e-mail:
julicher@pks.mpg.de).
January 8, 2018
DRAFT
2
Index Terms
Sequential hypothesis testing, sequential probability ratio test, sequential analysis, decision-making,
mutual information.
I. I NTRODUCTION
In sequential decision-making it is important to make fast and reliable decisions. In this regard,
consider, e.g., an autonomous car which has to decide whether an obstacle is present or not on the
road. Such decisions are executed by dedicated signal processing algorithms. These algorithms
should use the available measurements in an optimal way such that the average time to take a
decision is minimized. For practical use it is key to test if the implemented decision algorithms
achieve the optimum performance, i.e., if decisions are made as fast as possible with a given
reliability.
Sequential decision-making has been first mathematically formulated in the seminal work by
A. Wald who introduced a sequential probability ratio test [2]. Wald’s test takes binary decisions
on two hypotheses based on sequential observations of a stochastic process. For independent
and identically distributed (i.i.d.) observations this test yields the minimum mean decision
time for decisions with a given probability of error and a given hypothesis [3]. Wald’s test
accumulates the likelihood ratio given by the sequence of observations and decides as soon as
this cumulative likelihood ratio exceeds or falls below two given thresholds which depend on
the required reliability of the decision. A key characteristic of such a sequential test is that its
termination time is a random quantity depending on the actual realization of the observation
sequence. The Wald test has been applied to non i.i.d. observation processes, nonhomogeneous
and correlated continuous-time processes, and has been generalized for multiple hypotheses
[4]; general optimality criteria for sequential probability ratio tests have been proved when
probabilities of errors tend to zero, see e.g. [4]–[8].
Now we consider the decision-making device as a black box which takes as input the observation process, corresponding to one of two hypotheses, and gives as output a binary decision
variable at a random decision time. Can we determine whether this decision-making device is
optimal based on the statistics of the output of the device — the decisions and the decision
times — and the knowledge of the true hypothesis? Indeed, in the present paper we introduce a
test for optimality of sequential decision-making based on necessary conditions for optimality.
January 8, 2018
DRAFT
3
Notably, this test does not require knowledge of the realizations or the statistics of the observation
processes.
We first consider a device which takes as input the realization of a continuous stochastic
process corresponding to one of the two hypothesis H1 or H2 , and gives as output a binary
decision variable D ∈ {1, 2} (corresponding to the hypotheses H1 and H2 , respectively) at the
random decision time T elapsed since the beginning of the observations. We will show that
optimality of sequential probability ratio tests — in the sense that the mean decision time is
minimized while fulfilling given reliability constraints — requires that the following conditions
on the distribution of the decision time T hold
pT (t|H = 1, D = 1) = pT (t|H = 2, D = 1)
(1)
pT (t|H = 1, D = 2) = pT (t|H = 2, D = 2).
(2)
Here, pT is the probability density of the decision time and H ∈ {1, 2} (corresponding to the
hypotheses H1 and H2 ) denotes the random binary hypothesis. The necessary conditions (1)
and (2) for optimality imply that the distribution of the decision time T given a certain outcome
are independent of the actual hypothesis. Moreover, this implies that the decision time T of the
optimal sequential test does not contain any information on which hypothesis is true beyond the
decision outcome D. As a consequence, we can quantify the optimality of a given black-box
test by measuring the mutual information between the hypothesis H and the decision time T
conditioned on the output of the test D, i.e., I(H; T|D). In case the test is optimal it must hold
that
I(H; T|D) = 0.
(3)
Based on the following example it can be seen that (3) is a necessary but not a sufficient
condition for optimality in the sense of minimizing the mean decision time given a certain
reliability. Consider we have an optimal decision device using the Wald test. Now we delay
all decisions by a constant time tdelay . Still I(H; T + tdelay |D) = 0 with T being the decision
time of the Wald test. Indeed, (3) is not a sufficient condition for the minimal mean decision
time, but rather a measure for the optimal usage of information by the decision device. If
I(H; T|D) > 0 this means that the decision time T contains additional information on the
hypothesis H beyond the actual decision D implying that the decision device does not exploit all
the available information. Hence, I(H; T|D) measures the degree of divergence from optimality
January 8, 2018
DRAFT
4
in the sense of optimal usage of information. For practical purposes it is easier to test whether the
black-box decision device fulfills the optimality condition in (3) rather than testing if the decision
device decides with the minimum mean decision time, since the minimum mean decision time
is in general not known. Furthermore, consider that in experimental setups we can measure
a decision output D at a certain time T + Tdelay , with Tdelay a random delay time, but in
general we do not know at which time T the decision has been taken, as the decision device
is a black box device and we cannot clearly separate the actual decision making process from
nondecision processes. If the decision time Tdelay is statistical independent of H when conditioned
on D and T, then I(H; T|D) = 0 implies that I(H; T + Tdelay |D) = 0, and I(H; T + Tdelay |D)
can be used as a necessary condition to test optimality of decision devices. If additionally
I(H; Tdelay |D, T + Tdelay ) = 0, then I(H; T|D) = I(H; T + Tdelay |D). In this paper we derive
the optimality conditions (1) - (3) and generalize them to discrete-time observation processes.
We furthermore formulate tests for optimal sequential hypothesis testing (sequential decisionmaking) based on (1) - (3). Finally, we illustrate our results in computer experiments.
The optimality conditions (1) - (3) are of interest in different contexts. For example these
conditions allow to test optimality of sequential decision-making in engineered devices. An
example are decision-making devices based on machine learning such as deep neural networks.
Such algorithms have the power to solve very complex tasks and adapt to specific environments
by learning. The advantage of machine learning is that not all environmental situations need to
be learned at design time, which for many applications like self driving cars is not practical.
However, while neural networks exhibit best performance in comparison to other approaches the
principles which lead to their successful operation are yet unclear. It would be very useful to
quantify if decisions made on such deep learning approaches are close to optimal. In addition to
engineering, the tests proposed in this paper could also allow to understand if specific biological
systems use all available information optimally to make reliable decisions on the fly. In this
regard, consider the example of sequential decision-making by humans in two-choice decision
tasks based on perceptual stimuli or biological cells making decisions on their fate based on
extracellular cues. We discuss the application of the tests for optimality to these examples in
more detail below.
Notation: We denote random variables by upper case sans serif letters, e.g., X. All random
quantities are defined on the measurable space (Ω, F) and are governed by the probability
measure P. The probability density function of a random variable X given Y = y is written
January 8, 2018
DRAFT
5
pX (x|Y = y). Moreover, for discrete random variables P (X = x|Y = y) denotes the probability
of X = x given Y = y. The restriction of the measure P to a sub-σ algebra G ⊆ F is written as
P|G . Finally, log denotes the natural logarithm and log2 is the logarithm w.r.t. base 2. The mutual
i
h
information and the conditional mutual information are defined by I(X; Y) = E log2 ppXX(X|Y)
(X)
h
i
pX (X|Y,Z)
and I(X; Y|Z) = E log2 pX (X|Z) , respectively, where the mathematical expectation E[·] is taken
with respect to the measure P.
Organization of the Paper: The paper is organized as follows. After the introduction,
we describe the system setup in detail in Section II where we also give a precise problem
formulation including definitions of optimality for sequential decision-making. Subsequently,
in Section III we derive the main theorems and corollaries describing properties of optimal
sequential probability ratio tests for the case of continuous observation processes. In Section IV
for certain conditions we extend these theorems and corollaries to the discrete-time scenario. In
Section V we formulate statistical tests to decide whether a black-box decision device performs
optimal sequential decision-making based on the theorems and corollaries derived in Section
III and IV, and we also discuss how to measure the distance of the black-box decision device
to optimality. We illustrate the application of these tests based on numerical experiments in
Section VI. In Section VII we discuss the applicability and the limitations of the provided tests
for optimality. Readers who are mainly interested in the application of the statistical tests for
optimality may skip Sections III and IV.
II. S YSTEM S ETUP AND P ROBLEM F ORMULATION
A. System Setup
We consider a sequential binary decision problem based on an observation process Xt with the
time index t either discrete, t ∈ Z+ , or continuous, t ∈ R+ . The stochastic process Xt is generated
by one of two possible models corresponding to two hypotheses H1 and H2 . To describe the
statistics of the process Xt we consider the filtered probability space (Ω, F, {Ft }t≥0 , P) with
{Ft }t≥0 the natural filtration generated by the observation process Xt and the hypothesis H.
We consider H to be a time independent random variable. The statistics of the observation
process under the two hypothesis are described by the conditional probability measures given
the hypothesis Pl [Φ] = E [1Φ |H = l] with l ∈ {1, 2} corresponding to the hypothesis H1 and H2 ,
respectively [9]; here 1Φ (ω) is the indicator function on the set Φ. We also consider the filtered
probability spaces (Ω, F, {Ft }t≥0 , Pl ) with l ∈ {1, 2} associated with the two hypotheses. We
January 8, 2018
DRAFT
6
consider for continuous-time processes that the filtration {Ft }t≥0 is right-continuous [4], i.e.,
Ft = ∩s>t Fs for all times t ∈ R+ .
A sequential test makes binary decisions based on sequential observations of the process Xt
and tries to guess which of the hypotheses H1 and H2 is true. A sequential test δ = (D, T)
returns a binary output D at a random time T. The decision time T is a stopping time, which is
determined by the time when Xt satisfies for the first time a certain criterion. This stopping rule
is non-anticipating in the sense that it depends only on observations of the input sequence up
to the current time, i.e., the decision causally depends on the observation process. The decision
function is a map from the trajectory {Xt }T0 to {1, 2}, which determines the decision of the test.
We now consider the following class of sequential tests with given reliabilities
C(α1 , α2 ) = {δ : P (D = 2|H = 1) ≤ α2 , P (D = 1|H = 2) ≤ α1 , E[T|H = i] < ∞, i ∈ {1, 2}}
(4)
where E[T|H = i] denotes the expected termination time in case hypothesis i is true and where the
expectation is taken over the observation sequences Xt . Moreover, α1 and α2 are the maximum
allowed error probabilities of the two error types. We assume that α1 , α2 < 0.5. Notice that we
restrict ourselves to tests which terminate almost surely. This assumption is fulfilled in many
cases like the case of i.i.d. observation processes [10, Th. 6.2-1] and stationary observation
processes. Note that the class of sequential tests given by C(α1 , α2 ) does not consider prior
knowledge on the statistics of H.
We define the following optimality criterion.
Definition 1 (Optimality in terms of mean decision times). An optimal test δ ∗ = (D∗ , T∗ )
minimizes the two mean decision times E[T∗ |H = i] corresponding to the hypothesis i = 1 and
i = 2 for a given reliability, i.e.
E[T∗ |H = i] =
inf
δ∈C(α1 ,α2 )
E[T|H = i],
i = 1, 2.
(5)
Note that in Definition 1 we assume that there exists a test for which the infimum is attained.
If such a test does not exist than we can still find a test for which the two mean decision times
are arbitrarily close to their infimum values.
Sequential probability ratio tests or Wald-tests are optimal in the sense of Definition 1 [2]. It
has been proved that for the case of time-discrete i.i.d. observation processes the Wald test is
January 8, 2018
DRAFT
7
optimal in the sense of Definition 1 [3]. Furthermore, under broad conditions for the observation
process it has been proved that sequential probability ratio tests are optimal in the sense of
Definition 1 in the limit of small error probabilities [4]–[8].
For discrete-time and i.i.d. processes the Wald test collects observations Xt (which can be
understood as samples of a corresponding continuous-time process) until the cumulated loglikelihood ratio
Sk =
k
X
∆n =
k
X
n=1
n=1
log
pX (Xn |H = 1)
pX (Xn |H = 2)
for k ≥ 1
(6)
exceeds (falls below) a prescribed threshold L1 (L2 ) for the first time. In (6) ∆n are the increments
of the log-likelihood ratio at time instant n. The test decides D = 1 (D = 2), i.e., for H1 (H2 ),
when Sk first crosses L1 (L2 ). In (6), pX (·|H) denotes the probability density function of the
observations Xk conditioned on the event H. The thresholds L1 and L2 depend on the maximum
allowed probabilities for making a wrong decision α1 and α2 . A decision with the given reliability
constraints α1 and α2 can be made when the cumulative log-likelihood ratio Sk for the first time
crosses one of the thresholds before crossing the opposite one. The thresholds are functions of
α1 and α2 . In general, the thresholds L1 and L2 are difficult to obtain. However, the optimal
thresholds yielding the minimum mean decision time can be approximated by [10, p. 148]
1 − α2
α1
α2
.
L2 = log
1 − α1
L1 = log
(7)
(8)
The choice in (7) and (8) still guarantees that the error constraints in (4) are fulfilled. In summary,
the sequential probability ratio test decides at the time
TWald = min{k ∈ N : Sk ∈
/ (L2 , L1 )}
(9)
for the decision
DWald
1 if S
TWald ≥ L1
=
2 if ST
≤ L2 .
Wald
(10)
Analogously, the Wald test for non-i.i.d. observation processes is given by (9) and (10) with the
log-likelihood ratio
k
X
k
X
pXn (Xn |X1n−1 , H = 1)
Sk =
∆n =
log
pXn (Xn |X1n−1 , H = 2)
n=1
n=1
for k ≥ 1
(11)
where Xn−1
= [X1 , . . . , Xn−1 ].
1
January 8, 2018
DRAFT
8
The Wald test can also be formulated for continuous-time observation processes. In this case
probability densities of the observation trajectories do not always exist. However, the likelihood
ratio eSt can be defined in terms of the Radon-Nikodým derivative of the probability space
(Ω, F, {Ft }t≥0 , P1 ) with respect to the probability space (Ω, F, {Ft }t≥0 , P2 ):
eSt =
dP1 |Ft
dP2 |Ft
(12)
with t ≥ 0. Here, the process St is the cumulative log-likelihood ratio and Pi |Ft (i = 1, 2) are
restricted measures of Pi w.r.t. the σ-algebra Ft . A decision with the given reliability constraints
α1 and α2 can be made when the cumulative log-likelihood ratio St for the first time crosses one
of the thresholds before crossing the opposite one. I.e., the test decides D = 1 (D = 2) in case
it crosses L1 (L2 ) for the first time before crossing L2 (L1 ) where the thresholds are functions
of α1 and α2 . For continuous observation processes St is continuous and the thresholds are
exactly given by (7) and (8), see, e.g., [10, p. 148]. Therefore, the Wald test for continuous-time
observation processes is defined by
Tdec = inf{t ∈ R+ : St ∈
/ (L2 , L1 )}
(13)
with the decision output given by
Ddec
1 if S
Tdec ≥ L1
=
2 if ST ≤ L2 .
dec
(14)
B. Problem Statement
Consider now the black-box decision device as illustrated in Fig. 1 for which the stochastic
observation process Xt and the algorithm of the decision device are both unknown. Such a blackbox decision device is a sequential test δ for which the function (D, T) is unknown. We ask now
the question: Is it possible to determine whether such a black-box decision device is optimal in
the sense of Definition 1 based on many outcomes D and T of the device?
Having access to the decision outcomes and decision times it is impossible to verify optimality
in terms of Definition 1. In this regard consider that the value of the minimum mean decision
time is typically unknown since the observed process Xt and its statistics are often not known.
We thus introduce the following alternative definition of optimality, which is based on the idea
that optimal sequential decision-making needs to exploit the available information optimally.
January 8, 2018
DRAFT
9
Stochastic process
Decision device
Input
Decision output
Output
Decision time
Fig. 1. Black-box model of binary sequential decision-making: a decision device observes sequentially a stochastic process Xt
until it takes a decision D = 1 (D = 2) corresponding to the hypothesis H = 1 (H = 2) at a random decision time T.
Definition 2 (Optimality in terms of information). An optimal test δ ∗ = (D∗ , T∗ ) minimizes the
mutual information I(H; T|D), i.e.
I(H; T∗ |D∗ ) =
inf
I(H; T|D).
δ=(D,T)∈C(α1 ,α2 )
(15)
Later we will show that for continuous observation processes optimality in the sense of
Definition 1 implies optimality in the sense of Definition 2 but not vise versa. In this regard,
consider that (15) is invariant w.r.t. time delays Tdelay in the decisions, i.e., I(H; T∗ |D∗ ) =
I(H; T∗ + Tdelay |D∗ ), if Tdelay is statistically independent of H conditioned on D and T and if
additionally Tdelay satisfies that I(H; Tdelay |D∗ , T∗ + Tdelay ) = 0. Moreover, we will show that
for continuous observation processes optimal information usage implies that I(H; T∗ |D∗ ) = 0,
because a test achieving I(H; T|D) = 0 always exists and I(H; T|D) is nonnegative. For these reasons Definition 2 will allows us to formulate practical tests for optimality of sequential decisionmaking in black-box decision devices. In general, for the discrete-time setting I(H; T∗ |D∗ ) > 0,
as the information on the hypothesis does not arrive continuously but in chunks, which makes
it more difficult to test optimality in discrete-time settings.
III. O PTIMALITY C ONDITIONS FOR C ONTINUOUS O BSERVATION P ROCESSES
To understand the conditions on optimal sequential decision-making we will derive relations
between decision time distributions of optimal binary sequential probability ratio tests. In this section we consider optimal sequential probability ratio tests for continuous observation processes,
which are given by (Tdec , Ddec ) in (13) - (14). We call these relations decision time fluctuation
relations for their reminiscence to stopping time fluctuation relations in non-equilibrium statistical
physics, in particular stochastic thermodynamics [11], [12]. In order to derive these relations
January 8, 2018
DRAFT
10
we use a key property of the exponential of the cumulative log-likelihood ratio eSt defined in
(12), namely that it is a positive and uniformly integrable martingale process with respect to
the probability measure P2 and the filtration generated by the observation process [9]. An Ft adapted and integrable process is called a martingale w.r.t. Ft and a measure P if its expected
value at time t equals to its value at a previous time t̃, when the expected value is conditioned
on observations up to the time t̃. For eSt , Ft , and P2 this implies that
h
i
St
E e Ft̃ , H = 2 = eSt̃
(16)
P2 -almost surely and with t̃ < t. Integrability of eSt implies that E[eSt |H = 2] = 1 < ∞.
A. Decision Time Fluctuation Relation for Optimal Decision Devices
Theorem 1. We consider a binary sequential hypothesis testing problem with the hypotheses
H ∈ {1, 2}. Let P1 and P2 be two probability measures on the same filtered probability space
(Ω, F, {Ft }t≥0 ) corresponding to the hypothesis H = 1 and H = 2, respectively. We assume that
{Ft }t≥0 is right continuous. We consider that on F∞ = ∩t≥0 Ft , the probability measure P2 is
absolutely continuous with respect to P1 . Furthermore, we consider that the realization of the
process eSt =
dP1 |Ft
dP2 |Ft
is P2 almost surely continuous. Let Tdec and Ddec be as in (13) and (14)
with E[Tdec |H = i] < ∞ (i = 1, 2). We also assume that Tdec has a density function. Under
these assumptions the following holds
pTdec (t|H = 1, Ddec = 1) = pTdec (t|H = 2, Ddec = 1)
(17)
pTdec (t|H = 1, Ddec = 2) = pTdec (t|H = 2, Ddec = 2)
(18)
where pTdec (t|H, Ddec ) is the decision time distribution conditioned on the hypothesis H and the
decision output Ddec .
Proof. Let
Φ1 (t) = {ω ∈ Ω : Tdec (ω) ≤ t and Ddec (ω) = 1}
(19)
be the set of trajectories for which the decision time does not exceed t and the test decides for
Ddec = 1. The probability of the event Φ1 (t) with respect to the measures P1 or P2 is equal to
the cumulative distribution of the decision time Tdec conditioned on the hypothesis H = 1 or
January 8, 2018
DRAFT
11
H = 2, respectively, and conditioned on the decision outcome Ddec = 1. We find the following
identity between P1 (Φ1 (t)) and P2 (Φ1 (t)):
Z
P1 (Φ1 (t)) =
dP1 |Ft
(20)
eSt dP2 |Ft
(21)
eSTdec dP2 |Ft
(22)
dP2 |Ft
(23)
ω∈Φ1 (t)
Z
=
ω∈Φ1 (t)
Z
=
ω∈Φ1 (t)
L1
Z
=e
ω∈Φ1 (t)
= eL1 P2 (Φ1 (t))
(24)
where for (21) we have used the Radon-Nikodým theorem and the definition (12). For equality
(22) we have applied Doob’s optional sampling theorem [9], [13] to the uniformly integrable
P2 -martingale process eSt . For (23) we have used that eSt is a continuous process and achieves
the value eL1 at time Tdec .
The probability density functions of Tdec can be expressed in terms of the derivatives of the
cumulative distributions Pk (Φ1 (t)) (k = 1, 2)
d
P1 (Φ1 (t))
dt
d
= 1|H = 2) = P2 (Φ1 (t)).
dt
pTdec (t|H = 1, Ddec = 1)P (Ddec = 1|H = 1) =
(25)
pTdec (t|H = 2, Ddec = 1)P (Ddec
(26)
The ratio of the decision probabilities is
P (Ddec = 1|H = 1)
1 − α2
=
= eL1
P (Ddec = 1|H = 2)
α1
(27)
which follows from P (Ddec = 1|H = 1) = limt→∞ P1 (Φ1 (t)), P (Ddec = 1|H = 2) =
limt→∞ P2 (Φ1 (t)), Eq. (24), and from the assumption that the test terminates almost surely.
Taking the derivative of the left hand side (LHS) of (20) and the right hand side (RHS) of (24),
and using Eqs. (25) to (27), we prove Eq. (17). Analogously, Eq. (18) can be proved.
B. Decision Time Fluctuation Relation for Optimal Decision Devices with Unknown Hypotheses
In the following, we derive a second fluctuation relation, which we will apply to test optimality of sequential decision-making with less information than required for Theorem 1 (see
Section V-B2), but holds only if the maximal allowed error probabilities are symmetric, i.e.,
January 8, 2018
DRAFT
12
α1 = α2 , and the measures P1 and P2 on (Ω, F, {Ft }t≥0 ) are related by a measurable involution
Θ. We consider that
P2 = P1 ◦ Θ
(28)
with Θ : Ω → Ω a measurable involution, i.e., Θ is invertible with inverse Θ−1 = Θ and with
Θ(Φ) ∈ F for all Φ ∈ F.
Theorem 2. Under the same conditions as in Theorem 1, with the additional assumption that
P2 = P1 ◦ Θ with Θ a measurable involution, and with the additional assumption that the
maximal allowed error probabilities fulfill α1 = α2 , the following holds
pTdec (t|H = 1, Ddec = 1) = pTdec (t|H = 1, Ddec = 2)
(29)
pTdec (t|H = 2, Ddec = 1) = pTdec (t|H = 2, Ddec = 2).
(30)
Furthermore, it holds that
pTdec (t|Ddec = 1) = pTdec (t|Ddec = 2).
(31)
The proof of Theorem 2 is given in Appendix A.
A special case of the result in Theorem 2 has been found in the context of nonequilibrium
statistical physics [11], [12]: the two hypotheses correspond to a forward and a backward
direction of the arrow of time, and Θ corresponds to the time-reversal operation. The RadonNikodým derivative St is then the stochastic entropy production, and the decision time Tdec is
its two-boundary first-passage time to cross one of two given symmetric values. Moreover, in
communication theory such a symmetry has been found to show that the probability of cycle slips
to the positive/negative boundary in phase-locked loops used for synchronization is independent
of time [14, Eq. (74)].
C. Information Theoretic Implications of Optimal Sequential Decision-Making
Theorem 1 and Theorem 2 express statistical dependencies of different random quantities
involved in optimal sequential decision-making. Based on Theorem 1 we will now show the
following.
Corollary 1. Under the same conditions as in Theorem 1, the following equality for mutual
information holds
I(H; Tdec |Ddec ) = 0
January 8, 2018
(32)
DRAFT
13
i.e., I(H; Tdec , Ddec ) = I(H; Ddec ).
Proof. By the chain rule for mutual information, I(H; Tdec |Ddec ) can be expressed by
I(H; Tdec , Ddec ) = I(H; Ddec ) + I(H; Tdec |Ddec ).
(33)
The second term on the RHS of (33) is given by
pTdec (Tdec |Ddec , H)
I(H; Tdec |Ddec ) = E log2
(34)
pTdec (Tdec |Ddec )
pTdec (Tdec |Ddec , H)
(35)
= E log2
pTdec ,H (Tdec , H = 1|Ddec ) + pTdec ,H (Tdec , H = 2|Ddec )
pTdec (Tdec |Ddec , H)
= E log2
pT (Tdec |Ddec , H = 1)P (H = 1|Ddec ) + pTdec (Tdec |Ddec , H = 2)P (H = 2|Ddec )
dec
pTdec (Tdec |Ddec , H)
= E log2
pTdec (Tdec |Ddec , H = 1)P (H = 1|Ddec ) + pTdec (Tdec |Ddec , H = 1)P (H = 2|Ddec )
(36)
pTdec (Tdec |Ddec , H)
= E log2
(37)
pTdec (Tdec |Ddec , H = 1) (P (H = 1|Ddec ) + P (H = 2|Ddec ))
pTdec (Tdec |Ddec , H)
(38)
= E log2
pTdec (Tdec |Ddec , H = 1)
pTdec (Tdec |Ddec , H = 1)
pTdec (Tdec |Ddec , H = 2)
= P (H = 1)E log2
+ P (H = 2)E log2
pTdec (Tdec |Ddec , H = 1)
pTdec (Tdec |Ddec , H = 1)
=0
(39)
where for (36) and for (39) we have used Theorem 1.
Corollary 1 states that in case of optimal sequential decision-making the decision time Tdec
does not give any additional information on the hypothesis H beyond the decision outcome Ddec .
In this regard, consider that the first term on the RHS of (33) is the mutual information the
decision outcome of the test Ddec gives about the actual hypothesis H. The second term on the
RHS of (33) I(H; Tdec |Ddec ) is the additional information the termination time Tdec gives on
the hypothesis H beyond the information given by the decision Ddec . Thus, we have proved that
for continuous observation processes optimal sequential decision-making w.r.t. Definition 2 is
achievable and that I(H; T∗ |D∗ ) = 0. Note that since sequential probability ratio tests (Ddec , Tdec )
have been shown to be optimal in the sense of Definition 1, Corollary 1 implies that optimality
in the sense of Definition 1 also implies optimality in the sense of Definition 2.
In case the assumptions of Theorem 2 are satisfied additionally, the following two corollaries
hold.
January 8, 2018
DRAFT
14
Corollary 2. Under the same conditions as in Theorem 2, the following equality holds
I(Ddec ; Tdec ) = 0.
(40)
Proof. It holds that
pTdec (Tdec |Ddec )
I(Ddec ; Tdec ) = E log
(41)
pTdec (Tdec )
pTdec (Tdec |Ddec )
= E log
pTdec (Tdec |Ddec = 1)P (Ddec = 1) + pTdec (Tdec |Ddec = 2)P (Ddec = 2)
pTdec (Tdec |Ddec )
(42)
= E log
pTdec (Tdec |Ddec = 1)
=0
(43)
where we have used (31) in (42) and (43).
Corollary 3. Under the same conditions as in Theorem 2, and with the additional assumption
that P (H = 1) = P (H = 2), the following equality holds
I(H; Tdec ) = 0.
(44)
The proof of Corollary 3 is given in Appendix B.
IV. O PTIMALITY C ONDITIONS FOR D ISCRETE -T IME O BSERVATION P ROCESSES
In the following, we extend the analysis on optimal information usage in sequential decisionmaking to the discrete-time setting. In discrete time the optimal test in the sense of Definition 1
is given by TWald and DWald defined in (9) and (10). Extending our results to a discretetime setting is relevant for discrete-time systems. Moreover, in usual experimental setups a
continuous-time system is sampled yielding a discrete-time representation. The extension from
continuous processes to discrete-time processes is not straightforward, as one key characteristic
in the continuous-time setting is the fact that the test terminates with a cumulative log-likelihood
ratio exactly hitting one of the thresholds. This property of continuous processes does not hold
true in the discrete-time setting, where the mean value of the cumulative log-likelihood ratio at
the decision time slightly overshoots the thresholds.
The thresholds L1 and L2 depend on the maximum allowed error probabilities α1 and α2 ,
cf. (4). Due to the fact that in the discrete-time setting the trajectory of the accumulated loglikelihood ratios Sk in (6) does not necessarily hit one of the thresholds the determination of the
January 8, 2018
DRAFT
15
optimal thresholds L1 and L2 in terms of α1 and α2 are rather involved, see [2]. L1 and L2 are
chosen such that the allowed error probabilities given in (4) are obeyed with equality.
In the following, we study the statistical dependencies between the hypothesis H, the decision
DWald , and the number of observations TWald the sequential probability ratio test given by (9)
and (10) uses to make decisions.
The necessary condition for optimal decision devices given in Theorem 1 for the continuoustime setting does not carry over to the discrete-time settings as we will discuss in the following.
This can be understood from applying the steps in the proof of Theorem 1 in (20) to (24) to
the discrete-time setting. In the discrete-time case with t ∈ Z+ the measure P1 (Φ1 (t)) of the
discrete-time version of the set Φ1 (t) in (19) can be expressed by
Z
P1 (Φ1 (t)) =
dP1 |Ft
(45)
ω∈Φ1 (t)
Z
=
eSt dP2 |Ft
(46)
eSTWald dP2 |Ft
(47)
ω∈Φ1 (t)
Z
=
ω∈Φ1 (t)
R
=
ω∈Φ1 (t)
eSTWald dP2 |Ft Z
R
ω∈Φ1 (t)
dP2 |Ft
dP2 |Ft
(48)
ω∈Φ1 (t)
= E eSTWald |H = 2, ω ∈ Φ1 (t) P2 (Φ1 (t))
= eL1 E eM1 |H = 2, ω ∈ Φ1 (t) P2 (Φ1 (t))
(49)
(50)
where M1 > 0 in (50) is the overshoot beyond the threshold L1 . Since in general the distribution
of the overshoot M1 = STWald − L1 depends on the time t the fluctuation relations (17) and (18)
do not extend to the discrete-time case.
Translating (25) and (26) to the discrete-time setting yields
pTdec (t|H = 1, Ddec = 1)P (Ddec = 1|H = 1) = P1 (Φ1 (t + 1)) − P1 (Φ1 (t))
(51)
pTdec (t|H = 2, Ddec = 1)P (Ddec = 1|H = 2) = P2 (Φ1 (t + 1)) − P2 (Φ1 (t))
(52)
for t ≥ 1.
Taking the difference between the values of P1 (Φ1 (t)) at two consecutive time instants we
get
P1 (Φ1 (t + 1)) − P1 (Φ1 (t)) = eL1 E eM1 |H = 2, ω ∈ Φ1 (t + 1) P2 (Φ1 (t + 1))
− eL1 E eM1 |H = 2, ω ∈ Φ1 (t) P2 (Φ1 (t)).
January 8, 2018
(53)
DRAFT
16
In case E eM1 |H = 2, ω ∈ Φ1 (t) = K is time independent, we get from (51) and (52)
1 − α2
P (DWald = 1|H = 1)
=
= eL1 K
P (DWald = 1|H = 2)
α1
(54)
where we have used the assumption that the test terminates almost surely, and we get the
fluctuation relations corresponding to Theorem 1 for decision times TWald in the discrete-time
case.
The constraint that E eM1 |H = 2, ω ∈ Φ1 (t) is time independent is approximately fulfilled
in case the size of the thresholds L1 and L2 is large in comparison to the average increase of
the log-likelihood ratio ∆n per observation sample, see (11). This can be seen as taking the
continuum limit of the decision making process. In this regard, consider that the distribution
of the overshoot M1 is time independent if the distribution of the distance LDWald − STWald −1 , at
the time instant before a decision is taken, is time independent, and if the distribution of the
increment ∆TWald is independent of time. The distribution of LDWald − STWald −1 is time independent
if the initial value of the cumulative log-likelihood has no significant influence anymore on the
distribution of STWald −1 when conditioning on termination at time instant TWald . This is satisfied in
case TWald is sufficiently large, which holds if the thresholds L1 and L2 are large in comparison
to the average of the increments of the log-likelihood ratio ∆n . This is illustrated for an example
based on numerical simulations in Section VI-A4.
In the following, we assume that the condition
E eM1 |H = 2, ω ∈ Φ1 (t) = K
(55)
is fulfilled. For many practical applications this condition is approximately fulfilled, see the
numerical experiments in Section VI.
The results on optimal information usage carry over from continuous time to discrete time
given that (55) holds.
Theorem 3. We consider a binary sequential hypothesis testing problem with the hypotheses
H ∈ {1, 2}. Let {pXk+1 (·|H = 1)} and {pXk+1 (·|H = 2)} be two sequences of probability density
1
1
functions of the sequence of real valued observations {X1 , X2 , . . .} in case hypothesis H = 1
and H = 2 are true, respectively, and with k ∈ Z+ . Let TWald and DWald be as in (9) and (10)
January 8, 2018
DRAFT
17
with E[TWald |H = i] < ∞ (i = 1, 2). Under these assumptions and the assumption that (55) is
fulfilled it holds that
P (TWald = k|H = 2, DWald = 1) = P (TWald = k|H = 1, DWald = 1)
(56)
P (TWald = k|H = 2, DWald = 2) = P (TWald = k|H = 1, DWald = 2)
(57)
for all k ∈ Z+ .
Theorem 3 implies optimal usage of information with respect to Definition 2 for the discretetime setting yielding the following corollary.
Corollary 4. Under the same conditions as in Theorem 3, the following equality for mutual
information holds
I(H; TWald , DWald ) = I(H; DWald )
(58)
I(H; TWald |DWald ) = 0.
(59)
implying that
The proof follows along the same line as the proof of Corollary 1, but this time based on
Theorem 3.
Analogously, Theorem 2 carries over to the discrete-time case.
Theorem 4. Under the same conditions as in Theorem 3, with the additional assumption that
pXk+1 (·|H = 2) = pXk+1 ◦Θ (·|H = 1) for k ∈ Z+ , where Θ is a measurable involution, and the
1
1
additional assumption that the maximal allowed error probabilities fulfill α1 = α2 , the following
holds
P (TWald = k|H = 1, DWald = 1) = P (TWald = k|H = 1, DWald = 2)
(60)
P (TWald = k|H = 2, DWald = 1) = P (TWald = k|H = 2, DWald = 2)
(61)
for all k ∈ Z+ . Furthermore, it holds that
P (TWald = k|DWald = 1) = P (TWald = k|DWald = 2) for all k ∈ Z+ .
(62)
Theorem 4 can be proved by carrying over the proof of Theorem 2 to the discrete-time case
and additionally using a modification of the application of Doob’s optional sampling theorem
similar to (48) to (50) leading to the additional assumption that (55) is fulfilled.
January 8, 2018
DRAFT
18
A special case of Theorem 4 was shown in [1] for the case of i.i.d. observation processes and
low error probabilities α1 = α2 .
Using Theorem 4 also Corollary 2 and Corollary 3 carry over to the discrete-time case.
Corollary 5. Under the same conditions as in Theorem 4, the following equality holds
I(DWald ; TWald ) = 0.
(63)
Corollary 6. Under the same conditions as in Theorem 4, and with the additional assumption
that P (H = 1) = P (H = 2), the following equality holds
I(H; TWald ) = 0.
(64)
The proofs of Corollary 5 and Corollary 6 follow along the lines of the proves of Corollary 2
and Corollary 3.
V. T ESTS FOR O PTIMALITY OF S EQUENTIAL D ECISION -M AKING
For the case of continuous observation processes Theorem 1 and Corollary 1 hold for binary
sequential probability ratio tests which are optimal in the sense of Definition 1. In case of
additional symmetry conditions, Theorem 2, Corollary 2, and Corollary 3 hold as well. Under
the reasonable assumption that the joint statistics of (H, T, D) have a unique solution over all
tests fulfilling (5), these theorems and corollaries are necessary conditions for optimal sequential
decision-making in the sense of Definition 1. Likewise, for discrete-time observation processes
which fulfill the condition given by (55) Theorem 3 and Corollary 4 give necessary conditions
for optimal sequential decision-making. In case additional symmetry conditions are fulfilled also
Theorem 4, Corollary 5, and Corollary 6 hold. Based on these theorems and corollaries we
formulate tests to test optimality of sequential decision-making in black-box decision devices
and present algorithms to measure the distance to optimality of the decision process in the
black-box decision device.
A. Continuous-Observation Processes
1) Testing Optimality and Measuring the Distance to Optimality in Case of Known Hypotheses: We sample m independent realizations {hi , ti , di }i=1,...,m of the joint random variables
(H, T, D) given by subsequent decisions, where H corresponds to the random variable describing
the actual hypothesis and T and D are the outputs, decision time and decision variable, of the
January 8, 2018
DRAFT
19
black-box decision device. In case the observation window of the experimentalist is not sufficiently large such that for certain samples the black box has not decided yet, the experimentalist
can discard those samples.
We first state a statistical test which can reject, with a certain statistical significance, the null
hypothesis that the given black-box device is optimal in the sense of Definition 2 and, thus, also in
the sense of Definition 1. We create from the whole set of realizations four subsets of decision
times Ar,s = {ti , i ∈ {1, 2, ..., m} : (hi , di ) = (r, s)} with (r, s) ∈ {(1, 1), (1, 2), (2, 1), (2, 2)}.
Under the null hypothesis, Theorem 1 implies that the subsets A1,1 and A2,1 contain independent
realizations of decision times from the same distribution and, analogously, A1,2 and A2,2 contain
independent realizations of decision times from the same distribution. Whether two sets of
independent realizations are sampled from the same continuous distribution can be tested with a
certain significance using the two-sample Kolmogorov-Smirnov test [15, pp. 663-665]. Note that
we do not require knowledge on the statistics P1 and P2 of the observation process Xt , which
makes our test for optimality of decision devices very useful for practical applications where in
many situations such statistics are unknown. Notice that because the observation process Xt may
take values in a high-dimensional space it can be difficult to get a good estimate of its statistics.
A quantity for the distance of the sequential decision-making process of the black-box decision
device with respect to the optimal sequential decision process in the sense of Definition 2 is
ˆ T|D) of the mutual information I(H; T|D). The estimate
given by the empirical estimate I(H;
ˆ T|D) can be gained from empirical estimates of entropy and differential entropy, see [16]
I(H;
and [17]. Note that with the chain rule for mutual information it holds that
I(H; T|D) = I(H; D, T) − I(H; D).
(65)
The first term on the RHS of (65) is the complete mutual information that the output of the
black-box decision device, (D, T), gives on the hypothesis H. The second term on the RHS of
(65) is the mutual information between the decision D and the hypothesis H, which in case of
optimal sequential decision-making equals the complete mutual information I(H; D, T). Hence,
with (65) I(H; T|D) measures the information the black-box device discards in case of nonˆ T|D) provides a measure for how much the decision
optimal decision-making. Therefore, I(H;
statistics of a certain black-box device diverge from the optimal solution, or less formally stated,
how close to optimality a decision device behaves.
January 8, 2018
DRAFT
20
2) Testing Optimality in Case of Unknown Hypotheses: If the statistics of the observation
process Xt fulfill the involution condition (28) and if the constraints on the error probabilities
α1 and α2 are equal implying symmetric thresholds L1 = −L2 = L, then based on Theorem 2
we formulate a test which is able to reject optimality in the sense of Definition 2 and, thus, also
in the sense of Definition 1. Different to the test formulated in Section V-A1 we do not require
knowledge of the actual realizations of the hypothesis H, which in certain situations is important
for practical application.
We sample m independent realizations {ti , di }i=1,...,m of the joint random variables (T, D),
where T and D are the outputs, decision variable and decision time, of the black-box decision
device. As in the case of known hypotheses samples for which the black-box decision device
has not terminated yet can be discarded. Under the above assumptions, we state a statistical
test which can reject, with a certain statistical significance, the null hypothesis that the given
black-box device is optimal. We create from the whole set of realizations two subsets of decision
times Ar = {ti , i ∈ {1, 2, ..., m} : di = r} with r ∈ {1, 2}. Under the current null hypothesis,
Theorem 2 implies that the subsets A1 and A2 contain independent realizations of decision
times from the same distribution. We can again use a two-sample Kolmogorov-Smirnov test [15,
pp. 663-665] to reject the null hypothesis with a certain significance. Corollaries 2 and 3 provide
alternative means to test optimality of sequential decision-making.
Quantifying the degree of optimality using the mutual informations I(D; T) or I(H; T) provides
in general no clear interpretation. Hence, in order to quantify the divergence of the black-box
device from optimal sequential decision-making we can use I(H; T|D) based on Corollary 1.
B. Discrete-Time Observation Processes
Analogously to the case of continuous observation processes we formulate tests for optimality
of sequential decision-making in discrete time and we also present algorithms to measure the
distance to optimality of black-box decision devices. We use Theorems 3, Theorem 4 and
Corollary 4.
1) Testing Optimality and Measuring the Distance to Optimality in Case of Known Hypotheses: We sample m independent realizations {hi , ti , di }i=1,...,m of the joint random variables
(H, T, D) given by subsequent decisions, where H corresponds to the random variable describing
the actual hypothesis and T and D are the outputs, decision time and the decision variable, of
January 8, 2018
DRAFT
21
the black-box decision device. As before we discard samples for which the black-box decision
device has not decided yet.
The algorithm to test optimality of a black-box decision device is analogous to the case of continuous observation processes. We construct from the whole set of realizations {hi , ti , di }i=1,...,m
four
sets
of
decision
times
Ar,s
=
{ti , i ∈ {1, 2, ..., m} : (hi , di ) = (r, s)}
with
(r, s) ∈ {(1, 1), (1, 2), (2, 1), (2, 2)}. Theorem 3 implies that the subsets A1,1 and A2,1 contain
independent realizations of decision times from the same distribution and, analogously, A1,2 and
A2,2 contain independent realizations of decision times from the same distribution. Whether two
sets of independent realizations are sampled from the same discrete distribution can be tested
with a certain significance using the two-sample χ2 -test [18, p. 253, Problem 3].
A quantity for the distance to optimality of a black-box decision device with respect to the
optimal sequential decision process in the sense of Definition 2 is in discrete time given by the
ˆ T|D) of the mutual information I(H; T|D), see , cf. Corollary 4.
empirical estimate I(H;
2) Testing Optimality in Case of Unknown Hypotheses: As in the continuous case testing
optimality of a black-box decision device can be done even in case of unknown hypothesis in
case certain additional conditions are fulfilled. Namely, the statistics of the observation process
Xt have to fulfill the involution condition (28) and the constraints on the error probabilities α1 and
α2 have to be equal, implying symmetric thresholds L1 = −L2 = L. Then based on Theorem 4
we can formulate the following test. We sample m independent realizations {ti , di }i=1,...,m of the
joint random variables (T, D), where T and D are the decision time and decision variable of the
black-box decision device. We create from the whole set of realizations two subsets of decision
times Ak = {ti , i ∈ {1, 2, ..., m} : di = k} with k ∈ {1, 2}. Theorem 4 implies that the subsets
A1 and A2 contain independent realizations of decision times from the same distribution in case
the black-box decision device is optimal. We can again use a two-sample χ2 -test [18, p. 253,
Problem 3] to test whether the two subsets A1 and A2 are sampled from the same distribution.
Corollary 5 and Corollary 6 provide alternatives to test optimality of sequential decision-making.
VI. T ESTING O PTIMALITY IN N UMERICAL E XPERIMENTS
In this section we apply our algorithms to test optimality of binary sequential decision-making
of black-box devices and to measure the degree of divergence from optimality. We consider a
class of decision devices which for certain parameter values are optimal, and we verify whether
our algorithms are able to detect the parameters for which the decision devices are optimal. In
January 8, 2018
DRAFT
22
this section we distinguish again continuous and discrete observation processes. However, here
we will start with discrete-time processes which allow for simpler numerical study.
To distinguish theoretical quantities from empirical estimates we denote by P̂ and Iˆ the
empirical estimates of the probabilities P and mutual informations I. Furthermore, we write
Ê [·] for the empirical estimate of the expectation E [·].
A. Discrete-time observation processes
1) Testing optimality in case of known hypotheses: We consider an observation sequence
X = (X1 , X2 , . . . , Xk ) where the Xn (where n ∈ [1, k]) are i.i.d. random variables drawn from
one of two possible probability distributions corresponding to the two hypotheses H ∈ {1, 2},
i.e.,
k
Y
pXk1 xk1 |H =
pX (xn |H) .
(66)
n=1
In our example the densities pX (·|H) are Gaussian with mean µi and variance σi2 with i ∈ {1, 2}
corresponding to the two hypotheses H = i. In the special case where µ1 = −µ2 and σ1 = σ2
the involution property (28) holds.
We consider a class of decision models representing the black-box decision devices. These
decision models use the Wald sequential probability ratio test based on a model of the external
world which may be incorrect. Each decision model computes the cumulative log-likelihood
ratio of two Gaussian distributions with mean µ̃i and variance σ̃i2 (with i ∈ {1, 2}), i.e.,
k
X
pX (Xn |H = 1)
log
S̃k =
pX (Xn |H = 2)
n=1
k
σ̃2 X (Xn − µ̃2 )2 (Xn − µ̃1 )2
= k log
+
−
.
σ̃1 n=1
2σ̃22
2σ̃12
(67)
The decision time of the model is
T = min{k ∈ N : S̃k ∈
/ (L2 , L1 )}
(68)
and the decision variable is given by
1 if S̃ ≥ L
T
1
D=
2 if S̃T ≤ L2
(69)
with the two thresholds L1 > 0 and L2 < 0. If µ̃i = µi and σ̃i = σi then the black-box device
uses the correct model of the external world and makes optimal sequential decisions in the sense
January 8, 2018
DRAFT
23
0.2
0.3
0.25
0.15
0.2
0.1
0.15
0.1
0.05
0
0
0.05
5
10
15
20
25
30
35
40
0
0
5
10
15
20
25
30
35
40
(a) Optimal decision-making: black-box decision device uses
(b) Sub-optimal decision-making: black-box decision device
the correct model of the external world
uses the wrong model of the external world
Fig. 2. Illustration of Theorem 3 using the observation model given by (66) and the decision model given by (67) to (69). The
distributions of the observation process corresponding to the two hypotheses are Gaussian with parameters (µ1 , σ1 ) = (0, 5)
and (µ2 , σ2 ) = (1, 10), respectively. The decision model has threshold values L1 = 4 and L2 = −2 and parameters: (a)
(µ̃1 , σ̃1 ) = (µ1 , σ1 ) and (µ̃2 , σ̃2 ) = (µ2 , σ2 ), (b) (µ̃1 , σ̃1 ) = (µ1 , σ1 ) and (µ̃2 , σ̃2 ) = (5, σ2 ). The empirical error probabilities
are in (a) α1 = 0.041 and α2 = 0.0133 and (b) α1 = 0.0335 and α2 = 0.0506. Distributions are estimated using 1e + 6
simulation runs.
of minimizing the decision time (see Definition 1) since T = TWald and D = DWald . Corollary 4
implies that for these parameter values the black-box device makes also optimal sequential
decisions in the sense of information usage (see Definition 2). If additionally L1 = −L2 , then
α1 = α2 = α.
We now study the decision time distributions to illustrate Theorem 3 using numerical simulations. In Fig. 2 we present the estimated decision time distributions for optimal and suboptimal sequential decision-making. Consistent with Theorem 3 the estimates of the distributions
P̂ (T = k|H = 2, D = a) and P̂ (T = k|H = 1, D = a) (a ∈ {1, 2}) overlap if the black-box
decision device performs the Wald test and if condition (55) is approximately fulfilled as shown
in Fig. 2(a). If the black-box decision device is suboptimal, as is the case in Fig. 2(b), then
these two distributions are different. Moreover, since (55) is only approximately fulfilled, the
theoretical distributions P (T = k|H = 2, D = a) and P (T = k|H = 1, D = a) (a ∈ {1, 2})
corresponding to the estimates shown in Fig. 2(a) are also different. This example illustrates the
value of Theorem 3 to quantify optimality for practical purposes in discrete time.
In Fig. 3 we use the statistical test for optimality described in Section V-B1. We plot the
January 8, 2018
DRAFT
24
0.5
0.5
0.4
0.4
0.3
0.3
0.2
0.2
0.1
0.1
0
-4
-3
-2
-1
0
1
2
3
4
0
-4
(a) Two sample χ2 -test of (56) for D = 1
-3
-2
-1
0
1
2
3
4
(b) Two sample χ2 -test of (57) for D = 2
Fig. 3. Illustration of testing optimality for discrete-time observations and for known hypotheses as described in Section V-B1.
Numerical results presented are for the observation model given by (66) and the decision model of the black box given by
(67) to (69). The observation process has parameters σ1 = 5, (µ2 , σ2 ) = (1, 10) and the values of µ1 are given in the
legend. The decision model of the black-box decision device has threshold values L1 = 4 and L2 = −2 and parameters
(µ̃1 , σ̃1 ) = (µ1 , σ1 ), σ̃2 = σ2 and with µ̃2 as given by the abscissa. We plot the p-values for the null hypothesis that (a)
pT (T|D = 1, H = 1) = pT (T|D = 1, H = 2) (b) pT (T|D = 2, H = 1) = pT (T|D = 2, H = 2). The estimates of the p-values
are average values over 1e + 4 two-sample χ2 -tests; each two-sample χ2 -tests evaluates a p-value over a population of 1e + 5
outcomes of the black-box decision device. We took P (H = 1) = P (H = 2) = 1/2, and a maximum observation window of
10 observations, i.e., all outcomes with more than 10 observations are discarded.
0.15
0.001
0.1
0.0001
0.05
1e-05
-4
-3
-2
-1
0
1
2
3
(a) Divergence to optimality in information usage
4
0
-4
-3
-2
-1
0
1
2
3
4
(b) Divergence to optimality in average decision times
Fig. 4. Estimating the divergence to optimality in the sense of Definitions 1 and 2, using the observation model given by (66)
and the decision model of the black box given by (67) to (69). The parameters of the observation process and of the decision
model are the same as in Fig. 3. Fig. 4(b) shows the estimate of the average decision time of the black-box decision device
divided by the estimate of the average decision time of a Wald test (µ2 = µ̃2 ), with the same error probabilities as achieved by
the black-box decision device, minus one; therefore each Wald test has different values of the thresholds L1 and L2 depending
on µ̃2 . In Fig. 4(a) each sample point is calculated using 1e + 9 simulation runs, and in Fig. 4(b) using 1e + 8 simulation runs.
We took P (H = 1) = P (H = 2) = 1/2.
January 8, 2018
DRAFT
25
2
2
test
test
corresponding to, respectively, a two-sample χ2 -test
and pχD=2
estimates of the p-values pχD=1
of the subsets A1,1 and A2,1 , see Fig. 3(a), and a two-sample χ2 -test of the subsets A1,2 and A2,2 ,
see Fig. 3(b). These p-values denote the probability to falsely reject the null hypothesis that the
samples in the two data sets are drawn from the same decision time distribution. Therefore, for
example in the case of µ1 = −2 and D = 1 we can safely reject the null hypothesis for values
of µ˜2 > 3 since the p-value is small. For values of µ˜2 ∈ [−4, 3] we need more data to safely
reject the hypothesis that the test is optimal.
2) Measuring divergence to optimality of black-box decision devices: With the same example
as in Fig. 3 we illustrate how to use Corollary 4 to estimate the divergence of a black-box decision
device to the optimal case given by Definition 2. Note that in the example of Fig. 3 condition (55)
is only approximately fulfilled, and therefore we only expect (59) to be approximately fulfilled.
In Fig. 4(a) we present the numerical estimates of I (H; T|, D). In accordance with Corollary 4,
if the test is optimal, i.e., the black-box decision device uses a Wald test, than the estimate of the
mutual information I (H; T|, D) is minimal and approaches zero. In the example of Fig. 4(a) this
happens at µ̃2 = 1. For this case also the mean decision time is minimized as shown in Fig. 4(b).
Note that Corollary 4 is not a sufficient condition to test optimality with respect to Definition 1,
i.e., to test whether the black-box decision device achieves the minimum mean decision time, as
is illustrated by Fig. 4(a) where we observe a second minimum for the estimate of I (H; T|, D).
However, for this second minimum the black-box decision device is optimal with respect to
Definition 2, which is not related to a minimum mean decision time as illustrated in Fig. 4(b).
Note that the estimation of I (H; T|, D) in Fig. 4(a) requires only knowledge of the output of the
decision device whereas the estimation of the minimum mean decision time E [TWald ] requires
knowledge on the statistics of the observation process, which in practical applications is often
unavailable.
3) Testing optimality in case of unknown hypotheses: In this section now we consider testing
optimality in case of unknown hypotheses based on Theorem 4. However, the example given by
(66) to (69) is not suitable to discuss Theorem 4. The reason is that the cumulative log-likelihood
ratio process S̃k becomes a drift-diffusion process in the continuous limit independent of the
choice of µ̃i and σ̃i , for which it is known that the two-boundary first-passage time distribution
with symmetric thresholds satisfies the fluctuation relation [11]. Therefore, the estimates of the
distributions P̂ (T = k|H = a, D = 1) and P̂ (T = k|H = a, D = 2) (a ∈ {1, 2}) always overlap
(data not shown).
January 8, 2018
DRAFT
26
0.02
0.05
0.04
0.015
0.03
0.01
0.02
0.005
0.01
0
0
100
50
150
200
0
0
50
100
150
200
(a) Optimal decision-making: black-box decision device uses
(b) Sub-optimal decision-making: black-box decision device
the correct model of the external world
uses the wrong model of the external world
Fig. 5. Illustration of Theorem 4 using the observation model given by (70) and the decision model given by (71), (68), and
(69). The distributions of the observation process corresponding to the two hypotheses are with parameters v1 = −v2 = 1,
w1 = w2 = −1, σ1 = σ2 = 5, respectively. The decision model has threshold values L1 = 4 and L2 = −4 and uses the
parameters: (a) (ṽ1 , w̃1 , σ̃1 ) = (v1 , w1 , σ1 ) and (ṽ2 , w̃2 , σ̃2 ) = (v2 , w2 , σ2 ), (b) (ṽ1 , w̃1 , σ̃1 ) = (v1 , w1 , σ1 ) and (ṽ2 , w̃2 , σ̃2 ) =
(v2 , −0.5, σ2 ). The empirical error probabilities are in (a) α1 = 0.014 and α2 = 0.014 and (b) α1 = 0.0092 and α2 = 0.6932.
The distributions are estimated using 1e + 7 simulation runs.
Therefore, we choose a different example to illustrate the value of Theorem 4. We consider
Markovian observation processes X = (X1 , X2 , . . . , Xk ) drawn from one of two probability
distributions
k
Y
pXk1 xk1 |H = h =
pX2 (xn |H = h, X1 = xn−1 )
(70)
n=1
with X0 = 0 and h ∈ {1, 2}. In our example the densities pX2 (·|H = h, X1 = xn−1 ) are Gaussian
with mean µh (X1 ) = vh + (wh + 1) X1 and variance σh2 with h ∈ {1, 2}, corresponding to the
two hypotheses H = h. If v1 = −v2 , w1 = w2 and σ1 = σ2 , then the involution property (28)
holds, such that Theorem 4 can be applied.
We consider again a class of black-box decision devices which use the Wald sequential
probability ratio test based on its model of the external world. The black-box decision devices
compute the cumulative log-likelihood ratio based on parameters ṽh , w̃h and σ̃h2 (with h ∈ {1, 2}),
i.e.,
S̃k =
k
X
n=1
January 8, 2018
log
pX2 |H,X1 (Xn |H = 1, Xn−1 )
pX2 |H,X1 (Xn |H = 2, Xn−1 )
DRAFT
27
k
σ̃2 X
+
= k log
σ̃1 n=1
(Xn − Xn−1 − ṽ2 − w̃2 Xn−1 )2 (Xn − Xn−1 − ṽ1 − w̃1 Xn−1 )2
−
2σ̃22
2σ̃12
.
(71)
The decision time T and the decision variable D are still given by (68) and (69) with the two
thresholds L1 > 0 and L2 < 0.
We now illustrate Theorem 4 using numerical simulations. In Fig. 5 we illustrate Theorem 4 for
optimal and suboptimal sequential decision-making with symmetric thresholds L1 = −L2 = 4
and for v1 = −v2 = 1, w1 = w2 = −1, σ1 = σ2 = 5 such that the involution property (28) holds.
Consistent with Theorem 4 the distributions P̂ (T = k|H = h, D = 1) and P̂ (T = k|H = h, D =
2) (h ∈ {1, 2}) overlap if the black-box decision device performs the Wald test, and is thus
optimal, and if (55) approximately applies. If the black-box decision device is suboptimal, as is
the case in Fig. 5(b), then these two distributions may be different. Note that since Theorem 3
also applies, all distributions in Fig. 5(a) overlap.
4) Overshoot problem: Due to the overshoot problem for discrete-time observation processes
in general the condition given by (55) is violated. Therefore, even in the case of the Wald
test I(H; TWald |DWald ) is in general larger than zero. In the present section, we discuss how
far I(H; TWald |DWald ) deviates from zero in practical situations. We also discuss how far the
condition imposed by (55) is fulfilled in our numerical examples.
For this purpose, we first estimate I(H; TWald |DWald ) as a function of the threshold values and
the number of test runs. In Fig. 6(a) and Fig. 6(b) it can be seen that for the Wald test the estimate
of I(H; TWald |DWald ) saturates with an increasing number of test runs at a non-zero value, and
therefore I(H; TWald |DWald ) > 0. This is an intrinsic aspect of sequential decision-making with
discrete observation processes and cannot be avoided. For small values of λ, which parameterizes
the threshold values, we see ripples in the mutual information. The minima occur approximately
at integer multiples of the most likely value of the increase of the cumulative log-likelihood ratio
Sk . For example, in Fig. 6(b) we illustrate how the estimate of the mutual information converges
to its asymptotic value for λ = 0.16 and λ = 0.36, corresponding to the first maximum and
the third minimum in Fig. 6(b). For large values of λ, i.e., when the distance of the thresholds
to the origin is large with respect to the typical increase of the cumulative log-likelihood ratio,
the mutual information I(H; TWald |DWald ) decreases as a function of λ. Even for large values
of λ, the estimate of the mutual information I(H; TWald |DWald ) does not converge to zero as a
January 8, 2018
DRAFT
28
function of the number of test runs but saturates, as the condition in (55) is not fulfilled. This
is illustrated in Fig. 6(b) for the values λ = 1 and λ = 3.
The fact that I(H; TWald |DWald ) is larger than zero indicates that here the condition given by
(55) is not fulfilled. To show this, in Fig. 6(c) we plot E eM1 |Φ1 (k), H = 2 as a function of
time k.
In conclusion, Corollary 4 is applicable to test optimality of the black-box decision device
if condition (55) is approximately fulfilled, which is the case when the threshold values of the
Wald test are far enough from the origin in comparison to the average increase of the cumulative
log-likelihood ratio per observation.
B. Continuous observation processes
In this section we illustrate Theorem 1 and Corollary 1 for continuous observation processes.
The decision model we study here is a drift diffusion process and has been used to describe
reaction-time distributions of two-choice decision tasks of human subjects [19], [20].
1) Observation model and decision model: We consider an observation process Xt which is
an Itô-process solving the stochastic differential equation
dXt = µi dt + σ dWt
(72)
where µi is a constant drift, with i ∈ {1, 2} corresponding to the two hypotheses H = i, where
σ is a constant noise amplitude, and where X0 = 0. Here Wt is a standard Wiener process. If
µ1 = −µ2 then the involution property (28) holds.
We consider black-box decision devices which compute the continuous version of the cumulative log-likelihood ratio in the Wald sequential probability ratio test, cf. (67), which is given
by
µ̃1 − µ̃2
µ̃22 − µ̃21
+ Xt
.
2
2σ̃
σ̃ 2
(73)
T = inf{t ∈ R : S̃t ∈
/ (L2 , L1 )}
(74)
S̃t = t
The decision time of the model is
and the decision variable is given by
1 if S̃ ≥ L
T
1
D=
2 if S̃T ≤ L2
January 8, 2018
(75)
DRAFT
29
0.01
1e+6
1e+7
1e+8
1e+9
1e+10
0.0001
0.01
0.001
0.0001
1e-05
1e-06
1e-06
1e-08
0
0.5
1
1.5
2
2.5
3
1e-07
10000
= 0.16
= 0.36
=1
=3
1e+06
1e+08
1e+10
ˆ TWald |DWald ) as a function of the distance
(a) Estimate I(H;
ˆ TWald |DWald ) over the
(b) Convergence of the estimate I(H;
parameter λ of the thresholds and for given values of the
number of test runs N and for given values of the distance
number of test runs N .
parameter λ of the thresholds.
2
1.5
1
0.5
0
0
5
10
15
20
(c) Evaluation of the condition (55) for the Wald test based on
plotting E eM1 |Φ1 (k), H = 2 over k (solid lines). Also the
corresponding P̂ (TWald = k|H = 2, DWald = 1) is shown
(dashed lines). It can be seen that E eM1 |Φ1 (k), H = 2 is
not independent of k such that (55) does not hold. Especially
for λ = 0.16, the value corresponding to the first maximum
in Fig. 6(a), E eM1 |Φ1 (k), H = 2 varies in the area with
the majority of the probability mass of the termination time
yielding a larger I(H; TWald |DWald ) than in the case of
λ = 0.36, the value corresponding to the third minimum in
Fig. 6(a), where E eM1 |Φ1 (k), H = 2 varies less over k.
Fig. 6. Illustration of the impact of discreteness of the observation process. As in Fig. 2, 3 and 4, we use the observation model
given by (66) with parameters (µ1 , σ1 ) = (0, 5) and (µ2 , σ2 ) = (1, 10). The decision model is the Wald test given by (67) to
(69) with parameters (µ̃1 , σ̃1 ) = (µ1 , σ1 ), (µ̃2 , σ̃2 ) = (µ2 , σ2 ), L1 = 4λ, L2 = −2λ.
January 8, 2018
DRAFT
30
with the two thresholds L1 > 0 and L2 < 0.
Note that the cumulative log-likelihood ratio, in the case the hypothesis H = i is true, is the
following Itô process
dS̃t = ai dt +
√
2b dWt
(76)
with
µ̃1 − µ̃2
µ̃1 + µ̃2
ai =
−
+ µi ,
σ̃ 2
2
2
1
µ̃1 − µ̃2
b=
σ
.
2
σ̃ 2
i ∈ {1, 2}
(77)
(78)
The sequential decision-making device (T, D) has error probabilities
α1 = P (D = 1|H = 2) =
α2 = P (D = 2|H = 1) =
1−e
1−e
e
a1 L2
b
a2 L2
b
(79)
a2 (L2 −L1 )
b
−e
1−e
a1 (L2 −L1 )
b
a1 (L2 −L1 )
b
.
(80)
The values of a1 , a2 , b, L1 and L2 are chosen such that α1 , α2 ∈ [0, 1/2]. If µ̃1 = µ1 , µ̃2 = µ2
and σ̃ = σ, then S̃t = St and (T, D) = (Tdec , Ddec ) with error probabilities as given by (7) and
(8). Notice that the stochastic differential equation of St is of the form [21]
2
µ1 − µ2
(−1)i+1 µ1 − µ2
dWt , i ∈ {1, 2}
dt +
dSt =
2
σ
σ
√ Rt
and e−St = − 2b 0 e−St0 dWt0 is a Pi -martingale process. For the special case of
(81)
µ̃1 + µ̃2 = µ1 + µ2
(82)
2 µ̃1 −µ̃2
we have S̃t = c St with c = σ̃σ
and hence (T, D) = (Tdec , Ddec ) with error probabiliµ1 −µ2
ties, α1 = (1 − eL2 /c )/(1 − e(L2 −L1 )/c ) and α2 = (eL2 /c − e(L2 −L1 )/c )/(1 − e(L2 −L1 )/c ). Thus, in
case (82) holds the black box decision device is optimal. Note that (82) implies that a1 = −a2 .
2) Illustration of Theorem 1: We consider now the special case of
|L2 | b/|a1 |,
|L2 | b/|a2 |
(83)
for which the expression of the distribution of decision times simplifies and allows analytical
evaluation.
January 8, 2018
DRAFT
31
In the following we illustrate Theorem 1. The Laplace transform of the distributions of decision
times are known for arbitrary values of L1 and L2 [22]. If the conditions in (83) are fulfilled,
we get
(|a1 |t−L1 )2
L1
+ o(1)
pT (t|D = 1, H = 1) = √
e− 4bt
2 πb t3/2
(|a2 |t−L1 )2
L1
pT (t|D = 1, H = 2) = √
e− 4bt
+ o(1)
2 πb t3/2
(|a |t+L )2
1
1
− 1 4bt 2
√
pT (t|D = 2, H = 1) =
e
|a1 |
1 − e− b L1 πb t3/2
1
1
−L21 /(bt)−|L2 |L1 /(bt)
+ o(1)
×
|L2 | − (L1 + |L2 |)e
2
2
(|a |t+L )2
1
1
− 2 4bt 2
√
pT (t|D = 2, H = 2) =
e
|a2 |
1 − e− b L1 πb t3/2
1
1
−L21 /(bt)−|L2 |L1 /(bt)
×
|L2 | − (L1 + |L2 |)e
+ o(1)
2
2
(84)
(85)
(86)
(87)
where o denotes the little-o notation taken with respect to |L2 | going to infinity. The fluctuation
relations (17) and (18) hold for a1 = −a2 , and thus for µ̃1 + µ̃2 = µ1 +µ2 . This is consistent with
Theorem 1 which states that the fluctuation relation must hold whenever (T, D) = (Tdec , Ddec ).
3) Optimality in mean decision times: With this example we can also verify optimality of
sequential hypothesis testing in the sense of Definition 1. The mean decision times are given by
L1
+ O |L2 |e|a1 |L2 /b
E [T|D = 1, H = 1] =
(88)
|a1 |
L1
+ O |L2 |e|a2 |L2 /b
E [T|D = 1, H = 2] =
(89)
|a2 |
e−(|a1 |/b)L1
1
|a1 |L2 /b
E [T|D = 2, H = 1] =
|L2 | − 2L1
+
O
|L
|e
(90)
2
|a1 |
1 − e−(|a1 |/b)L1
1
e−(|a2 |/b)L1
−a2 L2 /b
|L2 | − 2L1
+
O
|L
(91)
E [T|D = 2, H = 2] =
2 |e
−(|a
|/b)L
1
|a2 |
1−e 2
where O denotes the big-O notation. The corresponding values of the average decision times of
the Wald test yielding the same error probabilities α1 and α2 as (T, D) are
2
σ
1 − α2
E [Tdec |D = 1, H = 1] = E [Tdec |D = 1, H = 2] = 2
log
+ O |L2 |eL2 .
µ1 − µ2
α1
(92)
It can be shown that for L2 → −∞ we have E [T|D = 1, H = 1] − E [Tdec |D = 1, H = 1] ≥ 0,
which is consistent with the optimality of the sequential probability ratio test in the sense of
minimal decision times.
January 8, 2018
DRAFT
32
0.05
1
0.04
0.8
0.03
0.6
0.02
0.4
0.01
0.2
0
0
1
0.5
1.5
2
(a) Divergence to optimality in information usage; note that
0
0
0.5
1
2
1.5
(b) Divergence to optimality in average decision times
the black solid line and the green dotted line overlap.
1
0.1
0.01
0.001
0.0001
1e-05
1e-06
1000
10000
1e+05
1e+06 1e+07
number of runs
1e+08
1e+09
(c) Empirical estimate of the mutual information as a function
of the number of test runs
Fig. 7. Measuring the divergence to optimality in the sense of Definitions 1 and 2 using the continuous observation process (72)
and the decision-making model (73) - (75) . The parameters defining the observation process are µ1 = 0, µ2 = 1 and σ = 5
q
µ̃2
log α1
and the parameters defining the decision-making device are µ̃1 = 0, L1 = 4, α1 = 0.01, σ̃ = σ 2 2µ2µ̃−1 −
and µ̃2
µ̃1 −µ̃2 L1
as given on the abscissa. The range of µ̃2 plotted corresponds with σ̃ ≥ 0. (a): Theoretical value of the mutual information
I(H; N|D) as given by (94) for given values of the time resolution Tr in the legend. (b): Theoretical values of the mean decision
ˆ N|D) as a function of the number of test runs, for given values of
time as given by (88) - (92). (c): Empirical estimate I(H;
µ̃2 and for Tr = E [Tdec |H = 1]. The corresponding theoretical value of the mutual information is indicated by the horizontal
dashed lines. Note that we have generated variates of the random variables (T, H, D) according to the distributions (79) - (80),
(84) - (87), and P (H = 1) = P (H = 2) = 1/2; we have generated variates from the inverse Gaussian distribution with the
algorithm in [23].
January 8, 2018
DRAFT
33
4) Illustration of Corollary 1: We can also compute the mutual information in the limit
L2 → −∞, which is for P (H = 1) = P (H = 2) = 1/2 given by
I (H; T|D) =
1 + α1
log2 (1 + α1 )
2
Z ∞
(|a |t−L )2
(|a |t−L )2
(|a |t−L )2
L1
−3/2 − 1 4bt 1
− 2 4bt 1 + 1 4bt 1
dt t
e
log2 1 + α1 e
− √
4 πb 0
Z
(|a |t−L )2
(|a2 |t−L1 )2
(|a1 |t−L1 )2
α1 L1 ∞
−3/2 − 2 4bt 1
−
4bt
dt t
e
log2 α1 + e 4bt
(93)
− √
4 πb 0
with α1 = ea2 L1 /b following from (79) and α1 ∈ [0, 1/2]. If |a2 | = |a1 |, then (93) yields
I (H; T|D) = 0, and otherwise I (H; T|D) > 0. In Fig. 7(a) with the black solid line we
q
log α1
1 −µ̃2
illustrate I (H; T|D) as a function µ̃2 for values of σ̃ = σ 2 2µ2µ̃−µ̃
such that the error
1 −µ̃2 L1
probability is fixed and we choose α1 = 0.01. The mutual information is zero for µ̃2 = µ2 = 1,
corresponding to a2 = −a1 and (T, D) = (Tdec , Ddec ). In Fig. 7(b) we can easily observe the
optimality of the test for µ̃2 = µ2 = 1 where the decision time takes its minimal value given
by E [Tdec |Ddec = 1, H = 1]. Fig. 7(a) and Fig. 7(b) illustrate the advantage of using mutual
information as a measure for testing optimality with respect to the average decision time. The
mutual information is a useful quantity since I(H; T|D) = 0 at the optimal point, whereas the
average decision time E[T|H] = E[Tdec |H], and hence we require knowledge of E[Tdec |H] to test
optimality using decision times.
5) Practical implementation of tests for optimality of continuous observation processes:
Implementation of our tests for optimality in a computer does not allow to directly treat the
absolutely continuous random variable T. Moreover as any practical time measurement device
has a finite time resolution, we are only able to retrieve T up to a finite quantization resolution.
Thus, we discuss here how far finite resolution of T influences our tests for optimality. Note that
we still consider that the decision device operates in continuous time and also that the observation
process is continuous. Measuring the decision times T under a finite resolution Tr is equivalent
R nTr
to discretizing the distributions (84) - (87) such that P (N = n|D, H) = (n−1)T
dtpT (t|D, H)
r
with N ∈ N being a discrete random variable. Corresponding to (93) the mutual information
I (H; N|D) can be expressed by
1 + α1
log2 (1 + α1 )
2
R nTr
!
∞ Z nTr
2
X
(n−1)Tr
L1
dt
(|a1 |t − L1 )
− √
exp −
log2 1 + α1 R nT
3/2
r
4bt
4 πb n=1 (n−1)Tr t
I (H; N|D) =
dt
t3/2
dt
(n−1)Tr t3/2
January 8, 2018
(|a2 |t−L1 )2
exp − 4bt
(|a1 |t−L1 )2
exp − 4bt
DRAFT
34
α1 L1
− √
4 πb
∞
X
n=1
Z
nTr
(n−1)Tr
2
dt
(|a2 |t − L1 )
exp −
3/2
t
4bt
!
R nTr
dt
(n−1)Tr t3/2
log2 α1 + R nT
r
dt
(n−1)Tr t3/2
(|a1 |t−L1 )2
exp − 4bt
.
(|a2 |t−L1 )2
exp − 4bt
(94)
Fig. 7(a) illustrates the impact of the discretization time Tr on I (H; N|D). Note that for a1 = −a2 ,
corresponding to µ̃2 = 1, the mutual information I (H; N|D) = 0 for any value of Tr , since
by the data processing inequality time discretization of T can just discard information [24,
Theorem 2.8.1]. However, for a1 6= −a2 , corresponding to µ̃2 6= 1, the mutual information might
significantly decrease because of discarding information by time discretization. Fig. 7(a) shows
that for Tr ∼ 0.1 E [Tdec |H = 1] the mutual information I (H; N|D) ≈ I (H; T|D) and the effect
of finite resolution is negligible.
Direct implementation of our tests for optimality also requires to deal with a finite number
of runs of the test. In Fig. 7(c) we evaluate the dependency of the estimate Iˆ (H; N|D) on the
number of runs of the test for suboptimal tests (µ̃2 = 0.5, µ̃2 = 1.5) and an optimal test
(µ̃2 = 1). The estimate of the mutual information decreases with the number of test runs, and
for suboptimal tests converges to a theoretical value which is larger than zero. For an optimal
sequential decision-making test, the estimate of the mutual information converges to zero. Note
that this is contrary to the case of discrete-time observation processes, as illustrated in Fig. 6(b),
where the estimate of the mutual information, even in the optimal case, saturates as a function
of the number of test runs and converges to a positive value.
VII. D ISCUSSION
In the present paper we have shown that optimality of black box decision devices can be
tested by studying decision time distributions given the knowledge of the actual hypothesis and
the decision variable. To obtain these results we have shown that decisions times of binary
sequential probability ratio tests of continuous observation processes satisfy fluctuation relations
given by Theorem 1 and Theorem 2. Based on these fluctuation relations we have shown
that the conditional mutual information I(H, Tdec |Ddec ) between the hypothesis H, the decision
time Tdec conditioned on the decision variable Ddec is equal to zero, see Corollary 1. Using
several numerical experiments we have illustrated our statistical tests. We have also discussed
the limitations of our tests for sequential decision-making based on discrete-time observations.
Applying our tests for optimality has several advantageous properties. Testing the necessary
conditions given by Theorem 1 and Corollary 1 requires knowledge about three random variables,
January 8, 2018
DRAFT
35
namely, the hypothesis H, the decision variable D, and the output time of the decision device
T + Tdelay . Note that we do not require direct measurements of the decision time T, but allow
for random or deterministic delay Tdelay in the output time, which needs to be statistically
independent of H conditioned on T and D. Remarkably, the statistics of the actual observation
process and the properties of the decision-making device, such as the allowed error probabilities
α1 and α2 , are not required. For these reasons our tests are well applicable under practical
experimental conditions. We now discuss a few practical examples.
Studies in cognitive psychology have measured the reaction time distributions in experiments
of two-choice decision tasks performed by human subjects about simple perceptual and cognitive
stimuli, see e.g. [19], [20]. For fast decisions – of the order of one second – distributions of
reaction times and error probabilities can be well described with a simple model for sequential
decision-making in continuous time [19], [20]. Neural activity associated with the actual decisionmaking process has been identified in experiments with rhesus monkeys trained to perform rapid
two-choice decisions in simple visual tasks [25], [26]. Interestingly, it was found that the firing
rates of neurons in the lateral intra-parietal area correlate with the cumulative evidence associated
with the hypothesis, and that a decision model based on a threshold crossing process describes
the decision-time data well [27]. Furthermore, it has been conjectured that the cortex and basal
ganglia, two brain regions in vertebrates, perform a multihypothesis sequential probability ratio
test [28], [29], which is optimal for small error probabilities [4], [8]. Theorem 1 and Corollary 1
may be used as tools to quantify the closeness to optimality of sequential decision making by
human subjects or monkeys in two-choice decision tasks. In this regard, note that experiments of
two-choice decision tasks performed by human subjects or monkeys allow to measure reaction
times, decision variables, and the actual realizations of the hypothesis, which are known by the
construction of the experiment.
Cell fate decisions are important changes of cell behavior in response to external signals.
Examples are cell division controlled by growth factors, programmed cell death due to signals
or the differentiation of pluripotent progenitor cell to a specific cell type as a result of biochemical
signals. Cellular signaling events that control cell fate can involve signaling molecules, such as,
hormones, growth factors, and cytokines [30], [31]. Because of intrinsic and extrinsic noise,
cellular signaling processes have a stochastic component. Cell-fate decisions can be considered
as an example of sequential decision-making based on a sequence of noisy input signals. An
example of how cells could implement sequential probability ratio tests with simple examples
January 8, 2018
DRAFT
36
of protein reaction networks has been given in [32]. Theorem 1 and Corollary 1 could be used
to investigate the degree of optimality of cell-fate decisions. The timing of cell-fate decisions
could be measured in experiments by monitoring the expression levels of fluorescently labelled
molecular markers associated with the cell-fate transition within clonal populations [30], [31].
Following at the same time the input signals could in principle permit to calculate the differences
of decision time distributions of correct and incorrect decisions.
As already stated with our introductory example on obstacle detection for autonomous cars,
sequential binary decision problems arise in many engineered systems. However, different to
the assumption made for the Wald test the statistics of the observation processes Pl (l = 1, 2)
are often unknown, corresponding to a nonparametric decision problem. One approach to tackle
such sequential decision problems is to apply neural networks in combination with reinforcement
learning [33]. The approach presented in [33] closely approximates the behavior of the optimal
sequential probability ratio test and achieves a similar performance. Alternatively, in [34] an
approach for nonparametric binary sequential hypothesis testing is presented, where the binary
sequential detector is learned form training samples based on a so-called Wald-Kernel. The aim
of these algorithms is to use the available measurements in an optimal way such that the average
time to take a decision is minimized. However, the behavior of algorithms like neural networks
[35], [36] can hardly be analyzed making them similar to a black-box decision device causing
the problem to verify their optimality which nevertheless is crucial for application in safety
critical systems like autonomous cars. This gap can be filled by out test for optimality based on
Theorem 1 and Corollary 1 allowing to determine the degree of optimality of these decisionmaking devices just requiring the actual hypothesis H, the decision variable D and the decision
time T of several test runs. This is especially important to determine, whether the learning
process already converged sufficiently.
So far our approach is limited to binary sequential probability ratio tests without prior knowledge on the hypotheses. Sequential probability ratio tests have been extended to a Bayesian
setting where prior knowledge on the hypothesis H is available [10, Ch. 6.2], and have also been
extended to the multihypothesis scenario. The extension of our results to these settings is for
further study.
January 8, 2018
DRAFT
37
A PPENDIX A
P ROOF OF T HEOREM 2
Proof. We first show that the log-likelihood ratio St is odd under the transformation given by
the involution Θ. This can be shown as follows
eSt (Θ(ω)) =
=
=
=
=
dP1 |Ft
(Θ(ω))
dP2 |Ft
dP1 |Ft
(Θ(ω))
d(P1 ◦ Θ)|Ft
d(P1 ◦ Θ)|Ft
(ω)
d(P1 ◦ Θ ◦ Θ)|Ft
d(P1 ◦ Θ)|Ft
(ω)
dP1 |Ft
dP2 |Ft
(ω)
dP1 |Ft
= e−St (ω) .
(95)
(96)
(97)
(98)
(99)
(100)
Let
Φ1 (t) = {ω ∈ Ω : Tdec (ω) ≤ t and Ddec (ω) = 1}
(101)
Φ2 (t) = {ω ∈ Ω : Tdec (ω) ≤ t and Ddec (ω) = 2}
(102)
be the set of trajectories for which the decision time does not exceed t and the test decides for
Ddec = 1 and Ddec = 2, respectively. Since α1 = α2 we have also L1 = −L2 , and because of
the property St (Θ(ω)) = −St (ω), it follows that
Φ1 (t) = Θ (Φ2 (t)) .
(103)
P2 (Φ1 (t)) = (P1 ◦ Θ)(Φ1 (t))
(104)
Therefore, also
January 8, 2018
= P1 (Θ(Φ1 (t)))
(105)
= P1 (Φ2 (t)).
(106)
DRAFT
38
Now the following holds
Z
P1 (Φ1 (t)) =
dP1 |Ft
(107)
eSt dP2 |Ft
(108)
eSt d(P1 ◦ Θ)|Ft
(109)
ω∈Φ1 (t)
Z
=
ω∈Φ1 (t)
Z
=
ω∈Φ1 (t)
Z
eSt (Θ(ω)) dP1 |Ft
=
(110)
ω∈Θ(Φ1 (t))
Z
=
e−St dP1 |Ft
(111)
e−STdec dP1 |Ft
(112)
ω∈Φ2 (t)
Z
=
ω∈Φ2 (t)
−L2
Z
dP1 |Ft
=e
(113)
ω∈Φ2 (t)
= e−L2 P1 (Φ2 (t))
(114)
where for (108) we have used the Radon-Nikodým theorem and the definition in (12). For
equality (109) we have used the involution relation (28) between the measures. In (110) we have
applied a variable transformation in the integral. In (111) we have used the sign reversal of St
given by Eqs. (95) and (100) and the involution relation between the sets Φ2 (t) = Θ (Φ1 (t)).
In (112) we have applied Doob’s optional sampling theorem to the P1 -martingale e−St . For (113)
we have used that e−St is a continuous process and reaches the value e−L2 at the time Tdec .
The probability density functions of Tdec can be expressed in terms of the derivatives of the
cumulative distributions P(Φk (t)) (k = 1, 2)
d
P1 (Φ1 (t))
dt
d
= 2|H = 1) = P1 (Φ2 (t)).
dt
pTdec (t|H = 1, Ddec = 1)P (Ddec = 1|H = 1) =
(115)
pTdec (t|H = 1, Ddec = 2)P (Ddec
(116)
For the ratio of the decision probabilities we find
P (Ddec = 1|H = 1)
1 − α2
1 − α1
=
=
= e−L2
P (Ddec = 2|H = 1)
α2
α2
(117)
P (Ddec = 1|H = 1) = lim P1 (Φ1 (t))
(118)
P (Ddec = 2|H = 1) = lim P1 (Φ2 (t)).
(119)
which follows from
t→∞
t→∞
January 8, 2018
DRAFT
39
Eq. (114), and the assumption that the test terminates almost surely. Notice that we have used
symmetric error probabilities for which α1 = α2 . Taking the derivative of the LHS of (107) and
the RHS of (114) and using Eq. (117) we prove Eq. (29). Analogously, Eq. (30) can be proved.
Equation (31) follows from the identities
pTdec (t|Ddec = d)
= pTdec (t|Ddec = d, H = 1)P (H = 1|Ddec = d) + pTdec (t|Ddec = d, H = 2)P (H = 2|Ddec = d)
= pTdec (t|Ddec = d, H = 1)P (H = 1|Ddec = d) + pTdec (t|Ddec = d, H = 1)P (H = 2|Ddec = d)
= pTdec (t|Ddec = d, H = 1)
(120)
with d ∈ {1, 2} and where we have used Theorem 1. Using (29) and (120) we find (31), which
completes the proof.
A PPENDIX B
P ROOF OF C OROLLARY 3
Proof. The mutual information in (44) is given by
pTdec (Tdec |H)
I(H; Tdec ) = E log
pTdec (Tdec )
P (Ddec = 1)pTdec (Tdec |H, Ddec = 1) + P (Ddec = 2)pTdec (Tdec |H, Ddec = 2)
= E log
.
pTdec (Tdec )
(121)
We find
P (Ddec = 1|H = 1)P (H = 1) + P (Ddec = 1|H = 2)P (H = 2)
P (Ddec = 1)
=
P (Ddec = 2)
P (Ddec = 2|H = 1)P (H = 1) + P (Ddec = 2|H = 2)P (H = 2)
P (Ddec = 1|H = 1) P (H = 1) +
=
·
P (Ddec = 2|H = 1) P (H = 1) +
=
1 − α P (H = 1) +
·
α
P (H = 1) +
α
P (H
1−α
1−α
P (H
α
= 2)
= 2)
(1 − α)P (H = 1) + αP (H = 2)
αP (H = 1) + (1 − α)P (H = 2)
=1
=
P (Ddec =1|H=2)
P (H
P (Ddec =1|H=1)
P (Ddec =2|H=2)
P (H
P (Ddec =2|H=1)
(122)
= 2)
= 2)
(123)
(124)
(125)
(126)
where we have used that the priors on H are identical, and that α1 = α2 = α. For (124) we
have used (27) and (117). As Ddec is a binary random variable, it follows that P (Ddec = 1) =
P (Ddec = 2) = 12 .
January 8, 2018
DRAFT
40
It also holds that
pTdec (Tdec ) =
X
X
P (H = h)P (Ddec = d|H = h) pTdec (Tdec |H = h, Ddec = d)(127)
h∈{1,2} d∈{1,2}
=
X
X
P (H = h)P (Ddec = d|H = h) pTdec (Tdec |H, Ddec = d)
(128)
h∈{1,2} d∈{1,2}
= pTdec (Tdec |H, Ddec )
X
X
P (H = h)P (Ddec = d|H = h)
(129)
h∈{1,2} d∈{1,2}
= pTdec (Tdec |H, Ddec )
(130)
where in (128) we have used Theorem 1 and in (129) we have used Theorem 2.
Using (126) and (130) we get for the argument of the log in (121)
P (Ddec = 1)pTdec (Tdec |H, Ddec = 1) + P (Ddec = 2)pTdec (Tdec |H, Ddec = 2)
pTdec (Tdec )
pT (Tdec |H, Ddec = 1) + pTdec (Tdec |H, Ddec = 2)
= dec
(131)
2 pTdec (Tdec |H, Ddec )
pT (Tdec |H, Ddec )
= dec
(132)
pTdec (Tdec |H, Ddec )
=1
(133)
where we have applied again Theorem 2. This completes the proof.
ACKNOWLEDGEMENT
We acknowledge Yannis Kalaidzidis, Mostafa Khalili-Marandi, and Marino Zerial for fruitful
discussions.
R EFERENCES
[1] M. Dörpinghaus, É. Roldán, I. Neri, H. Meyr, and F. Jülicher, “An information theoretic analysis of sequential decisionmaking,” in Proc. of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017,
pp. 3050–3054.
[2] A. Wald, “Sequential tests of statistical hypotheses,” Ann. Math. Statist., vol. 16, no. 2, pp. 117–186, June 1945.
[3] A. Wald and J. Wolfowitz, “Optimum character of the sequential probability ratio test,” Ann. Math. Statist., pp. 326–339,
1948.
[4] A. Tartakovsky, I. Nikiforov, and M. Basseville, Sequential Analysis: Hypothesis Testing and Changepoint Detection, ser.
Chapman & Hall/CRC Monographs on Statistics & Applied Probability.
CRC Press, 2014.
[5] T. L. Lai, “Asymptotic optimality of invariant sequential probability ratio tests,” The Annals of Statistics, pp. 318–333,
1981.
[6] A. Tartakovsky, “Asymptotically optimal sequential tests for nonhomogeneous processes,” Sequential analysis, vol. 17,
no. 1, pp. 33–61, 1998.
January 8, 2018
DRAFT
41
[7] A. G. Tartakovsky, “Asymptotic optimality of certain multihypothesis sequential tests: Non-iid case,” Statistical Inference
for Stochastic Processes, vol. 1, no. 3, pp. 265–295, 1998.
[8] V. Draglia, A. G. Tartakovsky, and V. V. Veeravalli, “Multihypothesis sequential probability ratio tests. i. asymptotic
optimality,” IEEE Transactions on Information Theory, vol. 45, no. 7, pp. 2448–2461, 1999.
[9] R. Liptser and A. Shiryaev, Statistics of Random Processes: I. General Theory, ser. Applications of mathematics : stochastic
modelling and applied Probability.
Springer, 2001.
[10] J. L. Melsa, D. L. Cohn et al., Decision and estimation theory.
McGraw-Hill, 1978.
[11] É. Roldán, I. Neri, M. Dörpinghaus, H. Meyr, and F. Jülicher, “Decision making in the arrow of time,” Physical Review
Letters, vol. 115, no. 25, p. 250602, 2015.
[12] I. Neri, E. Roldán, and F. Jülicher, “Statistics of infima and stopping times of entropy production and applications to active
molecular processes,” Phys. Rev. X, vol. 7, p. 011019, Feb 2017.
[13] D. Williams, Probability with martingales.
Cambridge university press, 1991.
[14] W. C. Lindsey and H. Meyr, “Complete statistical description of the phase-error process generated by correlative tracking
systems,” IEEE Trans. Inf. Theory, vol. 23, no. 2, pp. 194–202, 1977.
[15] M. H. DeGroot and M. J. Schervish, Probability and statistics, 4th ed.
Addison-Wesley„ 2012.
[16] J. Beirlant, E. J. Dudewicz, L. Györfi, and E. C. Van der Meulen, “Nonparametric entropy estimation: An overview,”
International Journal of Mathematical and Statistical Sciences, vol. 6, no. 1, pp. 17–39, 1997.
[17] J. Jiao, K. Venkat, Y. Han, and T. Weissman, “Minimax estimation of functionals of discrete distributions,” IEEE
Transactions on Information Theory, vol. 61, no. 5, pp. 2835–2885, 2015.
[18] A. W. van der Vaart, Asymptotic Statistics, 1st ed.
Cambridge University Press, 1998, vol. 3.
[19] R. Ratcliff and P. L. Smith, “A comparison of sequential sampling models for two-choice reaction time.” Psychological
review, vol. 111, no. 2, p. 333, 2004.
[20] R. Ratcliff and G. McKoon, “The diffusion decision model: theory and data for two-choice decision tasks,” Neural
computation, vol. 20, no. 4, pp. 873–922, 2008.
[21] S. Pigolotti, I. Neri, E. Roldán, and F. Jülicher, “Generic properties of stochastic entropy production,” Phys. Rev. Lett.,
vol. 119, p. 140604, Oct 2017. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevLett.119.140604
[22] S. Redner, A guide to first-passage processes.
Cambridge University Press, 2001.
[23] J. R. Michael, W. R. Schucany, and R. W. Haas, “Generating random variates using transformations with multiple roots,”
The American Statistician, vol. 30, no. 2, pp. 88–90, 1976.
[24] T. Cover and J. Thomas, Elements of Information Theory, 2nd edition.
New York: Wiley & Sons, 2006.
[25] M. N. Shadlen and W. T. Newsome, “Neural basis of a perceptual decision in the parietal cortex (area lip) of the rhesus
monkey,” Journal of neurophysiology, vol. 86, no. 4, pp. 1916–1936, 2001.
[26] J. D. Roitman and M. N. Shadlen, “Response of neurons in the lateral intraparietal area during a combined visual
discrimination reaction time task,” Journal of neuroscience, vol. 22, no. 21, pp. 9475–9489, 2002.
[27] S. Kira, T. Yang, and M. N. Shadlen, “A neural implementation of Wald’s sequential probability ratio test,” Neuron, vol. 85,
no. 4, pp. 861–873, 2015.
[28] R. Bogacz and K. Gurney, “The basal ganglia and cortex implement optimal decision making between alternative actions,”
Neural computation, vol. 19, no. 2, pp. 442–477, 2007.
[29] R. Bogacz, “Optimal decision-making theories: linking neurobiology with behaviour,” Trends in cognitive sciences, vol. 11,
no. 3, pp. 118–125, 2007.
[30] R. Losick and C. Desplan, “Stochasticity and cell fate,” science, vol. 320, no. 5872, pp. 65–68, 2008.
January 8, 2018
DRAFT
42
[31] A. Raj and A. van Oudenaarden, “Nature, nurture, or chance: stochastic gene expression and its consequences,” Cell, vol.
135, no. 2, pp. 216–226, 2008.
[32] E. D. Siggia and M. Vergassola, “Decisions on the fly in cellular sensory systems,” Proceedings of the National Academy
of Sciences, vol. 110, no. 39, pp. E3704–E3712, 2013.
[33] C. Guo and A. Kuh, “Temporal difference learning applied to sequential detection,” IEEE Transactions on Neural Networks,
vol. 8, no. 2, pp. 278–287, Mar 1997.
[34] D. Teng and E. Ertin, “Learning to aggregate information for sequential inferences,” arXiv preprint arXiv:1508.07964,
2015.
[35] C. M. Bishop, Pattern recognition and machine learning.
[36] A. Engel, Statistical mechanics of learning.
January 8, 2018
Springer, 2006.
Cambridge University Press, 2001.
DRAFT
| 9cs.NE
|
Robust Propensity Score Computation Method based
on Machine Learning with Label-corrupted Data
Chen Wanga , Suzhen Wangb,1 , Fuyan Shib , Zaixiang Wangb
arXiv:1801.03132v1 [stat.ME] 9 Jan 2018
a
Dept. of Computer Science, University College London, Gower Street, London,
England, United Kingdom WC1E 6BT
b
Dept. of Health Statistics, Weifang Medical College, No.7166 BaoTong West Street,
Weifang, Shandong, China 261053
Abstract
In biostatistics, propensity score is a common approach to analyze the imbalance of covariate and process confounding covariates to eliminate differences
between groups. While there are an abundant amount of methods to compute propensity score, a common issue of them is the corrupted labels in
the dataset. For example, the data collected from the patients could contain samples that are treated mistakenly, and the computing methods could
incorporate them as a misleading information. In this paper, we propose
a Machine Learning-based method to handle the problem. Specifically, we
utilize the fact that the majority of sample should be labeled with the correct instance and design an approach to first cluster the data with spectral
clustering and then sample a new dataset with a distribution processed from
the clustering results. The propensity score is computed by Xgboost, and a
mathematical justification of our method is provided in this paper. The experimental results illustrate that xgboost propensity scores computing with
the data processed by our method could outperform the same method with
original data, and the advantages of our method increases as we add some artificial corruptions to the dataset. Meanwhile, the implementation of xgboost
to compute propensity score for multiple treatments is also a pioneering work
in the area.
Keywords: Biostatistics, Propensity Score, Spectral Clustering, Data
∗
This research is granted by China National Natural Science Foundation, Grant:
81473071
1
Corresponding Author
Sampling, Xgboost, Machine Learning
1. Introduction
Confounding covariates, or alternatively named as noise features, is a significant problem in studying Biostatistics data. In practice, data in this field
is usually collected with detailed information, thus it will contain some irrelevant and redundant features. For example, in a dataset of a certain disease,
the information about the marital status might be irrelevant to the cause of
the disease, and it will be acting as a confounding (noise) covariate. The
confounding covariates could bring negative effects in analyzing the data: it
could provide misleading information to reveal a false correlation between
variables (features) and labels, and it could introduce unnecessary statistical
differences between groups and lead to a incomparable situation. Consequently, recognizing and balancing confounding covariates have become an
open task in biostatistics research.
A common approach to address this problem is propensity score [1]. The
key idea of propensity score is to compute the ’likelihood’(propensity) of a
sample to be belonging into a certain group (usually termed as ’treatment’ in
biostatistics). And by matching the samples in different groups with similar
propensity scores and/or weighting the samples with propensity score, we
could reduce or eliminate the bias of confounding features. [2] experimentally shows that for some randomly generated data, propensity score could
effectively eliminate the statistical significance between groups. There are
multiple methods to compute propensity score, ranging from simple logistic
regression to cutting-edge Machine Learning methods. From the perspective
of Machine Learning, the task of propensity score computing is essentially
to train and utilize a classifier with probability as retrievable outputs (like
soft-max output). Consequently, although there are a variety of Machine
Learning algorithms which could be plunged to the task, the basic procedures are almost the same.
While the state-of-the-art Machine Learning methods are promising in this
area, they typically suffer from one problem: the corrupted data. Data is
typically collected from medical practice, and there could be some mistreated
samples in each group. The conventional approach to solving this problem
would be to hire some experts to select the correctly-labeled samples and
use them as a subset to train the classifier. However, this procedure will be
2
expensive in both time and money.
To tackle the issue with a smarter approach, we propose a novel Machine
Learning-based propensity score computation procedure in this paper. We
exploit the fact that the majority of samples should be treated (classified)
with the correct group (label) and patients (samples) be treated with different groups should have distinct data manifolds. Guided by this premise, we
design a system that first clusters the data with spectral clustering method,
and then computes the weight of the data by computing the proportion of
the number of samples through different classes (treatments). The weights
are processed with an interpolation method to perform a ’moderate softmax’
computation and it will lead to a distribution over clusters after being normalized. Based on this new distribution, we will sample a subset for the
usage of the training procedure. And finally, the propensity score is computed based on Xgboost proposed by Chen and Guestrin [3].
The rest of the paper is arranged in the following order: the second section
will briefly review literatures related to our research; the third part will introduce the proposed system and explain the Machine Learning algorithms
applied; the fourth portion will be mathematically analyzing the assumptions and properties of the proposed method; the experimental result for the
proposed method based on SEER data is illustrated in the fifth section, and
the outcomes are analyzed and compared; and finally, the last section of the
paper concludes our research and discusses future research for this topic.
2. Related Work
Despite the solid theoretical foundation of conventional Logistic Regression method in computing propensity score, efforts to utilize novel Machine
Learning algorithms in computing propensity score has emerged for a long
time. Huge research potentials of propensity score could be found in the
state-of-the-art algorithms, which could significantly outperform the traditional Logistic Regression. Existed papers related to this topic mainly focus
on implementing Machine Learning methods with advanced models (such
as SVM and Random Forest) and comparing different approaches with certain datasets. [4] tested different Machine Learning methods in computing
propensity score and demonstrated that boosting methods and tree algorithms could outperform Logistic Regression in general. [5] studied the theoretical foundations of implementing Machine Learning methods for dichotomous and multicategory outcome in biostatistics, and analyzed algorithms
3
like kNN, Random Forest and SVM. [6] compared the propensity score results
of Classification Tree Analysis (CTA) and Logistic Regression and argued
that although Logistic Regression method still has the lowest average standardized difference, CTA could provide the greatest predictive accuracy thus
it has strong potentials and could provide an alternative way in propensity
score computation. And for the tree-based method specifically, [7] compared
different classification and regression and discussed their performances.
There are also published literatures concentrating on improving the model
complexity to avoid potential model misspecified problem. A typical example
of these algorithms is the so-called ’super-leaner’ algorithm, which is roughly
equivalent to stacking algorithms in Machine Learning. The method was
originally proposed by [8] to process data with complex relationship between
input and output through a weighed combination of different learners. [9]
shows experimentally that the super learner method could achieve a significantly better performance under the situation of severe model misspecification. [10] proposed an algorithm to use a convex combination of generalized
propensity score computed by Super Learner. The authors then takes traumatic brain injury as a study case and discussed the statistical significance
between time for the patient to be transferred from emergency to specialist
and the treatment effect. [11] further studied the Super Learner method in
the application of electronic healthcare data.
Whilst there are a large amount of work discussing advanced algorithms in
computing propensity score, approaches dealing with propensity score under
corrupted data is relatively under-developed. [12] analyzed the problem of
propensity score with missing data and suggested to use multiple imputation
method. Similar with this paper, [13] analyzed propensity score computation
under missing covariate with multiple imputation and specifically solved the
issue with general location mixture models. To the best our knowledge, hitherto, there has not been any significant publication in studying propensity
score with mislabeled data, although this is common in bioscience. In the
area of Machine Learning, this issue could be regarded as corrupted label
problem, and there are some related literatures building algorithms for this
task [14][15]. However, in this work, we do not follow the idea of advanced
algorithmic target functions employed in these methods. Instead, we used
a clustering and normalization based method to tackle the problem. Based
on our assumption, the method should be valid for biostatistic data and the
rationality of the method is shown mathematically in our paper.
4
3. Methodology
3.1. Problem Setup
Assuming we have data (X, Y ) that generated from space X × Y, where
X is the input space and Y is a discrete output space. We now have m data
pairs (X1 , y1 ), (X2 , y2 ), ..., (Xm , ym ) drawn from a certain distribution. Then,
there will be an underlying conditional distribution:
p(y|X; θ)
(1)
And to infer the probability of each data point, we need to obtain parameter
θ that determines the model. With proper hypothesis space, the conventional
MLE of θ should be:
∗
θ = argmax
θ
m
Y
p(yi |Xi ; θ)
(2)
i=1
However, here our situation is the set Y has been replaced by Ŷ , which
contains many noisy(incorrect) labels. Then directly learning from (X1 , yˆ1 ),
(X2 , yˆ2 ), ..., (Xm , yˆm ) will incorporate some noise. Thus, it demands an approach to solve the problem.
Given the research context of medical and biological science, we could assume
the probability for a sample to be labeled (treated) correctly is higher than
the reverse situation. Mathematically, this assumption could be noted as:
p(ŷ = a|y = a) > p(ŷ 6= a|y = a), ∀a ∈ Y
(3)
And under this assumption, we could try to sample a subset of (X1 , y˜1 ),
(X2 , y˜2 ), ... , (Xk , y˜k ), k 6 m to fit the model, and find the parameter with:
θ̃ = argmax
θ
k
Y
p(ỹi |Xi ; θ)
(4)
i=1
that could minimize the loss L(θ̃, θ∗ ) between the estimated parameter and
the parameter estimated under uncorrupted data. However, since the true
data set is not visible for us, it is impossible to directly optimize over L(θ̃, θ∗ )
function. An alternative way would be to sample from a distribution that
could produce a subset close to the true dataset, and this is the core idea
of our noise-eliminating procedure. The next subsection will be introducing
this method and the employed Machine Learning algorithm.
5
3.2. Avoid Noisy Label: Sampling with Spectral Clustering and Normalization
Now we need a method to sample a subset of data with the distribution
as close as possible to the original correct samples. The method should have
the following properties:
• The proportion of mis-specified labels should monotonously decrease
as the performance of the algorithm increase
• The result should not be affected by the proportion of data in each
class (treatment)
• The results of the algorithm should be interpretable, and the interpretation should have a fixed methodology
To satisfy the above principles, we could assume some special properties for
the data. Without losing generality, we could assume the data, which is
classified (treated) with d different classes, comes from n underlying patterns under condition n > d, and each pattern will have a proportion of
pi , i = 1, 2, ..., n to be classified into class j ∈ {1, 2, .., d}. Formally, we could
specify the number of true samples under each class j:
Ntrue (j) =
n
X
pi N (i)
(5)
i=1
Where N (·) denotes the number of samples. In practice, we choose the number of n as n = d for a better interpretability, and this setting will be further
discussed in section 5 with the example of SEER data. Under this assumption, we will be able to sample the data with their underlying patterns, which
could be represented by clusters under the skeleton of unsupervised learning. Intuitively, an effective method would be to sample from the clustering
results, and now the question is which kind of technique should we use for
clustering.
The commonly-used clustering method is K-means and its variations. This
branch of algorithms are straightforward to implement and the computational complexities of them are generally acceptable for ordinary computers.
However, K-means related algorithms suffer from several problems: it is sensitive with initial clustering centers, and in practice we usually need to run
6
K-mean for several times with different initial clustering centroids to obtain
the best performance; it is vulnerable towards outliers, as few outliers will
make significant effects on the result; and most importantly, the clustering
results of K-means branch algorithms have a strictly spherical curvature, thus
it could only deal with simple data manifold, but in bio-medical science the
data manifold could be of great complexity.
A better alternative would be Spectral Clustering. Instead of measure the
Euclidean distance between samples, which will inevitably loss some manifold information, Spectral Clustering method utilize the Graph Distance that
could preserve local neighborhood informations. In Spectral Clustering, the
affine matrix that denotes the Graph Distance and its corresponding Graph
Laplacian will be computed, and then eigenvalue decomposition will be performed to capture the information in the so-called embedded space and the
clustering result could be obtained by applying ’ordinary’ clustering methods on this processed matrix. Spectral Clustering works especially well when
the number of clusters is not large, and it could deal with complicated data
geometries. The core problem of Spectral Clustering is the Neighbor Graph
(Similarity Graph), which represents the ’similarity’ between different data
points. Common methods to be implemented include -Neighbourhood, knearest Neighbourhood and fully-connected graph with positive semi-definite
kernels. One popular similarity graph matrix construction method is Gaussian Kernel method, which computes the similarity between data points xi
and xj with:
||xi − xj ||22
)
(6)
2σ 2
Which σ is a parameter that could be specified or computed by the following
equation:
q
Kg (xi , xj ) = exp(−
σ=
T
median(I(||X̂ − X̂ ||2 ))
(7)
Where X̂ is a m × m matrix with X̂ ij = ||xi ||22 , ∀j ∈ 1, 2, ..., m (duplicated
column matrix with each row as the square l2 norm of the data point) and I
stands for the operation to remove the diagonal values of the matrix.
The method could be computed with high efficiency for high dimension data.
However, it could be of great instability if some of the features are discrete
values. To improve the clustering method specifically for our data with a
mixture of continuous and discrete features, we proposed a feature-wise Similarity Matrix method here. For each pair of samples (xi , xj ), we compute
7
Data: Input data, separated by continuous features and discrete
features
Result: Clustering result for each data point
Compute the affine matrix of continuous features based on equation 6 ;
for Each Discrete Feature do
Compute the affine matrix of discrete features based on equation 9
and sum them with equation 8 ;
end
Perform Spectral Clustering with the affine matrix ;
Return the clustering label for each data ;
Algorithm 1: Spectral Clustering of the Data
the sum of the similarity across each feature, which could be denoted by:
K(xi , xj ) =
P
X
Kd (xip , xjp ) + Kg (x∗i , x∗j )
(8)
p=1
Where P is the number of discrete features(co-variates) and Kg (·, ·) stands
for Gaussian Kernel for continuous features computed by equation 6. For the
discrete features, we compute each of the similarity matrix with Delta Kernel:
(
1
, x i = xj
(9)
Kd (xi , xj ) = N (x)
0,
otherwise
Where N (x) is the number of samples of the specific class. And since all the
components of the similarity is positive semi-definite, the resulting matrix
would also be positive semi-definite. The Process of the detailed algorithm
could be shown in algorithm 1.
The practical implement of this method will be discussed in section 5. And
after clustering, we could further divide each cluster with sample in different
classes(treatments) and get a d × n matrix:
w11 w12 · · · w1n
w21 w22 · · · w2n
W =
(10)
···
wd1 wd2 · · · wdn
Where d is the number of classes and n is the number of underlying patterns
(clusters).
8
Intuitively,now we would be able to choose the top k clusters at each class(treatment)
and use them as the new training set. However, the number of samples in
each cluster, which serves are an indication of underlying patterns, could be
imbalance and misguiding in our circumstance. A smarter way would be
to normalize the quantity of each cluster across the classes, which could be
representation as:
wij
∗
wij
= Pd
i=1 wij
(11)
This will give us the exact information about ’how large is the portion of
this pattern being assign with treatment i’, and it could best reflect and
satisfy the assumption denoted by equation 5. And here we need to augment the probability of the cluster with largest probability because we have
mis-specified data in each treatment class. Based on the assumption of 3,
the augmented probabilities should be belonging to the clusters that should
contribute to the treatment. And inspired by [16], we use an interpolation
∗
to get ŵ:
method to combine the first and second order value of wij
∗
ŵ = wij
+
γ
∗2
wij
1−η∗
(12)
Parameters γ denotes the trade-off between first and second order interpolation, and is the proportion of corrupted labels (default as 0 even with some
mild corruptions, and we assume ≤ 0.5) and η is a parameter denoting
how will we treat the importance of data corruption. Here we also have a
constraint to η for 0 ≤ η ≤ 2. In our program we set γ = 0.7 and η = 2. And
after the normalization, we could sample a new dataset with the proportion
of ŵ in each row of the matrix. Formally, it could be denoted by p∗ij :
wˆij
p∗ij = Pn
j=1
wˆij
(13)
Equation 13 is the equation we finally used in computing the probability
to sample a subset from each treatment class. In section 4 we will discuss
the rationality of it mathematically, but in this section, we will continue on
discussing the technique to compute propensity score.
9
3.3. Propensity Score Computing with Xgboost
As it is stated in section 2, implementing Machine Learning techniques
in computing Propensity Score has been studied for a long time. Propensity Score computing is very close to the probabilistic output in supervised
classification problem, thus a large amount of logistic or softmax functionbased approach could be introduced into the Propensity score area. Previous
studies generally suggest that boosting method is one of the most promising
branches of ML algorithms in computing propensity score. And in our work,
we use Xgboost as a novel Machine Learning method (designed in 2016) to
compute propensity score.
Xgboost is actually not a newly-proposed algorithm. Instead, it is built
on the algorithm of Gradient Boost Machine (GBM), and the novelty of
this platform is that it considered Structural Learning scores and designed a
better interface for Machine Learning considerations. The platform has R,
C++, Python, Scalar and Java API, and it could be conveniently modified
by simply change some parameters and arguments. It support softmax output for multiple-class probability, but using softmax could be too extreme.
The package also provide another mode called ’softprob’ model, which could
output the normalized probabilities of each class. And this is also the method
we adopted in this work.
Key parameters of Xgboost also include l2 regularization parameter, named
’lambda’, l1 regularization coefficient, named ’alpha’, and tree construction
and growth method, which is often selected automatically by heuristic search.
Meanwhile, since we are asking the Xgboost to output multi-class result, here
we use multi-class log loss to denote our training and validation loss. The
loss could be expressed by:
l(Y , P ) =
m
X
y Ti log(pi )
(14)
i=1
Where y i is the n × 1 one-hot vector that has value 1 at the true output
position and 0 otherwise; pi is the probability output vector. Y and P are
the m × n matrices that denotes all the data.
Xgboost is a well-developed platform which is ’efficient, flexible and portable’
(from their Github page). Here, we will not elaborate on the basic principles
of the GBM algorithm it utilizes. One who interested in could refer to the
original publication of the method.
10
3.4. Data Manifold Analysis with t-SNE
Another point we might interest in is the visualization of the data, which
could bring significant benefits for result interpretation. Visualizing the projection of the Manifold of data could provide us information about how data
in different classes could be overlapped or separated. And sometimes it could
even help us determine whether there exists significant difference between different groups (If there is not the experiment is probably unnecessary).
Typical data visualization approaches often project the data manifold to
a 2-d plane, which could be straightforwardly analyzed by human. Popular
methods used to compute data visualization include PCA(and pPCA, kPCA,
etc.), Isomap, Sammon Mapping, SNE(tSNE) and auto-encoder. The amjor
drawbacks of PCA and mapping methods are that they could not preserve
local structures and will thus lose the information of the data manifold in
the higher dimension. On the contrary, SNE(tSNE) could manipulate the
graph neibourhood structure. It is similar with Spectral Clustering method
we mentioned before, the difference is that here we compute the data point
in the lower dimension instead of clustering the Graph Laplacians.
To begin with, we will start to introduce SNE method. SNE stands Stochastic Neighbour Embedding, and it start with the transition matrix between
different data points in the original space, computed by:
(
exp(−||(xi )−(xj )||22 /(2σ 2 ))
P
i 6= j
2
2
j=1,j6=i exp(−||(xi )−(xj )||2 /(2σ ))
(15)
pi|j =
0
i=j
Similarly, we could compute the transition probabilities in the lower-dimension
space, which could define:
(
exp(−||(x∗i )−(x∗j )||22 /(2σ 2 ))
P
i 6= j
∗
∗
2
2
j=1,j6=i exp(−||(xi )−(xj )−||2 /(2σ ))
qj|i =
(16)
0
i=j
And now our purpose is to fit the model to get the data x∗ that could preserve the structural information. SNE is a method that consider to minimize
the KL divergence between pi|· and q·|i , and the target function could be describe as:
11
l((x∗ ), (x)) =
X
KL(pi|· |q·|i )
i
=
XX
i
pi|j log(
j
pi|j
)
qj|i
(17)
Equation 17 could be solved by gradient descent. And t-SNE is a variate
of SNE to modify the ’unsymmetrical’ KL-divergence. It defines a ’joint’
distribution of pi,j with:
pi|j + pj|i
(18)
2m
Where m is the number of samples. The similar method could be used on
q, and then we would have a ’symmetric’ target function. In this work, we
utilized the tSNE package in sk-learn API and specified certain parameters
to compute an optimal solution. Notice that in our situation features are
partially discrete and partially continuous, thus we compute the distance between samples explicitly with Euclidean for continuous features and matching
numbers for discrete features as the following equation:
pi,j =
N − Nm
(19)
N
Where N is the number of features(covariates) Nm is the number of features
that match in sample xi and xj .
Computing continuous and discrete features separately could cause another
problem: the imbalance of distance. Since the value of Dd (xi , xj ) has a maximum value of 1, where the distance of continuous data is not constrained,
the effect of Dd (xi , xj ) could be under-valued. An approach to deal with
this problem is to multiply a correction coefficient τ to Dd with value:
Dd (xi , xj ) =
τ=
Nd max(Dc )
×
Nc max(Dd )
(20)
Where Nd is the number of discrete features and Nc is the amount of continuous features. max(Dc ) stands for the maximum value of continuous distance
and max(Dd ) demotes the maximum value of discrete features. And the
overall distance will be computed by:
D(xi , xj ) = Dc (xi , xj ) + τ ∗ Dd (xi , xj )
12
(21)
This method is applied in our program, the details will be further illustrated
in section 5.
4. Mathematical Analysis of the Proposed Method
The novelties of our method mostly lie in the designing of the embedded
graph with Gaussian and Delta Kernel (equation 8) and the clustering-based
sampling method (equation 13). The rationality of the new graph-neightbour
method is easy to prove, as the kernel methods used are symmetric and positive semi-definite. However, one might have doubt of our proposed method
and its assumption and rationality. In this section, we will analyze the assumptions and the mathematical properties of the proposed method, and
show that the method could have an analytical upper bound of error rate.
The basic assumption has been stated in section 3.2 with equation 5. Here
to further illustrate the assumption, we could denote the sample number of
underlying patterns and the classes with the following matrix:
N1
p11 p12 · · · p1n
c1
N2 p21 p22 · · · p2n c2
=
(22)
· · · · · · · · ·
· · · · · ·
Nd
pd1 pd2 · · · pdn
cn
Where Ni means the sample number of class i = 1, 2, ..., d and cj means
the number of samples belonging to underlying pattern j ∈ 1, 2, ..., n. The
component pij of the d × n matrix P denotes the proportion of underlying
cluster j to be assigned to category (treatment) i. According to equation 10,
data after clustering could also be partitioned into different parts with the
d × n matrix W . Now we assume that the corrupted data (with mislabeled
samples) could be denoted as:
∗ ∗
N1
p11 p∗12 · · · p∗1n
c1
N2∗ p∗21 p∗22 · · · p∗2n c2
=
(23)
· · · · · · · · ·
· · · · · ·
cn
Nd∗
p∗d1 p∗d2 · · · p∗dn
And here P ∗ = p∗ij could be regarded as the true distribution proportion
matrix with corrupted (misclassified/mistreated) samples. And our clustering method is performed upon this matrix. To satisfy our assumptions, the
matrix should have the following property:
13
d
X
p∗ij = 1
(24)
i=1
To make sure that all samples from each cluster will be fully assigned to
different classes. And based on our assumption in equation 3, the following
property should hold as the number of the samples asymptotically grows to
infinity:
X
X
(25)
p∗ki ci >
p∗kj cj , ∀k ∈ 1, 2, ..., d
i∈I
j∈I
Where I is the set of the pattern symbols that pki > 0 and J is the set with
originally pkj = 0, which means that cluster j should not have any member
been assigned to class k. For each class k ∈ 1, 2, .., d, the whole number of
data is composed of:
Nk∗
=
X
p∗ki
Pd
i∈I
k=1
p∗ki
+
p∗kj
X
Pd
j∈J
k=1
p∗kj
(26)
In the above equation, the first term of the right hand side comes from the
clusters that should be assigned to the class and the second term comes as
pure mistakes. The error-specified size of sample could then be calculated as:
ε=
X |pki − p∗ |ci X p∗kj cj
ki
+
Pd
Pd
∗
∗
p
ki
k=1
k=1 pkj
j∈J
i∈I
(27)
Plugging in the equation 24 and 25 to equation 27, we could get:
X
X
ε=
|pki − p∗ki |ci +
p∗kj cj
i∈I
<
X
j∈J
|pki −
p∗ki |ci
i∈I
=
X
i∈I1
+
X
p∗ki ci
(28)
i∈I
pki ci +
X
2(p∗ki − pki )ci
i∈I2
Where I1 stands for the set that p∗ki 6 pki , and I2 denotes the set of i that
p∗ki > pki . And by computing the error rate η with ErrorRate = ErrorSamples/(ErrorSamples + CorrectSamples), we could get the following result
14
from equation 27:
P
P
∗
i∈I1 pki ci +
i∈I2 2(pki − pki )ci
P
η<P
∗
∗
i∈I1 (pki ci + pki ci ) +
i∈I2 2pki ci
(29)
And now, we could further analyze equation 29 with two special cases.
1. When p∗ki 6 pki , ∀i ∈ 1, 2, ..., n.
P
Then we will have a number of correct samples as i∈I p∗ki ci . The error
rate would therefore be:
P
i∈I pki ci
(30)
η<P
∗
i∈I (pki ci + pki ci )
And equation 30 would be the upper bound of the error rate under this
situation. As we could see, in this case the function is a decrement
function w.r.t p∗ki , and when p∗ki = pki ∀i, which means at this special
point, the upper bound of error would have a minimal value of η < 0.5.
2. When p∗ki > pki ∀i ∈ 1, 2, ..., n.
P
Then we will have a number of correct samples as i∈I pki ci . The error
rate would therefore be:
P
2(p∗ − pki )ci
P ki ∗
(31)
η < i∈I
i∈I 2pki ci
The equation 31 is the upper bound of the second situation and it is
an increment function. As we could prove the minimal of this upper
bound is also 0.5, and the situation is still p∗ki = pki ∀i. This comes with
the property of a continuous upper bound of the method.
And in the above method we have shown the assumptions of the method and
why it is rational. In practice, if the clustering algorithm is strong enough
to capture the majority of correct-specified samples, then p∗ki should be close
to pki given the assumption in 3.
5. Practical Settings and Experimental Results
In addition to algorithm designing and analyzing, in this work parameter
setting problems are also discussed and experimental results are obtained
based on SEER data. This section will first introduce the SEER data, and
then discuss (hyper)parameter setting problems. And finally, the experimental results with our method will be demonstrated.
15
5.1. SEER Dataset
The SEER dataset from 2004 to 2014 was queried for patients who were
confirmed pancreatic adenocarcinoma defined according to the International
Classification of Disease for Oncology, Third Edition (ICD-O-3) codes for
morphology (8140 and 8500) and topography (C25.0, C25.1, C25.2, C25.3,
C25.7, C25.8, and C25.9). Data collected for each patient includes patient
characteristics (age at diagnosis, sex, race, and marital status), tumor characteristics (tumor location, tumor grade, and AJCC stage), and treatment
characteristics (type of surgery, radiotherapy and status of surgery adjuvant radiotherapy). These three treatments are considered as the three
classes/categories under the term of Machine Learning in out work.
There are some missing data in the dataset, and discussing them will be
out of our research scope. Thus, in our program we only consider the
features(covariates) without data missing, and the rationality of the selection of features could be supported from the perspective of bioscience and
medical science. According to the true meaning of each feature, there only
four features which could be regarded as continuous: EOD10 PN, CS SIZE,
CS EXT, and CS NODE. Some of the features could imply the treatment
(say, NO SURG flag) or should not be treated as feature (say, CASENUM,
the index of patient), so we also remove these features.
The original data is believed to only have mild mis-labeled samples (mistreated patients). To demonstrate the performance of our method under data
with different extent of corruption, we also generate some further-corrupted
data for training purpose. We produce data with 10%, 20% and 40% of artificial label corruptions based on the original data by corrupting the labels
to other two classes with equal opportunities. Notice that the artificially
corrupted data is only utilized for training, and when it comes to evaluation,
we will use the original data to test the robustness of our proposed approach.
5.2. Parameter Settings
Following the method proposed in section 3, there are some hyper- parameters that should be assigned based on our assumption and practical
Requirement. Here we consider three aspects of parameter setting, namely
the number of clusters, Spectral Clustering and Xgboost parameter settings,
and considerations of tSNE.
The first hyper-parameter to determine is the number of clusters we would
like to use. This reflects the our basic assumption of the number of underlying patterns of the data. In our program we choose n = d where n is the
16
number of clusters and d as the number of categories (classes/treatments).
This setting is for a better interpretation property: if there are no overlaps
between each classes (mutually exclusive, say partial gastrectomy and total
gastrectomy), then ideally the clustering result should have a distinct distribution between different classes and the correctly labeled samples will be
straightforward to discover; otherwise, if there are overlaps between different
classes/treatments(say in our SEER data situation, there are operation treatment, radian treatment and operation+radian treatment), then this setting
will be convenient for us to analyze the demanded components of each class.
In the subsection 5.3 we will demonstrate the interpretation of the SEER
data we used in the experiment based on this scheme of cluster number setting.
The second topic of parameter setting is our selections for the Spectral Clustering and Xgboost API. In our work, we use the Spectral Cluster method
provided by SK-learn package with Python API. In the package, we specify
to use Arpack to compute the eigenvalue decomposition. This will lead to
a slightly higher time consumption, but the result will be significantly more
stable. The final clustering results are obtained by K-mean over the embedded space, and to obtain a close-to-optimal result, the method will compute
K-means in the embedded space with 10 different initializations to get the
best result. And in our program, the σ value used in equation 6 could either
be specified or be computed via equation 7. The parameters of Xgboost has
been discussed in section 3.3. In practice, we set tree maximum depth as
7, and η value as 0.5 to control the learning with a relatively conservative
scheme. We specified the max training iteration as 10 rounds for original
data and 5 rounds for artificially corrupted data, as this setting could provide as an optimal validation error.
The third point to be considered in practice is the tSNE visualization technique. In this project, we use the tSNE package provided by SK-learn. The
authors of the original paper proposed tSNE suggested that hyper-parameters
of tSNE is robust and won’t make too large an effect on the result. However,
in our practical experiment, things are much more tricky: the parameter of
’perplexity’, which determines the balance between local manifold and global
manifold, could significantly affect the clustering result and the optimal setting of this parameter will vary with the number of samples for visualization.
Briefly speaking, the quantity of perplexity should be in the same magnitude
of number of samples. For example, if we have 300 samples, then a perplexity
of 5-50 will be good for visualization; however, if we have 30000 sample, then
17
it seems the value of perplexity score should be adjusted to a larger value
accordingly.
In our program, we visualized the project of data in different clusters and
treatments(classes) with tSNE respectively. For the cluster illustration, we
randomly choose 50 samples from each cluster (150 sample in total) and set
perplexity=90, learning rate = 7 and use our precomputed distance with
equation 21; And for the classes illustration problem, we choose 100 samples from each treatment group (before and after processed by our sampling
method) and set perplexity=180 and learning rate = 7.
5.3. Experimental Result
There are in total 8683 valid records, with 3531 being treated with method
1, 3200 with method 2 and 1952 with method 3. And the result of clustering divide the data into a proportion of 2905 in cluster 1, 3817 in cluster 2
and 1961 in cluster 3. Specifically, the treatment-cluster data segment result
could be shown in table 1:
And the sampling probability computed by equation 13 could be illustrated
Cluster 1
New Treatment 1 210
New Treatment 2 2615
New Treatment 3 80
Cluster 2
2159
250
1408
Cluster 3
1162
335
464
Table 1: Treatment-Clustering Result
in table 2.
As we mentioned in the previous sections, the setting of d = n could helps us
Treatment 1
Treatment 2
Treatment 3
Cluster 1
0.0587
0.7921
0.0435
Cluster 2
0.4597
0.0576
0.5827
Cluster 3
0.4816
0.1503
0.3738
Table 2: Probability to sample for new data
explain the result. In table 1 and 2, it could be derived that: 1. patient characterized by cluster 1 should be predominately treated with treatment
2 (radian therapy); 2. patients characterized by cluster 3 and cluster 1
prefer to be treated by a treatment involved with operations, but those
18
who belongs to cluster 3 are more likely to reject radian therapy.
The illustration of the clustering result in 2-dimension could be shown as
figure 1. The result is produced with the settings stated in section 5.2 and
we could find out that the three clusters have clear boundaries against each
other, implying that the result should be rational. The red points, which
represent data from cluster 1, have a more distinct boundary comparing to
cluster 2 and 3, and this could be a supporting evidence for patients characterized by cluster 1 to be treated by a separate method.
The 2-d projection of training sets before and after process could be il-
Figure 1: Clustering Result in 2d. In the figure, red samples are from cluster
1, blue samples are from cluster 2 and green samples are from cluster
3. The group of red samples has a clear boundary with the rest two clusters,
comparing the relatively vague boundary between cluster 2 and 3
lustrated in figure 2. The figure could prove the rationality of our process
and the overlap between treatment 1 and 3. Meanwhile, we could find out
the data manifolds are more compact and have multiple ’clusters’ inside the
class, indicating that the dataset after process could be better categorized
comparing to those before process. This is more significant in figure 3 as
we specifically illustrate the manifold of treatment 1 and treatment 3.
To evaluate the quality of the computed propensity score, we need to compute the confounding metric after applying propensity score to the original
data. Here we consider propensity score weighting and employ Standardized Bias (SB) for several key features under ATE settings according to
[17]. The metric could denote the level of confound between two groups
(treatment and control groups) for each feature (covariate) and if the confounding level is lower (smaller in the metric) then it indicate that the data
after propensity score weighted is better randomized. The evaluation method
19
Figure 2: The comparison of data projection in 2-d plane of training set before
and after the proposed process. left: data manifold before process; right: data
manifold before process. In the figure, red samples are from treatment 1, blue
samples are from treatment 3 and green samples are from treatment 3.
Figure 3: The comparison of data projection inside treatment 1 and 2 in 2-d
plane of training set before and after the proposed process. In the figure, red
samples are from treatment 1 and green samples are from treatment 3.
top: data manifold before process; bottom: data manifold before process. From
the figure, we could find out that data manifold after our process tends to have
some difference between treatment 1 and 3, although they are still very similar.
20
(a) Comparison of data (b) Comparison of data (c) Comparison of data
with 20% corrupted
with 10% corrupted
with 40% corrupted
Figure 4: Data manifold before and after sampling procedure for data that added
artificial label corruptions. red samples are from treatment 1, blue samples
are from treatment 3 and green samples are from treatment 3. For each
sub-figure, left: before precess, right: after process
Age
Processed Data + 0.165
Xgboost
Original Data + 0.138
Xgboost
Raw Data with- 0.089
out
Propensity
Weighting
Race
CS
NODE
0.0025 0.0085
CS
SIZE
0.2054
D
AJCC S
0.0695
Survive
Month
0.3118
0.0241 0.1096
0.0519
0.1377
0.1315
0.0446 0.2346
0.3857
0.7434
0.5806
Table 3: Standardized Bias between treatment group 1 and 2
could only compare two groups (classes) so that here we have 32 = 3 combinations. The comparison of the Standardized Bias could be found in table
3, 4 and 5. Here, the Processed Data was trained with xgboost for 10 iterations and the Original Data is a random subset of 3000 samples from the
whole dataset. Final training and testing mlogloss on Processed Data are
0.243960 and 0.552677; Final training and testing mlogloss on Original Data
are 0.222134 and 0.500497.
To demonstrate the effect of noise-correction for further corrupted data, we
also compared the Standardized Bias between treatment 1 and treatment 2
for the data with 10%, 20% and 40% artificial corrupted label in table 6,
7 and 8 respectively. Notice here when computing the Standardized Bias
with the whole dataset, we use the authentic data. This will be the common
21
Age
Processed Data + 0.052
Xgboost
Original Data + 0.134
Xgboost
Raw Data with- 0.137
out
Propensity
Weighting
Race
CS
NODE
0.0085 0.1597
CS
SIZE
0.2363
D
AJCC S
0.1560
Survive
Month
0.0218
0.0051 0.3821
0.4261
0.3287
0.0714
0.0605 0.0364
0.0875
0.0307
0.1113
Table 4: Standardized Bias between treatment group 1 and 3
Age
Processed Data + 0.238
Xgboost
Original Data + 0.297
Xgboost
Raw Data with- 0.246
out
Propensity
Weighting
Race
CS
NODE
0.0134 0.0981
CS
SIZE
0.3440
D
AJCC S
0.2042
Survive
Month
0.3237
0.0357 0.1130
0.3157
0.4209
0.2432
0.0195 0.1997
0.4235
0.8343
0.8037
Table 5: Standardized Bias between treatment group 2 and 3
setting in real-life situations. Also notice that for the corrupted experiments
the xgboost only computed for 5 iteration for the overfitting consideration.
From the table, we could find that 1. propensity score computed by processed
data with xgboost could usually outperform the scores computed by original
sampled data with the same method; 2. the advantages of processed data will
increase as the proportion of corrupted data increase 3. xgboost generally
has a excellent and robust performance in computing propensity scores, and
the propensity score computed could still improve the randomization even
with 40% corrupted labels.
6. Conclusion
In this paper, a novel approach to deal with the corrupted-label problem
in computing propensity score for medical data is proposed and its property
22
Age
Processed Data +
Xgboost
Original Data +
Xgboost
Race
0.053
CS
NODE
0.0269 0.0932
CS
SIZE
0.3351
D
AJCC S
0.4977
Survive
Month
0.3784
0.045
0.0666 0.0811
0.1496
0.4988
0.4201
Table 6: Standardized Bias between treatment group 1 and 2 with 10% labels
corrupted
Age
Processed Data +
Xgboost
Original Data +
Xgboost
Race
0.059
CS
NODE
0.0553 0.0149
CS
SIZE
0.2696
D
AJCC S
0.4712
Survive
Month
0.4745
0.037
0.0474 0.1238
0.2757
0.5243
0.5577
Table 7: Standardized Bias between treatment group 1 and 2 with 20% labels
corrupted
is analyzed. The Xgboost approach is utilized to compute the propensity
score and the performance of the integrated approach is examined and compared. TSNE method is employed for comprehensive purpose and the data
manifold of different clusters and treatments are demonstrated.
The paper made following major contributions to the field: Firstly, the paper finds out the mislabeling-data problem in medical science and researched
on this topic. Given the fact that the problem has been under-investigated
before but the phenomenon is very common, the research would significantly
fill the blank of this aspect in bioscience research; Secondly, the paper proposed an effective method for getting a relatively authentic subset of training
data, and proved mathematically about its rationality and effectiveness. The
rigorous proof makes it possible for this method to be utilized into general
Machine Learning problems and solve a broader scope of tasks. Thirdly, the
paper employed Xgboost and tSNE methods to this area, which are relatively
novel attempts. The results imply a huge research potential in this area.
In the future, the author would like to concentrate more on mislabeling data
in bioscience area. We intend to try penalization-based label correction methods proposed in the field of Machine Learning, and design new algorithms
23
Age
Processed Data +
Xgboost
Original Data +
Xgboost
Race
CS
NODE
0.0250 0.0197 0.0968
CS
SIZE
0.3667
D
AJCC S
0.5715
Survive
Month
0.4491
0.0968 0.0244 0.1230
0.3194
0.5793
0.5826
Table 8: Standardized Bias between treatment group 1 and 2 with 40% labels
corrupted
specifically in dealing with medical data. Meanwhile, to analyze the confounding covariates, we plan to research on graphical model-based methods
in the long run.
24
References
[1] P. R. Rosenbaum, D. B. Rubin, The central role of the propensity score
in observational studies for causal effects, Biometrika 70 (1983) 41–55.
[2] W. Meng, S. Wang, J. Xia, J. Lyu, F. Shi, A simulation study for the
treatment effect using propensity score matching, Unpublished (2015).
[3] T. Chen, C. Guestrin, Xgboost: A scalable tree boosting system, CoRR
abs/1603.02754 (2016).
[4] Propensity score estimation: neural networks, support vector machines,
decision trees (cart), and meta-classifiers as alternatives to logistic regression, Journal of Clinical Epidemiology 63 (2010) 826 – 833.
[5] J. Kruppa, Y. Liu, G. Biau, M. Kohler, I. R. Knig, J. D. Malley,
A. Ziegler, Probability estimation with machine learning methods for
dichotomous and multicategory outcome: Theory, Biometrical Journal
56 (2014).
[6] A. Linden, P. R. Yarnold, Using classification tree analysis to generate
propensity score weights, Journal of Evaluation in Clinical Practice 23
(2017) 703–712. JECP-2017-0075.
[7] B. K. Lee, J. Lessler, E. A. Stuart, Improving propensity score weighting
using machine learning, Statistics in medicine 29 (2010).
[8] van der Laan, E. M., Polley, A. Hubbard, Super learner, Statistical
Applications in Genetics and Molecular Biology 6 (2007).
[9] R. Pirracchio, M. L. Petersen, M. van der Laan, Improving propensity score estimators’ robustness to model misspecification using super
learner, American Journal of Epidemiology 181 (2015) 108–119.
[10] N. Kreif, R. Grieve, I. Daz, D. Harrison, Evaluation of the effect of a
continuous treatment: A machine learning approach with an application
to treatment for traumatic brain injury, Health Economics 24 (2015)
1213–1228.
[11] C. Ju, M. Combs, S. D. Lendle, J. M. Franklin, R. Wyss, S. Schneeweiss,
M. J. van der Laan, Propensity score prediction for electronic healthcare
25
databases using Super Learner and High-dimensional Propensity Score
Methods, ArXiv e-prints (2017).
[12] C. Leyrat, S. R. Seaman, I. R. White, I. Douglas, L. Smeeth, J. Kim,
M. Resche-Rigon, J. R. Carpenter, E. J. Williamson, Propensity score
analysis with partially observed confounders: how should multiple imputation be used?, ArXiv e-prints (2016).
[13] R. Mitra, J. P. Reiter, Estimating propensity scores with missing covariate data using general location mixture models, Statistics in Medicine
(2011) 627–41.
[14] N. Natarajan, I. S. Dhillon, P. K. Ravikumar, A. Tewari, Learning with
noisy labels, in: C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani,
K. Q. Weinberger (Eds.), Advances in Neural Information Processing
Systems 26, Curran Associates, Inc., 2013, pp. 1196–1204.
[15] Y. Li, J. Yang, Y. Song, L. Cao, J. Luo, J. Li, Learning from noisy
labels with distillation, CoRR abs/1703.02391 (2017).
[16] A. de Brébisson, P. Vincent, An exploration of softmax alternatives
belonging to the spherical loss family, CoRR abs/1511.05042 (2015).
[17] D. F. McCaffrey, B. Griffin, D. Almirall, M. Slaughter, R. Ramchand,
L. Burgette, A tutorial on propensity score estimation for multiple
treatments using generalized boosted models, Statistics in medicine 32
(2013) 3388–3414.
26
| 2cs.AI
|
arXiv:1509.01519v3 [math.AC] 4 May 2017
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
MORDECHAI KATZMAN AND WENLIANG ZHANG
Abstract. We describe the support of F -finite F -modules over polynomial rings R of prime characteristic. Our description yields an algorithm to compute the support of such modules; the complexity of our
algorithm is also analyzed. To the best of our knowledge, this is the
first algorithm to avoid extensive use of Gröbner bases and hence of
substantial practical value. We also use the idea behind this algorithm
to prove that the support of HIj (S) is Zariski closed for each ideal I of
S where R is noetherian commutative ring of prime characteristic with
finitely many isolated singular points and S = R/gR (g ∈ R).
1. Introduction
Local cohomology is a powerful tool introduced by Alexander Grothendieck
in the 1960’s ([Har67]) and it has since yielded many geometric and algebraic insights. From an algebraic point of view, given an ideal I in
a commutative ring R, local cohomology modules HiI (−) (i ≥ 0) arise
as right-derived functors of the torsion functor on R-modules given by
ΓI (M ) = {a ∈ M | I k a = 0 for some k ≥ 0}. A central question in the
theory of local cohomology is to determine for which values of i does the
local cohomology module HiI (M ) vanish. This question is both useful and
difficult even in the case where R is a regular local ring and M = R, and this
case has been studied intensely since the introduction of local cohomology
(e.g., cf. [Har68], [PS73] and [Ogu73]).
The aim of this paper is to describe the support of local cohomology
modules in prime characteristic. Specifically, we first study the support of
F -finite F -modules over polynomial rings R and show a computationally
feasible method for computing these without the need to compute generating roots. To the best of our knowledge, this is the first computationally feasible algorithm for calculating the support of these modules in
prime characteristic. We then apply this to the calculation of supports
of local
cohomology
modules
and of iterated local cohomology modules
in
i2
i1
thus, for example, giving an effective method
HI1 HI2 . . . HIn (R) . . .
for determining the vanishing of Lyubeznik numbers.
2010 Mathematics Subject Classification. 13D45, 13A35.
Key words and phrases. local cohomology, prime characteristic.
M.K. gratefully acknowledges support from EPSRC grant EP/J005436/1. W.Z. is
partially supported by NSF grants DMS #1405602/#1606414.
1
2
MORDECHAI KATZMAN AND WENLIANG ZHANG
Our methods are interesting both from theoretical and practical points
of view. A careful analysis of the algorithms resulting from these methods
(see Section 4 below) shows that
(a) the degrees of the polynomials appearing in the calculations have a
low upper bound, and, furthermore,
(b) when the method is applied to the calculation of supports of local
cohomology modules, if the input is given by polynomials with integer coefficients, then the calculation of supports modulo different
primes p involves polynomials whose degrees can be bounded from
above by a constant times p, that constant being independent of p.
In [Lyu97]) Gennady Lyubeznik described an algorithm for computing
the support of F -finite F -modules. That algorithm requires the calculation
for roots of these modules, and this relies on the repeated calculation of
Grobner bases; these are often too complex to be computed in practice.
Our algorithm consists of an iterative procedure (as described in section 3)
which produces a quotient of a finite-rank free module with the same support
as the given F -finite F -module. To find the support itself one needs to find
a presentation for this submodule as a cokernel of a matrix: the support is
then defined by the ideal of maximal minors of that matrix.
Crucially, the iterative procedure above does not require the calculation
of Gröbner bases, and consists essentially of matrix multiplications together
with the listing of terms of polynomials whose degrees are bounded by a
constant (independent of p) times p. The final step of the algorithm, finding
a presentation of a finitely generated module, requires the calculation of one
module of syzygies, hence the calculation of one Gröber basis.
It is this that makes our algorithm a practical tool for computing supports
of F -finite F -modules.1
The reason why we are able to compute and analyze in characteristic p the
support of F -finite F -modules is the existence of the eth iterated Frobenius
e
endomorphism f e : R → R, taking a ∈ R to ap (e ≥ 0). The usefulness of
these lies in the fact that given an R-module M , we may endow it with a new
R-module structure via f e : let F∗e M denote the additive Abelian group M
denoting its elements {F∗e m | m ∈ M }, and endow F∗e M with the R-module
e
structure is given by aF∗e m = F∗e ap m for all a ∈ R and m ∈ M .
This also allows us to define the eth Frobenius functors from the category
of R-modules to itself given by FRe (M ) = F∗e R ⊗R M and viewing this as
a R-module via the identification of F∗e R with R: the resulting R-module
structure on FRe (M ) satisfies a(F∗e b ⊗ m) = F∗e ab ⊗ m and F∗e ap b ⊗ m =
F∗e b ⊗ am for all a, b ∈ R and m ∈ M .
We will be interested in this construction mainly for regular rings and
henceforth in this paper R will denote a regular ring of characteristic p > 0.
1The various algorithms in this paper have been incorporated in the “FSing” package
of Macaulay 2[GS].
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
3
Recall that an F -finite FR -module M is an R-module obtained as a direct
limit of a direct limit system of the form
U
F 2 (U )
F 1 (U )
M−
→ FR1 (M ) −−R−−→ FR2 (M ) −−R−−→ . . .
where M is a finitely generated module and U is an R-linear map (cf. [Lyu97]).
The main interest in F -finite F -modules follows from the fact that local cohomology modules are F -finite F -modules, as we now explain.
The jth local cohomology module of M with support on an ideal I ⊂ R is
defined as
(1)
e
HjI (M ) = lim
ExtjR (R/I [p ] , M )
→
e
where maps in the direct limit system are induced by the surjections R/I [p
e
R/I [p ] . If we apply this with M = R, we obtain
e+1 ]
e
HjI (R) = lim
ExtjR (R/I [p ] , R)
→
e
∼
ExtjR (FRe (R/I), FRe R)
= lim
→
e
j
e
∼
Ext
(R/I,
R)
F
= lim
R
R
→
e
e
where we use the facts that FRe (R) ∼
= R, FRe (R/I) ∼
= R/I [p ] , and that,
e
since R is regular, the Frobenius functor FR (−) is exact and thus commutes
with the computation of cohomology. This shows that HjI (R) are F -finite
F -modules, and we may apply our F -finite F -module machinery to them.
Finally, in section 7 we turn our attention to hypersurfaces and describe
the support of their local cohomology modules, which turn out to be closed.2
Given a fixed g ∈ R, one can ask for the locus of primes P ⊆ R for which
g
→ HiI (RP ) is injective and the locus
the multiplication by g map HiI (RP ) −
of primes for which this is surjective. We show that these two loci are
Zariski closed by describing explicitly the defining ideals of these loci, and
we use these to describe the defining ideal of the (Zariski closed) support for
HiI (R/gR). We also extend the Zariski-closedness of HiI (R/gR) to the case
when R has finitely many isolated singular points.
The methods used for the various calculations in this paper are described
in section 2.
2. Prime characteristic tools
Definition 2.1. Let e ≥ 0. Let T be a commutative ring of prime characteristic p.
2The fact that the support is closed was simultaneously and independently also discov-
ered by Mel Hochster and Luis Núñez-Betancourt in [HNB] using a different method.
→
4
MORDECHAI KATZMAN AND WENLIANG ZHANG
e
(a) Given any matrix (or vector) A with entries in T , we define A[p ]
to be the matrix obtained from A by raising its entries to the pe th
power.
e
(b) Given any submodule K ⊆ T α , we define K [p ] to be the R-submodule
e
of T α generated by {v [p ] | v ∈ K}.
Henceforth in this section, T will denote a regular ring with the property
that F∗e T are intersection flat T -modules for all e ≥ 0, i.e., for any family of
T -modules {Mλ }λ∈Λ ,
\
\
F∗e T ⊗T
Mλ =
F∗e T ⊗T Mλ .
λ∈Λ
λ∈Λ
F∗e T
are free T -modules (e. g. , polyThese include rings T for which
nomial rings and power series rings with F -finite coefficient rings,) and
also all complete regular rings (cf. [Kat08, Proposition 5.3]). These rings
have that property that for any collection of submodules {Lλ }λ∈Λ of T α ,
[pe ]
T
T
[pe ]
= λ∈Λ Lλ : indeed, the regularity of T implies that for
λ∈Λ Lλ
e
any submodule L ⊆ T α , L[p ] can be identified with FTe (L) and and the
intersection-flatness of F∗e T implies
\
\
\
\
FTe (
Lλ ) = F∗e T ⊗T
Lλ =
F∗e T ⊗T Lλ =
FTe (Lλ ).
λ∈Λ
λ∈Λ
λ∈Λ
λ∈Λ
The theorem below extends the Ie (−) operation defined on ideals in
[Kat08, Section 5] and in [BMS08, Definition 2.2] (where it is denoted
e
(−)[1/p ] ) to submodules of free R-modules.
Theorem 2.2. Let e ≥ 1. Given a submodule K ⊆ T α there exists a
e
minimal submodule L ⊆ T α for which K ⊆ L[p ] . We denote this minimal
submodule Ie (K).
Proof. Let L be the intersection of all submodules M ⊆ T α for which K ⊆
e
e
M [p ] . The intersection-flatness of T implies that K ⊆ L[p ] and clearly, L
is minimal with this property.
When F∗e T is T -free, this is a straightforward generalization of the calculation of Ie for ideals. To do so, fix a free basis B for F∗e T and note that
P
[pe ]
every element v ∈ T α can be expressed uniquely in the form v = b∈B ub b
where ub ∈ T α for all b ∈ B.
Proposition 2.3. Let e ≥ 1.
(a) For any submodules V1 , . . . , Vℓ ⊆ Rn , Ie (V1 + · · · + Vℓ ) = Ie (V1 ) +
· · · + Ie (Vℓ ).
(b) Let B be a free basis for F∗e T . Let v ∈ Rα and let
X [pe]
v=
ub b
b∈B
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
5
be the unique expression for v where ub ∈ T α for all b ∈ B. Then
Ie (T v) is the submodule W of T α generated by {ub | b ∈ B}.
Proof. The proof of this proposition is a straightforward modification of the
proofs of propositions 5.2 and 5.6 in [Kat08] and Lemma 2.4 in [BMS08].
Clearly, Ie (V1 +· · ·+Vℓ ) ⊇ Ie (Vi ) for all 1 ≤ i ≤ ℓ, hence Ie (V1 +· · ·+Vℓ ) ⊇
Ie (V1 ) + · · · + Ie (Vℓ ). On the other hand
e
e
e
(Ie (V1 ) + · · · + Ie (Vℓ ))[p ] = Ie (V1 )[p ] + · · · + Ie (Vℓ )[p ] ⊇ V1 + · · · + Vℓ
and the minimality of Ie (V1 + · · · + Vℓ ) implies that Ie (V1 + · · · + Vℓ ) ⊆
Ie (V1 ) + · · · + Ie (Vℓ ) and (a) follows.
e
Clearly v ∈ W [p ] , and so Ie (T v) ⊆ W . On the other hand, let W be a
P
e
[pe ]
submodule of T α such that v ∈ W [p ] . Write v = si=1 ri wi for ri ∈ T and
P
pe
wi ∈ W for all 1 ≤ i ≤ s, and for each such i write ri = b∈B rbi
b where
rbi ∈ T for all b ∈ B. Now
!
s
X [pe]
X X
e
e
[p ]
p
b
ub b = v =
wi
rbi
b∈B
b∈B
i=1
[pe ]
and
are direct sums, we comparePcoefficients and obtain ub =
P sincee these
[pe ]
p
s
for all b ∈ B and so ub = ( si=1 rbi wi ) for all b ∈ B hence
i=1 rbi wi
ub ∈ W for all b ∈ B.
The behavior of the Ie operation under localization and completion will
be crucial for obtaining the results of this paper. To investigate this we need
the following generalization of [LS01, Lemma 6.6].
Lemma 2.4. Let T be a completion of T at a prime ideal P . Let α ≥ 0 and
e
e
let W be a submodule of T α . For all e ≥ 0, W [p ] ∩ T = (W ∩ T )[p ] .
Proof. If T is local with maximal ideal P , the result follows from a straightforward modification of the proof of [LS01, Lemma 6.6].
We now reduce the general case to the previous case which implies that
e
e
W [p ] ∩ TP = (W ∩ TP )[p ] . Intersecting with T now gives
e
e
e
e
W [p ] ∩ T = (W ∩ TP )[p ] ∩ T = (W ∩ TP ∩ T )[p ] = (W ∩ T )[p ] .
Lemma 2.5 (cf. [Mur13]). Let T be a localization of T or a completion at
a prime ideal.
For all e ≥ 1, and all submodules V ⊆ T α , Ie (V ⊗T T) exists and equals
Ie (V ) ⊗T T.
e
Proof. Let L ⊆ T α be a submodule, such that L[p ] ⊇ V ⊗T T. We clearly
e
e
have L[p ] ∩ T α = (L ∩ T α )[p ] when T is a localization of T and when T is
a completion of T this follows from the previous Lemma. We deduce that
(L ∩ T α ) ⊇ Ie (V ⊗T T ∩ T α ) and hence L ⊇ (L ∩ T α ) ⊗T T ⊇ Ie (V ⊗T T ∩
T α ) ⊗T T.
6
MORDECHAI KATZMAN AND WENLIANG ZHANG
But since Ie (V ⊗T T ∩ T α ) ⊗T T satisfies
e
e
(Ie (V ⊗T T∩α ) ⊗T T)[p ] = Ie (V ⊗T T∩T α )[p ] ⊗T T ⊇ (V ⊗T T∩T α )⊗T T ⊇ V ⊗T T
we deduce that Ie (V ⊗T T ∩ T α ) ⊗T T is the smallest submodule K ⊆ T α
e
for which K [p ] ⊇ V ⊗T T. We conclude that Ie (V ⊗T T) equals Ie (V ⊗T T ∩
T α ) ⊗T T.
We always have
Ie (V ⊗T T) = Ie (V ⊗T T ∩ T α ) ⊗T T ⊇ Ie (V ) ⊗T T.
On the other hand
e
e
(Ie (V ) ⊗T T)[p ] = Ie (V )[p ] ⊗T T ⊇ V ⊗T T
hence Ie (V ⊗T T) ⊆ Ie (V ) ⊗T T and thus Ie (V ⊗T T) = Ie (V ) ⊗T T.
3. Calculation of supports of FR -finite FR -modules
We begin by recalling the following result from [Lyu97, Proposition 2.3].
Remark 3.1 (Vanishing of γt ). Let M be an FR -finite FR -module with a
generating homomorphsim γ : M → FR (M ). Let γt denote the composition
M → FR (M ) → · · · → FRt (M ). We may assume that M has a presentaA
→ Rβ → M → 0 and write the generating homomorphism as
tion: Rα −
U
Coker(A) −
→ Coker(A[p] ) where U is a β × β matrix with entries in R. Then
t
γt is the composition of Coker(A) → · · · → Coker(A[p ] ). Note that M = 0
if and only if there is a t such that γt = 0. We have
γt = 0 ⇔ Im(U [p
t−1 ]
⇔ It (Im U [p
t
◦ · · · ◦ U [p] ◦ U ) ⊆ Im(A[p ] )
t−1 ]
◦ · · · ◦ U [p] ◦ U ) ⊆ Im A
⇔ I1 (U I1 (· · · I1 (U I1 (Im U ))) ⊆ Im A
⇔
I1 (U I1 (· · · I1 (U I1 (Im U ))) + Im A
=0
Im A
where we made repeated use of the facts that for any submodule M ⊆ Rβ
ℓ
we have Iℓ+1 (M ) = I1 (Iℓ (M )) and also Iℓ (U [p ] M ) = U Iℓ (M ).
Theorem 3.2.
(a) If
Ie (Im U [p
e−1 ]
e
◦ · · · ◦ U [p] ◦ U ) = Ie+1 (Im U [p ] ◦ · · · ◦ U [p] ◦ U )
then
(2)
Ie (Im U [p
e−1 ]
◦ · · · ◦ U [p] ◦ U ) = Ie+j (Im U [p
e+j−1 ]
for all j ≥ 0.
(b) There exists an integer e such that (2) holds.
◦ · · · ◦ U [p] ◦ U )
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
7
e−1
Proof. Write Ve = Ie (Im U [p ] ◦ · · · ◦ U [p] ◦ U ). First we claim that if
Ve = Ve+1 then Ve = Ve+j for all j ≥ 0; we proceed by induction on j ≥ 0.
Using again the facts that for any submodule W ⊆ Rβ we have Iℓ+1 (M ) =
ℓ
I1 (Iℓ (M )) and that Iℓ (U [p ] M ) = U Iℓ (M ), we deduce that, if j ≥ 1, then
e+j−1
] ◦ · · · ◦ U [p] ◦ U )) = I (U V
Ve+j = I1 (Ie+(j−1) (Im U [p
1
e+j−1 ) and this, by
the induction hypothesis, equals I1 (U Ve ) = Ve+1 .
Next, we wish to show that for each prime ideal p there exists an integer
ep such that
(3)
Vep Rp = Vep +1 Rp .
and that for this ep , Vep +j Rp = Vep Rp for all j ≥ 0. After completing at p,
we have assume that our ring is a complete regular local ring, and we let E
cp . As this ring is complete
denote the injective hull of the residue field of R
and regular, there is a natural Frobenius map on E which we denote T ,
which can be extended to a Frobenius map on direct sums of E by letting
T act coordinate-wise; we denote these Frobenius maps also with T .
We now consider the Frobenius map Θ = U t T on E β ; in [KZ14, Lemma
e−1
3.6] it is shown that annE β Ie (Im U [p ] ◦ · · · ◦ U [p] ◦ U Rp )t ⊆ E β consists
of all elements killed by Θe . Now (cf. [HS77, Proposition 1.11] and [Lyu97,
e−1
Proposition 4.4]) show that there is an integer ep such that Iep (Im U [p ] ◦
ep
ep
· · · ◦ U [p] ◦ U Rp ) = Iep +1 (Im U [p ] ◦ · · · ◦ U [p] ◦ U Rp ) and Iep (Im U [p −1] ◦ · · · ◦
ep +j−1
U [p] ◦ U Rp ) = Iep +j (Im U [p ] ◦ · · · ◦ U [p] ◦ U Rp ) forall j ≥ 0. Crucially,
e−1
Lemma 2.5 implies that Ie Im U [p ] ◦ · · · ◦ U [p] ◦ U Rp = Ve Rp for all
e ≥ ep and so (3) holds.
Consider the following subsets of Spec(R):
Pt = {p ∈ Spec(R) | Vt Rp = Vt+1 Rp } = Spec R \ Supp
Vt
.
Vt+1
These form an increasing sequence of open subsets of Spec R, and since for
each prime ideal p there is an integer tp such that
S
Vtp Rp = Vtp +1 Rp ,
we have t Pt = Spec(R). Now the quasicompactness of Spec R, guarantees
the existence of an integer e such that Pe = Spec(R); clearly that e satisfies
(2).
e−1
e
Corollary 3.3. If Ie (Im U [p ] ◦· · ·◦U [p] ◦U ) = Ie+1 (Im U [p ] ◦· · ·◦U [p] ◦U ),
then
Im I (U [pe−1 ] ◦ · · · ◦ U [p] ◦ U ) + Im A
e
= SuppR (M).
SuppR
Im A
4. Our algorithm and its complexity
Henceforth in this paper R will denote a polynomial ring over a field K
of prime characteristic p.
8
MORDECHAI KATZMAN AND WENLIANG ZHANG
Let M be an F -finite F -module with a generating morphism M → FR (M ).
Let A be an α×β matrix, which gives a presentation of M , i.e. Coker A ∼
= M.
U
[p]
Let U be a β × β matrix, for which the map Coker A −
→ Coker A is isomorphic to a generating morphism M → FR (M ). We compute the support
of M as follows.
Initialize L = Rβ .
Compute L′ = I1 (U L).
Check whether L′ ⊆ L. If this holds, let L = L′ and go to (2).
A
Compute a presentation for L+Im
Im A as the cokernel of a matrix W
with entries in R.
(5) Compute the ideal J of maximal minors of W .
(6) Output J: this is the defining ideal of the support of M.
(1)
(2)
(3)
(4)
In the rest of this section we discuss the complexity of this algorithm for
computing supports of F -finite F -modules.
We start with the following observation, relevant to the complexity of
steps (2) and (3) above.
Remark 4.1. Let δ be the largest degree of an entry in U and for any j ≥ 0 let
δj be the largest degree of a polynomial in a generator of Lj . The calculation
of I1 (−) as described in Proposition 2.3 implies that δj+1 ≤ (δj + δ)/p hence
δe ≤
1
1
δ
δ0
.
+ δ( + · · · + e ) ≤
pe
p
p
p−1
The iterative calculation I1 (U L) in step (2) involves a matrix multiplication and a I1 (−) operation, which, in view of Proposition 2.3, amounts to
collecting terms in polynomials. The complexity of this step depends on
(a) the size β of U , which is an input to the algorithm and does not
depend on p,
(b) the total number of terms occurring in each of the coordinates of a
set of generators of L.
In the worst case scenario, if the maximal degree of an entry in Up is Cp,
the total number of terms in (b) is bounded by
Cp + n − 1 β
= O pβ(n−1) .
n−1
In practice, the number of terms is much lower than this worst case.
Checking the inclusion in step (3) does not require computing Gröbner
bases: the discussion above shows that both L and L′ are generated by
vectors whose coordinates are polynomials whose degrees are bounded by
D := δ/(p − 1), i.e., L and L′ are given by generators in (R≤D )β where R≤D
denotes the K-vector space of polynomials of degrees at most D in R. Thus
L′ ⊆ L can be checked by checking whether each given generator of L′ is in
the sub-vector space of (R≤D )β spanned by the generators of L.
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
9
Computing the presentation in step (4) of the algorithm involves computing the syzygies of the generators of L + Im A; this involves computing
a Gröbner bases for L + Im A.
In order to assess the practical advantage of our algorithm, we computed the support of 100 F -finite F -modules with randomly generated generating morphism C → FR1 (C) where C is a quotient of R2 and R =
Z/2Z[x1 , . . . , x5 ]. We denote t1 the time in seconds required by our algorithm to compute the support and t2 the time in seconds required to
compute a root using Grobner bases. The following is a plot of log t2 as a
function of log t1
log t2
+
+
6
+
+
+
+
4
+
++
+
+
++
+
+
+
+
+ +
+
+ ++ + +
+ + +
+
+
++
+
++
+ +++++
++
+
+
+
+
+
+++
++ +
++
+
+
++
++
+
+
+ +
+
2
+
+
++
+
−4
−2
++
+
+
+
+
++
+
+ ++
+
+
+
+
2
log t1
4
+
−2
+
++ +
+
+
+
+
+
+
−4
This suggests that for this characteristic and rank, t2 is approximately t21 .3
To further illustrate the effectiveness of our algorithm we compute the
following example.
Example 4.2. Consider three generic degree-2 polynomials in t: F1 (t) =
x0 + x1 t + x2 t2 , F2 (t) = y0 + y1 t + y2 t2 , F1 (t) = z0 + z1 t + z2 t2 . For any two
polynomials F (t), G(t) let Res(F, G) denote their Sylvester resultant, e. g. ,
x0 x1 x2 0
0 x0 x1 x2
Res(F1 , F2 ) = det
y0 y1 y2 0
0 y0 y1 y2
Let I denote the ideal generated by Res(F1 , F2 ), Res(F1 , F3 ), Res(F2 , F3 ), Res(F1 +
F2 , F3 ) in the polynomial ring R over a field k whose variables are the x,y,
and zs above. In [Lyu95] it was asked whether H4I (R) = 0 and this was
settled in prime characteristic p > 2 (cf. [Kat97]) and in characteristic zero
3The Macaulay2 code used to produce this data and the data itself is available at [KZ].
10
MORDECHAI KATZMAN AND WENLIANG ZHANG
(cf. [Yan99, Theorem 3].) We used an implementation of our algorithm [KZ]
with Macaulay2 ([GS]) to settle the remaining case of characteristic 2: a
20-second run calculated the support of H4I (R) to be empty.
5. The complexity of computing the support of local
cohomology
We can use the fact that local cohomology modules HiJ (R) are F -finite
F -modules and apply the results in the previous sections to compute their
supports. To do so we would need to exhibit a generating morphism for
these; a standard choice of generating morphism is given by the R-linear
map Extj (R/J, R) → Extj (R/J [p] , R) induced by the natural surjection
R/J [p] → R/J (cf. [Lyu97, Proposition 1.11]). The calculation of this induced map would normally involve finding a free resolution F• for R/J,
extending the quotient map R/J [p] → R/J to a map of free resulutions
FR1 (F• ) → F• , applying Hom(−, R) to both resolutions, and finally computing the induced map of cohomologies. Each of these steps involves computing
multiple Gröbner bases, and, therefore, potentially unfeasible even in simple
instances. For example, even when J is generated by one f ∈ R, the map of
f p−1
Ext1 (R/f R, R) → Ext1 (R/f p R, R) above is isomorphic to R/f −−−→ R/f p
and even when f is, say, a random polynomial of degree 5 in 5 variables,
expanding f p−1 is not feasible beyond the first few primes (e.g., the M2
server Habanero crashes after p = 13.) Clearly, if the calculation of a generating morphism is infeasible, the algorithm of the preceding section cannot
be used to calculate the support of the given local cohomology module.
However, in those cases when a generating morphism can actually be
computed, the method above is guaranteed to produce generating morphisms which yield “bounded” generating morphism working over increasing prime characteristics p, as we describe below. Let S = Z[x1 , . . . , xn ] and
let J ⊆ S be an ideal. For any prime p let Jp denote the image of J in
Rp = Z/pZ[x1 , . . . , xn ]. An interesting and natural question arising in this
context is the description of the properties of the local cohomology module
HjJp (Rp ) as p ranges over all primes and we now turn our attention to these.
For different choices of prime p the matrices A and U above will be different and this could result in different values of δe which are unbounded
as p ranges over all primes. We now show that this is not the case. Let
Up denote the square matrix that induces the map Extj (Rp /Jp , Rp ) →
[p]
Extj (Rp /Jp , Rp ) and δp to denote the maximal degree of entries in Up .
We also denote L0,p = Rp and Li+1,p = I1 (Up Li,p ) and use δe,p to denote the
largest degree of a polynomial in a generator of Le,p .
A
A
A
1
2
s
Theorem 5.1. Let 0 → S bs −→
−→
S → S/J → 0 be a
→
S b1 −
· · · −−
free resolution of S/J. Let ∆ denote the maximal degree of any entry in
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
11
A1 , . . . , As . Let p be a prime integer which is also a regular element on S/J.
Then δe,p ≤ 2j∆ for all integers e ≥ 1.
Proof. Since p is a regular element on S/J, tensoring the free resolution of
S/J with R/pR produces a free resolution of Rp /Jp . Hence the maximal
degree of entries in the maps of this free resolution of Rp /Jp is at most ∆.
b
b
Let θj denote the map Rpj → Rpj in the following commutative diagram
[p]
induced by Rp /Jp → Rp /Jp
0
/ Rbs
p
O
As,p
/ ···
/ Rbs
p
Aj,p
/ ···
/ Rb1
p
A1,p
[p]
As,p
/ ···
/ Rpbj
/ Rp
O
/ Rp /Jp
O
/0
/ Rp /Jp[p]
/0
=
θj
θs
0
/ Rpbj
O
[p]
Aj,p
/ ···
/ Rb1
p
[p]
A1,p
/ Rp
An easy induction on j shows that the maximal degree of entries in θj is at
[p]
most jp∆. The map Up : Extj (Rp /Jp , Rp ) → Extj (Rp /Jp , Rp ) is induced
by the transpose of θj and hence the maximal degree in an entry of Up is
also bounded by jp∆ (cf. Remark 4.1.) Now
jp∆
≤ 2j∆,
δe,p ≤
p−1
for all e ≥ 1.
Corollary 5.2. There is an integer N , independent of p, such that δe,p ≤ N
for all e and all p.
In particular, there is an integer N ′ , independent of p, such that min{e |
Le,p = Le+1,p } ≤ N ′ for all p, i.e. for each prime integer p, the number of
steps required to compute the stable value Le,p is bounded by N ′ .
Proof. The second statement follows immediately from the first since, once
the degree is bounded, the number of steps will be bounded by the number
of monomials with the bonded degree.
To prove the first statement, it suffices to note there are only finitely
many associated prime ideals of S/J in S and hence p is a regular element
on S/J for almost all p.
6. Iterated local cohomology modules
Let f1 , . . . , fm be a L
sequence of elements in R and let N be an R-module.
We will write Ki :=
1≤j1 <···<ji ≤m Nj1 ···ji to denote the i-th term of the
Koszul (co)complex K• (M ; f ) (where each Nj1 ···ji = N ), and we will use
H i (N ; f ) to denote the i-th Koszul (co)homology.
Proposition 6.1. Let M be an FR -finite FR -module with a generating hoϕ
momorphism M −
→ FR (M ) and let I = (f1 , . . . , fm ) be an ideal of R. Then
HIi (M) admits a generating homomorphism
H i (M ; f ) → FR (H i (M ; f )).
12
MORDECHAI KATZMAN AND WENLIANG ZHANG
Proof. Consider the following commutative diagram:
..
.O
..
.O
FR (φ1 )
FR (φi )
/ FR (K 1 )
/ ···
O FR (δ1 )
0
φ1
/ K1
0
..
.O
FR (φm )
/ ···
/ FR (K i )
O FR (δi )
/ FR (K m ) = FR (M )
O
φi
δ1
/ ···
/ Ki
/0
φm
δi
/ Km = M
/ ···
/
where the bottom row is the Koszul (co)complex of M on f and
φi :
M
1≤j1 <···<ji ≤m
⊕1≤j
p−1
<···<j ≤m ϕ◦(fj1 ···fji )
i
Mj1 ···ji −−−−1−−−−−
−−−−−−−−−−−→ FR (
M
Mj1 ···ji ).
1≤j1 <···<ji ≤m
It follows from [Lyu97, 1.10(c)] that the φi are generating morphisms of
Mfj1 ···fji . Therefore taking direct limit of each row of the diagram produces
the Čech complex Č(M; f ). Since taking direct limits preserves exactness,
lim(H i (M ; f ) → FR (H i (M ; f )) → · · · ) = HIi (M). Our conclusion follows.
−→
Combining what we have so far in this section, we now have an algorithm
to compute the support of HIi11 · · · HIiss (R). For example, the case s = 2 relevant to the calculation of Lyubeznik numbers in handled as follows. Start
with a generating morphism Exti2 (R/I2 , R) → FR (Exti2 (R/I2 , R)). Using
Proposition 6.1, we know that the Koszul cohomology H i1 (Exti2 (R/I2 , R); f )
(with I1 = (f )) is a generating homomorphism of HIi11 HIi22 (R). We may then
apply Corollary 3.3 to compute the support of HIi11 HIi22 (R).
7. The support of local cohomology of hypersurfaces
Throughout this section R denotes a regular ring of prime characteristic
p, I ⊆ R an ideal, and g ∈ R some fixed element.
Following [Lyu97, §2] we write
3φ
2φ
FR
FR
φ
2
i
i
i
1
i
HI (R) = lim ExtR (R/I, R) −
→ FR ExtR (R/I, R) −−→ FR ExtR (R/I, R) −−→ . . .
→
φ
where FRe (−) denotes the eth Frobenius functor, and φ : ExtiR (R/I, R) −
→
i
i
1
[p]
∼
FR ExtR (R/I, R) = ExtR (R/I , R) is the R-linear map induced by the
A
i
surjection R/I [p] → R/I. For all i ≥ 0 we fix a presentation Rαi −→
Rβi where Ai is a βi × αi matrix with entries in R. We can now find a
φ
βi × βi matrix Ui with entries in R for which the map φ : ExtiR (R/I, R) −
→
FR1 ExtiR (R/I, R) is isomorphic to the map Ui : Coker Ai → FR1 (Coker Ai ) =
[p]
Coker Ai given by multiplication by Ui .
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
13
Theorem 7.1. For any i ≥ 0 consider the map g : HiI (RP ) → HiI (RP ) given
by multiplication by g. Let Ii denote the set of primes P ⊂ R for which the
map g is not injective and let Si denote the set of primes P ⊂ R for which
the map g is not surjective. For ℓ, e, j ≥ 0 write
[pe+j−1 ]
(ℓ)
Vej = Uℓ
[pe+j−2 ]
Uℓ
[pe ]
· · · Uℓ
.
Then
(i)
(a)
Ii
is closed and equal to Supp
(ker V0η :Rβ g)
(i)
ker V0η
(b) Si is closed and equal to Supp S
j≥0
for some η > 0,
Rβ
(i)
j
gRβ + Im A[p ] :Rβ V0j
(c) the support of HiI (R/gR) is closed and equal to Ii ∪ Si .
, and
Proof. Fix some i ≥ 0 and write β, A and U for βi , Ai and Ui . The map
g : HiI (R) → HiI (R) can be described as a map of direct limit systems
(4)
Coker A
U
/ Coker A[p]U
g
Coker A
[p]
e−1 ]
U [p /
/ ...
Coker A[p
g
U
[pe ]
eU
]
/ ... .
g
U [p]
/ Coker A[p]
e−1 ]
U [p
/ Coker A[peU]
/ ...
[pe ]
/ ...
(i)
For any e, j ≥ 0 abbreviate Vej = Vej , and note that it is the matrix
e
e+j
corresponding to the composition map Coker A[p ] → Coker A[p ] in the
direct limits in (4). Any element in HiI (RP ) can be represented by an element
[pe ]
a ∈ Coker AP for some e ≥ 0, and this element represents the zero element
[pe+j ]
if and only if there exists a j ≥ e for which Vej a ∈ Im AP
only if
a ∈ (Im A[p
e+j ]
, i.e., if and
:Rβ Vej )P .
j
Consider the kernels Kj of the maps V0j : Coker A → Coker A[p ] ; these form
an ascending chain of submodules of Coker A and hence stabilize for all j
e
e+j
beyond some η ≥ 0. Note that the map Vej : Coker A[p ] → Coker A[p ]
is obtained by applying the exact functor FRe (−) to the map V0j , hence the
kernels of the maps Vej also stabilize for j ≥ η.
To prove (a) we now note that an element in HiI (RP ) represented a ∈
[pe ]
Coker AP is multiplied by g to zero
a ∈ (ker Veη :Rβ g)P
if and only if
(ker Veη :Rβ g)
= 0, i.e., if g is not
and so g is injective if and only iff
ker Veη
P
a zero divisor on Rβ / ker Veη P . But Rβ / ker Veη = FRe (Rβ / ker V0η ) and,
since R is regular, FRe (Rβ / ker V0η ) and Rβ / ker V0η have the same associated
primes, so we deduce that multiplication
by g is injective if and only if g is
not a zero divisor on Rβ / ker V0η P . We deduce that for a prime P ⊂ R,
14
MORDECHAI KATZMAN AND WENLIANG ZHANG
multiplication by g on HiI (RP ) is injective if and only if
(ker V0η :Rβ g)
=0
ker V0η
P
so Ii = Supp
(ker V0η :Rβ g)
.
ker V0η
To prove (b) we now note that an element in HiI (RP ) represented a ∈
[pe ]
Coker AP is in the image
of g if and only if there exists a j ≥ 0 such that
[pe+j ]
β
hence g is surjective if for all e ≥ 0,
Vej a ∈ gR + Im AP
[
e+j
gRβ + Im A[p ] :Rβ Vej
= Rβ P .
P
j≥0
Furthermore,
[p]
e+1+j ]
e+j
=
gp Rβ + Im A[p
:Rβ Ve+1,j
gRβ + Im A[p ] :Rβ Vej
e+1+j ]
⊆
gRβ + Im A[p
:Rβ Ve+1,j
so for for all e ≥ 0,
[
gRβ + Im A[p
e+j ]
:Rβ Vej
j≥0
if and only if
[
j≥0
j
gRβ + Im A[p ] :Rβ V0j
P
P
= Rβ P
= Rβ P .
We conclude that g is not surjective if and only if P ∈ Supp Rβ /
To prove (c) consider the long exact sequence
S
j≥0
j
gRβ + Im A[p ] :Rβ V0j .
g
g
→ Hi+1
· · · → HiI (R) −
→ HiI (R) → HiI (R/gR) → Hi+1
I (R) → . . .
I (R) −
g
induced by the short exact sequence 0 → R −
→ R → R/gR
→ 0. Note that
g
i
i
i
HI (R/gR)P = 0 if and only if both HI (R) −
→ HI (R)
is surjective and
P
g
→ Hi+1
Hi+1
and the result follows.
I (R)
I (R) −
P
Question 7.2. Theorem 3.2 gives us an effective method for the calculation
of Ii . However, we do not know how to compute Si , hence we ask the
following: is there an effective method to bound the value of e for which
[
e
j
(i)
(i)
gRβ + Im A[p ] :Rβ V0j = gRβ + Im A[p ] :Rβ V0e ?
j≥0
It turns out that part of our Theorem 7.1 can be extended to the case of
isolated singular points.
THE SUPPORT OF LOCAL COHOMOLOGY MODULES
15
Corollary 7.3. Let R be a noetherian commutative ring of prime characteristic that has finitely many isolated singular points. Let g ∈ R be a
nonzerodivisor. Then Supp(HIj (R/gR)) is Zariski-closed for each integer j
and ideal I of R.
Proof. Let
T {m1 , . . . , mt } denotes the set of isolated singular points of R.
Set a = ti=1 mi . Let {f1 , . . . , fs } be a set of generators of a. It follows
from Theorem 7.1 that SuppRf (HjI (Rfk /gRfk )) is closed, i.e. it has finitely
k
many minimal associated primes. By the bijection between the set of associated primes of HjI (R/gR) that do not contain fk and Ass(HjI (Rfk /gRfk )),
it follows that the minimal associated primes of HjI (R/gR) are contained
in the union of {m1 , . . . , mt } and the set of minimal associated primes of
HjI (Rfk /gRfk ) which is a finite set.
The proof of Corollary 7.3 can also be used to prove the following result
which is of independent interest.
Proposition 7.4. Let R be either
(1) a noetherian commutative ring of prime characteristic, or
(2) of finite type over a field of characteristic 0.
Suppose that R has finitely many isolated singular points. Then HjI (R) has
only finitely many associated primes for each integer j and each ideal I of
R.
Proof. Let {m1 , . . . , mt } denotes the set of isolated singular points of R. Set
T
a = ti=1 mi . Let {f1 , . . . , fs } be a set of generators of a. It follows from
our assumptions on R that Rfk is either a noetherian regular ring of prime
characteristic or a regular ring of finite type over a field of characteristic 0
(cf. [Lyu93, Corollary 3.6]). Consequently, Ass(HjI (Rfk )) is finite for each
generator fk . Since there is a bijection between the set of associated primes
of HjI (R) that do not contain fk and Ass(HjI (Rfk )), it follows that
Ass(HjI (R))
⊆
s
[
Ass(HjI (Rfk ))
k=1
[
{m1 , . . . , mt }.
Acknowledgement
We would like to thank the anonymous referee whose suggestions and
criticisms improved this paper substantially.
References
[BMS08] M. Blickle, M. Mustaţă, and K. Smith: Discreteness and rationality of
F-thresholds, Michigan Math. J. 57 (2008), 43–61.
[GS]
D. R. Grayson and M. E. Stillman: Macaulay2, a software system for research in algebraic geometry.
16
[Har67]
MORDECHAI KATZMAN AND WENLIANG ZHANG
R. Hartshorne: Local cohomology, A seminar given by A. Grothendieck, Harvard University, Fall, vol. 1961, Springer-Verlag, Berlin, 1967. MR0224620 (37
#219)
[Har68]
R. Hartshorne: Cohomological dimension of algebraic varieties, Ann. of Math.
(2) 88 (1968), 403–450. 0232780 (38 #1103)
[HS77] R. Hartshorne and R. Speiser: Local cohomological dimension in characteristic p, Ann. of Math. (2) 105 (1977), no. 1, 45–79. MR0441962 (56 #353)
[HNB]
M. Hochster and L. Núñez-Betancourt: Support of local cohomology modules over hypersurfaces and rings with FFRT, preliminary preprint.
[Kat97] M. Katzman: The cohomological dimension of a resultant variety in prime
characteristic p, J. Algebra 191 (1997), no. 2, 510–517. 1448806 (98a:13023)
[Kat08] M. Katzman: Parameter-test-ideals of Cohen-Macaulay rings, Compos. Math.
144 (2008), no. 4, 933–948. MR2441251 (2009d:13030)
[KZ]
M. Katzman and W. Zhang:
A macaulay2 library for computing
supports
of
F-finite
F-modules,
Freely
available
from
http://www.katzman.staff.shef.ac.uk/Fsupport/.
[KZ14] M. Katzman and W. Zhang: Annihilators of Artinian modules compatible
with a Frobenius map, J. Symbolic Comput. 60 (2014), 29–46. 3131377
[Lyu93] G. Lyubeznik: Finiteness properties of local cohomology modules (an application of D-modules to commutative algebra), Invent. Math. 113 (1993), no. 1,
41–55. 1223223 (94e:13032)
[Lyu95] G. Lyubeznik: Minimal resultant systems, J. Algebra 177 (1995), no. 2, 612–
616. 1355218 (96i:13013)
[Lyu97] G. Lyubeznik: F -modules: applications to local cohomology and D-modules in
characteristic p > 0, J. Reine Angew. Math. 491 (1997), 65–130. MR1476089
(99c:13005)
[LS01]
G. Lyubeznik and K. E. Smith: On the commutation of the test ideal with
localization and completion, Trans. Amer. Math. Soc. 353 (2001), no. 8, 3149–
3180 (electronic). MR1828602 (2002f:13010)
[Mur13] S. Murru: On the upper semi-continuity of HSL numbers, arXiv:1302.1124.
[Ogu73] A. Ogus: Local cohomological dimension of algebraic varieties, Ann. of Math.
(2) 98 (1973), 327–365. 0506248 (58 #22059)
[PS73] C. Peskine and L. Szpiro: Dimension projective finie et cohomologie locale.
Applications à la démonstration de conjectures de M. Auslander, H. Bass et
A. Grothendieck, Inst. Hautes Études Sci. Publ. Math. (1973), no. 42, 47–119.
MR0374130 (51 #10330)
[Yan99] Z. Yan: Minimal resultant systems, J. Algebra 216 (1999), no. 1, 105–123.
1694582 (2000d:14022)
Department of Pure Mathematics, University of Sheffield, Hicks Building,
Sheffield S3 7RH, United Kingdom
E-mail address: M.Katzman@sheffield.ac.uk
Department of Mathematics, Statistics, and Computer Science, University
of Illinois at Chicago, 851 S. Morgan Street, Chicago, IL 60607-7045
E-mail address: wlzhang@uic.edu
| 0math.AC
|
Picasso, Matisse, or a Fake?
Automated Analysis of Drawings at the Stroke Level
for Attribution and Authentication∗
arXiv:1711.03536v1 [eess.IV] 8 Nov 2017
Ahmed Elgammal1,2 †, Yan Kang1 , Milko Den Leeuw3
1
Artrendex LLC., NJ, USA‡
2
Department of Computer Science, Rutgers University, NJ, USA
3
Atelier for Restoration & Research of Paintings (ARRS),
The Hague, The Netherlands
November 13, 2017
Abstract
This paper proposes a computational approach for analysis of strokes in line drawings by
artists. We aim at developing an AI methodology that facilitates attribution of drawings of
unknown authors in a way that is not easy to be deceived by forged art. The methodology used
is based on quantifying the characteristics of individual strokes in drawings. We propose a
novel algorithm for segmenting individual strokes. We designed and compared different handcrafted and learned features for the task of quantifying stroke characteristics. We also propose
and compare different classification methods at the drawing level. We experimented with a
dataset of 300 digitized drawings with over 80 thousands strokes. The collection mainly consisted of drawings of Pablo Picasso, Henry Matisse, and Egon Schiele, besides a small number
of representative works of other artists. The experiments shows that the proposed methodology can classify individual strokes with accuracy 70%-90%, and aggregate over drawings
with accuracy above 80%, while being robust to be deceived by fakes (with accuracy 100% for
detecting fakes in most settings).
1
Introduction
Attribution of art works is a very essential task for art experts. Traditionally, stylistic analysis
by expert human eye has been a main way to judge the authenticity of artworks. This has been
pioneered and made a methodology by Giovanni Morelli (1816-1891) who was a physician and
∗
This paper is an extended version of a paper that will be published on the 32nd AAAI conference on Artificial
Intelligence, to be held in New Orleans, USA, February 2-7, 2018
†
Corresponding author: Ahmed Elgammal elgammal@artrendex.com
‡
http://www.artrendex.com
1
art collector, in what is known as Morellian analysis. This connoisseurship methodology relies
on finding consistent detailed “invariant” stylistic characteristics in the artist’s work that stay away
from composition and subject matter. For example Morelli paid great attention to how certain body
parts, such as ears and hands are depicted in paintings by different artists, not surprisingly given
his medical background. This methodology relies mainly on the human eye and expert knowledge.
The work of van Dantzig [1] that we follow in this paper belongs to this methodology.
In contrast, technical analysis focuses on analyzing the surface of the painting, the underpainting, and/or the canvas material. There is a wide spectrum of imaging (e.g. infrared spectroscopy
and x-ray), chemical analysis (e.g. Chromatography), and radiometric (e.g. carbon dating) techniques that have been developed for this purpose. Mostly, this analysis aims to get insights on the
composition of the materials and pigments used in making the different layers of the work and
how that relates to what materials, were available at the time of the original artist or what the artist
typically used. These techniques are complementary and each of them has limitations to the scope
of their applicability. We refer the reader to [2] for comprehensive surveys of these techniques.
Analysis using computer vision and image processing techniques has been very sparsely and
cautiously investigated in the domains of attribution and forgery detection (e.g. [3, 4, 5, 6]). Image
processing has been used as a tool in conjunction with non-visual spectrum imaging, such as
analysis of x-ray imaging to determine canvas material and thread count (e.g. [4, 7]).
The question we address in this paper, is what role can the computer vision and AI technology
plays in this domain given the spectrum of the other available technical analysis techniques, which
might seem more conclusive. We argue that developing this technology would complement other
technical analysis techniques for three reasons. First, computer vision can uniquely provide a
quantifiable scientific way to approach the traditional stylistic analysis, even at the visual spectrum
level. Second, it would provide alternative tools for the analysis of art works that lie out of the
scope of applicability for the other techniques. For example, this can be very useful for detecting
forgery of modern and contemporary art where the forger would have access to pigments and
materials similar to what original artist had used). Third, computer vision has the potential to
provide a cost-effective solution compared to the cost of other technical analysis methods. For
example, in particular related to the topic of this paper, there are large volumes of drawings, prints,
and sketches for sale and are relatively cheap (in the order of a few thousand dollars, or even
few hundreds) compared to paintings. Performing sophisticated technical analysis in a laboratory
would be more expensive than the price of the work itself. This prohibitive cost makes it attractive
for forgers to extensively target this market.
It is worthy to mention that several papers have addressed art style classification, where style
is an art movement (e.g. Impressionism), or the style of a particular artist (e.g. the style of Van
Gogh) [8, 9, 10, 11, 12]. Such stylistic analysis does not target authentication. Such works use
global features that mainly capture the composition of the painting. In fact, such algorithm will
classify a painting done on the style of Van Gogh, for example, as Van Gogh, since it is designed
to do so.
Methodology
The methodology used in this paper is based on quantifying the characteristics of individual strokes
in drawings and comparing these characteristics to a large number of strokes by different artists using statistical inference and machine learning techniques. This process is inspired by the Pictology
2
Figure 1: Illustration of van Dantzig methodology on simple strokes. Spontaneous strokes differ
in their shape and tone at their beginning, middle and end. Figure from [1]
methodology developed by Maurits Michel van Dantzig [1] (1903 - 1960). Van Dantzig suggested
several characteristics to distinguish the strokes of an artist, and suggested that such characteristics
capture the spontaneity of how original art is being created, in contrast to the inhibitory nature of
imitated art.
Among the characteristics suggested by van Dantzig to distinguish the strokes of an artist are
the shape, tone, and relative length of the beginning, middle and end of each stroke. The characteristics include also the length of the stroke relative to the depiction, direction, pressure, and several
others. The list of characteristics suggested by van Danzig is comprehensive and includes, in some
cases, over one hundred aspects that are designed for inspection by the human eye. The main motivation is to characterize spontaneous strokes characterizing a certain artist from inhibited strokes,
which are copied from original strokes to imitate the artist style.
In this paper we do not plan to implement the exact list of characteristics suggested by van
Dantzig; instead we developed methods for quantification of strokes that are inspired by his methodology, trying to capture the same concepts in a way that is suitable to be quantified by the machine,
is relevant to the digital domain, and facilitates statistical analysis of a large number of strokes by
the machine rather than by human eye.
We excluded using comparisons based on compositional and subject-matter-related patterns
and elements. Most forged art works are based on copying certain compositional and subjectmatter-related elements and patterns. Using such elements might obviously and mistakenly connect a test subject work to figures and composition in an artist known works. In contrast to subject
matter and compositional elements, the characteristics of individual strokes carry the artist’s unintentional signature, which is hard to imitate or forge, even if the forger intends to do.
3
Contribution
In this paper we propose a computational approach for analysis of strokes in line drawings that
is inspired and follow the principles of Pictology, as suggested by van Dantzig. We propose and
validate a novel algorithm for segmenting individual strokes. We designed and compared different
hand-crafted and learned deep neural network features for the task of quantifying stroke characteristics. We also propose and compare different classification methods at the drawing level. We
experimented with a dataset of 300 digitized drawings with over 70 thousands strokes. The collection mainly consisted of drawings of Pablo Picasso, Henry Matisse, and Egon Schiele, besides
a small number of representative works of other artists. We extensively experimented on different
settings of attributions to validate the proposed methodology. We also experimented with forged art
works to validate the robustness of the proposed methodology and its potentials in authentication.
Table 1: Dataset collection: technique distribution
Technique Pen/brush (ink) Etching Pencil Drypoint Lithograph Crayon Charcoal Unknown
Total
Picasso
80
38
8
2
2
0
0
0
130
Matisse
45
10
5
2
14
1
0
0
77
Schiele
0
0
10
0
0
5
4
17
36
Modigliani
0
0
9
0
0
8
1
0
18
Others
20
0
0
0
9
4
1
2
36
Total
145
48
32
4
25
18
6
19
297
Strokes
36,533
19,645 9,300
914
6,180
4,648
666
2,204
80,090
Others: Georges Braque, Antoine Bourdelle, Massimo Campigli, Marc Chagall, Marcel Gimond,
Alexej Jawlensky, Henri Laurens, Andre Marchand, Albert Marquet, Andr Masson, Andre Dunoyer Dr Segonzac, Louis Toughague
2
2.1
Detailed Methodology
Challenges
The variability in drawing technique, paper type, size, digitization technology, spatial resolution,
impose various challenges in developing techniques to quantify the characteristic of strokes that
are invariant to these variability. Here we highlight some these challenges and how we addressed
them.
Drawings are made using different techniques, materials and tools, including, but not limited to
drawings using pencil, pen and ink, brush and ink, crayon, charcoal, chalk, and graphite drawings.
Different printing techniques also are used such as etching, lithograph, linocuts, wood cuts, and
others. Each of these techniques results in different stroke characteristics. This suggests developing
technique-specific models of strokes. However, typically each artist prefers certain techniques over
others, which introduce unbalance in the data collection, which need to be addressed. Therefore, in
this paper we are testing two hypotheses: technique specific vs. across technique comparisons, to
test if we can capture invariant stroke characteristic for each artist that persists across techniques.
Drawings are executed on different types of papers, which, along with differences in digitization, imply variations in the tone and color of the background. This introduces a bias in the data.
We want to make sure that we identify artists based on their strokes and not based on the color
4
tone of the paper used. Different types of papers along with the type of ink used result in different
diffusion of ink at the boundaries of the strokes which, combined with digitization effects, alter the
shape of the boundary of the stroke.
Drawings are made on different-sized papers, and digitized using different resolutions. The size
of the original drawing as well as the digitization resolution are necessary to quantify characteristics related to the width or length of strokes. Therefore, in this paper we quantify the characteristics
of the strokes in a metric basis after converting all the measurements to the metric system.
2.2
Data collection
A collection of 297 drawings were gathered from different sources to train, optimize, validate,
and test the various classification methodologies used in this study. The drawings selected are
restricted to line drawings, i.e, it excludes drawings that have heavy shading, hatching and watercolored strokes. The collection included drawings and prints by Picasso (130), Henry Matisse (77),
Egon Schiele (36), Amedeo Modigliani (18), and a small representative works of other artists (36),
ranging from 1910-1950AD. These artists were chosen since they were prolific in producing line
drawings during the first half of the Twentieth century.
The collection included a variety of techniques including: pen and ink, pencil, crayon, and
graphite drawings as well as etching and lithograph prints. Table 1 shows the number of drawings
for each artist and technique. In the domain of drawing analysis it is very hard to obtain a dataset
that is uniformly sampling artists and techniques. The collection is biased towards ink drawings,
executed mostly with pen, or using brush in a few cases. There is a total of 145 ink drawings in the
collection. The collection contains more works by Picasso than other artists. In all the validation
and test experiments an equal number of strokes were sampled from each artist to eliminate data
bias.
The collection included digitized works from books, downloaded digitized images from different sources, and screen captured images for cases where downloading was not permitted. The
resolution of the collected images varies depending on the sources. The effective resolution varies
from 10 to 173 pixel per cm depending on the actual drawing size and the digitized image resolution. Figure 2 shows the distribution of the digitized images resolution. Given this wide range
of resolutions, the algorithms and features used were designed to be invariant to the digitization
resolution.
Fake drawing dataset: In order to validate the robustness of the proposed approaches against being
deceived by forged art, we commissioned five artists to make drawings similar to those of Picasso
(24), Matisse (39) and Schiele (20) using the same techniques. We collected a total of 83 drawings
(24, 39, 20). None of these fake drawings was used in training the models. We only used them for
testing.
Figure 3 shows examples of the fake dataset mixed up with real drawings.
Because we do not expect the reader to be experts in authentication in art, to be able to judge
the quality of the fake drawings in isolation, we deliberately mixed up a collection of the fake
drawings with real drawings in Figure 3. If the reader is interested to know which of these images
are of fake or real drawings, please refer to the end of the paper.
5
Figure 2: Distribution of digitization resolution (in Pixel per cm units)
3
Stroke Segmentation
The stroke segmentation algorithm will be described here. See sample results in Figure 4 and 5.
A typical isolated stroke is a line or curve, with a starting point and endpoint. A stroke can
have zero endpoints (closed curve) or 1 endpoint, which are special cases that do not need further
segmentation. However, strokes typically intersect to form a network of tangled strokes that needs
to be untangled. A network of strokes is characterized by having more than 2 endpoints. Since
strokes are thin elongated structures; a skeleton representation would preserve their topological
structure even in a network configuration [13]. Therefore, the segmentation of strokes is done on
such a skeleton representation.
There is a large classical literature in computer vision on detecting junctions on edge maps as
a way to characterize object boundaries, infer about three-dimensional structure and form representations for recognition. Unlike classical literature which look at natural images, in our case
detecting junctions and endpoints is fortunately relatively easy since they persists in a skeleton
representation of the network of strokes. On the other hand, the challenge in our case is to use the
information of such junctions and endpoints to segment individual strokes.
In our case, junctions play crucial role in identifying the intersections between strokes. There
are two basic ways strokes intersect: occluder-occluded configuration to form a T-junction or two
strokes crossing each other to form an X-junction. A T-junction is a continuation point of the
occluding stroke and an endpoint for the occluded stroke. We need to preserve the continuation of
the occluding stroke at the T-junction.
The stroke segmentation algorithm takes a network of strokes and identifies one occluding
stroke at a time and remove it from the network of strokes to form a residual network(s) that is
recursively segmented. This is achieved by constructing a fully connected graph whose vertices
6
Figure 3: Examples of images of the fake dataset mixed up with real images of drawings by
Matisse, Picasso, and Schiele. See the key at the end of the document to tell which are real and
which are fake!
7
are the endpoints in the network and edges are weighted by the cost of reaching between each two
endpoints. The cost between two endpoints reflects the bending energy required at the junctions.
Let the endpoints in a network of strokes denoted by e1 , · · · , em and let the junction locations
denoted by j1 , · · · , jn . The cost of the path between any two end points ei to ej is cumulative
curvature along the skeleton path between them, where the curvature is only counted close to
junctions. The rational is that it does not matter how much bending a stroke would take as long as
it is not at junctions. Let γ(t) : [0 : 1] → R2 be the parametric representation of the skeleton curve
connecting ei and ej . The cost is defined as
c(ei , ej ) =
Z 1
κ(t) · φ(γ(t))dt
0
where κ(·) is the curvature and φ(·) is a junction potential function, which is a function of the
proximity to junction locations defined as
n
1X
2
φ(x) =
e(x−ji ) /σ
n i=1
After the graph construction, the minimum cost edge represents a path between two endpoints
with minimum bending at the junctions, which corresponding to an occluding stroke. In case of
a tie, the path with the longest length is chosen. The optimal stroke is removed from the skeleton
representation and from the graph. This involves reconnecting the skeleton at X-junctions (to allow
the detection of the crossing strokes) and new endpoints have to be added at T-junctions (to allow
the detection of occluded strokes. Removing a stroke from the graph involves removing all edges
corresponding to paths that go through the removed stroke. This results in breaking the graph to
one or more residual subgraphs, which are processed recursively.
4
4.1
Stroke Analysis Methodology
Quantifying Stroke Characteristics
This section explains the process of quantifying the characteristics of individual strokes and the
extracted features used to represent each stroke. The goal is to construct a joint feature space
that captures the correlation between the shape of the stroke, its thickness variation, tone variation,
local curvature variation. For this purpose we studied two different types of features and their combination: 1) Hand-crafted features capturing the shape of each stroke and its boundary statistics, 2)
Learned-representation features capturing the tone variation as well as local shape characteristics.
The next two subsection describe each of these features.
4.1.1
Hand-crafted Features
In our study, each stroke is represented by its skeleton, its boundary, and the rib length around
the skeleton. The following descriptors are extracted to quantify the characteristics of each stroke.
All the descriptors are designed to be invariant to translation, rotation, scaling, and change in
digitization resolution.
8
Figure 4: Examples of segmentation results. Top: Picasso lithograph. Bottom: Picasso ink drawing. - best seen in color
9
Figure 5: Examples of segmentation results. Top: Matisse etching. Bottom: Schiele ink drawing.
- best seen in color
10
Shape of the boundary: The shape of the stroke boundary is quantified by Fourier descriptors [14].
Fourier descriptors are widely used shape features for a variety of computer vision applications
such as character recognition and shape matching. Fourier descriptors provide shape features
that are proven to be invariant to translation, scaling, rotation, sampling, and contour starting
points [14]. We used 40 amplitude coefficients (first 20 harmonics in each direction) to represent the shape of the boundary of the stroke.
Reconstruction error profile: The mean reconstruction error, as a function of the number of harmonics used to approximate the shape of the strokes, is used as a descriptor of the smoothness of
the contour and the negative space associated with the stroke. In particular, we compute the mean
reconstruction error at each step while incrementally adding more harmonics to approximate the
shape of the stroke. The reconstruction error profile is normalized by dividing by the stroke mean
width in pixels to obtain a descriptor invariant to digitization resolution.
Contour Curvature descriptor: To quantify the curvature of the stroke contours, we use the first
and second derivatives of the angular contour representation. The distributions of these derivatives
are represented by their histograms.
Stroke thickness profile: To quantify the thickness of the stroke, we compute the mean and standard
deviation of the rib length around the skeleton of the stroke, as well as a histogram of the rib length.
All rib length measurements are mapped to mm units to avoid variations in digitization resolution.
Stroke Length: The length of the stroke is quantified as the ratio between the stroke skeleton length
to the canvas diagonal length. This measure is invariant to digitization resolution.
4.1.2
Deep Learned Features using RNNs
GRU Classification with Truncated Back Propagation Through Time:
Other than the traditional feed-forward neural networks specialized at fixed size input, e.g. images, recurrent neural network (RNN) could handle variable length sequence input x = (x1 , · · · , xT )
and either fixed length output or variable length output y = (y1 , · · · , yT ) by utilizing the hidden
state within. RNN sequentially takes input xt from the input sequence and update its hidden state
by:
ht = φθ (ht−1 , xt )
φθ is a nonlinear activation function with θ as parameters. In each time step, a corresponding
output could be generated through:
ŷt = gθ (ht , xt )
gθ is an arbitrary parametric function that is trained together with the recurrent cell.
Recently, it has been widely shown that the more complicated RNN model such as Long ShortTerm Memory (LSTM, [15]) or Gated Recurrent Unit (GRU, [16]) would eliminate the problem of
vanishing gradient [17], [18]. LSTM and GRU introduce some gating units that can automatically
determine how much the information flow could be used in each time step, by which the vanishing
gradient could be avoided.
In GRU, two gate units are introduced: reset gate and update gate. Reset gate controls how
much former hidden state would be used in calculating the current time step candidate ĥt .
rt = σ(Ur ht−1 + Wr xt )
11
Update gate controls how much current candidate ĥt would be updated and how much old hidden
state would be kept.
zt = σ(Uz ht−1 + Wz xt )
Then the candidate hidden state ĥt would be:
ĥt = tanh(U (rt
ht−1 ) + W xt )
And the final hidden state ht at time t is updated though:
ht = zt
ĥt + (1 − zt )
ht−1
Where U, W, Ur, Wr, Uu, Wu are the learned weight matrices and the biases are omitted here to
make the equations more compact. is a pointwise multiplication, and σ is a sigmoid function.
Given a stroke, a sequence of patches of fixed size are collected along the skeleton of the stroke
and fed to a GRU model as inputs. We tested both fixed size patches or adaptive size patches where
the radius of the patch is a function of the average stroke width in the drawing. In both cases the
input patches are scaled to 11x11 input matrices. To achieve invariant to the direction of the stroke,
each stroke is sampled in both directions as two separate data sequences (at classification, both a
stroke and its reverse either appear in training or testing splits ). We normalized the grey scale into
range (-1, 1), and flattened the 11 × 11 image into a 121-dimension vector. The activation function
we used in experiments is tanh function. Parameters are initialized from normal distribution with
mean = 0, standard deviation = 1. After comparing several optimizer functions, we found that the
RMSProp optimizer with learning rate 0.001 outperforms others.
The gradient is globally clipped to be less than 5 to prevent from gradient exploding,. And to
avoid gradient vanishing, we calculated the gradient by the truncated Back Propagation Through
Time. Each sequence is unrolled into a fixed size τ steps (τ = 30 in the experiments) at each time
to calculate the gradient and to update the network’s parameters. The label of original sequence is
assigned to each unrolling. Between each unrolling, the hidden state is passed on to carry former
time steps information. And within each unrolling, only the last time step hidden state is used in
the final linear transformation and Softmax function to get the predicted score of each class. The
loss function we used was the cross entropy.
xτ = (xt , ...xt+τ )
ht+τ = GRU (hinitial , xτ )
ŷ = sof tmax(Us ht+τ )
loss = −
X
ylog(ŷ)
hinitial = ht+τ
4.2
Stroke Classification
For the case of hand-crafted features, strokes are classified using a support vector machine (SVM)
classifier [19]. We evaluated SVM using Radial basis kernels as well as polynomial kernels. The
classifier produces posterior distribution over the classes. For the case of learned GRU features,
the classification of strokes is directly given by the trained networks. SVM was used to combine
hand-crafted features with the learned features in one classification framework. In such case, the
activation of the hidden units were used as features, and combined to the hand-crafted features.
12
4.3
Drawing classification:
A given drawing is classified by aggregating the outcomes of the classification of its strokes. We
used four different strategies for aggregating the stroke classification results, as described below.
• Majority Voting: In this strategy each stroke votes for one class. All strokes have equal votes
regardless of the certainty of the output of the stroke classifier.
• Posterior aggregate: In this strategy each stroke votes with a weight equal to its posterior
class probability. This results in reducing the effect of strokes that are not classified with
high certainty by the stroke classifier.
• k-certain voting: In this strategy, only the strokes with class posterior greater than a threshold
k are allowed to vote. This eliminates effect of uncertain strokes.
• certainty weighted voting: In this strategy each stroke vote is weighted using a gamma
function based on the certainty of the stroke classifier in classifying it.
5
Validation Experiments
This section describes the experiments conducted to test and validate the performance of the proposed stroke segmentation, stroke classification, and the drawing classification approaches on the
collected dataset. In particular, the experiments are designed to test the ability of the algorithms to
determine the attribution of a given art work and test its robustness to forged art.
5.1
Segmentation Validation
Validating the segmentation algorithm is quite challenging since there is no available ground truth
segmentation and because of the difficulty of collecting such annotation. It is quit a tedious process for a human to trace individual strokes to provide segmentation of them, specially such task
requires certain level of expertise. To validate the segmentation algorithm, we collected 14 drawings with medium difficulty (in terms of number of strokes) from the collection and showed the
segmentation results to two artists and asked them independently to locate errors in the segmentations. Figure 6 shows an example of a drawing with its two annotations of the results. A closer
look highlights that annotators make several mistakes (false positive, and false negatives). Table 2
shows the number of marked errors for each sample image by two evaluators. The overall error per
annotator is computed as: Error rate = total marked errors at junctions / total number of strokes;
where the total is aggregated over all evaluated images. The average error rate over the two annotators is 12.94% , counting all labeled errors by annotators. The annotation shows large deviations
between the two annotators, with mean deviation 24.93 and standard deviation 12%. This highlight
the challenge in validating the segmentation results by human annotation. However, most of the
marked errors are at small detailed strokes that are hard to segment, even by the human eye, and
does not contribute much to the classification of strokes since small strokes are filtered out anyway.
13
Figure 6: Example of two drawings by Picasso, stroke segmentation results, and segmentation
errors marked by two artists.
5.2
Stroke Classification
Evaluation Methodology: In all experiments the image datasets were split into five 80/20% folds
to perform five-fold cross validation. Since strokes from the same drawings might share similar
characteristics, we did this splits at the image level and not at the stroke level. For each fold, after
splitting the images to train and test sets, equal number of strokes were sampled for each artist class
for training and testing to avoid the bias in the data, which is significant in our case. We evaluated
different classification settings including pair-wise classification, and one-vs-all classification, and
multi-class classification. Extensive ablation studies are also performed to evaluate the different
features and their effects, as well as to choose the optimal settings.
14
Table 2: Validation of Stroke Segmentation
Sample Number of
Strokes
1
596
2
366
3
314
4
216
5
267
6
122
7
136
8
131
9
102
10
71
11
159
12
123
13
103
14
196
Total
2902
Mean
Std
5.2.1
Evaluator 1
Marked Errors
34
37
38
24
69
40
28
32
22
17
48
30
25
65
509
Evaluator 2
Marked Errors
75
17
11
11
13
14
10
12
10
6
15
8
10
30
242
Absolute deviation
between Evaluators
41
20
27
13
56
26
18
20
12
11
33
22
15
35
24.93
12.72
Stroke Classification Validation - Technique Specific - Pairwise:
For testing technique-specific classifiers, we trained pairwise classifiers to discriminate between
Picasso and Matisse drawings made using either pen/ink or etching. We chose these two techniques
and these two artists since they have the largest representation in our collection. Table 3 shows the
stroke classification results. The experiments is done using five-fold cross validation and the mean
and standard deviations are reported. The table shows a comparison between the different types of
proposed features.
Table 3: Validation of Stroke Classifier - Technique specific (Picasso vs Matisse)
Ink Drawing (Pen/Brush) (Picasso vs Matisse)
Approach
Train
Test
Hand-Crafted - SVM-RBF
87.99% (0.39%)
79.16% (0.26%)
Hand-Crafted - SVM-POLY 79.88% (0.14%)
77.17% (0.58%)
GRU
84.92 % ( 1.89%) 65.86 (13.58 % )
Etching Prints (Picasso vs Matisse)
Approach
Train
Test
Hand-Crafted - SVM-RBF
94.53% (0.22%)
84.18% ( 0.85 %)
Hand-Crafted - SVM-POLY 94.27% (0.21%)
93.09% ( 0.88%)
GRU
83.74% (4.60 % ) 75.08% (8.11%)
5.2.2
Stroke Classification Validation - One-vs-all:
In this experiment a one-vs-all classification settings is used to build classifiers for Picasso-vsNon-Picasso, Matisse-vs-Non-Matisse, Schiele-vs-Non-Schiele. These three artists are chosen
15
since they have enough data for training and testing the classifiers in a five-fold split setting. The
classifiers are then evaluated on the fake dataset (see Section 5.3 ).
We evaluated the performance of two settings:
1. across-techniques: we evaluated the performance of the stroke classifiers on all techniques
combined to evaluate whether the classifier can capture an invariant for the artist regardless
of the technique used.
2. Technique-specific: in this setting each classifier is trained and tested using strokes from the
same drawing technique. Given the data collection, we tested a) Picasso-vs-Non-Picasso
classifier using ink/pen, b) Matisse-vs-Non-Matisse classifier using ink/pen, c) Schiele-vsNon-Schiele using pencil.
Table 4 shows the mean and standard deviations of the five folds for the hand-crafter features,
the GRU features and the combination. Both types of features have very good stroke classification
performance. GRU has better performance over the three artists tested. Combining the features
further improved the results and reduced the cross-fold variances, which indicate that both types
of features are complementary to each other as we hypothesized.
Comparing the performance of stroke classifiers on both the technique-specific and acrosstechnique settings, we notice that in both cases the classifiers performed well. The GRU performed
better in the across-technique settings than in the technique-specific setting, which can be justified
by the lack of data in the later case.
Table 4: Validation of Stroke Classifiers - One-vs-All
Across-Techniques - Mean (std) of five folds
Hand-crafted + SVM
GRU
Classifier
technique train
test
train
test
Picasso vs. all All
72.59% (1.19 %) 67.26% (8.37 %) 81.92% (2.59 %) 75.09% ( 5.09%)
Matisse vs. all All
65.83% (1.72 %) 60.61% ( 8.71%) 81.01% (3.41 %) 72.68% (5.58 %)
Schiele vs. all All
84.76% ( 0.91%) 81.49% (3.30 %) 85.55% (1.74 %) 78.54% ( 8.77%)
Technique-specific - Mean (std) of five folds
Hand-crafted + SVM
GRU
Classifier
Technique train
test
train
test
Picasso vs. all Pen/Ink
73.20% ( 2.21%) 68.93% ( 7.04%) 84.08% ( 2.20%) 72.24% (1.87 %)
Matisse vs. all Pen/Ink
73.35% ( 1.99 %) 70.08% ( 7.94%) 86.88% (1.98 %) 75.03% ( 6.47%)
Schiele vs. all Pencil
82.58% ( 2.78%) 75.39% (20.64 %) 94.33% (3.52 %) 69.60% (20.62 %)
5.2.3
Combined
train
test
86.05% (1.08 %) 78.54% (4.36 %)
87.92% ( 1.73%) 77.08% ( 4.33%)
91.85% (0.87 %) 86.20 % (3.78%)
Combined
train
test
88.40% ( 1.19%) 75.92% ( 4.22%)
91.56% ( 1.03%) 79.10% (6.65 %)
91.30% (4.57 %) 72.93% (19.67 %)
Multi-class Stroke Classification Experiment
Although for attribution and authentication one-vs-all setting is the most obvious choice, we also
tested a multi-class setting for completeness. In this experiment we train and test stroke classifiers
built to discriminate between 5 classes: Picasso, Matisse, Schiele, Modigliani, and Others. The
challenge in this setting is that training and test data will be bounded to the class that has the least
number of samples (since we equalize the number of samples in training and test sets to avoid data
bias). In this experiment we compared the performance of the hand-crafted features and the GRU
features. For the GRU, the output directly has 5 nodes to encode the classes. For the hand-crafted
16
features we used error-correcting output codes (ECOC) classification setup where binary SVM
classifiers were trained for each pair of classes.
Table 5 shows the results of five-fold cross-validation experiment. There is a significant difference in performance between the two types of features in this experiment, which is far from the
differences in all other experiments. We hypothesize that this is because the ECOC setting limits
significantly the number of data samples used for training each binary classifier, while the GRU
utilized the samples from all 5 classes in training. In particular, the number of training strokes per
classes in this experiment were 1418, 1656, 1551, 1162, 1317 for each of the 5-fold splits respectively, which is a very small number. As a conclusion, we rule out the use of multi-class setting
for attribution and authentication due to the hardship in obtaining sizable collections of data set.
Instead, for drawing classification and fake detection we relay only on one-vs-all settings.
Table 5: Validation of Stroke Classifier - Across Techniques ( 5 Classes: Picasso, Matisse, Schiele,
Modigliani, Others) - five-folds mean (std)
Approach
Train
Test
Hand-Crafted - SVM 55.01 % (1.41%) 48.97% (5.82%)
GRU
87.72% (2.43%) 74.65% (3.41%)
5.3
Drawing Classification and Detection of Fakes
Drawing Classification Validation: Given the trained stroke classifiers, their performance is tested
on drawing classification settings, also using one-vs-all settings. We used the four aforementioned
strategies for aggregating the results from the stroke level to the drawing level. Given that the stroke
classifiers are trained on a five-fold cross-validation setting, the drawing classification followed that
strategy, i.e. in each fold, each drawing in the test split is classified using the classifier trained on
the 80% of the images in the training split, hence there is no standard deviation to report. Table 6
shows the results for the across-technique setting and Table 7 shows the results for the techniquespecific setting.
Evaluation on Fake Drawings: The trained stroke classifiers were also tested on the collected fake
drawings to evaluate whether the classifiers are really capturing artists’ stroke characteristics and
invariants or just statistics that can be easily deceived by forged versions. We used the Picassovs-all stroke classifiers to test the fake drawings that are made to imitate Picasso drawings (We
denote them as Picasso fakes). A similar setting is used for Matisse fakes and Schiele fakes. Since
the stroke classifiers are trained on a five-fold setting, we have five different classifiers trained per
artist, one for each fold. Each test stroke is classified using the five classifiers and the majority vote
is computed. The different aggregation methods are used to achieve a final classification for each
drawing. Since one-vs-all setting is adapted, classifying a fake Picasso as others in a Picasso-vs-all
setting is considered a correct classification, while classifying fake Picasso as Picasso is considered
a wrong prediction. The bottom parts of Table 6 and Table 7 shows the classification results for
the fake dataset for the across-technique and technique-specific settings respectively.
The table shows that the trained one-vs-all stroke classifiers for all the three artists, are robustly
rejecting fake drawing with accuracy reaching 100% in the across-technique case. A notable dif17
ference here is that the GRU failed to detect the fake drawings, in particular for the Picasso-vs-all,
while the hand-crafted features detected all the fakes. Similar case happens for Schiele-vs-all as
well. We hypothesize that this is because of the limited training data in the technique-specific case,
which did not allow the GRU to learn an invariant model that generalizes well as in the acrosstechnique case. In contrast the hand-crafted models did not suffer from this limitation. Overall,
the hand-crafted features are outperforming in detecting the fakes.
Table 6: Validation of Drawing Classifiers - - One-vs-All -Across Techniques
Across-Techniques
Matisse-vs-All
Combined Hand-crafted GRU
Combined
82.49%
54.88%
81.14% 80.47%
81.48%
56.90%
81.48% 79.12%
82.83%
38.05%
80.47% 78.79%
82.83%
58.25%
80.81% 80.47%
Detection of Fake Drawings
Picasso-vs-All
Matisse-vs-All
Aggregation
Hand-crafted GRU
Combined Hand-crafted GRU
Combined
Majority
100%
87.50 % 100%
76.92 %
100%
100%
Posterior
100%
87.50 % 100%
76.92 %
100%
100%
85%-certain
100%
87.50 % 100%
76.92 %
100%
100%
Certainty-weighted 100%
87.50 % 100%
76.92 %
100%
100%
Picasso-vs-All
Aggregation
Hand-crafted GRU
Majority
66.67%
76.77%
Posterior
67.68%
77.44%
85%-certain
73.06%
79.80%
Certainty-weighted 67.34%
79.80%
Schiele-vs-All
Hand-crafted GRU
Combined
74.41%
82.49% 81.82%
74.75%
83.50% 82.49%
75.42%
83.50% 83.84%
75.42%
85.19% 83.16%
Schiele-vs-All
Hand-crafted GRU
Combined
100%
100%
100%
100%
100%
100%
100%
100%
100%
100%
100%
100%
Table 7: Validation of Drawing Classifiers - One-vs-All - Technique-specific
Technique-Specific
Picasso-vs-All
Matisse-vs-All
Aggregation
Hand-crafted GRU
Combined Hand-crafted GRU
Majority
72.41%
82.76% 81.38%
65.52%
78.62%
Posterior
72.41%
82.76% 81.38%
66.21%
79.31%
85%-certain
72.41%
82.76% 82.76%
69.66%
76.55%
Certainty-weighted 71.72%
82.76% 82.07%
69.66%
77.93%
Detection of Fake Drawings
Picasso-vs-All
Matisse-vs-All
Aggregation
Hand-crafted GRU
Combined Hand-crafted GRU
majority
100.00%
12.50% 16.67%
94.87%
100.00%
Posterior
100.00%
12.50% 16.67%
97.44%
100.00%
k-certain
100.00%
12.50% 20.83%
97.44%
100.00%
certainity-weighted 100.00%
12.50% 20.83%
97.44%
100.00%
6
Combined
82.76%
80.69%
80.69%
80.00%
Schiele-vs-All
Hand-crafted GRU
Combined
81.25%
78.12% 81.25%
84.38%
78.12% 81.25%
84.38%
78.12% 81.25%
87.50%
78.12% 81.25%
Combined
100.00%
100.00%
100.00%
100.00%
Schiele-vs-All
Hand-crafted GRU
Combined
100.00%
45.00% 55.00%
100.00%
45.00% 55.00%
100.00%
45.00% 60.00%
100.00%
45.00% 60.00%
Conclusion
In this paper we proposed an automated method for quantifying the characteristics of artist stokes
in drawings. The approach is inspired by the Pictology methodology proposed by van Dantzig.
The approach segments the drawing into individual strokes using a novel segmentation algorithm.
18
The characteristics of each stroke is captured using global and local shape features as well as a
deep neural network that captures the local shape and tone variations of each stroke. We compared
different types of features and showed results at the stroke classification and drawing classification
levels.
The main result of this paper is that it shows that we can discriminate between artists at the
stroke-level with high accuracy, even using images of drawing of typical off-the-web or scanned
books resolutions. We also tested the methodology using a collected data set of fake drawings and
the results show that the proposed method is robust to such imitated drawings, which highlights
that the method can indeed capture artists’ invariant characteristics that is hard to imitate.
References
[1] M. M. van Dantzig. Pictology: An Analytical Method for Attribution and Evaluation of Pictures. E. J.
Brill, Leiden, Netherlands, 1973.
[2] Josef Riederer. The detection of art forgeries with scientific methods. In Forensic science progress,
pages 153–168. Springer, 1986.
[3] Jinhong Katherine Guo, David Doermann, and A Rosenfield. Off-line skilled forgery detection using stroke and sub-stroke properties. In Pattern Recognition, 2000. Proceedings. 15th International
Conference on, volume 2, pages 355–358. IEEE, 2000.
[4] C Richard Johnson, Ella Hendriks, Igor J Berezhnoy, Eugene Brevdo, Shannon M Hughes, Ingrid
Daubechies, Jia Li, Eric Postma, and James Z Wang. Image processing for artist identification. IEEE
Signal Processing Magazine, 25(4), 2008.
[5] Güngör Polatkan, Sina Jafarpour, Andrei Brasoveanu, Shannon Hughes, and Ingrid Daubechies. Detection of forgery in paintings using supervised learning. In Image Processing (ICIP), 2009 16th IEEE
International Conference on, pages 2921–2924. IEEE, 2009.
[6] Jia Li, Lei Yao, Ella Hendriks, and James Z Wang. Rhythmic brushstrokes distinguish van gogh
from his contemporaries: findings via automated brushstroke extraction. IEEE transactions on pattern
analysis and machine intelligence, 34(6):1159–1176, 2012.
[7] Walter Liedtke, C Richard Johnson Jr, and Don H Johnson. Canvas matches in vermeer: A case study
in the computer analysis of fabric supports. Metropolitan Museum Journal, 47(1):101–108, 2012.
[8] R. Sablatnig, P. Kammerer, and E. Zolda. Hierarchical classification of paintings using face- and brush
stroke models. In ICPR, 1998.
[9] Maria Vanrell Fahad Shahbaz Khan, Joost van de Weijer. Who painted this painting? 2010.
[10] Thomas Edward Lombardi. The classification of style in fine-art painting. ETD Collection for Pace
University. Paper AAI3189084., 2005.
[11] Ravneet Singh Arora and Ahmed M. Elgammal. Towards automated classification of fine-art painting
style: A comparative study. In ICPR, 2012.
[12] Babak Saleh, Kanako Abe, Ravneet Singh Arora, and Ahmed Elgammal. Toward automated discovery
of artistic influence. Multimedia Tools and Applications, pages 1–27, 2014.
19
[13] Louisa Lam, Seong-Whan Lee, and Ching Y Suen. Thinning methodologies-a comprehensive survey.
IEEE Transactions on pattern analysis and machine intelligence, 14(9):869–885, 1992.
[14] Wilhelm Burger and Mark J. Burge. Fourier Shape Descriptors, pages 665–711. Springer London,
London, 2016.
[15] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780,
1997.
[16] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio. Empirical evaluation of gated recurrent neural networks
on sequence modeling. NIPS’2014 Deep Learning workshop, 2014.
[17] Y. Bengio, P. Simard, and P. Frasconi. Learning long-term dependencies with gradient descent is
difficult. IEEE Transactions on Neural Nets, pages 157–166, 1994.
[18] S. Hochreiter, Y. Bengio, P. Frasconi, and J. Schmidhuber. Gradient flow in recurrent nets: the difficulty
of learning long-term dependencies. Field Guide to Dynamical Recurrent Networks, 2000.
[19] Corinna Cortes and Vladimir Vapnik. Support-vector networks. Machine Learning, 20(3):273–297,
1995.
20
Appendix: Ablation studies and other experiments
Adaptive GRU Patch Radius
Table 9 shows a comparison between choosing the patch size based on an adaptive radius vs. fixed
radius for the GRU model. For the fixed radius case, 11x11 patches are used. For the adaptive
case, a radius r is computed for each drawing by computing the mean rip length for each stroke
and taking the median over all strokes in the drawing. Square patches of size 2 ∗ r + 1 are used
and scaled to 11x11 patches. The comparison in the table shows that the adaptive radius does not
improve over the fixed radius in most of the cases. The comparison is shown for both the acrosstechniques and technique-specific cases. The adaptive radius showed improvement only in the case
of technique-specific Schiele vs. all classification,
Table 8: Comparison of GRU Drawing Classifiers using Adaptive vs. Fixed Radius Patches
Across-Techniques
one-vs-all drawing classification
Picasso-vs-All
Matisse-vs-All
Aggregation
Adaptive Radius Fixed Radius Adaptive Radius Fixed Radius
Majority
78.11%
76.77%
78.79%
81.14%
Posterior
78.11%
77.44%
78.45%
81.48%
85%-certain
79.46%
79.80%
76.77%
80.47%
Certainty-weighted 79.46%
79.80%
78.45%
80.81%
Technique-Specific
one-vs-all drawing classification
Picasso-vs-All
Matisse-vs-All
Aggregation
Adaptive Radius Fixed Radius Adaptive Radius Fixed Radius
Majority
77.24%
82.76%
75.17%
78.62%
Posterior
77.24%
82.76%
74.48%
79.31%
85%-certain
77.24%
82.76%
76.55%
76.55%
Certainty-weighted 78.62%
82.76%
77.24%
77.93%
Schiele-vs-All
Adaptive Radius Fixed Radius
73.40%
82.49%
74.41%
83.50%
76.77%
83.50%
77.78%
85.19%
Schiele-vs-All
Adaptive Radius Fixed Radius
90.62%
78.12%
90.62%
78.12%
90.62%
78.12%
87.50%
78.12%
Ablation study of the Hand-crafted Features
In this set of experiments we conduct an ablation study of the elements of the hand-crafted stroke
features. These experiment is done on a binary classification setting to discriminate between the
strokes of Picasso and Matisse drawn using ink/pen technique. SVM with polynomial kernel of
degree 3 is used in all experiments. Five-fold cross validation is performed.
21
Table 9: Ablation study of the Hand-crafted features - five-folds
Feature
training accuracy
mean
std
Fourier Descriptors (FD)
61.75% 1.11%
Reconstruction Error Profile (REP) 64.39% 0.75%
Stroke Thickness Profile (STP)
74.11% 1.33%
Curvature
66.22% 0.60%
Stroke Length (SL)
57.30% 0.28%
FD+REP
69.23% 0.57%
STP + Curvature
79.63% 0.71%
STP + Curvature + SL
80.60% 0.80%
FD+REP+STP
77.42% 1.95%
FD+REP+STP+Curvature
85.91% 0.88%
FD+REP+STP+Curvature+SL
86.70% 1.08%
22
test accuracy
mean
std
57.55% 5.46%
63.20% 11.09%
63.68% 2.58%
60.17% 2.06%
57.12% 1.86%
64.23% 6.69%
68.93% 4.04%
70.17% 3.81%
68.35% 4.58%
74.13% 6.47%
75.07% 5.67%
Figure 3 key:
Fake, Fake, Matisse
Matisse, Fake, Fake, Matisse
Fake, Matisse, Picasso, Fake
Fake, Picasso, Picasso, Fake
Schiele, Fake, Fake, Schiele, Schiele, Fake
About the Authors:
Dr. Ahmed Elgammal: is a professor at the Department of Computer Science, Rutgers University. He is the founder and director of the Art and Artificial Intelligence at Rutgers, which focuses on data science in the domain
of digital humanities. He is also an Executive Council Faculty at Rutgers
University Center for Cognitive Science. Prof. Elgammal has published
over 160 peer-reviewed papers, book chapters, and books in the fields of
computer vision, machine learning and digital humanities. He is a senior
member of the Institute of Electrical and Electronics Engineers (IEEE). He
received the National Science Foundation CAREER Award in 2006. Dr.
Elgammal recent research on knowledge discovery in art history received
wide international media attention, including reports on the Washington
Post, New York Times, NBC News, the Daily Telegraph, Science News,
and many others. Dr. Elgammal is the founder and CEO of Artrendex, a
startup that builds innovative AI technology for the art market. Dr. Elgammal received his M.Sc. and Ph.D. degrees in computer science from the
University of Maryland, College Park, in 2000 and 2002, respectively.
Yan Kang main research interests are Deep Learning,Computer Vision and
Natural Language Processing. Mr. Kang was a senior deep learning researcher at Artrendex. Currently Mr. Kang is a Computer Vision Engineer
at JD.com American Technologies Corporation, working on Object Classification & Detection and Neural Network Compression. He obtained his
M.S. degree in Computer Science at Rutgers University (New Brunswick)
in May 2016.
23
Milko den Leeuw is a painting conservator, specialized in the technical and
scientific investigation of paintings. He completed his training in painting conservation and pictology (an analytical method for attribution and
evaluation of paintings) at the studio Dora van Dantzig in Amsterdam in
1989. In 1991 he founded the Atelier for Restoration & Research of Paintings (ARRS) with drs Ingeborg de Jongh. ARRS was from 1991-2006 the
outdoor conservator atelier of the Rijksmuseum Catharijneconvent Utrecht.
ARRS has produced numerous international publications concerning new
techniques in authentication research and rediscoveries of paintings. ARRS
has been involved in the conservation of important masters in Dutch Fine
Art such as Rembrandt van Rijn, Hendrick ter Brugghen and Gerard ter
Borch and has contributed to the rediscovery of paintings by Jan Lievens,
Capser Netscher and Quinten Matsijs. ARRS has also performed conservation and research on National Art Treasures like the ceiling dating from
1672 by Gerard de Lairesse from the International Court for Peace & Justice in The Hague (Carnegie Foundation), and Italian masters Giovanni
Bellini and Canaletto, French masters Manet and Degas, German masters
Lucas Cranach and Max Beckmann, Russian masters as Kasimir Malevich
and Nathalia Goncharova and American masters Andy Warhol and Mark
Rothko. ARRS is a professional equipped lab for conservation treatment
and (authentication) research on paintings. ARRS holds a worldwide reputation for bridging art history, conservation technique and material sciences.
ARRS is Authentication in Art organizer of the 2012, 2014, 2016 AiA conferences.
24
| 1cs.CV
|
Evaluating and Tuning n-fold Integer
Programming
Kateřina Altmanová
Department of Applied Mathematics, Charles University
Prague, Czech Republic
kacka@kam.mff.cuni.cz
Dušan Knop1
arXiv:1802.09007v1 [cs.DS] 25 Feb 2018
Department of Informatics, University of Bergen
Bergen, Norway
dusan.knop@uib.no
0000-0003-2588-5709
Martin Koutecký2
Faculty of Industrial Engineering and Management, Technion – Israel Institute of Technology
Haifa, Israel
koutecky@technion.ac.il
0000-0002-7846-0053
Abstract
In recent years, algorithmic breakthroughs in stringology, computational social choice, scheduling,
etc., were achieved by applying the theory of so-called n-fold integer programming. An n-fold
integer program (IP) has a highly uniform block structured constraint matrix. Hemmecke, Onn,
2
and Romanchuk [Math. Programming, 2013] showed an algorithm with runtime aO(rst+r s) n3 ,
where a is the largest coefficient, r, s, and t are dimensions of blocks of the constraint matrix
and n is the total dimension of the IP; thus, an algorithm efficient if the blocks are of small size
and with small coefficients. The algorithm works by iteratively improving a feasible solution with
augmenting steps, and n-fold IPs have the special property that augmenting steps are guaranteed
to exist in a not-too-large neighborhood. However, this algorithm has never been implemented
and evaluated.
We have implemented the algorithm and learned the following along the way. The original
algorithm is practically unusable, but we discover a series of improvements which make its evaluation possible. Crucially, we observe that a certain constant in the algorithm can be treated
as a tuning parameter, which yields an efficient heuristic (essentially searching in a smaller-thanguaranteed neighborhood). Furthermore, the algorithm uses an overly expensive strategy to find
a “best” step, while finding only an “approximatelly best” step is much cheaper, yet sufficient
for quick convergence. Using this insight, we improve the asymptotic dependence on n from n3
to n2 log n which yields the currently asymptotically fastest algorithm for n-fold IP.
Finally, we tested the behavior of the algorithm with various values of the tuning parameter
and different strategies of finding improving steps. First, we show that decreasing the tuning
parameter initially leads to an increased number of iterations needed for convergence and eventually to getting stuck in local optima, as expected. However, surprisingly small values of the
parameter already exhibit good behavior. Second, our new strategy for finding “approximatelly
best” steps wildly outperforms the original construction.
2012 ACM Subject Classification Software and its engineering → Software design engineering,
Theory of computation → Parameterized complexity and exact algorithms
1
2
Author supported supported by the project NFR MULTIVAL and the project P202/12/G061 of GA ČR.
Author supported by Technion postdoctoral fellowship.
23:2
Evaluating and Tuning n-fold Integer Programming
Keywords and phrases n-fold integer programming, integer programming, analysis of algorithms, primal heuristic, local search
Supplement Material https://github.com/katealtmanova/nfoldexperiment
1
Introduction
In this article we consider the general integer linear programming (ILP) problem in standard
form,
min {wx | Ax = b , l ≤ x ≤ u , x ∈ Zn } .
(ILP)
with A an integer m × n matrix, b ∈ Z , w ∈ Z , l, u ∈ (Z ∪ {±∞}) . It is well known to
be strongly NP-hard, but models many important problems in combinatorial optimization
such as planning [27], scheduling [12] and transportation [3] and thus powerful generic solvers
have been developed for it [24]. Still, theory is motivated to search for tractable special cases
One such special case is when the constraint matrix A has a so-called N -fold structure:
E1 E1 · · · E1
E2 0 · · · 0
A = E (N ) = 0 E2 · · · 0 .
.
..
..
..
..
.
.
.
m
0
0
···
n
n
E2
Here, r, s, t, N ∈ N, u, l, w ∈ ZN t , b ∈ Zr+N s , E (N ) is an (r + N s) × N t-matrix, E1 ∈ Zr×t
is an r ×t-matrix and E2 ∈ Zs×t is an s × t-matrix. We call E (N ) the N -fold product of
(N )
1
E= E
is known as N -fold integer programming (N -fold
E2 . Problem (ILP) with A = E
IP). Hemmecke, Onn, and Romanchuk [15] prove the following.
I Proposition 1 ([15, Theorem 6.2]). There is an algorithm that solves3 (ILP) with A = E (N )
2
encoded with L bits in time ∆O(trs+t s) · n3 L, where ∆ = 1 + max{kE1 k∞ , kE2 k∞ }.
Recently, algorithmic breakthroughs in stringology [19], computational social choice [20],
scheduling [4, 17, 21], etc., were achieved by applying this algorithm and its subsequent
non-trivial improvements.
The algorithm belongs to the larger family of augmentation (primal) algorithms. It
starts with an initial feasible solution x0 ∈ ZN t and produces a sequence of increasingly
better solutions x1 , . . . , xs (better means wxs < wxs−1 < · · · < wx0 ). It is guaranteed that
the algorithm terminates, that xs is an optimal solution, and that the algorithm converges
quickly, i.e., s is polynomial in the length of the input. A key property of N -fold IPs is
that, if an augmenting step exists, then it can be decomposed into a bounded number of
elements of the so-called Graver basis of A, which in turn makes it possible to compute it
using dynamic programming [15, Lemma 3.1]. In a sense, this property makes the algorithm
a local search algorithm which is always guaranteed to find an improvement in a not-too-large
neighborhood. The bound on the number of elements or the size of the neighborhood which
needs to be searched is called the Graver complexity of E. This, in turn, implies that, if an
augmenting step exists, then there is always one with small `1 -norm; for a matrix A, we
denote this bound g1 (A) = maxg∈G(A) kgk1 [23, Theorem 4]. However, the algorithm has
never been implemented and evaluated.
3
Given an IP, we say that to solve it is to either (i) declare it infeasible or unbounded or (ii) find a
minimizer of it.
K. Altmanová, D. Knop, and M. Koutecký
1.1
23:3
Our Contributions
We have implemented the algorithm and tested it on two problems for which n-fold formulations were known: makespan minimization on uniformly related machines (Q||Cmax ) and
Closest String; we have used randomly generated instances.
In the course of implementing the algorithm we learn the following. The algorithm in its
initial form is practically unusable due to an a priori construction of the Graver basis G(E2 )
of size exponential in r, s, t and a related (even larger) set Z(E). However, we discover a
series of improvements (some building on recent insights [23]) which avoid the construction
of these two sets. Moreover, we adjust the algorithm to treat g1 (A) as a tuning parameter
g1 , which turns it into a heuristic.
We also study the augmentation strategy, which is the way the algorithm chooses an
augmenting step among all the possible options. The original algorithm uses an overly
expensive strategy to find a “best” step, which means that a large number of possible steps
is evaluated in each iteration. We show that finding only an “approximatelly best” step is
sufficient to obtain asymptotically equivalent convergence rate, and the work per iteration
decreases exponentially. Using this insight, we improve the asymptotic dependence on N from
N 3 to N 2 log N . Together with recent improvements, this yields the currently asymptotically
fastest algorithm for N -fold IP:
I Theorem 2. Problem (ILP) with A = E (N ) can be solved in time ∆r
where M = log(wx∗ − wx0 ) for some minimizer x∗ of wx.
2
s+rs2
(N t)2 log(N t)M ,
Finally, we evaluate the behavior of the algorithm. We ask how is the performance of the
algorithm (in terms of number of dynamic programming calls and quality of the returned
solution) influenced by
1. the choice of the tuning parameter 1 < g1 ≤ g1 (A)?
2. the choice of the augmentation strategy between “best step”, “approximate best step”
and “any step”?
As expected, as g1 moves from g1 (A) to 1, we first see an increase in the number of iterations
needed for convergence and eventually the algorithm gets stuck in local optima. However,
surprisingly small values (e.g. g1 = 5 when g1 (A) > 105 ) of the parameter already exhibit
close to optimal behavior. Second, our new strategy for finding “approximatelly best” steps
outperforms the original construction by orders of magnitude, while the naive “any step”
strategy behaves erratically.
We note that at this stage we are not (yet) interested in showing supremacy over existing
algorithms; we simply want to understand the practical behavior of an algorithm whose
theoretical importance was recently highlighted. For this reasons our experimental focus is
on the two aforementioned questions rather than simply measuring the time. Similarly, due
to the rigid format of E (N ) we are limited to few problems for which N -fold formulations are
known. For Closest String we use the same instances as Chimani et al. [5]; for Makespan
Minimization we generate our own data because standard benchmarks are not limited to
short jobs or few types of jobs.
1.2
Related Work
Our work mainly relates to primal heuristics [2] for MIPs which are used to help reach optimality faster and provide good feasible solutions early in the termination process. Specifically,
our algorithm is a neighborhood (or local) search algorithm. The standard paradigm is Large
Neighborhood Search (LNS) [26] with specializations such as for example Relaxation Induced
23:4
Evaluating and Tuning n-fold Integer Programming
Neighborhood Search (RINS) [6] and Feasibility Pump [1]. Using this paradigm, our proposed
algorithm searches in the neighborhood induced by the `1 -distance from the current feasible
solution and the search procedure is formulated as an ILP subproblem with the additional
constraint kxk1 ≤ g1 . In this sense the closest technique to ours is local branching [10] which
also searches in the `1 -neighborhood; however, it was mainly applied to binary programs
without any additional structure of the constraint matrix.
On the theoretical side, very recently Koutecký et al. [23] have studied parameterized
strongly polynomial algorithms for various block-structured ILPs, not just N -fold IP. Eisenbrand et al. [8] independently (and using slightly different techniques) arrive at the same
complexity of N -fold IP as our Theorem 2.
2
Preliminaries
For positive integers m, n we set [m, n] = {m, . . . , n} and [n] = [1, n]. We write vectors in
boldface (e.g., x, y) and their entries in normal font (e.g., the i-th entry of x is xi ). Given
the problem (ILP), we say that x is feasible for (ILP) if Ax = b and l ≤ x ≤ u.
Graver bases and augmentation. Let us now introduce Graver bases and discuss how they
can be used for optimization. We also recall N -fold IPs; for background, we refer to the
books of Onn [25] and De Loera et al. [7].
Let x, y be n-dimensional integer vectors. We call x, y sign-compatible if they lie in
the same orthant, that is, for each i ∈ [n] the sign of xi and yi is the same. We call
P i
i
i g a sign-compatible sum if all g are pair-wise sign-compatible. Moreover, we write
y v x if x and y are sign-compatible and |yi | ≤ |xi | for each i ∈ [n]. Clearly, v imposes
a partial order called “conformal order” on n-dimensional vectors. For an integer matrix
A ∈ Zm×n , its Graver basis G(A) is the set of v-minimal non-zero elements of the lattice of
A, kerZ (A) = {z ∈ Zn | Az = 0}. An important property of G(A) is the following.
I Proposition 3 ([25, Lemma 3.4]). Every integer vector x 6= 0 with Ax = 0 is a sign-comPt
patible sum x = i=1 αi gi , αi ∈ N, gi ∈ G(A) and t ≤ 2n − 2.
Let x be a feasible solution to (ILP). We call g an x-feasible step (or simply feasible
if x is clear) if x + g is feasible for (ILP). Further, we call a feasible step g augmenting
if w(x + g) < wx; note that g decreases the objective by wg. An augmenting step g
and a step length γ ∈ N form an x-feasible step pair with respect to a feasible solution x
if l ≤ x + γg ≤ u. A pair (γ, g) ∈ (N × G(A)) is a γ-Graver-best step pair and γg is a
γ-Graver-best step if it is feasible and for every feasible step pair (γ, g0 ), g0 ∈ G(A), we have
wγg ≤ wγg0 . An augmenting step g and a step length γ ∈ N form a Graver-best step pair if
it is γ-Graver-best and it minimizes wγ 0 g0 over all γ 0 ∈ N, where (γ 0 , g0 ) is a γ 0 -Graver-best
step pair. We say that γg is a Graver-best step if (γ, g) is a Graver-best step pair.
The Graver-best augmentation procedure for (ILP) with a given feasible solution x0 and
initial value i = 0 works as follows:
1. If there is no Graver-best step for xi , return it as optimal.
2. If a Graver-best step γg for xi exists, set xi+1 := xi + γg, i := i + 1, and go to 1.
I Proposition 4 (Convergence bound [25, Lemma 3.10]). Given a feasible solution x0 for (ILP),
the Graver-best augmentation procedure finds an optimum in at most (2n − 2) log M steps,
where M = w(x0 − x∗ ) and x∗ is any minimizer of wx.
By standard techniques (detecting unboundedness etc.) we can ensure that log M ≤ L.
K. Altmanová, D. Knop, and M. Koutecký
23:5
N -fold IP. The structure of E (N ) allows us to divide the N t variables of x into N bricks of
size t. We use subscripts to index within a brick and superscripts to denote the index of the
brick, i.e., xij is the j-th variable of the i-th brick with j ∈ [t] and i ∈ [N ].
3
Approximate Graver-best Steps
In this section we introduce the notion of a c-approximate Graver-best step (Definition 5),
show that such steps exhibit good convergence (Lemma 6), can be easily obtained (Lemma 7),
and result in a significant speed-up of the N -fold IP algorithm (Theorem 2).
I Definition 5 (c-approximate Graver-best step). Let c ∈ R, c ≥ 1. Given an instance of (ILP)
and a feasible solution x, we say that h is a c-approximate Graver-best step for x if, for every
x-feasible step pair (γ, g) ∈ (N × G(A)), we have wh ≤ 1c · γwg.
Recall the Graver-best augmentation procedure. We call its analogue where we replace
a Graver-best step with a c-approximate Graver-best step the c-approximate Graver-best
augmentation procedure.
I Lemma 6 (c-approximate convergence bound). Given a feasible solution x0 for (ILP), the
c-approximate Graver-best augmentation procedure finds an optimum of (ILP) in at most
c · (2n − 2) log M steps, where M = w(x0 − x∗ ) and x∗ is any minimizer of wx.
Proof. The proof is a straightforward adaptation of the proof of Proposition 4. Let x∗ be
P2n−2
a minimizer and let h = x∗ − x0 . Since Ah = 0, by Proposition 3, h = i=1 αi gi for
some αi ∈ N, gi ∈ G(A), i ∈ [2n − 2]. Thus, an x-feasible step pair (γ, g) such that γg is
1
M . In other words, any Graver-best step pair
a Graver-best step must satisfy wγg ≤ 2n−2
1
improves the objective function by at least a 2n−2
-fraction of the total optimality gap M ,
and thus (2n − 2) log M steps suffice to reach an optimum. It is straightforward to see that a
c
c-approximate Graver-best step satisfies wx − w(x + γg) ≤ 2n−2
M , and thus c(2n − 2) log M
steps suffice.
J
I Remark. Lemma 6 extends naturally to separable objectives; see the original proof [25,
Lemma 3.10].
I Lemma 7 (Powers of c step lengths). Let c ∈ N, x be a feasible solution of (ILP), and let
Γc-apx = ci | ∃g ∈ G(A) : l ≤ x + ci g ≤ u .
Let (γ, g) ∈ (Γc-apx × G(A)) be an x-feasible step pair such that γg ≤ γ 0 g0 for any x-feasible
step pair (γ 0 , g0 ) ∈ (Γc-apx × G(A)). Then γg is a c-approximate Graver-best step.
Proof. Let (γ, g) satisfy the assumptions, and let (γ̃, g̃) ∈ (N × G(A)) be a Graver-best step
pair. Let γ 0 be a nearest smaller power of c from γ̃, and observe that γ 0 g̃ is a c-approximate
Graver-best step because γ 0 ≥ γ̃c . On the other hand, since γg is a γ-Graver-best step, we
have γg ≤ γ 0 g̃ and thus γg is also a c-approximate Graver-best step.
J
I Theorem 2. Problem (ILP) with A = E (N ) can be solved in time ∆O(r
where M = log(wx∗ − wx0 ) for some minimizer x∗ of wx.
2
s+rs2 )
(N t)2 log(N t)M ,
Proof. Recall that ∆ = kAk∞ +1. Koutecký et al. [23, Theorem 2] show that a γ-Graver-best
2
2
step can be found in time ∆r s+rs N t. Moreover, Hemmecke et al. [14] prove a proximity
23:6
Evaluating and Tuning n-fold Integer Programming
theorem which allows the reduction of an instance of (ILP) to an equivalent instance with
new bounds l0 , u0 satisfying ku0 − l0 k∞ ≤ N tg∞ , with
g∞ = max kgk∞ ≤ max kgk1 ≤ (∆rs)O(rs) ,
g∈G(A)
g∈G(A)
where the last inequality can be found in the proof of [23, Theorem 4]. This bound implies
that Γ2-apx from in Lemma 7 satisfies |Γ2-apx | ≤ rs log(∆N trs). By Lemma 7, finding
a γ-Graver-best for each γ ∈ Γ2-apx and picking the minimum results in a 2-approximate
2
2
Graver-best step, and can be done in time ∆r s+rs (N t) log(N t). By Lemma 6, (4n−4) log M
steps suffice to reach the optimum.
J
4
Implementation
We first give an overview of the original algorithm, which is our starting point. Then we
discuss our specific improvements and mention a few details of the software implementation.
4.1
Overview of the Original Algorithm
The key property of the N -fold product E (N ) is that, for any N ∈ N, the number of nonzero
bricks of any g ∈ G(E (N ) ) is bounded by some constant g(E) called the Graver complexity
of E, and, moreover, that the sum of all non-zero bricks of g can be decomposed into at most
g(E) elements of G(E2 ) [15, Lemma 3.1]. This facilitates the following construction. Let
(
Z(E) =
z ∈ Zt | ∃g1 , . . . , gk ∈ G(E2 ), k ≤ g(E), z =
k
X
)
gi
.
i=1
Then, every prefix sum of the bricks of g ∈ G(E (N ) ) is contained in Z(E) and a γ-Graver-best
step, γ ∈ N, can be found using dynamic programming over the elements of Z(E).
To ensure that a Graver-best step is found, a set of step-lengths Γbest is constructed as
follows. Observe that any Graver-best (and thus feasible) step pair (γ, g) ∈ N × G(E (N ) ) ,
must satisfy that in at least one brick i ∈ [n] it is “tight”, that is, (γ, g) is x-feasible while
(γ + 1, g) is not specifically because li ≤ x + γg ≤ ui holds but li ≤ x + (γ + 1)g ≤ ui does
not. Thus, for each z ∈ Z(E) and each i ∈ [n], we find all the potentially “tight” step lengths
γ and add them to Γbest , which results in a bound of |Γbest | ≤ |Z(E)| · n.
4.2
Replacing Dynamic Programming with ILP
We have started off by implementing the algorithm exactly as it is described by Hemmecke et
al. [15]. The first obstacle is encountered almost immediately and is contained in the constant
g(E). This constant can be computed, but the computation is extremely difficult [9, 13].
Another possibility is to estimate it, in which case it is almost always larger than N and
thus is essentially meaningless. Finally, one can take the approach partially suggested in [15,
Section 7], where we consider g(E) in the construction of Z(E) to be a tuning parameter
and consider the approximate set Zgc (E), gc ∈ N, obtained by taking sums of at most gc
elements of G(E2 ). This makes the algorithm more practical, but turns it into a heuristic.
In spite of this sacrifice, already for small (r = 3, s = 1, t = 7, n = 10) instances and
extremely small value of gc = 3, the dynamic programming based on the Zgc (E) construction
was taking an unreasonably long time (over one minute). Admittedly this could be improved;
however, already for gc > 5, it becomes infeasible to compute Zgc (E), and for larger instances
K. Altmanová, D. Knop, and M. Koutecký
1
2
3
4
5
6
7
8
9
input : matrices E1 , E2 , positive integer N , and vectors b, l, u, w
output : optimal solution to (ILP) with A = E (N )
g = GraverComplexity(E1 , E2 );
x0 = FindFeasibleSolution(E, b, l, u, w), i = 0;
G(E1 ) = GraverBasis(E1 , g);
Z(E) = DynamicProgramStates(G(E1 ), g);
do
Γ = BuildGamma(xi );
i = i + 1;
foreach γ ∈ Γ do
gγ = gammaBestStep(γ, g);
xi = xi−1 + argmin{g
10
11
12
23:7
} wgγ ;
γ |γ∈Γ
while xi−1 6= xi ;
return xi ;
Algorithm 1: Pseudocode of the algorithm of Hemmecke, Onn, and Romanchuk.
(r > 5, t > 12) it becomes very difficult to compute even G(E2 ). For these reasons we sought
to completely replace the dynamic program involving Z(E).
Koutecký et al. [23] show that all instances of (ILP) with the property that the so-called
dual treedepth tdD (A) of A is bounded and the largest coefficient kAk∞ is bounded also have
the property that g1 (A) = maxg∈G(A) kgk1 is bounded, which implies that augmenting steps
can be found efficiently. This class of ILPs contains N -fold IP.
The interpretation of the above fact is that, in order to solve (ILP), it is sufficient to
repeatedly (for different x and γ) solve an auxiliary instance
min {wh | Ah = 0, l ≤ x + γh ≤ u, khk1 ≤ g1 (A)}
(AugILP)
in order to find good augmenting steps; we note that the constraint khk1 ≤ g1 (A) can be
linearized [23, Lemma 25]. The heuristic approach outlined above transfers easily: we replace
g1 (A) in (AugILP) with some integer g1 , 1 < g1 ≤ g1 (A); this makes (AugILP) easier to
solve at the cost of losing the guarantee that an augmenting step is found if one exists. In
theory, solving (AugILP) should be easier than solving the original instance (ILP) due to the
special structure of A [23, Lemma 25]. Our approach here is to simply invoke an industrial
MILP solver on (AugILP) in order to find a γ-Graver-best step.
4.3
Augmentation Strategy: Step Lengths
Logarithmic Γ. The majority of algorithms based on Graver basis augmentation rely on
the Graver-best augmentation procedure [4, 7, 15, 19, 21, 25] and thus require finding
(exact) Graver-best steps. In the aforementioned algorithms this is always done using the
construction of a set Γbest mentioned above, which is of size f (k) · n where k is the relevant
2
parameter (e.g., (ars)O(rst+st ) in the original algorithm for N -fold IP). We replace this
construction with Γ2-apx = {1, 2, 4, 8, . . . } which, combined with the proximity technique, is
only of size O(log n) (Theorem 2); in particular, independent of the function f (k).
Exhausting γ. Moreover, we have noticed that sometimes the algorithm finds a step g for
γ = 2k which is not tight in any brick, and then repeatedly applies it for shorter step-lengths
γ 0 < γ. In other words, the discovered direction g is not exhausted. Thus, for each γ ∈ N,
23:8
Evaluating and Tuning n-fold Integer Programming
1
2
3
4
5
6
7
8
9
10
input : matrices E1 , E2 , positive integers N , c, and g1 , and vectors b, l, u, w
output : a feasible solution to (ILP) with A = E (N )
x0 = FindFeasibleSolution(E, b, l, u, w), i = 0;
do
Γ = ∅; j = 0, i = i + 1;
do
γ = cj ;
gγ = min{wγg | Ag = 0, l ≤ x + γg ≤ u, kgk1 ≤ g1 , g ∈ ZN t };
γ 0 = ExhaustDirection(gγ );
Γ = Γ ∪ {γ 0 }, j = j + 1;
while gγ 6= 0;
xi = xi−1 + argmin{g |γ∈Γ} wgγ ;
γ
while xi−1 6= xi ;
12 return xi
Algorithm 2: Pseudocode of our new heuristic algorithm. The algorithm is exact if
g1 ≥ g1 (A) = maxg∈G(A) kgk1 .
11
upon finding the γ-Graver-best step g, we replace γ with the largest γ 0 ≥ γ for which (γ 0 , g)
is still x-feasible.
Early termination. Another observation is that in any given iteration of the algorithm, if
γ > 1 then some augmenting step has been found and if the computation is taking too long,
we might terminate it and simply apply the best step found so far.
4.4
Software and Hardware
We have implemented our solver in the SageMath computer algebra system [30]. This was a
convenient choice for several reasons. The SageMath system offers an interactive notebookstyle web-based interface, which allows rapid prototyping and debugging. Data types for
vectors and matrices and a unified interface for several MILP solvers are also readily available.
We have experimented with the open-source solvers GLPK [29], Coin-OR CBC [28], and
the commercial solver Gurobi [11] and have settled for using the latter since it performs the
best. The downside of SageMath is that an implementation of the original dynamic program
is likely much slower than a similar implementation in C; however this DP is impractical
anyway as explained in Section 4.2. For random instance generation and subsequent data
evaluation and graphing, we have used the Jupyter notebook environment [18] and Matplotlib
library [16]. The computations were performed on a computer with an Intel® Xeon® E5-2630
v3 (2.40GHz) CPU and 128 GB RAM.
5
Evaluation
We begin our evaluation with two main questions, specifically, how is the performance of
the algorithm (both in terms of the number of iterations and the quality of the returned
solution) influenced by:
1. the tuning parameter g1 and
2. the augmentation strategy?
K. Altmanová, D. Knop, and M. Koutecký
Regarding our first question, theoretically we should see either an increase in the number
of iterations, a decrease in the quality of the returned solution, or both. However, the range
of the tuning parameter g1 is quite large: any number between 2 and g1 (A) is a valid choice,
and in all our scenarios the true value of g1 (A) exceeds 300. Thus, we are interested in the
threshold values of g1 when the algorithm no longer finds the true optimum or when its
convergence rate drops significantly.
Regarding our second question, there are two main candidates for the set of step-lengths
Γ. We can either use the “best step” construction Γbest of the original algorithm, which
assures that we always make a Graver-best step before moving to the next iteration. Or,
we can use the “approximate best step” construction Γ2-apx of Theorem 2, which provides a
2-approximate Graver-best step. To make this comparison more interesting, we also consider
Γ5-apx and also the trivial “any step” strategy where we always make the 1-Graver-best step,
which corresponds to taking Γany = {1}. Recall that due to the trick of always exhausting
the discovered direction, this strategy actually has a chance at quick convergence, unlike if
we only made the step with γ = 1.
5.1
Instances
We choose two problems for which N -fold IP formulations were shown in the literature,
namely the Q||Cmax scheduling problem [21] and the Closest String problem [19].
Uniformly related machines makespan minimization (Q||Cmax )
Input: Set of m machines M , each with a speed si ∈ N. A set of n jobs J, each with a
processing time pj ∈ N.
Find:
Find an assignment of jobs to machines such that the time when last job finishes (the
makespan) is minimized; a job j scheduled on a machine i takes time pj /si to execute.
Closest String
Input: A set of k strings s1 , . . . , sk of length L over an alphabet Σ.
Find:
Find a string y ∈ ΣL minimizing maxki=1 dH (si , y), where dH is the Hamming distance.
For both problems we generate random instances as follows.
Scheduling. We view the problem as a decision problem where, given a number B, we
ask whether a schedule of makespan at most B exists. This is equivalent to the multi-sized
bin packing problem, where we have m bins of various capacities instead of m machines
of different speeds, and we adopt this view as it is more convenient. We also view it as a
high-multiplicity problem where the items are not given explicitely as a list of item sizes,
but succinctly by a vector of item multiplicities. Because the algorithm is primarily an
optimization algorithm, we follow the standard approach [15, Lemma 3.8] and turn the
feasibility problem into an auxiliary optimization instance where finding a starting feasible
solution is easy. Specifically for Q||Cmax this means introducing auxiliary slack variables for
“not-yet-scheduled” jobs and minimizing the total “not-yet-scheduled” length.
The input parameters of the instance generation are number of bins m, the smallest
and largest capacities S and L, respectively, item sizes p1 , . . . , pk and probability weights
Pk
w1 , . . . , wk , W = i=1 wi , and a slack ratio σ. The instance is then generated as follows.
First, we choose m capacities from [S, L] uniformly at random. This determines the total
capacity of the bins C. Our goal is to generate items whose total size is roughly σ · C.
We do this by repeatedly picking an item length from p1 , . . . , pk , where pj is selected with
probability wj /W , until the total size of items picked so far exceeds σ · C, when we terminate
and return the generated instance.
23:9
23:10
Evaluating and Tuning n-fold Integer Programming
Closest String. As before, we view the problem as a decision problem: given a number
d ∈ N, decide whether there is a string y with maxki=1 dH (si , y) ≤ d. The random instance is
generated exactly as done by Chimani et al. [5]: first, we generate a random “target” string
y ∈ ΣL and create k copies s1 , . . . , sk of it; then, we make α random changes in s1 , . . . , sk .
This way, we have an upper bound α on the optimum. The input parameters of the instace
generation are thus k, L, Σ and the distance ratio r such α = n/r. Again, we solve an auxiliary
instance where we essentially start with a string of “all blanks” and try to fill in all the
blanks while staying in the specified distance d; the objective is thus the remaining number
of blanks.
5.2
Results
Here we demonstrate the overall behavior of the algorithm on three selected instances; we encourage the reader to see the full data (incl. plots) at https://github.com/katealtmanova/
nfoldexperiment. We have determined that the sensible range of values of g1 is between
2 and roughly 100 and beyond that the behavior does not change significantly. For all
augmentation strategies there are values of g1 which take much longer to converge than any
other values; because of these outliers we clip our figures. To expose the behavior of the
algorithm we use two types of figures.
Outer loop. In the outer loop figure we focus on the behavior of the algorithm with respect
to the loop starting at line 2 of Algorithm 2, i.e., where each iteration corresponds to making
an augmenting step. There is a line plot for each tested value of g1 . The x axis shows the
iteration, the y axis shows the objective value attained in this iteration, i.e.,wxi for iteration
i. We indicate the expensiveness of computing one augmentation by the thickness of the line
in a given iteration – the thicker the line, the more times the (AugILP) has been solved in
this iteration. The legend indicates the exact number of times (AugILP) has been solved for
this value of g1 .
Inner loop. In the inner loop figure we focus on the loop starting at line 4 of Algorithm 2,
i.e., where iterations correspond to solutions of (AugILP). As before, each color corresponds
to a tested value of g1 . There is a line plot displaying the minimum over augmenting steps
found in each outer iteration; however now there is also a semiopaque region above this line,
indicating the values of all the augmenting steps (including the non-minimal ones) found in
this iteration.
We chose two instances among the tested once as representative of the overall behavior:
Our first instance is Q||Cmax with parameters m = 15, S = 2000, L = 10000, item sizes
(2, 3, 13, 35) (so that we have an instance with nontrivial kAk∞ ), and weights (6, 13, 2, 1)
and σ = 0.45. The theoretical upper bound on g1 (A) is (rskAk∞ + 1)O(rs) , and here we
have r = 4, s = 1 and kAk∞ = 35; thus, without computing g1 (A) exactly, we should
consider it to be at least (4 · 36)4 . See Figures 1 and 2.
The third instance is Closest String with parameters k = 5, |Σ| = 2, L = 10000 and
r = 1. The N -fold model has r = 5, s = 1 and kAk∞ = 1, thus, without computing g1 (A)
exactly, we should consider it to be at least (2 · 5)5 . See Figure 3.
5.3
Conclusions
Our main takeaway regarding Question #1 is that, while the theoretical upper bounds
for g1 (A) are huge, already small values of g1 (g1 > 5 for Closest String and g1 > 20
K. Altmanová, D. Knop, and M. Koutecký
35000
30000
objective
25000
20000
15000
10000
35000
30000
25000
20000
15000
10000
5000
5000
5
10
15
20
iteration
25
30
35
40
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 5
g1=5 AugILP: 15
g1=6 AugILP: 15
g1=7 AugILP: 11
g1=8 AugILP: 16
g1=9 AugILP: 16
g1=10 AugILP: 12
g1=12 AugILP: 12
g1=14 AugILP: 5304
g1=16 AugILP: 111
g1=18 AugILP: 127
g1=20 AugILP: 114
g1=23 AugILP: 129
g1=26 AugILP: 107
g1=29 AugILP: 128
g1=33 AugILP: 106
g1=40 AugILP: 88
g1=45 AugILP: 81
g1=50 AugILP: 74
g1=60 AugILP: 58
g1=75 AugILP: 50
g1=90 AugILP: 48
g1=110 AugILP: 38
40000
35000
30000
25000
20000
15000
10000
5000
0
5
10
15
20
iteration
25
30
35
40
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 2
g1=5 AugILP: 4
g1=6 AugILP: 4
g1=7 AugILP: 4
g1=8 AugILP: 4
g1=9 AugILP: 6
g1=10 AugILP: 4
g1=12 AugILP: 6
g1=14 AugILP: 5765
g1=16 AugILP: 40
g1=18 AugILP: 127
g1=20 AugILP: 257
g1=23 AugILP: 96
g1=26 AugILP: 119
g1=29 AugILP: 1864
g1=33 AugILP: 99
g1=40 AugILP: 36
g1=45 AugILP: 37
g1=50 AugILP: 30
g1=60 AugILP: 80
g1=75 AugILP: 30
g1=90 AugILP: 44
g1=110 AugILP: 52
40000
35000
30000
25000
objective
0
objective
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 10
g1=5 AugILP: 25
g1=6 AugILP: 25
g1=7 AugILP: 25
g1=8 AugILP: 25
g1=9 AugILP: 24
g1=10 AugILP: 24
g1=12 AugILP: 24
g1=14 AugILP: 2379
g1=16 AugILP: 233
g1=18 AugILP: 228
g1=20 AugILP: 232
g1=23 AugILP: 237
g1=26 AugILP: 207
g1=29 AugILP: 193
g1=33 AugILP: 149
g1=40 AugILP: 139
g1=45 AugILP: 119
g1=50 AugILP: 127
g1=60 AugILP: 109
g1=75 AugILP: 94
g1=90 AugILP: 77
g1=110 AugILP: 69
40000
objective
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 8
g1=5 AugILP: 119
g1=6 AugILP: 156
g1=7 AugILP: 195
g1=8 AugILP: 231
g1=9 AugILP: 273
g1=10 AugILP: 307
g1=12 AugILP: 386
g1=14 AugILP: 13161
g1=16 AugILP: 4449
g1=18 AugILP: 5167
g1=20 AugILP: 5580
g1=23 AugILP: 5937
g1=26 AugILP: 6013
g1=29 AugILP: 6290
g1=33 AugILP: 3747
g1=40 AugILP: 3616
g1=45 AugILP: 3210
g1=50 AugILP: 3093
g1=60 AugILP: 2383
g1=75 AugILP: 2186
g1=90 AugILP: 2122
g1=110 AugILP: 1786
40000
23:11
20000
15000
10000
5000
0
5
10
15
20
iteration
25
30
35
40
0
5
10
15
20
iteration
25
30
35
40
Figure 1 Outer loop results for Makespan Minimization when using (left to right) Γbest , Γ2-apx ,
Γ5-apx , and Γany ; clipped to 40 outer iterations.
for Makespan Minimization) are sufficient for convergence. We remark that, in the
case of Closest String, this hints at the possibility that the maximum value of any
feasible augmenting step g ∈ G(A) is bounded by k O(1) rather than k O(k) , which would
imply an algorithm with runtime k O(k) log L while the currently best algorithm runs in time
2
k O(k ) log L [19].
Regarding Question #2, we see that Γ2-apx provides essentially the same convergence
rate as Γbest but is orders of magnitude cheaper to compute. The “any step” augmentation
strategy Γany usually converges surprisingly quickly, but our results make it clear that its
behavior is erratic and unpredictable. The inner loop Figure 2 reveals that a good step
(close to a Graver-best step) is usually found for larger step-length γ; this motivates adding
the Γ5-apx augmentation strategy to the comparison, as it spends less time on short steplengths than Γ2-apx . Figure 1 shows that using 5-approximate Graver-best steps instead of
2-approximate does not affect the outer loop convergence much, and Figure 2 shows that in
terms of the total number of (AugILP) calls it performs better.
Furthermore, we observe that solving (AugILP) using a MILP solver such as Gurobi
typically takes essentially as much time as solving (ILP) itself; in other words, current MILP
solvers are (without tuning) unable to make any use neither of the extra structure of E (N ) ,
nor the fact that we are seeking a solution with small `1 norm and the right hand side
is 0. Moreover, with a growing number of bricks N , the time to solve (AugILP) using a
MILP solver grows superlinearly, suggesting that, for large enough N , a specialized dynamic
programming algorithm might be competitive with generic MILP solvers.
Evaluating and Tuning n-fold Integer Programming
35000
30000
objective
25000
20000
15000
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 8
g1=5 AugILP: 119
g1=6 AugILP: 156
g1=7 AugILP: 195
g1=8 AugILP: 231
g1=9 AugILP: 273
g1=10 AugILP: 307
g1=12 AugILP: 386
g1=14 AugILP: 13161
g1=16 AugILP: 4449
g1=18 AugILP: 5167
g1=20 AugILP: 5580
g1=23 AugILP: 5937
g1=26 AugILP: 6013
g1=29 AugILP: 6290
g1=33 AugILP: 3747
g1=40 AugILP: 3616
g1=45 AugILP: 3210
g1=50 AugILP: 3093
g1=60 AugILP: 2383
g1=75 AugILP: 2186
g1=90 AugILP: 2122
g1=110 AugILP: 1786
35000
30000
25000
20000
15000
10000
10000
5000
5000
20
40
60
iteration
80
100
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 5
g1=5 AugILP: 15
g1=6 AugILP: 15
g1=7 AugILP: 11
g1=8 AugILP: 16
g1=9 AugILP: 16
g1=10 AugILP: 12
g1=12 AugILP: 12
g1=14 AugILP: 5304
g1=16 AugILP: 111
g1=18 AugILP: 127
g1=20 AugILP: 114
g1=23 AugILP: 129
g1=26 AugILP: 107
g1=29 AugILP: 128
g1=33 AugILP: 106
g1=40 AugILP: 88
g1=45 AugILP: 81
g1=50 AugILP: 74
g1=60 AugILP: 58
g1=75 AugILP: 50
g1=90 AugILP: 48
g1=110 AugILP: 38
40000
35000
30000
25000
20000
15000
0
20
40
iteration
60
80
100
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 2
g1=5 AugILP: 4
g1=6 AugILP: 4
g1=7 AugILP: 4
g1=8 AugILP: 4
g1=9 AugILP: 6
g1=10 AugILP: 4
g1=12 AugILP: 6
g1=14 AugILP: 5765
g1=16 AugILP: 40
g1=18 AugILP: 127
g1=20 AugILP: 257
g1=23 AugILP: 96
g1=26 AugILP: 119
g1=29 AugILP: 1864
g1=33 AugILP: 99
g1=40 AugILP: 36
g1=45 AugILP: 37
g1=50 AugILP: 30
g1=60 AugILP: 80
g1=75 AugILP: 30
g1=90 AugILP: 44
g1=110 AugILP: 52
40000
35000
30000
25000
objective
0
objective
g1=2 AugILP: 1
g1=3 AugILP: 1
g1=4 AugILP: 10
g1=5 AugILP: 25
g1=6 AugILP: 25
g1=7 AugILP: 25
g1=8 AugILP: 25
g1=9 AugILP: 24
g1=10 AugILP: 24
g1=12 AugILP: 24
g1=14 AugILP: 2379
g1=16 AugILP: 233
g1=18 AugILP: 228
g1=20 AugILP: 232
g1=23 AugILP: 237
g1=26 AugILP: 207
g1=29 AugILP: 193
g1=33 AugILP: 149
g1=40 AugILP: 139
g1=45 AugILP: 119
g1=50 AugILP: 127
g1=60 AugILP: 109
g1=75 AugILP: 94
g1=90 AugILP: 77
g1=110 AugILP: 69
40000
objective
40000
20000
15000
10000
10000
5000
5000
0
20
40
60
iteration
80
100
0
20
40
iteration
60
80
100
Figure 2 Inner loop results for Makespan Minimization when using (left to right) Γbest , Γ2-apx ,
Γ5-apx , and Γany ; clipped to 100 inner iterations.
1500
2000
1500
2000
1500
1000
1000
1000
500
500
500
0
0
5
10
15
iteration
20
25
30
0
0
5
10
15
iteration
20
25
30
g1=2 AugILP: 1
g1=3 AugILP: 11
g1=4 AugILP: 31
g1=5 AugILP: 31
g1=6 AugILP: 39
g1=7 AugILP: 37
g1=9 AugILP: 45
g1=10 AugILP: 41
g1=12 AugILP: 50
g1=14 AugILP: 44
g1=16 AugILP: 51
g1=18 AugILP: 50
g1=20 AugILP: 47
g1=23 AugILP: 41
g1=26 AugILP: 48
g1=29 AugILP: 49
g1=33 AugILP: 53
g1=40 AugILP: 51
2500
objective
2000
g1=2 AugILP: 1
g1=3 AugILP: 81
g1=4 AugILP: 176
g1=5 AugILP: 176
g1=6 AugILP: 151
g1=7 AugILP: 147
g1=9 AugILP: 115
g1=10 AugILP: 103
g1=12 AugILP: 97
g1=14 AugILP: 90
g1=16 AugILP: 81
g1=18 AugILP: 71
g1=20 AugILP: 65
g1=23 AugILP: 69
g1=26 AugILP: 60
g1=29 AugILP: 55
g1=33 AugILP: 43
g1=40 AugILP: 39
2500
objective
g1=2 AugILP: 1
g1=3 AugILP: 378
g1=4 AugILP: 758
g1=5 AugILP: 860
g1=6 AugILP: 634
g1=7 AugILP: 661
g1=9 AugILP: 499
g1=10 AugILP: 515
g1=12 AugILP: 396
g1=14 AugILP: 448
g1=16 AugILP: 378
g1=18 AugILP: 387
g1=20 AugILP: 398
g1=23 AugILP: 410
g1=26 AugILP: 398
g1=29 AugILP: 428
g1=33 AugILP: 278
g1=40 AugILP: 274
2500
objective
23:12
0
0
10
20
iteration
30
40
50
Figure 3 Outer loop results for the Closest String instance when using (left to right) Γbest ,
Γ2-apx , and Γany .
6
Outlook
We have initiated an experimental investigation of certain subclasses of ILP with block
structured constraint matrices. Our results show that, as theory suggests, for such ILPs
a primal algorithm always augmenting with steps of small `1 norm converges quickly. We
close with a few interesting research directions. First, is there a way to tune generic MILP
solvers to solve (AugILP) significantly faster than (ILP)? Second, what is the behavior of
our algorithm on instances other than N -fold IP? For example, how large must be g1 in
order to attain the optimum quickly for standard benchmark instances, e.g. MIPLIB [22]?
Third, the approach of Koutecký et al. [23] suggests that a key property for the efficient
solvability of (AugILP) is a certain “sparsity” and “shallowness” (formally captured by the
graph parameter tree-depth) of graphs related to A; what are “natural” instances with small
tree-depth?
K. Altmanová, D. Knop, and M. Koutecký
References
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Livio Bertacco, Matteo Fischetti, and Andrea Lodi. A feasibility pump heuristic for general mixed-integer problems. Discrete Optimization, 4(1):63 – 76, 2007. Mixed Integer
Programming. doi:https://doi.org/10.1016/j.disopt.2006.10.001.
Timo Berthold. Measuring the impact of primal heuristics. Operations Research Letters,
41(6):611–614, 2013.
Ralf Borndörfer, Martin Grötschel, and Ulrich Jäger. Planning problems in public transit.
In Production Factor Mathematics, pages 95–121. Springer, 2010.
Lin Chen and Daniel Marx. Covering a tree with rooted subtrees–parameterized and approximation algorithms. In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium
on Discrete Algorithms, pages 2801–2820. SIAM, 2018.
Markus Chimani, Matthias Woste, and Sebastian Böcker. A closer look at the closest
string and closest substring problem. In 2011 Proceedings of the Thirteenth Workshop on
Algorithm Engineering and Experiments (ALENEX), pages 13–24. SIAM, 2011.
Emilie Danna, Edward Rothberg, and Claude Le Pape. Exploring relaxation induced
neighborhoods to improve mip solutions. Mathematical Programming, 102(1):71–90, 2005.
Jesus A. De Loera, Raymond Hemmecke, and Matthias Köppe. Algebraic and Geometric
Ideas in the Theory of Discrete Optimization, volume 14 of MOS-SIAM Series on Optimization. SIAM, 2013.
Friedrich Eisenbrand, Christoph Hunkenschröder, and Kim-Manuel Klein. Faster algorithms for integer programs with block structure. arXiv preprint arXiv:1802.06289, 2018.
Elisabeth Finhold and Raymond Hemmecke. Lower bounds on the graver complexity of
m-fold matrices. Annals of Combinatorics, 20(1):73–85, 2016.
Matteo Fischetti and Andrea Lodi. Local branching. Mathematical programming, 98(13):23–47, 2003.
Gurobi Optimization, Inc. Gurobi optimizer reference manual, 2016. URL: http://www.
gurobi.com.
Stefan Heinz, Wen-Yang Ku, and Christopher J. Beck. Recent improvements using constraint integer programming for resource allocation and scheduling. In International Conference on AI and OR Techniques in Constriant Programming for Combinatorial Optimization
Problems, pages 12–27. Springer, 2013.
Raymond Hemmecke. Exploiting symmetries in the computation of graver bases. arXiv
preprint math/0410334, 2004.
Raymond Hemmecke, Matthias Köppe, and Robert Weismantel. Graver basis and proximity
techniques for block-structured separable convex integer minimization problems. Math.
Program., 145(1-2, Ser. A):1–18, 2014.
Raymond Hemmecke, Shmuel Onn, and Lyubov Romanchuk. n-fold integer programming
in cubic time. Math. Program., 137(1-2, Ser. A):325–341, 2013.
John D. Hunter. Matplotlib: A 2d graphics environment. Computing In Science & Engineering, 9(3):90–95, 2007. doi:10.1109/MCSE.2007.55.
Klaus Jansen, Kim-Manuel Klein, Marten Maack, and Malin Rau. Empowering the
configuration-ip-new ptas results for scheduling with setups times. arXiv preprint
arXiv:1801.06460, 2018.
Thomas Kluyver, Benjamin Ragan-Kelley, Fernando Pérez, Brian E Granger, Matthias
Bussonnier, Jonathan Frederic, Kyle Kelley, Jessica B Hamrick, Jason Grout, Sylvain Corlay, et al. Jupyter notebooks-a publishing format for reproducible computational workflows.
In ELPUB, pages 87–90, 2016.
Dušan Knop, Martin Koutecký, and Matthias Mnich. Combinatorial n-fold integer programming and applications. In Proc. ESA 2017, volume 87 of Leibniz Int. Proc. Informatics,
pages 54:1–54:14, 2017.
23:13
23:14
Evaluating and Tuning n-fold Integer Programming
20
21
22
23
24
25
26
27
28
29
30
Dušan Knop, Martin Koutecký, and Matthias Mnich. Voting and bribing in singleexponential time. In Proc. STACS 2017, volume 66 of Leibniz Int. Proc. Informatics,
pages 46:1–46:14, 2017.
Dušan Knop and Martin Koutecký. Scheduling meets n-fold integer programming. Journal
of Scheduling, Nov 2017. doi:10.1007/s10951-017-0550-0.
Thorsten Koch, Tobias Achterberg, Erling Andersen, Oliver Bastert, Timo Berthold,
Robert E Bixby, Emilie Danna, Gerald Gamrath, Ambros M Gleixner, Stefan Heinz, et al.
Miplib 2010. Mathematical Programming Computation, 3(2):103, 2011.
Martin Koutecký, Asaf Levin, and Shmuel Onn. A parameterized strongly polynomial
algorithm for block structured integer programs. arXiv preprint arXiv:1802.05859, 2018.
Andrea Lodi. Mixed integer programming computation. In 50 Years of Integer Programming 1958-2008, pages 619–645. Springer, 2010.
Shmuel Onn. Nonlinear discrete optimization. Zurich Lectures in Advanced Mathematics,
European Mathematical Society, 2010.
David Pisinger and Stefan Ropke. Large neighborhood search. In Handbook of metaheuristics, pages 399–419. Springer, 2010.
Yves Pochet and Laurence A Wolsey. Production planning by mixed integer programming.
Springer Science & Business Media, 2006.
Matthew J. Saltzman. Coin-or: an open-source library for optimization. In Programming
languages and systems in computational economics and finance, pages 3–32. Springer, 2002.
Tommi Sottinen. Operations research with gnu linear programming kit. ORMS, 1020:200,
2009.
The Sage Developers. SageMath, the Sage Mathematics Software System (Version 7.6),
2017. http://www.sagemath.org.
| 8cs.DS
|
arXiv:1711.05869v1 [stat.ML] 16 Nov 2017
Predictive Independence Testing,
Predictive Conditional Independence Testing,
and Predictive Graphical Modelling
Samuel Burkart∗ and Franz J. Király†
Department of Statistical Science, University College London,
Gower Street, London WC1E 6BT, United Kingdom
November 17, 2017
Abstract
Testing (conditional) independence of multivariate random variables is a task central to statistical inference and modelling in general - though unfortunately one for which to date there
does not exist a practicable workflow. State-of-art workflows suffer from the need for heuristic or
subjective manual choices, high computational complexity, or strong parametric assumptions.
We address these problems by establishing a theoretical link between multivariate/conditional
independence testing, and model comparison in the multivariate predictive modelling aka supervised learning task. This link allows advances in the extensively studied supervised learning workflow to be directly transferred to independence testing workflows - including automated tuning
of machine learning type which addresses the need for a heuristic choice, the ability to quantitatively trade-off computational demand with accuracy, and the modern black-box philosophy for
checking and interfacing.
As a practical implementation of this link between the two workflows, we present a python
package ’pcit’, which implements our novel multivariate and conditional independence tests, interfacing the supervised learning API of the scikit-learn package. Theory and package also allow
for straightforward independence test based learning of graphical model structure.
We empirically show that our proposed predictive independence test outperform or are on par
to current practice, and the derived graphical model structure learning algorithms asymptotically
recover the ’true’ graph. This paper, and the ’pcit’ package accompanying it, thus provide powerful, scalable, generalizable, and easy-to-use methods for multivariate and conditional independence
testing, as well as for graphical model structure learning.
∗ samuel.burkart.16@ucl.ac.uk
† f.kiraly@ucl.ac.uk
1
Contents
1 Introduction
1.1 Setting: testing independence . . .
1.2 Predictive independence testing . .
1.3 Graphical model structure learning
1.4 Principal contributions . . . . . . .
1.5 Paper overview . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2 Statistical independence testing
2.1 About (in)dependence . . . . . . . . . . .
2.2 Statistical independence testing . . . . . .
2.3 The state-of-art in advanced independence
2.4 Issues in current methodology . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
4
4
4
5
5
5
. . . . .
. . . . .
testing
. . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7
7
7
8
10
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3 Predictive independence testing
3.1 Mathematical setting . . . . . . . . . . . . .
3.2 Elicitation by convex losses . . . . . . . . .
3.3 Predictive uninformedness . . . . . . . . . .
3.4 Statistical dependence equals predictability
3.5 Conditional independence . . . . . . . . . .
3.6 Testing prediction error against baseline . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
11
11
12
13
14
18
19
4 Graphical Models
4.1 Informal definition of graphical models . . .
4.2 Types of graphical models . . . . . . . . . .
4.2.1 Bayesian Networks . . . . . . . . . .
4.2.2 Markov Networks . . . . . . . . . . .
4.3 Graphical model structure learning . . . . .
4.3.1 Score-based methods . . . . . . . . .
4.3.2 Independence testing based methods
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
22
22
22
22
24
25
25
26
5 Predictive inference algorithms
5.1 Predictive conditional independence testing . . . . . . . . .
5.1.1 False-discovery rate control . . . . . . . . . . . . . .
5.1.2 Improving the prediction functionals . . . . . . . . .
5.1.3 Supervised learning for independence testing . . . .
5.2 Predictive structure learning of undirected graphical models
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
27
27
28
28
29
29
6 pcit package
6.1 Overview . . . . . . . . . . . . . . . .
6.1.1 Use cases . . . . . . . . . . . .
6.1.2 Dependencies . . . . . . . . . .
6.2 API description . . . . . . . . . . . . .
6.3 Function signatures . . . . . . . . . . .
6.4 API design . . . . . . . . . . . . . . .
6.4.1 Sklearn interface . . . . . . . .
6.4.2 Wrapper for Sklearn estimators
6.5 Examples . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
31
31
31
31
31
32
34
34
34
35
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7 Experiments
7.1 Performance tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.1.1 Performance of conditional independence test . . . . . . . . . . . .
7.1.2 Performance of structure learning algorithm: Error rates . . . . . .
7.1.3 Performance of structure learning algorithm: Variance of estimated
7.2 Experiments on real data sets . . . . . . . . . . . . . . . . . . . . . . . . .
7.2.1 Sklearn data sets: Boston Housing and Iris . . . . . . . . . . . . .
7.2.2 Key short-term economic indicators (UK) . . . . . . . . . . . . . .
. . . .
. . . .
. . . .
model
. . . .
. . . .
. . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
36
36
36
37
40
41
41
41
8 Discussion
43
Appendices
45
A Best uninformed predictors: classification
A.1 Misclassification loss is a probabilistic loss . . . . . . . . . . . . . . . . . . . . . . . . .
A.2 Logarithmic loss is a proper loss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A.3 Brier loss is a proper loss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
45
46
46
B Elicited statistics for regression losses
B.1 Squared loss elicits the mean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
B.2 Quantile loss elicits the quantile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47
47
48
3
1. Introduction
1.1. Setting: testing independence
The study of dependence is at the heart of any type of statistical analysis, and independence testing
is an important step in many scientific investigations, be it to determine if two things are related, or
to assess if an intervention had the desired effect, such as:
• When conducting market research, one might be interested in questions such as “Are our advertisement expenditures independent of our profits?” (hopefully not), or the more sophisticated
version “conditional on the state of the market, are advertisement expenditures independent of
our profits?”, which, if found to be true, would mean we are unlikely to increase profits through
an increase in our advertising budget (subject to the usual issue that inferring causality from
data requires an intervention or instrument).
• When collecting data for a medical study on the occurrence of an outcome Y , one might ask
“In the presence of data about attributes A for the subjects, should we still collect data for
attributes B ”. If Y is independent of attributes B given attributes A, additionally collecting
information about attributes B will not improve the knowledge of the state of Y (subject to the
usual issue that this conclusion is valid only for patients sampled in the same way from the same
population).
The difficulty of the independence testing task crucially relies on whether the following two complications present:
• Multivariate independence testing. This concerns the type of values which the involved
variables, in the second example the values which attributes A and attributes B may take: if the
domain of possible values consists either of a single number (continuous variable), or one class
out of many (categorical variable), the hypothesis test is “univariate”, and powerful methodology
exists that deals well with most scenarios, subject to some constraints. Otherwise, we are in the
“multivariate hypothesis testing” setting.
• Conditional independence testing. Whether there are conditioning random variables which
are to be controlled for, in the sense of testing independence conditional on a possible third
attributes C. If so, we are in the “conditional hypothesis testing” setting.
For the task which is neither multivariate nor conditional, well-recognized and universally applicable
hypothesis tests (such as the t-test or chi-squared test) are classically known. The multivariate setting
and the conditional setting are less well studied, and are lacking approaches which are general and
universally accepted, due to difficulties in finding a suitable approach which comes with theoretical
guarantees and is free of strong model assumptions. The setting which is both multivariate and
conditional is barely studied. The three major state-of-the-art approaches are density estimation,
copula and kernel based methods. Most instances are constrained to specific cases or rely on subjective
choices that are difficult to validate on real-world data. A more detailed overview of the state-of-art
and background literature is given in Section 2.
1.2. Predictive independence testing
The methodology outlined in this paper will consider multivariate and conditional independence testing from a new angle. The underlying idea for the test is that if two random variables X, Y are
independent, it is impossible to predict Y from X - in fact it will be shown that these two properties
are equivalent (in a certain quantitative sense). The same applies to conditional independence tests:
two random variables X, Y are conditionally independent given Z, if adding X as predictor variable
4
above Z will not improve the prediction of Y . In both cases, the predictive hypothesis test takes the
form of comparing a good prediction strategy against an optimal baseline strategy via a predictive
loss function. By determining if losses stemming from two predictions are significantly different, one
can then test statistically if a variable adds to the prediction of another variable (potentially in the
presence of a conditioning set), which by the equivalence is a test for (conditional) independence.
1.3. Graphical model structure learning
Probabilistic graphical models are a concept that heavily relies on independence statements for learning and inference. Most structure learning algorithms to date are, as a result of the lack of a scalable
conditional independence tests and additional combinatorial issues, constraint-based, or make heavy
assumptions on underlying distributions of a sample. This paper will leverage the predictive independence test into a new routine to estimate the undirected graph for the distribution underlying a
sample, based on conditional independence testing, allowing it to make only weak assumptions on the
underlying distribution.
1.4. Principal contributions
The new approach to multivariate and conditional independence testing outlined in this paper improves
concurrent methodology by deriving an algorithm that
• features a principled model selection algorithm for independence testing by linking the field of
independence testing to the field of predictive modelling, thus filling a gap in state-of-the-art
methodology,
• additionally allowing independence testing to directly benefit from the well-understood and
efficiently implemented theory for model selection and parameter tuning in predictive modelling,
• is comparatively fast and scalable on a wide variety of problems and
• deals with the multivariate and conditional independence testing task in a straightforward manner.
Additionally, an algorithm leveraging the newly derived test into a scalable independence testingbased graphical model structure learning algorithm is outlined, which overcomes issues in the field by
offering a test for undirected graph structure learning that
• has polynomial time complexity, O(p2 ) in the number of variables, p,
• is exact and
• offers stringent methodology to control the number of type 1 errors in the estimated graph.
1.5. Paper overview
Section 2 will provide an overview of the most important tasks in and approaches to statistical independence testing and outline the issues in current methodology. Section 3 will then propose and derive
a novel approach to independence testing, the predictive conditional independence test (PCIT). After,
section 4 will introduce the concept of a graphical model and survey the current structure learning
algorithms. Section 5 will then state the relevant algorithms of the Python implementation, which
is outlined in section 6. Section 7 provides performance statistics and examples for the conditional
independence test as well as the graphical model structure learning algorithm. Lastly, section 8
will describe the advantages of using the PCIT for independence testing and outline drawbacks and
directions for further research.
5
Authors’ contributions
This manuscript is based on SB’s MSc thesis, submitted September 2017 at University College London
and written under supervision of FK, as well as on an unpublished manuscript of FK which relates
predictive model selection to statistical independence. The present manuscript is a substantial reworking of the thesis manuscript, jointly done by SB and FK.
FK provided the ideas for the independence tests (paper) in section 3 and the usage of them for
graphical models, SB and FK jointly conceived the ideas for the graphical model structure learning algorithm. Literature overview is due to SB with helpful pointers by FK. Python package and
experiments are written and conducted by SB, partially based on discussions with FK.
Acknowledgements
We thank Fredrik Hallgren and Harald Oberhauser for helpful discussions.
FH has briefly worked on a thesis about the same topic under the supervision of FK, before switching
to a different topic. While FH did, to our knowledge, not himself make any of the contributions found
in this paper, discussions with him insipred a few of them.
HO pointed FK in generic discussions about loss functions towards some prior results (elicitation of
median, and elicitation as a concept as defined by Gneiting and Raftery [17]) which helped making
some of the proven statements more precise (such as the Q-losses being faithful for the univariate real
case).
6
2. Statistical independence testing
2.1. About (in)dependence
Statistical (in)dependence is a property of a set of random variables central to statistical inference.
Intuitively, if a set of random variables are statistically independent, knowing the value of some will
not help in inferring the values of any of the others.
Mathematically: let X, Y and Z be random variables taking values in X, Y and Z respectively. As
usual, we denote for A ∈ X by P (X ∈ A) the probability of X taking a value in A, and for A ∈ X, C ∈ Z
by P (X ∈ A|Z ∈ C) := P (X ∈ A, Z ∈ C)/P (Z ∈ C) be the conditional probability of X taking a
value in A when Z is known/observed to have taken a value in C.
Definition 2.1. X and Y are called marginally independent (of each other) if for all A ⊆ X and
B ⊆ Y (where the below expression is defined) it holds that
P (X ∈ A, Y ∈ B) = P (X ∈ A)P (Y ∈ B).
This formulation allows for X and Y to be defined over sets of random variables that are a mixture of
continuous and discrete, as well as being univariate or multivariate (thus implicitly covering the case
of multiple univariate random variables as well).
Definition 2.2. X and Y are called conditionally independent (of each other) given Z if for all
A ⊆ X, B ⊆ Y, and C ⊆ Z (where the below expression is defined) it holds that
P (X ∈ A, Y ∈ B|Z ∈ C) = P (X ∈ A|Z ∈ C)P (Y ∈ B|Z ∈ C).
For absolutely continuous or discrete X and Y , Definition 2.1 straightforwardly implies that marginal
independence is equivalent to the joint distribution or mass function factorizing, i.e., it equals the
product of the marginal distributions’ probability or mass function. The analogue result also shows
for the conditional case.
We would like to note that the mathematical definition independence is symmetric, i.e., having the
property from Definition 2.1 is unaffected by interchanging X and Y . In contrast, the intuitive motivation we gave at the beginning however, namely that knowing the value of X does not yield any
additional restriction regarding the value of Y , is non-symmetric. This non-symmetric statement of
statistical independence is commonly phrased mathematically as P (Y ∈ B|X ∈ A) = P (Y ∈ B)
which is directly implied by Definition 2.1 (and that of the conditional).
This non-symmetric characterization of statistical independence is also morally at the heart of the
predictive characterization which we later give in the supervised learning setting: Y cannot be predicted from X, phrased in a quantitative way that connects checking of statistical independence to
estimation of a supervised generalization error difference which eventually allows for a quantitatve
testing of the hypothesis of independence.
2.2. Statistical independence testing
Testing whether two random variables are (conditionally) independent is one of the most common
tasks in practical statistics (perhaps the most common one after summarization) and one of the most
important topics in the theoretical study of statistical inference (perhaps the most important one).
The most frequently found types of quantitative certificates for statistical independence are phrased in
the (frequentist) Neyman-Pearson hypothesis testing paradigm. In terms of the methodological/mathematical idea, the main distinction of independence tests is into parametric (where the data is assumed
to stem from a certain model type and/or distribution) and non-parametric (”distribution-free”) tests.
The hypothesis tested usually takes one of the three following forms:
7
|=
Marginal independence, X
Y
Conditional independence, X
|=
Marginal independence of two random variables is the topos of much of classical statistics. Well
known classical test statistics for the continuous univariate case are the Pearson correlation coefficient,
Kendall’s τ and Spearman’s ρ. For discrete variables, Pearson’s χ-squared statistic can be used. From
theoretical results on these statistics’ asymptotic or exact distribution, univariate independence tests
may be derived. For X being discrete and Y being continuous, t-family tests or Wilcoxon family tests
may be used.
Testing with at least one of X or Y being multivariate is much more difficult and less standard, current
methodology will be outlined in the next section.
Y |Z
Testing for conditional independence is an inherently more difficult problem than marginal independence [7]. Hence, few viable options exist to date to test if two sets of variables are conditionally
independent given a conditioning set. The most common instances are either based on parametric
model assumptions (e.g., linear) or on binning Z and X, then comparing if the distribution of Y
conditioned on Z changes, when additionally conditioning on X. Strategies for of conditional independence testing may demand much larger sample sizes than marginal independence tests due to the
explicitly modelling sub-domains of the values which Z takes.
d
Equality of distribution of two unpaired samples, X1 = X2 ,
d
where = indicates equality in underlying distribution. An unpaired two-sample test for equality
of distribution tests whether two unpaired i.i.d. samples from X1 and X2 are sampled from the
same underlying distributions. The connection to independence testing is not obvious but may be
established by pairing each draw from X1 or X2 with a draw from a variable Y taking values in {1, 2},
indicating whether the draw was from X1 or X2 , i.e., taking value i if the draw was from Xi .
2.3. The state-of-art in advanced independence testing
The task of independence testing (in various settings) has been tackled from many different angles.
As soon as one considers observations that are multivariate, or the conditional task, there is not one
universally agreed-upon method, but many different approaches. The most prominent ideas used for
multivariate and/or conditional independent testing will be presented in this section together with
their advantages and shortcomings.
Density estimation
The classical approach. In case of existence, the joint probability density function contains all the
necessary information about independence structures for a set of random variables in the multivariate
case. While many univariate tests are based on or may be interpreted as being based on some sort of
density estimation, for the multivariate and conditional case, density estimation is a difficult problem.
One example is shown in [12], where density estimation-based information-theoretical measures are
used to conduct multivariate marginal independence tests.
Copulas
An approach that is widely used in finance and risk management. Copulas are multivariate probability
distributions with uniform marginals. To use copulas for independence tests, one transforms the
marginals of a multivariate distribution into uniform distributions, and the resulting copula contains
all information about the independence structure. A simple example using the empirical cdf can be
found in [16]. Copulas have mainly been used for marginal multivariate independence tests, such as in
8
[34]. The task of testing for conditional independence has been attempted through the use of partial
copulas [6], however strong assumptions (linearity) are made on the type of relationship between the
variables that are to be tested for independence and the conditioning set. Two-sample testing has
largely remain unaddressed, since its application in the financial sector are less relevant. [33] describes
a two-sample test for the estimated copulas, and hence, the independence structures, but the test does
not extend to a comparison of the joint distributions as a whole.
Kernel methods
|=
A relatively recent approach using optimization techniques in reproducing kernel Hilbert spaces to
answer independence queries based on various test-statistics. Kernel methods were first used for
marginal multivariate independence testing via a quantitative measure of dependence, the HilbertSchmidt Independence Criterion (HSIC), which is defined as the squared Hilbert Schmidt norm of
the cross-covariance operator (the covariance between two difference spaces), see [19]. [20] further
expands on the theoretical foundations of the HSIC’s distribution under the null, resulting in a hypothesis test for the independence of two variables X and Y using the HSIC criterion. [18] outlines
a non-parametric test for independence, and demonstrates its performance on samples of random
variables with up to three dimensions.
The conditional case is tackled in [37], which derives a test statistic based on conditional crosscovariance operators, for which the asymptotic distribution under the null-hypothesis X Y |Z is
derived. They state that the manual choice of kernel can affect type II and, more importantly, type I
errors, especially when the dimensionality of the conditioning set is large. Additionally, they found
that the performance of their method decreases in the dimensions of the conditioning set, constraining
the set of problems for which the test is viable for.
As for two-sample testing, [3] derive a test based on the Euclidean inter-point distances between the
two samples. A different approach to the same test statistics with the additional use of characteristic
functions was made by [13]. While the difficulty of density estimation is reduced when using the
empirical distributions, the data requirements tend to be much larger, while additionally imposing a
sometimes taxing computational complexity. Both of these methods can be related to kernel functions, which was picked up in [22], which proposed kernel-based two-sample test by deriving three
multivariate tests for assessing the null-hypothesis that the distributions p and q generating two samples X ∼ p, Y ∼ q are equal, p = q. The criterion introduced is the “Maximum Mean Discrepancy”
(MMD) between p and q over a function space F.
M M D = sup (EX∼p [f (X)] − EY ∼q [f (Y )])
f ∈F
That is, the maximum difference between the expected function values with respect to the function
space (in their case, a Reproducing Kernel Hilbert Space).
Predictive independence testing: precursors
There are a few instances in which independence testing has already been approached from the perspective of predictability: most prominently, Lopez-Paz and Oquab [28] present a two-sample test
(on equality of distribution) based on abstract binary classifiers, e.g., random forests. The presented
rationale is in parts heuristic and specific to the two-sample setting. Their main idea is as follows: if
the null-hypothesis of the two samples being drawn from the same distribution is true, no classifier
assigning to a data point the distribution from it was drawn should fare significantly better than
chance, on an unseen test set.
The work of Lopez-Paz and Oquab [28] may be seen as a special case of our predictive independence
test presented later, for Y taking values in a two-element set, and the loss being the misclassification
loss. It is probably the first instance in which the abstract inability to predict is explicitly related to
independence, albeit somewhat heuristically, and via the detour of two-sample testing for equality in
9
distribution.
In earlier work, Sriperumbudur et al. [35] already relate the kernel two-sample test to a specific classifier, the Parzen window classifier, evaluated by the misclassification loss. Thus this ideas of Sriperumbudur et al. [35] may in turn be seen as a precursor of the later work of Lopez-Paz and Oquab [28]
which abstracts the idea that any classifier could be used to certify for equality of the two samples.
2.4. Issues in current methodology
Density estimation
While the probability density function is in some sense optimal for measuring dependence, since
it contains all the information about the random variable, its estimation is a difficult task, which
requires either strong assumptions or large amounts of data (or both). Furthermore, due to the
curse of dimensionality, density estimation for 3 or more dimensions/variables is usually practically
intractable, hence its practical usefulness is often limited to testing pairwise independence rather than
testing for full (mutual) independence.
Copulas
Leaving aside issues arising by practitioners misunderstanding the method (which had a strong contribution to the 2007/2008 financial crisis, but no bearance whatsoever on the validity of the method
when applied correctly), copula-based independence testing is largely a heuristics driven field, requiring many subjective manual choices for estimation and testing. Above all, copula methods require a
user to subjectively choose an appropriate copula from a variety of options, such as for example the
survival copula, the multivariate Gaussian or the multivariate Student’s t-copula [9]. Additionally,
two-sample testing is to date largely unaddressed in the field.
Kernels
As for the copula-based methods, kernels require many subjective and manual choices, such as the
choice of kernel function, and its hyper-parameters. While in a theoretical setting, these choices are
made by using the ground truth (and generating artificial data from it), in practice it is difficult to
tune the parameters and make statements about the confidence in results. Additionally, the cost of
obtaining the test statistic and its asymptotic distribution may be high for many of the proposed approaches. There are attempts at resolving these issues, [36] and [23] outline heuristics and strategies
to minimize the heuristic choices, and [21] and [10] propose more computationally efficient strategies.
While all methods have their merits, and there is vast research on specific problems, providing specific
solutions to the individual challenges, what is missing is an approach that is scalable and powerful
not just for specific cases, but for the general case, that automatically finds good solutions to real
problems, where the ground truth is not known and cannot be used for tuning.
10
3. Predictive independence testing
This section will explore the relationship between predictability and dependence in a set of variables. It
will be shown that one can use supervised learning methodology to conduct marginal and conditional
independence tests. This distinction between marginal and conditional dependence is not theoretically
necessary (since the marginal case can be achieved by setting the conditioning set to the empty set),
but is made to highlight specific properties of the two approaches. First, equivalence of independence
statements and a specific supervised learning scenario will be shown. After, a routine leveraging this
equivalence to test for conditional independence will be proposed.
3.1. Mathematical setting
The independence tests will be based on model comparison of supervised learning routines.
Supervised learning is the task where given i.i.d. samples (X1 , Y1 ), . . . , (XN , YN ) ∼ (X, Y ) taking
values in X × Y, to find a prediction functional f : X → Y such that f (Xi ) well approximates a
target/label variables Yi , where ”well” is defined with respect to a loss function L which is to be
minimized in expectation.
Definition 3.1. A (point prediction) loss functional is an element of [Y×Y → R], i.e., a function with
range Y × Y and image R. By convention, the first argument will be considered the proposed/predicted
value, the second the true value to compare to. By convention, a lower loss will be considered more
beneficial.
A loss functional L : Y × Y → R is called:
(i) convex if L(., y) is lower bounded and E [L(Y, y)] ≤ L (E[Y ], y) for any Y-valued random variable
Y and any y ∈ Y, and
(ii) strictly convex if L(., y) is lower bounded and E [L(Y, y)]
L (E[Y ], y) for any non-constant
Y-valued random variable Y and any y ∈ Y.
More formally, a good prediction functional possesses a small expected generalization error
L (f ) := E[L(f (X), Y )].
In usual practice and in our setting f is estimated from training data
D = {(Xi , Yi )}N
i=1 ,
hence it is in fact a random object. The generalization error may be estimated from test data
T = {(Xi∗ , Yi∗ )}M
i=1
∗
∗
where (X1∗ , Y1∗ ), . . . , (XM
, YM
) ∼ (X, Y ),
which we assume i.i.d. and independent of the training data D and f , as
b
L (f ) =
M
X
[L(f (Xi∗ ), Yi∗ )].
i=1
Independence of training data D and test data T is required to avoid bias of the generalization error
estimate (“over-fitting”). In the following sections, when estimating the generalization error, it will
be assumed that f is independent of the test data set, and we condition on D, hence treat f as fixed
(i.e., conditional on D).
In the following, we assume that Y is a vector space, and Y ⊆ Rq , which naturally includes the setting
of supervised regression. However, it also includes the setting of supervised classification through a
special choice of loss:
11
Remark 3.2. Deterministic classification comprises the binary case of Y = {−1, 1}, or more generally
Y being finite. In neither case are additions or expectations defined on Y, as Y is just a discrete
set. Supervised classification algorithms in the deterministic case are asked to produce a prediction
functional f : X → Y, and are usually evaluated by the misclassification loss or 0/1-loss
L : Y × Y → R : (y, y∗ ) 7→ 1[y 6= y∗ ],
where 1[y 6= y∗ ] is the indicator function which evaluates to 0 if y = y∗ and to 1 otherwise. Hence,
Definition 3.1 of convexity does not directly apply to the misclassification loss as expectations are not
defined on Y.
However, by allowing all algorithms to make predictions which are Y-valued random variables (instead
of constants), one finds that
E[L(Y, y)] = L0 (p, y)
where L0 : (pY , y) 7→ 1 − pY (y)
and pY is the probability mass function of Y . Identifying Y-valued random variables with their probability mass functions, one may replace
(i) Y by the corresponding subset Y0 of R#Y−1 which is the set of probability vectors (the so-called
probability simplex). For example, Y = {−1, 1} would be replaced by [0, 1].
(ii) the misclassification loss by the probabilistic, convex (but not strictly convex) loss L0 : Y0 ×Y0 → R,
where the observations in the second Y0 argument are always pmf describing constant random
variables.
A further elementary calculation (see appendix A.1 for an explicit derivation) shows that L0 is always
minimized by making deterministic predictions:
argmin E[L0 (p, Y )] ∩ [Y → {0, 1}] is non-empty,
p∈Y0
i.e., the L0 -best classifier may always be chosen to be a deterministic one, i.e., one that always predicts
a probability mass functions with probabilities 0 or 1.
This exhibits deterministic classification as a special case of probabilistic classification with a special
choice of loss function.
3.2. Elicitation by convex losses
Loss functionals are canonically paired with summary statistics of distributions:
Definition 3.3. Let L : Y × Y → R be a convex loss functional. For a Y-valued random variable Y ,
we define
µL ([Y ]) := argminE [L(y, Y )]
y∈Y
where [Y ] denotes Y as a full object (i.e., a measurable function), rather than its value.
Following Gneiting and Raftery [17], we term the functional which maps Y-valued distributions to
sub-sets of Y the eliciting functional associated to L. We call µL ([Y ]) the summary of Y elicited by
L.
Note that well-definedness, i.e., existence of the minimizer, is ensured by convexity of L (and the
implied continuity). If L is strictly convex, there is furthermore a unique minimizer, in which case we
will exchangeably consider µL to be a functional with target Y.
Well-known examples of elicited summaries are given in the following:
Lemma 3.4. The following relations between losses and elicited statistics of real-valued random variables hold:
12
(i) the (strictly convex) squared loss L : (y, y∗ ) 7→ (y−y∗ )2 elicits the mean. That is, µL ([Y ]) = E[Y ]
for any Rn -valued random variable Y .
(ii) the (convex but not strictly convex) absolute loss L : (y, y∗ ) 7→ |y − y∗ | elicits the median(s).
That is, µL ([Y ]) = median[Y ] for any R-valued random variable Y .
(iii) the (convex but not strictly convex) quantile-loss (or short: Q-loss) L(y, y∗ ) = α · m(y∗ , y) + (1 −
α) · m(y, y∗ ), with m(x, z) = min(x − z, 0), elicits the α-quantile(s). That is, µL ([Y ]) = FY−1 (α)
for any R-valued random variable Y , where FY−1 : [0, 1] → P (R) is the set-valued inverse c.d.f. of
Y (with the convention that the full set of inverse values is returned at jump discontinuities rather
than just an extremum).
Proof. (i) after substitution of definition, the claim is equivalent to the statement to the mean being
the minimizer of squared distances. A more explicit proof is given in Appendix B.1.
(ii) follows, by setting α = 12 , from (iii).
(iii) This is carried out in Appendix B.2.
In the supervised setting, the best possible prediction functional can be exactly characterized in terms
of elicitation:
Proposition 3.5. Let L be a (strictly) convex loss. Then, it holds that
argmin εL (f ) = [x 7→ µL [Y |X = x]] .
f ∈[X→Y]
That is, the best possible prediction as measured by L is predicting the statistic which L elicits from
the conditional random variable Y |X = x.
Proof. The prediction functional ω : x 7→ µL [Y |X = x] is well-defined, hence it suffices to show that
εL (f ) ≥ εL (ω) for any prediction functional f : X → Y.
Now by definition of µL , it holds that
E [L(ω(X), Y )|X] ≤ E [L(f (X), Y )|X] .
Taking total expectations yields the claim.
Intuitively, the best prediction functional, as measured by a convex loss L, always predicts the statistic
elicited by L from the conditional law [Y |X = x].
3.3. Predictive uninformedness
We will now introduce the notion of an uninformed baseline which will act as a point of comparison.
Definition 3.6. A prediction functional f : X → Y is called uninformed if it is a constant functional,
i.e., if f (x) = f (y) for all x, y ∈ X. We write uα for the uninformed prediction functional uα : x 7→ α.
We will show that, for a given loss function, there is one single uninformed baseline that is optimal.
Lemma 3.7. Let L be a (strictly) convex loss, let µ := µL ([Y ]) be the/a statistic elicited by L (see
Definition 3.3). Then, the following quantities are equal:
(i) inf{εL (f ) : f is an uninformed prediction functional}
(ii) εL (uµ )
That is, uµ is achieves the lowest possible (L-)loss amongst uninformed prediction functionals and
prediction strategies.
Proof. Note that ε(uα ) = E[L(α, Y )]. It follows hence by definition of µ that ε(uµ ) ≤ ε(uα ) for any
(constant) α ∈ Y. I.e., uµ is the best uninformed prediction functional.
13
Lemma 3.7 motivates the definition of the best uninformed predictor:
Definition 3.8. We call uµ , as defined in Lemma 3.7, the (L-)best uninformed predictor (even though
it may not be unique, the choice, when possible, will not matter in what follows).
We call a prediction functional (L−)better-than-uninformed if its expected generalization loss is strictly
smaller than of the (L−)best uninformed predictor. More formally, a prediction functional f is Lbetter-than-uninformed if εL (f ) ≤ εL (uµ ).
For convenience, we further introduce some mathematical notation for best predictors:
Notation 3.9. Let L be a (strictly) convex loss. We will write:
(L)
(i) ωY
(ii)
(L)
(L)
ωY |X
:= [x 7→ µL [Y ]] for the/a (L-)best uninformed predictor as defined in Definition 3.8.
:= [x 7→ µL [Y |X = x]] for the/a (L-)best predictor as considered in Proposition 3.5.
(L)
ωY and ωY |X are unique when L is strictly convex, as per the discussion after Definition 3.3. When
multiple choices are possible for the minimizer, i.e., if L is convex but not strictly convex, an arbitrary
choice may be made (not affecting subsequent discussion). The superscript L may be omitted in
situations where the loss is clear from the context.
An important fact which we will use in testing is that if a better-than-uninformed prediction functional
exists, then ωY |X is an example:
Proposition 3.10. Fix a (strictly) convex loss. The following are equivalent:
(i) ωY |X is L-better-than-uninformed.
(ii) ωY |X is not L-uninformed.
(iii) There is an L-better-than-uninformed prediction functional.
Note that equivalence of (i) and (ii) is not trivial, since there are prediction functionals which are not
better-than-uninformed but not uninformed.
Proof. The equivalence of (i) and (iii) follows directly from Lemma 3.7, and noting that (i) implies
(iii).
(i)⇔(ii): By Proposition 3.5, ε ωY |X ≤ ε(f ) for any f , in particular also any uninformed f . By
Lemma 3.7 and the above, the inequality is strict if and only if ωY |X is better-than-uninformed.
3.4. Statistical dependence equals predictability
We continue with a result that relates - or more precisely, equates - better-than-uninformed predictability with statistical dependence. As such, it shows that the choice of constant functions as a
proxy for uninformedness was canonical.
We start with the more intuitive direction of the claimed equivalence:
Proposition 3.11. Let X, Y be random variables taking values in X, Y. Let L be any convex loss
functional. If X, Y are statistically independent, then: There exists no L-better-than-uninformed
prediction functional for predicting Y from X. More precisely, there is no prediction functional f :
X → Y and no convex loss L : Y × Y → R such that f is L-better-than-uninformed.
Proof. Assume X, Y are statistically independent. Let L be a convex loss function, let f : X → Y be
a prediction functional. Then, by convexity of L,
E [L(f (X), Y )|Y ] ≥ L(E[f (X)], Y )|Y.
14
Since X is independent of Y (by assumption) and f is not random, it holds that E[f (X)]|Y = E[f (X)],
i.e., E[f (X)]|Y = y, as a function of y, is constant. Writing ν := E[f (X)], we hence obtain that
L(E[f (X)], Y )|Y = L(ν, Y ) = L(uν , Y ).
After taking total expectations, it hence holds by the law of total expectation that
E [L(f (X), Y )] ≥ E [L(uν , Y )] ,
meaning that f is not better-than-uninformed w.r.t. L. Since f and L were arbitrary, the statement
holds.
Proposition 3.11 states that independence implies unpredictability (as measured per expected loss). A
natural question to ask is whether the converse holds, or more generally which converses exactly, since
the loss functional L in (ii) and (iii) of Proposition 3.10, was arbitrary, and independence in (i) is a
statement which remains unchanged when exchanging X and Y , while predictability is not symmetric
in this respect. Hence the weakest possible converse would require unpredictability w.r.t. all convex
losses and w.r.t. either direction of prediction, however much stronger converses may be shown.
Before stating the mathematically more abstract general result for the converse direction, we first
separately present special cases for the three important sub-cases, namely deterministic classification,
probabilistic classification, and regression.
Theorem 1. As in our setting, consider two random variables X, Y , taking values in X and Y.
Assume Y = {−1, 1}. The following are equivalent:
(i) X and Y are statistically independent.
(ii) There exists no better-than-uninformed prediction functional predicting Y from X. More precisely, there is no prediction functional f : X → Y such that f is L-better-than-uninformed for
the misclassification loss L : (p, y) 7→ 1 − p(y).
Regarding the specific loss L, see Remark 3.2 for the identification of a class prediction with a
probability-1 probabilistic prediction.
Proof. By Proposition 3.11, the only direction which remains to be proven is (ii)⇒(i): (i)⇒(ii) follows directly from substituting the specific L into the implication between statements with the same
numbers in Proposition 3.11.
(ii)⇒ (i): We prove this by contraposition: we assume X and Y are statistically dependent and
construct a better-than-uninformed prediction functional.
By the equivalence established in Remark 3.2, the best uninformed predictor ωY is predicting the
most probable class, w.l.o.g. 1 ∈ Y, and its expected generalization loss is one minus its generative
frequency ε(ωY ) = P (Y = −1).
Since X and Y are statistically dependent, there is a positive probability X0 ⊆ X (measurable with
positive probability measure) such that P (Y = 1|X ∈ X0 ) ≥ P (Y = −1|X ∈ X0 ) (the definition yields
6=, but w.l.o.g. replacing X0 by its complement yields ≥). An elementary computation shows that the
prediction functional f : X → Y : 2 · 1[x ∈ X0 ] − 1 is better-than-uninformed.
The proof of Theorem 1 shows that for a converse, one does not necessarily need to consider predictability of X from Y as well. However, the deterministic binary classification case is somewhat
special, since the misclassification loss is insufficient in the multi-class case, and in general a single
loss function will be unable to certify for independence. In order to formulate these negative results,
we define shorthand terminology for stating correctness of the converse.
15
Definition 3.12. Fix a (label) domain Y, let L be a set with elements being convex loss functionals
in [Y × Y → R]. We call L faithful for Y if for every statistically dependent pair of random variables
X, Y taking values in X, Y, there is L ∈ L and a prediction functional f : X → Y such that f is
L-better-than-uninformed. If L is a one-element-set, we call its single element faithful for Y.
If L is faithful for Y, and L is endowed with a measure µ such that no µ-strict sub-set of L is faithful
for Y, then we call L (µ-)strictly faithful.
If Y is canonically associated with a prediction task (such as classification for finite Y or classprobabilities Y, regression for continuous Y), the reference to Y may be replaced by a reference to
that task.
In this terminology, Theorem 1 states that the misclassification loss is faithful for the label domain Y =
{−1, 1}, or equivalently that the misclassification loss is faithful for deterministic binary classification
(and strictly faithful, since any set smaller than an one-element set, as by the counting measure,
is empty and by definition not faithful). We can now state some negative and positive results on
deterministic multi-class classification and probabilistic classification:
Proposition 3.13. (i) The misclassification loss L : (p, y) 7→ 1 − p(y) is not faithful for deterministic multi-class classification, i.e., for Y being finite and containing 3 or more elements.
(ii) The log-loss L : (p, y) 7→ − log(p(y)) is (strictly) faithful for probabilistic classification.
(iii) The squared probabilistic classification loss L : (p, y) 7→ (1 − p(y))2 is (strictly) faithful for
probabilistic classification.
P
(iv) The Brier loss L : (p, y) 7→ (1 − p(y))2 + y0 6=y p(y 0 )2 is (strictly) faithful for probabilistic
classification.
Proof. (i): It suffices to construct a counterexample for each possible Y, i.e., every finite Y with 3 or
more elements. Let X = {−1, 1}, and let y ∈ Y be arbitrary. Define X, Y such that P (Y = y|X =
1) = P (Y = y|X = −1) := 0.9 and P (Y = y 0 |X = 1) 6= P (Y = y 0 |X = −1) for some class y 0 6= y.
This choice is possible as Y has 3 or more elements. The best uninformed predictor always predicts
y, with expected generalization loss 0.1, while it cannot be outperformed, see e.g. the discussion in
Remark 3.2.
(ii)-(iv): for faithfulness, it suffices to show that ε(ωY |X ) = ε(ωY ) implies statistical independence of
X, Y .
Explicit computations in each case (see Appendices A.2 and A.3) show that argminp E[L(p, Y )] = pY ,
where pY is the probability mass function of Y , implying that ωY = [x 7→ [y 7→ P (Y = y)]]. By
conditioning the same statement on X, this also implies that argminp E[L(p, Y )|X] = [y 7→ P (Y =
y|X)], thus argminf E[L(f (X), Y )] = [y 7→ P (Y = y|X = x)]. In particular, ωY |X = [x 7→ [y 7→
P (Y = y|X = x)]] is the unique minimizer of the expected generalization loss. Thus, ε(ωY |X ) = ε(ωY )
only if both functions are identical, i.e., P (Y = y|X = x) = P (Y = y) for all x, which is one possible
definition of X and Y being statistically independent.
For regression, the usual loss functions are unable to certify for independence anymore:
Proposition 3.14. The following convex loss functions (taken as single-element sets) are not faithful
for univariate regression, i.e., for the label domain Y = R
(i) the squared loss L(y, y∗ ) = (y − y∗ )2
(ii) the absolute loss L(y, y∗ ) = |y − y∗ |
(iii) the distance loss L(y, y∗ ) = d(y, y∗ )2 , for any metric d : Y × Y → R
Proof. It suffices to construct, for each convex loss functional L, a counterexample where X, Y are
statistically dependent, but no prediction functional predicting Y from X is better-than-L-uninformed.
In each case, one may construct two Y-valued random variables Y1 , Y2 with distinct laws such that
µL [Y1 ] = µL [Y2 ] - for example, an arbitrary non-constant Y1 and the Y2 being constant µL [Y1 ]. Further
16
setting X = {−1, 1} and defining a non-constant X-valued random variable X, together with an Yvalued random variable such that Yi = Y |X = i for i ∈ X yields an example of a statistically dependent
pair X, Y of random variables where the constant prediction of µL [Y1 ] = µL [Y2 ] is not only the L-best
uninformed prediction functional, but also the L-best prediction functional.
Using equivalence of (i) and (iii) in Proposition 3.10 proves the claim.
The previously introduced quantile losses form a strictly faithful set of losses for univariate regression:
Theorem 2. The set of Q-losses is strictly faithful for (univariate) regression.
More precisely, the set L = {Lα : α ∈ [0, 1]}, where Lα (y, y∗ ) = α · m(y∗ , y) + (1 − α) · m(y, y∗ ), with
m(x, z) = min(x − z, 0) (see Lemma 3.4 (iii)), endowed with the Lebesgue measure through canonical
identification of Lα with [0, 1], is strictly (Lebesgue-measure-)faithful for Y = R.
Proof. For faithfulness, we show that impossibility of (Lα )-better-than-uninformed prediction of a
R-valued random variable Y from an X-valued random variable X implies statistical independence of
X and Y .
Thus, assume that there is no α ∈ R and no prediction functional f such that f is Lα -betterthan-uninformed. By equivalence of (ii) and (iii) in Proposition 3.10 and negation/contraposition,
(Lα )
ωY |X
is uninformed hence constant. By Lemma 3.4 (iii), µLα [Y |X = x] is the α-quantile of the
conditional random variable Y |X = x, which by the previous statement does not depend on x. Since
α was arbitrary, none of the quantiles of Y |X = x depends on x, i.e., the cdf and hence the laws
of all conditionals Y |X = x agree, which implies (by one common definition/characterization of
independence) that X and Y are statistically independent.
Strict faithfulness follows by following through the above argument after removing a positive-measure
open set U ⊆ [0, 1] from the indices, i.e., Lα for α∈ U from L. As U has positive measure, we may pick
u ∈ U and X = {−1, 1} as well as conditional cdf such that P (Y ≤ u|X = 1) 6= P (Y ≤ u|X = −1)
while P (Y ≤ x|X = 1) = P (Y ≤ X|X = −1) for all x 6∈ U . By the above argument, predicting the
α-quantile of Y is the Lα -best prediction functional from X for any α 6∈ U , and it is furthermore a
uninformed prediction strategy, thus L is not faithful after removing Lα , α ∈ U .
In the light of Theorem 2, it may be interesting to ask for a theoretical characterization of a strictly
faithful set of losses for univariate regression (e.g., does it need to be infinite?), or what may be a set
of strictly faithful losses for multivariate regression.
A-priori, it is even unclear whether there is a set of (not necessarily strictly) faithful losses for general
prediction tasks, which the following result answers positively:
Theorem 3. Assume that Y may be identified (including the taking of expectations) with a sub-set
of Rn , for some n, e.g., in multivariate regression, or simultaneous prediction of multiple categorical
and continuous outputs. Then, the set of convex losses is faithful for Y.
Proof. Consider random variables X and Y taking values in X and Y, are statistically dependent.
By definition of (in)dependence, this is equivalent to there existing X0 ⊆ X, Y0 ⊆ Y (measurable
with positive joint probability measure) such that P (Y ∈ Y0 |X ∈ X0 ) 6= P (Y ∈ Y0 ). By taking
(or not taking) the complement of X0 within X, we may assume without loss of generality that
P (Y ∈ Y0 |X ∈ X0 ) P (Y ∈ Y0 ).
Define g : Y → R ; x 7→ x2 (where we have used the identification of Y with Rn . Define
L : Y × Y → R ; (y, y∗ ) 7→ g(y) · 1(y∗ ∈ Y0 ) + g(y − α) · 1(y∗ 6∈ Y0 ),
where 1(y∗ ∈ Y0 ) is the indicator function for y∗ ∈ Y0 , and α ∈ Y \ {0} is arbitrary. Define f : X →
Y ; x 7→ 0 if (x ∈ X0 ), otherwise α. An elementary computation shows that εL (f ) is better-thanuninformed, hence we have proved non-(ii).
17
For the general case, it seems interesting to ask what would be a strictly faithful set of losses, how
such sets may be characterized, or whether they even exist (which seems neither obviously nor directly
implied by the existence of a faithful set of losses).
Due to the constructive nature of respective proofs (or, more precisely, the semi-constructivity of
the proof for multi-variate regression in Theorem 3), model comparison procedures suggested by
Theorems 1 and 2 on univariate classification and regression will be used in the testing procedures.
For convenience we briefly repeat the main results used in testing as a corollary:
Corollary 3.15. Consider two random variables X, Y , taking values in X and Y, where Y is finitely
supported pmf (classification) or where Y ⊆ Rq (regression). The following are equivalent:
(i) X and Y are statistically dependent.
(L)
(L)
(ii) ε(ωY |X ) εL (ωY ) for L the log-loss/Brier-loss (classification), resp. for some convex loss L
(regression). I.e., the L-best predictor is L-better-than-uninformed, for some L.
(L)
(iii) there exists a prediction functional f : X → Y such that εL (f )
εL (ωY ) for L the logloss/Brier-loss (classification), resp. for some convex loss L (regression). I.e., there exists an
L-better-than-uninformed prediction functional, for some L.
|=
Since Corollary 3.15 (i) is the alternative hypothesis in an independence test, we may use a test for
the equivalent hypothesis Corollary 3.15 (iii), i.e., comparing the performance a learnt f with the
best uninformed baseline, as an independence test. Any choice of f is sufficient for the methodology
outlined in the latter Section 5.1. Since the null-hypothesis is that X Y , choosing a bad f or failing
to detect multivariate dependence (a specific case) only decreases the power of the test, while the type
1-error remains unaffected.
3.5. Conditional independence
The last section established a theoretical foundation for marginal independence testing, now this foundation will be expanded by adding a framework for testing conditional independence.
The statement one would like to make thus connects two random variables, X and Y , that are conditionally independent given a third variable, Z, taking values in Z, with the expected generalization
loss from predicting Y from Z and from the set {X, Z}.
In slight extension of our setting, we consider prediction functionals in [X × Z → Y], i.e., we separate
the features in two parts corresponding to X and the conditioning Z.
We generalize the main definitions from Section 3.3 to the conditional case:
Definition 3.16. A prediction functional f : X × Z → Y is called conditionally uninformed if it does
not depend on the first argument, i.e., if f (x, z) = f (y, z) for all x, y ∈ X and z ∈ Z. By notational
convention, a functional g : Z → Y is identified with the conditionally uninformed prediction functional
(x, z) 7→ g(z).
In the text, it will be implicitly understood that conditioning will happen on the second argument.
We define straightforward conditional generalizations of baselines and best predictors:
Definition 3.17. We define the following prediction functionals in [X × Z → Y :
(L)
The best conditionally uninformed prediction ωY |Z : (x, z) 7→ µL ([Y |Z = z])
(L)
The best conditional prediction ωY |X,Z : (x, z) 7→ µL ([Y |X = x, Z = z])
(L)
(L)
It is briefly checked that ωY |Z and ωY |X,Z have the properties their names imply:
Lemma 3.18. Let L be a (strictly) convex loss. The following holds:
(L)
(i) εL (ωY |Z ) = min{εL (f ) : f is a conditionally uninformed prediction functional}
18
(L)
(ii) εL (ωY |X,Z ) = min{εL (f ) : f ∈ [X × Z → Y]}
Proof. (i) Conditioning on the event Z = z, Lemma 3.7 for the unconditional case implies the equality
conditional for the event. Since z was arbitrary, it holds without the conditioning.
(ii) This is directly implied by Proposition 3.5, by substituting the joint random variable (X, Z) for
the X in Proposition 3.5.
With these definitions, the conditional variant of Theorem 3 can be stated:
Theorem 4. As in our setting, consider three random variables X, Y, Z, taking values in X, Y, Z,
where Y is finitely supported pmf (classification) or where Y ⊆ Rq (regression). The following are
equivalent:
(i) X and Y are statistically dependent conditional on Z.
(L)
(L)
(ii) εL (ωY |(X,Z) )
εL (ωY |Z ) for L the log-loss/Brier-loss (classification), resp.
loss L (regression)
for some convex
(L)
(iii) there exists a prediction functional f : X × Z → Y such that εL (f )
εL (ωY |Z ) for L the
log-loss/Brier-loss (classification), resp. for some convex loss L (regression)
(iv) there exists a prediction functional f : X × Z → Y such that for all conditionally uninformed
prediction functionals g : (X×)Z → Y, one has εL (f )
εL (g) for L the log-loss/Brier-loss
(classification), resp. for some convex loss L (regression)
The set of losses in which existence is required in (ii) may be restricted to a set of losses which is
faithful for the unconditional setting (such as: quantile losses for Y = R as per Theorem 2), as in
Section 3.4, without changing the fact that the stated equivalence is correct.
Proof. The proof is an analogue of that of Corollary 3.15. It may be obtained from following the
whole proof through while in addition conditioning on Z = z, and noting that (i) holds if and only if
the conditionals X|Z = z and Y |Z = z are statistically dependent for some z.
Our conditional independence test is based on statement (iv) in Theorem 4. Unlike in the uncondi(L)
tional case, there is no easy way to estimate ωY |Z directly. Thus, in the algorithm in Section 5.1,
the statement will be replaced by a slightly weaker statement, where automatic model selection will
(L)
(L)
determine an f as well as a g, without guarantees that f = ωY |X,Z or that g = ωY |Z are optimal.
This is in line with the usual approach to and caveats of supervised learning - if there were a universal
(L)
way to estimate ωY |Z , that would amount to a universally perfect supervised learning strategy.
3.6. Testing prediction error against baseline
Theorems 3 or 4 in the previous sections establish a new basis for (marginal or conditional) independence testing. Namely, the theorems relate testing of (marginal or conditional) dependence between
X and Y to testing predictability of Y from X. Namely, Theorems 3 or 4 state the following: If there
exists a significantly better-than-(conditionally-)uninformed prediction strategy f , i.e,
εL (f )
εL (g),
(L)
(1)
(L)
where g is a suitable baseline (an approximation of ωY or ωY |Z ), then we may conclude by Theorem 3
or 4 that X and Y are not (marginally or conditionally) independent.
Thus the problem of independence testing is reduced to the problem of testing whether there exists
a prediction functional f which outperforms the baseline g as measured by some convex loss function
L.
We make a few remarks about the strategy and logic of our proposed significance test.
19
• Neither the proposed functional f nor the baseline g are a-priori known in the usual practical
setting, and neither is an L which may make a difference apparent. However, both f and g
may be seen to approximate a best prediction functional which is unknown, thus as instances
of supervised learning. Hence, some choice has to be made, in absence of the “perfect learning
strategy”. A bad choice will contribute to a loss of power only if type I error control is achieved.
(L)
• The baseline g approximates ωY in the marginal case. For frequently used L, the baseline g
predicts constants which are the mean or the median or other well-studied statistics of a sample
from Y , hence g may have a beneficial asymptotic.
• Significance tests to compare prediction strategies are studied in [29], which proposes amongst
others a paired sample test of prediction residuals.
The values εL (f ), εL (g) may be estimated by respective empirical estimates, by the usual estimator
M
1 X
Li (f )
εbL (f ) :=
M i=1
where Li (f ) = L(f (Xi∗ ), Yi∗ ),
and similar εbL (g) for g. Since the test data (Xi∗ , Yi∗ ) are independent of each other and of f, g, by the
central limit theorem, one has
√
d
M (b
εL (f ) − ε(f )) −
→ N(0, Var[L(f (X), Y )]), M → ∞,
conditional on f and g being fixed. That is, the empirical mean of the loss residuals for prediction
strategy f and loss L is asymptotically normal with mean ε(f ) and variance Var[L(f (X), Y )])/N .
Instead of directly estimating εL (f ) and εL (g) with confidence intervals and then comparing, one
notes (as also in [29]) that the samples of loss residuals Li (f ) and Li (g) are inherently paired, which
eventually leads to a more powerful testing procedure.
We hence consider the difference in the i-th loss residual, Ri := Li (g) − Li (f ). The Ri are still
i.i.d. (conditional on f, g) and also have a normal asymptotic, usually with smaller variance than
either of f, g in empiry. An effect size of the difference is obtained with normal confidence intervals,
and one may conduct a one-sided paired two-sample test for the null
H0 : E(ε(g) − ε(f )) ≤ 0 against HA : E(ε(g) − ε(f ))
0.
Note that the test is one-sided since we test for f to outperform the baseline g.
To assess this null-hypothesis, two simple tests, one parametric and one non-parametric, are implemented.
• T-test for paired samples [29]: A parametric test assuming that the sample mean of loss
residual differences Ri is normally distributed with mean 0 and standard deviation σ. Under
the assumptions of the test and the null hypothesis, the normalized empirical mean t := m
d
u/b
σ,
where m
d
u and σ
b are the sample mean and standard deviation of the Ri , respectively, follows a
t-distribution with M degrees of freedom, where we have used the fact that under H0 it holds
that E[R] = 0.
• Wilcoxon signed-rank test: If the sample mean of loss residual differences Ri is not normally
distributed, an increase in power can be achieved by testing if the rank differences are symmetric
around the median. Since the Ri in question are differences in loss residuals, there is no ex-ante
reason to assume normality, in particular for a “good” non-baseline method one may expect
that most are positive, hence the normality assumption may be too strong. Hence the nonparametric Wilcoxon class test should be a better general approach to compare loss residuals
(see pages 38-52 of [11] for the Wilcoxon tests).
20
One subtlety to notice is that instead of testing for the alternative hypothesis “there exists f such
(L)
that εL (f ) ≤ εL (ωY )” which certifies for independence, by the above strategy we are testing for
the alternative “there exists f such that for all/the best g it holds that εL (f ) ≤ εL (g)” where g is a
(L)
fixed estimate of ωY . However, g is dependent on the training data and itself uncertain. Thus, for a
(L)
conservative estimate of the significance level, uncertainty in g estimating ωY needs to be taken into
account.
(L)
In the unconditional case, ωY will be a constant predictor of an elicited statistic of the training
labels, such as the mean, median or one minus the majority class frequency, with known central limit
theorems that may be used to adapt the Student or Wilcoxon type tests (e.g., by explicitly increasing
the variance in the t-test).
In either case, one may also bootstrap the distribution of g and make use of it as follows: Since the
training set is independent of the test set, the function g, is as a random variable which is a function
of the training data, also independent of the test data. Thus instead of using a fixed g in prediction,
one can ensure a conservative test by using a bootstrap sample of pseudo-inputs for the predictions,
a different sample of g per test data point that is predicted.
Since the exact form of the correction appears an unresolved sub-problem of the predictive model
validation and model selection process in general, and since bootstrapping of g is computationally
costly, we have implemented the “fixed g” variant (potentially liberal) in the package which can be
easily adapted to potential corrections based on explicit asymptotics.
We will present an algorithmic implementation in Section 5.1 as an algorithmic conditional testing
routine, which is later applied to graphical model structure learning, in Section 5.2
21
4. Graphical Models
This section will briefly review graphical models and graphical model structure learning, which we
will later address using the conditional independence test outlined in Section 3.
4.1. Informal definition of graphical models
A probabilistic graphical model is a graph-based description of properties of a joint probability distribution (possibly but not necessarily a full specification thereof). It usually consists of a directed
or undirected graph, together with a fixed convention how to translate the graph structure into a
full probability distribution, or more generally, into conditional independence statements about a
distribution of not further specified type.
Graphs
A graph G is an ordered pair (V, E) where V ⊆ E × E. The set V are interpreted as vertices (nodes)
of the graph, and the elements in E are interpreted as edges (links) of the graph (ordered for directed
graphs, unordered for undirected graphs). G is usually visualized by drawing all vertices V and edges
between all pairs of vertices in E. In graphical models, the vertex set is identified with a collection of
(possibly associated) random variables X = [X1 , ..., Xn ], and the edges encode some independence or
conditional independence information about the components of X. Two popular choices are discussed
in Section 4.2 below.
Probabilistic graphical models
Graphical model theory is usually concenred two main tasks, structure learning (of the graph) and
inference (on a given graph). Inference is concerned with estimating parameters or statistics of the
parametric distribution assuming the independence structure prescribed by a fixed graph, from a finite
sample drawn from X. Structure learning is concerned with inferring the graph from such a sample,
thus inferring the encoded independence relations. For an extended introduction to graphical models,
the reader might refer to [26] or [2].
Graphical model structure learning is usually considered the more difficult of the two tasks, due to the
combinatorial explosion of possible graphs. Manual approaches involve an expert encoding domain
knowledge in presence or absence of certain edges; automated approaches usually conduct inference
based on parametric distributional assumptions combined with selection heuristics [26].
4.2. Types of graphical models
We review two of the most frequently used types of graphical models.
4.2.1. Bayesian Networks
A Bayesian network is a graphical model which states conditional independence assumptions without making parametric distributional assumptions. The conditional independence assumptions are
encoded in a directed acyclic graph over a set of random variables. Acyclicity of the graph implies
that each node Xi has a (potentially empty) set of descendants,
Definition 4.1. A node Xj is a descendant of Xi in the graph G if there is a directed path from Xi
to Xj , where a path is any connection of links that lead from Xi and Xj .
That is, if there is a path following the arrows in G, going from Xi to Xj . Since the graph is acyclic,
no cycles exist, and following the arrows in the graph, the same variable can never be reached twice.
Examples of such a networks are shown in Figure 1.
22
Difficulty
Intelligence
Difficulty
Intelligence
GPA
Grade
Grade
Grade
Letter
Letter
Letter
(a)
(b)
(c)
Figure 1: Example of expert based graphical model structure learning (backtracking), adapted
from [26].
(a) The quality of an academic reference letter is determined by the grade
(b) The students intelligence and course difficulty determine the grade.
(c) Knowing a students GPA gives additional information about the state of intelligence
Bayesian Network graphs arise in a natural way when considering the factorization properties of a
probability distribution. Assume we are interested in a probability distribution P over the Dif f iculty
of a course, a students Intelligence, the Grade a student achieved in a course, and the quality of
a reference Letter received from the tutor of the course, P (Dif f iculty, Intelligence, Grade, Letter).
Further assume the following is true
|=
• The quality of the Letter is solely determined by the Grade a student received in the course.
That is, Letter {Dif f iculty, Intelligence}|Grade
• The Grade of a student depends on the Dif f iculty of the course and his Intelligence
• Dif f iculty and Intelligence are not causally influenced by any other variable in the graph
This gives a natural way to order the variables for factorization. Dif f iculty and Intelligence are
so-called root nodes, hence their order is irrelevant, however Grade depends on both of them and
Letter depends on Grade, giving the ordering: {Letter, Grade, Dif f iculty, Intelligence}, which will
now be denoted as {L, G, D, I}. An ordering {X1 , ..., Xn } implies that for ∀i, j ∈ {1, ..., n} and i < j,
Xj can not be a descendant of Xi . The distribution is then factorized, according to the ordering,
P (L, G, D, I) = P (L|G, D, I)P (G, |D, I)P (D|I)P (I),
a standard way to factorize distributions. Working in the independence statements gives
P (L, G, D, I) = P (L|G)P (G, |D, I)P (D)P (I),
|=
|=
since L {D, I}|G and D I. Returning to Figure 1 (b) shows that this factorized distribution exactly
matches the arrows in the graph, which start at the parents (the conditioning variables) and lead to
the children (the variable that the conditional distribution is over).
To understand the independence statements encoded in a Bayesian Network, one needs to first distinguish between active and passive trails [26, p. 71]. Let a trail be any path between Xi and Xj on G
and a v-structure a structure such that Xi−1 → Xi ← Xi+1 , where Xi is a descendant of both Xi−1
and Xi+1 .
23
A
C
E
B
D
F
G
Figure 2: Markov Network
Definition 4.2. A trail between Xi and Xj is active given a conditioning set Z, if for every v-structure
Xi−1 → Xi ← Xi+1 along the trail, Xi or one if it’s descendants is in Z and no other variables on
the trail are in Z.
In Figure 1 (c) that means, the trail from Letter to GPA is active only if conditioned on either the
empty set or Difficulty, and the trail between Intelligence and Difficulty is only active if Grade or
Letter is in the conditioning set.
|=
Definition 4.3. [2] If there is no active trail in the graph G between the nodes X and Y given Z,
then X Y |Z in any distribution consistent with the graph G
4.2.2. Markov Networks
A Markov Network, or Markov Random Field, is a graphical model which encodes conditional independence statements in an undirected graph over a set of random variables. While the Bayesian
Network is defined in terms of probability distributions, the Markov Network is usually specified in
terms of factor products which are unnormalized probability distributions. The scopes of these factors
determine the complexity of the system, if the scope of a factor covers all the variables in the graph,
the graph is unconstrained, whereas any constraint to smaller scopes decreases its complexity.
Figure 2 shows the Markov Network for the (normalized) factor product
P (a, b, c, d, e, f, g) =
1
φ1 (a, b, c)φ2 (b, c, d)φ3 (c, e)φ4 (e, f )φ4 (f, g)φ5 (e, g),
Z
with the normalizing constant (partition function) Z. Small letters denote realizations of the capitallettered nodes. If P is a probability mass function,
X
Z=
φ1 (a, b, c)φ2 (b, c, d)φ3 (c, e)φ4 (e, f )φ4 (f, g)φ5 (e, g),
a,b,c,d,e,f,g
|=
|=
where φ(s) is such that φ : S → R, ∀s ∈ S.
If P is a probability density function over continuous variables, Z would be attained by integrating
over the support of the variables in the scopes of P .
Since the links are undirected, independence statements arising from Markov Networks are symmetric.
A path between Xi and Xj , i 6= j is called active given Z, if no node on the path is in Z. To determine
whether Xi and Xj are conditionally independent given Z in all distributions consistent with G, one
again considers all paths going from Xi to Xj . It holds that Xi Xj |Z if there is no path between Xi
and Xj that is active given Z.
So to attain a Markov Network that is consistent with a probability distribution, one has to consider
the pairwise conditional independence properties of the variables that the nodes in the graph represent.
In general, if in a Markov Network there is no link between a variable Xi and Xj , then Xi Xj |X \
{Xi , Xj } in any distribution P over X consistent with the graph. These are called the pairwise
Markov-independencies of the graph [15, ch. 17.2].
The independencies that can be encoded using Bayesian and Markov Networks differ. Bayesian
24
X
Y
X
Y
Figure 3: Two DAGs equivalent with respect to independence statements
Networks are natural to express (hypothesized) causal relationships, distributions where an ordering
can be attained and thus have nice factorization properties, while Markov Networks are natural
for expressing a set of pairwise Markov independencies. Additionally, Bayesian Networks can be
transformed into an undirected graph by a (potentially forgetful) process called ”moralization” [26,
p. 135].
4.3. Graphical model structure learning
There are two dominant approaches to structure learning, independence testing based and score-based
methods, however they both suffer to a varying extent from the same underlying problem: combinatorial explosion. Given a probability distribution P (with associated graph G) over a multivariate
random variable X = [X1 , ..., Xn ], for undirected networks, between any pair of variables Xi and Xj
potential
there can be a link or no link in G. Since the links are undirected, there are thus p(p−1)
2
edges in the graph, and an exponential number of possible graphs. If one wants to test if Xi and Xj
are independent given Z, Z ⊂ X, one needs to test if any path between the two is active, leading to a
potentially very large number of tests. A graph’s complexity can be decreased by upper bounding the
number of edges for each node, however, it was shown that, for directed graphs where each node can
have d parents, for d > 1, the problem a finding an optimal graph is NP-hard [26, p. 811]. Generally,
the space of graphs is reduced by making structural (what type of relationships can be captured in the
graph) and parametric (constraints on the distribution) assumptions. An additional problem is posed
when there exists more than one optimum to the structure learning method, as a result of the fact
that different graphs can be equivalent (and thus not identifiable) in the respective search space. An
example of this are the two graphs shown in Figure 3, which arises from the fact that if {X, Y } ∼ P ,
P can be decomposed either into P (X|Y )P (Y ) or P (Y |X)P (X), which are equivalent. There are
different ways to approach these problems, some of which are outlined below.
4.3.1. Score-based methods
Score-based methods attempt to find a (usually local) optimum of a score function in the space of
possible graphs. Examples of this can be the Kullback-Leibler divergence scoring function for directed
graphical models, which can be used to find the optimal Chow-Liu tree graph [2, p.219]. While this
is a convex algorithm, finding the global optimum, it does so under the heavy constraint that each
node only has one parent at maximum (resulting in a tree-structured graph). For undirected graphs
over discrete variables, gradient descent can be used directly on the log likelihood to find the local
optimum [2, p. 221], however each gradient evaluation requires calculation of the partition function
Z (by summing over all discrete states), which makes this algorithm very expensive. Many of the
algorithms for score-based methods are designed for discrete variables, and not applicable when the
variables are continuous. Performance is usually evaluated by calculating the likelihood score on a
hold-out sample. One other area not mentioned above is Bayesian model averaging (e.g. [14]), which
seeks to improve the above methods by averaging over different model structures. It can be viewed
as an ensembling method for the score-based methods mentioned above. State-of-the-art score based
methods are oftentimes very expensive or make very strong assumptions on the underlying distribution
P , such as tree-structure of the graph [26, ch. 18].
25
4.3.2. Independence testing based methods
Unlike the score-based models, independence testing based models conduct independence tests between
variables or sets of variables locally and then aggregate the information to produce the graphical model.
These sets of independence tests are then used to infer the structure of the graph in a straightforward
manner, based on the properties of the respective type of graphical model. An example of this is the
PC-Algorithm [2, e.g. p. 214] which is used in attempts at causal discovery. Another algorithm for
recovering the undirected skeleton is given by Algorithm 3.3 of [26].
There are probably two main reasons that this latter independence testing based method is not used
for graphical modelling:
(a) is that it relies on a conditional independence test where the conditioning is on multiple variables,
i.e., all except two. As outlined in Section 2, this is a largely unsolved problem expect when
there is at most one conditioning variable, i.e., if there are three or less variables in total.
(b) It is hard to regulate the bias-variance trade-off, unlike for score-based methods where this may
be achieved through the use of constraints such as an upper bound on the number of parents.
However, these two issues may be addressed through our novel predictive conditional independence
testing framework:
(a) The predictive conditional independence test described in the subsequent Section 5.1, based on
the theoretical insights in Section 3, allows for efficient conditional independence testing with
variables of any dimension, and thus provides a predictive approach to learning graphical models.
(b) The link to the supervised learning workflow allows for direct adoption of well-known strategies to
trade-off bias and variance and error estimation from supervised learning, such as regularization
and cross-validatied tuning, to the graphical modelling workflow..
In addition, our suggested algorithms have further desirable features:
• The intimate link to supervised learning also allows for a controlled trade-off between power of
the algorithm and time complexity. This trade-off is readily available when using the conditional
independence testing routine described in Section 5.1, since the user can choose estimation
methods of varying power/complexity in order to influence the total run time needed by the
algorithm.
• Section 5.1.1 will also introduce a false-discovery-rate control routine to provide a tool that lets a
user control the proportion of false-positives (erroneously found edges in the estimated graphical
model structure), regardless of the size of the graph.
Note on causal inference
Graphical models, and specifically Bayesian Networks, are a natural way to express hypothesized
causality, since the arrows seem to express causation. However, when actually learning graphical
models from data, causality may only be inferred by making strong (and often incorrect) assumptions
on the underlying distribution, or by collecting data in a manner that allows for causal interpretation,
namely in proper experimental set-ups (e.g., following Pearl’s do-calculus, or standard experimental
study design). As generally for graphical model structure learning, all algorithms outlined in this paper
are not to be interpreted as expressing causality, but merely as producing a collection of statements
about association which certify for causality only in combination with the right experimental set-up.
26
5. Predictive inference algorithms
This section will first introduce the proposed predictive conditional independence testing routine
(PCIT), which is based on the methodology outlined in Section 3, and important subroutines related
to performance and error control of the test. After, an algorithm to leverage the independence test into
a graphical model structure learning routine that addresses the issues outlined in 4.3.2 is presented.
5.1. Predictive conditional independence testing
Algorithm 1 implements the results from Section 3 to test if a set of variables Y is independent of
another set of variables X, given a conditioning set Z (optional, if not provided the algorithm tests
for marginal independence). It will later be used as a subroutine in the graphical model structure
learning, but can also be used in it’s own right for tasks such as determining if a subset X would add
additional information when trying to predict Y from Z.
Algorithm 1 Predictive conditional independent test (PCIT)
Split data into training and test set
for all variables y ∈ Y do
on training data:
4:
find optimal functional f for predicting y from Z
5:
find optimal functional g for predicting y from {X,Z}
1:
2:
3:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
on test data:
calculate and store p-value for test that generalization loss of g is lower than f
end for
if symmetric test needed then
exchange X and Y, repeat above process
end if
p values adjusted ← Apply FDR control to array of all calculated p-values
return p values adjusted
When the test is used as a marginal independence test, the optimal prediction functional for f is
the functional elicited by the loss function, that is, the mean of y for continuous outputs, and the
class probabilities of y for the discrete case (Appendix ??). The link to supervised learning further
allows/forces the user to distinguish between two cases. Independence statements are symmetric, if
X is independent of Y , then Y is independent of X, in both the marginal and conditional setting.
The same cannot be said in supervised learning, where adding X to predicting Y from Z might result
in a significant improvement, but adding Y does not significantly improve the prediction of X, given
Z (as can be seen in the asymmetry of OLS). So if a user is interested in a one-sided statement, the
algorithm can be run for a single direction, for example to evaluate if a new set of variables improves
a prediction method, and is thus worth collecting for the whole population. If one is interested in
making a general statement about independence, the test is “symmetrized” be exchanging X and Y ,
and thus testing in both directions, and FDR control be applied to the union of the p-values.
It is important to distinguish between the two types of tests and null-hypotheses in this test. On one
hand (in the symmetric case) for each variable in X and Y , it will be assessed, if adding X to the
prediction of y ∈ Y from Z results in an improvement (and vice versa). The null-hypothesis of this
“prediction-null” is that no improvement is achieved. After all these p-values are collected, a multiple
testing adjustment is applied (Section 5.1.1), after which the original null-hypothesis, that X and
27
Algorithm 2 The Benjamini-Hochberg-Yekuteli Procedure
j
Require: Set {p(i) }m
i=1 s.t. pj : p-value for observing Xj under H0
1: Sort the p-values in ascending order, p(1) ≤ ... ≤ p(m)
Pm
2: Let q = α/( i=1 1/i) for chosen confidence level α
i
3: Find the k s.t. k = max(i : p(i) ≤ m
q)
j
4: Reject H0 for j ∈ 1, ..., k
Y are conditionally independent, is assessed. We reject this “independence-null”, if any one of the
“prediction-nulls” can be rejected after adjustment. The p-value of the “independence-null” hence
reduces to the lowest p-value in all the “prediction-nulls”. As such, the null of the independence test
is that all the “prediction-nulls” are true. False discovery rate control, the chosen multiple testing
adjustment, is appropriate since it controls the family-wise error rate (FWER), the probability of
making at least one type 1 error, if all the null-hypotheses are true [4].
5.1.1. False-discovery rate control
To account for the multiple testing problem in Algorithm 1, the Benjamini - Hochberg - Yekutieli
procedure for false-discovery rate (FDR) control is implemented [5]. In their paper, they state that
traditional multiple testing adjustments, such as the Bonferroni method, focus on preserving the
FWER. That is, they aim to preserve the probability of making any one type 1 error at the chosen
confidence level. As a result, tests are usually very conservative, since in many multiple-testing scenarios the p-values are not independently distributed (under the null), and thus the power of these
tests can be significantly reduced.
In their 2001 paper, they propose to control the false discovery rate instead, “[..] the expected proportion of erroneous rejections among all rejections”, as an alternative to the FWER. The FDR allows
for more errors (in absolute terms) when many null-hypothesis are rejected, and less errors when few
null-hypotheses are rejected.
Algorithm 2 shows the procedure outlined in [5]. They showed, that this procedure always controls
the FDR at a level that is proportional to the fraction of true hypotheses. As hinted at before, while
this algorithm controls the false-discovery rate, in the special case where all null-hypotheses in the
multiple testing task are assumed to be true, it controls the FWER, which then coincides with the
FDR. This is especially useful, since both scenarios occur in the graphical model structure learning
routine described in Section 5.2.
For the choice of optimal false discovery-rate for an investigation, even more so than in the classical
choice of appropriate type 1 error, there is no simple answer for which rate might serve as a good
default, and it is highly application dependent. If the goal of the procedure is to gain some insight
into the data (without dire consequences for a false-discovery), a user might choose a FDR as high
as 20%, meaning that, in the case of graphical model structure learning, one in five of the discovered
links is wrong on average, which might still be justifiable when trying to gain insight into clustering
properties of the data. This paper will still set the default rate to 5%, but deviate willingly from this
standard whenever deemed appropriate, as should any user of the test.
5.1.2. Improving the prediction functionals
In practice, when assessing the individual “prediction-nulls” in Algorithm 1, the power of the test
(when holding the loss function constant) depends on the capability of the the prediction method to
find a suitable functional g that outperforms the baseline f . That means, a general implementation of
the independence test needs to include a routine to automatically determine good prediction functionals for g and f . The implementations in the pcit package presented in Section 6 support two methods
for the automatic selection of an optimal prediction functional. Both methods ensemble over a set
28
Stage 1
Regression
Classification
ElasticNetCV
BernoulliNB
GradientBoostingRegressor
MultinomialNB
RandomForestRegressor
GaussianNB
SVR
SGDClassifier
RandomForestClassifier
SVC
Stage 2
LinearRegression
LogisticRegression
Table 1: Prediction functionals used for Stacking/Multiplexing
of estimators, which are shown in Table 1. The prediction functionals refer to the estimator names
in sklearn1 . Some are constrained to specific cases (e.g. BernouilliNB, which only applies when the
classification problem is binary).
Stacking Stacking refers to a two-stage model, where in the first stage, a set of prediction function
is fit on a training set. In the second stage, another prediction function is fit on the outputs of the
first stage. If the prediction function in the second stage is a linear regression, this can be viewed as a
simple weighted average of the outputs in the first stage. In theory, stacking allows the user to fit one
single stacking predictor instead of having to compare many potential prediction functions based on
the model diagnostics, as in the second stage, better methods get more weight (in the expectation).
As an additional effect, improvement in the prediction accuracy through ensembling of predictors can
take place (see e.g. Section 19.5 of [1]). The used stacking regressor and classifier can be found in the
Python package Mlxtend [32].
Multiplexing When multiplexing over estimators, the training set is first split into a training and
validation set, a common procedure to find optimal hyperparameters. After, the predictors are fit
individually on the training set, and each predictors expected generalization loss is estimated on the
validation set. One then proceeds by choosing the predictor with the lowest estimate for the empirical
generalization loss, and refits it using the whole training data (including the former validation set),
and then uses the fitted estimator for prediction.
5.1.3. Supervised learning for independence testing
Algorithm 1 shows how to leverage supervised learning methodology into a conditional independence
test. This has a major advantage over the methods outlined in Section 2, as the supervised prediction
workflow is of utmost interest to many areas of science and business, and, as a result, a lot of resources
are going into development and improvement of the existing methods. By making a link between
predictive modelling and independence testing, the power of independence testing will grow in the
continuously increasing power of the predictive modelling algorithms.
5.2. Predictive structure learning of undirected graphical models
This section outlines a routine to learn the vertices in a directed graph (the skeleton) for a data
set by conducting a range of conditional independence tests with the null hypothesis of conditional
independence. Section 4.2 outlines the conditional independence statements of a Markov network. In
a directed graph, if variables Xi and Xj have no direct edge between them, they are conditionally
independent given all other variables in the network.
1 Details
can be found here http://scikit-learn.org/stable/modules/classes.html
29
Algorithm 3 Undirected graph structure estimation
for any combination Xi , Xj s.t. i 6= j do
X− ← X \ {Xi , Xj }
p vali,j ← p-value for test Xi Xj |X−
end for
p val adj ← Apply FDR control on p val matrix
return p val adj
|=
1:
2:
3:
4:
5:
6:
Algorithm 3 describes the skeleton learning algorithm for an input set X = [X1 , ..., Xn ], by considering
all possible pairs of variables in the data set, and testing if they are conditionally independent given
all other variables. The output p val adj is a symmetric matrix with entries i,j being the p-value
for the hypothesis that in the underlying distribution, Xi and Xj are independent, given all other
variables in X, and hence in the graph G describing it, there is no link between the vertices for Xi and
Xj . Ultimately, links should be drawn where the adjusted p-values are below a predefined threshold.
There are O(n2 ) function evaluations in the for-loop, where n is the number of variables. Section 7
will provide experimental performance statistics for the algorithm and showcase applications on real
data sets.
30
6. pcit package
6.1. Overview
The Python2 package implementing the findings and algorithms of this paper can be found on https:
//github.com/SamBurkart/pcit and is distributed under the name pcit in the Python Package Index.
This section will first provide an overview of the structure and important functions of the package. As
this implementation can be thought of as a wrapper for scikit-learn (sklearn) estimators, this section
will then describe the sklearn interface and how the package interacts with the sklearn estimators.
Lastly, simple application-examples are given.
6.1.1. Use cases
The package has two main purposes, independence testing and structure learning. While univariate
unconditional independence testing is possible, it is not expected to outperform current methodology
in the simple tasks, but the difficult ones, such as
Multivariate independence tests, such as for hedging purposes in a multivariate test to determine
which financial products are independent from the ones already in the portfolio.
Conditional independence tests, such as assessing if a data set adds information to existing data
in a prediction task.
Graphical model structure learning, such as for finding clusters in the data as part of an exploratory data analysis or thoroughly investigating associations in the data (both in section 7.2.2).
For these tasks, the PCIT serves as a readily available tool that works without the need for manual
choices or hyperparameter tuning, and scales well in the dimensionality of the data.
6.1.2. Dependencies
The package has the following dependencies:
Scipy [25], for the calculation of p-values
Sklearn [31], for its estimators (predictors)
Mlxtend [32], for the implementation of stacking
6.2. API description
The package introduces three main routines, one for automated prediction (MetaEstimator), conditional independence testing (PCIT), and undirected graph structure learning (find neighbours). The
following section gives on overview, the function signatures can be found in Appendix 6.3.
MetaEstimator
The MetaEstimator class provides a user with a type-independent predictor that automates model selection for given training data, by automatically determining appropriate loss functions and prediction
functionals. It is initialized for sensible defaults, which should generally lead to good results, but can
be changed for specific tasks (such as the use of more complex base estimators for more powerful, but
also more computationally demanding, predictions). The ensembling methods used for the estimator
are described in Section 5.1.2. For regression, the square loss is used for training and calculation of
the residuals, for classification, the logistic loss serves as the loss function.
2 https://www.python.org/
31
PCIT
PCIT implements the conditional independence test in Algorithm 1 to test if two samples stem from
conditionally (or marginally) independent random variables. The MetaEstimator class is used as a
prediction functional, and hence the user can trade off between computational complexity and power
by adjusting the chosen MetaEstimator. That is, if speed is important, the used MetaEstimator should
be a combination of base estimators and ensembling method that is quick in execution, whereas if
computational resources are vast and a more powerful test is needed, the used base-estimators should
be highly tuned.
find neighbours
find neighbours implements Algorithm 5.2 to learn the undirected skeleton for an input data set X,
using the PCIT.
6.3. Function signatures
PCIT
Type: function
Inputs:
Outputs:
Name
Description (type)
Default
x
Input data set 1 ([n x p] numpy array)
y
Input data set 2 ([n x q] numpy array)
z
Conditioning set ([n x r] numpy array)
None (empty set)
estimator
Estimator object to use for test (MetaEstimator)
MetaEstimator()
parametric
Parametric or nonparametric test (bool), section 3.6
False
confidence
Confidence level for test (float [0,1])
0.05
symmetric
Conducts symmetric test (bool), section 5.1
True
p values adj
p-values for ”prediction nulls” of each y ∈ Y (list)
independent
tuple, first value shows if ”independence-null” is rejected (bool)
second value is p-value of ”independence-null” (float [0,1])
loss statistics
RMSE difference for baseline f and altern. g,
loss residuals with standard deviation, for each y ∈ Y .
Only applicable if Y continuous
Note: The variance of the difference is estimated by assuming 0 covariance between the residuals
of baseline f and alternative g, which generally leads to more conservative confidence intervals for
error residuals (due to the irreducible error, prediction residuals for different methods are generally
positively correlated).
32
MetaEstimator
Type: class
Methods
init
Name
Description (type)
Default
Inputs:
method
Ensembling method (’stacking’, ’multiplexing’ or None)
’stacking’
estimators
Estimators to ensemble over (2-tuple of lists of sklearn
None (default estim,
estimators [regression estim], [classification estim])
section 5.1.2)
method type
Task definition (’regr’, ’classif’, None)
None (auto selection)
cutoff
Cutoff for automatic selection of method type (integer)
10
Inputs:
y
Dependent variable ([n x 1] numpy array)
Outputs:
estimators
Appropriate set of estimators (list)
x
Independent variables ([n x p] numpy array)
y
Dependent variable ([n x 1] numpy array)
fitted
Fitted estimator (MetaEstimator)
x
Independent variables ([n x p] numpy array)
y
Dependent variable ([n x 1] numpy array)
fitted
Fitted uninformed baseline estimator (MetaEstimator)
get estim
fit
Inputs:
Outputs:
fit baseline
Inputs:
Outputs:
predict
Requires:
MetaEstimator has been fitted
Inputs:
x
Test set independent variables ([n x p] numpy array)
Outputs:
predictions
Predictions for test set ([n x 1] numpy array)
x train
Training set independent var. ([n x p] numpy array)
y train
Training set dependent variables ([n x 1] numpy array)
x test
Test set independent variables ([n x p] numpy array)
y test
Test set dependent variables ([n x 1] numpy array)
baseline
Should baseline be fitted (boolean)
resid
Residuals for prediction strategy ([n x 1] numpy array)
get resid
Inputs:
Outputs:
33
False
find neighbours
Type: function
Inputs:
Outputs:
Name
Description (type)
Default
X
Input data set ([n x p] numpy array)
estimator
Estimator object to use for test (MetaEstimator)
MetaEstimator()
confidence
False-discovery rate (float [0,1])
0.05
skeleton
Matrix, p-values for each indep test ([p x p] numpy array)
skeleton adj
Learnt graph after applying FDR control ([p x p] numpy array)
6.4. API design
The API is designed as a wrapper for Scikit-learn (sklearn), a package in the Python programming
language, that aims to provide a user with a consistent, easy-to-use set of tools to analyze data [31].
It is one of the most-used tools in today’s supervised learning community, which is why it is chosen as
the supervised prediction workflow to build on for the predictive conditional independence test. This
section will outline the advantages of basing the test on the sklearn package.
6.4.1. Sklearn interface
Sklearn is built around estimator objects, which implement a consistent set of methods. Estimators
provide a fit and, if applicable, a predict method, in order to be able to fit the estimator to training
data and then predict on a test set. Additionally, sklearn provides standardized approaches to model
selection and hyperparameter-tuning as well as data transformation and ensembling methods (see
[8] for a more thorough discussion). The methods can easily be combined to create more powerful
estimators. Defaults are chosen sensibly so that in most cases, an initial fit of a method to data
requires little manual parameter specification from the user’s side. While the highly automated and
simplified approach of sklearn lowers the bar of entry when aiming to generate knowledge from data,
it also comes with a downside. For most statistical applications that exceed fitting and predicting
from a data set, such as inference on the parameters and hypotheses about prediction accuracies,
the relevant subroutines are missing from the API. Relevant statistics can however be attained by
interfacing it with other packages (such as SciPy).
6.4.2. Wrapper for Sklearn estimators
As we saw in section 6.2, the conditional independence test described in Algorithm 1 uses the newly
defined MetaEstimator class to automate determining the optimal prediction functional for a given
task. It does so, by ensembling over a set of base estimators from sklearn. These are either chosen
to be the sensible defaults described in Table 1, or can be passed by the user as a tuple of lists
of sklearn base estimators. This is required since regression and classification tasks rely on vastly
different prediction functionals, and thus need to be specified separately. As a general rule, the passed
regressors need to have a fit and a predict method, whereas the classifiers need to have a fit and
a predict proba method. Requirements might be more stringent for certain types of data or certain
estimators, however specifying an unsuitable estimator class will result in an error message as specified
by the respective class, allowing the user to either remove the unsuitable class or proceed with the
sensible defaults. As mentioned before, this gives a user a flexible tool to trade off between power
and computational complexity. If in need of a fast method, one can use an algorithm that runs in
linear time, such as stochastic gradient descent linear regression, whereas if a test with high power is
needed, one can pass hyper-tuned estimators to the function, that take longer to run but generalizes
better for prediction on unseen data.
34
6.5. Examples
This section will provide some simple examples of how the code is used. For the following it is assumed
that data sets X, Y and Z, all of the size [number of samples × number of dimensions], are loaded as
numpy arrays, and have matching numbers of samples (sample indices in X, Y and Z correspond to
the same sample). After installing the pcit package, import the relevant objects:
Testing if X
Y |Z, using the default values:
I n d e p e n d e n c e T e s t . PCIT(X, Y, z = Z )
Testing if X
mators:
|=
1
|=
1 from p c i t import MetaEstimator , S t r u c t u r e E s t i m a t i o n , I n d e p e n d e n c e T e s t
Y |Z, with a custom MetaEstimator, multiplexing over a manually chosen set of esti-
1 from s k l e a r n . l i n e a r m o d e l import RidgeCV , LassoCV ,
2
SGDClassifier , LogisticRegression
3
4 r e g r e s s o r s = [ RidgeCV ( ) , LassoCV ( ) ]
5 c l a s s i f i e r s = [ SGDClassifier () , LogisticRegression ( ) ]
6
7 c u s t o m e s t i m = MetaEstimator . MetaEstimator ( method = ’ m u l t i p l e x i n g ’ ,
8
estimators = ( regressors , c l a s s i f i e r s ))
9
10 I n d e p e n d e n c e T e s t . PCIT(X, Y, z = Z ,
11
estimator = custom estim )
Learning the undirected skeleton of X:
1
S t r u c t u r e E s t i m a t i o n . f i n d n e i g h b o u r s (X)
Concrete outputs will be shown in section 7 and can be found on GitHub.
35
7. Experiments
This section will first evaluate the performance of the proposed algorithms, and then provide some
examples of applications on real world data sets. All performance tests can be found on Github3 .
7.1. Performance tests
This section will report on performance tests for the algorithms derived in Section 5. First the power
of the the predictive conditional independence routine is bench-marked against current state-of-the-art
methodology, then various tests on the directed graph structure learning algorithm are conducted.
7.1.1. Performance of conditional independence test
In this section the conditional independence routine will be bench-marked against the previous research, namely the kernel based approach for conditional independence testing, which is is shown
to be more powerful than other conditional independence testing algorithms in [37] (on multivariate
Gaussian data). The used code for the kernel test is taken from GitHub4 . To conduct a test using
data that is drawn from a distribution that more closely resembles real world data, as opposed to the
synthetic (Gaussian) data commonly used for performance tests, the UCI Wine Repository data set
[27] is used as follows:
• The columns ’Alcohol’, ’Malic Acid’ and ’Magnesium’ are randomly permuted (to make them
independent) and will serve as X, Y and noise arrays respectively
• Vector Z is created by individually sampling vectors X 0 , Y 0 and noise0 of size n with replacement
from X, Y and the noise vector, and then calculating
p
Zi = log(Xi0 ) × exp(Yi0 ) + u ∗ noise0i , i ∈ {1, ..., n},
where u is the sign, uniformly drawn from {−1, 1}
|=
This results in a scenario, where X Y , but X 6⊥⊥ Y |Z, and the signal to noise ratio is high for
small sample sizes. The test will be conducted by increasing the sample size from 100 to 5000, and
calculating the run times and power for both approaches. For each sample size, the PCIT is run 500
times, and the KCIT is run 200 times, since the KCIT is more computationally demanding than the
PCIT. The only exception is n = 5000 for the KCIT, which is run 25 times, since the time complexity
would be too high to draw more samples. Both methods are run for their default values, without
additional manual tuning, and at a confidence level of 5%. Each time, {X 0 , Y 0 , Z} is sampled, and
then the conditional independence tests are applied and the run time is recorded. If they reject
independence at a 5% level, the round counts as a success, 1, otherwise 0. The power and run times
are then calculated by averaging over the results, and standard errors for the power are attained by
realizing that the standard error of the power for a rerun number of B is the standard error of X
B,
where X ∼ Bin(B, θ), where θ is the observed power (the sample mean).
The results are shown in Table 2. The power at the higher end of the sample sizes seems to be similar
(it is important to note that the power of 1 for the KCIT for n = 5000 was achieved on 25 resamples
only), where as in the range 500 to 1000 samples, the proposed predictive conditional independence test
shows a significantly higher power. For small n, the KCIT seems to fare significantly better, however
both approaches have a very low power, and the PCIT especially shows the power levels below the
confidence levels, which might indicate a discrepancy between true type 1 error and expected type 1
error. Important to note is the very high computational complexity of the kernel-based approach for
a data set of size 5000, with a run time of approximately 80 minutes per test, while the predictive
3 https://github.com/SamBurkart/pcit/tree/master/tests
4 https://github.com/devinjacobson/prediction/tree/master/correlations/samplecode/KCI-test
36
n
PCIT
100
Power
Time (s)
KCIT
Power
200
500
1000
2000
5000
0.020
0.046
0.332
0.672
0.832
0.970
(0.006)
(0.009)
(0.021)
(0.021)
(0.017)
(0.007)
0.32
0.38
0.49
0.624
1.31
4.79
0.050
0.085
0.185
0.325
0.8
1
(0.015)
(0.019)
(0.027)
(0.033)
(0.028)
(∗)
Time (s)
0.57
1.25
9.8
44
383
4758
Stand. difference
-1.8
-1.78
4.25
8.85
0.97
*
Table 2: Performance statistics for the newly proposed predictive conditional independence test
(PCIT) and the kernel based approach (KCIT). The values in brackets show the estimated standard errors. The last row shows the standardized difference between the power estimates, PCIT KCIT
.
conditional independence test still has a very low run time of 4.8 seconds. This is to be taken with a
grain of salt, since the tests were run in different languages (PCIT in Python, KCIT in MATLAB),
but it is apparent that PCIT scales much better than KCIT, while the both converge to a power of 1.
7.1.2. Performance of structure learning algorithm: Error rates
This test will show that the graphical model learning algorithm is capable of recovering the true graph
with high probability as the sample size increases. No comparison with alternative tests is made, as
it would lead to infeasible run times.
The data used in the performance tests is generated as follows:
1. Sample a random positive definite, sparse, symmetric precision matrix M . The size of the
entries of this matrix (relative to the diagonal) determine the signal to noise ratio, and are thus
thresholded to 0, if below a certain value.
|=
2. Invert M , M 0 = inv(M) and use M 0 as covariance matrix to sample from a multivariate Gaussian
distribution. This has the effect, that the zero-entries in M express zero-partial correlations [15,
ch. 17.3] between respective variables (and hence, lack of an edge between the two nodes
in the graph). That is, for a multivariate Gaussian random variable X, X = [X1 , ..., Xp ],
Mi,j = 0 =⇒ Xi Xj |X \ {Xi , Xj }.
3. Sample D, a data set of size n, from the multivariate normal P = N (0, M 0 ). The choice of n
will allow to evaluate the algorithms performance for an increasing signal to noise ratio.
4. The undirected graph G consistent with the probability distribution P is given by M, where
edges occur between variables Xi and Xj , if Mi,j is non-zero.
Then, Algorithm 3 will be tested by getting an estimate Ĝ of the structure of an undirected graph
G induced by the distribution P from which the data set D was drawn. The performance evaluation
will be guided by three metrics:
• False-discovery rate: The FDR is the fraction of type 1 errors (edges in Ĝ that are not in G) over
the total number of identified edges in the learned Ĝ
• Power: Number of found edges (links in true graph G that were found by the structure learning
algorithm) over the total number of links in G
37
FDR
Time (sec)
No ensembling
3.09%
30
Stacking
3.03%
450
Multiplexing
2.75%
1000
Table 3: False-discovery rates and run times for a data set of 22000 for all used methods
• Time: Run time needed to estimate Ĝ
For the test, the number of random variables is chosen to be 10. This means, that each node in the
graph has up to 9 neighbours, and the total number of possible undirected links (before inducing
sparsity) is 45. The sparsity parameter is chosen in a way that generally between 10 and 15 of those
links exist in the true graph. The size and sparsity of the graph are chosen to produce estimators of
the metrics with reasonably low variance, but are otherwise arbitrary. The sample sizes range from
approximately 400 to 20000, increasing in steps of 10%. For each sample size, 10 tests are run to
decrease the variance in the estimators. The test is conducted for conditional independence testing
using stacking and multiplexing, as well as without using any ensembling method, which, since the
data is continuous, results in the usage of Elastic Net regularized regression.
If the algorithms work as expected, the FDR is expected to be at or below 5%. High power-levels
indicate a better performance of the algorithm, with respect to this specific task. At the very least,
the power level is expected to increase in the number of samples, suggesting that asymptotically the
routine will find the correct graph.
Table 3 shows the average FDR and run times for each of the three methods. The average FDR
seems to be similar across all three methods, whereas the computational complexities differ by a
large amount. No ensembling PCIT runs very quick, about 15 times faster than stacking, which
itself only takes about half as long as multiplexing. This is the case, since multiplexing requires the
calculation of performance measures for each used estimator. Figure 4 shows the power and FDR of
the algorithm for increasing sample size. The FDR for all 3 methods seem to be slightly higher for
small sample sizes than they are for large sample sizes, but they are generally around or below the
desired 5% in the expectation (the variances are quite high, as the number of possible reruns is low
due to the computational complexity of the multiplexing method). While it might seem surprising
that stacking and multiplexing are outperformed by the no-ensembling method, one has to remember
that the ensembling is used to choose the optimal prediction functional automatically from a set of
estimators. However, the data is multivariate Gaussian, for which ridge regression is optimal in terms
of generalization performance. While stacking and multiplexing are tasked to find this property in a
large set of estimators, the estimator used in the no ensembling case is Elastic Net regularized linear
regression, a generalization of ridge regression, and hence fares better since there is less variance in
finding the optimal estimator. For all three methods, the power increases roughly logarithmically in
the sample size, implying that for a test that recovers the truth with high probability, a large data
set or a more powerful set of estimators (see Section 7.2.2) might be needed for that specific task.
However, asymptotically, all three tests seem to recover a graph that is close to the truth, in this
specific scenario, unless the power starts to plateau before reaching 1 (which there is no indication
for). Since the power for the no ensembling case is biased by the fact that it uses an optimal prediction
functional, the power curves for stacking and ensembling provide a better estimate for the performance
on an unseen data set of an unknown distribution family. As graphical model structure learning is an
inherently hard problem (due to issues such as multiple testing, combinatorial explosion, as outlined
in Sections 4), it is promising that the algorithm finds an increasing fraction of the links while keeping
the ratio of false-discoveries constant.
38
Figure 4: Power (blue lines) and FDR (red lines) for increasing sample size for all 3 methods, showing
that the performance increases as expected for all 3 methods, when the sample size is increased.
The transparent blue and red areas denote the 90% confidence intervals, the dashed line shows the
expected FDR (0.05)
39
Figure 5: Frequencies of edge occurrence in the learned structure. Green denotes edges that occur in
less than 7% (as advocated by FDR) of the models, blue for edges that occur in more than a third of
the model, and red everything in between
7.1.3. Performance of structure learning algorithm: Variance of estimated model
As a second performance metric, this section will assess the consistency of the learned structures on
resamples from a data set D. Assuming that all the observation in D are identically distributed, the
structure learning method should arrive at the same conclusions on the resamples, less some variance
in the process. The Auto MPG Data Set5 containing various continuous and discrete car performanceattributes, from the UCI machine learning repository [27], is used to conduct the test. The data set
contains 398 instances of 8 variables. For the purpose of the experiment, data sets of the same size
will be sampled with replacement from the full data set 100 times. On each resample, a graph is
learned using the stacking estimator on a 10% FDR level. Each subsample contains about two thirds
of the original data points (with some instances repeated). This is a commonly used procedure to
estimate the sampling distribution of a statistics, and which will here allow us to assess the variance
in the learned graph structure. Figure 5 shows the results. On average, there are 6 links in the learned
structure, hence the FDR advocates about 0.6 type 1 errors per learned model. The green lines are
connections that are found less times than expected by the FDR and the blue lines are connections
that are found in a large fraction of the models (over one third of the resamples). The concerning
links are the ones in between, for which the null of independence is rejected more than occasionally,
but not in a reasonably large fraction of the learned graphs. There are only 2 links in the model for
which this occurs, so overall, the variance across learned graphs seems to be reasonably small and the
learning process is hence consistent.
5 https://archive.ics.uci.edu/ml/datasets/auto+mpg
40
Figure 6: Learned graphical model structures for the Boston Housing and the Iris data set
7.2. Experiments on real data sets
In this section, the outputs of the graphical model structure learning routine are shown on a selection
of real world data sets. It will outline some possibilities of the user to trade off between power and
computational complexity.
7.2.1. Sklearn data sets: Boston Housing and Iris
Setup: One receives a data set and is interested in initial data exploration. This involves finding
related sets of variables, and variables that lack obvious relationships with other variables.
Boston Housing and Iris are two standard data sets from sklearn. The housing data set contains 506
samples of 14 variables, originally collected to build a model for predicting house prices (descriptions
of the variables can be found online6 ). The Iris data set is a data set for predicting flower species
based on petal and sepal measurements with 150 observations in 5 dimensions.
Estimation will take place using the default stacking estimator. Since we are interested in initial
exploration, and finding interesting groups of variables, a large FDR (20%) was chosen. Note that,
unlike for other (mostly score-based) structure learning algorithms, the outcome of one experiment
(the presence of an edge in the model) does not influence other experiments, and hence, false discoveries do not compromise the estimated structure additionally.
The results are shown in Figure 6 (graphs drawn with NetworkX [24]). For the Boston housing data,
seemingly sensible variable groupings occur. In the top left, the variables related to industrialization
of a neighbourhood are shown, while on the right, demographic attributes form a cloud of related
variables. For the Iris data set, while length and width of both sepal and petal are related, as
expected, it seems that petal size has a higher association with class, and, in fact, width and length
are independent given the class.
Both of these analyses require no parameter tuning (the only non-default chosen for this experiment
was the adjusted confidence level) and take very little time (less than 15 seconds). The implementation
of algorithm 3 thus provides a quick, ready to use tool for initial exploratory data analysis.
7.2.2. Key short-term economic indicators (UK)
Setup: One is interested in finding the relationships within a set of variables and making local
conditional independence statements for sets of variables. The focus is on finding associations that
we are confident about.
The economic indicator data set contains monthly data of key economic indicators between February
6 http://scikit-learn.org/stable/modules/classes.html#module-sklearn.datasets
41
(a) Default Approach
(b) Bagged Support Vector Machines
Figure 7: Learned graphs for the Economic Indicator data set for the default approach (left) and a
more powerful approach using bagged SVM’s (right)
1987 and June 2017 for the UK from the OECD statistics database [30]. The economics indicators are
export and import figures, stock price and industrial production levels, overnight and 3 month Interbank interest rates, money supply (M4) and GDP. This rather small data set, around 369 instances
of 9 variables, will outline the possibility of a user to trade off between computational complexity
and power of the learning algorithm. As for most economic data sets, the signal to noise ratio can
be quite low. Figure 7a shows the structure learned by the default approach for confidence (false
discovery-rate) level of 5%, with a run time of 15 seconds. While the ground truth is not known
(economic theory aside), it is apparent that many links are missed by the fast default approach. This
becomes evident when considering a variable like the GDP, which (by definition) includes exports and
imports, and hence some connection between the variables should exist. If there is need for a more
powerful approach, a more powerful estimator can be chosen. Figure 7b show the learned structure for
an estimator that resamples the data 50 times and learns 50 different Support Vector Machines with
automatically tuned hyperparameters. The implementation of this is straightforward, since sklearn
provides hyperparameter and bagging wrappers, so an estimator can be tuned easily and passed to the
MetaEstimator. The graph shows the many edges that were found. While it is impossible to judge
the correctness of the graph, it seems that some reasonable groups of variables are found, such as
industrial production, exports and imports (in economic theory, countries seek to balance their trade
deficit), or the grouping of stock prices and the main drivers of inflation, money supply and interest
rates. Additionally, all the variables are connected in some way, which would be expected from a data
set of economic indicators. The computational complexity of this approach was rather high, with a
run time of about 20 minutes, however this shows how easily the user can trade off between power
and complexity,without having a large effect on the false discovery-rate (as shown in Section 7.1).
42
8. Discussion
This paper has introduced a novel way for multivariate conditional independence testing based on
predictive inference and linked to a supervised learning workflow, which addresses many of the current
issues in independence testing:
• Few subjective choices: By connecting the classical task of independence testing to supervised learning, and its well-understood hyperparameter tuning capabilities, there is no need
for the heuristics and manual tuning choices prevalent in current state-of-the-art conditional
independence tests
• Low computational complexity: By linking independence testing to one of the most-researched
fields in data science, predictive modelling, the high level of power in the state-of-the-artprediction methods can be directly benefited from, and any efficiency gains in the latter directly
benefits the former.
• High-dimensional problems: By connecting the problem to the task of supervised learning,
the method easily deals with the multivariate case, largely removing any issues concerning
dimensionality of the data
It is important to note, that some choices remain necessary, as is the case in statistical methodology in
general. Since it is not possible to test for an infinite amount of loss functions and predictive models,
one has to decide on a subset to conduct this test. The larger the subset, the higher the data requirements to arrive at a respective power level. How the outlined methodology differs from the methods
reviewed in section 2 is by outlining a principled way to choose from a set of subjective choices, and
by using a subset of all-star predictive modelling algorithms to ensemble over as a default, a test that
is expected to be able to deal with most of the usual scenarios, given a reasonable sample size.
To validate these claims, the test was bench-marked against current state-of-the-art conditional independence tests, and showed a similar or better performance in regions where the power of the tests
exceeded 10%.
Subsequently, the PCIT was applied in a method for learning the structure of an undirected graph
best describing the independence structure of an input data set. The combination of the new conditional independence test and the structure learning algorithm address some of the current issues in
graphical model structure learning:
• Low computational complexity: While current exact algorithms, such as the PC-algorithm,
often require a number of tests that is exponential in the number of variables, the proposed
algorithm runs in quadratic time in the size of the graph. Additionally, a straightforward
power-complexity trade off is provided
• Exact algorithm: Unlike many scored-based methods, the algorithm does not make any strong
constraints on the underlying distribution and is not subject to local optima
• False-discovery rate control: FDR control is added to provide a powerful tool to control the
fraction of type 1 errors when the number of variables is increasing
Performance tests showed that the false-discovery rate is as advertised and the power of the test
increases constantly in the number of samples. Additionally, consistency under perturbations in the
data set was demonstrated.
The algorithms have been distributed in the pcit package, providing users with an easy-to-use implementation to test for multivariate and conditional independence, as well as to perform graphical
model structure learning with little need for manual parameter tuning. The implementations are
particularly interesting for users
• assessing the value of collecting additional variables for a prediction task
43
• in need of a conditional independence test for multivariate data
• performing exploratory data analysis
• looking for a visual way to communicate the structure in their data set
There are a few ways in which the current implementation can be generalized to make for a more
powerful test. The power of the conditional independence test is directly linked to the power of the
supervised learning algorithm to find the optimal prediction functional and the correct loss. Currently, only the necessary minimum of 2 loss functions is implemented, one for regression tasks and
one for classification tasks, but this can easily be generalized by including more losses, and checking
if the baseline can be beaten with statistical significance in any of them. This would also strengthen
the argument when reasoning about variables being independent, when the null hypothesis cannot be
rejected. What’s more, the current methodology connected single-output prediction with FDR control
to make statements about the behaviour between the joint distributions. While this procedure results
in a logically sound test, the feasibility of multi-output predictors, predicting several outputs at once,
should be assessed, for appropriate multivariate loss functions.
On the other side, some extensions of the tests need to be conducted before a definitive conclusion
can be made as to its power. In terms of performance evaluation, the power of the proposed routine
was assessed for two specific cases only, for multivariate Gaussian data, and a simple conditional independence test. To get a better idea of the general feasibility of the algorithm, more scenarios need
to be analyzed and performance tests conducted. Additionally, the power of the test in the context
of alternative graphical model structure learning algorithms should be evaluated.
44
A. Best uninformed predictors: classification
This appendix collects proofs of number of elementary computations to obtain some of the explicit
statements about classification losses found in the main corpus.
A.1. Misclassification loss is a probabilistic loss
In this sub-section, we consider the alternative misclassification loss
L : Y0 × Y → [0, 1];
(p, y) 7→ 1 − p(y),
with Y being a discrete set, and Y0 being the probability simplex of probability mass functions on Y,
as considered in Remark 3.2. In said remark, it is claimed that rounding a probabilistic prediction to
a deterministic one never increases the generalization loss. We first prove this for the unconditional
case which is equivalent to constant predictions:
Lemma A.1. Let Y be an Y-valued random variable with probability mass function pY . There is
always a deterministic minimizer of the expected generalization loss, i.e., there exists a pmf p0 : Y →
{0, 1} such that
p0 = argmin E[L(p, Y )].
p∈Y0
Proof. Let p : Y → [0, 1] be any pmf. For its expected generalization loss, one has, by substituting
definitions,
X
X
E[L(p, Y )] =
p(y)(1 − pY (y)) = 1 −
p(y)pY (y).
y∈Y
y∈Y
Let y0 := argmaxpY (y) (if there are multiple maximizers, choose arbitrary). By construction, pY (y0 ) ≥
y∈Y
P
y∈Y p(y)pY (y). Thus, for p0 : y 7→ 1 if y = y0 ; 0 otherwise, one has
E[L(p0 , Y )] = 1 − pY (y0 ) ≤ 1 −
X
p(y)pY (y) = E[L(p, Y )].
y∈Y
Since p was arbitrary, this proves the claim.
Note that Lemma A.1 does not exclude that there are other minimizers of the expected generalization
loss (in general there will be an infinity), it only states that a deterministic minimizer may be found.
Proposition A.2. Let X, Y, Z be a random variables taking values in X, Y, Z. Then one can make
choices which always predict a deterministic class, for the following prediction functionals as considered
in Section 3:
(L)
(i) the best uninformed predictor ωY
: X → Y0
(L)
(ii) the best predictor ωY |X : X → Y0
(L)
(iii) the best conditionally uninformed predictor ωY |Z : X × Z → Y0
(L)
(iv) the best conditional predictor ωY |X,Z : X × Z → Y0
That is, in all four cases, choices may be made where the image is always a deterministic pmf p : Y →
{0, 1}.
45
Proof. (i) follows directly from Lemma A.1 which directly implies that the function y 7→ p0 is the best
constant predictor and hence the best uninformed predictor, where p0 is defined as in the statement
(L)
(or more constructively in the proof) of Lemma A.1, thus ωY : x 7→ p0 is a possible choice.
(ii) follows from noting that the Lemma A.1 and its proof remain still valid when considering the
conditional under X, i.e., defining a conditional
p0 : X → Y0 ; x 7→ argminE[L(p, Y )|X = x]
p∈Y0
(L)
and thus ωY |X : x 7→ p0 (x).
(iii) and (iv) follow analogously by additional conditioning on Z in the same way.
A.2. Logarithmic loss is a proper loss
In this sub-section, we consider the logarithmic loss (or cross-entropy loss)
L : Y0 × Y → R+ ;
(p, y) 7→ − log p(y),
with Y being a discrete set, and Y0 being the probability simplex of probability mass functions on Y,
as considered in Remark 3.2.
Proposition A.3. The expected generalization log-loss is minimized by the true distribution. I.e., let
Y be random variable taking values in Y, with probability mass function pY . Then,
pY = argmin E[L(y, Y )].
y∈Y0
Proof. Let p ∈ Y be arbitrary. Substituting definitions, it holds that
X
E[L(p, Y )] = −
pY (y) log p(y)
y∈Y
≥−
X
p(y) log p(y)
y∈Y
= E[L(pY , Y )],
where the inequality in the middle is Gibbs’ inequality.
A.3. Brier loss is a proper loss
In this sub-section, we consider the Brier loss (or squared classification loss)
X
L : Y0 × Y → R+ ; (p, y) 7→ (1 − p(y))2 +
p(y 0 )2 ,
y 0 6=y
with Y being a discrete set, and Y0 being the probability simplex of probability mass functions on Y,
as considered in Remark 3.2.
Proposition A.4. The expectedBrier loss is minimized by the true distribution. I.e., let Y be random
variable taking values in Y, with probability mass function pY . Then,
pY = argmin E[L(y, Y )].
y∈Y0
46
Proof. Let p ∈ Y be arbitrary. By applying the binomial rule, observe that
X
p(y 0 )2
L(p, y) = 1 − 2p(y) +
y 0 ∈Y
Substituting definitions, it holds that
X
X
pY (y) − 2pY (y)p(y) + pY (y)
p(y 0 )2
E[L(p, Y )] =
y 0 ∈Y
y∈Y
=1−2
X
pY (y)p(y) +
=1−
2
pY (y) +
y∈Y
=1−
X
p(y)2
y∈Y
y∈Y
X
X
X
y∈Y
2
pY (y) +
y∈Y
X
X
pY (y)2 − 2
pY (y)p(y) +
y∈Y
X
p(y)2
y∈Y
2
(p(y) − pY (y)) .
y∈Y
Note that the first two terms (the 1 and the sum over pY (y)) do not depend on p, while the last term
is non-negative and minimized with a value of zero if and only if p = pY .
Since p was arbitrary, this proves the claim.
B. Elicited statistics for regression losses
This appendix collects explicit proofs of the elicited statistics for squared loss, and Q-loss (and the
absolute loss which is a special case).
B.1. Squared loss elicits the mean
In this sub-section, we consider the univariate regression case Y = R, and the squared loss
L : Y × Y → R; (y, y ∗ ) 7→ (y − y ∗ )2 .
Proposition B.1. The squared loss elicits the mean. I.e., let Y be random variable taking values in
Y. Then,
E[Y ] = argmin E[L(y, Y )].
y∈Y
Proof. Substituting definitions, it holds that
E[L(y, Y )] = E[(y − Y )2 ]
= E[y 2 − 2yY + Y 2 ]
= y 2 − 2yE[Y ] + E[Y 2 ]
= y 2 − 2yE[Y ] + E[Y 2 ] − E[Y 2 ] + E[Y 2 ]
= (E[Y ] − y)2 + Var(Y ),
which is the well-known derivation of the bias-variance decomposition.
The first term, (E[Y ] − y)2 , is minimized whenever E[Y ] = y, and the second term, Var(Y ), does
not depend on y. Thus, the sum of both terms is minimized (in y while fixing Y ) for the choice
y = E[Y ].
47
B.2. Quantile loss elicits the quantile
In this sub-section, we consider the univariate regression case Y = R, and the Q-loss (or quantile loss)
L : Y × Y → R; (y, y∗ ) 7→ α · m(y∗ , y) + (1 − α) · m(y, y∗ ),
with m(x, z) = min(x − z, 0).
Proposition B.2. The Q-loss elicits the α-quantile. I.e., let Y be random variable taking values in
Y with cdf F : R → [0, 1]. Then,
FY−1 (α) = argmin E[L(y, Y )].
y∈Y
Proof. We first assume that Y is absolutely continuous, i.e., Y has a probability density function
p : R → R+ and F is bijective. One then computes
EY [Lα (y ∗ , Y )] =
Z
y∗
(1 − α)(y ∗ − y)p(y)dy −
Z
(α)(y ∗ − y)p(y)dy
y∗
−∞
∗
∞
Z
∗
y∗
= y (F (y ) − α) + αE[Y ] −
yp(y)dy
−∞
∂EY [Lα (y ∗ , Y )]
!
= y ∗ p(y ∗ ) + F (y ∗ ) − α − y ∗ p(y ∗ ) = F (y ∗ ) − α = 0
∗
∂y
=⇒ P (y ∗ ) = α
∂ 2 EY [Lα (y ∗ , Y )]
= p(y ∗ ) ≥ 0
∂(y ∗ )2
Hence, the first order condition is a minimum, minimized by the α-quantile of Y , and thus the quantile
loss elicits the quantile.
For general Y , note that F always exists, and thus when p appears inside integrals, the integrals welldefined. The partial derivatives may not always be defined but is the same as the sign of sufficiently
small finite differences, thus the proof logic follows through for the general case. In case of jump
discontinuities of F , any monotone inverse F −1 may be chosen for the statement.
48
References
[1] C.C. Aggarwal. Data Classification: Algorithms and Applications. Chapman & Hall/CRC, 1st
edition, 2014.
[2] D. Barber. Bayesian reasoning and machine learning. Cambridge University Press, 2012.
[3] L. Baringhaus and C. Franz. On a new multivariate two-sample test. Journal of Multivariate
Analysis, 88:190–206, 2004.
[4] Y. Benjamini and Y. Hochberg. Controlling the false discovery rate: A practical and powerful
approach to multiple testing. Journal of the Royal Statistical Society. Series B (Methodological),
57:289–300, 1995.
[5] Y. Benjamini and D. Yekutieli. The control of the false discovery rate in multiple testing under
dependency. The Annals of Statistics, 29:1165–1188, 2001.
[6] W. Bergsma. Nonparametric testing of conditional independence by means of the partial copula.
ArXiv e-prints: 1101.4607, 2011.
[7] W.P. Bergsma. Testing conditional independence for continuous random variables. Eurandom,
2004.
[8] L. Buitinck, G. Louppe, M. Blondel, F. Pedregosa, A. Mueller, O. Grisel, V. Niculae, P. Prettenhofer, A. Gramfort, J. Grobler, et al. API design for machine learning software: experiences
from the scikit-learn project. arXiv preprint arXiv:1309.0238, 2013.
[9] U. Cherubini, E. Luciano, and W. Vecchiato. Copula methods in finance. John Wiley & Sons,
2004.
[10] K.P. Chwialkowski, A. Ramdas, D. Sejdinovic, and A. Gretton. Fast two-sample testing with
analytic representations of probability measures. In Advances in Neural Information Processing
Systems 28, pages 1981–1989. Nips, 2015.
[11] G.W. Corder and D.I. Foreman. Nonparametric Statistics for Non-Statisticians: A Step-by-Step
Approach. John Wiley & Sons, Inc., 2009.
[12] A. Dionisio, R Menezes, and D.A. Mendes. Entropy-based independence test. Nonlinear Dynamics, 44:351–357, 2006.
[13] V.A. Fernández, M.D.J. Gamero, and J.M. Garcı́a. A test for the two-sample problem based
on empirical characteristic functions. Computational Statistics & Data Analysis, 52:3730–3748,
2008.
[14] T.M. Fragoso and F.L. Neto. Bayesian model averaging: A systematic review and conceptual
classification. arXiv preprint arXiv:1509.08864, 2015.
[15] J. Friedman, T. Hastie, and R. Tibshirani. The elements of statistical learning, volume 1. Springer
series in statistics New York, 2001.
[16] C. Genest and B. Rémillard. Test of independence and randomness based on the empirical copula
process. Test, 13:335–369, 2004.
[17] T. Gneiting and A.E. Raftery. Strictly proper scoring rules, prediction, and estimation. Journal
of the American Statistical Association, 102:359–378, 2007.
[18] A. Gretton and L. GyĂśrfi. Consistent nonparametric tests of independence. Journal of Machine
Learning Research, 11:1391–1423, 2010.
49
[19] A. Gretton, O. Bousquet, A. Smola, and B. Scholkopf. Measuring statistical dependence with
hilbert-schmidt norms. In ALT, volume 16, pages 63–78. Springer, 2005.
[20] A. Gretton, K. Fukumizu, C.H. Teo, L. Song, B. Schölkopf, and A. Smola. A kernel statistical
test of independence. In Advances in neural information processing systems, pages 585–592, 2008.
[21] A. Gretton, K. Fukumizu, Z. Harchaoui, and B.K. Sriperumbudur. A fast, consistent kernel
two-sample test. Advances in Neural Information Processing Systems 22, pages 673–681, 2009.
[22] A Gretton, K.M. Borgwardt, M.J. Rasch, B. Schölkopf, and A. Smola. A kernel two-sample test.
Journal of Machine Learning Research, 13:723–773, 2012.
[23] A. Gretton, D. Sejdinovic, H. Strathmann, S. Balakrishnan, M. Pontil, K. Fukumizu, and B.K.
Sriperumbudur. Optimal kernel choice for large-scale two-sample tests. In Advances in Neural
Information Processing Systems 25, pages 1205–1213. Nips, 2012.
[24] A.A. Hagberg, D.A. Schult, and P.J. Swart. Exploring network structure, dynamics, and function
using NetworkX. In Proceedings of the 7th Python in Science Conference (SciPy2008), pages 11–
15, 2008.
[25] E. Jones, T. Oliphant, and P. Peterson. SciPy: Open source scientific tools for Python, 2001.
URL http://www.scipy.org/.
[26] D. Koller and N. Friedman. Probabilistic graphical models: principles and techniques. MIT press,
2009.
[27] M. Lichman. UCI machine learning repository, 2013. URL http://archive.ics.uci.edu/ml.
[28] D. Lopez-Paz and M. Oquab.
arXiv:1610.06545, 2016.
Revisiting classifier two-sample tests.
arXiv preprint
[29] Y. Nadeau, C.and Bengio. Inference for the generalization error. Machine Learning, 52:239–281,
2003.
[30] OECD. OECD statistics: Key short-term economic indicators. http://stats.oecd.org/, 2017.
Accessed: 2017-08-06.
[31] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning
Research, 12:2825–2830, 2011.
[32] S. Raschka. Mlxtend, 2016. URL http://dx.doi.org/10.5281/zenodo.594432.
[33] B. Rémillard and O. Scaillet. Testing for equality between two copulas. Journal of Multivariate
Analysis, 100:377–386, 2009.
[34] B. Schweizer and E. F. Wolff. On nonparametric measures of dependence for random variables.
The Annals of Statistics, 9:879–885, 1981.
[35] Bharath K Sriperumbudur, Kenji Fukumizu, Arthur Gretton, Gert RG Lanckriet, and Bernhard
Schölkopf. Kernel choice and classifiability for RKHS embeddings of probability distributions. In
NIPS, pages 1750–1758, 2009.
[36] W. Zaremba, A. Gretton, and M. Blaschko. B-test: A non-parametric, low variance kernel twosample test. Advances in Neural Information Processing Systems 26, pages 755–763, 2013.
[37] K. Zhang, J. Peters, D. Janzing, and B. Schölkopf. Kernel-based conditional independence test
and application in causal discovery. arXiv preprint arXiv:1202.3775, 2012.
50
| 10math.ST
|
Weakly-supervised Semantic Parsing with Abstract Examples
Omer Goldman∗, Veronica Latcinnik∗, Udi Naveh∗, Amir Globerson, Jonathan Berant
Tel-Aviv University
{omergoldman@mail,veronical@mail,ehudnave@mail,gamir@post,joberant@cs}.tau.ac.il
arXiv:1711.05240v1 [cs.CL] 14 Nov 2017
Abstract
Semantic parsers translate language utterances to programs, but are often trained from
utterance-denotation pairs only. Consequently,
parsers must overcome the problem of spuriousness at training time, where an incorrect program found at search time accidentally leads to a correct denotation. We propose that in small well-typed domains, we can
semi-automatically generate an abstract representation for examples that facilitates information sharing across examples. This alleviates spuriousness, as the probability of randomly obtaining a correct answer from a program decreases across multiple examples. We
test our approach on CNLVR, a challenging
visual reasoning dataset, where spuriousness is
central because denotations are either T RUE or
FALSE, and thus random programs have high
probability of leading to a correct denotation.
We develop the first semantic parser for this
task and reach 83.5% accuracy, a 15.7% absolute accuracy improvement compared to the
best reported accuracy so far.
1
Introduction
The goal of semantic parsing is to map language
utterances to executable programs. Early work
on statistical learning of semantic parsers utilized
supervised learning, where training examples included pairs of language utterances and programs.
(Zelle and Mooney, 1996; Kate et al., 2005; Zettlemoyer and Collins, 2005, 2007). However, collecting such training examples at scale has quickly
turned out to be difficult, because expert annotators that are familiar with formal languages are required. This has led to a significant body of work
on weakly-supervised semantic parsing (Clarke
et al., 2010; Liang et al., 2011; Krishnamurthy
and Mitchell, 2012; Kwiatkowski et al., 2013; Berant et al., 2013; Cai and Yates, 2013; Artzi and
∗
Authors equally contributed to this work.
I:
k :[[{y loc: ..., color: ’Black’, type: ’square’, x loc: ...
size: 20}, ...}]]
x :There is a small yellow item not touching any wall
y :True
z : Exist(Filter(ALL ITEMS, λx.And(And(IsYellow(x),
IsSmall(x)), Not(IsTouchingWall(x, Side.Any))))))
Figure 1: Overview of our setup for visual reasoning.
Given an image I that was rendered from a KB k and
an utterance x, our goal is to parse x to the correct program z that results in the denotation y. Our training
data includes (x, k, y) triplets.
Zettlemoyer, 2013), where training examples correspond to utterance-denotation pairs. A denotation is the result of executing a program against the
target knowledge-base (KB) (see Figure 1). Naturally, collecting denotations is much easier, because it can be performed by non-experts.
Training semantic parsers from denotations
raises two fundamental learning challenges: (a)
Search: When training from denotations, the algorithm must learn to search through the huge
space of programs, to find ones that execute to
the correct denotations. This is a difficult search
problem due to the combinatorial nature of the
search space. (b) Spuriousness: Incorrect programs can easily lead to the right denotation, and
thus the learner can go astray based on these programs. Of the two mentioned problems, spuriousness has attracted relatively less attention (Pasupat
and Liang, 2016; Guu et al., 2017).
Recently, the Cornell Natural Language for Visual Reasoning corpus (CNLVR) was released
(Suhr et al., 2017), and presented a difficult problem of spuriousness. In this task, an image con-
taining three boxes is shown, and in each box there
are several objects of various shapes, colors and
sizes. Each image is paired with a complex natural language utterance, and the goal is to determine
whether the statement is true or false given the image (see Figure 1). The task comes in two flavors,
where in one the input is the image itself (pixels),
and in the other the input is the KB from which
the image was synthesized. Because the images
are fairly simple, the vision problem of translating
the image to the structured KB is relatively simple.
Given the input KB, it is easy to view CNLVR as
a semantic parsing problem: our goal is to translate language utterances into programs that will be
executed against the KB to determine their correctness (Johnson et al., 2017b; Hu et al., 2017).
Because there are only two return values, it is easy
to generate incorrect programs that execute to the
right denotation, and thus the problem of spuriousness is significant compared to previous datasets.
In this paper, we present the first semantic
parser for the CNLVR dataset. We develop a
formal language for visual reasoning, inspired by
Johnson et al. (2017b), and a semantic parser
based on recent work by Guu et al. (2017). Our
main insight is that in a small and well-typed domain, we can manually cluster a small number of
lexical items and generate abstract representations
for utterances and programs. These representations alleviate the challenges of search and spuriousness inherent to weakly-supervised semantic
parsing. By creating abstract examples, we can
identify similar examples and reward programs
that are correct in multiple examples, thereby
substantially reducing the problem of spuriousness. This can also be done for partial programs
at search time, which helps combat the search
challenge. Moreover, we can generate thousands
of utterance-program pairs automatically from a
small number of manually created abstract examples, and train a supervised parser that will provide
a good starting point for the search process in the
weakly-supervised setup.
Our method allows us to train a semantic parser
from weak supervision, and obtain an accuracy
of 83.5%, a 15.7% absolute accuracy improvement compared to state-of-the-art. All our code is
publicly available at https://github.com/
udiNaveh/nlvr_tau_nlp_final_proj.
2
Setup
Problem Statement Our task is as follows: given a training set of N examples
{(xi , ki , yi )}N
i=1 , where xi is a language utterance, ki is a KB describing objects in an image
and yi ∈ {T RUE, FALSE} denotes whether the
utterance is true or false in the context of the KB,
our goal is to learn a semantic parser that will
map new utterances-KB pairs (x, k) to a program
z that is executed to the correct denotation y (see
Figure 1)
Programming language The original KBs in
the CNLVR dataset describe an image as three
sets of objects, where each object has a color,
shape, size and location in absolute coordinates.
We define a programming language over the KB
that is more amenable to spatial reasoning, inspired by work on the CLEVR dataset (Johnson
et al., 2017b). This programming language provides access to functions that allow us to check
the size, shape, and color of an object, to check
whether it is touching a wall, to obtain sets of
items that are above and below a certain set of
items, etc.1
More formally, a program is a sequence of tokens describing a possibly recursive sequence of
function applications in prefix notation. Each token is either a function with fixed arity (all functions have either one or two arguments), a constant, a variable or a λ term used to define Boolean
functions. Functions, constants and variables have
one the following atomic types: Int, Bool,
Item, Size, Shape, Color, Side (sides of a
box in the image); or a composite type Set(?),
and Func(?,?). Valid programs have the type
Bool. Table 1 provides two examples for utterances and their correct program in the context
of an image. Note that we provide commas and
parenthesis in the table for readability, but they
are not part of the language. We provide a full
description of all program tokens, their arguments
and return types in Appendix A.
Unlike CLEVR, CNLVR requires substantial
set-theoretic reasoning (utterances refer to various
aspects of sets of items in one of the three boxes in
the image), which required extending the language
described by Johnson et al. (2017b) to include set
operators and lambda abstraction. We manually
1
We leave the problem of learning the programming language functions from the original KB for future work.
x: “There is a small yellow item not touching any wall.”
z: Exist(Filter(ALL ITEMS, λx.And(And(IsYellow(x), IsSmall(x)), Not(IsTouchingWall(x, Side.Any)))))
x: “One tower has a yellow base.”
z: ≤(1, Count(Filter(ALL ITEMS, λx.And(IsYellow(x), IsBottom(x)))))
Table 1: Examples for utterance-program pairs. Commas and parenthesis are provided for readability only.
sampled 100 training examples from the training
data and estimate that roughly 95% of the utterances in the training data can be expressed with
this programming language.
3
Model
We base our model on the semantic parser presented by Guu et al. (2017). In their work,
they use an standard encoder-decoder architecture
(Sutskever et al., 2014) to define a distribution
pθ (z | x, k). The utterance x is encoded with
a bidirectional LSTM (Hochreiter and Schmidhuber, 1997) that creates a contextualized representation hi for every utterance token xi , and the decoder is a feed-forward network combined with attention mechanism over the encoder outputs (Bahdanau et al., 2015). The feed-forward decoder
takes as input the last K tokens that were decoded.
More formally the probability of a program is
the product of the probability of its tokens
Q given
the history and KB: pθ (z | x, k) = t pθ (zt |
x, z1:t−1 , k) (we will drop the KB k when it is
clear from context), and the probability of a decoded token is computed as follows. First, an utterance representation x̂ is computed by the BiLSTM encoder:
hFi = LSTM(hFi−1 , φx (xi )),
B
hB
i = LSTM(hi+1 , φx (xi )),
hi = [hFi ; hB
i ],
x̂ = [hF|x| ; hB
1 ],
where φx (·) provides utterance embeddings and
’;’ corresponds to concatenation. Then decoding
produces the program token by token:
qt = relu(Wq [x̂; zt−K−1:t−1 ]),
αt ∝ exp(qt> Wα hi ),
X
ct =
αi · hi ,
i
>
pθ (zt | x, z1:t−1 ) ∝ exp(φz (zt ) Ws [qt ; ct ]),
where φz (·) provides program embeddings, zi:j =
(zi , . . . , zj ), and the matrices Wq , Wα , Ws are
learned parameters (along with the LSTM parameters).
Search As explained, searching through the
large space of programs is a fundamental challenge in weakly-supervised semantic parsing. To
combat this challenge we apply several techniques. First, we use beam search at decoding
time and when training from weak supervision
(see Section 4), as was done in prior work (Liang
et al., 2017; Guu et al., 2017). At each decoding
step we maintain a beam of B program prefixes of
length n, expand them exhaustively to programs of
length n + 1 and keep the top B program prefixes
with highest model probability.
Second, we utilize our semantic typing system
to only construct programs that are syntactically
valid, and substantially prune the program search
space (similar to the type constraints introduced by
Krishnamurthy et al. (2017)). We maintain a stack
that keeps track of the expected semantic type at
each decoding step. The stack is initialized with
the type Bool. Then, at each decoding step, only
tokens that return the semantic type at the top of
the stack are allowed, the stack is popped, and if
the decoded token is a function, the semantic types
of its arguments are pushed to the stack. This dramatically reduces the search space and guarantees
that only syntactically valid programs will be produced. Figure 2 illustrates the state of the stack
when decoding a program for an input utterance.
Given the constrains on valid programs, our
model is defined as:
Y
p0θ (z | x) =
p0θ (zt | x, z1:t−1 ),
t
pθ (zt | x, z1:t−1 ) · 1(zt | z1:t−1 )
p0θ (zt | x, z1:t−1 ) = P
,
0
0
z 0 pθ (z | x, z1:t−1 ) · 1(z | z1:t−1 )
where 1(zt | z1:t−1 ) indicates whether a certain
program token is valid given the program prefix.
Program re-ranking Our model is a locally
normalized model that provides a distribution for
every token emitted by the decoder. We noticed
that often programs generated on the final beam
do not cover well all the words that occur in the
x :One tower has a yellow base.
z:
EqualInt 1 Count Filter ALL ITEMS λx
And IsYellow
x
IsBottom x
s:
Int
Set
Bool
Item
Bool
Int
Int Set BoolFunc BoolFunc Bool Bool
Bool
Bool
Item
Figure 2: An example for the state of the type stack s while decoding a program z for an utterance x.
Utterance
“yellow”
“big”
“square”
“3”
“exactly”
“top”
“above”
Program
IsYellow
IsBig
IsSquare
3
Equal
IsTop
GetAbove
Cluster
C-Color
C-Size
C-Shape
C-Num
C-QuantMod
C-Location
C-SpaceRel
Total:
#
3
3
4
9
5
2
9
35
Table 2: Example mappings from utterance tokens to
program tokens for the seven clusters used in the abstract representation. The rightmost column counts the
number of mapping in each cluster, resulting in a total
of 26 mappings.
utterance. Therefore, we optionally apply a reranker that re-ranks the beam programs according
to the following heuristic. For every program, we
count how many of the utterance tokens the program covers, based on a small lexicon that maps
partial programs to utterance phrases. Then, we
return the program that has the best coverage. In
Section 5 we show this results in a small boost to
the final performance of the parser. In the future
we plan to train a globally normalized re-ranker
that will re-rank the programs in the beam and replace this heuristic.
4
Learning from Abstract Examples
The main premise of this work is that in small,
well-typed domains such as visual reasoning, the
main challenge is handling language compositionality, as utterances can be complex. Conversely,
the problem of mapping lexical items to functions
and constants in the programming language is limited and can be substantially reduced using a handful of manually defined rules. Thus, if we abstract
away from the actual utterance into a more general representation we can more easily generalize
across examples in datasets with a small number
of examples. Consider the utterances:
1. “There are exactly 3 yellow squares touching the wall.”
2. “There are at least 2 blue circles touching the wall.”
While the surface forms are different in these two
utterances, at an abstract level they are quite similar and we it would be useful to leverage this similarity at training time.
We therefore define an abstract representation
for utterances and logical forms that is suitable for
spatial reasoning. We define seven abstract clusters (see Table 2) that correspond to the main spatial concepts in our domain. Then, we associate
each cluster with a small lexicon that contains
language-program token pairs associated with this
cluster. Table 2 shows the seven clusters we use,
with an example for an utterance-program token
pair from the cluster, and the number of mappings
in each cluster. In total, 35 mappings are used to
define abstract representations.
We now show how abstract examples can be
employed to develop a rule-based semantic parser,
a supervised semantic parser, and to combat the
spuriousness and search challenges in a weaklysupervised semantic parser.
Rule-based semantic parser To examine the
diversity in the dataset, we created abstract representations for all 3,962 utterances in the training examples by mapping utterance tokens to their
cluster label. We counted how many distinct abstract utterances exist, and found that 200 abstract
utterances cover roughly half of the training examples in the original training set.
To create a rule-based parser, we manually annotated 106 abstract utterances with
their corresponding abstract program (including alignment between abstract tokens in the
utterance and program).
For example, the
aforementioned utterances are both mapped to
the abstract program C-QuantMod(C-Num,
Count(Filter(ALL ITEMS, λx. And
(And (IsC-Color(x), IsC-Shape(x),
IsTouchingWall(x)))))).
This defines a rule-based semantic parser:
Given a new utterance x, we create its abstract
representation x̄, and if it exactly matches one of
our manually annotated utterances, we map it to
its corresponding abstract program z̄, replace the
abstract program tokens with the aligned corresponding program tokens, and obtain a final program z.
Supervised semantic parser through data augmentation While the rule-based semantic parser
has high precision and gauges the amount of structural variance in the data, it cannot generalize beyond observed examples.
Because our clusters are small and semantically
coherent, we can generate correct examples from
abstract examples by sampling pairs of utteranceprogram tokens for each cluster. This is equivalent
to a synchronous context-free grammar (Chiang,
2005) that has a rule for generating each manuallyannotated abstract utterance-program pair, and
rules for generating synchronously utterance and
program tokens from the seven clusters.
We generated 4,962 (x, z) examples using this
method and trained a standard supervised semantic parser by maximizing log p0θ (z | x) in the
model described above. Our goal is to examine
whether by training on this dataset we can generalize beyond the rule-based semantic parser.
4.1
Weakly-supervised semantic parser
To train a weakly-supervised semantic parser we
follow Guu et al. (2017) and treat the program z
as a latent variable that is approximately marginalized. Our objective is to maximize:
p(y | x) =
X
p0θ (z | x) · p(y | z, x)
z∈Z
=
X
p0θ (z | x) · R(z, y)
z∈Z
≈
X
p0θ (z | x) · R(z, y),
z∈Ẑ
where Z is the space of all programs and Ẑ is a
subset of all programs that is found by the process
of beam search.
Importantly, the probability of obtaining the denotation y given x and z is defined by a binary
reward function R(z, y) that is 1 iff z is “correct”.
In most semantic parsers z is defined to be correct if when executing it it results in the correct
denotation y. This goes a long way because often
the probability of generating the correct denotation y by a randomly generated z is low. However, in CNLVR, we observe binary denotations,
and so spuriousness is a central problem as previously explained. To alleviate the spuriousness
problem we utilize an interesting property of the
data: the same utterance appears 4 times with 4
different images. If a program is spurious it is
likely that it will yield the wrong denotation in one
of those 4 images. Thus, we can re-define each
training example to be (x, {(kj , yj )}4j=1 ), where
each utterance x is paired with 4 different KBs
and the denotations of the utterance with respect
to these KBs. Then, we maximize p({yj }4j=1 |
x, {kj }4j=1 ) by maximizing the objective above,
except that R(z, {yj }4j=1 ) = 1 iff the denotation of z is correct for all four KBs. This dramatically reduces the problem of spuriousness, as
the chance of randomly obtaining a correct deno1
tation goes down from 21 to 16
. This approach
is reminiscent of the method proposed by Pasupat and Liang (2016), where random permutations
of Wikipedia tables are shown to crowdsourcing
workers to eliminate spurious programs over those
tables.
4.2
Tackling spuriousness by caching
abstract examples
Our approach for tackling spuriousness described
above hinges on the fact that the same utterance
appears in the dataset multiple times. However,
as explained above, many examples are similar to
one another at an abstract level even if they are not
identical. Thus, a natural idea is to combat spuriousness by sharing information across utterances
that have the same abstract representation.
We construct a cache that maps abstract utterances to abstract programs. After obtaining a
beam of final programs for every training example utterance x, we add to the cache every abstract
utterance-program pair (x̄, z̄), and record whether
it obtained positive reward. Thus, for every (x̄, z̄)
pair we can estimate a probability psp for whether
it obtains positive reward.
To construct an abstract example from from an
utterance-program pair in the beam we perform
the following procedure. First, we create an abstract utterance by replacing utterance tokens with
their cluster label, as in the rule-based semantic
parser. Then, we go over every program token, and
replace it with an abstract cluster if the utterance
contains a token that is mapped to this program
token according to one of the 35 mappings from
Table 2. This also provides an alignment from ab-
stract program tokens to abstract utterance tokens
that is necessary when utilizing the cache.
We propose two variants for taking advantage
of the constructed cache:
1. Full program retrieval: For every utterance
x, we construct an abstract utterance x̄, retrieve from the cache the top-D abstract programs z̄ based on psp , compute the programs
z using the alignments from program tokens
to utterance tokens, and add those D programs to the final beam.
2. Program prefix retrieval: At every decoding
step, let Zt be the beam of decoded programs
at step t and Zt+1 be the beam of decoded
programs computed at step t + 1. For every utterance x, we find the top-D cashed
programs Z̄ as in the former variant. Then
at each step t, for every abstract program
z̄ ∈ Z̄ we add z̄1:t to Zt , and exhaustively
search over their possible continuations as
well when constructing Zt+1 . This allows the
parser to potentially construct new programs
that are not in the cache already in subsequent
steps. This combats spuriousness but also the
search challenge, because we add to the beam
promising program prefixes that might have
fallen off of it in early decoding steps.
Liang et al. (2017) also suggested to use a cache
for adding correct programs to the beam, but they
did not use any example abstraction, and only
stored full programs as a way to stabilize learning.
5
Experimental Evaluation
Experimental details Our encoder is a BiLSTM where the hidden state dimension for each
LSTM is 30. The decoder is a feed-forward network with one hidden layer of dimension 50, that
obtains the last 4 decoded tokens as input (in addition to encoder information). Utterance tokens
(words) embeddings are of dimension 12, beam
size B = 40 and we retrieve D = 10 programs
from the cache. We initialize word embeddings
by running the CBOW algorithm (Mikolov et al.,
2013) on the training data and then optimize them
end-to-end. In the weakly-supervised parser we
encourage exploration at training time by using
meritocratic gradient updates with β = 0.5 (Guu
et al., 2017), where the weight of a program with
correct denotation is an interpolation of the model
probability distribution and a uniform distribution.
Using standard policy gradient (β = 1) resulted
in slightly lower performance. Models are implemented in TensorFlow. In the supervised parser,
the parameters other than word embeddings are
randomly initialized (Glorot and Bengio, 2010),
while in the weakly-supervised parser we initialize parameters using the learned parameters of the
supervised model to warm-start the model. We
use the Adam optimizer (Kingma and Ba, 2014),
a learning rate of 0.001, a mini-batch size of 8 examples, and trained for 7 epochs for the supervised
model and 15 epochs for the weakly-supervised
model.
Pre-processing Because the number of utterances is relatively small for training a neural
model, we take the following steps to reduce
sparsity. We lowercase all utterance tokens, and
also use their lemmatized form. We also use
spelling correction to replace words that contain
typos. Last, we replace 8 domain-specific words
with their more frequent synonym according to
the training set (e.g., “object” is replaced with
“item”, and “wall” is replaced with “edge”). After pre-processing we replace every word that occurs less than 5 times with an UNK symbol.
Evaluation We evaluate on the public development set and test set of CNLVR as well as on the
hidden test set by submitting our code to the authors of CNLVR. The standard evaluation metric
is accuracy, that is, how many examples are correctly classified. In addition, we report a consistency measure, which is the proportion of utterances for which the resulting program has the correct denotation for all 4 images/KBs. We believe
this is an important measure as it captures better
whether a model can consistently produce a correct answer for an utterance.
Baselines We compare our models to the M A JORITY baseline that always picks the majority
class (T RUE in our case). We also compare to the
best results reported by Suhr et al. (2017) when
taking the KB as input, which is a maximum entropy classifier (M AX E NT).
We compare these previous results to the following models:
• RULE: The rule-based parser described in
Section 4. We back-off to the M AJORITY
baseline when the parser cannot parse the utterance.
Model
M AJORITY
M AX E NT
RULE
S UP.
S UP.+R ERANK
W EAK S UP.
W.+R ERANK
Dev
Acc. Con.
55.3
68.0
66.0
29.2
72.8
43.1
76.5
53.9
79.5
57.3
83.5
63.7
Test-P
Acc. Con.
56.2
67.7
66.3
32.7
69.5
40.2
74.4
50.4
77.8
52.6
80.4
59.0
Test-H
Acc. Con.
55.4
67.8
83.5
64.7
Table 3: Results of baselines and models on the development set, public test set (Test-P), and hidden test set
(Test-H). For each of our models we report both accuracy and consistency.
• S UP.: A supervised semantic parser trained
on 3,721 examples automatically generated
from abstract examples (and validated on the
remaining 1,241 examples).
• W EAK S UP.: A weakly-supervised semantic
parser described in Section 4.
• +R ERANK: For both the supervised parser
and the weakly-supervised parser, we add the
heuristic global re-ranking describe in Section 3.
Main results Table 5 describes our main results.
Our weakly-supervised semantic parser combined
with global re-ranking of the beam (W.+R ERANK)
obtains 83.5 accuracy and 64.7 consistency on the
test set, improving accuracy by 15.7 points compared to state-of-the-art. This is the only model
we evaluated on the hidden test set according to
the rules of CNLVR evaluation.2
The rule-based parser, RULE, is able to handle a
non-negligible part of the data and its accuracy is
less than two points lower than the M AX E NT baseline on then development set and public test set.
Training a supervised parser improves accuracy
to 69.5 on the public test set, showing that generalizing from generated examples is better than
memorizing the manually-defined patterns. Our
weakly-supervised parser significantly improves
over S UP., reaching an accuracy of 77.8 on the
test before re-ranking. For both S UP. and W EAK S UP. re-ranking substantially improves both accuracy and consistency.
To conclude, we develop a semantic parsing approach for the CNLVR dataset. We show that a
supervised parser trained by generating examples
2
https://github.com/clic-lab/nlvr#
running-on-the-held-out-test-set
Model
-A BSTRACTION
-B EAM C ACHE
-E VERY S TEP B EAM C ACHE
Dev.
Acc. Con.
56.7
9.0
72.8
46.4
81.1
61.4
Table 4: Results of ablations of our main models on
the development set. Explanation for the nature of the
models is in the body of the paper.
from abstract examples already improves over approaches that do not use a programming language,
and that we are able to overcome the challenges
of search and spuriousness, and develop a weakly
supervised semantic parser that substantially improves state-of-the-art.
5.1
Analysis
We analyze our results by running several ablations on our best model W.+R ERANK on the development set.
To examine the importance of abstract examples, we run our weakly-supervised parser from
scratch without pre-training a supervised parser
on abstract examples and without using a cache
for abstract examples (-A BSTRACTION). We find
this parser is unable to overcome the challenges
of training from weak supervision. Training and
development accuracies remain very low throughout training, and thus we stopped training after
9 epochs, seeing that performance is close to the
M AJORITY baseline.
To further examine the importance of the cache
itself, we train the weakly-supervised parser by
starting from the initialized supervised parser,
but without the cache of abstract examples (B EAM C ACHE).
We find that this weaklysupervised parser performs worse than the supervised parser it was initialized from by a few points.
that is, we are still unable to improve learning by
training from denotations. Last, we use a beam
cache with full program retrieval only (Section 4),
that is, programs are added to the beam only after decoding terminates, rather than at every decoding step (-E VERY S TEP B EAM C ACHE). We see
that this already results in good performance that
is substantially higher than S UP., but is still 2.4
points worse than our best performing model on
the development set.
6
Related Work
Training semantic parsers from denotations has
been one of the most popular training schemes for
scaling semantic parsers since the beginning of the
decade. Early work focused on traditional loglinear models (Clarke et al., 2010; Liang et al.,
2011; Kwiatkowski et al., 2013; Berant et al.,
2013), but recently denotations have been used
to train neural semantic parsers as well (Liang
et al., 2017; Krishnamurthy et al., 2017; Rabinovich et al., 2017; Cheng et al., 2017).
Visual reasoning has attracted considerable attention, with the release of datasets such as VQA
(Antol et al., 2015) and CLEVR (Johnson et al.,
2017a). The advantage of CNLVR is that the
language utterances are both natural and compositional. Treating the problem of visual reasoning as an end-to-end semantic parsing problem has
been previously done on CLEVR (Hu et al., 2017;
Johnson et al., 2017b).
Our method for generating training examples
resembles ideas for data re-combination suggested
recently (Jia and Liang, 2016), where examples
are generated automatically by replacing entities
with their categories.
While spuriousness is central to semantic parsing when denotations are not very informative,
there has been relatively little work on explicitly
tackling it. Pasupat and Liang (2015) used manual rules to prune unlikely programs on the W IK I TABLE Q UESTIONS dataset, and then later utilized crowdsourcing (Pasupat and Liang, 2016) to
eliminate spurious programs. Guu et al. (2017)
proposed R ANDOMER, a method for increasing
exploration and handling spuriousness by adding
randomness to beam search and a proposing a
“meritocratic” weighting scheme for gradients. In
our work we found that random exploration during
beam search did not improve results while meritocratic updates slightly improved performance.
7
Conclusion
In this work we presented the first semantic parser
for the CNLVR dataset, working on structured
representations as input. Our main insight is that
in small, well-typed domains we can generate abstract examples that can help combat the difficulties of training a parser from delayed supervision. First, we use abstract examples to semiautomatically generate utterance-program pairs
that help warm-start our parameters, thereby reducing the difficult search challenge of finding
correct programs with random parameters. Second, we focus on an abstract representation of ex-
amples, which allows us to tackle spuriousness
and alleviate search, by sharing information about
promising programs between different examples.
Our semantic parser substantially improves results
compared to previous state-of-the-art on the CNLVR dataset.
In future work, we plan to investigate training
a globally-normalized re-ranker over the beam of
programs generated by the our locally-normalized
sequence-to-sequence model, and also train a
parser over a simpler programming language that
is closer to the representation in the target KB.
References
S. Antol, A. Agrawal, J. Lu, M. Mitchell, D. Batra,
C. L. Zitnick, and D. Parikh. 2015. Vqa: Visual
question answering. In International Conference on
Computer Vision (ICCV). pages 2425–2433.
Y. Artzi and L. Zettlemoyer. 2013. Weakly supervised
learning of semantic parsers for mapping instructions to actions. Transactions of the Association for
Computational Linguistics (TACL) 1:49–62.
D. Bahdanau, K. Cho, and Y. Bengio. 2015. Neural
machine translation by jointly learning to align and
translate. In International Conference on Learning
Representations (ICLR).
J. Berant, A. Chou, R. Frostig, and P. Liang. 2013. Semantic parsing on Freebase from question-answer
pairs. In Empirical Methods in Natural Language
Processing (EMNLP).
Q. Cai and A. Yates. 2013. Large-scale semantic parsing via schema matching and lexicon extension. In
Association for Computational Linguistics (ACL).
J. Cheng, S. Reddy, V. Saraswat, and M. Lapata. 2017.
Learning structured natural language representations
for semantic parsing. In Association for Computational Linguistics (ACL).
D. Chiang. 2005. A hierarchical phrase-based model
for statistical machine translation. In Association for
Computational Linguistics (ACL). pages 263–270.
J. Clarke, D. Goldwasser, M. Chang, and D. Roth.
2010. Driving semantic parsing from the world’s response. In Computational Natural Language Learning (CoNLL). pages 18–27.
X. Glorot and Y. Bengio. 2010. Understanding the
difficulty of training deep feedforward neural networks. In International Conference on Artificial Intelligence and Statistics.
K. Guu, P. Pasupat, E. Z. Liu, and P. Liang. 2017.
From language to programs: Bridging reinforcement learning and maximum marginal likelihood. In
Association for Computational Linguistics (ACL).
S. Hochreiter and J. Schmidhuber. 1997. Long shortterm memory. Neural Computation 9(8):1735–
1780.
P. Pasupat and P. Liang. 2015. Compositional semantic
parsing on semi-structured tables. In Association for
Computational Linguistics (ACL).
R. Hu, J. Andreas, M. Rohrbach, T. Darrell, and
K. Saenko. 2017. Learning to reason: End-toend module networks for visual question answering. In International Conference on Computer Vision (ICCV).
P. Pasupat and P. Liang. 2016. Inferring logical forms
from denotations. In Association for Computational
Linguistics (ACL).
R. Jia and P. Liang. 2016. Data recombination for neural semantic parsing. In Association for Computational Linguistics (ACL).
J. Johnson, B. Hariharan, L. van der Maaten, L. Fei-Fei,
C. L. Zitnick, and R. Girshick. 2017a. Clevr: A diagnostic dataset for compositional language and elementary visual reasoning. In Computer Vision and
Pattern Recognition (CVPR).
J. Johnson, B. Hariharan, L. van der Maaten, J. Hoffman, L. Fei-Fei, C. L. Zitnick, and R. Girshick.
2017b. Inferring and executing programs for visual
reasoning. In International Conference on Computer Vision (ICCV).
R. J. Kate, Y. W. Wong, and R. J. Mooney. 2005.
Learning to transform natural to formal languages.
In Association for the Advancement of Artificial Intelligence (AAAI). pages 1062–1068.
D. Kingma and J. Ba. 2014. Adam: A method
for stochastic optimization.
arXiv preprint
arXiv:1412.6980 .
J. Krishnamurthy, P. Dasigi, and M. Gardner. 2017.
Neural semantic parsing with type constraints for
semi-structured tables. In Empirical Methods in
Natural Language Processing (EMNLP).
J. Krishnamurthy and T. Mitchell. 2012. Weakly
supervised training of semantic parsers. In Empirical Methods in Natural Language Processing
and Computational Natural Language Learning
(EMNLP/CoNLL). pages 754–765.
T. Kwiatkowski, E. Choi, Y. Artzi, and L. Zettlemoyer.
2013. Scaling semantic parsers with on-the-fly ontology matching. In Empirical Methods in Natural
Language Processing (EMNLP).
C. Liang, J. Berant, Q. Le, and K. D. F. N. Lao.
2017. Neural symbolic machines: Learning semantic parsers on Freebase with weak supervision. In
Association for Computational Linguistics (ACL).
P. Liang, M. I. Jordan, and D. Klein. 2011. Learning dependency-based compositional semantics. In
Association for Computational Linguistics (ACL).
pages 590–599.
T. Mikolov, K. Chen, G. Corrado, and Jeffrey. 2013.
Efficient estimation of word representations in vector space. arXiv .
M. Rabinovich, M. Stern, and D. Klein. 2017. Abstract
syntax networks for code generation and semantic
parsing. In Association for Computational Linguistics (ACL).
A. Suhr, M. Lewis, J. Yeh, and Y. Artzi. 2017. A corpus
of natural language for visual reasoning. In Association for Computational Linguistics (ACL).
I. Sutskever, O. Vinyals, and Q. V. Le. 2014. Sequence
to sequence learning with neural networks. In Advances in Neural Information Processing Systems
(NIPS). pages 3104–3112.
M. Zelle and R. J. Mooney. 1996. Learning to parse
database queries using inductive logic programming. In Association for the Advancement of Artificial Intelligence (AAAI). pages 1050–1055.
L. S. Zettlemoyer and M. Collins. 2005. Learning to
map sentences to logical form: Structured classification with probabilistic categorial grammars. In Uncertainty in Artificial Intelligence (UAI). pages 658–
666.
L. S. Zettlemoyer and M. Collins. 2007. Online learning of relaxed CCG grammars for parsing to logical form. In Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP/CoNLL). pages 678–687.
Appendix A: Programming Language
Logical Function
Exist
Filter
Count
And, Or
Not
GreaterThan, LessThan,
GreaterEqual, LessEqual
Equal
QueryColor
QueryShape
QuerySize
GetAbove, GetBelow,
GetTouching
IsYellow, IsBlack,
IsBlue,
IsCircle, IsTriangle,
IsSquare,
IsBig, IsMedium,
IsSmall,
IsTop, IsBottom
IsTouchingWall
All, Any
Union
Select
AllSame
Return Type
Bool
Set(?)
Int
Bool
Bool
Bool
Argument(s) Type(s)
Set(?)
Set(?),BoolFunc(?)
Set(?)
Bool,Bool
Bool
Int,Int
Bool
Set(Color)
Set(Shape)
Set(Size)
Set(Item)
(?,?)
Set(Item)
Set(Item)
Set(Item)
Set(Item)
Bool
Item
Bool
Bool
Set(?)
Set(?),Int
Bool
Item,Side
Set(?),BoolFunc(?)
Set(Set(?))
Set(Set(?)
Set(?)
Constants
ALL ITEMS
ALL BOXES
Color.Blue, Color.Yellow,
Color.Black
Shape.Circle, Shape.Triangle,
Shape.Square
Side.Top, Side.Bottom,
Side.Left, Side.Right,
Side.Any
Type
Set(Item)
Set(Set(Item))
Color
Shape
Side
| 2cs.AI
|
Metric Perturbation Resilience
arXiv:1607.06442v1 [cs.DS] 21 Jul 2016
Konstantin Makarychev
Microsoft Research
Yury Makarychev∗
TTIC
Abstract
We study the notion of perturbation resilience introduced by Bilu and Linial (2010) and
Awasthi, Blum, and Sheffet (2012). A clustering problem is α-perturbation resilient if the
optimal clustering does not change when we perturb all distances by a factor of at most α.
We consider a class of clustering problems with center-based objectives, which includes such
problems as k-means, k-median, and k-center, and give an exact algorithm for clustering 2perturbation resilient instances. Our result improves
upon the result of Balcan and Liang
√
(2016), who gave an algorithm for clustering 1 + 2 ≈ 2.41 perturbation resilient instances.
Our result is tight in the sense that no polynomial-time algorithm can solve (2 − ε)-perturbation
resilient instances unless N P = RP , as was shown by Balcan, Haghtalab, and White (2016).
We show that the algorithm works on instances satisfying a slightly weaker and more natural
condition than perturbation resilience, which we call metric perturbation resilience.
∗
Supported by NSF CAREER award CCF-1150062 and NSF award IIS-1302662.
1
Introduction
In this paper, we present an exact algorithm for solving 2-perturbation resilient instances of clustering problems with natural center-based objectives. The notion of perturbation resilience was
proposed by Bilu and Linial [5] and Awasthi, Blum, and Sheffet [1]. Informally, an instance is
perturbation resilient if the optimal solution does not change when we perturb the instance. The
definition was introduced in the context of beyond-the-worst-case analysis and aims to capture
a wide class of real-life instances that are computationally easier than worst-case instances. As
several authors argue, in instances arising in practice, the optimal solution is often significantly
better than all other solutions and thus does not change if we slightly perturb the instance [5, 4]. It
was shown that perturbation resilient instances of such problems as k-center, k-means, k-median,
clustering problems with center-based and min-sum objectives, Max Cut, Minimum Multiway Cut,
and TSP (with a sufficiently large value of the resilience parameter) can be solved exactly in
polynomial-time [1, 2, 3, 4, 5, 6, 7]; while the worst-case instances of these problems are NP-hard.
In a clustering problem, we are given a metric space (X, d) and an integer parameter k; our goal
is to partition X into k clusters C1 , . . . , Ck so as to minimize the objective function H(C1 , . . . , Ck ; d)
(which depends on the problem at hand). The most well-studied and, perhaps, most interesting
clustering objectives are k-means, k-median, and k-center. These objectives are defined as follows.
Given a clustering C1 , . . . , Ck , the objective is equal to the minimum over all choices of centers
c1 ∈ C1 ,. . . ,ck ∈ Ck of the following functions:
Hmeans (C1 , . . . , Ck ; d) =
k X
X
d(u, ci )2 ;
Hmedian (C1 , . . . , Ck ; d) =
k X
X
d(u, ci );
Hcenter (C1 , . . . , Ck ; d) =
i=1 u∈Ci
i=1 u∈Ci
max max d(u, ci ).
i∈{1,...,k} u∈Ci
Note that in the optimal solution each cluster Ci consists of those vertices u that are closer to ci
than to other centers cj ; i.e. (C1 , . . . , Ck ) is the Voronoi partition of X with centers c1 , . . . , ck .
We refer to objectives satisfying this property as center-based objectives. We study two closely
related classes of center-based objectives – separable center-based objectives and natural centerbased objectives (which we discuss below and formally define in Section 2). We note that k-means,
k-median, and k-center are separable and natural center-based objectives. Now we formally define
perturbation resilience.
Definition 1.1. Consider an instance I = ((X, d), H, k) of a clustering problem on a metric space
(X, d) with objective H. An instance ((X, d′ ), H, k) is an α-perturbation of I if
d(u, v) ≤ d′ (u, v) ≤ αd(u, v)
for every u, v ∈ X;
here, d′ does not have to be a metric. An instance I is α-perturbation resilient if every αperturbation of I has the same optimal clustering as I. We will refer to α as the perturbation
resilience parameter.
This definition does not require that the perturbation d′ is a metric (d′ does not have to satisfy
the triangle inequality). It is more natural to consider only metric perturbations of I — those
perturbations in which d′ is a metric. In this paper, we give the definition of metric perturbation
resilience, in which we do require that d′ is a metric (see Definition 2.4). (Every α-perturbation
resilient instance is also α-metric perturbation resilient.)
1
Known results. Awasthi, Blum, and Sheffet [1] initiated the study of perturbation resilient
instances of clustering problems. They offered the definition of a separable center-based objective (s.c.b.o.) and introduced an important center proximity property (see Definition 2.5). They
presented an exact algorithm for solving 3-perturbation
resilient instances of clustering problems
√
with s.c.b.o.; they also gave an algorithm for (2 + 3)-perturbation resilient instances of clustering
problems with s.c.b.o. that have Steiner points. Additionally, they showed that α-perturbation
resilient instances of k-median with Steiner points
are N P -hard when α < 3. Later, Balcan and
√
Liang [3] designed an exact algorithm for (1 + 2)-perturbation resilient instances of problems with
s.c.b.o., improving the result of Awasthi, Blum, and Sheffet. Balcan and Liang also studied clustering with the min-sum objective and (α, ε)-perturbation resilience (a weaker notion of perturbation
resilience, which we do not discuss in this paper). Recently, Balcan, Haghtalab, and White [2]
designed an algorithm for 2-perturbation resilient instances of symmetric and asymmetric k-center
and showed that there is no polynomial-time algorithm for (2 − ε) perturbation resilience instances
unless N P = RP . They also gave an algorithm for 2-perturbation resilient instances of problems
with s.c.b.o. satisfying a strong additional condition of cluster verifiability.
√ To summarize, the best
known algorithm for arbitrary s.c.b.o. requires that the instance be 1 + 2 ≈ 2.4142 perturbation
resilient [3]; the best known algorithm for k-center requires that the instance be 2-perturbation
resilient, and this result cannot be improved [2].
We refer the reader to [6] for an overview of known results for stable instances of combinatorial
optimization problems.
Our results. We define a class of clustering problems with natural center-based objectives; an
objective is a natural center-based objective if it is representable in the following form. For some
functions fc and gu (r) (fc is a function of c, gu (r) is a function of u and r; intuitively, fci is the
cost of having a center at ci and gu (r) is the cost of connecting u to a center at distance r from u),
we have
k
X
X
fci +
gu (d(u, ci )) ,
H(C1 , . . . , Ck ; d) = min
ci ∈Ci
or
H(C1 , . . . , Ck ; d) = min max
ci ∈Ci
i=1
u∈Ci
max fci , max gu (d(u, ci )) .
i∈{1,...,k}
i∈{1,...,k}
u∈Ci
This class includes such problems as k-center, k-means, k-median, and metric facility location (for
the first three problems: fc = 0 and gu (r) equals r 2 , r, and r respectively).
We present a polynomial-time algorithm for 2-metric perturbation resilient instances of clustering problems with natural center based objectives;√thus, we improve the known requirement on the
perturbation resilience parameter α from α ≥ 1 + 2 ≈ 2.4142 to α ≥ 2 and relax the condition on
instances from a stronger α-perturbation resilience condition to a weaker and more natural α-metric
perturbation resilience condition. Our result is optimal, since even (2 − ε)-perturbation resilient
instances of k-center cannot be solved in polynomial time unless N P = RP
√ [2]. In particular, our
result improves the requirement for k-median and k-means from α ≥ 1 + 2 to α ≥ 2.
Theorem 1.2. There exists a polynomial-time algorithm that given any 2-metric perturbation
resilient instance ((X, d), H, k) of a clustering problem with natural center-based objective, returns
the (exact) optimal clustering of X.
Our algorithm is quite simple. It first runs the single-linkage algorithm to construct the minimum spanning tree on points of X and then partitions the minimum spanning tree into k clusters
2
using dynamic programming. We note that Awasthi, Blum, and Sheffet [1] also used the singlelinkage algorithm together with dynamic programming to cluster 3-perturbation resilient instances.
However, their approach is substantially different from ours: They first find a hierarchical clustering
of X using the single-linkage algorithm and then pick k optimal clusters from this hierarchical clustering. This approach fails for α-perturbation resilient instances with α < 3 (see [1]). That is why,
we do not use the single-linkage hierarchical clustering in our algorithm, and, instead, partition the
minimum spanning tree.
We note that the definitions of separable and natural center-based objectives are different.
However, in Section 5 we consider a slightly strengthened definition of s.c.b.o. and show that every
s.c.b.o., under this new definition, is also a natural center-based objective; thus, our result applies
to it. We are not aware of any non-pathological objective that satisfies the definition of s.c.b.o. but
is not a natural center-based objective.
Finally, we consider clustering with s.c.b.o. and show that the optimal solution for every αmetric perturbation resilient instance satisfies the α-center proximity property; previously, that
was only known for α-perturbation resilient instances [1]. Our result implies that the algorithms
by Balcan and Liang [3] and Balcan, Haghtalab, and White [2] for clustering with s.c.b.o. and
k-center, respectively, apply not only to α-perturbation resilient but also α-metric perturbation
resilient instances.
Overview. In Section 2, we formally define key notions used in this paper. Then, in Section 3,
we prove that the optimal solution for every α-metric perturbation resilient instance satisfies the
α-center proximity property. We use this result later in the analysis of our algorithm; also, as we
noted above, it is of independent interest and implies that previously known algorithms from [2, 3]
work under the metric permutation resilience assumption. In Section 4, we present our algorithm
for solving 2-perturbation resilient instances of problems with natural center-based objectives. The
algorithm consists of two steps. In the first step, we find a minimum spanning tree in the metric
space (X, d). In the second step, we partition the tree into k subtrees using dynamic programming
and then output the corresponding clustering of X. Finally, in Section 5, we prove that if a s.c.b.o.
satisfies some additional properties, then it is a natural center-based objective.
2
Preliminaries
In this section, we formally define key notions used in this paper: a clustering problem, α-metric
perturbation resilience, separable center-based and natural center-based objectives.
Definition 2.1. An instance of a clustering problem is the tuple ((X, d), H, k) of a metric space
(X, d), objective function H, and integer number k > 1. The objective H is a function that given
a partition of X into k sets C1 , . . . , Ck and a metric d on X returns a nonnegative real number,
which we call the cost of the partition.
Given an instance of a clustering problem ((X, d), H, k), our goal is to partition X into disjoint
sets C1 , . . . , Ck , so as to minimize H(C1 , . . . , Ck ; d). Now we define center-based and separable
center-based objectives. We note that the definitions of Awasthi et al. [1] make several implicit
assumptions that we make explicit here.
Definition 2.2. We say that H is a center-based objective function if the following properties hold.
1. Given a subset S ⊂ X and distance dS on S, we can find the optimal center c ∈ S for S, or, if
there is more than one choice of an optimal center, a set of optimal centers center(S, dS ) ⊂ S.
(In the former case, center(S, dS ) = {c}).
3
2. For every metric d on X, there exists an optimal clustering C1 , . . . , Ck of X (i.e., a clustering
that minimizes H(C1 , . . . , Ck ; d)) such that for every two distinct clusters Ci , Cj , every point
p in Ci and centers ci ∈ center(Ci , d|Ci ) and cj ∈ center(Cj , d|Cj ) we have d(p, ci ) ≤ d(p, cj ).
Furthermore, if the optimal clustering C1 , . . . , Ck is unique, then d(p, ci ) < d(p, cj ).
The objective is separable if, additionally, we can define individual cluster scores so that the following
holds.
• The cost of the clustering is either the sum (for separable sum-objectives) or maximum (for
separable max-objectives) of the cluster scores.
• The score H(C, d|C ) of each cluster C depends only on C and d|C , and can be computed in
polynomial time.
In this paper, we consider a slightly narrower class of natural center-based objectives (which
we described in the introduction). The class contains most important center-based objectives: kcenter, k-means, and k-median, as well as the facility location objective. We are not aware of any
reasonable center-based objective that is not a natural center-based objective. Now, we formally
define natural center-based objectives.
Definition 2.3. We say that H is a natural center-based objective function for a ground set X, if
there exist functions f : X → R and g : X × R → R such that
H(C1 , . . . , Ck ; d) = min
ci ∈Ci
or
H(C1 , . . . , Ck ; d) = min max
ci ∈Ci
k
X
X
gu (d(u, ci )) ,
fci +
i=1
u∈Ci
max fci , max gu (d(u, ci )) .
i∈{1,...,k}
(1)
i∈{1,...,k}
u∈Ci
(2)
We require that the functions f and g be computable in polynomial time, and that gu be nondecreasing for every u ∈ X. We call points ci the centers of the clustering.
P
We could have also defined an objective with an ℓp -aggregate function H = ( ki=1 fcpi +
P
p 1/p , but it is equivalent to (1) with f ′ (c) = f p (c) and g ′ (u, r) = g p (u, r).
u∈Ci gu (d(u, ci ))
Now, we formally define a metric perturbation and metric perturbation resilience. Since we
do not require that the objective H is homogeneous as a function of the metric d, we introduce
two perturbation resilience parameters α1 and α2 in the definition, which specify by how much the
distances can be contracted and expanded, respectively, in the perturbed instances.
Definition 2.4. Consider a metric space (X, d). We say that a metric d′ is an (α1 , α2 )-metric per′
turbation of (X, d) if α−1
1 d(u, v) ≤ d (u, v) ≤ α2 d(u, v) for every u, v ∈ X. An instance ((X, d), H, k)
is (α1 , α2 )-metric perturbation resilient if for every (α1 , α2 )-metric perturbation d′ of d, the unique
optimal clustering for ((X, d′ ), H, k) is the same as for ((X, d′ ), H, k).
Note that the centers of clusters in the optimal solutions for ((X, d), H, k) and ((X, d′ ), H, k)
may differ. We say that an instance (H, (X, d), k) is α-metric perturbation resilient if it is (α, 1)metric perturbation resilient.
Observe that if instance ((X, d), H, k) is (α1 , α2 )-metric perturbation resilient, then ((X, λd), H, k)
is (λα1 , λα2 )-metric perturbation resilient for λ ∈ [α−1
1 , α2 ]. Particularly, if ((X, d), H, k) is (α1 , α2 )metric perturbation resilient, then ((X, α2 d), H, k) is (α, 1)-metric perturbation resilient and the
4
optimal solution for ((X, α2 d), H, k) is the same as for ((X, d), H, k). Thus, to solve an (α1 , α2 )metric perturbation resilient instance ((X, λd), H, k), it suffices to solve α = (α1 α2 ) metric perturbation resilient instance ((X, α2 d), H, k). Consequently, we will only consider α-metric perturbation
resilient instances in this paper.
Finally, we recall the definition of the α-center proximity property, introduced in [1].
Definition 2.5. We say that a clustering C1 , . . . , Ck of X with centers c1 , . . . , ck satisfies the
α-center proximity property if for all i 6= j and p ∈ Ci , we have d(p, cj ) > αd(p, ci ).
3
Center Proximity for Metric Perturbation Resilience
In this section, we prove that the (unique) optimal solution to an α-metric perturbation resilient
clustering problem satisfies the α-center proximity property. Our proof is similar to the proof of
Awasthi, Blum, and Sheffet, who showed that the optimal solution to a (non-metric) α-perturbation
resilient clustering problem satisfies the α-center proximity property.
Theorem 3.1. Consider an α-metric perturbation resilient clustering problem ((X, d), H, k) with
a center-based objective. Let C1 , . . . , Ck be the unique optimal solution; and let c1 , . . . , ck be a set
of centers of C1 , . . . , Ck (that is, each ci ∈ center(Ci , d|Ci )). Then, the following α-center proximity
property holds: for all i 6= j and p ∈ Ci , we have d(p, cj ) > αd(p, ci ).
Proof. Suppose that d(p, cj ) ≤ αd(p, ci ). Let r ∗ = d(p, ci ). Define a new metric d′ as follows.
Consider the complete graph on X. Assign length len(u, v) = d(u, v) to each edge (u, v) other than
(p, cj ). Assign length len(p, cj ) = r ∗ to the edge (p, cj ). Let metric d′ (u, v) be the shortest path
metric on the complete graph on X with edge lengths len(u, v). Note that d(p, cj ) ≥ d(p, ci ) = r ∗
since p ∈ Ci and C1 , . . . , Ck is an optimal clustering. Hence, for every (u, v): len(u, v) ≤ d(u, v)
and d′ (u, v) ≤ d(u, v). It is easy to see that
d′ (u, v) = min(d(u, v), d(u, p) + r ∗ + d(cj , v), d(v, p) + r ∗ + d(cj , u)).
Observe that since the ratio d(u, v)/len(u, v) is at most d(p, cj )/r ∗ ≤ α for all edges (u, v), we have
d(u, v)/d′ (u, v) ≤ α for all u and v. Hence, d(u, v) ≤ αd′ (u, v) ≤ αd(u, v), and consequently, d′ is
an (α, 1)-metric perturbation of d.
We now show that d′ is equal to d within the cluster Ci and within the cluster Cj .
Lemma 3.2. For all u, v ∈ Ci , we have d(u, v) = d′ (u, v), and for all u, v ∈ Cj , we have d(u, v) =
d′ (u, v).
Proof. I. Consider two points u, v in Ci . We need to show that d(u, v) = d′ (u, v). It suffices to
prove that
d(u, v) ≤ min(d(u, p) + r ∗ + d(cj , v), d(v, p) + r ∗ + d(cj , u)).
Assume without loss of generality that d(u, p) + r ∗ + d(cj , v) ≤ d(v, p) + r ∗ + d(cj , u). We have
d(u, p) + r ∗ + d(cj , v) = d(u, p) + d(p, ci ) + d(cj , v) ≥ d(u, ci ) + d(cj , v).
Since v ∈ Ci , we have d(v, ci ) ≤ d(v, cj ), and thus
d(u, p) + r ∗ + d(cj , v) ≥ d(u, ci ) + d(ci , v) ≥ d(u, v).
5
II. Consider two points u, v in Cj . Similarly to the previous case, we need to show that d(u, v) ≤
d(u, p) + r ∗ + d(cj , v). Since now u ∈ Cj , we have d(u, cj ) ≤ d(u, ci ). Thus,
d(u, p)+r ∗ +d(cj , v) = d(u, p)+d(p, ci ) +d(cj , v) ≥ d(u, ci )+d(cj , v) ≥ d(u, cj )+d(cj , v) ≥ d(u, v).
By the definition of α-metric perturbation stability, the optimal clusterings for metrics d and
d′ are the same. By Lemma 3.2, the distance functions d and d′ are equal within the clusters Ci
and Cj . Hence, the centers of Ci and Cj w.r.t. metric d′ are also points ci and cj , respectively (see
Definition 2.2, item 1). Thus, by the definition of center-based objective, d′ (ci , p) < d′ (cj , p), and,
consequently,
d(ci , p) = d′ (ci , p) < d′ (cj , p) = r ∗ = d(ci , p).
We get a contradiction, which finishes the proof.
Corollary 3.3. Consider a 2-metric perturbation resilient instance. Let C1 , . . . , Ck be an optimal
clustering with centers c1 , . . . , ck . Then each point u in Ci is closer to ci than to any point v outside
of Ci .
Proof. Suppose that v ∈ Cj for some j 6= i. By the triangle inequality, d(u, v) ≥ d(u, cj ) − d(cj , v).
By Lemma 3.1, d(u, cj ) > 2d(u, ci ) and d(cj , v) < d(ci , v)/2. Thus,
d(u, v) ≥ d(u, cj ) − d(cj , v) > 2d(u, ci ) −
d(ci , u) + d(u, v)
d(ci , v)
≥ 2d(u, ci ) −
.
2
2
In the last inequality, we used the triangle inequality d(ci , v) ≤ d(ci , u) + d(u, v). Rearranging the
terms, we get d(u, v) > d(ci , u).
4
Clustering Algorithm
In this section, we present our algorithm for solving 2-metric perturbation resilient instances of
clustering problems with natural center-based objectives. Our algorithm is based on single–linkage
clustering: first, we find a minimum spanning tree on the metric space X (e.g., using Kruskal’s
algorithm) and then run a dynamic programming algorithm on the spanning tree to find the clusters.
We describe the two steps of the algorithm in Sections 4.1 and 4.2.
4.1
Minimum Spanning Tree
At the first phase of the algorithm, we construct a minimum spanning tree on the points of the metric
space using Kruskal’s algorithm. Kruskal’s algorithm maintains a collection of trees. Initially, each
tree is a singleton point. At every step, the algorithm finds two points closest to each other that
belong to different trees and adds an edges between them. The algorithm terminates when all
points belong to the same tree. We denote the obtained spanning tree by T . The key observation
is that each cluster Ci forms a subtree of the spanning tree T .
Lemma 4.1. Each cluster Ci forms a subtree of the spanning tree T . In other words, the unique
path between every two vertices u, v ∈ Ci does not leave the cluster Ci .
6
Proof. Let ci be the center of Ci . We show that the (unique) path p from u to ci lies in Ci ,
and, therefore, the statement of Lemma 4.1 holds. Let u′ be the next vertex after u on the path p.
Consider the step at which Kruskal’s algorithm added the edge (u, u′ ). At that step, u and ci were in
distinct connected components (as p is the only path connecting u and ci ). Thus, d(u, u′ ) ≤ d(u, ci )
as otherwise the algorithm would have added the edge (u, ci ) instead of (u, u′ ). By Corollary 3.3,
the inequality d(u, u′ ) ≤ d(u, ci ) implies that u′ belongs to Ci . Proceeding by induction we conclude
that all vertices on the path p belong to Ci .
4.2
Dynamic Programming Algorithm
At the second phase, we use dynamic programming to compute the optimal clustering. We root
the tree T at an arbitrary vertex. We denote its root by root and the subtree rooted at u by Tu .
We first assume that the tree is binary. Later, we explain how to transform any tree into a binary
tree by adding dummy vertices.
The algorithm partitions the tree into (non-empty) subtrees P1 , . . . , Pk and assigns a center
ci ∈ Pi to all vertices in the subtree Pi so as to minimize the objective:
k
X
fci +
i=1
k X
X
gu (d(u, ci )).
(3)
i=1 u∈Pi
Lemma 4.1 implies that the optimal partitioning of X is the solution to this problem.
Let costu (k′ , c) be the minimum cost (3) of partitioning the subtree Tu into k′ subtrees P1 , . . . , Pk
and choosing k centers c1 , . . . , ck so that the following conditions hold:
1. u ∈ P1 and c1 = c (we denote the tree that contains u by P1 and require that its center be c).
2. if c1 ∈ Tu , then c1 ∈ P1 (if the center c1 of P1 lies in Tu , then it must be in P1 );
3. ci ∈ Pi for i > 1 (the center ci of every other tree Pi lies in Pi ).
That is, we assume that u belongs to the first subtree P1 and that c is the center for P1 . Every
center ci must belong to the corresponding set Pi except for c1 . However, if c1 ∈ Tu , then c1 ∈ P1 .
Denote the children of vertex u by lu and ru (recall that we assume that the tree is binary).
The cost costu (k′ , c) is computed using the following recursive formulas: if c ∈
/ Tlu ∪ Tru , then
costu (j, c) =fc + gu (d(c, u)) + min
(4)
′
′
′′
′
′
′′
′′
′
′′
′
′′
min{costlu (j , c ) + costru (j , c ) : j + j = j − 1, c ∈ Tlu , c ∈ Tru },
′′
′
(6)
′
′′
′′
(7)
min{costlu (j , c ) + costru (j , c) − fc : j + j = j, c ∈ Tlu },
′
′′
′′
(5)
′
min{costlu (j , c) + costru (j , c ) − fc : j + j = j, c ∈ Tru },
min{costlu (j ′ , c) + costru (j ′′ , c) − 2fc : j ′ + j ′′ = j + 1} .
(8)
If c ∈ Tlu , then we remove lines (5) and (6) from the formula. If c ∈ Tru , then we remove
lines (5) and (7) from the formula.
The first term fc + gu (d(c, u)) is the cost of opening a center in c and assigning u to c. The lines (5–
8) correspond to the following cases:
(5) neither lu nor ru is in P1 ; they are assigned to (trees Pi and Pj with centers) c′ and c′′ ,
(6) lu is not in P1 , but ru is in P1 ; they are assigned to c′ and c,
(7) lu is in P1 , but ru is not in P1 ; they are assigned to c and c′′ ,
7
(8) both lu and ru are in P1 ; they are assigned to c.
For leaves, we set costu (1, c) = fc + gu (d(u, c)) and costu (j, c) = ∞ for j > 1. Note that if we want
to find a partitioning of T into at most k subtrees, we can use a slightly simpler dynamic program.
It is easy to verify that the formulas above hold. The cost of the optimal partitioning of T into k
subtrees equals minc∈X costroot (k, c).
We now explain how to transform the tree T into a binary tree. If a vertex u has more than
two children, we add new dummy vertices between u and its children by repeating the following
procedure: take a vertex u having more than two children; pick any two children of u: u1 and u2 ;
create a new child v of u and rehang subtrees Tu1 and Tu2 to the vertex v. We forbid opening
centers in dummy vertices v by setting the opening cost fv to be infinity. We set the assignment
costs gv to be 0. Note that Lemma 4.1 still holds for the new tree if we place every dummy vertex
in the same part Pi as its parent.
5
Universal Separable Center-Based Clustering Objectives
In this section, we show that every separable center-based objective, satisfying some additional
properties, is a natural center-based objective. To this end, we define a universal center-based
objective and show that every universal center-based objective is a natural center-based objective.
Loosely speaking, a universal center-based objective is a center-based objective that satisfies
two properties, which we will discuss now:
• An arbitrary center-based objective is defined on a specific set of points X and can be used
to compute the cost of clustering only of the set X (given a metric d on X). In contrast, a
universal objective can be used to compute the cost of clustering of any ground
set X.
• Recall that in every optimal clustering with a center-based objective each point u ∈ X is
closer to the center of its own cluster than to the center of any other cluster. If a partition
is not optimal, some points might be closer to the centers of clusters that do not contain
them than to the centers of their own clusters. Then, we can move such points to other
clusters so as to minimize their distance to the cluster centers. In fact, one of the two
steps of Lloyd’s algorithm does exactly this; hence, we call such a transformation a Lloyd’s
improvement. We slightly strengthen the definition of a center-based objective by requiring
that a universal objective not increase when we make a Lloyd’s improvement of
any – not necessarily optimal – clustering.
Now we give a few auxiliary definitions and then formally define universal center-based objectives.
Since data sets used in applications are usually labeled, we will consider “labeled metric spaces”.
We will assume that the cost of clustering of X may depend on the distances between the points
in X and point labels (but not on the identities of points).
Definition 5.1 (Labeled Metric Space). A metric space labeled with a set of labels L is a pair
((X, d), l), where (X, d) is a metric space, and l : X → L is a function that assigns a label to each
point in X.
Definition 5.2 (Isomorphic Labeled Metric Spaces). We say that two metric spaces ((X ′ , d′ ), l′ )
and ((X ′′ , d′′ ), l′′ ) labeled with the same set L are isomorphic if there exists an isometry ϕ : X ′ → X ′′
(i.e., ϕ is a bijection that preserves distances: d′ (u, v) = d′′ (ϕ(u), ϕ(v)) for all u, v ∈ X ′ ) that
preserves labels; i.e. l′ (u) = l′′ (ϕ(u)) for all u ∈ X ′ .
8
We note that in the definition above the set L may be infinite. We denote the restriction of
((X, d), l) to a non-empty subset C ⊂ X by ((X, d), l)|C : ((X, d), l)|C = ((C, d|C ), l|C ). Note that
the restriction of a metric set labeled with L to a cluster C is also a metric set labeled with L.
Definition 5.3. Consider a clustering problem ((X, d), H, k) with a center-based objective. We say
that a clustering C1′ , . . . , Ck′ is a Lloyd’s improvement of a clustering C1 , . . . , Ck if there exists a set
of centers c1 , . . . , ck of C1 , . . . , Ck (i.e., each ci ∈ center(Ci , d)) such that
• ci ∈ Ci′ (a Lloyd’s improvement does not move the centers to other clusters)
• for every x ∈ X: if x ∈ Ci and x ∈ Cj′ , then d(x, cj ) ≤ d(x, ci ) (a Lloyd’s improvement may
move point x from Ci to Cj′ only if d(c, cj ) ≤ d(x, ci )).
Definition 5.4 (Universal Objective). We say that H is a universal center-based clustering objective for a label set L, if for every metric space ((X, d), l) labeled with L the problem ((X, d), Hl , k) is
a clustering problem with a separable center-based objective and the following two conditions hold.
1. Cluster scores Hl are universal (“can be used on any metric space”): Given any finite metric
space ((C, d), l) labeled with L, the function Hl (C, d) returns a real number – the cost of C;
and Hl′ (C ′ , d′ ) = Hl′′ (C ′′ , d′′ ) for any two isomorphic labeled metric spaces ((C ′ , d′ ), l′ ) and
((C ′′ , d′′ ), l′′ ).
2. If C1′ , . . . , Ck′ is a Lloyd’s improvement of C1 , . . . , Ck , then H(C1′ , . . . , Ck′ ; d) ≤ H(C1 , . . . , Ck ; d).
Note that every natural center-based objective is a universal objective. The label set is the set
of pairs (f, g), where f ∈ R is a real number; g is a nondecreasing function from R≥0 to R. Every
point x ∈ X is assigned the label l(x) = (fx , hx ). The score of a cluster C equals
X
gx (d(x, c)) ;
(9)
Hl (C, d) = min fc +
c∈C
x∈C
Hl (C, d) = min max fc , max gx (d(x, c) .
c∈C
x∈C
(10)
It is easy to see that Lloyd’s improvements may only decrease the cost of a clustering, since
the functions gx are non-decreasing. We now show that every clustering problem with universal
separable center-based objectives is a problem with natural center-based objectives.
Theorem 5.5. I. Let ((X, d), H, k) be a clustering problem with a universal center-based separable sum-objective. Then, the scoring function Hl can be represented as (9) for some nondecreasing functions fPand g such that the minimum is attained when c is a center of C; and thus
H(C1 , . . . , Ck ; d) = ki=1 Hl (Ci ; d|Ci ) is a natural center-based objective.
II. Let ((X, d), H, k) be a clustering problem with a universal center-based separable max-objective.
If the cost of any singleton cluster {x} equals 0, then the scoring function Hl can be represented as
(10) for some nondecreasing functions f and g such that the minimum is attained when c is a center
of C; ; and thus H(C1 , . . . , Ck ; d) = maxi∈{1,...,k} Hl (Ci ; d|Ci ) is a natural center-based objective.
Proof. I. For every label a ∈ L define two special labeled metric spaces Ma and Ma,a,r . The metric
space Ma is the metric space on a single point labeled with a; the metric space Ma,a,r is the metric
space on two points at distance r that are both labeled with a. Consider a point x ∈ X labeled
with a. Let fx = H(Ma ) and gx (r) = H(Ma,a,r ) − fx . We claim that the cost of any cluster C
equals
X
min fc +
gx (d(x, c)) ,
c∈C
x∈C\{c}
9
and the minimum is attained when c is a center of C. Consequently, equation (9) holds for functions
f˜c = fc − gc (0) and gx . To prove the claim, we construct a new metric space Cp′ for every p ∈ C.
The metric space Cp′ consists of all points of C and new points x′ , which are “duplicates” of points
x ∈ C \ {p}. We do not change distances between points in C and labels on the points from C.
We copy the label of each x to x′ ; i.e., we let l(x′ ) = l(x). We place x′ at the same location as the
point p. That is, we let d(x′ , y) = d(p, y) for all x, y ∈ C. Consider two clusterings of Cp′ . The first
clustering partitions Cp′ into the cluster C and singleton clusters {x′ } (there is a singleton cluster
for each x ∈ C \ {p}). The cost of each singleton cluster {x′ } equals fx , since {x′ } is isomorphic to
Ml(x) . Hence, the cost of the first clustering equals
X
Hl (C, d|C ) +
fx .
(11)
x∈C\{p}
The second clustering partitions C ′ into pairs of points {x, x′ } for each x ∈ C \{p} and the singleton
cluster {p}. The cost of each cluster {x, x′ } equals
H(Ma,a,d(x,x′ ) ) = gx (d(x, x′ )) + fx = gx (d(x, p)) + fx ,
since the cluster {x, x′ } is isomorphic to Ma,a,d(x,x′ ) . The cost of {p} equals fp . Hence, the cost of
the second clustering equals
X
fx + gx (d(x, c)) .
(12)
fp +
x∈C\{p}
x′
Note that the points x and
in each cluster {x, x′ } are symmetric, so we may assume that x′ is
the center of the cluster {x, x′ }. Observe that the first clustering is a Lloyd’s improvement of the
second clustering: To get the first clustering from the second clustering we move x from each cluster
{x, x′ } to the singleton cluster {p}. We are allowed to do that since d(x, p) = d(x, x′ ). Hence, the
cost of the second clustering is upper bounded by the cost of the first clustering. We have from (11)
and (12),
X
X
X
fx + gx (d(x, c)) −
fx = fp +
gx (d(x, c)).
(13)
Hl (C, d|C ) ≤ fp +
x∈C\{p}
x∈C\{p}
x∈C\{p}
On the other hand, if p is the center of C, then the second clustering is a Lloyd’s improvement of
the first one. Hence, (13) is an equality when p is the center of C.
It remains to show that functions gx are non-decreasing. We need to prove that for every
r1 ≥ r2 ≥ 0, gx (r1 ) ≥ gx (r2 ). We create a metric space on three points x′ , x′′ , x′′′ each having the
same label as x. Let d(x′ , x′′ ) = r1 , d(x′′ , x′′′ ) = r2 , d(x′ , x′′′ ) = r1 + r2 . The cost of clustering
{x′ , x′′ }, {x′′′ } equals 2fx + gx (r1 ); the cost of clustering {x′ }, {x′′ , x′′′ } equals 2fx + gx (r2 ). Since
r1 ≥ r2 , the second clustering is a Lloyd’s improvement of the first one. Hence, 2fx + gx (r2 ) ≤
2fx + gx (r1 ) and gx (r2 ) ≤ gx (r1 ). This completes the proof of part I. The proof of part II is
similar.
References
[1] Pranjal Awasthi, Avrim Blum, and Or Sheffet. Center-based clustering under perturbation
stability. Information Processing Letters, 112(1):49–54, 2012.
[2] Maria-Florina Balcan, Nika Haghtalab, and Colin White. Symmetric and asymmetric k-center
clustering under stability. In Proceedings of the International Colloquium on Automata, Languages, and Programming, 2016.
10
[3] Maria-Florina Balcan and Yingyu Liang. Clustering under perturbation resilience. SIAM Journal on Computing, 2016.
[4] Yonatan Bilu, Amit Daniely, Nati Linial, and Michael Saks. On the practically interesting
instances of maxcut. In Proceedings of the Symposium on Theoretical Aspects of Computer
Science, pages 526–537, 2013.
[5] Yonatan Bilu and Nathan Linial. Are stable instances easy?
Science, pages 332–341, 2010.
In Innovations in Computer
[6] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Bilu—Linial stable
instances of Max Cut and Minimum Multiway Cut. In Proceedings of the Symposium on Discrete
Algorithms, pages 890–906, 2014.
[7] Matúš Mihalák, Marcel Schöngens, Rastislav Šrámek, and Peter Widmayer. On the complexity
of the metric tsp under stability considerations. In SOFSEM 2011: Theory and Practice of
Computer Science, pages 382–393. Springer, 2011.
11
| 8cs.DS
|
(Preprint)
Control of a Bucket-Wheel for Surface Mining of Asteroids and
Small-Bodies
Ravi teja Nallapu,* Erik Asphaug,† and Jekan Thangavelautham‡
Near Earth Asteroids (NEAs) are thought to contain a wealth of resources,
including water, iron, titanium, nickel, platinum and silicates. Future space
missions that can exploit these resources by performing In-Situ Resource
Utilization (ISRU) gain substantial benefit in terms of range, payload capacity
and mission flexibility. Compared to the Moon or Mars, the milligravity on
some asteroids demands a fraction of the energy for digging and accessing
hydrated regolith just below the surface. However, asteroids and small-bodies,
because of their low gravity present a major challenge in landing, surface
excavation and resource capture. These challenges have resulted in adoption of a
“touch and go techniques”, like the upcoming Osiris-rex sample-return mission.
Previous asteroid excavation efforts have focused on discrete capture events (an
extension of sampling technology) or whole-asteroid capture and processing.
This paper analyzes the control of a bucket-wheel design for asteroid or smallbody excavation. Our study focuses on system design of two counter rotating
bucket-wheels that are attached to a hovering spacecraft. Regolith is excavated
and heated to 1000oC to extract water. The water in turn is electrolyzed to
produce hydrogen and oxygen for rocket fuel. We analyze control techniques to
maximize traction of the bucket-wheels on the asteroid surface and minimize
lift-off the surface, together with methods to dig deeper into the asteroid surface.
Our studies combine analytical models, with simulation and hardware testing.
For initial evaluation of material-spacecraft dynamics and mechanics, we
assume lunar-like regolith for bulk density, particle size and cohesion. Our early
studies point towards a promising pathway towards refinement of this
technology for demonstration aboard a future space mission.
INTRODUCTION
Asteroids are known to contain large reserves of water, iron, titanium, nickel, platinum, palladium and silicates1. In-Situ Resource Utilization (ISRU)2 aims at extracting these resources onsite, which if successful, can improve our current space exploration capabilities. While there has
been progress reported in ISRU research for applications on the lunar surfaces3 and Mars4, the
low-gravity environments on asteroids, on the other hand, presents additional challenges in performing ISRU5. One of the major challenges includes lift-off due to excavator thrusting off the
small body.
*
PhD Student, Space and Terrestrial Robotic Exploration Laboratory, Arizona State University, 781 E. Terrace Mall,
Tempe, AZ.
†
Professor and Ronald Greeley Chair of Planetary Science, Space and Terrestrial Robotic Exploration Laboratory,
Arizona State University, 781 E. Terrace Mall, Tempe, AZ
‡
Assistant Professor, Space and Terrestrial Robotic Exploration Laboratory, Arizona State University, 781 E. Terrace
Mall, Tempe, AZ
1
In this paper we focus on use of bucket-wheels to perform excavation. Bucket-wheels have
been identified as one of the best tools for excavation in low-gravity environments, beating out
bulldozers and front-loaders10,13. This paper addresses the problem of excavator lift-off which is
the predominant concern on very low-gravity environments; by considering a dual bucket wheel
excavator on the surface of Martian moon Phobos. Phobos as shown in Figure 1 has an escape
velocity of about 11.1 m/s. Hence if any of the excavation mechanisms experience a force that
can impart this speed, the mechanism would be thrown off the surface of Phobos.
Figure 1. Martian moon Phobos is a promising target for ISRU.
In this paper, we present a bucketwheel excavator system that has two counter rotating bucket
wheels, like RASSOR developed by NASA KSC6, and can apply the necessary vertical plunge
force. The counter rotation ensures that no horizontal velocities are imparted, and the vertical
plungers ensure the compensation for lift-off due to any reactive-excavation forces.
The paper starts with introduction to the bucket-wheel system design followed by optimization of
its size, operating parameters and power source 7,8. We then present dynamical and control models of the system and a simulation of the proposed mechanism, followed by preliminary results
and conclusions.
BUCKET WHEEL SYSTEM DESIGN
The design of a bucketwheel is a multi-disciplinary problem. Several forces, geometry, and
performance requirements are considered. To understand the role of an excavator, a diagram of
the full ISRU system is shown in Figure 2.
The excavation system is powered by solar insolation. The solar panels generate the power
based on the incident radiation, which is used to charge an onboard system battery that powers
various subsystems.
The ISRU unit is tasked with excavating regolith, extracting water by heating regolith and
electrolyzing hydrogen and oxygen from the water. The hydrogen and oxygen would be used as
propellant for rockets on their journey to earth or to power fuel cells power supplies during
eclipse14,15,16.
A design of a bucket-wheel and ISRU system was provided by Nallapu et al.8 (Figure 3)
where the geometric parameters of the bucket wheel, including number of buckets and their dimensions were obtained by constraining the total operating power to 10 kW.
2
Figure 2. Systems diagram for the proposed ISRU system
Figure 3. Proposed excavator with counter rotating bucket wheels
This proposed unit consists of 2 counter rotating bucket-wheels that cancel out horizontal motion. The unit is also capable of compensating for any lift-off vertical forces by exerting a radial
thrust as shown in Figure 3.
SYSTEM DYNAMICS
Excavation dynamics
Consider a bucket wheel excavator, plunging the bucket into the regolith as shown in Figure 4.
Let the wheel be applied torque, τ, and be spinning with a speed, ω. During the excavation, the
wheel experiences the resistive forces from the regolith, Freg, normal to the cutting surface. Let
Fsup, a force applied to counter-act any lift-off experienced.
3
Figure 4. Excavation modelling
The resistive regolith forces are modeled based on a Luth-Wismer model9. The Luth-Wismer
model separates the regolith forces as a non-cohesive force (sand) and pure cohesive (clay) forces. Skonieczny et al.10 formulates these forces as:
(1)
and,
(2)
The force acts normal to the cutting surface, and the total force is given by:
(3)
Equations of motion
This method of separating the forces along the horizontal and vertical axis is similar in procedure
used by Park11 and Xiao et al.12. The equations of motion for the system shown in Figure 3 are
therefore given by:
(4)
(5)
(6)
(7)
(8)
(9)
where F1 and F2 are the forces applied to counteract any lift-off forces on wheels 1 and 2 respectively. The forces Fr1 and Fr2 are the resistive forces on regolith acting on wheels 1 and 2 respec-
4
tively, and whose magnitude is calculated by Equation 3. Additionally, a random disturbance
force in the range [0, Freg/2] was added to the magnitudes of Fr1 and Fr2 to account for any unmodeled dynamics. Finally, τ1 and τ2 represent the control torques exerted on the wheels 1 and 2
respectively.
SIMULATION
The design of the wheel as mentioned earlier was to maintain the total operational power under 10 kW. This required that the wheels’ spin at about 3 RPM8, which is the value of ωdes in
Equations 11 and 12. Additionally, the translator motion needs to be confined vertically downwards, and no horizontal motion was desired. To realize this, a proportional-derivative (PD) controller was applied to the vertical forces, and wheel torques as given by Equations 10-12. The
control law given by Equation 10 is only applied when y>0. The gains Ky, Kvy, K1, K2, and Kx are
chosen by repetitively running simulations and picking the values that give satisfactory performance.
(10)
(11)
(12)
Equations 4 through 5 were propagated with an ODE4513 solver in MATLAB with the following
parameters shown in Table 1.
Table 1. Simulation Parameters.
Simulation Parameter
# Wheels
Value
2
# Buckets per wheel
24
Mass of wheel (kg)
5
D (m)
0.622
W (m)
6.31E-02
β1 (degrees)
10
β2(degrees)
-10
V (m/s)
0.12
3
1880
p (kg/m )
2
g (m/s )
0.0057
c (Pa)
147
Specific heat of the material (J/[Kg-Celsius])
1,430
Surface temperature of the material (Celsius)
200
5
Water extraction temperature (Celsius)
1,000
Water content in the regolith (%)
10
Kx
1
Ky
0.9
Kvy
90,000
K1
4,000
K2
4,000
RESULTS
This section presents the results of simulations described above. These simulations were run for a
time length of 100 seconds with a step length of 0.1 seconds.
Excavator Displacement
The displacement response of the excavator is shown in Figure 5. As seen here, the displacement
is confined to the negative y direction, while the counter rotating wheels ensure that there is no
horizontal displacement.
Figure 5. Target position of bucket-wheel
Angular Velocity Response
Angular velocity response of the 2 bucket wheels are shown in Figure 6. As seen here the 2
wheels reach the desired speed of 3.3 RPM almost instantly while rotating in opposite directions.
6
Figure 6. Angular velocity response
Wheel Motion
The rotations of the two bucket wheels are shown in Figure 7. As expected, their magnitudes are
equal in opposite directions because of the counter rotations of the wheel.
Figure 7. Wheel rotations
CONCLUSIONS
In this paper, we present the significance of ISRU in extracting resources from small-bodies
such as Martian moon Phobos. Phobos is strategic location and a potential base-camp for a future
human mission to Mars. This paper identifies one of the principle challenges of ISRU, namely
lift-off of the excavation system in low-gravity environments such as Phobos. A dynamics and
control model of a 10 kW excavator and ISRU system is presented, and its equations of motion
are then propagated with computer simulations. The simulations show the proposed bucket-wheel
excavator can indeed be stable on an asteroid surface, and is not susceptible to liftoff forces. Further work will be required in testing algorithms in a relevant environment and in identifying the
required sensors and actuators to maintain a steady-pace of excavation on the surface of the
small-body.
7
REFERENCES
1
W. F. Bottke, Asteroids III, University of Arizona Press, Tucson, Arizona 2002.
2
K. Zacny, P. Chu, G. Paulsen, et al. 'Mobile in-Situ Water Extractor (MISWE) for Mars, Moon, and Asteroids in Situ
Resource Utilization', AIAA SPACE Conference, 2012.
3
P. Mueller, and R. H. King. 'Trade Study of Excavation Tools and Equipment for Lunar Outpost Development and
ISRU', Space Technology and Applications International Forum (STAIF 2008), vol. 969, 2008, pp. 237-244.
4
G. B. Sanders, A. Paz, L. Oryshchyn, et al. 'Mars ISRU for Production of Mission Critical Consumables – Options,
Recent Studies, and Current State of the Art', AIAA SPACE 2015 Conference and Exposition, 2015.
5
A. Probst, G. Peytavi, B. Eissfeller, et al. 'Mission Concept Selection for an Asteroid Mining Mission', Aircraft Engineering and Aerospace Technology, vol. 88, no. 3, 2016, pp. 458-470.
6
R. Mueller, R. E. Cox, T. Ebert, et al. 'Regolith Advanced Surface Systems Operations Robot (RASSOR)', 2013 IEEE
Aerospace Conference, 2013, pp. 1-12.
7
T. Nakamura, and B. K. Smith. 'Solar Thermal System for Lunar ISRU Applications: Development and Field Operation at Mauna Kea, HI', Proceedings of SPIE, vol. 8124, no. 1, 2011.
8
R. T. Nallapu, A. Thoesen, L. Garvie, E. Asphaug, J. Thangavelautham. “Optimized Bucket Wheel Design for Asteroid Excavation,” International Astronautic Congress, 2016, Guadalajara, Mexico, IAF.
9
H.J. Luth and R.D. Wismer, 'Performance of Plane Soil Cutting Blades in Sand’. Journal of Terramechanics, vol. 9,
no. 4, 1973, pp. 67-67.
10
K. Skonieczny,. 'Lightweight Robotic Excavation', PhD Thesis, Carnegie Mellon University, 2013.
11
B. Park. 'Development of a Virtual Reality Excavator Simulator: A Mathematical Model of Excavator Digging and a
Calculation Methodology', 2002.
12
Thangavelautham, J., Abu El Samid, N., Grouchy, P., Earon E., Fu, T., Nagrani, N., D'Eleuterio, G.M.T., “Evolving
Multirobot Excavation Controllers and Choice of Platforms Using Artificial Neural Tissue Controllers,” Proceedings of
the IEEE Symposium on Computational Intelligence for Robotics and Automation, 2009, DOI:
10.1109/CIRA.2009.542319
13
J. Thangavelautham, K. Law, T. Fu, N. Abu El Samid, A. Smith, G. M.T. D’Eleuterio, “Autonomous Multirobot
Excavation for Lunar Applications,” Robotica, pp. 1-39, 2017.
14
J. Thangavelautham and S. Dubowsky, “On the Catalytic Degradation in Fuel Cell Power Supplies for Long-Life
Mobile Field Sensors.” Journal of Fuel Cells: Fundamental to Systems, pp. 181-195, 2013.
15
P. Iora, J. Thangavelautham, “Design of a mobile PEM power backup system through detailed dynamic and control
analysis,” International Journal of Hydrogen Energy, vol. 37, no. 22, pp. 17191–17202, 2012.
16
J. Thangavelautham, D. Strawser, M. Cheung, S. Dubowsky, “Lithium Hydride Powered PEM Fuel Cells for LongDuration Small Mobile Robotic Missions,” IEEE International Conference on Robotics and Automation (ICRA), St.
Paul, Minnesota, 2012.
8
| 3cs.SY
|
Opinion dynamics in social networks with stubborn agents: An
issue-based perspective ?
Ye Tian a , Long Wang b,∗
arXiv:1609.03465v2 [cs.SY] 13 Aug 2017
a
Center for Complex Systems, School of Mechano-electronic Engineering, Xidian University, Xi’an 710071, P. R. China
b
Center for Systems and Control, College of Engineering, Peking University, Beijing 100871, P. R. China
Abstract
Classic models on opinion dynamics usually focus on a group of agents forming their opinions interactively over a single issue. Yet
generally agreement can not be achieved over a single issue when agents are not completely open to interpersonal influence. In this paper,
opinion formation in social networks with stubborn agents is considered over issue sequences. The social network with stubborn agents
is described by the Friedkin-Johnsen (F-J) model where agents are stubborn to their initial opinions. Firstly, we propose a sufficient and
necessary condition in terms of network topology for convergence of the F-J model over a single issue. Secondly, opinion formation of
the F-J model is investigated over issue sequences. Our analysis establishes connections between the interpersonal influence network and
the network describing the relationship of agents’ initial opinions for successive issues. Taking advantage of these connections, we derive
the sufficient and necessary condition for the F-J model to achieve opinion consensus and form clusters over issue sequences, respectively.
Finally, we consider a more general scenario where each agent has bounded confidence in forming its initial opinion. By analyzing the
evolution of agents’ ultimate opinions for each issue over issue sequences, we prove that the connectivity of the state-dependent network
is preserved in this setting. Then the conditions for agents to achieve opinion consensus over issue sequences are established. Simulation
examples are provided to illustrate the effectiveness of our theoretical results.
Key words: Opinion dynamics, issue sequences, path-dependence, convergence, confidence bound
1
Introduction
Recently, opinion dynamics has attracted much attention
of researchers from various disciplines, such as applied
mathematics, economics, social psychology, control theory, etc., due to its broad applications in modeling and
explaining complex phenomena in social and artificial networks (Degroot, 1974; Lamport et al., 1982; Hegselmann
& Krause, 2002; Acemoglu et al., 2010; Frasca et al.,
2015; Ravazzi et al., 2015). In a social network, agents
form opinions on various political, economic and social
issues according to the information they received from
neighbors determined by the network topology (Jadbabaie
et al., 2003; Olfati-Saber & Murray, 2004; Ren & Beard,
2005) or the confidence/influence bound (Blondel et al.,
2009; Mirtabatabaei & Bullo, 2012; Jing et al., 2016). A
fundamental question in opinion dynamics is: how do the
? This work was supported by National Science Foundation of
China (Grant Nos. 61533001 and 61375120) and the Fundamental
Research Funds for the Central University (Grant No. JBZ170401).
∗ Corresponding author : Long Wang
Email addresses: tinybeta7.1@gmail.com (Ye Tian),
longwang@pku.edu.cn (Long Wang).
Preprint submitted to Automatica
network structure and opinions’ initial distribution influence
the diffusion and aggregation of scattered opinions in the
process of opinion formation? In Degroot (1974), a model
is presented to characterize the process of a group of agents
reaching opinion consensus on a common issue by pooling
their subjective opinions, which is known as the Degroot
model. The interactions between agents are described by
a stochastic matrix which can be regarded as the one-step
transition probability matrix of a Markov chain and some
sufficient conditions for achieving opinion consensus are
provided. To further investigate how the interpersonal influence contributes to the opinion formation, the work in
Friedkin & Johnsen (1999) extends the Degroot model by
introducing a diagonal matrix which represents agents’
susceptibilities to interpersonal influence. In the Degroot
model and the Friedkin-Johnsen (F-J) model, interactions
between agents are specified by given networks. Different
from these linear models, in Hegselmann & Krause (2002),
the authors present a nonlinear model in which agents have
bounded confidence for others. In the Hegselmann-Krause
(H-K) model, two agents are said to be connected if and
only if the difference between their opinions is smaller than
a given confidence bound, which means that the network
topology of the H-K model is state-dependent.
15 August 2017
about convergence of the F-J model over a single issue
usually require that the interpersonal influence network is
undirected and connected or its adjacent matrix is strictly
row-substochastic (Ghaderi & Srikant, 2014; Mirtabatabaei
et al., 2014). We propose a milder sufficient and necessary
condition in terms of network topology to guarantee that
opinions of agents converge to constant values. Several
properties of agents’ ultimate opinions for a single issue are
provided. Secondly, we study opinion formation of the F-J
model over a sequence of interdependent issues inspired
by the path-dependence theory (North, 1990; Page, 2006;
MacKay et al., 2006; Egidi & Narduzzo, 1997). By virtue
of the inherent coherence between basic assumption of
the F-J model and the path-dependence theory, we assume
that the factor of each agent’s cognitive inertia over two
interdependent issues equals to its stubborn factor. Then,
each agent will form its initial opinion for the next issue
by making a tradeoff between its initial opinion for the last
interdependent issue and other agents’ initial opinions for
the next issue. The connections between the interpersonal
influence network and the network which characterizes
the relationship of agents’ initial opinions for successive
issues are established, and the sufficient and necessary condition for the F-J model to achieve opinion consensus or
form clusters over issue sequences is proposed. Finally, we
consider the more general case in which an information
assimilation mechanism is employed to weaken agents’ interpersonal influence. We assume that each agent maintains
a confidence bound in forming its initial opinions. This
assumption is consistent with the reported echo-chamber
effect (Sunstein, 2012; Dandekar et al., 2013), i.e., people
usually assimilate information in a selective way: they tend
to give considerable weight to the information supporting
their initial opinions, and dismiss the undermining information meanwhile. Connectivity preservation of the modified
F-J model is analyzed. Then we derive the conditions for
achieving opinion consensus. The main difficulties for our
analysis are twofold. On one hand, the evolution of agents’
initial opinions over issue sequences is not directly determined by the interpersonal influence network and agents’
stubborn extent, which increases complexity of our analysis from the graphical perspective. On the other hand,
due to the fact that the evolution of agents’ initial opinions over issue sequences is influenced by the evolution of
their opinions over time sequences, connectivity preservation of the modified F-J model is more complex compared
with connectivity preservation of the H-K model. As has
been widely reported (Ghaderi & Srikant, 2014; Frasca et
al., 2015; Friedkin, 2015), a social network with stubborn
agents does not generally achieve consensus over a single
issue. Our investigation shows that opinions of a group of
individuals can achieve consensus over each path-dependent
issue sequence 1 , even if agents are stubborn to their initial
opinions. Simply put, repeatedly arising or interdependent
As the research in multi-agent systems continues, the
tools that are available within opinion dynamics have been
enriched considerably. The Degroot model is further investigated both on continuous-time dynamics and switched
topologies (Jadbabaie et al., 2003; Olfati-Saber & Murray,
2004; Ren & Beard, 2005). In addition, many complex scenarios are also considered, including asynchronous consensus (Xiao & Wang, 2008), time delays (Wang & Xiao,
2007), finite-time consensus (Wang & Xiao, 2010), leaderfollowing framework (Liu et al., 2012; Ma et al., 2016), heterogeneous model (Zheng & Wang, 2014) and antagonistic
interactions (Altafini, 2013), to name but a few. Based on the
gossip algorithm (Boyd et al., 2006), randomized opinion
dynamics is investigated in Acemoglu et al. (2010), Ravazzi
et al. (2015), Frasca et al. (2015) and Li et al. (2013), respectively. In Ghaderi & Srikant (2014), the equilibrium and
convergence rate of the F-J model are investigated. Under the
assumption that the adjacent matrix of the interpersonal influence network is an irreducible sub-stochastic matrix with
the row sum of at least one row strictly smaller than one,
the authors transform the F-J model to a random walk, and
the form of equilibrium is proposed based on the first hitting
probabilities of the random walk. In Bindel et al. (2011),
the F-J model is interpreted as a best-response game, and
the ratio between the optimal solution and the Nash equilibrium solution, which is defined as the price of anarchy, is
discussed under both undirected and directed networks.
Most of the available literature on the F-J model focuses
on opinion evolving over a single issue. Yet the F-J model
does not in general converge to consensus over a single issue
due to the presence of stubborn agents. Actually, the empirical evidence shows that consensus may be reached over a sequence of issues (Joshi et al., 2010). In practice, associations
of individuals (such as small groups within firms, deliberative bodies of government, etc.) are usually constituted to
deal with issues within particular issue domains which consist of deeply interdependent issues, especially repeatedly
arising issues. In this scenario, individuals’ opinions for interdependent issues are always correlated. Thus, extending
the existing theories of opinion dynamics to issue sequences
is necessary and can uncover the underlying mechanism of
opinion formation in the real world. Mirtabatabaei et al.
(2014) and Jia et al. (2015) modify the F-J model and the
Degroot model to investigate the evolution of agents’ selfappraisals over an issue sequence, respectively. In Parsegov
et al. (2017), the authors present a multidimensional extension of the F-J model in which agents’ opinions for several
interdependent issues evolve over time sequences.
Different from the works which focus on agents’ selfappraisal dynamics (Mirtabatabaei et al., 2014; Jia et al.,
2015) over sequences of independent issues, or evolution
of agents’ opinions for multiple interdependent but unordered issues over time sequences (Parsegov et al., 2017),
we consider the opinion formation of the F-J model which
evolves over both interdependent issue sequences and time
sequences in this paper. Firstly, convergence of the F-J
model is studied over a single issue. The existing results
1
In the sequel, we say that an issue sequence is path-dependent
or has the property of path-dependence if individual’s opinions
over it have the path-dependent property. A detailed explanation
of path dependence will be presented below.
2
ei j ∈ E means w ji , 0, otherwise, w ji = 0. A directed path of
length m+1 from i to j is a finite ordered sequence of distinct
vertices of G with the form i, k1 , k2 , · · · , km , j. Particularly, if
i = j, the directed path is called a cycle of i( j). The directed
graph G is said to be strongly connected if between every
pair of distinct vertices i, j, there exists a directed path that
begins at i and ends at j. A maximal subgraph of G that is
strongly connected forms a strongly connected component
(SCC). In an SCC of digraph G, if there exists a vertex
which has parents belonging to other SCCs, we say that
the in-degree of this SCC is nonzero, otherwise, we call it
an independent strongly connected component (ISCC). The
directed graph G is said to have a spanning tree if there exists
a vertex that is called the root which has a directed path to
every other vertex. The directed graph G is said to contain
a star subgraph if there exists a vertex that is called the
center vertex which has directed edges to any other vertices.
An undirected graph is a digraph G(W) which satisfies that
wi j = w ji for any i, j ∈ V. For more details about algebraic
graph theory, we refer to Godsil & Royal (2001).
issues lead to consensus. Our study also provides a theoretical explanation for the cohort effect (Joshi et al., 2010).
Moreover, the evolution of opinions over issue sequences
enhances the connectivity of the social network. As long as
one of the partially stubborn agent’s opinions can scatter
to all the rest partially stubborn agents through partially
stubborn or non-stubborn agents, opinion consensus can be
reached, and all the partially stubborn agents form a star
subgraph in the network which characterizes the relationship of agents’ initial opinions for successive issues. The
differences between opinion dynamics over issue sequences
and a single issue give us a deeper understanding of opinion
formation in social networks.
The rest of this paper is organized as follows. In Section
2, we introduce some notions on graph theory and the F-J
model. In Section 3, convergence of the F-J model is studied
over a single issue, and some properties of ultimate opinions are proposed. In Section 4, opinion formation of the F-J
model is investigated over issue sequences. In Section 5, we
consider opinion formation of the F-J model over issue sequences with bounded confidence. In Section 6, numerical
simulations are given to illustrate the effectiveness of theoretical results. Some conclusions are drawn in Section 7.
2.2
The F-J model presented in Friedkin & Johnsen (1999)
sheds light on the relationship between interpersonal influence and opinion change in social networks. The F-J model
is a generalization of the Degroot model (Degroot, 1974).
It introduces a positive diagonal matrix to quantify the extent of each member of the group open to the interpersonal
influence.
Notation: Denote the set of real numbers, natural numbers, n-dimensional real vector space and n × n real square
matrix space by R, N, Rn and Rn×n , respectively. 1n is a vector of size n having all the elements equal 1. In is the n × n
identity matrix. For a given vector or matrix A, AT denotes
its transpose, kAk∞ denotes its maximum row sum norm. 0
denotes an all-zero vector or matrix with compatible dimension. ρ(A) denotes the spectral radius for a matrix A ∈ Rn×n .
By | · | we denote the absolute value, modulus and cardinality of real number, complex number and set, respectively.
Given a vector ζ ∈ Rn and a matrix sequence {Ak }m
k=1 with
Ak ∈ Rn×n , diag(ζ) denotes an n×n diagonal matrix whose diagonal elements are the elements of ζ, diag(A1 , A2 , . . . , Am )
denotes an nm × nm block diagonal matrix with Ak being its
block on diagonal.
2
Consider n agents forming opinions on a certain issue
in a network formulated by a weighted digraph G(W) =
(V, E, W). Each agent holds an initial opinion xi (0), i ∈ V.
The classic F-J model is:
x(k + 1) = ΞW x(k) + (I − Ξ)x(0),
(1)
where x(k) = (x1 (k), x2 (k), . . . , xn (k))T ∈ Rn is a vector representing the stack of opinions with k ∈ N being the scale of
time, W is a stochastic weighted adjacency matrix characterizing the structure of the interpersonal influence network,
Ξ = diag(ξ) is the diagonal matrix mentioned above with
ξ = (ξ1 , ξ2 , . . . , ξn )T ∈ Rn satisfying ξi ∈ [0, 1]. ξi represents
the susceptibility of agent i to interpersonal influence while
1 − ξi quantifies the extent to which agent i is stubborn to
its initial opinion. Here, xi (0) can be regarded as the internal opinions of agent i for the issue (Bindel et al., 2011).
Note that if ξ = 1n , the F-J model collapses to the Degroot
model. However, different from the Degroot model in which
disagreement is mainly the consequence of lack of communication, it is more likely the result of the presence of stubborn agents anchored to their own initial opinions in the F-J
model. This is coincident with the empirical evidence that
failing in reaching agreement usually owes to the stubbornness of individuals in practice, rather than the insufficiency
of persistent contracts and interactions (Friedkin & Johnsen,
1999; Friedkin, 2011; Frasca et al., 2015).
Preliminaries
In this section, some basic concepts on graph theory are
introduced. Then, a brief introduction of the F-J model is
presented.
2.1
Introduction of the F-J model
Basic concepts on graph theory
A weighted directed graph (digraph) G of order n is a
triple G(W) = (V, E, W) which consists of a vertex set V =
{1, 2, . . . , n}, an edge set E = {ei j : i, j ∈ V} and a weighted
adjacency matrix W = [wi j ]n×n with entries wi j . An edge ei j
is an ordered pair (i, j) which means that node j can obtain
information from node i, but not necessarily vice versa. i is
called the parent of j if (i, j) ∈ E. The adjacency elements
associated with the edges of the graph are nonzero, i.e.,
3
As mentioned above, if Ξ = I in equation (1), the F-J
model is transformed into the Degroot model:
model is convergent if and only if 1 is the only maximummodulus eigenvalue of W.
x(k + 1) = W x(k),
For two positive integers, we say they are coprime if and
only if their greatest common divisor is 1. For agent i, if
ξi < 1, we say it is a stubborn agent, otherwise, we say it is
a non-stubborn agent. In Golub & Jackson (2010), the authors prove that the Degroot model (2) is convergent if and
only if each ISCC of G(W) is aperiodic from the perspective
of Markov chain corresponding to W. In Friedkin (2015),
convergence of the F-J model requires that the lengths of
all cycles of G(ΞW) are coprime. In the next theorem, we
propose a graph-theoretical condition for the F-J model to
achieve convergence by virtue of properties of irreducible
and primitive matrix’s eigenvalue. Different from the Degroot model (2), convergence of the F-J model only depends
on the ISCC composed of non-stubborn agents in G(W).
Before proposing our convergence condition, we need the
following lemmas in Horn & Johnson (2012).
(2)
where W is a stochastic matrix. On the other hand, consider
the augmented system of the F-J model (1). Let x̂(k) =
[x(0)T x(k)T ]T , we have
x̂(k + 1) = Ŵ x̂(k),
(3)
where
In×n
Ŵ =
(I − Ξ)
0
.
ΞW
From equation (3), the F-J model is equivalent to the leaderfollowing structure (Liu et al., 2012) where agents’ initial
opinion are virtualized as stationary leaders.
3
Lemma 2 Let A ∈ Rn×n be irreducible and suppose that
λ ∈ R is not in the interior of any Ger s̆gorin disc of A. If
some Ger s̆gorin circle of A does not pass through λ, then λ
is not an eigenvalue of A.
Convergence of the F-J model over a single issue
A fundamental problem with respect to the F-J model is
its limiting behavior when the time scale k tends to infinity.
In this subsection, convergence of the F-J model is considered over a single issue. A sufficient and necessary condition
on the regularity of ΞW for convergence of the F-J model
is presented in Parsegov et al. (2017). Here we give a sufficient and necessary condition from the perspective of the interpersonal influence network G(W) which ensure that x(k)
converges to a constant vector as k → ∞. Firstly, we propose
the definition of the convergence of dynamic systems.
Lemma 3 Let A ∈ Rn×n be irreducible and nonnegative,
and let P1 , P2 , . . . , Pn be the vertices of the directed graph
G(A). Let Li = {l1i , l2i , . . .} be the set of lengths of all cycles
of Pi in G(A), Let γi be the greatest common divisor of all
the lengths in Li . Then A is primitive if and only if γ1 = γ2 =
· · · = γn = 1.
Remark 1 Note that the condition in Lemma 3 is consistent with the definition of aperiodicity (Definition 2 in Golub
& Jackson (2010)). For a nonnegative and irreducible matrix, aperiodicity ensures that it does not have any periodic
eigenvalues, that is , it is primitive. Thus, aperiodicity is a
graph-theoretical criterion for primitivity. By the virtue of
aperiodicity, we provide a sufficient and necessary condition
concerning on the interpersonal influence network G(W) for
the F-J model to achieve convergence in the next theorem.
Definition 1 For a dynamic system with state vector `(k) ∈
Rn , k ∈ N, if for any initial state `(0), there exists a constant
vector `ˆ ∈ Rn , such taht
ˆ
lim `(k) = `,
k→∞
we say the system is convergent.
Lemma 1 The F-J model (1) is convergent if and only if 1
is the only maximum-modulus eigenvalue of ΞW.
Assumption 1 For each ISCC of G(W) which only consists
of more than one non-stubborn agent, there exists at least
one agent having two cycles which are coprime in length.
Lemma 1 naturally follows from Corollary 2 and Lemma
5 in Parsegov et al. (2017). In Lemma 1, that 1 is the only
maximum-modulus eigenvalue of ΞW means ΞW has no
other maximum-modulus eigenvalues except 1, here the algebraic multiplicity of eigenvalue 1 may be larger than one.
In other words, suppose λ is an eigenvalue of ΞW, then
|λ| = 1 implies λ = 1. Otherwise, let a + bi , 1 be an eigenb
value of ΞW with |a+bi| = 1. We have a+bi = ei arctan a = eiθ ,
where θ ∈ [−π, π] is the principal value of the argument of
a + bi. Thus, (a + bi)k = eiθk , which shows that (a + bi)k is periodic. Suppose that J is the Jordan canonical form of ΞW,
then J k is periodic, which indicates that system (1) is nonconvergent. Let Ξ = I, one can readily get that the Degroot
Assumption 1 means that all ISCCs of G(W) consisting of
only non-stubborn agents are aperiodic. This condition is
milder than condition for convergence of the Degoot model
(2) which requires that all ISCC of G(W) are aperiodic
(Golub & Jackson, 2010).
Theorem 1 The F-J model (1) achieves convergence if and
only if Assumption 1 holds.
Proof. Suppose that G(W) has α SCCs with α ≤ n. Because
W is reducible, then there exists a permutation matrix P such
4
Since system (1) is convergent under Assumption 1, the limit
of Ψ(k) exists. Let Ψ = limk→∞ Ψ(k).
that
W1 × · · · ×
W
·
·
·
×
2
T
W̃ = P WP =
. . .. ,
. .
Wα
Property 1 Ψ is a stochastic matrix.
0
Proof. Firstly, we show that Ψ(k) is stochastic for any k ∈ N
inductively. Note that ΞW and I − Ξ are both nonnegative,
thus Ψ(k) is nonnegative. From equation (5), we have Ψ(0) =
I and Ψ(1) = ΞW + I − Ξ are both stochastic. Now suppose
that Ψ(l) is a stochastic matrix, we have
where Wi , i ∈ {1, 2, . . . , α} is the irreducible adjacent matrix corresponding to each SCC of G(W) (Brualdi & Ryser,
1991).
Let Ξ̃ = PT ΞP = diag(Ξ1 , Ξ2 , . . . , Ξα ), then we have
ΞW = PΞ̃W̃PT . If there exists ξ j = 0 which is a diagonal
element of Ξi , then G(Wi ) is separated into a vertex j which
corresponds to a row of Ξi Wi with all elements being zero
and several SCCs with nonzero in-degrees in G(Ξi Wi ). Otherwise, if G(Wi ) has nonzero in-degree, or G(Wi ) is an ISCC
but contains at least one stubborn agent, Ξi Wi is a irreducible
matrix which satisfies kΞi Wi k∞ ≤ 1 and contains at least one
row whose row sum is strictly smaller than 1. From Lemma
2, we obtain ρ(Ξi Wi ) < 1. If G(Wi ) is an ISCC and contains
no stubborn agent, i.e., Ξi Wi = Wi is an irreducible stochastic matrix, then 1 is its only maximum-modulus eigenvalue
if and only if Wi is primitive. In this case, if G(Wi ) contains
only one non-stubborn agent i, then the eigenvalue of Wi is
1. Otherwise, by Lemma 3, 1 is the only eigenvalue of Wi
that has maximum modulus if and only if there exists at least
one agent in G(Wi ) which has at least two cycles with coprime length. In conclusion, 1 is the only eigenvalue of ΞW
with maximum-modulus if and only if Assumption 1 holds.
By Lemma 1, the F-J model (1) achieves convergence if and
only if Assumption 1 holds.
Ψ(l + 1)1n = ((ΞW)l+1 +
= ((ΞW)l ΞW +
= ((ΞW)l (ΞW + I − Ξ) +
l−1
X
(ΞW)t (I − Ξ))1n
t=0
l−1
X
= (ΞW)l Ψ(1)1n +
(ΞW)t (I − Ξ)1n .
t=0
l
l
Since Ψ(1) is stochastic, we have (ΞW)
Pl−1Ψ(1)1nt = (ΞW) 1n .
l
Therefore, Ψ(l + 1)1n = ((ΞW) ΞW + t=0 (ΞW) (I − Ξ))1n =
Ψ(l)1n = 1n , which implies that Ψ(k) is stochastic for any
k ∈ N. Moreover, since Ψ1n = limk→∞ Ψ(k)1n = 1n , we
obtain that Ψ is a stochastic matrix.
Property 1 shows that each agent’s opinion converges to
a convex combination of all agents’ initial opinions. Let
x∗ = limk→∞ x(k). Denote the set of fully stubborn agents
by V f = {i ∈ V|ξi = 0}, the set of partially stubborn agents
by V p = {i ∈ V|0 < ξi < 1} and the set of non-stubborn
agents by Vn = {i ∈ V|ξi = 1}. Without loss of generality,
let V f = {1, 2, . . . , r1 }, V p = {r1 + 1, r1 + 2, . . . , r1 + r2 }, Vn =
{r1 + r2 + 1, r1 + r2 + 2, . . . , n}. Let Ψ = [ψ1 , ψ2 , . . . , ψn ],
where ψi ∈ Rn . The following property reveals the influence
of the interpersonal influence network G(W) and the levels
of stubbornness of agents to the ultimate opinion x∗ .
Property 2 Under
Assumption 1, for any i ∈ Vn , if there
S
exists j ∈ V f V p which has a directed path to agent i in
graph G(W), then ψi = 0.
Proof. Following equation (5), we obtain
Ψ(k + 1) − Ψ(k)
k
k−1
X
X
k+1
t
k
=(ΞW) +
(ΞW) (I − Ξ) − (ΞW) +
(ΞW)t (I − Ξ)
t=0
t=0
(4)
=(ΞW)
k+1
− (ΞW) + (ΞW) (I − Ξ)
k
k
=(ΞW)k Ξ(W − I).
where
k−1
X
(ΞW)t (I − Ξ) + (ΞW)l (I − Ξ))1n
t=0
Next, we shall further analyze the ultimate opinion of
system (1). Employing equation (1) iteratively, we have
Ψ(k) = (ΞW)k +
(ΞW)t (I − Ξ))1n
t=0
l−1
X
Remark 2 In the available literature, convergence of the
F-J model over a single issue usually requires that G(W)
is undirected connected or every ISCC of G(W) contains
at least one stubborn agent (Mirtabatabaei et al., 2014;
Ghaderi & Srikant, 2014). Theorem 1 shows that the convergence is achieved under the milder condition which ensures
condition in Lemma 1. The proof of Theorem 1 also implies
that each ISCC consisting of non-stubborn agents achieves
consensus as the F-J model converges. Note that from Theorem 1, that each ISCC consisting of non-stubborn agents
of G(W) has at least one agent containing self-loop is a sufficient but not necessary condition for convergence of the
F-J model. However, if G(W) is undirected, the F-J model
achieve convergence if and only if each ISCC consisting of
non-stubborn agents has at least one agent containing selfloop in G(W). The proof directly follows from Theorem 1.
x(k) = Ψ(k)x(0),
l
X
(ΞW)t (I − Ξ).
(5)
From the proof of Theorem 1, limk→∞ (ΞW)k exists. More-
t=0
5
over, since limk→∞ Ψ(k) = Ψ , we have
lim (ΞW)k Ξ(W − I) = lim (ΞW)k (I − Ξ) = 0.
k→∞
k→∞
represents the proportion of the initial opinion of agent i in
each agent’s ultimate opinion. Property 2 suggests that if a
non-stubborn agent wants to determine the group’s ultimate
opinion, i.e., to be a leader, it must ensure that it is not influenced by stubborn agents. If we regard initial opinions of
stubborn agents as external information, then this result is
consistent with the experimental results in Dyer et al. (2009)
and Couzin et al. (2005) that the leaders emerging spontaneously in groups are usually the individuals who have more
power in communication or external information. Furthermore, for any individual who has no external information, it
can never be a leader unless it does not receive information
of the individuals who have external information.
(6)
Let limk→∞ (ΞW)k = Q = [q1 , q2 , . . . , qn ] = [qi j ]n×n with
qi ∈ Rn , from equation (6) we obtain
(
QΞ = Q
QW = Q.
S
Because QΞ = Q, we have qi = 0 for any i ∈ VS
V p . It
f
follows
from
QW
=
Q
that
for
any
i
∈
V,
j
∈
V
V
, one
f
p
P
has nt=r1 +r2 +1 qit wt j = 0. Recalling that Q and W are both
nonnegative,
we have that for any i ∈ Vn , if there exists
S
j ∈ V f V p such that wi j , 0, then qli = 0 for any l ∈ V,
i.e., qi = 0. Furthermore, for aforementioned i ∈ Vn , l ∈ V
and qli = 0, if there exists u ∈ Vn satisfying wui , 0, then
qlu wui = qli = 0. Thus, qu = 0. This indicates that for any
agent i ∈ Vn , as long as it receives information from any
stubborn agents directly or indirectly, there holds qi = 0.
4
Opinion formation of the F-J model over issue sequences
In this section, we study opinion formation of the F-J
model over sequences consisting of interdependent issues.
On one hand, most of the prior investigations on opinion dynamics are considered over a single issue. In practice, however, associations of individuals are constituted to deal with
sequences of issues within particular domains, and successive issues in specific issue domain are always correlated.
On the other hand, for individuals, related issues always
arise repeatedly in practice. Empirical evidences show that a
group of individuals who share a common set of experiences
will hold highly similar beliefs or characteristics (Joshi et
al., 2010). Hence, it is significant to consider the formation
of opinions over issue sequences.
P
t
Let Q̃ = limk→∞ k−1
t=0 (ΞW) (I − Ξ) = [q̃1 , q̃2 , . . . , q̃n ], then
there holds Ψ = Q + Q̃ = [ψ1 , ψ2 , . . . , ψn ] = [q1 + q̃1 , q2 +
q̃2 , . . . , qn + q̃n ]. Since ξi = 1 for any i ∈ Vn , we obtain
q̃i = 0 for any i ∈ Vn , namely, qi = ψi for anySi ∈ Vn . In
conclusion, for any i ∈ Vn , if there exists j ∈ V f V p which
has a directed path to agent i in graph G(W), then ψi = 0.
In Ghaderi & Srikant (2014), the authors study the equilibrium of system (1). Under the assumption that the network topology is undirected and connected, they present the
form of equilibrium taking advantage of the appropriately
defined hitting probabilities of a random walk over the network. However, since their conditions for convergence require that ρ(ΞW) < 1, the equilibrium is only related to the
initial opinions of stubborn agents. A similar assumption for
directed graph is presented in Mirtabatabaei et al. (2014). In
Property 2, we show that under the condition of Assumption
1, if a non-stubborn agent can obtain information directly
or indirectly from any stubborn agents, including fully stubborn and partially stubborn agents, then the ultimate opinion x∗ does not include the information of this non-stubborn
agent’s initial opinion. Otherwise, according to the proof of
Theorem 1, the ultimate opinion is also related to the initial
opinions of non-stubborn agents which form ISCCs with no
stubborn agents in it.
Next, we shall briefly introduce the path-dependence theory. The path-dependence theory is originally studied in economic and institutional change (North, 1990; Page, 2006),
and subsequently developed in cognitive psychology (Egidi
& Narduzzo, 1997; MacKay et al., 2006). In Egidi & Narduzzo (1997), path-dependence is observed in the behavioral experiments of human groups. The main point of pathdependence is “history matters”. That is, the decision one
faces for any given circumstance are constrained by the
decisions one has made in the past, even though past circumstance may no longer be relevant. This phenomenon is
ubiquitous in technological innovation, institutional change
and cognitive process of humans, etc. In the cognitive and
decision-making process of humans, people always have
cognitive inertia with which they are unwilling to change
their beliefs or decisions over interdependent issues. For example, one may wonder that why the U.S. standard railroad
gauge is 4 feet 8.5 inches, which is an exceedingly odd number. A well known explanation for this question is that it
is resulted from path-dependence (North, 1990). Firstly, the
U.S. railroads were built by English expatriates and that is
the guage they built them in England. Further, the first rail
lines of England were built by the same people who built the
pre-railroad tramways, where that gauge was used. Moreover, the tramways were built by the same people who built
wagons using the same jigs and tools. In fact, that gauge
is the wheel spacing of the wagon. In this example, peo-
Remark 3 Property 1 and Property 2 also provide an interesting perspective on leadership in social networks (Dyer
et al., 2009) and animal groups (Couzin et al., 2005). In
Wang & Xiao (2007), a generalized definition of “leader”
and “follower” is presented. A leader refers to the agent
who determines the ultimate state of the system, and the rest
are followers. This definition includes the notion of “leader”
and “follower” in which a leader is the agent who sends
information to others but never receives information. From
Property 1, Ψ is a stochastic matrix, thus the element of ψi
6
issue 0
issue 1
...
issue 2
issue s
where the first term of Ci (x) depicts the cognitive inertia of
agent i to change its initial opinions (i.e., internal opinions)
for interdependent issues, and the second term represents
the willingness of agent i to escape being unsocial. As a
consequence, the initial opinion of agent i for issue s + 1
satisfies
issue s+1
time
0
k0
k1
k2
ks-1
ks
Fig. 1. An issue sequence.
ple’s decisions over the interdependent issue sequence “The
gauge of the U.S. railroad”, “The gauge of the English railroad”, “The gauge of the tramway” and “The wheel spacing
of the wagon” remain unaltered. This phenomenon is named
cognitive freezing (MacKay et al., 2006). Since in the FJ model, agents’ initial opinions can be regarded as their
internal opinions, we will establish a connection between
agents’ initial opinions for interdependent issues based on
the path-dependence theory.
xi (s+1, k s+1 ) = ζi xi (s, k s )+(1−ζi )
n
X
wi j x j (s+1, k s+1 ), (9)
j=1
i.e.,
x(s + 1, k s+1 ) = Λx(s, k s ) + (I − Λ)W x(s + 1, k s+1 ),
(10)
where Λ = diag(ζ1 , ζ2 , . . . , ζn )T .
Let s = 0, 1, 2, . . . denote a sequence of interdependent
or repeatedly arising issues over which path-dependence
works 2 , k s be a constant denoting the time at which issue
s arises, x(s, k) denote agents’ opinions for issue s at time
k. Suppose that issue 0 arises at time 0, agents stop dealing with issue s − 1 and start to deal with issue s at time k s
(Fig. 1). Note that different from the assumptions in Mirtabatabaei et al. (2014) and Jia et al. (2015) which require the
time interval k s+1 − k s tends to infinity, here k s+1 − k s can
be any positive integer. For a given issue s, system (1) is
modified as:
The hypothesis in equation (10) can be naturally observed
from reality. In practice, an individual always has cognitive
inertia over sequences of path-dependent issues, especially
when an issue arises repeatedly. In extreme cases, cognitive
inertia may reinforce into cognitive freezing with which individuals keep their decisions unchangeable, even they are
exposed to more efficient options (Egidi & Narduzzo, 1997;
MacKay et al., 2006). Next we propose an assumption about
G(W) which ensures that I − ΞW is nonsingular.
x(s, k + 1) = ΞW x(s, k) + (I − Ξ)x(s, k s ),
(7)
Assumption 2 For each ISCC of G(W), there exists at least
one stubborn agent in it.
where x(s, k s ) represents initial opinions, i.e., internal opinions, of agents for issue s, and k ∈ [k s , k s+1 ].
Lemma 4 I − ΞW is nonsingular if and only if Assumption
2 holds.
Let ζi denote the factor of cognitive inertia of agent i for
two successive issues in an path-dependent issue sequence.
Note that the basic assumption of the F-J model is that agents
are anchored to their initial opinions over a given issue,
this is coincident with the path-dependence theory which
emphasizes that individual has the cognitive inertia over a
sequence of interdependent issues. Thus, we assume that for
each agent i, its factor of cognitive inertia ζi equals to its
stubborn factor, i.e., ζi = 1 − ξi . Then, basing on the game
theory formulation of the F-J model in Bindel et al. (2011)
and the self-reinforcing process of path-dependence (North,
1990), we assume that in forming its initial opinion for issue
s + 1, agent i attempts to myopically minimize the following
cost function:
Ci (x) = ζi (xi − xi (s, k s ))2 + (1 − ζi )
n
X
wi j (xi − x j )2 ,
Proof. Sufficiency. Since Assumption 2 holds, the proof of
Theorem 1 shows that ρ(ΞW) = ρ(Ξ̃W̃) < 1, which implies
that I − ΞW is nonsingular.
Necessity. If Assumption 2 does not hold, there exists at
least one eigenvalue of ΞW equals to 1. Namely, I − ΞW is
singular.
From equation (10) we have
(I − W + ΛW)x(s + 1, k s+1 ) = Λx(s, k s ).
If Assumption 2 holds, then I − ΞW is nonsingular. Since
Λ = I − Ξ, we obtain
(8)
x(s + 1, k s+1 ) = (I − ΞW)−1 (I − Ξ)x(s, k s ).
j=1
2
Note that the issue sequence is not necessarily consecutive over
time, some other uncorrelated issues may interpolate in it. For
example, Let S 1 = S 10 , S 11 , S 12 , . . . denote a issue sequence which
consists of interdependent issues, and S 2 denote another. The issues in S 1 and S 2 may be irrelevant and arise alternately. Without
loss of generality, we focus on each path-dependent subsequence
in this paper.
(11)
Since ΞW + I − Ξ is a stochastic matrix, we have that for
any nontrivial Ξ and W, x(s, k s+1 ) = χ1n if and only if
x(s, k s ) = χ1n , where χ ∈ R is a constant. Thus, we focus
on consensus of agents’ initial opinions for each issue in
the sequel. Now, we shall propose a definition of opinion
consensus for system (7), (10).
7
1 for any i ∈ V. From (14) we obtain
Definition 2 System (7), (10) is said to achieve consensus
if and only if for any initial opinion x(0, 0), there exists a
constant χ ∈ R, such that
lim x(s, k s ) = χ1n .
1 + ξi
(12)
s→∞
ψ̂ii =
Remark 4 Suppose that Assumption 2 holds. If k s+1 − k s is
large enough for each s, such that
∞
P
then, according to Lemma 4 and equation (7), we obtain
x(s + 1, k s+1 ) = x(s, ∞),
(13)
which implies that agents’ initial opinions for issue s + 1
equal to their limiting opinions for issue s, namely, cognitive freezing happens. This is consistent with our discussion
above that cognitive inertia can be reinforced into cognitive freezing in extreme cases. For example, as more people bought QWERTY keyboard, buying other keyboards with
different key configuration requires learning to type anew.
Thus, people’s opinions for the sequence of issues related to
keyboard will be locked in QWERTY keyboard, even though
there are many other more efficient types of keyboard (Page,
2006). Other examples of cognitive freezing are also reported, such as the fall of the Dundee jute industry (MacKay
et al., 2006), the persistence of the narrow-gauge rail (North,
1990), etc. In Page (2006), the author attributes cognitive
freezing to the externalities of other people. Note that in
equation (8), we assume that each agent’s initial opinion for
the next issue is influenced by other agents, i.e., the interpersonal influence creates externalities under Assumption 2,
which lead to cognitive freezing in equation (13).
S
1
> 0.
1 − ξi wii
V p , we have ψii = ψ̂ii (1 −
(ΞW)t . Let (ΞW)t = [ψ̂ti j ]n×n . Note that ψ̂ti j > 0 repre-
Lemma 5 connects G(Ψ) with G(W), such that we can
address property of G(Ψ) by analyzing G(W). From the proof
of Lemma 5, we have
Ir1 ×r1 0
Ψ = Ψ p f Ψ pp
Ψn f Ψnp
Let Ψ = [ψi j ]n×n = (I − ΞW)−1 (I − Ξ). The next lemma
reveals the connections between G(Ψ) and G(W).
0
0 ,
0
where Ψ pp ∈ Rr2 ×r2 .
Property 3 Any root of subgraph G(Ψ pp ) is a center vertex
which has directed edges to any other vertices of G(Ψ pp ).
Lemma 5 Under Assumption 2, the following statements
hold:
S
(i) ψii > 0 for any i S
∈ V f Vp. S
(ii) For any i ∈ V p Vn , j ∈ V f V p , i , j, ψi j > 0 if and
only if there exists a directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i)
from
S vertex j to vertex i in G(W), where j1 , j2 , . . . , jm ∈
V p Vn .
Proof. Suppose that i is a root of G(Ψ pp ). Let (i, j) and
( j, l) be edges of G(Ψ pp ) for j, l ∈ V p . By Lemma
S 5, there
exist directed paths consisting of vertices in V p Vn from
i to j and j to l in G(W), respectively. Thus, there exists at
least aSdirected path consisting of edges between vertices
in V p Vn from i to l in G(W). From Lemma 5 we have
ψli > 0, namely, there exists a directed edge from i to l in
G(Ψ pp ). Following the same lines as above, one has that
any root of subgraph G(Ψ pp ) is a center vertex which has
directed edges to any other vertices of G(Ψ pp ).
Proof. Let Ψ̂ = [ψ̂i j ]n×n = (I − ΞW)−1 .
(i) Since (I − ΞW)Ψ̂ = I, we have
i ∈ V.
≥
sents that there exist paths consisting of t edges (maybe
appear repeatedly or contain self-loops ) in G(ΞW) start
from vertex j to vertex i. Moreover, if we take no account of the weights, G(ΞW) and G(W) have no difference except the edges to fully stubborn agents. Thus, if
there exists a directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i) S
from
vertex j to vertex i in G(W), and j1 , j2 , . . . , jm ∈ V p Vn ,
we have ψ̂m
i j > 0. Therefore, ψ̂i j > 0. Otherwise, we have
ψ̂ti j = 0 for any t ∈ N. Thus, ψ̂i j = 0. Since ξ j < 1 for
S
j ∈ V f S V p , ψi j = ψ̂Si j (1 − ξ j ), we have that ψi j > 0 for any
i ∈ V p Vn , j ∈ V f V p , i , j if and only if there exists a
directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i) from
S vertex j to vertex i in G(W), where j1 , j2 , . . . , jm ∈ V p Vn .
Thus,
wit ψ̂ti ,
1 − ξi wii
(ii) Since Assumption 2 holds, one has (I − ΞW)−1 =
t=0
x(s, ∞) = (I − ΞW)−1 (I − Ξ)x(s, k s ).
n
X
wit ψ̂ti
t=1
t,i
Since 1 − ξi > 0 for any
S i ∈ Vf
ξi ) > 0 for any i ∈ V f V p .
x(s, k s+1 ) = x(s, ∞),
ψ̂ii (1 − ξi wii ) = 1 + ξi
n
P
(14)
t=1
t,i
Lemma 5 and Property 3 show that if there exists a directed path from a stubborn agent i to a partially stubborn
or non-stubborn agent j in G(W), then (i, j) is an edge of
G(Ψ). Moreover, if G(Ψ pp ) contains a spanning tree, then it
Assumption 2 implies that if wii = 1, ξi < 1. Thus, ξi wii <
8
also contains a star subgraph. In other words, the connectivity of the social network is enhanced over issue sequences.
The block form of Ψ shows that fully stubborn agents never
change their opinions in the process of opinion formation.
Thus, we consider the scenario in which there are no fully
stubborn agents in the social network.
form of Ψ indicates that when there exists more than one
fully stubborn agent in the network, consensus can not be
achieved for arbitrary initial opinion unless the influence of
fully stubborn agents to others is identical (Friedkin, 2015).
Since the condition for achieving opinion consensus in Theorem 2 is sufficient and necessary, it also gives the condition
for opinions of agents to form clusters.
Theorem 2 Suppose that V f = ∅ and Assumption 2 holds.
System (7), (10) achieves opinion consensus if and only if
there exists a partially stubborn agent which has directed
paths to any other partially stubborn agents in G(W).
Corollary 1 Suppose that V f = ∅ and Assumption 2 holds.
System (7), (10) forms opinion clusters if and only if there
exists more than one ISCC in G(W).
Proof. Sufficiency. Since V f = ∅, i.e., r1 = 0, we have
5
Ψ pp
W pp W pn
, Ψ =
W =
Ψnp
Wnp Wnn
0
,
0
As discussed in Section 4, the cognitive inertia of agent
can be reinforced into cognitive freezing under Assumption
2, i.e., each agent’s initial opinion for issue s + 1 equals to
its limiting opinion for issue s if its opinion for s converges.
It is mainly because of the externalities created by agents’
interpersonal influence under which agents treat opinions of
others with no difference. However, in practice, people usually assimilate information in a selective way: they tend to
give considerable weight to the information supporting their
initial opinions, and dismiss the undermining information
meanwhile, which is named echo-chamber effect (Sunstein,
2012; Dandekar et al., 2013). Similar observations in animal
groups are reported in Couzin et al. (2005). In this section,
we consider a more general scenario that each agent maintains a confidence bound in forming its initial opinions.
where W pp ∈ Rr2 ×r2 , Wnn ∈ Rn−r2 ×n−r2 , Ψ pp ∈ Rr2 ×r2 . From
Property 1 we have that Ψ pp and Ψnp are both stochastic matrices. Lemma 5. (i) indicates that Ψ pp has positive diagonal
elements. Moreover, since there exists a partially stubborn
agent which has
S directed paths consisting of edges between
vertices in V p Vn to any other partially stubborn agents in
G(W), Lemma 5. (ii) implies that G(Ψ pp ) has a spanning tree.
By Corollary 3.5 and Lemma 3.7 in Ren & Beard (2005),
we have that Ψ pp is stochastic, indecomposable and aperiodic (SIA). That is, there exists a nonnegative vector ν ∈ Rr2
such that lim Ψ spp = 1r2 νT , where ν satisfies ΨTpp ν = ν and
s→∞
1T ν = 1. Note that
Ψ spp
lim Ψ = lim
s→∞
s→∞ Ψ Ψ s−1
np pp
s
Opinion formation of the F-J model over issue sequences with bounded confidence
For simplicity, we employ the assumption used in Mirtabatabaei et al. (2014) and Jia et al. (2015) that the scale of
time k increases faster than the scale of issue s in this section. In other words, the convergence of opinion x(s, k) can
be achieved with k increasing before the next issue s+1 arising, i.e., k s = ∞ for issue s − 1 and k s = 0 for issue s. From
Remark 4, we have x(s + 1, 0) = x(s, ∞) under Assumption
2, which means that agents take their ultimate opinions for
the last issue as their initial opinions for the next issue. Inspired by the echo-chamber effect, we suppose that agent
i forms its initial opinion xi (s + 1, 0) by taking a weighted
average of other agents’ ultimate opinions x j (s, ∞), j ∈ V
which satisfy |xi (s, ∞) − x j (s, ∞)| < d, where d ∈ R is the
given confidence bound.
0 1r2 νT 0 1r2 νT 0
=
=
,
0
Ψnp 1r2 νT 0
1n−r2 νT 0
which indicates that Ψ spp converges to a matrix of rank
one as s → ∞. Since Assumption 2 holds, we have
lim s→∞ x(s, k s ) = Ψ s x(0, 0) = [νT 0Tn−r2 ]x(0, 0)1n , namely,
system (7), (10) achieves opinion consensus as s → ∞.
Necessity. If there exists no partially stubborn S
agent which
has directed paths consisting of vertices in V p Vn to any
other partially stubborn agents in G(W), Lemma 5. (ii) suggests that G(Ψ pp ) does not contain any spanning trees. This
implies that the eigenvalue 1 of Ψ pp has algebraic multiplicity larger than one, that is, Ψ has more than one eigenvalue equal to 1. In conclusion, opinion consensus cannot
be achieved.
Let Ni (s) = { j ∈ V : |xi (s, ∞) − x j (s, ∞)| < d} denote the
set of agents whose ultimate opinions for issue s are within
the confidence interval of agent i, NiΨ = { j ∈ V : ψi j > 0}
denote the set of neighbors of agent i in G(Ψ). Here we
employ a symmetric modification of the H-K model (Jing
et al., 2016; Yang et al., 2014):
X
xi (s + 1, 0) = xi (s, ∞) + h
(x j (s, ∞) − xi (s, ∞)), (15)
As is often pointed out, the F-J model does not generally
achieve opinion consensus over a single issue even if the network topology is completely connected (Ghaderi & Srikant,
2014; Frasca et al., 2015). However, Theorem 2 shows that
in the absence of fully stubborn agents, as long as there
exists at least one partially stubborn agent whose opinion
can scatter to other partially stubborn agents through partially stubborn agents or non-stubborn agents, opinion consensus can be achieved over a sequence of issues. The block
j∈Ni (s)
where h ∈ R satisfies h > 0 and 1 − (n − 1)h > 0. Note that if
the differences of agents’ initial opinions are large enough
9
such that Ni (s) = {i} for any i ∈ V and s ∈ N, equation (15)
will collapse to equation (11). Combining equation (15) and
Lemma 4, we have
G(Φ0 (s)) has a spanning tree, we have G(Φ1 (s)) contains a
spanning tree. Following from Corollary 3.5 and Lemma 3.7
in Ren & Beard (2005), Φ1 (s) is SIA.
x(s, ∞) = Ψx(s, 0),
Lemma 6 implies that as long as the connectivity of
G(Φ0 (s)) can be preserved, Φ1 (s) is SIA. This is on account
of enhanced connectivity of the interpersonal influence network over issue sequences, which is shown in Property 3.
Next, we give the condition for H(0) to preserve connectivity.
and
x(s + 1, 0) = H(s)x(s, ∞),
where Ψ = (I − ΞW)−1 (I − Ξ), H(s) = [hi j (s)]n×n , and
hii (s) = 1 − h(|Ni (s)| − 1) i ∈ V,
hi j (s) = h
j , i, j ∈ Ni (s),
hi j (s) = 0
otherwise.
(16)
Let y(s) = Ψx(s), then x(s + 1) = H(s)y(s). Denote the set
of common neighbors of agents i and j for issue s by
For simplicity, we omit the time scale k in the sequel. Let
Φ(s) = [ϕi j (s)]n×n = H(s)Ψ, then we have x(s + 1) =
Φ(s)x(s). According to the partition of V, we have
Φ1 (s)
Φ(s) =
Φ2 (s)
Ni j (s) = {l ∈ V : |yi (s) − yl (s)| < d, |y j (s) − yl (s)| < d}.
0
,
0
From equation (15), we have that G(H(s)) is undirected. The
following assumption proposes the conditions for connectivity preservation of G(H(s)).
where Φ1 (s) ∈ R(r1 +r2 )×(r1 +r2 ) . Rewrite H(s) as a same block
form of W:
H f f (s) H f p (s) H f n (s)
H(s) = H p f (s) H pp (s) H pn (s) ,
Hn f (s) Hnp (s) Hnn (s)
S
T
Assumption 3 (i) For any i ∈ V f , j ∈ (V p Vn ) Ni (0)
S
and l ∈ N Ψ
, l ∈ Ni (0). For any i ∈ V p Vn , j ∈
T
S
T j
, l ∈ N j (0) Ni (0).
(V p Vn ) Ni (0) and l ∈ N Ψ
Tj
(ii) For any i ∈ V f , j ∈ V f Ni (0), |Ni j (0)| > n2 . For any
S
T
1
.
i ∈ V p Vn , j ∈ V Ni (0), |Ni j (0)| > n2 + 4h
where H f f (s) ∈ Rr1 ×r1 , H pp (s) ∈ Rr2 ×r2 and Hnn (s) ∈
R(n−r1 −r2 )×(n−r1 −r2 ) . Let
H f f (s) H f p (s)
Φ0 (s) =
Wp f
W pp
.
As mentioned above, only if the difference between two
agents’ opinions is small enough, agents will take account
of other agents’ opinions. In Assumption 3, we give some
conditions about the distribution of agents’ ultimate opinions for the first issue to ensure that G(H(0)) is adequately
connected and thus the connectivity of G(H(s)) can be preserved for any s ∈ N. Note that given a social network, the
interpersonal influence network G(W) and agents’ stubborn
extent Ξ are determined, and y(0) = (I −ΞW)−1 (I −Ξ)x(0, 0).
Therefore, the conditions on y(0) in Assumption 3 are actually conditions on x(0, 0). From equation (15), we have
1
. Moreover, since |Ni j (0)| < n, from Assumption 3
h < n−1
1
1
1
we have h > 2n
. Thus, 2n
< h < n−1
.
(r1 +r2 )×(r1 +r2 )
Lemma 6 For any s ∈ N, if G(Φ0 (s)) has a spanning tree,
then Φ1 (s) is SIA.
Proof. From equation (16), H(s) is a nonnegative and
stochastic matrix with positive diagonal elements.
By
S
Lemma 5, we have ψii > 0 for any i ∈ V f V p . Thus,
Φ(s) and Φ1 (s) are both stochastic matrices and Φ1 (s) has
positive diagonal elements. Since Φ(s) = H(s)Ψ, we have
n
P
ϕi j (s) = hi j (s) +
hit (s)ψt j
t=r1 +1
n
P
hit (s)ψt j
ϕi j (s) =
t=r1 +1
i ∈ Vf
S
Vp, j ∈ V f ,
i ∈ Vf
S
Vp, j ∈ Vp.
Lemma 7 Under Assumption 3, no edge in G(H(0)) will be
lost in G(H(s)) for any s ∈ N.
(17)
S
Hence, for any i ∈ V f , j ∈ V f V p , hi j (s) > 0 indicates
ϕi j (s) > 0.SMoreover, Lemma 5. (ii) shows that for i ∈
V p , j ∈ V f V pS
, wi j > 0 means ψi j > 0. Thus, for any
i ∈ V p , j ∈ V f V p , wi j > 0 implies ϕi j > 0. Because
Proof. Firstly, we shall show that if Assumption 3 holds for
issue s, then it holds for issue s + 1. Suppose that for any
|yi (s) − y j (s)| < d, i, j ∈ V, Assumption 3 holds for issue s.
10
For i, j ∈ V f , we have
N j (s)
T
Ni (s) and |Nil (0)| >
X
|yi (s + 1) − y j (s + 1)|
=|xi (s + 1) − x j (s + 1)|
X
X
= yi (s) + h
(yl (s) − yi (s)) − y j (s) − h
(yl (s) − y j (s))
l∈Ni (s)
= yi (s) − y j (s) + h
X
+
(y j (s) − yi (s))+
h
X
(yl (s) − yi (s)) − h
≤
(yl (s) − y j (s))
X
≤(1 − h|Ni j (s)|)|yi (s) − y j (s)| + h
X
<
l∈N j (s)\Ni j (s)
ψ jl (xi (s + 1) − xl (s + 1)) .
l∈N Ψ
j
Noting that for any l ∈ N Ψ
j , one has l ∈ Ni (s) and |Nil (0)| >
n
.
Following
the
same
lines
as above, we obtain
2
|yi (s + 1) − y j (s + 1) |<
X
ψ jl (xi (s + 1) − xl (s + 1))
X
ψil
d X
d
ψ jl = d.
+
2
2
Ψ
l∈N j
The connectivity preservation is a crucial and challenging
problem in research for the consensus problem of the H-K
model since the evolution of agents’ opinions is only associated with the initial states and their distribution. In Jing et al.
(2016), a potential function is presented to measure the total
difference of agents’ initial opinions such that the connectivity is preserved by restricting the distribution of agents’
initial opinions. Following a different line, in Lemma 7 we
ensure that the links existing in G(H(0)) will never be lost
as s increases by proposing a lower bound for the number of
agents’ common neighbors in G(H(0)). In addition, different from the modified H-K model considered in Yang et al.
(2014), in system (7), (15), the evolution of opinions over
time scale increases the complexity of our analysis.
Vn , we have
l∈N Ψ
j
=
ψil (xl (s + 1) − xi (s + 1))
That is to say, if Assumption 3 holds for issue s, then no
edge contained in G(H(s)) will be lost, which implies that
Assumption 3 holds for issue s+1. Thus, no edge in G(H(0))
will be lost in G(H(s)) for any s ∈ N under Assumption 3.
|yi (s + 1) − y j (s + 1)|
X
= xi (s + 1) −
ψ jl xl (s + 1)
X
ψ jl (xi (s + 1) − xl (s + 1))
X
l∈NiΨ
<(1 − h|Ni j (s)|)d + h(|Ni (s)| + |N j (s)| − 2|Ni j (s)|)d
≤(1 − h|Ni j (s)|)d + h(n − |Ni j (s)|)d
≤(1 + hn − 2h|Ni j (s)|)d
<d.
S
X
l∈N Ψ
j
|(yl (s) − y j (s))|
For i ∈ V f , j ∈ V p
ψil (xl (s + 1) − xi (s + 1))
X
+
|(yl (s) − yi (s))|
l∈Ni (s)\Ni j (s)
+h
ψ jl xl (s + 1)
l∈N Ψ
j
l∈NiΨ
l∈N j (s)\Ni j (s)
l∈Ni (s)\Ni j (s)
X
we obtain
l∈N Ψ
j
l∈Ni j (s)
X
1
4h ,
l∈NiΨ
l∈N j (s)
X
+
ψil xl (s + 1) −
l∈NiΨ
=
n
2
Lemma 8 (Lemma 3.1, Ren & Beard (2005)) Let P1 , P2 , ...,
Pm ∈ Rn×n be m nonnegative matrices with positive diagonal
elements, then
ψ jl d = d.
P1 P2 ...Pm ≥ η(P1 + P2 + ... + Pm ),
l∈N Ψ
j
where η can be specified from matrices Pi , i = 1, 2, ..., m.
ψ jl xl (s + 1) .
By the proof of Lemma 6 and Lemma 7, that the subgraph of G(H(0)) corresponding to stubborn agents is connected also implies that Φ1 (s) is SIA. In the next theorem,
we employ a more feasible condition which reduces the requirements for the distribution of agents’ initial opinions.
Since for any l ∈ N Ψ
j , Assumption 3 ensures l ∈
Theorem 3 Under Assumption 2 and 3, system (7), (15)
achieves opinion consensus if the following conditions hold:
(i) there exists a partially stubborn
Sagent which has directed
paths consisting of vertices in V p Vn to any other partially
For i, j ∈ (V p
S
Vn ), we get
|yi (s + 1) − y j (s + 1)| =
X
l∈NiΨ
ψil xl (s + 1) −
X
l∈N Ψ
j
11
stubborn agents in G(W);
(ii) G(H f f (0)) is connected;
(iii) there exists an edge in G(H(0)) between a partially
stubborn agent and a fully stubborn agent.
Theorem 3 show that consensus can be achieved by the F-J
model over a sequence of issues. Yet in the same context,
it generally fails to achieve consensus over a single issue,
even under completely connected networks. In practice, as
the number of the issues that individuals collaborate to deal
with increases, initial opinions of individuals for each issue
become more and more similar and reach agreement ultimately. This phenomenon is named cohort effect (Joshi et
al., 2010), which describes a high degree of similarity in
characteristics or beliefs of a group of individuals who share
a common set of experiences. Moreover, this mechanism is
usually used to train groups for specific tasks (to name but
a few, athlete team, special action force or fire brigade) to
make the opinions or decisions of the group members grow
similar.
Proof. From Assumption 3 and Lemma 7, we have that
G(Φ0 (s)) contains a spanning tree for any s ∈ N. Hence,
Lemma 6 implies that Φ1 (s) is SIA and G(Φ1 (s)) contains
a spanning tree for any s ∈ N. Let ∆(s) = Φ(s − 1)Φ(s −
2) . . . Φ(1)Φ(0), then x(s) = ∆(s)x(0). From the block form
of Φ(s), we have
Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0)
∆(s) =
Φ2 (s − 1)Φ1 (s − 2) . . . Φ1 (0)
0
.
0
Since the set of all possible matrices H(s) is finite under
equation (16), Φ(s) = H(s)Ψ, one has that the set of all
possible matrices Φ(s) is finite, which indicates that the set
of all possible matrices Φ1 (s) is finite. Moreover, because
G(Φ1 (s)) contains a spanning tree for any s ∈ N, from
Lemma 8, we have Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) is SIA for
any s ∈ N. From Wolfowitz Theorem (Wolfowitz, 1963),
there exists a nonnegative vector ν ∈ Rr1 +r2 such that
6
In this section, numerical simulations are provided to illustrate the effectiveness of the theoretical results proposed
above.
Example 1 (Convergence of the F-J model over a single issue) Consider 10 agents labeled from 1 to 10
interacting with each other in digraph G(W 1 ) (Fig.
2a). W 1 is the stochastic adjacent matrix of G(W 1 ).
Let ξ1 = (0, 0, 0, 0.2, 0.5, 0.7, 1, 1, 1, 1)T , namely, V f =
{1, 2, 3}, V p = {4, 5, 6} and Vn = {7, 8, 9, 10}. Initialize x(k)
with x(0) = (−1, 0, 1, 1, −2, 0, −1, −2, 1, 2)T , the trajectory
of x(k) under G(W 1 ) with k increasing is shown in Fig. 2b.
lim Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) = 1r1 +r2 νT .
s→∞
Thus,
Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) 0
lim
s→∞ Φ (s − 1)Φ (s − 2) . . . Φ (0)
0
2
1
1
T
1
ν
0
r
+r
1
2
.
=
lim s→∞ Φ2 (s − 1)1r1 +r2 νT 0
Note that in Fig. 2b, the opinions of fully stubborn agents
are fixed, while the opinions of partially stubborn agents
and non-stubborn agents tend to be constant as k increases.
The network G(W 1 ) has four SCCs, i.e., {1, 4, 5}, {3, 6, 7},
{8, 9, 10}, {2}. The ISCC consisting of non-stubborn agents is
{8, 9, 10}, in which agent 9 and agent 10 both have two cycles
whose lengths are 2 and 3, respectively. Thus, Assumption 1
is satisfied. By computing we find√ that the maximum-modulus
√
eigenvalues of W 1 are 1, − 21 + 23 i, and − 12 − 23 i, while the
maximum-modulus eigenvalue of Ξ1 W 1 is 1, which accords
with the algebraic condition in Lemma 1. In Fig. 2b, the
trajectory of x(k) is almost fixed after k = 20. When k =
20, one can find that the ISCC {8, 9, 10} achieve consensus,
while the other non-stubborn agent 7 has different ultimate
opinion with them. Moreover, we have ψ7 = 0, ψ8 , ψ9 and
ψ10 are nonzero, which is consistent with Property 2 and the
discussion following it.
Since Φ2 is stochastic, we obtain
1r +r νT
lim ∆(s) = 1 2
s→∞
1n−r1 −r2 νT
0
.
0
Therefore,
lim lim x(s, k) = lim x(s) = [νT 0Tn−r1 −r2 ]x(0)1n ,
s→∞ k→∞
Simulations
s→∞
which implies that system (7), (15) achieves consensus as
k → ∞, s → ∞.
Example 2 (Consensus of the F-J model over issue
sequences) Consider 10 agents labeled from 1 to 10
in which agents 1 to 5 are partially stubborn agents,
others are non-stubborn agents. The network topology is characterized by the digraph G(W 2 ) (Fig. 3a).
Let ξ2 = (0.3, 0.6, 0.2, 0.8, 0.7, 1, 1, 1, 1, 1)T . x(0, 0) =
(−1, 0, 1, 1, −2, 0, −1, −2, 1, 2)T is the initial opinion vector
at s = 0 and k = 0. The trajectory of x(k) is showed in Fig.
4.
As we discussed in Rmark 4, cognitive freezing emerges
in model (7), (10) under Assumption 2. This is attributed
to the externality resulted from the interpersonal influence.
Thus, in model (7), (10), fully stubborn agents will keep
their opinions unchangeable for all issues. Theorem 3 shows
that the cognitive freezing is weakened by the bounded confidence of agents so that consensus can be achieved even
in the presence of fully stubborn agents. Theorem 2 and
12
2
2
partially stubborn agent
fully stubborn agent
6
partially stubborn agent
7
non-stubborn agent
6
non-stubborn agent
7
1
5
5
3
3
4
4
10
1
9
9
2
10
8
6
7
6
7
8
a . G(W 1 )
a . G(W 2 )
2.5
fully stubborn agents
partially stubborn agents
non−stubborn agents
2
partially stubborn agent
6
1.5
non-stubborn agent
7
1
x(k)
0.5
0
2
5
−0.5
3
−1
4
−1.5
1
−2
9
−2.5
0
10
4
8
12
16
20
k
7
b . x(k)
6
8
b . G(Ψ2 )
Fig. 2. The network topology G(W 1 ) and the trajectory of x(k).
Fig. 3. The network topologies G(W 2 ) and G(Ψ2 ).
Fig. 4 shows the trajectories of x(s, k) over issues s =
0, 1, 2, 5, 10, 20, respectively. Note that over each issue s,
x(s, k) tends to a steady opinion vector as k increases, and all
steady opinions tend to be a common value with s increasing. When s = 30, Fig. 4 shows that consensus is achieved
by system (7), (10). Moreover, since G(W 2 ) satisfies the condition in Assumption 2, we have Ψ3 = (I − Ξ2 W 2 )−1 (I − Ξ2 ).
From Lemma 5 and Property 3, the existence of a partially
stubborn agents in G(W 2 ) which has a directed path to other
partially stubborn agents implies that the subgraph corresponding to partially stubborn agents in G(Ψ2 ) not only has
a spanning tree, but also contains a star topology, and selfloops are contained by partially stubborn agents in G(Ψ2 ),
which are shown in Fig. 3b. We can find visually from Fig.
3b that partially stubborn agents do not receive information
from non-stubborn agents, which indicates that ψi = 0 for
any i ∈ {5, 6, . . . , 10}. This is consistent with the theoretical
result in Property 2.
Example 3 (Consensus of the F-J model over issue
sequences with bounded confidence) Consider system (7), (15) with 10 agents labeled from 1 to 10.
The network topology G(W 3 ) is showed in Fig. 5a.
Let ξ3 = (0, 0, 0, 0.8, 0.3, 0.2, 1, 1, 1, 1)T , namely, V f =
{1, 2, 3}, V p = {4, 5, 6} and others are non-stubborn agents.
Let x(0, 0) = (−0.7, 0.2, 0, 0.2, 2, −2.5, −1.5, 1, 1.5, −1)T .
1
1
The confidence bound is set as d = 1. Since 2n
< h < n−1
,
let h = 0.1. Fig. 6a and Fig. 6b show the trajectories of
x(s, k) and x(s, 0), respectively.
Because that in Fig. 5a, G(W 3 ) satisfies the condition
of Assumption 2, Ψ3 exists. G(Ψ3 ) is depicted in Fig. 5b.
Moreover, G(Ψ3 ) and x(0, 0) satisfy the conditions in Assumption 3 and Theorem 3, thus x(s, 0) reaches consensus
as s → ∞ (Fig. 6b), which implies x(s, k) reaches consensus (Fig. 6a). The connectivity of G(H(0)) is related with
the percentage of the fully stubborn agents. In this exam-
13
s=0
s=1
2
fully stubborn agents
partially stubborn agents
non−stubborn agents
2
x(1,k)
0
−2
0
10
20
s=2
30
0
1
−2
40 k
0
−2
s=5
k
0
s=10
s=20
k
−1
−3
10
9
k
2
0
0
−2
k
x(20,k)
x(10,k)
−2
2
−2
2
x(5,k)
x(2,k)
2
x(s,k)
x(0,k)
2
8
7
6
k
0
−2
partially stubborn agents
5
4
3
2
1
0
0
25
20
15
10
5
39
35
30
s
k
non−stubborn agents
a . The trajectories of x(s, k).
Fig. 4. The trajectories of x(s, k) at s = 0, 1, 2, 3, 4, 30, respectively.
2
fully stubborn agents
partially stubbornagents
non−stubborn agents
1.5
fully stubborn agent
2
1
partially stubborn agent
2
0.5
6
x(s,0)
non-stubborn agent
7
10
1
5
6
0
−0.5
0.1
−1
0
−1.5
−0.1
−2
−0.2
0.5
−2.5
0
2
4
6
8
10
12
14
1
16
1.5
18
20
2
22
2.5
24
3
26
28
30
32
34
36
3839
s
4
9
b . The trajectory of x(s, 0).
8
7
3
Fig. 6. The trajectories of x(s, k) and x(s, 0).
a . G(W 3 )
10
ple, Assumption 3 requires that each fully stubborn agent
has at least 8 neighbors in G(H(0)). By computing we have
y(0) = (−0.7, 0.2, 0, 0.2, 1.46, −1.9876, 0.0082, 0.0274, 0.2,
−0.25)T , thus agents 1, 2, 3, 4, 7, 8, 9, 10 form a completely
connected subgraph in G(H(0)), and agents 5 and 6 are isolated with others, respectively.
fully stubborn agent
2
partially stubborn agent
6
non-stubborn agent
1
7
2
7
6
In this paper, opinion dynamics in social networks with
stubborn agents has been investigated over issue sequences.
The social network with stubborn agents is described by
the F-J model. In order to investigate opinion formation of
the F-J model over issue sequences, we studied convergence
of the F-J model over a single issue and properties of the
ultimate opinion. Then taking advantage of the underlying
connections between the network of interpersonal influence
and the network describing the relationship of agents’ initial
opinion for successive issues, opinion consensus and cluster of the F-J model was investigated over issue sequences
based on the path-dependence theory. Moreover, we further
5
3
4
9
8
Conclusions
7
b . G(Ψ3 )
Fig. 5. The network topologies G(W 3 ) and G(Ψ3 ).
14
the community cleavage problem, IEEE Control Systems,
35(3), 40-51.
Friedkin, N. E., & Johnsen, E. C. (1999). Social influence
networks and opinion change, Advances in Group Processes, 16(1), 1-29.
Friedkin, N. E. (2011). A formal theory of reflected appraisals in the evolution of power, Administrative Science
Quarterly, 56(4), 501-529.
Frasca, P., Ishii, H., Ravazzi, C., & Tempo, R. (2015). Distributed randomized algorithms for opinion formation,
centrality computation and power systems estimation: A
tutorial overview, European journal of control, 24(1), 213.
Golub, B., & Jackson, M. O. (2010). Naive learning in social
networks and the wisdom of crowds, American Economic
Journal: Microeconomics, 2(1), 112-149.
Godsil, C., & Royal, G. (2001). Algebraic graph theory,
New York: Springer-Verlag.
Ghaderi, J., & Srikant, R. (2014). Opinion dynamics in social networks with stubborn agents: Equilibrium and convergence rate, Automatica, 50(12), 3209-3215.
Horn, R. A., & Johnson, C. R. (2012). Matrix analysis, New
York: Cambridge University Press.
Hegselmann, R., & Krause, U. (2002). Opinion dynamics
and bounded confidence models, analysis, and simulation,
Journal of Artificial Societies and Social Simulation, 5(3).
Jia, P., Mirtabatabaei, A., Friedkin, N. E., & Bullo, F. (2015).
Opinion dynamics and the evolution of social power in
influence networks, SIAM Review, 57(3), 367-397.
Jing, G., Zheng, Y., & Wang, L. (2016). Consensus of multiagent systems with distance-dependent communication
networks, IEEE Transactions on Neural Networks and
Learning Systems, DOI: 10.1109/TNNLS.2016.2598355.
Jadbabaie, A., Lin, J., & Morse, A. S. (2003). Coordination of groups of mobile autonomous agents using nearest
neighbor rules, IEEE Transactions on Automatic Control,
48(6), 988-1001.
Joshi, A., Dencker, J. C., Franz, G., & Martocchio, J. J.
(2010). Unpacking generational identities in organizations, Academy of Management Review, 35(3), 392C414.
Liu, H., Xie, G., & Wang, L. (2012). Necessary and sufficient
conditions for containment control of networked multiagent systems, Automatica, 48(7), 1415-1422.
Li, L., Scaglione, A., Swami, A., & Zhao, Q. (2013). Consensus, polarization and clustering of opinions in social
networks, IEEE Journal on Selected Areas in Communications, 31(6), 1072-1083.
Lamport, L., Shostak, R., & Pease, M. (1982). The Byzantine
generals problem, ACM Transactions on Programming
Languages and Systems, 4(3), 382-401.
Mirtabatabaei, A., & Bullo, F. (2012). Opinion dynamics
in heterogeneous networks: convergence conjectures and
theorems, SIAM Journal on Control and Optimization,
50(5), 2763-2785.
Mirtabatabaei, A., Jia, P., Friedkin, N. E., & Bullo, F. (2014).
On the reflected appraisals dynamics of influence networks with stubborn agents, American Control Conference, IEEE, 3978-3983.
Ma, J., Zheng, Y., Wu, B., & Wang, L. (2016). Equilibrium
considered the more general scenario where agents have
bounded confidence to others when they form their initial
opinions. Mathematical conditions for opinions achieving
consensus or forming clusters were established, respectively.
We showed that the F-J model may achieve opinion consensus over each path-dependent issue sequence, while it generally does not achieve consensus over a single issue. The
connections between network characterizing interpersonal
influence and the one describing the relationship of agents’
initial opinions for successive issues uncover the difference
between opinion formation over issue sequences and over a
single issue, such as the enhanced network connectivity in
the former. Our investigation may provide some theoretical
explanations for many observations in the real world such as
decision making in human society or animal kingdom. The
future work will focus on the evolution of agents’ extent of
stubborn over issue sequences.
References
Acemoglu, D., Ozdaglar, A., & ParandehGheibi, A. (2010).
Spread of (mis) information in social networks, Games
and Economic Behavior, 70(2), 194-227.
Altafini, C. (2013). Consensus problems on networks with
antagonistic interactions, IEEE Transactions on Automatic Control, 58(4), 935-946.
Brualdi, R. A., & Ryser, H. J. (1991). Combinatorial matrix
theory, New York: Cambridge University Press.
Boyd, S., Ghosh, A., Prabhakar, B., & Shah, D. (2006). Randomized gossip algorithms, IEEE Transactions on Information Theory, 52(6), 2508-2530.
Blondel, V. D., Hendrickx, J. M., & Tsitsiklis, J. N. (2009).
On Krause’s multi-agent consensus model with statedependent connectivity, IEEE Transactions on Automatic
Control, 54(11), 2586-2597.
Bindel, D., Kleinberg, J., & Oren, S. (2011). How bad is
forming your own opinion?, Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science, 57-66.
Couzin, I. D., Krause, J., Franks, N. R., & Levin, S. A.
(2005). Effective leadership and decision-making in animal groups on the move, Nature, 433(7025), 513-516.
Degroot, M. H. (1974). Reaching a consensus, Journal of
the American Statistical Association, 69(345), 118-121.
Dyer, J. R. G., Johansson, A., Helbing, D., Couzin, I. D., &
Krause, J. (2009). Leadership, consensus decision making
and collective behaviour in humans, Philosophical Transactions of the Royal Society of London B: Biological Sciences, 364(1518), 781-789.
Dandekar, P., Goel, A., & Lee, D. T. (2013). Biased assimilation, homophily, and the dynamics of polarization, Proceedings of the National Academy of Sciences, 110(15),
5791-5796.
Egidi, M., & Narduzzo, A. (1997). The emergence of pathdependent behaviors in cooperative contexts. International Journal of Industrial Organization, 15(6), 677-709.
Friedkin, N. E. (2015). The problem of social control and
coordination of complex systems in sociology: A look at
15
topology of multi-agent systems with two leaders: A zerosum game perspective, Automatica, 73, 200-206.
MacKay, R., Masrani, S., & McKiernan, P. (2006). Strategy
options and cognitive freezing: The case of the Dundee
jute industry in Scotland, Futures, 38(8), 925-941.
North, D. C. (1990). Institutions, institutional change and
economic performance, Cambridge university press.
Olfati-Saber, R., & Murray, R. M. (2004). Consensus problems in networks of agents with switching topology and
time-delays, IEEE Transactions on Automatic Control,
49(9), 1520-1533.
Parsegov, S. E., Proskurnikov, A. V., Tempo, R., & Friedkin,
N. E. (2017). Novel Multidimensional Models of Opinion Dynamics in Social Networks, IEEE Transactions on
Automatic Control, 62(5), 2270-2285.
Page, S. E. (2006). Path dependence, Quarterly Journal of
Political Science, 1(1), 87-115.
Ren, W., & Beard, R. W. (2005). Consensus seeking in
multiagent systems under dynamically changing interaction topologies, IEEE Transactions on Automatic Control,
50(5), 655-661.
Ravazzi, C., Frasca, P., Tempo, R., & Ishii, H. (2015).
Ergodic randomized algorithms and dynamics over networks. IEEE transactions on control of network systems,
2(1), 78-87.
Sunstein, C. (2012). Breaking up the echo, NY Times, A25.
Wang, L., & Xiao, F. (2007). A new approach to consensus
problems in discrete-time multiagent systems with timedelays, Science in China Series F: Information Sciences,
50(4), 625-635.
Wang, L., & Xiao, F. (2010). Finite-time consensus problems
for networks of dynamic agents, IEEE Transactions on
Automatic Control, 55(4), 950-955.
Wang, L., Jiang, F., Xie, G., & Ji, Z. (2009). Controllability of multi-agent systems based on agreement protocols,
Science in China Series F: Information Sciences, 52(11),
2074-2088.
Wang, L., Shi, H., Chu, T., Zhang, W., & Zhang, L.
(2004). Aggregation of foraging swarms, In Australasian
Joint Conference on Artificial Intelligence (pp. 766-777).
Springer, Berlin, Heidelberg.
Wolfowitz, J. (1963). Products of indecomposable, aperiodic, stochastic matrices, Proceedings of the American
Mathematical Society, 14(5), 733-736.
Xiao, F., & Wang, L. (2008). Asynchronous consensus
in continuous-time multi-agent systems with switching
topology and time-varying delays, IEEE Transactions on
Automatic Control, 53(8), 1804-1816.
Yang, Y., Dimarogonas, D. V., & Hu, X. (2014). Opinion
consensus of modified Hegselmann-Krause models, Automatica, 50(2), 622-627.
Zheng, Y., & Wang, L. (2014). Containment control of heterogeneous multi-agent systems, International Journal of
Control, 87(1), 1-8.
Zheng, Y., Ma, J., & Wang, L. (2017). Consensus of Hybrid
Multi-agent Systems, IEEE Transactions on Neural Networks and Learning Systems, DOI:10.1109/TNNLS.2017.
2651402.
16
| 3cs.SY
|
1
The Stochastic Geometry Analyses of Cellular
Networks with α-Stable Self-Similarity
arXiv:1709.05733v1 [cs.IT] 18 Sep 2017
Rongpeng Li, Zhifeng Zhao, Yi Zhong, Chen Qi, and Honggang Zhang
Abstract—To understand the spatial deployment of base stations (BSs) is the first step to facilitate the performance analyses
of cellular networks, as well as the design of efficient networking
protocols. Poisson point process (PPP) has been widely adopted
to characterize the deployment of BSs and established the
reputation to give tractable results in the stochastic geometry
analyses. However, given the total randomness assumption in
PPP, its accuracy has been recently questioned. On the other
hand, the actual deployment of BSs during the past long evolution
is highly correlated with heavy-tailed human activities. The αstable distribution, one kind of heavy-tailed distributions, has
demonstrated superior accuracy to statistically model the spatial
density of BSs. In this paper, we start with the new findings
on α-stable distributed BSs deployment and investigate the
intrinsic feature (i.e., the spatial self-similarity) embedded in
the BSs. Based on these findings, we perform the coverage
probability analyses and provide the relevant theoretical results.
In particular, we show that for some special cases, our work could
reduce to the fundamental work by J. G. Andrews in [1]. We also
examine the network performance under extensive simulation
settings and validate that the simulations results are consistent
with our theoretical derivations.
Index Terms—Stochastic geometry, coverage probability, cellular networks, Poisson point process (PPP), α-stable distributions,
self-similarity
I. I NTRODUCTION
As a key enabler in the information and communications
technology (ICT) industry, cellular networks play a decisive
role in delivering communication messages and entertainment
content [2]. In order to meet the increasing traffic demand,
cellular network operators gradually deploy different types of
necessary infrastructure including lots of base stations (BSs).
To understand the spatial deployment of BSs is the first step
to facilitate the performance analyses of cellular networks,
as well as the design of efficient networking protocols. In
the earliest stages, a two-dimensional hexagonal grid model
was used, implying that BSs were deployed regularly, which
deviates from the real scenarios. In the recent stages, Poisson
point process (PPP) [1], [3]–[5] was assumed, which could
roughly model the randomness in the realistic deployment
of BSs in cellular networks, meanwhile leading to tractable
results. However, given the total randomness assumption in
PPP, its practical accuracy has been recently questioned [6],
[7]. Consequently, in order to reduce the modeling gap between the PPP model and the realistic spatial deployment of
R. Li, Z. Zhao, C. Qi and H. Zhang are with Zhejiang University, Hangzhou 310027, China (email:{lirongpeng, zhaozf, qichen7c, honggangzhang}@zju.edu.cn).
Y. Zhong is with Huazhong University of Science and Technology, Wuhan
430073, China (email: yzhong@hust.edu.cn).
BSs, other kinds of point processes have been exploited to
obtain more precise analytical results [8]. In particular, Poisson
cluster processes [9], [10] and Gauss-Poisson process [11] are
exploited to model the attractive behavior between BSs, while
Matérn hard core point process (MHCP) [12], Ginibre point
process (GPP) [8], [13], [14], and determinantal point process
[15] are studied to characterize the repulsive feature between
BSs [7], [16]–[18].
On the other hand, the actual deployment of BSs during the
past long evolution is highly correlated with human activities
[19]. Humans tend to live together with societal relationship,
and their social behaviors lead to mobile traffic hotspots, thus
causing BSs to be more densely deployed in certain areas.
Interestingly, according to an observation named “preferential
attachment” [20], Barabási et al. argued that many large
networks should grow to be heavy-tailed. As its names implies,
a heavy-tailed distribution has non-exponential bounded tail.
Mathematically, for a heavy-tailed random variable X, the
probability Pr(X > x) satisfies lim eκx Pr(X > x) = ∞,
x→∞
for all κ > 0. Many well-known statistical distributions including power-law distribution (also named as generalized Pareto
distribution), Weibull distribution, log-normal distribution, and
α-stable distribution [6], [21], [22] belong to the heavy-tailed
family. Therefore, heavy-tailed distributions appear to be more
suitable to capture the societal feature and clustering property
for the practical BSs.
Based on the practical BS deployment information, we have
validated that the α-stable distributions demonstrate superior
accuracy to statistically model the spatial density of BSs and
also outperform other aforementioned heavy-tailed distributions [7], [19], [23]–[25]. But the spatial density alone cannot
reach some intuitive conclusions. Fortunately, the α-stable
distributions, which have been widely adopted to characterize
the distribution of aggregated traffic at the BS level in cellular
networks and at the switch level in wired broadband networks,
often imply the self-similarity of traffic [22], [26]. As a popular
property in complex networks [27], the self-similarity of traffic
in the temporal domain means that the distribution of traffic
remains invariant under different temporal scales. Similar to
the case of traffic, as the practically deployed BSs are αstable distributed, it is natural to ask whether the spatial selfsimilarity holds in cellular networks. Furthermore, compared
to other point process models, the inhomogeneous PPP with αstable distributed density becomes applicable with significant
merit. The system model based on multiple tiers of PPPs
may lead to some tractable results, but it lacks the reasonable
explanation to divide the gradually deployed and increasingly
2
denser heterogeneous cells [28] into different tiers. On the
contrary, α-stable distributions contribute to understanding the
spatial self-similarity and bridging the gap between cellular
networks and other social behavior-based complex networks.
A. Related Works
Stochastic geometry tools have successfully established the
reputation to model and analyze wireless networks, as they
are able to capture the topological randomness in the network
geometry and lead to tractable analytical results [1], [3]–
[5], [9]–[18]. There is no doubt that the PPP belongs to
the most popular point process used in the literature because of its tractability and has led to a lot of meaningful
research results for cellular networks with different kinds of
cutting-edge techniques. The baseline operations in singletier and/or multiple-tier downlink cases are examined in [1],
[29]–[32] (and references therein) while their counterparts
in uplink cases are considered in references like [33]–[38].
User association and load balancing are examined in [39]–
[42]. Cognitive, cooperative and intelligent cellular networks
are taken into account in [18], [43]–[47]. Energy efficiency,
energy harvesting, and BS sleeping for green cellular networks
are investigated in [48]–[52]. Besides, multiple-input multipleoutput (MIMO) antenna and in-band full-duplex (FD) systems
are studied in [53]–[62]. Also, the PPP-related works have
been extended to mobile ad hoc networks [63]. Along with
the continuous progress in techniques for physical-layer and
network management in wireless networks, the PPP model
offers a useful theoretical platform for the initial performance
calibration, so as to save economic expenditure and avoid timeconsuming large-scale setup for realistic tests. For example,
FD communication, which benefits from the advance in signal
processing and self-interference cancellation techniques, is
optimistically promoted to double the spectral efficiency for
wireless networks [64]. However, given the more complicated
interference in FD networks, it is essential to conduct a careful
re-examination. Consistent with the system-level simulation
results in [64], [65] has taken advantage of the PPP model
and demonstrated the potential negative effect that FD communications might impose on the uplink transmission.
Although the PPP model provides many useful performance
trends, the concern about total independence between nodes
(e.g., BSs) has never stopped. Hence, in order to reduce the
modeling gap between the PPP model and the practical BS
deployment, point processes with either attractive or repulsive
spatial correlations have been explored as well.
• For attractive point processes, [66] has shown that Poisson cluster process is more suitable to model the spatial
distribution of BSs in urban areas. The general clustering
nature of deployed BSs in highly populated urban areas
clearly reflects the aggregation property of ever-growing
traffic demands in cellular networks [7]. [10] has further
verified the aggregated interference when the transmitting
nodes are modeled by Poisson cluster process and compared the corresponding results with that in the classical
PPP model.
• On the contrary, [29] and [67] have argued that BSs,
in particular macro BSs, in cellular networks tend to be
deployed systematically, such that any two BSs are not
too close. Thus, a spatial model based on a point process
with the repulsive nature seems to be more desirable
[29], [67]. Furthermore, the MHCP model [12] possesses
limited tractability and leaves many open challenges to
be addressed. The GPP model, one typical example of
determinantal point processes on the complex plane,
has been widely adopted and shows a promising tradeoff between accuracy and tractability [8], [13], [14]. In
particular, Deng et al. [8] have shown that the GPP leads
to the same trend curve of coverage probability1 as the
PPP.
Hence, we can come to the following conclusion that the
spatial BS density of large-scale cellular networks simultaneously possesses two conflicting features, that is, the density is
very large in some clustering regions while being significantly
smaller in others. The conclusion is also consistent with our
common sense. Furthermore, the heavy-tailed distributions,
which generate small values with the high probability but
still allow comparatively larger values, fit well to model the
spatial BS density. Our previous works [6], [7], [23]–[25] have
shown that the α-stable distribution, one kind of heavy-tailed
distributions, could be used to perfectly model the spatial BS
density in China and Italy, especially in urban areas.
In fact, α-stable distributions are not totally new to researchers in the communications field. On one hand, a distribution is called stable if a linear combination of two
independent identically distributed random variables has the
same distribution [21]. In particular, the Gaussian distribution,
which is one specific kind of α-stable distributions with α = 2,
has been widely adopted to model the distribution of channel
noise. On the other hand, α-stable distributions have been
observed for the distribution of wired broadband network
traffic [68] since two decades ago, and have recently been
found in modeling the cellular network traffic [22], [26]. αstable distributions also owe their importance in both theory
and practice to the generalization of the central limit theorem
[21] and the accompanying self-similarity [27], [69]–[71] of
the stable family. Furthermore, the well-known self-similarity
lays the very foundation for the traffic predictability, thus
making it possible to perform some actions beforehand. For
example, [70] has highlighted the practicability to perform
resource reservation schemes for the broadband network traffic
with self-similarity. Hence, as the spatial BS density could be
better modeled by the α-stable distributions, it is essential to
theoretically examine the spatial self-similarity and understand
its impact on coverage probability. In other words, we will take
the very first step to investigate the spatial self-similarity in the
BS deployment and perform stochastic geometry analyses of
cellular networks when the BS density is α-stable distributed.
B. Contributions
Different from the previous works, this paper aims at
explaining the implications to statistically model the spatial
1 The coverage probability indicates the probability that the signal-tointerference-plus-noise ratio (SINR) for a mobile user achieves a target
threshold.
3
BS density by α-stable distributions and to build the theory
to derive the coverage probability mathematically. Belonging
to one of the precursor works, we take advantage of a large
amount of practical BS deployment records and provide the
following key insights:
• Firstly, this paper visits and confirms the self-similarity in
the spatial deployment of BSs. To our best knowledge, it
is the first work in the literature to validate the spatial selfsimilarity among BSs in cellular networks. Therefore, this
paper lays the foundation to apply the advance in complex
network theory to examine cellular networks.
• Secondly, this paper provides the approach to characterize the coverage probability and derive the computable
representation when the spatial BS deployment satisfies
the self-similarity and the density of the practical BSs
obeys α-stable distributions.
• Thirdly, this paper theoretically proves that for some special cases, our result could be reduced to the fundamental
work by J. G. Andrews in [1]. Besides, this paper studies
the coverage probability performance under extensive
simulation settings and validates that the simulations
results are consistent with our theoretical derivations. The
paper also evaluates the impact of self-similarity on the
coverage probability performance.
The remainder of the paper is organized as follows. In Section II, we present some necessary mathematical background,
introduce the realistic dataset of spatial BS deployment and
validate the spatial self-similarity. In Section III, we provide
the analyses of coverage probability. Section IV evaluates the
computable representation obtained by the theoretical analysis
and compares it with the classical PPP model. Finally, we
conclude this paper in Section V.
Our previous works [6], [23] have validated that β = 1
holds for the fitting results of actual spatial BS density in
both Hangzhou, China and Rome, Italy. For simplicity of
representation, we use the operator b ∼ c to denote that b and
c have the same distribution and further have λ ∼ S(α, σ, µ)
to indicate that the spatial BS density λ follows the α-stable
distributions with β = 1.
2) The self-similarity: The self-similarity has been mostly
applied to model time series [69]. Given zero-mean, stationary
time series Y = (Yt , t = 1, 2, 3, · · · ), Y is called as self(m)
similar process if its m-aggregated series Y (m) = (Yt , t =
tm
P
(m)
Yk satisfy
1, 2, 3, · · · ) with each element Yt
=
k=(t−1)m+1
(m)
Yt
H
∼ m Yt for all m > 0, where H ∈ (0, 1) is the Hurst
parameter indicating the decay rate of statistical dependence
of two points with increasing time interval. In other words,
the self-similarity implies that the time series is exactly or
approximately similar to a part of itself.
The concept of self-similarity is also applicable to spatial
scenarios. For example, H. ElSawy et al. [16] have shown
the aggregated interference from distributed nodes to a receiver obey α-stable distributions, while X. Ge et al. [72]
have verified that the statistical characteristics of the wireless
cellular coverage boundary possess the self-similarity or fractal
property.
However, no exact self-similar phenomenon exists in the
real world. Most of the self-similar phenomena observed in the
real world only have the statistical characteristic. Moreover,
the self-similarity of random processes is usually evaluated
by the Hurst parameter, which can be estimated using two
typical methods and should be in the interval (0, 1).
• The rescaled adjusted range statistic (R/S) method:
For the random process
Yt , the partial sum is dePn
noted
by
Z(n)
=
Y
, and then the sample varit
II. M ATHEMATICAL BACKGROUND AND S TATISTICAL
t=1
Pn
Z(n) 2
t=1 (Yt − n )
M ODELING
.
ance could be denoted by S 2 (n) =
n
R(n)
A. Mathematical Background
The R/S statistic could be formulated as S(n) =
i
i
max (0,Z(i)− n
Z(n))− min (0,Z(i)− n
Z(n))
Beforehand, Table I summarizes the most used notations in
0≤i≤n
0≤i≤n
. The log-log
S(n)
this paper.
relationship between the R/S statistic and n should also
1) α-Stable distributions: A random variable x is said to
be linear with a slope of H.
obey the α-stable distribution f (x) if there are parameters
• The variance-time (V-T) method: This involves the aggre0 < α ≤ 2, σ ≥ 0, −1 ≤ β ≤ 1, and µ ∈ R such that its
(m)
gated series Yt
and the blocking size m. The log-log
characteristic function is of the following form:
(m)
plot of the variance of Yt
with respect to m should
Φ(ω) = E (exp(jωx)) =
follow a straight line with the slope ι if the data are
πα
n
o
statistical self-similar. In this case, H = 1 − 2ι .
α
α
+ jµω , α 6= 1;
exp −σ |ω| 1 − jβsgn(ω) tan 2
Moreover, a larger H ∈ (0.5, 1) corresponds to stronger self
2β
similarity.
exp −σ|ω| 1 + j sgn(ω) ln |ω| + jµω , α = 1.
π
(1)
The function E(·) represents the expectation operation with B. Statistical Modeling
respect to a random variable. α is called the characteristic
As validated in [6], [23], [25], when we divide the region
exponent and indicates the index of stability, while β is iden- into several parts and calculate the corresponding probability
tified as the skewness parameter. α and β together determine density function (PDF) of the spatial BS density in each part,
the shape of the distribution. Moreover, σ and µ are called we observe that the PDF follows the α-stable distributions.
scale and location shift parameters, respectively. In particular, For example, Fig. 1(a) depicts that a region is divided into
if α = 2, the α-stable distribution reduce to the Gaussian four parts. The spatial BS density in each part λ1 , λ2 , λ3 and
λ4 are mutually dependent and obey the α-stable distributions
distribution.
4
TABLE I
A
Λ(s, b, c)
Ξ(s, b, c)
The coverage probability
α-stable distributions with stability α, skewness β = 1, scale σ and shift µ
Pathloss exponent
The Rayleigh fading gain for the signal link
The fading exponent for the interfering links
Rayleigh fading factor
Noise factor
The Hurst parameter
The self-similarity zooming parameter
The predefined radius of inner circle in Fig. 1
The spatial density of BSs
The number of BSs within an r-radius R
circle
The standard Gamma function Γ(d) = 0∞ tRd−1 e−t dt
The incomplete Gamma function Γ(d, x) = x∞ td−1 e−t dt
def
Θ(s, b, c) = (sg)2/δ Γ(− 2δ + 1, sgb−δ ) − Γ(− δ2 + 1, sgc−δ )
def
Λ(s, b, c) = c2 1− exp −sgc−δ − b2 1 − exp −sgb−δ
def
Ξ(s, b, c) = πEg Λ(s, b, c) − Θ(s, b, c)
–
α = 0.6, σ = 0.25 and µ = 0.25
δ=4
–
Assumed to follow Rayleigh fading.
ζ=1
N0 = 1 (i.e., SNR = 0 dB)
H = 0.9
a=2
R = 40
–
–
–
–
(a)
(b)
l1
–
(c)
N 3 N 2 N1
3R
l3
lS l1
R
l4
–
2R
l2
–
aR
Θ(s, b, c)
Default Value in Sec. IV
R
pc
S(α, σ, µ)
δ
h
g
ζ
N0
H
a
R
λ
N (r)
Γ(d)
Γ(d, x)
Meaning
r
Symbol
LIST OF THE MAIN SYMBOLS AND FUNCTIONS IN THE PAPER .
Fig. 1. An illustration of the self-similarity for the spatial BS deployment.
with the same values α, σ and µ. The correlation between
BS density in different parts makes it challenging to directly
derive the coverage probability. Instead, it is essential to take
the statistical modeling of the correlation into consideration. In
that regards, self-similarity emerges as a promising technique
to characterize the correlation of the spatial density, as it has
manifested its importance and effectiveness by modeling the
correlation in different scales.
In order to show the self-similarity in spatial BS deployment, we take advantage of the collected BS deployment
records in Hangzhou, China and Rome, Italy2 . Fig. 2(a) and
2(d) illustrate the corresponding deployment situation in both
cities. Similar to the common validation process in temporal
dimension [69], we verify the accuracy of self-similarity in
spatial BS deployment as follows. As depicted in Fig. 1(b),
we randomly select a point as the starting “origin point” and
thus get some concentric circles with increasingly larger radii
(e.g., from R to 2R, 3R, · · · ). Then, we could get a series,
each value corresponding to the number of BSs in one circle.
Afterwards, we could apply the aforementioned R/S method
and V-T method in Section II-A2. Fig. 2(b)(c) and Fig. 2(e)(f)
2 Interested readers could also refer to [25] to check our preliminary results
on the spatial self-similarity in a more systematic manner.
provide the corresponding log-log plots for both cities. From
these figures, it can be observed that all the estimated Hurst
parameters are very close to 1. Therefore, we could boldly
argue that the spatially deployed BSs possess the spatial selfsimilarity. Then, according to the definition of self-similarity,
the number of BSs N (aR) within a circle of radius aR should
satisfy that N (aR) ∼ aH N (R), ∀R, a > 0, 0 ≤ H < 1,
where a indicates the self-similarity zooming parameter and
H denotes the Hurst parameter.
Remark 1. For cellular networks, the number of BSs exhibit
the spatial self-similarity.
III. T HE C OVERAGE P ROBABILITY A NALYSES
In this part, we derive the coverage probability in a downlink cellular network. Specifically, the coverage probability
is defined as the probability that the SINR for a mobile
user achieves a target threshold. Mathematically, the coverage
probability is formulated as
hr−δ
P(SINR > T ) = P
>T ,
(2)
N0 + Ir
where δ denotes the pathloss exponent factor of the standard
propagation channel. N0 is the additive white Gaussian noise
5
(a) BS Deployment in
Hangzhou, China
2.5
2
200
1.5
150
0.5
50
0
0
50
150
100
150
1.94
1.92
1.9
-0.5
0
log(Var) vs. log(m)
fitting line
1.96
1
100
(c) V-T Method
H=0.97553
1.98
log(R/S) vs. log(n)
fitting line
log(Var)
250
log(R/S)
km
300
(b) R/S Method
H=0.96645
1.88
0
0.5
1
1.5
2
0
0.5
1
km
log(n)
log(m)
(d) BS Deployment in
Rome, Italy
(e) R/S Method
H=0.84158
(f)V-T Method
H=0.86876
2
1.2
log(R/S) vs. log(n)
fitting line
1.5
1.5
log(Var) vs. log(m)
fitting line
1.1
1
log(Var)
km
log(R/S)
100
0.5
1
0.9
50
0
0.8
-0.5
0
0
50
100
150
200
250
300
0.7
0
0.5
km
1
1.5
2
0
0.5
log(n)
1
1.5
log(m)
Fig. 2. The self-similarity modeling results for the spatial BS deployment in Hangzhou and Rome.
(AWGN) factor and T is the target threshold. Besides, assuming that the fading follows the Rayleigh fading, we have
h ∼ exp(ζ). Without loss of generality, we assume the mobile
user is located at the “origin point”. When the distance from a
mobile user to its serving BS b0 is r, Ir denotes the cumulative
interference from all other BSs i (except BS b0 ) to the mobile
user.
A. Impact of α-Stable Distributions and Self-similarity
Before delving into the coverage probability, we first talk
about how the α-stable distributions and the self-similarity will
mathematically shape the BS deployment?
As depicted in Fig. 1(c), we assume that there exists a
specific R (i.e., R > r) to divide the whole region of interest
into two parts. Besides, the spatial BS density λ for the region
within the radius R satisfies λ ∼ S(α, σ, µ). Moreover, we
can have the following lemma to characterize the spatial BS
density λS for the region outside the radius R.
Lemma 1. The spatial BS density λ has a Laplace transform
σα α
exp − cos πα s − µs , α 6= 1;
2
Ψ(s) = E (exp(−sλ)) =
2σ
exp
s ln s − µs , α = 1.
π
(3)
while the spatial BS density λS will follow α-stable distributions (i.e., λS ∼ λaH−2 ) and the corresponding Laplace
transform could be formulated as
ΨS (s)
= E (exp(−sλS ))
σ α aα(H−2) α
H−2
exp
−
s
−
sa
µ
, α 6= 1;
cos πα
2
=
2σaH−2
H−2
exp
s
[ln
s
+
(H
−
2)
ln
a]
−
sa
µ
,
π
α = 1.
(4)
Proof. Following the definition of self-similarity, the number
of BSs in the interfering region is coupled with the selfsimilarity zooming parameter a and could be formulated as
N (aR) = λS πa2 R2 ∼ aH N (R) = λπaH R2 . Therefore,
λS ∼ λaH−2 .
(5)
When x ∼ S(α, σ, 0), we get the corresponding Laplace
transform (Proposition 1.2.12, [21]) as
σα α
exp − cos πα s , α 6= 1;
2
Ψ(s) = E (exp(−sx)) =
2
exp σ s ln s , α = 1.
π
(6)
6
α
(πσ)α 2α−1
exp −µπr2 − (πσ) r2α
2µπr
+
2α
, α 6= 1;
r
cos πα
cos πα
f (r) =
2
2
exp −µπr2 + 2σr2 ln(πr2 ) 2µπr + 4σr ln(πr2 ) + 4σr , α = 1.
(
σ α aα(H−2) h
Λ(s, R, aR)
πE
Λ(s,
r,
R)
−
Θ(s,
r,
R)
−
exp
−
λπE
g
g
cos πα
2
)
iα
H−2
− Θ(s, R, aR)
−a
µπEg Λ(s, R, aR) − Θ(s, R, aR) , α 6= 1;
(
LIr (s) =
o
i
n
h
exp 2σaH−2 ln πEg Λ(s, R, aR) − Θ(s, R, aR) + (H − 2) ln a − πaH−2 µ
)
· Eg Λ(s, R, aR) − Θ(s, R, aR) − λπEg Λ(s, r, R) − Θ(s, r, R) , α = 1.
ΨS (s)
By merging Eq. (6) and Eq. (7), we obtain the result.
(12)
0, ∀λ < 0. The equation (b) is originated from the Laplace
transform for a variable k ∼ S(α, σ, 0) in Eq. (6).
So, the PDF of r
Then, the Laplace transform of λS could be derived as
= E exp(−saH−2 (x + µ))
= Ψ(saH−2 ) · exp −saH−2 µ .
(8)
(7)
f (r) =
B. The PDF of the Distance from Serving BS to UE
In this paper, we adopt the minimum distance as the user
association metric. Therefore, when the distance from a mobile
user to its serving BS b0 is r, all distances from the interference
BSs to the target mobile user must be larger than r. The
derivation methodology of the PDF of r could basically
follow the well-established lines in [1]. However, as the BS
density varies in space and obeys the α-stable distributions,
the derivations should be re-considered. Therefore, we give
the following the theorem.
Theorem 1. The PDF of the distance from the closest BS r
to the target mobile user in a cellular network with α-stable
distributed BS density is expressed in Eq. (8).
Proof. Firstly, we take advantage of the simple fact that the
null probability of a 2-D Poisson process in an area A with
the given density λ is exp(−λA). Since λ ∼ S(α, σ, µ), we
have
P [r > rT ]
= P(No BS closer than rT )
Z ∞
2
e−λπ(rT ) f (λ)dλ
=
Z0 ∞
Z ∞
2
(a)
−λπ(rT )2
=
e
f (λ)dλ =
e−(k+µ)π(rT ) f (k)dk (9)
−∞
−∞
α
(πσ)
2α
exp −µπ(rT )2 −
, α 6= 1;
(rT )
(b)
cos πα
=
2
exp −µπ(r )2 + 2σ(r )2 ln(π(r )2 ) , α = 1,
T
T
T
where the equation (a) is based on the fact that the spatial
density in physical worlds should be non-negative, or f (λ) =
dF (r)
d (1 − P [r > rT ])
=
dr
drT
(10)
Then, merging Eq. (9) with Eq. (10) leads to the result.
Corollary 1. For homogeneous PPP with static density λ, the
PDF of r could reduce to f (r) = exp(−λπr2 )2πλr. Similarly,
for varying distribution λ, the conditional probability P(r|λ) =
exp(−λπr2 )2πλr.
This corollary could be achieved by directly applying Theorem 1 with a static density λ = µ and thus σ = 0. It is also
consistent with the conclusions in [1].
C. Main Result
We now state our main result for the coverage probability
analysis. Generally, the coverage probability pc is mainly
determined by the SINR threshold T , the spatial BS density
distribution S(α, σ, µ), and the pathloss exponent δ. In some
sense, pc (T, S(α, σ, µ), δ) is tightly coupled with the cumulative interference Ir for the α-stable distributed and selfsimilar BS deployment. The following lemma characterizes
the relationship between pc (T, S(α, σ, µ), δ) and Ir .
Lemma 2. The coverage probability pc (T, S(α, σ, µ), δ) could
be obtained from the following formula, that is,
pc (T, S(α, σ, µ), δ)
ZZ
δ
e−ζT r N0 LIr (ζT rδ )P(r|λ)f (λ)drdλ,
=
(11)
r>0,λ>0
where LIr (s) is the Laplace transformation of random variable
Ir evaluated at s conditioned on the distance to the closest BS
from the origin. The Rayleigh fading coefficient is assumed
to satisfy h ∼ exp(ζ).
We leave the proof of Lemma 2 in Appendix A, as the
proof could be simply obtained by calculating the condition
probability on the distance r from the serving BS to the mobile
user.
7
exp −λS
L∆S (s) =
(1 − f (x))dx f (λS )dλS
λS =0
∆S
Z
α
Z
σ α aα(H−2)
H−2
(1 − f (x))dx
(1 − f (x))dx , α 6= 1;
−a
µ
exp − cos πα
∆S
∆S
(a)
2
(
(16)
=
Z
Z
)
H−2
2σa
H−2
ln
(1 − f (x))dx + (H − 2) ln a − a
µ
(1 − f (x))dx
, α = 1.
exp
π
∆S
∆S
(
!)
!#α
"
σ α aα(H−2)
H−2
exp −
, α 6= 1;
−a
µπEg Λ(s, R, aR) − Θ(s, R, aR)
πEg Λ(s, R, aR) − Θ(s, R, aR)
cos πα
2
!)
!
("
(
(b)
H−2
=
+ (H − 2) ln a
exp
2σa
ln πEg Λ(s, R, aR) − Θ(s, R, aR)
!)
#
H−2
, α = 1.
− πa
µ · Eg Λ(s, R, aR) − Θ(s, R, aR)
Z
∞
Z
Next, we focus on how to calculate the Laplace transform
of the cumulative interference LIr (s), when the BS deployment obey α-stable distributions and self-similarity. In Section
III-A, we divide the region of interest into two concentric
circles. For the inner circle ∆ with a radius R, the impact
of the spatial BS density λ is similar to the impact of r and
explicitly represented by the latter’s PDF f (r). Meanwhile,
the outer circle ∆S with the radius spanning from R to aR
has a spatial BS density λS ∼ λaH−2 and understanding
the impact of the interference from BSs in the outer circle is
one of the core contributions
Pof this paper. ForPsimplicity of
representation, we let Ir = i∈∆/b0 gi R̂i−δ + i∈∆S gi R̂i−δ
to denote the cumulative interference from all the other BSs i
(except the serving BS b0 ) to the mobile user with the distance
R̂i and pathloss gi . We could obtain the following lemma,
Lemma 3. The Laplace transform of the cumulative interference Ir for a cellular network with α-stable distributed
def
BSs could be formulated as Eq. (12), where Θ(s, b, c) =
2
−δ
2/δ
) − Γ(− 2δ + 1, sgc−δ ) . Γ(d, x) =
(sg)
δ + 1, sgb
R ∞ d−1 Γ(−
−t
t e dt Rdenotes the incomplete Gamma function,
x
∞
while Γ(d) = 0 td−1 e−t dt denotes the standard Gamma
def
function.
Besides, Λ(s,
b, c) = c2 1 − exp −sgc−δ −
b2 1 − exp −sgb−δ .
The equation (a) comes from the identical, independent distribution of gi and its further independence from the point
process.
From Eq. (13), it can be observed that the
Laplace transform his composedh of two parts
ii (i.e.,
Q
−δ
and
exp
−sg
R̂
E
L∆ (s)
=
E∆
g
i
ii
hQ i∈∆/b0 h
−δ
), which
L∆S (s) = E∆S
i∈∆S Eg exp −sg R̂i
is also consistent with our intuition. Next, we derive the
representation of these two parts separately.
• For L∆ (s), we have a fixed spatial density λ. Then, from
Q
the Campbell
theorem [12],
x∈∆ f (x) =
we have E
R
exp −λ ∆ (1 − fh(x))dx
i
.
Since f (x) = Eg exp −sg R̂−δ , we have
Z
(1 − f (x))dx
∆
Z R
vdv
1 − Eg exp −sgv −δ
= 2π
r(
)
(a)
= πEg Λ(s, r, R) − Θ(s, r, R)
We leave the derivation of the equation (a) in Appendix
B. Accordingly, we have
!#
"
Proof. According to the definition of Laplace transform, we
have
LIr (s)
= EIr e−sIr
= E∆
· E∆S
"
Y
i∈∆/b0
Y
i∈∆S
L∆ (s) = exp −λπEg Λ(s, r, R) − Θ(s, r, R)
(15)
For L∆S (s), as λS ∼ λaH−2 , we have Eq. (16),
where the equation (a) comes from the Laplace
transform of λS in Lemma 1. RThe equation (b) is
achieved by applying the result ∆S (1 − f (x))dx =
πEg {Λ(s, R, aR) − Θ(s, R, aR)}, which can be obtained by adopting a similar methodology as the derivation of Eq. (14).
Combining Eq. (15) and Eq. (16), we obtain the result.
•
= E∆+∆s ,gi exp −s
(a)
(14)
X
i∈(∆+∆s )/b0
gi R̂i−δ
i
h
−δ
Eg exp −sg R̂i
#
i
h
−δ
Eg exp −sg R̂i
(13)
With the results above, we could obtain the final result in
the following theorem.
8
pc (T, S(α, σ, µ), δ)
Z
n σ α aα(H−2)
α
=
2πr exp −
Ξ(ζT rδ , R, aR) − aH−2 µΞ(ζT rδ , R, aR) − µΞ(ζT rδ , r, R)
πα
cos 2
r>0
o h σα α
i
σα
δ
2 α
2
δ
δ
2 α−1
·
(Ξ(ζT
r
,
r,
R)
+
πr
)
−
µπr
−
ζT
r
N
(Ξ(ζT
r
,
r,
R)
+
πr
)
+
µ
dr
−
0
cos πα
cos πα
2
2
pc (T, S(α, σ, µ), δ)
(
Z
2πr exp
=
r>0
δ
h 2σaH−2
i
ln Ξ(ζT rδ , R, aR) + (H − 2) ln a − aH−2 µ Ξ(ζT rδ , R, aR)
π
2σΞ(ζT r , r, R) + 2σπr2
ln(Ξ(ζT rδ , r, R) + πr2 ) − µΞ(ζT rδ , r, R) − µπr2
) π
i
h 2σ
ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 + µ dr
− ζT rδ N0 · −
π
+
Υ(r) =
Z
λ>0
(
"
δ
δ
!
exp −λπ Eg Λ(ζT r , r, R) − Θ(ζT r , r, R)
+r
2
#)
Proof. From Lemma 2, the coverage probability could be
calculated as
o
σα
δ
2 α
2
δ
πα (Ξ(ζT r , r, R) + πr ) − µπr − ζT r N0
cos 2
h σα α
i
δ
2 α−1
·
(Ξ(ζT
r
,
r,
R)
+
πr
)
+
µ
dr
(21)
cos πα
2
2) if α = 1
r>0
where the equation (a) is the direct result of Corollary 1 and
Lemma 3 and Υ(r) couldRbe formulated as Eq. (20), where
the equation (b) is due to x e−sx xf (x)dx = − dΦ(s)
ds .
Merging Eq. (20), Eq. (19), and Lemma 3, we have the
result.
When we consider the whole region (i.e., the outer circle
spanning from R to ∞, or a → 0), we get the following
corollary.
Corollary 2. When a → ∞, the coverage probability could be
reduced to
1) if α 6= 1
Z
n
2πr exp − µΞ(ζT rδ , r, R)
pc (T, S(α, σ, µ), δ) =
r>0
Z
r>0
(19)
(20)
−
pc (T, S(α, σ, µ), δ) =
pc (T, S(α, σ, µ), δ)
ZZ
δ
e−ζT r N0 LIr (ζT rδ )P(r|λ)f (λ)drdλ
=
Z r>0,λ>0
δ
(a)
2πre−ζT r N0 L∆s (ζT rδ )Υ(r)dr
=
(18)
λf (λ)dλ
n
o
σα
exp −
(Ξ(ζT rδ , r, R) + πr2 )α − µΞ(ζT rδ , r, R) − µπr2
πα
cos 2
h σα α
i
δ
2 α−1
·
(Ξ(ζT
r
,
r,
R)
+
πr
)
+
µ
, α 6= 1
(b)
cos πα
2
=
n 2σΞ(ζT rδ , r, R) + 2σπr2
ln(Ξ(ζT rδ , r, R) + πr2 ) − µΞ(ζT rδ , r, R)
exp
π
oh 2σ
i
− µπr2 −
ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 + µ , α = 1
π
Theorem 2. The coverage probability in a cellular networks
with α-stable distributed BS density and the self-similarity
is given by Eq. (17) and Eq. (18) for α 6= 1 and α = 1,
respectively, where Ξ(s, b, c) = πEg (Λ(s, b, c) − Θ(s, b, c)).
(17)
2πr exp
(
− µΞ(ζT rδ , r, R) − µπr2
2σΞ(ζT rδ , r, R) + 2σπr2
− ζT rδ N0 +
ln(Ξ(ζT rδ , r, R)+
π
)
i
h
2σ
ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 dr (22)
πr2 ) · µ −
π
Proof. Firstly, we have
h
r δ i
lim a2 R2 1 − exp −ζT g(
)
a→∞
aR
r δ
R2 1 − exp −ζT g( aR
)
= lim
2
a→∞
1/a
r δ δ
) k
R2 1 − exp −ζT g( R
= lim+
(23)
k2
k→0
δ
−ζT g(δ − 1) Rrδ−2
r
(a)
exp −ζT g( )δ k δ k δ−2
= lim+
2
R
k→0
=0
where the equation (a) comes from the l’Hôpital’s Rule and
applies the fact that the pathloss exponent δ ≥ 2.
9
#
α−1
2(ζT g)2/δ r2
2
2
σα
πEg
Γ(− , ζT g) − Γ(− )
+µ ·
pc (T, S(α, σ, µ), δ) =
2πr
cos πα
δ
δ
δ
r>0
2
!α
(
2(ζT g)2/δ r2
2
2
σα α
Γ(− , ζT g) − Γ(− )
− ζT rδ N0
exp −
πEg
cos πα
δ
δ
δ
2
!)
2(ζT g)2/δ r2
2
2
− µπEg
Γ(− , ζT g) − Γ(− )
dr
δ
δ
δ
!
Z
2(ζT g)2/δ r2
i
h
2
2σ
2
ln πEg
+1 ·
Γ(− , ζT g) − Γ(− )
2πr µ −
pc (T, S(α, σ, µ), δ) =
π
δ
δ
δ
r>0
(
2(ζT g)2/δ r2
2(ζT g)2/δ r2
2
2
Γ(− , ζT g) − Γ(− ) ln πEg
exp − ζT rδ N0 2σEg
δ
δ
δ
δ
!
)
2/δ
2
2(ζT g) r
2
2
2
2
− µπEg
dr
Γ(− , ζT g) − Γ(− )
Γ(− , ζT g) − Γ(− )
δ
δ
δ
δ
δ
"
Z
Hence, as a → ∞, we have aH−2 → 0 for H ∈ (0, 1). So,
a
H−2
lim R2 1 − exp −ζT g( Rr )δ
R→∞
!
= aH−2 πEg Λ(s, b, c) − Θ(s, b, c)
h
r i
=a
πEg − R 1 − exp −ζT g( )δ
R
!
r
2
− (ζT g)2/δ r2 Γ(− + 1, ζT g( )δ )
δ
R
= πEg
(24)
− r2 [1 − exp (−ζT g)] − (ζT g)2/δ r2 ·
!
h
r i
2
Γ(− + 1, ζT g) + πEg R2 1 − exp −ζT g( )δ
δ
R
!
r
2
(27)
+ (ζT g)2/δ r2 Γ − + 1, ζT g( )δ
δ
R
2
− r2 [1 − exp (−ζT g)] + (ζT g)2/δ r2 Γ(− + 1)
δ
!
2
− (ζT g)2/δ r2 Γ(− + 1, ζT g)
δ
!
2
2
2(ζT g)2/δ r2
(a)
2
Γ(− , ζT g) − Γ(− )
= −πr + πEg
δ
δ
δ
→ πEg
→0
From Theorem 2, it can be observed that when
→ ∞, only the term aH−2 Ξ(ζT rδ!
, R, aR) =
will be af-
fected. We have the conclusion.
Based on Corollary 2, we have the following remark.
Remark 2. When we expand the interference to the whole
region, the cumulative interference from the outer circle could
be negligible and the coverage probability is mainly contingent
on the SINR within the inner circle.
When R → ∞, we can further simplify the results to get
more interesting insight.
Theorem 3. When R → ∞, the coverage probability could
be reduced to Eq. (25) and Eq. (26) for α 6= 1 and α = 1,
respectively.
Proof. Similar to the lines to proveCorollary 2, we
r δ
)
=
0 and
have
lim a2 R2 1 − exp −ζT g( aR
R→∞
2.
Ξ(ζT rδ , r, R) = πEg Λ(s, b, c) − Θ(s, b, c)
2
aH−2 πEg Λ(ζT rδ , R, aR) − Θ(ζT rδ , R, aR)
≥
δ
!
h
r δ i
+ aH−2 πEg a2 R2 1 − exp −ζT g(
)
aR
!
r δ
2
2/δ 2
) )
+ (ζT g) r Γ(− + 1, ζT g(
δ
aR
a
0 for all δ
(26)
Then lim Ξ(ζT r , R, aR) = 0. On the other hand, as
R→∞
R → ∞,
δ
Ξ(ζT r , R, aR)
H−2
=
(25)
where the Equation (a) comes from Γ(s, x) = (s − 1)Γ(s −
1, x) + xs−1 e−x and Γ(s) = (s − 1)Γ(s − 1).
There, we obtain the result in the theorem after simple
mathematical manipulations.
Next, we state the coverage probability when extra constraints are imposed, that is, the spatial density in the inner
circle is fixed (i.e., σ = 0 and λ = µ in Theorem 3). We get
the following corollary.
Corollary 3. The coverage probability in cellular networks
with fixed spatial BS density is
pc (T, S(α, 0, λ), δ)
(
Z
2(ζT g)2/δ r2
=
2πµr exp − ζT rδ N0 − µπEg
δ
r>0
10
1
0.9
-Stable theory, SNR = 20 dB
-Stable theory, SNR = 0 dB
PPP theory, SNR = 20 dB
PPP theory, SNR = 0 dB
-Stable simulation, SNR = 20 dB
-Stable simulation, SNR = 0 dB
PPP simulation, SNR = 20 dB
PPP simulation, SNR = 0 dB
Coverage Probability
0.8
0.7
0.6
0.7
0.5
0.4
0.3
0.6
0.5
0.4
0.3
0.2
0.2
0.1
0.1
0
-10
-Stable, = 0.25
-Stable, = 25
-Stable, = 100
PPP, = 0.25
PPP, = 25
PPP, = 100
0.8
Coverage Probability
0.9
-8
-6
-4
-2
0
2
4
6
8
0
-10
10
-8
-6
-4
SINR Threshold (dB)
Fig. 3. The coverage probability comparison under different SNR environment.
!)
dr
0
2
4
6
8
10
Fig. 4. The coverage probability comparison under various (average) spatial
BS densities.
0.9
(28)
Remark 3. When the spatial density is fixed and equals λ,
the self-similarity patterns no longer take effect and our result
could be reduced to the well-recognized conclusions obtained
by J. G. Andrews et al. in [1].
IV. N UMERICAL A NALYSES
In this part, we provide numerical evaluations through which
we compare the coverage probability of the cellular network
with α-stable distributed BS density and the classical PPP
model. Our simulation parameters are configured according to
Table I. In particular, the default spatial BS density for the PPP
model is consistent with that in [1]. As [21] states that when
α ∈ (0, 1), the mean value of S(α, σ, µ) equals µ. Therefore,
it is fair to compare the network with α-stable distributed BS
density and the classical PPP model.
Firstly, we leverage the theoretical analysis results and give
the coverage probability comparison under different AWGN
environment in Fig. 3. From the figure, the network with αstable distributed BS density exhibits significant performance
improvement than the PPP model in low SNR environment
while the performance gap becomes gradually narrow along
with the increase of SNR. On the other hand, the performance
gap between SNR = 0 dB and SNR = 20 dB is only 4 dB
and 6 dB for the α-stable model and the PPP, respectively,
which demonstrates that the cellular network is interferencelimited rather than noise-limited. Fig. 3 also depicts the results
by Monte Carlo simulations (see the dashed or dotted curves)
and each curve is averaged under 15000 iterations. It can be
observed that the results obtained by Monte Carlo simulations
match well with those obtained by the theoretical analyses,
which further verifies the correctness of our theoretical derivations.
Fig. 4 illustrates interesting coverage probability comparison under various (average) spatial BS densities. It shows that
µ = 0.25 has lead to remarkable coverage probability and
-Stable,
-Stable,
-Stable,
PPP
0.8
= 0.5
= 0.7
= 0.9
0.7
Coverage Probability
h
2 i
2
Γ(− , ζT g) − Γ(− )
δ
δ
-2
SINR Threshold (dB)
0.6
0.5
0.4
0.3
0.2
0.1
-10
-8
-6
-4
-2
0
2
4
6
8
10
SINR Threshold (dB)
Fig. 5. The impact of α on the coverage probability comparison.
also made the networks to be interference-limited. Therefore,
further increasing the spatial density would add more to the
aggregated interference and impose negative impact on the
coverage probability. It also implies that the influence of
the spatial BS density on the coverage probability is rather
sophisticated. Fig. 5 and Fig. 6 further examine the impact of
α and σ. They show that when α becomes larger or σ gets
smaller, the network coverage probability increases. In some
cases, the network with α-stable self-similarity could produce
interior performance than the PPP model.
Next, we focus on the impact of the spatial self-similarity on
the coverage probability. Recalling the statements in Section
II-A2, the spatial self-similarity is examplified by the relationship N (aR) ∼ aH N (R) or λS ∼ aH−2 λ. Therefore, we
examine the coverage probability when a and H differs and
provide the corresponding results in Table II. From the table,
we observe increasing H or decreasing a will result in a slight
reduction of the coverage probability. The trivial impact of
a and H on the network performance can be explained as
that a variation of H or a will make the spatial BS density
11
TABLE II
A
SUMMARY OF THE NETWORK COVERAGE PROBABILITY UNDER DIFFERENT a AND
SNR
-10 dB
0 dB
10 dB
a=2
H = 0.9
a = 20
H = 0.9
α-Stable
a = 200
H = 0.9
a=2
H = 0.1
a=2
H = 0.5
PPP
0.8015
0.4437
0.1355
0.8019
0.4441
0.1357
0.8020
0.4443
0.1357
0.8016
0.4439
0.1356
0.8016
0.4438
0.1355
0.7531
0.3580
0.1153
0.9
0.9
-Stable,
-Stable,
-Stable,
-Stable,
PPP
0.8
= 0.25
= 2.5
= 25
= 250
-Stable, R = 40
-Stable, R = 1
-Stable, R = 0.5
PPP
0.8
0.7
Coverage Probability
Coverage Probability
0.7
0.6
0.5
0.4
0.3
0.6
0.5
0.4
0.3
0.2
0.2
0.1
0
-10
H.
-8
-6
-4
-2
0
2
4
6
8
0.1
-10
10
-8
-6
-4
SINR Threshold (dB)
-2
0
2
4
6
8
10
SINR Threshold (dB)
(a) The impact of R
Fig. 6. The impact of σ on the coverage probability comparison.
0.9
-Stable, = 2.5
-Stable, = 3
-Stable, = 4
PPP, = 2.5
PPP, = 3
PPP, = 4
0.8
0.7
Coverage Probability
λS of the outer circle larger from a probabilistic sense, thus
making BSs over-crowded and generating huge interference.
This phenomenon that stronger self-similarity incurs negative
impact is also consistent with its counterpart of self-similar
Ethernet traffic. As stated in [73], stronger self-similarity in
Ethernet traffic will make heavier traffic prone to arrive in a
sequel and congest the network.
We continue the performance analyses in Fig. 7(a) and Fig.
7(b). Fig. 7(a) shows reducing R will cause a reduction of
coverage probability for low SINR threshold but an increment
for high SINR threshold. On the other hand, consistent with
our intuition, Fig. 7(b) depicts that a smaller pathloss exponent
will bring a lower coverage probability. However, the network
with α-stable distributed BSs always demonstrates relatively
larger coverage probability than the PPP model.
0.6
0.5
0.4
0.3
0.2
0.1
0
-10
-8
-6
-4
-2
0
2
4
6
8
10
SINR Threshold (dB)
(b) The impact of δ
Fig. 7. Performance sensitivity analyses under different R and δ.
V. C ONCLUSION
In this paper, we have performed the stochastic geometry
analyses in cellular networks with α-stable self-similarly deployed BSs. Based on the practical BS deployment records
in China and Europe (Italy), we have validated the spatial
self-similarity among BSs. Afterwards, we have theoretically
derived the coverage probability for cellular networks with
self-similarity and provided a tractable result. In particular,
we have demonstrated that our analytical results could be
reduced to the works achieved by J. G. Andrews [1]. We
have also simulated the coverage probability performance
under extensive parameter settings and verified the consistence
between the theoretical and simulation results. Our results
have shown that compared to the classical PPP model, the
modeling with α-stable self-similarity could contribute to
analyze the performance under more sophisticated network
configurations, thus making it easier to understand the actual
network variations.
There still exist some open questions to be addressed. For
example, our work has shown that instead of improving the
coverage performance, simple yet stubborn deployment of
BSs incurs significant interference and degrades the coverage
performance. Therefore, frequency reuse has been applied in
practical cellular communication. In this case, it is still mean-
12
ingful to combine α-stable self-similarity with more realistic
network configurations, so as to produce more valuable results.
A PPENDIX
A. Proof of Lemma 2
Proof. According to the definition of the coverage probability,
we have
pc (T, S(α, σ, µ), δ)
= Er [P(SINR > T |r)]
ZZ
P(SINR > T |r)P(r|λ)f (λ)drdλ
=
r>0,λ>0
ZZ
hr−δ
> T |r P(r|λ)f (λ)drdλ
P
=
N0 + Ir
r>0,λ>0
(29)
Next, recalling that theh pathloss in Rayleigh
fading satisfies
i
hr −δ
h ∼ exp(ζ), the term P N0 +Ir > T |r will satisfy
hr−δ
> T |r
N0 + Ir
= P h > rδ T (N0 + Ir )|r
= EIr P h > rδ T (N0 + Ir )|r, Ir
= EIr exp(−ζrδ T (N0 + Ir ))|r, Ir
P
= e−ζT r
δ
N0
(30)
LIr (ζT rδ )
Combining Eq. (29) and Eq. (30), we get the result.
B. Derivations of Eq. (14)
In this part, we provide the details about the equation (a)
in the Eq. (14).
Z
Z
R
(1 − f (x))dx = 2π
vdv
1 − Eg exp −sgv −δ
∆
r
Z ∞Z R
1 − exp −sgv −δ vdvf (g)dg
(31)
= 2π
=π
Z
0
0
∞
Z
|r
r
R−δ
−δ
2
{1 − exp (−sgy)} dy − δ f (g)dg
{z
}
(>)
n
o
= πEg Λ(s, r, R) − Θ(s, r, R)
The last equation holds, since for the inside integral (>), we
have
2
R−δ
(>) = y − δ [1 − exp (−sgy)] −δ
r
Z R−δ
2
2
(32)
(sgy)− δ exp (−sgy) dy
− (sg) δ
r −δ
= R2 1 − exp −sgR−δ − r2 1 − exp −sgr−δ
2
2
2
−δ
−δ
δ
− (sg) Γ(− + 1, sgr ) − Γ(− + 1, sgR )
δ
δ
R EFERENCES
[1] J. G. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to
coverage and rate in cellular networks,” IEEE Trans. Wireless Commun.,
vol. 59, no. 11, pp. 3122–3134, Nov. 2011.
[2] R. Li, Z. Zhao, X. Zhou, G. Ding, Y. Chen, Z. Wang, and H. Zhang,
“Intelligent 5G: When cellular networks meet artificial intelligence,”
IEEE Wireless Commun., Mar. 2017, (early access).
[3] J. G. Andrews, H. Claussen, M. Dohler, S. Rangan, and M. C. Reed,
“Femtocells: Past, present, and future,” IEEE J. Sel. Area. Comm.,
vol. 30, no. 3, pp. 497–508, Apr. 2012.
[4] J. G. Andrews, S. Singh, Q. Ye, X. Lin, and H. Dhillon, “An
overview of load balancing in HetNets: Old myths and open
problems,” arXiv:1307.7779 [cs, math], Jul. 2013. [Online]. Available:
http://arxiv.org/abs/1307.7779
[5] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and
M. Franceschetti, “Stochastic geometry and random graphs for
the analysis and design of wireless networks,” IEEE J. Sel. Area.
Comm., vol. 27, no. 7, pp. 1029–1046, Sep. 2009.
[6] Y. Zhou, R. Li, Z. Zhao, X. Zhou, and H. Zhang, “On the α–stable
distribution of base stations in cellular networks,” IEEE Commun. Lett.,
vol. 19, no. 10, pp. 1750–1753, Oct. 2015.
[7] Y. Zhou, Z. Zhao, Y. Louet, Q. Ying, R. Li, X. Zhou, X. Chen, and
H. Zhang, “Large-scale spatial distribution identification of base stations
in cellular networks,” IEEE Access, vol. 3, pp. 2987 – 2999, Dec. 2015.
[8] N. Deng, W. Zhou, and M. Haenggi, “The Ginibre point process as
a model for wireless networks with repulsion,” IEEE Trans. Wireless
Commun., vol. 14, no. 1, pp. 107–121, Jan. 2015.
[9] M. Haenggi and R. K. Ganti, “Interference in large
wireless networks,” Foundations and Trends in Networking,
vol. 3, no. 2, pp. 127–248, Nov. 2009. [Online]. Available:
http://www.nowpublishers.com/article/Details/NET-015
[10] Y. J. Chun, M. O. Hasna, and A. Ghrayeb, “Modeling heterogeneous
cellular networks interference using poisson cluster processes,” IEEE J.
Sel. Area. Comm., vol. 33, no. 10, pp. 2182 – 2195, May 2015.
[11] A. Guo, Y. Zhong, W. Zhang, and M. Haenggi, “The Gauss-Poisson
process for wireless networks and the benefits of cooperation,” IEEE
Trans. Commun., vol. 64, no. 5, pp. 1916–1929, May 2016.
[12] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry
and its applications,, 3rd ed. Wiley, Jul. 2013. [Online]. Available:
http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470664819.html
[13] N. Miyoshi and T. Shirai, “A cellular network model with Ginibre
configured base stations,” Adv. in Appl. Probab., vol. 46, no. 3, pp.
832–845, Sep. 2014.
[14] T. Kobayashi and N. Miyoshi, “Uplink cellular network models with
Ginibre deployed base stations,” in Proc. IEEE ITC 2014, Karlskrona,
Sweden, Sep. 2014.
[15] Y. Li, F. Baccelli, H. S. Dhillon, and J. G. Andrews, “Fitting determinantal point processes to macro base station deployments,” in Proc.
IEEE Globecom 2014, Austin, TX, USA, Dec. 2014.
[16] H. ElSawy, A. Sultan-Salem, M. S. Alouini, and M. Z. Win, “Modeling
and analysis of cellular networks using stochastic geometry: A tutorial,”
IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 167–203, 2017.
[17] I. Flint, X. Lu, N. Privault, D. Niyato, and P. Wang, “Performance
analysis of ambient RF energy harvesting with repulsive point process
modeling,” IEEE Trans. Commun., vol. 14, no. 10, pp. 5402–5416, Oct.
2015.
[18] H. ElSawy and E. Hossain, “Two-tier HetNets with cognitive femtocells: Downlink performance modeling and analysis in a multichannel
environment,” IEEE Trans. Mob. Comput., vol. 13, no. 3, pp. 649–663,
Mar. 2014.
[19] X. Zhou, Z. Zhao, R. Li, Y. Zhou, J. Palicot, and H. Zhang, “Human
mobility patterns in cellular networks,” IEEE Commun. Lett., vol. 17,
no. 10, pp. 1877–1880, Oct. 2013.
[20] A.-L. Barabsi and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509–512, Oct. 1999.
[21] G. Samorodnitsky, Stable non-gaussian random processes:
Stochastic
models
with
infinite
variance.
New
York:
Chapman and Hall/CRC, Jun. 1994. [Online]. Available:
http://www.amazon.com/Stable-Non-Gaussian-Random-Processes-Stochastic/dp/041205
[22] R. Li, Z. Zhao, J. Zheng, Y. Chen, C. Mei, Y. Cai, and H. Zhang,
“The learning and prediction of application-level traffic data in cellular
networks,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3899 –
3912, Jun. 2017.
[23] L. Chiaraviglio, F. Cuomo, M. Maisto, A. Gigli, J. Lorincz, Y. Zhou,
Z. Zhao, C. Qi, and H. Zhang, “What is the best spatial distribution
13
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
to model base station density? A deep dive into two European mobile
networks,” IEEE Access, vol. 4, pp. 1434–1443, Apr. 2016.
L. Chiaraviglio, F. Cuomo, A. Gigli, M. Maisto, Y. Zhou, Z. Zhao, and
H. Zhang, “A reality check of base station spatial distribution in mobile
networks,” in Proc. IEEE INFOCOM 2016, San Francisco, CA, USA,
Apr. 2016.
Z. Zhao, M. Li, and R. Li, “Temporal-spatial distribution nature of
traffic and base stations in cellular networks,” IET Commun., Aug. 2017,
accepted.
R. Li, Z. Zhao, C. Qi, X. Zhou, Y. Zhou, and H. Zhang, “Understanding
the traffic nature of mobile instantaneous messaging in cellular networks:
A revisiting to α-stable models,” IEEE Access, vol. 3, pp. 1416–1422,
Sep. 2015.
C. Song, S. Havlin, and H. A. Makse, “Self-similarity of complex
networks,” Nature, vol. 433, no. 7024, pp. 392–395, Jan. 2005.
X. Ge, S. Tu, G. Mao, C. X. Wang, and T. Han, “5G ultra-dense cellular
networks,” IEEE Wireless Communications, vol. 23, no. 1, pp. 72–79,
Feb. 2016.
A. Guo and M. Haenggi, “Spatial stochastic models and metrics for the
structure of base stations in cellular networks,” IEEE Trans. Wireless
Commun., vol. 12, no. 11, pp. 5800–5812, Nov. 2013.
W. C. Cheung, T. Q. S. Quek, and M. Kountouris, “Throughput optimization, spectrum allocation, and access control in two-tier femtocell
networks,” IEEE J. Sel. Area. Comm., vol. 30, no. 3, pp. 561–574, Apr.
2012.
S. Mukherjee, “Distribution of downlink SINR in heterogeneous cellular
networks,” IEEE J. Sel. Area. Comm., vol. 30, no. 3, pp. 575–585, Apr.
2012.
B. Yu, L. Yang, H. Ishii, and S. Mukherjee, “Dynamic TDD support in
macrocell-assisted small cell architecture,” IEEE J. Sel. Area. Comm.,
vol. 33, no. 6, pp. 1201–1213, Jun. 2015.
M. D. Renzo and P. Guan, “Stochastic geometry modeling and systemlevel analysis of uplink heterogeneous cellular networks with multiantenna base stations,” IEEE Trans. Commun., vol. 64, no. 6, pp. 2453–
2476, Jun. 2016.
F. J. Martin-Vega, G. Gomez, M. C. Aguayo-Torres, and M. D. Renzo,
“Analytical modeling of interference aware power control for the uplink
of heterogeneous cellular networks,” IEEE Trans. Wireless Commun.,
vol. 15, no. 10, pp. 6742–6757, Oct. 2016.
T. D. Novlan, H. S. Dhillon, and J. G. Andrews, “Analytical modeling
of uplink cellular networks,” IEEE Trans. Wireless Commun., vol. 12,
no. 6, pp. 2669–2679, Jun. 2013.
S. Singh, X. Zhang, and J. G. Andrews, “Joint rate and SINR coverage
analysis for decoupled uplink-downlink biased cell associations in
hetnets,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5360–
5373, Oct. 2015.
H. Y. Lee, Y. J. Sang, and K. S. Kim, “On the uplink SIR distributions
in heterogeneous cellular networks,” IEEE Communications Letters,
vol. 18, no. 12, pp. 2145–2148, Dec. 2014.
Z. Zeinalpour-Yazdi and S. Jalali, “Outage analysis of uplink two-tier
networks,” IEEE Trans. Commun., vol. 62, no. 9, pp. 3351–3362, Sep.
2014.
M. Mirahsan, R. Schoenen, and H. Yanikomeroglu, “HetHetNets:
Heterogeneous traffic distribution in heterogeneous wireless cellular
networks,” IEEE J. Sel. Area. Comm., vol. 33, no. 10, pp. 2252–2265,
Oct. 2015.
Y. Lin, W. Bao, W. Yu, and B. Liang, “Optimizing user association and
spectrum allocation in hetnets: A utility perspective,” IEEE J. Sel. Area.
Comm., vol. 33, no. 6, pp. 1025–1039, Jun. 2015.
H. S. Dhillon, R. K. Ganti, and J. G. Andrews, “Load-aware modeling
and analysis of heterogeneous cellular networks,” IEEE Trans. Wireless
Commun., vol. 12, no. 4, pp. 1666–1677, Apr. 2013.
S. Singh, H. Dhillon, and J. G. Andrews, “Offloading in heterogeneous
networks: Modeling, analysis, and design insights,” IEEE Trans. Wireless
Commun., vol. 12, no. 5, pp. 2484–2497, May 2013.
H. ElSawy, E. Hossain, and D. I. Kim, “HetNets with cognitive small
cells: User offloading and distributed channel access techniques,” IEEE
Commun. Mag., vol. 51, no. 6, pp. 28–36, Jun. 2013.
Y. S. Soh, T. Q. S. Quek, M. Kountouris, and G. Caire, “Cognitive
hybrid division duplex for two-tier femtocell networks,” IEEE Trans.
Wireless Commun., vol. 12, no. 10, pp. 4852–4865, Oct. 2013.
K. Huang and J. G. Andrews, “An analytical framework for multicell
cooperation via stochastic geometry and large deviations,” IEEE Trans.
Inf. Theory, vol. 59, no. 4, pp. 2501–2516, Apr. 2013.
C. H. M. de Lima, M. Bennis, and M. Latva-aho, “Statistical analysis
of self-organizing networks with biased cell association and interference
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
avoidance,” IEEE Trans. Veh. Tech., vol. 62, no. 5, pp. 1950–1961, Jun.
2013.
P. Semasinghe, E. Hossain, and K. Zhu, “An evolutionary game for
distributed resource allocation in self-organizing small cells,” IEEE
Trans. Mob. Comput., vol. 14, no. 2, pp. 274–287, Feb. 2015.
Y. Deng, L. Wang, M. Elkashlan, M. D. Renzo, and J. Yuan, “Modeling and analysis of wireless power transfer in heterogeneous cellular
networks,” IEEE Trans. Commun., vol. 64, no. 12, pp. 5290–5303, Dec.
2016.
C. Li, J. Zhang, and K. B. Letaief, “Throughput and energy efficiency
analysis of small cell networks with multi-antenna base stations,” IEEE
Trans. Wireless Commun., vol. 13, no. 5, pp. 2505–2517, May 2014.
D. Cao, S. Zhou, and Z. Niu, “Optimal combination of base station
densities for energy-efficient two-tier heterogeneous cellular networks,”
IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4350–4362, Sep.
2013.
——, “Improving the energy efficiency of two-tier heterogeneous cellular networks through partial spectrum reuse,” IEEE Trans. Wireless
Commun., vol. 12, no. 8, pp. 4129–4141, Aug. 2013.
Y. S. Soh, T. Q. Quek, M. Kountouris, and H. Shin, “Energy efficient
heterogeneous cellular networks,” IEEE J. Sel. Area. Comm., vol. 31,
no. 5, pp. 840–850, May 2013.
M. D. Renzo and P. Guan, “A mathematical framework to the computation of the error probability of downlink MIMO cellular networks by
using stochastic geometry,” IEEE Trans. Commun., vol. 62, no. 8, pp.
2860–2879, Aug. 2014.
N. Lee, D. Morales-Jimenez, A. Lozano, and R. W. Heath, “Spectral
efficiency of dynamic coordinated beamforming: A stochastic geometry
approach,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 230–241,
Jan. 2015.
A. K. Gupta, H. S. Dhillon, S. Vishwanath, and J. G. Andrews, “Downlink multi-antenna heterogeneous cellular network with load balancing,”
IEEE Trans. Commun., vol. 62, no. 11, pp. 4052–4067, Nov. 2014.
L. H. Afify, H. ElSawy, T. Y. Al-Naffouri, and M. S. Alouini, “A
unified stochastic geometry model for MIMO cellular networks with
retransmissions,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp.
8595–8609, Dec. 2016.
T. Bai and R. W. Heath, “Analyzing uplink SINR and rate in massive
MIMO systems using stochastic geometry,” IEEE Trans. Commun.,
vol. 64, no. 11, pp. 4592–4606, Nov. 2016.
S. Singh, M. N. Kulkarni, A. Ghosh, and J. G. Andrews, “Tractable
model for rate in self-backhauled millimeter wave cellular networks,”
IEEE J. Sel. Area. Comm., vol. 33, no. 10, pp. 2196–2211, Oct. 2015.
F. Muhammad, Z. H. Abbas, and F. Y. Li, “Cell association with load
balancing in nonuniform heterogeneous cellular networks: Coverage
probability and rate analysis,” IEEE Trans. Veh.Tech., vol. 66, no. 6,
pp. 5241–5255, Jun. 2017.
I. Atzeni and M. Kountouris, “Full-duplex mimo small-cell networks:
Performance analysis,” in Proc. IEEE Globecom 2015, San Diego, CA,
USA, Dec. 2015.
J. Lee and T. Q. S. Quek, “Hybrid full-/half-duplex system analysis
in heterogeneous wireless networks,” IEEE Trans. Wireless Commun.,
vol. 14, no. 5, pp. 2883–2895, May 2015.
H. Tabassum, A. H. Sakr, and E. Hossain, “Analysis of massive MIMOenabled downlink wireless backhauling for full-duplex small cells,”
IEEE Trans. Commun., vol. 64, no. 6, pp. 2354–2369, Jun. 2016.
K. Huang, J. G. Andrews, D. Guo, R. W. Heath, and R. A. Berry, “Spatial
interference cancellation for multiantenna mobile ad hoc networks,”
IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1660–1676, Mar. 2012.
R. Li, Y. Chen, G. Y. Li, and G. Liu, “Full-duplex cellular networks,”
IEEE Commun. Mag., vol. 56, no. 4, pp. 184 – 191, Apr. 2017.
A. AlAmmouri, H. ElSawy, O. Amin, and M. S. Alouini, “In-band αduplex scheme for cellular networks: A stochastic geometry approach,”
IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6797–6812, Oct.
2016.
C.-H. Lee, C.-Y. Shih, and Y.-S. Chen, “Stochastic geometry based
models for modeling cellular networks in urban areas,” Wireless Net.,
vol. 19, no. 6, pp. 1063–1072, Aug. 2013.
N. Miyoshi and T. Shirai, “Spatial modeling and analysis of cellular networks using the Ginibre point process: A tutorial,” IEICE Transactions
on Communications, vol. E99.B, no. 11, pp. 2247–2255, Nov. 2016.
A. Karasaridis and D. Hatzinakos, “Network heavy traffic modeling
using α-stable self-similar processes,” IEEE Trans. Commun., vol. 49,
no. 7, pp. 1203–1214, Jul. 2001.
M. Crovella and A. Bestavros, “Self-similarity in world wide web traffic:
Evidence and possible causes,” IEEE/ACM Trans. Netw., vol. 5, no. 6,
pp. 835–846, Dec. 1997.
14
[70] W. Song and W. Zhuang, “Resource reservation for self-similar data
traffic in cellular/WLAN integrated mobile hotspots,” in Proc. IEEE
ICC 2010, Cape Town, South Africa, May 2010.
[71] C. Qi, Z. Zhao, R. Li, and H. Zhang, “Characterizing and modeling
social mobile data traffic in cellular networks,” in Proc. IEEE VTC 2016Spring, Nanjing, China, May 2016.
[72] X. Ge, Y. Qiu, J. Chen, M. Huang, H. Xu, J. Xu, W. Zhang, Y. Yang,
C. X. Wang, and J. Thompson, “Wireless fractal cellular networks,”
IEEE Wireless Commun., vol. 23, no. 5, pp. 110–119, Oct. 2016.
[73] K. Park, G. Kim, and M. Crovella, “On the effect of traffic self-similarity
on network performance,” in Proc. SPIE ICPCNS 1997, Dallas, TX,
USA, Oct. 1997.
| 7cs.IT
|
Ref: IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
Workshop on Registration of Very Large Images, pp. 323—328, Columbus, OH, June 2014.
Image Registration of Very Large Images via Genetic Programming
Sarit Chicotay
Dept. of Computer Science
Bar-Ilan University
Ramat-Gan, Israel
Eli (Omid) David
Dept. of Computer Science
Bar-Ilan University
Ramat-Gan, Israel
Nathan S. Netanyahu
Dept. of Computer Science
Bar-Ilan University
Ramat-Gan, Israel
saritc@gmail.com
mail@elidavid.com
nathan@cs.biu.ac.il
that it does not make any prior assumptions about the
transformation model. Therefore, incorporating various
building blocks into the GP framework could yield
potentially a large pool of transformations. The advantage
of this approach is that it offers, in principle, much greater
flexibility in the registration of very large images which
give rise to various, relatively complex transformation
types.
We present good results on some real datasets on small
images and compare them to those obtained due to a recent
method assuming a simple transformation model. We also
present initial results on some real datasets containing
larger images on simple transformations. From a pure GP
perspective, other transformations, possibly more complex
ones, could be searched for and discovered, as long as the
GP is supported by the proper building blocks.
The paper is organized as follows. Section 2 reviews IR
components that are essential for our solution. Section 3
presents a brief GP background and provides the motivation
for our GP-based IR approach. Section 4 presents an
overview of related evolutionary-based solutions for IR.
Section 5 provides a detailed description of our suggested
GP-based approach. In Section 6 we present our initial
empirical results. Section 7 makes concluding remarks.
Abstract
Image registration (IR) is a fundamental task in image
processing for matching two or more images of the same
scene taken at different times, from different viewpoints
and/or by different sensors. Due to the enormous diversity
of IR applications, automatic IR remains a challenging
problem to this day. A wide range of techniques has been
developed for various data types and problems. However,
they might not handle effectively very large images, which
give rise usually to more complex transformations, e.g.,
deformations and various other distortions.
In this paper we present a genetic programming (GP)based approach for IR, which could offer a significant
advantage in dealing with very large images, as it does not
make any prior assumptions about the transformation
model. Thus, by incorporating certain generic building
blocks into the proposed GP framework, we hope to realize
a large set of specialized transformations that should yield
accurate registration of very large images.
1. Introduction
Image registration (IR) is an important, significant
component in many practical problems in diverse fields
where multiple data sources are integrated/fused, in order
to extract high-level information as to the contents of the
given scene. A wide range of registration techniques has
been developed over time, where typically, specific domain
knowledge is taken into account and certain a priori
assumptions are made, e.g., with respect to the
transformation model used, specific bounds on its
parameter values, etc.
In contrast, in this paper we present a genetic
programming (GP)-based approach for IR. GP is part of a
family of evolutionary algorithms (EAs) which are
stochastic optimization methods whose goal is to find an
"optimal" solution or a set of solutions with respect to
certain objective(s). Exploiting this strength of GP for
search and optimization problems [8-9], we use GP and
image processing techniques to search efficiently for an
"optimal transformation" with respect to a given similarity
measure. The novel aspect of our proposed GP algorithm is
2. Image Registration
Image registration involves searching for a
transformation that generates a maximal match in the
overlap between the reference image and the transformed
sensed image. It uses a similarity measure to assess the
quality of a specific transformation.
In this work, we focus on one of the most common
measures, mutual information (MI) [14],[18], inspired by
information theory [17]. MI is a measure of statistical
dependency between two datasets that has been applied in
a robust and efficient manner to IR. Analogous to the
Kullback-Leibler measure [15] for the distance between
two distributions, MI of two images measures the degree of
dependence between the gray values in the area of overlap,
defined as,
( , )
(1)
( , )=
( , )
( ) ( )
,
1
The assumption is that maximal dependence between the
gray values of the images achieved when they are correctly
aligned, while misregistration results in a decrease of this
measure. We considered close gray levels as having the
same gray level for the purpose of calculating the MI.
The set of transformations (e.g., translation, rotation,
scaling) that are available during the registration process
define the search space. The search for an optimal
transformation in terms of the similarity measure is carried
out using a search strategy which governs how the search
space is explored. The search strategy has a great impact on
the efficiency of the image registration process.
In this paper we present an alternative GP-based search
strategy. Since GP is known to be robust for a variety of
search and optimization problems, it could also prove
useful in the above scenario.
4.
3.1. Select a pair of chromosomes from the current
population based on their fitness value (a
chromosome can be selected more than once).
3.2. Produce offspring using crossover between the
two selected chromosomes and perform random
mutation on those offspring.
Replace the population with the newly created one.
3. Genetic Programming
As noted, GP is part of evolutionary algorithms family
inspired by the evolution in nature. It uses the principles of
evolution and natural selection for optimization and search
for the global min/max of a given objective function.
GP maintains a population of candidate solutions called
chromosomes. The fundamental elements of an individual
chromosome are its genes, which come together to form the
tree-like program representing the chromosome consist of:
(1) Functions, which in tree terminology, are nodes with
children (the function's arguments) and (2) terminals which
are leaves (i.e., nodes without branches). The functions can
be basic mathematical functions (e.g., +, −,∗) and possibly
more complex ones. Terminals consist of the variables and
constants of the program. See Figure 1.
Figure 2: Basic flow chart of GP
The process of creating the offspring is called
recombination and is combined of two steps: (1) Crossover,
where the selected candidates are combined by swapping
portions to produce hopefully better candidates with higher
fitness for the next generation, and (2) mutation, which is
performed on each of the new offspring with some low
probability (mutation rate). Mutation generates variations
in the population and helps avoid local minima. GP is
designed to create and preserve a legal program structure
during these steps.
The process continues iteratively until it satisfies certain
termination criteria, such as finding an acceptable
approximate solution, reaching a specific number of
generations, or until the solution converges.
4. Related Work
Figure 1: Example of a GP chromosome and the program it
represents
Evolutionary algorithms (EAs) are stochastic
optimization methods whose goal is to find an "optimal"
solution or a set of solutions with respect to certain
objective(s). EAs are considered robust methods, as one of
their main advantages is to avoid local optima. These
algorithms have been successful during the past decades in
solving a variety of search and optimization problems
including IR-related problems.
Most of the earliest evolutionary approaches for IR [19]
used genetic algorithms (GAs) with proportionate selection
and a binary representation. This approach has several
A basic GP algorithm consists of four iterative steps:
(See Figure 2.)
1. Start with a randomly generated population of
chromosomes.
2. Calculate the fitness value of each candidate in the
population using a fitness function.
3. Repeat until offspring are created:
2
limitations when solving optimization problems in the
continuous domain due to the binary representation that is
limited for each decision variable and selection method that
have several drawbacks when compared to ordinal-based
selection methods such as ranking or tournament selection
[5]. Another limitation of the early approach that it only
deals with translation and rotation, ignoring scaling and
shearing.
Current EA studies for IR represent a GA-based
approach [3],[11-12], which makes a prior assumption
about the transformation model (e.g., similarity
transformation). The optimal transformation is searched for
in the space of transformation parameters.
Santamaria et al. [10] present a more detailed overview
of evolutionary methods for image registration and some
state-of-the-art methods.
In this work, we present a GP-based algorithm for IR.
Unlike a GA approach, GP is not limited to a predefined
number of transformation parameters. Therefore,
incorporating various generic building blocks into the GP
framework could yield potentially a diverse pool of
transformation types, which should prove effective in the
registration of very large images. A detailed description of
this approach is given in the following section.
1.1.1
5. GP-Based Image Registration
=
, is a function of , and its three
child nodes, defined as follows:
( , , ℎ
)=
(6)
, ℎ
, ℎ
= {+, −,∗,/,
,
,
,
( , ),
( , ),
( , ),
( , )}
where , are the coordinates on which the transformation
is performed.
{+, −,∗,/,
} – have arity of two, i.e., 2 child nodes.
,
,
,
- 1 child.
{
,
} – 3 child nodes.
,
are functions of , and a child
node; they describe a 2D rotation of an image around its
center, i.e.,
( , , ℎ )=( −
(3)
ℎ/2)
cos( ℎ ) −( − ℎ ℎ /2)sin( ℎ ) +
ℎ/2
( , , ℎ ) = ( − ℎ ℎ /2)
(4)
cos( ℎ ) +( −
ℎ/2)sin( ℎ ) + ℎ ℎ /2
=
, is a function of
and its three child nodes, defined as follows:
( , , ℎ
)=
(5)
, ℎ
, ℎ
( − ℎ
This section describes our GP-based approach to
optimize the IR similarity measures by utilizing tools
common for IR.
We set the initial population to be twice as large as a
predefined size in order to maintain enough diversity. For
the next generation, elitism is used to retain the top 2%
chromosomes from the current generation and the rest are
taken from the new pool of chromosomes.
( − ℎ
For modeling an IR problem, the GP tree-like
chromosome should represent a possible transformation. A
transformation on a 2D image maps each pixel = ( , )
of the sensed image to a new pixel
= ( , ) in the
coordinate system of the referenced image, i,e., ( ) = ′.
More specifically, we obtain:
=
( , ),
=
) +( − ℎ
) +( − ℎ
,
)+ ℎ
)+ ℎ
Although we have included some special functions as
prospective building blocks of the chromosome trees, the
GP algorithm may not necessarily use them "as-is". Despite
this, we include these specific elements in order to assist in
the convergence of the GP algorithm, should their explicit
use become relevant.
5.1. Chromosome Representation
(2)
Function set
1.1.2
Terminal set
= {
,
, }
A
is some random number selected uniformly
{
between ±
ℎ, ℎ ℎ }, where
ℎ, ℎ ℎ are
the dimensions of the sensed image.
A
can be one of the coordinates, or .
is the base of the natural logarithm ≈ 2.71828
( , )
Therefore, each chromosome in our solution will be
comprised of two such GP trees, an -tree and a -tree, each
representing the transformation on one of the coordinates.
We incorporate into our GP framework a list of functions
and terminals that are essential for composing a diverse set
of global transformations. Inspired by the discussion on
transformation models in [1-2], we define, in particular, the
following "primitives".
5.2. Crossover Operator
Crossover is carried out separately on the -tree and tree of the two chromosomes. We used a simple one-point
crossover, i.e., we select a crossover point in each of the
two matching trees and then swap the corresponding subtrees. We also allow crossover to take place between an tree and a -tree with a low probability of ~0.2. This
enhances the possibility of maintaining consistent
3
components by both transformations (e.g., rotation, scale).
The resulting chromosomes are added to the new pool.
generations. The chromosome with rank 1 at this stage is
chosen as the suggested solution by the GP.
5.3. Mutation Operator
6. Empirical Results
We have used the following two mutation variants:
1. Mutation of a randomly selected node in the tree, by
replacing its sub-tree with a random generated sub-tree
(with limited depth.)
2. Mutation of each node with some low probability by
replacing it with a random node (function/terminal)
with the same arity (i.e., same number of branches.)
The chromosome created by recombination is mutated
with probability 0.3, i.e., each of the above two variants is
invoked with probability of 0.15.
When the algorithm reaches a steady fitness over a
predefined number of generations, the mutation rate is
incremented by 0.02. If the fitness continues to improve the
mutation rate is reset to its original value.
5.4.
The following parameter values were used consistently
by our GP-based IR algorithm for all evaluations:
Population size
Crossover probability
Mutation rate
Elitism
Initial tree max. height
Mutation max. height
Table 1: Parameter values of the GP algorithm
The GP approach was initially tested on the 256x256
images described in [13]. We used several sub-images as
reference images ("chips") and registered to them
overlapping sub-images sensed at different times. Several
examples are shown in Figure 3.
In order to assess the correctness of the final
transformation, we selected manually
points (typically
about 10 points) in the reference image {( , )} ,…, and
their corresponding points in the input image
{( ′ , ′ )} ,…, , respectively. We consider these sets as
the ground truth (i.e., most accurate transformation).
Next we apply the transformation to each point in
{( ′ , ′ )} ,…, , getting {( , )} ,…, , and compute the
root mean square error (RMSE) defined as:
Fitness Function
The IR goal is to optimize the similarity measure(s)
between the transformed sensed image and the referenced
image. We used MI as mentioned in Section 2.
In order for this function to be relevant for the
registration of large images, we used the following
sampling strategy. For each fitness evaluation, we select
randomly a predefined number of pixels in the sensed
image (typically 0.5% of the pixels.) The fitness calculation
is performed on these pixels only. The overlap percentage
between the images is also calculated only with respect to
these randomly selected pixels, a chromosome associated
with an overlap that is smaller than a predefined threshold
is discarded. This strategy speeds up computation and has
been proven useful in our initial tests.
5.5.
(8)
Selection Operator
5.6.
(
−
∑
=
∑
(
−
) +(
−
)
We achieved an RMSE value of ~1 pixel on the examples
shown in Figure 3, which is considered a successful
registration. We compared also our results to another
method tested on the same datasets [4]. The results obtained
by both methods are comparable. Nevertheless, the quality
of the results due to our GP based method should not be
underestimated as no assumption was made about the
transformation model in order to initiate or bound the
registration process.
Table 2 presents some of our results. Notice that the
resulting transformations do not necessarily fit a familiar
structure of a transformation combined of translation,
rotation, and scaling. The GP scheme produces various
transformations as part of evolving improved
transformations, in an attempt to meet the optimal similarity
measure. As with most IR applications, the objective is to
align the images so that additional high-level operations
could be performed. Thus, the characteristics of the
transform are not that important, as
We used rank-based selection which is considered more
robust than other selection methods [7],[16]. The
chromosomes are ordered by their fitness values due to the
MI measure. Then, each chromosome is given a rank
according to its position (the lower the better). Two
chromosomes are selected for recombination based on their
calculated ranking. The probability for an individual
position
to be selected within a population of size is
given by:
(7)
150
0.9
0.3
3/150
6
3
+1)
Stopping Criteria
As with most stochastic optimization algorithms, we
have no clear way of knowing when to stop the search and
accept the current best solution as the (near) optimal
solution. We stop the algorithm when the solution is not
"significantly" updated for a predefined number of
4
(a1)
(b1)
(c1)
(d1)
(e1)
(a2)
(b2)
(c2)
(d2)
(e2)
(a3)
(b3)
(c3)
(d3)
(e3)
Figure 3: (a1), (b1), (c1), (d1), (e1): 256x256 reference images over the Washington, DC area, (a2), (b2), (c2), (d2), (e2): corresponding
256x256 sensed images, and (a3), (b3), (c3), (d3), (e3): registration results.
long as the alignment is achieved with high level of
accuracy.
Motivated by the results on the set of 256x256 images,
we have been exploring the validity of our approach on
several, much larger space/airborne images. Our initial tests
were performed on a Landsat 7 scene over Colorado (from
NASA's IMAGESEER database). The scene is of size
5351x5051, (~27M pixels) and contains ~5% cloud
coverage. We created two semi-synthetic image pairs. The
first pair was created by applying only a translation with
( , ): − 50,
the ground truth transformation:
( , ): − 100. We obtained, in this case, a successful
registration with ~1 pixel RMSE. The second pair was
created by applying both a rotation and translation with the
SIFT-based IR [4]
Image
pair
(a1)-(a2)
s
1.001
[deg]
-0.24
[pix]
-5.76
[pix]
-46.39
RMSE
[pix]
0.74
(b1)-(b2)
1.006
-0.27
-4.75
-47.61
0.86
(c1)-(c2)
1.003
-0.47
-4.55
-48.73
0.63
(d1)-(d2)
(e1)-(e2)
1.038
1.002
2.38
0.006
-6.36
-5.4
-46.18
-47.7
0.76
0.6
ground truth transformation: (angles are in radians):
( , ):
(0.2618) + 15,
( , ):
(0.2618) – 165.
Figure 4 shows the registration result obtained with an
RMSE of ~6 pixels. The transformation obtained by the GP
scheme in this case (angles are in radians) is:
( , ): sin(3.714) + (12.24 + rotate ((((((−1953.79) +
1995.74) ∗ sin(−6.05)) − (−5048.61))))
( , ): ((
(cos(550.67 − (−420.77) + (−69.61)))/
69.58) + (((
(((((9.78 + 550.67) + ((cos(−94.34) +
(−98.93)) + (−98.93)))/(((−340.51)/1937.69) ∗
(−13.18) )))))/(9.78 +
(((((−1953.79) + 1995.74) ∗
sin(−81.45) ) − (−5048.61))) ) +
((
(cos(((((((2185.03/(−89.18)) − (−1055.97)) −
2301.13) + (cos(926.18) + (−98.93))) − (−98.93)))) ) +
(−98.93)) + (−98.93))))
GP-Based IR
( , )
RMSE
( , )
[pix]
( - cos(358.26))-4.23
( 2.7+( + sin(128.33)) -48.99) 0.85
((cos(202.16)+cos(202.16))
+(sin(242.67)+(( +cos(183.68))
+sin(278.16))))
((sin(310.19)*4.17)+
((0.47-5.11)+ )
((sin(319.21)+(sin(319.21)
+cos(188.9)))+(sin(309.02)+
(( +sin(208.03))+sin(319.21))))
(((( -cos(8.74))-cos(66.27))
-((43.03-sin(209.9))
-sin(209.9)))+sin(254.8))
((sin(2.32)+cos(267.27))
+((8.64+ )
+(59.4*sin(284.74))))
(cos(24.8)+( -45.05))
((( -sin(39.8))-46.41)
-cos(92.43))
1.04
1.3
1.3
1.22
Table 2: Comparison of registration results due to our GP-based algorithm and a SIFT-based method [4] (angles are
in degrees)
5
(a)
(b)
(c)
(d)
Figure 4: (a)-(b) Two Landsat 7 images to be aligned: (a) reference image (5351x5051 pixels), (b) semi-synthetic sensed image
(6151x5151 pixels), (c) registration of sensed image to reference image, and (d) difference between reference image (a) and
transformed sensed image (c) in overlap area.
Tranactions on Pattern Analysis and Machine Intelligence,
(15):850–863, 1993
7. Conclusions
[7] D. Whitley. “The GENITOR algorithm and selection
We presented a GP-based image registration algorithm,
pressure: Why rank-based allocation of reproductive trials is
best”. Proceedings of the Third International Conference on
whose main novelty over existing IR techniques is that it
Genetic Algorithms. 116-121, 1989.
attempts to provide a robust and automatic solution without
[8]
J.R. Koza. "Genetic Programming: On The Programming
assuming any transformation model. The initial
of Computers by Means of Natural Selection". The MIT
encouraging results demonstrate the potential of the
Press, 1992.
powerful, evolutionary GP approach, as far as its
[9] J.R. Koza."Genetic Programming II". The MIT Press, 1994.
application to IR. The accuracy of the results was assessed
[10] J. Santamaría, O. Cordón, S. Damas. "A comparative study
using RMSE, and was found comparable to another IR
of state-of-the-art evolutionary image registration methods
method presented recently.
for 3D modeling". Computer Vision and Image
The initial tests suggest that this approach can be
Understanding, (115):1340–1354, 2010.
[11] L. Zhang, W. Xu, and C. Chang. "Genetic algorithm for
potentially useful when considering very large images that
affine point pattern matching". Pattern Recognition Letters,
give rise to more complex transformations. This would be
(24):9–19, 2003.
further investigated as part of future research.
[12]
M. Bazargani, A. Anjos , F. G. Lobo , A. Mollahosseini and
We intend to test extensively this scheme on additional,
H. R. Shahbazkia . "Affine Image Registration
challenging datasets containing deformations and other
Transformation Estimation Using a Real Coded Genetic
distortions. Also, we will incorporate more of the common
Algorithm with SBX". Proceedings of the fourteenth
similarity metrics used in IR in addition to the MI measure
international conference on Genetic and evolutionary
used in this work (e.g., PHD, cross-correlation, sum of
computation conference companion. 1459-1460, 2012.
squared intensity) and consider additional functional
[13] N. S. Netanyahu, J. Le Moigne, and J. G. Masek.
"Georegistration of Landsat data via robust matching of
building blocks for our GP-based scheme.
multiresolution features", IEEE Transactions on Geoscience
In view of our initial results, we believe there is indeed
and Remote Sensing, (42):1586-1600, 2004.
promise for such future directions.
[14] P. Thevenaz and M. Unser. “Optimization of mutual
information for multiresolution image registration”. IEEE
References
Transactions on Image Processing, (9), 2000.
[15] S. Kullback and R.A Leibler. "On information and
[1] A. Ardeshir Goshtasby."2-D and 3-D Image registration".
sufficiency". The Annals of Mathematical Statistics,
Wiley Pres, 2005.
(22):79-86, 1951.
[2] A. Ardeshir Goshtasby."Image Registration: Principles,
[16] T. Back and F.Hoffmeister. “Extended selection
Tools and Methods". Advances in Computer Vision and
mechanisms in genetic algorithms”, Proceedings of the
Pattern Recognition. Springer, 2012.
Fourth International Conference on Genetic Algorithms,
[3] A. Valsecchi and S. Damas. "An Image Registration
92-99, 1991.
Approach using Genetic Algorithms". IEEE Congress on
[17] T. M. Cover and J. A. Thomas. "Elements of Information
Evolutionary Computation, 2012.
Theory". John Wiley & Sons, Inc, 1991.
[4] B. Kupfer, N. S. Netanyahu, and I. Shimshoni. "A SIFT[18] W. M. Wells III, P. Viola, H. Atsumi, S. Nakajima, and R.
based image registration algorithm for remotely sensed
Kikinis. “Multi-modal volume registration by maximization
data", Proceedings of the IEEE International Geoscience
of mutual information". Medical Image Analysis, (1):35–51,
and Remote Sensing Symposium, 2013
1996.
[5] D. E. Goldberg and K. Deb. "A comparative analysis of
selection schemes used in genetic algorithms". Foundations
[19] W. Peter and M. Tsang. "A Genetic algorithm for affine
of Genetic Algorithms, (1):69–93, 1991.
invariant object shape recognition". Proceedings of the First
[6] D. P. Huttenlocher, G.A. Klanderman, and W. J. Rucklidge.
IEEE International Symposium on Genetic Algorithms in
“Comparing images using the Hausdorff distance” IEEE
Engineering Systems. 293–298, 1995.
6
| 9cs.NE
|
Subspace arrangements and motives
of classifying stacks of reflection groups
arXiv:1507.03486v2 [math.AG] 8 Sep 2017
Emanuele Delucchi, Ivan Martino
September 12, 2017
Abstract
We study some combinatorial aspects of a subspace arrangement associated to every faithful representation of finite groups, with a view on the
triviality problem for motivic classes of classifying stacks. In particular,
for finite reflection groups we reduce this problem to a conjecture which
would generalize a theorem by Aluffi.
In this paper we unfold the combinatorics underlying the computation of
the motivic class {BG} of the classifying stack of a finite group G in the
Grothendieck ring of algebraic stacks K0 (Stackk ). In the case of complex reflection groups, we reduce it to the following conjecture.
Conjecture. Let W ⊂ GL(V ) be a finite complex reflection group and let AW
be the arrangement of hyperplanes associated to W (see Definition 1.3). Call Ve
the open complement of this arrangement and call Ve/W its quotient under the
action of W .
Then, the motivic class {Ve/W } is a polynomial in L, the class of the affine
line. More precisely, it has the following form:
{Ve/W } = χAW /W (L),
where χAW /W (L) denote the characteristic polynomial of the quotient arrangement.
This conjecture generalizes a theorem of Aluffi [1] asserting that {Ve } = χAW (L).
Before we go any further, let us put this in context and explain our motivation.
The Noether Problem. Let k be a any field and G be a finite group. A
century ago, Emmy Noether [11] studied the rationality of the field extension
k(V )G /k, where k(V )G denotes the invariants of the field of rational functions
k(V ) over the regular representation V of G. This rationality question became
known as the Noether problem and no counterexamples to the rationality were
found for more than 50 years.
In fact, the first such counterexample came in 1969 with work of Swan [16]
Z
proving that the extension Q(V ) /47Z /Q is not rational. In the Eighties, several
other non rational extensions were found over the complex field by Saltman [13]
and Bogomolov [2] for certain p-groups of order p9 and of order p6 , respectively.
More recently Hoshi, Kang and Kunyavskii [7] studied the order p5 cases with
non rational extension C(V )G /C.
1
The triviality of the motivic class of BG. In 2009, Ekedahl [4] showed
that the Noether problem relates to the computation of a certain second degree
cohomology of the motivic class {BG}. Each group of this cohomology is called
an Ekedahl invariant of G in [10, 9], to which we refer for an overview of the
topic. A motivic class is said to be trivial if it coincides with the class of a point
{Spec(k)}, that we denote for simplicity by 1 because it is the neutral element
with respect to the product in K0 (Stackk ). In all above-mentioned nonrational
instances of the Noether Problem, {BG} is not trivial in K0 (Stackk ).
A further point of interest in this triviality problem comes from recent work of
Totaro [17] which relates it with other five properties of finite groups: stable
rationality of quotient varieties V /G, triviality for the birational motive of the
quotient varieties V /G, the weak Chow Künneth property of BG, the Chow
Künneth property of BG and the mixed Tate property of BG.
The known instances of triviality for {BG} are
– the finite subgroups G ⊂ GL1 (k) (see [4, Proposition 3.2]);
– the symmetric groups Sn (see [4, Theorem 4.3]);
– all finite subgroups of the group of affine transformations of A1k , assuming
k algebraically closed (see [4, Example ii) on page 8]).
– the finite subgroups G ⊆ GL3 (k), if char(k) = 0 [9, Theorem 2.4].
Our results. The computation of the motivic class of {BG} relates to an orbit
stratification of the quotient stack [V /G] for any faithful representation ρ of G
in GL(V ). In this paper we focus on the combinatorics of such stratification.
We say that a subgroup H of G is a stabilizer subgroup if there exists v ∈ V
stabilized only by H, that is Stabρ (v) = H (see Definition 1.4). The set of
stabilizer subgroups Pρ with reverse inclusion has a natural poset structure (see
Definition 1.4).
Moreover the group G acts on Pρ by conjugation and so we denote by
P̃ρ := Pρ/G
the set of conjugacy classes of stabilizer subgroups. It will be useful to denote
by P̃ρ′ the poset of all all conjugacy classes of stabilizer subgroups.
Under certain group theoretic and geometric conditions, we reduce the computation of {BG} to the knowledge of the combinatorics of P̃ρ′ . In order to state
our first result, let us denote by ∆ρ the order complex of P̃(G) (this is the set
of its ordered chains, that is the set of flags f as H0 < H1 < · · · < Hk ), and call
NG (f ) the intersection of all normalizer subgroups NG (Hi ) with Hi stabilizer
subgroup in the flag.
Theorem A. Let ρ : G → GL(V ) be a faithful representation of a finite group
G such that
(1) {BNG (f )} = 1 for all f ∈ ∆ρ and
(2) {V /NG (H)} = Ldim V
H
H
for all nontrivial stabilizer subgroups H ∈ P̃ ′ (G).
Then,
{BG}ϕρ (L) = ϕρ (L),
where ϕρ is the characteristic polynomial of ρ. (see Definition 1.6).
2
Notice that, ϕρ (t) is a polynomial defined only using the combinatorial information of P̃(G). As a token of motivation let us emphasize the following
fact: under the hypothesis of Theorem A, if ϕρ (L) is invertible in K0 (Stackk ),
then {BG} = 1.
Finite reflection groups are a distinguished family of finite subgroups of
the general linear group, which contains the symmetric groups and all cyclic
groups. This fact already suggests finite reflection groups as sensible candidates for the study of {BG}. Moreover, the wealth of combinatorial, geometric and representation-theoretic results about finite reflection groups provides
many useful tools. In particular, to every finite reflection group W is associated
a reflection arrangement, i.e., the arrangement of hyperplanes defined by the
fix-point sets of the reflections in W . Reflection arrangements lie at the roots
of the general theory of hyperplane arrangements, for an introduction to which
we point to the textbook [12].
For this class of groups, we are able to identify a combinatorial property of
the poset of stabilizer subgroups (Definition 1.4) which allows us to explicitly
compute the polynomial ϕρ (t) for the standard linear representation of finite
reflection groups.
Theorem B. If W is a d-dimensional irreducible finite reflection group in
GL(V ) that fulfills the hypothesis of Theorem A, then ϕW (t) = td − 1.
Using the fact that Ld − 1 is invertible in K0 (Stackk ), these computations
allow us to pave the way for the proof of the triviality of the motivic class for
the reflection groups.
The missing part is precisely the proof of the conjecture, affirming that
{Ve/W } = χAW /W (L).
We stress that χAW /W (L) = χP̃(W ) (L).
Theorem C. If the Conjecture holds, then {BW } = 1 in K0 (Stackk ).
This type of rationality problems have also been studied in literature by
different authors. For instance, Looijenga [8, Lemma 5.1] has shown that
{V /G} = Ln for every abelian group acting linearly on a n-dimensional kvector space, where k is a field of characteristic zero containing a root of unity
of degree the order of G.
However, this condition fails for the counterexamples to the Noether problem
given by Saltman [13], Bogomolov [2] and Hoshi, Kang and Kunyavskii [7]. Usm
ing [4, Proposition 3.1], one shows that for m large enough {V /G} = {BG}Lmn
in the Kontsevich value ring of algebraic varieties. Since {BG} is not trivial then
m
{V /G} is not Lmn in the K0 (VarC ).
This rationality problem has also been studied by Esnault and Viehweg (see
Lemma 1.1 and Proposition 1.3 in [6]).
To conclude, we do not know whether the conjecture might be true for a
class of group larger than that of the reflection groups. Indeed, the hypothesis
of Theorem A seem very restrictive and may well characterize finite reflection
groups.
The structure of the paper is the following. First, in Section 1 we review
some basics on subspace arrangements, partially ordered sets, Motivic classes
3
and reflection groups. We present the new Conjecture in Section 2 and then in
Section 3 we prove Theorem A. In section 4, we study the poset of conjugacy
classes of stabilizer subgroups for a complex reflection group and we show Theorem B. Finally in Section 4.1, we prove that the conjecture implies that the
class of the classifying stack of W is trivial, that is Theorem C.
Acknowledgements. We thank Emanuele Ventura for pointing out the reference
[1]. We are very thankful to an anonymous referee who pointed out a mistake
in a older version of this manuscript.
Both authors have been partially supported by the Swiss National Science
Foundation Professorship grant PP00P2 150552/1. The second author have
been partially supported by the Zelevinsky Research Instructor Fund, by the
Knut and Alice Wallenberg Fundation and by the Royal Swedish Academy of
Science.
1
1.1
Preliminaries and generalities
Combinatorics of subspace arrangements
The main combinatorial structure of interest in this paper is that of a partially
ordered set or, for short, poset. In this section we briefly review some basic
terminology and the results we will need later. For more background, a standard
reference is [15, Chapter 3].
A poset is a pair (P, ≤) consisting of a set P with a partial order relation ≤.
In what follows the set P will always be finite and the order relation will be
understood (so we will just say ”the poset P ” referring to (P, ≤)). If p, q ∈ P
are such that p ≤ q, the interval determined by p and q is the subset [p, q] :=
{r ∈ P | p ≤ r ≤ q}. The set of all intervals of P is denoted I(P ). A lattice is a
poset where every pair of elements has a unique minimal upper bound as well
as a unique maximal lower bound. For example, the poset LG of all subgroups
of a given finite group G, ordered by inclusion, is a lattice.
The Möbius function of the poset P is the function µP : I(P ) → Z defined
recursively as follows:
X
µ(p, p) =
1 for all p ∈ P ;
µ(p, r)
0 for all p < q in P.
=
r∈[p,q]
If the poset P has a unique minimal element (i.e., an element 0̂ with p ≤ 0̂ for
all p ∈ P \ {0̂}), for every p ∈ P we will write µP (p) as a shorthand for µP (0̂, p).
To every poset P is associated the poset ∆(P ) of all chains of P . Precisely,
this is the set
∆(P ) := {{p1 , p2 , . . . , pk } ⊆ P | p1 < p2 < . . . < pk }
ordered by inclusion. If the poset P has a unique minimal element 0̂ and a
b ) := ∆(P \ {0̂, 1̂}).
unique maximal element 1̂, we define also ∆(P
Since every subset of a totally ordered set is again totally ordered, ∆(P ) and
ˆ ) are naturally abstract simplicial complexes. Their topology is related to
∆(P
the Möbius function as follows.
4
Theorem 1.1. For every p ≤ q in a poset P , µP (p, q) is the reduced Euler
P
b
characteristic of ∆([p,
q]), that is µP (p, q) = ω∈∆([p,q])
(−1)|ω|−1 .
b
We will be concerned with posets arising from subspace arrangements. Let
k be a field, V a k-vector space of dimension d. An arrangement of subspaces
in V is a finite set A of linear subspaces of V ; its poset of intersections is the
set
\
L(A) := {
W | X ⊆ A}
(1)
W ∈X
ordered by reverse inclusion: for x, y ∈ L(A), x ≤ y if x ⊇ y. These posets
are always lattices, and in particular they have a unique minimal element 0̂
(corresponding
T to the intersection of the empty family) and a unique maximal
element 1̂ = W ∈A W . The arrangement is called essential if dim ∩A = 0. The
characteristic polynomial of the arrangement A is
X
µ(x)tdim x .
χA (t) =
x∈L(A)
1.2
The subspace arrangement of a representation
Fix a field k. Let G be a finite group and let ρ : G → GL(V ) be a krepresentation of G. For every g ∈ G and v ∈ V , we write the action as
g · v = ρ(g)v for every g ∈ G and v ∈ V , where gv is the usual matrix-vector
product.
Following [4], for any v ∈ V and for any subgroup H ⊆ G we define the
following objects.
NG (H)
Stabρ (v)
VH
VH
:= {g ∈ G | gH = Hg} ⊆ G
:= {g ∈ G | g · v = v} ⊆ G
:= {v ∈ V | H = Stabρ (v)} ⊆ V
:= {v ∈ V | H ⊆ Stabρ (v)} ⊆ V.
In other words, NG (H) is the normalizer of the subgroup H in G; V H is the
k-vector subspace of V of all points fixed (at least) by all elements of H; VH is
the set of points that are fixed exactly by the elements of H.
Definition 1.2. We say that a subgroup H is a stabilizer subgroup with respect
to the representation ρ if VH is not empty.
Definition 1.3. The arrangement of subspaces of the representation ρ is
Aρ := {V H | H 6= {e} and H is a stabilizer subgroup with respect to ρ}.
The set Aρ is ordered by reverse inclusion similar to L(A) in (1). It is useful to
observe that V e = V and so the poset Aρ ∪ {V e } as a minimal unique element.
Notice that every VH is the complement of the union of a set of subspaces inside
V H.
Definition 1.4. The poset of stabilizer subgroups of the representation ρ is
Pρ := {H | H is a stabilizer subgroup with respect to ρ},
ordered by inclusion H1 ≤ H2 if H1 ⊆ H2 .
5
Then one has:
Aρ ∪ {V e } ≃ L(Aρ ) ≃ Pρ
The first isomorphism is proven essentially by definition and by observing that
V e = V is the only missing subspace in Aρ . For the second isomorphism,
consider the function
Pρ
→ L(Aρ )
H
7→ V H .
This is order-preserving and bijective. Indeed, if V H1 = V H2 for two stabilizer
subgroups, then, by definition, they contain each other. Moreover, every intersection S in L(Aρ ) is of the form ∩H∈X V H , where X is a finite set of subgroups.
′
Thus, there exists a maximal H ′ containing all H in X, with S = V H . Since
both posets are finite, then it is an isomorphism of posets. In particular, if ρ is
a representation of a reflection group, then Pρ is a lattice.
The group G acts on Pρ by conjugation.
Definition 1.5. Define
P̃ρ := Pρ/G,
i.e., the set of all orbits under the G-action, ordered according to G·H1 ≤ G·H2
if H1 ≤ g · H2 in Pρ for some g ∈ G.
It will be useful to denote by P̃ρ′ the poset of all all nontrivial stabilizer subgroups
H. We close this section by recalling a definition due to Ekedahl [4].
Definition 1.6. Let Ñρ denote the poset of normal stabilizer subgroups of G
ordered by reverse inclusion. The following is the characteristic polynomial of
ρ:
X
X
H
(−1)dim f (tdim V − 1).
ϕρ (t) =
H∈Ñρ f ∈∆(P̃ρ ),
max f =H
Assumption. From now on we will assume that the representation ρ is faithful,
i.e. Ker ρ = {e}. Moreover, notice that, given such a representation of G, we
can always reduce to the case where dim VG = 0 and, when this happens, we
say that this representations is essential (because Aρ is). If the representation
is faithful and clear from the context, we write AG instead of Aρ and, similarly,
for AG , PG , and P̃G .
1.3
Motivic classes of classifying stacks, Ekedahl’s formula
The aim of this section is to briefly introduce the motivic classes of the classifying
stack of a group and to present and to collect the necessary tools for this paper.
As a general reference for a more comprehensive introduction we point to [10].
We begin by recalling that the Grothendieck ring of algebraic varieties K0 (Vark )
is the group generated by the isomorphism classes {X} of algebraic k-varieties
X, under the relation
{X} = {Y } + {X \ Y }, for all closed subvarieties Y of X.
The ring structure of K0 (Vark ) is given by {X} · {Z} = {X × Z}.
6
Like algebraic varieties, algebraic stacks also have their own Grothendieck
ring. In [5, Theorem 4.1] it is proved that
K0 (Stackk ) = K0 (Vark )[L−1 , (Ln − 1)−1 , ∀n ∈ N],
where the symbol L stands for the class of the affine line A1k .
The classifying stack of the group G is usually defined as the stack quotient
of the point Spec(k) by the group G, i.e. BG := [Spec(k)/G]. Its motivic class is
denoted by {BG} ∈ K0 (Stackk ).
Ekedahl in [4] proposed a combinatorial way to approach the computation
of {BG}. Here we present his theorem in purely combinatorial terms, after a
preparatory definition.
Definition 1.7. Given a representation ρ : G → GL(V ) of a finite group G, we
write
b P̃ρ )
∆ρ := ∆(
and, for any f = {H1 ⊆ H2 ⊆ . . . ⊆ Hm } ∈ ∆ρ , dim f := |f | − 1, df := dim V Hm ,
and NG (f ) = ∩m
i=1 NG (Hi ).
Theorem 1.8 ([4, Theorem 3.4]). Let G be a finite group and let ρ : G →
GL(V ) be a faithful and essential representation of dimension d. Then
X
{BG}(Ld − 1) = {Ve/G} +
(−1)dim(f ) {BNG (f )}(Ldf − 1).
f ∈∆ρ
Remark 1.9. We point out that in the statement of Theorem 3.4 in [4] Ekedahl
uses the term stabilizer flag instead of our chain for f .
1.4
Characteristic classes of subspace arrangements
An arrangement of hyperplanes in kd is an arrangement of subspaces all whose
elements have codimension 1. In this section we recall a result of Aluffi [1] linking
the characteristic polynomial of a hyperplane arrangement to the characteristic
class of its complement M (A). We reproduce its proof in order to show that it
immediately generalizes to the case of subspace arrangements.
Theorem 1.10 ([1, Theorem 2.1]). Let L be the class of the affine line in the
Grothendieck ring of algebraic k-varieties, K0 (Vark ). Let A be an arrangement
of hyperplanes in kn . Then, we have the following equality in K0 (Vark ):
{M (A)} = χA (L).
Proof. Consider the intersection lattice L(A) defined in (1 and pick an element
x ∈ L(A). We set xo = x \ ∪y>x y, that is the complement in x of the union of
all intersections inside x. Trivially {x} = Ldim x .
Every P
element y in L(A) is the disjoint union of all xo with
Px > y, that is
{y} = x≥y {xo }. Now, by Möbius inversion we have {y o } = x≥y µ(y, x){x},
and therefore we can compute
X
X
µ(x)Ldim x = χA (L).
µ(0̂, x){x} =
{M (A)} = {0o } =
x∈L(A)
x≥0̂
7
It is now apparent that Aluffi’s argument also proves the following stronger
statement.
Theorem 1.11. Let B denote a subspace arrangement in kd . Then, with notations as above,
{M (B)} = χB (L) in K0 (Vark ).
2
Towards the conjecture
We now focus on the case of finite groups which admit representations whose
associated subspace arrangement is the set of intersections of an arrangement
of hyperplanes. These are the so-called finite reflection groups. A detailed
treatment of geometric and combinatorial aspects of hyperplane arrangements
associated to reflection groups is [12, Chapter 6]. Here we only sketch some
basics we’ll have use for.
Let V be a k-vector space. Any g ∈ GL(V ) is called a reflection if it has
finite order and it fixes a subspace of codimension 1 (which is then called the
reflecting hyperplane of g). Following [12, Section 6.2], we call reflection group
any finite group W ⊆ GL(V ) whose order is not divisible by char k and which is
generated by reflections. The Chevalley-Shephard-Todd theorem [3, 14] shows
that W is a finite reflection group exactly if and only if V /W is isomorphic to
affine space.
From now on when we talk about a finite reflection group W , we consider
the obvious representation ρ given by the inclusion in GL(V ) and we write AW
omitting reference to the representation.
In particular, we are interested in the quotient arrangement in V ≃ V /W :
AW /W
:= {X/W , X ∈ AW }.
Even if V /W ≃ V , this is not anymore an arrangement of subspaces in V , but
an arrangement of quotient varieties.
We can now state a conjecture that aims at generalizing Theorem 1.11.
Conjecture. If W is a finite complex reflection group, then,
{Ve/W } = χAW /W (L).
The statement of the conjecture would for instance follow from the existence
of a faithful representation of the group W such that one of the two following
conditions are satisfied for all nontrivial stabilizer subgroups H:
A {V /NG (H)} = Ldim V
H
B
V H/NG (H)
≃ Akdim V
H
H
for all H ∈ P̃ ′ (G);
for all H ∈ P̃ ′ (G).
In what follows we are going to show that the proof of this conjecture will have
immediate application in the study of the motivic class of the classifying stack
of a finite group. It is worth to note that any of the above conditions will imply
that the hypothesis of Theorem A are satisfied.
8
3
An inductive criterion
In this section we are going to prove Theorem A. For this we need two technical
results: the first one deals with the motivic class of the open complement Ve/G
and the second one relates this result to the class of BG.
Here and in what follows, µ denotes the Möbius function of P̃(G).
Lemma 3.1. Let ρ : G → GL(V ) be a d-dimensional faithful representation of
a finite group G. Then
X
H
µ(H){V /NG (H)}.
{Ve/G} =
H∈P̃ρ
Proof. We follow the same step of the proof in Theorem 1.10 and we have that
X
X
H
H
µ(H){V /NG (H)}.
µ({e}, H){V /NG (H)} =
{Ve/G} =
H≥{e}
H∈P̃ρ
Let us apply this to the computation of the class of BG.
Proposition 3.2. Let ρ : G → GL(V ) be a d-dimensional faithful representation of a finite group G. Then
X X
X
H
H
(−1)dim f {BNG (f )}(Ldim V −1).
µ(H){V /NG (H)}+
{BG}(Ld −1) =
H∈P̃ρ′
H∈P̃ρ
f ∈∆ρ
max f =H
Proof. We use Theorem 1.8 and Proposition 3.1 and we obtain the following.
X
X
H
(−1)dim(f ) {BNG (f )}(Ldf − 1),
µ(H){V /NG (H)} +
{BG}(Ld − 1) =
f ∈∆ρ
H∈P̃ρ
which readily implies the claim.
The next theorem is an inductive triviality criterion. Together with the
statement of the Conjecture presented in Section 2, it opens an avenue for
inductive proofs of triviality of the motivic class of BG. We will explain more
about this strategy in Section 4.1.
Theorem A. Let ρ : G → GL(V ) be a d-dimensional faithful and essential
representation of a finite group G such that
(1) {BNG (f )} = 1 for all f ∈ ∆ρ and
(2) {V /NG (H)} = Ldim V
H
H
for all nontrivial stabilizer subgroups H ∈ P̃ ′ (G).
Then,
{BG}ϕρ (L) = ϕρ (L),
where ϕρ is the characteristic polynomial of ρ (see Definition 1.6).
9
Proof. We start our computation by expanding the formula of Proposition 3.2:
{BG}(Ld − 1) =
Ld + µ(G)
X
H
µ(H)Ldim V
+
H∈P̃ρ′
X
+
H∈P̃ρ′
X
−
H∈P̃ρ′
X
f ∈∆ρ
max f =H
X
H
(−1)dim f {BNG (f )}Ldim V
(−1)dim f {BNG (f )}.
f ∈∆ρ
max f =H
Now isolate on the right hand side all the terms containing the motivic class of
BG:
{BG}(Ld − 1) =
+
Ld + µ(G)
X
H
µ(H)Ldim V
H∈P̃ρ′
+
X
{BG}Ldim V H
H∈P̃ ′
ρ
+
X
′
H∈P̃
ρ
−
X
f ∈∆ρ
max f =H
NG (f )6=G
X
{BG}
X
X
H∈P̃ρ′
−
H∈P̃ρ′
(−1)dim f
X
f ∈∆ρ
max f =H
NG (f )=G
H
(−1)dim f {BNG (f )}Ldim V
X
(−1)dim f
f ∈∆ρ
max f =H
NG (f )=G
f ∈∆ρ
max f =H
NG (f )6=G
(−1)dim f {BNG (f )}.
Using assumption (1) we can continue the computation as follows.
{BG}(Ld − 1) =
+
Ld + µ(G)
X
H
µ(H)Ldim V
H∈P̃ρ′
+
X
dim V H
{BG}L
H∈P̃ρ′
10
X
f ∈∆ρ
max f =H
NG (f )=G
dim f
(−1)
X
+
X
f ∈∆ρ
dim V H
L
H∈P̃ρ′
−
X
{BG}
X
X
H∈P̃ρ′
Now we add and subtract
X
(−1)dim f
(−1)dim f
f ∈∆ρ
max f =H
NG (f )6=G
X
X
X
(−1)
f ∈∆ρ
max f =H
NG (f )=G
H∈P̃ρ′ max f =H,
NG (f )=G
and
dim f
max f =H
NG (f )6=G
H∈P̃ρ′
−
X
H∈P̃ρ′ max f =H,
NG (f )=G
(−1)dim f ,
H
(−1)dim f Ldim V .
Remark also that, for all x 6∈ {{e}, G}, by Theorem 1.1.
X
X
(−1)dim f +1 = −µ(x).
(−1)dim f =
f ∈∆ρ
max f =x
′
f ∈P̃ρ,<x
Using this identity, we can rewrite as follows.
{BG}(Ld − 1) =
+
Ld + µ(G)
X
H
µ(H)Ldim V
H∈P̃ρ′
+
X
({BG} − 1)L
X
µ(H)Ldim V
X
({BG} − 1)
X
µ(H).
dim V H
H∈P̃ρ′
−
H∈P̃ρ′
+
+
X
dim f
(−1)
f ∈∆ρ
max f =H
NG (f )=G
H
X
f ∈∆ρ
max f =H
NG (f )=G
H∈P̃ρ′
(−1)dim f
H∈P̃ρ′
The defining identity of the Möbius function implies µ(G) +
µ(e) = 0. Thereby, we simplify as follows:
{BG}(Ld − 1) =
Ld − 1
11
P
H∈P̃ρ′
µ(H) +
+
X
({BG} − 1)L
X
({BG} − 1)
dim V H
H∈P̃ρ′
+
X
f ∈∆ρ
max f =H
NG (f )=G
H∈P̃ρ′
X
f ∈∆ρ
max f =H
NG (f )=G
dim f
(−1)
(−1)dim f .
The claim now follows by regrouping terms and noticing that NG (f ) = G implies
that all elements of f are normal subgroups.
4
The conjugacy classes stabilizer poset for W
Let us now focus on finite reflection groups. The following is a useful fact in
order to study P̃W .
Proposition 4.1. If W is a finite reflection group in GL(V ), then N is a
normal stabilizer subgroup if and only if W/N is a reflection group.
Proof. Let N be a normal subgroup of W . The subspace V N fixed by N is an
element of the lattice of intersections of AW , thus V N = ∩ni=1 Ri where Ri are
the reflecting hyperplanes of the reflections ri ∈ N . Call t1 , . . . , ts the reflections
that are not in N and Tj the reflecting hyperplane of tj .
If N is a normal stabilizer subgroup, then V N is a faithful representation of
W/N by Lemma 3.3 in [4]. Moreover, W/N is generated by τj = tj + N . Each τj
fixes V N ∩ Tj , a subspace of codimension one in V N .
For the reverse implication assume that W/N is generated by the reflections
γ1 , . . . , γk but N is not a normal stabilizer subgroup. Call N ′ the stabilizer
′
′
subgroup N ⊆ N ′ such that V N = V N . The G-orbit of V N consists of the
H
′
′
subspaces V with H in the same conjugacy class of N . If N is not a normal
subgroup then this orbit consists of at least two distinct subspaces. But this
′
goes against the fact that V N = V N and the orbit of V N consists only of the
N
points of V because N is normal. Thus N ′ needs to be normal. Since N ′ is
′
also a stabilizer subgroup, then (by the proof of the first implication) V N is a
faithful representation of the reflection group W/N ′ ≃ W/N/(N ′/N ). We know that
V N = ∩ni=1 Ri because W/N is generated by reflections, and similarly deduce
′
that V N is the intersection of ∩ni=1 Ri with certain Tj s (at least one), and this
is not possible. Therefore N ′ = N .
So we can compute the poset of conjugacy classes for a complex reflection
group.
Proposition 4.2. If W is an irreducible finite reflection group in GL(V ), then
ÑW = P̃W ∩ NW = {e, W }.
Proof. In order to prove the statement, we observe that if N is a non trivial
normal subgroup of W , then because of Proposition 4.1, the representation
decomposes in the sum of two representations V = V N ⊕ (V N )⊥ . This is
against the fact that W is an irreducible reflection group.
12
Hence, under the hypothesis of Theorem A, one can compute the main ingredient for the computation of BW .
Theorem B. If W is a d-dimensional irreducible finite reflection group in
GL(V ) that fulfills the hypothesis of Theorem A, then ϕW (t) = td − 1.
Proof. The proof of the results comes directly by combining Proposition 4.2 and
Theorem A.
4.1
The reduction to the conjecture
We are ready to show that if the conjecture holds, the motivic class of the
classifying stack of BW is trivial in the Grothendieck group of algebraic stacks.
Theorem C. If W is a finite reflection group such that Conjecture holds, then
{BW } = 1 in K0 (Stackk ).
Proof. Every reflection group is product of irreducible ones and we observe that
B(W1 × W2 ) = BW1 × BW2 and so {B(W1 × W2 )} = {BW1 }{BW2 }. Hence
we assume without loss of generality that W is an irreducible complex reflection
group.
One then easily proves the statement for small (inclusion-minimal) reflection
groups and proceeds by using the induction step as in the previous computations.
Then {BW }pW (L) = pW (L) and so by Proposition 4.2
{BW }(Ld − 1) = (Ld − 1).
The claim now readily follows since the polynomial Ld − 1 is clearly invertible
in K0 (Stackk ) = K0 (Vark )[L−1 , (Ln − 1)−1 ].
References
[1] P. Aluffi, Grothendieck classes and Chern classes of hyperplane arrangements, Int. Math. Res. Not. IMRN, (2013), pp. 1873–1900.
[2] F. A. Bogomolov, The Brauer group of quotient spaces of linear representations, Izv. Akad. Nauk SSSR Ser. Mat., 51 (1987), pp. 485–516, 688.
[3] C. Chevalley, Invariants of finite groups generated by reflections, Amer.
J. Math., 77 (1955), pp. 778–782.
[4] T. Ekedahl, A geometric invariant of a finite group. arXiv:0903.3148v1,
2009.
[5]
, The Grothendieck group of algebraic stacks. arXiv:0903.3143v2, 2009.
[6] H. Esnault and E. Viehweg, On a rationality question in the
Grothendieck ring of varieties, Acta Math. Vietnam., 35 (2010), pp. 31–
41.
[7] A. Hoshi, M.-C. Kang, and B. E. Kunyavskii, Noether’s problem and
unramified Brauer groups, Asian J. Math., 17 (2013), pp. 689–713.
13
[8] E. Looijenga, Motivic measures, Astérisque, (2002), pp. 267–297.
Séminaire Bourbaki, Vol. 1999/2000.
[9] I. Martino, The Ekedahl invariants for finite groups, J. Pure Appl. Algebra, 220 (2016), pp. 1294–1309.
[10]
, Introduction to the Ekedahl invariants, Math. Scand., 120 (2017),
pp. 211–224.
[11] E. Noether, Gleichungen mit vorgeschriebener Gruppe, Math. Ann., 78
(1917), pp. 221–229.
[12] P. Orlik and H. Terao, Arrangements of hyperplanes, vol. 300 of
Grundlehren der Mathematischen Wissenschaften [Fundamental Principles
of Mathematical Sciences], Springer-Verlag, Berlin, 1992.
[13] D. J. Saltman, Noether’s problem over an algebraically closed field, Invent. Math., 77 (1984), pp. 71–84.
[14] G. C. Shephard and J. A. Todd, Finite unitary reflection groups, Canadian J. Math., 6 (1954), pp. 274–304.
[15] R. P. Stanley, Enumerative combinatorics. Volume 1, vol. 49 of Cambridge Studies in Advanced Mathematics, Cambridge University Press,
Cambridge, second ed., 2012.
[16] R. G. Swan, Invariant rational functions and a problem of Steenrod, Invent. Math., 7 (1969), pp. 148–158.
[17] B. Totaro, The motive of a classifying space. arXiv:1407.1366, 2014.
Emanuele Delucchi
Department of Mathematics, University of Fribourg,
1700 Fribourg, Switzerland.
E-mail address: emanuele.delucchi@unifr.ch
Ivan Martino
Department of Mathematics, Northeastern University,
Boston, MA 02115, USA.
E-mail address: i.martino@northeastern.edu
14
| 4math.GR
|
Gradient Flows in Uncertainty Propagation
and Filtering of Linear Gaussian Systems
arXiv:1704.00102v4 [math.OC] 29 Sep 2017
Abhishek Halder, and Tryphon T. Georgiou
University of California, Irvine
Abstract— The purpose of this work is mostly expository and
aims to elucidate the Jordan-Kinderlehrer-Otto (JKO) scheme
for uncertainty propagation, and a variant, the LaugesenMehta-Meyn-Raginsky (LMMR) scheme for filtering. We point
out that these variational schemes can be understood as
proximal operators in the space of density functions, realizing
gradient flows. These schemes hold the promise of leading to
efficient ways for solving the Fokker-Planck equation as well as
the equations of non-linear filtering. Our aim in this paper is
to develop in detail the underlying ideas in the setting of linear
stochastic systems with Gaussian noise and recover known
results.
I. I NTRODUCTION
n
Consider the gradient flow dx
dt = −∇ψ(x) in R , where
∇ is the gradient (w.r.t. the Euclidean metric) of a function
ψ(x), and consider the discretization
xk = xk−1 − h∇ψ(xk−1 ), for k ∈ N.
was to show that the minimizer of (2) approximates the
solution ρ(x, t) of the heat equation
∂ρ(x, t)
= ∆ρ(x, t), with ρ(x, 0) = ρ0 (x),
∂t
in the sense that ̺k (x, h) → ρ(x, t = kh), as h ↓ 0. Thus,
(2) establishes the remarkable result that the heat equation is
the gradient descent flow of the (negative) entropy integral
with respect to the Wasserstein metric.
An analogous JKO-like scheme was introduced recently
in Laugesen et al. [9] for the measurement update-step in
continuous-time filtering. More specifically, let us consider
the general system of Itô stochastic differential equations
(SDE’s)
p
(4a)
dx(t) = −∇U (x) dt + 2β −1 dw(t),
dz(t)
= c(x(t), t) dt + dv(t),
(4b)
(1)
where x ∈ Rn , z ∈ Rm , β > 0, U (·) is a potential, the
process and measurement noise processes w(t) and v(t) are
Wiener and satisfy E [dwi dwj ] = Qij dt ∀ i, j = 1, . . . , n
and E [dvi dvj ] = Rij dt ∀ i, j = 1, . . . , m, with Q, R ≻ 0,
respectively. Then x(t) and z(t) represent state and sensor
measurements at time t. Further, as usual, v(t) is assumed to
be independent of w(t) and independent of the initial state
x(0). Given the history of noise corrupted sensor data up to
time t, the filtering problem requires computing the posterior
probability distribution that obeys the Kushner-Stratonovich
stochastic PDE [19]–[21].
the solution, which depends on the choice of the step size
h, satisfies xk (h) → x(t = kh), as h → 0.
For the special case of trivial state dynamics, i.e., dx = 0,
and R the identity, Laugesen et al. [9] introduced
−
̺+
k (x, h) = arg inf {DKL ̺k̺k + hΦ(̺)}, k ∈ N, (5)
As is well known in finite-dimensional optimization,
1
xk = arg min{ kx − (xk−1 − h∇ψ(xk−1 ))k2 }
2
x
1
= arg min kx − xk−1 k2 + hψ(x) + o(h).
2
x
By recursively evaluating the proximal operator [1], [2]
xk
k·k
= proxhψ (xk−1 )
1
= arg min{ kx − xk−1 k2 + hψ(x)},
2
x
The Jordan-Kinderlehrer-Otto (JKO) scheme, introduced
in [3], is a similar recursion in the infinite-dimensional space
of density functions with respect to the Wasserstein geometry
[4], namely,
̺k (x, h) = arg min
̺
1 2
W (̺, ̺k−1 ) + hS(̺), k ∈ N, (2)
2 2
where W2 (·, ·) denotes the Wasserstein-2 distance between
two (probability) density functions,
Z
̺(x) log(̺(x))dx
(3)
S(̺) :=
Rn
is the negative differential entropy functional, and dx is the
volume element. In other words, (2) can be viewed as the
2
proximal operation proxW
hS (̺k−1 ). The main result in [3]
̺∈D2
with
1
E̺ {(yk − c(x))⊤ R−1 (yk − c(x))}, (6)
2
where yk is the noisy measurement in discrete-time defined
via yk := h1 ∆zk , ∆zk := zk − zk−1 , and {zk−1 }k∈N the
sequence of samples of z(t) at {tk−1 }k∈N for tk−1 := (k −
1)h. Laugesen et al. [9] proved that the LMMR equation (5)
approximates the solution of
h
⊤
dρ+ (x(t), t) = c(x(t), t) − Eρ+ {c(x(t), t)} R−1
dz(t) − Eρ+ {c(x(t), t)}dt ρ+ (x(t), t), (7)
Φ(̺) :=
i.e., of the Kushner-Stratonovich PDE corresponding to
+
dx = 0, in the sense that ̺+
k (x, h) ⇀ ρ (x(t), t) over
t ∈ [(k − 1)h, kh), as h ↓ 0. Thus, they showed that
in this special case, the Kushner-Stratonovich PDE is the
gradient descent of functional Φ(·) with respect to DKL , i.e.,
−
KL
computed by proxD
hΦ (̺k ).
The purpose of the present paper is to develop this circle of
ideas, namely, that both uncertainty propagation and filtering
can be viewed as gradient flows in the special case of linear
stochastic systems with Gaussian noise. In fact, we consider
the general case of the linear stochastic system
dx(t) = Ax(t) dt + B dw(t),
(8)
where w(t) is a Wiener process as before, though possibly
not of the same dimension as x. We suppose that the uncertain initial condition x(0) has a known Gaussian PDF, the
matrix A is Hurwitz, and that the diffusion matrix B is such
that (A, B) is a controllable pair. For this, we recover the
well-known propagation equations (see for example [6, Ch.
3.6]) for the mean and covariance of the state x(t) out of the
JKO-scheme via a two-step optimization. The applicability
of the JKO-scheme to (8) is not immediately obvious since
the development in [3] requires the state dynamics to be
in the canonical form (4a) with the drift being a gradient
and the diffusion coefficient being a positive scalar. We
further show that this two-step optimization procedure that
we introduce, can be used to derive the Kalman-Bucy filter
from a generalized version of the LMMR equation (5). We
remark that variational schemes for estimator/observer design
based on gradient flows can also be seen as regularized
dynamic inversion in the spirit of [23].
Notation
Throughout we use bold-faced upper-case letters for matrices, and bold-faced lower case letters for vectors. The
notation I stands for identity matrix of appropriate dimension, we use tr(·) and det(·) to respectively denote the trace
and determinant of a matrix, and the symbols ∇ and △
denote the gradient and Laplacian operators, respectively. We
denote the space of probability
R density functions (PDFs) on
Rn by
D
:=
{ρ
:
ρ
≥
0,
Rn ρ = 1}, by D2 := {ρ ∈
R
D | Rn x⊤ x ρ(x)dx < ∞} the space of PDFs with finite
second moments, by Dµ,P denote the space of PDFs which
share the
R same mean vector µ and same covariance matrix
P := Rn (x − µ)(x − µ)⊤ ρ(x)dx. Likewise, let Dµ,τ
denote the space of PDFs which have the same mean µ and
same trace of covariance τ := tr(P ) > 0. Clearly, Dµ,P ⊂
Dµ,τ ⊂ D2 ⊂ D. We use the symbol N (µ, P ) to denote
a multivariate Gaussian PDF with mean µ, and covariance
P . The notation x ∼ ρ means that the random vector x has
PDF ρ; and E {·} denotes the expectation operator while,
when
the probability density is to be specified, Eρ {·} :=
R
(·)ρ(x)dx.
n
R
II. JKO S CHEME
IN
G ENERAL
We now discuss in some detail the JKO scheme for the
case of the diffusion process in (4a), and the corresponding
Fokker-Planck equation [7]
∂ρ
= ∇ · (∇U (x)ρ) + β −1 △ρ, ρ(x, 0) = ρ0 (x). (9)
∂t
To this end we first introduce the Wasserstein metric, the
free energy, and the Kullback-Leibler divergence.
The Wasserstein-2 distance W2 (ρ1 , ρ2 ) between a pair
of PDFs ρ1 (x), ρ2 (y) ∈ D (or, even between probability
measures, in general), supported on X , Y ⊆ Rn , is
12
Z
2
(10)
W2 (ρ1 , ρ2 ) :=
inf
kx − yk2 dσ(x, y)
dσ∈Π(ρ1 ,ρ2 )
X ×Y
where Π (ρ1 , ρ2 ) is a probability measure on the product
space X × Y having finite second moments and marginals
ρ1 , ρ2 , respectively. It is well known that W2 : D × D 7→
[0, ∞) is a metric [4, p. 208]. Further, its square W22 (ρ1 , ρ2 )
represents the smallest amount of “work” needed to “morph”
ρ1 into ρ2 [5]. The infimum is achieved over a space of
measures, and under mild assumptions, the minimizing dσ
has support on the graph of the optimal “transportation map”
T : X 7→ Y that pushes ρ1 to ρ2 . Alternatively, one may
view the optimization problem in (10) as seeking the joint
distribution of two random vectors x and y, distributed
according to
ρ1 and ρ2 respectively, that minimizes the
variance E kx − yk22 .
Another important notion of distance that enters into our
discussion, which however is not a metric, is the KullbackLeibler divergence (also known as relative entropy) between PDFs or positive Rmeasures in general. This is given
dρ1
dρ1
1
by DKL (dρ1 kdρ2 ) := ( dρ
dρ2 ) log( dρ2 )dρ2 where dρ2 denotes the Radon-Nikodym derivative. When1 dρi = ρi (x)dx,
i ∈ {1, 2}, are absolutely continuous with respect to the
Lebesgue measure, then
Z
ρ1 (x)
ρ1 (x) log
DKL (dρ1 kdρ2 ) =
dx.
ρ
2 (x)
Rn
Gradient flow requires
an energy functional, which we
R
denote by E (ρ) := U (x)ρ(x)dx, where U (·) is the potential energy. Then, a stochastically driven gradient flow is
modeled by the Itô SDE (4a) and the Fokker-Planck equation
(9) for the corresponding PDF as before. The stationary
solution of (9) is the Gibbs distribution ρ∞R(x) = Z1 e−βU(x) ,
where the normalization constant Z := Rn e−βU(x) dx is
known as the partition function. The distance to equilibrium
which, in a way, quantifies the amount of work that the
system can deliver, is captured by the so-called free energy
functional F (ρ), defined as the sum of the energy functional
E (ρ) and the negative differential entropy S (ρ) given in (3),
that is,
F (ρ) := E (ρ) + β −1 S (ρ)
= β −1 DKL ρke−βU(x) .
(11a)
(11b)
1 Here we use a slight abuse of notation in that we denote both, the
measure and the density with the same symbol.
For the case of (4a), the JKO scheme becomes
parameterized subset of D2 in such a way that when we
optimize
the functionals 21 W 2 (̺, ̺0 ) and hF (̺) individually
1
̺k (x, h) = arg inf { W22 (̺, ̺k−1 ) + h F (̺)}, k ∈ N, (12) over this chosen subspace, the arginfs (which are achieved)
2
̺∈D2
of the two individual optimization problems match. Hence,
for step-size h > 0, and initialized by a given ̺0 (satisfying the sum of the two has the same arginf over the chosen
F (̺0 ) < ∞). For U (x) ≡ 0, (12) reduces to (2). Solving subspace. In the second step, we optimize over the subspace
(12) results in a sequence of PDFs {̺k (x, h)}k∈N in D2 . parameters. Our choice for the parameterized set of densities
It can be shown following [3] that ̺k (x, h) ⇀ ρ (x(t), t) is Dµ,P ⊂ D2 , i.e., the PDFs with given mean-covariance
weakly in L1 (Rn ) for t ∈ [(k − 1)h, kh), k ∈ N, as h ↓ 0.
pair (µ, P ); the choice of the optimal pair is to be decided
in the second optimization step.
III. JKO S CHEME FOR LINEAR G AUSSIAN SYSTEMS
The development below requires several technical lemmas
that
are collected in the Appendix.
We now develop and solve the JKO scheme for the linear
Gaussian system in (8) with ρ0 = N (µ0 , P0 ) and Q ≡ I,
without loss of generality. Therefore, we are concerned with
the linear Fokker-Planck (Kolmogorov’s forward) PDE
n
∂ρ
∂2
1 X
= −∇ · (ρAx) +
ρBQB ⊤ ij . (13)
∂t
2 i,j=1 ∂xi ∂xj
Under the stated assumptions, it is well-known that (13)
admits a steady-state, which is Gaussian with mean zero
and covariance P∞ ≻ 0 that uniquely solves the algebraic Lyapunov equation AP∞ + P∞ A⊤ + BQB ⊤ = 0.
Also, starting from ρ0 (x) = N (µ0 , P0 ), the transient is
ρ(x(t), t) = N (µ(t), P (t)) where the µ(t) and P (t) satisfy
the following ordinary differential equations (ODEs) [6, Ch.
3.6]
µ̇(t) = Aµ(t), µ(0) = µ0 ,
(14a)
Ṗ (t) = AP (t) + P (t)A⊤ + BQB ⊤ , P (0) = P0 . (14b)
Below, we recover these equations using the JKO scheme.
First, in Section III-A, wep
explain how this is done when
A is symmetric and B ≡ 2β −1 I, β > 0, in which case,
Ax = −∇U (x) for a suitable potential. The general case,
in Section III-B, is more involved and requires to view the
drift as the gradient of a time-varying potential.
p
A. The case where A is symmetric and B ≡ 2β −1 I
p
2β −1 I, the pair (A, B) is controllable.
Since B ≡
Further, since A is Hurwitz and symmetric, Γ := −A ≻ 0,
and utilizing the potential
1 ⊤
x Γx ≥ 0,
2
we can cast (8) in the canonical form (4a). Then,
1 ⊤
E(̺) := E[U (x)] =
µ Γµ + tr (ΓP ) ,
2
where P is the covariance of x. Notice that E(·) depends
on the PDF of x only via its mean and covariance.
U (x) :=
To carry out the optimization (12) over D2 , we adopt
a two-step strategy. Our approach is motivated by the
observation that the objective function in (12) is a sum
of two functionals. In the first step, we choose a suitable
1) Optimizing over Dµ,P : Given ̺0 ≡ ρ0 = N (µ0 , P0 ),
and a µ and P ≻ 0, we first determine
1
̺1 = arg inf { W22 (̺, N (µ0 , P0 )) + h F (̺)}.
(15)
̺∈Dµ,P 2
1
From Lemma 2 we see that arg inf W22 (̺, N (µ0 , P0 ))
2
̺∈Dµ,P
is achieved by ̺ = N (µ, P ) (uniquely). From Lemma 3,
since U (x) = 21 x⊤ Γx, we also know that arg inf h F (̺) is
̺∈Dµ,P
achieved by ̺ = N (µ, P ) (uniquely). Thus, ̺1 = N (µ, P ).
The infimal value in (15) is now the sum of the two infima,
"
1 !#
2
1
1
h
1
2
2
2
+
k µ − µ0 k2 + tr P + P0 − 2 P0 P P0
2
2β
h
i
−n − n log(2π) − log det(P ) + βµ⊤ Γµ + β tr (ΓP ) . (16)
2) Optimizing over (µ, P ): Equating the gradient of (16)
w.r.t. µ to zero, results µ = φ(µ0 ) := (I + hΓ)−1 µ0 . The
recursion µk = φ(µk−1 ), up to first order in h, becomes
µk = (I − hΓ) µk−1 + O(h2 ).
(17)
We see that this recursion coincides with the solution of
(14a) in the “small h” limit. Specifically, µ(t) = eAt µ0 ⇒
k
µk := µ(t = kh) = eAh µ0 ⇒ µk = eAh µk−1 =
(I + hA) µk−1 + O(h2 ), which is same as (17) since Γ :=
−A. Thus, we have recovered (14a) using discrete timestepping via JKO scheme in the small step-size limit.
Setting the gradient of (16) w.r.t. P to zero (using Lemma
4), we obtain
1 1
1
h
−1
−1 2
P02 − P −1 + hΓ = 0. (18)
I − P02 P0 2 P −1 P0 2
β
− 12
By pre and post multiplying both sides of (18) with P0
1
−1 2
−1
=: Z, we arrive at
and letting P0 2 P −1 P0 2
,
β
β −1
−1
Z − P0 2 (I + hΓ)P0 2 = 0,
h
h
which admits the unique closed-form solution [16, p. 304]
21 !
h − 12
β
− 12
−I + I + 4 P0 (I + hΓ) P0
. (19)
Z=
2h
β
Z2 +
Expanding (19), we obtain
β
1 h
−I + I + 4 P0 (I + hΓ) P0 +
2h
2 β
#
1 1
2
1
−
1
16h
−1
−
−1
3
2 2
2
2
(I + hΓ) P0 (I + hΓ) P0 + O(h )
P
2!
β2 0
h
−1
−1
= P0 2 I + hΓ − P0−1 P0 2 + O(h2 ).
(20)
β
Z=
−1
2
−1
2
1
−1 2
−1
back into (20), squarSubstituting Z = P0 2 P −1 P0 2
ing, and rearranging, we get that
−1
−1
1
1
P = I + h Γ − P0−1
P0 I + h Γ − P0−1
+O(h2 )
β
β
1
1
P0 I − h Γ − P0−1
+ O(h2 )
= I − h Γ − P0−1
β
β
= Ψ(P0 ) + O(h2 ),
where Ψ(P0 ) := P0 + h −ΓP0 − P0 Γ + 2β −1 I . Set the
matrix-valued recursion Pk = Ψ (Pk−1 ), where
Ψ (Pk−1 ) := Pk−1 + h −ΓP0 − P0 Γ + 2β −1 I + O(h2 ). (21)
To show that (21) indeed recovers (14b),
p first notice that
substituting A = A⊤ = −Γ and B = 2β −1 I in (14b)
results the Lyapunov differential equation
Ṗ (t) = −ΓP (t) − P (t)Γ + 2β −1 I
subject to P (0) = P0 , which can be solved via the method
of integrating factor as
1
(22)
P (t) = Γ−1 I − e−2Γt + e−Γt P0 e−Γt .
β
Thus, for t = kh, (22) gives
Pk := P (kh) = β −1 Γ−1 I − e−2Γkh + e−Γkh P0 e−Γkh
1) Equipartition of energy coordinate transformation:
Consider
the stationary covariance P∞ associated with
√
(A, 2B) that satisfies
AP∞ + P∞ A⊤ + 2BB ⊤ = 0.
For a system at a stationary distribution, we define the
thermodynamic temperature θ as the average amount of
“energy” per degree of freedom, that is,
1
θ := tr(P∞ ),
n
and, thereby, β := θ−1 the inverse temperature. By pre and
−1
post multiplying (23) with P∞ 2 , and rescaling by θ so as to
preserve the temperature in the new coordinates, we get
√
√
Aep θI + θIA⊤
2θBep ( 2θBep )⊤ = 0,
(24)
ep +
Pk − Pk−1 = 2β −1 hI − hΓP0 − hP0 Γ + O(h2 ),
which is same as (21) derived from JKO scheme. Thus,
we have recovered the covariance evolution through FokkerPlanck dynamics using the time-stepping procedure via JKO
scheme in the small step-size limit.
−1
1
−1
2
, Bep := P∞ 2 B, while
where Aep := P∞ 2 AP∞
the stationary covariance θI reflects equipartition of energy.√The equipartition√of energy co-ordinate transformation
(A, 2B) 7→ (Aep , 2θBep ), corresponds to the state√ −1
transformation x 7→ xep := θP∞ 2 x, leading to
√
dxep (t) = Aep xep (t) dt + 2θBep dw(t).
(25)
This settles how β is to be defined and interpreted in the
context of JKO scheme (11) and (12). On the other hand,
Aep being similar to A, is guaranteed to be Hurwitz but not
symmetric, unless A was symmetric to begin with. Thus, it
remains for us to “symmetrize” Aep and define a suitable
potential energy U (·) as needed in (12). We do this next.
2) Symmetrization transformation: We introduce the
time-varying transformation
= 2β −1 khI + (P0 − khΓP0 − khP0 Γ) + O(h2 ).
Replacing k with k−1 in the latter yields a similar expression
for Pk−1 . Then, subtracting these expressions for Pk−1 from
Pk we obtain that
skew
where
Askew
ep
xep 7→ xsym := e−Aep
:=
1
2 (Aep
skew
t
t
xep
A⊤
ep ).
−
This results in
√
√
(Aep , 2θBep ) 7→ (F (t), 2θG(t)),
with
F (t) := e−Aep
skew
Aep
Asym
ep e
where, similarly, Asym
:=
ep
satisfies
t
skew
, and G(t) := e−Aep
1
2 (Aep
dxsym (t) = F (t)xsym (t) dt +
B. The case of Hurwitz A and controllable (A, B)
√
We scale B into 2B without loss of generality, and
take as initial PDF ̺0 ≡ ρ0 = N (µ0 , P0 ). Since we allow
any Hurwitz√(not necessarily symmetric) A, and any B that
makes (A, 2B) a controllable pair, it is not apparent if
and how one can express (8) in the canonical form (4a).
The main impediment in doing so, is twofold: (1) how to
define the potential energy U (x), and (2) how to interpret and
define the parameter β in the generic case. In the following,
we show that by two successive co-ordinate transformations,
system (8) can indeed be put in the form (4a). Similar
transformations have been mentioned in [17, p. 1464], [18]
in a different context.
(23)
t
Bep ,
+ A⊤
ep ). Thus, xsym (t)
√
2θG(t) dw(t).
(26)
Notice that F (t) is symmetric for all t. Furthermore, observe that the new coordinates xsym is simply obtained by a
(time-varying) orthogonal transformation of the equipartition
of energy coordinates xep . Hence the stationary covariance
of xsym is identical to that of xep , which is θI (from Section
III-B.1). What happens is that the covariance of xsym (t)
tends to the same steady state value as t → ∞ in spite of
the fact that (26) has time varying coefficients. To see this
⊤
in different way, we can rewrite (24) as Bep Bep
= −Asym
ep ,
and deduce that
skew
G(t)G(t)⊤ = e−Aep
skew
⊤ Aep t
Bep Bep
e
= −F (t),
√
√
⇒ F (t)θI + θIF (t) + 2θG(t)( 2θG(t))⊤ = 0.
t
(27)
The symmetrization xep 7→ xsym leaves the stationary
covariance θI invariant. This guarantees that the definition
of temperature θ stays intact. The coordinate transformations
described above are summarized in Table I.
3) Recovery of the Fokker-Planck solution: We are now
ready to apply the JKO scheme to√ the generic stochastic
linear system dx(t) = Ax(t) dt + 2B dw(t), with initial
PDF ρ(x(0), 0) = N (µ0 , P0 ). To this end, we carry out a
computation akin to the two steps in Section III-A, for the
transformed SDE (26) in the symmetrized coordinate xsym .
From there on, we recover the Fokker-Planck solution in the
original coordinate x.
Since x 7→ xsym is a linear transformation, it follows
that xsym ∼ N (µsym , Psym ) whenever x ∼ N (µ, P ).
Thus, carrying out the first step of the optimization in xsym
coordinate, we get an expression similar to (16) wherein
(µ, P ) is to be replaced by (µsym , Psym ), and (µ0 , P0 ) is
to be replaced by (µsym0 , Psym0 ). To carry out the second
⊤
step of optimization, notice that Asym
= −Bep Bep
0,
ep
skew
skew
−Aep t sym Aep t
and consequently F (t) = e
Aep e
0. Thus,
considering the time-varying potential
1
U (xsym ) := − x⊤
F (t)xsym ≥ 0,
2 sym
and setting the partial derivative of the infimal value from
first stage of the optimization w.r.t. µsym to zero, results
the recursion µsymk = (I − hF (kh))−1 µsymk−1 . Recalling
skew √
−1
that xsym = e−Aep t θP∞ 2 x, we arrive at a recursion in
original coordinate:
1
skew
2 Aep
µk = P∞
e
kh
skew
{(I − hF (kh))−1 eAep
e
−Askew
kh
ep
−1
P∞ 2
h
}
µk−1 .
(28)
By series expansion and collecting linear terms in h, one can
verify the following:
2
(I − hF (kh))−1 = I + hAsym
ep + O(h ),
−1 Askew
h
ep
(I − hF (kh))
e
Askew
kh
ep
e
where C ∈ Rm×n , and ρ0 = N (µ0 , P0 ). The conditional
PDF ρ+ (x(t), t) = N (µ+ (t), P + (t)), given measurements
up to time t, is well-known and given by the Kalman-Bucy
filter [22]
dµ+ (t) = Aµ+ (t)dt + K(t) dz(t) − Cµ+ (t)dt , (31a)
Ṗ +(t) = AP +(t)+P +(t)A⊤+2BB ⊤−K(t)RK(t)⊤ (31b)
that specifies a vector SDE and a matrix ODE, respectively,
for the conditional mean µ+ (t) and covariance P + (t). The
initial conditions are µ+ (0) = µ0 , P + (0) = P0 , and
K(t) := P + (t)C ⊤ R−1 is the so-called Kalman gain.
In the sequel, we demonstrate that by applying the twostep optimization strategy we used before in Section III, we
can recover the Kalman-Bucy filter from LMMR-equation
(5) for the linear Gaussian case as the h ↓ 0 limit.
A. LMMR gradient descent scheme
Once again we proceed with carrying out the following
two optimization steps. First, we optimize (5) over Dµ,P ,
and then optimize the minimum value over the choice of
parameters (µ, P ).
−
−
1) Optimizing over Dµ,P : Consider ̺−
k = N (µk , Pk )
to be our prior for the state PDF at time t = kh. Observe
that
inf
̺∈Dµ,P
−
DKL ̺kN (µ−
k , Pk ) =
inf
̺∈Dµ,P
−E̺ {log
e
F ILTERING
dz(t) = Cx(t) dt + dv(t),
= I + hAep + O(h ),
e
FOR
In this section, we focus on the linear Gaussian filtering
problem, with process model and measurement models
√
dx(t) = Ax(t)dt + 2Bdw(t),
2
−1 Askew
h −Askew
kh
ep
ep
(I − hF (kh))
IV. JKO- LIKE S CHEMES
Z
̺(x) log ̺(x)dx
Rn
−
N (µ−
k , Pk )} ,
(32)
and that
2
= I + hAep + O(h ).
−1
1h
⊤
(µ − µ−
Pk−
(µ − µ−
k)
k )
2
1
+ tr P (Pk− )−1 − log (2π)n det(Pk− )
2
−
E̺ {log N (µ−
k , Pk )} = −
Hence (28) yields
1
−1
2
Aep P∞ 2 µk−1 + O(h2 )
µk = I + hP∞
= (I + hA) µk−1 + O(h2 ),
− 21
(29)
1
2
where the last equality follows from Aep := P∞ AP∞
.
hA
2
Since µ̇ = Aµ and e = I + hA + O(h ), in the small h
limit, equation (29) thus recovers (14a), as in Section III-A.
A similar straightforward but tedious computation leads to
the matrix recursion
Pk − Pk−1 = h(APk−1 + Pk−1 A⊤ + 2BB ⊤ ) + O(h2 ),
(30)
which in the limit h ↓ 0, is indeed a first-order approximation
of the Lyapunov equation for the original system. We omit
the details for brevity.
remains invariant for all ̺ ∈ Dµ,P . Therefore, the arginf
in (32) is achieved by the Gaussian PDF N (µ, P ) (i.e., the
maximum entropy PDF with given mean-covariance), and
−
the infimal value is precisely DKL (N (µ, P )kN (µ−
k , Pk )).
On the other hand, notice that
1h
1
(yk − Cµ)⊤
E̺ {(yk − Cx)⊤ R−1 (yk − Cx)} =
2
2
i
R−1 (yk − Cµ) + tr C ⊤ R−1 CP
= constant
(33)
inf
̺∈Dµ,P
❤❤❤
→
❤❤❤Coordinate
❤❤❤
Attribute ↓
❤❤
Original
Equipartition of energy
Symmetrization
State vector
x
xep
xsym
(A,
System matrices
Stationary covariance
√
2B)
P∞
(Aep ,
√
2θBep )
θI
(F (t),
√
2θG(t))
θI
TABLE I: Summary of the coordinate transformations for Section III-B.
as well over Dµ,P . Hence
−
arg inf DKL ̺kN (µ−
k , Pk )
B. Alternative JKO-like schemes for filtering
̺∈Dµ,P
+
h
E̺ {(yk − Cx)⊤ R−1 (yk − Cx)} = N (µ, P ),
2
and the corresponding infimum value is
1
− −1
⊤
tr (Pk− )−1 P + (µ−
(µ−
k − µ) (Pk )
k − µ) − n−
2
h
(yk − Cµ)⊤ R−1 (yk − Cµ)
log det (Pk− )−1 P +
2
+ tr C ⊤ R−1 CP .
(34)
2) Optimizing over (µ, P ): Equating the partial derivative
of (34) w.r.t. µ to zero, and setting µ ≡ µ+
k in the resulting
algebraic equation, we get
+
⊤ −1
(Pk− )−1 µ−
yk − Cµ+
k − µk + hC R
k = 0,
−
− ⊤ −1
(35)
yk − Cµ+
⇒µ+
k .
k = µk + hPk C R
On the other hand, equating the partial derivative of (34)
w.r.t. P to zero, and then setting P ≡ Pk+ in the resulting
algebraic equation, we get
(Pk+ )−1 = (Pk− )−1 + hC ⊤ R−1 C ⇒ Pk+ = I + hPk− C ⊤
−1 −
R−1 C
Pk = Pk− − hPk− C ⊤ R−1 CPk− + O(h2 ).
(36)
With ∆zk = yk h, as in Section I,
2
µ+ (t)dt = µ+
k h + O(h ),
and from (29) that
+
2
µ−
k = (I + hA)µk−1 + O(h ).
These, together with (36), allow us to simplify (35) as
2
+
+
+ ⊤ −1
µ+
∆zk − hCµ+
k −µk−1 = hAµk−1 + Pk C R
k + O(h ),
which in the limit h ↓ 0, leads to (31a).
Substituting (30) into (36) we arrive at
+
+
−hPk−1
C ⊤ R−1 CPk−1
+ O(h2 ).
In the limit h ↓ 0, (37) recovers (31b).
̺+
k (x, h) = arg inf
̺∈D2
1 2
W2 ̺, ̺−
+ hΦ(̺),
k
2
k ∈ N, (38)
where the functional Φ(·) is as in (6). The template of the
two-step optimization again applies and, specializing to the
linear Gaussian case, the solution of (38) in the h ↓ 0 limit,
is N (µ+ (t), P + (t)), given by
dµ+ (t) = Aµ+ (t)dt + L dz(t) − Cµ+ (t)dt ,
(39a)
Ṗ + (t)=(A − LC)P + (t)+P + (t)(A − LC)⊤+2BB ⊤(39b)
where L := C ⊤ R−1 , and µ+ (0) = µ0 , P + (0) = P0 . This
follows by noticing from Sections III-A.1 and IV-A.1 that
1 2
−
−
W ̺, N (µk , Pk + hΦ(̺) = N (µ, P ),
arg inf
2 2
̺∈Dµ,P
where the infimum value is
1
1
− 21 2
−
− 12
2
P
(P
)
k µ−µ−
k
+
tr
P
+
P
−2
(P
)
k
k 2
k
k
2
h
+ (yk − Cµ)⊤ R−1 (yk − Cµ)+tr C ⊤ R−1 CP .(40)
2
dz(t) = ∆zk + O(h2 ),
+
+
+
Pk+ − Pk−1
= h(APk−1
+ Pk−1
A⊤ + 2BB ⊤ )
The ideas in the LMMR-scheme suggest the possibility
of alternative variational schemes to approximate stochastic
estimators. Such a viewpoint has been put forth in [23],
promoting the notion of regularized dynamic inversion. As an
example, one may consider a gradient descent with respect
to the Wasserstein distance 12 W22 , instead of KL-divergence
DKL in (5). In that case, the posterior may be constructed
according to
(37)
Equating the partial derivative of (40) w.r.t. µ to zero, then
+
+
setting µ ≡ µ+
k , and using (29), we find (µk −µk−1 ) equals
⊤ −1
2
∆zk − hCµ+
hAµ+
k + O(h ),
k−1 + C R
(41)
which in the limit h ↓ 0, results the SDE (39a). Similarly,
using Lemma 4, we equate the partial derivative of (40) w.r.t.
P to zero, and then setting P ≡ Pk+ , we get
(Pk+ )−1 = I + hC ⊤ R−1 C (Pk− )−1 I + hC ⊤ R−1 C ⇒
Pk+ = Pk− − h Pk− C ⊤ R−1 C + C ⊤ R−1 CPk− + O(h2 ),
+
+
which combined with the recursion Pk− = Pk−1
+h(APk−1
+
⊤
⊤
2
+ Pk−1 A + 2BB ) + O(h ) from Section III-B.3, yields
+
+
+
Pk+ = Pk−1
+h A − C ⊤ R−1 C Pk−1
+ Pk−1
(A−
i
⊤
2
⊤ −1
⊤
C R C + 2BB + O(h ). (42)
In the limit h ↓ 0, recursion (42) gives Lyapunov ODE (39b).
It is instructive to compare the SDE-ODE system (39)
with that in (31). In the case of (39), the estimator is of
a Luenberger type with a static gain matrix L which is
decoupled from the covariance, unlike (31). The estimator
(39) is obviously not optimal in the minimum mean-square
error sense. It is only presented here as a guideline to explore
other variational schemes with desirable properties.
V. C ONCLUDING
REMARKS
Reformulating uncertainty propagation and the filtering
equations as gradient flows [8] is potentially transformative
[3] [9]. The full power of this viewpoint is yet to be
uncovered. Moreover, casting the iterative approximation
steps in the language of proximal operators on the space
of density functions may provide theoretical insights and
computational benefits. A specific direction of future work
would be developing proximal algorithms [2] to numerically
solve the nonlinear filtering problem by recursively solving
convex optimization problems, and to quantify computational
performance of the same with respect to existing sequential
Monte Carlo algorithms like the particle filter. The purpose
of the present paper has been to highlight and elucidate
the ideas in [3] and [9] in the context of linear Gaussian
systems. We hope that this study will help to motivate further
exploration of this topic.
A PPENDIX
In this Appendix, we collect some lemmas that are used in
Sections III and IV. In addition, we will show in Corollary
1 below that applying Lemma 1 and 2 together enables us
to provide an alternative proof of a Theorem in [14], which
might be of independent interest.
Lemma 1: If X and Y are symmetric positive definite
1
21
p
1
matrices, then tr X 2 Y X 2
≤ tr (X) tr (Y ).
Proof: From Uhlmann’s variational formula (see [10],
also Theorem 6.1 in [11]) , given any G ≻ 0, we have
21 p
1
1
≤ tr (XG) tr (Y G−1 ),
(43)
tr
X2Y X2
where the equality in (43) is achieved for the specific choice
1
− 21 1 1
1
1
1
Gopt = Y 2 X 2 Y X 2
X 2 Y 2 X − 2 . Specializing
(43) for G = Y , and noting that tr (XY ) ≤ tr (X) tr (Y ),
the statement follows.
Lemma 2: Given a PDF ̺0 (x) ∈ D2 with mean
µ0 ∈ Rn , and n × n covariance matrix P0 ≻ 0. Then
inf W22 (̺, ̺0 ) equals
̺∈Dµ,P
kµ−
µ0 k22
1
21
1
2
2
,
+ tr P + P0 − 2 P0 P P0
(44)
and is achieved by push-forward of ̺0 (x) via an affine trans 1
− 12 1
1
1
port map M x + m, where M := P 2 P 2 P0 P 2
P 2,
and m := µ− µ0 , that is, the arginf for (44) is ̺(x)
=
q
1
12
1
1
1
det(P0 )
−2
P 2 P0 P 2
P − 2 (x − µ) + µ0 . In
det(P ) ̺0 P
particular, if ̺0 = N (µ0 , P0 ), then ̺ = N (µ, P ).
Proof: Let ̺0 be as given, and choose any ̺ ∈ Dµ,P .
Let ̺0 and ̺ be obtained by translating ̺0 and ̺ respectively,
such that both ̺0 and ̺ have zero mean. Using (10), we can
directly verify [12, p. 236] that W22 (̺, ̺0 ) =k µ − µ0 k22
+W22 (̺, ̺0 ). On the other hand, it is known [13, p. 11,
Proposition 1.1.6] that
1
21
1
2
2
2
W2 (̺, ̺0 ) ≥ tr P + P0 − 2 P0 P P0
⇒ W22 (̺, ̺0 ) ≥ right hand side of (44).
(45)
Now consider a candidate transport map M x + m where
M and m are functions of P , P0 , µ, µ0 as in the statement.
It suffices to prove that our candidate transport map indeed
achieves the equality in (45). To this end, directly substituting
the expressions for M and m, notice that the push-forward
has mean M µ0 + m = µ, and covariance M P0 M ⊤ =
P . So our candidate transport map (M , m) is feasible.
To show optimality, from (10) notice that W22 (̺, ̺0 ) =
inf tr(P + P0 − 2C), where C := M P0 solves P0 −
C∈Rd×d
CP −1 C ⊤ 0, which has known optimal solution Copt :=
1
− 21 1
1
1
Mopt P0 = P0 P 2 P 2 P0 P 2
P 2 . Since our candi1
−
2
1
1
1
1
P 2 satisfies tr (M P0 ) =
date M := P 2 P 2 P0 P 2
12
1
1
, the statement follows.
tr (Mopt P0 ) = tr
P02 P P02
In the Corollary below, combining Lemma 1 and 2, we
recover a result in [14, Theorem 3.1].
Corollary 1: Given d-dimensional joint PDF ̺0 with
mean µ0 , covariance P0 ≻ 0, suppose tr(P0 ) = τ0 . For
fixed µ and τ > 0,
√ 2
√
inf W22 (̺, ̺0 ) =
τ − τ 0 + k µ − µ0 k22 , (46)
̺∈Dµ,τ
and is achieved by ̺(x) =
τ0
τ
d2
̺0
τ0
τ
(x − µ) + µ0 .
Proof: Let us choose P := ττ0 P0 , and from (44)
√ 2
√
observe that inf W22 (ξ, ̺0 ) = ( τ − τ 0 ) + k µ −
ξ∈Dµ,P
µ0 k22 . On the other hand, for any ̺ ∈ Dµ,τ , we know from
(45) that
1
12
1
W22 (̺, ̺0 ) ≥ τ + τ0 − 2 tr P02 SP02
+ k µ − µ0 k22 ,
where S is the covariance of ̺. Using Lemma 1, we get
21
1
1
√
≤ τ τ0 ⇒ W22 (̺, ̺0 ) ≥
tr P02 SP02
√
√ 2
inf W22 (ξ, ̺0 ) =
τ − τ 0 + k µ − µ0 k22 , (47)
[7] H. Risken, The Fokker-Planck Equation: Methods of Solution and Applications. Springer Series in Synergetics, Vol. 18, First ed., Springer;
1989.
[8] L. Ambrosio, N. Gigli, and G. Savaré, Gradient Flows: in Metric
Spaces and in the Space of Probability Measures. Lectures in Mathematics, ETH Zürich, Second ed., Birkhäuser; 2008.
[9] R.S. Laugesen, P.G. Mehta, S.P. Meyn, and M. Raginsky, “Poisson’s
Equation in Nonlinear Filtering”. SIAM Journal on Control and
Optimization. Vol. 53, No. 1, pp. 501–525, 2015.
ξ∈Dµ,P
and that the equality is achieved when S = P = ττ0 P0 . In
d
that case, det(S) = ττ0 det(P0 ), and hence Lemma 2
yields the arg inf ̺(x) for (46) as
s
1
12
1
det(P0 )
− 12
− 12
2
2
̺0 S
S P0 S
S (x − µ) + µ0
det(S)
τ d2 τ
0
0
̺0
(x − µ) + µ0 .
=
τ
τ
Lemma 3: If E(·) depends on ̺ only via the mean and
covariance of ̺, then inf F (̺) is achieved by N (µ, P ).
̺∈Dµ,P
Proof: As E(̺) ≡ E(µ, P ), henceR from (11) we get
̺ log ̺ dx. Since
inf F (̺) = E(µ, P ) + β −1 inf
̺∈Dµ,P
̺∈Dµ,P
[10] A. Uhlmann, “The “Transition Probability” in the State Space of a
*-Algebra”. Reports on Mathematical Physics, Vol. 9, No. 2, pp. 273–
279, 1976.
[11] D. Petz, Quantum Information Theory and Quantum Statistics. Theoretical and Mathematical Physics, First ed., Springer; 2008.
[12] C.R. Givens, and R.M. Shortt, “A Class of Wasserstein Metrics for
Probability Distributions”. The Michigan Mathematical Journal, Vol.
31, No. 2, pp. 231–240, 1984.
[13] S.T. Rachev, and L. Rüschendorf, Mass Transportation Problems.
Volume I: Theory. First ed., Springer; 1998.
[14] E.A. Carlen, and W. Gangbo, “Constrained Steepest Descent in the
2-Wasserstein Metric”. Annals of Mathematics, pp. 807–846, 2003.
[15] A. Halder, and E.D.B. Wendel, “Finite Horizon Linear Quadratic
Gaussian Density Regulator with Wasserstein Terminal Cost”. Proceedings of the 2016 American Control Conference, pp. 7249–7254,
2016.
N (µ, P ) is the maximum entropy PDF under prescribed
mean µ and covariance P , hence the statement.
[16] N.J. Higham, and H.M. Kim, “Solving A Quadratic Matrix Equation
by Newton’s Method with Exact Line Searches”. SIAM Journal on
Matrix Analysis and Applications, Vol. 23, No. 2, pp. 303–316, 2001.
Lemma 4: For P , P0 ≻ 0,
21
1 1
1
1
∂
1 1 −1
−1 2
tr P02 P P02
= P02 P0 2 P −1 P0 2
P02 .
∂P
2
Proof: We refer the readers to Appendix B in [15].
[17] D. Liberzon, and R.W. Brockett, “Spectral Analysis of Fokker–Planck
and Related Operators Arising from Linear Stochastic Differential
Equations”. SIAM Journal on Control and Optimization, Vol. 38, No.
5, pp. 1453–1467, 2000.
R EFERENCES
[1] H.H. Bauschke, and P.L. Combettes, Convex Analysis and Monotone
Operator Theory in Hilbert Spaces. CMS Books in Mathematics,
Springer; 2011.
[18] R.W. Brockett, and J.C. Willems, “Stochastic Control and the Second
Law of Thermodynamics”. Proceedings of the 1978 IEEE Conference
on Decision and Control including the 17th Symposium on Adaptive
Processes, pp. 1007–1011, 1978.
[19] R.L. Stratonovich, “Application of the Theory of Markov Processes for
Optimum Filtration of Signals”. Radio Eng. Electron. Phys. (USSR),
Vol. 1, pp. 1–19, 1960.
[2] N. Parikh, and S. Boyd, “Proximal Algorithms”. Foundations and
Trends in Optimization. Vol. 1, No. 3, pp. 127–239, 2014.
[20] H.J. Kushner, “On the Differential Equations Satisfied by Conditional
Densities of Markov Processes, with Applications”. Journal of the
SIAM Series A Control, Vol 2, No. 1, pp. 106–119, 1964.
[3] R. Jordan, D. Kinderlehrer, and F. Otto, “The Variational Formulation
of the Fokker–Planck Equation”. SIAM Journal on Mathematical
Analysis. Vol. 29, No. 1, pp. 1–17, 1998.
[21] M. Fujisaki, G. Kallianpur, and H. Kunita, “Stochastic Differential
Equations for the Non Linear Filtering Problem”. Osaka Journal of
Mathematics, Vol. 9, No. 1, pp. 19–40, 1972.
[4] C. Villani, Topics in Optimal Transportation. Graduate Studies in
Mathematics, Vol. 58, First ed., American Mathematical Society; 2003.
[22] R.E. Kalman, and R.S. Bucy, “New Results in Linear Filtering and
Prediction Theory”. Journal of Basic Engineering, Vol. 83, No. 3, pp.
95–108, 1961.
[5] J.-D. Benamou, and Y. Brenier, “A Computational Fluid Mechanics
Solution to the Monge–Kantorovich Mass Transfer Problem”. Numerische Mathematik. Vol. 84, No. 3, pp. 375–393, 2000.
[6] K.J. Åström, Introduction to Stochastic Control Theory. Academic
Press; 1970.
[23] A. Yezzi, and E.I. Verriest, “Nonlinear Observers via Regularized
Dynamic Inversion”. Proceedings of the 2007 American Control
Conference, pp. 1693–1698, 2007.
| 3cs.SY
|
Leveraging Joint Interactions for
Credibility Analysis in News Communities
Subhabrata Mukherjee
Gerhard Weikum
Max Planck Institute for Informatics
{smukherjee, weikum}@mpi-inf.mpg.de
arXiv:1705.02667v2 [cs.AI] 9 May 2017
Abstract
Media seems to have become more partisan, often providing a
biased coverage of news catering to the interest of specific groups.
It is therefore essential to identify credible information content that
provides an objective narrative of an event. News communities such
as digg, reddit, or newstrust offer recommendations, reviews, quality
ratings, and further insights on journalistic works. However, there
is a complex interaction between different factors in such online
communities: fairness and style of reporting, language clarity and
objectivity, topical perspectives (like political viewpoint), expertise
and bias of community members, and more.
This paper presents a model to systematically analyze the different interactions in a news community between users, news, and
sources. We develop a probabilistic graphical model that leverages
this joint interaction to identify 1) highly credible news articles, 2)
trustworthy news sources, and 3) expert users who perform the role
of “citizen journalists” in the community. Our method extends CRF
models to incorporate real-valued ratings, as some communities
have very fine-grained scales that cannot be easily discretized without losing information. To the best of our knowledge, this paper is
the first full-fledged analysis of credibility, trust, and expertise in
news communities.
Categories and Subject Descriptors
H.3.3 [Information Storage and Retrieval]: Information Search
and Retrieval - Information Filtering; I.2.7 [Computing Methodologies]: Artificial Intelligence - Natural Language Processing
Keywords
Credibility; News Community; Probabilistic Graphical Models
1.
INTRODUCTION
Motivation: Media plays a crucial role in the public dissemination
of information about events. Many people find online information
and blogs as useful as TV or magazines. At the same time, however,
people also believe that there is substantial media bias in news
coverage [24, 8], especially in view of inter-dependencies and crossownerships of media companies and other industries (like energy).
Several factors affect the coverage and presentation of news in
media incorporating potentially biased information induced via the
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee. Request permissions from Permissions@acm.org.
CIKM’15, October 19-23, 2015, Melbourne, VIC, Australia
Copyright 2015 ACM. ISBN 978-1-4503-3794-6/15/10 ...$15.00.
DOI: http://dx.doi.org/10.1145/2806416.2806537
.
fairness and style of reporting. News are often presented in a polarized way depending on the political viewpoint of the media source
(newspapers, TV stations, etc.). In addition, other source-specific
properties like viewpoint, expertise, and format of news may also be
indicators of information credibility.
In this paper, we embark on an in-depth study and formal modeling of these factors and inter-dependencies within news communities
for credibility analysis. A news community is a news aggregator
site (e.g., reddit.com, digg.com, newstrust.net) where users can give
explicit feedback (e.g., rate, review, share) on the quality of news
and can interact (e.g., comment, vote) with each other. Users can
rate and review news, point out differences, bias in perspectives,
unverified claims etc. However, this adds user subjectivity to the
evaluation process, as users incorporate their own bias and perspectives in the framework. Controversial topics create polarization
among users which influence their ratings. [30, 6] state that online
ratings are one of the most trusted sources of user feedback; however
they are systematically biased and easily manipulated.
Problem Statement: Given a set of news sources generating news
articles, and users reviewing those articles on different qualitative
aspects with mutual interactions — our objective is to jointly rank the
sources, articles, and users based on their trustworthiness, credibility,
and expertise respectively.
In this process, we want to analyze the influence of various factors
like the writing style of a news article, its topic distribution, type of
media and format of news, political viewpoint and expertise, and
other user traits on the credibility analysis of the community.
Our Approach: To analyze the factors and inter-dependencies in a
news community, we have developed a sophisticated probabilistic
graphical model, specifically a Continuous Conditional Random
Field (CCRF) model, which exploits several moderate signals of
interaction jointly between the following factors to derive a strong
signal for information credibility (refer to Figures 1a and 1b). In
particular, the model captures the following factors.
• Language and credibility of a news article: objectivity, rationality,
and general quality of language in the news article. Objectivity is
the quality of the news to be free from emotion, bias and prejudice
of the author. The credibility of a news article refers to presenting
an unbiased, informative and balanced narrative of an event.
• Properties and trustworthiness of a news source: trustworthiness
of a news source in the sense of generating credible articles based
on source properties like viewpoint, expertise and format of news.
• Expertise of users and review ratings: expertise of a user, in the
news community, in properly judging the credibility of news articles. Expert users should provide objective evaluations – by
reviews and/or ratings – of news articles, corroborating with the
evaluations of other expert users. This can be used to identify
potential “citizen journalists” [17] in the community.
We show that the CCRF performs better than sophisticated col-
2.
MODELING NEWS COMMUNITIES
Our approach exploits the rich interaction taking place between
the different factors in a news community. We propose a probabilistic graphical model that leverages the interplay between news
credibility, language objectivity, source trustworthiness, and user
expertise. Refer to Figure 1 for the following discussion.
Consider a set of news sources hsi (e.g., s1 in Figure 1c) generating articles hdi which are reviewed and analyzed by users hui for
their credibility. Consider rij to be the review by user uj on article
di . The overall article rating of di is given by yi .
In our model, each news source, news article, user and her rating
or review, and overall article rating is associated with a continuous
random variable r.v. ∈ [1 . . . 5], that indicates its trustworthiness,
objectivity, expertise, and credibility, respectively. 5 indicates the
best quality that an item can obtain, and 1 is the worst. Discrete
ratings, being a special case of this setting, can be easily handled.
Each node is associated with a set of observed features that are
extracted from the news community. For example, a news source
has properties like topic specific expertise, viewpoint and format of
news; a news article has features like topics, and style of writing
from the usage of discourse markers and subjective words in the
article. For users we extract their topical perspectives and expertise, engagement features (like the number of questions, replies,
Joint Probabilistic
Inference
Source
Trustworthiness
News
Article
Language
Objectivity
News
Source
Users
Topics
Reviews
User
Expertise
…, Engagement,
Expertise
V
Ex iew
pe p
rt oin
is t
e, ,
...
Observable Features
Emotionality,
Discourse,...
laborative filtering approaches based on latent factor models, and
regression methods that do not consider all these interactions.
Although this work is focused on news communities, the framework can also be used for instance, in health communities (e.g.
healthboards.com) where users write posts on drug usage — the
objective being to jointly rank posts, drug side-effects, and users
based on their quality, credibility, and trustworthiness respectively.
In this work, the attributes credibility and trustworthiness are
always associated with a news article and a news source, respectively.
The joint interaction between several factors also captures that a
source garners trustworthiness by generating credible news articles,
which are highly rated by expert users. Similarly, the likelihood
of a news article being credible increases if it is generated by a
trustworthy source.
Some communities offer users fine-grained scales for rating different aspects of news articles and news sources. For example, the
newstrust.net community analyzes an article on 15 aspects like insightful, fairness, style and factual. These are aggregated into an
overall real-valued rating after weighing the aspects based on their
importance, expertise of the user, feedback from the community,
and more. This setting cannot be easily discretized without blowup or risking to lose information. Therefore, we model ratings as
real-valued variables in our CCRF.
Contributions: The paper introduces the following novel elements:
• A continuous CRF that captures the mutual dependencies between
credibility of articles, trustworthiness of sources, expertise of users,
and expresses real-valued ratings.
• An inference method for the CCRF that allows us to jointly (a)
predict ratings; and (b) rank articles, sources, and users by their
credibility, trustworthiness, and expertise, respectively.
• A large experimental study with data from newstrust.net, one of
the most sophisticated news communities with a focus on quality
journalism.
The rest of the paper is organized as follows. Section 2 presents
how we model news communities, and which factors we include in
the model. Section 3 develops the CCRF that captures the interaction
between all the factors. Section 4 introduces the dataset that we use
for experimental evaluation and further studies. Section 5 presents
our experimental results followed by discussion.
Article Credibility
Ratings
(a) Interactions between source trustworthiness, article credibility, language
objectivity, and user expertise.
(b) Sample instantiation.
(c) Clique representation.
Figure 1: Graphical model representation.
reviews posted) and various interactions with other users (like upvotes/downvotes) and news sources in the community.
The objective of our model is to predict credibility ratings hyi
of news articles hdi by exploiting the mutual interactions between
different variables. The following edges between the variables
capture their interplay:
• Each news article is connected to the news source from where it is
extracted (e.g., s1 − d1 , s1 − d2 )
• Each news article is connected to its review or rating by a user
(e.g., d1 − r11 , d1 − r12 , d2 − r22 )
• Each user is connected to all her reviews (e.g., u1 − r11 , u2 − r12 ,
u2 − r22 )
• Each user is connected to all news articles rated by her (e.g., u1 −
d1 , u2 − d1 , u2 − d2 )
• Each source is connected to all the users who rated its articles (e.g.,
s1 − u1 , s1 − u2 )
• Each source is connected to all the reviews of its articles (e.g.,
s1 − r11 , s1 − r12 , s1 − r22 )
• For each article, all the users and all their reviews on the article are
inter-connected (e.g., u1 − r12 , u2 − r11 , u1 − u2 ). This captures
user-user interactions (e.g., u1 upvoting/downvoting u2 ’s rating on
d1 ) influencing the overall article rating.
Therefore, a clique (e.g., C1 ) is formed between a news article, its
source, users and their reviews on the article. Multiple such cliques
(e.g., C1 and C2 ) share information via their common news sources
(e.g., s1 ) and users (e.g., u2 ).
News topics play a significant role on information credibility.
Individual users in community (and news sources) have their own
perspectives and expertise on various topics (e.g., environmental politics). Modeling user-specific topical perspectives explicitly captures
credibility judgment better than a user-independent model. However,
many articles do not have explicit topic tags. Hence we use Latent
Dirichlet Allocation (LDA) [1] in conjunction with Support Vector
Regression (SVR) [4] to learn words associated to each (latent)
topic, and user (and source) perspectives for the topics. Documents
are assumed to have a distribution over topics as latent variables,
with words as observables. Inference is by Gibbs sampling. This
LDA model is a component of the overall model, discussed next.
We use a probabilistic graphical model, specifically a Conditional
Random Field (CRF), to model all factors jointly. The modeling
approach is related to the prior work of [23]. However, unlike that
work and traditional CRF models, our problem setting requires a
continuous version of the CRF (CCRF) to deal with real-valued
ratings instead of discrete labels. In this work, we follow an approach similar to [26, 27, 32] in learning the parameters of the
CCRF. We use Support Vector Regression [4] to learn the elements
of the feature vector for the CCRF.
The inference is centered around cliques of the form h source,
article, h users i, h reviews ii. An example is the two cliques
C1 : s1 − d1 − hu1 , u2 i − hr11 , r12 i and C2 : s1 − d2 − u2 − r22
in the instance graph of Figure 1c. This captures the “cross-talk”
between different cliques sharing nodes. A news source garners
trustworthiness by generating multiple credible articles. Users attain
expertise by correctly identifying credible articles that corroborate
with other expert users. Inability to do so brings down their expertise. Similarly, an article attains credibility if it is generated by a
trustworthy source and highly rated by an expert user. The inference
algorithm for the CCRF is discussed in detail in Section 3.
In the following subsections, we discuss the various feature
groups that are considered in our CCRF model.
2.1
Articles and their Stylistic Features
The style in which news is presented to the reader plays a pivotal
role in understanding its credibility. The desired property for news
is to be objective and unbiased. In this section, we examine the
different stylistic indicators of news credibility. All the lexicons
used in this section are compiled from [28, 23].
Assertives: Assertive verbs (e.g., “claim”) complement and modify
a proposition in a sentence. They capture the degree of certainty to
which a proposition holds.
Factives: Factive verbs (e.g., “indicate”) pre-suppose the truth of a
proposition in a sentence.
Hedges: These are mitigating words (e.g., “may”) to soften the
degree of commitment to a proposition.
Implicatives: These words trigger pre-supposition in an utterance.
For example, usage of the word complicit indicates participation in
an activity in an unlawful way.
Report verbs: These verbs (e.g., “argue”) are used to indicate
the attitude towards the source, or report what someone said more
accurately, rather than using just say and tell.
Discourse markers: These capture the degree of confidence, perspective, and certainty in the set of propositions made. For instance,
strong modals (e.g., “could”), probabilistic adverbs (e.g., “maybe”),
and conditionals (e.g., “if”) depict a high degree of uncertainty and
hypothetical situations, whereas weak modals (e.g., “should”) and
inferential conjunctions (e.g., “therefore”) depict certainty.
Subjectivity and bias: News is supposed to be objective: writers
should not convey their own opinions, feelings or prejudices in their
stories. For example, a news titled “Why do conservatives hate
your children?” is not considered objective journalism. We use
a subjectivity lexicon1 , a list of positive and negative opinionated
words2 , and an affective lexicon3 to detect subjective clues in arti1
http://mpqa.cs.pitt.edu/lexicons/subj_lexicon/
http://www.cs.uic.edu/ liub/FBS/opinion-lexicon-English.rar
3
http://wndomains.fbk.eu/wnaffect.html
2
Latent Topics
Topic Words
Obama admin.
Citizen journ.
US military
AmyGoodman
Alternet
Climate
obama, republican, party, election, president, senate, gop, vote
cjr, jouralism, writers, cjrs, marx, hutchins, reporting, liberty, guides
iraq, war, military, iran, china, nuclear, obama, russia, weapons
democracy, military, civil, activist, protests, killing, navajo, amanda
media, politics, world news, activism, world, civil, visions, economy
energy, climate, power, water, change, global, nuclear, fuel, warming
Table 1: Latent topics (with illustrative labels) and their words.
cles. The affective features capture the state of mind (like attitude
and emotions) of the writer while writing an article or post (e.g.,
anxiousness, confidence, depression, favor, malice, sympathy etc.).
We additionally harness a lexicon of bias-inducing words extracted from the Wikipedia edit history from [28] exploiting its
Neutral Point of View Policy to keep its articles “fairly, proportionately, and as far as possible without bias, all significant views that
have been published by reliable sources on a topic”.
Feature vector construction: For each stylistic feature type fi
and each news article dj , we compute the relative frequency of
words of type fi occurring in dj , thus constructing a feature vector
F L (dj ) = hf reqij = #(words in fi ) / length(dj )i. Consider
the review rj,k written by user uk on the article dj . For each such
review, analogous to the per-article stylistic feature vector hF L (dj )i,
we construct a per-review feature vector hF L (rj,k )i.
2.2
Articles and their Topics
Topic tags for news articles play an important role in user-perceived
prominence, bias and credibility, in accordance to the ProminenceInterpretation theory [7]. For example, the tag Politics is often
viewed as an indicator of potential bias and individual differences;
whereas tags like Energy or Environment are perceived as more
neutral news and therefore invoke higher agreement in the community on the associated articles’ credibility. Obviously, this can be
misleading as there is a significant influence of Politics on all topics
in all format of news.
Certain users have topic-specific expertise that make them rate
articles on those topics better than others. News sources also have
expertise on specific topics and provide a better coverage of news on
those topics than others. For example, National Geographic provides
a good coverage of news related to environment, whereas The Wall
Street Journal provides a good coverage on economic policies.
However, many news articles do not have any explicit topic tag.
In order to automatically identify the underlying theme of the article,
we use Latent Dirichlet Allocation (LDA) [1] to learn the latent
topic distribution in the corpus. LDA assumes a document to have a
distribution over a set of topics, and each topic to have a distribution
over words. Table 1 shows an excerpt of the top topic words in each
topic, where we manually added illustrative labels for the topics.
The latent topics also capture some subtle themes not detected by the
explicit tags. For example, Amy Goodman is an American broadcast
journalist, syndicated columnist and investigative reporter who is
considered highly credible in the community. Also, associated
with that topic cluster is Amanda Blackhorse, a Navajo activist and
plaintiff in the Washington Redskins case.
Feature vector construction: For each document dj and each of
its review rj,k , we create feature vectors hF T (dj )i and hF T (rj,k )i
respectively, using the learned latent topic distributions, as well as
the explicit topic tags. Section 3.1 discusses our method to learn the
topic distributions.
2.3
News Sources
A news source is considered trustworthy if it generates highly
credible articles. We examine the effect of different features of a
news source on its trustworthiness based on user assigned ratings
Category
Elements
Variables
Type
Description
Media
Format
Scope
Viewpoint
Top Topics
Expertise on
Topics
newspaper, blog, radio, magazine, online
editorial, investigative report, news, research
local, state, regional, national, international
far left, left, center, right, neutral
politics, weather, war, science„ U.S. military
U.S. congress, Middle East, crime, presidential election,
Bush administration, global warming
dj
s
u
rj,k
Vector
Vector
Vector
Vector
yj,k
z
SVRuk , SVRsi
SVRL , SVRT
Ψ = f (hψj i)
Real Number
Vector
Real Number
∈ [1 . . . 5]
Real Number
λ=
hαu , βs , γ1 , γ2 i
yn×1
Xn×m
Qn×n
bn×1
Σn×n
µn×1
Vector
Document with sequence of words hwi
Sources
Users
Review by user uk on document dj
with sequence of words hwi
Rating of rj,k
Sequence of topic assignments for hwi
SVR prediction for users, sources,
language, and topics
Clique potential with ψj = hyj , si , dj ,
huk i, hrj,k ii for clique of dj
Combination weights for users hui,
sources hsi, language and topic models
Credibility rating of documents hdi
Feature matrix with m = |U | + |S| + 2
f (λ)
f (λ, X)
f (λ)
f (λ, X)
Table 2: Features for source trustworthiness.
in the community. We consider the following source features (summarized in Table 2): the type of media (e.g., online, newspaper, tv,
blog), format of news (e.g., news analysis, opinion, special report,
news report, investigative report), (political) viewpoint (e.g., left,
center, right), scope (e.g., international, national, local), the top
topics covered by the source, and their topic-specific expertise.
Feature vector construction: For each news source sl , we create
a feature vector hF S (sl )i using features in Table 2. Each element
fiS (sl ) is 1 or 0 indicating presence or absence of a feature. Note
that above features include the top (explicit) topics covered by any
source, and its topic-specific expertise for a subset of those topics.
2.4
Users, Ratings and Interactions
A user’s expertise in judging news credibility depends on many
factors. [5] discusses the following traits for recognizing an expert.
Community Engagement of the user is an obvious measure for
judging the user authority in the community. We capture this with
different features: number of answers, ratings given, comments,
ratings received, disagreement and number of raters.
Inter-User Agreement: Expert users typically agree on what constitutes a credible article. This is inherently captured in the proposed
graphical model, where a user gains expertise by assigning credibility ratings to articles that corroborate with other expert users.
Topical Perspective and Expertise: The potential for harvesting
user preference and expertise in topics for rating prediction of reviews has been demonstrated in [22, 21]. For credibility analysis
the model needs to capture the user’s perspective and bias towards
certain topics based on their political inclination that bias their ratings, and their topic-specific expertise that allows them to evaluate
articles on certain topics better as “Subject Matter Experts”. These
are captured as per-user feature weights for the stylistic indicators
and topic words in the language of user-contributed reviews.
Interactions: In a community, users can upvote (digg, like, rate)
the ratings of users that they appreciate, and downvote the ones they
do not agree with. High review ratings from expert users increase
the value of a user; whereas low ratings bring down her expertise.
Similar to this user-user interaction, there can be user-article, usersource and source-article interactions which are captured as edges
in our graphical model (by construction). Consider the following
anecdotal example in the community showing an expert in nuclear
energy downvoting another user’s rating on nuclear radiation: “Nonexpert: Interesting opinion about health risks of nuclear radiation, from a
physicist at Oxford University. He makes some reasonable points ...
Low rating by expert to above review: Is it fair to assume that you have no
background in biology or anything medical? While this story is definitely very
important, it contains enough inaccurate and/or misleading statements...”
Feature vector construction: For each user uk , we create an engagement feature vector hF E (uk )i. In order to capture user subjectivity, in terms of different stylistic indicators of credibility, we
consider the per-review language feature vector hF L (rj,k )i of user
uk (refer to Section 2.1). To capture user perspective and expertise
on different topics, we consider the per-review topic feature vector
hF T (rj,k )i of each user uk .
Vector
Matrix
Diagonal Matrix
Vector
CovarianceMatrix
Mean Vector
Table 3: Symbol table.
3.
JOINT PROBABILISTIC INFERENCE
In this section we incorporate the discussed features and insights
into a joint probabilistic graphical model. The task is to identify
credible news articles, trustworthy news sources, and expert users
jointly in a news community. Table 3 summarizes the important
notations used in this section.
3.1
Topic Model
Consider an article d consisting of a sequence of {Nd } words
denoted by w1 , w2 , ...wNd . Each word is drawn from a vocabulary
V having unique words indexed by 1, 2, ...V . Consider a set of
topic assignments z = {z1 , z2 , ...zK } for d, where each topic zi
can be from a set of K possible topics.
LDA [1] assumes each document d to be associated with a multinomial distribution θd over topics Z with a symmetric dirichlet prior
ρ. θd (z) denotes the probability of occurrence of topic z in document d. Topics have a multinomial distribution φz over words drawn
from a vocabulary V with a symmetric dirichlet prior ζ. φz (w) denotes the probability of the word w belonging to the topic z. Exact
inference is not possible due to intractable coupling between Θ and
Φ. We use Gibbs sampling for approximate inference.
Let n(d, z, w) denote the count of the word w occurring in document d belonging to the topic z. In the following equation, (.) at
any position in the above count indicates marginalization, i.e., summing up the counts over all values for the corresponding position
in n(d, z, w). The conditional distribution for the latent variable z
(with components z1 to zK ) is given by:
P (zi = k|wi = w, z−i , w−i ) ∝
n(., k, w) + ζ
n(d, k, .) + ρ
P
×P
k n(d, k, .) + Kρ
w n(., k, w) + V ζ
(1)
Let hT E i and hT L i be the set of explicit topic tags and latent
topic dimensions, respectively. The topic feature vector hF T i for an
article or review combines both explicit tags and latent topics and is
constructed as follows:
if T E0 = FtT
#f req(w, d),
t
T
Ft (d) = #f req(w, d) × φT L0 (w), if TtL0 = FtT and φT L0 (w) > δ
t
t
0
otherwise
So for any word in the document matching an explicit topic tag,
the corresponding element in the feature vector hF T i is set to its
occurrence count in the document. If the word belongs to any latent
topic with probability greater than threshold δ, the probability of the
word belonging to that topic (φt (w)) is added to the corresponding
element in the feature vector, and set to 0 otherwise.
3.2
Support Vector Regression
We use Support Vector Regression (SVR) [4] to combine the
different features discussed in Section 2. SVR is an extension of
the max-margin framework for SVM classification to the regression
problem. It solves the following optimization problem to learn
weights w for features F :
N
min
w
X
1 T
(max(0, |yd − wT F | − ))2
w w+C×
2
d=1
(2)
Article Stylistic Model: We learn a stylistic regression model
SVRL using the per-article stylistic feature vector hF L (dj )i for
article dj (or, hF L (rj,k )i for review rj,k ), with the overall article
rating yj (or, yj,k ) as the response variable.
Article Topic Model: Similarly, we learn a topic regression model
SVRT using the per-article topic feature vector hF T (dj )i for article
dj (or, hF T (rj,k )i for review rj,k ), with the overall article rating
yj (or, yj,k ) as the response variable.
Source Model: We learn a source regression model SVRsi using
the per-source feature vector hF S (si )i for source si , with the overall source rating as the response variable .
User Model: For each user uk , we learn a user regression model
SVRuk with her per-review stylistic and topic feature vectors
hF L (rj,k )∪F T (rj,k )i for review rj,k for article dj , with her overall
review rating yj,k as the response variable.
Note that we use overall article rating to train article stylistic and
topic models. For the user model, however, we take user assigned
article ratings and per-user features. This model captures user subjectivity and topic perspective. The source models are trained on
news-source specific meta-data and its ground-truth ratings.
3.3
Continuous Conditional Random Field
We model our learning task as a Conditional Random Field (CRF),
where the random variables are the ratings of news articles hdj i,
news sources hsi i, users huk i, and reviews hrj,k i. The objective is
to predict the credibility ratings hyj i of the articles hdj i.
The cliques in the CRF consist of an article dj , its source si ,
set of users huk i reviewing it, and the corresponding user reviews
hrj,k i — where rj,k denotes the review by user uk on article dj .
Different cliques are connected via the common news sources, and
users. There are as many cliques as the number of news articles.
Let ψj (yj , si , dj , huk i, hrj,k i) be a potential function for clique
j. Each clique has a set of associated vertex feature functions. In
our problem setting, we associate features to each vertex.The features constituted by the stylistic, topic, source and user features explained in Section 2 are: F L (dj )∪F T (dj )∪F S (si )∪k (F E (uk )∪
F L (rj,k ) ∪ F T (rj,k )).
A traditional CRF model allows us to have a binary decision if a
news article is credible (yj = 1) or not (yj = 0), by estimating the
conditional distribution with the probability mass function of the
discrete random variable y:
Qn
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))
P r(y|D, S, U, R) = P Qn
y
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))
Given a news article dj , its source id si , and a set of user ids
huk i who reviewed the article, the regression models SVRL (dj ),
SVRT (dj ), SVRsi , hSVRuk (dj )i (discussed in Section 3.2) predict
rating of dj . For notational brevity, hereafter, we drop the argument
dj from the SVR function. These SVR predictors are for separate
feature groups and independent of each other. Now we combine the
different SVR models to capture mutual interactions, such that the
weight for each SVR model reflects our confidence on its quality.
Errors by an SVR are penalized by the squared loss between the
predicted article rating and the ground-truth rating. There is an
additional constraint that for any clique only the regression models
corresponding to the news-source and users present in it should be
activated. This can be thought of as partitioning the input feature
space into subsets, with the features inside a clique capturing local
interactions, and the global weights capture the overall quality of
the random variables via the shared information between the cliques
(in terms of common sources, users, topics and language features) —
an ideal setting for using a CRF. Equation 5 shows one such linear
combination. Energy function of an individual clique is given by:
ψj (yj , si , dj , huk i, hrj,k i) = −
P r(y|D, S, U, R) =
n
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))
R∞ Q
n
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))dy
−∞
(4)
αk Iuk (dj )(yj − SVRuk )2
k=1
−
i=S
X
βi Isi (dj )(yj −SVRsi )2 −γ1 (yj −SVRL )2 −γ2 (yj −SVRT )2
i=1
(5)
Indicator functions Iuk (dj ) and Isi (dj ) are 1 if uk is a reviewer
and si is the source of article dj respectively, and are 0 otherwise.
As the output of the SVR is used as an input to the CCRF in Equation 5, each element of the input feature vector is already predicting
the output variable. The learned parameters λ = hα, β, γ1 , γ2 i
(with dimension(λ) = |U | + |S| + 2) of the linear combination of
the above features depict how much to trust individual predictors.
Large λk on a particular predictor places large penalty on the mistakes committed by it, and therefore depicts a higher quality for that
predictor. αu corresponding to user u can be taken as a proxy for
that user’s expertise, allowing us to obtain a ranked list of expert
users. Similarly, βs corresponding to news source s can be taken
as a proxy for that source’s trustworthiness, allowing us to obtain a
ranked list of trustworthy news sources.
Overall energy function of all cliques is given by:
Ψ=
n
X
ψj (yj , si , dj , huk i, hrj,k i)
j=1
(Substituting ψj from Equation 5 and re-organizing terms)
Ψ=
n
X
(−
j=1
−
i=S
X
k=U
X
αk Iuk (dj )(yj − SVRuk )2
k=1
βi Isi (dj )(yj − SVRsi )2 − γ1 (yj − SVRL )2 − γ2 (yj − SVRT )2 )
i=1
(3)
But in our problem setting, we want to estimate the credibility
rating of an article. Therefore, we need to estimate the conditional
distribution with the probability density function of the continuous
random variable y:
Q
k=U
X
=−
n
X
yj2 [
j=1
+
n
X
j=1
2yj [
k=U
X
αk Iuk (dj ) +
k=1
k=U
X
βi Isi (dj ) + γ1 + γ2 ]
i=1
αk Iuk (dj )SVRuk +
k=1
+ γ2 SVRT ] −
i=S
X
i=S
X
βi Isi (dj )SVRsi + γ1 SVRL
i=1
n k=U
i=S
X
X
X
[
αk Iuk (dj )SVR2uk +
βi Isi (dj )SVR2si
j=1 k=1
i=1
+ γ1 SVR2L + γ2 SVR2T ]
Organizing the bracketed terms into variables as follows:
(P
k=U
k=1
Qi,j =
bi = 2[
αk Iuk (di ) +
Pl=S
l=1
βl Isl (di ) + γ1 + γ2
0
k=U
X
l=S
X
αk Iuk (di )SVRuk +
∂Σ
∂Σ−1
= −Σ
Σ
∂λk
∂λk
= −2ΣΣ
i=j
i 6= j
∂
∂
(µT Σ−1 µ) =
(bT Σb)
∂λk
∂λk
βl Isl (di )SVRsl +γ1 SVRL +γ2 SVRT ]
l=1
k=1
= bT
i=S
n k=U
X
X
X
βi Isi (dj )SVR2si +γ1 SVR2L +γ2 SVR2T ]
αk Iuk (dj )SVR2uk +
c=
[
i=1
j=1 k=1
= bT (Σ
We can derive:
Ψ = −y T Qy + y T b − c
Qn
−∞
= 4X(.),k µ − 2µT µ
∂log|Σ−1 |
1
∂Σ−1
=
Trace(|Σ−1 |Σ
)
∂λk
|Σ−1 |
∂λk
exp(ψj )
j=1
exp(ψj )dy
= 2Trace(Σ)
exp(Ψ)
−∞ exp(Ψ)dy
= R∞
We can derive the gradient vector:
exp(−y T Qy + y T b)
T
T
−∞ exp(−y Qy + y b)dy
(7)
∂logP (y|X)
T
= −y T y+2y T X(.),k −2X(.),k
µ+µT µ+ Trace(Σ)
∂λk
(11)
= R∞
= R∞
exp(− 21 y T Σ−1 y + y T Σ−1 µ)
−∞
exp(− 21 y T Σ−1 y + y T Σ−1 µ)dy
Let η denote the learning rate. The update equation is given by:
(Substituting Q = 12 Σ−1 , b = Σ−1 µ)
Equation 7 can be transformed
R ∞ into a multivariate Gaussian distribution after substituting −∞ exp(− 12 y T Σ−1 y + y T Σ−1 µ)dy =
(2π)n/2
1
|Σ−1 | 2
exp( 12 µT Σ−1 µ). Therefore obtaining,
P (y|X) =
1
n
∂Σ
∂bT
∂b
+
b) +
Σb
∂λk
∂λk
∂λk
= 4X(.),k Σb − 2bT ΣΣb
(6)
Substituting Ψ in Equation 4:
j=1
P (y|X) = R ∞ Qn
∂Σb
∂bT
+
Σb
∂λk
∂λk
1
(2π) 2 |Σ| 2
1
exp(− (y − µ)T Σ−1 (y − µ))
2
(8)
Q represents the contribution of λ to the covariance matrix Σ.
Each row of the vector b and matrix Q corresponds to one training
instance, representing the active contribution of features present in
it. To ensure Equation 8 represents a valid Gaussian distribution,
the covariance matrix Σ needs to be positive definite for its inverse
to exist. For that the diagonal matrix Q needs to be a positive semidefinite matrix. This can be ensured by making all the diagonal
elements in Q greater than 0, by constraining λk > 0.
Since this is a constrained optimization problem, gradient ascent
cannot be directly used. We follow the approach similar to [27]
and maximize log-likelihood with respect to log λk , instead of λk
as in standard gradient ascent, making the optimization problem
unconstrained as:
∂logP (y|X)
∂logP (y|X)
= αk (
)
∂logλk
∂λk
(9)
Taking partial derivative of the log of Equation 8 w.r.t λk :
∂logP (y|X)
1 ∂
=
(−y T Σ−1 y + 2y T Σ−1 µ − µT Σ−1 µ
∂λk
2 ∂λk
+ log|Σ−1 | + Constant)
(10)
Substituting the following in the above equation:
∂Q
∂Σ−1
=2
∂λk
∂λk
= 2I
∂Σ−1 µ
∂b
=
[∵ µ = Σb]
∂λk
∂λk
= 2X(.),k
where, X(.),k indicates the kth column of the feature matrix X.
logλnew
= logλold
k
k +η
∂logP (y|X)
∂logλk
(12)
Once the model parameters are learned using gradient ascent,
the inference for the prediction y of the article credibility rating is
straightforward. As we assume the distribution to be Gaussian, the
prediction is the expected value of the function, given by the mean
of the distribution: y0 = argmaxy P (y|X) = µ = Σb.
Note that Σ and b are both a function of λ = hα, β, γ1 , γ2 i which
represents the combination weights of various factors to capture mutual interactions. The optimization problem determines the optimal
λ for reducing the error in prediction.
4.
USE CASE: NEWSTRUST
We performed experiments with data from a typical news community: newstrust.net4 . This community is similar to digg.com
and reddit.com, but has more refined ratings and interactions. We
chose NewsTrust because of the availability of ground-truth ratings
for credibility analysis of news articles; such ground-truth is not
available for the other communities.
We collected stories from NewsTrust from May, 2006 to May,
2014. Each such story features a news article from a source (E.g.
BBC, CNN, Wall Street Journal) that is posted by a member, and
reviewed by other members, many of whom are professional journalists and content experts5 . We crawled all the stories with their
explicit topic tags and other associated meta-data. We crawled all
the news articles from their original sources that were featured in
any NewsTrust story. The earliest story dates back to May 1, 1939
and the latest one is in May 9, 2014.
We collected all member profiles containing information about the
demographics, occupation and expertise of the members along with
their activity in the community in terms of the posts, reviews and
ratings; as well as interaction with other members. The members in
the community can also rate each others’ ratings. The earliest story
rating by a member dates back to May, 2006 and the most recent one
4
Code and data available at
http://www.mpi-inf.mpg.de/impact/credibilityanalysis/
5
http://www.newstrust.net/help#about_newstrust
Factors
Count
Unique news articles reviewed in NewsTrust
NewsTrust stories on news articles
NewsTrust stories with ≥ 1 reviews
NewsTrust stories with ≥ 3 reviews
NewsTrust member reviews of news articles
62,064
84,704
43,107
18,521
134,407
News articles extracted from original sources
NewsTrust stories on extracted news articles
47,565
52,579
News sources
Journalists who wrote news articles
Timestamps (month and year) of posted news articles
5,658
19,236
3,122
NewsTrust members who reviewed news articles
NewsTrust members who posted news articles
668
Explicit topic tags
Latent topics extracted
456
300
Nodes
Sources
Members
News articles
Reviews
Edges
Total triangles
Count
181,364
1,704
6,906
42,204
130,550
602,239
521,630
Factors
No. of weakly connected components
Diameter
Average path length
Average degree
Average clustering coefficient
Modularity
Latent Factor Models (LFM)
Simple LFM [15]
Experience-based LFM [21]
Text-based LFM [20]
Our Model: User SVR
0.95
0.85
0.78
0.60
Model
Table 4: Dataset statistics.
Factors
MSE
Table 6: MSE comparison of models for predicting users’ credibility
rating behavior with 10-fold cross-validation. Improvements are
statistically significant with P-value < 0.0001.
7,114
1,580
News sources reviewed by NewsTrust members
Model
Count
12
8
47
6.641
0.884
0.516
Table 5: Graph statistics.
is in Feb, 2014. In addition, we collected information on member
evaluation of news sources, and other information (e.g., type of
media, scope, viewpoint, topic specific expertise) about source from
its meta data.
Crawled dataset: Table 4 shows the dataset statistics. In total 62K
unique news articles were reviewed in NewsTrust in the given period, out of which we were able to extract 47K full articles from the
original sources like New York Times, TruthDig, ScientificAmerican etc — a total of 5.6K distinct sources. The remaining articles
were not available for crawling. There are 84.7K stories featured
in NewsTrust for all the above articles, out of which 52.5K stories
refer to the news articles we managed to extract from their original
sources. The average number of reviews per story is 1.59. For
general analysis we use the entire dataset. For experimental evaluation of the CCRF and hypotheses testing, we use only those stories
( 18.5K) with a minimum of 3 reviews that refer to the news articles
we were able to extract from original sources.
Generated graph: Table 5 shows the statistics of the graph constructed by the method of Section 2.
Ground-Truth for evaluation: The members in the community can
rate the credibility of a news article on a scale from 1 to 5 regarding
15 qualitative aspects like facts, fairness, writing style and insight,
and popularity aspects like recommendation, credibility and views.
Members give an overall recommendation for the article explained
to them as: “... Is this quality journalism? Would you recommend this story
to a friend or colleague? ... This question is similar to the up and down
arrows of popular social news sites like Digg and Reddit, but with a focus on
quality journalism." Each article’s aspect ratings by different members
are weighted (and aggregated) by NewsTrust based on findings of
[16], and the member expertise and member level (described below).
This overall article rating is taken as the ground-truth for the article
credibility rating in our work. A user’s member level is calculated by
NewsTrust based on her community engagement, experience, other
users’ feedback on her ratings, profile transparency and validation
by NewsTrust staff. This member level is taken as the proxy for user
expertise in our work. Members rate news sources while reviewing
an article. These ratings are aggregated for each source, and taken
Only
Title
MSE
Title
& Text
MSE
Language Model: SVR
Language (Bias and Subjectivity)
Explicit Topics
Explicit + Latent Topics
All Topics (Explicit + Latent) + Language
3.89
1.74
1.68
1.57
0.72
1.74
1.01
0.61
News Source Features and Language Model: SVR
News Source
News Source + All Topics + Language
1.69
0.91
1.69
0.46
Aggregated Model: SVR
Users + All Topics + Language + News Source
0.43
0.41
Our Model: CCRF+SVR
User + All Topics + Language + News Source
0.36
0.33
Table 7: MSE comparison of models for predicting aggregated article credibility rating with 10-fold cross-validation. Improvements
are statistically significant with P-value < 0.0001.
as a proxy for the source trustworthiness in our work.
Training data: We perform 10-fold cross-validation on the news
articles. During training on any 9-folds of the data, the algorithm learns the user, source, language and topic models from
user-assigned ratings to articles and sources present in the train
split. We combine sources with less than 5 articles and users with
less than 5 reviews into background models for sources and users,
respectively. This is to avoid modeling from sparse observations,
and to reduce dimensionality of the feature space. However, while
testing on the remaining blind 1-fold we use only the ids of sources
and users reviewing the article; we do not use any user-assigned
ratings of sources or articles. For a new user and a new source, we
draw parameters from the user or source background model. The
results are averaged by 10-fold cross-validation, and presented in
the next section.
Experimental settings: In the first two experiments we want to
find the power of the CCRF in predicting user rating behavior, and
credibility rating of articles. Therefore, the evaluation measure is
taken as the Mean Squared Error (MSE) between the prediction
and the actual ground-rating in the community. For the latter experiments in finding expert users (and, trustworthy sources) there is no
absolute measure for predicting user (and, source) quality; it only
makes sense to find the relative ranking of users (and, sources) in
terms of their expertise (and, trustworthiness). Therefore, the evaluation measure is taken as the Normalized Discounted Cumulative
Gain (NDCG) [13] between the ranked list of users (and, sources)
obtained from CCRF and their actual ranking in the community.
5.
5.1
EXPERIMENTS
Predicting User Ratings of Articles
First we evaluate how good our model can predict the credibility
ratings that users assign to news articles using the Mean Squared
Error (MSE) between the prediction and the actual rating.
Model
Experience LFM [21]
PageRank
CCRF
NDCG
0.80
0.83
0.86
Table 8: NDCG scores for
ranking trustworthy sources.
Model
Experience LFM [21]
Member Ratings
CCRF
NDCG
0.81
0.85
0.91
Table 9: NDCG scores for
ranking expert users.
Baselines: We consider the following baselines for comparison:
1. Latent Factor Recommendation Model (LFM) [15]: LFM considers the tuple huserId, itemId, ratingi, and models each user and
item as a vector of latent factors which are learned by minimizing
the MSE between the rating and the product of the user-item latent
factors. In our setting, each news article is considered an item and
rating refers to the credibility rating assigned by a user to an article.
2. Experience-based LFM [21]: This model incorporates experience
of a user in rating an item in the LFM. The model builds on the
hypothesis that users at similar levels of experience have similar
rating behaviors which evolve with time. The model has an extra
dimension: the time of rating an item which is not used in our SVR
model. Note the analogy between the experience of a user in this
model, and the notion of user expertise in the SVR model. However,
these models ignore the text of the reviews.
3. Text-based LFM [20]: This model incorporates text in the LFM
by combining the latent factors associated to items in LFM with
latent topics in text from topic models like LDA.
4. Support Vector Regression (SVR) [4]: We train an SVR model
SVRuk for each user uk (refer to Section 3.2) based on her reviews
hrj,k i with language and topic features hF L (rj,k )∪F T (rj,k )i, with
the user’s article ratings hyj,k i as the response variable. We also
incorporate the article language features and the topic features, as
well as source-specific features to train the user model for this task.
The other models ignore the stylistic features, and other fine-grained
user-item interactions in the community.
Table 6 shows the MSE comparison between the different methods. Our model (User SVR) achieved the lowest MSE and thus
performed best.
5.2
Finding Credible Articles
As a second part of the evaluation, we investigate the predictive
power of different models in order to find credible news articles
based on the aggregated ratings from all users. The above LFM
models, unaware of the user cliques, cannot be used directly for
this task, as each news article has multiple reviews from different
users which need to be aggregated. We find the Mean Squared Error
(MSE) between the estimated overall article rating, and the groundtruth article rating. We consider stories with at least 3 ratings about
a news article. We compare the CCRF against the following baselines:
1. Support Vector Regression (SVR) [4]: We consider an SVR model
with features on language (bag-of-all-words, subjectivity, bias etc.),
topics (explicit tags as well as latent dimensions), and news-sourcespecific features. The language model uses all the lexicons derived
and used in [28, 23]. The source model also includes topic features
in terms of the top topics covered by the source, and its topic-specific
expertise for a subset of the topics.
2. Aggregated Model (SVR) [4]: As explained earlier, the user
features cannot be directly used in the baseline model, which is
agnostic of the user cliques. Therefore, we adopt a simple aggregation approach by taking the average rating of all the user ratings
SVRuk (dj )
for an article dj as a feature. Note that, in contrast to this
|uk |
simple average used here, our CCRF model learns the weights hαu i
per-user to combine their overall ratings for an article.
Table 7 shows the MSE comparison of the different models.
MSE Comparison: The first two models in Table 6 ignore the
textual content of news articles, and reviews, and perform worse than
the ones that incorporate full text. The text-based LFM considers
title and text, and performs better than its predecessors. However,
the User SVR model considers richer features and interactions, and
attains 23% MSE reduction over the best performing LFM baselines.
The baselines in Table 7 show the model performance after incorporating different features in two different settings: 1) with news
article titles only as text, and 2) with titles and the first few paragraphs of an article. The language model, especially the bias and
subjectivity features, is less effective using only the article titles due
to sparseness. On the other hand, using the entire article text may
lead to very noisy features. So including the first few paragraphs of
an article is the “sweet spot”. For this, we made an ad-hoc decision
and included the first 1000 characters of each article. With this
setting, the language features made a substantial contribution to
reducing the MSE.
The aggregated SVR model further brings in the user features,
and achieves the lowest MSE among the baselines. This shows that a
user-aware credibility model performs better than user-independent
ones. Our CCRF model combines all features in a more sophisticated manner, which results in 19.5% MSE reduction over the most
competitive baseline (aggregated SVR). This is empirical evidence
that the joint interactions between the different factors in a news
community are indeed important to consider for identifying highly
credible articles.
5.3
Finding Trustworthy Sources
We shift the focus to two use cases: 1) identifying the most trustworthy sources, and 2) identifying expert users in the community
who can play the role of “citizen journalists”.
Using the model of Section 3, we rank all news sources in the
community according to the learned hβsi i in Equation 5. The
baseline is taken as the PageRank scores of news sources in the Web
graph. In the experience-based LFM we can consider the sources to
be users, and articles generated by them to be items. This allows us
to obtain a ranking of the sources based on their overall authority.
This is the second baseline against which we compare the CCRF.
We measure the quality of the ranked lists in terms of NDCG
using the actual ranking of the news sources in the community as
ground-truth. NDCG gives geometrically decreasing weights to
predictions at the various positions of the ranked list:
N DCGp =
DCGp
IDCGp
where DCGp = rel1 +
Pp
reli
i=2 log2 i
Table 8 shows the NDCG scores for the different methods.
5.4
Finding Expert Users
Similar to news sources, we rank users according to the learned
hαuk i in Equation 5. The baseline is the average rating received
by a user from other members in the community. We compute the
NDCG score for the ranked lists of users by our method. We also
compare against the ranked list of users from the experience-aware
LFM [21]. Table 9 shows the NDCG scores for different methods.
5.5
Discussion
Hypothesis Testing: We test various hypotheses under the influence
of the feature groups using explicit labels, and ratings available in
the NewsTrust community. A summary of the tests is presented in
Table 10 showing a moderate correlation between various factors
which are put together in the CCRF to have a strong indicator for
information credibility.
Language: The stylistic features (factor (a) in Table 10) like assertives, hedges, implicatives, factives, discourse and affective play
a significant role in the credibility detection of news, in conjunction
with other language features like topics.
Factors
Corr.
a) Stylistic Indicators Vs. Article Credibility Rating
Insightful (Is it well reasoned? thoughtful?)
Fairness (Is it impartial? or biased?)
Style (Is this story clear? concise? well-written?)
Responsibility (Are claims valid, ethical, unbiased?)
Balance (Does this story represent diverse viewpoints?)
0.77
0.75
0.65
0.72
0.49
b) Influence of Politics Vs. Disagreement
c) Expertise (Moderate, High) Vs. Disagreement
Interactions
d) User Expertise Vs. User-User Rating
e) Source Trustworthiness Vs. Article Credibility Rating
f) User Expertise Vs. MSE in Article Rating Prediction
0.11
-0.10, -0.31
0.40
0.47
-0.29
Table 10: Pearson’s product-moment correlation between various
factors (with P-value < 0.0001 for each test).
Money - Politics
War in Iraq
Media - Politics
Green Technology
Most Trusted
rollingstone.com
nybooks.com consortiumnews
discovermagazine.com
truthdig.com
consortiumnews thenation.com
nature.com
democracynow.org truthout.org
thedailyshow.com scientificamerican.com
Least Trusted
firedoglake.com
suntimes.com
trueslant.com
crooksandliars rushlimbaugh.com
timesonline
rightwingnews.com
suntimes.com foxnews.com
Table 11: Most and least trusted sources on sample topics.
Topics: Topics are an important indicator for news credibility. We
measured the influence of the Politics tag on other topics by their
co-occurrence frequency in the explicit tag sets over all the news
articles. We found significant influence of Politics on all topics,
with an average measure of association of 54% to any topic, and
62% for the overall news article. The community gets polarized due
to different perspectives on topical aspects of news. A moderate
correlation (factor (b) in Table 10) indicates a weak trend of disagreement, measured by the standard deviation in article credibility
rating among users, increasing with its political content. In general,
we find that community disagreement for different viewpoints are as
follows: Right (0.80) > Left(0.78) > Center(0.65) > Neutral (0.63).
Users: User engagement features are strong indicators of expertise.
Although credibility is ultimately subjective, experts show moderate
agreement (factor (c) in Table 10) on highly credible news. There
is a moderate correlation (factor (d) in Table 10) between feedback
received by a user on his ratings from community, and his expertise.
Sources: Various traits of a news source like viewpoint, format
and topic expertise are strong indicators of trustworthiness. In general, science and technology websites (e.g., discovermagazine.com,
nature.com, scientificamerican.com), investigative reporting and
non-partisan sources (e.g., truthout.org, truthdig.com, cfr.org), book
sites (e.g., nybooks.com, editorandpublisher.com), encyclopedia
(e.g., Wikipedia) and fact checking sites (e.g., factcheck.org) rank
among the top trusted sources. Table 11 shows the most and least
trusted sources on four sample topics. Overall, news sources are
considered trustworthy with an average rating of 3.46 and variance
of 0.15. Tables 12 and 13 show the most and least trusted sources
on different viewpoints and media types respectively. Contents from
blogs are most likely to be posted followed by newspaper, magazine
and other online sources. Contents from wire service, TV and radio are deemed the most trustworthy, although they have the least
subscription, followed by magazines.
Interactions: In principle, there is a moderate correlation between
trustworthy sources generating credible articles (factor (e) in Table 10) identified by expert users (factor (f) in Table 10). A negative
sign of correlation indicates decrease in disagreement or MSE with
Left
Right
Most
Trusted
democracynow,
truthdig.com,
rollingstone.com
courant.com, opinionjournal.com,
townhall.com
Least
Trusted
crooksandliars, suntimes.com, washingtonmonthly.com
rightwingnews,
foxnews.com,
weeklystandard.com
Center
Neutral
armedforcesjournal.com,
bostonreview.net
spiegel.de,cfr.org,
editorandpublisher.com
sltrib.com, examiner.com, spectator.org
msnbc.msn.com,
online.wsj.com,
techcrunch.com
Table 12: Most and least trusted sources with different viewpoints.
Magazine
Online
Newspaper
Blog
Most Trusted Sources
rollingstone.com
nybooks.com
thenation.com
truthdig.com
cfr.org
consortiumnews
nytimes.com
nola.com
seattletimes
juancole.com
dailykos.com
huffingtonpost
investigativevoice
northbaltimore
hosted.ap.org
suntimes.com
nydailynews.com
dailymail.co.uk
rightwingnews
firedoglake.com
crooksandliars
Least Trusted Sources
weeklystandard.com
commentarymagazine
nationalreview.com
Table 13: Most and least trusted sources on different types of media.
increase in expertise. In a news community, we can observe moderate signals of interaction between various factors that characterize
users, articles, and sources. Our CCRF model brings all these features together to build a strong signal for news credibility.
6.
RELATED WORK
Rating prediction in online communities: Collaborative filtering
based approaches [15] for rating prediction exploit user and item
similarities by latent factors. [21] further studies the temporal evolution of users and their rating behavior in this framework. Recent
works [20, 22] also tap into user review texts to generate userspecific ratings of reviews. Other papers have studied temporal
issues for anomaly detection [10].Prior work that tapped user review
texts focused on other issues. Sentiment analysis over reviews aimed
to learn latent topics [18], latent aspects and their ratings [35], and
user-user interactions [36]. Our model unifies several dimensions to
jointly study the role of language, users, topics, and interactions for
information credibility.
Information credibility in social media: [3] analyzes micro-blog
postings in Twitter related to trending topics, and classifies them as
credible or not based on features from user posting and re-posting
behavior. [14] focuses on credibility of users, harnessing the dynamics of information flow in the underlying social graph and tweet
content. [2] analyzes both topical content of information sources
and social network structure to find credible information sources in
social networks. Information credibility in tweets has been studied
in [11]. [33] conducts a user study to analyze various factors like
contrasting viewpoints and expertise affecting the truthfulness of
controversial claims. However, none of these prior works analyze
the interplay between sources, language, topics, and users.
The works closest to our problem and approach are [34, 23]. [34]
presents an algorithm for propagating trust scores in a heterogeneous network of claims, sources, and documents. [23] proposes a
method to jointly learn user trustworthiness, statement credibility,
and language objectivity in online health communities. However,
these works do not analyze the role of topics, language bias, user
perspective, expertise, and fine-grained interactions in community.
Bias in social communities and media: The use of biased language in Wikipedia and similar collaborative communities has been
studied in [9, 28]. Even more broadly, the task of characterizing
subjective language has been addressed, among others, in [37, 19].
The influence of different kinds of bias in online user ratings has
been studied in [30, 6]. [6] proposes an approach to handle users
who might be subjectively different or strategically dishonest.
Citizen journalism: [29] defines citizen journalism as “the act of
a citizen or group of citizens playing an active role in the process
of collecting, reporting, analyzing and dissemination of news and
information to provide independent, reliable, accurate, wide-ranging
and relevant information that a democracy requires.” [31] focuses on
user activities like blogging in community news websites. Although
the potential of citizen journalism is greatly highlighted in the recent
Arab Spring [12], misinformation can be quite dangerous when
relying on users as news sources (e.g., the reporting of the Boston
Bombings in 2013 [25]).
7.
CONCLUSIONS
In this work, we analyzed the effect of different factors like
language, topics and perspectives on the credibility rating of articles
in a news community. These factors and their mutual interactions
are the features of a novel model for jointly capturing credibility
of news articles, trustworthiness of news sources and expertise of
users. From an application perspective, we demonstrated that our
method can reliably identify credible articles, trustworthy sources
and expert users in the community.
As future work, we plan to model and analyze the temporal
evolution of the factors associated with each of the components in
our model. We have a strong intuition that time has a significant
influence on the trustworthiness of sources and credibility of news.
8.
REFERENCES
[1] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet
allocation. J. Mach. Learn. Res., 3, 2003.
[2] K. R. Canini, B. Suh, and P. Pirolli. Finding credible
information sources in social networks based on content and
social structure. In PASSAT, 2011.
[3] C. Castillo, M. Mendoza, and B. Poblete. Information
credibility on twitter. In WWW, 2011.
[4] H. Drucker, C. J. C. Burges, L. Kaufman, A. J. Smola, and
V. Vapnik. Support vector regression machines. In NIPS, 1996.
[5] H. J. Einhorn, R. M. Hogarth, and E. Klempner. Quality of
group judgment. Psychological Bulletin, 1977.
[6] H. Fang, J. Zhang, and N. Magnenat Thalmann. Subjectivity
grouping: Learning from users’ rating behavior. In AAMAS,
2014.
[7] B. J. Fogg. Prominence-interpretation theory: explaining how
people assess credibility online. In CHI, 2003.
[8] Gallup.com. Americans’ confidence in newspapers continues
to erode. http://www.gallup.com/poll/163097/americans-confidencenewspapers-continues-erode.aspx. Accessed: 2015-05-07.
[9] S. Greene and P. Resnik. More than words: Syntactic
packaging and implicit sentiment. In NAACL, 2009.
[10] S. Günnemann, N. Günnemann, and C. Faloutsos. Detecting
anomalies in dynamic rating data: A robust probabilistic
model for rating evolution. KDD, 2014.
[11] A. Gupta and P. Kumaraguru. Credibility ranking of tweets
during high impact events. In PSOSM, 2012.
[12] P. N. Howard, A. Duffy, D. Freelon, M. Hussain, W. Mari, and
M. Mazaid. Opening closed regimes: What was the role of
social media during the arab spring? 2011.
[13] K. Järvelin and J. Kekäläinen. Cumulated gain-based
evaluation of IR techniques. ACM Trans. Inf. Syst., 20(4),
2002.
[14] B. Kang, J. O’Donovan, and T. Höllerer. Modeling topic
specific credibility on twitter. In IUI, 2012.
[15] Y. Koren. Factorization meets the neighborhood: A
multifaceted collaborative filtering model. KDD, 2008.
[16] C. Lampe and R. K. Garrett. It’s all news to me: The effect of
instruments on ratings provision. In HICSS, 2007.
[17] S. C. Lewis, K. Kaufhold, and D. L. Lasorsa. Thinking about
citizen journalism: The philosophical and practical challenges
of user-generated content for community newspapers.
Journalism Practice, 4(2), 2010.
[18] C. Lin and Y. He. Joint sentiment/topic model for sentiment
analysis. CIKM, 2009.
[19] C. Lin, Y. He, and R. Everson. Sentence subjectivity detection
with weakly-supervised learning. In IJCNLP, 2011.
[20] J. McAuley and J. Leskovec. Hidden factors and hidden
topics: Understanding rating dimensions with review text.
RecSys, 2013.
[21] J. J. McAuley and J. Leskovec. From amateurs to
connoisseurs: modeling the evolution of user expertise
through online reviews. In WWW, 2013.
[22] S. Mukherjee, G. Basu, and S. Joshi. Joint author sentiment
topic model. In SDM, 2014.
[23] S. Mukherjee, G. Weikum, and C. Danescu-Niculescu-Mizil.
People on drugs: Credibility of user statements in health
communities. KDD, 2014.
[24] Nber.org. Media bias and voting.
http://www.nber.org/digest/oct06/w12169.html. Accessed: 2015-05-07.
[25] Nytimes.com. Should reddit be blamed for the spreading of a
smear? http://www.nytimes.com/2013/07/28/magazine/should-reddit-beblamed-for-the-spreading-of-a-smear.html. Accessed: 2015-05-07.
[26] T. Qin, T. Liu, X. Zhang, D. Wang, and H. Li. Global ranking
using continuous conditional random fields. NIPS, 2008.
[27] V. Radosavljevic, S. Vucetic, and Z. Obradovic. Continuous
conditional random fields for regression in remote sensing.
ECAI, 2010.
[28] M. Recasens, C. Danescu-Niculescu-Mizil, and D. Jurafsky.
Linguistic models for analyzing and detecting biased
language. In ACL, 2013.
[29] B. Shayne and W. Chris. We media: How audiences are
shaping the future of news and information. 2003.
[30] Sloanreview.mit.edu. The problem with online ratings.
http://sloanreview.mit.edu/article/the-problem-with-online-ratings-2/ .
Accessed: 2015-05-07.
[31] A. Stuart. Citizen journalism and the rise of ‘mass
self-communication’: Reporting the london bombings. Global
Media, 1(1), 2007.
[32] B. Tadas, P. Robinson, and L. Morency. Continuous
conditional neural fields for structured regression. In ECCV,
2014.
[33] V. Vydiswaran et al. BiasTrust: Teaching biased users about
controversial topics. CIKM, 2012.
[34] V. V. Vydiswaran, C. Zhai, and D. Roth. Content-driven trust
propagation framework. In KDD, 2011.
[35] H. Wang et al. Latent aspect rating analysis without aspect
keyword supervision. KDD, 2011.
[36] R. West, H. S. Paskov, J. Leskovec, and C. Potts. Exploiting
social network structure for person-to-person sentiment
analysis. TACL, 2(2), 2014.
[37] J. Wiebe and E. Riloff. Creating subjective and objective
sentence classifiers from unannotated texts. In CICLing, 2005.
| 2cs.AI
|
Recognizing Abnormal Heart Sounds Using Deep Learning
arXiv:1707.04642v2 [cs.SD] 19 Oct 2017
Jonathan Rubin1 , Rui Abreu2 , Anurag Ganguli2 , Saigopal Nelaturi2 , Ion Matei2 , Kumar Sricharan2
1
Philips Research North America, 2 PARC, A Xerox Company
jonathan.rubin@philips.com, rui@computer.org,
{anurag.ganguli, saigopal.nelaturi, ion.matei, sricharan.kumar}@parc.com
Abstract
The work presented here applies deep learning to
the task of automated cardiac auscultation, i.e. recognizing abnormalities in heart sounds. We describe an automated heart sound classification algorithm that combines the use of time-frequency
heat map representations with a deep convolutional
neural network (CNN). Given the cost-sensitive
nature of misclassification, our CNN architecture
is trained using a modified loss function that directly optimizes the trade-off between sensitivity
and specificity. We evaluated our algorithm at the
2016 PhysioNet Computing in Cardiology challenge where the objective was to accurately classify normal and abnormal heart sounds from single, short, potentially noisy recordings. Our entry to the challenge achieved a final specificity of
0.95, sensitivity of 0.73 and overall score of 0.84.
We achieved the greatest specificity score out of
all challenge entries and, using just a single CNN,
our algorithm differed in overall score by only 0.02
compared to the top place finisher, which used an
ensemble approach.
1
PhysioNet [Goldberger et al., 2000] has held a Computing in Cardiology Challenge since 2000 that requires participants to automatically analyze physiologic time series data.
The 2016 challenge [Clifford et al., 2016] asked participants
to perform automated analysis of phonocardiogram (PCG)
waveforms, i.e. heart sound data collected using digital
stethoscopes. The objective of the challenge was to accurately classify normal and abnormal heart sounds. Recordings were collected from both healthy individuals, as well as
those with heart disease, including heart valve disease and
coronary artery disease. A PCG plot showing the recording
of the (normal) sounds made by the heart is given in Figure 1.
Introduction
Advances in deep learning [LeCun et al., 2015] are being made at a rapid pace, in part due to challenges such
as ILSVRC – the ImageNet Large-Scale Visual Recognition
Challenge [Russakovsky et al., 2015]. Successive improvements in deep neural network architectures have resulted in
computer vision systems that are better able to recognize and
classify objects in images [Lin et al., 2013; Szegedy et al.,
2015] and winning ILSVRC entries [Szegedy et al., 2014;
He et al., 2015]. While a large focus of deep learning has
been on automated analysis of image and text data, advances
are also increasingly being seen in areas that require processing other input modalities. One such area is the medical domain where inputs into a deep learning system could be physiologic time series data. An increasing number of large scale
challenges in the medical domain, such as [Kaggle, 2014] and
[Kaggle, 2015] have also resulted in improvements to deep
learning architectures [Liang and Hu, 2015].
Figure 1: A phonocardiogram showing the recording of normal heart sounds, together with corresponding electrocardiogram tracing. S1 is the first heart sound and marks the beginning of systole. Source [Springer et al., 2016].
Heart disease remains the leading cause of death globally,
resulting in more people dying every year due to cardiovascular disease compared to any other cause of death [World
Health Organization, 2017]. Successful automated PCG analysis can serve as a useful diagnostic tool to help determine
whether an individual should be referred on for expert diagnosis, particularly in areas where access to clinicians and
medical care is limited.
In this work, we present an algorithm that accepts PCG
waveforms as input and uses a deep convolutional neural network architecture to classify inputs as either normal or abnor-
mal using the following steps:
1. Segmentation of time series A logistic regression hidden
semi-Markov model is used to segment incoming heart
sound instances into shorter segments beginning at the
start of each heartbeat, i.e. the S1 heart sound.
2. Transformation of segments into heat maps Using
Mel-frequency cepstral coefficients, one dimensional
time series input segments are converted into twodimensional spectrograms (heat maps) that capture the
time-frequency distribution of signal energy.
3. Classification of heat maps using a deep neural network
A convolutional neural network is trained to perform
automatic feature extraction and distinguish between
normal and abnormal heat maps.
The contributions of this work are as follows:
1. We introduce a deep convolutional neural network architecture designed to automatically analyze physiologic
time series data for the purposes of identifying abnormalities in heart sounds.
2. Given the cost-sensitive nature of misclassification, we
describe a novel loss function used to train the above
network that directly optimizes the sensitivity and specificity trade-off.
3. We present results from the 2016 PhysioNet Computing
in Cardiology Challenge where we evaluated our algorithm and achieved a Top 10 place finish out of 48 teams
who submitted a total of 348 entries.
The remainder of this paper is organized as follows. In
Section 2, we discuss related works, including historical approaches to automated heart sound analysis and deep learning
approaches that process physiologic time series input data.
Section 3 introduces our approach and details each step of
the algorithm. Section 4 further describes the modified costsensitive loss function used to trade-off the sensitivity and
specificity of the network’s predictions, followed by Section
5, which details the network training decisions and parameters. Section 6 presents results from the 2016 PhysioNet
Computing in Cardiology Challenge and in Section 7 we provide a final discussion and end with conclusions in Section
8.
2
Related Work
Before the 2016 PhysioNet Computing in Cardiology Challenge there were no existing approaches (to the authors’
knowledge) that applied the tools and techniques of “deep
learning” to the automated analysis of heart sounds [Liu et
al., 2016]. Previous approaches relied upon a combination of
feature extraction routines input into classic supervised machine learning classifiers. Features extracted from heart cycles in the time and frequency domains, as well as wavelet
features, time-frequency and complexity-based features were
input into artificial neural networks [De Vos and Blanckenberg, 2007; Uğuz, 2012a; Uğuz, 2012b; Sepehri et al., 2008;
Bhatikar et al., 2005] and support vector machines [Maglogiannis et al., 2009; Ari et al., 2010; Zheng et al., 2015]
for classification. Previous works have also employed Hidden Markov Models for both segmenting PCG signals into
the fundamental heart sounds [Springer et al., 2014; Springer
et al., 2016], as well as classifying normal and abnormal instances [Wang et al., 2007; Saraçoglu, 2012].
While there have been many previous efforts applied to automated heart sound analysis, gauging the success of historical approaches has been somewhat difficult, due to differences in dataset quality, number of recordings available for
training and testing algorithms, recorded signal lengths and
the environment in which data was collected (e.g. clinical vs.
non-clinical settings). Moreover, some existing works have
not performed appropriate train-test data splits and have reported results on training or validation data, which is highly
likely to produce optimistic results due to overfitting [Liu et
al., 2016]. In this work, we report results from the 2016 PhysioNet Computing in Cardiology Challenge, which evaluated
entries on a large hidden test-set that was not made publicly
available. To reduce overfitting, no recordings from the same
subject were included in both the training and the test set and
a variety of both clean and noisy PCG recordings, which exhibited very poor signal quality, were included to encourage
the development of accurate and robust algorithms.
The work presented in this paper, is one of the first attempts at applying deep learning to the task of heart sound
data analysis. However, there have been recent efforts to apply deep learning approaches to other types of physiological
time series analysis tasks. An early work that applied deep
learning to the domain of psychophysiology is described in
[Martı́nez et al., 2013]. They advocate the use of preference
deep learning for recognizing affect from physiological inputs such as skin conductance and blood volume pulse within
a game-based user study. The authors argue against the use
of manual ad-hoc feature extraction and selection in affective
modeling, as this limits the creativity of attribute design to the
researcher. One difference between the work of [Martı́nez et
al., 2013] and ours is that they perform an initial unsupervised pre-training step using stacked convolutional denoising
auto-encoders, whereas our network does not require this step
and is instead trained in a supervised fashion end-to-end.
Similar deep learning efforts that process physiologic time
series have also been applied to the problems of epileptic
seizure prediction [Mirowski et al., 2008] and human activity
recognition [Hammerla et al., 2016].
3
Approach
Recall from Section 1 that our approach consists of three general steps: segmentation, transformation and classification.
Each is described in detail below.
3.1
Segmentation of time series
The main goal of segmentation is to ensure that incoming
time series inputs are appropriately aligned before attempting
to perform classification. We first segment the incoming heart
sound instances into shorter segments and locate the beginning of each heartbeat, i.e. the S1 heart sound. A logistic regression hidden semi-Markov model [Springer et al., 2016] is
used to predict the most likely sequence of heart sound states
Figure 2: MFCC heat map visualization of a 3-second segment of heart sound data. Sliding windows, i, are represented on
the horizontal axis and filterbank frequencies, j, are stacked along the inverted y-axis. MFCC energy information, ci,j is
represented by pixel color in the spectrograms. Also shown are the original one-dimensional PCG waveforms that produced
each heat map.
(S1 → Systole → S2 → Diastole) by incorporating information about expected state durations.
Once the S1 heart sound has been identified, a time segment of length, T , is extracted. Segment extraction can either
be overlapping or non-overlapping. Our final model used a
segment length of, T = 3 seconds, and we chose to use overlapping segments as this led to performance improvements
during initial training and validation.
3.2
Transformation of segments into heat maps
Each segment is transformed from a one-dimensional time
series signal into a two-dimensional heat map that captures
the time-frequency distribution of signal energy. We chose
to use Mel Frequency Cepstral Coefficents [Davis and Mermelstein, 1980] to perform this transformation, as MFCCs
capture features from audio data that more closely resembles
how human beings perceive loudness and pitch. MFCCs are
commonly used as a feature type in automatic speech recognition [Godino-Llorente and Gomez-Vilda, 2004].
We apply the following steps to achieve the transformation:
log transformation as sound volume is not perceived on
a linear scale.
c∗i,j = log(
ci,j =
k
(1)
n=1
where k ∈ [1, K], K is the length of the DFT and h(n)
is a hamming window of length N . The power spectral
estimate for window, i, is then given by (2).
Pi (k) =
1
|Si (k)|2
N
(2)
3. Apply a filterbank of, j ∈ [1, J], triangular band-pass
filters, dj,1...K , to the power spectral estimates, Pi (k),
and sum the energies in each filter together. Include a
J
X
j=1
c∗i,j cos
h k(2i − 1)π i
,k = 1...J
2J
(4)
The result is a collection ofcepstral
coefficients, ci,j for
T
window, i. For i = 1 . . . ∆
, ci,j can be stacked together to give a time-frequency heat map that captures
changes in signal energy over heart sound segments.
Figure 2 illustrates two example heat maps (one derived
from a normal heart sound input and the other from an
abnormal input), where ci,j is the MFCC value (represented by color) at location, i, on the horizontal axis and,
j, on the (inverted) vertical axis.
3.3
si (n)h(n)ei2πn `ν
(3)
We used a filterbank consisting of J = 26 filters,
where frequency ranges were derived using the Mel
scale that maps actual measured frequencies, f , to values
that better match how humans perceive pitch, M (f ) =
f
1125 ln(1 + 700
).
4. Finally, apply a Discrete Cosine Transform to decorrelate the log filterbank energies, which are correlated due
to overlapping windows in the Mel filterbank.
2. Compute the Discrete Fourier transform for each window.
Si (k) =
dj,k Pi (k))
k=1
1. Given an input segment of length, T , and sampling rate,
ν, select a window length, `, and step size, ∆, and extract
overlapping sliding windows, si (n),
from the input time
T
series segment, where i ∈ [1, ∆
] is the window index
and n ∈ [1, `ν] is the sample index. We chose a window
length of 0.025 seconds and a step size of 0.01 seconds.
`ν
X
K
X
Classification of heat maps using a deep neural
network
The result of transforming the original one-dimensional timeseries into a two-dimensional time-frequency representation
is that now each heart sound segment can be processed as an
image, where energy values over time can be visualized as a
heat map (see Figure 2). Convolutional neural networks are a
natural choice for training image classifiers, given their ability to automatically learn appropriate convolutional filters.
Therefore, we chose to train a convolutional neural network
architecture using heat maps as inputs.
Decisions about the number of filters to apply and their
sizes, as well as how many layers and their types to include
in the network were made by a combination of initial manual
Figure 3: Convolutional neural network architecture for predicting normal versus abnormal heart sounds using MFCC heat
maps as input
exploration by the authors, followed by employing a random
search over a limited range of network architecture parameters. Figure 3 depicts the network architecture of a convolutional neural network that accepts as input a single channel
6x300 MFCC heat map and outputs a binary classification,
predicting whether the input segment represents a normal or
abnormal heart sound.
The first convolutional layer learns 64 2x20 kernels, using
same-padding. This is followed by applying a 1x20 maxpooling filter, using a horizontal stride of 5, which has the
effect of reducing each of the 64 feature maps to a dimension
of 6x60. A second convolutional layer applies 64 2x10 kernels over the previous layer, once again using same padding.
This is again followed by a max-pooling operation using a filter size of 1x4 and a stride of 2, further reducing each feature
map to a dimension of 6x30. At this stage in the architecture a flattening operation is applied that unrolls each of the
64 6x30 feature maps into a single dimensional vector of size
11,520. This feature vector is fed into a first fully connected
layer consisting of 1024 hidden units, followed by a second
layer of 512 hidden units and finally a binary classification
output.
4
Sensitivity-Specificity Loss Trade-off
The loss function of the network was altered from a standard
softmax cross entropy loss function to instead directly tradeoff between sensitivity and specificity.
Given unnormalized log-probabilities, y = W x + b, from
a classifier consisting of weight matrix, W , and bias b. The
softmax function:
s(y (1) )
s(y (2) )
..
.
Y =
e
s(yi ) = P
eyj
(5)
j
gives probability predictions P (yi |x; W, b) for the class at index, i, for input x.
Consider,
y ∗(1)
y ∗(2)
..
.
∗
,Y =
y ∗(n)
s(y (n) )
(j)
where s(yi ), refers to the ith entry of row j and Y ∗ is the
corresponding one hot encoded matrix of actual class labels.
For the binary class labels of normal (y0∗ ) and abnormal
∗
(y1 ), we define the mask matrices, YN n and YAa , where entries within each matrix are softmax prediction values extracted ∀s(y(j) )∈Y , as follows:
YN n
(j)
∗(j)
s(y0 ), where y0 = 1 and
arg max {s(y (j) )} = arg max{y ∗(j) }
=
0,
otherwise
YAa
(j)
∗(j)
s(y1 ), where y1 = 1 and
arg max {s(y (j) )} = arg max{y ∗(j) }
=
0,
otherwise
We then define softmax sensitivity, Se , and specificity, Sp ,
as follows:
Se =
yi
X Y (j)
Aa
,
∗(j)
j
YAa
Sp =
X Y (j)
Nn
∗(j)
j
(6)
YN n
The final loss function we wish to minimize is given in (7).
LSeSp = −(Se + Sp ) + λR(W )
(7)
where λR(W ) is a regularization parameter and routine, respectively.
Hyper-parameters
Learning rate
Beta
Dropout
Network parameters
Regularization Type
Batch Size
Weight Update
Value
0.00015822
0.000076253698849
0.85565561
Value
L2
256
Adam Optimization
Table 1: Listing of hyper-parameters and selected network
parameters. Hyper-parameters were learned over the network
architecture described in Section 3.3, using random search
over a restricted parameter space.
5
Network Training
L2 regularization was computed for each of the fully connected layers’ weight and bias matrices and applied to the loss
function. Dropout was applied within both fully connected
layers. Table 1 shows the values of hyper-parameters chosen by performing a random search through parameter space,
as well as a list of other network training choices, including
weight updates and use of regularization. Adam optimization
[Kingma and Ba, 2014] was used to perform weight updates.
Models were trained on a single NVIDIA GPU with between
4 – 6 GB of memory. A mini-batch size of 256 was selected
to satisfy the memory constraints of the GPU.
5.1
Given that each model was trained on 3-second MFCC heat
map segments, it was necessary to stitch together a collection
of predictions to classify a single full instance. The simple
strategy of averaging each class’s prediction probability was
employed and the class with the greatest probability was selected as the final prediction.
6
Equations (8) and (9) show the modified sensitivity and specificity scoring metrics that were used to assess the submitted entries to the 2016 PhysioNet Computing in Cardiology
Challenge [Clifford et al., 2016]. Uppercase symbols reflect
the true class label, which could either be (A)bnormal, or
(N )ormal. Lowercase symbols refer to a classifier’s predicted
output where, once again, a is abnormal, n is normal and q
is a prediction of unsure. A subscript of 1 (e.g. Aa1 , N a1 )
refers to heart sound instances that were considered good signal quality by the challenge organizers and a subscript of 2
(e.g. An2 , N n2 ) refers to heart sound instances that were
considered poor signal quality by challenge organizers. Finally, the weights used to calculate sensitivity, wa1 and wa2 ,
capture the percentages of good signal quality and poor signal
quality recordings in all abnormal recordings. Correspondingly for specificity, the weights wn1 and wn2 are the proportion of good signal quality and poor signal quality recordings
in all normal recordings. Overall, scores are given by Se+Sp
.
2
Training/Validation/Test Datasets
The overall dataset used within the PhysioNet Computing in
Cardiology Challenge was provided by the challenge organizers and consisted of eight heart sound databases collected
from seven countries over a period of more than a decade
[Clifford et al., 2016]. In total 4,430 recordings were taken
from 1,072 subjects, resulting in 30 hours of heart sound
recordings. From this total dataset, 1,277 heart sound recordings from 308 subjects were removed to be used as heldout test data for evaluating challenge submissions. The test
dataset was not made publicly available and challengers were
only allowed to make 15 submissions, in total, to the challenge server to evaluate their models on a small 20% subset
of the hidden dataset, before final results were computed. The
number of allowed submissions was limited to avoid the issue of participants implicitly overfitting their models on the
hidden test dataset.
From the 3153 publicly available PCG waveforms supplied
by the challenge organizers, the authors set aside a further
301 instances to be used as a local held-out test-set to gauge
model performance before making a submission to the challenge server. The remaining instances were used to train initial models. Models were trained on the overlapping 3-second
MFCC segments extracted from the remaining 2852 PCG
waveforms. This resulted in approximately 90,000 MFCC
heat maps, which were split into a training (∼ 75, 000 instances) and validation set (∼ 15, 000 instances). This training and validation set was unbalanced, consisting of approximately 80% normal segments and 20% abnormal segments.
Training was performed on the unbalanced dataset and no attempt was made to compensate for this class imbalance.
Results
Se =
Sp =
wa1 · Aa1
wa2 · (Aa2 + Aq2 )
+
,
Aa1 + Aq1 + An1
Aa2 + Aq2 + An2
(8)
wn1 · N n1
wn2 · (N n2 + N q2 )
+
N a1 + N q1 + N n1
N a2 + N q2 + N n2
(9)
Table 2 shows a selected subset of the results for the 2016
PhysioNet Computing in Cardiology Challenge. For each
selected entry, sensitivity, specificity and overall scores are
shown, as well as the entry’s final ranking and a brief description of its approach. In total, 348 entries were submitted by
48 teams. Our entry, as described by the algorithm presented
in this paper, was ranked 8th with a sensitivity of 0.7278 and
specificity of 0.9521, giving an overall score of 0.8399. The
top entry to the competition achieved sensitivity of 0.9424,
specificity of 0.7781 for an overall score of 0.8602. Also
included in Table 2 is the result of a benchmark entry that
was supplied by the challenge organizers, which ranked 43rd
overall, with a sensitivity of 0.6545 and specificity of 0.7569,
for an overall score of 0.7057.
7
Discussion
Table 2 shows that the overall scores for the top entries to
the PhysioNet Computing in Cardiology challenge were very
close. In particular, our entry, which achieved an 8th place
ranking, had a difference in score of only 0.02, compared
to the top place finisher. For our entry, the overall score
of 0.8399 was achieved using a single convolutional neural
network, whereas other top place finishers achieved strong
classification accuracies using an ensemble of classifiers. Improvements in performance have often been witnessed using
Rank
1
2
3
4
5
6
7
8
9
10
43
48
Sensitivity
0.9424
0.8691
0.8743
0.8639
0.8848
0.8063
0.7696
0.7278
0.8691
0.7696
0.6545
0.8063
Specificity
0.7781
0.849
0.8297
0.8269
0.8048
0.8766
0.9125
0.9521
0.7873
0.8831
0.7569
0.2643
Overall
0.8602
0.859
0.852
0.8454
0.8448
0.8415
0.8411
0.8399
0.8282
0.8263
0.7057
0.5353
Description
AdaBoost & CNN
Ensemble of SVMs
Regularized Neural Networks
MFCCs, Wavelets, Tensors & kNN
Random Forest + LogitBoost
Unofficial entry
Probability-distribution based
Our Approach (see Section 3)
Approach Unknown
Approach Unknown
Provided Benchmark Entry
Approach Unknown
Table 2: Selected results from the 2016 PhysioNet Computing in Cardiology Challenge
an ensemble of networks or separate classifiers and we leave
this for future work/improvement. For practical purposes, a
diagnostic tool that relies on only a single network, as opposed to a large ensemble, has the advantage of limiting the
amount of computational resources required for classification. Deployment of such a diagnostic tool on platforms that
impose restricted computational budgets, e.g mobile-based,
could perhaps benefit from such a trade-off between accuracy
and computational cost.
Another point of interest is that our entry to the PhysioNet
Computing in Cardiology challenge achieved the greatest
specificity score (0.9521) out of all challenge entries. However, the network architecture produced a lower sensitivity
score (0.7278). Once again, considering the practical result
of deploying a diagnostic tool that relied upon our algorithm,
this would likely result in a system with few false positives,
but at the expense of misclassifying some abnormal instances.
Final decisions about the trade-off between sensitivity and
specificity would require further consideration of the exact
conditions and context of the deployment environment.
A final point of discussion and area of future improvement
is that the approach presented was limited to binary decision
outputs, i.e. either normal or abnormal heart sounds. An
architecture that also considered signal quality as an output
would likely result in performance improvement.
8
Conclusion
The work presented here is one of the first to apply deep
convolutional neural networks to the task of automated heart
sound classification for recognizing normal and abnormal
heart sounds. We have presented a novel algorithm that combines a CNN architecture with MFCC heat maps that capture
the time-frequency distribution of signal energy. The network
was trained to automatically distinguish between normal and
abnormal heat map inputs and it was designed to optimize
a loss function that directly considers the trade-off between
sensitivity and specificity. We evaluated the approach by
submitting our algorithm as an entry to the 2016 PhysioNet
Computing in Cardiology Challenge. The challenge required
the creation of accurate and robust algorithms that could deal
with heart sounds that exhibit very poor signal quality. Overall, our entry to the challenge achieved a Top-10 place finish
out of 48 teams who submitted 348 entries. Moreover, using just a single CNN, our algorithm differed by a score of at
most 0.02 compared to other top place finishers, all of which
used an ensemble approach of some kind.
References
[Ari et al., 2010] Samit Ari, Koushik Hembram, and
Goutam Saha. Detection of cardiac abnormality from pcg
signal using lms based least square svm classifier. Expert
Systems with Applications, 37(12):8019–8026, 2010.
[Bhatikar et al., 2005] Sanjay R Bhatikar, Curt DeGroff, and
Roop L Mahajan. A classifier based on the artificial neural network approach for cardiologic auscultation in pediatrics. Artificial intelligence in medicine, 33(3):251–260,
2005.
[Clifford et al., 2016] Gari D Clifford, CY Liu, Benjamin
Moody, David Springer, Ikaro Silva, Qiao Li, and Roger G
Mark. Classification of normal/abnormal heart sound
recordings: the physionet/computing in cardiology challenge 2016. Computing in Cardiology, pages 609–12,
2016.
[Davis and Mermelstein, 1980] Steven Davis and Paul Mermelstein. Comparison of parametric representations for
monosyllabic word recognition in continuously spoken
sentences. IEEE transactions on acoustics, speech, and
signal processing, 28(4):357–366, 1980.
[De Vos and Blanckenberg, 2007] Jacques P De Vos and
Mike M Blanckenberg. Automated pediatric cardiac auscultation. IEEE Transactions on Biomedical Engineering,
54(2):244–252, 2007.
[Godino-Llorente and Gomez-Vilda, 2004] Juan
Ignacio
Godino-Llorente and P Gomez-Vilda. Automatic detection of voice impairments by means of short-term cepstral
parameters and neural network based detectors. IEEE
Transactions on Biomedical Engineering, 51(2):380–384,
2004.
[Goldberger et al., 2000] A. L. Goldberger, L. A. N. Amaral, L. Glass, J. M. Hausdorff, P. Ch. Ivanov, R. G. Mark,
J. E. Mietus, G. B. Moody, C.-K. Peng, and H. E. Stanley.
PhysioBank, PhysioToolkit, and PhysioNet: Components
of a new research resource for complex physiologic signals. Circulation, 101(23):e215–e220, 2000.
[Hammerla et al., 2016] Nils Y. Hammerla, Shane Halloran,
and Thomas Plötz. Deep, convolutional, and recurrent
models for human activity recognition using wearables.
In Subbarao Kambhampati, editor, Proceedings of the
Twenty-Fifth International Joint Conference on Artificial
Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July
2016, pages 1533–1540. IJCAI/AAAI Press, 2016.
[He et al., 2015] Kaiming He, Xiangyu Zhang, Shaoqing
Ren, and Jian Sun. Deep residual learning for image recognition. CoRR, abs/1512.03385, 2015.
[Kaggle, 2014] Kaggle. American epilepsy society seizure
prediction challenge. https://www.kaggle.com/
c/seizure-prediction, 2014. [Online; accessed
22-December-2016].
[Kaggle, 2015] Kaggle.
Grasp-and-Lift EEG Detection.
https://www.kaggle.com/c/
grasp-and-lift-eeg-detection, 2015. [Online; accessed 22-December-2016].
[Kingma and Ba, 2014] Diederik P. Kingma and Jimmy Ba.
Adam: A method for stochastic optimization. CoRR,
abs/1412.6980, 2014.
[LeCun et al., 2015] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436–
444, 2015.
[Liang and Hu, 2015] Ming Liang and Xiaolin Hu. Recurrent convolutional neural network for object recognition. In IEEE Conference on Computer Vision and Pattern
Recognition, CVPR 2015, Boston, MA, USA, June 7-12,
2015, pages 3367–3375. IEEE Computer Society, 2015.
[Lin et al., 2013] Min Lin, Qiang Chen, and Shuicheng Yan.
Network in network. CoRR, abs/1312.4400, 2013.
[Liu et al., 2016] Chengyu Liu, David Springer, Qiao Li,
Benjamin Moody, Ricardo Abad Juan, Francisco J Chorro,
Francisco Castells, José Millet Roig, Ikaro Silva, Alistair EW Johnson, et al. An open access database for the
evaluation of heart sound algorithms. Physiological Measurement, 37(12):2181, 2016.
[Maglogiannis et al., 2009] Ilias Maglogiannis, Euripidis
Loukis, Elias Zafiropoulos, and Antonis Stasis. Support
vectors machine-based identification of heart valve diseases using heart sounds. Computer methods and programs in biomedicine, 95(1):47–61, 2009.
[Martı́nez et al., 2013] Héctor Perez Martı́nez, Yoshua Bengio, and Georgios N. Yannakakis. Learning deep physiological models of affect. IEEE Comp. Int. Mag., 8(2):20–
33, 2013.
[Mirowski et al., 2008] Piotr W Mirowski, Yann LeCun,
Deepak Madhavan, and Ruben Kuzniecky. Comparing
svm and convolutional networks for epileptic seizure prediction from intracranial eeg. In 2008 IEEE Workshop on
Machine Learning for Signal Processing, pages 244–249.
IEEE, 2008.
[Russakovsky et al., 2015] Olga Russakovsky, Jia Deng,
Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma,
Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael
Bernstein, Alexander C. Berg, and Li Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–
252, 2015.
[Saraçoglu, 2012] Ridvan Saraçoglu. Hidden markov modelbased classification of heart valve disease with PCA for
dimension reduction. Eng. Appl. of AI, 25(7):1523–1528,
2012.
[Sepehri et al., 2008] Amir A Sepehri, Joel Hancq, Thierry
Dutoit, Arash Gharehbaghi, Armen Kocharian, and
A Kiani. Computerized screening of children congenital heart diseases. Computer methods and programs in
biomedicine, 92(2):186–192, 2008.
[Springer et al., 2014] David B Springer, Lionel Tarassenko,
and Gari D Clifford. Support vector machine hidden semimarkov model-based heart sound segmentation. In Computing in Cardiology 2014, pages 625–628. IEEE, 2014.
[Springer et al., 2016] David B Springer, Lionel Tarassenko,
and Gari D Clifford. Logistic regression-hsmm-based
heart sound segmentation. IEEE Transactions on Biomedical Engineering, 63(4):822–832, 2016.
[Szegedy et al., 2014] Christian Szegedy, Wei Liu, Yangqing
Jia, Pierre Sermanet, Scott E. Reed, Dragomir Anguelov,
Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. Going deeper with convolutions. CoRR,
abs/1409.4842, 2014.
[Szegedy et al., 2015] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew
Wojna. Rethinking the inception architecture for computer
vision. CoRR, abs/1512.00567, 2015.
[Uğuz, 2012a] Harun Uğuz. Adaptive neuro-fuzzy inference system for diagnosis of the heart valve diseases using
wavelet transform with entropy. Neural Computing and
applications, 21(7):1617–1628, 2012.
[Uğuz, 2012b] Harun Uğuz. A biomedical system based on
artificial neural network and principal component analysis
for diagnosis of the heart valve diseases. Journal of medical systems, 36(1):61–72, 2012.
[Wang et al., 2007] Ping Wang, Chu Sing Lim, Sunita
Chauhan, Jong Yong A Foo, and Venkataraman Anantharaman. Phonocardiographic signal analysis method using a modified hidden markov model. Annals of Biomedical Engineering, 35(3):367–374, 2007.
[World Health Organization, 2017] World Health Organization. Cardiovascular diseases (cvds). http://who.
int/mediacentre/factsheets/fs317/en/,
2017. [Online; accessed 01-Febuary-2017].
[Zheng et al., 2015] Yineng Zheng, Xingming Guo, and Xiaorong Ding. A novel hybrid energy fraction and entropybased approach for systolic heart murmurs identification. Expert Systems with Applications, 42(5):2710–2721,
2015.
| 1cs.CV
|
Shaping Influence and Influencing Shaping: A
Computational Red Teaming Trust-based Swarm
Intelligence Model
Jiangjun Tang1 , Eleni Petraki2 , and Hussein Abbass1
arXiv:1802.09647v1 [cs.AI] 26 Feb 2018
1
University of New South Wales, School of Engineering and Information Technology,
Canberra, ACT 2600, Australia?? .
2
Faculty of Science, Technology, Education, and Mathematics, University of
Canberra Canberra, Australia.
j.tang@adfa.edu.au,Eleni.Petraki@canberra.edu.au,h.abbass@adfa.edu.au
Abstract. Sociotechnical systems are complex systems, where nonlinear
interaction among different players can obscure causal relationships. The
absence of mechanisms to help us understand how to create a change in
the system makes it hard to manage these systems.
Influencing and shaping are social operators acting on sociotechnical systems to design a change. However, the two operators are usually discussed
in an ad-hoc manner, without proper guiding models and metrics which
assist in adopting these models successfully. Moreover, both social operators rely on accurate understanding of the concept of trust. Without
such understanding, neither of these operators can create the required
level to create a change in a desirable direction.
In this paper, we define these concepts in a concise manner suitable for
modelling the concepts and understanding their dynamics. We then introduce a model for influencing and shaping and use Computational Red
Teaming principles to design and demonstrate how this model operates.
We validate the results computationally through a simulation environment to show social influencing and shaping in an artificial society.
Keywords: Influence, Shaping, Trust, Boids
1
Introduction
Recently, computational social scientists are attracted to studying means for
measuring the concepts of influence and shaping. For influence to work is to
exert a form of social power. Servi and Elson [1] introduce a new definition
of influence which they apply to online contexts as ‘the capacity to shift the
patterns of emotion levels expressed by social media users’. They propose that
measuring influence entails identifying shifts in users’ emotion levels followed by
the examination of the extent to which these shifts can be connected with a user.
??
Portions of this work was funded by the Australian Research Council Discovery
Grant number DP140102590.
However, if the process of influence creates shifts in patterns of emotions which
can be detected in the short-term, can a persistent application of influencing
operators create a long-term shift (i.e. shaping)?
Shmueli et.al. [2] discuss computational tools to measure processes for shaping and affecting human behaviour in real life scenarios. Trust was identified as
a means to influence humans in a social system. Moreover, trust was found to
have a significant impact on social persuasion. Trust is a complex psychological
and social concept. A review of the concept can be found in [3].
Larson et.al. [4] are among a few to imply a distinction between influence
and shaping, whereby shaping is perceived to be a change to the organization
or the environment, while influence fosters attitudes, behaviours or decisions of
individuals or groups. However, the majority of the literature follows a tendency
to assume that social influencing would lead to shaping.
In this paper, we aim to distil subtle differences to distinguish between the
two concepts. This distinction is very important for a number of reasons. First,
it examines the validity of the implicit assumption that influencing is a sufficient
condition for shaping. Second, it is important when studying social sciences
using computational models (computational social sciences) to create models
that are not ambiguous about the social and psychological phenomena under
investigation. Third, it is vital to make it explicit that social influencing and
shaping work on different time scales; that is, social influencing is effective in
the short run, while shaping requires time and is more effective in the long run.
We will use a computational red teaming (CRT) model, whereby a red agent
acts on a blue team to influence, shape and sometimes distract the blue team.
The idea of the model should not be seen from a competition or conflict perspective. The model is general, were the red agent can be an agent that promotes a
positive attitude within a team (a servant leader) or a social worker correcting
the social attitude of a gang.
2
Influence, Shaping, and Trust
Influence will be defined in this paper as: an operation which causes a short-term
effect in the attitude or behaviour of an individual, group or an organization.
Shaping, on the other hand, is defined as: an operation which causes a long-term
effect in the attitude or behaviour of an individual, group or an organization.
We use the more accurate term “effect” rather than the term “change” because sometimes social influence and shaping need to operate to maintain the
status quo. If agent A is attempting to influence agent B by changing B’s behaviour, agent C can attempt to counteract agent A’s influence by influencing
B to maintain its behaviour. Therefore, influence does not necessarily require a
change to occur.
In a strict mathematical sense, social influence would change the parameters
of a model, while social shaping would alter the constraint system.
To illustrate the difference, we will use a model, whereby a group of blue
agents attempts to follow a blue leader. A red agent has a self-interest to influence
or shape the blue team. All agents are connected through a network. Each agent,
excluding the blue leader and the red agent, attempts to align their behaviour
with their neighbours (the other agents it is connected to). The blue leader
attempts to reach the blue goal (a position in space). When all agents fully trust
each other, and in the absence of the red agent’s effect, it is expected that the
intention of the blue leader will propagate throughout the network. Over time,
the blue agents will also move towards the blue goal.
The red agent has a different goal. It aligns with the agents it is connected
to, but it also attempts to influence and/or shape them towards its own goal
(or away from the blue’s goal). Social influence by red is represented through
changing red movements; thus, affecting the movements of its neighbours. Social
shaping by red is represented through a network re-wiring mechanism. Connections in a network are the constraints on the network’s topology. By rewiring the
network, the red agent changes the constraints system. We abstract trust to a
scale between -1 and 1, whereby “1” implies maximum trust, while “-1” implies
maximum distrust. We do not differentiate in this paper between distrust and
mistrust. A “0” value is a neutral indicator that is equivalent to not knowing a
person.
3
The Model
An agent-based Boids [5] model is proposed in this paper. All agents are randomly initialized with random headings and locations. Agents are connected
through a network structure that allows information exchange among the agents.
In this setup, the neighborhood is mostly defined by the hamming distance between two agents in the network, while sometimes it will be defined by the
proximity of one agent to another in the physical space. This latter definition is
the classic and default one used in the Boids model. Three Boids rules: cohesion,
alignment, and separation, are still adopted here. However, the first two vectors are sensed by network connections while the separation vector is perceived
through the Euclidean distance in the physical space. Each agent has a trust
factor value which decides how much this agent trusts the information perceived
from others. The first two vectors are scaled using the trust factor before an
agent’s velocity gets updated. An agent 100% trusts the cohesion and alignment
information from its linked neighbours when it has a trust factor of 1. When the
trust factor is -1, the agent totally believe that the information is deliberately
altered to the opposite value, and therefore, the agent reverses the information
it receives.
In the model, there are three types of agents: blue leader (AB ), red agent
(AR ), and blue agent. The blue leader always moves towards a specific location/goal, and attempts to make the other blue agents follow it. The blue agent
is an agent that senses its neighbours through network links for both cohesion
and alignment but by Euclidean distance for separation, and then makes decisions on its new velocity. The red agent is a special agent in the model who
controls the level of noise (η) in the velocity and network connections for influ-
encing and shaping. Many blue agents can exist but there is only a single blue
leader and a single red agent.
Agents form a set A and live in a space (S) defined by a given width (spaceW )
and a given length (spaceL). All agents are connected by a random network. To
establish network connections, a probability (p) is defined. If we have n agents
including one blue leader, one red agent, and n − 2 blue agents, the network
can be denoted as G(n, p). A Goal (G) is a 2-D position that sits at one of the
corners of S. Blue leader always aims to move towards G. The area surrounding
of G is denoted by δ. Once the blue leader enters this area, the position of G
changes. An agent has the following common attributes:
– Position (p), p ∈ S, is a 2-D coordinate.
– Velocity (v) is a 2-D vector representing the agent’s movement (heading and
speed) in a time unit.
– Cohesion Velocity (cohesionV ) of an agent is the velocity calculated based
on the mass of all agents that are connected to this agent.
– Alignment Velocity (alignmentV ) of an agent is the velocity calculated based
on the average velocity of all agents that are connected to this agent.
– Separation Velocity (separationV ) of an agent is the velocity that forces this
agent to keep a certain small distance from its neighbors and is based on the
Euclidean distance.
– Velocity weights:
• Cohesion weight (wc ): a scaler for the cohesion velocity.
• Alignment weight (wa ): a scaler for the alignment velocity.
• Separation weight (ws ): a scaler for the separation velocity.
– Trust factor (τ ) defines how much an agent trusts its connected neighbours.
It has an impact on both the cohesion velocity and alignment velocity but
not on the separation velocity.
All agents except the blue leader attempt moving towards the neighbours’
location guided with the cohesion vector. The cohesion vector,cohesionVi , of an
agent Ai is:
P|N |
j=0 pj
− pi
(1)
cohesionVi =
|N |
where, |N | is the cardinality of the neighbourhood N .
The alignment velocity of an agent with its linked neighbours is:
P|N |
alignmentVi =
j=0
|N |
vj
− vi
(2)
The separation velocity of an agent is calculated using neighbours Nd in the
spatial proximity of other agents as follows:
|Nd |
separationVi = −
X
j=0
(pj − pi )
(3)
The trust factor of a blue agent is updated by the average trust factors of all
its connected neighbours (N ) as below:
P|N |
τi = 0.5 × (τi +
j=0 τj
|N |
)
(4)
The blue leader and red agent’s trust factors are not updated.
The velocity of the blue leader always aims at the goal G at each step and it
is not affected by any other factor. The velocities at time t of all agents except
the blue leader are updated by Equation 5.
v = v + τ × (wc × cohesionV + wa × alignmentV ) + ws × separationV
(5)
where, cohesionV , AlignmentV , and separationV are normalized vectors. The
position at time t of each agent can be updated by:
p = p + vt
(6)
If an agent’s new position is outside the bounds of S, the reflection rule is
applied. According to Equation 5, an agent adjusts its own velocity in compliance
with both cohesionV and alignmentV when it has a positive trust value, and
follows the opposite direction as suggested by cohesionV and alignmentV when
its trust factor is negative. If τ = 0, only the separation vector takes effect on
this agent so that this agent doesn’t anyone.
The red agent introduces heading noise, changes its network structure, or
does both at each time step. The heading noise can be propagated to blue agents
through the connections of the network to cause a deviation in some blue agents’
moving directions. Changes in the network structure may result in long term
effects on blue agents.
At each time step, Red agent updates its own velocity (vRedAgent ) by Equation 5 and then Equation 7 uses a normal distribution (N (0, η)) to generate noise
and add it to Red’s velocity.
vRedAgent = vRedAgent + N (0, η)
(7)
Equation 6 is used to update the red agent’s position.
Furthermore, the red agent has the ability to re-configure network connections by using the noise level η as a probability that governs the eventuality of
the following steps:
1.
2.
3.
4.
Randomly pick up a blue agent (Ai ) who is connected with the red agent.
Randomly pick up another blue agent (Aj ) who is connected with Ai .
Break the connection between Ai and Aj .
Connect the red agent with a randomly chosen blue agent Aj .
In this way, the connection between the red agent and blue agents changes
but the number of edges of the whole network remains as before. The long term
effects of these topological updates are expected because the path along with
information propagates changes and some blue agents may not get consistent
updates from their neighbours.
The blue leader attempts to lead other blue agents towards a given destination, and the red agent attempts to disorient through influence (deliberate
changes in heading) and/or shaping (deliberate re-configuration of network structure). Therefore, the “effect” from our model can be derived as how well the blue
agents follow the blue leader given the influence/shaping by the red agent. A
straightforward measure of this effect within our model is the average distance
between blue agents and the goal when the blue leader reaches the goal. If this
distance is small, blue agents followed the blue leader. If it is large, red agent
distracted the blue agent.
During a single simulation run, the blue leader is tasked to reach the goal
multiple times. Each time it reaches the goal (an iteration), the location of the
goal changes. The effect is measured at the end of each iteration. The overall
effect of a simulation run is the average of all iterations except the first iteration, which is excluded to eliminate the warm-up period in the system resultant
from the random initialisation of agents. In summary, the effect is defined by
Equation 8.
!
n
M
X
1X
1
¯
dm,i
(8)
d=
M m=1 n i=1
where, M is the number of iterations except the first one, n is the number of
blue agents, and dm,i is the distance between agent i and the goal location at
the m’th iteration.
4
Experimental Design
Our aim is to evaluate the “effects” of the short term inference and long term
shaping caused by the red agent. Two stages are used for the experiments. The
first stage focuses on the noise of red agent where the effect from the trust factor
is minimised. The second stage investigates both the trust factor and the red
agent’s noise. The number of blue agents is 25, so there are a total of 27 agents
including a blue leader and a red agent. All agents’ initial locations are uniformly
initialised at random within S, where S is a square space with the dimension of
500×500. All agents’ headings are uniformly initialised at random with constant
speed of 1. All agents except the blue leader have the same velocity weights:
wc = 0.4 for cohesion, wa = 0.4 for alignment, and ws = 0.2 for separation. The
initial trust factor values of all blue agents are uniformly assigned at random
within the range of [−1, 1]. Connections among agents are created by a random
network G(n, 0.1), where n = 27.
In all experiments, two levels of noise (η − = 0.1 and η + = 0.9) are used. In
the first stage, to reduce the effect of the trust factor, it is assumed constant with
a value of 1 for all agents; that is, all blue agents trust any perceived information,
including the information arriving from red. In the second stage, the blue leader
has two trust levels: τB− = 0.2 and τB+ = 1, and the red agent has two levels of
trust: τR− = −0.2 and τR+ = −1.
Three scenarios are designed for investigating the red agent’s impact in our
experiments. In Scenario 1, the red agent introduces noise to its heading at
each time step thus this noise can immediately affect direct neighbours and can
be propagated through the network. In Scenario 2, the red agent changes the
network structure at each time step thus shaping the environment of the blue
agents. In Scenario 3, the red agent introduces noises to its heading and changes
network structures at each time step, so that both influence and shaping take
place in our model.
Using 2k factorial design [6], a total of 2 factor combinations is available at
the first stage and 8 at the second stage. Each combination has three individual
scenarios to study. Moreover, the randomness exists in the initialisation phase,
therefore 10 runs for each factor combination and impact are desired in order to
obtain meaningful results. In summary, there are 60 (3 × 2 × 10) simulation runs
in the first stage and 240 (3 × 8 × 10) runs in the second stage. The results and
analysis are provided in the next section.
5
Results and Discussion
The results from the first stage experiments are presented in Table 1. The dis¯ is listed from the
tance between blue agents and goal location of each run (d)
second column to the eleventh column. And the last three columns of the table
are the averages of 10 runs, the standard deviations and the confidence intervals
that are obtained at α = 0.05.
Table 1: Results of red agent’s noise impact when τB = 1 and τR = 1
R1
R2
η = 0.1 47.64 46.78
η = 0.9 145.90 155.75
eη
98.27 108.97
η = 0.1 45.71 59.28
η = 0.9 61.23 57.63
eη
15.52 -1.65
η = 0.1 45.34 47.09
η = 0.9 213.49 168.69
eη
168.15 121.59
R3
R4
R5
R6
R7
R8
R9
R10
Scenario1: Velocity Noise
39.26 56.63 47.09 67.29 60.65 38.76 42.99 44.86
168.04 199.94 171.94 243.61 162.15 144.08 103.82 117.94
128.78 143.31 124.85 176.33 101.50 105.33 60.83 73.08
Scenario 2: Network Changes
47.39 54.31 58.14 69.65 50.27 44.35 43.90 48.83
56.30 81.25 53.65 74.69 55.76 40.86 47.74 52.03
8.91 26.94 -4.49
5.04
5.49 -3.49
3.85
3.20
Scenario 3: Velocity Noise and Network Changes
65.90 54.05 51.93 84.91 54.66 41.11 43.88 52.21
197.52 188.80 171.62 236.93 174.46 183.98 84.95 122.82
131.62 134.75 119.69 152.02 119.80 142.87 41.07 70.61
Avg STD Conf.
49.19 8.90 6.36
161.32 37.65 26.93
112.12 31.70 22.68
52.18 7.78
58.11 11.36
5.93 9.00
5.56
8.13
6.44
54.11 12.23 8.75
174.32 41.20 29.47
120.22 35.90 25.68
The results show that the more noise the red agent has in its velocity, the more
deviation from the goal observed by the blue agents. Changes in the network
structure can lower blue agents performance, although the magnitude of this
decrease may not be significant. This is expected since the shaping operates
work on a smaller timescale than the influence operator. When both influence
and shaping work together, the effect is more profound than any of the individual
cases in isolation.
Table 2: Results of effects from red agent’s noise impact and trust factors. The
confidence level is at 0.05.
Effect
R1
R2
eτ B
eτ R
eN
-170.40 -146.54
165.32 160.08
1.78 15.84
eτ B
eτ R
eN
-122.99 -165.55
142.72 177.17
42.90
1.75
eτ B
eτ R
eN
-151.65 -140.59
157.63 152.23
2.27 22.60
R3
R4
R5
R6
R7
R8
R9
R10
Scenario 1: Velocity Noise
-83.92 -55.00 -131.83 -6.05 -128.09 -110.66 -184.81 -152.86
95.83 71.21 149.41 8.11 133.20 111.97 167.79 160.23
-9.18 6.22
6.74 3.40 -13.50
0.35 -14.64 -17.58
Scenario 2: Network Changes
-144.34 -64.94 -168.15 -8.09 -154.27 -170.61 -189.59 -187.66
154.10 77.45 186.62 24.03 164.25 172.21 171.13 172.02
12.81 19.08
8.50 -1.08
-0.29 -12.17 25.41 -15.03
Scenario 3: Velocity Noise and Network Changes
-132.44 -35.97 -166.98 -7.63 -159.37 -171.89 -194.38 -163.85
147.97 38.06 176.90 16.03 175.96 163.48 171.95 174.82
15.16 14.70 21.23 4.64
5.73 10.22 20.50
8.15
Avg STD Conf.
-117.02 55.01 39.35
122.31 51.75 37.02
-2.06 11.04 7.90
-137.62 58.31 41.71
144.17 52.25 37.38
8.19 17.62 12.61
-132.47 61.12 43.72
137.50 59.31 42.43
12.52 7.38 5.28
The results from the second stage are summarised in Table 2. Interestingly,
the trust factors of the blue leader and red agent become critical but the red
agent’s noise is not critical. The model responses to the trust factor as expected.
When the blue leader has a higher level of trust, all blue agents follow it better
(smaller effect values can be observed from eτB ). On the other hand, the blue
agents demonstrate disorder behaviours (larger value of eτR ) if red agents have
small negative trust. These situations are found in all three scenarios and the
effects of trust factors are all statistically significant. Although the red agent’s
noise has some effects on blue agents, it is very little and can be ignored when
compared to the effect of the trust factor. Negative trust values taken by the
blue agents counteract the influence generated by both blue and red agents.
The red agent’s noise can have impact on blue agents’ behaviours through
short term influence (velocity) and long term shaping (network structures) if the
effects of trust are low. When the trust factors are high, the situation changes.
Trust has a significant impact on blue agents’ behaviours.
Figure 1 illustrates the agents’ footprints when the red agent impacts velocity,
network structure or both but with minimum trust effects. These footprints are
obtained from the first runs of all three scenarios in the first stage and the results
are listed in the column “R1” of Table 1.
Figure 1a, 1b, and 1c show that the blue leader leads other agents towards
the goal well as being demonstrated by a few congested trajectories. When noise
increases, blue agents’ trajectories are disturbed as shown in Figure 1d. Figure 1e shows that changes in the network structure seem to not generate much
effects on blue agents’ behaviours. However, the blue agents behaviours are more
random when red affects both velocity and network structure. This manifests disorderliness as more scattered blue agents’ footprints can be observed in the last
figure.
Figure 2 shows two examples of agents’ footprints that are affected by trust
with small noise values (η = 0.1). The footprints presented in Figure 2a are
extracted from the first run of the third scenario in the second stage with τB =
0.2 and τR = −1. When the red agent’s trust is -1, the negative effect on blue
500
45
500
55
500
450
40
450
50
450
400
35
45
400
80
70
400
60
40
350
350
350
30
35
300
300
25
250
30
250
40
250
25
20
200
50
300
200
200
30
20
15
150
150
150
15
10
100
5
50
100
200
300
400
500
100
5
100
200
300
400
50
500
100
(b) Scenario 2: η = 0.1
25
450
20
400
20
100
10
0
(a) Scenario 1: η = 0.1
500
10
50
200
300
400
500
0
(c) Scenario 3: η = 0.1
500
55
500
20
450
50
450
18
400
16
350
14
300
12
250
10
200
8
150
6
100
4
45
400
40
350
350
35
15
300
300
30
250
250
25
10
200
200
20
150
150
15
5
100
50
100
10
50
100
200
300
400
500
(d) Scenario 1: η = 0.9
5
100
200
300
400
500
(e) Scenario 2: η = 0.9
2
50
100
200
300
400
500
0
(f) Scenario 3: η = 0.9
Fig. 1: Agents’ footprints under Red agent’s noise (η) impacts on velocity and
network with minimum trust effects (τB = 1 and τR = 1).
agents’ trust is continuously broadcasted throughout the network. Eventually,
all blue agents will have a negative trust value that is close to -1 since the blue
leader doesn’t have much power (τB = 0.2) to compete against the red agent.
This results in all blue agents distrusting each other. In this case, the blue agents
spread out to the boundaries. However, the reflection rule forces them back into
the given space, causing the blue agents to move around the corners after several
time steps as shown in Figure 2a.
The right side of Figure 2 depicts agents’ footprints extracted from the third
scenario in the second stage with τB = 1, τR = −0.2, and η = 0.1. Some
trajectory patterns can be observed from Figure 2b. In this case, the blue leader
has enough power to beat the red agent in terms of trust. All blue agents will
have positive trust that are passed from the blue leader. Although the red agent
has influence on their velocity and connections, the blue agents are still capable
to follow the blue leader to reach the goal locations (corners) as the trajectory
patterns show.
From the above examples and previous results, it can be concluded that trust
has a more significant impact on blue agents behaviours than the effect of noise
caused by the red agent.
6
Conclusion
In this paper, we presented a CRT trust-based model which is an extension of
the classic Boids. The network topologies for situation awareness and a trust
500
500
500
10
450
450
450
9
400
400
400
8
350
350
350
7
300
300
300
6
250
250
250
5
200
200
200
4
150
150
150
3
100
100
100
2
50
1
50
50
100
200
300
400
500
0
(a) τB = 0.2, τR = −1, and η = 0.1
100
200
300
400
500
0
(b) τB = 1, τR = 0.2, and η = 0.1
Fig. 2: Trust effects on agents behaviours with red agent noise level at 0.1 in
Scenario 3.
factor on perceived information are introduced into our model. They provide
the necessary tools to investigate influence and shaping using CRT.
A number of experiments are designed and conducted in order to differentiate
the potential impact from influence and shaping on a system. As the results of
the first experimental stage suggest, short term influence can have an immediate
effect on the system which is easily observed. The long term shaping effects may
not be easily observable although it has effect on the system, especially when
it interacts with influence. However, trust among agents plays a critical role in
the model. Based on our findings in the second experiment, trust dominates the
agents’ behaviours regardless of noise.
Acknowledgement
This is a pre-print of an article published in International Conference in Swarm
Intelligence, Springer, Cham, 2016. The final publication is available at https:
//doi.org/10.1007/978-3-319-41000-5_2.
References
1. Les Servi and Sara Beth Elson. A mathematical approach to gauging influence
by identifying shifts in the emotions of social media users. Computational Social
Systems, IEEE Transactions on, 1(4):180–190, 2014.
2. Erez Shmueli, Vivek K Singh, Bruno Lepri, and Alex Pentland. Sensing, understanding, and shaping social behavior. Computational Social Systems, IEEE Transactions
on, 1(1):22–34, 2014.
3. Eleni Petraki and Hussein Abbass. On trust and influence: A computational red
teaming game theoretic perspective. In Computational Intelligence for Security
and Defense Applications (CISDA), 2014 Seventh IEEE Symposium on, pages 1–7.
IEEE, 2014.
4. Eric V Larson, Richard E Darilek, Daniel Gibran, Brian Nichiporuk, Amy Richardson, Lowell H Schwartz, and Cathryn Q Thurston. Foundations of effective influence
operations: A framework for enhancing army capabilities. Technical report, DTIC
Document, 2009.
5. Craig W Reynolds. Flocks, herds and schools: A distributed behavioral model. In
ACM SIGGRAPH computer graphics, volume 21, pages 25–34. ACM, 1987.
6. Douglas C Montgomery. Design and analysis of experiments. John Wiley & Sons,
2008.
| 2cs.AI
|
arXiv:1705.03510v1 [math.PR] 9 May 2017
The middle-scale asymptotics of
Wishart matrices
Didier Chételat and Martin T. Wells
Department of Applied Mathematics
and Industrial Engineering
École Polytechnique
Montréal, Québec H3T 1J4
Canada
e-mail: didier.chetelat@polymtl.ca
Department of Statistical Science
Cornell University
1198 Comstock Hall
Ithaca, NY 14853-3801
USA
e-mail: mtw1@cornell.edu
Abstract: We study the behavior of a real p-dimensional Wishart random
matrix with n degrees of freedom when n, p Ñ 8 but p{n Ñ 0. We establish
the existence of phase transitions when p grows at the order npK`1q{pK`3q
for every k P N, and derive expressions for approximating densities between
every two phase transitions. To do this, we make use of a novel tool we call
the G-transform of a distribution, which is closely related to the characteristic function. We also derive an extension of the t-distribution to the
real symmetric matrices, which naturally appears as the conjugate distribution to the Wishart under a G-transformation, and show its empirical
spectral distribution obeys a semicircle law when p{n Ñ 0. Finally, we discuss how the phase transitions of the Wishart distribution might originate
from changes in rates of convergence of symmetric t statistics.
MSC 2010 subject classifications: Primary 60B20, 60B10; secondary
60E10.
1. Introduction
The roots of random matrix theory lies in statistics, with the work of Wishart
[1928] and Bartlett [1933], and in numerical analysis, with the work of Von Neumann and Goldstine [1947]. In this early period, many well-known matrix distributions were introduced. This includes the real Gaussian matrix ensemble
Gpp, qq, a p ˆ q matrix with independent standard Gaussian entries, the Gaussian orthogonal
ensemble GOEppq, the distribution of a symmetric matrix pX `
?
X t q{ 2 with X „ Gpp, pq, and the Wishart (also known as Laguerre) distribution Wp pn, Ip {nq, the distribution of a symmetric matrix XX t {n with
X „ Gpp, nq. During that time, the main concern was to derive properties
of these distributions for a fixed dimension. Some asymptotics of the Wishart
distribution were considered, but only as n Ñ 8 for fixed p.
1
Chételat and Wells/Mid-scale Wishart asymptotics
2
Starting with the pioneering work of Wigner [1951, 1955, 1957], Porter and
Rosenzweig [1960], Gaudin [1961] and Mehta [1960a,b], researchers began investigating the asymptotics of Gaussian ensembles as their dimension grew to
infinity. As a result of decades of work, the behavior of a GOEppq matrix is now
well understood both in the classical setting where p is fixed, and in the setting
where p Ñ 8.
However, the situation asymptotics of the Wishart distribution is more complicated, as it depends on two parameters, n and p, and initial progress was slow.
The work of Marchenko and Pastur [1967] clearly established that the analogue
of a Gaussian orthogonal ensemble matrix whose dimension p grows to infinity
is a Wishart matrix whose degrees of freedom n and dimension p jointly grow
to infinity in such a way that p{n Ñ c P p0, 1q. Since then, we gained a very
good understanding of the behavior of Wishart matrices in this regime.
But this body of work left open the question as to what happens to a Wishart
matrix when n, p Ñ 8 with p{n Ñ 0. Since such asymptotics are middle-scale
between the classical regime where p is fixed as n Ñ 8 and the high-dimensional
regime where p{n Ñ c P p0, 1q, we might refer to them as middle-scale regimes.
Hence, we might ask: what is the asymptotic behavior of a Wishart matrix
Wp pn, Ip {nq in the middle-scale regimes? This question is addressed this article.
To gain some intuition, it is instructive to look at the eigenvalues λ1 ą ¨ ¨ ¨ ą
λp ą 0 of a Wp pn, Ip {nq Wishart matrix. In the classical regime where p is
fixed as n Ñ 8, the eigenvalues must all almost surely tend to 1 by the strong
law of large numbers. In constrast, in the high-dimensional regime where both
n, p Ñ 8 with p{n Ñ c P p0, 1q, the Marchenko-Pastur law states that for any
bounded, continuous f ,
a
ż c`
n
pc` ´ lqpc´ ´ lq
1 ÿ
dl
a.s.,
f pλi q Ñ
f plq
n i“1
2πcl
c´
?
where c˘ “ p1 ˘ cq2 . Thus the eigenvalues do not all tend to 1, but rather
distribute themselves in the shape of a Marchenko-Pastur law with parameter
c.
What happens between these two extremes? When c Ñ 0, the MarchenkoPastur law converges weakly to a Dirac measure with mass at 1. This suggests
that whenever n, p Ñ 8 with p{n Ñ 0
n
1 ÿ
f pλi q Ñ f p1q
n i“1
a.s.,
or in other words that the eigenvalues converge almost surely to 1, as in the
classical case.
This motivates a binary view of Wishart asymptotics. It appears that the
behavior of a Wishart matrix in the middle-scale regimes is the same as in
the classical regime, and therefore that there really are only two regimes: lowdimensional where p{n Ñ 0, and high-dimensional where p{n Ñ c P p0, 1q.
This binary view has very concrete repercussions. For example, in statistics,
many covariance matrix estimators have been developed that leverage high-
Chételat and Wells/Mid-scale Wishart asymptotics
3
dimensional Wishart asymptotics (see Pourahmadi [2013] for a review). When
faced with a problem where p is large with respect to n, it has been argued
that the high-dimensional asymptotics, rather than the classical, constitute the
correct model. The binary view provides a useful rule of thumb: small p’s call
for classical covariance estimators, while large p’s call for high-dimensional covariance estimators.
Unfortunately, recent results establish that this binary view is incorrect. In
the classical regime where p is fixed, the central limit theorem implies that
ı
? ”
n Wp pn, Ip {nq ´ Ip ñ GOEppq,
as n Ñ 8, where the arrow stands for weak convergence. In fact, something
better is known: recent work has extended this result to the case where p
tends to infinity. Recall that the total variation distance between two absolutely continuous distributions şF1 and F2 with densities f and g is given by
dTV pF1 , F2 q “ dTV pf1 , f2 q “ |f1 pxq ´ f2 pxq|dx. With different approaches,
Jiang and Li [2015] and Bubeck et al. [2016] independently established that
˙
ˆ ”
ı
?
n Wp pn, Ip {nq ´ Ip , GOEppq Ñ 0
dTV
whenever p3 {n Ñ 0. Thus, when p3 {n Ñ 0, the same asymptotics hold as in the
p fixed case, and we might regard these regimes as rightfully belonging to the
classical setting.
The surprising part is that the converse is true! When p3 {n Û 0, results of
Bubeck et al. [2016] and Rácz and Richey [2016] show that
ˆ ”
˙
ı
?
dTV
n Wp pn, Ip {nq ´ Ip , GOEppq Û 0.
?
Thus a phase transition occurs when p is of the order 3 n. This begs the?question:
if a normal approximation fails to hold when p grows faster than 3 n, what
asymptotics hold? Is there a uniform asymptotic behavior that holds whenever
p{n Ñ 0 with p3 {n Û 0, or are there further phase transitions as the growth
rate of p is increased?
The results of this paper offers a mostly complete answer to this question.
Namely, we establish that when p3 {n Û 0 but p2 {n Ñ 0,
ˆ ”
˙
ı
?
dTV
n Wp pn, Ip {nq ´ Ip , F1 Ñ 0,
where F1 is a continuous distribution on the space of real symmetric matrices
whose density is given when n ě 3p ´ 3 by
?
ˇ „
"
ˇ
2i
i
i
1
3
4
f1 pXq 9 ˇˇE exp ? tr XZ ´ ? tr Z `
tr Z ` 3{2 tr Z 5
4n
5n
8
3 2n
?
*ˇ2
ˇ
1
ipp ` 1q
p`1
4 2ipp ` 1q
6
2
3
ˇ ,
´ 2 tr Z ` ?
tr Z ´
tr Z ´
tr Z
(1.1)
ˇ
3{2
3n
4n
3n
2 2n
Chételat and Wells/Mid-scale Wishart asymptotics
4
Fig 1. Correct picture of Wishart asymptotics. This contrasts with the binary view, where no
phase transitions occur between p held constant and p growing like n.
?
for a Z „ GOEppq. When p grows like n, another phase transition occurs.
Namely, we establish that when p2 {n Û 0 but p5{3 {n Ñ 0,
˙
ˆ ”
ı
?
n Wp pn, Ip {nq ´ Ip , F2 Ñ 0,
dTV
where F2 is a continuous distribution on the space of real symmetric matrices
whose density is given when n ě 3p ´ 3 by
?
ˇ „
"
ˇ
i
i
1
2i
3
4
ˇ
f2 pXq 9 ˇE exp ? tr XZ ´ ? tr Z `
tr Z ` 3{2 tr Z 5
4n
5n
8
3 2n
?
?
ipp`1q
1
2 2i
p`1
4 2ipp`1q
7
6
2
tr Z 3
´ 2 tr Z ´ 5{2 tr Z ` ?
tr Z ´
tr Z ´
3n
4n
7n
3n3{2
2 2n
*ˇ2
ˇ
p`1
1024pp`1q
512pp`1q
5
4
6
ˇ ,
`
tr
Z
´
tr
Z
`
i
tr
Z
(1.2)
ˇ
4n2
3n3
5n5{2
again for a Z „ GOEppq.
In general, for every K P N we find a continuous distribution FK on the space
of real symmetric matrices, with density given when n ě 3p ´ 3 by
2K`3`
1rK
odds
ˇ «
#
ÿ
ˇ
´ 2 ¯ k2 tr Z k
i
n
ˇ
fK pXq 9 ˇE exp ? trpXZq `
ik
ˇ
4
n
k
8
k“3
2K`2´
1rK odds
p `1
`
4
ÿ
k
i
+ffˇ2
ˇ
ˇ
ˇ
ˇ
k
´ 2 ¯ k2 tr Z k
n
(1.3)
k“1
for a Z „ GOEppq, which approximates the normalized Wishart distribution in
some (but not all) middle-scale regimes. Namely, we prove the following, which
can be regarded as the main result of this paper.
Theorem 1.For any K P N,?the total variation distance between the the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s and the K th degree density
fK satisfies
ˆ ”
˙
ı
?
dTV
n Wp pn, Ip {nq ´ Ip , FK Ñ 0
Chételat and Wells/Mid-scale Wishart asymptotics
5
as n Ñ 8 with pK`3 {nK`1 Ñ 0.
The definition of fK and proof of Theorem 1 are found in Section 6, and
follow from definitions and results from Sections 3, 4 and 5 that constitute the
bulk of this paper.
The main consequence of this theorem is the existence of an infinite countable
number of phase transitions, occurring when p grows like npK`1q{pK`3q for K P
N. A diagram is provided at Figure 1. This naturally groups“ the middle-scale
˘
log p
K
K`1
regimes satisfying lim log
n ă 1 by which semi-open interval K`2 , K`3 their
nÑ8
log p
nÑ8 log n
limit lim
belongs to. We might refer to this grouping as the degree of the
log p
regime. In other words, we will say an middle-scale regime satisfying lim log
n ă
nÑ8
“ K K`1 ˘
log p
1 has degree K when lim log n P K`2 , K`3 .
nÑ8
The main result of this paper, Theorem 1, may then be summarized as saying
that the normalized Wishart distribution can be approximated by the distribution with density fK in every middle-scale regime of degree K or less. The
0th degree case corresponds to the classical setting, while the higher degrees
correspond to previously unknown behavior. In fact, we show that our 0th degree approximation F0 is asymptotically equivalent to the Gaussian orthogonal
ensemble. The results of this paper can therefore be regarded as a wide generalization of the Wishart asymptotics results of Jiang and Li [2015], Bubeck et al.
[2016], Bubeck and Ganguly [2016] and Rácz and Richey [2016].
Our approach relies on a novel technical tool we call the G-transform. It
turns out that to understand middle-scale regime behavior of Wishart matrices,
densities are less clear than characteristic functions (that is, Fourier transforms
of densities). Unfortunately, characteristic functions are difficult to relate to
metrics like the total variation distance. To remedy this problem, we develop
the G-transform and some associated theory in Section 3. An interesting aspect
of G-transform theory is that to every distribution we can associate a closely
related distribution called its G-conjugate. In fact, the G-conjugate of a Wishart
matrix is essentially a generalization of the t distribution to real symmetric
matrices. In Section 4, we define and derive several results concerning this new
distribution, including a semicircle law. From these results, we derive in Section
5 approximations to the Wishart distribution for middle-scale regimes of every
degree. Since these approximations are given using the language of G-transforms,
we derive in Section 6 density approximations, from which Theorem 1 follows.
We briefly discuss what concrete effects the phase transitions might have on
Wishart asymptotics in Section 7. Finally, we compile auxiliary results in Section
8, while we discuss in Section 9 open questions that arise from these results.
Although the results of this paper explain a large part of the behavior of
Wishart matrices when p{n Ñ 0, there exists regimes for which p{n Ñ 0 yet
log p
p R OpnpK`1q{pK`3q q for all K P N, or in other words for which lim log
n “ 1.
nÑ8
?
An example is when p grows at the order n1´1{ log n . Although the results of
our paper characterize almost all middle-scale regimes in the sense that among
log p
log p
those regimes satisfying lim log
n ď 1, those such that lim log n “ 1 represent
nÑ8
nÑ8
Chételat and Wells/Mid-scale Wishart asymptotics
6
a negligible set, they nonetheless exist. One might regard regimes such as those
as having infinite degree. Beyond this, however, it is difficult to say anything
about the behavior of Wishart matrices in these regimes. More work in that
direction is clearly needed.
2. Notation and definitions
The transpose of a matrix is denoted t , and the identity matrix of dimension
p is Ip . As is standard, we take the trace operator to have lower priority than
the power operator: thus for a matrix X, tr X k means the trace of X k . We will
write trk X when we mean the k th power of the trace of X. The Kronecker delta
is the symbol δkl “ 1rk “ ls.
The space of all real-valued symmetric matrices is denoted Sp pRq “ tX P
Mp pRq|X “ X t u. For a symmetric matrix X, we define the symmetric differentiation operator Bs {Bs Xkl by
#
1 B
for k “ l
1 ` δkl B
Bs
kl
“
“ 2 BX
B
Bs Xkl
2 BXkl
for k “ l.
BXkk
This operator has the elegant property that BSBXS kl trpXY q “ Ykl for any two
symmetric matrices X, Y .
The space of symmetric matrices Sp pRq can be assimilated to Rppp`1q{2 by
mapping a symmetric matrix to its upper triangle. By integration over Sp pRq,
we mean integration with respect to the pullback Lebesgue measure under this
isomorphism, that is,
ż
ż
f pXq dX “
Sp pRq
p
` ˘ź
f X
dXij .
Rppp`1q{2 iďj
We say a real symmetric matrix follows the Gaussian orthogonal ensemble
GOEppq distribution if Xkl , k ď l are all independent, with diagonal elements
Xkk „ Np0, 2q and off-diagonal elements Xkl „ Np0, 1q.
Let X be a n ˆ p matrix of i.i.d. Np0, 1q random variables, and let Σ be a
p ˆ p positive-definite matrix. The Wishart distribution Wp pn, Σq is the distri1
1
bution of the random matrix Σ 2 X t XΣ 2 . This is a special case of the matrix
gamma distribution. Following Gupta and Nagar [1999, Section 3.6], we say
a positive-definite matrix X has a matrix gamma distribution Gp pα, Σq with
shape parameter α ą pp ´ 1q{2 and scale parameter Σ if it has density over
Sp pRq given by
!
)
ˇ ˇα´ p`1
1
2
ˇX ˇ
exp ´ trpΣ´1 Xq 1rX ą 0s ,
f pXq “
α
|Σ| Γp pαq
where Γp is the multivariate gamma function. With this definition, the Wishart
distribution Wp pn, Σq is a matrix gamma with shape n2 and scale 2Σ.
While studying the Wishart distribution, the expression n ´ p ´ 1 comes up
so often that it makes sense to give it its own symbol. We will therefore write
m “ n ´ p ´ 1.
Chételat and Wells/Mid-scale Wishart asymptotics
7
The Hellinger distance is metric between absolutely continuous probability measures. For two distributions F1 and F2 with densities f1 and f2 , their
Hellinger distance is defined as
ˇ2 ¯ 12
´ż ˇ
ˇ
ˇ 1{2
1{2
HpF1 , F2 q “ Hpf1 , f2 q “
ˇf1 pxq ´ f2 pxqˇ dx .
The Hellinger distance is closely related to the total variation distance by the
inequalities
1
1{2
dTV pf1 , f2 q ď Hpf1 , f2 q ď dTV pf1 , f2 q.
(2.1)
2
In particular, Hpf1 , f2 q Ñ 0 if and only if dTV pf1 , f2 q Ñ 0. Thus they can
be seen as inducing the same topology on absolutely continuous probability
measures, called the strong topology, in contrast to the topology induced by
weak convergence of measures called the weak topology. One can show that if a
sequence of measures converges in the strong sense (i.e. in the dTV or H metrics),
then it converges weakly.
3. G-transforms
Our analysis of Wishart matrices relies heavily on a tool we call the G-transform
of a probability measure. To do so, we first need to define the Fourier transform
over symmetric matrices.
In Section 2, we clarified what we meant by integration over Sp pRq. For a
function f : Sp pRq Ñ C in L1 pSp pRqq, we define its Fourier transform to be
ż
Ftf upT q “
1
p
22 π
ppp`1q
4
e´i trpT Xq f pXq dX.
(3.1)
Sp pRq
It is more common to define
the Fourier
transform on symmetric(matrices with
(
ř
the integrand exp ´ i kďl Tkl Xkl , but choosing exp i trpT Xq considerably
simplifies our computations.
We extend this definition to f P Lr pSp pRqq, 1 ă r ď 2 in the usual manner. Because of the specific normalization chosen, this definition obeys a simple
version of Plancherel’s theorem, namely
ż
ż
f pXqs
g pXq dX “
Sp pRq
Ę q dT.
Ftf upT qFtgupT
Sp pRq
We now define the G-transform. In itself, the definition has nothing to do
with symmetric matrices and could have been perfectly well defined on any
other space endowed with a Fourier transform.
Definition 1 (G-transform of a density). Let f be an integrable function
Sp pRq Ñ C. Its G-transform is the complex-valued function Gtf u : Sp pRq Ñ C
defined by
Gtf u “ Ftf 1{2 u2 ,
where z 1{2 stands for the principal branch of the complex logarithm.
(3.2)
Chételat and Wells/Mid-scale Wishart asymptotics
8
In the same way that the Fourier transform maps L2 pSp pRqq to itself, the
G-transform maps L1 pSp pRqq to itself.
By extension, for an absolutely continuous distribution on Sp pRq with density
f , we will define its G-transform to be the G-transform of its density. (This
usage mirrors other transforms, such as the Stietjes transform.) We will usually
denote the G-transform of f by ψ. Since a density is integrable, this is always
well-defined. Moreover, f “ F ´1 tψ 1{2 u2 , so the density can be recovered from
the G-transform, and therefore to understand a distribution it is equivalent to
study its density or its G-transform.
Two comments are in order. First, for many densities, f 1{2 P L1 pSp pRqq. In
this case, the G-transform can be written explicitly as
ż
ˆ
˙2
1
´i trpT Xq 1{2
(3.3)
e
f pXq dX .
ψpT q “ Gtf upT q “
ppp`1q
2p π 2
Sp pRq
Second, throughout this article we will often talk about “the” square root of a
G-transform. To be clear, by ψ 1{2 we will always mean Ftf 1{2 u.
Now, in many ways, the G-transform behaves similarly to the characteristic
function (Fourier transform of a density), but it has unique features. First,
Plancherel’s theorem yields that
ż
ż
|ψ 1{2 pT q|2 dT
|ψpT q| dT “
Sp pRq
żS pRq
p
ż
|f 1{2 pXq|2 dX “
“
Sp pRq
|f pXq| dX “ 1.
(3.4)
Sp pRq
Thus |ψ| is itself a density, which we will call the G-conjugate of f . (In particular, ψ 1{2 is much like a quantum-mechanical wavefunction.) We will also
use an asterisk notation, so that the G-conjugate of a Np0, 1q distribution
will be denoted Np0, 1q˚ . For example, straightforward computations yield that
2
2
?1
Np0, 1q˚ “ Np0, 1{8q, χ2˚
n “ 8n tn{2 (where χν and tν are the univariate χ and
˚
´1 ˚
t distributions with ν degrees of freedom, respectively) and paF ` bq “ a F
for any distribution F and scalars a “ 0, b P R. Studying the G-conjugate of the
Wishart distribution will play a key part in deriving results about the Wishart
distribution itself. We should note that, in general, the double G-conjugate F ˚˚
is not the same as F . For example, χ2˚˚
is a density involving modified Bessel
n
functions of the first kind, not a χ2n .
A second feature that distinguishes G-transforms from characteristic functions is that they are easy to relate to the Hellinger distance between probability
measures. Consider two densities f1 , f2 with G-transforms ψ1 , ψ2 . By analogy,
we could define the “total variation” and “Hellinger” distances of ψ1 and ψ2
by
ż
dTV pψ1 , ψ2 q “
|ψ1 pT q ´ ψ2 pT q| dT,
Sp pRq
(3.5)
Chételat and Wells/Mid-scale Wishart asymptotics
ż
´
and
1{2
1{2
|ψ1 pT q ´ ψ2 pT q|2 dT
Hpψ1 , ψ2 q “
¯ 12
.
9
(3.6)
Sp pRq
Since the modulus of the G-transforms integrate to one, their total variation and
Hellinger distances are related to each other in the same way as in Equation 2.1
for densities, namely
1
1{2
dTV pψ1 , ψ2 q ď Hpψ1 , ψ2 q ď dTV pψ1 , ψ2 q.
(3.7)
2
Thus dTV pψ1 , ψ2 q Ñ 0 if and only if Hpψ1 , ψ2 q Ñ 0. But the Hellinger distance
between G-transforms is much more useful. Indeed, by the Plancherel theorem,
for any two densities f1 , f2 with G-transforms ψ1 , ψ2 , their Hellinger distance
satisfies
ż
H2 pf1 , f2 q “
1{2
1{2
|f1 pXq ´ f2 pXq|2 dX
żS pRq
p
“
1{2
1{2
|ψ1 pT q ´ ψ2 pT q|2 dT “ H2 pψ1 , ψ2 q.
(3.8)
Sp pRq
Thus to compute the Hellinger distance H2 pf1 , f2 q between two densities, we
can instead compute the Hellinger distance H2 pψ1 , ψ2 q of their G-transforms.
In contrast, there is no explicit way to express the Hellinger distance in terms
of characteristic functions. And no such connection exists between the total
variation distances of densities and G-transforms.
The G-transform does have some disadvantages compared to the Fourier
transform. It is a non-linear transformation (and therefore not a true transform),
and it does not behave well with respect to convolution. For our purposes,
however, the advantages listed above outweigh these problems.
In practice, it is not aways easy to control the Hellinger distance directly, and
one often focuses on the Kullback-Leibler divergence instead. The two quantities
are related through the well known inequality
„
f1 pXq
for X „ f1 .
H2 pf1 , f2 q ď E log
f2 pXq
For G-transforms, the following analog holds, which clarifies our interest in Gconjugates:
ˇ2
„
„ˇ
ˇ
ψ1 pT q
ψ1 pT q ˇˇ
H2 pψ1 , ψ2 q ď E < Log
` 2E ˇˇ= Log
for T „ F1˚ ,
ψ2 pT q
ψ2 pT q ˇ
where Log stands for the principal branch of the complex logarithm. In fact, in
this article we will need a further generalization, where ψ2 does not need to be
a G-transform of a density.
Proposition 1 (Kullback-Leibler inequality for G-transforms). Let ψ1 be the
G-transform of an absolutely continuous distribution F1 on Sp pRq, and let ψ2
Chételat and Wells/Mid-scale Wishart asymptotics
10
be an integrable function Sp pRq Ñ C. Then
ż
„
„
ψ1 pT q
H2 pψ1 , ψ2 q ď
|ψ2 |pT q dT ´ 1 ` E < Log
ψ2 pT q
Sp pRq
ż
ˇ 1
„ˇ
ˇ
1
ψ1 pT q ˇˇ 2
ˇ
2
`2
|ψ2 |pT q dT ¨ E ˇ= Log
ψ2 pT q ˇ
Sp pRq
for T „ F1˚ , where Log stands for the principal branch of the complex logarithm.
Proof. We can write
ż
1{2
H2 pψ1 , ψ2 q “
Sp pRq
„
1{2 1{2
´ ψ1 ψs2 dT
ż
ż
«
|ψ2 |pT q| ´ 1 ` 2 ´
“
1{2
|ψ1 |pT q ` |ψ2 |pT q| ´ ψs1 ψ2
1{2
ψ1 pT q
Sp pRq
1{2
1{2
ψ2 pT q
`
ψ̄2 pT q
1{2
ψ̄1 pT q
ff
|ψ1 |pT q dT
Sp pRq
ż
„
ż
„
|ψ2 |pT q| ´ 1 ` 2 1 ´
#
“
żS pRq
żS pRq
p
„
<
p
1{2
ψ2 pT q
1{2
ψ1 pT q
+
|ψ1 |pT q dT
„
|ψ2 |pT q| ´ 1 ` 2 1 ´
"
*
1
ψ1 pT q
exp ´ < Log
2
ψ2 pT q
Sp pRq
Sp pRq
“
˙
ψ1 pT q
1
= Log
|ψ1 |pT q dT .
2
ψ2 pT q
a
Now using the inequality ´ cospxq ď ´1 ` 2|x| that holds for any x P R. The
last quantity is bounded as
ˆ
¨ cos
ż
„
ż
„
|ψ2 |pT q| ´ 1 ` 2 1 ´
"
*
1
ψ1 pT q
exp ´ < Log
|ψ1 |pT q dT
2
ψ2 pT q
Sp pRq
Sp pRq
ď
ż
`2
ˇ
"
*dˇ
ˇ
1
ψ1 pT q
ψ1 pT q ˇˇ
ˇ
exp ´ < Log
ˇ= Log ψ2 pT q ˇ|ψ1 |pT q dT.
2
ψ2 pT q
Sp pRq
In the second term, use 1 ´ x ď ´ logpxq for x ě 0, while in the third term, use
the Cauchy-Schwarz inequality to obtain
ż
ż
„
ď
|ψ2 |pT q| ´ 1 ´ 2 log
"
*
ψ1 pT q
1
|ψ1 |pT q dT
exp ´ < Log
2
ψ2 pT q
Sp pRq
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
ż
`2
11
ż
"
*
1
ψ1 pT q
exp ´< Log
|ψ1 |pT q dT 2
ψ2 pT q
ˇ
1
ψ1 pT q ˇˇ
ˇ
ˇ= Log
ˇ|ψ1 |pT q dT 2 .
ψ2 pT q
Sp pRq
Sp pRq
Now use Jensen’s inequality in the second term and the algebraic identity
expt´< Log ψ1 pT q{ψ2 pT qu “ |ψ2 |pT q{|ψ1 |pT q in the third term to obtain
ż
ż
„
ď
|ψ2 |pT q| ´ 1 `
< Log
Sp pRq
Sp pRq
ψ1 pT q
|ψ1 |pT q dT
ψ2 pT q
ż
ż
|ψ2 |pT q dT 2
ˇ
1
ψ1 pT q ˇˇ
ˇ
ˇ= Log
ˇ|ψ1 |pT q dT 2 ,
ψ2 pT q
Sp pRq
Sp pRq
1
`2
as desired.
Let us now compute the G-transform of the Gaussian Orthogonal Ensemble
and the normalized Wishart distribution, which will be needed in our proofs.
The density of a GOEppq matrix over Sp pRq is
! 1
)
1
fGOE pXq “ ppp`3q ppp`1q exp ´ tr X 2 .
(3.9)
4
2 4 π 4
To compute its G-transform, we will make use of the fact that the elements
of a GOEppq matrix are independent to reduce the expression to a product of
characteristic functions.
Proposition 2. The G-transform of the Gaussian Orthogonal Ensemble density
on Sp pRq is
pp3p`1q
!
)
2 4
ψGOE pT q “ ppp`1q exp ´ 4 tr T 2 .
π 4
?
1{2
Proof. From Equation (3.9), fGOE is proportional to the density of the 2 GOEppq
distribution, so it is integrable. Therefore, we can apply Equation (3.3) to find
that
ż
1
1{2
ψGOE pT q “
p
2
2 π
ppp`1q
4
!
)
1{2
exp ´ i trpT Xq fGOE pXq dX
żS pRq
p
1
“
2
ppp`7q
8
π
3ppp`1q
8
!
)
1
exp ´ i trpT Xq ´ tr X 2 dX
8
żS pRq
p
1
“
2
ppp`7q
8
π
3ppp`1q
8
p
p
!
ÿ
1ÿ 2
exp ´ 2i
Tkl Xkl ´
X
4 kăl kl
kăl
Rppp`1q{2
´i
p
ÿ
k“1
Tkk Xkk ´
p
p
1 ÿ 2 )ź
Xkk
dXkl
8 k“1
kďl
Chételat and Wells/Mid-scale Wishart asymptotics
12
ż
“
2
pp3p`1q
8
π
ppp`1q
8
p
ź
kăl
) exp ´ 1 X 2 (
? 4 kl dXkl
exp ´ 2iTkl Xkl
4π
!
R
ż
p
ź
) exp ´ 1 X 2 (
? 8 kk dXkk
exp ´ iTkk Xkk
8π
!
¨
k“1
“
2
pp3p`1q
8
π
ppp`1q
8
R
p
p
”
!
)ı
”
! ?
)ı ź
ź
E exp ´ 2iTkk Z
E exp ´ 8iTkl Z
kăl
k“1
for Z „ Np0, 1q. The characteristic function of a Np0, 1q is expp´t2 {2q, so
pp3p`1q
p
p
!
)ź
!
)
ź
2 8
2
2
“ ppp`1q
exp ´ 4Tkl
exp ´ 2Tkk
π 8 kăl
k“1
pp3p`1q
!
)
2 8
“ ppp`1q exp ´ 2 tr T 2 .
π 8
Squaring this result yields the desired expression for ψGOE .
In particular, we see that |ψGOE | is the density of a GOEppq{4 distribution,
or in other words that GOEppq˚ “ GOEppq{4. In particular the Gaussian orthogonal ensemble is its own G-conjugate, up to a constant factor.
Let us now compute the G-transform of the normalized Wishart distribution.
Unlike the GOEppq case, the elements of the matrix are not independent, but
the elements of its Cholesky decomposition are. By being careful about complex
changes of variables, we can reduce the computation of the G-transform to the
computation of characteristic functions of the Cholesky elements.
Proposition?3. Let n ě p´2. Then the G-transform of the normalized Wishart
distribution nrWp pn, Ip {nq ´ Ip s density on Sp pRq is given by
ˇ´ n`p`1
"
*ˇ
2
ˇ
ˇ
?
4T
ψNW pT q “ Cn,p exp 2i n tr T ˇˇIp ` i ? ˇˇ
n
with
˘
`
ppn`2pq
Γ2p n`p`1
2 2
4˘
`
Cn,p “ ppp`1q ppp`1q
.
Γp n2
π 2 n 4
Proof. Recall the notation m “ n ´ p ´ 1 used throughout this article. The
density of a Y „ Wp pn, Ip {nq distribution is
np
! n
) m
n 2 1rY ą 0s
` n ˘ exp ´ tr Y |Y | 2 .
fW pY q “
np
2
2 2 Γp 2
?
?
If we do a change of variables X “ npY ´ Ip q, so that Y “ Ip ` X{ n and
p
p
ź
ź
1
dYij “ ppp`1q
dXij ,
n 4 iďj
iďj
?
we see that the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s has den-
Chételat and Wells/Mid-scale Wishart asymptotics
13
sity
„
ppn`mq
n 4
X
`
˘
?
1
I
`
ą
0
np
p
n
2 2 Γp n2
fNW pXq “
! n ”
X ˇˇ m2
X ı)ˇˇ
¨ exp ´ tr Ip `?
ˇIp `? ˇ . (3.10)
2
n
n
` 4 ´1 ˘
p`1
n`p`1
1{2
Notice that fW is proportional to expt´ tr r n Ip s Y u|Y | 4 ´ 2 , so it
`
˘
must be proportional to the density of a matrix gamma distribution Gp n`p`1
, n4 Ip
4
ą p´1
when n`p`1
4
2 , i.e. n ě p ´ 2. In particular, it must be integrable. As fNW
1{2
was obtained by a linear change of variables from fW , fNW must be integrable
too, that is
ż
1{2
fNW pXqdX ă 8.
(3.11)
Sp pRq
Therefore, we can apply Equation (3.3) to obtain
ż
1
1{2
ψN W pT q “
“
p
22 π
1
p
22 π
ppp`1q
4
ppn´2q
4
1
ppp`1q
4
!
)
1{2
exp ´ i trpT Xq fNW pXq dX
Sp pRq
”
!
)
ı
´1{2
E exp ´ i trpT Xq fNW pXq
`n˘
„
"
*
n ”
X ı ˇˇ
X ˇˇ´ m4
?
?
E
exp
´
i
trpT
Xq
`
tr
I
`
`
.
ˇI
ˇ
p
p
ppp`1q
ppn`mq
4
n
n
π 4 n 8
?
If we rewrite the expectation in terms of Y “ Ip ` X{ n, this last expression
equals
1 ` ˘
ppn´2q
*
„ "´
`?
˘
?
2 4 Γp2 n2
n ¯
´m
4
.
(3.12)
“ ppp`1q ppn`mq exp i n tr T E etr ´i nT ` Ip Y |Y |
4
π 4 n 8
Since T is real symmetric, there must be a spectral decomposition T “ ODOt
with O real orthogonal and D real diagonal. As Ot Y O has the same distribution
as Y , namely Wp pn, Ip {nq, we can rewrite Equation (3.12) as
1 ` ˘
ppn´2q
„ "´
*
˘
`?
?
2 4 Γp2 n2
n ¯
´m
4
“ ppp`1q ppn`mq exp i n tr T E etr ´i nD ` Ip Y |Y |
.
(3.13)
4
π 4 n 8
Now, since Y is positive-definite it has a Cholesky decomposition Y “ U t U
with U upper-triangular. According to Bartlett’s theorem [see Muirhead, 1982,
Theorem 3.2.14], all the elements of U are independent, the diagonal elements
2
have the distribution Ukk
„ χ2n´k`1 {n and the upper diagonal elements have
Ukl „ Np0, 1{nq for k ă l. Since
„´
p ´
ÿ
?
?
Ip ¯
n ¯
1
tr
´ i nD `
Y “
´ i nD ` Ip
Ukl
Ulj
4
4
jk
j,k,l
“
2
Γp2
2
Chételat and Wells/Mid-scale Wishart asymptotics
p ´
ÿ
“
lďk
14
?
n¯ 2
´ i nDkk `
U
4 lk
śp
2
k“1 Ukk , we have by independence and Equation (3.13) that
#
+ p „
1 ` ˘
ppn´2q
*
"´
ź
?
?
2 4 Γp2 n2
n¯ 2
“ ppp`1q ppn`mq exp i n tr T
U
E exp
´ i nDkk `
4 lk
π 4 n 8
lăk
*
„
"´
p
ź
?
n¯ 2
2 ´m
E exp
´ i nDkk `
¨
Ukk pUkk
q 4 . (3.14)
4
k“1
and |Y | “
We will now compute these expected values in several steps. For a given 1 ď
k ď p, let
„
"´
*
?
n¯ 2
´m
A “ E exp
´ i nDkk `
(3.15)
Tkk Tkk 2 .
4
2
Since Tkk
„ χ2n´k`1 {n and m “ n ´ p ´ 1, we have
ż8 "
*
n´k`1
´
2
?
m
n
n¯
¯
exp
´ i nDkk `
x x´ 4
A “ n´k`1 ´
n´k`1
4
2 2 Γ
0
2
! n )
n´k`1
¨ x 2 ´1 exp ´ x dx
2
ż8 "
*
n´k`1
´
¯
n´2k`p`3
n 2
n ?
´1
4
¯
“ n´k`1 ´
dx
(3.16)
exp ´
` nDkk i x x
n´k`1
4
2
Γ
2
0
2
Consider the truncated integrands
" ´
¯ * n´2k`p`3
n ?
´1
4
hM pxq “ exp ´
` nDkk i x x
1r0 ă x ă M s .
4
Clearly this sequence is dominated by the integrable positive function h,
"
*
n´2k`p`3
n
´1
4
,
|hM pxq| ď hpxq “ exp ´ x x
4
ˆ ˙ n´2k`p`3
˙
ˆ
ż8
4
4
n ´ 2k ` p ` 3
hpxqdx “
ă 8.
Γ
n
4
0
Therefore, by the Dominated Convergence Theorem and Equation (3.16),
żM "
n´k`1
´n ?
¯ * n´2k`p`3
2
n
´1
4
¯ lim
A “ n´k`1 ´
exp ´
` nDkk i x x
dx.
M
Ñ8
n´k`1
4
2 2 Γ
0
2
`n ?
˘
By the change of variables z “ 4 ` nDkk i x, this can be rewritten
“
n
n´k`1
2
?
˘´ n´2k`p`3
4
nDkk i
4 `
´
¯
lim
n´k`1
M Ñ8
2 2 Γ n´k`1
2
`n
ż
nM
4
?
` nDkk M i
e´z z
n´2k`p`3
´1
4
dz.
(3.17)
0
To compute this integral, we use a contour argument. Consider the closed path
nM
C “ C1 ` C2 ` C3 given by C1 a path from 0 to nM
4 , C2 a path from 4 to
Chételat and Wells/Mid-scale Wishart asymptotics
y
nM
4
15
?
` nDkk M i
C3
C2
C1
0
nM
4
x
Fig 2. Contour C “ C1 ` C2 ` C3 when Dkk ě 0. The diagram is mirrored around the x axis
when Dkk ă 0.
?
?
` nDkk M i and finally C3 a path from nM
nDkk M i to 0. A diagram
4 `
is provided as Figure 2.
n´2k`p`3
´1
4
As k ď p, z ÞÑ e´z z
is entire and its integral over C must be zero.
Therefore
?
ˇ
ˇ
nM
ˇ
ˇ
4 ` nDkk M i
ˇ
˙ˇ
ˆ
ˇ
ˇ
n´2k`p`3
n
´
2k
`
p
`
3
´1
ˇ lim
ˇ
4
e´z z
dz ´ Γ
ˇM Ñ8
ˇ
4
ˇ
ˇ
ˇ
ˇ
0
?
ˇ
ˇ
nM
nM
ˇ
ˇ
4 ` nDkk M i
4
ˇ
ˇ
ˇ
ˇ
n´2k`p`3
n´2k`p`3
´1
´1
4
4
“ lim ˇˇ
e´z z
dz ´
e´x x
dxˇˇ
M Ñ8 ˇ
ˇ
ˇ 0
ˇ
0
?
ˇ
ˇ
ˇ
ˇ
nM
ˇ
ˇ
ˇ
ˇ
4 ` nDkk M i
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
n´2k`p`3
n´2k`p`3
´z
´z
´1
´1
ˇ
ˇ
ˇ
4
4
e z
“ lim ˇ
e z
dz ˇ “ lim ˇ
dz ˇˇ .
M Ñ8 ˇ
M
Ñ8
ˇ
ˇ
ˇ
ˇ C2
ˇ
ˇ nM
ˇ
4
nM
?
z´ 4
?
Do a change of variables z “ nM
4 ` y nDkk M i, so that y “ nDkk M i is real on
the path. It yields
ˇ
ˇ
1
ˇ
ˇ
ˇ
„
n´2k`p`3
´1 ˇ
4
?
ˇ
?
?
M ˇˇ
nM
“ n|Dkk | lim nM ˇ e´y nDkk M i
`y nDkk M i
dy ˇˇ
M Ñ8 e 4 ˇ
4
ˇ
ˇ 0
ˇ
nM
4
ż
ż
ż
ż
ż
ż
ż
ď
?
1
ˇ
ˇ n´2k`p`3
n´2k`p`3
´1
4
ˇn
ˇ
4
?
M
ˇ ` y nDkk iˇ
dy
¨
lim
.
nM
ˇ4
ˇ
M Ñ8
e 4
n|Dkk |
0
This last integral is finite, since it is continuous on a bounded interval. Therefore
Chételat and Wells/Mid-scale Wishart asymptotics
the limit is zero and by Equation (3.17) and the previous expression,
´
¯
n´k`1
´n ?
¯´ n´2k`p`3
n 2 Γ n´2k`p`3
4
4
´
¯
A “
.
` nDkk i
n´k`1
n´k`1
4
2 2 Γ
2
16
(3.18)
Going back to (3.14), let us now consider the expectations in the second
products. For fixed 1 ď l ă k ď p, let
„
"´
*
?
n¯ 2
´ i nDkk `
B “ E exp
T
.
(3.19)
4 lk
2
Since Tlk
„ χ21 {n,
ż8
c
B “
"´
n
2π
exp
* n
?
n ¯ e´ 2 x
´ i nDkk `
x ? dx
4
x
0
ż8
c
“
" ´
¯ * 1
?
n
exp ´
` i nDkk x ? dx.
4
x
n
2π
(3.20)
0
Consider the truncated integrands
" ´
¯ * 1 „ 1
?
n
` i nDkk x ? 1
ăxăM .
(3.21)
hM pxq “ exp ´
4
x M
We see that they are dominated by a positive, integrable function hpxq,
c
ż8
n
e´ 4 x
π
|hM pxq| ď hpxq “ ? ,
ă 8.
hpxqdx “ 2
x
n
0
Therefore, by the Dominated Convergence Theorem and Equation (3.20), we
conclude that
M
c
" ´
¯ * 1
?
n
n
B “
lim
exp ´
` i nDkk x ? dx.
2π M Ñ8
4
x
1{M
`
˘
?
A complex change of variables z “ n4 ` i nDkk x yields
ż
ż
c
“
¯´ 12
?
n ´n
` i nDkk
lim
M Ñ8
2π 4
nM
4
?
` nDkk M i
?
e´z { z dz.
?
nDkk
n
4M `
M
(3.22)
i
Let’s compute this integral again using a contour integration argument. Consider
n
the contour C “ C1 ` C2 ` C3 ` C4 given by C1 a line from 4M
to nM
2 a line
4 , C?
?
?
nM
nM
nM
n
kk
from 4 to 4 ` nDkk M i, C3 a line from 4 ` nDkk M i to 4M ` nD
i
M
?
nD
n
n
kk
and C4 a line from?4M ` M i to 4M . A diagram is provided as Figure 3.
Since z ÞÑ e´z { z is holomorphic away from zero,
?
?
ˇ
ˇ
ˇ
ˇ
nM
nM
nM
ˇ
ˇ
ˇ
ˇ
4 ` nDkk M i
4 ` nDkk M i
4
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
?
?
?
?
´z
´z
´x
ˇ lim
ˇ “ lim ˇ
ˇ
e
{
z
dz
´
π
e
{
z
dz
´
e
{
x
dx
ˇM Ñ8
ˇ M Ñ8 ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
?
?
nDkk
nDkk
ˇ
ˇ
ˇ
ˇ
n
n
n
`
i
`
i
ż
4M
ż
ż
M
4M
M
4M
Chételat and Wells/Mid-scale Wishart asymptotics
y
nM
4
17
?
` nDkk M i
C3
n `
4M
?
nDkk
M
C2
i
C4
0
n
4M
C1
nM
4
x
Fig 3. Contour C “ C1 ` C2 ` C3 ` C4 when Dkk ě 0. The diagram is mirrored around the
x axis when Dkk ă 0.
ˇ
ˇ
ˇ
ˇ
“ lim ˇ
M Ñ8 ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ď lim ˇˇ
M Ñ8 ˇ
ˇ
ż
ż
ˇ
ˇ
ˇ
?
?
ˇ
e´z { z dz `
e´z { z dz ˇ
ˇ
ˇ
C2
C4
?
ˇ
ˇ
ˇ
nM
n
ˇ ˇ
ˇ
4 ` nDkk M i
4M
ˇ ˇ
ˇ
ˇ
ˇ
ˇ
?
?
e´z { z dz ˇˇ ` ˇˇ
e´z { z dz ˇˇ .
ˇ ˇ
ˇ
ˇ ˇ n ` ?nDkk i ˇ
nM
4
4M
M
?
?
nDkk
n
By changes of variables z “ nM
i on the
4 ` y nDkk M i and z “ 4M ` y M
two respective integrals, we get
ˇ 1
ˇ
ˇ
ˇ
?
ˇ
ˇ
nD
M
i
y
kk
?
M ˇ
e
ˇ
“ n|Dkk | lim nM ˇ
1 dy ˇ
ı
”
M Ñ8 e 4 ˇ
ˇ
?
2
ˇ 0 nM
ˇ
4 ` y nDkk M i
ˇ 1
ˇ
?
ˇ
ˇ
nDkk
ˇ
ˇ
i
y
?
1 ˇ
e M
ˇ
` n|Dkk | lim
dy
ˇ
ˇ
n
1
”
ı
?
M Ñ8 M e 4M ˇ
ˇ
2
n
kk
ˇ 0 4M
ˇ
` y nD
i
M
ż
ż
ż
ż
ż1
ď
?
n|Dkk |
0
?
1
M
dy
¨
lim
nM
ˇ
ˇ 12
M
Ñ8
?
ˇn
ˇ
e 4
ˇ 4 ` y nDkk iˇ
ż1
1
1
?
n .
ˇ
ˇ 12 dy ¨ Mlim
Ñ8
?
M e 4M
ˇn
ˇ
0 ˇ 4 ` y nDkk iˇ
1
ˇ
ˇ
´ 2
¯´ 14
?
ˇ
ˇ´ 2
2
“ n16 ` y 2 nDkk
is continuous on r0, 1s, a bounded
Since ˇ n4 ` y nDkk iˇ
interval, we conclude that the integrals are finite and that the limits are zero.
`
?
n|Dkk |
Chételat and Wells/Mid-scale Wishart asymptotics
Therefore, by Equation (3.22),
c ´
¯´ 12
?
n n
B “
` i nDkk
.
2 4
18
(3.23)
Recall the definitions of A and B at Equations (3.15) and (3.19). Combining
1{2
both Equations (3.18) and (3.23) into the expression for ψNW at Equation (3.14)
provides
1 ` ˘
ppn´2q
"
*ź
p c ´
¯´ 12
?
?
2 4 Γp2 n2
n n
1{2
ψNW pT q “ ppp`1q ppn`mq exp i n tr T
` i nDkk
2 4
π 4 n 8
lăk
¯
´
n´k`1
p n 2
¯´ n´2k`p`3
´n ?
Γ n´2k`p`3
ź
4
4
´
¯
¨
nD
i
`
kk
n´k`1
n´k`1
4
Γ
k“1 2 2
2
´
¯
1 ` ˘
ppn´2q
"
*
n´k`1
k´1
p Γ n´2k`p`3
p
n
2
`
ź
ź
4
2
?
2
Γp 2
4
n 2
`
˘
“ ppp`1q ppn`mq
exp
i
n
tr
T
n´k`1
` k´1
Γ n´k`1
2
2
π 4 n 8
2
k“1
k“1 2
p ´
n´2k`p`3
¯
ź
´
´ k´1
n ?
4
2
´ nDkk i
¨
4
k“1
´
¯
n´2k`p`3
ˇ n`p`1
"
*ˇ
pp2n`p`1q
p
Γ
ź
ˇn
8
?
? ˇ´ 4
4
n
` n´k`1 ˘ exp i n tr T ˇˇ Ip ` i nT ˇˇ
“ ppn`2q ppp`1q
.
4
2 4 π 4 k“1 Γ
2
But by Muirhead [1982, Theorem 2.1.12],
p
`
˘
´
¯
ppp´1q ś
˘
`
π 4
Γ n`p`1
` 1´k
p Γ n´2k`p`3
4
2
ź
Γp n`p`1
4
k“1
4
` ˘ ,
`
˘ “
p
˘ “ Γp n
`
ppp´1q ś
Γ n´k`1
2
2
k“1
π 4
Γ n2 ` 1´k
2
k“1
so by taking a n{4 factor out of the determinant, we find that
`
˘
ˇ´ n`p`1
"
*ˇ
ppn`2pq
4
ˇ
?
Γp n`p`1
2 4
4T ˇˇ
1{2
4
ˇ
?
ψNW pT q “ ppp`1q ppp`1q
exp
i
n
tr
T
I
`
i
.
`
˘
p
ˇ
1{2
nˇ
Γp n2
π 4 n 8
Squaring this result yields the desired expression for ψNW .
By Proposition 3, when n ě p ´ 2 the G-conjugate of a normalized Wishart
distribution must have a density on Sp pRq given by
`
˘ˇ
ˇ´ n`p`1
ppn`2pq
4
ˇ
Γ2p n`p`1
2 2
16T 2 ˇˇ
4
` n ˘ ˇˇIp `
|ψNW |pT q “ ppp`1q ppp`1q
.
(3.24)
ˇ
n
Γp 2
π 2 n 4
As mentioned in the paragraph following Equation (3.4), the G-conjugate of
a χ2n {n distribution is a scaled tn{2 . Thus, by analogy, Equation (3.24) should
be represent some kind of generalization of the t distribution to the real symmetric matrices. Matrix-variate generalizations of the t distribution have been
investigated in the past, but not for symmetric matrices. Hence it appears the
concept is new.
Chételat and Wells/Mid-scale Wishart asymptotics
19
This motivates us to propose in Section 4 a candidate for a symmetric matrix
variate t distribution. Using that definition, the G-conjugate to the normalized
Wishart could then be regarded as the t distribution with n{2 degrees of freedom
and scale matrix Ip {8, which we denote Tn{2 pIp {8q. But regardless of its name,
this distribution will play a key role in our results about the middle-scale regime
asymptotics of Wishart matrices, and will be investigated in depth in Section
4.
4. The symmetric matrix variate t distribution
In Section 3, Equation (3.24), we proved ?
that when n ě p ´ 2, the G-conjugate
of the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s has density on
Sp pRq given by
`
˘ˇ
ˇ n`p`1
ppn`2pq
2 ˇ´ 4
ˇ
Γ2p n`p`1
16T
2 2
4
ˇ
` ˘ ˇˇIp `
|ψNW |pT q “ ppp`1q ppp`1q
.
(4.1)
n ˇ
Γp n2
π 2 n 4
Two remarks are in order. First, we are unaware of any matrix calculus tools
that could let us integrate this expression directly. Thus, the mere fact that
this expression integrates to unity, a consequence of being the G-conjugate of
another distribution, seems remarkable.?
Second, when p “ 1, this is the tn{2 { 8 distribution. Thus, as we mentioned
while discussing Equation (3.24), it is natural to interpret this distribution as the
parametrization of some generalization of the t distribution to Sp pRq, the space
of real-valued symmetric matrices. The purpose of this section is to propose
a candidate definition for such generalization, as well as prove several results
concerning the normalized Wishart G-conjugate.
To the best of our knowledge, no extension of the t distribution to symmetric
matrices has ever been proposed. However, a non-symmetric matrix variate t
distribution has been thoroughly investigated in the literature – see Gupta and
Nagar [1999, Chapter 4] for a thorough summary. Several definitions exist. For
our purposes, we say that a p ˆ q real-valued random matrix T has the matrix
variate t distribution with ν degrees of freedom and q ˆ q positive-definite scale
matrix Ω if it has density
¯
´
ˇ
ˇ´ ν`p`q´1
Γp ν`p`q´1
2
pˇ
2
T Ω´1 T t ˇˇ
´
ˇ
2
´
¯
|Ω|
I
`
.
p
ˇ
ˇ
pq
pq
ν
ν 2 π 2 Γ ν`p´1
p
2
It is not exactly clear what should be the proper analog of this distribution
for symmetric matrices. But it would be elegant if the degrees of freedom of
Equation (4.1) were to be exactly n{2, as in the univariate case. Thus, the
following definition seems natural.
Definition 2 (Symmetric matrix variate t distribution). We say a real symmetric p ˆ p matrix T has the symmetric matrix variate t distribution with
ν ě p{2 ´ 1 degrees of freedom and p ˆ p positive-definite scale matrix Ω,
Chételat and Wells/Mid-scale Wishart asymptotics
20
denoted Tν pΩq, if it has density
ˇ´ ν`pp`1q{2
ˇ
2
ˇ
T Ω´1 T ˇˇ
ˇ
.
fTn pΩq pT q 9 ˇIp `
ˇ
ν
With this definition, the G-conjugate to the normalized Wishart distribution,
whose density is given by Equation (4.1), is the Tn{2 pIp {8q distribution on Sp pRq.
In fact, since Equation (4.1) integrates to one, we can deduce the normalization constant of Definition 2. For an arbitrary degrees of freedom parameter ν,
imagine the density |ψNW | of the G-conjugate of a normalized Wishart distribution with n “ 2ν ě p ´ 2. By virtue of being a G-conjugate,
it must integrate to
1 ?
1
unity. Then from the change of variables T “ Ω´ 4 SΩ´ 4 { 8 which has Jacobian
ppp`1q
p`1
dT “ 8´ 4 |Ω|´ 4 dS, we see that
ż
1“
ż
|ψNW |pT q dT “
Sp pRq
2ppν´1q Γ2p
“
π
ppp`1q
2
ν
´
1
2
3ppp`1q
4
ν`pp`1q{2
2
ppp`1q
4
|Ω|
p`1
4
ˆ ´1
1 ˙
Ω 4 SΩ´ 4
?
dS
|ψNW |
8
Sp pRq
ż
¯
|Ω|
´ p`1
4
Γp pνq
ˇ
ˇ ν`pp`1q{2
´1 ˇ´
2
ˇ
ˇIp ` SΩ S ˇ
dS.
ˇ
ˇ
ν
Sp pRq
Thus we must have
fTn pΩq pT q “
2ppν´1q Γ2p
´
ν`pp`1q{2
2
¯
ˇ
ˇ´ ν`pp`1q{2
2
ˇ
T Ω´1 T ˇˇ
I
`
.
p
ˇ
ˇ
ν
´ p`1
4 ˇ
|Ω|
(4.2)
ppp`1q
ppp`1q
π 2 ν 4 Γp pνq
It would be interesting to see if this distribution satisfies the properties we would
expect of a t distribution, to ensure our guess is the “correct” one. However, this
would take us too far away from the topic of this article. Instead, we will focus
in the rest of this section on proving results about Tn{2 pIp {8q, the G-conjugate
to the normalized Wishart distribution.
Our first result will concern the asymptotic expansion of its normalization
constant. We mention that this constant is the same as the Cn,p term appearing
in the expression of the G-transform of the normalized Wishart in Proposition
3.
Lemma 1. The normalization constant of the Tn{2 pIp {8q distribution
`
˘
ppn`2pq
Γ2p n`p`1
2 2
4˘
`
Cn,p “ ppp`1q ppp`1q
Γp n2
π 2 n 4
has, for every K P N, the asymptotic expansion
" K`1
pp3p`1q
2 4
1 ÿ 1rk evens pk`2
Cn,p “ ppp`1q exp ´
2 k“1 kpk`1qpk`2q nk
π 4
(4.3)
K`1
´ pK`3 ¯*
1 ÿ 1`21rk evens pk`1
´
` o K`1 .
4 k“1
kpk`1q
nk
n
as n Ñ 8 with p{n Ñ 0.
Chételat and Wells/Mid-scale Wishart asymptotics
21
Proof. By Stirling’s approximation applied to log Γ, as well as Muirhead [1982,
Theorem 2.1.12], we find that
˙
ˆ
p
ÿ
ppp ´ 1q
i´1
log Γp pxq “
log π `
log Γ x ´
4
2
i“1
„ˆ
˙
ˆ
˙
p
ÿ
ppp ´ 1q
i´1 1
i´1
“
log π `
x´
´
log x ´
4
2
2
2
i“1
˙
ˆ ˙
ˆ
1
1
i´1
` log 2π ` O
´ x´
2
2
x
ppp ` 1q
p
ppp ´ 1q
“
log π ` log 2 ´ px `
4
2
4
˙
ˆ
˙
p ˆ
´p¯
ÿ
i
i´1
`
log x ´
`O
x´
2
2
x
i“1
as x Ñ 8. Thus
˙
ˆ
´ n ¯ ppp ` 1q
p
n`p`1
´ log Γp
“
log π ` log 2
2 log Γp
4
2
4
2
ˆ
˙
ˆ
˙
p
ppp ` 3q ÿ n`p`1
n`p`1 i´1
´
`
´ i log
´
4
2
4
2
i“1
˙
ˆ
˙
ˆ
p
ÿ n
i
n i´1
´
log
´
` op1q
´
2
2
2
2
i“1
“
ppp ` 1q
pp2n ` p ´ 1q
ppp ` 1q
ppp ` 3q
log π ´
log 2 `
log n ´
4
4
4
4
ˆ
˙
p
¯
1 ÿ´
2i´p´3
`
n ´ r2i´p´1s log 1 ´
2 i“1
n
ˆ
˙
p
i´1
1ÿ
pn ´ iq log 1 ´
` op1q,
´
2 i“1
n
as n Ñ 8 with p{n Ñ 0, and so by Equation (4.3),
pp3p ` 1q
ppp ` 1q
ppp ` 3q
log Cn,p “
log 2 ´
log π ´
4
4
4
˙
p
¯ ˆ
1 ÿ´
2i´p´3
`
n ´ r2i´p´1s log 1 ´
2 i“1
n
ˆ
˙
p
1ÿ
i´1
´
pn ´ iq log 1 ´
` op1q.
(4.4)
2 i“1
n
Let us now focus on the two sums in this expression. Recall that for any k ě 1,
x2
x3
xk
´ logp1 ´ xq “ x `
`
` ¨¨¨ `
` Opxk`1 q as x Ñ 0,
(4.5)
2
3
k
even for negative x. Therefore,
ˆ
˙
p
1ÿ
i´1
´
pn ´ iq log 1 ´
2 i“1
n
Chételat and Wells/Mid-scale Wishart asymptotics
22
ˆ K`4 ˙
p
p
K`2
K`1
1 ÿ ÿ pi´1qk
1 ÿ ÿ pi´1qk
p
´
`
O
n
i
2 i“1 k“1 k nk
2 i“1 k“1 k nk
nK`2
ˆ K`3 ˙
˙
p
p K`1 ˆ
p
p
1ÿ
1 ÿ ÿ i´1
i pi´1qk
`O
“
pi´1q `
´
k
K`1
2 i“1
2 i“1 k“1 k´1 k
n
n
n
ˆ
˙
˙
ˆ
p
K`1
pK`3
ppp ´ 1q 1 ÿ ÿ
1 pi´1qk
i´1
`o
“
´
`
k
4
2 i“1 k“1 kpk`1q k
n
nK`1
ˆ K`3 ˙
p´1
p´1
K`1
K`1
ÿ
ppp ´ 1q 1 ÿ
1
1 ÿ 1 ÿ k
p
k`1
“
´
i
i
.
´
`
o
k
k
4
2 k“1 kpk`1qn i“1
2 k“1 k n i“1
nK`1
“
Now let Bk denote the Bernoulli numbers, with the convention B1 “ 12 . Faulhaber’s formula provides
K`1
k`2
ppp ´ 1q 1 ÿ
1
1 ÿ
“
´
¨
Bk`2´l pp´1ql
4
2 k“1 kpk`1qnk k`2 l“1
ˆ K`3 ˙
K`1
k`1
1 ÿ
p
1 ÿ 1
l
¨
Bk`1´l pp´1q ` o
.
´
2 k“1 k nk k`1 l“1
nK`1
But by the binomial theorem,
pk`1
n
` op1q and
pp´1ql
“ op1q
nk
K`1
ÿ „ˆ
pp´1qk`2
nk
“
pk`2
nk
k`1
´ pk ` 2q pnk ` op1q,
pp´1qk`1
nk
“
for any 1 ď l ď k. Thus
˙
k`2
B0
pk`2 ´ pk`2qpk`1
ppp ´ 1q 1
´
“
4
2 k“1
k`2 kpk`1qpk`2q
nk
ˆ
˙
k`2
B1
pk`1
`
` op1q
k`1 kpk`1qpk`2q nk
˙
ˆ K`3 ˙
K`1 „ˆ
1 ÿ
k`1
B0 pk`1
p
` op1q ` o
.
´
2 k“1
k`1 kpk`1q nk
nK`1
Using that B0 “ 1 and B1 “ 12 , we obtain
“
K`1
ppp ´ 1q 1 ÿ
1
pk`2
´
4
2 k“1 kpk`1qpk`2q nk
ˆ K`3 ˙
K`1
1 ÿ
1
pk`1
p
´
`o
.
4 k“1 kpk`1q nk
nK`1
(4.6)
The analysis of the other sum of Equation (4.4) is similar but more involved,
as we must distinguish the cases where p is even and where p is odd. We find,
from Equation (4.5) again, that
˙
p
¯ ˆ
1 ÿ´
2i´p´3
n ´ r2i´p´1s log 1 ´
2 i“1
n
ˆ
˙
ˆ
˙
p
p
1ÿ
1ÿ
2i´p´3
2i´p´3
“´
`
p2i´p´1q log 1 ´
n log 1 ´
2 i“1
n
2 i“1
n
Chételat and Wells/Mid-scale Wishart asymptotics
23
ˆ K`4 ˙
p
p K`2
K`1
ÿ p2i´p´3qk
1ÿ
1 ÿ ÿ p2i´p´3qk
p
´
`
O
p2i´p´1q
n
k
k
K`2
2 i“1
k
n
2
k
n
n
i“1 k“1
k“1
˙
p
p K`1ˆ
1ÿ
1 ÿ ÿ 2i´p´1 2i´p´3 p2i´p´3qk
“
p2i´p´3q `
´
2 i“1
2 k“1 k“1
k
k`1
nk
ˆ K`3 ˙
p
p
`O
K`1
n
n
ˆ K`3 ˙
ˆ
˙
p K`1
k
ÿ
ÿ
p
2i´p´3 2 p2i´p´3q
1
`o
`
“p`
2 i“1 k“1 kpk`1q
k
nk
nK`1
“
“p`
p
K`1
ÿ
1 ÿ
1
p2i´p´3qk`1
2 k“1 kpk`1qnk i“1
ˆ K`3 ˙
p
1 ÿ
p
k
`
p2i´p´3q ` o
k
K`1
kn
n
i“1
k“1
„
p
ÿ
k`1
k`1
k`1
p´p´1q
`
p´p`1q
`
p2i´p´3q
k
K`1
ÿ
K`1
1 ÿ
1
2 k“1 kpk`1qn
i“3
ˆ K`3 ˙
p
K`1
ÿ 1 „
ÿ
p
k
k
k
`
p´p´1q ` p´p`1q ` p2i´p´3q ` o
.
k
kn
nK`1
i“3
k“1
“p`
(4.7)
At this point, it is simpler to analyze the cases where p is even and odd separately. If p is odd, define q “ pp´3q{2 and observe that by Faulhaber’s formula,
p
q
”
ıÿ
ÿ
p2i´p´3ql “ 1`p´1ql
p2iql
i“3
i“1
“
1rl evens
l`1
By the binomial theorem,
op1q and
p2qql
“
nk
k`1
p´p´1q
nk
l`1
ÿ
ˆ
s“1
p2qqk`2
nk
“
˙
l`1
Bl`1´s 2l`1´s p2qqs .
s
pk`2
nk
k`1
´ 3pk`2q pnk ` op1q,
p2qqk`1
nk
“
pk`1
nk
`
op1q for 1 ď l ď k. Moreover,
“
p´p`1qk`1
p´pqk`1
“
` op1q
k
n
nk
(4.8)
and
p´p´1qk
p´p`1qk
“
“ op1q.
(4.9)
nk
nk
Thus, for odd p, Equation 4.7 equals
„
ˆ
˙
K`1
1 ÿ
1
k`2 B0 pk`2 ´ 3pk`2qpk`1
“p`
` 1rk odds
2 k“1 kpk`1q
k`2 k`2
nk
ˆ
˙
k`2 2B1 pk`1
p´pqk`1
` 1rk odds
`2
` op1q
nk
k`1 k`2 nk
Chételat and Wells/Mid-scale Wishart asymptotics
`
24
ˆ K`3 ˙
ˆ
˙
K`1 „
1 ÿ 1
p
k`1 B0 pk`1
`
op1q
`
o
1rk evens
.
2 k“1 k
k`1 k`1 nk
nK`1
Moreover,
2p´pqk`1 ´ 31rk odds pk`1 ` 1rk odds pk`1 ` 1rk evens pk`1
“ ´1rk evens pk`1 .
Thus,
ˆ K`3 ˙
K`1
K`1
p
1 ÿ 1rk odds pk`2 1 ÿ 1rk evens pk`1
´
`o K`1 .
“p`
2 k“1 kpk`1qpk`2q nk
2 k“1 kpk`1q nk
n
(4.10)
When p is even, let q “ pp ´ 2q{2 and observe that by Faulhaber’s formula,
ˆÿ
˙
p
q
2q
q
”
ıÿ
ÿ
ÿ
l
l
l
l
l
p2i´p´3q “ 1`p´1q
p2i ´ 1q “ 21rl evens
i ´
p2iq
i“3
i“1
“
1rl evens
l`1
But by the binomial theorem,
p2qql
nk
pk`1
nk
l`1
ÿ
s“1
ˆ
i“1
i“1
˙
l`1
Bl`1´s p2 ´ 2l`1´s q p2qqs .
s
p2qqk`2
nk
“
pk`2
nk
k`1
´ 2pk `2q pnk ` op1q,
p2qqk`1
nk
“
` op1q and
“ op1q for 1 ď l ď k. If we apply Equations (4.8)–(4.9),
then Equation (4.7) becomes
„
ˆ
˙
K`1
1
k`2 p2 ´ 1qB0 pk`2 ´ 2pk ` 2qpk`1
1 ÿ
1rk odds
“p`
2 k“1 kpk`1q
k`2
k`2
nk
ˆ
˙
k`2 p2 ´ 2qB1 pk`1
` 1rk odds
`
op1q
k`1
k`2
nk
„
ˆ
˙
ˆ K`3 ˙
K
k`1 p2 ´ 1qB0 pk`1
p
1 ÿ 1
1rk evens
` op1q `o K`1 .
`
k
2 k“1 k
k`1
k`1
n
n
Moreover,
2p´pqk`1 ´ 21rk odds pk`1 ` 1rk evens pk`1 “ ´1rk evens pk`1 .
Thus again,
“p`
ˆ K`3 ˙
K`1
K`1
1 ÿ 1rk odds pk`2 1 ÿ 1rk evens pk`1
p
´
`o
.
k
k
2 k“1 kpk`1qpk`2q n
2 k“1 kpk`1q n
nK`1
(4.11)
which is the exact same result as in the odd p case (see Equation 4.10). Plugging
Equations (4.6) and (4.10)–(4.11) in Equation (4.4), we obtain
K`1
ppp ` 1q
1 ÿ
pp3p ` 1q
1rk evens pk`2
log 2 ´
log π ´
log Cn,p “
4
2
2 k“1 kpk`1qpk`2q nk
ˆ K`3 ˙
K`1
1 ÿ 1 ` 21rk evens pk`1
p
´
`o K`1 ,
4 k“1
kpk`1q
nk
n
as desired.
Chételat and Wells/Mid-scale Wishart asymptotics
25
Thus the constant Cn,p is closely related to the normalization constant of the
GOEppq distribution 2pp3p`1q{4 {π ppp`1q{2 .
We now turn our attention to the study of the asymptotic moments of a
Tn{2 pIp {8q distribution. We first remind the reader of some classic results. For a
Gaussian Orthogonal Ensemble matrix Z „ GOEppq, a moment-based approach
to Wigner’s theorem states that for any k P N, its k th moment satisfy
„
1 ´ Z ¯k
“ Ck{2 1rk evens ,
lim E tr ?
pÑ8
p
p
`2k˘
1
where Ck “ k`1
is the k th Catalan number. In fact, Anderson et al.
k
[2010, section
2.1.4 on‰ p.17] show that the variance of the k th moment satisfies
“1
?
lim Var p trpZ{ pqk “ 0, so we really have
pÑ8
1 ´ Z ¯k L2
tr ?
ÝÑ Ck{2 1rk evens
p
p
as p Ñ 8.
“ Now,‰ what do we know about the moments of Tn{2 pIp {8q? By symmetry,
E tr T k “ 0 for odd k, but it is much less clear what happens for even k. It
turns out that in many ways, if T „ Tn{2 pIp {8q then 4T „ Tn{2 p2Ip q mimics the
Gaussian Orthogonal Ensemble results outlined above, especially when p{n Ñ 0
as n Ñ 8. We have the following result.
Theorem 2. Let k P N and T „ T“n{2 pIp {8q.
‰ If p{n Ñ c P r0,“1q, the‰moments of
T satisfy the asymptotic bounds E tr T 2k “ Oppk`1 q and E tr2 T k “ Oppk`2 q
as n Ñ 8. In fact, for any k P N,
1 ´ 4T ¯k L2
tr ?
ÝÑ Ck{2 1rk evens
p
p
`2k˘
1
th
Catalan number.
as n, p Ñ 8 with p{n Ñ 0, where Ck “ k`1
k is the k
Although our proof will rely on the close relationship between the Wishart
and the t distribution, it is worthwhile to step back and think why a Tn{2 p2Ip q
should behave like a GOEppq when p{n Ñ 0. One good reason might be the
classic result that as n Ñ 8, the density of a t distribution converges pointwise
to a standard normal density. Thus, we might think that as long as p does not
grow too fast, in some aspects the symmetric t distribution should behave like
a GOEppq.
In the context of the proof, it will prove useful to use the notion of power sum
symmetric polynomials. For any integer partition κ “ pκ1 , . . . , κq q in decreasing
order κ1 ě ¨ ¨ ¨ ě κq ą 0, define its associated power sum polynomial to be
q
ź
rκ pZq “
tr Z κi .
(4.12)
i“1
The norm of the partition κ is |κ| “ κ1 ` ¨ ¨ ¨ ` κq ą 0, which should not be
confused with its length qpκq “ q (number of elements).
By convention, we will assume there also exists an empty partition ∅ “ pq
with length qp∅q “ 0, norm |∅| “ 0 and power sum polynomial r∅ pZq “ 1.
Chételat and Wells/Mid-scale Wishart asymptotics
26
Let’s now turn to the proof of the theorem. The odd moments of the Tn{2 pIp {8q
moments
sense
to focus on the even moments
“
‰ are zero by symmetry, so it makes
“
‰
E tr T 2k and the square moments E tr2 T k . Our first step in the proof is to
express these in terms of expectations of power sum polynomials of an inverse
Wishart Y ´1 „ W´1
p pn, Ip {nq, where by power sum polynomials we mean expressions like at Equation (4.12). Recall the useful shorthand m “ n ´ p ´ 1.
Lemma 2. Let T „ Tn{2 pIp {8q. Then for any k P N, whenever n is large enough
so that n ě p ` 16k ` 6, we can compute the 2k th moment of T by
ż
np
“
‰ p´1qk
E tr T 2k “
nk
p
ÿ
¨
i1 ,...,i2k
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4
np
4
2 2 Γp 2
Y ą0
ˇ
)ˇ
! n
ˇ m4 ˇ
Bs
Bs
Bs
ˇ
ˇ
...
dY
exp ´ trpY `Xq Y `X ˇˇ
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
4
X“0
“
“
‰
p´1qk ÿ p1q
bκ pn, m, pq E rκ pY ´1 q
k
n
(4.13)
|κ|ď2k
and its squared k th moment by
ż
np
“
‰ p´1qk
E tr2 T k “
nk
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4
4
2 Γp 2
np
2
p
ÿ
Y ą0
Bs
Bs
Bs
Bs
Bs
Bs
...
...
B
X
B
X
B
X
B
X
B
X
B
X
s j3 j2 s j2 j1 s i1 ik
s i3 i2 s i2 i1
i1 ,...,ik s j1 jk
j1 ,...,jk
ˇ
)ˇ
! n
ˇ m4 ˇ
ˇ
ˇ
dY
exp ´ trpY `Xq Y `X ˇˇ
4
X“0
k
ÿ
“
‰
p´1q
“
bκp2q pn, m, pq E rκ pY ´1 q ,
(4.14)
k
n
¨
|κ|ď2k`1
for Y
´1
„
W´1
p pn, Ip {nq
p1q
p2q
p1q
p2q
and some bκ , bκ . These bκ , bκ are polynomials in
p1q
n, m, p, indexed by integer partitions κ, whose degrees satisfy deg bκ ď 2k ` 1 ´
p2q
qpκq and deg bκ ď 2k ` 2 ´ qpκq. The sums are taken over all partitions of the
integers κ satisfying |κ| ď 2k and |κ| ď 2k ` 1 respectively, including the empty
partition.
Proof. Let fNW and ψNW
? stand for the density and the G-transform of a normalized Wishart matrix nrWp pn, Ip {nq ´ Ip s. In the proof of Proposition 3, we
1{2
concluded at Equation (3.11) that fNW had to be integrable when n ě p ´ 2, as
its integral was proportional to a multivariate gamma function. Let RpXq “ ´X
1{2
1{2
be the flip operator. Since fNW is integrable, fNW ˝R must be integrable as well,
Chételat and Wells/Mid-scale Wishart asymptotics
27
` 1{2
˘
1{2
and so their convolution fNW ‹ fNW ˝ R is well-defined and integrable.
At Equation (3.1) at the start of Section 3, we defined our notion of Fourier
transform for integrable functions on Sp pRq. Define the map ι : Sp pRq Ñ
Rppp`1q{2 that maps a symmetric matrix to its vectorized upper triangle, and
let τ : Sp pRq Ñ Sp pRq be the map
#
2Xij if i ‰ j
τ pXqij “
Xjj
if i “ 1.
Then in terms of the usual Fourier transform on Rppp`1q{2 ,
(`
˘
ppp´1q
Ftf upT q “ 2 4 F f ˝ ι´1 ι ˝ τ pT q .
This close relationship transfer properties to our Fourier transform on Sp pRq.
We will need three.
(
1. For any integrable function f , we have F f ˝ R “ Ftf u.
2. (Convolution) For any two integrable functions f1 and f2 , we have Ftf1 ‹
ppp`1q
p
f2 u “ 2 2 π 4 Ftf1 uFtf2 u.
3. (Fourier inversion) For any continuous integrable f with integrable Fourier
transform φ, we have
ż
f pXq “
1
p
2
2 π
ppp`1q
4
ei trpT Xq φpT q dT “ Ftφup´Xq,
Sp pRq
for all X P Sp pRq.
These properties are important for the following. Since fNW is real-valued, properties 1 and 2 provide
!
)
` 1{2
˘)
(
ppp`1q
p
1{2
1{2
1{2
2´ 2 π ´ 4 F fNW ‹ fNW ˝ R “ F fNW F fNW ˝ R
ˇ 1{2 ˇ
1{2 (
1{2 1{2
1{2 (
“ F fNW F fNW “ ψNW ψNW “ ˇψNW ˇ.
But then, since |ψNW | is integrable (in fact, to unity), the Fourier inversion
formula yields that
ż
` 1{2
˘
1{2
fNW ‹ fNW ˝ R pXq “
ˇ
ˇ
ei trpT Xq ˇψNW pT qˇ dT.
(4.15)
Sp pRq
Thus we might say the characteristic function of the Tn{2 pIp {8q distribution is
˘
1{2 ` 1{2
given by fNW ‹ fNW ˝ R . It is well known that the derivatives of the characteristic function of a distribution evaluated at zero provide its moments, up to a
˘
1{2 ` 1{2
constant. This suggests
should
try“ to repeatedly
differentiate fNW ‹ fNW ˝R
“ we2k
‰
‰
at zero to compute E tr T
and E tr2 T k , our ultimate goal.
Unfortunately, the convolution is given by an integral whose domain makes
it difficult to directly interchange the differentiation and integration symbols.
Because the integrand is orthogonally invariant, we found it easier to compute
the derivatives at zero by taking a limit over a sequence of decreasing positive-
Chételat and Wells/Mid-scale Wishart asymptotics
28
definite matrices at both sides instead. In this spirit, define on the open set
t0 ă X ă Ip u Ă Sp pRq the real-valued functions
p´1qk
H1 pXq “
nk
p
ÿ
˘?
Bs
Bs
Bs
1{2 ` 1{2
...
fNW ‹ fNW ˝R p nXq
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
i1 ,...,i2k
and
p´1qk
H2 pXq “
nk
p
ÿ
Bs
Bs
Bs
Bs
Bs
Bs
...
...
Bs Xj1 jk
Bs Xj3 j2 Bs Xj2 j1 Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
i1 ,...,ik
j1 ,...,jk
for fixed k, p and n. Here
˘?
1{2 ` 1{2
fNW ‹ fNW ˝R p nXq
Bs
Bs Xij
stands for the symmetric differentiation operator
?
“
as defined in Section 2. The n scaling in the argument
helps link the convolution to an expectation with respect to an inverse Wishart
distribution.
Let’s first relate these functions to the moments of the Tn{2 pIp {8q distribution. The symmetric differentation operator has the pleasant property that
Bs
Bs Xij trpXT q “ Tij for any two symmetric matrices X, T . Thus, for any 1 ď
l ď 2k and indices 1 ď i1 , . . . , i2l ď p, we find that
ˇ
ˇ
?
ˇ
ˇ
ˇ
ˇ
Bs
Bs
Bs
i n trpT Xq ˇ
ˇ
ˇ
...
ψNW pT qˇˇ
e
ˇ Bs Xi i
Bs Xi4 i3 Bs Xi2 i1
2l 2l´1
ˇ
ˇˇ
ˇ
ˇ
ˇ
“ nl ˇTi2l i2l´1 ¨ ¨ ¨ Ti4 i3 Ti2 i1 ˇˇψNW ˇpT q (4.16)
1`δij B
2 BXij ,
Bs
Bs Xij
for all X P Sp pRq.
We now show that the right hand side (4.15) is integrable. This is not a mere
formality: when p “ 1, asking if this expression is integrable is the same as
asking if the t distribution with n{2 degrees of freedom has an lth moment, and
it is well-known that the t distribution only possesses moments of order smaller
than its degrees of freedom. So the answer is most likely to be positive, but only
for n large enough.
Let us see why. For any symmetric matrix T ,
g
f p ´
¯ bˇ
a
fź
ˇ
2
|Tij | ď λ1 pT q ď e
1 ` λi pT 2 q “ ˇIp ` T 2 ˇ,
i“1
where λ1 pT 2 q ě ¨ ¨ ¨ ě λp pT 2 q ě 0 are the ordered eigenvalues of the positivedefinite matrix T 2 . Thus
ż
ˇ
ˇˇ
ˇ
ˇ
ˇ
nl ˇTi2l i2l´1 ¨ ¨ ¨ Ti2 i1 ˇˇψNW ˇpT q dT
Sp pRq
ż
3l
2
n
“ l Cn,p
4
ˇ´ n`p`1
ˇ
ˇ 4T
4
4Ti2 i1 ˇˇˇˇ
16T 2 ˇˇ
ˇ i2l i2l´1
¨ ¨ ¨ ? ˇˇIp `
dT
ˇ ?
ˇ
n
n
n
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
ż
ˇ
ˇ pn´2lq`p`1
2 ˇ´
4
ˇ
ˇIp ` 16T ˇ
dT
ˇ
n ˇ
3l
2
n
ď l Cn,p
4
Sp pRq
3l
2
ˆ
n Cn,p
ď l
4 Cn´2l,p
29
ż
n
n ´ 2l
˙ppp`1q
4
ˇ
ˇ´ pn´2lq`p`1
4
ˇ
16T 2 ˇˇ
ˇ
Cn´2l,p ˇIp `
dT.
n ´ 2l ˇ
(4.17)
Sp pRq
When n ´ 2l ě p ´ 2, the last integrand is the density of a Tn{2´l pIp {8q
distribution, so integrates to unity. Thus, when n ě p ` 4k ´ 2, the right
hand side of Equation (4.16) is an integrable function for all 1 ď l ď 2k and
1 ď i1 , . . . , i2l ď p. By Equation (4.15), and repeated differentiation under the
integral sign justified by the integrability bounds given by Equations (4.16) and
(4.17), we find that
k
H1 pXq “
p´1q
nk
ż
p
ÿ
?
Bs
Bs
Bs
...
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
ei
i1 ,...,i2k
ˇ
n trpT Xq ˇ
ˇ
ψNW pT qˇdT
Sp pRq
ż
tr T 2k ei
“
?
ˇ
n trpT Xq ˇ
ˇ
ψNW pT qˇdT
(4.18)
Sp pRq
and
p´1qk
H2 pXq “
nk
p
ÿ
Bs
Bs
...
Bs Xj1 jk
Bs Xj2 j1
i1 ,...,ik
j1 ,...,jk
ż
Bs
Bs
Bs
...
Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
ei
ˇ
ψNW pT qˇdT
Sp pRq
ż
“
?
ˇ
n trpT Xq ˇ
tr2 T k ei
?
ˇ
n trpT Xq ˇ
ˇ
ψNW pT qˇdT.
(4.19)
Sp pRq
for any X P Sp pRq and any n ě p ` 4k ´ 2.
˘
1{2 ` 1{2
Now let’s relate H1 and H2 to the definition of fNW‹ fNW˝R as a convolution.
This is where restricting H1 and H2 to small positive-definite matrices becomes
useful. By Equation (3.10), the expression is
ż
˘?
1{2 ` 1{2
fNW ‹ fNW ˝R p nXq “
ż
np
“
n2
` ˘
np
2 2 Γp n2
1{2
1{2
fNW pZqfNW pZ ´
?
nXqdZ
Sp pRq
! n
)ˇ
! n
)ˇ ˇ m
ˇm
exp ´ trpY `Xq ˇY `X ˇ 4 exp ´ tr Y ˇY ˇ 4 dY
4
4
Y `Xą0, Y ą0
?
ppp`1q
using the change of variables Y “ Ip ` Z{ n ´ X with dZ “ n 4 dY . For
Chételat and Wells/Mid-scale Wishart asymptotics
30
X ą 0, we have 1rY ` X ą 0, Y ą 0s “ 1rY ą 0s, and thus H1 , H2 satisfy
H1 pXq “
p
ÿ
p´1qk
nk
ż
Bs
Bs
Bs
...
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
i1 ,...,i2k
and
p´1qk
H2 pXq “
nk
p
ÿ
Y ą0
np
ˇm
ˇ
¨ˇY `X ˇ 4
! n
)
exp ´ trpY `Xq
4
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
np
4
2 2 Γp 2
(4.20)
Bs
Bs
Bs
...
Bs Xj1 jk
Bs Xj3 j2 Bs Xj2 j1
i1 ,...,ik
j1 ,...,jk
ż
Bs
Bs
Bs
...
Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
! n
)ˇ
ˇm
exp ´ trpY `Xq ˇY `X ˇ 4
4
Y ą0
np
2
! n
)ˇ ˇ m
n
` n ˘ exp ´ tr Y ˇY ˇ 4 dY.
(4.21)
4
2 Γp 2
We would now like to interchange the integral and differentiation signs. )To do
m
so, we must understand what the repeated derivatives of expt´ n4 tr Y |Y | 4
look like. Differentiating once, we see that:
! n
)ˇ
ˇm
Bs
exp ´ trpY `Xq ˇY `X ˇ 4
Bs Xi2 i1
4
„
! n
)ˇ
ˇm
n
m
´1
pY `Xqi2 i1 ´ pIp qi2 i1 exp ´ trpY `Xq ˇY `X ˇ 4 .
“
4
4
4
Differentiating twice, we see that:
! n
)ˇ
ˇm
Bs
Bs
exp ´ trpY `Xq ˇY `X ˇ 4
Bs Xi4 i3 Bs Xi2 i1
4
„
m
m
´1
´1
“ ´ pY `Xq´1
pY `Xq´1
i2 i4 pY `Xqi3 i1 ´
i2 i3 pY `Xqi4 i1
8
8
mn
m2
´1
´1
`
pY `Xq´1
pY `Xq´1
i4 i3 pY `Xqi2 i1 ´
i4 i3 pIp qi2 i1
16
16
! n
)ˇ
ˇm
n2
mn
´1
´1
´1
´
pIp q´1
pY
`Xq
`
pI
q
pI
q
trpY `Xq ˇY `X ˇ 4.
p i4 i3 p i2 i1 exp ´
i4 i3
i2 i1
16
16
4
So in general, it is clear that the repeated derivatives are) given by some polym
nomial in entries of pY ` Xq´1 , times expt´ n4 trpY ` Xq |Y ` X| 4 . We won’t
investigate further the nature of these polynomials beyond remarking that for
any indices 1 ď l ď 2k and 1 ď i1 , . . . , i2l ď p, and any symmetric matrices
X, Y P Sp pRq, we must have some crude bound
ˇ
ˇ
*
"
ˇ
ˇ
ˇ m4 ˇ
Bs
Bs
Bs
n
ˇ
ˇ
ˇ
...
exp ´ trpY `Xq Y `X ˇˇ
ˇ Bs Xi i
Bs Xi i Bs Xi i
4
¨
2l 2l´1
4 3
2 1
np
2
Chételat and Wells/Mid-scale Wishart asymptotics
l
ÿ
ÿ
ď
31
s
l
ˇ ź
ˇ
ˇ
ˇ
ˇ
ˇź
ˇ
ˇ
ˇpY `Xq´1
ˇ
ˇ
ˇ
pI
q
pn,
mq
ˇ
ˇaJ,s
p j2t j2t´1
j2t j2t´1
"t“1
*
ˇ
ˇm
n
¨ exp ´ trpY `Xq ˇY `X ˇ 4
4
for some polynomials aJ,s that do not depend on X or Y . We relegate a proof
of this result as Lemma 3 in Section 8. This can be uniformly bounded for all
0 ď X ď Ip by
l
! n
)“
ÿ
‰ mp
ď C1 pn, m, pq
trs pY ´1 q exp ´ tr Y 1 ` tr Y 4
(4.22)
4
s“0
s“0
t“s`1
JP
t1,...,pu2l
for some constant C1 pn, m, pq that does not depend on X or Y . But for any
n ě p ´ 2 and l ě 0,
ż
l
ÿ
)“
! n
‰ mp
trs pY ´1 q exp ´ tr Y 1 ` tr Y 4
4
s“0
np
! n
)ˇ ˇ m
n2
¨ np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
2 2 Γp 2
C1 pn, m, pq
Y ą0
ż
“
n
np
2
l
C1 pn, m, pq ÿ
`n˘
np
2 2 Γp 2
s“0
“
1`tr Y
‰ mp
4
trs pY ´1 q
Y ą0
! n
)ˇ ˇ n`p`1 p`1
´ 2
exp ´ tr Y ˇY ˇ 4
dY
2
`
˘ ”
ı
´ n ¯ mp
Γp n`p`1
mp
4
4˘
`
E p1 ` tr Y q 4 trs pY ´1 q
“
n
2
Γp 2
`
˘
for a Y with a matrix gamma distribution Gp n`p`1
, n2 Ip . The Cauchy-Schwarz
4
inequality then entails the bound
˘ ”
`
ı 12
´ n ¯ mp
ı 21 ”
Γp n`p`1
mp
4
4
` n ˘ E p1 ` tr Y q 2
E tr2s pY ´1 q .
(4.23)
ď
2
Γp 2
The first expectation is always finite when n ě p ´ 2. Since tr2s pY ´1 q can be
written as a sum of zonal polynomials indexed by partitions of the integer 2s, the
results of Muirhead [1982, Theorem 7.2.13] imply that the second expectation
is finite whenever n`p`1
ą 2s ` p´1
4
2 ô n ě p ` 8s ´ 2. Thus, in Equation (4.20)
with l ď k and (4.21) with l ď 2k, whenever n ě p ` 16k ´ 2 we are justified
in repeatedly differentiating under the integral sign by the integrability bounds
given by Equations (4.22) and (4.23), and obtain in that case
ż
p´1qk
H1 pXq “
nk
p
ÿ
Y ą0 i1 ,...,i2k
Bs
Bs
Bs
...
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
(4.24)
Chételat and Wells/Mid-scale Wishart asymptotics
32
np
! n
)ˇ
! n
)ˇ ˇ m
ˇ m4
n2
ˇ
ˇ
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
exp ´ trpY `Xq Y `X
np
4
4
2 2 Γp 2
(4.25)
and
ż
p
ÿ
p´1qk
H2 pXq “
nk
i ,...,ik
Y ą0 1
Bs
Bs
Bs
...
Bs Xj1 jk
Bs Xj3 j2 Bs Xj2 j1
j1 ,...,jk
! n
)ˇ
ˇm
Bs
Bs
Bs
...
exp ´ trpY `Xq ˇY `X ˇ 4
Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
4
np
! n
)ˇ ˇ m
n2
¨ np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY.
4
2 2 Γp 2
(4.26)
Let us now look at how H1 pXq and H2 pXq behave
as X Ñ 0. On one hand,
a
?
for any symmetric matrix T we have | tr T k | ď p tr T 2k ď p|Ip ` T 2 |k{2 , so
we must have the bounds
ˇ
ˇ
ˇ
ˇ pn´4kq`p`1
k
2 ˇ´
4
?
ˇ
ˇ
ˇˇ
ˇ
n
C
16T
n,p
2k
i
n
trpT
Xq
ˇ tr T e
ˇψNW pT qˇˇ ď
ˇ
ˇ
ˇ 16k Cn´4k,p Cn´4k,p ˇIp ` n ˇ
ˇ
and
ˇ
ˇ
ˇ pn´4kq`p`1
ˇ
k
2 ˇ´
4
ˇˇ
ˇ 2 k i?n trpT Xq ˇ
ˇ
pn
C
16T
n,p
ˇψNW pT qˇˇ ď
ˇ tr T e
ˇ
ˇ
.
ˇ 16k Cn´4k,p Cn´4k,p ˇIp ` n ˇ
ˇ
holding uniformly in X. When n ´ 4k ě p ´ 2 ô n ě p ` 4k ´ 2, the right hand
sides are proportional to the density of the G-conjugates of the normalized
Wishart distributions with n ´ 4k degrees of freedom, so are integrable. Thus,
by the dominated convergence theorem and Equations (4.18) and (4.19),
ż
lim
XÑ0 H1 pXq
0ăXăIp
“
ˇ
ˇ
“
‰
lim ?
tr T 2k XÑ0 ei n trpT Xq ˇψNW pT qˇdT “ E tr T 2k
(4.27)
0ăXăIp
Sp pRq
and
lim
XÑ0 H2 pXq
0ăXăIp
ż
“
lim ei?n trpT Xq ˇˇψ pT qˇˇdT “ E“tr2 T k ‰
tr2 T k XÑ0
NW
(4.28)
0ăXăIp
Sp pRq
for T „ Tn{2 pI{ 8q.
On the other hand, the integrands at Equations (4.25) and (4.26) take a
particularly simple form. Lemma 4 establishes by induction that there must be
p1q
p2q
p1q
polynomials bκ and bκ in n, m and p with degrees deg bκ ď 2k ` 1 ´ qpκq
Chételat and Wells/Mid-scale Wishart asymptotics
33
p2q
and deg bκ ď 2k ` 2 ´ qpκq such that
ż
p´1qk
H1 pXq “
nk
ÿ
bp1q
κ pn, m, pqrκ prY
` Xs
|κ|ď2k
Y ą0
"
*
n
q exp ´ trpY ` Xq
4
np
ˇ
ˇm
¨ˇY ` X ˇ 4
and
´1
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
2 Γp 2
np
2
(4.29)
ż
p´1qk
H2 pXq “
nk
ÿ
bp2q
κ pn, m, pqrκ prY
|κ|ď2k`1
´1
` Xs
"
*
n
q exp ´ trpY ` Xq
4
Y ą0
np
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
(4.30)
4
2 Γp 2
for any 0 ă X ă Ip and n ě p ` 16k ´ 2. The sums are taken over all partitions
of the integers κ satisfying |κ| ď 2k and |κ| ď 2k ` 1 respectively, including the
empty partition. But for any integer partition κ, the bound
ˇm
ˇ
“
‰ mp
n
n
rκ prY ` Xs´1 qe´ 4 trpY `Xq ˇY ` X ˇ 4 ď tr|κ| pY ´1 qe´ 4 tr Y 1 ` tr Y 4
ˇ
ˇm
¨ˇY ` X ˇ 4
np
2
holds uniformly in 0 ď X ď Ip . Thus for |κ| ď 2k ` 1, the right hand side is
integrable for n ě p ` 16k ` 6, by the same argument as for Equation (4.23).
Thus for such n, by the dominated convergence theorem and Equations (4.29)
and (4.30), we obtain that
ż
lim
XÑ0 H1 pXq
0ăXăIp
“
p´1qk
nk
lim
XÑ0
0ăXăIp
Y ą0
ÿ
´1
bp1q
q
κ pn, m, pqrκ prY ` Xs
|κ|ď2k
"
*
np
! n
)ˇ ˇ m
ˇ
ˇm
n
n2
¨ exp ´ trpY ` Xq ˇY ` X ˇ 4 np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
4
2 2 Γp 2
k ÿ
“
‰
p´1q
´1
“
bp1q
q
(4.31)
κ pn, m, pq E rκ pY
nk
|κ|ď2k
and
lim
ż
XÑ0 H2 pXq
0ăXăIp
“
p´1qk
nk
lim
XÑ0
0ăXăIp
Y ą0
ÿ
´1
bp2q
q
κ pn, m, pqrκ prY ` Xs
|κ|ď2k`1
"
*
np
)ˇ ˇ m
! n
ˇ
ˇm
n2
n
¨ exp ´ trpY ` Xq ˇY ` X ˇ 4 np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
4
2 2 Γp 2
k
ÿ
“
‰
p´1q
´1
“
bp2q
q ,
(4.32)
κ pn, m, pq E rκ pY
k
n
|κ|ď2k`1
Chételat and Wells/Mid-scale Wishart asymptotics
34
where Y follows a Wp pn, Ip {nq distribution. Combining Equations (4.27)–(4.28)
with Equations (4.31)–(4.32) and Lemma 4 concludes the proof.
Something remarkable about Lemma 2 is that it provides us with an algorithm to compute the moments of a symmetric t distribution in terms of the
moments of an inverse Wishart matrix. For example, when k “ 1, repeated
differentiation yields that
p
! n
)ˇ
ÿ
ˇm
Bs
Bs
exp ´ trpY `Xq ˇY `X ˇ 4
BX
BX
4
i1 ,i2 s i1 i2 s i2 i1
„
mpm ´ 2q
mn
n2 p
“
trpY ` Xq´2 ´
trpY ` Xq´1 `
16
8
16
! n
)ˇ
ˇm
m 2
´ tr pY ` Xq´1 exp ´ trpY `Xq ˇY `X ˇ 4 . (4.33)
8
4
We can recognize trpY ` Xq´2 and tr2 pY ` Xq as the power sum polynomials
rp2q prY ` Xs´1 q and rp1,1q prY ` Xs´1 q in the sense of Equation (4.12), so we
p1q
p1q
p1q
p1q
must have bp2q “ mpm ´ 2q{16, bp1,1q “ ´m{8, bp1q “ mn{8 and b∅ “ n2 p{16 in
the
“ result
‰ of Lemma 4. Hence Lemma 2 really tells us that whenever n ě p ` 22,
E tr T 2 for T „ Tn{2 pIp {8q can be expressed as
“
‰ m “ 2 ´1 ‰
‰
mpm ´ 2q “
E tr Y ´2 `
E tr Y
E tr T 2 “ ´
16n
8n
‰ np
m “
E tr Y ´1 ´
(4.34)
`
8
16
where Y „ Wp pn, Ip {nq.
Of course, this also works with square moments and higher k. For example,
the same strategy
for,
“
‰ say, square moments with k “ 2 yields that whenever
n ě p ` 38, E tr2 T 2 for T „ Tn{2 pIp {8q can be expressed as
`
˘
“ 2 2‰
‰ m pm ´ 2q “
‰
m m2 ´ 5m ` 10 “
E tr T “ ´
E tr Y ´4 `
E tr Y ´3 tr Y ´1
2
2
16n
4n
`
˘
m m3 ´ 4m2 ` 20m ´ 32 “ 2 ´2 ‰
m2 “ 4 ´1 ‰
E tr Y
E tr Y
`
`
2
256n˘
64n2
` 2
‰ m pm ´ 2q “
‰
m m ´ 2m ` 16 “
E tr Y ´2 tr2 Y ´1 `
´
E tr Y ´3
2
64n
8n
`
˘
‰
m m2 ´ 2m ` 16 “
m2 “ 3 ´1 ‰
´
E tr Y ´2 tr Y ´1 `
E tr Y
64n
32n
‰ m p´m ` pq “ 2 ´1 ‰
m pmp ´ 2p ´ 8q “
`
E tr Y ´2 ´
E tr Y
128
64
‰ n2 p 2
mnp “
´
E tr Y ´1 `
(4.35)
64
256
again where Y „ Wp pn, Ip {nq.
Unfortunately, as we consider larger orders, the repeated differentiation of
expt´ n4 tr Zu|Z|m{4 quickly becomes too cumbersome to perform by hand. But
Chételat and Wells/Mid-scale Wishart asymptotics
35
at“ least ‰in theory,
“ we can
‰ compute expressions like (4.34) and (4.35) for any
E tr T 2k and E tr2 T k , and Lemma 2 summarize that fact. That is, using the
Fourier inversion theorem we have reduced the problem of computing moments
of the t-distribution Tn{2 pIp {8q to that of computing expected power sum polynomials of the inverse Wishart distribution W´1
p pn, Ip {nq, for large enough n.
How can we compute expected power sum polynomials of an inverse Wishart?
There are two approaches in the literature. Letac and Massam [2004] found an
expression in terms of a different basis, the zonal polynomials, which behave
particularly nicely with respect to the inverse Wishart distribution, and whose
expectations have a simple closed form. From this, they provided an algorithm
for computing expected power sum polynomials to arbitrary order. Matsumoto
[2012] found expressions of coordinate-wise moments in terms of modified Wiengarten orthogonal functions, from which expectations of power sum polynomials
can be computed. We follow the idea of Letac and Massam [2004] in our asymptotic analysis.
For any integer partition κ, there exist coefficients cκ,λ (which depend solely
on κ and λ) such that
ÿ
rκ pY ´1 q “
cλ Cλ pY ´1 q
|λ|“|κ|
for Cλ the so-called zonal polynomials. For an overview of the topic with a focus
on random matrix theory, see Muirhead [1982, Chapter 7]. The coefficients cκ,λ
are explicitly computable. If we follow the normalization of zonal polynomials
of Muirhead [1982], for example, we find that
“ ‰ “ ‰
„
„
„
r∅ “ C∅ ,
Cp2q
rp2q
1 ´ 21
and
.
“
(4.36)
“
‰ “
‰
Cp1,1q
rp1,1q
1 1
rp1q “ Cp1q ,
As mentioned, expectations of zonal polynomials with respect to a Wishart or
inverse Wishart distribution take a particularly simple form. From Muirhead
[1982, Theorem 7.2.13 and Equation (18) on p.237], the expected zonal polynomials for Y ´1 „ W´1
p pn, Ip {nq are
“
‰
n|λ|
E Cλ pY ´1 q “
Cλ pIp q
ś
qpλq
2|λ| i“1 m´i`1
2
śqpλq
i ´1
ź λź
2|λ| |λ|! iăj p2λi ´ 2λj ´ i ` jq |λ| qpλq
p ` p1 ´ i ` 2lq
n
“
(4.37)
śqpλq
m
´ p1 ´ i ` 2lq
i“1 l“0
i“1 p2λi ` qpλq ´ iq!
“
‰
for λ ‰ ∅, and E C∅ pY ´1 q “ 1. For example, the first few expected zonal
polynomials are
“
‰
“
‰ np
,
E C∅ pY ´1 q “ 1,
E Cp1q pY ´1 q “
m
“
‰ 2n2 p pp ´ 1q
“
‰
n2 p pp ` 2q
E Cp1,1q pY ´1 q “
,
E Cp2q pY ´1 q “
.
3m pm ` 1q
3m pm ´ 2q
‰
“
‰
“
‰
“
From this, we can exactly compute E rκ pY ´1 q and thus E tr T 2k and E tr2 T k ,
Chételat and Wells/Mid-scale Wishart asymptotics
36
as a function of p and n (or m). For example, by Equation (4.36) we find that
“
‰
“
‰ np
E r∅ pY ´1 q “ 1,
E rp1q pY ´1 q “
,
m
“
‰
“
‰
n2 p pm ` pq
n2 p pmp ´ p ` 2q
, E rp2q pY ´1 q “
.
E rp1,1q pY ´1 q “
m pm ´ 2q pm ` 1q
m pm ´ 2q pm ` 1q
and thus, by Equation (4.34), whenever n ě p ` 38
‰
“
np pmp ` m ` 2q
E tr T 2 “
.
16 pm ´ 2q pm ` 1q
(4.38)
In a similar way, we can compute the expected zonal polynomials and hence,
the expected power sum polynomials of Y ´1 for |κ| “ 3, 4. So from Equation
(4.35), we obtain for n ě p ` 38 that
´
“
‰
n2 p
m3 p3 ` 2m3 p2
E tr2 T 2 “
256 pm ´ 6q pm ´ 2q pm ´ 1q pm ` 1q pm ` 3q
` 5m3 p ` 4m3 ´ 3m2 p3 ` 6m2 p2 ` 9m2 p ` 24m2 ´ 12mp3
¯
´ 36mp2 ` 36mp ´ 36p .
(4.39)
Of course, this reasoning also works for other k’s. In particular, we essentially derived a (potentially inefficient) algorithm to compute the moments of a
Tn{2 pIp {8q distribution to arbitrary order on our path to proving this theorem.
At this point, it is worthwhile to realize that Equations (4.38) and (4.39) are
already enough to prove the theorem for small moments. For example, when
n Ñ 8 such that p{n Ñ c P r0, 1q, then m „ p1 ´ cqn and
ˆ 2
˙
“
‰
m2
np
np
n
1
`
`
„
p2 ,
E tr T 2 “
pm ´ 2q pm ` 1q 16m 16m 8m2
16p1 ´ cq
“
‰
which proves that E tr T 2 “ Opp2 q. In fact,
ˆ
˙
„
m2
1
p
2
3
2
2
1 ´ 4T ¯2
´1“
`
`
`
` 2` 2
E tr ?
pm´2q pm`1q p m m mp m
p
p
m p
1
p
Ñ 0.
(4.40)
„ `
p m
Moreover, when n, p Ñ 8 such that p{n Ñ 0, then m „ n and
„ˆ
˙
2
‰ 32 “
‰2
1 ´ 4T ¯2
256 “
E
tr ?
´1
“ 4 E tr2 T 2 ´ 2 E tr T 2 ` 1
p
p
p
p
ˆ
5
m
5
4
2
22
“
` 3`
`
pm´6q pm´2q pm´1q pm`1q pm`3q p2
p
m mp
27
32
p2
6p
33
60
115
52
`
`
`
` 2` 2` 2 ` 2 2` 2 3
2
3
2
mp
mp
m
m
m
m p m p
m p
24
12p2
3p2
6p
3
118
93
96p
´ 3 ` 3` 3` 3 ` 3 2` 3 3´
´ 4
m
m
m
m p m p
m p
m4
m
Chételat and Wells/Mid-scale Wishart asymptotics
48
84
144
144
36
36
´ 4´ 4 ´ 4 2´ 5 ´ 5 ´ 5 2
m
m p m p
m
m p m p
2
p2
5
` 2 Ñ 0.
„ 2`
p
m m
37
˙
(4.41)
Thus
1 ´ 4T ¯2 L2
tr ?
ÝÑ 1 “ C1
p
p
and the theorem is proven for the second moment.
In theory, we could proceed in the same way for any moment of interest, but
naturally we could never conclude that the theorem holds for all moments that
way. Nonetheless, the calculations give us some hints about how to argue in the
general case.
The idea is to express the moments of the symmetric t distribution as polynomials of p and p{m. There are two regimes where random matrix theory is
well understood: the classical regime where p is held fixed as n Ñ 8, and the
linear, high-dimensional regime where p grows linearly with n. From this, we
can therefore conclude a few facts regarding the behavior of symmetric t moments in these regimes. But these moments are polynomials, and a polynomial
is a very rigid object: results from the two extreme cases where p is fixed and
p grows linearly will be enough to prove results for every regime in between,
yielding the first part of the theorem. Proving the second part will then be the
simple matter of applying the GOE approximation of Jiang and Li [2015] and
Bubeck et al. [2016] to the specific shape found for the symmetric t moments
while proving the first part, namely Equations (4.54) and (4.55).
Proof of Theorem 2. Recall the expected zonal polynomial of an inverse Wishart
W´1
p pn, Ip {nq is given by Equation (4.37). Based on the previous calculations,
it is tempting to define
śqpλq
qpλq
i ´1
ź λź
2|λ| |λ|! iăj p2λi ´ 2λj ´ i ` jq
m
1
cλ “
, Rλ pmq “
śqpλq
m
´
p1
´ i ` 2lq
i“1 l“0
i“1 p2λi ` qpλq ´ iq!
ˆ
˙
qpλq
i ´1
ź λź
p
1 ´ i ` 2l
and
Pλ pm, pq “
`
(4.42)
m
m
i“1 l“0
so that
“
‰
E Cλ pY ´1 q “ c1λ n|λ| Rλ pmqPλ pm, pq.
With these expressions the expected power sum polynomials can be written as
˜
¸
p
ÿ
ź
ź
“
‰
´1
1 |κ|
´1
E rκ pY q “
cκ,λ cλ n
Rµ pmq
Rµ pmq Pλ pm, pq
|λ|“|κ|
“
|µ|“|κ|
|µ|“|κ|
µ“λ
ź
ÿ
ź
n|κ|
¨
Rµ pmq ¨ m|κ|
cκ,λ c1λ
Rµ´1 pmqPλ pm, pq.
|κ|
m
|µ|“|κ|
|λ|“|κ|
|µ|“|κ|
µ“λ
Chételat and Wells/Mid-scale Wishart asymptotics
38
In other words, if we define
ź
1
R|µ|
“
Rµ pmq,
|µ|“|κ|
1
P|λ|
pm, pq
“ m|κ|
ÿ
cκ,λ c1λ
|λ|“|κ|
ź
Rµ´1 pmqPλ pm, pq
(4.43)
|µ|“|κ|
µ“λ
then
“
‰
n|κ| 1
1
E rκ pY ´1 q “ |κ| R|κ|
pmqP|κ|
pm, pq.
(4.44)
m
`
˘
ś
ś
λi ´1
qpλq
1´ 1´i`2l
But Rµ´1 pmq “ i“1 l“0
is a polynomial in 1{m, while Pλ pm, pq “
m
˘
śqpλq śλi ´1 ` p
1´i`2l
is a polynomial in p{m and 1{m, both of degree at
i“1
i“1
m `
m
most |µ| “ |λ| “ |κ|. Thus
ÿ
ź
1
cκ,λ c1λ
Rµ´1 pmqPλ pm, pq
P|κ|
pm, pq ” m|κ|
|λ|“|κ|
“ m|κ|
|κ| ÿ
|κ|
ÿ
i“0 j“0
|µ|“|κ|
µ“λ
bij
´ p ¯i 1
m mj
(4.45)
for some coefficients bij that don’t depend on m, p (or n). Define the polynomials
ř|κ|
fj pαq “ i“0 bij αi , so that
|κ| ´
ÿ
p ¯ ´j
1
P|κ|
pm, pq “ m|κ|
f
m .
(4.46)
m
j“0
Let us show that for all 0 ď`j ă |κ|´qpκq, the polynomial
fj must be identically
˘
zero over the interval α P 0, 1{ maxp|κ| ´ 2, 0q . Indeed, say this was not the
case, and let 0 ď j0 ă |κ|
˘ smallest j with the property that
` ´ qpκq1 be the
. As fj0 is a polynomial, by continuity
fj0 pα0 q ‰ 0 for some α0 P 0, maxp|κ|´2,0q
it must be non-zero in a neighborhood of α0 , so we may as well assume
α‰0 is
“
rational without loss of generality. Now look at what happens to E rκ pY ´1 q as
α0
p grows to infinity at the very specific linear rate p “ t 1`α
pn ´ 1qu. Since α0 is
0
rational, there must be a subsequence nl such that pl is exactly an integer (for
example, if α0 “ a{b with a, b integers, we can take nl “ pa ` bql ` 1). Then for
α0
pl “ 1`α
pnl ´ 1q, we have exactly pl “ α0 ml .
0
` α ˘´1
1
0
Since α0 ă maxp|κ|´2,0q
, then |κ| ă 1 ` 1`α
. Thus by Hölder’s inequality
0
and Lemma 5,
ı
“
‰
1
1
1 ”
lim |κ|´qpκq´j ¨ qpκq E rκ pY ´1 q ď 0 ¨ lim
E tr Y ´|κ| “ 0.
0
lÑ8 m
lÑ8 pl
p
l
l
On the other hand, by Equations (4.44) and (4.46), the definition of j0 and the
fact that R|κ| pmq Ñ 1 as m Ñ 8,
“
‰
1
1
lim
¨ qpκq E rκ pY ´1 q
lÑ8 m|κ|´qpκq´j0
pl
l
Chételat and Wells/Mid-scale Wishart asymptotics
ˆ
“ lim
lÑ8
“ p1 `
nl
ml
˙|κ|
ˆ
1
R|κ|
pml q
ml
pl
˙qpκq ÿ
|κ|
39
fj pα0 qmjl 0 ´j
j“j0
´qpκq
α0 q|κ| α0
fj0 pα0 q.
As α0 ą 0, fj0 pα0 q must therefore equal zero, a contradiction. Hence, as claimed,
the
˘ fj pαq for 0 ď j ă |κ| ´ qpκq all vanish over the interval
` polynomials
1
0, maxp|κ|´2,0q
.
But a polynomial can have an infinite number of zeros only if all its coefficients
are zero, so we conclude that
bij “ 0
for
0 ď j ă |κ| ´ qpκq.
Thus, from Equations (4.44) and (4.45) we have
“
‰ ´ n ¯|κ| qpκq 1
R|κ| pmqPκ2 pm, pq
m
E rκ pY ´1 q “
m
where
|κ|
|κ|
´ p ¯i
ÿ
ÿ
1
Pκ2 pm, pq “
bij
.
j´|κ|`qpκq
m m
i“0 j“|κ|´qpκq
Going back to equations (4.13) and (4.14) and plugging in the above yields
that as long as n ě p ` 16k ` 6,
“
‰ m2k`1 1
R2k pmqQp1q
(4.47)
E tr T 2k “
κ pm, pq,
nk
“
‰ m2k`2 1
E tr2 T k “
R2k`1 pmqQp2q
(4.48)
κ pm, pq
nk
where
1
p1q
ÿ ´
1 ¯|κ| R|κ| pmq bκ pn, m, pq 2
p
k
`
Qp1q
pm,
pq
“
p´1q
1`
P pm, pq,
κ
1 pmq
m m
R2k
m2k`1´qpκq κ
|κ|ď2k
k
Qp2q
κ pm, pq “ p´1q
1
p2q
ÿ ´
1 ¯|κ| R|κ| pmq bκ pn, m, pq 2
p
P pm, pq.
1` `
1
m m
R2k`1
pmq m2k`2´qpκq κ
|κ|ď2k`1
Now, for any a ď b, we can associate a partition µ of norm |µ| “ a with the
partition µ˚ “ pµ1 ` b ´ a, µ` 2, . . . , µqpµq q of norm |µ˚ | “ b, which satisfies
˚
˚
ˆ
qpµ
i ´1
ź q µź
i“1
j“0
1´i`2j
1´
m
ˆ
qpµq
i ´1
ź µź
˙
“
i“1 j“0
1´i`2j
1´
m
µ1 `b
˙ ´a´1
ź ˆ
j“µ1
˙
2j
1´
.
m
By definition for the Rµ pmq’s at Equation (4.42), this means that every factor
that appears in Rµ´1 pmq appears in Rµ´1
˚ pmq, so by definition of the R|µ| pmq’s
p1q
1
at Equation (4.43), Ra pmqR´1 pmq is a polynomial in m
. Moreover, as bκ and
p2q
bκ are polynomials of degrees d1 pκq ” 2k ` 1 ´ qpκq and d2 pκq ” 2k ` 2 ´ qpκq
Chételat and Wells/Mid-scale Wishart asymptotics
p1q
40
p2q
respectively, there exists coefficients cijl and cijl such that
p1q
bκ pn, m, pq
m2k`1´qpκq
“
1
md1 pκq
d1 pκq d1 pκq
dÿ
´i ´i´j
1 pκq ÿ
ÿ
i“0
j“0
d1 pκq d1 pκq
dÿ
´i ´i´j
1 pκq ÿ
ÿ
“
i“0
j“0
p1q
cijl mi nj pl
l“0
1
p1q
cijl
l“0
md1 pκq´i´j´l
´
p
1 ¯j ´ p ¯l
1` `
m m
m
and
p2q
bκ pn, m, pq
m2k`2´qpκq
“
1
md2 pκq
d2 pκq d2 pκq
dÿ
´i ´i´j
2 pκq ÿ
ÿ
i“0
j“0
d2 pκq d2 pκq
dÿ
´i ´i´j
2 pκq ÿ
ÿ
“
i“0
j“0
l“0
p2q
cijl
p2q
cijl mi nj pl
l“0
´
1 ¯j ´ p ¯l
p
`
.
1`
m m
m
md2 pκq´i´j´l
1
As d1 p´i ´ j ´ l ě 0q, j, l ě 0 in the first case and d2 pκq ´ i ´ j ´ l, j, l ě 0
in the second case, we conclude that these two expressions are polynomials
p
1
in m
and m
. Therefore, looking back at (4.47) and (4.48), we conclude that
p2q
p1q
p
1
the Qκ pm, pq’s and Qκ pm, pq’s are polynomials in m
and m
. Therefore, if
p1q
p2q
n ě p ` 16k ` 6 there must be coefficients aij , aij and large enough integers
D1 , D2 such that
D1 ÿ
i
j
ÿ
“
‰ m2k`1
p1q p
E tr T 2k “
R
pmq
a
2k
ij
nk
mi
i“0 j“0
D1
´ m ¯k
ÿ
p1q
“
R2k pmq
gi ppqmk`1´i
(4.49)
n
i“0
D2 ÿ
i
j
ÿ
“
‰ m2k`2
p2q p
E tr2 T k “
R
pmq
a
2k`1
ij
nk
mi
i“0 j“0
D2
´ m ¯k
ÿ
p2q
“
R2k`1 pmq
gi ppqmk`2´i
(4.50)
n
i“0
p1q
for polynomials gi ppq “
i
ř
j“0
p1q
p2q
p1q
i
ř
p2q
aij pj .
j“0
p2q
gi must vanish
aij pj and gi ppq “
We will now proceed to show that gi and
on N for 0 ď
i0 ă k ` 1 and 0 ď i0 ă k ` 2 respectively. Our argument relies on the analysis
of the asymptotic behavior of the moments of T in the classical regime where p
is held fixed while n grows
to‰infinity.“
“
‰
Observe first that E tr T 2k and E tr2 T k must have a finite limit as n Ñ 8
with p held fixed. Indeed, since 16T 2 {n is positive definite, |Ip ` 16T 2 {n| is
Chételat and Wells/Mid-scale Wishart asymptotics
41
greater than one and so we have the bound
ż
‰
“
E tr T 2k “ Cn,p
tr T
2k
ˇ
ˇ n`p`1
2 ˇ´ 4
ˇ
ˇIp ` 16T ˇ
dT
ˇ
n ˇ
Sp pRq
ż
ď Cn,p
ˇ
ˇ´ n
ˇ
16T 2 ˇˇ 4
tr T 2k ˇˇIp `
dT.
n ˇ
Sp pRq
pp3p`1q
4
ppp`1q
4
When p is held fixed, lim Cn,p “ 2
{π
by Lemma 1. Moreover,
nÑ8
n
n
ˇ
ˇ
ˆ
˙
p
´
´
2ˇ 4
4
ź
ˇ
λi p4T 2 q
ˇIp ` 16T ˇ
“
1`
ˇ
ˇ
n
n{4
i“1
for λ1 p4T 2 q ě ¨ ¨ ¨ ě λp p4T 2 q ě 0 the eigenvalues of 4T 2 , and p1 ` x{nq´n is
monotone decreasing towards exppxq. Therefore, for a fixed dimension p we can
apply the monotone convergence theorem to obtain that
ż
pp3p`1q
“
‰
2 4
lim E tr T 2k ď
ppp`1q
nÑ8
π 4
“
‰
2
tr T 2k e´4 tr T dT “ E tr Z 2k ă 8
(4.51)
Sp pRq
for Z „ GOEppq{4. Repeating the argument with tr2 T k yields similarly
ż
pp3p`1q
4
“
‰
2
lim E tr2 T k ď
ppp`1q
π 4
nÑ8
“
‰
2
tr2 T k e´4 tr T dT “ E tr2 Z k ă 8.
(4.52)
Sp pRq
“
‰
“
‰
Thus indeed E tr T 2k and E tr2 T k have finite limits when p is held fixed.
p1q
p2q
We can use this to show that gi and gi must vanish on N for 0 ď i0 ă k `1
and 0 ď i0 ă k ` 2 as follows. Say the first statement wasn’t true, and let
p1q
0 ď i0 ă k ` 1 be the smallest i such that for some p0 P N, gi0 pp0 q ‰ 0. Then
“
‰
by Equation (4.49) and the definition of i0 , the limit of E tr T 2k as n Ñ 8
with p fixed at p0 satisfies
“
‰
D1
ÿ
E tr T 2k
p1q
p1q
k
“
1
¨
1
¨
lim
gi pp0 qmi0 ´i “ gi0 pp0 q.
lim
nÑ8
nÑ8 mk`1´i0
i“i
0
But m “ n´p´1 tends to infinity as n tends to infinity, and since k `1´i0 ą 0,
“
‰
p1q
Equation (4.51) means that E tr T 2k {mk`1´i0 must tend to zero. Thus gi0 pp0 q
has to equal zero, which contradicts our assumption. Thus for every 0 ď i ă k`1,
p1q
the polynomial gi must vanish on N.
p2q
Similarly, for 0 ď i ă k ` 2, the polynomial gi must vanish on N, because
if it wasn’t the case, we could take 0 ď i0 ă k ` 2 as the smallest i with the
p2q
property that for some p0 P N, gi0 pp0 q ‰ 0, and then by Equation (4.50) with
Chételat and Wells/Mid-scale Wishart asymptotics
42
p fixed at p0 as n Ñ 8 we would get
“
‰
D2
ÿ
E tr2 T k
p2q
p2q
k
“
1
¨
1
¨
lim
gi pp0 qmi0 ´i “ gi0 pp0 q.
lim
nÑ8
nÑ8 mk`2´i0
i“i
0
But then by Equation (4.52), as m tends to infinity and k ` 2 ´ i0 ě 1 the
“
‰
p2q
ratio E tr2 T k {mk`2´i0 must tend to zero. Thus we must have gi0 pp0 q “ 0, a
p2q
contradiction. Hence indeed for 0 ď i ă k ` 2, the polynomial gi must vanish
on N.
But of course, a polynomial can only have an infinite number of zeroes if its
coefficients are all zero, so we must have
p1q
for
0 ď i ă k ` 1,
p2q
for
0 ď i ă k ` 2.
aij “ 0
aij “ 0
(4.53)
Now say that p varies with n in such a way that limnÑ8 p{n “ α ă 1. Then
for large enough n, n ě p ` 16k ` 6 so by Equations (4.49) and (4.53),
D1 ÿ
i
´ m ¯k
j´pk`1q
ÿ
“
‰
1
p1q p
R2k pmq
aij i´pk`1q
lim k`1 E tr T 2k “ lim
nÑ8 n
nÑ8 p
m
i“k`1 j“0
«
p1q
D1 ÿ
k
ÿ
aij
“ p1 ´ αqk ¨ 1 ¨ lim
i´pk`1q ppk`1q´j
nÑ8
m
i“k`1 j“0
ff
D1
i
´ p ¯j´pk`1q 1
ÿ
ÿ
p1q
`
aij
m
mi´j
i“k`1
j“k`1
ff
«
˙
ˆ
p1q
D1
i´pk`1q
k
ÿ
ÿ
ak`1
α
p1q
(4.54)
“ p1 ´ αqk
`
a
`
˘pk`1q´j
ii
1´α
j“0 lim p
i“k`1
pÑ8
and by Equations (4.50) and (4.53),
D2 ÿ
i
´ m ¯k
j´pk`2q
ÿ
“
‰
1
p2q p
lim k`2 E tr2 T k “ lim
R2k`1 pmq
aij i´pk`2q
nÑ8 p
nÑ8 n
m
i“k`2 j“0
«
p2q
D
k`1
ÿ2 ÿ
aij
“ p1 ´ αqk ¨ 1 ¨ lim
i´pk`2q
nÑ8
m
ppk`2q´j
i“k`2 j“0
ff
D1
i
´ p ¯j´pk`2q 1
ÿ
ÿ
p2q
`
aij
m
mi´j
i“k`2 j“k`2
«
ff
ˆ
˙
p2q
D2
i´pk`2q
k`1
ÿ
ÿ
ak`2
α
p2q
“ p1 ´ αqk
aii
.
(4.55)
`
˘pk`2q´j `
1´α
j“0 lim p
i“k`2
pÑ8
Although we might not know what aij coefficients are, this shows at least that
the limits are finite.
In‰ particular, from “Equations
(4.54) and (4.55) we can
“
‰
conclude that E tr T 2k “ Oppk`1 q and E tr2 T k “ Oppk`2 q, which shows the
first claim of the theorem.
For the second claim, let n, p Ñ 8 with p{n Ñ α “ 0. Then Equations (4.54)
Chételat and Wells/Mid-scale Wishart asymptotics
43
and (4.55) specialize to
lim
nÑ8
1
pk`1
1
lim
nÑ8 pk`2
“
‰
p1q
E tr T 2k “ apk`1qpk`1q ,
“
‰
p2q
E tr2 T k “ apk`2qpk`2q .
(4.56)
What is interesting about this result is that these limits must be the same
regardless of the way p grows! As long as p Ñ 8 with p{n Ñ 0, the limits are
?
p1q
p2q
apk`1qpk`1q and apk`2qpk`2q , regardless of whether p „ log n or p „ n or some
other growth.
Now, Bubeck et al. [2016, Theorem 7] and Jiang and Li [2015, Theorem 1]
have shown that when p Ñ 8?with p3 {n Ñ 0, the total variation distance
between a normalized Wishart npWp pn, Ip {nq ´ Ip q matrix and a Gaussian
Orthogonal Ensemble GOEppq matrix tends to zero as n Ñ 8. Therefore, the
Hellinger distance satisfies also H 2 pψNW , ψGOE q “ H 2 pfNW , fGOE q Ñ 0 as n Ñ
8.
But convergence in Hellinger distance has strong implications for real-valued
statistics. Indeed, for T1 „ Tn{2 pIp {8q “ |ψNW |, T2 „ GOEppq{4 “ |ψGOE | and
any function g : Sp pRq Ñ R such that gpT1 q, gpT2 q are square-integrable,
ˇ
ˇ ˇˇ
”
ı ˇˇ
ˇ
ˇ
gpT q |ψNW |pT q ´ |ψGOE |pT q dT ˇˇ
ˇ ErgpT1 qs ´ ErgpT2 qs ˇ “ ˇˇ
ż
Sp pRq
ż
ˇ
ˇ
ď ˇˇ
”
ı ˇˇ
1{2
1{2
1{2
gpT qψNW pT q ψNW pT q ´ ψGOE pT q dT ˇˇ
Sp pRq
ˇ
ˇ
` ˇˇ
ż
”
ı ˇˇ
1{2
1{2
1{2
gpT qψGOE pT q ψNW pT q ´ ψGOE pT q dT ˇˇ
Sp pRq
ż
ż
„
1
gpT q2 |ψNW |pT qdT 2 `
ď
Sp pRq
ż
¨
1
gpT q2 |ψGOE |pT qdT 2
Sp pRq
ˇ
ˇ2 1
ˇ 1{2
ˇ
1{2
ˇψNW pT q ´ ψGOE pT qˇ dT 2
S pRq
p
1
1
“
‰
“
‰
“ E gpT1 q2 2 ` E gpT2 q2 2 HpψNW , ψGOE q
„
(4.57)
by the Cauchy-Schwarz inequality.
Let’s consider applying this result to gpT q “ tr T 2k {pk`1 and gpT q “ tr2 T k {pk`2 .
What do we know about these statistics? In the case where T2 „ GOEppq{4,
results of Anderson et al. [2010, Lemma 2.1.6 and the equation above Equation
(2.1.21)] provide that
„
tr T22k
Ck
lim E k`1
“ 2k
nÑ8
p
4
Chételat and Wells/Mid-scale Wishart asymptotics
44
„ 2 k
˙2
´ „ tr T k ¯2 ˆ C
tr T
k{2
2
lim E k`22
“
1
rk
evens
“ lim E k{2`1
nÑ8
nÑ8
p
4k
p
„´
„
ˆ
˙2
´
tr T22k ¯2
tr T22k ¯2
Ck
lim E
“ lim E k`1
ă8
“
nÑ8
nÑ8
pk`1
p
42k
„
„´ 2 k ¯
tr T24k
tr T2 2
C2k
ď
lim
E
lim E
“ 4k ă 8
nÑ8
nÑ8
pk`2
p2k`1
4
because these expressions only depend on p, and since p Ñ 8 as n Ñ 8, taking
a limit as n Ñ 8 is the same as taking a limit as p Ñ 8. Moreover, in the
T1 „ Tn{2 pIp {8q case, using Jensen’s inequality and Equations (4.54)–(4.55) we
can at least see that
„´
„
tr T12k ¯2
tr T14k
lim E
ď lim E 2k`1 ă 8
nÑ8
nÑ8
pk`1
p
„ 2 2k
„´ 2 k ¯
2
tr T1
tr T1
ď lim E
ă 8.
lim E
nÑ8
nÑ8
pk`2
pk`2
Therefore, using Equation (4.57) with gpT q “ tr T 2k {pk`1 and gpT q “ tr2 T k {pk`2
we find that when n, p Ñ 8 with p3 {n Ñ 0,
ˇ
ˇ
„
ˆ
„´
1
˙
2k
ˇ
Ck ˇˇ
tr T12k ¯2 2
C2k
ˇ lim E tr T1
´ 2k ˇ ď
lim E
` 2k ¨ 0 “ 0,
ˇ nÑ8
nÑ8
pk`1
4
pk`1
4
ˇ
ˇ
„ 2 k ´
¯
2ˇ
ˇ
Ck{2
ˇ lim E tr T1 ´
1rk evens ˇˇ
ˇ nÑ8
k`2
k
p
4
ˆ
„´ 2 k ¯ 12
1{2 ˙
C2k
tr T1 2
ď
lim E
` 2k ¨ 0 “ 0.
nÑ8
pk`2
4
Since p3 {n Ñ 0 implies p{n Ñ 0, we conclude from Equation (4.56) that
2
Ck{2
Ck
p1q
p2q
2
apk`1qpk`1q “ 2k ,
apk`2qpk`2q “ 2k 1rk evens .
4
4
But then, by that same equation, we conclude that when n, p Ñ 8, not only
when p3 {n Ñ 0 but for all p such that p{n Ñ 0, we have
“
‰
Ck
1
lim
E tr T 2k “ 2k ,
nÑ8 pk`1
4
(4.58)
2
“ 2 k ‰ Ck{2
1
2
lim k`2 E tr T “ 2k 1rk evens
nÑ8 p
4
for
“ T „‰Tn{2 pIp {8q. To finish the proof, use Equation (4.58) with the fact that
E tr T k “ 0 for odd k to find that
„
„ 2 k
„
2
tr T k
tr T
tr T k
lim Var k{2`1 “ lim E k`2 ´ E k{2`1
nÑ8
nÑ8
p
p
p
2
´
¯2
Ck{2
Ck{2
2
“ 2k 1rk evens ´
1
rk
evens
“ 0.
4
4k
L2
Thus tr T k {pk`1 ÝÑ Ck {42k , as desired. This proves the second claim and
concludes the proof.
Chételat and Wells/Mid-scale Wishart asymptotics
45
A pleasant consequence of this result is that when n, p Ñ 8 with p{n Ñ 0, we
can conclude a version of the semicircle law holds for the Tn{2 p2Ip q distribution.
This is interesting because the Tn{2 p2Ip q distribution has dependent entries with
heavy tails, whose distribution varies with n, p.
?
?
?
?
Let 4T { p „ 4Tn{2 pIp {8q{ p, with eigenvalues λ1 p4T { pq ě ¨ ¨ ¨ ě λp p4T { pq.
Then define its empirical spectral measure to be
p
?
1ÿ
L4T {?p pAq “
1rλi p4T { pq P As .
p i“1
Since L4T {?p depends on the random matrix T , it is a random measure on R.
Corollary 1 (Semicircle law for the t distribution). The empirical spectral
?
measure L4T {?p of a 4Tn{2 pIp {8q{ p random matrix converges weakly, in square
mean, to the semicircle distribution
ż ?
4 ´ x2
1r|x| ď 2s dx.
LpAq “
2π
A
Proof. Let f be any continuous function R Ñ R that vanishes at infinity. By
the Stone-Weierstrass theorem, there exists a sequence f1 , f2 , . . . of polynomials
such that for any ą 0, supxPR |f pxq ´ fl pxq| ă . To fix some notation, write
fl pxq “
degf
ÿl
alk xk .
k“1
Then since L4T {?p and L are both probability measures,
«ˆ ż
˙2 ff 12
ż
f pxqdL4T {?p pxq ´ f pxqdLpxq
E
R
R
«ˆ ż
˙2 ff 21
“
‰
f pxq ´ fl pxq dL4T {?p pxq
ď E
R
«ˆ ż
˙2 ff 21
ż
fl pxqdL4T {?p pxq ´ fl pxqdLpxq
`E
R
R
«ˆ ż
˙2 ff 21
“
‰
`E
fl pxq ´ f pxq dLpxq
R
ď `
degf
ÿl
k“1
«ˆ
˙2 ff 21
1 ´ 4T ¯k
|alk | E
tr ?
´ Ck{2 1rk evens
` .
p
p
By Theorem 2, the expectation tends to zero as n, p Ñ 8 with p{n Ñ 0. Thus
«ˆ ż
˙2 ff 21
ż
lim E
f pxqdL4T {?p pxq ´ f pxqdLpxq
ď 2.
nÑ8
R
R
But this is true for every ą 0, so the limit must
ş be zero. Hence for every continuous f that vanishes at infinity, the integral f dL4T {?p converges in square
Chételat and Wells/Mid-scale Wishart asymptotics
46
ş
mean to f dL. By Chung [2001, Theoremş 4.4.1 and 4.4.2], this implies that for
every bounded continuous f , the integral f dL4T {?p converges in square mean
ş
to f dL. Thus the empirical spectral distribution L4T {?p converges weakly, in
square mean, to the semicircle distribution L, as desired.
5. Wishart asymptotics: the G-transform point-of-view
We now turn our attention to the main objective of this paper, namely studying
the behavior of Wishart matrices in the various middle-scale regimes. To do
this, we exploit the close connection between the Wishart and the symmetric
t distributions and make use of the results found Section 4. The main result
of this section, Theorem 3, states that we can approximate for every middlescale regime the G-transform ψNW of a normalized Wishart by a degree-specific
function ψK . This can be seen as an analogue of Theorem 1 in the G-transform
domain.
The reasoning behind the approximations is as follows. We could imagine
writing ψNW from Proposition 3 in exponential form, and expanding the terms
as a Taylor series would yield
ˇ
ˇ*
"
ˇ
?
4T ˇˇ
n`p`1
ˇ
log ˇIp ` i ? ˇ
ψNW pT q “ Cn,p exp 2i n tr T ´
2
n
"
ˆ
˙k *
8
´
?
n ` p ` 1 ÿ p´iqk p ¯ k2
4T
tr ?
.
“ Cn,p exp 2i n tr T `
2
k
n
p
k“1
Now imagine that the T ’s appearing in the expression follow a Tn{2 pIp {8q dis` 4T ˘k
tribution. By Theorem 2, we know that tr ?
“ Θppq when k is even, in
p
` 4T ˘k
2
an L sense. When k is odd, the theorem merely proves that tr ?
“ oppq,
p
k
but for a GOEppq matrix Z, we know that tr ?Zp is asymptotically normal
for odd k by Anderson et al. [2010, Theorem 2.1.31]. This would suggest that
` 4T ˘k
tr ?
“ Θp1q when k is odd. Thus we would have, in some sense,
p
"ÿ
ˆ k{2`1 ˙ ÿ
ˆ k{2 ˙ *
8
8
p
p
ψNW pT q “ Cn,p exp
Θ
`
Θ
k{2´1
k{2´1
n
n
k“2
k“2
even
“ Cn,p exp
"ÿ
8
k“0
odd
ˆ
Θ
k`2
p
nk
8
ÿ
˙
`
k“1
˜c
Θ
pp2k´1q`2
n2k´1
¸*
.
In other words, terms in the power series would be associated with some degree
K, such that they would be non-negligible in any middle-scale regime of degree
up to K, and negligible in higher degrees. In fact, a similar phenomenon occurs
with Cn,p , by Lemma 1. This suggests we should try truncating these power
series to derive degree-specific approximations.
Definition 3 (G-transform approximations). For any K P N, define the K th
Chételat and Wells/Mid-scale Wishart asymptotics
47
degree approximation ψK : Sp pRq Ñ C as
$ 2K`3`
,
2K`2´
’
/
odds
1
rK odds
& 1rK
.
ÿ
ÿ
¯
¯
´
´
k
k
k
k
pKq
p `1
4i tr T
4i tr T
ψK pT q “ Cn,p exp n
?
?
`
’
/
%2
n
k
2
n
k k“2
with
pKq
Cn,p
“
2
pp3p`1q
4
π
ppp`1q
4
k“1
" K`1
1 ÿ 1rk evens pk`2
exp ´
2 k“1 kpk`1qpk`2q nk
*
K`1
1 ÿ 1`21rk evens pk`1
´
.
4 k“1
kpk`1q
nk
Just like the G-transform of a normalized Wishart matrix, these functions
implicitly depend on n. The first three are
"
*
pp3p`1q
32
p`1
p`1
2 4
tr T 2 ,
ψ0 pT q “ ppp`1q exp ´4 tr T 2 ´i ? tr T 3 `2i ? tr T ´4
3 n
n
n
π 4
" 2
pp3p`1q
2 4
32
32
512
p
ψ1 pT q “ ppp`1q exp ´
´4 tr T 2 ´i ? tr T 3 ` tr T 4 `i 3{2 tr T 5
8n
3 n
n
5n
π 4
*
p
`
1
p
`
1
32pp
` 1q
1024
6
2
3
tr T `2i ? tr T ´4
tr T ´i
tr T
´
3n2
n
n
3n3{2
and
"
pp3p`1q
2 4
p4
32
32
p2
ψ2 pT q “ ppp`1q exp ´
´4 tr T 2 ´i ? tr T 3 ` tr T 4
´
2
48n
8n
3
n
n
4
π
512
1024
8192
p`1
`i 3{2 tr T 5 ´
tr T 6 ´i 5{2 tr T 7 `2i ? tr T
2
3n
n
5n
7n
p`1
32pp
`
1q
p
`
1
´4
tr T 2 ´i
tr T 3 `32 2 tr T 4
3{2
n
n
3n
*
512pp ` 1q
1024pp ` 1q
5
6
`i
tr
T
´
tr
T
.
3n3
5n5{2
These functions have the pleasant property that their modulus is bounded, up
to a constant, by the G-conjugate density |ψK |. Indeed, on one hand we can
rewrite Definition 3 into
K`1`
$
1rK
odds
’
? 2k
ÿ
&
n
tr p4T { nq
pKq
ψK pT q “ exp log Cn,p `
p´1qk
’
2
2k
%
k“1
K`1´
1rK odds
p`1
`
2
ÿ
p´1q
k“1
?
k tr p4T {
2k
2k
nq
K`1
n
´i
2
ÿ
k“1
p´1qk
? 2k`1
tr p4T { nq
2k ` 1
Chételat and Wells/Mid-scale Wishart asymptotics
48
,
? 2k`1 /
.
tr p4T { nq
´i
p´1qk
. (5.1)
/
2
2k ` 1
k“1
?
`
˘
On the other hand, for any x P R, we can write 1 ` ix “ 1 ` x2 exp i atanpxq
with the arctangent function taking values in p´π{2, π{2q. Thus by Proposition
3 we can rewrite ψNW as
ˇ
ˇ
"
ˇ
16T 2 ˇˇ
n`p`1
ˇ
log ˇIp `
ψNW pT q “ exp log Cn,p ´
4
n ˇ
ˆ
˙
*
?
n`p`1
4T
´i
tr atan ?
` 2i n tr T ,
(5.2)
2
n
with the understanding that the matrix-variate arctangent function operates on
eigenvalues by functional calculus. Now, for any x P R and odd integer L, there
is an elementary inequality
L
ÿ
1
x2l
ď ´ logp1 ` x2 q.
p´1ql
2l
2
l“1
K
ÿ
p`1
Notice that K ` 1 ˘ 1rK odds is always an odd integer. Thus, from the above
inequality and Equations (5.1) and (5.2), we can derive the bound
ˇ
! ´n p ` 1¯
ˇ ˇ
16T 2 ˇˇ)
ˇ
pKq
ˇψK ˇpT q ď Cn,p
exp ´
`
log ˇIp `
ˇ
4
4
n
pKq
ˇ
Cn,p ˇˇ
“
ψNW ˇpT q.
(5.3)
Cn,p
In particular, since ψNW is integrable whenever n ě p ´ 2 by Proposition 3,
Equation (5.3) implies that every ψK must also be integrable whenever n ě p´2.
In particular, for large enough n it makes sense to talk about the asymptotic
total variation or Hellinger distance between ψNW and ψK .
We now state the main result, which is that each function ψK approximates
the G-transform of a normalized Wishart for all middle-scale regimes of degree
K or lower, but no other.
log p
Theorem 3.Let lim log
n ă 1 as n Ñ 8. For any K P N, the total varianÑ8
tion
distance
between
the
G-transform of the normalized Wishart distribution
?
nrWp pn, Ip {nq ´ Ip s and the K th approximating function ψK satisfies
ż
`
˘
dTV ψNW , ψK “
ˇ
ˇ
ˇψNW pT q ´ ψK pT qˇ dT Ñ 0
as n Ñ 8
Sp pRq
if and only if pK`3 {nK`1 Ñ 0.
Proof. If statement. For the first part of the theorem, remark that by Equation
(3.7) it is equivalent to show that the Hellinger distance tends to zero, i.e. that
ż
`
˘
H2 ψNW , ψK “
ˇ
ˇ2
ˇ 1{2
ˇ
1{2
ˇψNW pT q ´ ψK pT qˇ dT Ñ 0
Sp pRq
as n Ñ 8
Chételat and Wells/Mid-scale Wishart asymptotics
49
when pK`3 {nK`1 Ñ 0. To control this quantity, we use the Kullback-Leibler
inequality for G-transforms. Notice that for any x P R and L P N,
ˇ
ˇ
L´1
ˇ 1
2l ˇ
ÿ
x2L
ˇ
2
lx ˇ
p´1q
,
(5.4)
ˇ ď
ˇ´ logp1 ` x q ´
ˇ 2
2l ˇ
2L
l“1
ˇ
ˇ
L´1
ˇ
2l`1 ˇ
ÿ
x2L
x
ˇ
ˇ
p´1ql
.
(5.5)
ˇ ď
ˇatanpxq ´
ˇ
2l ` 1 ˇ
2L
l“1
Let Log stand for the principal branch of the complex logarithm, and let us
study Log ψNW {ψK . Its real part can be bounded by
ˇ
ˇ
ˇ ˇˇ
ˇ
ˇ
2ˇ
ˇ
ˇ
ˇ
pKq
ˇ< Log ψNW pT q ˇ “ ˇˇ log Cn,p ´ n ` p ` 1 log ˇIp ` 16T ˇ ´ log Cn,p
ˇ
ˇ
ψK pT q ˇ ˇ
4
n ˇ
ˇ
K`1`
K`1´
k“1
k“1
1rK
odds
1rK
odds
? 2k
? 2k
ÿ
ÿ
n
p`1
tr p4T { nq
k tr p4T { nq
´
´
p´1q
p´1qk
2
2k
2
2k
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
K`1`
ˇ
ˇ
1rK
odds
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
?
ÿ
2k
ˇ
ˇ
2ˇ
ˇ
ˇ nˇ 1
ˇ
16T
tr
p4T
{
nq
ˇ
pKq
k
ˇ´
ď ˇˇ log Cn,p ´log Cn,p ˇˇ ` ˇ´ log ˇˇIp `
p´1q
ˇ
ˇ
2ˇ 2
n ˇ
2k
ˇ
ˇ
k“1
K`1´
ˇ
ˇ
odds
ˇ
ˇ
ˇ 1rK
? 2k ˇˇ
ÿ
ˇ
2
ˇ
16T ˇˇ
p`1ˇ 1
tr p4T { nq ˇ
´
`
p´1qk
ˇ´ log ˇˇIp `
ˇ.
ˇ
ˇ
2 ˇ 2
n
2k
ˇ
ˇ
k“1
By Equation (5.4), this can be bounded by
ˇ
ˇ
?
ˇ
ˇ n trp4T { nq2K`4`21rK odds
pKq ˇ
ˇ
ď ˇ log Cn,p ´log Cn,p ˇ `
2 2K ` 4 ` 21rK odds
?
p ` 1 trp4T { nq2K`4´21rK odds
`
2
2K ` 4 ´ 21rK odds
ˇ
ˇ
2K`3`21rK odds
ˇ
ˇ
4
tr T 2K`4`21rK odds
pKq ˇ
“ ˇˇ log Cn,p ´log Cn,p
ˇ ` K ` 2 ` 1rK odds nK`1`1rK odds
42K`3´21rK odds pp ` 1q tr T 2K`4´21rK odds
.
(5.6)
K ` 2 ´ 1rK odds
nK`2´1rK odds
We can bound the imaginary part of Log ψNW {ψK in a similar way. Define
x
Pp´π,πs : R Ñ p´π, πs to be the projection mapping Pp´π,πs x “ x ´ 2πr 2π
´ 12 s.
A plot is given as Figure 4.
It satisfies = Log z “ Pp´π,πs = log z for all branches of log z, as well as the
inequality |Pp´π,πs x| ď |x|. Using this mapping, we can see that the imaginary
`
Chételat and Wells/Mid-scale Wishart asymptotics
50
y
π
-5π
-3π
-π
π
3π
5π
x
-π
Fig 4. Plot of Pp´π,πq on p´5π, 5πs.
part of Log ψNW {ψK can be bounded as
ˇ
»
ˇ ˇˇ
ˇ
ˆ
˙
ˇ
ˇ
?
n`p`1
4T
ˇ= Log ψNW pT q ˇ “ ˇˇ Pp´π,πs—
tr atan ?
` 2 n tr T
–´
ˇ
ˇ
ˇ
ψK pT q
2
n
ˇ
fiˇ
K
? 2k`1
? 2k`1 ˇˇ
ÿ
p`1
tr p4T { nq
tr p4T { nq
ffiˇ
`
`
p´1qk
p´1qk
flˇ
ˇ
2
2k ` 1
2
2k ` 1
ˇ
k“1
k“1
ˇ
ˇ
ˇ
K`1
ˆ
˙
?
? 2k`1 ˇˇ
ÿ
4T
2 n tr T
n ˇˇ
ˇ
k tr p4T { nq
´
´
ď ˇ tr atan ?
p´1q
ˇ
ˇ
2ˇ
n
n{2
2k ` 1
ˇ
ˇ
k“1
ˇ
ˇ
ˇ
K
˙ ÿ
ˆ
? 2k`1 ˇˇ
ˇ
p`1ˇ
4T
tr p4T { nq
ˇ
`
´
p´1qk
ˇ tr atan ?
ˇ.
ˇ
2 ˇ
n
2k ` 1
ˇ
ˇ
k“1
K`1
ÿ
n
By Equation (5.5), this can be bounded by
?
?
p ` 1 trp4T { nq2K`2
n trp4T { nq2K`4
`
ď
2
2K ` 4
2
2K ` 2
2K`3
2K`4
2K`1
4
tr T
4
pp ` 1q tr T 2K`4
ď
`
.
(5.7)
K`1
K `2 n
K `1
nK`1
Recall that the G-conjugate of the normalized Wishart distribution is the t distribution with n{2 degrees of freedom and scale matrix Ip {8, denoted Tn{2 pIp {8q
– see Equation (3.24) and Section 4 for details. Let us bound the expectations of
these absolute real and imaginary parts under this distribution. By Equations
(5.10), (5.6), (5.7) and Theorem 2, we find that for T „ |ψNW | “ Tn{2 pIp {8q,
‰
“
ˇ
„ˇ
2K`3`21rK odds E tr T 2pK`2`1rK oddsq
ˇ
ˇ
ψ
pT
q
4
NW
ˇ ď
E ˇˇ< Log
ψK pT q ˇ
K ` 2 ` 1rK odds
nK`1`1rK odds
“
‰
´ pK`3 ¯
42K`3´21rK odds pp ` 1q E tr T 2pK`2´1rK oddsq
`
`
o
K ` 2 ´ 1rK odds
nK`1
nK`2´1rK odds
ˆ K`2`1rK odds`1 ˙
ˆ
˙
´
K`2´1rK odds`1
K`3 ¯
p
p¨p
p
ď O
`O
` o K`1
K`1`
1
odds
K`2´
1
odds
rK
rK
n
n
n
Chételat and Wells/Mid-scale Wishart asymptotics
“ O
51
´ pK`3 ¯
(5.8)
nK`1
and
“
‰
“
‰
ˇ
„ˇ
2K`3 E tr T 2pK`2q
2K`1 pp`1qE tr T 2pK`2q
ˇ
ˇ
ψ
pT
q
4
4
NW
ˇ ď
E ˇˇ= Log
`
ψK pT q ˇ
K `2
nK`1
K `1
nK`1
ˆ K`2`1 ˙
ˆ
˙
´ pK`3 ¯
p
p ¨ pK`2`1
ď O
(5.9)
`O
“ O K`1
K`1
K`2
n
n
n
as n Ñ 8 with p{n Ñ 0.
Moreover, from Lemma 1, we see that
" ˆ K`3 ˙*
p
p
pKq
Cn,p “ Cn,p exp o
as n Ñ 8 with Ñ 0.
(5.10)
K`1
n
n
Thus, from Equations (5.3) and (5.10), we see that when pK`3 {nK`1 Ñ 0, the
asymptotic L1 norm of ψK is bounded by
ż
ż
!
lim
nÑ8
ˇ
ˇ
ˇψK pT qˇ dT ď lim exp ´o
nÑ8
´ pK`3 ¯)
nK`1
Sp pRq
ˇ
ˇ
ˇψNW pT qˇ dT “ 1.
(5.11)
Sp pRq
In fact, at the end of this proof we will see that this bound is sharp and the
limit must be exactly 1.
Using Equations (5.8), (5.9) and (5.11) with Proposition (1) implies that
when pK`3 {nK`1 Ñ 0,
´
¯
0 ď lim H2 ψNW , ψK
nÑ8
ż
ż
„
ď
lim
nÑ8
|ψK |pT q dT ´ 1 ` 0 ` 2 lim
|ψK |pT q dT 2 ¨ 0 2
Sp pRq
Sp pRq
nÑ8
1
2
1
2
1
1
ď r1 ´ 1s ` 0 ` 2 ¨ 1 ¨ 0 “ 0.
`
˘
Thus` H2 ψNW˘, ψK Ñ 0, hence by Equation (3.7) we must have the limit
dTV ψNW , ψK Ñ 0, as desired.
Only if statement. For the second part of the theorem, assume
that˘ the total
`
variation distance satisfies dTV pψNW , ψK q Ñ 0, hence H ψNW , ψK Ñ 0 by
Equation (3.7), as n Ñ 8. We will show by contradiction this implies that
pK`3 {nK`1 Ñ 0.
log p
Assume this wasn’t the case. Since limnÑ8 log
n ă 1, there must be an L P N
such that pL`3 {nL`1 Ñ 0, and since pK`3 {nK`1 Û 0, we must have K ă L.
By Equation (5.8), we must have for T „ |ψNW | “ Tn{2 pIp {8q that
ˇ
„ˇ
´ pL`3 ¯
ˇ
ψNW pT q ˇˇ
ˇ
lim E ˇ< Log
ď lim O L`1 “ 0,
ˇ
nÑ8
nÑ8
ψL pT q
n
so
1
ψNW pT q L1
< Log
ÝÑ 0.
(5.12)
2
ψL pT q
Chételat and Wells/Mid-scale Wishart asymptotics
52
Now write, by Equation (5.1) and Definition 3,
L`1`
RpT q ”
1
ψL pT q
1
< Log
“ log
2
ψK pT q
2
1rLÿ
odds
ˆ
˙2k
n
p´1qk
4T
`
tr ?
4
2k
n
pLq
Cn,p
pKq
Cn,p
K`2`
k“1rK odds
L`1´
1rLÿ
odds
ˆ
˙2k
p`1
p´1qk
4T
tr ?
`
4
2k
n
K`2´
k“1rK odds
“ ´
L`1
ÿ 1`21rk evens pk`1
1 ÿ
1rk evens pk`2 1 L`1
´
4 k“K`2 kpk`1qpk`2q nk
8 k“K`2 kpk`1q
nk
L`1`
`
1rLÿ
odds
n
4
L`1´
p´1qk ´ p ¯k
tr
2k
n
ˆ
4T
?
p
˙2k
`
p`1
4
K`2`
k“1rK odds
1rLÿ
odds
ˆ
˙2k
4T
p´1qk ´ p ¯k
tr ?
.
2k
n
p
K`2´
k“1rK odds
But as pL`3 {nL`1 , we must have p{n Ñ 0, so by Theorem 2, we have
1
p
L2
4T 2k
trp ?
Ñ
pq
Ck . Moreover, as we assumed that pK`3 {nK`1 Û 0, we must have p Ñ 8. Thus
L`1
1 ÿ
1rk evens pk´K´1
nK`1
RpT
q
“
´
pK`3
4 k“K`2 kpk`1qpk`2q nk´K´1
L`1`
1
1`21rk evens 1 pk´K´1
1
`
8 k“K`2 kpk`1q
p nk´K´1
4
L`1
ÿ
´
1rLÿ
odds
p´1qk pk´K´2 1
tr
2k nk´K´2 p
ˆ
4T
?
p
˙2k
ˆ
4T
?
p
˙2k
K`2`
k“1rK odds
L`1´
1
`
4
L2
ÝÑ 0 ` 0 `
“
1rK evens
8pK ` 2q
ˆ
1
1`
p
odds
˙ 1rL
ÿ
p´1qk pk´K´1 1
tr
2k nk´K´1 p
K`2´
k“1rK odds
CK`2 `
1rK odds
8pK ` 1q
CK`1
CK`1`1rK evens
ą 0.
8pK ` 1 ` 1rK evensq
Then by the reverse triangle inequality,
ż
`
˘
0 “ lim H2 ψNW , ψK “ lim
nÑ8
nÑ8
ˇ
ˇ2
ˇ 1{2
ˇ
1{2
ˇψNW pT q ´ ψK pT qˇ dT
Sp pRq
(5.13)
Chételat and Wells/Mid-scale Wishart asymptotics
53
ż
ď
lim
nÑ8
ˇ2
ˇ
ˇ
ˇ
ˇ|ψNW |1{2 pT q ´ |ψK |1{2 pT qˇ dT
Sp pRq
«ˇ
ˇ2 ff
"
*
ˇ
ˇ
1
ψ
pT
q
K
“ lim E ˇˇ exp
< Log
´ 1ˇˇ
nÑ8
2
ψNW pT q
for a T „ |ψNW | “ Tn{2 pIp {8q, that is
"
*
1
ψK pT q
L2
exp
< Log
ÝÑ 1.
2
ψNW pT q
Since Lp convergence implies convergence in probability, by the continuous mapping theorem we must have
ψK pT q P
1
< Log
ÝÑ 0
2
ψNW pT q
as n Ñ 8, so by Equation (5.12)
ψK pT q
1
ψNW pT q P
1
´ < Log
ÝÑ ´0 ´ 0 “ 0.
RpT q “ ´ < Log
2
ψNW pT q 2
ψL pT q
But then, from Equation (5.13) and Slutsky’s lemma [van der Vaart, 2000,
Lemma 2.8 (iii)],
ˆ K`1
˙´1
pK`3
n
P 8pK ` 1 ` 1rK evensq
¨ 0 “ 0.
“
RpT
q
RpT q ÝÑ
K`1
K`3
n
p
CK`1`1rK evens
K`3
as n Ñ 8. As pK`3 {nK`1 is deterministic, this
{nK`1 Ñ 0
` implies ˘that p
2
as n Ñ 8, a contradiction. Thus whenever H ψNW , ψK Ñ 0 as n Ñ 8 with
lim log p ă 1, we must have pK`3 {nK`1 Ñ 0, as desired. This concludes the
nÑ8 log n
proof.
Although Theorem 3 states that the functions ψK approximate ψNW , there
is no guarantee that they are G-transforms of a probability density. In other
words, nothing guarantees that their inverse G-transforms f˜K “ G ´1 tψK u are
real-valued, non-negative and integrate to unity. However, the reverse triangle
inequality applied to the L2 -norm provides that
ż
ˇ
ˇ
ˇ
ż
|ψNW pT q| dT 2 ´
ˇ
`
˘
1ˇ
|ψK pT q| dT 2 ˇ ď H ψNW , ψK ,
Sp pRq
Sp pRq
1
so Theorem 3 and the Plancherel theorem implies that
ż
lim
nÑ8
ż
|f˜K pT q| dT “ lim
|ψK pXq| dX “ 1
Sp pRq
Sp pRq
nÑ8
(5.14)
when pK`3 {nK`1 Ñ 0. That is, the theorem at least guarantees that |f˜K | is
asymptotically a density in its associated regime. We discuss this further in
Section 6.
Chételat and Wells/Mid-scale Wishart asymptotics
54
We independently know, by the results of Jiang and Li [2015] and Bubeck
et al. [2016], that a Gaussian orthogonal ensemble approximation holds in the
classical regime. Although ψ0 is not the G-transform of a GOEppq, a simple
Kullback-Leibler argument is sufficient to prove that it approximates ψGOE for
0th degree regimes.
Proposition 4. The total variation distance between the 0th degree G-transform
approximation ψ0 and the Gaussian orthogonal ensemble G-transform ψGOE
satisfies dTV pψ0 , ψGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0.
Proof. We use a similar strategy to Theorem 3: namely, by Equation (3.7) is it
equivalent to prove that Hpψ0 , ψGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0, and to control that quantity we can use the Kullback-Leibler inequality for G-transforms.
Let T „ |ψGOE | “ GOEppq{4. Since the Gaussian orthogonal ensemble has
been extensively studied, we understand well its empirical moments.
“
‰For example, according to Anderson et al. [2010, Lemma 2.2.2], we have E tr T 2 “ Opp2 q,
while
(2.1.45) of the same book we have Er| tr T |s “ Opp1{2 q and
“ from
‰ Equation
3
3{2
E | tr T | “ Opp q. Then from Definition 3 and Proposition 2, and using the
projection map Pp´π,πq as in the proof of Theorem 3, we find that
ˆ 3˙
„
‰
p`1 “
p
ψGOE pT q
2
“ ´4
E tr T “ O
E < Log
ψ0 pT q
n
n
and
ˇ
„ˇ
„
„ˇ
ˇ
ˇ
ˇ
ˇ
ψGOE pT q ˇˇ
p`1
3
ˇPp´π,πq ´ 32
ˇ
?
?
E ˇˇ= Log
“
E
tr
T
`
tr
T
ˇ
ˇ
ˇ
ψ0 pT q
3 n
n
ˆc 3 ˙
‰
p`1
p
32 “
.
ď ? E | tr T 3 | `2i ? Er| tr T |s “ O
3 n
n
n
ş
Since Sp pRq |ψ0 |pT qdT Ñ 0 when n Ñ 8 with p3 {n Ñ 0 by Equation (5.14), if
we apply Proposition 1 we find thatt
1
1
lim H2 pψ0 , ψGOE q ď 0 ` 0 ` 2 ¨ 1 2 ¨ 0 2 “ 0
nÑ8
for p3 {n Ñ 0. By Equation (3.7), this concludes the proof.
As a consequence, HpfNW , fGOE q “ HpψNW , ψGOE q ď HpψNW , ψ0 q`Hpψ0 , ψGOE q Ñ
0 when n Ñ 8 with p3 {n Ñ 0 by Theorem 3 and Proposition 4. Hence
dTV pfNW , fGOE q Ñ 0 by Equation (2.1) in the classical setting. This provides an
alternative proof of the results of Jiang and Li [2015] and Bubeck et al. [2016].
6. Wishart asymptotics: the density point-of-view
In Section 5,?we studied the asymptotic behavior of the normalized Wishart
distribution nrWp pn, Ip {nq ´ Ip s using its G-transform ψNW . In particular,
we derived an approximation to ψNW for every middle-scale regime of a given
degree. But although it is equivalent to study a probability distribution from a
density or a G-transform point of view, it is still natural to wonder if we can find
Chételat and Wells/Mid-scale Wishart asymptotics
55
approximations to the density of a normalized Wishart for every middle-scale
regime of a given degree.
Recall from Theorem 3 that dTV pψNW , ψK q Ñ 0 when pK`3 {nK`1 Ñ 0.
Define f˜K “ G ´1 tψK u. In general, there is no guarantee that these should be
real-valued. On the other hand, we know from Equation (5.3) that whenever
n ě p ´ 2, ψK must be integrable, and since the G-transform maps integrable
functions to integrable functions, f˜K must also be integrable. In fact, according to Equation (5.14), we know |f˜K | must be asymptotically a density when
pK`1 {nK`1 Ñ 0. This suggests we define the following densities.
Definition 4 (Density approximations). For any K P N and n ě p ´ 2, define
the K th degree density approximation as
|f˜K |pXq
,
fK pXq “ ş
|f˜K pY q|dY
Sp pRq
where f˜K “ G ´1 tψK u and ψK is as in Definition 3. The distribution on the real
symmetric matrices with density fK will be denoted FK .
The main interest is that we can asymptotically approximate the density fNW
of a normalized Wishart by the bona fide densities fK . This was the content
of Theorem 1 from Section 1, which we now prove as a simple corollary of its
G-transform analogue Theorem 3 from Section 5.
Proof of Theorem 1. As in the rest
? of this paper, we write the density of the
normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s by fNW , and by Definition 4 the density of FK is fK . Notice that by Equation (2.1), to prove
dTV pfNW , fK q Ñ 0 it is equivalent to prove that HpfNW , fK q Ñ 0. From the
triangle inequality, the reverse triangle inequality, Theorem 3 and Equation
(5.14),
´
¯
´
¯
´
¯
lim H fNW , fK ď lim H fNW , |f˜K | ` lim H |f˜K |, fK
nÑ8
nÑ8
nÑ8
ż
ˇ
ˇ2
1
ˇ 1{2
ˇ
1{2
ˇfNW pXq ´ |f˜K |pXqˇ dX 2
“ lim
nÑ8
Sp pRq
ż
ˇ
ˇ 1{2
ˇ|f˜ |pXq ´ ş
ˇ K
` lim
nÑ8
Sp pRq
ˇ2
1{2
ˇ
|f˜K |pXq
ˇ dX 12
ˇ
1{2
˜
|fK |pY qdY
Sp pRq
ż
ď lim
nÑ8
ˇ
ˇ2
1
ˇ 1{2
ˇ
1{2
ˇfNW pXq ´ f˜K pXqˇ dX 2
Sp pRq
ż
ˇ
ˇ
` lim ˇˇ1 ´ ş
nÑ8
ˇ
ˇ
1
ˇ
ˇ
1{2
˜
|
f
|pY
qdY
K
Sp pRq
1
|f˜K |pXqdX 2
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
56
ˇ
1 ˇˇ
ˇ
“ 01{2 ` ˇ1 ´ 1{2 ˇ ¨ 11{2 “ 0.
1
when pK`3 {nK`1 Ñ 0. Thus HpfNW , fK q, hence dTV pfNW , fK q, tends to zero
when n Ñ 8 with pK`3 {nK`1 Ñ 0, as desired.
We defined fK in terms of the inverse G-transform of the ψK functions given
by Definition 3. How can we express this explicitely? By Equation (5.3), we see
that |ψK |pT q is asymptotically bounded by the Tn{2 pIp {8q density |ψNW |pT q,
which is integrable whenever n ´ p ` 2 ě 0. But |ψNW |1{2 pT q is proportional
n
Ip q density in the sense of Definition 2, which is integrable for
to a Tm{4 p 4m
m{4 ě p{2 ´ 1, that is whenever n ´ 3p ` 3 ě 0. Thus |ψNW |1{2 pT q and therefore
|ψK |1{2 pT q is integrable whenever n ´ 3p ` 3 ě 0. Hence we can use the Fourer
inversion theorem to conclude that fK is proportional to the integral
ˇ
ˇ
ˇ
ˇ
fK pXq 9 ˇG ´1 tψK uˇpXq
ˇ
ˇ
ˇ
9 ˇ
ˇ
ż
2K`3`
1rK
odds
ÿ
´ 4i ¯k tr T k
n
?
exp i trpXT q `
4
n
k
#
k“2
Sp pRq
2K`2´
1rK
odds
+ ˇ2
ÿ
ˇ
´ 4i ¯k tr T k
p `1
ˇ
?
`
dT ˇ
ˇ
4
n
k
(6.1)
k“1
?
whenever n ´ 3p ` 3 ě 0. In particular, if we do a change of variables Z “ 8T ,
we obtain Equation (1.3) from Section 1 whenever n ě 3p ´ 3, from which we
can derive Equations (1.1) and (1.2).
It would be quite pleasant if there was a way to solve the integral in Equation
(6.1) or (1.3) and obtain a (potentially quite complicated) closed form expression
for fK up to its normalization constant. So far, our efforts have been unfruitful.
We close our discussion with a final remark. At the end of Section 5, we
showed that ψ0 approximates ψGOE in 0th degree middle-scale regimes, from
which the classical asymptotic normality follows. It is natural to wonder if f0
approximates fGOE in the same context. An argument similar to that of Theorem 1 shows this is the case.
Proposition 5. The total variation distance between the 0th degree density approximation f0 and the Gaussian orthogonal ensemble G-transform fGOE satisfies dTV pf0 , fGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0.
Proof. The Hellinger distance between f0 and fGOE satisfies
´
¯
´
¯
´
¯
lim H f0 , fGOE ď lim H f0 , |f˜0 | ` lim H |f˜0 |, fGOE
nÑ8
nÑ8
nÑ8
ż
ˇ
ˇ
ď lim ˇˇ1 ´ ş
nÑ8
Sp pRq
ˇ
ˇ
1
ˇ
ˇ
1{2
˜
|f |pY qdY
´
¯
1
|f˜0 |pXqdX 2 ` lim H f˜0 , fGOE
nÑ8
0
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
57
ˇ
´
¯
1 ˇˇ
ˇ
“ ˇ1 ´ 1{2 ˇ ¨ 11{2 ` lim H ψ0 , ψGOE “ 0.
nÑ8
1
By Equation (2.1), the result follows.
Of course, we could conclude from this that HpfNW , fGOE q ď HpfNW , f0 q `
Hpf0 , fGOE q Ñ 0 when n Ñ 8 with p3 {n Ñ 0, offering yet again another
proof that a Gaussian orthogonal ensemble approximation holds in the classical
setting.
7. The effect of phase transitions
Although we have established the existence of phase transitions, it does not shed
much light on how the behavior of a normalized Wishart distribution might differ
across phase transitions. To do this, it can be very illuminating to study the
asymptotics of some of its statistics. For example, we could study its empirical
moments.
?
For a normalized Wishart matrix X „ nrWp pn, Ip {8q ´ Ip s, a direct computation yields
„ˆ
˙
ˆ ˙
2
1 ´ X ¯2
5
4
8
20
20
5
1
E
tr ?
´1
“ 2` 3`
` 2 ` 3 “ 2 `o
p
p
p
p
np np
np
p
p2
so in every middle-scale regime, that is whenever n, p Ñ 8 with p{n Ñ 0,
?
›
›
´
¯
›
› 1 ´ X ¯2
5
all middle-scale
›
› tr ?
„
´
1
.
› 2
›p
regimes
p
p
L
Thus we have L2 convergence of the second empirical moment to 1, but otherwise nothing very interesting. There doesn’t seem to be any change of behavior
across the different middle-scale regimes. In contrast, the situation with the
symmetric t distribution is striking, and illustrates yet again that middle-scale
regime behavior becomes clearer under a G-transform. Indeed, we know from
4T 2
Theorem 2 that for a T „ Tn{2 pIp {8q, the quantity p1 trp ?
p q also converges to
1, but we know more. At Equation (4.41), we computed the exact L2 distance
4T 2
between p1 trp ?
p q and 1, and found that
˙
„ˆ
2
m5
1 ´ 4T ¯2
E
tr ?
´1
“
p
p
pm´6q pm´2q pm´1q pm`1q pm`3q
˙
„
ˆ
2
p2
2
p2
5
1
¨ 2`
` 2 `o
`
`
.
p
m m
p2
m m2
Thus the L2 distance must have middle-scale asymptotics
›
›
› 1 ´ 4T ¯2
›
› tr ?
´ 1››
›p
p
L2
Chételat and Wells/Mid-scale Wishart asymptotics
?
$
5
’
’
’
’
’
p
’
’
’
’
’
’
?
1
’
2
’
’
& 5 ` 2α ` α p
?
„
1
’
“ 5α´1 ` 2 ` α ?
’
’
n
’
’
?
’
’
´2
´1
’ “ 5α ` 2α ` 1 p
’
’
n
’
’
’
p
’
%
n
58
for
p2
Ñ0
n
for
p2
Ñα
n
for
¯
´
p2
second or higher
Ñ8
degree
n
´
`
classical or first
degree
second degree
¯
˘
(7.1)
4T 2
as n, p Ñ 8 with p{n Ñ 0. Thus there is a sharp change in behavior of p1 trp ?
pq
?
when p grows like n, and despite the symmetric t distribution satisfying a
semicircle law according to Corollary 1, it must ultimately behave differently
than a Gaussian orthogonal ensemble matrix. The first-order asymptotics look
the same: it is rather in the rate of this convergence that they differ.
This matters for both the symmetric t and the Wishart distribution because
rates of convergence can be distinguished in the strong topology. As a simple
example, consider the sequence of one-dimensional distributions
`
˘
`
˘
Fp “ N 0, 1{p ,
and Gp “ N 0, 1{p2 .
In the weak topology, these are asymptotically the same, since they converge to
the same distribution – namely Fp , Gp ñ δ0 as p Ñ 8, for δ0 the Dirac measure
at 0. In other words, in a metric that induces the weak topology such as the
Lévy metric,
dLévy pFp , Gp q Ñ 0.
Yet, by a direct computation of the Hellinger distance, which induces the strong
topology,
d
´
¯1{4
?
4p
dHellinger pFp , Gp q “ HpFp , Gp q “ 2 1 ´ 2
p ` 2p ` 1
?
Ñ 2ą0
as p Ñ 8. Thus it is clear that the strong topology captures rates of convergence in a way that the weak topology
can’t. But then, we should expect
?
a phase transition when p grows like n for the Tn{2 pIp {8q distribution. And
since the symmetric t is the G-conjugate
of the Wishart, this should imply a
?
phase transition when p grows like n for the Wishart distribution as well. This
is consistent with Theorem 3, and provides an alternative explanation for the
existence of the second phase transition.
A natural question then is to ask whether we can find symmetric t statistics
that exemplify all the middle-scale regime phase transitions. It is tempting to
look at the L2 error of the other empirical moments of the symmetric t distribution, because we can use the methodology developed in Section 4 to compute
their asymptotics to arbitrary order. As a reference, we compiled a table of the
Chételat and Wells/Mid-scale Wishart asymptotics
Normalized empirical moment
1 ´ 4T ¯
tr ?
p
p
1 ´ 4T ¯2
tr ?
p
p
1 ´ 4T ¯3
tr ?
p
p
1 ´ 4T ¯4
tr ?
p
p
Limit
Asymptotics of its squared L2 error
0
2
p2
C1 “ 1
5
2
p2
`
` 2
2
p
m
m
0
24
p2
C2 “ 2
50
25p2
97
`
`
2
p
m
m2
59
Table 1
Asymptotics of small normalized empirical moments of T „ Tn{2 pIp {8q.
few first few moments as Table 1.
As can be seen from the table, the odd moments seem to have uniform behavior across all middle-scale regimes. In contrast, the even ?
moments seem to
all change asymptotics at the second phase transition p “ Θp nq, but nowhere
else. Hence finding statistics that “flag” the other phase transitions remain an
open question.
8. Auxiliary results
This section compiles several lemmas used elsewhere in the article.
Lemma 3 (First derivatives lemma).For any indices 1 ď i1 , . . . , i2l ď p and real
symmetric matrix Z, there exist polynomials aJ,s pn, mq in n and m “ n ´ p ´ 1,
indexed by 0 ď s ď l and J “ pj1 , . . . , j2l q, such that
"
*
ˇ ˇm
Bs
Bs
Bs
n
...
exp ´ tr Z ˇZ ˇ 4
Bs Zi2l i2l´1
Bs Zi4 i3 Bs Zi2 i1
4
"
*
s
l
l
ź
ÿ
ÿ
ź
ˇ ˇm
n
´1
Zj2t j2t´1 exp ´ tr Z ˇZ ˇ 4 .
“
aJ,s pn, mq
pIp qj2t j2t´1
4
t“1
s“0
t“s`1
JP
t1,...,pu2l
Proof. To simplify notation, let
*
"
l
s
ź
ź
ˇ ˇm
n
´1
MJ,s pZq “
pIp qj2t j2t´1
Zj2t j2t´1 exp ´ tr Z ˇZ ˇ 4 ,
4
t“s`1
t“1
and let Ml “ tMJ,s | J P t1, . . . , pu2l , s ď lu be the set of all such terms “on 2l
indices”. Let xMl y denote the linear span of Ml , that is, the space of all linear
combinations of elements of Ml , with as coefficients real polynomials in n and
m. Then we are really claiming that
"
*
ˇ ˇm
Bs
n
Bs
Bs
...
exp ´ tr Z ˇZ ˇ 4
P xMl y.
(8.1)
Bs Zi2l i2l´1
Bs Zi4 i3 Bs Zi2 i1
4
Chételat and Wells/Mid-scale Wishart asymptotics
60
To see this, let J “ pj1 , . . . , j2l´2 q P t1, . . . , pu2l´2 and define the extension
q
Ja,b
“ pj1 , . . . , jq´1 , a, b, jq`1 , . . . , j2l´2 q P t1, . . . , pu2l to be J with indices a, b
inserted (in this order) at the q th position. Then using that
ı
1 ” ´1 ´1
Bs
´1
´1
Zab
“ ´ Zai
Zi2l´1 b ` Zai
Zi´1
2l
2l´1
2l b
Bs Zi2l i2l´1
2
and
"
*
ˇ ˇm
n
exp ´ tr Z ˇZ ˇ 4
Bs Zi2l i2l´1
4
"
*
”m
ı
ˇ ˇm
n
n
“
Zi2l i2l´1 ´ pIp qi2l i2l´1 exp ´ tr Z ˇZ ˇ 4 ,
4
4
4
we conclude that
s
s
Bs
1 ÿ
1 ÿ
MJi2r i
´
M 2r
MJ,s pZq “ ´
,s`1
2l 2l´1
Bs Zi2l i2l´1
2 r“1
2 r“1 Ji2l´1 i2l ,s`1
m
n
` MJ 2s`1 ,s`1 ´ MJ 2s`1 ,s
P xMl y.
i
i
i2l i2l´1
4
4
2l 2l´1
Thus, by linearity, Bs {Bs Zi2l i2l´1 maps xMl´1 y to xMl y. But naturally we have
expt´ n4 tr Zu|Z|m{4 P xM0 y, so by induction Equation (8.1) must then hold, as
desired.
Bs
Lemma 4 (Second derivatives lemma).For any k P N and any Z P Sp pRq,
p
ÿ
i1 ,...,i2k
ˇ ˇm
n
Bs
Bs
Bs
...
e´ 4 tr Z ˇZ ˇ 4
Bs Zi1 i2k
B s Z i3 i2 B s Z i2 i1
n
“ e´ 4
ˇ ˇ m4 ÿ p1q
Zˇ
bκ pn, m, pqrκ pZ ´1 q
tr Z ˇ
|κ|ď2k
and
p
ÿ
i1 ,...,ik
j1 ,...,jk
ˇ ˇm
n
Bs
Bs
Bs
Bs
Bs
Bs
e´ 4 tr Z ˇZ ˇ 4
...
...
Bs Zj1 jk
Bs Zj3 j2 Bs Zj2 j1 Bs Zi1 i2k
Bs Zi3 i2 Bs Zi2 i1
n
“ e´ 4
ˇ ˇ m4 ÿ p2q
Zˇ
bκ pn, m, pqrκ pZ ´1 q
tr Z ˇ
|κ|ď2k`1
p1q
bκ pn, m, pq
p2q
bκ pn, m, pq
p1q
with degrees deg bκ ď 2k `
and
for some polynomials
p2q
1 ´ qpκq and deg bκ ď 2k ` 2 ´ qpκq. The sums at the right hand sides are taken
over all integer partitions κ of norm at most 2k and 2k ` 1, including the empty
partition.
Proof. We give a spectral proof. Let OLOt be the spectral decomposition of Z,
with eigenvalues λ1 ě ¨ ¨ ¨ ě λp , and notice that
p
t
t
Bs Ohl
1 ÿ Oha Oai
1 ÿ Oha Oaj
“
Ojl `
Oil ,
Bs Zij
2 a‰l λl ´ λa
2 a‰l λl ´ λa
Bs λ h
“ Oih Ojh
Bs Zij
for any 1 ď i, j, h, l ď p. As a consequence, for any differentiable real-valued
Chételat and Wells/Mid-scale Wishart asymptotics
61
functions F1 pLq, . . . , Fp pLq, we have
ˆÿ
˙
p
p
p
p
ÿ
ÿ
Fb ´ Fa t
Bs
1 ÿ
BFa t
t
Oha
Oja Fa Oai
“
Oai `
Oha
O .
B
Z
2
λ
´
λ
Bλa ai
s
hj
b
a
a“1
a“1
j“1
a,b
b‰a
This suggests we define a new operator DL that would map the space of diagonal
matrices F pLq “ diagpF1 pLq, . . . , Fp pLqq that differentially depends on L, to
itself, by
p
p
ÿ
BFa
1 ÿ Fb ´ Fa
Bs
t
t
`
so that
OF Oji
“ OF Oki
.
DL tF ua “
2 b‰a λb ´ λa
Bλa
B
Z
j“1 s hj
In particular,
p
ÿ
i1 ,...,i2k
ˇ ˇm
n
Bs
Bs
Bs
...
e´ 4 tr Z ˇZ ˇ 4
Bs Zi1 i2k
Bs Zi3 i2 Bs Zi2 i1
p
ÿ
“
i1 ,...,i2k
Bs ” ´ n tr Z ˇˇ ˇˇ m4 ı
Bs
Bs
Z Ip
e 4
...
Bs Zi0 i2k
Bs Zi3 i2 Bs Zi2 i1
i1 i0
! n
ˇ ˇm )
2k
“ tr DL
e´ 4 tr Z ˇZ ˇ 4 Ip ,
(8.2)
and similarly
p
ÿ
i1 ,...,ik
j1 ,...,jk
ˇ ˇm
n
Bs
Bs
Bs
Bs
Bs
Bs
e´ 4 tr Z ˇZ ˇ 4
...
...
Bs Zj1 jk
Bs Zj3 j2 Bs Zj2 j1 Bs Zi1 ik
B s Z i3 i2 B s Z i2 i1
!
! n
ˇ ˇ m ))
k
k
“ tr DL
tr DL
e´ 4 tr Z ˇZ ˇ 4 Ip .
(8.3)
Let us look more closely at this operator DL . It satisfies the following.
(i) DL is linear, in the sense that for diagonals F pLq, GpLq and constants a,
b with respect to L,
DL taF ` bGu “ aDL tF u ` bDL tGu.
(ii) DL satisfies a restricted product rule, in the sense that for a diagonal
F pLq of the form F pLq “ f pLqIp for some function f pLq, and any diagonal
GpLq,
DL tF Gu “ DL tF uG ` F DL tGu.
Moreover, from the definition of DL ,
(
n
n n
DL e´ 4 tr L Ip “ ´ e´ 4 tr L Ip ,
4
(
DL trpL´s qIp “ ´sL´ps`1q ,
and
( m m
m
DL |L| 4 Ip “ |L| 4 Ip ,
4
s
(
s
1ÿ
trpL´rs`1´ts qL´t .
DL L´s “ ´ L´ps`1q ´
2
2 t“1
Chételat and Wells/Mid-scale Wishart asymptotics
62
Now define the spaces
#
Ml “
´n
4
bpn, m, pqe
ˇ
+
ˇ bpn, m, pq is a polynomial with
m
ˇ
ˇ
ˇ
tr L ˇ ˇ 4
L rκ pL´1 qL´s ˇ degree at most l ´ qpκq, and κ
ˇ and s satisfy |κ| ď l ´ s.
for l “ 1, . . . , 2k, and let xMl y denote the linear span of Ml , i.e. the space of
all real linear combinations of elements of Ml . Moreover, for a partition κ, let
κ ˘ i denote κ with the integer i added or removed, respectively. For example,
p3, 1, 1, 1q`2 “ p3, 2, 1, 1, 1q and p3, 2, 1, 1, 1q´1 “ p3, 2, 1, 1q. Note that |κ˘i| “
|κ| ˘ i. Then, for any F P Ml ,
)
!
ˇ ˇm
n
DL tF u “ DL bpn, m, pqe´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s
! n
)ˇ ˇ m
“ bpn, m, pqDL e´ 4 tr L Ip ˇLˇ 4 rκ pL´1 qL´s
!ˇ ˇ m )
n
` bpn, m, pqe´ 4 tr L DL ˇLˇ 4 Ip rκ pL´1 qL´s
!
)
ˇ ˇm
n
` bpn, m, pqe´ 4 tr L ˇLˇ 4 DL rκ pL´1 qIp L´s
!
)
ˇ ˇm
n
` bpn, m, pqe´ 4 tr L ˇLˇ 4 rκ pL´1 qDL L´s
ı n
” n
ˇ ˇm
“ ´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s
” m4
ı n
ˇ ˇm
`
bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s
4
qpκq
ı n
ÿ”
ˇ ˇm
`
´ κi bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ´κi pL´1 qL´s
i“1
ı n
ˇ ˇm
s
` ´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´ps`1q
2
s ”
ı n
ÿ
ˇ ˇm
1
`
´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ`ps`1´tq pL´1 qL´t
2
t“1
”
Thus DL tF u P xMl`1 y. It follows by linearity that DL maps xMl y to xMl`1 y.
ˇ ˇm
ˇ ˇm
n
2k ´ n
te 4 tr L ˇLˇ 4 Ip u P xM2k y.
Now, e´ 4 tr L ˇLˇ 4 Ip P M0 , so by induction DL
p1q
Hence, for some polynomials bκ,s pn, m, pq of degree at most 2k ´ qpκq,
! n
ÿ
ˇ ˇm )
ˇ ˇm
2k
´n
4 tr L ˇLˇ 4 r pL´1 q trpL´s q
tr DL
e´ 4 tr L ˇLˇ 4 Ip “
bp1q
κ
κ,s pn, m, pqe
|κ|`sď2k
ÿ
“
p1q
n
bκ1 pn, m, pqe´ 4
ˇ ˇ m4
Lˇ rκ1 pL´1 q
tr L ˇ
(8.4)
|κ1 |ď2k
p1q
p1q
p1q
p1q
for κ1 “ κ ` s, bκ1 “ bκ,s when s ‰ 0, while κ1 “ κ, bκ1 “ pbκ,s when
s “ 0. Notice that when s ‰ 0, the degree of the bκ1 ’s is at most 2k ´ qpκq “
2k ´ pqpκ1 q ´ 1q, while when s “ 0 it is at most 2k ´ qpκq ` 1 “ 2k ´ qpκ1 q ` 1.
p1q
Thus in both cases, deg bκ1 ď 2k ´ qpκ1 q ` 1, which by Equation (8.2) shows
the first statement of the lemma.
For the second statement of the lemma, by an argument analoguous to Equa-
Chételat and Wells/Mid-scale Wishart asymptotics
63
ˇ ˇ m4
Lˇ Ip u P xMk`1 y. Thus by induction
ˇ ˇm
n
k
k
again, we must have DL
ttr DL
te´ 4 tr L ˇLˇ 4 Ip uu P xM2k`1 y. Hence for some
n
k
tion (8.4) we find that tr DL
te´ 4
tr L ˇ
p2q
polynomials bκ,s pn, m, pq of degree at most 2k ` 1 ´ qpκq,
!
! n
ˇ ˇ m ))
k
k
DL
tr DL
e´ 4 tr L ˇLˇ 4 Ip
ÿ
ˇ ˇm
´n
4 tr L ˇLˇ 4 r pL´1 q trpL´s q
“
bp2q
κ
κ,s pn, m, pqe
|κ|`sď2k`1
ÿ
“
n
p2q
bκ1 pn, m, pqe´ 4
ˇ ˇ m4
Lˇ rκ1 pL´1 q
tr L ˇ
|κ1 |ď2k`1
p2q
p2q
p2q
p2q
for again κ1 “ κ ` s, bκ1 “ bκ,s when s ‰ 0, while κ1 “ κ, bκ1 “ pbκ,s when
p2q
s “ 0. By the same argument as before, deg bκ1 ď 2k ´ qpκ1 q ` 2, which by
Equation (8.3) shows the second statement of the lemma. This concludes the
proof.
We will also need in our proof a result about the asymptotics of inverse
moments of the Wishart distribution. Because we couldn’t find anything like it
in the literature, we think it is worthwhile to provide some context.
Let f : p0, 4q Ñ R be the restriction to the positive reals of a complex
function analytic in a neighborhood of p0, 4q. We are often interested in the
linear spectral statistic p1 tr f pY q for Y „ Wp pn, Ip {nq. Much is known about
its distributional properties in the high-dimensional regime where p Ñ 8 such
that lim np “ α ă 1. For example, if 0 ă α ă 1, there must be an ą 0 such
nÑ8
that p{n P r, 1 ´ s for all n large enough, so Bai and Silverstein [2010, Theorem
9.10] and the dominated convergence theorem yield that
ż
rp{ns`
a
prp{ns` ´ tqpt ´ rp{ns´ q
f ptq
dt
2πrp{nst
1
P
tr f pY q ÝÑ lim
nÑ8
p
ż α rp{ns
´
`
“
a
pα` ´ tqpt ´ α´ q
dt
f ptq
2παt
(8.5)
α´
?
P
as n Ñ 8. Here, Ñ stands for convergence in probability and x˘ for p1 ˘ xq2 .
In fact, the theorem states more, namely a central limit theorem, but what we
want to draw to attention is the class of functions for which this result was
proven.
This is sometimes enough, but often we would like to understand the expectation of this linear spectral statistic. If f is bounded, then Equation (8.5)
implies that
α`
a
ı
pα` ´ tqpt ´ α´ q
1 ”
f ptq
dt.
(8.6)
lim E tr f pY q “
nÑ8 p
2παt
ż
α´
This is nice for a function f pzq like ez or sin z that happens to be bounded
Chételat and Wells/Mid-scale Wishart asymptotics
64
on a neighborhood of p0, 4q, but it unfortunately excludes many interesting
unbounded functions, such as log z or 1{z. In fact, for unbounded f , it is in
general not even clear if lim p1 Ertr f pY qs will be finite!
nÑ8
The following result shows that, at least in the case f pzq “ 1{z s for s P N,
we can use Stein’s lemma to obtain Equation (8.6) and its α “ 0 analogue.
Lemma 5. Let for Y „ Wp pn, Ip {nq and s be any integer s ě 1. Then as long
as n ě p ` 4s ` 2, the sth inverse moment satisfies the recursive bound
ˆ
˙ ”
ı
”
ı
pp ` 1qs
1´
E tr Y ´s ď E tr Y ´ps´1q .
n
In particular, as p Ñ 8 such that lim np “ α ă 1, if s ă α´1 ´ 1 then
nÑ8
$ α`
a
’
’
pα` ´ tqpt ´ α´ q
&
ı ’
1 ”
dt
if 0 ă α ă 1,
´s
lim E tr Y
“
2παts`1
nÑ8 p
’
α
´
’
’
%
1
if α “ 0.
? 2
for α˘ “ p1 ˘ αq .
ż
Proof. The classical
lemma
that for any differentiable function f :
ˇstates
“ˇ`Stein’s
˘
‰
2
B
R Ñ R such that E ˇ BZ
´ Z f pZqˇ ă 8 for Z „ Np0, 1q and lim f pzqe´z {2 “
zÑ˘8
0, we must have
„´
¯
B
´ Z f pZq “ 0.
E
BZ
Let Z „ Nnˆp p0, In b Ip q be an n ˆ p matrix of i.i.d. standard normal random
variables, and let Y “ n1 Z t Z „ Wp pn, Ip {nq. For any 1 ď α ď n and 1 ď
β, i, j ď p,
´s
p
s
ı
Bs Yβj
B
2 ÿ
1 ÿ ” ´l ´ps´l`1q
Bs
´l ´ps´l`1q
Yβi Yβj
` Yββ
“
Zαi
and
“´
Yij
,
BZαβ n i“1
Bs Yiβ
Bs Yiβ
2 l“1
so for δ the Kronecker delta,
˙
ˆ
`
˘
B
´ Zαβ ZY ´s αβ
BZαβ
p „
p
ÿ
2 ÿ
Bs
´s
´s
´s
“
δβj Yβj `
Zαj Zαi
Y ´ Zαβ Zαj Yβj
n i“1
Bs Yiβ βj
j“1
´s
“ Yββ
´
s
s
˘ `
˘
˘
1 ÿ`
1 ÿ ´l `
ZY l αβ ZY ´ps´l`1q αβ ´
Yββ ZY ´ps´l`1q Z t αα
n l“1
n l“1
`
˘
´Zαβ ZY ´s αβ
(8.7)
Let us first show that this expression is integrable. For any matrix X, |Xij | ď
1{2
}X}2 “ }X t X}2 . Thus by Equation (8.7),
ˇ
„ˇˆ
˙
ˇ
`
˘ ˇ
B
´s
ˇ
ˇ
E ˇ
´ Zαβ ZY
αβ ˇ
BZαβ
Chételat and Wells/Mid-scale Wishart asymptotics
«
ď E }Y ´s }2 `
s
ÿ
1
65
1
}Y 2l`1 }22 }Y 2s`2l´1 }22
l“1
ff
s
ÿ
}Y
`
´2l
1
2
}2 }Y
´2s`2l
1
2
1
2
}2 ` n}Y }2 }Y
´2s`1
1
2
}2
l“1
As Y is positive definite, }Y ˘a }2 ď tr Y ˘a for any a P N, so by the CauchySchwarz inequality,
„
ÿ
s
”
ı 12 ”
ı 12
E tr Y ´2l`1 E tr Y ´2s`2l´1
ď E tr Y ´s `
l“1
s
”
ı 12 ”
ı 12
”
ı 12 ”
ı 12
ÿ
E tr Y ´2l E tr Y ´2s`2l ` n E tr Y E tr Y ´2s`1 ,
`
l“1
which is finite for n ě p ` 4s ` 2.
Moreover, pZY ´s qαβ can be expressed using minors and determinants as a
rational function of the entries of Z, so
lim
Zαβ Ñ˘8
2
pZY ´s qαβ e´Zαβ {2 “ 0.
So all conditions are fulfilled to apply Stein’s lemma to Equation 8.7 and obtain
ff
«
˙
p ˆ
n
`
˘
B
1 ÿ ÿ
´s
´ Zαβ ZY
0“E
αβ
n α“1 β“1 BZαβ
«
ff
s
s
1 ÿ
´s
´s
´l
´ps´lq
´ps´1q
“ E tr Y ´ tr Y ´
trpY q trpY
q ´ tr Y
n
n l“1
As trpY ´l q trpY ´ps´lq q ď p tr Y ´s for any 1 ď l ď s, and every term is integrable
as n ě p ` 4s ` 2, this means that
ˆ
˙ ”
ı
”
ı
pp ` 1qs
1´
E tr Y ´s ď E tr Y ´ps´1q .
(8.8)
n
This shows the first part of the proof.
For the second part, let S P N. If we let n Ñ 8 such that lim np “ α ă 1,
nÑ8
then any S ă α´1 we will have n ě p ` 4S ` 2 and n ě pp ` 1qS for n large
enough. So by repeatedly applying Equation (8.8) for s “ S, . . . , 1 and dividing
by p, we obtain
˙
S ˆ
ı
ı
ź
pp ` 1ql
1 ”
1 ”
1´
¨ E tr Y ´S ď
E tr Y ´0 “ 1.
n
p
p
l“1
Taking a limit in the above yields
S
ı
ź
1 ”
p1 ´ αlq lim E tr Y ´S ď 1.
nÑ8 p
l“1
Thus for any S ă α´1 , we have
S
ı
ź
1
1 ”
lim E tr Y ´S ď
ă 8.
nÑ8 p
1
´
αl
l“1
(8.9)
Chételat and Wells/Mid-scale Wishart asymptotics
66
In the case 0 ă α ă 1, if s`1 ă α´1 then by Jensen’s inequality and Equation
(8.9) applied to S “ s ` 1, we have
ı
˘1` 1s ı
1 ”
1 ”´
ď lim E tr Y ´ps`1q ă 8.
lim E tr Y ´s
nÑ8 p
nÑ8 p
1
´s
Thus p tr Y
is uniformly integrable, and by Equation (8.5),
żα
`
a
”
ı
pα` ´ tqpt ´ α´ q
1
dt
lim E tr T ´s “
nÑ8 p
2παts`1
α´
?
for α˘ “ p1 ˘ αq2 .
In contrast, by applying Jensen’s inequality twice,
„´
„
´s
„
¯´s
1
1
1
ďE
1 “ E tr Y
tr Y
ď E tr Y ´s
p
p
p
so when α “ 0, by applying Equation (8.9) with S “ s, we obtain that
lim p1 Ertr Y ´s s “ 1, as desired.
nÑ8
9. Conclusion
The results of this paper raise more questions than they answer. We enumerate
some that we found particularly interesting.
(1) The univariate t distribution
with ν degrees of freedom is often defined as
?
the distribution of Z{ s, for Z „ Np0, 1q and s „ χ2ν {ν independent. In
the real symmetric matrix case, we could imagine studying the distribution
of S 1{4 ZS 1{4 , for Z „ GOEppq and S „ Wp pν, Ip {νq independent. Is this
the Tν p2Ip q distribution in the sense of Section 4?
(2) By Theorem 2 and Corollary 1, it is clear the empirical moments of a
symmetric t distribution are quite similar to those of a Gaussian orthogonal ensemble matrix, except perhaps in their rates of convergence. From
Anderson et al. [2010, Theorem 2.1.31], we know the empirical moments
of a Gaussian orthogonal ensemble are asymptotically normal. Are the
empirical moments of the symmetric t distribution also asymptotically
normal?
(3) In Section 4, we showed that the rate of convergence of the even normalized
empirical
moments of a symmetric t distribution change when p grows like
?
n. Can we find analogue symmetric t statistics that change their rates of
convergence when p grows like npK`1q{pK`3q for every K P N? This would
establish phase transitions for the symmetric t distribution. If so, can we
find approximating densities between every two transitions, just like in the
Wishart case?
(4) As a counterpart of Theorem 1, could we prove that dTV pfNW , fK q Û 0
whenever pK`3 {nK`1 Û 0 as n Ñ 8? This is delicate because we have no
guarantee that the L1 norm of ψK is asymptotically bounded for regimes
of degree K ` 1 or higher.
Chételat and Wells/Mid-scale Wishart asymptotics
67
(5) Can we find the normalization constant or, better, solve the expectation
of Equation (1.3) in closed form?
(6) What asymptotics hold for the symmetric t or the Wishart distribution in
a middle-scale regime of infinite degree? How do these asymptotics differ
from the other middle-scale regimes, or the high-dimensional regime?
(7) The symmetric t distribution was discovered as the G-conjugate of the
Wishart distribution. What other distributions can be realized as the Gconjugate of some well-known distribution?
(8) In Lemma 2, we expressed the characteristic function of the G-conjugate
F ˚ of a distribution F as f 1{2 ‹ pf 1{2 ˝ Rq, for f the density of F and R the
flip operator. To obtain the moments, we then repeatedly differentiated
under the convolution integral at zero, and obtained an expression of the
moments as an expectation with respect to f . The argument worked when
F ˚ was the symmetric t distribution. Can this argument be generalized to
other F ˚ ? If F ˚ is a well-known distribution, does this give rise to novel
and nontrivial expressions for its moments?
(9) The G-transform of a distribution encodes all the information relative to
that distribution. However, taking a modulus removes some information,
and so in some sense the G-conjugate distribution is “less informative”
than the original distribution. What happens when we repeatedly apply
the G-conjugation operator, destroying information every time? For example, is there an attractor distribution G that is the limit of this process
regardless of the initial distribution?
(10) Can we find distinct random operators which can be regarded, in some
sense, as the total variation limit of a normalized Wishart matrix between
every two phase transitions?
It appears to us that some of these questions might be very difficult to answer.
We would be pleased if future work were able to shed light on any of them.
References
Greg W. Anderson, Alice Guionnet, and Ofer Zeitouni. An Introduction to
Random Matrices. Cambridge University Press, 2010.
Zhidong Bai and Jack W. Silverstein. Spectral Analysis of Large Dimensional
Random Matrices, volume 20. Springer, 2010.
Maurice S. Bartlett. On the theory of statistical regression. Proceedings of the
Royal Society of Edinburgh, 53:260–283, 1933.
Sébastien Bubeck and Shirshendu Ganguly. Entropic CLT and phase transition
in high-dimensional Wishart matrices. International Mathematics Research
Notices, pages 243–258, 2016.
Sébastien Bubeck, Jian Ding, Ronen Eldan, and Miklós Z. Rácz. Testing for
high-dimensional geometry in random graphs. Random Structures & Algorithms, 49:503–532, 2016.
Kai-Lai Chung. A Course in Probability Theory. Academic Press, 2001.
Chételat and Wells/Mid-scale Wishart asymptotics
68
Michel Gaudin. Sur la loi limite de l’espacement des valeurs propres d’une
matrice alé atoire. Nuclear Physics, 25:447–458, 1961.
Arjun K. Gupta and Daya K. Nagar. Matrix Variate Distributions. CRC Press,
1999.
Tiefeng Jiang and Danning Li. Approximation of rectangular beta-Laguerre
ensembles and large deviations. Journal of Theoretical Probability, 28:804–
847, 2015.
Gérard Letac and Hélène Massam. All invariant moments of the wishart distribution. Scandinavian Journal of Statistics, 31:295–318, 2004.
Vladimir A. Marchenko and Leonid A. Pastur. Distribution of eigenvalues for
some sets of random matrices. Matematicheskii Sbornik, 114:507–536, 1967.
Sho Matsumoto. General moments of the inverse real wishart distribution and
orthogonal weingarten functions. Journal of Theoretical Probability, 25:798–
822, 2012.
Madan L. Mehta. On the statistical properties of the level-spacings in nuclear
spectra. Nuclear Physics, 18:395–419, 1960a.
Madan L. Mehta. Lemploi des polynômes orthogonaux pour calculer certain
déterminants. Rapport S PH (Saclay), 658, 1960b.
Robb J. Muirhead. Aspects of Multivariate Statistical Theory. Wiley Series in
Probability and Mathematical Statistics. Wiley, 1982.
Charles E. Porter and Norbert Rosenzweig. Statistical properties of atomic and
nuclear spectra. Technical report, Univ. of Minnesota, Minneapolis, 1960.
Mohsen Pourahmadi. High-dimensional Covariance Estimation: with HighDimensional Data. John Wiley & Sons, 2013.
Miklós Z. Rácz and Jacob Richey. A smooth transition from Wishart to GOE.
arXiv:1611.05838, 2016.
Aad W. van der Vaart. Asymptotic statistics, volume 3. Cambridge University
Press, 2000.
John Von Neumann and Herman H. Goldstine. Numerical inverting of matrices
of high order. Bulletin of the American Mathematical Society, 53:1021–1099,
1947.
Eugene P. Wigner. On the statistical distribution of the widths and spacings
of nuclear resonance levels. In Mathematical Proceedings of the Cambridge
Philosophical Society, volume 47, pages 790–798, 1951.
Eugene P. Wigner. Characteristic vectors of bordered matrices with infinite
dimensions. Annals of Mathematics, 62:548–564, 1955.
Eugene P. Wigner. Statistical properties of real symmetric matrices with many
dimensions. In Proceedings of the Fourth Canadian Mathematical Congress.
University of Toronto Press, 1957.
John Wishart. The generalised product moment distribution in samples from a
normal multivariate population. Biometrika, 20A:32–52, 1928.
| 10math.ST
|
1
Time-Varying Block Codes for Synchronization
Errors: MAP Decoder and Practical Issues
arXiv:1802.08595v1 [cs.IT] 23 Feb 2018
Johann A. Briffa, Victor Buttigieg, Member, IEEE, and Stephan Wesemeyer
Abstract—In this paper we consider Time-Varying Block
(TVB) codes, which generalize a number of previous synchronization error-correcting codes. We also consider various practical
issues related to MAP decoding of these codes. Specifically, we
give an expression for the expected distribution of drift between
transmitter and receiver due to synchronization errors. We
determine an appropriate choice for state space limits based on
the drift probability distribution. In turn, we obtain an expression
for the decoder complexity under given channel conditions in
terms of the state space limits used. For a given state space, we
also give a number of optimizations that reduce the algorithm
complexity with no further loss of decoder performance. We
also show how the MAP decoder can be used in the absence of
known frame boundaries, and demonstrate that an appropriate
choice of decoder parameters allows the decoder to approach
the performance when frame boundaries are known, at the
expense of some increase in complexity. Finally, we express some
existing constructions as TVB codes, comparing performance
with published results, and showing that improved performance
is possible by taking advantage of the flexibility of TVB codes.
Index Terms—Insertion-Deletion Correction, MAP Decoder,
Forward-Backward Algorithm
I. I NTRODUCTION
Most error-control systems are designed to detect and/or
correct substitution errors, where individual symbols of the
received sequence have been substituted while maintaining
synchronization with the transmitted sequence. Some channels, however, also experience synchronization errors, where
symbols may additionally be deleted from or inserted into the
received sequence. It has long been recognized that codes can
be designed specifically for synchronization error correction
[1], [2]. Except for the less-known work by Gallager [3],
for a long time only some short block codes were known.
This changed when Davey and MacKay [4] proposed a concatenated scheme combining an outer LDPC code with good
error-correction capability with an inner code whose aim is
to correct synchronization errors. Ratzer [5] took a different
approach, using short marker sequences inserted in binary
LDPC codewords; a similar approach was used by Wang
et al. [6]. Yet another approach extends the state space of
convolutional codes to allow correction of synchronization
errors [7]–[9]. The problem of convolutional code design for
Manuscript submitted February 27, 2014; accepted May 29, 2014 for
publication in the IET Journal of Engineering. This research has been carried
out using computational facilities procured through the European Regional
Development Fund, Project ERDF-080.
J. A. Briffa and S. Wesemeyer are with the Dept. of Computing, University of Surrey, Guildford GU2 7XH, England. Email: j.briffa@surrey.ac.uk;
s.wesemeyer@surrey.ac.uk
V. Buttigieg is with the Dept. of Comm. & Computer Engineering, University of Malta, Msida MSD 2080, Malta. Email: victor.buttigieg@um.edu.mt
synchronization error channels has been considered in [10].
More recently, this approach has been applied successfully to
turbo codes [11]. The renewed increase in interest is mainly
due to new applications requiring such codes. A recent survey
can be found in [12].
We have in previous papers extended the work of DaveyMacKay, proposing a maximum a posteriori (MAP) decoder
[13], improved code designs [14], [15], as well as a parallel
implementation of the MAP decoder resulting in speedups of
up to two orders of magnitude [16]. However, these papers
were restricted to the case where the frame boundaries were
known by the decoder. While Davey and MacKay showed that
the frame boundaries could be accurately determined for their
bit-level decoder and code construction [4], it has not been
shown whether this property extends to our MAP decoder and
improved constructions.
In this paper we define Time-Varying Block (TVB) codes in
terms of the encoding used in [16], and show that TVB codes
represent a new class of codes which generalizes a number of
previous synchronization error-correcting codes. We use the
MAP decoder of [16] for these codes, showing how it can
be used in an iterative scheme with an outer code. We also
consider a number of important issues related to any practical
implementation of the MAP decoder. Specifically, we give
an expression for the expected distribution of drift between
transmitter and receiver due to synchronization errors. We
determine an appropriate choice for state space limits based
on the drift probability distribution. In turn, we obtain an
expression for the decoder complexity under given channel
conditions in terms of the state space limits used. For a
given state space, we also give a number of optimizations
that reduce the algorithm complexity with no further loss of
decoder performance. We also show how the MAP decoder
can be used for stream decoding, where the boundaries of
the received frames are not known a priori. In doing so we
demonstrate how an appropriate choice of decoder parameters
allows stream decoding to approach the performance when
frame boundaries are known, at the expense of some increase
in complexity. We express some previously published codes
as TVB codes, comparing performance with published results,
and showing that the greater flexibility of TVB codes permits
the creation of improved codes.
In the following, we start with definitions in Section II
and summaries of results from earlier work. The applicable
design criteria for TVB codes are considered in Section III,
together with the representation of previously published codes
as TVB codes. The appropriate choice for state space limits is
given in Section IV, followed by expressions for the decoder
2
complexity in Section V. MAP decoder optimizations are given
in Section VI and the changes necessary for stream decoding in
Section VII. Finally, practical results are given in Section VIII.
II. BACKGROUND
A. TVB Codes
Consider the encoding defined in [16], used there to simplify
the representation of the inner code of [4]. We observe that
this encoding generalizes a number of additional previous
schemes, including the inner codes of [5], [6], [15] (c.f.
Section III-B). We define a TVB code in terms of this encoding
by the sequence C = (C0 , . . . , CN −1 ), which consists of the
constituent encodings Ci : Fq ,→ Fn2 for i = 0, . . . , N − 1,
where n, q, N ∈ N, 2n ≥ q, and ,→ denotes an injective
mapping. Two constituent encodings Ci , Cj are said to be
equal if Ci (D) ∈ Cj ∀D. For a given TVB code, the set
of unique constituent encodings is that set where no two
constituent encodings are equal; the cardinality of this set,
denoted by M ≤ N , is called the order of the code. Note that
unique constituent encodings may still have some common
codewords. We denoted a TVB code by the tuple (n, q, M ).
We restrict ourselves to binary TVB codes, where codewords
are sequences of bits; the extension to the non-binary case is
trivial.
For any sequence z, denote arbitrary subsequences as
zba = (za , . . . , zb−1 ), where zaa = () is an empty sequence. Given a message DN
= (D0 , . . . , DN −1 ), each
0
Ci maps the q-ary message symbol Di ∈ Fq to codeword
nN
Ci (Di ) of length n. That is, DN
=
0 is encoded as X0
C0 (D0 )k · · · kCN −1 (DN −1 ), where ykz is the juxtaposition
of y and z. Each q-ary symbol is encoded independently of
previous inputs, and different codebooks may be used for
each input symbol. This time-variation offers no advantage
on a fully synchronized channel. However, in the presence
of synchronization errors, the differences between neighbouring codebooks provide useful information to the decoder to
recover synchronization.
In practice a TVB code is suitable as an inner code to correct
synchronization errors in a serially concatenated construction.
A conventional outer code corrects residual substitution errors.
In such a scheme, the inner code’s MAP decoder a posteriori
probabilities (APPs) are used to initialize the outer decoder.
The concatenated code can be iteratively decoded, in which
case the prior symbol probabilities of the inner decoder are
set using extrinsic information from the previous pass of the
outer decoder.
B. Channel Model
We consider the Binary Substitution, Insertion, and Deletion
(BSID) channel, an abstract random channel with unbounded
synchronization and substitution errors, originally presented in
[17] and more recently used in [4], [5], [13]–[15] and others.
At time t, one bit enters the channel, and one of three events
may happen: insertion with probability Pi where a random
bit is output; deletion with probability Pd where the input is
discarded; or transmission with probability Pt = 1 − Pi − Pd .
A substitution occurs in a transmitted bit with probability Ps .
After an insertion the channel remains at time t and is subject
to the same events again, otherwise it proceeds to time t + 1,
ready for another input bit.
We define the drift St at time t as the difference between
the number of received bits and the number of transmitted
bits before the events of time t are considered. As in [4], the
channel can be seen as a Markov process with the state being
the drift St . It is helpful to see the sequence of states as a
trellis diagram, observing that there may be more than one
way to achieve each state transition. Also note that the state
space is unlimited for positive drifts but limited for negative
drifts. Specifically, St may take any positive value for t > 0,
though with decreasing probability as the value increases. On
the other hand, St ≥ −t where the lower limit corresponds to
receiving the null sequence.
C. The MAP Decoder
We summarize here the MAP decoder of [16]; this is the
same as the MAP decoder of [13] with a trivial modification
to work with the notation of TVB codes. The decoder uses
the standard forward-backward algorithm for hidden Markov
models. We assume a message sequence DN
0 , encoded using a
(n, q, M ) TVB code to the sequence Xτ0 , where τ = nN . The
sequence Xτ0 is transmitted over the BSID channel, resulting
in the received sequence Y0ρ , where in general ρ is not equal
to τ . To avoid ambiguity, we refer to the message sequence
as a block of size N and the encoded sequence as a frame
of size τ . We calculate the APP Li (D) of having encoded
symbol D ∈ Fq in position i for 0 ≤ i < N , given the entire
received sequence, using
X
1
σi (m0 , m, D),
(1)
Li (D) =
λN (ρ − τ ) 0
m ,m
where λi (m) = αi (m)βi (m),
(2)
σi (m0 , m, D) = αi (m0 )γi (m0 , m, D)βi+1 (m),
(3)
and αi (m), βi (m), and γi (m0 , m, D) are the forward, backward, and state transition metrics respectively. Note that
strictly, the above metrics depend on Y0ρ , but for brevity we do
not indicate this dependence in the notation. The summation in
(1) is taken over the combination of m0 , m, being respectively
the drift before and after the symbol at index i. The forward
and backward metrics are obtained recursively using
X
αi (m) =
αi−1 (m0 )γi−1 (m0 , m, D),
(4)
m0 ,D
and βi (m) =
X
βi+1 (m0 )γi (m, m0 , D).
(5)
m0 ,D
Initial conditions for known frame boundaries are given by
(
(
1 if m = 0
1 if m = ρ − τ
α0 (m) =
and βN (m) =
0 otherwise,
0 otherwise.
Finally, the state transition metric is defined as
n(i+1)+m
γi (m0 , m, D) = Pr {Di = D} R(Yni+m0
| Ci (D)) (6)
where Ci (D) is the n-bit sequence encoding D and R(ẏ|x) is
the probability of receiving a sequence ẏ given that x was sent
3
through the channel (we refer to this as the receiver metric).
The a priori probability Pr {Di = D} is determined by the
source statistics, which we generally assume to be equiprobable so that Pr {Di = D} = 1/q. In iterative decoding, the
prior probabilities are set using extrinsic information from the
previous pass of an outer decoder, as explained in Section II-A.
The receiver metric is obtained by calculating the forward
recursion
X
t+m
α̇t−1 (m0 ) · Q ẏt−1+m
α̇t (m) =
(7)
0 |xt−1 ,
m0
where for brevity we do not show the dependence on ẏ and
x, and Q(y|x) can be directly computed from y, x and the
channel parameters:
if µ = 0
Pd
Pi µ−1
1
Q(y|x) =
Pt P s + 2 Pi P d
if µ > 0, yµ−1 6= x
2
Pi µ−1
1
Pt P̄s + 2 Pi Pd
if µ > 0, yµ−1 = x,
2
where µ is the length of y and P̄s = 1 − Ps . The required
value of the receiver metric is given by R(ẏ|x) = α̇n (µ̇ − n),
where µ̇ is the length of ẏ, n is the length of x.
As in [16], the α, β, and α̇ metrics are normalized as
they are computed to avoid exceeding the limits of floatingpoint representation. We also assume that (7) is computed at
single precision1 , while the remaining equations use double
precision.
III. TVB C ODE D ESIGN
A. Construction Criteria
In any error-correcting scheme, the decoder’s objective is
to minimize the probability of decoding error (at the bit or
codeword level depending on the application). If the channel
does not introduce synchronization errors, this optimization
may be performed independently of previous or subsequent
codewords. Hence the performance of the code depends exclusively on its distance properties. In particular, the performance
of the code at low channel error rate is dominated by the code’s
minimum Hamming distance. At any channel error rate the
performance is determined by the code’s distance spectrum
[18], [19]. Thus when designing codes for substitution error
channels, either the minimum Hamming distance or the more
complete distance spectrum needs to be optimized for the
given code parameters.
In the case of the BSID channel, and other channels that
allow synchronization errors, a similar behaviour is observed
if the codeword boundaries are known, only this time the
Levenshtein distance [2] replaces the Hamming one. Recall
that the Levenshtein distance gives the minimum number of
edits (insertions, deletions, or substitutions) that will change
one codeword into another.
For the BSID channel an upper bound for the probability
of decoding a codeword in error was given in [15], assuming
codeword boundaries are known. For Pi , Pd , Ps 1, the
bound of [15, (9)] is dominated by the number of correctable
1 We refer to 32-bit floating point as single precision, and 64-bit floating
point as double precision.
errors, t. Now, for a code with jminimumk Levenshtein distance
d
−1
[2]. Hence designing
dlmin , it can be shown that t = lmin
2
TVB codes with constituent encodings having large dlmin will
result in the greatest improvement to the code’s performance
at low channel error rates.
However, in general the codeword boundaries are not known
and need to be estimated by the decoder. Therefore decoding
a given codeword on synchronization error channels depends
not only on the current received word, but also on previous and
subsequent ones. This means that the performance of a TVB
code depends not only on the distance properties of constituent
encodings considered separately, but also on the relationship
between constituent encodings. This effect becomes more
significant under poorer channel conditions, where the drift
can easily exceed the length of a codeword. Unfortunately,
the required relationship between constituent encodings for
optimal performance over the BSID channel is still an open
problem. What is known is that the diversity created by a
sequence of different encodings helps the decoder estimate
the drift within a codeword length, improving performance at
higher channel error rates [15].
B. Representation of Previous Schemes as TVB Codes
TVB codes generalize a number of existing synchronization
error-correcting codes. The flexibility of the generalization
allows the creation of improved codes at the same size and
rate, as we shall show.
Consider first the sparse inner codes with a distributed
marker sequence2 of the Davey-MacKay construction [4]. It is
clear that the sparse code is a fixed encoding C 0 : Fq ,→ Fn2 ;
these codewords are then added to a distributed marker sequence wi of length n, specific for each codeword index i.
Thus we can write Ci (Di ) = C 0 (Di ) + wi to represent the
inner codes of [4] as TVB codes. The equivalence of this
mapping to the inner code of [4] has also been shown in [16].
The distributed marker serves the same function as the use of
different encodings in TVB codes. The decoder of [4] tracks
the marker sequence directly, treating the additive encoded
message sequence as substitution errors. Therefore, to corrupt
the marker sequence as little as possible, the inner code used is
sparse. The sparseness results in a low dlmin , making it harder
for the decoder to distinguish between the various codewords,
and leads to relatively poor performance at low channel error
rates.
The codes of [15] can similarly be represented as TVB
codes, with C 0 corresponding to the Synchronization and Error
Correcting (SEC) code and wi corresponding to the Allowed
Modification Vectors (AMVs). SEC codes are designed with
a large dlmin for good performance at low channel error rates.
For such channels this code can perform much better than
the sparse code of [4]. AMVs are chosen such that when
added to the SEC code the resulting code’s dlmin does not
change. Clearly, the AMVs serve the same function as the
use of different encodings in TVB codes. In contrast to a
random distributed marker sequence, the use of AMVs does
2 This
was originally referred to as a watermark sequence.
4
Table I
A (7, 8, 4) TVB CODE C = (C0 , . . . , C3 ) WITH dlmin = 3.
100
C1
0000000
0000111
0011110
0110101
1001001
1100110
1111000
1111111
C2
0000011
0001100
0011111
0101010
1011001
1100000
1100111
1111110
C3
0000000
0001111
0101001
0110110
1000011
1001100
1110000
1111111
10−1
Symbol Error Rate
C0
0000000
0000111
0011001
0110110
1001010
1100001
1111000
1111111
Comparison of Inner Codes with (n,q) =(7,8) and N =666
(7,8) sparse + random marker
3 data bits + 4 marker bits
(7,8,3) SEC code with 8 AMVs
(7,8,4) TVB code
10−2
10−3
not compromise the performance of the underlying SEC code
at low channel error rates. In general, however, the Levenshtein distance spectrum is altered. The separate constituent
encodings in TVB codes give greater design freedom than SEC
codes with AMVs and also allows the design of constituent
encodings that maintain the required optimized Levenshtein
distance spectrum.
The marker codes given by Ratzer [5] can also be cast as
TVB codes by letting each possible sequence of data bits
(between markers) be represented by a q-ary symbol. For
example, consider a marker code with 3 marker bits inserted
after every 9 data bits, where the 3-bit marker is randomly
chosen between the sequences 001 and 110. This can be
represented as a (12, 512, 2) TVB code, where encoding C0
consists of all possible 9-bit sequences appended with 001,
and C1 consists of all possible 9-bit sequences appended with
110. Like the sparse codes of [4], these marker codes suffer
from a low dlmin , leading to relatively poor performance at
low channel error rates. On the other hand, the fixed marker
bits improve the determination of codeword boundaries, and
the random use of different marker bits creates the necessary
diversity to improve performance in poorer channel conditions.
To illustrate the difference in performance between the
various designs, consider encodings of size (n, q) = (7, 8)
with N = 666 (same size as codes C and H in [4]). A (7, 8, 4)
TVB code where each constituent code has the best possible
Levenshtein distance spectrum with dlmin = 3, found through
an exhaustive search, is given in Table I. In Fig. 1 we compare
this TVB code with earlier constructions from the literature
at the same size. Consider first the SEC code of the same
size and dlmin from [15], used with 8 AMVs in a random
sequence. As expected, the TVB code performs better due to
its improved Levenshtein distance spectrum, even though both
TVB and SEC codes have the same dlmin . The performance
of the sparse code with random distributed marker from [4]
is considerably worse, particularly at low channel error rates.
Similarly a code with three data bits and four marker bits
(randomly chosen between 0011/1100), similar to [5], also
performs poorly at low channel error rates.
IV. A PPROPRIATE L IMITS ON S TATE S PACE
The equations in Section II-C assume that summations can
be taken over the set of all possible states. For a channel such
as the one considered, the state space is unbounded for positive
drifts. A practical implementation will have to take sums over
a finite subset of states. In [4] the state space was limited
10−4 −5
10
10−4
10−3
10−2
Channel Error Event Probability (Pd = Pi; Ps =0)
10−1 3 ×10−1
Figure 1. Comparison of inner code designs of size (n, q) = (7, 8) with
N = 666: a sparse code with random distributed marker from [4], a marker
code with 0011/1100 marker bits similar to [5], a SEC code with randomlysequenced AMVs from [15], and the TVB code of Table I.
to a drift |St | ≤ xmax , where xmax was chosen to be ‘several
times larger’ than the standard deviation of the synchronization
drift over one block length, assuming this takes a Gaussian
distribution. No recommendation was given for the value that
should be used.
Limiting the state space is by definition sub-optimal. However, we can arbitrarily lower the number of cases where the
sub-optimal solution is worse than the optimal one, by ensuring that only the least likely states are omitted. The choice
of summation limits also involves a trade-off with complexity,
which has a polynomial relationship with the size of the state
space (c.f. Section V). Therefore, an appropriate choice of
summation limits will result in the smallest state space such
that the probability of the drift being outside that range is as
low as required. The first step to identify good summation
limits is to derive an accurate probability distribution of the
state space, avoiding the Gaussian approximation of [4].
A. Drift Probability Distribution
The drift ST after transmission of T bits was stated in [4]
(and shown in [20]) to be normally distributed with zero mean
and a variance equal to T p/(1 − p) for the special case where
p := Pi = Pd . This distribution is asymptotically valid as
T → ∞. For cases where Pi 6= Pd or where T is not large
enough, this distribution cannot be used. This is particularly
relevant for determining the summation limits of (7) where
the sequence length n is not large. An exact expression for
the probability distribution of ST is given by
ΦT (m) = Pr {ST = m}
j
T
X
T
T +m+j−1
Pi Pd
T m
= Pt Pi
,
j
m+j
Pt
j=j
(8)
0
where j0 = max(−m, 0). Observe that for a drift of m bits,
we need m insertion events more than we have deletion events.
Over a sequence of T bits, for j deletion events, this means
5
m + j insertion events and T − j transmission events. The
j
probability of this is Pim+j Pdj PtT −j = PtT Pim [Pi Pd /Pt ] . We
get (8) by adding all different combinations of these events,
and summing over j, noting that we cannot have fewer than 0
events of any type. Specifically, the number of combinations
for j deletions in T transmitted bits is given by Tj . The
number of combinations for m + j insertions is given by
T +m+j−1
, as the m + j insertion events create an additional
m+j
m + j opportunities for insertion.
B. Avoiding Numerical Issues
In a practical implementation, computing the drift probability (8) requires a few special considerations. Practical
codes from the literature have codeword size n in the range
5–12 bits and number of codewords N up to 1000, for a
frame length nN of about 4000–6000 bits. These codes are
designed to operate under channel conditions Pi , Pd from 10−3
to above 10−1 . Evaluating (8) under these conditions, one
encounters very large values for the two binomial coefficients
and very small values for the power term. For example,
consider evaluating (8) at m = 0 for T = 6000 and
Pi = Pd = 10−3 . The two binomial coefficients have a range
of up to 1.56 × 101804 (at j = 3000) and 8.34 × 103609
(at j = 6000) respectively. The power term has a range of
down to 1.65 × 10−35995 (at j = 6000). This range is far
beyond that representable even in double-precision floating
point. A direct implementation of (8) will therefore result in
numerical overflow and underflow (in computing the binomial
coefficients and power term respectively) for typical frame
sizes and channel conditions, even though the summation term
itself is representable.
The above numerical range problem can be avoided by
combining the computation of all terms in the summation as
follows. Observe that (8) can be rewritten as
ΦT (m) =
T
X
δj ,
(9)
j=j0
j
T +m+j−1
Pi Pd
T m T
(10)
where δj = Pt Pi
Pt
j
m+j
and j0 = max(−m, 0) as before. In this expression, note
that the summation is empty if j0 > T , resulting in zero
probability. Also, since j ≥ 0, the first binomial coefficient
is always non-zero, while the second binomial coefficient is
non-zero if T > 0. Expanding the binomial coefficients using
the factorial formula, we can express the summation term
recursively as
δj = δj−1 ·
Pi P d T + m + j − 1 T − j + 1
·
·
,
Pt
m+j
j
(11)
allowing successive factors to be determined easily from
previous ones. The initial factor required is the one at j0 ,
and can be determined from (10) by expanding the binomial
coefficients using the multiplicative formula:
j
j0
m+j0
Y
T − j0 − i Y T − 1 − i Pi Pd 0
δj0 = PtT Pim
.
i
i
Pt
i=1
i=1
(12)
Consider the earlier example, now evaluating (9) at m = 0
for T = 6000 and Pi = Pd = 10−3 . In this case, the initial
value δj0 = 6.07 × 10−6 , and the multiplier δj /δj−1 in the
recursive expression (11) has its smallest value of 3.34×10−10
at j = 6000. Both values are easily representable as floating
point numbers.
Using (9), numerical range issues remain when computing
δj0 for larger values of Pi , Pd , and consequently also for storing successive values of δj . For example, consider evaluating
(9) at m = 0 for T = 6000 and Pi = Pd = 10−1 . In
this case δj0 = 3.47 × 10−582 , and one needs to accumulate
a number of δj values in this range to obtain the required
result Φ6000 (0) = 0.0109. Again, the intermediate values are
beyond the range of double-precision floating point numbers
although the final result is representable. These numerical
range issues can be avoided by computing (11) and (12) using
logarithms. For the earlier example with m = 0, T = 6000,
and Pi = Pd = 10−1 , we now get log δj0 = −1.34 × 103 and
the smallest value of log δj is −1.93 × 104 at j = 6000.
Finally, the required drift probability is obtained by accumulating the exponential of the log δj values using (9).
However, the individual values of δj are still beyond the
range of double-precision floating point. In practice, we have
found that the use of extended-precision (80-bit) floating point
provides sufficient range. Alternatively, the accumulation in (9)
may be computed in logarithmic domain using
the property
log(A + B) = log A + log 1 + elog B−log A .
Note that expression (8) is valid for any Pi ≥ 0, Pd ≥ 0,
and Pi + Pd < 1. However, the computation using logarithms
cannot be applied directly when either or both of Pi and
Pd are zero. These degenerate cases have to be handled as
special cases, by first reducing (8) and then implementing the
simplified equations using logarithms.
C. Probability of Drift Outside Range
+
We want to choose lower and upper limits m−
T , mT such
that the drift after transmitting a sequence of T bits is outside
+
the range {m−
T . . . mT } with an arbitrarily low probability Pr :
+
Pr ST < m−
< Pr ,
T + Pr ST > mT
(13)
m+
T
or equivalently: 1 −
X
ΦT (m) < Pr .
(14)
m=m−
T
An appropriate choice of limits can be obtained iteratively
as follows. Observe that for the BSID channel ΦT (m) is
monotonically decreasing with increasing |m|. A first estimate
for the limits is given by:
−(1)
mT
+(1)
and mT
Pr
2
Pr
= min m ΦT (m + 1) <
,
2
= max m ΦT (m − 1) <
(15)
(16)
where the number in superscript parentheses indicates the
iteration count. If these estimates satisfy (14), we use them
6
103
That is, we extend the range by one in the direction of greatest
gain. The iterative process is repeated until (14) is satisfied.
−
The size of the state space is given by MT = m+
T − mT + 1.
E. Example
Overestimating the required state space increases computational complexity, while underestimating the state space
often results in poor decoding performance. Accurate limits
are particularly important for restricting the drifts considered
across each codeword. It is therefore useful to illustrate the
discrepancy between the approximate distribution of [4] and
the exact expression for the distribution of the drift. Consider
a system with typical block and codeword sizes N = 500, n =
Mτ (appr.)
Mτ (exact)
Mn (appr.)
Mn (exact)
M1 (appr.)
M1 (exact)
102
101
100 −4
10
D. Choice of Summation Limits
10−3
10−2
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
(a)
Probability of Event Outside Chosen Limits
When considering the whole frame, T = τ , so that the
overall size of the state space is given by Mτ . Now the final
output of the MAP decoder is calculated using (1), which sums
0
+
over all Mτ prior states m−
τ ≤ m ≤ mτ . For each prior state,
however, only the drifts introduced by the transmission of n
bits need to be considered, corresponding to a subset Mn of
+
states m−
n ≤ m ≤ mn . Similarly, the computation of (4)
+
and (5) is required for all Mτ states m−
τ ≤ m ≤ mτ , each
involving a summation over Mn prior or posterior states m−
n ≤
respectively.
Finally,
the
state
transition
metric
is
m0 ≤ m+
n
obtained using the forward pass of (7); this is computed over
+
a sequence of n bits for each of Mn states m−
n ≤ m ≤ mn .
Each recursion consists of a summation over prior states m0 ;
in this case only the drifts introduced by the transmission of
one bit need to be considered, corresponding to a subset M1
+
0
of prior states m−
1 ≤ m ≤ m1 .
Now consider that we want to limit the probability of any
of these summations not covering an actual channel event over
a whole frame to, say, no more than Pe . When computing the
limits over the whole frame, m±
τ , we simply need to set Pr =
Pe . However, when computing limits over an n-bit sequence,
m±
repeated for each of N such
n , since this summation is √
sequences, we set Pr = 1 − N 1 − Pe ≈ PNe for small Pe .
Similarly,
for limits over a 1-bit sequence, m±
1 , we use Pr =
√
τ
1 − 1 − Pe ≈ Pτe for small Pe .
Except in the case of stream decoding (c.f. Section VII),
the state space limits only need to be determined once and
remain valid as long as the channel conditions do not change.
In any case, the required values of ΦT (m) depend only on
the code parameters and channel conditions, so that a table
may be pre-computed. This makes the average complexity of
determining the state space limits negligible.
N =500, n =10, Pe =10−10
104
Number of States
as our lower and upper limits. Otherwise these estimates are
updated iteratively as follows:
(
−(i)
+(i)
−(i)
mT − 1 if ΦT (mT + 1) ≤ ΦT (mT − 1)
−(i+1)
mT
=
−(i)
mT
otherwise,
(17)
(
+(i)
+(i)
−(i)
mT + 1 if ΦT (mT + 1) > ΦT (mT − 1)
+(i+1)
mT
=
+(i)
mT
otherwise.
(18)
100
10−1
10−2
10−3
10−4
10−5
10−6
10−7
10−8
10−9
10−10
10−11
10−12
10−13 −4
10
N =500, n =10, Pe =10−10
Mτ (appr.)
Mτ (exact)
Mn (appr.)
Mn (exact)
M1 (appr.)
M1 (exact)
10−3
10−2
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
(b)
Figure 2. (a) Number of states within summation limits, and (b) probability
of encountering a channel event outside the chosen summation limits over a
single frame, using the approximation of [4] and our exact computation.
10. We plot in Fig. 2a the number of states within summation
limits using the approximate and exact expressions, in each
case for Pe = 10−10 . For T = 1, [4, Section VII.A] assumes
a maximum of two successive insertions; this is equivalent to
setting m+
1 = 2, so that M1 = 4. It is immediately apparent
that while the approximation is very close for large T and high
Pi = Pd , it quickly starts to underestimate the required range
at lower channel error rates. As expected, the discrepancy
is particularly large when considering shorter sequences. For
T = 1 it is not surprising that there is a large discrepancy for
channels with high error rate.
Next, we determine the probability of encountering a channel event outside the chosen limits over a single frame, shown
in Fig. 2b for the same limits used in Fig. 2a. For the
exact distribution, this probability is always below the chosen
threshold Pe = 10−10 , as expected. For the approximation,
however, the probability of exceeding the chosen limits is
higher than the threshold throughout the range considered.
7
At lower channel error rates, the discrepancy is significant
(several orders of magnitude) even for large T . For small T ,
the probability of exceeding the chosen limits is high enough
to make the approximation useless. For T = 1, the artificial
limit of two successive insertions of [4] means that channels
with high error rate will exceed this limit with high probability.
V. A LGORITHM C OMPLEXITY
A. Complexity of the MAP Decoder
As a first step towards determining the overall complexity of
the decoder, consider first the calculation of the state transition
metric in (6). This is recursively computed using the forward
pass of (7) over a sequence of n bits, for each of Mn states
m. Each recursion consists of a summation over M1 prior
states m0 as argued in Section IV-D. The bit-level probability
Q can be obtained by a look-up table. Thus the complexity
for calculating a single state transition metric is Θ(nMn M1 ).
The final output of the algorithm consists of q probabilities
for each of N symbols, calculated using (1). This equation
sums over all Mτ prior states m0 and Mn states m, defining the
domain for σi (m0 , m, D). It follows from (3) that the domain
for γi (m0 , m, D) is the same. Now the computation of (3) is
dominated by the evaluation of γi (m0 , m, D) in (6), whose
complexity is Θ(nMn M1 ) as shown. Considering the number
of times the γ metric is computed, the MAP decoder has an
asymptotic complexity of Θ(N nqMτ Mn2 M1 ).
B. Complexity of the Davey-MacKay Decoder
It would initially appear that the MAP decoder complexity
is significantly higher than that of the Davey-MacKay decoder,
given as O(N nMτ M1 ) in [4] for a direct implementation
(using our notation). However, the expression of the DaveyMacKay decoder seems to consider only the complexity of the
initial forward and backward passes, ignoring the additional
small forward passes needed to compute the final decoder
output.
The final output of the Davey-MacKay algorithm also consists of q probabilities for each of N symbols. Each of these is
computed using [4, (4)], which sums over all possible prior and
posterior states. In a direct implementation all possible prior
states need to be considered; using our notation the number of
states is Mτ . While not stated in [4], the number of posterior
states that need to be considered is Mn , as argued for the MAP
decoder. The computation within the summation of [4, (4)] is
dominated by the conditional probability, which is computed
using a separate forward pass. This forward pass is effectively
identical to (7) whose complexity is Θ(nMn M1 ). Considering
the number of times the forward pass is computed, it follows
that the Davey-MacKay decoder has an overall asymptotic
complexity of Θ(N nqMτ Mn2 M1 ).
C. Comments on Algorithm Complexity
Comparing the complexity expressions for the MAP decoder
for TVB codes and the Davey-MacKay decoder for sparse
codes with a distributed marker sequence, it follows that the
asymptotic complexity for both decoders is the same. This is
consistent with experimental running times for both decoders
in [13].
In the complexity expression note that N , n, and q depend
only on the code parameters while Mτ , Mn , and M1 also
depend on the channel conditions. For M1 , it was argued in
[4, Section VII.A] that it is sufficient to consider a maximum
of two successive insertions, at a minimal cost to decoding
performance. This is equivalent to setting m+
1 = 2, so
that M1 = 4; these limits were also used in [13], [14].
However, this artificially low limit is insufficient for more
advanced code constructions, as shown in [15]. It was also
argued in [4] that useful speedups can be obtained by only
following paths through the trellis that pass through nodes with
probabilities above a certain threshold. However, the choice of
this threshold was not analyzed. It is also likely that this choice
would depend on the properties of the inner code being used.
VI. S PEEDING T HINGS U P
A. Batch Computation of Receiver Metric
In a naïve implementation, each γ computation (6) requires
the computation of the receiver metric as a separate forward
pass using (7). However it can be observed that for a given
starting state m0 and symbol D, the γ metric will be computed for each end state m within the limits considered (c.f.
equations (1), (3), (4), and (5), where the γ computations are
used). In turn, this means that for a given x, the receiver metric
will need to be determined for all subsequences ẏ within the
drift limit considered. It is therefore sufficient to compute the
forward pass (7) once, with the longest subsequence ẏ required. In doing so, the values of the receiver metric for shorter
subsequences are obtained for free. We call this approach
batch computation. This effectively reduces the complexity
of computing the collection of γ metrics by a factor of Mn .
The asymptotic complexity of the MAP decoder is therefore
reduced to Θ(N nqMτ Mn M1 ).
B. Lattice Implementation of Receiver Metric
To compute the receiver metric, an alternative to the trellis
of (7) is to define a recursion over a lattice as in [17]. For
the computation of R(ẏ|x), the required lattice has n + 1
rows and µ̇ + 1 columns. Each horizontal path represents an
insertion with probability 21 Pi , each vertical path is a deletion
with probability Pd , while each diagonal path is a transmission
with probability Pt Ps if the corresponding elements from x
and ẏ are different or Pt P̄s if they are the same. Let Fi,j
represent the lattice node in row i, column j. Then the lattice
computation in the general case is defined by the recursion
Fi,j =
1
Pi Fi,j−1 + Pd Fi−1,j + Q̇(ẏj |xi )Fi−1,j−1 ,
2
(19)
which is valid for i < n, and where Q̇(y|x) can be directly
computed from y, x and the channel parameters:
(
Pt Ps if y 6= x
Q̇(y|x) =
(20)
Pt P̄s if y = x.
8
Table II
C OMPLEXITY EXPRESSIONS FOR THE MAP DECODER FOR VARIOUS
COMPUTATION MODES OF THE RECEIVER METRIC .
Initial conditions are given by
(
1 if i = 0, j = 0
Fi,j =
0 if i < 0 or j < 0.
(21)
The last row is computed differently as the channel model
does not allow the last event to be an insertion. In this case,
when i = n, the lattice computation is defined by
Fn,j = Pd Fn−1,j + Q̇(ẏj |xn )Fn−1,j−1 .
C. Optimizing the Lattice Implementation
In the lattice implementation of the receiver metric, it can
be readily seen that the horizontal distance of a lattice node
from the main diagonal is equivalent to the channel drift for
the corresponding transmitted bit. It should therefore be clear
that the likelihood of a path passing through a lattice node
decreases as the distance to the main diagonal increases.
We can take advantage of the above observation by limiting
the lattice computation to paths within a fixed corridor around
the main diagonal. Specifically, the arguments of Section IV
can be applied directly, resulting in a corridor of width Mn
in general for the transmitted sequence of n bits considered.
Exceptions to this width occur in the first few rows with index
+
i < −m−
n and the last few rows with index i > µ̇ − mn ,
where part of the corridor falls outside the lattice rectangle.
The number of nodes within this corridor is given by
where κUL =
κLR =
−
∆(−m−
n ) − ∆(−mn − n),
+
∆(n + m+
n − µ̇) − ∆(mn −
(
and ∆(k) =
k2 +k
2
0
if k > 0
otherwise.
(23)
(24)
µ̇),
Algorithm
Original
Batch computation
Lattice receiver
D
Corridor constraint
Complexity
Θ(N nqMτ Mn2 M1 )
Θ(N nqMτ Mn M1 )
+
Θ(N
nqMτ h[n + mn ]) h
ii
−
2
Θ N qMτ nMn − 21 (m−
n ) − mn
(22)
Finally, the required receiver metric is obtained from this
computation as R(ẏ|x) = Fn,µ̇ . The calculation of a single
run through the lattice requires a number of computations
proportional to the number of nodes in the lattice. Now for
the transmitted sequence of n bits considered, the number of
rows will always be n while the number of columns is at most
n + m+
n . The complexity of a direct implementation of this
algorithm is therefore Θ(n[n + m+
n ]).
It has been argued in Section VI-A that for a given x,
the receiver metric R(ẏ|x) needs to be determined for all
subsequences ẏ within the drift limit considered. Observe
that the same argument applies equally when the receiver
metric is computed using the lattice implementation (19).
Therefore, when the lattice implementation is used in batch
mode, the MAP decoder has an asymptotic complexity of
Θ(N nqMτ [n + m+
n ]).
κ = nMn − κUL − κLR ,
A
B
C
(25)
(26)
The complexity of the corridor-limited lattice algorithm is
therefore Θ(nMn − κUL − κLR ).
Some simplification of this expression is possible when
the corridor-limited lattice algorithm is used in the MAP
decoder with batch computation for the channel considered.
When batch computation is used, µ̇ = n + m+
n by definition, so that κLR = 0. Furthermore,
for
the
BSID
channel,
− 2
1
−
−n ≤ m−
≤
0,
so
that
κ
=
(m
)
−
m
.
Under
these
UL
n
n
n
2
conditions,the MAP decoder
has an asymptotic
complexity of
2
−
Θ N qMτ nMn − 12 (m−
)
−
m
.
n
n
D. Comparing Complexity
A summary of the complexity expressions for the MAP
decoder for various computation modes of the receiver metric
is given in Table II. Comparing the expressions in rows A
and B of Table II we can immediately see that the batch
computation of the receiver metric reduces complexity by a
factor equal to Mn . Unfortunately, the remaining complexity
expressions contain terms that depend on the code parameters
and channel conditions in a rather opaque way, making it
harder to understand the benefits of these improvements. In
the first instance, we can simplify the expressions further to
facilitate comparison. Consider the expression in row C of
Table II, when the lattice implementation is used. It can be
shown that n + m+
n → Mn − 1 as channel conditions get
worse; we can therefore simplify the complexity expression to
O(N nqMτ Mn ). Comparing this to the expression in row B of
Table II we can see that the use of the lattice implementation
reduces complexity by a factor of at least M1 . Finally, consider
the expression in row D of Table II, when the corridor
−
constraint
−is 2applied
to the lattice algorithm. Since mn ≤ 0,
1
−
the 2 (mn ) − mn term is strictly positive. The reduction in
complexity offered by the corridor constraint is therefore equal
2nMn
to 2nM −(m
− , and becomes significant as channel con− 2
n
n ) +mn
ditions improve. As channel conditions get worse, m−
n → −n,
so that the expression is dominated by the nMn term. Under
these conditions, the complexity of the corridor-constrained
lattice implementation becomes approximately equal to that
of the unconstrained lattice implementation.
We can also illustrate the effect of the proposed speedups
by considering a rate- 21 TVB code with typical block and
codeword sizes N = 500, n = 10, and q = 32. We
compute the MAP decoder complexity for this code under
a range of channel conditions, using the original algorithm
of Section II-C and the improvements described above. We
plot these in Fig. 3 using the same summation limits as
in Section IV-E. Note that for a fairer comparison between
the lattice and trellis modes, we include a constant factor of
three in the lattice computation. This follows the observation
that each lattice node computation (19) requires three multiplications while each trellis computation (7) requires only
one. A few general observations can be made on this graph:
a) The batch computation of the receiver metric results in
a considerable reduction of complexity throughout, but is
even more significant under poor channel conditions. b) The
lattice implementation is considerably less complex than the
9
N =500, n =10, q =32
Complexity (Number of Arithmetic Operations)
1014
1013
1012
Trellis
Trellis (batch)
Lattice (batch)
Lattice corridor (batch)
1011
1010
109
108
107 −4
10
10−3
10−2
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
Figure 3. MAP decoder complexity (in number of arithmetic operations) under
a range of channel conditions, for various computation modes of the receiver
metric.
trellis implementation at high channel error rates. c) The
lattice corridor constraint extends this improvement to the low
channel error rate range. In conclusion, the proposed speedups
result in a considerable reduction in complexity of almost
two orders of magnitude for typical code sizes and channel
conditions. We have observed a similar trend under a range of
typical code sizes, so this result can be taken as representative.
Note that in general this distribution βN (m) has a wider spread
than Φτ (m).
As discussed in Sections IV-C and IV-D, the choice of state
space limits depends on the expected distribution of drift.
For limits involving the whole frame, the distribution used
is Φτ (m), which assumes that the initial drift is zero. The
assumption does not hold under stream decoding conditions,
where the initial drift is not known a priori, although its distribution can be estimated. The uncertainty in locating the startof-frame position increases the uncertainty in locating the endof-frame position, resulting in a wider prior distribution for the
end-state boundary condition βN (m). Therefore, any limits on
state space determined using Φτ (m) will be underestimated.
The severity of this error depends on the difference between
βN (m) and Φτ (m), which increases as channel conditions
get worse. For stream decoding, therefore, it is sensible to
recompute the state space limit Mτ at the onset of decoding a
given frame, using βN (m) in lieu of Φτ (m). Doing so avoids
underestimating the required state space, and implies that for
stream decoding, the state space size will change depending
on how well-determined the frame boundaries are.
After decoding the current frame, we obtain the posterior
probability distribution for the drift at end-of-frame, given by:
n
o
n
o
τ +m+
τ +m+
Pr Sτ = m Ym− τ = λN (m)/ Pr Ym− τ
τ
τ
λN (m)
.
=P
0
m0 λN (m )
(28)
The most likely drift at end-of-frame can be found by:
VII. S TREAM D ECODING
We have so far considered the case where frame boundaries
are known exactly. While there are practical cases involving
single-frame transmission where this is true, exact frame
boundaries are often unknown. The MAP decoder can handle
such cases by changing the initial conditions for (4) and (5)
and choosing appropriate state space limits. This obviates
the need for explicit frame-synchronization markers as used
in conventional communication systems, and can therefore
reduce this overhead. The approach presented here is in
principle similar to that used in [4] for ‘sliding window’
decoding. However, there are some critical differences which
we explore further in Section VII-C.
A. Choosing End-of-Frame Priors
Consider first the common case where a sequence of frames
is transmitted in a stream. The usual practice in communication systems is for the receiver to decode one frame at a time,
starting the decoding process as soon as all the data related to
the current frame is obtained from the channel. In this
case,
τ +m+
the current received frame is considered to be Ym− τ , which
τ
may include some bits from the end of the previous frame and
start of the next frame. The end-state boundary condition for
(5) can be obtained by convolving the expected end-of-frame
drift probability distribution with the start-state distribution:
X
βN (m) =
α0 (m0 )Φτ (m − m0 ).
(27)
m0
λN (m)
= arg max λN (m).
0
m
m0 λN (m )
Ŝτ = arg max P
m
(29)
As in [4], we determine the nominal start position of the next
frame by shifting the received stream by τ + Ŝτ positions.
The initial condition for the forward metric for the next frame,
α̂0 (m), is set to:
λN (m + Ŝτ )
α̂0 (m) = P
,
0
m0 λN (m )
(30)
replacing the initial condition for (4) reflecting a known frame
boundary.
B. Stream Look-Ahead
Taking advantage of the different constituent encodings in
TVB codes, the MAP decoder can make use of information
from the following frame to improve the determination of the
end-of-frame position. We augment the current block of N
symbols with the first ν symbols from the following block
(or blocks, when ν > N ), for an augmented block size
N 0 = N +ν. The MAP decoder is applied to the corresponding
augmented frame. After decoding, only the posteriors for the
initial N symbols are kept; the start of the next frame is
determined from the drift posteriors at the end of the first
N symbols, and the process is repeated.
Consider the latency of the MAP decoder to be the time
from when the first bit of a frame enters the channel to when
the decoded frame is available. The cost of look-ahead is an
increase in decoding complexity and latency corresponding
10
to the change in block size from N to N 0 . The effect
on complexity is seen by using terms corresponding to the
augmented block size in the expressions of Table II. The
latency is equal to the time it takes to receive the complete
frame and decode it. Look-ahead increases the time to receive
the augmented frame linearly with ν and the decoding time
according to the increase in complexity.
The required look-ahead ν depends on the channel conditions and the code construction. In general, a larger value is
required as the channel error rate increases. We show how
an appropriate value for ν can be chosen for a given code
under specific channel conditions in Section VIII-A. Typical
values for ν are small (ν < 10) for good to moderate
channels (Pi , Pd < 10−2 ). The required look-ahead increases
significantly for poor channels: the example in Section VIII-A
requires ν = 1000 at Pi = Pd = 2 × 10−1 .
C. Comparison with Davey-MacKay Decoder
A key feature of the Davey-MacKay construction is the
presence of a known distributed marker sequence that is
independent of the encoded message. This allows the decoder,
in principle, to compute the forward and backward passes
over the complete stream. However, to reduce decoding delay,
the decoder of [4] performs frame-by-frame decoding using
a ‘sliding window’ mechanism. The ‘sliding window’ mechanism seems intended to approximate the computation of the
forward and backward passes over all received data at once.
This approach is similar in principle to ours when stream lookahead is used; however, there are some critical differences
which we discuss below.
In [4], the starting index for a given frame is taken to
be the most likely end position of the previous frame, as
determined by the Markov model posteriors. This is the same
as the approach we use in Section VII-A. However, in [4], the
initial conditions of the forward pass are simply copied from
the final values of the forward pass for the previous frame.
This is consistent with the view that the ‘sliding window’
mechanism approximates the computation over all received
data at once, but contrasts with our method. In Section VII-A
the initial conditions of the forward pass are determined from
the posterior probabilities of the drift at the end of the previous
frame. These drift posteriors include information from the
look-ahead region and from the priors at the end of the
augmented frame, which were determined analytically from
the channel parameters.
Observe that in the ‘sliding window’ mechanism of [4],
the backward pass values cannot be computed exactly as for
the complete stream. Instead, the decoder of [4] computes the
forward pass for some distance beyond the expected end of
frame position, and initializes the backward pass from that
point. The suggested distance by which to exceed the expected
end of frame position is ‘several (e.g. five) multiples of xmax ’,
where xmax is the largest drift considered. The concept is the
same as the stream look-ahead of Section VII-B. However,
we recommend choosing the look-ahead quantity ν based on
empirical evidence (c.f. Section VIII-A).
It is claimed in [4] that the backward pass is initialized
from the final forward pass values; the reasoning behind this
is unclear, and does not seem to have a theoretical justification.
We initialize the backward pass with the prior probabilities for
the drift at the end of frame, as explained in Section VII-A.
D. Initial Synchronization
The only remaining problem is to determine start-of-frame
synchronization at the onset of decoding a stream. This
can be obtained by choosing state space limits Mτ large
enough to encompass the initial desynchronization and by
setting equiprobable initial conditions: α0 (m) = βN (m) =
1
∀m. Previous experimental results [4] have assumed a
Mτ
known start for the first frame, with the decoder responsible
for maintaining synchronization from that point onwards. We
adopt the same strategy in the following.
VIII. R ESULTS
Practical results are given in this section. We show how
an appropriate choice of decoder parameters allows stream
decoding to perform as well as when frame boundaries are
known. Results are also given for existing constructions which
can be expressed as TVB codes, showing how the symbol-level
MAP decoder improves on the original decoder (in the case of
[4]) or is equivalent (in the case of [5]). We also demonstrate
some improved constructions allowed by the flexibility of TVB
codes. These are achieved by using simulated annealing to
find TVB codes of a required order with a good Levenshtein
distance spectrum. Specifically, we seek to find constituent
codes with the highest possible minimum Levenshtein distance
and the lowest multiplicity at small distances. For all codes
so designed, M < N ; we construct our TVB codes using a
random sampling with replacement of the unique constituent
codes, and use this as our inner code. Construction parameters
for all codes used in this section are given in Table III. To
facilitate reproduction of these results, the TVB codebooks
used are available for download from the first author’s web
site3 .
A. Stream Decoding with MAP Decoder
The results of [13] assumed known frame boundaries; under
these conditions, the decoder is arguably at an advantage
when comparing with the results of [4], [5]. It is also not
clear whether the MAP decoder can keep track of frame
boundaries with the non-sparse constructions of [13], [15] and
the TVB codes introduced here, especially in the absence of
a known marker sequence. In the following we investigate
the performance of the MAP decoder under stream decoding
conditions, and consider the choice of look-ahead required.
As in [4] we assume that the start of the first frame is known,
while the decoder is responsible for keeping synchronization
from that point onwards. We use the limits specified in
Section IV.
We start by investigating the effect of stream decoding on
the ability of the MAP decoder to track codeword boundaries.
We consider a (6, 8, 12) TVB code, which is the inner code
for the concatenated system N2b of Table III. We simulate
3 Available
at http://jabriffa.wordpress.com/publications/data-sets/.
11
Table III
C ONSTRUCTION PARAMETERS OF CODES USED IN SIMULATIONS .
Labela
P1
N1a
N1b
P2
N2a
N2b
P3
N3
P4
N4
P5
N5
Inner code
(5, 16) sparse
(5, 16) sparse
(10, 256, 3) TVB
(6, 8) sparse
(6, 8) sparse
(6, 8, 12) TVB
9 bits, uncoded
9 bits, uncoded
not applicable
(7, 8, 8) TVB
not applicable
(7, 4, 32) TVB
Marker
random, distributed
random, distributed
none
random, distributed
random, distributed
none
001/110, appended
001/110, appended
not applicable
none
not applicable
none
Outer code
LDPC (999, 888) F16
LDPC (999, 888) F16
LDPC (499, 444) F256
LDPC (1000, 100) F8
LDPC (1000, 100) F8
LDPC (1000, 100) F8
LDPC (3001, 2000) F2
LDPC (2997, 1998) F2 b
3
turbo code F2
Rate 14
LDPC (666, 333) F8
1
turbo code F2
Rate 10
LDPC (855, 300) F4
Comment
Published in [4, Fig. 8, Code D]
Identical construction to P1, symbol-level MAP decoder
Same overall rate and block size as P1
Published in [4, Fig. 8, Code I]
Identical construction to P2, symbol-level MAP decoder
Same overall rate, block size, and outer code as P2
Published in [5, Fig. 7, Code D]
Identical inner code to P3, marginally smaller outer code
Published in [11, Fig. 4, Code T2]
Same overall rate as P4
Published in [11, Fig. 4, Code T4]
Same overall rate as P5
a Labels
starting with P indicate previously published results, while labels starting with N indicate new simulation results.
by truncating the LDPC (3001, 2000) F2 of P3. This truncation is necessary so that the outer-encoded sequence can be expressed by an
integral number of inner codewords.
b Obtained
Fidelity at codeword boundaries, (p = Pd = Pi; Ps =0)
100
Frame Error Rate
Fidelity
10−2
10−3
10−1
10−2
(6,8,12) TVB, p =0.22
10−4
0
500
1000
1500
Index for codeword following boundary
2000
Figure 4. The fraction of correctly resynchronized codeword boundaries
(fidelity) as a function of codeword index, for code N2b of Table III.
this inner code with a block size N = 2000 under the channel
conditions at the onset of convergence for the concatenated
system, that is at Pi = Pd = 0.22, assuming only the
start position of the first frame is known. At each codeword
boundary we plot the fraction of correctly determined drifts
(fidelity) in Fig. 4. As expected, the fidelity drops at the end
of the frame, where the actual drift is unknown to the decoder.
However, it can be observed that the fidelity reaches a steady
high value within about 1000 codewords from the end of
frame. It could therefore be supposed that a look-ahead of
ν = 1000 would be sufficient for this code under these channel
conditions. The dip at the start of the frame is caused by the
uncertainty in the frame start position, due to the very low
fidelity at the end of the previous frame.
To test this hypothesis, we concatenate this inner code
with the (1000, 100) LDPC code over F8 of [4, Code I]. We
simulate this system under the following conditions: 1) known
frame start and end (frame decoding); 2) known start for
the first frame, unknown frame ends (stream decoding), no
Comparison of frame and stream decoding for code N2b
10−3 −1
10
Frame [1 iter]
Frame [5 iter]
Stream, ν =0 [1 iter]
Stream, ν =0 [5 iter]
Stream, ν =1000 [1 iter]
Stream, ν =1000 [5 iter]
Channel Error Event Probability (Pd = Pi; Ps =0)
100
Figure 5. Demonstration of the effect of look-ahead on the MAP decoder’s
performance under stream decoding conditions, and comparison with frame
decoding.
look-ahead; 3) stream decoding with look-ahead ν = 1000
codewords. Results are shown in Fig. 5. We give results after
the first and fifth iterations. As anticipated, performance under
stream decoding conditions is poorer than frame decoding if
there is no look-ahead. However, an appropriate look-ahead
quantity allows the decoder to perform as well under stream
decoding as under frame decoding.
It is important to highlight that this result is dependent on
the inner code structure, and that therefore the generalization
to other constructions is not obvious. However, we have
repeated the same test with other constructions, including
those of [4], [5], [13]–[15] and the new constructions in this
paper, and under different channel conditions. In all cases we
have found that the result is repeatable, in that it is possible
to approach the performance of frame decoding with stream
decoding, as long as an appropriate look-ahead quantity is
chosen. The only cost of stream decoding is therefore the need
for a fidelity analysis to determine a suitable look-ahead value
12
100
Comparison with Davey & MacKay
100
10−1
Frame Error Rate
Frame Error Rate
10−1
10−2
10−3
P1
N1a [1 iter]
N1a [5 iter]
N1b [1 iter]
N1b [5 iter]
10−4
10−5 −3
3 ×10
Comparison with Ratzer and Mansour & Tewfik
10−2
P2
N2a [1 iter]
N2a [5 iter]
N2b [1 iter]
N2b [5 iter]
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
3 ×10−1
Figure 6. Comparison with Davey-MacKay: improving the performance of
[4, Code D] (left) and [4, Code I] (right) using our MAP decoder, iterative
decoding, and an inner code with better Levenshtein distance spectrum.
and the increased decoding latency and complexity caused
by the augmented block size. Since the code performance is
undiminished, to simplify our analysis from this point onwards
we assume known frame start and end positions.
B. Comparison with Prior Art
We have already shown in [13] that the (symbol-level) MAP
decoder allows us to obtain better performance from the codes
of [4]. Further improvement can be obtained with iterative
decoding, as we show here. Additionally, the flexibility of
TVB codes allows us to obtain codes that perform better
at the same size and/or rate. In the following, we simulate
channel conditions Pi = Pd ; Ps = 0 in order to compare with
published results.
For low channel error rates, consider [4, Code D], listed as
P1 in Table III. We compare the previously published result
with a MAP decoding of the same code (N1a) in Fig. 6. As
shown in [13], the MAP decoder improves the performance
of this code even after the first iteration; additional iterations
improve the result further. At the same overall code rate and
block size we can improve the performance further by designing an inner TVB code with a better Levenshtein distance
spectrum (N1b). We repeat the process at higher channel
error rates for [4, Code I], listed as P2 in Table III. Again,
compared to the published result, a MAP decoding of the same
code (N2a) improves performance even after the first iteration,
also in Fig. 6. Additional iterations improve the result, but
the difference in this case is less pronounced. Replacing the
inner code with one of the same size but a better Levenshtein
distance spectrum (N2b) improves performance further.
As we have already discussed in Section II-A, the marker
codes given by Ratzer [5] can also be cast as TVB codes.
In [5] binary outer LDPC codes were used. To use a binary
outer code with our MAP decoder, the bitwise APPs can
be obtained from the q-ary symbol APPs by marginalizing
over the other bits [21, p. 326]; these are then passed to the
decoder for the binary outer code. In this case, for a binary
10−2
P3 [serial]
P3 [iterative]
N3 [1 iter]
N3 [20 iter]
P4 [10 iter]
N4 [5 iter]
P5 [10 iter]
N5 [20 iter]
10−3
10−4
10−5 −2
10
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
Figure 7. Comparison with Ratzer and with Mansour & Tewfik: demonstrating
the equivalence of our MAP decoder on [5, Code D], with and without iterative
decoding, and improving performance on [11, Codes T2, T4] at the same
overall code rate, using inner codes with improved Levenshtein distance in
concatenation with LDPC outer codes.
outer code we expect the performance of the concatenated
code to be identical, whether the inner code is decoded with
the bit-level (MAP) decoder of [5] or with our symbol-level
decoder. We show this in Fig. 7 for [5, Code D], listed as
P3 in Table III, in comparison with an almost-identical code
(N3) using our MAP decoder. It is important to highlight that
decoding marker codes as TVB codes provides no material
advantage; in fact, a cost is paid in complexity for doing
so. We do not propose or expect that marker codes will be
decoded as TVB codes. However, there is value in showing
that marker codes can be decoded as TVB codes with no loss
in performance. Specifically, this allows us to compare the
structure of marker codes with other constructions, within the
same context.
Finally, in Fig. 7 we compare with the more recent turbo
codes of [11, Codes T2, T4], respectively listed as P4 and P5
in Table III, with concatenated systems of the same overall
rate, using a TVB inner code and an LDPC outer code. It can
be seen that our concatenated systems outperform the codes of
[11], significantly at lower channel error rates, and somewhat
less so at higher channel error rates.
IX. C ONCLUSIONS
In this paper we have considered TVB codes, which generalize a number of previous codes for synchronization errors.
We discussed the applicable design criteria for TVB codes,
expressing some previously published codes as TVB codes
and showing that the greater flexibility of TVB codes allows
improved constructions. For example, our (7, 8, 4) TVB code
achieves a SER of 10−4 at a Pi , Pd that is almost two orders of
magnitude higher than a marker or distributed marker code of
the same size, and slightly better than our earlier SEC codes.
We also considered a number of important issues related
to a practical implementation of the corresponding MAP
decoder. Specifically, we have given an expression for the
13
expected distribution of drift between transmitter and receiver
due to synchronization errors, with consideration for practical
concerns when evaluating this expression. We have shown how
to determine an appropriate choice for state space limits based
on the drift probability distribution. The decoder complexity
under given channel conditions is then expressed as a function
of the state space limits used. For a given state space, we have
also given a number of optimizations that reduce the algorithm
complexity with no further loss of decoder performance. The
proposed speedups, which are independent of the TVB code
construction, result in a considerable reduction in complexity
of almost two orders of magnitude for typical code sizes and
channel conditions. For code constructions with appropriate
mathematical structure we expect to be able to replace the
receiver metric, which considers each possible transmitted
codeword, with a faster soft-output algorithm. Next, we have
considered the practical problem of stream decoding, where
there is no prior knowledge of the received frame boundary
positions. In doing so we have also shown how an appropriate choice of decoder parameters allows stream decoding to
approach the performance when frame boundaries are known,
at the expense of some increase in complexity.
Finally, practical comparisons of TVB codes with earlier
constructions were given, showing that TVB code designs can
in fact achieve improved performance. Even compared to the
state of the art codes of [11], the TVB codes presented here
1
achieve a FER of 10−3 at 24% higher Pi , Pd for a rate- 10
3
code, and at 84% higher Pi , Pd for a rate- 14 code. We expect
further improvements to the codes shown here to be possible,
particularly by co-designing optimized outer codes. However,
a detailed treatment of the design process is beyond the scope
of this paper, and will be the subject of further work.
R EFERENCES
[1] F. F. Sellers, “Bit loss and gain correction code,” IRE Trans. Inf. Theory,
vol. IT-8, pp. 35–38, 1962.
[2] V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions and reversals,” Sov. Phys. Doklady, vol. 10, no. 8, pp. 707–710,
1966.
[3] R. G. Gallager, “Sequential decoding for binary channels with noise and
synchronization errors,” Massachusetts Inst. of Tech. Lexington Lincoln
Lab, Tech. Rep. 2502, Oct. 27th, 1961.
[4] M. C. Davey and D. J. C. MacKay, “Reliable communication over
channels with insertions, deletions, and substitutions,” IEEE Trans. Inf.
Theory, vol. 47, no. 2, pp. 687–698, 2001.
[5] E. A. Ratzer, “Marker codes for channels with insertions and deletions,”
Annals of Telecommunications, vol. 60, pp. 29–44, Jan. 2005.
[6] F. Wang, D. Fertonani, and T. M. Duman, “Symbol-level synchronization
and LDPC code design for insertion/deletion channels,” IEEE Trans.
Commun., vol. 59, no. 5, pp. 1287–1297, May 2011.
[7] T. Swart, H. Ferreira, and M. dos Santos, “Using parallel-interconnected
Viterbi decoders to correct insertion/deletion errors,” in 7th AFRICON
Conference in Africa, vol. 1, Sep. 2004, pp. 341–344.
[8] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and
deletions in selective watermarking,” in IEEE Intern. Conf. on Signal
Image Technology and Internet Based Systems (SITIS), 2008, Nov. 30th–
Dec. 3rd, 2008, pp. 277–284.
[9] M. Mansour and A. Tewfik, “Convolutional decoding in the presence
of synchronization errors,” IEEE J. Sel. Areas Commun., vol. 28, no. 2,
pp. 218–227, Feb. 2010.
[10] M. F. Mansour and A. H. Tewfik, “Convolutional decoding in the
presence of synchronization errors,” IEEE J. Selected Areas in Commun.,
vol. 28, no. 2, pp. 218–227, Feb. 2010.
[11] ——, “A turbo coding scheme for channels with synchronization errors,”
IEEE Trans. Commun., vol. 60, no. 8, pp. 2091–2100, Aug. 2012.
[12] H. Mercier, V. Bhargava, and V. Tarokh, “A survey of error-correcting
codes for channels with symbol synchronization errors,” IEEE Commun.
Surveys Tuts., vol. 12, no. 1, pp. 87–96, First Quarter 2010.
[13] J. A. Briffa, H. G. Schaathun, and S. Wesemeyer, “An improved
decoding algorithm for the Davey-MacKay construction,” in Proc. IEEE
Intern. Conf. on Commun., Cape Town, South Africa, May 23–27, 2010.
[14] J. A. Briffa and H. G. Schaathun, “Improvement of the Davey-MacKay
construction,” in Proc. IEEE Intern. Symp. on Inform. Theory and its
Applications, Auckland, New Zealand, Dec. 7–10, 2008, pp. 235–238.
[15] V. Buttigieg and J. A. Briffa, “Codebook and marker sequence design for
synchronization-correcting codes,” in Proc. IEEE Intern. Symp. Inform.
Theory, St. Petersburg, Russia, Jul. 31–Aug. 5, 2011.
[16] J. A. Briffa, “A GPU implementation of a MAP decoder for synchronization error correcting codes,” IEEE Commun. Lett., vol. 17, no. 5,
pp. 996–999, May 27th 2013.
[17] L. R. Bahl and F. Jelinek, “Decoding for channels with insertions,
deletions, and substitutions with applications to speech recognition,”
IEEE Trans. Inf. Theory, vol. 21, no. 4, pp. 404–411, Jul. 4, 1975.
[18] L. C. Perez, J. Seghers, and D. J. Costello, Jr., “A distance spectrum
interpretation of turbo codes,” IEEE Trans. Inf. Theory, vol. 42, no. 6,
pp. 1698–1709, Nov. 1996.
[19] G. Ferrari and K. M. Chugg, “Linear programming-based optimization
of the distance spectrum of linear block codes,” IEEE Trans. Inf. Theory,
vol. 49, no. 7, pp. 1794–1800, 2003.
[20] M. C. Davey, “Error-correction using low-density parity-check codes,”
Ph.D. dissertation, University of Cambridge, 1999.
[21] D. J. C. MacKay, Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003.
| 7cs.IT
|
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
1
A Dissipative Systems Theory for FDTD with
Application to Stability Analysis and Subgridding
arXiv:1606.08761v1 [cs.CE] 28 Jun 2016
Fadime Bekmambetova, Xinyue Zhang, and Piero Triverio, Senior Member, IEEE
Abstract—This paper establishes a far-reaching connection
between the Finite-Difference Time-Domain method (FDTD) and
the theory of dissipative systems. The FDTD equations for a
rectangular region are written as a dynamical system having
the magnetic and electric fields on the boundary as inputs and
outputs. Suitable expressions for the energy stored in the region
and the energy absorbed from the boundaries are introduced,
and used to show that the FDTD system is dissipative under
a generalized Courant-Friedrichs-Lewy condition. Based on the
concept of dissipation, a powerful theoretical framework to
investigate the stability of FDTD methods is devised. The new
method makes FDTD stability proofs simpler, more intuitive, and
modular. Stability conditions can indeed be given on the individual components (e.g. boundary conditions, meshes, embedded
models) instead of the whole coupled setup. As an example of
application, we derive a new subgridding method with material
traverse, arbitrary grid refinement, and guaranteed stability. The
method is easy to implement and has a straightforward stability
proof. Numerical results confirm its stability, low reflections, and
ability to handle material traverse.
Index Terms—finite-difference time-domain, stability, energy,
dissipation, subgridding.
I. I NTRODUCTION
The Finite-Difference Time-Domain (FDTD) method is
widely used to solve Maxwell’s equations numerically in microwave and antenna engineering, photonics and physics [1],
[2]. FDTD is versatile, easy to implement, and has a low
computational cost per time step. Through explicit update
equations, FDTD recursively computes the electric and magnetic field in the region of interest without requiring the
solution of linear systems. This update process is stable if time
step ∆t satisfies the Courant-Friedrichs-Lewy (CFL) stability
limit [2]
1
∆t < q q
,
(1)
1
1
1
1
εµ
∆x2 + ∆y 2 + ∆z 2
where ∆x, ∆y, ∆z denote cell size, ε denotes permittivity
and µ denotes permeability. While many breakthroughs have
been achieved in FDTD since Yee’s original algorithm [3],
the efficiency of FDTD for multiscale problems remains an
open problem. The simultaneous presence of large and small
geometrical features can dramatically reduce FDTD efficiency
Manuscript received ...; revised ...
This work was supported in part by the Natural Sciences and Engineering
Research Council of Canada (Discovery grant program) and in part by the
Canada Research Chairs program.
F. Bekmambetova, X. Zhang and P. Triverio are with
the Edward S. Rogers Sr. Department of Electrical and
Computer Engineering, University of Toronto, Toronto, M5S
3G4
Canada
(email:
fadime.bekmambetova@mail.utoronto.ca,
xinyuezhang.zhang@mail.utoronto.ca, piero.triverio@utoronto.ca).
because of two factors. First, the mesh has to be refined,
at least locally, to properly resolve small features, which
increases the number of unknowns and the cost per iteration.
Second, because of (1), a mesh refinement imposes a smaller
time step, which further increases computational cost. For
example, a 3X refinement of the entire FDTD mesh increases
computational cost by 81 times. These issues are unfortunate
since multiscale problems abound in practice.
Numerous solutions have been proposed to mitigate this
issue, including sophisticated boundary conditions to mimic
open spaces [2], local grid refinement [4], [5], [6] (commonly
known as subgridding), thin wire models [1], lumped elements [7], [8], and hybridizations with model order reduction [9], [10], [11], finite elements [12], integral equations [13],
ray tracing [14] and implicit schemes like ADI-FDTD [15],
[16]. From a system theory viewpoint, many of these methods
consist of the interconnection of subsystems, such as models,
algorithms, boundary conditions. For example, in [13], an
FDTD model, used to describe an inhomogeneous scatterer,
is coupled to the time-domain method of moments, used to
model a thin-wire antenna. In this way, one can leverage the
respective strengths of different algorithms. However, while
the stability properties of the individual algorithms may be
well understood, ensuring the stability of their combination
can be a formidable task. Ensuring stability is not trivial even
in the relatively simple case of FDTD subgridding, where
one just couples a coarse and a fine FDTD grid through
an interpolation rule to relate fields at the grid transition.
The lack of a systematic approach to ensure the stability of
advanced FDTD methods is a major issue, that limits the
development of new methods and their adoption by industry,
where guaranteed stability is mandatory. This issue is the
main motivation for this paper, that proposes a new theoretical
framework to investigate and ensure the stability of both
simple and advanced FDTD methods.
Several techniques are available to analyze the stability
of FDTD-like methods. Von Neumann analysis [1] is the
simplest, but is only applicable to uniform meshes and homogeneous materials. The iteration method [2] checks if the
eigenvalues of the matrix that relates the current and next
field solution are all below one in magnitude. In the energy
method [8] instead, one writes an expression for the total
energy stored in the simulation domain, and then checks if
the algorithm satisfies a discrete equivalent of the principle of
energy conservation. Since energy conservation prevents an
unphysical growth of the solution, this implies stability [17].
The iteration and energy methods are general, but they can lead
to long derivations, since they require the analysis of the whole
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
West
boundary
North boundary
(Nx + 1, Ny + 1)
∆x
Ey |1, 3
2
Hz |1, 3
2
(1, 1)
∆y
Hz | 3 , 3
East boundary
coupled scheme, which may consist of many subsystems such
as FDTD meshes, different boundary conditions, reduced order
models, and so on. For example, in a subgridding scenario,
one must derive the iteration matrix or energy function of the
whole scheme, taking simultaneously into account coarse and
fine meshes, interpolation rules and boundary conditions. This
issue makes stability analysis quite involved. Moreover, it does
not yield stability conditions on the individual subsystems.
Consequently, if a subsystem is changed (for example, a different boundary condition is introduced), the iteration matrix or
energy function of the whole problem must be derived again.
In this paper, we propose a new stability framework for
FDTD. The framework is based on the theory of dissipative
systems [18], and generalizes the energy method. First, starting
from FDTD update equations, we develop a self-contained
mathematical model for a region with arbitrary permittivity,
permeability and conductivity. The model is in the form of a
discrete time dynamical system. The magnetic field tangential
to the boundary is taken as input, while the electric field
tangential to the boundary is taken as output. Through this
form, we reveal that an FDTD model can be interpreted as
a dynamical system which is dissipative when ∆t satisfies a
generalized CFL condition. If this condition is not met, the
system can generate energy on its own, leading to an unstable
simulation. We thus establish a connection between FDTD and
the elegant theory of dissipative systems, which is a novel
result. We believe that this connection will greatly benefit the
FDTD community, since the theory of dissipative systems has
been extremely successful in control theory for ensuring the
stability of interconnected systems. This key result sets the
basis for a powerful FDTD stability theory, where each part
of a given FDTD setup (standard meshes, boundary conditions,
interpolation schemes, ...) is interpreted as a subsystem, and is
required to be dissipative. Since the connection of dissipative
systems is dissipative [18], [17], this will ensure the stability
of the FDTD algorithm resulting from the connection of the
subsystems. The proposed theory has numerous advantages. It
simplifies stability proofs, since conditions can be imposed
on each subsystem individually, rather than on the whole
coupled algorithm. Stability proofs are thus made modular
and “reusable”: once a given FDTD model (e.g., an advanced
boundary condition) has been deemed to be dissipative, it can
be combined to any other dissipative FDTD subsystem with
guaranteed stability. The proposed approach also naturally
provides the CFL stability limit of the resulting scheme,
which will be the most restrictive CFL limit of the individual
subsystems. Finally, the theory is intuitive, since it is based on
the concept of energy, familiar to most scientists. The proposed
theory is presented in 2D, for the sake of clarity. An extension
to 3D is feasible and is currently under development.
As an example of application, the proposed theory is
used to derive the subgridding algorithm which is stable
by construction, and has several desirable features. Material
traverse is supported for both dielectrics and highly conductive
materials, which is a limitation of other stable subgridding
methods [19]. The proposed method has low reflections, and
avoids non-rectangular cells [6], finite element concepts [20]
and Withney forms [21], [22]. Corners are natively supported
2
y
z
x
2 2
Hz | 3 ,1 Ex | 3 ,1
2
2
South boundary
Figure 1: Graphical representation of the 2D region considered
in Sec. II. The hanging variables introduced on the four
boundaries are denoted in green.
without any special treatment [5] nor L-shaped cells [6].
Ultimately, the proposed algorithm just consists of a compact
FDTD-like update equation for the edges between coarse and
fine mesh, and is thus easy to implement. This update equation
is provided explicitly for an arbitrary integer refinement ratio
r, while several previous works [5], [6] provide the update
weights only for specific refinements (typically r = 2 or 3),
leaving the derivation of other cases to the Reader.
The paper is organized as follows. In Sec. II, we cast the
FDTD update equations for a rectangular region into the form
of a dynamical system with suitable inputs and outputs. In
Sec. III, we show that FDTD equations can be interpreted as
a dissipative system, and propose the new stability theory. The
theory is applied to derive a stable subgridding algorithm in
Sec. IV, followed by numerical results in Sec. V.
II. D ISCRETE T IME DYNAMICAL M ODEL FOR A 2D FDTD
R EGION
The goal of this section is to cast the FDTD equations for a
2D region into the form of a discrete time dynamical model.
The model shall be self-contained, involving only field samples
from the nodes belonging to the region. This goal will be
achieved by introducing suitable magnetic field samples at the
boundaries.
We consider the 2D rectangular region shown in Fig. 1,
operating in a TE mode with components Ex , Ey , and Hz .
The region is discretized with a uniform rectangular grid with
Nx × Ny cells, of width ∆x and height ∆y. In addition to
the field samples used by standard FDTD, we also sample the
H field on the four boundaries of the region. These additional
samples will be referred to as hanging variables [22], and will
allow us to:
1) develop a self-contained model for the region, which
does not involve field samples beyond its boundaries;
2) derive an expression for the energy absorbed from each
boundary;
3) connect the FDTD grid to other subsystems while maintaining stability.
To keep the notation compact, we collect all Ex and Ey
samples into column vectors Enx and Eny , of size NEx =
Nx (Ny + 1) and NEy = (Nx + 1)Ny , respectively. The Hz
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
3
samples at the internal nodes are collected into column vector
n+ 1
Hz 2 of size NHz = Nx Ny . The hanging variables on the
South boundary of the region are collected into the Nx × 1
vector
h
iT
n+ 1
n+ 1
n+ 1
(2)
HS 2 = Hz |1+ 12,1 . . . Hz |N +2 1 ,1 .
x
2
A. State Equation for Each Node
The dynamical model for the region consists of an update
equation for each E and H sample, excluding the hanging
variables. Those variables will indeed be eliminated once the
region is connected to the surrounding subsystems or to some
boundary conditions.
1) Internal Hz Nodes: For these nodes, we use a standard
FDTD update [2]
µ
µ
n+ 1
n− 1
Hz |i+ 12,j+ 1 = ∆x∆y Hz |i+ 12,j+ 1
2
2
2
2
∆t
∆t
− ∆xEx |ni+ 1 ,j + ∆xEx |ni+ 1 ,j+1
2
2
2
(3)
2
for i = 1, . . . , Nx and j = 1, . . . , Ny . In (3), µ denotes
n+ 1
the average permittivity on the edge where Hz |i+ 12,j+ 1 is
2
2
sampled. Subscripts are omitted from µ in order to simplify
the notation. Equations (3) can be written in matrix form as
Dµ n+ 12
Dµ n− 12
Hz
= DA
Hz
+ Gy Dlx Enx − Gx Dly Eny ,
∆t
∆t
(4)
where DA is a diagonal matrix containing the area of the
primary cells, Dµ is a diagonal matrix containing the average
permittivity on each edge of the secondary grid. Diagonal
matrices
DA
Dly = ∆yINEy
(5)
contain the length of the x- and y-directed edges of the primary
grid, respectively. With Im , we denote the m × m identity
matrix. Matrix Gx is the discrete derivative operator along x,
which can be written as
Gx = INy ⊗ WNx ,
(6)
where ⊗ is the Kronecker’s product [23] and WNx is the
Nx × (Nx + 1) matrix [24]
−1 +1
−1 +1
Wn =
(7)
.
..
..
.
.
−1 +1
Similarly,
Gy = WNy ⊗ INx .
2
2
2
for i = 1, . . . , Nx and j = 2, . . . , Ny . In (9), εx and σx denote,
respectively, the average permittivity and average conductivity
on the corresponding edge. While the common factor ∆x
could be eliminated from (9), it is kept as it will be useful
later.
For the Ex nodes on the South boundary, the standard
FDTD update equation involves a Hz sample outside the
region. In order to avoid this, we apply the finite difference
approximation to the half step of the
secondary grid between
nodes i + 12 , 1 + 12 and i + 12 , 1 , making use of the hanging variables. In this way, we obtain an update equation that
involves only field samples from the considered region
σx
∆y εx
+
Ex |n+1
=
∆x
i+ 21 ,1
2 ∆t
2
σx
∆y εx
−
Ex |ni+ 1 ,1
∆x
2
2 ∆t
2
n+ 12
n+ 1
+ ∆xHz |i+ 1 ,1+ 1 − ∆xHz |i+ 12,1 , (10)
2
+ ∆yEy |ni,j+ 1 − ∆yEy |ni+1,j+ 1
Dlx = ∆xINEx
2
2
Similarly, the hanging variables on the North, East and West
n+ 1
n+ 1
n+ 1
sides are cast into column vectors HN 2 , HE 2 and HW 2 ,
respectively.
∆x∆y
2) Ex Nodes: For the Ex nodes that fall strictly inside the
region, we use a standard FDTD update [2]
ε
ε
σx
σx
x
x
∆x∆y
Ex |n+1
=
∆x∆y
Ex |ni+ 1 ,j
+
−
1
i+ 2 ,j
2
∆t
2
∆t
2
n+ 21
n+ 21
+ ∆xHz |i+ 1 ,j+ 1 − ∆xHz |i+ 1 ,j− 1 (9)
(8)
2
2
for i = 1, . . . , Nx . In (10), εx and σx denote the material
properties of the half cell between nodes i + 12 , 1 + 12 and
i + 12 , 1 . The update equation for the Ex nodes on the North
boundary is obtained similarly, and reads
∆y εx
σx
∆x
=
+
Ex |n+1
i+ 21 ,Ny +1
2 ∆t
2
∆y εx
σx
∆x
−
Ex |ni+ 1 ,Ny +1
2
2 ∆t
2
n+ 21
n+ 1
+ ∆xHz |i+ 1 ,N +1 − ∆xHz |i+ 12,N + 1 , (11)
2
y
2
y
2
for i = 1, . . . , Nx . Relations (9), (10) and (11) can be
compactly written as
D εx
Dσx
Dlx Dly0
+
En+1
=
x
∆t
2
Dσx
Dεx
n+ 1
−
Enx − Dlx GTy Hz 2
Dlx Dly0
∆t
2
"
1#
2
Hn+
S
+ Dlx BS Dlx BN
, (12)
n+ 1
HN 2
where
• Dl0 is an NEx × NEx diagonal matrix containing the
y
length of the y-directed edges of the secondary grid,
including the half-edges of length ∆y/2 that intersect
the North and South boundaries;
• Dεx and Dσx are diagonal matrices storing the permittivity and conductivity on each x-directed primary edge,
respectively;
• BS has all entries set to zero, except for a −1 at
the intersection of each row associated with a South
boundary edge and the column of the corresponding
n+ 1
hanging variable in HS 2 ;
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
4
BN is defined similarly to BS , but has a +1 on each
entry associated with an edge of the North boundary.
3) Ey Nodes: The update equations for the Ey nodes are
derived with a similar procedure. A standard FDTD update
equation is written for the Ey nodes that fall strictly inside the
region. For the Ey nodes on the West and East boundaries,
instead, finite differences are applied on a half grid step,
similarly to (10) and (11). This process leads to
Dσy
D εy
+
En+1
=
Dly Dlx0
y
∆t
2
Dσy
D εy
n+ 1
Dly Dlx0
−
Eny + Dly GTx Hz 2
∆t
2
#
"
n+ 21
HW
, (13)
+ Dly BW Dly BE
n+ 1
HE 2
•
where
• Dl0 is an NEy × NEy diagonal matrix containing the
x
length of the x-directed edges of the secondary grid,
including the half-edges of length ∆x/2 that intersect
the East and West boundaries;
• Dεy and Dσy are diagonal permittivity and conductivity
matrices associated with the y-directed edges of the
primary grid, respectively;
• BW has all entries set to zero, except for a +1 at
the intersection of each row associated with a West
boundary edge and the column of the corresponding
n+ 1
hanging variable in HW 2 ;
• BE is analogous to BW , but has a −1 on each entry
associated with an East boundary edge.
B. Descriptor System Formulation
The update equations derived in the previous sections form
a complete dynamical model for the rectangular region
(R + F)xn+1
y
n
=
1
(R − F)xn + Bun+ 2 ,
T
n
= L x .
(14a)
equation (14b) extracts these values from the state vector xn .
The coefficients matrices in (14a) and (14b) read
Dεx
1
T
Dlx Dly0 ∆t
0
2 Dlx Gy
Dε
R=
0
Dly Dlx0 ∆ty − 12 Dly GTx , (17)
D
1
− 12 Gx Dly
DA ∆tµ
2 Gy Dlx
D
1
T
Dlx Dly0 2σx
0
D
G
l
y
x
2
Dσ
F=
0
Dly Dlx0 2 y − 21 Dly GTx , (18)
1
− 12 Gy Dlx
0
2 Gx Dly
Dlx BS Dlx BN
0
0
0
Dly BW Dly BE ,
B= 0
(19)
0
0
0
0
−BS BN
0
0
0
BW −BE .
L= 0
(20)
0
0
0
0
Equations (14a)-(14b) define an FDTD-like model for a
2D lossy, source-free region, with possibly non-uniform permittivity and permeability. From a control perspective, this
model is a discrete time descriptor system [25], also known
as generalized state-space. From an electrical standpoint, the
model is an impedance-type description of the region, because
it gives the electric field tangential to the boundary in terms
of the tangential magnetic field. In [24], a special case of
the proposed representation was derived for a lossy region
enclosed by PEC boundaries. The proposed developments
generalize [24] in two directions:
1) the assumption of a PEC termination is removed. Suitable input-output variables are introduced in such a
way that model (14a)-(14b) can be connected to other
subsystems, such as different FDTD grids, boundary
conditions, or reduced models;
2) the proposed formulation will allow us to prove, in the
next section, that FDTD equations can be interpreted as
a dissipative dynamical system.
(14b)
III. FDTD AS A D ISSIPATIVE D ISCRETE T IME S YSTEM
The first equation (14a) is formed by update equations (4),
(12) and (13), and updates the state vector
n
Ex
n
xn = Ey ,
(15)
n− 12
Hz
which consists of all electric and magnetic field samples in the
1
region, excluding hanging variables. The input vector un+ 2
n
and output vector y are given by
n+ 1
n
H 2
ES
Sn+ 21
n
1
H
E
N
yn = nN .
un+ 2 =
(16)
1
n+ 2
EW
HW
n
EE
n+ 1
HE 2
The input vector contains all hanging variables, i.e. all magnetic field samples on the region boundaries. The output
vector is made by the E samples at the same nodes, which
are collected into vectors EnS , EnN , EnW and EnE . Output
In this section, we define suitable expressions for the energy
stored in the 2D region and the energy absorbed from its
four boundaries. These expressions are then used to derive
the conditions under which system (14a)-(14b) is dissipative.
A. Dissipation Inequality
A discrete time system like (14a)-(14b) is dissipative when
it satisfies the following condition [26].
Definition 1. Dynamic system (14a)-(14b) is said to be
1
dissipative with supply rate s(yn , un+ 2 ) if there exists a
n
nonnegative function E(x ) with E(0) = 0, called storage
function, such that
1
E(xn+1 ) − E(xn ) ≤ s(yn , un+ 2 )
n+ 12
for all u
(21)
and all n.
The storage function E(xn ) can be interpreted as the energy stored in the system at time n, while the supply rate
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
5
1
s(yn , un+ 2 ) is the energy absorbed by the system from its
boundaries between time n and n+1. Clearly, only dissipative
systems can satisfy the dissipation inequality (21). Indeed,
their stored energy can increase between time n and n + 1
by at most the energy absorbed from the outside world. If
this limit is violated, the system is considered active, since it
can generate energy on its own. For most practical systems,
inequality (21) is satisfied strictly because of the presence of
losses.
B. Storage Function and Supply Rate
For system (14a)-(14b), we choose as candidate storage
function
∆t n T
(x ) Rxn ,
(22)
E(xn ) =
2
and as supply rate
n+ 12
n
s(y , u
yn + yn+1
) = ∆t
2
T
1
LT Bun+ 2 .
Substituting (27) into (23), we obtain
(EnS + En+1
)T n+ 12
S
HS
2
n+1 T
n
n
T
(E + EN )
(E + En+1
n+ 1
n+ 1
W )
+∆t∆x N
HN 2 +∆t∆y W
HW 2
2
2
T
(EnE + En+1
n+ 1
E )
HE 2 , (28)
− ∆t∆y
2
and see that the supply rate is the sum of the energy absorbed
by the region from each boundary between time n and n + 1.
Signs in (28) are consistent with the direction of the Poynting
vector on each boundary.
1
s(yn , un+ 2 ) = −∆t∆x
C. Dissipativity Conditions
Using the proposed storage function (22) and supply
rate (23), we can derive simple dissipativity conditions on the
coefficients matrices R, F, B and L in (14a)-(14b).
Theorem 1. If
(23)
R = RT > 0 ,
(29a)
Before showing that these functions satisfy (21), we investigate
their physical meaning. Substituting (17) into (22), we get
F + FT ≥ 0 ,
(29b)
B = LLT B ,
(29c)
1 n T
(E ) Dlx Dly0 Dεx Enx
2 x
T
1
Eny Dly Dlx0 Dεy Eny
+
2
∆t
Dµ n− 21
n
n
Hz
+
Gy Dlx Ex − Gx Dly Ey + DA
. (24)
2
∆t
E(xn ) =
Since the term between square brackets is the right hand side
of (4), we can reduce (24) to
1
T
E(x ) = (Enx ) Dlx Dly0 Dεx Enx
2
T
1
Eny Dly Dlx0 Dεy Eny
+
2
1 n− 12 T
n+ 1
Hz
DA Dµ Hz 2 . (25)
+
2
n
Z
A
1 2
1
1 2
2
εE (t) + εEy (t) + µHz (t) dA ,
2 x
2
2
(26)
the continuous expression for the electromagnetic energy per
unit height of a 2D TE mode in a region of area A. The first
term of (25) is the energy stored in the x component of the
electric field in the region. Indeed, the diagonal matrix Dlx Dly0
is the area of the half cells around the Ex edges. Similarly,
the second and third term in (25) represent the energy stored
in the Ey and Hz components, respectively.
We now discuss the physical meaning of supply rate (23).
Direct inspection reveals that
−∆xINx
0
0
0
0
+∆xINx
0
0
.
LT B =
0
0
+∆yINy
0
0
0
0
−∆yINy
(27)
then system (14a)-(14b) is dissipative according to Definition 1, with (22) as storage function and (23) as supply rate.
Proof. Condition (29a) makes storage function (22) nonnegative for all xn , as required by Definition 1. Next, we show
that if (29b) and (29c) hold, the dissipation inequality (21) will
hold as well. Substituting (22) and (23) into (21), we obtain
T
T
1
T
xn+1 Rxn+1 −(xn ) Rxn − yn + yn+1 LT Bun+ 2 ≤ 0 .
This inequality can be rewritten as
T
T
xn+1 R xn+1 − xn + xn+1 − xn Rxn
T
1
− yn + yn+1 LT Bun+ 2 ≤ 0
(30)
From (14a), we have that
1
R xn+1 − xn = −F xn+1 + xn − Bun+ 2
(31)
T
Using (31), the terms R xn+1 − xn and xn+1 − xn R
in (30) can be expressed in terms of F
T
T
− xn+1 F xn+1 + xn − xn+1 + xn FT xn
T
T
1
1
+ xn+1 Bun+ 2 + un+ 2
BT xn
T
1
1
T
− (xn ) LLT Bun+ 2 − xn+1 LLT Bun+ 2 ≤ 0 (32)
Under (29c), we can finally rewrite (32) as
T
xn+1 + xn
F + FT xn+1 + xn ≥ 0
(33)
which is clearly satisfied if (29b) holds.
We now investigate the physical meaning of the three
dissipativity conditions, starting from (29c), which can be
directly verified by combining (27) and (20). This condition
holds because the region inputs and outputs in (16) are
sampled at the same nodes, and is reminiscent of a similar
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
6
relation which holds for linear circuits under the impedance
representation [27]. Condition (29b) is related to losses, and
reads
Dlx Dly0 Dσx
0
0
F + FT =
0
Dly Dlx0 Dσy 0 ≥ 0 . (34)
0
0
0
Since Dlx , Dly , Dlx0 and Dly0 are diagonal with positive
elements only, (34) boils down to
D σx
≥ 0,
(35)
Dσy
≥ 0.
(36)
As one may expect, the average conductivity on each primary
edge must be non-negative in a dissipative system. Condition (29a) is the most interesting, and is a generalized CFL
criterion. From (17), we see that R = RT by construction.
With the Schur’s complement [28], we can transform (29a)
into
Dlx Dly0 Dεx > 0 ,
(37)
Dly Dlx0 Dεy > 0 ,
4
IN ,
SST <
∆t2 Hz
(38)
(39)
where
h
1
−1
−1
−1
−1
S = DA 2 Dµ 2 Gy Dl2x Dl0 2 Dεx2
i
1
−1
−1
−Gx Dl2y Dl0 2 Dεy2 .
y
x
(40)
Inequalities (37) and (38) are clearly satisfied by construction.
If we denote with sk the singular values of (40), inequality (39)
will hold if
2
∆t <
∀k .
(41)
sk
This condition sets an upper bound on the FDTD time step,
and is analogous to the generalized CFL constraint derived
in [24] for an FDTD grid terminated on PEC boundaries.
From (40), we indeed see that the time step upper limit
depends on grid size, permittivity and permeability. Using a
time step which violates (41) has two consequences. First, the
discretization of Maxwell’s equations leads to an active discrete time model, even if the real physical system has positive
losses everywhere, and should therefore be dissipative. The
numerical model is thus inconsistent with the actual physics.
Second, being able to generate energy on its own, model (14a)(14b) can lead to divergent transient simulations. Even when
such model is connected to other dissipative subsystems, its
ability to generate energy on its own can destabilize the
whole simulation. The proposed theory provides a new, deeper
understanding on the root causes of FDTD instability, and is
able to pinpoint which part of an FDTD setup is responsible
for it. It is hoped that this new explanation will facilitate
the development of powerful FDTD schemes with guaranteed
stability.
D. Relation to CFL Stability Limit
The relation between (41) and the CFL limit can be further
understood if we apply (41) to a single cell. The purpose
of (41) is to make storage function (22) non-negative. A
sufficient condition for this is to require the energy stored in
each primary cell to be positive. This condition can be derived
by applying (39) to a single primary cell. We consider the
primary cell extending from node (i, j) to node (i + 1, j + 1).
The coefficient matrices for this special case can be obtained
from the formulas in Sec. II by setting Nx = Ny = 1
Dlx = ∆xI2
∆x
I2
Dlx0 =
2
Gx = Gy = −1
1
Dly = ∆yI2
∆y
Dly0 =
I2
2
DA = ∆x∆y
(42)
(43)
(44)
The permeability matrix Dµ = µ|i+ 12 ,j+ 12 is the average
permeability on the secondary edge, while the permittivity
matrices
0
0
εx |i+ 12 ,j
εy |i,j+ 12
Dεx =
Dεy =
0
εx |i+ 21 ,j+1
0
εy |i+1,j+ 21
(45)
contain the average permittivity on the four primary edges.
Substituting (42)-(45) into (39), we obtain
"
!
1
1
1
∆t <
+
2∆x2 µ|i+ 12 ,j+ 12 εy |i,j+ 12
εy |i+1,j+ 12
! #− 21
1
1
1
, (46)
+
+
2∆y 2 µ|i+ 21 ,j+ 12 εx |i+ 12 ,j
εx |i+ 21 ,j+1
which is a generalized CFL condition. For a uniform medium
with permittivity ε and permeability µ, (46) reduces to
∆t < q
1
1
εµ
q
1
∆x2
+
1
∆y 2
,
(47)
the CFL limit of 2D FDTD. This derivation confirms that (29a)
is a generalized CFL condition, here reinterpreted in the
context of dissipation.
E. Application to Stability Analysis
The proposed dissipation theory can be effectively used
to investigate and enforce the stability of FDTD algorithms.
Most FDTD setups consist of an interconnection of FDTD
subsystems. In the simplest scenario, a uniform FDTD grid
is connected to some boundary conditions. In most advanced
scenarios, one may want to couple a main FDTD grid to
refined grids, reduced models, lumped elements, or models
from other numerical techniques, such as finite elements,
integral equations or ray tracing.
Ensuring stability of these hybrid schemes can be very
challenging, since stability is a property of the overall scheme,
rather than of its individual subsystems. By invoking the concept of dissipation, we can instead achieve stability in an easy
and modular way. Each part is seen as an FDTD subsystem
and required to satisfy dissipativity conditions (29a)-(29c).
Since the connection of dissipative systems is dissipative by
construction [17], the overall method will be guaranteed to be
stable. The proposed theoretical framework generalizes the socalled energy method [8], and has numerous advantages over
the state of the art:
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
1) non-uniform problems can be handled, unlike in the von
Neumann analysis [1];
2) stability conditions can be given on each subsystem
separately, unlike in the iteration method [2], which
requires the analysis of the iteration matrix of the whole
scheme. This makes stability analysis modular and thus
simpler;
3) once some given FDTD models have been proven dissipative, they can be arbitrarily interconnected without
having to carry out further stability proofs. With the
iteration method, when a single part of a coupled scheme
changes, the whole proof must be revised;
4) the CFL limit of the resulting scheme can be easily
determined by applying (37), (38) or (39) to each
subsystem and taking the most restrictive CFL limit;
5) the stability framework is intuitive, since it is based on
the fundamental physical concept of energy dissipation.
7
∆x
r
Ĥz |ı̂+ 12 ,̂+ 12
Ĥz |ı̂+ 32 ,̂+ 12
∆y
r
(ı̂, ̂) Ĥz |ı̂+ 21 ,̂ Êx |ı̂+ 12 ,̂ Ĥz |ı̂+ 32 ,̂ Êx |ı̂+ 32 ,̂
Hz |i+ 1 ,j
(i, j)
Ex |i+ 1 ,j
2
y
2
z
Hz |i+ 1 ,j− 1
2
x
2
Figure 2: Subgridding scenario considered in Sec. IV for the
case of r = 2. For clarity, a virtual gap has been inserted
between the two grids. This virtual gap is closed when the
two grids are connected.
Fine mesh
Ĥz |ı̂+ 1 ,̂
2
Êx |ı̂+ 3 ,̂ Ĥz |ı̂+ 3 ,̂
2
2
Êx |ı̂+ 1 ,̂
2
IV. A PPLICATION : S TABLE FDTD S UBGRIDDING
We demonstrate the proposed theory by deriving a subgridding algorithm which is stable by construction, easy to
implement and supports an arbitrary grid refinement ratio. The
goal is to derive stable update equations for a setup where one
or more fine grids are embedded in a main coarse grid. Without
loss of generality, we consider the case where a coarse grid
with cell size ∆x × ∆y hosts a single fine grid with cell size
∆x/r × ∆y/r, where r is an arbitrary integer. The algorithm
will ultimately consist of conventional FDTD equations to
update the fields that fall strictly inside the two grids, and
a special update equation to update the fields on the edges
at the grid transition. To derive the method, it is sufficient
to consider the interface between a single coarse cell and the
corresponding fine cells, as shown in Fig. 2. In the figure a
virtual gap has been opened between the two grids for clarity.
Without loss of generality, we consider a refinement in the
positive x direction. The other three cases can be derived in
the same way. The coarse cell under consideration is centered
at node (i+ 12 , j − 12 ) and the corresponding fine cells at nodes
(ı̂ + 12 , ̂ + 21 ), ... , (ı̂ + r − 12 , ̂ + 21 ), where coordinates (ı̂, ̂)
correspond to the same physical location as (i, j) in the coarse
grid. Superscript “ˆ” denotes variables related to the fine grid.
A subgridding algorithm can be interpreted as a the result
of the connection of the three subsystems, as shown in
Fig. 3. Two of those subsystems correspond to the coarse and
fine grids to be coupled. The third subsystem represents the
interpolation rule which is used to relate the fields on the
boundaries of the two grids, that are sampled with different
resolution.
A. State Equations for the Coarse and Fine Cells on the
Boundary
For the coarse and fine grids, we adopt the formulation of
Sec. II, introducing hanging variables on the two boundaries
to be connected. The purpose of the hanging variables is
to facilitate the coupling of the two meshes and the proof
of stability. These extra variables will be eliminated when
deriving the update equation for the fields at the interface.
Interpolation rule
Hz |i+ 1 ,j
2
Ex |i+ 1 ,j
2
Coarse mesh
Figure 3: Interpretation of the subgridding method as the
connection of three dynamical systems, representing the coarse
grid, the fine grid, and the interpolation rule.
On the North boundary of the coarse cell, we introduce the
hanging variable
n+ 12
HN
n+ 1
= Hz |i+ 12,j .
(48)
2
Similarly, on the South fine cell boundaries we introduce the
hanging variables
h
iT
n+ 1
n+ 1
n+ 12
ĤS 2 = Ĥz |ı̂+ 12,̂ . . . Ĥz |ı̂+r−
,
(49)
1
,̂
2
2
as shown in Fig. 2.
From (11), we obtain the following state equation for the
coarse E-field sample at the interface and the coarse hanging
variable
σx n+1
∆y εx
+
EN =
2 ∆t
2
∆y εx
σx n
n+ 1
n+ 1
−
EN + HN 2 − Hj− 12 , (50)
2
2 ∆t
2
where
n+ 1
n+ 1
Hj− 12 = Hz |i+ 12,j− 1 ,
2
2
2
n
EN
= Ex |ni+ 1 ,j ,
(51)
2
and εx and σx are the permittivity and conductivity on the
primary edge of the coarse cell below the interface. Similarly,
the state equation for the r fine cells can be written as
!
∆y D̂εx
D̂σx
+
Ên+1
=
S
2r
∆t
2
!
∆y D̂εx
D̂σx
n+ 1
n+ 1
−
ÊnS + Ĥ̂+ 12 − ĤS 2 , (52)
2
2r
∆t
2
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
8
where
n+ 1
Ĥ̂+ 12
2
h
iT
n+ 1
n+ 21
= Ĥz |ı̂+ 12,̂+ 1 . . . Ĥz |ı̂+r−
,
1
1
2
2
2 ,̂+ 2
iT
h
ÊnS = Êx |nı̂+ 1 ,̂ . . . Êx |nı̂+r− 1 ,̂ ,
2
2
(53)
(54)
and D̂εx and D̂σx are r × r diagonal matrices containing the
values of permittivity and conductivity above the interface for
the South edges where the fine Êx fields are sampled.
B. Interpolation Rule
The interpolation rule [29] relates the field sampled on
the coarse and fine grids. From the boundary condition for
tangential electric fields, we have that
n
ÊnS = EN
T
∀n ,
(55)
where T is an r × 1 matrix of ones. Condition (55) forces
the coarsely- and finely-sampled E fields to be equal at all
times.
On the magnetic fields at the boundary, we impose a
constraint reciprocal to (55)
n+ 12
n+ 1
TT ĤS 2
∀n .
(56)
r
We will see in Sec. IV-D that the reciprocity between the E
and H interpolation rules is required to ensure stability.
HN
=
C. Explicit Update Equation for the Interface
Interpolation conditions (55) and (56) can now be used
to combine (50) and (52) in order to derive an explicit
update equation for the fields at the coarse-fine interface, and
eliminate hanging variables.
Substituting (55) into (52), and multiplying the obtained
equation by TT /r on the left yields
!
∆y TT D̂εx T TT D̂σx T
n+1
+
EN
=
2r
r∆t
2r
!
∆y TT D̂εx T TT D̂σx T
n
−
EN
2r
r∆t
2r
n+ 1
TT Ĥ̂+ 12
n+ 1
TT ĤS 2
+
−
. (57)
r
r
For the simplicity of notation we define symbols for the
average permittivity and conductivity of the r South boundary
fine cells
2
TT D̂σx T
TT D̂εx T
, σ̂x =
.
r
r
Equation (57) can now be added to (50), yielding
!
σx + σ̂rx
∆y εx + ε̂rx
n+1
+
EN
=
2
∆t
2
!
σx + σ̂rx
∆y εx + ε̂rx
n
−
EN
2
∆t
2
ε̂x =
n+ 12
+ HN
n+ 1
− Hj− 12 +
2
n+ 1
TT Ĥ̂+ 12
2
r
(58)
TT ĤS
r
Rearranging (60), we get the following explicit update equation for EN in terms of the neighboring magnetic fields
!−1
!
σ̂x
ε̂x
σ̂x
ε̂x
σ
+
ε
+
σ
+
ε
+
x
x
x
x
n+1
n
r
r
r
r
EN
+
−
EN
=
∆t
2
∆t
2
!−1 T n+ 21
T Ĥ̂+ 1
1
εx + ε̂rx
σx + σ̂rx
2
n+
2
+
+
− Hj− 12 .
2
∆y
∆t
2
r
(61)
The fine interface electric fields are then updated using (55).
It should be noted that, when r = 1, equation (61) reduces to
the standard FDTD update equation.
The overall subgridding algorithm can be summarized as
follows:
1) Calculate the magnetic field samples everywhere at time
n + 12 using conventional FDTD update equations.
2) Use standard FDTD update equations to compute the E
fields at time n + 1 on the edges that are strictly inside
the coarse and fine grids.
n+1
3) Compute EN
, the coarsely-sampled electric field at
the interface, using (61).
4) Update the finely-sampled Êx fields at the interface
using (55).
The computational overhead of this scheme is minimal, since
the coefficients in (61) can be pre-computed before the update
iterations.
The proposed method is thus simple to implement, since it
consists of conventional FDTD update equations inside the two
meshes and a modified update equation for the edges at the
interface. In comparison to previous subgridding methods, we
avoid non-rectangular cells [6], finite element concepts [20]
and Withney forms [21], [22]. The proposed update equation
can be also used at corners with no modifications, unlike in
previous works that require special treatment [5] or L-shaped
cells [6]. Finally, we remark that in Sec. II, the FDTD update
equations have been given in matrix form in order to reveal the
dissipative nature of FDTD systems. This form, however, does
not have to be used in the practical implementation, which can
use conventional for loops or, in languages like MATLAB,
vectorized operations.
D. Proof of Stability
n+ 21
−
With the interpolation rule (56), we cancel the hanging variables to obtain
!
σx + σ̂rx
∆y εx + ε̂rx
n+1
+
EN
=
2
∆t
2
!
n+ 12
T
T
Ĥ
1
σx + σ̂rx
∆y εx + ε̂rx
̂+ 12
n+
n
EN
− Hj− 12 +
−
.
2
2
∆t
2
r
(60)
. (59)
The proposed dissipation theory makes it straightforward to
prove that the subgridding algorithm is stable under the CFL
limit of the fine grid. For stability, all three subsystems in
Fig. 3 need to be dissipative, which requires one to use the
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
9
more restrictive fine grid time step. With the time step chosen
correctly, in order to guarantee the overall stability we need
to only ensure dissipativity of the interpolation rule.
Analogously to (23) the supply rate for the interpolation
subsystem is defined as
n+1
EN
+
n+ 1
) = −∆t∆x
HN 2
s(yn , u
2
)T n+ 21
∆x (ÊnS + Ên+1
S
+ ∆t
ĤS . (62)
r
2
Substituting (55) and (56) into (62), we have
n+ 12
20 mm
∆x = 1 mm
∆y = 2 mm
40 mm
n
EN
PEC
Probe
y
∆x̂ = ∆x/4
∆ŷ = ∆y/4
z
x
40 mm
Source
60 mm
Figure 4: Layout of the PEC cavity considered in Sec. V-A.
1
s(yn , un+ 2 ) =
n+ 12
TT ĤS
r
−
n+ 1
HN 2
!
= 0 . (63)
Therefore, the proposed interpolation rule is a lossless system
that does not dissipate nor absorb any energy. Physically, this
result makes sense, since the connection system corresponds to
an infinitely thin region where no energy dissipation can take
place. In conclusion, since the proposed subgridding method
can be seen as the connection of three dissipative systems, it
is overall dissipative, and thus stable.
0.5
Hz (A/m)
n+1 T
(E n + EN
)
∆t∆x N
2
0
−0.5
0
2
4
6
Timestep
8
10
5
x 10
Figure 5: Magnetic field at the probe for the the empty cavity
with subgridding of Sec. V-A, computed for 106 time steps.
V. N UMERICAL E XAMPLES
The following sections provide the results of FDTD simulations that were done to verify the proposed theory. The
subgridding algorithm was implemented in Matlab and tests
were performed in order to check its stability, ability to handle
material traverse, its accuracy and speedup capability.
A. Stability Verification
Stability was verified by simulating an empty cavity with
perfect electric conductor (PEC) walls with a centrally placed
subgridding region for 106 time steps. The layout of the
simulation is shown in Fig. 4. The cavity was excited using
a modulated Gaussian magnetic current source with central
frequency of 3.75 GHz and half-width at half-maximum of
0.74 GHz. Magnetic field was recorded at a probe placed
inside the cavity. The time step was set 1% below the CFL
limit of the fine grid.
The resulting waveform in Fig. 5 shows that no instability
occurred after 106 time steps. Stable behavior after such a
large number of time steps verifies the correctness of the
proposed stability enforcement technique, especially since no
lossy materials were present to dissipate any spurious energy
artificially created by the algorithm.
B. Material Traverse
The ability of the proposed method to produce meaningful
results when objects traverse the subgridding interface was
tested using the setup in Fig. 6. A 16 × 16 mm slab of
material was simulated for three different placements of the
subgridding region: enclosing, traversing and away from the
slab. The test was done for copper and a lossy dielectric
with conductivity of 5 S/m and relative permittivity of 2.
As a reference, uniformly discretized all-coarse and all-fine
simulations were performed at the fine time step, in addition
to the subgridding simulations. Coarse and fine meshes in
uniformly discretized and subgridding runs were chosen as
1 mm and 0.2 mm respectively. 15 mm-thick perfectly matched
layer (PML) terminated the simulation region. Modulated
Gaussian magnetic current excitation was used at 15.0 GHz
central frequency with 8.82 GHz half-width at half-maximum
bandwidth. The time step was chosen as 0.467 ps in all test
cases.
The magnetic field waveforms at the probe recorded in the
different subgridding scenarios are shown in Fig. 7, and are in
excellent agreement among each other. This result confirms
that the proposed subgridding method can properly handle
material traverse, for both very good conductors and for lossy
dielectrics.
C. Application to Simulating Scatterer Reflections
In order to investigate the accuracy of the proposed scheme,
we looked at waveguide reflections from the scatterer shown in
Fig. 8, which consisted of four copper rods with 1 mm radius.
We have also investigated the reflections from the subgridding
interface, in order to assess the quality of the subgridding
scheme. The coarse cell was chosen to be 1 mm, which was
1
10 of the minimum wavelength of interest that corresponded
to 30.0 GHz. The fields of the incident wave were computed
by running a reference simulation without the scatterer and
without subgridding. Reflected wave fields were found by
subtracting the incident wave fields from the total fields in
simulations with the scatterer. 15 mm-thick PML boundary
was chosen to terminate the two sides of the waveguide. The
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
10
PEC
40 mm
x
z
Source
subgrids
y
Jy current
Probes
8×8 mm
y
Probe
PML
PML
x
z
PML
20 mm
2 mm
∆x = 1 mm
∆y = 1 mm
Figure 6: Layout used for the material traverse test of Sec. V-B,
and the three different placements of the subgridding region.
2 mm
Scatterer
66 mm
Figure 8: Layout of the four-rod reflection simulation discussed in Sec. V-C. The dashed line shows the location of
the subgrid in the subgridding run.
Lossy dielectric
−5
With scatterer
−10
0
11
|S | (dB)
Hz (A/m)
0.02
−0.02
−15
−20
−25
−30
−35
Copper
Sub−grid interface only
−40
0
|S | (dB)
Hz (A/m)
0.02
11
−0.02
0.2
0.25
Time (ns)
0.3
0.35
Figure 7: Time-domain magnetic field at the probe recorded for
the three locations of the subgrid in Sec. V-B: enclosed (
),
outside (
) and traversing the object (
). Waveforms
from the uniformly discretized all-coarse ( ) and allfine (
) simulations are also shown.
time steps in the subgridding runs were set 1% below the CFL
limit of the refined region. Uniformly discretized simulations
were run 1% below the CFL limits of the respective grids.
The resulting reflections are shown in Fig. 9 for the subgridding case with different refinement ratios, as well as the
reference run with full refinement by a factor of 6. The
simulation times are shown in Table I. It can be seen that
the local refinement of the grid around the scatterer with
the proposed subgridding method can improve the accuracy
substantially compared to the coarse grid run. The larger
choice of refinement ratio makes the solution very close to
the reference all-fine solution. Moreover, very good speedup
- almost by a factor of 11 - is achieved even for the grid
refinement of 6 when the redundant high resolution of the grid
in air is eliminated. The reflections from subgridding interface
were significantly lower than those from the scatterer, further
demonstrating the accuracy of the proposed method.
−60
−80
−100
0
5
10
15
20
Frequency (GHz)
25
Figure 9: Reflected power with respect to the incident for the
example of Sec. V-C. Top panel: reflections from the four-rod
scatterer for different global discretization: all-coarse ( )
and all-fine with r = 6 (
); and for the subgridding runs:
r=2(
), r = 4 (
) and r = 6 (
). Bottom panel:
reflections from the subgrid interface only.
D. Application to Exposure Studies
We show the possibility of applying the method for multiscale human exposure simulations. The chosen setup is shown
in Fig. 10. A transverse cross-section of the head of the model
of Ella from IT’IS Virtual Population V1.x [30] was used
to assign the material properties [31] to the FDTD cells. A
900 MHz source was placed approximately 3 meters away
from the human head. The simulation region was terminated
with 20 cm PML. The reference (fine) resolution in the tissues
was set to 2 mm, based on the mesh size chosen by [32] in a
radiation exposure study at that frequency. Specific absorption
rate, or SAR, was evaluated according to the formula in [33],
which was used as follows for sinusoidal excitation
SAR =
σ(Ex2p + Ey2p )
2ρ
,
(64)
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
Table I: Simulation times for different meshes in four-rod
scatterer simulations in Sec. V-C. Simulation times were
recorded for the total field run only - not for the reference
run.
Method
All-fine (r = 6)
All-coarse
Subgridding (r = 2)
Subgridding (r = 4)
Subgridding (r = 6)
Simulation time (s)
427.4
3.2
10.7
23.3
39.5
3.05m
Head
slice
Method
All-fine
All-coarse
Subgridding
All-fine
z
Error in SAR integral
Not applicable
59.5%
-3.1%
Subgridding
Simulation time (s)
1596.4
6.9
34.5
All-coarse
x
PML
4.01m
Figure 10: Layout of the simulation in Sec. V-D with human
head cross-section placed approximately 3 meters away from
a point source.
where subscript “p” denotes the peak absolute value of a
field component and ρ corresponds to tissue density. SAR
was calculated for each of the primary cells. The values of
the electric field components at the primary cell centers were
found by averaging the nearest known samples at the cell
edges. The peak values of the fields were found for the time
interval from 25.6 ns to 26.8 ns, which gave the wave sufficient
time to reach the head and penetrate inside it.
In the subgridding run, the empty space was coarsened to
1
1 cm, which corresponded to 33.3
of the wavelength. The
reference all-fine run was performed at 2 mm resolution, along
with the all-coarse run where the entire simulation region was
discretized at 1 cm. The volumetric integral of SAR over the
tissues was used as an accuracy metric
XX
SAR|i+ 12 ,j+ 12 ∆x∆y ,
(65)
i
Table II: Error in the integral of SAR and simulation times in
the simulations discussed in Sec. V-D.
y
subgrid
Source
11
j
where ∆x and ∆y are FDTD cell dimensions in the tissues.
Time step of 4.67 ps was chosen for the all-fine simulation
and for the subgridding simulation. The coarse grid case was
run at 23.11 ps.
The resulting SAR maps are shown in Fig. 11. Table II
shows simulation times and percent error in the total SAR
with respect to the all-fine simulation. The results show that
with subgridding a speedup of 46X can be obtained with only
3.1% loss in accuracy. No noticeable difference can be seen
on the SAR maps in Fig. 11 between the subgridding and
all-fine simulations. When, instead, the coarse resolution was
chosen for the entire grid, the head tissues were not sufficiently
resolved and the integral SAR differed from the reference by
59.5%, showing the necessity of local grid refinement.
VI. C ONCLUSION
This paper proposed a dissipative systems theory for FDTD,
recognizing that FDTD equations can be seen as a dynamical
Figure 11: SAR maps obtained in Sec. V-D with all-fine
(2 mm), all-coarse (1 cm) discretization and with subgridding
(2 mm in the tissues and 1 cm in the air).
system which is dissipative under a generalized CourantFriedrichs-Lewy condition. The theory provides a new, powerful framework to make FDTD stability analysis simpler
and modular. Stability conditions can indeed be given on
the individual components (e.g. boundary conditions, meshes,
thin-wire models) rather than on the whole coupled FDTD
setup. The theory is intuitive since rooted on the familiar
concept of energy dissipation, and sheds new light on the
root mechanisms behind FDTD instability. As an example of
application, a simple yet effective subgridding algorithm is
derived, with straightforward stability proof. The proposed algorithm allows material traverse, is simpler to implement than
existing solutions, and supports an arbitrary grid refinement
ratio. Numerical results confirm its stability and accuracy.
Speedups of up to 46X were observed with only 3.1% error
with respect to standard FDTD.
R EFERENCES
[1] A. Taflove and S. C. Hagness, Computational electrodynamics. Artech
house, 2005.
[2] S. D. Gedney, Introduction to the Finite-Difference Time-Domain
(FDTD) Method for Electromagnetics, 1st ed. San Rafael, CA: Morgan
& Claypool Publishers, 2011.
[3] K. Yee, “Numerical solution of initial boundary value problems involving Maxwell’s equations in isotropic media,” IEEE Trans. Antennas
Propag., vol. 14, no. 3, pp. 302–307, 1966.
[4] M. Okoniewski, E. Okoniewska, and M. Stuchly, “Three-dimensional
subgridding algorithm for FDTD,” IEEE Trans. Antennas Propag.,
vol. 45, no. 3, pp. 422–429, 1997.
[5] P. Thoma and T. Weiland, “A consistent subgridding scheme for the
finite difference time domain method,” Int. J. Numer. Model El., vol. 9,
no. 5, pp. 359–374, 1996.
[6] K. Xiao, D. J. Pommerenke, and J. L. Drewniak, “A three-dimensional
FDTD subgridding algorithm with separated temporal and spatial interfaces and related stability analysis,” IEEE Trans. Antennas Propag.,
vol. 55, no. 7, pp. 1981–1990, 2007.
[7] W. Sui, D. A. Christensen, and C. H. Durney, “Extending the twodimensional FDTD method to hybrid electromagnetic systems with
active and passive lumped elements,” IEEE Trans. Microw. Theory
Techn., vol. 40, no. 4, pp. 724–730, 1992.
[8] F. Edelvik, R. Schuhmann, and T. Weiland, “A general stability analysis
of FIT/FDTD applied to lossy dielectrics and lumped elements,” International Journal of Numerical Modelling: Electronic Networks, Devices
and Fields, vol. 17, no. 4, pp. 407–419, 2004.
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
[9] B. Denecker, F. Olyslager, L. Knockaert, and D. De Zutter, “Generation
of FDTD subcell equations by means of reduced order modeling,” IEEE
Trans. Antennas Propag., vol. 51, no. 8, pp. 1806–1817, 2003.
[10] X. Li, C. D. Sarris, and P. Triverio, “Structure-Preserving Reduction of
Finite-Difference Time-Domain Equations with Controllable Stability
Beyond the CFL Limit,” IEEE Trans. Microw. Theory Techn., vol. 62,
no. 12, pp. 3228–3238, 2014.
[11] X. Li and P. Triverio, “Stable FDTD Simulations with Subgridding at the
Time Step of the Coarse Grid: a Model Order Reduction Approach,” in
IEEE MTT-S Int. Conf. on Numerical Electromagnetic and Multiphysics
Modeling and Optimization, Ottawa, Canada, August 11–14 2015.
[12] J.-F. Lee, R. Lee, and A. Cangellaris, “Time-domain finite-element
methods,” IEEE Trans. Antennas Propag., vol. 45, no. 3, pp. 430–442,
1997.
[13] A. R. Bretones, R. Mittra, and R. G. Martı́n, “A hybrid technique
combining the method of moments in the time domain and FDTD,”
IEEE Microw. Guided Wave Lett., vol. 8, no. 8, pp. 281–283, 1998.
[14] Y. Wang, S. Safavi-Naeini, and S. K. Chaudhuri, “A hybrid technique
based on combining ray tracing and FDTD methods for site-specific
modeling of indoor radio wave propagation,” IEEE Trans. Antennas
Propag., vol. 48, no. 5, pp. 743–754, 2000.
[15] T. Namiki, “A new FDTD algorithm based on alternating-direction
implicit method,” IEEE Microw. Wireless Compon. Lett., vol. 47, no. 10,
pp. 2003–2007, 1999.
[16] F. Zheng, Z. Chen, and J. Zhang, “A Finite-Difference time-domain
method without the Courant stability conditions,” IEEE Microwave
Guided Wave Lett., vol. 9, no. 11, pp. 441–443, Nov 1999.
[17] P. Triverio, S. Grivet-Talocia, M. S. Nakhla, F. Canavero, R. Achar,
“Stability, causality, and passivity in electrical interconnect models,”
IEEE Trans. Adv. Packag., vol. 30, no. 4, pp. 795–808, 2007.
[18] J. C. Willems, “Dissipative dynamical systems part i: General theory,”
Archive for rational mechanics and analysis, vol. 45, no. 5, pp. 321–351,
1972.
[19] Y. Wang, S. Langdon, and C. Penney, “Analysis of accuracy and stability
of FDTD subgridding schemes,” in 2010 European Microwave Conf.
IEEE, 2010, pp. 1297–1300.
[20] F. Collino, T. Fouquet, and P. Joly, “Conservative space-time mesh
refinement methods for the FDTD solution of Maxwell’s equations,”
J. Comput. Phys., vol. 211, no. 1, pp. 9–35, 2006.
[21] R. A. Chilton and R. Lee, “Conservative and provably stable FDTD
subgridding,” IEEE Trans. Antennas Propag., vol. 55, no. 9, pp. 2537–
2549, 2007.
[22] N. V. Venkatarayalu, R. Lee, Y.-B. Gan, and L.-W. Li, “A stable FDTD
subgridding method based on finite element formulation with hanging
variables,” IEEE Trans. Antennas Propag., vol. 55, no. 3, pp. 907–915,
2007.
[23] J. Brewer, “Kronecker products and matrix calculus in system theory,”
IEEE Trans. Circuits Syst., vol. 25, no. 9, pp. 772–781, 1978.
[24] B. Denecker, F. Olyslager, L. Knockaert, and D. De Zutter, “A new statespace-based algorithm to assess the stability of the Finite-Difference
time-domain method for 3D finite inhomogeneous problems,” AEU-Int.
J. Electron. C, vol. 58, no. 5, pp. 339 – 348, 2004.
[25] L. Dai, “Singular control systems,” 1989.
[26] C. Byrnes and W. Lin, “Losslessness, feedback equivalence, and the
global stabilization of discrete-time nonlinear systems,” IEEE Trans.
Autom. Control, vol. 39, no. 1, pp. 83–98, 1994.
[27] S. Grivet-Talocia and B. Gustavsen, Passive Macromodeling: Theory
and Applications. Hoboken, NJ: Wiley, 2015.
[28] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix
Inequalities in System and Control Theory, ser. Studies in Applied
Mathematics. SIAM, 1994, vol. 15.
[29] L. Kulas and M. Mrozowski, “Reciprocity principle for stable subgridding in the finite difference time domain method,” in EUROCON, 2007.
The International Conference on “Computer as a Tool”, Sept 2007, pp.
106–111.
[30] A. Christ et al., “The Virtual Family - Development of surface-based
anatomical models of two adults and two children for dosimetric
simulations,” Physics in Medicine and Biology, vol. 55, no. 2, pp. N23–
N38, 2010.
[31] IT’IS Foundation, “Overview - Database of Tissue Properties.”
[Online]. Available: http://www.itis.ethz.ch/virtual-population/tissueproperties/overview/ [Aug. 19, 2015].
[32] S. Kühn et al., “MMF/GSMA phase 2: scientific basis for base station
exposure compliance standards,” IT’IS Foundation, Tech. Rep. 21, June
2009.
[33] D. A. Sánchez-Hernández, High Frequency Electromagnetic Dosimetry.
Boston, MA: Artech House, 2009.
12
| 5cs.CE
|
Approximation algorithms for the maximum weight internal
spanning tree problem∗
arXiv:1608.03299v2 [cs.DS] 26 May 2017
Zhi-Zhong Chen†
Guohui Lin‡§
Lusheng Wang¶
Yong Chenk‡
Dan Wang¶
May 30, 2017
Abstract
Given a vertex-weighted connected graph G = (V, E), the maximum weight internal spanning
tree (MwIST for short) problem asks for a spanning tree T of G such that the total weight of
the internal vertices in T is maximized. The unweighted variant, denoted as MIST, is NPhard and APX-hard, and the currently best approximation algorithm has a proven performance
ratio 13/17. The currently best approximation algorithm for MwIST only has a performance
ratio 1/3 − ǫ, for any ǫ > 0. In this paper, we present a simple algorithm based on a novel
relationship between MwIST and the maximum weight matching, and show that it achieves a
better approximation ratio of 1/2. When restricted to claw-free graphs, a special case been
previously studied, we design a 7/12-approximation algorithm.
Keywords: Maximum weight internal spanning tree; maximum weight matching; approximation algorithm; performance analysis
∗
An extended abstract appears in the Proceedings of COCOON 2017.
Division of Information System Design, Tokyo Denki University. Hatoyama, Saitama 350-0394, Japan. Email:
zzchen@mail.dendai.ac.jp
‡
Department of Computing Science, University of Alberta. Edmonton, Alberta T6G 2E8, Canada. Email:
guohui@ualberta.ca
§
Correspondence author.
¶
Department of Computer Science, City University of Hong Kong. Tat Chee Avenue, Kowloon, Hong Kong,
China. Email: cswangl@cityu.edu.hk
k
Institute of Operational Research and Cybernetics, Hangzhou Dianzi University. Hangzhou, Zhejiang 310018,
China. Email: chenyong@hdu.edu.cn
†
1
2
1
Chen et al. /v:May 30, 2017
Introduction
In the maximum weight internal spanning tree (MwIST for short) problem, we are given a vertexweighted connected graph G = (V, E), where each vertex v of V has a nonnegative weight w(v),
with the objective to compute a spanning tree T of G such that the total weight of the internal
vertices in T , denoted as w(T ), is maximized. MwIST has applications in the network design for
cost-efficient communication [18] and water supply [1].
When the vertex weights are uniform, or simply vertex-unweighted, the problem is referred to as
the maximum internal spanning tree (MIST for short) problem. MIST is clearly NP-hard because it
includes the NP-hard Hamiltonian-path [6] problem as a special case. Furthermore, MIST has been
proven APX-hard [12], suggesting that it does not admit a polynomial-time approximation scheme
(PTAS). In the literature, much research is done on designing (polynomial-time, if not specified)
approximation algorithms for MIST to achieve the worst-case performance ratio as close to 1 as
possible.
The probably first approximation for MIST is a local search algorithm, which achieves a ratio
of 1/2 and is due to Prieto and Sliper [14]. Salamon and Wiener [18] later modified slightly
Prieto and Sliper’s algorithm to make it run faster (in linear-time) while achieving the same ratio
of 1/2. Besides, two special cases of MIST were considered by Salamon and Wiener [18]: when
restricted to claw-free graphs, they designed a 2/3-approximation algorithm; when restricted to
cubic graphs, they designed a 5/6-approximation algorithm. Later, Salamon [17] proved that the
1/2-approximation algorithm in [18] actually achieves a performance ratio of 3/(r + 1) for the
MIST problem on r-regular graphs (r ≥ 3). Based on local optimization, Salamon [16] presented
an O(n4 )-time 4/7-approximation algorithm for MIST restricted to graphs without leaves. The
algorithm was subsequently simplified and re-analyzed by Knauer and Spoerhase [7] to run faster
(in cubic time), and it becomes the first improved 3/5-approximation for the general MIST. Via a
deeper local search strategy than those in [7] and [16], Li et al. [8] presented a further improved
approximation algorithm for MIST with ratio 2/3. At the same time, Li and Zhu [12] presented
another 2/3-approximation algorithm for MIST.
Unlike the other previously known approximation algorithms for MIST, the 2/3-approximation
by Li and Zhu [12] is based on a simple but crucial observation that the maximum number of
internal vertices in a spanning tree of a graph G can be upper bounded by the maximum number
of edges in a triangle-free 2-matching (a.k.a. path-cycle cover) of G. The time complexity of
this approximation algorithm is dominated by computing the maximum triangle-free 2-matching,
O(nm1.5 log n), where n and m are the numbers of vertices and edges in G, respectively. Li and
Zhu [11] claimed that they are able to further improve their design to achieve a 3/4-approximation
algorithm for MIST, of the same time complexity. Recently, Chen et al. [2] gave another 3/4approximation algorithm for MIST, which is simpler than the one in [11]; and they showed that by
applying three more new ideas, the algorithm can be refined into a 13/17-approximation algorithm
for MIST of the same time complexity. This is currently the best approximation algorithm for
MIST.
The parameterized MIST by the number of internal vertices k, and its special cases and variants,
have also been extensively studied in the literature [14, 13, 15, 3, 5, 1, 4, 9, 10]. The best known
kernel for the general problem has a size 2k, which leads to the fastest known algorithm with
running time O(4k nO(1) ) [9].
For the vertex-weighted version, MwIST, Salamon [16] designed the first O(n4 )-time 1/(2∆−3)approximation algorithm, based on local search, where ∆ is the maximum degree of a vertex in
the input graph. For MwIST on claw-free graphs without leaves, Salamon [16] also designed an
O(n4 )-time 1/2-approximation algorithm. Subsequently, Knauer and Spoerhase [7] proposed the
Approximating the maximum weight internal spanning tree
3
first constant-ratio 1/(3 + ǫ)-approximation algorithm for the general MwIST, for any constant
ǫ > 0. The algorithm is based on a new pseudo-polynomial time local search algorithm, that
starts with a depth-first-search tree and applies six rules to reach a local optimum. It yields a
1/3-approximation for MwIST and then is extended to a polynomial time 1/(3 + ǫ)-approximation
scheme. The authors also showed that the ratio of 1/3 is asymptotically tight.
In this paper, we deal with the MwIST problem. We first prove a novel relationship between the
total weight of the internal vertices in a spanning tree of the given vertex-weighted graph and the
maximum weight matching of an edge-weighted graph, that is constructed out of the given vertexweighted graph. Based on this relationship, we present a simple 1/2-approximation algorithm for
MwIST; this ratio 1/2 significantly improves upon the previous known ratio of 1/3. When restricted
to claw-free graphs, a special case previously studied in [18, 16], we design a 7/12-approximation
algorithm, improving the previous best ratio of 1/2.
2
The 1/2-approximation algorithm
Recall that in the MwIST problem, we are given a connected graph G = (V, E), where each vertex
v of V has a nonnegative weight w(v), with the objective to compute a spanning tree T of G such
that the total weight of the internal vertices in T , denoted as w(T ), is maximized. We note that for
such an objective function, we may assume without loss of generality that every leaf in the given
graph G has weight 0.
We construct an edge-weighted graph based on G = (V, E). In fact, the structure of the new
graph is identical to that of G: the vertex set is still V , but instead the vertices have no weights;
the edge set is still E, where the weight of each edge e = {u, v} is w(e) = w(u) + w(v), i.e., the
weight of an edge is the total weight of its two ending vertices in the original graph. Since there is
no ambiguity when we discuss the edge weights or the vertex weights, the new edge-weighted graph
is still referred to as G. The weight of an edge subset refers to the total weight of the edges therein;
while the weight of an acyclic subgraph refers to the total weight of the internal (and those surely
will become internal) vertices therein.
Let M ∗ denote the maximum weight matching of (the edge-weighted graph) G, which can be
computed in O(n min{m log n, n2 })-time, where n = |V | and m = |E|.
Lemma 1 Given a spanning tree T of G, we can construct a matching M of G such that w(T ) ≤
w(M ).
Proof. We construct M iteratively. Firstly, we root the tree T at an internal vertex r, and all the
edges of T are unmarked; then in every iteration we include into M an unmarked edge e = {u, v}
of T such that 1) both u and v are internal and 2) e is the closest to the root r measured by the
number of edges on the path from r to e, followed by marking all the edges incident at u or v.
This way, the total weight of the two internal vertices u and v in the tree T is transferred to M
by adding the edge e to M . At the time this iterative procedure stops, there is no unmarked edge
of T connecting two internal vertices, and thus every internal vertex whose weight has not been
transferred to M must be adjacent to at least a leaf each via an unmarked edge.
Next, we iteratively include into M a remaining unmarked edge e = {u, v} of T , followed by
marking all the edges incident at u or v. This way, the total weight of u and v, which is greater
than or equal to the weight of the internal vertex between u and v, is transferred to M by adding
the edge e to M . At the end of this procedure, T contains no more unmarked edges. Since leaves in
the tree T count nothing towards w(T ), we conclude that w(T ) ≤ w(M ). This proves the lemma.
✷
4
Chen et al. /v:May 30, 2017
The following corollary directly follows from Lemma 1, stating an upper bound on the total
weight of an optimal solution to the MwIST problem.
Corollary 1 Let T ∗ denote an optimal (maximum weight internal) spanning tree of G. Then,
w(T ∗ ) ≤ w(M ∗ ).
We next start with M ∗ to construct a spanning tree T . Let the edges of M ∗ be e1 , e2 , . . . , ek ;
let ej = {aj , bj }, such that w(aj ) ≥ w(bj ), for all j = 1, 2, . . . , k. Note that there could be vertices
of degree 0 in the spanning subgraph G[V, M ∗ ] with the edge set M ∗ , and there could be edges of
weight 0 in M ∗ ; let X denote the set of such degree-0 vertices and the end-vertices of such weight-0
edges. Essentially we do not worry about the degree of any vertex of X in our final tree T , since their
weights (if any) are not counted towards w(M ∗ ). This way, we assume without loss of generality
that w(aj ) > 0 for each edge ej of M ∗ , and consequently the degree of aj is dG (aj ) ≥ 2, that is, aj
is adjacent to at least one other vertex than bj in the graph G. Let A = {aj | j = 1, 2, . . . , k}, and
B = {bj | j = 1, 2, . . . , k}; note that V = A ∪ B ∪ X.
Let E aa = E(A, A ∪ X), i.e., the set of edges each connecting a vertex of A and a vertex of
A ∪ X, and E ab = E(A, B), i.e., the set of edges each connecting a vertex of A and a vertex of
B. Our construction algorithm first computes a maximal acyclic subgraph of G, denoted as H0 ,
by adding a subset of edges of E aa to M ∗ . This subset of edges is a maximum weight spanning
forest on A ∪ X, and it can be computed in O(|E aa | log n)-time via a linear scan. In the achieved
subgraph H0 , if one connected component C contains more than one edge, then the vertex aj of
each edge ej = {aj , bj } in C has degree at least 2, i.e. is internal. Therefore, the total weight of
the internal vertices in the component C is at least half of w(C ∩ M ∗ ), and C is called settled and
left alone by the algorithm.
Our algorithm next considers an arbitrary edge of M ∗ that is not yet in any settled component,
say ej = {aj , bj }. In other words, the edge ej is an isolated component in the subgraph H0 . This
implies that the vertex aj is not incident to any edge of E aa , and thus it has to be adjacent to
some vertex in B − {bj }. If aj is adjacent to some vertex bi in a settled component, then this edge
(aj , bi ) is added to the subgraph H0 (the edge ej is said merged into a settled component) and the
iteration ends. The updated component remains settled, as w(aj ) ≥ w(ej )/2 is saved towards the
weight of the final tree T .
In the other case, the vertex aj is adjacent to a vertex bi , such that the edge ei = {ai , bi } is also
an isolated component in the current subgraph. After adding the edge (aj , bi ) to the subgraph, the
algorithm works with the vertex ai exactly the same as with aj at the beginning. That is, if ai is
adjacent to some vertex bℓ in a settled component, then this edge (ai , bℓ ) is added to the subgraph
(the component that ai belongs to is merged into a settled component) and the iteration ends; if
ai is adjacent to a vertex bℓ , such that the edge eℓ = {aℓ , bℓ } is also an isolated component in the
current subgraph, then the edge (ai , bℓ ) is added to the subgraph, the algorithm works with the
vertex aℓ exactly the same as with aj at the beginning; in the last case, ai is adjacent to a vertex
bℓ inside the current component that ai belongs to, then the edge (ai , bℓ ) is added to the current
component to create a cycle, subsequently the lightest edge of M ∗ in the cycle is removed, the
iteration ends, and the current component becomes settled. We note that in the above last case,
the formed cycle in the current component contains at least 2 edges of M ∗ ; breaking the cycle by
removing the lightest edge ensures that at least half of the total weight of the edges of M ∗ in this
cycle (and thus in this component) is saved towards the weight of the final tree T . Therefore, when
the iteration ends, the resulting component is settled.
When the second step of the algorithm terminates, there is no isolated edge of M ∗ in the current
subgraph, denoted as H1 , and each component is acyclic and settled. In the last step, the algorithm
Approximating the maximum weight internal spanning tree
5
connects the components of H1 into a spanning tree using any possible edges of E. We denote the
entire algorithm as Approx.
Lemma 2 At the end of the second step of the algorithm Approx, every component C of the
achieved subgraph H1 is acyclic and settled (i.e., w(C) ≥ w(C ∩ M ∗ )/2).
Proof. Let C denote a component; C ∩ M ∗ is the subset of M ∗ , each edge of which has both
end-vertices in C.
If C is obtained at the end of the first step, then C is acyclic and for every edge ej ∈ C ∩ M ∗ ,
the vertex aj has degree at least 2, and thus w(C) ≥ w(C ∩ M ∗ )/2.
If a subgraph of C is obtained at the end of the first step but C is finalized in the second step,
then C is also acyclic and for every edge ej ∈ C ∩ M ∗ , the vertex aj has degree at least 2, and thus
w(C) ≥ w(C ∩ M ∗ )/2.
If C is newly formed and finalized in the second step, then at the time C was formed, there
was a cycle containing at least 2 edges of M ∗ of which the lightest one is removed to ensure the
acyclicity, and thus the total weight of the internal vertices on this path is at least half of the total
weight of the edges of M ∗ on this cycle. Also, the vertex aj of every edge ej not on the cycle has
degree at least 2. Thus, w(C) ≥ w(C ∩ M ∗ )/2.
✷
Theorem 1 The algorithm Approx is a 1/2-approximation for the MwIST problem.
Proof. One clearly sees that Approx runs in polynomial time, and in fact the running time is
dominated by computing the maximum weight matching M ∗ .
From Lemma 2, at the end of the second step of the algorithm Approx, every component C of
the achieved subgraph H1 is acyclic and satisfies w(C) ≥ w(C ∩ M ∗ )/2. Since there is no edge of
M ∗ connecting different components of the subgraph H1 , the total weight of the internal vertices
in H1 is already at least w(M ∗ )/2, i.e. w(H1 ) ≥ w(M ∗ )/2. The last step of the algorithm may
only increase the total weight. This proves that the total weight of the internal vertices of the tree
T produced by Approx is
w(T ) ≥ w(H1 ) ≥ w(M ∗ )/2 ≥ w(T ∗ )/2,
where the last inequality is by Corollary 1, which states that w(M ∗ ) is an upper bound on the
optimum. Thus, Approx is a 1/2-approximation for the MwIST problem.
✷
3
A 7/12-approximation algorithm for claw-free graphs
We present a better approximation algorithm for the MwIST problem on claw-free graphs. A graph
G = (V, E) is called claw-free if, for every vertex, at least two of its arbitrary three neighbors are
adjacent. We again assume without loss of generality that every leaf in the graph G has weight 0.
Besides, we also assume that |V | ≥ 5.
We first present a reduction rule, which is a subcase of Operation 4 in [2], that excludes certain
induced subgraphs of the given graph G from consideration.
Operation 1 If G has a cut-vertex v such that one connected component C of G − v has two, three
or four vertices, then obtain G1 from G − V (C) by adding a new vertex u of weight 0 and a new
edge {v, u}.
6
Chen et al. /v:May 30, 2017
Let tw(C) denote the maximum total weight of the internal vertices in a spanning tree of the
subgraph induced on V (C) ∪ v, in which w(v) is revised to 0. Then there is an optimal spanning
tree T1 of G1 of weight w(T1 ) if and only if there is an optimal spanning tree T of G of weight
w(T ) = w(T1 ) + tw(C).
Proof. Let Gc denote the subgraph induced on V (C) ∪ v, that is, Gc = G[V (C) ∪ v]; and let Tc
denote the spanning tree of Gc achieving the maximum total weight of the internal vertices, that
is, w(Tc ) = tw(C) (Tc can be computed in O(1)-time).
Note that in T1 , the leaf u must be adjacent to v and thus w(v) is counted towards w(T1 ). We
can remove the edge {v, u} and u from T1 while attach the tree Tc to T1 by collapsing the two
copies of v. This way, we obtain a spanning tree T of G, of weight w(T ) = w(T1 ) + w(Tc ) since
w(v) is not counted towards w(Tc ).
Conversely, for any spanning tree T of G, the vertex v is internal due to the existence of C.
We may duplicate v and separate out a subtree Tc on the set of vertices V (C) ∪ v, in which the
weight of v is revised to 0. This subtree Tc is thus a spanning tree of Gc , and every vertex of V (C)
is internal in T if and only if it is internal in Tc . We attach the 0-weight vertex u to the vertex v
in the remainder tree via the edge {v, u}, which is denoted as T1 and becomes a spanning tree of
G1 ; note that the vertex v is internal in T1 . It follows that w(T ) = w(Tc ) + w(T1 ).
✷
See Figure 1 for an illustration of the local configurations specified in Operation 1. When
|V (C)| = 2 and Gc is a triangle, we refer the configuration as a hanging triangle; when |V (C)| = 3
and Gc contains a length-4 cycle, we refer the configuration as a hanging diamond; when |V (C)| = 4
and Gc contains a length-5 cycle, we refer the configuration as a hanging pentagon. Applying
Operation 1, we assume in the sequel that there is no hanging triangle, or hanging diamond, or
hanging pentagon in the given graph G.
v
v
v
(a) A hanging triangle.
(b) A hanging diamond.
(c) A hanging pentagon.
Figure 1: Local configurations of a hanging triangle, a hanging diamond, and a hanging pentagon,
specified in Operation 1, where the dotted edges could be in or not in the graph.
Let M ∗ denote a maximum weight matching of G, which is computed in O(n min{m log n, n2 })time, where n = |V | and m = |E|. Let the edges of M ∗ be e1 , e2 , . . . , ek ; let ej = {aj , bj }, such that
w(aj ) ≥ w(bj ), for all j = 1, 2, . . . , k. For convenience, aj and bj are referred to as the head and the
tail vertices of the edge ej , respectively. The same as in the last section, we assume without loss
of generality that w(aj ) > 0 for each j, and consequently the degree of aj is dG (aj ) ≥ 2, that is,
aj is adjacent to at least one vertex other than bj in the graph G. Let A = {aj | j = 1, 2, . . . , k},
B = {bj | j = 1, 2, . . . , k}, and X = V − (A ∪ B).
Let E aa = E(A, A), i.e., the set of edges each connecting two vertices of A, E ax = E(A, X),
i.e., the set of edges each connecting a vertex of A and a vertex of X, and E ab = E(A, B), i.e., the
set of edges each connecting a vertex of A and a vertex of B, respectively.
Approximating the maximum weight internal spanning tree
7
Let M aa ⊆ E aa be a maximum cardinality matching within the edge set E aa . We next prove a
structure property of the spanning subgraph G[V, M ∗ ∪ M aa ], which has the edge set M ∗ ∪ M aa .
For an edge ej = {aj , bj } of M ∗ , if aj is not incident to any edge of M aa , then ej is called isolated
in G[V, M ∗ ∪ M aa ].
Lemma 3 Assume that two edges ej1 = {aj1 , bj1 } and ej2 = {aj2 , bj2 } of M ∗ are connected by the
edge {aj1 , aj2 } ∈ M aa in G[V, M ∗ ∪ M aa ]. Then there is at most one isolated edge ej3 = {aj3 , bj3 }
whose head aj3 can be adjacent to aj1 or aj2 .
Proof. By contradiction, assume that there are two isolated edges ej3 = {aj3 , bj3 } and ej4 =
{aj4 , bj4 } such that both the vertices aj3 and aj4 are adjacent to aj1 or aj2 . Then from the maximum
cardinality of M aa , aj3 and aj4 must be both adjacent to aj1 or both adjacent to aj2 . Suppose they
are both adjacent to aj1 ; from the claw-free property, at least two of aj2 , aj3 and aj4 are adjacent,
which contradicts the maximum cardinality of M aa . This proves the lemma.
✷
For an isolated edge ej3 = {aj3 , bj3 } whose head is adjacent to an edge {aj1 , aj2 } ∈ M aa (i.e.,
satisfying Lemma 3), and assuming that {aj2 , aj3 } ∈ E aa , we add the edge {aj2 , aj3 } to G[V, M ∗ ∪
M aa ]; consequently the edge ej3 is no longer isolated. Let N aa denote the set of such added edges
associated with M aa . At the end, the achieved subgraph is denoted as H0 = G[V, M ∗ ∪ M aa ∪ N aa ].
Lemma 4 In the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ],
• every connected component containing more than one edge has either two or three edges from
M ∗ , with their head vertices connected (by the edges of M aa ∪ N aa ) into a path; it is called a
type-I component (see Figure 2a) and a type-II component (see Figure 2b), respectively;
• for every isolated edge ej = {aj , bj }, the head vertex is incident with at least one edge of
E ax ∪ E ab , but with no edge of E aa .
Proof. The proof directly follows the definition of the subgraph H0 and Lemma 3.
aj2
aj1
aj3
bj2
bj1
bj3
(a) A type-I component.
aj2
bj2
✷
aj1
bj1
(b) A type-II component.
Figure 2: The configurations of a type-I component and a type-II component.
The following lemma is analogous to Lemma 3.
Lemma 5 Any vertex of X can be adjacent to the head vertices of at most two isolated edges in
the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ].
8
Chen et al. /v:May 30, 2017
Proof. By contradiction, assume that x ∈ X and there are three isolated edges ejk = {ajk , bjk },
k = 1, 2, 3, in the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ], such that the edge {ajk , x} ∈ E ax . From
the claw-free property, at least two of aj1 , aj2 and aj3 are adjacent, which contradicts Lemma 4.
This proves the lemma.
✷
For an isolated edge ej = {aj , bj } in the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ] whose head is
adjacent to a vertex x ∈ X (i.e., satisfying Lemma 5), we add the edge {aj , x} to H0 ; consequently
the edge ej is no longer isolated. Let N ax denote the set of such added edges associated with X.
At the end, the achieved subgraph is denoted as H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ].
Lemma 6 In the subgraph H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ],
• every connected component of H0 containing more than one edge remains unchanged in H1 ;
• every connected component containing a vertex x of X and some other vertex has either one
or two edges from M ∗ , with their head vertices connected (by the edges of N ax ) to the vertex
x; it is called a type-III component (see Figure 3a) and a type-IV component (see Figure 3b),
respectively;
• for every isolated edge ej = {aj , bj }, the head vertex is incident with at least one edge of E ab ,
but with no edge of E aa ∪ E ax .
Proof. The proof directly follows the definition of the subgraph H1 and Lemmas 4 and 5.
aj1
aj1
aj2
x
✷
x
bj1
(a) A type-III component.
bj2
bj1
(b) A type-IV component.
Figure 3: The configurations of a type-III component and a type-IV component.
Let E0ab denote the subset of E ab , to include all the edges {aj , bℓ } where both the edges ej =
{aj , bj } and eℓ = {aℓ , bℓ } are isolated in the subgraph H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ]. Let
M ab ⊆ E0ab be a maximum cardinality matching within the edge set E0ab . Let H2 = G[V, M ∗ ∪
M aa ∪ N aa ∪ N ax ∪ M ab ] be the subgraph obtained from H1 by adding all the edges of M ab . One
clearly sees that all the isolated edges in the subgraph H1 are connected by the edges of M ab into
disjoint paths and cycles; while a path may contain any number of isolated edges, a cycle contains
at least two isolated edges. Such a path and a cycle component are called a type-V component (see
Figure 4a) and a type-VI component (see Figure 4b), respectively.
Note that in a type-V component, there is exactly one head vertex of degree 1 and there is
exactly one tail vertex of degree 1. We assume that for the tail vertex in a type-V component, it is
not adjacent to the head of any other edge (via an edge of E ab ) in the same component; otherwise,
through an edge exchange, the component is decomposed into a smaller type-V component and a
new type-VI component.
Approximating the maximum weight internal spanning tree
......
......
(a) A type-V component.
9
(b) A type-VI component.
Figure 4: The configurations of a type-V component and a type-VI component.
Lemma 7 In the subgraph H2 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ], for every type-V component,
the degree-1 head vertex is adjacent (via an edge of E ab ) to the tail vertex of an edge in a type-I,
-II, -III, or -IV component; on the other hand, the tail vertex of every edge in a type-I, -II, -III, or
-IV component is adjacent to at most one such head vertex.
Proof. We first show that the degree-1 head vertex in a type-V component C, denoted as aj ,
cannot be adjacent to the tail of any edge in another type-V or a type-VI component C ′ . By
contradiction, assume {aj , bℓ } ∈ E ab and eℓ is in C ′ . If the tail bℓ is already incident to some
edge of M ab , say {ai , bℓ }, then by the claw-free property at least two of ai , aj , aℓ must be adjacent,
contradicting the fact that they are all isolated in the subgraph H1 . In the other case, the tail bℓ is
the tail vertex of C ′ (which is a type-V component too), then it violates the maximum cardinality
of M ab since {aj , bℓ } ∈ E ab can be added to increase the size of M ab . This proves the first half of
the lemma.
The second half can be proven by a simple contradiction using the claw-free property of the
graph.
✷
Subsequently, every type-V component C is connected to a type-I, -II, -III, or -IV component
C ′ , via the edge between the degree-1 head vertex of C and the tail vertex of an edge in C ′ ∩ M ∗ .
This way, the degree-1 tail vertex of C takes up the role of “the tail vertex” of the edge in C ′ ∩ M ∗ ,
to become a tail vertex in the newly formed bigger component. For simplicity, the type of the
component C ′ is passed to the newly formed bigger component. Denote this set of newly added
edges as N ab , which is a subset of E ab − M ab . The achieved subgraph is denoted as H3 = G[V, M ∗ ∪
M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ].
Lemma 8 In the subgraph H3 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ],
• there is no isolated type-V component;
• the head vertex of every edge of M ∗ has degree at least 2.
Proof. The first half of the lemma follows from Lemma 7; the second half holds since there is no
more isolated type-V component, which is the only type of component containing a degree-1 head
vertex.
✷
We next create a set F of edges that are used to interconnect the components in the subgraph
H3 . F is initialized to be empty. By Lemma 8, for every type-I, -II, -III, or -IV component C in the
subgraph H3 , of weight w(C ∩M ∗ ), it is a tree and the total weight of the internal vertices therein is
at least 12 w(C ∩ M ∗ ); for every type-VI component C, which is a cycle, by deleting the lightest edge
10
Chen et al. /v:May 30, 2017
of C ∩ M ∗ from C we obtain a path and the total weight of the internal vertices in this path is also
at least 12 w(C ∩ M ∗ ). In the next five lemmas, we show that every component C in the subgraph
H3 can be converted into a tree on the same set of vertices, possibly with one edge specified for
connecting a leaf of this tree outwards, such that the total weight of the internal vertices (and the
leaf, if specified) in the tree is at least 32 w(C ∩ M ∗ ). The specified edge for the interconnection
purpose, is added to F . At the end of the process, the component C is called settled. A settled
component C can be expressed in multiple equivalent ways, for example, that the total weight of
the internal vertices (and the leaf, if specified) in the resulting tree is at least 32 w(C ∩ M ∗ ), or that
the total weight of the internal (and the leaf, if specified) vertices in the resulting tree is at least
twice the total weight of the leaves (excluding the specified leaf, if any).
In the sequel, we abuse the vertex notation to also denote its weight in math formulae; this
simplifies the presentation and the meaning of the notation is easily distinguishable. For estimating
the total weight of the internal vertices in a tree in the sequel, we frequently use the following
inequality:
∀w1 , w2 , w3 ∈ R, w1 + w2 + w3 − min{w1 , w2 , w3 } ≥ 2 min{w1 , w2 , w3 }.
Lemma 9 A type-I component in the subgraph H3 can be settled.
Proof. Consider a type-I component C in the subgraph H3 . Recall from Lemma 8 and the
paragraph right above it, that a general type-I component is an original type-I component (shown
in Figure 2a) augmented with zero to two type-V components.
Let the two original edges of M ∗ in C be ej1 and ej2 and the two tail vertices be b1 and b2 (which
replace bj1 and bj2 to be the tail vertices, respectively) with w(b1 ) ≥ w(b2 ). The corresponding two
head vertices to the tails b1 and b2 are denoted as a1 and a2 , respectively. See Figure 5 for the
general configuration of such a component. We assume that w(b1 ) > 0, since otherwise C is settled
automatically.
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 5: The general configuration of a type-I component, with a type-V component adjacent to
each of the two tail vertices.
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F ; this settles
C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 ≥ 3b2 (recall that a
vertex notation here represents the weight of the vertex).
We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to
be adjacent to some vertex inside C. Note that C is a path with b1 and b2 being its two ending
vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this
distance dC (b1 , v) ≥ 2 and where v locates.
Approximating the maximum weight internal spanning tree
11
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then by the construction of
a type-V component we know that v must be a tail of an edge of M ∗ (Figures 6a and 6b), and thus
dC (b1 , v) is even. Denote this edge as ej3 = {aj3 , bj3 }, that is v = bj3 .
a2
b2
aj2
bj2
aj1
a1
a2
bj1 v
b1
b2
(a) dC (b1 , v) ≥ 4.
aj2
bj2
a1
aj1
bj1
v
b1
(b) dC (b1 , v) = 2.
Figure 6: Local configurations corresponding to Case 2, where v is inside the type-V component
adjacent to bj1 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex other than aj3 that bj3 is adjacent to
as aj4 (see Figure 6a). We conclude from the claw-free property that there must be at least an
edge among aj3 , aj4 , b1 , which contradicts the identity of the type-V component. Therefore, it is
impossible to have dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1 (see Figure 6b), i.e. there is at least another edge incident at a1 besides {a1 , bj3 } and
{a1 , b1 }. Denote this neighbor of a1 as u. If u is inside C, then u = b2 ; in this case, add the
edges {b1 , bj3 } and {a1 , b2 } to C while delete the edge {a1 , bj3 } and the lightest among the edges
of C ∩ M ∗ from C. This way, the component becomes a tree and thus C is settled. If u is outside
C, then we add the edge {b1 , bj3 } to C while delete the edge {a1 , bj3 } from C, and add the edge
{a1 , u} to F ; this way, the component becomes a tree and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 (see
Figure 7).
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 7: Local configurations corresponding to Case 3, where v = bj1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , which is {a1 , b1 },
then we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge
incident at a1 besides {a1 , bj1 } and {a1 , b1 }. (The following is the same as in Case 2.2.) Denote
this neighbor of a1 as u. If u is inside C, then u = b2 ; in this case, add the edges {b1 , bj1 } and
12
Chen et al. /v:May 30, 2017
{a1 , b2 } to C while delete the edge {a1 , bj1 } and the lightest among the edges of C ∩ M ∗ from C.
This way, the component becomes a tree and thus C is settled. If u is outside C, then we add the
edge {b1 , bj1 } to C while delete the edge {a1 , bj1 } from C, and add the edge {a1 , u} to F ; this way,
the component becomes a tree and thus C is settled.
Case 4. If b1 6= bj1 and v = aj1 (see Figure 8), then we leave C as it is when w(b1 ) ≤ w(bj1 ),
or we add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. The total weight of the
internal vertices in the resulting path is at least a2 + aj1 + a1 + max{b1 , bj1 } ≥ 2(b2 + min{b1 , bj1 }),
and thus C is settled.
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 8: Local configurations corresponding to Case 4, where v = aj1 .
Case 5. If b1 6= bj1 and v = aj2 (see Figure 9), then by the claw-free property there is at least
an edge among bj2 , aj1 , b1 . Note that bj2 and b1 cannot be adjacent due to the definition of the
vertex v (being the farthest). If aj1 and b1 are adjacent, then it has been proven in Case 4 that
C can be settled. If bj2 and aj1 are adjacent, then similarly as in Case 4 we either leave C as
it is when w(b1 ) ≤ w(bj1 ), or add the edges {aj2 , b1 } and {aj1 , bj2 } to C while delete the edges
{aj1 , bj1 } and {aj2 , bj2 } from C; the total weight of the internal vertices in the resulting path is at
least a2 + aj1 + a1 + max{b1 , bj1 } ≥ 2(b2 + min{b1 , bj1 }), and thus C is settled.
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 9: Local configurations corresponding to Case 5, where v = aj2 .
Case 6. If b1 6= bj1 and v = bj2 (see Figure 10), then by the claw-free property aj2 and b1 must
be adjacent.
Case 6.1. If b2 6= bj2 , then we have three ways to convert C into a path ending at b2 : 1) doing
nothing to leave b1 as a leaf; 2) adding the edge {aj2 , b1 } to C while deleting the edge {aj2 , aj1 } to
leave aj1 as a leaf; 3) adding the edge {bj2 , b1 } to C while deleting the edge {aj2 , bj2 } to leave aj2
as a leaf. Then, the maximum total weight of the internal vertices among these three paths is at
least a2 + a1 + aj1 + aj2 + b1 − min{b1 , aj1 , aj2 } ≥ 2(b2 + min{b1 , aj1 , aj2 }). Thus, C is settled.
Approximating the maximum weight internal spanning tree
a2
aj2
b2
bj2
aj1
a1
bj1
b1
13
Figure 10: Local configurations corresponding to Case 6, where v = bj2 .
Case 6.2. If b2 = bj2 , that is, there is no type-V component adjacent to bj2 , then we add the
edge {bj2 , b1 } to C while delete the lightest edge of C ∩ M ∗ from C to settle C, because C ∩ M ∗
contains at least three edges.
Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail (see Figure 11).
a2
2
a
v
aj2
aj1
b
bj2
bj1
(a) v is a head.
aj1
a1
a2
bj1
b1
b2
aj2
aj1
a1
bj1
b1
a
b2
2
aj2
1
b
bj2
v
bj2
1
(b) v = b2 .
(c) v is a tail.
Figure 11: Local configurations corresponding to Case 7, where v is inside the type-V component
adjacent to bj2 .
Case 7.1. If v is a head, say aj3 of the edge ej3 (see Figure 11a), and assume that aj3 is also
adjacent to bj4 , then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or add the edge
{aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. Then, the total weight of
the internal vertices in the resulting path is at least a2 +a1 +aj4 +max{b1 , bj4 } ≥ 2(b2 +min{b1 , bj4 }).
Thus, C is settled.
Case 7.2. If v is a tail, say bj3 of the edge ej3 (see Figures 11b and 11c). If b2 = bj3 (see
Figure 11b), then we add the edge {b1 , b2 } to C makes it a cycle while delete the lightest edge of
C ∩ M ∗ to settle C since there are at least four edges in C ∩ M ∗ ; if b2 6= bj3 (see Figure 11c), then
by the claw-free property and the definition of v we conclude that b1 is adjacent to aj3 too, and
thus the argument in Case 7.1 applies to settle C.
In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1
(see Figure 12).
Case 8. If b1 = bj1 and v = aj2 , then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1 (see Figure 13).
Case 8.1. If there is a vertex u outside C that is adjacent to a1 , then we add the edge {a1 , u}
to F , add the edge {aj2 , b1 } to C while delete the edge {a1 , aj2 } from C; this way, C is settled.
Case 8.2. Otherwise by the claw-free property a1 must be adjacent either to b2 or to bj2 .
14
Chen et al. /v:May 30, 2017
a2
a1
aj2
b2
b1
bj2
Figure 12: A special configuration without a type-V component adjacent to bj1 , i.e. bj1 = b1 .
a2
a1
aj2
b2
b1
bj2
Figure 13: Local configurations corresponding to Case 8, where v = aj2 .
Case 8.2.1. Assuming b2 6= bj2 , in the former case, we add the edges {aj2 , b1 } and {a1 , b2 } to
C while delete the edge {a1 , aj2 } and the lightest edge of C ∩ M ∗ from C; this way, C is settled
since there were at least three edges in C ∩ M ∗ . In the latter case, we conclude that dG (aj2 ) ≥ 4 by
Operation 1. Recursively, if there is a vertex u outside C that is adjacent to aj2 , then we add the
edge {aj2 , u} to F , add the edges {aj2 , b1 } and {a1 , bj2 } to C while delete the edges {a1 , aj2 } and
{aj2 , bj2 } from C; this way, C is settled. Otherwise by the claw-free property aj2 must be adjacent
to b2 ; we add three edges {aj2 , b1 }, {a1 , bj2 } and {aj2 , b2 } to C while delete the edges {a1 , aj2 } and
{aj2 , bj2 }, and the lightest edge of C ∩ M ∗ from C; this way, C is settled.
Case 8.2.2. Assuming b2 = bj2 , that is, there is no type-V component adjacent to bj2 . We
conclude that dG (a2 ) ≥ 4 and there is a vertex u outside C that is adjacent to a2 by Operation 1.
Thus, we add the edge {a2 , u} to F , add the edges {a2 , b1 } and {a1 , b2 } to C while delete the edges
{a1 , a2 } and {a2 , b2 } from C; this way, C is settled.
Case 9.
If b1 = bj1 and v = bj2 (see Figure 14), we consider two possible scenarios.
a2
aj2
a1
a2
a1
b2
bj2
b1
b2
b1
(a) b2 6= bj2 .
(b) b2 = bj2 .
Figure 14: Local configurations corresponding to Case 9, where v = bj2 .
Approximating the maximum weight internal spanning tree
15
Case 9.1. If b2 6= bj2 (see Figure 14a), then we conclude from the claw-free property and the
definition of v that b1 is also adjacent to aj2 . By Operation 1, at least one of a1 and aj2 must be
adjacent to another vertex u.
Case 9.1.1. If there is a vertex u outside C that is adjacent to a1 (aj2 , respectively) then we
add the edge {a1 , u} ({aj2 , u}, respectively) to F , add the edges {bj2 , b1 } and {aj2 , b1 } ({bj2 , b1 },
respectively) to C while delete the edges {a1 , b1 } and {aj2 , bj2 } ({aj2 , bj2 }, respectively) from C;
this way, C is settled.
Case 9.1.2. Otherwise by the claw-free property u ∈ {b2 , bj2 }. If u = b2 , then we can settle C
by converting C into a cycle on the same set of vertices, followed by deleting the lightest edge of
C ∩ M ∗ from C. In the other case, u = bj2 and thus a1 is adjacent to bj2 , which by Operation 1 is
impossible.
Case 9.2. If b2 = bj2 , that is, there is no type-V component adjacent to bj2 (see Figure 14b).
We conclude that either there is a vertex u outside C that is adjacent to a2 , or a2 is adjacent to b1
and there is a vertex u outside C that is adjacent to a1 . In either case, we add the edge {·, u} to
F , and convert C into a path with b2 and · as two ending vertices; this way, C is settled.
Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail (see Figure 15).
a2
a2
b2
v
aj2
a1
bj2
b1
(a) v is a head.
b2
aj2
bj2
a1
a2
b1
b2
(b) v = b2 .
aj2
v
bj2
a1
b1
(c) v is a tail.
Figure 15: Local configurations corresponding to Case 10, where v is inside the type-V component
adjacent to bj2 .
Case 10.1. If v is a head, say aj3 of the edge ej3 (see Figure 15a), and assume that aj3 is also
adjacent to bj4 , then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or add the edge
{aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. Then, the total weight of
the internal vertices in the resulting path is at least a2 +a1 +aj4 +max{b1 , bj4 } ≥ 2(b2 +min{b1 , bj4 }).
Thus, C is settled.
Case 10.2. If v is a tail, say bj3 of the edge ej3 (see Figures 15b and 15c). If b2 = bj3 (see
Figure 15b), then we add the edge {b1 , b2 } to C makes it a cycle while delete the lightest edge of
C ∩ M ∗ to settle C since there are at least three edges in C ∩ M ∗ ; if b2 6= bj3 (see Figure 15c), then
by the claw-free property and the definition of v we conclude that b1 is adjacent to aj3 too, and
thus the argument in Case 10.1 applies to settle C.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 10 A type-II component in the subgraph H3 can be settled.
Proof. Consider a type-II component C in the subgraph H3 . Recall from Lemma 8 and the
paragraph right above it, that a general type-II component is an original type-II component (shown
16
Chen et al. /v:May 30, 2017
in Figure 2b) augmented with zero to three type-V components.
Let the three original edges of M ∗ in C be ej1 , ej2 , ej3 , with ej2 in the middle (see Figure 2b),
and the three tail vertices be b1 , b2 , b3 (which replace bj1 , bj2 , bj3 , respectively). We consider the
situation where b1 is the heaviest among the three tail vertices (the other situation is where b2 is
the heaviest, and can be similarly discussed). In the following, discussion for most cases is similar
to the cases in the proof of Lemma 9, and thus not all details are presented (neither the illustration
figures).
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles
C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 + a3 ≥ 2(b2 + b3 ) (recall
that a vertex notation here represents the weight of the vertex).
In the sequel we assume b1 is not adjacent to any vertex outside C, and thus it has to be
adjacent to some vertex inside C. Let v denote the vertex adjacent to b1 that is the farthest to b1
on C (tie breaks arbitrarily). We distinguish this distance dC (b1 , v) ≥ 2 and where v locates.
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be the tail of
an edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej4 = {aj4 , bj4 }, that is v = bj4 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex other than aj4 that bj4 is also adjacent
to as aj5 . We conclude from the claw-free property that there must be at least an edge among
aj4 , aj5 , b1 , which contradicts the identity of the type-V component. Thus it is impossible to have
dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj4 } and {a1 , b1 }. Denote
this neighbor of a1 as u. If u is inside C, then u ∈ {b2 , b3 }; in the case of u = b2 (the argument
for u = b3 is identical), we know that the branch incident at aj1 contains at least three edges of
M ∗ (ej1 , ej4 , e1 ), and thus we may add the edges {bj4 , b1 } and {a1 , b2 } to C while delete the edge
{a1 , bj4 } and the lightest among the three edges ej1 , ej4 , e2 (which are on the created cycle), denoted
as ex = {ax , bx }, from C. This way, the component becomes a tree with leaves b3 , ax , bx . The total
weight of the internal vertices in the tree is at least a3 + (a1 + b1 ) + 2(ax + bx ) ≥ 2(b3 + ax + bx );
that is, C is settled.
If u is outside C, then we add the edge {bj4 , b1 } to C while delete the edge {a1 , bj4 } from C,
and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , which is {a1 , b1 };
in this case, we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another
edge incident at a1 besides {a1 , bj1 } and {a1 , b1 }. Denote this neighbor of a1 as u. If u is inside
C, then u ∈ {b2 , b3 }. In the case of u = b2 (the argument for u = b3 is identical), we may add the
edges {b1 , bj1 } and {a1 , b2 } to C while delete the edge {a1 , bj1 } to form a cycle. When bj2 = b2 ,
we either delete the edge {aj2 , bj2 } to leave bj2 as a leaf, or delete the edge {aj2 , aj1 } to leave aj1
as a leaf. The maximum total weight of the internal vertices between the two trees is at least
a3 + a1 + b1 + a2 + max{b2 , aj1 } ≥ 2(b3 + min{b2 , aj1 }), and thus C is settled. When bj2 6= b2 , we
delete the lightest among the three edges ej1 , ej2 , e2 (which are on the created cycle), denoted as
ex = {ax , bx }, from C. This way, the component becomes a tree with leaves b3 , ax , bx . The total
Approximating the maximum weight internal spanning tree
17
weight of the internal vertices in the tree is at least a3 + (a1 + b1 ) + 2(ax + bx ) ≥ 2(b3 + ax + bx );
that is, C is settled.
If u is outside C, then we add the edge {b1 , bj1 } to C while delete the edge {a1 , bj1 } from C,
and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled.
Case 4. If b1 6= bj1 and v = aj1 , we consider the size of the type-V component containing b1 .
Case 4.1. If this type-V component contains more than one edge of M ∗ , then denote one edge
other than {a1 , b1 } as ej4 = {aj4 , bj4 }. We add the edge {aj1 , b1 } to C while either delete the edge
{aj1 , bj1 } to have a tree with leaves bj1 , b2 , b3 , or delete the edge {aj4 , bj4 } to have a tree with leaves
aj4 , bj4 , b2 , b3 . It follows that the maximum total weight of the internal vertices between the two
trees is at least a2 + a3 + a1 + b1 + aj1 + max{bj1 , aj4 + bj4 } ≥ 2(b2 + b3 + min{bj1 , aj4 + bj4 });
therefore, C is settled.
Case 4.2. If this type-V component contains only one edge of M ∗ , which is {a1 , b1 }, then from
the claw-free property and the definition of v being the farthest we conclude that bj1 is adjacent to
at least one of aj2 and b1 .
Case 4.2.1. Assume bj1 and aj2 are adjacent. By treating aj2 as the cut-vertex in Operation 1,
we conclude that at least one of the three vertices aj1 , bj1 , a1 is adjacent to a vertex u outside of
the set {aj2 , aj1 , bj1 , a1 , b1 }.
Case 4.2.1.1. If aj1 is adjacent to a vertex u outside the component C, then we add the edges
{aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {aj1 , bj1 } from C to obtain a tree
with leaves b3 , b2 , aj1 ; thus, adding the edge {aj1 , u} to F settles C.
If bj1 is adjacent to a vertex u outside the component C, then we add the edge {aj1 , b1 } to C
while delete the edge {aj1 , bj1 } from C to obtain a tree with leaves b3 , b2 , bj1 ; thus, adding the edge
{bj1 , u} to F settles C.
If a1 is adjacent to a vertex u outside the component C, then we add the edges {aj2 , bj1 } and
{aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {bj1 , a1 } from C to obtain a tree with leaves
b3 , b2 , a1 ; thus, adding the edge {a1 , u} to F settles C.
Case 4.2.1.2. If aj1 is not adjacent to any vertex outside the component C, but to some
vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). There are
only four possibilities.
When u = aj3 (u = bj3 and bj3 6= b3 implying that aj3 and aj1 are adjacent), we can add
the edges {aj3 , aj1 }, {aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj3 , aj2 }, {aj2 , aj1 } and
{aj1 , bj1 } from C to obtain a path with leaves b3 , b2 ; thus, C is settled.
When u = bj2 , we can add the edges {bj2 , aj1 }, {aj2 , bj1 } and {aj1 , b1 } to C while delete the
edges {aj2 , aj1 }, {aj2 , bj2 } and {aj1 , bj1 } from C to obtain a path with leaves b3 , b2 ; thus, C is
settled.
When u = b3 (whether b3 = bj3 or not), we can add the edge {b3 , aj1 } to C while delete the
edge {aj2 , aj1 } from C to obtain a path with leaves b2 , b1 ; we also can add the edges {b3 , aj1 } and
{aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {aj1 , bj1 } from C to obtain a path with leaves
b2 , bj1 . It follows that the maximum total weight of the internal vertices between the two paths is
at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }); therefore, C is settled.
When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that
C can be settled.
Case 4.2.1.3. If a1 is not adjacent to any vertex outside the component C, but to some vertices
inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that u cannot
be any head vertex, as otherwise it violates the algorithm; u cannot be any tail vertex either, unless
it is b2 or b3 . Therefore there are only two possibilities.
18
Chen et al. /v:May 30, 2017
When u = b3 (whether b3 = bj3 or not), we can add the edges {b3 , a1 } and {aj1 , b1 } to C while
delete the edge {aj2 , aj1 }. Then, we either delete {a1 , b1 } to obtain a path with leaves b2 , b1 , or
delete {a1 , bj1 } to obtain a path with leaves b2 , bj1 . It follows that the maximum total weight of the
internal vertices between the two paths is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 });
therefore, C is settled.
When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that
C can be settled.
Case 4.2.1.4. If bj1 is not adjacent to any vertex outside the component C, but to some
vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily).
When u ∈ {aj3 , bj3 , bj2 } (u = bj3 and bj3 6= b3 implying that aj3 and bj1 are adjacent), similarly
as in Case 4.2.1.2, we can convert C into a path with leaves b3 , b2 to settle C. In the remaining
case, u is inside one of the attached type-V components.
When u is a head, say aj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), and
assume that aj4 is adjacent to bj5 besides bj4 , then we can do nothing to have a tree with leaves
b3 , b2 , b1 ; or we can add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } to obtain a tree with
leaves b3 , b2 , bj1 ; or we can add the edges {aj4 , bj1 } and {aj1 , b1 } to C while delete the edges {aj4 , bj5 }
and {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj5 . The maximum total weight of the internal
vertices among the three trees is at least a3 + a2 + aj1 + bj1 + aj5 + bj5 + a1 + b1 − min{b1 , bj1 , bj5 } ≥
2(b3 + b2 + min{b1 , bj1 , bj5 }), which settles C.
When u is a tail, say bj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), but
bj 4 ∈
/ {b2 , b3 }, then from the claw-free property and the definition of u we conclude that bj1 is also
adjacent to aj4 . Thus the argument in the last paragraph applies to settle C.
Lastly, when u = b2 (or b3 , which can be shown in the same way), we conclude that b2 is
adjacent either to aj1 , which is settled in Case 4.2.1.2, or to a1 , which is settled in Case 4.2.1.3.
Case 4.2.2. Assume bj1 is not adjacent to aj2 but to b1 . By treating aj1 as the cut-vertex
in Operation 1, we conclude that at least one of the two vertices bj1 , a1 is adjacent to a vertex u
outside the set {aj1 , bj1 , a1 , b1 }.
Case 4.2.2.1. If bj1 is adjacent to a vertex u outside the component C, then we add the edge
{aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C to obtain a tree with leaves b3 , b2 , bj1 ; thus,
adding the edge {bj1 , u} to F settles C.
If a1 is adjacent to a vertex u outside the component C, then we add the edges {bj1 , b1 } and
{aj1 , b1 } to C while delete the edges {aj1 , bj1 } and {a1 , b1 } from C to obtain a tree with leaves
b3 , b2 , a1 ; thus, adding the edge {a1 , u} to F settles C.
Case 4.2.2.2. If a1 is not adjacent to any vertex outside the component C, but to some vertices
inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that u cannot
be any head vertex, as otherwise it violates the algorithm; u cannot be any tail vertex either, unless
it is b2 or b3 . Therefore there are only two possibilities. (This is very similar to Case 4.2.1.3.)
When u = b3 (whether b3 = bj3 or not), we can add the edges {b3 , a1 } and {aj1 , b1 } to C while
delete the edge {aj2 , aj1 }. Then, we can delete {a1 , b1 } to obtain a path with leaves b2 , b1 , or we can
delete {a1 , bj1 } to obtain a path with leaves b2 , bj1 . It follows that the maximum total weight of the
internal vertices between the two paths is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 });
therefore, C is settled.
When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that
C can be settled.
Case 4.2.2.3. If bj1 is not adjacent to any vertex outside the component C, but to some
vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that
u 6= aj2 , which is Case 4.2.1. When u ∈ {aj3 , bj3 , bj2 }, similarly as in Case 4.2.1.2, we can convert
Approximating the maximum weight internal spanning tree
19
C into a path with leaves b3 , b2 to settle C. In the remaining case, u is inside one of the attached
type-V components. (This is very similar to Case 4.2.1.4.)
When u is a head, say aj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), and
assume that aj4 is adjacent to bj5 besides bj4 , then we can do nothing to have a tree with leaves
b3 , b2 , b1 ; or we can add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } to obtain a tree with
leaves b3 , b2 , bj1 ; or we can add the edges {aj4 , bj1 } and {aj1 , b1 } to C while delete the edges {aj4 , bj5 }
and {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj5 . The maximum total weight of the internal
vertices among the three trees is at least a3 + a2 + aj1 + bj1 + aj5 + bj5 + a1 + b1 − min{b1 , bj1 , bj5 } ≥
2(b3 + b2 + min{b1 , bj1 , bj5 }), which settles C.
When u is a tail, say bj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), but
bj 4 ∈
/ {b2 , b3 }, then from the claw-free property and the definition of u we conclude that bj1 is also
adjacent to aj4 . Thus the argument in the last paragraph applies to settle C.
Lastly, when u = b2 (or b3 , which can be shown in the same way), we conclude that b2 is
adjacent either to aj1 or to a1 , the latter of which is settled in Case 4.2.2.3. In the remaining case
where b2 is adjacent to aj1 , we can add the edge {b2 , aj1 } to C while delete the edge {aj1 , aj2 } to
obtain a path with leaves b3 , b1 ; or we can add the edges {b2 , aj1 } and {b1 , aj1 } to C while delete the
edges {aj1 , aj2 } and {aj1 , bj1 } to obtain a path with leaves b3 , bj1 . The maximum total weight of the
internal vertices between the two trees is at least a3 + a1 + aj1 + max{b1 , bj1 } ≥ 2(b3 + min{b1 , bj1 }),
which settles C.
Case 5. If b1 6= bj1 and v = aj2 , then by the claw-free property there is at least an edge among
bj2 , aj1 , b1 . Note that bj2 and b1 cannot be adjacent due to the definition of the vertex v being the
farthest. If aj1 and b1 are adjacent, then it has been proven in the above Case 4 that C can be
settled. If bj2 and aj1 are adjacent, then we add the edges {aj2 , b1 } and {aj1 , bj2 } to C while delete
the edges {aj2 , aj1 } and {aj2 , bj2 } from C; this way we obtain a path with two leaves b2 and b3 , and
thus it settles C.
Case 6. If b1 6= bj1 and v = bj2 , then we add the edge {bj2 , b1 } to C while delete the edge {aj2 , bj2 }
from C; this way we obtain a path with two leaves b2 and b3 , and thus it settles C.
If b1 6= bj1 and v = aj3 , then we add the edge {aj3 , b1 } to C while delete the edge {aj3 , aj2 }
from C; this way we obtain a path with two leaves b2 and b3 , and thus it settles C.
If b1 6= bj1 and v = bj3 , then there are two possible scenarios. When b3 6= bj3 , by the clawfree property and the definition of v we conclude that aj3 and b1 must be adjacent, and the last
paragraph shows that C is settled. When b3 = bj3 , we add the edge {b3 , b1 } to C while either delete
the edge {a3 , aj2 } from C to achieve a path with two leaves a3 , b2 , or delete the edge {aj2 , aj1 } from
C to achieve a path with leaves aj1 , b2 ; we may also do nothing to C which is a tree with leaves
b1 , b2 , b3 . Among these three trees, the maximum total weight of the internal vertices is at least
a3 + b3 + a2 + aj1 + a1 + b1 − min{a3 , aj1 , b1 + b3 } ≥ 2(b2 + min{a3 , aj1 , b1 + b3 }); thus, C is settled.
Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail. (Note that the same argument applies to b3 6= bj3 and v is in the
type-V component containing b3 .)
Case 7.1. If v is a head, say aj4 of the edge ej4 , and assume that aj4 is adjacent to bj5 besides
bj4 , then we consider two distinct scenarios.
Case 7.1.1. When bj5 6= bj2 , besides two leaves b2 and b3 , we either do nothing to C to leave
1
b as a leaf, or add the edge {aj4 , b1 } to C while delete the edge {aj4 , bj5 } from C to leave bj5
as a leaf, or add the edge {aj4 , b1 } to C while delete the edge {aj2 , bj2 } from C to leave bj2 as
20
Chen et al. /v:May 30, 2017
a leaf. Among these three trees, the maximum total weight of the internal vertices is at least
a3 + a2 + a1 + b1 + aj2 + bj2 + aj5 + bj5 − min{b1 , bj2 , bj5 } ≥ 2(b3 + b2 + min{b1 , bj2 , bj5 }); thus, C is
settled.
Case 7.1.2. When bj5 = bj2 , by the claw-free property and the definition of the vertex v we
conclude that bj2 is adjacent to at least one of bj4 and b1 . If bj2 and bj4 are adjacent, then we
add the edges {aj4 , b1 } and {bj2 , bj4 } to C while delete the edges {aj2 , bj2 } and {aj4 , bj4 } from C to
obtain a path with leaves b2 and b3 ; if bj2 and b1 are adjacent, then we add the edge {bj2 , b1 } to C
while delete the edge {aj2 , bj2 } from C to obtain a path with leaves b2 and b3 . Thus, C is settled.
Case 7.2. In the other case v is a tail, say bj4 of the edge ej4 .
Case 7.2.1. If b2 = bj4 , then besides the leaf b3 , we either do nothing to C to leave b1 , b2 as
leaves, or add the edge {b1 , b2 } to C and delete the edge {aj2 , aj1 } to leave aj1 as a leaf, or add the
edge {b1 , b2 } to C and delete the edge {aj2 , bj2 } to leave bj2 as a leaf. Among these three trees, the
maximum total weight of the internal vertices is at least a3 + a1 + aj1 + bj2 + b1 + b2 − min{b1 +
b2 , aj1 , bj2 } ≥ 2(b3 + min{b1 + b2 , aj1 , bj2 }); thus, C is settled.
(In this paragraph, we deal with the case where b3 takes the role of b2 and prove our claim at the
beginning of Case 7 “that the same argument applies to b3 6= bj3 and v is in the type-V component
containing b3 ”. The complete assumption of Case 7.2.1 is thus b3 6= bj3 and v = b3 . Then, besides
the leaf b2 , we either do nothing to C to leave b1 , b3 as leaves, or add the edge {b1 , b3 } to C and
delete the edge {aj2 , aj1 } to leave aj1 as a leaf, or add the edge {b1 , b3 } to C and delete the edge
{aj2 , aj3 } to leave aj3 as a leaf. Among these three trees, the maximum total weight of the internal
vertices is at least a2 + a1 + aj1 + aj3 + b1 + b3 − min{b1 + b3 , aj1 , aj3 } ≥ 2(b2 + min{b1 + b3 , aj1 , aj3 });
thus, C is settled. In summary, here the vertex aj3 takes up the role of bj2 correspondingly.)
Case 7.2.2. If b2 6= bj4 , then by the claw-free property and the definition of v we conclude
that b1 is adjacent to aj4 too. Assume that aj4 is adjacent to bj5 besides bj4 . When bj5 6= bj2 , the
argument in Case 7.1.1 can be applied to settle C; when bj5 = bj2 (the argument in Case 7.1.2
does not applied to settle C due to the deferent v), besides the leaves b2 and b3 , we either do
nothing to C to leave b1 as a leaf, or add the edge {b1 , aj4 } to C and delete the edge {aj2 , bj2 }
to leave bj2 as a leaf, or add the edge {b1 , aj4 } to C and delete the edge {aj2 , aj1 } to leave aj1
as a leaf. Among these three trees, the maximum total weight of the internal vertices is at least
a3 + a2 + aj1 + aj2 + bj2 + a1 + b1 − min{b1 , aj1 , bj2 } ≥ 2(b3 + b2 + min{b1 , aj1 , bj2 }); thus, C is settled.
This finishes the discussion on Case 7.
In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component attached to bj1 .
Case 8. If b1 = bj1 and v = aj2 , then dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1.
Case 8.1. If there is a vertex u outside C that is adjacent to a1 , then we add the edge {a1 , u}
to F , add the edge {aj2 , b1 } to C while delete the edge {aj2 , a1 } from C; this way, C is settled.
Case 8.2. Note that if a1 and bj3 (6= b3 ) are adjacent, then a1 and aj3 are adjacent too. By
the claw-free property, we conclude that a1 must be adjacent to a vertex u ∈ {aj3 , b3 , bj2 , b2 }.
Case 8.2.1. When u = aj3 (or u = bj2 ), we add the edges {a1 , u} and {b1 , aj2 } to C while
delete the edges {u, aj2 } and {aj2 , a1 } from C; this way, we obtain a path with two leaves b3 and
b2 , and thus settle C.
Case 8.2.2. Otherwise, aj3 and bj2 are adjacent. When u = b2 (6= bj2 ), we add the edge {a1 , b2 }
to C while delete the edge {aj2 , a1 } from C, to obtain a path with two leaves b3 and b1 ; we may
also add the edges {a1 , b2 } and {aj2 , b1 } to C while delete the edges {aj2 , a1 } and {aj2 , bj2 } from C
to obtain a path with two leaves b3 and bj2 . Between these two paths, the maximum total weight
of the internal vertices is at least a3 + aj2 + bj2 + a1 + b1 − min{b1 , bj2 } ≥ 2(b3 + min{b1 , bj2 }); thus,
Approximating the maximum weight internal spanning tree
21
C is settled. When u = b3 (6= bj3 ), the same argument applies to settle C.
Case 9. If b1 = bj1 and v = bj2 , we add the edge {b1 , bj2 } to C while delete the edge {aj2 , bj2 }
from C; this way, we obtain a path with two leaves b3 and b2 , and thus C is settled.
If b1 = bj1 and v = aj3 , we add the edge {b1 , aj3 } to C while delete the edge {aj3 , aj2 } from C;
this way, we obtain a path with two leaves b3 and b2 , and thus C is settled.
If b1 = bj1 and v = bj3 , then we distinguish whether bj3 = b3 or not. When bj3 6= b3 , then b1
and aj3 must be adjacent in G and thus C can be settled as in the last paragraph. When bj3 = b3 ,
if aj3 is adjacent to one of a1 and bj2 , then we can obtain a path with two leaves b3 and b2 to settle
C; if a1 and bj2 are adjacent and bj2 6= b2 , then we can obtain a path with two leaves being b2 and
the lightest among a3 , aj2 , a1 , and thus the total weight of the internal vertices of this path is at
least a2 + a3 + aj2 + a1 + b1 − min{a3 , aj2 , a1 } ≥ 2(b2 + min{a3 , aj2 , a1 }), which settles C; otherwise
bj2 = b2 , and then we add the edge {a1 , b2 } to C while delete the edge {a2 , a1 } from C to obtain a
cycle, followed by deleting the lightest edge of C ∩ M ∗ = {{a1 , b1 }, {a2 , b2 }, {a3 , b3 }} to settle C.
Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail. Note that the case where b3 6= bj3 and v is in the type-V component
containing b3 can be argued in exactly the same way.
Case 10.1. If v is a head, say aj4 of the edge ej4 , assume that aj4 is adjacent to bj5 besides
bj4 . Exactly the same argument as in Case 7.1 applies to settle C, since it does not matter whether
b1 = bj1 or not.
Case 10.2. If v is a tail, say bj4 of the edge ej4 . Note that bj4 6= bj2 , which has been dealt in
Case 9.
Case 10.2.1. If b2 = bj4 , then besides the leaf b3 , we either do nothing to C to leave b1 , b2 as
leaves, or add the edge {b1 , b2 } to C and delete the edge {aj2 , a1 } to leave a1 as a leaf, or add the
edge {b1 , b2 } to C and delete the edge {aj2 , bj2 } to leave bj2 as a leaf. Among these three trees, the
maximum total weight of the internal vertices is at least a3 + a1 + aj2 + bj2 + b1 + b2 − min{b1 +
b2 , a1 , bj2 } ≥ 2(b3 + min{b1 + b2 , a1 , bj2 }); thus, C is settled.
Case 10.2.2. If b2 6= bj4 , then by the claw-free property and the definition of v we conclude
that b1 is adjacent to aj4 too. Assume that aj4 is adjacent to bj5 besides bj4 . When bj5 6= bj2 ,
the argument in Case 7.1.1 can be applied to settle C; when bj5 = bj2 , if aj3 and bj2 are adjacent,
then we add the edges {aj3 , bj2 } and {b1 , aj4 } to C and delete the edges {aj3 , aj2 } and {bj2 , aj4 } to
achieve a path with leaves b3 and b2 ; if aj3 and a1 are adjacent, then we add the edges {aj3 , a1 },
{b1 , aj4 } and {b1 , bj4 } to C and delete the edges {aj3 , aj2 }, {a1 , b1 } and {aj4 , bj4 } to achieve a path
with leaves b3 and b2 ; if bj2 and a1 are adjacent, then we add the edges {bj2 , a1 }, {b1 , aj4 } and
{b1 , bj4 } to C and delete the edges {aj2 , bj2 }, {a1 , b1 } and {aj4 , bj4 } to achieve a path with leaves
b3 and b2 . Thus, C is settled.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 11 A type-III component in the subgraph H3 can be settled.
Proof. Recall that a type-III component C in its original form contains only one edge ej1 =
{aj1 , bj1 } of M ∗ , with another edge {aj1 , x} where x ∈ X (see Figure 3a); there could be a type-V
component attached to bj1 , with its tail b1 replacing the role of bj1 .
22
Chen et al. /v:May 30, 2017
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles
C, since the total weight of the internal vertices in C is w(C ∩ M ∗ ).
We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to
be adjacent to some vertex inside C. Note that C is a path with b1 and x being its two ending
vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this
distance dC (b1 , v) ≥ 2 and where v locates.
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be a tail of an
edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej2 = {aj2 , bj2 }, that is v = bj2 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex bj2 is adjacent to in the type-V
component as aj3 , besides aj2 . We conclude from the claw-free property that there must be at least
an edge among aj2 , aj3 , b1 , which contradicts the identity of the type-V component. Therefore, it
is impossible to have dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj2 } and {a1 , b1 }. Denote
this neighbor of a1 as u, which is impossible to be inside C by our construction algorithm. Thus,
we add the edge {b1 , bj2 } to C while delete the edge {a1 , bj2 } from C, and add the edge {a1 , u} to
F ; this way, the component becomes a path and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , that is {a1 , b1 },
then exactly the same argument in Case 2.2 settles C.
Case 4. If b1 6= bj1 and v = aj1 , then we leave C as it is if w(b1 ) ≤ w(bj1 ), or we add the edge
{aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. In either case, the total weight of the internal
vertices in the resulting path is at least aj1 + a1 + max{bj1 , b1 } ≥ 3 min{bj1 , b1 }, and thus it settles
C.
Case 5. If b1 6= bj1 and v = x, then we leave C as it is if w(b1 ) ≤ w(aj1 ), or we add the edge
{x, b1 } to C while delete the edge {aj1 , x} from C. In either case, the total weight of the internal
vertices in the resulting path is at least a1 + max{aj1 , b1 } ≥ 2 min{aj1 , b1 }, and thus it settles C.
In summary, Cases 2-5 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1 .
Case 6. If b1 = bj1 , then v = x, and we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, that is, there is a vertex u outside C that is adjacent to a1 . Thus we add the edge
{a1 , u} to F , add the edge {x, b1 } to C while delete the edge {a1 , x} from C; this way, C is settled.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 12 A type-IV component in the subgraph H3 can be settled.
Proof. Denote the two edges of M ∗ in the type-IV component C in its original form as ej1 and
ej2 . Note that both aj1 and aj2 are adjacent to a vertex x ∈ X (see Figure 3b), and there could be
Approximating the maximum weight internal spanning tree
23
a type-V component attached to bj1 and bj2 , respectively, with the tails b1 , b2 replacing the roles of
bj1 , bj2 . We assume w.l.o.g. that w(b1 ) ≥ w(b2 ).
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles
C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 ≥ 3b2 .
We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to
be adjacent to some vertex inside C. Note that C is a path with b1 and b2 being its two ending
vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this
distance dC (b1 , v) ≥ 2 and where v locates.
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be a tail of an
edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej3 = {aj3 , bj3 }, that is v = bj3 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex bj3 is adjacent to in the type-V
component as aj4 , besides aj3 . We conclude from the claw-free property that there must be at least
an edge among aj3 , aj4 , b1 , which contradicts the identity of the type-V component. Therefore, it
is impossible to have dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj3 } and {a1 , b1 }. Denote
this neighbor of a1 as u. If u is inside C, then u = b2 by our construction algorithm and the
claw-free property. We add the edges {a1 , b2 } and {bj3 , b1 } to C while delete the edge {bj3 , a1 }
from C to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since
C ∩ M ∗ has at least three edges. If u is outside C, then we add the edge {b1 , bj3 } to C while delete
the edge {a1 , bj3 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a path
and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , that is {a1 , b1 },
then from the definition of v we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is
at least another edge incident at a1 besides {a1 , bj1 } and {a1 , b1 }. The same argument as in Case
2.2, with j3 replaced by j1 , applies to settle C.
Case 4. If b1 6= bj1 and v = aj1 , then we leave C as it is when w(b1 ) ≤ w(bj1 ), or we add the
edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. In either case, the total weight of the
internal vertices in the resulting path is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }),
and thus it settles C.
Case 5. If b1 6= bj1 and v = x, then by the definition of v and the claw-free property aj1 and b1
are adjacent. We thus settle C as in Case 4. We note that this is simpler than Case 5 in the proof
of Lemma 10 because here aj1 and aj2 cannot be adjacent.
Case 6. If b1 6= bj1 and v = aj2 , then we add the edge {aj2 , b1 } to C while delete the edge {aj2 , x}
from C. This gives a path with leaves b2 and x, and thus it settles C.
If b1 6= bj1 and v = bj2 , then we conclude that aj2 and b1 are adjacent when b2 6= bj2 , and thus
we settle C as in the last paragraph; when b2 = bj2 , we add the edge {b2 , b1 } to C to obtain a cycle,
24
Chen et al. /v:May 30, 2017
followed by deleting the lightest edge of C ∩ M ∗ from C. Since C ∩ M ∗ has at least three edges,
this settles C.
Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail.
Case 7.1. If v is a head, say aj3 of the edge ej3 , and assume that aj3 is adjacent to bj4 besides bj3 ,
then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or otherwise add the edge {aj3 , b1 }
to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. In either way, the total weight of
the internal vertices of the resulting path is at least a2 +aj4 +a1 +max{bj4 , b1 } ≥ 2(b2 +min{bj4 , b1 }).
Therefore, in either case C can be settled.
Case 7.2. If v is a tail, say bj3 of the edge ej3 . If b2 = bj3 , then we add the edge {b1 , b2 } to C
to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ from C. Since C ∩ M ∗ has at
least three edges, this settles C. If b2 6= bj3 , then by the claw-free property and the definition of v
we conclude that b1 is adjacent to aj3 too, and thus the argument in Case 7.1 applies to settle C.
This finishes the discussion on Case 7.
In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1 .
Case 8. If b1 = bj1 and v = x, and we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, that is there is a vertex u adjacent to a1 other than x and b1 .
Case 8.1. If u is inside C, then u = b2 by our construction algorithm and the claw-free property.
2
If b 6= bj2 , then we add the edges {a1 , b2 } and {x, b1 } to C while delete the edge {x, a1 } from C
to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since C ∩ M ∗
has at least three edges. If b2 = bj2 , then we add the edges {a1 , b2 } and {x, b1 } to C while delete
the edges {x, a1 } and {x, a2 } from C to obtain a path with leaves x and a2 when w(a2 ) ≤ w(b1 ),
or otherwise we add the edge {a1 , b2 } to C while delete the edge {x, a1 } from C to obtain a path
with leaves x and b1 . In either way, the total weight of the internal vertices of the resulting path
is at least a1 + max{a2 , b1 } ≥ 2 min{a2 , b1 }. Therefore, C can be settled.
Case 8.2. If u is outside C, then we add the edge {b1 , x} to C while delete the edge {a1 , x}
from C, and add the edge {a1 , u} to F ; this way, the component becomes a path and thus C is
settled.
Case 9. If b1 = bj1 and v = aj2 , then we add the edge {aj2 , b1 } to C while delete the edge {aj2 , x}
from C to obtain a path with leaves x and b2 . Therefore, C can be settled.
If b1 = bj1 and v = bj2 , when b2 6= bj2 then we conclude from the claw-free property and
the definition of v that aj2 and b1 are also adjacent, and thus C can be settled as in the last
paragraph; when b2 = bj2 , we can either do nothing to C to leave b1 and b2 as leaves, or add the
edge {b2 , b1 } to C to obtain a cycle, followed by either deleting the edge {a2 , x} to obtain a path
with leaves a2 and x, or deleting the edge {a1 , x} to obtain a path with leaves a1 and x. This
way, the maximum total weight of the internal vertices among the three resulting paths is at least
a1 + a2 + b1 + b2 − min{a1 , a2 , b1 + b2 } ≥ 2 min{a1 , a2 , b1 + b2 }. Thus, C can be settled.
Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail.
Case 10.1. If v is a head, say aj3 of the edge ej3 , and assume that aj3 is adjacent to bj4 besides
bj3 , then we do nothing to C to leave b1 as a leaf if w(b1 ) ≤ w(bj4 ), or otherwise add the edge {aj3 , b1 }
to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. This way, the total weight of the
Approximating the maximum weight internal spanning tree
25
internal vertices of the resulting path is at least a1 + a2 + aj4 + max{b1 , bj4 } ≥ 2(b2 + min{b1 , bj4 }).
Thus, C can be settled.
Case 10.2. If v is a tail, say bj3 of the edge ej3 . If b2 = bj3 , then we add the edge {b1 , b2 } to C
to make it a cycle followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since there are
at least three edges in C ∩ M ∗ . If b2 6= bj3 , then from the claw-free property and the definition of
v, we conclude that aj3 must be adjacent to b1 too. Therefore, the same as in Case 10.1, C can be
settled.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 13 A type-VI component in the subgraph H3 can be settled.
Proof. Recall that a type-VI component C is a cycle containing two or more edges of M ∗ , where
the head of one edge of M ∗ is adjacent to the tail of another edge of M ∗ (see Figure 4b). Clearly,
if there are three or more edges of M ∗ in C, we simply delete the lightest one to settle C. In the
sequel we deal with the case where C is a length-4 cycle. Denote the two edges of C ∩M ∗ as {a1 , b1 }
and {a2 , b2 }, and assume that w(b1 ) ≥ w(b2 ).
If a1 (a2 , respectively) is adjacent to a vertex v outside C, then we add the edge {a1 , v} ({a2 , v},
respectively) to F and delete the edge {a1 , b2 } ({a2 , b2 }, respectively) from C; this way, the total
weight of the internal vertices is at least a1 + a2 + b1 ≥ 3b2 , and thus C is settled.
If neither a1 nor a2 is adjacent to any vertex v outside C, then we conclude from the construction
algorithm that dG (a1 ) = dG (a2 ) = 2 since a1 and a2 are not adjacent to each other. It follows from
the claw-free property that neither b1 nor b2 can be adjacent to any vertex u outside C. This
implies |V | = 4, a contradiction to our assumption that |V | ≥ 5. The lemma is proved.
✷
Theorem 2 The MwIST problem on claw-free graphs admits a 12/7-approximation algorithm.
Proof. The above Lemmas 9–13 state that every component of the subgraph H3 = G[V, M ∗ ∪
M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ] can be settled, without affecting any other components. Also, such a
settling process for a component takes only linear time, by scanning once the edges in the subgraph
induced on the set of vertices of the component. By settling, essentially the component is converted
into a tree, possibly with one edge of F specified for connecting a leaf of the tree outwards.
In the next step of the algorithm, it iteratively processes the heaviest component C, i.e. with
the largest w(C ∩ M ∗ ). If the component C has been associated with an edge e of F , and using
the edge e to connect a leaf of the resulting tree for C outwards does not create a cycle, then the
algorithm does this and C is processed. This guarantees the total weight of the internal vertices
in V (C) is at least 2w(C ∩ M ∗ )/3. If using the edge e to connect a leaf of the resulting tree for
C outwards would create a cycle, the algorithm processes C by replacing C with another tree that
guarantees the total weight of the internal vertices in V (C) at least 21 w(C ∩ M ∗ ). Notice that
the latter case happens only because of (at least) one edge of F in an earlier iteration where a
distinct component C ′ was processed, which connects a vertex of C ′ into a vertex of C. Therefore,
every such C is associated with a distinct component C ′ processed by the algorithm in an earlier
iteration, and thus w(C ′ ) ≥ w(C). On the other hand, every such component C ′ is associated to
one C only, due to its edge in F connecting a leaf outwards into a vertex of C. It follows that for
this pair of components C and C ′ , the total weight of the internal vertices in V (C) ∪ V (C ′ ) is at
least
w(C)/2 + 2w(C ′ )/3 ≥ 7(w(C) + w(C ′ ))/12.
26
Chen et al. /v:May 30, 2017
After all components of H3 are processed, we obtain a forest for which the total weight of the
internal vertices therein is at least 7w(M ∗ )/12. The algorithm lastly uses any other available edges
of E to interconnect the forest into a final tree, denoted as T ; clearly w(T ) ≥ 7w(M ∗ )/12.
The time for the interconnecting purpose is at most O(m log n). Therefore, by Corollary 1 we
have a 7/12-approximation algorithm for the MwIST problem on claw-free graphs.
✷
4
Concluding remarks
We have presented an improved approximation algorithm for the vertex weighted MIST problem,
denoted MwIST, which achieves the worst-case performance ratio 1/2, beating the previous best
ratio of 1/(3 + ǫ), designed by Knauer and Spoerhase in 2009 [7]. The key ingredient in the design
and analysis of our algorithm is a novel relationship between MwIST and the maximum weight
matching, which we uncovered and it is inspired by the work [12, 11, 2]. A step further, for the
problem restricted to claw-free graphs, we presented a 7/12-approximation algorithm, improving
the previous best ratio of 1/2 designed by Salamon in 2009 for claw-free graphs without leaves.
It would be interesting to see whether this newly uncovered relationship, possibly combined with
other new ideas, can be explored further to design better approximation algorithms for MwIST, or
special cases of MwIST including claw-free graphs and cubic graphs.
Acknowledgement
The authors are grateful to two reviewers for their insightful comments on the COCOON 2017
submission and for their suggested changes that improve the presentation greatly.
ZZC was supported in part by the Grant-in-Aid for Scientific Research of the Ministry of
Education, Culture, Sports, Science and Technology of Japan, under Grant No. 24500023. GL was
supported by the NSERC Canada and the NSFC Grant No. 61672323; most of his work was done
while visiting ZZC at the Tokyo Denki University at Hatoyama. LW was supported by the Hong
Kong GRF Grants CityU 114012 and CityU 123013. YC was supported in part by the NSERC
Canada, the NSFC Grants No. 11401149, 11571252 and 11571087, and the China Scholarship
Council Grant No. 201508330054.
References
[1] D. Binkele-Raible, H. Fernau, S. Gaspers, and M. Liedloff. Exact and parameterized algorithms
for max internal spanning tree. Algorithmica, 65:95–128, 2013.
[2] Z.-Z. Chen, Y. Harada, and L. Wang. An approximation algorithm for maximum internal
spanning tree. CoRR, abs/1608.00196, 2016.
[3] N. Coben, F. V. Fomin, G. Gutin, E. J. Kim, S. Saurabh, and A. Yeo. Algorithm for finding kvertex out-trees and its application to k-internal out-branching problem. Journal of Computer
and Systems Science, 76:650–662, 2010.
[4] F. V. Fomin, S. Gaspers, S. Saurabh, and S. Thomasse. A linear vertex kernel for maximum
internal spanning tree. Journal of Computer and Systems Science, 79:1–6, 2013.
Approximating the maximum weight internal spanning tree
27
[5] F. V. Fomin, D. Lokshtanov, F. Grandoni, and S. Saurabh. Sharp separation and applications
to exact and parameterized algorithms. Algorithmica, 63:692–706, 2012.
[6] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of
NP-completeness. W. H. Freeman and Company, San Francisco, 1979.
[7] M. Knauer and J. Spoerhase. Better approximation algorithms for the maximum internal
spanning tree problem. In Proceedings of WADS 2009, LNCS 5664, pages 489–470, 2009.
[8] W. Li, J. Chen, and J. Wang. Deeper local search for better approximation on maximum
internal spanning tree. In Proceedings of ESA 2014, LNCS 8737, pages 642–653, 2014.
[9] W. Li, J. Wang, J. Chen, and Y. Cao. A 2k-vertex kernel for maximum internal spanning tree.
In Proceedings of WADS 2015, LNCS 9214, pages 495–505, 2015.
[10] X. Li, H. Jiang, and H. Feng. Polynomial time for finding a spanning tree with maximum
number of internal vertices on interval graphs. In Proceedings of FAW 2016, LNCS 9711,
pages 92–101, 2016.
[11] X. Li and D. Zhu. A 4/3-approximation algorithm for the maximum internal spanning tree
problem. CoRR, abs/1409.3700, 2014.
[12] X. Li and D. Zhu. Approximating the maximum internal spanning tree problem via a maximum
path-cycle cover. In Proceedings of ISAAC 2014, LNCS 8889, pages 467–478, 2014.
[13] E. Prieto. Systematic kernelization in FPT algorithm design. PhD thesis, The University of
Newcastle, Australia, 2005.
[14] E. Prieto and C. Sliper. Either/or: Using vertex cover structure in designing fpt-algorithms
– the case of k-internal spanning tree. In Proceedings of WADS 2003, LNCS 2748, pages
474–483, 2003.
[15] E. Prieto and C. Sloper. Reducing to independent set structure – the case of k-internal spanning
tree. Nordic Journal of Computing, 12:308–318, 2005.
[16] G. Salamon. Approximating the maximum internal spanning tree problem. Theoretical Computer Science, 410:5273–5284, 2009.
[17] G. Salamon. Degree-Based Spanning Tree Optimization. PhD thesis, Budapest University of
Technology and Economics, Hungary, 2009.
[18] G. Salamon and G. Wiener. On finding spanning trees with few leaves. Information Processing
Letters, 105:164–169, 2008.
| 8cs.DS
|
arXiv:1610.03376v1 [math.GR] 9 Oct 2016
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
TOMASZ ODRZYGÓŹDŹ
3
Abstract. Our main result is that for densities < 10
a random group in the
square model has the Haagerup property and is residually finite. Moreover, we
generalize the Isoperimetric Inequality, to some class of non-planar diagrams
and, using this, we introduce a system of modified hypergraphs providing the
structure of a space with walls on the Cayley complex of a random group.
Then we show that the natural action of a random group on this space with
walls is proper, which gives the proper action of a random group on a CAT(0)
cube complex.
1. Introduction
In [Odr16] we introduced the square model for random groups, where we draw
at random relations of length four. The motivation was that the Cayley complex of
such a group has a natural structure of a square complex, which should be easier
to analyze than the polygonal Cayley complexes for groups in the Gromov model.
Definition 1.1. [Square model, [Odr16, Definition 1.3]] Consider the set An =
{a1 , . . . , an }, which we will refer to as an alphabet. Let Wn be the set of all
cyclically reduced words of length 4 over An . Note that |Wn | = (2n − 1)4 up
to a multiplicative constant. By Fn we will denote the free group generated by
the elements of An . By relators we will understand words over generators and by
relations the corresponding equalities holding in the group.
For d ∈ (0, 1) let us choose randomly, with uniform distribution, a subset Rn ⊂
Wn such that |Rn | = ⌊(2n − 1)4d ⌋. Quotienting Fn by the normal closure of the set
Rn , we obtain a random group in the square model at density d.
We say that property P occurs in the square model at density d with overwhelming probability (w.o.p.) if the probability that a random group has property P
converges to 1 as n → ∞.
In [Odr16] we showed that a random group in the square model at density d
w.o.p.:
• is trivial for d > 21 ,
• is infinite, hyperbolic, torsion-free of geometric dimension 2 for d < 12 ,
• is free for d < 41
• does not have Property (T) for d < 31
In this paper we prove
3
a random group in the square model w.o.p.
Theorem 1.2. For densities d < 10
acts properly and cocompactly on a CAT(0) cube complex.
3
Corollary 1.3. For densities d < 10
a random groups in the square model w.o.p.
has the Haagerup property and is residually finite.
1
2
TOMASZ ODRZYGÓŹDŹ
Proof. The residual finiteness results from [Ago13, Corollary 1.2] and the Haagerup
Property by a folklore remark (see for example [CMV04]).
To obtain Theorem 1.2 we needed to generalize the isoperimetric inequality
([Oll07, Theorem 2]) to a class of non-planar diagrams (see Theorem 2.5). This
generalization has already proved to be useful in other work on random groups (see
for example [MP15]). Theorem 2.5 is stated in the regime of the square model, but
the reasoning can be easily repeated in the Gromov model (see [Odr14] for some
version of it). The main idea of the proof of Theorem 1.2 is based on introducing
modified hypergraps, which provide a structure of a space with walls on the Cayley
complex of a random group, that has desired metric properties. This modified walls
allowed us to construct a proper action of a random group on a space with walls,
which was impossible to obtain using standard hypergraphs (introduced in [OW11]
for the Gromov model and in [Odr16] for the square model).
Organization. The paper is organized as follows: first we prove a generalization of
the isoperimetric inequality, then using this we introduce “corrected” hypergraphs
that provide the structure of a space with walls on the Cayley complex of a random
group. Finally we show that a random group acts properly on this space with walls.
The idea of correcting hypergraphs was inspired by [MP15].
Acknowledgements. The author would like to thank Piotr Przytycki for many
discussions and Piotr Nowak for general advice on writing.
2. Non-planar isoperimetric inequality
The goal of this section is to generalize the isoperimetric inequality to some class
of non-planar complexes, but having “disc-like” structure, meaning that they are
unions of a large disc component and some bounded non-planar pieces. Firstly, let
us recall the isoperimetric inequality:
Theorem 2.1 ([Oll07, Theorem 2]). For any ε > 0, in the Gromov model at density
d < 21 , with overwhelming probability all reduced van Kampen diagrams associated
to the group presentation satisfy
(2.1)
|∂D| ≥ l(1 − 2d − ε)|D|.
Here ∂D denotes the set of boundary edges of the diagram D and |D| denotes the
number of 2-cells of D.
One of the corollaries of Theorem 2.1 is that in the Gromov density model
at densities < 21 a random group is w.o.p. hyperbolic (see [Oll04, Theorem 1]
and [Gro93]). In [Odr16, Theorem 3.15] the author proved that Equation (2.1) is
satisfied w.o.p. as well for the square model of random groups.
Let us now introduce some definitions.
Definition 2.2. Suppose Y is a finite 2–complex, not necessarily a disc diagram.
˜ |, is
• The generalized boundary length of Y , denoted |∂Y
X
˜ | :=
(2 − deg(e)),
|∂Y
e∈Y (1)
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
• and the cancellation in Y is
Cancel(Y ) :=
X
e∈Y
3
(deg(e) − 1),
(1)
where deg(e) is the number of times that e appears as the image of an edge of the
attaching map of a 2–cell of Y .
˜ | = |∂Y |. Moreover, Cancel(Y ) =
Note, that for every planar diagram Y we have |∂Y
| − |∂Y |).
1
2 (4|Y
Definition 2.3. We say that a finite 2-complex Y is fulfilled by a set of relators
e
R if there is a combinatorial map from Y to the presentation complex X/G
that is
locally injective around edges (but not necessarily around vertices).
e is fulfilled by R.
In particular, any subcomplex of the Cayley complex X
Definition 2.4 (Diagram with K-small legs). Let G = hS|Ri be a finite group
presentation where R consists of cyclically reduced words of length 4 over S. For
K > 0 let Y be a 2–complex that is a union of a reduced Van Kampen diagram Z
and a family Zi of connected complexes, called legs of Y , such that |Zi | ≤ K, for
each i the leg Zi contains an external vertex of Z and that every edge of Y belongs
to maximally two legs. We call such Y a diagram with K-small legs (with respect
to the presentation hS|Ri). The disc diagram Z is called the disc basis of Y .
Until the end of this section G will denote the random group in the square model
e — the Cayley complex of G with respect to this
with the presentation hS|Ri and X
presentation.
Theorem 2.5 (Generalized Isoperimetric Inequality). In the square model at density d ≤ 21 the following statement holds w.o.p.: for each K and ε > 0 there is no
diagram Y with K-small legs fullfilable by R and satisfying:
(2.2)
Cancel(Y ) > 4(d + ε)|Y |,
or equivalently
(2.3)
˜ | > 4(1 − 2d − ε)|Y |.
|∂Y
Our strategy to prove Theorem 2.5 is to first prove a “local” version of it, that is
with the additional limit on the number of 2-cells in a diagram, and then to show
that this locality assmuption can be ommited. Analogous results for the Gromov
model was obtained by the author in [Odr14] and used in [MP15] to construct
balanced walls. We thank Piotr Przytycki for suggesting the statement of Theorem
2.5 involving the notion of cancellation.
2.1. Local version of the generalized isoperimetric inequality.
Lemma 2.6. In the square model at density d ≤ 21 , for each K, ε > 0 w.o.p. there
is no 2-complex Y with |Y | ≤ K fulfilled by R and satisfying
(2.4)
Cancel(Y ) > 4(d + ε)|Y |.
Our proof of Lemma 2.6 will be only a slight modification of Olliver’s proof of
Theorem 2.1. We postpone it to to introduce some necessary tools first.
4
TOMASZ ODRZYGÓŹDŹ
Definition 2.7. Let Y be a 2-complex. Suppose that the following additional
information is given:
(1) Every face of Y is labeled by a number i ∈ {1, 2, . . . , n}. The labels can
repeat and for each number 1 ≤ i ≤ n there is at least one face labeled with
i. We call n the number of distinct relators.
(2) For each face there is a distinguished edge, called the starting edge and an
orientation.
Such Y will be referred to as an abstract 2-complex. We say that Y is fulfilled
by a sequence of relators (r1 , r2 , . . . , rn ) if it is fulfilled by {r1 , r2 , . . . , rn } as 2complex, in such a way that each face f labelled by i ∈ {1, 2, . . . , n} (according
to (1) in Definition 2.7) is sent under the combinatorial map to the face of X/G
corresponding to ri , so that the image in X (1) /G of the attaching path of f , starting
at the oriented starting edge (according to (2) in Definition 2.7) reads off the word
ri . If f is labeled by i we say that f bears the relator i.
Recall that S denotes the cardinality of the generating set of a random group in
the square model. Let m denote the cardinality of the set S.
Proposition 2.8. Let R be a random set of relators at density d and at length
4 on m generators. Let Y be an abstract 2-complex. Then either Cancel(Y ) <
4(d + 2ε)|Y | or the probability that there exists a tuple of relators in R fulfilling Y
is less than (2m − 1)−4ε .
Before we prove this proposition we introduce some additional notation. Let n
be the number of distinct relators in an abstract 2-complex Y . For 1 ≤ i ≤ n let
mi be the number of times relator i appears in Y . Up to reordering the relators we
can suppose that m1 ≥ m2 ≥ · · · ≥ mn .
For 1 ≤ i1 , i2 ≤ n and 1 ≤ k1 , k2 ≤ l we say that (i1 , k1 ) > (i2 , k2 ) if i1 > i2
or i1 = i2 but k1 > k2 (lexicographic order). Suppose that for some s ≥ 2 an
edge e of Y is adjacent to faces f1 , f2 , . . . , fs labeled by i1 , i2 , . . . , is accordingly.
Suppose moreover that for 1 ≤ j ≤ s the edge e is the kj –th edge of the face fj .
Since Y → X/G is locally injective around e, the pairs (ij , kj ) are distinct. Choose
j = jmin for which (ij , kj ) is minimal. We say that edge e belongs to faces fj for
j ∈ {1, 2, . . . s} \ {jmin }.
Let δ(f ) be the number of edges belonging to a face f . For 1 ≤ i ≤ n let
κi = max{δ(f ) : f is a face labeled by relator i}
Note that
(2.5)
Cancel(Y ) =
X
f ∈Y
(2)
δ(f ) ≤
X
mi κ i
1≤i≤n
Definition 2.9. Let Y be an abstract 2-complex with n distinct relators. For
1 ≤ k ≤ n let R′ = (w1 , w2 , . . . , wk ) be a sequence of relators. We say that Y is
partially fulfilled by R′ if the abstract 2-complex Y ′ ⊂ Y that is the closure of the
faces of Y labeled by the numbers i ∈ {1, 2, ..., k} is fulfilled by R′ .
Lemma 2.10. For 1 ≤ i ≤ n let pi be the probability that i randomly chosen words
w1 , w2 , . . . , wi partially fulfill Y and let p0 = 1. Then
pi
≤ (2m − 1)−κi .
(2.6)
pi−1
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
5
Proof. Suppose that first i − 1 words w1 , . . . , wi−1 partially fulfilling Y are given.
We will successively analyze what is the choice for the consecutive letters of the
word wi , so that Y is fulfilled. Let k ≤ 4 and suppose that the first k − 1 letters of
wi are chosen. Let f be the face realizing δ(f ) = κi and let e be the k-th edge of
the face f .
If e belongs to f this means that there is another face f ′ meeting e which bears
relator i′ < i or bears i too, but e appears in f ′ as a k ′ < k-th edge. In both cases
the letter on the edge e is imposed by some letter already chosen so drawing it at
1
up to some small error. In fact, this estimate
random has probability ≤ (2m−1)
would be valid only if the words were only required to be reduced; since they are
cyclically reduced a negligible error appears, which we ignore.
Combining all these observations we get that the probability to choose at random
the correct word wi is at most pi−1 (2m − 1)−κi .
Now we can provide the proof of Proposition 2.8
Proof of Proposition 2.8. For 1 ≤ i ≤ n let Pi be the probability that there exists
an i-tuple of words partially fulfilling Y in the random set of relators R. We trivially
have:
Pi ≤ |R|i pi = (2m − 1)4id pi
(2.7)
Combining equations (2.5) and (2.6) we get
n
X
Cancel(Y ) ≤
mi (log2m−1 pi−1 − log2m−1 pi ) =
i=1
=
n−1
X
(mi+1 − mi ) log2m−1 pi − mn log2m−1 pn + m1 log2m−1 p0 .
i=1
Now p0 = 1 so log2m−1 p0 = 0 and we have
Cancel(Y ) ≤
n−1
X
(mi+1 − mi ) log2m−1 pi − mn log2m−1 pn .
i=1
From (2.7) and the fact that mi+1 − mi ≤ 0 we obtain
Cancel(Y ) ≤
n−1
X
(mi+1 − mi )(log2m−1 Pi − 4id) − mn log2m−1 (Pn − 4nd)
i=1
Observe that
Pn−1
i=1
(mi − mi+1 )i + mn n =
Cancel(Y ) ≤ 4|Y |d +
n−1
X
Pn
i=1
mi = |Y |. Hence
(mi+1 − mi ) log2m−1 Pi − mn log2m−1 Pn
i=1
Setting P = mini Pi and using the fact that mi+1 − mi ≤ 0 we get
Cancel(Y ) ≤ 4|Y |d + (log2m−1 P )
n−1
X
(mi+1 − mi ) − mn log2m−1 P =
i=1
= 4|Y |d − m1 log2m−1 P ≤ |Y |(4d − log2m−1 P ),
6
TOMASZ ODRZYGÓŹDŹ
since m1 ≤ |Y |. It is clear that a complex is fulfillable if it is partially fulfillable for
any i ≤ n and so:
Probability(Y is fullfillable by relators of R) ≤ P ≤ (2m − 1)
4|Y |d−Cancel(Y )
|Y |
which was to be proven.
,
Proof of Lemma 2.6. Denote by C(K, m) the number of abstract square complexes
with at most K 2-cells. Observe that there are finitely many square complexes with
at most K faces. There are also finitely many ways to decide which faces would
bear the same relator, and also finitely many ways to choose the starting point of
each relator. Therefore, the values {C(K, m)}m∈N with fixed K have a uniform
bound M . We know by Proposition 2.8 that for any abstract 2-complex with at
most K faces violating the inequality Cancel(Y ) < 4(d + ε)|Y | the probability that
it is fulfilled by a random set of relators is ≤ (2m − 1)−4ε . So the probability that
there exists a fulfilled 2-complex with at most K faces, violating the inequality is
≤ C(K, m)(2m − 1)−4εl ≤ M (2m − 1)−4εl , so it converges to 0 as m → ∞.
2.2. From the local version to the global. We start this subsection by reformulating [Oll07, Lemma 11] by replacing the length of relator l by 4.
Lemma 2.11. Let G = hS|Ri be a finite presentation in which all elements of R
have length 4. Suppose that for some constant C ′ > 0 every van Kampen diagram
E of this presentation satisfies:
|∂E| ≥ 4C ′ |E|.
Then every van Kampen diagram D can be partitioned into two diagrams D′ , D′′ by
with endpoints on the boundary
cutting it along a path of length at most 4 + 8 log(|D|)
C′
of D such that each of D′ and D′′ contains at least one quarter of the boundary of
D.
We will state now prove two propositions „approximating” Theorem 2.5.
Proposition 2.12. Let G = hS|Ri be a finite presentation such that all elements of
R are reduced words of length 4. Suppose that for some constant C ′ all van Kampen
diagrams D with respect to this presentation satisfy
|∂D| ≥ C ′ 4|D|.
7A
Choose any K, ε > 0. Take A large enough to satisfy εA > 2(1 + C2′ log( 6C
′ ) + 2K).
Suppose that for some C > 0 all diagrams with K–small legs Y having the disc
basis of boundary at most 4A satisfy:
˜ | ≥ C4|Y |.
|∂Y
Then all diagrams with K–small legs Y having the disc basis of boundary at most
14
3 A satisfy:
˜ | ≥ (C − ε)4|Y |
|∂Y
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
7
Proof. Let Y be the diagram with K–small legs such that its disc basis Z has the
boundary length between 4A and 14
3 A. By Lemma 2.11 we can perform a partition
of Z into two reduced disc diagrams Z ′ and Z ′′ such that: |∂Z ′ |, |∂Z ′′ | ≥ 41 |∂Z|
and |∂Z ′ ∩ ∂Z ′′ | ≤ 4 + C8′ log(|Z|). The number of 1–cells that belong both to Z
and one of the legs Zi is bounded by 4K, since there are no more than 4K 1–cells
in Zi . We define Y ′ to be the union of Z ′ and all legs of Y that are adjacent to
Z ′ , and Y ′′ to be the union of Z ′′ and all legs of Y adjacent to it. Hence we can
perform a partition of Y into two diagrams Y ′ and Y ′′ with K–small legs such that
˜ | ≥ |∂Y
˜ ′ | + |∂Y
˜ ′′ | − 2(4 + 8′ log(|Z|) + 8K).
|∂Y
C
Note that |∂Z ′ |, |∂Z ′′ | < 4A so by our assumption we know
˜ ′ | ≥ C4|Y ′ |
|∂Y
˜ ′′ | ≥ C4|Y ′′ |.
|∂Y
Moreover by the assumption on van Kampen diagrams we obtain that
7A
1
C ′ log( 6C ′ ). Hence
1
C′
log(|Z|) <
˜ | ≥ |∂Y
˜ ′ | + |∂Y
˜ ′′ | − 2(4 + 8 log(|Z|) + 8K)
|∂Y
C′
7A
8
≥ C4(|Y ′ | + |Y ′′ |) − 2(4 + ′ log( ′ ) + 8K).
C
6C
7A
We have chosen A large enough so that 2(1 + 2 C1′ log( 6C
′ ) + 2K) < εA so we
can continue estimation
˜ | ≥ Cl|Y | − 4εA ≥ 4(C − ε)|Y |
|∂Y
since 4|Y | ≥ |∂Z| ≥ 4A.
The last approximation to Theorem 2.5 is the following
Proposition 2.13. Let G = hS|Ri be a finite presentation such that all elements of
R are reduced words of length 4. Suppose that for some constant C ′ all van Kampen
diagrams D with respect to the presentation satisfy
(2.8)
|∂D| ≥ C ′ l|D|.
7A
Choose any K, ε > 0. Take A large enough to satisfy εA > 2(1+2 C1′ log( 6C
′ )+2K).
Suppose that for some C > 0 all diagrams Y with K–small legs and the disc basis
with boundary length at most 4A satisfy:
(2.9)
˜ | ≥ 4C|Y |.
|∂Y
Then all diagrams with K–small legs Y satisfy:
˜ | ≥ 4(C − ε)|Y |
|∂Y
Proof. The assumptions of this proposition and Proposition 2.12 are the same.
Hence by the statement of Proposition 2.12 we can conclude that the assumptions
1
of Proposition 2.12 are fulfilled with the new parameters: A1 = 67 A, ε1 = ε( 67 ) 2
and C1 = C − ε instead of A, ε, C and with the same C ′ (these new parameters
1
indeed satisfy ε1 A1 > 2(1 + C2′ log( 7A
6C ′ ) + 2K)). By induction every diagram with
8
TOMASZ ODRZYGÓŹDŹ
K − small legs such that its disc basis has boundary of length at most 4A
satisfies
˜ |≥
|∂Y
C−ε
k−1
X
i=0
and we conclude by the inequality
P∞
i=0
6
7
6
7
2i
2i !
7 k
6
4|Y |
< 14.
Proof of Theorem 2.5. First, by Theorem 2.1 we know that all Van Kampen diagrams satisfy Equation (2.8) for C = (1 − 2d − ε′ ), for arbitrary small ε′ . By
Lemma 2.6 we know that for any K, ε all diagrams with K-small legs satisfy Equation (2.9). Hence the assumptions of the Proposition 2.13 are satisfied, which gives
the statement.
3. Colored hypergraphs
In this section we we will introduce colored hypergraphs, which can be effectively
used in investigating random groups in the square model. We start with
e be the Cayley complex of a random group in the square
Proposition 3.1. Let X
1
model at density d < 3 . Then w.o.p.:
e having three common edges.
(1) There is no pair of 2-cells in X
e such that |∂D ∩ ∂E| = 2, then there is no 2-cell
(2) If D and E are 2-cells in X
e
F in X such that |(∂D ∪ ∂E) ∩ ∂F | > 1.
e having three common edges forms a van Kampen
Proof. (1) A pair of 2-cells in X
diagram D satisfying |∂D| = 2 and |D| = 2. Therefore |∂D| ≤ 43 |D|, so D violates
Theorem 2.5, which implies that w.o.p. there is no such a pair of 2-cells.
(2) Suppose, on the contrary, that there exist such 2-cells D, E and F . Consider
a diagram D consisting of 2-cells D and E. Adding a new 2-cell to D by gluing
it along two edges does not change the generalized boundary length of D. Hence
˜ | = 4, |Y | = 3.
the diagram Y that is a union of D and the 2-cell F satisfies: |∂Y
˜
Therefore, Y violates Theorem 2.5, which states that |∂Y | > 4(1 − 2d)|Y |, so w.o.p.
there is no such a triple of 2-cells.
e be the Cayley complex of a random group in the square
Definition 3.2. Let X
1
e have two common edges, we say they are
model at density ≤ 3 . If two 2-cells in X
strongly adjacent. If a 2-cell D is strongly adjacent to some other 2-cell we say that
D is a distinguished 2-cell. The common edges of two strongly adjacent 2-cells we
call distinguished edges. A 2-cell which is not a distinguished 2-cell we call a regular
2-cell.
Proposition 3.3. Let D and E be strongly adjacent 2-cells. Then there is no
e
element of a random group G sending D to E under the natural action of G on X.
e
In other words, D and E are in different orbits of the action of G on X.
(2n−1)4 −6(2n)2
(2n−1)4d
(2n−1)4
(2n−1)4d
,
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
9
Proof. Suppose that there exists g ∈ G sending D to E. By Lemma 3.1 we know
that a 2-cell can be strongly adjacent to at most one other 2-cell, co g preserves the
pair {D, E}. The diagram Y consisting of 2-cells D and E has exactly one internal
vertex (that is a vertex isolated from the boundary). If the diagram {D, E} is
preserved by g the internal vertex must be also preserved, which contradicts the
fact that the action of G on its Cayley graph is free.
Definition 3.4 (Procedure of painting the Cayley complex). By Proposition 3.1
we know that distinguished 2-cells form a set S of disjoint unordered pairs of 2-cells.
By Proposition 3.3 we know that none of these pairs lies in one orbit of G-action
e We will now perform a procedure of painting distinguished 2-cells in two
on X.
colors: red and blue.
In the first step we consider one of the pairs {D, E} ∈ S and choose arbitrarily
one 2-cell from this pair. Without loss of generality we can suppose that D is
chosen. We say that D is a red 2-cell and E is a blue cell. Moreover we say that
each element in the orbit of D is red and each element in the orbit of E is blue.
In the next step we choose another pair of strongly adjacent 2-cells {D1 , D2 },
that is not in the orbit of the pair {D, E}. Then we paint all elements in the orbit
of D1 in red, and all elements in the orbit of E1 in blue. We repeat this step until
all distinguished 2-cells are painted. The Cayley complex is cofinite, so there are
finitely many orbits of 2-cells and therefore this painting procedure must end after
a finite number of steps. The Cayley complex with painted distinguished 2-cells we
call painted Cayley complex.
From now we will always assume that the Cayley complex of a random group is
e
painted, and we will denote it by X.
We now recall the definition of a hypergraph from [OW11, Definition 2.1].
Definition 3.5 (standard hypergraph). Let X be a connected square complex. We
define a graph Γ as follows: The set of vertices of Γ is the set of 1-cells of X. There
is an edge in Γ between two vertices if there is some 2-cell R of X such that these
vertices correspond to opposite 1-cells in the boundary of R (if there are several
such 2-cells we put as many edges in Γ). The 2-cell R is the 2-cell of X containing
the edge.
There is a natural map ϕ from Γ to X, which sends each vertex of Γ to the
midpoint of the corresponding 1-cell of X and each edge of Γ to a segment joining
two opposite points in the 2-cell R. Note that the images of two edges contained
in the same 2-cell R always intersect, so that in general ϕ is not an embedding.
A standard hypergraph in X is a connected component of Γ. The 1-cells of X
through which a hypergraph passes are dual to it. The hypergraph Λ embeds if ϕ
is an embedding from Λ to X, that is, if no two distinct edges of Λ are mapped to
the same 2-cell of X.
We call the subdiagram of X consisting of all open faces containing edges of the
hypergraph Λ the carrier of Λ and denote it by Car(Λ).
The hypergraph segment in X is a finite path in a hypergraph immersed into X.
The carrier of a segment Λ′ denoted Car(Λ′ ) is the diagram consisting of all open
2-cells containing edges of the segment Λ′ .
By [Odr16, Lemma 5.16] we know that standard hypergraphs are embedded
trees. Moreover, [OW11, Lemma 2.3] states that for each standard hypergraph Γ
e − Γ has exactly two connected components. However the system of
the space X
10
TOMASZ ODRZYGÓŹDŹ
standard hypergraphs is not sufficient to construct a proper action of a random
group on a CAT(0) cube complex, which we need to prove Theorem 1.3. Our
strategy of constructing such an action is based on showing that the wall space
metric on the Cayley complex is equivalent to the edge path metric. This means
in particular that for every number N if we have two enough distant points in the
Cayley complex they are separated by at least N walls, which are hypergraphs in our
case. In Figure 1 we present an example of a geodesic edge-path γ of an arbitary
length such that no standard hypergraph separates its ends x and y. Situation
presented in Figure 1 cannot be excluded for densities ≥ 14 in the square model,
therefore we need a better system of walls, based on more systems of hypergraphs.
x
γ
...
y
Figure 1. Arbitrary long geodesic edge-path joining points x and
y that are not separated by a hypergraph.
We now introduce a new type of hypergraph - red hypegraph, which is modified
on red 2-cells.
Definition 3.6 (red and blue hypergraph). Let X be a connected square complex
e We define a graph Γ as
that is a subcomplex of the painted Cayley complex X.
follows: The set of vertices of Γ is the set of 1-cells of X. We put an edge in Γ
between two vertices if one the following holds:
(1) there is some regular or blue 2-cell R of X such that these vertices correspond to opposite 1-cells in the boundary of R (if there are several such
2-cells we put as many edges in Γ
(2) there is some red 2-cell R of X such that one of this vertices corresponds to
distinguished edge e of R and the second corresponds to non distinguished
edge of R which is not opposite to e.
The 2-cell R is the 2-cell of X containing the edge.
There is a natural map ϕ from Γ to X, which sends each vertex of Γ to the
midpoint of the corresponding 1-cell of X and each edge of Γ to a segment joining
two points in the boundary 2-cell R.
A red hypergraph in X is a connected component of Γ. The 1-cells of X through
which a hypergraph passes are dual to it. The red hypergraph Λ embeds if ϕ is an
embedding from Λ to X.
We call the subdiagram of X consisting of all open 2-cells containing edges of
the red hypergraph Λ the carrier of Λ and denote it by Car(Λ).
The hypergraph segment in X is a finite path in a hypergraph immersed into X.
The carrier of a segment Λ′ denoted Car(Λ′ ) is the diagram consisting of all open
2-cells containing edges of the segment Λ′ .
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
11
If in the above definition we replace every occurrence of the word “red” by the
word “blue” we obtain the definition of the blue hypergraph.
The comparison of the hypergraphs introduced above is presented in Figure 2.
Λst
blue
2-cell
Λst
blue
2-cell
Λred
red 2-cell
Λblue
red 2-cell
a)
b)
Figure 2. a) The comparison of a red hypergraph Λred and a
standard hypergraph Λst , b) The comparison of a blue hypergraph
Λblue and a standard hypergraph Λst .
3.1. Hypergraphs are embedded trees. Now we are going to prove
Theorem 3.7. In the square model at density d <
e are embedded trees.
hypergraphs in X
1
3
w.o.p. all red and blue
To investigate standard and red hypergraphs we need a notion of a collared
diagram. Our definition is a slight modification of the one introduced by Ollivier
and Wise in [OW11, Definition 3.2].
Definition 3.8. (collared diagram) Let D be a Van Kampen with the following
properties:
(1) there is an external 2-cell C called a corner of D
e of a hypergraph (standard, red or blue) of
(2) there is a segment λ → D → X
length at least 2
(3) the first and the last edge of λ lie in C, and no other edge lies in C
(4) λ passes through every other external 2-cell of D exactly once
(5) λ does not pass through any internal 2-cell of D
We call D a collared diagram and λ a collaring segment. We also say that D
is cornerless if the first and the last edge of λ coincide in C (in which case the
hypergraph cycles).
Now we will use the additional color-structure of a Painted Cayley complex to
perform the following procedure of adding horns to a diagram.
e
Definition 3.9 (adding horns procedure). Let D be a van Kampen diagram in X.
Let ∂2 (D) be the set of all 2-cells in D that contain a boundary edge of D. Let
∂2s (D) be the set of all distinguished 2-cells c in 2 − ∂(D) such that a 2-cell c′ , that
is strongly adjacent to c, does not belong to D.
12
TOMASZ ODRZYGÓŹDŹ
We define a diagram with horns D in the following way: for each c ∈ ∂2 (D) we
glue to a diagram D a 2-cell c′ that is strongly adjacent to c (gluing is in a way that
e
these 2-cells are glued in X).
If that will be clear we will call diagrams with horns just diagrams, for shortness.
˜
Lemma 3.10. Let D be a diagram with horns. Then |∂(D)|
(the generalized boundary length) is an even number.
Proof. The statement results from the fact that every 2-cell of D has even number of
edges and every gluing of 2-cells along an edge decreases the generalized boundary
length by 2.
Remark 3.11. A diagram with horns is a union of a disc diagram D and a set
Z of 2-cells, each of them being adjacent to the boundary of D along at least one
vertex and such that no two elements of Z share an edge.
Proof. The only thing that we need to prove is that no two elements of Z share an
edge. This results by Proposition 3.1.
Corollary 3.12 (of Remark 3.11). Collared diagrams with horns w.o.p. satisfy the
assumptions of Theorem 2.5.
The following theorem shows the relation between collared diagrams and hypergraphs
Theorem 3.13 (reformulation of [OW11, Theorem 3.5]). Let Λ be a hypergraph in
e The following conditions are equivalent:
X.
(1) Λ is an embedded tree.
(2) There is no collared diagram collared by a segment of Λ.
There is a definition of a diagram collared by a hypergraph in [OW11, Definition
3.11]. However, in the paper [OW11] this definition was stated for a general l-gon
complex and for the standard hypergraphs that join antipodal midpoints of faces
they are passing through. Definition 4.3 is a modification of [OW11, Definition
3.11]: we use it for l = 4 and for hypergraphs defined in a different way, but the
e is not necessary
fact the hypergraph joins the antipodal midpoints of edges in X
to provide the proof of Theorem 3.13, in fact the proof can be repeated, as well, in
case of colored hypergraphs.
The next theorem is motivated by Theorem 3.13 and shows the relation between
collared diagrams with horns and colored hypergraphs.
e If
Theorem 3.14. Let Λ be a red or blue hypergraph in X.
Λ is not an embedded tree, then there is a collared diagram with horns collared by
a segment of Λ.
Proof. By Theorem 3.13 we know that there exists collared diagram collared by a
segment of Λ. We obtain the statement of Theorem 3.14 by applying the procedure
of adding horns to a diagram described in Definiton 3.9
Proof of Theorem 3.7. Suppose, on the contrary, that there is a red or blue hypergraph that is not an embedded tree. By Theorem 3.14 we know that there is a
˜
collared diagram
with horns E collared by some segment λ. Let n = |∂E|.
For
1
ε < 2 3 − d by Theorem 2.5 we have w.o.p.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
13
˜ ≥ 4|E|(1 − 2d − ε) > 4 |E|
n = |∂E|
3
There are two possibilities: either E is cornerless or not. First consider the
case where E is cornerless. Then every external 2-cell, which is not red or blue has
exactly one external edge. Each pair of strongly adjacent 2-cells gives a contribution
˜ equal 2, independently of the way the blue or red 2-cell is glued to the
to |∂E|
diagram E. Hence |E| ≥ n. By (3.1) we know that with overwhelming probability
all collared cornerless diagrams with horns satisfy:
(3.1)
4
n,
3
which is a contradiction. Therefore, with overwhelming probability there are no
such diagrams.
Let us now consider the case where the diagram E is not cornerless. The only
difference between the previous case is that a corner can have two external edges.
Therefore |E| ≥ n − 1. We have two possibilities |E| ≥ n or |E| = n − 1. If |E| ≥ n
we again obtain (3.2), which is a contradiction. Hence, the only remaining case is
˜ = n and |E| = n − 1. Again we use (3.1) to obtain:
where |∂E|
(3.2)
n>
4
(n − 1).
3
It can be easily seen that for n > 3 this is not possible. So we only have to exclude
˜ = 3. But there are no diagrams with odd generalized
the diagram |E| = 2, |∂E|
boundary length, according to Lemma 3.10.
n>
Lemma 3.15. Suppose that a red hypergraph or a blue hypergraph Λ is an embedded
e Then X
e − Λ consists of two connected components.
tree in X.
Proof. The proof is analogous to the proof of [OW11, Lemma 2.3].
4. Metrically proper action on a space with walls
In this section our goal is to prove the following
3
. Let
Theorem 4.1. Let G be a random group in the square model at density d < 10
e
e
X be the Cayley complex of G. For x, y ∈ X we denote by dwall (x, y) the number
of hypergraphs Λ (standard, red and blue) such that x and y lie in the different
e − Λ. Then w.o.p.
connected components of X
1
d e (1) (x, y)⌋,
15 X
e
denotes the edge metric on the 1-skeleton of X.
dwall (x, y) ≥ ⌊
where dXe (1)
The meaning of the foregoing theorem comes from the following
Proof of Theorem 1.2. By Lemma 3.15 hypergraphs are embeddes trees, and by
Lemma 3.15 and [OW11, Lemma 2.3] they separate the Cayley complex into two
connected components, so they provide a structure of a space with walls on it.
Every discrete group acts properly on its Cayley complex, and by Theorem 4.1 the
wall metric and edge metric on the Cayley complex are equivalent. Therefore a
14
TOMASZ ODRZYGÓŹDŹ
group acts properly on a space with walls. Then by [CN05] there is an action of a
random group on a CAT(0) cube complex.
Before we provide the proof of Theorem 4.1 we need several facts about the
geometry of hypergraphs. For simplicity, until the end of this section we will denote
e the painted Cayley complex of a random group in the square model at density
by X
3
e (1) the 1-skeleton of X
e (i.e. the Cayley graph of a random group).
and by X
d < 10
e let E be a 2-cell having exactly
Lemma 4.2. Let D be a distinguished 2-cell in X,
one common edge with D and let F be a 2-cell different than D and having at least
one common edge with E. Then w.o.p. E and F are regular 2-cells.
Proof. Suppose, on the contrary, that E is a distinguished 2-cell. Then let D′ and
E ′ be the 2-cells strongly adjacent to D and E respectively. By the assumption
we know that D′ 6= E and E ′ 6= D (otherwise D and E would be strongly adjacent). By Proposition 3.1 we know that D′ 6= E ′ . Therefore there are two pairs
of distinguished 2-cells {D, D′ } and {E, E ′ } which have at least one common edge.
Consider the diagram D consisting of 2-cells D, D′ , E, E ′ , glued in the way they
˜ ≤ 6. Note, that every diagram A consiste We will show that |∂D|
are glued in X.
˜ = 4. Gluing two
ing of two strongly adjacent 2-cells satisfies: |A| = 4 and |∂A|
such diagrams, consisting of disjoint sets of 2-cells, along one edge decreases the
˜ ≤ 6. Therefore, the diagram D violates
generalized boundary length by 2, so |∂D|
˜ ≥ |D|4(1 − 2d), so by Theorem 2.5 w.o.p. there is no such a
the inequality |∂D|
diagram D. Therefore E is a regular 2-cell.
Now suppose, on the contrary, that F is a distinguished 2-cell. Let F ′ be the
2-cell strongly adjacent to F . Again by Propistion 3.1, shows that F ′ 6= D, D′ 6= F
and F ′ 6= D′ . Moreover, from the previous part of the proof we know that with
w.o.p. E is a regular 2-cell, so F ′ 6= E. Hence, there is a diagram E, which is a
union of a pair {D, D′ } of strongly adjacent 2-cells, 2-cell E, and a second pair
of strongly adjacent 2-cells {F, F ′ }. Analogously as above, we can prove that E
˜ ≤ 8. Therefore the diagram E violates the inequality
satisfies: |E| = 5 and |∂E|
˜
|∂E| ≥ |E|4(1 − 2d), so by Theorem 2.5 w.o.p. there is no such a diagram E. Hence
F is a regular 2-cell.
Now, we introduce the notion of a diagram collared by hypergraph and path.
Definition 4.3. Let λ be a segment of a hypergraph (red, blue or standard) and
e (1) . Let D be a van Kampen diagram with the following
let γ be an edge-path in X
additional properties:
(1) λ passes only through external 2-cells of D
(2) every external edge of D belongs to the boundary of the carrier of λ or
belongs to γ.
We call D a diagram collared by hypergraph and path. After applying the procedure
of adding horns(see Definition 3.9) to D we obtain a diagram with horns collared
by hypergraph and path. We call λ a collaring hypergraph segment and γ a collaring
edge-path.
There is a definition of a diagram collared by hypergraphs and paths in [OW11,
Definition 3.11]. In the paper [OW11] this definition was stated for a general polygonal complex and for the hypergraphs that join antipodal midpoints of faces they
are passing through. Definition 4.3 is a modification of [OW11, Definition 3.11]: we
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
15
use it for l = 4, one path and one hypergraph segment, and for hypergraphs defined
in a different way, but the fact the hypergraph joins the antipodal midpoints is not
necessary to provide the proofs of upcoming lemmas. The proofs of lemmas from
[OW11] that we will use can be as well repeated for red and blue hypergraphs. The
following lemma is then a slight modification of [OW11, Lemma 3.17].
e and γ be an edge path in X
e (1) . Suppose,
Lemma 4.4. Let Λ be a hypergraph in X
that γ intersects Λ in two consecutive points x, y. Then there is a diagram with
horns collared by Λ and a segment of γ bounded by points x and y (here γ is an
edge path which starts and ends at“midedge vertices” corresponding to vertices of
Λ.
Proof. First we prove that there exists a diagram collared collared by Λ and a
segment of γ bounded by points x and y. The proof of this fact is analogous to
the proof of [OW11, Lemma 3.17]. Then we apply a procedure of adding horns
(Definition 3.9) to that diagram.
e (1) and let Λ be a hypergraph in X.
e
Lemma 4.5. Let γ be a geodesic edge-path in X
Suppose that there is a finite, nonempty geodesic segment γ ′ ⊂ γ, such that the first
and the last vertex of γ ′ lie in Car(Λ) but no other vertices of γ ′ lie in Car(Λ) and
no edge of γ ′ lie in Car(Λ). Then w.o.p. γ ′ has length 2, and there is the following
e
diagram D consisting of three 2-cells immersed in X:
γ′
Λ′
Figure 3. The diagram D.
Moreover, every 2-cell of D is a regular 2-cell.
Definition 4.6. A diagram D having the same shape as the one presented in Figure
4.5 will be called a house diagram. The geodesic segment γ ′ we be called a roof (of
a house diagram).
Proof. Let e0 , e1 be some edges dual to Λ with endpoints in the first and the last
vertex of γ ′ . By Lemma 4.4 we know that there is a diagram D with horns collared
by the edge-path {e0 , γ ′ , e1 } and a segment Λ′ of Λ. Suppose that the length of
this hypergraph segment equals k and the length of γ ′ equals l. Let k ′ denote the
number of horns in D. Note that
˜ ≤ k + k ′ + l + 2.
(4.1)
|∂D|
Note that every edge of γ ′ lies in the boundary of some 2-cell in D that is not in the
carrier of Λ, since otherwise there would be an inner vertex of γ ′ lying in Car(Λ).
Moreover, more than 2 edges of γ ′ cannot lie in the boundary of one 2-cell in D,
16
TOMASZ ODRZYGÓŹDŹ
since otherwise γ ′ would not be a geodesic. Therefore, there are at least
in D not lying in Car(Λ). Hence
l
′
.
(4.2)
|D| ≥ k + k +
2
l
2
2-cells
Moreover, l ≥ 2, because there is at least one vertex of γ ′ not lying in the carrier
of Λ and l ≤ k because γ is a geodesic. By Lemma 3.10 the number k + k ′ + l must
be even. Combining this with Theorem 2.5 gives the following system of conditions,
which is w.o.p. satisfied by k, k ′ and l:
(4.3)
l
8
′
′
k + k + l + 2 > 5 k + k + 2
l ≤ k, l ≥ 2, k ≥ 1 ⇐⇒ 2 ≤ l ≤ k
k + k ′ + l is an even number
Now we will find the possible values of l (see 4.3).
If l is even then we can rewrite the first inequality in (4.3) in form k + k ′ + l + 2 >
8
l
′
′
5 (k + k + 2 ). This is equivalent to 3(k + k ) < 10 + l. Combining this with the
second inequality in (4.3), that is l ≤ k, we obtain k < 5. Therefore l ≤ 4, since l
is even. Hence for even l possible solutions are: l = 4 and l = 2.
If l is odd then the first inequality in (4.3) becomes k +k ′ +l+2 > 85 (k +k ′ + l+1
2 ),
which is equivalent to 3(k + k ′ ) < l + 6. Combining this with l ≤ k we get k < 3.
Therefore l ≤ 1 since l is odd. This contradicts l ≥ 2. Hence, there are no solutions
with odd l.
First, consider the case, where l = 2. Then
8
k + k ′ + 4 > (k + k ′ + 1),
5
′
so k + k < 4. Combining this with the parity of k + k ′ + l we obtain that only
possible solution for l = 2 is k + k ′ = 2. Hence, there are two subcases to consider:
k ′ = 0 and k ′ = 1. If k ′ = 1 then the segment Λ′ consists of a distinguished 2-cell
c, which is strongly adjacent to some 2-cell c′ :
c′
A
c
B
Λ
γ′
D
C
Figure 4. The diagram D with one of possible hypergraphs Λ and
geodesic segments γ ′ .
The geodesic segment γ ′ joins vertices A and C or B and D, since otherwise γ
would not be geodesic. It can be easily seen that the 2-cell c′ also belongs to the
carrier of Λ. Therefore γ ′ cannot run along the boundary path of c′ , since it has at
least one vertex that lies outside the carrier of Λ. Hence, there must be at least one
˜ = 4 and |D| ≥ 3, which contradicts Theorem
more 2-cell in D. This gives us |∂D|
2.5.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
17
The second subcase (of the case l = 2) is k ′ = 0 and k = 2. In that subcase
Car(Λ′ ) consists of two regular 2-cells (see Figure 5 a) ).
γ′
A
B
C
A
B
Λ′
F
E
C
Λ′
D
F
a)
E
D
b)
Figure 5. The diagram D.
Note, that γ ′ can join only vertices A with C or D with F , since in all other
cases γ ′ is either not a geodesic or intersects Λ, according to Lemma 3.15. After
relabelling vertices, we can always obtain a diagram D presented in Figure 5 b), as
desired. Moreover, every 2-cell in D is a regular 2-cell, since D does not have any
horns. There are exactly three 2-cells in D since by 2.5 there are no diagrams with
the boundary equal 6 consisting of more than three 2-cells.
Now, consider the case where l = 4. Then
8
k + k ′ + 6 ≥ (k + k ′ + 2),
5
so k + k ′ ≤ 4. We start with the subcase, where k + k ′ = 4. We know that
˜
|∂D| ≤ k + k ′ + l = 10 and |D| ≥ k + k ′ + 2l = 6. By Theorem 2.5 and the fact
˜ ≤ 10 we obtain that |D| = 6 and |∂D|
˜ = 10. Let C = D ∩ Car(Λ). The
that |∂D|
diagram D − C consists of two 2-cells, call them A and B. Note that all edges of γ ′
belong to A ∪ B. Therefore 2-cells A and B have no common edges, since otherwise
there will be no two points in A ∪ B within distance 4. This means, that there are
three vertices of γ ′ belonging to C. This contradicts our assumption on γ ′ so there
is no diagram with k + k ′ = 4 satisfying the assumptions of the Lemma 4.5.
Now consider the case, where k + k ′ = 2 and l = 4. If k + k ′ = 2 then the carrier
of Λ′ consists of maximally two 2-cells, so every pair of vertices in this carrier lies
in the distance dXe (1) equal at most 3. Therefore γ ′ cannot join any vertices of the
carrier of Λ′ . Hence, there is no diagram D with k + k ′ = 2 and l = 4.
There are no other possibilities, because of the parity of k + k ′ + l.
Definition 4.7. Let λ be a segment of a hypergraph. A diagram consisting of
two strongly adjacent 2-cells, such that λ passes through this pair will be called a
divided tile (of λ) we. A 2-cell in the carrier of λ that is not a regular 2-cell but
is not an element of a divided tile of λ will be called an isolated 2-cell. A tile is a
divided tile or a regular 2-cell.
Lemma 4.8 (hypergraphs do not osculate). Let Λ′ be a hypergraph segment in
e (1) . Suppose that one of the following conditions is satisfied
X
18
TOMASZ ODRZYGÓŹDŹ
a) Λ′ is a segment of a red hypergraph and there are no isolated red 2-cells of Λ′ ,
b) Λ′ is a segment of a blue hypergraph and there are no isolated blue 2-cells of Λ′ ,
c) Λ′ is a segment of a standard hypergraph and there is no divided tile of Λ′ .
Then w.o.p. holds
(1) For every vertex v of Car(Λ′ ) there is only one edge in Car(Λ′ ) ending in
v, dual to Λ′ that is not an internal edge of a divided tile (the situation
presented in Figure 6 a) does not occur). In other words: if there is a
vertex in Car(Λ′ ) being the endpoint of two edges dual to Λ′ then one of
these edges must be an internal edge of a divided tile.
e (1) such that its vertices lie in Car(Λ′ ) but e does
(2) There is no edge e in X
′
not lie in Car(Λ ), see Figure 6 b).
c1 v
c2
e
a)
b)
Figure 6. Two types of hypergraphs osculations.
Proof. (1) Suppose, on the contrary, that such a point v exists. Then let e1 , e2 be
the two edges, ending in v that are dual to the hypergraph segment Λ′ and that are
none of them is an internal edge of a divided tile. Let D be a diagram collared by
˜ ≤ |D| + 2. Therefore, by
Λ′ and an edge-path {e1 , e2 }. Such diagram satisfies |∂D|
˜
Theorem 2.5 we obtain |D| ≤ 3. Hence |∂D| ≤ 5, and combining this with Lemma
˜ ≤ 4. This by Theorem 2.5 gives us that that |D| ≤ 2. A
3.10 we get that |∂D|
diagram consisting of two 2-cells and having the generalized boundary length at
most 4 must be a pair of strongly adjacent 2-cells. This ends the proof in the case
c). If Λ′ is red or blue hypergraph we need to provide further argument. Note,
that both red and blue hypergraph join the antipodal midpoints of bundary edges
of every tile. Hence, there are no two edges that are dual do Λ′ , have common end
and non of them is an internal edge of a divided tile. This ends the proof in cases
a) and b).
Therefore there is a blue 2-cell and a red 2-cell in the carrier of Λ′ , which contradicts assumptions a), b) and c).
(2) Let v1 and v2 be the ends of the edge e. For i = 1, 2 let ei be the edge
dual to Λ′ ending in vi that is not an internal edge of a divided tile. Let E be a
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
19
diagram with horns collared by Λ′ and the edge-path {e1 , e, e2 }. As previously, E
satisfies |∂E| ≤ |E| + 2. Therefore by 2.5 |E| ≤ 3, so |∂E| ≤ 5. By Lemma 3.10 we
obtain that in fact |∂E| ≤ 4, which, by previous observation, means that |E| ≤ 2.
A diagram with two 2-cells and the boundary length equal 4 must be a pair of
strongly adjacent 2-cells. In a diagram which is a pair of strongly adjacent 2-cells
there is no edge which does not lie in Car(Λ) but its endpoints do. This end the
proof in cases a), b) and c).
e (1)
Lemma 4.9. Let Λ1 be a hypergraph segment and γ be a geodesic segment in X
that intersects Λ1 in two points, which are the endpoints of γ. Let Λ2 6= Λ1 be a
e intersecting γ in point x.
hypergraph in X
(1) Λ1 and Λ2 pass through a common 2-cell cx , that is Car(Λ1 )∩Car(Λ2 ) ⊇ cx .
(2) If moreover Λ2 intersects γ in two different points x and y that do not lie
in the boundary of the same 2-cell of Car(Λ1 ) then there are two different
2-cells in Car(Λ1 ) ∩ Car(Λ2 ).
Proof. Part (1) Let e be an edge of γ dual to Λ2 . There are two possibilities
• The edge e lies in the boundary of a 2-cell c ∈ Car(Λ1 ). In that case Λ2 is
dual to the boundary edge of c, so cx := c belongs to Car(Λ2 ). See Figure
7 a).
• The edge e does not lie in the boundary edge of a 2-cell c ∈ Car(Λ1 ). Since
γ is a geodesic edge-path, by Lemma 4.5 combined with Lemma 4.8 we
know that e lies in the boundary of a house diagram presented in Figure 7
b). It is clear from the Figure 7 b) that cx ∈ Car(Λ1 ) ∩ Car(Λ2 ).
Part (2). If x and y lie in the boundaries of distinct 2-cells cx and cy belonging
to Car(Λ) then it is clear that cx and cy both lie in Car(Λ1 ) ∩ Car(Λ2 ) (see Figure
7.
Consider the case where x lies in the boundary of a 2-cell c1 in Car(Λ1 ) and
y do not. Considering a hypergraph Λ1 dual to γ passing through y we will find
(as in part (1) ) a regular 2-cell c2 that lies in Car(Λ1 ) ∩ Car(Λ2 ) and that there
is no edge of γ in the boundary of c2 . Hence c2 6= c1 and c1 and c2 both lie in
Car(Λ1 ) ∩ Car(Λ2 ).
The last case to consider is when neither x nor y lie in the boundary of Car(Λ1 ).
First, note that x and y cannot lie in the roof of the same house diagram since
then there would be a self intersection of Λ2 (see Figure 7 b) ) which contardicts
Theorem 3.7. Hence, x and y lie in the roofs of different house diagrams, which
means that one 2-cell from each of those diagrams belongs to Car(Λ1 ) ∩ Car(Λ2 ).
This means that there are at least two different 2-cells in Car(Λ1 ) ∩ Car(Λ2 ).
e Let γ be a geodesic edge-path in the
Lemma 4.10. Let Λ be a hypergraph in X.
e Suppose that γ intersects Λ in two consecutive points x and y. Let
1-skeleton of X.
Λxy be the segment of Λ joining x and y. Then:
(1) if Λ is a red hypergraph, there is an isolated red 2-cell c of Λxy ,
(2) if Λ is a blue hypergraph, there is an isolated blue 2-cell c of Λxy ,
(3) if Λ is a standard hypergraph, there is a divided tile of Λxy , such that the
none of its internal edges belong to γ.
Proof. The proof relies on the idea, that if a geodesic crosses a hypergraph two
times it must be worthwile in terms of distance. If the hypergraph does not “turn”
20
TOMASZ ODRZYGÓŹDŹ
cx
cx
Λ1
γ
e
Λ2
γ
Λ1
x
y
x
e
a)
b)
Figure 7. Intersections of hypergraphs Λ1 and Λ2 .
there is no reason for a geodesic to cross it two times. A colored hypergraph can
“turn” only if there is an isolated 2-cell of the segment of hypergraph and a standard
hypergraph “effectively turns” when meeting a pair of strongly adjacent 2-cells. Let
now state a precise argument.
First, consider the case where Λ is a red hypergraph. Suppose, on the contrary,
that there is no isolated red 2-cell of Λxy . The the carrier of Λxy consists only
of tiles (regular 2-cells or divided tiles) and every edge of Λxy joins an antipodal
midpoints of boundary edges of every tile in Car(Λ′ ) i.e. the carrier of Λ′ has the
shape illustrated in Figure 8.
γ
x′
x
x′′
Λ′
...
y′
y
y ′′
k
Figure 8. The diagram collared by Λxy and γ.
e containing x, and suppose that
Let x′ and x′′ be the two ends of the edge of X
′
′′
e
x lies on γ between x and y. Let y and y be the two ends of the edge of X
′
′
containing y, and suppose that y lies on γ between x and y. Let γ0 be the subpath
of γ joining x′ and y ′ (see Figure 8). Let V be the set of vertices of γ ′ . Define
′
V ′ = {v ∈ V |there is at least one edge of γ ′ ending in v and not belonging to Car(Λ′ )}.
For each pair s, t of two consecutive vertices in V ′ consider the subsegment of
′
′
γ joining s and t and denote it by γst
. By Lemma 4.8 part (2) we obtain that γst
either
(1) lies in the boundary of the carrier of Λ, or
(2) has a length at least 2.
′
In the latter case, we know that γst
is a roof of a house diagram. Therefore
′
without change of the total length of γ ′ we can replace γst
with an edge-path of
length 2, that lies in the boundary of Car(Λxy ) and does not cross Λxy .
Hence, we can modify γ ′ to a path having the same length such that all its edges
lie in the boundary of Car(Λxy ). From now γ ′ denotes modified path. For every
′
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
21
vertex v of γ ′ denote by ev the edge dual to Λ′ ending in v that is not an internal
edge of a divided tile (this definition is unambiguous according to Lemma 4.8 part
(1) ). We will prove now that the length d of γ ′ equals the number k of tiles of
Λxy . Every edge of γ ′ lies in the boundary of exactly one tile so k ≥ d. Suppose,
on the contrary, that k > d. This means that there must be a vertex of γ ′ that is
a common vertex of more than two tiles. But in that case there are at least two
edges dual to Λxy that are not internal edges of a divided tile. This contradicts
e joining x′′
Lemma 4.8 part 1). Hence k = d. Consider now the edge-path γ ′′ in X
′′
and y and goes along the boundary of Car(Λxy ). The length of this edge-path is
not greater then k since every tile of Λxy shares at most one boundary edge with
γ ′′ . Hence there exists an edge-path joining x′′ and y ′′ of length k. Note that the
segment of γ joining x′′ and y ′′ has length k + 2. This contradicts the fact that γ
is a geodesic.
If Λ′ is a blue hypergraph the proof is analogous.
Consider now the case, where Λ is a standard hypergraph. In that case we can
provide an analogous argument to prove that there must be a divided tile of Λxy .
We only need to prove that none of the internal edges of a divided tile belong to γ.
Suppose, on the contrary, that this is the case.
By Lemma 4.4 there exists a planar diagram D collared by Λxy and γ. By
definiton of a diagram collared by a hypergraph and path γ cannot contain any
internal edge of D which ends the proof.
The definition of a 2-collared diagram in case of standard hypergraphs can be
found in [OW11, Subsection 3.3]. In a nutshell this is a diagram collared by two
hypergraphs (see Definition [OW11, Lemma 3.17]). Let us state this definition for
a case of general hypergraphs.
Definition 4.11 (2-collared diagram). Let λ1 and λ2 be two hypergraph segments.
Let D be a van Kampen diagram with the following additional properties:
(1)
(2)
(3)
(4)
There are two external 2-cells of D called corners
λ1 and λ2 pass only through external 2-cells of D
every external edge of D belongs to Car(λ1 ) ∪ Car(λ2 )
corners are the only 2-cells of D containing the edges of both hypergraph
segments λ1 and λ2 .
We call D 2-collared diagram (collared by λ1 and λ2 ).
Lemma 4.12 (reformulation of [OW11, Theorem 3.12]). Suppose, Λ1 and Λ2 are
e and that they intersect at least
distinct hypergraphs that are embedded trees in X,
twice. Let c be a common 2-cell of Car(Λ1 ) and Car(Λ2 ) Then there exists a 2collared diagram collared by segments Λ1 and Λ2 . Moreover we can choose c to be
one of its corners.
There is a definition of a 2-collared diagram in the beginning of [OW11, Section
3.11]. However this is the special case of the general definition of a diagram collared
by hypergraphs and paths that was stated for a general polygonal complex and for
the standard hypergraphs. Definition 4.11 is a modification of it: we use it for l = 4
and for general hypergraphs, but the fact that the hypergraph joins the antipodal
e is not necessary to provide the proof of Lemma 4.12, in
midpoints of edges in X
fact the proof can be provided, as well, in the case of colored hypergraphs.
22
TOMASZ ODRZYGÓŹDŹ
Figure 9. 2-collared diagram. Collaring segments are indicated
with thick lines.
e is a pair of strongly adjacent
Lemma 4.13. W.o.p. every 2-collared diagram in X
2-cells.
Proof. Let D be a 2-collared diagram (with horns) collared by hypergraphs Λ1 and
Λ2 . Let k1 be the length of the collaring segment of Λ1 and k2 be the length of
the collaring segment of Λ2 . Let h denote the number of horns in D. Each pair
of strongly adjacent 2-cells gives a contribution to the generalized boundary length
˜ ≤ k1 + k2 + h. There are two 2-cells in Car(Λ1 ) ∩ Car(Λ2 ), so
equal 2, hence |∂D|
3
|D| ≥ k1 + k2 + h − 2. Hence, by Theorem 2.5 for the density d < 10
we obtain
that w.o.p.:
˜ > 8 |D| > 8 (k1 + k2 + h − 2).
k1 + k2 + h ≥ |∂D|
5
5
˜ is even. Therefore
Hence k1 + k2 + h ≤ 5. By Lemma 3.10 we know that |∂D|
˜
|∂D| ≤ 4 and by (4.4) we obtain |D| ≤ 2. Hence, D must be a diagram consisting
of two strongly adjacent 2-cells.
(4.4)
Lemma 4.14. The following statement holds w.o.p.: Let Λ1 and Λ2 be two hypere Suppose that Λ1 and Λ2 intersect transversally in a 2-cell c, meaning
graphs in X.
that Car(Λ1 ) ∩ Car(Λ2 ) contains a regular 2-cell c and that Λ1 ∩ c 6= Λ2 ∩ c. Then Λ
and Λ′ intersect only once. Moreover c is the only one 2-cell in Car(Λ1 ) ∩ Car(Λ2 ).
Proof. Suppose, on the contrary, that there is another point of intersection. Then
by Lemma 4.12 there is a 2-collared diagram with horns D collared by Λ1 and Λ2
and containing c. By Lemma 4.13 we know that every 2-cell of D is distinguished,
so this is a contradiction with the assumption that c is regular.
Now suppose, on the contrary, that there is a 2-cell d ∈ Car(Λ1 ) ∩ Car(Λ2 ) such
that d 6= c. We know that there is only one point of intersection of Λ1 and Λ2 , so
the only possibility is that d is a distinguished 2-cell of some color, and Λ1 and Λ2
are both hypergraphs of this color (see Figure 10).
But then Λ1 and Λ2 intersect in the middle of the 2-cell strongly adjacent to d,
so there are two points of intersection of Λ1 and Λ2 , which is a contradiction.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
Λ1
23
c
Λ2
d
Figure 10. Two 2-cells in Car(Λ1 ) ∩ Car(Λ2 ).
e (1) . Let e be an edge in γ, and
Lemma 4.15. Let γ be a geodesic edge-path in X
denote by s its midpoint. Then either:
(a) There is a hypergraph intersecting γ only in the point s.
(b) There is a hypergraph Λ such that its segment Λsx starting in s intersects γ
in two consecutive points: s and x such that there are at least two not sharing
an edge distinguished 2-cells in Λsx and Λ does not intersect γ anywhere else
between points s and x.
Proof. If one of the hypergraphs (red, blue or standard) dual to the edge e intersects γ only once, the statement is satisfied. Hence, consider the case where all
hypergraphs dual to the edge e intersect γ at least twice. Denote by x, y and z the
e (1) ), in which three hypergraphs
nearest points to s (in the edge-path metric in X
x
y
z
Λ , Λ and Λ dual to the edge e intersect γ. A priori, it may happen that some of
these points are equal. Without loss of generality, we can assume that x and y lie
in the same connected component of γ − s and that x is at least as far from s as y.
Now, we will prove that y 6= x. Suppose, on the contrary, that x = y. This
means that every time segments Λsx and Λsy split, they also rejoin at some point,
since they end in the same point. Every situation where Λsx and Λsy split an rejoin
gives us a 2-collared diagram collared by a subsegments of Λsx and Λsy . By Lemma
4.14 every 2-collared diagram is a pair of strongly adjacent 2-cells. This means that
if Λsx and Λsy split they rejoin in the next 2-cell of the common carrier, see Figure
11. This means that Car(Λsx ) = Car(Λsy ) and that distinguished 2-cells Car(Λsx )
occur only in strongly adjacent pairs.
blue
2-cell
red 2-cell
Λred
Λblue
Figure 11. The only possible way of splitting and rejoining of Λx
and Λy .
One of the hypergraphs Λx and Λy is red or blue, so by Lemma 4.10 in the carrier
of Λsx exists an isolated distinguished 2-cell, so this is a contradiction. Therefore
y 6= x.
24
TOMASZ ODRZYGÓŹDŹ
Therefore, y lies on a geodesic edge-path that intersects Λsx twice. Hence, by
Lemma 4.5 we know that y lies in the boundary of the carrier of Λsx (see Figure
12 a) or y lies the boundary of the house diagram F presented in Figure 12 b).
c
c1
Λy
c2
Λx
γsx
Λx
y
γsx
y
F
a)
b)
Figure 12. Two possible locations of y.
The hypergraphs Λx and Λy cannot intersect transversely in a regular 2-cell c1 ,
since otherwise by Lemma 4.14 they would intersect only once in the middle of
c1 , and we know that they intersect also in s. Hence y lies in the boundary of a
distinguished 2-cell cy ∈ Car(Λsx ). Therefore the carriers of the segments Λsx and
Λsy share a common distinguished 2-cell cy .
Without loss of generality, we can suppose that cy is red (if it is blue the argument
is analogous).
If Λx or Λy is blue then, according to Lemma 4.10, its carrier contains an isolated
blue 2-cell cb , so cb does not share an edge with cy . In that case the carrier of Λx
or Λy contains a red 2-cell cy and some non-adjacent by an edge to it blue 2-cell cb ,
so we are done.
The only cases left to consider are:
(1) Λy is a red hypergraph and Λx is a standard hypergraph
(2) Λx is a red hypergraph and Λy is a standard hypergraph.
First consider the situation 1). If there are at least two red 2-cells in the carrier
of Λsx , we are done. Hence, we can suppose that cy is the only isolated red 2-cell
in the carrier of Λsx . In that case Car(Λsx ) has the shape presented in Figure 13.
We know that y lies in the boundary of cy and y does not belong to Λsx . Hence
y = y1 or y = y2 . Recall that points s, x and y lie on γ. If y = y2 then there is
a segment of standard hypergraph bounded by s and y intersecting γ twice at its
ends, such that there is only one distinguished 2-cell in its carrier. This contradicts
Lemma 4.10 (3). If y = y2 we obtain analogous contradiction. Hence there must
be at least one more isolated red 2-cell in the carrier of Λsx , so we are done, since
two red 2-cells cannot share an edge.
Now consider situation 2), that is Λx is a standard hypergraph and there is only
one divided tile of Λsx and y belongs to this divided tile. In that case Car(Λsx ) has
the shape presented in Figure 14. We know that y lies in the boundary of cy but
y does not belong to Λsx . Moreover by 4.10 part (3) we know that y does not lie
on an internal edge of a divided tile. Hence y = y3 or y = y4 . If y = y3 then there
is a segment of a red hypegraph bounded by x and y intersecting γ twice with no
isolated red 2-cell in its carrier. This contradicts Lemma 4.10 part (1). If y = y4
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
25
y1
s
Λsx
...
y2
x
Figure 13. The carrier of Λsx in case where Λx is red.
y3
s
Λsx
...
y4
x
Figure 14. The carrier of Λsx in case where Λx is standard hypergraph.
we obtain the contradiction analogously. Hence, there must be at least two not
sharing an edge 2-cells in the carrier of Λsx .
e of length at
Theorem 4.16. Let γ be a geodesic edge-path in the 1-skeleton of X
least 21. Let E := {e−7 , e−6 , . . . , e0 , . . . , e7 } be the set of 15 consecutive edges of
e intersecting γ exactly once and such that this
γ. Then there is a hypergraph in X
intersection is the midpoint of one of the edges in E.
Proof. Denote the midpoint of the edge e0 by s. If one of the hypergraphs dual to
the edge e0 intersects γ only once, we are done. If not, by Lemma 4.10 we know
that there exists a hypergraph Λ, such that its segment Λsx intersects γ in two
consecutive points of γ: s and x and that the segment Λsx contains at least two
not sharing an edge distinguished 2-cells: ⌈1 and ⌈2 . We will consider two cases:
(1) There are at least seven 2-cells in Car(Λsx )
(2) There are at most six 2-cells in Car(Λsx ).
We will use slightly different methods to deal with each of these two cases.
4.1. Case 1: There are at least seven 2-cells in Car(Λsx ). Let c1 , c2 , c3 be
the 3-th, 4-th and 5-th 2-cells in Λsx respectively counted from s. According to
Lemma 4.2 at least one of them must be a regular 2-cell, call it c. Denote by Λc
26
TOMASZ ODRZYGÓŹDŹ
the standard hypergraph passing through 2-cell c and dual to Λ. By Lemma 4.14
Λc and Λ intersect only once. We will prove two assertions:
(a) Λc intersects some edge in E.
(b) Λc intersects γ exactly once.
We start with the proof of assertion (a). Let us resolve where is the point of
intersection of γ and Λc . If there is an edge ec of γ lying in the boundary of c then
Λc and γ intersect in the midpoint of ec . In this case denote by xc the midpoint of
e (1) that goes along the
ec , see Figure 15 a). In that case there is an edge-path in X
boundary of Car(Λ) of length at most 6, because there are at most five 2-cells in
Car(Λsx ) between s and c. Hence dγ (s, xc ) ≤ 6.
If there is no edge of γ lying in the boundary of c then, by Lemma 4.5 we know
that the 2-cell c lies in the house diagram presented in Figure 15 b) so Λc intersects
the edge ec from Figure 15 b). In that case we denote by the xc the midpoint of
e (1) that goes along the boundary of
ec . In this situation, there is an edge-path in X
Car(Λ) and a boundary of a house diagram containing c of length at most 7, because
there are at most five 2-cells in Car(Λsx ) between s and c. Hence dγ (s, xc ) ≤ 7.
This ends the proof of assertion (a).
c
c
Λc
Λc
Λ
γ
Λ
ec xc
γ
xc
ec
a)
b)
Figure 15. Two possible ways of intersection of Λc and γ
Now we will prove assertion (b). By Lemma 3.15 there are exactly two cone − Λ. Hence, we can split Λc into two parts:
nected components of X
e − Λ containing
• Λ+ which is the intersection of Λc with the component of X
xc
e − Λ not con• Λ− which is the intersection of Λc with the component of X
taining xc .
We will show that Λ− does not intersect γ and that Λ+ intersects γ only once
(in the point xc ).
Firstly, consider Λ+ . Suppose, on the contrary, that Λ+ intersects γ in some
point yc 6= xc . Suppose that yc is the nearest among what point to xc in the metric
dγ . Points xc and yc cannot both lie in the boundary of c since there is at most
one common edge of c and γ.
We will consider three cases:
(1) yc belongs to the segment γsx of γ bounded by s and x, , see Figure 16 (1)
(2) yc does not belong to γsx and points xc and yc lie in the different connected
e − Λ, , see Figure 16 (2)
components of X
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
27
(3) yc does not belong to γsx and points xc and yc lie in the same connected
e − Λ. , see Figure 16 (3)
component of X
Λ−
Λ
(1)
γ
s
c
yc
xc
x
Λ+
Λ−
Λ
(2)
γ
c
s
xc
x
yc
Λ+
Λ−
Λ
(3)
γ
s
c
z2
xc
z1
yc
Λ+
Figure 16. Intersections of Λ+ and γ.
1)If yc belongs to the segment γsx of γ bounded by s and x. Then by Lemma
4.9 applied to Λ1 = Λ and Λ2 = Λc we obtain that there are two common 2-cells of
the carriers of Λ and Λc , which is a contradiction with Lemma 4.14.
e − Λ then
2) If points xc and yc lie in the different connected components of X
there is an intersection of Λ+ which contradicts the fact that Λ and Λc intersect
only once ( Lemma 4.14).
e − Λ then Λ
3) If points xc and yc lie in the same connected component of X
intersects γsx at least twice in some points z1 , z2 .
If this two points do not lie in the boundary of the same 2-cell c′ in Car(Λc ) then
′
c 6= c. By Lemma 4.9 applied for Λ1 = Λc and Λ2 = Λ we obtain that there are
two different 2-cells in Car(Λ) ∩ Car(Λc ), which contradicts Lemma 4.14. If z1 and
z2 lie in the boundary of the same 2-cell c′ in Car(Λc ) then we know, that c′ 6= c,
since c shares at most one edge with γ. Hence, c′ , c ∈ Car(Λc ) ∩ Car(Λ), which
again contardicts 4.14. Hence, we proved that Λ+ does not intersect γ.
Let us now consider Λ− . Suppose, on the contrary, that Λ− intersects γ. Let tc
be the point of the intersection of Λ− and γ, which is the nearest to the point xc
28
TOMASZ ODRZYGÓŹDŹ
in the edge-path metric on Λ− (see Figure 17). Note, that tc lies in the connected
e − Λ not containing xc , since otherwise there will be a second
component of X
intersection of Λ and Λc which is not allowed, according to Lemma 4.14.
Λ−
Λ
γ
tc
c
s
xc
x
Λ+
Figure 17. Intersection of Λ− and γ
Let Λ′− be the hypergraph segment of Λc bounded by the points xc and tc . One
of the points {x, s} lies on γ between points xc and tc . Suppose first that this point
is s.
Since s lies on the geodesic segment, that intersects Λc twice, by Lemma 4.5 we
have two possibilities: s lies on the boundary of the 2-cell c (see Figure 18 a) ) or
s lies in the diagram presented in Figure 18 b).
c
c
Λ
Λ
Λc
γ
Λc
x
γ
a)
x
b)
Figure 18. Two possible locations of x
Note, that in both cases the segment of Λ joining the point s and the 2-cell
c consists of at most one 2-cell, which, if occurs, is a regular 2-cell. Remember
that between s and x in Car(Λ) was at least seven 2-cells and c is 3-rd, 4-th or
5-th of them. Hence there must be a least two 2-cells between c and s. This is a
contradiction, so Λ− does not intersect γ.
If x lies on γ between xc and tc the reasoning is analogous. This ends the proof
in Case 1.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
29
4.2. Case 2: There are at most six 2-cells in Car(Λsx ). Now let us consider
the case, where there are at most six 2-cells in the carrier of Λsx . Let c be any
regular 2-cell in the carrier of Λsx that lies between ⌈1 and ⌈2 (recall that ⌈1 and
⌈2 were two not sharing an edge distinguished 2-cells in the segment Λsx ). Again,
we denote by Λc the hypergraph passing through c and dual to Λsx . Analogously
we state two assertions:
(a) Λc intersects some edge of the set E.
(b) Λc intersects γ exactly once.
To prove assertions (a) and (b) we first define the point xc as in Case 1.
Proof of assertion (a) is analogous as in Case 1.
Now, consider assertion (b). Again, we split Λc into two connected components:
e − Λ containing
• Λ+ which is the intersection of Λc with the component of X
xc
e − Λ not con• Λ− which is the intersection of Λc with the component of X
taining xc .
To prove that Λ+ intersects γ only once we can repeat the argument from Case
1.
Consider now Λ− . Suppose, on the contrary that Λ− intersects γ in a point
e − Λ not containing xc , so
tc . Note that tc lies in the connected component of X
the geodesic segment of γ bounded by xc and tc contains x or s. Without loss of
generality we can assume that this geodesic segment contains x.
Let Λ′− be the hypergraph segment of Λc bounded by the points xc and tc . The
same reasoning, as in previous case, shows that there is at most one 2-cell in Car(Λ)
between c and x, which, if occurs, is a regular 2-cell. This is a contraction since c
lies in Car(Λ) between two distinguished 2-cells, so there must be a distinguished
2-cell in Car(Λ) between c and x.
Thorem 4.1 is an immediate consequence of Theorem 4.16.
References
[Ago13] Ian Agol, The virtual Haken conjecture, Doc. Math. 18 (2013), 1045–1087. With an
appendix by Agol, Daniel Groves, and Jason Manning.
[KK13] Marcin Kotowski and Michał Kotowski, Random groups and property (T ): Żuk’s theorem revisited, J. Lond. Math. Soc. (2) 88 (2013), no. 2, 396–416.
[CMV04] Pierre-Alain Cherix, Florian Martin, and Alain Valette, Spaces with measured walls,
the Haagerup property and property (T), Ergodic Theory Dynam. Systems 24 (2004),
no. 6, 1895–1908.
[CN05] Indira Chatterji and Graham Niblo, From wall spaces to CAT(0) cube complexes, Internat. J. Algebra Comput. 15 (2005), no. 5-6, 875–885.
[Oll05] Yann Ollivier, A January 2005 invitation to random groups, Ensaios Matemáticos
[Mathematical Surveys], vol. 10, Sociedade Brasileira de Matemática, Rio de Janeiro,
2005.
, Some small cancellation properties of random groups, Internat. J. Algebra
[Oll07]
Comput. 17 (2007), no. 1, 37–51.
[Gro93] M. Gromov, Asymptotic invariants of infinite groups, Geometric group theory, Vol. 2
(Sussex, 1991), London Math. Soc. Lecture Note Ser., vol. 182, Cambridge Univ. Press,
Cambridge, 1993, pp. 1–295.
[Oll07] Yann Ollivier, Some small cancellation properties of random groups, Internat. J. Algebra Comput. 17 (2007), no. 1, 37–51.
30
TOMASZ ODRZYGÓŹDŹ
[Oll04] Y. Ollivier, Sharp phase transition theorems for hyperbolicity of random groups, Geom.
Funct. Anal. 14 (2004), no. 3, 595–679.
[OW11] Yann Ollivier and Daniel T. Wise, Cubulating random groups at density less than 1/6,
Trans. Amer. Math. Soc. 363 (2011), no. 9, 4701–4733.
[MP15] John M. Mackay and Piotr Przytycki, Balanced walls for random groups, Michigan
Math. J. 64 (2015), no. 2, 397–419.
[Odr16] Tomasz Odrzygóźdź, The square model for random groups, Colloq. Math. 142 (2016).
, Nonplanar isoperimetric inequality for random groups, Note, aviable at:
[Odr14]
http://students.mimuw.edu.pl/∼to277393/web/files/nonplanar.pdf (2014).
Institute of Mathematics, Polish Academy of Sciences, Warsaw, Śniadeckich 8
E-mail address: tomaszo@impan.pl
| 4math.GR
|
Average Age of Information with Hybrid ARQ
under a Resource Constraint
Elif Tuğçe Ceran, Deniz Gündüz, and András György
arXiv:1710.04971v1 [cs.IT] 1 Oct 2017
Department of Electrical and Electronic Engineering
Imperial College London
Email: {e.ceran14, d.gunduz, a.gyorgy}@imperial.ac.uk
Abstract—Scheduling of the transmission of status updates
over an error-prone communication channel is studied in order
to minimize the long-term average age of information (AoI) at
the destination, under an average resource constraint at the
source node, which limits the average number of transmissions.
After each transmission, the source receives an instantaneous
ACK/NACK feedback, and decides on the next update, without a
priori knowledge on the success of the future transmissions. The
optimal scheduling policy is studied under different feedback
mechanisms; in particular, standard automatic repeat request
(ARQ) and hybrid ARQ (HARQ) protocols are considered.
Average-cost reinforcement learning algorithms are proposed
when the error probabilities for the HARQ system are unknown.
I. I NTRODUCTION
We consider a source node which continually communicates the most up-to-date status packets to the destination. In
particular, we are interested in the age of information (AoI)
[1], [2] at the destination, for a system in which the source
node samples an underlying time-varying process and sends
the sample values over an imperfect link which introduces
delays. Our goal is to minimize the average AoI taking into
account packet retransmissions. Most of the prior work on AoI
either do not consider retransmissions, or consider a standard
automatic repeat request (ARQ) protocol, where, if a packet
cannot be decoded, it is retransmitted until correct decoding,
up to a maximum number of retransmissions (e.g., [3], [4]).
Here, we analyze the AoI for both the standard ARQ and
hybrid ARQ (HARQ) protocols. In the latter, the receiver
combines information from all previous transmission attempts
of a packet in order to increase the success probability of
decoding after each retransmission [5].
To address the trade-off between the success probability and
the freshness of the status update to be transmitted, we develop
scheduling policies to minimize the expected average AoI under an average transmission-rate constraint. This constraint is
motivated by the fact that sensors sending status updates have
usually limited energy supplies (e.g., are powered via energy
harvesting); hence, they cannot afford to send an unlimited
number of updates, or increase the signal-to-noise-ratio in the
transmission. First, we assume that the success probability
before each transmission attempt is known (which depends on
the number of previous unsuccessful transmissions); hence, the
source can judiciously decide when to retransmit, and when to
discard failed information and send a fresh update. Then, we
consider transmitting status updates over an unknown channel,
Process H(t)
ACK/ NACK feedback
Sample of the process
Source
Error-prone
channel
Destination
Figure 1. System model of a status update system over an error-prone pointto-point link in the presence of ACK/NACK feedback from the destination.
in which the success probabilities of transmission attempts are
not known a priori, and must be learned in an online fashion.
The main contributions of this paper are outlined as follows:
• An long-term average resource constraint is imposed
on the transmitter, which limits the average number of
transmissions.
• Both retransmissions and pre-emption following a failed
transmission are considered, corresponding, respectively,
to the HARQ and ARQ protocols.
• The optimal preemptive transmission policy for the standard ARQ protocol is shown to be threshold-type, and
the optimal threshold value is derived in closed-form.
• An average-cost reinforcement learning (RL) algorithm is
proposed to learn the optimal scheduling decisions when
the transmission success probabilities are unknown.
• Extensive simulations are conducted in order to show the
effect of feedback, resource constraint and ARQ/ HARQ
error correction algorithms on the data freshness.
A. Related Work
Earlier work on AoI considered queue-based models, in
which the status updates arrive at the source node randomly
as a memoryless Poisson process, and are stored in a buffer
before being transmitted to the destination [1], [2], [6]. Instead,
in this paper, we follow the so-called generate-at-will model
that has been recently considered in [4] and [7], in which the
status updates of the underlying process of interest can be
sampled and generated at any time by the source.
A constant packet failure probability for status update
systems is investigated for the first time in [3], but this work
focuses on an M/M/1 queuing model, and no feedback is
considered for retransmissions. The paper [4] considers broadcasting of status updates to multiple clients over an unreliable
broadcast channel. However, this paper only considers index
policies, which update the information at every time slot, since
no constraint is imposed on the number of updates.
Optimizing the scheduling decisions in an AoI system is
also investigated in [7], focusing on multiple receivers, which
leads to a different set of constraints than ours, as we limit the
average number of transmissions to a single receiver. The AoI
in the presence of HARQ is modeled through an M/G/1 queue
in [8]; however, no resource constraint is taken into account,
and the status update arrivals are assumed to be memoryless
and random, in contrast to our work, which considers general
and controlled status update generation.
The rest of the paper is organized as follows. In Section II,
the system model is presented, and the problem of minimizing
the average AoI with HARQ under a resource constraint is
formulated as a constrained Markov decision process (CMDP).
In Section III, a primal-dual algorithm is proposed to solve this
CMDP. Then, minimizing the AoI under the standard ARQ
protocol is investigated in Section IV, and a computationally
efficient solution is proposed. Section V introduces a reinforcement learning algorithm to minimize AoI in an unknown
environment. Simulation results are presented in Section VI,
and the paper is concluded in Section VII.
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
We consider a slotted status update system over an errorprone wireless link. The source monitors an underlying timevarying process, for which it is able to generate a status
update at the beginning of each time slot; this is known as the
generate-at-will model [4]. A transmission attempt of a status
update takes constant time, which is assumed to be equal to
the duration of one time slot.
We assume that the channel state changes randomly from
one time slot to the next in an independent and identically
distributed fashion. We further assume the availability of errorand delay-free single-bit feedback from the destination to
the source node. Successful reception of a status update is
acknowledged by an ACK signal, while a NACK signal is
sent in case of a failure. In the classical ARQ protocol, a
packet is retransmitted after each NACK feedback, until it
is successfully decoded, and the received signal is discarded
after each failed transmission attempt. However, in the AoI
framework there is no point in retransmitting a failed out-ofdate status packet if it has the same error probability with
a fresh status update. Hence, the source always removes a
failed status signal, and transmits a fresh status update (preemption). On the other hand, in the HARQ protocol, signals
from all previous transmission attempts are combined for
decoding; and therefore, the probability of error decreases with
every retransmission. In general, the error probability of each
retransmission attempt depends on the particular combining
technique used, as well as the channel conditions [5].
The AoI is defined as the time elapsed since the most upto-date packet at the destination is generated. Assume that the
most up-to-date packet at the destination at time t has a time
stamp of generation U (t), then the AoI at time t, denoted by
aging due to erronous transmission
aging due to resource constraint
minimum AoI level
t
at
i
i
n
x
x
n
x
i
n
i
i
i
n
δt
rt
1
2
3
4
5
3
4
2
3
1
1
2
3
0
0
0
1
2
0
1
0
0
0
0
0
0
Feedback
NACK NACK ACK NACK ACK
ACK
Figure 2. Illustration of the AoI in a slotted status update system with HARQ.
δt , is defined as: δt , t−U (t). Therefore, the AoI increases by
one when a transmission fails, while it decreases to one (or, to
the number of retransmissions in the case of HARQ) when a
status update is successfully decoded. The system model and
the evolution of AoI for a slotted status update system are
illustrated in Figures 1 and 2, respectively.
The probability of error after r retransmissions, denoted by
g(r), depends only on r, and the particular HARQ scheme
used for combining multiple transmission attempts. An empirical method to estimate g(r) is presented in [9]. As in
any reasonable HARQ strategy, g(r) is non increasing in
the number of retransmissions r, i.e., g(r1 ) ≥ g(r2 ) for all
r1 ≤ r2 . To simplify the analysis, we assume that there is a
maximum number of retransmissions rmax , and a packet is
assumed to be successfully decoded after rmax transmissions,
i.e., g(r) = 0, for all r ≥ rmax .
Let δt ∈ Z+ denote the AoI at time slot t, and rt ∈
{0, . . . , rmax } denote the transmission attempt number. We
define the state vector at time slot the t as st , (δt , rt ). At
each time slot, the source node takes one of the three possible
actions, denoted by a ∈ A, where A = {i, n, x}. It can i)
remain idle (a = i); ii) generate and transmit a new status
update packet (a = n); or, iii) retransmit the previously failed
packet (a = x).
The state transitions can be summarized as follows: The
next state (δt+1 , rt+1 ) is determined stochastically depending
on action at and the current state (δt , rt ):
Pr(δt+1 = δt + 1, rt+1 = rt |at = i, δt , rt ) = 1 (1a)
Pr(δt+1 = δt + 1, rt+1 = 1|at = n, δt , rt ) = g(0)
(1b)
Pr(δt+1 = 1, rt+1 = 0|at = n, δt , rt ) = 1−g(0) (1c)
Pr(δt+1 = δt + 1, rt+1 = rt + 1|at = x, δt , rt ) = g(rt )
(1d)
Pr(δt+1 = rt + 1, rt+1 = 0|at = x, δt , rt ) = 1−g(rt ) (1e)
and P r(δt+1 , rt+1 |at , δt , rt ) is zero elsewhere.
Note that if there is no resource constraint, remaining idle
for a time slot is not a favorable action since it increases the
AoI by 1. However, continuous transmission is typically not
possible in practice due to energy or interference constraints.
Thus, we impose a constraint on the average number of
transmissions denoted by Cmax .
This leads to the CMDP formulation, defined by the 5tuple {S, A, P, c, d} [10]. A countable set of states (δ, r) ∈ S
and a finite set of actions A = {i, n, x} are already defined.
P contains the transition probabilities outlined in (1). The
instantaneous cost ct at time slot t is equal to age δt , and
we use dt as the transmission count, that is, dt = 0 if at = i,
or dt = 1 otherwise.
Policies are represented by π : S × A → [0, 1], π ∈ Π,
where at maps states st ∈ S into actions at ∈ A with some
probability π(at |st ). We will use sπt = (δtπ , rtπ ) and aπt to
denote the states and actions, respectively, induced by policy
π. Let J π (s0 ) denote the infinite horizon average age, and
C π (s0 ) denote the expected average number of transmissions
when policy π is employed with initial state s0 . We restrict our
attention to stationary policies, and denote the set of feasible
policies by ΠF , such that C π ≤ Cmax , ∀π ∈ ΠF .
We can state the CMDP optimization problem as follows,
where Eπ [·] represents the expectation with respect to policy
π and error probabilities g(r):
Problem 1.
" T
#
1 π X π
(2)
δt s0 ,
Minimize J (s0 ) , lim sup E
T →∞ T
t=1
#
" T
1 π X
π
π
s.t. C (s0 ) = lim sup E
1[at 6= i] s0 ≤ Cmax .
T →∞ T
t=1
π
∗
We define a policy π ∗ to be optimal in ΠF if J ∗ , J π ≤
π
J for all π ∈ ΠF . A policy is said to be deterministic if it
chooses an action with certainty at each decision epoch, and
for convenience we denote a deterministic policy simply by π
[10]. Also, without loss of generalization, problem horizon is
assumed to begin when the information at the destination is
up-to-date, i.e. s0 = (1, 0); and s0 will be removed from the
notation for simplicity. We assume throughout this paper that
the MDP is unichain [10], [11], which is intuitive since any
reasonable policy for Problem 1 results in an ergodic Markov
chain.
A. Structure of the Optimal Policy
Note that a deterministic stationary policy which is optimal
for countable-state average-cost MDPs exist and can be found
under certain conditions defined in [11], [12]. However, the
optimal policies for constrained MDPs are no longer limited
to the set of deterministic policies [10], [13], and randomized
stationary policies should be considered. Since the CMDP
defined in Problem 1 has a single global constraint, Corollary 1
below follows immediately from Theorem 4.4 of [10].
Corollary 1. An optimal stationary policy for the CMDP
in Problem 1 exists, and it is a randomized mixture of two
deterministic policies.
The next proposition formalizes the simple observation that
retransmitting a packet immediately after a failed attempt is
better than waiting some slots and then retransmitting (since
the waiting time just increases the age in case of a successful
retransmission, and the age will be the same in case of a
failure). The proof of the proposition is trivial, and hence
omitted.
Proposition 1. There exists an optimal policy for Problem 1
that takes a retransmission action only after a failed transmission event, that is P r(a∗t+1 = x|a∗t = i) = 0.
Based on Proposition 1, the transition for rt in (1) can
be simplified when at = n, and we have rt+1 = 0 instead
of rt+1 = rt . In the next section, the methodology to solve
Problem 1 will be described.
III. P RIMAL -D UAL A LGORITHM
TO
M INIMIZE AO I
To solve the average cost CMDP in Problem 1, we adopt
the Lagrangian primal-dual method [10], [13]. Similar methods have been adopted in other wireless network problems
including [14], [15].
A. Relaxed Unconstrained MDP
Lagrangian relaxation of the constraint with non-negative
multiplier η can be written as:
!
" T
#
T
1 π X π
1 X
π
π
1[at 6= i] ,
Jη = lim
E
δt − η Cmax −
T →∞ T
T t=1
t=1
(3)
and the optimal Jη∗ for a given η is defined as Jη∗ , minπ Jηπ .
Following the methodology proposed in [10], for a constant
η, the above minimization is equivalent to an unconstrained
average-cost MDP, in which the instantaneous overall cost
becomes δt + η 1[aπt ∈ {n, x}].
Then, the problem is to minimize Jη which is the averagecost for the unconstrained problem for a given η. There exits an
optimal stationary deterministic policy, and thus, the optimality
equations can be written. Let h(δ, r) denote the differential
cost (bias) function, and ρ represent the gain, which is an
approximation of the average overall cost; i.e., Jη∗ → ρ [11].
The differential cost function h(δ, r) : S → R is defined
as the difference of the value function V (δ, r) with respect
to an arbitrary but fixed reference state (δ ref , rref ) [11], i.e.
h(δ ref , rref ) = 0, and ∀(δ, r) ∈ S,
h(δ, r) + ρ = min δ + η · 1[a 6= i] + Eπ [h(δ ′ , r′ )] ,
a∈{i,n,x}
(4)
′
′
where (δ , r ) denotes the next state when decision a is taken
at state (δ, r) with a transition matrix given in (1. Equations in
(4) are also known as the Bellman optimality equations [11].
For countable S and finite A, there exists a differential cost
function h(δ, r), ∀(δ, r) ∈ S, and a unique gain ρ, which
satisfy the optimality equations in (4). Moreover, for a given
η value the optimal stationary deterministic policy π ∗ (δ, r) is
given by:
πη∗ (δ, r) ∈ arg min δ + η · 1[a 6= i] + Eπ [h(δ ′ , r′ )] . (5)
a∈{i,n,x}
Note that the state space of possible status age values
is possibly countably infinite. In order to write a practical
algorithm that solves the Bellman equations in (4), we truncate
to the state space S N = {1, 2, . . . , N } × {0, 1, . . . , rmax }
which approaches to the original countable state CMDP as
N → ∞ [16], [7]. Under any reasonable policy for Problem 1,
probability of visiting a state with a large age value decreases
exponentially whereas the cost incurred due to a large age is
polynomial, so it is intuitive to truncate to a large N . The
state transition function when at = i, or at ∈ {n, x} but the
transmission fails can be written as δt+1 = ⌊δt + 1⌋N , where
y = ⌊x⌋N implies y = x if x ≤ N , and y = N otherwise;
which provides the finite state space approximation similarly
to [16], [7].
B. Relative Value Iteration
Value iteration (VI) algorithm can be used to solve
countable-state finite-action MDPs [11]. However, for averagecost problems with Bellman equations defined as in (4), value
functions in VI generally do not converge and differences
between successive value iterations approximate to the true
value of Jη∗ . Due to possible large values, it may result
in numerical instability [11]. Therefore, the relative value
iteration (RVI) algorithm [11] is adopted to solve (4). Starting
with an arbitrary but a fixed reference state (δref , rref ), a
single value iteration for the RVI algorithm [11] is given as
follows:
Qn+1 (δ, r, a) ← δ + η · 1[aπ 6= i] + Eπ [hn (δ ′ , r′ )] ,
(6)
Vn+1 (δ, r) ← min(Qn+1 (δ, r, a)),
(7)
hn+1 (δ, r) ← Vn+1 (δ, r) − Vn+1 (δ ref , rref ),
(8)
a
where Qn (δ, r, a), Vn (δ, r) and hn (δ ′ , r′ ) denote the state
action value function, value function and differential value
function for iteration n, respectively.
C. Finding the Approximate Lagrange Parameter η ∗ and
Randomization
We start with an initial parameter η0 for m = 0, and at
each iteration, run the RVI algorithm and compute ηm+1 as
follows:
ηm+1 ← ηm + α(Cηm − Cmax ).
(9)
We continue iteration until convergence, and find the optimal
parameter η ∗ .
Note that, it is not straightforward to obtain two different
η values for two different deterministic policies, such that the
randomization between the two results in an optimal stochastic
policy. Thus, a heuristic method will be adopted: after obtaining η ∗ , it can be perturbed by small ξ, and the optimal policies
for Lagrange parameters η ∗ + ξ and η ∗ − ξ are computed
and randomized with probabilities µ and 1 − µ, respectively.
The randomization probability µ can be computed using the
average power consumptions of Cη∗ +ξ and Cη∗ −ξ , such that
µCη∗ +ξ + (1 − µ)Cη∗ −ξ = Cmax . The average transmission
bη∗ +ξ , C
bη∗ −ξ can be computed by empirical estimation,
rates C
and randomization probability µ is given by:
µ=
bη∗ +ξ
Cmax − C
.
bη∗ −ξ − C
bη∗ +ξ
C
(10)
IV. AO I WITH C LASSICAL ARQ P ROTOCOL
Now, assume that the system adopts the classical ARQ
protocol; that is, failed transmissions are discarded at the destination. In this case, there is no point in re-transmitting an undecoded packet since the successful transmission probabilities
are the same for a retransmission and the transmission of a
new update. The state space reduces to δ ∈ {1, 2, . . . , N }
as rt = 0, ∀t, and the action space to A ∈ {n, x}. The
probability of error in a status update is p , g(0). State
transitions in (1), Bellman optimality equations in (4) and
the RVI algorithm can all be simplified accordingly. Thanks
to these simplifications, we are able to provide a closedform solution to the corresponding unconstrained MDP with
Lagrange relaxation.
Lemma 1. The optimal policy that minimizes Jη with the standard ARQ protocol admits a deterministic threshold structure
characterized as follows for some threshold value ∆:
(
n if δ ≥ ∆,
π(δ) =
(11)
i if δ < ∆.
Proof. Proof is not included here due to space limitations, but
will be provided in the extended version of the paper.
Theorem 1. Optimal threshold value for the standard ARQ
protocol is given by:
p
2η(1 − p) + p − p
∗
∆ =
.
(12)
1−p
Proof. Proof will be provided in the extended version of the
paper.
Note that the optimal threshold value in (12) depends on η,
which stands for the trade-off between the average AoI and the
constraint. We can compute the average transmission rate for
a given η using the optimal threshold policy in (12), denoted
by Cη . An approximate solution for η ∗ can be obtained by
solving Cη = Cmax . Together with (12) we can obtain the
threshold value for the CMDP as follows:
p
1
−
.
(13)
∆∗ =
Cmax (1 − p) 1 − p
The threshold policy defined in (13) is the optimal deterministic policy for the standard ARQ case when randomization is
not considered, which is not sufficient for the CMDP.
Corollary 2. The optimal policy for the constrained average
AoI problem with standard ARQ is a randomized mixture of
two different threshold policies defined in Theorem 1.
Since we have the threshold in closed-form for the optimal
deterministic policy, which corresponds to η ∗ ; we can compute
∆1 , ∆2 directly by using ∆∗ , instead of finding η1 , η2
Algorithm 1: Average-cost modified SARSA with softmax
1
2
3
4
Input : Lagrange parameter η
n ← 0 /* time iteration
τ ← 1 /* softmax temperature parameter
×3
QN×M
← 0 , ρ ← 0 /* initialization
η
*/
*/
*/
foreach n do
foreach a ∈ A do
5
exp(−Qη (sn , a)/τ )
π(a|sn ) = X
exp(−Qη (sn , a′ )/τ )
6
a′ ∈A
end
Sample an from π(a|Sn ), observe next state sn+1 and cost
cn = δn + η1{an =1,2}
foreach a ∈ A do
exp(−Qη (sn+1 , an+1 )/τ )
π(a|sn+1 ) = X
exp(−Qη (sn+1 , a′n+1 )/τ )
7
8
9
10
a′n+1 ∈A
11
12
13
14
15
16
17
18
end
end
Sample an+1 from π(an+1 |sn+1 )
Update Q√
η (sn , an ) as:
αn ← 1/ n
Qη (sn , an ) ←
Qη (sn , an ) + αn [cn − ρ + Qη (sn+1 , an+1 ) − Qη (sn , an )]
/* update ρ at every step
*/
ρ ← ρ + 1/n[cn − ρ]
n← n+1
first, and then computing ∆1 , ∆2 accordingly. We propose a
heuristic policy (optimal if (∆, C ∆ ) pairs form a convex set)
in order to minimize the average AoI with standard ARQ by
randomizing between the two policies corresponding to the
nearest integers to ∆∗ in (13), that is ∆1 , ⌊∆∗ ⌋, ∆2 ,
⌈∆∗ ⌉. Randomization coefficient µ ∈ [0, 1] can be computed
by using the power consumptions C ∆j of the deterministic
threshold policies corresponding to ∆j , j = 1, 2. From (13)
we have:
C ∆j , (1 − p)−1 (∆j + p/(1 − p))−1 .
(14)
Therefore, randomization factor µ of stochastic policy can be
found using ∆j , j = 1, 2 as in 10, and the resultant algorithm
is a threshold policy that uses ∆1 on the threshold with with
probability µ and ∆2 with probability (1 − µ) at each slot.
V. L EARNING
TO MINIMIZE
AO I IN
AN UNKNOWN
ENVIRONMENT
Here we consider a practical scenario, in which the source
node may not have a-priori information about the channel or
the decoding probabilities at the destination, or these may
change over time. Therefore, an online learning algorithm
is employed to learn g(r) over time without degrading the
performance significantly. The literature for average-cost reinforcement learning (RL) is quite limited compared to discounted cost problems. R-learning [17] is an average-cost RL
algorithm which is an off-policy method similar to Q-learning
[18], and initially proposed with a uniform exploration strategy
(ǫgreedy ).
For the average AoI minimization problem in Problem 1, a
modified version of the R-learning algorithm is employed. In
Figure 3. Deterministic policies πη−ξ (top) and πη+ξ (bottom) when
Cmax = 0.4, p0 = 0.3, and rmax = 9, for a time horizon T = 1000.
The results are averaged over 1000 trials. (Blue circles, red stars and green
diamonds represent actions πη (δ, r) = i, n and x, respectively.)
Algorithm 1 we use the softmax exploration strategy instead
of ǫgreedy for the current and the next states [18]. Then,
Algorithm 1 becomes an on-policy RL algorithm. Moreover,
we update the gain ρ at every time slot based on the empirical
average instead of updating at non-explored time slots and
losing information. The resultant algorithm is called averagecost SARSA with softmax.
VI. N UMERICAL R ESULTS
Decoding error probability is assumed to be given by
g(r) , p0 21−r , where p0 denotes the failure probability
of the first transmission, and r is the retransmission count.
The exponential behavior of the error probability follows
from previous research on HARQ [5], [9]. In Figure 3, we
illustrate the deterministic policies obtained by RVI and η
search for given Cmax , rmax and p0 values. Final policies
are generated by randomizing between πη−ξ and πη+ξ . As it
can be seen from the figure, the designed policy transmits less
as η increases, and vice versa.
Figure 4 illustrates the performance of the proposed randomized HARQ policy with respect to Cmax for different
p0 values. We also include the performance of deterministic
and randomized threshold policies with ARQ. As expected,
average AoI can be reduced by randomization between two
deterministic threshold policies. We observe that average AoI
decreases exponentially with respect to Cmax . The average
AoI also decreases with decreasing p0 and with increasing
rmax as expected.
Figure 5 shows the evolution of the average AoI over time
when the proposed average-cost SARSA learning algorithm is
employed. It can be observed that the average AoI achieved
by Algorithm 1 converges to the one obtained from the RVI
algorithm which has a priori knowledge of g(r). Average
AoI achieved by the proposed online learning algorithm is
12
12
p =0.5, ARQ, deterministic
RL, p 0 =0.5, r max =3
0
p =0.5, ARQ, randomized
RVI, p 0 =0.5, r max =3
p0=0.5, rmax=3, HARQ
0
8
p =0.1, r
0
max
max
RVI, p 0 =0.2,r max =9
=3, HARQ
=9, HARQ
6
Average AoI
p =0.3, r
Average AoI
10
0
10
8
RL, p 0 =0.2, r max =9
6
4
4
2
2
0
0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Average number of transmissions, C max
Figure 4. Expected average AoI J π with respect to Cmax for ARQ and
HARQ protocols for different p0 and rmax values. Time horizon is set to
T = 1000, and the results are averaged over 1000 trials.
0.2
0.3
0.4
0.5
0.6
0.7
0.8
Average number of transmissions, C max
Figure 6. Performance of the RL (average-cost SARSA) with respect to RVI
Algorithm for n = 1000 iterations, and values are averaged over 1000 trials
for different p0 and rmax values (both the mean and the variance are shown).
R EFERENCES
Figure 5. Performance of the average-cost SARSA for rmax = 9, p0 = 0.2,
η = 10 and n ≤ 10000, averaged over 1000 trials (both the mean and the
variance are shown).
presented in Figure 6 as a function of Cmax , which shows
that the performance is close to that of RVI.
VII. C ONCLUSIONS
We have considered a wireless system transmitting timesensitive data over an imperfect channel with the average
AoI as the performance measure, which quantifies the timeliness of the data available at the destination. Considering
both the classical ARQ and the HARQ protocols, preemptive
scheduling policies have been proposed by taking into account
retransmissions under a resource constraint. In addition to
identifying a randomized threshold structure for the optimal
policy when the error probabilities are known, an efficient
RL algorithm is also proposed for practical applications, when
the system characteristics may not be known in advance. The
algorithms designed in this paper are relevant to other systems
concerning the timeliness of information, and the proposed
methodology can be used in other CMDP problems. As a
future work, the problem will be extended to time-correlated
channel statistics in a multi-user setting.
[1] S. Kaul, M. Gruteser, V. Rai, and J. Kenney, “Minimizing age of
information in vehicular networks,” in IEEE Coms. Society Conf. on
Sensor, Mesh and Ad Hoc Coms. and Nets., June 2011, pp. 350–358.
[2] S. Kaul, R. Yates, and M. Gruteser, “Real-time status: How often should
one update?” in INFOCOM, Proc. IEEE, March 2012, pp. 2731–2735.
[3] K. Chen and L. Huang, “Age-of-information in the presence of error,”
in IEEE Int’l Symp. on Inf. Theory (ISIT), July 2016, pp. 2579–2583.
[4] I. Kadota, E. Uysal-Biyikoglu, R. Singh, and E. Modiano, “Minimizing
age of information in broadcast wireless networks,” in Annual Allerton
Conf. On on Communication, Control, and Computing, September 2016.
[5] P. Frenger, S. Parkvall, and E. Dahlman, “Performance comparison of
harq with chase combining and incremental redundancy for hsdpa,” in
IEEE Vehicular Technology Conf. Proc., vol. 3, 2001, pp. 1829–1833.
[6] M. Kashef and A. Ephremides, “Optimal packet scheduling for energy
harvesting sources on time varying wireless channels,” Journal of
Communications and Networks, vol. 14, no. 2, pp. 121–129, April 2012.
[7] Y. P. Hsu, E. Modiano, and L. Duan, “Age of information: Design and
analysis of optimal scheduling algorithms,” in 2017 IEEE International
Symposium on Information Theory (ISIT), June 2017, pp. 561–565.
[8] E. Najm, R. D. Yates, and E. Soljanin, “Status updates through M/G/1/1
queues with HARQ,” CoRR, vol. abs/1704.03937, 2017.
[9] V. Tripathi, E. Visotsky, R. Peterson, and M. Honig, “Reliability-based
type ii hybrid arq schemes,” in Communications, 2003. ICC ’03. IEEE
International Conference on, vol. 4, May 2003, pp. 2899–2903 vol.4.
[10] E. Altman, Constrained Markov decision processes, ser. Stochastic
modeling. Boca Raton, London: Chapman & Hall/CRC, 1999.
[11] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. New York, NY, USA: John Wiley & Sons, 1994.
[12] L. I. Sennott, “Average cost optimal stationary policies in infinite state
markov decision processes with unbounded costs,” Operations Research,
vol. 37, no. 4, pp. 626–633, 1989.
[13] ——, “Constrained average cost Markov decision chains,” Probability
in Eng. and Informational Sciences, vol. 7, no. 1, p. 6983, 1993.
[14] M. H. Ngo and V. Krishnamurthy, “Monotonicity of constrained optimal
transmission policies in correlated fading channels with arq,” IEEE
Trans. on Signal Processing, vol. 58, no. 1, pp. 438–451, Jan 2010.
[15] A. Roy and A. Karandikar, “Optimal radio access technology selection
policy for lte-wifi network,” in Int’l Symp. Modeling and Opt. in Mobile,
Ad Hoc, and Wireless Nets. (WiOpt), May 2015, pp. 291–298.
[16] E. Altman, R. E. Azouzi, D. S. Menasché, and Y. Xu, “Forever young:
Aging control in dtns,” CoRR, vol. abs/1009.4733, 2010.
[17] S. Mahadevan, “Average reward reinforcement learning: Foundations,
algorithms, and empirical results,” Machine Learning, vol. 22, no. 1,
pp. 159–195, 1996.
[18] R. S. Sutton and A. G. Barto, Introduction to Reinforcement Learning,
1st ed. Cambridge, MA, USA: MIT Press, 1998.
| 7cs.IT
|
Class-Splitting Generative Adversarial Networks
Grinblat, G.L.1 , Uzal, L.C.1 and Granitto, P.M.1
arXiv:1709.07359v1 [stat.ML] 21 Sep 2017
1
CIFASIS, French Argentine International Center for Information and Systems
Sciences, UNR-CONICET, Argentina
Figure 1: Samples generated with our Splitting GAN method with supervised training on CIFAR-10
dataset. Each line has samples of one of the original classes. Each side has samples corresponding to
one of the two clusters generated for each class. We use ResNet-B architecture (see text for details).
Abstract
when no class information is available, i.e. in the
unsupervised setup. Our generated samples reach
Generative Adversarial Networks (GANs) produce state-of-the-art Inception scores for CIFAR-10 and
systematically better quality samples when class STL-10 datasets in both supervised and unsuperlabel information is provided., i.e. in the con- vised setup.
ditional GAN setup. This is still observed for
the recently proposed Wasserstein GAN formulaIntroduction
tion which stabilized adversarial training and al- 1
lows considering high capacity network architectures such as ResNet. In this work we show how The irruption of Generative Adversarial Nets
to boost conditional GAN by augmenting available (GAN) [5] produced a great leap for image data
class labels. The new classes come from cluster- generation. Samples were generated simply by aping in the representation space learned by the same plying a neural network transform to an input ranGAN model. The proposed strategy is also feasible dom vector sampled from a uniform distribution.
1
There is no need for any Markov chains or unrolled
approximate inference networks during either training or generation of samples [5]. GAN based generative models did not take long to reach impressive
image quality [13, 14, 17, 10] at least for some specific datasets.
However, current GAN models cannot produce
convincing samples when trained on datasets of images with high variability, even for relatively low
resolution images. On the other hand, it is observed
that sample quality improves when class information is taken into account in a conditional GAN
setup [11, 12]. These findings suggest that it is hard
to learn a multimodal distribution from a smooth
transform of a uniform (or Gaussian) distribution
and that providing categorical class information to
the generator alleviates this problem.
Our proposal is inspired in two observations.
First, as mentioned above, conditioning generation with categorical class labels with high level
of abstraction improves image quality. Second, as
early observed in [5, 13], the adversarial network
pair learns an useful hierarchy of representations
in an unsupervised setup. We propose to exploit
the same representation space learned by the GAN
model in order to generate new class labels with a
high level of abstraction. This is done by applying
a simple clustering method in this representation
space. By conditioning generation with this new
class labels the model is able to generate better
samples. This can be done either when prior class
information is available or not.
The main contributions of the present paper are1 :
Figure 2: Class-conditioned samples generated
with WGAN-GP method [7] over the ResNet-B architecture for CIFAR-10 dataset. Each row has
samples of a given class.
art Inception scores for CIFAR-10 and STL-10
datasets in both tasks.
2
Background
In the original GAN formulation [5], the generator is a neural network that transform noise input
z ∼ p(z) into fake samples and the discriminator
D is a neural network with a single scalar output
with a sigmoid activation. This output is interpreted as the model probability for its input being
a real image from the dataset distribution against
being a fake image sampled by generator G. The
discriminator D is trained using the standard binary classification formulation by minimizing the
binary cross-entropy between fake and real distributions. On the other hand, the generator G is
simultaneously trained to mislead the discriminator. This is accomplished in practice by updating
G parameters minimising the same loss but with
fake samples tagged with a ‘true’ label [5].
In other words, the discriminator is updated by
• We propose a method for increasing the number of class labels during conditional GAN
training based on clustering in the representation space learned by the same GAN model.
We base our implementation on the more stable Wasserstein GAN formulation [2, 7].
• We show an effectively way of adapting networks architecture to handle this increasing
number of classes.
• We show that this splitting GAN strategy improves samples quality both in the supervised
and unsupervised tasks, reaching state-of-the1 The source code will be available at https://github.
com/CIFASIS
2
Figure 3: Real CIFAR-10 samples corresponding to the 20 clusters found by our method. Each line is
divided in the same way as in Figure 1.
gradient descent over a negative log likelihood loss of the generated samples by adding more structure
to the GAN latent space and an auxiliary classiLD = − E [log(D(x̃))]− E [log(1−D(G(z)))], fier. This approach requires the dataset to include
x∼Pr
z∼p(z)
class labels, i.e. to work in a supervised setting.
(1)
The generator receives the noise vector z and also
while the generator minimizes
the selected label c so that the generated sample
LG = − E [log(D(G(z)))].
(2) is a function of both. Furthermore, the discrimiz∼p(z)
nator has, in addition to the usual objective, the
task of correctly classifying the real and generated
The main issue in the original GAN formula- samples (through an auxiliary classifier). The gention was the instability of the training process that erator is optimized not only to deceive the discrimmade very hard to improve architectures and to inator, but also to generate fake samples that minscale up to bigger images. In [13] a deep convo- imize the auxiliary classifier error, i.e. to produce
lutional architecture was proposed for both gen- well class-defined samples.
erator and discriminator which presents some degree of stability for adversarial training. This work
was the first one producing convincing image sam- 2.2 WGAN
ples for datasets with low variability (Bedrooms
and Faces) and relatively low resolution (64x64). In order to address the problem of instability in
However, standard GAN formulation fails to gen- GAN training, Arjovsky et al. in a series of works
erate globally consistent samples when trained on [1, 2] proposed a reformulation of the function to be
optimized. They argue that the original loss funcdatasets with high variability like ImageNet.
tion presents discontinuities and vanishing gradients with respect to generator parameters. Instead,
2.1 AC-GAN
they proposed a distance for distributions known
In order to tackle datasets with high variability, as Earth-Mover distance or Wasserstein-1, which
Odena et al. [12] proposed to improve the quality captures the cost of transporting mass in order to
3
transform one distribution into the other. From
this distance they derive the WGAN loss function
for the minimax objective
min max E [D(x)] −
G D∈D x∼Pr
E [D(G(z))]
(3)
z∼p(z)
where D (called critic in WGAN formulation) is
not anymore a binary classifier and is restricted to
be in the set D of 1-Lipschitz functions. Again, z is
a noise vector sampled from a simple distribution
(uniform or Gaussian distribution). The Lipschitzness of D was imposed by weight clipping in this
first version of WGAN.
The importance of Arjovsky’s contribution lies
on a gain in the robustness of the adversarial
training process and a reduction in the frequency
of the mode collapse phenomenon. Furthermore,
the proposed loss function correlates well with the
observed sample quality as opposed to the original GAN loss which gives little information about
training progress.
Figure 4: Samples generated with the ResNet-B architecture trained with Splitting GAN over CIFAR10 without class labels (unsupervised).
is the most recurrent benchmark for image generation in GAN literature. In the unsupervised setting
(without using any class information) they reach
2.2.1 WGAN-GP
the state-of-the-art, while in the supervised case
An improved version of WGAN was recently pro- (following the strategy of AC-GAN and without
posed by Gulrajani et al. [7]. They found that the tuning any hyperparameter nor architecture) they
2
weight clipping can cause convergence problems in reach the second place behind SGAN [8] . All this
some settings and propose to enforce the Lipschitz advantageous features made –to our knowledge–
constraint on the critic D by penalizing its gradi- WGAN the current standard formulation for adversarial training.
ent’s norm.
The penalty term is computed over a set of random points x̂ uniformly sampled from straight lines
Our Method:
Splitting
between real and fake sample points. Naming as Px̂ 3
the latter distribution, the new loss can be written
GAN
as
The main idea is to generate new artificial classes
L =
E [D(x̃)] − E [D(x)]
based on the representation learned by the last hidx∼Pr
x̃∼Pg
den layer of the critic after enough training itera
+λ E (k∇x̂ D(x̂)k2 − 1)2
(4) tions. This is done by applying k-means to each
x̂∼Px̂
class set in this representation space. We divide
each set in two clusters only when the class has
where the penalty coefficient is set to λ = 10.
This improved WGAN formulation exhibits high more samples than a certain threshold. After that,
robustness against changing model architecture. training is resumed replacing the old labels with
The authors tested six different network designs the new ones for the entire dataset.
With this procedure we need to make two mifor both G and D, which typically break standard
GAN training but show stable WGAN training for nor modifications to the model architecture before
all cases. Furthermore, WGAN formulation helps resuming learning:
achieving better quality samples. Quantitative re2 By simply duplicating the number of feature maps of
sults are reported by the authors in terms of the Gulrajani’s networks we found WGAN outperforms SGAN
Inception score [14] over CIFAR-10 dataset, which score. See Sec. 4
4
1. The auxiliary classifier needs to predict a different number of classes, so we extend the last
layer of this classifier adding a copy of the
weights of the parent class for each child class.
Method
Improved GAN (-L+HA) [14]
EGAN-Ent-VI [4]
DFM [15]
Splitting GAN ResNet-B (ours)
WGAN-GP ResNet-B
WGAN-GP ResNet-A [7]
Splitting GAN ResNet-A (ours)
Inception Score
6.86 ± 0.06
7.07 ± 0.10
7.72 ± 0.13
7.80 ± 0.08
7.81 ± 0.10
7.86 ± 0.07
7.90 ± 0.09
2. In the conditional WGAN-GP implementation
[6], the class labels are injected in each batch
normalization layer of the generative network
by setting a specific gain and bias parameters
(γ and b) for each class. We follow this strategy in our proposal and, for the class splitting,
we set the new pair (γ, b) for each child class as Table 1: Unsupervised Inception scores on CIFARγchild = γf ather +∆γ and bchild = bf ather +∆b, 10
with initialization ∆γ = 0 and ∆b = 0 when
the new classes are created. This formulation
Method
Inception Score
implies that child classes start both with the
father class params and they eventually beImproved GAN [14]
8.09 ± 0.07
come different.
AC-GAN [12]
8.25 ± 0.07
WGAN-GP ResNet-A [7]
8.42 ± 0.10
SGAN [8]
8.59 ± 0.12
4 Results
WGAN-GP ResNet-B
8.67 ± 0.14
Splitting GAN ResNet-A (ours)
8.73 ± 0.08
To demonstrate the effectiveness of our proposal,
Splitting GAN ResNet-B (ours)
8.87 ± 0.09
we conducted several experiments with CIFAR-10
[9], a dataset containing 50000 32x32 images corresponding to 10 different classes, and the unlabeled Table 2: Supervised Inception scores on CIFAR-10
set of STL-10, containing 100000 larger and more
diverse images [3]. We based our model on the improved WGAN algorithm proposed by Gulrajani et
al. [7, 6]. In all cases, during training, we sample ture with the original WGAN-GP algorithm. The
50000 images from the current model to select the results are detailed in Table 1 and Table 2.
best one so far based on the Inception score. FiAlso for comparison, samples obtained with the
nally, we sample another 50000 with the best model WGAN-GP supervised model (Figure 2) and obin order to calculate the reported score, following tained with the proposed method (Figure 1) are
[12].
shown. Figure 3 has real samples of CIFAR-10 corresponding to each of the 20 clusters found.
4.1
CIFAR-10
Figures 4 and 5 show generated images and clusters found in the unsupervised test.
With CIFAR-10, an unsupervised test was performed starting from all the examples considered
as a single class and dividing them into two clusMethod
Inception Score
ters every approximately 10 epochs. This was done
with the Gulrajani’s ResNet architecture without
Original Dataset [15]
26.08 ± 0.26
changes (named ResNet-A) and a modified version
DFM [15]
8.51 ± 0.13
(ResNet-B) doubling the number of maps in each
WGAN-GP
ResNet-A
9.05 ± 0.12
convolutional layer. A supervised test was also conSplitting
GAN
ResNet-A
(ours)
9.50
± 0.13
ducted with these two architectures, starting from
the original 10 classes of CIFAR and dividing them
into two at approximately 20 training epochs. For
comparison we also trained the ResNet-B architec- Table 3: Unsupervised Inception scores for STL-10
5
Figure 6: Images generated by the model trained
on STL-10.
4.2
STL-10
We treat STL-10 in the same way as [15]. That
is, we downsample each dimension by 2, resulting
in 48x48 RGB images. We tested our algorithm
with the ResNet-A architecture, with the minimum changes necessary for the model to generate
48x48 images. Table 3 shows the resulting Inception score. Figures 6 and 7 show the generated
images and the clusters found by the method.
5
Discussion
Several things can be observed from the results presented in the previous section. First, regarding the
obtained clusterization of the real samples (Figure
3 for the supervised case and Figure 5 for the unsupervised one), we can visually find rules that define
the vast majority of samples, for at least several
clusters. As an example, in the supervised case
(Figure 3) we can see in the left side of the fourth
row cats looking forward and in the left side of the
eighth row horse side views. Compare with cats
and horses in several positions corresponding to the
Figure 5: The 25 clusters found in the unsupervised clusters in the right side. In the unsupervised case
case (real CIFAR-10 samples). Each line has two (Figure 5) we can see a tendency to generate clusdifferent clusters.
ters for cars, planes or ships, but in general they
6
are much more mixed.
Regarding the generated samples in the supervised case (Figure 1 for our method and Figure 2 for
WGAN-GP), we can see that the class splits allows
the model to generate better samples. Not only for
the more uniform clusters such as the horse side
views or the cats looking forward, but for the whole
original class. Compare for example the fourth row
(cats) or the eighth row (horses) in Figure 1 with
those rows in Figure 2, corresponding to the same
model trained with WGAN-GP. Note that these
samples do not differ too much from those shown in
[7]. Even in classes where the clustering step does
not seem to have found an obvious separation rule,
such as cars (second row), a better sample quality
can be observed than in the original WGAN-GP.
In the unsupervised case with CIFAR-10 (Figure 4), although the Inception score is similar than
the one obtained by the state-of-the-art so far, the
samples generated seem to be of a higher quality.
Nevertheless, they do not reach the quality of the
generated images in a supervised setting. It is always advisable to start the division into clusters
from the predefined classes, if this information is
available.
In the case of STL-10 (Figure 6), there is a noticeable difference in the Inception score. The reason
of this may be that STL-10 is a much more diverse
dataset, so a division into a large number of classes
can be beneficial. It should be noted that in this
case the state-of-the-art is much further from the
actual dataset score than in the case of CIFAR-10.
The success of our Splitting GAN method suggests that reinjecting high level information from
critic to the generative model improves sampling
quality. This breaks the strictly adversarial training and allows some degree of information sharing
between both networks. We believe that this simFigure 7: The 15 clusters found by the model (real ple (but successful) strategy could inspire a new
STL-10 samples).
and better adversarial training formulation where
a small amount of high level information directly
flows from critic’s last layers to generator input.
6
Conclusions
Work
and
Future
In this work we showed that our Splitting GAN
method allows generating better images. This can
7
be seen in the results on CIFAR-10 and STL-10 for
which clearly better images were obtained. This
is supported by an Inception score well above the
previous state-of-the-art for both datasets.
A future direction of research to improve the current Splitting GAN version is oriented to understand how a given model architecture or dataset
determines the optimal number of clusters (or
classes). Also, clusterization could be enhanced
during adversarial training with the addition of an
extra loss term like in [16].
We are also currently working in a generalization of the Splitting GAN ideas following two paths:
First, making the high level information from the
critic’s representation flows continually to the generator, avoiding special purpose steps at predefined
times in the training process. Second, avoiding the
hard threshold clustering step and replacing it with
some sort of continuous representation capturing
the same amount of information.
A. Courville, and Y. Bengio. Generative
adversarial nets. In Advances in neural information processing systems, pages 2672–2680,
2014.
[6] I. Gulrajani. Improved Training of Wasserstein GANs. https://github.com/igul222/
improved_wgan_training, 2017. [Online; accessed 18-Sep-2017].
[7] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. Courville. Improved training of wasserstein gans.
arXiv preprint
arXiv:1704.00028, 2017.
[8] X. Huang, Y. Li, O. Poursaeed, J. Hopcroft,
and S. Belongie.
Stacked generative
adversarial networks.
arXiv preprint
arXiv:1612.04357, 2016.
[9] A. Krizhevsky and G. Hinton. Learning multiple layers of features from tiny images. 2009.
[10] X. Mao, Q. Li, H. Xie, R. Y. Lau, Z. Wang,
and S. P. Smolley. Least squares generative adversarial networks. arXiv preprint
The authors acknowledge grant support from ANArXiv:1611.04076, 2016.
PCyT PICT-2016-4374.
[11] M. Mirza and S. Osindero.
Conditional
generative adversarial nets. arXiv preprint
arXiv:1411.1784, 2014.
References
7
Acknowledgements
[1] M. Arjovsky and L. Bottou. Towards princi- [12] A. Odena, C. Olah, and J. Shlens. Conditional image synthesis with auxiliary classifier
pled methods for training generative adversarGANs. In D. Precup and Y. W. Teh, editors,
ial networks. In International Conference on
Proceedings of the 34th International ConferLearning Representations 2017, 2017.
ence on Machine Learning, volume 70 of Proceedings of Machine Learning Research, pages
[2] M. Arjovsky, S. Chintala, and L. Bot2642–2651, International Convention Centre,
tou.
Wasserstein gan.
arXiv preprint
Sydney, Australia, 06–11 Aug 2017. PMLR.
arXiv:1701.07875, 2017.
[3] A. Coates, A. Ng, and H. Lee. An analysis of [13] A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep
single-layer networks in unsupervised feature
convolutional generative adversarial networks.
learning. In Proceedings of the fourteenth inarXiv preprint arXiv:1511.06434, 2015.
ternational conference on artificial intelligence
and statistics, pages 215–223, 2011.
[14] T. Salimans, I. Goodfellow, W. Zaremba,
V. Cheung, A. Radford, X. Chen, and
[4] Z. Dai, A. Almahairi, P. Bachman, E. Hovy,
X. Chen. Improved techniques for training
and A. Courville.
Calibrating energygans. In D. D. Lee, M. Sugiyama, U. V.
based generative adversarial networks. arXiv
Luxburg, I. Guyon, and R. Garnett, editors,
preprint arXiv:1702.01691, 2017.
Advances in Neural Information Processing
[5] I. Goodfellow, J. Pouget-Abadie, M. Mirza,
Systems 29, pages 2234–2242. Curran AssoB. Xu,
D. Warde-Farley,
S. Ozair,
ciates, Inc., 2016.
8
[15] D. Warde-Farley and Y. Bengio. Improving
generative adversarial networks with denoising
feature matching. In International Conference
on Learning Representations 2017, 2017.
[16] Y. Wen, K. Zhang, Z. Li, and Y. Qiao. A
discriminative feature learning approach for
deep face recognition. In European Conference
on Computer Vision, pages 499–515. Springer,
2016.
[17] J. Zhao, M. Mathieu, and Y. LeCun. Energybased generative adversarial network. arXiv
preprint arXiv:1609.03126, 2016.
9
| 1cs.CV
|
i
F WLBP: A Scale Invariant Descriptor for Texture
Classification
arXiv:1801.03228v1 [cs.CV] 10 Jan 2018
Swalpa Kumar Roy, Nilavra Bhattacharya, Bhabatosh Chanda, Bidyut B. Chaudhuri, Life Fellow, IEEE,
and Dipak Kumar Ghosh
Abstract—In this paper we propose a novel texture recognition
feature called Fractal Weighted Local Binary Pattern (FWLBP).
It has been observed that fractal dimension (FD) measure
is relatively invariant to scale-changes, and presents a good
correlation with human perception of surface roughness. We have
utilized this property to construct a scale-invariant descriptor. We
have sampled the input image using an augmented form of the
local binary pattern (LBP), and then used an indexing operation
to assign FD weights to the collected samples. The final histogram
of the descriptor has its features calculated using LBP, and its
weights computed from the FD image. The proposed descriptor
is scale, rotation and reflection invariant, and is also partially
tolerant to noise and illumination changes. In addition, it is also
shown that the local fractal dimension is relatively insensitive to
the bi-Lipschitz transformations, whereas its extension is able to
correctly discriminate between fundamental texture primitives.
Experimental results show the proposed descriptor has better
classification rates compared to the state-of-the-art descriptors
on standard texture databases.
Index Terms—Fractal Dimension (FD), Fractal weighted local
binary pattern (FWLBP), Scale invariance, Scale space, Texture
classification
C
I. I NTRODUCTION
ONSTRUCTING effective texture feature is a major
challenges in computer vision [1]. It has received a
lot of attention in the past decades due to its value in
understanding how human beings recognize textures. A crucial
issue of texture analysis is constructing an effective texture representation. There are primarily five methodologies
of texture representation: statistical, geometrical, structural,
model-based, and signal processing based [2], [3]. In recent
literature, two categories of texture classification approaches
dominate current research, namely texture descriptor based
methods [4], [5] and deep learning based methods. In the
second category, a convolutional neural network (C NN) is
trained to classify the texture images [6], [7]. The deep
learning based methods offer good classification performance,
however it has following limitations: it requires a large amount
of data and hence is computationally expensive to trains.
S. K. Roy and B. B. Chaudhuri are with the Optical Character Recognition
Lab, Computer Vision and Pattern Recognition Unit at Indian Statistical
Institute, Kolkata, India (email: swalpa@ieee.org; bbc@isical.ac.in).
Nilavra Bhattacharya is with the School of Information, The University of
Texas, Austin, USA (email: nilavra@ieee.org).
B. Chanda is with the Image Processing Lab, Electronics and Communication Sciences Unit at Indian Statistical Institute, Kolkata, India (email:
chanda@isical.ac.in).
D. K. Ghosh is with the Department of Electronics & Communication
Engineering, National Institute of Technology Rourkela, Orissa, India (email:
dipak@ieee.org)
Basically the complex models take weeks to train using
several machines equipped with expensive GPUs. Also, at
present, no strong theoretical foundation on topology/training
method/flavor/hyper-parameters for deep learning exist in the
literature. On the other hand, the descriptor based methods
have the advantage of ease of use, data independence, and
robustness to real-life challenges such as illumination and
scale differences. In this category of methods the design of
effective texture descriptor is regarded as extremely important
for texture recognition.
A picture may be captured under geometric and photometric
varying conditions. An ideal model for describing and recognizing textures should be able to capture essential perceptual
properties of the texture. It should be robust enough against
changes, like view-point alteration, luminance variation, image
rotation, reflection, scale change, and geometry of the underlying surface. Attention has been focussed on the design of
local texture descriptors capable of achieving local invariance
[8]–[11]. The search for invariant descriptors started in the
1990s [12]. Kashyap and Khotanzad first proposed a circular
autoregressive dense model [13] to study rotation invariant
texture classification. Many other models including multiresolution [14], hidden Markov model [15], and Gaussian
Markov model [16] were explored to study rotation invariance.
More recently Varma and Zisserman [10] proposed to learn
a rotation invariant texton dictionary from a training set, and
then classify the texture image based on its texton distribution.
They also proposed another texton based algorithm [11] by
using the local image patch to represent the feature directly.
In addition some works have been done on scale and affine
invariant feature extraction in texture classification. Among
them Varma and Garg [17] extracted a local fractal vector
for each pixel, and computed a statistical histogram. Liu and
Fieguth [18] applied random projection for densely sampled
image patches, and extracted the histogram signature. Yao and
Sun [19] normalized statistical edge feature distribution to
resist the variation in scale. Lazebinik et al. [20] and Zhang et
al. [8] detected Harris and Laplacian key points for extracting
texture signatures. Recently, global scale invariant feature
extraction methods drew more attention because local scale
normalization is slow because of pixel by pixel operations are
needed there. Xu et al. [21] and Quan et al. [5] have classified
the image pixels into multiple point sets by gray intensities or
local feature descriptors. Instead of extracting scale invariant
features, pyramid histograms with shifted matching scheme
was proposed by some researchers [9], [22]. Roy et al. [23]
introduced a complete dual-cross pattern (C DCP) to address
ii
the scale and rotational effects in unconstrained texture classification. Generally, a texture can be characterized by geometric
multi-scale self-similar macro-structure (like fractal dimension
and L BP). Geometric structure of object in the image vary with
scale changes while illumination change does not change the
object structure. Several studies have been done using fractal
based texture classification [17], [24]–[26] but the drawback
of these techniques are that the value of fractal dimension is
continuous, so a quantization stage is required to compute the
histogram. However, an accurate quantization depends upon a
excessive training with large number of samples.
In this paper we approach the quantization problem by
proposing a new descriptor called Fractal Weighted Local
Binary Pattern (F WLBP) based on a commonly used method
of combining fractal dimension proposed by Chaudhuri and
Sarkar [27]. This method is based on differential boxcounting (D BC) algorithm [28]. Where instead of directly
measuring a texture surface, the measures at different scales
are obtained by means of counting the number of boxes of
different size, which can cover the whole surface.
In this paper, our main contributions are summarized below:
• We propose a simple, effective, yet robust fractaldimension based texture descriptor called Fractal
Weighted Local Binary Pattern (Sec. III-A) for texture
classification.
• The F WLBP descriptor achieves sufficient invariance to
address the challenges of scale, translation, and rotation
(or reflection); and is also partially tolerant to noise and
illumination for texture classification.
• The proposed algorithm takes a reasonable amount of
time in the feature extraction stage (Sec. III-B).
• We experimented and observed that our proposed descriptor outperforms the traditional L BP based and other stateof-the-art methods on different texture databases, such as
KTH-TIPS and CUReT (Sec. IV).
The remaining of this the paper is organized as follows.
Sec. II deals with the mathematical background of fractal
dimension, and our approach to convert the input image to
its FD form. The proposed F WLBP feature extraction scheme
is presented in Sec. III. In Sec. IV the performance of texture
classification is compared with the state-of-the-art methods.
Finally, concluding remarks are drawn in Sec. V.
II. F RACTAL D IMENSION
A fractal is a geometrical set whose Hausdorff - Besicovitch
dimension is strictly greater than its topological dimension
[30]. Mandelbrot introduced the term fractal to describe nonEuclidean, self-similar structures. The Fractal Dimension (FD)
of a structure gives an idea of its texture complexity, which
can be used to measure, analyse and classify shape and texture.
Fractal surfaces show the property of self-similarity.
In the Euclidian n-space, a set S is said to be self-similar,
if S is the union of Nr (s) distinct (non-overlapping) copies
of itself, each of which is scaled down by a ratio r > 0. Let
D(s)
(i.e. an exponential function of r), where
Nr (s) = k( 1r )
D(s) is a density function, and k is a constant. Then
1
log Nr (s) = log k + D(s) · log
(1)
r
Then, the local Fractal Dimension (FD) of s becomes
log(Nr (s))
D(s) = lim
.
(2)
r→0 log(1/r)
It is difficult to compute the local Fractal dimension D using
Eqn. (2) directly. In our implementation (Fig. 1), we transform
the texture images into FD images using the differential boxcounting (D BC) algorithm [28]. To achieve scale-invariance,
we construct a Gaussian scale space [31] using Eqn. (3):
Z
Γx,y,r = hGr (x, y)|I(x, y)i =
Gr (x, y)I(x, y)dxdy.
x,y∈R
(3)
In Eqn (3) a convolution formalism may be used when
convolution across the entire image is required. However, here
an inner product formalism (h.|.i) is more convenient where
Gr is a Gaussian smoothing kernel with variance r:
−kx2 k
1
Gr (x) = √ exp 2σ2
r 2π
As the 2D Gaussian function is separable [32], [33], its
convolution with the input image can be efficiently computed
by applying two passes of the 1D Gaussian function in the
horizontal and vertical directions:
Gr (x, y, r) = Gr (x)Gr (y).
The scaling operation to obtain Ir = Gr ∗ I (where ∗ represents
convolution operator) can be computed efficiently and stably
because of the properly localization of the Gaussian both in
space and frequency [34] even if the input image (I) is the result of physical measurement, so called directly sampled [35].
After constructing the Gaussian scale space, we use the D BC
algorithm on each layer of the scale space to generate a set
of intermediate images. We combine the intermediate images
into the final FD image using a linear-regression technique
adapted from [29].
The input texture image Ax,y (X × Y ) is used to generate a
Gaussian scale space Γx,y,r (X ×Y ×L) having L layers, with
scaling factor r varying from rmin , to rmax , and total number
of layers L = rmax −rmin +1. Each layer is considered as a 3−
D space, with (x, y) denoting the 2 − D position, and the third
coordinate, g, denoting the gray level. The D BC algorithm
is implemented by applying a varying-size non-linear kernel
bi,j (m × n), which operates on the image surface and finds
the difference between the maximum (gmax ) and the minimum
(gmin ) gray values of the region enclosed within the kernel
(Fig. 2). Non-negative integers α and β are used to center the
kernel b(i, j) on the pixel gx,y in the image layer. The kernel
is calculated as
β
α
X
X
gmax − gmin
b(i, j) =
floor
+1
(4)
r
i=−α
j=−β
where r is the scaling factor of the layer l, and
m−1
n−1
α = ceil
, and β = ceil
. (5)
2
2
The kernel is applied as
2
β
α
X
X
L
Ω(x, y, r) =
b(i, j)Γ(x + α, y + β, r)
(6)
r
i=−α
j=−β
iii
rmax
rmax rmax
Box n
Ax , y ( X Y )
rmin
rmin rmin
Image
intensity
surface
Box 2
(a)
Fx , y ( X Y )
Box 1
x , y ,r ( X Y L)
(b)
(e)
x , y ,r ( X Y L)
(d)
(c)
Fig. 1. Illustrates the Differential Box Counting (DBC) technique [28] for computing Fractal Dimension. (a) Input texture image. (b) Gaussian Scale Space
with six layers, generated from the input image with box sizes from rmin × rmin , . . . , rmax × rmax . (c) DBC is used to calculate the FD for each image
layer of the scale space. (d) Intermediate images. (e) Final FD image obtained using technique adapted from [29].
The slope can be determined by computing the sums of
squares:
P 2
X
( r)
(9)
Ψ1 =
r2 −
L
P 2 P 2
X
( r) ( Θ)
Ψ2 =
rΘ −
.
(10)
L
Finally, the FD image Fx,y (X × Y ) is calculated as:
g max
g min
F (x, y) = λxy =
=
Fig. 2. Image intensity surface enclosed within a box, showing the difference
between maximum and minimum gray values.
where Ωx,y,r (X × Y × L) is a matrix of intermediate images,
such that the first layer denotes the original image after it
has been filtered by the kernel with scale r = rmin , and the
highest layer denoting the image filtered by the kernel with
scale r = rmax . Thus, we define
g11r g12r · · · g1Y r
g21r g22r . . . g2Y r
Ω(x, y, r) = .
(7)
..
..
..
..
.
.
.
gX1r
gX2r
...
gXY r
The slope λx,y of the least square linear regression line
between Ω(x, y, r) and r will denote the pixel value F (x, y)
of the FD image Fx,y (X × Y ). For this purpose, a columnvector Θ is defined, such that the first gray values of all the
layers in Ω(x, y, r) comprise vector θ1 , all the second gray
values comprise vector θ2 etc. as shown in Eqn. (8).
Θ
θ1
θ2
..
.
θX×Y
=
g111
g121
..
.
g112
g122
..
.
···
...
..
.
g11L
g12L
..
.
gXY 1
gXY 2
...
gXY L
(8)
X X
Y
X
Ψ2
x=1 y=1
Ψ1
g11r
g21r
..
.
g12r
g22r
..
.
···
...
..
.
g1Y r
g2Y r
..
.
gX1r
gX2r
...
gXY r
.
(11)
Algorithm 1: Algorithm to compute FD image of input texture image.
1
2
3
4
5
6
Data: Input texture image, Ax,y (X × Y )
Result: Matrix Fx,y (X × Y ) containing FD values of each pixel of A
initialize (rmin = 2, rmax = 7, L = rmax − rmin + 1) ;
while (r ≥ rmin and r ≤ rmax ) do
Gr = Gaussian Kernel([r, r], r/2) ;
Γ(x,y,r) = hGr (x, y)|I(x, y)i;
/* Update D BC kernel b */
h
i
β
α
P
P
min
b(i, j) =
floor gmax −g
+1 ;
r
i=−α j=−β
7
8
/* Compute Ω(x, y, d) Matrix of intermediate FD values */
2
β
α
P
P
Ω(x, y, d) =
b(i, j)Γ(x + α, y + β, l) L
;
r
i=−α j=−β
9 end while
10 Convert the 3-D matrix Ωx,y,r (X × Y × L) to a column vector Θ, as
per Eqn. (8). ;
11 /* Compute sum of square */
12 Ψ1 =
13 Ψ2 =
P
P
P
( r)2
;
L
P
P
( r)2 ( Θ)2
−
L
r2 −
rΘ
14 Compute FD image F (x, y) =
;
X P
Y
P
x=1 y=1
Ψ2
Ψ1
;
A. Effects of Fractal Transform
An interesting property of the Fractal Transform is its invariance under bi-Lipschitz transform. A transform t : R2 → R2
iv
is called a bi-Lipschitz transform, if there exist two constants
0 < c1 ≤ c2 ≤ ∞ such that for any two points x1 , x2 ∈ R2 ,
c1 kx1 − x2 k < kt(x1 ) − t(x2 )k < c2 kx1 − x2 k
(12)
where kp1 − p2 k is the Euclidean metric between points p1
and p2 . So, any smooth transform (like translation, rotation,
projective transformation, texture warping of a regular surface,
change in viewpoint, and non-rigid deformation) is a biLipschitz transform [36], [37]. Up-sampling or down-sampling
by a factor of n are also special cases of the bi-Lipschitz
transform, where c1 = c2 = n. Then, we can drive the
following theorem:
Theorem 1. Let us consider an image as f (x), x ∈ R2 . Let
the fractal dimension and length of point x be D and L,
respectively. For a sampling function t(x) = nx, where n > 1
means up-sampling, and n < 1 means down-sampling, the
fractal dimension and length at point t(x) become
Dt = D,
Lt = L + D · log n
(13)
where L = log k.
Proof. For a point x, we have log Nr (x) = D · log( 1r ) +
L (from Eqn. (1)). By the definition of t(x) we know that
t is invertible and kt(x1 ) − t(x2 )k = n kx1 − x2 k. The biLipschitz constant ensures that Nr (t(x)) = N nr (x). Hence
we can write,
n
log N nr (x) = D · log + L
r
1
⇒ log Nr (t(x)) = D · log + D log n + L
r
(14)
1
⇒ log Nr (t(x)) = Dt · log + Lt
r
⇒ Dt = D,
Lt = L + D · log n
Hence, from the above theorem, the fractal dimension of an
image is invariant to scale changes, or in other words, invariant
to local bi-Lipschitz transforms, but not the fractal length of
the image. Theoretically, the fractal dimension of an image
remains unchanged when it is sampled-up with a factor of n
and vice-versa. This is our main motivation to take advantage
of the fractal dimension in our proposed descriptor.
III. P ROPOSED T EXTURE D ESCRIPTOR
Scale variations can create a dramatic impact on the appearance of a texture. There is no locally invariant texture
descriptor that can handle scale changes of such image intensity surface. Our goal in this paper is to build texture
descriptors which are invariant to scale changes in the intensity
surface of natural texture. Even local fractal dimension is a
powerful measurement of surface “roughness” of a natural
image, though the fractal dimension alone is not sufficient to
characterize natural texture. However, the FD yields continuous values and so it needs to be quantized. The quantization
process can be done by calculating the feature distribution
from all the training samples to know about the distribution
of feature space. Finally, some threshold value is calculated
to divided the feature space into fixed number of bins and
the quantization of test FD image is done according to the
training threshold values. Fig. 3 illustrates quantization process
of the feature space using four bins. There are the following
important limitations due to the quantization process, which
need to be addressed carefully.
• To determine the threshold values for each bin, it require
a pre-training stage.
• Texture images are captured under different geometric
and photometric varying conditions. So, the quantization
process fully depends on the training samples.
• The choice of number of bins is a challenging task
although there are some techniques [38] to select it. It
is always a trade-off between optimal number of bins for
the best of accuracy and feature size.
Since the distribution has a finite number of entries, choosing
a few bins may fail to provide sufficient discriminative power
while large number of bins may lead to sparse and unreliable
results. Hence, feature matching becomes computationally
inefficient. The method is explained in the following sections.
Fig. 3.
Quantization procedure of the feature space [39]
A. Fractal Weighted Local Binary Pattern (F WLBP)
A good texture descriptor should have four powerful characteristics: reliability, independence, discrimination, and small
size. Hence, we propose a simple, efficient, yet robust texturedescriptor called the Fractal Weighted Local Binary Pattern
(F WLBP) and offer a solution to the above problem based on
the concept of local image patterns exhibiting self-similarity.
The discrimination power of the proposed descriptor is enhanced by using the fractal dimensions as weights of the
histogram where the sampling method of indexing is an
augmentation of the native L BP [38]. We generated multi-scale
indexing images at different scales by varying the sampling
radius (R ∈ [Rmin , Rmax ]). However, to keep reasonable
complexity, we have kept number of sampling points (N )
constant across all the scales. Since fractal dimension is a
logarithmic function (Eqn. (2)), it helps to reduce effects
of illumination, because the log function expands the values
of darker pixels and compresses the brighter pixels in the
image. As a result, the FD values are spread more uniformly
[40]. Thus, the proposed descriptor is insensitive to scale,
translation, rotation or reflection, illumination; and is also
noise-tolerant.
After generating the scale-invariant FD image (Fig. 4b)
of the original texture using the D BC technique (Sec. II),
we proceed to compute the proposed descriptor – Fractal
v
the FD values of these n locations in the FD image are
F (x1 , y1 ), F (x2 , y2 ), . . . , F (xn , yn ), then the weight w of the
L BP value in the feature histogram becomes
(16)
w = F (x1 , y1 ) + F (x2 , y2 ) + . . . + F (xn , yn ).
(b)
(a)
I
Mathematically, it can be expressed as:
I
F WLBPR,N (p) = I(L BPR,N
x,y , Fx,y , p),
Rmin
O
Rmax
where
(e)
I
(c)
(d)
(f)
Fig. 4. Proposed F WLBP algorithm. (a) input texture image (b) computation
of FD image using Gaussian Scale Space and D BC algorithm (c) taking
L BPR,N samples from input image using R ∈ [Rmin , Rmax ] and constant
N (d) L BP images for varying R (e) indexing output FD image with the
different L BP images to calculate fractal weights (f) final feature vector
Weighted Local Binary Pattern (F WLBP). We generate multiresolution L BP images (Fig. 4(d)) from the input texture image
by varying the sampling radius R ∈ [Rmin , Rmax ] (Fig. 4(c)).
The L BP for a given pixel at location (x, y) in the input image
Ax,y (X × Y ) is computed by comparing its gray value ax,y
with a set of N local circularly and equally spaced neighbours
R,N
Px,y
placed at a radius R ( R ∈ [Rmin , Rmax ]) around the
pixel. L BP is computed for only those pixels whose all N
local neighbours lie within the image, and not for pixels along
the image boundary. The final L BP value of a given pixel is
calculated as
LBPR,N
x,y =
N
X
n=1
R,N
2n−1 × sign(Px,y
− ax,y )
p ∈ [0, 2N −1 ] (17)
(15)
where sign is a unit step function to denote whether a given
input is positive or not, and is defined as
(
1, z ≥ 0
sign(z) =
.
0, z < 0
The range of L BPR,N
x,y depends on the number of neighbouring sampling points (N ) around the pixel (x, y) at radius
R to form the pattern, and its value lies in between 0 to
2N −1 . In other words, the range of L BP is [0, 2N −1 ]. Fig. 4(d)
shows the computed local binary patterns (i.e. L BPR,N
x,y |R =
[Rmin , Rmax ]) for a candidate texture image (Fig. 4(a)).
Finally, we use an indexing operation I to combine each of
the L BP images with the previously generated FD image, and
then compute the feature histogram. The indexing operation
works as follows: in order to compute the histogram frequency
R,N
N −1
]) of
(weight) of a given pixel value (pR,N
x,y | px,y ∈ [0, 2
R,N
the L BP image L BPx,y , we refer to the FD image Fx,y (X ×
Y ). For all the pixel locations in the L BP image which have
the same value as pR,N
x,y , we find the sum of the FD values in
all the same pixel locations in the FD image. This sum is the
weight of the value pR,N
x,y in the histogram.
For instance, if the L BP value pR,N
x,y occurs at n locations
in the L BP image, namely (x1 , y1 ), (x2 , y2 ), . . . , (xn , yn ), and
I(L BPR,N
x,y , Fx,y , p), =
(P
∴ L BPR,N
x,y == p
otherwise
Fx,y ,
0,
where F WLBP(p) gives the weight of the value p in the
histogram, L BPR,N
x,y is the L BP image matrix constructed with
sampling radius R and N sampling points, Fx,y is the FD
image as computed in Sec.( II), and I is the indexing operation. The final F WLBP feature vector (Fig. 4(f)) is constructed
by concatenating all F WLBP(p) values. Since the weights of
the L BP histogram are decided by the value of the fractal dimensions, we named the descriptor as Fractal Weighted Local
Binary Pattern. Given a m texture image, we have created
the feature matrix Mm×n where each row corresponds to
the F WLBP descriptors of a texture. The principal component
analysis (P CA) feature is computed as following. Initially, we
compute the co-variance matrix Σ of feature matrix as,
Pn
(M(., i) − M(., i))(M(., i) − M(., i))T
Σ(i, j) = i=1
n−1
(18)
where Mm×n is the feature matrix, n is the number of feature,
M(., i) represents the ith column of M, and M(., i) is the
mean of respective column. We calculate eigen-vector e of
Σ if it satisfies Σe = λe. Where λ is an eigen-value of Σ.
The eigen-values of Σ are sorted in descending order as λ1 ≥
λ2 ≥ . . . ≥ λn and corresponding eigenvectors e1 , e2 , . . . , en
are used as columns of linear transform matrix U. Finally, M
is multiplied by UT . Thus, the P CA features are provided by
D = UT M. The scatter plot of proposed descriptor without
and with P CA are shown in Fig. 5.
20
200
0.01
15
0.008
150
0.006
10
0.004
100
5
0.002
0
50
140
120
100
80
60
40
20
50
100
150
200
250
300
0
1500
1000
500
(a)
1000
2000
3000
4000
0.035
0.03
0.025
0.02
0.015
0.01
0.005
(b)
0.04
0.06
0.08
0.1
(c)
0.15
300
2000
200
0.1
1000
100
0.05
0
0
0
−1000
−100
−2000
−200
−3000
−300
−4000
200
100
200
0
−100
0
−200
(d)
−200
6000
4000
2000
−0.05
−0.1
−0.15
−0.2
0.2
5000
0
−2000
0
−5000
(e)
0.1
0.2
0.1
0
0
−0.1
−0.1
−0.2
−0.2
(f)
Fig. 5. Top row (a)-(c) represent scatter plot of F WLBP feature, whereas
bottom row (d)-(f) represent F WLBP feature after P CA transform, are extracted
from Brodatz, KTH-TIPS and Outex TC10 databases .
vi
Algorithm 2: Algorithm to extract FWLBPx,y
R,N descriptor, where
N is the number of circular samples taken at radius R.
1
2
3
4
5
6
7
8
9
10
11
Data: Input texture image, Ax,y (X × Y ), FD image F (x, y)
Result: Normalized Fractal Weighted Local Binary Pattern (F WLBP)
Descriptor
initialize (Rmin = 1, Rmax = 3, N = 8, i = R + 1, j = R + 1,
k = [0, K]);
while (R ≤ Rmax ) do
/* Compute L BP image with sampling radius R, from a sample of
R,N
N local circularly spaced neighbours Px,y
around a central
pixel A(x, y) */
PN
R,N
L BP(x,y)R,N = n=1 2(n−1) × sign(Px,y
− A(x, y);
/* Compute weights of pixel values for histogram by indexing
operation */
R,N
F WLBP(p) = I(L
(PBPx,y , Fx,y , p) ;
Bx,y , f or all Bx,y where Ax,y == k
;
I(A, B, k) =
0,
otherwise
/* Generate histrograms, concatenate, and normalize */
HR,N = H IST(F WLBPR,N );
H FWLBP = concatNormalizeF WLBP(HR,N );
end while
B. Complexity of FWLBP
Assuming the image is of size M × M and the kernel is
of size r × r, the algorithmic complexity of the proposed
descriptors is computed as follows. To create the FD image
×M
of an input texture image with the number of blocks Mr×r
using Algorithm 1, the following operations are performed:
2M 2 comparisons, 4(M/r)2 addition, 5(M/r)2 subtractions,
4(M/r)2 multiplication and 2(M/r)2 divisions. Therefore
overall complexity of Algorithm 1 is O(M 2 ). In Algorithm 2,
assuming that neighboring pixels are considered with respect
to each center pixel for the evaluation of the L BP for FD image
of size M × M . The time complexity to evaluate Step 4 of
Algorithm 2 is O(p × M 2 ) [41] because p circular shifting
are required for each pixel, and there are M 2 pixels in total.
Step 6 of Algorithm 2 takes O(M 2 ) for Indexing operation
and Step 9 takes O(M 2 ) for building histogram. The overall
time complexity to compute the proposed F WLBP descriptor
using the combined Algorithms 1 and 2 is O(M 2 ).
C. Comparing Distribution of FWLBP
After computing the F WLBP descriptors, as elaborated in
the previous section, we need to represent their distributions
in the training (model) and test (sample) images. This is done
since the dissimilarity of sample and model histograms is a
test of goodness-of-fit, which can be measured with a nonparametric statistical test. Examples of metrics for evaluating
the fit between two histograms are histogram intersection,
log-likelihood ratio, and chi-square (χ2 ) statistic [38]. In this
paper, the classification is performed via a non-parametric
classifier called nearest subspace classifier (N SC) [42]. Here
we have chosen N SC over popular parametric classifier like
S VM due to the following reasons: the N SC finds an estimation
of the underlying subspace within each class and assigns data
points to the class that corresponds to its nearest subspace,
which does not required any parameter tuning, while S VM
has limitations in speed during both training and testing phase,
and there is always a trade-off between the selection of kernel
function, tuning of its hyper-parameters and classification
performance. In order to avoid the over emphasizing patterns
with large frequency, a pre-processing step is applied to the
proposed feature before using N SC, similar to that in [43]:
p
(19)
X¯m = Xm , m = 1, 2, ..., M
where M is the number of bins, and Xm is the original
frequency of the F WLBP at mth bin. The nearest subspace
classifier (N SC) first calculates the distance from the test
sample y to the ith class and measures the projection residual
ri from y to the orthogonal principle subspace Bi ∈ RM ×m
of the training sets
is spanned by the principal
P Xi , which
T
th
eigenvectors of
=
X
X
class, given as
i i for the i
i
follows,
ri = k(I − PBi )yk2 = k(I − Bi BT
i )yk2
(20)
where P = I ∈ RM ×M is a identity matrix where M rows
are selected uniformly at random. The test sample y is then
assigned to the one of the C classes with the smallest residual
among all classes, i.e.
i∗ = arg min ri
(21)
i=1,...,C
IV. E XPERIMENTAL E VALUATION
A. Texture Databases
We have evaluated the performance of our proposed descriptor on five standard texture databases: Outex TC-00010 (Outex TC10) [4], Outex TC-00012 (Outex TC12) [4], Brodatz album [44], KTH-TIPS [45], and CUReT [46] texture
database. We have compared the performance of the proposed
F WLBP descriptor with L BPR,N [38], L BPu2
R,N , D LBP R,N [41],
su2
riu2
riu2
[47],
multiscale
C
LBP
S
L BPsri
R,N
R,N /MR,N /C(1, 8 +
3, 16 + 5, 24) [48], B IF [9] and other state-of-the-art descriptors. We have tested the classification accuracy using a nonparametric classifiers – N SC, and have reported the classification accuracy using k-fold cross-validation test. In k-fold
cross-validation test, the feature set is randomly partitioned
into k equal sized subsets (k = 10). Of the k subsets, a
single subset is retained as the validation data for testing
the classifier, and the remaining (k − 1) subsets are used as
training data. The average of the classification accuracies over
k rounds give us a final cross-validation accuracy. We have
normalized each input image to have an average intensity of
128 and a standard deviation of 20 [38]. In VZ-MR8 and VZPatch methods, the texture samples are normalized to have an
average intensity of 0 and a standard deviation of 1 [10], [11],
[17]. This is done to remove global intensity and contrast. The
details of two experimental setups are given as follows:
TABLE I
S UMMARY OF T EXTURE DATABASE USED IN E XPERIMENT #2
Texture
Database
KTH-TIPS
Brodatz
CUReT
Image
Rotation
X
X
X
Illumination
Variation
X
X
Scale
Variation
X
X
Texture
Classes
10
32
61
Sample
Size (pixels)
200 x 200
64 x 64
200 x 200
Samples
per Class
81
64
92
Total
Samples
810
2048
5612
E XPERIMENT #1: Brodatz [44] album is chosen to allow a
direct comparison with the state-of-the-art results [41]. There
vii
are 32 homogeneous texture classes 1 . Each image is partitioned into 25 non-overlapping sub-images of size 128 × 128,
and each sub-image is down-sampled to 64 × 64 pixels.
Fig. 6. Ten texture images randomly taken from each class of KTH-TIPS
database.
For the CUReT database [46], we have used the same
subset of images as in [8], [10], [18], which contain 61 texture
classes with 92 images per class. It is designed to contain
large intra-class variation and is widely used to assess the
classification performance. The images are captured under
different illumination and viewing directions with constant
scale. All 92 images of 61 texture classes are cropped into
200 × 200 region and converted to gray scale [10].
The KTH-TIPS database [45] is extended by imaging new
samples of ten CUReT textures as shown in Fig. 6. It contains
texture images with 3 different poses, 4 illuminations, and 9
different scales of size 200×200 and hence each class contains
81 samples. The KTH-TIPS, Brodatz, and CUReT, databases
are summarized in Table I.
TABLE II
S UMMARY OF T EXTURE DATABASE USED IN E XPERIMENT #2
Texture
Database
Outex TC10
Outex TC12
Image
Rotation
X
X
Illumination
Variation
X
Scale
Variation
Texture
Classes
24
24
Sample
Size (pixels)
128 x 128
128 x 128
Samples
per Class
180
200
Total
Samples
4320
4800
E XPERIMENT #2: 24 different homogeneous texture classes
are selected from the Outex texture databases [4], each having the size of 128 × 128 pixels. Outex TC 00010 (Outex TC10) contains texture with illuminant “inca”, and Outex TC 00012 (Outex TC12) contains textures with illuminants “inca”, “horizon”, and “tl84”. Both of the Outex
test suites are collected under 9 different rotation angles
◦
◦
◦
◦
◦
◦
◦
◦
◦
(0 , 5 , 10 , 15 , 30 , 45 , 60 , 75 , and 90 ) in each texture
class. The test suites Outex TC10, and Outex TC12 are
summarized in Table II. Running experiments on the whole
Fig. 7. 24 texture images randomly taken from each class of Outex TC10
and Outex TC12 database
database is challenging due to a large number of texture
classes, small number of samples per class, and lack of intraclass variation.
1 The 32 Brodatz textures are Bark, Beachsand, Beans, Burlap, D10, D11,
D4, D51, D52, D5, D6, D95, Fieldstone, Grass, Ice, Image09, Image15,
Image17, Image19, Paper, Peb54, Pigskin, Pressedcl, Raffia2, Raffia, Reptile,
Ricepaper, Seafan, Straw2, Tree, Water, Woodgrain;
TABLE III
C OMPARISON WITH OTHER VARIANTS OF L BP
Methods
Classifier
L BPV [49]
B RINT [50]
L BPriu2
1,8 [38]
D LBP3,24 [41]
sri
L BP1,8 su2 [47]
N NC
N NC
N NC
S VM
N NC
N NC
N NC
N NC
S VM
N NC
N NC
N NC
N SC
L BP(1,8+2,16+3,24) [38]
C LBP SMC [48]
S SLBP [43]
P RI C O L BPg [51]
L BPHF S [52]
L BPHF S M [53]
C OA L BP [54]
Proposed F WLBP
Classification Accuracy (%)
KTH-TIPS [45]
Brodatz [44]
CUReT [46]
95.50
93.80
94.00
97.75
99.22
97.06
82.67
82.16
80.63
86.99
99.16
84.93
89.73
69.50
85.00
95.17
91.60
95.84
97.19
94.80
97.40
97.80
98.55
98.40
96.90
98.40
97.00
94.60
95.90
97.00
94.60
95.90
97.00
94.20
98.00
99.75
99.62
99.10
B. Results of Experiment #1
To test the scale invariance performance of the proposed
descriptor, we have used the KTH-TIPS database, which
contains relatively small variations in scales (i.e, 9 scales,
continually from 0.5 to 2) [45].
In literature, for texture classification task usually L BP
variants were used, in this section, we compared F WLBP
descriptor with some powerful variant of L BPs, which includes
su2
C LBP [48], L BPV [49], LTP [55], Dlbp [41], L BPsri
[47],
R,N
P RI C OLBP [51], B RINT [50], and C OA L BP [54]. The classification performance is evaluated on three well known benchmark texture databases (KTH-TIPS, Brodatz, and CUReT)
and results are shown in Table III. The observations noted
su2
from Table III are as follows: The scale-invariant L BPsri
R,N
riu2
descriptor performs better than L BPR,N . However, the perriu2
formance is worse than multi-resolution L BPR,N
descriptor,
riu2
riu2
and C LBP SR,N /MR,N /C descriptor; and much worse than
the proposed descriptor. This is because extracting consistent
and accurate scale for each pixel is difficult. However, the
su2
L BPsri
R(i,j),8 provides good performance in controlled environment [47], but it fails over more complex databases. The
D LBP, when combined with Gabor features, attains a higher
classification rate than the conventional L BP with N NC. However, its performance is quite less than the proposed F WLBP,
as it does not consider changes in scale. F WLBP achieves remarkably better classification performance than C LBP, L BPV,
L BPHF S and L BPHF S M on KTH-TIPS, Brodatz and
CUReT, texture datasets and yields comparable performance
with D LBP. Note that L BP, L BPHFS , L BPHF S M , C LBP,
and L BPV generally encode multi-scale information whereas
the proposed F WLBP descriptor encodes the spatial fractal
dimension to characterize the local scale information into the
1-D L BP histogram.
Table IV shows performance of texture classification performance other than L BP variants. Lazebinik et al. [20]
proposed to detect interest regions using Harris-affine corner
and Laplacian-affine blobs and then extracted S PIN and R IFT
as texture signatures after normalizing these regions. Finally,
texture classification is performed using nearest neighbor
classifier (N NC). Caputo et al. [56] used S VM kernel instead
of N NC and reveal that the S VM classifier could achieve
reasonably better performance. Zhang et al. [8] proposed
viii
0.8
FWLBP
LBP
0.6
1
S
3
S
4
S
5
S
6
S
7
S
8
S
9
S
(d)
S
2
0.4
0.2
0
(a)
(b)
1
2
3
4
5
Scales
6
7
8
(c)
Fig. 8. (a)-(c) represent the individual histograms (HR,N of F WLBP, where R = 1, 2, 3 and N = 8) for a texture sample taken from the KTH-TIPS database
[45], having 9 different scales. The abscissa and ordinate represent number of bins and feature probability distribution, respectively. As the histograms of
individual F WLBP for the 9 different scales are overlapping, it implies that the F WLBP descriptor is scale invariant. (d) represents the Chi-square (χ2 ) distance
of proposed F WLBP and L BP descriptor extracted from original texture image (S 1 ) and 8 texture image with different scale (S 2 − S 9 ).
Methods
Classifier
VZ-MR8 [10]
VZ-Patch [11]
Lazebnik et al. [20]
Zhang et al. [8]
Liu et al. [18]
M FS [24]
Capato et al. [56]
P FS [5]
B IF [9]
Proposed F WLBP
N NC
N NC
N NC
S VM
S VM
N NC
S VM
S VM
Shift N NC
N SC
Classification Accuracy (%)
KTH-TIPS [45]
Brodatz [44]
CUReT [46]
94.50
94.62
97.43
92.40
87.10
98.03
91.30
88.20
72.50
96.10
95.90
95.30
94.20
98.50
81.62
94.80
95.00
98.50
97.35
98.50
98.47
98.60
99.75
99.62
99.10
It is interesting to note that even for the database having
large number of variations and a few number of samples, this
property can make the proposed descriptor suitable for other
applications where the number of features plays an important
role.
100
99
98
Accuracy (%)
TABLE IV
T EXTURE C LASSIFICATION R ESULTS ON KTH-TIPS, B RODATZ , AND
CUR E T
97
96
95
Outex_TC10
KTH−TIPS
Brodatz
94
93
object and texture classification by analyzing different texture
features and kernels. Recently, global scale invariant feature
extraction methods drew attention because local scale normalization is usually slow due to pixel by pixel operations. Xu et
al. [21] and Quan et al. [5] have classified the image pixels
into multiple point sets by gray intensities or local feature
descriptors. Multi-scale B IF [9] at scales σ, 2σ, 4σ, and 8σ
gives better performance than the proposed F WLBP with N NC
classifier. This is mainly because B IF uses pyramid histogram
with time inefficient shift matching scheme. Also, the feature
dimension of B IF descriptor [9], C LBP [48], S SLBP [43] and
P RI C OLBP [51] are larger (64 = 1296, 2200, 480 × 5 = 1000
and 590 × 2 = 1180) than the dimension of proposed F WLBP
descriptor (256×3 = 768). The performance of B IF is reduced
when scale shifting scheme is not considered [9]. Apart from
bag-of-words model, the variant of L BP based descriptors,
sri su2
e.g., C LBP 2 , L BPV, LTP, D LBP, L BPR,N
, P RI C OLBP,
B RINT, C OA L BP, and S S L BP also perform reasonably well
on texture classification task. The observations noted from
Table IV are as follows: F WLBP also exceeds the classification
performance of several bag-of-words methods, [8], [11], [18],
[20], [54], [56]. Fig. 9 shows the graph of success rates
against the number of selected feature on Brodatz, KTHTIPS and Outex TC10 texture databases. The classification
rate of proposed descriptor rapidly increases due to P CA
transform, which carries the most relevant information with
large variance among the first component of the feature matrix.
2 We
used the best C LBP settings i.e., C LBP S/M/C in this paper
92
50
100
150
200
Feature Dimension
250
300
Fig. 9. Success rate against the number of descriptors on Brodatz, KTH-TIPS
and Outex TC10 texture databases
Although the images are captured under scale, rotation,
and illumination variations, the proposed F WLBP gives sound
performance as given by results in Table IV, and achieves
comparable, and sometimes even better performance, than the
state-of-the-art methods. It validates that the encoding strategy
preserves the relative information about local scale change
along with orientation angle are effective. An illustration of
the scale invariance property of the proposed descriptor is
given in Fig. 8, where S1 -S9 show nine KTH-TIPS texture
images of “corduroy” class at different scales from 0.5 to
2, and (a)-(c) depict the histograms (HR,N |R ∈ [1, 2, 3])
of individual F WLBPR,N descriptor with R = 1, 2, 3, and
N = 8. It is evident from Fig. 8(a)-(c) that the histograms of
individual F WLBP for the 9 different scales are approximately
identical. In addition Fig. 8(d) shows the Chi-square (χ)
distance [11] between extracted F WLBP and L BP descriptor
from original texture image (S 1 ) and 8 texture images with
different scale (S 2 − S 9 ), its shown that proposed descriptor
has less χ-distance compared to L BP. Therefore, from both
the observations it implies that the F WLBP descriptor is not
sensitive to small scale variations. The proposed descriptor
achieves scale invariance by utilizing the properties of Fractal Dimension and Gaussian Scale Space, as explained in
ix
Theorem 1. Fig. 10(a)-(b) represent images of two texture
classes taken form Brodatz database and Fig. 10(c) shows P CA
transformed F WLBP descriptor extracted from three images
per texture class and respective feature probability distribution
functions (P DF). Since both texture classes contain very small
intra-class variation even though their P DF provides a strong
indication about the discriminative power of the proposed
descriptor.
3
class 1
class 2
2.8
2.6
PDF
2.4
(a)
2.2
2
1.8
1.6
1.4
1.2
1
2
4
6
8
10
Descriptors
(b)
(c)
Fig. 10.
Discriminative power of the proposed F WLBP descriptors are
visualized using P CA. We have taken 6 images from two classes of Brodatz
textures and extracted the F WLBP. Notice that the classes are substantially
separated by the curves.
TABLE V
T HE C LASSIFICATION ACCURACIES OF PROPOSED F WLBP AND F WLBPu2
DESCRIPTORS USING DIFFERENT SCALING FACTORS OF D BC ALGORITHM
ON BRODATZ TEXTURE DATABASE .
Methods
Proposed
FWLBP
Std.
Error
Proposed
FWLBPu2
Std.
Error
Classification Rates With Different box sizes ranges rmin to rmax
2×2
2×2
2×2
2×2
2×2
to
to
to
to
to
2×2
3×3
4×4
5×5
6×6
7×7
99.24
99.25
99.27
99.27
99.31
99.62
±0.9216
0.0052
±0.9688
0.0052
±0.7547
0.0052
±0.6701
0.0104
±0.6484
0.0104
±0.3257
0.0002
98.05
98.16
98.30
98.45
98.53
98.57
±0.6717
0.0156
±0.8426
0.0208
±0.8590
0.0208
±0.8058
0.0156
±0.7514
0.0104
±0.7243
0.0260
C. Analysis of parameter rmax
The proposed fractal based descriptor has only one hyperparameter rmax , which is the maximum value of the scaling
factor of the D BC algorithm. The rmax represents how much a
specific intrinsic structure is self-similar [36] to its surrounding
pixels. The different values of rmax influence the deviation of
classification accuracies. Table V shows recognition accuracy
for Brodatz textures using proposed F WLBP and F WLBPu23 ,
where rmax values are ranging from 2 to 7. Its shows clearly
that both the descriptors have similar trends towards rmax and
recognition rate increases till it reaches rmax to 7. Table V also
indicates that for different scaling factors the proposed F WLBP
descriptor significantly outperforms F WLBPu2 on well-known
Brodatz texture database (includes images of scale and rotation
or view-point variations). To compute fractal dimension of an
image of size less than let say, 200 × 200 fast, Faraji and
Qi [40] recommend rmax to be used in between 7 and 10 to
3 Where
‘u2’ indicates uniform pattern encoding;
compromise between good texture recognition accuracy and
computational overheads. In our experimental setup, we use 7
as rmax value for all the texture databases.
D. Results of Experiment #2
The results of Experiment #2, carried out on Outex TC10
and Outex TC12 are tabulated in Table VI. It shows the average classification accuracy obtained by k-fold cross-validation
test (k = 10) for proposed descriptor, and the comparative
summary of the results for variants of L BP e.g., L BP(R,N )
[38], VZ-MR8 [10], VZ-Patch [11] and recent state-of-theart bag-of-word methods. The observations made from the
results of Experiment #2 are stated as follows. L BP and L BPV
have similar feature dimensions, but the later one incorporates additional contrast measures to the pattern histogram,
it produces a significant performance improvement compared
to the conventional L BP. L BPriu2
R,N /VAR R,N provides better
performance compared to L BPVriu2
R,N , because L BP and local
variance of a texture image are complementary; and hence
the joint distribution of L BP and local variance gives better
results than any one alone. C LBP S/M/C is created by fusing
C LBP S and C LBP M/C. It provides better performance
compared to other variants of C LBP as it has complementary
features of sign and magnitude, in addition to the center pixel
representing the gray value of the local patch. C DCP [23]
achieves improved performance over C LBP since in C DCP
patterns are extracted from component and holistic levels.
The state-of-the-art bag-of-words statistical algorithms, VZTABLE VI
AVERAGE CLASSIFICATION ACCURACY (%) ON O UTEX TC10 AND
O UTEX TC12 USING STATE - OF - THE - ART SCHEMES
Method
Classifier
Outex TC10
VZ-MR8 [10]
VZ-Patch [11]
LTP [55]
VAR [57]
L BP [38]
L BPriu2
R,N
L BP/VAR
riu2
L BPVR,N [49]
C LBP S/M/C [48]
T
L BPN
R,N [58]
D LBPR=3,N =24 [41]
B RINT C S C M [50]
P TP [59]
C DCP [23]
Proposed F WLBP
N SC
N SC
N NC
N NC
S VM
N NC
N NC
N NC
N NC
N NC
S VM
N NC
N NC
N SC
N SC
93.59
92.00
76.06
90.00
97.60
84.89
96.56
91.56
98.93
99.24
98.10
99.35
99.56
99.76
99.97
Outex TC12
horizon
tl84
92.82
92.55
92.06
91.41
63.42
62.56
64.35
62.93
85.30
91.30
63.75
65.30
78.08
79.31
77.01
76.62
92.29
90.30
96.18
94.28
87.40
91.60
97.69
98.56
98.08
97.94
99.82
99.62
99.98
99.93
Average
92.99
91.82
67.34
72.42
91.40
71.31
84.65
81.73
93.84
96.56
92.36
98.12
98.52
99.72
99.96
MR8 and VZ-Patch, take dense response from multiple filters.
However, their performance is poor compared to the proposed
F WLBP. Also, feature extraction and matching complexity
of these two techniques is quite high [11], when compared
to the proposed F WLBP due to the MR8 needs to find 8
maximum responses after 38 filters convolving with the image
and compares every 8-dimension vector in an image with all
the textons to build histograms using clustering technique.
D LBP + N GF utilizes the top ranking 80% of L BP pattern
to improve the recognition, as compared with the results
obtained using original L BPu2
R,N . But like VAR R,N , it neglects local spatial structure which is important for texture
discrimination. Also, D LBP needs pre-training stage, and the
dimensionality of the D BLP varies with the training samples.
x
0.7
FWLBP
0.6
5
10
15
30
45
60
75
LBP
0.5
90
(d)
0
0.4
0.3
0.2
0.1
0
(a)
(b)
1
2
3
4
5
Angles
6
7
8
(c)
Fig. 11. (a)-(c) represent individual F WLBP histograms (F W LBPR,N |R ∈ [1, 2, 3]) of a texture sample taken from the Outex database, with 9 different
orientations. The abscissa and ordinate represent the number of bins and feature probability distribution, respectively. The histograms show that the feature
distribution for the different texture orientations are approximately overlapping, which signify the rotation invariance property of the proposed F WLBP descriptor.
◦
◦
◦
(d) represents the Chi-square (χ) distance between original texture image (0 ) and 8 texture image with different angles (5 − 90 )
Though the trend is clear from the performance Table VI,
we have further analysed the performance using one way
statistical analysis of variance (A NOVA) test [60]. A NOVA is
a collection of statistical tests used to analyze the differences
among group means and their associated procedures. In other
word, one-way A NOVA is used to test the equality of two
or more means at one time using the variances. The null
hypothesis H0 for the test is, there is no significant difference
among group means. We have taken the significance level α
= 0.05 for this A NOVA test. We can reject H0 if the p-value
for an experiment is less than the selected significant level,
which implies that the at least one group mean is significantly
different from the others. To understand why the performance
of proposed F WLBP descriptor was significantly different from
well-known descriptors such as VZ-Patch, VZ-MR8, B RINT,
D LBP, C LBP, and L BPriu2 , we conduct one way A NOVA test
with significance level α = 0.05. The test results are shown
in Table VII where the p-value (1.6460e−07 ) is much lesser
than the pre-select significance level α = 0.05. This indicates
that the performance of proposed descriptor significantly better
than other descriptors and hence we can reject the hypothesis
H0 . In addition, the box plot corresponding to aforementioned
A NOVA test is shown in Fig. 12, which also clearly indicates
that the mean performance of F WLBP descriptor is significantly better than the well-known descriptors such as VZ-MR8
[10], VZ-Patch [11], B RINT [50], D LBP [41], C LBP [48], and
L BPriu2 [38].
100
Recognition rates (%)
For comparison, we have taken the best results of D LBP with
T
R = 3 and N = 24 in Table. VI. The L BPN
R,N [58] based
methods and B RINT [50] give better performance compared
to other state-of-the-art L BP methods. However, compared
to the proposed F WLBP, their accuracies are lower. This is
T
because L BPN
R,N extracts features by locally rotation invariant
riu2
L BPR,N approach, which produces only 10 bins. Such small
features cannot represent each class well. On the other hand,
B RINT extracts a large number of features from multiple
resolution (R = 1, 2, 3, 4) by utilizing rotation invariant
L BPri
R,N approach, but it loses some global image information.
From Table VI, it is evident that our proposed descriptor
provides better classification performance compared to other
state-of-the-art methods. The better performance is due to
generation of a six-layer Gaussian Scale Space to provide
basic scale-invariance (Fig. 1), transforming the scale space to
fractal dimension (FD) images, which also provides additional
levels of scale invariance and some degree of illumination
invariance (Sec. III), and finally using the FD as weights for
the values in the feature vector histograms. When all these are
put together we achieve high degree of invariance to scale,
rotation, and reflection, and are able to capture the micro
structure in the different illumination controlled environments
(for images like “inca”, “horizon” and “tl84”). To visualize the
rotation invariant characteristic of our proposed descriptor, an
example of the F WLBP feature distribution for a texture sample
is taken from the Outex TC10 database (with 9 orientations –
◦
◦
◦
◦
◦
◦
◦
◦
◦
0 , 5 , 10 , 15 , 30 , 45 , 60 , 75 , and 90 ) and is shown in
Fig. 11. Fig 11(a)-(c) represent the histograms (HR,N |R ∈
[1, 2, 3]) of individual (F WLBPR,N |R ∈ [1, 2, 3]). The histograms show that the F WLBP feature distribution for the
different texture orientations are approximately overlapping,
which signify the rotation invariance property of the F WLBP
descriptor. In addition, Fig. 11(c) represents the histograms of
individual F WLBP for the 9 different rotational angles, which
are approximately identical. In addition, Fig. 8(d) shows the
Chi-square (χ) distance [11] between extracted F WLBP and
◦
L BP features from original texture image (0 ) and 8 texture
◦
◦
images with different rotational view-points (5 − 90 ), it
is shown that the proposed descriptor has less χ-distance
compared to L BP.
95
90
85
80
75
70
65
FWLBP VZ−Patch VZ−MR8
BRINT
DLBP
CLBP
LBP_riu2
State−of−the−art descriptors
Fig. 12. The box plot (Descriptor vs. Accuracy) corresponding to one way
statistical A NOVA test for proposed F WLBP and state-of-the-art descriptors on
Outex, KTH-TIPS, Brodatz, CUReT databases.
xi
TABLE VII
O NE WAY STATISTICAL A NOVA TEST RESULTS FOR O UTEX , KTH-TIPS,
B RODATZ , AND CUR E T DATABASES , WHERE THE SIGNIFICANCE LEVEL α
IS 0.05.
Source
Groups
Error
Total
SS
1923.34
0621.82
2515.67
df
06
28
34
MS
325.557
022.208
F
14.36
Prob (p) > F
1.6460e−07
where the convolution filters are pre-defined as wavelet and
no learning process is needed. Inspired by ScatNet, a simple
deep learning network, P CA N ET is proposed by chan et al.
[64] which is based on cascading of multistage P CA, binary
hashing and histogram pooling.
E. Robustness to Noise
S NR = 5
24.06
99.74
51.22
57.37
50.88
88.31
99.93
Table VIII demonstrates the noise robustness of different
methods on Outex TC10 database based on classification rates
of various noise levels (measured using S NR i.e Signal to
Noise Ratio). The proposed descriptor achieves state-of-theart results in term of accuracy mean and standard deviations
100 ± 0%, 100 ± 0%, 99.97 ± 0.0732%, 99.95 ± 0.0976%,
and 99.93 ± 0.1118% on S NR = 100 dB, 30 dB, 15 dB, 10
dB, and 5 dB, respectively. It can be observed from Table VIII
that the proposed F WLBP descriptor is very modestly improved
as compared with other L BP based descriptors. The proposed
descriptor has inherited this property from the calculation of
fractal dimension in Gaussian scale space representation in
contrast to the L BP and its variants.
F. Comparison of Proposed F WLBP with state-of-art deep
learning based methods
A key characteristic of deep convolutional neural networks
(C NN)(see Fig. 13) is a hierarchical representation which is
universal and directly generated from the data, used to perform
image classification task. Deep C NNs have universal shown
their power of pattern recognition. However, the robustness for
recognition is limited due to the lack of geometric invariance
of global C NN activations. An effective texture descriptor FVCNN has been introduced by Cimpoi et al. [7], where at first
C NN features are extracted at multiple scales. Then an orderless Fisher Vector pooling operation is performed. Despite
significant progress of deep C NN models, not much analytical
insights into its internal operation and behaviour is available.
Mallat et al. [62], [63] have introduced scale and rotation
invariant wavelet convolution scattering network (ScatNet)
TABLE IX
T HE TEXTURE CLASSIFICATION PERFORMANCE AND FEATURE
DIMENSIONALITY OF THE PROPOSED L MP AND STATE - OF - ART DEEP
LEARNING BASED METHODS
Classification Accuracy (%)
Methods
FV-VGGDM (S VM) [7], [65]
FV-AlexNet (S VM) [65], [67]
S CAT N ET (P CA) [62], [63]
S CAT N ET (N NC) [62], [63]
P CA N ET (N NC) [64]
P CA N ETriu2 (N NC) [64]
R AND N ET (N NC) [64]
R AND N ETriu2 (N NC) [64]
Proposed F WLBP (N NC)
Proposed F WLBP (N RS)
80.00
67.30
99.69
98.59
39.87
35.36
47.43
43.54
99.79
99.86
82.30
72.30
99.06
98.10
45.53
40.88
52.45
45.70
99.41
99.73
88.20
77.90
68.92
63.66
59.43
52.15
60.67
56.90
98.37
99.87
99.80
99.10
96.15
88.64
57.70
49.80
56.57
48.20
97.12
99.90
Feature
C LBP SMC [48]
LTPriu2
R=3,N =24 [55]
N RLBPriu2
R,N [61]
B RINT [50]
Proposed F WLBP
Classification Accuracy (%)
S NR = 30
S NR = 15
S NR = 10
86.93
67.24
49.79
99.79
99.76
99.76
98.12
94.58
86.07
98.31
93.44
84.32
81.16
77.52
70.16
96.48
95.47
92.97
100
99.97
99.95
Dimention
N NC
N NC
N NC
N NC
N NC
N NC
N NC
S NR = 100
95.03
99.30
99.45
84.49
97.76
100
UIUC
Classifier
L BPriu2
R,N [38]
T
L BPN
R,N,k [58]
KTH-TIPS
Methods
A simple variation of P CA N ET, named R AND N ET, in which
the cascaded filters are randomly selected but not learned, was
also proposed by Chan et al. [64]. One of the major trends
in deep C NN research community is to use more and more
complex networks to improve the classification performances.
However, it needs the powerful and large memory computer
and GPUs to train very deep and computationally expensive
networks. The comparative results of texture classification performance with feature dimensionality of the proposed F WLBP
and state-of-art deep learning based methods such as F V-C NN
[7], [65], S CAT N ET [62], [63], P CA N ET, P CA N ETriu2 , and
R AND N ET [64], are tabulated in Table IX. It is observed from
Table IX that the proposed F WLBP provides comparable or
better classification performance compared to state-of-art deep
learning based methods. In addition, the feature dimension
of proposed F WLBP descriptor is less than the deep learning
based models4 .
Outex TC12
TABLE VIII
C LASSIFICATION ACCURACY (%) OF P ROPOSED M ETHOD AND
D IFFERENT STATE - OF - THE - ART M ETHODS ON O UTEX TC10 WITH
D IFFERENT N OISE L EVELS IN TERM OF D B .
Fig. 13. A Deep C NN architecture where the input is processed in a feed
forward manner through the stage of convolutions and sub-sampling and
finally classified with a linear or non-linear classifier.
Outex TC10
To evaluate the performance of the proposed method in
noisy environment, the experiments are carried out on Outex TC10 texture database (discussed in subsec. IV-A) by
adding white Gaussian noise, resulting in different Signal to
Noise Ratio (S NR). The training and testing set-up are the
same as in noise-free situation.
65536
32768
596
596
2048
80
2048
80
354
354
V. C ONCLUSIONS
In this paper, we have proposed a simple, efficient yet robust
descriptor, called the Fractal Weighted Local Binary Pattern
(F WLBP) for texture classification. At first, a Gaussian Scale
Space representation of the texture image is generated, and
4 The
results of deep learning based methods are taken from Liu et al. [66]
xii
then Differential Box Counting (D BC) algorithm is used to
transform the images into fractal dimension. An augmented
form of Local Binary Pattern (L BP), with fixed sample size
and varying radius is used, and the weights for the samples are
calculated using an indexing function. Finally, the normalized
feature vector is formed by concatenating the histogram of
F WLBP for all elements of L BP. Experimental results show
that our proposed F WLBP descriptor provides promising performance under scale, rotation, reflection, and illumination
variation. Comparative study indicates that our descriptor also
performs better, as compared to other state-of-the-art methods.
In addition, the dimensionality of the extracted feature vector
is significantly less the state-of-the-art method, making it
computationally efficient. As it offers reasonably high speed
to extract the features, this descriptor may be applied to
real time scenarios. Our current work is focused on texture
classification. In future, this work can be utilized in texture
classification in multi-texture scenario, also in other domains
like face and object recognition.
ACKNOWLEDGEMENT
The authors sincerely thank the Machine Vision Group
(MVG), University of Oulu, Finland, Visual Geometry Group
(VGG), University of Oxford, UK, Department of Computing,
The Hong Kong Polytechnic University, China, and Department of Computer Science, University College London, UK
for sharing the source codes of L BP, VZ-MR8, C LBP, and
B IF descriptors. The authors would also like to thank Manik
Varma, Timor Kadir and Andrew Zisserman for providing
preprocessed CUReT datasets.
R EFERENCES
[1] X. Xie and M. Mirmehdi, “A Galaxy of Texture Features,” in Handbook
Of Texture Analysis. World Scientific, 2008, pp. 375–406.
[2] R. M. Haralick, K. Shanmugam et al., “Textural features for image
classification,” IEEE Transactions on systems, man, and cybernetics,
no. 6, pp. 610–621, 1973.
[3] T. Randen and J. H. Husoy, “Filtering for texture classification: A
comparative study,” IEEE Transactions on pattern analysis and machine
intelligence, vol. 21, no. 4, pp. 291–310, 1999.
[4] T. Ojala, T. Maenpaa, M. Pietikainen, J. Viertola, J. Kyllonen, and
S. Huovinen, “Outex-new framework for empirical evaluation of texture
analysis algorithms,” in Pattern Recognition, 2002. Proceedings. 16th
International Conference on, vol. 1. IEEE, 2002, pp. 701–706.
[5] Y. Quan, Y. Xu, and Y. Sun, “A distinct and compact texture descriptor,”
Image and Vision Computing, vol. 32, no. 4, pp. 250–259, 2014.
[6] V. Andrearczyk and P. F. Whelan, “Using filter banks in convolutional
neural networks for texture classification,” Pattern Recognition Letters,
vol. 84, pp. 63–69, 2016.
[7] M. Cimpoi, S. Maji, I. Kokkinos, and A. Vedaldi, “Deep filter banks
for texture recognition, description, and segmentation,” International
Journal of Computer Vision, vol. 118, no. 1, pp. 65–94, 2016.
[8] J. Zhang, M. Marszałek, S. Lazebnik, and C. Schmid, “Local features
and kernels for classification of texture and object categories: A comprehensive study,” International journal of computer vision, vol. 73, no. 2,
pp. 213–238, 2007.
[9] M. Crosier and L. D. Griffin, “Using basic image features for texture
classification,” International Journal of Computer Vision, vol. 88, no. 3,
pp. 447–460, 2010.
[10] M. Varma and A. Zisserman, “A statistical approach to texture classification from single images,” International Journal of Computer Vision,
vol. 62, no. 1-2, pp. 61–81, 2005.
[11] ——, “A statistical approach to material classification using image
patch exemplars,” IEEE transactions on pattern analysis and machine
intelligence, vol. 31, no. 11, pp. 2032–2047, 2009.
[12] I. WEISS, “Geometric invariants and object recognition,” International
journal of computer vision, vol. 10, no. 3, pp. 207–231, 1993.
[13] R. L. Kashyap and A. Khotanzad, “A model-based method for rotation
invariant texture classification,” IEEE Transactions on Pattern Analysis
and Machine Intelligence, no. 4, pp. 472–481, 1986.
[14] J. Mao and A. K. Jain, “Texture classification and segmentation using
multiresolution simultaneous autoregressive models,” Pattern recognition, vol. 25, no. 2, pp. 173–188, 1992.
[15] J.-L. Chen and A. Kundu, “Rotation and gray scale transform invariant
texture identification using wavelet decomposition and hidden Markov
model,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, no. 2, pp. 208–214, 1994.
[16] H. Deng and D. A. Clausi, “Gaussian MRF rotation-invariant features
for image classification,” IEEE transactions on pattern analysis and
machine intelligence, vol. 26, no. 7, pp. 951–955, 2004.
[17] M. Varma and R. Garg, “Locally invariant fractal features for statistical
texture classification,” in Computer Vision, 2007. ICCV 2007. IEEE 11th
International Conference on. IEEE, 2007, pp. 1–8.
[18] L. Liu and P. Fieguth, “Texture classification from random features,”
IEEE Transactions on Pattern Analysis and Machine Intelligence,
vol. 34, no. 3, pp. 574–586, 2012.
[19] C.-H. Yao and S.-Y. Chen, “Retrieval of translated, rotated and scaled
color textures,” Pattern Recognition, vol. 36, no. 4, pp. 913–929, 2003.
[20] S. Lazebnik, C. Schmid, and J. Ponce, “A sparse texture representation
using local affine regions,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 27, no. 8, pp. 1265–1278, 2005.
[21] Y. Xu, H. Ji, and C. Fermüller, “Viewpoint invariant texture description using fractal analysis,” International Journal of Computer Vision,
vol. 83, no. 1, pp. 85–100, 2009.
[22] J. Zhang, J. Liang, and H. Zhao, “Local energy pattern for texture classification using self-adaptive quantization thresholds,” IEEE transactions
on image processing, vol. 22, no. 1, pp. 31–42, 2013.
[23] S. K. Roy, B. Chanda, B. B. Chaudhuri, D. K. Ghosh, and S. R. Dubey,
“A complete dual-cross pattern for unconstrained texture classification.”
[24] Y. Xu, H. Ji, and C. Fermuller, “A projective invariant for textures,” in
Computer Vision and Pattern Recognition, 2006 IEEE Computer Society
Conference on, vol. 2. IEEE, 2006, pp. 1932–1939.
[25] J. B. Florindo, A. R. Backes, M. de Castro, and O. M. Bruno, “A
comparative study on multiscale fractal dimension descriptors,” Pattern
Recognition Letters, vol. 33, no. 6, pp. 798–806, 2012.
[26] Y. Quan, Y. Xu, Y. Sun, and Y. Luo, “Lacunarity analysis on image patterns for texture classification,” in Proceedings of the IEEE conference
on computer vision and pattern recognition, 2014, pp. 160–167.
[27] B. B. Chaudhuri and N. Sarkar, “Texture segmentation using fractal
dimension,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 17, no. 1, pp. 72–77, 1995.
[28] N. Sarkar and B. B. Chaudhuri, “An efficient differential box-counting
approach to compute fractal dimension of image,” IEEE Transactions
on Systems, Man and Cybernetics, vol. 24, no. 1, pp. 115–120, 1994.
[29] O. S. Al-Kadi, D. Watson et al., “Texture analysis of aggressive
and nonaggressive lung tumor ce ct images,” IEEE transactions on
biomedical engineering, vol. 55, no. 7, pp. 1822–1830, 2008.
[30] B. B. Mandelbrot and R. Pignoni, The fractal geometry of nature. WH
freeman New York, 1983, vol. 173.
[31] T. Lindeberg, “Scale-space theory: A basic tool for analyzing structures
at different scales,” Journal of applied statistics, vol. 21, no. 1-2, pp.
225–270, 1994.
[32] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,”
International journal of computer vision, vol. 60, no. 2, pp. 91–110,
2004.
[33] L. D. Griffin and M. Lillholm, “Symmetry sensitivities of derivativeof-gaussian filters,” IEEE transactions on pattern analysis and machine
intelligence, vol. 32, no. 6, pp. 1072–1083, 2010.
[34] J. D. Victor and B. W. Knight, “Simultaneously band and space limited
functions in two dimensions, and receptive fields of visual neurons,” in
Perspectives and Problems in Nolinear Science. Springer, 1994, pp.
375–419.
[35] J. J. Koenderink, “The structure of images,” Biological cybernetics,
vol. 50, no. 5, pp. 363–370, 1984.
[36] K. Falconer, Fractal geometry: mathematical foundations and applications. John Wiley & Sons, 2004.
[37] R. Van Den Boomgaard and A. Smeulders, “The morphological structure
of images: The differential equations of morphological scale-space,”
IEEE transactions on pattern analysis and machine intelligence, vol. 16,
no. 11, pp. 1101–1113, 1994.
xiii
[38] T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution gray-scale
and rotation invariant texture classification with local binary patterns,”
IEEE Transactions on pattern analysis and machine intelligence, vol. 24,
no. 7, pp. 971–987, 2002.
[39] M. Pietikäinen, A. Hadid, G. Zhao, and T. Ahonen, Computer Vision
Using Local Binary Patterns. Springer Science & Business Media,
2011, vol. 40.
[40] M. R. Faraji and X. Qi, “Face recognition under varying illumination
with logarithmic fractal analysis,” IEEE Signal Processing Letters,
vol. 21, no. 12, pp. 1457–1461, 2014.
[41] S. Liao, M. W. Law, and A. C. Chung, “Dominant local binary patterns
for texture classification,” IEEE transactions on image processing,
vol. 18, no. 5, pp. 1107–1118, 2009.
[42] J. Wright, A. Y. Yang, A. Ganesh, S. S. Sastry, and Y. Ma, “Robust
face recognition via sparse representation,” IEEE transactions on pattern
analysis and machine intelligence, vol. 31, no. 2, pp. 210–227, 2009.
[43] Z. Guo, X. Wang, J. Zhou, and J. You, “Robust texture image representation by scale selective local binary patterns,” IEEE Transactions on
Image Processing, vol. 25, no. 2, pp. 687–699, 2016.
[44] P. Brodatz, Textures: a photographic album for artists and designers.
New York, NY, USA: Dover Pubns, 1966.
[45] E. Hayman, B. Caputo, M. Fritz, and J.-O. Eklundh, “On the significance of real-world conditions for material classification,” in European
conference on computer vision. Springer, 2004, pp. 253–266.
[46] K. J. Dana, B. Van Ginneken, S. K. Nayar, and J. J. Koenderink,
“Reflectance and texture of real-world surfaces,” ACM Transactions On
Graphics (TOG), vol. 18, no. 1, pp. 1–34, 1999.
[47] Z. Li, G. Liu, Y. Yang, and J. You, “Scale-and rotation-invariant local
binary pattern using scale-adaptive texton and subuniform-based circular
shift,” IEEE Transactions on Image Processing, vol. 21, no. 4, pp. 2130–
2140, 2012.
[48] Z. Guo, L. Zhang, and D. Zhang, “A completed modeling of local binary
pattern operator for texture classification,” IEEE Transactions on Image
Processing, vol. 19, no. 6, pp. 1657–1663, 2010.
[49] ——, “Rotation invariant texture classification using LBP variance
(LBPV) with global matching,” Pattern recognition, vol. 43, no. 3, pp.
706–719, 2010.
[50] L. Liu, Y. Long, P. W. Fieguth, S. Lao, and G. Zhao, “Brint: binary
rotation invariant and noise tolerant texture classification,” IEEE Transactions on Image Processing, vol. 23, no. 7, pp. 3071–3084, 2014.
[51] X. Qi, R. Xiao, C.-G. Li, Y. Qiao, J. Guo, and X. Tang, “Pairwise
rotation invariant co-occurrence local binary pattern,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 36, no. 11, pp. 2199–
2213, 2014.
[52] T. Ahonen, J. Matas, C. He, and M. Pietikäinen, “Rotation invariant
image description with local binary pattern histogram fourier features,”
Image analysis, pp. 61–70, 2009.
[53] G. Zhao, T. Ahonen, J. Matas, and M. Pietikainen, “Rotation-invariant
image and video description with local binary pattern features,” IEEE
Transactions on Image Processing, vol. 21, no. 4, pp. 1465–1477, 2012.
[54] R. Nosaka, Y. Ohkawa, and K. Fukui, “Feature extraction based on cooccurrence of adjacent local binary patterns,” in Pacific-Rim Symposium
on Image and Video Technology. Springer, 2011, pp. 82–91.
[55] X. Tan and B. Triggs, “Enhanced local texture feature sets for face
recognition under difficult lighting conditions,” in International Workshop on Analysis and Modeling of Faces and Gestures. Springer, 2007,
pp. 168–182.
[56] B. Caputo, E. Hayman, M. Fritz, and J.-O. Eklundh, “Classifying
materials in the real world,” Image and Vision Computing, vol. 28, no. 1,
pp. 150–163, 2010.
[57] T. Ojala, M. Pietikäinen, and D. Harwood, “A comparative study of
texture measures with classification based on featured distributions,”
Pattern recognition, vol. 29, no. 1, pp. 51–59, 1996.
[58] A. Fathi and A. R. Naghsh-Nilchi, “Noise tolerant local binary pattern
operator for efficient texture analysis,” Pattern Recognition Letters,
vol. 33, no. 9, pp. 1093–1100, 2012.
[59] K. Wang, C.-E. Bichot, C. Zhu, and B. Li, “Pixel to patch sampling
structure and local neighboring intensity relationship patterns for texture
classification,” IEEE Signal Processing Letters, vol. 20, no. 9, pp. 853–
856, 2013.
[60] G. R. Iversen and H. Norpoth, Analysis of variance. Sage, 1987, no. 1.
[61] J. Ren, X. Jiang, and J. Yuan, “Noise-resistant local binary pattern with
an embedded error-correction mechanism,” IEEE Transactions on Image
Processing, vol. 22, no. 10, pp. 4049–4060, 2013.
[62] J. Bruna and S. Mallat, “Invariant scattering convolution networks,”
IEEE transactions on pattern analysis and machine intelligence, vol. 35,
no. 8, pp. 1872–1886, 2013.
[63] L. Sifre and S. Mallat, “Rotation, scaling and deformation invariant
scattering for texture discrimination,” in Proceedings of the IEEE
conference on computer vision and pattern recognition, 2013, pp. 1233–
1240.
[64] T.-H. Chan, K. Jia, S. Gao, J. Lu, Z. Zeng, and Y. Ma, “Pcanet: A simple
deep learning baseline for image classification?” IEEE Transactions on
Image Processing, vol. 24, no. 12, pp. 5017–5032, 2015.
[65] M. Cimpoi, S. Maji, and A. Vedaldi, “Deep filter banks for texture
recognition and segmentation,” in Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition, 2015, pp. 3828–3836.
[66] L. Liu, P. Fieguth, X. Wang, M. Pietikäinen, and D. Hu, “Evaluation of
lbp and deep texture descriptors with a new robustness benchmark,” in
European Conference on Computer Vision. Springer, 2016, pp. 69–86.
[67] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification
with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105.
| 1cs.CV
|
On the stable Andreadakis problem
Jacques Darné
March 2, 2018
arXiv:1711.05991v2 [math.AT] 1 Mar 2018
Abstract
Let Fn be the free group on n generators. Consider the group IAn of automorphisms of Fn acting trivially on its abelianization. There are two canonical
filtrations on IAn : the first one is its lower central series Γ∗ ; the second one is
the Andreadakis filtration A∗ , defined from the action on Fn . In this paper, we
establish that the canonical morphism between the associated graded Lie rings
L(Γ∗ ) and L(A∗ ) is stably surjective. We then investigate a p-restricted version
of the Andreadakis problem. A calculation of the Lie algebra of the classical
congruence group is also included.
Introduction
Automorphisms of free groups have been widely studied over the years, from many
different points of view. They are linked to the mapping class groups of surfaces and
braid groups [FM12a]; they also act on a moduli space of graphs, called the outer
space, introduced in [CV86], which is still actively studied nowadays (see, for instance,
[BBM07], or [FM12b]). Recently, several results have also been obtained regarding the
stable homology of these groups [Gal11, RWW17, DV15, Dja16a].
One way to try and understand the structure of these automorphism groups is to
cut them into pieces, by considering a family of subgroups and studying how these
interact with each other. Such families of subgroups can arise from the action on
the free group Fn and related geometric objects, as is the case with the automorphisms
with boundaries (see for instance [JW04] or [DP12]), and for the Andreadakis subgroups,
which we now focus on.
The first Andreadakis subgroup of Aut(Fn ) is the IA-group. Precisely, we can first
look at how automorphisms act on Fnab ∼
= Zn . That is, we can consider the projection
from Aut(Fn ) onto GLn (Z). We then put aside this linear part by considering only IAn ,
the subgroup of automorphisms acting trivially on Zn , which is an algebraic analogue of
the Torelli subgroup of the mapping class group. An explicit finite set of generators of
IAn has been known for a long time [Nie24] – see also [BBM07, 5.6]. Nevertheless, the
structure of IAn remains largely mysterious. For instance, IA3 is not finitely presented
[KM97], and it is not known if IAn is finitely presented for n > 3. Recent results about
the IA-groups include the finite L-presentation of IAn given in [DP16], or finiteness
results on the lower central series of IAn obtained in [CP17].
The IA-group is the first step of the Andreadakis filtration IAn = A1 ⊇ A2 ⊇ · · · ,
in which Aj is the group of automorphisms acting trivially on Fn /Γj+1 (Fn ), where Fn
is filtered by its lower central series Fn = Γ1 (Fn ) ⊇ Γ2 (Fn ) ⊇ · · · . The Andreadakis
filtration is an N -series. As such, it contains the minimal N -series on IAn , its lower
1
central series: for all k, Ak ⊇ Γk (IAn ). We are thus led to the problem of comparing
these filtrations, that we call the Andreadakis problem.
Since the two filtrations are N -series, the associated graded objects are graded Lie
rings (that is, Lie algebras over Z), the Lie bracket being induced by the commutator
map (x, y) 7→ [x, y] = xyx−1 y −1 . The inclusion i : Γ∗ (IAn ) ⊆ A∗ induces a morphism
of Lie rings:
M
M
i∗ : L(Γ∗ (IAn )) =
Γj (IAn )/Γj+1 (IAn ) −→ L(A∗ ) =
Aj /Aj+1 .
(0.0.1)
j>1
j>1
Thus, the Andreadakis problem translates into the following question:
Problem 1 (Andreadakis). How close is the morphism (0.0.1) to be an isomorphism?
Andreadakis conjectured that the filtrations were the same [And65, p. 253]. In
[Bar13], Bartholdi disproved the conjecture, using computer calculations. He then tried
to prove that the two filtrations were the same up to finite index, but in the erratum
[Bar16], he showed that even this weaker statement cannot be true. His proof uses
the L-presentation of IAn given in [DP16], to which he applies algorithmic methods
described in [BEH08] to calculate (using the software GAP) the first degrees of the Lie
algebra associated to each filtration.
In this paper, we are interested in the difference between Ak (Fn ) and Γk (IAn ) for
n k, that is, in the stable range. We thus ask the following question:
Problem 2 (Andreadakis - stable version). How close is the morphism
i∗ : Lk (Γ∗ (IAn )) = Γk (IAn )/Γk+1 (IAn ) −→ Lk (A∗ ) = Ak /Ak+1
(0.0.2)
to be an isomorphism when n k?
Our main goal here is to show the following partial answer to this question.
Theorem 2.38 (Stable surjectivity). When n > k + 2, the morphism (0.0.2) is surjective.
A (weaker) rational version of this theorem has been obtained independently by
Massuyeau and Sakasai [MS17, th. 5.1]. Like them, we prove it by building on results
from [Sat12], but using quite different methods. These methods include a description
of Andreadakis-like filtrations via a categorical framework, allowing us to state and
study a p-restricted version of the problem. We answer the questions asked in [HM17]
about this problem, and use our answers to study the stable p-restricted Andreadakis
problem. Also, we solve the stable q-torsion Andreadakis problem for Zn , getting a
complete calculation of the Lie ring of the congruence group GLn (p Z) for n > 5.
Let us now describe in more detail the methods we use and the results contained
in the present paper. In section 1, we set up a general framework for understanding
N -series and their associated Lie algebras. We introduce a category SCF of N -series.
We remark that the categorical definition of an action of an object on another makes
sense in this category. This allows us to interpret an old construction of Kaloujnine
(see theorem 1.16) as the construction of universal actions in SCF. This category is
thus action-representative, a situation studied in [BJK05, BB07, Bou08]. Using this
language, we are able to recover and generalize several classical constructions:
2
• Taking the graded rings associated to N -series gives a functor L from SCF to the
category of Lie rings. This functor preserves actions, and the Johnson morphism
admits a nice generalisation as the classifying morphism associated to an action
between Lie rings obtained from an action in SCF.
• Lazard’s classical construction of N -series from algebra filtrations described in
[Laz54] is recovered as a particular case of Kaloujnine’s construction.
• We also obtain the filtrations on congruence groups studied in [Lop14].
In particular, we show that the filtration given by the last construction on the classical
congruence group GLn (q Z) coincides with its lower central series when n > 5. As a
consequence, we get an explicit calculation of this group’s Lie ring (generalizing [LS76,
Th. 1.1], which is the degree-one part):
Corollary 1.46. For all n > 5 and all q > 3, there is a canonical isomorphism of
graded Lie rings (in degrees at least one):
L(GLn (q Z)) ∼
= sln (Z /q)[t],
where the degree of t is 1, and the Lie bracket of M ti and N tj is [M, N ]ti+j .
Section 2 deals with the proof of our stable surjectivity result (Theorem 2.38). The
proof relies on the constructions of the first section, applied to Fox’s free differential
calculus. The Jacobian matrix map D : f 7→ Df turns out to be a derivation from
Aut(Fn ) to GLn (Z Fn ), sending the Andreadakis filtration to the congruence filtration
GLn ((IFn )∗ ) (the group algebra Z Fn being filtered by the powers of its augmentation
ideal IFn ). We then study such derivations, and the maps they induce on the graded
Lie rings associated to N -series they preserve. We thus show that the trace map defined
by Tr(f ) = Tr(Df − 1n ) induces a well-defined map:
Tr : L(A∗ ) −→ gr(Z Fn ).
The graded algebra gr(Z Fn ) is in fact the tensor algebra T V over V = Fnab . A result
from [BLGM90] implies that this trace map takes values in [T V, T V ]. Studying the
links between free differential calculus and differential calculus in T V , we show that
this trace map is exactly the one introduced by Morita [Mor93, Def. 6.4], getting
the explicit description in terms of contraction maps notably used by Satoh in [Sat12].
Denoting the Johnson morphisms by τ and τ 0 , we get a commutative diagram of graded
linear maps:
L(IAn )
τ0
i∗
L(A∗ )
τ
Der(LV )
TrM
T V,
where TrM ◦τ = Tr This gives the following inclusions of subspaces of Der(LV ):
Im(τ 0 ) ⊆ L(A∗ ) ⊆ Tr−1
M ([T V, T V ]).
We observe that calculations from [Sat12] work over Z. From this , we deduce that
the subspaces Im(τ 0 ) and Tr−1
M ([T V, T V ]) are stably the same, so these inclusions are
equalities in the stable range, and i∗ must be stably surjective. We close the section by
3
investigating some of the consequences of this result for automorphisms of free nilpotent
groups.
In section 3, we turn to the p-restricted version of the Andreadakis problem.
Precisely, we can do the same construction as above, replacing the lower central series
[p]
Γ∗ (Fn ) by the mod-p lower central series Γ∗ (Fn ), which is an Np -series:
[p]
[p]
(Γi )p ⊆ Γpi .
[p]
Kaloujnine’s construction gives an associated Andreadakis filtration A∗ on the group
IA[p] of automorphisms of Fn acting trivially on Fnab ⊗ Fp . This filtration was shown in
[p]
[HM17] to be an Np -series. It then contains the minimal Np -series Γ∗ (IA[p] ). Whence
the natural question:
Problem 3 (Andreadakis – p-restricted version). What is the difference between the
[p]
[p]
[p]
Np -series A∗ and Γ∗ (IAn ) ?
Answering to [HM17, rk. 8.6], we show that these two filtrations fit in the same kind
of nice machinery as their classical counterparts, but they turn out to always differ.
The paper ends on a quantification of the lack of stable surjectivity in this p-restricted
case (see Proposition 3.20).
Acknowledgements: This work is part of the author’s PhD thesis. The author
is indebted to his advisors, Antoine Touzé and Aurélien Djament, for their constant
support, countless helpful discussions, and numerous remarks and comments on earlier
versions of the present paper. He also thanks Gwenaël Massuyeau and Takao Satoh,
who kindly agreed to be the reviewers of his thesis, for their useful observations and
comments.
Contents
Introduction
1
1 Generalities on strongly central series
1.1 Notations and reminders . . . . . . . . . . . . . . . . .
1.2 Strongly central filtrations and Lie algebras . . . . . .
1.3 Actions in the category of strongly central filtrations .
1.4 Johnson’s morphisms . . . . . . . . . . . . . . . . . . .
1.5 The Andreadakis problem . . . . . . . . . . . . . . . .
1.6 Lazard’s theorem . . . . . . . . . . . . . . . . . . . . .
1.7 Congruence groups . . . . . . . . . . . . . . . . . . . .
1.8 Comparison between filtrations obtained from an action
2 Traces and stable surjectivity
2.1 Free differential calculus . . . . . . . . . . . .
2.2 Derivations and strongly central filtrations . .
2.3 Algebras, actions and derivations . . . . . . .
2.4 Traces . . . . . . . . . . . . . . . . . . . . . .
2.4.1 The induced map between Lie algebras
2.4.2 Introducing the contraction map . . . .
4
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5
5
6
7
11
12
14
15
17
.
.
.
.
.
.
19
19
21
22
25
26
27
2.5
Stable surjectivity . . . . . . . . . . . . . . . . . .
2.5.1 Vanishing of the trace map . . . . . . . . .
2.5.2 Linear algebra . . . . . . . . . . . . . . . .
2.5.3 Stable cokernel of τ 0 and stable surjectivity
Automorphisms of free nilpotent groups . . . . .
2.6
3 The
3.1
3.2
3.3
3.4
1
case of positive caracteristic
Dark’s theorem . . . . . . . . . . . . . . . .
p-Restricted strongly central series . . . . .
The p-restricted Andreadakis problem . . . .
The stable p-restricted Andreadakis problem
3.4.1 Vanishing of the trace map . . . . . .
3.4.2 Linear algebra . . . . . . . . . . . . .
3.4.3 Stable cokernel of i∗ . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
28
28
30
30
31
.
.
.
.
.
.
.
33
33
34
35
37
37
38
39
Generalities on strongly central series
1.1
Notations and reminders
Throughout the paper, G will denote an arbitrary group, and k a commutative unitary
ring. The left and right action of G on itself by conjugation are denoted respectively
by xy = y −1 xy and yx = yxy −1 . The commutator of two elements x and y in G is
denoted by:
[x, y] := xyx−1 y −1 .
If A and B are subsets of G, we denote by [A, B] the subgroup generated by the
commutators [a, b] with (a, b) ∈ A×B. If A and B are stable by conjugation by elements
of G (resp. by all automorphisms of G), then [A, B] is a normal (resp. characteristic)
subgroup of G. For instance, [G, G] is a characteristic subgroup of G, called the derived
subgroup of G. The quotient Gab := G/[G, G] is the abelianization of G, its bigger
abelian quotient. The derived subgroup is the second step of a filtration of G by
characteristic subgroups:
Definition 1.1. The lower central series of G, denoted by Γ∗ (G), or shortly Γ∗ , is the
filtration of G defined by:
(
Γ1 := G,
Γk+1 := [G, Γk ].
Definition 1.2. A group G is said to be nilpotent if its lower central series stops. The
least integer c such that Γc+1 (G) = {1} is then G’s nilpotency class. More generally, G
is said to be residually nilpotent if its lower central series is separated, i.e. if:
\
Γi (G) = {1}.
i
One can easily check the following formulas:
Proposition 1.3. For all x, y, z ∈ G,
• [x, x] = 1,
• [x, y]−1 = [y, x],
• [x, yz] = [x, y] (y [x, z]) ,
5
• [[x, y], yz] · [[y, z], zx] · [[z, x], xy] = 1,
x
z
y
• [[x, y −1 ], z −1 ] · [[z, x−1 ], y −1 ] · [[y, z −1 ], x−1 ] = 1.
The last ones are two versions of the Witt-Hall identity, which implies the following:
Lemma 1.4 (3-subgroups lemma). Let A, B and C be three subgroups of a group G.
If two of the three following subgroups are trivial, then so is the third:
[A, [B, C]],
[B, [C, A]],
[C, [A, B]].
Equivalently, one of them is contained in the normal closure of the two others.
1.2
Strongly central filtrations and Lie algebras
The theory of strongly central series has notably been studied by M. Lazard [Laz54].
Definition 1.5. Let G be a group. A strongly central filtration of G (also called
strongly central series or N -series) is a filtration
G = G1 ⊇ · · · ⊇ Gi ⊇ · · ·
of G by subgroups, satisfying:
∀i, j > 1, [Gi , Gj ] ⊆ Gi+j .
Remark that indexation has to begin from G = G1 . In particular, [G, Ni ] ⊆ Ni+1 ⊆
Ni , which means exactly that the Ni are normal subgroups of G.
Proposition 1.6. Let G be a group. The lower central series Γ∗ (G) is a strongly
central series on G, and it is the minimal one.
Proof. The strong centrality is shown by induction, using the 3-subgroup lemma 1.4.
Given a strongly central filtration G∗ of G = G1 , a straightforward induction then
gives: Gi ⊇ Γi (G) for any i > 1.
Let G = G1 ⊇ · · · ⊇ Gk ⊇ · · · be any strongly central filtration of a group G. The
quotients Li (N∗ ) := Ni /Ni+1 are abelian (for any i > 1), since [Ni , Ni ] ⊆ N2i ⊆ Ni+1 .
The graded abelian group
M
L(N∗ ) :=
Li (N∗ ),
i>1
is endowed with a bracket induced by the commutator map (x, y) 7→ [x, y] of G. Using
the formulas 1.3, one easily checks that this defines a Lie bracket: L(G∗ ) is a Lie ring
(i.e. a Lie algebra over Z).
Notation 1.7. We denote L(Γ∗ (G)) by L(G) (that is, if we do not specify a strongly
central filtration on a group, it is understood to be filtered by its lower central series).
Example 1.8. If G is a free group, then L(G) is the free Lie algebra over the Z-module
Gab [Laz54, th. 4.2].
As products of commutators become sums of brackets inside the Lie algebra, the
following fundamental property follows from the definition of the lower central series:
Proposition 1.9. The Lie ring L(G) is generated in degree 1. Precisely, it is generated
(as a Lie ring) by L1 (G) = Gab . As a consequence, if G is of finite type, then each
Ln (G) is too.
6
1.3
Actions in the category of strongly central filtrations
Let SCF be the category whose objects are the strongly central filtrations, where
morphisms between G∗ and H∗ are the group morphisms from G1 to H1 preserving
filtrations. There is a forgetful functor ω1 : SCF −→ Grps defined by G∗ 7→ G1 . This
functor admits a left adjoint Γ : G 7→ Γ∗ (G) (see Proposition 1.6). It also admits a
right adjoint G 7→ (G, G, ...).
Proposition 1.10. The category SCF is complete and cocomplete, and is homological
(but not semi-abelian).
A general reference on homological categories is [BB04]. The reader can also consult
[HL11] for a simple version of the axioms defining homological cocomplete and semiabelian categories.
Proof of Proposition 1.10. The forgetful functor ω1 admits both a left and a right adjoint, so it has to commute to limits and colimits. It does not create either of them (in
the sense of [ML98], V.1), but it almost does.
Precisely, let F : D −→ SCF be a diagram. The colimit G∞ of the group diagram
ω1 F is in general endowed with several strongly central filtrations making ω1 F (d) −→
G∞ into filtration-preserving morphisms (for instance the trivial one). One checks
easily that the minimal such filtration (which is the intersection of all those) is the
colimit of F .
Similarly, the limit G∞ of the group diagram ω1 F is endowed with several strongly
central filtrations making ϕd : G∞ −→ ω1 F (d) into filtration-preserving morphisms
(for instance its lower central series). However, the maximal such filtration is the limit
of F . It is explicitly described as:
\
G∞
=
ϕ−1
∗
d (F (d)).
d
To check that SCF is homological, one can check the axioms given in [HL11]. It
is not semi-abelian, because there are equivalence relation R∗ ⊆ G2∗ for which R∗ is
not the induced filtration on R1 (like in topological groups – or more generally in the
categories of topological algebras considered in [BC05] – where an equivalence relation
does not have to be endowed with the induced topology).
In a homological category, we need to distinguish between usual epimorphisms (resp.
monomorphisms) and regular ones, that is, the ones obtained as coequalizers (resp.
equalizers). In SCF, the former are the u such that u1 = ω1 (u) is an epimorphism
(resp. a monomorphism), whereas the latter are surjections (resp. injections):
Definition 1.11. Let u : G∗ −→ H∗ be a morphism in SCF. It is called an injection
(resp. a surjection) when u1 is injective (resp. surjective) and u−1 (Hi ) = Gi (resp.
u(Gi ) = Hi ) for all i.
Examples of homological categories include abelian categories, the category Grps of
groups, or the category Lie of Lie algebras. The usual lemmas of homological algebra
(the nine lemma, the snake lemma, the five lemma...) are true in these categories.
Homological categories differ from abelian ones notably by the fact that in general,
two split extensions between the same objects are not isomorphic (by an isomorphism
preserving the splittings). This allows us to define an action of an object on another.
7
Definition 1.12. Let C be a homological category. If X and Z are two objects of C,
we define an action of Z on X as a split extension (with a given splitting):
X
Y
Z.
When such an action is given, we will say that Z acts on X, and write: Z X.
This definition (which needs only the weaker setting of pointed protomodular categories to make sense) is motivated by the situation in Grps, where an action of a group
K on a group G is encoded by a semi-direct product structure G o K.
Remark 1.13. The choice of splitting is crucial here. For instance, the canonical
extension:
X
0
1
1
0
X ×X
0
1
X
1
1
can be split by
, or by the diagonal
. The first choice gives the trivial action,
whereas the second one gives the adjoint action, which is highly non-trivial: in Lie,
this gives the adjoint representation; in Grps, we get the action of a group on itself by
conjugation.
The set Act(Z, X) of actions of Z on X is a contravariant functor in Z: the restriction of an action along a morphism is defined via a pullback. In Grps, as in Lie,
this functor is representable, for any X. Indeed, an action of a group K on a group
G is given by a morphism K −→ Aut(G). Similarly, an action of a Lie algebra k on a
Lie algebra g is given by a morphism k −→ Der(g), where Der(g) is the Lie algebra of
derivations from g to itself. Recall that a derivation ∂ is a linear map satisfying:
∂([x, y]) = [∂x, y] + [x, ∂y].
The situation when actions are representable has notably been studied in [BJK05], and
in several subsequent papers [BB07, Bou08]. The following terminology was introduced
in [BB07, Def. 1.1]:
Definition 1.14. A homological category C is said to be action-representative when
the functor Act(−, X) is representable, for any object X ∈ C.
Our goal for the rest of this section is to construct universal actions in SCF, getting
in particular the following result:
Proposition 1.15. The category SCF is action-representative.
A representative for Act(−, X) is a universal action on X. Explicitly, it is an action
of an object A(X) on X such that any action Z X is obtained by restriction along
a unique morphism Z → A(X). For instance, in Grps, the universal action on G is:
G
G o Aut(G)
Aut(G),
where the group G o Aut(G) is the holomorph of G. Its underlying set is G × Aut(G),
endowed with the product defined by (g, σ) · (h, τ ) := (gσ(h), στ ).
The construction of universal actions in SCF is given by a theorem of Kaloujnine
[Kal50a, Kal50b], quoted by Lazard in [Laz54, p. 117]:
8
Theorem 1.16 (Kaloujnine). Let G∗ be a strongly central series. Let j > 1 be an
integer. Let Aj (G∗ ) ⊆ Aut(G∗ ) be the subgroup of automorphisms acting trivially on
every quotient Gi /Gi+j . Then A∗ (G∗ ) is a strongly central series.
Notation 1.17. As for Lie rings (Notation 1.7) we abbreviate A∗ (Γ∗ (G)) to A∗ (G).
We can rewrite the definition of Aj (G∗ ) given in the theorem as:
!
Y
Aj (G∗ ) = ker Aut(G∗ ) −→
Aut (Gi /Gi+j ) .
i
Identifying G and Aut(G) to the subgroups G × 1 and 1 × Aut(G) of the holomorph
G o Aut(G), we can define the commutator of an automorphism with an element of G:
[σ, g] = σ(g)g −1 .
Note that [Aut(G), G] ⊆ G. Using this point of view, we can rephrase the previous
definition:
Aj (G∗ ) = { σ ∈ Aut(G∗ ) | ∀i > 1, [σ, Gi ] ⊆ Gi+j } ⊆ G1 o Aut(G∗ ).
(1.17.1)
Proof of Theorem 1.16. We abbreviate Aj (G∗ ) to Aj . Obviously, Aj+1 ⊆ Aj . We show
the strong centrality using the 3-subgroup lemma (Lemma 1.4). Precisely, let α, β > 1
be two integers. For all i > 1, the group Gi+α+β is normal in G o Aut(G∗ ) (it is normal
in G and Aut(G∗ )-stable). Lemma 1.4 thus implies:
[[Aα , Aβ ], Gi ] ⊆ Gi+α+β .
This says exactly that [Aα , Aβ ] ⊆ Aα+β , which is the desired conclusion.
Remark 1.18. The group A1 (G∗ ) is the group of automorphisms of G1 preserving G∗
and acting trivially on L(G∗ ).
Example 1.19. Let G∗ = Γ∗ (G). Then L(G∗ ) is generated in degree one as a Lie
algebra. As a consequence A1 (G∗ ) is the subgroup of automorphisms acting trivially
on the abelianization Gab = L1 (G), denoted by IAG .
In order to show that the filtration A∗ (G∗ ) acts universally on G∗ , we need to
investigate actions in SCF.
Proposition 1.20. An action K∗ G∗ in SFC consists of a group action of K = K1
on G = G1 such that :
∀i, j, [Ki , Gj ] ⊆ Gi+j .
Proof. Let an action of K∗ on G∗ be given:
G∗
H∗
K∗ .
The forgetful functor ω1 : G∗ 7→ G1 from SCF to groups has a left adjoint G 7→ Γ∗ G.
Hence, it commutes with kernels. Applying this functor to the given action, we get a
split extension of groups:
G1
H1
9
K1 .
The group H1 thus decomposes as a semi-direct product G1 o K1 of G1 by K1 .
In fact, there are other forgetful functors ωi : G∗ 7→ Gi , each one with a left adjoint
G 7→ Γd ∗i e G (where d−e is the usual ceiling function). We then get split extensions of
groups:
Gi
Hi
Ki .
The groups Hi thus decomposes as semi-direct products Gi o Ki of Gi by Ki .
As H∗ is a strongly central filtration, we can apply Lemma 1.21 below to get the
desired relation. Conversely, let a group action be given as in the statement of the
proposition. Using the same lemma, we see that H∗ = G∗ o K∗ is a strongly central
filtration on H = K o G, and the corresponding split sequence in SFC is exact.
Lemma 1.21. Let K G be an action in Grps, encoded in a semi-direct product
structure H = G o K. Let G∗ and K∗ be given filtrations on G = G1 and K = K1
respectively. Then the Hi := Gi o Ki are subgroups of H defining a strongly central
filtration of H if and only if:
K∗ is a strongly central series on K,
G∗ is a strongly central series on G,
∀i, j, [Kj , Gi ] ⊆ Gi+j .
Proof. Suppose first that (Gi o Ki )i is strongly central. Then its projection K∗ on K
also is. So is its intersection G∗ with G. Hence, the conclusion follows from:
[Kj , Gi ] ⊆ (Gi+j o Ki+j ) ∩ G = Gi+j .
Conversely, under the hypothesis listed above, Gi is stable under the action of Ki ,
so the Hi = Gi o Ki are subgroups of H. We then use the formulas 1.3 to compute
[kg, k 0 g 0 ] with k, g, k 0 , g 0 in Ki , Gi , Kj and Gj respectively:
0
[kg, k 0 g 0 ] = [kg, k 0 ] ·g [kg, g 0 ]
0
0
= k[g, k 0 ] · [k, k 0 ] · k k[g, g 0 ] · k [k, g 0 ]
∈ Gi+j · Ki+j · Gi+j · Gi+j = Gi+j o Ki+j .
This completes the proof.
We are now ready to show the result announced in Proposition 1.15:
Proposition 1.22. Let G∗ be a strongly central series. The strongly central series
A∗ (G∗ ) acts canonically on G∗ , and this action is universal.
Proof. That A∗ (G∗ ) acts on G∗ follows from the formula (1.17.1), Theorem 1.16 and
Proposition 1.20.
Given an action of a strongly central series K∗ on G∗ , the underlying group action
is described by a unique morphism from K1 to Aut(G1 ). From Proposition 1.20, we
deduce that this morphism sends Kj into Aj (G∗ ). Conversely, any morphism from K∗
to A∗ (G∗ ) in SCF gives a group action lifting to an action in SCF by Proposition
1.20.
Remark 1.23. If a group K acts on a group G, and G∗ is a strongly central filtration on
G = G1 , we can pull back the canonical filtration A∗ (G∗ ) by the associated morphism:
K −→ Aut(G).
10
This gives a strongly central filtration A∗ (K, G∗ ), maximal amongst strongly central
filtrations on subgroups of K which act on G∗ via the given action K G. It can be
described explicitly as:
Aj (K, G∗ ) = { k ∈ K | ∀i > 1, [k, Gi ] ⊆ Gi+j } ⊆ K.
1.4
Johnson’s morphisms
The construction of the Johnson morphism associated with an action in SCF relies on
the following:
Proposition 1.24. The Lie functor L : SCF −→ LieZ is exact, i.e. it preserves short
exact sequences [BB04, Def 4.1.5].
Proof. The exactness of L is equivalent to the exactness of each Li : SCF −→ Ab.
Consider the forgetful functors ωi : G∗ 7→ Gi from SCF to Grps. Each ωi has a
left adjoint G 7→ Γd ∗i e G, so these functors preserve kernels. Moreover, they preserve
regular epimorphisms, which are surjections in SCF (cf. Definition 1.11). Hence, they
are exact. Since Li is the cokernel of the injection ωi+1 ,→ ωi , its exactness follows
from the nine lemma in Grpes. Precisely, if E is any short exact sequence in SCF,
apply the nine lemma to the diagram ωi+1 (E) ,→ ωi (E) Li (E) to get the exactness
of Li (E) from that of ωi (E) and ωi+1 (E).
As a consequence of Proposition 1.24, the functor L preserves actions. Precisely,
from an action in SCF:
G∗
H∗
K∗ ,
we get an action in the category of graded Lie rings:
L(G∗ )
L(H∗ )
L(K∗ ).
Such an action is given by a morphism of graded Lie rings:
L(K∗ ) −→ Der∗ (L(G∗ )).
(1.24.1)
The target is the (graded) Lie algebra of graded derivations: a derivation is of degree
k when it raises degrees of homogeneous elements by k.
Definition 1.25. The morphism (1.24.1) is called the Johnson morphism associated
to the given action K∗ G∗ .
We can give an explicit description of this morphism: for k ∈ K, the derivation
associated to k̄ is induced by [k̄, −] inside L(G∗ oK∗ ) = L(G∗ )oL(K∗ ), so it is induced
by [k, −] inside G∗ o K∗ .
Example 1.26. The Johnson morphism associated to the universal action A∗ (G∗ )
G∗ is the Lie morphism:
τ : L(A∗ (G∗ )) −→ Der∗ (L(G∗ ))
induced by σ 7→ (x 7→ σ(x)x−1 ).
11
If K1 is in fact a normal subgroup of a group K0 , such that each Ki is normal in
K0 , and such that the action of K1 on G∗ can be extended to an action of K0 , then
K0 acts on L(G∗ o K∗ ) and this action factorizes through K0 /K1 . Moreover, as this
action is by automorphisms of the Lie ring:
Lemma 1.27. Let K0 .K1 be given as above. Then the Johnson morphism τ is K0 /K1 equivariant.
The action of K0 on derivations is by conjugation. Precisely:
τ (k · x) = [k · x, −] = k · [x, k −1 · −] = k ◦ τ (x) ◦ k −1 .
Lemma 1.28. Let K∗ H∗ be an action in SCF. The associated Johnson morphism
τ : L(K∗ ) −→ Der(L(G∗ )) is injective if and only if K∗ is the filtration A∗ (K, G∗ )
defined in Remark 1.23.
Proof. Every non-trivial element in ker(τj ) lifts to an element in Aj (K, G∗ ) − Kj .
Conversely, an element σ in Aj (K, G∗ ) − Kj is in Kk − Kk+1 for some k < j. Then
σ ∈ Kk /Kk+1 − {0} is a non-trivial element in ker(τ ).
Remark 1.29. The definition of Aj (K, G∗ ) makes sense for j = 0, giving a subgroup
K0 = A0 (K, G∗ ) of K acting as above. The morphism τ is then A0 (K, G∗ )-equivariant.
In fact, τ can then be extended to a morphism of extended Lie algebras, in the sense
of [HM17]. Ideed, their construction of an algebra of extended derivations is exactly
a construction of universal actions in the category of extended Lie algebras, and their
version of the Johnson morphism is exactly the one we find if we replace N -series and
Lie algebras by their extended version in the constructions above.
1.5
The Andreadakis problem
Let G be a group. To study the structure of Aut(G), we can consider first how automorphisms act on Gab . Then we can put aside this linear part by considering the kernel
of the projection from Aut(G) to GL(Gab ). This kernel IAG is (residually) nilpotent
when G is, and in endowed with two strongly central filtrations: its lower central series,
and the Andreadakis filtration A∗ (G). We are thus led to the problem of comparing
these filtrations, which we call the Andreadakis problem (Problem 1).
Recall from Theorem 1.16 and Example 1.19 that A∗ (G) is a strongly central filtration on A1 (G) = IAG . Since A1 (G) is the kernel of the canonical action of Aut(G) on
L(G), we get an induced faithful action of Aut(G)/IAG (6 GL(Gab )) on L(G). The
next lemma gives a similar concrete description of all the Aj (G):
Lemma 1.30. The group Aj (G) is the subgroup of automorphisms acting trivially on
G/Γj+1 (G), i.e. Aj (G) = { σ ∈ Aut(G) | [σ, G] ⊆ Γj+1 (G) } .
Proof. Let us denote by Kj the right-hand side of the equality. We only need to show
the inclusion Kj ⊆ Aj (G). The case j = 1 is given in Example 1.19. Suppose it true
for j − 1, and let σ ∈ Kj . In particular, σ is inside Kj−1 = Aj−1 (G), so it induces a
derivation [σ, −] of degree j − 1 of L(G), via the Johnson morphism. By definition,
[σ, G] ⊆ Γj+1 . This says exactly that the derivation [σ, −] is trivial on L1 (G). Since
L(G) is generated in degree one (Proposition 1.9), [σ, −] has to be trivial on all of
L(G): for all i, [σ, Γi ] ⊆ Γi+j , which is the desired conclusion.
12
The filtration A∗ (G) is strongly central on A1 (G) = IAG . As a consequence, Ak (G)
contains Γk (IAG ). A first consequence of this inclusion is that the (residual) nilpotency
of G implies the (residual) nilpotency of IAG . Precisely, let G be a c-nilpotent group.
Then Ac (G) = {1G }. Accordingly, Γc (IAG ) = {1G }, so IAG is (c − 1)-nilpotent. In a
similar fashion, one can check that IAG has to be residually nilpotent when G is.
The following question is crucial for trying to understand the structure of automorphism groups of residually nilpotent groups, in particular for trying to understand the
structure of Aut(Fn ):
Problem 1 (Andreadakis). What is the difference between A∗ (G) and Γ∗ (IAG ) ?
Example 1.31. Consider the alternating group An . When n 6= 2, 6, Aut(An ) = Σn
(acting by conjugation), as is easily deduced from [Rot95, cor. 7.5]. But if n > 5,
then An is perfect: [An , An ] = An . On the one hand, the Andreadakis filtration is
thus constant equal to IA(An ) = Aut(An ) = Σn . On the other hand, the lower central
series of Σn is Σn , An , An , ..., so the two filtrations differ in this case.
Recall from the Introduction that we are interested in a stable form of the problem
for G = Fn :
Problem 2 (Andreadakis - stable version). What is the difference between Ak (Fn ) and
Γk (IAn ) for n k ?
The Johnson morphism turns out to be a powerful tool in the study of the Andreadakis filtration (which is the analogous of Johnson’s filtration on the mapping
class group, defined by Johnson in [Joh83]).
Recall the A∗ (G) acts on Γ∗ (G) (see Proposition 1.22). The associated Johnson
morphism τ is described in Example 1.26. The Γi (G) are characteristic subgroups of
G, so A0 (G) = Aut(G). Lemmas 1.27 and 1.28 then give:
Lemma 1.32. The morphism τ is injective and Aut(G)/IAG -equivariant.
The filtration Γ∗ (IAG ) also acts on Γ∗ (G), by pulling back the universal action along
the inclusion i : Γ∗ (IAG ) ⊆ A∗ (Fn ). The associated Johnson morphism is denoted by:
τ 0 = τ ◦ i∗ . The morphism τ 0 is still equivariant, but is injective if and only if G satisfies
Andreadakis’ conjecture (i.e. if i∗ = 1 ).
Example 1.33. If G is a free group, then L(Fn ) is the free Lie algebra LV on V = Gab .
If g h is an action in Lie, then g also acts on ho , which is obtained by considering the
module h as an abelian Lie algebra. Derivations from g to h then identify with sections
of the projection ho o g g. Hence, the free Lie algebra is also free with respect to
derivations. In particular:
Derk (LV ) ∼
= Homk (V, Lk V ) ∼
= V ∗ ⊗ Lk V.
The following result is well-known [Kaw06, th. 6.1]:
Proposition 1.34. In degree one, the Johnson morphism τ 0 is a GLn (Z)-equivariant
isomorphism:
2
∼ ∗
τ10 : IAab
n = V ⊗ Λ V.
Proof. The group IAn is generated by the following elements [Nie24] – see also [BBM07,
5.6]:
(
(
xj xi x−1
if
t
=
i
[xj , xk ]xi if t = i
j
and Kijk : xt 7−→
(1.34.1)
Kij : xt 7−→
xt
else
xt
else.
One can check by a direct calculation that these generators are sent to a basis of the
free abelian group V ∗ ⊗ Λ2 V .
13
1.6
Lazard’s theorem
Definition 1.35. A filtered algebra A∗ is an associative k-algebra A0 endowed with a
filtration by ideals: A = A0 ⊇ A1 ⊇ ... such that: ∀i, j, Ai Aj ⊆ Ai+j . We denote by
f Alg the category of filtered algebras (and filtration-preserving morphisms).
Example 1.36. Let kG be the group algebra of G with coefficients in the (commutative) ring k. We denote by ε : kG → k its canonical augmentation and by Ik G := ker(ε)
its augmentation ideal (we will sometimes write IG, or even I, for short). Then kG is
filtered by the powers I ∗ G of its augmentation ideal. If G is a free group, then gr(kG)
is the tensor algebra over Gab ⊗ k [Pas79, th. 6.2].
From Theorem 1.16, we can deduce the useful corollary [Laz54, th. 3.1]:
Theorem 1.37 (Lazard). Let A = A0 ⊃ A1 ⊇ · · · be a filtered algebra. Then A×
∗ :=
×
A× ∩ (1 + A∗ ) is a strongly central filtration on A×
⊆
A
,
and
(−)
−
1
induces
an
1
embedding of graded Lie algebras:
L(A×
∗ ) ,→ gr∗ (A1 ).
α
Remark 1.38. Fix a morphism G −→ A× . We can pull back the filtration given by
the theorem to get a strongly central filtration α−1 (1 + A∗ ) on G1 = α−1 (1 + A1 ).
Proof of Theorem 1.37. The filtration A = A0 ⊃ A1 ⊇ · · · can be seen as a filtration
of the abelian group A. As A is abelian, it has to be strongly central. Consider the
action by left multiplication:
ρ : A× −→ Aut(A, +).
Let a ∈ A× . One can easily check that ρ(a) ∈ Aj (A∗ ) (where Aj (A∗ ) is the filtration
defined in Kaloujnine’s theorem 1.16) if and only if a ∈ 1 + Aj . Thus, A× ∩ (1 + Ai ) =
ρ−1 (Aj (A∗ )) is a strongly central filtration, as announced. It remains to show that
∂ = α − 1 induces a morphism of Lie ring (necessarily injective). This can be checked
directly from the formula:
[g, h] − 1 = [g − 1, h − 1]g −1 h−1 .
We will give a slightly different proof later on, using the concept of derivations (see
Paragraph 2.2).
Example 1.39. Applying Remark 1.38 to the inclusion of G in kG filtered by the
powers of the augmentation algebra, we get the dimension series of G:
D∗k G = G ∩ (1 + Ik∗ G).
It is a strongly central series on G, so it contains Γ∗ G. The question of the equality
of D∗Z G and Γ∗ G was known as the dimension subgroup problem during a long time,
until an example of a group for which the two filtration differ was given in [Rip72]. See
[MP09, chap. 2] for more on this subject.
If G is a free group, then L(D∗Z G) is the sub-Lie ring generated in degree one in the
tensor algebra gr(Z G) ∼
= T V . Hence (by the PBW theorem), it is the free Lie ring. It
then has to coincide with L(G), so D∗Z G = Γ∗ G. Thus, free groups have the dimension
property.
14
Lazard’s theorem gives a construction of a strongly central filtration from a filtered
algebra. Conversely, we can define a filtered algebra from a strongly central filtration
G∗ on G = G1 . Indeed, let kG be filtered by:
Fi := kG · (Ni − 1) = ker(kG −→ k(G/Hi )).
This filtration does not make kG into a filtered algebra, but it generates a filtration
which does:
X
akj (N∗ ) :=
kG · (Ni1 − 1) · · · (Nin − 1).
i1 +···+in >j
One can easily check that these constructions are universal:
Proposition 1.40. The above constructions define an adjunction:
SCF
1.7
ak∗
(−)×
∗
f Algk .
Congruence groups
If I is an (associative) ring without unit, recall that its congruence group GLn (I) is
defined as:
GLn (I) := ker(GLn (A) −→ GLn (A/I)),
where A is any unitary (associative) ring containing I as a (two-sided) ideal, (e.g.
A = I o Z). This group depends only on I, as it is exactly (1 + Mn (I))× .
If A = A0 ⊇ A1 ⊇ · · · is a filtered algebra (see Definition 1.35), then so is the
matrix algebra Mn (A), endowed with the filtration Mn (A∗ ). Theorem 1.37 gives us a
strongly central filtration of the congruence group:
GLn (A1 ) = GLn (A) ∩ (1 + Mn (A1 )) = ker(GLn (A) −→ GLn (A/A1 )).
by congruence subgroups:
GLn (Aj ) = GLn (A) ∩ (1 + Mn (Aj )) = ker(GLn (A) −→ GLn (A/Aj )),
and an embedding of the associated Lie ring into a matrix algebra:
L(GLn (A∗ )) ,→ gr∗ (Mn (A∗ )) ∼
= Mn (gr∗ (A∗ )).
As in the proof of Theorem 1.37, this filtration can be interpreted as:
GLn (A∗ ) = A∗ (GLn (A), An∗ ).
We also can recover Lazard’s theorem as the case n = 1 of this construction.
Suppose that A∗ is commutative. Then the usual determinant defines a filtrationpreserving morphism:
det : GLn (A∗ ) −→ GL1 (A∗ ) = A×
∗.
Indeed, if M ∈ Mn (Aj ), then det(1 +M ) ∈ 1+Aj . The following proposition determines
the associated graded morphism:
15
Proposition 1.41. The following square commutes:
L(GLn (A∗ ))
(−)−1
Mn (gr(A∗ ))
det
L(A×
∗)
Tr
(−)−1
gr(A∗ ).
Moreover, it is Cartesian, that is:
L(GLn (A∗ )) ∼
= Tr−1 (L(A×
∗ ) − 1).
The kernels of det and Tr then coincide. We thus recover (an generalize slightly) a
result of [Lop14]:
Corollary 1.42. Let SLn (A∗ ) be the kernel of the determinant. Then:
L(SLn (A∗ )) ∼
= ker(Tr) = sln (gr(A∗ )).
Remark 1.43. If L(A×
∗ ) = 0, then L(GLn (A∗ )) = L(SLn (A∗ )), and this Lie ring
identifies to sln (gr(A∗ )). This happens for example when GL1 (A1 ) = {1} (implying
SLn (A∗ ) = GLn (A∗ )), which is verified for A∗ = q ∗ Z (if q > 2), or A∗ = t∗ k[t].
Proof of Proposition 1.41. Let M ∈ Mn (Aj ). Then:
det(1 + M ) ≡ 1 + Tr(M )
(mod A2j ).
When j > 1, then A2j ⊆ Aj+1 , so this formula gives the commutativity of the above
square. The module Tr−1 (Lj (A×
∗ ) − 1) is additively generated by the matrices:
āeαβ , ā(e11 − eαα ) and b̄e11 , for α 6= β, a ∈ Aj and 1 + b ∈ A×
j .
Replacing ā(e11 − eαα ) by ā(e11 + e1α − eα1 − eαα ), we can lift these to GLn (Aj ) as
follows:
lifts āeαβ ,
1 + aeαβ
1 + a(e11 + e1α − eα1 − eαα ) lifts ā(e11 + e1α − eα1 − eαα ),
1 + be11
lifts b̄e11 .
This completes the proof.
Let n > 3. If A is a ”non-totally-imaginary Dedekind ring of arithmetic type” and q
is an ideal of A, then we have [BMS67, cor. 4.3 (b)] that SLn (q) is normally generated
in SLn (A) (in fact in En (A)) by the shear mappings 1 + teαβ with α 6= β and t ∈ q.
This applies for instance to A = Z and q = (q). From this we deduce:
Proposition 1.44. If n > 5, under the above hypothesis:
Γ∗ (SLn (q)) = SLn (q∗ ).
Proof. The filtration SLn (q∗ ) is strongly central on SLn (q), so it contains its lower
central series. Conversely, using that:
1 + (a + b)eαβ = (1 + aeαβ )(1 + beαβ ) if α 6= β,
1 + abeαβ = [1 + aeαγ , 1 + beγβ ]
if α, β and γ are pairwise distinct,
one can easily check that for any t in qk and any α 6= β, if n > 5:
1 + teαβ ∈ Γk (SLn (q)).
Using the result from [BMS67], we see that these generate SLn (qk ) as a normal subgroup of SLn (A). Hence SLn (qk ) ⊆ Γk (SLn (q)), as required.
16
Remark 1.45 (On the q-torsion Andreadakis problem for Zn ). Fix an integer q. A qtorsion strongly central filtration is a strongly central filtration G∗ such that Gqi ⊆ Gi+1
for every i > 1 (this means exactly that q L(G∗ ) = 0). On any group G, there is
(q)
a minimal q-torsion strongly central filtration Γ∗ (G). Moreover, A∗ (G∗ ) is q-torsion
whenever G∗ is, because L(A∗ (G∗ )) embeds into a q-torsion Lie algebra via the Johnson
(q)
(q)
(q)
morphism. Let us denote A∗ (Γ∗ (G)) by A∗ (G) and A1 (G) by IA(q) (G) (it is the
group of automorphisms acting trivially on Gab ⊗ (Z /q)). Thus we get an inclusion of
(q)
(q)
Γ∗ (IA(q) ) into A∗ and a corresponding q-torsion Andreadakis problem.
(q)
Apply this with G = Zn and q > 3. Then Γ∗ (G) = q ∗ Z, Aut(G) = GLn (Z),
(q)
and A∗ (G) = GLn (q ∗ Z) = SLn (q ∗ Z) Proposition 1.44 then gives an answer to the
(q)
q-torsion Andreadakis problem for Zn in the stable range (n > 5) : A∗ (Zn ) is the
lower central series of IA(q) (Zn ) = SLn (q Z).
When A = Z and q = (q), the graded ring gr(q ∗ Z) is (Z /q)[t]. Moreover,
GLn (q Z) = SLn (q Z) (see Remark 1.43). Proposition 1.44 and Corollary 1.42 thus
give:
Corollary 1.46. For all n > 5 and all q > 3, there is a canonical isomorphism of
graded Lie rings (in degrees at least one):
L(GLn (q Z)) ∼
= sln (Z /q)[t],
where the degree of t is 1, and the Lie bracket of M ti and N tj is [M, N ]ti+j .
Remark 1.47. This generalizes [LS76, Th. 1.1], which is the degree-one part.
Remark 1.48. For n = 2 and q > 5 a prime number, the group SL2 (q Z) is free
on 1 + q(q 2 − 1)/12 generators [Gro52, Fra33]. Its Lie ring is then a free Lie ring on
the same number of generators. The author does not know a complete calculation for
n = 3 or 4 : the above calculus does give the abelianization, but it fails to determine
the whole lower central series.
1.8
Comparison between filtrations obtained from an action
Let G be a group. Suppose that G acts on two strongly central series H∗ et K∗ (by
automorphisms in SCF). We then can ask what link exists between A∗ (G, H∗ ) and
A∗ (G, K∗ ) (as defined in Remark 1.23), depending on the links between H∗ an K∗ .
The next proposition describes the behaviour of the construction A∗ (G, −) with
respect to injections, surjections (see Definition 1.11) and semi-direct products in the
category G−SCF of strongly central series endowed with a G-action (where morphisms
respect this action):
Proposition 1.49. Let G be a group acting on strongly central series N∗ , H∗ and K∗ .
Let u : N∗ −→ H∗ and v : H∗ −→ K∗ be G-equivariant morphisms.
If u : N∗ −→ H∗ is an injection, then A∗ (G, H∗ ) ⊆ A∗ (G, N∗ ).
If v : H∗ −→ K∗ is a surjection, then A∗ (G, H∗ ) ⊆ A∗ (G, K∗ ).
If N∗
H∗
K∗ is a split exact sequence in G − SCF, then:
A∗ (G, H∗ ) = A∗ (G, K∗ ) ∩ A∗ (G, N∗ ).
17
Proof. In the first case, we identify N = N1 to a subgroup of H = H1 . Let g ∈
Aj (G, H∗ ). We write:
[g, Ni ] = [g, N ∩ Hi ] ⊆ [g, N ] ∩ [g, Hi ] ⊆ N ∩ Hi+j = Ni+j .
Similarly, to show the second assertion, let us take g ∈ Aj (G, H∗ ). We write:
[g, Ki ] = [g, v(Hi )] = ϕ([g, Hi ]) ⊆ v(Hi+j ) = Ki+j .
The third assertion’s hypothesis comes down to require that H∗ decompose as a semidirect product K∗ o N∗ , the action of G on H∗ being factor-wise. We then get Gequivariant isomorphisms:
Hi /Hi+j ∼
= Ki /Ki+j o Ni /Ni+j .
An element g of G acts trivially on the left hand side if and only if it does on the right
hand side. Whence the result.
Remark 1.50. Let 1
N∗ u H∗ v K∗
1 be a non-split short exact sequence in G − SCF, the first part of Proposition 1.49 gives:
A∗ (G, H∗ ) ⊆ A∗ (G, K∗ ) ∩ A∗ (G, N∗ ).
Nevertheless, equality is not true in general. Indeed, the sequences:
1
Ni /Ni+j
u
Hi /Hi+j
v
Ki /Ki+j
1
are exact, but g ∈ G can act trivially on the kernel and quotient without acting trivially
on the middle term. For instance, H 1 (G) = Ext1G (Ztriv , Ztriv ) is non-trivial in general.
We can get a little more about semi-direct products:
H
K be a split exact sequence in G − Grps. SupProposition 1.51. Let N
pose that N is filtered by a strongly central series N∗ . Then:
A∗ (G, N∗ ) ⊆ A∗ (G, A∗ (K, N∗ )) .
Proof. Let us denote by K∗ the filtration A∗ (K, N∗ ) and by G∗ the filtration A∗ (G, N∗ ).
A straightforward application of the 3-subgroup lemma (Lemma 1.4) in (N o K) o G
provides the inclusion:
[[Gα , Kβ ], Nγ ] ⊆ Nα+β+γ .
Thus [Gα , Kβ ] ⊆ Aα+β (K, N∗ ) = Kα+β , which means that Gα ⊆ Aα (G, K∗ ).
Corollary 1.52. Let G be a group acting on a filtered algebra A∗ by automorphisms
of filtered algebras. Then:
A∗ (G, A∗ ) ⊆ A∗ (G, A×
∗ ).
Proof. Apply Proposition 1.51 to the G-equivariant split exact sequence:
A
A o A×
A×
and the given filtration on A.
Here is an interesting case when the filtrations of Corollary 1.52 are equal:
18
Proposition 1.53. Let G be a group, and k a commutative ring. Then:
A∗ Aut(G), D∗k G = A∗ (Aut(G), Ik∗ G) .
Proof. The algebra Z G is filtered by Ik∗ G, the powers of its augmentation ideal. The
group Aut(G) acts on Z G by automorphisms of filtered algebras. As A∗ (G, Ik∗ G) =
D∗k G, Proposition 1.51, applied to the action of Aut(G) on kG o G, gives an inclusion:
A∗ (Aut(G), Ik∗ G) ⊆ A∗ (Aut(G), D∗k G).
To show that it is in fact an equality, take ϕ ∈ A∗ (Aut(G), D∗k G). Then:
∀g ∈ G = D1 G, [ϕ, g] = (ϕ(g)g −1 − 1)g ∈ (Dj+1 − 1)G ⊆ I j+1 .
We then show that [ϕ, I i ] ⊆ I i+j by induction on i > 1, using the formula:
[ϕ, uv] = [ϕ, u]ϕ(v) + u[ϕ, v] (= (ϕ(u) − u) · ϕ(v) + u · (ϕ(v) − v)) .
Let us remark that, in the language of paragraph 2.3, the last formula states that [ϕ, −]
is a (1 , ϕ)-derivation, so we have in fact used lemma 2.18.
2
Traces and stable surjectivity
2.1
Free differential calculus
We recall some basic concepts of free differential calculus. A detailed account can be
found in [Fox53].
Definition 2.1. Let G be a group, and M a kG-module. A derivation from G to M
is a map ∂ : G −→ M such that:
∀g, h ∈ G, ∂(gh) = ∂g + g · ∂h.
It can be extended to a linear map ∂ : kG −→ M , which verifies:
∀u, v ∈ kG, ∂(uv) = ∂(u)ε(v) + u · ∂(v).
We denote by Der(G, M ) or Der(kG, M ) the space of derivations from G to M . We
will often write Der(kG) for Der(kG, kG).
Remark 2.2. Let G = FS be the free group over a set S. As derivations identify with
sections of M o G G, we get: Der(kFS , M ) ∼
= M S for any kG-module M .
Definition 2.3. Let S = (xi )i be a chosen basis of a free group F . The following
requirement defines a derivation of kF :
(
1 if t = i,
∂
: xt 7−→
∂xi
0 else.
Let us give a first version of the chainrule:
Proposition 2.4. Let λ : FY −→ G a group morphism, where FY is the free group on
a set Y = {yj }. Then, for u in kY and ∂ in Der(kG):
X ∂u
∂(λu) =
λ
∂(λyj ).
∂y
j
j
19
Remark 2.5. The sums involved here are finite, because only a finite number of letters
appear in a given element u.
Proof of proposition 2.4. One can check that each member of this equality defines a
derivation from kFY to kG, where kFY acts on kG by y · g = λ(y)g. As these formulas give the same result when evaluated at elements of the basis, the corresponding
derivations are equal.
If G = FX = hxi i is free too, we can apply proposition 2.4 with ∂ =
∂u ∂(λyj )
∂(λu) X
=
λ
.
∂xi
∂y
∂x
j
i
j
∂
∂xi
to get:
For X = Y and λ = 1FX , this gives a change-of-base formula similar to the usual one.
The following definition keeps on with our analogy with classical differential calculus:
Definition 2.6. Let FY = hyj i and FX = hxi i be free groups as above. Let f be a
morphism from FY to FX . We define its Jacobian matrix (with respect to the chosen
basis) by:
∂f (yj )
D(f ) :=
∈ MY X (kX).
∂xi
ji
Remark 2.7. The morphism f is determined by Df . Indeed, proposition 2.4, applied
with λ = 1, ∂ : v 7−→ v − ε(v) and u = f (xi ), gives:
f (xi ) − 1 =
X ∂f (xi )
∂xj
j
(xj − 1).
g
f
Let FZ = hzk i, FY = hyj i and FX = hxi i be free groups, and let FZ −→ FY −→ FX
be morphisms between them. We can use proposition 2.4 to get a chainrule for Jacobian
matrices:
∂g(zk ) ∂f (yj )
∂f (g(zk )) X
=
f
.
∂xi
∂yj
∂xi
j
This can be restated as:
g
f
Corollary 2.8. Let FZ −→ FY −→ FX be morphisms between free groups with fixed
basis, as above. Then:
D(f g) = f (Dg)D(f ).
Remark 2.9. The reader may have noticed that this formula seems to come ”in the
wrong way”. This can be explained as follows: a morphism f : FY −→ FX is in fact
a r-tuple of monomials f (yj ) = fj (xi ) ∈ kFX , and should as such be considered as a
”polynomial function from FX to FY ”, whose coordinates would be the fj s. From this
point of view, f g would be a ”polynomial function from FX to FZ ”, whose coordinates
would be given by f g(zk ) = gk (fj (xi )): it looks more like ”g ◦ f ” !
This seems to be completely analogous to the classical setting of algebraic geometry.
To get more accurate statements, one would have to interpret kFX as an algebra of
functions over a geometric object associated to FX . Which should look like a one-point
object with some local structure (as Df determines f ).
20
2.2
Derivations and strongly central filtrations
We introduce the notion of a derivation from a group G to a group H on which it
acts. Our aim here is to describe a general framework which will be useful to study
Jacobian matrices and their interactions with Lie brackets: the chainrule formula 2.8
tells us that D is a derivation. We will also get back to Lazard’s theorem 1.37 in this
framework.
Definition 2.10. Let H be a group, on which another group G acts. A map ∂ : G −→
H is a derivation if:
∀ x, y ∈ G, ∂(xy) = ∂x · x∂y.
Remark 2.11. If H = M is an abelian group, i.e. a representation of G, then we
recover the usual definition of a derivation from G to M (see Definition 2.1).
To give a derivation ∂ : G −→ H is exactly the same as giving a section σ = (∂, 1G )
of the canonical projection:
σ
H oG
p
G.
Keeping this in mind, the following lemma follows immediately:
Lemma 2.12. Let ∂ be a derivation from G to H. Then ∂ −1 sends G-stable subgroups
of H on subgroups of G.
Let H∗ be strongly central filtration on a subgroup H1 of H. Let G∗ be a strongly
central filtration on a subgroup G1 of G, which acts on H∗ through the given action of
G on H (see Proposition 1.20). A derivation ∂ from G to H being given, we can use
the morphism σ = (∂, 1G ) to pull back the filtration H∗ o G∗ . We thus get a strongly
central filtration on G1 ∩ ∂ −1 (H1 ):
σ −1 (Hi o Gi ) = Gi ∩ ∂ −1 (Hi ).
Remark 2.13. For instance, if H∗ is given, we can let G∗ be A∗ (G, H∗ ), the maximal
filtration acting on H∗ , as described in Remark 1.23. The above construction then
gives a strongly central filtration on A1 ∩ ∂ −1 (H1 ). This subgroup is all of G if and
only if:
G stabilises H∗ ,
G acts trivially on L(H∗ ),
(2.13.1)
∂(G) ⊆ H1 .
Under these conditions, A∗ ∩ ∂ −1 (H∗ ) is a strongly central series on G. In particular,
it then contains Γ∗ (G).
Keeping the above notations, the morphism σ = (∂, 1G ) induces a Lie ring morphism (which is injective by definition of the filtration on the domain):
σ̄ : L(G∗ ∩ ∂ −1 (H∗ )) ,−→ L(H∗ ) o L(G∗ ).
This ensures that ∂ induces a well-defined linear map ∂¯ between the Lie algebras.
¯ 1̄ ) : x 7−→ ∂x
¯ + x preserves Lie brackets, hence:
Moreover, the map σ̄ = (∂,
¯
¯ y] + [x, ∂y]
¯ + [∂x,
¯ ∂y].
¯
∂([x,
y]) = [∂x,
If L(H∗ ) is an abelian Lie algebra, then the last term is zero, and ∂¯ is a Lie derivation.
This happens in particular when H is an abelian group.
21
Back to the proof of Lazard’s theorem 1.37. Take the filtered (abelian) group (A, +) as
H, and the group A× as G acting by left multiplication ρ. We already know that:
×
Aj (A× , A∗ ) = A×
∗ = A ∩ (1 + Aj ).
Let ∂ be the derivation from A× to A defined by g 7−→ g −1. Obviously, ∂ −1 (Aj ) = A×
j ,
×
×
−1
which is exactly Aj (A , A∗ ). It is then equal to Aj (A , A∗ ) ∩ ∂ (Aj ).
The Lie ring L(A∗ ) is abelian (because A is an abelian group). Hence, the induced
map ∂¯ is a derivation (with respect to the canonical action of L(A×
∗ ) on L(A∗ )):
∂¯ : L(A×
∗ ) −→ L(A∗ ).
Let us remark that the Lie algebra L(A∗ ) is quite different from gr(A∗ ): the associative
structure of A has been completely forgotten. Nevertheless, some part of this structures
is encoded by the action of L(A×
∗ ), which is inherited from left multiplication. The
¯
map ∂ is a derivation with respect to this action, that is:
¯
¯ y] + [x, ∂y].
¯
∂([x,
y]) = [∂x,
These brackets are described through the action of L(A×
∗ ) on L(A∗ ), as induced by
commutators in A o A× :
∀g ∈ A×
1 , ∀x ∈ A, [g, x] = gx − x.
As a consequence:
¯
∂([x,
y]) = −(y(x − 1) − (x − 1)) + (x(y − 1) − (y − 1)) = xy − yx,
so ∂¯ is in fact a Lie morphism to gr(A∗ ).
2.3
Algebras, actions and derivations
We now turn to studying derivations of algebras. In particular, we get a precise link
between free differential calculus and differential calculus in the tensor algebra (see
Proposition 2.25). We will use this in Paragraph 2.4.2 to get an explicit description of
the trace map.
Let Alg− be the category of associative non-unitary algebras over a fixed commutative ring k. This category is pointed (by 0) and protomodular. We can define actions
there, as in paragraph 1.3. Actions in Alg− turn out to be representable. Precisely, for
any algebra I, let Endr (I) (resp. Endl (I)) be the algebra of right (resp. left) I-linear
endomorphisms of I, i.e. k-linear maps u from I to I satisfying:
∀x, y ∈ I, u(xy) = u(x)y (resp. u(xy) = xu(y)).
Define Endr,l (I) as the kernel of :
Endr (I) × Endl (I) −→
Endk (I)
α:
(u, v)
7−→ u ◦ v − v ◦ u.
Proposition 2.14. An action A I in Alg− can be represented by a (unique) morphism:
(λ,ρ)
A −→ Endr,l (I).
22
Proof. If an action
I
B
A
is given, λ(a) and ρ(a) are obtained from left and right multiplications by a in B.
Conversely, a morphism (λ, ρ) as above can be used to define an (associative) algebra
structure on I × A defining an action of A on I.
Let us remark that if I 2 = 0 (that is, I is endowed with a trivial algebra structure),
then an action of A on I is just a A-bimodule structure.
Remark 2.15. The same construction works in the category of (non-unitary) filtered
algebras f Alg− , where we also get a representation of actions. The algebras Endr (I)
and Endl (I) are then filtered by the usual requirement: a morphism u is of degree at
least j if u(Ii ) ⊆ Ii+j for all i. The same requirement will be used to define a filtration
on any module of morphisms between filtered modules or algebras.
Definition 2.16. Let A act on I as above. A derivation from A to I is a k-linear map
∂ : A −→ I satisfying:
∂(ab) = ∂a · b + a · ∂b.
The k-module of derivations from A to I is denoted by Der(A, I).
Remark 2.17. The relation defining derivations depends only on the A-bimodule
structure on I. We are thus led to consider I o , the algebra obtained by taking the
same underlying k-module as I, endowed with the trivial product. The action of A on
I induces an action of A on I o in the obvious manner, and a derivation from A to I is
then the same as a section of the projection:
Io o A A
in the category of algebras.
When we work in the category of filtered algebras, Der(A, I) is a filtered module,
a derivation ∂ being of degree at least j if ∂(Ai ) ⊆ Ii+j for all i. If A is filtered by its
powers Ai , we just have to check this in degree one:
Lemma 2.18. Let A be an algebra, filtered by its powers Ai := Ai , acting on a filtered
algebra I∗ . Let ∂ ∈ Der(A, I). Then ∂ is of degree at least j if and only if:
∂(A) ⊆ Ij+1 .
Proof. An action of A∗ on I∗ is given by a left and a right multiplication which are
filtered, meaning that Ai Ij ⊆ Ii+j and Ij Ai ⊆ Ii+j . Use the formula:
X
∂(a1 · · · ai ) =
a1 · · · ak−1 ∂(ak )ak+1 · · · ai
k
to get the desired result.
We can get examples of actions from algebras acting on themselves. Precisely, the
adjoint action of A on itself is just the obvious A-bimodule structure on A. Derivations
are then the usual ones.
Given an action of A on I represented by (ρ, λ), we can twist it by choosing endomorphisms ϕ and ψ of A and letting A act on I through (ρ ◦ ϕ, λ ◦ ψ). This means
that we let a ∈ A act on I by ϕ(a) · − on the left, and by − · ψ(a) on the right. We
give a name to derivations from A to the the twisted A-bimodule I.
23
Definition 2.19. Let ϕ and ψ be endomorphisms of A. A (ϕ, ψ)-derivation is a linear
map ∂ : A −→ I satisfying:
∂(ab) = ∂a · ψb + ϕa · ∂b.
We denote by Der(ϕ,ψ) (A, I) the k-module of such derivations.
Example 2.20. Let A be a group algebra kG and M a kG-module. We can make M
into a bimodule by making kG act trivially on the right (that is, through ε). Then,
Der(kG, M ) is exactly the usual module of derivations (see Definition 2.1). If M = kG,
it is already a bimodule, but the above structure can be obtained through twisting the
right action by ηε : g 7→ ε(g) · 1. Then Der(kG) (defined in Definition 2.1) is exactly
Der(id,ηε) (kG, kG).
We can apply Lemma 2.18 to A = I = IG, to get:
Corollary 2.21. Let ∂ be a derivation of Z G such that ∂(Z G) ⊆ (IG)l+1 (which is
always true for l = −1). For all integer k, we have:
∂((IG)k ) ⊂ (IG)k+l .
Remark 2.22. Let us stress that the proof given here is fairly direct. In fact, it gets
even shorter in this case, the result following from: ∀v ∈ I, ∂(uv) = u · ∂v.
Remark 2.23. The classical inclusion of Γk − 1 into IGk can be shown by a direct
induction, or follows from Lazard’s theorem (as D∗ (G) is a strongly central series, it
contains Γ∗ G). Under the hypothesis of Proposition 2.21, it implies ∂(Γk ) ⊆ (IG)k+l ,
using that ∂(1) = 0.
Remark 2.24. Some sets of derivations obtained from actions of A on itself can have
more structure than just a module structure. Precisely, if we twist the adjoint action of
A by some (ϕ, ψ) as above, and if we add the requirement that ϕ and ψ are idempotents,
then the set of (ϕ, ψ)-derivations from A to A commuting to ϕ and ψ is a sub-Lie algebra
of Endk (A):
[∂, ∂ 0 ](ab) = ∂∂ 0 a · ψ 2 b + ϕ∂ 0 a · ∂ψb + ∂ϕa · ψ∂ 0 b + ϕ2 a · ∂∂ 0 b
− ∂ 0 ∂a · ψ 2 b − ϕ∂a · ∂ 0 ψb − ∂ 0 ϕa · ψ∂b − ϕ2 a · ∂ 0 ∂b
= [∂, ∂ 0 ](a) · ψ(b) + ϕ(a) · [∂, ∂ 0 ](b).
In particular, if (ϕ, ψ) = (1 , 1 ), we get that Der(A) is a sub-Lie algebra of Endk (A).
Another example is given by A = kG and (ϕ, ψ) = (1 , ηε). But more is true is this last
case. Let kG be filtered by the powers of the augmentation ideal. If ∂, ∂ 0 ∈ Der(kG)
are such that ∂ 0 has degree at least 0, then ∂ ◦ ∂ 0 ∈ Der(kG), because ε(∂ 0 v) = 0 for
any v.
Let A∗ I∗ be an action of filtered algebras. Since the functor gr : f Alg −→ grAlg
from filtered algebras to graded ones is exact (the same proof as that of Proposition 1.24
works), this action is sent to an action gr(A∗ ) gr(I∗ ) of graded algebras. Moreover,
gr also commutes with (−)o (the definition of (−)o being extended to graded algebras
in the obvious way), so we get a morphism:
gr(Der(A∗ , I∗ )) ,→ Der∗ (gr(A∗ ), gr(I∗ )),
24
where the target is the graded module of graded derivations. This morphism is obviously injective. It is in fact a restriction of the natural injection:
gr(Homk (M∗ , N∗ )) ,→ Hom∗ (gr(M∗ ), gr(N∗ ))
between bifunctors on graded modules. As such, it preserves all algebraic structure
inherited from the additive bifunctor structure (see Remark 2.24).
When A∗ is kG, filtered by the powers of IG, acting on itself, we thus get a morphism
preserving the structure induced by composition:
gr(Der(kG)) ,→ Der∗ (gr(kG)).
Proposition 2.25. If G is a free group, and M∗ is a filtered kG-module (considered
as a bimodule with trivial right action), the canonical map:
gr(Der(kG, M∗ )) ,→ Der∗ (gr(kG), gr(M∗ ))
is an isomorphism. Here, by derivations, we mean (id, ε)-ones.
Proof. Let S be a free set of generators for G. Then V = Gab is free abelian on S, and
gr(kG) ∼
= T V is the tensor algebra. Identifying derivations with sections as above (see
Remark 2.17), we see that a derivation is completely determined by the choice of its
values on S:
Der∗ (T V, N∗ ) = F∗ (S, N∗ ),
for any graded T V -bimodule N∗ , where F∗ (S, N∗ ) is the set of graded maps from S
(concentrated in degree 0) to N∗ . The same is true for the other side. Indeed, a
derivation from kG to M is a section of the projection M o G G, so is determined
by a map S → M :
Der(kG, M∗ ) = Der(G, M∗ ) ∼
= M∗S .
The second member is the set of maps from S to M , with the filtration inherited from
the one on M . The desired isomorphism is then exactly: gr(M∗S ) ∼
= F∗ (S, gr(M∗ )).
Remark 2.26. If M is a G-module, we can endow it with the universal kG-filtration
(IG)∗ · M .
Remark 2.27. The isomorphism gr(Der(kG)) ∼
= Der∗ (T V ) thus obtained preserves
the algebraic structure obtained from the composition of derivations.
2.4
Traces
In [Bar13], Bartholdi defines the trace of an automorphism ϕ of Fn by:
Tr(ϕ) := Tr(Dϕ − 1 ) ∈ Z Fn ,
where Dϕ denotes ϕ’s Jacobian matrix. We will show that Tr induces a well-defined
map between the graded Lie algebras, which we still call Tr:
Tr : L(A∗ (Fn )) −→ gr(Z Fn ) ∼
= T V.
The aim of this paragraph is to show that this map is indeed well-defined, to investigate
its behaviour with respect to Lie structures, and to get Morita’s algebraic description
[Mor93], used by Satoh in [Sat12].
25
2.4.1
The induced map between Lie algebras
Let ϕ ∈ Ak (Fn ). By definition, ϕi := x−1
i ϕ(xi ) ∈ Γk+1 . The Jacobian matrix of ϕ can
be described explicitly:
∂(xi ϕi )
∂xi
∂(ϕi )
=
.
+xi
∂xj
∂xj
∂xj
|{z}
(Dϕ)ij =
δij
Hence:
Dϕ − 1 =
∂ϕi
xi
∂xj
.
ij
Using Remark 2.23, we see that this matrix is in fact in Mn (I k ) (to shorten notations,
we write I for IFn in the sequel). Moreover, xi acts trivially on I k /I k+1 . We thus get
an explicit formula for the trace map:
Tr(Dϕ − 1 ) =
X
i
xi
∂ϕi X ∂ϕi
≡
∂xi
∂xi
i
(mod I k+1 ).
Let G be any group. We can apply the construction of Paragraph 1.7 to A = kG,
filtered by the powers of the augmentation ideal. This gives a strongly central filtration
GLn (I ∗ G) on GLn (IG), which comes with an embedding of Lie algebras:
L(GLn (I ∗ G)) ,→ gr(Mn (kG)) ∼
= Mn (gr(kG)).
The next proposition replaces a formula from [Bar13, section 6]:
Proposition 2.28. The Jacobian matrix D induces a morphism between graded modules:
D : L(A∗ (Fn )) −→ L(GLn (I ∗ Fn )),
satisfying:
D([f, g]) = [g, Df ] + [Dg, f ] + [Dg, Df ] .
In order to address the issue raised in Remark 2.9, let us introduce some notations
before proving the proposition. If G is any group, we denote by Gop the opposite group,
where multiplication is defined by: g ·op h = hg. Let G∗ be a strongly central filtration
op
on G. Then Gop
and one easily checks that:
∗ is such a filtration on G
op
L(Gop
∗ ) = L(G∗ ) ,
where the bracket in L(G∗ )op is L(G∗ )’s additive inverse: [x, y]op = [y, x].
Proof of Proposition 2.28. Corollary 2.8 states exactly that D is a derivation from
Aut(Fn ) to GLn (I)op ⊂ Mn (Z Fn )op , where Mn (Z Fn ) is endowed with the obvious
Aut(Fn )-action. We thus can apply the results from 2.2 with ∂ = D, G = Aut(Fn ),
H = GLn (I)op , and H∗ = GLn (I ∗ )op .
The strongly central filtration A∗ (G, H∗ ) is in fact the Andreadakis filtration A∗ =
A∗ (Fn ) on A1 = IAn ⊂ Aut(Fn ). Indeed, there is a series of inclusions:
A∗ (G, D∗ Fn ) ⊇ A∗ (G, GLn (I ∗ )) ⊇ A∗ (G, Mn (Z Fn )) = A∗ (G, Z Fn ) .
26
The first one comes from 1.49 applied to the injection of D∗ Fn into GLn (I ∗ ) defined
by w 7−→ w · 1 . The second one is a particular case of 1.52. The last equality comes
from the fact that G acts component-wise on matrices:
[g, (mij )] = g · (mij ) − (mij ) = ([g, mij ]).
According to proposition 1.53, these inclusions are in fact equalities.
Moreover, we have seen at the beginning of the present paragraph that D sends A∗
to GLn (I ∗ )op . The filtration A∗ ∩ ∂ −1 (H∗ ) is thus only A∗ . The work already done in
2.2 allows us to get the desired result.
The map given by Proposition 2.28 can be composed with the morphism:
(−)−1
L(GLn (I ∗ )) −→ gr(Mn (Z Fn )) ∼
= Mn (gr(Z Fn )) = Mn (T V ).
Thus, for ϕ an element of Ak /Ak+1 , Dϕ − 1 is well-defined modulo Mn (I k+1 ). Composing with the usual trace, we get the announced well-defined linear map induced by
ϕ 7−→ Tr(Dϕ − 1 ):
Tr : L(A) −→ T V.
Remark 2.29. That the map D− 1 (hence Tr) induces a well-defined map between the
Lie algebras can be seen through explicit calculation, but the behaviour with respect
to the Lie bracket is much less obvious from this point of view. Indeed, let ϕ ∈ Ak . If
ϕ = ψχ, with χ ∈ Ak+1 , then:
ψ(xi ) = ϕ(xi χi ) = xi ϕi ϕ(χi ).
As χi stands inside Γk+2 , its image by ϕ does too. Thus:
∂ϕi
∂ϕ(χi )
∂ϕi
∂ψi
=
+ ϕi
≡
∂xj
∂xj
∂x
∂xj
| {zj }
(mod I k+1 ).
∈I k+1
2.4.2
Introducing the contraction map
Consider the evaluation map:
ev : Der(1 ,ε) (T V ) ⊗ T V −→ T V.
Using the universal property of T V , as in the proof of 2.25, we get a linear isomorphism:
Der(1 ,ε) (T V ) ∼
= Hom(V, T V ) ∼
= V ∗ ⊗ T V.
The evaluation map then is:
∗
V ⊗ TV ⊗ TV
ω⊗u⊗v
−→ T V
7−→ Φ(ω ⊗ v)u,
where Φ is the contraction map:
∗
V ⊗ V ⊗k+1
−→ V ⊗k
Φ:
α ⊗ Xi1 · · · Xik+1 7−→ Xi1 · · · Xik α(Xik+1 ),
extended by zero on k·1. This follows from the fact that any (1 , ε)-derivation ∂ verifies:
∂(uv) = u · ∂v,
when the degree of v is at least 1 (that is, when ε(v) = 0), and ∂(1) = 0.
We sum this up in the following:
27
Proposition 2.30. Let ∂ ∈ Der(1 ,ε) (T V ). Then:
∂ = Φ(∂|V ⊗ −).
Let us consider the derivation ∂x∂ i of Z Fn . It induces a (1 , ε)-derivation of degree
−1 of T V , denoted by ∂i (any derivation of kG is of degree at least −1, by Corollary
2.21). As ∂i |V = Xi∗ , we get the following:
Corollary 2.31. The (1 , ε)-derivation of T V induced by ∂x∂ i ∈ Der(Z Fn ) is represented
as:
∂
= ∂i = Φ(Xi∗ ⊗ −) : T V −→ T V.
∂xi
We can use these results to interpret the trace map in a way more suited to explicit
calculations:
Proposition 2.32. The trace map can be described as:
Tr = Φ ◦ ι ◦ τ,
where τ is the Johnson morphism (see Definition 1.26), ι denotes the inclusion of
Derk (LV ) ∼
= V ∗ ⊗ Lk+1 V into Derk (T V ) ∼
= V ∗ ⊗ V ⊗k+1 , and Φ is the contraction map.
Proof. Let ϕ ∈ Ak . Then τ (ϕ) is defined by:
∼
τ (ϕ)(Xi ) = x−1
i ϕ(xi ) = ϕi ∈ Γk+1 /Γk+2 = Lk+1 V.
We have seen at the beginning of Paragraph 2.4.1 that the trace map is given by:
Tr(Dϕ − 1 ) =
X ∂ϕi
i
∂xi
.
The formula of the proposition is then equivalent to:
!
X
X ∂ϕi
∗
Φ
.
Xi ⊗ ϕi =
∂xi
i
i
To get this formula, we evaluate the equality given by Corollary 2.31 to the elements
ϕi − 1 (keeping in mind that the inclusion of Lk+1 V into Tk+1 V is given by w 7→
w − 1).
2.5
2.5.1
Stable surjectivity
Vanishing of the trace map
Here, we show that the trace map takes values in brackets inside T V . This result can
also be found in [MS17, Prop. 5.3], where rational methods are used to get it.
Proposition 2.33 ([BLGM90, Th. 2.1], quoted in [Bar13, Th. 6.2]). Let k > 2, and
let J ∈ GLm (IZk Fn ). Denote by V the abelianization V = Fnab ∼
= Zn . Then:
Tr (J − 1 ) ∈ [T V, T V ]k ⊂ V ⊗k ∼
= I k /I k+1 .
This result relies on the following criterion:
28
Proposition 2.34 ([BLGM90, prop. 2.2]). Let f (X1 , ..., Xn ) ∈ V ⊗k . Let C ⊂ Mk (Z)
be the sub-Z-module generated by the ei,i+1 . Suppose:
∀Ci ∈ C, Tr(f (C1 , ..., Cn )) = 0.
Then f ∈ [T V, T V ]k .
The proof can be found in [BLGM90]. The reader is also referred to the proof of
Proposition 3.16, which is the same proof, adapted to the case of positive carateristic.
Proof of Proposition 2.33. The main idea is to use evaluations into commutative algebras to be able to use Proposition 1.41, and to then get back to the non-commutative
setting by using the above criterion.
Let 1 + tAi ∈ GLk (tk[t]). There is an evaluation morphism xi 7→ 1 + tAi from Fn to
GLk (t Z[t]), extending to a morphism from kFn to Mk (tk[t]) sending I ∗ to t∗ Mk (k[t]).
Taking congruence groups, we get an evaluation morphism:
ev1 +tAi : GLm (I ∗ Fn ) −→ GLm (t∗ Mk (k[t])) = GLmk (t∗ k[t]).
There is a commutative diagram:
L(GLm (I ∗ Fn ))
(−)−1
Mm (T V )
ev1 +tAi
L(GLmk (t∗ k[t]))
(−)−1
Mmk (k[t])
TV
evtAi
evtAi
det
L(k[t]×
∗) = 0
Tr
T rm
Mm (k[t])
Tr
Tr
(−)−1
k[t]
Here, we identify gr(I ∗ Fn ) with T V by xi 7→ 1 + Xi . We also identify gr(t∗ k[t]) with
k[t]. The evaluation xi 7→ 1 + tAi thus induces Xi 7→ tAi between the associated
graded. The bottom-left square is just the one in Proposition 1.41. The map T rm is
the usual trace when the base algebra is Mm (k[t]).
Let k = Z and f = Tr(J − 1 ) ∈ V ⊗k . The commutativity of the above diagram
gives:
0 = Tr(f (tAi )) = tk Tr(f (Ai )).
As a consequence, Tr(f (Ai )) = 0, for any 1 + tAi ∈ GLk (t Z[t]). We can then evaluate
this at t = 0 to get: Tr(f (πAi )) = 0. This evaluation π is the map:
π : L1 (GLk (t∗ Z[t]) ,→ Mk t Z[t]/t2 Z[t] ∼
= Mk (Z).
Using Proposition 1.42 and Remark 1.43, we see that its image is exactly sln (Z), so
the conclusion follows from the above criterion (2.34).
Because of Proposition 2.33, we will consider the trace map as taking values in the
abelianization T V ab = T V /[T V, T V ]. As [T V, T V ]k is generated by the elements:
[Xi1 ⊗ · · · ⊗ Xip , Xip+1 ⊗ · · · ⊗ Xik ] = Xi1 ⊗ · ⊗ Xik − tp · Xi1 ⊗ · ⊗ Xik ,
where t = 1̄ ∈ Z /k, the module T V ab is the module of cyclic powers C∗ V :
(T V ab )k = Ck V := V ⊗k /(Z /k).
The conclusion of Proposition 2.33 becomes, in this context: Tr (J − 1 ) = 0 ∈ C∗ V.
29
2.5.2
Linear algebra
Consider the Johnson morphism τ 0 : L (ΓIAn ) −→ Der∗ (L(Fn )) (cf. 1.5). The morphism τ10 is an isomorphism (see Proposition 1.34). Moreover, L (ΓIAn ) is generated
in degree 1 (cf. 1.9). As a consequence, the image of τ 0 is exactly the sub-Lie ring
generated in degree 1 inside Der (L(Fn )). As L(Fn ) is the free Lie ring LV , the study
of coker(τ 0 ) is solely a problem of linear algebra.
Recall from Proposition 2.32 that the trace map can be seen as the composite of
the Johnson morphism τ : Lk (A∗ (Fn )) → Derk (LV ) ∼
= V ∗ ⊗ Lk+1 V with:
ι
Φ
π
TrM : V ∗ ⊗ Lk+1 V −→ V ∗ ⊗ V ⊗k+1 −→ V ⊗k −→ Ck V := V ⊗k /(Z /(k)),
where ι and π denote the canonical maps. All these morphisms are obviously GLn (Z)equivariant (with respect to the canonical actions).
Notation 2.35. Let I denote the image of τ 0 , which is the sub-Lie ring generated in
degree 1 inside Der(LV ).
The following proposition can be seen as a consequence of Proposition 2.33. Precisely, I = Im(τ 0 ) ⊆ Im(τ ), and Proposition 2.33 implies that TrM ◦τ = Tr vanishes.
Proposition 2.36. For every k > 2, TrM (Ik ) = {0}.
2.5.3
Stable cokernel of τ 0 and stable surjectivity
Let k > 2. Using Proposition 2.36, we get a commutative diagram with exact rows:
Ik
V ∗ ⊗ Lk+1 V
φ
coker(τk0 )
Φ
V ⊗k
[T V, T V ]k
Φ
π
Ck V.
In [Sat12], Satoh shows:
For n > k + 1, Φ is surjective, (lemma 3.2)
For n > k + 2, φ is surjective, (prop. 3.2)
For n > k + 2, ker Φ ⊆ I.
(Prop. 3.3)
His Theorem 3.1 is still true over Z:
Proposition 2.37. Let k > 2 and n > k + 2 be integers. Then Φ is a GLn (Z)equivariant isomorphism:
coker(τk0 ) ∼
= Ck V.
Proof. Let us denote by K (resp. L) the kernel of Φ (resp. its cokernel). There is a
commutative diagram in GLn (Z) − ModZ :
ker Φ
Ik
φ
0
V ∗ ⊗ Lk+1 V
coker(τ 0 )
Φ
[T V, T V ]k
V ⊗k
0
0
30
K
Φ
π
Ck V
L.
The snake lemma ensures that K and L are zero: Φ is an isomorphism.
We can now state our main result:
Theorem 2.38. Let k + 2 6 n. Then the canonical morphism
Lk (IAn ) −→ Lk (A∗ (Fn ))
is surjective, and τ induces an isomorphism: Lk (A∗ (Fn )) ∼
= Ik .
Remark 2.39. Basis being chosen, there is an injection of Fn in Fn+1 ∼
= Fn ∗ Z. An
automorphism ϕ of Fn can be extended to an automorphism ϕ∗ 1 of Fn+1 . This induces
injections IAn ,→ IAn+1 which in turn induce morphisms L(A∗ (Fn )) → L(A∗ (Fn+1 )).
Taking the colimit over n, we can define a Lie ring Lst (A∗ ). In the same way, we can
ab
define injections from Der(L(Fnab )) into Der(L(Fn+1
)) and take the colimit Ist of the
sub-algebras generated in degree one. With this point of view, the isomorphisms of
Theorem 2.38 give an isomorphism between graded Lie algebras:
τ st : Lst (A∗ ) ∼
= Ist ,
meaning exactly that Lst (A) is generated in degree one.
In fact, all the constructions appearing here are functors on the category denoted
by S(Z) in [Dja16b, section 7], where it is shown (using methods similar to the ones
of [CEFN14]) that these functors are finitely supported. This implies the equivalence
between τkst being an isomorphism and τk being one for n big enough.
Proof of theorem 2.38. Consider the commutative diagram:
i∗
L(IAn )
L(A∗ )
τ
τ0
Der(LV ).
The image I of τ 0 is the sub-Lie ring generated in degree one inside Der(LV ). Using
the results quoted in Paragraph 2.5.3, we see that in degrees k 6 n − 2, it also is the
kernel of the trace map. Proposition (2.33) tells us exactly that Tr ◦τ = 0, so that
Im τk ⊆ ker Trk = Im τk0 when k > n − 2. As a consequence, Im τ = Im τ 0 . As τ is
injective (1.32), it is an isomorphism onto its image, hence the result.
2.6
Automorphisms of free nilpotent groups
Automorphisms of nilpotent groups are easy to deal with, due to the following classical
fact:
Lemma 2.40. Let G be a finite-type nilpotent group. An endomorphism ϕ ∈ End(G)
is an automorphism if and only if the induced morphism ϕab ∈ End(Gab ) is.
Proof. If ϕ is an automorphism then ϕab has to be, with (ϕab )−1 = (ϕ−1 )ab . Conversely,
suppose that ϕab is an automorphism. This means that L1 (ϕ) is. Since L(G) is
generated in degree one, L(ϕ) is surjective. But each Lk (G) is abelian of finite type, so
each Lk (ϕ), being surjective, has to be bijective (it is obviously the case on the torsion
31
part, which is finite, and it also is on the free abelian part, for reasons of rank). The
lemma then follows by induction from the five-lemma applied to:
Lk (G)
Lk (ϕ)
Lk (G)
G/Γk+1 G
G/Γk G
ϕ̄
G/Γk+1 G
ϕ̄
G/Γk G.
This induction process stops since there is a c such that G = G/Γc+1 G.
b := lim (G/Γk G) .
Definition 2.41. The pro-nilpotent completion of a group G is: G
←−
b is canonically filtered by the Γ̄j G := lim (Γj G/Γk G). This filtraThe completion G
←−
tion is its closed lower central series, defined as the closure of the lower central series.
b An endomorphism of G
b
It is minimal amongst closed strongly central filtrations on G.
is continuous if and only if it preserve this filtration.
b is an automorLemma 2.42. Let G be a group. A continuous endomorphism ϕ of G
ab
ab
phism if and only if the induced morphism ϕ ∈ End(G ) is.
Proof. Such an endomorphism is an automorphism if and only if the associated morphism between projective system is. These are the induced endomorphisms of the
G/Γk G, which are nilpotent groups. This condition amounts to ϕ inducing an isomorphism on Ĝ/Γ̄2 = Gab , by Lemma 2.40.
b
In fact, we can readily deduce the following explicit description of the group AutC 0 (G)
b
of continuous automorphisms of G:
Proposition 2.43. The canonical map is an isomorphism:
b ∼
AutC 0 (G)
(Aut(G/Γk G)) .
= lim
←−
Let G = Fn be a free group of finite type. It is residually nilpotent, so it embeds
into its completion Fbn . A continuous endomorphism of Fbn is uniquely determined by
its (arbitrary) values on the topological generators xi .
Let us denote by Fn,c the free c-nilpotent group Fn /Γc+1 Fn . Using Lemmas 2.40 and
2.42, we can show two surjectivity results for automorphisms of free nilpotent groups:
Proposition 2.44. The canonical morphisms Aut(Fn,c ) → Aut(Fn,c−1 ) are surjective.
Proof. Let (xi ) be a free basis of Fn . Let ϕ ∈ Aut(Fn /Γc (Fn )). Lift the elements ϕ(x̄i )
to elements ti of Fn /Γc+1 (Fn ). Then define the endomorphism ϕ̃ of Fn /Γc+1 (Fn ) by
x̄i 7→ ti . Since ϕ and ϕ̃ induce the same endomorphism of Fnab , Lemma 2.40 implies
that ϕ̃ is an isomorphism.
Proposition 2.45 ([Bar13, th. 5.1]). The Johnson morphism associated to the universal action on Γ̄∗ (Fn ) is an isomorphism:
τ : L(A∗ (Γ̄∗ Fn )) ∼
= Der(LV ).
Proof. Because of Lemma 1.28, we know that τ is injective. We need to show that it is
surjective. Let us first remark that L(Γ̄∗ (Fn )) = L(Γ∗ (Fn )) ∼
= LV . Let ∂ ∈ Derk (LV ).
∼
Lift each ∂(Xi ) ∈ Γk /Γk+1 = Γ̄k /Γ̄k+1 to an element ti ∈ Γ̄k . We can define a continuous
endomorphism of Fbn by ϕ : xi 7→ ti xi . Then ϕ acts trivially on Fnab , so it is an
isomorphism by Lemma 2.42. As a consequence, ϕ ∈ Ak (Γ̄∗ (Fn )) satisfies τ (ϕ̄) = ∂.
This concludes the proof.
32
We can translate this last result into a statement about automorphisms of free
nilpotent groups : because of Propositions 2.43 and 2.44, Aut(Fn,c ) is a quotient of
AutC 0 (Fbn ). Moreover, the kernel of the canonical surjection is Ac (Γ̄∗ Fn ), by definition.
Thus, this projection induces the c-truncations at the level of the associated graded
objects :
Corollary 2.46. The Johnson morphism associated to the universal action on Γ∗ (Fn,c )
is an isomorphism:
τ : L(A∗ (Fn,c )) ∼
= Der(L6c V ).
Consider the Johnson morphism τ 0 : L(Γ∗ (IAFn,c )) → Der(L6c V ). Using the identification of corollary 2.46, we see that τ 0 identifies with the Andreadakis morphism
i∗ : L(Γ∗ (IAFn,c )) → L(A∗ (Fn,c )). Its image is the subalgebra generated in degree one
inside Der(L6c V ), as was the case in paragraph 2.5.2. This subalgebra is exactly the
truncation I<c , so is inside (and stably equal to) the kernel of the trace map. As a
consequence, the Andreadakis equality never holds for free nilpotent groups.
Moreover, in this context, our stable surjectivity result translates as :
Corollary 2.47. The following sequence always is a complex, and is exact for n > c+1:
i∗
Tr
L(Γ∗ (IAFn,c )) −→
L(A∗ (Fn,c )) ∼
= Der(L6c V ) −→ C<c V −→ 0.
Remark 2.48 (Non-tame automorphisms). The canonical morphism p : Aut(Fn ) →
Aut(Fn,c ) is in general not surjective: some basis of the free nilpotent group do not
lift to basis of the free group via Fn Fn,c . Automorphisms of Fn,c induced by
automorphisms of Fn are called tame. This was the original motivation of [BLGM90]
for considering the trace map. In this regard, our stable surjectivity result could be
re-stated as follows : in the stable range, the trace is the only obstruction for an
automorphism to be tame.
3
The case of positive caracteristic
3.1
Dark’s theorem
Let w be a word in a free group FS . Let w(r) be the word obtained from w by
replacing each generator s ∈ S by some power srs . Dark’s theorem [Dar68] describes
how to decompose w(r) as a product of commutators. This gives very useful universal
formulas, that can then be evaluated in any group. The reader is referred to [Pas79,
chap. IV, Th. 1.11] for a precise statement and a proof of the theorem. Here we recall
two corollaries, obtained by taking w = [x, y] and w = xy in F{x,y} .
The case w = [x, y] is [Pas79, IV, cor. 1.16]:
Corollary 3.1. There exists a unique map θ : (N∗ )2 −→ F2 = hx, yi verifying:
Y
α
β
∀α, β ∈ N, [xα , y β ] =
θ(r, s)( r )( s ) .
r,s>1
Each θ(r, s) is a product of {x±1 , y ±1 }-commutators such that x±1 appears at least r
times and y ±1 at least s times in each factor.
The case w = xy has been known for a long time (quoted in [Pas85, chap. 11, Th.
1.14], it already appears for instance in [Hal34]):
33
Corollary 3.2. There exists a unique map θ : N −→ F2 = hx, yi such that:
Y
α
∀α ∈ N, xα y α =
θ(r)( r ) ,
r>0
Each θ(r) is a product of {x±1 , y ±1 }-commutators of length at least r.
Remark 3.3. In both cases, uniqueness of the map θ is obvious: it can be defined by
induction.
3.2
p-Restricted strongly central series
Definition 3.4. Let p be a prime number. A strongly central series G∗ is said to be
p-restricted if:
∀i, Gpi ⊆ Gip .
Let G∗ be a p-restricted strongly central series. Using [Pas79, Th. III.1.7], we see
that the morphism:
L(G∗ ) −→ gr(aF∗ p (G∗ ))
induced by g 7−→ g − 1 (see Theorem 1.37 and Proposition 1.40) is injective. We
can identify L(G∗ ) with its image, which is stable by the p-th power operation in the
F
associative Fp -algebra gr(a∗ p (G∗ )), since (g − 1)p = g p − 1. From this we deduce that
L(G∗ ) is a p-restricted Lie algebra with p-th power operation induced by g 7−→ g p in G1 .
The reader is referred to the classical [Jac41] for a discussion of p-restricted Lie algebras.
We also can deduce from [Pas79, Th. III.1.7] that any p-restricted strongly central series
F
F
has to contain the dimension series D∗ p G defined in Example 1.39 (because a∗ p (G∗ )
contains IF∗p G):
F
Proposition 3.5. The filtration D∗ p G is the minimal p-restricted strongly central series, on any group G.
[p]
The filtration DFp , also denoted by Γ∗ also admits a description by induction, or
the more explicit description:
Y
j
[p]
Γk G =
(Γi G)p .
ipj >n
These can be found in [Laz54, Th. 5.6] or [Pas79, Th. IV.1.9]. We also refer to [CE16]
for a nice discussion of filtrations defined by induction. This description has a nice
[p]
consequence, similar to Proposition 1.9 (we abbreviate L(Γ∗ G) to L[p] (G)):
Proposition 3.6. The p-restricted Lie ring L[p] (G) is generated in degree 1. Precisely,
[p]
it is generated (as a p-restricted Lie ring) by L1 (G) = Gab ⊗ Fp .
Example 3.7. If G is a free group, then L[p] (G) = L(D∗ p G) is the p-restricted Lie
algebra generated by the degree-one part inside gr(Fp G) ∼
= TFp (Gab ) so, using PBW
over Fp [Jac41, Th. 1] it is the free p-restricted Lie algebra over the Fp -module Gab ⊗ Fp
[Laz54, Th. 6.5].
F
[p]
Remark 3.8. The filtration Γ∗ G (already defined in [Zas39]) is to be distinguished
(p)
from Stallings’ filtration Γ∗ G, defined in [Sta65]. The latter is the minimal p-torsion
strongly central filtration on a group G, where a strongly central filtration is p-torsion
when Gpi ⊆ Gi+1 (for all i). See remark 3.14 for more on q-torsion strongly central
series.
34
3.3
The p-restricted Andreadakis problem
[p]
[p]
[p]
[p]
Let us denote A∗ (Γ∗ G) by A∗ (G). Remark that A1 (G) is the group IAG of auto[p]
[p]
morphisms acting trivially on L1 (Γ∗ G) = Gab ⊗Fp , hence on all of L(Γ∗ G) (because of
[p]
Proposition 3.6). If we show that A∗ (G) is p-restricted (and we will – see Proposition
3.10) then we get an inclusion:
[p]
[p]
Γ∗ IAG ⊆ A∗[p] (G).
We are thus led to consider a p-restricted version of the Andreadakis problem:
Problem 3 (Andreadakis – p-restricted version). What is the difference between the
[p]
[p]
[p]
p-restricted strongly central series A∗ (G) and Γ∗ (IAG ) ?
[p]
Remark 3.9. The group IAG contains IAG as a normal subgroup. Moreover, the
[p]
quotient IAG /IAG is a subgroup of Aut(G)/IAG , hence of GL(Gab ). In fact, by
[p]
definition of IAG , it is contained in the congruence group:
GL(pGab ) = ker(GL(Gab ) → GL(Gab ⊗ Fp )).
When G = Fn is a free group of finite type, then Aut(G)/IAG ∼
= GLn (Z), and
[p]
IAG /IAG is exactly GLn (p Z).
Proposition 3.10 ([HM17], Prop. 8.5). Let G∗ be a p-restricted strongly central filtration, and K be a group acting on G∗ . Then A∗ (K, G∗ ) is a p-restricted strongly central
filtration.
Proof. Let κ ∈ Aj (K, G∗ ) and g ∈ Gi . Using Corollary 3.1, we get:
p
[κ , g] =
p
Y
p
θ(k, 1)(k) ,
k=1
p
with θ(k, 1) ∈ Gi+kj , for all k. If k < p, then θ(k, 1)(k) ∈ Gp(i+kj) ⊆ Gi+pj+1 . As θ(p, 1)
also is in Gi+pj , we have:
[κp , g] ∈ Gi+pj .
This is true for every g ∈ Gi , for all i. Hence κp ∈ Apj (K, G∗ ), which completes the
proof.
Proposition 3.10 can be refined:
Proposition 3.11. Under the same hypothesis as Proposition 3.10, A∗ (K, G∗ ) n G∗
is a p-restricted strongly central series.
Proof. Denote A∗ (K, G∗ ) n G∗ by K∗ . An element of Kj = Aj n Gj is a product κ · g,
with κ ∈ Aj and g ∈ Gj . Using Corollary 3.2, we get:
p p
κg =
p
Y
p
p
θ(k)(k) = (κg)p · θ(2)(2) · · · θ(p − 1)p · θ(p),
(3.11.1)
k=1
with θ(1) = κg and θ(k) ∈ Kkj for any k, as K∗ is strongly central. We use this formula
to show, by induction on d 6 p, the following result:
∀j, Kjp ⊆ Kdj .
35
This is true for d = 1, obviously. Let us assume that it holds for d − 1. Let κg ∈ Kj .
For the sake of clarity, let us rewrite the formula (3.11.1):
p
p p
−1
(κg) = κ g · θ(p)
·
2
Y
p
θ(k)−(k) .
k=p−1
Using, respectively, that A∗ is p-restricted (Proposition 3.10), that G∗ is (by definition)
and that K∗ = A∗ n G∗ is strongly central, we get:
κp , g p , θ(p) ∈ Kpj ⊆ Kdj ,
where the inclusion
comes from the inequality d 6 p. If 2 6 k < p, then θ(k) ∈ Kkj .
As p divides kp , the induction hypothesis implies:
p
p
⊆ K(d−1)kj ⊆ Kdj ,
θ(k)(k) ∈ Kkj
because (d − 1)kj > dj. Finally, we get what we were looking for:
(κg)p ∈ Kdj ,
which completes the induction step, and the proof of the proposition.
Let SCF p be the full subcategory of SCF given by p-restricted strongly central
series. As a consequence of Propositions 3.10 and 3.11, we get:
Corollary 3.12. The category SCF p is action-representative, the universal action on
G∗ being A∗ (G∗ ) G∗ .
This allows us to answer [HM17, rk. 8.6]. Indeed, the Lie functor restricts to
a functor L : SCF p −→ pLie with values in the category pLie of p-restricted Lie
algebras (over Fp ). Actions in pLie are represented by p-restricted derivations, in the
sense of Jacobson [Jac41]. As in Paragraph 1.4, an action K∗ G∗ in SCF p induces,
by exactness of the Lie functor, an action L(K∗ ) L(G∗ ) in pLie, which is encoded
by a morphism between p-restricted Lie algebras:
τ : L(K∗ ) −→ Der[p] (L(G∗ )),
where Der[p] ⊆ Der is the p-restricted sub-algebra of p-restricted derivations, i.e. derivations ∂ satisfying:
∂(ap ) = adp−1
a (∂a).
Let us stress that for g ∈ pLie, the Lie algebra Der(g) is indeed a p-restricted subalgebra of EndFp (g), but is does not act on g in pLie: the Lie algebra g o Der(g) bears
no natural p-restricted structure.
Remark 3.13. Using Proposition 3.6 instead of 1.9, and replacing derivations by p[p]
restricted ones in the proof, we can get an analogous of Lemma 1.30 for A∗ (G):
n
o
[p]
[p]
Aj (G) = σ ∈ Aut(G) [σ, G] ⊆ Γj+1 (G) .
[p]
[p]
In other words A∗ (G) in the subgroup of automorphisms acting trivially on G/Γj+1 (G).
This is exactly the definition used by Cooper [Coo15, def 3.2].
36
Remark 3.14 (On the q-torsion case). The same statements are true when considering
q-torsion strongly central filtrations (q does not have to be a prime number here), except
that they are easier to show, because the condition Gqi ⊆ Gi+1 is equivalent to the fact
that L(G∗ ) is q-torsion. Precisely, if L(G∗ ) is q-torsion, then Der(L(G∗ )) is too, and the
injectivity of the Johnson morphism L(A∗ (G∗ )) ,→ Der(L(G∗ )) implies that L(A∗ (G∗ ))
also is. Hence A∗ (G∗ ), and A∗ (G∗ ) n G∗ are q-torsion, so that these give a universal
action on G∗ in the category of q-torsion strongly central series.
Moreover, L(G∗ ) also gets some kind of q-th power operation, induced by q-th
(q)
powers in G = G1 . If G∗ = Γ∗ G is Stallings’ filtration on G, then these operations,
together with the Lie algebra structure, generate L(G∗ ) from its degree one part, which
(q)
allow us to get an analogue of Lemma 1.30: Aj (Γ∗ G) is the subgroup of automor(p)
phisms acting trivially on G/Γj+1 (G). Using only this definition, Cooper managed
to get the above results on the q-torsion case [Coo15]. However, his claim that the
p-restricted case worked similarly [Coo15, Lem. 3.7] seems flawed, and we do not see
how to get it without the technical work done above (Proposition 3.10).
The minimality of Stallings’ filtration also gives an inclusion:
[q]
(q)
G
,
Γ∗ IAG ⊆ A∗ Γ(q)
∗
and a corresponding Andreadakis problem. Nevertheless, our methods in studying
the Andreadakis problems so far rely heavily on algebraic structures associated to the
F
[p]
dimension subgroups D∗Z (Fn ) = Γ∗ (Fn ) and D∗ p (Fn ) = Γ∗ (Fn ), so they are not suited
to the study of this particular problem.
3.4
3.4.1
The stable p-restricted Andreadakis problem
Vanishing of the trace map
In the p-restricted context, Proposition 2.33 is replaced by:
Proposition 3.15. Let k > 2, and let J ∈ GLm (IFkp Fn ). Then:
Tr (J − 1 ) ∈ [T V, T V ]k + (T V )p ⊂ V ⊗k ∼
= I k /I k+1 ,
Where V = Fnab ⊗ Fp ∼
= Fnp .
The proof is exactly the same as the proof of proposition 2.33, over Fp instead of
Z, Proposition 2.34 being replaced by:
Proposition 3.16. Let f (X1 , ..., Xn ) ∈ V ⊗k . Let C ⊂ Mk (Fp ) be the sub-Z-module
generated by the ei,i+1 . Suppose:
∀Ci ∈ C, Tr(f (C1 , ..., Cn )) = 0.
Then f ∈ [T V, T V ]k + (T V )p .
Proof. We say that two elements u and u0 of V ⊗k are cyclically equivalent, and we
write u ∼ u0 if they are conjugate under the action of Z /p. We want to show that f is
cyclically equivalent to a p-th power. Let us decompose f , up toP
cyclical equivalence,
as a sum of pairwise non-cyclically equivalent monomials: f ∼
µg g, where each g
is of the form g = Xi1 · · · Xik . If g is such that the iα are pairwise distinct, evaluate
each Xiα as Ciα = eα,α+1 , and all Xi not appearing in g as Ci = 0. Then µg =
37
Tr(f (C1 , ..., Cn )) = 0. As a consequence, no such g can appear in our decomposition
of f .
P
Let λ be the algebra morphism from T V to T (V ⊗ V ) sending Xi to j Xij (where
Xij = Xi ⊗ Xj ). Take a monomial g = Xi1 · · · Xik as above. Its image is λ(g) =
P
k
j Xi1 j1 · · · Xik jk , the sum being taken over every j = (j1 , ..., jk ) ∈ {1, ..., k} . Let r be
the number of monomials cyclically equivalent to h = Xi1 1 · · · Xik k in this sum. Then r
is exactly the number of elements of Z /k stabilizing g. It is a multiple of p if and only
if g is a p-th power. If we decompose λ(f ) up to cyclic equivalence, as we did earlier
for f , the only occurrences of h must come from λ(g), hence the coefficient of h must
be rµg . Note that λ(f ) satisfies the same hypothesis as f , because C is stable under
addition. Since the Xiα α are pairwise distinct, we can apply the above argument and
find that rµg = 0. Thus, µg = 0 or g is a p-th power. Whence the result.
Remark 3.17. Any bracket and any p-th power satisfies the condition of Proposition
3.16. For brackets, it follows from the fact that the
P trace of a bracket is itself a sum
of brackets. For p-th power, remark that if M Q
=
mi ei,i+1 ∈ Mn (R), where R is an
p
associative ring of caracteristic p, then M = ( mi ) · 1p , and Tr(1p ) = p · 1 = 0 in k.
If k = pl and f = (Xi1 · · · Xil )p , apply this to M = Ci1 · · · Cil (where the Ciα are in C),
seen as a p × p-matrix with coefficients in Ml (k).
Because of Proposition 3.15, in characteristic p, we will consider the trace map
[p]
as taking values in C∗ V = T V /([T V, T V ] + (T V )p ), which is the quotient of the
cyclic power C∗ V by p-th powers. The conclusion of Proposition 3.15 then becomes:
[p]
Tr (J − 1 ) = 0 ∈ C∗ V.
3.4.2
Linear algebra
Consider the Johnson morphism
[p]
[p]
∼
(τ [p] )0 : L[p] IA[p]
−→
Der
L
(F
)
= V ∗ ⊗ L[p] V,
n
n
∗
the last isomorphism being obtained as in Example 1.33, using Example 3.7 instead of
Example 1.8, and replacing derivations by p-restricted ones. When p 6= 2, the morphism
[p]
(τ1 )0 is surjective. Indeed, the free Fp -Lie algebra LV is a sub-algebra of the free prestricted algebra L[p] V , and this inclusion is an isomorphism in degrees prime to p, in
particular in degree 2; thus we can lift the generators of V ∗ ⊗ Λ2 V by the generators of
IAn used in the proof of Proposition 1.34. Moreover, L[p] (IAn ) is generated in degree
1 as a p-restricted Lie algebra (cf. 3.6). As a consequence, the image of τ 0 is exactly
[p]
the p-restricted Lie algebra generated in degree 1 inside Der[p]
∗ (L V ).
The reader can easily check that the obvious p-restricted version of Proposition 2.32
does hold: the trace map obtained from free differential calculus can be seen as the
[p]
[p]
[p]
composite of the Johnson morphism τ : Lk (A∗ (Fn )) → Derk (L[p] V ) ∼
= V ∗ ⊗ Lk+1 V
with:
Φ
π
ι
[p]
[p]
TrM : V ∗ ⊗ Lk+1 V −→ V ∗ ⊗ V ⊗k+1 −→ V ⊗k −→ Ck V,
where ι and π again denote the canonical maps.
Notation 3.18. Let I[p] denote the image of (τ [p] )0 , the p-restricted Lie algebra generated in degree 1 inside Der(LV ).
The following proposition can be seen as a direct consequence of Proposition 3.15.
38
[p]
Proposition 3.19. For every k > 2, TrM (Ik ) = {0}.
Consider be the subspace of p-restricted derivations stabilizing the free Fp -Lie algebra LV ⊂ L[p] V . It is a p-restricted Lie sub-algebra of Der[p] (L[p] V ). Since each
derivation of LV extends to a unique p-restricted derivation of L[p] V , this sub-algebra
is isomorphic to Der(LV ). Under the identification with the graded module V ∗ ⊗L[p] V ,
it corresponds exactly to V ∗ ⊗ LV . As a consequence, if p 6= 2, the degree one part is
the same. Hence:
[p]
I[p] ⊆ DerLV (L[p] V ).
This implies that there is no stable surjectivity here: we can easily easily produce
examples of automorphisms whose associated derivation does not preserve LV . For
instance, take any world in Γk (Fn ) not containing any occurrence of x1 . Then the
[p]
automorphism ϕ defined by x1 7→ wp x1 and xi 7→ xi when i 6= 1 is obviously in Apk−1 ,
but τ (ϕ) = X1∗ ⊗ (w − 1)p sends X1 outside of LV .
3.4.3
Stable cokernel of i∗
We close the present paper with a quantification of the lack of stable surjectivity in
the p-restricted case.
Let k > 2. Like in paragraph 2.5.3, we get a commutative diagram with exact rows:
Īk
V ∗ ⊗ Lk+1 V
φ
[T V, T V ]k
Xk
Φ
Φ
π
V ⊗k
Ck V.
Here, V denotes Fnab ⊗ Fp , and Ī∗ = I∗ ⊗ Fp is the sub-Lie algebra generated in degree
one inside Der(LV ). The space Xk is just the quotient of V ∗ ⊗ Lk+1 V by Īk .
We will be interested in a slightly different diagram, though:
[p]
Ik
V ∗ ⊗ Lk+1 V
Xk0
Φ
φ
Φ
[p]
π
V ⊗k
[T V, T V ]k + (T V )p
Ck V.
We can still apply the calculations from [Sat12] to show that if n > k + 2, then Φ is
[p]
surjective and ker Φ ⊆ Īk ⊆ Ik . Only, now φ could have a cokernel. From [Sat12],
we only get that brackets are in its image, so this cokernel can only come from p-th
powers. In particular, it is concentrated in degrees divisible by p. We denote it by K.
The same application of the snake lemma as in the proof of Proposition 2.37 gives that
K is also the kernel of Φ, and that Φ is surjective.
Now consider the diagram:
[p]
Ik
V ∗ ⊗ Lk+1 V
Xk0
ι
ker(TrM )k
Φ
[p]
V ∗ ⊗ Lk+1 V
39
TrM
[p]
Ck V.
[p]
Denote by L the cokernel of the middle inclusion, then L = V ∗ ⊗ (Lk+1 V /Lk+1 V ) is
concentrated in degrees k = pl − 1 (with l > 1). The snake lemma gives a short exact
sequence:
0
K
coker(ι)
L
0.
Since the trace map TrM ◦τ vanishes, we have a commutative diagram:
i∗
[p]
L(IAn )
τ0
[p]
L(A∗ )
τ
ker(TrM ).
This implies that the cokernel of i∗ injects into the cokernel of ι. Thus, we have proved:
Proposition 3.20. Fix n an integer, and consider only degrees k 6 n−2. The cokernel
of the canonical morphism
i∗ : L(IAn[p] ) → L(A∗[p] (Fn ))
is concentrated in degrees k = pl − 1 and k = pl (for l > 1). If k = pl − 1, then
[p]
coker((i∗ )k ) injects into V ∗ ⊗ (Lk+1 V /Lk+1 V ). If k = pl, it is a sub-quotient of V ⊗l .
Remark 3.21. The tensor power V ⊗l appearing in the proposition is in fact the Frobenius twist of V ⊗l . This has no consequence here, as the Frobenius map is trivial on Fp ,
but it should be kept in mind for any functorial study of this situation.
References
[And65]
Stylianos Andreadakis. On the automorphisms of free groups and free
nilpotent groups. Proc. London Math. Soc. (3), 15:239–268, 1965. 2
[Bar13]
Laurent Bartholdi. Automorphisms of free groups. I. New York J. Math.,
19:395–421, 2013. 2, 25, 26, 28, 32
[Bar16]
Laurent Bartholdi.
Automorphisms of free groups. I—erratum [
MR3084710]. New York J. Math., 22:1135–1137, 2016. 2
[BB04]
Francis Borceux and Dominique Bourn. Mal’cev, protomodular, homological
and semi-abelian categories, volume 566 of Mathematics and its Applications. Kluwer Academic Publishers, Dordrecht, 2004. 7, 11
[BB07]
Francis Borceux and Dominique Bourn. Split extension classifier and centrality. In Categories in algebra, geometry and mathematical physics, volume 431 of Contemp. Math., pages 85–104. Amer. Math. Soc., Providence,
RI, 2007. 2, 8
[BBM07]
Mladen Bestvina, Kai-Uwe Bux, and Dan Margalit. Dimension of the
Torelli group for Out(Fn ). Invent. Math., 170(1):1–32, 2007. 1, 13
[BC05]
F. Borceux and Maria Manuel Clementino. Topological semi-abelian algebras. Adv. Math., 190(2):425–453, 2005. 7
40
[BEH08]
Laurent Bartholdi, Bettina Eick, and René Hartung. A nilpotent quotient
algorithm for certain infinitely presented groups and its applications. Internat. J. Algebra Comput., 18(8):1321–1344, 2008. 2
[BJK05]
Francis Borceux, George Janelidze, and Gregory M. Kelly. On the representability of actions in a semi-abelian category. Theory Appl. Categ.,
14:No. 11, 244–286, 2005. 2, 8
[BLGM90] Roger M. Bryant, Frank Levin, Chander K. Gupta, and Horace Y.
Mochizuki. Nontame automorphisms of free nilpotent groups. Comm.
Algebra, 18(11):3619–3631, 1990. 3, 28, 29, 33
[BMS67]
Hyman Bass, John Milnor, and Jean-Pierre Serre. Solution of the congruence subgroup problem for SLn (n > 3) and Sp2n (n > 2). Inst. Hautes
Études Sci. Publ. Math., 33:59–137, 1967. 16
[Bou08]
Dominique Bourn. Commutator theory, action groupoids, and an intrinsic
Schreier-Mac Lane extension theorem. Adv. Math., 217(6):2700–2735, 2008.
2, 8
[CE16]
Michael Chapman and Ido Efrat. Filtrations of free groups arising from
the lower central series. J. Group Theory, 19(3):405–433, 2016. 34
[CEFN14] Thomas Church, Jordan S. Ellenberg, Benson Farb, and Rohit Nagpal.
FI-modules over Noetherian rings. Geom. Topol., 18(5):2951–2984, 2014.
31
[Coo15]
James Cooper. Two mod-p Johnson filtrations. J. Topol. Anal., 7(2):309–
343, 2015. 36, 37
[CP17]
Thomas Church and Andrew Putamn. Generating the johnson filtration ii:
finite generation. arXiv:1704.01529, 2017. 1
[CV86]
Marc Culler and Karen Vogtmann. Moduli of graphs and automorphisms
of free groups. Invent. Math., 84(1):91–119, 1986. 1
[Dar68]
Rex S. Dark. On nilpotent products of groups of prime order. PhD thesis,
University of Cambridge, 1968. 33
[Dja16a]
Aurélien Djament. Décomposition de hodge pour l’homologie stable des
groupes d’automorphismes des groupes libres. arXiv:1510.03546, 2016. 1
[Dja16b]
Aurélien Djament. Des propriétés de finitude des foncteurs polynomiaux.
Fund. Math., 233(3):197–256, 2016. 31
[DP12]
Matthew Day and Andrew Putman. A Birman exact sequence for Aut(Fn ).
Adv. Math., 231(1):243–275, 2012. 1
[DP16]
Matthew B. Day and Andrew Putamn. On the second homology group of
the torelli subgroup of aut(fn ). arXiv:1408.6242v3, 2016. 1, 2
[DV15]
Aurélien Djament and Christine Vespa. Sur l’homologie des groupes
d’automorphismes des groupes libres à coefficients polynomiaux. Comment.
Math. Helv., 90(1):33–58, 2015. 1
41
[FM12a]
Benson Farb and Dan Margalit. A primer on mapping class groups, volume 49 of Princeton Mathematical Series. Princeton University Press,
Princeton, NJ, 2012. 1
[FM12b]
Stefano Francaviglia and Armando Martino. The isometry group of outer
space. Adv. Math., 231(3-4):1940–1973, 2012. 1
[Fox53]
Ralph H. Fox. Free differential calculus. I. Derivation in the free group ring.
Ann. of Math. (2), 57:547–560, 1953. 19
[Fra33]
Hermann Frasch. Die Erzeugenden der Hauptkongruenzgruppen für
Primzahlstufen. Math. Ann., 108(1):229–252, 1933. 17
[Gal11]
Søren Galatius. Stable homology of automorphism groups of free groups.
Ann. of Math. (2), 173(2):705–768, 2011. 1
[Gro52]
Emil Grosswald. On the parabolic generators of the principal congruence
subgroups of the modular group. Amer. J. Math., 74:435–443, 1952. 17
[Hal34]
Philip Hall. A contribution to the theory of groups of prime-power order.
Proc. London Math. Soc. (2), 36:29–95, 1934. 33
[HL11]
Manfred Hartl and Bruno Loiseau. A characterization of finite cocomplete
homological and of semi-abelian categories. Cah. Topol. Géom. Différ.
Catég., 52(1):77–80, 2011. 7
[HM17]
Kazuo Habiro and Gwenael Massuyeau. Generalized johnson homomorphisms for extended n-series. arXiv:1707.07428, 2017. 2, 4, 12, 35, 36
[Jac41]
Nathan Jacobson. Restricted Lie algebras of characteristic p. Trans. Amer.
Math. Soc., 50:15–25, 1941. 34, 36
[Joh83]
Dennis Johnson. A survey of the Torelli group. In Low-dimensional topology
(San Francisco, Calif., 1981), volume 20 of Contemp. Math., pages 165–
179. Amer. Math. Soc., Providence, RI, 1983. 13
[JW04]
Craig A. Jensen and Nathalie Wahl. Automorphisms of free groups with
boundaries. Algebr. Geom. Topol., 4:543–569, 2004. 1
[Kal50a]
Léo Kaloujnine. Sur quelques propriétés des groupes d’automorphismes
d’un groupe abstrait. C. R. Acad. Sci. Paris, 230:2067–2069, 1950. 8
[Kal50b]
Léo Kaloujnine. Sur quelques propriétés des groupes d’automorphismes
d’un groupe abstrait. (Généralisation d’un theorème de M. Ph. Hall). C.
R. Acad. Sci. Paris, 231:400–402, 1950. 8
[Kaw06]
Nariya Kawazumi.
Cohomological aspects of magnus expansions.
arXiv:math/0505497, 2006. 13
[KM97]
Sava Krstić and James McCool. The non-finite presentability of IA(F3 )
and GL2 (Z[t, t−1 ]). Invent. Math., 129(3):595–606, 1997. 1
[Laz54]
Michel Lazard. Sur les groupes nilpotents et les anneaux de Lie. Ann. Sci.
Ecole Norm. Sup. (3), 71:101–190, 1954. 3, 6, 8, 14, 34
42
[Lop14]
Jonathan Lopez. Lie algebras and cohomology of congruence subgroups for
SLn (R). J. Pure Appl. Algebra, 218(2):256–268, 2014. 3, 16
[LS76]
Ronnie Lee and Robert H. Szczarba. On the homology and cohomology of
congruence subgroups. Invent. Math., 33(1):15–53, 1976. 3, 17
[ML98]
Saunders Mac Lane. Categories for the working mathematician, volume 5
of Graduate Texts in Mathematics. Springer-Verlag, New York, second
edition, 1998. 7
[Mor93]
Shigeyuki Morita. Abelian quotients of subgroups of the mapping class
group of surfaces. Duke Math. J., 70(3):699–726, 1993. 3, 25
[MP09]
Roman Mikhailov and Inder Bir Singh Passi. Lower central and dimension
series of groups, volume 1952 of Lecture Notes in Mathematics. SpringerVerlag, Berlin, 2009. 14
[MS17]
Gwenael Massuyeau and Takuya Sakasai. Morita’s trace maps on the group
of homology cobordisms. arXiv:1606.08244, 2017. 2, 28
[Nie24]
Jakob Nielsen. Die Isomorphismengruppe der freien Gruppen. Math. Ann.,
91(3-4):169–209, 1924. 1, 13
[Pas79]
Inder Bir S. Passi. Group rings and their augmentation ideals, volume 715
of Lecture Notes in Mathematics. Springer, Berlin, 1979. 14, 33, 34
[Pas85]
Donald S. Passman. The algebraic structure of group rings. Robert E.
Krieger Publishing Co., Inc., Melbourne, FL, 1985. Reprint of the 1977
original. 33
[Rip72]
Eliyahu Rips. On the fourth integer dimension subgroup. Israel J. Math.,
12:342–346, 1972. 14
[Rot95]
Joseph J. Rotman. An introduction to the theory of groups, volume 148 of
Graduate Texts in Mathematics. Springer-Verlag, New York, fourth edition,
1995. 13
[RWW17] Oscar Randal-Williams and Nathalie Wahl. Homological stability for automorphism groups. Adv. Math., 318:534–626, 2017. 1
[Sat12]
Takao Satoh. On the lower central series of the IA-automorphism group of
a free group. J. Pure Appl. Algebra, 216(3):709–717, 2012. 2, 3, 25, 30, 39
[Sta65]
John Stallings. Homology and central series of groups. J. Algebra, 2:170–
181, 1965. 34
[Zas39]
Hans Zassenhaus. Ein Verfahren, jeder endlichen p-Gruppe einen Lie-Ring
mit der Charakteristik p zuzuordnen. Abh. Math. Sem. Univ. Hamburg,
13(1):200–207, 1939. 34
43
| 4math.GR
|
Programmable Agents
arXiv:1706.06383v1 [cs.AI] 20 Jun 2017
Misha Denil Sergio Gómez Colmenarejo
Serkan Cabi David Saxton Nando de Freitas
DeepMind
{mdenil,sergomez,cabi,saxton,nandodefreitas}@google.com
Abstract
We build deep RL agents that execute declarative programs expressed in formal language. The agents learn to ground the terms in this language in their environment,
and can generalize their behavior at test time to execute new programs that refer to
objects that were not referenced during training. The agents develop disentangled
interpretable representations that allow them to generalize to a wide variety of
zero-shot semantic tasks.
1
Introduction
This paper shows how to build agents that can execute declarative programs expressed in a simple
formal language. The agents learn to ground the terms of the language in their environment through
experience. The learned groundings are disentangled and compositional; at test time we can ask the
agents to perform tasks that involve novel combinations of properties and they will do so successfully.
The agents learn to distinguish distinct properties that are referenced together during training; when
trained on tasks that always reference objects through a conjunction of shape and color the agents can
generalize at test time to tasks that reference objects through either property in isolation.
Completely novel object properties can be referenced through the principle of exclusion (i.e. the
object whose color you have not seen before), and our agents are able to successfully complete tasks
that reference novel objects in this way. This works even when the agents have never encountered
programs involving this type of reference during training. Referring to objects that possess multiple
novel properties is also successful, as is referring to objects through combinations of known and
unknown properties.
Our agents are robust to catastrophic forgetting. If we train on a subset of tasks then not only can the
agents accomplish novel tasks zero-shot, but if we switch to training only on the novel tasks then
performance on the original tasks does not degrade.
Our agents are implemented as deep neural networks, and trained end to end with reinforcement
learning. The agents learn how programs refer to properties of objects and how properties are assigned
to objects in the world entirely through their experience interacting with their environment. Natural
and interpretable assignments of properties to objects emerge without any direct supervision of how
these properties should be assigned. No auxiliary prediction or control tasks are required for good
performance (although exploring their effects in this setting is a nice possibility for future work).
The representations learned by our agents are extremely interpretable. There is an explicit mapping
between activation maps in the programmable layers of our agents and terms in the programs they
execute. Visualizing these activation maps provides an immediately interpretable picture of how the
agents assign properties to objects in their world.
The extremely powerful generalization our agents achieve is made possible by our novel “Programmable Network” architecture. Programmable Networks impose a sophisticated bottleneck on
the agent’s representations whose structure ensures that their representations will generalize.
Submitted to 31st Conference on Neural Information Processing Systems (NIPS 2017).
2
Related work
The work in this paper builds on two recent lines of work in deep learning. One is the resurgence of
modular networks that can be decomposed and recomposed to compute different functions. Neural
Module Networks [2, 1], which use modularity in visual question answering, have been particularly
influential on our thinking. This type of approach has also recently seen great success in answering
questions that involve relational reasoning [15, 16].
The second recent trend we follow is the rise of relational neural network architectures, particularly
Interaction Networks [4] and the Neural Physics Engine [8]. At a high level these works on relational
architectures are subsumed by the various neural approaches to graph processing. A nice overview of
recent techniques can be found in Gilmer et al. [12].
Compositionality has become a topic of great interest in machine learning, robotics and cognitive
science [20, 30, 19, 9, 35, 26], and it has been central to research in language [32, 25, 33, 36].
Compositional neural architectures paired with different forms of attention have led to impressive
results in natural language interfaces for database tables, and language acquisition in 2D navigation
environments [28, 37]. Yu et al. [37] present a different deep RL approach to grounding symbols on
perception, and introduce a visual question answering auxiliary task to improve zero-shot generalization. Use of programs to specify hard deterministic gating is also reminiscent of PAQ8 [24, 18].
3
Tasks as declarative programs
Building neural networks that infer or execute computer programs has been a popular topic of recent
research. Different approaches to this problem focus on networks that infer programs [3, 10, 22], on
networks that execute programs [39, 30, 5] and on networks that jointly do both [14, 17, 38, 29, 13];
although there is much overlap between many of these approaches. The majority of these works
model their networks after an imperative programming style, although researchers have also begun to
explore structuring their networks as functional (recursive) programs as well [7, 30].
In this work we depart from previous work by considering networks that execute a simple declarative
language. Paradigmatic examples of declarative languages are PROLOG [6, 5] and SQL. The
declarative paradigm provides an appealing and flexible way to describe tasks for agents [23].
Our general framework is as follows: A goal is specified as a state of the world that satisfies a relation
between two objects. Objects are associated with sets of properties (e.g. their color and shape). The
vocabulary of properties gives rise to a system of base sets which are the sets of objects that share
each named property (e.g. RED is the set of red objects, etc). The full universe of discourse is then the
Boolean algebra generated by these base sets.
We require two things for each program. The verifier has access to the true state of the environment,
and can inspect this state to determine if it satisfies the program. We also need a search procedure
which inspects the program as well as some summary of the environment state and decides how to
modify the environment to bring the program closer to satisfaction.
These components correspond directly to components of the standard RL setup. Notably, the verifier
is a reward function (which has access to privileged information about the environment state) and the
search procedure is an agent (which may have a more restrictive observation space).
There are several advantages to thinking in this way. The first is that building semantic tasks becomes
straightforward, we need only specify a new program to obtain a new reward function that depends
on semantic properties of objects in the environment. Consequently, we can easily specifiy diverse,
combinatorial tasks.
Another advantage is that this framing places the emphasis squarely on generalization to new tasks.
A program interpreter is not very useful if you must enumerate all programs you might want to run
up front. Our goal is not only to perform combinatorial tasks, but to be able to specify new behaviors
at test time, and for them to be accomplished successfully without additional training.
This type of generalization is quite difficult to achieve with deep RL. In this paper we focus on
reaching for blocks, but the simplicity of the individual tasks belies the complexity of what we
achieve. The challenge here is to have agents ground the terms of the programming language in their
environment and, at test time, to be able to execute new programs that use these terms in novel ways.
2
Figure 1: The programmable reaching environment consists of a square arena with a robot arm in
the center. Blocks are scattered randomly and the task in each episode is to reach towards a specific
block, identified by a combination of shape and color. The leftmost frame shows a training episode,
and the remaining frames show various types of generalization that agents trained in this setting are
capable of, including operating on single properties, varying numbers of objects, and novel shapes.
4
Programmable reaching environment
Figure 1 shows several visualizations of our programmable reaching environment, which consists of
a mechanical arm in the center of a large table. The arm is a simplified version of the Jaco arm, where
the body has been stereotyped to basic geoms (rigid body building components [34]), and the finger
actuators have been disabled. In each episode a fixed number of blocks appear at random locations
on the table. Each block has both a shape and a color, and the combination of both are guaranteed
to uniquely identify each block within the episode. The programmable reaching environment is
implemented with the MuJoCo [34] physics engine, and hence the objects are subject to friction,
contact forces, gravity, etc.
Each task in the reaching environment is to put the “hand” of the arm (the large white geom) near
the target block, which changes in each episode. The task is communicated to the agent with two
integers specifying the target color and shape, respectively.
The complexity of the environment can be varied by changing the number, colors and shapes that
blocks can take. In this work we consider 2x2 (two colors and two shapes) and 3x3 variants. We can
also control the number of blocks that appear on the table in each episode, and we fix it to four blocks
during training to study generalization to other numbers. When there are more possible blocks than
are allowed on the table the episode generator ensures that the reaching task is always achievable (i.e.
the agent is never asked to reach for a block that is not present).
The arm has 6 actuated rotating joints, which results in 6 continuous actions in the range [0, 1]. The
observable features of the arm are the positions of the 6 joints, along with their angular velocities.
The joint positions are represented as the sin and cos of the angle of the joint in joint coordinates.
This results in a total of 18 (6 × 2 + 6) body features describing the state of the arm.
Objects are represented using their 3d position as well as a 4d quaternion representing their orientation,
both represented in the coordinate frame of the hand. Each block also has a 1-hot encoding of its
shape (4d) and its color (5d), for a total of 16 object features per block. We provide object features for
all of the blocks on the table as well as the hand, but not for the other bodies that compose the arm.
We can write a reaching program in this environment as
NEAR(HAND, AND(RED, CUBE))
(1)
which specifies that the hand should be near the red cube. This condition can be checked automatically
by the verifier to produce a reward function that takes on the values ±1. The verifier interprets NEAR
by thresholding the distance between its arguments, but this is exposed to the agent only through the
values the reward function takes in different states.
To show zero-shot generalization we partition the set of possible target blocks into train and test
conditions. We train an agent by choosing a target randomly from the train conditions in each episode,
and evaluate the agent on its performance reaching for blocks from the test conditions, which were
never targets during training. We call an assignment of targets to train and test conditions a design.
The left panel in Figure 2 shows the designs we consider for the 2x2 and 3x3 variants of the reaching
environment. Rows and columns of each matrix correspond to different shapes and colors, respectively
and each cell of each matrix corresponds to a different task. The cells are color coded so that yellow
3
Objects
2-L
2-C
Program
Red
Properties
3-D
Blue
White
∧
Cube
Sphere
⌦
Hand
∨
Relevant Objects Vector (p)
Figure 2: Left: Different designs for 2x2 and 3x3 environments. Center: Relationship between Ω
and Φ. The features in Ω have detectors applied to them to produce the disentangled representation
Φ. Right: Example of how the detectors interact with the program. The property detector outputs Φ
are shown as binary to ease interpretation, but in practice they are learned continuous values.
indicates train conditions, and magenta indicates conditions only seen at test time. The magenta tasks
are used to evaluate zero-shot generalization after the agent is trained.
5
Programmable networks
Due to space constraints we describe only the main components of the Programmable Network
architecture in this section. Full details of how everything comes together can be found in Appendix A.
5.1
Executing programs
We begin by explaining how the program operates when given a mapping between objects and
properties, denoted by Φ and explained below. In later sections we expand on this to explain how
the assignment of properties to objects can be learned, and how the assignment process can be made
differentiable to enable end to end training from a behavioural objective; however, for clarity of
presentation it is easiest to begin under the simplifying assumption that the assignments of properties
to objects are crisp (i.e. 0-1) and known.
The input to the program is a matrix Φ whose columns are objects and rows are properties. The
elements of this matrix are in {0, 1} (this will be relaxed later) where Φij = 1 indicates that the
object j has property i.
Figure 2 shows how the set of relevant objects are identified for the example reaching program in
Equation 1. In this example the environment contains four blocks and the robot hand, for a total
of five objects. Each object has two properties, a color and a shape, which are together enough to
uniquely identify it. The set of relevant objects for this program can be expressed as
OR(HAND, AND(RED, CUBE))
(2)
and an indicator function for this set can be obtained by combining the rows of Φ, as explained below.
Each row of Φ corresponds to a particular property that can be referenced in a program, and the
values in the rows serve as indicator functions over subsets of objects that have the corresponding
property. These can be used to select new groups of objects by standard Boolean operations, which
can be implemented by applying elementwise operations to the rows of Φ.
Figure 2 shows how the set in Equation 2 is obtained. The functions AND and OR in the specification
(shown as ∧ and ∨ in the figure) correspond to the set operations of intersection and union, respectively.
The result is a vector whose elements form an indicator function over objects. The set corresponding
to the indicator function contains both the robot hand and the red cube and excludes the remaining
objects.
We call the result of this operation the relevant objects vector and denote it with p (for “presence” in
the set of relevant objects). This vector will play a role in the down stream reasoning process of our
agents.
The order of rows and columns of Φ is arbitrary. We take advantage of this to assign indexes to
named properties in an arbitrary (but fixed) order. This is the same type of assignment that is done
4
for language models when words in the model vocabulary are assigned to indexes in an embedding
matrix, and imposes no loss of generality beyond restricting our programs to a fixed “vocabulary” of
properties.
Note that none of the operations described in this section depend on the number of objects. We will
take advantage of this flexibility in the experiments to show that the behaviors we learn can generalize
to different numbers of objects in the environment.
5.2
Differentiating through program execution
The program execution described in the previous section makes use of set operations on indicator
functions, which are uniquely defined when the sets are crisp; however, this uniqueness is lost if the
sets are soft. We would like to apply programs to soft sets so that the assignment of properties to
objects can be learned by backprop. This requires not only that our set operations apply to soft sets,
but also that they be differentiable.
There are many ways to meet both of these requirements; for our purposes it is convenient to choose
the following assignment:
not(x) = 1 − x
and(x, y) = xy
or(x, y) = x + y − xy
(3)
It can be verified that these operations are self-consistent (e.g. x = not(not(x))), and reduce to
standard Boolean operations when x, y ∈ {0, 1}. This particular assignment is convenient because
each operation always gives non-zero derivatives to all arguments.
5.3
Learned grounding
The discussion in Section 5.1 assumed that the assignment of properties to objects is given; however,
it is much more interesting if our agents can learn to create the matrix Φ rather than having it provided
by the environment. In our architecture learning to populate the elements of Φ is the role of detectors.
A detector operates on a matrix of features Ω. Similar to Φ, the columns of Ω correspond to objects
but the rows of Ω are opaque vectors, populated by whatever information the environment provides
about objects.
We create one detector for each property in our vocabulary. Each detector is a small neural network
that maps columns ωj of Ω to a value in [0, 1]. Detectors are applied independently to each column
of the matrix Ω, and each detector populates a single row of Φ. Groups of detectors corresponding to
sets of mutually exclusive properties (e.g. blocks can only have one color in our experiments) have
their outputs coupled by a softmax. For example, when learning the matrix in Figure 2 each column
is the output of two softmaxes, one over colors and one over shapes.
These columns of Ω are filled with whatever features the environment provides, position, orientation,
etc. These features must have enough information to identify the properties in our vocabulary, but
this information is permitted to be entangled with other features in Ω, while it must be disentangled
in Φ. This relationship is diagrammed in Figure 2.
It would be simple to pre-train the detectors for each property and provide those to the agent. However,
one of the contributions of this paper is to show that with our network architecture we do not need
to do this. Our agents learn to identify meaningful properties of objects and to reason about sets of
objects formed by combinations of these properties in a completely end to end way.
5.4
Relational reasoning
Up to this point we have described completely separate processing for each object. The agent receives
a matrix Ω whose rows are features and columns are objects. We apply a battery of detectors to
each column Ω to create the matrix Φ where rows are properties and columns are again objects. The
program then applies elementwise operations to the rows of Φ to create the relevant objects vector p.
In order to allow reasoning over relationships between objects we introduce a message passing scheme
to exchange information between the objects selected by the relevant objects vector. Our message
passing operation closely resembles an Interaction Network [4] with some additional features.
5
1.0
0.5
0.0
0.5
1.0
Canonical
2-L Train
2-L Eval
2-C
Programmable 2-L
1.0
0.5
0.5
0.0
0.0
2-L Train
2-L Eval
0.5
0
2
4
6
8
Steps (millions)
10
1.0
1.0
0
0.5
1.0
1.5
Steps (millions)
Programmable 3-D
0.5
0.0
3-D Train
3-D Eval
0.5
1.0
0.0
2.0
Distilled 3-D
1.0
1.0
2.0 3.0 4.0
Steps (millions)
3-D Train
3-D Eval
0.5
5.0
1.0
0.0
1.0
2.0 3.0 4.0
Steps (millions)
5.0
Figure 3: Left: Performance of the canonical and programmable architectures on the 2-C and 2-L
environment variants. Center: Training and generalization curves for programmable agents with
learned detectors trained on the 2-L and 3-D reaching variants. Learning is somewhat unstable in
these cases, but successful agents learn to generalize perfectly. Right: Training and generalization
curves for distilled agents trained on the 3-D variant (results for 2-L are similar). Exploiting ground
truth property information at training time substantially stabilizes learning.
Using ωi and ωj to represent columns of Ω, we can write a single round of message passing as
X
ωi0 = f (ωi ) +
αij r(ωi , ωj )
(4)
j
ωi0
where is the resulting transformed features of object i. This operation is applied to each column
of Ω, and the resulting vectors are aggregated into the columns of a new matrix Ω0 . The function
f (ωi ) produces a local transformation of the features of a single object, and r(ωi , ωj ) provides a
message from object j → i. We implement the functions f and r with small MLPs, and structurally
the message passing operation is similar to that of Interaction Networks [4] and the Neural Physics
Engine [8].
Messages between objects are mediated by edge weights αij which are determined using a modified
version of the neighborhood attention operation of Duan et al. [11],
pj exp α̃ij
ci = Linear(ωi )
qi = Linear(ωi )
α̃ij = wT tanh(qi + cj )
αij = P
k pk exp α̃ik
Recall that p is the relevant objects vector (which is a result of the program, see Figure 2), and that its
elements lie in the interval [0, 1]. To understand why they are included in this way, consider what
happens if pj = 0, which means that object j is not a relevant object for the current task. In this
case the resulting αij = 0 also, and the effect is that the message from j → i in Equation 4 does not
contribute to ωi0 . In other words, task-irrelevant objects do not pass messages to task-relevant objects
during relational reasoning.
If we were to consider different types of relations in our programs (beyond NEAR), we would do so
by parameterizing the message passing operation based on the relation to be achieved. Since we
consider only reaching tasks, this extra complexity is not needed in the present work.
After message passing an output can be produced by computing a = MLP(tanh(hΩ0 , pi)). For full
details see Appendix A.
6
Experiments
In this section we look at various ways that agents implemented as Programmable Networks can
generalize. Throughout this section we refer to different variants of the programmable reaching
environment using the names indicated in the left panel of Figure 2. All of our agents are trained
using Deterministic Policy Gradient [31, 21], where both the actor and the critic are Programmable
Networks. See Appendix A for full details of our training setup.
6.1
Standard methods fail to generalize
We start by showing that the programmable reaching environment poses a non-trivial challenge. This
is perhaps not immediately obvious, because the individual tasks (i.e. reaching for a single block)
are very simple. The 2-C design, where all possible target blocks are seen during training, is readily
solved by standard deep architectures. Where standard architectures fail (and do so catastrophically)
is in generalization to unseen combinations of properties.
6
1.0
0.5
0.0
0.5
1.0
train
eval
only only not not three five nine ignore new new new random
color shape color shape blocks blocks blocks new color shape color agent
and shape
Figure 4: Generalization experiments. Each column shows the performance distribution of a single
agent on zero-shot tasks under different conditions. See text for a full description.
For the standard architecture we compare against an architecture similar to the one of Lillicrap et al. [21], modified for feature based observations. We call this the “canonical” architecture as
it has been shown to achieve good performance on many continuous control tasks.
Performance of the canonical architecture on the 2-C and 2-L designs is shown in the left plot of
Figure 3. Reward per step of ~0.6 is effectively perfect performance in these environments.
What we see from these curves is that the canonical architecture achieves good performance on all of
the tasks it was trained on, but in the 2-L case it completely fails to generalize its behavior to reaching
for the held out target. Good performance on 2-C verifies that this is not merely a capacity problem;
when the network is trained on all four tasks it is able to achieve all four.
6.2
Zero-shot tasks
The center plots in Figure 3 show performance curves for the Programmable Agent on the training and
evaluation conditions of the 2-L and 3-D designs. Learning is not always stable, but is nonetheless
successful in many cases. We emphasize that the difficulty here is stability rather than a performance;
agents that succeed in training perform very well in generalization.
Stability of training can be improved by taking advantage of ground truth property information in the
critic at training time. In this setting the actor still learns detectors, but the critic does not. We call
this the “distilled” model, and learning curves for distilled agents on the 3-D design are shown in the
right of Figure 3.
6.3
Strong generalization
Because our architecture partitions the objects into sets that have different properties we can achieve
very strong generalization. Figure 4 shows zero-shot performance of one of our agents with fully
learned detectors (i.e. no distillation) trained on the 3-D design. Each column summarizes the reward
per step achieved by the agent over 100 testing episodes under different generalization conditions.
Figure 4 also shows two baseline conditions. The train condition corresponds to the agent being
tested on new episodes of the tasks it was trained on, and the random condition corresponds to the
performance of the same agent with random weights.
We only show results for the Programmable Agent because we were not successful in training agents
with the canonical architecture on any of 3x3 design. Even when all tasks are seen during training
(the most informative possible 3x3 setting) the canonical architectures were no better than random.
The zero-shot conditions in Figure 4 are as follows:1
•
•
•
•
eval shows performance on the zero-shot tasks of the 3-D design, as shown in Figure 2.
only color/shape shows performance when only the color or shape is specified.
not color/shape shows performance when the color or shape to not reach for is specified.
# blocks show performance of zero-shot tasks with different numbers of blocks on the
table. All training episodes had exactly four blocks.
• ignore new blocks shows the performance of zero-shot tasks in the presence of new
block shapes and colors.
1
Videos for each condition can be found at: https://goo.gl/UkvWYE
7
3-D Train Conditions
1.0
0.5
0.5
0.0
0.0
Train
Eval
0.5
1.0
3-D Eval Conditions
1.0
0
1
2
3
4
Steps (millions)
Train
Eval
0.5
5
1.0
0
1
2
3
4
Steps (millions)
5
Figure 5: Left: performance on the off-diagonal and diagonal tasks for the 3x3 environment. Training
begins on the off-diagonal tasks and switches to the diagonal tasks at 2.5m steps (marked by the solid
black line). The dashed black line shows the point where all transitions from off-diagonal task have
been pushed out of the replay buffer. Right: The learned property matrix Φ (actually its transpose)
produced from the adjacent environment state. See Appendix C for additional visualizations.
• reach new shape shows the performance when reaching for blocks with a novel shape
and known color.
• reach new color shows the performance when reaching for blocks with a novel color
and known shape.
• reach new shape and color shows the performance when reaching for a block when
both the color and shape are novel.
We introduce new blocks by adding an additional shape and color to the set of possible blocks that can
appear on the table (for a total of 16 possible combinations). In the ignore new blocks condition
blocks with the new properties can appear on the table as distractors, but are never the target of
a reaching program. In the only shape and only color conditions we modify the environment
generation process to ensure that the target is uniquely identified by the specified color or shape.
Apart from the train and random conditions, every episode of every task in Figure 4 is zero-shot.
Every program specifies the target in a way the agent did not see at training time. When showing
generalization to different numbers of blocks (in the # blocks conditions) and the ability to ignore
novel distractor blocks (in ignore new blocks) we are showing the agent reaching for a zero-shot
target under these conditions.
The right panel of Figure 5 shows the learned detector outputs in a successful agent. This figure shows
that the agent can correctly identify properties of objects referenced by the programs it executes.
6.4
No catastrophic forgetting
Our agents are robust against catastrophic forgetting. To show this we trained a collection of agents
on the 3x3 environment for 5m steps. For the first 2.5m steps we follow the train condition of the 3-D
design, and for the remaining 2.5m steps we switch to training on the test conditions. The plots in
Figure 5 show performance curves for these agents on both the training and test conditions throughout
the full 5m steps of training. Performance on the train condition does not degrade even millions of
steps after the switching to training on new tasks.
7
Conclusion
Our Programmable Network architecture enables us to build agents that execute declarative programs
expressed in formal language. Our agents learn to ground the terms of the programs in their
environment and can leverage these grounded terms to generalize beyond the tasks they were trained
on. Our agents achieve nearly perfect generalization on a variety of zero-shot tasks where standard
deep RL architectures completely fail.
All of this is achieved with only small concessions from the Deep Learning zeitgeist. We assume that
the boundaries between objects in the agent observations are known, and the object properties our
agents can reason over must come from a predefined vocabulary, which is similar to the restriction one
has in word based language modelling. We also use a fixed mapping from programs to architecture.
Future work will focus on improving the robustness of training, and on scaling the method to deal
with more types of properties (e.g. mass, size, texture, etc) and relations. We are also interested in
extending this method to work from vision.
8
References
[1] J. Andreas, M. Rohrbach, T. Darrell, and D. Klein. Learning to compose neural networks for question
answering. In North American Chapter of the Association for Computational Linguistics, 2016.
[2] J. Andreas, M. Rohrbach, T. Darrell, and D. Klein. Neural module networks. In Computer Vision and
Pattern Recognition, 2016.
[3] M. Balog, A. L. Gaunt, M. Brockschmidt, S. Nowozin, and D. Tarlow. DeepCoder: Learning to write
programs. In International Conference on Learning Representations, 2017.
[4] P. W. Battaglia, R. Pascanu, M. Lai, D. Rezende, and K. Kavukcuoglu. Interaction networks for learning
about objects, relations and physics. In Neural Information Processing Systems, 2016.
[5] M. Bošnjak, T. Rocktäschel, J. Naradowsky, and S. Riedel. Programming with a differentiable forth
interpreter. Technical report, University College London, 2016.
[6] I. Bratko. Prolog programming for artificial intelligence. Pearson education, 2001.
[7] J. Cai, R. Shin, and D. Song. Making neural programming architectures generalize via recursion. In
International Conference on Learning Representations, 2017.
[8] M. B. Chang, T. Ullman, A. Torralba, and J. B. Tenenbaum. A compositional object-based approach to
learning physical dynamics. In International Conference on Learning Representations, 2017.
[9] C. Devin, A. Gupta, T. Darrell, P. Abbeel, and S. Levine. Learning modular neural network policies for
multi-task and multi-robot transfer. In IEEE International Conference on Robotics and Automation, 2016.
[10] J. Devlin, J. Uesato, S. Bhupatiraju, R. Singh, A. Mohamed, and P. Kohli. RobustFill: Neural program
learning under noisy I/O. In International Conference on Machine Learning, 2017.
[11] Y. Duan, M. Andrychowicz, B. C. Stadie, J. Ho, J. Schneider, I. Sutskever, P. Abbeel, and W. Zaremba.
One-shot imitation learning. Technical report, OpenAI, 2017.
[12] J. Gilmer, S. S. Schoenholz, P. F. Riley, O. Vinyals, and G. E. Dahl. Neural message passing for quantum
chemistry. Technical report, Google Brain, 2017.
[13] A. Graves, G. Wayne, M. Reynolds, T. Harley, I. Danihelka, A. Grabska-Barwińska, S. G. Colmenarejo,
E. Grefenstette, T. Ramalho, J. Agapiou, et al. Hybrid computing using a neural network with dynamic
external memory. Nature, 538(7626):471–476, 2016.
[14] E. Grefenstette, K. M. Hermann, M. Suleyman, and P. Blunsom. Learning to transduce with unbounded
memory. In Advances in Neural Information Processing Systems, pages 1828–1836, 2015.
[15] R. Hu, J. Andreas, M. Rohrbach, T. Darrell, and K. Saenko. Learning to reason: End-to-end module
networks for visual question answering. Technical report, University of California, Berkeley, 2017.
[16] J. Johnson, B. Hariharan, L. van der Maaten, J. Hoffman, L. Fei-Fei, C. L. Zitnick, and R. Girshick.
Inferring and executing programs for visual reasoning. Technical report, Stanford, 2017.
[17] Ł. Kaiser and I. Sutskever. Neural GPUs learn algorithms. In International Conference on Learning
Representations, 2015.
[18] B. Knoll and N. de Freitas. A machine learning perspective on predictive coding with PAQ8. In Data
Compression Conference (DCC), 2012, pages 377–386. IEEE, 2012.
[19] T. D. Kulkarni, K. Narasimhan, A. Saeedi, and J. Tenenbaum. Hierarchical deep reinforcement learning:
Integrating temporal abstraction and intrinsic motivation. In Advances in Neural Information Processing
Systems, pages 3675–3683, 2016.
[20] B. M. Lake, T. D. Ullman, J. B. Tenenbaum, , and S. J. Gershman. Building machines that learn and think
like people. Behavioral and Brain Sciences, in press.
[21] T. P. Lillicrap, J. J. Hunt, A. Pritzel, N. Heess, T. Erez, Y. Tassa, D. Silver, and D. Wierstra. Continuous
control with deep reinforcement learning. In International Conference on Learning Representations, 2015.
[22] W. Ling, D. Yogatama, C. Dyer, and P. Blunsom. Program induction by rationale generation: Learning to
solve and explain algebraic word problems. arXiv preprint 1705.04146, 2017.
[23] M. L. Littman, U. Topcu, J. Fu, C. Isbell, M. Wen, and J. MacGlashan. Environment-independent task
specifications via GLTL. Technical report, Brown University, 2017.
[24] M. V. Mahoney. Adaptive weighing of context models for lossless data compression. Technical report,
CS-2005-16, 2005.
[25] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed representations of words
and phrases and their compositionality. In Advances in neural information processing systems, pages
3111–3119, 2013.
9
[26] I. Misra, A. Gupta, and M. Hebert. From Red Wine to Red Tomato: Composition with Context. In
Computer Vision and Pattern Recognition, 2017.
[27] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller,
A. K. Fidjeland, G. Ostrovski, et al. Human-level control through deep reinforcement learning. Nature,
518(7540):529–533, 2015.
[28] A. Neelakantan, Q. V. Le, M. Abadi, A. McCallum, and D. Amodei. Learning a natural language interface
with neural programmer. In International Conference on Learning Representations, 2017.
[29] A. Neelakantan, Q. V. Le, and I. Sutskever. Neural programmer: Inducing latent programs with gradient
descent. In International Conference on Learning Representations, 2016.
[30] S. Reed and N. De Freitas. Neural programmer-interpreters. International Conference on Learning
Representations, 2016.
[31] D. Silver, G. Lever, N. Heess, T. Degris, D. Wierstra, and M. Riedmiller. Deterministic policy gradient
algorithms. In ICML, 2014.
[32] R. Socher, B. Huval, C. D. Manning, and A. Y. Ng. Semantic compositionality through recursive matrixvector spaces. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language
Processing and Computational Natural Language Learning, pages 1201–1211, 2012.
[33] R. Socher, A. Perelygin, J. Y. Wu, J. Chuang, C. D. Manning, A. Y. Ng, C. Potts, et al. Recursive deep
models for semantic compositionality over a sentiment treebank. In Proceedings of the conference on
empirical methods in natural language processing, 2013.
[34] E. Todorov, T. Erez, and Y. Tassa. Mujoco: A physics engine for model-based control. In International
Conference on Intelligent Robots and Systems, 2012.
[35] D. Tran, M. D. Hoffman, R. A. Saurous, E. Brevdo, K. Murphy, and D. M. Blei. Deep probabilistic
programming. arXiv preprint 1701.03757, 2017.
[36] D. Yogatama, P. Blunsom, C. Dyer, E. Grefenstette, and W. Ling. Learning to compose words into
sentences with reinforcement learning. arXiv preprint 1611.09100, 2016.
[37] H. Yu, H. Zhang, and W. Xu. A deep compositional framework for human-like language acquisition in
virtual environment. Technical report, Baidu Research, 2017.
[38] W. Zaremba, T. Mikolov, A. Joulin, and R. Fergus. Learning simple algorithms from examples. In
International Conference on Machine Learning, pages 421–429, 2016.
[39] W. Zaremba and I. Sutskever. Learning to execute. arXiv preprint 1410.4615, 2014.
10
A
Model and training details
Our agents are trained using DPG [31, 21], where both the actor and critic are programmable networks.
The full architecture of the actor and critic are shown in Figure A. The actor and critic share the same
programmable structure (including the vocabulary of properties), but they do not share weights.
^
_
p
⌦0
⌦
h
+
a
a
Q
The relationship between Ω, Ω0 , Φ is explained in the main text, as is the derivation of the relevant
objects vector p. In both the actor and critic the vector h is produced by taking a weighted sum over
the columns of Ω0 . Using ωi0 to denote these columns, we can write h as
X
h=
pi ωi0
i
The motivation for weighting the columns by p here is the same as for incorporating p into the
message passing weights in Equation 4; we want h to include only information about relevant objects,
and the role of p is precisely to identify these objects. Reducing over the columns of Ω0 fixes the size
of h to be independent of the number of objects.
From this point the architectures of the actor and critic diverge. Recall that there are two networks
here that do not share weights, so there are in fact two different h vectors to consider. We distinguish
between the activations at h in the actor and critic by using ha to denote h produced in the actor and
hc to denote h produced in the critic.
The actor produces an action from ha using a single linear layer, followed by a tanh to bound the
range of the actions
a = tanh(Linear(tanh(ha ))) .
The computation in the critic is slightly more complex. Although hc contains information about
the observation, it does not contain any information about the action, which the critic requires. We
combine the action with hc by passing it through a single linear layer which is then added to hc
Q(Ω, a) = Linear(tanh(hc + Linear(a))) .
No final activation function is applied to the critic in order to allow its outputs to take unbounded
values.
11
A.1
Building the observation matrix
The observations consumed by our agent are collected into the columns of Ω. The matrix Ω has one
column for each object in the environment, where objects include all of the blocks on the table and
also the hand of the robot arm.
As discussed in Section 4, each object is described by its 3d position and 4d orientation, represented
in the coordinate frame of the hand. Each block also has a shape and a color which are represented
to the agent using 1-hot vectors. There are 4 possible colors and 5 possible shapes for a total of 9
property features (and 16 total features) for each object.
We also provide the joint positions of the arm as observations (encoded as sin and cos of the joint
angle). The arm has 6 joints, for a total of 18 features to represent the arm.
The full observation matrix Ω is built by appending the arm positions to each (object) column, which
effectively represents each object in a “body pose relative” way. This means that in an environment
with four blocks we have an observation of shape 34 × 5 (16 + 18 features per object for each of the
4 + 1 objects).
In addition to the above, we also provide the agent with the index of the hand in Ω, so it does not
need to learn to detect its own body.
A.2
Training parameters
Each reaching episode lasts 10 seconds and controls are issued at 0.1 second intervals, for a total
of 101 observations per episode (including the initial observation at t = 0). Our agents are trained
for either 2m or 5m frames (in the 2x2 or 3x3 environments, respectively). We collect experience
into a replay buffer with a capacity of 1m frames, which we use for training. After each action we
sample a batch of 64 transitions from the replay buffer which is used to update both the actor and
the critic. We use a target network [27] for both the actor and the critic to stabilize training, and we
copy the latest parameters to the target networks after each episode (we do not use the soft updates of
Lillicrap et al. [21]).
All agents are trained with a discount factor of γ = 0.99, and when computing updates for the
actor we clip each element of the gradient from the critic to the range [−1, 1]. During training we
use exploration noise that follows a Ornstein–Uhlenbeck process with standard deviation 0.3 and a
damping factor of 1.0.
The programmable networks use a hidden
layer size of 150 units in both the actor and
the critic. The neighborhood attention operation using a context and query size (ci
and qi ) with 64 units. Detectors are implemented as logistic regressions on object
features.
action
Q
The structure of the canonical actor and
critic networks is shown in Figure 6. In
our experiments these networks have 400
units in each hidden layer and use tanh acaction
tivations throughout. Their weights were
initialized following the strategy of Lillicrap et al. [21]. When training the canonical networks we used the same environobservation
observation
ment parameters as for the programmable
networks. Settings for discounting, target
networks and exploration noise were also Figure 6: Structure of the canonical actor and critic netthe same. The canonical networks accept works. Arrows represent linear layers; tanh activations
vectors of observations (rather than the ma- are used throughout both networks.
trices we feed to the Programmable Networks). We obtain observations for the
canonical networks by flattening the Ω matrix into a vector, ensuring that objects with the same
properties always appear at the same locations in the flattened vector.
12
B
Referencing objects by exclusion
Once you eliminate the impossible, whatever remains, no matter how improbable,
must be the truth. — Sherlock Holmes
Referencing objects by properties they do not have (e.g. “the cube that is not red”) works by exclusion.
To reach for an object without a property we can simply write a program that expresses this. The
program
NEAR(HAND, AND(NOT(RED), CUBE)),
directs the agent to reach for the cube that is not red.
This method of referencing the absence of properties highlights yet another type of generalization
that is taking place. We specified three logical operations in Equation 3, and, or and not; however,
training programs are all of the form
NEAR(HAND, AND(shape, color)),
which do not make use of the not operation. Nonetheless, agents are still capable of executing
programs that contain negations.
The reason this works is that the operations in Equation 3 are compatible. DeMorgan’s laws require
that negation interact with and and or in a particular way, and the rules of classical logic require that
these laws hold. The definition of not we have chosen satisfies these relations, and this is enough for
the not operation to acquire negation semantics in our networks.
Referencing novel colors and shapes works in a similar way. For example let us say we have a
vocabulary of five colors (the procedure for referencing novel shapes is completely analogous), but
only three of them have appeared in the training data. We can label the colors
[RED, GREEN, BLUE, A, B],
where we use generic names like a A and B to stand in for color terms that have never been used (and
so, in principle, could be anything). In this case we can express the concept of “novel color” in two
ways. The first is an exclusive expression,
NOT(OR(RED, BLUE, GREEN)),
which says “not any of the colors that have appeared,” and the second is an inclusive expression,
OR(A, B),
which says “any of the colors that have not appeared.” In practice we have found that combining both
methods
OR(NOT(OR(RED, BLUE, GREEN)), OR(A, B))
(5)
to give the best performance, since it leverages our model’s assumption that every object has exactly
one color (i.e. the soft membership values for all color sets must sum to 1).
Using the technique of Equation 5 we can write a program to reach for the block with a new shape
and a new color as
NEAR(
HAND,
AND(
OR(NOT(OR(RED, BLUE, GREEN)), OR(A, B)),
OR(NOT(OR(CUBE, SPHERE, CYLINDER)), C)
)
)
The programs referencing novel objects are much more complex than the training programs, but
agents perform much better than chance in these cases as well.
13
C
Detector output visualizations
The figures show an environment state along with the corresponding Φ (transposed, so objects are in
rows). Columns corresponding to different properties have been annotated with their corresponding
color and shape terms. Generic names (A, B, C) indicate un-grounded concepts.
C.1
Known properties
Property identification is not always perfect.
14
C.2
Behavior with previously unseen properties
The agent has never seen capsules, or any magenta object.
15
| 9cs.NE
|
HAND SEGMENTATION FOR HAND-OBJECT INTERACTION FROM DEPTH MAP
Byeongkeun Kang? Kar-Han Tan† Nan Jiang? Hung-Shuo Tai† Daniel Tretter‡ Truong Nguyen?
arXiv:1603.02345v3 [cs.CV] 10 Jan 2018
?
Department of Electrical and Computer Engineering, UC San Diego, La Jolla, CA 92093 USA
†
NovuMind Inc., Santa Clara, CA 95054 USA
‡
Hewlett-Packard, Inc., Palo Alto, CA 94304 USA
ABSTRACT
Hand segmentation for hand-object interaction is a necessary
preprocessing step in many applications such as augmented
reality, medical application, and human-robot interaction.
However, typical methods are based on color information
which is not robust to objects with skin color, skin pigment
difference, and light condition variations. Thus, we propose
hand segmentation method for hand-object interaction using
only a depth map. It is challenging because of the small
depth difference between a hand and objects during an interaction. To overcome this challenge, we propose the two-stage
random decision forest (RDF) method consisting of detecting hands and segmenting hands. To validate the proposed
method, we demonstrate results on the publicly available
dataset of hand segmentation for hand-object interaction. The
proposed method achieves high accuracy in short processing
time comparing to the other state-of-the-art methods.
Index Terms— Hand segmentation, human-machine interaction, random decision forest, depth map
1. INTRODUCTION
Recently, with the expansion of virtual reality (VR), augmented reality (AR), robotics, and intelligent vehicles, the
development of new interaction technologies has become
unavoidable since these applications require more natural
interaction methods rather than input devices. For these applications, many researches have been conducted such as
gesture recognition and hand pose estimation. However, most
technologies focus on understanding interactions which do
not involve touching or handling any real world objects although understanding interactions with objects is important
in many applications. We believe that this is because hand
segmentation is much more difficult in hand-object interaction. Thus, we present a framework of hand segmentation for
hand-object interaction.
This work is supported in part by NSF grant IIS-1522125.
1.1. Related work
Hand segmentation has been studied for many applications
such as hand pose estimation [1–6], hand tracking [7–9],
and gesture/sign/grasp recognition [10, 11]. In color imagebased methods, skin color-based method has been popular [10, 12–16]. For hand-object interaction, Oikonomidis
et al. and Romero et al. segmented hands by thresholding
skin color in HSV space [4, 5, 7, 8]. Wang et al. processed
hand segmentation using a learned probabilistic model where
the model is constructed from the color histogram of the
first frame [6]. Tzionas et al. applied skin color-based segmentation using the Gaussian mixture model [17]. However,
skin color-based segmentation has limitations in interacting
with objects in skin color, segmenting from other body parts,
skin pigment difference, and light condition variations. An
alternative method is wearing a specific color glove [18].
For depth map-based methods, popular methods are using a wrist band [3, 9, 11] or using random decision forest
(RDF) [1,2,19]. Although the method using a black wristband
is uncomplicated and effective, it is inconvenient. Moreover,
the method cannot segment hands from objects during handobject interaction since it processes segmentation by finding
connected components. Tompson et al. [1] and Sharp et al. [2]
proposed the RDF-based methods based on [19]. Although
the purposes of the methods are slightly different comparing
to the proposed method, the methods are the most relevant
methods.
In this paper, we propose the hand segmentation method
for hand-object interaction using only a depth map to avoid
the limitations of skin color-based methods. We present the
two-stage RDF method to achieve high accuracy efficiently.
2. METHOD
We propose two-stage RDF for hand segmentation for handobject interaction. In our two-stage RDF, the first RDF detects
hands by processing the RDF on an entire depth map. Then,
the second RDF segments hands in pixel-level by applying
the RDF in the detected region. This cascaded architecture is
designed for the second RDF to focus on the segmentation of
hands from objects and close body parts such as an arm.
Fig. 1. Random decision forest. Red, black, and green circles
represent root nodes, split nodes, and leaf nodes, respectively.
RDF consists of a collection of decision trees as shown in
Fig. 1. Each decision tree is composed of a root node, splitting
nodes, and leaf nodes. Given an input data at the root node, it
is classified to child nodes based on the split function at each
splitting node until it reaches a leaf node. In this paper, the
input data is the location of each pixel on a depth map. The
split function uses the feature of the depth difference between
two relative points on the depth map in [19]. At a leaf node,
a conditional probability distribution is learned in a training
stage, and the learned probability is used in a testing stage.
For more details about RDF, we refer the readers to [20–22].
Fig. 2. Detection of hands using the RDF in the first stage.
designed to evalutate the separation using the learned offset
vectors and criteria as follows:
X X |xc |
L(x, D, u, v, θ) = −
p(h|c) log p(h|c)
|x|
c∈{l,r} h∈{0,1}
(3)
where c and h are indexes for child nodes {l, r} and for
classes, respectively; |xc | denotes the number of data points
in the c child node; p(h|c) is the estimated probability of
being the class h at the child node c.
To learn offsets and a criteria, the algorithm randomly
generates possible candidates and selects the candidate with a
minimum loss L(·) as follows:
(u, v, θ) = argmin L(x, D, u, v, θ).
2.1. Training
(4)
(u,v,θ)
Given a training dataset D, the algorithm randomly selects a
set Di of depth maps D and then randomly samples a set of
data points x in the region of interest (ROI) on the selected
depth maps D. The ROI is the entire region of the depth
maps in the first stage. It is the detected regions using the first
RDF in the second stage (see Fig. 2). The sampled set of data
points x and the corresponding depth maps D are inputs to
the training of a decision tree.
Using the inputs (x, D), the algorithm learns a split function at each splitting node and a conditional probability distribution at each leaf node. First, learning the split function includes learning a feature f (·) and a criteria θ. We use the feature f (·) of the depth difference between two relative points
{x + u/D x , x + v/D x } in [19] as follows:
f (x, D, u, v) = Dx+u/Dx − Dx+v/Dx
(1)
where D x denotes the depth at a pixel x on a depth map D;
u ∈ R2 and v ∈ R2 represent offset vectors for each relative
point. Then, the criteria θ decides to split the data x to the left
child or the right child.
f (x, D, u, v) ≶ θ.
(2)
Thus, the algorithm learns two offset vectors (u, v) and a criteria θ at each splitting node.
Since the goal is separating the data points x of different classes to different child nodes, the objective function is
Learning a split function at each splitting node is repeated
until the node satisfies the condition for a leaf node. The condition is based on (1) the maximum depth of the tree, (2) the
probability distribution p(h|c), and (3) the amount of training
data |x| at the node. Specifically, it avoids too many splitting
nodes by limiting the maximum depth of the tree and by terminating if the child node has a high probability for a class or
if the amount of remaining training data is too small.
At each leaf node, the algorithm stores the conditional
probability p(h|l) (probability of being each class h given
reaching the node l) for the prediction in a testing stage.
2.2. Testing
Using the learned RDF, the algorithm predicts the probability
of being a class for a new data x. The new data is classified to child nodes using the learned split function at each
splitting node until it reaches a leaf node. At the leaf node l,
the learned conditional probability pT (h|l) is loaded. These
steps are repeated for entire trees T in the forest T . Then, the
probabilities are averaged to predict the probability p(h|x) of
being a class h for the new data x.
p(h|x) =
1 X
pT (h|l)
|T |
T ∈T
where |T | is the number of trees in the learned forest T .
(5)
(a)
(b)
Fig. 3. Scores depending on the decision boundary on the
validation dataset. (a) Score of the RDF in the first stage. (b)
Score of the two-stage RDF with filtering in Section 2.3.
In the first stage, the first RDF is applied on an entire
depth map to compute a probability map. Then, the probability map is used to detect hands as shown in Fig. 2. In the
second stage, the second RDF processes the data points in
the detected regions to predict the probability of being each
class. The proposed two-stage RDF improves both accuracy
and efficiency by focusing on each task in each stage.
Decision boundaries are exhaustively searched with the
step size of 0.01 using the predicted probability maps of the
validation dataset as shown in Fig. 3. Although the most typical boundary is 0.5 for a probability map, we found that it is
not the best parameter. The selected boundaries are shown in
Table 1.
Fig. 4. Analysis of accuracy and efficiency.
3. EXPERIMENTAL EVALUATIONS
3.1. Dataset
We collected a new dataset1 using Microsoft Kinect v2 [26].
The newly collected dataset consists of 27,525 pairs of depth
maps and ground truth labels from 6 people (3 males and 3 females) interacting with 21 different objects. Also, the dataset
includes the cases of one hand and both hands in a scene. The
dataset is separated into 19,470 pairs for training, 2,706 pairs
for validation, and 5,349 pairs for testing, respectively.
2.3. Modified bilateral filter
3.2. Results
Before classifying a data x to a class h, modified bilateral filter is applied to the predicted probability p(h|x) to make the
probability more robust. Since the probability p(h|x) is predicted for each pixel independently, the probability is stabilized by averaging the probabilities of the data points in close
distance and similar intensity on the depth map.
Unlike typical bilateral filter whose weights are based on
the input image (in this case, the probability map) [23], the
weights in the modified bilateral filter are based on a separate
image, the depth map. The filtering is defined as follows:
The proposed method is analyzed by demonstrating the results on the dataset in Section 3.1. For the quantitative comparison of accuracy, we measure F1 score, precision, and recall as follows:
tp
tp
precision =
, recall =
tp + fp
tp + fn
(7)
precision × recall
F1 = 2 ×
precision + recall
1 X
pe(h|x) =
gr (|D xi −D x |)gs (kxi −xk)p(h|xi ) (6)
w
xi ∈Ω
where Ω is the set of pixels within the filter’s radius and the
pre-defined
depth difference; w is the normalization term,
P
w = xi ∈Ω gr (|D xi − D x |)gs (kxi − xk); gr (·) and gs (·)
are the Gaussian functions for the depth difference and for the
spatial distance from the data point x, respectively. gr (r) =
s2
r2
exp(− 2σ
2 ); gs (s) = exp(− 2σ 2 ). The parameters in the filr
s
ter were selected based on the experiments using validation
dataset. The selected parameters are as follows: the maximum depth difference to be considered is 400mm. Both standard deviations (σr and σs ) are 100.
where tp, fp, and fn represent true positive, false positive, and
false negative, respectively. For the comparison of efficiency,
we measure the processing time using a machine with Intel
i7-4790K CPU and Nvidia GeForce GTX 770.
The proposed method is compared with the RDF-based
method in [1, 19] and the fully convolutional networks (FCN)
in [24, 25] using only a depth map. The proposed method
is not compared with color-based methods since the characteristics of depth sensors and color imaging sensors are quite
different. For example, a captured depth map using a depth
sensor does not vary depending on light condition. However,
a captured color image varies a lot depending on light condition. Thus, choosing the capturing environment affects the
1 https://github.com/byeongkeun-kang/HOI-dataset
Table 1. Quantitative comparison. The two boundaries for the proposed method are for each stage.
Method
Score
Processing time
Method
Boundary
(ms)
F1 score
Filter
Precision
Recall
RDF [1, 19]
RDF [1, 19] + Proposed in Sec. 2.2
FCN-32s [24, 25]
FCN-16s [24, 25]
FCN-8s [24, 25]
Proposed method
(a)
0.50
0.78
0.50, 0.50
0.50, 0.52
0.50, 0.52
11 × 11
(b)
(c)
38.1
54.5
70.0
68.0
70.4
59.2
60.8
62.9
91.2
72.7
68.6
72.2
74.4
77.4
75.1
75.6
53.7
62.3
69.3
70.1
72.3
67.1
67.2
68.7
(d)
6.7
6.7
376
376
377
8.9
8.9
10.7
(e)
Fig. 5. Visual comparison. (a) Ground truth label. (b) Result using RDF [1, 19]. (c) Result using RDF [1, 19] with the proposed
method in Section 2.2. (d) Result using FCN-8s [24, 25]. (e) Result using the proposed method. The results and ground truth
label are visualized using different color channels for better visualization.
comparison of results using depth maps and color images.
Hence, we only compare the proposed method with the stateof-the-art methods which can process using only depth maps.
Table 1 and Fig. 5 show quantitative results and visual results. The scores in Table 1 are scaled by a factor of 100. The
quantitative results show that the proposed method achieves
about 25% and 8% relative improvements in F1 score comparing to the RDF-based methods [1, 19] and its combination with the proposed method in Section 2.2, respectively.
Comparing to the deep learning-based methods [24, 25], the
proposed method achieves about 7% lower accuracy, but processes in about 42 times shorter processing time. Thus, deep
learning-based methods can not be used in real-time applica-
tions. Fig. 4 shows the comparison of methods in accuracy
and efficiency. The proposed method achieves high accuracy
in short processing time.
4. CONCLUSION
In this paper, we present two-stage RDF method for hand segmentation for hand-object interaction using only a depth map.
The two stages consist of detecting the region of interest and
segmenting hands. The proposed method achieves high accuracy in short processing time comparing to the state-of-the-art
methods.
5. REFERENCES
[1] J. Tompson, M. Stein, Y. Lecun, and K. Perlin, “Realtime continuous pose recovery of human hands using
convolutional networks,” ACM Trans. Graph., 2014.
[2] T. Sharp, C. Keskin, D. Robertson, J. Taylor, J. Shotton,
D. Kim, C. Rhemann, I. Leichter, A. Vinnikov, Y. Wei,
D. Freedman, P. Kohli, E. Krupka, A. Fitzgibbon, and
S. Izadi, “Accurate, robust, and flexible real-time hand
tracking,” in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015.
[3] C. Qian, X. Sun, Y. Wei, X. Tang, and J. Sun, “Realtime
and robust hand tracking from depth,” in Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on, June 2014.
[4] J. Romero, H. Kjellstrom, and D. Kragic, “Hands in action: real-time 3d reconstruction of hands in interaction
with objects,” in Robotics and Automation (ICRA), 2010
IEEE International Conference on, May 2010.
[5] J. Romero, H. Kjellstrom, C. H. Ek, and D. Kragic,
“Non-parametric hand pose estimation with object context,” Image Vision Comput., vol. 31, no. 8, Aug. 2013.
[6] Y. Wang, J. Min, J. Zhang, Y. Liu, F. Xu, Q. Dai,
and J. Chai, “Video-based hand manipulation capture through composite motion control,” ACM Trans.
Graph., vol. 32, no. 4, July 2013.
[7] I. Oikonomidis, N. Kyriazis, and A.A. Argyros, “Full
dof tracking of a hand interacting with an object by modeling occlusions and physical constraints,” in Computer
Vision (ICCV), 2011 IEEE International Conference on,
2011.
[8] A. A. Argyros and M. I. A. Lourakis, “Real-time tracking of multiple skin-colored objects with a possibly
moving camera,” in Computer Vision - ECCV, 2004.
[9] B. Kang, Y. Lee, and T. Nguyen, “Efficient hand articulations tracking using adaptive hand model and depth
map,” in Advances in Visual Computing, Dec. 2015.
[10] M. Cai, K.M. Kitani, and Y. Sato, “A scalable approach
for understanding the visual structures of hand grasps,”
in Robotics and Automation (ICRA), 2015 IEEE International Conference on, May 2015.
[11] B. Kang, S. Tripathi, and T. Nguyen, “Real-time sign
language fingerspelling recognition using convolutional
neural networks from depth map,” in Pattern Recognition, 2015 3rd IAPR Asian Conference on, Nov. 2015.
[12] M. J. Jones and J. M. Rehg, “Statistical color models
with application to skin detection,” International Journal of Computer Vision, vol. 46, Jan. 2002.
[13] R. Khan, A. Hanbury, J. Stttinger, and A. Bais, “Color
based skin classification,” Pattern Recognition Letters,
vol. 33, Jan. 2012.
[14] C. Li and K.M. Kitani, “Pixel-level hand detection in
ego-centric videos,” in Computer Vision and Pattern
Recognition, 2013 IEEE Conference on, June 2013.
[15] S. L. Phung, A. Bouzerdoum, and D. Chai, “Skin segmentation using color pixel classification: analysis and
comparison,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 27, 2005.
[16] P. Kakumanu, S. Makrogiannis, and N. Bourbakis, “A
survey of skin-color modeling and detection methods,”
Pattern Recognition, vol. 40, Mar. 2007.
[17] D. Tzionas and J. Gall, “3d object reconstruction from
hand-object interactions,” in International Conference
on Computer Vision (ICCV), Dec. 2015.
[18] R. Y. Wang and J. Popović, “Real-time hand-tracking
with a color glove,” ACM Trans. Graph., vol. 28, 2009.
[19] J. Shotton, A. Fitzgibbon, M. Cook, T. Sharp, M. Finocchio, R. Moore, A. Kipman, and A. Blake, “Real-time
human pose recognition in parts from single depth images,” in Computer Vision and Pattern Recognition
(CVPR), 2011 IEEE Conference on, June 2011.
[20] A. Criminisi and J. Shotton, “Decision forests for computer vision and medical image analysis,” Advances in
Computer Vision and Pattern Recognition, 2013.
[21] L. Breiman, “Random forests,” Machine Learning, vol.
45, no. 1, 2001.
[22] T. Ho, “Random decision forests,” in Proceedings of the
Third International Conference on Document Analysis
and Recognition, 1995.
[23] C. Tomasi and R. Manduchi, “Bilateral filtering for gray
and color images,” in Computer Vision, Sixth International Conference on, Jan. 1998.
[24] J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in
The IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), June 2015.
[25] E. Shelhamer, J. Long, and T. Darrell, “Fully convolutional networks for semantic segmentation,” IEEE
Transactions on Pattern Analysis and Machine Intelligence, 2016.
[26] B. Kang, Y. Lee, and T. Q. Nguyen, “Depth adaptive
deep neural network for semantic segmentation,” IEEE
Transactions on Multimedia, 2018.
| 1cs.CV
|
A Spatio-Temporal Representation for the Orienteering Problem
with Time-Varying Profits
arXiv:1611.08037v2 [cs.AI] 2 Jul 2017
Zhibei Ma, Kai Yin, Lantao Liu, Gaurav S. Sukhatme
Abstract— We consider an orienteering problem (OP) where
an agent needs to visit a series (possibly a subset) of depots,
from which the maximal accumulated profits are desired within
given limited time budget. Different from most existing works
where the profits are assumed to be static, in this work we
investigate a variant that has arbitrary time-dependent profits.
Specifically, the profits to be collected change over time and
they follow different (e.g., independent) time-varying functions.
The problem is of inherent nonlinearity and difficult to solve by
existing methods. To tackle the challenge, we present a simple
and effective framework that incorporates time-variations into
the fundamental planning process. Specifically, we propose a
deterministic spatio-temporal representation where both spatial
description and temporal logic are unified into one routing
topology. By employing existing basic sorting and searching algorithms, the routing solutions can be computed in an extremely
efficient way. The proposed method is easy to implement and
extensive numerical results show that our approach is time
efficient and generates near-optimal solutions.
I. I NTRODUCTION
The rapid progress of smart vehicle technologies allows us
to envision that, in the future autonomous vehicles are able
to carry out various tasks with little or even no human effort.
We are interested in designing an efficient routing method to
navigate a vehicle (agent) among a number of known and
fixed depots, where each depot has some profit (e.g., score,
benefit, utility, load) to be collected. If the travel time is
limited, it is likely that the agent is not able to traverse all
depots due to the limited time budget. This variant of routing
problems is called the orienteering problem (OP) [11]. In a
nutshell, an OP aims to find a tour traversing a subset of
depots so that the accumulated profit collected from those
traversed depots are maximized.
Different from many existing vehicle routing problems
which focus on analyzing path properties in the static context
(i.e., unchanging environment or topology with stationary
cost metrics) [17], [12], in this work we are intrigued to
investigate a time-varying variant of OPs, i.e., each depot
has a time-varying profit.
Here are a few motivational examples:
• As illustrated in Fig. 1, an autonomous truck needs to
pick up goods from a number of fixed depots where
manufacturing factories are located. The goods are
produced consistently and accumulated as time goes by
— so they are time-varying. The growth rate of goods at
different factories may be nonidentical: larger factories
Z. Ma, L. Liu and G.S. Sukhatme are with the Department of Computer
Science at the University of Southern California, Los Angeles, CA 90089,
USA. {zhibeima, lantao.liu, gaurav}@usc.edu. K.
Yin is with HomeAway, Inc., yinkai1000@gmail.com.
Fig. 1. An autonomous vehicle needs to route through depots with timevarying profits (loads). The goal is to maximize overall collected profits
within given limited time. The task can be persistent.
grow faster and smaller ones grow slower. Assume the
truck has sufficiently large capacity and it empties all
goods from a depot when it arrives there. The objective
is to find a route so that the truck will load the most
goods in a given time window.
• In environmental monitoring, autonomous robots are
deployed to collect environment data in order to estimate an underlying environment state. However, the
environment attributes at different locations can be timevarying (e.g., dissolved chemical compounds and algae
blooms in the water vary both spatially and temporally.)
An important objective of environment monitoring is to
plan so-called “informative paths” [5] that navigate the
robots to acquire data from those most information-rich
spots which best help estimate the environment.
In this paper, we present our initial study for the timevarying OP. We start our analysis from the single agent
planning case, and attempt to establish a new framework that
is different from traditional modeling and solving routines.
We will show that, a big challenge of the time-varying
OP (even for single agent case) lies in the requirement
of a special treatment in an extra dimension — the time
dimension, which inevitably introduces extra complexity as
we need to model, predict, and integrate future dynamics.
II. R ELATED W ORKS
The routing problems have been well studied in many
research domains including operations research, theoretical
computer science, and transportation systems [3], [4], [7].
Typical routing problems involve incorporation of constraints
expressed from the nature of the target problems, which
also narrow the space of searching for solutions [19]. We
are interested in a variant of routing problems called the
orienteering problems (OPs) [11], [22]. An OP considers
both travel cost (e.g., travel time) and scores collected along
the travel. The goal of the OP is to determine which subset
of vertices to visit and in which order so that the collected
scores within a given period is maximized. The OPs integrate
characteristics of both knapsack problems (KPs) [15] and
travelling salesman problems (TSPs) [19], and OPs are NPhard as well. In contrast to the TSP, not all vertices of an
OP need to be visited due to the limited time budget. During
the past few decades, several variants of OPs have been
studied, such as time-dependent OPs, Team OPs, (Team)
OPs with Time Windows and OPs with stochastic profits.
Recent survey papers [22], [12] have profoundly discussed
state-of-the-art techniques of these variants as well as their
applications.
While OPs can be formulated as mixed integer programs
(MIPs), the problem size typically is too large to directly
use commercial solvers. A wide range of decomposition
methods such as branch-and-price algorithms have been
developed so that a large-scale MIP can be decomposed
into smaller problems (e.g., a master problem and a series
of sub-problems) which can then be iteratively solved by
commercial solvers [13], [16]. In order to reduce the heavy
computational burden in decomposition methods, heuristics
and metaheuristics have been extensively studied, typically
including tabu-based or neighborhood search based procedures [6], [21], [24].
Although in general OPs have been well researched, the
time-dependent OPs (TOPs) have received relatively less
attention comparing with other variants [10], [12]. Even so,
most of existing TOPs discuss the time-varying properties
that are associated with the real travel time between pairwise
nodes, and assume that travel time between two nodes
depends on the departure time at the first (or an earlier)
node [18], [9], [8], [23]. Very rarely we could find the works
that discuss about time-varying scores of OPs. One work that
share certain similarity with this proposed problem is [2],
where multiple vehicles need to serve a number of clients
and the profit of each client follows a decreasing function
of time. The work analyzed a lower bound and upper bound
based on a classic MIP formulation.
Instead of employing conventional techniques such as the
column generation approach used in [2], in this work we
present our first study that models and tackles the problem
from a different perspective: we start from establishing a
representation built from the spatial and temporal constraints,
so that the time dependence attribute is transferred from the
bulk MIP to a separate and intuitive representation. With that,
fast approximate OP solutions can be found by employing
and extending order-sensitive topological algorithms.
III. P ROBLEM D ESCRIPTION AND F ORMULATION
A routing problem can be represented with a graph G =
(V, E), where V is the set of vertices and E denotes the set
of edges. Let us denote the number of vertices as |V | = n+1,
and suppose every edge takes time to traverse. Although the
travel time, in many situations, depends on the states and
properties of the network such as congestion and capacity,
we assume that the travel time τij between two vertices vi
and vj is time-invariant for simplicity∗ . We associate each
∗ It is relatively straightforward to incorporate time-dependent travel times
in our proposed model described in the following section.
vertex vi with a time-varying value, called profit, which is
denoted by fi (t) ≥ 0 at time t ≥ 0. Here fi (·) is of arbitrary
nonlinear function form. We assume that function fi (·) is
known or can be predicted or approximated.
Suppose that the agent (vehicle) starting from a dummy
node v0 at time 0 travels across a subset of vertices on the
graph G. When the agent visits vertex vi at time ti , it will
collect the profit fi (ti ). The remaining profit at the vertex
vi right after the agent leaves becomes 0 and accumulates
again. Additionally, the profit at v0 is assumed to be 0, i.e.,
f0 (t) = 0. Assuming the agent visits each vertex once, the
objective is to determine the order of a subset of vertices to
visit so that total profits collected by the agent is maximized
within a given planning period T . Note that we do not assign
a specific destination to the agent, as the problem with a fixed
end vertex is a special case for our problem.
Let xij = 1 if the agent travels from vi to vj , and 0
otherwise. Let t0 = 0. We also introduce extra variables ui
with u0 = 0 to eliminate the subtours. Then the problem in
this study can be formulated as the following mixed-integer
program.
max
xij
n
X
i=1
n
X
j=1
n
X
fi (ti ) ·
x0j =
xik =
i=0
tj 6 T ·
X
j
n
X
i=1
n
X
j=0
n
X
xji ,
(1)
xi0 = 1,
(2)
xkj 6 1,
xij ,
∀k 6= 0,
∀j,
(3)
(4)
i=0
ti + xij (τij + T ) 6 T + tj ,
1 6 ui 6 n,
ui − uj + 1 6 n(1 − xij ),
xij ∈ {0, 1},
∀i, j,
∀i 6= 0,
(5)
(6)
∀i 6= 0, j 6= 0,
∀i, j.
(7)
(8)
Eq. (1) is to maximize the total collected profits. Constraint (2) guarantees that the path starts and ends at dummy
node v0 . Note that our setup allows a path to end at any
node by discarding the inward edge. Constraints (3) ensure
the connectivity of the path and guarantee that every vertex
is visited at most once. The limited time budget is ensured by
Constraint (4), while Constraint (5) determines the visiting
time ti along the path. Constraints (6) and (7), so called
Miller-Tucker-Zemlin (MTZ) formulation in the traveling
sales problem[19], are used to prevent subtours.
IV. A S PATIO -T EMPORAL R EPRESENTATION
It appears a daunting task to solve the problem (1)-(8)
due to the complexity of objective function. Most of existing
literature in OPs either lumps all constraints together and
solves it by conventional solvers of MIPs [20], [22], or
decouples the constraints into master-subproblem modules
such as column generation [2], or use certain heuristics
such as center-of-gravity heuristic [11]. In contrast, we
(a)
(b)
(c)
(d)
Fig. 2. Illustrations of spatio-temporal representation. (a) Graph G = (V, E) constructed on a x-y plane. Numbers on vertices are the vertex IDs, and
numbers on edges denote required travel time costs; (b) Spatio-temporal graph of (a). In this example each vertex has 5 time units along the (z-axis);
(c)(d) Another example with 7 vertices and 8 time windows.
desire to develop a framework starting from a constraintincluded representation that is intuitive to understand, easy to
implement from scratch, and flexible to modify and extend.
In this section, we present a means for embedding constraints
into a spatio-temporal representation built on which the
original routing problem can be tackled by efficient methods
(though it is still a NP-hard problem).
As the problem essentially aims to determine the visiting
time and order of vertices, it inspires us to incorporate a time
dimension to extend the 2-dimensional graph on a spatial
plane to a 3-dimensional graph (topology). To make the
model implementable, the time range [0, T ] is discretized
into a sequence of time intervals ∆t of equal length, and
the interval ∆t is used as a time unit that specifies discrete
time resolution. Thus, the travel time τij can be expressed
as multiple times of the time unit. For example, τij = nij ∆t
and T = nT ∆t , where nij and nT are integers.
Figure 2 shows two examples that describe the basic idea.
Intuitively, one can imagine that each spatial graph vertex
(Fig. 2(a)) is extended to a sequence of vertices expanding
in the time dimension, where each vertex is on an unique
time layer corresponding to a future time moment (Fig. 2(b)).
Then edges are added by concatenating vertices of different
time layers, constrained by the real travel time. Formally,
two vertices on different time layers form an edge if and
only if the two vertices are spatially traversable and the time
difference between the two time layers is exactly equal to
the anticipated real travel time between the two vertices.
Each vertex contains a profit and the profit is time-varying.
In other words, the profits at different time layers are not
the same. Therefore, the problem is equivalent to finding a
path from the given start vertex at time 0 such that the path
transits other vertices within time T and the total collected
profits are maximized. It is worth mentioning that, the spatiotempral edges are “directed” since each edge must start
from a vertex at an earlier time layer and ends at one at a
later moment; Because the time is uni-directional and cannot
travel backwards, it is impossible to form a loop or cycle on
the spatio-temporal graph. As a result, such a spatio-temporal
representation is equivalent to a vertex-weighted Directed
Acyclic Graph (DAG) [18]. This allows us to conveniently
develop our own routing algorithm built on many existing
efficient DAG algorithms.
More formally, the spatio-temporal representation is a
vertex-weighted DAG, denoted by G0 = (V 0 , E 0 , W 0 ), where
V 0 = V × T , T = {0, ∆t , ..., nT ∆t }; eijus is a directed
0
0
edge from vertex viu
= (vi , u) to vjs
= (vj , s), and
0
eijus ∈ G if and only if the edge e(vi , vj ) ∈ E in G and
0
0
∈ W 0 for vertex viu
τij = ns ∆t − nu ∆t ; the weight wiu
0
has value wiu = fi (u). Keep in mind that u = nu ∆t and a
similar equation holds for s.
As an example, suppose that we have a complete graph
G with 3 vertices, ∆t = 1, and T = 5. In the spatiotemporal representation G0 shown in Fig. 2(b), there are 18
0
0
0
vertices v0,0
, v0,1
, ..., v2,5
, each vertex in the original graph G
is duplicated at the discrete time in T = {0, 1, 2, 3, 4, 5}. If
0
0
τ01 = 3 and τ21 = 5, then vertex v0,0
is directed to v1,3
and
0
0
v2,0
is directed to v1,5
. In this example, we have 9 directed
edges in total.
With graph G = (V, E) and given time limit T , the spatiotemporal graph G0 = (V 0 , E 0 , W 0 ) can be constructed by
Alg. 1. Assume there are n vertices in G, the time complexity
of Alg. 1 is O(n2 T /∆t ) because there are three for loops
each of which is associated with either n or T . Also there
are n(T /∆t + 1) vertices in G0 , so the space complexity is
O(nT /∆t ) .
Algorithm 1: SpatioTemporalGraph (G, T, v0 , ∆t )
Input:
1: Graph G = (V, E), time limit T , start vertex v0 , time
interval ∆t
Output:
2: for each vertex vi in graph G do
3:
for each t in time period [0, T ], time step is ∆t do
0
4:
vit
.id = i
0
0
5:
vit
.weight = fi (t), put wit
into the weight set W 0
0
6:
vit
.position = vi .position
0
7:
vit
.prof it = fi (t)
0
8:
vit
.sum = −∞
0
9:
vit
.parent = −1
10:
for each vi ’s neighbor vj do
11:
if t + τij is equal to t0 AND t0 <= T then
12:
put edge eijtt0 into the edge set E 0
0
0
13:
push vjt
0 into vector vit0 .successors
0
14:
update indegree of vit .
0
15:
put vit
into the vertex set V 0
0
16: set the v0,0 .sum to 0
17: return graph G0 = (V 0 , E 0 , W 0 )
0
Note: fi (t) is the time-varying profit function of vertex vi at time t. v0,0
is
the start vertex in G0 , and .sum is used to store accumulated profit from prior
traversal along a path. The label .parent points to the predecessor vertex.
V. ROUTING A LGORITHM
An important advantage of the spatio-temporal graph lies
in that, the time related constraints have been incorporated
into this spatio-temporal representation, so that temporal
related constraints can be decoupled and eliminated from the
process of optimizing the profits. Thus, the problem (1)-(8) is
0
equivalent to finding a path P from
P vertex v00,0 = (v0 , 0) to
0
0
vks on G where s ≤ T such that (v0 u)∈P wiu is maximum.
i
Since the spatio-temporal graph is essentially a DAG,
we develop our routing solution via extending classic DAG
algorithms. Specifically, we found that the profit maximization can be transformed to a longest path problem by
accumulating the profits collected from vertices instead of
summing up edge lengths along a path. We manipulate
the DAG so that vertices are sorted in a topological order
along the temporal dimension, and then employ a dynamic
programming paradigm to compute the maximal profit path.
It is also noteworthy that, while developing a solution to
the time-varying OP, we take two concerns that are related
to applications into account.
• Specification of a Routing Destination: Many routing
problems, including classic OPs, require to specify a
routing destination. The destination can be the original
depot where the agent departures (e.g., a mail truck
needs to return a central processing office); the destination can also be an arbitrary depot located somewhere
else (e.g., a freight truck needs to pick up goods and
unload them into some specified processing location that
is different from the starting depot).
• Persistent Task: Many long-term missions need repetitive and persistent routing, for which specifying a routing destination is not necessary or even inappropriate.
For instance, in the persistent environmental monitoring
task, we do not need the robot to stop at some specified
location, as the robot will need to resume to next round
of routing after the completion of current one. Thus,
the routing destination should be computed on the fly
based on the profit optimization constrained by time T ,
instead of being manually specified.
We will show that the proposed framework works for both
specified and unspecified routing destinations.
A. Topological Sorting of DAG in Temporal Dimension
The main purpose of topological sorting of the DAG
is that, the vertices are “placed” onto different “stages”
according to their temporal constraints, so that a dynamic
programming structure (discussed in the following subsection) can be applied.
Formally, a topological sort of a directed graph is a linear
ordering of its vertices such that for every directed edge euv
from vertex u to vertex v, u comes before v in ordering. A
topological sort of a graph requires that the graph must be
a DAG. We employ a well-known algorithm developed by
Kahn [14] to sort our spatial-temporal graph G0 , with main
steps shown in Alg. 2. Briefly, we first find a list of vertices
that have no incoming edges (with deg − (v) = 0), and insert
them into a set S. Note, at least one such vertex must exist
in a non-empty graph. Then we traverse the set S. Each time
we remove a vertex v from S, and add it to the tail of the list
L. After removing v, the indegree of its successors should be
decreased by 1. Then we insert those vertices with updated
indegree equal to 0 in the set S.
To analyze the time complexity, assume there are n
vertices in G, so there will be n(T /∆t + 1) vertices in G0 .
0
For each vertex vit
, there will be at most n−1 directed edges.
0
Therefore |E | = O(n2 T /∆t ), and the time complexity of
Alg. 2 is O(|V 0 | + |E 0 |) = O(n2 T /∆t ).
Algorithm 2: TopologicalSort (G0 )
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
L: an empty list that will contain the sorted elements
S: a set of all nodes with no incoming edges
while S is not empty do
remove a vertex v from S
add v to the end of L
for each successor u of v do
deg − (u) = deg − (u) − 1
if deg − (u) equals to 0 then
insert u into S
return L (a topologically sorted order)
Note: G0 is a DAG, the indegree of v is denoted as deg − (v).
B. Computing Maximal Profit Path
We transfer the time-varying OP to a longest path problem
in a DAG. The classic longest path problem is the problem of
finding a simple path of maximum length in a given graph.
We employ a dynamic programming structure to memorize
incumbent maximal accumulated profit at each vertex of
topologically sorted stages. Note that, in our problem, we
need to optimize profits collected from vertices, instead of
adding up length of edges. Therefore, instead of using the
longest path update function between two successive stages:
l[w] = l[v] + τvw , if l[v] + τvw > l[w],
(9)
where l[w] is the largest distance from start vertex to w, we
utilize an update function:
w.sum = v.sum+w.prof it, if v.sum+w.prof it > w.sum.
(10)
The computation of the maximal profit path is described
in Alg. 3. Briefly, the topologically sorted vertices V 0 of
the spatio-temporal graph G0 are used as an input. Then
vertices from different stages form dynamic programming
subproblems and they are updated with accumulated profits
0
0
recursively, starting from v0,0
. Here we use vit
.path to store
vertices along the path from start v00 to vi0 (Note, only spatial
information is recorded). To prevent from forming routing
subtours, we check and discard those already visited vertices
before each value update.
After the completion of dynamic programming, each vertex contains information of the maximal profit path that
0
routes from v0,0
to it. Since the graph G0 has incorporated the time limit T , every vertex is feasible to the time
constraint. To find a maximal profit path to a specified
vertex (destination) vi ∈ G, one simply needs to enumerate
0
all states vij
∈ G0 , ∀j of vertex vi and retrieve the path
with the largest value. If a destination is not specified, one
needs to enumerate all states of all vertices and find out the
maximal one among them. The time complexity of Alg. 3 is
O(n2 T /∆t ) due to its two for loops.
Algorithm 3: M aximalP rof itP ath(L)
vit .sum = 0, i = 0, t = 0
0
for each vertex vit
in topologically sorted order L do
0
0
for each vertex vjt
0 in vit .successors do
0
if vertex vj is not in the vit
.path then
0
0
0
if vit
.sum + vjt
0 .prof it > vjt0 .sum then
0
0
0
vjt0 .sum = vit .sum + vjt0 .prof it
0
0
update the vjt
0 .parent to vit
0
0
vjt0 .path = vit .path + vj
0
for each vertex vit
in G0 do
find the maximal sum
retrieve a path P by backtracking from end to start
12: return P
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
Note: The label .path is a vector that stores all visited vertices from start to vi
C. Main Routing Algorithm
With the components descried above, the main algorithm
is shown in Alg. 4. According to the analysis of each part,
the overall time complexity of our algorithm is n2 T /∆t , and
the space complexity is n2 T /∆t as well.
Algorithm 4: Time-Varying OP
Input:
1: 2D graph G = (V, E), start vertex v0 , time limit T , time
interval ∆t
Output:
2: construct a spatio-temporal graph
G0 = SpatioT emporalGraph(G, T, v0 , ∆t )
3: L = T opologicalSort(G0 )
4: path = M aximalP rof itP ath(L)
5: return path
Our algorithm has a polynomial time complexity given a
fixed ∆t , but cannot guarantee to find the optimal solution to
this NP-hard problem. The main reason for possibly reaching
at sub-optimality lies in that, we added a non-subtour constraint in order to (1) prevent the path from traversing back
and forth among a small subset of adjacent vertices and (2)
comply with the structure of dynamic programming. Such a
constraint eliminates certain feasible searching space which
possibly contains the optimal solution. One may regard this
as a trade-off between solution quality and practical runtime.
Nevertheless, our evaluation results with extensive trials
show that on average our algorithm produces near-optimal
solutions.
D. Discussion: Effects of Discretization
The time interval ∆t plays a critical role in our framework
as the total profits are actually evaluated at travel time steps
equal to multiple ∆t . Yet it may be impractical to select
a small enough time interval because it would result in an
extremely large size of DAG. One possible implementation
is to round the travel time to a value closet to some integer
times of ∆t . Hence, it is important to analyze the impact of
errors due to such rounding procedure.
Assume that the profit function fi (t) satisfies the following
Lipschitz condition:
|fi (t) − fi (s)| ≤ K|t − s|, ∀t, s ∈ [0, T ], ∀i ∈ {0, ..., n},
(11)
where K is a constant independent of i. Suppose that the
optimal objective value for the problem (1)-(8) is z, and the
optimal objective value by the proposed framework is z 0 .
Then we have the result as follows.
Proposition 1: Under the condition (11), we have the
upper bound for the difference in two objective values:
|z − z 0 | ≤ [n(n + 1)/2] · K · ∆t .
(12)
proof: Let P be the optimal path in the graph G for the
problem (1)-(8) and let P 0 be the optimal path in the
proposed spatio-temporal DAG G0 . By the construction of
G0 , P must correspond to a path P̃ in the graph G0 . Let z̃
be the total profits (i.e. the value of objective (1) on this path)
for the path P̃ . Since the difference between the discrete time
in our framework and the original real-valued time is within
∆t , the fact that any path contains no more than n vertices
and the condition (11) lead to |z − z̃| ≤ [n(n + 1)/2]K∆t .
As P 0 rather than P̃ is the optimal path in G0 , we have
z̃ ≤ z 0 . By combining these results, we should have z − z 0 ≤
[n(n + 1)/2]K∆t . Conversely, by construction any feasible
path on the graph G0 must correspond to a feasible path on G.
Using similar arguments, we have z 0 −z ≤ [n(n+1)/2]K∆t .
Therefore, the result (12) holds. It is worthwhile noting that
the constraint that the path in G or G0 contains no subtours
is critical to the result (12).
VI. R ESULTS
We conducted numerical evaluations to validate the proposed algorithm. We compared our algorithm with other algorithms, all of which were implemented in C++. The experiments were performed on a system with an Intel i5 2.2GHz
processor and 4GB RAM. In our experiments, vertices are
randomly generated in the area [−50, 50] × [−50, 50] on the
x-y plane, and each vertex has a profit (weight) following
certain time-varying functions. The distance between two
vertices is Euclidean distance.
A. Routing Feature of “Orienteering”
First, we demonstrate that our solution has the basic
orienteering property: given limited time, the path always
goes through those vertices with large profits. Fig. 3(a) shows
an example. We purposely manipulate the profit distribution
among the vertices, such that in the upper right corner, there
are more vertices with larger profits. For better visualization,
in the figure the size of a vertex is proportional to the profit
on it. Additionally, we purposely put the starting vertex on
the left and do not specify a destination. From Fig. 3(a) we
(a)
(b)
Fig. 3. (a) Route feature of orienteering. ∆t is 1, vertex number is 200,
T is 200 and the start vertex is at (-49,0); (b) Route behavior under timevarying profit function, ∆t is 1, vertex number is 200, T is 200. The start
vertex v0 is at (-49,0). In all of our experimental graphs, the size of a vertex
represents the weight, which is proportional to its profit.
can see that, in order to obtain more profits, the route goes to
the upper-right corner almost directly from the start vertex.
In this way, a big part of time is used among traversing those
vertices with large profits.
B. Routing Properties under Temporal Variations
To examine the effects caused by temporal variations, we
manipulate the profit functions. Specifically, we divide the
space into four regions (quadrants) I,II,III and IV, as shown
in Fig. 3(b). The profits are the same if the vertices are in
the same region, but different if not. For example, in region
0
I, the profit function for each vit
is
(
5wi
if t 6 T /2
fi (t)I =
0
if t > T /2
where wi is the weight of vertex vi in graph G. (Keep in
0
mind that, wi is different from wit
which is time-varying.
Here the weight wi refers to a fixed parameter for profit
function.) Similarly, the profit functions in regions II, III and
IV are
(
10wi
if t 6 T /2
fi (t)II =
0
if t > T /2
(
0
if t 6 T /2
fi (t)III =
5wi
if t > T /2
(
0
if t 6 T /2
fi (t)IV =
10wi
if t > T /2
Figure 3(b) reveals that, the path first transits the vertices
in region II, because during the first half T , vertices in
region II have larger profits than those in region III. After the
path enters region I and after the time passes T /2, vertices
in region IV contain larger profits. Such variations attract
the path to go through vertices in region IV. This example
indicates that our algorithm is sensitive to the time-varying
profit functions.
C. Comparison with Optimal Solution
We compare the result of our algorithm with the optimal
solution that is obtained by enumerating all solutions in a
brute-force way. Because of the prohibitive time complexity
O(n!) for searching for the optimal solution, the practical
runtime for 13 vertices requires more than 10 minutes.
Thus, we tested up to 12 vertices to compare with the
optimal solutions. We investigated three representative profit
functions in the form of linear, quadratic and logarithmic,
respectively. The results are shown in Fig. 4. We can see
that the results of our algorithm are very close to those of
the optimal solutions, for all the three functions.
Figure 5 shows a group of paths produced from our
algorithm and the optimal solution. We use a linear profit
fi (t) = wi t/T for this example. In many cases, our algorithm get the same results as those of the optimal solution,
as shown in Fig. 5(a) and Fig. 5(b). Sometimes the paths are
different, such as Fig. 5(c) and Fig. 5(d), but the collected
profits are quite similar (in this example, ours obtains 183.5
whereas the optimal is 185.0). Fig. 5(e) and Fig. 5(f) show
another example.
D. Comparison with Classic OP Algorithm
We also compared our algorithm with the classic OP
algorithms. We implemented a well-known heuristic called
center-of-gravity [11], and tested with both time-invariant
and time-variant profits. Fig. 6 demonstrates the differences
between the results of our approach and those of the OP.
Fig. 7 show statistics of numerical evaluations with 200
vertices. We can see that, our algorithm outperforms the
OP for both the time-invariant and time-varying profits.
Particularly, the difference margin is larger for the timevarying profits. Actually, the classic OP cannot handle timevarying profits and the total profit curve quickly converges
(with fixed given time T , the overall profit of OP stops
growing along with the increment of the number of vertices).
The running time is compared in Fig. 7(c), from which we
can observe that, in practice our algorithm costs less time
than that of the OP using the center-of-gravity heuristic.
E. Path Quality under Different Time Intervals
Time interval ∆t determines time discretization resolution,
and therefore affacts the optimality as well. Table I shows
statistics of the route’s quality under different time intervals.
In the table, numbers in the first row are interval values, and
numbers in the first column are the number of vertices. The
remaining values are the collected profits from our algorithm.
We can see that, in general the route’s quality is better when
the time interval is smaller. However, obviously a smaller
time interval will inevitably lead to a larger graph and thus
require a larger running time.
F. Demonstration with New York Taxi Data
We demonstrate that the proposed algorithm can be used
for (autonomous) taxi routing. Fig. 8 shows real data of
taxi calls in New York city. The data is obtained from
NYC Taxi and Limousine Commission [1]. We use the kmeans clustering algorithm to cluster the whole New York
taxi calls into 50 local regions, as shown in Fig. 9(a). The
clustering centers are shown in Fig. 9(b). We assume that
each pick-up and the subsequent drop-off occur in the same
local region, and each pick-up and drop-off is counted as
(a) f (t) = wi t/T
(b) f (t) = −wi (t2 +tT +T 2 )/T 2
(c) f (t) = wi log(t + 1)
Fig. 4. Profit statistics on (a) Linear function; (b) Quadratic function; (c) Logarithmic function.
(a)
(b)
(c)
(d)
(e)
(f)
Fig. 5. Examples with linear profit functions. The paths in red are from our algorithm while the paths in green are found with brute-force search. (a)(b)
Our algorithm obtains optimal solution 281; (c)(d) Our solution is 183.5 whereas the optimal solution is 185.0; (e)(f) Our solution is 186.6 whereas the
optimal solution is 195.1.
(a)
(b)
(c)
(d)
Fig. 6. Path comparisons. The paths in red are computed from our algorithm while the paths in green are from the classic OPs using the center-of-gravity
heuristic. (a)(b) Time-invariant profits fi (t) = wi ; (c)(d) Time-varying profits fi (t) = wi t/T
TABLE I
S TATISTICS OF SOLUTION QUALITY WITH VARIOUS TIME INTERVALS ∆t
Intervals
(a)
(b)
0.1
0.5
1
2
5
10
50
541.1
530.3
529.2
522.1
515.1
498.3
100
788.2
783.4
767.9
735.6
727.5
619.2
150
950.2
919.0
909.7
892.9
823.0
686.8
200
1129.5
1117.6
1107.1
1094.3
935.5
696.0
Note: T = 150, graph within [−50, 50] × [−50, 50] on x-y plane,
profit fi (t) = wi t/T. 50,100,150 and 200 are the numbers of
vertices.
(c)
Fig. 7.
(a) Performance on time-invariant profits fi (t) = wi ; (b)
Performance on time-varying profits fi (t) = wi t/T ; (c) Statistics of
practical running time.
other taxis too). Therefore, this problem can be formulated as
an orienteering problem with time-varying profits, where we
need to treat those clustered regions as super routing depots
that offer different profits at different times of a day. Fig. 11
demonstrates a result generated from running our algorithm,
from which we can observe that the taxi is routed across
those regions with the most taxi calls, even though we set
the starting point at a distant location with sparse requests.
a completion of one service. Then a taxi driver aims at
maximizing the profit by providing more services during a
fixed period. In each region, we calculate the total number
of taxi calls in every predefined time unit (e.g., minute). An
example is shown in Fig. 10. We regard the total number
of taxi calls in a region as a time-varying profit, and more
calls indicate higher chance of getting profits (note, there are
We presented a framework for addressing the orienteering
problem with time-varying profits. Instead of following traditional mixed integer program solution routines, we develop
an intuitive and effective framework that incorporates timevariations into the fundamental planning process. Specifically, we first construct a deterministic spatio-temporal
VII. C ONCLUSION AND F UTURE W ORK
Fig. 8.
Data of taxi calls in New York city
Fig. 11. The taxi routing path generated from our algorithm. The big
square is the starting location.
(a)
(b)
Fig. 9. (a) Taxi calls are clustered through k-means; (b) Clustering centers
represent high-level routing depots.
representation where both spatial description and temporal
logic are unified into one routing topology, and then we
extend existing sorting and searching algorithms, so that the
routing solutions can be computed in an extremely efficient
way. Finally, we validated our algorithm with numerical
evaluations and the results show that our framework produces
near-optimal solutions in a very efficient way.
R EFERENCES
[1] NYC Taxi and Limousine Commission. http://www.nyc.gov/
html/tlc/html/about/trip_record_data.shtml. Accessed: 2017-02-25.
[2] H. M. Afsar and N. Labadie. Team orienteering problem with
decreasing profits. Electronic Notes in Discrete Mathematics, 41:285–
293, 2013.
[3] R. Bellman. On a routing problem. Quarterly of applied mathematics,
pages 87–90, 1958.
[4] M. Bellmore and G. L. Nemhauser. The Traveling Salesman Problem:
A Survey. Operations Research, 16(3):538–558, May 1968.
[5] J. Binney, A. Krause, and G. S. Sukhatme. Optimizing waypoints for
monitoring spatiotemporal phenomena. The International Journal of
Robotics Research, 32(8):873–888, 2013.
[6] I.-M. Chao, B. L. Golden, and E. A. Wasil. The team orienteering
problem. European journal of operational research, 88(3):464–474,
1996.
[7] N. Christofides. The vehicle routing problem. Revue française
d’automatique, d’informatique et de recherche opérationnelle.
Recherche opérationnelle, 10(1):55–70, 1976.
(a)
(b)
Fig. 10. For a particular region (region 1 in this example), the number of
taxi calls is varying as time elapses. (a) Time unit is minute; (b) Time unit
is hour.
[8] H. C. B. de Oliveira and G. C. Vasconcelos. A hybrid search
method for the vehicle routing problem with time windows. Annals
of Operations Research, 180(1):125–144, 2010.
[9] F. V. Fomin and A. Lingas. Approximation algorithms for timedependent orienteering. Information Processing Letters, 83(2):57–62,
2002.
[10] A. Garcia, O. Arbelaitz, P. Vansteenwegen, W. Souffriau, and M. T.
Linaza. Hybrid approach for the public transportation time dependent
orienteering problem with time windows. In International Conference
on Hybrid Artificial Intelligence Systems, pages 151–158, 2010.
[11] B. L. Golden, L. Levy, and R. Vohra. The orienteering problem. Naval
research logistics, 34(3):307–318, 1987.
[12] A. Gunawan, H. C. Lau, and P. Vansteenwegen. Orienteering problem:
A survey of recent variants, solution approaches and applications.
European Journal of Operational Research, 2016.
[13] G. Gutiérrez-Jarpa, G. Desaulniers, G. Laporte, and V. Marianov.
A branch-and-price algorithm for the vehicle routing problem with
deliveries, selective pickups and time windows. European Journal of
Operational Research, 206(2):341–349, 2010.
[14] A. B. Kahn. Topological sorting of large networks. Commun. ACM,
5(11):558–562, Nov. 1962.
[15] H. Kellerer, U. Pferschy, and D. Pisinger. Introduction to NPCompleteness of knapsack problems. Springer, 2004.
[16] M. Keshtkaran, K. Ziarati, A. Bettinelli, and D. Vigo. Enhanced exact
solution methods for the team orienteering problem. International
Journal of Production Research, 54(2):591–601, 2016.
[17] G. Laporte. The traveling salesman problem: An overview of exact and
approximate algorithms. European Journal of Operational Research,
59(2):231–247, 1992.
[18] M. Mahmoudi and X. Zhou. Finding optimal solutions for vehicle
routing problem with pickup and delivery services with time windows:
A dynamic programming approach based on state–space–time network
representations. Transportation Research Part B: Methodological,
89:19–42, 2016.
[19] C. E. Miller, A. W. Tucker, and R. A. Zemlin. Integer programming
formulation of traveling salesman problems. Journal of the ACM
(JACM), 7(4):326–329, 1960.
[20] G. L. Nemhauser and L. A. Wolsey. Integer and Combinatorial
Optimization. Wiley-Interscience, New York, NY, USA, 1988.
[21] H. Tang and E. Miller-Hooks. A tabu search heuristic for the team
orienteering problem. Computers & Operations Research, 32(6):1379–
1407, 2005.
[22] P. Vansteenwegen, W. Souffriau, and D. Van Oudheusden. The
orienteering problem: A survey. European Journal of Operational
Research, 209(1):1–10, 2011.
[23] C. Verbeeck, K. Sörensen, E.-H. Aghezzaf, and P. Vansteenwegen.
A fast solution method for the time-dependent orienteering problem.
European Journal of Operational Research, 236(2):419–432, 2014.
[24] T. Vidal, N. Maculan, L. S. Ochi, and P. H. Vaz Penna. Large
neighborhoods with implicit customer selection for vehicle routing
problems with profits. Transportation Science, 50(2):720–734, 2015.
| 2cs.AI
|
Synchronization Detection and Recovery of
Steganographic Messages with Adversarial Learning
Haichao Shi1,2 and Xiao-Yu Zhang1
1
2
Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Abstract. As a means for secret communication, steganography aims at concealing a message within a medium such that the presence of the hidden message can
hardly be detected. In computer vision tasks, adversarial training has become a
competitive learning method to generate images. However, the generative tasks
are confronted with great challenge on synthesizing images. This paper studies
the mechanism of applying adversarial learning for discriminative tasks to learn
the steganographic algorithm. We show that through unsupervised adversarial
training, the adversarial model can produce robust steganographic solutions,
which act like an encryption. Through supervised adversarial training, we can
also train a robust steganalyzer, which is utilized to discriminate whether an image contains secret information. Our model is composed of three modules, i.e. a
generator, a discriminator and a steganalyzer. All the three members are trained
simultaneously. To formulate the algorithm, we use a game to represent the communication between the three parties. In this game, the generator and discriminator attempt to communicate with each other with secret messages hidden in an
image. While the steganalyzer attempts to analyze whether there is a transmission
of confidential information. Experimental results demonstrate the effectiveness
of the proposed method on steganography tasks.
Keywords: Steganography, Steganalysis, Adversarial learning.
1
Introduction
Steganography has become a heated research topic in information security, which is
widely used in various applications. It is used to conceal secret information (i.e. a message, an image or a sound) within a medium such that both the secret message as well
as its content will remain invisible. Therefore, the ultimate goal is to conceal a payload
into a cover object without affecting the sharpness of the cover object. With the emergence of all sorts of media, steganography, especially image-based steganography, has
drawn worldwide attention. The design of robust steganographic algorithms which are
used in secret communications is of vital importance.
Steganographic algorithms are designed to hide the secret information within a cover
message such that the cover message appears unaltered to an external adversary. Recent
researchers have made great efforts to design steganographic algorithms to minimize
2
the perturbations within the cover object when embedded into the secret message. Obviously, concealing both the content of the carrier as well as the presence of a secret
message is of vital importance for privacy sensitive communication. The steganography
aims to hide the presence of a secret message, while the steganalysis algorithms are
utilized to find out and recover the secret information of the carrier object. Similar with
adversarial training, the steganalysis serves as the adversarial to steganography.
For the game design of the steganographic techniques, we leverage the ideas from
the adversarial learning. Adversarial learning is based on game theory, and is combined
with unsupervised way to jointly train the model. In our previous work [19], we proposed a novel strategy of secure steganograpy based on generative adversarial networks
to generate suitable and secure covers for steganography, which was not considered the
decoding process. This paper is different from that, we not only encode the secret messages into the images, but decode it utilizing the network. Then we utilize a steganalysis
network to detect the presence of hidden messages. Through unsupervised training, the
generator plays the role of a sender, which is utilized to generate steganographic images
as real as possible. As the discriminator plays the role of a receiver, it not only differentiates real images and generated images, but also extracts the secret messages. And
the steganalysis network, as a listener of the whole process, incorporates supervised
learning with adversarial training to compete against state-of-the-art steganalysis methods.
In summary, this paper makes the following contributions:
(1) We incorporate the generative adversarial network into steganography, which
proves to be a good way of encryption.
(2) We integrate the unsupervised learning method and supervised learning method
to train the generator and steganalyzer respectively, and received robust steganographic
techniques in unsupervised manner.
(3) We also utilize the discriminative network to extract the secret information. Experiments are conducted on widely used datasets, which demonstrate the advantages of
the proposed method.
The rest of the paper is structured as follows. In Section 2, we discuss the related
work of steganography, adversarial networks. In Section 3, we elaborate the proposed
method. In Section 4, experiments are conducted to demonstrate the effectiveness of
the proposed method. In Section 5, we draw conclusions.
2
Related work
2.1
Steganography
The image-based steganography algorithm can be split into two categories. The one is
based on the spatial domain, the other is based on the DCT domain. In our work, we
focus on the spatial domain steganography. The state-of-the-art steganographic
schemes concentrate on embedding secret information within a medium while minimizing the perturbations within that medium. On the contrary, steganalysis is to figure
out whether there is secret information or not in the medium.
3
Least Significant Bit (LSB) [12] is one of the most popular embedding methods in
spatial domain steganography. If LSB is adopted as the steganography method, the statistical features of the image are destroyed. And it is easy to detect by the steganalyzer.
For convenience and simple implementation, the LSB algorithm hides the secret to the
least significant bits in the given image’s channel of each pixel. Mostly, the modification of the LSB algorithm is called ±1-embedding. It randomly adds or subtracts 1 from
the channel pixel, so the last bits would match the ones needed.
Besides the LSB algorithm, some sophisticated steganographic schemes choose to
use a distortion function which is used for selecting the embedding localization of the
image. This type of steganography is called the content-adaptive steganography. The
minimization of the distortion function between the cover image 𝐶 and the steganographic image 𝑆 is usually required. These algorithms are the most popular and the
most secure image steganography in spatial domain, such as HUGO (Highly Undetectable steGO) [4], WOW (Wavelet Obtained Weights) [2], S-UNIWARD (spatial universal wavelet relative distortion) [3], etc.
𝑑 𝐶, 𝑆 = 𝑓 𝐶, 𝑆 ∗ |𝐶 − 𝑆|
(1)
where 𝑓 𝐶, 𝑆 is the cost of modifying a pixel, which is variable in different steganographic algorithms.
HUGO is a steganographic scheme that defines a distortion function domain by assigning costs to pixels based on the effect of embedding some information within a
pixel. It uses a weighted norm function to represent the feature space. WOW is another
content-adaptive steganographic method that embeds information into a cover image
according to textural complexity of regions. In WOW shows that the more complex the
image region is, the more pixel values will be modified in this region. S-UNIWARD
introduces a universal distortion function that is independent of the embedded domain.
Despite the diverse implementation details, the ultimate goals are identical, i.e. they are
all devoted to minimize this distortion function, to embed the information into the noise
area or complex texture, and to avoid the smooth image coverage area.
2.2
Adversarial Learning
In recent years, GANs have been successfully applied to image generation tasks. The
method that generative adversarial networks generate images can be classified in two
manners in general. The first is mainly exploring image synthesis tasks in an unconditioned manner that generates synthetic images without any supervised learning
schemes. Goodfellow et al. [7] propose a theoretical framework of GANs and utilize
GANs to generate images without any supervised information. However, the early
GANs has somewhat noisy and blurry results and sometimes the gradient will be vanished when training the networks. Later, Radford et al. [15] propose a deep convolutional generative adversarial networks (DCGANs) for unsupervised representation. To
solve the situation of gradient vanishing, WGAN [14] is proposed using the Wasserstein distance instead of the Jensen-Shannon divergence, to make the data set distribution compared with the learning distribution from G.
4
Another direction of image synthesis with GANs is to synthesize images by conditioning on supervised information, such as text or class labels. The Conditional GAN
[16] is one of the works that develop a conditional version of GANs by additionally
feeding class labels into both generator and discriminator of GANs. Info-GAN [17]
introduces a new concept, which divides the input noise z into two parts, one is the
continuous noise signal that cannot be explained, and the other is called C. Where C
represents a potential attribute that can be interpreted as a facial expression, such as the
color of eyes, whether with glasses or not, etc. in the facial tasks. Recently, Reed et al.
[18] utilize GANs for image synthesis using given text descriptions, enabling translation from character level to pixel level.
Adversarial learning has been applied to steganographic and cryptographic problems. In Abadi’s [1] work, they apply two neural networks to adversarial game to encrypt a secret message. In which game the discriminator can be deceived. In this paper,
we are devoted to training a model that can learn a steganographic technique by itself
making full use of the discriminator.
3
Adversarial Steganography
This section discusses our proposed adversarial steganographic scheme, we present the
experiments supporting our claims after laying the theoretical groundwork.
3.1
Network Architecture
Generator. The generator receives the cover images and secret messages. Before learning the distribution of the images, the secret messages are first embedded into the cover
image. The generated steganographic images are then input into the generator. As is
shown in Fig.1, we use a fully connected layer, which can cover anywhere of the image
not merely a fixed region. Then four fractionally-strided convolution layers, and finally
a Hyperbolic tangent function layer. The architecture is shown as follows:
Fig. 1. The architecture of the generator
Discriminator. The discriminator is mainly responsible for extracting the secret messages. Besides, it can also help to optimize the visual quality of the generated images.
5
We use four convolutional layers, and then a fully connected layer. In detail, we additionally add a decoding function at the end of the network to extract the secret messages.
Which acts as an interface, accepting the steganographic images as input. The decoding
function analyzes the modification of pixels in images, and recovers the message. As is
shown as follows:
Fig. 2. The architecture of the discriminator
Steganalyzer. The steganalyzer’s inputs are both covers and steganographic images.
The steganalyzer’s architecture is similar to the discriminator, as is illustrated in Fig. 3.
With distinct, we first use a predefined high-pass filter to make a filtering operation,
which is mainly for steganalysis. And then four convolutional layers. Finally, we use a
classification layer, which includes several fully connected layers.
Fig. 3. The architecture of the steganalyzer
3.2
Optimization Objective
Our training scheme includes three parties: generator, discriminator and steganalyzer.
In this game, the generator conveys a secret medium to the discriminator, which the
steganalyzer attempts to eavesdrop the conveying process and find out whether there
are some special information containing in the process. Generally speaking, the generator generates a steganographic image within the cover image embedded with a secret
message. Then generator passes it to the next network which we called discriminator,
concentrating on decoding and recovering the message. The steganalyzer figures out a
6
confidence probability of how much likely the image is hidden with a secret message
when given an image.
For the whole process of information conveying is transparent to the discriminator,
so the decoding can be easily achieved. In the game of the three parties, the generator
is trained to learn to produce a steganographic image such that the discriminator can
decode and recover the secret message, and such that the steganalyzer can output a
better probability whether it is a cover or a steganographic image.
Fig. 4. The whole architecture of the training game. 𝑀 and 𝑀′ represents the secret message and
extracted message from the steganographic image respectively, 𝐶 represents the cover image,
and 𝑆𝐶 represents the steganographic image. 𝑝 is the probability of classifying the co-
vers and steganographic images. 𝑝′ is the probability of classifying the real images and
generated images.
The whole architecture can be depicted in Fig.4, the generator receives a cover image, 𝐶, and a secret message, 𝑀. Combined with the above two inputs, it outputs a steganographic image, 𝑆- , which is simultaneously given to the discriminator and steganalyzer. Once receiving the steganographic image, the discriminator decodes it and
attempts to recover the message. For the game is under generative adversarial networks,
the discriminator can also improve the visual quality of the generated images. In addition to the steganographic images, the cover images are also input into the steganalyzer,
whose output is a probability to classify the steganographic images and covers.
We let 𝜔/ , 𝜔0 , 𝜔1 denote the parameters of generator, discriminator and steganalyzer respectively. We utilize 𝐺(𝜔/ , 𝑀, 𝐶) represents generator’s output given an
image 𝐶 and secret message 𝑀 , 𝐷(𝜔0 , 𝑆- ) for discriminator’s output on steganographic images 𝑆- , and 𝑆(𝜔1 , 𝐶, 𝑆- ) for steganalyzer’s output on covers and steganographic images. Then we use 𝐿/ , 𝐿0 , 𝐿1 represent the loss of three networks respectively. And we can calculate as follows:
𝐷 𝜔0 , 𝑆- = 𝐷(𝜔0 , 𝐺(𝜔/ , 𝑀, 𝐶))
(2)
𝑆 𝜔1 , 𝐶, 𝑆- = 𝑆(𝜔1 , 𝐶, 𝐺(𝜔/ , 𝑀, 𝐶))
(3)
7
where the 𝐷 𝜔0 , 𝑆- is output of the discriminator, 𝑆 𝜔1 , 𝐶, 𝑆- is the output of the
steganalyzer.
For the generator’s loss, we correspond it with the other two networks. And we add
constraints to normalize the loss.
𝐿/ 𝜔/ , 𝑀, 𝐶 = 𝜆/ ∙ 𝑑 𝐶, 𝑆- + 𝜆0 ∙ 𝐿0 (𝜔0 , 𝑆- ) + 𝜆1 ∙ 𝐿1 (𝜔1 , 𝐶, 𝑆- )
(4)
where 𝑑 𝐶, 𝑆- is the Euclidean distance between the covers and the steganographic
images. And 𝜆/ , 𝜆0 , 𝜆1 are the calculation loss weights of the generator, discriminator
and steganalyzer respectively. These variables are varying from [0,1].
Also, we set discriminator’s loss to be the norm form. Here, we use the ℓ@ norm.
𝐿0 𝜔/ , 𝜔0 , 𝑀, 𝐶 = 𝑀, 𝐷 𝜔0 , 𝑆-
@
= ||𝑀, 𝐷(𝜔0 , 𝐺(𝜔/ , 𝑀, 𝐶))||@ = ||𝑀, 𝑀′||@ (5)
where the form ||𝑀, 𝑀′||@ is the distance between 𝑀 and 𝑀′.
And we set steganalyzer’s loss to be binary cross-entropy of logistic regression.
𝐿1 𝜔/ , 𝜔1 , 𝐶, 𝑆- = −
A
B
F 𝑦 ln 𝑆
𝜔1 , 𝐶, 𝑆- + (1 − 𝑦) ln(1 − 𝑆 𝜔1 , 𝐶, 𝑆- )
(6)
where 𝑦 = 1 if 𝑥 = 𝐶, which means classifying the images as covers, 𝑦 = 0 if 𝑥 = 𝑆- ,
which means the steganographic images are identified.
We apply adversarial learning techniques to discriminative tasks to learn the steganographic algorithm. Under unsupervised adversarial training, the model can produce steganographic techniques, which act like an encryption.
4
Experiments
As a proof of concept, we conducted our experiments on two image datasets: celebrity
faces in the wild (CelebA) [8] consisting of 202,599 images and BossBase, which is a
dataset of 10000 grayscale images of various scenes. Our datasets are formed of 64 ×
64 pixel images. For the choice of 𝑀, we concatenate a random paragraph message to
generalize our model to random message, with each sample of each dataset. And we
consider different kinds of embedding rates, which vary from 0.1bpp (bits per pixel) to
0.4bpp. Generally, most steganographic algorithms can successfully hide secret message approximately at 0.4bpp. All experiments were performed in TensorFlow[9], on a
workstation with a Titan X GPU.
4.1
CelebA dataset
For the CelebA dataset, which contains 202,599 images of celebrity faces from 10,177
unique identities. We train the model using RMSProp optimization algorithm with the
learning rate of 2×10JK . At each batch we train either the generator, discriminator, or
steganalyzer alternatively.
From the results, we can see that there is no noticeable image quality decrease between 0.1bpp and 0.4bpp. As is shown in Fig. 5. And we also calculate the PSNR (Peak
Signal to Noise Ratio) to evaluate the steganographic effect.
8
Fig. 5. The above are the covers and steganographic images of CelebA dataset. (a) represents the
covers, (b) represents the steganographic images with the embedding rates of 0.1bpp, (c) represents the steganographic images with the embedding rates of 0.4bpp. The bottom is the contrast
of PSNR of embedding rates at 0.1bpp and 0.4bpp.
4.2
BossBase dataset
In addition to the experiments on the CelebA dataset, we also trained our model on the
BossBase dataset, which is a standard steganography dataset. For the images from this
dataset do not come from a single distribution, so the dataset can perform worse than
the experiments on the CelebA dataset.
9
Fig. 6. Similarly, the above are the covers and steganographic images of BossBase dataset. (a)
represents the covers, (b) represents the steganographic images with the embedding rates of
0.1bpp, (c) represents the steganographic images with the embedding rates of 0.4bpp. The bottom
is also the contrast of PSNR of embedding rates at 0.1bpp and 0.4bpp.
We can conclude from the two groups of experiments that for the datasets with distinct
distribution, different embedding rates can influence the similarity between the original
images and the embedded images.
4.3
Comparison with related work
We train in such a way that the steganalyzer can detect the covers and steganographic
images with low rates. Thus, on the basis of this experiment, we additionally conduct
another experiment compared with the state-of-the-art steganographic algorithms.
Which also shows competitive results.
For both datasets, we compare our scheme against steganographic algorithms HUGO
and S-UNIWARD. As is shown in Table 1, our steganalyzer performs competitively.
By training steganalyzer in a supervised fashion, the experiments show that it has the
capacity to become a strong steganalyzer, competing against established techniques like
GNCNN, and so is a good choice for the steganalyzer. Furthermore, for both the CelebA
10
and BossBase datasets, we use 10,000 samples and split them in half, creating a training
set and a test set. And we then trained the generator on the training set. Following this,
we then created an additional 5,000 steganographic images utilizing each steganography algorithm. Thus, we can make the cover set and steganographic images set consist
of 5,000 images respectively.
Table 1. Accuracy of distinguishing between cover and steganographic images for the GNCNN
and Steganalyzer at an embedding rate of 0.4bpp.
Steganographic
Algorithm
HUGO
S-UNIWARD
Generator
CelebA
Steganalyzer
GNCNN
0.93
0.91
0.94
Steganalyzer
0.91
0.89
0.92
BossBase
Steganalyzer
GNCNN
0.72
0.75
0.83
Steganalyzer
0.68
0.71
0.82
As demonstrated in the experiments, the steganalyzer performs competitively against
the GNCNN [10], and the generator also performs well against other steganographic
techniques. The experimental data shows that on the one hand, the generated images
are good at visual quality. On the other hand, the generated images are harder to detect,
which shows the security of the generated images as covers.
5
Conclusion
In this paper, we have proposed an adversarial steganography architecture with generative adversarial networks. On the basis of generative adversarial networks, we leverage the adversarial structure to form an effective steganographic method. Encouraging
results are received from experiments conducted on the widely used datasets in comparison with several state-of-the-art techniques. We think it could be used for adaptive
steganographic algorithm for social network in the future. We believe that, by exploring
more steganography properties, better performance can be achieved.
References
1. Abadi M, Andersen D G. Learning to Protect Communications with Adversarial Neural
Cryptography[J]. 2016:15.
2. Holub V, Fridrich J. Designing steganographic distortion using directional filters[C]// IEEE
International Workshop on Information Forensics and Security. IEEE, 2012:234-239.
3. Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an
arbitrary domain[J]. Eurasip Journal on Information Security, 2014, 2014(1):1.
4. Pevný T, Filler T, Bas P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography[M]// Information Hiding. Springer Berlin Heidelberg, 2010:161177.
5. Xu G, Wu H Z, Shi Y Q. Structural Design of Convolutional Neural Networks for Steganalysis[J]. IEEE Signal Processing Letters, 23(5):708-712, 2016.
11
6. Xu G, Wu H Z, Shi Y Q. Ensemble of CNNs for Steganalysis: An Empirical Study[C]//
ACM Workshop on Information Hiding and Multimedia Security. ACM, 2016:103-107.
7. Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative Adversarial Networks[J]. Advances in Neural Information Processing Systems, 3:2672-2680, 2014.
8. Liu Z, Luo P, Wang X, et al. Deep Learning Face Attributes in the Wild[J]. pp. 3730-3738,
2014.
9. Abadi M, Agarwal A, Barham P, et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems[J]. 2016.
10. Yinlong Qian, Jing Dong, WeiWang, and Tieniu Tan. Deep learning for steganalysis via
convolutional neural networks. In IS&T/SPIE Electronic Imaging, pp. 94090J–94090J. International Society for Optics and Photonics, 2015a.
11. Browne M, Ghidary S S, Mayer N M. Convolutional Neural Networks for Image Processing
with Applications in Mobile Robotics[J]. Studies in Computational Intelligence, 2008,
83:327-349.
12. Mielikainen, Jarno. Lsb matching revisited. IEEE signal processing letters, 13(5):285–287,
2006.
13. Andrew D Ker. Resampling and the detection of lsb matching in color bitmaps. In Eletronic
Imaging 2005, pp. 1–15. International Society for Optics and Photonics, 2005.
14. Arjovsky M, Chintala S, Bottou L. Wasserstein GAN[J]. 2017.
15. Radford, Alec, Metz, Luke, and Chintala, Soumith. Unsupervised representation learning
with deep convolutional generative adversarial networks. CoRR, abs/1511.06434, 2015.
URL http://arxiv.org/abs/1511.06434.
16. Odena A, Olah C, Shlens J. Conditional Image Synthesis With Auxiliary Classifier
GANs[J]. 2016.
17. Chen X, Duan Y, Houthooft R, et al. InfoGAN: Interpretable Representation Learning by
Information Maximizing Generative Adversarial Nets[J]. 2016.
18. Reed S, Akata Z, Yan X, et al. Generative Adversarial Text to Image Synthesis[J].
2016:1060-1069.
19. Shi H, Dong J, Wang W, et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks[C]. 2017.
| 1cs.CV
|
A NEW ROBUST FREQUENCY DOMAIN ECHO CANCELLER WITH CLOSED-LOOP
LEARNING RATE ADAPTATION
Jean-Marc Valin and Iain B. Collings
arXiv:1602.08609v1 [cs.SD] 27 Feb 2016
CSIRO ICT Centre, Sydney, Australia (jmvalin@jmvalin.ca)
ABSTRACT
One of the main difficulties in echo cancellation is the fact that
the learning rate needs to vary according to conditions such as
double-talk and echo path change. Several methods have been
proposed to vary the learning. In this paper we propose a new
closed-loop method where the learning rate is proportional to
a misalignment parameter, which is in turn estimated based
on a gradient adaptive approach. The method is presented in
the context of a multidelay block frequency domain (MDF)
echo canceller. We demonstrate that the proposed algorithm
outperforms current popular double-talk detection techniques
by up to 6 dB.
Fig. 1. Block diagram of echo cancellation system.
1. INTRODUCTION
In any echo cancellation system, the presence of near end
speech (double-talk) tends to make the adaptive filter diverge.
To counter the effect, robust echo cancellers require adjustment of the learning rate to account for the presence of doubletalk in the signal.
Most echo cancellation algorithms attempt to explicitly
detect double-talk [1] conditions and then react by freezing
the coefficients of the adaptive filter (setting the learning rate
to zero). Reliable double-talk detection is a difficult problem
and sometimes it is not clear what should be considered as
double-talk, especially in an acoustic echo cancellation context with stationary background noise.
In previous work [2], we proposed a new approach to
make echo cancellation more robust to double-talk. Instead of
attempting to explicitly detect double-talk conditions, a continuous learning rate was used. The learning rate depends on
a misalignment estimate, which is obtained through a linear
regression. While the technique gives good results, the estimation of the misalignment remains a difficult problem.
In this paper, we propose a new approach where the misalignment is estimated in closed-loop based on a gradient adaptive approach. This closed-loop technique is applied to the
block frequency domain (MDF) adaptive filter [3] and shows
a significant improvement over previous approaches.
c 2007 IEEE. Personal use of this material is permitted. Permission
from IEEE must be obtained for all other uses, in any current or future media,
including reprinting/republishing this material for advertising or promotional
purposes, creating new collective works, for resale or redistribution to servers
or lists, or reuse of any copyrighted component of this work in other works.
In Section 2, we discuss the optimal learning rate in presence of noise. Section 3 introduces the multidelay frequency
domain (MDF) adaptive filter. In Section 4, we propose a
gradient adaptive technique for adjusting the learning rate of
the MDF algorithm. Experimental results and a discussion
are presented in Section 5 and Section 6 concludes this paper.
2. OPTIMAL LEARNING RATE IN THE PRESENCE
OF DOUBLE-TALK
In the acoustic echo cancellation context illustrated in Fig. 1,
the speech signal x (n) received from the far end is played
into a loudspeaker. The microphone signal d (n) captures
both the convoluted far end speech y (n) and the near end
noisy speech v (n). The adaptive filter attempts to estimate
the impulse response ĥ (n) to be as close as possible to the
real impulse response h (n). The estimated echo ŷ (n) is subtracted from d (n), so the output signal e (n) contains both
double-talk v (n) and residual echo r (n) = y (n) − ŷ (n).
The conventional approach to double-talk robustness consists of setting the learning rate to zero when double-talk is
detected. Double-talk detectors [1] are thus an important aspect of the approach. Unfortunately, they are sometimes unreliable, especially in acoustic echo cancellation context when
background noise is present. In this paper, we investigate continuous learning rates that do not depend on a binary doubletalk decision.
Whenever an adaptive filter is not perfectly adjusted, its
residual signal r (n) can be used to gain better information
about the exact (time-varying) filter weights h (n). However,
the amount of information about h (n) present in e (n) decreases with the amount of noise and near end speech v(n). In
the case of the normalised least mean square (NLMS) filter, it
means that the stochastic gradient becomes less reliable when
the noise increases or when the filter misalignment decreases
(as the filter converges). The theoretical optimal learning rate
is approximately equal to the residual-to-error ratio [2]:
E r2 (n)
µopt (n) ≈
(1)
E {e2 (n)}
where r (n) = y (n) − ŷ (n) is the (unknown) residual echo
and e (n) is the error signal.
One possible method to vary the learning rate µ (n) would
be to use the generalized normalized gradient descent (GNGD)
algorithm [4], which includes the NLMS learning rate:
µ0 E x2 (n)
(2)
µ (n) =
E {x2 (n)} + ǫ (n)
where ǫ (n) is adapted based on the NLMS stochastic gradient
behaviour. To examine ǫ (n) more closely, it is reasonable to
surmise that (2) eventually converges to the optimal learning
rate defined by (1). Assuming steady state behaviour (ǫ (n) is
stable) and µ0 = 1, we find that:
E r2 (n)
E r2 (n)
≈
(3)
E {r2 (n)} + γ (n) ǫ (n)
E {e2 (n)}
2
2
where
2 γ = E r (n)2 /E x (n)
. Knowing that we have
E e (n) = E r (n) + E v 2 (n) , we find the relation ǫ (n) ≈ E v 2 (n) /γ (n). In other words, the gradientadaptive parameter ǫ (n) is approximately proportional to the
variance of the near-field signal and independent of the farfield signal. Because ǫ (n) can only be adapted slowly
over
time, it is clear that (2) implicitly assumes that E v 2 (n)
also varies slowly. While this is a reasonable assumption in
applications where the background noise is constant or slowly
varying, the assumption does not hold for acoustic echo cancellation, where double-talk can start or stop at any time.
In previous work [2], we proposed
to use (1) directly to
adapt the learning rate. While E e2 (n) can
easily be estimated, the estimation of the residual echo E r2 (n) is difficult because one does not have access to the real filter coefficients. One reasonable assumption we make is that:
E r2 (n) = η (n) E y 2 (n) ≈ η (n) E ŷ 2 (n)
(4)
where η (n) is the normalised filter misalignment (or the inverse of the echo return loss enancement) and is easier to estimate because it is assumed to vary slowly as a function of
time. Although direct estimation of η (n) through linear regression can lead to good results, estimating η (n) remains a
difficult problem. In this paper we propose to apply a gradient
adaptive approach to the problem of estimating η (n).
3. THE MDF ALGORITHM
In this paper, we consider the special case of the multidelay
block frequency domain (MDF) adaptive filter [3]. The MDF
algorithm in matrix form is detailed here for the sake of clarity. Let N be the MDF block size, K be the number of blocks
and F denote the 2N × 2N Fourier transform matrix, we denote the frequency-domain signals for frame ℓ as:
T
(5)
e (ℓ) = F [01×N , e (ℓN ) , . . . , e (ℓN + N − 1)]
o
n
T
xk(ℓ) = diag F[x((ℓ−k−1)N ),. . . ,x((ℓ−k+1)N −1)]
(6)
X (ℓ) = x0 , x1 , . . . , xK−1
(7)
d (ℓ) = F [01×N , d (ℓN ) , . . . , d (ℓN + N − 1)]
T
(8)
The MDF algorithm is then expressed in matrix form as:
e (ℓ) = d (ℓ) − y (ℓ)
(9)
ŷ (ℓ) = G1 X (ℓ) ĥ (ℓ)
(10)
ĥ (ℓ + 1) = ĥ (ℓ) + G2 µ (ℓ) ∇ĥ (ℓ)
(11)
H
∇ĥ (ℓ) = Φ−1
xx (ℓ) X (ℓ) e (ℓ)
(12)
where Φxx (ℓ) is the diagonal normalisation matrix as computed in [3], G1 and G2 are the constraint matrices:
0N ×N 0N ×N
F−1
(13)
G1 = F
0N ×N IN ×N
IN ×N 0N ×N
F−1
(14)
G̃2 = F
0N ×N 0N ×N
o
n
(15)
G2 = diag G̃2 , G̃2 , . . . , G̃2
and µ (ℓ) is the 2KN × 2KN diagonal learning rate matrix:
n
T o
(16)
µ (ℓ) = diag µT (ℓ) , µT (ℓ) , . . . , µT (ℓ)
µ (ℓ) = [µ0 (ℓ) , µ1 (ℓ) , . . . , µ2N −1 (ℓ)]
T
(17)
If µk (ℓ) = µo , we have the standard MDF algorithm.
4. GRADIENT-ADAPTIVE LEARNING RATE
In [2], we proposed to use the frequency-dependent learning
rate:
2
(ℓ)
ŷ
k
(18)
µk (ℓ) = min η (ℓ)
2 , µ0
|ek (ℓ)|
where η(ℓ) is a direct estimation of the normalised misalignment exploiting the non-stationarity of the signals and using
linear regression between the power spectra of the estimated
echo and the output signal. The motivation behind this formulation is that it factors the residual echo estimation into a
slowly-evolving (but unfortunately difficult to estimate) normalised misalignment η(ℓ) and a rapidly-evolving (but easy to
2
estimate) term far-end term yk (ℓ) . The learning rate can
thus react quickly to double-talk even if the estimation of the
residual echo (through the misalignment estimate) requires a
longer time period. A remaining problem with that approach
is that η(ℓ) is difficult to estimate and the algorithm does not
know whether its estimate of η(ℓ) is too low or too high. In
this sense, the η(ℓ) update in [2] is an open-loop estimate.
4.1. Adaptation algorithm
In this paper we bypass the difficulty of estimating η(ℓ) directly and instead propose a closed-loop gradient adaptive estimation of η(ℓ). The parameter η(ℓ) is no longer an estimate of the normalised misalignment, but is instead adapted
in closed-loop in such a way as to maximise convergence of
the adaptive filter. As with other gradient-adaptive methods
[5, 4] we compute the derivative of the mean square error
E (ℓ) = eH (ℓ) e (ℓ), this time with respect to η (ℓ − 1), using the chain derivation rule:
∂E (ℓ)
∂E (ℓ) ∂e (ℓ) ∂ŷ (ℓ) ∂ ĥ (ℓ) ∂µ (ℓ − 1)
=
∂η(ℓ−1)
∂e (ℓ) ∂ŷ (ℓ) ∂ ĥ (ℓ) ∂µ (ℓ − 1) ∂η (ℓ − 1)
(19)
= −e
≈−
H
H
(ℓ)G1 X(ℓ)G2 Φ−1
xx (ℓ)X (ℓ) e(ℓ)
ŷk (ℓ)
ŷk (ℓ)
2
2
|ek (ℓ)|
(20)
2
|ek (ℓ)|2
H
∇ĥ (ℓ) Φxx ∇ĥ (ℓ)
(21)
We propose to use a filtered version of the gradient with a
multiplicative update, similar to the general approch in [6],
and to drop the normalisation term Φxx . This results in the
new gradient-based learning rate adaptation rule:
n
o
2
H
(ℓ)
ℜ
ψ
(ℓ)
∇
ĥ
(ℓ)
ŷ
k
n
o
η (ℓ + 1) = η (ℓ) expρ
2P
∗
|ek (ℓ)|
k ℜ ψk (ℓ) ∇ĥk (ℓ)
(22)
ψ (ℓ + 1) = αψ (ℓ) + ∇ĥ (ℓ)
(23)
where ρ is the step size and α controls the gradient smoothing
(typically ρ = 1, α = 0.9).
An intuitive interpretation for the update equation in (22)
is that when the learning rate is too high (because η (ℓ)is too
high), the gradient oscillates, causing η (ℓ) to decrease. On
the other hand, when the learning rate is too low (perhaps because the echo path has changed) the gradient keeps pointing
in the same direction and η (ℓ) increases. Also, because of
|ŷ (ℓ)|2
the k 2 factor, we can apply (22) at each frame regardless
|ek (ℓ)|
of double-talk or even when no far-end speech is present (in
2
which case ŷk (ℓ) = 0 anyway).
The last aspect that needs to be addressed is the initial
condition. When the filter is initialised, all the weights are set
to zero, which means that ŷ (ℓ) = 0 and no adaptation can
take place in (18) and (22). In order to bootstrap the adaptation process, the learning rate µk (ℓ) is set to a fixed constant
(we use µk (ℓ) = 0.25) for a short time equal to twice the filter
length (only non-zero portions of signal x(n) are taken into
account). This procedure is only necessary when the filter is
initialised and is not required in case of echo path change.
4.2. Algorithm behaviour
Here we show that the adaptive learning rate described above
is able to deal with both double-talk and echo path change
without explicit modelling. From (18) we can see that when
2
double-talk occurs, the denominator |ek (ℓ)| rapidly increases,
causing an instantaneous decrease in the learning rate that
lasts only as long as the double-talk period lasts. In the case
of background noise, the learning rate depends on both the
presence of an echo signal as well as the misalignment estimate. As the filter misalignment becomes smaller, the learning
rate also becomes smaller.
One major difficulty involved in double-talk detection is
the need to distinguish between double-talk and echo path
change since both cause a sudden increase in the filter error
signal. This distinction is made implicitly in the gradientbased adaptation of η(ℓ). When the echo path changes, ∇ĥ (ℓ)
starts pointing steadily in the same direction, thus significantly increasing η(ℓ), which is a clear sign that the filter is no
longer properly adapted.
In gradient adaptive methods [5, 6], the implicit assumption is that both the near-end and the far-end signals are nearly
stationary. We have shown that the GNGD algorithm [4] only
requires the near-end signal to be nearly stationary. In our new
proposed method, both signals can be non-stationary, which
is a requirement for double-talk robustness.
5. RESULTS AND DISCUSSION
The proposed system is evaluated in an acoustic echo cancellation context with background noise, double-talk and a
change in the echo path (16 seconds into a 32-second recording). The two impulse responses used are 1024-sample long
and measured from real recordings in a small office room with
both the microphone and the loudspeaker resting on a desk.
The proposed algorithm is compared to our previous work
[2], to the normalised cross-correlation (NCC) method [1] and
to a baseline with no double-talk detection (no DTD). The
optimal threshold found for the NCC algorithm was 0.35 with
a learning rate µ = 0.25. It was found that choosing µmax =
0.75 as the upper bound on the learning rate gave good results
for the proposed algorithm. In practise, µmax has little impact
25
4.5
proposed
previous [2]
NCC [1]
no DTD
20
4
less double−talk
more double−talk
PESQ LQO-MOS
ERLE (dB)
3.5
15
10
3
2.5
2
proposed
previous [2]
NCC [1]
no DTD
no cancellation
5
1.5
0
-20
less double−talk
-15
-10
more double−talk
-5
0
5
10
Near-end-to-far-end ratio (dB)
15
20
1
-20
-15
-10
-5
0
5
10
Near-end-to-far-end ratio (dB)
15
20
Fig. 2. Steady-state ERLE (first two seconds of adaptation
not considered) as a function of the near-end to far-end ratio.
Fig. 3. PESQ objective listening quality measure (LQOMOS) as a function of the near-end to far-end ratio.
on the algorithm because the gradient-based adaptation would
compensate for a higher value of µmax by reducing η (ℓ). The
GNGD algorithm [4] is not included in the evaluation because
it is not intended for applications where the near-field signal is
highly non-stationary and it was not possible to obtain better
results than the baseline.
Fig. 2 shows the average steady-state (the first 2 seconds
of adaptation are not considered) ERLE for the test data with
different ratios of near-end signal and echo. Clearly, the proposed algorithm performs better than both our previous work
(2 dB average improvement) and the NCC algorithm (6 dB
average improvement). The perceptual quality of the output
speech signal is also evaluated by comparing it to the near
field signal v(n) using the Perceptual Evaluation of Speech
Quality (PESQ) ITU-T recommendations P.862 [7]. The perceptual quality of the speech shown in Fig. 3 is evaluated
based on the entire file, including the adaptation time. It is
again clear that the proposed algorithm performs better than
all other algorithms. It is worth noting that the reason why the
results in Fig. 2 improve with double-talk (unlike in Fig. 2) is
that the signal of interest is the double-talk v(n), so the higher
the double-talk the less (relative) echo in the input signal.
algorithm, we believe future work could apply it to other adaptive filtering algorithms, including the NLMS algorithm.
7. REFERENCES
[1] J. Benesty, D.R. Morgan, and J.H. Cho, “A new class of
doubletalk detectors based on cross-correlation,” IEEE
Trans. on Speech and Audio Processing, vol. 8, no. 2, pp.
168–172, 2000.
[2] J.-M. Valin, “On adjusting the learning rate in frequency
domain echo cancellation with double-talk,” IEEE Trans.
on Audio, Speech and Language Processing, 2007.
[3] J.-S. Soo and K.K. Pang, “Multidelay block frequency
domain adaptive filter,” IEEE Trans. ASSP, vol. 38, no.
2, pp. 373–376, 1990.
[4] D.P. Mandic, “A generalized normalized gradient descent
algorithm,” IEEE Signal Processing Letters, vol. 11, no.
2, pp. 115–118, 2004.
[5] V.J. Mathews and Z. Xie, “A stochastic gradient adaptive
filter with gradient adaptive step size,” IEEE Trans. on
Signal Processing, vol. 41, pp. 2075–2087, 1993.
6. CONCLUSION
We have demonstrated a novel method for adjusting the learning rate of frequency-domain adaptive filters based on a gradient adaptive estimation of the current misalignment. The proposed method performs better than a double-talk detector and
previous work using direct estimation of the misalignment. In
addition, the closed-loop gradient adaptive estimation of η (ℓ)
makes the algorithm conceptually simple and means that there
are very few important parameters to be tuned. Although the
proposed algorithm is presented in the context of the MDF
[6] W.-P. Ang and B. Farhang-Boroujeny, “A new class
of gradient adaptive step-size LMS algorithms,” IEEE
Trans. on Signal Processing, vol. 49, no. 4, pp. 805–810,
2001.
[7] ITU-T, P.862: Perceptual evaluation of speech quality
(PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and
speech codecs, 2001.
| 3cs.SY
|
Reconfiguring spanning and induced subgraphs∗
Tesshu Hanaka†
Takehiro Ito‡
Naomi Nishimura§
Haruka Mizuta‡
Vijay Subramanya§
Benjamin Moore§
Akira Suzuki‡
arXiv:1803.06074v1 [cs.DS] 16 Mar 2018
Krishna Vaidyanathan§
March 19, 2018
Abstract
Subgraph reconfiguration is a family of problems focusing on the reachability of the
solution space in which feasible solutions are subgraphs, represented either as sets of vertices
or sets of edges, satisfying a prescribed graph structure property. Although there has been
previous work that can be categorized as subgraph reconfiguration, most of the related
results appear under the name of the property under consideration; for example, independent
set, clique, and matching. In this paper, we systematically clarify the complexity status of
subgraph reconfiguration with respect to graph structure properties.
1
Introduction
Combinatorial reconfiguration [6, 5, 11] studies the reachability/connectivity of the solution space
formed by feasible solutions of an instance of a search problem. More specifically, consider a graph
such that each node in the graph represents a feasible solution to an instance of a search problem
P , and there is an edge between nodes representing any two feasible solutions that are “adjacent,”
according to a prescribed reconfiguration rule A; such a graph is called the reconfiguration graph
for P and A. In the reachability problem for P and A, we are given source and target solutions
to P , and the goal is to determine whether or not there is a path between the two corresponding
nodes in the reconfiguration graph for P and A. We call a desired path a reconfiguration sequence
between source and target solutions, where a reconfiguration step from one solution to another
corresponds to an edge in the path.
1.1
Subgraph reconfiguration
In this paper, we use the term subgraph reconfiguration to describe a family of reachability
problems that take subgraphs (more accurately, vertex subsets or edge subsets of a given graph)
as feasible solutions. Each of the individual problems in the family can be defined by specifying
the node set and the edge set of a reconfiguration graph, as follows. (We use the terms node for
reconfiguration graphs and vertex for input graphs.)
Nodes of a reconfiguration graph. The set of feasible solutions (i.e., subgraphs) can be defined
in terms of a specified graph structure property Π which subgraphs must satisfy; for example, “a
graph is a tree,” “a graph is edgeless (an independent set),” and so on. By the choice of how
∗ This work is partially supported by JST ERATO Grant Number JPMJER1201, JST CREST Grant Number
JPMJCR1402, and JSPS KAKENHI Grant Numbers JP16K00004 and JP17K12636, Japan. Research by Canadian
authors is supported by the Natural Science and Engineering Research Council of Canada.
† Kyushu University, Fukuoka, Japan, 3EC15004S@s.kyushu-u.ac.jp
‡ Tohoku University, Sendai, Japan, takehiro@ecei.tohoku.ac.jp, haruka.mizuta.s4@dc.tohoku.ac.jp,
a.suzuki@ecei.tohoku.ac.jp
§ University of Waterloo, Waterloo, Canada, {brmoore, nishi, v7subram, kvaidyan}@uwaterloo.ca
1
Table 1: Subgraph representations and variants
Subgraph representations
Variant names
Known reachability problems
edge subset
edge
spanning tree [6]
matching [6, 10], and b-matching [10]
clique [7]
independent set [6, 8]
vertex subset
induced
induced forest [9]
induced bipartite [9]
induced tree [12]
spanning
clique [7]
Es = E0
E1
E2
E3 = Et
Figure 1: A reconfiguration sequence hE0 , E1 , E2 , E3 i in the edge variant under the TJ rule (also
under the TS rule) with the property “a graph is a path,” where the edges forming solutions are
depicted by thick lines.
to represent subgraphs, each specific problem in the family can be categorized into one of three
variants. (See also Table 1.) If a subgraph is represented as an edge subset, which we will call the
edge variant, then the subgraph formed (induced) by the edge subset must satisfy Π. For example,
Figure 1 illustrates four subgraphs represented as edge subsets, where Π is “a graph is a path.”
On the other hand, if a subgraph is represented as a vertex subset, we can opt either to require
that the subgraph induced by the vertex subset satisfies Π or that the subgraph induced by the
vertex subset contains at least one spanning subgraph that satisfies Π; we will refer to these as the
induced variant and spanning variant, respectively. For example, if Π is “a graph is a path,” then
in the induced variant, the vertex subset must induce a path, whereas in the spanning variant, the
vertex subset is feasible if its induced subgraph contains at least one Hamiltonian path. Figure 2
illustrates feasible vertex subsets of the induced variant and spanning variant. In the figure, the
vertex subset V1′ is feasible in the spanning variant, but is not feasible in the induced variant,
because it contains a spanning path but does not induce a path. As can be seen by this simple
example, in the spanning variant, we need to pay attention to the additional complexity of finding
a spanning subgraph and the complications resulting from the fact that the subgraph induced by
the vertex subset may contain more than one spanning subgraph which satisfies Π.
Edges of a reconfiguration graph. Since we represent a feasible solution by a set of vertices
(or edges) in any variant, we can consider that tokens are placed on each vertex (resp., edge) in
the feasible solution. Then, in this paper, we mainly deal with the two well-known reconfiguration
rules, called the token-jumping (TJ) [8] and token-sliding (TS) rules [2, 4, 8]. In the former, a
token can move to any other vertex (edge) in a given graph, whereas in the latter it can move only
to an adjacent vertex (adjacent edge, that is sharing a common vertex.) For example, Figure 1
and Figure 2 illustrate reconfiguration sequences under the TJ rule for each variant. Note that the
sequence in Figure 1 can also be considered as a sequence under the TS rule. In the reconfiguration
graph, two nodes are adjacent if and only if one of the two corresponding solutions can be obtained
from the other one by a single move of one token that follows the specified reconfiguration rule.
Therefore, all nodes in a connected component of the reconfiguration graph represent subgraphs
having the same number of vertices (edges).
We note in passing that since in most cases we wish to retain the same number of vertices
and/or edges, we rarely use the token-addition-and-removal (TAR) rule [6, 8], where we can add
or remove a single token at a time, for subgraph reconfiguration problems.
2
Vs = V0
V1
V2
V3
V4 = Vt
(a) Induced variant
Vs = V0’
V1’
V2’ = Vt
(b) Spanning variant
Figure 2: Reconfiguration sequences hV0 , V1 , V2 , V3 , V4 i in the induced variant under the TJ rule
and hV0′ , V1′ , V2′ i in the spanning variant under the TJ rule with the property “a graph is a path,”
where the vertices forming solutions are depicted by colored circles, and the subgraphs satisfying
the property by thick lines.
1.2
Previous work
Although there has been previous work that can be categorized as subgraph reconfiguration,
most of the related results appear under the name of the property Π under consideration. Accordingly, we can view reconfiguration of independent sets [6, 8] as the induced variant of subgraph
reconfiguration such that the property Π is “a graph is edgeless.” Other examples can be found
in Table 1. We here explain only known results which are directly related to our contributions.
Reconfiguration of cliques can be seen as both the spanning and the induced variant; the
problem is PSPACE-complete under any rule, even when restricted to perfect graphs [7]. Indeed,
for this problem, the rules TAR, TJ, and TS have all been shown to be equivalent from the
viewpoint of polynomial-time solvability. It is also known that reconfiguration of cliques can be
solved in polynomial time for several well-known graph classes [7].
Wasa et al. [12] considered the induced variant under the TJ and TS rules with the property
Π being “a graph is a tree.” They showed that this variant under each of the TJ and TS rules
is PSPACE-complete, and is W[1]-hard when parameterized by both the size of a solution and
the length of a reconfiguration sequence. They also gave a fixed-parameter algorithm when parameterized by both the size of a solution and the maximum degree of an input graph, under
both the TJ and TS rules. In closely related work, Mouawad et al. [9] considered the induced
variants of subgraph reconfiguration under the TAR rule with the properties Π being either
“a graph is a forest” or “a graph is bipartite.” They showed that these variants are W[1]-hard
when parameterized by the size of a solution plus the length of a reconfiguration sequence.
1.3
Our contributions
In this paper, we study the complexity of subgraph reconfiguration under the TJ and TS
rules. (Our results are summarized in Table 2, together with known results, where an (i, j)-biclique
is a complete bipartite graph with the bipartition of i vertices and j vertices.) As mentioned above,
because we consider the TJ and TS rules, it suffices to deal with subgraphs having the same number
of vertices or edges. Subgraphs of the same size may be isomorphic for certain properties Π, such
as “a graph is a path” and “a graph is a clique,” because there is only one choice of a path or
a clique of a particular size. On the other hand, for the property “a graph is a tree,” there are
several choices of trees of a particular size. (We will show an example in Section 3 with Figure 4.)
As shown in Table 2, we systematically clarify the complexity of subgraph reconfiguration
for several fundamental graph properties. In particular, we show that the edge variant under the
TJ rule is computationally intractable for the property “a graph is a path” but tractable for the
3
Property Π
path
cycle
tree
Table 2: Previous and new results
Edge
Induced
variant
variant
NP-hard (TJ)
PSPACE-c. (TJ, TS)
[Theorem 2]
[Theorems 7, 9]
P (TJ, TS)
PSPACE-c. (TJ, TS)
[Theorem 3]
[Theorems 8, 9]
P (TJ)
PSPACE-c. (TJ, TS)
[Theorem 6]
[12]
(i, j)-biclique
P (TJ, TS)
[Theorem 5]
clique
P (TJ, TS)
[Theorem 4]
diameter
two
any
property
XP for solution
size (TJ, TS)
[Theorem 1]
PSPACE-c. for i = j (TJ)
PSPACE-c. for fixed i (TJ)
[Corollary 1, Theorem 12]
PSPACE-c. (TJ, TS)
[7]
PSPACE-c. (TS)
[Theorem 15]
XP for solution
size (TJ, TS)
[Theorem 1]
Spanning
variant
PSPACE-c. (TJ, TS)
[Theorems 7, 9]
PSPACE-c. (TJ, TS)
[Theorems 8, 9]
P (TJ)
PSPACE-c. (TS)
[Theorems 11, 10]
NP-hard for i = j (TJ)
P for fixed i (TJ)
[Theorems 13, 14]
PSPACE-c. (TJ, TS)
[7]
PSPACE-c. (TS)
[Theorem 15]
XP for solution
size (TJ, TS)
[Theorem 1]
property “a graph is a tree.” This implies that the computational (in)tractability does not follow
directly from the inclusion relationship of graph classes required as the properties Π; one possible
explanation is that the path property implies a specific graph, whereas the tree property allows
several choices of trees, making the problem easier.
1.4
Preliminaries
Although we assume throughout the paper that an input graph G is simple, all our algorithms
can be easily extended to graphs having multiple edges. We denote by (G, Vs , Vt ) an instance of a
spanning variant or an induced variant whose input graph is G and source and target solutions are
vertex subsets Vs and Vt of G. Similarly, we denote by (G, Es , Et ) an instance of the edge variant.
We may assume without loss of generality that |Vs | = |Vt | holds for the spanning and induced
variants, and |Es | = |Et | holds for the edge variant; otherwise, the answer is clearly no since under
both the TJ and TS rules, all solutions must be of the same size.
2
General algorithm
In this section, we give a general XP algorithm when the size of a solution (that is, the size
of a vertex or edge subset that represents a subgraph) is taken as the parameter. For notational
convenience, we simply use element to represent a vertex (or an edge) for the spanning and induced
variants (resp., the edge variant), and candidate to represent a set of elements (which does not
necessarily satisfy the property Π.) Furthermore, we define the size of a given graph as the number
of elements in the graph.
Theorem 1. Let Π be any graph structure property, and let f (k) denote the time to check if a
candidate of size k satisfies Π. Then, all of the spanning, induced, and edge variants under the
TJ or TS rules can be solved in time O(nk+1 k + nk f (k)), where n is the size of a given graph and
k is the size of a source (and target) solution. Furthermore, a shortest reconfiguration sequence
between source and target solutions can be found in the same time bound, if it exists.
Proof. Our claim is that the reconfiguration graph can be constructed in the stated time. Since
a given source solution is of size k, it suffices to deal only with candidates of size exactly k. For
4
Ps
Pt
e1s
s1
ens
s2
sn
e1t
t1
G
sn+1
tn
e1
x
t
en+1
ent
t2
s
en+1
e2
v
e3
s
t
w
tn+1
Figure 3: Reduction to the edge variant under the TJ rule for the property “a graph is a path.”
a given graph, the total number of possible candidates of size k is O(nk ). For each candidate,
we can check in time f (k) whether it satisfies Π. Therefore, we can construct the node set of
the reconfiguration graph in time O(nk f (k)). We then obtain the edge set of the reconfiguration
graph. Notice that each node in the reconfiguration graph has O(nk) adjacent nodes, because we
can replace only a single element at a time. Therefore, we can find all pairs of adjacent nodes in
time O(nk+1 k).
In this way, we can construct the reconfiguration graph in time O(nk+1 k + nk f (k)) in total.
The reconfiguration graph consists of O(nk ) nodes and O(nk+1 k) edges. Therefore, by breadthfirst search starting from the node representing a given source solution, we can determine in time
O(nk+1 k) whether or not there exists a reconfiguration sequence between two nodes representing
the source and target solutions. Notice that if a desired reconfiguration sequence exists, then the
breadth-first search finds a shortest one.
3
Edge variants
In this section, we study the edge variant of subgraph reconfiguration for the properties of
being paths, cycles, cliques, bicliques, and trees.
We first consider the property “a graph is a path” under the TJ rule.
Theorem 2. The edge variant of subgraph reconfiguration under the TJ rule is NP-hard
for the property “a graph is a path.”
Proof. We give a polynomial-time reduction from the Hamiltonian path problem. Recall that a
Hamiltonian path in a graph G is a path that visits each vertex of G exactly once. Given a graph G
and two vertices s, t ∈ V (G) of G, the NP-complete problem Hamiltonian path is to determine
whether or not G has a Hamiltonian path which starts from s and ends in t [3].
For an instance (G, s, t) of Hamiltonian path, we construct a corresponding instance (G′ , Es , Et )
of our problem, as follows. (See also Figure 3.) Let n = |V (G)|. We first add two new vertices v and x to G with two new edges e1 = xv and e2 = vs. We then add two paths Ps =
hs1 , s2 , . . . , sn+1 , xi and Pt = ht1 , t2 , . . . , tn+1 , xi, where s1 , s2 , . . . , sn+1 and t1 , t2 , . . . , tn+1 are distinct new vertices. Each of Ps and Pt consists of n+1 edges; we denote by es1 , es2 , . . . , esn+1 the edges
s1 s2 , s2 s3 , . . . , sn+1 x in Ps , respectively, and by et1 , et2 , . . . , etn+1 the edges t1 t2 , t2 t3 , . . . , tn+1 x in
Pt , respectively. We finally add a new vertex w with an edge e3 = tw, completing the construction
of G′ . We then set Es = {es1 , es2 , . . . , esn+1 , e1 , e2 } and Et = {et1 , et2 , . . . , etn+1 , e1 , e2 }; these edge
subsets clearly form paths in G′ . We have thus constructed our corresponding instance (G′ , Es , Et )
in polynomial time.
We now prove that an instance (G, s, t) of Hamiltonian path is a yes-instance if and only if
the corresponding instance (G′ , Es , Et ) is a yes-instance.
To prove the only-if direction, we first suppose that G has a Hamiltonian path P starting from
s and ending in t. Then, we construct an actual reconfiguration sequence from Es to Et using
the edges in P . Notice that P consists of n − 1 edges. Thus, we first move the n − 1 edges
es1 , es2 , . . . , esn−1 in Es to the edges in P one by one, and then move esn to e3 . Next, we move esn+1 to
etn+1 , and then move the edges in E(P ) ∪ {e3 } to etn , etn−1 , . . . , et1 one by one. By the construction
of G′ , we know that each of the intermediate edge subsets forms a path in G′ , as required.
5
We now prove the if direction by supposing that there exists a reconfiguration sequence hEs =
E0 , E1 , . . . , Eℓ = Et i. Let Eq be the first edge subset in the sequence such that E(Pt ) ∩ Eq 6= ∅;
we claim that Eq contains a Hamiltonian path in G. First, notice that the edge in E(Pt ) ∩ Eq
is etn+1 ; otherwise the subgraph formed by Eq is disconnected. Since |Eq | = |Es | = n + 3 and
|E(Ps )| = n + 1, we can observe that Eq contains no edge in Ps ; otherwise the degree of x would
be three, or Eq would form a disconnected subgraph. Therefore, the n + 2 edges in Eq \ {etn+1 }
must be chosen from E(G) ∪ {e1 , e2 , e3 }. Since |V (G)| = n and Eq must form a path in G′ , we
know that Eq \ {etn+1 } consists of e1 , e2 , e3 and n − 1 edges in G. Thus, Eq \ {etn+1, e1 , e2 , e3 } forms
a Hamiltonian path in G starting from s and ending in t, as required.
We now consider the property “a graph is a cycle,” as follows.
Theorem 3. The edge variant of subgraph reconfiguration under each of the TJ and TS
rules can be solved in linear time for the property “a graph is a cycle.”
Proof. Let (G, Es , Et ) be a given instance. We claim that the reconfiguration graph is edgeless, in
other words, no feasible solution can be transformed at all. Then, the answer is yes if and only if
Es = Et holds; this condition can be checked in linear time.
Let E ′ be any feasible solution of G, and consider a replacement of an edge e− ∈ E ′ with an
edge e+ other than e− . Let u, v be the endpoints of e− . When we remove e− from E ′ , the resulting
edge subset E ′ \{e} forms a path whose ends are u and v. Then, to ensure that the candidate forms
a cycle, we can choose only e− = uv as e+ . This contradicts the assumption that e+ 6= e− .
The same arguments hold for the property “a graph is a clique,” and we obtain the following
theorem. We note that, for this property, both induced and spanning variants (i.e., when solutions
are represented by vertex subsets) are PSPACE-complete under any rule [7].
Theorem 4. The edge variant of subgraph reconfiguration under each of the TJ and TS
rules can be solved in linear time for the property “a graph is a clique.”
We next consider the property “a graph is an (i, j)-biclique,” as follows.
Theorem 5. The edge variant of subgraph reconfiguration under each of the TJ and TS
rules can be solved in polynomial time for the property “a graph is an (i, j)-biclique” for any pair
of positive integers i and j.
Proof. We may assume without loss of generality that i ≤ j holds. We prove the theorem in the
following three cases: Case 1: i = 1 and j ≤ 2; Case 2: i, j ≥ 2; and Case 3: i = 1 and j ≥ 3.
We first consider Case 1, which is the easiest case. In this case, any (1, j)-biclique has at most
two edges. Therefore, by Theorem 1 we can conclude that this case is solvable in polynomial time.
We then consider Case 2. We show that (G, Es , Et ) is a yes-instance if and only if Es = Et
holds. To do so, we claim that the reconfiguration graph is edgeless, in other words, no feasible
solution can be transformed at all. To see this, because i, j ≥ 2, notice that the removal of any
edge e in an (i, j)-biclique results in a bipartite graph with the same bipartition of i vertices and
j vertices. Therefore, to obtain an (i, j)-biclique by adding a single edge, we must add back the
same edge e.
We finally deal with Case 3. Notice that a (1, j)-biclique is a star with j leaves, and its center
vertex is of degree j ≥ 3. Then, we claim that (G, Es , Et ) is a yes-instance if and only if the center
vertices of stars represented by Es and Et are the same. The if direction clearly holds, because
we can always move edges in Es \ Et into ones in Et \ Es one by one. We thus prove the only-if
direction; indeed, we prove the contrapositive, that is, the answer is no if the center vertices of
stars represented by Es and Et are different. Consider such a star Ts formed by Es . Since Ts has
j ≥ 3 leaves, the removal of any edge in Es results in a star having j − 1 ≥ 2 leaves. Therefore, to
ensure that each intermediate solution is a star with j leaves, we can add only an edge of G which
is incident to the center of Ts . Thus, we cannot change the center vertex.
6
Es = E0
E1
E2 = Et
Figure 4: Reconfiguration sequence hE0 , E1 , E2 i in the edge variant under the TJ rule with the
property “a graph is a tree.”
In this way, we have proved Theorem 5. Although Case 1 takes non-linear time, our algorithm
can be easily improved (without using Theorem 1) so that it runs in linear time.
We finally consider the property “a graph is a tree” under the TJ rule. As we have mentioned
in the introduction, for this property, there are several choices of trees even of a particular size,
and a reconfiguration sequence does not necessarily consist of isomorphic trees (see Figure 4). This
“flexibility” of subgraphs may yield the contrast between Theorem 2 for the path property and the
following theorem for the tree property.
Theorem 6. The edge variant of subgraph reconfiguration under the TJ rule can be solved
in linear time for the property “a graph is a tree.”
Proof. Suppose that (G, Es , Et ) is a given instance. We may assume without loss of generality that
|Es | = |Et | ≥ 2; otherwise |Es | = |Et | ≤ 1 holds, and hence the instance is trivially a yes-instance.
We will prove below that any instance with |Es | = |Et | ≥ 2 is a yes-instance if and only if all the
edges in Es and Et are contained in the same connected component of G. Note that this condition
can be checked in linear time.
We first prove the only-if direction of our claim. Since |Es | = |Et | ≥ 2 and subgraphs always
must retain a tree structure (more specifically, they must be connected graphs), observe that we
can exchange edges only in the same connected component of G. Thus, the only-if direction follows.
To complete the proof, it suffices to prove the if direction of our claim. For notational convenience, for any feasible solution Ei we denote by Ti the tree represented by Ei , and by Vi the
vertex set of Ti . In this direction, we consider the following two cases: (a) Vs ∩ Vt = ∅, and (b)
Vs ∩ Vt 6= ∅.
We consider case (a), that is, Vs ∩ Vt = ∅. Since Ts and Tt are contained in one connected
component of G, there exists a path hv0 , v1 , . . . , vℓ i in G such that v0 ∈ Vs , vℓ ∈ Vt and vi ∈
/ Vs ∪ Vt
for all i ∈ {1, 2, . . . , ℓ − 1}. Since Ts is a tree, it has at least two degree-one vertices. Let vs
be any degree-one vertex in Vs \ {v0 }, and let es be the leaf edge of Ts incident to vs . Then,
we can exchange es with v0 v1 , and obtain another tree represented by the resulting edge subset
(Es ∪ {v0 v1 }) \ {es }. By repeatedly applying this operation along the path hv1 , v2 , . . . , vℓ i, we can
obtain a solution Ek such that Vk ∩ Vt = {vℓ } 6= ∅; this case will be considered below.
We finally consider case (b), that is, Vs ∩ Vt 6= ∅. Consider the graph (Vs ∩ Vt , Es ∩ Et ). Then,
(Vs ∩ Vt , Es ∩ Et ) is a forest, and let G′ = (V ′ , E ′ ) be a connected component (i.e., a tree) of
(Vs ∩ Vt , Es ∩ Et ) whose edge set is of maximum size. We now prove that there is a reconfiguration
sequence between Es and Et by induction on k = |Es \ E ′ | = |Et \ E ′ |. If k = 0, then Es = E ′ = Et
and hence the claim holds. We thus consider the case where k > 0 holds. Since G′ is a proper
subtree of Tt , there exists at least one edge et in Et \ E ′ such that one endpoint of et is contained in
V ′ and the other is not. We claim that there exists an edge es in Es \ E ′ which can be moved into
et , that is, the subgraph represented by the resulting edge subset (Es ∪ {et }) \ {es } forms a tree. If
both endpoints of et are contained in Vs (not just V ′ ), Es ∪ {et } contains a cycle; let C ⊆ Es ∪ {et }
be the edge set of the cycle. Since the subgraph Tt has no cycle, there exists at least one edge in
C \ Et , and we choose one of them as es . On the other hand, if just one endpoint of et is contained
in Vs , then we choose a leaf edge of Ts in Es \ E ′ as es . Note that there exists such a leaf edge since
G′ is a proper subtree of Ts . From the choice of es and et , we know the subgraph represented by
the resulting edge subset (Es ∪ {et }) \ {es } forms a tree; let Ek = (Es ∪ {et }) \ {es }. Furthermore,
since Ek ∩ Et includes E ′ ∪ {et } and the subgraph formed by E ′ ∪ {et } is connected, the subgraph
7
G
G
s2
s1
s
t
t1
s1
t2
(a)
s
t
t1
(b)
Figure 5: Reductions for the properties (a) “a graph is a path,” and (b) “a graph is a cycle.”
formed by Ek ∩ Et has a connected component whose edge set has size at least |E ′ | + 1. Therefore,
we can conclude that Ek is reconfigurable into Et by the induction hypothesis.
4
Induced and spanning variants
In this section, we deal with the induced and spanning variants where subgraphs are represented as
vertex subsets. Most of our results for these variants are hardness results, except for Theorems 11
and 14.
4.1
Path and cycle
In this subsection, we show that both induced and spanning variants under the TJ or TS rules are
PSPACE-complete for the properties “a graph is a path” and “a graph is a cycle.” All proofs in
this subsection make use of reductions that employ almost identical constructions. Therefore, we
describe the detailed proof for only one case, and give proof sketches for the other cases.
We give polynomial-time reductions from the shortest path reconfiguration problem,
which can be seen as a subgraph reconfiguration problem, defined as follows [1]. For a
simple, unweighted, and undirected graph G and two distinct vertices s, t of G, shortest path
reconfiguration is the induced (or spanning) variant of subgraph reconfiguration under
the TJ rule for the property “a graph is a shortest st-path.” Notice that there is no difference
between the induced variant and the spanning variant for this property, because any shortest path
in a simple graph forms an induced subgraph. This problem is known to be PSPACE-complete [1].
Let d be the (shortest) distance from s to t in G. For each i ∈ {0, 1, . . . , d}, we denote by
Li ⊆ V (G) the set of vertices that lie on a shortest st-path at distance i from s. Therefore, we
have L0 = {s} and Ld = {t}. We call each Li a layer. Observe that any shortest st-path contains
exactly one vertex from each layer, and we can assume without loss of generality that G has no
vertex which does not belong to any layer.
We first give the following theorem.
Theorem 7. For the property “a graph is a path,” the induced and spanning variants of subgraph
reconfiguration under the TJ rule are both PSPACE-complete on bipartite graphs.
Proof. Observe that these variants are in PSPACE. Therefore, we construct a polynomial-time
reduction from shortest path reconfiguration.
Let (G, Vs , Vt ) be an instance of shortest path reconfiguration. Since any shortest stpath contains exactly one vertex from each layer, we can assume without loss of generality that
G has no edge joining two vertices in the same layer, that is, each layer Li forms an independent
set in G. Then, G is a bipartite graph. From (G, Vs , Vt ), we construct a corresponding instance
(G′ , Vs′ , Vt′ ) for the induced and spanning variants; note that we use the same reduction for both
variants. Let G′ be the graph obtained from G by adding four new vertices s1 , s2 , t1 , t2 which are
connected with four new edges s2 s1 , s1 s, tt1 , t1 t2 . (See Figure 5(a).) Note that G′ is also bipartite.
8
We then set Vs′ = Vs ∪ {s1 , s2 , t1 , t2 } and Vt′ = Vt ∪ {s1 , s2 , t1 , t2 }. Since each of Vs and Vt induces
a shortest st-path in G, each of Vs′ and Vt′ is a feasible solution to both variants. This completes
the polynomial-time construction of the corresponding instance.
We now give the key lemma for proving the correctness of our reduction.
Lemma 1. Let V ′ ⊆ V (G′ ) be any solution for the induced or spanning variant which is reachable
by a reconfiguration sequence from Vs′ (or Vt′ ) under the TJ rule. Then, V ′ satisfies the following
two conditions:
(a) s2 , s1 , s, t, t1 , t2 ∈ V ′ ; and
(b) V ′ contains exactly one vertex from each layer of G.
Proof. We first prove that condition (a) is satisfied. Notice that both Vs′ and Vt′ satisfy this
condition. Because V ′ is reconfigurable from Vs′ or Vt′ , it suffices to show that we cannot move
any of s2 , s1 , s, t, t1 , t2 in a reconfiguration sequence starting from Vs′ or Vt′ . Suppose for sake of
contradiction that we can move at least one of s2 , s1 , s, t, t1 , t2 . Then, the first removed vertex v ∈
{s2 , s1 , s, t, t1 , t2 } must be either s2 or t2 ; otherwise the resulting subgraph would be disconnected.
Let w be the vertex with which we exchanged v. Then, w ∈ V (G′ ) \ {s2 , s1 , s, t, t1 , t2 } = V (G) \
{s, t}. Therefore, the resulting vertex subset cannot induce a path, and hence it cannot be a
solution for the induced variant. Similarly, the induced subgraph cannot contain a spanning path,
and hence it cannot be a solution for the spanning variant.
We next show that condition (b) is satisfied. Recall that d denotes the number of edges in a
shortest st-path in G. Then, we have |V ′ | = |Vs′ | = |Vt′ | = d+ 5. By condition (a), we know that V ′
contains s2 , s1 , t1 , t2 , and hence in both induced and spanning variants, s and t must be connected
by a path formed by d + 1 vertices in V ′ \ {s2 , s1 , t1 , t2 }. Since the length of this st-path is d, this
path is shortest and hence V ′ must contain exactly one vertex from each of d + 1 layers of G.
Consider any vertex subset V ′′ ⊆ V (G′ ) which satisfies conditions (a) and (b) of Lemma 1; note
that V ′′ is not necessarily a feasible solution. Then, these conditions ensure that V ′′ \ {s2 , s1 , t1 , t2 }
forms a shortest st-path in G if and only if the subgraph represented by V ′′ induces a path in G′ .
Thus, an instance (G, Vs , Vt ) of shortest path reconfiguration is a yes-instance if and only if
the corresponding instance (G′ , Vs′ , Vt′ ) of the induced or spanning variant is a yes-instance. This
completes the proof of Theorem 7.
Similar arguments give the following theorem.
Theorem 8. Both the induced and spanning variants of subgraph reconfiguration under the
TJ rule are PSPACE-complete for the property “a graph is a cycle.”
Proof. Our reduction is the same as in the proof of Theorem 7 except for the following point (see
also Figure 5(b)): instead of adding four new vertices, we connect s and t by a path of length three
with two new vertices s1 and t1 . Then, the same arguments hold as the proof of Theorem 7.
4.2
Path and cycle under the TS rule
We now consider the TS rule. Notice that, in the proofs of Theorems 7 and 8, we exchange only
vertices contained in the same layer. Since any shortest st-path in a graph G contains exactly one
vertex from each layer, we can assume without loss of generality that each layer Li of G forms a
clique. Then, the same reductions work for the TS rule, and we obtain the following theorem.
Theorem 9. Both the induced and spanning variants of subgraph reconfiguration under the
TS rule are PSPACE-complete for the properties “a graph is a path” and “a graph is a cycle.”
4.3
Tree
Wasa et al. [12] showed that the induced variant under the TJ and TS rules is PSPACE-complete
for the property “a graph is a tree.” In this subsection, we show that the spanning variant for this
9
property is also PSPACE-complete under the TS rule, while it is linear-time solvable under the TJ
rule.
We first note that our proof of Theorem 9 yields the following theorem.
Theorem 10. The spanning variant of subgraph reconfiguration under the TS rule is
PSPACE-complete for the property “a graph is a tree.”
Proof. We claim that the same reduction as in Theorem 9 applies. Let V ′ ⊆ V (G′ ) be any
solution which is reachable by a reconfiguration sequence from Vs′ (or Vt′ ) under the TS rule, where
(G′ , Vs′ , Vt′ ) is the corresponding instance for the spanning variant, as in the reduction. Then, the
TS rule ensures that s2 , s1 , s, t, t1 , t2 ∈ V ′ holds, and V ′ contains exactly one vertex from each
layer of G. Therefore, any solution forms a path even for the property “a graph is a tree,” and
hence the theorem follows.
In contrast to Theorem 10, the spanning variant under the TJ rule is solvable in linear time.
We note that the reduction in Theorem 10 does not work under the TJ rule, because the tokens
on s2 and t2 can move (jump) and hence there is no guarantee that a solution forms a path for the
property “a graph is a tree.”
Theorem 11. The spanning variant of subgraph reconfiguration under the TJ rule can be
solved in linear time for the property “a graph is a tree.”
Suppose that (G, Vs , Vt ) is a given instance. We assume that |Vs | = |Vt | ≥ 2 holds; otherwise it
is a trivial instance. Then, Theorem 11 can be obtained from the following lemma.
Lemma 2. (G, Vs , Vt ) with |Vs | = |Vt | ≥ 2 is a yes-instance if and only if Vs and Vt are contained
in the same connected component of G.
Proof. We first prove the only-if direction. Since |Vs | = |Vt | ≥ 2 and the property requires subgraphs to be connected, the subgraph induced by any feasible solution contains at least one edge.
Because we can exchange only one vertex at a time and the resulting subgraph must retain connected, Vs and Vt are contained in the same connected component of G if (G, Vs , Vt ) is a yesinstance.
Next, we prove the if direction for the case where |Vs | = |Vt | = 2. In this case, G[Vs ] and
G[Vt ] consist of single edges, say es and et , respectively. Since Vs and Vt are contained in the same
connected component of G, there is a path in G between es and et . Thus, we can exchange vertices
along the path, and obtain a reconfiguration sequence from Vs to Vt . In this way, the if direction
holds for this case.
Finally, we prove the if direction for the remaining case, that is, |Vs | = |Vt | ≥ 3. Consider any
spanning trees Ts of G[Vs ] and Tt of G[Vt ]. Since |Vs | = |Vt | ≥ 3, each of Ts and Tt has at least two
edges. Then, if we regard (G, E(Ts ), E(Tt )) as an instance of the edge variant under the TJ rule
for the property “a graph is a tree,” we know from the proof of Theorem 6 that it is a yes-instance.
Thus, there exists a reconfiguration sequence E = hE(Ts ) = E0 , E1 , . . . , Eℓ = E(Tt )i of edge
subsets under the TJ rule. We below show that, based on E, we can construct a reconfiguration
sequence between Vs and Vt for the spanning variant under the TJ rule.
For each Ei in E, let Vi be the vertex set of the tree represented by Ei . Notice that Vi is a
feasible solution for the spanning variant, and that V0 = Vs and Vℓ = Vt hold. We claim that
the sequence hVs = V0 , V1 , . . . , Vℓ = Vt i of vertex subsets is a reconfiguration sequence for the
spanning variant under the TJ rule (after removing redundant vertex subsets if needed). To show
this, it suffices to prove |Vi \ Vi−1 | = |Vi−1 \ Vi | ≤ 1 for all i ∈ {1, 2, . . . , ℓ}. Suppose for the sake of
contradiction that there exists Vi such that |Vi \Vi−1 | ≥ 2 holds. (See also Figure 6.) Since |Ei | ≥ 2
and |Ei \ Ei−1 | = 1 hold, we have Ei ∩ Ei−1 6= ∅ and hence Vi ∩ Vi−1 6= ∅. Then there is at least
one edge e = uv in Ei \ Ei−1 joining a vertex u ∈ Vi \ Vi−1 and v ∈ Vi ∩ Vi−1 , because Ei must form
a connected subgraph. Since |Vi \ Vi−1 | ≥ 2, there is another vertex u′ 6= u in Vi \ Vi−1 , and there
is an edge e′ incident to u′ . Note that e 6= e′ . Furthermore, we know that e′ ∈ Ei \ Ei−1 because
u′ ∈ Vi \ Vi−1 . Therefore, we have e, e′ ∈ Ei \ Ei−1 , which contradicts the fact that |Ei \ Ei−1 | = 1
holds.
10
Vi-1
Vi
v
e
u
e’ u’
Figure 6: Illustration for the proof of Lemma 2.
L
R
G
...
Figure 7: Reduction for the property “a graph is an (i, j)-biclique” for any fixed i ≥ 1.
4.4
Biclique
For the property “a graph is an (i, j)-biclique,” we show that the induced variant under the TJ
rule is PSPACE-complete even if i = j holds, or i is fixed. On the other hand, the spanning variant
under the TJ rule is NP-hard even if i = j holds, while it is polynomial-time solvable when i is
fixed.
We first give the following theorem for a fixed i ≥ 1.
Theorem 12. For the property “a graph is an (i, j)-biclique,” the induced variant of subgraph
reconfiguration under the TJ rule is PSPACE-complete even for any fixed integer i ≥ 1.
Proof. We give a polynomial-time reduction from the maximum independent set reconfiguration problem [13], which can be seen as a subgraph reconfiguration problem. The maximum
independent set reconfiguration problem is the induced variant for the property “a graph
is edgeless” such that two given independent sets are maximum. Note that, because we are given
maximum independent sets, there is no difference between the TJ and TS rules for this problem.
This problem is known to be PSPACE-complete [13].
Suppose that (G, Vs , Vt ) is an instance of maximum independent set reconfiguration.
We now construct a corresponding instance (G′ , Vs′ , Vt′ ) of the induced variant under the TJ rule
for the property “a graph is an (i, j)-biclique,” where i is any fixed positive integer. (See also
Figure 7.) Let L and R be distinct sets of new vertices such that |L| = i and |R| = 1. The vertex
set of G′ is defined as V (G′ ) = V (G) ∪ L ∪ R, and the edge set of G′ as E(G′ ) = E(G) ∪ {uv | u ∈
V (G), v ∈ L} ∪ {vw | v ∈ L, w ∈ R}, that is, new edges are added so that there are edges between
each vertex of L and each vertex of V (G) ∪ R. Let Vs′ = Vs ∪ L ∪ R and Vt′ = Vt ∪ L ∪ R. Since L,
R, Vs and Vt are all independent sets in G′ , both Vs′ and Vt′ form (i, j)-bicliques, where i = |L| and
j = |Vs ∪ R| = |Vt ∪ R|. We have now completed the construction of our corresponding instance,
which can be accomplished in polynomial time.
Because each vertex in L is connected to all vertices in V (G), a vertex subset V ′′ ⊆ V (G′ )
cannot form a bipartite graph (and hence an (i, j)-biclique) if V ′′ ∩ L 6= ∅ or if V ′′ contains two
vertices joined by an edge in G. In addition, we cannot move any token placed on L ∪ R onto a
vertex in V (G) because both Vs and Vt are maximum independent sets of G. Note that, in the case
of i = 1, there may exist a vertex u in V (G) which is adjacent to all vertices in Vs or in Vt . However,
u is not adjacent to the vertex in R, and hence the token placed on the vertex in L cannot be moved
to u in this case, either. Therefore, for any feasible solution V ′ ⊆ V (G′ ) which is reconfigurable
from Vs′ or Vt′ under the TJ rule, the vertex subset V ′ ∩ V (G) forms a maximum independent
set of G. Thus, an instance (G, Vs , Vt ) of maximum independent set reconfiguration is a
11
G
G1
G2
...
...
...
...
B1
...
...
A1
A2
B2
B
A
Figure 8: Reduction for the property “a graph is a (k, k)-biclique.”
yes-instance if and only if our corresponding instance (G′ , Vs′ , Vt′ ) is a yes-instance.
The corresponding instance (G′ , Vs′ , Vt′ ) constructed in the proof of Theorem 12 satisfies i = j
if we set i = |Vs | + 1 = |Vt | + 1. Therefore, we can obtain the following corollary.
Corollary 1. For the property “a graph is an (i, j)-biclique,” the induced variant of subgraph
reconfiguration under the TJ rule is PSPACE-complete even if i = j holds.
We next give the following theorem.
Theorem 13. For the property “a graph is an (i, j)-biclique,” the spanning variant of subgraph
reconfiguration under the TJ rule is NP-hard even if i = j holds.
Proof. We give a polynomial-time reduction from the balanced complete bipartite subgraph
problem, defined as follows [3]. Given a bipartite graph G and a positive integer k, the balanced
complete bipartite subgraph problem is to determine whether or not G contains a (k, k)biclique as a subgraph; this problem is known to be NP-hard [3].
Suppose that (G, k) is an instance of balanced complete bipartite subgraph, where G is
a bipartite graph with bipartition (A, B). Then, we construct a corresponding instance (G′ , Vs , Vt )
of the spanning variant under the TJ rule for the property “a graph is a (k, k)-biclique.” We first
construct a graph G′ . (See Figure 8.) We add to G two new (k, k)-bicliques G1 and G2 ; let (A1 , B1 )
be the bipartition of G1 , and (A2 , B2 ) be that of G2 . We then add edges between any two vertices
x ∈ B1 and y ∈ A, and between any two vertices x ∈ B and y ∈ A2 . Therefore, G′ [B1 ∪ A] and
G′ [B ∪ A2 ] are bicliques in G′ . This completes the construction of G′ . We then set Vs = V (G1 )
and Vt = V (G2 ). Then, Vs and Vt are solutions, since G[Vs ] and G[Vt ] contain (k, k)-bicliques G1
and G2 , respectively. In this way, the corresponding instance can be constructed in polynomial
time.
By the construction of G′ , any reconfiguration sequence between Vs = V (G1 ) and Vt = V (G2 )
must pass through a (k, k)-biclique of G. Therefore, the theorem follows.
We now give a polynomial-time algorithm solving the spanning variant for a fixed constant
i ≥ 1.
Theorem 14. For the property “a graph is an (i, j)-biclique,” the spanning variant of subgraph
reconfiguration under the TJ rule is solvable in polynomial time when i ≥ 1 is a fixed constant.
Proof. We give such an algorithm. We assume without loss of generality that j > i; otherwise both
i and j are fixed constants, and hence such a case can be solved in polynomial time by Theorem 1.
We will refer to the i vertices in the bounded-size part of the biclique as hubs, and the j vertices
in the other part as terminals. Let H ⊆ V (G) be an arbitrary vertex subset such that |H| = i.
We denote by C(H) the set of all common neighbors of H in G. Notice that, if |C(H)| ≥ j, then
the subgraph represented by H ∪ C(H) contains at least one (i, j)-biclique whose hub set is H.
We denote by S(H) the set of all solutions that contain (i, j)-bicliques with the hub set H. We
know that S(H) = ∅ if |C(H)| < j; otherwise H ∪ T is in S(H) for any subset T ⊆ C(H) such
that |T | = j. It should be noted that a solution in the spanning variant is simply a vertex subset
12
V ′ of V (G), and there is no restriction on how to choose a hub set from V ′ . (For example, if a
solution V ′ induces a clique of size five, then there are ten ways to choose a hub set from V ′ for
(2, 3)-bicliques.) Therefore, S(H) ∩ S(H ′ ) 6= ∅ may hold for distinct hub sets H, H ′ .
We describe two key observations in the following. The first one is that for a hub set H, any
two solutions Va , Vb ∈ S(H) are reconfigurable because we can always move vertices in Va \ Vb into
ones in Vb \ Va one by one. The second one is that for any two distinct hub sets Ha and Hb , if
there exist Va ∈ S(Ha ) and Vb ∈ S(Hb ) such that |Va \ Vb | ≤ 1 and |Vb \ Va | ≤ 1 (this means that
Va and Vb are reconfigurable by one reconfiguration step, or Va = Vb ), then all pairs of solutions
in S(Ha ) ∪ S(Hb ) are reconfigurable.
Based on these observations, we construct an auxiliary graph A for a given instance (G, Vs , Vt ),
as follows. Each node in A corresponds to a set H of i vertices (hubs) in the input graph G such
that |C(H)| ≥ j; we represent the node in A simply by the corresponding hub set H. Two nodes
Ha and Hb are adjacent in A if there exist Va ∈ S(Ha ) and Vb ∈ S(Hb ) such that |Va \ Vb | ≤ 1 and
|Vb \ Va | ≤ 1. Let Hs and Ht be any two nodes such that Vs ∈ S(Hs ) and Vt ∈ S(Ht ), respectively.
Then, we claim that there is a reconfiguration sequence between Vs and Vt if and only if there is
a path in A between Hs and Ht .
We first suppose that there is a path P in A between Hs and Ht . We know that any two
consecutive nodes Ha and Hb in P are adjacent in A. Then, as we mentioned above, all pairs of
solutions in S(Ha ) ∪ S(Hb ) are reconfigurable. Since Vs ∈ S(Hs ) and Vt ∈ S(Ht ), we can thus
conclude that there is a reconfiguration sequence between Vs and Vt .
We now suppose that there exists a reconfiguration sequence R between Vs and Vt . For each
solution Va in R except for Vs and Vt , we choose an arbitrary node Ha in A which satisfies
Va ∈ S(Ha ). Consider any two consecutive solutions Va and Vb in R. Then, by the construction of
A, the chosen nodes Ha and Hb are adjacent in A (or sometimes Ha = Hb ) because |Va \ Vb | = 1
and |Vb \ Va | = 1. In this way, we can ensure the existence of a desired path in A.
The running time of the algorithm depends on the size i of a hub set. Let n be the number
of vertices in G. The size of the node set of A is in O(ni ). For any two nodes Ha and Hb in A,
we can determine in O(n) time whether there is an edge between them by checking that all of the
following four conditions hold or not:
(a) |(Ha ∪ C(Ha )) ∩ (Hb ∪ C(Hb ))| ≥ i + j − 1;
(b) |Ha \ (Hb ∪ C(Hb ))| ≤ 1;
(c) |Hb \ (Ha ∪ C(Ha ))| ≤ 1; and
(d) |Ha ∪ Hb | ≤ i + j + 1.
Note that, since we have assumed that i < j, condition (d) is always satisfied. Therefore, we take
O(n2i+1 ) time to construct A and to check whether the nodes corresponding to Vs and Vt are
connected.
4.5
Diameter-two graph
In this subsection, we consider the property “a graph has diameter at most two.” Note that the
induced and spanning variants are the same for this property.
Theorem 15. Both induced and spanning variants of subgraph reconfiguration under the
TS rule are PSPACE-complete for the property “a graph has diameter at most two.”
Proof. Since the induced variant and the spanning variant are the same for this property, it suffices
to show the PSPACE-hardness only for the induced variant. We give a polynomial-time reduction
from the clique reconfiguration problem, which is the induced variant (also the spanning
variant) of subgraph reconfiguration for the property “a graph is a clique.” This problem is
known to be PSPACE-complete under both the TJ and TS rules [7], and we give a reduction from
the problem under the TS rule.
Suppose that (G, Vs , Vt ) is an instance of clique reconfiguration under the TS rule such
that |Vs | = |Vt | ≥ 2; otherwise it is a trivial instance. Then, we construct a corresponding
instance (G′ , Vs′ , Vt′ ) of the induced variant under the TS rule. Let V (G) = {v1 , v2 , . . . , vn }, where
n = |V (G)|. We form G′ by making two copies of G and adding edges between corresponding
13
l2
v2
v1
l1
l4
v4
l6
v6
r5
l5
v5
r4
r3
l3
v3
r2 = rs
r1
(a) G
r6
(b) G’
Figure 9: Reduction for the property “a graph has diameter at most two.” The vertices of Vs in
G and of Vs′ in G′ are depicted by gray vertices, where rs = r2 .
vertices of the two graphs. (See Figure 9.) More formally, the vertex set V (G′ ) is defined as
V (G′ ) = L ∪ R, where L = {li | vi ∈ V (G)} and R = {ri | vi ∈ V (G)}, and the edge set E(G′ ) is
defined as E(G′ ) = El ∪ Er ∪ Ec , where El = {li lj | vi vj ∈ E(G)}, Er = {ri rj | vi vj ∈ E(G)} and
Ec = {li ri | vi ∈ V (G)}. For each i ∈ {1, 2, . . . , n}, we call li and ri corresponding vertices, and
an edge joining corresponding vertices a connecting edge. We then construct Vs′ and Vt′ . We say
that a vertex v ′ in a vertex subset V ′ ⊆ V (G′ ) is exposed in V ′ if the corresponding vertex of v ′
does not belong to V ′ . We construct Vs′ and Vt′ so that they each have exactly one exposed vertex.
Let vs ∈ Vs be an arbitrary vertex in Vs and vt ∈ Vt be an arbitrary vertex in Vt . Then, we let
Vs′ = {li , ri | vi ∈ Vs } \ {rs } and Vt′ = {li , ri | vi ∈ Vt } \ {rt }. Note that ls and lt are the unique
exposed vertices in Vs′ and Vt′ , respectively. Since Vs and Vt form cliques in G, G′ [Vs′ ] and G′ [Vt′ ]
have diameter at most two. We have thus constructed our corresponding instance in polynomial
time.
Let V ′ be any subset of V (G′ ), and let VL′ = V ′ ∩ L and VR′ = V ′ ∩ R. The key observation
is that G[V ′ ] has diameter more than two if both VL′ and VR′ contain exposed vertices in V ′ .
We below prove that (G, Vs , Vt ) of clique reconfiguration is a yes-instance if and only if the
corresponding instance (G′ , Vs′ , Vt′ ) of the induced variant under the TS rule is a yes-instance.
We first prove the only-if direction, supposing that there exists a reconfiguration sequence
hVs = V0 , V1 , . . . , Vℓ = Vt i of cliques in G. Then, we show that Vs′ is reconfigurable into Vt′ by
induction on ℓ. If ℓ = 0 and hence Vs = Vt , then we can obtain Vt′ from Vs′ by exchanging rt in
Vs′ with rs (or Vs′ = Vt′ already holds). We then consider the case where ℓ ≥ 1. Let {vi } = V0 \ V1
and {vj } = V1 \ V0 ; note that vi and vj are adjacent in G since we consider the TS rule. Then, we
consider two vertex subsets V0′′ = (Vs′ ∪ {rs }) \ {ri } and V1′ = (V0′′ ∪ {lj }) \ {li }; note that rs and ri
are adjacent in G′ since rs , ri ∈ V0 = Vs , and that li and lj are adjacent in G′ since vi and vj are
adjacent in G. Notice that V ′′ and V1′ have distinct exposed vertices li and lj , respectively. By the
construction of G′ , since V0 and V1 are cliques in G, both G′ [V0′′ ] and G′ [V1′ ] have diameter at most
two. Then, the sequence hVs′ , V0′′ , V1′ i is a reconfiguration sequence between Vs′ and V1′ . Therefore,
by applying the induction hypothesis to (G′ , V1′ , Vt′ ) and (G, V1 , Vt ), we obtain a reconfiguration
sequence between V1′ and Vt′ . Thus, we can conclude that (G′ , Vs′ , Vt′ ) is a yes-instance.
To prove the if direction, we now suppose that there exists a reconfiguration sequence V ′ =
′
hVs = V0′ , V1′ , . . . , Vℓ′ = Vt′ i. Consider the case where Vi′ ∈ V ′ has the exposed vertex in the side L,
′
say li ∈ Vi′ , and hence ri 6∈ Vi′ ; the other case is symmetric. Because G′ [Vi+1
] must have diameter
′
at most two (and hence it must have only one exposed vertex), we know that Vi+1
is obtained from
Vi′ by one of the following three moves (1) a token on a vertex rk ∈ Vi′ is moved to ri ; (2) the token
on li is moved to its corresponding vertex ri ; or (3) the token on li is moved to a vertex lj ∈ L
which is not in Vi′ and is adjacent to all vertices Vi′ ∩ L. Notice that the other moves increase the
number of exposed vertices or make the resulting graph have diameter more than two. Then, each
Vi′ ∈ V ′ induces a clique of size |Vs | = |Vt | in either L or R, and we can obtain a desired sequence
of cliques between Vs and Vt .
We note that the TS rule is critical in the reduction of Theorem 15. Under the TJ rule, there
is no guarantee that we maintain a clique (and we cannot even guarantee that the resulting clique
gets bigger).
14
5
Conclusions and future work
The work in this paper initiates a systematic study of subgraph reconfiguration. Although
we have identified graph structure properties which are harder for the induced variant than the
spanning variant, it remains to be seen whether this pattern holds in general. For the general case,
questions of the roles of diameter and the number of subgraphs satisfying the property are worthy
of further investigation. Another obvious direction for further research is an investigation into the
fixed-parameter complexity of subgraph reconfiguration.
A natural extension of subgraph reconfiguration is the extension from isomorphism of
graph structure properties to other mappings, such as topological minors.
References
[1] P. Bonsma. The complexity of rerouting shortest paths. Theoretical Computer Science, 510:1–
12, 2013.
[2] P. Bonsma and L. Cereceda. Finding paths between graph colourings: PSPACE-completeness
and superpolynomial distances. Theoretical Computer Science, 410(50):5215–5226, 2009.
[3] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of
NP-Completeness. Freeman, 1979.
[4] R. A. Hearn and E. D. Demaine. PSPACE-completeness of sliding-block puzzles and other
problems through the nondeterministic constraint logic model of computation. Theoretical
Computer Science, 343(1–2):72–96, 2005.
[5] J. van den Heuvel. The complexity of change. Surveys in Combinatorics 2013, 409:127–160,
2013.
[6] T. Ito, E. D. Demaine, N. J. A. Harvey, C. H. Papadimitriou, M. Sideri, R. Uehara, and
Y. Uno. On the complexity of reconfiguration problems. Theoretical Computer Science,
412(12–14):1054–1065, 2011.
[7] T. Ito, H. Ono, and Y. Otachi. Reconfiguration of cliques in a graph. In Proceedings of
the 12th Annual Conference on Theory and Applications of Models of Computation, pages
212–223, 2015.
[8] M. Kamiński, P. Medvedev, and M. Milanič. Complexity of independent set reconfigurability
problems. Theoretical Computer Science, 439:9–15, 2012.
[9] A. E. Mouawad, N. Nishimura, V. Raman, N. Simjour, and A. Suzuki. On the parameterized
complexity of reconfiguration problems. Algorithmica, 78(1):274–297, 2017.
[10] M. Mühlenthaler. Degree-constrained subgraph reconfiguration is in P. In Proceedings of
the 40th International Symposium on Mathematical Foundations of Computer Science, pages
505–516, 2015.
[11] N. Nishimura. Introduction to reconfiguration. Preprints 2017090055, 2017.
[12] K. Wasa, K. Yamanaka, and H. Arimura. The complexity of induced tree reconfiguration
problems. In Proceedings of the 10th International Conference of Language and Automata
Theory and Applications, pages 330–342, 2016.
[13] M. Wrochna. Reconfiguration in bounded bandwidth and tree-depth. Journal of Computer
and System Sciences, 93:1–10, 2018.
15
| 8cs.DS
|
arXiv:1504.06729v4 [cs.DS] 12 Jul 2016
Optimal Principal Component Analysis in Distributed and
Streaming Models
Christos Boutsidis
New York, New York
christos.boutsidis@gmail.com
David P. Woodruff
IBM Research
Almaden, California
dpwoodru@us.ibm.com
Peilin Zhong
Institute for Interdisciplinary Information Sciences
Tsinghua University, Beijing, China
zpl12@mails.tsinghua.edu.cn
Abstract
We study the Principal Component Analysis (PCA) problem in the distributed and streaming
models of computation. Given a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an
accuracy parameter 0 < ε < 1, we want to output an m × k orthonormal matrix U for which
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F ,
where Ak ∈ Rm×n is the best rank-k approximation to A. We show the following.
1. In the arbitrary partition
Psmodel of Kannan et al. (COLT 2014), each of s machines holds
a matrix Ai and A = i=1 Ai . Each machine should output U. Kannan et al. achieve
O(skm/ε) + poly(sk/ε) words (of O(log(nm)) bits) communication. We obtain the improved bound of O(skm) + poly(sk/ε) words, and show an optimal Ω(skm) lower bound
up to low order terms. This resolves an open question for high precision PCA. A poly(ε−1 )
dependence is known to be required, but we separate this dependence from m.
2. We bypass the above lower bound when A is φ-sparse in each column and each server
receives a subset of columns. Here we obtain an O(skφ/ε) + poly(sk/ε) word protocol.
Our communication is independent of the matrix dimensions, and achieves the guarantee
that each server, in addition to outputting U, outputs a subset of O(k/ε) columns of A
containing a U in its span (that is, we solve distributed column subset selection). We show
a matching Ω(skφ/ε) lower bound for distributed column subset selection. Achieving our
communication bound when A is sparse but not sparse in each column, is impossible.
3. In the streaming model in which the columns arrive one at a time, an algorithm of Liberty
(KDD, 2013) with an improved analysis by Ghashami and Phillips (SODA, 2014) shows
O(km/ε) “real numbers” of space is achievable in a single pass, which we first improve to
an O(km/ε)+poly(k/ε) word space upper bound. This almost matches a known Ω(km/ε)
bit lower bound of Woodruff (NIPS, 2014). We show with two passes one can achieve
O(km) + poly(k/ε) words of space and (up to the poly(k/ε) term and the distinction
between words versus bits) this is optimal for any constant number of passes.
4. In turnstile streams, in which we receive entries of A one at a time in an arbitrary order, we show how to obtain a factorization of a (1 + ε)-approximate rank-k matrix using
O((m+n)kε−1 ) words of space. This improves the O((m+nε−2 )kε−2 ) bound of Clarkson
and Woodruff (STOC 2009), and matches their Ω((m + n)kε−1 ) word lower bound.
Notably, our results do not depend on the condition number of A.
1 Introduction
In distributed-memory computing systems, such as, Hadoop [1] or Spark [3], Principal Component Analysis (PCA) and the related Singular Value Decomposition (SVD) of large matrices is
becoming very challenging. Machine learning libraries implemented on top of such systems, for
example mahout [2] or mllib [4], provide distributed PCA implementations since PCA is often
used as a building block for a learning algorithm. PCA is useful for dimension reduction, noise
removal, visualization, etc. In all of these implementations, the bottleneck is the communication;
hence, the focus has been on minimizing the communication cost of the related algorithms, and
not the computational cost, which is the bottleneck in more traditional batch systems.
The data matrix corresponding to the dataset in hand, e.g., a term-document matrix representing a text collection, or the Netflix matrix representing user’s ratings for different movies, could
be distributed in many different ways [46]. In this paper, we focus on the following so-called arbitrary partition and column partition models. In the arbitrary partition
model, a matrix A ∈ Rm×n
Ps
is arbitrarily distributed among s machines. Specifically, A = i=1 Ai where Ai ∈ Rm×n is held
by machine i. Unless otherwise stated, we always assume m ≤ n. In the column partition model,
A
A
.
.
.
A
a matrix A ∈ Rm×n is distributed column-wise among s < n machines:
A
=
;
1
2
s
P
here, for i = 1 : s, Ai is an m × wi column submatrix of A with i wi = n. Note that the column partition model is a special case of the arbitrary partition model. Thus, it is desirable to
prove upper bounds in the arbitrary partition model, and lower bounds in the column partition
model. Both models have been adapted by traditional numerical linear algebra software libraries
for distributed memory matrix computations [12].
A recent body of work [29, 10, 41, 31, 37, 13] (see Section 3 for a comparison) has focused
on designing algorithms which minimize the communication needed for each machine to output an m × k matrix U for which an m × k orthonormal matrix U for which kA − UUT Ak2F ≤
(1 + ε) · kA − Ak k2F , where Ak ∈ Rm×n is the best rank-k approximation to A. Each machine
should output the same matrix U which can then be used for downstream applications, such as
clustering, where one first projects the data to a lower dimensional subspace (see, e.g., [10]). The
protocol should succeed with large constant probability. The model is such that each of the s machines communicates with one machine, called the “coordinator” (which we sometimes refer to as
Server), but does not communicate with other machines. This is known as the coordinator model
and one can simulate arbitrary point-to-point communication with a constant factor overhead in
communication together with an additive O(log(mn)) bit overhead per message (see, e.g., [45]).
1.1 Our Results
The best upper bound in the arbitrary partition model is O((skmε−1 ) + s · poly(kε−1 )) words (of
O(log(mn)) bits) communication [37], while the only known lower bound for these problems is in
the arbitrary partition model and is Ω(skm) [37]. In high precision applications one may want to
set ε to be as small as possible and the leading order term of O(skmε−1 ) is undesirable. A natural
question is whether there is an O((skm) + s · poly(kε−1 )) word protocol. We note that there is a
fairly simple known Ω(ε−2 ) bit lower bound [54] (we present this in Lemma 75 for completeness),
so although one cannot achieve an O(log(1/ε)) dependence in the communication as one would
maybe expect given iterative algorithms for regression with running time O(log(1/ε)) (see section
2.6 of [55] for an overview), an O((skm) + s · poly(kε−1 )) would at least separate the dependence
of ε and m and allowing for much smaller ε with the same amount of communication.
There are many existing protocols using O(skmε−1 ) words of communication [29, 10, 41, 31,
37, 13], and the protocols work in very different ways: that of [29, 10] is based on coresets, while
1
that of [41, 31] is based on adapting a streaming algorithm to the communication setting, while
that of [37] is based on sketching, and that of [13] is based on alternating minimization and is
useful only under some assumptions on the condition number (see Section 3 for a more detailed
discussion of these protocols). It was thus natural to assume there should be a lower bound of
Ω(skmε−1 ).
Instead, we obtain a new upper bound in the arbitrary partition model and a matching lower
bound (up to lower order terms) in the column partition model.
Theorem 1 (Restatement of Theorem 43 and Theorem 82). Suppose matrix A ∈ Rm×n is partitioned
in the arbitrary-partition model (See Definition 14). For any 1 ≥ ε > 0, there is an algorithm which on
termination leaves the same orthonormal matrix U ∈ Rm×k on each machine such that kA − UUT Ak2F ≤
(1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the algorithm runs in
polynomial time with total communication complexity O(skm + s · poly(kε−1 )) words each containing
O(log(smnε−1 )) bits.
If matrix A ∈ Rm×n is distributed in the column-partition model (See Definition 15), then for any
positive constant C ≤ O(poly(skm)), the algorithm which can leave a orthonormal matrix U ∈ Rm×k on
each machine such that kA − UUT Ak2F ≤ C · kA − Ak k2F holds with constant probability has at least
Ω(skm log(skm)) bits of communication.
In some applications even an O(skm) word protocol may be too costly, as m could be very
large. One could hope to do for communication what recent work on input sparsity algorithms
[22, 43, 44, 16, 25] has done for computation, i.e., obtain protocols sensitive to the number of
non-zero entries of A. Many matrices are sparse, e.g., Netflix provides a training data set of
100, 480, 507 ratings that 480, 189 users give to 17, 770 movies. If users correspond to columns
in the matrix, then the average column sparsity is ≈ 200 non-zero elements (out of the 17, 770
possible coordinates).
Our second contribution is the first protocol depending on the number of non-zero entries of
A in the column partition model. Our communication is independent of the matrix dimensions.
Denote by φ the maximum number of non-zero elements of a column in A. When we say that A
is φ-sparse, we mean that every column of A has at most φ non-zero elements and nnz(A) ≤ φ · n.
Our protocol has the additional feature of leaving on each machine the same subset C of O(k/ε)
columns of A for which there exists an m × k orthonormal matrix U in the column span of C for
which kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . This is known as the column subset
selection problem, which is useful since C may be sparse if A is, and also it can lead to better data
intepretability. To partially complement our protocol, we show our protocol is optimal for any
protocol solving the column subset selection problem. We summarize these results as follows.
Theorem 2 (Restatement of Theorem 63). Suppose a φ-sparse matrix A ∈ Rm×n is partitioned in
the column-partition model (See Definition 15). For any 1 ≥ ε > 0, there is an algorithm which on
termination leaves C ∈ Rm×c with c = O(k/ε) columns of A and an orthonormal matrix U on each
machine such that kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large
constant probability. Further,
the algorithm runs in polynomial time with total communication complexity
O skφε−1 + sk2 ε−4 words each containing of O(log(smnε−1 )) bits.
If a φ-sparse matrix A ∈ Rm×n is distributed in the column-partition model (See Definition 15),
then for any positive constant C ≤ O(poly(skφ)), the algorithm which can leave a orthonormal matrix
U ∈ Rm×k on each machine such that kA − UUT Ak2F ≤ C · kA − Ak k2F holds with constant probability
has at least Ω(skφ log(skφ)) bits of communication.
Remark 3. Our protocol has no dependence on condition number and works for arbitrary matrices. We
2
Upper bounds
Lower bounds
Definition 16 (arbitrary partition model)
O(skm + s · poly(k/ε))
(Theorem 43)
Ω(skm) (Theorem 1.2 in [37])
Definition 17 (column partition model)
O(skm + s · poly(k/ε))
(Theorem 43)
Ω(skm) (Theorem 82)
Definition 17 with sparsity φ = o(ε · m)
O(skφε−1 + s · poly(k/ε)) (Theorem 63)
Ω(skφ) (Corollary 83 )
Table 1: Communication upper/lower bounds for the Distributed PCA problems.
make a serious effort as shown in Section 6 to achieve this. Note that even if the entries of A are specified
using O(log(mn)) bits, the condition number can be 2−Ω(mn log(mn)) [7].
Remark 4. We did not discuss the running time of the algorithms, but we are interested in the fastest
possible algorithms with the minimal communication cost, and provide fast algorithms as well.
Remark 5. The hard instance in Section 10.2.2 implies an Ω(skm) lower bound even if the input matrix
is sparse overall but has skm non-zero positions in arbitrarily locations. Therefore, to obtain our bounds we
discuss the sparsity on each column instead of the overall sparsity of the matrix.
A model closely related to the distributed model of computation is the streaming model of
computation. The model we focused on is the so-called turnstile streaming model. In this model,
there is a stream of update operations and each operation indicates that the corresponding entry of
A should be incremented by a specific number. We present novel PCA algorithms in this model.
Our first one-pass algorithm improves upon the best existing streaming PCA algorithm [41, 31]
in two respects. First, the space of [41, 31] is described in “real numbers” while our space bound
(O(mk/ε + poly(k/ε)) - see Theorem 52) is in terms of words (we also bound the word size). This
matches an Ω(km/ε) bit lower bound for one-pass algorithms in [53], up to the distinction between
words versus bits and a low order term poly(k/ε). Second, our algorithm can be applied in the
turnstile streaming model which is stronger than column update streaming model in [41, 31].
Theorem 6 (Restatement of Theorem 52). Suppose A ∈ Rm×n is given by a stream of update operations
in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which
uses a single pass over the stream and on termination outputs an orthonormal matrix U ∈ Rm×k such
that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant
probability. Further,
the algorithm runs in polynomial time with space of total O mk/ε + poly(kε−1 ) words each containing
O(log(smnε−1 )) bits.
A slight modification of the previous algorithm leads to a one-pass algorithm which can compute a factorization of a (1 + ε)-approximate rank-k matrix. The modified algorithm only needs
O((n + m)k/ε + poly(k/ε)) words of space which improves the O((m + nε−2 )kε−2 ) upper bound
in [21] and matches the Ω((n + m)k/ε) bit lower bound given by [21], up to the low order term
poly(k/ε).
Theorem 7 (Restatement of Theorem 53). Suppose A ∈ Rm×n is given by a stream of update operations
in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which uses
a single pass over the stream and on termination outputs a matrix A∗k ∈ Rm×n with rank(A∗k ) ≤ k such
that kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the
algorithm runs in polynomial time with space of total O((m + n)k/ε + poly(kε−1 )) words each containing
O(log(smnε−1 )) bits.
3
Upper bounds
One-pass turnstile, Def. 21
One-pass turnstile, factorization, Def. 22
Two-pass turnstile, Def. 21
O(mkε−1 + poly(k, ε−1 ))
Lower bounds
(Theorem 52)
O((n + m)kε−1 + poly(k, ε−1 )) (Theorem 53)
O(mk + poly(k, ε−1 ))
(Theorem 55)
Ω(mkε−1 ) bits
[53]
Ω((n + m)kε−1 ) words [21]
Ω(mk) bits
[53]
Table 2: Space upper/lower bounds for the Streaming PCA problem.
We also show a two-pass algorithm which is an implementation of our distributed PCA protocol. It uses O((km)+poly(k/ε)) words of space, which up to the poly(k/ε) term and the distinction
between words versus bits, is optimal for any constant number of passes. A “next natural goal”
in [53] was to improve the lower bound of Ω(km) to a bound closer to the 1-pass Ω(km/ε) lower
bound established in that paper; our upper bound shows this is not possible.
Theorem 8 (Restatement of Theorem 55). Suppose A ∈ Rm×n is given by a stream of update operations
in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which uses
two passes over the stream and on termination outputs an orthonormal matrix U ∈ Rm×k such that kA −
UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant
probability. Further, the algorithm
runs in polynomial time with total space O mk + poly(kε−1 ) words each containing O(log(smnε−1 ))
bits.
1.2 Technical Overview
1.2.1
Upper Bounds
The Arbitrary Partition Model. Recall that the inputP
matrix A ∈ Rm×n is arbitrarily partitioned
m×n
into s matrices Ai ∈ R
, i.e., for i = 1, 2, . . . , s: A = si=1 Ai . By sketching on the left and right
2
2
by two small random sign matrices S ∈ RO(k/ε )×m and T ∈ Rn×O(k/ε ) , with O(sk 2 /ε4 ) words of
communication, the server can learn à = SAT which is a “sketch” of A. It suffices to compute
T
the best rank-k approximation Ãk to Ã. Suppose the SVD of Ãk = UÃk ΣÃk VÃ
. Then the server
k
can learn ATVÃk by the second round of communication which needs O(skm) words. We then
prove (see Lemma 28): kA − UUT Ak2F ≤ (1 + ε)kA − Ak k2F where U is an orthonormal basis of the
column space of ATVÃk . Notice that rank(U) ≤ k. Thus U is exactly what we want. Section 5.3
shows the details.
A technical obstacle in the analysis above is that it may require a large number of machine
words to specify the entries of VÃk , even if each entry in A is only a single word. In fact, one can
show (we omit the details) that the singular values of Ãk can be exponentially large in k/ε, which
means one would need to round the entries of VÃk to an additive exponentially small precision,
which would translate to an undesirable sm · poly(k/ε) bits of communication.
To counter this, we use the smoothed analysis of Tao and Vu [52] to argue that if we add small
random Bernoulli noise to A, then its minimum singular value becomes inverse polynomial in
n. Moreover, if the rank of A is at least 2k and under the assumption that the entries of A are
representable with a single machine word (so we can identify them with integers in magnitude
at most poly(nms/ε) by scaling), then we can show the additional noise preserves relative error
approximation. To our knowledge, this is the first application of this smoothing technique to
distributed linear algebra algorithms. Section 6 discusses the details of this approach.
4
On the other hand, if the rank of A is smaller than 2k, the smoothing technique need not preserve relative error. In this case though, we can learn a basis C ∈ Rm×O(k) for the column span
of A by multiplying by a pseudorandom matrix based on Vandermonde matrices. Since C has at
most 2k columns, we can efficiently communicate it to all servers using O(skm) communication.
At this point we set up the optimization problem minrank(X)≤k kCXCT A−AkF . The server cannot
learn CT A and A directly, as this would be Ω(nm) words, but we can choose additional “sketching matrices” Tlef t and Tright to instead solve minrank(X)≤k kTlef t (CXCT A − A)Tright kF , which
is a generalization of the subspace embedding technique to “affine embeddings” [53]. the server
learns Tlef t CXCT ATright and Tlef t ATright , which are small matrices, and can be sent to each machine. Each machine locally solves for the rank-k solution X∗ minimizing kTlef t CXCT ATright −
Tlef t ATright kF . Now each machine can find the same m × k orthonormal basis and output it
without further communication.
Sparse Matrices in the Column Partition Model. Our algorithm for sparse matrices is technically simpler than that in the arbitrary partition model. Section 8.2 presents a distributed PCA
algorithm that has O((φksε−1 ) + poly(sk/ε)) words of communication cost. Our idea in order to
take advantage of the sparsity in the input matrix A is to select and transfer to the coordinator
a small set of “good” columns from each sub-matrix Ai . Specifically, we design an algorithm
that first computes, in a distributed way, a matrix C̃ ∈ Rm×c with c = O(kε−1 ) columns of A, and
then finds U ∈ span(C̃) using a distributed, communication-efficient algorithm developed in [37].
The matrix C̃ is constructed using optimal algorithms for column sampling [17, 26, 24], extended
properly to the distributed case.
As mentioned, our algorithm actually solves the distributed column subset selection problem.
It builds on results for column subset selection in the batch setting [17, 26, 24], but gives a novel
analysis showing that in the distributed setting one can find columns as good as in the batch
setting. To the best of our knowledge, only heuristics for distributed column subset selection were
known [28]. We also optimize the time complexity of our algorithm, see Table 4.
Turnstile streaming model. Our one-pass streaming PCA algorithm starts by generating two
random sign matrices S ∈ RO(k/ε)×n and R ∈ Rm×O(k/ε) . As shown in Lemma 51,
min
kARXSA − Ak2F ≤ (1 + ε) · kA − Ak k2F
rank(X)≤k
T
The intuition of the above is as the following. Suppose the SVD of Ak is UAk ΣAk VA
where
k
Ak is the best rank-k approximation matrix to A. Since X can be chosen as ΣAk VAk , we have
minrank(X)≤k kUAk X − Ak2F = kAk − Ak2F . As shown in [21], S can provide a sketch for the
regression problem. Thus, kUAk X̃ − Ak2F ≤ (1 + ε) · minrank(X)≤k kUAk X − Ak2F where
X̃ = arg
min
rank(X)≤k
kSUAk X − SAk2F
Notice that X̃ is in the row space of span(SA). Then we focus on the regression problem:
min
kXSA − Ak2F .
rank(X)≤k
Similarly, we can use R to sketch the problem. Thus finally we only need to optimize
min
kARXSA − Ak2F .
rank(X)≤k
5
Upper bounds
Definition 18
Definition 19
O(skφε−1 )
Lower bounds
(Theorem 74)
Ω(skφε−1 ) (Theorem 90)
O skφε−1 + s · poly(k/ε) (Theorem 74)
Ω(skφε−1 ) (Corollary 91)
Table 3: Communication upper/lower bounds for the CSSP problems of Definitions 18 and 19.
However, it is too expensive to store the entire matrix A. Thus, we sketch on the left and right
by Tlef t and Tright . Since all of Tlef t AR, SATright and Tlef t ATright can be maintained in small
space, X∗ = arg minrank(X)≤k kTlef t (ARXSA−A)Tright k2F can be constructed after one pass over
the stream. Additionally, if AR is also maintained in the algorithm, we can get U ∈ Rm×k of which
columns are an orthonormal basis of span(ARX∗ ) satisfying kA − UUT Ak2F ≤ (1+ ε)·kA − Ak k2F .
T
,
Furthermore, if SA is also maintained, since it suffices to compute the SVD of X∗ = UX∗ ΣX∗ VX
∗
T
T = Tlef t ARUX∗ and K = VX
SAT
can
be
constructed
in
O((n
+
m)k)
words
of
space.
right
∗
Therefore, the algorithm can compute A∗k = TΣX∗ K = ARX∗ SA in O((n + m)k) words of
space. The algorithm then can output A∗k with total space O((n + m)k/ε + poly(k/ε)) words (see
Theorem 53).
Our two-pass streaming PCA algorithm is just an implemententation of our distributed PCA
algorithm in the streaming model.
1.2.2
Lower Bounds
Table 3 summarizes the matching communication lower bounds that we obtain for distributed
column-based matrix reconstruction. Theorem 90 proves a lower bound for the problem in Definition 18; then, a lower bound for the problem of Definition 19 follows immediately since this is a
harder problem (see Corollalry 91).
Distributed Column Subset Selection. Our most involved lower bound argument is in showing
the tightness for the distributed column subset selection problem, and is given in Theorem 90. To
illustrate the ideas, suppose k = 1. We start with the canonical hard matrix for column subset
selection, namely, an m × m matrix A whose first row is all ones, and remaining rows are a subset
of the identity matrix. Intuitively the best rank-1 approximation is very aligned with the first row
of A. However, given only o(1/ε) columns of the matrix, there is not a vector in the span which
puts a (1 − ε)-fraction of its mass on the first coordinate, so Ω(1/ε) columns are needed. Such a
matrix has φ = 2.
Obtaining a lower bound for general φ involves creating a large net of such instances. Suppose
we set m = φ and consider L̃A, where L̃ is formed by choosing a random φ × φ orthonormal
matrix, and then rounding each entry to the nearest integer multiple of 1/poly(n). We can show
that o(1/ε) columns of L̃A do not span a rank-1 approximation to L̃A. We also need a lemma
which shows that if we take two independently random orthonormal matrices, and round their
entries to integer multiples of 1/poly(n), then these matrices are extremely unlikely to share a
constant fraction of columns. The idea then is that if one server holds L̃A, and every other server
holds the zero matrix, then every server needs to output the same subset of columns of L̃A. By
construction of A, each column of L̃A is the sum of the first column of L̃ and an arbitrary column
of L̃, and since we can assume all servers know the first column of L̃ (which involves a negligible
6
O(sφ) amount of communication), this implies that each server must learn Ω(1/ε) columns of L̃.
The probability that random discretized orthonormal matrices share Ω(1/ε) columns is sufficiently
small that we can choose a large enough net for these columns to identify L̃ in that net, requiring
Ω(φ/ε) bits of communication per server, or Ω(sφ/ε) words in total. The argument for general k
can be viewed as a “direct sum theorem”, giving Ω(skφ/ε) words of communication in total.
Dense Matrices in the Column Partition Model. Our optimal lower bound for dense matrices
is technically simpler. It gives an Ω(skm) word communication lower bound in column partition
model for dense matrices. Theorem 82 argues that there exists an m × n matrix A such that for this
A, any k ≤ 0.99m, and any error parameter C with 1 < C < poly(skm), if there exists a protocol to
construct an m × k matrix U satisfying kA − UUT Ak2F ≤ C · kA − Ak k2F , with constant probability,
then this protocol has communication cost at least Ω(skm) words. This lower bound is proven for
a matrix A that has k fully dense columns. We should note that the lower bound holds even if
each machine only outputs the projection of Ai onto U, i.e., UUT Ai , rather than U itself. Note
that this problem is potentially easier, since given U, a machine could find UUT Ai .
The intuition of the proof is that machine 1 has a random matrix A1 ∈ Rm×k with orthonormal
columns (rounded to integer multiples of 1/poly(n)), while all other machines have a very small
multiple of the identity matrix. When concatenating the columns of these matrices, the best kdimensional subspace to project the columns onto must be very close to A1 in spectral norm.
Since machine i, i > 1, has tiny identity matrices, after projection it obtains a projection matrix
very close to the projection onto the column span of A1 . By choosing a net of m × k orthonormal
matrices, all of which pairwise have high distance in spectral norm, each machine can reconstruct
a random element in this net, which requires lots of information, and hence communication.
Our lower bound of Theorem 82 implies a lower bound of Ω(skφ) words for matrices in which
the column sparsity is φ (see Corollary 83) as a simple corollary.
1.3 Road Map
In the first ten pages, we have one additional section, Section 2, which gives an overview of our
algorithm in the arbitrary partition model.
In the Appendix, we then present more detail on prior results on distributed PCA algorithms
in Section 3. Section 4 introduces the notation and basic results from linear algebra that we use
in our algorithms. Section 5 presents our distributed PCA algorithm for arbitrary matrices for
Definition 16. The communication of the algorithm in this section can be stated only in terms of
“real numbers”. We resolve this issue in Section 6 where a modified algorithm has communication
cost bounded in terms of machine words. Section 7 discusses space-optimal PCA methods in
the streaming model of computation. Section 8 presents a distributed PCA algorithm for sparse
matrices in column partition model, while Section 9 extends this algorithm to a faster distributed
PCA algorithm for sparse matrices. Section 10 presents communication lower bounds.
2 Outline of our result in the arbitrary partition model
Here we give a brief outline of our result in the arbitrary patition model, deferring the full details
to the appendix.
We describe a fast distributed PCA algorithm with total communication O(msk) words plus
low order terms, which is optimal in the arbitrary partition model in the sense that an Ω̃(msk) bit
7
lower bound was given by [37]. The algorithm employs, in a novel way, the notion of projectioncost preserving sketches from [24]. In particular, whereas all previous [48, 23] dimension-reductionbased SVD methods reduce one dimension of the input matrix to compute some approximation to
the SVD, our method reduces both dimensions and computes an approximation to the SVD from a
small almost square matrix (we note that other work, such as work on estimating eigenvalues [8],
uses sketches in both dimensions, but it is not clear how to compute singular vectors using such
sketches). Unlike [37] which reduces only one dimension in the first communication round, we
do the reduction on both dimensions in the same round.
We first present the batch version of the algorithm which offers a new low-rank matrix approximation technique; a specific implementation of this algorithm offers a communication-optimal
distributed PCA algorithm (we also discuss in Section 7 a variant of this algorithm that offers
a two-pass space-optimal PCA method in the turnstile streaming model). Before presenting all
these new algorithms in detail, we present the relevant results from the previous literature that
we employ in the analysis.
2.1 Projection-cost preserving sketching matrices
In this section, we recap a notion of sketching matrices which we call “projection-cost preserving
sketching matrices”. A sketching matrix from this family is a linear matrix transformation and it
has the property that for all projections it preserves, up to some error, the difference between the
matrix in hand and its projection in Frobenius norm.
Definition 9 (Projection-cost preserving sketching matrices). We say that W ∈ Rn×ξ is an (ε, k)projection-cost preserving sketching matrix of A ∈ Rm×n , if for all rank-k orthogonal projection matrices
P ∈ Rm×m , it satisfies
(1 − ε)kA − PAk2F ≤ kAW − PAWk2F + c ≤ (1 + ε)kA − PAk2F
where c is a non-negative constant which only depends on A and W. We also call AW an (ε, k)-projectioncost preserving sketch of A.
Due to the following lemma, we know that a good rank-k approximation projection matrix of
(ε, k)-projection-cost preserving sketch AW also provides a good rank-k approximation to A.
Lemma 10 (PCA via Projection-Cost Preserving Sketches - Lemma 3 in [24]). Suppose W ∈ Rn×ξ is
∗
an (ε, k)-projection-cost preserving sketching matrix of A ∈ Rm×n . Let P̂ = arg minrank(P)≤k kAW −
∗
PAWk2F . For all P̂, ε′ satisfying rank(P̂) ≤ k, ε′ ≥ 0, if kAW− P̂AWk2F ≤ (1+ε′ )kAW− P̂ AWk2F ,
kA − P̂Ak2F ≤
1+ε
· (1 + ε′ )kA − Ak k2F
1−ε
[24] also provides several ways to construct projection-cost preserving sketching matrices. Because we mainly consider the communication, we just choose one which can reduce the dimension
as much as possible. Furthermore, it is also an oblivious projection-cost preserving sketching matrix.
Lemma 11 (Dense Johnson-Lindenstrauss matrix - part of Theorem 12 in [24]). √
For ε < √
1, suppose
n×ξ
each entry of W ∈ R
is chosen O(log(k))-wise independently and uniformly in {1/ ξ, −1/ ξ} where
ξ = O(kε−2 ) [21]. For any A ∈ Rm×n , with probability at least 0.99, W is an (ε, k)-projection-cost
preserving sketching matrix of A.
8
2.2 A batch algorithm for the fast low rank approximation of matrices
In this section, we describe a new method for quickly computing a low-rank approximation to
a given matrix. This method does not offer any specific advantages over previous such techniques [48, 23, 18]; however, this new algorithm can be implemented efficiently in the distributed
setting (see Section 5.3) and in the streaming model of computation (see Section 7); in fact we
are able to obtain communication-optimal and space-optimal results, respectively. For completeness as well as ease of presentation, we first present and analyze the simple batch version of the
algorithm. The algorithm uses the dense Johnson-Lindenstrauss matrix of Lemma 27 in order
to reduce both dimensions of A, before computing some sort of SVD to a poly(k/ε) × poly(k/ε)
matrix (see Step 2 in the algorithm below).
Consider the usual inputs: a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1. The algorithm below returns an orthonormal matrix U ∈ Rm×k such
that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Algorithm
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Construct à = SAT.
T
3. Compute the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Construct X = ATVÃk
5. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
Theorem 29 later in this section analyzes the approximation error and the running time of the
previous algorithm. First, we prove the accuracy of the algorithm.
Lemma 12. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Proof.
T
T
T
kà − Ãk k2F = kà − ÃVÃk VÃ
k2F = kSAT − SATVÃk VÃ
k2F = kTT AT ST − VÃk VÃ
TT AT ST k2F
k
k
k
T
. The second equality is by the
The first equality follows by the SVD of Ãk = UÃk ΣÃk VÃ
k
construction of à = SAT. The third equality is due to ∀M, kMk2F = kM T k2F .
Due to Lemma 27, with probability at least 0.99, ST is an (ε, k)-projection-cost preserving
sketch matrix of TT AT . According to Lemma 26,
T
T
TT AT k2F ≤
k2F = kTT AT − VÃk VÃ
kAT − ATVÃk VÃ
k
k
1+ε
· kAT − (AT)k k2F
1−ε
Observe that
T
T
kUUT AT − ATk2F = kXX† AT − ATk2F ≤ kXVÃ
− ATk2F = kATVÃk VÃ
− ATk2F
k
which is at most
1+ε
1−ε
· kAT − (AT)k k2F .
9
k
(1)
The first equality uses the fact that U is an orthonormal basis of span(X). The first inequality is
followed by ∀X, M, N, kXX† M − Mk2F ≤ kXN − Mk2F . The second equality uses the construction
that X = ATVÃk . The second inequality follows by Eqn (2).
Due to Lemma 27, with probability at least 0.99, T is an (ε, k)-projection-cost preserving sketch
matrix of A. Due to Lemma 26,
kUUT A − Ak2F ≤
(1 + ε)2
· kA − Ak k2F
(1 − ε)2
Due to union bound, the probability that ST is an (ε, k)-projection-cost preserving sketch matrix
of TT AT and T is an (ε, k)-projection-cost preserving sketch matrix of A is at least 0.98. Note that
(1+ε)2
is 1 + O(ε) when ε is small enough, so we can adjust ε here by a constant factor to show the
(1−ε)2
statement.
Next, we present the main theorem.
Theorem 13. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The running time of the algorithm is
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
Proof. The correctness is shown by Lemma 28. The running time is analyzed in Section 5.
2.3 The distributed PCA algorithm
Ps
Recall that the input matrix A ∈ Rm×n is partitioned arbitrarily as: A =
i Ai for i = 1 : s,
Ai ∈ Rm×n . The idea in the algorithm below is to implement the algorithm in Section 5.2 in the
distributed setting.
Input:
1. A ∈ Rm×n arbitrarily partitioned A =
2. rank parameter k < rank(A)
Ps
i
Ai for i = 1 : s, Ai ∈ Rm×n .
3. accuracy parameter ε > 0
Algorithm
1. Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 =
O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27).
P
2. Each machine locally computes Ãi = SAi T and sends Ãi to the server. Server constructs à = i Ãi .
T
3. Server computes the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Server sends VÃk to all machines.
5. Each machine construct Xi = Ai TVÃk and sends Xi to the server. Server constructs X =
6. Server computes an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
P
i
Xi .
7. Server sends U to each machine.
Notice that in the first step, S and T can be described using a random seed that is O(log(k))wise independent due to Lemma 27.
The major remaining challenge here is to obtain small bit complexity, since this protocol could
have very large bit complexity. See Section 5 in the Appendix for the full details of our algorithm.
10
References
[1] http://hadoop.apache.org/.
[2] https://mahout.apache.org.
[3] https://spark.apache.org/.
[4] https://spark.apache.org/mllib/.
[5] D. Achlioptas. Database-friendly random projections: Johnson-lindenstrauss with binary
coins. J. Comput. Syst. Sci., 66(4):671–687, 2003.
[6] N. Ailon and E. Liberty. Fast dimension reduction using rademacher series on dual bch codes.
In ACM-SIAM Symposium on Discrete Algorithms (SODA), 2008.
[7] N. Alon and V. H. Vu. Anti-hadamard matrices, coin weighing, threshold gates, and indecomposable hypergraphs. J. Comb. Theory, Ser. A, 79(1):133–160, 1997.
[8] A. Andoni and H. L. Nguyen. Eigenvalues of a matrix in the streaming model. In Proceedings
of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New
Orleans, Louisiana, USA, January 6-8, 2013, pages 1729–1737, 2013.
[9] Z.-J. Bai, R. H. Chan, and F. T. Luk. Principal component analysis for distributed data sets
with updating. In Advanced Parallel Processing Technologies, pages 471–483. Springer, 2005.
[10] M.-F. Balcan, V. Kanchanapally, Y. Liang, and D. Woodruff. Improved distributed principal
component analysis. arXiv preprint arXiv:1408.5823, to appear in NIPS, 2014.
[11] J. Batson, D. Spielman, and N. Srivastava. Twice-ramanujan sparsifiers. In Proceedings of the
41st annual ACM symposium on Theory of computing, pages 255–262. ACM, 2009.
[12] A. R. Benson, D. F. Gleich, and J. Demmel. Direct qr factorizations for tall-and-skinny matrices
in mapreduce architectures. In Big Data, 2013 IEEE International Conference on, pages 264–272.
IEEE, 2013.
[13] S. Bhojanapalli, P. Jain, and S. Sanghavi. Tighter low-rank approximation via sampling the
leveraged element. http://uts.cc.utexas.edu/˜bsrinadh/main.pdf, to appear in
SODA, 2015.
[14] L. S. Blackford, J. Choi, A. Cleary, E. D’Azevedo, J. Demmel, I. Dhillon, J. Dongarra, S. Hammarling, G. Henry, A. Petitet, et al. ScaLAPACK users’ guide, volume 4. siam, 1997.
[15] Y.-A. L. Borgne, S. Raybaud, and G. Bontempi. Distributed principal component analysis for
wireless sensor networks. Sensors, 2008.
[16] J. Bourgain, S. Dirksen, and J. Nelson. Toward a unified theory of sparse dimensionality
reduction in euclidean space. In Proceedings of the Forty-Seventh Annual ACM on Symposium
on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015, pages 499–508, 2015.
[17] C. Boutsidis, P. Drineas, and M. Magdon-Ismail. Near optimal column based matrix reconstruction. SIAM Journal on Computing (SICOMP), 2013.
11
[18] C. Boutsidis and A. Gittens. Improved matrix algorithms via the subsampled randomized
hadamard transform. SIAM Journal on Matrix Analysis and Applications, 34(3):1301–1340, 2013.
[19] C. Boutsidis and D. P. Woodruff. Optimal cur matrix decompositions. STOC, 2014.
[20] A. Chakrabarti and O. Regev. An optimal lower bound on the communication complexity of
gap-hamming-distance. SIAM Journal on Computing, 41(5):1299–1317, 2012.
[21] K. Clarkson and D. Woodruff. Numerical linear algebra in the streaming model. In Proceedings of the 41st annual ACM symposium on Theory of computing (STOC), 2009.
[22] K. L. Clarkson and D. P. Woodruff. Low rank approximation and regression in input sparsity
time. In In STOC, 2013.
[23] K. L. Clarkson and D. P. Woodruff. Low rank approximation and regression in input sparsity
time. ArxiV report: http://arxiv.org/pdf/1207.6365v4.pdf, 2013.
[24] M. Cohen, S. Elder, C. Musco, C. Musco, and M. Persu. Dimensionality reduction for k-means
clustering and low rank approximation. arXiv preprint arXiv:1410.6801, 2014.
[25] M. B. Cohen. Simpler and tighter analysis of sparse oblivious subspace embeddings. In
SODA, 2016.
[26] A. Deshpande, L. Rademacher, S. Vempala, and G. Wang. Matrix approximation and projective clustering via volume sampling. Theory of Computing, 2(12):225–247, 2006.
[27] A. Deshpande and S. Vempala. Adaptive sampling and fast low-rank matrix approximation.
In RANDOM - APPROX, 2006.
[28] A. K. Farahat, A. Elgohary, A. Ghodsi, and M. S. Kamel. Distributed column subset selection
on mapreduce. In Data Mining (ICDM), 2013 IEEE 13th International Conference on, pages 171–
180. IEEE, 2013.
[29] D. Feldman, M. Schmidt, and C. Sohler. Turning big data into tiny data: Constant-size coresets for k-means, pca and projective clustering. In SODA, pages 1434–1453. SIAM, 2013.
[30] S. Friedland and A. Torokhti. Generalized rank-constrained matrix approximations. SIAM
Journal on Matrix Analysis and Applications, 29(2):656–659, 2007.
[31] M. Ghashami and J. Phillips. Relative errors for deterministic low-rank matrix approximations. In SODA, 2013.
[32] G. H. Golub and C. F. Van Loan. Matrix computations, volume 3. JHU Press, 2012.
[33] M. Gu and S. C. Eisenstat. A divide-and-conquer algorithm for the bidiagonal svd. SIAM
Journal on Matrix Analysis and Applications, 16(1):79–92, 1995.
[34] R. Horn and C. Johnson. Matrix Analysis. Cambridge University Press, New York, 1985.
[35] E. Jessup and D. Sorensen. A parallel algorithm for computing the singular value decomposition of a matrix. Siam Journal on Matrix Analysis and Applications, 15(2):530–548, 1994.
[36] R. Kannan, S. Vempala, and D. P. Woodruff. Nimble algorithms for cloud computing. arXiv
preprint arXiv:1304.3162, v3, 2013.
12
[37] R. Kannan, S. S. Vempala, and D. P. Woodruff. Principal component analysis and higher
correlations for distributed data. In Proceedings of The 27th Conference on Learning Theory,
pages 1040–1057, 2014.
[38] M. Kapralov and K. Talwar. On differentially private low rank approximation. In Proceedings
of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New
Orleans, Louisiana, USA, January 6-8, 2013, pages 1395–1414, 2013.
[39] D. Kempe and F. McSherry. A decentralized algorithm for spectral analysis. In Proceedings of
the thirty-sixth annual ACM symposium on Theory of computing, pages 561–568. ACM, 2004.
[40] Y. Li, H. L. Nguyên, and D. P. Woodruff. On sketching matrix norms and the top singular
vector. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms,
pages 1562–1581. SIAM, 2014.
[41] E. Liberty. Simple and deterministic matrix sketching. In KDD, pages 581–588. ACM, 2013.
[42] S. V. Macua, P. Belanovic, and S. Zazo. Consensus-based distributed principal component
analysis in wireless sensor networks. In Signal Processing Advances in Wireless Communications
(SPAWC), 2010 IEEE Eleventh International Workshop on, pages 1–5. IEEE, 2010.
[43] X. Meng and M. W. Mahoney. Low-distortion subspace embeddings in input-sparsity time
and applications to robust linear regression. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 91–100. ACM, 2013.
[44] J. Nelson and H. L. Nguyên. Osnap: Faster numerical linear algebra algorithms via sparser
subspace embeddings. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual
Symposium on, pages 117–126. IEEE, 2013.
[45] J. M. Phillips, E. Verbin, and Q. Zhang. Lower bounds for number-in-hand multiparty communication complexity, made easy. In Proceedings of the Twenty-Third Annual ACM-SIAM
Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012, pages 486–
501, 2012.
[46] J. Poulson, B. Marker, R. A. van de Geijn, J. R. Hammond, and N. A. Romero. Elemental: A
new framework for distributed memory dense matrix computations. ACM Transactions on
Mathematical Software (TOMS), 39(2):13, 2013.
[47] Y. Qu, G. Ostrouchov, N. Samatova, and A. Geist. Principal component analysis for dimension reduction in massive distributed data sets. In Proceedings of IEEE International Conference
on Data Mining (ICDM), 2002.
[48] T. Sarlos. Improved approximation algorithms for large matrices via random projections. In
IEEE Symposium on Foundations of Computer Science (FOCS), 2006.
[49] K. C. Sou and A. Ranzer. On generalized matrix approximation problem in the spectral norm.
Linear Algebra and its Applications, 436(7):2331–2341, 2012.
[50] F. Tisseur and J. Dongarra. A parallel divide and conquer algorithm for the symmetric eigenvalue problem on distributed memory architectures. SIAM Journal on Scientific Computing,
20(6):2223–2236, 1999.
13
[51] M. D. Vose. A linear algorithm for generating random numbers with a given distribution.
Software Engineering, IEEE Transactions on, 17(9):972–975, 1991.
[52] V. H. Vu and T. Tao. The condition number of a randomly perturbed matrix. In Proceedings
of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June
11-13, 2007, pages 248–255, 2007.
[53] D. Woodruff. Low rank approximation lower bounds in row-update streams. In Advances in
Neural Information Processing Systems, pages 1781–1789, 2014.
[54] D. Woodruff and P. Zhong. Distributed low rank approximation of implicit functions of a
matrix. In manuscript, 2015.
[55] D. P. Woodruff. Sketching as a tool for numerical linear algebra. Foundations and Trends in
Theoretical Computer Science, 10(1-2):1–157, 2014.
14
3 Related Work
Distributed PCA (or distributed SVD) algorithms have been investigated for a long time. One line
of work, developed primarily within the numerical linear algebra literature, studies such algorithms from the perspective of parallelizing existing standard SVD algorithms without sacrificing
accuracy. This approach aims at high accuracy implementations with the least possible communication cost. The distributed models of computation go typically beyond the column-partition
model and arbitrary-partition model that we study in this paper [46]. An extensive survey of this
line of work is out of the scope of our paper; we refer the reader to [35, 50, 33] and references
therein for more details as well as to popular software for distributed SVD such ScaLAPACK [14]
and Elemental [46].
Another line of work for distributed PCA algorithms has emerged within the machine learning
and datamining communities. Such algorithms have been motivated by the need to apply SVD or
PCA to extremely large matrices encoding enormous amounts of data. The algorithms in this line
of research are typically heuristic approaches that work well in practice but come with no rigorous
theoretical analysis. We refer the reader to [47, 42, 9, 15] for more details.
Finally, distributed PCA algorithms in the column-partition model have been recently studied within the theoretical computer science community. Perhaps the more intuitive algorithm
for PCA in this model appeared in [29, 10]: first, a number of left singular vectors and singular
values are computed in each machine; then, the server collects those singular vectors and concatenates them column-wise in a new matrix and then it computes the top k left singular vectors
of this “aggregate” matrix. It is shown in [29, 10] that if the number of singular vectors and singular values in the first step is O(kε−1 ), then, the approximation error in Frobenius norm is at
most (1 + ε) times the optimal Frobenius norm error; the communication cost is O(skmε−1 ) real
numbers because each of the s machines sends O(kε−1 ) singular vectors of dimension m; unfortunately, it is unclear how one can obtain a communication cost in terms of words/bits. A different
algorithm with the same communication cost (only in terms of real numbers since a word/bit
communication bound remained unexplored) is implicit in [41, 31] (see Theorem 3.1 in [31] and
the discussion in Section 2.2 in [41]). Kannan, Vempala and Woodruff proposed arbitrary-partition
model in [37]. They developed
a (1 + ε) Frobenius norm error algorithm with communication cost
−1
2
−4
O skmε + sk ε
words. Bhojanapalli, Jain, and Sanghavi in [13] developed an algorithm
that provides a bound with respect to the spectral norm. Their algorithm is based on sampling
elements from the input matrix, but the communication cost is prohibitive if n is large. The cost
also depends on the condition number of A. Moreover, to implement the algorithm, one needs to
know kA − Ak kF . Finally, [39] discussed a distributed implementation of the “orthogonal iteration” to compute eigenvectors of graphs. The model they consider is different, but perhaps their
protocol could be extended to our model.
4 Preliminaries
Definitions. We formally define the problems and the models here.
Definition 14 (Arbitrary-partition model).
P An m×n matrix A is arbitrarily partitioned into s matrices
Ai ∈ Rm×n , i.e., for i = 1, 2, . . . , s: A = si=1 Ai . There are s machines, and the i-th machine has Ai as
input. There is also another machine, to which we refer to as the “server”, which acts as the central coordinator. The model only allows communication between the machines and the server. The communication
cost of an algorithm in this model is defined as the total number of words transferred between the machines
and the server, where we assume each word is O(log(nms/ε)) bits.
15
Reference
kA − UUT Ak2 ≤
kA − UUT Ak2
F ≤
δ
Communication cost
Implicit in [29]
-
(1 + ε)kA − Ak k2
F
0
-
Theorem 2 in [10]
-
(1 + ε)kA − Ak k2
F
0
-
Theorem 6 in [10]
-
(1 + ε)kA − Ak k2
F
>0
-
Implicit in [41, 31]
-
(1 + ε)kA − Ak k2
F
0
O(mnkε−2 )
Thm 1.1 in [37]*
-
(1 + ε)kA − Ak k2
F
O(1)
Thm 5.1 in [13]
kA − Ak k2 + Γ
-
>0
Remark p. 11 [13]
kA − Ak k2 + Γ
-
>0
Theorem 43*
-
(1 + ε)kA − Ak k2
F
O(1)
-
O skmε−1 + sk2 ε−4
5 −2
O sm + nk ε
∆
O sm + nk3 ε−2 ∆
Theorem 63
-
(1 + ε)kA − Ak k2
F
O(1)
O(skφε−1 + sk2 ε−4 )
Theorem 74
-
(1 + ε)kA − Ak k2
F
O(1)
O(skφε−1 + sk3 ε−5 )
O (mns
· poly(k, 1/ε))
O(skm + sk3 ε−5 )
Total
number of arithmetic operations
O mn min{m, n} + mskε−1 min{m, skε−1 }
O mn min{m, n} + mskε−1 min{m, skε−1 }
2 2
3
log sk
log m
O nnz(A) + s m 4k + k m
6
ε
dε
ε
ε
O(poly(m, n, k, s, ε−1 ))
−2
2
O nnz(A) + δ −1 nk5 ε−2 σ1
(A)σk (A)
−2
2
O nnz(A) + δ −1 nk5 ε−2 σ1
(A)σk (A)
O mnkε−2 + mk2 ε−4 + poly(kε−1 ) .
O nnz(A) · log2 ( ns
) + (m + n) · s · poly( k
log( ns
) .
δ
ε
δ
Table 4:
Distributed PCA Algorithms in the column-partition model with s machines (see Definition 15). ∗ indicates that the
algorithm can also be applied in the arbitrary partition model (see Definition 14). A ∈ Rm×n has rank ρ, U ∈ Rm×k with k < ρ is
orthonormal, 0 < ε < 1, and each column of A contains at most φ ≤ m
non-zero elements. δ is the failure probability. Finally, for
−1 .
notational convenience let Γ := εkA − Ak kF , ∆ := σ12 (A)σk−2 (A) log2 kAk2 kA − Ak k−1
F ε
Definition 15 (Column-partition model). An m × n matrix A is partitioned
arbitrarily
column-wise
P
m×w
i
into s blocks Ai ∈ R
, i.e., for i = 1, 2, . . . , s: A = A1 A2 . . . As . Here, wi = n. There are
s machines, and the i-th machine has Ai as input. There is also another machine, to which we refer to as the
“server”, which acts as the central coordinator. The model only allows communication between the machines
and the server. The communication cost of an algorithm in this model is defined as the total number of words
transferred between the machines and the server, where we assume each word is O(log(nms/ε)) bits.
Definition 16 (The Distributed Principal Component Analysis Problem in arbitrary partition
Psmodel).
m×n
Give an m×n matrix A arbitrarily partitioned into s matrices Ai ∈ R
(i : 1, 2, . . . , s): A = i=1 Ai ,
a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model
of Definition 14 which, upon termination, leaves on each machine a matrix U ∈ Rm×k with k orthonormal
columns such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and the communication cost of the algorithm
is as small as possible.
Definition 17 (The Distributed Principal Component Analysis Problem in column partition model).
Given an m × n matrix A partitioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s):
A = A1 A2 . . . As , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of Definition 15 which, upon termination, leaves on each machine a matrix
U ∈ Rm×k with k orthonormal columns such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and the
communication cost of the algorithm is as small as possible.
Definition 18 (The Distributed Column Subset Selection Problem). Given an m × n matrix A par
titioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s): A = A1 A2 . . . As , a
rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of
Definition 15 that, upon termination, leaves on each machine a matrix C ∈ Rm×c with c < n columns of
A such that kA − CC† Ak2F ≤ (1 + ε) · kA − Ak k2F , and
1. The number of selected columns c is as small as possible.
2. The communication cost of the algorithm is as small as possible.
Definition 19 (The Distributed Column Subset Selection Problem - rank k subspace version).
Given an m × n matrix Apartitioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s):
A = A1 A2 . . . As , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1,
design an algorithm in the model of Definition 15 that, upon termination, leaves on each machine a matrix C ∈ Rm×c with c < n columns of A and a matrix U ∈ Rm×k with k orthonormal columns with
U ∈ span(C), such that kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and
16
1. The number of selected columns c is as small as possible.
2. The communication cost of the algorithm is as small as possible.
Definition 20 (Streaming model for Principal Component Analysis). Let all the entries in A ∈ Rm×n
initially be zeros. In the streaming model of computation, there is a stream of update operations that the
q th operation has form (iq , jq , xq ) which indicates that Aiq ,jq should be incremented by xq where iq ∈
{1, ..., m}, jq ∈ {1, ..., n}, xq ∈ R. An algorithm is allowed a single pass over the stream. At the end of
the stream the algorithm stores some information regarding A which we call a “sketch” of A. The space
complexity of an algorithm in this model is defined as the total number of words required to describe the
information the algorithm stores during the stream including the sketch. Each word is O(log(nms/ε))
bits.
Definition 21 (The Streaming Principal Component Analysis Problem). Given an m × n matrix A,
a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm that, using
as little space as possible, first finds a sketch of A in the streaming model (see Definition 20) and then,
using only this sketch outputs U ∈ Rm×k with k orthonormal columns such that kA − UUT Ak2F ≤
(1 + ε) · kA − Ak k2F .
Definition 22 (The Streaming Principal Component Analysis Problem (factorization)). Given an
m × n matrix A, a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an
algorithm that, using as little space as possible, first finds a sketch of A in the streaming model (see Definition 20) and then, using only this sketch outputs A∗k ∈ Rm×n with rank(A∗k ) ≤ k such that kA−A∗k k2F ≤
(1 + ε) · kA − Ak k2F .
Notation. A, B, . . . are matrices; a, b, . . . are column vectors. In is the n × n identity matrix;
0m×n is the m × n matrix of zeros; 1n is the n × 1 vector of ones; ei is the standard basis (whose
dimensionality will be clear from the context): the ith element of ei is one and the rest are zeros.
A(i) and A(j) denotes the ith column and jth row of A, respectively. Aij is the (i, j)th entry in A.
Sampling Matrices. Let A = [A(1) , . . . , A(n) ] ∈ Rm×n and let C = [A(i1 ) , . . . , A(ic ) ] ∈ Rm×c
consist of c < n columns of A. Note that we can write C = AΩ, where the sampling matrix is
Ω = [ei1 , . . . , eic ] ∈ Rn×c (here ei are the standard basis vectors in Rn ). If D ∈ Rc×c is a diagonal
matrix, then AΩD contains c columns of A rescaled with the corresponding elements in D. We
abbreviate S := ΩD, hence the matrix S ∈ Rn×c “samples” and “rescales” c columns from A.
P
Matrix norms. We use the Frobenius and the spectral matrix-norms: kAk2F = i,j A2ij ; kAk2 =
maxkxk2 =1 kAxk2 . kAkξ is used if a result holds for both norms ξ = 2 and ξ = F. The standard
submultiplicativity property for matrix norms implies that for any A and B: kABkξ ≤ kAkξ ·kBkξ .
The triangle inequality for matrix norms implies that kA + Bkξ ≤ kAkξ + kBkξ . A version of the
triangle inequality for the norms squared is: kA + Bk2ξ ≤ 2 · kAk2ξ + 2 · kBk2ξ . A version of the
matrix pythagorean theorem is: if AT B is the all-zeros matrix, then kA + Bk2F = kAk2F + kBk2F .
If V has orthonormal columns, then kAV T kξ = kAkξ , for any A. If P is a symmetric projection
matrix (i.e., P = PT and P2 = P) then, kPAkξ ≤ kAkξ , for any A.
17
Singular Value Decomposition (SVD) and Moore-Penrose Pseudo-inverse.
Rm×n with rank(A) = ρ is
Σk
VkT
0
A = Uk Uρ−k
,
T
0 Σρ−k
Vρ−k
{z
}
|
|
{z
} | {z }
UA ∈Rm×ρ
ΣA ∈Rρ×ρ
The SVD of A ∈
T
VA
∈Rρ×n
with singular values σ1 ≥ . . . σk ≥ σk+1 ≥ . . . ≥ σρ > 0. Here, k < ρ. We will use σi (A) to denote
the i-th singular value of A when the matrix is not clear from the context. The matrices Uk ∈
Rm×k and Uρ−k ∈ Rm×(ρ−k) contain the left singular vectors of A, and, similarly, the matrices
Vk ∈ Rn×k and Vρ−k ∈ Rn×(ρ−k) contain the right singular vectors of A. It is well-known that
Ak = Uk Σk VkT = AVk VkT = Uk UkT A minimizes kA − Xkξ over P
all matrices X ∈ Rm×n of rank
2
2
2
at most k. Specifically, kA − Ak k2 = σk+1 (A) and kA − Ak kF = ρi=k+1 σi2 (A) (see [32]). A† =
T
n×m denotes the so-called Moore-Penrose pseudo-inverse of A ∈ Rm×n (here Σ−1
VA Σ−1
A
A UA ∈ R
is the inverse of ΣA ). By the SVD of A and A† , for all i = 1, . . . , ρ = rank(A) = rank(A† ):
σi (A† ) = 1/σρ−i+1 (A).
4.1 The best rank k matrix ΠξV,k (A) within a subspace V
Our analysis uses theory involving computing the best rank k approximation of a matrix A within
a given column subspace V. Let A ∈ Rm×n , let k < n be an integer, and let V ∈ Rm×c with
m×n is the best rank k approximation to A in the column span of V.
k < c < n. ΠF
V,k (A) ∈ R
Equivalently, we can write
ΠF
V,k (A) = VXopt ,
where
Xopt =
X∈R
argmin
kA − VXk2F .
:rank(X)≤k
c×n
In order to compute ΠF
V,k (A) given A, V, and k, one can use the following algorithm:
V = YΨ is a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c. This step requires O(mc2 )
arithmetic operations.
2: Ξ = Y T A ∈ Rc×n . This step requires O(mnc) arithmetic operations.
1:
T
Ξk = ∆Σ̃k Ṽk ∈ Rc×n is a rank k SVD of Ξ with ∆ ∈ Rc×k , Σ̃k ∈ Rk×k , and Ṽk ∈ Rn×k . This
step requires O(nc2 ) arithmetic operations.
4: Return Y∆∆T Y T A ∈ Rm×n of rank at most k.
3:
Notice that Y∆∆T Y T A ∈ Rm×n is a rank k matrix that lies in the column span of V. The next
lemma is a simple corollary of Lemma 4.3 in [21].
T
Lemma 23. Given A ∈ Rm×n , V ∈ Rm×c and an integer k, Y∆∆T Y T and QŨk Σ̃k Ṽk satisfy:
T
2
kA − Y∆∆T Y T Ak2F ≤ kA − Y∆Σ̃k Ṽk k2F = kA − ΠF
V,k (A)kF
The above algorithm requires O(mnc + nc2 ) arithmetic operations to construct Y, Ψ, and ∆. We will
denote the above procedure as [Y, Ψ, ∆] = BestColumnSubspaceSV D(A, V, k).
Proof. The equality was proven in Lemma 4.3 in [21]. To prove the inequality, notice that for any
matrix X : kA − Y∆(Y∆)† Ak2F ≤ kA − Y∆Xk2F . Also, (Y∆)† = ∆† Y† = ∆T Y T , because both
matrices are orthonormal.
18
Next, we state a version of the above lemma for the transpose of A, equivalently for the best
rank k approximation within the row space of a given subspace R. Let A ∈ Rm×n , let k < n be an
m×n is the best rank k approximation to A
integer, and let R ∈ Rc×n with k < c < m. ΠF
R,k (A) ∈ R
in the row span of R. Equivalently, we can write
ΠF
R,k (A) = Xopt R,
where
Xopt =
argmin
kA − XRk2F .
X∈Rm×c :rank(X)≤k
In order to compute ΠF
R,k (A) given A, R, and k, one can use the following algorithm:
RT = YZ is a qr decomposition of RT with Y ∈ Rn×c and Z ∈ Rc×c . This step requires O(nc2 )
arithmetic operations.
2: Ξ = AY ∈ Rm×c . This step requires O(mnc) arithmetic operations.
3: Ξk = Ũk Σ̃k ∆T ∈ Rm×c is a rank k SVD of Ξ with Ũk ∈ Rm×k , Σ̃k ∈ Rk×k , and ∆ ∈ Rc×k .
This step requires O(mc2 ) arithmetic operations.
4: Return AY∆∆T Y T ∈ Rm×n of rank at most k.
1:
Notice that AY∆∆T Y T ∈ Rm×n is a rank k matrix that lies in the row span of R. The next lemma
is a corollary of Lemma 23 when applied with A := AT and V := RT .
Lemma 24. Given A ∈ Rm×n , R ∈ Rc×n and an integer k, Y∆∆T Y T and Ũk Σ̃k ∆T satisfy:
2
kA − AY∆∆T Y T k2F ≤ kA − Ũk Σ̃k ∆T Rk2F = kA − ΠF
R,k (A)kF .
The above algorithm requires O(mnc + mc2 ) arithmetic operations to construct Y, Z, and ∆. We will
denote the above procedure as [Y, Z, ∆] = BestRowSubspaceSV D(A, R, k).
5 Distributed PCA in the arbitrary partition model
This section describes a fast distributed PCA algorithm with total communication O(msk) words
plus low order terms, which is optimal in the arbitrary partition model in the sense that an
Ω̃(msk) bits lower bound was given by [37]. The algorithm employs, in a novel way, the notion of
projection-cost preserving sketches from [24]. In particular, whereas all previous [48, 23] dimensionreduction-based SVD methods reduce one dimension of the input matrix to compute some approximation to the SVD, our method reduces both dimensions and computes an approximation to
the SVD from a small almost square matrix. Unlike [37] which reduces only one dimension in the
first communication round, we do the reduction on both dimensions in the same round.
We first present the batch version of the algorithm which offers a new low-rank matrix approximation technique; a specific implementation of this algorithm offers a communication-optimal
distributed PCA algorithm (we also discuss in Section 7 a variant of this algorithm that offers
a two-pass space-optimal PCA method in the turnstile streaming model). Before presenting all
these new algorithms in detail, we present the relevant results from the previous literature that
we employ in the analysis.
19
5.1 Projection-cost preserving sketching matrices
In this section, we recap a notion of sketching matrices which we call “projection-cost preserving
sketching matrices”. A sketching matrix from this family is a linear matrix transformation and it
has the property that for all projections it preserves, up to some error, the difference between the
matrix in hand and its projection in Frobenius norm.
Definition 25 (Projection-cost preserving sketching matrices). We say that W ∈ Rn×ξ is an (ε, k)projection-cost preserving sketching matrix of A ∈ Rm×n , if for all rank-k orthogonal projection matrices
P ∈ Rm×m , it satisfies
(1 − ε)kA − PAk2F ≤ kAW − PAWk2F + c ≤ (1 + ε)kA − PAk2F
where c is a non-negative constant which only depends on A and W. We also call AW an (ε, k)-projectioncost preserving sketch of A.
Due to the following lemma, we know that a good rank-k approximation projection matrix of
(ε, k)-projection-cost preserving sketch AW also provides a good rank-k approximation to A.
Lemma 26 (PCA via Projection-Cost Preserving Sketches - Lemma 3 in [24]). Suppose W ∈ Rn×ξ is
∗
an (ε, k)-projection-cost preserving sketching matrix of A ∈ Rm×n . Let P̂ = arg minrank(P)≤k kAW −
∗
PAWk2F . For all P̂, ε′ satisfying rank(P̂) ≤ k, ε′ ≥ 0, if kAW− P̂AWk2F ≤ (1+ε′ )kAW− P̂ AWk2F ,
kA − P̂Ak2F ≤
1+ε
· (1 + ε′ )kA − Ak k2F
1−ε
[24] also provides several ways to construct projection-cost preserving sketching matrices. Because we mainly consider the communication, we just choose one which can reduce the dimension
as much as possible. Furthermore, it is also an oblivious projection-cost preserving sketching matrix.
Lemma 27 (Dense Johnson-Lindenstrauss matrix - part of Theorem 12 in [24]). √
For ε < √
1, suppose
n×ξ
each entry of W ∈ R
is chosen O(log(k))-wise independently and uniformly in {1/ ξ, −1/ ξ} where
ξ = O(kε−2 ) [21]. For any A ∈ Rm×n , with probability at least 0.99, W is an (ε, k)-projection-cost
preserving sketching matrix of A.
5.2 A batch algorithm for the fast low rank approximation of matrices
In this section, we describe a new method for quickly computing a low-rank approximation to
a given matrix. This method does not offer any specific advantages over previous such techniques [48, 23, 18]; however, this new algorithm can be implemented efficiently in the distributed
setting (see Section 5.3) and in the streaming model of computation (see Section 7); in fact we
are able to obtain communication-optimal and space-optimal results, respectively. For completeness as well as ease of presentation, we first present and analyze the simple batch version of the
algorithm. The algorithm uses the dense Johnson-Lindenstrauss matrix of Lemma 27 in order
to reduce both dimensions of A, before computing some sort of SVD to a poly(k/ε) × poly(k/ε)
matrix (see Step 2 in the algorithm below).
Consider the usual inputs: a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1. The algorithm below returns an orthonormal matrix U ∈ Rm×k such
that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Algorithm
20
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Construct à = SAT.
T
3. Compute the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Construct X = ATVÃk
5. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
Theorem 29 later in this section analyzes the approximation error and the running time of the
previous algorithm. First, we prove the accuracy of the algorithm.
Lemma 28. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Proof.
T
T
T
k2F = kSAT − SATVÃk VÃ
k2F = kTT AT ST − VÃk VÃ
TT AT ST k2F
kà − Ãk k2F = kà − ÃVÃk VÃ
k
k
k
T
The first equality follows by the SVD of Ãk = UÃk ΣÃk VÃ
. The second equality is by the
k
construction of à = SAT. The third equality is due to ∀M, kMk2F = kM T k2F .
Due to Lemma 27, with probability at least 0.99, ST is an (ε, k)-projection-cost preserving
sketch matrix of TT AT . According to Lemma 26,
T
T
kAT − ATVÃk VÃ
k2F = kTT AT − VÃk VÃ
TT AT k2F ≤
k
k
1+ε
· kAT − (AT)k k2F
1−ε
(2)
Observe that
kUUT AT − ATk2F = kXX† AT − ATk2F
T
≤ kXVÃ
− ATk2F
k
T
= kATVÃk VÃ
− ATk2F
k
≤
1+ε
· kAT − (AT)k k2F
1−ε
The first equality uses the fact that U is an orthonormal basis of span(X). The first inequality is
followed by ∀X, M, N, kXX† M − Mk2F ≤ kXN − Mk2F . The second equality uses the construction
that X = ATVÃk . The second inequality follows by Eqn (2).
Due to Lemma 27, with probability at least 0.99, T is an (ε, k)-projection-cost preserving sketch
matrix of A. Due to Lemma 26,
kUUT A − Ak2F ≤
(1 + ε)2
· kA − Ak k2F
(1 − ε)2
Due to union bound, the probability that ST is an (ε, k)-projection-cost preserving sketch matrix
of TT AT and T is an (ε, k)-projection-cost preserving sketch matrix of A is at least 0.98. Note that
(1+ε)2
is 1 + O(ε) when ε is small enough, so we can adjust ε here by a constant factor to show the
(1−ε)2
statement.
Next, we present the main theorem.
21
Theorem 29. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The running time of the algorithm is
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
Proof. The correctness is shown by Lemma 28.
Running time.
Next, we analyze the running time of the algorithm:
1. There are a total of (ξ1 × m + ξ2 × n) entries of S and T. It is enough to generate them in
O((n + m)kε−2 ) operations.
2. We first compute AT with O(mnξ2 ) arithmetic operations. Then, we compute SAT with
O(ξ1 mξ2 ) arithmetic operations.
3. This step requires O(poly(k/ε)) operations since we compute the SVD of a O(poly(k/ε)) ×
O(poly(k/ε)) matrix Ã.
4. We already have AT from the second step. Hence, O(mξ2 k) additional arithmetic operations
suffice to compute ATVÃk
5. O(mk2 ) operations suffice to compute an orthonormal basis for X, e.g., with a QR factorization.
5.3 The distributed PCA algorithm
Ps
Recall that the input matrix A ∈ Rm×n is partitioned arbitrarily as: A =
i Ai for i = 1 : s,
m×n
Ai ∈ R
. The idea in the algorithm below is to implement the algorithm in Section 5.2 in the
distributed setting.
Input:
1. A ∈ Rm×n arbitrarily partitioned A =
2. rank parameter k < rank(A)
Ps
i
Ai for i = 1 : s, Ai ∈ Rm×n .
3. accuracy parameter ε > 0
Algorithm
1. Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 =
O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27).
P
2. Each machine locally computes Ãi = SAi T and sends Ãi to the server. Server constructs à = i Ãi .
T
3. Server computes the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Server sends VÃk to all machines.
5. Each machine construct Xi = Ai TVÃk and sends Xi to the server. Server constructs X =
6. Server computes an orthonormal basis U ∈ R
m×k
7. Server sends U to each machine.
for span(X) (notice that rank(X) ≤ k).
P
i
Xi .
Notice that in the first step, S and T can be described using a random seed that is O(log(k))wise independent due to Lemma 27.
22
5.3.1
Main result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm. Notice that the communication cost of this algorithm
is only given in terms of “real numbers”. The only step where we can not bound the length of
a machine word is when the server communicates VÃk to all machines; and this is because the
entries of VÃk could be unbounded (see the discussion regarding the upper bounds in Section 1.2).
We resolve this issue in the following section.
Theorem 30. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
(3)
The communication cost of the algorithm is
O(msk + s · poly(k/ε))
“real numbers” and the running time is of the order
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
Proof. The matrix U - up to the randomness in the algorithm - is exactly the same matrix as in the
batch algorithm in Section 5.2, hence Theorem 29 proves Eqn. 3.
The algorithm communicates O(msk + s · poly(k/ε)) real numbers in total: O(s · poly(k/ε)) in
steps 2 and 4, and O(smk) in steps 5 and 7.
The operations in the algorithm are effectively the same operations as in the batch algorithm
in Section 5.2, hence the analysis of the running time in Theorem 29 shows the claim.
6 Obtaining bit complexity for the distributed PCA algorithm
For the algorithm in the previous section, we were only able to provide a communication upper
bound in terms of “real numbers”. In this section, we describe how to obtain a communication
upper bound in terms of words for the above protocol, where each word is O(log(mnsk/ε)) bits.
The basic idea is that we have a case analysis depending on the rank of the matrix A. If the
rank of A is less than or equal to 2k, we follow one distributed protocol and if the rank is at
least 2k we follow a different protocol. In Section 6.1, Section 6.2, and Section 6.3 we describe
the algorithm that tests the rank of a distributed matrix, and the two PCA protocols, respectively.
Then, in Section 6.4 we give the details of the overall algorithm and in Section 6.5 we give its
analysis.
6.1 Testing the rank of a distributed matrix
Lemma 31. Given A ∈ Rm×n and a rank parameter k < rank(A), there exists a distributed protocol
in the arbitrary partition model to test if the rank of A is less than or equal to 2k using O(sk2 ) words of
communication and succeeding with probability 1 − δ for an arbitrarily small constant δ > 0.
Proof. This is an immediate implementation of a streaming algorithm due to [21] for testing if an
n × n matrix A has rank at least 2k in the streaming model, using O(k2 ) words of space. In that
algorithm, there is a fixed 6nk/δ × n matrix H whose entries are integers of magnitude at most
poly(n), where δ > 0 is an arbitrarily small constant. The algorithm simply chooses 4k random
23
rows from H. Letting H′ be the 2k × n matrix of the first 2k random rows, and H′′ be the n × 2k
matrix whose columns are the next 2k randomly chosen rows, the algorithm just declares that A
has rank at least k iff the rank of H′ AH′′ is 2k.
The above streaming algorithm can be implemented in the distributed setting by having the
coordinator choose 4k random rows of the fixed, known matrix, and send the row identities to
each of the machines. This only takes O(sk) words of communication. Then machine i computes
H′ Ai H′′ , and returns this to the coordinator. The coordinator can then add these up to compute
H′ AH′′ and compute its rank. The total communication is O(sk 2 ) words and the protocol succeeds
with probability at least 1 − δ for an arbitrarily small constant δ > 0. Note that we can assume our
input matrix A, which is m × n, is a square n × n matrix by padding with all-zeros rows. Those
rows of course, will never get communicated in the implementation described above.
6.2 Distributed PCA protocol when rank(A) ≤ 2k
6.2.1
Subsampled Randomized Hadamard Transform and Affine Embeddings
Our algorithms use the following tool, known as “Subsampled Randomized Hadamard Transform” or SRHT for short, to implement efficiently fast dimension reduction in large matrices.
Definition 32 (Normalized Walsh–Hadamard Matrix). Fix an integer m = 2p , for p = 1, 2, 3, .... The
(non-normalized) m × m matrix of the Walsh–Hadamard transform is defined recursively as,
Hm/2 Hm/2
+1 +1
.
,
with
H2 =
Hn =
+1 −1
Hm/2 −Hm/2
1
The m × m normalized matrix of the Walsh–Hadamard transform is equal to H = m− 2 Hm ∈ Rm×m .
Definition 33 (Subsampled Randomized Hadamard Transform (SRHT) matrix). Fix integers ξ and
m = 2p with ξ < m and p = 1, 2, 3, .... An SRHT matrix is an ξ × m matrix of the form
r
m
T=
· RHD;
ξ
• D ∈ Rm×m is a random diagonal matrix whose entries are independent random signs, i.e. random
variables uniformly distributed on {±1}.
• H ∈ Rm×m is a normalized Walsh–Hadamard matrix (see Definition 32).
• R ∈ Rξ×m is a subset or r rows from the n × n identity matrix, where the rows are chosen uniformly
at random and without replacement.
The next lemma argues that an SRHT matrix is a so-called “affine embedding matrix”. The
SRHT is one of the possible choices of Lemma 32 in [23] that will satisfy the lemma.
Lemma 34 (Affine embeddings - Theorem 39 in [23]). Suppose G and H are matrices with m rows,
and G has rank at most r. Suppose T is a ξ × m SRHT matrix (see Definition 33) with ξ = O(r/ε2 ).
Then, with probability 0.99, for all X simultaneously:
(1 − ε) · kGX − Hk2F ≤ kT(GX − H)k2F ≤ (1 + ε) · kGX − Hk2F .
Finally, we note that matrix-vector multiplications with SRHT’s are fast.
Lemma 35 (Fast Matrix-Vector Multiplication, Theorem 2.1 in [6]). Given x ∈ Rm and ξ < m, one
can construct T ∈ Rξ×m and compute Tx in at most 2m log2 (ξ + 1)) operations.
24
6.2.2
Generalized rank-constrained matrix approximations
Let M ∈ Rm×n , N ∈ Rm×c , L ∈ Rr×n , and k ≤ c, r be an integer. Consider the following optimization problem,
Xopt ∈
argmin
kM − NXLk2F .
X∈Rc×r ,rank(X)≤k
Then, the solution Xopt ∈ Rc×r with rank(Xopt ) ≤ k that has the minimum kXopt kF out of all
possible feasible solutions is given via the following formula,
T
T
L† .
MVL VL
Xopt = N† UN UN
k
T
T
T
T
MVL VL
∈
UN UN
MVL VL k ∈ Rm×n of rank at most k denotes the best rank k matrix to UN UN
m×n
R
. This result was proven in [30] (see also [49] for the spectral norm version of the problem).
6.2.3
The PCA protocol
Lemma 36. Suppose the rank ρ of A ∈ Rm×n satisfies ρ ≤ 2k, for some rank parameter k. Then, there is a
protocol for the Distributed Principal Component Analysis Problem in the arbitrary partition model using
O(smk + sk 2 /ε2 ) words of communication and succeeding with probability 1 − δ for an arbitrarily small
constant δ > 0.
Proof. The n×2k matrix H′′ chosen in the protocol of Lemma 31 satisfies that with probability 1−δ,
for an arbitrarily small constant δ > 0, the rank of AH′′ is equal to the rank of A if ρ < 2k. Indeed,
if this were not true, the algorithm could not be correct, as the rank of H′ AH′′ is at most the rank
of AH′′ (and the same algorithm can be used for any ρ < 2k). It follows that with probability 1 − δ,
the column span of AH′′ is equal to the column span of A. Hence, as in the protocol of Lemma
31, the coordinator learns the column space of A, which can be described with O(km) words. The
coordinator thus communicates this to all machines, using O(skm) total words of communication,
assuming the entries of A are integers of magnitude at most poly(mns/ε).
Let C = AH′′ , which is m × 2k. We can set up the optimization problem:
min
kCXCT A − AkF .
rank(X)≤k
(4)
Because the size of C is only m × 2k, every machine can know C by sending a total of O(smk)
words. Since the rank of C and A are small, we can sketch on the left and right using affine
embeddings Tlef t and Tright . Then machine i sends CT Ai Tright to the coordinator, together with
Tlef t Ai Tright . The coordinator computes CT ATright and Tlef t ATright by adding up the sketches,
and sends these back to all the machines. Each machine can then solve the optimization problem
min
kTlef t CXCT ATright − Tlef t ATright kF ,
rank(X)≤k
(5)
each obtaining the same X∗ which is the optimal solution to Eqn (5). Due to Lemma 34, X∗ is a
(1 + O(ε))-approximation to the best solution to Eqn (4). Finally, every machine outputs the same
orthonormal basis U ∈ Rm×k for CX∗ .
We can construct affine embedding matrices Tlef t ∈ Rξ1 ×m and Tright ∈ Rn×ξ2 with ξ1 =
O(k/ε2 ), ξ2 = O(k/ε2 ) (see Definition 33). The total communication of this protocol is O(skm +
sk 2 /ε2 ) words and the success probability can be made 1−δ for an arbitrarily small constant δ > 0.
25
6.3 Distributed PCA protocol when rank(A) > 2k
The idea here is more involved than in the previous subsection and in order to describe the algorithm we need several intermediate results.
6.3.1
Lower bounds on singular values of matrices with integers entries
The first lemma gives a lower bound on the singular values of a matrix with integer entries with
bounded magnitude.
Lemma 37. (Lemma 4.1 of [21], restated) If an m × n matrix A has integer entries bounded in magnitude
by γ, and has rank ρ = rank(A), then the k-th largest singular value A satisfies
σk ≥ (mnγ 2 )−k/(2(ρ−k)) .
Proof. In the proof of Lemma 4.1 of [21], equation (10), it is shown that if λk is the k-th largest
eigenvalue of AT A, then
λk ≥ (mnγ 2 )−k/(ρ−k) .
This implies the k-th singular value σk of A satisfies σk ≥ (mnγ 2 )−k/(2(ρ−k)) .
Next, we state two immediate corollaries of this lemma for future reference.
Corollary 38. If an m × n matrix A has integer entries bounded in magnitude by poly(mns/ε) and
kA − Ak kF > 0, then
kA − Ak kF > (mns/ε)−O(k) .
Proof. Since kA − Ak kF > 0, the rank ρ of A is at least k + 1, so by the preceding lemma,
kA − Ak kF ≥ σk+1 ≥ (poly(mns/ε))−k/2 ,
as desired.
Corollary 39. If an m × n matrix A has integer entries bounded in magnitude by poly(mns/ε) and
rank(A) ≥ 2k, then
kA − Ak kF > 1/poly(mns/ε).
Proof. This follows by plugging ρ = 2k into Lemma 37.
6.3.2
Lower bounds on singular values of integer-perturbed matrices
In this section, we describe a perturbation technique for matrices and provide lower bounds for
the smallest singular value of the perturbed matrix. We start with a theorem of Tao and Vu.
Theorem 40. (Theorem 2.5 of [52]) Let M be an n×n matrix with integer entries bounded in magnitude by
nC for a constant C > 0. Let Nn be a matrix with independent entries each chosen to be 1 with probability
1/2, and −1 with probability 1/2. Then, there is a constant B > 0 depending on C, for which
Pr[k(M + Nn )−1 k2 ≥ nB ] ≤ 1/n.
In words, the result indicates that the spectral norm of the inverse of the perturbed matrix is
bounded from below with high probability. We now describe a simple corollary of this result.
26
Corollary 41. Let M be an n × n matrix with integer entries bounded in magnitude by nC for a constant
C > 0. Let Nn be a matrix with independent entries each chosen to be 1/nD with probability 1/2, and
−1/nD with probability 1/2, where D > 0 is a constant. Then, there is a constant B > 0 depending on C
and D for which
Pr[k(M + Nn )−1 k2 ≥ nB ] ≤ 1/n.
Proof. This follows by Theorem 40 after replacing the constat C in that theorem with C + D, and
scaling by nD .
We need to generalize Corollary 41 to rectangular matrices since we will eventually apply this
perturbation technique to the matrix A to which we would like to compute a distributed PCA.
Lemma 42. Let M be an m × n matrix with integer entries bounded in magnitude by nC for a constant
C > 0, and suppose m ≤ n. Let Nm,n be a matrix with independent entries each chosen to be 1/nD with
probability 1/2 and −1/nD with probability 1/2, where D > 0 is a constant. Then, there is a constant
B > 0 depending on C and D for which
Pr[σm (M + Nm,n ) < 1/nB ] ≤ 1/n,
where σm (M + Nm,n ) denotes the smallest singular value of M + Nm,n .
Proof. Suppose we were to pad M with n − m zero rows, obtaining a square matrix M. Now
consider the n × n matrix Nn,n with independent entries each chosen to be 1/nD with probability
1/2 and −1/nD with probability 1/2. By Corollary 41, all singular values of M + Nn,n are at least
1/nB . Now consider a unit vector x ∈ Rn which is zero on all but its top m coordinates. Let
y ∈ Rm be the unit vector which agrees with x on its top m coordinates. Then,
1/nB ≤ kx(M + Nn,n )k2
= ky(M + Nm,n )k2 ,
where the inequality uses the lower bound on the singular values of M + Nn,n , which occurs with
probability at least 1 − 1/n, and the equality follows by definition of the matrices and vectors we
have defined. As y ∈ Rm can be chosen to be an arbitrary unit vector, it follows that σm (M +
Nm,n ) ≥ 1/nB , which completes the proof.
6.4 Description of algorithm
Using the above results, we are now ready to describe a distributed PCA algorithm whose communication cost can be bounded in terms of machine words and not just in terms of “real numbers”.
As in the algorithm in Section 5.3, we denote with Bi ∈ Rm×n the matrix that B1 arises from A1
after applying the Bernoulli perturbation technique
P discussed above in Lemma 42 and ∀i > 1, Bi
is equal to Ai . Using this notation, we have B := i Bi ∈ Rm×n . Notice that B exactly arises from
A after applying the such Bernoulli perturbation technique.
Input:
1. A ∈ Rm×n arbitrarily partitioned A =
2. rank parameter k < rank(A)
Ps
i
Ai for i = 1 : s, Ai ∈ Rm×n .
3. accuracy parameter ε > 0
Algorithm
27
1. Use the protocol of Lemma 31 with δ = 0.01 to test if the rank of A is less than 2k.
2. If rank(A) ≤ 2k, use the protocol of Lemma 36 to find some orthonormal U ∈ Rm×k .
3. If rank(A) > 2k,
(a) machine 1 locally and independently adds 1/nD with probability 1/2, and −1/nD with probability 1/2, to each of the entries of A1 , where D is the constant of Lemma 42. Note that this
effectively adds the matrix Nm,n of Lemma 42 to the entire matrix A. For notational convenience let B = A + Nm,n , B1 ∈ Rm×n be the local perturbed matrix of machine 1 and ∀i > 1,
Bi is just equal to Ai .
(b) Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with
ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27).
(c) Each machine locally computes B̃i = SBi T and sends B̃i to the server. Server constructs B̃ =
P
i B̃i .
T
(d) Server computes the SVD of B̃k = UB̃k ΣB̃k VB̃
(UB̃k ∈ Rξ1 ×k , ΣB̃k ∈ Rk×k , VB̃k ∈ Rξ2 ×k ).
k
(e) Now server rounds each of the entries in VB̃k to the nearest integer multiple of 1/nγ for a
sufficiently large constant γ > 0. Let the matrix after the rounding be V̂B̃k
(f) Server sends V̂B̃k to all machines.
(g) Each machine construct X̂i = Bi TV̂B̃k and sends X̂i to the server. Server constructs X̂ =
P
i X̂i .
(h) Server computes an orthonormal basis U ∈ Rm×k for span(X̂) (notice that rank(X̂) ≤ k), e.g.
with a QR factorization.
(i) Server sends U to each machine.
6.5 Main result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm. Notice that the communication cost of this algorithm is
given in terms of machine words.
Theorem 43. The matrix U ∈ Rm×k with k orthonormal columns satisfies with arbitrarily large constant
probability:
(6)
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The communication cost of the algorithm
is O(msk + s · poly(k/ε)) words and the running time is
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
6.6 Proof of Theorem 43
Proof of Eqn. 6 If rank(A) ≤ 2k, then Lemma 36 shows the claim. If rank(A) > 2k, then the
situation is more involved and we prove the approximation bound in the following subsection.
Communication Complexity Step 1 requires O(sk 2 ) words (Lemma 31). Step 2 requires O(smk+
sk 2 /ε2 ) words (Lemma 36). Step 3 requires O(msk + s · poly(k/ε)) words and this follows from the
analysis in Theorem 30. The only difference with Theorem 30 is that now all matrices communicated in the algorithm have real numbers which can be represented efficiently with one machine
word of at most O(log(mns/ε)) bits. To see this, note that each entry of V̂B̃k is bounded in magnitude by nO(B+C)/γ . Therefore, the entries of V̂B̃k and the entries of Xi = Bi TV̂B̃k can each be
described using O(log n) bits, i.e., a constant number of machine words.
28
Running time The operations in the third step in algorithm are effectively the same operations
as in the batch algorithm in Section 5.2 (plus some extra operations whose running time is not
asymptotically larger), hence the analysis of the running time in Theorem 29 shows the claim (the
number of operations in the first two steps of the algorithm is asymptotically less than the number
of operations in the third step).
6.7 Proof of Eqn. 6 if rank(A) > 2k
ξ×p be a matrix of which
Lemma 44 (Result in [21]). Suppose M ∈ Rp×q . For ε > 0, let√P ∈ R√
entries are O(q)-wise independently and uniformly chosen from {−1/ ξ, +1/ ξ} where ξ = O(q/ε2 ).
With arbitrarily large constant probability, P is an ε-subspace embedding matrix of column space of M.
Specifically, ∀x, it has
(1 − ε)kMxk2 ≤ kPMxk2 ≤ (1 + ε)kMxk2
Lemma 45 (Lemma C.2 in [40]). Suppose P is an ε-subspace embedding matrix of column space of
M ∈ Rp×q (q ≤ p). With arbitrarily large constant probability, ∀1 ≤ i ≤ q
(1 − ε)σi (PM) ≤ σi (M) ≤ (1 + ε)σi (PM)
where σi means the ith singular value.
It is suffice to show the following:
Lemma 46. With arbitrarily large constant probability, k(BTVB̃k )† k2 ≤ 8nB
Proof. Notice that BTVB̃k is an m × k matrix. With high probability, S is a ε-subspace embedding
matrix of column space of BTVB̃k due to Lemma 44. According to Lemma 45, σmin (BTVB̃k ) ≥
(1 − ε)σmin (SBTVB̃k ) where σmin means the minimum singular value. Without loss of generality, we assume ε < 1/2. Then σmin (BTVB̃k ) ≥ 12 σmin (SBTVB̃k ). Because VB̃k are the top
k right singular vectors of SBT, σmin (SBTVB̃k ) ≥ σmin (SBT). Applying Lemma 44 again,
TT is a constant error subspace embedding matrix of column space of BT ST . Combining with
Lemma 45, we can make σmin (SBT) ≥ 21 σmin (SB). Notice that Lemma 44 also implies that
q
ξ1 T
ξ1 which means ∀x ∈ Rξ1 , we can
m S is a constant error subspace embedding matrix of R
q
q
make kx ξm1 Sk2 > 12 kxk2 . Thus, ∀x ∈ Rξ1 , kx ξm1 SBk2 > 12 σmin (B)kxk2 . Due to Lemma 42,
q
q
σmin (B) > 1/nB which implies σmin (SB) > 12 · ξm1 σmin (B) > 12 ξm1 n1B > 12 n1B . To conclude
k(BTVB̃k )† k2 ≤ 1/σmin (BTVB̃k ) ≤ 8nB .
Let E = VB̃k − V̂B̃k , we have
kA − UUT AkF = kB − Nm,n − UUT (B − Nm,n )kF
≤ kB − UUT BkF + kNm,n kF
†
= kB − (BTV̂B̃k )(BTV̂B̃k ) BkF + kNm,n kF
≤ kB − (BT(VB̃k + E))(BTVB̃k )† BkF + kNm,n kF
≤ kB − (BTVB̃k )(BTVB̃k )† BkF + kBTE(BTVB̃k )† BkF + kNm,n kF
≤ (1 + O(ε))kB − Bk kF + kBTE(BTVB̃k )† BkF
≤ (1 + O(ε))kB − Bk kF
29
The first equality follows by using the relation B = A + Nm,n . The first inequality uses the triangle inequality for the Frobenius norm and the fact that I − UUT is a projector matrix and can
be dropped without increasing the Frobenius norm. The second equality uses the fact that both
†
UUT and (BTV̂B̃k )(BTV̂B̃k ) are the same projector matrices. The second inequality follows by
∀M, C, X, kM − CC† MkF ≤ kM − CXkF and the relation E = VB̃k − V̂B̃k . The third inequality
uses the triangle inequality. The fourth inequality uses that kB − Bk kF ≥ 1/poly(mns/ε) (follows
from Lemma 42) while kNm,n kF can be made 1/nt for an arbitrarily large integer t, and the fact
that kB − (BTVB̃k )(BTVB̃k )† BkF ≤ (1 + O(ε))kB − Bk kF (implied by replacing all A with B in
Lemma 28). The last inequality uses the fact kBTE(BTVB̃k )† BkF ≤ kBkF kTkF kEkF k(BTVB̃k )† kF kBkF
where kBkF , kTkF , k(BTVB̃k )† kF are poly(nms/ε) (Lemma 46 implies the bound of k(BTVB̃k )† kF )
and we can make |E|F be 1/np for an arbitrarily large p, and kB − Bk kF ≥ 1/poly(mns/ε).
Overall, after rescaling ε, we have
kA − UUT AkF ≤ (1 + ε)kB − Bk kF .
(7)
Finally, we need to relate kB − Bk kF to kA − Ak kF , which we do in the following lemma.
Lemma 47. Let A ∈ Rm×n be any matrix, Nm,n be the random matrix of Lemma 42, and B = A + Nm,n .
Let k < rank(A), ε > 0. Then, for arbitrarily large constant probability,
kB − Bk kF ≤ (1 + ε)kA − Ak kF .
Proof. Since B = A + Nm,n , the proof idea is to relate the singular values of B to the singular
values of A using Weyl’s inequality. Specifically, for i : 1 : m (recall we assume m ≤ n) we have
|σi (B) − σi (A)| ≤ kNm,n k2 ≤ 1/nD .
Rearranging terms in this inequality, and taking squares of the resulting relation we obtain (for
i = 1 : m),
2
σi2 (B) ≤ σi (A) + 1/nD .
(8)
We manipulate the term kB − Bk kF as follows:
v
u X
u m
σi2 (B)
kB − Bk kF = t
i=k+1
v
u X
u m
(σi (A) + 1/nD )2
≤ t
i=k+1
v
u X
u m
= t
σi2 (A) + 1/n2D + 2σi (A)/nD
i=k+1
v
u X
q
q
u m
2
2D
t
σi (A) + 1/n + 2σi (A)/nD
≤
i=k+1
≤ kA − Ak kF + ε · kA − Ak kF + ε · kA − Ak kF
≤ (1 + 2ε)kA − Ak kF .
30
The first inequality uses Eqn. (8). In the third inequality, we used
q
1/n2D ≤ εkA − Ak kF ,
which follows from Corollary 39 for a sufficiently large constant D. Also, we used
q
q
q
2σi (A)/nD ≤ 2σ1 (A)/nD ≤ poly(nms/ε)/nD ≤ εkA − Ak kF ,
where the second inequality follows because kAk2 ≤ poly(nms/ε) and the last inequality uses
again Corollary 39 for a sufficiently large constant D.
Completing the proof. Using Lemma 47 in Eqn (7), taking squares in the resulting inequality,
and rescaling ε concludes the proof.
7 Streaming Principal Component Analysis
In this section, we are interested in computing a PCA of a matrix in turnstile streaming model.
Specifically, there is a stream of update operations that the q th operation has form (iq , jq , xq ) which
indicates that the (iq , jq )th entry of A ∈ Rm×n should be incremented by xq where iq ∈ {1, ..., m}, jq ∈
{1, ..., n}, xq ∈ R. Initially, A is zero. In the streaming setting of computation, we are allowed only
one pass over the update operations, i.e., the algorithm “sees” each update operation one by one
and only once. Upon termination, the algorithm should return a matrix U with k orthonormal
columns which is a “good” basis for span(A) . In Section 7.1.1 below, we describe an algorithm
which gives a space-optimal streaming algorithm. Further more, we provide a variation of this
algorithm in Section 7.1.2 which can output A∗k satisfying kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F . It
meets the space lower bound shown in [21]. In Section 7.2, we relax the problem and we describe
a two-pass streaming algorithm which is a version of the algorithm of Section 5.2; unfortunately,
the space complexity of this algorithm can be bounded only in terms of “real numbers”. We fix
this in Section 7.3 where we describe an optimal two-pass streaming algorithm.
Inputs to the algorithms in Section 7.1, Section 7.2 and Section 7.3 are a stream of update
operations (i1 , j1 , x1 ), (i2 , j2 , x2 ), ..., (il , jl , xl ), a rank parameter k < rank(A), and an accuracy
parameter 0 < ε < 1.
7.1 One-pass streaming PCA
7.1.1
The algorithm which outputs U
In the following algorithm, the output should be U with orthogonal unit columns and satisfying
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F
Our algorithm uses the following property of random sign matrices:
Lemma 48 (Sketch for regression - Theorem 3.1 in [21]). Suppose both of A and B have m rows and
rank(A) ≤ k. Further more, if each entry of S ∈ Rξ×m is O(k)-wise independently chosen from {−1, +1}
where ξ = O(k/ε) and
X̃ = arg min kSAX − SBk2F
X
, with probability at least 0.99,
kAX̃ − Bk2F ≤ (1 + ε) · min kAX − Bk2F
X
31
Algorithm
1. Construct random sign sketching matrices S ∈ Rξ1 ×m with ξ1 = O(kε−1 ) and R ∈ Rn×ξ2 with
ξ2 = O(kε−1 ) (see Lemma 48)
2. Construct affine embedding matrices Tlef t ∈ Rξ3 ×m and Tright ∈ Rn×ξ4 with ξ3 = O(kε−3 ), ξ4 =
O(k/ε−3 ) (see Definition 33).
3. Initialize all-zeros matrices: M ∈ Rξ3 ×ξ4 , L ∈ Rξ1 ×ξ4 , N ∈ Rξ3 ×ξ2 , D ∈ Rm×ξ2 . We will maintain
M, L, N, D such that M = Tlef t ATright , L = SATright , N = Tlef t AR and D = AR.
4. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (one pass over the stream of update operations)
(a) For all i = 1, ..., ξ3 , j = 1, ..., ξ4 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j .
(b) For all i = 1, ..., ξ1 , j = 1, ..., ξ4 , let Li,j = Li,j + Si,iq · xq · (Tright )jq ,j .
(c) For all i = 1, ..., ξ3 , j = 1, ..., ξ2 , let Ni,j = Ni,j + (Tlef t )i,iq · xq · Rjq ,j .
(d) For all j = 1, ..., ξ2 , let Diq ,j = Miq ,j + xq · Rjq ,j
5. end
6. Construct X∗ = argmin kN·X·L−Mk2F . (Notice that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .)
rank(X)≤k
rank(X)≤k
T
(UX∗ ∈ Rξ×k , ΣX∗ ∈ Rk×k VX∗ ∈ Rξ×k ); then, compute
7. Compute the SVD of X∗ = UX∗ ΣX∗ VX
∗
T = DUX∗ .
8. Compute an orthonormal basis U ∈ Rm×k for span(T).
Theorem 52 later in this section analyzes the approximation error, the space complexity, and
the running time of the previous algorithm. First, we prove a few intermediate results.
Lemma 49. For all matrices X ∈ Rξ2 ×ξ1 and with probability at least 0.98:
(1 − ε)2 kARXSA − Ak2F ≤ kTlef t (ARXSA − A) Tright k2F ≤ (1 + ε)2 kARXSA − Ak2F
Proof. Notice that rank(AR) ≤ ξ2 = O(kε−1 ). Then from Lemma 34 (G := AR and H := A),
with probability at least 0.99 for all Y ∈ Rξ2 ×n :
(1 − ε)kARY − Ak2F ≤ kTlef t (ARY − A)k2F ≤ (1 + ε)kARY − Ak2F
Replacing Y = XSA, for an arbitrary X ∈ Rξ2 ×ξ1 , we obtain that with probability at least 0.99 and
for all X ∈ Rξ2 ×ξ1 simultaneously:
(1 − ε)kARXSA − Ak2F ≤ kTlef t (ARXSA − A) k2F ≤ (1 + ε)kARXSA − Ak2F
Now notice that rank(SA) ≤ ξ1 = O(kε−1 ). Then from Lemma 34 (G := AT ST and H :=
T
m×ξ2 :
AT Tlef
t ), with probability at least 0.99 for all Z ∈ R
T
2
T
T T T
T T
2
T T T
T T
2
(1 − ε)kA T ST ZT − AT Tlef
t kF ≤ kTright (A S Z − A Tlef t )kF ≤ (1 + ε)kA S Z − A Tlef t kF
T
ξ2 ×ξ1 , we obtain that with probability at least
Replacing Z = XT RT AT Tlef
t for an arbitrary X ∈ R
0.99 and for all X simultaneously:
(1 − ε)2 k(ARXSA − A)T k2F ≤ k(Tlef t (ARXSA − A) Tright )T k2F ≤ (1 + ε)2 k(ARXSA − A)T k2F
32
Lemma 50. Let Xopt = arg minrank(X)≤k kARXSA−Ak2F with Xopt ∈ Rξ2 ×ξ1 . Then, with probability
at least 0.98
(1 + ε)2
min
kTlef t (ARXSA − A) Tright k2F ≤ kARX∗ SA − Ak2F ≤
kARXopt SA − Ak2F
2
(1
−
ε)
rank(X)≤k
Proof. From Lemma 49, we have that for all matrices X ∈ Rξ2 ×ξ1 and with probability at least 0.98:
(1 − ε)2 · kARXSA − Ak2F ≤ kTlef t (ARXSA − A) Tright k2F ≤ (1 + ε)2 · kARXSA − Ak2F
Applying this for X := Xopt , we obtain:
(e)
(1 − ε)2 · kARXopt SA − Ak2F ≤ kTlef t (ARXopt SA − A) Tright k2F ≤ (1 + ε)2 · kARXopt SA − Ak2F
Applying this for X := X∗ , we obtain:
(f )
(1 − ε)2 · kARX∗ SA − Ak2F ≤ kTlef t (ARX∗ SA − A) Tright k2F ≤ (1 + ε)2 · kARXopt SA − Ak2F
Combining (f ), (e) along with the optimality of X∗ , formally using the relation:
kTlef t (ARX∗ SA − A) Tright k2F ≤ kTlef t (ARXopt SA − A) Tright k2F ,
shows the claim.
In words, the lemma indicates that in order to (1 + ε)-approximate the optimization problem
minrank(X)≤k kARXSA − Ak2F , it suffices to “sketch” the matrix ARXSA − A from left and right
with the matrices Tlef t and Tright . Recall that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .
rank(X)≤k
Lemma 51. Let Xopt = arg minrank(X)≤k kARXSA − Ak2F . Then, with probability at least 0.98
kARXopt SA − Ak2F ≤ (1 + ε) · kA − Ak k2F ,
T
T
Proof. Suppose the SVD of A = UA ΣA VA
and Ak = UAk ΣAk VA
. Consider about the following
k
regression problem:
min kUAk X − Ak2F
rank(X)≤k
Since we can choose X to be
T
UA
A,
k
we have
min
rank(X)≤k
kUAk X − Ak2F ≤ kA − Ak k2F
Let X̃ = arg minrank(X)≤k kSUAk X − SAk2F . According to Lemma 48, with probability 0.99
kUAk X̃ − Ak2F ≤ (1 + ε)
min
rank(X)≤k
kUAk X − Ak2F ≤ (1 + ε)kA − Ak k2F
Since X̃ minimizes kSUAk X − SAk2F , the row space of X̃ is in the row space of SA (Otherwise,
we can project SUAk X into the row space of SA to get a better solution). We denote X̃ = WSA
where rank(W) ≤ k. Now, consider about another regression problem:
min
rank(X)≤k
k(WSA)T XT − AT k2F
33
If we choose X to be UAk , we have
min
rank(X)≤k
k(WSA)T XT − AT k2F ≤ kUAk X̃ − Ak2F ≤ (1 + ε)kA − Ak k2F
Let X̂ = arg minrank(X)≤k kRT (WSA)T XT − RT AT k2F . According to Lemma 48, with probability
0.99
T
kRT (WSA)T X̂ − RT AT k2F ≤ (1 + ε)
min
rank(X)≤k
k(WSA)T XT − AT k2F ≤ (1 + ε)2 kA − Ak k2F
Since X̂ minimizes kXWSAR − ARk2F , the column space of X̂ is in the column space of AR. We
denote X̂ = ARG where rank(G) ≤ k. Thus, we have
kARXopt SA − Ak2F ≤ kARGWSA − Ak2F ≤ (1 + ε)2 kA − Ak k2F
We scale the ε with a constant factor. The statement is shown by applying union bound.
Theorem 52. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.96:
kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F .
The space complexity of the algorithm is O mk/ε + poly(kε−1 ) words, and the running time for each
update operation is O(poly(kε−1 )) and the total running time is of the order O l · poly(kε−1 ) + mk2 ε−1
where l is total number of updates.
Proof. Because UUT projects the columns of A into the column space of Tlef t ARX∗ ,
kA − UUT Ak2F ≤ kTlef t (ARXSA − A) Tright k2F
According to Lemma 50 and Lemma 51,
kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F
To see the space complexity of the algorithm, observe that it suffices to maintain the matrices
in the fourth step of the algorithm. Furthermore, observe that by the end of the stream: M =
Tlef t ATright ∈ Rξ3 ×ξ4 , L = SATright ∈ Rξ1 ×ξ4 , N = Tlef t AR ∈ Rξ3 ×ξ2 and D = AR ∈ Rm×ξ2 .
Those matrices form the so called “sketch” of the algorithm.
Since all of ξ1 , ξ2 , ξ3 , ξ4 are O(kε−1 ), the running time for each update operation in the fourth
step is O(poly(kε−1 )). We can do the sixth step by using the result of Section 6.2.2. The computation takes poly(kε−1 ) running time. In the seventh step, computing SVD needs poly(kε−1 ),
and computing T needs O(mk2 ε−1 ). We can use O(mk2 ) to compute U in the final step, e.g. QR
decomposition.
7.1.2
A variation which outputs A∗k
We just slightly modify the previous algorithm in Section 7.1.1 to get the following one which can
output a matrix A∗k ∈ Rm×n satisfying
kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F
Algorithm
34
1. Construct random sign sketching matrices S ∈ Rξ1 ×m with ξ1 = O(kε−1 ) and R ∈ Rn×ξ2 with
ξ2 = O(kε−1 ) (see Lemma 48)
2. Construct affine embedding matrices Tlef t ∈ Rξ3 ×m and Tright ∈ Rn×ξ4 with ξ3 = O(kε−3 ), ξ4 =
O(k/ε−3 ) (see Definition 33).
3. Initialize all-zeros matrices: M ∈ Rξ3 ×ξ4 , L ∈ Rξ1 ×ξ4 , N ∈ Rξ3 ×ξ2 , D ∈ Rm×ξ2 and C ∈ Rξ1 ×n . We
will maintain M, L, N, D, C such that M = Tlef t ATright , L = SATright , N = Tlef t AR, D = AR
and C = SA.
4. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (one pass over the stream of update operations)
(a) For all i = 1, ..., ξ3 , j = 1, ..., ξ4 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j .
(b) For all i = 1, ..., ξ1 , j = 1, ..., ξ4 , let Li,j = Li,j + Si,iq · xq · (Tright )jq ,j .
(c) For all i = 1, ..., ξ3 , j = 1, ..., ξ2 , let Ni,j = Ni,j + (Tlef t )i,iq · xq · Rjq ,j .
(d) For all j = 1, ..., ξ2 , let Diq ,j = Miq ,j + xq · Rjq ,j
(e) For all i = 1, ..., ξ1 , let Ci,jq = Ci,jq + Si,iq · xq
5. end
6. Construct X∗ = argmin kN·X·L−Mk2F . (Notice that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .)
rank(X)≤k
rank(X)≤k
T
(UX∗ ∈ Rξ×k , ΣX∗ ∈ Rk×k VX∗ ∈ Rξ×k ); then, compute
7. Compute the SVD of X∗ = UX∗ ΣX∗ VX
∗
T = DUX∗
T
C
K = VX
∗
8. Output A∗k = TΣX∗ K
Theorem 53. With probability at least 0.96:
kA − A∗k k2F ≤ (1 + O (ε)) · kA − Ak k2F .
The space complexity of the algorithm is O (m + n)k/ε + poly(kε−1 ) words, and the running time for
each update operation is O(poly(kε−1 )) and the total running time is of the order
O l · poly(kε−1 ) + (m + n)k2 ε−1 + mnk
where l is total number of updates.
Proof. Notice that A∗k = ARX∗ SA. According to Lemma 50 and Lemma 51, we have
kA − A∗k k2F ≤ (1 + O (ε)) · kA − Ak k2F .
The total space of “sketch” matrices M, L, N, D is the same as the algorithm in Section 7.1.1. The
maintenance of C needs additional O(nkε−1 ) space.
T
The running time is almost the same as before. Computation of K = VX
C needs additional
∗
O(nk2 ε−1 ), and computation of A∗k = TΣX∗ K needs additional O(mnk).
35
7.2 Two-pass streaming PCA with “real numbers” space complexity
A simple modification of the batch algorithm in Section 5.2 leads to a two-pass streaming algorithm with O(mk) + poly(k/ε) “real numbers” space complexity:
Algorithm
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Initialize all-zero matrices: Ã ∈ Rξ1 ×ξ2 , X ∈ Rm×k .
3. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream)
4. For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let Ãi,j = Ãi,j + Si,iq · xq · Tjq ,j .
5. end
T
6. Compute the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
7. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream)
8. For all i = 1, ..., ξ2 , j = 1, ..., k, let Xiq ,j = Xiq ,j + xq · Tjq ,i · (VÃk )i,j .
9. end
10. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
The theorem below analyzes the approximation error, the space complexity, and the running
time of the previous algorithm. Notice that the space complexity of this algorithm is only given in
terms of “real numbers” - we resolve this issue in the following section.
Theorem 54. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.98:
kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F .
The space complexity of the algorithm is
O mk + poly(kε−1 )
“real numbers”, the running time of each update operation is O(poly(kε−1 )), and the total running time is
of the order
O l · poly(kε−1 ) + mk2
where l is the total number of update operations.
Proof. The matrix U - up to the randomness in the algorithms - is exactly the same matrix as in the
algorithm in Section 5.2, hence Theorem 29 shows the claim.
To see the space complexity of the algorithm, observe that it suffices to maintain the matrices in
the fourth and eighth steps of the algorithm. Furthermore, observe that by the end of the stream:
à = SAT,
and
X = ATVÃk
Since ξ1 , ξ2 are poly(kε−1 ), the running time for each update operation is poly(kε−1 ). Computing SVD in the sixth step needs poly(kε−1 ). Computing U in the final step needs O(mk 2 ).
36
7.3 Two-pass streaming PCA with bit space complexity
The previous algorithm could suffer from large space complexity in case we need a lot of machine
words to write down the entries of VÃk . To fix this issue we use the same idea as in the case of the
distributed PCA algorithm in Section 6. This leads to a two-pass streaming algorithm for PCA.
Again, as in the distributed case, we need to test if the rank of A is less than 2k, and then we use
one approach if rank(A) < 2k and another approach if rank(A) ≥ 2k. Both of these approaches
can be implemented with two passes. In the overall streaming PCA algorithm that we would like
to design, we can not wait for the algorithm that tests the rank to finish and then start running
one of the two PCA protocols, because this will lead to a three-pass algorithm (one pass to test
the rank and two passes for the actual PCA protocol). To keep the number of passes to two, we
just start running the PCA protocols in parallel with the protocol that tests the rank of the input
matrix. In the end of the first pass over the stream of update operations, we already know which
protocol to follow, and we just do this, disregarding the other protocol.
We already discussed the streaming version of the algorithm that tests the rank of the matrix
in Lemma 31. Below, we describe separately the two streaming PCA protocols.
7.3.1
Streaming PCA protocol when rank(A) ≤ 2k
The idea here is to implement a streaming version of the distributed PCA protocol in Lemma 36.
Algorithm
1. Construct an n × 2k matrix H′′ as in Lemma 36.
2. Construct affine embedding matrices Tlef t ∈ Rξ1 ×m and Tright ∈ Rn×ξ2 with ξ1 = O(k/ε2 ), ξ2 =
O(k/ε2 ) (see Definition 33).
3. Initialize all-zeros matrices: C ∈ Rm×2k , M ∈ Rξ1 ×ξ2 , L ∈ Rξ×ξ2 , N ∈ Rξ1 ×2k .
4. (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream)
(a) For all j = 1, ..., 2k, let Ciq ,j = Ciq ,j + xq · H′′jq ,j
5. end
6. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream)
(a) For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j .
(b) For all i = 1, ..., 2k, j = 1, ..., ξ2 , let Li,j = Li,j + CT i,iq · xq · (Tright )jq ,j .
(c) For all i = 1, ..., ξ1 , j = 1, ..., 2k, let Ni,j = Ni,j + (Tlef t )i,iq · xq · H′′jq ,j .
7. end
8. Construct
X∗ = argmin kN · X · L − Mk2F := argmin kTlef t AH′′ X(H′′ )T AT ATright − Tlef t ATright k2F .
rank(X)≤k
rank(X)≤k
9. Compute an orthonormal basis U ∈ Rm×k for span(CX∗ ).
37
7.3.2
Streaming PCA protocol when rank(A) > 2k
The idea here is to implement a streaming version of step 3 of the algorithm in Section 6.4.
Algorithm
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Initialize all-zero matrices: B̃ ∈ Rξ1 ×ξ2 , X̂ ∈ Rm×k .
3. For p := 1, ..., ξ1 , q := 1, ..., ξ2 , i := 1, ..., m, j := 1, ..., n
4. Let ri,j = −1/nD with probability 1/2 and ri,j = 1/nD with probability 1/2.
5. B̃p,q = B̃p,q + Sp,i · ri,j · Tj,q
6. end
7. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream)
8. For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let B̃i,j = B̃i,j + Si,iq · xq · Tjq ,j .
9. end
T
10. Compute the SVD of B̃k = UB̃k ΣB̃k VB̃
(UB̃k ∈ Rξ1 ×k , ΣB̃k ∈ Rk×k , VB̃k ∈ Rξ2 ×k ). Then, we
k
round each of the entries of VB̃k to the nearest integer multiple of 1/nγ for a sufficient large constant
γ > 0. Let the matrix after the rounding be V̂B̃k .
11. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream)
12. For all i = 1, ..., ξ2 , j = 1, ..., k, let X̂iq ,j = X̂iq ,j + xq · Tjq ,i · (V̂B̃k )i,j .
13. end
14. Compute an orthonormal basis U ∈ Rm×k for span(X̂) (notice that rank(X̂) ≤ k).
7.3.3
Main result
The theorem below analyzes the approximation error, the space complexity, and the running time
of the previous algorithm. Notice that the space complexity of this algorithm is given in terms of
machine words.
Theorem 55. The matrix U ∈ Rm×k with k orthonormal columns satisfies with arbitrarily large constant
probability:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The space complexity of the algorithm is
O mk + poly(kε−1 )
machine words, the running time of each update operation is O(poly(kε−1 )), and the total running time is
of the order
O l · poly(kε−1 ) + mk2
where l is the total number of update operations.
Proof. The matrix U - up to the randomness in the algorithms - is exactly the same matrix as in the
algorithm in Theorem 43, hence the approximation bound in that theorem shows the claim.
To see the space complexity of the algorithm, observe that it suffices to maintain all the “sketch”
matrices in the both two protocols above.
Since ξ1 , ξ2 in both protocols are poly(kε−1 ), the running time for each update operation is
O(poly(kε−1 )). Additional O(mk 2 ) running time is caused by computing U in the final step.
38
8 Distributed PCA for sparse matrices in column-partition model
Recall that in the problem of Definition
15 we are given
P 1) an m × n matrix A partitioned columnwise as A = A1 A2 . . . As , with Ai ∈ Rm×wi ( wi = n); 2) a rank parameter k < rank(A);
3) an accuracy parameter ε > 0. We would like to design an algorithm that finds an m × k matrix
U with UT U = Ik and, upon termination, leaves this matrix U in each machine of the network.
The high level idea of our algorithm is to find, in a distributed way, a small set - O(kε−1 ) - of
columns from A and then find U in the span of those columns. To choose those O(kε−1 ) columns
of A in a distributed way we implement the following three-stage sampling procedure:
1. Local sampling: Each machine samples O(k) columns using the sampling algorithm from [24].
2. Global sampling: The server collects the columns from each machine and down-samples
them to O(k) columns using the deterministic algorithm from [17].
3. Adaptive sampling: the server sends back to each machine those O(k) columns; then, an
extra of O(kε−1 ) columns are selected randomly from the entire matrix A using [26].
We argue that if C̃ contains the columns selected with this three-stage approach, then, w.p. 0.99,
†
(A)k2F ≤ (1 + O(ε)) · kA − Ak k2F .
kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
(A) to be the rank k matrix that approximates A, we are not
Though we could have used ΠF
C̃,k
(A). To address this issue, using
familiar with any communication-efficient computation of ΠF
C̃,k
(A)k2F ;
an idea from [37], we compute U ∈ span(C̃) such that kA−UUT Ak2F ≤ (1+O(ε))kA−ΠF
C̃,k
this U can be calculated with small communication cost and it is sufficient for our purposes.
Before presenting the new algorithm in detail, we discuss results from previous literature that
we employ in the analysis.
8.1 Background material
8.1.1
Column sampling algorithms
Our distributed PCA algorithm in Section 8 samples columns from the input matrix in three stages:
1. Local sampling: O(k) columns are selected locally in each machine.
2. Global sampling: O(k) columns are selected in the server.
3. Adaptive sampling: an extra O(kε−1 ) columns are selected from the entire matrix A.
In the first stage, we use a sampling algorithm mentioned in [24]. Actually, the sampling
algorithm is the same as the Batson, Spielman, and Strivastava (BSS) spectral sparsification algorithm [11]. But Cohen et al. showed that a small set of columns sampled by BSS sampling
algorithm can provide a projection-cost preserving sketch. In the second stage, we use a deterministic algorithm developed in [17], which itself extends the Batson, Spielman, and Strivastava
(BSS) spectral sparsification algorithm [11]. For the actual algorithm in the first stage we defer
the reader to Theorem 15 in [24]. Lemma 56 states the result. And for the actual algorithm in the
second stage we defer the reader to Lemma 3.6 in [17]. Lemma 57 and Lemma 58 below present
the relevant results. In the third sampling stage, we use an adaptive sampling algorithm from [26].
39
Lemma 56 (BSS Sampling for Projection-Cost Preserving Sketch. Theorem 15 in [24]). Let A ∈
Rm×w be an arbitrary matrix. For any integer 0 < k < m, real numbers 0 < ε < 1, 0 < δ, there
is a randomized algorithm that runs in O(nnz(A) log(m/δ) + m · poly(k, ε, log(1/δ))) time, and constructs a “sampling/rescaling” w × O(k/ε2 ) matrix S with probability at least 1 − δ such that S is
an (ε, k)-projection-cost preserving sketching matrix of A. We denote this sampling procedure as S =
BssSamplingI(A, k, ε, δ).
In words, there exists a randomized algorithm that runs in near input-sparsity running time
can construct a projection-cost preserving sketch of a given matrix A by sampling and rescaling a
small subset of columns of A.
Lemma 57 (Dual Set Spectral-Frobenius Sparsification. Lemma 3.6 in [17]). Let V ∈ Rw×k be a
matrix with w > k and V T V = Ik . Let E ∈ Rm×w be an arbitrary matrix. Then, given an integer ℓ such
that k < ℓ ≤ w, there exists a deterministic algorithm that runs in O ℓwk2 + mw time, and constructs a
“sampling/rescaling” w × ℓ matrix S such that
p 2
σk2 V T S ≥ 1 − k/ℓ ,
kESk2F ≤ kEk2F .
Specifically, rank(V T S) = k. We denote this sampling procedure as S = BssSamplingII(V, E, ℓ).
In words, given V and E, there exists an algorithm to select (and rescale) a small number of
columns from E and rows from V such that: 1) the Frobenius norm squared of the sampled E is
less than the Frobenius norm squared of E; 2) the sampled V has rank equal to the rank of V; and
p 2
3) the smallest singular value squared of the sampled V is bounded from below by 1 − k/ℓ .
Lemma 58 (Constant factor column-based matrix reconstruction; Theorem 5 in [17]). Given matrix G ∈ Rm×α of rank ρ and a target rank k 1 , there exists a deterministic algorithm that runs in
O αm min{α, m} + αck2 time and selects c > k columns of G to form a matrix C ∈ Rm×c with
†
kG − CC
Gk2F
≤
rank
X(G)
p −2
1 + 1 − k/c
·
σi2 (G).
i=k+1
The algorithm in this theorem finds C as C = GS, where S = BssSamplingII(V, G − GVV T , c)
and V ∈ Rα×k contains the top k right singular vectors of G. We denote this sampling procedure as
C = DeterministicCssF robenius(G, k, c).
In words, there exists a deterministic algorithm, running in polynomial time, to select any
number of c > k columns from the given matrix G, such that the residual error, in Frobenius
norm, from projecting G onto the span of the sampled columns is bounded from above with
respect to the residual error of the best rank k matrix from the SVD of G. Notice that
rank
X(G)
i=k+1
σi2 (G) = kG − Gk k2F ,
where Gk ∈ Rm×α has rank at most k and is computed via the SVD of G.
1
The original Theorem 5 in [17] has the assumption that k < ρ, but this assumption can be dropped having the result
unchanged. The only reason the assumption k < ρ exists is because otherwise column subset selection is trivial.
40
Before presenting the adaptive sampling theorem from [26] we introduce some useful notation
m×n is the
used in the lemma. Let A ∈ Rm×n , k < n, and V ∈ Rm×c with k < c < n. ΠF
V,k (A) ∈ R
best rank k approximation to A - wrt the Frobenius norm - in the column span of V. Equivalently,
ΠF
V,k (A) = VXopt , where
Xopt =
argmin
kA − VXk2F .
X∈Rc×n ,rank(X)≤k
Lemma 59 (Adaptive sampling; Theorem 2.1 of [26]). Given A ∈ Rm×n and V ∈ Rm×c1 (with
c1 ≤ n, m), define the residual matrix Ψ = A − VV† A ∈ Rm×n . For j = 1, . . . , n, let pj be a probability
distribution such that pj ≥ βkΨ(j) k22 /kΨk2F , for some 1 > β > 0, where Ψ(j) is the j-th column of the
matrix Ψ. Sample c2 columns from A in c2 i.i.d. trials, where in each trial the j-th column is chosen with
probability pj . Let C2 ∈ Rm×c2 contain the c2 sampled columns and let C = [V C2 ] ∈ Rm×(c1 +c2 )
contain the columns of V and C2 . Then, for any integer k > 0,
rank
i
h
X(A)
2
F
†
2
E kA − CC AkF ≤ E kA − ΠC,k (A)kF ≤
σi2 (A) +
i=k+1
k
· kA − VV† Ak2F .
β · c2
Given A and C, this method requires O(c1 mn) time to compute Ψ, another O(mn) time to compute
the probabilities pj ’s and another O(n + c2 ) time for the sampling step - using the method in [51]. In
total, the method requires O(c1 mn + c2 ) time to compute C2 . We denote this sampling procedure as
C2 = AdaptiveCols(A, V, c2 , β).
In words, given the matrix A and the subspace V, there exists a randomized algorithm to
sample an additional of c2 columns from A, based on probabilities from the residual error matrix
A − VV† A, such that residual error, in Frobenius norm, from projecting A onto the span of the
union of the columns of V and the sampled columns is bounded from above with respect to the
best rank k approximation to A, the residual A − VV† A, and the number of sampled columns c2 .
8.1.2
Distributed adaptive sampling
In our distributed PCA algorithm below, we also need to use a distributed version of the previous
adaptive sampling procedure. We provide some preliminary results for that task in this section.
Lemma 60. Suppose that the columns of an m × n matrix A are partitioned arbitrarily across the machines
into matrices A1 , . . . , As . Let C be an arbitrary m × r matrix. Consider the distribution p on n columns
in which
kaj − CC† aj k2F
,
pj =
kA − CC† Ak2F
where aj is the j-th column of A (j = 1 : n here).
For each i ∈ [s], let some value βi satisfies
kAi − CC† Ai k2F ≤ β i ≤ 2kAi − CC† Ai k2F .
For each j ∈ [n], if column aj is held on the i-th server (denoted aij ), then let
q j = Ps
βi
i′ =1 βi′
Then for each j ∈ [n],
·
kaij − CC† aij k22
kAi − CC† Ai k2F
pj /2 ≤ qj ≤ 2pj .
41
.
Proof. By definition of the β i , we have that
Hence,
kAi − CC† Ai k2F
2kAi − CC† Ai k2F
βi
P
≤
.
≤
s
2kA − CC† Ak2F
kA − CC† Ak2F
i′ =1 βi′
pj /2 ≤ qj ≤ 2pj .
Lemma 61. Suppose the coordinator has an m × r matrix C of columns of an m × n matrix A, where
r = O(k). Suppose the entries of A are integers bounded by poly(mns/ε) in magnitude, and let the
columns of A be partitioned arbitrarily across the servers into matrices A1 , . . . , As .
There is a protocol using O(skm) machine words of communication for the coordinator to learn values
i
β so that for all i ∈ [s],
kAi − CC† Ai k2F ≤ β i ≤ 2kAi − CC† Ai k2F .
Proof. The coordinator first sends C to all machines. The i-th server locally computes kAi −
CC† Ai k2F . If this number is 0, he/she sends 0 to the coordinator, and in this case β i satisfies
the requirement in the statement of the lemma.
Otherwise, consider the matrix Bi which is formed by concatenating the columns of Ai with
those of C. Then
kBi − CC† Bi k2F = kAi − CC† Ai k2F > 0,
(9)
since the columns of Bi in C contribute a cost of 0. However, since Bi contains the columns of C
and its cost is non-zero, it implies the rank of Bi is at least r + 1. By Corollary 38, this implies
kBi − CC† Bi k2F > (mns/ε)−O(k) ,
which by (9) gives the same lower bound on kAi − CC† Ai k2F . Note also that
kAi − CC† Ai k2F ≤ poly(mns/ε),
since kAk2F ≤ poly(mns/ε). This implies if the i-th machine sends β i to the coordinator, where β i
is the nearest power of 2 to kAi − CC† Ai k2F , there will only be O(k log(mns/ε)) possible values
of β i , and hence each can be specified using O(log k + log log(mns/ε)) bits, i.e., a single machine
word. This completes the proof.
8.1.3
Low-rank matrix approximations within a subspace
The final stage of our distributed PCA algorithm below finds U ∈ span(C̃) such that the error
of the residual matrix A − UUT A is “small”. To implement this step, we employ an algorithm
developed in [37].
Lemma 62. Let A ∈ Rm×n be the input matrix and V ∈ Rm×c be the input subspace. We further assume
that for some rank parameter k < c and accuracy parameter 0 < ε < 1 :
2
2
kA − ΠF
V,k (A)kF ≤ (1 + O(ǫ))kA − Ak kF .
Let V = YΨ be a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c . Let Ξ = Y T AW T ∈ Rc×ξ ,
√
√
where W T ∈ Rn×ξ with ξ = O(c/ε2 ), each element of which is chosen i.i.d. to be {+1/ n, −1/ n} with
42
probability 1/2. Let ∆ ∈ Rc×k contain the top k left singular vectors of Ξ. Then, with probability at least
1 − e−c ,
kA − Y∆∆T Y T Ak2F ≤ (1 + ε)kA − Ak k2F .
Y, and ∆ can be computed in O(mnξ) time. We denote this procedure as
[Y, ∆] = ApproxSubspaceSV D(A, V, k, ε).
Proof. This result was essentially proven inside the proof of Theorem 1.1 in [36]. Specifically, the
error bound proven in [36] is for the transpose of A (also Y, ∆ are denoted with U, V in [36]).
As for the running time, given A, V, and k, one can compute (i) Y in O(mc2 ) time; (ii) Ξ in
O(mnξ + mcξ) time; and (iii) ∆ in O(c2 ξ) time.
In words, the lemma indicates that given the matrix A and the subspace V such that
2
2
kA − ΠF
V,k (A)kF ≤ (1 + O(ǫ))kA − Ak kF ,
for some small ε > 0, there exists a randomized algorithm to compute matrices Y ∈ span(V)
and ∆ such that the residual error, in Frobenius norm, from projecting A onto the span of Y∆ is
also bounded by (1 + O(ǫ))kA − Ak k2F . Notice that ∆ contains the top k left singular vectors of
a “sketched” version of Y T A, a property which makes the computation particularly effective in
terms of running time.
8.2 Detailed description of the algorithm
Input:
1. A ∈ Rm×n partitioned column-wise A = A1
A2
2. rank parameter k < rank(A)
P
. . . As ; for i = 1 : s, Ai ∈ Rm×wi ; i wi = n.
3. accuracy parameter ε > 0
Algorithm
1. Local Column Sampling
(a) For each sub-matrix Ai ∈ Rm×wi , compute Ci ∈ Rm×ℓ containing ℓ = O(k) columns from
Ai as follows: Ci = Ai Si . Here, Si has dimensions wi × ℓ and is constructed as follows:
Si = BssSamplingI(Ai , 4k, 1/2, 0.01/s) (see Lemma 56).
(b) Machine i sends Ci to the server.
2. Global Column Sampling
(a) Server constructs m × (s · ℓ) matrix G containing (s · ℓ) actual columns from A as follows:
G = C1 C2 . . . Cs . Then, server constructs C ∈ Rm×c1 via choosing c1 = 4k columns
from G as follows: C = DeterministicCssF robenius(G, k, c1 ) (see Lemma 58).
(b) Server sends C to all the machines.
3. Adaptive Column Sampling
(a) Machine i computes Ψi = Ai − CC† Ai ∈ Rm×wi and then computes βi as it was described in
Lemma 61. Machine i sends βi to server.
(b) Server computes probability distribution gi = Pβiβi . Server samples i.i.d. with replacement
i
⌈ 50k/ε ⌉ samples (machines) from gi . Then, server determines numbers ti (i = 1, 2, . . . , s),
where ti is the number of times the ith machine was sampled. It sends the ti ’s to the machines.
43
(c) Machine i computes probabilities qji = kxk22 /kΨi k2F (j = 1 : wi ), where x is the jth column of
Ψi . And now machine i samples ti samples fromP
it’s local probability distribution and sends
the corresponding columns to the server. Let c2 = i ti = ⌈ 50k/ε ⌉.
(d) Server collects the columns and assigns
them to Ĉ ∈ Rm×c2 . Server constructs C̃ to be the
m × (c1 + c2 ) matrix: C̃ = C; Ĉ . Let c = c1 + c2 = 4k + ⌈ 50k/ε ⌉.
4. Rank-k matrix in the span of C̃
(a) Server sends C̃ to all the machines and each machine computes (the same) qr factorization of
C̃: C̃ = YR where Y ∈ Rm×c has orthonormal columns and R ∈ Rc×c is upper triangular.
1/2. Implicitly
(b) Machine i generates W̃i ∈ Rξ×wi with ξ = O(c/ε2 ) to be i.i.d.
{+1, −1} w.p.ξ×n
, with W̃ ∈ R
. Machine i
all machines together generate W̃ = W̃1 W̃2 . . . W̃s
T
computes Hi = C̃ (Ai WiT ) ∈ Rc×ξ . Machine i sends Hi to the server.
P
(c) Server computes Ξ = si=1 Hi ∈ Rc×ξ and sends this back to all the machines. Now machines
√
compute Ξ := R−1 · Ξ · 1/ n(:= Y T AWT ), where
∈ Rξ×n is
W √= W1 W2 . . . Ws
√
random matrix each element of which is {+1/ n, −1/ n} w.p. 1/2, and then they compute
∆ ∈ Rc×k to be the top k left singular vectors of Ξ. Each machine computes U = Y · ∆ ∈ Rm×k .
Discussion. A few remarks are necessary for the last two stages of the algorithm. The third stage
(adaptive column sampling), implements the adaptive sampling method of Lemma 59. To see this,
note that each column in A (specifically the jth column in Ai ) is sampled with probability
gi · qji ≥
1 ||xij ||22
,
·
2 kΨk2F
where Ψ = A − CC† A. This follows from Lemma 60. Overall, this stage effectively constructs Ĉ
such that (see Lemma 59)
Ĉ = AdaptiveCols(A, C, c2 , 1/2).
The last stage in the algorithm implements the algorithm in Lemma 62. To see this, note that
W satisfies the properties in the lemma. Hence,
[Y, ∆] = ApproxSubspaceSV D(A, C̃, k, ε).
8.3 Main Result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm.
Theorem 63. The matrix C̃ ∈ Rm×c with c = O(k/ε) columns of A satisfies w.p. at least 0.98,
†
(A)k2F ≤ (1 + O(ε)) · kA − Uk UkT Ak2F .
kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
(10)
The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.97,
kA − UUT Ak2F ≤ (1 + O(ε)) · kA − Uk UkT Ak2F .
(11)
Let each column of Ahas at most φ non-zero elements. Then, the communication cost of the algorithm is
O skφε−1 + sk2 ε−4 and the running time is O (mns · poly(k, 1/ε)) .
44
8.4 Proof of Theorem 63
8.4.1
Proof of Eqn. 10
From Lemma 59:
h
†
E kA − C̃C̃
Ak2F
i
h
≤ E kA −
(A)k2F
ΠF
C̃,k
i
≤
rank
X(A)
σi2 (A) +
i=k+1
2ε
· kA − CC† Ak2F .
50
(12)
Therefore, we need to bound kA − CC† Ak2F now.
Lemma 64. With probability at least 0.99, matrix G is a (4k, 1/2)-projection-cost preserving sketch of A.
Proof. For each i, Ci = Ai Si is a (4k, 1/2)-projection-cost preserving sketch of Ai with probability
at least 1 − 0.01/s. Due to union bound, with probability at least 1 − 0.01, ∀i, Ci is a (4k, 1/2)projection-cost preserving sketch of Ai . Since Ci is a (4k, 1/2)-projection-cost preserving sketch of
Ai , we can assume ci is a constant which is independent from projection matrix P which has rank
at most 4k such that
3
1
kAi − PAi k2F ≤ kCi − PCi k2F + ci ≤ kAi − PAi k2F
2
2
Then, for any projection matrix P which has rank at most 4k we have:
s
1
1X
kAi − PAi k2F
kA − PAk2F =
2
2
i=1
≤
s
X
i=1
kCi − PCi k2F + ci
s
≤
3X
kAi − PAi k2F
2
i=1
3
≤ kA − PAk2F
2
Consider the right hand side of the first inequality, it is equal to
kG −
Let constant c =
Ps
i=1 ci ,
PGk2F
+
s
X
ci
i=1
we have:
1
3
kA − PAk2F ≤ kG − PGk2F + c ≤ kA − PAk2F
2
2
Therefore, G is a (4k, 1/2)-projection-cost preserving sketch of A.
For convenience, we use PG to denote a rank-k projection matrix which provides the best
rank-k approximation Gk = PG G to matrix G. We also use PA to denote a rank-k projection
45
matrix which provides the best rank-k approximation Ak = PA A to matrix A. Thus,
1
kA − CC† Ak2F ≤ kG − CC† Gk2F + c
2
≤ 5kG − PG Gk2F + c
≤ 5kG − PA Gk2F + c
≤ 5 kG − PA Gk2F + c
15
kA − PA Ak2F
≤
2
The first inequality is due to Lemma 64. G is a (4k, 1/2)-projection cost preserving sketch of A
and C has rank at most 4k. The second inequality is based on Lemma 58. The third inequality is
because PG provides the best rank-k approximation to G. The fourth inequality used the fact c is
non-negative. The fifth inequality held because G is a (4k, 1/2)-projection cost preserving sketch
of A. Thus,
kA − CC† Ak2F ≤ 15kA − Ak k2F
Combining with equation 12, we have:
h
E kA − C̃C̃
†
Ak2F
i
h
≤ E kA −
(A)k2F
ΠF
C̃,k
i
30
≤ (1+ ε)
50
rank
X(A)
i=k+1
σi2 (A) = (1+O(ε))kA−Ak k2F (13)
Concluding the proof. Consider about
rank
i rank
i
h
h
X(A)
X(A)
†
2
2
≤
(A)
+
O(ε)
σ
σi2 (A).
(A)k
E kA − C̃C̃ Ak2F ≤ E kA − ΠF
i
F
C̃,k
i=k+1
(14)
i=k+1
Prank(A)
The expectation is taken w.r.t. the randomness in constructing C̃; hence, the term i=k+1 σi2 (A)
is a constant w.r.t. the expectation operation, which means that Eqn. 14 implies the bound:
rank
rank
X(A)
X(A)
F
2
2
E kA − ΠC̃,k (A)kF −
σi (A) ≤ O(ε) ·
σi2 (A).
i=k+1
(A)k2F −
Let Y := kA − ΠF
C̃,k
Prank(A)
i=k+1
i=k+1
σi2 (A). Y is a random variable with Y ≥ 0, because
(A)) ≤ k. Markov’s inequality on Y implies that with arbitrary constant probability,
rank(ΠF
C̃,k
kA −
ΠF
(A)k2F
C̃,k
kA −
(A)k2F
ΠF
C̃,k
−
rank
X(A)
σi2 (A)
≤
rank
X(A)
σi2 (A) +
i=k+1
≤ O(ε) ·
rank
X(A)
σi2 (A),
rank
X(A)
σi2 (A).
i=k+1
equivalently,
†
i=k+1
O(ε) ·
(A)k2F concludes the proof.
Using kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
46
i=k+1
8.4.2
Proof of Eqn. 11
We would like to apply Lemma 62 for the matrix U ∈ Rm×k in the algorithm. Note that we
have already proved that the matrix C̃ in the algorithm satisfies with probability at least 0.99:
(A)k2F ≤ (1 + O(ε))kA − Ak k2F . Lemma 62 and a simple union bound conclude the
kA − ΠF
C̃,k
proof.
8.4.3
Running time
Next, we give an analysis of the arithmetic operations required in various steps in the algorithm.
1. Local Column Sampling: O(nnz(A) log(ms) + m · poly(k, ε, log(s))) arithmetic operations in
total.
(a) O(nnz(Ai ) log(ms) + m · poly(k, ε, log(s))) for each Si
(b) -
2. Global Column Sampling: O(sk 3 + skm) arithmetic operations in total.
(a) O(sk 3 + skm) to construct C.
(b) 3. Adaptive Sampling O(sk 2 m + mnk + k/ε) arithmetic operations in total.
(a) O(k2 m) for each C† locally; O(wi mk) for each Ψi and O(mwi ) for each ψi .
(b) O(s) in total.
(c) O(k/ε) in total using the method of [51] locally.
(d) O(k/ε).
4. Rank-k matrix in span(C̃): O(mnk/ε3 + smk 2 /ε4 + sk 3 /ε5 ) arithmetic operations in total.
(a) O(smk 2 /ε2 ) in total
T
(b) O(mwi k/ε3 ) for each Ai WiT and another O(mk2 ε−4 ) for each C̃ (Ai WiT )
(c) O(sk 2 ε−3 ) to find Ξ in the server; then another O(sk 3 ε−3 + sk 3 ε−5 )) to update Ξ locally in each machine and another O(sk 3 ε−5 ) to find ∆ locally in each machine; and
O(smk 2 /ε) to find U locally in each machine.
8.4.4
Communication Complexity
Assume that we can represent each element in the input matrix A with at most b bits. Also, we
assume that one word has length b bits and b = O(log(mns/ε)).
1. Local Column Sampling: O(skφ) words.
(a) (b) O(skφ) elements of A.
2. Global Column Sampling:O(skφ) words.
(a) 47
(b) O(skφ) elements of A.
3. Adaptive Sampling: O(s + φk/ε) words.
(a) s integers each of which is representable with O(log k+log log(mns/ε)) (from Lemma 61).
(b) s integers (the ti ’s) each with magnitude at most n, hence representable with b bits.
(c) O(φk/ε) elements of A.
(d) 4. Best rank-k matrix in the span of C̃: O(sφk/ε + sk 2 ε−4 ) words.
(a) O(skφε−1 ) elements of A.
(b) O(sk 2 ε−4 ) numbers each of which can be represented with b bits.
(c) O(sk 2 ε−4 ) numbers each of which can be represented with b bits.
In total the communication complexity is O(skφ/ε + sk 2 /ε4 ) words.
9 Faster Distributed PCA for sparse matrices
We now explain how to modify certain steps of the distributed PCA algorithm in Section 8 in order
to improve the total running time spent to compute the matrix U; this, at the cost of increasing the
communication cost slightly. Specifically, we replace the parts 2-(a), 3-(a), and 4-(b) with similar
procedures, which are almost as accurate as the original procedures but run in time proportional
to the number of the non-zero elements of the underlying matrices. Before presenting the new
algorithm in detail, we discuss results from previous literature that we employ in the analysis. We
remark that in the analysis below we have not attempted to optimize the constants.
9.1 Background material
9.1.1
Constant probability sparse subspace embeddings and sparse SVD
First, we present the so-called sparse subspace embedding matrices of Clarskon and Woodruff [23].
Definition 65. [Sparse Subspace Embedding [23]] We call W ∈ Rξ×n a sparse subspace embedding of
dimension ξ < n if it is constructed as follows, W = Ψ · Y, where
• h : [n] → [ξ] is a random map so that for each i ∈ [n], h(i) = ξ ′ , for ξ ′ ∈ [ξ] w.p. 1/ξ.
• Ψ ∈ Rξ×n is a binary matrix with Ψh(i),i = 1, and all remaining entries 0.
• Y ∈ Rn×n is a random diagonal matrix, with each diagonal entry independently chosen to be +1 or
−1, with equal probability.
Such sparse subspace embedding matrices have favorable properties which we summarize
below:
Lemma 66 ([23]). Let AT ∈ Rn×m have rank ρ and let W ∈ Rξ×n be a randomly chosen sparse subspace
embedding with dimension ξ = Ω(ρ2 ε−2 ), for some 0 < ε < 1. Then, 1) computing AW T requires
O(nnz(A)) time; 2) nnz(AW T ) ≤ nnz(A); and 3) with probability at least 0.99, and for all vectors
y ∈ Rm simultaneously,
(1 − ε)kA T yk22 ≤ kWA T yk22 ≤ (1 + ε)kA T yk22 .
48
Notice that the third property in the lemma fails with constant probability. Based on the above
sparse subspace embeddings, Clarkson and Woodruff [23] described a low-rank matrix approximation algorithm for A that runs in time nnz(A) plus low-order terms.
Lemma 67 (Theorem 47 in [23]; for the exact statement see Lemma 3.4 in [19]). Given A ∈ Rm×n
of rank ρ, a target rank 1 ≤ k < ρ, and 0 < ǫ ≤ 1, there exists a randomized algorithm that computes
Z ∈ Rn×k with ZT Z = Ik and with probability at least 0.99,
kA − AZZT k2F ≤ (1 + ǫ) kA − Ak k2F .
The proposed algorithm requires O nnz(A) + (m + n) · poly(k, ε−1 ) arithmetic operations. We denote
this procedure as Z = SparseSV D(A, k, ε).
Notice that the algorithm in the lemma fails with constant probability.
9.1.2
High probability sparse SVD
Lemma 67 above presents a randomized algorithm to compute quickly an SVD of a sparse matrix;
however, this lemma fails with constant probability. Since in our fast distributed PCA algorithm
we will use the lemma multiple times (specifically, s times, since we need such a fast SVD locally
in each machine), the overall failure probability would be of the order O(s) (by a union bound).
To boost this failure probability, we develop a simple scheme to obtain a high probability result.
Before we proceed, we quickly review the Johnson Lindestrauss transform, which we need in
the analysis.
Lemma 68. [Theorem 1 in [5] for fixed ε = 1/2] Let B ∈ Rm×n . Given β > 0, let r = (1/2)4+2β
2 −(1/2)3 log n.
√
r×m
Construct a matrix S ∈ R
, each element of which is a random variable which takes values ±1/ r with
equal probability. Let B̃ = SB. Then, if bi and b̃i denote the ith column of B and B̃, respectively, with
probability at least 1− n−β , and for all i = 1, ...n, (1− 21 )kbi k22 ≤ kb̃i k22 ≤ (1+ 12 )kbi k22 . Given B, it takes
O(nnz(B) log n) arithmetic operations to construct B̃. We will denote this procedure as B̃ = JLT (B, β).
Now, we are fully equipped to design the “high-probability” analog of Lemma 67:
Lemma 69. Given A ∈ Rm×n of rank ρ, a target rank 1 ≤ k < ρ, and 0 < δ, ǫ ≤ 1, there exists a
randomized algorithm that computes Z ∈ Rn×k with ZT Z = Ik and with probability at least 1 − δ− 1/n,
kA − AZZT k2F ≤ 3 (1 + ǫ) kA − Ak k2F . The proposed algorithm requires O nnz(A) log2 ( nδ ) + n ·
poly(k, ε, log( nδ )) arithmetic operations. We denote this procedure as Z = SparseSV DBoosting(A, k, ε, δ).
Proof. The idea is to use the algorithm in Lemma 67 and generate i.i.d. r = O(log( 1δ )) matrices
Z1 , Z2 , . . . , Zr , where Zi = SparseSV D(A, k, ε), and kA − AZi ZiT k2F ≤ (1 + ε)kA − Ak k2F , with
probability at least 0.99 for a single Zi .
Now, we could have chosen Z := Zi which minimizes kA − AZi ZiT k2F , and this would have
implied that kA − AZZT k2F ≤ (1 + ε)kA − Ak k2F , with probability 1 − δ (via a simple chernoff
argument), but evaluating the errors kA − AZi ZiT k2F is computationally intensive for the overall
running time that we would like to obtain.
Selection of Z. Instead, we use the Johnson Lindestrauss transform to speedup this computation
(evaluating the errors). Hence, for every Zi , we (implicitly) set Bi := A − AZi ZiT and then we
compute B̃i = JLT (Bi , 1) (see Lemma 68). Now, we choose the Zi that minimizes kB̃i k2F .
49
Correctness. For a fixed Zi , from Lemma 68 it follows that with probability 1 − 1/n it is: 21 kA −
AZi ZiT k2F ≤ kB̃i k2F ≤ 23 kA−AZi ZiT k2F , where the failure probability is over the randomness of S in
Lemma 68. Now, for some Zi with probability at least 0.99 it is kA− AZi ZiT k2F ≤ (1+ ε)kA − Ak k2F ,
where the failure probability is over the randomness in constructing Zi . Overall, given that n > 1,
with probability at least 0.49 (over the randomness of both S and Zi ; the failure probability follows
via a union bound) for each single Zi it is: kB̃i k2F ≤ 23 (1 + ε)kA − Ak k2F . Hence, since r = O(log 1δ )
and we have picked Z as the Zi that minimizes kB̃i k2F , it follows that with probability at least 1− δ,
kB̃i k2F ≤ 23 (1+ε)kA −Ak k2F . Combining with 21 kA−AZi ZiT k2F ≤ kB̃i k2F , and using a union bound,
it follows that with probability 1 − 1/n − δ: kA − AZi ZiT k2F ≤ 62 (1 + ε)kA − Ak k2F .
Running time. The following costs occur O(log( 1δ )) times: (i) O nnz(A) + (m + n) · poly(k, ε−1 )
to find Zi (via Lemma 67); (ii) O(nnz(A) log n + nk log(n)) to evaluate each cost, i.e., find kB̃i k2F .
9.1.3
Fast column sampling techniques
Section 8.1.1 presented the column sampling algorithms that we used in our distributed PCA
algorithm in Section 8. Next, we present the “fast” analogs of those algorithms. To design such
fast analogs we employ the sparse subspace embedding matrices in the previous section. All the
results in this section developed in [19]. There is a small difference in Lemma 70 below, hence we
present a short proof for completeness. Specifically, the original result in [19] has a constant failure
probability; here, via using standard arguments, we extended this result to a high probability
bound.
Lemma 70 (Input-Sparsity-Time Dual-Set Spectral-Frobenius Sparsification [19].). Let V ∈ Rw×k
be a matrix with w > k and V T V = Ik . Let E ∈ Rm×w be an arbitrary matrix. Let δ be a failure
probability parameter.
For i = 1, 2, . . . , r = O(log 1δ ), let Bi = EWiT ∈ Rm×ξ , where Wi ∈ Rξ×w is a randomly chosen
sparse subspace embedding with ξ = O(k2 /ε2 ) < w, for some 0 < ε < 1 (see Definition 65 and Lemma 66),
and run the algorithm of Lemma 57 with V, Bi , and some ℓ with k < ℓ ≤ w, to construct Si ∈ Rw×ℓ .
Choose some S from the Si ’s - see the proof for the details.
2
p 2
1+ε
· kEk2F .
Then, with probability at least 1 − δ, σk2 V T S ≥ 1 − k/ℓ and kESk2F ≤ 1−ε
The matrix S can be computed in O log 1δ · nnz(A) + ℓwk2 + mk 2 /ε2 + mℓ time. We denote this
procedure as S = BssSamplingSparse(V, A, r, ε, δ).
Proof. The algorithm constructs the Si ’s as follows, Si = BssSampling(V, Bi , r) - see Lemma 57.
p 2
From that lemma, we also have that σk2 V T Si ≥ 1 − k/ℓ and kBiT Sk2F ≤ kBiT k2F , i.e.,
kWi AT Si k2F ≤ kWi AT k2F . Since Wi is a subspace embedding, from Lemma 66 we have that with
probability at least 0.99 and for all vectors y ∈ Rn simultaneously, (1 − ε) kAT yk22 ≤ kWi AT yk22 .
Apply this r times for y ∈ Rn being columns from Si ∈ Rn×r and take a sum on the resulting
inequalities: (1 − ε) kAT Si k2F ≤ kWAT Si k2F ; also, apply this n times for the basis vectors in Rn
and take a sum on the resulting inequalities: kWA T k2F ≤ (1 + ε) kA T k2F . Combining all these
· kA T k2 .
inequalities together, we conclude that with probability at least 0.99, kAT Si k2F ≤ 1+ε
1−ε p F2
To summarize, for each Si and with probability at least 0.99, σk2 V T Si ≥ 1 − k/ℓ and
2
· kEk2F .
kESi k2F ≤ 1+ε
1−ε
50
Selection of S. Now that we have r matrices Si each of which satisfying the above bounds with
probability 0.99 we select one of them as follows: 1) we compute all σk2 V T Si and sort them from
the largest to the smallest value; 2) we compute all kAT Si k2F and sort them from the smallest to
the largest value; 3) we choose an Si which occurs in the top 2/3 fraction of each of the lists.
Correctness. Let Xi be an indicator random variable: Xi = 1 if the ith matrix Si satisfies σk2 V T Si ≥
p 2
P
1 − k/ℓ , and Xi = 0, otherwise. Then, Pr[Xi ] ≥ 0.99. Let X = ri Xi . The expected value of
X is µX = E [X] = 0.99r. A standard Chernoff bound applied on X gives: Pr[X ≤ (1 − α)µX ] ≤
µX α
e− 2 . Let (1 − α)0.99r = 0.75r, i.e., α = 0.14/0.99. Applying this to the Chernoff bound, we get:
Pr[X ≤ 0.75r] ≤ e−O(r) . Replacing r = O(log(1/δ)): Pr[X ≤ 0.75r] ≤ δ/2. This means precisely
p 2
that 3/4 of the fraction of the Si ’s satisfy with probability 1 − δ/2 : σk2 V T Si ≥ 1 − k/ℓ .
Similarly, let Yi be an indicator random variable: Yi = 1 if the ith matrix Si satisfies kESi k2F ≤
2
P
1+ε
· kEk2F , and Yi = 0, otherwise. Then, Pr[Yi ] ≥ 0.99. Let Y = ri Xi . The expected value of
1−ε
Y is µY = E [Y ] = 0.99r. A standard Chernoff bound applied on Y gives: Pr[Y ≤ (1 − α)µY ] ≤
µY α
e− 2 . Let (1 − α)0.99r = 0.75r, i.e., α = 0.14/0.99. Applying this to the Chernoff bound, we get:
Pr[Y ≤ 0.75r] ≤ e−O(r) . Replacing r = O(log(1/δ)): Pr[Y ≤ 0.75r] ≤ δ/2. This means precisely
2
1+ε
· kEk2F .
that 3/4 of the fraction of the Si ’s satisfy w.p. 1 − δ/2 : kESi k2F ≤ 1−ε
Now a simple union bound indicates that with probability at least 1 − δ, the following two
events happen simultaneously: X > 0.75r and Y > 0.75r. Since we select an element Si on top of
the two sorted lists, it follows that this element should have Xi = Yi = 1.
Running time. The following costs occur O(log( 1δ )) times: (i) O(nnz(A)) to find Bi . (i) O(ℓwk2 +
mξ) to find Si (via Lemma 57); and (iii) O(k 2 ℓ + mℓ) to evaluate each cost and, i.e., find σk2 V T Si
and kESi k2F . Additionally, O(log( 1δ ) log log( 1δ )) time in total is spent in sorting.
The following Lemma is the “fast” analog of Lemma 58. The failure probability in the lemma is
constant, but this is sufficient for our purposes since we apply this lemma only once in the global
column sampling step of the distributed PCA algorithm in Section 9.2.
Lemma 71 (Input-Sparsity-Time constant factor column-based matrix reconstruction; Lemma 6.3
2
in [19]). Given matrix G ∈ Rm×α of rank ρ and a target
rank k , there exists a randomized algorithm
−1
that runs in O nnz(A) · log α + m · poly(log α, k, ε ) time and selects c = 4k columns of G to form a
matrix C ∈ Rm×c such that with probability at least 0.69:
kG − CC† Gk2F ≤ 4820 ·
rank
X(G)
σi2 (G).
i=k+1
We denote this procedure as C = DeterministicCssF robeniusSparse(G, k, c).
Finally, the lemma below presents the “fast” analog of Lemma 59. The failure probability in
the lemma is, again, constant; we have not attempted to obtain a high probability bound since we
employ this lemma only once in the algorithm in Section 9.2.
2
The original Lemma 6.3 in [19] has the assumption that k < ρ, but this assumption can be dropped having the
result unchanged. The only reason the assumption k < ρ exists is because otherwise column subset selection is trivial.
51
Lemma 72 (Input-sparsity-time Adaptive Sampling [19]). Given A ∈ Rm×n and V ∈ Rm×c1 (with
c1 ≤ n, m), define the residual matrix Ψ = A − VV† A ∈ Rm×n . Let Ψ̃ = JLT (Ψ, 1). For j = 1, . . . , n,
let pj be a probability distribution such that, for some positive constant β ≤ 1, pj ≥ βkΨ̃
(j)
(j) 2
k2 /kΨ̃k2F ,
where Ψ̃ is the j-th column of the matrix Ψ̃. Sample c2 columns from A in c2 i.i.d. trials, where in each
trial the j-th column is chosen with probability pi . Let C2 ∈ Rm×c2 contain the c2 sampled columns and
let C = [V C2 ] ∈ Rm×(c1 +c2 ) contain the columns of V and C2 . Then, for any integer k > 0, and with
probability 0.9 − n1
2
2
kA − ΠF
C,k (A)kF ≤ kA − Ak kF +
30 · k
kA − VV† Ak2F .
β · c2
Given A and V, the algorithm takes O(nnz(A) log n + mc1 log n + mc21 ) time to find C2 . We denote this
sampling procedure as C2 = AdaptiveColsSparse(A, V, c2 , β).
9.1.4
Fast Low-rank matrix approximations within a subspace
Finally, we present the fast analog of the result in Section 8.1.3. The failure probability in the
lemma is, again, constant; we have not attempted to obtain a high probability bound since we
employ this lemma only once in the algorithm in Section 9.2.
Lemma 73. Let A ∈ Rm×n be the input matrix and V ∈ Rm×c be the input subspace. We further assume
that for some rank parameter k < c and accuracy parameter 0 < ε < 1 :
2
2
kA − ΠF
V,k (A)kF ≤ (1 + O(ε))kA − Ak kF .
Let V = YΨ be a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c . Let Ξ = Y T AW T ∈ Rc×ξ ,
where W T ∈ Rn×ξ with ξ = O(c/ε2 ), is a sparse subspace embedding matrix (see Definition 65 and
Lemma 66). Let ∆ ∈ Rc×k contain the top k left singular vectors of Ξ. Then, with probability at least 0.99,
kA − Y∆∆T Y T Ak2F ≤ (1 + ε)kA − Ak k2F .
Y and ∆ can be computed in O(nnz(A) + mcξ) time. We denote this procedure as
[Y, ∆] = ApproxSubspaceSV DSparse(A, V, k, ε).
Proof. This result was proven inside the proof of Theorem 1.5 in [36]. Specifically, the error bound
proven in [36] is for the transpose of A (also Y, ∆ are denoted with U, V in [36]). The only requirement for the embedding matrix W (denoted with P in the proof of Theorem 1.5 in [36]) is to be a
subspace embedding for Y T A, in the sense that W is a subspace embedding for A in Lemma 66.
Since our choice of W with ξ = O(c2 /ε2 ) satisfies this requirement we omit the details of the proof.
The running time is O(nnz(A)+mcξ): one can compute (i) Y in O(mc2 ); (ii) Ξ in O(nnz(A)+mcξ);
and (iii) ∆ in O(cξ min{c, ξ}). The failure probability 0.01 from Lemma 66.
9.2 Detailed description of the algorithm
This algorithm is very similar to the algorithm in Section 8.2; we only replace the parts 2-(a), 3-(a),
and 4-(b) with faster procedures.
Input:
1. A ∈ Rm×n partitioned column-wise A = A1
A2
2. rank parameter k < rank(A)
52
P
. . . As ; for i = 1 : s, Ai ∈ Rm×wi ; i wi = n.
3. accuracy parameter ε > 0
4. failure probability δ
Algorithm
1. Local Column Sampling
(a) For each sub-matrix Ai ∈ Rm×wi , compute Ci ∈ Rm×ℓ containing ℓ = O(k) columns from
Ai as follows: Ci = Ai Si . Here, Si has dimensions wi × ℓ and is constructed as follows:
Si = BssSamplingI(Ai , 4k, 1/2, 0.01/s) (see Lemma 56).
(b) Machine i sends Ci to the server.
2. Global Column Sampling
(a) Server constructs m × (s · ℓ) matrix G containing (s · ℓ) actual columns from A as follows:
G = C1 C2 . . . Cs . Then, server constructs C ∈ Rm×c1 via choosing c1 = 4k columns
from G as follows: C = DeterministicCssF robeniusSparse(G, k, c1 ) (see Lemma 71).
(b) Server sends C to all the machines.
3. Adaptive Column Sampling
(a) Server initializes the random seed and communicates it to all the machines. Each machine constructs the same S ∈ Rr×m , with r = (1/2)4+2
2 −(1/2)3 log n, each element of which is a random vari√
able which takes values ±1/ r with equal probability. Machine i finds Ψ̃i = SAi − SCC† Ai ∈
Rm×wi and then computes βi as it was described in Lemma 61. Machine i sends βi to server.
(b) Server computes probability distribution gi = Pβiβi . Server samples i.i.d. with replacement
i
⌈ 50k/ε ⌉ samples (machines) from gi . Then, server determines numbers ti (i = 1, 2, . . . , s),
where ti is the number of times the ith machine was sampled. It sends the ti ’s to the machines.
(c) Machine i computes probabilities qji = kxk22 /kΨ̃i k2F (j = 1 : wi ), where x is the jth column of
Ψ̃i . And now machine i samples ti samples fromP
it’s local probability distribution and sends
the corresponding columns to the server. Let c2 = i ti = ⌈ 50k/ε ⌉.
(d) Server collects the columns and assigns
them to Ĉ ∈ Rm×c2 . Server constructs C̃ to be the
m × (c1 + c2 ) matrix: C̃ = C; Ĉ . Let c = c1 + c2 = 4k + ⌈ 50k/ε ⌉.
4. Rank-k matrix in the span of C̃
(a) Server sends C̃ to all the machines and each machine computes (the same) qr factorization of
C̃: C̃ = YR where Y ∈ Rm×c has orthonormal columns and R ∈ Rc×c is upper triangular.
(b) Server initializes the random seed and sends this to each machine, such that each machine
generates the same matrix Ψ ∈ Rξ×n , for ξ = O(c2 /ε2 ), (see Definition 65). Machine i generates
Di ∈ Rn×wi such that implicitly D = D1 D2 . . . Ds is an n × n matrix each element of
ξ×wi
.
which is ±1, with probability 1/2. Each machine constructs implicitly
i ∈ R
Wi = Ψ · Dξ×n
and W
Implicitly all machines together generate W = W1 W2 . . . Ws , with W ∈ R
T
is a subspace embedding as in Definition 65. Machine i computes Hi = C̃ (Ai WiT ) ∈ Rc×ξ .
Machine i sends Hi to the server.
Ps
(c) Server computes Ξ = i=1 Hi ∈ Rc×ξ and sends this back to all the machines. Now machines
compute Ξ := R−1 · Ξ(:= Y T Ai WiT ), and then they compute ∆ ∈ Rc×k to be the top k left
singular vectors of Ξ. Each machine computes U = Y · ∆ ∈ Rm×k .
53
Discussion. A few remarks are necessary for the last two stages of the algorithm. The third stage
(adaptive column sampling), implements the adaptive sampling method of Lemma 72. To see this
note that each column in A is sampled with probability
qji · gi ≥
1
· ||x||22 /kΨ̃k2F ,
2
where x is this column in Ψ̃. This follows from Lemma 60. Overall, this stage constructs Ĉ such
that Ĉ = AdaptiveColsSparse(A, C, c2 , 1/2).
The last stage in the algorithm implements the algorithm in Lemma 73. To see this, note that
W satisfies the properties in the lemma. Hence,
[Y, ∆] = ApproxSubspaceSV DSparse(A, C̃, k, ε).
9.3 Main result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm.
Theorem 74. The matrix C̃ ∈ Rm×c with c = O(k/ε) columns of A satisfies w.p. 0.59 −
s+1
n
rank
X(A)
(A)k2F ≤ (1 + O(ε)) ·
kA − C̃C̃ Ak2F ≤ kA − ΠF
σi2 (A) .
C̃,k
†
− 2δ:
(15)
i=k+1
The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.58 −
kA − UUT Ak2F ≤ (1 + O(ε)) ·
rank
X(A)
i=k+1
s+1
n
− 2δ:
σi2 (A) .
(16)
Let each column of Ahas at most φ non-zero elements. Then, the communication cost of the algorithm is
O skφε−1 + sk3 ε−5 and the running time is
ns
ns
O nnz(A) · log2
+ (m + n)s · poly(k, ε−1 , log
.
δ
δ
9.4 Proof of Theorem 74
9.4.1
Proof of Eqn. 15
From Lemma 72, we have that with probability at least 0.9 − n1 :
†
(A)k2F ≤
kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
rank
X(A)
i=k+1
σi2 (A) +
60ε
· kA − CC† Ak2F .
50
(17)
According to Lemma 64, G is a (4k, 1/2)-projection-cost preserving sketch of A. It means that there
exists a constant c which is independent from projection matrix P and we have the following:
3
1
kA − PAk2F ≤ kG − PGk2F + c ≤ kA − PAk2F
2
2
54
For convenience, we use PG to denote a rank-k projection matrix which provides the best rank-k
approximation Gk = PG G to matrix G. We also use PA to denote a rank-k projection matrix
which provides the best rank-k approximation Ak = PA A to matrix A. With probability at least
0.68, the following will be held,
1
kA − CC† Ak2F ≤ kG − CC† Gk2F + c
2
≤ 4820kG − PG Gk2F + c
≤ 4820kG − PA Gk2F + c
≤ 4820 kG − PA Gk2F + c
4820
≤
kA − PA Ak2F
2
The first inequality is due to Lemma 64. G is a (4k, 1/2)-projection cost preserving sketch of A
and C has rank at most 4k. The second inequality is based on Lemma 71. The third inequality is
because PG provides the best rank-k approximation to G. The fourth inequality used the fact c is
non-negative. The fifth inequality held because G is a (4k, 1/2)-projection cost preserving sketch
of A. Thus,
kA − CC† Ak2F ≤ 4820kA − Ak k2F
Concluding the proof. Combining with Equation 17, we have:
†
kA − C̃C̃ Ak2F ≤ kA − ΠF
(A)k2F ≤
C̃,k
9.4.2
rank
X(A)
i=k+1
σi2 (A) + O(ε) ·
rank
X(A)
σi2 (A).
(18)
i=k+1
Proof of Eqn. 16
We would like to apply Lemma 73 for the matrix U ∈ Rm×k in the algorithm. Note that we already
proved that the matrix C̃ in the algorithm satisfies with probability 0.59 − s+1
n − 2δ:
kA − ΠF
(A)k2F ≤ (1 + O(ε))kA − Ak k2F .
C̃,k
Lemma 73 and a simple union bound conclude the proof.
9.4.3
Running time
1. Local Column Sampling: O(nnz(A) log(ms) + m · poly(k, ε, log(s))) arithmetic operations in
total.
(a) O(nnz(Ai ) log(ms) + m · poly(k, ε, log(s))) for each Si
(b) -
2. Global Column Sampling: O nnz(A) · log k + m · poly(k, ε−1 ) .
(a) O nnz(A) · log k + m · poly(k, ε−1 ) to construct C - from Lemma 71.
(b) -
55
3. Adaptive Sampling: O(nnz(A) · log n + m · s · poly(k, ε−1 , log n)).
(a) First, we analyze the cost to compute the matrix Ψ̃i . O(k2 m) for each C† locally; then,
we compute (SAi ) − (((SCi )C†i )Ai ). The costs are: SAi := D takes O(nnz(Ai )) time,
SCi := G takes O(nnz(Ai ) log(n)) time, GC†i := H takes O(m log(n)k/ε2 ) time, HA :=
L takes O(nnz(Ai ) log(n)) time, and D − L takes O(n log n) time. So, the total time to
compute one Ψ̃i is O(nnz(Ai ) log n + m · poly(k, ε−1 , log n)).
Also, there is a cost of computing ψi , which is O(log n · wi ) arithmetic operations.
(b) O(s) in total.
(c) O(k/ε) in total using the method of [51] locally.
(d) O(k/ε).
4. Rank-k matrix in span(C̃): O(nnz(A) + m · s · poly(k, ε−1 )) arithmetic operations in total.
(a) O(smk 2 /ε2 ) in total.
(b) O(sn) in total to generate s times the same Ψ. Then another O(n) in total to generate
the Di ’s. For all Ai WiT we need O(nnz(A)) operations and then another O(mk 3 ε−7 ) for
each Y T · (Ai WiT )
(c) O(sk 3 ε−5 ) to find Ξ; then another O(sk3 ε−3 + sk4 ε−6 )) to update Ξ locally in each
machine and another O(sk 4 ε−6 ) to find ∆; and O(smk 2 /ε) to find U (s times).
9.4.4
Communication Complexity
Assume that we can represent each element in the input matrix A with at most b bits. Also, we
assume that one word has length b bits and b = O(log(mns/ε)).
1. Local Column Sampling: O(skφ) words.
(a) (b) O(skφ) elements of A.
2. Global Column Sampling:O(skφ) words.
(a) (b) O(skφ) elements of A.
3. Adaptive Sampling: O(s + φk/ε) words.
(a) s integers each of which is representable with O(log k+log log(mns/ε)) (from Lemma 61).
(b) s integers (the ti ’s) each with magnitude at most n, hence representable with b bits.
(c) O(φk/ε) elements of A.
(d) 4. Best rank-k matrix in the span of C̃: O(sφk/ε + sk 3 ε−5 ) words.
(a) O(skφε−1 ) elements of A.
(b) O(sk 3 ε−5 ) numbers each of which can be represented with b bits.
(c) O(sk 3 ε−5 ) numbers each of which can be represented with b bits.
In total the communication complexity is O(skφ/ε + sk 3 /ε5 ) words.
56
10 Lower bounds
Only in Section 10.1, we discuss the result in arbitrary partition model. In Section 10.2, Section 10.3
and Section 10.4, we discuss results in column partition model which provides stronger lower
bounds than in arbitrary partition model.
10.1 Dependence on Ω(ε−2 ) bits for distributed PCA in arbitrary partition model
Lemma 75 (Theorem 8 in [54]). There are two machines, and each of them hold a matrix Ai ∈ Rm×n .
Let A = A1 + A2 . Suppose ε2 ≤ 2n, the communication of computing a rank-k matrix U with constant
probability such that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F
needs Ω(1/ε2 ) bits.
Proof. (from [54]). The reduction is from GHD problem.
Lemma 76 (Theorem 1.1 in [20]). Each of two machines has an n-bit vector. There is a promise: either
√
√
the inputs are at Hamming distance less than n/2 − c n or greater than n/2 + c n. If they want to
distinguish these two cases with constant probability, the communication required Ω(n) bits.
Without loss of generality, we assume 1/ε2 is an integer, and machine 1 and machine 2 have
2
x, y ∈ {−1, 1}1/ε respectively. There is a promise that either xT y < −2/ε or xT y > 2/ε holds.
Consider about the following protocol:
1. Machine 1 constructs A1 ∈ R(k+1)×(1/ε
xT ε √0
0
2
A1 =
0
0
...
...
0
0
0
√ 0
2 +k)
, and machine 2 constructs A2 ∈ R(k+1)×(1/ε
...
...
0
0
...
...
...
0
...
0
...
√
2(1+ε)
ε
2(1+ε)
ε
A2 =
y T ε 0 0 ... 0
0
0 0 ... 0
0
0 0 0 0
... ... ... ... ...
0
0 0 ... 0
2 +k)
:
2. The server computes U such that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F
and sends U to both of two machines, where A = A1 + A2 .
3. Let P = Ik+1 − UUT . Each machine construct v = P(1) /kP(1) k2
4. Each machine checks whether v12 < 21 (1 + ε). If yes, return the case xT y > 2/ε. Otherwise
return the case xT y < 2/ε
Suppose the server successfully computes U. Since the rank of A is at most k + 1:
kA − UUT Ak2F = kPAk2F
= kvAk22
= vAAT v T
57
An observation is that
AAT =
kx + yk22 ε2 0
0
2
0
0
...
...
0
0
0
0
2(1+ε)
ε2
...
0
...
...
...
...
...
0
0
0
...
2(1+ε)
ε2
We have kA − Ak k2F ≤ 2. Then,
k+1
2(1 + ε) X 2
vi =
ε2
i=3
2(1 + ε)
(1 − v12 − v22 )
ε2
< 2(1 + ε)
We have v12 + v22 > 1 − ε2 . When xT y > 2/ε, kx + yk22 ε2 ≥ 2 + 4ε
(1 + ε)kA − Ak k2F = 2(1 + ε)
> v12 (2 + 4ε) + 2v22
> 2 − 2ε2 + 4εv12
So, v12 < 12 (1 + ε). When xT y < −2/ε, kx + yk22 ε2 ≤ 2 − 4ε
(1 + ε)kA − Ak k2F = kx + yk22 ε2 (1 + ε)
> v12 kx + yk22 ε2 + 2v22
= 2(v12 + v22 ) − (2 − kx + yk22 ε2 )v12
> 2(1 − ε2 ) − (2 − kx + yk22 ε2 )v12
So,
v12 >
1
2(1 − ε2 ) − kx + yk22 ε2 (1 + ε)
≥ (1 + ε)
2
2
2
2 − kx + yk2 ε
Therefore, machines can distinguish these two cases. The only communication is computing U.
This cost shoulde be the same as Ω(1/ε2 ) bits lower bound of the gap hamming distance problem.
10.2 Lower bounds for distributed PCA on dense matrices
This section provides a communication cost lower bound for the Distributed PCA problem of
Definition 17. Specifically, we describe the construction of an m × n matrix A (hard instance), and
formally argue that for this A, any k ≤ 0.99m, and any error parameter C with 1 < C < poly(skm),
if there exists some algorithm to construct an m × k matrix U such that, with constant probability,
kA − UUT Ak2F ≤ C · kA − Ak k2F , then this algorithm has communication cost Ω(skm) words.
10.2.1
Preliminaries
We use the notation Gk,m to denote the set of k-dimensional subspaces of Rm , which we identify
with corresponding projector matrices Q ∈ Rm×m , with rank(Q) = k ≤ m, onto the subspaces,
i.e.,
Gk,m = {Q ∈ Rm×m : Q2 = Q, rank(Q) = k ≤ m.}
58
We also need a description of a subset from Gk,m:
Cδk (P) = {Q ∈ Gk,m : kP − Qk2 ≤ δ}.
This is the set of those projectors Q ∈ Gk,m which differ in operator norm by at most δ from
another fixed projector P ∈ Gk,m . In our analysis below we also need a result from [38]:
Theorem 77. (Net Bound - Corollary 5.1 of [38]) For any m, k, δ > 0, there is a family N = {P1 , . . . , PN },
N = 2Ω(k(m−k) log(1/δ)) , where Pi ∈ Gk,m and Cδk (Pi ) ∩ Cδk (Pj ) = ∅, for all i 6= j.
Theorem 77 proves the existence of a large, but finite, set N of projection matrices, such that if
one considers the ball of matrices of operator norm at most δ centered at each matrix in N , then
these balls are disjoint. Our hard instance matrix A is constructed from some member in N .
10.2.2
Hard instance construction
Recall that in the column-partition model of Definition 15 there are s servers holding matrices
A1 , . . . , As , respectively,
P where Ai has m rows and some subset of wi 3columns of some m × n
matrix A. Notice that wi = n. First of all, for arbitrary m, s we assume that n ≥ sm. Below, we
describe a specific construction for a matrix A.
First of all, we set δ = 1/(skm), the parameter to be used in Theorem 77. Next, fix a family N
of subspaces of Gk,m with the guarantees of Theorem 77. Let PR = RRT be a uniformly random
member of N , where R ∈ Rm×k has orthonormal columns (any projector can be expressed as
such a matrix, where the columns of R span the subspace that P projects onto). The entries of
A1 are equal to the entries of R, each rounded to the nearest integer multiple of 1/B, where
B = poly(skm) is a large enough parameter specified later. We denote this rounded matrix with
k
R̃ ∈ Rm×k . So, if αij is the (i, j)th entry in A1 , then αij = kmin
B , with kmin = argmin |Rij − B |. Each
k∈Z
Ai for i = 2, 3, . . . , s − 1 is 1/B times the m × m identity matrix. Finally, As is the m × t matrix of
all zeros with t = n − (s − 1)m − k. I.e.,
A = R̃ B1 Im B1 Im . . . B1 Im 0m×t .
10.2.3
Intermediate results
First, we give a bound regarding the best rank k approximation for the above matrix A.
Lemma 78. For the matrix A ∈ Rm×n in Section 10.2.2, and any k ≤ 0.99m : kA − Ak k2F <
sm
.
B2
Proof. We have,
kA − Ak k2F ≤ kA − A1 A†1 Ak2F
X
=
k(I − A1 A†1 )Ai k2F
i>1
≤
X
i>1
kAi k2F
m
= (s − 2) · 2
B
sm
<
,
B2
As, otherwise we can choose a value s′ < s so that n − m ≤ s′ m ≤ n and apply the argument of Theorem 82 with
s replaced with s′ . Then, the lower bound in Theorem 82 will then be Ω(s′ mk), which assuming n ≥ 2d, is an Ω(n)
communication lower bound
3
59
where the first inequality uses the fact that A1 A†1 is a matrix of rank at most k, the first equality
uses the fact that (I − A1 A†1 )Ai is the all-zeros matrix, the second inequality uses that a projector
cannot increase a unitarily invariant norm, and the third inequality follows by construction.
Next, we bound, in the operator norm, the difference of A1 from the matrix R. The lemma
follows from the fact that A1 ∈ Rm×k is obtained by R ∈ Rm×k by rounding each entry to the
nearest integer multiple of 1/B, and then summing the squared differences across all km entries.
Lemma 79. (Precision Lemma) kA1 − Rk2 ≤
Proof. kA1 − Rk22 ≤ kA1 − Rk2F ≤
√
km
B .
km
.
B2
Next, we prove a pure linear algebraic result. The following lemma captures the fact that if
some P ∈ Gk,m is close to QP (in Frobenius norm) for Q ∈ Gk,m , then P is also close to Q (in
Frobenius norm). We will use this lemma later for P = PR .
Lemma 80. (Error Measure) Let P, Q ∈ Gk,m with kP − QPk2F ≤ ∆. Then kP − Qk2F ≤ 2∆.
Proof. By the matrix Pythagorean theorem,
k = kQk2F = kQPk2F + kQ(I − P)k2F .
(19)
Also by the matrix Pythagorean theorem,
k = kPk2F = kQPk2F + k(I − Q)Pk2F ,
and so using the premise of the lemma, kQPk2F ≥ k − ∆. Combining with (19),
kQ(I − P)k2F ≤ ∆.
(20)
Hence,
kP − Qk2F = k(P − Q)Pk2F + k(P − Q)(I − P)k2F
= kP − QPk2F + kQ − QPk2F
≤ ∆ + kQ(I − P)k2F
≤ 2∆,
where the first equality follows by the matrix Pythagorean theorem, the second equality uses
P2 = P (since P is a projector), the third equality uses the bound in the premise of the lemma, and
the fourth inequality uses (20).
10.2.4
Main Argument
Before presenting the main theorem, we give an intermediate technical lemma.
Lemma 81. (Implication of Correctness) Let A ∈ Rm×n be the hard instance matrix in Section 10.2.2 and
let A be distributed in s machines in the way it was described in Section 10.2.2:
A = R̃ B1 Im B1 Im . . . B1 Im 0m×t .
Suppose n = Ω(sm), k < rank(A), and 1 < C < poly(skm). A is revealed to the machines by just
describing the entries in A and without specifying any other detail regarding the construction. Given
this A and assuming further that each machine knows some projector matrix Q ∈ Rm×m with rank at
most k such that kA − QAkF ≤ CkA − Ak kF , there is a deterministic algorithm (protocol) which, upon
termination, leaves on each machine the matrix R ∈ Rm×k which was used to construct A1 .
60
1
Proof. First, we prove that kRRT − Qk2 < 2skm
. Then, using this bound, we describe a protocol
that deterministically reveals the matrix R which was used to construct A1 .
, which in
Using Lemma 78 and the premise in the lemma, it follows that: kA − QAk2F ≤ C sm
B2
particular implies that
kA1 − QA1 k2F ≤ C
sm
.
B2
(21)
We further manipulate the term kA1 − QA1 kF as follows:
kA1 − QA1 kF = k(I − Q)A1 kF
= k(I − Q)RRT + (I − Q)(A1 − RRT )kF
≥ k(I − Q)RRT kF − k(I − Q)(A1 − RRT )kF
≥ k(I − Q)RRT kF − kI − QkF k(A1 − RRT )k2
√
√
km √
T
≥ k(I − Q)RR kF −
( m + k),
B
where the first inequality is the triangle inequality, the second inequality uses sub-multiplicativity,
and the third inequality uses the triangle inequality, i.e., that kI − QkF ≤
kIkF + kQk
, and Lemma
√ F
√
T
Csm
2m k
79. Combining this bound with (21), it follows that k(I − Q)RR kF ≤ B + B . At this point
we would like to apply Lemma 80 to conclude that kRRT − QkF is small. To do so, we need RRT
and Q to be of rank k. While R has rank k by construction, Q may not. However, increasing the
rank of Q cannot increase the error kA−QAkF . Hence, if rank(Q) < k, given Q, the protocol in the
premise of the lemma allows each server to locally add standard basis vectors to the column space
of Q until the column space of Q becomes k. This involves no communication and each server
ends up with the same new setting of Q, which for simplicity we still denote with Q. Therefore,
rank(Q) = k. Applying Lemma 80, it now follows that
√ !
√
√
Csm 2m k
T
T
+
.
kRR − Qk2 ≤ kRR − QkF ≤ 2
B
B
1
.
By setting B to be a sufficiently large poly(skm), we have kRRT − Qk2 < 2skm
i
Therefore, given Q, by Theorem 77 there is a unique matrix P in N for which Q ∈ Cδk (Pi ),
1
1
with δ = skm
. Indeed, since kR − Qk2 ≤ skm
< δ/2, there cannot be two matrices Pi and Pj for
i 6= j for which Q ∈ Cδk (Pi ) and Q ∈ Cδk (Pj ) since then by the triangle inequality kPi − Pj k2 < δ,
contradicting the construction of N . Hence, it follows that each machine can deterministically
identify this Pi , by enumeration over N , and therefore compute R, via, for example, an SVD.
We are now fully equipped to present the main argument about the communication cost lower
bound for distributed PCA.
Theorem 82. (Main) Let A ∈ Rm×n be the hard instance matrix in Section 10.2.2 and let A be distributed
in s machines in the way it was described in Section 10.2.2:
A = R̃ B1 Im B1 Im . . . B1 Im 0m×t .
Suppose n = Ω(sm), k ≤ .99m, and 1 < C < poly(skm). Assume that there is an algorithm (protocol)
which succeeds with probability at least 2/3 in having the i-th server output QAi , for all i, where Q ∈
Rm×m is a projector matrix with rank at most k such that kA − QAkF ≤ CkA − Ak kF . Then, this
algorithm requires Ω(skm log(skm)) bits of communication.
61
Further, the bound holds even if the input matrices Ai to the servers have all entries which are integer
multiples of 1/B, for a value B = poly(skm), and bounded in magnitude by 1, and therefore all entries can
be specified with O(log(skm)) bits.
Note that assuming a word size of Θ(log(skm)) bits, we obtain an Ω(skm) word lower bound.
Proof. If the protocol succeeds, then, since each server outputs QAi , and Ai is 1/B times the
identity matrix for all i = 2, 3, ...s − 1, each of those servers can compute Q. One of those servers
can now send this Q to the first and the last server. It follows by Lemma 81, that each server can
identify PR and R.
Letting E be the event that the protocol succeeds, and letting Πi be the ordered sequence of all
incoming and outgoing messages at the i-th server, it follows that
I(Πi ; Q | E) = Ω(log |N |) = Ω(km log(smk)),
where I(X; Y | F) = H(X | F)−H(X | Y, F) is the mutual information between random variables
X and Y conditioned on F. To see the first equality in the above, observe that I(Πi ; Q | E) = H(Q |
E) − H(Q | Πi , E), and conditioned on E, there is a uniquely determined matrix PR each server
identifies, which is uniform over a set of size |N |, and so H(Q | E) ≥ H(PR ) = Ω(log2P
|N |).
Here, H(X) is the Shannon entropyP
of a random variable X, given by H(X) = x Pr[X =
x] log(1/ Pr[X = x]), and H(X | Y ) = y Pr[Y = y]H(X | Y = y) is the conditional Shannon
entropy.
Hence, if Z is an indicator random variable which is 1 if and only if E occurs, then using that
I(X; Y ) ≥ I(X; Y | W ) − H(W ) for any random variables X, Y, and W , and that I(X; Y | W ) =
P
w Pr[W = w]I(X; Y | W = w), we have
I(Πi ; Q) ≥ I(Πi ; Q | Z) − 1
≥ I(Πi ; Q | Z = 1) Pr[Z = 1] − 1
= Ω(km log(smk)),
mapping X to Πi , Y to Q, and W to Z in the mutual information bound above. It follows that
Ω(km log(smk)) ≤ I(Πi ; Q) ≤ H(Πi ) ≤ EPR ,rand [|Πi |],
where |Πi | denotes the length, in bits, of the sequence Πi , and rand is the concatenation of the
private randomness of all s players Note that the entropy of Πi is a lower bound on the expected encoding length of |Πi |, by the Shannon coding theorem. By linearity of expectation,
P
kΠi | = Ω(skm log(smk)), which implies there exists an R and setting of rand for which
Pi ER,rand
i
i kΠ | = Ω(skm log(smk)). It follows that the total communication is Ω(smk log(smk)) bits.
10.3 Lower bounds for distributed PCA on sparse matrices
Applying the previous theorem with m = φ gives a communication lower bound for sparse matrices.
Corollary 83. Let A ∈ Rφ×n be the hard instance matrix in Section 10.2.2 (with m replaced with φ in
noting the number of rows in A):
A = R̃ B1 Iφ B1 Iφ . . . B1 Iφ 0φ×t .
Suppose n = Ω(sφ), k ≤ .99φ, and 1 < C < poly(skφ). Now, for arbitrary m consider the matrix
 ∈ Rm×n which has A in the top part and the all-zeros (m − φ) × n matrix in the bottom part.  admits
the same column partition as A after padding with zeros:
62
 =
R̃
1
B Iφ
1
B Iφ
0(m−φ)×k 0(m−φ)×φ 0(m−φ)×φ
1
...
0φ×t
B Iφ
.
. . . 0(m−φ)×φ 0(m−φ)×t
We denote the new sub-matrices with Âi ∈ Rm×wi .
Assume that there is an algorithm (protocol) which succeeds with probability at least 2/3 in having the
i-th server output Q̂Âi , for all i, where Q̂ ∈ Rm×m is a projector matrix with rank at most k such that
k − Q̂ÂkF ≤ Ck − Âk kF . Then, this algorithm requires Ω(skφ log(skφ)) bits of communication.
Note that assuming a word size of Θ(log(skφ)) bits, we obtain an Ω(skφ) word lower bound.
10.4 Lower bounds for distributed column-based matrix reconstruction
In this section we develop a communication lower bound for the Distributed Column Subset Selection Problem of Definition 19.
10.4.1
A Net of discretized Deshpande-Vempala hard instances
We start by describing the construction of a special sparse matrix from the work of Desphande and
Vempala [27], which was further studied by [17]. This matrix gives a lower bound (on the number
of columns need to be selected in order to achieve a certain accuracy) for the standard column
subset selection problem (see the following Fact). Suppose φ ≥ 2k/ǫ. Consider a (φ + 1) × φ matrix
B for which the i-th column is e1 + ei+1 , where ei is the i-th standard basis vector in Rφ+1 . Now
define an ((φ + 1)k) × (φk) matrix A with k blocks along the diagonal, where each block is equal
to the matrix B. Let n = (φ + 1)k.
Fact 84. (Proposition 4 in [27], extended in Theorem 37 of [17]) Let A be as above. If P is an n×n projection
operator onto any subset of at most k/(2ǫ) columns of A, then kA − PAk2F > (1 + ǫ)kA − Ak k2F .
To prove a communication lower bound for distributed column subset selection, we will need
to transform the above matrix A by multiplying by a rounded orthonormal matrix, as follows. We
also need to prove a similar lower bound as in the previous fact for this transformed matrix.
Lemma 85. Let A, k, φ, 1/ε, and n be as above. For any n × n orthonormal matrix L, let L̃ denote
the matrix formed by rounding each of the entries of L to the nearest integer multiple of M , where M ≤
1/((φ + 1)k)c , for a sufficiently large constant c > 0. If P is an n × n projection operator onto any subset
of at most k/(6ǫ) columns of L̃A, then kL̃A − PL̃Ak2F > (1 + ǫ)kL̃A − [L̃A]k k2F .
Proof. We will show that, assuming 1/ε < n/3, if P is an n × n projection operator onto any subset
of at most k/(2ǫ) columns of L̃A, then kL̃A − PL̃Ak2F > (1 + ǫ/3)kL̃A − [L̃A]k k2F . The lemma will
then follow by replacing ε with 3ε.
Suppose S is a subset of k/(2ǫ) columns of L̃A for which
kL̃A − PL̃Ak2F ≤ (1 + ǫ/3)kL̃A − [L̃A]k k2F ,
(22)
where P is the projection onto the columns in S and [L̃A]k is the best rank-k approximation to L̃A
The proof strategy is to relate the left hand side of (22) to kA − QAk2F where Q is the projection
onto the columns of A indexed by the same index set S, and simultaneously to relate the right
hand side of (22) to kA − Ak k2F .
We start by looking at kL̃A − [L̃A]k kF . Notice that L̃A = LA + EA, where E is a matrix whose
entries are all bounded in magnitude by M . Therefore, L̃A = LA + F, where F = EA and
1/2
1/2
kFk2 ≤ kEkF kAkF ≤ n2 M 2
· (2(n − 1))1/2 ≤ 2n3 M 2
,
63
where we have used kAkF ≤ (2(n − 1))1/2 . By Weyl’s inequality (Corollary 7.3.8 of [34]), for all
i ≤ φk,
1/2
|σi (LA) − σi (LA + F)| ≤ kFk2 ≤ 2n3 M 2
,
where σi (X) denotes the i-th singular value of a matrix X. Since L is orthonormal, σi (LA) = σi (A)
for all i. It follows that
X
kL̃A − [L̃A]k k2F =
σi2 (L̃A)
i>k
X
1/2 2
=
σi (LA) ± 2n3 M 2
i>k
X
1/2 2
=
σi (A) ± 2n3 M 2
i>k
= kA − Ak k2F ± O(nkAk2 n3 M 2
= kA − Ak k2F ± O(1/n2 ),
1/2
+ n4 M 2 )
(23)
where the final line follows for a sufficiently small choice of M ≤ 1/nc , using that kAk2 ≤ kAkF =
√
O( n).
We now look at kL̃A − PL̃AkF . By the triangle inequality,
kL̃A − PL̃AkF ≥ kLA − PLAkF − kEAkF − kPEAkF
≥ kLA − PLAkF − kEkF kAkF − kPk2 kEkF kAkF
= kA − LT PLAkF − O(1/n3 ),
(24)
where the equality uses that multiplying by LT preserves norms, as well as that kEkF ≤ 1/poly(n)
for an arbitrarily small poly(n) by making M ≤ 1/nc sufficiently small, whereas kPk2 ≤ 1 and
√
kAkF = O( n). We claim LT PL = Q, where Q is the projection onto the columns in A indexed
by the set S. To see this, let U be an orthonormal basis for the columns in A spanned by the index
set S, so that P = LUUT LT . Then LT PL = UUT = Q. Hence, using that kA − QAkF ≤ kAkF =
√
O( n) and squaring (24), we have,
kL̃A − PL̃Ak2F ≥ kA − QAk2F − O(1/n2 ).
(25)
Combining (22), (23), and (25),
kA − QAk2F ≤ (1 + ǫ/3)kA − Ak k2F + O(1/n2 ).
(26)
Note that kA − Ak kF ≥ 1 for any k < n, since if we remove the top row of A, creating a matrix B,
then kB − Bk kF ≤ kA − Ak kF , yet B is the identity matrix, and so kB − Bk kF ≥ 1. It follows that
the additive O(1/n2 ) error in (26) translates into a relative error, provided k < n and for 1/ε < n/3.
Hence, kA − QAk2F ≤ (1 + ǫ)kA − Ak k2F , and therefore by Fact 84, we have |S| > k/(2ǫ).
10.4.2
Column sharing of discretized orthonormal matrices
We need the following technical lemma about sampling random orthonormal matrices, concerning the number of columns they have in common after rounding.
64
Lemma 86. Let 1 ≤ r ≤ n, and let M ≤ 1/nc for a sufficiently large absolute constant c > 0. Suppose we
choose two independently random orthogonal matrices A ∈ Rn×n and B ∈ Rn×n from the Haar measure
(so they each have orthonormal columns and orthonormal rows). We then round each of the entries in A to
the nearest integer multiple of M , obtaining a matrix Ã, and similarly obtain B̃. Let E denote the event that
there exist r distinct indices i1 , . . . , ir ∈ [n] and r distinct indices j1 , . . . , jr ∈ [n] for which Ã∗,iℓ = B̃∗,jℓ
for all ℓ = 1, 2, . . . , r, where Ã∗,iℓ denotes the iℓ -th column of Ã. Then, Pr[E] ≤ e−Θ(nr log M ) .
Proof. We fix a subset S of r distinct indices i1 , . . . , ir ∈ [n] and a subset T of r distinct indices
j1 , . . . , jr ∈ [n] and show that the probability Ã∗,iℓ = B̃∗,jℓ simultaneously for all ℓ ∈ [r] is at most
e−Θ(nr log M ) . It then follows by a union bound that
ne 2r
n
n
−Θ(nr log M )
e−Θ(nr log M ) ≤ e−Θ(nr log M ) ,
Pr[E] ≤
·
·e
≤
r
r
r
as desired.
Since A and B are independent and their distribution is permutation-invariant, we can assume
iℓ = jℓ = ℓ for ℓ ∈ [r]. Let F be the event that Ã∗,iℓ = B̃∗,jℓ occurs for all ℓ ∈ [r]. If F occurs, then
√
we need kA∗,iℓ − B∗,jℓ k∞ ≤ M for all ℓ ∈ [r], which implies kA∗,iℓ − B∗,jℓ k2 ≤ nM for all ℓ ∈ [r].
Let Ar be the leftmost r columns of A, and Br the leftmost r columns of B. Then, if F occurs
r
kA −
Br k22
r
≤ kA −
Br k2F
=
r
X
ℓ=1
kA∗,ℓ − B∗,ℓ k22 ≤ rnM 2 .
Note that Ar and Br have orthonormal columns, and so PAr = (Ar )(Ar )T and PBr = (Br )(Br )T
are projection matrices. Then,
kAr − Br k2 ≥ k(Ar )(Ar )T − Br (Ar )T k2 /2 + k(Ar )(Br )T − (Br )(Br )T k2 /2
= k(Ar )(Ar )T − (Ar )(Br )T k2 /2 + k(Ar )(Br )T − (Br )(Br )T k2 /2
≥ k(Ar )(Ar )T − (Br )(Br )T k2 /2,
(27)
where the first inequality follows since multiplying by a matrix on the right with orthonormal
rows cannot increase the spectral norm, the equality follows by taking transposes, and the second
inequality follows by the triangle inequality.
We need another result from [38].
Theorem 87. (Probability Bound - Claim 5.2 of [38]) Suppose we choose two independent random subspaces Y and S of Rn each of dimension r from the Haar measure, where we denote the projection operators
onto the subspaces by YY T and SST , respectively, where Y and S have r orthonormal columns. Then for
any δ ∈ (0, 1), Pr[kYY T − SST k2 ≤ δ] ≤ e−Θ(r(n−r) log(1/δ)) .
Combining (27) with Theorem 87, we have that for r ≤ n/2, Pr[F] ≤ e−Θ(rn log(M )) , since by
√
taking M ≤ 1/nc sufficiently small, we can ensure kAr − Br k2 ≤ rnM ≤ M 1/2 , and so 2M 1/2
upper bounds k(Ar )(Ar )T − (Br )(Br )T k2 .
Note that if r > n/2, then in particular we still have that Ã∗,iℓ = B̃∗,jℓ for all ℓ ∈ [r/2], and
therefore in this case we also have Pr[F] ≤ e−Θ(rn log M ) . Hence, Pr[E] ≤ e−Θ(rn log M ) , which
completes the proof.
We now extend Lemma 86 to a k-fold version.
65
Lemma 88. Let M ≤ 1/nc for a sufficiently large absolute constant c > 0. Suppose we independently
choose k pairs of matrices Az , Bz ∈ Rn×n , z ∈ [k], each with orthonormal columns (and hence also
orthonormal rows). We then round each of the entries in each Az and Bz to the nearest integer multiple
of M , obtaining matrices Ãz , and B̃z . Let r = (r1 , . . . , rk ) ∈ (Z≥0 )k and let E be the event that for each
z ∈ [k], there exist distinct indices i1 , . . . , irz ∈ [n] and j1 , . . . , jrz ∈ [n] for which Ãz ∗,iℓ = B̃z ∗,jℓ for all
Pk
ℓ = 1, 2, . . . , rz . Then, Pr[E] ≤ e−Θ(n z=1 rz log M ) .
Proof. This follows by Lemma 86, and the fact that the matrices A1 , . . . , Ak , B1 , . . . , Bk are jointly
independent. Here we also use a union bound.
Corollary 89. Suppose 1 ≤ k < c0 n for an absolute constant c0 > 0. Let r = (r1 , . . . , rk ) ∈ (Z≥0 )k . Let
M ≤ 1/nc for a sufficiently large constant c > 0. There exists a set N of eΘ(nt log M ) k-tuples (Ã1 , . . . , Ãk )
of matrices each of dimensions n × n with entries that are integer multiples of M and bounded in magnitude
P
by 1, such that for every vector r = (r1 , . . . , rk ) ∈ (Z≥0 )k with kz=1 rz ≤ t, it holds that for all distinct ktuples (Ã1 , . . . , Ãk ), (B̃1 , . . . , B̃k ), there exists a z ∈ [k] for which there are no sets S = {i1 , . . . , irz }, T =
{j1 , . . . , jz } ⊂ [n] for which Ã∗,iℓ = B̃∗,jℓ for all ℓ = 1, 2, . . . , rz .
Proof. For a fixed vector r and a random choice of (A˜1 , . . . , A˜k ), (B˜1 , . . . , B˜k ), by the guarantee of
Lemma 88, the complement of the event in the statement of the corollary happens with probability
P
at most e−Θ(nt log M ) . The number of vectors r with kz=1 rz ≤ t is at most tk , and tk e−Θ(nt log M ) ≤
e−Θ(nt log M ) provided k < c0 n for an absolute constant c0 > 0, so we can apply a union bound
over all pairs in a random choice of eΘ(nt log M ) k-tuples.
10.4.3
Hard instance construction
We have s servers holding matrices A1 , . . . , A
Ps , respectively, where Ai has m rows and a subset
of wi columns of an m × n matrix A, where wi = n. For our lower bound we assume 2/ε ≤ φ
and kφ ≤ m. Note that for ε less than a sufficiently small constant, this implies that k < c0 kφ, and
so the assumption in Corollary 89 is valid (since the n of that corollary is equal to (k + 1)φ We set
M = 1/(mn)c for a sufficiently large constant c > 0.
We will have A1 being an m × k(φ − 1) matrix for which all but the first kφ rows are zero. We
assume 2/ε ≤ φ. On the first kφ rows, A1 is block diagonal containing k blocks, each block being
a φ × (φ − 1) matrix.
To specify A1 , let the parameters t and n of Corollary 89 equal k/(2ε) and φ, respectively. That
corollary gives us a net N of eΘ(kφ(log(mn))/ε) k-tuples of matrices each of dimensions φ × φ with
entries that are integer multiple of M and bounded in magnitude by 1.
For a random k-tuple (B1 , . . . , Bk ) in N , we create an m × m block diagonal matrix B, which is
0 on all but its first kφ rows and first kφ columns. On its first kφ rows, it is a block diagonal matrix
B whose blocks along the diagonal are B1 , . . . , Bk , respectively. Our matrix A1 is then the matrix
product of B and an matrix D, where D is m × k(φ − 1) is formed by taking the kφ × k(φ − 1)
matrix of Fact 84 and padding it with m − kφ rows which are all zeros. By Lemma 85, no k/(2ǫ)
columns of A1 contain a k-dimensional subspace in their span which is a (1 + ǫ)-approximation to
the best rank-k approximationt to A1 .
Each Ai for i = 2, 3, . . . , s − 1 is the m × m matrix of all zeros. Finally, As is the m × t matrix
of
all zeros with t = n − (s − 1)m − k(φ − 1), i.e., A = A1 0m×m 0m×m . . . 0m×m 0m×t . By
construction, each column of A has at most φ non-zero entries, since the only non-zero columns
are those in A1 , and each column in A1 has the form Bz∗,1 + Bz∗,i for a z ∈ [k] and an i ∈ [φ], so it
has at most φ non-zero entries.
66
10.4.4
Main theorem
In the Distributed Column Subset Selection Problem in Definition 18, a correct protocol should
have each of the s machines simultaneously output a matrix C ∈ Rm×c with c < n columns of A
such that
kA − CC† Ak2F ≤ (1 + ε)kA − Ak k2F .
Theorem 90. Assume 2/ε ≤ φ and kφ ≤ min(m, n). Then, any, possibly randomized, protocol Π
which succeeds with probability at least 2/3 in solving the Distributed Column Subset Selection Problem
of Definition 18, under the promise that each column of A has at most φ non-zero entries which are integer
multiples of 1/(mn)c and bounded in magnitude by 1, for a constant c > 0, requires Ω(sφk(log(mn))/ε)
bits of communication. If the word size is Θ(log(mn)), this implies the communication cost of the porticol
is Ω(sφk/ε) words.
Proof. By construction of A1 , whenever Π succeeds, each of the s machines outputs the same set
C of at least t ≥ k/(2ǫ) columns of A1 .
Let Πi denote the transcript (sequence of all messages) between the coordinator and the i-th
player. We look at the information Πi reveals about A1 , given the event E that Π succeeds, that is,
I(Πi ; A1 | E).
A critical observation is that any column C∗,i of C, is equal to Bz∗,1 + Bz∗,i for some z ∈ [k],
where Bz is as defined above (i.e., A1 = B · D). Hence, given Bz∗,1 and C∗,i , one can reconstruct
Bz∗,i . Now, for any random variable W ,
I(Πi ; A1 | E) ≥ I(Πi ; A1 | E, W ) − H(W ).
(28)
We let W = (B1∗,1 , . . . , Bk∗,1 ), and observe that H(W ) ≤ log2 ((2M )kφ ) since there are 2M choices
for each coordinate of each Bz∗,1 . Hence, H(W ) = O(kφ log(mn)). Note that I(Πi ; A1 | E, W ) =
H(A1 ) = log2 (|N |), since conditioned on the protocol succeeding, and given W , by Corollary 89
we can reconstruct A1 . By (28), it follows that
(Πi ; A1 | E) ≥ Θ(φk(log(mn))/ǫ) − O(kφ log(mn)) = Ω(φk(log(mn))/ǫ).
Note that if Z is an indicator random variable that indicates that E occurs, we have H(Z) ≤ 1, and
so
I(Πi ; A1 ) ≥ I(Πi ; A1 | E) Pr[E] − 1 = Ω(φk(log(mn))/ǫ),
since Pr[E] ≥ 2/3.
It follows that
Ω(φk(log(mn))/ǫ) ≤ I(Πi ; A1 ) ≤ H(Πi ) ≤ EA1 ,rand [|Πi |],
where |Πi | denotes the length, in bits, of the sequence Πi of messages, and rand is the concatenation of the private randomness of all s machines. Note that the entropy of Πi is a lower bound on
the expected encoding length of |Πi |, by the Shannon coding theorem. By linearity of expectation,
X
EA1 ,rand |Πi | = Ω(φk(log(mn))/ǫ),
i
which implies there exists an A1 and setting of rand for which
X
|Πi | = Ω(sφk(log(mn))/ǫ).
i
It follows that the total communication is Ω(sφk(log(mn))/ǫ) bits.
67
Corollary 91. Assume 2/ε ≤ φ and kφ ≤ min(m, n). Then, any, possibly randomized, protocol Π
which succeeds with probability at least 2/3 in solving the Distributed Column Subset Selection Problem
- rank k subspace version (see Definition 19), promise that each column of A has at most φ non-zero
entries which are integer multiples of 1/(mn)c and bounded in magnitude by 1, for a constant c > 0,
requires Ω(sφk(log(mn))/ε) bits of communication. If the word size is Θ(log(mn)), this implies the total
communication across all s machines is Ω(sφk/ε) words.
Proof. As any such protocol is also a protocol for the Distributed Column Subset Selection Problem of Definition 18 (the problem in Definition 19 is more general/difficult than the problem of
Definition 18), the proof follows immediately from Theorem 90.
68
| 8cs.DS
|
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
1
Transmission Line Inspires A New Distributed
Algorithm to Solve the Linear System of Circuit
Fei Wei, Huazhong Yang, Senior Member, IEEE
Abstract—Transmission line, or wire, is always troublesome to
integrated circuits designers, but it could be helpful to parallel
computing researchers. This paper proposes the Virtual
Transmission Method (VTM), which is a new distributed and
stationary iterative algorithm to solve the linear system extracted
from circuit. It tears the circuit by virtual transmission lines to
achieve distributed computing. For the symmetric positive
definite (SPD) linear system, VTM is proved to be convergent. For
the unsymmetrical linear system, numerical experiments show
that VTM is possible to achieve better convergence property than
the traditional stationary algorithms. VTM could be accelerated
by some preconditioning techniques, and the convergence speed of
VTM is fast when its preconditioner is properly chosen.
Index Terms—Circuit simulation, distributed computing,
numerical analysis, transmission line, wire.
T
I. INTRODUCTION
RANSMISSION line, or interconnect, or wire, is one of the
main determinants of chip performance, because of the
long interconnect latency and large power dissipation [37].
However, the circuit could not work without transmission lines,
because the transmission line plays an irreplaceable role to
make the distributed circuit stable and scalable [13]. In this
paper, transmission lines are used to assist the distributed
computation of sparse linear system of circuit.
The basic problem of the distributed circuit simulation is to
distributedly solve the sparse linear system extracted from
circuit [34, 41, 46]. Generally speaking, the linear system of
circuit is unsymmetrical, because of the existence of controlled
sources. Restricted to the resistor-capacitor (RC) network, the
linear system would be symmetrical [39].
Many numerical algorithms are employed to solve the linear
system from circuit. KLU is an optimized LU factorization
algorithm for circuit, and it is broadly used in commercial and
non-commercial circuit simulators [49]. KLU is sequential.
SuperLU is an outstanding distributed algorithm to solve the
general unsymmetrical sparse linear system on a large number
of processors, and it has been widely adopted for circuit
simulation [15]. Xyce is a parallel circuit simulator designed
for supercomputers, and it uses the Block Jacobi
preconditioned GMRES method [50, 4, 3]. Schur complement
method is a non-overlapping domain decomposition method
making use of the master-slave model. It is simple to be
comprehended and implemented, and was frequently used [29,
65, 20]. [7] presents a parallel direct/iterative mixed approach,
based on the Schur complement method and preconditioned
GMRES method. [41] adopted the preconditioned overlapping
domain decomposition method, which is supported by PETSc,
a distributed scientific computing package [1]. The highlight of
[41] is that it improves the matrix property by exploring the
characters of transistor device models.
The symmetric linear system of circuit is mainly extracted
from the RC networks. Solving RC network is the key for the
power grid analysis and thermal analysis [30, 26]. Meanwhile,
the sparse linear system generated by the finite element method
from elliptic partial differential equations (PDE) is equivalent
to a resistor network.
The simulation of power grid has been intensively
researched in the past 10 years, and a variety of numerical
algorithms had been employed to solve the RC network, such
as stationary iterative methods [67], Krylov-subspace iterative
method [12], algebraic multigrid (AMG) [31, 69], coupled
iterative/direct method [32] and FFT method [48]. [42]
proposed a stochastic method, and this method was further
expanded as a preconditioning method for the diagonal
dominant matrix [43].
To compute the RC network on the parallel computing
platform, [68] makes use of the domain decomposition method
(DDM). [11] adopts a distributed matrix inversion algorithm.
The potential of GPU to solve the RC network was illustrated in
[6, 16, 17, 48].
VTM is a new distributed and stationary iterative algorithm
to solve the sparse linear systems [59]. VTM is similar to Block
Jacobi or Overlapped Block Jacobi method [56, 66].
VTM is inspired by the behavior of transmission line [40, 13].
It inserts virtual transmission lines into the circuit to achieve
distributed computing [58, 59]. The idea of VTM is derived
from the pseudo transient method [57]. Pseudo transient
method inserts pseudo capacitors or inductors into the circuit to
approve the convergence property of DC analysis. Similarly,
VTM inserts pseudo transmission lines into the circuit to
approve the convergence property of distributed simulation.
Inserting virtual or pseudo electrical element to assist the circuit
simulation is a common approach, and the advantage is that the
physical property of circuit could be utilized during numerical
computation.
VTM draws a parallel between distributed computing of
linear system and distributed simulation of linear circuit, and it
interprets the relationship between numerical analysis and
circuit analysis. To solve a sparse linear system in parallel is
equalized to simulate a linear circuit in parallel, and vice versa,
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
we might comprehend the distributed numerical algorithm from
the viewpoint of circuit theory and microwave network.
To partition a circuit, node tearing and branch tearing are two
important methods [64, 47]. This paper proposes the third way,
which is called wire tearing. Tearing the circuit by wires is not a
new idea, since all the subcircuits are connected by wires, but
we first apply this concept into the distributed numerical
algorithms [58, 59]. Wire tearing can be considered as the
insertion of transmission line to connect the torn nodes [61].
The advantage of wire tearing over the branch tearing and node
tearing is that it does not bring in any extra energy, because all
the wires are passive [27].
As a distributed numerical algorithm, VTM is similar to
overlapped Block Jacobi or Block SOR method [2, 45]. We
have proved that VTM is convergent to solve arbitrarily-large
SPD linear system on arbitrary number of processors [59, 62].
VTM could also be considered as a new type of algebraic
domain decomposition method [55]. VTM is similar to the
additive Schwarz method with Robin condition, i.e.
Schwarz-Robin method [35, 21, 22, 36]. Additive Schwarz
method is mainly used to solve the sparse linear system from
elliptic partial differential equations (PDE), and VTM is used to
solve the general sparse linear system. The partitioning method
for VTM, i.e. wire tearing, is different from the traditional
partitioning methods for algebraic additive Schwarz method
[22, 36]. Furthermore, the preconditioning technique for VTM
is more flexible than Optimized Schwarz Method [21].
This paper is organized as follows. Section 2 presents a brief
introduction to the linear system of circuit. Section 3 introduces
the mathematical description of transmission line. Section 4
proposes the physical background of VTM. Section 5 describes
how to partition the circuit by wire tearing. Section 6 details the
algorithm of VTM. Section 7 presents the convergence theory.
Section 8 provides a simple example. Section 9 discusses the
preconditioning techniques for VTM. Numerical experiments
are shown in Section 10. We conclude this work in Section 11.
In the appendix, we present a proof for the convergence theory.
II. LINEAR SYSTEM OF CIRCUIT
In virtue of the nodal analysis, one circuit could be described
by a sparse linear system [39].
Ax = b
(1)
Here x represents the nodes’ voltages, and b is the current
sources flowing into the nodes. A is the coefficient matrix,
which might be symmetrical, or unsymmetrical, depending on
the property of circuit.
If the circuit contains no voltage sources but only current
sources, we call it current-driven circuit. To construct the linear
system of current-driven circuit, we only need to use the nodal
analysis technique, and do not need the modified nodal analysis
technique [39]. If there were voltage sources in the circuit, they
might be equalized into current sources, according to the
Norton equivalent theory [18].
2
Fig. 1. Transmission line. (A) The circuit diagram of the transmission line. (B)
The equivalent circuit of the lossless transmission line.
Lemma 1: For a current-driven linear resistor network, its
coefficient matrix, A, is weakly diagonally dominant, and thus
symmetrical-non-negative-definite (SNND). Further, if there is
at least one resistor connecting to the ground, A is strictly
diagonally dominant, and thus symmetric-positive-definite
(SPD).
The physical insight of this lemma is that the energy of a
resistor network is always non-negative.
III. TRANSMISSION LINE
Transmission line is an important element in electrical and
microwave engineering. It is also called cable, wire or
interconnect in different contexts.
The circuit diagram of the transmission line is illustrated in
Fig. 1. The analytical description of the lossless or ideal
transmission line is the wave equation [40, 13].
∂ 2 u ( x, t )
∂ 2 u ( x, t )
LC
(2)
=
∂2 x
∂ 2t
Here L is the inductance per unit length, C is the capacitance
per unit length.
The time domain mathematical description of the lossless
transmission line is called Transmission Delay Equations, as
shown in (3) [40, 8, 59].
u1 (t ) + Z ⋅ i1 (t ) = u2 (t − τ ) − Z ⋅ i2 (t − τ )
u2 (t ) + Z ⋅ i2 (t ) = u1 (t − τ ) − Z ⋅ i1 (t − τ )
(3)
Here u1(t) and u2(t) represent the port voltages. i1(t) and i2(t)
represent port inflow currents. t is the time variable. τ is the
propagation delay. Z is the characteristic impedance, which is
positive.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
3
Z = L/C
The propagation delay of the transmission line is:
τ = l LC
Where l is the length of the transmission line.
The iterative formula of Transmission Delay Equations is
similar to the Robin boundary condition in Partial Differential
Equations and Schwarz-Robin method [35, 21]. There are two
main differences: First, the normal derivative in the robin
condition is replaced by a current; Second, (3) expresses the
time delay explicitly.
For a number of coupled transmission lines, (3) could be
re-expressed in the matrix-vector form:
u1 (t) + Z ⋅ i1 (t) = u 2 (t - τ) - Z ⋅ i 2 (t - τ)
u 2 (t) + Z ⋅ i 2 (t) = u1 (t - τ) - Z ⋅ i1 (t - τ)
(4)
Here Z is the characteristic impedance matrix of the
transmission lines. If there is no coupling among transmission
lines, Z is diagonal; if there is coupling, Z is a sparse matrix.
(4) could be re-expressed as (5):
i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ)
i 2 (t) + W ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ)
(5)
Here W is the characteristic admittance matrix of the wires.
W = Z -1
Associated with the principle of parallel computer, we come
to realize that, there is conceptual similarity between the
distributed computer and the distributed circuit, as shown in
Fig. 2 [61].
First, different circuits are connected by wires, which is
similar to the situation where different processors are
connected by the digital data link.
Second, the wire has transmission delay, and there is also
communication delay between the processors.
As the result, if we assimilate each circuit to a processor, and
consider the wire as the data link between processors, then the
distributed circuit would be kind of a distributed computer.
Fig. 2. Similarity between the distribute circuit and distributed computer. (a)
Distributed circuit, two subcircuits are connected by a wire. (b) Distributed
computer, two processors are connected by a digital data link.
IV. PHYSICAL BACKGROUND
In this section, we present an observation from circuit and
microwave network. This lemma presents the stability property
of the resistor network with wires. Fig. 3 presents an illustration
for this lemma. Lemma 2 could be validated in SPICE [38, 44].
Lemma 2: A linear resistor network with wires inside never
oscillates unendingly, and it will finally settle down to the
steady state, which is the steady state of the resistor network
eliminating all the wires.
The physical insight of this lemma is that, the energy of a
resistor network is limited. Divergence means infinite energy,
which is impossible for the resistor network.
Lemma 2 is also valid for the resistor-capacitor network. But
for the general circuit with wires, it is not always valid. A
distributed circuit with wires inside might go unconvergent.
The stability is depending on the property of circuit and the
characteristic impedance of the wires.
Fig. 3. Illustration of the stability theory of resistor network with wires. (a) The resistor network with wires inside. (b) The resistor network without wires. (c) The
voltage of node 2a and node 2b in (a) woud converge to the steady state, which is the voltage of node 2 in (b).
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
V. WIRE TEARING
To solve the sparse linear system of a circuit, originally there
is no transmission line in it, but we might figure out some way
to insert transmission lines into the circuit by splitting the nodes.
This partitioning technique is called wire tearing.
By means of wire tearing, the original circuit is turned into a
distributed circuit. It is partitioned into a number of separate
sub-circuits by virtual transmission line. Later, we locate each
sub-circuit into one processor, and use the digital data link to
imitate the behavior of the transmission line. As the result, the
distributed circuit is simulated in a distributed way.
According to Lemma 2, the resistor network with wires
would finally go to the steady state, which is exactly the steady
state of the resistor network without wires. This lemma
explains the reason that VTM could always be convergent to
solve the resistor network. For the sparse linear system of a
general circuit, VTM might be unconvergent.
There are 4 steps to perform wire tearing for the circuit G .
Γ denotes the set of all the nodes in G .
Step 1. Set the splitting interface Γ interface ⊆ Γ . V is called
interfacial node if V ∈ Γinterface ; otherwise, V is called inner
node.
Step 2. Split each interfacial node into a pair of nodes, which
are called twin nodes.
Step 3. Split the resistors and current sources connected to
each interfacial node.
Step 4. Connect each pair of twin nodes by a length of
lossless wire. Add inflow currents to the twin nodes.
Example 1. Fig. 4 illustrates an example, in which a simple
resistor network is split into two sub-circuits.
4
First we define the set of inner nodes in Sub-circuit 1 as
Γ1,inner , the set of inner nodes in Sub-circuit 2 as Γ 2,inner .
By reordering the rows, the sparse linear system of circuit (1)
could be re-formatted as below by row reordering:
C
F1
F2
E1
D1
0
E2 u f
0 y 1 = g1
D2 y 2 g 2
(6)
Here u is the voltage vector of Γ interface . y1 and y2 are the
voltage vector of
Γ1,inner and Γ 2,inner , respectively.
After wire tearing, the interfacial nodes are split, and
Γinterface is split into two sets, the twin nodes in Sub-circuit 1,
Γ1,twin , and the twin nodes in Sub-circuit 2, Γ 2,twin . The
system of sub-circuit 1 is:
C1
F
1
E1 u1 f1 i1
(7)
=
+
D1 y 1 g1 0
u1 represents the voltage vector of Γ1,twin . i1 represents the
currents flowing into
Γ1,twin .
After wire tearing, the system of sub-circuit 2 is:
C 2
F
2
E 2 u 2 f 2 i 2
=
+
D2 y 2 g 2 0
(8)
Here u 2 represents the voltages vector of
Γ 2,twin . i 2
represents the currents flowing into each node of
Γ 2,twin .
Also we have,
Fig. 4. Illustration of the wire tearing. (a) The original resistor network, and node 2 is set to be the interfacial node. (b) Split
node 2 into a pair of twin nodes 2a and 2b, and insert a length of transmission line between them. 1/R2=1/R2a+1/R2b. I2=I2a+I2b.
(c) Replace the virtual transmission line with its equivalent circuit, and the original resistor network is partitioned into two
sub-networks.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
C1 + C2 = C
f1 + f 2 = f
u1 , i1 , u 2 , i 2 are called boundary variables, and they
satisfy the Transmission Delay Equations (5).
i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ)
If we set the boundary condition as below:
u1 (t) = u 2 (t) = u(t)
i1 (t) = -i 2 (t) = i(t)
Then (6) could be re-obtained from (7) and (8).
The above splitting technique is called level-one wire tearing,
since the interfacial node is split once. If the interfacial node
was split for more than one times, this splitting technique is
called multilevel wire tearing [59].
VI. VIRTUAL TRANSMISSION METHOD
After partitioning of the circuit, there are 3 steps to perform
the parallel computing by Virtual Transmission Method.
Step 1. Replace the lossless transmission line with its
equivalent circuit.
Step 2. Load each sub-circuit into a processor.
Step 3. Use the data link to transfer the previous interfacial
variables from one processor to another by message
passing, and perform the distributed computing.
Example 2. Continuing with Example 1, the analytic
expression of sub-circuit 1 is obtained by merging (5) and (7):
E1 u1 (t) f1 i1 (t)
=
+
D1 y 1 (t) g1 0
C2 + W E 2 u 2 (t)
=
F
D2 y 2 (t)
2
f 2 + W ⋅ u1 (t - τ) - i1 (t - τ)
(13)
g2
i 2 (t) = − W ⋅ u 2 (t) + W ⋅ u1 (t - τ) - i1 (t - τ)
If all the delays of lines are 1, we obtain:
C2 + W E 2 u k2
=
F
D2 y k2
2
f 2 + W ⋅ u1k −1 - i1k −1
g2
k
k
k −1
k −1
i 2 = − W ⋅ u 2 + W ⋅ u1 - i1
(14)
Later, we locate (11) on Processor 1, and locate (14) on
Processor 2. After that, we set the initial values for boundary
variables:
u10 = u 02 = 0
i10 = i 02 = 0
At last, we do the distributed computing.
(9)
VII. CONVERGENCE THEORY
i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ)
Eliminate i 1 (t) , and we obtain:
C1 + W E1 u1 (t)
=
F
D1 y 1 (t)
1
f1 + W ⋅ u 2 (t - τ) - i 2 (t - τ)
g1
(12)
Eliminate i 2 (t) , and we obtain:
i 2 (t) + W ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ)
C1
F
1
C2 E 2 u 2 (t) f 2 i 2 (t)
F D y (t) = g + 0
2 2
2
2
i 2 (t) + Z ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ)
5
Theorem 1 (Convergence Theory): Assume a linear resistor
network is partitioned into N sub-circuits by wire tearing, if the
characteristic impedance matrix of the virtual transmission lines
is symmetrical-positive-definite (SPD), then VTM converges at
the answer to the resistor network.
(10)
i1 (t) = − W ⋅ u1 (t) + W ⋅ u 2 (t - τ) - i 2 (t - τ)
Set all the delays of transmission lines to be 1, then,
C1 + W E1 u1k f1 + W ⋅ u 2k −1 - i 2k −1
=
F
D1 y1k
g1
1
(11)
i1k = − W ⋅ u1k + W ⋅ u 2k −1 - i 2k −1
(11) is an SPD sparse linear system, and it could be solved by
any sequential algorithms, such as cholesky factorization,
algebraic multigrid method (AMG) and conjugate gradient
method (CG).
Similarly, the analytic expression of sub-circuit 2 is obtained
by merging (5) and (8):
This conclusion is supported by Lemma 2, and the
mathematical proof is given in the appendix.
According to the proof of convergence theory, we know that
the convergence speed of VTM is depending on the choice of
the characteristic admittance matrix W. So W is also called the
preconditioner for VTM.
VIII. PRECONDITIONING
In this section, we discuss the preconditioning techniques for
VTM. We first define the input admittance matrix of a circuit or
microwave network [18, 13]. From the view of numerical
analysis, input admittance matrix is an alias of Schur
complement matrix associated with the interface variables u [45,
68].
Example 3. Refer to (7), for Sub-circuit 1, the Schur
complement matrix associated with the interface variables u1 is:
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
S1 = C1 - E1D1-1F1
5.
S1 is also the input admittance matrix associated with the
interface variables u1 in Sub-circuit 1.
Similarly, in Sub-circuit 2, the Schur complement matrix
associated with the interface variables u2 is:
S 2 = C2 - E2 D-12 F2
T1 = ( W − S1 )( W + S1 )
W S 1 or S 2 . S 1 or S 2 are called the partial input
admittance matrix of the large circuit, which are defined as
below:
D
-1
S 1 = C1 - E
1 1 F1
D
-1F
S = C - E
2
S2 is also the input admittance matrix associated with the
interface variables u2 in Sub-circuit 2.
Then, the voltage reflection matrix on the interface of
Sub-circuit 1 is defined as:
−1
The voltage reflection matrix on the interface of Sub-circuit 2
is:
T2 = ( W − S 2 )( W + S 2 )
−1
6
2
2
2
2
E
1
is a submatrix of
1 D1
C 2 E
C 2
2
is a submatrix of
F2
F2 D2
C
Here 1
F
C1 E1
F D . Similarly,
1
1
E2
.
D2
This preconditioning technique is called Schur complement
or S is dense
approximation method (SCA). Usually S
1
2
matrix, and we need to drop the small elements inside the matrix.
After that, the fill-in pattern of W is similar to C1 or C2.
If the circuit is a general circuit with controlled sources, i.e.
the linear system of circuit is unsymmetrical, the above 5
CF = ρ (T1T2 )
preconditioning techniques could also be used, but VTM might
Here ρ ( A ) is the spectral radius of the square matrix A.
be unconvergent.
Consequently, we know that the convergence speed of VTM is
We have to say that, it is still an open problem to choose the
depending on the choice of the characteristic admittance matrix preconditioner for the unsymmetrical linear system. In the next
W. This viewpoint is identical to the impedance matching
section, we illustrate a simple example to show the potential of
technique in microwave engineering [13].
VTM to solve the unsymmetrical system.
In the ideal case, if we set the preconditioner,
W = S1 or S 2
IX. EXAMPLE
According to the convergence proof in the appendix, the
convergence factor of VTM is:
Then,
For the symmetrical linear system, a simple example could
be found in [59]. Here we illustrate another example to solve
As the result, only 1 iteration is needed to achieve convergence. the unsymmetrical linear system of the circuit. Fig. 5 proposes a
Based on the knowledge of microwave network, we know that, if tightly-coupled circuit with 4 operational amplifiers connected
one port is precisely matched, there would be no energy reflection end-to-end. The linear system of this circuit is:
on this port and the network would settle down after 1 reflection.
0 u1 I1
g1 g 21 0
In practice, it is impossible to obtain the accurate input
0 g
0 g 42 u2 I 2
2
admittance matrix of a large circuit, because the dimension of D1
(15)
=
ρ (T1T2 ) = 0
−1
or D2 might be very large, and it is impossible to obtain D1 and
D−21 . So we need to figure out some practical way to approximate
W to make W ≈ S1 or S 2 .
If the circuit is a resistor network, first we need to assure that
W is SPD. Continue with Example 2, there are several ways to
choose W.
1.
W = α ⋅ I, α > 0 . I is the identity matrix.
2.
W = diag ( C1 ) or diag ( C2 ) . We call it diagonal
g13
0
0
g3
0
g34
0 u3
g 4 u4
Here we set:
g1 = g 2 = g3 = g 4 = 1
g13 = g34 = g 42 = − g 21 = 10
The loop gain of this circuit is:
Gain = g13 g34 g 42 g 21 g1−1 g3−1 g 4−1 g 2−1 = −104
Then we partition this linear system by wire tearing,
preconditioner.
3.
W = C1 or C2 . This is called overlapped block
preconditioner. It is similar to the overlapped block Jacobi
method.
4.
I3
I4
W = α ⋅ C1 or α ⋅ C2 , α > 0 . This is called weighted
overlapped block preconditioner (WOB).
As the result, we obtain 2 sub-systems:
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
g1
0
g13
g 2b
0
0
Here:
g 21
g2a
0
0
g 3b
g 34
0 u1 I1
0 u2 a = I 2 a + i2 a
g3a u3a I 3a + i2b
g 42 u2b I 2b + i2b
0 u3b = I 3b + i3b
g 4 u4 I 4
7
g 2 a + g 2 b = g 2 , g 3 a + g 3b = g 3
(16)
I 2 a + I 2 b = I 2 , I 3 a + I 3b = I 3
For simplicity, we set:
g 2 a = g 2b = g 3a = g3b = 0.5
The transmission delay equations of T2 are:
(17)
i2 a (t ) + W2 ⋅ u2 a (t ) = −i2b (t − τ ) + W2 ⋅ u2b (t − τ )
i2b (t ) + W2 ⋅ u2b (t ) = −i2 a (t − τ ) + W2 ⋅ u2 a (t − τ )
(18)
The transmission delay equations of T3 are:
Fig. 5. Solving the unsymmetric linear system by VTM . (a) The original circuit with operational amplifiers. (b) Equivalent
circuit of (a), with voltage controlled current sources (VCCS). (c) Partition the circuit by wire tearing. Node 2 and 3 is set to be
the interfacial node. (d) Partition the equivalent circuit by wire tearing. 1/R2=1/R2a+1/R2b. I2=I2a+I2b. 1/R3=1/R3a+1/R3b.
I3=I3a+I3b. (e) Replace the virtual transmission line with its equivalent circuit, and thus the original circuit is partitioned into
two sub-circuits.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
i3a (t ) + W3 ⋅ u3a (t ) = −i3b (t − τ ) + W3 ⋅ u3b (t − τ )
8
TABLE I
SPARSE MATRICES PROPERTY
i3b (t ) + W3 ⋅ u3b (t ) = −i3a (t − τ ) + W3 ⋅ u3a (t − τ )
(19)
We set:
W2 = 0.5 , W3 = 20000
Merge (16), (18) and (19), we obtain the linear system for
Sub-circuit 1:
0 u2 a (t )
I 2 a + i2 a (t )
g2a
=
g g −1 g
−1
13 1 21 g3a u3a (t ) I 3a − g13 g1 I1 + i3a (t )
i2 a (t ) + W2 ⋅ u2 a (t ) = −i2b (t − τ ) + W2 ⋅ u2b (t − τ )
Name
Interface
nodes
Total nodes
Property
Source
Grid2d
100
10000
SPD
MESHPART
Grid3d
900
27000
SPD
H. Qian
Fv2
129
9801
SPD
UFpack
Wang
870
26064
Unsymm.
UFpack
Pchip
13
2298
Unsymm.
MCNC’90
TABLE II
ITERATION NUMBER TO ACHIEVE CONVERGENCE
Method
Grid2d
Grid3d
Fv2
Wang
Jacobi
27759
5238
212
50773
--
GS
18373
2950
109
27423
--
Similarly, we get the linear system for Sub-circuit 2:
SGS
11773
1571
79
26842
--
g 2b g 42 g g34 u2b (t ) I 2b − g 42 g I + i2b (t )
=
g 3b u3b (t )
I 3b + i3b (t )
0
i2b (t ) + W2 ⋅ u2b (t ) = −i2 a (t − τ ) + W2 ⋅ u2 a (t − τ )
SOR
14253
2049
66
16289
--
SSOR
8839
1073
74
29135
--
BJ
966
227
50
563
952
i3a (t ) + W3 ⋅ u3a (t ) = −i3b (t − τ ) + W3 ⋅ u3b (t − τ )
(20)
−1
4
−1
4 4
i3b (t ) + W3 ⋅ u3b (t ) = −i3a (t − τ ) + W3 ⋅ u3a (t − τ )
(21)
Finally we solve this example on 2 processors by VTM, and
the computing result is compared with a number of well-known
stationary iterative algorithms, e.g. Jacobi, Gauss Seidel (GS),
Successive Overrelaxation Method (SOR), Symmetric SOR
(SSOR), Block Jacobi (BJ) [45]. Here the global iterative index
k increases to k+1 until all the variables are updated.
As shown in Fig. 6, the traditional stationary algorithms are
Pchip
OBJ
490
114
23
287
162
VTM_Diag
963
335
42
854
160
VTM_OB
491
115
23
287
161
VTM_WOB
296
68
22
175
--
VTM_SCE
275
75
14
186
--
However, for the large unsymmetrical linear system, we
have not yet figure out an effective method to choose W. The
convergence property of VTM is depending on the property of
linear circuit, as well as the preconditioner W.
X. NUMERICAL EXPERIMENTS
Fig. 6. Comparison of the convergence speed of iterative algorithms for
resistor network.
unconvergent for this circuit, but VTM is convergent. The key
is to choose proper characteristic admittances for the virtual
transmission lines.
According to this example, we conclude that there exists a
parallel between the stability of VTM and the stability of
distributed linear circuit (or microwave network). The
traditional techniques to stabilize a distributed circuit might be
transplanted to stabilize VTM.
In this section we compare VTM with the traditional
stationary algorithms for both the symmetrical matrix and
unsymmetrical matrix. We use MATLAB and SIMULINK as
our test environment [53, 54], and use METIS and
MESHPART as our partitioning methods [28, 51, 19].
The test matrices are described in Table 1. Grid2d and
Grid3d are structured resistor networks [51, 43]. Fv2 is a 2D
mesh constructed by finite element method (FEM) [14]. Pchip
is extracted from a MOS integrated circuit of MCNC’90
testbench [52]. Wang is a sparse matrix from semiconductor
device simulation [14].
Table 2 illustrates the computing results of the stationery
iterative algorithms. BJ, OBJ and VTM are tested on 2
processors. Jacobi, GS, Symmetrical GS (SGS), SOR and
SSOR are tested on 1 processor.
VTM_Diag means VTM with diagonal preconditioner.
VTM_OB represents VTM with overlapped block
preconditioner. VTM_WOB is VTM with weighted overlapped
block preconditioner. VTM_SCA means VTM with Schur
complement approximation preconditioner. All these
preconditioning methods were previously described in Section
8.
According to Table 2, we conclude that VTM is convergent
to solve the SPD system, and its convergence speed is fast when
using the SCA or WOB preconditioner. The convergence speed
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
of OBJ and VTM_OB are same. For the unsymmetrical linear
systems, VTM might be unconvergent.
At last, we test VTM on a various number of processors, as
shown in Fig. 7. In this case, we use Grid3d as the testbench.
The test result indicates that the convergence speed of VTM is
slightly relative to the number of processors.
9
If the delays of virtual transmission lines are different and
stochastic, VTM would turn to be a fully asynchronous and
chaotic numerical algorithm [58]. If we replace each variable
by a piece of waveform, VTM would become a
waveform-relaxation algorithm [60].
To simulate the post-layout integrated circuit in parallel, we
have figured out another method to distributedly solve the
nonlinear delay differential equations extracted from the
distributed circuits [61].
APPENDIX
Here we prove that, if the graph of the resistor network is
2-partete, VTM converges.
Lemma 3: Assume a linear resistor network is partitioned into
2 sub-circuits by level-one wire tearing, if the characteristic
impedance matrix Z of the virtual transmission lines is SPD,
VTM converges at the answer to the resistor network.
Proof:
Fig. 7. Test VTM on a number of processors.
First, we consider the resistor network with inner nodes, and
eliminate these inner nodes by Schur complement technique.
Then, we prove Lemma 3 for the resistor network without inner
nodes.
The sparse linear system of the resistor network is:
C
F1
F2
XI. CONCLUSION AND FUTURE WORK
In this paper, we introduce VTM to solve the sparse linear
system of circuit in parallel. VTM is a distributed and stationary
iterative numerical algorithm, and it is efficient to solve the
resistor networks.
VTM proves many insightful conclusions linking numerics
and electrics. The physical background of VTM is electric
circuit, and this makes this algorithm different from the
traditional numerical algorithms. As presented in this paper, we
have borrowed many concepts from circuit theory to describe
this algorithm.
According to the simple example presented in Section 9, we
conclude that there exists similarity between the stability of
VTM and the stability of distributed linear circuit (or
microwave network).
The convergence speed of VTM is highly depending on the
characteristic admittance matrix of the virtual transmission
lines, i.e. its preconditioner W. A number of preconditioning
techniques are implemented to accelerate VTM. Experiments
indicate that, if W is properly chosen, the performance of VTM
would be appreciable; if not, VTM would be plain.
Nevertheless, the computation cost to design the preconditioner
W should be aware of [5].
For the SPD linear system, we have proved that VTM is
convergent; for the large unsymmetrical linear system, we have
not yet figure out an effective way to choose the characteristic
admittance matrix to guarantee convergence. This is an open
problem.
VTM could also be used to solve the nonlinear system, as we
pointed out in [59]. However, the convergence analysis of
nonlinear system is more complicated than the linear system.
This problem should be further studied.
E1
D1
0
E2 u f
0 y 1 = g1
D2 y 2 g 2
Eliminate the inner variables y1 and y2, we obtain:
(C - E D
1
F - E2 D-12 F2 ) u
-1
1 1
= f - E1 D1-1g1 - E2 D-12 g 2
y1 = -D1-1F1u + D1-1g1
y 2 = -D-12 F2u + D-12 g 2
Set,
S = C - E1D1-1F1 - E 2 D-12 F2 ,
r = f - E1D1-1g1 - E2 D-12 g 2 ,
then,
(22)
S ⋅u = r
S is called the Schur complement matrix associated with the
interface variables u.
C E
is SPD, then the Schur
F D
−1
complement matrix S = C - ED F is SPD.
Lemma 4: If A =
If the circuit is split into two sub-circuits by level-one wire
tearing, the system of Sub-circuit 1 is (7):
C1
F
1
E1 u1 f1 i1
=
+
D1 y 1 g1 0
Eliminate the inner variables y1:
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
(C
- E1D1-1F1 ) u1 = f1 - E1D1-1g1 + i1
1
u k2 = ( W + S 2 )
( W − S1 ) u1k −1
−1
+ ( W + S2 ) r
y 1 = -D1-1F1u1 + D1-1g1
-1
-1
Set S1 = C1 - E1 D1 F1 , r1 = f 1- E1 D1 g1 , then,
S1 ⋅ u1 = r1 + i1
(23)
u1k = ( W + S1 )
( W − S2 )
−1
× ( W + S 2 ) ( W − S1 ) u1k − 2
−1
−1
+ ( W + S1 ) ( W − S 2 ) ( W + S 2 ) r
−1
+( W + S1 ) r
Eliminate the inner variables y2:
2
- E 2 D-12 F2 ) u 2 = f 2 - E2 D-12 g 2 + i 2
-1
2 2 2
-1
2 2 2,
T1 = ( W − S1 )( W + S1 )
-1
2 2
S 2 = C2 - E D F r2 = f 2- E2 D-12 g 2 , then,
S 2 ⋅ u 2 = r2 + i 2
(24)
−1
+ ( W − S1 ) T1T2 ⋅ r
−1
(28)
( W − S1 ) u1k = T1T2 ( W − S1 ) u1k −2
(29)
+T1T2 ⋅ r + T1 ⋅ r
If we make use a new variable:
= f - E1D1-1g1 - E2 D-12 g 2
a1k = ( W − S1 ) u1k
=r
Until now, we have eliminated all the inner nodes in the
resistor network by Schur complement technique, and all the
nodes are interfacial nodes. The linear system of (22) is
partitioned into two sub-systems of (23) and (24) by wire
tearing.
The iterative formula is Transmission Delay Equations (5),
i1k + W ⋅ u1k = −i 2k −1 + W ⋅ u 2k −1
i k2 + W ⋅ u 2k = −i1k −1 + W ⋅ u1k −1
then, (29) could be expressed as (30):
a1k = T1T2 ⋅ a1k − 2 + h1
where h1 = T1 ⋅ T2 ⋅ r + T1 ⋅ r .
(30)
In the following text, we will prove that (30) is convergent.
Here we use Z-1 instead of W.
T1 = ( Z −1 − S1 )( Z −1 + S1 )
−1
= Z −1 ( I − Z ⋅ S1 )( I + Z ⋅ S1 ) Z
−1
Here W is the characteristic admittance matrix of the
Z = W −1 .
i1k and i k2 by combine (23), (24) and (5), we find,
W ⋅ u1k + ( S1u1k - r1 ) = W ⋅ u 2k −1 - ( S 2u 2k −1 - r2 )
T2 = ( Z −1 − S 2 )( Z −1 + S 2 )
=Z
−1
(31)
−1
( I − Z ⋅ S 2 )( I + Z ⋅ S 2 )
−1
(32)
Z
Lemma 5: If Z is an SPD matrix of dimension n, then there
( W + S1 ) u1k − r1 = ( W − S 2 ) u 2k −1 + r2
exists a matrix
Thus,
Similarly, we obtain:
u1k = ( W − S1 ) T1T2 ( W − S1 ) u1k − 2
Reformat (28) as (29):
=S
r1 + r2 = f 1- E1D1-1g1 + f 2 - E 2 D-12 g 2
( W − S 2 ) u 2k −1
−1
+ ( W + S1 ) r
Then,
−1
= C - E1D1-1F1 − E2 D-12 F2
u1k = ( W + S1 )
−1
+( W − S1 ) T1 ⋅ r
S1 + S 2 = C1 - E1D1-1F1 + C2 - E2 D-12 F2
Eliminate
(27)
−1
T2 = ( W − S 2 )( W + S 2 )
S2 is called the Schur complement matrix associated with the
interface variables u2 in Sub-circuit 2.
Consequently, we have:
transmission lines. W is SPD.
−1
Set:
y 2 = -D F u + D g
Set
(26)
u1k ,
E 2 u 2 f 2 i 2
=
+
D2 y 2 g 2 0
(C
−1
Merge (25) and (26), we come to know the iterative formula for
S1 is called the Schur complement matrix associated with the
interface variables u1 in Sub-circuit 1.
The system of Sub-circuit 2 is (8):
C 2
F
2
10
−1
(25)
Z , which satisfies:
Z
T
Z = Z.
Proof: Because Z is SPD,
Z = Q T ΛQ = Q T Λ ΛQ = Z
T
Z
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
T1 = Z −1 ( I − Z ⋅ S1 )( I + Z ⋅ S1 ) Z
−1
T
where Q Q = I . I is the identity matrix.
Λ = diag (α1 , α 2 , , α n ) , α i ∈ + .
)( )
( ) ( )
( Z Q )( Z Q )
×
Z
+ Z Q Λ
(
) ( Z Q )
= Z ( Z Q )(I − Λ )( Z Q )
×( Z Q ) (I + Λ ) ( Z Q ) Z
= Z ( Z Q ) ( I − Λ )( I + Λ ) ( Z Q ) Z
1− λ
1− λ
= Z ( Z Q ) ⋅ diag
, ,
⋅ Z Q )
1+ λ (
1+ λ
(
−1
T
T
Z Q1
Z Q1
= Z −1
T
− Z TQ Λ
Z Q1
1
1
Λ = diag ( α1 , α 2 , , α n ) .
Z = ΛQ .
End of proof [25].
T
Lemma 6: If both Z and S are SPD matrix of dimension n,
then Z ⋅ S has the same eigenvalues as
T
Z ⋅S ⋅ Z .
Proof: Because S and Z are SPD, Z ⋅ S is positive-definite,
and
T
Z S Z is SPD.
T
Z ⋅ S ⋅ Z = QTQ T , where QQ T = I ,
T = diag (t1 , t 2 , , t n ) , t i > 0, i = 1,2, , n . Then,
Assume
(Z)
= Z ⋅ QTQ ⋅ ( Z )
= ( Z Q) ⋅ T ⋅ ( Z Q)
T
T -1
T
Z⋅S = Z ⋅ Z ⋅S ⋅ Z ⋅
T
T
-1
T
Similarly, we obtain,
λi > 0 , i = 1, , n ,
) (
T
Z Q1
)
-1
.
T
Z ⋅ S 2 ⋅ Z = Q 2 Λ 2Q 2 T
where Λ 2 = diag ( μ1 , μ 2 , , μ n ) , μi > 0 , i = 1, , n ,
Q 2Q 2 T = I . Z ⋅ S 2 =
(
T
) (
Z Q2 Λ 2
Then, (31) could be decomposed as below:
T
-1
T
1
1
1
-1
T
−1
1
1
1
T
−1
= Z −1
Z Q1 Λ 1
T
T
= Z −1
T
(
1
1
T
1
-1
T
−1
1
1
1
1
n
1
n
T
-1
1
Z
−1
Z ⋅ S1 ⋅ Z = Q1 Λ1Q1T
Q1Q1T = I . Z ⋅ S1 =
1
T2 = Z −1 ( I − Z ⋅ S 2 )( I + Z ⋅ S 2 ) Z
According to Lemma 5 and 6, we come to know that,
T
-1
T
1
Similarly, (32) could be decomposed as:
End of proof.
where Λ1 = diag (λ1 , λ2 , , λn ) ,
−1
1
T
−1
-1
−1
T
1
−1
T -1
T
11
Z Q2
)
-1
.
(
(
)
( )Z
1− μ
1− μ
, ,
Z Q ) ⋅ diag
⋅ Z Q )
1+ μ (
1+ μ
T
Z Q 2 ( I − Λ 2 )( I + Λ 2 )
T
2
−1
T
Z Q2
1
n
1
n
-1
T
2
The spectral radius of T1T2 is defined as:
ρ (T1T2 ) = lim ( T1T2 )
k 1/ k
k →∞
So we first calculate
( T1T2 )
norm of the square matrix A.
k
. Here A is the spectral
-1
Z
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
( T1T2 )
(
)
(
)
-1
T
T
−1
−1
Z
Z
Q
I
Λ
I
Λ
Z
Q
Z
−
+
(
)(
)
1
1
1
1
=
-1
×Z −1 Z TQ ( I − Λ )( I + Λ )−1 Z TQ
Z
2
2
2
2
Z
≤
Z
×
=
)
(
Q1 ( I − Λ1 )( I + Λ1 )−1 Q1T
Z
×Q 2 ( I − Λ 2 )( I + Λ 2 )−1 Q T2
≤
≤
(
−1
−1
Q1 ( I − Λ1 )( I + Λ1 ) Q1T
−1
Z
Z
Z
−1
−1
k
⋅
1 − λ1
1 − λn
⋅ diag
, ,
1 + λn
1 + λ1
k
Z
≤
Z
1 − λ1
1 − λn
Z ⋅ max
, ,
1+ λ
1 + λn
1
1 − μ1
1 − μn
× max k
, ,
⋅ Z
1 + μn
1 + μ1
−1
k
As the result,
ρ (T1 T2 ) = lim ( T1 T2 )
k 1/ k
1 − λ1
1 − λn
ρ (T1 ) = max
, ,
1 + λn
1 + λ1
Because μi > 0 , i = 1, , n ,
( W − S2 )
−1
× ( W + S 2 ) ( W − S1 ) u1k − 2
−1
−1
+ ( W + S1 ) ( W − S 2 ) ( W + S 2 ) r
−1
+( W + S1 ) r
k
−1
−1
−1
−1
u1∞ = I − ( W + S1 ) ( W − S 2 )( W + S 2 ) ( W − S1 )
−1
−1
−1
× ( W + S1 ) + ( W + S1 ) ( W − S 2 ) ( W + S 2 ) ⋅ r
= ( W + S1 ) − ( W − S 2 )( W + S 2 )
−1
( W − S1 )
−1
−1
× I + ( W − S 2 ) ( W + S 2 ) ⋅ r
(
(
)
)
(
)
−1
−1
I + W − S W + S −1 −1
(
2 )(
2)
=
r
−1
× I − ( W − S 2 )( W + S 2 ) W + S1
(
)
−1
( W + S ) ( ( W + S ) + ( W − S ) )−1
2
2
2
r
=
× ( ( W + S ) − ( W − S ) ) ( W + S )−1 W + S
2
2
2
1
= ( W + S 2 )( 2 W )
k →∞
1 − λ1
1 − λn
≤ max
, ,
1 + λn
1 + λ1
1 − μ1
1 − μn
, ,
× max
1 + μn
1 + μ1
= ρ (T1 ) ρ (T2 )
Because λi > 0 , i = 1, , n ,
So we conclude that VTM converges for 2-partite resistor
network [45].
According to (27), when this algorithm is convergent,
I − ( W − S )( W + S )−1 W +
2
2
=
−1
I + ( W − S 2 )( W + S 2 ) S1
−1
× I + ( W − S 2 ) ( W + S 2 ) ⋅ r
k
1 − μ1
1 − μn
× diag
, ,
⋅
1 + μn
1 + μ1
ρ (T1T2 ) < 1
Z
Q ⋅ ( I − Λ )( I + Λ )−1 ⋅ Q T
1
1
1
1
⋅
−1
T
× Q 2 ⋅ ( I − Λ 2 )( I + Λ 2 ) ⋅ Q 2
( I − Λ )( I + Λ )−1 ⋅
1
1
⋅
−1
× ( I − Λ 2 )( I + Λ 2 )
Consequently,
u1k = ( W + S1 )
⋅
×Q 2 ( I − Λ 2 )( I + Λ 2 ) Q T2
k
< 1 .
ρ (T2 ) = max
u1k = u1k − 2 = u1∞ , then,
Z
k
−1
⋅
)
k
−1
=
1 − μ1
1 − μn
, ,
1 + μn
1 + μ1
k
12
−1
( 2S 2 )( W + S 2 )
−1
−1
W + S1 r
−1
−1
= ( W + S 2 ) W −1S 2 ( W + S 2 ) W + S1 r
−1
−1
= ( I + S 2 W −1 ) S 2 ( I + W −1S 2 ) + S1 r
−1
−1
= ( S 2 + S 2 W −1S 2 )( I + W −1S 2 ) + S1 r
−1
−1
= S 2 ( I + W −1S 2 )( I + W −1S 2 ) + S1 r
< 1 ;
= [ S 2 + S1 ] r
−1
= S −1 ⋅ r
Until now, we have proved that, VTM is convergent for
2-partite resistor network when using level-one wire tearing.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
For the more general cases, the resistor network is k-partite, and
the wire tearing might be level-one or multilevel. A general
proof was presented in [62].
ACKNOWLEDGMENT
Discussions with Hao Zhang, Yi Su, Bin Niu, Yu Wang, Wei
Xue, Peng Zhang and Chun Xia were very helpful. Thanks are
due to Qi Wei, Bo Zhao, Xia Wei, Xiaojian Mao, Yongpan Liu,
Fei Qiao and Rong Luo for encouragement and support. We are
very grateful for the public domain softwares provided by John
R. Gilbert, Tim A. Davis, Robert Bridson, Haifeng Qian and et
al.
[17]
[18]
[19]
[20]
[21]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
S. Balay, K. Buschelman, V. Eijkhout, W. D. Gropp, D. Kaushik, M. G.
Knepley, L. Curfman McInnes, B. F. Smith and H. Zhang, PETSc Users
Manual, ANL-95/11 - Revision 2.1.5, Argonne National Laboratory.
R. Barrett, M. Berry, T. Chan, J. Demmel, J. Donato, J. Dongarra, V.
Eijkhout, R. Pozo, C. Romine and H. Van der Vorst. Templates for the
solution of Linear Systems: Building Blocks for Iterative Methods, 2nd
Edition, SIAM, 1994.
A. Basermann, U. Jaekel, and K. Hachiy. Preconditioning parallel sparse
iterative solvers for circuit simulation. In Proceedings of the 8th SIAM
Proceedings on Applied Linear Algebra, Williamsburg VA, 2003.
A. Basermann, U. Jaekel, and M. Nordhausen. Parallel iterative solvers for
sparse linear systems in circuit simulation. Fut. Gen. Fut. Gen.. Comput.
Sys., 21(8):1275–1284, 2005.
M. Benzi. Preconditioning techniques for large linear systems: A survey.
Journal of Computational Physics, 182:418–477, 2002.
J. Bolz, I. Farmer, E. Grinspun, and P. Schröoder. Sparse matrix solvers on
the GPU: conjugate gradients and multigrid. In ACM SIGGRAPH 2003
(San Diego, California, July 27 - 31, 2003).
C. W. Bomhof and H. A. Van der Vorst, A parallel linear system solver for
circuit simulation problems, Numerical Linear Algebra with Applications,
7 (2000).
F. H. Branin. Transient analysis of lossless transmission lines,
Proceedings of the IEEE, vol. 55, pp. 2012–2013, Nov. 1967.
R. Bridson. A MATLAB CMEX interface to the Metis library. Available
at http://www.stanford.edu/~rbridson/download/metismex.c
R. Bridson and W.-P. Tang. Refining an approximate inverse. Journal on
Computational and Applied Math, 123 (2000), Numerical Analysis 2000
vol. III: Linear Algebra, pp. 293-306.
S. Cauley, V. Balakrishnan, Cheng-Kok Koh, A parallel direct solver for
the simulation of large-scale power/ground networks, IEEE Transactions
on Computer-Aided Design of Integrated Circuits and Systems, v.29 n.4,
p.636-641, April 2010.
T. H. Chen and C. C.-P Chen. Efficient large-scale power grid analysis
based on preconditioned Krylov-subspace iterative methods. In Proc.
IEEE/ACM DAC, pages 559--562, 2001.
R. E. Collin. Foundations for microwave engineering, 2nd edition,
Wiley-IEEE Press, 2000.
T. A. Davis and Y. F. Hu. The University of Florida Sparse Matrix
Collection. Submitted to ACM Transactions on Mathematical Software.
Available at: http://www.cise.ufl.edu/research/sparse/matrices/
J. Demmel, J. Gilbert, and X. Li. An asynchronous parallel supernodal
algorithm for sparse gaussian elimination. SIAM J. Matrix Analysis and
Applications, 20(4): 915–952, 1999.
Zhuo Feng, Peng Li. Multigrid on GPU: tackling power grid analysis on
parallel SIMT platforms, Proceedings of the 2008 IEEE/ACM
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
13
International Conference on Computer-Aided Design, November 10-13,
2008, San Jose, California.
Zhuo Feng, Zhiyu Zeng. Parallel multigrid preconditioning on graphics
processing units (GPUs) for robust power grid analysis. In Proceedings of
the 47th Design Automation Conference (Anaheim, California, June 13 18, 2010). DAC '10. ACM, New York, NY, 661-666.
T. L. Floyd. Principles of electric circuits, 6th edition, Prentice Hall, 1999.
David Fritzsche, Andreas Frommer, and Daniel B. Szyld, Overlapping
blocks by growing a partition with applications to preconditioning,
Research Report 10-07-26, Department of Mathematics, Temple
University, July 2010.
N. Frohlich, B. M. Riess, U. A. Wever, and Q. Zheng A New Approach for
Parallel Simulation of VLSI Circuits on a Transsitor Level. TCAD, June
1998.
M. J. Gander, L. Halpern, and F. Nataf. Optimized Schwarz Methods. In T.
Chan, T. Kako, H. Kawarada, O. Pironneau (eds.), Proceedings of the
Twelveth International Conference on Domain Decomposition, DDM
press, 2001, pp. 15–27.
M. J. Gander, Schwarz Methods in the Course of Time, Electronic
Transactions on Numerical Analysis, 31:228–255, 2008.
A. George and J. W. Liu. Computer Solution of Large Sparse Positive
Definite Systems. Prentice-Hall, Englewood Cliffs, New Jersey, 1981.
John R. Gilbert, Gary L. Miller, and Shang-Hua Teng. Geometric mesh
partitioning: Implementation and experiments. SIAM J. Scientific
Computing 19:2091-2110, 1998.
G. H. Golub and C. F. Van Loan, Matrix computations. Johns Hopkins
University Press, 1989.
Wei Huang. HotSpot: A chip and package compact thermal modeling
methodology for VLSI design. Ph.D. Dissertation, University of Virginia,
2007.
Russell Kao. Piecewise Linear Models for Switch-Level Simulation.
Chapter 5.6.1, Node and Branch Tearing. Technical Report,
CSL-TR-92-532, Stanford University, 1992.
G. Karypis and V. Kumar. Metis 4.0: Unstructured graph partitioning and
sparse matrix ordering system, Technical report, Department of Computer
Science,
University
of
Minnesota,
1998.
Available
at
http://www.cs.umn.edu/metis
D. P. Koester. Parallel Block-Diagonal-Bordered Sparse Linear Solvers
for Power Systems Applications. Ph.D dissertation, Syracuse University.
1995.
J. N. Kozhaya and S. R. Nassif. Fast Power Grid Simulation. In
Proceedings of the 37th Design Automation Conference, 2000.
J. N. Kozhaya, S. R. Nassif, and F. N. Najm, A multigrid-like technique for
power grid analysis, IEEE Trans. Computer-aided Design, vol. 21, pp.
1148--1160, Oct. 2002.
Zhao Li, C.-J. Richard Shi. A coupled iterative/direct method for efficient
time-domain simulation of nonlinear circuits with power/ground networks.
ISCAS (5) 2004: 165-168.
Xiaoye S. Li. An overview of SuperLU: Algorithms, implementation, and
user interface. ACM Trans. Math. Softw. 2005.
Peng Li. What Is Parallel Circuit Simulation? ACM/SIGDA
E-NEWSLETTER, vol. 40, No. 4, April 1, 2010
P. L. Lions, On the Schwarz alternating method III: a variant for
nonoverlapping subdomains, Third International Symposium on Domain
Decomposition Methods for Partial Differential Equations, 1989, Houston,
Texas.
Sébastien Loisel and Daniel B. Szyld, On the convergence of Optimized
Schwarz Methods by way of Matrix Analysis , Domain Decomposition
Methods in Science and Engineering XVIII, Michel Bercovier, Martin
Gander, Ralf Kornhuber, and Olof B. Widlund, editors. Lecture Notes in
Computational Science and Engineering, Vol. 70, Springer, 2009, pages
363-370.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
[37] J. D. Meindl. Beyond Moore's Law: The Interconnect Era. Computing in
Science and Engineering. 2003.
[38] L. Nagel. SPICE2: A Computer Program to Simulate Semiconductor
Circuits, Electronics Research Laboratory Report No. ERL-M520.
University of California, Berkeley, 1975.
[39] Jan Ogrodzki. Circuit simulation methods and algorithms. CRC Press,
1994.
[40] H. J. Pain. The physics of vibrations and waves, Wiley, 1976.
[41] He Peng, Chung-Kuan Cheng. Parallel transistor level full-chip circuit
simulation. DATE 2009: 304-307.
[42] H. Qian, S. R. Nassif, and S. S. Sapatnekar, Power grid analysis using
random walks, IEEE Trans. Computer-aided Design, vol. 24, pp.
1204--1224, Aug. 2005.
[43] H. Qian and S. S. Sapatnekar, Stochastic Preconditioning for Diagonally
Dominant Matrices, SIAM Journal on Scientific Computing, Vol. 30, No.
3, pp. 1178 – 1204, March, 2008.
[44] T. L. Quarles. Analysis of Performance and Convergence Issues for
Circuit Simulation. ERL Memo No. UCB/ERL M89/42 April 1989.
[45] Y. Saad. Iterative Methods for Sparse Linear Systems. The PWS
Publishing Company, Boston, 1996. Second edition, SIAM, Philadelphia,
2003.
[46] R. A. Saleh, K. A. Gallivan, M. C. Chang, et al. Parallel circuit simulation
on supercomputers. Proceedings of the IEEE, 1989.
[47] Alberto Sangiovanni-Vincentelli, Li-Kuan Chen, and Leon O. Chua. A
new tearing approach – node-tearing nodal analysis. In IEEE International
Symposium on Circuits and Systems, 1977.
[48] Jin Shi, Yici Cai, Wenting Hou, Liwei Ma, Sheldon X.-D. Tan, Pei-Hsin
Ho, Xiaoyi Wang. GPU friendly fast Poisson solver for structured power
grid network analysis, Proceedings of the 46th Annual Design Automation
Conference, July 26-31, 2009, San Francisco, California.
[49] Ken Stanley, T. A. Davis. KLU: a "Clark Kent" sparse LU factorization
algorithm for circuit matrices. 2004 SIAM Conference on Parallel
Processing for Scientific Computing (PP04). Originally appeared in NA
Digest, 1997.
[50] Heidi K. Thornquist, Eric R. Keiter, Robert J. Hoekstra, David M. Day,
Erik G. Boman, A parallel preconditioning strategy for efficient
transistor-level circuit simulation, Proceedings of the 2009 International
Conference on Computer-Aided Design, November 02-05, 2009, San Jose,
California.
[51] John R. Gilbert. Meshpart, a public domain matlab toolbox for sparse
matrix partitioning. Available at
http://www.cerfacs.fr/algor/Softs/MESHPART/
[52] CircuitSim90, 1990 Circuit Simulation and Modeling Workshop at
MCNC, Available at http://www.cbl.ncsu.edu/CBL_Docs/csim90.html
[53] Mathworks Corparation. Matlab User Manual. R13. 2002.
[54] Mathworks Corparation. Simulink User Manual. R13. 2002.
[55] A. Toselli and O. Widlund. Domain Decomposition Methods –
Algorithms and Theory. Springer Series in Computational, Mathematics
34, Springer, Berlin, Heidelberg, 2005.
[56] R. S. Varga. Matrix Iterative Analysis. Prentice-Hall, Englewood Cliffs,
New Jersey, 1962. Second Edition, Springer Series in Computational
Mathematics 27, Springer, Berlin, Heidelberg, New York, 2000.
[57] W. T. Weeks, A. J. Jimenez, G. W. Mahoney, and D. Mehta. Algorithms
for ASTAP - A Network-Analysis Program. IEEE Trans.Circuit Theory,
CT-20(4):628-634, 1973.
[58] Fei Wei, Huazhong Yang. Directed Transmission Method, A Fully
Asynchronous Approach to Solve Sparse Linear Systems in Parallel. In
ACM Proceedings of the 20th Symposium on Parallelism in Algorithms
and Architectures (Munich, Germany, June 14 - 16, 2008). SPAA 2008.
[59] Fei Wei, Huazhong Yang, Virtual Transmission Method, A New
Distributed Algorithm to Solve Sparse Linear Systems. The Fourth
International Conference on Networked Computing and Advanced
Information Management, vol. 1, pp.703-709, 2008.
14
[60] Fei Wei, Huazhong Yang. Waveform Transmission Method, A New
Waveform Relaxation Based Algorithm to Solve Ordinary Differential
Equations. Preprinted. 2009.
[61] Fei Wei, Huazhong Yang. Transmission Line Inspires a New Distributed
Algorithm to Solve the Nonlinear Dynamical System of Physical Circuits.
The 5th International Conference on Computer Sciences and Convergence
Information Technology, Nov. 30, Seoul, Korea, 2010.
[62] Fei Wei, Huazhong Yang. Virtual Transmission Method, Algorithm and
Theory. Preprinted. 2009.
[63] J. White, A. Sangiovanni-Vincentelli, Relaxation Techniques for the
simulation of VLSI circuits. Kluwer Academic Publishers, 1986.
[64] Felix F. Wu. Solution of large-scale networks by tearing. IEEE
Transactions on Circuits and Systems, 1976.
[65] Wei Xue, Jiwu Shu, Yongwei Wu, Weimin Zheng. Parallel Algorithm and
Implementation for Realtime Dynamical Simulation of Power System.
ICPP 2005: 137-144.
[66] D. M. Young. Iterative Solution of Large Linear Systems. Academic Press,
New York, 1971.
[67] Yu Zhong, M. D. F. Wong, Fast algorithms for IR drop analysis in large
power grid, Proceedings of the 2005 IEEE/ACM International conference
on Computer-aided design, p.351-357, November 06-10, 2005.
[68] Quming Zhou, Kai Sun, Kartik Mohanram, Danny C. Sorensen. Large
power grid analysis using domain decomposition, Proceedings of the
conference on Design, automation and test in Europe: Proceedings, March
06-10, 2006, Munich, Germany.
[69] C. Zhuo, J. Hu, M. Zhao, and K. Chen. Power grid analysis and
optimization using algebraic multigrid. IEEE Transactions on
Computer-aided Design, 27:738–751, April 2008.
Fei Wei received the B.S. degree in electronic engineering from Tsinghua
University, Beijing, China in 2004. He is currently a Ph.D student in
Department of Electronic Engineering, Tsinghua University. His research
interests are distributed numerical algorithms and transistor-level circuit
simulation.
Huazhong Yang (M’97–SM’00) received the B.S. degree in microelectronics
and the M.S. and Ph.D. degrees in circuits and systems from Tsinghua
University, Beijing, China, in 1989, 1993, and 1998, respectively. Since 1993,
he has been with the Department of Electronic Engineering, Tsinghua
University, where he has been a Full Professor since 1998. His research
interests include CMOS radio-frequency integrated circuits, VLSI system
structure for digital communications and media processing, low-voltage and
low power integrated circuits, and computer-aided design methodologies for
system integration. He has authored or coauthored 6 books and more than 180
journal and conference papers in this area and holds 9 China patents. He is also
a coeditor of the research monograph High-speed Optical
Transceivers-Integrated Circuits Designs and Optical Devices Techniques
(World Scientific, 2006).
Dr. Yang was a recipient of the fund for Distinguished Young Scholars from
NSFC in 2000, the outstanding researcher award of the National Keystone
Basic Research Program of China in 2004, and the Special Government
Allowance from the State Council of China in 2006.served as a TPC member of
the Asia-Pacific Conference on Circuits and Systems, the International
Conference on Communications, Circuits and Systems, and the Asia and South
Pacific Design Automation Conference. He is an Associate Editor of the
International Journal of Electronics.
| 5cs.CE
|
arXiv:1708.08062v2 [cs.CV] 18 Oct 2017
Cross-view Asymmetric Metric Learning for
Unsupervised Person Re-identification
Hong-Xing Yu, Ancong Wu, Wei-Shi Zheng
Code is available at the project page:
https://github.com/KovenYu/CAMEL
For reference of this work, please cite:
Hong-Xing Yu, Ancong Wu, Wei-Shi Zheng. “Cross-view Asymmetric
Metric Learning for Unsupervised Person Re-identification.” Proceedings
of the IEEE International Conference on Computer Vision. 2017.
Bib:
@inproceedings{yu2017cross,
title={Cross-view Asymmetric Metric Learning for Unsupervised Person
Re-identification},
author={Yu, Hong-Xing and Wu, Ancong and Zheng, Wei-Shi},
booktitle={Proceedings of the IEEE International Conference on Computer
Vision},
year={2017}
}
Cross-view Asymmetric Metric Learning for
Unsupervised Person Re-identification
Hong-Xing Yu1,5 , Ancong Wu2 , and Wei-Shi Zheng1,3,4∗
School of Data and Computer Science, Sun Yat-sen University, China
2
School of Electronics and Information Technology, Sun Yat-sen University, China
3
Key Laboratory of Machine Intelligence and Advanced Computing, Ministry of Education, China
4
Collaborative Innovation Center of High Performance Computing, NUDT, China
5
Guangdong Key Laboratory of Big Data Analysis and Processing, Guangzhou, China
1
xKoven@gmail.com, wuancong@mail2.sysu.edu.cn, wszheng@ieee.org
Abstract
While metric learning is important for Person reidentification (RE-ID), a significant problem in visual
surveillance for cross-view pedestrian matching, existing
metric models for RE-ID are mostly based on supervised
learning that requires quantities of labeled samples in all
pairs of camera views for training. However, this limits
their scalabilities to realistic applications, in which a large
amount of data over multiple disjoint camera views is available but not labelled. To overcome the problem, we propose
unsupervised asymmetric metric learning for unsupervised
RE-ID. Our model aims to learn an asymmetric metric, i.e.,
specific projection for each view, based on asymmetric clustering on cross-view person images. Our model finds a
shared space where view-specific bias is alleviated and thus
better matching performance can be achieved. Extensive
experiments have been conducted on a baseline and five
large-scale RE-ID datasets to demonstrate the effectiveness
of the proposed model. Through the comparison, we show
that our model works much more suitable for unsupervised
RE-ID compared to classical unsupervised metric learning
models. We also compare with existing unsupervised REID methods, and our model outperforms them with notable
margins. Specifically, we report the results on large-scale
unlabelled RE-ID dataset, which is important but unfortunately less concerned in literatures.
1. Introduction
Person re-identification (RE-ID) is a challenging problem focusing on pedestrian matching and ranking across
non-overlapping camera views. It remains an open problem
although it has received considerable exploration recently,
in consideration of its potential significance in security ap-
plications, especially in the case of video surveillance. It
has not been solved yet principally because of the dramatic
intra-class variation and the high inter-class similarity. Existing attempts mainly focus on learning to extract robust
and discriminative representations [33, 23, 19], and learning
matching functions or metrics [38, 14, 18, 22, 19, 20, 26]
in a supervised manner. Recently, deep learning has been
adopted to RE-ID community [1, 32, 28, 27] and has gained
promising results.
However, supervised strategies are intrinsically limited
due to the requirement of manually labeled cross-view training data, which is very expensive [31]. In the context of
RE-ID, the limitation is even pronounced because (1) manually labeling may not be reliable with a huge number of images to be checked across multiple camera views, and more
importantly (2) the astronomical cost of time and money
is prohibitive to label the overwhelming amount of data
across disjoint camera views. Therefore, in reality supervised methods would be restricted when applied to a new
scenario with a huge number of unlabeled data.
To directly make full use of the cheap and valuable unlabeled data, some existing efforts on exploring unsupervised
strategies [8, 35, 29, 13, 21, 24, 30, 12] have been reported,
but they are still not very satisfactory. One of the main reasons is that without the help of labeled data, it is rather difficult to model the dramatic variances across camera views,
such as the variances of illumination and occlusion conditions. Such variances lead to view-specific interference/bias
which can be very disturbing in finding what is more distinguishable in matching people across views (see Figure 1).
In particular, existing unsupervised models treat the samples from different views in the same manner, and thus the
effects of view-specific bias could be overlooked.
In order to better address the problems caused by camera view changes in unsupervised RE-ID scenarios, we pro-
Projected by U1
Camera-1
Clustering
Projected by U2
Camera-2
Original Space
Shared Space
Figure 1. Illustration of view-specific interference/bias and our
idea. Images from different cameras suffer from view-specific interference, such as occlusions in Camera-1, dull illumination in
Camera-2, and the change of viewpoints between them. These factors introduce bias in the original feature space, and therefore unsupervised re-identification is extremely challenging. Our model
structures data by clustering and learns view-specific projections
jointly, and thus finds a shared space where view-specific bias is
alleviated and better performance can be achieved. (Best viewed
in color)
pose a novel unsupervised RE-ID model named Clusteringbased Asymmetric1 MEtric Learning (CAMEL). The ideas
behind are on the two following considerations. First, although conditions can vary among camera views, we assume that there should be some shared space where the data
representations are less affected by view-specific bias. By
projecting original data into the shared space, the distance
between any pair of samples xi and xj is computed as:
d(xi , xj ) = kU T xi − U T xj k2 =
p
(xi − xj )T M (xi − xj ),
(1)
where U is the transformation matrix and M = U U T .
However, it can be hard for a universal transformation to
implicitly model the view-specific feature distortion from
different camera views, especially when we lack label information to guide it. This motivates us to explicitly model
the view-specific bias. Inspired by the supervised asymmetric distance model [4], we propose to embed the asymmetric
metric learning to our unsupervised RE-ID modelling, and
thus modify the symmetric form in Eq. (1) to an asymmetric
one:
d(xpi , xqj ) = kU pT xpi − U qT xqj k2 ,
(2)
where p and q are indices of camera views.
An asymmetric metric is more acceptable for unsupervised RE-ID scenarios as it explicitly models the variances
among views by treating each view differently. By such
an explicit means, we are able to better alleviate the disturbances of view-specific bias.
The other consideration is that since we are not clear
about how to separate similar persons in lack of labeled
data, it is reasonable to pay more attention to better separating dissimilar ones. Such consideration motivates us
to structure our data by clustering. Therefore, we develop
1 “Asymmetric”
means specific transformations for each camera view.
asymmetric metric clustering that clusters cross-view person images. By clustering together with asymmetric modelling, the data can be better characterized in the shared
space, contributing to better matching performance (see
Figure 1).
In summary, the proposed CAMEL aims to learn viewspecific projection for each camera view by jointly learning
the asymmetric metric and seeking optimal cluster separations. In this way, the data from different views is projected
into a shared space where view-specific bias is aligned to an
extent, and thus better performance of cross-view matching
can be achieved.
So far in literatures, the unsupervised RE-ID models
have only been evaluated on small datasets which contain
only hundreds or a few thousands of images. However, in
more realistic scenarios we need evaluations of unsupervised methods on much larger datasets, say, consisting of
hundreds of thousands of samples, to validate their scalabilities. In our experiments, we have conducted extensive
comparison on datasets with their scales ranging widely.
In particular, we combined two existing RE-ID datasets
[37, 36] to obtain a larger one which contains over 230,000
samples. Experiments on this dataset (see Sec. 4.4) show
empirically that our model is more scalable to problems of
larger scales, which is more realistic and more meaningful
for unsupervised RE-ID models, while some existing unsupervised RE-ID models are not scalable due to the expensive cost in either storage or computation.
2. Related Work
At present, most existing RE-ID models are in a supervised manner. They are mainly based on learning distance
metrics or subspace [38, 14, 18, 22, 19, 20, 26], learning
view-invariant and discriminative features [33, 23, 19], and
deep learning frameworks [1, 32, 28, 27]. However, all
these models rely on substantial labeled training data, which
is typically required to be pair-wise for each pair of camera
views. Their performance depends highly on the quality
and quantity of labeled training data. In contrast, our model
does not require any labeled data and thus is free from prohibitively high cost of manually labeling and the risk of incorrect labeling.
To directly utilize unlabeled data for RE-ID, several unsupervised RE-ID models [35, 29, 21, 13, 24] have been
proposed. All these models differ from ours in two aspects. On the one hand, these models do not explicitly exploit the information on view-specific bias, i.e., they treat
feature transformation/quantization in every distinct camera
view in the same manner when modelling. In contrast, our
model tries to learn specific transformation for each camera
view, aiming to find a shared space where view-specific interference can be alleviated and thus better performance can
be achieved. On the other hand, as for the means to learn
a metric or a transformation, existing unsupervised methods for RE-ID rarely consider clustering while we introduce
an asymmetric metric clustering to characterize data in the
learned space. While the methods proposed in [4, 2, 3]
could also learn view-specific mappings, they are supervised methods and more importantly cannot be generalized
to handle unsupervised RE-ID.
Apart from our model, there have been some clusteringbased metric learning models [34, 25]. However, to our best
knowledge, there is no such attempt in RE-ID community
before. This is potentially because clustering is more susceptible to view-specific interference and thus data points
from the same view are more inclined to be clustered together, instead of those of a specific person across views.
Fortunately, by formulating asymmetric learning and further limiting the discrepancy between view-specific transforms, this problem can be alleviated in our model. Therefore, our model is essentially different from these models
not only in formulation but also in that our model is able
to better deal with cross-view matching problem by treating
each view asymmetrically. We will discuss the differences
between our model and the existing ones in detail in Sec.
4.3.
acceptable to relax the original idea: we focus on gathering
similar person images together, and hence separating relatively dissimilar ones. Such goal can be modelled by minimizing an objective function like that of k-means clustering
[10]:
U
3.1. Problem Formulation
Under a conventional RE-ID setting, suppose we have
a surveillance camera network that consists of V camera
views, from each of which we have collected Np (p =
1, · · · , V ) images and thus there are N = N1 + · · · + NV
images in total as training samples.
Let X = [x11 , · · · , x1N1 , · · · , xV1 , · · · , xVNV ] ∈ RM ×N
denote the training set, with each column xpi (i =
1, · · · , Np ; p = 1, · · · , V ) corresponding to an M dimensional representation of the i-th image from the pth camera view. Our goal is to learn V mappings i.e.,
U 1 , · · · , U V , where U p ∈ RM ×T (p = 1, · · · , V ), corresponding to each camera view, and thus we can project
the original representation xpi from the original space RM
into a shared space RT in order to alleviate the view-specific
interference.
3.2. Modelling
Now we are looking for some transformations to map
our data into a shared space where we can better separate
the images of one person from those of different persons.
Naturally, this goal can be achieved by narrowing intraclass discrepancy and meanwhile pulling the centers of all
classes away from each other. In an unsupervised scenario,
however, we have no labeled data to tell our model how it
can exactly distinguish one person from another who has a
confusingly similar appearance with him. Therefore, it is
kU T xi − ck k2 ,
(3)
k=1 i∈Ck
where K is the number of clusters, ck denotes the centroid
of the k-th cluster and Ck = {i|U T xi ∈ k-th cluster}.
However, clustering results may be affected extremely
by view-specific bias when applied in cross-view problems.
In the context of RE-ID, the feature distortion could be
view-sensitive due to view-specific interference like different lighting conditions and occlusions [4]. Such interference might be disturbing or even dominating in searching
the similar person images across views during clustering
procedure. To address this cross-view problem, we learn
specific projection for each view rather than a universal one
to explicitly model the effect of view-specific interference
and to alleviate it. Therefore, the idea can be further formulated by minimizing an objective function below:
min
3. Methodology
K X
X
min Fintra =
U 1 ,··· ,U V
s.t.
Fintra =
K X
X
kU pT xpi − ck k2
k=1 i∈Ck
U
pT
p
p
Σ U =I
(4)
(p = 1, · · · , V ),
where the notation is similar to Eq. (3), with p denotes the
view index, Σp = X p X pT /Np + αI and I represents the
identity matrix which avoids singularity of the covariance
matrix. The transformation U p that corresponds to each
instance xpi is determined by the camera view which xpi
comes from. The quasi-orthogonal constraints on U p ensure that the model will not simply give zero matrices. By
combining the asymmetric metric learning, we actually realize an asymmetric metric clustering on RE-ID data across
camera views.
Intuitively, if we minimize this objective function directly, U p will largely depend on the data distribution from
the p-th view. Now that there is specific bias on each view,
any U p and U q could be arbitrarily different. This result is
very natural, but large inconsistencies among the learned
transformations are not what we exactly expect, because
the transformations are with respect to person images from
different views: they are inherently correlated and homogeneous. More critically, largely different projection basis pairs would fail to capture the discriminative nature of
cross-view images, producing an even worse matching result.
Hence, to strike a balance between the ability to capture
discriminative nature and the capability to alleviate viewspecific bias, we embed a cross-view consistency regularization term into our objective function. And then, in consideration of better tractability, we divide the intra-class
0.8
1
0.5
View1, ID1
View2, ID1
View1, ID2
View2, ID2
0.6
0.4
where
1
View1, ID1
View2, ID1
View1, ID2
View2, ID2
0.5
0.2
0
0
H = h1 , ..., hK ,
0
hT
k hl =
-0.2
-0.5
-0.4
View1, ID1
View2, ID1
View1, ID2
View2, ID2
-0.5
-0.6
-1
-1.5
-1
-0.5
0
0.5
-0.8
1.5 -1.5
1
(a) Original
-1
-0.5
0
0.5
1
-1
-0.8
-0.6
(b) Symmetric
-0.4
-0.2
0
0.2
0.4
0.6
Figure 2. Illustration of how symmetric and asymmetric metric
clustering structure data using our method for the unsupervised
RE-ID problem. The samples are from the SYSU dataset [4]. We
performed PCA for visualization. One shape (triangle or circle)
stands for samples from one view, while one color indicates samples of one person. (a) Original distribution (b) distribution in the
common space learned by symmetric metric clustering (c) distribution in the shared space learned by asymmetric metric clustering. (Best viewed in color)
term by its scale N , so that the regulating parameter would
not be sensitive to the number of training samples. Thus,
our optimization task becomes
min
U 1 ,··· ,U V
Fobj =
1
x1
0
f= .
X
..
0
s.t.
U
p
p
Σ U =I
k=1
k=1 i∈Ck
(9)
xVNV
(10)
(11)
(12)
k
As for the second term, we can also rewrite it as follow:
For convenience, we denote yi = U pT xpi . Then we have
Y ∈ RT ×N , where each column yi corresponds to the projected new representation of that from X. For optimization,
we rewrite our objective function in a more compact form.
The first term can be rewritten as follow [6]:
kyi − ck k2 =
1
fT U
eU
e T X)
f − 1 Tr(H T X
fT U
eU
e T XH).
f
= Tr(X
N
N
(p = 1, · · · , V ),
3.3. Optimization
X
0
0
..
.
K
1 XX
kyi − ck k2
N
i∈C
where λ is the cross-view regularizer and k·kF denotes the
Frobenius norm of a matrix. We call the above model the
Clustering-based Asymmetric MEtric Learning (CAMEL).
To illustrate the differences between symmetric and
asymmetric metric clustering in structuring data in the REID problem, we further show the data distributions in Figure
2. We can observe from Figure 2 that the view-specific bias
is obvious in the original space: triangles in the upper left
and circles in the lower right. In the common space learned
by symmetric metric clustering, the bias is still obvious. In
contrast, in the shared space learned by asymmetric metric
clustering, the bias is alleviated and thus the data is better characterized according to the identities of the persons,
i.e., samples of one person (one color) gather together into
a cluster.
1
N
···
···
..
.
···
and thus Eq. (6) becomes
(5)
K
X
x1N1 0 · · ·
0
0
x21 · · · x2N2
..
..
..
..
.
.
.
.
0
0 ···
0
e = U 1T , · · · , U V T T ,
U
e T X,
f
Y =U
p6=q
k
···
···
..
.
···
so that
K
X p
1 XX
=
kU pT xpi − ck k2 + λ
kU − U q k2F
N
i∈C
pT
(8)
is an indicator vector with the i-th entry corresponding to
the instance yi , indicating that yi is in the k-th cluster if the
corresponding entry does not equal zero. Then we construct
1
Fintra + λFconsistency
N
k=1
(7)
T √
hk = 0, · · · , 0, 1, · · · , 1, 0, · · · , 0, 1, · · · / nk
0.8
(c) Asymmetric
(
0 k 6= l
1 k=l
1
[Tr(Y T Y ) − Tr(H T Y T Y H)],
N
(6)
λ
X p
e T DU
e ),
kU − U q k2F = λTr(U
(13)
p6=q
where
(V − 1)I
−I
D=
..
.
−I
−I
(V − 1)I
..
.
−I
−I
−I
..
.
−I
···
···
..
.
···
−I
−I
. (14)
..
.
(V − 1)I
Then, it is reasonable to relax the constraints
U pT Σp U p = I
(p = 1, · · · , V )
(15)
e TΣ
eU
e = V I,
U pT Σp U p = U
(16)
to
V
X
p=1
e = diag(Σ1 , · · · , ΣV ) because what we expect
where Σ
is to prevent each U p from shrinking to a zero matrix. The
relaxed version of constraints is able to satisfy our need, and
it bypasses trivial computations.
By now we can rewrite our optimization task as follow:
1
fT U
eU
e T X)
f + λTr(U
e T DU
e)
Tr(X
N
1
fT U
eU
e T XH)
f
− Tr(H T X
N
e TΣ
eU
e = V I.
s.t.
U
min Fobj =
e
U
(17)
It is easy to realize from Eq. (5) that our objective function is highly non-linear and non-convex. Fortunately, in
the form of Eq. (17) we can find that once H is fixed, Lagrange’s method can be applied to our optimization task.
And again from Eq. (5), it is exactly the objective of ke is fixed [10]. Thus, we can adopt
means clustering once U
an alternating algorithm to solve the optimization problem.
e . Now we see how we optimize
Fix H and optimize U
e
U . After fixing H and applying the method of Lagrange
multiplier, our optimization task (17) is transformed into an
eigen-decomposition problem as follow:
Gu = γu,
(18)
Algorithm 1: CAMEL
1
2
3
e K, = 10−8
Input : X,
e
Output: U
e to initialize
Conduct k-means clustering with respect to each column of X
H according to Eq. (7) and (8).
Fix H and solve the eigen-decomposition problem described by Eq. (18) and
e.
(19) to construct U
while decrement of Fobj > & maximum iteration unreached do
• Construct Y according to Eq. (11).
e and conduct k-means clustering with respect to each column
• Fix U
of Y to update H according to Eq. (7) and (8).
• Fix H and solve the eigen-decomposition problem described by
e.
Eq. (18) and (19) to update U
4
end
where γ is the Lagrange multiplier (and also is the eigenvalue here) and
T fT
fX
fT − 1 XHH
f
e −1 (λD + 1 X
X ).
G=Σ
N
N
(19)
e can be obtained by solving this eigenThen, U
decomposition problem.
e and optimize H. As for the optimization of H,
Fix U
e and conduct k-means clustering in the
we can simply fix U
learned space. Each column of H, hk , is thus constructed
according to the clustering result.
Based on the analysis above, we can now propose the
main algorithm of CAMEL in Algorithm 1. We set maxie , we decompose it
mum iteration to 100. After obtaining U
1
V
back into {U , · · · , U }. The algorithm is guaranteed to
convergence, as given in the following proposition:
Proposition 1. In Algorithm 1, Fobj is guaranteed to convergence.
e is fixed, if H is the loProof. In each iteration, when U
cal minimizer, k-means remains H unchanged, otherwise
e has a
it seeks the local minimizer. When H is fixed, U
closed-form solution which is the global minimizer. Therefore, the Fobj decreases step by step. As Fobj ≥ 0 has a
lower bound 0, it is guaranteed to convergence.
4. Experiments
4.1. Datasets
Since unsupervised models are more meaningful when
the scale of problem is larger, our experiments were conducted on relatively big datasets except VIPeR [9] which
is small but widely used. Various degrees of view-specific
bias can be observed in all these datasets (see Figure 3).
The VIPeR dataset contains 632 identities, with two images captured from two camera views of each identity.
The CUHK01 dataset [16] contains 3,884 images of 971
identities captured from two disjoint views. There are two
images of every identity from each view.
(a)
(b)
(c)
(d)
(e)
(f)
Figure 3. Samples of the datasets. Every two images in a column
are from one identity across two disjoint camera views. (a) VIPeR
(b) CUHK01 (c) CUHK03 (d) SYSU (e) Market (f) ExMarket.
(Best viewed in color)
Dataset
VIPeR
CUHK01 CUHK03
SYSU
Market
ExMarket
# Samples
# Views
1,264
2
3,884
2
24,448
2
32,668
6
236,696
6
13,164
6
Table 1. Overview of dataset scales. “#” means “the number of”.
The CUHK03 dataset [17] contains 13,164 images of
1,360 pedestrians captured from six surveillance camera
views. Besides hand-cropped images, samples detected by
a state-of-the-art pedestrian detector are provided.
The SYSU dataset [4] includes 24,448 RGB images of 502
persons under two surveillance cameras. One camera view
mainly captured the frontal or back views of persons, while
the other observed mostly the side views.
The Market-1501 dataset [37] (Market) contains 32,668
images of 1,501 pedestrians, each of which was captured
by at most six cameras. All of the images were cropped by
a pedestrian detector. There are some bad-detected samples
in this datasets as distractors as well.
The ExMarket dataset2 . In order to evaluate unsupervised
RE-ID methods on even larger scale, which is more realistic, we further combined the MARS dataset [36] with
Market. MARS is a video-based RE-ID dataset which con2 Demo code for the model and the ExMarket dataset can be found on
https://github.com/KovenYu/CAMEL.
tains 20,715 tracklets of 1,261 pedestrians. All the identities
from MARS are of a subset of those from Market. We then
took 20% frames (each one in every five successive frames)
from the tracklets and combined them with Market to obtain
an extended version of Market (ExMarket). The imbalance
between the numbers of samples from the 1,261 persons and
other 240 persons makes this dataset more challenging and
realistic. There are 236,696 images in ExMarket in total,
and 112,351 images of them are of training set. A brief
overview of the dataset scales can be found in Table 1.
4.2. Settings
Experimental protocols: A widely adopted protocol was
followed on VIPeR in our experiments [19], i.e., randomly
dividing the 632 pairs of images into two halves, one of
which was used as training set and the other as testing set.
This procedure was repeated 10 times to offer average performance. Only single-shot experiments were conducted.
The experimental protocol for CUHK01 was the same as
that in [19]. We randomly selected 485 persons as training set and the other 486 ones as testing set. The evaluating procedure was repeated 10 times. Both multi-shot and
single-shot settings were conducted.
The CUHK03 dataset was provided together with its recommended evaluating protocol [17]. We followed the provided protocol, where images of 1,160 persons were chosen
as training set, images of another 100 persons as validation
set and the remainders as testing set. This procedure was repeated 20 times. In our experiments, detected samples were
adopted since they are closer to real-world settings. Both
multi-shot and single-shot experiments were conducted.
As for the SYSU dataset, we randomly picked 251
pedestrians’ images as training set and the others as testing
set. In the testing stage, we basically followed the protocol
as in [4]. That is, we randomly chose one and three images
of each pedestrian as gallery for single-shot and multi-shot
experiments, respectively. We repeated the testing procedure by 10 times.
Market is somewhat different from others. The evaluation protocol was also provided along with the data [37].
Since the images of one person came from at most six
views, single-shot experiments were not suitable. Instead,
multi-shot experiments were conducted and both cumulative matching characteristic (CMC) and mean average precision (MAP) were adopted for evaluation [37]. The protocol of ExMarket was identical to that of Market since the
identities were completely the same as we mentioned above.
Data representation: In our experiments we used the deeplearning-based JSTL feature proposed in [32]. We implemented it using the 56-layer ResNet [11], which produced
64-D features. The original JSTL was adopted to our implementation to extract features on SYSU, Market and ExMarket. Note that the training set of the original JSTL contained
VIPeR, CUHK01 and CUHK03, violating the unsupervised
setting. So we trained a new JSTL model without VIPeR
in its training set to extract features on VIPeR. The similar
procedures were done for CUHK01 and CUHK03.
Parameters: We set λ, the cross-view consistency regularizer, to 0.01. We also evaluated the situation when λ goes
to infinite, i.e., the symmetric version of our model in Sec.
4.4, to show how important the asymmetric modelling is.
Regarding the parameter T which is the feature dimension after the transformation learned by CAMEL, we set T
equal to original feature dimension i.e., 64, for simplicity.
In our experiments, we found that CAMEL can align data
distributions across camera views even without performing
any further dimension reduction. This may be due to the
fact that, unlike conventional subspace learning models, the
transformations learned by CAMEL are view-specific for
different camera views and always non-orthogonal. Hence,
the learned view-specific transformations can already reduce the discrepancy between the data distributions of different camera views.
As for K, we found that our model was not sensitive to
K when N K and K was not too small (see Sec. 4.4),
so we set K = 500. These parameters were fixed for all
datasets.
4.3. Comparison
Unsupervised models are more significant when applied
on larger datasets. In order to make comprehensive and
fair comparisons, in this section we compare CAMEL with
the most comparable unsupervised models on six datasets
with their scale orders varying from hundreds to hundreds
of thousands. We show the comparative results measured
by the rank-1 accuracies of CMC and MAP (%) in Table 2.
Comparison to Related Unsupervised RE-ID Models. In
this subsection we compare CAMEL with the sparse dictionary learning model (denoted as Dic) [13], sparse representation learning model ISR [21], kernel subspace learning
model RKSL [30] and sparse auto-encoder (SAE) [15, 5].
We tried several sets of parameters for them, and report the
best ones. We also adopt the Euclidean distance which is
adopted in the original JSTL paper [32] as a baseline (denoted as JSTL).
From Table 2 we can observe that CAMEL outperforms
other models on all the datasets on both settings. In addition, we can further see from Figure 4 that CAMEL outperforms other models at any rank. One of the main reasons
is that the view-specific interference is noticeable in these
datasets. For example, we can see in Figure 3(b) that on
CUHK01, the changes of illumination are extremely severe
and even human beings may have difficulties in recognizing
the identities in those images across views. This impedes
other symmetric models from achieving higher accuracies,
because they potentially hold an assumption that the invari-
SS
Dic [13]
ISR [21]
RKSL [30]
SAE [15]
JSTL [32]
29.9
27.5
25.8
20.7
25.7
CUHK01 CUHK03
SYSU
Market
ExMarket
SS/MS
SS/MS
MS
MS
49.3/52.9
53.2/55.7
45.4/50.1
45.3/49.9
46.3/50.6
SS/MS
27.4/36.5
31.1/38.5
25.8/34.8
21.2/30.5
24.7/33.2
21.3/28.6
23.2/33.8
17.6/23.0
18.0/24.2
19.9/25.6
50.2(22.7) 52.2(21.2)
40.3(14.3)
34.0(11.0)
42.4(16.2) 44.0(15.1)
44.7(18.4) 46.4(16.7)
95
70
90
85
60
Matching Accuracy (%)
VIPeR
Setting
Matching Accuracy (%)
Dataset
DIC
ISR
UsNCA
AML
SAE
RKSL
JSTL
CAMEL
50
40
30
46.8/51.1 22.2/31.4 20.9/26.4 44.7(18.4) 46.2(16.2)
47.0/51.7 19.8/29.6 21.1/27.2 45.2(18.9)
-
CAMEL
30.9
57.3/61.9 31.9/39.4 30.8/36.8 54.5(26.3) 55.9(23.9)
Table 2. Comparative results of unsupervised models on the six
datasets, measured by rank-1 accuracies and MAP (%). “-” means
prohibitive time consumption due to time complexities of the
models. “SS” represents single-shot setting and “MS” represents
multi-shot setting. For Market and ExMarket, MAP is also provided in the parentheses due to the requirement in the protocol
[37]. Such a format is also applied in the following tables.
15
70
65
60
50
45
20
5
(a) VIPeR
15
20
80
70
70
60
60
DIC
ISR
UsNCA
AML
SAE
RKSL
JSTL
CAMEL
50
40
30
DIC
ISR
UsNCA
AML
SAE
RKSL
JSTL
CAMEL
50
40
30
20
20
5
10
Rank
15
5
20
(c) CUHK03
10
Rank
15
20
(d) SYSU
85
80
80
75
Matching Accuracy (%)
75
Matching Accuracy (%)
ant and discriminative information can be retained and exploited through a universal transformation for all views. But
CAMEL relaxes this assumption by learning an asymmetric
metric and then can outperform other models significantly.
In Sec. 4.4 we will see the performance of CAMEL would
drop much when it degrades to a symmetric model.
Comparison to Clustering-based Metric Learning Models. In this subsection we compare CAMEL with a typical
model AML [34] and a recently proposed model UsNCA
[25]. We can see from Fig. 4 and Table 2 that compared
to them, CAMEL achieves noticeable improvements on all
the six datasets. One of the major reasons is that they do not
consider the view-specific bias which can be very disturbing in clustering, making them unsuitable for RE-ID problem. In comparison, CAMEL alleviates such disturbances
by asymmetrically modelling. This factor contributes to the
much better performance of CAMEL.
Comparison to the State-of-the-Art. In the last subsections, we compared with existing unsupervised RE-ID
methods using the same features. In this part, we also compare with the results reported in literatures. Note that most
existing unsupervised RE-ID methods have not been evaluated on large datasets like CUHK03, SYSU, or Market,
so Table 3 only reports the comparative results on VIPeR
and CUHK01. We additionally compared existing unsupervised RE-ID models, including the hand-craft-feature-based
SDALF [8] and CPS [7], the transfer-learning-based UDML
[24], graph-learning-based model (denoted as GL) [12], and
local-salience-learning-based GTS [29] and SDC [35]. We
can observe from Table 3 that our model CAMEL can outperform the state-of-the-art by large margins on CUHK01.
Comparison to Supervised Models. Finally, in order to
see how well CAMEL can approximate the performance of
supervised RE-ID, we additionally compare CAMEL with
its supervised version (denoted as CAMELs ) which is easily
10
Rank
(b) CUHK01
Matching Accuracy (%)
23.1
24.3
Matching Accuracy (%)
AML [34]
UsNCA [25]
10
Rank
DIC
ISR
UsNCA
AML
SAE
RKSL
JSTL
CAMEL
75
55
20
5
80
70
DIC
ISR
UsNCA
AML
SAE
RKSL
JSTL
CAMEL
65
60
55
50
45
70
65
60
DIC
AML
SAE
JSTL
CAMEL
55
50
45
40
5
10
Rank
15
5
20
(e) Market
10
Rank
15
20
(f) ExMarket
Figure 4. CMC curves. For CUHK01, CUHK03 and SYSU, we
take the results under single-shot setting as examples. Similar patterns can be observed on multi-shot setting.
Model
SDALF
[8]
CPS
[7]
UDML
[24]
GL
[12]
GTS
[29]
SDC
[35]
CAMEL
VIPeR
CUHK01
19.9
9.9
22.0
-
31.5
27.1
33.5
41.0
25.2
-
25.8
26.6
30.9
57.3
Table 3. Results compared to the state-of-the-art reported in literatures, measured by rank-1 accuracies (%). “-” means no reported
result.
derived by substituting the clustering results by true labels,
and three standard supervised models, including the widely
used KISSME [14], XQDA [19], the asymmetric distance
model CVDCA [4]. The results are shown in Table 4. We
can see that CAMELs outperforms CAMEL by various degrees, indicating that label information can further improve
CAMEL’s performance. Also from Table 4, we notice that
CAMEL can be comparable to other standard supervised
models on some datasets like CUHK01, and even outperform some of them. It is probably because the used JSTL
model had not been fine-tuned on the target datasets: this
was for a fair comparison with unsupervised models which
work on completely unlabelled training data. Nevertheless,
this suggests that the performance of CAMEL may not be
Dataset
SYSU
Market
ExMarket
Dataset
Setting
VIPeR CUHK01 CUHK03
SS
SS/MS
SS/MS
SS/MS
MS
MS
Setting
VIPeR CUHK01 CUHK03
SS
KISSME [14]
XQDA [19]
CVDCA [4]
CAMELs
28.4
28.9
37.6
33.7
53.0/57.1
54.3/58.2
57.1/60.9
58.5/62.7
37.8/45.4
36.7/43.7
37.0/44.6
45.1/53.5
24.7/31.8
25.2/31.7
31.1/38.9
31.6/37.6
51.1(24.5)
50.8(24.4)
52.6(25.3)
55.0(27.1)
48.0(18.3)
47.4(18.1)
51.5(22.6)
56.1(24.1)
CMEL
CAMEL
27.5
30.9
CAMEL
30.9
57.3/61.9 31.9/39.4 30.8/36.8 54.5(26.3) 55.9(23.9)
SS/MS
SS/MS
SYSU
Market
ExMarket
SS/MS
MS
MS
52.5/54.9 29.8/37.5 25.4/30.9 47.6(21.5) 48.7(20.0)
57.3/61.9 31.9/39.4 30.8/36.8 54.5(26.3) 55.9(23.9)
Table 5. Performances of CAMEL compared to its symmetric version, denoted as CMEL.
Table 4. Results compared to supervised models using the same
JSTL features.
far below the standard supervised RE-ID models.
4.4. Further Evaluations
The Role of Asymmetric Modeling. We show what is going to happen if CAMEL degrades to a common symmetric model in Table 5. Apparently, without asymmetrically
modelling each camera view, our model would be worsen
largely, indicating that the asymmetric modeling for clustering is rather important for addressing the cross-view matching problem in RE-ID as well as in our model.
Sensitivity to the Number of Clustering Centroids. We
take CUHK01, Market and ExMarket datasets as examples
of different scales (see Table 1) for this evaluation. Table 6
shows how the performance varies with different numbers
of clustering centroids, K. It is obvious that the performance only fluctuates mildly when N K and K is not
too small. Therefore CAMEL is not very sensitive to K especially when applied to large-scale problems. To further
explore the reason behind, we show in Table 7 the rate of
clusters which contain more than one persons, in the initial
stage and convergence stage in Algorithm 1. We can see
that (1) in spite of that K is varying, there is always a number of clusters containing more than one persons in both
the initial stage and convergence stage. This indicates that
our model works without the requirement of perfect clustering results. And (2), although the number is various, in
the convergence stage the number is consistently decreased
compared to initialization stage. This shows that the cluster
results are improved consistently. These two observations
suggests that the clustering should be a mean to learn the
asymmetric metric, rather than an ultimate objective.
Adaptation Ability to Different Features. At last, we
show that CAMEL can be effective not only when adopting deep-learning-based JSTL features. We additionally
adopted the hand-crafted LOMO feature proposed in [19].
We performed PCA to produce 512-D LOMO features, and
the results are shown in Table 8. Among all the models, the
results of Dic and ISR are the most comparable (Dic and
ISR take all second places). So for clarity, we only compare
CAMEL with them and L2 distance as baseline. From the
table we can see that CAMEL can outperform them.
K
250
500
750
1000
1250
CUHK01
Market
ExMarket
56.59
54.48
55.49
57.35
54.45
55.87
56.26
54.54
56.17
55.12
54.48
55.93
52.75
54.48
55.67
Table 6. Performances of CAMEL when the number of clusters,
K, varies. Measured by single-shot rank-1 accuracies (%) for
CUHK01 and multi-shot for Market and ExMarket.
K
250
500
750
1000
1250
Initial Stage
Convergence Stage
77.6%
55.8%
57.0%
34.3%
26.3%
18.2%
11.6%
7.2%
6.0%
4.8%
Table 7. Rate of clusters containing similar persons on CUHK01.
Similar trend can be observed on other datasets.
Dataset
VIPeR
Setting
SS
Dic [13]
ISR [21]
L2
15.8
20.8
11.6
19.6/23.6 8.6/13.4 14.2/24.4 32.8(12.2) 33.8(12.2)
22.2/27.1 16.7/20.7 11.7/21.6 29.7(11.0)
14.0/18.6 7.6/11.6 10.8/18.9 27.4(8.3) 27.7(8.0)
26.4
30.0/36.2 17.3/23.4 23.6/35.6 41.4(14.1) 42.2(13.7)
CAMEL
CUHK01 CUHK03
SYSU
Market
ExMarket
SS/MS
SS/MS
MS
MS
SS/MS
Table 8. Results using 512-D LOMO features.
5. Conclusion
In this work, we have shown that metric learning can be
effective for unsupervised RE-ID by proposing clusteringbased asymmetric metric learning called CAMEL. CAMEL
learns view-specific projections to deal with view-specific
interference, and this is based on existing clustering (e.g.,
the k-means model demonstrated in this work) on RE-ID
unlabelled data, resulting in an asymmetric metric clustering. Extensive experiments show that our model can outperform existing ones in general, especially on large-scale
unlabelled RE-ID datasets.
Acknowledgement
This work was supported partially by the National Key Research and Development Program of
China (2016YFB1001002), NSFC(61522115, 61472456,
61573387, 61661130157, U1611461), the Royal Society
Newton Advanced Fellowship (NA150459), Guangdong
Province Science and Technology Innovation Leading Talents (2016TX03X157).
References
[1] E. Ahmed, M. Jones, and T. K. Marks. An improved deep
learning architecture for person re-identification. In CVPR,
2015.
[2] L. An, M. Kafai, S. Yang, and B. Bhanu. Reference-based
person re-identification. In AVSS, 2013.
[3] L. An, M. Kafai, S. Yang, and B. Bhanu. Person reidentification with reference descriptor. TCSVT, 2015.
[4] Y.-C. Chen, W.-S. Zheng, J.-H. Lai, and P. Yuen. An asymmetric distance model for cross-view feature mapping in person re-identification. TCSVT, 2015.
[5] A. Coates, H. Lee, and A. Y. Ng. An analysis of single-layer
networks in unsupervised feature learning. Ann Arbor, 2010.
[6] C. H. Q. Ding and X. He. On the equivalence of nonnegative
matrix factorization and spectral clustering. In ICDM, 2005.
[7] S. C. Dong, M. Cristani, M. Stoppa, L. Bazzani, and
V. Murino. Custom pictorial structures for re-identification.
In BMVC, 2011.
[8] M. Farenzena, L. Bazzani, A. Perina, V. Murino, and
M. Cristani. Person re-identification by symmetry-driven accumulation of local features. In CVPR, 2010.
[9] D. Gray, S. Brennan, and H. Tao. Evaluating appearance
models for recognition, reacquisition, and tracking. In PETS,
2007.
[10] J. A. Hartigan. Clustering algorithms. John Wiley & Sons
Inc, 1975.
[11] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning
for image recognition. In CVPR, 2016.
[12] E. Kodirov, T. Xiang, Z. Fu, and S. Gong. Person reidentification by unsupervised\ ell 1 graph learning. In
ECCV, 2016.
[13] E. Kodirov, T. Xiang, and S. Gong. Dictionary learning with
iterative laplacian regularisation for unsupervised person reidentification. In BMVC, 2015.
[14] M. Köstinger, M. Hirzer, P. Wohlhart, P. M. Roth, and
H. Bischof. Large scale metric learning from equivalence
constraints. In CVPR, 2012.
[15] H. Lee, C. Ekanadham, and A. Y. Ng. Sparse deep belief net
model for visual area v2. In NIPS, 2008.
[16] W. Li, R. Zhao, and X. Wang. Human reidentification with
transferred metric learning. In ACCV, 2012.
[17] W. Li, R. Zhao, T. Xiao, and X. Wang. Deepreid: Deep filter
pairing neural network for person re-identification. In CVPR,
2014.
[18] Z. Li, S. Chang, F. Liang, T. S. Huang, L. Cao, and J. R.
Smith. Learning locally-adaptive decision functions for person verification. In CVPR, 2013.
[19] S. Liao, Y. Hu, X. Zhu, and S. Z. Li. Person re-identification
by local maximal occurrence representation and metric
learning. In CVPR, 2015.
[20] S. Liao and S. Z. Li. Efficient psd constrained asymmetric
metric learning for person re-identification. In ICCV, 2015.
[21] G. Lisanti, I. Masi, A. D. Bagdanov, and A. Del Bimbo. Person re-identification by iterative re-weighted sparse ranking.
TPAMI, 2015.
[22] G. Lisanti, I. Masi, and A. Del Bimbo. Matching people
across camera views using kernel canonical correlation analysis. In ICDSC, 2014.
[23] B. Ma, Y. Su, and F. Jurie. Covariance descriptor based
on bio-inspired features for person re-identification and face
verification. IVC, 2014.
[24] P. Peng, T. Xiang, Y. Wang, M. Pontil, S. Gong, T. Huang,
and Y. Tian. Unsupervised cross-dataset transfer learning for
person re-identification. In CVPR, 2016.
[25] C. Qin, S. Song, G. Huang, and L. Zhu. Unsupervised neighborhood component analysis for clustering. Neurocomputing, 2015.
[26] Y. Shen, W. Lin, J. Yan, M. Xu, J. Wu, and J. Wang. Person
re-identification with correspondence structure learning. In
ICCV, 2015.
[27] R. R. Varior, M. Haloi, and G. Wang. Gated siamese
convolutional neural network architecture for human reidentification. In ECCV, 2016.
[28] F. Wang, W. Zuo, L. Lin, D. Zhang, and L. Zhang. Joint
learning of single-image and cross-image representations for
person re-identification. In CVPR, 2016.
[29] H. Wang, S. Gong, and T. Xiang. Unsupervised learning
of generative topic saliency for person re-identification. In
BMVC, 2014.
[30] H. Wang, X. Zhu, T. Xiang, and S. Gong. Towards unsupervised open-set person re-identification. In ICIP, 2016.
[31] X. Wang, W. S. Zheng, X. Li, and J. Zhang. Cross-scenario
transfer person reidentification. TCSVT, 2015.
[32] T. Xiao, H. Li, W. Ouyang, and X. Wang. Learning deep feature representations with domain guided dropout for person
re-identification. In CVPR, 2016.
[33] Y. Yang, J. Yang, J. Yan, S. Liao, D. Yi, and S. Z. Li. Salient
color names for person re-identification. In ECCV, 2014.
[34] J. Ye, Z. Zhao, and H. Liu. Adaptive distance metric learning
for clustering. In CVPR, 2007.
[35] R. Zhao, W. Ouyang, and X. Wang. Person re-identification
by saliency learning. TPAMI, 2016.
[36] L. Zheng, Z. Bie, Y. Sun, J. Wang, C. Su, S. Wang, and
Q. Tian. Mars: A video benchmark for large-scale person
re-identification. In ECCV, 2016.
[37] L. Zheng, L. Shen, L. Tian, S. Wang, J. Wang, and Q. Tian.
Scalable person re-identification: A benchmark. In ICCV,
2015.
[38] W.-S. Zheng, S. Gong, and T. Xiang. Person re-identification
by probabilistic relative distance comparison. In CVPR,
2011.
| 1cs.CV
|
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
PRT (PERSONAL RAPID TRANSIT)
NETWORK SIMULATION
Włodzimierz Choromański, Warsaw University of Technology, Faculty of Transport,
prof.wch@gmail.com
Wiktor B. Daszczuk, Warsaw University of Technology, Institute of Computer
Science, wbd@ii.pw.edu.pl
Jarosław Dyduch, Warsaw University of Technology, Faculty of Transport,
slavypl@gmail.com
Mariusz Maciejewski, Warsaw University of Technology, Faculty of Transport,
Mariusz.Maciejewski@kontron.com.pl
Paweł Brach, Warsaw University of Technology, Faculty of Transport,
braszek@gmail.com
Waldemar Grabski, Warsaw University of Technology, Institute of Computer Science,
wgr@ii.pw.edu.pl
ABSTRACT
Transportation problems of large urban conurbations inspire search for new transportation
systems, that meet high environmental standards, are relatively cheap and user friendly. The
latter element also includes the needs of disabled and elderly people. This article concerns a
new transportation system PRT - Personal Rapid Transit. In this article the attention is
focused on the analysis of the efficiency of the PRT transport network. The simulator of
vehicle movement in PRT network as well as algorithms for traffic management and control
will be presented. The proposal of its physical implementation will be also included.
Keywords: PRT, simulation, traffic experiments
INTRODUCTION
In Warsaw University of Technology, a project on Personal Rapid Transit (PRT) (Irving at al.
1978, Andreasson 2010) is under development (Choromański et al. 2011a and 2011b,
Daszczuk at al. 2011).
Personal rapid transit (PRT), is a public transportation mode featuring small
automated vehicles operating on a network of specially-built guide ways. PRT is a type of
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
automated guideway transit (AGT), a class of system which also includes larger vehicles all
the way to small driverless subway systems. The whole system is electrically supplied.
In PRT designs, vehicles are sized for individual or small group travel, typically
carrying no more than 3 to 4 passengers per vehicle. Guide ways are arranged in a network
topology, with all stations located on sidings, and with frequent merge/diverge points. This
approach allows for nonstop, point-to-point travel, bypassing all intermediate stations. The
point-to-point service has been compared to a taxi.
There are three kinds of nodes in the PRT network: stations, capacitors and
intersections.
Stations are places where passengers book their trips and board the vehicles, or wait
for vehicles in a queue if there are no empty vehicles on a station. A capacitor is a source of
vehicles (and sometimes may serve as a parking place). Intersections are threefold: “fork”
(diverge), “join” (merge) and “junction” (such intersections are for technical purposes only).
It is assumed that a vehicle has its own control unit, which is linked via radio network with
control units of other vehicles and nodes (capacitors, stations and “join” intersections). Radio
connections are established to vehicles and nodes that are closest to the vehicle, i.e. not
farer that specified distance. This makes a subnet “visible” to the vehicle, the edge of which
is called “a horizon”. The horizon distance should be chosen carefully, too large causes too
much information to be transmitted (and routing problems), too small results in reduced
safety of the traffic.
A vehicle gets information about current parameters of movement of preceding
vehicles: their positions, velocities and mode of operation (acceleration/ constant velocity/
deceleration/ friction braking). From an intersection controller a vehicle receives the decision
on priority of crossing the intersection.
Among other mechanical, electrical and transportation research goals, simulation of PRT
network is performed, on two abstraction levels:
Coordination level is “behavioural simulation”. On this level, algorithms for following a
route, keeping up, coordination on “join” intersections, joining the traffic and similar
are tested for effectiveness.
Management level is “statistical simulation”. Simulation experiments identify the
impact of various parameters of management algorithms (mainly of empty vehicle
management and dynamic routing) on the passenger comfort (trip time and queue
size).
There are several PRT simulators available (Castangia and Guala 2011, Zheng, Jeffery and
McDonald 2009, Andreasson 2010, Hermes, Beamways, RUF), yet the authors have
decided to build the project’s own simulators, for two reasons:
Available simulators have fixed, inaccessible traffic algorithms (on both levels:
coordination and management); the user can only observe the operation of included
algorithms and he/she has no influence on their structure and parameters.
Simulators produce a number of synthetic output parameters; there is no access to
individual events (witch should be reported as a kind of “event log”); this lack does not
allow the researcher to build his/her own detailed characteristics of the traffic.
It seems that the own simulators build are more advanced. They permit the analysis of
various algorithms of coordination and management, and they give access to wide and
detailed set of traffic parameters and event logs. The purpose of simulators is:
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Entry
buffer
Exit buffer
Debarking
berth
Other
berths
Boarding
berth
a) in-line
Entry
buffer
Exit buffer
Stubberths
b) stub-berths
Figure 1 – station types
analysis of various network topologies of PRT,
identification of capacity and ridership of various networks,
identification of saturation points (when performance is degraded to inaccessible
level)
research on dynamic algorithms (especially empty vehicles management and
dynamic routing), and identification the operational cost of performance improvement
(number of empty trips, distance of empty movement etc)
sensitivity of the system to variation of different traffic parameters values.
THE STRUCTURE OF THE PRT NETWORK
A structure of PRT network is a graph (Andreasson 2010). Nodes are capacitors, stations
and intersections. Edges are segments.
There are two types of stations: in-line (with the FIFO rule applied) and with stubberths. Vehicles must have ability to drive backwards to operate inside a berth. A structure of
both types of a station is shown in Figure 1.
From topography point of view, nodes are simply points of size zero. Yet the nodes
have internal structure necessary to model their roles in a network. The stations are most
complicated: they have parking places (berths), entry and exit buffers, passenger queues
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
etc. Several parameters characterize a station, including its type (in-line/stub-berths), number
of berths, sizes of entry and exit buffer. A capacitor is much simpler, because it is not related
to passengers. It has only one characteristic – a number of parking places.
Capacitor, station and “junction” intersection have one entry and one exit. “Fork”
intersection has two exits (to diverge) while “join” intersection has two entries (to merge).
Segments are edges of PRT graph. Segments are unidirectional and they have starting and
ending points in nodes (capacitors, stations and intersections). A segment is characterized
by its length and maximum velocity.
Nodes and edges conform a static structure of PRT network. Two types of dynamic
objects define a behaviour of the network: vehicles, which originate from capacitors, and
passengers appearing in stations. A Passenger group has a specific destination station.
Passengers wait for the vehicle (or take an empty one, standing in berth), then a trip is
realized, and after completing the journey, they ‘’disappear” from the system.
The basic goal of PRT network is to realize trips between stations for passengers. A
vehicle is characterized by: capacity, maximum velocity, maximum acceleration and
deceleration, maximum friction deceleration (emergency brake) and minimum (static)
separation between vehicles. Passengers are organized in groups for a trip to common
destination (station). A group is characterized by its cardinality and the target station.
THE MODEL
The control algorithm of the PRT network is specified in two levels: lower - coordination level,
and upper - management level:
Two coordination algorithms are defined: keeping up, and coordination on “join”
intersections (joining the traffic from a capacitor/station is realized as a special case
of coordination on “join” intersection).
Several management algorithms, including some empty vehicle management
algorithms and dynamic routing algorithm.
The coordination algorithms use traffic parameters like maximum velocities, maximum
acceleration and deceleration, separation between vehicles etc.
Some basic rules of behaviour are fixed in the simulator, including movement inside stations,
and movement along the track and keeping up rules, are fixed in the simulator. The routing is
based on Dijkstra’s algorithm, although edge weights in the algorithm are parameterized by
several values depending on static structure (segment lengths), traffic parameters (maximum
velocities) and dynamic traffic situation (traffic jams).
Various characteristics of the model have different variability:
The structure and topography of the network, type of individual stations (inline/stub
berths), capacity of nodes, number of vehicles, boarding and debarking times as well
as distribution of passenger group cardinality are constant.
Traffic parameters stay constant during single simulation.
Mean input of passenger groups and origin-destination matrix may be defined to be
valid in specific periods.
Maximal velocity of a segment may be changed in specified while.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
TWO APPROACHES TOWARDS PRT SIMULATION
Two independent simulators have been built: one event-driven and second based on cellular
automata. Both simulators use the same model of PRT network and the same base
parameters. This allows to compare the results and verify correctness of the two simulators.
The simulators have different usability properties: the former simulator is more accurate,
while the latter one is much faster.
Both simulators use micro-simulation (Daszczuk at al. 2011, Fox 1999, Barcelo 1999,
Gabard 1999, Nagel and Schreckenberg 1992). In the event-driven simulator, segments are
divided into sectors and passing a sector is a basic simulation step. The second simulator is
based on cellular automata, where every automaton corresponds to a singular node of the
network. The basic step of simulation is 1 second interval, in which all automata are updated.
The design of the model typically follows a hierarchy of design steps, from most
general to most detailed:
network structure and topography;
characteristics of network elements: station types, numbers of berths, maximal
velocities of segments etc.;
acceleration and deceleration, general velocity limits, separation, boarding and
debarking times, origin-destination matrix;
parameters of empty vehicle management, priority rules and dynamic routing;
number of vehicles and their individual characteristics (velocity limits for individual
vehicles);
passenger input distribution.
The simulation experiments may be used to compare throughput characteristics of various
network structures, various station and segment parameters, or particular network in which
empty vehicles management parameters or dynamic routing parameters vary. Ability to
perform the same experiments on two different simulators assures results verification that will
be model independent. Some research is described later.
EVENT-DRIVEN SIMULATION ENVIRONMENT
The movement of vehicles is performed in the event-driven manner, which is a typical
solution (Anderson 1998, Lopez et al. 2008). Every segment is divided into sectors. The
decisions on the behaviour of vehicles are made in the connections of sectors. Also, starting
some actions in capacitors/stations – passenger group occurring, coupling of passenger
group with a vehicle, beginning of boarding or debarking, start form parking place etc. are
simulation events.
The simulation environment is called Feniks 3.0. The main program of the simulator
(called “UI”) is responsible for building a model, setting its parameters and to organizing
simulation experiments. The external library (called “external simulator”) implements control
algorithms (on both layers). The whole simulator is written in C#. The interface is defined
between the simulator parts, which allows to define user’s own control algorithms instead of
supplied with external simulator.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Every event (for example start of movement, time of passing the sector) is served by
calling external simulator and performing adequate acts regarding obtained decision. The
main program (UI) is a simulation engine, an animation engine and a statistics collector.
Also, in UI are included procedures for defining a model structure and topography. External
simulator decides on every change of state of every vehicle, for instance:
coupling of passenger group with a vehicle;
beginning of boarding or debarking, passing a connection of sectors, stopping at
connection of sectors;
decision on the time of passing the sector; the time is calculated by the coordination
algorithm that guarantees safe distance between vehicles on a track.
The Simulator plans the vehicle movement analytically and therefore precisely (not
approximate). Although the simulation is event-driven, the result of simulation is similar to the
analogue simulator. The only inaccuracy comes from the fact that a vehicle may stop only at
the connection of sectors (rather than inside a sector).
Coordination - movement along a track
Vehicles move along a track with maximal possible velocity (which is a minimum from
maximum velocities of a model, a segment, a sector and a vehicle). A “horizon” is defined to
be a distance “observed” by the vehicle. The nodes and other vehicles closer than the
horizon influence the behaviour of the vehicle.
The velocity on an empty track (in a distance closer than the horizon) is limited by the
acceleration of the vehicle and by deceleration of the vehicle together with velocity limit on
the next sectors. If there is a preceding vehicle on a track, or a node (station/capacitor/”join”
intersection) which cannot be crossed because of traffic condition, a distance called
“separation” is kept. Static separation defines the minimum distance. The coordination
algorithm guarantees stopping after the preceding vehicle in static separation distance if
preceding vehicles starts to decelerate of brake at the moment.
If there is a “fork” intersection closer than the horizon, only the chosen outgoing track
(left or right) is analyzed.
If a node (capacitor or station) is closer than the horizon, and the node is the target of
the trip, the vehicle must reach the zero velocity in a point of diverging from the track towards
the node. The exception is when all the parking places and all entry buffers in the node are
occupied – in such a case the vehicle must stop in separation distance before the node.
If a vehicles wants to “drive through” a node, it runs with maximal allowed velocity, provided
that no vehicle starting from the node is in conflict (this case will be described in the next
subsection).
Coordination - behaviour on “join” intersections
A “join” intersection is allocated to one of approaching vehicles by the intersection controller.
Only the vehicles closer then the horizon distance are considered. And only closest vehicles
on both segments are taken into account, vehicles following them follow normal keeping up.
From a vehicle’s point of view, if there is a possible conflict:
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
if the intersection is allocated to a vehicle on the other track leading to the
intersection, the considered vehicle is planned to stop prior to the intersection in static
separation distance;
otherwise the vehicle ask the intersection controller which vehicle has the priority; if
the other one – the considered vehicle stops as above.
Joining the traffic (from a capacitor or a station) is very similar, just the point of the capacitor
on the track (or the point of the station) is treated as intersection, and it is being allocated to
a vehicle on the move or to a vehicle joining the traffic, depending on priority rules
(parameters of coordination algorithm).
CELLULAR AUTOMATA SIMULATION ENVIRONMENT
Cellular automata is a structure defined by a matrix of cells and their states, transitions and
the rules of those transitions (Nagel and Schreckenberg 1992). Automata in such form are
mathematical models that construct an environment for a bigger, discrete classes of models,
because all the structures describing them are discrete.
Each simple cellular automaton consists of n-dimensional, discrete matrix of cells.
Each cell is the same (is a copy of the previous cell) and the whole space of the matrix must
be filled with the cells put next to each other. Each cell has exactly one state from the finite
number of available states. Transition of each cell takes place based on the same, precisely
defined local rules (homogeneity), that depend only on the previous state of the cell and
states of finite number of neighbouring cells. Transition is discrete and happens at the same
time for all cells (parallelism). In the cellular automata, a cell is finite automaton.
In order to model the PRT network and traffic a more elaborated adaptation of cellular
automata has been chosen – directed graph that represents the infrastructure.
The computational model is a directed graph, in which the nodes are the hubs and
the edges between the nodes are the segments. Each node and edge has all the parameters
that describe a given element (length of the segment, direction of movement, maximum
allowed speed, etc.). Each edge is tied to a discrete model of a segment, which is
represented by 1-dimensional array. One cell represents one unit of segment and is a
parameter of the model.
Each junction is represented as one cell. In a given unit of time, in a given cell, there
can be only one vehicle. The cell can have one of two available states – empty or occupied
by a vehicle. Each vehicle in the model moves with a velocity from the range 0…V-max.
In the simulator a topographic model has been implemented, that consists of 2-dimensional,
regular and discrete cell matrix. This model is a layer of abstraction over the directed graph.
In the graph the nodes are the elements of the segments and the edges define the direction
of movement between the nodes. Each node represents exactly one cell in the 2-dimensional
matrix.
The configuration describing the infrastructure and the initial state of the environment
– location of the vehicles, stations and capacitors and the passengers is one of the
parameters of the model. The simulator uses and optimal-path algorithm to define a route to
the target station. Such an approach allows for a dynamic control of the vehicles during the
movement and is an excellent template of the real life movement of the PRT vehicles.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Movement in the network
After defining all the elements of the cellular automata, the rules of transition can be applied
on the cell matrix. The transition process can be split into several parts (Schadschneidert and
Schreckenbergt 1993). Initial state, as mentioned previously, is a the definition of the initial
conditions of the cell. Usually those are neutral states, that do not cause any conflicts.
Update of the automata matrix is a walkthrough sequence of steps for each cell according to
the instructions below:
1. Verification of the transition rules – in this step a current state of the cell is verified
along with the states of the neighbouring cells and other parameters of automaton
2. Neighbours verification – during this step a verification of any conflict states of the
neighbouring cell takes place. If there are any conflicts they have to be resolved
according the predefined rules
3. Verification of boundary conditions – verification of the cell at the borders of the
matrix. They can be removed (absorbing closed neighbourhood) or new ones can be
created (periodic neighbourhood)
4. Verification of number of iterations- if this is a finite automaton, with predefined
lifecycle than in this step it is check whether the transition should stop.
In the case of the implemented PRT network prototype, updated model of the classic cellular
automaton has been implemented (Benjaminy et al. 1996, Li and Wu 2001). The model
consists of the following steps (each is performed in parallel for all vehicles in the
environment):
1. Acceleration: if the speed of the vehicle V is smaller than the maximum, allowed
speed (for a vehicle or road segment) and if the distance to the next vehicle is bigger
than V+1, than the velocity is increased by 1, e.g. V:= V + 1
2. Deceleration: if the vehicle at the position I, with velocity V, sees a vehicle at the
position i+j, for j smaller or equal to v, then the speed is reduced to j-1, e.g. V:= j-1
3. Randomization (optional): with a probability p1, the velocity of a vehicle is reduced by
1 (if bigger than 0), e.g. V:=V-1
4. Randomization (optional): with a probability p2, vehicle breaks down for a time period
J, e.g. the velocity of vehicle is 0 for J units of time
5. If in the next unit of time vehicle will drive through a junction, following conditions are
verified:
a. If there is no conflict on the junction, e.g. there is no other vehicle coming to
junction in the same time do nothing.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
b. Otherwise define the order of the vehicles (using weights-based function). The
priority vehicle does nothing (drives through the junction) and the other one
slows down, letting the priority vehicle to drive through. The order of passing
vehicles on the junction is defined by the weight of each vehicle - vehicle with
higher weight goes first on the crossroad. The weight of the vehicle is
determined based on the following function:
W ( p) Wt t Wd d W p p W pas pas
(1)
where:
W(p) – weight of the vehicle
Wt
- weight of waiting time
t – waiting time
Wd
- weight of the priority of the segment
d – priority of the segment
Wp
- weight of the priority of the vehicle
p – priority of the vehicle
W pas
- weight of the number of passengers
pas – number of passengers in the vehicle
6. Movement: move vehicles V cells in the direction of movement
SIMULATION RESEARCH
As an example of research work, a simulation experiment with empty trips in PRT network is
presented. A PRT network performs people transport on their demand. Yet, to achieve the
main goal, some trips without passengers (called empty trips) must be executed. The
examples are:
When a passenger group (typically 1-4 persons) occurs at a station, and there are no
empty vehicles available in the station, an empty trip must be organized to supply a
vehicle for the passenger group. It is the calling mechanism.
When a vehicle approaches a station, and there is no empty berth for it, one of empty
vehicles standing in the station must be expelled from the station.
Whether there are many empty vehicles in a given station, and there are no (or little)
empty vehicles in other station, an empty trip may be organized from the station to
the latter one (target station), especially if average passenger input at the target
station posits to expect new group soon. The mechanism is called balancing.
If an empty vehicle stays in the station for a long time, and there are no passengers
waiting or expected at the station, the vehicle may be withdrawn to a capacitor for
safety reasons (especially at night).
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
The former two mechanisms (calling and expelling) are necessary in PRT system, while the
latter two (balancing and withdrawing) are optional.
Figure 2 – The first PRT model (city)
In a simulation experiment, an impact of a passenger input rate on a number of empty trips is
examined. As a PRT network is complicated and the influence of many design parameters in
its behaviour is unknown, the research results may be obtained by simulation only. To show
that a found relation is general, various network structures and various behaviour parameters
should be applied.
For the research on the problem mentioned above, two PRT network structures were
used, presented in Figures. 2 (city) and 3 (seashore). The circles in the figures represent
stations while solid circles represent capacitors. Two numbers of vehicles were used. The
main parameters of the network are:
total tracks length 6064,5m (first model) or 5584m (second model),
12 or 24 vehicles,
4 passengers in every trip,
all stations of in-line type,
4 berths in each station.
maximal velocity 14m/s,
maximal acceleration and deceleration 2m/s2,
boarding and debarking times 10s.
static separation 4m (event-driven simulator) and 2m (cellular automata simulator),
passenger input rate differs in specific simulations,
trip destination chosen randomly
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
empty vehicle management algorithm: calling, expelling and withdrawing mechanism
used;
Figure 3 - The second PRT model (seashore)
calling principle: nearest empty vehicle is called, if any;
expelling principle: expelled empty vehicle is moved to a station on which there are
empty berths and w distance to which is close (weighted expelling rule);
withdrawing principle: if a vehicle stays in a station for longer then 120s, it is moved to
the capacitor (timeout 120s), provided that there is an empty berth in the capacitor.
During this time it may be called to other station (in which a passenger waits) or
expelled (if other vehicle approaches the station and there is no empty berth for it).
The models (as with every model) have their saturation points, i.e. maximum numbers of
trips per hour (depending on the model structure, number of vehicles etc.). The saturation
point defines maximal throughput of the network: maximal number of passengers that may
be moved to their destinations. For the research purposes, passenger groups input values
were applied at saturation point and at several (5) input values less than maximum
(passenger group input greater than in saturation point is useless because passenger
queues rise to infinity).
The results obtained from event-driven simulator are collected in Figure. 4, for the two
PRT structures and for two numbers of vehicles. The results from cellular automata simulator
are collected in Figure 5. Experiments in both simulators give similar results, where in every
plot there is a maximum of empty trips (though the input rates of the maximum and the
maximum values differ).
The explanation of the observed feature is simple, although it is hard to expect it
without simulation experiment. The reason of the plot shape is as follows:
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
for input rates near saturation point every vehicle freed by passengers is taken
immediately by successive passenger group, therefore empty trips seldom are
obeyed;
for low passenger input rates vehicles are seldom called (at most as many times as
new passenger group occur at the stations); situations requiring expelling occur rarely
(because of low number of trips with passengers); withdrawing may occur but at most
Model 1 - number of empty trips /12h
Model 1 - number of empty trips /12h
3500
6000
3000
5000
2500
4000
2000
12 vehicles
1500
24 vehicles
3000
2000
1000
1000
500
0
0
12,9
25,8
38,7
51,7
64,6
25,1
77,5
50,2
75,3
100,3
125,4 150,5
Passenger groups input /h
Passenger groups input /h
Model 2 - number of empty trips /12h
Model 2 - number of empty trips /12h
3000
5000
2500
4000
2000
3000
12 vehicles
1500
1000
24 vehicles
2000
1000
500
0
0
10,1
20,3
30,4
40,5
50,6
60,8
Passenger groups input /h
20,2
40,3
60,5
80,6
100,8 120,9
Passenger groups input /h
Figure 4 – Simulation results for both models and two numbers of vehicles (event-driven simulator)
as frequent as trips with passengers;
if passenger input grows then the numbers of calling situations and expelling
situations grow as well, while the number of withdrawing situations falls; the growth of
empty trips is limited by coincidences of passenger occurring with empty vehicle
standing in the same station; the coincidences lastly dominate and the total number
of empty trips begins to fall.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Figure 5– Simulation results for both models and two numbers of vehicles (cellular automata simulator)
It is obvious that the described relation takes place in every reasonable model (perhaps
excluding pathological ones, for example if calling a vehicle to other station precedes taking
empty vehicle standing in the same station as passengers occur).
IMPLEMENTING PRT STEERING AND MANAGING
ALGORITHMS IN PHYSICAL LABORATORY ENVIRONMENT
In parallel with developing logical model of the PRT network, a physical one is being built on
the Warsaw University of Technology. It implements the algorithms described in the former
chapters. The security and safety of PRT system is governed by a central computer control
and dispatch system. The system consists of layers containing following subsystems
(Figure. 6):
dispatcher system – DS.
central control system – CCS
area control system – ACS
radio communication system – RCS
vehicle control system – VCS
The main task of the dispatcher system is the facilitation of the monitoring of the whole
system by the maintenance personnel. The PRT system is fully automatic and during regular
operation no human intervention is required. In case of emergency the personnel can switch
to manual control. Dispatchers monitor the current state of the traffic, power system, data
transmission and proper operability of computer systems. Dispatchers can mark any
component as faulty and plan maintenance tasks. The steering and controlling system is
equipped with surveillance video. The video cameras are mounted on the stations and PRT
vehicles. Both the stations and vehicles have systems enabling instant contact with the
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
dispatchers In case of emergency dispatchers have direct live feedback from each vehicle.
The video and voice transmissions are recorded and archived.
At the infrastructure level the system is redundant, therefore provides the continuous
operability in case of failure of single components of the system. The transmission system
Figure 6 - Structure of the steering system of PRT
also provided redundant connection in case of failure.
Central control system is of distributed type - different functions are deployed on
different steering layers. Central CCS system manages the vehicles. It sets the routes,
assigns vehicles to the orders and manages empty vehicles. Performance and optimization
of that part of the system is analyzed in the simulation environments. Optimization aims at
the defining most efficient ways of movement in PRT network in terms of travel and waiting
time as well as the energy efficiency. System react to emergency and faults situation by
dynamically reassigning routes. Each change in the traffic situation is archived with a
frequency of 100ms. The archived materials are available for analysis, elimination of
bottleneck and errors in the system.
Area control systems have the tasks of controlling single moving vehicles, controlling
the traffic on the stations and assigning right-of-way on crossroads. The whole system is
divided into areas that are managed by dedicated computers. The central system collects
information about location of each vehicle and distributes it to all area computers. The rightof-way algorithms are parameterized and can be adjusted according to the traffic state in
specific areas. ACS does not assign or manipulate routes. In case of emergency of CCS, the
ACS directs the vehicles to the nearest station or evacuation points according to predefined
scenario. If the connection with specific vehicle is lost, the ACS marks corresponding area as
unavailable in order to maximize the safety of all participants.
At the infrastructure level ACS is redundant. Additionally the information about
movements and state of a vehicle is distributed to corresponding area computer as well as to
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
neighbouring ones. Such setup assures that in case of emergency one of the neighbouring
computers can take over the control of the area.
The main tasks of vehicle control system is communication with area control system,
marking the position of the vehicle, assuring the safe distance to closest vehicle , maintaining
a safe velocity, monitoring of the door controlling system, air conditioning, lightning, etc. VCS
facilitates the voice and video communication between vehicles and dispatchers. Each
vehicle is equipped with displays showing the current state and location of vehicle.
Passenger can alter the target station at any moment and a new route will be assigned.
During the trip the main display can present commercials and news information. VCS
monitors the operation of the engine, breaking and power systems.
Communication between PRT vehicles and ACS is facilitated by digital transmission
system. The vehicle is in range of two independent base radio stations in any point of the
network. The transmission system is implemented in accordance with European standard
EN-50159. Data transmission is encoded and encrypted to disable access to the systems by
undesirable individuals. Implementation of the European standards EN-50126, EN-50128,
EN-50129 ensure highest safety, reliability and maintainability of the whole system. All the
critical technical components are configured in fail-safe technique, using 2 out of 2 model
CONCLUSIONS AND FURTHER WORK
The results from simulation experiments show that the simulation environment is useful for
observing and identification of effects occurring in PRT system. Also, it helps to compare
various conditions of network operation, especially to find optimal conditions or to avoid
traffic jams.
In the future, the comparison of various network structures, management algorithms
and other features may be performed from various points of view, for example from
passenger, network administrator or network maintenance engineer point of view.
The very wide set of output parameters measured give the possibility to observe the
behaviour of a PRT network from that outlined or other points of view. A detailed log of
events may be also obtained, which allows to build simulation statistics viewed from other
points of view.
Using the simulators, various design aspects may be viewed as complex optimization
tasks. For this purpose, “unit costs” of all PRT elements (length of the track, number of
vehicles, number of berths in a station, number of intersections of every type etc.) and PRT
services (time and distance of a travel, time of vehicle technical maintenance, cost of
amortisement, etc.) must be specified. Then, optimal usage parameters (passenger waiting
time, effective travel velocity, delays in comparison to optimal conditions) or maintenance
parameters (daily distance travelled, full/empty travel ratio etc.) may be identified in
simulation experiments.
Also, management algorithms build on other principles will be applied, i.e.
decentralized
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
ACKNOWLEDGMENT
The research work is carried out within the Eco‑Mobility Project that is being cofinanced by the European Regional Development Fund – Operational Program for
Innovative Economy. UND-POIG.01.03.01-14-154 – Project Co-ordinator Prof.
W. Choromański.
REFERENCES
Anderson J. E. (1998). Simulation of the operation of personal rapid transit systems, in
Computers in Railways VI, WIT Press, Boston Southampton, Computational
Mechanics Publications, 1998, 523-532
Andreasson I. J. (2010). Staged introduction of PRT with Mass Transit, in Proc. PRT@LHR
2010 Conference, September 21023, 2010, London Heathrow Airport,
Barceló, J., Casas, J., J.L. Ferrer, J.L., García D. (1999). Modelling Advanced Transport
Telematic Applications with Microscopic Simulators: the Case of AIMSUN2, Proc.
Micro-simulation workshop, Institute for Transport Studies, University of Leeds , July
1999, 11-24
Beamways, http://www.beamways.com/
Benjamin, S. C., Johnson, N. F., Hui, P. M. (1996) Cellular automata models of traffic flow
along a highway containing a junction, J. Phys. A: Math. Gen. 29 3119
Castangia, M., Guala, L. (2011). Modelling and simulation of a PRT network, in Proc . 17th
International Conference on Urban Transport and the Environment, June 6-8, 2011,
Pisa, Italy, pp 459-472
Choromański W., Dyduch J., Brach P. (2011a). Simulation research on innovative PRT
transportation system traffic, Logistyka 6/2011 November/October 2011 (in Polish)
Choromański W., Kowara J. (2011b). PRT–Modeling and Dynamic Simulation of Track and
Vehicle, in Proc. 13th International Conference on Automated People Movers and
Transit Systems, Paris, France, May 22-25, 2011 H. Leder W. H. and Sproule W. J.
(eds), ISBN (print): 978-0-7844-1193-3, 294-306
Daszczuk, W.B., Mieścicki, J., Grabski, W. (2011). Building simulation models and simulation
experiments in FeniksOnArena 1.0, WUT Research Report (in Polish)
Fox K. (1999). Introduction to the SMARTEST Project, in Proc. Micro-simulation workshop,
Institute for Transport Studies, University of Leeds, July 1999, 2-10
Gabard J.F., Breheret L. (1999). The SITRA-B+ Microscopic Traffic Simulation Model Examples of Use and Future Developments, in Proc. Micro-simulation workshop,
Institute for Transport Studies, University of Leeds , July 1999, 49-58
Hermes, http://students.ceid.upatras.gr/~xithalis/simulation_en.html
Irwing, J. et al. (1978). Fundamentals of Personal Rapid Transit, Lexington books, Lexington
MA, 1978, ISBN is 0-669-02520-8
Li, X., Wu, Q. (2001) Cellular automata model considering the velocity effect of a car on the
successive car, Physical Review E, Volume 64, 066128
Lopes C. V., Popov A., Kan L., Morla R. (2008). PRT simulation in an immersive virtual
world, in Proc. of the 1st international conference on Simulation tools and techniques
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
for communications, networks and systems, SIMTOOLS ’08, Marseille, France, 57:157:7
Nagel K., Schreckenberg M. (1992) Cellular automata model for freeway traffic. J. Phys. I 2,
2221-2229
RUF, http://www.ruf.dk/
Schadschneidert A. and Schreckenbergt M. (1993) Cellular automaton models and traffic
flow, 1993 J. Phys. A: Math. Gen. 26 L679
Zheng, P., Jeffery, D. and McDonald, M. (2009). Development and evaluation of traffic
management strategies for personal rapid transit, in Proc. Industrial Simulation
Conference 2009, Loughborough, UK, Jun 1-3, 2009, 191-195.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
| 5cs.CE
|
Fast Algorithms for Robust PCA via Gradient Descent
Xinyang Yi∗
Dohyung Park∗
Yudong Chen†
The University of Texas at Austin∗
arXiv:1605.07784v2 [cs.IT] 19 Sep 2016
{yixy,dhpark,constantine}@utexas.edu∗
Constantine Caramanis∗
Cornell University†
yudong.chen@cornell.edu†
Abstract
We consider the problem of Robust PCA in the fully and partially observed settings. Without
corruptions, this is the well-known matrix completion problem. From a statistical standpoint
this problem has been recently well-studied, and conditions on when recovery is possible (how
many observations do we need, how many corruptions can we tolerate) via polynomial-time
algorithms is by now understood. This paper presents and analyzes a non-convex optimization
approach that greatly reduces the computational complexity of the above problems, compared
to the best available algorithms. In particular, in the fully observed case, with r denoting rank
and d dimension, we reduce the complexity from O(r2 d2 log(1/ε)) to O(rd2 log(1/ε)) – a big
savings when the rank is big. For the partially observed case, we show the complexity of our
algorithm is no more than O(r4 d log d log(1/ε)). Not only is this the best-known run-time for a
provable algorithm under partial observation, but in the setting where r is small compared to
d, it also allows for near-linear-in-d run-time that can be exploited in the fully-observed case as
well, by simply running our algorithm on a subset of the observations.
1
Introduction
Principal component analysis (PCA) aims to find a low rank subspace that best-approximates a
data matrix Y ∈ Rd1 ×d2 . The simple and standard method of PCA by singular value decomposition
(SVD) fails in many modern data problems due to missing and corrupted entries, as well as sheer
scale of the problem. Indeed, SVD is highly sensitive to outliers by virtue of the squared-error
criterion it minimizes. Moreover, its running time scales as O(rd2 ) to recover a rank r approximation
of a d-by-d matrix.
While there have been recent results developing provably robust algorithms for PCA (e.g., [8,
28]), the running times range from O(r2 d2 ) to O(d3 )1 and hence are significantly worse than SVD.
Meanwhile, the literature developing sub-quadratic algorithms for PCA (e.g., [16, 15, 3]) seems
unable to guarantee robustness to outliers or missing data.
Our contribution lies precisely in this area: provably robust algorithms for PCA with improved
run-time. Specifically, we provide an efficient algorithm with running time that matches SVD while
nearly matching the best-known robustness guarantees. In the case where rank is small compared
to dimension, we develop an algorithm with running time that is nearly linear in the dimension.
This last algorithm works by subsampling the data, and therefore we also show that our algorithm
solves the Robust PCA problem with partial observations (a generalization of matrix completion
and Robust PCA).
1
For precise dependence on error and other factors, please see details below.
1
1.1
The Model and Related Work
We consider the following setting for robust PCA. Suppose we are given a matrix Y ∈ Rd1 ×d2 that
has decomposition Y = M ∗ + S ∗ , where M ∗ is a rank r matrix and S ∗ is a sparse corruption matrix
containing entries with arbitrary magnitude. The goal is to recover M ∗ and S ∗ from Y . To ease
notation, we let d1 = d2 = d in the remainder of this section.
Provable solutions for this model are first provided in the works of [9] and [8]. They propose to
solve this problem by convex relaxation:
min |||M |||nuc + λkSk1 , s.t. Y = M + S,
M,S
(1)
where |||M |||nuc denotes the nuclear norm of M . Despite analyzing the same method, the corruption
models in [8] and [9] differ. In [8], the authors consider the setting where the entries of M ∗ are
corrupted at random with probability α. They show their method succeeds in exact recovery with
α as large as 0.1, which indicates they can tolerate a constant fraction of corruptions. Work in [9]
considers a deterministic corruption model, where nonzero entries of S ∗ can have arbitrary position,
but the sparsity of each row
√ and column does not exceed αd. They prove that for exact recovery,
it can allow α = O(1/(µr d)). This was subsequently further improved to α = O(1/(µr)), which
is in fact optimal [12, 19]. Here, µ represents the incoherence of M ∗ (see Section 2 for details). In
this paper, we follow this latter line and focus on the deterministic corruption model.
The state-of-the-art solver [21] for (1) has time complexity O(d3 /ε) to achieve error ε, and is
thus much slower than SVD, and prohibitive for even modest values of d. Work in [22] considers the
deterministic corruption model, and improves this running time without sacrificing the robustness
guarantee on α. They propose an alternating projection (AltProj) method to estimate the low
rank and sparse structures iteratively and simultaneously, and show their algorithm has complexity
O(r2 d2 log(1/ε)), which is faster than the convex approach but still slower than SVD.
Non-convex approaches have recently seen numerous developments for applications in low-rank
estimation, including alternating minimization (see e.g. [20, 18, 17]) and gradient descent (see e.g. [4,
11, 25, 26, 31, 32]). These works have fast running times, yet do not provide robustness guarantees.
One exception is [11], where the authors analyze a row-wise `1 projection method for recovering
S ∗ . Their analysis hinges on positive semidefinite M ∗ , and the algorithm requires prior knowledge
of the `1 norm of every row of S ∗ and is thus prohibitive in practice. Another exception is work
[17], which analyzes alternating minimization plus an overall sparse projection. Their algorithm is
shown to tolerate at most a fraction of α = O(1/(µ2/3 r2/3 d)) corruptions. As we discuss in Section
1.2, we can allow S ∗ to have much higher sparsity α = O(1/(µr1.5 )), which is close to optimal.
After the initial post of our paper on arxiv, Cherapanamjeri et al. [14] posted their paper on
solving robust PCA with partial observations by a method modified from AltProj. Their approach is
shown to have optimal robustness. The sample complexity they established is O(µ2 r2 d log2 d log2 (1/ε)),
which depends on the estimation error ε, since the analysis of AltProj under partial observations
requires sampling splitting. In contrast, the sample complexity O(µ2 r2 d log d) of our approach (see
Corollary 2) does not have such dependence. Moreover, their method requires computing rank-r
SVD of the observed matrices in every round of iterations. Our algorithm only needs to compute
rank-r SVD (approximately) once in the initialization step.
It is worth mentioning other works that obtain provable guarantees of non-convex algorithms or
problems including phase retrieval [5, 13, 30], EM algorithms [2, 27, 29], tensor decompositions [1]
and second order method [24]. It might be interesting to bring robust considerations to these works.
2
1.2
Our Contributions
In this paper, we develop efficient non-convex algorithms for robust PCA. We propose a novel
algorithm based on the projected gradient method on the factorized space. We also extend it to
solve robust PCA in the setting with partial observations, i.e., in addition to gross corruptions,
the data matrix has a large number of missing values. Our main contributions are summarized as
follows.2
1. We propose a novel sparse estimator for the setting of deterministic corruptions. For the lowrank structure to be identifiable, it is natural to assume that deterministic corruptions are
“spread out” (no more than some number in each row/column). We leverage this information
in a simple but critical algorithmic idea, that is tied to the ultimate complexity advantages
our algorithm delivers.
2. Based on the proposed sparse estimator, we propose a projected gradient method on the matrix
factorized space. While non-convex, the algorithm is shown to enjoy linear convergence under
proper initialization. Along with a new initialization method, we show that robust PCA can
be solved within complexity O(rd2 log(1/ε)) while ensuring robustness α = O(1/(µr1.5 )). Our
algorithm is thus faster than the best previous known algorithm by a factor of r, and enjoys
superior empirical performance as well.
3. Algorithms for Robust PCA with partial observations still rely on a computationally expensive convex approach, as apparently this problem has evaded treatment by non-convex methods. We consider precisely this problem. In a nutshell, we show that our gradient method
succeeds (it is guaranteed to produce the subspace of M ∗ ) even when run on no more than
O(µ2 r2 d log d) random entries of Y . The computational cost is O(µ3 r4 d log d log(1/ε)). When
rank r is small compared to the dimension d, in fact this dramatically improves on our bound
above, as our cost becomes nearly linear in d. We show, moreover, that this savings and robustness to erasures comes at no cost in the robustness guarantee for the deterministic (gross)
corruptions. While this demonstrates our algorithm is robust to both outliers and erasures, it
also provides a way to reduce computational costs even in the fully observed setting, when r
is small.
4. An immediate corollary of the above result provides a guarantee for exact matrix completion,
with general rectangular matrices, using O(µ2 r2 d log d) observed entries and O(µ3 r4 d log d log(1/ε))
time, thereby improving on existing results in [11, 25].
1.3
Organization and Notation
The remainder of this paper is organized as follows. In Section 2, we formally describe our problem
and assumptions. In Section 3, we present and describe our algorithms for fully (Algorithm 1) and
partially (Algorithm 2) observed settings. In Section 4.1, we establish theoretical guarantees of
Algorithm 1. The theory for partially observed setting are presented in Section 4.2. The numerical
results are collected in Section 5. Sections 6, 7 and Appendix A contain all the proofs and technical
lemmas.
To ease presentation, the discussion here assumes M ∗ has constant condition number, whereas our results below
show the dependence on condition number explicitly.
2
3
For any index set Ω ⊆ [d1 ]×[d2 ], we let Ω(i,·) := (i, j) ∈ Ω j ∈ [d2 ] , Ω(·,j) := (i, j) ∈ Ω i ∈ [d1 ] .
For any matrix A ∈ Rd1 ×d2 , we denote its projector onto support Ω by ΠΩ (A), i.e., the (i, j)-th
entry of ΠΩ (A) is equal to A if (i, j) ∈ Ω and zero otherwise. The i-th row and j-th column of
A are denoted by A(i,·) and A(·,j) . The (i, j)-th entry is denoted as A(i,j) . Operator norm of A is
|||A|||op . Frobenius norm of A is |||A|||F . The `a /`b norm of A is denoted by |||A|||b,a , i.e., the `a norm of
the vector formed by the `b norm of every row. For instance, |||A|||2,∞ stands for maxi∈[d1 ] kA(i,·) k2 .
2
Problem Setup
We consider the problem where we observe a matrix Y ∈ Rd1 ×d2 that satisfies Y = M ∗ + S ∗ , where
M ∗ has rank r, and S ∗ is corruption matrix with sparse support. Our goal is to recover M ∗ and S ∗ .
In the partially observed setting, in addition to sparse corruptions, we have erasures. We assume
that each entry of M ∗ + S ∗ is revealed independently with probability p ∈ (0, 1). In particular, for
any (i, j) ∈ [d1 ] × [d2 ], we consider the Bernoulli model where
(
(M ∗ + S ∗ )(i,j) , with probability p;
Y(i,j) =
(2)
∗,
otherwise.
We denote the support of Y by Φ = {(i, j) | Y(i,j) 6= ∗}. Note that we assume S ∗ is not adaptive to
Φ. As is well-understood thanks to work in matrix completion, this task is impossible in general –
we need to guarantee that M ∗ is not both low-rank and sparse. To avoid such identifiability issues,
we make the following standard assumptions on M ∗ and S ∗ : (i) M ∗ is not near-sparse or “spiky.”
We impose this by requiring M ∗ to be µ-incoherent – given a singular value decomposition (SVD)3
M ∗ = L∗ Σ∗ R∗> , we assume that
r
r
µr
µr
∗
∗
|||L |||2,∞ ≤
, |||R |||2,∞ ≤
.
d1
d2
(ii) The entries of S ∗ are “spread out” – for α ∈ [0, 1), we assume S ∗ ∈ Sα , where
n
o
Sα := A ∈ Rd1 ×d2 kA(i,·) k0 ≤ αd2 for all i ∈ [d1 ] ; kA(·,j) k0 ≤ αd1 for all j ∈ [d2 ] .
(3)
In other words, S ∗ contains at most α-fraction nonzero entries per row and column.
3
Algorithms
For both the full and partial observation settings, our method proceeds in two phases. In the first
phase, we use a new sorting-based sparse estimator to produce a rough estimate Sinit for S ∗ based on
the observed matrix Y , and then find a rank r matrix factorized as U0 V0> that is a rough estimate
of M ∗ by performing SVD on (Y − Sinit ). In the second phase, given (U0 , V0 ), we perform an
iterative method to produce series {(Ut , Vt )}∞
t=0 . In each step t, we first apply our sparse estimator
to produce a sparse matrix St based on (Ut , Vt ), and then perform a projected gradient descent
step on the low-rank factorized space to produce (Ut+1 , Vt+1 ). This flow is the same for full and
partial observations, though a few details differ. Algorithm 1 gives the full observation algorithm,
and Algorithm 2 gives the partial observation algorithm. We now describe the key details of each
algorithm.
3
Throughout this paper, we refer to SVD of rank r matrix by form LΣR> where Σ ∈ Rr×r .
4
Sparse Estimation. A natural idea is to keep those entries of residual matrix Y − M that have
large magnitude. At the same time, we need to make use of the dispersed property of Sα that every
column and row contain at most α-fraction of nonzero entries. Motivated by these two principles, we
introduce the following sparsification operator: For any matrix A ∈ Rd1 ×d2 : for all (i, j) ∈ [d1 ]×[d2 ],
we let
(
(αd )
(αd )
A(i,j) , if |A(i,j) | ≥ |A(i,·)2 | and |A(i,j) | ≥ |A(·,j)1 |
Tα [A] :=
,
(4)
0,
otherwise
(k)
(k)
where A(i,·) and A(·,j) denote the elements of A(i,·) and A(·,j) that have the k-th largest magnitude
respectively. In other words, we choose to keep those elements that are simultaneously among
the largest α-fraction entries in the corresponding row and column. In the case of entries having
identical magnitude, we break ties arbitrarily. It is thus guaranteed that Tα [A] ∈ Sα .
Algorithm 1 Fast RPCA
INPUT: Observed matrix Y with rank r and corruption fraction α; parameters γ, η; number of
iterations T .
// Phase I: Initialization.
1: Sinit ← Tα [Y ]
// see (4) for the definition of Tα [·].
2: [L, Σ, R] ← SVDr [Y − Sinit ] 4
3: U0 ← LΣ1/2 , V0 ← RΣ1/2 . Let U, V be defined according to (7).
// Phase II: Gradient based iterations.
4: U0 ← ΠU (U0 ), V0 ← ΠV (V0 )
5: for t = 0, 1, . . . , T − 1 do
6:
St ← Tγα Y − Ut Vt>
7:
Ut+1 ← ΠU Ut − η∇U L(Ut , Vt ; St ) − 12 ηUt (Ut> Ut − Vt> Vt )
8:
Vt+1 ← ΠV Vt − η∇V L(Ut , Vt ; St ) − 21 ηVt (Vt> Vt − Ut> Ut )
9: end for
OUTPUT: (UT , VT )
Initialization. In the fully observed setting, we compute Sinit based on Y as Sinit = Tα [Y ]. In the
partially observed setting with sampling rate p, we let Sinit = T2pα [Y ]. In both cases, we then set
U0 = LΣ1/2 and V0 = RΣ1/2 , where LΣR> is an SVD of the best rank r approximation of Y − Sinit .
Gradient Method on Factorized Space. After initialization, we proceed by projected gradient
descent. To do this, we define loss functions explicitly in the factored space, i.e., in terms of U, V
and S:
L(U, V ; S) :=
e V ; S) :=
L(U,
1
|||U V > + S − Y |||2F ,
(fully observed)
2
1
|||ΠΦ U V > + S − Y |||2F .
(partially observed)
2p
(5)
(6)
4
SVDr [A] stands for computing a rank-r SVD of matrix A, i.e., finding the top r singular values and vectors of A.
Note that we only need to compute rank-r SVD approximately (see the initialization error requirement in Theorem
1) so that we can leverage fast iterative approaches such as block power method and Krylov subspace methods [23].
5
Recall that our goal is to recover M ∗ that satisfies the µ-incoherent condition. Given an SVD
M ∗ = L∗ ΣR∗> , we expect that the solution (U, V ) is close to (L∗ Σ1/2 , R∗ Σ1/2 ) up to some rotation.
In order to serve such µ-incoherent structure, it is natural to put constraints on the row norms of
U, V based on |||M ∗ |||op . As |||M ∗ |||op is unavailable, given U0 , V0 computed in the first phase, we rely
on the sets U, V defined as
r
r
2µr
2µr
d2 ×r
d1 ×r
|||A|||2,∞ ≤
U := A ∈ R
|||A|||2,∞ ≤
|||U0 |||op , V := A ∈ R
|||V0 |||op . (7)
d1
d2
Now we consider the following optimization problems with constraints:
min
U ∈U ,V ∈V,S∈Sα
min
U ∈U ,V ∈V,S∈Spα
1
L(U, V ; S) + |||U > U − V > V |||2F ,
8
e V ; S) + 1 |||U > U − V > V |||2 .
L(U,
F
64
(fully observed)
(partially observed)
(8)
(9)
The regularization term in the objectives above is used to encourage that U and V have the same
scale. Given (U0 , V0 ), we propose the following iterative method to produce series {(Ut , Vt )}∞
t=0 and
{St }∞
.
We
give
the
details
for
the
fully
observed
case
–
the
partially
observed
case
is
similar.
For
t=0
>
t = 0, 1, . . ., we update St using the sparse estimator St = Tγα Y − Ut Vt , followed by a projected
gradient update on Ut and Vt
1
>
>
Ut+1 = ΠU Ut − η∇U L(Ut , Vt ; St ) − ηUt (Ut Ut − Vt Vt ) ,
2
1
>
>
Vt+1 = ΠV Vt − η∇V L(Ut , Vt ; St ) − ηVt (Vt Vt − Ut Ut ) .
2
Here α is the model parameter that characterizes the corruption fraction, γ and η are algorithmic
tunning parameters, which we specify in our analysis. Essentially, the above algorithm corresponds
to applying projected gradient method to optimize (8), where S is replaced by the aforementioned
sparse estimator in each step.
Algorithm 2 Fast RPCA with partial observations
INPUT: Observed matrix Y with support Φ; parameters τ, γ, η; number of iterations T .
// Phase I: Initialization.
1: Sinit ← T2pα [ΠΦ (Y )]
2: [L, Σ, R] ← SVDr [ p1 (Y − Sinit )]
3: U0 ← LΣ1/2 , V0 ← RΣ1/2 . Let U, V be defined according to (7).
// Phase II: Gradient based iterations.
4: U0 ← ΠU (U0 ), V0 ← ΠV (V0 )
5: for t = 0, 1, . . . , T − 1 do
>
6:
St ← Tγpα Π
Y
−
U
V
t
Φ
t
e t , Vt ; St ) − 1 ηUt (U > Ut − V > Vt )
7:
Ut+1 ← ΠU Ut − η∇U L(U
t
t
16
1
e
8:
Vt+1 ← ΠV Vt − η∇V L(Ut , Vt ; St ) − 16 ηVt (Vt> Vt − Ut> Ut )
9: end for
OUTPUT: (UT , VT )
6
4
Main Results
In this section, we establish theoretical guarantees for Algorithm 1 in the fully observed setting and
for Algorithm 2 in the partially observed setting.
4.1
Analysis of Algorithm 1
We begin with some definitions and notation. It is important to define a proper error metric because
the optimal solution corresponds to a manifold and there are many distinguished pairs (U, V ) that
minimize (8). Given the SVD of the true low-rank matrix M ∗ = L∗ Σ∗ R∗> , we let U ∗ := L∗ Σ∗1/2 and
V ∗ := R∗ Σ∗1/2 . We also let σ1∗ ≥ σ2∗ ≥ . . . ≥ σr∗ be sorted nonzero singular values of M ∗ , and denote
the condition number of M ∗ by κ, i.e., κ := σ1∗ /σr∗ . We define estimation error d(U, V ; U ∗ , V ∗ ) as
the minimal Frobenius norm between (U, V ) and (U ∗ , V ∗ ) with respect to the optimal rotation,
namely
p
d(U, V ; U ∗ , V ∗ ) := min |||U − U ∗ Q|||2F + |||V − V ∗ Q|||2F ,
(10)
Q∈Qr
for Qr the set of r-by-r orthonormal matrices. This metric controls reconstruction error, as
p
|||U V > − M ∗ |||F . σ1∗ d(U, V ; U ∗ , V ∗ ),
(11)
p
when d(U, V ; U ∗ , V ∗ ) ≤ σ1∗ . We denote the local region around the optimum (U ∗ , V ∗ ) with radius
ω as
o
n
B2 (ω) := (U, V ) ∈ Rd1 ×r × Rd2 ×r d(U, V ; U ∗ , V ∗ ) ≤ ω .
The next two theorems provide guarantees for the initialization phase and gradient iterations,
respectively, of Algorithm 1. The proofs are given in Sections 6.1 and 6.2.
Theorem 1 (Initialization). Consider the paired (U0 , V0 ) produced in the first phase of Algorithm
1. If α ≤ 1/(16κµr), we have
√
√ p
d(U0 , V0 ; U ∗ , V ∗ ) ≤ 28 καµr r σ1∗ .
Theorem 2 (Convergence). Consider the second phase of Algorithm 1. Suppose we choose γ = 2
and η = c/σ1∗ for any c ≤ 1/36.
There exist constants c1 , c2 such that when α ≤ c1 /(κ2 µr), given
p
any (U0 , V0 ) ∈ B2 c2 σr∗ /κ , the iterates {(Ut , Vt )}∞
t=0 satisfy
c t 2
d2 (Ut , Vt ; U ∗ , V ∗ ) ≤ 1 −
d (U0 , V0 ; U ∗ , V ∗ ).
8κ
Therefore, using proper initialization and step size, the gradient iteration converges at a linear
rate with a constant contraction factor 1 − O(1/κ). To obtain relative precision ε compared to
the initial error, it suffices to perform
√ O(κ log(1/ε)) iterations. Note that the step size is chosen
according to 1/σ1∗ . When α . 1/(µ κr3 ), Theorem 1 and the inequality (11) together imply that
|||U0 V0> − M ∗ |||op ≤ 12 σ1∗ . Hence we can set the step size as η = O(1/σ1 (U0 V0> )) using being the top
singular value σ1 (U0 V0> ) of the matrix U0 V0>
Combining Theorems 1 and 2 implies the following result, proved in Section 6.3, that provides
an overall guarantee for Algorithm 1.
7
Corollary 1. Suppose that
(
α ≤ c min
1
1
√ 3, 2
µ κr µκ r
)
for some constant c. Then for any ε ∈ (0, 1), Algorithm 1 with T = O(κ log(1/ε)) outputs a pair
(UT , VT ) that satisfies
|||UT VT> − M ∗ |||F ≤ ε · σr∗ .
(12)
Remark 1 (Time Complexity). For simplicity we assume d1 = d2 = d. Our sparse estimator (4)
can be implemented by finding the top αd elements of each row and column via partial quick sort,
which has running time O(d2 log(αd)). Performing rank-r SVD in the first phase and computing the
gradient in each iteration both have complexity O(rd2 ).5 Algorithm 1 thus has total running time
O(κrd2 log(1/ε)) for achieving an accuracy as in (12). We note that when κ = O(1), our algorithm
is orderwise faster than the AltProj algorithm in [22], which has running time O(r2 d2 log(1/ε)).
Moreover, our algorithm only requires computing one singular value decomposition.
Remark 2 (Robustness). Assuming κ = O(1), our algorithm can tolerate corruption at a sparsity
√
√
level up to α = O(1/(µr r)). This is worse by a factor r compared to the optimal statistical
guarantee 1/(µr) obtained in [12, 19, 22]. This looseness is a consequence of the condition for (U0 , V0 )
in Theorem 2. Nevertheless, when µr = O(1), our algorithm can tolerate a constant α fraction of
corruptions.
Notably, we show that gradient descent works in the case of α = O(1/(µr)) if initialization is
sufficiently close. Accordingly, to provide an algorithm with optimal robustness, it is straightforward
to use a more complicated initial method such as AltProj that can tolerate 1/(µr) fraction of
corruptions while satisfying our initial condition. As gradient descent provides a simple and efficient
way to successively refine the estimation, such combination still gives a better running time than
prior arts.
4.2
Analysis of Algorithm 2
We now move to the guarantees of Algorithm 2. We show here that not only can we handle partial
observations, but in fact subsampling the data in the fully observed case can significantly reduce the
time complexity from the guarantees given in the previous section without sacrificing robustness.
In particular, for smaller values of r, the complexity of Algorithm 2 has near linear dependence on
the dimension d, instead of quadratic.
In the following discussion, we let d := max{d1 , d2 }. The next two results, proved in Sections
6.4 and 6.5, control the quality of the initialization step, and then the gradient iterations.
Theorem 3 (Initialization, partial observations). Suppose the observed indices Φ follow the Bernoulli
model given in (2). Consider the pair (U0 , V0 ) produced in the first phase of Algorithm 2. There
√
exist constants {ci }3i=1 such that for any ∈ (0, r/(8c1 κ)), if
2
1
µr
1
log d
α≤
, p ≥ c2
+
,
(13)
2
64κµr
α d1 ∧ d2
then we have
5
p
√
√ p
d(U0 , V0 ; U ∗ , V ∗ ) ≤ 51 καµr r σ1∗ + 7c1 κσ1∗ ,
In fact, it suffices to compute the best rank-r approximation with running time independent of the eigen gap.
8
with probability at least 1 − c3 d−1 .
Theorem 4 (Convergence, partial observations). Suppose the observed indices Φ follow the Bernoulli
model given in (2). Consider the second phase of Algorithm 2. Suppose we choose γ = 3, and
η = c/(µrσ1∗ ) for a sufficiently small constant c. There exist constants {ci }4i=1 such that if
α≤
κ4 µ2 r2 log d
c1
,
and
p
≥
c
2
κ2 µr
d1 ∧ d2
(14)
then with probability at least 1 − c3 d−1 , the iterates {(Ut , Vt )}∞
t=0 satisfy
2
∗
∗
d (Ut , Vt ; U , V ) ≤
c
1−
64µrκ
t
d2 (U0 , V0 ; U ∗ , V ∗ )
p
for all (U0 , V0 ) ∈ B2 c4 σr∗ /κ .
The above result ensures linear convergence to (U ∗ , V ∗ ) (up to rotation) even when the gradient
iterations are computed using partial observations. Note that setting p = 1 recovers Theorem 2 up
to an additional factor µr in the contraction factor. For achieving ε relative accuracy, now we need
O(µrκ log(1/ε)) iterations.
Putting Theorems 3 and 4 together, we have the following overall guarantee, proved in Section
6.6, for Algorithm 2.
Corollary 2. Suppose that
(
α ≤ c min
1
1
√ 3, 2
µ κr µκ r
)
, p ≥ c0
κ4 µ2 r2 log d
,
d1 ∧ d2
for some constants c, c0 . With probability at least 1 − O(d−1 ), for any ε ∈ (0, 1), Algorithm 2 with
T = O(µrκ log(1/ε)) outputs a pair (UT , VT ) that satisfies
|||UT VT> − M ∗ |||F ≤ ε · σr∗ .
(15)
This result shows that partial observations do not compromise robustness to sparse corruptions:
as long as the observation probability p satisfies the condition in Corollary 2, Algorithm 2 enjoys
the same robustness guarantees as the method using all entries. Below we provide two remarks on
the sample and time complexity. For simplicity, we assume d1 = d2 = d, κ = O(1).
Remark 3 (Sample complexity and matrix completion). Using the lower bound on p, it is sufficient
to have O(µ2 r2 d log d) observed entries. In the special case S ∗ = 0, our partial observation model
is equivalent to the model of exact matrix completion (see, e.g., [7]). We note that our sample
complexity (i.e., observations needed) matches that of completing a positive semidefinite (PSD)
matrix by gradient descent as shown in [11], and is better than the non-convex matrix completion
algorithms in [20] and [25]. Accordingly, our result reveals the important fact that we can obtain
robustness in matrix completion without deterioration of our statistical guarantees. It is known that
that any algorithm for solving exact matrix completion must have sample size Ω(µrd log d) [7], and a
nearly tight upper bound O(µrd log2 d) is obtained in [10] by convex relaxation. While sub-optimal
by a factor µr, our algorithm is much faster than convex relaxation as shown below.
9
d(U, V ; U ∗ , V ∗ )
GD p = 1
GD p = 0.5
GD p = 0.2
10 3
Time(secs)
d(U, V ; U ∗ , V ∗ )
10 1
10 0
10 -1
10 2
10 1
10 -2
10
GD p = 1
GD p = 0.5
GD p = 0.2
GD p = 0.1
AltProj
IALM
0
10 -1
10 -2
10 -3
0
2
4
6
8
10
Iteration count
(a)
10 3
10 4
10 5
Dimension d
(b)
0
20
40
60
80
100
Time(secs)
(c)
Figure 1. Results on synthetic data. (a) Plot of log estimation error versus number of iterations
when using gradient descent (GD) with varying sub-sampling rate p. It is conducted using d =
5000, r = 10, α = 0.1. (b) Plot of running time of GD versus dimension d with r = 10, α = 0.1, p =
0.15r2 log d/d. The low-rank matrix is recovered in all instances, and the line has slope approximately
one. (c) Plot of log estimation error versus running time for different algorithms in problem with
d = 5000, r = 10, α = 0.1.
Remark 4 (Time complexity). Our sparse estimator on the sparse matrix with support Φ can be
implemented via partial quick sort with running time O(pd2 log(αpd)). Computing the gradient
in each step involves the two terms in the objective function (9). Computing the gradient of the
first term Le takes time O(r|Φ|), whereas the second term takes time O(r2 d). In the initialization
phase, performing rank-r SVD on a sparse matrix with support Φ can be done in time O(r|Φ|). We
conclude that when |Φ| = O(µ2 r2 d log d), Algorithm 2 achieves the error bound (15) with running
time O(µ3 r4 d log d log(1/ε)). Therefore, in the small rank setting with r d1/3 , even when full
observations are given, it is better to use Algorithm 2 by subsampling the entries of Y .
5
Numerical Results
In this section, we provide numerical results and compare the proposed algorithms with existing
methods, including the inexact augmented lagrange multiplier (IALM) approach [21] for solving
the convex relaxation (1) and the alternating projection (AltProj) algorithm proposed in [22]. All
algorithms are implemented in MATLAB 6 , and the codes for existing algorithms are obtained
from their authors. SVD computation in all algorithms uses the PROPACK library.7 We ran all
simulations on a machine with Intel 32-core Xeon (E5-2699) 2.3GHz with 240GB RAM.
5.1
Synthetic Datasets
We generate a squared data matrix Y = M ∗ + S ∗ ∈ Rd×d as follows. The low-rank part M ∗ is
given by M ∗ = AB > , where A, B ∈ Rd×r have entries drawn independently from a zero mean
Gaussian distribution with variance 1/d. For a given sparsity parameter α, each entry of S ∗ is set
to be nonzero with probability α, and the values of the nonzero entries are sampled uniformly from
[−5r/d, 5r/d].
The results are summarized in Figure 1. Figure 1a shows the convergence of our algorithms
for different random instances with different sub-sampling rate p (note that p = 1 corresponds to
6
7
Our code is available at https://www.yixinyang.org/code/RPCA_GD.zip.
http://sun.stanford.edu/~rmunk/PROPACK/
10
Original
GD (49.8s)
GD, 20% sample (18.1s)
AltProj (101.5s)
IALM (434.6s)
Original
GD (87.3s)
GD, 20% sample (43.4s)
AltProj (283.0s)
IALM (801.4s)
Figure 2. Foreground-background separation in Restaurant and ShoppingMall videos. In each line,
the leftmost image is an original frame, and the other four are the separated background obtained
from our algorithms with p = 1, p = 0.2, AltProj, and IALM. The running time required by each
algorithm is shown in the title.
the fully observed setting). As predicted by Theorems 2 and 4, our gradient method converges
geometrically with a contraction factor nearly independent of p. Figure 1b shows the running time
of our algorithm with partially observed data. We see that the running time scales linearly with d,
again consistent with the theory. We note that our algorithm is memory-efficient: in the large scale
setting with d = 2×105 , using approximately 0.1% entries is sufficient for the successful recovery. In
contrast, AltProj and IALM are designed to manipulate the entire matrix with d2 = 4×1010 entries,
which is prohibitive on a single machine. Figure 1c compares our algorithms with AltProj and IALM
by showing reconstruction error versus real running time. Our algorithm requires significantly less
computation to achieve the same accuracy level, and using only a subset of the entries provides
additional speed-up.
5.2
Foreground-background Separation
We apply our method to the task of foreground-background (FB) separation in a video. We use
two public benchmarks, the Restaurant and ShoppingMall datasets.8 Each dataset contains a video
with static background. By vectorizing and stacking the frames as columns of a matrix Y , the FB
separation problem can be cast as RPCA, where the static background corresponds to a low rank
matrix M ∗ with identical columns, and the moving objects in the video can be modeled as sparse
corruptions S ∗ . Figure 2 shows the output of different algorithms on two frames from the dataset.
Our algorithms require significantly less running time than both AltProj and IALM. Moreover, even
with 20% sub-sampling, our methods still appear to achieve better separation quality (note that in
each of the frames our algorithms remove a person that is not identified by the other algorithms).
Figure 3 shows recovery results for several more frames. Again, our algorithms enjoy better
running time and outperform AltProj and IALM in separating persons from the background images.
In Appendix B, we describe the detailed parameter settings for our algorithm.
8
http://perception.i2r.a-star.edu.sg/bk_model/bk_index.html
11
Original
GD (49.8s)
GD, 20% sample (18.1s)
AltProj (101.5s)
IALM (434.6s)
Original
GD (49.8s)
GD, 20% sample (18.1s)
AltProj (101.5s)
IALM (434.6s)
Original
GD (87.3s)
GD, 20% sample (43.4s)
AltProj (283.0s)
IALM (801.4s)
Original
GD (87.3s)
GD, 20% sample (43.4s)
AltProj (283.0s)
IALM (801.4s)
Figure 3. More results of FB separation in Restaurant and ShoppingMall videos. The leftmost
images are original frames. The right four columns show the results from our algorithms with p =
1, p = 0.2, AltProj [22], and IALM [21]. The runtime of each algorithm is written in the title.
12
6
Proofs
In this section we provide the proofs for our main theoretical results in Theorems 1–4 and Corollaries 1–2.
6.1
Proof of Theorem 1
Let Y := Y − Sinit . As Y = M ∗ + S ∗ , we have Y − M ∗ = S ∗ − Sinit . We obtain Y − M ∗ ∈ S2α
because S ∗ , Sinit ∈ Sα .
We claim that kY −M ∗ k∞ ≤ 2kM ∗ k∞ . Denote the support of S ∗ , Sinit by Ω∗ and Ω respectively.
Since Y − M ∗ is supported on Ω ∪ Ω∗ , to prove the claim it suffices to consider the following three
cases.
• For (i, j) ∈ Ω∗ ∩ Ω, due to rule of sparse estimation, we have (S ∗ − Sinit )(i,j) = 0.
∗ | ≤ 2kM ∗ k . Otherwise, we have |Y
∗
• For (i, j) ∈ Ω∗ \ Ω, we must have |S(i,j)
∞
(i,j) | = |(S +
M ∗ )(i,j) | > kM ∗ k∞ . So |Y(i,j) | is larger than any uncorrupted entries in its row and column.
Since there are at most α fraction corruptions per row and column, we have Y(i,j) ∈ Ω, which
violates the prior condition (i, j) ∈ Ω∗ \ Ω.
∗ , trivially we have |(S
• For the last case (i, j) ∈ Ω \ Ω∗ , since (Sinit )(i,j) = M(i,j)
init )(i,j) | ≤
∗
kM k∞ .
The following result, proved in Section 7.1, relates the operator norm of Y − M ∗ to its infinite
norm.
Lemma 1. For any matrix A ∈ Rd1 ×d2 that belongs to Sα given in (3), we have
p
|||A|||op ≤ α d1 d2 kAk∞ .
We thus obtain
|||Y − M ∗ |||op ≤ 2α
p
p
d1 d2 kY − M ∗ k∞ ≤ 4α d1 d2 kM ∗ k∞ = 4αµrσ1∗ .
In the last step, we use the fact that M ∗ satisfies the µ-incoherent condition, which leads to
µr
kM ∗ k∞ ≤ |||M ∗ |||op |||L∗ |||2,∞ |||R∗ |||2,∞ ≤ √
|||M ∗ |||op .
d1 d2
(16)
(17)
We denote the i-th largest singular value of Y by σi . By Weyl’s theorem, we have |σi∗ − σi | ≤
∗
|||Y − M ∗ |||op for all i ∈ [d1 ∧ d2 ]. Since σr+1
= 0, we have σr+1 ≤ |||Y − M ∗ |||op . Recall that U0 V0> is
the best rank r approximation of Y . Accordingly, we have
|||U0 V0> − M ∗ |||op ≤ |||U0 V0> − Y |||op + |||Y − M ∗ |||op
= σr+1 + |||Y − M ∗ |||op ≤ 2|||Y − M ∗ |||op ≤ 8αµrσ1∗ .
1
Under condition αµr ≤ 16κ
, we obtain |||U0 V0> − M ∗ |||op ≤ 21 σr∗ . Applying Lemma 5.14 in [26]
(we provide it as Lemma 15 for the sake of completeness), we obtain
d2 (U0 , V0 ; U ∗ , V ∗ ) ≤ √
10r|||U0 V0> − M ∗ |||2op
2 |||U0 V0> − M ∗ |||2F
≤
.
σr∗
σr∗
2−1
Plugging the upper bound of |||U0 V0> − M ∗ |||op into the above inequality completes the proof.
13
6.2
Proof of Theorem 2
We essentially follow the general framework developed in [11] for analyzing the behaviors of gradient
descent in factorized low-rank optimization. But it is worth to note that [11] only studies the
symmetric and positive semidefinite setting, while we avoid such constraint on M ∗ . The techniques
for analyzing general asymmetric matrix in factorized space is inspired by the recent work [26] on
solving low-rank matrix equations. In our setting, the technical challenge is to verify the local
descent condition of the loss function (8), which not only has a bilinear dependence on U and V ,
but also involves our sparse estimator (4).
We begin with some notations. Define the equivalent set of optimal solution as
o
n
(18)
E(M ∗ ) := (A, B) ∈ Rd1 ×r × Rd2 ×r A = L∗ Σ∗1/2 Q, B = R∗ Σ∗1/2 Q, where Q ∈ Qr .
p
Given (U0 , V0 ) ∈ B2 c2 σr∗ /κ , by (11), we have |||U0 V0> − M ∗ |||op ≤ 21 σr∗ when c2 is sufficiently
small. By Weyl’s theorem We thus have
q
q
q
q
∗
∗
∗
σ1 /2 ≤ |||U0 |||op ≤ 3σ1 /2, and σ1 /2 ≤ |||V0 |||op ≤ 3σ1∗ /2.
As a result, for U, V constructed according to (7), we have
E(M ∗ ) ⊆ U × V, and U ⊆ U, V ⊆ V,
(19)
where
(
U :=
A ∈ Rd1 ×r
r
|||A|||2,∞ ≤
3µrσ1∗
d1
(
)
, V :=
A ∈ Rd2 ×r
r
|||A|||2,∞ ≤
3µrσ1∗
d2
)
.
We let
1
(20)
G(U, V ) := |||U > U − V > V |||2F .
8
For L(U, V ; S), we denote the gradient with respect to M by ∇M L(U, V ; S), i.e. ∇M L(U, V ; S) =
UV > + S − Y .
The local descent property is implied by combining the following two results, which are proved
in Section 6.7 and 6.8 respectively.
Lemma
2 (Local descent property of
L). Suppose U, V satisfy (19). For any (U, V ) ∈ (U × V) ∩
p
B2 ( σ1∗ ), we let S = Tγα Y − U V > , where we choose γ = 2. Then we have that for (Uπ∗ , Vπ∗ ) ∈
argmin(A,B)∈E(M ∗ ) |||U − A|||2F + |||V − B|||2F and β > 0,
>
> 2
∗
hh∇M L(U, V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
V ii ≥ |||U V − Uπ ∗ Vπ ∗ |||F − νσ1 δ − 3
q
σ1∗ δ 3 .
Here ∆U := U − Uπ∗ , ∆V := V − Vπ∗ , δ := |||∆U |||2F + |||∆V |||2F , and ν := 9(β + 6)αµr + 5β −1 .
√
Lemma 3 (Local descent property of G). For any (U, V ) ∈ B2 ( σr∗ ) and
(Uπ∗ , Vπ∗ ) ∈ arg
min
(A,B)∈E(M ∗ )
14
|||U − A|||2F + |||V − B|||2F ,
(21)
we have
hh∇U G(U, V ), U − Uπ∗ ii + hh∇V G(U, V ), V − Vπ∗ ii
r
σ1∗ δ 3 1
1 >
1 ∗
>
2
≥ |||U U − V V |||F + σr δ −
− |||U V > − Uπ∗ Vπ>∗ |||2F ,
8
8
2
2
where δ is defined according to Lemma 2.
As another key ingredient, we establish the following smoothness condition, proved in Section
6.9, which indicates that the Frobenius norm of gradient decreases as (U, V ) approaches the optimal
manifold.
p
Lemma 4 (Smoothness). For any (U, V ) ∈ B2 ( σ1∗ ), we let S = Tγα Y − U V > , where we choose
γ = 2. We have that
|||∇M L(U, V ; S)|||2F ≤ 6|||U V > − M ∗ |||2F ,
(22)
and
|||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤ 2σ1∗ |||U > U − V > V |||2F .
(23)
With the above results in hand, we are ready to prove Theorem 2.
Proof of Theorem 2. We use shorthands
δt := d2 (Ut , Vt ; U ∗ , V ∗ ), Lt := L(Ut , Vt ; St ), and Gt := G(Ut , Vt ).
For (Ut , Vt ), let (Uπt ∗ , Vπt∗ ) := argmin(A,B)∈E(M ∗ ) |||Ut − A|||2F + |||Vt − B|||2F . Define ∆tU := Ut − Uπt ∗ ,
∆tV := Vt − Vπt∗ .
We prove Theorem 2 by induction. It is sufficient
topconsider
one step of the iteration. For any
t ≥ 0, under the induction hypothesis (Ut , Vt ) ∈ B2 c2 σr∗ /κ . We find that
δt+1 ≤ |||Ut+1 − Uπt ∗ |||2F + |||Vt+1 − Vπt∗ |||2F
≤ |||Ut − η∇U Lt − η∇U Gt − Uπt ∗ |||2F + |||Vt − η∇V Lt − η∇V Gt − Vπt∗ |||2F
≤ δt − 2η hh∇U Lt + ∇U Gt , Ut − Uπt ∗ ii −2η hh∇V Lt + ∇V Gt , Vt − Vπt∗ ii
|
{z
}
|
{z
}
W1
2
W2
2
2
2
+ η |||∇U Lt + ∇U Gt |||F +η |||∇V Lt + ∇V Gt |||F ,
|
|
{z
}
{z
}
W3
(24)
W4
where the second step follows from the non-expansion property of projection onto U, V, which is
implied by E(M ∗ ) ⊆ U × V shown in (19). Since ∇U Lt = [∇M Lt ] V and ∇V Lt = [∇M Lt ]> U , we
have
t
t>
hh∇U Lt , Ut − Uπt ∗ ii + hh∇V Lt , Vt − Vπt∗ ii = hh∇M Lt , Ut Vt> − Uπt ∗ Vπt>
∗ + ∆U ∆V ii.
Combining Lemma 2 and 3, under condition δt < σr∗ , we have that
1
1
1
W1 + W2 ≥ |||Ut Vt> − M ∗ |||2F + |||Ut> Ut − Vt> Vt |||2F + σr∗ δt − νσ1∗ δt − 4
2
8
8
15
q
σ1∗ δt3 .
On the other hand, we have
W3 + W4 ≤ 2|||∇U Lt |||2F + 2|||∇U Gt |||2F + 2|||∇V Lt |||2F + 2|||∇V Gt |||2F
≤ 2(|||Ut |||2op + |||Vt |||2op )|||∇M Lt |||2F + 2|||∇U Gt |||2F + 2|||∇V Gt |||2F
≤ 36σ1∗ |||Ut Vt> − M ∗ |||2F + 4σ1∗ |||Ut> Ut − Vt> Vt |||2F ,
p
where the last step is implied by Lemma 4 and the assumption (Ut , Vt ) ∈ B2 c2 σr∗ /κ that leads
p
p
to |||Ut |||op ≤ 3σ1∗ /2, |||Vt |||op ≤ 3σ1∗ /2.
By the assumption η = c/σ1∗ for any constant c ≤ 1/36, we thus have
q
1 ∗
2
∗
−2η(W1 + W2 ) + η (W3 + W4 ) ≤ − ησr δt + 2ηνσ1 δt + 8η σ1∗ δt3 .
4
In Lemma 2, choosingpβ = 320κ and assuming α . 1/(κ2 µr), we can have ν ≤ 1/(32κ). Assuming
1 ∗
δt . σr∗ /κ leads to 14 σ1∗ δt3 ≤ 16
σr δt . We thus obtain
ησr∗
δt+1 ≤ 1 −
δt .
(25)
8
Under initial condition δ0 . σr∗ /κ, we obtain that such condition holds for all t since estimation
error decays geometrically after each iteration. Then applying (25) for all iterations, we conclude
that for all t = 0, 1, . . .,
ησ ∗ t
δt ≤ 1 − r δ0 .
8
6.3
Proof of Corollary 1
We need α . κ21µr due to the condition of Theorem 2. In order to ensure the linear convergence
happens, it suffices to let the initial error shown in Theorem 1 be less than the corresponding
condition in Theorem 2. Accordingly, we need
p
√
√ p
28 καµr r σ1∗ . σr∗ /κ,
which leads to α .
1
√ 3.
µ rκ
Using the conclusion that gradient descent has linear convergence, choosing T = O(κ log(1/ε)),
we have
σ∗
d2 (UT , VT ; U ∗ , V ∗ ) ≤ ε2 d2 (U0 , V0 ; U ∗ , V ∗ ) . ε2 r .
κ
∗
∗
>
Finally, applying the relationship between d(UT , VT ; U , V ) and |||UT VT − M ∗ |||F shown in (11), we
complete the proof.
6.4
Proof of Theorem 3
Let Y := p1 (Y − Sinit ). Similar to the proof of Theorem 1, we first establish an upper bound on
|||Y − M ∗ |||op . We have that
1
1
|||Y − M ∗ |||op ≤ |||Y − ΠΦ M ∗ |||op + ||| ΠΦ (M ∗ ) − M ∗ |||op .
p
p
16
(26)
For the first term, we have Y − p1 ΠΦ M ∗ = p1 (ΠΦ (S ∗ ) − Sinit ) because Y = ΠΦ (M ∗ + S ∗ ). Lemma
d
10 shows that under condition p & α(dlog
, there are at most 32 pα-fraction nonzero entries in each
1 ∧d2 )
row and column of ΠΦ (S ∗ ) with high probability. Since Sinit ∈ S2pα , we have
ΠΦ (S ∗ ) − Sinit ∈ S4pα .
(27)
kΠΦ (S ∗ ) − Sinit k∞ ≤ 2kM ∗ k∞ .
(28)
In addition, we prove below that
Denote the support of ΠΦ (S ∗ ) and Sinit by Ω∗o and Ω. For (i, j) ∈ Ω∗o ∩ Ω and (i, j) ∈ Ω \ Ω∗o , we
∗ , respectively. To prove the claim,
have (ΠΦ (S ∗ ) − Sinit )(i,j) = 0 and (ΠΦ (S ∗ ) − Sinit )(i,j) = −M(i,j)
∗ | < 2kM ∗ k . If this is not true, then we must have
it remains to show that for (i, j) ∈ Ω∗o \ Ω, |S(i,j)
∞
∗
|Y(i,j) | > kM k∞ . Accordingly, |Y(i,j) | is larger than the magnitude of any uncorrupted entries in
its row and column. Note that on the support Φ, there are at most 32 pα corruptions per row and
column, we have (i, j) ∈ Ω, which violates our prior condition (i, j) ∈ Ω∗o \ Ω.
Using these two properties (27), (28) and applying Lemma 1, we have
p
p
1
|||Y − ΠΦ M ∗ |||op ≤ 4α d1 d2 kΠΦ (S ∗ ) − Sinit k∞ ≤ 8α d1 d2 kM ∗ k∞ ≤ 8αµrσ1∗ ,
(29)
p
where the last step follow from (17).
For the second term in (26), we use the following lemma proved in [10].
Lemma 5 (Lemma 2 in [10]). Suppose A ∈ Rd1 ×d2 is a fixed matrix. We let d := max{d1 , d2 }.
There exists a constant c such that with probability at least 1 − O(d−1 ),
s
!
n
o
1
log d
log d
>
||| ΠΦ (A) − A|||op ≤ c
kAk∞ +
max |||A|||2,∞ , |||A |||2,∞
.
p
p
p
Given the SVD M ∗ = L∗ ΣR∗> , for any i ∈ [d1 ], we have
∗
kM(i,·)
k2
=
kL∗(i,·) ΣR∗> k2
≤
σ1∗ kL∗(i,·) k2
≤
σ1∗
r
µr
.
d1
We can bound |||M ∗> |||2,∞ similarly. Lemma 5 leads to
1
log d µr
√
||| ΠΦ (M ∗ ) − M ∗ |||op ≤ c0
σ ∗ + c0
p
p
d1 d2 1
s
log d
p
r
√
µr
σ1∗ ≤ c0 σ1∗ / r
d1 ∧ d2
(30)
2
log d
under condition p ≥ 4µr
2 (d ∧d ) .
1
2
Putting (29) and (30) together, we obtain
√
|||Y − M ∗ |||op ≤ 8αµrσ1∗ + c0 σ1∗ / r.
Then using the fact that U0 V0> is the best rank r approximation of Y and applying Wely’s theorem
(see the proof of Theorem 1 for a detailed argument), we have
|||U0 V0> − M ∗ |||op ≤ |||U0 V0> − Y |||op + |||Y − M ∗ |||op
√
≤ 2|||Y − M ∗ |||op ≤ 16αµrσ1∗ + 2c0 σ1∗ / r
17
√
Under our assumptions, we have 16αµrσ1∗ + 2c0 σ1∗ / r ≤ 12 σr∗ . Accordingly, Lemma 15 gives
d2 (U0 , V0 ; U ∗ , V ∗ ) ≤ √
10r|||U0 V0> − M ∗ |||2op
2 |||U0 V0> − M ∗ |||2F
≤
.
σr∗
σr∗
2−1
We complete the proof by combining the above two inequalities.
6.5
Proof of Theorem 4
In this section, we turn to prove Theorem 4. Similar to the proof of Theorem 2, we rely on
establishing the local descent and smoothness conditions. Compared to the full observation setting,
e V ) := 1 |||U > U − V > V |||2 merely
we replace L by Le given in (6), while the regularization term G(U,
F
64
differs from G(U, V ) given in (20) by a constant factor. It is thus sufficient to analyze the properties
e
of L.
Define E(M ∗ ) according to (18). Under the initial condition, we still have
E(M ∗ ) ⊆ U × V, and U ⊆ U, V ⊆ V.
(31)
We prove the next two lemmas in Section 6.10 and 6.11 respectively. In both lemmas, for any
(U, V ) ∈ U × V, we use shorthands
(Uπ∗ , Vπ∗ ) = arg
min
(A,B)∈E(M ∗ )
|||U − A|||2F + |||V − B|||2F ,
∆U := U − Uπ∗ , ∆V := V − Vπ∗ , and δ := |||∆U |||2F + |||∆V |||2F . Recall that d := max{d1 , d2 }.
e Suppose U, V satisfy (31). Suppose we let
Lemma 6 (Local descent property of L).
i
h
S = Tγpα ΠΦ Y − U V > ,
√
where we choose γ = 3. For any β > 0 and ∈ (0, 41 ), we define ν := (14β +81)αµr +26 +18β −1 .
There exist constants {ci }2i=1 such that if
2 2
µ r
1
log d
p ≥ c1
+ +1
,
(32)
2
α
d1 ∧ d2
then with probability at least 1 − c2 d−1 ,
q
3
>
> 2
∗
e V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
∗ V ∗ ||| − νσ δ − 10
hh∇M L(U,
ii
≥
|||U
V
−
U
σ1∗ δ 3 − 2δ 2 (33)
π
V
π F
1
16
p ∗
for all (U, V ) ∈ (U × V) ∩ B2
σ1 .
e Suppose U, V satisfy (31). Suppose we let S = Tγαp ΠΦ Y − U V >
Lemma 7 (Smoothness of L).
for γ = 3. There exist constants {ci }3i=1 such that for any ∈ (0, 41 ), when p satisfies
condition
p
(32), with probability at least 1 − c2 d−1 , we have that for all (U, V ) ∈ (U × V) ∩ B2 ( σ1∗ ),
i
h
e V ; S)|||2 + |||∇V L(U,
e V ; S)|||2 ≤ c3 µrσ ∗ |||U V > − Uπ∗ V >∗ |||2 + µrσ ∗ δ(δ + σ ∗ ) .
(34)
|||∇U L(U,
F
1
π F
1
1
F
18
In the remainder of this section, we condition on the events in Lemma 6 and 7. Now we are
ready to prove Theorem 4.
Proof of Theorem 4. We essentially follow the process for proving Theorem 2. Let the following
shorthands be defined in the same fashion: δt , (Uπt ∗ , Vπt∗ ), (∆tU , ∆tV ), Let , Get .
Here we show error decays in one step of iteration. The induction process is the same as the
proof of Theorem 2, and is thus omitted. For any t ≥ 0, similar to (24) we have that
δt+1 ≤ δt − 2η hh∇U Let + ∇U Get , Ut − Uπt ∗ ii −2η hh∇V Let + ∇V Get , Vt − Vπt∗ ii
{z
}
|
{z
}
|
W1
W2
+ η |||∇U Let + ∇U Get |||2F +η 2 |||∇V Let + ∇V Get |||2F .
|
|
{z
}
{z
}
2
W3
W4
We also have
t
t>
hh∇U Let , Ut − Uπt ∗ ii + hh∇V Let , Vt − Vπt∗ ii = hh∇M Let , Ut Vt> − Uπt ∗ Vπt>
∗ + ∆U ∆V ii,
which can be lower bounded by Lemma 6. Note that Ge differs from G by a constant, we can still
leverage Lemma 3. Hence, we obtain that
q
1
1
1
W1 + W2 ≥ |||Ut Vt> − M ∗ |||2F + |||Ut> Ut − Vt> Vt |||2F + σr∗ δt − νσ1∗ δt − 11 σ1∗ δt3 − 2δt2 .
8
64
64
On the other hand, we have
W3 + W4 ≤ 2|||∇U Let |||2F + 2|||∇U Get |||2F + 2|||∇V Let |||2F + 2|||∇V Get |||2F
h
i
≤ c µrσ1∗ |||Ut Vt> − M ∗ |||2F + µrσ1∗ δt (δt + σ1∗ ) + σ1∗ |||Ut> Ut − Vt> Vt |||2F ,
where c is a constant, and the last step is implied by Lemma 4 and Lemma 7.
By the assumption η = c0 /[µrσ1∗ ] for sufficiently small constant c0 , we thus have
q
1
−2η(W1 + W2 ) + η 2 (W3 + W4 ) ≤ − ησr∗ δt + 2ηνσ1∗ δt + 22η σ1∗ δt3 + 4ηδt2 .
32
√
Recall that ν := (14β + 81)αµr + 26 + 18β −1 . By letting β = c1 κ, = c2 /κ2 and assuming
α ≤ c3 /(µrκ2 ) and δt ≤ c4 σr∗ /κ for some sufficiently small constants {ci }4i=1 , we can have −2η(W1 +
1
W2 ) + η 2 (W3 + W4 ) ≤ − 64
ησr∗ δt , which implies that
ησr∗
δt+1 ≤ 1 −
δt ,
64
and thus completes the proof.
6.6
Proof of Corollary 2
We need α . µκ12 r due to the condition of Theorem 4. Letting the initial error provided in Theorem
3 be less than the corresponding condition in Theorem 4, we have
p
p
√
√ p
51 καµr r σ1∗ + 7c1 κσ1∗ . σr∗ /κ,
19
which leads to
1
1
α. √
, . √ .
µ r3 κ3
κ3
Plugging the above two upper bounds into the second term in (13), it suffices to have
p&
κ3 µr2 log d
.
d1 ∧ d2
Comparing the above bound with the second term in (14) completes the proof.
6.7
Proof of Lemma 2
Let M := U V > . We observe that
∇M L(U, V ; S) = M + S − M ∗ − S ∗ .
Plugging it back into the left hand side of (21), we obtain
∗
∗
∗
>
hh∇M L(U, V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
V ii = hhM + S − M − S , M − M + ∆U ∆V ii
≥ |||M − M ∗ |||2F − |hhS − S ∗ , M − M ∗ ii| − |hhM + S − M ∗ − S ∗ , ∆U ∆>
V ii| .
{z
} |
{z
}
|
T1
(35)
T2
Next we derive upper bounds of T1 and T2 respectively.
Upper bound of T1 . We denote the support of S, S ∗ by Ω and Ω∗ respectively. Since S − S ∗ is
supported on Ω∗ ∪ Ω, we have
T1 ≤ |hhΠΩ (S − S ∗ ), M − M ∗ ii| + |hhΠΩ∗ \Ω (S − S ∗ ), M − M ∗ ii| .
|
{z
} |
{z
}
W1
W2
Recall that for any (i, j) ∈ Ω, we have S(i,j) = (M ∗ + S ∗ − M )(i,j) . Accordingly, we have
W1 = |||ΠΩ (M − M ∗ )|||2F .
(36)
Now we turn to bound W2 . Since S(i,j) = 0 for any (i, j) ∈ Ω∗ \ Ω, we have
W2 = |hhΠΩ∗ \Ω S ∗ , M − M ∗ ii|.
Let ui be the i-th row of M − M ∗ , and vj be the j-th column of M − M ∗ . For any k ∈ [d2 ], we let
(k)
ui denote the element of ui that has the k-th largest magnitude. Similarly, for any k ∈ [d1 ], we
(k)
let vj denote the element of vj that has the k-th largest magnitude.
From the design of sparse estimator (4), we have that for any (i, j) ∈ Ω∗ \ Ω, |(M ∗ + S ∗ − M )(i,j) |
is either smaller than the γαd2 -th largest entry of the i-th row of M ∗ + S ∗ − M or smaller than
the γαd1 -th largest entry of the j-th column of M ∗ + S ∗ − M . Note that S ∗ only contains at most
α-fraction nonzero entries per row and column. As a result, |(M ∗ + S ∗ − M )(i,j) | has to be less than
(γαd2 −αd2 )
the magnitude of ui
(γαd1 −αd1 )
. Formally, we have for (i, j) ∈ Ω∗ \ Ω,
n
o
(γαd −αd2 )
(γαd −αd1 )
|, |vj 1
| .
|(M ∗ + S ∗ − M )(i,j) | ≤ max |ui 2
|
{z
}
or vj
bij
20
(37)
Furthermore, we obtain
(γαd2 −αd2 ) 2
b2ij ≤ |ui
(γαd1 −αd1 ) 2
| + |vj
| ≤
kvj k22
kui k22
+
.
(γ − 1)αd2 (γ − 1)αd1
(38)
Meanwhile, for any (i, j) ∈ Ω∗ \ Ω, we have
∗
· (M − M ∗ )(i,j) | = |(M ∗ + S ∗ − M − M ∗ + M )(i,j) · (M − M ∗ )(i,j) |
|S(i,j)
≤ |(M − M ∗ )(i,j) |2 + |(M ∗ + S ∗ − M )(i,j) | · |(M − M ∗ )(i,j) |
≤ |(M − M ∗ )(i,j) |2 + bij · |(M − M ∗ )(i,j) |
b2ij
β
|(M − M ∗ )(i,j) |2 +
,
≤ 1+
2
2β
(39)
where β in the last step can be any positive number. Combining (38) and (39) leads to
X
∗
· (M − M ∗ )(i,j) |
W2 ≤
|S(i,j)
(i,j)∈Ω∗ \Ω
X b2ij
β
≤ 1+
|||ΠΩ∗ \Ω (M − M ∗ )|||2F +
2
2β
(i,j)∈Ω∗ \Ω
X kui k2
kvj k22
β
1
∗ 2
2
≤ 1+
|||ΠΩ∗ \Ω (M − M )|||F +
+
2
2β
(γ − 1)αd2 (γ − 1)αd1
∗
(i,j)∈Ω \Ω
β
1
≤ 1+
|||ΠΩ∗ \Ω (M − M ∗ )|||2F +
|||M − M ∗ |||2F .
2
β(γ − 1)
(40)
In the last step, we use
X
(i,j)∈Ω∗ \Ω
≤
1
1
kui k22 + kvj k22
d2
d1
X X
i∈[d] j∈Ω∗(i,·)
≤α
X
i∈[d]
1
kui k22 +
d2
kui k22 + α
X
≤
X 1
1
2
2
kui k2 + kvj k2
d2
d1
∗
(i,j)∈Ω
X X
j∈[d] i∈Ω∗(·,j)
1
kvj k22
d1
kvj k22 = 2α|||M − M ∗ |||2F .
(41)
j∈[d]
We introduce shorthand δ := |||∆U |||2F + |||∆V |||2F . We prove the following inequality in the end of this
section.
p
(42)
|||M − M ∗ |||F ≤ 5σ1∗ δ.
Combining (36), (40) and (42) leads to
β
5σ1∗ δ
T1 ≤ |||ΠΩ (M − M ∗ )|||2F + 1 +
|||ΠΩ∗ \Ω (M − M ∗ )|||2F +
2
β(γ − 1)
∗
5σ1 δ
≤ 9(2γ + β + 2)αµrσ1∗ δ +
,
β(γ − 1)
(43)
where the last step follows from Lemma 14 by noticing that ΠΩ (M − M ∗ ) has at most γα-fraction
nonzero entries per row and column.
21
Upper bound of T2 . To ease notation, we let C := M + S − M ∗ − S ∗ . We observe that C is
supported on Ωc , we have
>
T2 ≤ |hhΠΩ∗c ∩Ωc (M − M ∗ ), ∆U ∆>
V ii| + |hhΠΩ∗ ∩Ωc C, ∆U ∆V ii| .
|
{z
} |
{z
}
W3
W4
By Cauchy-Swartz inequality, we have
∗
W3 ≤ |||ΠΩ∗c ∩Ωc (M − M ∗ )|||F |||∆U ∆>
V |||F ≤ |||M − M |||F |||∆U |||F |||∆V |||F ≤
q
5σ1∗ δ 3 /2,
where the last step follows from (42) and |||∆U |||F |||∆V |||F ≤ δ/2.
It remains to bound W4 . By Cauchy-Swartz inequality, we have
∗
∗
>
W4 ≤ |||ΠΩ∗ ∩Ωc C|||F |||∆U ∆>
V |||F ≤ |||ΠΩ∗ ∩Ωc (M + S − M )|||F |||∆U ∆V |||F
1/2
s X
2
2
X
(a)
(b)
kvj k2
kui k2
≤
b2ij |||∆U |||F |||∆V |||F ≤
+
|||∆U |||F |||∆V |||F .
(γ − 1)αd2 (γ − 1)αd1
(i,j)∈Ω∗ \Ω
(i,j)∈Ω∗ \Ω
s
r
(c)
2
5σ1∗ δ 3
∗
|||M − M |||F |||∆U |||F |||∆V |||F ≤
,
≤
γ−1
2(γ − 1)
where step (a) is from (37), step (b) follows from (38), and step (c) follows from (41). Combining
the upper bounds of W3 and W4 , we obtain
s
q
5σ1∗ δ 3
T2 ≤ 5σ1∗ δ 3 /2 +
.
(44)
2(γ − 1)
Combining pieces. Now we choose γ = 2. Then inequality (43) implies that
T1 ≤ [9(β + 6)αµr + 5β −1 ]σ1∗ δ.
Inequality (44) then implies that
q
T2 ≤ 3 σ1∗ δ 3 .
Plugging the above two inequalities into (35) completes the proof.
Proof of inequality (42). We find that
hp
i2
σ1∗ (|||∆V |||F + |||∆U |||F ) + |||∆U |||F |||∆V |||F
2
p
1p ∗
1p ∗
∗
≤
σ1 (|||∆V |||F + |||∆U |||F ) +
σ1 |||∆U |||F +
σ1 |||∆V |||F
2
2
|||M − M ∗ |||2F ≤
≤ 5σ1∗ (|||∆U |||2F + |||∆V |||2F ),
where the first step follows from the upper bound of |||M p
− M ∗ |||F shown in Lemma 12, and the
second step follows from the assumption |||∆U |||F , |||∆V |||F ≤ σ1∗ .
22
6.8
Proof of Lemma 3
We first observe that
1
1
∇U G(U, V ) = U (U > U − V > V ), ∇V G(U, V ) = V (V > V − U > U ),
2
2
Therefore, we obtain
hh∇U G(U, V ), U − Uπ∗ ii + hh∇V G(U, V ), V − Vπ∗ ii
1
= hhU > U − V > V , U > U − V > V − U > Uπ∗ + V > Vπ∗ ii
2
1
1 >
= |||U U − V > V |||2F + hhU > U − V > V , U > U − V > V − 2U > Uπ∗ + 2V > Vπ∗ ii
4
4
1 >
1
>
2
>
= |||U U − V V |||F + hhU > U − V > V , U > U − V > V − 2∆>
U Uπ ∗ + 2∆V Vπ ∗ ii,
4
4
(45)
>
>
>
>
>
where the last step follows from ∆>
U Uπ ∗ − ∆V Vπ ∗ = U Uπ ∗ − V Vπ ∗ since Uπ ∗ Uπ ∗ = Vπ ∗ Vπ ∗ . Note
that
U > U − V > V = (Uπ∗ + ∆U )> (Uπ∗ + ∆U ) − (Vπ∗ + ∆V )> (Vπ∗ + ∆V )
>
>
>
>
= Uπ>∗ ∆U + ∆>
U Uπ ∗ + ∆U ∆U − Vπ ∗ ∆V − ∆V Vπ ∗ − ∆V ∆V ,
where we use Uπ>∗ Uπ∗ = Vπ>∗ Vπ∗ again in the last step. Furthermore, since U > U −V > V is symmetric,
we have
>
>
hhU > U − V > V , Uπ>∗ ∆U + ∆>
U Uπ ∗ − Vπ ∗ ∆V − ∆V Vπ ∗ ii
>
= hhU > U − V > V , 2∆>
U Uπ ∗ − 2∆V Vπ ∗ ii.
Using these arguments, for the second term in (45), denoted by T2 , we have
1
>
T2 = hhU > U − V > V , ∆>
U ∆U − ∆V ∆V ii.
4
Furthermore, we have
>
>
>
2
2
4T2 ≤ |hhU > U − V > V , ∆>
U ∆U − ∆V ∆V ii| ≤ |||U U − V V |||F |||∆U |||F + |||∆V |||F
≤ |||U > U − Uπ>∗ Uπ∗ |||F + |||V > V − Vπ>∗ Vπ∗ |||F δ
q
≤ 2 (|||Uπ∗ |||op |||∆U |||F + |||Vπ∗ |||op |||∆V |||F ) δ ≤ 2 2σ1∗ δ 3 .
(46)
It remains to find a lower bound of |||U > U − V > V |||F . The following inequality, which we turn
to prove later, is true:
|||U > U − V > V |||2F ≥ |||U U > − Uπ∗ Uπ>∗ |||2F + |||V V > − Vπ∗ Vπ>∗ |||2F − 2|||U V > − Uπ∗ Vπ>∗ |||2F .
(47)
Proceeding with the first term in (45) by using (47), we get
1 >
1
1
|||U U − V > V |||2F = |||U > U − V > V |||2F + |||U > U − V > V |||2F
4
8
8
1 >
1
1
1
≥ |||U U − V > V |||2F + |||U U > − Uπ∗ Uπ>∗ |||2F + |||V V > − Vπ∗ Vπ>∗ |||2F − |||U V > − Uπ∗ Vπ>∗ |||2F
8
8
8
4
1 >
1
1
>
2
>
>
2
>
>
2
= |||U U − V V |||F + |||F F − Fπ∗ Fπ∗ |||F − |||U V − Uπ∗ Vπ∗ |||F ,
(48)
8
8
2
23
where we let
U
Uπ∗
∗
F :=
, Fπ :=
.
V
Vπ ∗
Introduce ∆F := F − Fπ∗ . Recall that δ := |||∆U |||2F + |||∆V |||2F . Equivalently δ = |||∆F |||2F . We have
>
>
|||F F > − Fπ∗ Fπ>∗ |||F = |||∆F Fπ∗
+ Fπ∗ ∆>
F + ∆F ∆F |||F
>
2
>
>
≥ |||∆F Fπ∗
+ Fπ∗ ∆>
F |||F − |||∆F |||F = |||∆F Fπ∗ + Fπ ∗ ∆F |||F − δ.
For the first term, we have
>
2
> 2
>
>
|||∆F Fπ∗
+ Fπ∗ ∆>
F |||F = 2|||∆F Fπ∗ |||F + hh∆F Fπ∗ , Fπ ∗ ∆F ii
>
∗
2
>
>
≥ 2σr (Fπ∗ )2 |||∆F |||2F + hh∆F Fπ∗
, F π ∗ ∆>
F ii = 4σr |||∆F |||F + hh∆F Fπ∗ , Fπ ∗ ∆F ii.
For the cross term, by the following result, proved in [11] (we also provide a proof in Section 7.5 for
> , F ∗ ∆> ii ≥ 0.
the sake of completeness), we have hh∆F Fπ∗
π
F
√ ∗
Lemma 8. When |||F − Fπ∗ |||op < 2σr , we have that ∆>
F Fπ ∗ is symmetric.
p
p
Accordingly, we have |||F F > −Fπ∗ Fπ>∗ |||F ≥ 2 σr∗ δ −δ ≥ σr∗ δ under condition δ ≤ σr∗ . Plugging
this lower bound into (48), we obtain
1 >
1
1
1
|||U U − V > V |||2F ≥ |||U > U − V > V |||2F + σr∗ δ − |||U V > − Uπ∗ Vπ>∗ |||2F .
4
8
8
2
Putting (45), (46) and the above inequality together completes the proof.
Proof of inequality (47). For the term on the left hand side of (47), it is easy to check that
|||U > U − V > V |||2F = |||U U > |||2F + |||V V > |||2F − 2|||U V > |||2F .
(49)
The property Uπ>∗ Uπ∗ = Vπ>∗ Vπ∗ implies that |||Uπ∗ Uπ>∗ |||F = |||Vπ∗ Vπ>∗ |||F = |||Uπ∗ Vπ>∗ |||F . Therefore,
expanding those quadratic terms on the right hand side of (47), one can show that it is equal to
|||U U > |||2F + |||V V > |||2F − 2|||Uπ>∗ U |||2F − 2|||Vπ>∗ V |||2F + 4hhUπ>∗ U , Vπ>∗ V ii − 2|||U V > |||2F .
Comparing inequalities (49) and (50), it thus remains to show that
−2|||Uπ>∗ U |||2F − 2|||Vπ>∗ V |||2F + 4hhUπ>∗ U , Vπ>∗ V ii ≤ 0.
Equivalently, we always have |||Uπ>∗ U − Vπ>∗ V |||2F ≥ 0, and thus prove (47).
6.9
Proof of Lemma 4
First, we turn to prove (23). As
1
1
∇U G(U, V ) = U (U > U − V > V ), ∇V G(U, V ) = V (V > V − U > U ),
2
2
we have
|||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤
1
|||U |||2op + |||V |||2op |||U > U − V > V |||2F .
4
24
(50)
p
p
As (U, V ) p
∈ B2 ( σ1∗ ), we thus have |||U |||op ≤ |||Uπ∗ |||op + |||Uπ∗ − U |||op ≤ 2 σ1∗ , and similarly
|||V |||op ≤ 2 σ1∗ . We obtain
|||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤ 2σ1∗ |||U > U − V > V |||2F .
Now we turn to prove (22). We observe that
∇M L(U, V ; S) = M + S − M ∗ − S ∗ ,
where we let M := U V > . We denote the support of S, S ∗ by Ω and Ω∗ respectively. Based on the
sparse estimator (4) for computing S, ∇M L(U, V ; S) is only supported on Ωc . We thus have
|||∇M L(U, V ; S)|||F ≤ |||ΠΩc \Ω∗ (M − M ∗ )|||F + |||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||F
≤ |||M − M ∗ |||F + |||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||F .
It remains to upper bound the second term on the right hand side. Following (37) and (38), we
have
|||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||2F ≤
X
(i,j)∈Ωc ∩Ω∗
kvj k22
2
kui k22
+
≤
|||M − M ∗ |||2F ,
(γ − 1)αd2 (γ − 1)αd1
γ−1
where the last step is proved in (41). By choosing γ = 2, we thus conclude that
√
|||∇M L(U, V ; S)|||F ≤ (1 + 2)|||M − M ∗ |||F .
6.10
Proof of Lemma 6
We denote the support of ΠΦ (S ∗ ), S by Ω∗o and Ω. We always have Ω∗o ⊆ Φ and Ω ⊆ Φ.
In the sequel, we establish several results that characterize the properties of Φ. The first result,
proved in Section 7.2, shows that the Frobenius norm of any incoherent matrix whose row (or
column) space are equal to L∗ (or R∗ ) is well preserved under partial observations supported on Φ.
Lemma 9. Suppose M ∗ ∈ Rd1 ×d2 is a rank r and µ-incoherent matrix that has SVD M ∗ =
log d
L∗ Σ∗ R∗> . Then there exists an absolute constant c such that for any ∈ (0, 1), if p ≥ c 2µr
,
(d1 ∧d2 )
then with probability at least 1 − 2d−3 , we have that for all A ∈ Rd2 ×r , B ∈ Rd1 ×r ,
(1 − )|||L∗ A> + BR∗> |||2F ≤ p−1 |||ΠΦ L∗ A> + BR∗> |||2F ≤ (1 + )|||L∗ A> + BR∗> |||2F .
We need the next result, proved in Section 7.3, to control the number of nonzero entries per row
and column in Ω∗o and Φ.
Lemma 10. If p ≥
56 log d
3 α(d1 ∧d2 ) ,
1
|Φ(i,·) | − pd2 ≤ pd2 ,
2
then with probability at least 1 − 6d−1 , we have
1
3
3
|Φ(·,j) | − pd1 ≤ pd1 , |Ω∗o(i,·) | ≤ αpd2 , |Ω∗o(·,j) | ≤ αpd1 ,
2
2
2
for all i ∈ [d1 ] and j ∈ [d2 ].
25
The next lemma, proved in Section 7.4, can be used to control the projection of small matrices
to Φ.
2 2
log d
Lemma 11. There exists constant c such that for any ∈ (0, 1), if p ≥ c µ2 (dr 1 ∧d
, then with
2)
probability p
at least 1 − O(d−1 ),pfor all matrices Z ∈ Rd1 ×d2 , U ∈ Rd1 ×r and V ∈ Rd2 ×r that satisfy
|||U |||2,∞ ≤ µr/d1 ,|||V |||2,∞ ≤ µr/d2 , we have
p−1 |||ΠΦ (U V > )|||2F ≤ |||U |||2F |||V |||2F + |||U |||F |||V |||F ;
(51)
p−1 |||ΠΦ (Z)V |||2F ≤ 2µr|||ΠΦ (Z)|||2F ;
(52)
p−1 |||U > ΠΦ (Z)|||2F ≤ 2µr|||ΠΦ (Z)|||2F .
(53)
In the remainder of this section, we condition on the events in Lemmas 9, 10 and 11. Now we
are ready to prove Lemma 6.
Proof of Lemma 6. Using shorthand M := U V > , we have
e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ ) .
∇M L(U,
Plugging it back into the left hand side of (21), we obtain
e V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
hh∇M L(U,
V ii
1
= hhΠΦ (M + S − M ∗ − S ∗ ), M − M ∗ + ∆U ∆>
V ii
p
1
1
1
≥ |||ΠΦ (M − M ∗ ) |||2F − |hhΠΦ (S − S ∗ ), M − M ∗ ii| − |hhΠΦ (M + S − M ∗ − S ∗ ), ∆U ∆>
V ii| .
p
p
p
|
{z
} |
{z
} |
{z
}
T1
T2
T3
(54)
Next we derive lower bounds of T1 , upper bounds of T2 and T3 respectively.
>
>
Lower bound of T1 . We observe that M −M ∗ = Uπ∗∗ ∆>
V +∆U Vπ ∗ +∆U ∆V . By triangle inequality,
we have
>
>
|||ΠΦ (M − M ∗ )|||F ≥ |||ΠΦ (Uπ∗ ∆>
V + ∆U Vπ ∗ )|||F − |||ΠΦ (∆U ∆V )|||F .
Note that when c ≥ a − b for a, b ≥ 0, we always have c2 ≥ 21 a2 − b2 . We thus have
T1 ≥
≥
≥
≥
≥
1
1
> 2
> 2
|||ΠΦ (Uπ∗ ∆>
V + ∆U Vπ ∗ )|||F − |||ΠΦ (∆U ∆V )|||F
2p
p
1
1
> 2
> 2
(1 − )|||Uπ∗ ∆>
V + ∆U Vπ ∗ |||F − |||ΠΦ (∆U ∆V )|||F
2
p
1
2
2
2
∗
(1 − )|||M − M ∗ − ∆U ∆>
V |||F − |||∆U |||F |||∆V |||F − 9σ1 |||∆U |||F |||∆V |||F
2
1
1
(1 − )|||M − M ∗ |||2F − (1 − )|||∆U ∆V |||2F − |||∆U |||2F |||∆V |||2F − 9σ1∗ |||∆U |||F |||∆V |||F
4
2
1
∗ 2
(1 − )|||M − M |||F − 2δ 2 − 5σ1∗ δ.
4
where the second step is implied
by Lemma 9, the third p
step follows from (51) in Lemma 11 by
p
∗
noticing that |||∆U |||2,∞ ≤ 3 µrσ1 /d1 and |||∆V |||2,∞ ≤ 3 µrσ1∗ /d1 , which is further implied by
(31).
26
Upper bound of T2 . Since S − S ∗ is supported on Ω∗0 ∪ Ω, we have
pT2 ≤ |hhΠΩ∗o \Ω (S ∗ ), ΠΩ∗o \Ω (M − M ∗ )ii| + |hhΠΩ (S − S ∗ ), ΠΩ (M − M ∗ )ii|.
(55)
For any (i, j) ∈ Ω, we have (S − S ∗ )(i,j) = (M ∗ − M )(i,j) . Therefore, for the second term on the
right hand side, we have
|hhΠΩ (S − S ∗ ), ΠΩ (M − M ∗ )ii| ≤ |||ΠΩ (M − M ∗ )|||2F ≤ 18γpαµrσ1∗ δ,
(56)
where the last inequality follows from Lemma 14 and the fact that |Ω(i,·) | ≤ γpαd2 , |Ω(·,j) | ≤ γpαd1
for all i ∈ [d1 ], j ∈ [d2 ].
We denote the i-th row of ΠΦ (M − M ∗ ) by ui , and we denote the j-th column of ΠΦ (M − M ∗ )
(k)
(k)
by vj . We let ui denote the element of ui that has the k-th largest magnitude. We let vj denote
the element of vj that has the k-th largest magnitude.
For the first term on the right hand side of (55), we first observe that for (i, j) ∈ Ω∗o \ Ω, |(M ∗ +
∗
S − M )(i,j) | is either less than the γpαd2 -th largest element in the i-th row of ΠΦ (M ∗ + S ∗ − M ),
or less than γpαd1 -th largest element in the j-th row of ΠΦ (M ∗ + S ∗ − M ). Based on Lemma
10, ΠΦ (S ∗ ) has at most 3pαd2 /2 nonzero entries per row and at most 3pαd1 /2 nonzero entries per
column. Therefore, we have
n
o
((γ−1.5)pαd2 )
((γ−1.5)pαd1 )
|(M ∗ + S ∗ − M )(i,j) | ≤ max |ui
|, |vj
| .
(57)
In addition, we observe that
|hhΠΩ∗o \Ω (S ∗ ), ΠΩ∗o \Ω (M − M ∗ )ii|
X
≤
|(M ∗ + S ∗ − M )(i,j) ||(M ∗ − M )(i,j) | + |(M ∗ − M )(i,j) |2
(i,j)∈Ω∗o \Ω
≤
β
1+
2
|||ΠΩ∗o (M ∗ − M )|||2F +
≤ (27 + 14β)pαµrσ1∗ δ +
1
2β
1
2β
X
|(M ∗ + S ∗ − M )(i,j) |2 ,
(i,j)∈Ω∗o \Ω
X
|(M ∗ + S ∗ − M )(i,j) |2 ,
(58)
(i,j)∈Ω∗o \Ω
where the second step holds for any β > 0 and the last step follows from Lemma 14 under the size
constraints of Ω∗o shown in Lemma 10. For the second term in (58), using (57), we have
X
X
((γ−1.5)pαd2 ) 2
((γ−1.5)pαd1 ) 2
|(M ∗ + S ∗ − M )(i,j) |2 ≤
|ui
| + |vj
|
(i,j)∈Ω∗o \Ω
=
X
(i,j)∈Ω∗o
X
((γ−1.5)pαd2 ) 2
|ui
|
i∈[d1 ] j∈Ω∗o(i,·)
≤
X
i∈[d1 ]
+
X
X
((γ−1.5)pαd1 ) 2
|vj
|
j∈[d2 ] i∈Ω∗o(·,j)
X 1.5
1.5
3
kui k22 +
kvj k22 ≤
|||ΠΦ (M − M ∗ )|||2F .
γ − 1.5
γ − 1.5
γ − 1.5
(59)
j∈[d2 ]
Moreover, we have
> 2
> 2
|||ΠΦ (M − M ∗ )|||2F ≤ 2|||ΠΦ (Uπ∗ ∆>
V + ∆U Vπ ∗ )|||F + 2|||ΠΦ (∆U ∆V )|||F
> 2
2
2
∗
≤ 2(1 + )p|||Uπ∗ ∆>
V + ∆U Vπ ∗ |||F + 2p|||∆U |||F |||∆V |||F + 18pσ1 |||∆U |||F |||∆V |||F
≤ 4(1 + )p |||Uπ∗ |||2op |||∆V |||2F + |||Vπ∗ |||2op |||∆U |||2F + 2p|||∆U |||2F |||∆V |||2F + 18pσ1∗ |||∆U |||F |||∆V |||F
≤ (4 + 13)pσ1∗ δ + 2pδ 2 ,
(60)
27
where the second step follows from Lemma 9 and inequality (51) in Lemma 11. Putting (55)-(60)
together, we obtain
T2 ≤ (18γ + 14β + 27)αµrσ1∗ δ +
3[(2 + 7)σ1∗ δ + δ 2 ]
.
β(γ − 1.5)
Upper bound of T3 . By Cauchy-Schwarz inequality, we have
pT3 ≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F |||ΠΦ (∆U ∆>
V )|||F
q
≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F p|||∆U |||2F |||∆V |||2F + 9pσ1∗ |||∆U |||F |||∆V |||F
q
≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F pδ 2 + 5pσ1∗ δ.
where we use (51) in Lemma 11 in the second step.
We observe that ΠΦ (M − M ∗ + S − S ∗ ) is supported on Φ \ Ω. Therefore, we have
|||ΠΦ (M − M ∗ + S − S ∗ )|||F ≤ |||ΠΦ∩Ωc ∩Φ∗c (M − M ∗ )|||F + |||ΠΦ∩Ωc ∩Φ∗ (M − M ∗ − S ∗ )|||F
≤ |||ΠΦ (M − M ∗ )|||F + |||ΠΩc ∩Φ∗ (M − M ∗ − S ∗ )|||F
r
3
∗
≤ |||ΠΦ (M − M )|||F +
|||ΠΦ (M − M ∗ )|||F
γ − 1.5
r
q
3
(4 + 13)pσ1∗ δ + 2pδ 2 ,
≤ 1+
γ − 1.5
where the third step follows from (59), and the last step is from (60). Under assumptions γ = 3,
≤ 1/4 and δ ≤ σ1∗ , we have
q
q
q
√
T3 ≤ 3 9σ1∗ δ + 2δ 2 δ 2 + 5σ1∗ δ ≤ 10 σ1∗ δ 3 + 23 σ1∗ δ.
Combining pieces. Under the aforementioned assumptions, putting all pieces together leads to
e V ; S), U V > − Uπ∗ V >∗ + ∆U ∆> ii
hh∇M L(U,
π
V
q
√
3
18
∗ 2
∗
≥ |||M − M |||F − (14β + 81)αµrσ1 δ − 26 +
σ1∗ δ − 10 σ1∗ δ 3 − 2δ 2 .
16
β
6.11
Proof of Lemma 7
Let M := U V > . We find that
e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ ) V,
∇U L(U,
e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ )> U.
∇V L(U,
Conditioning on the event in Lemma 11, since (U, V ) ∈ U × V, inequalities (52) and (53) imply that
e V ; S)|||2F + |||∇V L(U,
e V ; S)|||2F ≤ 12 µrσ1∗ |||ΠΦ (M + S − M ∗ − S ∗ ) |||2F .
|||∇U L(U,
p
28
It remains to bound the term |||ΠΦ (M + S − M ∗ − S ∗ ) |||2F . Let Ω∗o and Ω be the support of ΠΦ (S ∗ )
and S respectively. We observe that
|||ΠΦ (M + S − M ∗ − S ∗ ) |||2F = |||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F + |||ΠΦ∗c ∩Ωc ∩Φ (M − M ∗ ) |||2F
≤ |||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F + |||ΠΦ (M − M ∗ ) |||2F .
In the proof of Lemma 6, it is shown in (59) that
|||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F ≤
3
|||ΠΦ (M − M ∗ )|||2F .
γ − 1.5
Moreover, following (60), we have that
> 2
2
2
∗
|||ΠΦ (M − M ∗ )|||2F ≤ 2(1 + )p|||Uπ∗ ∆>
V + ∆U Vπ ∗ |||F + 2p|||∆U |||F |||∆V |||F + 18pσ1 |||∆U |||F |||∆V |||F
≤ 4(1 + )p|||M − M ∗ |||2F + (6 + 4)p|||∆U |||2F |||∆V |||2F + 18pσ1∗ |||∆U |||F |||∆V |||F
≤ 4(1 + )p|||M − M ∗ |||2F + (6 + 4)pδ 2 + 9pσ1∗ δ.
We thus finish proving our conclusion by combining all pieces and noticing that γ = 3 and ≤ 1/4.
7
Proofs for Technical Lemmas
In this section, we prove several technical lemmas that are used in the proofs of our main theorems.
7.1
Proof of Lemma 1
We observe that
|||A|||op =
sup
sup x> Ay.
x∈Sd1 −1 y∈Sd2 −1
We denote the support of A by Ω. For any x ∈ Rd1 , y ∈ Rd2 and β > 0, we have
X 1
kAk∞ (β −1 x2i + βyj2 )
2
(i,j)∈Ω
(i,j)∈Ω
X X
X X
1
= kAk∞
β −1 x2i +
βyj2
2
x> Ay =
X
xi A(i,j) yj ≤
i
j∈Ω(i,·)
j
i∈Ω(·,j)
1
≤ kAk∞ αd2 β −1 kxk22 + αd1 βkyk22 .
2
It is thus implied that |||A|||op ≤ 21 α(β −1 d2 + βd1 )kAk∞ . Choosing β =
7.2
p
d2 /d1 completes the proof.
Proof of Lemma 9
We define a subspace K ⊆ Rd1 ×d2 as
n
o
K := X X = L∗ A> + BR∗> for some A ∈ Rd2 ×r , B ∈ Rd1 ×r .
29
Let ΠK be Euclidean projection onto K. Then according to Theorem 4.1 in [6], under our assumptions, for all matrices X ∈ Rd1 ×d2 , inequality
p−1 ||| (ΠK ΠΦ ΠK − pΠK ) X|||F ≤ |||X|||F
(61)
holds with probability at least 1 − 2d−3 .
In our setting, by restricting X = L∗ A> + BR∗> , we have ΠK X = X. Therefore, (61) implies
that
|||ΠK ΠΦ X − pX|||F ≤ p|||X|||F .
For |||ΠΦ X|||2F , we have
|||ΠΦ X|||2F = hhΠΦ X, ΠΦ Xii = hhΠΦ X, Xii
= hhΠK ΠΦ X, Xii ≤ |||ΠK ΠΦ X|||F |||X|||F ≤ p(1 + )|||X|||2F .
On the other hand, we have
|||ΠΦ X|||2F = hhΠK ΠΦ X, Xii = hhΠK ΠΦ X − pX + pX, Xii
= p|||X|||2F − hhX, −ΠK ΠΦ X + pXii
≥ p|||X|||2F − |||X|||F |||ΠK ΠΦ X − pX|||F ≥ p(1 − )|||X|||2F .
Combining the above two inequalities, we complete the proof.
7.3
Proof of Lemma 10
We observe that |Φ(i,·) | is a summation of d2 i.i.d. binary random variables with mean p and variance
p(1 − p). By Bernstein’s inequality, for any i ∈ [d1 ],
!
− 21 (pd2 /2)2
1
3
Pr |Φ(i,·) | − pd2 ≥ pd2 ≤ 2 exp −
≤
2
exp
−
pd
2 .
2
28
d2 p(1 − p) + 13 (pd2 /2)
By probabilistic union bound, we have
"
Pr sup |Φ(i,·) | − pd2
i∈[d1 ]
#
1
3
≥ pd2 ≤ 2d1 exp − pd2 ≤ 2d−1 ,
2
28
log d
where the last inequality holds by assuming p ≥ 56
3 d2 .
The term |Ω∗o(i,·) | is a summation of at most αd2 i.i.d. binary random variables with mean p and
variance p(1 − p). Again, applying Bernstein’s inequality leads to
h
i 1
3
∗
∗
Pr |Ωo(i,·) | − E |Ωo(i,·) | ≥ pαd2 ≤ exp − pαd2 .
2
28
Accordingly, by the assumption p ≥
"
56 log d
3 αd2 ,
we obtain
#
3
1
∗
Pr sup |Ωo(i,·) | − pk ≥ pk ≤ d1 exp − pαd2 ≤ d−1 .
2
28
i∈[d1 ]
The proofs for |Φ(·,j) | and |Ω∗o(·,j) | follow the same idea.
30
7.4
Proof of Lemma 11
d
d1 ×d2 , we
According to Lemma 3.2 in [8], under condition p ≥ c1 µd1log
∧d2 , for any fixed matrix A ∈ R
have
s
d log d
|||A − p−1 ΠΦ A|||op ≤ c2
kAk∞ ,
p
holds with probability at least 1 − O(d−3 ). Letting A be all-ones matrix, then we have that for all
u ∈ Rd1 , v ∈ Rd2 ,
X
p
ui vj ≤ pkuk1 kvk1 + c2 pd log dkuk2 kvk2 .
(i,j)∈Φ
We find that
|||ΠΦ (U V > )|||2F ≤
X
kU(i,·) k22 kV(j,·) k22
(i,j)∈Φ
sX
sX
p
4
≤ p|||U |||F |||V |||F + c2 pd log d
kU(i,·) k2
kV(j,·) k42
2
2
i∈[d1 ]
j∈[d2 ]
p
≤ p|||U |||2F |||V |||2F + c2 pd log d|||U |||F |||V |||F |||U |||2,∞ |||V |||2,∞
s
pµ2 r2 d log d
≤ p|||U |||2F |||V |||2F + c2
|||U |||F |||V |||F .
d1 d2
By the assumption p &
µ2 r2 log d
,
2 (d1 ∧d2 )
we finish proving (51).
d
According to the proof of Lemma 10, if p ≥ c dlog
, with probability at least 1 − O(d−1 ), we
1 ∧d2
3
3
have |Φ(i,·) | ≤ 2 pd2 and |Φ(·,j) | ≤ 2 pd1 for all i ∈ [d1 ] and j ∈ [d2 ]. Conditioning on this event, we
have
X X
|||ΠΦ (Z)V |||2F =
h(ΠΦ (Z))(i,·) , H(·,k) i2
i∈[d1 ] k∈[r]
≤
X X
k(ΠΦ (Z))(i,·) k22
2
V(j,k)
j∈Ω(i,·)
i∈[d1 ] k∈[r]
= |||ΠΦ Z|||2F
X
X
kV(i,·) k22
j∈Ω(i,·)
3
≤ |||ΠΦ Z|||2F pd2 · |||V |||22,∞ ≤ 2µrp|||ΠΦ Z|||2F .
2
We thus finish proving (52). Inequality (53) can be proved in the same way.
7.5
Proof of Lemma 8
Recall that we let F := [U ; V ] and Fπ∗ := [U ∗ ; V ∗ ]Q for some matrix Q ∈ Qr , which minimizes the
following function
|||F − [U ∗ ; V ∗ ]Q|||2F .
(62)
Let F ∗ := [U ∗ ; V ∗ ]. Expanding the above term, we find that Q is the maximizer of hhF, F ∗ Qii =
Tr(F > F ∗ Q). Suppose F > F ∗ has SVD with form Q1 ΛQ>
2 for Q1 , Q2 ∈ Qr . When the minimum
31
diagonal term of Λ is positive, we conclude that the minimizer of (62) is unique and Q = Q2 Q>
1.
To prove this argument, we note that
X
Λ(i,i) hpi , qi i,
Tr(F > F ∗ Q) =
i∈[r]
where
pi is the i-th column of Q1 and qi is the i-th column of Q> Q2 . Hence, Tr(F > F ∗ Q) ≤
P
i∈[r] Λ(i,i) and the equality holds if and only if pi = qi for all i ∈ [r] since every Λ(i,i) > 0. We
have Q1 = Q> Q2 and thus finish proving the argument.
√
Under our assumption |||F − Fπ∗ |||op < 2σr∗ , for any nonzero vector u ∈ Rr , we have
p
kF > Fπ∗ uk2 ≥ kFπ>∗ Fπ∗ uk2 − k(Fπ∗ − F )> Fπ∗ uk2 ≥ ( 2σr∗ − |||Fπ∗ − F |||op )|||Fπ∗ u|||F > 0.
In √
the second step, we use the fact that the singular values of Fπ∗ are equal to the diagonal terms
of 2Σ∗1/2 . Hence, F > Fπ∗ has full rank. Furthermore, it implies that F > F ∗ has full rank and only
contains positive singular values.
Proceeding with the proved argument, we have
>
>
F > Fπ∗ = Q1 ΛQ>
2 Q2 Q1 = Q1 ΛQ1 ,
which implies that F > Fπ∗ is symmetric. Accordingly, we have (F − Fπ∗ )> Fπ∗ is also symmetric.
Acknowledgment
Y. Chen acknowledges support from the School of Operations Research and Information Engineering,
Cornell University.
References
[1]
Animashree Anandkumar, Rong Ge, Daniel Hsu, Sham M. Kakade, and Matus Telgarsky.
“Tensor decompositions for learning latent variable models”. In The Journal of Machine Learning Research 15.1 (2014), pp. 2773–2832.
[2]
Sivaraman Balakrishnan, Martin J. Wainwright, and Bin Yu. “Statistical guarantees for the
EM algorithm: From population to sample-based analysis”. In arXiv preprint arXiv:1408.2156
(2014).
[3]
Srinadh Bhojanapalli, Prateek Jain, and Sujay Sanghavi. “Tighter low-rank approximation
via sampling the leveraged element”. In Proceedings of the Twenty-Sixth Annual ACM-SIAM
Symposium on Discrete Algorithms. SIAM. 2015, pp. 902–920.
[4]
Srinadh Bhojanapalli, Anastasios Kyrillidis, and Sujay Sanghavi. “Dropping convexity for
faster semi-definite optimization”. In arXiv preprint arXiv:1509.03917 (2015).
[5]
Emmanuel J. Candès, Xiaodong Li, and Mahdi Soltanolkotabi. “Phase retrieval via Wirtinger
flow: Theory and algorithms”. In IEEE Transactions on Information Theory 61.4 (2015),
pp. 1985–2007.
[6]
Emmanuel J. Candès and Benjamin Recht. “Exact matrix completion via convex optimization”. In Foundations of Computational mathematics 9.6 (2009), pp. 717–772.
32
[7]
Emmanuel J. Candès and Terence Tao. “The power of convex relaxation: Near-optimal matrix
completion”. In IEEE Transactions on Information Theory 56.5 (2010), pp. 2053–2080.
[8]
Emmanuel J. Candès, Xiaodong Li, Yi Ma, and John Wright. “Robust principal component
analysis?” In Journal of the ACM (JACM) 58.3 (2011), p. 11.
[9]
Venkat Chandrasekaran, Sujay Sanghavi, Pablo A. Parrilo, and Alan S. Willsky. “Ranksparsity incoherence for matrix decomposition”. In SIAM Journal on Optimization 21.2 (2011),
pp. 572–596.
[10]
Yudong Chen. “Incoherence-Optimal Matrix Completion”. In IEEE Transactions on Information Theory 61.5 (2015), pp. 2909–2923.
[11]
Yudong Chen and Martin J. Wainwright. “Fast low-rank estimation by projected gradient
descent: General statistical and algorithmic guarantees”. In arXiv preprint arXiv:1509.03025
(2015).
[12]
Yudong Chen, Ali Jalali, Sujay Sanghavi, and Constantine Caramanis. “Low-rank Matrix Recovery from Errors and Erasures”. In IEEE Transactions on Information Theory 59.7 (2013),
pp. 4324–4337.
[13]
Yuxin Chen and Emmanuel J. Candès. “Solving random quadratic systems of equations is
nearly as easy as solving linear systems”. In Advances in Neural Information Processing Systems. 2015, pp. 739–747.
[14]
Yeshwanth Cherapanamjeri, Kartik Gupta, and Prateek Jain. “Nearly-optimal Robust Matrix
Completion”. In arXiv preprint arXiv:1606.07315 (2016).
[15]
Kenneth L. Clarkson and David P. Woodruff. “Low rank approximation and regression in
input sparsity time”. In Proceedings of the forty-fifth annual ACM symposium on Theory of
computing. ACM. 2013, pp. 81–90.
[16]
Alan Frieze, Ravi Kannan, and Santosh Vempala. “Fast Monte-Carlo algorithms for finding
low-rank approximations”. In Journal of the ACM (JACM) 51.6 (2004), pp. 1025–1041.
[17]
Quanquan Gu, Zhaoran Wang, and Han Liu. “Low-Rank and Sparse Structure Pursuit via
Alternating Minimization”. In Proceedings of the 19th International Conference on Artificial
Intelligence and Statistics. 2016, pp. 600–609.
[18]
Moritz Hardt. “Understanding alternating minimization for matrix completion”. In 2014 IEEE
55th Annual Symposium on Foundations of Computer Science (FOCS). IEEE. 2014, pp. 651–
660.
[19]
Daniel Hsu, Sham M. Kakade, and Tong Zhang. “Robust matrix decomposition with sparse
corruptions”. In IEEE Transactions on Information Theory 57.11 (2011), pp. 7221–7234.
[20]
Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi. “Low-rank matrix completion using
alternating minimization”. In Proceedings of the forty-fifth annual ACM symposium on Theory
of computing. ACM. 2013, pp. 665–674.
[21]
Zhouchen Lin, Minming Chen, and Yi Ma. “The Augmented Lagrange Multiplier Method
for Exact Recovery of Corrupted Low-Rank Matrices”. In Arxiv preprint arxiv:1009.5055v3
(2013).
33
[22]
Praneeth Netrapalli, UN Niranjan, Sujay Sanghavi, Animashree Anandkumar, and Prateek
Jain. “Non-convex robust PCA”. In Advances in Neural Information Processing Systems. 2014,
pp. 1107–1115.
[23]
Yousef Saad. Numerical Methods for Large Eigenvalue Problems: Revised Edition. Vol. 66.
Siam, 2011.
[24]
Ju Sun, Qing Qu, and John Wright. “When Are Nonconvex Problems Not Scary?” In arXiv
preprint arXiv:1510.06096 (2015).
[25]
Ruoyu Sun and Zhi-Quan Luo. “Guaranteed matrix completion via nonconvex factorization”.
In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS). IEEE.
2015, pp. 270–289.
[26]
Stephen Tu, Ross Boczar, Mahdi Soltanolkotabi, and Benjamin Recht. “Low-rank solutions
of linear matrix equations via procrustes flow”. In arXiv preprint arXiv:1507.03566 (2015).
[27]
Zhaoran Wang, Quanquan Gu, Yang Ning, and Han Liu. “High Dimensional EM Algorithm:
Statistical Optimization and Asymptotic Normality”. In Advances in Neural Information Processing Systems. 2015, pp. 2512–2520.
[28]
Huan Xu, Constantine Caramanis, and Sujay Sanghavi. “Robust PCA via Outlier Pursuit”.
In IEEE Transactions on Information Theory 58.5 (2012), pp. 3047–3064. issn: 0018-9448.
[29]
Xinyang Yi and Constantine Caramanis. “Regularized EM Algorithms: A Unified Framework
and Statistical Guarantees”. In Advances in Neural Information Processing Systems. 2015,
pp. 1567–1575.
[30]
Huishuai Zhang, Yuejie Chi, and Yingbin Liang. “Provable Non-convex Phase Retrieval with
Outliers: Median Truncated Wirtinger Flow”. In arXiv preprint arXiv:1603.03805 (2016).
[31]
Tuo Zhao, Zhaoran Wang, and Han Liu. “A Nonconvex Optimization Framework for Low Rank
Matrix Estimation”. In Advances in Neural Information Processing Systems. 2015, pp. 559–
567.
[32]
Qinqing Zheng and John Lafferty. “A convergent gradient descent algorithm for rank minimization and semidefinite programming from random linear measurements”. In Advances in
Neural Information Processing Systems. 2015, pp. 109–117.
34
Appendices
A
Supporting Lemmas
In this section, we provide several technical lemmas used for proving our main results.
Lemma 12. For any (U ∗ , V ∗ ) ∈ E(M ∗ ), U ∈ Rd1 ×r and V ∈ Rd2 ×r , we have
p
|||U V > − U ∗ V ∗> |||F ≤ σ1∗ (|||∆V |||F + |||∆U |||F ) + |||∆U |||F |||∆V |||F ,
where ∆U := U − U ∗ , ∆V := V − V ∗ .
∗> + ∆ ∆> . Hence,
Proof. We observe that U V > − U ∗ V ∗> = U ∗ ∆>
U V
V + ∆U V
∗>
|||U V > − U ∗ V ∗> |||F ≤ |||U ∗ ∆>
|||F + |||∆U ∆>
V |||F + |||∆U V
V |||F
≤ |||U ∗ |||op |||∆V |||F + |||V ∗ |||op |||∆U |||F + |||∆U |||F |||∆V |||F .
Furthermore, assuming (U, V ) ∈ U × V, where U and V satisfy the conditions in (19), we have
the next result.
Lemma 13. For any (i, j) ∈ [d1 ] × [d2 ], we have
r
r
µrσ1∗
µrσ1∗
>
∗ ∗>
|(U V − U V )(i,j) | ≤ 3
k∆V (j,·) k2 + 3
k∆U (i,·) k2
d1
d2
(63)
Proof. We observe that
∗
∗
|(U V > − M ∗ )(i,j) | ≤ |hU(i,·)
, ∆V (j,·) i| + |hV(j,·)
, ∆U (i,·) i| + |h∆U (i,·) , ∆V (j,·) i|
r
r
µrσ1∗
µrσ1∗
1
1
≤
k∆V (j,·) k2 +
k∆U (i,·) k2 + |||∆U |||2,∞ k∆V (j,·) k2 + |||∆V |||2,∞ k∆U (i,·) k2 .
d1
d2
2
2
By noticing that
r
∗
|||∆U |||2,∞ ≤ |||U |||2,∞ + |||U |||2,∞ ≤ 3
r
µrσ1∗
µrσ1∗
∗
, |||∆V |||2,∞ ≤ |||V |||2,∞ + |||V |||2,∞ ≤ 3
,
d1
d2
we complete the proof.
Lemma 13 can be used to prove the following result.
Lemma 14. For any α ∈ [0, 1], suppose Ω ⊆ [d1 ] × [d2 ] satisfies |Ω(i,·) | ≤ αd2 for all i ∈ [d1 ] and
|Ω(·,j) | ≤ αd1 for all j ∈ [d2 ]. Then we have
|||ΠΩ (U V > − U ∗ V ∗> )|||2F ≤ 18αµrσ1∗ (|||∆V |||2F + |||∆U |||2F ).
35
Proof. Using Lemma 13 for bounding each entry of U V > − U ∗ V ∗> , we have that
X
|(U V > − U ∗ V ∗> )(i,j) |2
|||ΠΩ (U V > − U ∗ V ∗> )|||2F ≤
(i,j)∈Ω
X 18µrσ ∗
18µrσ1∗
1
≤
k∆V (j,·) k22 +
k∆U (i,·) k22
d1
d2
(i,j)∈Ω
X X 18µrσ ∗
X X 18µrσ ∗
1
1
≤
k∆V (j,·) k22 +
k∆U (i,·) k22
d1
d2
j
≤
i
i∈Ω(·,j)
18αµrσ1∗ (|||∆V |||2F
j∈Ω(i,·)
2
+ |||∆U |||F ).
Denote the i-th largest singular value of matrix M by σi (M ).
Lemma 15 (Lemma 5.14 in [26]). Let M1 , M2 ∈ Rd1 ×d2 be two rank r matrices. Suppose they have
SVDs M1 = L1 Σ1 R1> and M2 = L2 Σ2 R2> . Suppose |||M1 − M2 |||op ≤ 21 σr (M1 ). Then we have
1/2
1/2
1/2
1/2
d2 (L2 Σ2 , R2 Σ2 ; L1 Σ1 , R1 Σ1 ) ≤ √
B
2 |||M2 − M1 |||2F
.
2 − 1 σr (M1 )
Parameter Settings for FB Separation Experiments
We approximate the FB separation problem by the RPCA framework with r = 10, α = 0.2, µ = 10.
Our algorithmic parameters are set as γ = 1, η = 1/(2σ̂1∗ ), where σ̂1∗ is an estimate of σ1∗ obtained
from the initial SVD. The parameters of AltProj
are kept as provided in the default setting. For
√
IALM, we use the tradeoff paramter λ = 1/ d1 , where d1 is the number of pixels in each frame
(the number of rows in Y ).
Note that both IALM and AltProj use the stopping criterion
|||Y − Mt − St |||F /|||Y |||F ≤ 10−3 .
Our algorithm for the partial observation setting never explicitly forms the d1 -by-d2 matrix Mt =
Ut Vt> , which is favored in large scale problems, but also renders the above criterion inapplicable.
Instead, we use the following stopping criterion
|||Ut+1 − Ut |||2F + |||Vt+1 − Vt |||2F
≤ 4 × 10−4 .
|||Ut |||2F + |||Vt |||2F
This rule checks whether the iterates corresponding to low-rank factors become stable. In fact, our
stopping criterion seems more natural and practical because in most real applications, matrix Y
cannot be strictly decomposed into low-rank M and sparse S that satisfy Y = M + S. Instead of
forcing M + S to be close to Y , our rule relies on seeking a robust subspace that captures the most
variance of Y .
36
| 10math.ST
|
Square-free class sizes in products of groups
arXiv:1703.08363v1 [math.GR] 24 Mar 2017
M. J. Felipe · A. Martı́nez-Pastor · V. M. Ortiz-Sotomayor
∗
Abstract
We obtain some structural properties of a factorised group G = AB, given that the
conjugacy class sizes of certain elements in A ∪ B are not divisible by p2 , for some
prime p. The case when G = AB is a mutually permutable product is especially
considered.
Keywords Finite groups · Soluble groups · Products of subgroups · Conjugacy
classes
2010 MSC 20D10 · 20D40 · 20E45
1
Introduction
All groups considered thorogouth this paper are finite. Over the last years, many
authors have investigated the influence of conjugacy class sizes on the structure of finite
groups. In the meantime, numerous studies in the framework of group theory have
focused in factorised groups. In this setting, a central question is how the structure of the
factors affects the structure of the whole group, in particular when they are connected by
certain permutability properties. The purpose of this paper is to show new achievements
which combine both current perspectives in finite groups. More precisely, our aim is to
get some information about a factorised group, provided that the conjugacy class sizes
of some elements of its factors are square-free.
The earlier starting point of our investigation can be traced back to the paper of
Chillag and Herzog ([5]), where the structure of a group in which all elements have
square-free conjugacy class sizes was first analysed. Next, in [6], Cossey and Wang
localised one of the main theorems in [5] for a fixed prime p, that is, they considered
conjugacy class sizes not divisible by p2 , for certain prime p. Later on, this study was
∗
The first author is supported by Proyecto Prometeo II/2015/011, Generalitat Valenciana (Spain),
and the second author is supported by Proyecto MTM2014-54707-C3-1-P, Ministerio de Economı́a, Industria y Competitividad (Spain). The results in this paper are part of the third author’s Ph.D. thesis,
and he acknowledges the predoctoral grant ACIF/2016/170, Generalitat Valenciana (Spain). The authors wish to thank John Cossey for helpful conversations during his last visit to Valencia.
Instituto Universitario de Matemática Pura y Aplicada (IUMPA), Universitat Politècnica de València,
Camino de Vera, s/n, 46022, Valencia, Spain.
B: mfelipe@mat.upv.es, anamarti@mat.upv.es, vicorso@doctor.upv.es
1
improved by Li in [12], and by Liu, Wang, and Wei in [13], by replacing conditions
on all conjugacy classes by those referring only to conjugacy classes of either p-regular
elements or prime power order elements, using the classification theorem of finite simple
groups (CFSG). These authors also first obtained some preliminary results in factorised
groups. This research was extended in 2012 by Ballester-Bolinches, Cossey and Li in [2],
through mutually permutable products. More recently, in 2014, Qian and Wang ([14])
have gone a step further by considering just conjugacy class sizes of p-regular elements
of prime power order (although not in factorised groups).
In the context of factorised groups, and aiming to obtain criteria for products of
supersoluble subgroups to be supersoluble, several authors have considered products in
which certain subgroups of the factors permute (see [3] for a detailed account). In this
scene, we are interested in mutually permutable products, factorised groups G = AB
such that the subgroups A and B are mutually permutable, i.e., A permutes with every
subgroup of B and B permutes with every subgroup of A (see also [4]). Obviously, if A
and B are normal in G, then they are mutually permutable.
We recall that, for a group G, the set xG = {g −1 xg : g ∈ G} is the conjugacy class
of the element x ∈ G, and xG denotes the conjugacy class size of x. If p is a prime
number, we say that x ∈ G is a p-regular element if its order is not divisible by p, and
that it is a p-element if its order is a power of p. Moreover, if n is an integer, let np
denote the highest power of p dividing n. The mth group of order n in the SmallGroups
library [8] of GAP will be identified by n#m. The remainder notation is standard and
is taken mainly from [7]. We also refer to this book for details about classes of groups.
In this paper, motivated by the above development, at first we focus on the case of
p-groups, extending for factorised groups the well-known Knoche’s theorem (see [11]).
Theorem A. Let p be a prime number and let P = AB be a p-group such that p2 does
not divide xP for all x ∈ A ∪ B. Then P ′ 6 Φ(P ) 6 Z(P ), P ′ is elementary abelian
and |P ′ | ≤ p2 .
Our next goal in the paper is to prove the following theorem, regarding mutually
permutable products.
Theorem B. Let G = AB be the mutually permutable product of the subgroups A and
B, and let p be a prime such that gcd(p − 1, |G|) = 1. If p2 does not divide xG for any
p-regular element x ∈ A ∪ B of prime power order, then:
(1) G is soluble.
(2) G is p-nilpotent.
(3) The Sylow p-subgroups of G/ Op (G) are elementary abelian.
In the particular case when G = A = B, we recover [14, Theorem A] (see Section 3,
Corollary 3.5). We remark that both results use the CFSG.
Moreover, in relation to the third assertion, we have found a gap in one of the
statements in [6, Theorem 1], as it is reported in Remark 3.7 (a).
On the other hand, we point out that it is possible to find examples of groups factorised as a product of two (mutually permutable) subgroups which satisfy the hypothe2
ses of Theorem B for some fixed prime p and, however, there exist elements x ∈ A ∪ B
such that p2 divides either xA or xB (see Remark 3.7 (b)).
The next theorem generalises the last assertion of [2, Theorem 1.3] regarding p-soluble
groups, by considering only prime power order elements:
Theorem C. Let G = AB be the mutually permutable product of the subgroups A and
B, and let p be a prime. Suppose that for every prime power order p-regular element
x ∈ A ∪ B, xG is not divisible by p2 . If G is p-soluble, then G is p-supersoluble.
In the line of [5, Theorem 1] and [6, Theorem 2], if we consider all prime numbers, then
we obtain some information about the structure of the derived subgroup of a factorised
group G.
Theorem D. Let G = AB be the product of the subgroups A and B, and assume that G
is supersoluble. Suppose that every prime power order element x ∈ A ∪ B has square-free
conjugacy class size. Then:
(1) G′ is abelian.
(2) The Sylow subgroups of G′ are elementary abelian.
(3) F(G)′ has Sylow p-subgroups of order at most p2 , for every prime p.
If we limit our conditions only to p-regular elements, as a consequence of Theorems
B and C, we obtain the following result which extends [2, Corollary 1.5] (see Corollary
4.3) for prime power order elements, and also a theorem of [12], for products of groups.
Theorem E. Let G = AB be the mutually permutable product of the subgroups A and B.
Suppose that for every prime p and every prime power order p-regular element x ∈ A∪B,
xG is not divisible by p2 . Then G is supersoluble, and G/ F(G) has elementary abelian
Sylow subgroups.
We remark that the first statement in Theorem D is not further true under the weaker
hypotheses of the above theorem, even for arbitrary groups not necessarily factorised,
as pointed out in [14]. Indeed, as a result of Theorem E, the supersolubility condition
in Theorem D can be exchanged by the mutual permutability of the factors.
On the other hand, with the stronger assumption that all p-regular elements of the
factors (not only those of prime power order) have conjugacy class sizes not divisible
by p2 , we get extra information about the orders of the Sylow p-subgroups of G/F (G),
extending partially [6, Theorem 2].
Theorem F. Let G = AB be the mutually permutable product of the subgroups A and
B. Suppose that for every prime p and every p-regular element x ∈ A ∪ B, xG is not
divisible by p2 . Then the order of a Sylow p-subgroup of G/ F(G) is at most p2 .
In summary, when dealing with mutually permutable products, the next corollary
follows directly from the above theorems.
Corollary G. Let G = AB be the mutually permutable product of the subgroups A and
B. Suppose that xG is square-free for each element x ∈ A ∪ B. Then G is supersoluble,
3
and both G/ F(G) and G′ have elementary abelian Sylow subgroups. Moreover, G′ is
abelian, and both groups G/ F(G) and F(G)′ have Sylow p-subgroups of order at most
p2 , for each prime p.
In Section 3 we prove Theorems A, B and C, which refer to class sizes not divisible
by p2 , for a fixed prime p. Theorems E, D and F, which consider square-free conjugacy
class sizes (for all primes), are proved in Section 4. In both cases we will illustrate the
scope of the results presented with some examples.
2
Preliminary results
We use the following elementary properties frequently, sometimes without further
reference.
Lemma 2.1. Let N be a normal subgroup of a group G, and let p be a prime. Then:
(a) xN divides xG , for any x ∈ N .
(b) (xN )G/N divides xG , for any x ∈ G.
(c) If xN is a p-element of G/N , then there exists a p-element x1 ∈ G such that
xN = x1 N .
We need specifically the following fact about Hall subgroups of factorised groups. It
is a reformulation of [1, 1.3.2] which is convenient for our purposes. We recall that a
group is a Dπ -group, for a set of primes π, if every π-subgroup is contained in a Hall
π-subgroup, and any two Hall π-subgroups are conjugate. In particular, all π-separable
groups are Dπ -groups for any set of primes π, and all groups are Dπ -groups when π
consists of a single prime.
Lemma 2.2. Let G = AB be the product of the subgroups A and B. Asume that A, B,
and G are Dπ -groups for a set of primes π. Then there exists a Hall π-subgroup H of G
such that H = (H ∩ A)(H ∩ B), with H ∩ A a Hall π-subgroup of A and H ∩ B a Hall
π-subgroup of B.
We collect here some results on mutually permutable products, which will be very
useful along the paper.
Lemma 2.3. Let the group G = AB be the product of the mutually permutable subgroups
A and B. Then we have:
(a) ([3, 4.1.10]) G/N is the product of the mutually permutable subgroups AN/N and
BN/N .
(b) ([3, 4.1.21]) If U is a subgroup of G, then (U ∩ A)(U ∩ B) is a subgroup, and
U ∩ A and U ∩ B are mutually permutable. Moreover, if N is a normal subgroup of G,
then (N ∩ A)(N ∩ B) is also normal in G.
Theorem 2.4. ([4, Theorem 1]) Let the non-trivial group G = AB be the product of the
mutually permutable subgroups A and B. Then AG BG is not trivial.
4
The following lemma will be essential in the proofs of our theorems.
Lemma 2.5. ([2, Lemma 2.4]) Let p be a prime, and Q be a p′ -group acting faithfully
on an elementary abelian p-group N with |[x, N ]| = p, for all 1 6= x ∈ Q. Then Q is
cyclic.
The next result is the first assertion of Theorem A in [14], which uses the CFSG.
Theorem 2.6. Let G be a group. For a fixed prime p with gcd(p − 1, |G|) = 1, if p2
does not divide xG for any p-regular element x ∈ G of prime power order, then G is
soluble.
Finally, the later lemma, which is a nice result due to Isaacs, will be very useful in
the proof of Theorem D.
Lemma 2.7. ([10, 4.17]) Let K be an abelian normal subgroup of a finite group G, and
let x ∈ G be non-central. Then |CG (x)| < |CG (y)|, where y = [k, x] and k ∈ K is
arbitrary.
3
Class sizes not divisible by p2 , for a fixed prime p
The well-known Knoche’s theorem (see [11]) asserts that if P is a p-group, p a prime,
then the conjugacy class sizes of P are square-free if, and only if, |P ′ | ≤ p. We begin
this section by proving Theorem A, which clearly extends it for factorised groups.
Proof of Theorem A. Since |P : CP (x)| ≤ p for each x ∈ A ∪ B, it follows
Φ(P ) 6 CP (x). Therefore, Φ(P ) commutes with both A and B, so P ′ 6 Φ(P ) 6 Z(P ).
Hence P/ Z(P ) is elementary abelian, and xp ∈ Z(P ) for all x ∈ P . Since P ′ 6 Z(P ) and
[x, y]p = [xp , y] = 1 (see [7, A - 7.3(a)]) for any x, y ∈ P , it follows that P ′ is elementary
abelian. Now it remains to prove that |P ′ | ≤ p2 .
Let [x, y] be a generator of P ′ . Since P ′ 6 Z(P ) and y = ya yb with ya ∈ A and
yb ∈ B, then [x, y] = [x, ya yb ] = [x, yb ][x, ya ]yb = [x, yb ][x, ya ] ∈ [P, B][P, A] . Thus
P ′ = [P, B][P, A]. Clearly, [P, B] is elementary abelian. Suppose [P, B] 6= 1, and let
1 6= [x, z] and 1 6= [x′ , z ′ ] be two generators of [P, B], with x, x′ ∈ P and z, z ′ ∈ B. We
distinguish three cases in order to prove that h[x, z]i = h[x′ , z ′ ]i:
i) Suppose first z, z ′ ∈ B \ Z(B). Let b ∈ B \ (CP (z) ∪ CP (z ′ )). Since |P : CP (z)| = p
then P = CP (z)hxi. Moreover, b ∈
/ CP (z) implies that 1 6= [b, z] = [xi t, z] = [xi , z] =
i
i
[x, z] , where b = tx with t ∈ CP (z). On the other hand, P = CP (b)hzi so z ′ =
z j k, with k ∈ CP (b). Hence 1 6= [b, z ′ ] = [b, z j k] = [b, z]j = [x, z]i+j . Finally, as
b ∈ P = CP (z ′ )hx′ i, then b = (x′ )m s with s ∈ CP (z ′ ). Therefore 1 6= [x, z]i+j =
[b, z ′ ] = [(x′ )m s, z ′ ] = [x′ , z ′ ]m , and recall that [x, z] and [x′ , z ′ ] both have order p. Thus,
h[x, z]i = h[x′ , z ′ ]i.
ii) Now suppose z, z ′ ∈ Z(B). Then B 6 CP (z) ∩ CP (z ′ ). There exists w ∈ P \
(CP (z) ∪ CP (z ′ )). Therefore, w = wa wb with wa ∈ A and wb ∈ B 6 CP (z) ∩ CP (z ′ ), so
wa ∈ A \ (CP (z) ∪ CP (z ′ )). Arguing analogously as in case i) with wa instead of b, we
conclude that h[x, z]i = h[x′ , z ′ ]i too.
5
iii) Finally, suppose z ∈ B \ Z(B) but z ′ ∈ Z(B). Let z ′′ = zz ′ ∈ B \ Z(B). Therefore,
we have [x′ , z ′′ ] = [x′ , z ′ ][x′ , z]. If [x′ , z ′′ ] = 1 then 1 6= [x′ , z ′ ]−1 = [x′ , z], and applying
case i) to both [x, z] and [x′ , z] we conclude that they generate the same cyclic group of
order p. On the other hand, if [x′ , z ′′ ] 6= 1 and [x′ , z] = 1, then we apply again the first
case. Finally, if both [x′ , z ′′ ] 6= 1 6= [x′ , z] then they generate the same cyclic group by
case i) again. Thus 1 6= h[x′ , z ′ ]i = h[x′ , z ′′ ][x′ , z]−1 i 6 h[x′ , z ′′ ]i. Since the last one has
order p, it follows h[x′ , z ′ ]i = h[x′ , z ′′ ]i. So we have h[x′ , z ′ ]i = h[x′ , z ′′ ]i, which is equal to
h[x, z]i by i) again.
In conclusion, if [P, B] 6= 1, then it has order p. Analogously with [P, A]. Hence
|P ′ | = |[P, B][P, A]| ≤ p2 and this establishes the result.
Example 3.1. The converse of the above result is not true in general, in contrast
to Knoche’s theorem. Let P be the group of the Small groups library of GAP with
identification number 32#35, which is the product of a cyclic group of order 4 and a
quaternion group of order 8. Then its derived group is P ′ = C2 × C2 , and P ′ = Φ(P ) =
Z(P ). Nevertheless, there are elements in the quaternion group with conjugacy class size
equal to 4.
Example 3.2. Let G = Q8 × D8 be the direct product of a quaternion group and a
dihedral group of order 8. Then every element contained in each factor has conjugacy
class size equal to either 1 or 2, so Theorem A applies. However, there are elements in
G with conjugacy class size divisible by 4, and Knoche’s result cannot be applied.
Now we proceed with a key result in the sequel.
Proposition 3.3. Let G be a group, and let p be a prime. Suppose that N is an abelian
minimal normal subgroup of G, which is a p′ -group. Then:
(1) If G is p-nilpotent, and xG is not divisible by p2 for every element x ∈ N , then
|Op (G/N Op (G))| ≤ p.
(2) If K/N Op (G) = Op (G/N Op (G)) has order p, and P is a Sylow p-subgroup of
K, then CN (P ) = 1.
Proof. (1) Suppose that the result is not true, and let G be a counterexample
of minimal order. Since the hypotheses are inherited by quotients, we may assume by
standard arguments that Op (G) = 1, and then also Φ(G) = 1. Since N is abelian, by a
Gaschütz’s result ([9, 4.4]) N is complemented, that is, G = N S with N ∩ S = 1. We
may assume that G/N is not a p′ -group, so Op (G/N ) ∼
= Op (S) 6= 1 by the minimality
of G. Let P be a Sylow p-subgroup of S (so P is a Sylow p-subgroup of G). Hence
it follows Op (S) ∩ Z(P ) 6= 1. Let Z be a minimal normal subgroup of Op (S) ∩ Z(P ).
Since S is p-nilpotent, we get S = P L, where L is normal in S and P ∩ L = 1. It
follows that [L, Z] 6 [L, Op (S)] 6 L ∩ Op (S) = 1, so Z 6 Z(S). Note that CN (Z) is
normal in G = SN . Consequently, by the minimality of N , we have either CN (Z) = 1
or CN (Z) = N . If CN (Z) = N , then Z 6 Z(G), which implies that Z 6 Op (G) = 1, a
contradiction. So we may affirm CN (Z) = 1, for every minimal normal subgroup Z of
Op (S) ∩ Z(P ).
6
Now let 1 6= x ∈ N such that a Sylow p-subgroup of CG (x), say P0 , is contained in P ,
so P0 = CP (x). By the hypotheses, xG p = |G : CG (x)|p = |P : P0 | is not divisible by
p2 , so it follows either |P : P0 | = 1 or |P : P0 | = p. The first case yields P = CP (x) and
then x ∈ CN (Z) = 1, a contradiction. Therefore, we may assume that |P : P0 | = p, and
so P0 is normal in P . In addition, since Op (S) ∩ Z(P ) is abelian, by the minimality of Z,
we have either P0 ∩ Z = 1 or P0 ∩ Z = Z. The last case gives Z 6 CP (x), a contradiction
again. Hence, P0 ∩ Z = 1 and it follows that P = P0 × Z and |Z| = |P : P0 | = p. We
only need to see that Z = Op (S) to finish the proof.
Note that Z(P ) = Z(P )∩P0 Z = Z(Z(P )∩P0 ), so it follows Z(P )∩Op (S) = Z(Z(P )∩
P0 ) ∩ Op (S) = Z(Z(P ) ∩ P0 ∩ Op (S)). If Z(P ) ∩ P0 ∩ Op (S) 6= 1, since it is normal in
Op (S) ∩ Z(P ), we can choose a minimal normal subgroup Z1 of Op (S) ∩ Z(P ) such that
Z1 6 Z(P )∩P0 ∩Op (S). But then Z1 6 P0 = CP (x), so x ∈ CN (Z1 ) = 1, a contradiction.
Therefore, we may assume that Z(P ) ∩ P0 ∩ Op (S) = 1. On the other hand, we have
Op (S) = Op (S)∩ZP0 = Z(P0 ∩Op (S)). If P0 ∩Op (S) is a non-trivial subgroup of P , since
it is normal in P , we have a contradiction with Z(P ) ∩ P0 ∩ Op (S) = 1. Consequently
we get the final contradiction Z = Op (S). The first assertion is then established.
(2) Let K/N Op (G) = Op (G/N Op (G)), which has order p, and let P be a Sylow psubgroup of K. Then K = P N . Moreover, [K, N ] is normal in G and [K, N ] = [P, N ] 6
N so, by the minimality of N , we have either [P, N ] = 1 or [P, N ] = N . The first case
leads to K = P × N , and then P 6 Op (G), a contradiction. Thus we have [P, N ] = N ,
and by coprime action it follows CN (P ) = 1.
Note that every dihedral group of order 2q (for q an odd prime) verifies the hypotheses
of the above proposition (take p = 2).
Theorem B (3) is indeed an immediate consequence of the next more general result.
Theorem 3.4. Let G = AB be a soluble group, which is the mutually permutable product
of the subgroups A and B. Assume that G is p-nilpotent for a prime p. If p2 does not
divide xG for any p-regular element x ∈ A ∪ B of prime power order, then G/ Op (G)
has elementary abelian Sylow p-subgroups.
Proof. Suppose that the result is false and let G be a minimal counterexample. We
may assume by the minimality of G that Op (G) = 1, and therefore Φ(G) = 1 too. By
Theorem 2.4, we can assume that there exists a minimal normal subgroup N of G such
that N 6 A. Moreover, N is q-elementary abelian, for some prime q 6= p. Furthermore,
since N ∩ Φ(G) = 1, by Gaschütz’s lemma we may write G = SN , with S ∩ N = 1.
Let P be a Sylow p-subgroup of S (so it is a Sylow p-subgroup of G). Let T = Op (S).
By the minimality of G we have T ∼
= Op (G/N ) 6= 1, and by Proposition 3.3 (1) it holds
|T | = p. We may choose 1 6= x ∈ N such that P0 = CP (x) is a Sylow p-subgroup of
CG (x). Since CN (T ) = 1 by Proposition 3.3 (2), it holds that P0 6= P , |P : P0 | = p, and
P0 ∩ T = 1. Hence P = P0 × T . Finally, since P0 ∼
= (P N/N )/ Op (G/N ), which
= P/T ∼
is elementary abelian by the minimality of G, it follows that P so is, and this leads to
the final contradiction.
Proof of Theorem B. Note that the quotients of G satisfy the hypotheses.
Moreover, if N is a normal subgroup of G such that N = (N ∩ A)(N ∩ B), then N
7
also inherits the hypotheses. (Observe that this occurs, for instance, if either N 6 A or
N 6 B.)
(1) We first see that G is soluble by induction over |G|. Since every group of odd
order is soluble, we may affirm that p = 2 because gcd(p − 1, |G|) = 1. By Theorem 2.4,
we can assume that there exists a normal subgroup M of G such that 1 6= M 6 A. If
M < G, then M is soluble by minimality. Analogously G/M is also soluble, and then
so is G. If M = G, we apply Theorem 2.6.
(2) Suppose that the result is false and let G be a counterexample of minimal order.
Since the quotients of G inherit the hypotheses, the class of p-nilpotent groups is a
saturated formation, and G is soluble, we may assume that G possesses a unique minimal
normal subgroup N , with N = CG (N ) = F(G). If N is a p′ -group, since G/N is pnilpotent by the minimality of G, it follows that G is p-nilpotent, which is a contradiction.
Thus, we may assume that N = Op (G). By Theorem 2.4, we can assume without loss of
generality that N 6 A, and that there exists a minimal normal subgroup E/N of G/N
such that either E/N ≤ A/N or E/N 6 BN/N . In the first case, we have E 6 A. In
the second case, it follows E = E ∩ BN = N (E ∩ B) 6 (E ∩ A)(E ∩ B) 6 E. Therefore,
we have E = (E ∩ A)(E ∩ B), where the factors are mutually permutable by Lemma 2.3
(b). In both cases, E is normal in G and E verifies the hypotheses. Hence, if E < G,
then E is p-nilpotent by the minimality of G. Since N = Op (G), we get that E/N is
q-elementary abelian for some prime q 6= p, so it follows that E = QN , with Q the
normal Sylow q-subgroup of E. Hence, Q is normal in G which implies that E = N , a
contradiction.
Therefore, we can assume that E = G. So we have G = E = N Q, where Q is
an abelian Sylow q-subgroup of G. By Lemma 2.2, we may assume that Q = (Q ∩
A)(Q ∩ B), with either Q ∩ A 6= 1 or Q ∩ B 6= 1. Suppose first that Q ∩ B 6= 1, and
take 1 6= x ∈ Q ∩ B. Let E1 = hxiN , which is normal in QN = G. Hence, we have
E1 = hxiN 6 (E1 ∩ B)(E1 ∩ A) 6 E1 . If Q ∩ B = 1, then G = A and we can choose
1 6= x ∈ Q, so that E1 = hxiN is normal in QN = G. Thus, in both cases, we have that
E1 inherits the hypotheses and, if E1 < G, it follows that it is p-nilpotent. Therefore
hxi is a normal Sylow q-subgroup of E1 , which is again a contradiction. Consequently,
we may assume that G = E1 = hxiN , for some q-element x.
Note that CN (x) is normal in G = hxiN , since N is abelian. By the minimality
of N , it follows that either CN (x) = 1 or CN (x) = N . The second case leads to
x ∈ CG (N ) = N , a contradiction. Hence, it follows that CG (x) = CG (x) ∩ N hxi =
hxi CN (x) = hxi. Then xG = |G : CG (x)| = |N hxi : hxi| = |N | , and so |N | = p, by the
hypotheses. Now, we get that hxi ∼
= G/N = NG (N )/ CG (N ) is isomorphic to a subgroup
of Aut(N ) ∼
C
,
the
cyclic
group
of order p − 1. Hence, |hxi| divides both p − 1 and
= p−1
|G|, which contradicts the fact that gcd(p − 1, |G|) = 1. This finishes the proof of the
p-nilpotency of G.
(3) It follows from Theorem 3.4.
In the particular case when G = A = B we recover:
Corollary 3.5. ([14, Theorem A]) Let G be a group. For a fixed prime p with gcd(p −
1, |G|) = 1, if p2 does not divide xG for any p-regular element x ∈ G of prime power
8
order, then G is soluble, p-nilpotent and G/ Op (G) has elementary abelian Sylow psubgroups.
Note that if G is the direct product of two symmetric groups of degree 3, then G
verifies the hypotheses of Theorem B for p = 2, but not those of Corollary 3.5. Moreover,
the asumption that gcd(p − 1, |G|) = 1 is necessary, which can be seen by considering
G = A5 , the alternating group of degree 5, and the prime p = 3.
We include here a theorem due to Cossey and Wang [6], which was the initial motivation for our results, to notify a gap that we have found in one of the statements.
Theorem 3.6. ([6, Theorem 1]) Let G be a finite group, and p be a prime divisor of |G|
such that if q is any prime divisor of |G|, then q does not divide p − 1. Suppose that no
conjugacy class size of G is divisible by p2 . Then G is a soluble p-nilpotent group, and
G/ Op (G) has a Sylow p-subgroup of order at most p. Further, if P is a Sylow p-subgroup
of G, then P ′ has order at most p, and if P 6= Op (G), then Op (G) is abelian.
Remark 3.7. (a) The statement “G/ Op (G) has a Sylow p-subgroup of order at most
p” in the above theorem (and so the corresponding one in [13, Theorem 6]) is not true.
To see this, consider the semidirect product G = [C5 × C5 ](Sym(3) × C2 ) (where
Sym(3) is a symmetric group of degree 3), which is the group of the Small groups library
of GAP with identification number 300#25, and the prime p = 2. Then G verifies the
hypotheses of Theorem 3.6 but O2 (G) = 1 and |G|2 = 4. We reveal that this example
has been communicated to us by John Cossey.
(b) The same example shows that the hypotheses in Theorem B for the conjugacy
class sizes of the elements x ∈ A ∪ B are not necessarily inherited by the factors, unless
they are (sub)normal in G. The above group G can be factorised as the mutually
permutable product of A = D10 × D10 and B = [C5 × C5 ]C3 (we checked this using GAP).
It is clear that G = AB satisfies the hypotheses of Theorem B for p = 2, but there are
elements x ∈ A with xA divisible by 4.
Remark 3.8. A natural question is how to extend the last assertion of Theorem 3.6 for
(mutually permutable) products. Concerning this, we show the following example:
Let A = D8 be a dihedral group of order 8 and B = [C5 ]C4 = ha, b | a5 = b4 =
1, ab = a4 i, and consider the prime p = 2. Then G = A × B is a mutually permutable
product of A and B, and G is 2-nilpotent. Moreover, 4 does not divide any conjugacy
class size of elements in A ∪ B. However, O2 (G) = (O2 (G) ∩ A)(O2 (G) ∩ B) = D8 × C2
is not abelian.
Regarding the claim “P ′ has order at most p” in Theorem 3.6, we get the next
extension for factorised groups, as an immediate consequence of Theorem A:
Corollary 3.9. Let G = AB be the product of the subgroups A and B. Assume that G
is p-nilpotent, and that for all p-elements in the factors, p2 does not divide xG . If P is
a Sylow p-subgroup of G, then P ′ 6 Φ(P ) 6 Z(P ), with P ′ elementary abelian of order
at most p2 .
9
In particular, from this fact and Theorem B, we get [13, Theorem 7] as a corollary,
taking G = A = B.
Finally, we prove Theorem C, which is motivated by [2, Theorem 1.3].
Proof of Theorem C. Suppose that the result is false and let G be a counterexample of minimal order. Note that G cannot be simple. Since the class of p-supersoluble
groups is a saturated formation, we may assume that there exists a unique minimal
normal subgroup N of G, and that Φ(G) = 1. By the minimality of G, we get that
G/N is p-supersoluble. Since G is p-soluble, it follows that N is either a p-group or
a p′ -group. In the second case, since G/N verifies the thesis by minimality, we get a
contradiction. Consequently, we may assume that N is p-elementary abelian and we
must show that |N | = p. As Φ(G) = 1 and G is p-soluble with Op′ (G) = 1, by [7, A
- 10.6] it follows that F(G) = Soc(G) = N = CG (N ), and also N = Op (G). Applying Theorem 2.4, we may assume that there exists a minimal normal subgroup Z/N
of G/N such that Z/N 6 AN/N , so Z = Z ∩ AN = N (Z ∩ A). Since G/N is psoluble, it follows that Z/N is either a p-group or a p′ -group. The first case leads to
Z/N 6 Op (G/N ) = Op (G/ Op (G)) = 1, a contradiction. Hence, we may assume that
Z/N is a p′ -group.
Let Q be a Sylow q-subgroup of Z ∩ A, where q 6= p is a prime (so Q is a Sylow
q-subgroup of Z). Therefore Q ∼
= QN/N is a Sylow q-subgroup of Z/N , which acts
faithfully on N . If 1 6= a ∈ Q 6 A, then N = [N, a]×CN (a). By the hypotheses, since p2
does not divide aG = |G : CG (a)|, then neither divides |N : CN (a)| = |[N, a]|, so either
|[N, a]| = 1 or |[N, a]| = p. The first case leads to a ∈ CG (N ) = N , a contradiction.
Thus, Lemma 2.5 yields QN/N is cyclic. Since this is valid for all primes q 6= p, we get
by [10, 5.15] that Z/N is soluble. By the minimality of Z/N , it follows that (Z/N )′ = 1
and Z/N is abelian with cyclic Sylow subgroups. Consequently Z/N = hxN i, where
x∈
/ N and the order of xN is q, for some prime q 6= p.
We may assume that x ∈ Z ∩ A and Z = N hxi. Hence CN (x) = CN (Z). By the
minimality of N , we have either CN (Z) = N or CN (Z) = 1. The first case leads to
x ∈ Z 6 CG (N ) = N , a contradiction. Therefore, since N = [N, x] × CN (x), it follows
|N | = |[N, x]| = p, and this final contradiction establishes the theorem.
Example 3.10. Let G be the symmetric group of degree 4. Then G = AB is a mutually
permutable product, where A denotes the alternating group of degree 4 and B is a Sylow
2-subgroup of G, which verifies the hypotheses of Theorem C, for p = 3.
4
Square-free class sizes
We begin this section with the proof of Theorem D.
Proof of Theorem D. (1) Suppose that the result is false and let G be a counterexample of least possible order. Since G supersoluble, G/ F(G) is abelian, and
so G′ 6 F(G). Moreover, the quotients of G inherit the hypotheses and the class
of metabelian groups is a formation, so we may assume that there exists a unique
minimal normal subgroup N of G with |N | = p, for some prime divisor p of |G|.
10
Hence, F(G) = Op (G) 6 P , a Sylow p-subgroup of G. Since G/ F(G) is abelian,
P = Op (G) = F(G). Hence P = (P ∩ A)(P ∩ B), where P ∩ A and P ∩ B are Sylow p-subgroups of A and B respectively, by Lemma 2.2. Applying Theorem A, we have
P ′ 6 Φ(P ) 6 Z(P ), and P ′ is elementary abelian of order at most p2 . Note that P ′ 6= 1,
because G′ ≤ P .
By Lemma 2.2, we may consider H a Hall p′ -subgroup of G, such that H = (H ∩
A)(H ∩ B), where H ∩ A and H ∩ B are Hall p′ -subgroups of A and B respectively.
Moreover, H ∼
= G/ F(G) is abelian. Let x ∈ H ∩ A be a prime power order element.
Since H 6 CG (x) 6 G, it follows by the hypotheses that xG ≤ p, and so Φ(G) 6
CG (x). Thus Φ(G) 6 CG (H ∩ A), and analogously for H ∩ B. Consequently we get
P ′ 6 Φ(P ) 6 Φ(G) 6 CG (H). Since P ′ 6 Φ(P ) 6 Z(P ), it follows P ′ 6 Φ(P ) 6 Z(G).
In particular, Φ(G) 6= 1 6= Z(G).
If A, B 6 P , then G = P and G′ = P ′ 6 Z(G), a contradiction. Hence we have
either H ∩ A 6= 1 or H ∩ B 6= 1. Assume H ∩ A 6= 1. Let QA be a Sylow q-subgroup of
H ∩ A, for some prime q 6= p. Note that QA 66 Z(G), because Z(G) is a p-group. Let
QA = QA Z(G)/ Z(G), which acts on P = P/ Z(G), which is elementary abelian because
Φ(P ) 6 Z(G) 6 F(G) = P . Suppose w = w Z(G) ∈ CQA (P ). Then [w, y] = 1 for all y =
y Z(G) ∈ P , so [w, y] ∈ Z(G) 6 P . Let k = o(w) denote the order of w. Thus [w, y]k =
[wk , y] = 1. It follows [w, y] = 1 for all y ∈ P , so w ∈ CQA (P ) = CQA (F(G)) = 1. Then
CQA (P ) = 1 and the action is faithful. Let 1 6= αq = αq Z(G) ∈ QA . Therefore P =
[P , αq ] × CP (αq ), with [P , αq ] 6= 1. Moreover, [P , αq ] = P : CP (αq ) = P : CP (αq ) =
|P : CP (αq )| , which divides αG
q , because P is normal in G. Since H 6 CG (αq ) and αq
is a non-central prime power order element in A, it follows αG
q = p, and so [P , αq ] = p.
∼
Applying Lemma 2.5, we get that QA = QA is cyclic. Since this is valid for each prime
divisor q of |H ∩ A|, we deduce that H ∩ A has cyclic Sylow subgroups, but it is abelian,
so H ∩ A is cyclic. Analogously, if H ∩ B 6= 1, then it is cyclic.
Let H ∩ A = hαi. Assume first that 1 6= α is a q-element, for some prime q, and
that G = P hαi. By the above argument, hαi Z(G)/ Z(G) acts faithfully on P , and
[P , α] = |P : CP (α)| = p. Let y ∈ P \ CP (α). If [y, α] = 1, then [y, α] ∈ Z(G) 6
P . Hence [y, α]o(α) = [y, αo(α) ] = 1, so [y, α] = 1 and y ∈ CP (α), a contradiction.
Then [y, α] 6= 1, and since [P , α] = p, it follows [P , α] = h[y, α]i. Therefore we have
[P, α] = [P , α] = h[y, α]i = h[y, α]i, so [P, α] 6 [P, α] Z(G) = h[y, α]i Z(G), and then
G′ = P ′ [P, α] 6 h[y, α]i Z(G) which is abelian, a contradiction.
Hence, we may assume that, for every prime q, if αq is the q-part of α, then P hαq i <
G. Note that P hαq i is normal in G, and P hαq i = (P hαq i ∩ A)(P hαq i ∩ B). Therefore, by
the minimality of G, it follows that (P hαq i)′ is abelian. Notice that (P hαq i)′ = P ′ [P, αq ],
since P is normal in G. Let K = P ′ [P, αq ], which is an abelian normal subgroup of G,
and let t ∈ [P, αq ] 6 K. Then Lemma 2.7 leads to |CG (αq )| < |CG ([t, αq ])|. If p divides
[t, αq ]G we get a contradiction, because [t, αq ]G < αG
q = p. Hence, P 6 CG ([t, αq ])
and [t, αq ] ∈ Z(P ), for each t ∈ [P, αq ]. By coprime action, P = [P, αq ] CP (αq ). Thus
[P, αq ] = [[P, αq ] CP (αq ), αq ] = [P, αq , αq ]. If k is a generator of [P, αq , αq ], then k =
[t, αq ] ∈ Z(P ) with t ∈ [P, αq ], so [P, αq ] = [P, αq , αq ] 6 Z(P ). Since this is valid for each
11
prime divisor q of the order of H ∩ A = hαi, we get:
[P, H ∩ A] = [P, hαq1 i × · · · × hαqt i] = [P, αq1 ] · · · [P, αqt ] 6 Z(P ).
Analogously, if H ∩ B 6= 1, then [P, H ∩ B] ≤ Z(P ). Since G′ = P ′ [P, H] = P ′ [P, H ∩
A][P, H ∩ B], we get G′ ≤ Z(P ). This final contradiction establishes statement (1).
(2) Suppose that the second assertion is not true and let G be a counterexample of
minimal order. We point out that the hypotheses are inherited by every quotient group
of G and, by (1), G′ is abelian. There exists a prime divisor p of |G′ | such that G′ does
not have any elementary abelian Sylow p-subgroup. By the minimality of G, we may
consider that Op′ (G) = 1. Moreover, since G is supersoluble, then G/ F(G) is abelian,
and F(G) = Op (G) = P is a normal Sylow p-subgroup of G such that G′ 6 P . Using
Lemma 2.2 and Theorem A, we obtain respectively that P = (P ∩ A)(P ∩ B), and that
P ′ is elementary abelian with P ′ 6 Φ(P ) 6 Z(P ).
Let GN be the nilpotent residual of G. Note that GN 6= 1; in other case, G is a p-group
and then G′ = P ′ , a contradiction. Since GN 6 G′ , it follows that GN is abelian. By
using [7, III - 4.6, IV - 5.18], we have that GN is complemented in G, and its complements
are precisely the Carter subgroups of G. Accordingly, G = GN H with H = NG (H) a
nilpotent subgroup of G and GN ∩ H = 1. These facts yield G′ = GN × (H ∩ G′ ), and
CGN (H) = 1. On the other hand, the minimality of G implies that G′ /GN ∼
= (H ∩ G′ ) is
N
N
N
elementary abelian, and thus G is not so. If CH (G ) 6= 1, since CH (G ) is normal in
G, by the minimality of G we have (G/ CH (GN ))′ is an elementary abelian group, but
(G/ CH (GN ))′ = G′ CH (GN )/ CH (GN ) = GN CH (GN )/ CH (GN ) ∼
= GN ,
which is a contradiction. Hence, CH (GN ) = 1. In particular, we deduce that Z(G) = 1.
By Lemma 2.2, there exists a Hall p′ -subgroup H0 of G such that H0 = (H0 ∩
A)(H0 ∩ B). Let x ∈ H0 ∩ A be a non-trivial element of prime power order. Since
H0 6 CG (x), it follows that xG ≤ p, and so Φ(G) 6 CG (x). Thus Φ(G) 6 CG (H0 ∩ A),
and analogously for H0 ∩ B. Consequently, we get P ′ 6 Φ(P ) 6 Φ(G) 6 CG (H0 ). Since
P ′ 6 Φ(P ) 6 Z(P ) and G = P H0 , it follows P ′ 6 Φ(P ) 6 Z(G) = 1, which implies that
P is elementary abelian, the final contradiction.
(3) Assume that the result is false and take G a counterexample of minimal order. Consider a prime p such that | F(G)′ |p > p2 . By minimality, we can affirm that
Op′ (F(G)) = 1. Since G is supersoluble, we get that F(G) = Op (G) = P is a normal
Sylow p-subgroup of G. Then, we apply both Lemma 2.2 and Theorem A to get the
final contradiction.
Example 4.1. Let G = A × B be the direct product of two symmetric groups of degree
3. Then G is supersoluble, and every element contained in each factor (not only those of
prime power order) has square-free conjugacy class size, but neither the derived subgroup
G′ nor G/ F(G) are cyclic, in contrast to [6, Theorem 2].
Example 4.2. In view of [6, Theorem 2], it is natural to wonder if we can affirm in the
above result that the Sylow p-subgroups of G′ have order at most p2 . This fact is not
further true, as we show:
12
Let G = A×B, where A = D14 is a dihedral group of order 14, and B = D14 ×[C7 ]C3
is the direct product of such a dihedral group and a semidirect product of a cyclic group
of order 7 and a cyclic group of order 3 (B has identification number 294#9 in the Small
groups library of GAP). Then G is supersoluble, and satisfies that all prime power order
elements contained in each factor have square-free conjugacy class size, but G′ has order
73 .
Now we proceed with the proof of Theorem E.
Proof of Theorem E. Considering the smallest prime divisor of |G| and Theorem
B, we conclude that G is soluble. Hence, it is p-soluble for each prime divisor p of |G|.
Applying Theorem C, we get that G is p-supersoluble for each prime that divides |G|,
so it is supersoluble.
Now we prove the second assertion by induction on |G|. Let p be an arbitrary prime,
and P be a Sylow p-subgroup of G. We want to show that P F(G)/ F(G) ∼
= P/ Op (G) is
elementary abelian. Since G is supersoluble, we have that G/ F(G) is abelian. Moreover,
we may assume by induction that Op (G) = 1. Therefore, we have that F(G) 6 H 6 G,
where H is a Hall p′ -subgroup of G. Consequently, H is normal in G and G is p-nilpotent.
Finally, by Theorem 3.4 the result is established.
When considering in the above theorem all p-regular elements in the factors, we get
as a corollary:
Corollary 4.3. ([2, Corollary 1.5]) Let the group G = AB be the mutually permutable
product of the subgroups A and B. Suppose that for every prime p and every p-regular
element x ∈ A ∪ B, xG is not divisible by p2 . Then G is supersoluble.
Example 4.4. Consider G = A × B, where A = Sym(3) is a symmetric group of degree
3, and B = Sym(3) × D10 is the direct product of such a symmetric group and a dihedral
group of order 10. Then G satisfies the hypotheses of Theorem E. However there exists
some 2-regular element in B, not of prime power order, such that 4 divides its conjugacy
class size, so Corollary 4.3 cannot be applied.
In the particular case when A and B are normal in G, we obtain [13, Proposition 9].
Corollary 4.5. Let A and B be normal subgroups of G such that G = AB. Suppose
that xG is square-free for every element x of prime power order of A ∪ B. Then G is
supersoluble.
This development has its origins in the contributions of Chillag and Herzog [5, Theorem 1], and Cossey and Wang [6, Theorem 2]. Our next result Theorem F and Theorem
D can be considered somehow extensions of the ones above for (mutually permutable)
products. In fact, Theorem F provides further information on the Sylow subgroups of
G/ F(G).
Proof of Theorem F. Suppose the result is not true and let G be a counterexample of least order possible. Then if P is a Sylow p-subgroup of G, we have |P/ Op (G)| ≥
13
p3 . We can assume by the minimality of G that Op (G) = 1 = Φ(G) = Z(G), so
|P | ≥ p3 . By Lemma 2.2 we can choose P = (P ∩ A)(P ∩ B), with P ∩ A and P ∩ B
Sylow p-subgroups of A and B respectively. By Theorem E, we have that G is supersoluble and G/ F(G) has elementary abelian Sylow subgroups. In particular, P F(G)
is normal in G. Hence Lemma 2.3 (b) asserts that L = (P F(G) ∩ A)(P F(G) ∩ B) is
normal in G, and it is a mutually permutable product. Moreover, P = (P ∩ A)(P ∩ B) 6
(P F(G)∩A)(P F(G)∩B) = L 6 P F(G). If we suppose L < G, by the minimality of G it
follows |P/ Op (L)| = |P | ≤ p2 , a contradiction. Thus, we may assume L = G = P F(G),
and so G is p-nilpotent.
Let N be a minimal normal subgroup of G. We can assume without loss of generality
that it is contained in A by Theorem 2.4. Note |N | = q 6= p. By Proposition 3.3 (1), it
follows |Op (G/N )| ≤ p, and by the minimality of G we have |(P N/N )/ Op (G/N )| ≤ p2 .
Since P ∼
= P N/N , we may assume |P | = p3 . As Φ(G) = 1, [[7], A - 10.6 Theorem]
leads to F(G) = Soc(G). If N is the unique minimal normal subgroup of G, then
P ∼
= NP (N )/ CP (N ) which is isomorphic to a subgroup of Aut(Cq ) ∼
= Cq−1 , so P is
cyclic and elementary abelian, which implies that its order is p, a contradiction.
Now we denote by T the product of all minimal normal subgroups of G distinct of N ,
so T 6= 1 and T ∩ N = 1. It follows F(G) = Soc(G) = N × T . We denote Q1 = Op (P N )
and Q2 = Op (P T ). Since P N ∼
= G/T (and P T ∼
= G/N ), by the minimality of G we
may affirm Q1 6= 1 6= Q2 . On the other hand, since [Op (P N ), N ] 6 Op (P N ) ∩ N = 1,
we have Q1 6 C1 = CP (N ) (analogously Q2 6 C2 = CP (T )). In addition, it follows
C1 ∩ C2 6 CP (F(G)) 6 CG (F(G)) 6 F(G), so C1 ∩ C2 = 1. Let P0 be a Sylow psubgroup of CG (N ) such that P0 6 P . Hence P0 = C1 = CP (N ). In addition, since
N = hxi where x is a q-element contained in A, by the hypotheses it follows that p2 does
not divide xG p = |G : CG (x)|p = |P : C1 |. Moreover, since |P | = |P : C1 | · |C1 | = p3 ,
we may assume |C1 | ≥ p2 , and since 1 6= Q2 6 C2 , we have |C2 | ≥ p. Accordingly
|C1 C2 | = |C1 | · |C2 | ≥ p3 , and since P is abelian, we have necessarily P = C1 × C2 . This
leads to
G = P F(G) = C1 C2 N T = (C1 T ) × (C2 N ).
Suppose T ∩ A 6= 1, and let 1 6= y ∈ T ∩ A 6 C1 T ∩ A. Let 1 6= x ∈ N 6 A.
Then since xy ∈ F(G) ∩ A and F(G) is abelian, we have that xy is a p-regular element,
so by the hypotheses p2 does not divide (xy)G . As G is a direct product, we have
(xy)G = xG y G . In addition, (N × C1 T ) 6 CG (x) 6 G, and therefore xG divides
|G : (C1 T × N )| = |C2 | which is a p-number, so xG = p (recall that Z(G) = 1), and
analogously y G = p, a contradiction. We conclude T ∩ A = 1.
If F(G) = K × M with M normal in G and K a minimal normal subgroup of G
contained in B, by similar arguments we can deduce M ∩ B = 1. This means, in
particular, that neither A nor B can contain two distinct minimal normal subgroups of
G.
On the other hand, since F(G) is the unique p′ -Hall subgroup of G, Lemma 2.2 leads
to F(G) = (F(G) ∩ A)(F(G) ∩ B). Moreover, since F(G) ∩ A = N T ∩ A = N (T ∩ A) = N ,
it follows F(G) = N (F(G) ∩ B). Note that (F(G) ∩ B) ∩ N 6 N with |N | = q so we
distinguish two cases: either (F(G)∩ B)∩ N = N or (F(G)∩ B)∩ N = 1. In the first case
14
F(G) = F(G) ∩ B 6 B. Thus there exists another minimal normal subgroup contained
in B and distinct of N , a contradiction. Hence we conclude (F(G) ∩ B) ∩ N = 1 so
F(G) = N × (F(G) ∩ B).
Now suppose that F(G) is a q-group. Then, since F(G) = Soc(G), it follows that
F(G) is q-elementary abelian. In addition, P ∩ A acts faithfully over F(G). Let 1 6= x ∈
P ∩ A 6 A, then F(G) = [F(G), x] × CF(G) (x), with CF(G) (x) < F(G) since Z(G) = 1
and P is abelian. By the hypotheses, q 2 does not divide xG , and therefore it does not
divide F(G) : CF(G) (x) . Thus we may affirm |[F(G), x]| = q. By Lemma 2.5 we conclude
that P ∩ A is cyclic, and analogously P ∩ B is cyclic too. So they are both cyclic and
elementary abelian, that is, they both have order p. Thus |P | = |(P ∩ A)(P ∩ B)| ≤ p2 ,
a contradiction.
Hence we may suppose that there exists a prime r 6= q such that r divides |F(G)|.
Let 1 6= R be a Sylow r-subgroup of F(G) ∩ B (so it is a Sylow r-subgroup of F(G)).
Then 1 6= R = Or (G) 6 B, and since F(G) = Soc(G), necessarily we have that Or (G) is
the product of the minimal normal subgroups of G with order r. Let M 6 B be one of
those minimal normal subgroups. Arguing exactly in the same way as with N , it follows
F(G) = M ×(A∩F(G)). But A∩F(G) = N so F(G) = N ×M with both minimal normal
subgroups of G, N 6 A and M 6 B. Let P1 be a Sylow p-subgroup of CG (N ) = CG (x)
such that P1 6 P . Then by the hypotheses we have xG p = |P : P1 | ≤ p. Since |P | = p3 ,
it follows |P1 | ≥ p2 . However, P1 is normal in P N so P1 6 Op (P N ) ∼
= Op (G/M ), and
by Proposition 3.3 (1) we have |Op (G/M )| ≤ p. This final contradiction establishes the
theorem.
Example 4.6. Under the hypotheses of Theorem E (even under those of Theorem D),
it is not possible to assure that G/ F(G) has Sylow p-subgroups of order at most p2 , as
the following example shows:
Let {p1 , p2 , . . . , pn } be a finite set of pairwise distinct odd primes, and let G = D2p1 ×
D2p2 × · · · × D2pn be the direct product of dihedral groups of order 2pi , 1 ≤ i ≤ n. Then
G = A×B is a mutually permutable product of A = D2p1 and B = D2p2 ×· · ·×D2pn , and
each prime power order element contained in the direct factors has square-free conjugacy
class size. However, G/ F(G) has order 2n .
References
[1] B. Amberg, S. Franciosi and F. de Giovanni:
University Press, New York, 1992.
Products of groups. Oxford
[2] A. Ballester-Bolinches, J. Cossey and Y. Li: Mutually permutable products
and conjugacy classes. Monatsh. Math. 170 (2012) 305–310.
[3] A. Ballester-Bolinches, R. Esteban-Romero and M. Asaad: Products of
finite groups. Vol. 53 of de Gruyter Expositions in Mathematics, Berlin, 2010.
[4] J. C. Beidleman and H. Heineken: Group classes and mutually permutable
products. J. Algebra 297 (2006) 409–416.
15
[5] D. Chillag and M. Herzog: On the length of the conjugacy classes of finite
groups. J. Algebra 131 (1990) 110–125.
[6] J. Cossey and Y. Wang: Remarks on the length of conjugacy classes of finite
groups. Commun. Algebra 27 (1999) 4347–4353.
[7] K. Doerk and T. Hawkes: Finite Soluble Groups. Vol. 4 of de Gruyter Expositions in Mathematics, Berlin, 1992.
[8] The GAP Group:
GAP – Groups, Algorithms, and Programming.
http://www.gap-system.org, Version 4.7.7, 2015.
[9] B. Huppert: Endliche Gruppen I. Springer-Verlag, Berlin, 1967.
[10] I. M. Isaacs: Finite Group Theory. American Mathematical Society, USA, 2008.
[11] H. G. Knoche: Über den Frobeniusschen Klassenbegriff in nilpotenten Gruppen.
Math. Z. 55 (1951) 71–83.
[12] S. Li: On the class length of elements of prime power order in finite groups.
Guangxi Sci. 6(1) (1999) 12–13.
[13] X. Liu, Y. Wang and H. Wei: Notes on the length of conjugacy classes of finite
groups. J. Pure Appl. Algebra 196 (2005) 111–117.
[14] G. Qian and Y. Wang: On conjugacy class sizes and character degrees of finite
groups. J. Algebra Appl. 13 (2014) 1350100-1–9.
16
| 4math.GR
|
A deep learning model integrating FCNNs and CRFs for brain tumor segmentation
Xiaomei Zhao1,2, Yihong Wu1, Guidong Song3, Zhenye Li4, Yazhuo Zhang,3,4,5,6 , and Yong Fan7
National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences
1
2
3
4
Beijing Neurosurgical Institute, Capital Medical University, Beijing, China
Department of Neurosurgery, Beijing Tiantan Hospital, Capital Medical University, Beijing, China
5
6
7
University of Chinese Academy of Sciences, Beijing, China
Beijing Institute for Brain Disorders Brain Tumor Center, Beijing, China
China National Clinical Research Center for Neurological Diseases, Beijing, China
Department of Radiology, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA, USA
*Correspondence to:
Dr. Yihong Wu
National Laboratory of Pattern Recognition
Institute of Automation
Chinese Academy of Sciences
Beijing, 100190, China
Email: yhwu@nlpr.ia.ac.cn
Or
Dr. Yong Fan
Department of Radiology
Perelman School of Medicine
University of Pennsylvania
Philadelphia, PA 19104, USA
Email: yong.fan@uphs.upenn.edu; yong.fan@ieee.org
Tel: +1 215-746-4065
1
1
This article was accepted in the journal Medical Image Analysis.
Please cite this article as: X. Zhao et al., A deep learning model integrating FCNNs and CRFs for brain tumor segmentation,
Medical Image Analysis, Volume 43, January 2018, Pages 98-111.
http://doi.org/10.1016/j.media.2017.10.002
1
ABSTRACT
Accurate and reliable brain tumor segmentation is a critical component in cancer diagnosis, treatment planning,
and treatment outcome evaluation. Build upon successful deep learning techniques, a novel brain tumor
segmentation method is developed by integrating fully convolutional neural networks (FCNNs) and Conditional
Random Fields (CRFs) in a unified framework to obtain segmentation results with appearance and spatial
consistency. We train a deep learning based segmentation model using 2D image patches and image slices in
following steps: 1) training FCNNs using image patches; 2) training CRFs as Recurrent Neural Networks
(CRF-RNN) using image slices with parameters of FCNNs fixed; and 3) fine-tuning the FCNNs and the
CRF-RNN using image slices. Particularly, we train 3 segmentation models using 2D image patches and slices
obtained in axial, coronal and sagittal views respectively, and combine them to segment brain tumors using a
voting based fusion strategy. Our method could segment brain images slice-by-slice, much faster than those based
on image patches. We have evaluated our method based on imaging data provided by the Multimodal Brain
Tumor Image Segmentation Challenge (BRATS) 2013, BRATS 2015 and BRATS 2016. The experimental results
have demonstrated that our method could build a segmentation model with Flair, T1c, and T2 scans and achieve
competitive performance as those built with Flair, T1, T1c, and T2 scans.
Index Terms— Brain Tumor Segmentation, Fully Convolutional Neural Networks, Conditional Random Fields,
Deep learning
1. Introduction
Accurate brain tumor segmentation is of great importance in cancer diagnosis, treatment planning, and treatment
outcome evaluation. Since manual segmentation of brain tumors is laborious [1], an enormous effort has devoted
to the development of semi-automatic or automatic brain tumor segmentation methods. Most of the existing brain
tumor segmentation studies are focusing on gliomas that are the most common brain tumors in adults and can be
measured by Magnetic Resonance Imaging (MRI) with multiple sequences, such as T2-weighted fluid attenuated
inversion recovery (Flair), T1-weighted (T1), T1-weighted contrast-enhanced (T1c), and T2-weighted (T2). The
segmentation of gliomas based on MRI data is challenging for following reasons: 1) gliomas may have the same
appearance as gliosis and stroke in MRI data [2]; 2) gliomas may appear in any position of the brain with varied
shape, appearance and size; 3) gliomas invade the surrounding brain tissues rather than displacing them, causing
fuzzy boundaries [2]; and 4) intensity inhomogeneity of MRI data further increases the difficulty.
The existing automatic and semi-automatic brain tumor segmentation methods can be broadly categorized as
either generative model based or discriminative model based methods [3]. The generative model based brain
tumor segmentation methods typically require prior information, which could be gained through probabilistic
image atlases [4-6]. Based on probabilistic image atlases, the brain tumor segmentation problem can be modeled
2
as an outlier detection problem [7].
On the other hand, the discriminative model based methods solve the tumor segmentation problem in a
pattern classification setting, i.e., classifying image voxels as tumor or normal tissues based on image features.
The performance of discriminative model based segmentation methods are hinged on the image features and
classification algorithms. A variety of image features have been adopted in tumor segmentation studies, including
local histograms [8], image textures [9], structure tensor eigenvalues [10], and so on. The most commonly
adopted pattern classification algorithms in brain tumor segmentation studies are support vector machines (SVMs)
[11-13] and random forests [8-10, 14].
More recently, deep learning techniques have been adopted in brain tumor segmentation studies following
their success in general image analysis fields, such as images classification [15], objects detection[16], and
semantic segmentation [17-19]. Particularly, Convolutional Neural Networks (CNNs) were adopted for brain
tumor image segmentation in the Multimodal Brain Tumor Image Segmentation Challenge (BRATS) 2014
[20-22]. More deep learning based brain tumor segmentation methods were presented in the BRATS 2015 and
different deep learning models were adopted, including CNNs [23-25], convolutional restricted Boltzman
machines [26], and Stacked Denoising Autoencoders [27].
Among the deep learning based tumor segmentation methods, the methods built upon CNNs have achieved
better performance. Particularly, both 3D-CNNs [22, 28, 29] and 2D-CNNs [20, 21, 23-25, 30, 31] models were
adopted to build tumor segmentation methods. Although 3D-CNNs can potentially take full advantage of 3D
information of the MRI data, the network size and computational cost are increased too. Therefore, 2D-CNNs
have been widely adopted in the brain tumor segmentation methods. Davy et al. proposed a deep learning method
with two pathways of CNNs, including a convolutional pathway and a fully-connected pathway [21]. Dvorak et al.
modeled the multi-class brain tumor segmentation task as 3 binary segmentation sub-tasks and each sub-task was
solved using CNNs [23]. Very deep CNNs [32] were adopted to segment tumors by Pereira et al. [25]. Most of
these brain tumor segmentation methods train CNNs using image patches, i.e., local regions in MR images. These
methods classify each image patch into different classes, such as healthy tissue, necrosis, edema, non-enhancing
core, and enhancing core. The classification result of each image patch is used to label its center voxel for
achieving the tumor segmentation. Most of the above CNN brain tumor segmentation methods assumed that each
voxel’s label is independent, and they didn’t take the appearance and spatial consistency into consideration. To
take the local dependencies of labels into account, Havaei et al. constructed a cascaded architecture by taking the
pixel-wise probability segmentation results obtained by CNNs trained at early stages as additional input to their
following CNNs [24, 30]. To take into consideration appearance and spatial consistency of the segmentation
results, Markov Random Fields (MRFs), particularly Conditional Random Fields (CRFs), have been integrated
with deep learning techniques in image segmentation studies, either used as a post-process step of CNNs [28, 33]
or formulated as neural networks [18, 19]. In the latter setting, both CNNs and MRFs/CRFs can be trained with
3
back-propagation algorithms, tending to achieve better segmentation performance.
Multiple 2D CNNs could be integrated for segmenting 3D medical images. In particular, Prasoon et al.
proposed a triplanar CNN [34] for knee cartilage segmentation. The triplanar network used 3 CNNs to deal with
patches extracted from xy, yz and zx planes and fused them using a softmax classifier layer. Fritscher et al.
proposed a pseudo 3D patch-based approach [35], consisting of 3 convolutional pathways for image patches in
axial, coronal, and sagittal views respectively and fully connected layers for merging them. Setio et al. used
multi-view convolutional networks for pulmonary nodule detection [36]. Their proposed network architecture
composed multiple streams of 2D CNNs, each of which was used to deal with patches extracted in a specific
angle of the nodule candidates. The outputs of the multiple streams of 2D CNNs were finally combined to detect
pulmonary nodules. However, all these methods built CNNs upon image patches, not readily extendable for
building FCNNs.
Preprocessing of MRI data plays an important role in the discriminative model based tumor segmentation
methods that assume different MRI scans of the same modality have comparable image intensity information. The
intensities of different MRI scans can be normalized by subtracting their specific mean values and dividing by
their specific standard deviation values or by matching histograms [10, 22]. However, the mean values of
intensities of different MRI scans do not necessarily correspond to the same brain tissue, and the histogram
matching might not work well for tumor segmentation studies [8]. A robust intensity normalization has been
adopted in tumor segmentation studies by subtracting the gray-value of the highest histogram bin and normalizing
the standard deviation to be 1 [8].
Inspired by the success of deep learning techniques in medical image segmentation, we propose a new brain
tumor segmentation method by integrating Fully Convolutional Neural Networks (FCNNs) and CRFs in a unified
framework. Particularly, we formulate the CRFs as Recurrent Neural Networks [18], referred to as CRF-RNN.
The integrative model of FCNNs and CRF-RNN is trained in 3 steps: 1) training FCNNs using image patches; 2)
training CRF-RNN using image slices with parameters of FCNNs fixed; and 3) fine-tuning the whole network
using image slices. To make use of 3D information provided by 3D medical images, we train 3 segmentation
models using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine
them to segment brain tumors using a voting based fusion strategy. The proposed method is able to segment brain
images slice-by-slice, which is much faster than the image patch based segmentation methods. Our method could
achieve competitive segmentation performance based on 3 MR imaging modalities (Flair, T1c, T2), rather than 4
modalities (Flair, T1, T1c, T2) [3, 8-10, 14, 20-31], which could help reduce the cost of data acquisition and
storage. We have evaluated our method based on imaging data provided by the Multimodal Brain Tumor Image
Segmentation Challenge (BRATS) 2013, the BRATS 2015, and the BRATS 2016. The experimental results have
demonstrated that our method could achieve promising brain tumor segmentation performance. Preliminary
results have been reported in a conference proceeding paper of the BRATS 2016 [37].
4
2. Methods and materials
2.1 Imaging data
All the imaging data used in this study were obtained from the BRATS 20132, the BRATS 20153 and the BRATS
20164. The BRATS 2013 provided clinical imaging data of 65 glioma patients, including 14 patients with
low-grade gliomas (LGG) and 51 patients with high-grade gliomas (HGG). The patients were scanned with MRI
scanners from different vendors at 4 different centers, including Bern University, Debrecen University, Heidelberg
University, and Massachusetts General Hospital. Each patient had multi-parametric MRI scans, including
T2-weighted fluid attenuated inversion recovery (Flair), T1-weighted (T1), T1-weighted contrast-enhanced (T1c),
and T2-weighted (T2). All the MRI scans of the same patient were rigidly co-registered to their T1c scan and
resampled at 1 mm isotropic resolution in a standardized axial orientation with a linear interpolator [3]. All
images were skull stripped. Ground truths were produced by manual annotations. The cases were split into
training and testing sets. The training set consists of 20 HGG and 10 LGG cases. The testing set consists of
Challenge and Leaderboard subsets. The Challenge dataset has 10 HGG cases and the Leaderboard dataset
contains 21 HGG and 4 LGG.
The imaging dataset provided by BRATS 2015 contains imaging data obtained from the BRATS 2012, 2013,
and the NIH Cancer Imaging Archive (TCIA). Each case has Flair, T1, T1c, and T2 scans aligned onto the same
anatomical template space and interpolated at 1 mm3 voxel resolution. The testing dataset consists of 110 cases
with unknown grades, and the training dataset consists of 220 HGG and 54 LGG cases. In the testing dataset, the
ground truth of each case was produced by manual annotation. In the training dataset, all the cases from the
BRATS 2012 and 2013 were labeled manually, and the cases from the TCIA were annotated by fusing
segmentation results obtained using top-ranked methods of the BRATS 2012 and 2013. The annotations were
inspected visually and approved by experienced raters. The tumor labels of the training cases are provided along
with their imaging scans, while only imaging data are provided for the testing cases for blind evaluation of the
segmentation results.
BRATS 2016 shares the same training dataset with BRATS 2015, which consists of 220 HGG and 54 LGG.
Its testing dataset consists of 191 cases with unknown grades. The ground truth of each testing case was produced
by manual annotation, not released to the competition participants.
2.2 Brain tumor segmentation methods based on FCNNs trained using image patches
Deep learning techniques, particularly CNNs, have been successfully adopted in image segmentation studies. A
deep learning model of CNNs usually has millions or even billions of parameters. To train the deep CNNs with
sufficient training samples, image patch-based techniques are adopted [20-25, 28, 30, 31, 38-40]. With the image
2
3
4
https://www.virtualskeleton.ch/BRATS/Start2013
https://www.virtualskeleton.ch/BRATS/Start2015
https://www.virtualskeleton.ch/BRATS/Start2016
5
patch based representation, the image segmentation problem can be solved as a classification problem of image
patches.
An image patch is a local region extracted from an image to characterize its central pixel/voxel in 2D/3D,
and has the same label as its center pixel/voxel’s label in the classification problem. In the training phase, a large
number of image patches can be extracted to train the CNNs. In the testing phase, image patches extracted from a
testing image are classified one by one by the trained CNNs. Then, the classification results of all image patches
make up a segmentation result of the testing image. However, FCNNs can segment a testing image slice by slice
with improved computational efficiency [30], even though the model is trained using image patches. Since the
number and location of training image patches for each class can be easily controlled by changing the image patch
sampling scheme, image patch-based deep learning segmentation methods can avoid the training sample
imbalance problem. However, a limitation of image patch-based segmentation methods is that relationship among
image patches is typically lost. Integrating CRF-RNN with FCNNs tends to overcome such a limitation in tumor
segmentation.
2.3 The proposed brain tumor segmentation method
The proposed brain tumor segmentation method consists of 4 main steps: pre-processing, segmenting image slices
using deep learning models with integrated FCNNs and CRF-RNN from axial, coronal and sagittal views
respectively, fusing segmentation results obtained in the three different views, and post-processing.
2.3.1 Pre-processing of the imaging data
Since MRI scans typically have varied intensity ranges and are affected by bias fields differently, we adopted a
robust intensity normalization method to make MRI scans of different patients comparable, besides correcting the
bias field of MRI data using N4ITK [41]. Our normalization method is built upon the image mode based method
[8], which normalizes image intensity by subtracting the image mode (e.g. the gray-value of the highest histogram
bin) and normalizing the standard deviation to be 1. As almost half of the brain is the whiter matter [42], the
gray-value of the highest histogram bin typically corresponds to the gray-value of the white matter, and therefore
matching intensity values of the white matter across MRI scans and normalizing the intensity distributions
accordingly would largely make different MRI scans comparable. However, the standard deviation calculated
based on intensity mean value does not necessarily have a fixed tissue meaning. Therefore, in our study a robust
intensity deviation is adopted to replace the standard deviation used in [8]. The robust deviation is computed
based on the gray-value of the highest histogram bin, representing the discreteness of intensity to the gray-value
of white matter. Besides, the intensity mean is more sensitive to noise than the gray value of the highest histogram
bin. Thus the standard deviation calculated based on intensity mean is more sensitive to noise than the robust
deviation.
Given an MRI scan
with voxels { , ,⋯,
} , and each voxel
has intensity
,
V , ,⋯, , the
6
robust deviation
V
V
, where
denotes the gray-value of the highest histogram bin. Our
intensity normalization procedure is following:
Step 1. Transform the intensity range to 0-255 linearly.
Step 2. Calculate the intensity histogram, with 256 bins.
Step 3. Subtract the gray-value of the highest histogram bin
and divide the robust deviation .
Step 4. Multiply each voxel’s intensity by a constant σ and plus a constant
are below 0 or above 255 to 0 and 255 respectively. In the present study, we set
. Then, set the intensities that
and
equal to the gray-value
of the highest histogram bin and robust deviation of NO. 0001 HGG clinical training image data of BRATS 2013,
which has been pre-processed by N4ITK and the step 1. For the Flair, T1c, and T2 scans, =30, 31, 37 and
=75,
99, 55 respectively.
The image intensity normalization effect is illustrated with T2 scans in Fig. 1. Particularly, we randomly
selected 3 subjects from the BRATS 2013 and 3 subjects from the BRATS 2015. The results shown in Fig. 1
clearly demonstrated that the image intention normalization could improve comparability of different scans. The
improvement is further confirmed by image intensity histograms of 30 subjects from the BRATS 2013 training
dataset, as shown in Fig.2.
Fig.1. T2 scans before (top row) and after (bottom row) the proposed intensity normalization. (a-1)-(a-3) and (b-1)-(b-3) are
randomly selected subjects from the BRATS 2013, and (a-4)-(a-6) and (b-4)-(b-6) are randomly selected subjects from the
BRATS 2015. (a-1)-(a-6): before normalization; (b-1)-(b-6): after normalization. All the scans were preprocessed by N4ITK
and the proposed normalization step 1.
Fig.2. Image intensity histograms of T2 scans of 30 subjects from the BRATS 2013 training dataset before (left) and after
(right) the intensity normalization. All the scans were preprocessed by N4ITK and the proposed normalization step 1.
2.3.2 A deep learning model integrating FCNNs and CRFs
The proposed deep learning model for brain tumor segmentation integrates Fully Convolutional Neural Networks
7
(FCNNs) and Conditional Random Fields (CRFs), as illustrated by Fig. 3. We formulated CRFs as Recurrent
Neural Networks (RNNs), referred to as CRF-RNN [18]. The proposed method could segment brain images slice
by slice.
Fig.3. Flowchart of the proposed deep learning model integrating FCNNs and CRFs for brain tumor segmentation.
(1) FCNNs
The structure of our proposed FCNNs is illustrated by Fig. 4. Similar to the network architectures proposed in [28,
30], the inputs to our network are also in 2 different sizes. Passing through a series of convolutional and pooling
layers, the larger inputs turn into feature maps with the same size of smaller inputs. These feature maps and
smaller inputs are sent into following networks together. In this way, both local image information and context
information in a larger scale can be taken into consideration for classifying image patches. Different from the
cascaded architecture proposed in [30], the two branches in our FCNNs are trained simultaneously, rather than
trained in different steps. Furthermore, our model has more convolutional layers.
Our deep FCNNs are trained using image patches, which are extracted from slices of the axial view, coronal
view or sagittal views randomly. Equal numbers of training samples for different classes are extracted to avoid
data imbalance problem. There are 5 classes in total, including healthy tissue, necrosis, edema, non-enhancing
core, and enhancing core.
As shown in Fig. 4, in our deep FCNNs, the kernel size of each max pooling layer is set to
, and the
size of image patches used to train FCNNs is proportional to the kernel size. Different settings of the kernel size
or equivalently the image patch size may affect the tumor segmentation performance. The max pooling layers of
our FCNNs are used to capture image information in large scales with a relatively small number of network
parameters. We set the stride of each layer to be 1. Therefore, in the testing stage, our model can segment brain
images slice by slice.
8
Fig.4. The network structure of our deep FCNNs.
(2) CRF-RNN
CRF-RNN formulates 2D fully connected Conditional Random Fields as Recurrent Neural Networks [18]. Given
a 2D image
, comprising a set of pixels {
V ,…,u} , the image segmentation problem is solved as an
optimization problem using fully connected CRFs by minimizing an energy function [43] :
u
V
V
where
,h,
is a certain label assignment to , ,h
denotes the assignment of label
to pixel
h,
measures the cost of assigning label
assigning label
and
jointly to
and
to pixel
V
,h,
h
denotes the probability of assigning label
Differentiating Eqn. (2) with respect to
,
h
(1)
denotes the assignment of label
to pixel
, and the pairwise term
to [19], minimizing
to pixel
h,h
h
measures the cost of
,
h
where
V
V th
V
is the number of Gaussian kernel;
coordinates of
h
and
(
and
h,
,
h
,
h
,
,
V
(3)
},
h
h
,
and
h
h
is defined
,
is a Gaussian kernel,
denote the intensity of
and
(2)
, which is the variable that we aim to estimate.
as
h
h
equals to minimizing an energy
,
h
,
can be obtained from the FCNNs, and the pairwise potential
,
,
and setting the differentiation result equal to 0, we have
th {
The unary term
,
V { , ,⋯, } are segmentation labels, the unary term
,
h . According
function:
where
{ ,…,u},
h
(4)
V exp
respectively,
are parameters of the Gaussian kernels);
h
and
h
h
and
denote spatial
is a weight for the
9
Gaussian kernel
intensity ( ,
h)
;
and
denote image feature vectors of
h
and spatial position information ( ,
h );
Substituting (4) into (3), we get:
,
,
th {
V
and
indicates the compatibility of labels
,
h
Fully connected CRF predicts the probability of assigning label
respectively, encoding their
h
to pixel
h
and .
(5)
}.
h
according to Eqn. (5), and
can
be calculated using a mean field iteration algorithm formulated as Recurrent Neural Networks so that CNNs and
the fully connected CRF are integrated as one deep network and can be trained using a back-propagation
algorithm [18]. Fig. 5 shows the network structure of CRF-RNN. G and G in Fig. 5 are two gating functions:
V
where
output
V{
, ,…,u ,
of one mean-field iteration;
output of FCNNs, and
and
t
th
th
Vt
V t
t
V
,
t
,
,
V
denotes the input
},
h
t
,
t , V
,
,
h
provided by Flair, T1c and T2 slices with
t
denotes the final prediction results of CRF-RNN.
denotes the
that after softmax operation. represents the
V t,
V t while
t
denotes the
denotes the
mean-field iteration,
is the output of FCNNs,
are computed based on pixel features
V h ,
(6)
(7)
of one mean-field iteration;
is the total number of mean-field iterations. In our study, the unary term
and the pairwise potential
,
and
and
h
with information
are learned in the training
phase [18]. By integrating FCNNs and CRF-RNN in one deep network, we are able to train the network
end-to-end with a typical back-propagation algorithm [18].
Fig.5. The network structure of CRF-RNN.
(3) The integration of FCNNs and CRF-RNN
The proposed brain tumor segmentation network consists of FCNNs and CRF-RNN. The FCNNs predict the
10
probability of assigning segmentation labels to each pixel, and the CRF-RNN takes the prediction results and
image information as its input to globally optimize appearance and spatial consistency of the segmentation results
according to each pixel’s intensity and position information.
The proposed deep learning network of FCNNs and CRF-RNN is trained in 3 steps: 1) training FCNNs using
image patches; 2) training CRF-RNN using image slices with parameters of FCNNs fixed; and 3) fine-tuning the
whole network using image slices.
Once the fine-tune of deep learning based segmentation model is done, the model can be applied to image
slices one by one for segmenting tumors. Given an
t image slice with 3 channels, i.e., pre-processed Flair,
T1c, and T2 scans respectively, we first pad the image slice with zeros to create 2 larger images with sizes of
t
t
t
t and
tG
h
t
tG
h
t
respectively. Using these 2 larger
images as inputs of the FCNNs, we obtain 5 label predication images
, , ,
,h
,
V , ,t,G,橔,
V {h ,h
, , ,th}, with the same size of the original image slices. h ,h represents one pixel’s predicted
probability of brain tissue labels, such as healthy tissue, necrosis, edema, non-enhancing core or enhancing core.
Then, these label predication images
V{
V , ,t,G,橔} along with the image slice V {
h,
h,
} are
used as inputs to the CRF-RNN. Finally, the CRF-RNN obtains a globally optimized segmentation result of the
original image slice. Fig. 3 shows the flowchart of the proposed deep learning model integrating FCNNs and
CRF-RNN for brain tumor segmentation.
In the training steps 2 and 3, we first calculate softmax loss according to the current segmentation results and
the ground truth, and then the loss information is back-propagated to adjust network parameters of the integrated
FCNNs and CRF-RNN. In the training step 2, we fix FCNNs and adjust the parameters in CRF-RNN. In the
training step 3, we set a small learning rate and fine-tune the parameters of the whole network. In our experiments,
the initial learning rate was set to
橔
and the learning rate was divided by 10 after each 20 epoches in the
training step 1, and the learning rate was set to
㌳
and
respectively in the training steps 2 and 3.
2.3.3 Fusing segmentation results obtained in axial, coronal and sagittal views
We train 3 segmentation models using patches and slices of axial, coronal and sagittal views respectively. During
testing, we use these 3 models to segment brain images slice by slice in 3 different views, yielding 3 segmentation
results. A majority voting strategy is adopted to fuse the segmentation results. Let h , hh , and h
denote the
segmentation results of one voxel gotten in axial, coronal and sagittal views respectively, let h denote the
segmentation result after fusion, let
, , ,t,G denote a voxel labeled as healthy tissue, necrosis, edema,
non-enhancing core, and enhancing core respectively, the fused segmentation result is obtained by following
voting procedure:
Step 1. If two or more than two of h , hh, and h are above 0, let h V .
Step 2. If two or more than two of h , hh, and h equal to 1, let h V .
11
Step 3. If two or more than two of h , hh, and h equal to 3, let h V t.
Step 4. If two or more than two of h , hh, and h equal to 4, let h V G.
2.3.4 Post-processing
To further improve the brain tumor segmentation performance, a post-processing method is proposed. Hereinafter,
h,
h,
denote pre-processed Flair, T1c, T2 MR images respectively,
result obtained by our integrated deep learning model,
denote the value of voxel t, ,
the voxel
h
h,
h,
, and
,
t, ,
h
respectively,
t, ,
,
t, ,
, and
t, ,
V , , ,t,G indicates that
t, ,
is labeled as healthy tissue, necrosis, edema, non-enhancing core, and enhancing core
t, ,
respectively, u
in
in
h
denotes the segmentation
h
and
and u
denote the average intensity of the whole tumor region indicated by
scans. For a segmentation result
t
denote the average intensity of the
with
3D connected tumor regions,
3D connected tumor area in
h
The post-processing method consists of following step:
Step 1. If
and
h
t
to be 0 so that the
t
, set all voxels in the
3D connected tumor region is removed from
and
h
and
respectively.
3D connected tumor area in
, taking into consideration that
isolated local areas with super high intensities are usually caused by imaging noise rather than tumors. In the
present study,
V 橔 .
V
Step 2. If a voxel t, ,
①
set
t, ,
h
t, ,
V .
satisfies the following conditions at the same time:
h ,②
u
h
, ③
t, ,
t, ,
, ④
u
t
t, ,
G,
In general, tumor tissues have high signal in at least one modality of Flair, T1c, and T2. Voxels with low
signal in Flair, T1c, and T2 at the same time are generally not tumor tissues. Thus, this step removes those
segmented tumor regions whose intensities in Flair, T1c, T2 are below 3 thresholds respectively. However,
enhancing core is an exception. In the present study,
Step 3. Let t
denote the volume of the
V h㌳,
t
volume of the maximum 3D connected tumor area in
connected segmented tumor region in
Step 5. If
h
t, ,
G
. In the present study,
and
t, ,
橔,
t
V h .
3D connected tumor area in
. If t
Step 4. Fill the holes in Re s with necrosis. Holes in
V
t
V h .
t
.
t
t
t
, remove the
t
is the
t
3D
are very likely to be necrosis.
V G , set
t, ,
V
. Our model may mistakenly label
necrosis areas as enhancing core. This step corrects this potential mistake through a threshold in T1c. In the
present study,
Step 6. Let
G
V
t
the whole tumor. If
.
denote the volume of enhancing core represented in
t
t
h
,
h
t, ,
h
, and
t, ,
, and
V , set
t
denote the volume of
t, ,
V t . Our tumor
segmentation model is not sensitive to non-enhancing core. In our model, non-enhancing regions might be
12
mistakenly labeled as edema, especially when the enhancing core region is very small. In the present study,
h 橔,
h
V ㌳橔.
h
V
The parameters were set based on the BRATS 2013 dataset. Since the number of training cases of the
BRATS 2013 is small, we did not cross-validate the parameters, therefore they are not necessarily optimal. We
used the same parameters in all of our experiments, including our experiments on BRATS 2013, 2015 and 2016.
In addition to the aforementioned post-processing steps, we could also directly use CRF as a post-processing step
of FCNNs as did in a recent study [28].
3. Experiments
Our experiments were carried out based on imaging data provided by the BRATS 2013, 2015 and 2016 on a
computing server with multiple Tesla K80 GPUs and Intel E5-2620 CPUs. However, only one GPU and one CPU
were useable at the same time for our experiments. Our deep learning models were built upon Caffe [44].
Based on the BRATS 2013 data, a series of experiments were carried out to evaluate how different
implementation of the proposed method affect tumor segmentation results with respect to CRF, post-processing,
image patch size, number of training image patches, pre-processing, and imaging scans used. We also present
segmentation results obtained for the BRATS 2013. The segmentation model was built upon the training data and
then evaluated based on the testing data. Since no ground truth segmentation result for the testing data was
provided, all the segmentation results were evaluated by the BRATS evaluation website. The tumor segmentation
performance was evaluated using the BRATS segmentation evaluation metrics for complete tumor, core region,
and enhancing region, including Dice, Positive Predictive Value (PPV), and Sensitivity. Particularly, the complete
tumor includes necrosis, edema, non-enhancing core, and enhancing core; the core region includes necrosis,
non-enhancing core, and enhancing core; and the enhancing region only includes the enhancing core. The tumor
segmentation evaluation metrics are defined as follows:
where
h
V
,
indicates complete, core or enhancing region,
segmented region,
and
,
,
V
,
,
V
,
denotes the manually labeled region,
denotes the overlap area between
and
, and
and
denotes the
denote the areas of
respectively.
3.1. Experiments on BRATS 2013 dataset
The BRATS 2013 training dataset contains 10 LGG and 20 HGG. Its testing dataset consists of two subsets,
namely Challenge and Leaderboard. The Challenge dataset has 10 HGG cases and the Leaderboard dataset
contains 21 HGG and 4 LGG.
A number of experiments were carried out based on the BRATS 2013 dataset, including 1) comparing the
segmentation performance of FCNNs with and without post-processing, and the performance of the proposed
deep learning network integrating FCNNs and CRF-RNN (hereinafter referred to as FCNN+CRF) with and
13
without post-processing, in order to validate the effectiveness of CRFs and post-processing; 2) evaluating the
segmentation performance of FCNN+CRF with 5 post-processing steps (6 post-processing steps in total), in order
to test the effectiveness of each post-processing step; 3) evaluating the segmentation performance of FCNNs
trained using different sizes of patches; 4) evaluating the segmentation performance of FCNNs trained using
different numbers of patches; 5) comparing the segmentation performance of segmentation models built upon
scans of 4 imaging sequences (Flair, T1, T1c, and T2) and 3 imaging sequences (Flair, T1c, and T2); and 6)
evaluating how the image preprocessing step affect the segmentation performance. All the above experiments
were performed in axial view. Apart from these experiments described above, we show the effectiveness of fusing
segmentation results of three views in Section 3.1.7 and summarize comparison results with other methods in
Section 3.1.8.
3.1.1. Evaluating the effectiveness of CRFs and post-processing
Table 1 shows the evaluation results of FCNNs with and without post-processing, and FCNN+CRF (our
integrated network of FCNNs and CRF-RNN) with and without post-processing on the BRATS 2013 Challenge
dataset and Leaderboard dataset. These results demonstrated that CRFs improved the segmentation accuracy and
so did the post-processing. With respect to both Dice and PPV, FCNN+post-process and FCNN+CRF improved
the segmentation performance in all complete tumor, core region, and enhancing region. However, CRFs and
post-process reduced Sensitivity. It is worth noting that CRFs improved Sensitivity of the enhancing region. In
summary, CRFs improved both the Dice and PPV and decreased the Sensitivity on the complete and core regions,
FCNN+CRF+post-process obtained the best performance with respect to Dice and PPV, but degraded the
performance with respect to the Sensitivity, especially on the complete tumor region.
We also adopted a 3D CRF based post-processing step as did in a recent study [28]. Particularly, the
parameters of the 3D CRF were optimized by grid searching based on the training dataset of BRATS 2013. Table
1 summarizes segmentation scores obtained by our method with different settings. These results indicated that 3D
CRF as a post-processing step could improve the segmentation performance as 3D information was taken into
consideration. However, our proposed post-processing procedure could further improve the segmentation
performance.
Fig. 6 shows representative segmentation results on the BRATS 2013 Challenge dataset. These segmentation
results demonstrated that FCNN+CRF could improve the spatial and appearance consistence of segmentation
results, and FCNN+CRF+post-process could reduce false positives.
Table 1. Evaluation results of FCNNs with and without post-processing, FCNN+CRF with and without post-processing, and
FCNN+3D-CRF with and without post-processing. (The sizes of image patches used to train FCNNs were 33*33*3 and
65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20. FCNN+CRF is short for the
integrated network of FCNNs and CRF-RNN)
Dataset
Methods
Challenge
FCNNs
FCNN+post-process
Dice
complete
core
0.74
0.81
0.72
0.75
PPV
enhancing complete
0.67
0.73
0.62
0.73
core
0.63
0.70
Sensitivity
enhancing complete
0.60
0.73
0.94
0.94
core
enhancing
0.86
0.85
0.77
0.74
14
Leaderboard
FCNN+CRF
FCNN+CRF+post-process
FCNN+3D-CRF
FCNN+3D-CRF
+post-process
FCNNs
FCNN+post-process
FCNN+CRF
FCNN+CRF+post-process
FCNN+3D-CRF
FCNN+3D-CRF
+post-process
0.85
0.87
0.85
0.80
0.83
0.80
0.70
0.76
0.73
0.87
0.92
0.84
0.80
0.87
0.78
0.63
0.77
0.69
0.84
0.83
0.88
0.81
0.81
0.83
0.80
0.77
0.80
0.87
0.83
0.78
0.89
0.85
0.78
0.86
0.83
0.79
0.70
0.81
0.83
0.86
0.84
0.61
0.65
0.66
0.73
0.65
0.54
0.61
0.57
0.62
0.61
0.58
0.74
0.85
0.89
0.81
0.57
0.63
0.71
0.76
0.71
0.49
0.62
0.50
0.64
0.57
0.96
0.94
0.85
0.84
0.90
0.74
0.78
0.69
0.78
0.71
0.67
0.66
0.71
0.68
0.71
0.87
0.71
0.63
0.88
0.74
0.63
0.88
0.79
0.70
Fig.6. Example segmentation results on the BRATS 2013 Challenge dataset. The first and second rows show the
segmentation results of the 50th and 80th slice of the axial view of Subject 0301. The third and fourth rows show the
segmentation results of the 40th and 70th slice of the axial view of Subject 0308. From left to right: Flair, T1c, T2,
segmentation results of FCNNs, segmentation results of FCNN+CRF, and segmentation results of FCNN+CRF+post-process.
In the segmentation results, each gray level represents a tumor class, from low to high: necrosis, edema, non-enhancing core,
and enhancing core.
3.1.2. Evaluating the effectiveness of each post-processing step
To investigate the effectiveness of each post-processing step, we obtained segmentation results of
FCNN+CRF+post-x, x=1, 2, …, 6. In particular, FCNN+CRF+post-x indicates FCNN+CRF with all other
post-processing steps except the step x. As described in section 2.3.4, our post-processing consists of 6 steps in
total. All the evaluation results are summarized in Table 2. These results indicated that the post-processing step 3
played the most important role in the tumor segmentation, although all these post-processing steps might
contribute the segmentation.
Table 2. The evaluation results of FCNN+CRF with 5 of 6 post-processing steps (FCNN+CRF+post-x indicates
FCNN+CRF with all other post-processing steps except the step x, the sizes of patches used to train FCNNs were 33*33*3
and 65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20.)
Dataset
Methods
Challenge
FCNN+CRF+post-process
FCNN+CRF+post-1
Dice
complete
core
0.87
0.87
0.83
0.83
PPV
enhancing complete
0.76
0.76
0.92
0.92
core
0.87
0.87
Sensitivity
enhancing complete core
0.77
0.77
0.83
0.83
0.81
0.81
enhancing
0.77
0.77
15
FCNN+CRF+post-2
FCNN+CRF+post-3
FCNN+CRF+post-4
FCNN+CRF+post-5
FCNN+CRF+post-6
FCNN+CRF+post-process
FCNN+CRF+post-1
FCNN+CRF+post-2
Leaderboard
FCNN+CRF+post-3
FCNN+CRF+post-4
FCNN+CRF+post-5
FCNN+CRF+post-6
0.86
0.85
0.86
0.87
0.87
0.86
0.84
0.86
0.85
0.85
0.86
0.86
0.83
0.80
0.82
0.83
0.83
0.73
0.71
0.73
0.70
0.71
0.72
0.70
0.76
0.72
0.76
0.74
0.76
0.62
0.62
0.62
0.59
0.62
0.59
0.62
0.90
0.88
0.92
0.92
0.92
0.89
0.88
0.88
0.87
0.89
0.89
0.89
0.87
0.80
0.88
0.87
0.87
0.76
0.75
0.76
0.73
0.77
0.76
0.76
0.77
0.69
0.77
0.70
0.77
0.64
0.64
0.64
0.57
0.64
0.57
0.64
0.84
0.83
0.82
0.83
0.83
0.84
0.82
0.86
0.84
0.82
0.84
0.84
0.81
0.81
0.78
0.81
0.81
0.78
0.77
0.77
0.75
0.74
0.76
0.71
0.77
0.77
0.77
0.79
0.77
0.68
0.68
0.68
0.68
0.68
0.71
0.68
3.1.3. Evaluating the impact of image patch size
We used different kernel sizes in all the pooling layers to train different FCNNs. The training image patch size
changed with the kernel size, as shown in Fig. 4, while the number of parameters in FCNNs was unchanged. We
evaluated the segmentation performance of our segmentation models with n=1,3,5, as summarized in Table 3.
When n=1,3,5, the corresponding sizes of training patches are 21*21*3 (small input patch) and 41*41*3 (large
input patch), 27*27*3 and 53*53*3, 33*33*3 and 65*65*3. Bar plots of the Dice of complete regions on the
Challenge dataset with different training patch sizes are shown in Fig. 7. These segmentation results indicated that
1) a bigger patch provided more information and helped improve FCNNs’ performance; 2) the CRF-RNN could
reduce the performance differences caused by patch size as CRF-RNN could optimize the segmentation results
according to the information in a whole image slice; and 3) the post-processing could further reduce the
performance difference caused by patch size.
Fig.7. Bar plots for the Dice of complete regions on the Challenge dataset with different training patch sizes.
Table 3. Evaluation results of our segmentation model with n=1,2,3 (The number of patches used to train FCNNs was
5000*5*20.)
Dataset
n
1
Challenge
3
5
Leaderboard
1
Methods
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
Dice
complete
core
0.70
0.83
0.86
0.71
0.83
0.86
0.74
0.85
0.87
0.64
0.62
0.78
0.83
0.67
0.77
0.82
0.72
0.80
0.83
0.54
PPV
enhancing complete
0.64
0.69
0.76
0.65
0.69
0.76
0.67
0.70
0.76
0.49
0.57
0.85
0.92
0.58
0.83
0.91
0.62
0.87
0.92
0.50
core
0.50
0.79
0.88
0.56
0.74
0.84
0.63
0.80
0.87
0.45
Sensitivity
enhancing complete core enhancing
0.55
0.63
0.77
0.57
0.63
0.78
0.60
0.63
0.77
0.42
0.94
0.83
0.82
0.95
0.85
0.84
0.94
0.84
0.83
0.96
0.87
0.79
0.80
0.86
0.82
0.82
0.86
0.81
0.81
0.76
0.79
0.79
0.77
0.78
0.79
0.76
0.77
0.80
0.77
0.71
16
3
5
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
0.82
0.85
0.67
0.83
0.86
0.70
0.83
0.86
0.65
0.72
0.57
0.66
0.72
0.61
0.66
0.73
0.57
0.61
0.52
0.57
0.62
0.54
0.57
0.62
0.83
0.88
0.54
0.82
0.88
0.58
0.85
0.89
0.70
0.76
0.50
0.67
0.74
0.57
0.71
0.76
0.51
0.59
0.45
0.51
0.60
0.49
0.50
0.64
0.85
0.84
0.96
0.87
0.86
0.96
0.85
0.84
0.69
0.76
0.75
0.72
0.79
0.74
0.69
0.78
0.72
0.70
0.70
0.71
0.69
0.67
0.71
0.68
3.1.4. Evaluating the impact of the number of image patches used to train FCNNs
The BRATS 2013 training dataset contains 10 LGG and 20 HGG. In our experiments, we trained our
segmentation model using the 20 HGG cases, and our model worked well for segmenting LGG cases. To
investigate the impact of the number of training patches on the segmentation performance, we trained FCNNs
with varied numbers of image patches. In particular, we sampled training imaging patches randomly from each
subject and kept the number of training samples for different classes equal (5 classes in total, including normal
tissue, necrosis, edema, non-enhancing core, and enhancing core). We generated 3 sets of image patches by
sampling, consisting of 1000*5*20, 3000*5*20, and 5000*5*20 patches respectively, and used them to train
different segmentation models. The evaluation results are summarized in in Table 4. Bar plots of the Dice of
complete regions on the Challenge dataset with different numbers of training patches are shown in Fig. 8.
The results shown in Table 4 and Fig.8 indicated that the brain tumor segmentation accuracy of FCNNs
increased with the increasing of the number of training patches. However, both CRFs and post-processing could
reduce the performance difference.
Fig.8. Bar plots for the Dice of complete regions on the Challenge dataset with different numbers of training image patches.
Table.4 Evaluation results of the segmentation models trained using different numbers of training image patches (the sizes of
image patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5)
Dataset
Challenge
No. of
patches
Methods
complete
FCNNs
0.71
1000*5*20
FCNN+CRF
0.84
FCNN+CRF+post-process
0.87
FCNNs
0.73
3000*5*20
FCNN+CRF
0.84
FCNN+CRF+post-process
0.86
FCNNs
0.74
5000*5*20
FCNN+CRF
0.85
FCNN+CRF+post-process
0.87
Dice
core enhancing complete
0.68
0.62
0.57
0.78
0.68
0.84
0.82
0.76
0.91
0.70
0.66
0.60
0.80
0.69
0.86
0.83
0.77
0.92
0.72
0.67
0.62
0.80
0.70
0.87
0.83
0.76
0.92
PPV
Sensitivity
core enhancing complete core enhancing
0.58
0.54
0.95
0.86
0.76
0.78
0.61
0.85
0.81
0.79
0.86
0.77
0.84
0.81
0.77
0.61
0.59
0.94
0.86
0.76
0.79
0.62
0.84
0.82
0.80
0.86
0.77
0.83
0.82
0.77
0.63
0.60
0.94
0.86
0.77
0.80
0.63
0.84
0.81
0.80
0.87
0.77
0.83
0.81
0.77
17
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
3000*5*20
FCNN+CRF
Learderboard
FCNN+CRF+post-process
FCNNs
5000*5*20
FCNN+CRF
FCNN+CRF+post-process
1000*5*20
0.66
0.83
0.86
0.69
0.83
0.85
0.70
0.83
0.86
0.58
0.65
0.72
0.60
0.65
0.72
0.61
0.66
0.73
0.51
0.56
0.61
0.52
0.56
0.61
0.54
0.57
0.62
0.53
0.82
0.88
0.57
0.84
0.89
0.58
0.85
0.89
0.53
0.71
0.76
0.56
0.70
0.75
0.57
0.71
0.76
0.45
0.51
0.63
0.47
0.49
0.59
0.49
0.50
0.64
0.96
0.86
0.85
0.96
0.85
0.84
0.96
0.85
0.84
0.74
0.69
0.77
0.74
0.69
0.77
0.74
0.69
0.78
0.67
0.70
0.68
0.67
0.71
0.68
0.67
0.71
0.68
In summary, all the experimental results demonstrated that both CRFs and the post-processing method can
narrow the performance difference caused by training patch sizes and training patch numbers, indicating that
CRFs and the post-processing method might be able to narrow the performance difference caused by other
training tricks. We will confirm this inference in our future work.
3.1.5. Performance Comparison between segmentation models built upon 4 and 3 imaging modalities
We also built a segmentation model using all available 4 imaging modalities, i.e., Flair, T1, T1c, and T2, and
compared its segmentation performance with that of the segmentation model built upon 3 imaging modalities, i.e.,
Flair, T1c, and T2. The segmentation results of these segmentation models are summarized in Table 5. These
results demonstrated that these two segmentation models achieved similar performance, indicating that a
segmentation model built upon Flair, T1c, and T2 could achieve competitive performance as the model built upon
4 imaging modalities.
Table.5 Performance comparison of segmentation models built upon scans of 4 imaging modalities and 3 imaging modalities
(the sizes of patches used to train FCNNs were 33*33*4 and 65*65*4, or 33*33*3 and 65*65*3 respectively, n=5, and the
number of patches used to train FCNNs was 5000*5*20)
Dataset
No. of
modalities
4
Challenge
3
4
Learderboard
3
Methods
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
complete
0.74
0.85
0.87
0.74
0.85
0.87
0.69
0.82
0.85
0.70
0.83
0.86
Dice
PPV
Sensitivity
core enhancing complete core enhancing complete core enhancing
0.72
0.67
0.61
0.64
0.60
0.95
0.86
0.77
0.80
0.71
0.85
0.79
0.67
0.87
0.82
0.78
0.83
0.76
0.91
0.85
0.78
0.84
0.82
0.76
0.72
0.67
0.62
0.63
0.60
0.94
0.86
0.77
0.80
0.70
0.87
0.80
0.63
0.84
0.81
0.80
0.83
0.76
0.92
0.87
0.77
0.83
0.81
0.77
0.59
0.55
0.57
0.56
0.49
0.95
0.72
0.68
0.64
0.58
0.82
0.70
0.55
0.85
0.67
0.68
0.74
0.62
0.89
0.75
0.62
0.83
0.79
0.66
0.61
0.54
0.58
0.57
0.49
0.96
0.74
0.67
0.66
0.57
0.85
0.71
0.50
0.85
0.69
0.71
0.73
0.62
0.89
0.76
0.64
0.84
0.78
0.68
3.1.6. Evaluation of different pre-processing strategies on the tumor segmentation
We preprocessed the imaging data using our robust deviation based intensity normalization and the standard
deviation based intensity normalization [8], and then evaluated segmentation models built on them separately. As
the results shown in Table 6 indicated, the robust deviation based intensity normalization could slightly improve
the segmentation performance.
Table.6 Performance comparison of segmentation models built upon images normalized by the robust deviation and the
standard deviation (the sizes of patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5, and the number
of patches used to train FCNNs was 5000*5*20)
Dataset
Deviation
Methods
standard
FCNNs
FCNN+CRF
Dice
PPV
Sensitivity
complete core enhancing complete core enhancing complete core enhancing
0.73
0.69
0.67
0.61
0.60
0.61
0.94
0.86
0.75
0.84
0.80
0.71
0.87
0.79
0.68
0.82
0.82
0.75
18
Challenge
FCNN+CRF+post-process
FCNNs
robust
FCNN+CRF
FCNN+CRF+post-process
FCNNs
standard
FCNN+CRF
FCNN+CRF+post-process
Learderboard
FCNNs
robust
FCNN+CRF
FCNN+CRF+post-process
0.86
0.74
0.85
0.87
0.69
0.83
0.86
0.70
0.83
0.86
0.83
0.72
0.80
0.83
0.60
0.66
0.73
0.61
0.66
0.73
0.76
0.67
0.70
0.76
0.54
0.58
0.61
0.54
0.57
0.62
0.93
0.62
0.87
0.92
0.57
0.85
0.89
0.58
0.85
0.89
0.86
0.63
0.80
0.87
0.55
0.71
0.75
0.57
0.71
0.76
0.80
0.60
0.63
0.77
0.50
0.56
0.66
0.49
0.50
0.64
0.81
0.94
0.84
0.83
0.97
0.85
0.84
0.96
0.85
0.84
0.81
0.86
0.81
0.81
0.75
0.70
0.78
0.74
0.69
0.78
0.74
0.77
0.80
0.77
0.67
0.67
0.66
0.67
0.71
0.68
3.1.7. Evaluating the effectiveness of fusing the segmentation results gotten in three views
We trained 3 segmentation models using patches and slices obtained in axial, coronal and sagittal views
respectively. During testing, we used these three models to segment brain images from 3 views and got three
segmentation results. The results of different views were fused and the evaluation results are shown in Table 7.
Evaluation results in Table 7 indicated that, for both Challenge and Leaderboard datasets, fusing the
segmentation results typically led to better segmentation performance without the post-processing procedure.
However, the improvement became insignificant after the post-processing procedure was applied to the
segmentation results.
Table.7 Evaluations of segmentation results obtained in axial, coronal, sagittal views before and after post-processing, and
evaluations of fusion results before and after post-processing (the sizes of patches used to train FCNNs were 33*33*3 and
65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20)
Dataset
2013
Methods
FCNN+CRF
Challenge
fusing (FCNN+CRF)
axial
coronal
sagittal
fusing (FCNN+CRF)+post-process
axial
FCNN+CRF
coronal
sagittal
fusing (FCNN+CRF)
axial
FCNN+CRF+post-process
coronal
sagittal
fusing (FCNN+CRF)+post-process
FCNN+CRF+post-process
Learderboard
axial
coronal
sagittal
complete
0.85
0.82
0.83
0.85
0.87
0.87
0.87
0.88
0.83
0.80
0.80
0.84
0.86
0.86
0.84
0.86
Dice
PPV
Sensitivity
core enhancing complete core enhancing complete core enhancing
0.80
0.70
0.87
0.80
0.63
0.84
0.81
0.80
0.80
0.70
0.77
0.78
0.62
0.90
0.83
0.82
0.80
0.71
0.80
0.79
0.64
0.87
0.83
0.82
0.83
0.74
0.85
0.84
0.68
0.88
0.82
0.82
0.83
0.76
0.92
0.87
0.77
0.83
0.81
0.77
0.82
0.76
0.86
0.83
0.74
0.89
0.83
0.79
0.82
0.77
0.88
0.83
0.75
0.86
0.82
0.79
0.84
0.77
0.90
0.87
0.76
0.86
0.82
0.80
0.66
0.57
0.85
0.71
0.50
0.85
0.69
0.71
0.65
0.56
0.75
0.69
0.50
0.90
0.69
0.70
0.66
0.55
0.78
0.69
0.49
0.86
0.69
0.70
0.67
0.60
0.84
0.74
0.54
0.87
0.68
0.72
0.73
0.62
0.89
0.76
0.64
0.84
0.78
0.68
0.73
0.62
0.86
0.73
0.60
0.89
0.79
0.67
0.71
0.60
0.85
0.74
0.59
0.84
0.74
0.67
0.73
0.62
0.89
0.77
0.60
0.85
0.77
0.69
3.1.8. Comparison with other methods
Comparison results with other methods are summarized in Table 8. In particular, evaluation results of the top
ranked methods participated in the BRATS 2013, shown on the BRATS 2013 website, are summarized in Table 8,
along with the results of our method and other two state of art methods. Particularly, the method proposed by
Sergio Pereira et al [31] ranked first on the Challenge dataset and second on the Leaderboard dataset right now,
while our method ranked second on the Challenge dataset and first on the Leaderboard dataset right now. In
general, it took 2-4 min for one of the three views of our method to segment one subject’s imaging data. We do
19
not have an accurate estimation of the training time for our segmentation models since we used a shared GPU
server. On the shared GPU server, it took ~12 days to train our segmentation models.
Table. 8 Comparisons with other methods on BRATS 2013 dataset
Dataset
Challenge
Leaderboard
Methods
Nick Tustison
Raphael Meier
Syed Reza
Mohammad Havaei[30]
Sergio Pereira[31]
Our method(axial)
Our method(coronal)
Our method(sagittal)
Our method(fusing)
Nick Tustison
Liang Zhao
Raphael Meier
Mohammad Havaei[30]
Sergio Pereira[31]
Our method(axial)
Our method(coronal)
Our method(sagittal)
Our method(fusing)
complete
0.87
0.82
0.83
0.88
0.88
0.87
0.87
0.87
0.88
0.79
0.79
0.72
0.84
0.84
0.86
0.86
0.84
0.86
Dice
core
0.78
0.73
0.72
0.79
0.83
0.83
0.82
0.82
0.84
0.65
0.59
0.60
0.71
0.72
0.73
0.73
0.71
0.73
Positive Predictive Value
enhancing complete core
enhancing
0.74
0.85
0.74
0.69
0.69
0.76
0.78
0.71
0.72
0.82
0.81
0.70
0.73
0.89
0.79
0.68
0.77
0.88
0.87
0.74
0.76
0.92
0.87
0.77
0.76
0.86
0.83
0.74
0.77
0.88
0.83
0.75
0.77
0.90
0.87
0.76
0.53
0.83
0.70
0.51
0.47
0.77
0.55
0.50
0.53
0.65
0.62
0.48
0.57
0.88
0.79
0.54
0.62
0.85
0.82
0.60
0.62
0.89
0.76
0.64
0.62
0.86
0.73
0.60
0.60
0.85
0.74
0.59
0.62
0.89
0.77
0.60
complete
0.89
0.92
0.86
0.87
0.89
0.83
0.89
0.86
0.86
0.81
0.85
0.88
0.84
0.86
0.84
0.89
0.84
0.85
Sensitivity
core
enhancing
0.88
0.83
0.72
0.73
0.69
0.76
0.79
0.80
0.83
0.81
0.81
0.77
0.83
0.79
0.82
0.79
0.82
0.80
0.73
0.66
0.77
0.53
0.69
0.64
0.72
0.68
0.76
0.68
0.78
0.68
0.79
0.67
0.74
0.67
0.77
0.69
3.2. Segmentation performance on the BRATS 2015
The BRATS 2015 training dataset contains 54 LGG and 220 HGG, and its testing dataset contains 110 cases with
unknown grades. All the training cases in BRATS 2013 are reused in BRATS 2015 as a subset of its training
dataset. As what we have done in our experiments with BRATS 2013 dataset, we just used HGG training cases to
train our segmentation models in this section. We extracted 1000*5 patches from each of 220 HGG to train
FCNNs and initialed the CRF-RNN by the CRF-RNN trained by BRATS 2013 dataset. The whole network was
fine-tuned using slices in BRATS 2013 training dataset, which is a subset of BRATS 2015 training dataset. The
evaluation results of BRATS 2015 testing dataset are shown in Table 9, including evaluations of segmentation
results that were segmented by the models trained by BRATS 2013 training dataset and evaluations of
segmentation results that were segmented by the models trained in this section.
The results shown in Table. 9 indicated that fusing the segmentation results of multi-views could improve the
segmentation accuracy. These results also indicated that a larger training dataset might improve the segmentation
performance.
Table.9 Evaluation results of 110 testing cases in BRATS 2015 testing dataset (the sizes of image patches used to train
FCNNs were 33*33*3 and 65*65*3 respectively, n=5)
Methods
FCNN+CRF
axial
coronal
sagittal
Models
trained based
fusing (FCNN+CRF)
on the BRATS
axial
2013 training
FCNN+CRF+post-process
coronal
dataset
sagittal
fusing (FCNN+CRF)+post-process
complete
0.77
0.74
0.74
0.79
0.78
0.78
0.77
0.81
Dice
PPV
Sensitivity
core enhancing complete core enhancing complete core enhancing
0.56
0.52
0.85
0.71
0.46
0.74
0.53
0.67
0.53
0.48
0.70
0.69
0.44
0.84
0.50
0.65
0.54
0.49
0.74
0.67
0.43
0.78
0.52
0.66
0.56
0.56
0.82
0.78
0.52
0.79
0.50
0.68
0.64
0.58
0.87
0.75
0.57
0.73
0.61
0.65
0.61
0.57
0.77
0.68
0.58
0.84
0.63
0.63
0.62
0.57
0.80
0.71
0.56
0.78
0.60
0.63
0.65
0.60
0.87
0.79
0.60
0.78
0.61
0.65
20
FCNN+CRF
axial
coronal
sagittal
Models
trained based
fusing (FCNN+CRF)
on the BRATS
axial
2015 training
FCNN+CRF+post-process
coronal
dataset
sagittal
fusing (FCNN+CRF)+post-process
0.78
0.77
0.76
0.80
0.80
0.80
0.78
0.82
0.64
0.66
0.63
0.66
0.68
0.69
0.69
0.72
0.54
0.56
0.47
0.57
0.61
0.61
0.57
0.62
0.78
0.73
0.75
0.81
0.82
0.77
0.80
0.84
0.76
0.73
0.71
0.79
0.75
0.70
0.74
0.78
0.48
0.52
0.38
0.50
0.59
0.61
0.51
0.60
0.81
0.86
0.80
0.83
0.81
0.87
0.80
0.83
0.62
0.67
0.63
0.64
0.71
0.76
0.71
0.73
0.71
0.67
0.75
0.72
0.68
0.65
0.72
0.69
There were only 53 testing cases available during the BRATS 2015, but now there are 110 testing cases.
Therefore, we are not able to directly compare our method with the methods that participated in the BRATS 2015.
We are aware that K. Kamnitses et al [28] have published their evaluation results with 110 BRATS 2015 testing
cases. The comparisons with K. Kamnitses et al’s method are shown in Table 10.
Table. 10 Comparisons with other methods on BRATS 2015 dataset
Dataset
Methods
BRATS
2015 testing
dataset
DeepMedic+CRF[28]
Our method(axial)
Our method(coronal)
Our method(sagittal)
Our method(fusing)
Our FCNN(axial)+3D CRF
Our FCNN(coronal)+3D CRF
Our FCNN(sagittal)+3D CRF
Our FCNN+3D CRF (fusing)
complete
0.847
0.80
0.80
0.78
0.82
0.84
0.83
0.82
0.84
Dice
core
0.67
0.68
0.69
0.69
0.72
0.72
0.72
0.72
0.73
Positive Predictive Value
enhancing complete core
enhancing
0.629
0.85
0.848
0.634
0.61
0.82
0.75
0.59
0.61
0.77
0.70
0.61
0.57
0.80
0.74
0.51
0.62
0.84
0.78
0.60
0.62
0.88
0.75
0.62
0.62
0.88
0.75
0.62
0.60
0.88
0.75
0.59
0.62
0.89
0.76
0.63
complete
0.876
0.81
0.87
0.80
0.83
0.82
0.82
0.81
0.82
Sensitivity
core
enhancing
0.607
0.662
0.71
0.68
0.76
0.65
0.71
0.72
0.73
0.69
0.76
0.67
0.75
0.66
0.76
0.67
0.76
0.67
3.3. Segmentation performance on the BRATS 2016
We also participated in the BRATS 2016. However, during the competition we just segmented brain images in
axial view. Since the BRATS 2016 shares the same training dataset with BRATS 2015, we used the same
segmentation models trained based on the BRATS 2015 training dataset. The BRATS 2015 training dataset has
been pre-processed with rigid registration, bias field correction and skull stripping. However, the BRATS 2016
test dataset contains a number of unprocessed or partially pre-processed images [45], as shown in Fig. 9. To
reduce false positives caused by incomplete pre-processing, apart from the post-processing steps described in
Section 2.3.4, we manually placed rectangular bounding boxes around tumors in images and applied the
post-processing step 2 to the segmentation results. Among 19 teams participated in the BRATS 2016, we ranked
first on the multi-temporal evaluation. The ranking details of our method are shown in Table.11.
Fig.9 An example of partial skull stripping case in BRATS 2016 testing dataset. From left to right: Flair, T1c, T2
21
Table. 11 The ranking details of our method on different items on BRAST 2016 (including tie)
Items
Ranking
complete
4
Dice
core
3
Tumor Segmentation
enhancing
1
complete
7
Hausdorff
core
enhancing
6
2
Multi-temporal
evaluation
1
4. Discussions and Conclusion
In this study, we proposed a novel deep learning based brain tumor segmentation method by integrating Fully
Convolutional Neural Networks (FCNNs) and Conditional Random Fields (CRFs) in a unified framework. This
integrated model was designed to obtain tumor segmentation results with appearance and spatial consistency. In
our method, we used CRF-RNN to implement CRFs [18], facilitating easy training of both FCNNs and CRFs as
one deep network, rather than using CRFs as a post-processing step of FCNNs. Our integrated deep learning
model was trained in 3 steps, using image patches and slices respectively. In the first step, image patches were
used to train FCNNs. These image patches were randomly sampled from the training dataset and the same number
of image patches for each class was used as training image patches, in order to avoid the data imbalance problem.
In the second step, image slices were used to train the following CRF-RNN, with parameters of FCNNs fixed. In
the third step, image slices were used to fine-tune the whole network. Particularly, we train 3 segmentation models
using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine them to
segment brain tumors using a voting based fusion strategy. Our experimental results also indicated that the
integration of FCNNs and CRF-RNN could improve the segmentation robustness to parameters involved in the
model training, such as image patch size and the number of training image patches. Our experimental results also
demonstrated that a tumor segmentation model built upon Flair, T1c, and T2 scans achieved competitive
performance as those built upon Flair, T1, T1c, and T2 scans.
We also proposed a simple pre-processing strategy and a simple post-processing strategy. We pre-processed
each MR scan using N4ITK and intensity normalization, which normalized each MR image’s intensity mainly by
subtracting the gray-value of the highest frequency and dividing the robust deviation. The results shown in Fig. 1
and Fig. 2 demonstrated that the proposed intensity normalization method could make different MRI scans
comparable, i.e., similar intensity values characterize similar brain tissues across scans. We post-processed the
segmentation results by removing small 3D-connected regions and correcting false labels by simple thresholding
method. Our experimental results have demonstrated that these strategies could improve the tumor segmentation
performance.
Our method has achieved promising performance on the BRATS 2013 and BRATS 2015 testing dataset.
Different from other top ranked methods, our method could achieve competitive performance with only 3 imaging
modalities (Flair, T1c, and T2), rather than 4 (Flair, T1, T1c, and T2). We also participated in the BRATS 2016
and our method ranked first on its multi-temporal evaluation.
22
Our method is built upon 2D FCNNs and CRF-RNN to achieve computational efficiency. For training
CRF-RNN and fine-tuning the integrated FCNNs and CRF-RNN, we use image slices as training data. However,
in image slices, the numbers of pixels for different classes are different, which may worsen the segmentation
performance of the trained network. To partially overcome the imbalanced training data problem, we trained
CRF-RNN with the parameters of FCNNs were fixed so that the CRF-RNN are trained to optimize the appearance
and spatial consistency of segmentation results. Such a strategy in conjunct with a fine-tuning of the whole
network with a small learning rate improved the tumor segmentation performance. However, 2D CNNs are not
equipped to take full advantage of 3D information of the MRI data [28, 29]. Our experimental results have
demonstrated adopting 3D CRF as a post-processing step could improve the tumor segmentation performance.
Our ongoing study is to build a fully 3D network to further improve the tumor segmentation performance.
Acknowledgements
This work was supported in part by the National High Technology Research and Development Program of China
(2015AA020504), the National Natural Science Foundation of China under Grant Nos. 61572499, 61421004,
61473296, and NIH grants EB022573, CA189523.
References
[1] S. Bauer, R. Wiest, L.-P. Nolte, and M. Reyes, "A survey of MRI-based medical image analysis for brain tumor studies,"
Physics in medicine and biology, vol. 58, pp. 97-129, 2013.
[2] M. Goetz, C. Weber, F. Binczyk, J. Polanska, R. Tarnawski, B. Bobek-Billewicz, et al., "DALSA: domain adaptation for
supervised learning from sparsely annotated MR images," IEEE transactions on medical imaging, vol. 35, pp. 184-196,
2016.
[3] B. H. Menze, A. Jakab, S. Bauer, J. Kalpathy-Cramer, K. Farahani, J. Kirby, et al., "The multimodal brain tumor image
segmentation benchmark (BRATS)," IEEE Transactions on Medical Imaging, vol. 34, pp. 1993-2024, 2015.
[4] A. Gooya, K. M. Pohl, M. Bilello, L. Cirillo, G. Biros, E. R. Melhem, et al., "GLISTR: glioma image segmentation and
registration," IEEE transactions on medical imaging, vol. 31, pp. 1941-1954, 2012.
[5] M. B. Cuadra, C. Pollo, A. Bardera, O. Cuisenaire, J.-G. Villemure, and J.-P. Thiran, "Atlas-based segmentation of
pathological MR brain images using a model of lesion growth," IEEE transactions on medical imaging, vol. 23, pp.
1301-1314, 2004.
[6] B. H. Menze, K. Van Leemput, D. Lashkari, M.-A. Weber, N. Ayache, and P. Golland, "A generative model for brain
tumor segmentation in multi-modal images," in International Conference on Medical Image Computing and
Computer-Assisted Intervention, 2010, pp. 151-159.
[7] M. Prastawa, E. Bullitt, S. Ho, and G. Gerig, "A brain tumor segmentation framework based on outlier detection,"
Medical image analysis, vol. 8, pp. 275-283, 2004.
[8] M. Goetz, C. Weber, J. Bloecher, B. Stieltjes, H.-P. Meinzer, and K. Maier-Hein, "Extremely randomized trees based
brain tumor segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 6-11, 2014.
[9] S. M. S. Reza and K. M. Iftekharuddin, "Improved brain tumor tissue segmentation using texture features," Proceedings
MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 27-30, 2014.
[10] J. Kleesiek, A. Biller, G. Urban, U. Kothe, M. Bendszus, and F. Hamprecht, "Ilastik for multi-modal brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 12-17, 2014.
[11] S. Ruan, S. Lebonvallet, A. Merabet, and J.-M. Constans, "Tumor segmentation from a multispectral MRI images by
using support vector machine classification," in 2007 4th IEEE International Symposium on Biomedical Imaging: From
Nano to Macro, 2007, pp. 1236-1239.
[12] H. Li and Y. Fan, "Label propagation with robust initialization for brain tumor segmentation," in 2012 9th IEEE
International Symposium on Biomedical Imaging (ISBI), 2012, pp. 1715-1718.
23
[13] H. Li, M. Song, and Y. Fan, "Segmentation of brain tumors in multi-parametric MR images via robust statistic
information propagation," in Asian Conference on Computer Vision, 2010, pp. 606-617.
[14] R. Meier, S. Bauer, J. Slotboom, R. Wiest, and M. Reyes, "Appearance- and context-sensitive features for brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 20-26, 2014.
[15] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in
Advances in neural information processing systems, 2012, pp. 1097-1105.
[16] R. Girshick, J. Donahue, T. Darrell, and J. Malik, "Rich feature hierarchies for accurate object detection and semantic
segmentation," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 580-587.
[17] J. Long, E. Shelhamer, and T. Darrell, "Fully convolutional networks for semantic segmentation," in Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3431-3440.
[18] S. Zheng, S. Jayasumana, B. Romera-Paredes, V. Vineet, Z. Su, D. Du, et al., "Conditional random fields as recurrent
neural networks," in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 1529-1537.
[19] Z. Liu, X. Li, P. Luo, C.-C. Loy, and X. Tang, "Semantic image segmentation via deep parsing network," in Proceedings
of the IEEE International Conference on Computer Vision, 2015, pp. 1377-1385.
[20] D. Zikic, Y. Ioannou, M. Brown, and A. Criminisi, "Segmentation of brain tumor tissues with convolutional neural
networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 36-39, 2014.
[21] A. Davy, M. Havaei, D. Warde-farley, A. Biard, L. Tran, P.-M. Jodoin, et al., "Brain tumor segmentation with deep
neural networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 1-5, 2014.
[22] G. Urban, M. Bendszus, F. Hamprecht, and J. Kleesiek, "Multi-modal brain tumor segmentatioin using deep
convolutional neural networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 31-35, 2014.
[23] P. Dvorak and B. H. Menze, "Structured prediction with convolutional neural networks for multimodal brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 13-24, 2015.
[24] M. Havaei, F. Dutil, C. Pal, H. Larochelle, and P.-M. Jodoin, "A convolutional neural network approach to brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 29-33, 2015.
[25] S. Pereira, A. Pinto, V. Alves, and C. A. Silva, "Deep convolutional neural networks for the segmentatin of gliomas in
multi-sequence MRI," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 52-55, 2015.
[26] M. Agn, O. Puonti, I. Law, P. M. a. Rosenschold, and K. V. Leemput, "Brain tumor segmentation by a generative model
with a prior on tumor shape," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 1-4, 2015.
[27] K. Vaidhya, R. Santhosh, S. Thirunavukkarasu, V. Alex, and G. Krishnamurthi, "Multi-modal brain tumor segmentation
using stacked denoising autoencoders," in Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), 2015,
pp. 60-64.
[28] K. Kamnitsas, C. Ledig, V. F. Newcombe, J. P. Simpson, A. D. Kane, D. K. Menon, et al., "Efficient multi-scale 3D
CNN with fully connected CRF for accurate brain lesion segmentation," Medical Image Analysis, vol. 36, pp. 61-78,
2017.
[29] D. Yi, M. Zhou, Z. Chen, and O. Gevaert, "3-D Convolutional Neural Networks for Glioblastoma Segmentation," arXiv
preprint arXiv:1611.04534, 2016.
[30] M. Havaei, A. Davy, D. Warde-Farley, A. Biard, A. Courville, Y. Bengio, et al., "Brain tumor segmentation with deep
neural networks," Medical image analysis, vol. 35, pp. 18-31, 2017.
[31] S. Pereira, A. Pinto, V. Alves, and C. A. Silva, "Brain tumor segmentation using convolutional neural networks in MRI
images," IEEE transactions on medical imaging, vol. 35, pp. 1240-1251, 2016.
[32] K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," arXiv preprint
arXiv:1409.1556, 2014.
[33] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille, "Semantic image segmentation with deep
convolutional nets and fully connected crfs," arXiv preprint arXiv:1412.7062, 2014.
[34] A. Prasoon, K. Petersen, C. Igel, F. Lauze, E. Dam, and M. Nielsen, "Deep feature learning for knee cartilage
segmentation using a triplanar convolutional neural network," in International conference on medical image computing
and computer-assisted intervention, 2013, pp. 246-253.
[35] K. Fritscher, P. Raudaschl, P. Zaffino, M. F. Spadea, G. C. Sharp, and R. Schubert, "Deep Neural Networks for Fast
Segmentation of 3D Medical Images," in International Conference on Medical Image Computing and
Computer-Assisted Intervention, 2016, pp. 158-165.
[36] A. A. A. Setio, F. Ciompi, G. Litjens, P. Gerke, C. Jacobs, S. J. van Riel, et al., "Pulmonary nodule detection in CT
images: false positive reduction using multi-view convolutional networks," IEEE transactions on medical imaging, vol.
35, pp. 1160-1169, 2016.
[37] X. Zhao, Y. Wu, G. Song, Z. Li, Y. Fan, and Y. Zhang, "Brain Tumor Segmentation Using a Fully Convolutional Neural
Network with Conditional Random Fields," in International Workshop on Brainlesion: Glioma, Multiple Sclerosis,
Stroke and Traumatic Brain Injuries, 2016, pp. 75-87.
24
[38] W. Zhang, R. Li, H. Deng, L. Wang, W. Lin, S. Ji, et al., "Deep convolutional neural networks for multi-modality
isointense infant brain image segmentation," NeuroImage, vol. 108, pp. 214-224, 2015.
[39] P. Moeskops, M. A. Viergever, A. M. Mendrik, L. S. de Vries, M. J. Benders, and I. Išgum, "Automatic segmentation of
MR brain images with a convolutional neural network," IEEE transactions on medical imaging, vol. 35, pp. 1252-1261,
2016.
[40] A. de Brebisson and G. Montana, "Deep neural networks for anatomical brain segmentation," in Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015, pp. 20-28.
[41] N. J. Tustison, B. B. Avants, P. A. Cook, Y. Zheng, A. Egan, P. A. Yushkevich, et al., "N4ITK: improved N3 bias
correction," IEEE transactions on medical imaging, vol. 29, pp. 1310-1320, 2010.
[42] R. D. Fields, "Change in the brain's white matter," Science, vol. 330, pp. 768-769, 2010.
[43] P. Krahenbuhl and V. Koltun, "Efficient inference in fully connected crfs with gaussian edge potentials," NIPS, 2011.
[44] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, et al., "Caffe: Convolutional architecture for fast
feature embedding," in Proceedings of the 22nd ACM international conference on Multimedia, 2014, pp. 675-678.
[45] L. Le Folgoc, A. V. Nori, S. Ancha, and A. Criminisi, "Lifted Auto-Context Forests for Brain Tumour Segmentation," in
International Workshop on Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2016, pp.
171-183.
25
| 1cs.CV
|
A COPULA APPROACH FOR DEPENDENCE MODELING IN
MULTIVARIATE NONPARAMETRIC TIME SERIES
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
arXiv:1705.07605v1 [math.ST] 22 May 2017
1
Department of Mathematics, University of Hamburg, Bundesstrasse 55, 20146 Hamburg,
Germany
2 Department of Probability and Statistics, Faculty of Mathematics and Physics, Charles
University, Sokolovská 83, 186 75 Praha 8, Czech Republic
May 23, 2017
Abstract. This paper is concerned with modeling the dependence structure of two (or
more) time-series in the presence of a (possible multivariate) covariate which may include past
values of the time series. We assume that the covariate influences only the conditional mean
and the conditional variance of each of the time series but the distribution of the standardized
innovations is not influenced by the covariate and is stable in time. The joint distribution
of the time series is then determined by the conditional means, the conditional variances
and the marginal distributions of the innovations, which we estimate nonparametrically, and
the copula of the innovations, which represents the dependency structure. We consider a
nonparametric as well as a semi-parametric estimator based on the estimated residuals. We
show that under suitable assumptions these copula estimators are asymptotically equivalent
to estimators that would be based on the unobserved innovations. The theoretical results
are illustrated by simulations and a real data example.
Keywords and phrases: Asymptotic representation; CHARN model; empirical copula process;
goodness-of-fit testing; nonparametric AR-ARCH model; nonparametric SCOMDY model;
weak convergence.
1. Introduction
Modeling the dependency of k observed time series can be of utmost importance for applications, e. g. in risk management (for instance to model the dependence between several
exchange rates). We will take the approach to model k dependent nonparametric AR-ARCH
time series
Yji = mj (X i ) + σj (X i ) εji , i = 1, . . . , n, j = 1, . . . , k,
where the covariate X i may include past values of the process, Yj i−1 , Yj i−2 , . . . (j = 1, . . . , k),
or other exogenous variables. Further the innovations (ε1i , . . . , εki ), i ∈ Z, are assumed to
be independent and identically distributed random vectors and (ε1i , . . . , εki ) is independent
∗
The second and the third authors gratefully acknowledge support from the grant GACR 15-04774Y.
1
2
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
of the past and present covariates X ` , ` ≤ i, ∀i. For identifiability we assume E εji = 0,
var(εji ) = 1 (j = 1, . . . , k), such that the functions mj and σj represent the conditional
mean and volatility function in the jth time series. Such models are also called multivariate
nonparametric CHARN (conditional heteroscedastic autoregressive nonlinear) models and
have gained much attention over the last decades, see Fan and Yao (2005) and Gao (2007)
for extensive overviews.
Note that due to the structure of the model and Sklar’s theorem (see e.g., Nelsen, 2006),
for zj = (yj − mj (x))/σj (x) (j = 1, . . . , k) one has
P(Y1i ≤ y1 , . . . , Yki ≤ yk | X i = x) = P(ε1i ≤ z1 , . . . , εki ≤ zk ) = C(F1ε (z1 ), . . . , Fkε (zk )),
where Fjε (j = 1, . . . , k) denote the marginal distributions of the innovations and C their
copula. Thus the joint conditional distribution of the observations, given the covariate, is
completely specified by the individual conditional mean and variance functions, the marginal
distributions of the innovations, and their copula. The copula C describes the dependence
structure of the k time series, conditional on the covariates, after removing influences of the
conditional means and variances as well as marginal distributions.
We will model the conditional mean and variance function nonparametrically like Härdle
et al. (1998), among others. Semiparametric estimation, e. g. with additive structure for mj
and multiplicative structure for σj2 as in Yang et al. (1999) can be considered as well and
all presented results remain valid under appropriate changes for the estimators and assumptions. Further we will model the marginal distributions of the innovations nonparametrically,
whereas we will take two different approaches to estimate the copula C: nonparametrically
and parametrically. As the innovations are not observable, both estimators will be based
on estimated residuals. We will show that the asymptotic distribution is not affected by
the necessary pre-estimation of the mean and variance functions. This remarkable result is
intrinsic for copula estimation, while the asymptotic distribution of empirical distribution
functions is typically influenced by pre-estimation of mean and variance functions. Moreover,
comparison of the nonparametric and parametric copula estimator gives us the possibility to
test goodness-of-fit of a parametric class of copulas.
Our approach extends the following parametric and semiparametric approaches in time
series contexts. Chen and Fan (2006) introduced SCOMDY (semiparametric copula-based
multivariate dynamic) models, which are very similar to the model considered here. However,
the conditional mean and variance functions are modeled parametrically, while the marginal
distributions of innovations are estimated nonparametrically and a parametric copula model
is applied to model the dependence. See also Kim et al. (2007) for similar methods for some
parametric time series models including nonlinear GARCH models, Rémillard et al. (2012),
Kim et al. (2008) and the review by Patton (2012). Chan et al. (2009) give a goodness-of fit
test for the innovation copula in the GARCH context. Further, in an i.i.d. setting Gijbels et al.
A COPULA APPROACH FOR DEPENDENCE MODELING
3
(2015) show that in nonparametric location-scale models the asymptotic distribution of the
empirical copula is not influenced by pre-estimation of the mean and variance function. This
results was further generalized by Portier and Segers (2015) to a completely nonparametric
model for the marginals.
The remainder of the paper is organized as follows. In Section 2 we define the estimators and
state some regularity assumptions. In Subsection 2.1 we show weak convergence of the copula
process, while in Subsection 2.2 we show asymptotic normality of a parameter estimator when
considering a parametric class of copulas. Subsection 2.3 is devoted to goodness-of-fit testing.
In Section 3 we present simulation results and in Section 4 a real data example. All proofs
are given in the Appendix.
2. Main results
For the ease of presentation we will focus on the case of two time series, i. e. k = 2, but all
results can be extended to general k ≥ 2 in an obvious manner. Suppose we have observed
for i = 1, . . . , n a section of the stationary stochastic process Y1i , Y2i , X i i∈Z that satisfies
(1)
Y1i = m1 (X i ) + σ1 (X i ) ε1i ,
Y2i = m2 (X i ) + σ2 (X i ) ε2i ,
i = 1, . . . , n,
where X i = (Xi1 , . . . , Xid )T is a d-dimensional covariate and the innovations (ε1i , ε2i ) i∈Z
are independent identically distributed random vectors. Further (ε1i , ε2i ) is independent of
the past and present covariates X k , k ≤ i, ∀i, and E ε1i = E ε2i = 0, var(ε1i ) = var(ε2i ) = 1.
If the marginal distribution functions F1ε and F2ε of the innovations are continuous, then the
copula function C of the innovations is unique and can be expressed as
(2)
−1
−1
(u2 ) ,
C(u1 , u2 ) = Fε F1ε
(u1 ), F2ε
(u1 , u2 ) ∈ [0, 1]2 .
As the innovations (ε1i , ε2i ) are unobserved, the inference about the copula function C is
based on the estimated residuals
(3)
εbji =
Yji − m
b j (X i )
,
σ
bj (X i )
i = 1, . . . , n,
j = 1, 2,
where m
b j and σ
bj are the estimates of the unknown functions mj and σj . In what follows
we will consider the local polynomial estimators of order p; see Fan and Gijbels (1996) or
Masry (1996), among others. I.e. m
b j (x) is for a given x = (x1 , . . . , xd )T defined as βb0 , the
b with multi-index 0 = (0, . . . , 0), where β
b is the solution to the minimization
component of β
problem
(4)
min
β=(βi )i∈I
n h
X
X
i 2
Yj` −
βi ψi,hn X ` − x Khn (X ` − x).
`=1
i∈I
4
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
Here I = I(d, p) denotes the set of multi-indices i = (i1 , . . . , id ) with i. = i1 + · · · + id ≤ p and
ik 1
Q
k
ψi,hn (x) = dk=1 x(k)
ik ! . Further
hn
Khn (X ` − x) =
d
Y
(k)
k=1
with k being a kernel function and hn =
Further σj2 (x) is estimated as
1
hn
k
X`k −xk
(k)
hn
(1)
(d)
hn , . . . , hn
,
the smoothing parameter.
σ
bj2 (x) = sbj (x) − m
b 2j (x),
where sbj (x) is obtained in the same way as m
b j (x) but with Yj` replaced with Yj`2 .
For any function f defined on J, interval in Rd , define for ` ∈ N, δ ∈ [0, 1),
kf k`+δ = max sup |Di f (x)| + max sup
i∈I(d,`) x,x0 ∈J
i.=`
x6=x0
i∈I(d,`) x∈J
where Di =
∂ i.
i ,
i
∂x11 ...∂xdd
|Di f (x) − Di f (x0 )|
,
kx − x0 kδ
`+δ
(J) the set of
and k · k is the Euclidean norm on Rd . Denote by CM
e `+δ (J) the subset
`-times differentiable functions f on J, such that kf k`+δ ≤ M . Denote by C
2
of C2`+δ (J) of the functions that satisfy inf x∈J f (x) ≥ 21 .
In what follows we are going to prove that under appropriate regularity assumptions using
the estimated residuals (3) instead of the (true) unobserved innovations εji affects neither the
asymptotic distribution of the empirical copula estimator nor the parametric estimator of a
copula.
2.1. Empirical copula estimation. Mimicking (2) the copula function C can be estimated
nonparametrically as
en (u1 , u2 ) = Fbεb Fb−1 (u1 ), Fb−1 (u2 ) ,
(5)
C
2b
ε
1b
ε
where
(6)
n
1 X
Fbεb(y1 , y2 ) =
wni 1 εb1i ≤ y1 , εb2i ≤ y2 ,
Wn
Wn =
i=1
n
X
wnj
j=1
is the estimate of the joint distribution function Fε (y1 , y2 ) and
n
1 X
b
Fjbε (y) =
wni 1 εbji ≤ y ,
Wn
j = 1, 2,
i=1
the corresponding marginal empirical cumulative distribution functions. Here we make use
of a weight function wn (x) = 1{x ∈ Jn } and put wni = wn (X i ). For some real positive
sequence cn → ∞ we set Jn = [−cn , cn ]d .
(or)
Now let Cn be the ‘oracle’ estimator based on the unobserved innovations, i.e.
−1
−1
(7)
Cn(or) (u1 , u2 ) = Fbε Fb1ε
(u1 ), Fb2ε
(u2 ) ,
A COPULA APPROACH FOR DEPENDENCE MODELING
5
P
where Fbε (z1 , z2 ) = n1 ni=1 1 ε1i ≤ z1 , ε2i ≤ z2 is the estimator of Fε (z1 , z2 ) based on the
unobserved innovations and Fbjε (j = 1, 2) the corresponding marginal empirical cumulative
distribution functions.
Regularity assumptions.
(β) The process (X i , Y1i , Y2i )i∈Z is strictly stationary and absolutely regular (β-mixing)
with the mixing coefficient βi that satisfies βi = O(i−b ) with
1 + (s − 1)(1 + d)
s−2
where s is specified in assumption (M) below.
(1,1)
(1,2)
(2,2)
(Fε ) The second-order partial derivatives Fε , Fε
and Fε
of the joint cumula(j,k)
tive distribution function Fε (y1 , y2 ) = P(ε1 ≤ y1 , ε2 ≤ y2 ), with Fε (y1 , y2 ) =
2
∂ Fε (y1 ,y2 )
∂yj ∂yk , satisfy
b>
max
sup
j,k∈{1,2} y1 ,y2 ∈R2
Fε(j,k) (y1 , y2 )(1 + yj )(1 + yk ) < ∞.
Further the innovation density fjε (j = 1, 2) satisfies
−1
−1
−1
−1
lim 1 + Fjε
(u) fjε Fjε
(u) = 0 and
lim 1 + Fjε
(u) fjε Fjε
(u) = 0.
u→0+
u→1−
(FX ) The observations X i (i ∈ Z) have density fX that is bounded and differentiable
with bounded uniformly continuous first order partial derivatives. We assume the
existence of some qf > 0 and some positive sequence cn = O (log n)1/d such that
(1)
(j)
(j)
d
for αn (log n)−qf and J+
n = ×j=1 [−cn − hn , cn + hn ],
inf fX (x) ≥ αn(1) .
x∈J+
n
(M) For some s > 2, for j = 1, 2, E |εj0 |2s < ∞, the functions σj2s fX and |mj σj |s fX are
bounded and there are some i∗ ∈ N, B > 0 such that for all i ≥ i∗ ,
sup σj2 (x0 )σj2 (xi )fX 0 ,X i (x0 , xi ) ≤ B,
x0 ,xi
sup mj (x0 )mj (xi ) σj (x0 )σj (xi )fX 0 ,X i (x0 , xi ) ≤ B,
x0 ,xi
where fX 0 ,X i denotes the joint density of (X 0 , X i ) and is bounded (for i ≥ i∗ ).
p+γ
(mσ) Let, for j = 1, 2 and for each n ∈ N, mj and σj be elements of CM
(Jn ) for
n
q
some γ ∈ (0, 1] and a sequence Mn = O((log n) m ) for some qm ≥ 0. Further,
(2)
E[σj4 (X 1 )] < ∞ and inf x∈Jn σj (x) ≥ αn for some positive sequence that fulfils
(2)
αn (log n)−qσ for some qσ ≥ 0.
(k)
(Bw) There exists a sequence hn such that hhnn → ak , where ak ∈ (0, ∞), k = 1, . . . , d.
Further, for γ from assumption (mσ) and for some δ > 0,
nh2p+2γ
(log n)D = o(1),
n
nh3d+2δ
(log n)−D → ∞
n
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
6
for all D > 0, and
b−1−d−
log n
= o(1) for θ =
θ
d
n hn
b+3−d−
1+b
s−1
1+b
s−1
with b from assumption (β) and s from assumption (M).
(k) k : R → R is a symmetric (d+2)-times continuously differentiable probability density
function supported on [−1, 1].
Remark 1. Using Fε (y1 , y2 ) = C F1ε (y1 ), F2ε (y2 ) assumption (Fε ) requires that
n
−1
−1
sup
C (j,k) (u1 , u2 ) fjε Fjε
(uj ) fkε Fkε
(uk )
u1 ,u2 ∈[0,1]2
o
−1
−1
−1
0
+ C (j) (u1 , u2 ) fjε
Fjε
(uj ) 1{j = k} 1 + Fjε
(uj )
1 + Fkε
(uk ) < ∞,
2
C(u1 ,u2 )
1 ,u2 )
and C (j,k) (u1 , u2 ) = ∂ ∂u
stand for the first and second
where C (j) (u1 , u2 ) = ∂C(u
∂uj
j ∂uk
order partial derivatives of the copula function.
Thus provided that for some δ > 0
C (j,k) (u1 , u2 ) = O u2 δ (1−u )2 δ1u2 δ (1−u )2 δ ,
j
k
j
k
−1
−1
then we need that the functions fjε Fjε (u) (1 + Fjε (u) ) are of order O(uδ (1 − u)δ ).
Remark 2. Parts of our assumptions are reproduced from Hansen (2008) because we apply his
results about uniform rates of convergence for kernel estimators several times in our proofs.
Note that in his Theorem 2 we set q = ∞.
Theorem 1. Suppose that assumptions (β), (Fε ), (FX ), (Bw), (M), (k), (Jn ) and (mσ)
are satisfied. Then
√
en (u1 , u2 ) − C (or) (u1 , u2 ) = oP (1).
sup
n C
n
(u1 ,u2 )∈[0,1]2
(or)
Note that Theorem 1 together with the weak convergence of Cn (u1 , u2 ) (see e.g., Propo
e n = √n C
en − C weakly converges in
sition 3.1 of Segers, 2012) implies that that process C
the space of bounded functions `∞ ([0, 1]2 ) to a centred Gaussian process GC , which can be
written as
GC (u1 , u2 ) = BC (u1 , u2 ) − C (1) (u1 , u2 ) BC (u1 , 1) − C (2) (u1 , u2 ) BC (1, u2 ) ,
where BC is a Brownian bridge on [0, 1]2 with covariance function
E BC (u1 , u2 )BC (u01 , u02 ) = C(u1 ∧ u01 , u2 ∧ u02 ) − C(u1 , u2 ) C(u01 , u02 ) .
P
Nevertheless in applications we recommend to use rather Wn = ni=1 wni instead of n as the
sample size.
A COPULA APPROACH FOR DEPENDENCE MODELING
7
2.2. Semiparametric copula estimation. The copula C describes the dependency between the two time series of interest, given the covariate. For applications modeling this
dependency structure parametrically is advantageous because a parametric model often gives
easier access to interpretations. Goodness-of-fit testing will be considered in the next section.
Suppose that the joint distribution of (ε1i , ε2i ) is given by the copula function C(u1 , u2 ; θ),
where θ = (θ1 , . . . , θp )T is an unknown parameter that belongs to a parametric space Θ ⊂ Rp .
In copula settings we are often interested in semi-parametric estimation of the parameter θ, i.e.
estimation of θ without making any parametric assumption on the marginal distributions F1ε
and F2ε . The methods of semi-parametric estimation for i.i.d. settings are summarized in
Tsukahara (2005). The question of interest is what happens if we use the estimated residuals (3) instead of the unobserved innovations εji . Generally speaking, thanks to Theorem 1
the answer is that using εbji instead of εji does not change the asymptotic distribution provided that the parameter of interest can be written as a Hadamard differentiable functional
of a copula.
2.2.1. Method-of-Moments using rank correlation. This method is in a general way described
for instance in Embrechts et al. (2005, Section 5.5.1). To illustrate the application of Theorem 1 for this method consider that the parameter θ is one-dimensional. Then the method of
the inversion of Kendall’s tau is a very popular method of estimating the unknown parameter.
For this method the estimator of θ is given by
θbn(ik) = τ −1 (b
τn ),
where
Z
1Z 1
C(u1 , u2 ; θ) dC(u1 , u2 ; θ) − 1
τ (θ) = 4
0
0
is the theoretical Kendall’s tau and τbn is an estimate of Kendall’s tau. In our settings the
Kendall’s tau would be computed from the estimated residuals (b
ε1i , εb2i ) for which wni > 0.
By Theorem 1 and Hadamard differentiability of Kendall’s tau proved in Veraverbeke et al.
(2011, Lemma 1), the estimators of Kendall’s tau based on εbji or on εji are asymptotically
equivalent. Thus provided that τ 0 (θ) 6= 0 one gets that
n
o
d
√
2
τ
n θbn(ik) − θ −−−→ N 0, [τ 0σ(θ)]
where στ2 = var 8 C(U11 , U21 ; θ) − 4 U11 − 4 U21 ,
2 ,
n→∞
and
(8)
U11 , U21 = F1ε (ε11 ), F2ε (ε21 ) .
Analogously one can show that working with residuals has asymptotically negligible effects
also for the method of moments introduced in Brahimi and Necir (2012).
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
8
2.2.2. Minimum distance estimation. Here one can follow for instance Tsukahara (2005, Section 3.2). Note that thanks to Theorem 1 the proof of Theorem 3 of Tsukahara (2005) does not
(or)
en . Thus provided assumptions (B.1)-(B.5) of Tsukahara
change when Cn is replaced with C
1 ,u2 ;θ)
(2005) are satisfied with δ(u1 , u2 ; θ) = ∂C(u∂θ
, then the estimator defined as
ZZ
(md)
en (u1 , u2 ) − C(u1 , u2 ; t) 2 du1 du2
θbn
= arg min
C
[0,1]2
t∈Θ
is asymptotically normal and satisfies
√ (md)
d
n θbn − θ −−−→ N 0p , Σ(md) ,
n→∞
where
(md)
Σ
ZZ
= var
[0,1]2
h
γ(u1 , u2 ; θ) 1{U11 ≤ u1 , U21 ≤ u2 }
−
2
X
C (j) (u1 , u2 ; θ) 1{Uj1
)
i
≤ uj } du1 du2 ,
j=1
with
#−1
" ZZ
δ(v1 , v2 ; θ) δ T (v1 , v2 ; θ) dv1 dv2
γ(u1 , u2 ; θ) =
δ(u1 , u2 ; θ).
[0,1]2
2.2.3. M-estimator, rank approximate Z-estimators. To define a general M -estimator let us
introduce
e1i , U
e2i = Wn Fb1bε εb1i , Fb2bε εb2i
U
(9)
Wn +1
n
that can be viewed as estimates of the unobserved (U1i , U2i ). Note that the multiplier WWn +1
e1i , U
e2i bounded away
is introduced in order to have both of the coordinates of the vector U
from zero and one. The M -estimator of the parameter θ is now defined as
θbn = arg min
t∈Θ
n
X
e1i , U
e2i ; t
wni ρ U
i=1
where ρ(u1 , u2 ; θ) is a given loss function. This class of estimators includes among others the
(pl)
pseudo-maximum likelihood estimators (θb ), for which ρ(u1 , u2 ; θ) = − log c(u1 , u2 ; θ), with
n
c(·) being the copula density function.
Note that the estimator θbn is usually searched for as a solution to the estimating equations
(10)
n
X
e1i , U
e2i ; θbn = 0p ,
wni φ U
i=1
where φ(u1 , u2 ; θ) = ∂ρ(u1 , u2 ; θ)/∂θ. In Tsukahara (2005) the estimator defined as the
solution of (10) is called a rank approximate Z-estimator.
A COPULA APPROACH FOR DEPENDENCE MODELING
9
In what follows we give general assumptions under which there exists a consistent root
(θbn ) of the estimating equations (10) that is asymptotically equivalent to the consistent root
(or)
(θb ) of the ‘oracle’ estimating equations given by
n
n
X
b1i , U
b2i ; θb(or) = 0p ,
φ U
n
(11)
i=1
where
b1i , U
b2i =
U
(12)
n
n+1
Fb1ε (ε1i ), Fb2ε (ε2i )
are the standard pseudo-observations calculated from the unobserved innovations and their
marginal empirical distribution functions Fbjε (y).
Unfortunately, these general assumptions exclude some useful models (e.g. pseudo-maximum likelihood estimator in the Clayton family of copulas) for which the function φ(u1 , u2 ; θ)
viewed as a function of (u1 , u2 ) is unbounded. The reason is that for empirical distribution
functions calculated from estimated residuals εbji we lack some of the sophisticated results
for an empirical distribution function calculated from (true) innovations εji . For such copula
families one can use for instance the Method-of-Moments using rank correlation (see Section 2.2.1) to stay on the safe side. Nevertheless the simulation study in Section 3 suggests
that the pseudo-maximum likelihood estimation can be used also for the Clayton copula (and
probably also for other families of copulas with non-zero tail dependence) provided that the
dependence is not very strong.
Regularity assumptions. In what follows let θ stand for the true value of the parameter and
V (θ) for an open neighbourhood of θ.
(Id) θ is a unique minimizer of the function r(t) = E ρ(U1i , U2i ; t) and θ is an inner point
of Θ.
(φ) There exists V (θ) such that for each l1 , l2 ∈ {1, . . . , p} the functions φl1 (u1 , u2 ; t) =
∂φ(u1 ,u2 ;t)
1 ,u2 ;t)
and φl1 ,l2 (u1 , u2 ; t) = ∂φ(u
∂tl1
∂tl1 ∂tl2 are for each t ∈ V (θ) continuous in (u1 , u2 )
and of uniformly bounded Hardy-Kraus variation (see e.g., Berghaus et al., 2017).
(j)
(φ ) There exists V (θ) and a function h(u1 , u2 ) such that for each t ∈ V (θ)
(j)
(j)
max max φl (u1 , u2 ; t) ≤ h(u1 , u2 ), where φl (u1 , u2 ; t) =
j=1,2 l=1,...,p
∂φl (u1 ,u2 ;t)
∂uj
and E h(U11 , U21 ) < ∞.
2 ;t)
(Γ) Each element of the (matrix) function Γ(t) = E ∂φ(U∂t1 ,U
is a continuous function
T
and the matrix Γ = Γ(θ) is positively definite.
Theorem 2. Suppose that the assumptions of Theorem 1 are satisfied and that also (Id),
(φ), (φ(j) ), and (Γ) hold. Then with probability going to one there exists a consistent root θbn
10
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
of the estimating equations (10), which satisfies
√
d
(13)
n θbn − θ −−−→ Np 0p , Γ−1 Σ Γ−1 ,
n→∞
where
(
ZZ
Σ = var φ U11 , U21 ; θ +
ZZ
+
1{U11 ≤ v1 } − v1
1{U21 ≤ v2 } − v2
∂φ(v1 ,v2 ;θ)
∂v1
dC(v1 , v2 ; θ)
)
∂φ(v1 ,v2 ;θ)
∂v2
dC(v1 , v2 ; θ) .
The proof of Theorem 2 is given in Appendix B. Note that the asymptotic distribution of
the estimator θbn coincides with the distribution given in Section 4 of Genest et al. (1995)
(or)
that corresponds to the consistent root θb
of the estimating equations (11). Thus using
n
the residuals instead of the true innovations has asymptotically negligible effect on the (first(or)
order) asymptotic properties. In fact, it can be even shown that both θbn and θb
have the
n
same asymptotic representations and thus
√
(or)
n θbn − θbn
= oP (1).
2.3. Goodness-of-fit testing. When modeling multivariate data using copulas parametrically one needs to choose a suitable family of copulas. When choosing the copula family tests
of goodness-of-fit are often a useful tool. Thus we are interested in testing H0 : C ∈ C0 , where
C0 = {Cθ , θ ∈ Θ} is a given parametric family of copulas.
Many testing methods have been proposed (see e.g. Genest et al., 2009; Kojadinovic and
Holmes, 2009, and the references therein). The most standard ones are based on the comparison of nonparametric and parametric estimators of a copula. For instance the Cramér-von
Mises statistics is given by
ZZ
en (u1 , u2 ) − C(u1 , u2 ; θbn ) 2 dC
en (u1 , u2 ),
(14)
Sn =
C
where θbn is an estimate of the unknown parameter θ. As the asymptotic distributions of
en (u1 , u2 ) and θbn are the same as the asymptotic distribution of C
en(or) (u1 , u2 ) and θb(or)
C
n
we suggest that the significance of the test statistic can be assessed in the same way as in
i.i.d. settings. Thus one can use for instance the parametric bootstrap by simply generating
independent and identically distributed observations from the copula function C(u1 , u2 ; θbn ).
The test statistic is then simply recalculated from this observations in the same way as if
we directly observed the innovations. The only difference is that instead of generating n
observations we recommend to generate only Wn observations.
A COPULA APPROACH FOR DEPENDENCE MODELING
11
Similar remarks hold when testing other hypotheses about the copula such as symmetry, for
instance. Note that testing H0 : C(u1 , u2 ) ≡ u1 u2 provides a test for conditional independence
of the two time series, given the covariate.
3. Simulation study
A small Monte Carlo study was conducted in order to compare the semiparametric estimators based on the residuals with the ‘oracle’ estimators based on (unobserved) innovations.
The inversion of Kendall’s tau (IK) method and the maximum pseudo-likelihood (MPL)
method were considered for the following five copula families: Clayton, Frank, Gumbel, normal, and Student with 4 degrees of freedom. The values of the parameters are chosen so that
they correspond to the Kendall’s tau τ = 0.25, 0.50 and 0.75. The data were simulated from
the following four models:
(Model 1)
Y1i = 0.5(Xi + 1)2 + e1+0.1Xi ε1i ,
Y2i = 0.8(Xi − 1)2 + e1+0.2Xi ε2i ,
(Model 2)
Y1i = 0.7Y1,i−1 + ε1i ,
Y2i = −0.5Y2,i−1 + ε2i ,
(Model 3)
(Model 4)
zY1i = 0.5
Y1,i−1
+ ε1i ,
2
1 + 0.1Y1,i−1
Y1i = σ1i ε1i ,
2
2
σ1i
= 1 + 0.3Y1,i−1
,
Y2i = −0.4Y2,i−1 + ε2i ,
Y2i = σ2i ε2i ,
2
2
σ2i
= 5 + 0.2Y2,i−1
,
where the innovations εji , j = 1, 2, follow marginally the standard normal distribution, and
Xi is an exogenous variable following the ARMA model Xt = 0.5Xt−1 + ξt + 0.4ξt−1 with
ξi being i.i.d. from a standard normal distribution. The simulations were conducted also for
innovations εji , j = 1, 2 with Student marginals with 5 degrees of freedom but the results are
similar. For brevity of the paper we do not present them here.
The nonparametric estimates m
b j and σ
bj are constructed as local polynomial estimators of
order p = 1 with K being the triweight kernel and the bandwidth hn chosen by the crossvalidation method for each estimate separately. The bandwidth is chosen from the interval
(0, H), where H is the range of the corresponding explanatory variable. Finally, cn = log n.
For each setting, we compute the estimate of the copula parameter θ from the true (but
(ik,or)
unobserved) innovations using the inversion of Kendall’s tau method (θbn
) and the max(pl,or)
imum pseudo-likelihood method (θbn
). These oracle estimators are compared with their
(ik)
(pl)
counterparts computed from the residuals (θbn ) and (θbn ). The performance of the estimators is measured by the bias, variance (VAR) and the mean square error (MSE), which are
estimated from the 1 000 random samples. Finally, the sample sizes n = 200, 500 and 1000 are
considered. The obtained results are listed for the five copulas separately in Tables 1,2,3,4 and
(ik)
(pl)
5. As θbn and θbn are natural competitors, the bigger of the two corresponding performance
measures (bias, VAR, MSE) is stressed by the bold font.
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
12
n = 200
Known innovations
Model
estim
bias
VAR
MSE
bias
VAR
MSE
bias
VAR
0.25
(ik,or)
θbn
(pl,or)
θbn
0.008
0.019
0.019
0.008
0.008
0.009
-0.001
0.005
0.005
0.026
0.015
0.016
0.019
0.007
0.008
0.007
0.004
0.004
(ik,or)
θbn
(pl,or)
θbn
0.022
0.066
0.067
0.019
0.027
0.028
0.003
0.015
0.016
0.027
0.054
0.054
0.017
0.024
0.024
0.002
0.014
0.014
(ik,or)
θbn
(pl,or)
θbn
0.052
0.383
0.386
0.055
0.162
0.165
0.014
0.084
0.085
-0.065
0.287
0.291
-0.029
0.126
0.126
-0.036
0.073
0.075
(ik)
θbn
(pl)
θbn
0.014
0.029
0.029
0.005
0.011
0.011
0.002
0.005
0.005
0.027
0.023
0.023
0.010
0.009
0.009
0.002
0.004
0.004
(ik)
θbn
(pl)
θbn
0.007
0.104
0.104
-0.004
0.039
0.039
-0.006
0.019
0.019
-0.058
0.080
0.084
-0.057
0.031
0.034
-0.047
0.016
0.018
-0.158
0.569
0.594
-0.123
0.223
0.238
-0.098
0.107
0.117
-0.723
0.509
1.032
-0.566
0.237
0.557
-0.443
0.151
0.347
0.005
0.029
0.029
0.004
0.010
0.010
-0.002
0.005
0.005
0.25
0.50
0.50
0.75
0.75
0.25
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
n = 1000
τ
0.25
1
n = 500
0.50
0.50
0.75
0.75
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.018
0.023
0.023
0.013
0.008
0.009
0.003
0.004
0.004
-0.034
0.096
0.097
-0.006
0.033
0.033
-0.010
0.017
0.017
-0.092
0.077
0.086
-0.038
0.028
0.030
-0.028
0.015
0.016
-0.485
0.522
0.757
-0.194
0.205
0.243
-0.120
0.099
0.113
-1.166
0.481
1.842
-0.592
0.209
0.559
-0.368
0.105
0.240
0.003
0.028
0.028
0.002
0.010
0.010
-0.004
0.005
0.005
0.016
0.023
0.023
0.011
0.008
0.009
0.002
0.004
0.004
0.095
0.096
-0.012
0.033
0.033
-0.016
0.017
0.017
-0.093
0.077
0.086
-0.047
0.028
0.030
-0.036
0.015
0.016
-0.488
0.495
0.733
-0.242
0.189
0.247
-0.168
0.092
0.120
-1.128
0.427
1.699
-0.648
0.177
0.597
-0.432
0.094
0.281
0.005
0.030
0.030
0.004
0.010
0.010
-0.003
0.005
0.005
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
-0.037
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
MSE
0.016
0.024
0.024
0.010
0.009
0.009
0.000
0.004
0.004
-0.018
0.099
0.099
-0.004
0.033
0.033
-0.011
0.016
0.017
-0.083
0.079
0.086
-0.050
0.028
0.030
-0.046
0.015
0.017
-0.233
0.542
0.596
-0.098
0.200
0.209
-0.088
0.091
0.099
-0.837
0.421
1.122
-0.517
0.185
0.452
-0.402
0.102
0.264
Table 1. Estimation for Clayton copula.
In agreement with the results of Genest et al. (1995) and Tsukahara (2005) the results for
the (oracle) estimates based on (unobserved) innovations are in favour of MPL method. This
continues to hold also when working with estimated residuals provided that the dependence
is not very strong (i.e. τ = 0.25 or τ = 0.50). But if the dependence is strong (i.e. τ = 0.75)
then one should consider using the IK method. This seems to be true in particular for the
Clayton copula and to some extent also to the Frank copula and the Gumbel copula. A closer
inspection of the results reveals that while the variance of MPL method is almost always
slightly smaller than the variance of the IK method, the bias can be substantially larger. On
A COPULA APPROACH FOR DEPENDENCE MODELING
n = 200
Known innovations
Model
estim
bias
VAR
MSE
bias
VAR
MSE
bias
VAR
MSE
0.25
(ik,or)
θbn
(pl,or)
θbn
0.026
0.142
0.143
-0.006
0.071
0.071
0.012
0.037
0.037
0.032
0.142
0.143
-0.002
0.071
0.071
0.013
0.037
0.037
(ik,or)
θbn
(pl,or)
θbn
0.044
0.237
0.239
-0.001
0.117
0.117
0.018
0.062
0.063
0.044
0.234
0.236
0.000
0.116
0.116
0.017
0.061
0.062
(ik,or)
θbn
(pl,or)
θbn
0.073
0.774
0.780
0.009
0.388
0.388
0.038
0.199
0.201
0.25
0.50
0.50
0.75
0.75
0.25
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
n = 1000
τ
0.25
1
n = 500
13
0.50
0.50
0.75
0.75
-0.031
0.758
0.759
-0.040
0.377
0.379
0.006
0.197
0.197
(ik)
θbn
(pl)
θbn
-0.017
0.218
0.218
-0.010
0.091
0.091
-0.009
0.043
0.043
-0.005
0.218
0.218
-0.005
0.091
0.091
-0.005
0.043
0.043
(ik)
θbn
(pl)
θbn
-0.059
0.358
0.362
-0.043
0.151
0.153
-0.024
0.072
0.073
-0.055
0.349
0.352
-0.040
0.149
0.150
-0.023
0.072
0.072
(ik)
θbn
(pl)
θbn
-0.424
1.225
1.405
-0.287
0.509
0.591
-0.168
0.244
0.272
-0.555
1.154
1.462
-0.336
0.499
0.611
-0.192
0.242
0.278
(ik)
θbn
(pl)
θbn
-0.018
0.221
0.222
-0.020
0.085
0.085
0.002
0.041
0.041
-0.010
0.222
0.222
-0.016
0.085
0.085
0.004
0.041
0.041
(ik)
θbn
(pl)
θbn
-0.093
0.366
0.375
-0.054
0.140
0.143
-0.014
0.070
0.070
-0.093
0.361
0.369
-0.055
0.138
0.141
-0.016
0.069
0.069
(ik)
θbn
(pl)
θbn
-0.899
1.390
2.198
-0.415
0.513
0.685
-0.195
0.252
0.290
-1.048
1.325
2.424
-0.481
0.501
0.732
-0.234
0.250
0.305
0.041
(ik)
θbn
(pl)
θbn
-0.021
0.222
0.222
-0.025
0.085
0.085
-0.001
0.041
-0.012
0.223
0.223
-0.020
0.085
0.085
0.000
0.041
0.041
(ik)
θbn
(pl)
θbn
-0.107
0.359
0.371
-0.070
0.139
0.143
-0.028
0.069
0.070
-0.108
0.354
0.366
-0.071
0.137
0.142
-0.030
0.068
0.069
-0.930
1.298
2.163
-0.511
0.492
0.753
-0.291
0.238
0.323
(ik)
θbn
(pl)
θbn
-1.076
1.219
2.376
-0.575
0.479
0.810
-0.331
0.236
0.345
(ik)
θbn
(pl)
θbn
-0.015
0.230
0.230
-0.022
0.084
0.085
0.000
0.041
0.041
-0.006
0.230
0.230
-0.017
0.084
0.085
0.002
0.041
0.041
(ik)
θbn
(pl)
θbn
-0.059
0.381
0.385
-0.053
0.142
0.144
-0.017
0.070
0.070
-0.058
0.375
0.379
-0.053
0.140
0.143
-0.018
0.069
0.069
-0.483
1.353
1.587
-0.259
0.511
0.578
-0.144
0.238
0.258
-0.632
1.267
1.667
-0.317
0.493
0.594
-0.176
0.233
0.264
(ik)
θbn
(pl)
θbn
Table 2. Estimation for Frank copula.
the other hand the results suggest that for the normal and the Student copula one can stay
with MPL method even in case of a strong dependence.
Finally note that for large sample sizes the performance of the estimates based on residuals
is usually almost as good as of the oracle estimates based on (unobserved) innovations. But
there is still some price to pay even for the sample size n = 1000 and this price relatively
increases with the level of dependence. The question for possible further research is how to
explain the bad performance of PML method when based on residuals for the Clayton copula
with a strong dependence.
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
14
n = 200
Known innovations
Model
estim
bias
VAR
MSE
bias
VAR
MSE
bias
VAR
MSE
0.25
(ik,or)
θbn
(pl,or)
θbn
0.057
0.047
0.047
0.007
0.022
0.022
0.011
0.013
0.013
0.142
0.047
0.049
0.062
0.021
0.022
0.040
0.012
0.012
(ik,or)
θbn
(pl,or)
θbn
0.103
0.153
0.154
0.034
0.069
0.069
0.024
0.040
0.040
0.207
0.148
0.152
0.109
0.066
0.067
0.057
0.037
0.037
(ik,or)
θbn
(pl,or)
θbn
0.211
0.799
0.804
0.098
0.359
0.360
0.040
0.201
0.201
0.026
0.713
0.713
0.055
0.321
0.321
-0.034
0.173
0.174
0.25
0.50
0.50
0.75
0.75
0.25
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
n = 1000
tau
0.25
1
n = 500
0.50
0.50
0.75
0.75
(ik)
θbn
(pl)
θbn
0.080
0.074
0.074
0.026
0.028
0.028
-0.023
0.014
0.014
0.173
0.067
0.070
0.062
0.026
0.027
0.003
0.013
0.013
(ik)
θbn
(pl)
θbn
0.025
0.243
0.243
-0.006
0.089
0.089
-0.070
0.045
0.046
0.042
0.218
0.219
-0.038
0.082
0.082
-0.106
0.043
0.044
-0.595
1.227
1.262
-0.386
0.442
0.457
-0.394
0.235
0.250
-1.607
1.038
1.296
-1.228
0.411
0.562
-1.041
0.259
0.367
0.013
0.068
0.068
-0.018
0.027
0.027
-0.002
0.014
0.014
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.099
0.066
0.067
0.034
0.026
0.026
0.026
0.013
0.013
-0.158
0.227
0.230
-0.095
0.083
0.084
-0.041
0.044
0.044
-0.152
0.211
0.213
-0.070
0.079
0.079
-0.037
0.041
0.041
(ik)
θbn
(pl)
θbn
-2.175
1.182
1.655
-0.986
0.451
0.548
-0.532
0.236
0.265
-3.347
1.019
2.139
-1.537
0.425
0.661
-0.918
0.216
0.300
(ik)
θbn
(pl)
θbn
0.003
0.067
0.067
-0.023
0.027
0.027
-0.007
0.014
0.014
0.086
0.066
0.066
0.029
0.026
0.026
0.018
0.013
0.013
(ik)
θbn
(pl)
θbn
-0.173
0.227
0.230
-0.119
0.082
0.083
-0.064
0.044
0.044
-0.165
0.210
0.213
-0.095
0.078
0.079
-0.063
0.040
0.041
(ik)
θbn
(pl)
θbn
-2.118
1.150
1.598
-1.154
0.444
0.577
-0.733
0.223
0.277
-3.150
0.988
1.980
-1.667
0.406
0.684
-1.105
0.200
0.322
0.015
0.069
0.069
-0.017
0.027
0.027
-0.006
0.014
0.014
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.093
0.068
0.068
0.030
0.026
0.026
0.012
0.013
0.013
-0.061
0.234
0.234
-0.069
0.085
0.085
-0.042
0.044
0.045
-0.081
0.210
0.211
-0.064
0.079
0.080
-0.073
0.040
0.041
-0.713
1.268
1.319
-0.429
0.453
0.471
-0.291
0.223
0.231
-1.736
1.087
1.389
-0.965
0.399
0.492
-0.740
0.198
0.253
Table 3. Estimation for Gumbel copula (10 multiples of BIAS, VAR and MSE).
4. Application
To illustrate the proposed methods let us consider daily log returns of USD/CZK (US
Dollar/Czech Koruna) and GBP/CZK (British Pound/Czech Koruna) exchange rates from
4th January 2010 to 31st December 2012. Note that we take only data till the end of 2012
(total of 758 observations for each series), because in November 2013 the Czech National
Bank started its intervention aimed at CZK/EUR exchange rate, and this might violate the
assumption of stationarity and independence for more recent data.
A COPULA APPROACH FOR DEPENDENCE MODELING
n = 200
Known innovations
Model
tau
estim
bias
VAR
0.25
(ik,or)
θbn
(pl,or)
θbn
-0.051
0.710
(ik,or)
θbn
(pl,or)
θbn
-0.052
0.418
(ik,or)
θbn
(pl,or)
θbn
(ik)
θbn
(pl)
θbn
0.25
0.50
0.50
0.75
0.75
0.25
0.25
1
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
0.50
0.50
0.75
0.75
n = 500
MSE
bias
VAR
0.290
0.290
-0.072
0.262
0.267
0.388
0.103
0.103
-0.052
0.087
0.089
0.242
-0.031
0.009
0.009
-0.049
0.008
0.008
-0.580
0.439
0.273
0.402
(ik)
θbn
(pl)
θbn
-0.644
-0.264
(ik)
θbn
(pl)
θbn
-0.406
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
15
n = 1000
MSE
bias
VAR
MSE
0.141
0.141
-0.041
0.071
0.071
0.127
0.129
0.224
0.061
0.062
0.050
0.050
-0.029
0.026
0.026
0.043
0.043
0.139
0.021
0.021
-0.022
0.005
0.005
-0.010
0.002
0.002
-0.021
0.004
0.004
-0.011
0.002
0.002
0.443
-0.130
0.171
0.172
0.026
0.087
0.087
0.403
0.183
0.155
0.156
0.144
0.077
0.077
0.163
0.167
-0.234
0.064
0.064
-0.084
0.031
0.031
0.142
0.142
-0.168
0.055
0.055
-0.116
0.027
0.027
0.016
0.018
-0.209
0.006
0.007
-0.115
0.003
0.003
-0.676
0.016
0.020
-0.483
0.007
0.009
-0.336
0.003
0.004
-0.476
0.452
0.454
-0.287
0.161
0.162
-0.179
0.079
0.079
0.530
0.413
0.416
0.200
0.149
0.150
0.098
0.068
0.068
-0.912
0.169
0.177
-0.402
0.060
0.062
-0.228
0.028
0.029
-0.349
0.142
0.143
-0.122
0.052
0.052
-0.074
0.023
0.023
-1.061
0.022
0.033
-0.441
0.007
0.009
-0.224
0.003
0.003
-1.246
0.021
0.036
-0.526
0.006
0.009
-0.267
0.002
0.003
(ik)
θbn
(pl)
θbn
-0.530
0.448
0.451
-0.343
0.162
0.163
-0.216
0.079
0.079
0.469
0.409
0.412
0.137
0.150
0.150
0.060
0.068
0.068
(ik)
θbn
(pl)
θbn
-0.967
0.168
0.177
-0.489
0.059
0.062
-0.291
0.028
0.029
-0.401
0.138
0.140
-0.219
0.051
0.052
-0.133
0.023
0.024
(ik)
θbn
(pl)
θbn
-1.013
0.020
0.030
-0.504
0.006
0.009
-0.290
0.003
0.004
-1.179
0.019
0.032
-0.580
0.006
0.009
-0.328
0.002
0.003
-0.425
0.478
0.480
-0.352
0.166
0.168
-0.200
0.080
0.080
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.528
0.438
0.440
0.092
0.154
0.154
0.035
0.069
0.069
-0.648
0.180
0.185
-0.387
0.061
0.062
-0.238
0.029
0.029
-0.125
0.150
0.151
-0.174
0.053
0.054
-0.138
0.024
0.024
-0.407
0.019
0.021
-0.206
0.006
0.006
-0.131
0.003
0.003
-0.565
0.017
0.020
-0.301
0.005
0.006
-0.197
0.002
0.003
Table 4. Estimation for normal copula (100 multiples of BIAS, VAR and MSE).
Daily foreign exchange rates have been successfully modelled using the nonparametric
autoregression, e.g., in Härdle et al. (1998) and Yang et al. (1999). Here, we apply a simple
model of two separate nonparametric autoregressions of order 1 and search for a feasible
copula for the innovations. The conditional means and variances are modelled using local
polynomials with degree p = 1. The smoothing parameters are chosen using the crossvalidation (CV) method as 0.038, 0.061, 0.025, 0.056 for mU SD , mGBP , σU SD , and σGBP
respectively. The fitted conditional means and standard deviations are plotted together with
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
16
n = 200
Known innovations
Model
tau
estim
bias
VAR
0.25
(ik,or)
θbn
(pl,or)
θbn
-0.276
0.309
(ik,or)
θbn
(pl,or)
θbn
-0.184
0.185
(ik,or)
θbn
(pl,or)
θbn
(ik)
θbn
(pl)
θbn
-0.303
0.294
(ik)
θbn
(pl)
θbn
-0.491
-0.268
(ik)
θbn
(pl)
θbn
0.25
0.50
0.50
0.75
0.75
0.25
0.25
1
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
0.50
0.50
0.75
0.75
n = 500
MSE
bias
VAR
0.350
0.351
-0.051
0.351
0.352
0.267
0.130
0.130
-0.032
0.119
0.120
0.143
-0.066
0.013
0.013
-0.098
0.011
n = 1000
MSE
bias
VAR
MSE
0.179
0.179
-0.131
0.093
0.093
0.176
0.176
0.064
0.092
0.092
0.067
0.067
-0.084
0.035
0.035
0.061
0.061
0.033
0.032
0.032
-0.015
0.006
0.006
-0.028
0.003
0.003
0.011
-0.046
0.005
0.005
-0.041
0.003
0.003
0.513
0.514
-0.139
0.210
0.210
-0.239
0.113
0.114
0.514
0.514
0.084
0.207
0.208
-0.081
0.112
0.112
0.204
0.206
-0.256
0.079
0.080
-0.249
0.042
0.043
0.183
0.183
-0.231
0.072
0.073
-0.236
0.040
0.040
-0.396
0.022
0.024
-0.230
0.008
0.009
-0.178
0.004
0.005
-0.641
0.020
0.024
-0.435
0.007
0.009
-0.327
0.004
0.005
(ik)
θbn
(pl)
θbn
-0.995
0.520
0.529
-0.230
0.209
0.210
-0.254
0.103
0.104
-0.423
0.526
0.528
0.070
0.209
0.209
-0.094
0.102
0.102
(ik)
θbn
(pl)
θbn
-1.235
0.201
0.216
-0.381
0.081
0.082
-0.276
0.039
0.040
-1.067
0.189
0.201
-0.317
0.074
0.075
-0.232
0.036
0.037
-1.214
0.028
0.043
-0.449
0.009
0.011
-0.251
0.004
0.005
-1.594
0.027
0.052
-0.651
0.009
0.013
-0.356
0.004
0.005
0.104
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
-1.061
0.515
0.526
-0.305
0.210
0.210
-0.308
0.104
-0.469
0.521
0.524
-0.028
0.209
0.209
-0.163
0.102
0.102
(ik)
θbn
(pl)
θbn
-1.302
0.202
0.219
-0.466
0.081
0.083
-0.361
0.040
0.041
-1.113
0.190
0.203
-0.416
0.075
0.076
-0.331
0.037
0.038
(ik)
θbn
(pl)
θbn
-1.162
0.026
0.039
-0.508
0.009
0.012
-0.328
0.004
0.005
-1.475
0.024
0.046
-0.686
0.008
0.013
-0.434
0.004
0.005
(ik)
θbn
(pl)
θbn
-0.881
0.525
0.533
-0.175
0.215
0.216
-0.278
0.103
0.104
-0.243
0.530
0.531
0.071
0.215
0.215
-0.157
0.101
0.101
(ik)
θbn
(pl)
θbn
-0.902
0.202
0.210
-0.291
0.082
0.083
-0.277
0.039
0.040
-0.658
0.191
0.196
-0.254
0.077
0.078
-0.282
0.036
0.037
-0.503
0.023
0.025
-0.197
0.009
0.009
-0.153
0.004
0.004
-0.734
0.021
0.026
-0.359
0.008
0.009
-0.268
0.003
0.004
(ik)
θbn
(pl)
θbn
Table 5. Estimation for Student copula (100 multiples of BIAS, VAR and MSE).
the data in Figure 1. It is visible that the conditional mean functions are rather flat and
range around zero.
We use the goodness-of-fit test proposed in Section 2.3 in order to decide which copula
should be used for modelling the innovations from the two autoregressions. The significance of
the test statistics is assessed with the help of the bootstrap test based on B = 999 bootstrap
samples. We test Clayton, Frank, Gumbel, normal and Student copula with 4 degrees of
freedom respectively and obtain p-values 0.001, 0.001, 0.002, 0.062, 0.289. Hence, we conclude
0.02
0.00
−0.01
0.00
GBP
0.01
0.01
0.02
0.03
data
fitted cond. mean
fitted st.dev.
−0.02
−0.03 −0.02 −0.01
USD
17
0.03
A COPULA APPROACH FOR DEPENDENCE MODELING
−0.03
data
fitted cond. mean
fitted st.dev.
0
200
400
600
0
200
Time
400
600
Time
Figure 1. Fitted conditional mean and variance for the analyzed log returns.
1.0
that the Student copula seems to be the best choice for the innovations. The normal copula
is also not rejected on the 5% level, but the corresponding p-value is rather borderline, so
the Student copula seems to provide a better fit. The maximum likelihood method estimates
4.693 degrees of freedom and parameter ρ = 0.782. Figure 2 shows plot of pseudo-observations
e1i , U
e2i ) given by (9), together with contours of the fitted Student copula.
(U
●
●
●●●
●
●● ●●
●●
●
●● ●
●
● ●● ●
●
● ●●●●
●
●
●● ●
●●
●
●●
●●
● ● ●●
● ●●●
●
●● ● ● ●
●
●
●
●
● ●●
●
● ●●
● ●
●
●
● ● ●● ●●
●
●
● ●●
● ●
●
●
●
●
●
●
● ●
●
● ●
●
●
●
●
●● ●
●
●
●
●
●
● ●
●
●
●
●
●
●● ●
●
●● ●
●
●
●●
● ●
●
●
●
●● ● ●
●●●
●
● ●
●
●
●
●
●
● ●●
●●
●
●● ●
●
● ●● ●
●
●
● ● ●●
●
●
●
●
●
●
●
●
●
●
● ●
●
● ●● ●
●
●●
●
●
●
●
●
● ●
●
●●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
● ●
●
●
●
●
●● ●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●●
● ●
●
●
●
●
●
●
●
●●
●
●
●
● ●
● ●●
●●
●
●
● ●
●
●
●
●
●
● ●
●●
●
●● ●
●
●
●
●
●
● ●
●
●
●
●
●
● ●
●
●
●
● ●
●
●
●
●
●
●
● ●
●
●
● ●
●● ●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
● ●
●●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
● ●
●
● ●
●
● ●
●
●
●
●
●
●
●
●
●
●
● ●●
● ●
●
●
●●●
● ●
●
●
●
● ●
●
●
●
●
●
●●
●●
●
●
●
●
●
●
●
● ●
● ● ●
●
●
●●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
● ● ● ●
●
●
●
●
●●●
●
●
●
● ●●
● ●
●
●
●
●
●
●
●
● ●
●● ●
●
● ●
●
●
●
●
●
●
● ● ●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●●
● ●
●
●
●
●
● ●●
●
● ●●●
●
● ●
●
●
● ● ●
●● ●
●●
●
●
●●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●● ●
●
●
●
●
● ●
●
●●
●
●
● ●
●
●
● ●
● ●
●
●
●
●
●
●
● ●
●
●
●
●●
● ●
● ●
●
● ●● ●
●●
●
●
●
●
● ●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
● ● ● ●
●
● ●●
●
●
●
●●●
●●
●
●
●
● ●●
●
●
●
●
●
●
●●●
●
●
● ●
●●●●
●●
●
● ●
●
●
●● ●● ●
●●
●
●
● ● ● ●●● ●
●
●
●
● ●
●● ●
●
●
●
●●●●●
●
●
●● ●
● ● ● ● ●●
●●●
●
●
●
●
●
●
●
0.0
0.2
0.4
0.6
0.8
●
0.0
0.2
0.4
●
0.6
●
●
●●
0.8
1.0
e1i , U
e2i ) given by (9) together with contours
Figure 2. Pseudo-observations (U
of the fitted Student copula (black curves).
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
18
Appendix A - Proof of Theorem 1
P
Recall the definition Wn = nj=1 wnj . Introduce
n
1 X
−1
−1
wni 1 εb1i ≤ F1ε
(u1 ), εb2i ≤ F2ε
(u2 )
Wn
i=1
−1
−1
= Fbεb F1ε
(u1 ), F2ε
(u2 )
b n (u1 , u2 ) =
G
and note that
bn G
b −1 (u1 ), G
b −1 (u2 ) ,
en (u1 , u2 ) = G
C
1n
2n
b 1n and G
b 2n denote the marginals of G
b n . Further G
b n is a distribution function on [0, 1]2
where G
b 1n (0) = G
b 2n (0) = 0. Thus one can make use of the
with the marginals cdfs satisfying G
−1
Hadamard differentiability of the ‘copula mapping’ Φ : G 7→ G(G−1
1 , G2 ) proved in Theorem 2.4 of Bücher and Volgushev (2013) provided we show that the process
√
b n (u1 , u2 ) = n G
b n (u1 , u2 ) − C(u1 , u2 ) , (u1 , u2 ) ∈ [0, 1]2 ,
(A1)
G
converges in distribution in the space `∞ ([0, 1]2 ) to a process G with continuous trajectories
such that G(u, 0) = G(0, u) = G(1, 1) = 0 for each u ∈ [0, 1].
b n . Denote
A1: Decomposition and weak convergence of G
G(or)
n (u1 , u2 ) =
n
1X
−1
−1
(u2 ) ,
(u1 ), ε2i ≤ F2ε
1 ε1i ≤ F1ε
n
i=1
n
X
e (or) (u1 , u2 ) = 1
G
n
Wn
−1
−1
(u2 ) .
(u1 ), ε2i ≤ F2ε
wni 1 ε1i ≤ F1ε
i=1
b n as
Now one can decompose the process G
√
√
√
bn = n G
en + G
e (or) + G(or) ,
bn − G
e (or) + n G
e (or) − G(or) + n G(or) − C = G
(A2) G
n
n
n
n
n
n
(or)
(or)
e n, G
e n and Gn stand for the first, second and third term respectively on the
where G
right-hand side of the first equation in (A2).
In Section A2 it will be shown that the first term on the right-hand side of (A2) satisfies
uniformly in (u1 , u2 ) ∈ [0, 1]2 ,
n h
−1
i
(1) (u , u ) f
X
C
F
(u
)
1
2
1ε
1
F −1 (u )
1ε
e n (u1 , u2 ) =
√
G
ε1i + 1ε 2 1 (ε21i − 1)
n
i=1
n
−1
i
(2)
C (u1 , u2 ) f2ε F2ε (u2 ) X h
F −1 (u )
√
+
ε2i + 2ε 2 2 (ε22i − 1) + oP (1)
(A3)
n
i=1
where (in agreement with the last two conditions in (Fε )) for u1 ∈ {0, 1} the first term on
the right-hand side of (A3) is defined as zero and analogously for u2 ∈ {0, 1}.
A COPULA APPROACH FOR DEPENDENCE MODELING
19
In Section A3, we will show the asymptotic negligibility of the second term on the righthand side of (A2), i.e.
√
e (or) (u1 , u2 ) =
e (or) (u1 , u2 ) − G(or) (u1 , u2 ) = oP (1).
(A4)
sup
G
sup
n G
n
n
n
(u1 ,u2 )∈[0,1]2
(u1 ,u2 )∈[0,1]2
Now combining (A2) with (A3) and (A4) yields that uniformly in (u1 , u2 )
(A5)
b n (u1 , u2 ) = An (u1 , u2 ) + Bn (u1 , u2 ) + oP (1),
G
where
(A6)
n
1 X
√
An (u1 , u2 ) =
1{U1i ≤ u1 , U2i ≤ u2 } − C(u1 , u2 ) ,
n
i=1
n
2
h
1 X X (j)
−1
Bn (u1 , u2 ) = √
C (u1 , u2 ) fjε Fjε
(uj ) εji +
n
−1
Fjε
(uj ) 2
(εji
2
i
− 1) .
i=1 j=1
The asymptotic representation (A5) together with standard techniques yields the weak conb n.
vergence of the process G
Now thanks to Hadamard differentiability of the copula functional and Theorem 3.9.4 of van
der Vaart and Wellner (1996),
√
√
en (u1 , u2 ) − C(u1 , u2 ) = n G
bn G
b −1 (u2 ) − C(u1 , u2 )
b −1 (u1 ), G
n C
2n
1n
(A7)
b n (u1 , u2 ) − C (1) (u1 , u2 )G
b n (u1 , 1) − C (2) (u1 , u2 )G
b n (1, u2 ) + oP (1).
=G
Note that for each (u1 , u2 ) ∈ [0, 1]2
(A8)
Bn (u1 , u2 ) − C (1) (u1 , u2 )Bn (u1 , 1) − C (2) (u1 , u2 )Bn (1, u2 ) = 0.
Further combining (A7) with (A5), (A6) and (A8) gives
√
en (u1 , u2 ) − C(u1 , u2 )
n C
(A9)
= An (u1 , u2 ) − C (1) (u1 , u2 )An (u1 , 1) − C (2) (u1 , u2 )An (1, u2 ) + oP (1).
Now the right-hand side of (A9) coincides with the asymptotic representation of the ‘oracle’
√ (or)
copula process n Cn − C , which implies the statement of Theorem 1.
A2: Showing (A3). Let us introduce the process
n
1 X
Zn (f ) = √
f (X i , ε1i , ε2i ),
n
i=1
that is indexed be the following set of functions
n
F = (x, y1 , y2 ) 7→ 1 x ∈ [−c, c]d 1 y1 ≤ z1 b1 (x) + a1 (x), y2 ≤ z2 b2 (x) + a2 (x) ,
o
c ∈ R+ , z1 , z2 ∈ R, a1 , a2 ∈ G, b1 , b2 ∈ Ge ,
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
20
where, for δ from assumption (Bw) and some ν > d(1 + dδ ),
(A10)
G = a : Rd → R | a ∈ C1d+δ Rd , sup kxkν |a(x)| ≤ 1 ,
x
(A11)
Ge =
d
b:R →R|b∈
e d+δ
C
2
d
R , sup kxkν |b(x) − 1| ≤ 1 .
x
Denote the centred process as
(A12)
Z̄n (f ) = Zn (f ) − E Zn (f ),
f ∈ F,
and note that f may be formally identified by (c, z1 , z2 , a1 , b1 , a2 , b2 ). We will use the notation
f =(c,
ˆ z1 , z2 , a1 , b1 , a2 , b2 ).
Consider the semi-norm given by
Z 1
kf k2,β =
β −1 (u) Q−1
f (u) du,
0
where
β −1 (u) = inf x > 0 : βbxc ≤ u},
Q−1
f (u) = inf x > 0 : P f (ε11 , ε21 , X 1 ) > x ≤ u .
Then completely analogously as in the proof of Lemma 1 in Dette et al. (2009) one can show
that the logarithm of the bracketing number N[ ] (, F, k · k2,β ) can be bounded by
d
d
e k · k2
(A13)
log O(−2d )N[ ] 2 , G, k · k2 N[ ] 2 , G,
= O log() + O −2 ν + d+δ ,
where the rate follows from our Lemma 2 in Appendix C. Further one bracket is sufficient for
≥ 1. Thus by (A13) and because ν > d(1 + dδ ),
Z ∞q
log N[ ] (, F, k · k2,β ) d < ∞.
0
From Dedecker and Louhichi (2002), Section 4.3, it follows that the centred process Z̄n given
by (A12) is asymptotically k.k2,β -equicontinuous.
To apply this result in order to prove (A3) note that
√ X
n
n
n
b 1 (Xi )−m1 (Xi )
−1
i)
e
Gn (u1 , u2 ) =
wni 1 ε1i ≤ F1ε
(u1 ) σσb11 (X
+m
,
(X
)
σ1 (Xi )
i
Wn
i=1
o
m
b 2 (Xi )−m2 (Xi )
−1
i)
ε2i ≤ F2ε
(u2 ) σσb22 (X
+
(Xi )
σ2 (Xi )
−1
−1
−1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 )
and introduce the process
√ X
n
n
o
n
−1
−1
wni 1 ε1i ≤ F1ε
(u1 )bb1 (Xi ) + b
a1 (Xi ), ε2i ≤ F2ε
(u2 )bb2 (Xi ) + b
a2 (Xi )
Ǧn (u1 , u2 ) =
Wn
i=1
n
o
−1
−1
− 1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 )
A COPULA APPROACH FOR DEPENDENCE MODELING
21
with b
aj , bbj , j = 1, 2, from Lemma 1 and Remark 3 in Appendix C. Then one obtains by
monotonicity arguments applying Lemma 1(i) that, on an event with probability converging
to one
Wn e
Zn fn` − Zn gn ) ≤
Gn (u1 , u2 ) − Ǧn (u1 , u2 ) ≤ Zn fnu − Zn gn )
n
for some deterministic positive sequence γn = o(n−1/2 ). Here,
−1
−1
−1
−1
fn` =
ˆ cn , F1ε
(u1 ), F2ε
(u2 ), b
a1 − γn , bb1 − γn sign(F1ε
(u1 )), b
a2 − γn , bb2 − γn sign(F2ε
(u2 )) ,
−1
−1
−1
−1
fnu =
ˆ cn , F1ε
(u1 ), F2ε
(u2 ), b
a1 + γn , bb1 + γn sign(F1ε
(u1 )), b
a2 + γn , bb2 + γn sign(F2ε
(u2 )) ,
−1
−1
gn =
ˆ cn , F1ε
(u1 ), F2ε
(u2 ), b
a1 , bb1 , b
a2 , bb2 .
We only consider the upper bound, the lower one can be handled completely analogous. First
note that Zn fnu − Zn gn ) = Z̄n fnu − Z̄n gn ) + Rn , where with probability converging to
one,
√
(A14)
|Rn | ≤ 2 n max
sup
|Fjε (uv + w) − Fjε (u(v + sγn ) + w + γn )| = o(1),
j=1,2
u∈R,s∈{−1,1}
v∈(1/2,1),w∈(−1,1)
where the last equality follows by a Taylor expansion, assumption (Fε ) and γn = o(n−1/2 ).
Now introducing the notation (j = 1, 2)
−1
−1
−1
(A15)
Fjε
(u, x, γ) = Fjε
(u) bbj (x) + γ sign(Fjε
(u)) + b
aj (x) + γ
one can show that for a sufficiently large M similarly as in the proof of Lemma 1 in Dette
et al. (2009)
n
o
−1
−1
kfnu − gn k2,β ≤ M P 1 X 1 ∈ Jn , ε11 ≤ F1ε
(u1 , X 1 , γn ), ε21 ≤ F2ε
(u2 , X 1 , γn )
o
n
−1
−1
(u2 , X 1 , 0) > 0
(u1 , X 1 , 0), ε21 ≤ F2ε
− 1 X 1 ∈ Jn , ε11 ≤ F1ε
−1
−1
(u1 , X 1 , γn )
≤ M P X 1 ∈ Jn , F1ε
(u1 , X 1 , 0) ≤ ε11 ≤ F1ε
−1
−1
+ M P X 1 ∈ Jn , F2ε
(u2 , X 1 , 0) ≤ ε21 ≤ F2ε
(u2 , X 1 , γn )
and this can be bounded by M n−1/2 times the bound on the right hand side of (A14) and
thus converges to zero in probability uniformly in u1 , u2 . From k.k2,β -equicontinuity of Z̄n
one obtains
Z̄n (fnu ) − Z̄n (gn ) = oP (1)
uniformly with respect to u1 , u2 and in combination with (A14) and analogous considerations
for the lower bound Zn fn` − Zn gn ) we obtain
e n (u1 , u2 ) − Ǧn (u1 , u2 ) = oP (1).
sup G
u1 ,u2
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
22
The remaining proof of (A3) is divided into two parts. First we prove that
sup Ǧn (u1 , u2 ) − E∗ [Ǧn (u1 , u2 )] = oP (1)
(A16)
u1 ,u2
and then we calculate E∗ [Ǧn (u1 , u2 )]. Here, with slight abuse of notation, E∗ denotes expectation, considering the functions b
aj , bbj as deterministic.
Showing (A16). Note that we have
Ǧn (u1 , u2 ) − E∗ [Ǧn (u1 , u2 )] = Z̄n (fn ) − Z̄n (gn ),
(A17)
where
−1
−1
(u2 ), b
a1 , bb1 , b
a2 , bb2 ,
(u1 ), F2ε
fn = cn , F1ε
−1
−1
(u2 ), 0, 1, 0, 1 ,
(u1 ), F2ε
gn = cn , F1ε
with 0 and 1 standing for functions that are constantly equal to zero and one respectively.
Similarly to before one can show that for a sufficiently large M
i
h
−1
(u1 , X 1 , 0) − u1 1 X 1 ∈ Jn
kfn − gn k2,β ≤ M E F1ε F1ε
i
h
−1
(u2 , X 1 , 0) − u2 1 X 1 ∈ Jn
+ E F2ε F2ε
using notation (A15).
Now note that with Lemma 1 (iii) in Appendix C we obtain kfn − gn k2,β = oP (1) uniformly
in u1 , u2 . Finally with the help of (A17) and the asymptotic k.k2,β -equicontinuity of the
process Z̄n one can conclude (A16).
Calculating E∗ [Ǧn (u1 , u2 )]. With the help of a second-order Taylor series expansion of the
right-hand side one gets
−1
−1
−1
−1
E∗ [Ǧn (u1 , u2 )] = Fε F1ε
(u1 , X, 0), F2ε
(u2 , X, 0) − Fε F1ε
(u1 ), F2ε
(u2 )
=
2
√ X
−1
−1
n
E∗ wn (X) Fε(j) F1ε
(u1 ), F2ε
(u2 ) YjX (uj )
j=1
√
(A18)
+
n
2
2 X
2
X
−1
−1
E∗ wn (X) Fε(j,k) F1ε
(u1X ), F2ε
(u2X ) YjX (uj ) YkX (uk ) ,
j=1 k=1
where
−1
−1
−1
Yjx (u) = Fjε
(u, x, 0) − Fjε
(u) = b
aj (x) + Fjε
(u)(bbj (x) − 1),
j = 1, 2,
A COPULA APPROACH FOR DEPENDENCE MODELING
23
−1
and the point ujx lies between the points Fjε Fjε
(uj , x, 0) and uj . Now using Lemma 1 (iv)
in Appendix C for j = 1, 2
√
−1
−1
n E∗ wn (X) Fε(j) F1ε
(u1 ), F2ε
(u2 ) YjX (uj )
h
i
√
−1
−1
−1
∗ b
+
= n Fε(j) F1ε
(u1 ), F2ε
(u2 ) E∗ b
aj (X)1{X ∈ J+
}
+F
(u
)E
(
b
(X)
−
1)
1
{X
∈
J
}
j
j
n
n
jε
n h
i
1 X
F −1 (uj )
√
εji + jε 2
(ε2ji − 1) + oP (1)
n
i=1
−1
n
i
Fjε (uj ) X h
F −1 (uj )
εji + jε 2
(ε2ji − 1) + oP (1)
−1
−1
F1ε
(u1 ), F2ε
(u2 )
=
Fε(j)
=
C (j) (u1 , u2 ) fjε
√
n
i=1
uniformly in (u1 , u2 ).
To conclude the proof of (A3) we need to show that ‘the second order terms’ in (A18) are
asymptotically negligible. To show that note that by assumption (Fε ) and Lemma 1 (iii)
there exists a finite constant M such that with probability going to one
−1
−1
(uk )
(uj ) 1 + Fkε
1 + Fjε
−1
−1
−1
−1
(uk )
(uj ) 1 + Fkε
(u2x ) 1 + Fjε
(u1x ), F2ε
≤ Fε(j,k) F1ε
−1
−1
(ukx )
(ujx ) 1 + Fkε
1 + Fjε
−1
−1
1 + Fjε
(ujx ) 1 + Fkε
(ukx )
−1
−1
(uk )
(uj ) 1 + Fkε
1 + Fjε
≤M
−1
−1
1 + Fjε
(ujx ) 1 + Fkε
(ukx )
−1
−1
(uk )
(uj ) 1 + Fkε
M 1 + Fjε
≤
1
1
1
1
−1
−1
(uk ) 1 + op (n− 4 ) + op (n− 4 )
(uj ) 1 + op (n− 4 ) + op (n− 4 ) 1 + Fkε
1 + Fjε
−1
−1
(u2x )
(u1x ), F2ε
Fε(j,k) F1ε
≤ 2M
uniformly in (u1 , u2 ) ∈ [0, 1]2 and x ∈ Jn .
Thus to prove
−1
−1
EX wn (X) Fε(j,k) F1ε
(u1X ), F2ε
(u2X ) YjX (uj ) YkX (uk ) = oP (1),
it is sufficient to use once more Lemma 1 (iii).
A3: Showing (A4). Note that with the notation Wn =
Pn
i=1 wni
one can decompose
√
(or)
e (or)
n G
n (u1 , u2 ) − Gn (u1 , u2 )
√
√
(or)
e (or)
= n G
n (u1 , u2 ) − C(u1 , u2 ) − n Gn (u1 , u2 ) − C(u1 , u2 )
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
24
(A19)
=
n
−1 X
−1
−1
√
wni 1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 ) − C(u1 , u2 )
n
n
Wn
i=1
n
1 X
−1
−1
+√
(wni − 1) 1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 ) − C(u1 , u2 )
n
i=1
1
= Wn − 1 Bn1 (u1 , u2 ) + Bn2 (u1 , u2 ),
where Bn1 (u1 , u2 ) stands for the first term on the right-hand side of the equation (A19)
(except for the factor Wnn − 1) and Bn2 (u1 , u2 ) for the second term. Further using standard
techniques one can show that both Bn1 (u1 , u2 ) and Bn2 (u1 , u2 ) viewed as processes on [0, 1]2
are asymptotically equi-continuous. Moreover as
n
−
1
=
o
(1),
and
E
w
(X
)
−
1
= −P(X 1 6∈ Jn ) = o(1),
n
1
P
Wn
one can conclude that both processes W1n − 1 Bn1 (u1 , u2 ) and Bn2 (u1 , u2 ) are uniformly
asymptotically negligible in probability, which together with (A19) implies (A4).
Appendix B - Proof of Theorem 2
Thanks to assumption (φ), the estimator θbn is a solution to the estimating equations (10).
In what follows, first we prove the existence of a consistent root of the estimating equations (10) and then we derive that this root satisfies
(B1)
√
n
1 X b b
n θbn − θ = Γ−1 √
φ U1i , U2i ; θ + oP (1),
n
i=1
b1i , U
b2i ) are introduced in (12). The statement of the theorem now follows for p = 1
where (U
by Proposition A 1(ii) of Genest et al. (1995) and for p > 1 by Theorem 1 of Gijbels et al.
(2017).
en0 (u1 , u2 ) = 1 Pn wni 1 U
e1i ≤ u1 , U
e2i ≤ u2 , where pseudoProving consistency. Put C
i=1
Wn
e1i , U
e2i ) are defined in (9). Note that
observations (U
(B2)
en (u1 , u2 ) − C
e 0 (u1 , u2 ) = OP
C
n
sup
(u1 ,u2 )∈[0,1]2
1
Wn
= OP
1
n
.
Fix l ∈ {1, . . . , p}. By Corollary A.7 of Berghaus et al. (2017) one gets
Z 1Z 1
n
1 X
e
e
en0 (v1 , v2 )
wni φl U1i , U2i ; t =
φl (v1 , v2 ; t) dC
Wn
0
0
i=1
Z 1Z 1
en0 (v1 , v2 ) dφl (v1 , v2 ; t) + φl (1, 1; t
=
C
0
Z
(B3)
−
0
0
1
en0 (v1 , 1) dφl (v1 , 1; t) −
C
Z
0
1
e 0 (1, v2 ) dφl (1, v2 ; t).
C
n
A COPULA APPROACH FOR DEPENDENCE MODELING
25
Note that thanks to assumption (φ(j) ) (uniformly in t ∈ V (θ))
Z 1
Z 1
n
1 X
0
e
1{Ue1i ≤ v1 } dφl (v1 , 1; t)
Cn (v1 , 1) dφl (v1 , 1; t) =
wni
Wn
0
0
i=1
1
=
Wn
Wn
X
i=1
Z
1
i
Wn +1
Z 1
= φl (1, 1; t) −
(B4)
Wn
1 X
φl ( Wni+1 , 1; t)
dφl (v1 , 1; t) = φl (1, 1; t) −
Wn
i=1
φl (v1 , 1; t) dv1 + OP
0
and analogously also
Z 1
Z
en0 (1, v2 ) dφl (1, v2 ; t) = φl (1, 1; t) −
(B5)
C
0
1
Wn
1
φl (1, v2 ; t) dv2 + OP
0
1
Wn
.
Now combining (B3), (B4) and (B5) yields
Z 1Z 1
n
1 X
e
e
e 0 (v1 , v2 ) dφl (v1 , v2 ; t) + Al (t) + OP
(B6)
wni φl U1i , U2i ; t =
C
n
Wn
0
0
1
n
,
i=1
where
(B7)
Al (t) = −φl (1, 1; t +
Z
1
Z
φl (v1 , 1; t) dv1 +
0
1
φl (1, v2 ; t) dv2 .
0
Analogously one gets
(B8)
E φl U11 , U21 ; t =
Z
1Z 1
C(v1 , v2 ) dφl (v1 , v2 ; t) + Al (t).
0
0
Now using (B2), (B6), (B8) and assumption (φ) gives that uniformly in t ∈ V (θ)
n
1 X
e1i , U
e2i ; t − E φl (U11 , U21 ; t)
wni φl U
Wn
i=1
Z 1Z 1
0
e (v1 , v2 ) − C(v1 , v2 ) dφl (v1 , v2 ; t) + OP
=
C
n
0
0
1
n
= oP (1),
where we have used Theorem 1 and assumption (φ). The existence of a consistent root of
estimating equations (10) now follows by assumptions (Id) and (Γ).
Analogously one can show the existence of a consistent root of estimating equations (11).
Showing (B1). Let θbn be a consistent root of the estimating equations (10). Then by the
mean value theorem applied to each coordinate of the vector-valued function
n
1 X
e1i , U
e2i ; t
wni φ U
Ψn (t) =
Wn
i=1
one gets
n
1 X
e1i , U
e2i ; θbn
0p =
wni φ U
Wn
i=1
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
26
n
n
1 X
1 X
∗
e
e
e
e
=
wni φ U1i , U2i ; θ +
wni Dφ U1i , U2i ; θ n θbn − θ ,
Wn
Wn
i=1
i=1
1 ,u2 ;t)
and θ ∗n is between θbn and θ. Note that as the mean value
where Dφ stands for ∂φ(u∂t
∗,p
theorem is applied to a vector valued function there are in fact p different points θ ∗,1
n , . . . , θn
for each coordinate of the function Ψn (t) but all of them are consistent so for simplicity of
notation we do not distinguish them.
Thus to finish the proof of (B1) it is sufficient to show that
n
1 X
e1i , U
e2i ; θ ∗ = Γ + oP (1)
wni Dφ U
n
Wn
(B9)
i=1
and
√ X
n
n
X
n
e1i , U
e2i ; θ = √1
b1i , U
b2i ; θ + oP (1).
wni φ U
φ U
Wn
n
(B10)
i=1
i=1
When proving (B9) one can mimic the proof of consistency of θbn and show that there
exists V (θ) (an open neighbourhood of θ such that)
sup
t∈V (θ)
n
1X
e1i , U
e2i ; t − E Dφ (U11 , U21 ; t) = oP (1).
wni Dφ U
n
i=1
Using the consistency of θbn and assumption (Γ) yields (B9).
0(or)
Thus one can concentrate on proving (B10). Put Cn
b1i , U
b2i ) are defined in (12). Note that
u2 , where (U
(B11)
sup
(u1 ,u2 )∈[0,1]2
(u1 , u2 ) =
1
n
Cn(or) (u1 , u2 ) − Cn0(or) (u1 , u2 ) = OP
Pn
i=1
1
n
1 Ub1i ≤ u1 , Ub2i ≤
.
Analogously as (B6) one can also show that for l = 1, . . . , p
Z 1Z 1
n
1X
b
b
φl U1i , U2i ; θ =
φl (v1 , v2 ; θ) dCn0(or) (v1 , v2 )
n
0
0
i=1
Z 1Z 1
(B12)
=
Cn0(or) (v1 , v2 ) dφl (v1 , v2 ; θ) + Al (θ) + OP
0
0
where Al (θ) is given in (B7).
Now using (B2), (B6), (B11), (B12), Theorem 1 and (φ) one gets
√ X
n
n
n
1 X
e
e
b1i , U
b2i ; θ
wni φl U1i , U2i ; θ − √
φl U
Wn
n
i=1
i=1
Z 1Z 1
√ 0
e (u1 , u2 ) − C 0(or) (u1 , u2 ) dφl (u1 , u2 ; θ) + oP
=
n C
n
n
0
0
which verifies (B10) and finishes the proof of (B1).
√1
n
1
n
,
= oP (1),
A COPULA APPROACH FOR DEPENDENCE MODELING
27
Appendix C - Auxiliary results
Lemma 1. Assume that (β), (Fε ), (M), (FX ), (Bw), (k), (Jn ) and (mσ) are satisfied.
Then there exist random functions b
aj and bbj on Jn such that for j = 1, 2
(i) sup
x∈Jn
m
b j (x) − mj (x)
σ
bj (x) b
−b
aj (x) = oP n−1/2 , sup
− bj (x) = oP n−1/2 ,
σj (x)
x∈Jn σj (x)
(ii) kb
aj kd+δ = oP (1),
aj (x) = oP
(iii) sup b
kbbj − 1kd+δ = oP (1) for δ > 0 from assumption (Bw),
n−1/4 ,
sup bbj (x) − 1 = oP n−1/4 ,
x∈Jn
x∈Jn
Z
(iv)
b
aj (x)fX (x) dx =
Jn
1
n
n
X
εji + oP n−1/2 ,
i=1
n
X
bbj (x) − 1 fX (x) dx = 1
ε2ji − 1 + oP n−1/2 .
2n
Jn
Z
i=1
Proof. For ease of presentation we set j = 1 and assume hn = hn , . . . , hn . We will first
prove the assertions for m
b 1 . The proof basically goes along the lines of the proof of Lemma
1 by Müller et al. (2009), but changes are necessary due to the dependency of observations
in our model and because our covariate density is not assumed to be bounded away from
zero on its support. Recall that I(d, p) denotes the set of multi-indices i = (i1 , . . . , id ) with
i. = i1 + · · · + id ≤ p and we set I = I(d, p), where p is the order of the polynomials used in
the local polynomial estimation.
b denote the solution of the minimizaProof of assertion (i) for m
b 1 . Fix some x ∈ Jn and let β
b satisfies the normal equations
tion problem (4). Then β
X
b = 0 ∀i ∈ I,
b ik (x)β
Ai (x) + Bi (x) −
Q
k
k∈I
where
n
Ai (x) =
1X
σ1 (X ` ) ε1` ψi,hn (X ` − x) Khn (X ` − x),
n
Bi (x) =
n
1X
m1 (X ` )ψi,hn (X ` − x)Khn (X ` − x),
n
`=1
b ik (x) =
Q
1
n
`=1
n
X
ψi,hn (X ` − x) ψk,hn (X ` − x) Khn (X ` − x).
`=1
1/2
From Theorem 2 in Hansen (2008) we obtain for %n = log n/(nhdn )
,
(C1)
b ik (x) − Qik (x) = OP (%n ),
sup Q
x∈Jn
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
28
b ik (x) , i, k ∈ I. Note that
where we define Qik (x) = E Q
Z
Qik (x) = ψi,(1,..1) (u) ψk,(1,..1) (u) fX (x + hn u) K(u) du,
and for x ∈ Jn , consider the matrices Q(x) with entries Qik (x), i, k ∈ I. Analogously put
b
b ik (x), i, k ∈ I.
Q(x)
for the matrix with entries Q
It follows from assumption (FX ) that 0 < λn ≤ aT Q(x) a ≤ Λ < ∞ for all vectors a of
unit Euclidean length, where λn is a sequence of positive real numbers of the same rate as
(1)
αn in assumption (FX ). Thus Q(x) has eigenvalues in the interval [λn , Λ], and on the event
λn
b
En = sup Q(x) − Q(x) ≤
2
x∈Jn
b
b
one has aT Q(x)
a ≥ λn /2 for all a of unit Euclidean length, such that the matrix Q(x)
is
invertible as well. Here and throughout kQk denotes the spectral norm of a matrix Q. Note
(1)
that P(En ) → 1 by (C1) and %n = o αn , which holds under assumption (Bw). For the
remainder of the proof we assume that the event En takes place because its complement does
not matter for the assertions of the lemma. It follows from the normal equations that for
x ∈ Jn ,
b −1 (x) A(x) + B(x) ,
m
b 1 (x) = eT Q
1
where e1 = (1, 0, . . . , 0)T and A(x) and B(x) denote the vectors with components Ai (x) and
Bi (x), i ∈ I, respectively. Now define
−1
b
a1 (x) = eT
1 Q (x)A(x)
(C2)
1
,
σ1 (x)
x ∈ Jn ,
then we have the decomposition
m
b 1 (x) − m1 (x)
−b
a1 (x) = r1 (x) + r2 (x)
σ1 (x)
(C3)
with remainder terms
1
,
σ1 (x)
1
b −1
b
r2 (x) = eT
,
1 Q (x) B(x) − Q(x)β(x)
σ1 (x)
−1
b −1
r1 (x) = eT
1 Q (x) − Q (x) A(x)
where β(x) is the vector with components β i (x) = hi.n Di m1 (x), i ∈ I. From Theorem 2 in
Hansen (2008) we obtain
(C4)
sup Ai (x) = OP (%n ),
i ∈ I.
x∈Jn
For the treatment of the inverse matrices in r1 (x) we use Cramer’s rule and write
b −1 (x) − Q−1 (x) =
Q
T
1
1
b
C(x) T
−
C(x)
b
det Q(x)
det Q(x)
A COPULA APPROACH FOR DEPENDENCE MODELING
29
b
T
T
det Q(x) − det Q(x)
1
b
b
C(x)
− C(x) ,
+
C(x)
b
det Q(x)
det Q(x)
det Q(x)
=
b
b
where C(x)
and C(x) denote the cofactor matrices of Q(x)
and Q(x), respectively. Due to
b
the boundedness of the functions Qik each element of C(x) − C(x) can be absolutely bounded
b
by OP (%n ) by (C1) and the same rate is obtained for det(Q(x)) − det(Q(x))
, uniformly in
|I|
x. Using the lower bound λn for the determinant of Q(x), and assumption (mσ) to bound
1/σ1 gives the rate
(%n )2
(C5)
sup r1 (x) = OP
= oP n−1/2
(1) 2|I| (2)
(αn )
x∈Jn
αn
by assumption (Bw). In order to show negligibility of r2 (x) first note that the spectral
b −1 (x) is given by the reciprocal of the square root of the smallest eigenvalue of
norm of Q
T Q(x).
b
b
Q(x)
With
1/2
λn
Tb
b
b
b
≥ (aT Q(x)T Q(x)a)1/2 − Q(x)
− Q(x) ≥
aT Q(x)
Q(x)a
= Q(x)a
2
b −1
(on En ) for all a with ||a|| = 1, we obtain the rate O(λ−1
n ) for Q (x) . Further, by Taylor
expansion of m1 (X ` ) in the definition of Bi (x) and using assumption (mσ) we have
n
1X
≤ Mn
kX ` − xkp+γ kψi,hn (X ` − x)k Khn (X ` − x)
n
`=1
= O Mn hp+γ
fbX (x),
n
b
Bi (x) − Q(x)β(x)
i
P
where the kernel density estimator fbX (x) = n1 n`=1 Khn (X ` − x) converges to fX (x) uniformly in x ∈ Jn , see Theorem 6 by Hansen (2008). Altogether we have
p+γ
n hn
= oP n−1/2
(C6)
sup r2 (x) = OP M(1)
(2)
αn αn
x∈Jn
using assumption (Bw).
Now assertion (i) for m
b 1 follows from (C2), (C3), (C5) and (C6).
Proof of assertion (ii) for b
a1 .
kb
a1 kd+δ = max sup Di b
a1 (x)
i∈I(d,d) x∈Jn
+ max max
i∈I(d,d)
i.=d
sup
x,x0 ∈Jn
kx−x0 k≤hn
|Di b
a1 (x)
kx
− Dib
a1 (x0 )|
,
− x0 kδ
sup
x,x0 ∈Jn
kx−x0 k>hn
≤ max sup Di b
a1 (x)
i∈I(d,d) x∈Jn
+ max
i∈I(d,d+1)
i.=d+1
sup Di b
a1 (x) h1−δ
+ 2 max sup Di b
a1 (x) h−δ
n
n
x∈Jn
i∈I(d,d)
i.=d
x∈Jn
|Di b
a1 (x)
kx
− Dib
a1 (x0 )|
− x0 kδ
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
30
by the mean value theorem. Again by Theorem 2 of Hansen (2008) we have
sup hi.n Di Ak (x) = OP (%n ),
i ∈ I(d, d + 1).
x∈Jn
Further note that
∂
∂
−1
−1
Q (x) = Q (x)
Q(x) Q−1 (x)
∂xk
∂xk
(1)
and that the spectral norm of Q−1 (x) can be bounded by O 1/αn
before. We apply the product rule for derivatives to obtain
kb
a1 kd+δ ≤ max
j
` X
X
`=1,...,d
+2
OP
j=0 k=0
j
d X
X
OP
j=0 k=0
= OP
%n h−d
n
(1) (2)
αn αn
= OP
%n
(1)
hd+δ
α
n
n αn
`−j
%n h−k
n Mn
(2) `−j+1
(1) j−k+1
(αn )
(αn )
d−j
%n h−k
n Mn
(1) j−k+1
(2) d−j+1
(αn )
(αn )
+
j
d+1 X
X
OP
j=0 k=0
with considerations as
d+1−j
%n h−k
n Mn
(2)
(1) j−k+1
(αn )d−j+2
(αn )
hn1−δ
h−δ
n
−d−1
hn
%n h−d
1−δ
−δ
n
+ OP %n(1)
h
+
O
P
(2)
(1) (2) hn
n
αn αn
αn αn
= oP (1)
(2)
by assumption (Bw). Assertion (ii) for b
a1 follows.
Proof of assertion (iii) for b
a1 . From the definition of b
a1 and (C4) we obtain that
a1 (x) = OP (1)%n (2) = oP n−1/4
sup b
αn αn
x∈Jn
and thus (iii) follows for b
a1 .
Proof of assertion (iv) for b
a1 . To prove (iv) note that
Z
n
1X
ε1i ∆n (X i )
b
a1 (x)fX (x) dx =
n
Jn
i=1
with
Z
1
eT Q−1 (x) ψ hn (X i − x) Khn (X i − x) fX (x) dx
σ1 (x) 1
Z
fX (X i − uhn )
= σ1 (X i )
eT
Q−1 (X i − uhn ) ψ(u) K(u)
du.
1
X i −cn X i +cn
σ1 (X i − uhn )
,
∆n (X i ) = σ1 (X i )
hn
hn
From the support properties of the kernel function it follows that ∆n (X i )1{X i 6∈ J+
n } = 0.
−
d
Further, for Jn = [−cn + hn , cn − hn ] note that
n
(C7)
1X
−
−1/2
ε1i ∆n (X i ) 1{X i ∈ J+
n \ Jn } = oP n
n
i=1
because the expectation is zero and the variance is bounded by
1
1 1
−
2
sup
sup fX (x) E 1 X 1 ∈ J+
n \ Jn σ1 (X 1 )
n x∈Jn σ1 (x) λn x∈Rd
A COPULA APPROACH FOR DEPENDENCE MODELING
≤
31
1 Mn hn
1 1
\ J−
= O (1) (2) = o n−1 .
O (1) (2) Mn P X 1 ∈ J+
n
n
αn αn
αn αn
n
n
It remains to consider
n
1X
ε1i ∆n (X i )1{X i ∈ J−
n },
n
i=1
(1)
(2)
with ∆n (X i ) = ∆n (X i ) + ∆n (X i ), where
Z
−1
(1)
eT
∆n (X i ) =
1 Q (X i − uhn ) ψ(u) K(u) fX (X i − uhn ) du,
[−1,1]d
Z
∆(2)
n (X i ) =
[−1,1]d
σ1 (X i )
−1
eT
1 Q (X i − uhn ) ψ(u) K(u) fX (X i − uhn ) σ1 (X i −uhn ) − 1 du.
(2)
Now, by applying the mean value theorem for σ1 , for X i ∈ J−
n , ∆n (X i ) can be bounded
(1) (2)
absolutely by O Mn hn /(αn αn ) = o(1). Thus analogously as when showing (C7) one can
use Markov’s inequality to get
Z
n
n
1X
1X
−
−1/2
b
a1 (x)fX (x) dx −
ε1i =
ε1i ∆(1)
.
n (X i ) − 1 1{X i ∈ Jn } + oP n
n
n
Jn
i=1
i=1
(1)
2
To obtain the desired negligibility it remains to show E ∆n (X i ) − 1 1{X i ∈ J−
n } → 0.
To this end we write
Z
−1
1=
eT
1 Q∗ (x − hn u)ψ(u)K(u)fX (x − hn u) du,
[−1,1]d
where for x ∈ J+
n the matrix Q∗ (x) has entries
Z
Q∗ik (x) = fX (x) ψi (u)ψk (u)K(u) du,
i, k ∈ I.
Note that Q∗ (x) has the smallest eigenvalue of order λn . Thus we obtain the bound
2
−
E ∆(1)
n (X i ) − 1 1{X i ∈ Jn }
Z
−1
−1
eT
=E
1 Q (X i − uhn ) − Q∗ (X i − uhn )
[−1,1]d
ψ(u)K(u)fX (X i − uhn ) du
Z
≤ O(1)
Z
J−
n
[−1,1]d
2
Q−1 (x − uhn ) − Q−1
∗ (x − uhn )
1{X i ∈
2
J−
n}
du fX (x) dx
2
≤ O(1) sup kQ−1 (x)k2 sup kQ−1
∗ (x)k
x∈J+
n
x∈J+
n
Z
J−
n
Z
[−1,1]d
kQ(x − uhn ) − Q∗ (x − uhn )k2 du fX (x) dx.
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
32
Now with bounds for the matrix norms similar to before, and inserting the definitions of Q
and Q∗ we obtain
2
−
E (∆(1)
n (X i ) − 1) 1{X i ∈ Jn }
Z
Z Z
1
|fX (x − uhn + hn v) − fX (x − uhn )|2 K(v) dv du fX (x) dx
≤O
(1) 4
(αn )
=O
J−
n
h2n
(1)
(αn )4
[−1,1]d
[−1,1]d
= o(1)
by the mean value theorem and assumptions (FX ) and (k).
Proof of assertions (i)–(iv) for σ
b1 . Recall the definition σ
b12 = sb1 − m
b 21 , where sb1 is the local
polynomial estimator based on (X i , Y1i2 ), i = 1, . . . , n. With the notation s1 (x) = E[Y1i2 |
X i = x] = σ12 (x) + m21 (x) we obtain
σ
b1 (x)
σ1 (x)
= 1+
sb1 (x) − s1 (x) m
b 1 (x) − m1 (x) m1 (x)
−
+ r(x),
σ1 (x)
σ1 (x)
2σ12 (x)
where
r(x) = −
1 (m
(b
σ12 (x) − σ12 (x))2
b 1 (x) − m1 (x))2
−
.
2
σ12 (x)
2σ12 (x)(b
σ1 (x) + σ1 (x))2
Put
−1
e
b
c1 (x) = eT
1 Q (x)A(x)
1
,
2 σ12 (x)
x ∈ Jn ,
e
where A(x)
denotes the vector with components
n
1 X
e
Ai (x) =
2 m1 (X ` )σ1 (X ` ) ε1` + σ12 (X ` ) ε21` − 1 ψi,hn (X ` − x) Khn (X ` − x),
n
i ∈ I.
`=1
Along the lines of the proof of (i) and (ii) for m
b 1 one can prove that
sup
x∈Jn
sb1 (x) − s1 (x)
%2n
Mn hp+γ
n
−
b
c
(x)
=
O
+
O
= oP n−1/2
1
P
P
(1) |I|
(2) 2
(1)
(2) 2
2
(αn ) (αn )
αn (αn )
2σ1 (x)
and
sup |b
c1 (x)| = OP
x∈Jn
Now noticing that
the rate
σ
b12 (x)−σ12 (x)
%n
(1)
(2)
αn (αn )2
= oP n−1/4 .
= sb1 (x)−s1 (x)−(m
b 1 (x)−m1 (x))(m
b 1 (x)+m1 (x)) we obtain
sup |r(x)| = oP n−1/2 + OP
x∈Jn
%2n
(1)
(2)
(αn )2 (αn )4
= oP n−1/2
and (i) follows for σ
b1 .
If we define bb1 (x) = 1 + b
c1 (x) − b
a1 (x)m1 (x)/σ1 (x), then (ii) and (iii) follow analogously to
before. The only difference is an additional factor σ1 (x) in the denominator that needs to be
considered.
A COPULA APPROACH FOR DEPENDENCE MODELING
33
To show validity of (iv) note that the regression model Y1i2 = s1 (X i ) + ηi holds with error
term ηi = σi2 (X i )(ε21i − 1) + 2m1 (X i )σ1 (X i )ε1i . From this one obtains analogously to the
derivation of (iv) for b
a1 that
Z
n
n
sb1 (x)
1 X 2
1 X m1 (X i )
f
(x)
dx
=
(ε
−
1)
+
ε1i + oP n−1/2 .
X
1i
2
2n
n
σ (X i )
Jn 2σ1 (x)
i=1
i=1 1
R
But the second sum is also the dominating term in Jn b
a1 (x)m1 (x)/σ1 (x)fX (x) dx, which is
again shown analogously to the proof of (iv) for b
a1 . Thus (iv) follows for bb1 .
Remark 3. Note that due to property (iii) of Lemma 1 and assumption (FX ) we have for
x ∈ Jn = [−cn , cn ]d ,
kxkν |b
a1 (x)| ≤ O((log n)ν/d )o(n−1/4 ) = o(1)
for every ν > 0. In the proof of Lemma 1, b
a1 (x) was only defined for x ∈ Jn . Now we define
d+δ
d
b
a1 on R in a way that if b
a1 ∈ C1 (Jn ) and kxkν |b
a1 (x)| ≤ 1, then b
a1 ∈ G defined in (A10).
d
Then P b
a1 ∈ G → 1 by Lemma 1. Analogously bb1 is defined on R such that P bb1 ∈ Ge → 1
for Ge from (A11).
Lemma 2. Let H = G or Ge denote one of the function classes defined in (A10) and (A11),
then we have with ν > d(1 + d/δ) and δ from assumption (Bw),
d
d
log N (, H, k · k∞ ) = O − ν + d+δ
for & 0, and thus the same bound holds for log N[ ] (, H, k · k2 ).
e and let > 0. Choose D = D() = −1/ν .
Proof. Let H = G (the proof is similar for G)
Let B denote the ball of radius D around the origin. Let a1 , . . . , am : B → R denote the
centers of -balls with respect to the supremum norm that cover C1d+δ (B), that is m =
N (, C1d+δ (B), k · k∞ ). Then for each a ∈ G we have a|B ∈ C1d+δ (B) and thus there exists
j0 ∈ {1, . . . , m} such that supx∈B |a(x) − aj0 (x)| ≤ . Now define aj (x) = 0 for x ∈ Rd \ B,
j = 1, . . . , m. Then
n
o
sup |a(x) − aj0 (x)| ≤ max , sup |a(x)| ≤
x∈Rd
kxkν |a(x)|
kxk≥D
because
≤ 1 by definition of G. We obtain N (, G, k · k∞ ) = m and due to van der
Vaart and Wellner (1996), Theorem 2.7.1, we have for some universal K
d
d
d
− νd + d+δ
d
1 − d+δ
d − d+δ
log m ≤ K λ B
= O (D + 2)
=O
,
where B 1 = x : kx − Bk < 1
Thus the first assertion follows. The second assertion follows by van der Vaart and Wellner
(1996), proof of Cor. 2.7.2.
34
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
References
Berghaus, B., Bücher, A., and Volgushev, S. (2017). Weak convergence of the empirical copula
process with respect to weighted metrics. Bernoulli, 23(1):743–772.
Brahimi, B. and Necir, A. (2012). A semiparametric estimation of copula models based on
the method of moments. Stat. Methodol., 9(4):467–477.
Bücher, A. and Volgushev, S. (2013). Empirical and sequential empirical copula processes
under serial dependence. J. Multivariate Anal., 119:61–70.
Chan, N.-H., Chen, J., Chen, X., Fan, Y., and Peng, L. (2009). Statistical inference for
multivariate residual copula of GARCH models. Statist. Sinica, 19:53–70.
Chen, X. and Fan, Y. (2006). Estimation and model selection of semiparametric copula-based
multivariate dynamic models under copula misspecification. J. Econometrics, 135:125–154.
Dedecker, J. and Louhichi, S. (2002). Maximal inequalities and empirical central limit theorems. In Dehling, H., Mikosch, T., and Sorensen, M., editors, Empirical process techniques
for dependent data, pages 137–160. Birkhäuser Boston.
Dette, H., Pardo-Fernández, J. C., and Keilegom, I. V. (2009). Goodness-of-fit tests for
multiplicative models with dependent data. Scand. J. Statist., 36(4):782–799.
Embrechts, P., Frey, R., and McNeil, A. (2005). Quantitative Risk Management: Concepts,
Techniques, and Tools. Princeton Series in Finance, Princeton.
Fan, J. and Gijbels, I. (1996). Local Polynomial Modelling and Its Applications. Chapman &
Hall/CRC, London.
Fan, J. and Yao, Q. (2005). Nonlinear Time Series : Nonparametric and Parametric Methods.
Springer series in statistics. Springer, New York.
Gao, J. (2007). Nonlinear Time Series: Semiparametric and Nonparametric Methods. Chapman & Hall/CRC, Boca Raton.
Genest, C., Ghoudi, K., and Rivest, L.-P. (1995). A semiparametric estimation procedure of
dependence parameters in multivariate families of distributions. Biometrika, 82:543–552.
Genest, C., Rémillard, B., and Beaudoin, D. (2009). Goodness-of-fit tests for copulas: A
review and a power study. Insurance Math. Econom., 44:199–213.
Gijbels, I., Omelka, M., Pešta, M., and Veraverbeke, N. (2017). Score tests for covariate effects in conditional copulas. J. Multivariate Anal. Available online, doi:
10.1016/j.jmva.2017.05.001.
Gijbels, I., Omelka, M., and Veraverbeke, N. (2015). Estimation of a copula when a covariate
affects only marginal distributions. Scand. J. Statist., 42(4):1109–1126.
Hansen, B. E. (2008). Uniform convergence rates for kernel estimation with dependent data.
Econometric Theory, 24:726–748.
Härdle, W., Tsybakov, A., and Yang, L. (1998). Nonparametric vector autoregression.
J. Statist. Plann. Inference, 68(2):221–245.
A COPULA APPROACH FOR DEPENDENCE MODELING
35
Kim, G., Silvapulle, M. J., and Silvapulle, P. (2007). Semiparametric estimation of the error
distribution in multivariate regression using copulas. Aust. N. Z. J. Stat., 49(3):321–336.
Kim, G., Silvapulle, M. J., and Silvapulle, P. (2008). Estimating the error distribution in
multivariate heteroscedastic time-series models. J. Statist. Plann. Inference, 138(5):1442–
1458.
Kojadinovic, I. and Holmes, M. (2009). Tests of independence among continuous random vectors based on Cramér–von Mises functionals of the empirical copula process. J. Multivariate
Anal., 100(6):1137–1154.
Masry, E. (1996). Multivariate local polynomial regression for time series: uniform strong
consistency and rates. J. Time Series Anal., 17(6):571–599.
Müller, U. U., Schick, A., and Wefelmeyer, W. (2009). Estimating the error distribution
function in nonparametric regression. Statist. Probab. Lett., 79:957–964.
Nelsen, R. B. (2006). An Introduction to Copulas. Springer, New York. Second Edition.
Patton, A. J. (2012). A review of copula models for economic time series. J. Multivariate
Anal., 110:4–18.
Portier, F. and Segers, J. (2015). On the weak convergence of the empirical conditional copula
under a simplifying assumption. arXiv preprint arXiv:1511.06544.
Rémillard, B., Papageorgiou, N., and Soustra, F. (2012). Copula-based semiparametric models for multivariate time series. J. Multivariate Anal., 110:30–42.
Segers, J. (2012). Weak convergence of empirical copula processes under nonrestrictive
smoothness assumptions. Bernoulli, 18:764–782.
Tsukahara, H. (2005). Semiparametric estimation in copula models. Canad. J. of Statist.,
33:357–375.
van der Vaart, A. W. and Wellner, J. A. (1996). Weak Convergence and Empirical Processes.
Springer, New York.
Veraverbeke, N., Omelka, M., and Gijbels, I. (2011). Estimation of a conditional copula and
association measures. Scand. J. Statist., 38:766–780.
Yang, L., Härdle, W., and Nielsen, J. (1999). Nonparametric autoregression with multiplicative volatility and additive mean. J. Time Series Anal., 20(5):579–604.
| 10math.ST
|
arXiv:1611.00507v1 [cs.DS] 2 Nov 2016
Worst Case Competitive Analysis of Online
Algorithms for Conic Optimization
Reza Eghbali
Department of Electrical Engineering
University of Washington
Seattle, WA 98195
eghbali@uw.edu
Maryam Fazel
Department of Electrical Engineering
University of Washington
Seattle, WA 98195
mfazel@uw.edu
Abstract
Online optimization covers problems such as online resource allocation, online
bipartite matching, adwords (a central problem in e-commerce and advertising),
and adwords with separable concave returns. We analyze the worst case competitive
ratio of two primal-dual algorithms for a class of online convex (conic) optimization
problems that contains the previous examples as special cases defined on the
positive orthant. We derive a sufficient condition on the objective function that
guarantees a constant worst case competitive ratio (greater than or equal to 12 ) for
monotone objective functions. We provide new examples of online problems on
the positive orthant and the positive semidefinite cone that satisfy the sufficient
condition. We show how smoothing can improve the competitive ratio of these
algorithms, and in particular for separable functions, we show that the optimal
smoothing can be derived by solving a convex optimization problem. This result
allows us to directly optimize the competitive ratio bound over a class of smoothing
functions, and hence design effective smoothing customized for a given cost
function.
1
Introduction
Given a proper convex cone K ⊂ Rn , let ψ : K 7→ R be an upper semi-continuous concave function.
Consider the optimization problem
!
m
X
maximize ψ
At x t
(1)
t=1
subject to xt ∈ Ft ,
∀t ∈ [m],
where for all t ∈ [m] := {1, 2, . . . , m}, xt ∈ Rk are the optimization variables and Ft are compact
convex constraint sets. We assume At ∈ Rn×k maps Ft to K; for example, when K = Rn+ and
Ft ⊂ Rk+ , this assumption is satisfied if At has nonnegative entries. We consider problem (1) in the
online setting, where it can be viewed as a sequential game between a player (online algorithm) and
an adversary. At each step t, the adversary reveals At , Ft and the algorithm chooses x̂t ∈ Ft . The
performance of the algorithm is measured by its competitive ratio, i.e., the ratio of objective value at
x̂1 , . . . , x̂m to the offline optimum.
Problem (1) covers (convex relaxations of) various online combinatorial problems including online
bipartite matching [25], the “adwords” problem [31], and the secretary problem [27]. More generally,
it covers online linear programming (LP) [9], online packing/covering with convex cost [4, 7, 11],
and generalization of adwords [13]. Online LP is an important example on the positive orthant:
maximize
subject to
m
X
cTt xt
t=1
m
X
Bt xt ≤ b
t=1
T
1 xt ≤ 1, xt ∈ Rk+ ,
∀t ∈ [m].
Here Ft = {x ∈ Rk+ | 1T x ≤ 1}, ATt = [ct , BtT ] and ψ(u, v) = u + I{·≤b} (v) where I{·≤b} (v) is
the concave indicator function of the set {v ≤ b}.
The competitive performance of online algorithms has been studied mainly under the worst-case
model (e.g., in [31]) or stochastic models (e.g., in [27]). In the worst-case model one is interested
in lower bounds on the competitive ratio that hold for any (A1 , F1 ), . . . , (Am , Fm ). In stochastic
models, adversary chooses a probability distribution from a family of distributions to generate
(A1 , F1 ), . . . , (Am , Fm ), and the competitive ratio is calculated using the expected value of the
algorithm’s objective value. The two most studied stochastic models are random permutation and i.i.d.
models. In the random permutation model the adversary is limited to choose distributions that are
invariant under random permutation while in the i.i.d. model (A1 , F1 ), . . . , (Am , Fm ) are required
to be independent and identically distributed. Note that the worst case model can also be viewed as
an stochastic model if one allows distributions with singleton support.
Online bipartite matching, and its generalization the “adwords” problem, are two main examples that
have been studied under the worst case model. The greedy algorithm achieves a competitive ratio of
1/2 while the optimal algorithm achieves a competitive ratio of 1 − 1/e as bid to budget ratio goes
to zero [31, 8, 25, 23]. A more general version of adwords in which each agent (advertiser) has a
concave cost has been studied in [13]. On the other hand, secretary problem and its generalizations are
stated for random permutation model since the worst case competitive ratio of any online algorithm
can be arbitrary small [5, 27]. The convex relaxation of the online secretary problem is a simple linear
program (LP) with one constraint. Therefore, the competitive ratio of online algorithms for LP has
either been analyzed under random permutation or i.i.d models [3, 16, 14, 20, 26] or under the worst
case model with further restrictions on the problem data [9]. Several authors have also proposed
algorithms for adwords and bipartite matching problems under stochastic models which have a better
competitive ratio than the competitive ratio under the worst case model [29, 24, 17, 30, 21, 12].
The majority of algorithms proposed for the problems mentioned above rely on a primal-dual
framework [8, 9, 4, 13, 7]. The differentiating point among the algorithms is the method of updating
the dual variable at each step, since once the dual variable is updated the primal variable can be
assigned using a simple assignment rule based on complementary slackness condition. A simple
and efficient method of updating the dual variable is through a first order online learning step. For
example, the algorithm stated in [14] for online linear programming uses mirror descent with entropy
regularization (multiplicative weight updates algorithm) once written in the primal dual language.
Recently, the work in [14] was independently extended to the random permutation model in [19, 15, 2].
In [2], the authors provide competitive difference bound for online convex optimization under random
permutation model as a function of the regret bound for the online learning algorithm applied to the
dual.
In this paper, we consider two versions of the greedy algorithm for problem (1) The first algorithm,
Algorithm 1, updates the primal and dual variables sequentially. The second algorithm, Algorithm 2,
provides a direct saddle-point representation of what has been described informally in the literature
as “continuous updates” of primal and dual variables. This saddle point representation allows us to
generalize this type of updates to non-smooth function. In section 2, we bound the competitive ratios
of the two algorithms. A sufficient condition on the objective function that guarantees a non-trivial
worst case competitive ratio is introduced. We show that the competitive ratio is at least 12 for a
monotone non-decreasing objective function. Examples that satisfy the sufficient condition (on
the positive orthant and the positive semidefinite cone) are given. In section 3, we derive optimal
algorithms, as variants of greedy algorithm applied to a smoothed version of ψ. For example,
Nesterov smoothing provides optimal algorithm for online LP. The main contribution of this paper
is to show how one can derive the optimal smoothing function (or from the dual point of view the
optimal regularization function) for separable ψ on positive orthant by solving a convex optimization
2
problem. This gives a implementable algorithm that achieves the optimal competitive ratio derived in
[13]. We also show how this convex optimization can be modified for the design of the smoothing
function specifically for the sequential algorithm. In contrast, [13] only considers continuous updates
algorithm.
Notation. We denote the transpose of a matrix A by AT . The inner product on Rn is denoted by
h·, ·i. Given a function ψ : Rn 7→ R, ψ ∗ denotes the concave conjugate of ψ defined as
ψ ∗ (y) = inf hy, ui − ψ(u),
u
for all y ∈ Rn . For a concave function ψ, ∂ψ(u) denotes the set of supergradients of ψ at u, i.e., the
set of all y ∈ Rn such that
∀u0 ∈ Rn : ψ(u0 ) ≤ hy, u0 − ui + ψ(u).
The set ∂ψ is related to the concave conjugate function ψ ∗ as follows. For an upper semi-continuous
concave function ψ we have
∂ψ(u) = argmin hy, ui − ψ ∗ (y).
y
Under this condition, (ψ ∗ )∗ = ψ.
A differentiable function ψ has a Lipschitz continuous gradient with respect to k·k with continuity
parameter µ1 > 0 if for all u, u0 ∈ Rn ,
1
∗
k∇ψ(u0 ) − ∇ψ(u)k ≤ ku − u0 k ,
µ
∗
where k·k is the dual norm to k·k. For an upper semi-continuous concave function ψ, this is
∗
equivalent to ψ ∗ being µ-strongly concave with respect to k·k (see, for example, [36, chapter 12]).
The dual cone K ∗ of a cone K ⊂ Rn is defined as K ∗ = {y | hy, ui ≥ 0 ∀u ∈ K}. Two examples
of self-dual cones are the positive orthant Rn+ and the cone of n × n positive semidefinite matrices
n
S+
. A proper cone (pointed convex cone with nonempty interior) K induces a partial ordering on Rn
which is denoted by ≤K and is defined as
x ≤K y ⇔ y − x ∈ K.
For two sets F, G ⊂ Rn , we write F ≤K G when u ≤K v for all u ∈ F, v ∈ G.
1.1
Two greedy algorithms
The (Fenchel) dual problem for problem (1) is given by
m
X
minimize
σt (ATt y) − ψ ∗ (y),
(2)
t=1
where the optimization variable is y ∈ Rn , and σt denotes the support function for the set Ft defined
as σt (z) = supx∈Ft hx, zi. We denote the optimal dual objective with D? .
A pair (x∗ , y ∗ ) ∈ (F1 × . . . Fm ) × K ∗ is an optimal primal-dual pair if and only if
x∗t ∈ argmax x, ATt y ∗
∀t ∈ [m],
x∈Ft
m
X
y ∗ ∈ ∂ψ(
At x∗t ).
(3)
(4)
t=1
Based on these optimality conditions, we consider two algorithms. Algorithm 1 updates the primal
and dual variables sequentially, by maintaining a dual variable ŷt and using it to assign x̂t ∈
argmaxx∈Ft x, ATt ŷt . The algorithm then updates the dual variable based on the second optimality
condition (4) 1 . By the assignment rule, we have At x̂t ∈ ∂σt (ŷt ), and the dual variable update can
be viewed as
* t
+
X
ŷt+1 ∈ argmin
As x̂s , y − ψ ∗ (y).
y
s=1
Therefore, the dual update is the same as the update in dual averaging [34] or Follow The Regularized
Leader (FTRL) [39, 1][37, section 2.3] algorithm with regularization −ψ ∗ (y).
1
we assume that ∂ψ nonempty on the boundary of K, otherwise, we can modify the algorithm to start from a
point in the interior of the cone very close to zero.
3
Algorithm 1 Sequential Update
Initialize ŷ1 ∈ ∂ψ(0)
for t ← 1 to m do
Receive At , Ft
x̂t ∈ argmaxx∈Ft x, ATt ŷt
Pt
ŷt+1 ∈ ∂ψ( s=1 As x̂s )
end for
Algorithm 2 updates the primal and dual variables simultaneously, ensuring that
x̃t ∈ argmax
x∈Ft
x, ATt ỹt
,
ỹt ∈ ∂ψ(
t
X
As x̃s ).
s=1
This algorithm is inherently more complicated than algorithm 1, since finding x̃t involves solving a
saddle-point problem. This can be solved by a first order method like the mirror descent algorithm
for saddle point problems. In contrast, the primal and dual updates in algorithm 1 solve two separate
maximization and minimization problems 2
Algorithm 2 Simultaneous Update
for t ← 1 to m do
Receive At , Ft
(ỹt , x̃t ) ∈ arg miny maxx∈Ft
D
E
Pt−1
y, At x + s=1 As x̃s − ψ ∗ (y)
end for
For a reader more accustomed to optimization algorithms, we would like to point to alternative
views on these algorithms. If 0 ∈ Ft for all t, then an alternative view on Algorithm 2 is coordinate
minimization. Initially, all the coordinates are set to zero, then at step t
!
t
X
x̃t ∈ argmax ψ
At x̃s + At x .
(5)
x∈Ft
s=1
If in addition ψ is differentiable, Algorithm 1, at each time step t, applies one iteration of Frank-Wolfe
algorithm [18] for solving (5).
2
Competitive ratio bounds and examples for ψ
In this section, we derive bounds on the competitive ratios of Algorithms
P1mand 2 by bounding their
respective duality gaps. Let ỹm+1 to be the minimum element in ∂ψ( t=1 At x̃t ) with respect to
ordering ≤K ∗ (such an element exists in the superdifferential by Assumption (1),
which appears
Pm
later in this section). We also choose ŷm+1 to be the minimum element in ∂ψ( t=1 At x̂t ) with
respect to ≤K ∗ . Note that ŷm+1 is used for analysis and does not play a role in the assignments of
Algorithm 1. Let Pseq and Psim denote the primal objective values for the primal solution produced
by the algorithms 1 and 2, and Dseq and Dsim denote the corresponding dual objective values,
!
!
m
m
X
X
Pseq = ψ
At x̂t ,
Psim = ψ
At x̃t ,
t=1
Dseq =
m
X
t=1
σt (ATt ŷt ) − ψ ∗ (ŷm+1 ),
Dsim =
t=1
m
X
σt (ATt ỹt ) − ψ ∗ (ỹm+1 ).
t=1
2
Also if the original problem is a convex relaxation of an integer program, meaning that each Ft = convFt
where Ft ⊂ Zl , then x̂t can always be chosen to be integral while integrality may not hold for the solution of
the second algorithm.
4
The next lemma provides a lower bound on the duality gaps of both algorithms.
Lemma 1 The duality gap for Algorithm 2 is lower bounded as
Psim − Dsim ≥ ψ ∗ (ỹm+1 ) + ψ(0),
and the duality gap for Algorithm 1 is lower bounded as
Pseq − Dseq ≥ ψ ∗ (ŷm+1 ) + ψ(0) +
m
X
hAt x̂t , ŷt+1 − ŷt i .
t=1
Furthermore, if ψ has a Lipschitz continuous gradient with parameter 1/µ with respect to k·k, then
Pseq − Dseq ≥ ψ ∗ (ŷm+1 ) + ψ(0) −
m
X
1
2
kAt x̂t k .
2µ
t=1
(6)
Note that right hand side of (6) is exactly the regret bound of the FTRL algorithm (with a negative
sign) [38]. The proof is given in Appendix A. To simplify the notation in the rest of the paper, we
assume ψ(0) = 0.
Now we state a sufficient condition on ψ that leads to non-trivial competitive ratios, and we assume
this condition holds in the rest of the paper. One can interpret this assumption as having “diminishing
returns” with respect to the ordering induced by a cone. Examples of functions that satisfy this
assumption will appear later in this section.
Assumption 1 Whenever u ≥K v, there exists y ∈ ∂ψ(u) that satisfies
y ≤K ∗ z,
for all z ∈ ∂ψ(v).
When ψ is differentiable, Assumption 1 simplifies to
u ≥K v ⇒ ∇ψ(u) ≤K ∗ ∇ψ(v).
That is, the gradient, as a map from Rn (equipped with ≤K ) to Rn (equipped with ≤K ∗ ), is orderreversing (also known as antitone). If ψ satisfies Assumption 1, then so does ψ ◦ A, when A is a linear
map such that hy, Avi ≥ 0, for all v ∈ K and y ∈ K ∗ . When ψ is twice differentiable, Assumption
1 is equivalent to w, ∇2 ψ(u)v ≤ 0, for all u, v, w ∈ K. For example, this is equivalent to Hessian
being element-wise non-positive when K = Rn+ .
Competitive ratio for non-decreasing ψ
2.1
To quantify the competitive ratio of the algorithms, we define αψ : K 7→ R as
αψ (u) = sup {c | ψ ∗ (y) ≥ cψ(u), ∀y ∈ ∂ψ(u)},
(7)
which for u 6= 0 can also be written as
αψ (u) =
ψ ∗ (y)
.
y∈∂ψ(u) ψ(u)
inf
Since ψ ∗ (y) + ψ(u) = hy, ui for all y ∈ ∂ψ(u), αψ is equivalent to3
αψ (u) = sup{c | hy, ui ≥ (c + 1)ψ(u), ∀y ∈ ∂ψ(u)}
(8)
= sup{c | ψ 0 (u; u) ≥ (c + 1)ψ(u)},
where ψ 0 (u, v) is the directional derivative of ψ at u in the direction of v. Note that for any u ∈ K,
we have −1 ≤ αψ (u) ≤ 0 since for any y ∈ ∂ψ(u), by concavity of ψ and the fact that y ∈ K ∗ ,
we have 0 ≤ hy, ui ≤ ψ(u) − ψ(0). If ψ is a linear function then αψ = 0, while if 0 ∈ ∂ψ(u) for
some u ∈ K, then αψ (u) = −1. Figure 1 shows a differentiable function ψ : R+ 7→ R. The value of
α(u0 ) is the ratio of ψ ∗ (ψ 0 (u0 )) to ψ(u0 ) as shown.
The next theorem provides lower bounds on the competitive ratio of the two algorithms.
3
If ψ(0) 6= 0, then the definition of αψ should be modified to αψ (u) = sup{c | hy, ui ≥ (c + 1)(ψ(u) −
ψ(0)), y ∈ ∂ψ(u)}.
5
ψ(u0 )
−ψ ∗ (ψ 0 (u0 ))
u0
u
Figure 1: ψ 0 is the derivative of ψ and −ψ ∗ (ψ 0 (u0 )) is the y-intercept of the tangent to the function
graph at u0 . αψ (u0 ) is the ratio of ψ ∗ (ψ 0 (u0 )) to ψ(u0 ).
Theorem 1 If Assumption 1 holds, then for the simultaneous update algorithm we have 4 :
Psim ≥
1
D? .
1 − ᾱψ
where D∗ is the dual optimal objective and
ᾱψ = inf{αψ (u) | u ∈ K}.
(9)
For the sequential update algorithm,
Pseq ≥
m
X
1
(D? +
hAt x̂t , ŷt+1 − ŷt i).
1 − ᾱψ
t=1
Further, if ψ is differentiable with gradient Lipschitz continuity parameter
Pseq ≥
Proof:
1
µ
with respect to k·k,
m
X
1
1
2
kAt x̂t k ).
(D? −
1 − ᾱψ
2µ
t=1
(10)
We first show that Assumption 1 implies that
m
X
σt (ATt ỹt ) ≥
t=1
m
X
m
X
σt (At ŷt ) ≥
σt (ATt ỹm+1 ),
t=1
m
X
t=1
(11)
σt (At ŷm+1 ),
t=1
To do so, we prove that for all t, σt (ATt ỹt ) ≥ σt (ATt ỹm+1 ). The proof for σt (ATt ŷt ) ≥ σt (ATt ŷm+1 )
follows the same steps.
Pt
Pm
For any t, we have
for all s. Since ỹt ∈
s=1 As x̃s ≤K
s=1 As x̃s since As Fs ⊂ KP
Pt
m
∂ψ( s=1 As x̃s ) and ỹm+1 was chosen to be the minimum element in ∂ψ( s=1 As x̃s ) with respect
to ≤K ∗ , by the Assumption 1, we have
ỹt ≥K ∗ ỹm+1 .
Since At x ∈ K for all x ∈ Ft , we get hAt x, yt i ≥ hAt x, ym i . Therefore, σt (ATt ỹt ) ≥ σt (ATt ỹm+1 ).
Now by (11)
Dsim =
m
X
σt (ATt ỹt )
∗
− ψ (ỹm+1 ) ≥
m
X
t=1
σt (ATt ỹm+1 ) − ψ ∗ (ỹm+1 ) ≥ D? .
t=1
?
Similarly, Dseq ≥ D . Lemma 1 and definition of ᾱψ give the desired result.
4
If ψ(0) 6= 0, then the conclusion becomes Psim − ψ(0) ≥
6
1
1−αψ
(D? − ψ(0)).
Competitive ratio for non-monotone ψ
2.2
If ψ is not non-decreasing with respect to K, the algorithms are not guaranteed to increase the
objective at each step; therefore, Pseq and Psim are not guaranteed to be non-negative. However, if we
add the assumption that 0 ∈ Ft for all t, then Algorithm 2 will not decrease the objective at any step,
t
t−1
X
X
ψ(
As x̃s ) − ψ(
As x̃s ) ≥ x̃t , ATt ỹt = max x, ATt ỹt ≥ 0,
s=1
x∈Ft
s=1
(12)
which follows from concavity of ψ.
In other words, the algorithm simply assigns 0 to xt if any other feasible point in Ft reduces the
objective value. Define
m
X
ũ =
At x̃t ,
t=1
and note that under the assumption 0 ∈ Ft , we have ψ(ũ) ≥ 0. Further, we have:
1
Psim ≥
D? .
1 − αψ (ũ)
(13)
We provide examples of non-monotone ψ and their competitive ratio analysis in this section and
section 3.1. Given appropriate conditions on Ft and At , in order to find a lower bound on the
competitive ratio independent of ũ, we only need to lower bound αψ over a subset of K. Note that
when ψ is not non-decreasing, then there exists a supergradient that is not in K ∗ . Therefore, αψ (ũ)
for general ψ can be less than −1. In this case, the lower bound for the competitive ratio of Algorithm
(2) is less than 12 .
We now consider examples of ψ that satisfy Assumption 1 and derive lower bound on αψ for those
examples.
2.3
Examples on the positive orthant.
Let K = Rn+ and note that K ∗ = K. To simplify the notation we use ≤ instead of ≤Rn+ . When ψ has
continuous partial second derivatives with respect to all the variables, Assumption 1 is equivalent to the
Hessian being element-wise non-positive over Rn+ . Assumption 1 is closely related to submodularity.
In fact, on the positive orthant this assumption is sufficient for submodularity of ψ on the lattice
defined by ≤. However, this assumption is not necessary for submodularity. When ψ has continuous
partial second derivatives with respect to all the variables, the necessary and sufficient condition only
requires the off-diagonal elements of the Hessian to be non-positive [28].
If ψ is separable, i.e.,
ψ(u) =
n
X
ψi (ui ),
(14)
i=1
Assumption 1 is satisfied since by concavity for each ψi we have ∂ψi (ui ) ≤ ∂ψi (vi ) when ui ≤ vi .
If ψ satisfies the Assumption 1, then so does ψ(Au), where A is an element-wise non-negative
matrix.
Adwords In the basic adwords problem, for all t, Ft = {x ∈ Rl+ | 1T x ≤ 1}, At is a diagonal
matrix with non-negative entries, and
n
n
X
X
ψ(u) =
ui −
(ui − 1)+ ,
(15)
i=1
∗
i=1
T
where (·)+ = max{·, 0}. In this problem, ψ (y) = 1 (y − 1). Since 0 ∈ ∂ψ(1) we have αψ = −1
by (8); therefore, the competitive ratio of algorithm 2 is 12 . Let r = maxt,i,j At,ij , then we have
Pm
1
t=1 hAt x̂t , ŷt+1 − ŷt i ≤ nr. Therefore, the competitive ratio of algorithm 1 goes to 2 as r (bid to
budget ratio) goes to zero. In adwords with concave returns studied in [13], At is diagonal for all t
and ψ is separable 5 .
5
Note that in this case one can remove the assumption that ∂ψi ⊂ R+ since if ỹt,i = 0 for some t and i,
then x̃s,i = 0 for all s ≥ t.
7
Online linear program and non-separable budget Recall that online LP is given by
!
m
m
X
X
T
maximize
ct xt + I{·≤1}
Bt xt
t=1
t=1
x t ∈ Ft ,
∀t ∈ [m].
where Ft = {x ∈ Rk+ | 1T x ≤ 1} is the simplex. If a lower bound on the optimal dual variable
mini yi∗ ≥ −l is given, then the LP can be written in the exact penalty form [6]:
!
m
m
X
X
T
maximizext ∈Ft
ct x t + G
Bt xt .
(16)
t=1
t=1
where G is an l-Lipschitz continuous function with respect to l1 norm given by
n
X
G(u) = −l
(ui − 1)+ .
i=1
−l is a lower bound on dual variable if
ct,j
l > max
| Bt,ij > 0, j ∈ [k], i ∈ [n] .
Bt,ij
(17)
To prove this, by way of contradiction, we assume that yi∗ ≤ −l for some i ∈ [n]. Now by the
definition of l, we have ct,j + (BtT y ∗ )j < 0 for all j such that Bt,ij > 0. On the other hand by the
optimality condition (3), ct + BtT y ∗ ∈ NFt (x∗t ) where NFt (x∗t ) is the normal cone of the simplex at
x∗t . Therefore, we should have x∗t,j = 0 for all j such that Bt,ij > 0. This results in (Bt x∗t )i = 0
Pm
which yield ( t=1 Bt x∗t )i = 0. This means that the corresponding variable yi∗ = 0 which is a
contradiction. With this choice of l, Algorithm 2 always maintains a feasible solution for the original
problem when applied to (16). This follows from the fact that if ỹt,i = −l for some t and i, then
(Bt x̃t )i = 0. Note that in the adwords problem Bt = diag(ct ) and l = 1.
For any p ≥ 1 let Bp be
Pnthe lp -norm ball. In order to provide examples of non-separable G,
we rewrite the function i=1 (ui − 1)+ using the distance from B∞ . For any set C ⊂ Rn+ , let
d1 (u, C) = inf ū∈C ku − ūk1 and note that d1 (u, C) is 1-Lipschitz continuous with respect to l1
norm. We have:
n
X
(1 − ui )+ = d1 (u, B∞ ).
(18)
i=1
Pm
Consider a problem with constraint k t=1 Bt xt kp ≤ 1. Given the bound on dual variable in (17),
this problem can be equivalently written in the form of (16) with the exact penalty [10, Theorem 5.5]
G(u) = −ld1 (u, Bp ).
When p = ∞, we get back (18).
For p ≥ 1, although not separable, the function G(u) = −d1 (u, Bp ) satisfies Assumption 1. For B1 ,
that follows from the fact that d1 (u, B1 ) = (1T u − 1)+ ; therefore, ∂d1 (u, B1 ) = 1∂f (1T u), where
f (x) = (x − 1)+ . The proof for p > 1 is given in Appendix B.
When ψ is given by 16 with G(u) = −ld1 (u, Bp ), we have αψ (ũ) ≥ − θl , where θ =
mint minx∈Ft
2.4
cT
t x
.
1T Bt x
The derivation of this bound is also given in Appendix B.
Examples on the positive semidefinite cone.
n
Let K = S+
and note that K ∗ = K. An interesting example that satisfies Assumption 1 is
p
ψ(U ) = trU with p ∈ (0, 1), where ∇ψ(U ) = pU p−1 and ᾱψ = p − 1. This objective function is
used in pth mean optimal experiment design. Another example is ψ(U ) = log det(U + A0 ), where
∇ψ(U ) = (U + A0 )−1 and ᾱψ = −1 since
h∇ψ(U ), U i
n − tr(A0 + U )−1 A0
=
→ 0 as trU → ∞.
ψ(U ) − ψ(0)
log det((A0 + U )A−1
0 )
8
Maximizing log det arises in several offline applications including D-optimal experiment design
[35], maximizing the Kirchhoff complexity of a graph [41], Optimal sensor selection [22, 40]. An
example of applications for maximizing the logdet of a projected Laplacian, as a function of graph
edge weights, appears in connectivity control of mobile networks [41]. We derive the competitive
ratio of the greedy algorithm with smoothing for online experiment design and Kirchhoff complexity
maximization of a graph in section 3.
3
Smoothing of ψ for improved competitive ratio
The technique of “smoothing” an objective function, or equivalently adding a strongly convex
regularization term to its conjugate function, has been used in several areas. In convex optimization,
a general version of this is due to Nesterov [32], and has led to faster convergence rates of first order
methods for non-smooth problems. In this section, we study how replacing ψ with a appropriately
smoothed function ψS helps improve the performance of the two algorithms discussed in section 1.1,
and show that it provides optimal competitive ratio for two of the problems mentioned in section 2,
adwords and online LP. We then show how to maximize the competitive ratio of Algorithm 2 for a
separable ψ and compute the optimal smoothing by solving a convex optimization problem. This
allows us to design the most effective smoothing customized for a given ψ: we maximize the bound
on the competitive ratio over the set of smooth functions.(see subsection 3.2 for details).
Let ψS denote an upper semi-continuous concave function (a smoothed version of ψ), and suppose
ψS satisfies Assumption 1. The algorithms we consider in this section are the same as Algorithms
1 and 2, but with ψ replacing ψS . Note that the competitive ratio is computed with respect to the
original problem, that is the offline primal and dual optimal values are still the same P ? and D? as
before. If we replace ψ with ψS in algorithms 1 and 2, the dual updates are modified to
* t
+
X
ŷt+1 ∈ argmin
As x̂s , y − ψS ∗ (y),
y
s=1
*
(x̃t , ỹt ) ∈ arg min max
y
x∈Ft
y, At x +
t−1
X
+
As x s
− ψS ∗ (y).
s=1
From Lemma 1, we have that
Dsim ≤ ψS
Dseq ≤ ψS
m
X
t=1
m
X
!
At x̃t
− ψ ∗ (ỹm+1 )
!
At x̂t
− ψ ∗ (ŷm+1 ) −
t=1
(19)
m
X
hAt x̂t , ŷt+1 − ŷt i .
(20)
t=1
Similar to our assumption on ψ(0), to simplify the notation, by replacing ψS (·) with ψS (·) − ψS (0),
we assume ψS (0) = 0. Define
αψ,ψS (u) = sup{c |ψ ∗ (y) ≥ ψS (u) + (c − 1)ψ(u), ∀y ∈ ∂ψS (u)},
and
ᾱψ,ψS = inf{αψ,ψS (u) | u ∈ K}.
Now the conclusion of Theorem 1 holds with ᾱψ replaced by ᾱψ,ψS . Similarly, when ψS is nonmonotone, inequality (13) holds with αψ replaced by αψ,ψS .
3.1
Nesterov Smoothing
We first consider Nesterov smoothing [32], and apply it to examples on non-negative orthant. Given a
proper upper semi-continuous concave function φ : Rn 7→ R ∪ {−∞}, let
ψS = (ψ ∗ + φ∗ )∗ .
Note that ψS is the hypo-sum (sup-convolution) of ψ and φ.
ψS = ψφ(u) = sup ψ(v) + φ(u − v).
v
9
This is called hypo-sum of ψ and φ since the hypo-graph of ψS is the Minkowski sum of hypo-graphs
of ψ and φ.
If ψ and φ are separable, then ψφ satisfies Assumption 1 for K = Rn+ . Here we provide example
of Nesterov smoothing for functions on non-negative orthant.
Adwords and Online LP: Consider the problem (16) with G(u) = −l
problem we smooth G with:
Pn
i=1 (ui
− 1)+ . For this
m
1 X
(e − 1)
θ
φ∗ (y) = ( ((yi −
) log(1 −
yi )) − (1 + γ)1T y),
γ i=1
(e − 1)
θ
where γ = log(1 +
l(e−1)
),
θ
cTt x
T
x∈Ft 1 Bt x
θ = min min
t
and l is defined as in (17). In this case, we have;
1
)γ.
e−1
αψ,ψφ (ũ) ≥ 1 − (1 +
(see the Appendix C for the derivation). This gives the competitive ratio of γ1 (1 − 1/e). In the case of
adwords where θ = l, this yield the optimal competitive ratio of 1 − e−1 and the smoothed function
coincides with the one derived in the previous paragraph. For a general LP, this approach provides
the optimal competitive ratio, which is known to be O(γ −1 ) [9].
Online experiment design and online graph formation: As pointed in section 2.4, maximizing
the determinant arises in graph formation, sensor selection and optimal experiment design. In the
offline form, these problems can be cast into maximizing log det subject to linear constraints as
follows:
m
X
maximize log det(A0 +
at aTt xt )
(21)
t=1
subject to
m
X
xt ≤ b,
t=1
xt ∈ [0, 1],
∀t,
where A0 0 and at ∈ Rn . We describe the online version of this problem for graph formation
and experiment design case. Consider the following online problem on a graph: given an underlying
connected graph with the Laplacian matrix L0 , at round t, the online algorithm is presented with
an edge and should decide whether to pick or drop theP
edge by choosing xt ∈ {0, 1}. There is a
n
bound on the number of the edges that can be picked, t=1 xt ≤ b. The goal is to maximize the
Kirchhoff complexity of the graph. The convex relaxation of the optimization problem is given by
21 where A0 = L0 + 11T and at is the incidence vector of the edge presented at round t. The
online experiment design or sensor selection is the same as (21). In that problem the vectors at are
experiment or measurement vectors.
The dual to 21 is as follows
maximize
m
X
(aTt Y at + y)+ + n − log det(Y ) + trA0 Y − by
t=1
subject to y ≤ 0, Y ≥ 0.
The hard budget constraint in problem 21 can be replaced by the exact penalty function G(u) =
−l(u − b)+ when −l is a given lower bound on the optimal dual variable corresponding to the
constraint. −l is a lower bound on the optimal dual variable corresponding to the constraint if
l>
2
.
λmin (A0 )
10
(22)
Pn
This follows from the fact that by the optimality condition (4), Y ∗ = (A0 + t=1 at aTt x∗t )−1 . If
y ∗ ≤ −l, then aTt Y ∗ at + y ∗ < 0 for all t. ThisP
combined with the the primal optimality condition
m
(3) forces x∗t = 0 for all t. Therefore, we get t=1 x∗t = 0 and y ∗ = 0, which is a contradiction.
Similar to the previous problems, we smooth G with:
b
θ
e−1
((y −
) log(1 −
y) − (1 + γ)y).
γ
e−1
θ
φ∗ (y) =
Here γ = log(1 + θl ) and θ = log(1 + 1/n). For this problem we have:
αψ,ψφ (ũ) ≥ 1 − (1 +
1
1
)γ + ᾱlog det ≥ −(1 +
)γ.
e−1
e−1
This results in the following competitive ratio bound
1
Psim − log det(A0 ) ≥
1+ 1+
1
e−1
(D? − log det(A0 )).
γ
The proof is included in the Appendix C. In the graph formation problem, λmin (A0 ) = λ2 (L0 ), that
is the second smallest eigenvalue of L0 . For a connected graph λ2 (L0 ) ∈ [1/n, n] with lower bound
achieved by the path graph and the upper bound achieved by the complete graph. Therefore, the
competitive ratio in this case is Ω( log1 n ).
3.2
Computing optimal smoothing for separable functions on Rn+
We now tackle the problem of finding the optimal smoothing for separable functions on the positive
orthant, which as we show in an example at the endP
of this section is not necessarily
Pn given by Nesterov
n
smoothing. Given a separable monotone ψ(u) = i=1 ψi (ui ) and ψS (u) = i=1 ψS i (ui ) on Rn+
we have that ᾱψ,ψS ≥ mini ᾱψi ,ψS i .
To simplify the notation, drop the index i and consider ψ : R+ 7→ R. We formulate the problem
of finding ψS to maximize αψ,ψS as an optimization problem. In section 4 we discuss the relation
between
this optimization method and the optimal algorithm presented in [13]. We set ψM (u) =
Ru
y(s)ds
with y a continuous function, and state the infinite dimensional convex optimization
0
problem with y as a variable,
minimize β
Z
subject to
(23)
u
y(s)ds − ψ ∗ (y(u)) ≤ βψ(u),
∀u ∈ [0, ∞)
0
y ∈ C[0, ∞).
where β = 1− ᾱψ,ψS (theorem 1 describes the dependence of the competitive ratios on this parameter).
Note that we have not imposed any condition on y to be non-increasing (i.e., the corresponding ψS
to be concave). The next lemma establishes that every feasible solution to the problem (23) can be
turned into a non-increasing solution.
Lemma 2 Let (y, β) be a feasible solution for problem (23) and define ȳ(u) = inf s≤u y(s). Then
(ȳ, β) is also a feasible solution for problem (23).
In particular if (y, β) is an optimal solution, then so is (ȳ, β). The proof is given in the supplement.
Re-
visiting the adwords problem, we observe that the optimal solution is given by y(u) =
e−exp(u)
e−1
+
,
which is the derivative of the smooth function we derived using Nesterov smoothing in section
3.1. The optimality of this y can be established by providing a dual certificate, a measure ν corresponding to the inequality constraint, that together with y satisfies the optimality condition. If we
set dν = f (u) du with f (u) = exp (1 − u)/(e − 1), the optimality conditions are satisfied with
11
β = (1 − 1/e)−1 .
Z
∞
f (u)ψ(u) du = 1, f 0,
Zu=0
∞
f (s) ds ∈ f (u)∂ψ ∗ (y(u)),
∀u ≥ 0,
Zs=u
u
y(s)ds − ψ ∗ (y(u)) ≤ βψ(u),
∀u ≥ 0,
0
Z u
f (u)(
y(s)ds − ψ ∗ (y(u)) − βψ(u)) = 0,
∀u ≥ 0.
0
Also note that if ψ plateaus (e.g., as in the adwords objective), then one can replace problem (23)
with a problem over a finite horizon.
Theorem 2 Suppose ψ(u) = c on [u0 , ∞). Then problem (23) is equivalent to the following problem,
minimize β
(24)
Z u
subject to
y(s)ds − ψ ∗ (y(u)) ≤ βψ(u),
∀u ∈ [0, u0 ]
0
y(u0 ) = 0,
y ∈ C[0, u0 ].
So for a function ψ with a plateau, one can discretize problem (24) to get a finite dimensional
problem,
minimize β
subject to h
(25)
t
X
y[s] − ψ ∗ (y[t]) ≤ βψ(ht),
∀t ∈ [d]
s=1
y[d] = 0,
where h = u0 /d is the discretization step. Figure 2a shows the optimal smoothing for the piecewise
linear function ψ(u) = min(.75, u, .5u + .25) by solving problem (25). We point out that the
optimal smoothing for this function is not given by Nesterov’s smoothing (even though the optimal
smoothing can be derived by Nesterov’s smoothing for a piecewise linear function with only two
pieces, like the adwords cost function). Figure 2d shows the difference between the conjugate of
the optimal smoothing function and ψ ∗ for the piecewise linear function, which we can see is not
concave.
Pm
In cases where a bound umax on t=1 At Ft is known, we can restrict t to [0, umax ] and discretize
problem (23) over this interval. However, the conclusion of Lemma 2 does not hold for a finite
horizon and we need to impose additional linear constraints y[t] ≤ y[t − 1] to ensure the monotonicity
of y. We find the optimal √
smoothing for two examples of this kind: ψ(u) = log(1 + u) over [0, 100]
(Figure 2b), and ψ(u) = u over [0, 100] (Figure 2c). In Figure 2e, we show the competitive ratio
achieved with the optimal smoothing of ψ(u)
√ = log(1 + u) over [0, umax ] as a function of umax .
Figure 2f depicts this quantity for ψ(u) = u.
3.3
Bounds for the sequential algorithm
In this section we provide a lower-bound on the competitive ratio of the sequential algorithm
(Algorithm 1). Based on this competitive ratio bound we modify Problem (23) for designing the
smoothing function for the sequential algorithm.
Theorem 3 Suppose ψS is differentiable on an open set containing K and satisfies Assumption 1. In
addition suppose there exists c ∈ K is such that At Ft ≤K c for all t, then
1
Pseq ≥
D? ,
1 − ᾱψ,ψS + κc,ψ,ψS
where κ is given by
κc,ψ,ψS = inf{r | hc, ∇ψS (0) − ∇ψS (u)i ≤ rψ(u), u ∈ K}
(26)
12
0.8
0.6
5
25
4
20
3
15
2
10
0.4
0.2
ψS
ψ
1
ψS
ψ
0
0
0
0
0.5
1
1.5
2
0
20
40
u
60
80
0
100
0.9
0.2
0.1
0.4
0.6
0.8
1
0.85
0.8
0.9
0.85
0.8
0.75
0
1
100
0.95
0.7
-0.1
80
(c)
0.75
0
60
u
comp. ratio
0.3
comp. ratio
0.95
0.2
40
(b)
0.4
0
20
u
(a)
ψS∗ (y) − ψ∗ (y)
ψS
ψ
5
500
0.7
1000
0
200
400
umax
y
(e)
(d)
600
800
1000
umax
(f)
Figure 2: Optimal√smoothing for ψ(u) = min(.75, u, .5u+.25) (a), ψ(u) = log(1+u) over [0, 100]
(b), and ψ(u) = u over [0, 100] (c). The competitive ratio
√ achieved by the optimal smoothing as a
function of umax for ψ(u) = log(1 + u) (e) and ψ(u) = u (f). ψS ∗ − ψ ∗ for the piecewise linear
function (d).
Proof:
Since ψS satisfies Assumption 1, we have ŷt+1 ≤K ∗ ŷt . Therefore, we can write:
m
X
hAt x̂t , ŷt − ŷt+1 i ≤
t=1
m
X
hc, ŷt − ŷt+1 i
t=1
= hc, ŷ0 − ŷm+1 i
(27)
Now by combining 20 with 27, we get
Dseq ≤ ψS
m
X
!
At x̂t
*
+
c, ∇ψS (0) − ∇ψS
t=1
m
X
!+
At x̂t
.
t=1
The conclusion of the theorem follows from the definition of ᾱψ,ψS , κc,ψ,ψS and the fact that
D̂ ≥ D? .
Based on the result of the previous theorem we can modify the optimization problem set up in
Section 3.2 for separable functions on Rn+ to maximize the lower bound on the competitive ratio of
the sequential algorithm. Note that in this case we have κc,ψ,ψS ≤ maxi κci ,ψi ,ψS i . Similar to the
previous section to simplify the notation we drop the index i and assume ψ is a function of a scalar
variable. The optimization problem for finding ψS that minimizes κc,ψ,ψS − ᾱψ,ψS is as follows:
minimize β
Z
subject to
(28)
u
y(s)ds + c(ψ 0 (0) − y(u)) − ψ ∗ (y(u)) ≤ βψ(u),
∀u ∈ [0, ∞)
0
y ∈ C[0, ∞).
In the case of Adwords, the optimal solution is given by
u−1
1
β=
y(u) = β 1 − exp
,
−1 ,
1+c
1 − exp( c+1
)
+
−1
which gives a competitive ratio of 1 − exp c+1
. In Figure 3b we have plotted the competitive
ratio achieved by solving problem 28 for ψ(u) = log det(1 + u) with umax = 100 as a function
13
0.8
Competitive ratio
Competitive ratio
0.7
0.6
0.5
0.4
0.3
0.6
0.4
0.2
0
0
0.2
0.4
0.6
0.8
1
0
20
40
60
c
c
(a)
(b)
80
100
Figure 3: The competitive ratio achieved by the optimal smoothing for the sequential algorithm as a
function of c for ψ(u) = min(.75, u, .5u + .25) (a) and ψ(u) = log(1 + u) with umax = 100 (b).
of c. Figure 3a shows the competitive ratio as a function of c for the piecewise linear function
ψ(u) = min(.75, u, .5u + .25).
4
Discussion and related work
We discuss results and papers from two communities, computer science theory and machine learning,
related to this work.
Online convex optimization. In [13], the authors proposed an optimal algorithm for adwords with
differentiable concave returns (see examples in section 2). Here, “optimal” means that they construct
an instance of the problem for which competitive ratio bound cannot be improved, hence showing
the bound is tight. The algorithm is stated and analyzed for a twice differentiable, separable ψ(u).
The assignment rule for primal variables in their proposed algorithm is explained as a continuous
process. A closer look reveals that this algorithm falls in the framework of algorithm 2, with the
only difference being that at each step, (x̃t , ỹt ) are chosen such that where vi : R+ 7→ R+ is an
increasing differentiable function given as a solution of a nonlinear differential equation that involves
ψi and may not necessarily have a closed form. The competitive ratio is also given based on the
differential equation. They prove that this gives the optimal competitive ratio for the instances where
ψ1 = ψ2 = . . . = ψn .
Note that this is equivalent of setting ψS i (ui ) = ψ(vi (ui ))). Since vi is nondecreasing ψS i is a
concave function. On the other hand, given a concave function ψS i (R+ ) ⊂ ψi (R+ ), we can set
vi : R+ 7→ R+ as vi (u) = inf{z | ψi (z) ≥ ψS i (u)}. Our formulation in section 3.2 provides a
constructive way of finding the optimal smoothing. It also applies to non-smooth ψ.
Recently, authors in [4, 7, 11] have provided a primal-dual onlineP
algorithm for the
Pmdual probm
lemP
(2) that corresponds to the non-monotone primal objective ψ ( t=1 At xt ) = t=1 cTt xt +
m
G ( t=1 Bt xt ).The primal and dual updates in their algorithm are presented as a continuous update
based on a differential equation. They assume that G∗ is differentiable and that ∇G∗ is monotone
on Rn+ , i.e., If y ≥ y 0 , then ∇G∗ (y) ≤ ∇G∗ (y 0 ). In contrast, our assumption written in terms of
G∗ for a differentiable function will become: If ∇G∗ (y) < ∇G∗ (y 0 ), then y ≥ y 0 , which is not
equivalent to the assumption in [7]. When G is separable the two assumptions coincide and this
algorithm is similar
Pn Rtoy algorithm 2 applied to the smooth function GM whose conjugate is given by
G∗M (y) = γ1 i=1 0 i G∗i 0 (z) log(1 − z/θ) dz. This smoothing coincides with Nesterov smoothing
in the case of LP.
Online learning. As mentioned before, the dual update in Algorithm 1 is the same as in Follow-theRegularized-Leader (FTRL) algorithm with −ψ ∗ as the regularization. This primal dual perspective
has been used in [39] for design and analysis of online learning algorithms. In the online learning
literature, the goal is to derive a bound on regret that optimally depends on the horizon, m. The goal
in the current paper is to provide competitive ratio for the algorithm that depends on the function ψ.
Regret provides a bound on the duality gap, and in order to get a competitive ratio the regularization
14
function should be crafted based on ψ. A general choice of regularization which yields an optimal
regret bound in terms of m is not enough for a competitive ratio argument, therefore existing results
in online learning do not address our aim.
Acknowledgments
The authors would like to thank James Saunderson, Ting Kei Pong, Palma London, and Amin Jalali
for their helpful comments and discussions.
References
[1] Jacob Abernethy, Elad Hazan, and Alexander Rakhlin. Competing in the dark: An efficient
algorithm for bandit linear optimization. In COLT, pages 263–274, 2008.
[2] Shipra Agrawal and Nikhil R Devanur. Fast algorithms for online stochastic convex programming. arXiv preprint arXiv:1410.7596, 2014.
[3] Shipra Agrawal, Zizhuo Wang, and Yinyu Ye. A dynamic near-optimal algorithm for online
linear programming. arXiv preprint arXiv:0911.2974, 2009.
[4] Yossi Azar, Ilan Reuven Cohen, and Debmalya Panigrahi. Online covering with convex
objectives and applications. arXiv preprint arXiv:1412.3507, 2014.
[5] Moshe Babaioff, Nicole Immorlica, David Kempe, and Robert Kleinberg. Online auctions and
generalized secretary problems. SIGecom Exch., 7(2):7:1–7:11, June 2008.
[6] Dimitri P Bertsekas. Necessary and sufficient conditions for a penalty method to be exact.
Mathematical programming, 9(1):87–99, 1975.
[7] Niv Buchbinder, Shahar Chen, Anupam Gupta, Viswanath Nagarajan, et al. Online packing and
covering framework with convex objectives. arXiv preprint arXiv:1412.8347, 2014.
[8] Niv Buchbinder, Kamal Jain, and Joseph Seffi Naor. Online primal-dual algorithms for maximizing ad-auctions revenue. In Algorithms–ESA 2007, pages 253–264. Springer, 2007.
[9] Niv Buchbinder and Joseph Naor. Online primal-dual algorithms for covering and packing.
Mathematics of Operations Research, 34(2):270–286, 2009.
[10] James V Burke. An exact penalization viewpoint of constrained optimization. SIAM Journal on
control and optimization, 29(4):968–998, 1991.
[11] TH Chan, Zhiyi Huang, and Ning Kang. Online convex covering and packing problems. arXiv
preprint arXiv:1502.01802, 2015.
[12] Nikhil R. Devanur and Thomas P. Hayes. The adwords problem: Online keyword matching
with budgeted bidders under random permutations. In Proceedings of the 10th ACM Conference
on Electronic Commerce, EC ’09, pages 71–78, New York, NY, USA, 2009. ACM.
[13] Nikhil R Devanur and Kamal Jain. Online matching with concave returns. In Proceedings of
the forty-fourth annual ACM symposium on Theory of computing, pages 137–144. ACM, 2012.
[14] Nikhil R Devanur, Kamal Jain, Balasubramanian Sivan, and Christopher A Wilkens. Near
optimal online algorithms and fast approximation algorithms for resource allocation problems.
In Proceedings of the 12th ACM conference on Electronic commerce, pages 29–38. ACM, 2011.
[15] Reza Eghbali, Jon Swenson, and Maryam Fazel. Exponentiated subgradient algorithm for
online optimization under the random permutation model. arXiv preprint arXiv:1410.7171,
2014.
[16] Jon Feldman, Monika Henzinger, Nitish Korula, Vahab S. Mirrokni, and Cliff Stein. Online
stochastic packing applied to display ad allocation. In Proceedings of the 18th Annual European
Conference on Algorithms: Part I, ESA’10, pages 182–194, Berlin, Heidelberg, 2010. SpringerVerlag.
[17] Jon Feldman, Aranyak Mehta, Vahab Mirrokni, and S Muthukrishnan. Online stochastic
matching: Beating 1-1/e. In Foundations of Computer Science, 2009. FOCS’09. 50th Annual
IEEE Symposium on, pages 117–126. IEEE, 2009.
15
[18] Marguerite Frank and Philip Wolfe. An algorithm for quadratic programming. Naval research
logistics quarterly, 3(1-2):95–110, 1956.
[19] Anupam Gupta and Marco Molinaro. How the experts algorithm can help solve lps online.
arXiv preprint arXiv:1407.5298, 2014.
[20] Patrick Jaillet and Xin Lu. Near-optimal online algorithms for dynamic resource allocation
problems. arXiv preprint arXiv:1208.2596, 2012.
[21] Patrick Jaillet and Xin Lu. Online stochastic matching: New algorithms with better bounds.
Mathematics of Operations Research, 2013.
[22] Siddharth Joshi and Stephen Boyd. Sensor Selection via Convex Optimization. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 57(2), 2009.
[23] Bala Kalyanasundaram and Kirk R Pruhs. An optimal deterministic algorithm for online
b-matching. Theoretical Computer Science, 233(1):319–325, 2000.
[24] Chinmay Karande, Aranyak Mehta, and Pushkar Tripathi. Online bipartite matching with
unknown distributions. In Proceedings of the forty-third annual ACM symposium on Theory of
computing, pages 587–596. ACM, 2011.
[25] Richard M Karp, Umesh V Vazirani, and Vijay V Vazirani. An optimal algorithm for on-line
bipartite matching. In Proceedings of the twenty-second annual ACM symposium on Theory of
computing, pages 352–358. ACM, 1990.
[26] Thomas Kesselheim, Klaus Radke, Andreas Tönnis, and Berthold Vöcking. Primal beats dual
on online packing lps in the random-order model. In Proceedings of the 46th Annual ACM
Symposium on Theory of Computing, STOC ’14, pages 303–312, New York, NY, USA, 2014.
ACM.
[27] Robert Kleinberg. A multiple-choice secretary algorithm with applications to online auctions.
In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, pages
630–631. Society for Industrial and Applied Mathematics, 2005.
[28] GG Lorentz. An inequality for rearrangements. The American Mathematical Monthly, 60(3):176–
179, 1953.
[29] Mohammad Mahdian and Qiqi Yan. Online bipartite matching with random arrivals: an
approach based on strongly factor-revealing lps. In Proceedings of the forty-third annual ACM
symposium on Theory of computing, pages 597–606. ACM, 2011.
[30] Vahideh H Manshadi, Shayan Oveis Gharan, and Amin Saberi. Online stochastic matching:
Online actions based on offline statistics. Mathematics of Operations Research, 37(4):559–573,
2012.
[31] Aranyak Mehta, Amin Saberi, Umesh Vazirani, and Vijay Vazirani. Adwords and generalized
online matching. Journal of the ACM (JACM), 54(5):22, 2007.
[32] Yu Nesterov. Smooth minimization of non-smooth functions. Mathematical programming,
103(1):127–152, 2005.
[33] Yurii Nesterov. Introductory lectures on convex optimization, volume 87. Springer Science &
Business Media, 2004.
[34] Yurii Nesterov. Primal-dual subgradient methods for convex problems. Mathematical programming, 120(1):221–259, 2009.
[35] Friedrich Pukelsheim. Optimal design of experiments, volume 50. siam, 1993.
[36] R Tyrrell Rockafellar, Roger J-B Wets, and Maria Wets. Variational analysis, volume 317.
Springer, 1998.
[37] Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations and Trends
in Machine Learning, 4(2):107–194, 2011.
[38] Shai Shalev-Shwartz and Yoram Singer. Online learning: Theory, algorithms, and applications.
2007.
[39] Shai Shalev-Shwartz and Yoram Singer. A primal-dual perspective of online learning algorithms.
Machine Learning, 69(2-3):115–142, 2007.
16
[40] Manohar Shamaiah, Siddhartha Banerjee, and Haris Vikalo. Greedy sensor selection: Leveraging submodularity. In 49th IEEE Conference on Decision and Control (CDC), pages 2572–2577.
IEEE, dec 2010.
[41] Michael M Zavlanos and George J Pappas. Distributed connectivity control of mobile networks.
Robotics, IEEE Transactions on, 24(6):1416–1428, 2008.
Appendix
A
Proofs
Proof of Lemma 1: Using the definition of Dsim , we can write:
Dsim =
m
X
σt (ATt ỹt ) − ψ ∗ (ỹm+1 )
t=1
=
m
X
hAt x̃t , ỹt i − ψ ∗ (ỹm+1 )
t=1
≤
m
X
t
t−1
X
X
(ψ(
As x̃s ) − ψ(
As x̃s )) − ψ ∗ (ỹm+1 )
t=1
= ψ(
m
X
s=1
s=1
As x̃s ) − ψ(0) − ψ ∗ (ỹm+1 ),
s=1
where in the inequality follows from concavity of ψ, and the last line results from the sum telescoping.
Similarly, we can bound Dseq :
Dseq =
=
m
X
t=1
m
X
σt (ATt ŷt ) − ψ ∗ (ŷm+1 )
(29)
hAt x̂t , ŷt i − ψ ∗ (ŷm+1 )
t=1
=
m
X
hAt x̂t , −ŷt+1 + ŷt i +
t=1
≤
m
X
t=1
=
m
X
t=1
m
X
hAt x̂t , ŷt+1 i − ψ ∗ (ŷm+1 )
t=1
hAt x̂t , −ŷt+1 + ŷt i +
m
X
t
t−1
X
X
(ψ(
As x̂s ) − ψ(
As x̂s )) − ψ ∗ (ŷm+1 )
t=1
s=1
s=1
m
X
hAt x̂t , −ŷt+1 + ŷt i + ψ(
As x̂s ) − ψ(0) − ψ ∗ (ŷm+1 ).
s=1
To provide intuition about the above inequalities
Pm we have plotted the derivative of a concave function
ψ defined on R+ in Figure 4. The quantity t=1 hAt x̃t , ỹt i is a right Riemann
Pm sum approximation
of the integral of ψ 0 and lower bounds the integral (Figure 4a). The quantity t=1 hAt x̂t , ŷt i is a left
Riemann sum approximation of the integral and upper bounds the integral (Figure 4b). The area of
hatched rectangle bounds the error of the left Riemann sum and is equal to hAt x̂t , −ŷt+1 + ŷt i.
When ψ is differentiable with Lipschitz gradient, we can use the following inequality that is equivalent
to Lipschitz continuity of the gradient:
ψ(u0 ) ≥ ψ(u) + h∇ψ(u), u0 − ui −
17
1
2
ku − u0 k
2µ
u, u0 ∈ K
ψ 0 (u)
ψ 0 (u)
ŷ1
ỹ1
ŷt
ỹ2
ŷ3
ỹ3
A1 x̃1 A2 x̃2
u
A3 x̃3
A1 x̂1
(a)
Figure 4: Interpretation of
At x̂t At x̂3
u
(b)
Pm
t=1
σt (ATt ỹt ) and
Pm
t=1
σt (ATt ŷt ) as Riemann sums.
(see, for example, [33, section 2.1.1]) to get
Dseq =
=
m
X
t=1
m
X
σt (ATt ŷt ) − ψ ∗ (ŷm+1 )
(30)
hAt x̂t , ŷt i − ψ ∗ (ŷm+1 )
t=1
≤
t−1
t
m
m
X
X
X
X
1
2
As x̂s )) − ψ ∗ (ŷm+1 )
As x̂s ) − ψ(
(ψ(
kAt x̂t k +
2µ
s=1
s=1
t=1
t=1
=
m
m
X
X
1
2
kAt x̂t k + ψ(
As x̂s ) − ψ(0) − ψ ∗ (ŷm+1 ).
2µ
t=1
s=1
Proof of Lemma 2: Let (y, β) be a feasible solution for problem (23). Note that y ≥ 0 since
dom ψ ∗ ⊂ R+ by the fact that ψ is non-decreasing. Let ȳ(u) = inf s≤u y(s). Note that ȳ is
continuous. Define
Ru
Ru
y(s) ds − ψ ∗ (y(u))
ȳ(s) ds − ψ ∗ (ȳ(u))
s=0
β(u) =
,
β̄(u) = s=0
,
ψ(u)
ψ(u)
with the definition modified with the right limit at u = 0. For any u such that ȳ(u) = y(u), we have:
Ru
Ru
y(s) ds − ψ ∗ (y(u))
ȳ(s) ds − ψ ∗ (ȳ(u))
s=0
β(u) =
≥ s=0
= β̄(u).
ψ(u)
ψ(u)
Now, we consider the set {u | ȳ(u) 6= y(u)}. By the definition of ȳ, we have ȳ(0) = y(0). Since
both functions are continuous, the set {u | ȳ(u) 6= y(u)} is an open subset of R and hence can be
written as a countable union of disjoint open intervals. Specifically, we can define the end points of
the intervals as:
a0 = b0 = 0,
ai = inf{u > bi−1 | y(u) > ȳ(u)}, ∀i ∈ {1, 2, . . .}
bi = inf{u > ai | y(u) = ȳ(u)}, ∀i ∈ {1, 2, . . .}.
S
then {u | ȳ(u) 6= y(u)} = i∈{1,2,...} (ai , bi ).(See Figure 5)
For any i ∈ {1, 2, . . .}, we show that β(u) ≥ β̄(u) on (ai , bi ). If ai = ∞, then bi = ∞, so we
assume that ai < ∞. By the definition of ai and bi , ȳ(u) is constant on (ai , bi ). Also, we have
y(ai ) = ȳ(ai ). Similarly, we have y(bi ) = ȳ(bi ) whenever bi < ∞.
18
a1
b1 a2
b2 u
Figure 5: An example of y(u) (solid blue) and ȳ(u) (dashed red).
Since ȳ(u) ≤ y(u) for all u and y(ai ) = ȳ(ai ), we have
β(ai ) ≥ β̄(ai ).
(31)
If bi < ∞, similarly by the fact that y(bi ) = ȳ(ai ) = ȳ(bi ), we have
β(bi ) ≥ β̄(bi ).
(32)
Now we consider the case where bi = ∞. In this case we have ȳ(u) = ȳ(ai ) on (ai , ∞). We
consider two cases based on the asymptotic behavior of ψ. If limu→∞ ψ(u) = +∞ (ψ is unbounded),
then we have
Ru
Ru
y(s) ds
ȳ(ai ) ds
s=0
lim sup β(u) = lim sup
≥ lim sup s=0
= lim β̄(u).
(33)
u→∞
ψ(u)
ψ(u)
u→∞
u→∞
u→∞
Here we used the fact that −ψ ∗ (y(u)) is bounded. This follows from the fact ψ ∗ is monotone thus:
−ψ ∗ (y(u)) ≤ −ψ ∗ (ȳ(ai )),
and −ψ ∗ (ȳ(ai )) < ∞ because if −ψ ∗ (ȳ(ai )) = ∞, then β(ai ) ≥ β̄(ai ) = ∞ which contradicts the
feasibility of (y, β).
Now consider the case when limu→∞ ψ(u) = M for some positive constant M . In this case,
−ψ ∗ ≤ M . We claim that y(ai ) = 0 and lim inf t→∞ y(u) = 0. Suppose lim inf u→∞ y(u) > 0,
then lim supu→∞ β(u) = ∞ since the numerator in the definition of β tends to infinity while
the denominator is bounded. But this contradicts feasibility of (y, β). On the other hand, by the
definition of ai and bi we should have y(ai ) = ȳ(ai ) ≤ lim inf u→∞ y(u). Combining this with
the fact that ȳ(ai ) ∈ dom ψ ∗ ⊂ R+ , we conclude that y(ai ) = 0. Using that y(ai ) = 0 and
lim inf u→∞ y(u) = 0, we get:
Ru
y(s) ds − ψ ∗ (y(u))
lim sup β(u) = lim sup s=0
ψ(u)
u→∞
u→∞
Ru
y(s) ds − ψ ∗ (0)
≥ lim s=0
u→∞
M
R ai
ȳ(s)
ds
−
ψ ∗ (0)
≥ s=0
= lim β̄(u),
(34)
u→∞
M
where in the last inequality we used the fact that ȳ(u) = 0 for u ≥ ai .
Let ψ 0 be the right derivative of ψ. Since ψ is concave, ψ 0 is non-increasing. Therefore, the interval
(ai , bi ) can be written as (ai , u0 ] ∪ [u0 , bi ) such that ψ 0 (u) ≥ ȳ(ai ) on (ai , u0 ] and ψ 0 (u) ≤ ȳ(ai ) on
[u0 , bi ). Since ψ 0 (u) ≥ ȳ(ai ) on (ai , u0 ] we have:
Z u
Z u
ȳ(s) ds =
ȳ(ai ) ds
ai
ai
Z u
≤
ψ 0 (s) ds = ψ(u) − ψ(ai ),
ai
19
for all u ∈ (ai , u0 ]. This yields:
R ai
β̄(ai ) =
≥
ȳ(s) ds − ψ ∗ (ȳ(ai ))
ψ(u)
Ru
R ai
ȳ(s) ds + ai ȳ(s) ds − ψ ∗ (ȳ(ai ))
s=0
s=0
ψ(ai ) + ψ(u) − ψ(ai )
= β̄(u).
for all u ∈ (ai , u0 ]. Here we used the fact that if c1 ≥ c2 > 0 and d2 ≥ d1 ≥ 0, then
c1
c1 + d1
≥
.
c2
c2 + d2
Similarly, we have β̄(bi ) ≥ β̄(u) for any u ∈ [u0 , bi ). Combining this with (31),(32),(33), and (34),
we get:
sup β̄(u) = max(β̄(ai ), β̄(bi ))
ai ≤u≤bi
≤ max(β(ai ), β(bi )) ≤
sup β(u).
ai ≤u≤bi
We conclude that β̄(u) ≤ β(u) for all t ≥ 0 hence (ȳ, β) is a feasible solution for the problem.
Proof of Theorem 2: Let (y, β) be a feasible solution for problem (23). By Lemma 2, we can
assume that y is non-increasing. First, note that y ≥ 0 since dom ψ ∗ = [0, ∞). Define ȳ(u) = y(u)
for u ≤ u0 and ȳ(u) = 0 for u > u0 . We show that (ȳ, β) is also a feasible solution for (23) modulo
the continuity condition. Define
Ru
Ru
y(s) ds − ψ ∗ (y(u))
ȳ(s) ds − ψ ∗ (ȳ(u))
s=0
β(u) =
,
β̄(u) = s=0
.
ψ(u)
ψ(u)
By the definition of ȳ, for all u, we have:
Z u
Z
y(s) ds ≥
0
u
ȳ(s) ds,
(35)
0
and β(u) = β̄(u) for u ∈ [0, u0 ]. Since y(u) is non-increasing and y(u) ≥ 0, limu→∞ y(u) exists.
We claim that limu→∞ y(u) = 0. To see this note that if limu→∞ y(u) > 0, then
Z u
y(s) ds = ∞,
lim
u→∞
s=0
which contradicts the fact that β(u) ≤ β for all u. For all u ≥ u0 , now we have:
Ru
limu→∞ s=0 y(s) ds − ψ ∗ (0)
sup β(u) ≥ lim β(u) =
u→∞
ψ(u0 )
u≥u0
Ru
limu→∞ s=0 ȳ(s) ds − ψ ∗ (0)
= β̄(u0 ),
≥
ψ(u0 )
where the equality follows from the fact that limu→∞ y(u) = 0, and in the last inequality, we used
(35). Since ȳ(u) = 0 for u > u0 , β(u) is constant on [u0 ∞). Therefore, supu≥u0 β̄(u) = β̄(u0 ).
Combining this with the previous inequality we get:
sup β(u) ≥ sup β̄(u0 ).
u≥u0
u≥u0
Therefore, we conclude that β̄(u) ≤ β for all u. Thus (ȳ, β) is also a feasible solution for (23)
modulo the continuity condition. Note that ȳ(u) may not be continuous at u0 . However, we can find
a sequence of continuous functions z (j) that converge pointwise to y and z (i) (u) = 0 for all i and
u ≥ u0 . To do so we consider a sequence of real number i → 0. We define z (i) (u) = ȳ(u) for
u ∈ [0, u0 − i ) ∪ [u0 , ∞). On [u0 − i , u0 ] we define z (i) (u) to be a linear function that take values
y(u0 − ) and 0 on the endpoints. Define
R u (i)
z (s) ds − ψ ∗ (z (i) (u))
βz(i) = sup s=0
.
ψ(u)
u>0
20
By upper semi-continuity of ψ ∗ , βz(i) converges to β̄.
Let β ∗ be the optimal solution for problem (23). By the definition, there exits a feasible sequence
(y (j) , β (j) ) such that β (j) converges to β ∗ . Let ȳ (j) (u) = y (j) (u) for t ≤ u0 and ȳ (j) (u) = 0 for
t > u0 . Note that ȳ (j) (u) may not be continuous at u0 . However, we can find a sequence of continuous
functions (z (ji) , βz(ji) ) as in above. Now βz(jj) converges to β ∗ .
Distance from lp norm ball
B
In this section we prove that the function:
G(u) = −d1 (u, Bp )
satisfies Assumption 1 and find a lower bound on ᾱψ when ψ is given by 16 with G(u) =
−ld1 (u, Bp ).
For any u ∈ Rn+ , there exists ū ∈ Bp such that d1 (u, Bp ) = ku − ūk1 . the subdifferential of distance
function is6 :
∂d1 (u, Bp ) = ∂ ku − ūk1 ∩ NBp (ū),
where NBp (u) = {ξ | hξ, v − ui ≥ 0, ∀v ∈ Bp } is the normal cone of Bp at u. In fact d1 (u, Bp ) =
ku − ūk1 if and only if ∂ ku − ūk1 ∩ NBp (ū) 6= ∅. When u ∈ intBp , ū = u and ∂d1 (u, Bp ) = {0}.
In order to find ∂d1 (u, Bp ) when u ∈
/ intBp , we first find ū in this case. For any r ≥ 0, define
u ∧ r ∈ Rn+ to be:
(u ∧ r)i = min(ui , r) ∀i.
Note that ku ∧ 0kp = 0 and ku ∧ (maxi ui )kp = kukp ≥ 1. Since ku ∧ rkp is a continuous function
of r, by the intermediate value theorem, there exists ru ∈ (0, maxi ui ] such that ku ∧ ru kp = 1.
Now ū = u ∧ r. To see this note that:
∂ ku − ūk1 ∩ NBp (ū) =
∂ ku − ūk1 ∩ NBp (ū) =
1
◦(p−1)
(u ∧ ru )
for ru < max ui ;
i
rup−1
z
◦(p−1)
|0≤z≤1
for ru = max ui ;
p−1 (u ∧ ru )
i
ru
(36)
(37)
where ◦(p−1) denotes element-wise exponentiation. Now if u0 ≤ u, then ru ≤ ru0 since ku ∧ rkp ≥
ku0 ∧ rkp for all r. Thus by (36) and (37), there exists y ∈ ∂d1 (u, Bp ) such that y ≥ ∂d1 (u0 , Bp ).
Now
bound αψ when ψ is given by 16 with G(u) = −ld1 (u, Bp ). Let (v, u) =
Pm we canPlower
m
( t=1 ct x̃t , t=1 Bt x̃t ). Note that by (36) when y ∈ ∂ψ(u) with u ∈
/ Bp , then mini yi = −l. Now
by the definition of l in (17) and the explanation that followed it, we must have u ∈ Bp . If u ∈ intBp ,
then G is differentiable at u and ∇G(u) = 0 which yields αψ (v, u) = 0. Now suppose u ∈ bdBp .
In this case we have:
− kykq
− kykq
G∗ (y)
Pm
αψ (v, u) = min
= min Pn
≥ min
.
y∈∂G(u)
y∈∂G(u) ψ (
y∈∂G(u) θ1T u
t=1 At xt )
t=1 ct x̄t
Recall that θ = mint minx∈Ft
cT
t x
.
1T Bt x
By (37), we have:
min − kykq = −
y∈∂G(u)
l
.
(maxi ui )p−1
Therefore,
αψ (v, u) ≥ −
l
1
.
θ (1T u)(maxi ui )p−1
As u varies on the bdBp , the right hand side is lower bounded by
6
For convex function we use ∂ to denote subdifferential.
21
−l
θ .
This yields αψ ≥ − θl .
C
Derivation of lower bounds on αψ,ψφ
We first derive a general inequality which will be specialized to different examples for bounding
αψ,ψφ . Let K = K1 × K2 , with K1 and K2 two proper cones. Suppose ψ(v, u) = H(v) + G(u),
where H : K1 7→ R is a non-decreasing, and G : K
P2m7→ R is non-increasing and l Lipschitz
continuous. We assume H(v) ≥ θu for all (v, u) ∈ t=1 At Ft . Note that ψ ∗ (z, y) = H ∗ (z) +
G∗ (y). We set
m
X
θ
(e − 1)
1
∗
yi −
log 1 −
yi − (1 + γ)yi ,
φ (y) =
γ
(e − 1)
θ
i=1
Pm
where γ = log(1 + l(e−1)
). We let ψφ(v, u) = H(v) + Gφ(u). Let (v, u) ∈ t=1 At x̃t . Since
θ
ψφ(0) = 0, and the simultaneous algorithm does not decrease the objective,
H(v) + Gφ(u) ≥ ψφ(0) = 0.
(38)
Let (z, y) ∈ ∂ψφ(u), then we have:
˜ i G∗ (y)
ui = ∇i φ∗ (y) + ∇
1
(e − 1)yi
˜ i G∗ (y),
= log(1 −
)−1+∇
γ
θ
(39)
˜ ∗ (y) ∈ ∂G∗ (y). Using the previous identity, we can derive the following upper bound
for some ∇G
for Gφ(u):
Gφ(u) = hy, ui − G∗ (y) − φ∗ (y)
D
E
˜ ∗ (y) − G∗ (y) + hy, ∇φ∗ (y)i − φ∗ (y)
= y, ∇G
˜ ∗ (y)) + φ(∇φ∗ (y))
= G(∇G
m
X
θ
˜ ∗ (y)) +
˜ i G∗ (y) + 1) + 1 1T y
= G(∇G
(ui − ∇
(e − 1) i=1
γ
m
X
1
θ
˜ i G∗ (y)) + 1 1T y.
H(v) +
(1 − ∇
(40)
(e − 1)
(e − 1) i=1
γ
Pm
Now we specialize the bound to the case where G : Rm
+ 7→ R and G(u) = −l
i=1 (ui − 1)+ . We
∗
˜
lower bound αψ,ψφ (v, u) when u ≤ 1. In that case, (39) is satisfied with ∇i G (y) = 1. Thus from
(40) simplifies to:
1
1
Gφ(u) ≤
H(v) + 1T y.
(41)
(e − 1)
γ
˜ ∗ (y)) +
≤ G(∇G
Combining this with (38), we get:
H(v) + G(u) = H(v) ≥
(1/e − 1) T
1 y.
γ
(42)
In the view of definition of αψ,ψφ , by using (41) and the fact that G∗ (y) = 1T y, we derive the
following inequality:
1
1
H(v) + Gφ(u) − G∗ (y) ≤ (1 +
)H(v) + ( − 1)1T y.
(43)
e−1
γ
Combining (42) and (43), we get the following lower bound on αψ,ψφ :
αψ,ψφ (v, u) ≥ 1 − (1 +
1
)γ + ᾱH .
e−1
(44)
Online LP: In this problem,
ψ
m
X
t=1
!
At x t
=
m
X
cTt xt
t=1
+G
m
X
t=1
22
!
Bt xt
,
(45)
Pn
with G(u) = −l i=1 (ui − 1)+ . In this problem H(v) = v is the identity function.
Pm
Pm
Let (ṽ, ũ) = ( t=1 cTt x̃t , t=1 Bt x̃t ). If ỹt,i ≤ −l for some t and i, then by the definition of l
in (17) and the explanation that followed it, we have (Bt x̃t )i = 0. On the other hand, we have
∇i Gφ(u) ≤ −l when ũi ≥ 1. Therefore, we conclude that ũ ≤ 1. Also, by the definition of θ, we
have H(ṽ) ≥ θ1T ũ. Since H is a linear function, αH = 0. Thus (44) yields
αψ,ψφ (ṽ, ũ) ≥ 1 − (1 +
1
)γ.
e−1
(46)
Online graph formation and online Experiment design : In this problem, H(U ) = log det(U +
A0 ) − log det(A0 ), G(u) = −l(b − u)+ and At x = (aTt at x, x).
We can use the following identity for determinant of rank one update of a matrix
det(A + vv T ) = det(A)(1 + v T A−1 v T ),
to derive a lower bound on log det(U + A0 ) − log det(A0 ),
H(U ) = log det(U + A0 ) − log det(A0 )
=
m
X
log det(A0 +
s=1
=
m
X
s
X
at aTt x̃t )
− log det(A0 +
t=1
s−1
X
at aTt x̃t )
t=1
log(1 + aTt Ỹt at x̃t )
t=1
≥ log(1 +
m
1 X
)
x̃t = θu.
n t=1
Pm
Pm
Let (Ũ , ũ) = ( t=1 at aTt x̃t , t=1 x̃t ). If ỹt ≤ −l for some t, then by the definition of l in (22),
aTt Ỹt at + ỹt < 0 which results in x̃t = 0. Given the fact that Gφ0 (u) = −l when u ≥ b, we
conclude that ũ ≤ b. Therefore, by (44), we get
αψ,ψφ (Ũ , ũ) ≥ −(1 +
23
1
)γ.
e−1
| 8cs.DS
|
arXiv:1605.03017v3 [math.ST] 27 Jul 2016
Marginalized Particle Filtering and Related
Filtering Techniques as Message Passing
July 29, 2016
Abstract
In this manuscript a factor graph approach is employed to investigate the recursive filtering problem for mixed linear/nonlinear state-space
models. Our approach allows us to show that: a) the factor graph characterizing the considered filtering problem is not cycle free; b) in the case
of conditionally linear Gaussian systems, applying the sum-product rule,
together with different scheduling procedures for message passing, to this
graph results in both known and novel filtering techniques. In particular,
it is proved that, on the one hand, adopting a specific message scheduling
for forward only message passing leads to marginalized particle filtering
in a natural fashion; on the other hand, if iterative strategies for message passing are employed, a novel filtering method, dubbed turbo filter
for its conceptual resemblance to the turbo decoding methods devised for
concatenated channel codes, can be developed.
Giorgio M. Vitetta, Emilio Sirignano, Francesco Montorsi and Matteo Sola
University of Modena and Reggio Emilia
Department of Engineering ”Enzo Ferrari”
Via P. Vivarelli 10/1, 41125 Modena - Italy
email: giorgio.vitetta@unimore.it, emilio.sirignano@unimore.it,
francesco.montorsi@gmail.com, sola.matteo87@gmail.com
Keywords: State Space Representation, Hidden Markov Model, Particle
Filter, Belief Propagation, Turbo Processing.
1
G. M. Vitetta et al., Marginalized Particle Filtering . . .
1
2
Introduction
The nonlinear filtering problem consists of inferring the posterior distribution of
the hidden state of a nonlinear dynamic system from a set of past and present
measurements [1]. It is well known that, if a nonlinear dynamic system can be
described by a state-space model (SSM), a general sequential procedure, based
on the Bayes’ rule and known as Bayesian filtering, can be easily derived for
recursively computing the posterior distribution of the system current state
[1]. Unluckily, Bayesian filtering is analytically tractable in few cases for the
following two reasons [2]: a) one of the two steps it consists of requires multidimensional integration which, in most cases, does not admit a closed form
solution; b) the functional form of the required posterior distribution may not
be preserved over successive recursions. For this reason, sequential techniques
employed in practice are based on various analytical approximations and, consequently, generate a functional approximation of the desired distribution. Such
techniques are commonly divided into local and global methods on the basis of
the way posterior distributions are approximated [3, 4, 5]. Local methods, like
extended Kalman filtering [6] and unscented filtering [7], are computationally
efficient, but may suffer from the problem of error accumulation over time. On
the contrary, global methods, like sequential Monte Carlo methods [8, 9] (also
known as particle filtering, PF, methods [10, 11, 12]) and point mass filtering
[5, 13] may achieve high accuracy at the price, however, of an unmanageable
complexity and numerical problems in the presence of a large dimension of system state [14]. These considerations have motivated various research activities
focused on the development of novel Bayesian filters able to achieve high accuracy under given computational constraints. Significant results in this research
area concern the use of the new representations for complex distributions, like
belief condensation filtering [3], and the development of novel filtering techniques combining local and global methods, like marginalized particle filtering
(MPF) [15, 16], and other methods originating from it [4, 17, 18]. Note that
the last class of methods applies to mixed nonlinear/nonlinear models [19], that
is to models whose state can be partitioned in a conditionally linear portion
(usually called linear state variable) and in a nonlinear portion (representing
the remaining part of system state and called nonlinear state variable). This
partitioning of system state allows to combine a global method (e.g., particle
filtering) operating on the nonlinear state variable with a local technique (e.g.,
Kalman filtering) involving the linear state variable only.
In this manuscript the factor graph (FG) approach illustrated by Loeliger et
G. M. Vitetta et al., Marginalized Particle Filtering . . .
3
al. in [20] is employed to revisit the problem of recursive Bayesian filtering for
mixed linear/nonlinear models from a perspective substantially different from
that adopted in MPF [15]. This allows us to shed new light on the problem of
filtering for mixed linear/nonlinear models, providing a new interpretation of
MPF and paving the way for the development of new filtering techniques. In
particular, based on this approach, we are able to show that: a) the considered
filtering problem can be formulated as a message massing problem over a specific
FG, which, unluckily, is not cycle free; b) in the case of a conditionally linear
Gaussian (CLG) SSM [19], MPF results from the application of the sum-product
algorithm (SPA) [20, 21], together with a specific scheduling procedure for forward only message passing, to this graph; c) our graphical representation leads,
in a natural fashion, to the development of novel filtering methods simplifying
and/or generalising it. As far as the last point is concerned, in our work specific
attention is paid to the development of a novel iterative filtering technique that
exploits the exchange of probabilistic (i.e., soft) messages to progressively refine
the posteriors of the linear and nonlinear state variables within each recursion
and is dubbed turbo filtering (TF) for its conceptual resemblance to the iterative
(i.e., turbo) decoding of concatenated channel codes.
It is important to point that our approach has been inspired by various
ideas and results already available in the technical literature concerning different
research areas; here, we limit to mention the following relevant facts:
• A mixed linear/nonlinear Markov system can be represented as the concatenation of two interacting subsystems, one governed by linear dynamics, the other one accounting for a nonlinear behavior; conceptually related
(finite state) Markov models can be found in data communications and,
in particular, in concatenated channel coding (e.g., turbo coding [22]) and
in coded transmissions over inter-symbol interference channels for which
turbo decoding methods [22, 23] and turbo equalization techniques [24] have
been developed, respectively1 .
• Factor graphs play an essential role in the derivation and interpretation
of turbo decoding and equalization [20, 26] (for instance, turbo decoding
techniques emerge in a natural fashion from graphical models of codes
[27]).
• Both Kalman filtering and particle methods can be viewed as message
1 Note that these classes of algorithms can be seen as specific applications of the so called
turbo principle [25], [35, Par. 10.5.1]
4
G. M. Vitetta et al., Marginalized Particle Filtering . . .
passing procedures on factor graphs, as shown in [20, 21] and in [28], respectively.
• Various methods to progressively refine distributional approximations through
multiple iterations have been developed in the field of Bayesian inference
on dynamic systems (even if implementations substantially different from
that we devise have been proposed), and, in particular, in expectation
propagation in Bayesian networks [29, 30] and in variational Bayesian
filtering [4]. Consequently, various links to previous work on Bayesian
inference on graphical models and variational Bayes methods [31] can be
also established.
The remaining part of this manuscript is organized as follows. The mathematical model of the considered class of mixed linear/nonlinear systems is illustrated in Section 2, whereas a representation of the filtering problem for these
systems through a proper FG is provided in Section 3. Then, it is shown that
applying the SPA and proper message scheduling strategies to this FG leads
to MPF in Section 4. This approach paves the way, in a natural fashion, for
the development of simplifications and generalizations of MPF, that are devised
in Sections 5 and 6, respectively. The novel filtering methods proposed in this
manuscript are compared, in terms of accuracy and computational effort, with
MPF in Section 7. Finally, some conclusions are offered in Section 8.
Notations: The probability density function (pdf) of a random vector R
evaluated at point r is denoted f (r); N (r; ηr , Cr ) represents the pdf of a Gaussian random vector R characterized by the mean ηr and covariance matrix Cr
evaluated at point r; the precision (or weight ) matrix associated with the covariance matrix Cr is denoted Wr , whereas the transformed mean vector Wr ηr
is denoted wr ; xi denotes the i-th element of the vector x.
2
System Model
In the following we focus on a discrete-time mixed linear/nonlinear SSM [15],
whose hidden state in the l-th interval is represented by a D-dimensional real
vector xl , [x0,l , x1,l , ..., xD−1,l ]T . We assume that this vector can be partitioned as
T
T T
(L)
(N )
xl = xl
, xl
,
(1)
(L)
(L)
(L)
(L)
(N )
(N )
(N )
(L)
where xl , [x0,l , x1,l , ..., xDL −1,l ]T (xl , [x0,l , x1,l , ..., xDN −1,l ]T ) is the
so called linear (nonlinear ) component of xl (1), with DL < D (DN = D − DL ).
5
G. M. Vitetta et al., Marginalized Particle Filtering . . .
(L)
This partitioning of xl is accomplished as follows. First, xl is identified as
that portion of xl (1) characterized by the following two properties:
1. Conditionally linear dynamics - This means that its update equation, con(N )
ditioned on xl , is linear, so that
(L)
(L)
(N )
(L)
(L)
(N )
(L)
xl+1 = Al
xl
xl + fl
xl
+ wl ,
(2)
(L)
(L)
(N )
where fl (x) is a time-varying DL -dimensional real function, Al (xl )
(L)
is a time-varying DL × DL real matrix and wl is the l-th element of
(L)
the process noise sequence {wk }, which consists of DL - dimensional
independent and identically distributed (iid) noise vectors.
2. Conditionally linear (or almost linear ) dependence of all the available
measurements on it - In other words, these quantities, conditioned on
(N )
(L)
xl , exhibit a linear dependence on xl (additional details about this
feature are provided below).
(N )
Then, xl
is generated by putting together all the components of xl that
(L)
do not belong to xl . For this reason, generally speaking, this vector is characterized by at least one of the following two properties:
a) Nonlinear dynamics - The update equation
(N )
(N )
(N )
(N )
(N )
(L)
(N )
xl+1 = fl
xl
+ Al
xl
xl + wl
(3)
is assumed in the following for the nonlinear component of system state, where
(N ) (N )
(N )
Al (xl ) is a time-varying DN × DL real matrix, fl (x) is a time-varying
(N )
DN -dimensional real function and wl is the l-th element of the process noise
(N )
sequence {wk }, which consists of DN -dimensional iid noise vectors and is
(L)
statistically independent of {wk }.
b) A nonlinear dependence of all the available measurements on it (further
details are provided below).
In the following Section we focus on the so-called filtering problem, which
concerns the evaluation of the posterior pdf f (xt |y1:t ) at an instant t > 1, given
a) the initial pdf f (x1 ) and b) the t · P -dimensional measurement vector
T
y1:t = y1T , y2T , ..., ytT ,
(4)
where yl , [y0,l , y1,l , ..., yP −1,l ]T denotes the P -dimensional real vector collecting all the noisy measurements available at time l. As already mentioned
G. M. Vitetta et al., Marginalized Particle Filtering . . .
6
above, the measurement vector yl exhibits a linear (nonlinear ) dependence on
(L)
(N )
xl (xl ), so that the model [18]
(N )
(L)
(N )
xl + el
(5)
+ Bl xl
yl = hl xl
(N )
(N )
can be adopted, where Bl (xl ) is a time-varying P × DL real matrix, hl (xl )
is a time-varying P -dimensional real function and el the l-th element of the
measurement noise sequence {ek } consisting of P -dimensional iid noise vectors
(N )
(L)
and independent of both {wk } and {wk }.
3
Representation of the Filtering Problem via
Factor Graphs
Generally speaking, the filtering problem for a SSM described by the Markov
model f (xl+1 |xl ) and the observation model f (yl |xl ) for any l concerns the
computation of the posterior pdf f (xt |y1:t ) for t ≥ 1 by means of a recursive
procedure [1]. It is well known that, if the pdf f (x1 ) is known, a general Bayesian
recursive procedure, consisting of a measurement update step followed by a time
update step, can be employed. In practice, in the first step of the l-th recursion
(with l = 1, 2, ..., t) the conditional pdf
f (xl |y1:l ) = f xl y1:(l−1) f (yl |xl )
1
f yl y1:(l−1)
(6)
is computed on the basis of pdf f (xl |y1:(l−1) ) (evaluated in the last step of the
previous recursion2 ), the present measurement vector yl and the pdf
Z
f yl y1:(l−1) = f (yl |xl ) f xl y1:(l−1) dxl .
(7)
In the second step f (xl |y1:l ) (6) is exploited to compute the pdf
Z
f (xl+1 |y1:l ) = f (xl+1 |xl ) f (xl |y1:l ) dxl ,
(8)
which represents a prediction about the future state xl+1 . It is important to
point out that: 1) the term 1/f (yl |y1:(l−1) ) appearing in the right hand side
(RHS) of (6) represents a normalization factor ; 2) both (7) and (8) require
integration with respect to xl and this may represent a formidable task when
the dimensionality of xl is large and/or the pdfs appearing in the integrands are
2 Note that in the first recursion (i.e., for l = 1) f (x |y
l 1:(l−1) ) = f (x1 |y1:0 ) = f (x1 ) and
f (yl |y1:(l−1) ) = f (y1 |y1:0 ) = f (y1 ), so that f (x1 |y1 ) = f (x1 )f (y1 |x1 )/f (y1 ).
G. M. Vitetta et al., Marginalized Particle Filtering . . .
7
not Gaussian; 3) this recursive procedure lends itself to be efficiently represented
by a message passing algorithm over a proper FG3 [28], in which each factor
of a product of functions is represented by a distinct node (a rectangle in our
diagrams), whereas each variable is associated with a specific (and, usually,
unoriented) edge or half edge. As far as the last point is concerned, we also
note that the derivation of this FG relies on the fact that the a posteriori pdf
f (xt |y1:t ) has the same FG as the joint pdf f (xt , y1:t ) (see [20, Sec. II, p. 1297])
and the last pdf can be computed recursively through a procedure similar to
that illustrated above, but in which the measurement update (6) and the time
update (8) are replaced by
and
f (xl , y1:l ) = f xl , y1:(l−1) f (yl |xl ) ,
f (xl+1 , y1:l ) =
Z
f (xl+1 |xl ) f (xl , y1:l ) dxl ,
(9)
(10)
respectively, so that the evaluation of the above mentioned normalization factor
is no more required. In fact, eqs. (9) and (10) involve only products of pdfs
and a sum (i.e., integration) of products, so that they can be represented by
means of the FG shown in Fig. 1 (where, following [20], a simplified notation
is used for the involved pdfs and the equality constraint node, which represents
an equality constraint “function”, that is a Dirac delta function). Since this
FG is cycle free, the pdf f (xl , y1:l ) can be evaluated applying the well known
sum-product rule 4 (i.e., the SPA) to it, i.e. developing a proper mechanism for
passing probabilistic messages along this FG (the flow of messages is indicated
by red arrows in Fig. 1). In fact, if the input message m
~ in (xl ) = f (xl , y1:(l−1) )
enters this FG, the message going out of the equality node is given by
m
~ e (xl ) = m
~ in (xl ) f (yl |xl ) ,
(11)
so that m
~ e (xl ) = f (xl , y1:l ) (see (9)); then, the message emerging from the
function node referring to the pdf f (xl+1 |xl ) is expressed by
Z
m
~ out (xl+1 ) = f (xl+1 |xl ) m
~ e (xl ) dxl ,
(12)
so that m
~ out (xl+1 ) = f (xl+1 , y1:l ) = m
~ in (xl+1 ) (see (10)). From this result it
can be easily inferred that the pdf f (xt , y1:t ) (and, up to a scale factor, the pdf
3 Forney-style
factor graphs are always considered in the following [20].
a Forney-style FG, such a rule can be formulated as follows [20]: the message emerging
from a node f along some edge x is formed as the product of f and all the incoming messages
along all the edges that enter the node f except x, summed over all the involved variables
except x.
4 In
G. M. Vitetta et al., Marginalized Particle Filtering . . .
8
xl
min ( xl )
=
f y l / xl
f xl +1 / xl
yl
me ( xl )
x l +1
mout ( xl +1 ) = min ( xl +1 )
Figure 1: Factor graph representing (9) and (10). The SPA message flow characterizing the l-th recursion of Bayesian filtering is indicated by red arrows.
f (xt |y1:t )) results from the application of the SPA to the overall FG originating
from the ordered concatenation of multiple subgraphs, each structured like the
one shown in Fig. 1 and associated with l = 1, 2, ..., t. In this graph the flow of
messages produced by the SPA proceeds from left to right, i.e. the pdf f (xt , y1:t )
is generated by a forward only message passing. Note also that, in principle, the
desired pdf f (xt , y1:t ) is computed as the product between two messages, one
for each direction, reaching the rightmost half edge of the overall FG, but one of
− (x ) = 1.
the two incoming messages for that edge is the constant function ←
m
he t
Unluckily, as the size D of xl (1) gets large, the computational burden associated with (6)-(8) (or, equivalently, (9) and (10)) becomes unmanageable. In
principle, a substantial complexity reduction can be achieved decoupling 5 the
(L)
(N )
(L)
filtering problem for xl from that for xl , i.e. the evaluation of f (xl |y1:l )
(N )
from that of f (xl |y1:l ). In fact, this approach potentially provides the following two benefits: a) a given filtering problem is turned into a couple of filtering
problems of smaller dimensionality and b) some form of computationally efficient
standard filtering (e.g., Kalman or extended Kalman filtering) can be hopefully
(L)
exploited for the linear portion xl of the state vector xl (1). As a matter of
fact, these principles have been exploited in devising MPF [10, 15] and, as it will
become clearer in the following, they must be always kept into account in the
derivation of our FG representation. Before illustrating this derivation, however, the measurement and state models on which such a representation relies
need to be clearly defined; for this reason, these models are analysed in detail
in the following part of this Section. To begin, let us concentrate on the models
(L)
(L)
involved in the filtering problem for xl , i.e. on the evaluation of f (xl |y1:l ),
5 Note
that, generally speaking, in the considered problem the coupling of the filtering
(L)
(N)
problem for xl with that for xl
is due not only to the structure of the update equations
(2) and (3), but also to the measurement vector yl (5), since this exhibits a mixed dependence
on the two components of the state vector xl (1).
9
G. M. Vitetta et al., Marginalized Particle Filtering . . .
(N )
under the assumption that the nonlinear portion xl
of the system state is
known for any l. In this case, the evaluation of this pdf can benefit not only
from the knowledge of yl (5), but also from that of the quantity (see (3))
(L)
(N )
(N )
(N )
(N )
(N )
(L)
(N )
zl , xl+1 − fl
xl
= Al
xl
xl + wl ,
(13)
which can be interpreted as a pseudo-measurement [15], since it does not originate from real measurements, but from the constraints expressed by the state
equation (3). This leads to considering the overall observation model
(L)
(L)
(N )
f yl , zl xl , xl
(14)
(L)
(N )
(L)
(L)
(N )
= f yl xl , xl
f zl xl , xl
(L)
for xl , where
(L)
(N )
f yl xl , xl
= f (el )|e =y −B x(N ) x(L) −h x(N ) ,
l
l
l
l
l
l
(15)
l
and
(L)
(L)
(N )
(N )
f zl xl , xl
= f wl
(N )
wl
(L)
=zl
(N )
−Al
(L)
(N )
xl
xl
.
(16)
If the observation model (14) and the state model (see (2))
(L)
(L)
(N )
f xl+1 xl , xl
(L)
(L)
(N )
(L)
(N )
(L)
xl
− Al
xl
xl
= fw(L) xl+1 − fl
(17)
(L)
are adopted for xl , the graph identified by the blue lines and rectangles appearing in Fig. 1 can be drawn. Then, in principle, if the sum-product rule is
(N )
(N )
applied to it under the assumption that the couple (xl , xl+1 ) is known for any
l, the expressions of the messages flowing in the overall graph for the evaluation
(L)
(L)
of f (xt , y1:t , z1:t ) can be easily derived. It is important to point out that:
• This graph contains a node which does not refer to the above mentioned
density factorizations6 , but represents the transformation from the couple
(N )
(N )
(L)
(xl , xl+1 ) to zl (see (13)); this feature of the graph has to be carefully
kept into account when deriving message passing algorithms.
(L)
(L)
(N )
• Generally speaking, the evaluation of the conditional pdf f (zl |xl , xl )
(N )
(N )
requires the knowledge of the joint pdf of xl+1 and xl
conditioned on
(L)
xl (see (13)).
6 This peculiarity is also evidenced by the presence of an arrow on all the edges connected
to such a node.
10
G. M. Vitetta et al., Marginalized Particle Filtering . . .
The same line of reasoning can be followed for the filtering problem concern(N )
(L)
ing xl . Consequently, in this case the linear portion xl of the system state
is assumed to be known for any l and the pseudo-measurement (see (2))
(N )
(L)
(L)
(N )
(L)
(L)
(N )
(L)
zl , xl+1 − Al
xl
xl = fl
xl
+ wl
(18)
is defined. This leads to the overall observation model
(N )
(N )
(L)
f yl , zl
xl , xl
=
(N )
(L)
(N )
(N )
f yl xl , xl
f zl
xl
(N )
(N )
(N )
(19)
(L)
(L)
(N )
for xl , where f (zl |xl ) can be expressed similarly as f (zl |xl , xl )
(see (16)). Then, if the observation model (19) and the state model
(N )
(N )
(L)
f xl+1 xl , xl
(20)
(N )
(N )
(N )
(N )
(N )
(L)
xl
− Al
xl
xl
= fwN xl+1 − fl
(N )
are adopted for xl , the red graph of Fig. 2 can be drawn and exploited in
(N )
(N )
a similar way as the blue graph for the evaluation of f (xt , y1:t , z1:t ), under
(L)
(L)
the assumption that the couple (xl , xl+1 ) is known for any l. Note also
that, similarly to what has been mentioned earlier about the conditional pdf
(L) (L)
(N )
(N ) (N )
f (zl |xl , xl ), the evaluation of f (zl |xl ) requires the knowledge of the
(L)
(L)
(N )
joint pdf of xl+1 and xl conditioned on xl .
Finally, merging the blue graph with the red one (i.e., adding four equality
(L)
(N )
(L)
(N )
constraint nodes for the variables xl , xl , xl+1 and xl+1 shared by the red
graph and the blue one) produces the overall FG illustrated in Fig. 2. Given this
FG, we would like to follow the same line of reasoning as that adopted for the FG
(L)
(L)
of Fig. 1. In other words, given the input messages m
~ in (xl ) = f (xl , y1:(l−1) )
(N )
(N )
and m
~ in (xl ) = f (xl , y1:(l−1) ) (entering the FG along the half edges asso(L)
(N )
ciated with xl and xl , respectively), we would like to derive a forward
only message passing algorithm based on this FG and generating the output
(L)
(L)
(N )
(N )
messages m
~ out (xl+1 ) = f (xl+1 , y1:l ) and m
~ out (xl+1 ) = f (xl+1 , y1:l ) (emerging
(L)
(N )
from the FG along the half edges associated with xl+1 and xl+1 , respectively)
on the basis of the available a priori information and the noisy measurement
yl . Unluckily, the new FG, unlike that shown in Fig. 1, is not cycle-free, so
that any application of the SPA to it unavoidably leads to approximate results
[21], whatever message scheduling procedure [21, 27] is adopted. This consideration must be carefully kept into account in both the derivation of MPF as
a message passing algorithm and in the development of possible modifications
and generalizations of this technique, as it will become clearer in Sections 4-6.
11
G. M. Vitetta et al., Marginalized Particle Filtering . . .
mout ( xl(+L1) )
xl( L )
min ( xl( L ) )
( L)
xl+
1
f x( L ) / x( L ) , x ( N )
l +1
=
=
l
l
=
=
f z ( L ) / x ( L ) ,x ( N )
l
z
l
l
( L)
l
xl( N ) , xl(+N1) → z l( L )
=
f y / x ( L ) ,x ( N )
l
l
l
yl
=
xl( L ) , xl(+L1) → z l( N )
z l( N )
f z ( N ) / x( N )
l
x
(N )
l
=
min ( xl( N ) )
=
l
=
=
f x( N ) / x( N ) , x( L )
l +1
l
l
mout ( xl(+N1) )
(N )
xl+
1
Figure 2: Overall factor graph resulting from the merge of two subgraphs, one
(L)
(N )
referring to filtering for xl (in blue), the other one to that for xl (in red).
The equality constraint nodes introduced to connect these subgraphs are identi(L)
(N )
fied by black lines. The flow of the messages along the half edges xl and xl
(L)
(N )
(input) and that of the messages along the half edges xl+1 and xl+1 (output)
are indicated by green arrows.
G. M. Vitetta et al., Marginalized Particle Filtering . . .
4
12
Message Passing in Marginalized Particle Filtering
In the following Section we show how the equations describing the l-th recursion of MPF result from the application of the SPA to the FG shown in Fig. 2.
However, before illustrating the detailed derivation of such equations, it is important to discuss the following relevant issues. First of all, the MPF technique
has been developed for the specific class of GLG SSMs [15, 19], to which we always refer in the following discussion. In particular, in the following we assume
(L)
(N )
that: a) {wk } ({wk }) is a Gaussian random process and all its elements
(L)
(N )
(L)
have zero mean and covariance Cw (Cw ) for any l; b) {ek } is a Gaussian
random process having zero mean and covariance matrix Ce for any l; c) all the
above mentioned Gaussian processes are statistically independent. Under these
(L)
(N
(L) (L)
(L) (L)
(N )
assumptions, the pdfs f (yl |xl , xl ), f (zl |xl ) and f (xl+1 |xl , xl ) (see
(N ) (L)
(N )
(15)-(17)) are Gaussian with mean (covariance matrix) Bl (xl )xl +hl (xl ),
(N ) (N )
(L)
(L) (N )
(L) (N )
(L)
(N )
Al (xl ) xl and fl (xl ) + Al (xl ) xl , respectively (Ce , Cw and
(N ) (N )
(N ) (N )
(L)
(L)
Cw , respectively). Similarly, the pdfs f (zl |xl ) and f (xl+1 |xl , xl )
(L) (N )
(see (19) and (20)) are Gaussian with mean (covariance matrix) fl (xl ) and
(N )
(N ) (N )
(N ) (N )
(L)
(L)
fl (xl ) + Al (xl ) xl , respectively (Cw and Cw , respectively).
Secondly, as explained below in detail, the MPF can be interpreted as a
forward only message passing algorithm operating over the FG shown in Fig.
2. The scheduling procedure adopted for MPF unavoidably leads to ignoring
(N )
the evaluation of the pseudo-measurement zl (18). For this reason, in the following we refer to the simplified FG shown in Fig. 3, which has been obtained
from that illustrated in Fig. 2 removing the block representing the transfor(L)
(L)
(N )
mation from (xl , xl+1 ) to zl
and the edges referring to the evaluation of
the last vector. Note that: a) in the new graph the block referring to the pdf
(L)
(N
f (yl |xl , xl ) appears twice, since this pdf is involved in the two subgraphs
shown in Fig. 2; b) some brown edges and equality nodes have been added to
(N )
(L)
feed such blocks with min (xl ) and min (xl ), since these represents the only a
(N )
(L)
priori information available about xl and xl , respectively, at the beginning
of the l-th recursion.
Thirdly, in MPF a particle-based model and a Gaussian model are adopted
(N )
(L)
for the input and the output messages referring to xl and xl , respectively,
and the functional structure of the generated messages is preserved in each
recursion. More specifically, on the one hand, the a priori information avail(N )
able about xl
at the beginning of the l-th recursion is represented by a set
(N )
(N )
of Np particles Sl/(l−1) = {xl/(l−1),j , j = 0, 1, ..., Np − 1} and their weights
G. M. Vitetta et al., Marginalized Particle Filtering . . .
13
{wl/(l−1),j , j = 0, 1, ..., Np − 1)}; following [15], we assume that such weights
are uniform (in other words, wl/(l−1),j = 1/Np for j = 0, 1, ..., Np − 1), so
that they can be ignored in the following derivation. On the other hand,
(L)
the a priori information available about xl is represented by a set of Gaussian pdfs, each associated with a specific particle; in particular, the Gaussian
(L)
(L) (L)
model N (xl ; ηl/(l.−1),j , Cl/(l−1),j ) is associated with the j-th particle (with
j = 0, 1, ..., Np − 1) at the beginning of the same recursion. From the last point
it can be inferred that, in developing a message passing algorithm that represents the MPF technique, we can focus on: a) a single particle contained in the
(N )
(N )
input message min (xl ) and, in particular, on the j-th particle xl/(l−1),j ; b)
(L)
(L)
(L)
on the Gaussian model N (xl ; ηl/(l.−1),j , Cl/(l−1),j ) associated with that particle. For this reason, we assume that, at the beginning of the l-th recursion,
(L)
(N )
our knowledge about xl and xl is condensed in the message
(L)
(L) (L)
(L)
(21)
= N xl ; ηl/(l.−1),j , Cl/(l−1),j
m
~ in,j xl
and in the message
(N )
(N )
(N )
= δ xl − xl/(l−1),j ,
m
~ in,j xl
(22)
respectively, with j = 0, 1, ..., Np − 1; these are processed to generate the corre(L)
(N )
sponding output messages m
~ out,j (xl+1 ) and m
~ out,j (xl+1 ), which are required to
(L)
(N )
have the same functional form as m
~ in,j (xl ) (21) and m
~ in,j (xl ) (22), respec(N )
tively. For this reason, the algorithm for computing m
~ out,j (xl+1 ) is expected
(N )
to generate a new particle x(l+1)/l,j with a (uniform) weight w(l+1)/l,j = 1/Np ;
(L)
similarly, that for evaluating m
~ out,j (xl+1 ) is expected to produce a new Gaus(N )
(L)
(L)
(L)
sian pdf N (xl+1 ; η(l+1)/l,j , C(l+1)/l,j ) associated with the particle x(l+1)/l,j (note
that, in deriving this pdf, possible scale factors are unrelevant and, consequently,
can be dropped).
(L)
(N )
Given m
~ in,j (xl ) (21) and m
~ in,j (xl ) (22), if the SPA is applied to the
considered graph and the message scheduling illustrated in Fig. 3 (and, as a
matter of fact, adopted in MPF) is employed, the steps described below are
(L)
(N )
carried out to evaluate m
~ out,j (xl+1 ) and m
~ out,j (xl+1 ) in the l-th recursion of
MPF7 .
(N )
1. Measurement update for xl
- This step aims at updating the weight
(N )
of the j-th particle xl/(l−1),j on the basis of the new measurements yl (this
7 In the following derivations some mathematical results about Gassian random variables
(e.g., see [32, Par. 2.3.3]) and Gaussian message passing in linear models (e.g., see [20, Table
2, p. 1303]) are exploited. As far as the MPF formulation is concerned, we always refer to
that given by algorithm 1 in [15, Sec. II].
14
G. M. Vitetta et al., Marginalized Particle Filtering . . .
min , j ( x (l L ) )
x (l L )
yl
min , j ( x l( L ) )
m2, j ( x (l L ) )
m2, j ( x l( L ) )
m4, j ( x l( L ) )
=
f x ( L ) / x ( L ) ,x ( N )
l +1
=
fy
m1, j ( x l( L ) )
l
,/ x l( L ) ,x l( N )
=
m3, j ( x (l L ) )
l
m j ( z l( L ) )
z
l
x (l +L1)
m5, j ( x l(+L1) )
= mout , j ( x (l +L1) )
f z( L ) / x ( L ) ,x ( N )
l
min , j ( x l( N ) )
l
=
l
m2, j ( x l( N ) )
( L)
l
x (l N ) , x l(+N1) → z l( L )
m5, j ( x (l +N1) )
m2, j ( x l( N ) )
=
m2, j ( x (l L ) )
m2, j ( x (l L ) )
min , j ( x l( L ) )
fy
l
=
x (l N )
m2, j ( x l( N ) )
m1, j ( x l( N ) )
,/ x l( L ) ,x l( N )
=
min , j ( x l( N ) )
m2, j ( x (l N ) )
yl
m2, j ( x (l N ) )
m5, j ( x (l +N1) )
=
=
f x ( N ) / x ( N ) ,x ( L )
l +1
l
l
mout , j ( x l(+N1) )
x (l +N1)
Figure 3: Overall factor graph for the representation of MPF processing; this
graph is obtained from the one shown in Fig. 3 removing the part referring to
(N )
the evaluation of zl and inserting two new (brown) equality constraints and
(L)
(N )
some (brown) edges referring to xl and xl . The message flow characterizing
MPF and referring to the j-th particle is also shown.
15
G. M. Vitetta et al., Marginalized Particle Filtering . . .
corresponds to step 2) of algorithm 1 in [15, Sec. II]). It involves the computation
of the messages
Z
(N )
(L)
(N )
(L)
(L)
m
~ 1,j xl
m
~ in,j xl
= f yl xl , xl
dxl
(23)
and
(N )
(N )
(N )
,
m
~ 1,j xl
=m
~ in,j xl
m
~ 2,j xl
(24)
(N )
(N )
(L)
(N )
(N )
ηl/(l.−1),j + hl xl
η1,l,j xl
, Bl xl
(26)
which provides the new importance weight for the considered particle (see Fig.
(N )
(L)
3). Substituting the expression of f (yl xl , xl ) (see (15)) and (21) in (23)
produces, after some manipulation (see the Appendix)
(N )
(N )
(N )
(N )
(N )
= N yl ; η1,l,j xl
, C1,l,j xl
,
(25)
m
~ 1,j xl
where
and
T
(N )
(N )
(L)
(N )
(N )
+ Ce .
Cl/(l−1),j Bl xl
C1,l,j xl
, Bl xl
(N )
(27)
(N )
Then, substituting m
~ in,j (xl ) (22) and m
~ 1,j (xl ) (25) in (24) yields
(N )
(N )
(N )
= wl,j δ xl − xl/(l−1),j ,
m
~ 2,j xl
(28)
where8
(N )
(N )
wl,j , N yl ; η1,l,j , C1,l,j
(29)
(N )
is the new particle weight combining the a priori information about xl with
the information provided by the new measurements; here (see (26) and (27))
(L)
(N )
(N )
(N )
(30)
η1,l,j , η1,l,j xl/(l−1),j = Bl,j ηl/(l.−1),j + hl,j
and
(L)
(N )
(N )
(N )
C1,l,j , C1,l,j xl/(l−1),j = Bl,j Cl/(l−1),j BTl,j + Ce ,
(31)
(N )
(N )
with hl,j , hl (xl/(l−1),j ) and Bl,j , Bl (xl/(l−1),j ). In MPF, after normal(w)
ization9 of the particle weights {wl,j } (i.e., after dividing them by Pl
(N)
,
8 In evaluating this weight, the factor [det(C
−P /2 appearing in the expression of the
1,l,j )]
involved Gaussian pdf is usually neglected, since this entails a negligible loss in estimation
accuracy.
9 Note that normalization requires the knowledge of all the weights {w } (29) and that,
l,j
unlike it, all the previous and following tasks can be carried out in parallel (i.e., on a particleby-particle basis).
16
G. M. Vitetta et al., Marginalized Particle Filtering . . .
Np −1
X
wl,j ), particle resampling with replacement is accomplished (this corre-
j=0
sponds to step 3) of algorithm 1 in [15, Sec. II]). Note that, even if resampling
does not emerge from the application of SPA to the considered graph, its use,
as it will become clearer at the end of this Section, plays an important role in
(N )
the generation of the new particles for xl+1 . Moreover, it can be easily incorporated in our message passing; in fact, resampling simply entails that Np parti(N )
cles {xl/(l−1),j } and their associated weights {wl,j } (29) are replaced by the new
(N )
(N )
particles {xl/l,j } (forming the new set Sl/l ) and their weights {wl/l,j = 1/Np },
(N )
respectively. Consequently, m
~ 2 (xl ) (28) is replaced by
(N )
(N )
(N )
= δ xl − xl/l,j ,
m
~ 2,j xl
(32)
since the particle weight does not depend on the index j. It is also worth
(L)
mentioning that, after resampling, the set of Gaussian messages {m
~ in,j (xl )}
(21) needs to be properly reordered and that the messages associated with all
the discarded particles are not propagated to the next steps.
(L)
2. Measurement update for xl - This step aims at updating our statistical
(L)
knowlege about xl on the basis of the new measurement yl (and corresponds
to step 3-a) of algorithm 1 in [15, Sec. II]). It involves the computation of the
messages
Z
(N )
(N )
(L)
(N )
(L)
dxl
(33)
m
~ in,j xl
= f yl xl , xl
m
~ 1,j xl
and
(L)
(L)
(L)
,
m
~ 1,j xl
=m
~ in,j xl
m
~ 2,j xl
(34)
(L)
which represents the output of the measurement update for xl (see Fig. 3).
Substituting (15) and (22) in (33) produces (see [32, Par. 2.3.3, eq. (2.115)])
(L)
(L)
(35)
= N yl ; Bl,j xl + hl,j , Ce
m
~ 1,j xl
which, after some manipulation (in which unrelevant scale factors are dropped),
can be put in the Gaussian form
(L)
(L) (L)
(L)
= N xl ; η1,l,j , C1,l,j ,
(36)
m
~ 1,j xl
with
(L)
(L)
(L)
w1,l,j , W1,l,j η1,l,j = BTl,j We (yl − hl,j ) ,
−1
(L)
(L)
W1,l,j , C1,l,j
= BTl,j We Bl,j
(37)
(38)
17
G. M. Vitetta et al., Marginalized Particle Filtering . . .
and We , C−1
e . Then, substituting (21) and (36) in (34) yields
(L)
(L)
(L) (L)
= N xl ; ηl/(l−1),j , Cl/(l−1),j
m
~ 2,j xl
(L) (L)
(L)
·N xl ; η1,l,j , C1,l,j ,
which can be reformulated as
(L)
(L) (L)
(L)
= N xl ; η2,l,j , C2,l,j ,
m
~ 2,j xl
(39)
(40)
if scale factors are ignored; here,
(L)
(L)
(L)
(L)
(41)
−1
(L)
(L)
(L)
(L)
W2,l,j , C2,l,j
= Wl/(l−1),j + W1,l,j ,
(42)
(L)
(L)
(L)
(L)
(L)
(L)
w2,l,j , W2,l,j η2,l,j = wl/(l−1),j + w1,l,j ,
Wl/(l−1),j , (Cl/(l−1),j )−1 and wl/(l−1),j , Wl/(l−1),j ηl/(l−1),j .
(N )
3. Time update for xl - This step aims at generating the j-th particle for
and its associated weight (this corresponds to step 3-b) of algorithm 1 in
(N )
[15, Sec. II]); these information are conveyed by the message m
~ 5,j (xl+1 ), which
can be expressed as (see Fig. 3)
RR
(N )
(N )
(L)
(N )
f xl+1 xl , xl
m
~ 5,j xl+1 =
(43)
(N )
(L)
(L)
(N )
·m
~ 2,j xl
m
~ 2,j xl
dxl dxl .
(N )
xl+1
The double integral appearing in the RHS of the last equation can be evaluated
(N )
as follows. First of all, substituting m
~ 2,j (xl ) (32) in (43) yields
Z
(L)
(L)
(N )
(N )
(L)
(N )
dxl .
(44)
~ 2,j xl
m
~ 5,j xl+1 = f xl+1 xl , xl/l,j m
(N )
(N )
(L)
(L)
Then, substituting the expression of f (xl+1 |xl , xl ) (see (20)) and m
~ 2,j (xl )
(40) in (44) yields, after some manipulation, the Gaussian message (see [32, Par.
2.3.3, eq. (2.115)])
(N )
(N ) (N )
(N )
(45)
m
~ 5,j xl+1 = N xl+1 ; η5,l,j , C5,l,j ,
where
(N )
(N )
C5,l,j
(N )
(N )
Al,j , Al
(N )
(N ) (L)
(N )
η5,l,j , Al,j η2,l,j + fl,j ,
T
(N ) (L)
(N )
)
, C(N
+
A
C
A
,
w
l,j
2,l,j
l,j
(N )
(N )
(46)
(47)
(N )
(xl/l,j ) and fl,j , fl (xl/l,j ). Note that, in principle,
(N )
(N )
~ 5,j xl+1 ,
m
~ out,j xl+1 = m
(48)
18
G. M. Vitetta et al., Marginalized Particle Filtering . . .
as it can be easily inferred from Fig. 3. However, as already mentioned above,
(j)
(N )
in MPF the output message m
~ out (xl+1 ) is required to have the same functional
(j) (N )
form as m
~ in (xl ) (22). This result can be achieved a) sampling the Gaussian
(N ) (N )
(N )
(N )
function N (xl+1 ; η5,l,j , C5,l,j ) (see (45)), that is drawing a sample x(l+1)/l,j from
(N )
it and b) assigning to the sample x(l+1)/l,j a probability w(l+1)/l,j equal to the
weight wl/l,j = 1/Np (originating from resampling). It is worth pointing out
(N )
that: 1) the particles {x(l+1)/l,j } form the new set S(l+1)/l ; 2) in accomplishing
step a) of this procedure, it may be useful to introduce artificial noise (this can
be simply done adding the same positive quantity to the diagonal elements of
(N )
the matrix Cw appearing in the RHS of (47)) in order to mitigate the so called
(N )
degeneracy problem [1, 34]. If this approach is adopted, the message m
~ 5,j (xl+1 )
(45) is replaced by
(N )
(N )
(N )
(49)
m
~ 5,j xl+1 = δ xl+1 − x(l+1)/l,j ,
(N )
which emerges from the graph as m
~ out,j (xl+1 ). This message is also used in the
(L)
time update for xl , as illustrated in the next step.
(L)
4. Time update for xl - This step aims at generating a new Gaussian
(L)
(N )
~ 5,j (xl+1 ) =
pdf associated with the j-th particle x(l+1)/l,j and conveyed by m
(L)
m
~ out,j (xl+1 ) (this corresponds to step 3-c) of algorithm 1 in [15, Sec. II]).
However, before doing that, a further measurement update is accomplished on
(L)
the basis of the pseudo-measurement zl (13). This involves the evaluation of
(L)
the messages m
~ j (zl ),
Z
(L)
(L)
(L)
(N )
(L)
(L)
f zl xl , xl
dzl
(50)
= m
~ j zl
m
~ 3,j xl
and
(L)
(L)
(L)
m
~ 4,j xl
=m
~ 2,j xl
m
~ 3,j xl
,
(51)
(L)
as shown in Fig. 3. Generally speaking, the message m
~ j (zl ) can be expressed
as
RR
(L)
(L)
(N )
(N )
=
f zl xl , xl+1
m
~ j zl
(52)
(N )
(N )
(N )
(N )
(N )
·f xl+1 xl
f xl
dxl dxl+1 .
(N )
(N )
However, since in this case f (xl
) = δ(xl
(N )
x(l+1)/l,j )
(N )
m
~ 2,j (xl )
(N )
(N )
(L)
(N +1)
−xl/l,j ), f (xl+1 |xl ) = δ(xl
(N )
m
~ 5,j (xl+1 )
−
can be assumed (see
(32) and
(49), respectively), eq. (52) easily leads to the expression
(L)
(L)
(N )
(L)
(L)
(N )
(53)
= f zl xl/l,j , x(l+1)/l,j = δ zl − zl,j ,
m
~ j zl
19
G. M. Vitetta et al., Marginalized Particle Filtering . . .
where
(L)
(N )
(N )
zl,j , x(l+1)/l,j − fl,j .
(54)
(L)
(L)
(N )
Then, substituting (53) and the expression of f (zl |xl , xl
(50) yields
(L)
(L)
(N ) (L)
)
.
= N zl,j ; Al,j xl , C(N
m
~ 3,j xl
w
) (see (16)) in
Finally, substituting the last expression and (40) in (51) produces
(L)
(L) (L)
(L)
= N xl ; η2,l,j , C2,l,j
m
~ 4,j xl
(L)
(N ) (L)
(N )
·N zl,j ; Al,j xl , Cw
,
(55)
(56)
which, after some manipulation (in which unrelevant scale factors are dropped),
can be rewritten as
(L)
(L) (L)
(L)
= N xl ; η4,l,j , C4,l,j ,
(57)
m
~ 4,j xl
where
T
(L)
(L) (L)
(L)
(N )
(N ) (L)
w4,l,j , W4,l,j η4,l,j = w2,l,j + Al,j
Ww
zl,j ,
(N )
T
−1
(L)
(N )
(L)
(L)
(N ) (N )
Ww
Al,j
= W2,l,j + Al,j
W4,l,j , C4,l,j
(58)
(59)
(N )
and Ww , [Cw ]−1 .
(L)
The last part of the time update step for xl requires the evaluation of the
output message
RR
(L)
(L)
(L)
(N )
f xl+1 xl , xl
m
~ 5,j xl+1 =
(60)
(N )
(L)
(N )
(L)
dxl dxl ,
m
~ 2,j xl
·m
~ 4,j xl
(N )
which, similarly as m
~ 5,j (xl+1 ) (43), requires double integration. Substituting
(N )
m
~ 2,j (xl ) (32) in the RHS of the last expression yields
Z
(L)
(L)
(L)
(L)
(L)
(N )
dxl .
(61)
~ 4,j xl
f xl+1 xl , xl/l,j m
m
~ 5,j xl+1 =
(L)
(L)
(N )
Then, substituting the expression of f (xl+1 |xl , xl/(l−1),j ) (see (17)) and (57)
in the last equation gives (see [32, Par. 2.3.3, eq. (2.115)])
(L)
(L)
(L)
(L)
m
~ 5,j xl+1 = N xl+1 ; η5,l,j , C5,l,j
(62)
(L)
=m
~ out,j xl+1 ,
where
(L)
(L) (L)
(L)
(L)
η5,l,j , Al,j η4,l,j + fl,j = η(l+1)/l,j ,
(63)
20
G. M. Vitetta et al., Marginalized Particle Filtering . . .
(L)
(L)
T
(L)
(L) (L)
(L)
(L)
C5,l,j , C(L)
+
A
C
A
= C(l+1)/l,j ,
w
l,j
4,l,j
l,j
(N )
(L)
(L)
(64)
(L)
(N )
~ out,j (xl+1 ) (62)
fl,j , fl (xl/l,j ) and Al,j , Al (xl/l,j ). The evaluation of m
concludes the MPF message passing procedure, which needs to be carried out
for each of the Np particles available at the beginning of the l-th recursion.
Note that this procedure needs a proper inizialization (this corresponds to step
1) of algorithm 1 in [15, Sec. II]). In practice, before starting the first recursion
(N )
(N )
(corresponding to l = 1), the set S1/0 = {x1/0,j , j = 0, 1, ..., Np − 1}, consisting
(N )
of Np particles, is generated for x1
sampling the pdf
Z
(L)
(N )
= f (x1 ) dx1 ,
f x1
(65)
(L)
(L)
(L)
and the same weight w1/0 = 1/Np and Gaussian model N (x1 ; η1/0 , C1/0 ) for
(L)
are assigned to each of them.
Finally, it is worth pointing out that: 1) the processing accomplished in the
(L)
measurement and time update for xl can be interpreted as a form of Kalman
filtering, in which both the real measurement yl and the pseudo-measurement
(L)
(N )
(L)
zl are processed [15]; 2) in the l-th recursion estimates of xl and xl can
P
Np −1
(w)
(L)
(N )
(N )
(see (28)) and as x̂l =
be evaluated as x̂l
=
j=0 wl,j xl/(l−1),j /Pl
PNp −1 (L)
j=0 η4,l,j /Np (see (58)), respectively; 3) the result expressed by eq. (45)
shows that, generally speaking, the statistical representation generated by the
(N )
SPA for the state xl+1 is a Gaussian mixture (GM), whose Np components have
the same weight (equal to 1/Np ) because resampling is always used in step 1.
The last point leads to the conclusion that, if resampling was not accomplished
in the l-th recursion, the weight of the j-th component of this GM would be
proportional by wl,j (29); this would unavoidably raise the problem of sampling
(N )
a GM with unequally weighted components in generating the particle set Sl/(l+1)
x1
(L)
and that of properly handling the resulting pseudo-measurements {zl,j }. These
considerations motivate the use of resampling in each recursion, indipendently
(N )
of the effective sample size [1] characterizing the particle set Sl/(l−1) .
5
Simplifying Marginalized Particle Filtering
The MPF derivation illustrated in the last two Sections unveils the real nature
of MPF and its limitations, and shows the inner structure of the processing
accomplished within each step. For these reasons, it paves the way for the development of new filtering methods related to MPF. In this Section we exploit
our FG-based representation of Bayesian filtering to develop reduced complexity
G. M. Vitetta et al., Marginalized Particle Filtering . . .
21
alternatives to MPF by simplifying the message passing derived in the previous
Section. It is worth mentioning that some methods for reducing MPF computational complexity [16] have been already proposed in the technical literature
[4], [17], [18]. In particular, the method proposed in [4] and [17] is based on rep(N )
resenting the particle set for xl as a single particle (that corresponds to the
center of mass of the set itself), so that a single Kalman filter is employed in up(L)
dating the statistics of the linear component xl ; consequently, the statistical
(L)
knowledge about xl is condensed in the single message
(L)
(L)
(L) (L)
(66)
= N xl ; ηl/(l.−1) , Cl/(l−1) ,
m
~ in xl
(L)
instead of the Np messages {m
~ in,j (xl )} (21). Unluckily, this simplified MPF
(N )
algorithm works well only if the posterior distribution of xl is unimodal. Its
(N )
generalization to the case in which the posterior distribution of xl
is multimodal has been illustrated later in [18]. In the proposed technique the particles
are partitioned into Kl groups or clusters (the parameter Kl is required to equal
(N )
the number of modes of the posterior density of xl ) and each group is represented by a single particle that corresponds to its center of mass; this allows
to reduce the overall number of Kalman filters from Np to Kl . The implementation of this technique requires, however, solving the following two specific
problems: a) identifying the number of modes of the posterior distribution of
(N )
xl ; b) partitioning the particles into clusters according to a grouping method
in each recursion. Unluckily, practical solutions for suche problems have not
been proposed in [18].
Our derivation of simplified algorithms has been only partly inspired by the
manuscripts cited above. In fact, first of all, it relies on the following specific
methods: a) a set of Np equal weight particles {xj ; j = 0, 1, ..., Np − 1} is
represented through its center of mass
x̄ ,
Np −1
1 X
xj ,
Np j=0
(67)
as already suggested in [17] and [18], when the computation of a message refer(L)
(N )
ring to xl involves the particle-based representation of xl ; b) a set of Np
Gaussian messages {N (x; ηj , Cj ); j = 0, 1, ..., Np − 1}, that refer to a set of Np
equal weight particles, is represented as the Np −component GM
Np −1
1 X
N (x; ηj , Cj ) ,
fGM (x) ,
Np j=0
(68)
22
G. M. Vitetta et al., Marginalized Particle Filtering . . .
and this GM is approximated through its projection onto the Gaussian pdf
fG (x) = N (x; ηG , CG ), where ηG and CG are selected as
ηG ,
Np −1
1 X
ηj
Np j=0
(69)
and
PNp −1
CG = (1/Np ) j=0
Cj
PNp −1
T
T
−ηG (ηG ) + (1/Np ) j=0 ηj (ηj )
(70)
respectively, so that the mean and covariance of fGM (x) (68) are preserved
(L)
(e.g., see [33, Sec. IV]). Secondly, as far as the messages {m
~ in,j (xl )} (21)
are concerned, we do not adopt the approximations proposed in [4], [17] and
[18]. In fact, we focus on the following two cases: case #1 - the messages
(L)
{m
~ in,j (xl )} are all different but, when needed in message passing, are con(L)
(L)
densed in the single message (66), where ηl/(l.−1) and Cl/(l−1) are given by (69)
(L)
(L)
and (70), respectively, with ηj = ηl/(l.−1),j and Cj = Cl/(l−1),j ; b) case #2 (L)
the messages {m
~ in,j (xl )} have different means, but their covariance matrices
(L)
(L)
{Cl/(l−1),j } are all equal (their common value is denoted C̃l/(l−1) in the following). In both cases our simplifications aim at minimizing the overall number of
a) Cholesky decompositions for the generation of the new particle set S(l+1)/l
(L)
(such decompositions are required for the Np matrices {C5,l,j } (47)) and b)
matrix inversions; such inversions are needed to compute: a) the Np matrices
(N )
(N )
{W1,l,j , (C1,l,j )−1 } (required in the evaluation of the weights {wl,j } on the
(L)
basis of (29)); b) the Np matrices {Wl/(l−1),j } (required to evaluate the vec(L)
(L)
(L)
tors {w2,l,j } (41) and the matrices {W2,l,j } (42)); c) the Np matrices {C2,l,j }
(L)
(employed in (47)); c) the Np matrices {C4,l,j } (employed in (64)).
Based on the methods illustrated above, our simplified versions of MPF are
(N )
derived as follows. First of all, in the measurement update for xl , we use a
single covariance matrix in the Gaussian pdf appearing in the RHS of (29); in
other words, the j-th weigth wl,j is computed as
(N )
(N )
wl,j , N yl ; η1,l,j , C1,l ,
(71)
(N )
(N )
where C1,l is evaluated on the basis of (70) (see also (69)), setting ηj = η1,l,j
(N )
(30) and Cj = C1,l,j (31) for any j.
(L)
(N )
Second, in the measurement update for xl , the particle set Sl/(l−1) is con(N )
densed in its center of mass x̄l/(l−1) (see (67)). Consequently, the message
23
G. M. Vitetta et al., Marginalized Particle Filtering . . .
(L)
m
~ 1,j (xl ) (35) is replaced by its particle-independent form
(L)
(L)
= N yl ; B̄l xl + h̄l , Ce
m
~ 1 xl
(72)
(N )
(N )
where B̄l , Bl (x̄l/(l−1) ) and h̄l , hl (x̄l/(l−1) ). This message, similarly as (35),
can be put in the Gaussian form (see (36)-(38))
(L)
(L) (L)
(L)
= N xl ; η1,l , C1,l ,
(73)
m
~ 1 xl
where
(L)
(L) (L)
w1,l , W1,l η1,l = B̄Tl We yl − h̄l
and
(74)
−1
(L)
(L)
W1,l , C1,l
= B̄Tl We B̄.
(75)
(L)
This allows us to replace the message m
~ 2,j (xl ) (40) with its particle-independent
counterpart
(L)
(L) (L)
(L)
= N xl ; η2,l , C2,l ,
(76)
m
~ 2 xl
(L)
(L) (L)
(L)
(L)
(L)
(L)
where w2,l , W2,l η2,l and W2,l , (C2,l )−1 are easily obtained from (41) and
(L)
(L)
(42) replacing a) w1,l,j and W1,l,j with w1,l (74) and W1,l (75), respectively;
(L)
(L)
(L)
(L)
(L)
(L)
b) wl/(l−1),j and Wl/(l−1),j with wl/(l−1) , Wl/(l−1) ηl/(l−1) and Wl/(l−1) ,
(L)
(L)
(L)
(Cl/(l−1) )−1 (ηl/(l.−1) and Cl/(l−1) are given by (69) and (70), respectively, with
(L)
(L)
(L)
ηj = ηl/(l.−1),j and Cj = Cl/(l−1),j ). Note that, since the precision matrix W2,l
(L)
is particle-independent, a single matrix C2,l has to be computed for the next
step.
(N )
(L)
Thirdly, in the time update for xl , the message m
~ 2 (xl ) (76) can be used
(L)
(N )
in place of m
~ 2,j (xl ) (40) in the evaluation of m
~ 5,j (xl+1 ) (see (44) and Fig. 3).
This leads to the particle-dependent message
(N )
(N ) (N )
(N )
m
~ 5,j xl+1 = N xl+1 ; η5,l,j , C5,l,j ,
(77)
(N )
(N )
where η5,l,j and C5,l,j are obtained from (46) and (47), respectively, replac(L)
(L)
(L)
(L)
ing η2,l,j and C2,l,j with η2,l and C2,l , respectively. Then, to simplify the
(N )
(N )
generation of the new particle set S(l+1)/l , the covariance matrices {C5,l,j } are
(N )
(N )
condensed in a single matrix C5,l using (70) (see also (69)) with ηj = η5,l,j =
(N ) (L)
(N )
Al,j η2,l + fl,j
(N )
(N )
and Cj = C5,l,j = Cw
(N )
(N )
(L)
(N )
+ Al,j C2,l (Al,j )T ; consequently,
the particle generation mechanism for xl+1 requires computing the Cholesky de(N )
composition of a single matrix (namely, C5,l ), since it is based on the modified
message
(N )
(N ) (N )
(N )
(78)
m
~ 5 xl+1 = N xl+1 ; η5,l,j , C5,l ,
24
G. M. Vitetta et al., Marginalized Particle Filtering . . .
(N )
which depends on the particle index j through the mean vector η5,l,j only.
(L)
Finally, in the time update for xl , the pdf
(L)
(L)
(L)
(N ) (L)
)
f zl xl
= N zl ; Āl xl , C(N
w
(L)
(79)
(N )
is employed in the evaluation of m
~ 3,j (xl ) through (50), where Āl
(N )
= Al
(N )
(x̄l/l )
(N )
(N )
and x̄l/l denotes the center of mass of the particle set Sl/l (see (67)). Then,
(L)
(L)
the messages m
~ 3,j (xl ) (55) and m
~ 4,j (xl ) (57) can be replaced by
(L)
(L)
(N ) (L)
)
= N zl,j ; Āl xl , C(N
m
~ 3,j xl
w
(80)
and
(L)
(L) (L)
(L)
= N xl ; η4,l,j , C4,l ,
m
~ 4,j xl
(81)
respectively, with (see (58) and (59))
and
T
(L)
(L) (L)
(L)
(N )
(N ) (L)
w4,l,j , W4,l η4,l,j = w2,l + Āl
Ww
zl,j
(82)
−1
T
(L)
(L)
(L)
(N )
(N ) (N )
W4,l , C4,l
= W2,l + Āl
Ww
Āl .
(83)
(L)
(L)
(N )
Substituting now m
~ 4,j (xl ) (81) (in place of m
~ 4,j (xl ) (57)) and m
~ 2,j (xl )
(32) in (60), produces, after some manipulation
(L)
(L)
(L)
(L)
(84)
m
~ 5,j xl+1 = N xl+1 ; η5,l,j , C5,l,j ,
where
(L)
(L) (L)
(L)
η5,l,j , Al,j η4,l,j + fl,j
and
(L)
(L)
(L)
C5,l,j , C(L)
w + Al,j C4,l
(L)
(L)
Al,j
(85)
T
.
(86)
Note that: a) since the precision matrix W4,l (83) is particle-independent, a
(L)
single matrix inversion is needed to evaluate the matrix C4,l appearing in (86);
(L)
(L)
b) in case # 2 the matrix set {C5,l,j } is condensed in a single matrix C5,l (this
(L)
(L)
represents the common value C̃(l+1)/l taken on by all the matrices {C(l+1)/l,j }
(L)
processed in the next recursion); c) the matrix C5,l is evaluated on the basis of
(L)
(L)
(69) and (70), setting ηj = η5,l,j and Cj = C5,l,j for any j.
The new filtering techniques, based on MPF and on the simplified messages
derived above, are called simplified MPF (SMPF) in the following; in particular
the acronyms SMPF1 and SMPF2 are used to refer to case #1 and case #2,
respectively.
25
G. M. Vitetta et al., Marginalized Particle Filtering . . .
6
Message Passing in Iterative Filtering Techniques Inspired by Marginalized Particle Filtering
As already mentioned above, the suboptimality of MPF can related to the fact
that the FG underlying the considered filtering problem is not cycle free. It is
well known that the SPA can also be applied to a factor graph with cycles simply
by following the same message propagation rules; however, generally speaking,
this leads to an “iterative” algorithm with no natural termination (and known
as loopy belief propagation), since its messages are passed multiple times on a
given edge [20], [21]. Despite this, some of the most relevant applications of
the SPA have been developed for systems in which the underlying FG does
have cycles, like the one shown in Fig. 1. In the following we show how a
novel iterative technique can be developed for our filtering problem following
this approach. To begin, we note that our interest in iterative methods is also
(N )
motivated by the possibility of exploiting the pseudo-measurement zl (18); in
(N )
fact, the message mj (zl ) referring to this random vector cannot be computed
in MPF because of the adopted scheduling, but can certainly provide additional
information to refine our statistical knowledge about the nonlinear component
(N )
(L)
xl . This message, similarly as the one referring to10 zl , can be put in a
Gaussian form, that is
(N )
(N ) (N )
(N )
= N zl ; ηz,l,j , Cz,l,j ,
(87)
m
~ j zl
(L)
(L)
(N )
since xl+1 and xl , conditioned on xl , are modelled as jointly Gaussian
random vectors. Let us show now how this message can be computed in an
iterative filtering procedure generalising MPF and how it can exploited in such
(L)
a procedure. First of all, we assume that the message m
~ 5,j (xl+1 ) (62), repre(L)
(N )
(N )
senting the pdf of xl+1 conditioned on xl = xl/l,j , is already available when
(L)
the time update for xl (i.e., the first step of MPF) is accomplished. Then,
(L)
(L)
(N )
given m
~ 2,j (xl ) (40) and m
~ 5,j (xl+1 ) (62), the mean and covariance of zl can
be evaluated as (see (18))
(N )
(L)
(L) (L)
ηz,l,j = η5,l,j − Al,j η2,l,j
10 If
(N)
xl
(N)
(L)
= xl/l,j , the random vector zl
(N)
(N)
(88)
(N)
(13) becomes xl+1 − fl
(N)
(xl/l,j ); consequently,
(L)
adopting the Gaussian model (45) for xl+1 results in a Gaussian model for zl
too.
26
G. M. Vitetta et al., Marginalized Particle Filtering . . .
and
T
(N )
(L)
(L) (L)
(L)
Cz,l,j = C5,l,j + Al,j C2,l,j Al,j
T
T
(L) (L)
(L)
(L)
,
−Al,j Cx,l,j − Cx,l,j
Al,j
(89)
(L)
respectively, where Cx,l,j denotes the cross covariance matrix for the vectors
(L)
xl
(L)
(N )
and xl+1 (conditioned on xl
(L)
(L)
(L)
(N )
~ 2,j (xl ) (40) and the
= xl/l,j ). Given m
(L)
(N )
(L)
(L) (L)
(L)
conditional pdf f (xl+1 |xl , xl/l,j ) = N (xl+1 ; fl,j + Al,j xl , Cw ) (see (17)),
(L)
(L)
(L)
it is easy to show that Cx,l,j = C2,l,j (Al,j )T (e.g., see [32, Par. 2.3.3, eq.
(2.104)]); consequently, eq. (89) can be rewritten as
T
(N )
(L)
(L) (L)
(L)
Cz,l,j = C5,l,j − Al,j C2,l,j Al,j
.
(90)
Equations (88) and (90) represent the desired result, since they provide a com(N )
plete statistical characterization of the message m
~ j (zl ) (87). In principle,
(L)
this message could be exploited in a similar way as that adopted for m
~ j (zl )
(N )
(53); this approach would lead to draw a set of Np samples {zl,j } from the
Gaussian function appearing in the RHS of (87) and to process the resulting
pseudo-measurements to generate a new weight for each particle of the set Sl/l .
However, our computer simulations have shown that this approach is outperformed by more refined method illustrated in the following. In practice, in the
(N )
iterative filtering method we propose the message m
~ j (zl ) (87), similarly as
(L)
m
~ j (zl ) (53), is employed to evaluate the new message11
Z
(N )
(N )
(N )
(N )
(N )
(91)
f zl
xl/l,j dzl ,
= m
~ j zl
m
~ 3,j xl
(N )
(L)
which represents for xl the counterpart of the message m
~ 3,j (xl ) (50). Sub(N ) (N )
(N )
(N )
stituting (87) and the expression of f (zl |xl ) (given xl
= xl/l,j ) in the
RHS of the last expression gives12 (see the Appendix)
(N )
m
~ 3,j xl
T
(N )
(N )
(N ) (N )
= D3,l,j · exp 21
η3,l,j W3,l,j η3,l,j
(92)
T
T
(N )
(N ) (N )
(L)
(L) (L)
− ηz,l,j Wz,l,j ηz,l,j − fl,j
Ww fl,j
, pl,j ,
11 Note
(N)
that the following message represents the correlation between the pdf m
~ j (zl
evaluated on the basis of the definition of
(N)
zl
)
(18) and the pdf originating from the fact that
(L)
(N)
(L)
this quantity is expected to equal the random vector fl (xl/l,j ) + wl . For this reason, it
expresses the degree of similarity between these two functions.
12 In our computer simulations the factor D (N) appearing in this weight has been always
3,l,j
neglected, since it negligibly influences estimation accuracy.
27
G. M. Vitetta et al., Marginalized Particle Filtering . . .
where
−1
(N )
(N )
(N )
(L)
W3,l,j , C3,l,j
= Wz,l,j + Ww
,
(N )
(N )
(N )
(N )
(93)
(L)
(L)
w3,l,j , W3,l,j η3,l,j = wz,l,j + Ww
fl,j ,
(N )
(N )
(N )
(N )
(N )
(L)
(94)
(L)
Wz,l,j , (Cz,l,j )−1 , wz,l,j , Wz,l,j ηz,l,j , Ww , [Cw ]−1 ,
(N )
(N )
(L)
h
i−DL /2
(N )
(N )
D3,l,j , det C̃l,j
(95)
(N )
and C̃l,j , Cz,l,j + Cw . Then, the new message m
~ 3,j (xl
similarly as
) (92) is exploited,
(L)
m
~ 3,j (xl )
(N )
(55), to generate the message (see (51))
(N )
(N )
(N )
,
m
~ 3,j xl
=m
~ 2,j xl
m
~ 4,j xl
(96)
where m
~ 2,j (xl ) is expressed by (28) (i.e., it is the message emerging from the
(N )
measurement update for xl in the absence of resampling). This produces (see
(92))
(N )
(N )
(N )
(97)
= Wl,j δ xl − xl/(l−1),j ,
m
~ 4,j xl
where
Wl,j , wl,j · pl,j
(98)
represents the new weight for the j-th particle; such a weight accounts for both
(N )
the (real) measurement yl and the pseudo-measurement zl,j . Resampling with
(N )
(N )
replacement can now be accomplished for the set Sl/(l−1) , {xl/(l−1),j } on
the basis of the more refined weights {Wl,j } (98); if this is done, the message
(N )
(N )
m
~ 4,j (xl ) takes on the same form as m
~ 2,j (xl ) (32), i.e. it can be expressed
as
(N )
(N )
(N )
(99)
= δ xl − x̃l/l,j ,
m
~ 4,j xl
(N )
with j = 0, 1, ..., Np − 1. Note that, generally speaking, the particle set S̃l/l ,
(N )
(N )
(N )
{x̃l/l,j } produced by resampling in this case is different from Sl/l , {xl/l,j }
(i.e., from the one obtained with MPF), even if both of them originate from the
(N )
same set Sl/(l−1) ; this is due to the fact that the weights {Wl,j } (98) may be
substantially different from the MPF weights {wl,j } because of the factor pl,j .
(N )
(N )
Finally, the new message m
~ 4,j (xl ) (99) is used in place of m
~ 2,j (xl ) in the
(L)
RHS of (43) for the evaluation of the message m
~ 5,j (xl+1 ).
As already state above, our previous derivations rely on the assumption that
(L)
(L)
the message m
~ 5,j (xl+1 ) (62) is available when the time update for xl is carried
out; unluckily, this message becomes available only in the last step of MPF.
However, if MPF is generalised in a way that Nit > 1 iterations (i.e., message
28
G. M. Vitetta et al., Marginalized Particle Filtering . . .
passes) are carried out within the same recursion, in the k-th iteration (with k =
(N )
2, 3, ..., Nit ) the message mj (zl ) (87) can be really evaluated exploiting the
(L)
message m
~ 5,j (xl+1 ) computed in the previous iteration. These considerations
lead, in a natural fashion, to the development of the message passing illustrated
in Fig. 4, which describes the message flow occurring in the k-th iteration
of a new filtering technique, generalising MPF and called turbo filtering (TF)
in the following; note that the superscripts (k) or (k − 1) have been added
to all the messages flowing in the considered graph to identify the iteration
in which they are generated and that the grey circle appearing in the figure
represents a unit delay cell. The processing tasks accomplished by TF can be
summarized as follows. The first part of this technique can be considered as a
(N )
(L)
form of initialization, in which the messages {m
~ 2,j (xl )} and {m
~ 2,j (xl )} are
computed; however, unlike MPF, resampling is not accomplished in the last part
(N )
(N )
of the time update for xl
(so that the messages {m
~ 2,j (xl )} are expressed
(N )
by (28) instead of (32) and refer to the particle set Sl/(l−1) ). Moreover, as
(N )
(L)
shown in Fig. 4, the messages {m
~ 2,j (xl )} and {m
~ 2,j (xl )} emerging from
the first part of TF remain unchanged within the l-th recursion, since they
(N )
(L)
represent the a priori information available about xl and xl , respectively;
consequently, like in any turbo processing method, these information are made
available to all the iterations carried out within each recursion. In the second
part of TF Nit -iterations are accomplished with the aim of progressively refining
(N )
the set S(l+1)/l (the version of this set generated in the k-th iteration is denoted
(k)
(N )
(L)
~ 5,j (xl+1 )}. To achieve
S(l+1)/l [k]) and the associated Gaussian messages {m
these result, in the k-th iteration (with k = 1, 2, ..., Nit ) the ordered computation
(k) (N )
(k) (N )
~ 3,j (xl ) (92)
of the following messages is accomplished: m
~ j (zl ) (87), m
(k)
(N )
(conveying the weight pl,j [k]), m
~ 4,j (xl
(k)
(N )
(L)
(k)
(L)
) (97) (conveying the weight Wl,j [k]),
(k)
(L)
(k)
(L)
~ 5,j (xl+1 )
~ 4,j (xl ) (57) and m
~ j (zl ) (53), m
~ 3,j (xl ) (55), m
m
~ 5,j (xl+1 ) (45), m
13
(62). Moreover, in the k-th iteration resampling is accomplished on the basis of
the particle weights {Wl,j [k]}; generally speaking, this results in a new particle
(N )
(N )
set denoted Sl/l [k] = {xl/(l−1),j [k], j = 0, 1, ..., Np − 1} (which is always a
(N )
subset of Sl/(l−1) ). It is also important to point out that:
(0)
(N )
• In the first iteration (i.e, for k = 1) the messages {m
~ 5,j (xl+1 )} are un(L)
13 Note that, after carrying out resampling, the set of messages {m
~ 2,j (xl )} needs to be
properly reordered, since the messages associated with the discarded particles are not preserved. This modifies the set of particles available in the next iteration and, consequently,
the set of weights {wl,j } associated with them (these weights need to be renormalized after
any change). In the following the notation {wl,j [k]} is adopted to denote the set of weights
employed in the k-th iteration for the evaluation of the overall weights Wl,j [k] according to
(98).
29
G. M. Vitetta et al., Marginalized Particle Filtering . . .
(1)
(N )
(1)
(N )
~ 3,j (xl ) =
defined, so that {m
~ j (zl ) = 1} (and, consequently, {m
1}) must be assumed; moreover, resampling is not accomplished (i.e.,
(N )
(N )
(N )
Sl/l [1] = Sl/l = Sl/(l−1) ), since the weights pl,j appearing in the overall
weight Wl,j (98) become available in the following iterations.
− (x(L) ) = ←
− (x(N ) ) = 1 is assumed for
• In each iteration the equality ←
m
m
he l+1
he l+1
(L)
the two messages entering the FG along the half edges associated with xl+1
(N )
and xl+1 (see Fig. 4), since no information comes from the next recursion.
For this reason, at the end of the last iteration (i.e., for k = Nit ), the
output messages (i.e., the input messages feeding the (l + 1)-th recursion)
are evaluated as (see (48)-(49) and (62))
(N )
(N )
(Nit )
(N )
(N )
− (x(N ) ) = m
x
(100)
m
~
~ 5,jit xl+1 ←
m
~ out,j xl+1 = m
he l+1
5,j
l+1
and
(L)
(L)
(N )
(L)
(N )
− (x(L) ) = m
m
~ 5,jit xl+1 ,
~ 5,jit xl+1 ←
m
~ out,j xl+1 = m
he l+1
(101)
with j = 0, 1, ..., Np − 1.
Another relevant issue concerns the interpretation of the processing tasks
accomplished in the TF technique. In fact, our derivations show that, at the
end of the k-th iteration, the a posteriori statistical information about the j-th
(k) (N )
(N )
(N )
~ 4,j (xl ) (97), which
particle xl/l,j [k] of Sl/l [k] is provided by the message m
conveys the weight (see (98))
(a)
Wl,j [k] = wl,j [k] · pl,j [k] · wl,j ,
(102)
(a)
where wl,j denotes the a priori information available at the beginning of the l(a)
th recursion for the j-th particle ( in our derivation wl,j = 1 has been assumed,
(a)
in place of wl,j = 1/Np , to simplify the notation; see (22)), pl,j [k] is the weight
(N )
(k)
(N )
originating from m
~ j (zl ) (87) and conveyed by m
~ 3,j (xl ) (92), and wl,j [k] is
the weight computed on the basis of the available measurement yl . Taking the
natural logarithm of both sides of (102) produces
(a)
(y)
(z)
Ll,j [k] = Ll,j + Ll,j [k] + Ll,j [k],
(y)
(z)
(103)
(a)
where Ll,j [k] , ln(Wl,j [k]), Ll,j [k] , ln(wl,j [k]), Ll,j , ln(pl,j [k]) and Ll,j ,
(a)
ln(wl,j ). The last equation has exactly the same structure as the well known
formula (see [35, Sec. 10.5, p. 450, eq. (19.15)] or [36, Par. II.C, p. 432, eq.
(20)])
L (uj |y) = L (uj ) + Lc (yj ) + Le (uj )
(104)
30
G. M. Vitetta et al., Marginalized Particle Filtering . . .
min , j ( x (l L ) )
x (l L )
yl
m1, j ( x (l L ) )
f y ,/ x( L ) ,x( N )
l +1
=
=
l
m2, j ( x l( L ) )
=
l
m4,( k j) ( x (l L ) )
mhe ( xl(+L1) ) = 1
f x ( L ) / x ( L ) ,x ( N )
m2,( k j) ( x (l L ) )
min , j ( x (l L ) )
=
l
m2, j ( x l( L ) )
m5,( kj) ( x (l +L1) )
f z( L ) / x ( L )
m (jk ) ( z l( L ) )
mout , j ( x l(+L1) )
l
=
m3,( kj) ( x (l L ) )
l
min , j ( x (l N ) )
l
x (l +L1)
l
m2, j ( x l( N ) )
z (l L )
x (l N ) , x l( +N1) → z l( L )
m5,( kj) ( x (l +N1) )
m2, j ( x (l N ) )
m2, j ( x l( N ) )
=
m2, j ( x l( L ) )
=
m2, j ( x
(N )
l
)
m (jk ) ( z l( N ) )
f y ,/ x( L ) ,x( N )
l
m3,( kj) ( x l( N ) )
l
=
=
min , j ( x (l N ) )
=
( k −1) ( L )
z (l N ) m
( xl +1 )
5, j
f z( N ) / x ( N )
l
l
yl
min , j ( x (l N ) )
m2, j ( x l( N ) )
m2,( k j) ( x l( L ) )
m5,( kj) ( x l(+N1) )
=
=
m2, j ( x l( N ) )
x (l N )
m5,( kj) ( x (l +L1) )
x (l L ) , x (l +L1) → z (l N )
min , j ( x (l L ) )
l
m2, j ( x l( L ) )
m4,( k j) ( x l( N ) )
f x ( N ) / x ( N ) ,x ( L )
l +1
l
l
mhe ( x l(+N1) ) = 1
mout , j ( x (l +N1) )
x
(N )
l +1
Figure 4: Message passing over the FG of Fig. 1 for the proposed TF technique.
All the quantities appearing in this figure refer to the k-th iteration of the l-th
recursion; the messages available at the beginning of the considered iteration are
indicated by red arrows, those entering the graph by blue arrows, those leaving
it at the end of the last iteration by black arrows and those computed within
the considered iteration by green arrows.
31
G. M. Vitetta et al., Marginalized Particle Filtering . . .
expressing of the log-likelihood ratio (LLR) available for the j-th information
bit uj at the output of a soft-input soft-output channel decoder operating over
an additive white Gaussian noise (AWGN) channel and fed by: a) the channel
output vector y (whose j-th element yj is generated by the communications
channel in response to a channel symbol conveying uj and is processed to produce the so-called channel LLR Lc (yj )); b) the a priori LLR L (uj ) about uj ;
c) the extrinsic LLR Le (uj ), i.e. a form of soft information available about
uj , but intrinsically not influenced by such a bit (in turbo decoding of concatenated channel codes extrinsic infomation is generated by another channel
decoder with which soft information is exchanged with the aim of progressively
refining data estimates). This correspondence is not only formal, since in eqs.
(103) and (104) terms playing similar roles can be easily identified. For instance,
(y)
(a)
the term Ll,j [k] (Ll,j ) in (103) provides the same kind of information as Lc (yj )
(L (uj )), since these are both related to the noisy data (a priori information)
available about the quantities to be estimated (the system state in one case, an
(z)
information bit the in the other one). What about the term Ll,j [k] appearing
in the RHS of (103)? The link we have established between (103) and (104)
unavoidably leads to the conclusion that such a term should represent the counterpart of the quantity Le (uj ) appearing in (104), i.e. the so called extrinsic
(N )
information (in other words, that part of the information available about xl
(N )
and not intrinsically influenced by xl itself). This interpretation is confirmed
(z)
by the fact that Ll,j [k] is computed on the basis of the statistical knowledge
(L)
(L)
available about xl and xl+1 (see (88) and (90)), which, thanks to (2), does
(N )
provide useful information about xl . The theory of turbo decoding of channel
codes shows that, generally speaking, extrinsic information originates from code
constraints. In our scenario, a similar interpretation can be also provided for
(z)
(L)
Ll,j [k], since xl+1 can be seen as the noisy output of a communication channel,
(L)
(L)
affected by the bias fl,j and the additive noise wl , and over which the code(L) (L)
word Al,j xl
of a rate-1 block code is transmitted in response to the message
(L)
xl .
(z)
These considerations show that, in evaluating Ll,j [k], we are actually
exploiting a sort of ‘code’ constraints, which are mathematically expressed by
(2). The reader can easily verify that a similar interpretation can be provided
(L)
for m
~ j (zl ) (53), which represents the extrinsic information component14 con(L)
(L)
tained in m
~ 4,j (xl ) (57) (conveying our a posteriori information about xl );
(L)
the other two components are represented by the message m
~ 2,j (xl ) (40) (repre14 In
(L)
practice, the mechanism employed to generate zl,j is based on the state update equation (3).
G. M. Vitetta et al., Marginalized Particle Filtering . . .
(L)
32
(L)
senting the measurement information about xl ) and the message m
~ in,j (xl )
(L)
(21) (corresponding to our a priori information about xl ). Consequently, TF
can be seen, in the domain of Bayesian filtering techniques, as the counterpart
of turbo decoding of concatenated codes; this parallelism can be exploited to
provide further insights into iterative filtering techniques. For instance, it is
well known that, in turbo decoding of concatenated channel codes, the extrinsic
information generated by soft decoders become more and more correlated as iterations evolve; this entails that diminishing benefits are provided by additional
iterations. This phenomenon should be observed in TF too for similar reasons
(N )
(N )
and can be motivated by rewriting ηz,l,j (88) and Cz,l,j (90) as
(N )
(L)
(L)
ηz,l,j = fl,j + Al,j
and
(N )
(L)
Cz,l,j = C(L)
w + Al,j
h
h
i
(L)
(L)
η4,l,j − η2,l,j
(L)
(L)
C4,l,j − C2,l,j
i
T
(L)
,
Al,j
(105)
(106)
respectively (thanks to (85) and (86), respectively). In fact, the last two equa(N )
(N )
tions show that the vector ηz,l,j and the matrix Cz,l,j are influenced by the
difference between the statistical information (expressed by a mean vector and
(L)
a covariance matrix) available about xl before processing the pseudomeasure(L)
ment zl and those available after this task has been carried out. In other
(L)
(N )
words, the extrinsic information provided by zl influences zl and viceversa.
Finally, it is important to point out that the proposed analogy between turbo
filtering and turbo decoding suggests the potential limits of the TF technique
(and of any other iterative filtering method relying on the developed FG). In
fact, it is well known that turbo decoding methods do not provide real benefits
below a certain signal-to-noise ratio, i.e. when the quality of the received signal
is so poor that the transmitted coded sequence cannot be recovered. A similar
phenomenon is expected occur with TF too; consequently, this filtering method
could not outperform MPF in the presence of strong measurement noise and/or
fast dynamics affecting the considered SSM.
7
Numerical Results
In this Section MPF and the related filtering methods developed in this manuscript
are compared in terms of accuracy and computational load for a specific CLG
system, characterized by DL = 3, DN = 1 (so that D = 4) and P = 2. The
structure of the considered system has been partly inspired by the example
G. M. Vitetta et al., Marginalized Particle Filtering . . .
proposed by Schön
0.8
(L)
xl+1 = 0
0
and
(L)
in [37] and is characterized by: a) the state models
(N )
cos(xl )
0.2
0
(L)
(L)
)
0.7 −0.2 xl + − sin(x(N
) + wl
l
(N )
0.2 0.7
0.5 sin(2xl )
(N )
(N )
(L)
(N )
xl+1 = arctan xl
+ (0.9 0 0) xl + wl
(L)
(N )
33
(107)
(108)
(N )
∼ N (0, (σw )2 I3 ), wl ∼ N (0, (σw )2 ; b) the measurement model
!
(N ) 2
(N )
0 0 0
0.1 xl
· sgn xl
(L)
yl =
+
xl + el
(109)
1 −1 1
0
with wl
with el ∼ N (0, (σe )2 I2 ). Note that the state equation (107), unlike itscounter
(N )
(L)
(N )
part proposed in [37], depends on xl (i.e., it contains a function fl
xl+1 6=
(N )
03 in its RHS), so that TF, which relies on the availability of the vector zl
(18), can be employed for this system.
In our computer simulations the root mean square error (RMSE) has been
evaluated to compare the accuracy of the state estimates generated by different
filtering techniques. More specifically, for each technique two RMSEs have been
computed, one (denoted RM SEL (alg), where ‘alg’ denotes the algorithm this
parameter refers to) representing the square root of the average mean square
(L)
error (MSE) evaluated for the three elements of xl , the other one (denoted
(N )
RM SEN (alg)) referring to the (monodimensional) nonlinear component xl ;
this distinction is important since, as shown by our simulation results, the es(L)
timation accuracy for xl can be quite different from (and is usually smaller
(N )
than) that referring to xl .
As far the assessment of the computational requirements of the investigated
filtering techniques is concerned, MPF (for which an accurate analysis of its
computational complexity is available in [16]) has been taken as a baseline. For
this reason, our comparisons between the considered filtering techniques are
based on the evaluation of a single parameter, denoted ∆c (alg) and representing the percentage variation in computation time of the considered algorithm
(denoted ‘alg’) with respect to MPF (operating with the same parameters and,
in particular, with the same Np as alg).
Moreover, in our computer simulations, the following choices have been
(N )
(L)
made: a) σw = σw = 5 · 10−3 has been selected for the standard devia(L)
(N )
tions of the process noises {wk } and {wk }, unless differently stated; b) the
so called jittering technique [34] has been employed to mitigate the so called
depletion problem in the generation of new particles.
34
G. M. Vitetta et al., Marginalized Particle Filtering . . .
Some results illustrating the dependence of RM SEL and RM SEN on the
number of particles (Np ) for MPF and SMPF#1 are illustrated in Fig. 5 (in this
and in the following figures simulation results are identified by markers, whereas
continuous lines are drawn to ease reading); σe = 10−2 and Np ∈ [50, 300] have
been selected in this case. From these results the following conclusions can be
easily inferred for the considered system:
1. A negligible improvement in the estimation accuracy of both MPF and
SMPF#1 is achieved if the value of Np exceeds 200.
2. A significant gap between RM SEL (MPF) and RM SEN (MPF) exists; this
(L)
is motivated by the fact that, in MPF, the estimation of xl relies on both
(L)
the real measurement yl (109) and the pseudo-measurements {zl,j } (54),
(N )
whereas the estimation of xl
benefits from yl only.
3. The gap between RM SEL (SMPF#1) and RM SEN (SMPF#1) is much
smaller than that observed for MPF, even if the pseudo-measurements
(L)
{zl,j } are also exploited by SMPF#1. This reduction in the RMSE gap
(L)
can be related to the degradation in the estimation accuracy of xl ; for instance, for Np = 200, RM SEL (SMPF#1) is about twice RM SEL (MPF)
(on the contrary, RM SEN (SMPF#1) ∼
= 1.09· RM SEN (MPF)).
Our numerical results have also evidenced that: a) SMPF#1 requires a substantially smaller computational effort than MPF, since ∆c (SMPF#1) approximately ranges in the interval [−62%, −58%] for the considered values of Np ;
b) despite the above mentioned degradation in estimation accuracy (see point
3.), SMPF#1 does not suffer from tracking losses in the considered scenario;
c) SMPF#2 accuracy is almost indentical that of SMPF#1; d) ∆c (SMPF#2)
is approximately lower than ∆c (SMPF#1) by 6% in the considered range for
Np and, consequently, achieves a better complexity-performance tradeoff than
SMPF#1. All this suggests that simplified MPF techniques can be really developed without incurring the serious technical problems that affect the techniques
proposed in [17] (tracking losses and poor RMSE performance) and in [18] (partitioning and update of the particle set into groups within each recursion; see
Section 5).
The dependence of RM SEL and RM SEN on σe (i.e., on the intensity of
the noise affecting the available measurements) has been also analysed for MPF
and SMPF#1. Some results are shown in Fig. 6; Np = 500 and σe ∈ [10−3 , 5 ·
10−2 ] have been selected in this case. These results show that the gap between RM SEL (MPF) and RM SEL (SMPF#1) slightly increases as σe becomes
35
G. M. Vitetta et al., Marginalized Particle Filtering . . .
5
4
SMPF1
RMSE
3
-2
2x10
RMSEL
RMSEN
MPF
0.01
50
100
150
200
250
300
Np
Figure 5: RMSE performance versus Np for the linear component (RM SEL )
and the nonlinear component (RM SEN ) of the state xl for the system described
(L)
by eqs. (107)-(109). MPF and SMPF#1 are considered; in both cases σw =
(N )
σw = 5 · 10−3 and σe = 10−2 have been selected.
36
G. M. Vitetta et al., Marginalized Particle Filtering . . .
6
SMPF1
5
4
3
RMSE
2
MPF
0.01
9
8
7
RMSEL
RMSEN
6
5
10
20
30
40
-3
50x10
σe
Figure 6: RMSE performance versus σe for the linear component (RM SEL ) and
the nonlinear component (RM SEN ) of the state xl for the system described by
(L)
eqs. (107)-(109). MPF and SMPF#1 are considered; in both cases σw =
(N )
σw = 5 · 10−3 and Np = 200 have been selected.
smaller; the opposite occurs for RM SEN (MPF) and RM SEN (SMPF#1). These
(L)
results can be related again to the fact that the pseudo-measurements {zl,j }
(L)
(54) really play a role in the MPF estimation of xl and that the quality of the
information conveyed by these pseudo-measurements indirectly improves as the
real measurements become less noisy.
Some results illustrating the dependence of RM SEL and RM SEN on the
number of particles (Np ) for MPF and TF are illustrated in Fig. 7; σe = 10−2 ,
Np ∈ [1, 300] and Nit = 2 for TF, and Np ∈ [30, 300] for MPF have been chosen
in this case. From these results it is easily inferred that:
1. TF outperforms MPF in tems of both RM SEL and RM SEN ; for instance, RM SEL (MPF) ∼
= 1.71· RM SEL (TF) and RM SEN (MPF) ∼
=
2.86· RM SEN (TF) if Np = 200 is selected.
G. M. Vitetta et al., Marginalized Particle Filtering . . .
37
2. The gap between RM SEL (MPF) and RM SEN (MPF) is substantially
larger than the corresponding gap for TF (in particular, RM SEN (MPF)−
RM SEL (MPF) ∼
= 13.4·[RM SEN (TF)−RM SEL (TF)]; this can be easily
(L)
related to the fact that, unlike MPF, in TF the estimation of both xl
(N )
and xl benefits from the availability of pseudo-measurements.
3. The performance gap between TF and MPF increases as Np gets smaller.
Moreover, TF accuracy starts quickly degrading when Np drops below
11, whereas the same phenomenon starts for Np ∼
= 30 with MPF. Note,
however, that different phenomena occur with MPF and TF when the
particle set is small. In fact, our computer simulations have shown that
MPF suffers from frequent tracking losses for Np < 30 (since it is unable
(N )
to generate a reliable representation of xl
when a limited number of
particles is available); on the contrary, TF does not suffer from the same
problem even if a very small particle set is used.
We believe that last result is really important and can be motivated as
follows. The TF technique, through its feedback mechanism, makes a substantially more efficient use of the available particles than MPF; this results in an
appreciable improvement of both stability and accuracy of state estimation.
Our simulation results have also shown that: a) in the considered scenario a
negligible improvement in estimation accuracy is obtained if Nit > 2 is selected;
b) ∆c (TF) approximately ranges in the interval [70%, 80%] for the considered
values of Np and, consequently, requires a substantially larger computational
effort than MPF if these algorithms operate with the same number of particles. In practice, however, as evidenced by the results shown in Fig. 7, TF
can reliably operate with a very small particle set and, consequently, it outperforms MPF in terms of both performance and complexity if Np is properly
selected. For instance, in the considered scenario TF with Np = 20 particles
achieves a substally better accuracy than MPF with Np = 40 particles, even
if, as evidenced by our computer simulations, they approximately require the
same computation time. It is not difficult to show that similar considerations
hold if SMPF#1 and SMPF#2 are considered in place of MPF. Therefore, our
results suggest that the real key to the complexity reduction of the filtering techniques relying on the FG shown in Fig. 2 is not provided by the approximations
adopted for the MPF processing tasks in Section 5, but by the exploitation of
(N )
the new pseudo-measurement zl (18). We should never forget, however, that
TF cannot
be adopted for all CLG systems; in fact, it cannot be employed if
(L)
(N )
fl
xl+1 = 0DL in the RHS of (2).
38
G. M. Vitetta et al., Marginalized Particle Filtering . . .
5
4
RMSEL
RMSEN
MPF
3
RMSE
2
0.01
9
8
7
TF
6
5
0
50
100
150
Np
200
250
300
Figure 7: RMSE performance versus Np for the linear component (RM SEL )
and the nonlinear component (RM SEN ) of the state xl for the system described
(L)
(N )
by eqs. (107)-(109). MPF and TF are considered; in both cases σw = σw =
−3
−2
5 · 10 and σe = 10 have been selected.
39
G. M. Vitetta et al., Marginalized Particle Filtering . . .
8
7
6
5
RMSEL
RMSEN
σw = 5 10-3
σw = 10-3
MPF
4
3
RMSE
2
0.01
8
7
6
5
TF
4
3
-2
3
2x10
4
σe
Figure 8: RMSE performance versus σe for the linear component (RM SEL ) and
the nonlinear component (RM SEN ) of the state xl for the system described by
eqs. (107)-(109). MPF and TF are considered; σe = 10−2 and Np = 200 are
(L)
assumed in both cases. As far system noise is concerned, the cases σw =
(N )
(L)
(N )
σw = 5 · 10−3 and σw = σw = 10−1 are taken into consideration.
Finally, the dependence of RM SEL and RM SEN on σe has been assessed for
TF and compared with that characterizing MPF. Some numerical are illustrated
in Fig. 8. In this case, we have selected σe ∈ [1.5 · 10−2 , 5 · 10−2 ] , Np = 200
(L)
(N )
and Nit = 2 for TF, and Np = 200 for MPF; moreover, σw = σw = 5 · 10−3
(L)
(N )
and σw = σw = 10−3 have been considered to analyse the dependence of
the performance gap between TF and MPF on the intensity of process noise
(and, consequently, on system dynamics). These results show that: a) the
performance gap between TF and MPF undergoes small changes if σe varies
in the considered interval; b) on the contrary, a substantial change in this gap
(L)
(N )
is obtained if σw and σw are reduced from 5 · 10−3 to 10−3 . This suggests
that measurement noise and process noise can have different impacts on the
performance gain provided by TF over MPF.
5
G. M. Vitetta et al., Marginalized Particle Filtering . . .
8
40
Conclusions
In this manuscript a FG approach has been employed to analyse the filtering
problem for mixed linear/nolinear models. This has allowed us to: a) prove
that this problem involves a FG which is not cycle free; b) provide a new interpretation of MPF as a forward only message passing algorithm over a specific
FG; c) develop novel filtering algorithms for simplifying or generalising it. In
particular, an important iterative filtering technique, dubbed turbo filtering, has
been devised and its relation with the turbo decoding techniques for concatenated channel codes has been analysed in detail. All the considered filtering
techniques have been compared in terms of both accuracy and computational
requirements for a specific CLG system. The most interesting result emerging from our computer simulations is represented by the clear superiority of
turbo filtering over marginalized particle filtering. In fact, the former technique, through the exploitation of new pseudo-measurements, can achieve a
better accuracy than the latter one at an appreciably smaller computational
load. Our ongoing research activities in this area include the development of
other related filtering techniques and the application of turbo filtering to specific
state estimation problems.
A
Appendix
Given the pdfs f1 (y) , N (y; η1 , C1 ) and f2 (y) , N (y; η1 , C2 ) for the N dimensional vector y, we are interested in evaluating the correlation between
these two functions, i.e. the quantity
Z
c1,2 , f1 (y) · f2 (y) dy
(110)
Substituting the expressions of f1 (y) and f2 (y) in the RHS of the last equation
produces, after some manipulation,
1 T
T
T
(111)
η Wη − η1 W1 η1 − η2 W2 η2
c1,2 = D exp
2
−1
where W1 , C−1
1 , W 2 , C2 ,
W = W1 + W2 ,
(112)
Wη = W1 η1 + W2 η2
(113)
D = (2π det [C1 + C2 ])−N/2 .
(114)
and
G. M. Vitetta et al., Marginalized Particle Filtering . . .
41
References
[1] M. S. Arulampalam, S. Maskell, N. Gordon and T. Clapp, “A Tutorial on
Particle Filters for Online Nonlinear/Non-Gaussian Bayesian Tracking”,
IEEE Trans. Sig. Proc., vol. 50, no. 2, pp. 174-188, Feb. 2002.
[2] F. E. Daum, “Exact Finite-Dimensional Nonlinear Filters”, IEEE Tran.
Aut. Contr., vol. 31, no. 7, pp. 616-622, July 1986.
[3] S. Mazuelas, Y. Shen and M. Z. Win, “Belief Condensation Filtering”,
IEEE Trans. Sig. Proc., vol. 61, no. 18, pp. 4403-4415, Sept. 2013.
[4] V. Smidl and A. Quinn, “Variational Bayesian Filtering”, IEEE Trans. Sig.
Proc., vol. 56, no. 10, pp. 5020-5030, Oct. 2008.
[5] M. S̆imandl, J. Královeca and T. Söderströmc, “Advanced Point-Mass
Method for Nonlinear State Estimation”, Automatica, vol. 42, pp. 11331145, 2006.
[6] B. Anderson and J. Moore, Optimal Filtering, Englewood Cliffs, NJ,
Prentice-Hall, 1979.
[7] S. J. Julier and J. K. Uhlmann, “Unscented Filtering and Nonlinear Estimation”, IEEE Proc., vol. 92, no. 3, pp. 401-422, Mar. 2004.
[8] A. Doucet, J. F. G. de Freitas and N. J. Gordon, “An Introduction to Sequential Monte Carlo methods,” in Sequential Monte Carlo Methods
in Practice, A. Doucet, J. F. G. de Freitas, and N. J. Gordon, Eds. New
York: Springer-Verlag, 2001.
[9] A. Doucet, S. Godsill and C. Andrieu, “On Sequential Monte Carlo Sampling Methods for Bayesian Filtering”, Statist. Comput., vol. 10, no. 3, pp.
197-208, 2000.
[10] F. Gustafsson, “Particle Filter Theory and Practice with Positioning Applications”, IEEE Aerosp. and Electr. Syst. Mag., vol. 25, no. 7, pp. 53-82,
July 2010.
[11] F. Gustafsson, F. Gunnarsson, N. Bergman, U. Forssell, J. Jansson, R.
Karlsson and P. Nordlund, “Particle Filters for Positioning, Navigation,
and Tracking”, IEEE Trans. Sig. Proc., vol. 50, 425-435, 2002.
G. M. Vitetta et al., Marginalized Particle Filtering . . .
42
[12] P. J. Nordlund and F. Gustafsson, “Marginalized Particle Filter for Accurate and Reliable Terrain-Aided Navigation”, IEEE Trans. on Aerosp. and
Elec. Syst., vol. 45, no. 4, pp. 1385-1399, Oct. 2009.
[13] R. Bucy and K. Senne, “Digital Synthesis of Non-Linear Filters”, Automatica, vol. 7, no. 3, pp. 287-298, 1971.
[14] F. Daum and J. Huang, “Curse of Dimensionality and Particle Filters”,
Proc. IEEE Aerosp. Conf., vol. 4, pp. 1979-1993, March 2003.
[15] T. Schön, F. Gustafsson, P.-J. Nordlund, “Marginalized Particle Filters for
Mixed Linear/Nonlinear State-Space Models”, IEEE Trans. Sig. Proc., vol.
53, no. 7, pp. 2279-2289, July 2005.
[16] R. Karlsson, T. Schön, F. Gustafsson, “Complexity Analysis of the
Marginalized Particle Filter”, IEEE Trans. Sig. Proc., vol. 53, no. 11, pp.
4408-4411, Nov. 2005.
[17] F. Mustiere, M. Bolic and M. Bouchard, “A Modified Rao-Blackwellised
Particle Filter”, Proc. of the 2006 IEEE Int. Conf. on Ac., Sp. and Sig.
Proc. (ICASSP 2006), vol. 3, 14-19 May 2006.
[18] T. Lu, M. F. Bugallo and P. M. Djuric, “Simplified Marginalized Particle
Filtering for Tracking Multimodal Posteriors”, Proc. IEEE/SP 14th Workshop on Stat. Sig. Proc. (SSP ’07), pp. 269-273, Madison, WI (USA), 2007.
[19] F. Lindsten, P. Bunch, S. Särkkä, T. B. Schön and S. J. Godsill, “RaoBlackwellized Particle Smoothers for Conditionally Linear Gaussian Models”, IEEE J. Sel. Topics in Sig. Proc., vol. 10, no. 2, pp. 353-365, March
2016.
[20] H.-A. Loeliger, J. Dauwels, Junli Hu, S. Korl, Li Ping, F. R. Kschischang,
“The Factor Graph Approach to Model-Based Signal Processing”, IEEE
Proc., vol. 95, no. 6, pp. 1295-1322, June 2007.
[21] F. R. Kschischang, B. Frey, and H. Loeliger, “Factor Graphs and the SumProduct Algorithm”, IEEE Trans. Inf. Theory, vol. 41, no. 2, pp. 498-519,
Feb. 2001.
[22] C. Berrou and A. Glavieux, “Near Optimum Error Correcting Coding and
Decoding: Turbo-Codes”, IEEE Trans. Commun., vol. 44, no. 10, pp. 1261
- 1271, Oct. 1996.
G. M. Vitetta et al., Marginalized Particle Filtering . . .
43
[23] S. Benedetto, D. Divsalar, G. Montorsi and F. Pollara, “Serial Concatenation of Interleaved Codes: Performance Analysis, Design, and Iterative
Decoding”, IEEE Trans. Inf. Theory, vol. 44, no. 3, pp. 909-926, May 1998.
[24] R. Koetter, A. C. Singer and M. Tüchler, “Turbo Equalization”, IEEE Sig.
Proc. Mag., vol. 21, no. 1, pp. 67-80, Jan. 2004.
[25] J. Hagenauer, “The Turbo Principle: Tutorial Introduction & State of the
Art”, Proc. Int. Symp. Turbo Codes & Related Topics, Brest, France, Sep.
1997, pp. 1-11.
[26] A. P. Worthen and W. E. Stark, “Unified Design of Iterative Receivers using
Factor Graphs”, IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 843–849, Feb.
2001.
[27] F. R. Kschischang and B. J. Frey, “Iterative Decoding of Compound Codes
by Probability Propagation in Graphical Models”, IEEE J. Sel. Areas Commun., vol. 16, no. 2, pp. 219-230, Feb. 1998.
[28] J. Dauwels, S. Korl and H.-A. Loeliger, “Particle Methods as Message
Passing”, Proc. 2006 IEEE Int. Symp. on Inf. Theory, pp. 2052-2056, 9-14
July 2006.
[29] T. P. Minka, “Expectation Propagation for Approximate Bayesian Inference”, Proc. 17th Annual Conf. Uncertainty in Artif. Intell., pp. 362-369,
Seattle, WA (USA), Aug. 2001.
[30] O. Zoeter and T. Heskes, “Deterministic Approximate Inference Techniques
for Conditionally Gaussian State Space Models”, Statistics and Computing,
vol. 16, no. 3, pp. 279-292, Sep. 2006.
[31] V. Smı́dl and A. Quinn, The Variational Bayes Method in Signal
Processing, Berlin, Germany, Springer, 2005.
[32] C. M. Bishop, Pattern Recognition and Machine Learning, Springer,
2006.
[33] A. R. Runnalls, “Kullback-Leibler Approach to Gaussian Mixture Reduction”, IEEE Trans. on Aer. and Elec. Syst., vol. 43, no. 3, pp. 989-999,
July 2007.
[34] T. Li, M. Bolic, P. Djuric, “Resampling Methods for Particle Filtering:
Classification, Implementation, and Strategies”, IEEE Sig. Proc. Mag., vol.
32, no. 3, pp.70-86, May 2015.
G. M. Vitetta et al., Marginalized Particle Filtering . . .
44
[35] G. M. Vitetta, D. P. Taylor, G. Colavolpe, F. Pancaldi and P. A. Martin,
Wireless Communications: Algorithmic Techniques, John Wiley &
Sons, 2013.
[36] J. Hagenauer, E. Offer and L. Papke, “Iterative decoding of binary block
and convolutional codes”, IEEE Trans. Inf. Theory, vol. 42, no. 2, pp.
429-445, Mar 1996.
[37] T. Schön, “Example Used in Exemplifying the Marginalized
(Rao-Blackwellized) Particle Filter”,
Nov. 2010 (available at
http://users.isy.liu.se/en/rt/schon/Code/RBPF/Document/MPFexample.pdf).
| 10math.ST
|
ASYMPTOTIC GROWTH OF ASSOCIATED PRIMES
OF CERTAIN GRAPH IDEALS
arXiv:1204.3315v2 [math.AC] 5 Dec 2012
SARAH WOLFF
Abstract. We specify a class of graphs, Ht , and characterize
the irreducible decompositions of all powers of the cover ideals.
This gives insight into the structure and stabilization of the corresponding associated primes; specifically, providing an answer to
the question “For each integer t ≥ 0, does there exist a (hyper)
graph Ht such that stabilization of associated primes occurs at
n ≥ (χ(Ht ) − 1) + t?” [4]. For each t, Ht has chromatic number 3
and associated primes that stabilize at n = 2 + t.
1. Introduction
We work at the intersection of graph theory and commutative algebra
by relating powers of square-free monomial ideals in polynomial rings
to vertex covers of finite simple graphs. Ideal constructions give two
correspondences, both of which associate to each such graph a monomial ideal. These correspondences have been established and studied
in, for example, [9], [8], [3], and [4].
Motivated by the Strong Perfect Graph Theorem, Francisco, Hà,
and Van Tuyl [3] expand the link between graph theory and algebra in
order to provide an algorithm for determining if a graph is perfect—
neither it nor its complementary graph has an induced odd cycle of
length five or greater. Their algorithm results from relating odd cycles
to the associated primes of powers of monomial ideals. Francisco, Hà,
and Van Tuyl continue to investigate this connection in [4], establishing
a lower bound on the stabilization of these associated primes that is
derived from the chromatic number of the corresponding graphs. They
find that stabilization does not occur when n < χ(G) − 1, for χ(G)
the chromatic number of the graph and n the power of the ideal [4,
Corollary 4.9]. They further show that this bound is not optimal,
leading to the question: “For each integer t ≥ 0, does there exist a
(hyper)graph Ht such that the stabilization of associated primes occurs
Date: March 24, 2018.
2000 Mathematics Subject Classification. 05C25, 05E40, 05C38, 13F20.
1
2
SARAH WOLFF
at n ≥ (χ(Ht ) − 1) + t?” [4, Question 4.10]. In this paper we answer
this question in the affirmative.
More precisely, let G be a graph with vertex set VG = {v1 , . . . , vm }
and edge set EG consisting of unordered pairs of distinct vertices of
G. Let K be a field. We identify the vertices of G with the variables in the polynomial ring RG = K[v1 , . . . , vm ]. Further, we associate two square-free monomial ideals to G: the edge ideal, IG , generated by {vi vj | {vi , vj } ∈ EG }, and the cover ideal, JG , generated
by {vi1 · · · vij | {vi1 , . . . , vij } a vertex cover of G}. These ideal constructions were first introduced in [9] and give the correspondences
mentioned above.
Francisco, Hà, and Van Tuyl study the associated primes of RG /(JG )2 ,
denoted Ass(RG /(JG )2 ), and find that P is in Ass(RG /(JG )2 ) if and
only if either P = (vi , vj ) where {vi , vj } is an edge of G, or P =
(vi1 , . . . , vis ) where the subgraph induced by {vi1 , . . . , vis } is an odd cycle of G [3, Corollary 3.4]. These results are derived by determining the
irreducible decomposition of (JG )2 , i.e., writing (JG )2 as an intersection
of irreducible monomial ideals.
They then extend these ideas in [4] by studying Ass(RG /(JG )n ) for
n ≥ 2. Brodmann [2] in 1979 proved that the set of associated primes
of powers of ideals stabilizes, i.e., for a ring R and an ideal I of R,
there exists some positive integer s such that Ass(R/I s ) = Ass(R/I n )
for all n ≥ s. Francisco, Hà, and Van Tuyl [4] find a lower bound on the
stabilization of Ass(RG /(JG )n ), proving for a graph G that stabilization
does not occur when n < χ(G) − 1 [4, Corollary 4.9]. They then pose
the question mentioned above [4, Question 4.10], which we answer in
the affirmative by providing a family of graphs, Ht , each with chromatic
number three such that for each t, Ass(RHt /(JHt )n ) stabilizes at n =
(χ(Ht ) − 1) + t = 2 + t.
The main result of this paper is:
Theorem 4.1. For t ∈ Z+ , let Rt := RHt be the polynomial ring
associated to Ht and let Jt := JHt denote the cover ideal of Ht . Then
the associated primes of Rt /(Jt )n stabilize at n = (χ(Ht )−1)+t = 2+t.
As in [3], we characterize the associated primes of Rt /(Jt )n by studying the monomial ideal powers (Jt )n . Just as the cover ideal is generated
by vertex covers of the graph, we find that the generators of the ideals
in the irreducible decompositions of (Jt )n are closely related to vertex
covers. In Section 2 we develop the necessary tools from algebra and
graph theory for our results. In Section 3 we introduce the family of
graphs and explore the structure of these graphs with several key lemmas. In Section 4 we use these lemmas to characterize the irreducible
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
3
decompositions of (Jt )n (Theorem 4.11). Theorem 4.1 is then a direct
consequence of Theorem 4.11.
2. Graph Theory and Associated Primes
In this section we briefly introduce the important definitions from
graph theory and algebra needed for our results. We use the basic
conventions, notation, and definitions from [1], [3], and [7].
For a graph G we enumerate its vertex set VG = {v1 , . . . , vm }. We
assume that G is a simple graph so that its edge set, EG , consists of
unordered pairs {vi , vj } of distinct vertices. Two vertices are adjacent
if they are joined by an edge.
A coloring of G is an assignment of colors to the vertices of G such
that no two adjacent vertices are assigned the same color. The chromatic number of G is the minimal number of colors in a coloring of
G.
A subset A of VG is a vertex cover if every edge of G is incident to at
least one vertex of A. The subset is a minimum vertex cover if it is a
vertex cover of smallest cardinality. In this paper we consider minimum
vertex covers rather than minimal vertex covers as this distinction is
necessary for the proof of Theorem 4.11.
For a subset A of VG , the neighbors of A, denoted N (A), are the
vertices of G that are adjacent to vertices of A, but do not lie in A.
The subgraph of G induced by A is the subgraph with vertex set A and
edge set consisting of those edges of G with both vertices in A.
A graph with vertex set {w1 , . . . , wk } is a k-cycle if its edge set
consists precisely of edges connecting wk to w1 and wi to wi+1 , 1 ≤ i <
k. We call the cycle odd (respectively, even), if k is odd (respectively,
even).
Let K be a field. We identify the vertices of G with variables in
the polynomial ring RG = K[v1 , . . . , vm ]. Let IG denote the edge
ideal of G, and let JG denote the cover ideal of G, generated by
{vi1 · · · vij | {vi1 , . . . , vij } a vertex cover of G}. We note that JG is
often equivalently defined as the Alexander dual of IG (see, e.g., [3],
[4]). For an explanation of Alexander duality, see [7].
A typical monomial element of the cover ideal JG is of the form
a1 a2
am
v1 v2 · · · vm
for nonnegative integers ai . Just as the variables v1 , . . . , vm
correspond to vertices of the graph G, the vector (a1 , . . . , am ) also has
a graph theoretic interpretation. We refer to any such a = (a1 , . . . , am )
(corresponding to the vertices v1 , . . . , vm of G) as a degree vector and
say a nonzero degree vector a is a k-cover if ai + aj ≥ k whenever
{vi , vj } ∈ EG .
4
SARAH WOLFF
The concept of k-cover was first introduced in [6] as a generalization
of a vertex cover. Note that if a subset A of VG is a minimum vertex
cover then a degree vector a with ai = 1 if vi ∈ A and ai = 0 otherwise
is a one-cover of G. We call such a one-cover a minimum one-cover.
am
)
An irreducible monomial ideal is an ideal of the form V a = (v1a1 , . . . , vm
ai
n
for a ∈ N , where if ai = 0, we omit vi from the set of generators.
Every monomial ideal I can be written as the finite intersection of irreducible monomial ideals: I = V a1 ∩ · · · ∩ V as , called an irreducible
decomposition of I [7]. The decomposition is called irredundant if no
V ai can be omitted.
Let R be a commutative ring and M an R-module. The set of
associated primes of M , denoted Ass(M ), consists of prime ideals P
such that P annihilates some m in M .
T For a graph G, the cover ideal JG has irreducible decomposition JG =
{vi ,vj }∈EG (vi , vj ) (see e.g., [3]); hence, Ass(R/JG ) = {(vi , vj ) | {vi , vj } ∈
EG }. Generalizing to (JG )n , we compute the irreducible decompositions of (JG )n for our family of graphs in order to deduce the set of
associated primes of R/(JG )n . We refer to this set as the associated
primes of G.
3. A Family of Graphs
We proceed to define a family of graphs, Ht , to give an affirmative
answer to the question posed in [4, Question 4.10]: “For each integer
t ≥ 0, does there exist a (hyper)graph Ht such that the stabilization of
associated primes occurs at n ≥ (χ(Ht ) − 1) + t?” Note by [3, Remark
3.3, Corollary 3.4] that the associated primes of an odd cycle, G, stabilize at n = χ(G) − 1 + 0 = 2. We thus answer the above question for
t ≥ 1.
Definition 3.1. The graph H1 has vertex set {x1 , . . . , x5 , y1 } and edge
set such that the subgraph induced by {x1 , . . . , x5 } is a 5-cycle and the
neighbors of y1 are precisely {x1 , x2 , x3 }.
For t > 1, Ht has vertex set {x1 , . . . , x4t−1 , y1 , . . . , yt } and edge set
such that the subgraph induced by {x1 , . . . , x4t−1 } is a (4t − 1)-cycle,
the neighbors of y1 are precisely {x1 , x2 , x3 }, and for 1 < i ≤ t the
neighbors of yi are precisely {x4i−4 , x4i−3 , x4i−2 , x4i−1 } (Figure 1).
We first note that the graphs Ht have chromatic number three for all
t ≥ 1. To see this, assign color 1 to the vertices {x1 , x3 } ∪ {yi | i > 1},
color 2 to the vertices {x2 } ∪ {x2k+1 | k > 1}, and color 3 to the
remaining vertices. Each Ht has at least one odd cycle; thus, this
3-coloring is a minimum coloring.
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
H1
H2
x2
H3
x1
x1
x1
y1
x2
y1
x2
x3
x3
x3
x4
x4
x4
x5
x5
x6
x7
5
y2
x5
x6
y1
y2
...
x7
x8
x9
x10
y3
x11
Figure 1. Ht
Let Jt := JHt be the cover ideal of Ht for each t ≥ 1 and let Rt := RHt
be the polynomial ring associated to Ht . We show that Ass(Rt /(Jt )n )
stabilizes at n = 2 + t. This result will follow from a characterization
of the irreducible decompositions of (Jt )n for all t ≥ 1 and n ≥ 1.
For this characterization, we use the structure of the graphs together
with the following technical lemmas, all of which follow easily from the
definitions:
Lemma 3.2. Let G be a graph with vertex set {v1 , . . . , vm }. Let RG be
the polynomial ring associated to G, and let JG be the cover ideal of G.
If M is a minimal generator of (JG )n , then
\
M∈
(vin , vj ) ∩ (vin−1 , vj2 ) ∩ · · · ∩ (vi2 , vjn−1 ) ∩ (vi , vjn ).
{vi ,vj }∈EG
Lemma 3.3. Let G be a graph with vertex set {v1 , . . . , vm } and cover
am
ideal JG . Then the mononomial v1a1 · · · vm
is an element of (JG )n if
and only if a = (a1 , . . . , am ) is an n-cover of G that can be written as
the sum of n one-covers, ai , of G: a = a1 + · · · + an .
We note that a degree vector, a, for a graph G can also be interpreted as a degree vector for a subgraph of G induced by A ⊆ VG by
considering only the ai corresponding to the vertices of A. We denote
this subgraph degree vector by a|A .
Lemma 3.4. For a graph G, let a be a degree vector for G. Let
G1 , . . . , Gl be induced subgraphs of G such that EG ⊆ EG1 ∪ · · · ∪ EGl .
6
SARAH WOLFF
Then a is a one-cover of G iff a|Gi is a one-cover of Gi for all i,
1 ≤ i ≤ l.
Our interest is in studying (Jt )n . By Lemma 3.3, elements of (Jt )n
correspond to n-covers of Ht . These n-covers can be written as the sum
of n one-covers of Ht , which in turn arise from one-covers of induced
subgraphs, by Lemma 3.4. Since minimum vertex covers give rise to
one-covers, it will be informative to look at the structure of minimum
vertex covers of induced subgraphs of our family Ht .
Lemma 3.5. A minimum vertex cover of an odd k-cycle consists of
k+1
vertices.
2
Lemma 3.6. For the graph Ht , a minimum vertex cover of the induced
subgraph on {y1 } ∪ N (y1 ) consists of the vertices {x2 , y1 }. For i > 1, a
minimum vertex cover of the induced subgraph on {yi } ∪ N (yi ) consists
of exactly 3 vertices, one of which is yi .
4. Stability of Associated Primes
We restate our main theorem. Recall that Jt is the cover ideal of Ht
and Rt the polynomial ring associated to Ht .
Theorem 4.1. Let t ∈ Z+ . The associated primes of Rt /(Jt )n stabilize
at n = (χ(Ht ) − 1) + t = 2 + t.
This result will follow from the determination of the irreducible decompositions of (Jt )n in Theorem 4.11. Each component of the irreducible decomposition of (Jt )n is an irreducible monomial ideal of the
form (via11 , . . . , viakk ), for vij vertices of Ht (either x or y vertices). The
powers of the variables are in fact determined by the structure of the
subgraph induced by {vi1 , . . . , vik }. Thus, we abuse terminology in the
following way: for an ideal (via11 , . . . , viakk ) ⊆ Rt , we refer to each variable vij as a vertex, each power aj as a degree, and a = (a1 , . . . , ak ) as
a degree vector.
For any simple graph G with vertex set {v1 , . . . , vm }, let JG be the
cover ideal. Then by [3, Theorem 3.2], the irredundant irreducible
decomposition of (JG )2 is:
\
\
\
(JG )2 =
[(vi2 , vj ) ∩ (vi , vj2 )]
(vi21 , . . . , vi2k ),
{vi ,vj }∈EG
{vi1 ,...,vik }
an odd cycle
where the last intersection is over all subsets {vi1 , . . . , vik } such that
the subgraph induced by {vi1 , . . . , vik } is an odd cycle.
For our family of graphs, we generalize the above irreducible decomposition of (Jt )2 to one for (Jt )n , n > 2, by inductively adding
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
7
a minimum one-cover’s worth of degrees to each degree vector appearing in the irreducible decomposition of (Jt )n−1 . In other words,
if V c = (vic11 , . . . , vickk ) is an ideal in the irreducible decomposition of
(Jt )n−1 , and b is a minimum one-cover of the subgraph induced by
{vi1 , . . . , vik }, we show that V c+b is an ideal in the irreducible decomposition of (Jt )n .
To be more explicit, if the induced subgraph on {vi1 , vi2 , vi3 } ⊆ VHt is
a 3-cycle, then by [3, Theorem 3.2], (vi21 , vi22 , vi23 ) is a component of the
irreducible decomposition of (Jt )2 . We lift this to (Jt )n by showing that
(via11 , via22 , via33 ) is a component of the irreducible decomposition of (Jt )n
whenever a = (a1 , a2 , a3 ) is a degree vector for the induced subgraph
on {vi1 , vi2 , vi3 } obtained by adding (n − 2) minimum one-covers of
this subgraph to the degree vector c = (2, 2, 2). This results in many
different possibilities for a: by Lemma 3.5, a minimum one-cover of the
subgraph is of form (0, 1, 1),(1, 0, 1), or (1, 1, 0). Thus, adding (n − 2)
minimum one-covers to c leads to n2 possibilities for a.
Rather than writing out all these possibilities, we introduce below
the terminology n-admissible and n̂-admissible to distinguish degree
vectors of specific induced subgraphs of Ht . As the irreducible decompositions of (Jt )n are known for n ≤ 2, we work with n > 2 in the
following definitions.
Consider an arbitrary subset of vertices, V = {vi1 , . . . , vik } ⊆ VHt . If
the subgraph induced by V is an odd cycle, we call V an induced odd
cycle. Consider the corresponding degree vector a = (a1 , . . . , ak ).
Definition 4.2. A degree vector a corresponding to an induced odd
cycle V is n-admissible if a = (2, . . . , 2) + b1 + · · · + bn−2 where each
bi is a minimum one-cover of the cycle.
Remark 4.3. Note by Lemma 3.5 that for V an induced odd k-cycle,
if the corresponding degree vector a is n-admissible, then
k
X
i=1
ai = 2k + (n − 2)
k + 1
.
2
Now fix a positive integer r ≤ t and consider a subgraph induced by
vertices V ∪Yr = {vi1 , . . . , vik , yj1 , . . . , yjr } where V ⊆ VHt is an induced
odd cycle, Yr ⊆ {y1 , . . . , yt } (the specified y-vertices in Definition 3.1),
and N (Yr ) ⊆ V . We call such a subgraph an r-cluster, or an r-cluster
induced by V ∪ Yr , when we want to specify the vertices. Note that in
the definition of r-cluster, V can be an induced odd cycle of any length
on any of the vertices of Ht , so long as N (Yr ) ⊆ V . On the other hand,
Yr must contain exactly r vertices, and they must be y-vertices.
8
SARAH WOLFF
Recall that we assume n > 2 for the following definition.
Definition 4.4. A degree vector c corresponding to an r-cluster induced by V ∪ Yr , is n̂-admissible if c = d + e + f1 + · · · + fn−3 , where:
2 vji ∈ V \ N (Yr )
(1) di =
,
3
otherwise
(2) e|Yr ∪N (Yr ) = (0, . . . , 0),
(3) e|V \N (Yr ) is a minimum one-cover of the subgraph induced by
V \ N (Yr ),
(4) for all 1 ≤ i ≤ n − 3, fi |V \N (Yr ) is a minimum one-cover of the
subgraph induced by V \ N (Yr ),
(5) for all 1 ≤ i ≤ n − 3 and yjl ∈ Yr , fi |{yjl }∪N (yjl ) is a minimum
one-cover of the subgraph induced by {yjl } ∪ N (yjl ).
Example 4.5. Let n = 5. Consider the following 2-cluster of H4 : the
subgraph induced by
V ∪ Y2 = {x1 , x2 , x3 , x4 , y2 , x7 , x8 , y3 , x11 , x12 , x13 , x14 , x15 , y1 , y4 }.
Then d = (3, 3, 3, 2, 2, 2, 2, 2, 2, 3, 3, 3, 3, 3, 3), one of the two possibilities for e is (0, 0, 0, 0, 1, 0, 1, 0, 1, 0, 0, 0, 0, 0, 0) and two of the six possibilities for each fi , i ∈ {1, 2}, are (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1)
and (0, 1, 0, 0, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1, 1). Thus, the degree vector
c = (3, 5, 3, 3, 4, 3, 4, 3, 4, 4, 4, 5, 3, 5, 5)
is 5̂-admissible.
Remark 4.6. Consider the subgraph induced by {x1 , x2 , x3 , y1 }. By
Lemma 3.6, the minimum vertex cover of this subgraph is {x2 , y1 }.
Thus, for an arbitrary r-cluster, induced by V ∪ Yr , if y1 ∈ Yr , the
corresponding degrees for x2 and y1 would be 1 in each fj . By the same
lemma, for i > 1, a minimum vertex cover of the subgraph induced by
{yi } ∪ N (yi ) consists of yi and two vertices in N (yi ); thus, if yi ∈ Yr ,
then in each fj the corresponding degrees for yi and two vertices in
N (yi ) would be 1.
The following lemma is key to the proof of Theorem 4.11.
Lemma 4.7. Let r ≥ 1 and n > r + 1. Consider an arbitrary r-cluster
of Ht , induced by V ∪ Yr . Let c = (c1 , . . . , ck+r ) be a degree vector for
Pk+r
the r-cluster. If c is n̂-admissible then i=1
ci < r + k + n k+1
+r .
2
Proof. Consider an arbitrary r-cluster of Ht , induced by V ∪ Yr , and
suppose the corresponding degree vector, c, is n̂-admissible. We compute the degree sum imposed by the definition of n̂-admissible. This
degree sum depends on whether y1 ∈ Yr , or not.
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
9
First suppose y1 ∈ Yr . If c is n̂-admissible, then c = d + e + f1 +
· · · + fn−3 , with each degree vector as specified in Definition 4.4. We
first note that
k+r
X
di = 12 + 15(r − 1) + 2(k − 4r + 1).
i=1
Next, we claim
k+r
X
ei ≤
i=1
k − 4r + 1
.
2
To see this, we find a bound on the number of vertices in a minimum
vertex cover of the subgraph induced by V \ N (Yr ). First note that
k − 4r + 1 vertices comprise V \ N (Yr ). Further, the subgraph of Ht
induced by V \ N (Yr ) consists of disjoint subgraphs of V induced by
one or more subsets V1 , . . . , Vl ⊂ V . Let vα be the number of vertices
in Vα , 1 ≤ α ≤ l. If vα is even, a minimum vertex cover of the subgaph
induced by Vα consists of v2α vertices, while if vα is odd, a minimum
vertex cover consists of vα2−1 vertices. Hence,
k+r
X
i=1
l
X vα − 1
X vα
1X
k − 4r + 1
ei =
+
≤
vα =
,
2
2
2
2
v
even
α=1
v odd
α
α
as claimed.
Finally, by Lemma 3.6 and the above claim we see that for each fj ,
1 ≤ j ≤ n − 3,
k+r
X
fji ≤ 2 + 3(r − 1) +
i=1
Since the degree sum of fj ,
k+r
X
i=1
ci =
k+r
X
Pk+r
i=1
di +
i=1
k − 4r + 1
.
2
fji , is independent of j, we have:
k+r
X
ei + (n − 3)
i=1
k+r
X
f ji ,
i=1
for any j ∈ {1, . . . , n − 3}. The inequality of the lemma then reduces
to showing that r + 1 < n, which is true by assumption.
Next suppose y1 ∈
/ Yr . Here,
k+r
X
di = 15r + 2(k − 4r),
i=1
and we claim
k+r
X
i=1
ei ≤
k − 4r − 1
.
2
10
SARAH WOLFF
To see this, note that in this case k − 4r vertices comprise V \ N (Yr ).
As above, the subgraph of Ht induced by V \ N (Yr ) consists of disjoint
subgraphs of V induced by subsets V1 , . . . , Vl ⊂ V . Further, because V
is an induced odd cycle, k − 4r is odd, so at least one of the subsets,
without loss V1 , has an odd number of vertices, v1 . Hence, as above,
k+r
X
i=1
l
X vα − 1
X vα
X
k − 4r − 1
1
ei =
+
≤ v1 − 1 +
vα =
,
2
2
2
2
v even
α=2
v odd
α
α
as claimed.
Finally, by Lemma 3.6 and the above claim we see that for each fj ,
1 ≤ j ≤ n − 3,
k+r
X
k − 4r − 1
fji ≤ 3r +
.
2
i=1
Pk+r
Again, the degree sum of fj ,
i=1 fji , is independent of j, and the
inequality of the lemma reduces to showing r + 1 < n.
We now define several ideals to simplify the statement of Theorem
4.11. Fix a graph Ht and a positive integer n. For an arbitrary set
of vertices V = {vi1 , . . . , vik } of Ht with corresponding degree vector
a = (a1 , . . . , ak ), let V a denote the ideal (via11 , . . . , viakk ). Again, we
a
remind the reader of our convention to omit vijj when aj = 0.
Definition 4.8.
\
At,n =
(vin , vj ) ∩ (vin−1 , vj2 ) ∩ · · · ∩ (vi2 , vjn−1 ) ∩ (vi , vjn ).
{vi ,vj }∈EHt
\
Definition 4.9. Bt,n =
V a.
subgraph of Ht induced
by V an odd cycle,
a n-admissible
r
Definition 4.10. Dt,n
=
\
(V ∪ Yr )c .
subgraph of Ht induced
by V ∪Yr an r-cluster,
c n̂-admissible
We now give the irreducible decompositions of (Jt )n :
Theorem 4.11. Let t ∈ Z+ and let Jt be the cover ideal of Ht . For
n > 2, (Jt )n has the following irredundant irreducible decomposition:
n
(Jt ) = At,n ∩ Bt,n ∩
n−2
\
r=1
r
Dt,n
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
11
T
r
Proof. For t ∈ N and n > 2, let L be the ideal At,n ∩ Bt,n ∩ n−2
r=1 Dt,n .
Let M be a minimal generator of (Jt )n . We
show M is in L by showing
Tn−2
r
separately.
it is in each of the ideals At,n , Bt,n , and r=1 Dt,n
First suppose M ∈
/ Bt,n . Since M is a minimal generator of the
am
, for {v1 , . . . , vm } the vertices of
monomial ideal (Jt )n , M = v1a1 · · · vm
Ht . By Lemma 3.3 the powers, a = (a1 , . . . , am ), when viewed as a
degree vector of Ht form an n-cover that can be written as the sum of
n one-covers, bi , of Ht : a = b1 + · · · + bn . Let V = {vj1 , . . . , vjk } be an
arbitrary induced odd cycle of Ht . Since a is an n-cover of Ht , a|V is an
n-cover of the odd cycle. Further, for 1 ≤ i ≤ n, since bi is a one-cover
of Ht , bi |V is a one-cover of the cycle. Then a|V = b1 |V + · · · + bn |V
with each bi |V a one-cover of the subgraph induced by V . Thus, a|V =
(aj1 , . . . , ajk ) is an n-cover of the cycle that can be written as the sum
P
of n one-covers. Then by Lemma 3.5, ki=1 aji ≥ n k+1
. However,
2
M ∈
/ Bt,n , so M ∈
/ V u for some n-admissible u. Thus, in M each
variable vij ∈ V has degree less than uj , so
k
X
i=1
aj i ≤
k
X
(ui − 1) = k + (n − 2)
i=1
k + 1
,
2
k+1
by Remark 4.3. But k + (n − 2) k+1
<
n
, so a|V is not an n2
2
cover of the cycle that can be written as the sum of n one-covers, a
contradiction. Thus, M ∈ Bt,n .
T
a1
r
am
Now suppose M ∈
/ n−2
r=1 Dt,n . Again, M = v1 · · · vm is a minimal
generator of (Jt )n so the powers, a = (a1 , . . . , am ), when viewed as a
degree vector of Ht form an n-cover that can be written as the sum of
n one-covers, bi , of Ht : a = b1 + · · · + bn . For r ≤ n − 2, consider
an arbitrary r-cluster of Ht , induced by V ∪ Yr . As above, a|V ∪Yr is
an n-cover of the r-cluster and for 1 ≤ i ≤ n, bi |V ∪Yr is a one-cover of
the r-cluster, so a|V ∪Yr = (al1 , . . . , alk+r ) is an n-cover of the r-cluster
that
as the sum of n one-covers.
Tn−2 r Then by Lemma 3.6,
Pk+rcan be written
k+1
+ r . However, M ∈
/ r=1 Dt,n , so M ∈
/ (V ∪ Yr )c ,
i=1 ali ≥ n
2
for some n̂-admissible c. Thus, as in the previous case,
k+r
X
i=1
ali ≤
k+r
X
(ci − 1).
i=1
But since n ≥ r + 2, Lemma 4.7 shows
k+r
X
i=1
(ci − 1) < n
k+1
+r ,
2
12
SARAH WOLFF
so a|V ∪Yr is not an n-cover of the r-cluster that can
be written as the
Tn−2
r
sum of n one-covers, a contradiction. Thus, M ∈ r=1 Dt,n
.
We finally note by Lemma 3.2 that M ∈ At,n . Hence, (Jt )n ⊆ L.
Now let P be a minimal generator of L. The ideal L is an intersection
of monomial ideals, so P = via11 · · · viamm . By definition, P ∈ At,n ; therefore, the powers a = (a1 , . . . , am ), of the variables of P when viewed
as a degree vector of Ht form an n-cover. By Lemma 3.3, it suffices to
show a can be written as the sum of n one-covers of Ht .
Consider an arbitrary one-cluster of Ht , induced by V ∪ Y1 . Note
that Ht can be written as a union of one-clusters. Thus, by Lemma 3.4,
it suffices to show that a|V ∪Y1 can be written as a sum of n one-covers
of the one-cluster. Applying Lemma 3.4 again to the subgraph induced
by V ∪ Y1 = {vi1 , . . . , vik , yj1 }, it suffices to show a|V and a|{yj1 }∪N (yj1 )
can be written as a sum of n one-covers of the subgraphs induced by
V and {yj1 } ∪ N (yj1 ), respectively.
Let V be an induced odd k-cycle of Ht . Since P ∈ Bt,n , P ∈ V u
for some n-admissible u = (u1 , . . . , uk ). Thus, we need to show that
u can be written as the sum of n one-covers of V . By Definition 4.2,
u = (2, . . . , 2) + b1 + · · · + bn−2 with each bi a one-cover of V . Thus,
we need only show that (2, . . . , 2) can be written as a sum of two onecovers of V , but this is clear because (2, . . . , 2) = (1, . . . , 1) + (1, . . . , 1),
which are trivially one-covers of V .
Now consider the subgraph induced by {yj1 } ∪ N (yj1 ). Since P ∈
Tn−2 r
c
r=1 Dt,n , P ∈ (V ∪ Y1 ) , for some n̂-admissible c. Thus, we need
to show c|{yj1 }∪N (yj1 ) can be written as a sum of n one-covers of the
subgraph induced by {yj1 } ∪ N (yj1 ). By Definition 4.4, c = d + e +
f1 + · · · + fn−3 with each fi a one-cover of the subgraph induced by
{yj1 } ∪ N (yj1 ). Further, di = 3 for each vertex in {yj1 } ∪ N (yj1 ), so we
need only show that (3, . . . , 3) can be written as a sum of 3 one-covers
of the subgraph induced by {yj1 } ∪ N (yj1 ), but this is clear by Lemma
3.6.
Thus, for an arbitrary one-cluster, induced by V ∪ Y1 , a|V ∪Y1 can be
written as the sum of n one-covers of the subgraph induced by V ∪ Y1 .
This proves that a can be written as the sum of n one-covers of Ht .
Hence, L ⊆ (Jt )n .
Our main theorem now follows as a corollary to Theorem 4.11:
Proof of Theorem 4.1. For t ∈ Z+ consider the graph Ht and label
the vertices VHt = {v1 , . . . , vm } = X ∪ Y , where X (respectively, Y )
represents the set of x-vertices (respectively, y-vertices) as in Definition
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
13
3.1 . By Theorem 4.11, for n > 2 it follows that a prime P is in
Ass(Rt /(Jt )n ) if and only if:
(a) P = (vi , vj ) where {vi , vj } ∈ EHt ,
(b) P = (vi1 , . . . , vik ), where the subgraph induced by {vi1 , . . . , vik }
is an odd cycle,
or,
(c) For 1 ≤ r ≤ n − 2, P = (vi1 , . . . , vik , yj1 , . . . , yjr ), where the
subgraph induced by {vi1 , . . . , vik , yj1 , . . . , yjr } is an r-cluster.
By definition, Ht has exactly t y-vertices, so Ht has a t-cluster, namely
the graph Ht itself. Thus, by (c) above, the ideal (v1 , . . . , vm ) is an
element of Ass(Rt /(Jt )n ) for n ≥ t + 2, but not for n < t + 2. Thus, the
associated primes do not stabilize until at least t+2. Further, note that
the ideals of (a) and (b) are elements of Ass(Rt /(Jt )n ) for all n ≥ 2,
so the only prime ideals not in Ass(Rt /(Jt )2+t ) that could appear in
Ass(Rt /(Jt )n ) for n > 2 + t would be ideals that fall into category (c).
However, for 1 ≤ r ≤ t, ideals whose generators correspond to the
vertices of r-clusters are elements of Ass(Rt /(Jt )2+t ), so the only new
ideals in Ass(Rt /(Jt )n ) for n > 2 + t would be those whose generators
correspond to the vertices of r-clusters for r > t. The largest r for
which Ht has an r-cluster is r = t; thus, no such new ideals exist in
Ass(Rt /(Jt )n ) for n > 2 + t. Thus, the associated primes of Ht stabilize
at 2 + t.
Remark 4.12. We note that our family of graphs can be generalized
slightly. The proof of Theorem 4.11 used the definition n̂-admissible in
two ways— to show that the degree vectors can be written as n onecovers, and to use the degree argument of Lemma 4.7. Both facts remain unchanged if the induced (4t − 1)-cycle is instead an odd cycle of
any length greater than 4t − 1 (or in the case of H1 , if the 5-cycle is
any odd cycle of length greater than 5). Further, for i > 1, yi could
have more than 4 neighbors, as long as these neighbors are distinct from
N (yj ), j 6= i, and the degree argument of Lemma 4.7 is still satisfied.
5. Acknowledgements
Many of the results of this paper started as computer experiments
using the program Macaulay 2 [5]. The author would like to thank
Amelia Taylor for introducing her to the subject and for her invaluable
support and guidance throughout the research and writing processes,
Thomas Shemanske for his help in the editing process, and Adam Van
Tuyl for a helpful discussion of Lemma 3.3. We also thank an anonymous referee for their insights and suggestions for improvement.
14
SARAH WOLFF
References
1. Béla Bollobás, Modern graph theory, Graduate Texts in Mathematics, vol. 184,
Springer-Verlag, New York, 1998. MR 1633290 (99h:05001)
2. M. Brodmann, Asymptotic stability of Ass(M/I n M ), Proc. Amer. Math. Soc.
74 (1979), no. 1, 16–18. MR 521865 (80c:13012)
3. Christopher A. Francisco, Huy Tài Hà, and Adam Van Tuyl, Associated primes
of monomial ideals and odd holes in graphs, J. Algebraic Combin. 32 (2010),
no. 2, 287–301. MR 2661419 (2011e:05133)
, Colorings of hypergraphs, perfect graphs, and associated primes of
4.
powers of monomial ideals, J. Algebra 331 (2011), 224–242. MR 2774655
(2012b:13054)
5. Daniel R. Grayson and Michael E. Stillman, Macaulay2, a software system for research in algebraic geometry,
Available at
http://www.math.uiuc.edu/Macaulay2/.
6. Jürgen Herzog, Takayuki Hibi, and Ngô Viêt Trung, Symbolic powers of monomial ideals and vertex cover algebras, Adv. Math. 210 (2007), no. 1, 304–322.
MR 2298826 (2007m:13005)
7. Ezra Miller and Bernd Sturmfels, Combinatorial commutative algebra, Graduate
Texts in Mathematics, vol. 227, Springer-Verlag, New York, 2005. MR 2110098
(2006d:13001)
8. Aron Simis, Wolmer V. Vasconcelos, and Rafael H. Villarreal, On the ideal theory
of graphs, J. Algebra 167 (1994), no. 2, 389–416. MR 1283294 (95e:13002)
9. Rafael H. Villarreal, Cohen-Macaulay graphs, Manuscripta Math. 66 (1990),
no. 3, 277–293. MR 1031197 (91b:13031)
| 0math.AC
|
arXiv:1705.04282v1 [cs.CV] 5 May 2017
Learning to see people like people
Amanda Song
University of California, San Diego
9500 Gilman Dr, La Jolla, CA 92093
Linjie Li
Purdue University
610 Purdue Mall, West Lafayette, IN 47907
feijuejuanling@gmail.com
li2477@purdue.edu
Chad Atalla
University of California, San Diego
9500 Gilman Dr, La Jolla, CA 92093
Garrison Cottrell
University of California, San Diego
9500 Gilman Dr, La Jolla, CA 92093
catalla@ucsd.edu
gary@ucsd.edu
Abstract
alignment[39], and face detection[25]. However, humans not only read objective properties from a face, such
as gender, expression, race, age and identity, but also
form subjective impressions of the social aspects of a
face[31, 32], such as facial attractiveness[28], friendliness,
trustworthiness[29], sociability, dominance[18], and typicality. Despite the relative less attention received by the
social perception of faces, social judgment is an important
part of people’s daily interactions, and it has significant impact on social outcomes, ranging from electoral success to
sentencing decisions[19, 35]. Whereas current computer vision techniques exceed human abilities at recognizing a face
and identifying the objective properties of a face [27, 25],
awareness of human subjective judgments is important for
social robotics theory-of-mind inferences. Accurate predictions of social aspects of faces can help robots better understand how humans interact with and perceive each other,
and can make a robot aware of inherent human biases, as
these judgments rarely correspond to reality (except, perhaps, attractiveness) [32].
The human perceptual system can make complex inferences on faces, ranging from the objective evaluations regarding gender, ethnicity, expression, age, identity, etc. to
subjective judgments on facial attractiveness, trustworthiness, sociability, friendliness, etc. Whereas the objective aspects have been extensively studied, less attention has been
paid to modeling the subjective perception of faces. Here,
we adapt 6 state-of-the-art neural networks pretrained on
various image tasks (object classification, face identification, face localization) to predict human ratings on 40 social judgments of faces in the 10k US Adult Face Database.
Supervised ridge regression on PCA of the conv5 2 layer
in VGG-16 network gives best predictions on the average
human ratings. Human group agreement was evaluated by
repeatedly randomly splitting the raters into two halves for
each face, and calculating the Pearson correlation between
the two sets of averaged ratings. Due to this methodology,
the models correlations with the average human ratings can
exceed this score. We find that 1) model performance grows
as the consensus on a face trait increases, and 2) model correlations are always higher than human correlations with
each other. These results illustrate the learnability of the
subjective perception of faces, especially when there is consensus, and the striking versatility and transferability of
representations learned for object recognition. This work
has strong applications to social robotics, allowing robots
to infer human judgments of each other.
In this paper, we teach a machine to infer social impressions, that match human judgments, from faces. We examine a list of 20 pairs of social features that are typically
studied by social psychologists, and that are relevant to social interactions between people [33, 32, 19]. Examples are
attractiveness [7, 28, 5, 10, 8], trustworthiness [6, 29], sociability, aggressiveness [18], friendliness, kindness, happiness, familiarity [20], and memorability [2, 11]). Although
social perceptions of faces are subjective, there is often a
consensus among human raters in how they perceive facial
attractiveness, trustworthiness and dominance[6, 5]. This
indicates that faces contain high-level visual cues for social
interactions, and therefore it is possible to model this process with machine learning techniques. We take advantage
of the state-of-the-art neural network models trained for ob-
1. Introduction
Recent advances in deep convolutional networks have
driven tremendous progress in a variety of challenging
face processing tasks including face recognition[27], face
1
ject recognition and face recognition tasks and use their internal representations for social perception learning. In all
40 social dimensions, our model correlates with human averaged ratings better than the humans correlate with each
other.
The contributions of the paper are summarized below:
• To the best of our knowledge, this work is the first
attempt to systematically examine the consistency of
human social perceptions of faces, to explore the landscape of social feature semantic space, and to predict
human judgments of 40 social attributes of faces;
• We adapted 6 state of the art neural network algorithms
trained for various visual tasks to make social judgment predictions on faces and achieve high correlations with human ratings in all 40 dimensions;
• We evaluate the tuning properties of nodes in the best
network and visualize the patterns that maximally ignite the perceptions for each specific social dimensions
to facilitate a better understanding of the neural networks’ behavior in face processing.
The rest of the paper is organized as follows. In Section
2, we review related work on social perception modeling.
Section 3 and 4 summarize the methodology and the experimental framework. The experimental results and visualizations are presented in Section 5 and 6. Section 7 concludes
the paper.
2. Related work
The focus of our paper is to infer as much social judgment information as possible from a face image and to predict the subjective impression of faces by learning from human group data. We review related work in terms of the
visual features they use, the dataset they choose, the evaluation metric they adopt, and the social attributes they examine.
Visual features Since the early 1990s, psychologists
have identified that high level visual features, such as the
averageness of a face[14, 21] and the symmetry of the face
[23] can explain why certain faces look more attractive.
Machine learning researchers have developed various
computer vision features and models to predict social perceptions of faces, especially facial attractiveness. Yael et
al.[5] used geometric ratios and distances between facial
features based on facial landmarks to build an attractiveness predictor (0.65 correlation with human raters, face
database size=184). End-to-end neural networks were applied to predict facial attractiveness in 2010[8] (correlation 0.458, face database size=2056, young female faces
only). Amit Kagian and his colleagues have used a combination of landmark-derived features along with global
features to obtain a high correlation with human group
averages on facial attractiveness [10](0.82 Pearson correlation, face database size=91). Traditional computer vision features such as SIFT, HoG, Gabor filters have been
blended to predict the relative ranking of facial attractiveness in [1](rank order correlation 0.63, face database
size=200). Rothe et al. incorporate collaborative filtering
techniques with visual features extracted from pretrained
VGG networks[24] to achieve individual-level prediction
of facial attractiveness[22](correlation 0.671 on female face
queries, database size = 13,000). McCurrie et al. [17]
build a model based on a pretrained VGG network to predict trustworthiness, dominance and IQ in faces (R2 values
on trustworthiness, dominance and IQ are 0.5687, 0.4601,
0.3548 respectively, face database size=6000). Previous papers have achieved correlations with human performance
between 0.458 to 0.82 in attractiveness predictions, depending on the dataset and method used. However, to date, there
is no standard dataset that has been used to compare these
approaches.
Dataset Earlier studies employ datasets with relatively
small numbers of faces (a few hundred) and most face
datasets use young Caucasian faces only, as pointed out by
[15]. In contrast, the MIT dataset[2] we use contains 2,222
high quality color images that vary in ethnicity, gender, age
and expression, with ratings on 40 attributes. This dataset
is smaller than two of the ones mentioned above. The first
is collected from howhot.io, an online dating website[22]
and contains 13,000 face images, but that work focused on
personalized prediction of facial attractiveness, rather than
average ratings. There are only binary choices (like or dislike) indicating implicit preference of facial attractiveness.
The second one is collected from testmybrain.com, contains
6,000 grayscale face images [17], and includes just three
social features: dominance, IQ and trustworthiness.
Evaluation metric Social perceptions of faces are collected from human participants in various ways. The most
common way is to ask for a discrete rating, say from 1-9
[2], or 1-7 [5] from a number of raters, and then use the
group average as the score for a face in the specified feature
dimension (e.g. attractiveness). The consistency of ratings
between humans is checked by repeatedly randomly splitting human participants into two subgroups and then computing the correlation between the two groups’ mean ratings. To compare model predictions with human ratings,
Pearson correlation[10, 3], Spearman rank correlation[2]
and R-squared values[17] are used, depending on the nature
of the data. Another method is to present a pair of faces
or multiple faces and ask for a relative ranking in a particular dimension (e.g., attractiveness). Prediction accuracy is
measured using Kendall’s Tau and the Gamma Test [1]. In
Rothe et al. [22], a person indicates his/ her preference by
choosing to like or dislike another user’s face photo. In this
paper, since our goal is to predict a continuous score of human average ratings, and our raters do not all rate the same
faces, we also use Pearson correlation with average human
ratings on a per-face basis.
Social attributes Although social perceptions are a subjective judgment, and may not reflect a person’s actual traits
or mental states, humans tend to share consensus on their
first impressions. Kiapour et al.[12] and Wang et al.[34] find
that the social styles of people (bikers vs. hipsters, for example) can be identified and classified from image features.
Dhar et al. (2011) show that the interestingness of an image
can be quantified and predicted [4]. Bainbridge et al. (2013)
prove that the memorability of a face image can be predicted
and modified to make it more memorable [2]. Todorov et al.
[30, 31, 32] used synthesized faces to study the perception
of competence, dominance, extroversion, likeability, threat,
trustworthiness and attractiveness in faces [29]. However
their face photos lack realism compared to real-world photos and therefore cannot predict human’s social perceptions
of real faces in a more natural environment. McCurrie et al.
[17] have worked toward removing this limitation by using
real human faces to make predictions of trustworthiness and
dominance ratings. 12 From the literature, we can observe
two trends: (i) Besides McCurrie et al. [17] and Todorov. et
al[29], most machine learning work on social perception of
faces focuses on attractiveness prediction, leaving the prediction of other social perceptions largely unstudied. We
aim to bridge this gap in our paper. (ii) As summarized
by Laurentini et al[15] usually small datasets are used, with
few variations on expression, gender, ethnicity and age. The
dataset we chose overcomes the above limitations and has
comprehensive coverage of a list of 40 social feature ratings.
The papers closest to ours are McCurrie et al. [17] and
Todorov. et al[29]. Our paper differs from theirs in three
major ways: (1) Todorov. et al’s work is on synthesized
faces whereas ours is on realistic photos; (2) McCurrie et al.
[17] predict three social features, dominance, trustworthiness, and IQ, whereas we look at 40 social features including trustworthiness, aggressiveness (a term close to their
dominance), and intelligence (close to their IQ term), so
our feature set can be considered to be a superset of theirs;
and (3) we compared various feature extraction methods,
including traditional geometric features and 6 neural networks pretrained for various tasks (face identification, face
localization, object recognition). We also examine the effect
of fine-tuning the network compared with directly applying
ridge regression on extracted features from higher layer of
the networks.
3. Method
In this section we first describe the dataset used in our
experiments. Next, we introduce our method for predict-
ing social perceptions of faces. Finally, we explain how we
visualize the features that contribute most to social trait predictions.
3.1. Dataset
To predict how human evaluate social traits of a face at a
glance, we use the dataset collected by Aude Oliva’s group
[2]. The dataset consists of 2,222 images of faces sampled
from the 10k US Adult Face Database and annotated for 20
pairs of social attributes. Each attribute is rated on a scale of
1-9 (1 means not at all, 9 means extremely) and each image
is rated by 15 subjects. We take the average rating across
all raters as a collective estimation of the social feature for
every face.
The 20 pairs of social traits are: (attractive, unattractive),
(happy, unhappy), (friendly, unfriendly), (sociable, introverted), (kind, mean), (caring, cold), (calm, aggressive),
(trustworthy, untrustworthy), (responsible, irresponsible),
(confident, uncertain), (humble, egotistical),(emotionally
stable, emotionally unstable), (normal, weird), (intelligent,
unintelligent), (interesting, boring), (emotional, unemotional), (memorable, forgettable), (typical, atypical), (familiar, unfamiliar) and (common, uncommon).
Clearly, some of these traits will be highly correlated,
and are predictable from the others. We compute the Spearman’s rank correlation between every pair of social features
and show their correlations in a heatmap (see the left figure in Figure 1). We put features together in the map based
on similarity and positive/negativeness. From the figure,
we can see that negative social features such as untrustworthy, aggressiveness, cold, introverted, irresponsible form a
correlated block, while most positive features such as attractive, sociable, caring, friendly, happy, intelligent, interesting, confident are highly correlated with each other. Although we chose 20 pairs of opposite features, they are not
completely complementary and redundant. Principal component analysis shows that it takes 24 principal components
to cover 95% of the variance.
3.2. Regression Model for Social Attributes
After we average human ratings on each face, each face
receives a continuous score from 1 to 9 in all social dimensions. We model these social scores with a regression model. Our proposed algorithm is a ridge regression
model on features extracted from deep convolutional neural networks (CNN). Since CNN features are usually highdimensional, we first perform Principal Component Analysis (PCA) on the extracted features of the training set to
reduce the dimensionality. The PCA dimensionality is chosen by cross-validation on a validation set, separately for
each trait. The PCA weights are saved and further used in
fine-tuning our CNN-regression model.
Figure 1: Correlation heatmaps among social features. Left: human. Right: network.
3.3. Feature Visualization
4.1. Baseline I: Human Correlations
Attempting to understand what features are most helpful in social attribute prediction, we visualize the features
extracted from the CNN. Two different methods were proposed in past feature visualization studies: dataset-centric
methods [36, 38], and a network-centric method[36, 37].
Since these social attributes are all subjective perceptions
rated by people, it is informative to examine to what extent
people agree with each other upon those social judgments.
We performed the following procedure 50 times for each
attribute and then averaged the results:
The dataset-centric method we employed is to display
image patches from the training set that cause high activation for the feature units and use the deconvolution method
to highlight the portions of the image that are responsible
for firing the important feature neurons [36, 38].
1. For each face, we randomly split the 15 raters evenly
into two groups of 7 and 8. (Note: the raters for each
face will, in general, be different sets).
The network-centric approach is usually used in classification networks. This method produces an image that is
based on adapting the input by maximizing the output category activation using gradient ascent, i.e., it is mainly a
function of the network. [36, 37]. The key idea is to optimize the input image so that the target neuron can be highly
activated. We apply this idea to the output (regression) neuron as well as the top nine neurons that influence that output
individually.
4. Experimental framework
In this section, we report our experimental framework
using 6 CNN-based regression models with respect to two
baselines, human correlation between groups of raters, and
a baseline model using the geometric features.
2. We calculate the two group’s average ratings for each
face, obtaining two vectors of length 2,222 (there are
2,222 faces in the dataset).
3. We calculate the correlation between the two vectors.
The results are shown in the second column of Table 1. For
every social attribute, the averaged correlation between human subgroups serves as an index of the rating consistency.
4.2. Baseline II: Regression on geometric features
Past studies on facial attractiveness have found that attractiveness can be inferred from the geometric ratios and
configurations of a face[5, 10]. We suggest that other social attributes can also be inferred from geometric features.
We compute 29 geometric features based on definitions described in [16] and further extract a ”smoothness” feature
and skin color features according to the procedure in [5, 10].
The ”smoothness” of a face was evaluated by applying a
Canny edge detector to windows from the cheek/forehead
area [5]. The more edges detected by edge detectors within
the window, the less smooth the skin is. The regions we
chose to compute smoothness and skin color are highlighted
in the right subplot of Figure 2). The ”skin color” feature
is extracted from the same window as ”smoothness”, converted from RGB to HSV. Regressing on these handcrafted
features alone are not enough to capture the richness of geometric details about a face, we therefore use a computer
vision library (dlib, C++) to automatically label 68 face
landmarks (see Figure 2) for each face and compute distances and slopes between any two landmarks. Combining
29 handcrafted geometric features, smoothness, color and
the distance-slope features, we obtain 4592 features in total. Since the features are highly correlated, we apply PCA
to reduce dimensionality. Again, the PCA dimensionality is
chosen by cross-validating on the hold out set separately for
each facial attribute. Then a ridge regression model is applied to predict social attribute ratings of a face. The hyperparameter of ridge regression is selected by leave-one-out
validation within the training set.
Figure 2: 68 face landmarks labeled by dlib software automatically. The gray regions are the locations used for computing smoothness and skin color.
4.3. CNN-based Regression Model
We initially compared six neural network architectures:
(1) VGG16, (2) VGG-Face from the Oxford Visual Geometry Groups VGG networks[24], (3) AlexNet (the publicly
available CaffeNet reference model) [13] (4) Inception from
Google [26] (5) a shallow face identification Siamese neural network that we trained from scratch: Face-SNN and
(6) a state of the art VGG-derived network trained for the
face landmark localization task: Face-LandmarkNN. These
comparisons were performed with the Caffe deep learning
framework [9].
To find the best CNN to predict social attribute ratings
among all six networks, we first find the best-performing
feature layers of each network (with the ridge regression
model), and then we compare the results among the networks to select the best network. For each layer of each
network, before the ridge regression, we performed PCA
and picked the PCA dimension that gave the best results on
the validation set.
5. Results
Surprisingly, we found that features from conv5 2 layer
of VGG16 trained for object classification slightly outperformed the AlexNet and Inception networks, while the
three networks trained solely on faces, VGG-Face, FaceLandmarkNN and Face-SNN did not achieve performance
as competitive as the other three for most of the social attributes. The best performing VGG16 layer was conv5 2.
We speculate that the reason for the relatively poorer performance of the face recognition networks is that they are
optimized either to learn differences between faces which
define identity or to learn the face landmark configurations,
whereas for this task at hand, we are looking for commonalities behind certain social features which go beyond identity. The landmark network presumably should give results
similar to the geometric features, but did not learn features
corresponding to all of the features we used in that model.
These speculations need to be checked, of course, for example by trying to predict all of our measured features, using
the landmark network, but we did not do that here.
We tried fine-tuning the model as follows. We used backpropagation to fine tune the weights into the conv5 2 layer,
the weights to the PCA layer from conv5 2 (initialized by
the PCA weights), and the weights from the PCA layer to
the output regression unit. However, this fine-tuning did not
improve performance, so the results reported in Table 1 are
without fine-tuning.
We evaluate the performance on 50 random train / validation / test splits of the data with a 64/16/20 percent split for
training, cross-validation and testing, respectively. The prediction performance of our model is evaluated using Pearson’s correlation with the human ratings on the test set. For
each social attribute, we report its human consistency as described in Section 4.1.
Table 1 summarizes the prediction performance of our
model for all the social attributes compared to Baseline
I and II. The table is organized in a descending order of
human agreement on the putative positive attribute of the
paired attributes. The three attributes where there is greater
agreement among humans for the negative component of
the pair are bolded.
Among all the social attributes, human subjects agree
most with each other about ”happy” and disagree most
about ”unfamiliar.” For both regression models (Baseline II
and our model), model performance grows as the consensus on a social trait increases and human correlations with
each other are consistently lower than the models’ correlations with the average human ratings. Normally, one might
consider the human correlations to be an upper bound on
performance, but here they are different kinds of correlations.
Since the change in expression would produce a change
in landmark locations, it is not surprising that landmark-
based geometric features (Baseline II) achieve comparable
or slightly higher correlation as our model for predicting
those social attributes that are highly related to expressions
(such as ”happy”, ”unhappy”, ”cold” and ”friendly” etc.).
While for other social attributes, our model slightly outperforms landmark-based geometric features by about 0.04
correlation on average and significantly outperforms human correlation by about 0.12 correlation on average. This
implies that CNN features encode much more information
than just landmark-based features. It is essential to visualize
those features and understand what features extracted from
CNN make our model powerful enough to predict social attributes.
To quantitatively compare the face social features perceived by humans and those predicted by our best performing model, we take the model predictions on all social features, and compute the Spearman correlation between every
pair in the set (see the right figure in Figure 1). Not surprisingly, this has very similar patterns compared the heatmap
generated from human ratings (see the right panel in Figure 1). Pearson Correlation between the upper triangle of
the two similarity matrices (human and model prediction)
is 0.9836. However, note that each predictor was trained
independently.
6. Feature Visualization
In this section, we visualize the features that are of importance to social perceptions. We choose facial attractiveness as an example. The same method can be applied to the
other social features. We employ the two methods described
in section 3.3 to visualize features learned by our model.
6.1. Data-centric Visualization
To identify visual features that ignite attractiveness perception, we find the top 9 units of highest influence on attractiveness at conv5 2 as follows. First, we compute a
product of three terms: (1) A unit’s activation from conv5 2,
(2) that unit’s weight to the following fc pca layer, (3) the
fc pca unit’s weight to the output unit. We then sort all
conv5 2 units’ average products of the three terms and identify the top 9 neurons as the ones that contribute most to the
output neuron for the corresponding social feature. Then
we employ the method described in [36, 38] to find top-9
input images that cause high activations in each of the top-9
conv5 2 neurons. Also we further produce the deconvolutional images by projecting each activation separately down
to pixel space.
Figure 3 captures the features that are important to predict the attractiveness of a face. The feature importance
descends from left to right and top to bottom. The important features identified by our model are related to eyes, hair
Social Attributes
happy
unhappy
friendly
unfriendly
sociable
introverted
attractive
unattractive
kind
mean
caring
cold
trustworthy
untrustworthy
responsible
irresponsible
confident
uncertain
humble
egotistic
emotionally stable
emotionally unstable
normal
weird
intelligent
unintelligent
interesting
boring
calm
aggressive
emotional
unemotional
memorable
forgettable
typical
atypical
common
uncommon
familiar
unfamiliar
Baseline I
0.84
0.75
0.78
0.72
0.74
0.50
0.72
0.62
0.72
0.69
0.72
0.71
0.62
0.60
0.58
0.55
0.55
0.45
0.55
0.52
0.53
0.50
0.49
0.52
0.49
0.43
0.42
0.39
0.41
0.65
0.33
0.56
0.30
0.27
0.28
0.24
0.25
0.27
0.24
0.18
Baseline II
0.86
0.81
0.83
0.80
0.78
0.64
0.66
0.62
0.79
0.75
0.78
0.81
0.72
0.69
0.65
0.64
0.55
0.62
0.64
0.62
0.64
0.62
0.58
0.50
0.53
0.53
0.64
0.54
0.47
0.72
0.60
0.76
0.38
0.40
0.41
0.40
0.37
0.38
0.42
0.40
Our Model
0.84
0.80
0.82
0.79
0.78
0.65
0.75
0.70
0.79
0.73
0.79
0.79
0.73
0.70
0.70
0.67
0.61
0.63
0.63
0.62
0.67
0.64
0.61
0.56
0.62
0.58
0.67
0.60
0.50
0.72
0.60
0.75
0.48
0.48
0.43
0.43
0.40
0.40
0.44
0.44
Table 1: Prediction performance of all the social attributes. The reported performance is averaged on 50 random train/validation/test splits of the data.
with bangs, high nose-bridge, high cheeks, dark eyebrows,
strong commanding jawline, chin and red lips. Note that
among the 9 cropped input image patches, not all the faces
are perceived as attractive or rated as attractive. An attractive face needs to activate more than one feature in order to
be considered attractive. This observation agrees with our
intuition that attractiveness is a kind of holistic judgment,
requiring a combination of multiple features.
It also seems to be the case that several of the features
include relationships between the parts. For example, while
the first feature in the upper left of the figure emphasizes
the eye, it also includes the nose. This is also true of the
upper right feature. Smiling is also important in order to
be perceived attractive, as emphasized by the feature in the
lower left of the figure.
6.2. Network-centric Visualization
In section 6.1, we have identified the top-9 units and their
feature maps from the con5 2 layer that maximally activates
the attractiveness neuron. Here, we use the gradient-ascent
method to optimize the input image that would highly activate a specific neuron of the network. This method is
also performed on the pretrained-VGG16 regression model,
which is trained to predict attractiveness.
Figure 4a shows the optimized image corresponding to
the output neuron from a random input image. Optimizing the input image for the output neuron of a regression
model does not result in a particularly interpretable figure,
although it does appear to emphasize the eyes. Our second approach is to optimize the input image with respect to
the top-9 contributing neurons from conv5 2 layer that have
been identified in section 6.1. Figure 4b presents 9 optimized images with respect to the corresponding top-9 feature maps of the top-9 neurons from conv5 2 layer. Since
we use a pretrained-VGG16 network for visualization, it is
not surprising that the corresponding top-9 feature maps at
conv5 2 layer are not particularly encoding facial patterns.
We also present the optimized image initialize with a
face image, along with the original face image for comparison in Figure 5. The optimized image tends to highlight the
eyes, nose, cheeks and the contour of the face, which is consistent with the features identified by data-centric method.
7. Conclusion
We have shown that a deep network can be used to predict human social judgments with high correlation with the
average human ratings. As far as we know, this is the
widest exploration of social judgment predictions, showing
human-like perceptions on 40 social dimensions. Unsurprisingly, given previous work recognizing facial expressions, where happiness is the easiest to recognize, our highest correlation is on the happy feature. However, previous
work in this area tended to classify a face as happy or not,
rather than the degree of rated happiness.
We find that for attributes that correspond to elements
of the face that require muscle movement, or a lack of it
(such as happy, unhappy, cold, aggressive, unemotional) a
simple regression model based on the placement of facial
landmarks works well. For ones that don’t appear to suggest
emotions, such as friendly, note that friendly and happy are
highly correlated (see Figure 1, and the red block indexed
by happy and friendly). Similarly, aggressive and mean are
highly correlated, which presumably requires not smiling.
Perhaps of more significance are the correlations with
judgments of traits, such as trustworthiness, responsibleness, confidence, and intelligence, which would correspond
to more static features of the face. In this area, the deep
network, which responds to facial textures as well as shape,
has superior performance. While these judgments do not
correspond to a notion of ”ground truth,” they are things for
which humans have a fair amount of agreement, suggesting
that there is a signal to be recognized.
Of further note is that we have shown, yet again, that a
machine can recognize attractiveness, presumably without
any hormonal influences. For this dataset, our deep network correlates with human ratings at 0.75. This provides a
benchmark for this dataset.
Finally, it is of note that we can see that some of the
traits considered to be ”opposite” in this list are not simply
the reverse of one another. For example, there is a large
difference in human agreements on ”sociable” (0.74) versus
”introverted” (0.50), suggesting they are not opposites.
These results are significant for the field of social
robotics. While a robot should not judge a human based
completely on their appearance, it can be useful knowledge
that humans might judge a person to be trustworthy, while
the robot can be more objective. Similarly, a robot need
not treat an attractive and unattractive person differently,
but this knowledge could affect how the robot interacts with
the unattractive person, knowing in advance that this person
may have had many negative experiences interacting with
people.
In this paper, we train each social feature separately, due
to their varied consistency and reliability. In the future, it
is worth trying to train one single convnet to learn multiple
tasks simultaneously and evaluate whether shared representation may further improve the model performance.
In summary, we have provided the first machine learning system to learn subjective human judgments of a wide
spectrum of traits. We found that the more humans agree on
such subjective judgments, the more the system could pick
up on the features driving those judgments. It will be of interest to investigate further what those features are, beyond
the attractiveness features we displayed here.
One step further from predicting the value in a certain
social feature is to move faces on the social manifold and
to increase a face’s elicited social perceptions in positive
ways (e.g. to make a face look more sociable/ trustworthy/
attractive). Although the images generated by our current
visualization method are still far away from being photorealistic, it may be a fruitful area in the future to develop
generative models that can achieve this goal.
Figure 3: Visualization of features in the pretrained-VGG16 regression network. For conv5 2 layer, we show the top 9
activations of the top 9 neurons that maximally activate the attractiveness neuron across the training data, projected down to
pixel space using the deconvolutional network approach [38] and their corresponding cropped image patches. Best viewed
in electronic form, and zoomed in.
References
[1] H. Altwaijry and S. Belongie. Relative ranking of facial attractiveness. In Applications of Computer Vision (WACV),
2013 IEEE Workshop on, pages 117–124. IEEE, 2013. 2
[2] W. A. Bainbridge, P. Isola, and A. Oliva. The intrinsic memorability of face photographs. Journal of Experimental Psychology: General, 142(4):1323, 2013. 1, 2, 3
[3] A. Dantcheva and J. Dugelay. Female facial aesthetics based
on soft biometrics and photo-quality. In Proceedings of
ICME, 2011. 2
[4] S. Dhar, V. Ordonez, and T. L. Berg. High level describable attributes for predicting aesthetics and interestingness.
In Computer Vision and Pattern Recognition (CVPR), 2011
IEEE Conference on, pages 1657–1664. IEEE, 2011. 3
[5] Y. Eisenthal, G. Dror, and E. Ruppin. Facial attractiveness:
Beauty and the machine. Neural Computation, 18(1):119–
142, 2006. 1, 2, 4, 5
[6] V. Falvello, M. Vinson, C. Ferrari, and A. Todorov. The robustness of learning about the trustworthiness of other people. Social Cognition, 33(5):368, 2015. 1
[7] K. Grammer and R. Thornhill. Human (homo sapiens) facial attractiveness and sexual selection: the role of symmetry and averageness. Journal of comparative psychology,
108(3):233, 1994. 1
[8] D. Gray, K. Yu, W. Xu, and Y. Gong. Predicting facial beauty
without landmarks. In Computer Vision–ECCV 2010, pages
434–447. Springer, 2010. 1, 2
[9] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint
arXiv:1408.5093, 2014. 5
[10] A. Kagian, G. Dror, T. Leyvand, I. Meilijson, D. Cohen-Or,
and E. Ruppin. A machine learning predictor of facial attractiveness revealing human-like psychophysical biases. Vision
research, 48(2):235–243, 2008. 1, 2, 4
[11] A. Khosla, W. A. Bainbridge, A. Torralba, and A. Oliva.
Modifying the memorability of face photographs. In Computer Vision (ICCV), 2013 IEEE International Conference
on, pages 3200–3207. IEEE, 2013. 1
[12] M. H. Kiapour, K. Yamaguchi, A. C. Berg, and T. L. Berg.
Hipster wars: Discovering elements of fashion styles. In
European conference on computer vision, pages 472–488.
Springer, 2014. 3
[13] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
Advances in neural information processing systems, pages
1097–1105, 2012. 5
[14] J. H. Langlois and L. A. Roggman. Attractive faces are only
average. Psychological science, 1(2):115–121, 1990. 2
[15] A. Laurentini and A. Bottino. Computer analysis of face
beauty: A survey. Computer Vision and Image Understanding, 125:184–199, 2014. 2, 3
[16] D. S. Ma, J. Correll, and B. Wittenbrink. The chicago face
database: A free stimulus set of faces and norming data. Behavior research methods, 47(4):1122–1135, 2015. 4
(a) Original input image
(b) Optimized image
Figure 5: Visualization of the optimized image with a input face image: Figure 5a is the original face image before
optimization. Figure 5b is produced by performing optimization with respect to the output unit.
(a) Optimized input image with respect to
the output unit
[20]
[21]
[22]
[23]
[24]
[25]
(b) Optimized input images with respect to top-9 neurons from
conv5 2 layer
[26]
Figure 4: Visualization of features using network-centric
method. To produce Fig 4a, we use gradient ascent to optimize the output neuron. Fig 4b shows 9 optimized images
for the feature maps corresponding to top-9 contributor neurons from conv5 2 layer.
[27]
[28]
[17] M. McCurrie, F. Beletti, L. Parzianello, A. Westendorp,
S. Anthony, and W. Scheirer. Predicting first impressions
with deep learning. arXiv preprint arXiv:1610.08119, 2016.
2, 3
[18] A. Mignault and A. Chaudhuri. The many faces of a neutral
face: Head tilt and perception of dominance and emotion.
Journal of nonverbal behavior, 27(2):111–132, 2003. 1
[19] N. N. Oosterhof and A. Todorov. The functional basis of
[29]
[30]
face evaluation. Proceedings of the National Academy of
Sciences, 105(32):11087–11092, 2008. 1
M. Peskin and F. N. Newell. Familiarity breeds attraction:
Effects of exposure on the attractiveness of typical and distinctive faces. PERCEPTION-LONDON-, 33(2):147–158,
2004. 1
G. Rhodes, L. Jeffery, T. L. Watson, C. W. Clifford, and
K. Nakayama. Fitting the mind to the world face adaptation and attractiveness aftereffects. Psychological science,
14(6):558–566, 2003. 2
R. Rothe, R. Timofte, and L. Van Gool. Some like it hotvisual guidance for preference prediction. arXiv preprint
arXiv:1510.07867, 2015. 2
J. E. Scheib, S. W. Gangestad, and R. Thornhill. Facial attractiveness, symmetry and cues of good genes. Proceedings of the Royal Society of London. Series B: Biological
Sciences, 266(1431):1913–1917, 1999. 2
K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. arXiv preprint
arXiv:1409.1556, 2014. 2, 5
R. Stewart, M. Andriluka, and A. Y. Ng. End-to-end people detection in crowded scenes. In The IEEE Conference
on Computer Vision and Pattern Recognition (CVPR), June
2016. 1
C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed,
D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich.
Going deeper with convolutions. In Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition,
pages 1–9, 2015. 5
Y. Taigman, M. Yang, M. Ranzato, and L. Wolf. Deepface:
Closing the gap to human-level performance in face verification. In Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition, pages 1701–1708, 2014. 1
R. Thornhill and S. W. Gangestad. Facial attractiveness.
Trends in cognitive sciences, 3(12):452–460, 1999. 1
A. Todorov, S. G. Baron, and N. N. Oosterhof. Evaluating
face trustworthiness: a model based approach. Social cognitive and affective neuroscience, 3(2):119–127, 2008. 1, 3
A. Todorov, R. Dotsch, J. M. Porter, N. N. Oosterhof, and
V. B. Falvello. Validation of data-driven computational models of social perception of faces. Emotion, 13(4):724, 2013.
3
[31] A. Todorov, P. Mende-Siedlecki, and R. Dotsch. Social
judgments from faces. Current opinion in neurobiology,
23(3):373–380, 2013. 1, 3
[32] A. Todorov, C. Y. Olivola, R. Dotsch, and P. MendeSiedlecki. Social attributions from faces: Determinants, consequences, accuracy, and functional significance. Psychology, 66(1):519, 2015. 1, 3
[33] A. Todorov, C. P. Said, A. D. Engell, and N. N. Oosterhof. Understanding evaluation of faces on social dimensions.
Trends in cognitive sciences, 12(12):455–460, 2008. 1
[34] Y. Wang and G. W. Cottrell. Bikers are like tobacco shops,
formal dressers are like suits: Recognizing urban tribes with
caffe. In 2015 IEEE Winter Conference on Applications of
Computer Vision, pages 876–883. IEEE, 2015. 3
[35] J. Willis and A. Todorov. First impressions making up your
mind after a 100-ms exposure to a face. Psychological science, 17(7):592–598, 2006. 1
[36] J. Yosinski, J. Clune, A. Nguyen, T. Fuchs, and H. Lipson.
Understanding neural networks through deep visualization.
arXiv preprint arXiv:1506.06579, 2015. 4, 6
[37] S. Yu and K. Zipser. A deep neural net trained for person categorization develops both detailed local features and broad
contextual specificities. Journal of Vision, 16(12):411–411,
2016. 4
[38] M. D. Zeiler and R. Fergus. Visualizing and understanding
convolutional networks. In European Conference on Computer Vision, pages 818–833. Springer, 2014. 4, 6, 8
[39] X. Zhu, Z. Lei, X. Liu, H. Shi, and S. Z. Li. Face alignment across large poses: A 3d solution. arXiv preprint
arXiv:1511.07212, 2015. 1
| 2cs.AI
|
arXiv:1607.00743v1 [math.ST] 4 Jul 2016
A Residual Bootstrap for High-Dimensional
Regression with Near Low-Rank Designs
Miles E. Lopes
Department of Statistics
University of California, Berkeley
Berkeley, CA 94720
mlopes@stat.berkeley.edu
Abstract
We study the residual bootstrap (RB) method in the context of high-dimensional
linear regression. Specifically, we analyze the distributional approximation of linear contrasts c⊤ (βbρ − β), where βbρ is a ridge-regression estimator. When regression coefficients are estimated via least squares, classical results show that RB
consistently approximates the laws of contrasts, provided that p ≪ n, where the
design matrix is of size n × p. Up to now, relatively little work has considered
how additional structure in the linear model may extend the validity of RB to the
setting where p/n ≍ 1. In this setting, we propose a version of RB that resamples
residuals obtained from ridge regression. Our main structural assumption on the
design matrix is that it is nearly low rank — in the sense that its singular values
decay according to a power-law profile. Under a few extra technical assumptions, we derive a simple criterion for ensuring that RB consistently approximates
the law of a given contrast. We then specialize this result to study confidence
intervals for mean response values Xi⊤ β, where Xi⊤ is the ith row of the design. More precisely, we show that conditionally on a Gaussian design with near
low-rank structure, RB simultaneously approximates all of the laws Xi⊤ (βbρ − β),
i = 1, . . . , n. This result is also notable as it imposes no sparsity assumptions on
β. Furthermore, since our consistency results are formulated in terms of the Mallows (Kantorovich) metric, the existence of a limiting distribution is not required.
1 Introduction
Until recently, much of the emphasis in the theory of high-dimensional statistics has been on “first
order” problems, such as estimation and prediction. As the understanding of these problems has
become more complete, attention has begun to shift increasingly towards “second order” problems,
dealing with hypothesis tests, confidence intervals, and uncertainty quantification [1, 2, 3, 4, 5,
6]. In this direction, much less is understood about the effects of structure, regularization, and
dimensionality — leaving many questions open. One collection of such questions that has attracted
growing interest deals with the operating characteristics of the bootstrap in high dimensions [7, 8, 9].
Due to the fact that bootstrap is among the most widely used tools for approximating the sampling
distributions of test statistics and estimators, there is much practical value in understanding what
factors allow for the bootstrap to succeed in the high-dimensional regime.
The regression model and linear contrasts. In this paper, we focus our attention on highdimensional linear regression, and our aim is to know when the residual bootstrap (RB) method
consistently approximates the laws of linear contrasts. (A review of RB is given in Section 2.)
1
To specify the model, suppose that we observe a response vector Y ∈ Rn , generated according to
Y = Xβ + ε,
n×p
(1)
p
where X ∈ R
is the observed design matrix, β ∈ R is an unknown vector of coefficients, and
the error variables ε = (ε1 , . . . , εn ) are drawn i.i.d. from an unknown distribution F0 , with mean
0 and unknown variance σ 2 < ∞. As is conventional in high-dimensional statistics, we assume
the model (1) is embedded in a sequence of models indexed by n. Hence, we allow X, β, and p to
vary implicitly with n. We will leave p/n unconstrained until Section 3.3, where we will assume
p/n ≍ 1 in Theorem 3, and then in Section 3.4, we will assume further that p/n is bounded strictly
between 0 and 1. The distribution F0 is fixed with respect to n, and none of our results require F0
to have more than four moments.
Although we are primarily interested in cases where the design matrix X is deterministic, we will
also study the performance of the bootstrap conditionally on a Gaussian design. For this reason,
we will use the symbol E[. . . |X] even when the design is non-random so that confusion does not
arise in relating different sections of the paper. Likewise, the symbol E[. . . ] refers to unconditional
expectation over all sources of randomness. Whenever the design is random, we will assume X ⊥
⊥ ε,
denoting the distribution of X by PX , and the distribution of ε by Pε .
Within the context of the regression, we will be focused on linear contrasts c⊤ (βb − β), where c ∈ Rp
is a fixed vector and βb ∈ Rp is an estimate of β. The importance of contrasts arises from the fact
that they unify many questions about a linear model. For instance, testing the significance of the ith
coefficient βi may be addressed by choosing c to be the standard basis vector c⊤ = e⊤
i . Another
important problem is quantifying the uncertainty of point predictions, which may be addressed by
choosing c⊤ = Xi⊤ , i.e. the ith row of the design matrix. In this case, an approximation to the law
of the contrast leads to a confidence interval for the mean response value E[Yi ] = Xi⊤ β. Further
applications of contrasts occur in the broad topic of ANOVA [10].
Intuition for structure and regularization in RB. The following two paragraphs explain the core
conceptual aspects of the paper. To understand the role of regularization in applying RB to highdimensional regression, it is helpful to think of RB in terms of two ideas. First, if βbLS denotes the
ordinary least squares estimator, then it is a simple but important fact that contrasts can be written
as c⊤ (βbLS − β) = a⊤ ε where a⊤:= c⊤ (X ⊤ X)−1 X ⊤ . Hence, if it were possible to sample directly
from F0 , then the law of any such contrast could be easily determined. Since F0 is unknown, the
second key idea is to use the residuals of some estimator βb as a proxy for samples from F0 . When
p ≪ n, the least-squares residuals are a good proxy [11, 12]. However, it is well-known that leastsquares tends to overfit when p/n ≍ 1. When βbLS fits “too well”, this means that its residuals are
b
“too small”, and hence they give a poor proxy for F0 . Therefore, by using a regularized estimator β,
b
overfitting can be avoided, and the residuals of β may offer a better way of obtaining “approximate
samples” from F0 .
The form of regularized regression we will focus on is ridge regression:
βbρ := (X ⊤ X + ρIp×p )−1 X ⊤ Y,
(2)
where ρ > 0 is a user-specificed regularization parameter. As will be seen in Sections 3.2 and 3.3,
the residuals obtained from ridge regression lead to a particularly good approximation of F0 when
the design matrix X is nearly low-rank, in the sense that most of its singular values are close to
0. In essence, this condition is a form of sparsity, since it implies that the rows of X nearly lie
in a low-dimensional subspace of Rp . However, this type of structural condition has a significant
advantage over the the more well-studied assumption that β is sparse. Namely, the assumption that
X is nearly low-rank can be inspected directly in practice — whereas sparsity in β is typically
unverifiable. In fact, our results will impose no conditions on β, other than that kβk2 remains
bounded as (n, p) → ∞. Finally, it is worth noting that the occurrence of near low-rank design
matrices is actually very common in applications, and is often referred to as collinearity [13, ch.
17].
Contributions and outline. The primary contribution of this paper is a complement to the work of
Bickel and Freedman [12] (hereafter B&F 1983) — who showed that in general, the RB method fails
2
to approximate the laws of least-squares contrasts c⊤ (βbLS − β) when p/n ≍ 1. Instead, we develop
an alternative set of results, proving that even when p/n ≍ 1, RB can successfully approximate the
laws of “ridged contrasts” c⊤ (βbρ − β) for many choices of c ∈ Rp , provided that the design matrix
X is nearly low rank. A particularly interesting consequence of our work is that RB successfully
approximates the law c⊤ (βbρ − β) for a certain choice of c that was shown in B&F 1983 to “break”
RB when applied to least-squares. Specifically, such a c can be chosen as one of the rows of X with
a high leverage score (see Section 4). This example corresponds to the practical problem of setting
confidence intervals for mean response values E[Yi ] = Xi⊤ β. (See [12, p. 41], as well as Lemma 2
and Theorem 4 in Section 3.4). Lastly, from a technical point of view, a third notable aspect of our
results is that they are formulated in terms of the Mallows-ℓ2 metric, which frees us from having to
impose conditions that force a limiting distribution to exist.
Apart from B&F 1983, the most closely related works we are aware of are the recent papers [7]
and [8], which also consider RB in the high-dimensional setting. However, these works focus on
role of sparsity in β and do not make use of low-rank structure in the design, whereas our work deals
only with structure in the design and imposes no sparsity assumptions on β.
The remainder of the paper is organized as follows. In Section 2, we formulate the problem of
approximating the laws of contrasts, and describe our proposed methodology for RB based on ridge
regression. Then, in Section 3 we state several results that lay the groundwork for Theorem 4, which
shows that that RB can successfully approximate all of the laws L(Xi⊤ (βbρ − β)|X), i = 1, . . . , n,
conditionally on a Gaussian design. Due to space constraints, all proofs are deferred to material that
will appear in a separate work.
Notation and conventions. If U and V are random variables, then L(U |V ) denotes the law of U ,
conditionally on V . If an and bn are two sequences of real numbers, then the notation an . bn
means that there is an absolute constant κ0 > 0 and an integer n0 ≥ 1 such that an ≤ κ0 bn for all
n ≥ n0 . The notation an ≍ bn means that an . bn and bn . an . For a square matrix A ∈ Rk×k
whose eigenvalues are real, we denote them by λmin (A) = λk (A) ≤ · · · ≤ λ1 (A) = λmax (A).
2 Problem setup and methodology
Problem setup. For any c ∈ Rp , it is clear that conditionally on X, the law of c⊤ (βbρ − β) is
completely determined by F0 , and hence it makes sense to use the notation
Ψρ (F0 ; c) := L c⊤ (βbρ − β)
(3)
X .
The problem we aim to solve is to approximate the distribution Ψρ (F0 ; c) for suitable choices of c.
Review of the residual bootstrap (RB) procedure. We briefly explain the steps involved in the
residual bootstrap procedure, applied to the ridge estimator βbρ of β. To proceed somewhat indirectly,
consider the following “bias-variance” decomposition of Ψρ (F0 ; c), conditionally on X,
Ψρ (F0 ; c) = L c⊤ βbρ − E[βbρ |X]
(4)
X + c⊤ E[βbρ |X] − β .
|
{z
}
{z
}
|
=: Φρ (F0 ;c)
=: bias(Φρ (F0 ;c))
Note that the distribution Φ(F0 ; c) has mean zero, and so that the second term on the right side is
the bias of Φρ (F0 ; c) as an estimator of Ψρ (F0 ; c). Furthermore, the distribution Φρ (F0 ; c) may be
viewed as the “variance component” of Ψρ (F0 ; c). We will be interested in situations where the
regularization parameter ρ may be chosen small enough so that the bias component is small. In this
case, one has Ψρ (F0 ; c) ≈ Φρ (F0 ; c), and then it is enough to find an approximation to the law
Φρ (F0 ; c), which is unknown. To this end, a simple manipulation of c⊤ (βbρ − E[βbρ ]) leads to
Φρ (F0 ; c) = L(c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε
(5)
X).
Now, to approximate Φρ (F0 ; c), let Fb be any centered estimate of F0 . (Typically, Fb is obtained by
using the centered residuals of some estimator of β, but this is not necessary in general.) Also, let
ε∗ = (ε∗1 , . . . , ε∗n ) ∈ Rn be an i.i.d. sample from Fb . Then, replacing ε with ε∗ in line (5) yields
Φρ (Fb ; c) = L(c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε∗
(6)
X).
3
At this point, we define the (random) measure Φρ (Fb ; c) to be the RB approximation to Φρ (F0 ; c).
Hence, it is clear that the RB approximation is simply a “plug-in rule”.
A two-stage approach. An important feature of the procedure just described is that we are free
to use any centered estimator Fb of F0 . This fact offers substantial flexibility in approximating
Ψρ (F0 ; c). One way of exploiting this flexibility is to consider a two-stage approach, where a “pilot”
ridge estimator βb̺ is used to first compute residuals whose centered empirical distribution function
is Fb̺ , say. Then, in the second stage, the distribution Fb̺ is used to approximate Φρ (F0 ; c) via the
relation (6). To be more detailed, if (b
e1 (̺), . . . , ebn (̺)) = eb(̺) := Y − X βb̺ are the residuals of βb̺ ,
b
then we define F̺ to be the distribution that places mass 1/n at each of the values ebi (̺) − ē(̺) with
P
ē(̺) := n1 ni=1 ebi (̺). Here, it is important to note that the value ̺ is chosen to optimize Fb̺ as an
approximation to F0 . By contrast, the choice of ρ depends on the relative importance of width and
coverage probability for confidence intervals based on Φρ (Fb̺ ; c). Theorems 1, 3, and 4 will offer
some guidance in selecting ̺ and ρ.
Resampling algorithm. To summarize the discussion above, if B is user-specified number of
bootstrap replicates, our proposed method for approximating Ψρ (F0 ; c) is given below.
1. Select ρ and ̺, and compute the residuals eb(̺) = Y − X βb̺ .
2. Compute the centered distribution function Fb̺ , putting mass 1/n at each ebi (̺) − ē(̺).
3. For j = 1, . . . , B:
• Draw a vector ε∗ ∈ Rn of n i.i.d. samples from Fb̺ .
• Compute zj := c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε∗ .
4. Return the empirical distribution of z1 , . . . , zB .
Clearly, as B → ∞, the empirical distribution of z1 , . . . , zB converges weakly to Φρ (Fb̺ ; c), with
probability 1. As is conventional, our theoretical analysis in the next section will ignore Monte Carlo
issues, and address only the performance of Φρ (Fb̺ ; c) as an approximation to Ψρ (F0 ; c).
3 Main results
The following metric will be central to our theoretical results, and has been a standard tool in the
analysis of the bootstrap, beginning with the work of Bickel and Freedman [14].
The Mallows (Kantorovich) metric. For two random vectors U and V in a Euclidean space, the
Mallows-ℓ2 metric is defined by
n h
i
o
(7)
d22 (L(U ), L(V )) := inf E kU − V k22 : (U, V ) ∼ π
π∈Π
where the infimum is over the class Π of joint distributions π whose marginals are L(U ) and L(V ).
It is worth noting that convergence in d2 is strictly stronger than weak convergence, since it also
requires convergence of second moments. Additional details may be found in the paper [14].
3.1 A bias-variance decomposition for bootstrap approximation
To give some notation for analyzing the bias-variance decomposition of Ψρ (F0 ; c) in line (4), we
define the following quantities based upon the ridge estimator βbρ . Namely, the variance is
vρ = vρ (X; c) := var(Ψρ (F0 ; c)|X) = σ 2 kc⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 .
To express the bias of Φρ (F0 ; c), we define the vector δ(X) ∈ Rp according to
δ(X) := β − E[βbρ ] = Ip×p − (X ⊤ X + ρIp×p )−1 X ⊤ X β,
4
(8)
and then put
b2ρ = b2ρ (X; c) := bias2 (Φρ (F0 ; c)) = (c⊤ δ(X))2 .
(9)
We will sometimes omit the arguments of vρ and b2ρ to lighten notation. Note that vρ (X; c) does not
depend on β, and b2ρ (X; c) only depends on β through δ(X).
The following result gives a regularized and high-dimensional extension of some lemmas in Freedman’s early work [11] on RB for least squares. The result does not require any structural conditions
on the design matrix, or on the true parameter β.
Theorem 1 (consistency criterion). Suppose X ∈ Rn×p is fixed. Let Fb be any estimator of F0 , and
let c ∈ Rp be any vector such that vρ = vρ (X; c) 6= 0. Then with Pε -probability 1, the following
inequality holds for every n ≥ 1, and every ρ > 0,
b2
(10)
d22 √1vρ Ψρ (F0 ; c), √1vρ Φρ (Fb ; c) ≤ σ12 d22 (F0 , Fb ) + vρρ .
√
Remarks. Observe that the normalization 1/ vρ ensures that the bound is non-trivial, since the
√
distribution Ψρ (F0 ; c)/ vρ has variance equal to 1 for all n (and hence does not become degenerate
for large n). To consider the choice of ρ, it is simple to verify that the ratio b2ρ /vρ decreases monotonically as ρ decreases. Note also that as ρ becomes small, the variance vρ becomes large, and
likewise, confidence intervals based on Φρ (Fb; c) become wider. In other words, there is a trade-off
between the width of the confidence interval and the size of the bound (10).
Sufficient conditions for consistency of RB. An important practical aspect of Theorem 1 is that
for any given contrast c, the variance vρ (X; c) can be easily estimated, since it only requires an
estimate of σ 2 , which can be obtained from Fb. Consequently, whenever theoretical bounds on
d22 (F0 , Fb) and b2ρ (X; c) are available, the right side of line (10) can be controlled. In this way,
Theorem 1 offers a simple route for guaranteeing that RB is consistent. In Sections 3.2 and 3.3 to
follow, we derive a bound on E[d22 (F0 , Fb)|X] in the case where Fb is chosen to be Fb̺ . Later on in
Section 3.4, we study RB consistency in the context of prediction with a Gaussian design, and there
we derive high probability bounds on both vρ (X; c) and b2ρ (X; c) where c is a particular row of X.
3.2 A link between bootstrap consistency and MSPE
If βb is an estimator of β, its mean-squared prediction error (MSPE), conditionally on X, is defined
as
mspe(βb |X) := n1 E kX(βb − β)k22
(11)
X .
The previous subsection showed that in-law approximation of contrasts is closely tied to the approximation of F0 . We now take a second step of showing that if the centered residuals of an estimator
βb are used to approximate F0 , then the quality of this approximation can be bounded naturally in
terms of mspe(βb |X). This result applies to any estimator βb computed from the observations (1).
Theorem 2. Suppose X ∈ Rn×p is fixed. Let βb be any estimator of β, and let Fb be the empirical
b Also, let Fn denote the empirical distribution of n i.i.d.
distribution of the centered residuals of β.
samples from F0 . Then for every n ≥ 1,
2
E d22 (Fb, F0 )X
≤ 2 mspe(βb |X) + 2 E[d22 (Fn , F0 )] + 2σn .
(12)
Remarks. As we will see in the next section, the MSPE of ridge regression can be bounded in a
sharp way when the design matrix is approximately low rank, and there we will analyze mspe(βb̺ |X)
for the pilot estimator. Consequently, when near low-rank structure is available, the only remaining
issue in controlling the right side of line (12) is to bound the quantity E[d22 (Fn , F0 )|X]. The very
recent work of Bobkov and Ledoux [15] provides an in-depth study of this question, and they derive
a variety bounds under different tail conditions on F0 . We summarize one of their results below.
Lemma 1 (Bobkov and Ledoux, 2014). If F0 has a finite fourth moment, then
E[d22 (Fn , F0 )] . log(n)n−1/2 .
5
(13)
Remarks. The fact that the squared distance is bounded at the rate of log(n)n−1/2 is an indication that d2 is a rather strong metric on distributions. For a detailed discussion of this result, see
Corollaries 7.17 and 7.18 in the paper [15]. Although it is possible to obtain faster rates when more
b
stringent tail conditions are placed on F0 , we will only need a fourth moment, since the mspe(β|X)
term in Theorem 2 will often have a slower rate than log(n)n−1/2 , as discussed in the next section.
3.3 Consistency of ridge regression in MSPE for near low rank designs
In this subsection, we show that when the tuning parameter ̺ is set at a suitable rate, the pilot ridge
estimator βb̺ is consistent in MSPE when the design matrix is near low-rank — even when p/n is
large, and without any sparsity constraints on β. We now state some assumptions.
A1. There is a number ν > 0, and absolute constants κ1 , κ2 > 0, such that
b ≤ κ2 i−ν
κ1 i−ν ≤ λi (Σ)
for all i = 1, . . . , n ∧ p.
A2. There are absolute constants θ, γ > 0, such that for every n ≥ 1,
̺
n
= n−θ and
ρ
n
= n−γ .
A3. The vector β ∈ Rp satisfies kβk2 . 1.
Due to Theorem 2, the following bound shows that the residuals of βb̺ may be used to extract a
consistent approximation to F0 . Two other notable features of the bound are that it is non-asymptotic
and dimension-free.
Theorem 3. Suppose that X ∈ Rn×p is fixed and that Assumptions 1–3 hold, with p/n ≍ 1. Assume
1
ν
1
further that θ is chosen as θ = 2ν
3 when ν ∈ (0, 2 ), and θ = ν+1 when ν > 2 . Then,
(
2ν
if ν ∈ (0, 21 ),
n− 3
ν
(14)
mspe(βb̺ |X) .
− ν+1
n
if ν > 12 .
Also, both bounds in (14) are tight in the sense that β can be chosen so that βb̺ attains either rate.
b are observable, they may be used to estimate ν and guide
Remarks. Since the eigenvalues λi (Σ)
the selection of ̺/n = n−θ . However, from a practical point of view, we found it easier to select ̺
via cross-validation in numerical experiments, rather than via an estimate of ν.
A link with Pinsker’s Theorem. In the particular case when F0 is a centered Gaussian distribution, the “prediction problem” of estimating Xβ is very similar to estimating the mean parameters of
a Gaussian sequence model, with error measured in the ℓ2 norm. In the alternative sequence-model
format, the decay condition on the eigenvalues of n1 X ⊤ X translates into an ellipsoid constraint on
the mean parameter sequence [16, 17]. For this reason, Theorem 3 may be viewed as “regression
version” of ℓ2 error bounds for the sequence model under an ellipsoid constraint (cf. Pinsker’s Theorem, [16, 17]). Due to the fact that the latter problem has a very well developed literature, there
may be various “neighboring results” elsewhere. Nevertheless, we could not find a direct reference
for our stated MSPE bound in the current setup. For the purposes of our work in this paper, the more
important point to take away from Theorem 3 is that it can be coupled with Theorem 2 for proving
consistency of RB.
3.4 Confidence intervals for mean responses, conditionally on a Gaussian design
In this section, we consider the situation where the design matrix X has rows Xi⊤ ∈ Rp drawn
i.i.d. from a multivariate normal distribution N (0, Σ), with X ⊥
⊥ ε. (The covariance matrix Σ may
vary with n.) Conditionally on a realization of X, we analyze the RB approximation of the laws
Ψρ (F0 ; Xi ) = L(Xi⊤ (βbρ − β)|X). As discussed in Section 1, this corresponds to the problem of
setting confidence intervals for the mean responses E[Yi ] = Xi⊤ β. Assuming that the population
eigenvalues λi (Σ) obey a decay condition, we show below in Theorem 4 that RB succeeds with high
PX -probability. Moreover, this consistency statement holds for all of the laws Ψρ (F0 ; Xi ) simultaneously. That is, among the n distinct laws Ψρ (F0 ; Xi ), i = 1, . . . , n, even the worst bootstrap
approximation is still consistent. We now state some population-level assumptions.
6
A4. The operator norm of Σ ∈ Rp×p satisfies kΣkop . 1.
Next, we impose a decay condition on the eigenvalues of Σ. This condition also ensures that Σ is
invertible for each fixed p — even though the bottom eigenvalue may become arbitrarily small as p
becomes large. It is important to notice that we now use η for the decay exponent of the population
eigenvalues, whereas we used ν when describing the sample eigenvalues in the previous section.
A5. There is a number η > 0, and absolute constants k1 , k2 > 0, such that for all i = 1, . . . , p,
k1 i−η ≤ λi (Σ) ≤ k2 i−η .
A6. There are absolute constants k3 , k4 ∈ (0, 1) such that for all n ≥ 3, we have the bounds
k3 ≤ np ≤ k4 and p ≤ n − 2.
The following lemma collects most of the effort needed in proving our final result in Theorem 4.
Here it is also helpful to recall the notation ρ/n = n−γ and ̺/n = n−θ from Assumption 2.
Lemma 2. Suppose that the matrix X ∈ Rn×p has rows Xi⊤ drawn i.i.d. from N (0, Σ), and that
Assumptions 2–6 hold. Furthermore, assume that γ chosen so that 0 < γ < min{η, 1}. Then, the
statements below are true.
(i) (bias inequality)
Fix any τ > 0. Then, there is an absolute constant κ0 > 0, such that for all large n, the following
event holds with PX -probability at least 1 − n−τ − ne−n/16 ,
max b2ρ (X; Xi ) ≤ κ0 · n−γ · (τ + 1) log(n + 2).
1≤i≤n
(15)
(ii) (variance inequality)
There are absolute constants κ1 , κ2 > 0 such that for all large n, the following event holds with
γ
PX -probability at least 1 − 4n exp(−κ1 n η ),
1
max
1≤i≤n vρ (X;Xi )
γ
≤ κ2 n1− η .
(16)
(iii) (mspe inequalities)
η
when
Suppose that θ is chosen as θ = 2η/3 when η ∈ (0, 21 ), and that θ is chosen as θ = 1+η
1
η > 2 . Then, there are absolute constants κ3 , κ4 , κ5 , κ6 > 0 such that for all large n,
(
2η
with PX -probability at least 1 − exp(−κ3 n2−4η/3 ), if η ∈ (0, 21 )
κ4 n− 3
η
mspe(βb̺ |X) ≤
2
− η+1
κ6 n
with PX -probability at least 1 − exp(−κ5 n 1+η ),
if η > 21 .
Remarks. Note that the two rates in part (iii) coincide as η approaches 1/2. At a conceptual level,
the entire lemma may be explained in relatively simple terms. Viewing the quantities mspe(βb̺ |X),
b2ρ (X; Xi ) and vρ (X; Xi ) as functionals of a Gaussian matrix, the proof involves deriving concentration bounds for each of them. Indeed, this is plausible given that these quantities are smooth
functionals of X. However, the difficulty of the proof arises from the fact that they are also highly
non-linear functionals of X.
We now combine Lemmas 1 and 2 with Theorems 1 and 2 to show that all of the laws Ψρ (F0 ; Xi )
can be simultaneously approximated via our two-stage RB method.
Theorem 4. Suppose that F0 has a finite fourth moment, Assumptions 2–6 hold, and γ is chosen
η
so that 1+η
< γ < min{η, 1}. Also suppose that θ is chosen as θ = 2η/3 when η ∈ (0, 12 ), and
η
when η > 12 . Then, there is a sequence of positive numbers δn with limn→∞ δn = 0, such
θ = η+1
that the event
h
i
E max d22 √1vρ Ψρ (F0 ; Xi ), √1vρ Φρ (Fb̺ ; Xi )
(17)
X ≤ δn
1≤i≤n
has PX -probability tending to 1 as n → ∞.
Remark. Lemma 2 gives explicit bounds on the numbers δn , as well as the probabilities of the
corresponding events, but we have stated the result in this way for the sake of readability.
7
4 Simulations
In four different settings of n, p, and the decay parameter η, we compared the nominal 90% confidence intervals (CIs) of four methods: “oracle”, “ridge”, “normal”, and “OLS”, to be described
below. In each setting, we generated N1 := 100 random designs X with i.i.d. rows drawn from
N (0, Σ), where λj (Σ) = j −η , j = 1, . . . , p, and the eigenvectors of Σ were drawn randomly by
setting them to be the Q factor in a QR decomposition of a standard p × p Gaussian matrix. Then,
for each realization of X, we generated N2 := 1000 realizations of Y according to the model (1),
where β = 1/k1k2 ∈ Rp , and F0 is the centered t distribution on 5 degrees of freedom, rescaled to
have standard deviation σ = 0.1. For each X, and each corresponding Y , we considered the problem of setting a 90% CI for the mean response value Xi⊤⋆ β, where Xi⊤⋆ is the row with the highest
leverage score, i.e. i⋆ = argmax1≤i≤n Hii and H := X(X ⊤ X)−1 X ⊤ . This problem was shown in
B&F 1983 to be a case where the standard RB method based on least-squares fails when p/n ≍ 1.
Below, we refer to this method as “OLS”.
To describe the other three methods, “ridge” refers to the interval [Xi⊤⋆ βbρ − qb0.95 , Xi⊤⋆ βbρ − qb0.05 ],
where qbα is the α% quantile of the numbers z1 , . . . , zB computed in the proposed algorithm in
Section 2, with B = 1000 and c⊤ = Xi⊤⋆ . To choose the parameters ρ and ̺ for a given X and Y ,
we first computed rb as the value that optimized the MSPE error of a ridge estimator βbr with respect
to 5-fold cross validation; i.e. cross validation was performed for every distinct pair (X, Y ). We then
put ̺ = 5b
r and ρ = 0.1b
r, as we found the prefactors 5 and 0.1 to work adequately across various
settings. (Optimizing ̺ with respect to MSPE is motivated by Theorems 1, 2, and 3. Also, choosing ρ
to be somewhat smaller than ̺ conforms with the constraints on θ and γ in Theorem 4.) The method
“normal” refers to the CI based on the normal approximation L(Xi⊤⋆ (βbρ −β)|X) ≈ N (0, τb2 ), where
r, and σ
b2 is the usual unbiased estimate of σ 2 based
τb2 = σ
b2 kXi⊤⋆ (X ⊤ X +ρIp×p )−1 X ⊤ k22 , ρ = 0.1b
on OLS residuals. The “oracle” method refers to the interval [Xi⊤⋆ βbρ − q̃0.95 , Xi⊤⋆ βbρ − q̃0.05 ], with
ρ = 0.1b
r, and q̃α being the empirical α% quantile of Xi⊤ (βbρ − β) over all 1000 realizations of Y
based on a given X. (This accounts for the randomness in ρ = 0.1b
r.)
Within a given setting of the triplet (n, p, η), we refer to the “coverage” of a method as the fraction of
the N1 ×N2 = 105 instances where the method’s CI contained the parameter Xi⊤⋆ β. Also, we refer to
“width” as the average width of a method’s intervals over all of the 105 instances. The four settings of
(n, p, η) correspond to moderate/high dimension and moderate/fast decay of the eigenvalues λi (Σ).
Even in the moderate case of p/n = 0.45, the results show that the OLS intervals are too narrow
and have coverage noticeably less than 90%. As expected, this effect becomes more pronounced
when p/n = 0.95. The ridge and normal intervals perform reasonably well across settings, with
both performing much better than OLS. However, it should be emphasized that our study of RB
is motivated by the desire to gain insight into the behavior of the bootstrap in high dimensions
— rather than trying to outperform particular methods. In future work, we plan to investigate the
relative merits of the ridge and normal intervals in greater detail.
Table 1: Comparison of nominal 90% confidence intervals
setting 1
n = 100, p = 45, η = 0.5
setting 2
n = 100, p = 95, η = 0.5
setting 3
n = 100, p = 45, η = 1
setting 4
n = 100, p = 95, η = 1
width
coverage
width
coverage
width
coverage
width
coverage
oracle
0.21
0.90
0.22
0.90
0.20
0.90
0.21
0.90
ridge
0.20
0.87
0.26
0.88
0.21
0.90
0.26
0.92
normal
0.23
0.91
0.26
0.88
0.22
0.91
0.23
0.87
OLS
0.16
0.81
0.06
0.42
0.16
0.81
0.06
0.42
Acknowledgements. MEL thanks Prof. Peter J. Bickel for many helpful discussions, and gratefully acknowledges the DOE CSGF under grant DE-FG02-97ER25308, as well as the NSF-GRFP.
8
A
Proof of Theorem 1
Proof. Due to line (4) and Lemma 8.8 in B&F 1981,
d22 (Ψρ (F0 ; c), Φρ (Fb ; c)) = d22 Φρ (F0 ; c), Φρ (Fb ; c) + (c⊤ δ(X))2 .
(18)
If ε∗ ∈ Rn is a random vector whose entries are drawn i.i.d. from Fb , then the definition of Φρ gives
the matching relations
Φρ (F0 ; c) = L(c⊤ (X ⊤ X + ρ)−1 X ⊤ ε
X)
(19)
⊤
⊤
−1
⊤
∗
Φρ (Fb; c) = L(c (X X + ρ) X ε
X).
To make use of these relations, we apply Lemma 8.9 in B&F 1981, which implies that if w ∈ Rn is
a generic deterministic vector, and if U = (U1 , . . . , Un ) and V = (V1 , . . . , Vn ) are random vectors
with i.i.d. entries, then
d22 (w⊤ U, w⊤ V ) ≤ kwk22 · d2 (U1 , V1 )2 .
Therefore,
d22 Φρ (F0 ), Φρ (Fb) ≤ kc⊤ (X ⊤ X + ρ)−1 X ⊤ k22 · d22 (ε1 , ε∗1 )
=
1
σ2
(20)
· vρ (X; c) · d22 (F0 , Fb ).
Combining this with line (18) and dividing through by vρ proves the claim.
B Proof of Theorem 2
Proof. By the triangle inequality,
d22 (Fb , F0 ) ≤ 2 d22 (Fb, Fn ) + 2 d22 (Fn , F0 ).
(21)
b which places mass 1/n at
Let F̃n be the (uncentered) empirical distribution of the residuals eb of β,
each value ebi , for i = 1, . . . , n. The proofs of Lemmas 2.1 and 2.2 in Freedman 1981, show that
Pn
2
E d2 (Fb, Fn )2
+ E d2 (F̃n , Fn )2
X ≤ E n1 i=1 εi
X
(22)
≤ n1 σ 2 + n1 E kb
e − εk22
X
b 2
= n1 σ 2 + n1 E kX(β − β)k
2 X ,
b which holds for any estimator β.
b This
where we have used the algebraic identity eb − ε = X(β − β),
completes the proof.
C
Proof of Theorem 3
Proof. We begin with a simple bias-variance decomposition,
i
h
2
X
+
mspe(βb̺ |X) = n1 E X βb̺ − E βb̺ |X
2
1
n
X(E βb̺ |X − β)
2
.
2
(23)
We will handle the bias and variance terms separately. To consider the bias term, note that E[βbρ |X]−
β = Bβ, where
B = (X ⊤ X + ̺Ip×p )−1 X ⊤ X − Ip×p .
Hence,
1
b
n kX(E[β̺ |X]
− β)k22 =
1
2
n kXBβk2
= β ⊤ B( n1 X ⊤ X)Bβ.
9
(24)
If we let li = λi ( n1 X ⊤ X), then the eigenvalues of B( n1 X ⊤ X)B are of the form µi :=
In particular, it is simple to check1 that maxi µi ≍ ̺/n whenever θ ≤ ν, and so
li (̺/n)2
(li +̺/n)2 .
β ⊤ B( n1 X ⊤ X)Bβ . n̺ kβk22 = n−θ kβk22 .
(25)
Note that this bound is tight, since it is achieved whenever β is parallel to the top eigenvector of
B( n1 X ⊤ X)B.
To consider the variance term, note that βb̺ − E[βb̺ |X] = (X ⊤ X + ̺Ip×p )−1 X ⊤ ε, and so
h
i
2
1
b̺ − E[βb̺ |X]) 2
X = 1 tr X ⊤ X X ⊤ X + ̺Ip×p −1
E
X(
β
n
n
2
2
Pn∧p
li
.
= n1 i=1 li +̺/n
It is natural to decompose the sum in terms of the index set
I(n) := {i ∈ {1, . . . , n ∧ p} : li ≥ ̺/n},
(26)
(27)
θ
ν
which satisfies |I(n)| ≍ n . We will bound the variance term in two complementary cases; either
ν > 1/2 or ν ≤ 1/2. First assume ν > 1/2. Then,
1
n
p
X
i=1
2
li
li +̺/n
=
1
n
X
i∈I(n)
.
1
n
2
li
li +̺/n
|I(n)| +
1
n
Z
+
n∧p
|I(n)|
1
n
X
i6∈I(n)
2
li
li +̺/n
(28)
x−2ν
(̺/n)2 dx
(29)
θ
using ν >
. n−1 n ν + n2θ · (|I(n)|)1−2ν
θ
θ
≍ n−1 n ν + n2θ · (n ν )(1−2ν)
1
2
(30)
(31)
θ−ν
ν
= 2n
.
(32)
To see that this upper bound is tight, note that in line (28), we can use the term-wise lower bounds
( 1
if i ∈ I(n)
2
4
li
(33)
≥
l2i
1
li +̺/n
if i 6∈ I(n),
4 (̺/n)2
and then apply an integral approximation from below (which leads to the same rate). Combining the
bias and variance pieces, we have shown that
θ−ν
1
if ν > 1 .
EkX(βb̺ − β)k2 . n ν + n−θ
2
n
2
The bound is optimized when the two terms on the right side have the same rate, which leads to the
ν
.
choice θ = ν+1
In the case where ν ∈ (0, 21 ), the calculation proceeds in the same way up to line (30), where we
obtain the bound
n∧p
θ
X
2
li
1
. n−1 n ν + n2θ · n1−2ν
(34)
n
li +̺/n
i=1
θ−ν
(35)
= n ν + n2(θ−ν) .
This bound is also tight due to the same reasoning as above. Note that in order for the bound to tend
to 0 as n → ∞, we must choose θ < ν. Furthermore, since we are working under the assumption
ν ∈ (0, 12 ), it follows that the right side of line (35) has rate equal to n2(θ−ν) . Combining the rates
for the bias and variance shows that
1
2
2(θ−ν)
b
+ n−θ
if ν ∈ (0, 21 ).
n EkX(β̺ − β)k2 . n
The bound is optimized when the two terms on the right side have the same rate, which leads to the
choice θ = 2ν
3 .
2
t(̺/n)
Note that if t ∈ R and f (t) := (t+̺/n)
2 , then f is maximized at t = ̺/n. Also, if θ ≤ ν, then there at
least one li that scales at the rate of ̺/n.
1
10
D
Proof of Lemma 2
The proof is split up into three pieces, corresponding to parts (i), (ii), and (iii) in the statement of the
result.
D.1
The bias inequality (15)
We prove inequality (15) by combining Lemmas 3 and 5 below.
Lemma 3. Assume the conditions of Lemma 2. For each i ∈ {1, . . . , n}, there are independent
random vectors ui (X), w(X) ∈ Rp such that the random variable Xi⊤ δ(X) can be represented
algebraically as
bρ (X; Xi ) = Xi⊤ δ(X) = ui (X)⊤ w(X).
Here, the vectors ui (X) can be represented in law as
L
ui (X) =
1
kzk2 Πp (z),
(36)
where z ∈ Rn is a standard Gaussian vector, and Πp (z) := (z1 , . . . , zp ). Also, the vector w(X)
satisfies the bound kw(X)k22 ≤ ρ4 kβk22 almost surely.
Proof. To fix notation, we write X ⊤ = Σ1/2 Z ⊤ where Z ⊤ ∈ Rp×n is a standard Gaussian matrix.
Recall that δ(X) = Bβ, where
B = Ip×p − (X ⊤ X + ρIp×p )−1 X ⊤ X.
Let Z = HLG⊤ be a “signed s.v.d.” for Z, as defined in Appendix E.2, where H ∈ Rn×p , L ∈
Rp×p , and G ∈ Rp×p . Now define ui (X) and w(X) according to
⊤
1/2
Xi⊤ δ(X) = e⊤
Bβ =
i XBβ = ei ZΣ
e⊤
H LG⊤ Σ1/2 Bβ .
{z
}
|i{z } |
=: ui (X)⊤ =: w(X)
From Lemma 17 in Appendix E.2, the rows e⊤
i H can be represented in distribution as
The same lemma also shows that the three matrices H, L, and G are independent.
(37)
1
kzk2 Πp (z).
Hence, to show that ui (X) and w(X) are independent, it suffices to show that w(X) is a function
only of G and L. In turn, it is enough to show that B is a function only of G and L. But this is
simple, because B is a function only of the matrix X ⊤ X, which may be written as
X ⊤ X = Σ1/2 Z ⊤ ZΣ1/2 = Σ1/2 GL2 G⊤ Σ1/2 .
(38)
It remains to show that kw(X)k22 ≤ ρ4 kβk22 almost surely. Combining the definition of w(X) with
line (38) gives
(39)
kw(X)k22 = β ⊤ BX ⊤ XB β.
2
li
1
⊤
The eigenvalues of BX ⊤ XB are of the form µi := n (l(ρ/n)
2 where li = λi ( n X X), and it is
i +ρ/n)
ρ
simple to check that the inequality maxi µi ≤ 4 holds for every realization of X.
Before proceeding to the second portion of the proof of inequality (15), we record some well-known
tail bounds for Gaussian quadratic forms due to Laurent and Massart [18], which will be useful at
various points later on.
Lemma 4 (Laurent & Massart, 2001). Let A ∈ Rn×n be a fixed symmetric matrix, and let z ∈ Rn
be a standard Gaussian vector. Then, for every t > 0,
h
i
√
P z ⊤ Az ≥ tr(A) + 2 |||A|||F t + 2 |||A|||op t ≤ exp(−t)
(40)
and
h
√i
P z ⊤ Az ≤ tr(A) − 2 |||A|||F t ≤ exp(−t).
11
(41)
The next lemma completes the proof of inequality (15).
Lemma 5. Assume the conditions of Lemma 2, and let τ > 0 be a constant. Then for every n ≥ 1,
the following event holds with probability at least 1 − n−τ − ne−n/16 ,
max b2ρ (X; Xi ) ≤ 5kβk22 · n−γ · (τ + 1) log(n + 2).
1≤i≤n
(42)
Proof. Applying the representation for bρ (X; Xi ) given in Lemma 3, there is a standard Gaussian
L
vector z ∈ Rn , such that ui (X) = Πp (z)/kzk2. Consequently,
L
1
⊤
b2ρ (X; Xi ) = kzk
Πp (z),
2 · Πp (z) w(X)w(X)
(43)
The same lemma also implies that for all t′ ∈ (0, 14 ),
i
h
1
1
√
≤ exp(−nt′ ).
P kzk
2 ≥
(1−2 t′ )n
(45)
2
where we may take z and w(X) to be independent by the same lemma. Using Lemma 4 on Gaussian
quadratic forms, as well as the fact that kw(X)k22 ≤ ρ4 kβk22 almost surely, we have for all t > 0,
"
#
√
ρ
⊤
⊤
2
P Πp (z) w(X)w(X) Πp (z) ≥ 4 kβk2 1 + 2 t + 2t)
w(X) ≤ exp(−t).
(44)
2
Now, we combine the bounds by integrating out w(X) in line (44) and choosing t′ = 1/16 in
line (45). Taking a union bound, we conclude that for any t > 0, and any fixed i = 1, . . . , n,
"
#
√
ρ
2
2 1
P bρ (X; Xi ) ≤ n · kβk2 · 2 1 + 2 t + 2t ≥ 1 − e−t − e−n/16 .
(46)
Finally, another union bound shows that the maximum of the bρ (X, Xi⊤ ) satisfies
P
"
max
1≤i≤n
b2ρ (X; Xi )
≤
ρ
n
·
kβk22
·
1
2 (1
#
√
+ 2 t + 2t) ≥ 1 − e−t+log(n) − ne−n/16 ,
(47)
which implies the
√stated result after choosing t = (τ + 1) log(n + 2), and noting that since t ≥ 1,
we have 21 (1 + 2 t + 2t) ≤ 5t = 5(τ + 1) log(n + 2), as well as e−t+log(n) ≤ e−τ log(n+2) ≤ n−τ
for every n ≥ 1.
D.2
The variance inequality (16)
The following “representation lemma” will serve as the basis for controlling the variance
vρ (X; Xi ) = σ 2 kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 .
Lemma 6. Assume the conditions of Lemma 2. For each i ∈ {1, . . . , n}, there is a random vector
vi (X) ∈ Rp and a random matrix M (X) ∈ Rp×p that are independent and satisfy the algebraic
relation
kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 = vi (X)⊤ M (X)vi (X).
Here, the vector vi (X) can be represented in law as
L
vi (X) =
1
kzk2 Πp (z),
(48)
where z ∈ Rn is a standard Gaussian vector and Πp (z) = (z1 , . . . , zp ). Also, the matrix M (X)
satisfies the algebraic relation
tr(M (X)) = kX(X ⊤X + ρIp×p )−1 X ⊤ k2F .
An explicit formula for M (X) is given below.
12
(49)
Proof. Define the matrix A := (X ⊤ X + ρIp×p )−1 X ⊤ X(X ⊤X + ρIp×p )−1 . Then,
⊤
kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 = e⊤
i XAX ei .
(50)
Using the notation in the proof of the previous lemma, let X = ZΣ1/2 where Z ∈ Rn×p is a
standard Gaussian random matrix. Furthermore, let Z = HLG⊤ be a signed s.v.d. for Z, as defined
in Appendix E.2. Then, we define vi (X) and M (X) according to
⊤
⊤
e⊤
LG⊤ Σ1/2{z
AΣ1/2 GL⊤} H ⊤ ei .
i XAX ei = ei H |
| {z }
(51)
=:M(X)
=:vi (X)⊤
Some algebra shows that M (X) satisfies the relation (49). As in the proof of Lemma 3, the argument
is completed using two properties of the signed s.v.d. of a standard Gaussian matrix: The rows of H
can be represented as Πp (z)/kzk2 where z ∈ Rn is a standard Gaussian vector, and the matrices H,
L, and G⊤ are independent. (See Lemma 17 in Appendix E.2.) To show that vi (X) and M (X) are
independent, first note that vi (X) only depends on H. Also, it is simple to check that M (X) only
depends on G and L, because A is a function only of X ⊤ X = Σ1/2 GL2 G⊤ Σ1/2 .
D.2.1 Concentration of the variance and bounds on its expected value
Due to Lemma 6, for each i = 1, . . . , n, we have the representation
L
vρ (X; Xi ) =
1
Π (z)⊤ M (X)Πp (z),
kzk22 p
(52)
where z ∈ Rn is a standard Gaussian vector, independent of M (X). Conditionally on M (X),
the quadratic form Πp (z)⊤ M (X)Πp (z) concentrates around tr(M (X)) by Lemma 4. The same
2
lemma
p also implies that kzk2 concentrates around n. In the next three subsections, we will show
that tr(M (X)) concentrates around its expected value, and obtain upper and lower bounds on the
expected value. We will need two-sided bounds in preparation for Theorem 4.
D.2.2 Concentration of
p
tr(M (X))
Lemma 7. Assume the conditions of Lemma 2. Then for every t > 0, and every n ≥ 1,
#
"
p
p
64 n1−γ t2
tr(M (X)) − E tr(M (X)) ≥ t ≤ 2 exp(− 54
P
kΣkop ).
(53)
p
Proof. We will show that tr(M (X)) is a Lipschitz function of a standard Gaussian matrix. Define
s2
, which satisfies the Lipschitz condition
the function gρ : R+ → [0, 1] by gρ (s) = s2 +(ρ/n)
|gρ (s) − gρ (s′ )| ≤ Ln |s − s′ |,
for all s, s′ ≥ 0, where Ln :=
√
3 3
8
√1 .
ρ/n
If σ(A) = (σ1 (A), . . . , σk (A)) denotes the vector of singular values of a rank k matrix A, then we
define gρ to act on σ(A) component-wise, i.e. gρ (σ(A)) = (gρ (σ1 (A)), . . . , gρ (σk (A))). Recall
from Lemma 6 that
p
(54)
tr(M (X)) = kX(X ⊤X + ρIp×p )−1 X ⊤ kF
and note that the ith singular value of the matrix X(X ⊤ X +ρIp×p )−1 X ⊤ is given by gρ (σi ( √1n X)).
Viewing the Frobenius norm of a matrix as the ℓ2 norm of its singular values, we have
p
tr(M (X)) = kgρ (σ( √1n X))k2 .
(55)
Write X ⊤ = Σ1/2 Z ⊤ for a standard Gaussian matrix Z ∈ Rn×p , and let f : Rn×p → R be defined
according to
p
f (Z) := tr(M (X)).
13
We claim that f is Lipschitz with respect to the Frobenius norm. Let W ⊤ ∈ Rp×n be a generic
matrix, and put A = √1n Σ1/2 Z ⊤ and B = √1n Σ1/2 W ⊤ . Then,
|f (Z) − f (W )| = kgρ (σ(A))k2 − kgρ (σ(B))k2
≤ gρ (σ(A)) − gρ (σ(B))
(56)
(57)
2
≤ Ln kσ(A) − σ(B)k2
(58)
≤ Ln kA − BkF
(59)
√1 Σ1/2
n
= Ln
≤
Ln
√
n
(Weilandt-Hoffman)
Z⊤ − W ⊤ F
p
kΣkop · Z ⊤ − W ⊤
F
,
(60)
(61)
where we have used a version of the Weilandt-Hoffman inequality for singular values [19, p.186],
as well as the inequality kM1 M2 kF ≤ kM1 kop kM2 kF , which holds for any square matrix M1 that
is compatible with M2 . (See Lemma 12 in Appendix E.) The statement of the lemma now follows
from the Gaussian concentration inequality. (See Lemma 15 in Appendix E).
p
D.2.3 Upper bound on E tr(M (X))
Lemma 8. Assume the conditions of Lemma 2. Then, the matrix M (X) satisfies
(
1
p
n(γ−η)+ 2 if η ∈ (0, 21 )
γ
E tr(M (X)) .
if η > 21 .
n 2η
(62)
p
Proof. By Jensen’s inequality, it is enough to bound E[tr(M (X))] from above. Define the unis
variate function ψ : R+ → R+ by ψ(s) := (√s+ρ/n)
2 , and observe that
2
tr(M (X)) = tr (X ⊤ X + ρIp×p )−1 X ⊤ X
=
p
X
b
λ2i (Σ)
2
b
(λi (Σ)+ρ/n)
i=1
b 2 ))
ψ(λi (Σ
i=1
=
p
X
(63)
b 2) .
= tr ψ(Σ
Here where we use the “operator calculus” notation ψ(A) = U ψ(D)U ⊤ where A is a symmetric
matrix with spectral decomposition A = U DU ⊤ , and ψ(D) is the diagonal matrix whose ith diagb 2 )) is a concave matrix
onal entry is ψ(Dii ). It is simple to check that ψ is a concave, and so tr(ψ(Σ
2
b
functional of Σ by Lemma 13 in Section E.1 of Appendix A. Therefore, Jensen’s inequality implies
b 2 ]))
E[tr(M (X))] ≤ tr(ψ(E[Σ
(64)
P
= pi=1 ψ(λi (S)),
b 2 ]. Since X is Gaussian, Σ
b is a Wishart matrix up to scaling,
where we define the matrix S := E[Σ
and so Lemma 16 in Appendix E shows that this expectation may be evaluated exactly as
S = (1 + n1 )Σ2 +
tr(Σ)
n Σ.
(65)
We will now use this relation to apply an integral approximation to the right side of line (64). Clearly,
the eigenvalues of S are given by
λi (S) = (1 + n1 )λ2i (Σ) +
≍ i−2η +
tr(Σ) −η
.
n i
14
tr(Σ)
n λi (Σ)
(66)
Let r ∈ (0, 1) be a constant to be specified later. On the set of indices 1 ≤ i ≤ ⌈nr ⌉ we use the bound
1
ψ(λi (S)) ≤ 1, and on the set of indices i > ⌈nr ⌉ we use the bound ψ(λi (S)) ≤ (ρ/n)
2 λi (S).
−γ
2
Recalling the assumption ρ/n = n , we may decompose the inequality (64) as
E[tr(M (X))] ≤
⌈nr ⌉
X
ψ(λi (S)) +
i=1
. nr + n2γ
Z
p
X
ψ(λi (S))
(67)
i=⌈nr ⌉+1
p
x−2η +
nr
=: nr + n2γ hn (η, r).
tr(Σ) −η
dx
n x
(68)
(69)
where the function hn is defined in the last line. The bound is optimized when the two terms on the
right are of the same order; i.e. when r solves the rate equation
nr ≍ n2γ hn (η, r).
Noting that
tr(Σ)
n
≍
−η
n
n−1
(70)
if η ∈ (0, 1)
if η > 1,
the quantity hn (η, r) may be computed directly as
1−2η
n
hn (η, r) ≍ nr(1−2η)
r(1−2η)
n
+ nr(1−η)−1
if η ∈ (0, 12 ),
if η ∈ ( 12 , 1),
if η > 1.
(71)
(72)
If we let r = r∗ (η, γ) denote the solution of the rate equation (70), then some calculation shows that
under the assumption γ ∈ (0, 1),
(
2(γ − η) + 1 if η ∈ (0, 12 ),
(73)
r∗ (η, γ) = γ
if η > 21 .
η
When η ∈ (0, 1) this is straightforward. To show the details for η > 1, note that the rate equation (70) may be written as
nr ≍ n2γ+r(1−2η) + n2γ+r(1−η)−1 ,
(74)
which is the same as
1 ≍ n2(γ−ηr) + n2γ−ηr−1 .
In order for both terms on the right to be O(1), the number r must satisfy the constraints
r ≥ γη ,
r≥
γ
η
+
(75)
(76)
γ−1
η .
(77)
Since Lemma 2 assumes γ ∈ (0, 1), only the first constraint matters. Furthermore, when r ≥ γη ,
the second term in line (75) is o(1), and we are reduced to choosing r so that 1 ≍ n2(γ−ηr) , which
gives r = r∗ (η, γ) = γη . Substituting this value into line (69) completes the proof. (Note from the
discussion preceding line (69) that r must lie in the interval (0, 1), and this requires γ/η < 1, which
explains the assumption γ < min{η, 1} in Lemma 2.)
p
D.2.4 Lower bound on E tr(M (X))
Lemma 9. Assume the conditions of Lemma 2. Then, the matrix M (X) satisfies
p
γ
E tr(M (X)) & n 2η .
(78)
2
Note that if p/n ≍ 1, it is possible that nr > p for small values of n. Since we want nr ≤ p for the
integral in line (68), Lemma 2 is stated for “all large n”.
15
p
Proof. The variable tr(M (X)) may be written as kX ⊤X(X ⊤ X +ρIp×p )−1 kF . Since the Frobenius norm is a convex matrix functional, Jensen’s inequality implies
i
h
p
E tr(M (X)) ≥ E X ⊤ X(X ⊤ X + ρIp×p )−1
F
(79)
i
h
b −1 −1
,
= E Ip×p + nρ Σ
F
b :=
where the last step follows algebraically with Σ
If we define the univariate function
f : R+ → R+ by f (s) = (1 + nρ s)−1 , then last inequality is the same as
p
b −1
.
(80)
E tr(M (X)) ≥ E f Σ
F
1
⊤
n X X.
It is a basic fact that f is operator convex on the domain of positive semidefinite matrices [20,
p.117]. This yields an operator version of Jensen’s inequality with respect to the Loewner ordering
(Lemma 14 in Appendix E):
−1
b
b −1 f E Σ
.
(81)
E f Σ
Furthermore, if two matrices satisfy A B 0, then kAkF ≥ kBkF [21, Corollary 7.7.4]. Using
this fact, as well as the formula for the expected inverse of a Wishart matrix [22, p. 97], we obtain
p
−1
b
E tr(M (X)) ≥ f E Σ
F
= f
=
n
−1
n−p−1 Σ
p
X
i=1
=
p
X
i=1
1+
ρ
n
·
F
1
n
−1 ) 2
n−p−1 λi (Σ
λ2i (Σ)
λi (Σ) +
ρ
n
·
2
n
n−p−1
!1/2
!1/2
(82)
.
n
. For any i ∈ J, the ith summand in
Define the index set J = i ∈ {1, . . . , p} : λi (Σ) ≥ nρ n−p−1
the previous line is at least 1/4. Also, assumption A6 that p/n is bounded strictly between 0 and 1,
as well as the decay condition on the λi (Σ), imply that |J| ≍ nγ/η , which completes the proof.
D.2.5 Putting the variance pieces together
Combining Lemmas 7, 8, and 9 with the Gaussian concentration inequality (Lemma 15 in Section E.2 of Appendix A) p
immediately gives the following result. (We choose t to be proportional to
the relevant bound on E[ tr(M (X))] in the Gaussian concentration inequality.)
Lemma 10. Assume the conditions of Lemma 2 and let tr(M (X)) be as in line (49). Then, there are
absolute constants κ1 , κ2 , . . . , κ6 > 0 such that the following upper-tail bounds hold for all large
n,
i
h
(83)
P tr(M (X)) ≥ κ1 n2(γ−η)+1 ≤ exp(−κ2 n2(1−η)+γ ), if η ∈ (0, 21 ),
and
i
h
γ(1−η)
P tr(M (X)) ≥ κ3 nγ/η ≤ exp(−κ4 n1+ η ),
and the following lower-tail bound holds for all large n,
i
h
γ(1−η)
P tr(M (X)) ≤ κ5 nγ/η ≤ exp(−κ6 n1+ η ),
if η > 12 ,
(84)
if η > 0.
(85)
Remarks. Note that in order for the last two probabilities to be small for large values of η > 0,
it is necessary that γ < 1, as assumed in Lemma 2. The next result completes the assembly of the
results in this Subsection D.2. Although the first two bounds in Lemma 11 are not necessary for the
statement of Theorem 4, they show that the variance vρ (X; Xi ) tends 0 as n → ∞ when γ < η,
as assumed in Theorem 4. In other words, we imposed the assumption γ < η so that confidence
intervals based on Φρ (Fb̺ ; Xi ) have width that tends to 0 asymptotically.
16
Lemma 11. Assume the conditions of Theorem 4 and let tr(M (X)) be as in line (49). Assume
γ < min{η, 1}. Then, there are absolute constants k1 , k2 , . . . , k6 > 0 such that the following
upper-tail bounds hold for all large n,
i
h
γ
P max vρ (X; Xi ) ≤ k1 n2(γ−η) ≥ 1 − 4n exp(−k2 n η ), if η ∈ (0, 21 )
(86)
1≤i≤n
and
i
h
γ
γ
P max vρ (X; Xi ) ≤ k3 n η −1 ≥ 1 − 4n exp(−k4 n η ),
1≤i≤n
and
h
P max
1
1≤i≤n vρ (X;Xi )
i
γ
γ
≤ k5 n1− η ≥ 1 − 4n exp(−k6 n η ),
if η > 12 ,
(87)
if η > 0.
(88)
Proof. We only prove the last inequality (88), since the other two inequalities are proven in a similar
way. By Lemma 6, we have
L
vρ (X; Xi ) =
1
Π (z)⊤ M (X)Πp (z)
kzk22 p
(89)
where z ∼ N (0, Ip×p ) and z ⊥
⊥ M (X). To apply the lower-tail
bound for Gaussian quadratic
p
forms, note that Hölder’s inequality implies kM (X)kF ≤
tr(M (X)) since kM (X)kop ≤ 1
almost surely. Therefore, letting t = t′ tr(M (X)) with t′ ∈ (0, 1) in inequality (41) gives
i
h
√
′
(90)
P Πp (z)⊤ M (X)Πp (z) ≥ (1 − 2 t′ ) tr(M (X))
M (X) ≥ 1 − exp − t tr(M (X))
Next, observe that inequality (41) with t = t′ · n for t′ ∈ (0, 1) gives,
h
i
√
P kzk22 ≤ (1 + 4 t′ )n ≥ 1 − exp(−t′ n).
If we define the event
(91)
)
(92)
then the previous two inequalities imply
P E1
M (X) ≥ 1 − exp(−t′ tr(M (X))) − exp(−t′ · n)
(93)
E1 :=
(
1
kzk22
1
≤
Πp (z)⊤ M (X)Πp (z)
√
n
1+4√t′
(1−2 t′ ) tr(M(X))
≥ 1 − 2 exp(−t′ tr(M (X))),
since tr(M (X)) ≤ n almost surely. Next, let κ5 , κ6 > 0 be as in the previous lemma, and define
the event
o
n
γ
n
(94)
E2 := tr(M(X))
≤ κ15 n1− η ,
which has probability P(E2 ) ≥ 1 − exp(−κ6 n1+
γ(1−η)
η
).
We now put these items together. Starting with line (89), if we work on the intersection of E1 and
E2 , then for any fixed i = 1, . . . , n we have
P
h
1
vρ (X;Xi )
≤
√
1− γ
1+4√t′ 1
n η
(1−2 t′ ) κ5
i
h
i
≥ E 1E1 · 1E2
h
i
≥ 1 − E 1E1c + 1E2c
c
= 1 − E E 1E1c
M (X) − P(E2 )
h
i
≥ 1 − 2E exp(−t′ tr(M (X)) − P(E2c)
h
′
i
= 1 − 2E exp(−t tr(M (X))) · (1E2 + 1 ) −
E2c
γ
≥ 1 − exp(−t′ κ5 n η ) − 3P(E2c )
γ
1+
≥ 1 − exp(−t′ κ5 n η ) − 3 exp(−κ6 n
γ
≥ 1 − 4 exp(− min{t′ κ5 , κ6 } · n η )
17
γ(1−η)
η
)
(95)
P(E2c )
where we have used the previous lemma to bound P(E2c ), and also the assumption γ ∈ (0, 1) to
conclude that γη ≤ 1 + γ(1−η)
. Taking a union bound over i = 1, . . . , n, proves the claim.
η
The last component of Lemma 2 is to prove the MSPE inequalities.
D.3
Proof of the MSPE inequalities
The proof of Theorem (3) shows that for any realization of X we have
h
i
mspe(βb̺ |X) := n1 E kX(βb̺ − β)k22
X . n−θ kβk22 +
1
n
p∧n
X
i=1
2
li
li +̺ ,
(96)
where li = λi ( n1 X ⊤ X). Now observe that the second term on the right side matches the expression
for tr(M (X)) given in line (63) by replacing ρ with ̺ and multiplying by a factor of n1 . Therefore,
using Lemma 10 and recalling ̺/n = n−θ shows that there are absolute constants κ1 , κ2 , κ3 , κ4 > 0
such that for all large n,
and
h
i
P mspe(βb̺ |X) ≥ κ1 n−θ + n2(θ−η) ≤ exp(−κ2 n2(1−η)+θ ), if η ∈ (0, 12 ).
h
θ(1−η)
i
θ
P mspe(βb̺ |X) ≥ κ3 n−θ + n η −1 ≤ exp(−κ4 n1+ η ),
if η > 21 .
(97)
(98)
In line (97), the bound mspe(βb̺ |X) is optimized when n−θ ≍ n2(θ−η) , which explains the choice
θ
in line (98), the bound is optimized when n−θ ≍ n η −1 , which explains the
θ = 2η
3 . Similarly,
η
choice θ = η+1 . Substituting in these values θ yields the stated result.
E Background results
E.1
Results on matrices and convexity
Lemma 12. Let M1 ∈ Rk1 ×k1 and M2 ∈ Rk1 ×k2 . Then,
kM1 M2 kF ≤ kM1 kop kM2 kF .
(99)
Proof. Observe that
kM1 M2 k2F = tr(M2⊤ M1⊤ M1 M2 )
= tr((M1⊤ M1 )(M2 M2⊤ ))
≤
k1
X
i=1
λi (M1⊤ M1 ) · λi (M2 M2⊤ )
≤ kM1 k2op
k1
X
(100)
λi (M2 M2⊤ )
i=1
2
kM1 kop kM2 k2F ,
=
where we have used von Neumann’s trace inequality (also known as Fan’s inequality) [23, p.10] in
the third line.
A result on convex trace functionals. In the following lemma, an interval of the real line refers to
any set of the form (a, b),(a, b],[a, b), or [a, b], where −∞ ≤ a ≤ b ≤ ∞. We also define spec(M )
p×p
to be the set of eigenvalues of a square matrix M . The collection of symmetric
is
Pmatrices in R
p×p
denoted by S
. For a univariate function ϕ, the symbol tr(ϕ(M )) denotes i ϕ(λi (M )).
Lemma 13. Let I ⊂ R be an interval, and let M ⊂ Sp×p be a convex set such that spec(M ) ⊂ I
for all M ∈ M. Let ϕ : I → R be a convex function. Then, the functional
M 7→ tr(ϕ(M ))
(101)
is convex on M.
A proof may be found in the paper [24, Proposition 2].
18
Operator Jensen inequality. A function f : Sp×p → Sp×p is said to be operator convex if for all
λ ∈ [0, 1], and all A, B ∈ Sp×p ,
f (λA + (1 − λ)B) λf (A) + (1 − λ)f (B),
(102)
where A B means that B − A is positive semidefinite.
Lemma 14 (Operator Jensen inequality). Suppose f : Sp×p → Sp×p is operator convex, and let A
be a random Sp×p -valued matrix that is integrable. Then,
f (E[A]) E[f (A)].
(103)
Proof. It is enough to show that for all x ∈ Rp ,
x⊤ f (E[A])x ≤ x⊤ E[f (A)]x.
(104)
For any fixed x, consider the function g : Sp×p → R defined by g(A) = x⊤ f (A)x. It is clear that
g is a convex function in the usual sense, and so the ordinary version of Jensen’s inequality implies
g(E[A]) ≤ E[g(A)], which is the same as (104).
E.2
Results on Gaussian vectors and matrices
The following lemma is standard and is often referred to as the Gaussian concentration inequality [25].
Lemma 15. Let Z ∈ Rp be a standard Gaussian vector and let f : Rp → R be an L-Lipschitz
function with respect to the ℓ2 norm. Then for all t > 0,
−t2
(105)
P |f (Z) − E[f (Z)]| ≥ t ≤ 2 exp 2L
2 .
Next, we give a formula for the expected square of a Wishart matrix.
b=
Lemma 16. Let X ∈ Rn×p have rows drawn i.i.d. from N (0, Σ), and let Σ
b =
Proof. Write Σ
then
1
n
Pn
i=1
b 2 ] = (1 + 1 )Σ2 +
E[Σ
n
1
⊤
n X X.
Then,
tr(Σ)
n Σ.
Xi Xi⊤ where Xi⊤ ∈ Rp is the ith row of X. If we put Mi = Xi Xi⊤ ,
b 2 = 12 Pn M 2 + 12 P Mi Mj .
Σ
i
i6=j
i=1
n
n
Clearly, the Mi are independent with E[Mi ] = Σ for all i, and so
b 2 ] = 1 E[M 2 ] + 22 n Σ2 .
E[Σ
1
n
n 2
It remains to compute E[M12 ]. Write Xi = Σ1/2 Zi where Zi is a standard Gaussian vector in Rp ,
and let Σ1/2 = U Λ1/2 U ⊤ be a spectral decomposition of Σ1/2 where U ∈ Rp×p is orthogonal,
and Λ is diagonal with Λii = λi (Σ). By the orthogonal invariance of the normal distribution,
L
Xi = U Λ1/2 Zi , and so
h
i
E[M12 ] = E[X1 X1⊤ X1 X1⊤ ] = U Λ1/2 E Z1 Z1⊤ ΛZ1 Z1⊤ Λ1/2 U ⊤ .
(106)
Define the matrix M̃1 := Z1 Z1⊤ ΛZ1 Z1⊤ . It is straightforward to verify that E[M̃1 ] is diagonal, and
its jth diagonal entry is
E[M̃1 ]jj = tr(Σ) + 2λj .
Therefore,
E[M̃1 ] = tr(Σ)Ip×p + 2Λ,
and combining this with line (106) gives
E[M12 ] = tr(Σ)Σ + 2Σ2 .
19
Signed s.v.d. The following lemma describes the factors of an s.v.d. of a standard Gaussian matrix
Z ∈ Rn×p with n ≥ p. To make the statement of the lemma more concise, we define the term signed
s.v.d. below. This is merely a particular form of the s.v.d. that ensures uniqueness. Specifically, if
Z ∈ Rn×p is a full rank matrix with n ≥ p, then the signed s.v.d. of Z is given by
Z = HLG⊤ ,
(107)
where H ∈ Rn×p has orthonormal columns, the matrix L ∈ Rp×p is diagonal with L11 ≥ L22 ≥
· · · ≥ Lpp > 0, and G ∈ Rp×p is orthogonal with its first row non-negative, i.e. G1i ≥ 0 for all
i = 1, . . . , p. It is a basic fact from linear algebra that the signed s.v.d. of any full rank matrix in
Rn×p exists and is unique [21, Lemma 7.3.1]. This fact applies to Gaussian matrices, since they are
full rank with probability 1.
Lemma 17. Suppose n ≥ p, and let Z ∈ Rn×p be a random matrix with entries drawn i.i.d. from
N (0, 1). Let
Z = HLG⊤ ,
(108)
be the unique signed s.v.d. of Z as defined above. Then, the matrices H, L and G are independent.
Furthermore, if Hi⊤ ∈ Rp denotes the ith row of H, then for each i = 1, . . . , n, the marginal law of
Hi⊤ is given by
L
Hi⊤ =
1
kzk2
· Πp (z),
(109)
where z ∈ Rn is a standard Gaussian vector, and Πp (z) is the projection operator onto the first p
coordinates, i.e. Πp (z) = (z1 , . . . , zp ).
Proof. We first argue that H, L, and G are independent, and then derive the representation for Hi⊤
in the latter portion of the proof.
Due to the fact that the transformation Z 7→ (H, L, G) is invertible, it is possible to obtain the joint
density of (H, L, G) from the density of Z by computing the matrix Jacobian of the factorization
Z = HLG. (See the references [22], [26], and [27] for more background on Jacobians of matrix
factorizations.) To speak in more detail about the joint density, let Vn×p denote the Stiefel manifold
of n×p matrices with orthonormal columns. Also, let Dp×p denote the set of p×p diagonal matrices,
and Op×p the set of orthogonal p × p matrices. The subset of Op×p with non-negative entries in the
n×p
.
first row will be denoted by O+
Let fH,L,G : Vn×p × Dp×p × Op×p
→ [0, ∞) denote the joint density of (H, L, G), where the base
+
measure is the product of Haar measure on Vn×p , Lebesgue measure on Dp×p , and Haar measure
on Op×p restricted to Op×p
+ . (See the book [28] for background on these measures). From lines
8.8-8.10 in the paper [29], it is known that such a density exists, and that fH,L,G factors according
to
fH,L,G(h, l, g) = fH (h) · fL (l) · fG (g),
(110)
where the function fH denotes the density of H with respect to Haar measure on Vn×p , the function
fL denotes the density of L with respect to Lebesgue measure on Dp×p , and the function fG denotes
the density of G with respect to the restriction of Haar measure to Op×p
+ . This proves that H, L, and
G are independent.
We now prove the representation (109). From line 8.10 in the paper [29], it is known that fH is constant on Vn×p . In other words, the matrix H follows the Haar distribution on Vn×p . Consequently,
Theorem 2.2.1(ii) in the book [28] implies that the rows Hi⊤ can be represented as
L
Hi⊤ = Πp (Ji⊤ )
(111)
where Ji⊤ ∈ Rn is the ith row of a Haar-distributed random matrix in On×n . Furthermore, the rows
Ji⊤ are uniformly distributed on the unit sphere on Rn , and hence can be represented as z/kzk2,
where z ∈ Rn is a standard Gaussian vector.
20
References
[1] C.-H. Zhang and S. S. Zhang. Confidence intervals for low dimensional parameters in high
dimensional linear models. Journal of the Royal Statistical Society: Series B, 76(1):217–242,
2014.
[2] A. Javanmard and A. Montanari. Hypothesis testing in high-dimensional regression under the
Gaussian random design model: Asymptotic theory. arXiv preprint arXiv:1301.4240, 2013.
[3] A. Javanmard and A. Montanari. Confidence intervals and hypothesis testing for highdimensional regression. arXiv preprint arXiv:1306.3171, 2013.
[4] P. Bühlmann. Statistical significance in high-dimensional linear models.
19(4):1212–1242, 2013.
Bernoulli,
[5] S. van de Geer, P. Bühlmann, and Y. Ritov. On asymptotically optimal confidence regions and
tests for high-dimensional models. arXiv preprint arXiv:1303.0518, 2013.
[6] J. D. Lee, D. L. Sun, Y. Sun, and J. E. Taylor. Exact inference after model selection via the
lasso. arXiv preprint arXiv:1311.6238, 2013.
[7] A. Chatterjee and S. N. Lahiri. Rates of convergence of the adaptive lasso estimators to the
oracle distribution and higher order refinements by the bootstrap. The Annals of Statistics,
41(3):1232–1259, 2013.
[8] H. Liu and B. Yu. Asymptotic properties of lasso+mls and lasso+ridge in sparse highdimensional linear regression. Electronic Journal of Statistics, 7:3124–3169, 2013.
[9] V. Chernozhukov, D. Chetverikov, and K. Kato. Gaussian approximations and multiplier bootstrap for maxima of sums of high-dimensional random vectors. The Annals of Statistics,
41(6):2786–2819, 2013.
[10] E. L. Lehmann and J. P. Romano. Testing Statistical Hypotheses. Springer, 2005.
[11] D. A. Freedman. Bootstrapping regression models. The Annals of Statistics, 9(6):1218–1228,
1981.
[12] P. J. Bickel and D. A. Freedman. Bootstrapping regression models with many parameters. In
Festschrift for Erich L. Lehmann, pages 28–48. Wadsworth, 1983.
[13] N. R. Draper and H. Smith. Applied Regression Analysis. Wiley-Interscience, 1998.
[14] P. J. Bickel and D. A. Freedman. Some asymptotic theory for the bootstrap. The Annals of
Statistics, pages 1196–1217, 1981.
[15] S. Bobkov and M. Ledoux. One-dimensional empirical measures, order statistics, and Kantorovich transport distances. preprint, 2014.
[16] A. B. Tsybakov. Introduction to Nonparametric Estimation. Springer, 2009.
[17] L. Wasserman. All of Nonparametric Statistics. Springer, 2006.
[18] B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection.
Annals of Statistics, 28(5):1302–1338, 2000.
[19] R. A. Horn and C. R. Johnson. Topics in matrix analysis. Cambridge University Press, 1991.
[20] R. Bhatia. Matrix Analysis. Springer, 1997.
[21] R. A. Horn and C. A. Johnson. Matrix Analysis. Cambridge University Press, 22nd printing
edition, 2009.
[22] R. J. Muirhead. Aspects of Multivariate Statistical Theory. John Wiley & Sons, 1982.
[23] J. M. Borwein and A. S. Lewis. Convex Analysis and Nonlinear Optimization Theory and
Examples. CMS Bookks in Mathematics. Canadian Mathematical Society, 2000.
21
[24] D. Petz. A survey of certain trace inequalities. Functional analysis and operator theory,
30:287–298, 1994.
[25] S. Boucheron, G. Lugosi, and P. Massart. Concentration Inequalities: A Nonasymptotic Theory
of Independence. Oxford University Press, 2013.
[26] A. M. Mathai. Jacobians of Matrix Transformations and Functions of Matrix Argument. World
Scientific, 1997.
[27] A. Edelman and N. R. Rao. Random matrix theory. Acta Numerica, 14:233–297, 2005.
[28] Y. Chikuse. Statistics on Special Manifolds, volume 174. Springer Science & Business Media,
2003.
[29] A. T. James. Normal multivariate analysis and the orthogonal group. The Annals of Mathematical Statistics, pages 40–75, 1954.
22
| 10math.ST
|
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
arXiv:1607.01530v1 [math.NT] 6 Jul 2016
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
1. Introduction
This is the first of three papers giving detailed proofs of the results announced in
[BGS16]. The main result here is strong approximation for Markoff triples for prime
moduli. In paper two this is extended to more general moduli and applied to seiving in
Markoff numbers. In the third paper, we formulate a strong approximation conjecture
for more general affine Markoff surfaces and develop the techniques to obtain similar
results in these cases.
We review briefly the notation and setup from [BGS16] where background and
references can be found. The Markoff surface X is the affine surface in A3 given by
(1)
X : x21 + x22 + x23 − 3x1 x2 x3 = 0.
The Markoff triples M are the positive integer solutions to (1). Let Γ be a group
of affine integral morphisms of A3 generated by the permutations of the coordiantes
and the Vieta involutions R1 , R2 , , R3 , where
R3 (x1 , x2 , x3 ) = (x1 , x2 , 3x1 x2 − x3 )
and R2 , R3 are defined similarly. The orbit of (1, 1, 1) under Γ yields all of M [Mar79],
[Mar80]. If ∆ is the group of integral morphisms generated by Γ and the involutions
which replace two of the coordinates of x by their negatives, then X(Z) consists of
two ∆ orbits, namely of (0, 0, 0) and (1, 1, 1).
For p a prime number the action of Γ and ∆ on X descends to a permutation action
on the finite set X(Z/pZ) of solutions to (1) in Z/pZ. Our interest is in the orbits of
this action which we often refer to as the components.
Conjecture 1 (Strong Approximation Conjecture). For any prime p, X(Z/pZ) consists of two Γ orbits, namely {(0, 0, 0)} and X ∗ (Z/pZ) = X(Z/pZ)\{(0, 0, 0)}
Clearly the above conjecture implies strong approximation for M and X(Z) in the
form that their reductions mod p
M → X ∗ (p)
1
2
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
and
X(Z) → X(Z/pZ)
are onto.
In particular, one of the consequences is that the only prime congruence obstruction
for a Markoff number m (that is a number which is a coordinate of an x ∈ M) is the
one noted in [Fro13]: m 6= 23 , 0 mod p if p = 3 mod 4, p 6= 3.
Our first result asserts that there is a very large orbit.
Theorem 1. Fix ε > 0. Then for p large there is a Γ orbit C(p) in X ∗ (p) for which
|X ∗ (p)\C(p)| ≤ pε
(note that |X ∗ (p)| ∼ p2 ), and any Γ orbit D(p) satisfies
1
|D(p)| ≫ (log p) 3 .
The proof of Theorem (1) establishes the strong approximation conjecture unless
p − 1 is a very smooth number. In particular, the set of primes for which the strong
approximation conjecture fails is very small.
2
Theorem 2. Let E be the set of primes for which the strong approximation conjecture
fails. For ε > 0, the number of primes p ≤ T with p ∈ E is at most T ε , for T large.
We end the introduction by outlining the rest of the paper. In Section 2 we define
the fundamental rotations in Γ that are associated to an x ∈ X ∗ (p) and one of
its coordinates. These act on the conic sections gotten by intersecting X ∗ (p) with
the plane corresponding to the particular coordinate. Some basic properties of the
incidence graph of the intersections of the conic sections are established.
In Section 3, which we call the endgame, we define the cage C(p) which is shown
to be a large component of X ∗ (p). Specifically any x ∈ X ∗ (p) for which the rotation
associated to one of its coordinates (see Section 2 for definitions) has order at least
1
p 2 +δ0 (δ0 > 0) is shown to be in C(p).
In Section 4 , the middle game, the last statement is extended to x’s for which the
corresponding rotation has order pε0 (ε0 > 0 any fixed small number).
The methods used in Sections 3 and 4 rely on nontrivial upper bounds for the
number of points lying on curves over finite fields. In Section 3 Weil’s Riemann
Hypothesis [Wei41] is a key tool, but this is not strong enough when the order is less
1
than p 2 +δ0 . In its stead we use Stepanov’s auxiliary polynomial method [Ste69] in the
Appendix, or the recent gcd(u − 1, v − 1) bounds of Corvaja-Zannier [CS13], or the
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
3
combinatorial method based on the projective Szemeredi-Trotter Theorem [Bou12]
developed in section 4.
Section 5, the opening, deals with x’s for which the orders of the associated rotations
are very small (for example, being uniformly bounded). This is done by lifting the
equations to characteristic zero which leads to an equation in (Q̄)3 in roots of unity.
In general (that is, in the setting of Paper III) we invoke Lang’s Gm conjecture at this
point (proven in [Lau83] for example), however for the special case at hand one can
show directly that X∗ (Q̄) has no finite Γ orbits (the last is a necessary condition for
strong approximation, in the form of Conjecture 1, to hold). This Q̄ analysis leads to
to part 2 of Theorem 1.
In Section 6 we assemble the various stages of our argument, explicated in Sections
3, 4, 5 and give a proof of Theorem 1 in a form from which strong approximation
follows if p2 − 1 is not very smooth: see (70). To prove Theorem 2 we combine the
above with a variant of the results in [CKSZ14] concerning the multiplicative orders
of coordinates of points of curves on A2 over Fp .
2. Preliminaries
2.1. Analysis of the conic sections. Theorem 1 in the weaker form that |C(p)| ∼
|X ∗ (p)| as p → ∞, can be viewed as the finite field analogue of [Gol03], where it is
shown that the action of Γ on the compact real components of the character variety
of the mapping class group of the once punctured torus is ergodic. As in [Gol03], our
proof makes use of the rotations τij ◦ Ri , i 6= j where τij permutes xi and xj . For
example,
τ2,3 ◦ R2 (x1 , x2 , x3 ) = (x1 , x3 , 3x1 x3 − x2 ),
so the action on (x2 , x3 ) for fixed x1 is given by the rotation rot(3x1 )
!
!
!
!
x2
x3
0
1
x2
(2)
rot(3x1 )
=
=
.
x3
3x1 x3 − x2
−1 3x1
x3
This rotation preserves the conic section obtained by intersecting X ∗ (p) with the
plane defined by the first coordinate being equal to the value of x1 ; in general, we
define the conic section Cj (a) as follows:
(3)
Cj (a) = {xj = a} ∩ X ∗ (p).
We give an explicit description of this action, depending
2on whether x = 3x1
is parabolic (x2 − 4 = 0, that is x = ±2), hyperbolic ( x p−4 = 1) or elliptic
2
( x p−4 = −1) with ·· being the Legendre symbol.
4
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
= −1, that is if p ≡ −1 mod 4, then C1 (x) is
Lemma 3. Let x = ±2. If −1
p
empty. If −1
= 1, that is if p ≡ 1 mod 4, then
p
(4)
C1 (2) = (2, t, t ± 2i),
where i2 ≡ −1 mod p;
(5)
C1 (−2) = (−2, t, −t ± 2i),
which are pairs of disjoint lines. The action of ρ1 = rot(x) is
(6)
ρ1 (2, t, t ± 2i) = (2, t ± 2i, t ± 4i),
(7)
ρ1 (−2, t, −t ± 2i) = (−2, −t ± 2i, −t ∓ 4i),
so rot(2) preserves each line and rot(−2)interchanges them.
Now when x 6= ±2 we write
x = χ + χ−1 ,
2
2
where χ ∈ Fp if x p−4 = 1 and χ ∈ Fp2 if x p−4 = −1.
Note that
!
!
!
!
!
!−1
1
−1
1
−1
1
1
χ 0
χ
0
1
1
1 1
χ
−χ
=
rot(x) ==
χ
χ χ1
0 χ1
0 χ1
χ χ1
χ χ1
−χ 1
and consequently
!
1
1
χℓ
rot(x)ℓ =
χ χ1
0
and
hrot(x)i =
0
1
χℓ
1
χ
!
1 1
χ χ1
−1
−χ
!−1
(
=
χ1
χ
−
χ1 −
Consequently C1 (x) contains all elements
1 1
χ χ1
χ
χ1
1
χ1
!
χℓ
0
1
− χ1
χ1
1
− χχ1
χ1
0
1
χℓ
!
!
!
−1
−1 1
−χ
χ
−χ 1
1
χ
)
; χ1 ∈ hχi .
1 −1
x2
1
1 −1
x3 1
χ−
x3 −
χ1 + (χx2 − x3 )
, χ−
(χx3 − x2 )χ1 + x2 −
χ
χ
χ1
χ
χ χ1
with χ1 ∈ hχi.
Note that
where
o
n
b
Projx2 (Cx ) ⊃ aχ1 + ; χ1 ∈ hχi
χ1
x2
1 −1
1 −1
x3 −
and b = χ −
a= χ−
(χx2 − x3 )
χ
χ
χ
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
satisfy
σ = ab =
5
1
x 2 χ + χ 2
=
6 1.
=
χ − χ1
χ − χ1
Denoting by ρ a primitive root of Fp , a hyperbolic element x can be written in the
form
x = ρj + ρ−j .
(8)
For a hyperbolic element we let ord(x) = p−1
.
j
An elliptic element x can be written in the form
x = ξ j + ξ −j ,
(9)
where ξ is an element in Fp2 , ξ = (ρ̃)p+1 , where ρ̃ is a generator or the multiplicative
group of Fp2 . For an elliptic element we let ord(x) = p+1
.
j
Lemma 4. Let x be hyperbolic; write
x = w + w −1,
(10)
where w = ρj ∈ Fp . Then C1 (x) is a hyperbola with p − 1 points. Set
(11)
κ(x) =
Let
(12)
x2
.
x2 − 4
κ(x)
H(x) = { t,
t
| t ∈ Fp ∗ }.
Then we have the following map from H(x) to C1 (x):
κ(x)
κ(x)
κ(x)
→ x, t +
.
, tw +
(13)
t,
t
t
tw
In these coordinates
(14)
κ(x)
κ(x)
= tw,
.
ρ1 t,
t
tw
Lemma 5. Let x be elliptic; write
(15)
x = v + vp,
where v ∈ Fp2 − Fp , v p+1 = 1. Then C1 (x) is an ellipse with p + 1 points. Set
(16)
Let
(17)
κ(x) =
x2
.
x2 − 4
E(x) = {(t, tp ) | t ∈ Fp2 , tp+1 = κ(x)}.
6
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
Then we have the following map from E(x) to C1 (x):
κ(x)
κ(x)
p
.
, tv +
(18)
(t, t ) → x, t +
t
tv
In these coordinates
(19)
ρ1
κ(x)
t,
t
κ(x)
= tv,
.
tv
2.2. Incidence graph for the conic sections. We treat the case of p ≡ 3(mod4)
(the case of p ≡ 1(mod4) is simpler because of the special point in Lemma 3). Let
X ∗ (p) be the Markoff triples mod p; ξ any coordinate of a triple, ξ 6= 0, ± 23 .
For j 6= k and ξ, η
(20)
|Cj (ξ) ∩ Ck (η)| = 0, 1, 2.
To determine which it is, the intersection consists of all z’s such that
ξ 2 + η 2 + z 2 = 3ξηz,
(21)
which has a solution if
is a square in Fp .
In terms of Legendre’s symbol
(22)
9ξ 2 η 2 − 4(ξ 2 + η 2 )
|Cj (ξ) ∩ Ck (η)| = 1 +
9ξ 2 η 2 − 4(ξ 2 + η 2 )
p
.
So each Cj (ξ) meets p−1
Ck (η)’s. Define the incidence graph I(p) of X ∗ (p) to have
2
vertices Cj (ξ)’s with the number of edges between Cj (ξ) and Ck (η) being |Cj (ξ) ∩
Ck (η)|.
Proposition 6. For p large (p > 10) the incidence graph I(p) is connected and in
fact diam(I(p)) = 2.
Proof. Fix ξ1 , ξ2 and i, j, say i, j ∈ {1, 2}. We seek y ∈ Fp such that C3 (y)∩Ci (ξ1 ) 6= φ
and C3 (y) ∩ Cj (ξ2 ) 6= φ. This leads to solving the pair of equations:
(23)
(
(9ξ12 − 4)y 2 − λ2 = 4ξ12
(9ξ22 − 4)y 2 − µ2 = 4ξ22
for y, λ, µ ∈ Fp . In ξ12 = ξ22 then (23) reduces to the first equation (take λ = µ) and
since 9ξ12 − 4 6= 0 and ξ12 6= 0, it defines a conic section. Thus for p large it has a
solution and provides us with our y. If ξ12 6= ξ22 then (23) defines an irreducible curve
in A3 . Thus again for p large it has solutions over Fp providing us with our desired
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
7
y. It follows that the distance in I(p) between any two points is at most 2. On the
other hand, Ci (ξ) and Ci (η) are not joined if ξ 6= η nor is Ci (ξ) joined to half of the
Cj (η)’s for j 6= i. Hence diam(I(p)) = 2.
3. Endgame
3.1. Use of Weil’s bound. We begin with the following
Proposition 7. If x = (x1 , x2 , x3 ) is in X ∗ (p) and for some j ∈ {1, 2, 3} the order of
1
the induced rotation rot(xj ) is at least p 2 +δ (δ > 0 fixed) then x is joined to a point
y in X ∗ (p) one of whose induced rotations is of maximal order.
Proof. Consider first the case that x1 (say j = 1) is hyperbolic. In light of the
discussion in section 2, x = (x1 , x2 , x3 ) is connected to the points in X ∗ (p) of the
form
(24)
(x1 , α1 t + α2 t−1 , α3 t + α4 t−1 )
with t ∈ H, a cyclic subgroup of Fp ∗ . Here |H| | (p − 1); we set eH = p−1
. Our aim
|H|
∗
is to produce t’s in H for which there is a primitive root y ∈ Fp satisfying
(25)
α1 t + α2 t−1 = y + y −1.
Let P (H)(= Pα1 ,α2 (H)) denote the number of such solutions.
A subgroup K of Fp ∗ is determined by its order |K| which divides p−1; let dK =
Let fH (K) = fH (dK ) be the number of solutions to
(26)
p−1
.
|K|
α1 t + α2 t−1 = y + y −1 , t ∈ H , y ∈ K
(note that the traces of the matrices that we produce, namely the common values of
the left- and right-hand side of (26), are hit with multiplicity 2 in both t and y in our
counting). Clearly
(27)
fH (K) ≤ 2 min(|K|, |H|).
1
We can estimate fH (K), at least if |H| ≥ p 2 +δ , using Weil’s Riemann Hypothesis for
curves over finite fields. The map
ξ → ξ dK , η → η eH
sends solutions of
(28)
Cα1 ,α2 : α1 η eH + α2 η −eH = ξ dK + ξ −dK
8
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
to solutions of (26) and it is eH dK to 1. Hence if N(Cα1 ,α2 ) is the number of solutions
to (28) then
(29)
fH (K) =
N(Cα1 ,α2 )
.
eH dK
As we prove below (see Lemma 8) the curve Cα1 ,α2 i is absolutely irreducible. Since
its genus is O(eH dK ), applying Weil bound yields
√
(30)
N(Cα1 ,α2 ) = p + O( peH dK ).
Hence
(31)
fH (K) =
p
√
+ O( p).
eH dK
By inclusion/exclusion
(32)
X
P (H) =
µ(d)fH (Kd ),
d|(p−1)
where µ is the Mobius function. Hence
(33)
X µ(d)
X
1
1
√
ϕ(p − 1)
|H|
+ O( p) = |H|
+Oε (p 2 +ε ) = |H|
+Oε (p 2 +ε ).
P (H) =
µ(d)
d
d
p−1
d|(p−1)
d|(p−1)
Here ϕ is the Euler function and it satisfies ϕ(n) ≫ε n1−ε and hence from (33)
1
we deduce that P (H) > 1 under the assumption that |H| ≥ p 2 +δ . This proves
Proposition 7 in the hyperbolic case.
Now consider the case of x elliptic. Let D be a non-square element in Fp . Then
√
Fp2 = Fp [ D] and we can parametrize the subgroup H1 as follows
√
(34)
{(ξ + Dη)d1 ; ξ, η ∈ Fp ; ξ 2 − Dη 2 = 1},
where d1 =
p+1
.
|H1 |
The conic section C1 (x) is an ellipse which can be parametrized as
α2 − Dβ 2 = κ(x),
(35)
where κ(x) =
root in Fp ∗ .
Now
(36)
x2
.
x2 −4
We seek α which can be written as α = u + u−1 with u a primitive
(ξ +
√
√
D)n = gn (ξ) + hn (ξ) D,
where gn , hn are integral polynomials
(37)
gn (ξ) =
⌊n/2⌋
X
i=0
n
D i ξ n−2i ,
2i
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
(38)
hn (ξ) =
⌊n/2⌋
X
i=0
9
n
D i ξ n−2i+1 .
2i + 1
Let
(39)
gn (ξ, η) =
⌊n/2⌋
X
i=0
(40)
hn (ξ, η) =
n
D i ξ n−2i η 2i ,
2i
n
D i ξ n−2i+1 η 2i−1 .
2i + 1
⌊n/2⌋
X
i=0
Then we have
(41)
(ξ +
√
√
Dη)n = gn (ξ, η) + hn (ξ, η) D.
Now we seek to bound f (H1 , K) with K subgroup of Fp ∗ with d2 =
p−1
.
|K|
As in the
hyperbolic case this is given by M d(d11d,d2 2 ) where M(d1 , d2) now counts the number of
points on the following curve in Fp 3 :
(
(42)
ξ 2 − Dη 2 = 1
gd1 (ξ, η) = µd2 + µ−d2
This is a curve of genus O(d1 d2 ) and we can apply Weil bound and inclusionexclusion as in the hyperbolic case to produce the primitive u. This completes the
proof of Proposition 7.
Lemma 8. Suppose α1 α2 6= 1 mod p . Then the curve
α1 y e + α2 y −e = xd + x−d
is absolutely irreducible.
Proof. Consider
P (x, y) = α1 xd y 2e + α2 xd − x2d − y e ∈ Fp [X, Y ].
For d = 1 P is clearly irreducible. Let d > 1 and assume that P is not irreducible
P
and f (x, y) =
ajk xj y k ∈ Fp [X, Y ] an irreducible factor. Assume d ≥ e and u a d-th
root of unity. Since for 0 ≤ s ≤ d, P (x, y) = P (us x, y), also
X
fs (x, y) = f (us x, y) =
ajk usj xj y k
10
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
is an irreducible component of P . Thus either fs and fs′ are coprime or fs ∼ fs′ .
Since a0k 6= 0 for some k (otherwise x would be a factor of f (x, y)), it follows that
fs = fs′ if fs ∼ fs′ .
Case 1 The fs are not pairwise coprime.
The f (x, y) = fs (x, y) for some 0 < s < d, implying that usj = 1, i.e. sj ≡ 0(
mod d) if ajk 6= 0. It follows that d has a divisor d1 > 1 such that d1 |j if ajk 6= 0
and hence f (x, y) has form f (x, y) = g(xd1 , y). The polynomial g(x, y) is therefore a
factor of Q(x, y) = α1 xd2 y 2e + α2 xd2 − x2d2 y e − y e with d2 = dd1 and we lowered d.
Case 2 The fs (0 ≤ s ≤ d) are mutualy coprime. Define
P1 (x, y) =
d−1
Y
fs (x, y),
s=0
which divides P . Degree considerations show that
2d ≥ d degx f, 2e ≥ d degy f, 2d + e ≥ d deg f.
Case 2.1 degx f > 1, degy f > 1.
It follows that degx f = 2, degy f = 2, e = d, deg f = 3, and P (x, y) = P1 (x, y).
With u as above, ϕ(x, y) = f (x, uy) is an irreducible factor of P (x, y). Therefore for
some 0 ≤ s ≤ d
X
X
ajk uk xj y k ∼ fs (x, y) =
ajk usj xj y k .
ϕ(x, y) =
j,k≤2
Consequently, there is some 0 ≤ l ≤ d such that k − sj ≡ l( mod d) if ajk 6= 0. Since
Y
fs (x, y),
α1 xd y 2d + α2 xd − x2d y d − y d =
0≤s≤d
clearly a0,1 =
6 0, a1,0 6= 0, and therefore 1 ≡ l ≡ −s( mod d), i.e. k + j = 1( mod d)
if ajk 6= 0. Since deg f = 3, 2 ≡ 0( mod d), hence d = 2 and a1,1 = a2,0 = a0,2 = 0.
Thus
α1 x2 y 4 + ga1 x2 − x4 y 2 − y 2 ∼ (a21 x2 y + a12 xy 2 + a10 x + a01 y)(a21 x2 y − a12 xy 2 − a10 x + a01 y)
∼ y 2(a21 x2 + a01 )2 − x2 (a12 y 2 + a10 )2 .
Setting a0,1 = 1 gives −y 2 (a21 x2 +1)2 +x2 (a12 y 2 +a10 )2 and a221 = 1, a21 −a12 a10 = 0,
a212 = α1 , a210 = α2 . But this contradicts the assumption α1 α2 6= 1.
Case 2.2 degx f = 1 or degy f = 1.
Assume degy f = 1, say. Then there are coprime a(x), b(x) ∈ Fp [X] such that
P (x, a(x)
) = 0, that is
b(x)
α1 xd a(x)2e + α2 xd b(x)2e − x2d a(x)e b(x)e − a(x)e b(x)e = 0.
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
11
Since a(x), b(x) are coprime, it follows that a(x)e |xd , b(x)e |xd , hence a(x) or b(x) is
constant. If, say, b(x) is constant, previous equation implies xd |a(x)e , hence a(x)e =
γxd and
α1 γ 2 x2d + α2 b2e − γb2 x2d − γb2 = 0.
It follows that α1 γ = b2 , α2 b2 = γ, hence α1 α2 = 1, contradicting the assumptions
that α1 α2 6= 1.
3.2. The Cage. A point x = (x1 , x2 , x3 ) ∈ X ∗ (p) is called maximal if ord(rot(xj )) is
maximal for some j. Note that the condition that the order of rot(3xj ) be maximal
depends only on xj and not on the other coordinates of x (since it depends on the
order of λ, where λ + λ−1 = 3x1 in F∗p of F∗p2 ). We call ξ ∈ Fp maximal if it is of
maximal order.
By the cage we mean a set of maximal elements in X ∗ (p). We claim that the cage
is connected, that is to say if x̂ and ŷ are in the cage then x̂ is connected to ŷ. Let ξ
be the coordinate of maximal order of x̂ and η be the coordinate of maximal order of
ŷ, so that x̂ is connected to all points in Cj (ξ) and similarly ŷ is connected to all the
points in Ck (η).
Now according to Proposition 6, which when extended with and inclusion/exclusion
argument as in Proposition 7 gives a y of maximal order such that
P ∈ Cj (ξ) ∩ Cl (y);
Q ∈ Ck (η) ∩ Cl (y).
Since y is maximal, P and Q are connected by Γ and P is Γ- connected to x̂ and Q
to ŷ. Thus x̂ is Γ connected to ŷ.
Denote by C(p) the connected component of X ∗ (p) (under the Γ action) that contains the cage, then C(p) is our large component.
4. Middle Game
In the endgame (section 3) we connected any x ∈ X ∗ (p) of order (that is max(ord(rot(xj ))))
1
l ≥ p 2 +δ0 (δ0 > 0) to the cage in one step. In this section we allow any number of
moves to do the connecting. In particular any x of order at least pε is shown to be
in the giant component. As in section 3 the y’s which are joined to a given x whose
order is l1 via the corresponding rotation and which have orders l2 (here l1 and l2
divide p − 1 or p + 1) correspond to solutions of an equation (with σ ∈ Fp , σ 6= 1):
1
σ
= h2 + , σ 6= 1
h1 +
h1
h2
(43)
with h1 ∈ H1 , h2 ∈ H2 with H1 , H2 subgroups of Fp ∗ or Fp2 ∗ .
12
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
In (43) we have |H1 | = l1 , |H2 | = l2 .
If we have an upper bound on the number of solutions to (43) so that on summing
over all l2 ≤ l1 with l2 dividing p − 1 or p + 1, yields a quantitiy which is less than l1 ,
then there is at least one h1 for which the corresponding y will have order bigger than
l1 . We then repeat this procedure replacing x by this y and so on, until the order of
1
the element is at least p 2 +δ0 . At that point we are in the endgame and can finish.
The key therefore is a suitable upper bound to the number of solutions to (43).
Our original treatment used Stepanov’s technique of auxiliary polynomials in his
elementary proof of this Riemann Hypothesis for curves. This yields explicit and
reasonably sharp estimates which are ample for our application. We carry this out in
the Appendix partly to illustrate the flexibility of this method.
Subsequently the recent powerful technique for estimating from above the g.c.d. of
(u − 1, v − 1), of Corvaja and Zannier [CS13] yields sharper bounds. This is relevant
for the purpose of giving efffective bounds on p after which Theorem 1 takes effect.
The precise upper bound to (43) established by [CS13] is
n
|H1 |.|H2 | o
20 max (|H1|.|H2 |)1/3 ,
.
p
The third treatment, and the one which we develop in this section, while special
to (43), is robust in that the upper bound requires little further structure and it
is suitable for generalisation for more general moduli as demonstrated in Paper II.
It is based on the following projective Szemeredi-Trotter theorem (Proposition 2 in
[Bou12]).
Theorem 9. Let Φ : Fp → Mat2 (Fp ) such that det Φ does not vanish identically and
ImΦ ∩ PGL2 (Fp ) is not contained in a set of the form F∗p · gH for some g ∈ SL2 (Fp )
and H a proper subgroup of SL2 (Fp ). Then the following holds.
Given ε > 0, r > 1, there is δ > 0 such that if A ⊂ P 1 (Fp ) and L ⊂ Fp satisfy
(44)
1 ≪ |A| < p1−ε
(45)
log |A| < r log |L|.
Then
(46)
where for g =
|{(x, y, t) ∈ A × A × L; y = τΦ(t) (x)}| < |A|1−δ |L|,
!
a b
ax+b
.
, τg (x) = cx+d
c d
Using Theorem 9 we prove the following:
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
13
Proposition 10. Given δ > 0 there is τ < 1 and Cτ depending on δ such that if
pδ < |H1 | < p1−δ then the number of solutions to (43) is at most Cτ |H1 |τ .
Proof. For h ∈ H, a subgroup of F∗p or F∗p2 , denote by h̃ = h + h−1 . Similarly we
e = {h̃ | h ∈ H}.
denote by H
Suppose that (43) has T solutions. Then
σ
=u
h1
σ
= v,
h1 t +
h1 t
h1 +
(47)
f2 , has at least T 2 solutions.
where h1 , t ∈ H1 and u, v ∈ H
Elimination of h1 in (47) yields
(48)
1 2
1
uv + σ t −
=0
u2 + v 2 − t +
t
t
f2 × H
f2 .
which, by assumption, has at least T 2 solutions in (t, u, v) ∈ H1 × H
Next, let u = f˜1 , v = f˜2 with f1 and f2 ∈ H2 and define the following elements
f2 :
x, y ∈ H
1
^
,
x = (f
1 f2 ) = f1 f2 +
f1 f2
f1 f2
−1
y = (f^
+ .
1 f2 ) =
f2 f1
Thus uv = x + y, u2 + v 2 = xy + 4 and equation (48) gets transformed into
(49)
xy − t̃(x + y) + σ(t̃)2 + 4(1 − σ) = 0.
Denoting
(50)
α = t̃ and β = σ(t̃)2 + 4(1 − σ)
we obtain
(51)
y=
with
g=
αx − β
= τg (x)
x−α
α β
1 −α
!
= g(t̃)
and τg the Mobius transformation.
e2 × H
e2 × H
e1.
Equation (51) has at least T 2 solutions in (x, y, t̃) ∈ H
14
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
We apply Theorem 9 taking Φ(t)
(52)
Φ(t) =
t −σt2 − 4(1 − σ)
1
−t
!
e2, L = H
e1.
and A = H
We verify the assumption on Φ. Since σ 6= 1, det Φ(t) = (1 − σ)(4 − t2 ) does not
vanish identically. It remains to show that
n
det Φ(s)
Φ(s)−1 Φ(t)
; s, t ∈ Fp }
det Φ(t)
is not contained in a proper subgroup H of SL2 (p).
By (52)
!
!
2
2
−s
σs
+
4(1
−
σ)
t
−σt
−
4(1
−
σ)
Φ(s)−1 Φ(t) =
−1
s
1
−t
=
−st + σs2 + 4(1 − σ)
s−t
(s − t)(4(1 − σ) − σst)
−st + σt2 + 4(1 − σ))
!
Taking
s = σt +
4(1 − σ)
t
gives
σ(1 + σ)t +
(53) (1 − σ) − t
t
1
4
4(1−σ)
t
−σ 2 t2 + 4(1 − σ)2
0
!
= (1 − σ)
4
t
− t gt .
As the proper subgroups of SL(2, Fp ) have trivial second commutator [Suz82], it
suffices to show that
(54)
)(gt2 gt1 gt−1
gt−1
)(gt4 gt3 gt−1
gt−1
)
gt−1
)(gt3 gt4 gt−1
gt−1
(gt1 gt2 gt−1
4
3
1
2
3
4
2
1
is not identically one for t1 , t2 , t3 , t4 ∈ F∗p . If this were the case, the same would be
true for t1 , t2 , t3 , t4 taken in an extension field of Fp so as to make
t2 =
(55)
4(1 − σ)2 − ε
(ε = ±1)
σ2
solvable.
Taking t = ±κ satisfying (55), we get
2 −ε
(56)
g±κ =
± σκ [(1 + σ) 4(1−σ)
σ2
1
!
+ 4(1 − σ)] ε
.
0
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
15
We choose ε = ±1 as to ensure that
(1 + σ)(4(1 − σ)2 − ε) + 4σ 2 (1 − σ) 6= 0
and obtain matrices
(57)
g± =
±η ε
1 0
!
that clearly generate SL2 (p).
Consequently, Theorem 9 is applicable, yielding the bound T 2 ≪ |H2|1−τ |H1 |.
5. Opening
The analysis of the previous sections shows that we can connect x ∈ X ∗ (p) whose
order is at least pε (or smaller if the divisors of p2 − 1 are not too numerous) to the
cage. To deal with all x’s and in particular ones whose orders are uniformly bounded
(indepndent of p) we lift to characteristic zero. In this connection we observe first
that if the action of Γ on X ∗ (Q̄) has a finite orbit F then the strong approximation
conjecture cannot hold. To see this consider more generally any finite orbit F of the
Γ action on A3 (C). The coordinate of any ξ in such an F must lie in a cyclotomic
field Ln = Q(ζn ), where ζn is a primitive n-th root of 1. For if ξ = (ξ1 , ξ2, ξ3 ) then
ord(rot(ξj )) must be finite and hence
3ξj = tj + t−1
j
(58)
with tj a root of unity. If n is the least common multiple of all the orders of all the
tj ’s corresponding to the ξ’s in F then ξj ∈ Ln and hence F ⊂ A3 (Ln ). In fact the ξj ’s
(3)
are all integral except possibly for denominators powers of 3, so that F ⊂ A3 (OLn )
(3)
where OLn is the ring of S-integers in Ln , with S consisting of the primes dividing
3. If p is a rational prime (p 6= 3) which splits completely in Ln and P is a prime of
(3)
(3)
Ln with P |(p) then OLn /P ∼
= Z/pZ). The Γ action of A3 (OLn ) factors through
= Fp (∼
the reduction π mod P
(3)
A3 (OLn )
π
y
(3)
Γ
−−−→
Γ̄
(3)
A3 (OLn )
π
y
(3)
A3 (OL /P ) −−−→ A3 (OL /P )
and hence
(59)
F̄ = π(F ) ⊂ A3 (Fp ), is Γ̄ − invariant.
16
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
Since Γ preserves the level sets Xk :
x21 + x22 + x23 − 3x1 x2 x3 = k,
(60)
(3)
any such F is contained in Xk (OL ) for a suitable k. Thus for any such F , there is a
positive density of p’s which split completely in Ln , and hence for which F̄ ⊂ Xk (Fp )
is a fixed size Γ̄ -orbit (|F̄ | ≤ |F |). That is, the finite Γ-orbits in A3 (Q̄) must be part
of any description of the Γ̄-orbits on A3 (Fp ), for p large.
In our setting of this paper, k = 0 and we have (we thank E. Bombieri for this
simple proof)
Proposition 11. X ∗ (Q̄) has no finite Γ-orbit.
Proof. As in the discussion above, if F is such an orbit and ξ ∈ F then the ξj satisfy
(58) with tj an lj -th root of one. The Markoff equation for t1 , t2 , t3 becomes
(61)
−1
−1
−1
−1 2
2
−1 2
(t1 + t−1
1 ) + (t2 + t2 ) + (t3 + t3 ) − (t1 + t1 )(t2 + t2 )(t3 + t3 ) = 0.
Now (61) has no solutions with |tj | = 1 (let alone being roots of unity) except for
tj = ±i, j = 1, 2, 3. To see this note that if
−1
−1
¯
a = t1 + t−1
1 (= t1 + t1 ), b = t2 + t2 , c = t3 + t3
then a, b, c, lie in [−2, 2] and by the inequality of the geometric and arithmetic means
2
|a|3 + |b|3 + |c|3
≤ (a2 + b2 + c2 ).
(62)
0 ≤ a + b + c = |abc| ≤
3
3
Hence the only solutions to (61) correspond to a = b = c = 0 or tj = ±i. In terms
of ξj this gives ξ = (0, 0, 0), which is the only invariant set for the action of Γ on
X(Q̄).
We remark that in the context of the general surfaces that are studied in Paper III,
for example the surfaces Xk in (60) with k 6= 0, there can be a continuum of solutions
to the analogue of equation (61) with |tj | = 1. However the solutions with tj a root of
unity (with unspecified order) are still restricted to a finite number of nondegenerate
solutions. This follows from Lang’s Gm conjecture, see [Lau83] and [SA94] for proofs
which give the solutions effectively. In various special cases these finite Q̄ orbits for
the Γ-action correspond to the determination of the algebraic Painleve VI solutions
([DM00], [LT14]); we leave the details to paper III .
Returning to the Markoff surface X, let ξ = (ξ1 , ξ2 , ξ3) ∈ X ∗ (p) with ord(rot(ξj )) =
lj for j = 1, 2, 3. Let n = lcm(l1 , l2 , l3 ) and Ln = Q(ζn ) and let ζl1 , ζl2 , ζl3 be primitive
roots of one respectively. Let
2
2
2
(63) η = (ζl1 +ζl−1
)2 +(ζl2 +ζl−1
)2 +(ζl3 +ζl−1
)2 −(ζl1 +ζl−1
)(ζl2 +ζl−1
)(ζl3 +ζl−1
) ∈ OLn .
2
2
3
2
2
3
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
17
According to Proposition 11 unless l1 = l2 = l3 = 2 (i.e. ζlj = ±i), η 6= 0.
Now |η| ≤ 20 and hence
(64)
Norm(η) ≤ 20φ(n) ≤ 20n .
If P is a prime in OLn and η ∈ P , then P |(η) and hence
(65)
N(P ) ≤ Norm(η) ≤ 20n .
Put differently, if
log20 N(P ) > n
then
(66)
η 6= 0( mod P ).
For our point ξ in X ∗ (p), 3ξj = λj + λ−1
j with λj in Fp or Fp2 and λj an lj -th root
of 1, and (l1 , l2 , l3 ) 6= (2, 2, 2) since ξ 6= (0, 0, 0). If all the λj ’s are in Fp then Q(ζn )
splits completely at p, that is there is a prime P dividing (p) such that
OLn /P ∼
= Fp , N(P ) = p
and π(ζlj ) = λj in OLn /P and η ≡ 0( mod P ). Hence from (66) we conclude that
(67)
log20 p ≤ n.
If the field generated by λj ’s (over Fp ) is Fp2 then there is a prime P of OLn dividing
(p) such that
OL /P ∼
= Fp2 , N(P ) = p2
n
and π(ζlj ) = λj in OLn /P and η ≡ 0( mod P ). Hence again from (66) we conclude
that
(68)
2 log20 p ≤ n.
Hence in either case n ≥ log20 p where n = lcm(l1 , l2 , l3 ), and hence
(69)
1
max(l1 , l2 , l3 ) ≥ (log20 p) 3 .
We have proven
Proposition 12. Let ξ ∈ X ∗ (p) have maximal order l, i.e. max(l1 , l2 , l3 ) = l with
1
lj = ord(rot(ξj )), then l ≥ (log20 p) 3 . In particular, any component F of X ∗ (p)
satisfies
1
|F | ≥ (log20 p) 3 .
18
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
6. Proofs of Theorems 1 and 2
Proposition 12 establishes the second part of Theorem 1 and combined with the
analysis in sections 3 and 4 yields a proof of the strong approximation conjecture if
p2 − 1 is not very smooth. For example, the strong approximation conjecture is true
for X ∗ (p) if the prime p satisfies
(70)
X
2
d 3 < y; for any y.
1
(log p) 3 ≤d≤y
d|(p2 −1)
We do this by using the arguments and results in [Cha13] and [CKSZ14] concerning
points (x, y) on irreducible curves over Fp for which ord(x) + ord(y) is small (here
ord(x) is the order of x in F∗p ).
Theorem 13. Fix d ∈ Z+ and δ > 0. There is an ε > 0, ε = ε(d, δ), such that for
all primes p ≤ z (z sufficiently large) with the exception of at most z δ of them, the
following property holds. Let f (x, y) ∈ Fp [x, y] be of degree at most d and not divisible
by any polynomial of the form ρxα y β − 1 or ρy β − xα for any ρ ∈ F¯p and integers α
and β. Then all solutions (x, y) ∈ (F¯p × F¯p )∗ of f (x, y) = 0 satisfy
(71)
ord(x) + ord(y) ≥ pε
except for at most 11d3 + d of them.
Proof. Theorem 1.2 in [CKSZ14] establishes what we want except that pε in (71) is
replaced by the stronger bound pα(d) , with
α(d) =
2
,
89d2 + 3d + 14
while the exceptional set of primes is of zero density. For our purpose the exponent
in (71) is allowed to be small and in exchange we want the exceptional set to be much
smaller. To this end we follow verbatum the discussion in Section 4 of [CKSZ14]. For
d fixed and T a large parameter they show that there is a U = U(d, T ) which has at
1
most O(T α(d) ) prime factors (their log T in the denominator is irrelevant for us) with
the property: If p does not divide U and f as in Theorem 13 and f (x, y) = 0 in Fp ,
then
(72)
ord(x) + ord(y) ≥ T
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
19
except for at most 11d3 + d such (x, y) in Fp ∗ × Fp ∗ . For our given δ > 0 and large
parameter z choose T to be
T = z δα(d) .
(73)
Then the number of primes p with p|U is O(z δ ) , and if p does not divide U then
Theorem 13 holds with (72) and (73), that is with ε = δα(d).
To prove Theorem 2 we apply Theorem 13 to the curves fσ (x, y) given by equation
x+
1
σ
=y+
x
y
1
with σ 6= 1. If (log20 p) 3 > 1000, then according to Proposition 12, for any ξ ∈ X ∗ (p)
we have ord(rot(ξj0 )) is at least 1000 for j0 one of the j’s in {1, 2, 3}. Hence if p is
not in the exceptional set in Theorem 13 with d = 4, then in the typical equation
x + σx = y + y1 corresponding to the orders of the rotations in the rot(ξj0 ) orbit, there
is (x, y) which is not one of the exceptional 11d3 + d < 1000 possible points. For such
(x, y) the induced rotation has order at least pε and hence ξ is joined to the cage by
the middle game.
Our methods fall short of dealing with all p, specifically for those rare p’s for which
p −1 is very smooth. The following hypothesis which is a strong variant of conjectures
of M.C. Chang and B. Poonen [Cha13, Vol10] would suffice to deal with all large p’s.
2
Hypothesis: Given d ∈ N, there is δ > 0 and K = K(d) such that for p large
and f (x, y) absolutely irreducible over Fp and of degree d and f (x, y) = 0 is not a
translate of a subtorus of (F̄∗p )2 , the set of (x, y) ∈ (F∗p )2 for which f (x, y) = 0 and
max(ordx, ordy) ≤ pδ , is at most K.
Appendix A.
Stepanov’s auxiliary polynomial method [Ste69] for bounding the number of solutons to equations like (43) is quite flexible. We demonstrate this for some special cases
(the general case can be handled similarly). The proposition below is an extension of
the approach and bounds in [HK00] (where S(x) = x, T (x) = 1 − x and t1 = t2 ).
In what follows S(x) and T (x) are rational functions in Fp (x) of total degree d1
and d2 respectively and with disjoint divisors; e = d1 + d2 is fixed.
Proposition 14. For p a large prime, t1 , t2 dividing p − 1, t1 ≥ t2 , let
Y = {y ∈ Fp : S(y)t1 = T (y)t2 = 1}.
20
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
1
Then if t1 ≪e p1− 2e ,
−
1
|Y | ≪e min{t2 , t1 t2 4e }.
Remarks:
(1) The trivial bound is O(t2) so the Proposition gives an improvement (power
4e
saving) if t2 ≥ t14e−1 .
(2) If h(ξ, η) = 0 is a plane curve of genus 0 over Fp , then the Proposition gives
an upper bound on the number of solutions with ξ t1 = η t2 = 1 (cf. [CS13]).
Applying Proposition 14 with t1 = t2 , S(y) = y, T (y) =
ay+b
cy+d
yields
3
Corollary 15. For p large prime, t|(p − 1), t ≤ p 4 and Ut = {y ∈ Fp : y t = 1} the
t-th roots of 1,
3
|σ(Ut ) ∩ Ut | ≪ t 4
for σ ∈ PGL2 (Fp ), σ 6= 1.
3
Corollary 16. For t|(p − 1), t ≤ p 4 , b ∈ Fp , b 6= 1,
3
|{w, ρ ∈ Fp : w + w −1 = ρ + bρ−1 , w t = ρt = 1}| ≪ t 4 .
Proof. Put ρw = ξ, wρ = η, then ξ t = η t = 1 and each such solution with ξ = bη−1
η−1
corresponds to at most two solutions (w, ρ) above. Applying Corollary 15 yields
Corollary 16.
Proof of Proposition 14: First we need a generalization of Proposition 3.2 in
[VS12] where their common t is replaced by t0 , t1 , . . . , tn . The result is the following
Lemma, whose proof is the same
Lemma 17. Let t0 , t1 , . . . , tn , as well as B and J be integers, p a large prime, and
α1 , . . . , αn distinct elements in Fp ∗ . Assume that
1
min(t0 , . . . , tn ) ≥ (n − 1)B 2n + JB
2
and that
p ≥ (2nB + 2) max(t0 , t1 , . . . , tn ).
Then
xai xt0 b0,i (x − α1 )t1 b1,i . . . (x − αn )tn bn,i
with aj ≤ J and b0,i , . . . bn,i ≤ B are linearly independent in Fp [x].
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
21
Let α1 , . . . , αk ∈ Fp be distinct and ν1 , ν2 , . . . νk ∈ Z; set
Rν (x) = (x − α1 )ν1 . . . (x − αk )νk .
For m ≥ 1,
X m dj1
dj k
dm
ν1
[R
(x)]
=
[(x
−
α
)
]
.
.
.
[(x − α1 )νk ] =
ν
1
j1
jk
dxm
dx
dx
j
j1 +...jk =m
X
Bm,j (x − α1 )ν1 −j1 . . . (x − αk )νk −jk .
j1 +j2 +...jk =m
Hence
dm
(74)
[(x − α1 )(x − α2 ) . . . (x − αk ]
Rν (x) = Rν (x)Pm,ν (x),
dxm
where Pm,ν is a polynomial of degree at most km.
Stepanov’s polynomial method is based on constructing a polynomial which vanishes to high order on Y . Let λa,b1 ,b2 be in Fp with 0 ≤ a ≤ J and 0 ≤ bj ≤ B and
form
X
(75)
φ(x) =
λa,b1 ,b2 xa (S(x))t1 b1 (T (x))t2 b2 .
m
Write S(x), T (x) in the form (we assume that both factor into linear factors Fp [x]):
A(x − α1 ) . . . (x − αt )
,
(x − β1 ) . . . (x − βτ )
B(x − γ1 ) . . . (x − γµ )
T (x) =
.
(x − δ1 ) . . . (x − δν )
S(x) =
(76)
For simplicity we assume that S(x) and T (x) are square-free and we are assuming
that the α, β, γ, δ’s are all distinct. The constants A and B can be absorbed into the
λ’s, so without loss of generality we can take A = B = 1. For m ≥ 0
(77)
[(x − α1 ) . . . (x − αt )(x − β1 ) . . . (x − βτ ) . . . (x − δν )]m
dm a
t1 b1
t2 b2
x
(S(x))
(T
(x))
=
dxm
xa S(x)t1 b1 T (x)t2 b2 Pm,a,b1 ,b2 (x)
with Pm of degree at most em. Hence for x = y ∈ Y and m ≤ M
(78)
X
X
dm
dm a
t1 b1
t2 b2
λa,b1 ,b2 y a Pm,a,b1 ,b2 (y),
φ(x)|
=
λ
x
S(x)
T
(x)
=
x=y
a,b1 ,b2
x=y
dxm
dxm
a,b ,b
1
2
by the definition of Y . We can make (78) equal to 0 for all y in Y by noting that
y a Pm (y) is a polynomial of degree J + em. So (78) can be made 0 with not all of the
22
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
λa,b1 ,b2 ’s equal to 0 and for all m ≤ M as long as
(J + eM)M < B 2 J.
(79)
Assuming that this is satisfied, we have φ(x) which is not identically zero and has
degree (as a rational function) at most J + eBt1 .
Hence if φ(x) is not identically zero, then its order of vanishing on Y is at least M
and hence
M|Y | ≤ J + eBt1
or
(80)
|Y | ≤
J + eBt1
.
M
We now check that under suitable constraints on the sizes of parameters, φ(x) does
not vanish identically. We have
φ(x) =
consequently
X
λa,b1 ,b2 xa
(x − α1 )t1 b1 . . . (x − αt )t1 b1 (x − γ1 )t2 b2 . . . (x − γµ )t2 b2
,
(x − β1 )t1 b1 . . . (x − βτ )t1 b1 (x − δ1 )t2 b2 . . . (x − δν )t2 b2
(x − β1 )B . . . (x − βτ )B (x − δ1 )B . . . (x − δν )B φ(x) =
X
λa,b1 ,b2 xa (x − α1 )t1 b1 . . . (x − αt )t1 b1 (x − β1 )(B−b1 )t1 . . . (x − βτ )(B−b1 )t1 ·
· (x − γ1 )t2 b2 . . . (x − γµ )t2 b2 (x − δ1 )(B−b2 )t2 . . . (x − δν )(B−b2 )t2 .
Now the monomials appearing in the last expression are linearly independent over
Fp [x] according to Lemma 17 as long as
(81)
p ≥ (2eB + 2)t1
1
t2 ≥ eB 2e + JB e .
2
Thus, if (81) and (79) hold, so does (80).
Choose J ≤ M and
M 2 = Ce B 2 J.
Then
M=
p
√
Ce B J
1
1
and M ≥ J iff J ≪e B 2 . Now choose B + t12e and if t1 ≪ p1− 2e then (81) and (79)
hold and
−
1
|Y | ≪e t1 t2 4e .
This completes the proof of Proposition 14.
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
23
Acknowledgements: While working on this paper, the authors were supported, in
part, by the following NSF DMS awards: 1301619 (Bourgain), 1603715 (Gamburd),
1302952 (Sarnak).
References
[BS02]
F. Beukers and C. J. Smyth, Cyclotomic points on curves, Number theory for the
[Bom07]
millenium (Urbana, Illinois, 2000), I, A.K. Peters, (2002), 67-85.
E. Bombieri, Continued fractions and the Markoff tree, Expo. Math. 25 (2007), no
[Bou12]
3, 187–213.
J. Bourgain, A modular Szemeredi-Trotter theorem for hyperbolas, C.R. Acad. Sci.
Paris Ser 1, 350 (2012), 793–796.
[BG08]
J. Bourgain and A. Gamburd, Uniform expansion bounds for Cayley graphs of
SL2 (Fp ), Ann. Math. 167 (2008), 625–642.
[BGS10]
J. Bourgain, A. Gamburd and P. Sarnak, Affine linear sieve, expanders and sum
product, Invent. Math. 179 (2010), 559–644.
[BGS16]
J. Bourgain, A. Gamburd, P. Sarnak, Markoff triples and strong approximation, C.
R. Math. Acad. Sci. Paris 354 (2016), no. 2, 131-135.
[Cas78]
[Cha13]
J. W. S. Cassels, Rational Quadratic Forms, Academic Press, 1978.
Chang, Mei-Chu Elements of large order in prime finite fields. Bull. Aust. Math.
[CKSZ14]
Soc. 88 (2013) 169-176.
M-C. Chang, B. Kerr, I. Shparlinski and U. Zannier, Elements of large orders on
[CS13]
varieties over prime finite fields, J. Theor. Nombres Bordeaux 26 (2014) 579-594.
P. Corvaja, U. Zannier, Greatest common divisors of u − 1, v − 1 in positive charac-
teristic and rational points on curves over finite fields, J. Eur. Math. Soc. (JEMS)
15 (2013) 1927-1942.
[DKS13]
C. D’Andrea, T. Krick and M. Sombra, Heights of varieties in multiprojective spaces
[DM00]
and arithmetic Nullstellensatz, Annales Sci. de l’ENS, 46, (2013),549-627.
B. Dubrovin, M. Mazzocco, Monodromy of certain Painleve-VI transcendents and
[Fro13]
reflection groups, Invent. Math. 141 (2000) 55-147.
G. Frobenius, Über die Markoffschen Zahlen, Akad. Wiss. Berlin, (1913), 458–487.
[Gol03]
W. Goldman, The modular group action on real SL(2)-characters of a one-holed
torus, Geom. and Top. Vol. 7 (2003), 443–486.
[HK00]
R. Heath-Brown and S. Konyagin, New bounds for Gauss sums derived from k-th
powers and for Heilbronn’s exponential sum, QUAR. J MATH (2000), 221–235.
[Lau83]
[Mar79]
M. Laurent, Exponential diophantine equations, CR Acad Sc. 296 (1983), 945–947.
A. Markoff, Sur les formes quadratiques binaires indéfinies, Math. Ann. 15 (1879)
[Mar80]
381–409.
A. Markoff, Sur les formes quadratiques binaires indéfinies, Math. Ann. 17 (1880)
[LT14]
379–399.
O. Lisovyy and Y. Tykhyy, Algebraic solutions of the sixth Painleve equation,
Journal of Geometry and Physics, 85 (2014) 124-163.
24
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
[MW13]
D. McCullough and M. Wanderley, Nielsen equivalence of generating pairs in
[SA94]
SL(2, q), Glasgow Math. J. 55 (2013), 481–509.
P. Sarnak and S. Adams, Betti numbers of congruence groups, with an appendix
[Sch04]
by Z. Rudnick, Israel J. Math, 88, 1994, 31-72.
Schmidt, W. M Equations over finite fields: an Elementary approach, Kendrick
[Ste69]
Press 2004.
S.A. Stepanov, The number of points of a hyperelliptic curve over a prime field,
[Suz82]
MATH USSR-IZV 3:5 (1969), 1103–1114.
M. Suzuki, Group Theory I, Springer-Verlag, Berlin-Heidelberg-New York, 1982.
[Vol10]
Voloch, Elements of high order on finite fields from elliptic curves, Bull. Aust. Math.
Soc. 81 (2010), 425-429.
[VS12]
[Wei41]
Vyugin, I. V., Shkredov, I. D., Sb. Math. 203(2012), 844-863.
A. Weil, On the Riemann Hypothesis in function fields, Proc. Nat. Acad. Sci. USA
27 (1941), 345–347.
IAS
E-mail address: bourgain@math.ias.edu
The Graduate Center, CUNY
E-mail address: agamburd@gc.cuny.edu
IAS and Princeton University
E-mail address: sarnak@math.princeton.edu
| 4math.GR
|
arXiv:1706.02858v2 [math.ST] 14 Mar 2018
On rumour propagation among sceptics
Farkhondeh A. Sajadi and Rahul Roy1
University of Isfahan, Isfahan and Indian Statistical Institute, Delhi
Keywords: complete coverage, eventual coverage, rumour process.
AMS Classification: 60K35
Abstract: Junior, Machado and Zuluaga (2011) introduced a model to understand the
spread of a rumour. This model consisted of individuals situated at i.i.d. points of the
line N. An individual at the origin 0 starts a rumour and passes it to all individuals
in the interval [0, ρ0 ], where ρ0 is a positive random variable. An individual located in
this interval receives the rumour and transmits it further. The rumour process is said to
survive if all the individuals in the model receive the rumour. We study this model, when
the individuals are more sceptical and they transmit only if they receive the rumour from
at least two different sources.
In stochastic geometry the equivalent of this rumour process is the study of coverage
of the space Nd by random sets. Our study here extends the study of coverage of space
and considers the case when each vertex of Nd is covered by at least two distinct random
sets.
1
Introduction
Let {Xi : 1 ≥ 1} be a collection of i.i.d. Bernoulli (p) random variables, i.e.,
(
1 with probability p
Xi =
0 with probability 1 − p.
(1)
Also let {ρi : 1 ≥ 1} be a collection of i.i.d. N valued random variables, independent of the
collection {Xi : 1 ≥ 1}. Let ρ denote a generic random variable with the same distribution
as ρi .
In addition, let ρ0 an independent N valued random variables, independent of the
collections {Xi : 1 ≥ 1} and {ρi : 1 ≥ 1}, with ρ0 having the same distribution as ρ.
Taking X0 ≡ 1, consider the region
[
([i, i + ρi ]).
C :=
{i≥0:Xi =1}
1
f.sajadi@sci.ui.ac.ir, rahul@isid.ac.in
1
Junior, Machado and Zuluaga (2011) takes {i : Xi = 1} as the location of individuals
on N and a rumour is started at the origin which is received by individuals located in
[0, ρ0 ]. An individual at i on receiving the rumour spreads it among all individuals in
the region [i, i + ρi ], and thus the rumour propagates. This model they call the firework
process. They also introduce another model of rumour propagation, called the reverse
firework process, where they study the region
[
([i − ρi , i]).
C̃ :=
{i≥0:Xi =1}
Their object of interest is under what conditions on the processes {Xi : 1 ≥ 1} and {ρi :
1 ≥ 1} are the regions C and C̃ unbounded connected regions with positive probability,
i.e. the rumour process ‘percolates’.
Remark 1.1. A simple argument using Kolmogorov’s 0-1 law yields that C (or C̃) being an
unbounded connected region with positive probability is equivalent to C (or C̃) containing
a region [t, ∞), for some t ≥ 1 with probability 1.
We study the spread of rumour among sceptics. A sceptic individual at i spreads it
among all individuals in the region [i, i + ρi ] only if s/he received the rumour from at least
two distinct sources, i.e.,
(i) for the firework process, there are two individuals at j and k (say) with j 6= k and
−1 ≤ j, k < i such that i ∈ [j, j + ρj ] ∩ [k, k + ρk ]; here we assume that there is
an individual at location −1, who spreads the rumour in the region [−1, −1 + ρ−1 ],
where ρ−1 is a random variable independent of all other random variables and
having the same distribution as ρ,
(ii) for the reverse firework process, there are two individuals at j and k (say) with
j 6= k and −1 ≤ j, k < i such that j, k ∈ [i − ρi , i].
Towards this we define the regions
D := {x ∈ R : there exist j, k ≥ −1 with j 6= k and Xj = Xk = 1
such that x ∈ ([j, j + ρj ] ∩ [k, k + ρk ])},
D̃ := {x ∈ R : x ∈ [i − ρi , i] for some i with Xi = 1 and there exist
− i ≤ j, k < i with j 6= k and Xj = Xk = 1 such that j, k ∈ [i − ρi , i]}.
We look for conditions on on the processes {Xi : 1 ≥ 1} and {ρi : 1 ≥ 1} such that the
regions D and D̃ are unbounded connected regions with positive probability.
Remark 1.2. As in the case of rumour propagation in C and C̃, a simple argument
using Kolmogorov’s 0-1 law yields that D (or D̃) being an unbounded connected region
with positive probability is equivalent to D (or D̃) containing a region [t, ∞), for some
t ≥ 1 with probability 1.
Thus we define
2
Definition 1.3. The firework process (respectively, reverse firework process,) percolates
among sceptics if, with probability 1, D (respectively, D̃,) contains a region [t, ∞), for
some t ≥ 1.
Remark 1.4. Using this equivalent definition obtained by the tail event properties allows
us to study the model without considering the influence of the two initiators X−1 and X0 .
Proposition 1.5. Let
l := lim inf jP(ρ ≥ j) > 1 and L := lim sup jP(ρ ≥ j) < ∞.
j→∞
j→∞
We have that both the firework process and the reverse firework process percolate if p > 1/l
and neither of them percolates if p < 1/L.
We note here that this is the same condition that Junior, Machado and Zuluaga (2011)
obtain for the percolation among ‘non-sceptical’ individuals. Indeed, the above proposition
goes through among more radical sceptics too, i.e. if individuals need to receive the rumour
from k ≥ 1 distinct sources before they transmit the rumour.
As noted in the review article Junior, Machado and Ravishankar (2016), the above
model is related to the study of coverage processes in stochastic geometry. Athreya, Roy
and Sarkar (2004) introduce a notion of ‘eventual coverage’ which, for 1-dimension, is
identical to the equivalent formulation of the percolation of rumour process as given in
Remark 1.1. We state the model in brief here and present the results obtained.
Let {Xi : i ∈ Nd } be a collection of i.i.d. Bernoulli (p) random variables and {ρi :
i ∈ Nd } a collection of i.i.d. N valued random variables, independent of the collection
{Xi : i ∈ Nd }. Let ρ denote a generic random variable with the same distribution as ρi .
Let
C := ∪i:Xi =1 (i + [0, ρi ]d )
denote the covered region of Nd .
Athreya, Roy and Sarkar (2004) define a notion of eventual coverage as follows: Nd is
eventually covered if there exists a t ∈ Nd such that t + Nd ⊆ C. For our purposes we say
Nd is eventually doubly covered if there exists a t ∈ Nd such that t + Nd ⊆ D, where
D := {x ∈ Rd : there exist i, j ∈ Nd with i 6= j and Xi = Xj = 1
such that x ∈ (i + [0, ρi ]d ) ∩ (j + [0, ρj ]d )}.
We have
Proposition 1.6. (i) For d = 1, let
l := lim inf jP(ρ ≥ j) > 1 and L := lim sup jP(ρ ≥ j) < ∞.
j→∞
j→∞
We have
Pp (N is eventually doubly covered) =
3
(
1
0
if p > 1/l
if p < 1/L.
(ii) For d ≥ 2, we have
Pp (Nd is eventually doubly covered) =
(
1
0
if lim inf j→∞ jP(ρ ≥ j) > 0
if limj→∞ jP(ρ ≥ j) = 0.
In stochastic geometry the notion of coverage of space has received widespread attention. In particular Hall (1988) and Chiu, et al (2013) provide a review of the topics
studied. Our endeavour in this paper may be viewed as an effort to introduce a notion of
‘reinforced coverage’.
2
Proof of Proposition 1.5
Let S be the event that "the firework process percolates" and S̃ be the event that "the
reverse firework process percolates". Observe that,
S=
∞ [
∞
\
∞
[
([ρn−i ≥ i + 1] ∩ [ρn−j ≥ j + 1]) ,
n=1 i=1 j=1,j6=i
and
S̃ =
∞ [
∞
\
∞
[
([ρn+i ≥ i] ∩ [ρn+j ≥ j]) .
n=1 i=1 j=1,j6=i
We will show that if p > 1/l, then we have P(S) = 1, P(S̃) = 1 and if p < 1/L, then
P(S) = 0, P(S̃) = 0.
We prove the proposition for the firework process, a similar proof works for the reverse
firework process. Using De Morgan’s law, we have
Sc =
∞ \
∞
[
∞
\
([ρn−i ≤ i] ∪ [ρn−j ≤ j]) .
n=1 i=1 j=1,j6=i
4
Since p > 1/l, there exists η > 1 such that l > η/p. Also let i0 be such that iP(ρ ≥ i) > ηp ,
for all i ≥ i0 . Therefore, for all i, j ≥ i0 and each fixed n,
∞
∞
\
\
P
([ρn−i ≤ i] ∪ [ρn−j ≤ j])
i=i0 j=i0 ,j6=i
∞
∞
∞
∞
\
\
\
\
[ρn−i ≤ i]
[ρn−j ≤ j]) ∪
= P
j=i0 i=j+1
i=i0 j=i+1
∞
∞
∞
∞
\
\
\
\
[ρn−i ≤ i]
[ρn−j ≤ j] + P
= P
j=i0 i=j+1
i=i0 j=i+1
≤ P
=
≤
≤
∞
\
∞
Y
[1 −
j=i0 +1
∞
Y
[1 −
[ρn−i ≤ i]
i=i0 +1
[1 − P(ρ ≥ j + 1)] +
j=i0 +1
∞
Y
1
j+1 ]
∞
\
[ρn−j ≤ j] + P
j=i0 +1
j=i0 +1
Q
But, ∞
j=i0 +1 [1 −
Finally
∞
Y
!
[1 − P(ρ ≥ i + 1)]
i=i0 +1
∞
Y
η
η
[1 −
]+
]
p(j + 1)
p(i
+ 1)
i=i +1
0
∞
Y
1
]+
j+1
i=i
= 0 as well as
[1 −
0 +1
Q∞
i=i0 +1 [1
1
].
i+1
−
1
i+1 ]
= 0. Therefore, P(S c ) = 0.
P(percolation among sceptic individuals)
≤ P(percolation among ‘non sceptical’ individuals)
=0
for p < 1/L , where the equality above follows from Theorem 2.1 of Junior, Machado and
Ravishankar (2016).
3
Proof of Proposition 1.6
As mentioned earlier (i) of Proposition 1.6 is just Proposition 1.5 rephrased. Thus we need
to prove (ii).
First note that from Proposition 3.2(a) of Athreya, Roy and Sarkar (2004), we know
that if limj−→∞ jP(ρ ≥ j) = 0 then Pp (Nd is eventually covered) = 0, and so
Pp (Nd is eventually doubly covered) = 0.
5
We prove Proposition 1.6 (ii) for the case d = 2; the proof carries through in a
straightforward fashion for higher dimensions. Fix 0 < p < 1 and we assume that
lim inf j−→∞ jP(ρ ≥ j) > 0.
For (i, j) ∈ N2 , define
Bi,j := {(i, j) 6∈ D}.
If we show that, for some N ≥ 1,
X
Pp (Bi,j ) < ∞,
i,j≥N
then Borel-Cantelli lemma guarantees that, with probability 1, there exists N0 ≥ 1 such
that (i, j) ∈ D for all i, j ≥ N0 , i.e. we have eventual coverage.
For u := (i − l1 , j − l2 ) ∈ N2 with 1 ≤ l1 ≤ i, 1 ≤ l2 ≤ j, we observe that (i, j) ∈
u + [0, ρu ]2 if and only if ρu ≥ max{l1 , l2 }. Also note that for i ≥ j and 0 ≤ t ≤ j − 1 there
are exactly 2t + 1 vertices (i − l1 , j − l2 ) with max{l1 , l2 } = t (viz. {(i − l1 , j − l2 ) : l1 =
t and 0 ≤ l2 ≤ t or l2 = t and 0 ≤ l1 ≤ t}), while for j ≤ t ≤ i there are exactly j vertices
(i − l1 , j − l2 ) with max{l1 , l2 } = t (viz. {(i − l1 , j − l2 ) : l1 = t and 0 ≤ l2 ≤ j − 1}).
Thus, for Ai,j := {(i, j) 6∈ C}, and, for i ≥ j,
Pp (Bi,j )
= Pp (Ai,j )+
i−j
Y
[1 − pG(k + j − 1)]
k=1
j−1
Y
[1 − pG(t)]
2t+1
j−1
X
j
pG(t) [1 − pG(t)]
t=0
j−1
Y
2t
[1 − pG(l)]
2l+1
+
l6=t,l=0
t=0
×
i−j
X
pG(k + j − 1) [1 − pG(k + j − 1)]
j−1
i−j
Y
[1 − pG(l + j − 1)]
Noting that for i ≥ j
Pp (Ai,j ) =
j−1
Y
[1 − pG(l)]
2l+1
l=0
i−j
Y
[1 − pG(k + j − 1)]
.
(2)
l6=k,l=1
k=1
j
j
k=1
(the last product is taken to be 1 if i = j), (2) simplifies to
Pp (Bi,j ) = Pp (Ai,j ) + pPp (Ai,j )
i−1
X
t=0
G(t)
.
1 − pG(t)
(3)
Before we proceed we fix some quantities. Since lim inf jP(ρ ≥ j) > 0 we may choose
j−→∞
η > 0 such that lim inf jP(ρ ≥ j) > η. Also, for this η and our fixed p ∈ (0, 1) let a be
j−→∞
6
such 0 < e−pη < a < 1. Now we choose N ≥ 1 such that for all j ≥ N the following hold:
(i) jP(ρ ≥ j) > η,
(ii) (1 − pηj −1 )j < a,
(4)
(iii) pjη > 1.
Note that (ii) above guarantees that for all j ≥ N , we have (1 − pG(j))j < a.
From the proof of Proposition 3.2(b) of Athreya, Roy and Sarkar (2004) we know that,
for j ≥ N ,
∞
X
Pp (Ai,j ) < ∞.
i=1
Thus if we show that, for j ≥ N ,
∞
X
Pp (Ai,j )
i−1
X
t=0
i=1
G(t)
<∞
1 − pG(t)
(5)
then we will have
∞
X
Pp (Bi,j ) < ∞ whenever j ≥ N.
(6)
i=1
Note that,
i−1
X
t=0
∞
X
Pp (Ai,j )
i=j
=
j−1
k=1
i−j
X
k=1
∞ j−1
Y
X
G(k + j − 1)
1 − pG(k + j − 1)
[1 − pG(t)]2t+1
i=j t=0
=
j−1
Y
j−1
Y
i−j
Y
[1 − pG(l + j − 1)]j
l=1
[1 − pG(t)]2t+1
t=0
=
i−j
X G(t)
X G(k + j − 1)
G(t)
=
+
. Now, for fixed j ≥ N ,
1 − pG(t)
1 − pG(t)
1 − pG(k + j − 1)
t=0
∞ i−1
Y
X
k=1
[1 − pG(l)]j−1
2t+1
t=0
∞ X
∞ i−1
X
Y
i−1
X
i=j l=j
[1 − pG(t)]
i−j
X
G(k + j − 1)
1 − pG(k + j − 1)
G(k)
j−1
[1 − pG(h)]
h6=k,h=j
k=j
[1 − pG(l)]
i−1
Y
G(k)
i−1
Y
[1 − pG(h)] for j ≥ N.
Taking
∞ i−1
X
Y
[1 − pG(l)]
h6=k,h=j
k=j i=k+1 l=j
ek :=
j−1
G(k)
i−1
Y
h6=k,h=j
i=k+1 l=j
7
[1 − pG(h)]
(7)
as the inner sum in (7), we have
ek =G(k)
k
Y
[1 − pG(l)]j−1
l=j
k−1
Y
[1 − pG(h)]
h=j
×
∞
X
1+
i
Y
[1 − pG(l)]
i=k+1 l=k+1
=G(k)
k
Y
[1 − pG(l)]j−1
l=j
k−1
Y
i
Y
j−1
[1 − pG(h)]
h=k+1
!
[1 − pG(h)] 1 + [1 − pG(k)]j
h=j
h
× 1+
∞
X
i
Y
[1 − pG(l)]
j−1
i=k+2 l=k+2
i
Y
[1 − pG(h)]
h=k+2
i
!
.
(8)
!
(9)
Similarly, for ek+1 , as in the term in the first equality above, we have
ek+1 =G(k + 1)
k+1
Y
[1 − pG(l)]j−1
l=j
×
k
Y
[1 − pG(h)]
h=j
1+
∞
X
i
Y
[1 − pG(l)]
j−1
i=k+3 l=k+3
i
Y
[1 − pG(h)] .
h=k+3
Taking
C(k, j) := 1 +
∞
X
i
Y
[1 − pG(l)]
j−1
i=k+2 l=k+2
i
Y
[1 − pG(h)]
h=k+2
we see that
j−1
ek+1
[1 − pG(k)]
G(k + 1) [1 − pG(k + 1)]
= C(k, j)
j .
ek
G(k)
1 + C(k, j) [1 − pG(k + 1)]
Now,
G(k+1)
G(k)
(10)
≤ 1 for all k ≥ 0, and, for fixed j,
j−1
(i) for k large enough, 0.9 < [1 − pG(k + 1)]
[1 − pG(k + 1)] ≤ 1;
(ii) for j ≥ N , from equation (3.5) of Athreya, Roy and Sarkar (2004), we have
P∞
Qi
j−1
< ∞ and hence
i=k+2
l=k+2 [1 − pG(l)]
∞
X
i
Y
[1 − pG(l)]
i=k+2 l=k+2
j−1
i
Y
[1 − pG(h)] < ∞;
h=k+2
which ensures that, for k large enough, 1 ≤ C(k, j) < 1.1.
1.1
Thus, for j ≥ N and k large enough, we have ek+1
ek < 1.9 , and so, by ratio test,
∞. This shows, from (7), that (5) and thereby (6) hold.
8
P∞
k=1 ek
<
P
Now we show that, for N as above,
i,j≥N Pp (Bi,j ) < ∞. Towards this, we first
observe that, for i, j ≥ 1, by symmetry we have Pp (Bi,j ) = Pp (Bj,i ), thus we need to show
X
Pp (Bi,j ) = 2
i,j≥N
∞ X
i−1
X
Pp (Bi,j ) +
i=N j=N
∞
X
(11)
Pp (Bi,i ) < ∞.
i=N
We will show separately that
∞ X
i−1
X
Pp (Bi,j ) < ∞ and
i=N j=N
∞
X
(12)
Pp (Bi,i ) < ∞.
i=N
First, for any i, j ≥ 1,
"
Pp (Bi,j ) = 1 + p
i−1
X
t=0
#
G(t)
Pp (Ai,j ).
1 − pG(t)
From the proof of Proposition 3.2(b) of Athreya, Roy and Sarkar (2004) we know that,
∞ X
i−1
X
Pp (Ai,j ) < ∞ and
i=N j=N
∞
X
Pp (Ai,i ) < ∞,
i=N
thus we need to show that
∞ X
i−1 X
i−1
X
i=N j=N t=0
∞ X
i−1
X
G(t)
G(t)
Pp (Ai,j ) < ∞ and
Pp (Ai,i ) < ∞.
1 − pG(t)
1
−
pG(t)
t=0
(13)
i=N
For the first sum, interchanging the order of summation we have
∞ X
i−1 X
i−1
X
i=N j=N t=0
∞
∞
X
X
G(t)
G(t)
Pp (Ai,j ) =
1 − pG(t)
1 − pG(t)
t=0
∞
X
Pp (Ai,j ).
j=N +1 i=max(t+1,j+1)
Also breaking up the inner two sums according to the values taken by i, writing out the
expression for Pp (Ai,j ) and collecting terms together, we have
∞
X
∞
X
Pp (Ai,j )
j=N +1 i=max(t+1,j+1)
=
∞
X
∞
X
Pp (AN +r,N +m )
m=1 r=max(t−N +1,m+1)
=
t−N
X
∞
X
m=1 r=t+1−N
+
∞
X
N +m−1
Y
[1 − pG(l)]2l+1
l=0
∞
X
m=t−N +1 r=m+1
r−m
Y
[1 − pG(k + N + m − 1)]N +m
k=1
N +m−1
Y
[1 − pG(l)]
2l+1
l=0
r−m
Y
k=1
9
N +m
[1 − pG(k + N + m − 1)]
).
G(t)
1−pG(t) ,
To simplify the expressions we take σt :=
N +m
g(k, m) := [1 − pG(k + N + m − 1)]
equations we have
∞ X
i−1 X
i−1
X
i=N j=N t=0
[1 − pG(l)]
2l+1
and
l=0
. Using this notation, from the previous two
∞
t−N
X
X
G(t)
Pp (Ai,j ) =
σt
1 − pG(t)
t=1
m=1
+
N +m−1
Y
sm :=
∞
X
∞
X
sm
r=t+1−N
∞
X
σt
r−m
Y
g(k, m)
k=1
∞
X
sm
m=t−N +1 r=m+1
t=1
r−m
Y
g(k, m).
(14)
k=1
We start with the first term on the right in the above equation. Reordering the sums, we
have
∞
X
t=1
σt
t−N
X
∞
X
sm
m=1 r=t+1−N
r−m
Y
g(k, m) =
∞
X
sm
m=1
k=1
Let
∞
X
αm := sm
∞
X
∞
X
σt
t=m+N
σt
t=m+N
∞
X
r−m
Y
r−m
Y
g(k, m).
(15)
r=t+1−N k=1
g(k, m)
r=t+1−N k=1
denote the summand. Observe that
∞
X
sm+1 t=m+1+N
αm+1
=
∞
αm
sm
X
r=t+1−N
∞
X
r−m−1
Y
σt
t=m+N
= [1 − pG(N +
∞
X
σt
k=1
r−m
Y
∞
X
σt
t=m+1+N
∞
r−m
X
Y
r=t+1−N
∞
X
r−m−1
Y
k=1
r−m
Y
σt
= [1 − pG(N + m)]N +m
∞
X
∞
X
σt
t=m+N
σm+N
[1−pG(N +m)]N +m+1
g(k, m)
r=t+1−N k=1
t=m+1+N
m)]2(N +m)+1
∞
X
×
g(k, m + 1)
∞
X
g(k, m) +
g(k, m)
r=t+1−N k=1
r=t+1−N
r=m+1 k=1
g(k, m + 1)
r−m−1
Y
k=1
∞
X
g(k, m + 1)
t=m+1+N
σt
∞
X
r=t+1−N
r−m−1
Y
.
g(k, m + 1)
k=1
By our choice of N and 0 < a < 1 as in (4), we have [1 − pG(N + m)]N +m < a. All
P∞
P∞
Qr−m−1
terms above being non-negative, if t=m+1+N σt r=t+1−N k=1
g(k, m + 1) < ∞,
10
then ααm+1
< a; and so an application of the ratio test will yield that the sum in (15) is
m
finite.
P∞
P∞
Qr−m−1
To show t=m+1+N σt r=t+1−N k=1
g(k, m + 1) < ∞, we again apply a ratio
P∞
Qr−m−1
test. Let τt := σt r=t+1−N k=1
g(k, m + 1) < ∞. Then,
G(t + 1)
τt+1
=
[1 − pG(t)]
τt
G(t)
[1 − pG(t + 1)]
N +m
∞
X
1+
r
Y
!
g(k, m + 1)
r=t+2−N −m k=t+2−N −m
∞
r
X
Y
×
N +m+1
1+
1 + [1 − pG(t + 1)]
g(k, m + 1)
r=t+2−N −m k=t+2−N −m
Note that
∞
X
r
Y
!.
g(k, m + 1) < ∞ (from Athreya, Roy and Sarkar (2004))
r=t+2−N −m k=t+2−N −m
and so we may obtain a t0 such that, for all t ≥ t0 ,
(i) 1 ≤ 1 +
∞
X
r
Y
g(k, m + 1) < 1.1 and
r=t+2−N −m k=t+2−N −m
N +m+1
(ii) [1 − pG(t + 1)]
1+
∞
X
r
Y
!
g(k, m + 1)
r=t+2−N −m k=t+2−N −m
This choice of t0 ensures that for all t ≥ t0 we have
∞
X
t=m+1+N
σt
∞
X
r=t+1−N
r−m−1
Y
τt+1
τt
> 0.9.
< 1.1/1.9, and hence
g(k, m + 1) < ∞.
k=1
Thus the first term on the right of (14) is finite.
A similar calculation and a use of ratio test shows that the second term on the right
of (14) is finite, thereby showing that the sum in (14) is finite.
Reordering the second sum in (11) and using the notation we introduced earlier, we
have
∞ X
i−1
X
i=N t=0
N
−1 X
∞
∞ X
∞
X
X
G(t)
σt Pp (Ai,i ).
Pp (Ai,i ) =
σt Pp (Ai,i ) +
1 − pG(t)
t=0
i=t+1
i=N
(16)
t=N
From the end of Section 3.1 of Athreya, Roy and Sarkar (2004) we know that with N as
PN −1 P∞
P∞
above, i=N σt Pp (Ai,i ) < ∞ and hence t=0
i=N σt Pp (Ai,i ) < ∞.
Expanding the term Pp (Ai,i ), we have
∞ X
∞
X
t=N i=t+1
σt Pp (Ai,i ) =
∞ X
∞
X
t=N i=t+1
11
σt
i−1
Y
l=0
[1 − pG(l)]
2l+1
(17)
Taking at := σt
see that
P∞
i=t+1
at := σt
Qi−1
t
Y
l=0
[1 − pG(l)]
[1 − pG(l)]
2l+1
2l+1
l=1
from which we have
and lt :=
P∞
r=t+2
Qr
l=t+2
[1 − pG(l)]
2l+1
, we
n
o
2t+3
1 + [1 − pG(t + 1)]
(1 + lt ) ;
2t+3
at+1
[1 − pG(t)] [1 − pG(t + 1)]
(1 + lt )
G(t + 1)
=
2t+3
at
G(t) [1 − pG(t + 1)] 1 + [1 − pG(t + 1)]
(1 + lt )
2t+2
=
(1 + lt )
G(t + 1) [1 − pG(t)] [1 − pG(t + 1)]
2t+3
G(t)
1 + [1 − pG(t + 1)]
(1 + lt )
≤
(1 + lt )
G(t + 1) [1 − pG(t + 1)]
2t+3
G(t) 1 + [1 − pG(t + 1)]
(1 + lt )
2t+2
Also, with a as in (4),
Qr+1
l=t+2
Qr
l=t+2
[1 − pG(l)]
2l+1
[1 − pG(l)]
2l+1
2r+3
= [1 − pG(r + 1)]
pη
< 1−p
r+1
2r+3
< a for r ≥ N,
so, by the ratio test lt < ∞ for t ≥ N . Now, since lt → 0 as t → ∞, from the remark
2t+2
following (4) we may obtain a t0 such that for t ≥ t0 , we have [1 − pG(t + 1)]
(1 + lt ) <
G(t+1)
a < 1. Also G(t) < 1 for all t, thus
at+1
< a for all t ≥ t0 ,
at
and by ratio test we have that the sum in (16) is finite.
This completes the proof of Proposition 1.6 (ii).
References
1. Athreya, S., Roy, R. and Sarkar, A. (2004). On the coverage of space by random
sets. Adv. Appl. Probab. (SGSA), 36, 1–18.
2. Chiu, S.N, Stoyan, D., N., Kendall, W.S., V. and Mecke, J. (2013). Stochastic
geometry and its applications 3rd Ed., John Wiley, Chichester.
12
3. Gallo, S., Garcia, N., Junior, V. and Rodríguez, P. (2014). Rumor Processes
on N and discrete renewal processes. J. Stat. Physics, 155, 591–602.
4. Hall, P. (1988). Introduction to the theory of coverage processes John Wiley, New
York.
5. Junior, V., Machado, F. and Zuluaga, M. (2011), Rumor processes on N. J..
Appl. Probab., 48, 624–636.
6. Junior, V., Machado, F. and Ravishankar, K. (2016) The rumor percolation
model and its variations. arXiv:1612.03853.
13
| 10math.ST
|
A Note on Fault Tolerant Reachability for Directed Graphs
Loukas Georgiadis1
Robert E. Tarjan2
arXiv:1511.07741v1 [cs.DS] 24 Nov 2015
February 26, 2018
In this note we describe an application of low-high orders [2] in fault-tolerant network design.
Baswana et al. [1] study the following reachability problem. We are given a flow graph G = (V, A)
with start vertex s, and a spanning tree T = (V, AT ) rooted at s. We call a set of arcs A′ valid if
the subgraph G′ = (V, AT ∪ A′ ) of G has the same dominators as G. The goal is to find a valid set
of minimum size. Baswana et al. [1] show that there is a valid set containing at most n − 1 arcs,
and they give an algorithm to compute a minimum-size valid set in O(m log n) time, where n = |V |
and m = |A|. Their algorithm is based on generalizing the notion of semi-dominators [3] from a
depth-first spanning tree to an arbitrary spanning tree.
Here we give a simple algorithm, Algorithm 9 below, to compute a minimum-size valid set in
O(m) time, given the dominator tree D and a low-high order of it. Since D and a low-high order
can be computed in O(m) time [2], so can a minimum-size valid set.
Algorithm 9: Construction of a minimum-size valid set A′
Initialize A′ to be empty. For each vertex v 6= s, apply the appropriate one of the following cases,
where t(v) and d(v) are the parent of v in T and D respectively (d(v) is the immediate dominator
of v):
Case 1: t(v) = d(v). Do nothing.
Case 2: t(v) 6= d(v) and (d(v), v) ∈ A. Add (d(v), v) to A′ .
Case 3: (d(v), v) 6∈ A.
Subcase 3a: t(v) > v. Add to A′ an arc (x, v) with x < v.
Subcase 3b: t(v) < v. Add to A′ an arc (x, v) with x > v and x not a descendant of v in D.
Theorem 1. The set A′ computed by Algorithm 9 is a minimum-size valid set.
Proof. First, we show that in each occurrence of Cases 2 and 3, an arc will be added to A′ . This is
obvious for Case 2. To show that this is true for Case 3, we use the definition of a low-high order
[2, Section 2]: for any vertex v 6= s such that (d(v), v) 6∈ A, there are two arcs (u, v) and (w, v)
such that u < v < w and w is not a descendant of v in D. Only one of these arcs can be in T . It
1
Department of Computer Science & Engineering, University of Ioannina, Greece. E-mail: loukas@cs.uoi.gr.
Department of Computer Science, Princeton University, 35 Olden Street, Princeton, NJ, 08540, and Intertrust
Technologies. E-mail: ret@cs.princeton.edu.
2
1
follows that in both Case 3a and Case 3b, there is an arc that satisfies the stated constraint, and
hence such an arc will be added to A′ .
Second, we show that A′ is valid. To do this, we use the notion of a pair of divergent spanning
trees from [2]. Two spanning trees B and R, both rooted at s, are divergent if, for every vertex
v, the paths from s to v in B and R have only the dominators of v in common. Algorithm 1′
below, which simplifies Algorithm 1 in [2] as discussed just before Theorem 2.10 in [2], constructs
two divergent spanning trees, provided that each step is successful: the proof of Theorem 2.8 in [2]
applies to Algorithm 1′ equally as well as to the original Algorithm 1. Indeed, as does Algorithm
1, Algorithm 1′ constructs a pair of strongly divergent spanning trees, but here we need only the
weaker property of divergence.
Algorithm 1′ : Construction of Two Divergent Spanning Trees B and R
Let D be the dominator tree of flow graph G = (V, A), with a preorder that is a low-high order of
G. For each vertex v 6= s, apply the appropriate one of the following cases to choose arcs (b(v), v)
in B and (r(v), v) in R:
Case 1: (d(v), v) ∈ A. Set b(v) = r(v) = t(v).
Case 2: (d(v), v) 6∈ A. Choose two arcs (u, v) and (w, v) such that u < v < w in low-high order
and w is not a descendant of v in D. Set b(v) = u and r(v) = w.
Suppose we apply Algorithm 1′ to G, but only allow it to choose arcs that are in subgraph G′ .
Suppose Case 1 of Algorithm 1′ applies to v. Then (d(v), v) is in G. But the construction of A′
guarantees that (d(v), v) is in G′ as well. Hence this case will add an arc in G′ , namely (d(v), v), to
both B and R. Suppose Case 2 of Algorithm 1′ applies to v. Then (d(v), v) is not in G. Algorithm 9
will apply Case 3 to v, which guarantees that G′ contains arcs (u, v) and (w, v) such that u < v < w
(in low-high order) and w is not a descendant of v in D: if t(v) > v, t(v) cannot be a descendant of
v in D since there is a v-avoiding path in T from s to t(v). Hence this case can successfully choose
arcs in G′ to add to B and R. We conclude that G′ contains two spanning trees that are divergent
in G. It follows that if v dominates w in G′ , v dominates w in G. The converse is immediate, since
G′ is a subgraph of G. Thus A′ is valid.
Finally, we show that A′ is minimum-size. Set A′ contains an arc (u, v) only if t(v) 6= d(v).
Any valid set must contain an arc entering v, since otherwise t(v) dominates v in G′ , contradicting
validity.
References
[1] S. Baswana, K. Choudhary, and L. Roditty. Fault tolerant reachability for directed graphs.
In Yoram Moses, editor, Distributed Computing, volume 9363 of Lecture Notes in Computer
Science, pages 528–543. Springer Berlin Heidelberg, 2015.
[2] L. Georgiadis and R. E. Tarjan. Dominator tree certification and divergent spanning trees.
ACM Transactions on Algorithms, 12(1):11:1–11:42, November 2015.
[3] T. Lengauer and R. E. Tarjan. A fast algorithm for finding dominators in a flowgraph. ACM
Transactions on Programming Languages and Systems, 1(1):121–41, 1979.
2
| 8cs.DS
|
Finite Element Model Updating Using Fish School
Search Optimization Method
Boulkabeit I *, Mthembu L * Marwala T * and De Lima Neto, F †
*The
Centre For Intelligent System Modelling (CISM), Electrical and Electronics Engineering Department, University of
Johannesburg, PO Box 524, Auckland Park 2006, South Africa, e-mail: iboulkaibet@student.uj.ac.za
†
Polytechnic School of Pernambuco, University of Pernambuco, Recife, Brazil, e-mail: fbln@ecomp.poli.br
Abstract—A recent nature inspired optimization algorithm, Fish
School Search (FSS) is applied to the finite element model (FEM)
updating problem. This method is tested on a GARTEUR SMAG19 aeroplane structure. The results of this algorithm are
compared with two other metaheuristic algorithms; Genetic
Algorithm (GA) and Particle Swarm Optimization (PSO). It is
observed that on average, the FSS and PSO algorithms give more
accurate results than the GA. A minor modification to the FSS is
proposed. This modification improves the performance of FSS on
the FEM updating problem which has a constrained search
space.
Keywords: Finite Element Model (FEM); Fish School Search
(FSS);Genetic Algorithm (GA); Particle Swarm Optimization
(PSO)
1.
INTRODUCTION
A finite element model (FEM) is a numerical method used to
provide approximate solutions to the analysis of complex
engineering systems [1, 2, 20]. In mechanical engineering, the
FEM method is often used for computing displacements,
stresses and strains in structures under different input
conditions. In electrical engineering it might be used to model
systems that experience electromagnetic fields. However,
FEMs only produce accurate solutions to simple engineering
problems. In complex systems, FEM results are different from
those obtained from physical experiments [3, 4, 20]. These
differences can be the result of; the approximations made in
the geometric construction the system model and/or the
description of some system parameters e.g. joints. Therefore
the initial FE model needs to be automatically and intelligently
updated so as to match the measured experimental data.
There are currently two main approaches to FEM updating;
direct and indirect methods [1, 6]. In the direct method the
measured data are directly equated to the FEM output. This
naturally constrains the updating to FE system matrices (mass,
stiffness etc) only. In the indirect (or iterative) approach the
FEM outputs are not constrained to equal the measured data
thus allowing both the system matrices and the model output
to be variable. The updating problem is then how to minimise
the difference between the measured data and the FEM output,
given these “free” variables i.e. this is a classic optimization
problem.
Another way of looking at this model updating problem is that
we know what the model results should be, the problem is to
identify the system that generate the results. So FEM updating
can also be seen as a system identification problem which is
made more difficult by the often large number of uncertain
parameters.
Furthermore in FEM unlike in artificial models, the problem
under consideration is a real physical system. Thus the
updated parameters have physical meaning. This places
significant limits on possible uncertain-parameter update
values. This is one of the main criticisms of direct updating
methods discussed above [1].
In the recent years, nature inspired optimization techniques,
commonly referred to as metaheuristic, have shown promising
results in systems identification research [5]. Many
optimization methods such as Simulated annealing (SA),
Genetic algorithm (GA) and Particle Swarm optimization
(PSO) have been used for FEM updating [6, 7, 8]. In this
paper we compare the performance of the recently introduced
Fish School Search (FSS) algorithm [10] to the performance
of the former algorithms on the FEM updating problem.
2.
EVOLUTION SEARCH
2.1 Introduction
All nature-inspired search algorithms are population based
and have the same structure [9]. They all have a population of
individuals which move around the problem space searching
for the solution to the problem. The dimension of the search
space is normally defined by the number of uncertain
function/problem parameters. All the individuals are potential
solutions to the problem at hand. The following generally
occurs for the individuals during the search process in all the
above algorithms:
Individuals are randomly initiated, in the beginning
there is no bias to any particular point in the search
space;
Individuals interact to varying degrees at a local
(exploitation) and global (exploration) level;
Individuals are all evaluated during the search
process;
There is a level of randomness at all stages of the
search process.
The novelty between algorithms is mainly how the potential
solutions search/move (or update) in the problem space and
how they interact (and or communicate) to each other.
The next section briefly describes the different algorithms
compared in this paper. In section three the modeled structure
is described and in section four the simulation results are
presented. Section five concludes the paper.
2.2 Particle Swarm Optimization (PSO)
PSO was introduced by Kennedy and Eberhart [7]. It is
based on the foraging behavior of a flock of birds (particles).
As a standard in all PSO algorithms [6, 7, 8] each individual (i)
is composed of three vectors: its position in the search space
(size d) is given by xi ( xi1 , xi2 , xi3 ,.....xid ) , the best position it
has
found
pi ( pi , pi , pi ,..... pi )
1
2
3
d
and
its
velocity
v i ( v i , v i , v i ,..... v i ) . The position and the velocity are
initialized randomly in the search space.
1
2
3
d
The particles move around the search space by updating
their velocity and position vectors. For the current context each
position on the search space is a candidate solution to the FEM
updating problem. The velocity can be updated using various
equations; in this paper we use the PSO version with the inertia
weight not the constriction factor [7].
The velocity update equation for particle i is given by:
v i wv
d
d
i
c 1 r1 ( p i x i ) c 2 r2 ( p g x i )
d
d
d
d
(1)
where w is the inertia weight introduced to adjust the
influence of the previous velocities on the optimization
process. A large inertia weight value helps in global
exploration, while a small one helps in searching within
nearby areas. The inertia weight used in this paper is given by:
w
max ter iter
(2)
max iter
The position vector is then updated using
xi xi vi
d
d
d
(3)
(detailed in §3) the problem space d =8.
In GAs an
individual’s make-up ( x i ) is described by the chromosome
vector itself. Unlike in PSO and FSS where there is a defining
equation for how an individual moves through the search
space, in GAs that notion is achieved by selection,
reproduction and mutation between and of individuals. This
allows the algorithm to gradually converge to better solutions
over generations.
2.4 Fish School Search (FSS)
This method was inspired from the behavior of a school of
fish and was first thought by Bastos Filho and Lima-Neto in
2007, subsequently proposed in 2008 [10].
Similar to PSO and GA, the search process in FSS is
carried out by a population of individuals, i.e. fish, which have
a certain level of local and global behavior. The problem space
is said to have food (possible solutions) scattered in different
concentrations of the aquarium (i.e. search space) and the fish
are considered to ‘feed’ at these different positions as they
search.
In FSS, searching is referred to as swimming. This action is
achieved via three effectors; individual movement, collectiveinfluence movement and school performance (called collectivevolitive) movement. The initial individual position is random.
Thereafter the movement is given by:
x i ( t ) x i ( t 1 ) rand ( 1,1 ) step
(4)
The larger this value is the more successful the fish has
been in searching for food. The weight value is constrained to
vary between 1 and w scale . All fish are initialized with a weight
of half w scale . The weight of each individual in the population is
updated using Equation 5:
w i ( t ) w i ( t 1)
f [ x i ( t )] f [ x i ( t 1 )]
where
f
(5)
f [ x i ( t )] f [ x i ( t 1 )] |}
max{|
c 2 are the local and global influence factors respectively.
Perhaps, the Genetic Algorithm (GA) is one of the first
metaheuristic (of the nature inspired algorithms) used for
optimization [6, 9, 22]. The idea stems from the way biological
genes (more specifically chromosomes) of parents are
combined to produce better and better off-springs over
generations.
( t 1)
where rand is a random number uniformly generated in the
interval [-1,1] and step ind is an individual step size. The step
size decreases linearly during the search process so as to
exploit later positions in the search process. Before movement
to any particular point is taken the fish evaluates whether the
food in that direction is better than at its current position. The
fish then feeds. Individuals in FSS ‘store’ their previous
performance information via their weight w i (t ) .
The r1 and r 2 are independent random numbers and c 1 and
2.3 Genetic Algorithm
ind
is the finite element model and
f (xi )
computes the
fitness of each fish in the school. After the individual
movements a weighted average of all the fish is calculated.
This biases the future movement of fish towards those fish that
had a successful previous movement. The resultant fish
movement is calculated using:
N
In the current context a potential solution to the FEM updating
problem is modeled as a vector of chromosomes. Each
chromosome is an uncertain parameter of the function to be
optimized. Again for the current FEM updating structure
x i ( t ) x i ( t 1)
x ind { f [ x i ( t )] f [ x i ( t 1 )] }
i 1
N
{ f [x
i 1
i
( t )] f [ x i ( t 1 )]}
(6)
where x ind is the individual displacement of the fish and N
is the number of fish in the school. This is the collective –
influence effector. The fish complete the swim movement with
the collective - volitive adjustment step. This step takes into
account how the whole school is performing so far. This step
requires the calculation of the average weighted school
position called the barycenter at time t:
N
B (t )
x i (t ) w i (t )
i 1
(7)
N
x i (t )
i 1
The final fish position will depend on whether the weight of
the school has increased or decreased, this is given by
Equations 8 and 9 respectively. The Equation 8 will be
evaluated in the case that the weight has been increased.
However, the Equation 9 will be used when the weight
decreases:
x i ( t ) x i ( t 1 ) step
vol
rand
x i ( t ) x i ( t 1 ) step
vol
rand
{ x i ( t 1 ) B ( t 1 )}
(8)
dist ({ x i ( t 1 ), B ( t 1 )}
{ x i ( t 1 ) B ( t 1 )}
3.
MODELLED STRUCTURE AND FE MODEL
All the finite element modeling was simulated using
version 6.2 of the Structural Dynamics Toolbox (SDT®) under
MATLAB® environment. In this paper, a GARTEUR SMAG19 aeroplane structure is used to investigate the
optimization capability of the four algorithms. The GARTEUR
SM-AG19 structure was used as a benchmark study by 12
members of the GARTEUR Structures and Materials Action
Group 19 [13, 14, 19]. One of the aims of the study was to
compare the different computational model updating
procedures on a single common test structure [12, 13, 15, 16,
19, 18]. The benchmark study also allowed participants to test
a single representative structure using their own test equipment.
The experimental test data used in our analysis is data obtained
by the University of Manchester (U MAN) .
The above aeroplane has a length of 1.5 m and a width of
3m. The depth of the fuselage is 15cm with a thickness of
5cm. Figure 1 shows the FE model of the aeroplane. In our
models all element materials are considered standard isotropic.
The model elements are Euler–Bernoulli. The measured
natural frequency (Hz) data is: 6.51, 16.37, 33.44, 33.97,
36.17, 49.41, 50.2, 55.61, 64.04, 69.39.
(9)
dist ({ x i ( t 1 ), B ( t 1 )}
The parameter rand is a random number uniformly generated
in the interval [0,1].The step vol is used to control the
displacement from or to the barycenter and it is decreased
linearly as the search proceeds. The dist ( x , y ) is the Euclidian
distance between x and y.
This final positioning based on the average school weight
increasing or decreasing effectively implements the space
exploitation or exploration concept respectively. The fish
exploit a particular area of space if the school collectively
gains weight (i.e. school radius reduce) or otherwise explores
other areas by expanding away from the barycenter if the
school looses weight.
2.5 Fish School Search biased (FSSb)
The original FSS algorithm is slightly modified by giving
more influence to results that seems to be more promising. This
was done by simply altering the feeding of fish. A variable ,
which allows for selective allocation of more weight to better
search results is introduced to Equation 5. Obviously, this
parameter is problem specific. The new equation is then:
w i ( t ) w i ( t 1)
f [ x i ( t )] f [ x i ( t 1 )]
max{|
Figure 1 FEM Garteur Structure
The
(
parameters to be updated are the right wing
), the left wing (
), Vertical tail
) and the overall structure’s density ). The search
space is thus x d 8 .
The initial position vector, x i (t ) , for all algorithms is given by E
=[
,
Table 1 The initial vector position for all algorithms
Parameter
(10)
f [ x i ( t )] f [ x i ( t 1 )] |}
(
2700
8.3
8.3
8.3
4.0
Parameter
where
(
4.0
{
]
(11)
8.3
I.
4. SIMULATION RESULTS
The weight is bounded by:
In all simulations the number of iterations is set to 500.
4.1 PSO Settings
In the PSO algorithm, the population number is set to 20, and
constants
are set to be 2. The particle position and
velocity elements are bounded as shown in Table 2
Table 2 Particle position and velocity bounds
Max_position
Min_position
Max_velocity
10
Min_velocity
-10
w scale
.
Each algorithm is executed 30 times where the average
solutions of these runs are presented in Table 5 and 6. Table 5
presents the initial value (the mean material or geometric
values) of the update vector , as well as the updated values
obtained by each method. The updated parameters obtained by
GA, PSO, FSS and FSSb techniques are close to the mean
values i.e. they are physically realistic for the given structure.
In general, the updated vector obtained from GA, PSO and
FSS algorithms are different from each other and this because
of the way that each algorithm functions to generate the
solution. The FSS and FSSb have very close update vector
where involving the global and the local best position slightly
affected the updated vector . PSO and FSS techniques give
updated vectors that are more similar to each to those obtained
by the GA algorithm.
Table 5 Initial and updated parameter values
Initial
E
vector,
GA Method
2573.7
vector,
PSO
Method
2682.7
vector,
FSS
Method
vector,
FSSb
Method
4.2 GA settings
Table 3 shows the parameter setting used in the GA algorithm.
Table 3 GA parameter settings
Population (N)
Mutation rate (mutr)
Selection Rate (selcr)
20
0.2
0.5
As in the PSO algorithm the chromosomes in the genetic
algorithm are bounded by the values shown in Table 2.
4.3 FSS settings
In FSS algorithm the fish population is 20. The population
positions are bounded according to table 2. The
and
are a percentage of the search space amplitude and are
bounded by two vector parameters according to Table 4:
Table 4 FSS parameter settings
30
-30
.
Table 6 shows the output errors of the different optimization
algorithms. In general, the results show that the updated FEM
natural frequencies are better than the initial FEM for all
methods (see the total (T) error in Table 6). The error between
the second measured natural frequency and that of the initial
model was 6.303%. With the GA method this error was
reduced to 0.915% and by implementing the PSO it was
reduced to 0.763%, and when the FSS and FSSb are
implemented, the error reduced to 0.727% and 0.651%
respectively. The same comment can be made for the third,
fourth, seventh, eighth, ninth and the tenth natural frequencies.
The PSO, FSS and FSSb give results that are better than the
GA algorithm. On the other hand, GA converges faster to a
local minimum, see figure 2. FSS and FSSb converge within
the first 15 iterations. PSO, FSS and FSSb algorithms have
almost the same asymptotic point (around 70 to 75 iterations).
There is no significant difference between the total errors
obtained for the PSO, FSS and FSSb [21].
Table 6 Natural Frequencies and Errors when GA, PSO, FSS and FSSb methods are used to update the FEM
Mode
Measured
Frequency
(Hz)
Initial
FEM
Frequency
(Hz)
Error
(%)
Frequencies
GA Method
(Hz)
Error
(%)
Frequencies
PSO
Method
(Hz)
Error
(%)
Frequencies
FSS
Method
(Hz)
Error
(%)
Frequencies
FSSb
Method
(Hz)
Error
(%)
1
6.51
5.726
12.047
6.247
4.037
6.237
4.195
6.232
4.266
6.224
4.396
2
16.37
15.338
6.303
16.22
0.915
16.495
0.763
16.489
0.727
16. 77
0.651
3
33.44
32.457
2.939
33.086
1.057
33.306
0.399
33.278
0.486
33.350
0.269
4
33.97
35.323
3.984
34.949
2.882
34.154
0.542
34.127
0.461
34.222
0.742
5
36.17
36.020
0.414
36.284
0.316
35.908
0.724
35.896
0.759
35.925
0.678
6
49.41
44.992
8.941
49.05
0.728
48.839
1.156
48.799
1.237
48.730
1.377
7
50.20
54.685
8.934
53.964
7.499
52.938
5.455
52.903
5.384
52.834
5.248
8
55.61
55.753
0.257
54.603
1.811
55.512
0.176
55.574
0.065
55.603
0.012
9
64.04
60.021
6.276
63.695
0.538
64.16
0.187
64.130
0.140
64.068
0.043
10
69.39
68.745
0.929
70.326
1.349
68.922
0.675
68.868
0.752
68.768
0.859
T error
%
______
______
51.024
______
21.132
______
14.272
______
14.277
______
14.275
The modified FSS algorithm, FSSb, outrank PSO on six out of
the 10 modes. For example the error of the second mode was
reduced to 0.763 % by the PSO algorithm while the FSSb
method reduced it to 0.651 %. The same comment can be made
for the third, fifth, seventh, eighth and ninth natural
frequencies. Figure 3 shows a magnified plot of the cost
function at higher iteration counts.
Figure 2 FEM cost function vs. iterations
It is difficult to make a decisive conclusion from Table 6 and
Figure 2 when comparing the FSS, FSSb and PSO algorithms.
The difference between the algorithm results is on the different
natural modes. The FSS algorithm has smaller errors than PSO
in five of the modes and PSO has smaller errors than FSS for a
different set of five modes. On average the total error between
these algorithms is similar as shown in figure 2.
Figure 3 Magnified FEM cost function vs. iterations
Figure 3 also shows that the total error of the PSO algorithm is
slightly better than both FSS and FSSb algorithms, even though
as commented it does not converge as fast. The monification
proposed in FSSb seemed to slightly improve results over
“vanilla” FSS. The algorithm errors do not improve after the
magnified region.
5. CONCLUSION
[7]
[8]
In this paper the finite element model updating problem is
addressed using a recently proposed nature inspired
optimization algorithm. Three of these metaheuristic methods;
the genetic algorithm (GA), particle swarm optimization
(PSO) and fish school search (FSS) algorithms are tested on
the updating of the GARTEUR SM-AG19 FEM structure. A
slight modification to the recent FSS algorithm is proposed
and tested; we called it FSSb (‘b’ for bias).
[9]
The simulation results show that the FSS, FSSb and the PSO
algorithms give more accurate results than those obtained by
the GA algorithm. On the other hand, the GA algorithm has a
faster convergence rate than the former although it
prematurely converges. The modification on FSS algorithm
improves the results of the FEM over the PSO algorithm.
However, the PSO algorithm gives slightly better total error
than those obtained by both FSS and FSSb algorithms.
[12]
[10]
[11]
[13]
[14]
[15]
Further work will consider the differences between the above
methods and the density based FSS algorithm (dFSS) [21].
Our preliminary analysis reveals that the FSSb algorithm may
be more suited for applications that have a discretized search
space, such as in FEM. But this has to be further verified in
other domains.
[16]
[17]
[18]
REFERENCES
[1]
Friswell M.I, Mottershead J.E, Finite element model updating in
structural dynamics, Kluwer Academic Publishers: Boston, 1995.
[2]
Leonard J.W, Khouri B.R, System identification using a standard
finite element program, Engineering Structures 7 (3) (1985), 190-197.
[3]
Levin M.I, Lieven N.A.J, Dynamic finite element model updating
using simulated annealing and Genetic Algorithms, Mechanical
Systems and Signal Processing 12 (1) (1998) 91–120.
Marwala T, Finite element model updating using wavelet data and
Genetic Algorithm, Journal of Aircraft, 39 (4) (2002) 709-711.
[19]
[20]
[21]
[4]
[5]
[6]
Panigrahi S.K, Chakraverty S, Mishra B.K. Vibration based damage
detection in a uniform strength beam using genetic algorithm,
Meccanica, Springer, 44, (2009), 697 – 710.
Marwala T, Finite element model updating using computational
intelligence techniques: Applications to structural dynamics, 2010
Heidelberg: Springer ISBN 978-1-84996-322-0.
[22]
Kennedy J, Eberhart R, Particle swarm optimization, In Proceedings
of the International Conference on Neural Networks IV (1995) 19421948 IEEE.
Bratton D, Kennedy J, Defining a standard for Particle Swarm
Optimimzation. Proceedings of the 2007 IEEE Swarm Intelligence
Symposium (SIS 2007).
Goldberg, D.E, Genetic Algorithms in search, optimization and
machine learning, Reading, MA: Addison Wesley, 1989 ISBN:
0201157675.
C. J. A. B Filho., F. B. de Lima Neto, A. J. C. C.. Lins, A. I. S.
Nascimento., and M. P. Lima, , "A novel search algorithm based on
fish school behavior," Systems, Man and Cybernetics, SMC 2008.
IEEE International Conference on, 2008, pp. 2646-2651.
Link M, Friswell MI, Generation of validated structural dynamic
models - Results of a benchmark study utilizing the GARTEUR SMAG19 Testbed, Mechanical Systems and Signal Processing, COST
Action Special Issue, 17(1) January 2003, 9-20.
Mottershead J.E, Friswell M.I, Model updating in structural dynamics
- A Survey, Journal of Sound and Vibration, 167 (2) (1993) 347-375.
Carvallo J, Datta B.N, Gupta A, Lagadapati M, A direct method for
model updating with incomplete measured data and without
spurious modes, Mechanical Systems and Signal Processing 21 (7)
2715-2731.
Datta B.N, Finite element model updating, eigenstructure
assignment and eigenvalue embedding techniques for vibrating
systems, Mechanical Systems and Signal Processing 16 (2002), 83-96.
Adhikari S, Friswell M.I, Distributed parameter model updating
using the Karhunen-Loeve expansion, Mechanical Systems and Signal
Processing 24(2) (2010) 325-339.
Horibe T, Takahashi K, Crack Identification in beam using Genetic
Algorithm and three dimensional P-FEM, Journal of Solid Mechanics
and Materials Engineering 1 (7) (2007) 886-894.
Hirotugu A, A new look at the statistical model identification, IEEE
Transactions on Automatic Control 19 (6) (1974), 716–723.
Leonard J.W, Khouri B.R, System identification using a standard
finite element program, Engineering Structures 7 (3) (1985), 190197.
Guyon I, Elisseeff A, An introduction to variable and feature
selection, Journal of Machine Learning Research 3 (2003), 1157-1182.
Boulkaibet I., Marwala T., Mthembu L., Friswell M. I. and Adhikari S.:
Sampling Techniques in Bayesian Finite Element Model Updating,
Proceedings of the Society for Experimental Mechanics, Vol. 29 pp. 7583, 2012.
Madeiro S. S., Lima Neto F. B., Filho C.J.A.B, and Figueiredo E. M. N
, ”Density as the segregation mechanism in fish school search for
multimodal optimization problems”, Advances in Swarm Intelligence.
ICSI 2011. Int’l Conference on, vol. 2, 2011, pp. 563-572.
Holland, J. H.: Adaptation in Natural and Artificial Systems. Ann
Arbor: University of Michigan Press, 1975.
| 9cs.NE
|
Asymptotic equivalence of paired Hotelling test and
conditional logistic regression
arXiv:1610.06774v1 [math.ST] 21 Oct 2016
Félix Balazard1,2
1
2
Sorbonne Universités, UPMC Univ Paris 06, CNRS
INSERM U1169, Hôpital Bicêtre, Université Paris-Sud,
felix.balazard@inserm.fr
Abstract
Matching, the stratification of observations, is of primary importance for the analysis of
observational studies. We show that the score test of conditional logistic regression and the
paired Student/Hotelling test, two tests for paired data, are asymptotically equivalent.
Keywords: matching, conditional logistic regression, asymptotic equivalence, paired
Student test, observational studies.
1
Introduction
Observational studies are the main source of information in many areas of science such
as epidemiology or the social and political sciences (Rosenbaum, 2002). Such studies aim
at estimating the effect of a treatment on an outcome and they differ from randomized
experiments by the absence of random allocation of treatment. This lack of randomization
is due to ethical or economical considerations and as a consequence, observational studies
are subject to confounding. In the typical context of an observational study, we have n
observations of a random outcome Y and a random predictor or treatment X. The analysis
is complicated by the possibility of confounding i.e., the influence of a third variable Z on X
or Y . To take an example, suppose Y is lung cancer, X is yellow coloration of the teeth and Z
is smoker status. If we do not take into account Z, we will find an association between Y and
X but if we control for Z, the association will disappear since both lung cancer and yellow
coloration of the teeth are caused by smoking. In a randomized experiment, randomization
will ensure that the treated and non-treated group have similar values for all confounders.
Matching is an important method to control for bias in observational studies. Matching is
the grouping of observations in strata. Such a grouping is necessary when the observations in
a strata cannot be considered independent. For example, consider a continuous variable, such
as blood pressure, which is measured before and after the beginning of a medical treatment
given to a group of patients. In order to show that the treatment is effective, an incorrect
1
approach would be to compare the mean of the group before treatment to the mean after
treatment using a two-samples Student test. This naive approach relies on the unwarranted
assumption of independence of the measurement of the same patient before and after the
treatment. The correct approach is to compute the difference between blood pressure before
and after treatment for each patient and then to test if the differences have zero mean using
a Student test. This is called the paired Student test. In this simple example, the stratas
are the pairs of observations of the same patient.
In presence of confounding, matching on the values of the confounder remove bias (Rubin,
1973) or when there are several confounders, other techniques based on matching can be
used (Rosenbaum and Rubin, 1983). Matching can also guide the data collection of an
observational study. This is best illustrated by the case-control study in epidemiology. Such a
study begins by gathering disease cases for example at hospitals. The recruitment of controls
is less straightforward than the recruitment of cases and must try and limit confounding.
One way of achieving this is to choose controls that are naturally matched to cases: for
each case, controls are chosen among friends or neighbors whose –potentially unobserved–
confounders are similar to that of the case. As the case and his controls have been chosen
for their similarity, they cannot be considered independent and must be grouped in a strata.
Once a matching is obtained, adapted statistical procedures are needed and especially
statistically sound testing procedures. A good reference on statistical methods for matched
data is the monograph by Breslow and Day (1981). For strata limited to pairs of one case and
one control (or before and after treatment) and when the predictor X is a binary variable,
the so-called McNemar test can be used (McNemar, 1947). In this simple case, there are
only 4 possibilities for each pair. The data can be summarized in the following two-by-two
contingency table.
Table 1: McNemar test
Y =1
X=0 X=1
X=0
a
b
Y =0
X=1
c
d
In the table above, a + d is the number of pairs of a case and a control concordant for the
predictor X and b + c is the number of discordant pairs. The statistic ξmc of the McNemar
test depends only on the numbers of discordant pairs b and c and has the following form:
ξmc =
(b − c)2
.
b+c
Under the null hypothesis of independence between Y and X, ξmc follows the χ2 distribution
asymptotically (McNemar, 1947). This test statistic has the advantage of being computationally simple.
However, in many settings, we have access to more than one control for each case. For
example, in the Isis-Diab study (Balazard et al., 2016), each patient was asked to recruit two
controls . A test for strata of arbitrary size and a binary predictor was proposed in Mantel
and Haenszel (1959) and is now referred to as the Cochran-Mantel-Haenszel (CMH) test. It
2
also provides an estimate of the odd-ratio associated with the predictor. The original article
contains an interesting discussion of practical aspects of the prospective study of disease.
If the predictor is not binary but continuous, appropriate tests are available if the matching is a pairing i.e., each case has exactly one control. If the vector of differences between
cases and controls can be assumed to be normally distributed, a Student test can be applied on this vector to decide if its mean is zero as in our first example. The resulting test
is called the paired Student test (McDonald, 2009, p180-185). The paired Hotelling test
is the generalization of the paired Student test when there are several predictors. When
the normality assumption is not respected, a non-parametric alternative is available via the
Wilcoxon signed rank test.
None of the above procedures allow for analysis of continuous variables with arbitrary
strata size. This was made possible by conditional logistic regression (CLR) first introduced
in Breslow et al. (1978). CLR is however not limited to continuous variables and can be
applied in all settings of the previous tests. As CLR is based on logistic regression, it is more
flexible than the previous tests and allows for multivariate analyses.
When different statistical tests are available for the same data, it is desirable to prove
that their results are similar. For procedures based on maximum likelihood such as CLR,
the three tests of significance for predictors (the Wald test, the likelihood ratio test and the
score test) have been shown to be asymptotically equivalent (Engle, 1984). This result of
asymptotic equivalence is with respect to the null hypothesis as well as to a sequence of local
alternatives.
For the analysis of matched data with a binary predictor, the available tests have been
shown to be identical. When the strata are pairs, both the CMH test and the McNemar test
can be applied and their statistic is identical (Agresti and Kateri, 2011, p413). When the
strata size is arbitrary, CMH and CLR can be applied and the CMH statistic is identical to
the score test statistic of CLR (Day and Byar, 1979) and therefore if the strata are pairs,
the McNemar statistic will be identical to the score test statistic of CLR.
When the strata are pairs and the predictor (resp. predictors) is continuous, the paired
Student test (resp. paired Hotelling test) and CLR can be applied. However, to the best of
the author’s knowledge, there are no results comparing the two procedures in that case. The
objective of this note is to prove that the paired Hotelling test is asymptotically equivalent
to the score test of CLR and therefore also to the Wald and likelihood ratio tests.
We start by deriving the exact form of the two test statistics in section 2. Finally, we
present our result and prove it in section 3.
2
Test statistics
Let Yi` be the label of the `-th individual of the i-th stratum and Xi` ∈ Rp its continuous
predictor value. The paired Hotelling test can be applied when stratas are pairs of discordant
observations and therefore ` ∈ {1, 2}. Without loss of generality, we can assume that Yi1 = 1
and Yi2 = 0.
We are interested in testing the null hypothesis:
H0 : There is no association between Y and X
3
(1)
against the alternative hypothesis:
H1 : There is an association between Y and X.
To test this null hypothesis in this setting, we have two options: the paired Hotelling
test whose test statistic we denote ξhot or CLR whose score test statistic we denote ξsc . We
now derive the expressions of those two test statistics. As we will show below, the paired
Hotelling test and CLR depend only on the vector of differences between pairs. We therefore
denote Zi = Xi1 − Xi2 the difference between pairs.
Paired Hotelling test The hypotheses tested by the paired Hotelling test are expressed
by the parameter µ = (E[Zj ])j∈{1,...,p} , the mean of the difference between pairs. Using this
parameter, the hypothesis (2) becomes H0 : µ = 0.
Let the unbiased sample covariance be defined as:
n
C=
where Z̄ =
1
n
Pn
i=1
1 X
(Zi − Z̄)(Zi − Z̄)> ,
n − 1 i=1
Zi and ∗> is the transposition operator. The statistic of the test is:
ξhot = nZ̄ > C −1 Z̄.
(2)
When Z follows a centered Gaussian distribution, the distribution of ξhot is called the
Hotelling distribution.
Conditional Logistic Regression score test In logistic regression, the likelihood of an
observation, given the parameters α ∈ R and β ∈ Rp , equals:
>
ey(α+β X)
P(Y = y|X) =
,
>
1 + eα+β X
with y ∈ {0, 1}.
Logistic regression can take into account stratification by having a different constant term
αi for each stratum. However, when the strata are small e.g., pairs, this leads to a large
number of parameters and biases parameter estimation (Breslow and Day, 1981, p249-251).
Conditional logistic regression adresses the problem by conditioning the likelihood on the
number of cases in each stratum. This eliminates the need to estimate the αi . In the case
of pairings, when the first observation is a case and the second is a control, the conditional
likelihood of the i-th strata is:
4
P(Yi1 = 1, Yi2 = 0|Xi1 , Xi2 , Yi1 + Yi2 = 1)
P(Yi1 = 1|Xi1 )P(Yi2 = 0|Xi2 )
=
P(Yi1 = 1|Xi1 )P(Yi2 = 0|Xi2 ) + P(Yi1 = 0|Xi1 )P(Yi2 = 1|Xi2 )
=
=
=
exp(αi +β > Xi1 )
1+exp(αi +β > Xi1 )
×
1
1+exp(αi +β > Xi2 )
exp(αi +β > Xi1 )
exp(αi +β > Xi2 )
× 1+exp(α 1+β> X ) + 1+exp(α 1+β> X ) × 1+exp(α
>
1+exp(αi +β > Xi1 )
i
i2
i
i1
i +β Xi2 )
exp(β > Xi1 )
(The αi have been eliminated.)
exp(β > Xi1 ) + exp(β > Xi2 )
1
.
1 + exp(β > (Xi2 − Xi1 ))
In the general case, when there is k cases in a strata of size m, with the cases being the first
k observations, the conditional likelihood of a strata can be written:
P
m
X
exp( kj=1 β > Xij )
P(Yij = 1 for j ≤ k, Yij = 0 for j > k|Xi1 , . . . , Xim ,
Yij = k) = P
,
P
>
exp(β
X
)
m
ij
J∈C
j∈J
j=1
k
where Ckm is the set of all subsets of size k of the set {1, . . . , m}.
To obtain the full conditional likelihood, we multiply over each stratum and take the log
to obtain the log-likelihood L(β, Z):
L(β, Z) = −
n
X
log(1 + e−β
>
Zi
).
i=1
The score s(β, Z) is then defined by:
n
X
Zi
∂L
(β, Z) =
s(β, Z) =
.
>
∂β
exp(β Zi ) + 1
i=1
If β = β 0 , the covariance matrix of s(β 0 , Z) is Fisher’s information matrix:
!
n
X
Zij Zik exp(β >
Z
)
∂ 2L
i
0
I(β 0 ) = E[−
(β , z)|β 0 ]
=
>
∂β j ∂β k 0
(exp(β
Z
)
+
1)2
0 i
j,k∈{1,...,p}
i=1
.
j,k∈{1,...,p}
To test the hypothesis H0 : β = β 0 , the score test statistic is:
ξsc = s(β 0 , Z)> I(β 0 , z)−1 s(β 0 , Z)
Expressed using β, hypothesis (2) becomes H0 : β = 0. As shown above, the null
hypothesis of the paired Hotelling test is expressed using µ, the mean of the difference
between pairs, rather than β, the regression coefficient. There is no general correspondence
between the two parameters. However, the two null hypotheses that are of interest in practice
are the same: µ = 0 ⇐⇒ β = 0.
5
For β = 0, the score, Fisher’s information matrix and the test statistic become:
n
s(0, Z) = Z̄,
2
n
1X
Zi Zi>
I(0, Z) =
4 i=1
and
n
ξsc = nZ̄ >
1X
Zi Zi>
n i=1
!−1
Z̄.
(3)
Now that we have expressed analytically ξhot and ξsc , we state our result in the following
section.
3
Asymptotic equivalence
In this section, we introduce the sequence of local alternatives and state the result of asymptotic equivalence between the two tests.
We adopt the framework of Engle (1984) for asymptotic equivalence. The motivation for
considering a sequence of local alternatives is that any reasonable test will have the right
size and will reject a fixed alternative when the number of observations becomes large. The
sequence of local alternatives considers deviations from the null that approach the null as
sample size increases. This allows to compare tests more precisely.
(n)
We model the sequence of local alternatives by a triangular array of observations (Zi )n∈N,i∈{1,...,n}
that respects the following assumption. Let δ ∈ Rp and Σ be a positive definite matrix of
dimension p.
(n)
Assumption 1. For all n ∈ N, i ∈ {1, . . . , n}, we have E[Zi ] =
(n)
In addition, Wi
(n)
= Zi
−
√δ
n
√δ
n
(n)
and Cov[Zi ] = Σ.
are independent and identically distributed.
The triangular array of Assumption 1 is the sequence of local alternatives. The parameter δ controls the deviation from the null. The
√ null hypothesis is the special case of
the sequence of local alternatives when δ = 0. The n in the denominator of the deviation
shrinks the deviation towards the null as the sample size increases. This particular power of
n ensures that the test statistics are well-behaved as they converge in distribution.
We denote ξsc,n (resp. ξhot,n ) the statistic of the score test (resp. of the paired Hotelling
test) associated with Z (n) , the n-th line of the triangular array of Assumption 1. In
the same fashion as for the Student distribution and the χ2 distribution, the Hotelling
distribution with degrees of freedom p and n − 1 and the χ2p distribution are different for
P
finite samples but they are the same asymptotically. Therefore, ξsc,n −ξhot,n −
→ 0 is enough to
guarantee asymptotic equivalence. Our theorem is more precise as it includes the convergence
rate and limiting distribution of this difference. We note the convergence in distribution d.
Theorem 1. Under the null or a sequence of local alternatives, the paired Hotelling test and
the score test of CLR are asymptotically equivalent. More precisely, under Assumption 1,
we have:
d
n(ξsc,n − ξhot,n ) →
− K
6
where K = (δ + V )> Σ−1 Σ − (δ + V )(δ + V )> Σ−1 (δ + V )> with V ∼ N (0, Σ) and N
refers to the normal distribution.
Examples of distribution of K for p = 1, Σ = σ 2 = 1 and different values of δ are shown
in figure 1. We see that for small values of δ, K is concentrated between 0 and 1/4. As δ
grows, the distribution shifts to large, negative values.
For the practitioner, the result of Theorem 1 will not affect the choice of test but ensures
that similar conclusions are reached regardless of that choice. The result also implies that
CLR can be considered a generalization of the paired Hotelling or Student test when the
conditions for the latter do not apply.
Proof of Theorem 1 To facilitate the notation, we omit the dependence in n in most
quantities, writing Z instead of Z (n) . The quantity we want to estimate is:
n(ξsc,n − ξhot,n ) = n2 Z̄ > (Ĩ −1 − C −1 )Z̄ = n2 Z̄ > Ĩ −1 (C − Ĩ)C −1 Z̄,
(4)
P
where Ĩ = n1 ni=1 Zi Zi> .
The Lindeberg-Feller Central Limit Theorem for triangular arrays (Hall and Heyde, 1980,
(n)
Theorem 3.2 p58) applied on the Wi gives:
√
d
nZ̄ →
− (δ + V ),
(5)
with V ∼ N (0, Σ). The weak law of large numbers for triangular arrays implies:
P
C−
→ Σ.
(6)
1X
1X
P
Ĩ =
Zi Zi> =
(Zi − Z̄)(Zi − Z̄)> + Z̄ Z̄ > −
→Σ
n i=1
n i=1
(7)
Combining (5) and (6), we see:
n
n
and, using the second identity in (7), we obtain:
d
n(C − Ĩ) = C − nZ̄ Z̄ > →
− Σ − (δ + V )(δ + V )> .
Applying Slutsky’s lemma to all of the above, we conclude:
d
n(ξsc,n − ξhot,n ) →
− K
where K = (δ + V )> Σ−1 Σ − (δ + V )(δ + V )> Σ−1 (δ + V )> with V ∼ N (0, Σ). This
concludes the proof of Theorem 1.
Acknowledgements
The author thanks Gérard Biau for his supervision and his many comments on the manuscript.
Funding: The author acknowledges a PhD grant from École Normale Supérieure.
7
Delta=1
Density
3
6
0
0
1
2
2
4
Density
4
8
5
6
10
Delta=0
−0.8
−0.6
−0.4
−0.2
0.0
0.2
−1.0
−0.8
−0.6
−0.4
−0.2
K
K
Delta=2
Delta=3
0.0
0.2
0.0
0.2
0.0
0.00
0.2
0.05
0.10
Density
0.6
0.4
Density
0.8
1.0
0.15
1.2
−1.0
−1.0
−0.8
−0.6
−0.4
−0.2
0.0
0.2
−1.0
K
−0.8
−0.6
−0.4
−0.2
K
Figure 1: Distribution of K. Distribution of the limit variable for p = 1, Σ = σ 2 = 1 and
δ ∈ {0, 1, 2, 3}.
8
References
References
P. Rosenbaum. Observational Studies. Springer, New York, 2002.
D. Rubin. Matching to remove bias in observational studies. Biometrics, 29:159–183, 1973.
P. Rosenbaum and D. Rubin. The central role of the propensity score in observational studies
for causal effects. Biometrika, 70:41–55, 1983.
N.E. Breslow and N.E. Day. Statistical methods in cancer research. The analysis of casecontrol studies. International Agency for Research on Cancer, Lyon, 1981.
Q. McNemar. Note on the sampling error of the difference between correlated proportions
or percentages. Psychometrika, 12:153–157, 1947.
F. Balazard, S. Le Fur, S. Valtat, Isis Diab collaborative group, A.-J. Valleron, and
P. Bougnères. Association of environmental markers with childhood type 1 diabetes mellitus revealed by a long questionnaire on early life exposures and lifestyle in a case-control
study. BMC Public Health, 2016.
N. Mantel and W. Haenszel. Statistical aspects of the analysis of data from retrospective
studies. Journal of the national cancer institute, 22:719–748, 1959.
J.H. McDonald. Handbook of Biological Statistics. Sparky House Publishing, Baltimore,
2009.
N.E. Breslow, N.E. Day, K.T. Halvorsen, R.L. Prentice, and C. Sabai. Estimation of multiple
relative risk functions in matched case-control studies. American Journal of Epidemiology,
108:299–307, 1978.
R.F. Engle. Wald, likelihood ratio, and lagrange multiplier tests in econometrics. Handbook
of Econometrics, 2:775–826, 1984.
A. Agresti and M. Kateri. Categorical Data Analysis. Springer, Berlin, Heidelberg, 2011.
N.E. Day and D.P. Byar. Testing hypotheses in case-control studies-equivalence of mantelhaenszel statistics and logit score tests. Biometrics, 35:623–630, 1979.
P. Hall and C.C. Heyde. Martingale limit theory and its application. Academic Press., New
York, 1980.
9
| 10math.ST
|
Flexible and Creative Chinese Poetry Generation Using Neural Memory
Jiyuan Zhang1,2 , Yang Feng3,1,4 , Dong Wang1∗,
Yang Wang1 , Andrew Abel6 , Shiyue Zhang1,5 , Andi Zhang1,5
1
Center for Speech and Language Technologies(CSLT), RIIT, Tsinghua University, China
2
Shool of Software & Microelectronics, Peking University, China
3
Key Laboratory of Intelligent Information Processing,Institute of Computing Technology,CAS
4
Huilan Limited, Beijing, China
5
Beijing University of Posts and Telecommunications, China
6
Xi’an Jiaotong-Liverpool University, China
zhangjy ml@pku.edu.cn, wangdong99@mails.tsinghua.edu.cn
arXiv:1705.03773v1 [cs.AI] 10 May 2017
Abstract
It has been shown that Chinese poems can be successfully generated by
sequence-to-sequence neural models, particularly with the attention mechanism. A
potential problem of this approach, however, is that neural models can only learn
abstract rules, while poem generation is a
highly creative process that involves not
only rules but also innovations for which
pure statistical models are not appropriate in principle. This work proposes a
memory-augmented neural model for Chinese poem generation, where the neural
model and the augmented memory work
together to balance the requirements of
linguistic accordance and aesthetic innovation, leading to innovative generations
that are still rule-compliant. In addition, it is found that the memory mechanism provides interesting flexibility that
can be used to generate poems with different styles.
1
Introduction
Classical Chinese poetry is a special cultural heritage with over 2,000 years of history and is still
fascinating us today. Among the various genres, perhaps the most popular one is the quatrain,
a special style with a strict structure (four lines
with five or seven characters per line), a regulated
rhythmical form (the last characters in the second
and fourth lines must follow the same rhythm),
and a required tonal pattern (tones of characters in
some positions should satisfy a predefined regulation) (Wang, 2002). This genre flourished mostly
in the Tang Dynasty, and so are often called ‘Tang
1
Corresponding author: Dong Wang; RM 1-303, FIT
BLDG, Tsinghua University, Beijing (100084), P.R. China.
poems’. An example of a quatrain written by
Wei Wang, a famous poet in the Tang Dynasty, is
shown in Table 1.
Due to the stringent restrictions in both rhythm
and tone, it is not trivial to create a fully
rule-compliant quatrain. More importantly, besides such strict regulations, a good quatrain
should also read fluently, hold a consistent theme,
and express a unique affection. Therefore, poem
generation is widely recognized as a very intelligent activity and can be performed only by knowledgeable people with a lot of training.
乐游原
Climbing the Paradise Mound
向晚意不适, (* Z Z P Z)
As I was not in a good mood this
evening round,
驱车登古原。 (P P P Z P)
I went by cart to climb the Ancient
Paradise Mound.
夕阳无限好, (* P P Z Z)
It is now nearing dusk,
只是近黄昏。 (* Z Z P P)
When the setting sun is infinitely fine,
which is a must.
Table 1: An example of a 5-char quatrain. The
tonal pattern is shown at the end of each line,
where ’P’ indicates a level tone, ’Z’ indicates a
downward tone, and ’*’ indicates the tone can be
either. The translation is from (Tang, 2005).
In this paper we are interested in machine poetry generation. Several approaches have been
studied by researchers. For example, rule-based
methods (Zhou et al., 2010), statistical machine
translation (SMT) models (Jiang and Zhou, 2008;
He et al., 2012) and neural models (Zhang and Lapata, 2014; Wang et al., 2016a,c). Compared to
previous approaches (e.g., rule-based or SMT), the
neural model approach tends to generate more fluent poems and some generations are so natural that
even professional poets can not tell they are the
work of machines (Wang et al., 2016a).
In spite of these promising results, neural models suffer from a particular problem in poem generation, a lack of innovation. Due to the statistical
nature of neural models, they pay much more attention to high-frequency patterns, whereas they
ignore low-frequency ones. In other words, the
more regular and common the patterns, the better the neural model is good at learning them and
tends to use them more frequently at run-time.
This property certainly helps to generate fluent
sentences, but it is not always useful: the major
value of poetry is not fluency, but the aesthetic innovation that can stimulate some unique feelings.
This is particularly true for Chinese quatrains that
are highly compact and expressive: it is nearly
impossible to find two similar works in the thousands of years of history in this genre, demonstrating the importance of uniqueness or innovation.
Ironically, the most important thing, innovation, is
largely treated as trivial, if not noise, by present
neural models.
Actually this problem is shared by all generation models based on statistics (although it is
more serious for neural models) and has aroused a
long-standing criticism for machine poem generation: it can generate, and sometimes generate well,
but the generation tends to be unsurprising and not
particularly interesting. More seriously, this problem exists not only in poem generation, but also in
all generation tasks that require innovation.
This paper tries to solve this extremely challenging problem. We argue that the essential problem is that statistical models are good at learning general rules (usage of regular words and their
combinations) but are less capable of remembering special instances that are difficult to cover
with general rules. In other words, there is only
rule-based reasoning, no instance-based memory.
We therefore present a memory-augmented neural model which involves a neural memory so that
special instances can be saved and referred to at
run-time. This is like a human poet who creates
poems by not only referring to common rules and
patterns, but also recalls poems that he has read
before. It is hard to say whether this combination
of rules and instances produces true innovation
(which often requires real-life motivation rather
than simple word reordering), but it indeed offers
interesting flexibility to generate new outputs that
look creative and are still rule-compliant. Moreover, this flexibility can be used in other ways, e.g.,
generating poems with different styles.
In this paper, we use the memory-augmented
neural model to generate flexible and creative Chinese poems. We investigate three scenarios where
adding a memory may contribute: the first scenario involves a well trained neural model where
we aim to promote innovation by adding a memory, the second scenario involves an over-fitted
neural model where we hope the memory can regularize the innovation, and in the third scenario,
the memory is used to encourage generation of poems of different styles.
2
Related Work
A multitude of methods have been proposed for
automatic poem generation. The first approach
is based on rules and/or templates. For example,
phrase search (Tosa et al., 2009; Wu et al., 2009),
word association norm (Netzer et al., 2009), template search (Oliveira, 2012), genetic search (Zhou
et al., 2010), text summarization (Yan et al., 2013).
Another approach involves various SMT methods,
e.g., (Jiang and Zhou, 2008; He et al., 2012). A
disadvantage shared by the above methods is that
they are based on the surface forms of words or
characters, having no deep understanding of the
meaning of a poem.
More recently, neural models have been the subject of much attention. A clear advantage of the
neural-based methods is that they can ‘discover’
the meaning of words or characters, and can therefore more deeply understand the meaning of a
poem. Here we only review studies on Chinese
poetry generation that are mostly related to our research. The first study we have found in this direction is the work by Zhang and Lapata (2014),
which proposed an RNN-based approach that produces each new line character-by-character using a
recurrent neural network (RNN), with all the lines
generated already (in the form of a vector) as a
contextual input. This model can generate quatrains of reasonable quality. Wang et al. (2016b)
proposed a much simpler neural model that treats
a poem as an entire character sequence, and poem
generation is conducted character-by-character.
This approach can be easily extended to various
genres such as Song Iambics. To avoid theme drift
caused by this long-sequence generation, Wang
et al. (2016b) utilized the neural attention mechanism (Bahdanau et al., 2014) by which human intention is encoded by an RNN to guide the generation. The same model was used by Wang
et al. (2016a) for Chinese quatrain generation.
Yan (2016) proposed a hierarchical RNN model
that conducts iterative generation. Recently, Wang
et al. (2016c) proposed a similar sequence generation model, but with the difference that attention
is placed not only on the human input, but also on
all the characters that have been generated so far.
They also proposed a topic planning scheme to encourage a smooth and consistent theme.
All the neural models mentioned above try
to generate fluent and meaningful poems, but
none of them consider innovation.
The
memory-augmented neural model proposed in this
study intends to address this issue. Our system
was built following the model structure and training strategy proposed by Wang et al. (2016a) due
to its simplicity and demonstrated quality, but the
memory mechanism is general and can be applied
to any of the models presented above.
The idea of memory argumentation was inspired by the recent advance in neural Turing machine (Graves et al., 2014, 2016) and memory network (Weston et al., 2014). These new models
equip neural networks with an external memory
that can be accessed and manipulated via some
trainable operations. In comparison, the memory
in our work plays a simple role of knowledge storage, and the only operation is simple pre-defined
READ. In this sense, our model can be regarded
as a simplified neural Turing machine that omits
training.
Figure 1: The memory-augmented neural model
used for Chinese poetry generation.
In this section, we first present the idea of memory
augmentation, and then describe the model structure and training method.
able. The memory component involves a set of
‘direct’ mappings from input to output, and therefore can be used to memorize some special cases
of the generation that can not be represented by
the neural model. For poem generation, the memory stores the information regarding which character should be generated in a particular context.
The output from the two components are then integrated, leading to a consolidated output.
There are several ways to understand the
memory-augmented neural model. Firstly, it can
be regarded as a way of combining reasoning (neural model) and knowledge (memory). Secondly, it
can be regarded as a way of combining rule-based
inference (neural model) and instance-based retrieval (memory). Thirdly, it can be regarded
as a way of combining predictions from complementary systems, where the neural model is
continuous and parameter-shared, while the memory is discrete and contains no parameter sharing. Finally, the memory can be regarded as an
effective regularization that constrains and modifies the behavior of the neural model, resulting
in generations with desired properties. Note that
this memory-augmented neural model is inspired
by and related to the memory network proposed
by Weston et al.(2014) and Graves et al.(2016), but
we more focus on an accompanying memory that
plays the role of assistance and regularization.
3.1
3.2
3
Memory-augmented neural model
Memory augmentation
The idea of memory augmentation is illustrated
in Fig. 1. It contains two components, the neural model component on the left, and the memory component on the right. In this work, the
attention-based RNN generation model presented
by (Wang et al., 2016a) is used as the neural model
component, although any neural model is suit-
Model structure
Using the Chinese poetry generation model shown
in Fig. 1 as an example, this section discusses the
creation of a memory-augmented neural model.
Firstly, the neural model part is an attentionbased sequence-to-sequence model (Bahdanau
et al., 2014). The encoder is a bi-directional
RNN (with GRU units) that converts the in-
put topic words, denoted by the embeddings
of the compositional characters (x1 , x2 , ..., xN ),
into a sequence of hidden states (h1 , h2 , ..., hN ).
The decoder then generates the whole quatrain
character-by-character, denoted by the corresponding embeddings (y1 , y2 , ...). At each step t,
the prediction for the state st is based on the last
generation yt−1 , the previous status st−1 of the decoder, as well as all the hidden states (h1 , h2 , ...)
of the encoder. Each hidden state hi contributes to
the generation according to a relevance factor αt
that measures the similarity between st−1 and hi .
This is written as:
st = fd (yt−1 , st−1 ,
N
X
αt,i hi )
i=1
where αt,i represents the contribution of hi to the
present generation, and can be implemented as any
function. The output of the model is a posterior
probability over the whole set of characters, written by
zt = σ(st W )
where W is the projection parameter.
The memory consists of a set of elements
{mi }K
i=1 , where K is the size of the memory. Each
element mi involves two parts, the source part
mi (s), that encodes the context, i.e. when this element should be selected, and the target part mi (g),
that encodes what should be output if this element
is selected. In our study, the neural model is firstly
trained, and then the memory is created by running
fd (the decoder of the neural model). Specifically,
for the k-th poem selected to be in the memory, the
character sequence is input to the decoder one by
one, with the contribution from the encoder set to
zero. Denoting the starting position of this poem
in the memory is pk , the status of the decoder at the
j-th step is used as the source part of the (pk +j)-th
element of the memory, and the embedding of the
corresponding character, xj , is set to be the target
part. this is formally written as:
mi (s) = fd (xj−1 , sj−1 , 0)
(1)
st , and then the outputs of the selected elements
are averaged as the output of the memory component. We choose cosine distance to measure the
fitting degree, and have1 :
vt =
K
X
cos(st , mi (s))mi (g).
(2)
i=1
The output of the neural model and the memory
can be combined in various ways. Here, a simple
linear combination before the softmax is used, i.e.,
zt = σ(st W + βvt E)
(3)
where β is a pre-defined weighting factor, and E
contains word embeddings of all the characters.
Although it is possible to train β from the data,
we found that the learned β is not better than the
manually-selected one. This is probably because
β is a factor to trade-off the contribution from
the model and the memory, and how to make the
trade-off should be a ‘prior knowledge’ rather than
a tunable parameter. In fact, if it is trained, than it
will be immediately adapted to match the training
data, which will nullify our effort to encourage innovative generation.
3.3
Model Training
In our implementation, only the neural model
component is required to be trained. The training
algorithm follows the scheme defined in (Wang
et al., 2016a), where the cross entropy between the
distributions over Chinese characters given by the
decoder and the ground truth is used as the objective function. The optimization uses the SGD
algorithm together with AdaDelta to adjust the
learning rate (Zeiler, 2012).
4
Memory augmentation for Chinese
poetry generation
This section describes how the memory mechanism can be used to trade-off between the requirements for rule-compliant generation and aesthetic
innovation, and how it can also be used to do more
interesting things, for example style transfer.
and
mi (g) = xj
where
i = pk + j.
4.1
In this section, we describe how the memory
mechanism promotes innovation. Monitoring the
1
At run-time, the memory elements are selected
according to their fit to the present decoder status
Memory for innovative generation
In fact, we run a parallel decoder to provide st in Eq.(2).
This decoder does not accept input from the encoder and so
is consistent with the memory construction process as Eq.(1).
training process for the attention-based model, we
found that the cost on the training set will keep
decreasing until approaching zero, but on the validation set, the degradation stops after only one
iteration. This can be explained by the fact that
Chinese quatrains are highly unique, so the common patterns can be fully learned in one iteration,
resulting in overfitting with additional iterations.
Due to the overfitting, we observe that with the
one-iteration model, reasonable poems can be generated, and with the over-fitted model, the generated poems are meaningless, in that they do not
resemble feasible character sequences.
The energy model perspective helps to explain
this difference. For the one-iteration model, the
energy surface is smooth and the energy of the
training data is not very low, as illustrated in plot
(a) in Fig. 2, where the x-axis represents the input
and y-axis represents the output, and the z-axis
represents the energy. With this model, inputs
with small variance will be attracted to the same
low-energy area, leading to similar generations.
These generations are trivial, but at least reasonable. If the model is overfitted, however, the energy at the locations of the training data becomes
much lower than their surrounding areas, leading to a bumpy energy surface as shown in plot
(b) in Fig. 2. With this model, inputs with a
small variation may be attracted to very different
low-energy areas, leading to significantly different generations. Since many of the low-energy areas are nothing to do with good generations but
are simply caused by the complex energy function, the generations can be highly surprising for
human readers, and the quality is not guaranteed.
In some sense, these generations can be regarded
as ‘innovative’ , but based on observations made
in our experiments, most of them are meaningless.
The augmented memory introduces a new energy function, which is combined with the energy
function of the neural model to change the energy
surface of the generation system. This can be seen
in Eq. (3), where st W and βvt E can be regarded
as the energy function of the neural model component and the memory component, respectively,
and the energy function of the memory-augmented
system is the sum of the energy functions of these
two components. For this reason, the effect of the
memory mechanism can be regarded as a regularization of the neural model that will adjust its generation behavior.
This regularization effect is illustrated in Fig. 2,
where the energy function of the memory shown
in plot (c) is added to the energy function of the
one-iteration model and the overfitted model, as
shown in plot (e) and plot (f) respectively. It
can be seen that with the memory involved, the
energy surface becomes more bumpy with the
one-iteration model, and more smooth with the
overfitted model. In the former case, the effect
of the memory is to encourage innovation, while
still focusing on rule-compliance, and in the latter
case, the effect is to encourage rule compliance,
while keeping the capability for innovation.
It is important to notice that the energy function
of the memory component is a linear combination
of the energy functions of the compositional elements (see Eq.(2)), each of which is convex and
is minimized at the location represented by the
element. This means that the energy surface of
the memory is rather ‘healthy’, in the sense that
low-energy locations mostly correspond to good
generations. For this reason, the regularization
provided by the memory is safe and helpful.
4.2
Memory for style transfer
The effect of the memory is easy to control. For
example, the complexity of the behavior can be
controlled by the memory size, the featured bias
can be controlled by memory selection, and the
strength of the impact can be controlled by the
weighting parameter β. This means that the memory mechanism is very flexible and can be used to
produce poems with desired properties.
In this work, we use these capabilities to generate poems with different styles. This has been
illustrated in Fig. 2, where the energy function of
the style memory shown in plot (d) is biased towards a particular style, and once it is added to
energy function of the one-iteration model, the resulting energy function shown in plot (g) obtains
lower values at locations corresponding to the locations of the memory, which encourages generation of poems with similar styles as those poems
in the memory.
5
Experiments
This section describes the experiments and results
carried out in this paper. Here, The baseline system was a reproduction of the Attention-based system presented in (Wang et al., 2016a). the model
in This system has been shown to be rather flexi-
Figure 2: The energy surface for (a) one-iteration model (b) overfitted model (c) memory (d) style
memory (e) one-iteration model augmented with memory (f) overfitted model augmented with memory
(g) one-iteration model augmented with style memory.
ble and powerful: it can generate different genres
of Chinese poems, and when generating quatrains
it has been shown to be able to fool human experts in many cases (Wang et al., 2016a) and the
authors had did a thorough comparison with competitive methods mentioned in the related work
of this paper. We obtained the database and the
source code (in theano), and reproduced their system using Tensorflow from Google2 . We didn’t
make comparisons with some previous methods
such as NNLM, SMT, RNNPG as they had been
fully compared in (Wang et al., 2016a) and all of
them were much worse than the attention-based
system. Another reason was that the experts were
not happy to evaluate poems with clearly bad quality. We also reproduced the model in (Wang et al.,
2016c) with the help of the first author. However,
since their implementation did not involve any restrictions on rhythm and tone, the experts were reluctant to recognize them as good poems. With
a larger dataset (e.g., 1 Million poems), it is assumed that the rhythm and tone can be learned and
their system would be good in both fluency and
rule compliance. It should be also emphasized that
the memory approach proposed in this paper is a
general technique and is complementary to other
efforts such as the planning approach (Wang et al.,
2016c) and the recursive approach (Yan, 2016).
Based on the baseline system, we built the
memory-augmented model, and conducted two
2
https://www.tensorflow.org/
experiments to demonstrate its power. The first is
an innovation experiment which employs memory
to promote or regularize the generation of innovative poems, and the second is a style-transfer experiment which employs memory to generate flexible poems in different styles.
We invited 34 experts to participate in the experiments, and all of them have rich experience
not only evaluating poems, but also in writing
them. Most of the experts are from prestigious institutes, including Peking university and the Chinese Academy of Social Science (CASS). Following the suggestions of the experts, we use five metrics to evaluate the generation, as listed below:
• Compliance: if regulations on tones and
rhymes are satisfied;
• Fluency: if the sentences read fluently and
convey reasonable meaning;
• Theme consistency: if the entire poem adheres to a single theme;
• Aesthetic innovation: if the quatrain stimulates any aesthetic feeling with elaborate innovation;
• Scenario consistency: if the scenario remains
consistent.
5.1
Datasets
The baseline system was built with two customized datasets. The first dataset is a Chinese
poem corpus (CPC), which we used in this work to
train the embeddings of Chinese characters. Our
CPC dataset contains 284,899 traditional Chinese
poems in various genres, including Tang quatrains,
Song Iambics, Yuan Songs, and Ming and Qing
poems. This large quantity of data ensures reliable
learning for the semantic content of most Chinese
characters.
Our second dataset is a Chinese quatrain corpus (CQC) that we have collected from the internet, which consists of 13, 299 5-char quatrains
and 65, 560 7-char quatrains. This corpus was
used to train the attention-based RNN baseline.
We filtered out the poems whose characters are
all low-frequency (less than 100 counts in the
database). After the filtering, the remaining corpus
contains 9,195 5-char quatrains and 49,162 7-char
quatrains. We used 9,000 5-char and 49,000
7-char quatrains to train the attention model, and
the rest for validation.
Another two datasets were created for use in
the memory-augmented system. Our first dataset,
MEM-I, contains 500 quatrains randomly selected
from our CQC corpus. This dataset was used
to produce the memory in the innovation experiment; the second dataset, MEM-S, contains 300
quatrains with clear styles, including 100 pastoral,
100 battlefield and 100 romantic quatrains. It was
used to generate memory with different styles in
the style-transfer experiment. All the datasets will
be released online3 .
5.2
Evaluation Process
We invited 34 experts to evaluate the quality of
the poem generation. In the innovation experiment, the evaluation consisted of a comparison
between different systems and configurations in
terms of the five metrics. The innovation questions
presented the expert with two poems, and asked
them to judge which of the poems was better in
terms of the five metrics; in the style-transfer experiment, the evaluation was performed by identifying the style of a generated poem. The evaluation was conducted online, with each questionnaire containing 11 questions focusing on innovation and 4 questions concerned with style-transfer.
Each of the style-transfer questions presented the
expert with a single poem and asked them to score
it between 1 to 5, with a larger score being better, in terms of compliance, aesthetic innovation,
3
http://vivi.cslt.org
scenario consistency, and fluency. They were also
asked to specify the style of the poem.
Using the poems generated by our systems, we
generated many different questions of both types,
and then created a number of online questionnaires
that randomly selected from these questions. This
meant that as discussed above, each questionnaire
had 11 randomly selected innovation questions,
and 4 randomly selected style transfer questions.
Each question was only used once, meaning that
it was not duplicated on multiple questionnaires,
and so each questionnaire was different.
Experts could choose to answer multiple questionnaires if they wished, as each one was different. From the 34 experts, we collected 69 completed questionnaires, which equals to 759 innovation questions and 276 style-transfer questions.
5.3
Innovation experiment
This experiment focuses on the contribution of
memory for innovative poem generation. We experimented with two configurations: one is with
a one-iteration model (C1 ) and the other is with
an overfitted model (C∞ ). The memory was generated from the 500 quatrains in MEM-I, and the
weighting factor was defined empirically as 16 for
C1 and 49 for C∞ .
The topics of the generation were 160 keywords
randomly selected from Shixuhanyinge (Liu,
1735). Given a pair of poems generated by two
different configurations using the same topic, the
experts were asked to choose which one they preferred. The evaluation is therefore pair-wised, and
each pair of configurations contains at least 180
evaluations. The results are shown in Table 2,
where the preference ratio for each pair of configurations was tested in terms of the 5 metrics.
From the first row of Table 2, we observe that
the experts have a clear preference for the poems
generated by the C1 model, the one that can produce fluent yet uninteresting poems. In particular, the ‘aesthetic innovation’ score for C∞ is not
better than C1 , which was different from what
we expected. Informal offline discussions with
the poetry experts found that the experts identified some innovative expression in the C∞ condition, but most of the them was regarded as being
nonsense in the opinion of many of the experts.
In comparison to sparking innovation, fluency and
being meaningful is more important not only for
non-expert readers, but also for professional po-
C1 vs C∞
C1 vs C1 +Mem
C∞ vs C∞ +Mem
C1 vs C∞ +Mem
Compliance
Fluency
0.59:0.41
0.41:0.59
0.40:0.60
0.43:0.57
0.68:0.32
0.36:0.64
0.26:0.74
0.58:0.42
Preference Ratio
Theme
Consistency
0.70:0.30
0.37:0.63
0.32:0.68
0.59:0.41
Aesthetic
Innovation
0.68:0.32
0.33:0.67
0.30:0.70
0.50:0.50
Scenario
Consistency
0.69:0.31
0.43:0.57
0.36:0.64
0.59:0.41
Table 2: Preference ratios for systems with or without overfitting and with or without memory augmentation.
ets. In other words, only meaningful innovation is
regarded as innovation, and irrational innovation
is simply treated as junk.
From the second and third rows of Table 2, it
can be seen that involving memory significantly
improves both C1 and C∞ , particularly for C∞ .
For C1 , the most substantial improvement is observed in terms of ‘Aesthetic innovation’, which
is consistent with our argument that memory can
help encourage innovation for this model. For
C∞ , ‘Fluency’ seems to be the most improved
metric. This is also consistent with our argument
that involving memory constrains over-innovation
for over-fitted models.
The last row of Table 2 is an extra experiment that investigates if C∞ is regularized well
enough after introducing the memory. It seems
that with the regularization, the overfitting problem is largely solved, and the generation is nearly
as fluent and consistent as the C1 condition. Interestingly, the score for aesthetic innovation is
also significantly improved. Since the regularization is not supposed to boost innovation, this
seems confusing at first glance (in comparison to
the result on the same metric in the first row),
but this is probably because the increased fluency
and consistency makes the innovation more appreciated, therefore doubly confirming our argument that true innovation should be reasonable and
meaningful.
5.4
Style-transfer experiment
In the second experiment, the memory mechanism is used to generate poems in different styles.
We chose three styles: pastoral, battlefield, and
romantic. A style-specific memory, which we
call style memory, was constructed for each style
by the corresponding quatrains in the MEM-S
dataset. The system with one-iteration model C1
was used as the baseline. Two sets of topics were
used in the experiment, one is general and the
other is style-biased. The experiments then investigate if the memory mechanism can produce
a clear style if the topic is general, and can transfer to a different style if the topic is style-biased
already. The experts were asked to specify the
style from four options including the three defined
above and a ‘unclear style’ option. In addition,
the experts were asked to score the poems in terms
of compliance, fluency, aesthetic innovation, and
scenario consistency, which we can use to check if
the style transfer impacts the quality of the poem
generation. Note that we did not ask for the theme
consistency to be scored in this experiment because the topic words were not presented to the
experts, in order to prevent the topic affecting their
judgment regarding the style. The score ranges
from 1 to 5, with a larger score being better.
Table 3 presents the results with the general topics. The numbers show the probabilities that the
poems generated by a particular system were labeled as having various styles. Since the topics
are unbiased in types, the generation of the baseline system is assumed to be with unclear styles.
For other systems, the style of the generation is
assumed to be the same as the style of their memories. The results in Table 3 clearly demonstrates
these assumptions. The tendency that romantic
poems are recognized as pastoral poems is a little surprising. Further analysis shows that experts
tend to recognize romantic poems as pastoral poems only if there are any related symbols such as
trees, mountain, river. These words are very general in Chinese quatrains. The indicator words of
romantic poems such as skirt, rouge, and singing
are not as popular and their indication power is not
as strong, leading to less labeling of romantic poems, as shown in the results.
Model
C1 (Baseline)
C1 + Pastoral Mem
C1 + Battlefield Mem
C1 + Romantic Mem
Pastoral
0.09
0.94
0.05
0.17
Probability
Battlefield
Romantic
0.04
0.18
0.00
0.06
0.93
0.00
0.00
0.61
Unclear
0.69
0.00
0.02
0.22
Table 3: Probability that poems generated by each
configuration with general topics are labeled as
various styles.
We also tested transferring from one style to another. This was achieved by generating poems
with some style-biased topics, and then using a
style memory to force the generation to change the
style. Our experiments show that in 73% cases the
style can be successfully transferred.
Finally, the scores of the poems generated with
and without the style memories are shown in Table 4, where the poems generated with both general and style-biased topics are accounted for. It
can be seen that overall, the style transfer may degrade fluency a little. This is understandable, as
enforcing a particular style has to break the optimal generation with the baseline, which is assumed to be good at generating fluent poems.
Nevertheless the sacrifice is not significant.
Method
C1
C1
C1
C1
C1
Compliance
Fluency
4.10
4.07
3.82
4.00
3.95
3.01
3.00
2.63
2.78
2.80
(baseline)
+ Pastoral Mem
+ Battlefield Mem
+ Romantic Mem
+ All Mem
Aesthetic
Innovation
2.53
3.07
2.60
2.59
2.74
Scenario
Consistence
2.94
3.17
2.95
3.00
3.05
Table 4: Averaged scores for systems with or without style memory.
5.5
Examples
Table 5 to Table 7 shows example poems generated by the system C1 , C1 +Mem and C1 +Style
Mem where the style in this case is set to be romantic. The three poems were generated with the
same, very general, topic (‘(oneself)’). More examples are given in the supporting material.
自从此意无心物,
Nothing in my heart,
一日东风不可怜。
Spring wind is not a pity.
莫道人间何所在,
Don’t ask where it is,
我今已有亦相传。
I’ve noticed that and tell others.
一山自有无人语,
Nobody speaking in the mountain,
不是青云入水边。
Also no green cloud stepping into the river.
莫把春风吹落叶,
Spring wind does not stir leaves,
花开绿树满江船。
But flowers blooming in trees and flying to
boats.
Table 6:
Example poems generated by the
C1 +Mem system.
花香粉脸胭脂染,
Beautiful face addressed by rouge,
帘影鸳鸯绿嫩妆。
Mandarin duck outside the curtain.
翠袖红蕖春色冷,
Green sleeves and red flowers in cold spring,
柳梢褪叶暗烟芳。
Willow leaves gone in fragrant mist.
Table 7:
Example poems generated by the
C1 +Style Mem system where the style is romantic.
ory can boost innovation from two opposite directions: either by encouraging creative generation for regularly-trained models, or by encouraging rule-compliance for overfitted models. Both
strategies work well, although the former generated poetry that was preferred by experts in our experiments. Furthermore, we found that the memory can be used to modify the style of the generated poems in a flexible way. The experts we collaborated with feel that the present generation is
comparable to today’s experienced amateur poets.
Future work involves investigating a better memory selection scheme. Other regularization methods (e.g., norm or drop out) are also interesting
and may alleviate the over-fitting problem.
Acknowledgments
Table 5:
system.
6
Example poems generated by the C1
Conclusions
In this paper, we proposed a memory mechanism to support innovative Chinese poem generation by neural models augmented with a memory. Experimental results demonstrated that mem-
This paper was supported by the National
Natural Science Foundation of China (NSFC)
under the project NO.61371136, NO.61633013,
NO.61472428.
References
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly
learning to align and translate. arXiv preprint
arXiv:1409.0473 .
Alex Graves, Greg Wayne, and Ivo Danihelka.
2014. Neural turing machines. arXiv preprint
arXiv:1410.5401 .
Alex Graves, Greg Wayne, Malcolm Reynolds,
Tim Harley, Ivo Danihelka, Agnieszka GrabskaBarwińska, Sergio Gómez Colmenarejo, Edward
Grefenstette, Tiago Ramalho, John Agapiou, et al.
2016.
Hybrid computing using a neural network with dynamic external memory.
Nature
538(7626):471–476.
Jing He, Ming Zhou, and Long Jiang. 2012. Generating Chinese classical poems with statistical machine
translation models. In Twenty-Sixth AAAI Conference on Artificial Intelligence.
Long Jiang and Ming Zhou. 2008. Generating Chinese
couplets using a statistical mt approach. In Proceedings of the 22nd International Conference on
Computational Linguistics. Association for Computational Linguistics, volume 1, pages 377–384.
Wenwei Liu. 1735. ShiXueHanYing.
Yael Netzer, David Gabay, Yoav Goldberg, and
Michael Elhadad. 2009. Gaiku: Generating haiku
with word associations norms. In Proceedings of the
Workshop on Computational Approaches to Linguistic Creativity. Association for Computational Linguistics, pages 32–39.
H Oliveira. 2012. Poetryme: a versatile platform for
poetry generation. In Proceedings of the ECAI 2012
Workshop on Computational Creativity, Concept Invention, and General Intelligence.
Yihe Tang. 2005. English Translation for Tang Poems
(Ying Yi Tang Shi San Bai Shou). Tianjin People
Publisher.
Naoko Tosa, Hideto Obara, and Michihiko Minoh.
2009. Hitch haiku: An interactive supporting system for composing haiku poem. Entertainment
Computing-ICEC 2008 pages 209–216. Springer.
Li Wang. 2002. A Summary of Rhyming Constraints of
Chinese Poems (Shi Ci Ge Lv Gai Yao), volume 1.
Beijin Press.
Qixin Wang, Tianyi Luo, and Dong Wang. 2016a.
Can machine generate traditional Chinese poetry? a
feigenbaum test. In BICS 2016.
Qixin Wang, Tianyi Luo, Dong Wang, and Chao Xing.
2016b. Chinese song iambics generation with neural
attention-based model. In IJCAI 16.
Zhe Wang, Wei He, Hua Wu, Haiyang Wu, Wei Li,
Haifeng Wang, and Enhong Chen. 2016c. Chinese
poetry generation with planning based neural network. In COLING 2016.
Jason Weston, Sumit Chopra, and Antoine Bordes. 2014. Memory networks. arXiv preprint
arXiv:1410.3916 .
Xiaofeng Wu, Naoko Tosa, and Ryohei Nakatsu. 2009.
New hitch haiku: An interactive renku poem composition supporting tool applied for sightseeing navigation system. Entertainment Computing-ICEC 2009
pages 191–196. Springer.
Rui Yan. 2016. i, Poet: Automatic poetry composition
through recurrent neural networks with iterative polishing schema. In IJCAI2016.
Rui Yan, Han Jiang, Mirella Lapata, Shou-De Lin,
Xueqiang Lv, and Xiaoming Li. 2013. i, Poet: automatic Chinese poetry composition through a generative summarization framework under constrained
optimization. In Proceedings of the Twenty-Third
international joint conference on Artificial Intelligence. AAAI Press, pages 2197–2203.
Matthew D Zeiler. 2012. Adadelta: an adaptive learning rate method. arXiv preprint arXiv:1212.5701 .
Xingxing Zhang and Mirella Lapata. 2014. Chinese
poetry generation with recurrent neural networks.
In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing
(EMNLP). pages 670–680.
Cheng-Le Zhou, Wei You, and Xiaojun Ding. 2010.
Genetic algorithm and its implementation of automatic generation of Chinese Songci. Journal of Software 21(3):427–437.
| 2cs.AI
|
1
Software Engineers vs.
Machine Learning Algorithms:
An Empirical Study Assessing
Performance and Reuse Tasks
arXiv:1802.01096v2 [cs.SE] 7 Feb 2018
Nathalia Nascimento, Carlos Lucena, Paulo Alencar and Donald Cowan
Abstract—Several papers have recently contained reports on applying machine learning (ML) to the
automation of software engineering (SE) tasks, such as project management, modeling and development.
However, there appear to be no approaches comparing how software engineers fare against machine-learning
algorithms as applied to specific software development tasks. Such a comparison is essential to gain insight
into which tasks are better performed by humans and which by machine learning and how cooperative work or
human-in-the-loop processes can be implemented more effectively. In this paper, we present an empirical study
that compares how software engineers and machine-learning algorithms perform and reuse tasks. The
empirical study involves the synthesis of the control structure of an autonomous streetlight application. Our
approach consists of four steps. First, we solved the problem using machine learning to determine specific
performance and reuse tasks. Second, we asked software engineers with different domain knowledge levels to
provide a solution to the same tasks. Third, we compared how software engineers fare against
machine-learning algorithms when accomplishing the performance and reuse tasks based on criteria such as
energy consumption and safety. Finally, we analyzed the results to understand which tasks are better
performed by either humans or algorithms so that they can work together more effectively. Such an
understanding and the resulting human-in-the-loop approaches, which take into account the strengths and
weaknesses of humans and machine-learning algorithms, are fundamental not only to provide a basis for
cooperative work in support of software engineering, but also, in other areas.
Index Terms—Machine learning, human-in-the-loop, software engineer, automatic software engineering,
internet of things, empirical study
F
1
I NTRODUCTION
S
OFTWARE engineering processes can be very
complex, costly and time-consuming [1].
They typically consist of a collection of related
tasks [2] such as designing, implementing, maintaining, testing and reusing software applications
[3]. In addition, as software has become embedded in systems of all kinds, millions of computer
programs have to be corrected, adapted, and
•
•
•
Laboratory of Software Engineering (LES) at the Department of Informatics, Pontifical Catholic University of Rio de
Janeiro, Brazil. CAPES scholarship/Program 194/Process:
88881.134630/2016-01
E-mail: nnascimento,lucena@inf.puc-rio.br
See http://www.inf.puc-rio.br/∼nnascimento/
David R. Cheriton School of Computer Science. University
of Waterloo, Canada.
E-mail: palencar,dcowan@csg.uwaterloo.ca
enhanced [2]. As a result, the field of software
engineering requires millions of skilled Information Technology (IT) professionals to create
millions of lines of code, which must be installed,
configured, tuned, and maintained. According to
Kephart (2005) [4], in the near future, it will be extremely challenging to manage IT environments,
even for the most skilled IT professionals.
Several researchers have proposed the use of
artificial intelligence, especially machine-learning
(ML) techniques, to automate different software
engineering (SE) tasks [3], [5]–[20]. For example, Zhang has extensively studied this theme
recently and in [3] he stated that:
”The field of software engineering turns
out to be a fertile ground where many
software development and maintenance
2
tasks could be formulated as learning
problems and approached in terms of
learning algorithms.”
However, there is a lack of approaches to
compare how software engineers fare against
machine-learning algorithms for specific software development tasks. This comparison is critical in order to evaluate which S.E. tasks are
better performed by automation and which require human involvement or human-in-the-loop
approaches [21], [22]. In practice, because there
are no explicit comparisons between the tasks
performed by engineers and automated procedures, including machine learning, it is often not
clear when to use automation in a specific setting.
For example, a Brazilian company acquired a
software system to select petroleum exploration
models automatically, but the engineers decided
they could provide a better solution manually.
However, when there was a comparison of the
manual solution with the one provided automatically by the system, it became clear that the
automated solution was better. This illustrates
that a lack of comparisons makes choosing a
manual or an automated solution or a combined
human-in-the-loop approach difficult.
This paper, contains an empirical study [23] to
compare how software engineers and machinelearning algorithms achieve performance and
reuse tasks. The empirical study uses a case study
involving the creation of a control structure for
an autonomous streetlight application. The approach consists of four steps. First, the problem
was solved using machine learning to achieve
specific performance and reuse of tasks. Second, we asked software engineers with different
domain-knowledge levels to provide a solution
to achieve the same tasks. Third, we compared
how software engineers compare with machinelearning algorithms when accomplishing the performance and reuse tasks based on criteria such
as energy consumption and safety. Finally, the
results were analyzed to understand which tasks
are better performed by either humans or algorithms so that they can work together more
effectively.
Such an understanding is essential in realizing novel human-in-the-loop approaches in
which machine-learning procedures assist software developers in achieving tasks. Such humanin-the-loop approaches, which take into account
the strengths and weaknesses of humans and
machine-learning algorithms, are fundamental
not only to provide a basis for cooperative work
in software engineering, but also in other application areas.
This paper is organized as follows: Section
2 presents the empirical study describing research questions, hypotheses and the objective
of the study. Section 3 presents the method selected to collect our empirical data. Sections 4
and 5 present the experimental results. Section
6 presents the threats to the validity of our experiment. Section 7 presents the related work.
The paper ends with concluding remarks and
suggestions for future work.
1.1
Motivation
The theme of this paper, namely whether artificial intelligence such as machine learning, can
benefit software engineering, has been investigated since 1986, when Hebert A Simon published a paper entitled “Whether software engineering needs to be artificially intelligent” [24].
In this paper, Simon discussed “the roles that
humans now play versus the roles that could be
taken over by artificial intelligence in developing
computer systems.” Notwithstanding, in 1993,
Ian Sommerville raised the following question
[25]: “What of the future - can Artificial Intelligence make a contribution to system engineering?” In this paper [25], Sommervile performed a
literature review in applications of artificial intelligence to software engineering, and concluded
that:
“the contribution of AI will be in supporting...activities that are characterized
by solutions to problems which are
neither right nor wrong but which are
more or less appropriate for a particular situation...For example, requirements specification and analysis which
involves extensive consultation with domain experts and in project management.”
Several papers have since investigated the use
of Machine Learning (ML) [26] in solving different software engineering (SE) tasks [5]–[20], [27]–
[103]. These investigations include approaches
to: i) project management [27]–[49], dealing with
problems related to cost, time, quality prediction,
and resource management; ii) defect prediction
[50]–[84]; iii) requirements management, focusing on problems of classifying or representing requirements [85]–[88], or generating requirements
[89]; iv) software development, such as code generation [20], [68], [90]–[96], synthesis [97]–[101],
and code evaluation [102], [103].
3
Most of these papers present successful applications of machine learning in software engineering, showing that ML techniques can provide
correct automatic solutions to some SE problems.
However, very few papers discuss whether or
not a domain expert could propose a manual
solution more appropriate for the particular
situation. “More appropriate”, means a solution
that provides better performance or increases another quality that is important to a particular application scenario, such as user preference [104].
For example, in the medical and aviation engineering fields, trust [105] in a solution provided
to the end-user is an important factor to consider
for a solution to be more appropriate. However,
although many authors [106]–[109] have been
promoting the use of neural networks [110] in
medicine, Abbas et al. [105] and Castelvecchi
[111] are among the few authors who questioned:
“what is the trustworthiness of a prediction made
by an artificial neural network?”
In other application scenarios, such as many
of those related to the Internet of Things (IoT)
[112], [113], numerous authors [93], [95], [101],
[114] consider the reuse of a solution as an important quality. They agree that to achieve the
goal of billions of things connected to the Internet
over the next few years [112], it is necessary to
find ways to reduce time to market. For example,
it is desirable that the solution or parts of the
solution to design autonomous streetlights [96]
for a specific scenario could be reused to design
streetlights for another scenario.
In particular, the Internet of Things has considerably increased the number of approaches
that propose the use of machine learning to
automate software development [93]–[96], [101],
[115]. None of this research contains a comparison of their results to experiments designed by
IoT experts. For example, do Nascimento and Lucena [101], [116] developed a hybrid framework
that uses learning-based and manual program
synthesis for the Internet of Things (FIoT). They
generated four instances of the framework [101],
[108], [117], [118] and used learning techniques
to synthesize the control structure automatically.
These authors stated that the use of machine
learning made feasible the development of these
applications. However, they did not present any
experiment without using learning techniques. In
contrast, most of the solutions released for the
Internet of Things, such as Apple’s HomeKit’s
approach [119] and Samsung Smart Things, [120]
consider a software developer synthesizing the
control structure for each thing manually.
1.2
Objective
In this context, we decided to ask the following
question: “How do software engineers compare
with machine-learning algorithms?” To explore
this question, we selected the Internet of Things
as our application domain and then, compared
a solution provided by a skilled IoT professional
with a solution provided by a learning algorithm
with respect to performance and reuse tasks.
In short, Figure 1 depicts the theory [121] that
we investigate in this paper. According to the
theory, the variables that we intend to isolate
and measure are the performance and reusability achieved from three kinds of solutions: i)
solutions provided by learning techniques; ii)
solutions provided by software engineers with
IoT skills; and iii) solutions provided by software
engineers without IoT skills.
To evaluate the relationship among these variables, we performed an empirical study, using
FIoT [101]. As shown in Figure 1, we raised
four research questions (RQx) to investigate our
theory’s propositions (e.g hypotheses (H-RQx)).
We present these questions and hypotheses in
Section 2. To collect and analyze our empirical data, we performed a controlled experiment.
To perform this experiment, we reproduced the
problem of synthesizing the control structure
of autonomous streetlights using neuroevolution
(i.e. “a learning algorithm which uses genetic
algorithms to train neural networks” [122]) presented in [118]. Then, we invited 14 software
engineers to provide a solution for the same
problem using the same architecture and environment. Lastly, we compared the solution provided by the learning algorithm against the solutions provided by the software engineers. In
this application of autonomous streetlights, we
are considering a “more appropriate” solution
as one that presents a better performance in
the main scenario [118] or can be satisfactorily
reused in a new scenario, based on criteria such
as minimal energy consumption and safety
(that is, maximum visual comfort in illuminated
areas).
4
Actor
SE Tasks
Technology
Synthesize and reuse
the control structure of
autonomous things
Machine Learning
Techniques
Software Engineers
with IoT skills
without IoT skills
produce solutions
better than
(H-RQ1, H-RQ2)
Software System
Internet of Things
produce solutions better
than (H-RQ3, H-RQ4)
Improve (H-RQ1, H-RQ3)
Increase (H-RQ2, H-RQ4)
Performance
Reusability
Fig. 1. Theory [121]: Machine Learning can create solutions more appropriate than software engineers in the context of
the Internet of Things.
2
H OW DO SOFTWARE ENGINEERS COM WITH MACHINE - LEARNING ALGO RITHMS ? A N E MPIRICAL S TUDY A D DRESSING P ERFORMANCE AND R EUSE IN
THE I OT D OMAIN
RQ4. ...software engineers without IoT
skills with respect to their re-usability?
PARE
The experimental goal, based on the GoalQuestion-Metric (GQM) method [123] is to use
the Framework for the Internet of Things (FIoT)
for the purpose of comparing the use of an
automated approach against a manual approach
when synthesizing the control of autonomous
things with respect to their performance and
reuse.
For this purpose, we asked four research
questions (RQs) and performed a controlled experiment [23] (section 3) to investigate them.
2.2
Hypotheses
Each RQ is based on one or more hypotheses,
which are described next.
H - RQ1.
•
•
H - RQ2.
•
2.1
Questions
In terms of synthesizing the control structure of
autonomous things, how does the result from
a machine learning-based solution differ from
solutions provided by...
RQ1. ...software engineers with IoT
skills with respect to their performance?
RQ2. ...software engineers with IoT
skills with respect to their re-usability?
RQ3. ...software engineers without IoT
skills with respect to their performance?
H0. An ML-based approach does not improve the performance of autonomous
things compared to solutions provided by
IoT expert software engineers.
HA. An ML-based approach improves the
performance of autonomous things compared to solutions provided by IoT expert
software engineers.
•
H0. An ML-based approach does not increase the reuse of autonomous things
compared to solutions provided by IoT
expert software engineers.
HA. An ML-based approach increases the
reuse of autonomous things compared to
solutions provided by IoT expert software
engineers.
H - RQ3.
•
H0. An ML-based approach does not improve the performance of autonomous
things compared to solutions provided by
software engineers without experience in
IoT development.
5
•
HA. An ML-based approach improves the
performance of autonomous things compared to solutions provided by software
engineers without experience in IoT development.
TABLE 1
Implementing FIoT flexible points to synthesize streetlight
controllers using a ML-based approach.
FIoT Framework
Controller
H - RQ4.
•
•
H0. An ML-based approach does not increase the reuse of autonomous things
compared to solutions provided by software engineers without experience in IoT
development.
HA. An ML-based approach increases the
reuse of autonomous things compared to
solutions provided by software engineers
without experience in IoT development.
2.3 The object of the study: The Framework
for the Internet of Things (FIoT)
The Framework for the Internet of Things (FIoT)
[101] is a hybrid software framework that allows
the developer to generate controller structures for
autonomous things through learning or procedural algorithms.
If a researcher develops an application using
FIoT, the application will contain a Java software
component already equipped with modules for
detecting autonomous things in an environment,
assigning a controller to a specific thing, creating
software agents, collecting data from devices and
supporting the communication structure among
agents and devices.
Some features are variable and may be selected/developed according to the application type,
as follows: (i) a control module such as “if-else”,
neural network or finite state machine; (2) an
adaptive technique to synthesize the controller
at design-time, such as reinforcement learning
[124] or genetic algorithm; and (iii) an evaluation
process to evaluate the behavior of autonomous
things that are making decisions based on the
controller.
For example, Table 1 summarizes how the
“Streetlight Control” application will adhere
to the proposed framework using a machine
learning-based approach, while extending the
FIoT flexible points.
Table 2 summarizes how the “Streetlight Control” application will adhere to the proposed
framework using a solution provided by a software engineer, while extending the FIoT flexible
points.
Our goal is to provide both solutions to the
same application and compare the results based
on the same evaluation process.
Making Evaluation
Controller Adaptation
at design time
Light Control Application
Three Layer Neural Network
Collective Fitness Evaluation:
the solution is evaluated
based on the energy
consumption, the number of
people that finished their
routes after the
simulation ends, and the
total time spent by people
to move during their trip
Evolutionary Algorithm:
Generate a pool of
candidates to represent the
neural network parameters
TABLE 2
Implementing FIoT flexible points to synthesize streetlight
controllers using a solution provided by a Software
Engineer
FIoT Framework
Controller
Making Evaluation
Controller Adaptation
at design time
3
Light Control Application
if-else module provided by a
software engineer
Collective Fitness Evaluation:
the solution is evaluated
based on the energy
consumption, the number of
people that finished their
routes after the
simulation ends, and the
total time spent by people
to move during their trip
None
C ONTROLLED E XPERIMENT
The first step of the experiment was to reproduce
the experiment presented in [118] by using a not
supervised learning approach. Then, we invited
14 software engineers to provide a solution for
the same problem. Finally, we compared the solution provided through the learning algorithm
against solutions provided by the participants.
3.1
Participant Analysis
As we have described previously, the knowledge in the application domain is an important
variable in our empirical study. Therefore, before
performing the controlled experiment, we asked
participants to describe their experience with the
development of applications based on the Internet of Things, that is, developing distributed
systems with embedded characteristics, such as
providing each element of the system with sensors and actuators. As shown in Figure 2, 43% of
6
Medium
High
14%
Low
22%
21%
43%
None
Fig. 2. Experience of participants in developing applications based on the Internet of Things.
participants have never developed an application
based on the Internet of Things and 57% have
developed at least one application.
3.2
Experiment: Streetlight Application
In short, our experiment involves developing
autonomous streetlights. The overall goal of this
application is to reduce the energy consumption while maintaining appropriate visibility in
illuminated areas [118]. For this purpose, we
provided each streetlight with ambient brightness and motion sensors, and an actuator to
control light intensity. In addition, we also provided streetlights with wireless communicators
as shown in Figure 3. Therefore, the streetlights
are able to cooperate with each other to establish
the most likely routes for passers-by and thus
achieve the goal of minimizing energy consumption.
Lighting
(Dark/DIM/Light)
Presence
(Yes/No)
Data collected from
the closest street light
(0.0/0.5/1.0)
Previous Listening
Decision
(Yes/No)
Each streetlight has to execute three tasks
every second: data collection, decision-making
and action enforcement. The first task consists
of receiving data related to people flow, ambient brightness, data from the neighboring streetlights and current light status (activation level
of sensors and the previous output value of
listeningDecision). The second task consists of
analyzing collected data and making decisions
about actions to be enforced. The last task is
the action enforcement, which consists of setting
the value of three output variables: (i) listeningDecision, that enables the streetlight to receive
signals from neighboring streetlights in the next
cycle; (ii) wirelessTransmitter, a signal value to
be transmitted to neighboring streetlights; and
(iii) lightDecision, that activates the light’s OFF/DIM/ON functions.
The interested reader may consult a more
extensive paper about the application scenario
[118] 1 .
3.2.1 The Challenge
As we explained to the participants, the tasks
of collecting data and enforcing actions have
already been implemented. The challenge was
to provide a solution for the task of making
decisions, as depicted in Figure 4.
Light Decision
(OFF/DIM/ON)
Wireless
Transmitter
(0.0/0.5/1.0)
Listening
Decision
(Yes/No)
Fig. 3. Variables collected and set by streetlights.
Each streetlight in the simulation has a microcontroller that is used to detect the proximity
of a person, and control the closest streetlight. A
streetlight can change the status of its light to ON,
OFF or DIM.
Fig. 4. The challenge: how does a streetlight make decisions based on collected data?
We provided pseudocode that considered all
possible combinations of input variables. Then,
participants decided how to set output variables
according to the collected data. Part 2 of this
pseudocode is depicted in Figure 5.
Each participant provided a different solution. Therefore, we conducted the experiment by
1. All documents that we prepared to explain this application scenario to participants are available at
http://www.inf.puc-rio.br/.̃nnascimento/projects.html
2. The pseudocode that we provided to participants is
available at:
http://www.inf.puc-rio.br/.̃nnascimento/projects.html
7
Fig. 5. Small portion of the pseudocode of the decision module that was filled by participants.
if (lighting_sensor = Medium AND detected_person =
NO AND data_collected = 0.0 AND
previous_listening_decision = YES) then {
light_decision = __X_OFF____DIM____ON
wireless_transmitter = __X_0.0 ___0.5____1.0
listening_decision = _X__YES ____NO
} if (lighting_sensor = Medium AND detected_person =
YES AND data_collected = 0.0 AND
previous_listening_decision = YES) then {
light_decision = ___OFF__X__DIM____ON
wireless_transmitter = _X__0.0 ___0.5____1.0
listening_decision = __X_YES ____NO
} if (lighting_sensor = Dark AND detected_person = NO
AND data_collected = 0.0 AND
previous_listening_decision = NO) then {
light_decision = __X_OFF____DIM____ON
wireless_transmitter = ___0.0 __X_0.5____1.0
listening_decision = ___YES __X__NO
}
Fig. 6. Small portion of the rule decisions that was synthesized according to the learning-based approach.
using each one. In addition, we also considered
a “zeroed” solution, which always sets all values
to zero. This zeroed solution is supposed to be
the worst solution, since streetlights will always
switch their lights to OFF.
3.2.2 The solution generated by a machinelearning algorithm
We compared the results from all of these approaches to the result produced using the machine learning approach. As do Nascimento and
Lucena explain in [118], the learning approach
uses a three-layer feedforward neural network
combined with an evolutionary algorithm to generate decision rules automatically. Figure 6 depicts some of the rules that were generated by the
evolved neural network. The interested reader
can consult more extensive papers [101], [118] or
read Nascimento’s dissertation [116] (chap. ii, sec.
iii).
Based on the generated rules and the system
execution, we observe that using the solution
provided by the neural network, only the street-
lights with broken lamps emit “0.5” from their
wireless transmitters.
In addition, we also observed that a streetlight
that is not broken switches its lamp ON if it detects a persons proximity or receives “0.5” from a
wireless transmitter.
3.2.3
Scenario constraints
Before starting a solution, each participant
should consider the following constraints:
•
•
•
Do not take light numbering into account,
since your solution may be used in different scenarios (see an example of a scenario
in Figure 7).
Three streetlights will go dark during the
simulation.
People walk along different paths starting
at random departure points. Their role is
to complete their routes by reaching a destination point. The number of people that
finished their routes after the simulation
ends, and the total time spent by people
8
•
•
•
•
moving during their trip are the most
important factors for a good solution.
A person can only move if his current and
next positions are not completely dark.
In addition, we also consider that people
walk slowly if the place is partially devoid
of light.
The energy consumption also influences
the solution evaluation.
The energy consumption is proportional
to the light status (OFF/DIM/ON).
We also consider the use of the wireless
transmitter to calculate energy consumption (if the streetlight emits something
different from “0.0”, it consumes 0.1 of
energy).
Therefore, each solution is evaluated after the
simulation ends based on the energy consumption, the number of people that finished their
routes after the simulation ends, and the total
time spent by people moving during their trip.
Figure 7 depicts the elements that are part of the
application namely, streetlights, people, nodes
and edges.
Execution: 12 seconds
- A person moves from
one point to another in
one second or a second
and a half.
- Street lights execute
cycles of 1 second
ON
DIM
OFF
Broken Lamps
departure points
target points
Fig. 7. Simulated Neighborhood.
Nascimento and Lucena [118] modeled the
scenario as a graph, in which a node represents
a streetlight position and an edge represents
the smallest distance between two streetlights.
(completedP eople × 100)
The graph representing the streetlight network
pP eople =
(1)
consists of 18 nodes and 34 edges. Each node
totalP eople
represents a streetlight. In the graph, the yellow,
(totalEnergy × 100)
pEnergy = 11×(timeSimulation×totalSmartLights) gray, black and red triangles represent the street) light status (ON/DIM/OFF/Broken Lamp). Each
(
10
(2) edge is two-way and links two nodes. In addi(totalT imeT rip × 100)
tion, each edge has a light intensity parameter
pT rip = 3×timeSimulation
((
) × totalP eople)
that is the sum of the environmental light and the
(2)
(3) brightness from the streetlights in its nodes. Their
f itness = (1.0 × pP eople) − (0.6 × pT rip)−
goal is to simulate different lighting in different
(0.4 × pEnergy)
neighborhood areas.
(4)
Equations (1) through (4) show the values to
be calculated for the evaluation in which pP eople
is the percentage of the number of people that
completed their routes before the end of the
simulation out of the total number of people
in the simulation; pEnergy is the percentage of
energy that was consumed by streetlights out of
the maximum energy value that could be consumed during the simulation. We also considered
the use of the wireless transmitter to calculate
energy consumption; pT rip is the percentage of
the total duration time of peoples trips out of the
maximum time value that their trip could spend;
and f itness is the fitness of each candidate that
encodes the proposed solution.
3.2.4 Example - Simulating the environment
We showed participants the same simulated
neighborhood scenario that was used by the genetic algorithm to evolve the neural network.
1 second/1 second and a half
Fig. 8. Person moving in the simulated Neighborhood.
As depicted in Figure 8, only one person was
started in the scenario that we showed to participants. For instance, the person starting at point
0 has point 11 as a target. We ask participants to
provide a solution to streetlights to assure that
9
this person will conclude his route before the
simulation ends after 12 seconds.
3.2.5
New Scenario: Unknown environment
The second step of the experiment consists of
executing solutions from participants and the
learning approach in a new scenario, but with the
same constraints. This scenario, that is depicted
in Figure 9 was not used by the learning algorithm and was not presented to participants.
The goal of this new part of the experiment
is to verify if the decision module that was designed to control streetlights in the first scenario
can be reused in another scenario.
the solution provided by each one of the 14
participants 3 .
To provide a controlled experiment and be
able to compare the different solutions, we
started with only one person in the scenario and
manually we set the parameters that were supposed to be randomly selected, such as departure
and target points and broken lamps.
Each experiment execution consists of executing the simulated scenario three times: (i) night
(environmental light is equal to 0.0); (ii) late
afternoon (environmental light is equal to 0.5);
and (iii) morning (environmental light is equal
to 1.0). The main idea is to determine how the
solution behaves during different parts of the
day. Figure 10 depicts the percentage of energy
that was spent according to the environmental
light for each one of the 16 different solutions. As
we described previously, we also considered the
use of the wireless transmitter to calculate energy
consumption. As expected, as streetlights using
the zeroed decision never switch their lights ON
and never emit any signal, the energy consumed
using this solution is always zero. It is possible
to observe that only the solutions provided by
the learning algorithm and by the 5th and 11th
participants do not expend energy when the environmental light is maximum. In fact, according
to the proposed scenario, there is no reason to
turn ON streetlights during the period of the day
with maximum illumination.
100
90
.
Fig. 9. Simulating a new neighborhood.
80
0
70
60
(
50
.)1
In this new scenario, we also only started
one person, who has the point 18 (yellow point)
as departure and the point 8 as target. As the
scenario is larger, we established a simulation
time of 30 seconds.
40
30
20
10
0
.
4
E XPERIMENT - PART 1 - R ESULTS
We executed the experiment 16 times, only
changing the decision solution of the autonomous streetlights. In the first instance, we
set all outputs to zero (the zeroed solution) during the whole simulation, which is supposed to
be the worst solution. For example, streetlights
never switch their lights ON. In the second instance, we executed the experiment using the
best solution that was found by the learning
algorithm, according to the experiment presented
in [118]. Then, we executed the simulation for
.)1
).5
.)1
).5
%
.)1
).5
Fig. 10. Scenario1: Percentage of energy spent in different
parts of the day according to the participant solutions.
Figure 11 depicts the percentage of time that
was spent by the unique person in each one of
the simulations. As shown, the higher difference
between solutions occurs at night. If the time is
3. All files that were generated during the development
of this work, such as executable files and participants’
solutions results, are available at
http://www.inf.puc-rio.br/.̃nnascimento/projects.html
10
100%, it means that the person did not complete
the route, thus the solution did not work
4.1 Discussion: Participants Knowledge in
IoT Versus Results
100
90
80
) (
).
70
60
40
simulation time did not allow the person to finish
the route.
After executing the solution proposed by each
participant, we connect that solution’s results
with the participant’s knowledge in the IoT domain, as shown in Table 3.
50
30
20
10
0
TABLE 3
Correlation between participants expertises in the Internet
of Things with their solution results.
1) 0
). (
).
(
%
).
(
Fig. 11. Scenario1: Percentage of time spent by person
to conclude his route based on different parts of the day
according to the participant solutions.
Besides presenting the results of the different
solutions in different parts of the day, the best
solution must be the one that presents the best
result for the whole day. Thus, we calculated the
average of each one of the parameters (energy,
people, trip and fitness) that was achieved by
solutions in different parts of the day. Figure 12
depicts a common average. We also calculated a
weighted average, taking into account the duration of the parts of the day (we considered 12
hours for the night period, 3h for dim and 9h for
the morning), but the results were very similar.
100
Software
Engineer
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Learning
zeroed
Experience
with IoT
Development
(None/Low/
Medium/
High)
High
None
High
Low
None
Low
Medium
None
High
None
None
Medium
None
Low
Solution
Performance
(Fitness
Average)
Does
the
solution
work?
55.48
26.99
62.88
62.49
30.50
51.09
54.37
16.59
28.62
61.60
29.67
47.81
30.32
56.91
59.53
28.33
Y
N
Y
Y
N
Y
Y
N
N
Y
N
Y
N
Y
Y
N
90
80
70
%
60
62.88
55.48
61.60
62.49
51.09
56.91 59.53
54.37
47.81
50
40
30
20
26.99
30.50
28.62
29.67
30.32
28.33
16.59
10
0
Fitness
We observe a significant difference between
results from software engineers with any experience in IoT development and results from
software engineers without experience in IoT
development. Participant 10 is the only individual without knowledge of IoT that provided a
solution that works and participant 9 is the only
individual with any knowledge of IoT that did
not provide a working solution.
Fig. 12. Scenario1: Average of energy, trip and fitness
calculated for the different parts of the day according to the
participant solutions.
4.2
As shown in Figure 12, based on the fitness
average, three participants namely 3, 4 and 10
provided a solution slightly better than the solution provided by the learning algorithm. Five
other participants provided a solution that works
and the remaining six provided a solution that
does not work. As explained earlier, we have
been considering an incorrect solution as one
in which the person did not finish the route
before the simulation ends. Even increasing the
In this section, we investigate the hypotheses
related to the solutions’ performance evaluation
(i.e H-RQ1 and H-RQ3), as presented in subsection 2.2. Thus, we performed statistical analyses,
as described by Peck and Devore [125], of the
measures presented in Table 3.
As shown in Table 4, we separated the results
of the experiments into two groups: i) software
engineers with IoT knowledge and ii) software
engineers without IoT knowledge. Then, we calculated the mean and the standard deviation of
Hypothesis Testing
11
the results achieved by each group performing
the experiment and compare each result against
the value achieved using the ML-based solution.
4.2.1 How does the evaluation result from a machine learning-based solution differ from solutions
provided by IoT expert software engineers with
respect to their performance?
H - RQ1.
•
•
H0. An ML-based approach does not improve the performance of autonomous
things compared to solutions provided by
IoT expert software engineers.
HA. An ML-based approach improves the
performance of autonomous things compared to solutions provided by IoT expert
software engineers.
The first null hypothesis H0 claims that there
is no difference between the mean performance
for IoT expert software engineers’ solutions and
the ML-based approach solution. The alternative
hypothesis claims that the ML-based approach
solution improves the performance of the application in comparison to IoT expert software engineers’ solutions. Thus, the claim is that the true
IoT expert software engineers’ solutions mean
is below the performance achieved by the MLbased approach, that is = 59.53.
Therefore, we used the ML performance as
our hypothesizedvalue to test the following onesided hypothesis:
H0: µs e = 59.53
H1: µs e < 59.53
where µs e denotes the true mean performance for all IoT expert software engineers’ solutions.
For instance, we restricted the population
sample to the number of software engineers that
confirmed having experience with developing
applications for the Internet of Things. As shown
in Table 4, the performance mean (x) of the IoT
expert software engineers’ solutions is 52.46 and
the standard deviation (σ ) is 10.91. To verify
if the data that we have is sufficient to accept
the alternative hypothesis, we need to verify the
probability of rejecting the null hypothesis [125].
Assuming that the H0 is true, and using a statistical significance level [125] of 0.01 (the chance of
one in 100 of making an error), we computed the
test statistic (t − statistic), as follows [125]:
t − statistic : t =
According to t-statistic theory, we can safely
reject our null hypothesis if the t − statistic
value is below the negative t − criticalvalue
(threshold) [125]. This negative t − criticalvalue
bounds the area of rejection of a T-distribution,
as shown in Figure 13. In our experiment, as we
specified a statistical significance level of 0.01,
the probability of getting a T-value less or equal
than the negative t − criticalvalue is 1%. We calculated the tcriticalvalue of this T-distribution
according to the T-table presented in Peck and
Devore (2011, pg 791) [125]. Accordingly, for a
distribution with 7 degrees of freedom (see Table
4) and a confidence level of 99%, the negative
tcriticalvalue is -3.00. As we depicted in Figure
13, the test statistic of our sample is higher than
the tcriticalvalue.
norm.php 850×350 pixels
12/11/17, 6:12 PM
Fig. 13. Hypothesis H - RQ1 Test Graph.
As the test statistic does not fall in the critical
region, we cannot safely reject this null hypothesis. Based on a t-value of -1.83 and a degree of
freedom of 7, we could reject our null hypothesis
only if we had reduced the precision of our
experiment to 85%. Thus, we would fail to reject
the null hypothesis and would not accept the
alternative hypothesis. Therefore, we cannot
state that an ML-based approach improves the
performance of autonomous things compared
to solutions provided by IoT expert software
engineers.
http://www.imathas.com/stattools/norm.php
Page 1 of 1
4.2.2 How does the evaluation result from a machine learning-based solution differ from solutions
provided by software engineers without IoT skills
with respect to their performance?
H - RQ3.
•
(x − hypothesizedvalue)
t − statistic : t =
(5)
( √σn )
(52.46 − 59.53)
= −1.83 (6)
√ )
( 10.91
8
H0. An ML-based approach does not improve the performance of autonomous
things compared to solutions provided by
12
TABLE 4
Data to perform test statistic.
Variable
Software
Engineers
Software
Engineers
with IoT
knowledge
Software
Engineers
without IoT
knowledge
Machinelearning
based
approach
•
Standard
deviation
σ
Degrees
of
freedom
(n-1)
t
critical
value
(.99%)
49.45
16.00
13
2.65
52.46
54.92
10.91
7
3.00
32.61
30.00
15.15
5
3.37
n
samples
Highest
value
Mean
x
Median
14
62.88
43.95
8
62.88
6
61.60
1
59.53
software engineers without experience in
IoT development.
HA. An ML-based approach improves the
performance of autonomous things compared to solutions provided by software
engineers without experience in IoT development.
For instance, we restricted the population
sample to the number of software engineers that
confirmed not having experience with developing applications for the Internet of Things. As
shown in Table 4, the performance mean (x) of
the solutions from software engineers without
experience in IoT development is 32.61 and the
standard deviation (σ ) is 15.15. Thus, the
t − statistic : t =
(32.61 − 59.53)
= −4.35 (7)
√ )
( 15.15
6
As shown in Table 4, this T-distribution has 5
degrees of freedom. Thus, for a confidence level
of 99%, the negative tcriticalvalue is -3.37. As
we depicted in Figure 14, the test statistic of our
sample is below the tcriticalvalue .
norm.php 850×350 pixels
Fig. 14. Hypothesis H - RQ3 Test Graph.
12/11/17, 6:14 PM
As the t − statistic value is below the
negative tcriticalvalue (-4.35 < −3.37), we can
safely reject the null hypothesis, assuring that
the error chancing of making an error is lower
than 1%. Therefore, we accepted the alternative
hypothesis: An ML-based approach improves the
performance of autonomous things compared to
solutions provided by software engineers with no
experience in IoT development.
5
E XPERIMENT - PART 2 - R ESULTS
As explained previously, the second part of the
experiment consists of translating the solution
provided by machine learning and participants
to an unknown environment. In this second part
of the experiment, we also executed the simulation 16 times: for each one of the participants’
solutions, for the machine-learning solution and
for the zeroed solution.
Table 5 shows the results that were achieved
by the different solutions at night in a simulation
of 30 seconds. As shown, most of the solutions
did not work. The person in these simulations
did not finish the route even when we increased
the simulation time. Only the solution provided
by the machine-learning algorithm and by participant 12 worked. Remember, this scenario was
not used by the machine-learning algorithm during the training process. This solution was provided through machine learning for the first scenario and it was just reused in this new scenario.
In other words, we did not restart the machinelearning process.
We selected only those solutions that worked
and verified their results for the other periods of
13
the day (morning and late afternoon). As shown
in Table 6, when considering the whole day, the
machine-learning approach presented the best
result. Because the average time for the trip
was a little higher using the machine-learning
approach, the difference in energy consumption
between the two solutions is considerably higher.
of 14 engineers, only one participant, who has
experience with IoT development, provided a
solution that worked.
Bad
93%
TABLE 5
Using the same solution in a different environment - only
at night.
Software
Engineer
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Learning
zeroed
Energy%
People%
Trip%
Fitness
6.50
2.77
6.62
4.30
2.58
6.88
8.33
2.33
3.77
3.78
11.36
50.56
2.77
4.50
24.44
0
0
0
0
0
0
0
0
0
0
0
0
100
0
0
100
0
100
100
100
100
100
100
100
100
100
100
100
42.22
100
100
61.11
100
-42.60
-41.11
-42.65
-41.72
-41.03
-42.75
-43.33
-60.26
-41.51
-60.18
-44.54
54.43
-41.11
-41.80
53.55
-40
TABLE 6
Using the same solution in a different environment - day
average.
Average
Participant
12
Average
Learning
5.1
Energy%
People%
Trip%
Fitness
50.52
100
38.14
56.90
8.46
100
46.29
68.83
0% Work better than ML
7%
Work
Fig. 15. Participants’ solution results in the second scenario.
Therefore, we can safely reject the null hypothesis and accept both alternative hypotheses:
1)
2)
6
H-RQ2: H1: An ML-based approach increases the reuse of autonomous things
compared to solutions provided by IoT
expert software engineers.
H-RQ4: H1: 2) An ML-based approach
increases the reuse of autonomous things
compared to solutions provided by software engineers with no experience with
IoT development.
D ISCUSSION
In this section, we analyze the empirical experimental results to understand which tasks are
better performed by humans and which by algorithms. This is important for selecting whether
software engineers or machine learning can accomplish a specific task better.
In our empirical study, in which we have assessed performance and reuse tasks, we accepted
three alternative hypotheses and rejected one:
Hypothesis Testing
In this section, we investigate the hypotheses related to the solutions’ reuse evaluation, that is HRQ2 and H-RQ4, as presented in subsection 2.2.
Their alternative hypotheses state that an MLbased approach improves the performance of autonomous things compared to solutions provided
by software engineers, software engineers with
experience in IoT development, and software engineers without experience in IoT development,
respectively. We planned to perform a statistical development to evaluate these hypotheses.
However, as depicted in Figure 15, in the new
scenario, 0% of participants provided a result
better than the result provided by the machinelearning solution. In addition, from the group
Accepted:
1)
2)
3)
An ML-based approach improves the
performance of autonomous things compared to solutions provided by software
engineers without experience with IoT
development.
An ML-based approach increases the
reuse of autonomous things compared
to solutions provided by IoT expert software engineers.
An ML-based approach increases the
reuse of autonomous things compared
to solutions provided by software engineers without experience with IoT development.
14
Based on these results, we have found evidence that the use of machine-learning techniques can perform some SE tasks better than
software engineers, considering solutions that
improve performance and increase reuse. As illustrated in the experimental results, only one
of the 14 software engineers provided a solution
that could be reused in a new scenario. Further
none of those software engineers provided a solution that works better than the ML’s solution
in this new scenario. If the flexibility of the application is the most important factor, based on
our results, we can safely recommend the use of
machine learning.
However, if we had considered performance
as the only important factor to evaluate the quality of these solutions, we have found evidence
that software engineers can perform SE tasks better than machine learning, considering “better”
as a solution that improves performance. As described in our experiments, we cannot state that
ML improves the performance of an application
in comparison to solutions provided by domain
expert software engineers. This is also an interesting result as many researchers, especially in the
IoT domain, have strictly focused on automating
software development.
In brief, our experiment indicates that in some
cases, software engineers outperform machinelearning algorithms, whereas in other cases, they
do not. The evidence shows that it is important to
know which one performs better in different situations in order to determine ways for software
engineers to work cooperatively and effectively
with automated machine-learning procedures.
(2016) [127] report the diversity of participants as
another possible threat. Therefore, in our study,
we needed to be aware of at least two threats
to validity namely: we have selected a sample of
only 14 participants, which may not be enough
to achieve conclusive results; and our sample
consisted of only graduate students from two
Brazilian universities. Such a group may not be
representative of all software engineers, who may
have substantially more professional experience
and background.
To mitigate the problems of the number of
participants and their diversity, we selected our
participants carefully. All of them have at least
two years of experience with software development. In addition, we allowed participants to
solve the problem by manipulating a pseudocode
version, thereby avoiding gaps in the participants’ knowledge, such as experience with a particular programming language or architecture.
Note that a survey was used to select participants
and they all indicated a level of experience with
pseudocode. The pseudocode provided by each
participant was carefully translated into Java as
this is the language supported by the Framework
for the Internet of Things.
Oizumi et al. (2017) reported a third threat
to validity in [126], namely, possible misunderstandings during the study. To mitigate this problem of misunderstandings, we asked all participants to write about their understanding of the
problem both before and after applying the solution. All participants indicated that they understood the task completely. We also asked them
about their confidence in their proposed solution. Most of them evaluated their own solution
with the highest grade, allowing us to increase
our confidence in the experimental results. In
addition, we assisted the participants during the
entire study, making sure they understood the
experimental task
7
8
Rejected:
1) An ML-based approach improves the
performance of autonomous things compared to solutions provided by IoT expert software engineers.
T HREATS TO VALIDITY
Although we have designed and conducted the
experiments carefully, there are always factors
that can challenge the experiments validity. Some
threats to validity as described in [123] could
indeed limit the legitimacy of our results. In this
section, we present the actions taken to mitigate
their impact of these factors on the research results.
As Oizumi et al. (2017) report in [126], the
number of participants in the study can be a
threat to validity. In addition, Fernandes et al
R ELATED W ORK
Comparing intelligent machines to the ability of
a person to solve a particular problem is not
a new approach. This kind of discussion has
been promoted since the beginning of Artificial
Intelligence. For example, in 1997, an important
moment in the history of technology happened
with Garry Kasparov’s 1997 chess match against
the IBM supercomputer Deep Blue [128].
Recently, Silver et al. (2016, 2017) [129], [130]
published a paper in the Nature Science Journal,
comparing the performance of a ML technique
15
against the results achieved by the world champion in the game of Go. In [130], Silver et al.
(2017) state that their program “achieved superhuman performance.”
Whiteson et al. [122] indirectly performed this
comparison, by evaluating the use of three different approaches of the neuroevolution learning
algorithm to solve the same tasks: (i) coevolution,
that is mostly unassisted by human knowledge;
(ii) layered learning, that is highly assisted; and
(iii) concurrent layered learning, that is a mixed
approach. The authors state that their results
“demonstrate that the appropriate level of human assistance depends critically on the difficulty of the problem.”
Furthermore, there is also a new approach
in machine learning, called Automatic Machine
Learning (Auto-ML) [100], which uses learning
to set the parameters of a learning algorithm automatically. In a traditional approach, a software
engineer with machine learning skills is responsible for finding a good configuration for the
algorithm parameters. Zoth and Lee [100] present
an Auto-ML-based approach to design a neural
network to classify images of a specific dataset.
In addition, they compared their results with
the previous state-of-the-art model, which was
designed by an ML expert engineer. According
to Zoth and Lee [100] , their AutoML-based approach “can design a novel network architecture
that rivals the best human-invented architecture
in terms of test set accuracy.” Zoth and Lee
also showed that a machine-learning technique
is capable of beating a software engineer with
ML skills in a specific software engineering task,
but the authors do not discuss this subject in the
paper.
Our paper appears to be the first to provide an empirical study to investigate the use
of a machine-learning techniques to solve a
problem in the field of Software Engineering,
by comparing the solution provided by a MLbased approach against solutions provided by
software engineers.
9
C ONCLUSION AND F UTURE W ORK
Several researchers have proposed the use of
machine-learning techniques to automate software engineering tasks. However, most of these
approaches do not direct efforts toward asking
whether ML-based procedures have higher success rates than current standard and manual
practices. A relevant question in this potential
line of investigation is: “Could a software engineer solve a specific development task better than
an ML algorithm?”. Indeed, it is fundamental to
evaluate which tasks are better performed by engineers or ML procedures so that they can work
together more effectively and also provide more
insight into novel human-in-the-loop machinelearning approaches to support SE tasks.
This paper appears to be the first to provide an empirical study comparing how software engineers and machine-learning algorithms
achieve performance and reuse tasks. In brief,
as a result of our experiment, we have found
evidence that in some cases, software engineers
outperform machine-learning algorithms, and in
other cases, they do not. Further, as is typical in
experimental studies, although we have designed
and conducted the experiment carefully, there are
always factors that can threaten the experiment’s
validity. For example, some threats include the
number and diversity of the software engineers
involved in our experiment.
Understanding how software engineers fare
against ML algorithms is essential to support
new methodologies for developing human-inthe-loop approaches in which machine learning
automated procedures assist software developers
in achieving their tasks. For example, methodologies to define which agent (engineers or automated ML procedure) should execute a specific
task in a software development set. Based on
this understanding, these methodologies can provide a basis for software engineers and machine
learning algorithms to cooperate in Software Engineering development more effectively.
Future work to extend the proposed experiment includes: (i) conducting further empirical
studies to assess other SE tasks, such as design,
maintenance and testing; (ii) experimenting with
other machine-learning algorithms such as reinforcement learning and backpropagation; and
(iii) using different criteria to evaluate task execution.
Possible tasks that could be investigated (refer
to (i)) include programming tasks, in which case
tasks performed by software development teams
and ML algorithms are compared. For example,
we could invite software developers from the
team with the highest score in the last ACM International Collegiate Programming Contest [131],
which is one of the most important programming
championships in the world, to be involved in
this comparison. This competition evaluates the
capability of software engineers to solve complex
16
software problems. Software engineers are classified according to the number of right solutions,
performance of the solutions and development
time.
Another line of investigation could address
the use of different qualitative or quantitative
methodologies. For example, the task execution comparison could rely on reference performances, such as the performance of highly
successful performers [100], [129], [130] . This
research work can also be extended by proposing, based on the comparison between the performance of engineers and ML algorithms, a
methodology for more effective task allocation.
This methodology could, in principle, lead to
more effective ways to allocate tasks such as software development in cooperative work involving humans and automated procedures. Such
human-in-the-loop approaches, which take into
account the strengths and weaknesses of humans
and machine learning algorithms, are fundamental to provide a basis for cooperative work in
software engineering and possibly in other areas.
ACKNOWLEDGMENTS
This work has been supported by the Laboratory of Software Engineering (LES) at PUC-Rio.
Our thanks to CAPES, CNPq, FAPERJ and PUCRio for their support through scholarships and
fellowships. We would also like to thank the
software engineers who participated in our experiment.
R EFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
F. Brooks and H. Kugler, No silver bullet.
April, 1987.
R. S. Pressman, Software engineering: a practitioner’s approach.
Palgrave Macmillan,
2005.
Q. Zhang, “Software developments,” Engineering Automation for Reliable Software, p.
292, 2000.
J. O. Kephart, “Research challenges of autonomic computing,” in Software Engineering,
2005. ICSE 2005. Proceedings. 27th International Conference on. IEEE, 2005, pp. 15–22.
J. Mostow, “Foreword what is ai? and what
does it have to do with software engineering?” IEEE Transactions on Software Engineering, vol. 11, no. 11, p. 1253, 1985.
D. Barstow, “Artificial intelligence and software engineering,” in Proceedings of the 9th
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
international conference on Software Engineering. IEEE Computer Society Press, 1987,
pp. 200–211.
D. Partridge, “Artificial intelligence and
software engineering: a survey of possibilities,” Information and Software Technology,
vol. 30, no. 3, pp. 146–152, 1988.
L. C. Cheung, S. Ip, and T. Holden, “Survey
of artificial intelligence impacts on information systems engineering,” Information
and Software Technology, vol. 33, no. 7, pp.
499–508, 1991.
D. Partridge, Artificial Intelligence in Software Engineering. Wiley Online Library,
1998.
A. Van Lamsweerde and L. Willemet, “Inferring declarative requirements specifications from operational scenarios,” IEEE
Transactions on Software Engineering, vol. 24,
no. 12, pp. 1089–1114, 1998.
G. D. Boetticher, “Using machine learning to predict project effort: Empirical case
studies in data-starved domains,” in Model
Based Requirements Workshop.
Citeseer,
2001, pp. 17–24.
F. Padberg, T. Ragg, and R. Schoknecht,
“Using machine learning for estimating the
defect content after an inspection,” IEEE
Transactions on Software Engineering, vol. 30,
no. 1, pp. 17–28, 2004.
D. Zhang, “Applying machine learning algorithms in software development,” in The
Proceedings of 2000 Monterey Workshop on
Modeling Software System Structures, 2000,
pp. 275–285.
——, “Machine learning in value-based
software test data generation,” in Tools with
Artificial Intelligence, 2006. ICTAI’06. 18th
IEEE International Conference on.
IEEE,
2006, pp. 732–736.
D. Zhang and J. J. Tsai, Machine learning
applications in software engineering. World
Scientific, 2005, vol. 16.
D. Zhang, “Machine learning and valuebased software engineering: a research
agenda.” in SEKE, 2008, pp. 285–290.
T. M. Khoshgoftaar, “Introduction to the
special issue on quality engineering with
computational intelligence,” 2003.
D. Zhang, “Machine learning and valuebased software engineering,” in Software
Applications: Concepts, Methodologies, Tools,
and Applications.
IGI Global, 2009, pp.
3325–3339.
17
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
D. Zhang and J. J. Tsai, “Machine learning
and software engineering,” in Tools with
Artificial Intelligence, 2002.(ICTAI 2002). Proceedings. 14th IEEE International Conference
on. IEEE, 2002, pp. 22–29.
M. D. Kramer and D. Zhang, “Gaps: a
genetic programming system,” in Computer
Software and Applications Conference, 2000.
COMPSAC 2000. The 24th Annual International. IEEE, 2000, pp. 614–619.
A. Holzinger, M. Plass, K. Holzinger, G. C.
Crişan, C.-M. Pintea, and V. Palade, “Towards interactive machine learning (iml):
applying ant colony algorithms to solve
the traveling salesman problem with the
human-in-the-loop approach,” in International Conference on Availability, Reliability,
and Security. Springer, 2016, pp. 81–95.
A. Holzinger, “Interactive machine learning for health informatics: when do we
need the human-in-the-loop?” Brain Informatics, vol. 3, no. 2, pp. 119–131, 2016.
S. Easterbrook, J. Singer, M.-A. Storey, and
D. Damian, “Selecting empirical methods
for software engineering research,” Guide to
advanced empirical software engineering, pp.
285–311, 2008.
H. A. Simon, “Whether software engineering needs to be artificially intelligent,” IEEE
Transactions on Software Engineering, no. 7,
pp. 726–732, 1986.
I. Sommerville, “Artificial intelligence and
systems engineering,” Prospects for Artificial Intelligence: Proceedings of AISB’93,
29 March-2 April 1993, Birmingham, UK,
vol. 17, p. 48, 1993.
R. S. Michalski, J. G. Carbonell, and T. M.
Mitchell, Machine learning: An artificial intelligence approach.
Springer Science &
Business Media, 2013.
A. Marchetto and A. Trentini, “Evaluating
web applications testability by combining
metrics and analogies,” in Information and
Communications Technology, 2005. Enabling
Technologies for the New Knowledge Society:
ITI 3rd International Conference on. IEEE,
2005, pp. 751–779.
S. Bouktif, F. Ahmed, I. Khalil, and G. Antoniol, “A novel composite model approach
to improve ality prediction,” Information
and Software Technology, vol. 52, no. 12, pp.
1298–1311, 2010.
L. Radlinski, “A survey of bayesian net
models for software development effort
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
prediction,” International Journal of Software
Engineering and Computing, vol. 2, no. 2, pp.
95–109, 2010.
W. Zhang, Y. Yang, and Q. Wang, “Handling missing data in software effort prediction with naive bayes and em algorithm,” in Proceedings of the 7th International
Conference on Predictive Models in Software
Engineering. ACM, 2011, p. 4.
Ł. Radliński, “A framework for integrated software quality prediction using
bayesian nets,” Computational Science and
Its Applications-ICCSA 2011, pp. 310–325,
2011.
P. O. O. Sack, M. Bouneffa, Y. Maweed,
and H. Basson, “On building an integrated
and generic platform for software quality
evaluation,” in Information and Communication Technologies, 2006. ICTTA’06. 2nd, vol. 2.
IEEE, 2006, pp. 2872–2877.
M. Reformat and D. Zhang, “Introduction to the special issue on:“software
quality improvements and estimations
with intelligence-based methods”,” Software Quality Journal, vol. 15, no. 3, pp. 237–
240, 2007.
B. Twala, M. Cartwright, and M. Shepperd,
“Applying rule induction in software prediction,” in Advances in Machine Learning
Applications in Software Engineering. IGI
Global, 2007, pp. 265–286.
V. U. Challagulla, F. B. Bastani, and I.-L.
Yen, “High-confidence compositional reliability assessment of soa-based systems using machine learning techniques,” in Machine Learning in Cyber Trust.
Springer,
2009, pp. 279–322.
R. C. Veras, S. R. Meira, A. L. Oliveira,
and B. J. Melo, “Comparative study of clustering techniques for the organization of
software repositories,” in Hybrid Intelligent
Systems, 2007. HIS 2007. 7th International
Conference on. IEEE, 2007, pp. 372–377.
I. Birzniece and M. Kirikova, “Interactive
inductive learning service for indirect analysis of study subject compatibility,” in Proceedings of the BeneLearn, 2010, pp. 1–6.
D. B. Hanchate, “Analysis, mathematical modeling and algorithm for software
project scheduling using bcga,” in Intelligent Computing and Intelligent Systems
(ICIS), 2010 IEEE International Conference on,
vol. 3. IEEE, 2010, pp. 1–7.
Z. Xu and B. Song, “A machine learning ap-
18
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
plication for human resource data mining
problem,” Advances in Knowledge Discovery
and Data Mining, pp. 847–856, 2006.
J. Wen, S. Li, Z. Lin, Y. Hu, and C. Huang,
“Systematic literature review of machine
learning based software development effort estimation models,” Information and
Software Technology, vol. 54, no. 1, pp. 41–
59, 2012.
E. Rashid, S. Patnayak, and V. Bhattacherjee, “A survey in the area of machine learning and its application for software quality
prediction,” ACM SIGSOFT Software Engineering Notes, vol. 37, no. 5, pp. 1–7, 2012.
H. A. Al-Jamimi and M. Ahmed, “Machine
learning-based software quality prediction
models: state of the art,” in Information
Science and Applications (ICISA), 2013 International Conference on. IEEE, 2013, pp. 1–4.
Ł. Radliński, “Enhancing bayesian network
model for integrated software quality prediction,” in Proc. Fourth International Conference on Information, Process, and Knowledge
Management, Valencia. Citeseer, 2012, pp.
144–149.
F. Pinel, P. Bouvry, B. Dorronsoro, and S. U.
Khan, “Savant: Automatic parallelization
of a scheduling heuristic with machine
learning,” in Nature and Biologically Inspired
Computing (NaBIC), 2013 World Congress on.
IEEE, 2013, pp. 52–57.
D. Novitasari, I. Cholissodin, and W. F.
Mahmudy, “Optimizing svr using local
best pso for software effort estimation,”
Journal of Information Technology and Computer Science, vol. 1, no. 1, 2016.
Ł. Radliński, “Towards expert-based modelling of integrated software quality,” Journal of Theoretical and Applied Computer Science, vol. 6, no. 2, pp. 13–26, 2012.
T. Rongfa, “Defect classification method
for software management quality control
based on decision tree learning,” in Advanced Technology in Teaching-Proceedings
of the 2009 3rd International Conference on
Teaching and Computational Science (WTCS
2009). Springer, 2012, pp. 721–728.
R. Rana and M. Staron, “Machine learning approach for quality assessment and
prediction in large software organizations,”
in Software Engineering and Service Science
(ICSESS), 2015 6th IEEE International Conference on. IEEE, 2015, pp. 1098–1101.
H. Wang, M. Kessentini, W. Grosky, and
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
H. Meddeb, “On the use of time series
and search based software engineering for
refactoring recommendation,” in Proceedings of the 7th International Conference on
Management of computational and collective
intElligence in Digital EcoSystems. ACM,
2015, pp. 35–42.
V. U. Challagulla, F. B. Bastani, I.-L.
Yen, and R. A. Paul, “Empirical assessment of machine learning based software defect prediction techniques,” in
Object-Oriented Real-Time Dependable Systems, 2005. WORDS 2005. 10th IEEE International Workshop on. IEEE, 2005, pp. 263–
270.
K. Kaminsky and G. Boetticher, “Building a genetically engineerable evolvable
program (geep) using breadth-based explicit knowledge for predicting software
defects,” in Fuzzy Information, 2004. Processing NAFIPS’04. IEEE Annual Meeting of the,
vol. 1. IEEE, 2004, pp. 10–15.
——, “How to predict more with less, defect prediction using machine learners in
an implicitly data starved domain,” in The
8th world multiconference on systemics, cybernetics and informatics, Orlando, FL. Citeseer,
2004.
K. Kaminsky and G. D. Boetticher, “Better
software defect prediction using equalized
learning with machine learners,” Knowledge
Sharing and Collaborative Engineering, 2004.
O. Kutlubay and A. Bener, “A machine
learning based model for software defect
prediction,” working paer, Boaziçi University,
Computer Engineering Department, 2005.
X. Ren, “Learn to predict “affecting
changes” in software engineering,” 2003.
E. Ceylan, F. O. Kutlubay, and A. B. Bener,
“Software defect identification using machine learning techniques,” in Software Engineering and Advanced Applications, 2006.
SEAA’06. 32nd EUROMICRO Conference on.
IEEE, 2006, pp. 240–247.
Y. Kastro and A. B. Bener, “A defect prediction method for software versioning,”
Software Quality Journal, vol. 16, no. 4, pp.
543–562, 2008.
O. Kutlubay, B. Turhan, and A. B. Bener, “A
two-step model for defect density estimation,” in Software Engineering and Advanced
Applications, 2007. 33rd EUROMICRO Conference on. IEEE, 2007, pp. 322–332.
A. S. Namin and M. Sridharan, “Bayesian
19
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
reasoning for software testing,” in Proceedings of the FSE/SDP workshop on Future of
software engineering research. ACM, 2010,
pp. 349–354.
C. Murphy and G. Kaiser, “Metamorphic runtime checking of non-testable programs,” Columbia University Dept of Computer Science Tech Report cucs-042-09, p.
9293, 2009.
W. Afzal, R. Torkar, R. Feldt, and
T. Gorschek, “Genetic programming for
cross-release fault count predictions in
large and complex software projects,” Evolutionary Computation and Optimization Algorithms in Software Engineering, pp. 94–126,
2010.
C. Murphy et al., “Using metamorphic testing at runtime to detect defects in applications without test oracles,” 2008.
D. Qiu, S. Fang, and Y. Li, “A framework to
discover potential deviation between program and requirement through mining object graph,” in Computer Application and System Modeling (ICCASM), 2010 International
Conference on, vol. 4. IEEE, 2010, pp. V4–
110.
C. Murphy, G. E. Kaiser et al., “Automatic
detection of defects in applications without
test oracles,” Dept. Comput. Sci., Columbia
Univ., New York, NY, USA, Tech. Rep. CUCS027-10, 2010.
W. Afzal, “Search-based approaches to software fault prediction and software testing,” Ph.D. dissertation, Blekinge Institute
of Technology, 2009.
M. K. Taghi, B. Cukic, and N. Seliya, “An
empirical assessment on program moduleorder models,” Quality Technology & Quantitative Management, vol. 4, no. 2, pp. 171–
190, 2007.
J. H. Wang, N. Bouguila, and T. Bdiri, “Empirical evaluation of selected algorithms for
complexity-based classification of software
modules and a new model,” in Intelligent
Systems: From Theory to Practice. Springer,
2010, pp. 99–131.
H. Jin, Y. Wang, N.-W. Chen, Z.-J. Gou,
and S. Wang, “Artificial neural network for
automatic test oracles generation,” in Computer Science and Software Engineering, 2008
International Conference on, vol. 2. IEEE,
2008, pp. 727–730.
J. Ferzund, S. N. Ahsan, and F. Wotawa,
“Automated classification of faults in pro-
[70]
[71]
[72]
[73]
[74]
[75]
[76]
[77]
[78]
[79]
[80]
[81]
gramms using machine learning techniques,” in Artificial Intelligence Techniques
in Software Engineering Workshop, 2008.
O. Maqbool and H. Babri, “Bayesian learning for software architecture recovery,” in
Electrical Engineering, 2007. ICEE’07. International Conference on. IEEE, 2007, pp. 1–6.
A. Okutan, “Software defect prediction using bayesian networks and kernel methods,” Ph.D. dissertation, ISIK UNIVERSITY, 2012.
D. Cotroneo, R. Pietrantuono, and S. Russo,
“A learning-based method for combining
testing techniques,” in Proceedings of the
2013 International Conference on Software Engineering. IEEE Press, 2013, pp. 142–151.
D. Zhang, “A value-based framework for
software evolutionary testing,” in Advances
in Abstract Intelligence and Soft Computing.
IGI Global, 2013, pp. 355–373.
A. Okutan and O. T. Yıldız, “Software defect prediction using bayesian networks,”
Empirical Software Engineering, vol. 19, no. 1,
pp. 154–181, 2014.
S. Agarwal and D. Tomar, “A feature selection based model for software defect
prediction,” assessment, vol. 65, 2014.
G. Abaei and A. Selamat, “Important issues in software fault prediction: A road
map,” in Handbook of Research on Emerging
Advancements and Technologies in Software
Engineering. IGI Global, 2014, pp. 510–539.
A. Okutan and O. T. Yildiz, “A novel kernel
to predict software defectiveness,” Journal
of Systems and Software, vol. 119, pp. 109–
121, 2016.
X.-d. Mu, R.-h. Chang, and L. Zhang,
“Software defect prediction based on competitive organization coevolutionary algorithm,” Journal of Convergence Information
Technology (JCIT) Volume7, Number5, 2012.
J. Cahill, J. M. Hogan, and R. Thomas,
“Predicting fault-prone software modules
with rank sum classification,” in Software
Engineering Conference (ASWEC), 2013 22nd
Australian. IEEE, 2013, pp. 211–219.
R. Rana, M. Staron, C. Berger, J. Hansson, M. Nilsson, and W. Meding, “The
adoption of machine learning techniques
for software defect prediction: An initial
industrial validation,” in Joint Conference
on Knowledge-Based Software Engineering.
Springer, 2014, pp. 270–285.
T. Schulz, Ł. Radliński, T. Gorges, and
20
[82]
[83]
[84]
[85]
[86]
[87]
[88]
[89]
[90]
[91]
W. Rosenstiel, “Predicting the flow of defect correction effort using a bayesian network model,” Empirical Software Engineering, vol. 18, no. 3, pp. 435–477, 2013.
E. Rashid, “R4 model for case-based reasoning and its application for software
fault prediction,” International Journal of
Software Science and Computational Intelligence (IJSSCI), vol. 8, no. 3, pp. 19–38, 2016.
——, “Improvisation of case-based reasoning and its application for software fault
prediction,” International Journal of Services
Technology and Management, vol. 21, no. 4-6,
pp. 214–227, 2015.
J. K. Chhabra and A. Parashar, “Prediction of changeability for object oriented
classes and packages by mining change
history,” in Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian
Conference on. IEEE, 2014, pp. 1–6.
G. Spanoudakis, A. S. d. Garcez, and
A. Zisman, “Revising rules to capture requirements traceability relations: A machine learning approach.” in SEKE, 2003,
pp. 570–577.
M. Shin and A. Goel, “Modeling software component criticality using a machine learning approach,” Artificial Intelligence and Simulation, pp. 440–448, 2005.
J. S. Shirabad, “Predictive techniques in
software engineering,” in Encyclopedia of
Machine Learning. Springer, 2011, pp. 782–
789.
A. A. Araújo, M. Paixao, I. Yeltsin, A. Dantas, and J. Souza, “An architecture based
on interactive optimization and machine
learning applied to the next release problem,” Automated Software Engineering, pp.
1–49, 2016.
T. Tourwé, J. Brichau, A. Kellens, and
K. Gybels, “Induced intentional software
views,” Computer Languages, Systems &
Structures, vol. 30, no. 1, pp. 35–47, 2004.
J. S. Di Stefano and T. Menzies, “Machine
learning for software engineering: Case
studies in software reuse,” in Tools with
Artificial Intelligence, 2002.(ICTAI 2002). Proceedings. 14th IEEE International Conference
on. IEEE, 2002, pp. 246–251.
J. Fu, F. B. Bastani, and I.-L. Yen, “Automated ai planning and code pattern based
code synthesis,” in Tools with Artificial Intelligence, 2006. ICTAI’06. 18th IEEE International Conference on. IEEE, 2006, pp. 540–
546.
J. Fu, F. B. Bastani, I.-L. YEN et al.,
“Semantic-driven component-based automated code synthesis,” Semantic Computing, pp. 249–283, 2010.
[93] A. Katasonov, O. Kaykova, O. Khriyenko,
S. Nikitin, and V. Y. Terziyan, “Smart
semantic middleware for the internet of
things.” ICINCO-ICSO, vol. 8, pp. 169–178,
2008.
[94] L. Baresi, S. Guinea, and A. Shahzada,
“Short paper: Harmonizing heterogeneous
components in sesame,” in Internet of
Things (WF-IoT), 2014 IEEE World Forum on.
IEEE, 2014, pp. 197–198.
[95] L. Zhu, H. Cai, and L. Jiang, “Minson: A
business process self-adaptive framework
for smart office based on multi-agent,” in
e-Business Engineering (ICEBE), 2014 IEEE
11th International Conference on. IEEE, 2014,
pp. 31–37.
[96] J. F. De Paz, J. Bajo, S. Rodrı́guez, G. Villarrubia, and J. M. Corchado, “Intelligent
system for lighting control in smart cities,”
Information Sciences, vol. 372, pp. 241–255,
2016.
[97] I. Birzniece, “The use of inductive learning
in information systems,” in Proceedings of
the 16th International Conference on Information and Software Technologies, 2010, pp. 95–
101.
[98] D. Alrajeh, A. Russo, and S. Uchitel, “Inferring operational requirements from scenarios and goal models using inductive learning,” in Proceedings of the 2006 international
workshop on Scenarios and state machines:
models, algorithms, and tools. ACM, 2006,
pp. 29–36.
[99] A. M. Sharifloo, A. Metzger, C. Quinton,
L. Baresi, and K. Pohl, “Learning and evolution in dynamic software product lines,”
in Proceedings of the 11th International Symposium on Software Engineering for Adaptive
and Self-Managing Systems. ACM, 2016, pp.
158–164.
[100] B. Zoph and Q. V. Le, “Neural architecture
search with reinforcement learning,” arXiv
preprint arXiv:1611.01578, 2016.
[101] N. M. do Nascimento and C. J. P. de Lucena, “Fiot: An agent-based framework for
self-adaptive and self-organizing applications based on the internet of things,” Information Sciences, vol. 378, pp. 161–176, 2017.
[102] F. Jacob and R. Tairas, “Code template in[92]
21
[103]
[104]
[105]
[106]
[107]
[108]
[109]
[110]
[111]
[112]
[113]
ference using language models,” in Proceedings of the 48th Annual Southeast Regional
Conference. ACM, 2010, p. 104.
B. Amal, M. Kessentini, S. Bechikh, J. Dea,
and L. B. Said, “On the use of machine
learning and search-based software engineering for ill-defined fitness function: a
case study on software refactoring,” in International Symposium on Search Based Software Engineering. Springer, 2014, pp. 31–
45.
Y. Peng, G. Wang, and H. Wang, “User
preferences based software defect detection
algorithms selection using mcdm,” Information Sciences, vol. 191, pp. 3–13, 2012.
H. A. Abbass, E. Petraki, K. Merrick, J. Harvey, and M. Barlow, “Trusted autonomy
and cognitive cyber symbiosis: Open challenges,” Cognitive computation, vol. 8, no. 3,
pp. 385–408, 2016.
W. G. Baxt, “Use of an artificial neural
network for the diagnosis of myocardial
infarction,” Annals of internal medicine, vol.
115, no. 11, pp. 843–848, 1991.
M. A. Mazurowski, P. A. Habas, J. M.
Zurada, J. Y. Lo, J. A. Baker, and G. D.
Tourassi, “Training neural network classifiers for medical decision making: The
effects of imbalanced datasets on classification performance,” Neural networks, vol. 21,
no. 2, pp. 427–436, 2008.
N. M. do Nascimento, M. L. Viana, and
C. J. P. de Lucena, “An iot-based tool for
human gas monitoring,” in IXV Congresso
Brasileiro de Informatica em Saude (CBIS),
vol. 1. SBIS, 2016, pp. 96–98.
R. Morejón, M. Viana, and C. Lucena,
“Generating software agents for data mining: An example for the health data area,”
in International Conference on Software Engineering & Knowledge Engineering-SEKE,
2017.
S. Haykin, Neural Networks: A Comprehensive Foundation. Macmillan, 1994.
[Online]. Available: http://books.google.
com.br/books?id=PSAPAQAAMAAJ
D. Castelvecchi, “Can we open the black
box of ai?” Nature News, vol. 538, no. 7623,
p. 20, 2016.
L. Atzori, A. Iera, and G. Morabito, “The
internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
M. A. Salahuddin, A. Al-Fuqaha,
M. Guizani, K. Shuaib, and F. Sallabi,
[114]
[115]
[116]
[117]
[118]
[119]
[120]
[121]
[122]
[123]
[124]
[125]
“Softwarization of internet of things
infrastructure for secure and smart
healthcare,” Computer, vol. 50, no. 7, pp.
74–79, 2017.
I. Ayala, M. Amor, L. Fuentes, and J. M.
Troya, “A software product line process to
develop agents for the iot,” Sensors, vol. 15,
no. 7, pp. 15 640–15 660, 2015.
J.-P. Briot, N. M. de Nascimento, and C. J. P.
de Lucena, “A multi-agent architecture for
quantified fruits: Design and experience,”
in 28th International Conference on Software Engineering & Knowledge Engineering
(SEKE’2016). SEKE/Knowledge Systems
Institute, PA, USA, 2016, pp. 369–374.
N. M. Nascimento, “FIoT: An agentbased framework for self-adaptive and
self-organizing internet of things applications,” Master’s thesis, PUC-Rio, Rio de
Janeiro, Brazil, August 2015.
N. M. d. Nascimento, C. J. P. d. Lucena,
and H. Fuks, “Modeling quantified things
using a multi-agent system,” in IEEE / WIC
/ ACM International Conference on Web Intelligence and Intelligent Agent Technology (WIIAT), vol. 1. IEEE, 2015, pp. 26–32.
N. M. NASCIMENTO and C. J. P. LUCENA, “Engineering cooperative smart
things based on embodied cognition,” in
NASA/ESA Conference on Adaptive Hardware
and Systems (AHS 2017). IEEE, 2017.
Apple,
“Homekit,”
https://developer.apple.com/homekit/,
March 2017.
Samsung, “Samsung smart things,”
https://www.smartthings.com,
March
2017.
D. I. Sjøberg, T. Dybå, B. C. Anda, and
J. E. Hannay, “Building theories in software
engineering,” Guide to advanced empirical
software engineering, pp. 312–336, 2008.
S. Whiteson, N. Kohl, R. Miikkulainen, and
P. Stone, “Evolving soccer keepaway players through task decomposition,” Machine
Learning, vol. 59, no. 1-2, pp. 5–30, 2005.
C. Wohlin, P. Runeson, M. Höst, M. C.
Ohlsson, B. Regnell, and A. Wesslén, Experimentation in software engineering. Springer
Science & Business Media, 2012.
R. S. Sutton and A. G. Barto, Reinforcement
learning: An introduction. MIT press Cambridge, 1998, vol. 1, no. 1.
R. Peck and J. Devore, Statistics: The Exploration & Analysis of Data. Nelson Educa-
22
tion, 2011.
[126] W. Oizumi, L. Sousa, A. Garcia, R. Oliveira,
A. Oliveira, O. Agbachi, and C. Lucena,
“Revealing design problems in stinky code:
a mixed-method study,” in Proceedings of
the 11th Brazilian Symposium on Software
Components, Architectures, and Reuse. ACM,
2017, p. 5.
[127] E. Fernandes, F. Ferreira, J. A. Netto, and
E. Figueiredo, “Information systems development with pair programming: An academic quasi-experiment,” in Proceedings of
the XII Brazilian Symposium on Information
Systems on Brazilian Symposium on Information Systems: Information Systems in the
Cloud Computing Era-Volume 1. Brazilian
Computer Society, 2016, p. 64.
[128] G. Kasparov, Deep Thinking: Where Machine
Intelligence Ends and Human Creativity Begins. Hachette UK, 2017.
[129] D. Silver, A. Huang, C. J. Maddison,
A. Guez, L. Sifre, G. Van Den Driessche,
J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot et al., “Mastering the
game of go with deep neural networks and
tree search,” Nature, vol. 529, no. 7587, pp.
484–489, 2016.
[130] D. Silver, J. Schrittwieser, K. Simonyan,
I. Antonoglou, A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton et al.,
“Mastering the game of go without human
knowledge,” Nature, vol. 550, no. 7676, pp.
354–359, 2017.
[131] A. Trotman and C. Handley, “Programming contest strategy,” Computers & Education, vol. 50, no. 3, pp. 821–837, 2008.
| 2cs.AI
|
Joint optimization of transmission and propulsion in aerial
communication networks
arXiv:1710.01529v1 [cs.SY] 4 Oct 2017
Omar J. Faqir, Eric C. Kerrigan, and Deniz Gündüz
Abstract— Communication energy in a wireless network of
mobile autonomous agents should be considered as the sum of
transmission energy and propulsion energy used to facilitate the
transfer of information. Accordingly, communication-theoretic
and Newtonian dynamic models are developed to model the
communication and locomotion expenditures of each node.
These are subsequently used to formulate a novel nonlinear
optimal control problem (OCP) over a network of autonomous
nodes. It is then shown that, under certain conditions, the
OCP can be transformed into an equivalent convex form.
Numerical results for a single link between a node and access
point allow for comparison with known solutions before the
framework is applied to a multiple-node UAV network, for
which previous results are not readily extended. Simulations
show that transmission energy can be of the same order of
magnitude as propulsion energy allowing for possible savings,
whilst also exemplifying how speed adaptations together with
power control may increase the network throughput.
U2
U1
a1
p
a22 + δ22
AP
(0, 0)
Fig. 1: Geometric configuration for simulation setups featuring N = 1 (black) and N = 2 (green) nodes. Speeds
along these paths may be variable or fixed. The altitudes
and lateral displacements of U1 , U2 are a1 = a2 = 1000 m
and δ1 = 0, δ2 = 1000 m, respectively.
I. I NTRODUCTION
We aim to derive a control strategy to minimize communication energy in robotic networks. In particular, uninhabited
aerial vehicle (UAV) networks are considered, with results
being generalizable to broader classes of autonomous networks. A dynamic transmission model, based on physical
layer communication-theoretic bounds, and a mobility model
for each node is considered alongside a possible network
topology. As a cost function, we employ the underused
interpretation of communication energy as the sum of transmission energy and propulsion energy used for transmission,
i.e. when a node changes position to achieve a better channel.
For simulation purposes we consider the two wireless
network setups shown in Figure 1. We first present the most
basic scenario consisting of a single agent U1 moving along a
predefined linear path while offloading its data to a stationary
access point (AP). We compare results for variable and fixed
speeds, before studying a two-agent single-hop network.
For UAV networks, research efforts largely break down
into two streams: the use of UAVs in objective based
missions (e.g. search and pursuit [1], information gathering/mobile sensor networks [2], [3]), and use as supplementary network links [4]. Optimal completion of these
macro goals has been addressed in the literature, but there
The support of the EPSRC Centre for Doctoral Training in High Performance Embedded and Distributed Systems (HiPEDS, Grant Reference
EP/L016796/1) is gratefully acknowledged.
O. J. Faqir and Deniz Gündüz are with the Department of Electrical
& Electronics Engineering, Imperial College London, SW7 2AZ, U.K.
ojf12@ic.ac.uk, d.gunduz@ic.ac.uk
Eric C. Kerrigan is with the Department of Electrical & Electronic
Engineering and Department of Aeronautics, Imperial College London,
London SW7 2AZ, U.K. e.kerrigan@imperial.ac.uk
is no necessary equivalence between optimal task-based and
energy-efficient operations.
Efforts concerning mobility focus on mobile (in which
node mobility models are random) or vehicular (where
mobility is determined by higher level objectives and infrastructure) ad-hoc networks [5]. Since neither are fully
autonomous networks, mobility is not available as a decision
variable. The work in [6] introduced the concept of proactive
networks, where certain nodes are available as mobile relays.
However, the focus is on relay trajectory design and a simplistic transmission model is assumed, inherently prohibiting
energy efficiency. The related problem of router formation is
investigated in [7] using realistic models of communication
environments.
We assume hard path constraints, possibly due to the
existence of higher level macro objectives, but allow changes
in trajectory along the path by optimizing their speed (as
in [8], we define a trajectory as being a time-parameterized
path). Use of fixed paths does not restrict our results as
most UAV path planning algorithms operate over longer time
horizons and are generally restricted to linear or circular
loiter trajectories [8]. A linear program (LP) is used in [9]
to determine how close a rolling-robot should move before
transmission in order to minimize total energy. However, the
linear motion dynamics used restricts applicability of the
model. Similarly to our current work, [10] uses a single
mobile UAV relay to maximize data throughput between
a stationary source-destination pair. An optimal trajectory
for an a priori transmission scheme is iteratively found.
Similarly, for a given trajectory, the optimal relaying scheme
may be obtained through water-filling over the source-torelay and relay-to-receiver channels.
Our contribution differs from the above works in terms of
the formulation of a more general nonlinear convex OCP for
finding joint transmission and mobility strategies to minimize
communication energy. We solve this problem, exemplifying
possible savings for even just a single node. As a final
point, we show analytically and numerically that, even at
fixed speeds, the optimal transmission scheme for a twouser multiple-access channel(MAC) is counter-intuitive and
not captured by naı̈ve transmission policies.
II. P ROBLEM D ESCRIPTION
Consider N homogeneous mobile nodes Un , n ∈ N ,
{1, . . . , N }, traveling along linear non-intersecting trajectories at constant altitudes an and lateral displacements δn over
a time interval T , [0, T ]. The trajectory of node Un is
denoted by t 7→ (qn (t), δn , an ), relative to a single stationary
AP U0 at position (0, 0, 0) in a three dimensional space. At
t = 0, Un is initialized with a data load of Dn bits, which
must all be offloaded to U0 by time t = T . We consider a
cooperative network model, in which all nodes cooperate to
offload all the data in the network to the AP by relaying each
other’s data. Each node has a data buffer of capacity M bits,
which limits the amount of data it can store and relay.
CN (q, p) , {r ≥ 0 | fm (q, p, r, S) ≤ 0, ∀S ⊆ N } ,
We employ scalar additive white Gaussian noise (AWGN)
channels. For UAV applications, we assume all links are
dominated by line-of-sight (LoS) components, resulting in
flat fading channels, meaning all signal components undergo
similar amplitude gains [11]. All nodes have perfect information regarding link status, which in practice may be
achieved through feedback of channel measurements, while
the overhead due to channel state feedback is ignored.
Similar to [12], for a given link from source node Un to
receiver node Um , the channel gain ηnm (·) is expressed as
(1)
where qnm , qn − qm , constant G represents transmit and
receive antenna gains and α ≥ 1 the path loss exponent. We
define anm and δnm in a similar fashion. The channel gain
is inversely related to the Euclidean distance between nodes.
Each node has a single omnidirectional antenna of maximum transmit power of Pmax Watts. We consider half duplex
radios; each node transmits and receives over orthogonal
frequency bands. Accordingly, a different frequency band
is assigned for each node’s reception, and all messages
destined for this node are transmitted over this band, forming
a MAC. We do not allow any coding (e.g. network coding) or
combining of different data packets at the nodes, and instead
consider a decode-and-forward-based routing protocol at the
relay nodes [13]. The resulting network is a composition of
Gaussian MACs, for each of which the set of achievable
rate tuples defines a polymatroid capacity region [14]. If N
(2)
where q is the tuple of the differences qnm in positions
between the N users and the receiver, p ∈ P N is the
tuple of transmission powers allocated by the N users on
this channel, and P , [0, Pmax ] is the range of possible
transmission powers for each user. fm (·) is a nonlinear
function bounding CN (q, p), given by
X
fm (q, p, r, S) ,
rn −
n∈S
Bm log2
A. Communication Model
G
ηnm (qnm ) , p
2α ,
2 + q2
a2nm + δnm
nm
nodes simultaneously transmit independent information to
the same receiver, the received signal is a superposition of
the transmitted signals scaled by their respective channel
gains, plus an AWGN term. We model the achievable data
rates using Shannon capacity, which is a commonly used
upper bound on the practically achievable data rates subject
to average power constraints. Due to the convexity of the
capacity region, throughput maximization does not require
time-sharing between nodes [14], but may be achieved
through successive interference cancellation (SIC).
Consider a single MAC consisting of N users Un , n ∈ N ,
transmitting to a receiver Um , m 6∈ N . The capacity region
CN (·, ·), which denotes the set of all achievable rate tuples r,
is defined as
X ηnm (qnm )pn
1+
σ2
n∈S
!
, (3)
where rn is the nth component of r, Bm is the bandwidth
allocated to Um , and σ 2 is the receiver noise power. Consider
the example (Section IV-B) where we do not allow relaying.
This gives rise to a MAC with N = 2 transmitters U1 , U2
and the AP U0 . The capacity region C2 (q, p) is the set of
non-negative tuples (r1 , r2 ) that satisfy
η10 (q10 )p1
(4a)
r1 ≤ B0 log2 1 +
σ2
η20 (q20 )p2
r2 ≤ B0 log2 1 +
(4b)
σ2
η10 (q10 )p1 + η20 (q20 )p2
(4c)
r1 + r2 ≤ B0 log2 1 +
σ2
for all (p1 , p2 ) ∈ P 2 . The first two bounds restrict individual
user rates to the single-user Shannon capacity. Dependence
between U1 and U2 leads to the final constraint, that the sum
rate may not exceed the point-to-point capacity with full
cooperation. For transmit powers (p1 , p2 ) these constraints
trace out the pentagon shown in Figure 2. The sum rate
is maximized at any point on the segment L3 . Referring
to SIC, the rate pair at boundary point R(1) is achieved
if the signal from source U2 is decoded entirely before
source U1 , resulting in the signal from U2 being decoded at
a higher interference rate than the signal from U1 . At R(2)
the opposite occurs.
B. Propulsion Energy Model
The electrical energy used for propulsion in rolling robots
has been modeled as a linear or polynomial function of speed
achievable data rates is bounded above by a set of 2|N | − 1
nonlinear submodular functions fm (·, ·, ·, ·), where |·| applied
to a set denotes the cardinality operator. Exponential growth
in the number of nodes is a computational intractability.
Hence, results are limited to small or structured networks
where only a subset of nodes use each MAC.
The trajectory of node Un is denoted by the tuple
r1
L1
R(1)
L3
R(2)
L2
Yn , (pn , rn , sn , qn , vn , v̇n , Fn ),
r2
Fig. 2: Capacity region for a given power policy across two
parallel channels, with corner rate pairs labeled as R(1) =
(1) (1)
(2) (2)
(r1 , r2 ) and R(2) = (r1 , r2 ) and line segments labeled
as L1 , L2 , L3 .
(7)
where qn (t) is the node’s position at time t and sn (t) the
state of its storage buffer subject to maximum memory of
M bits. The optimal control problem that we want to solve
is
N Z T
X
min
pn (t) + vn (t)Fn (t)dt
(8a)
p,r,s,q,v,F
n=1
0
s.t. ∀n ∈ N , m ∈ {N , N + 1}, t ∈ T , S ⊆ N
in [9], [15] respectively. We take a more general approach,
restricting the fixed wing UAV to moving at strictly positive
speeds and using Newtonian laws as a basis, as in [16]. The
function Ω(·) models the resistive forces acting on node Un
in accordance with the following assumption.
Assumption 1: The resistive forces acting on each
node Un may be modeled by the function x 7→ Ω(x) such
that x 7→ xΩ(x) is convex on x ∈ [0, ∞) and ∞ on
x ∈ (−∞, 0).
Comparatively, in the fixed wing model proposed in [17],
the drag force of a UAV traveling at constant altitude at subsonic speed v is
Ω(v) =
ρCD0 Sv 2
2L2
+
2
(πe0 AR )ρSv 2
(5)
where the first term represents parasitic drag and the second
term lift-induced drag. Parasitic drag is proportional to v 2 ,
where ρ is air density, CD0 is the base drag coefficient, and S
is the wing area. Lift induced drag is proportional to v −2 ,
where e0 is the Oswald efficiency, AR the wing aspect ratio
and L the induced lift [17]. For fixed-altitude flight, L must
be equal to the weight of the craft W = mg. The power
required to combat drag is the product of speed and force.
The propulsion force Fn (·) must satisfy the force balance
equation
Fn (t) − Ω(vn (t)) = mn v̇n (t),
(6)
where mn is the node mass, vn (t) is the speed and v̇n (t) is
the acceleration. The instantaneous power used for propulsion is the product vn (t)Fn (t), with the total propulsion
energy taken as the integral of this power over T . We assume
vn (t) ≥ 0, ∀t ∈ T , which is valid for fixed wing aircrafts.
Thrust is restricted to the range [Fmin , Fmax ].
C. General Continuous-Time Problem Formulation
We formulate the problem in continuous-time. At time t,
node Un , n ∈ N can transmit to any node Um , m ∈ {N , N +
1}\{n} at a non-negative data rate rnm (t) using transmission
power pnm (t). The sum power used in all outgoing transmissions from Un is denoted by pn (t). From this, the set of
fm (q(t), p(t), r(t), S \ {m}) ≤ 0
ṡn (t) =
N
X
rmn (t) −
N
+1
X
(8b)
rnm (t)
(8c)
sn (0) = Dn , sn (T ) = 0
qn (0) = Qn,init , qn (T ) = Qn,final
(8d)
(8e)
vn (0) = vn,init
Fn (t) = mn v̇n (t) + Ω(vn (t))
(8f)
(8g)
q̇n (t) = ζn vn (t)
Yn,min ≤ Yn (t) ≤ Yn,max
(8h)
(8i)
m6=n
m6=n
The cost function (8a) is the sum of nodal transmission and
propulsion energies. Constraint (8b) bounds the achievable
data rate to within the receiving nodes’ capacity region,
and (8c) updates the storage buffers with sent/received data.
Constraints (8d) act as initial and final constraints on the
buffers, while (8e)–(8h) ensure all nodes travel from their
initial to final destinations without violating a Newtonian
force-acceleration constraint; ζn ∈ {−1, 1} depending on
whether the position qn (t) decreases or increases, respectively, if the speed vn (t) ≥ 0. The final constraint (8i) places
simple bounds on the decision variables, given by
Yn,min , (0, 0, 0, −∞, Vmin , −∞, Fmin ),
(9a)
Yn,max , (Pmax , ∞, M, ∞, Vmax , ∞, Fmax ),
(9b)
where 0 ≤ Vmin ≤ Vmax and Fmin ≤ Fmax . The above optimal
control problem may then be fully discretized using optimal
control solvers, such as ICLOCS [18]. Before simulation
results are presented we prove that this problem admits an
equivalent convex form under certain conditions.
III. C ONVEXITY A NALYSIS
Efficient convex programming methods exist, which may
be used in real-time applications. We first show that the
nonlinear data rate constraints (8b) are convex in both
positions and transmission power. We then show that the
non-linear equality constraint (8g) may be substituted into the
cost function, convexifying the cost function. This, however,
turns the previously simple thrust bound Fmin ≤ Fn (t) into
a concave constraint, resulting in a convex OCP if thrust
bounds are relaxed. The absence of thrust bounds arises when
considering a fixed trajectory, or is a reasonable assumption
if the speed range is sufficiently small.
Lemma 1: The rate constraints (8b) are convex in powers
and positions for all path loss exponents α ≥ 1.
Proof: By writing the channel gains as an explicit
function of node positions, for receiver Um each of the
capacity region constraints is of the form
X
rn (t)−
n∈S
Bm log2
G X
pn (t)
1+ 2
2 +q
2 α
σ
(a2nm + δnm
nm (t) )
n∈S
!
≤ 0.
(10)
Since the non-negative weighted sum of functions preserves
convexity properties, without loss of generality we take S
to be a singleton, and drop subscripts. We also drop time
dependencies. The above function is the composition of two
functions φ1 ◦ φ2 (·), respectively defined as
φ1 (r, φ2 (·)) , r − B log2 (1 + φ2 (·)),
G
p
φ2 (p, q) , 2 2
.
σ (a + δ 2 + q 2 )α
(11)
(12)
The function (p, q) 7→ φ2 (p, q) is concave on the domain
R+ ×R. We show this by dropping constants and considering
the simpler function h(x, y) , xy −2α with Hessian
#
"
−2α
0
y −2α−1
2
(13)
∇ h(x, y) =
2α(2α−1)x ,
−2α
y −2α−1
y −2α−2
which is negative semi-definite, because it is symmetric with
non-positive sub-determinants. Therefore, φ2 is jointly concave in both power and the difference in positions over the
specified domain. φ1 is convex and non-increasing as a function of φ2 . Since the composition of a convex, non-increasing
function with a concave function is convex [19], all data rate
constraint functions are convex functions of (r, p, q).
The posynomial objective function is not convex over
the whole of its domain and the logarithmic data rate term
prevents the use of geometric programming (GP) methods.
Lemma 2: The following problem
Z T
min
Fn (t)vn (t)dt
(14a)
vn ,Fn
0
s.t. ∀t ∈ T
Fn (t) − Ω(vn (t)) = mn v̇n (t)
Fmin ≤ fm (t) ≤ Fmax
(14b)
(14c)
vn (t) ≥ 0
(14d)
vn (0) = vn,init
(14e)
of minimizing propulsion energy of a single node Un ,
subject to initial and final conditions, admits an equivalent
convex form for mappings vn (t) 7→ Ω(vn (t)) satisfying
Assumption 1 and force bounds (Fmin , Fmax ) = (−∞, ∞).
Proof: By noting that Fn (t) = Ω(vn (t)) + mn v̇n (t),
we move the equality into the cost function, rewriting the
problem as
(15)
min φ(vn ) s.t. (14c)–(14e),
vn
where
φ(vn ) ,
Z
|0
T
Z T
vn (t)v̇n (t)dt .
vn (t)Ω(vn (t))dt +
{z
} |0
{z
}
φ1 (vn )
(16)
φ2 (vn )
We now show that both φ1 (·) and φ2 (·) are convex.
Starting with the latter, by performing a change of variable,
the analytic cost is derived by first noting that φ2 (vn ) is the
change in kinetic energy
Z vn (T )
mn 2
φ2 (vn ) = mn
vdv =
vn (T ) − vn2 (0) , (17)
2
vn (0)
which is a convex function of vn (T ) subject to fixed initial
conditions (14d); in fact, it is possible to drop the vn2 (0)
term completely without affecting the argmin. By Assumption 1, vn (t) 7→ vn (t)Ω(vn (t)) is convex and continuous on
the admissible domain of speeds. Since integrals preserve
convexity, the total cost function φ(·) is also convex.
Removal of thrust F as a decision variable results in the
set
VF , {vn | Fmin ≤ Ω(vn (t)) + mn v̇n (t) ≤ Fmax }.
(18)
Even if Ω(·) is convex on the admissible range of speeds,
the lower bound represents a concave constraint not admissible within a convex optimization framework. Therefore,
dropping constraints on thrust results in a final convex
formulation of
Z T
mn 2
min
vn (t)Ω(vn (t))dt +
vn (T ) − vn2 (0) (19a)
vn
2
0
s.t. ∀t ∈ T
Vmin ≤ vn ≤ Vmax
(19b)
vn (0) = vn,init .
(19c)
Addition of bounds vn ∈ VF naturally results in a difference
of convex (DC) problem [20] that may be solved through
exhaustive or heuristic procedures.
Theorem 1: In the absence of constraints on thrust, the
general problem (8) admits an equivalent convex form.
Proof: Non-convexities in this formulation arise from
the posynomial function of speed v(t) and thrust Fm (t) in the
cost function (8a), the nonlinear force balance equality (8g),
and the capacity region data rate constraints (8b). The cost
function is a superposition of the energies used by each
node for propulsion and transmission. By noting that there
is no coupling between nodes or between propulsion and
transmission powers in this cost, the transformation used in
Lemma 2 may be used to eliminate the nonlinear equality. We
eliminate Fn (t) and v̇n (t) and move the nonlinear equality
into the objective function, simultaneously convexifying the
objective to get
"Z
#
N
T
X
mn 2
v (T )
pn (t) + vn (t)Ω(vn (t))dt +
min
p,r,s,q,v
2 n
0
n=1
s.t.
∀n ∈ N , m ∈ {N , N + 1}, t ∈ T , v ∈ V N , S ⊆ N
35
100
30
80
25
60
20
15
40
10
20
5
0
(8b)–(8f), (8h), Ỹn,min ≤ Ỹn (t) ≤ Ỹn,max
0
0
where Ỹn (t) , (pn (t), rn (t), sn (t), qn (t), vn (t)), and the
bounds Ỹn,min , and Ỹn,max are similarly changed. It follows
from Lemma 1 that all data rate constraints in (8b) are also
convex, therefore the whole problem is convex.
IV. S IMULATION R ESULTS
A. Single Node
A single mobile node U1 of mass 3 kg traveling at fixed
altitude a = 1000 m and lateral displacement δ = 0 m,
depicted in Figure 1, is considered first. In this section,
simulation results are presented for the problem of minimizing the total communication energy to offload all data
to U0 . This is compared to a water-filling solution [21]
for minimizing the transmission energy. Subscripts denoting
different nodes have been dropped in the remainder of this
section. Specifically, we use Ω(·) of the form
∞,
∀x ∈ (−∞, 0)
Ω(x) ,
(21)
CD1 x2 + CD2 x−2 , ∀x ∈ [0, ∞),
where CD1 = 9.26 × 10−4 is the parasitic drag coefficient
and CD2 = 2250 is the lift induced drag coefficient [17].
Simulation results are shown in Figure 3 for a storage
buffer initialized to D = 75 MB and speeds restricted in the
range [Vmin , Vmax ] = [30, 100] km/h. This results in a total
energy expenditure of 309.50 kJ, where 105.05 kJ is due to
transmission and 204.51 kJ is due to propulsion. Of this, only
48.01 kJ of extra propulsion energy is used to vary speed on
top of the base energy required to traverse the distance at a
constant speed. Furthermore, the problem would have been
infeasible if the node was restricted to a constant speed of
65 km/h. We note that, with the given parameterization, it is
possible to transmit up to 78 MB of data in the defined time
interval.
B [Hz]
105
M [GB]
1
Pmax [W]
100
α
1.5
400
600
800
1000
1200
(a) Optimal transmission power and propulsion force used by U1 .
10 5
10
35
8
30
25
The open source primal dual Interior Point solver Ipopt
v.3.12.4 has been used through the MATLAB interface.
Table I contains parameters common to the following experiments. Force constraints are relaxed in all experiments.
From [5], the speed of a typical UAV is in the range 30 to
460 km/h. All nodes are initialized to their average speeds
vn,init = (Vmax + Vmin )/2, We assume all nodes move in
symmetric trajectories around the AP such that Qn,final =
−Qn,init = (T /2)vn,init .
σ2 [W]
10−10
200
T [min]
20
TABLE I: Dynamic model parameters that have been used
across all simulation results.
6
20
15
4
10
2
5
0
0
0
200
400
600
800
1000
1200
(b) Associated achieved data rate and velocity profile of U1 .
Fig. 3: Simulation results for the single-node problem, with
trajectories shown as solid, and bounds shown as dashed
lines.
In comparison, if the speed of U1 is fixed, then the
maximum transmittable data is approximately 56 MB, using 120.00 kJ of transmission energy. Although considerably
more energy is used, the optimal power policy for a fixed
trajectory is characterized by a water-filling solution, an
equivalent proof of which may be found in [21]. This
problem results in a one dimensional search space, easily
solved through such algorithms as binary search.
B. Multiple Nodes
We now investigate the transmission energy problem for
two nodes, traveling in parallel trajectories at fixed speeds
such that Vmax = Vmin = 65 km/h, as depicted by the green
lines in Figure 1. Relaying is not allowed, as may be the case
if no bandwidth is allocated to U1 and U2 to receive each
other’s transmissions, equivalently turning them into pure
source nodes. Simulation results are presented in Figure 4.
U1 is closer to the AP at all times, and therefore is
advantaged in that it experiences more favorable channel
conditions. The disadvantaged node U2 transmits for a longer
duration due to the smaller relative change in its channel gain. The interior point algorithm converged after 42
iterations to a minimum energy of 52.707kJ and 26.77kJ
for U1 and U2 , respectively, for a starting data load of
D1 = D2 = 25 MB.
It is notable that the advantaged node uses considerably
more transmission energy than the disadvantaged node.
Referring to [22], which derives two-user optimal power
allocations that achieve arbitrary rate tuples on the boundary
of C we explain this as follows. From Figure 2, the optimal
rate pairs for given transmit powers p1 and p2 lie on the
R EFERENCES
100
80
60
40
20
0
200
400
600
800
1000
1200
(a) Transmit powers of nodes U1 and U2 .
7
6
5
4
3
2
1
0
200
400
600
800
1000
1200
(b) Associated transmission rates achieved by nodes U1 and U2 .
Fig. 4: Simulation results for the two-node transmission
power problem.
segment L3 . Equivalently, ∃̺ ∈ [0, 1] such that the rate
(∗) (∗)
pair for an arbitrary point R(∗) = (r1 , r2 ) on L3 is
given by the interpolation R(∗) = ̺ · R(1) + (1 − ̺) · R(2) .
We may interpret ̺ as being the priority assigned to each
transmitting node by the U0 when SIC is being carried out.
̺ = 1 means that data from U1 is being decoded second,
subject to a lower noise rate, while ̺ = 0 means the opposite
decoding order. We may think of the mapping t 7→ ̺(t) as
a time-varying priority. However, by calculating ̺(t) from
the optimum powers and rates seen in Figure 4, we find
that ̺(t) = 0, ∀t ∈ T such that p1 (t) > 0, p2 (t) > 0. In
other words, the disadvantaged node is always given priority,
which is why it uses less energy at the optimum, even though
it always experiences a worse channel gain.
V. C ONCLUSIONS
We have presented a general optimization framework
for joint control of propulsion and transmission energy for
single/multi-hop communication links in robotic networks.
The relaxation of transmission constraints to theoretic capacity bounds, with relatively mild assumptions on the mobility
model, results in a nonlinear but convex OCP. We showed
that optimizing over a fixed path, as opposed to a fixed
trajectory, increases the feasible starting data by at least 30%
for just a single node. For the fixed-trajectory two-node
MAC simulation, the optimal solution has been presented
and analyzed. Immediate extensions of this work include
higher fidelity models, and analysis of the relay network encompassed in problem (8). Considering the overarching goal
of real-time control, further developments will be closedloop analysis of the control strategy, and consideration of
the computational burden and energy expenditure [3], [23]
in the network.
[1] J. Ko, A. Mahajan, and R. Sengupta, “A network-centric UAV organization for search and pursuit operations,” in Aerospace Conference
Proceedings, 2002. IEEE, vol. 6, pp. 6–6, IEEE, 2002.
[2] S. Wang, A. Gasparri, and B. Krishnamachari, “Robotic message ferrying for wireless networks using coarse-grained backpressure control,”
in Globecom Workshops (GC Wkshps), 2013 IEEE, pp. 1386–1390,
IEEE, 2013.
[3] M. Thammawichai, S. P. Baliyarasimhuni, E. C. Kerrigan, and J. B.
Sousa, “Optimizing communication and computation for multi-UAV
information gathering applications,” arXiv preprint arXiv:1610.04091,
2016.
[4] P. Zhan, K. Yu, and A. L. Swindlehurst, “Wireless relay communications with unmanned aerial vehicles: Performance and optimization,”
IEEE Transactions on Aerospace and Electronic Systems, vol. 47,
no. 3, pp. 2068–2085, 2011.
[5] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying ad-hoc networks
(FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–
1270, 2013.
[6] W. Zhao and M. H. Ammar, “Message ferrying: Proactive routing
in highly-partitioned wireless ad hoc networks,” in Distributed Computing Systems, 2003. FTDCS 2003. Proceedings. The Ninth IEEE
Workshop on Future Trends of, pp. 308–314, IEEE, 2003.
[7] Y. Yan and Y. Mostofi, “Robotic router formation in realistic communication environments,” IEEE Transactions on Robotics, vol. 28,
no. 4, pp. 810–827, 2012.
[8] P. Sujit, S. Saripalli, and J. B. Sousa, “Unmanned aerial vehicle
path following: A survey and analysis of algorithms for fixed-wing
unmanned aerial vehicles,” IEEE Control Systems, vol. 34, no. 1,
pp. 42–59, 2014.
[9] Y. Yan and Y. Mostofi, “To go or not to go: On energy-aware
and communication-aware robotic operation,” IEEE Transactions on
Control of Network Systems, vol. 1, no. 3, pp. 218–231, 2014.
[10] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for
mobile relaying systems,” arXiv preprint arXiv:1604.02517, 2016.
[11] D. Tse and P. Viswanath, Fundamentals of wireless communication.
Cambridge university press, 2005.
[12] L. Ren, Z. Yan, M. Song, and J. Song, “An improved water-filling
algorithm for mobile mimo communication systems over time-varying
fading channels,” in Electrical and Computer Engineering, 2004.
Canadian Conference on, vol. 2, pp. 629–632, IEEE, 2004.
[13] D. Gunduz and E. Erkip, “Opportunistic cooperation by dynamic
resource allocation,” IEEE Transactions on Wireless Communications,
vol. 6, no. 4, 2007.
[14] D. N. C. Tse and S. V. Hanly, “Multiaccess fading channels. I.
polymatroid structure, optimal resource allocation and throughput
capacities,” IEEE Transactions on Information Theory, vol. 44, no. 7,
pp. 2796–2815, 1998.
[15] Y. Mei, Y.-H. Lu, Y. C. Hu, and C. G. Lee, “Energy-efficient motion
planning for mobile robots,” in Robotics and Automation, 2004.
Proceedings. ICRA’04. 2004 IEEE International Conference on, vol. 5,
pp. 4344–4349, IEEE, 2004.
[16] U. Ali, H. Cai, Y. Mostofi, and Y. Wardi, “Motion and communication
co-optimization with path planning and online channel estimation,”
arXiv preprint arXiv:1603.01672, 2016.
[17] Y. Zeng and R. Zhang, “Energy-efficient UAV communication with
trajectory optimization,” IEEE Transactions on Wireless Communications, vol. 16, no. 6, pp. 3747–3760, 2017.
[18] P. Falugi, E. Kerrigan, and E. Van Wyk, “Imperial College London Optimal Control Software User Guide (ICLOCS).”
http://www.ee.ic.ac.uk/ICLOCS/, 2010.
[19] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge
university press, 2004.
[20] A. L. Yuille and A. Rangarajan, “The concave-convex procedure,”
Neural computation, vol. 15, no. 4, pp. 915–936, 2003.
[21] S. Wolf, “An introduction to duality in convex optimization,” Network,
vol. 153, 2011.
[22] R. S. Cheng and S. Verdú, “Gaussian multiaccess channels with ISI:
Capacity region and multiuser water-filling,” IEEE Transactions on
Information Theory, vol. 39, no. 3, pp. 773–785, 1993.
[23] S. Nazemi, K. K. Leung, and A. Swami, “QoI-aware tradeoff between
communication and computation in wireless ad-hoc networks,” in
Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016
IEEE 27th Annual International Symposium on, pp. 1–6, IEEE, 2016.
| 3cs.SY
|
AMAS: optimizing the partition and filtration of adaptive seeds to
speed up read mapping
Ngoc Hieu Tran1,*
Email: nhtran@ntu.edu.sg
1
Xin Chen
Email: chenxin@ntu.edu.sg
1
School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
* Corresponding author
1
ABSTRACT
Background: Identifying all possible mapping locations of next-generation sequencing (NGS) reads
is highly essential in several applications such as prediction of genomic variants or protein binding
motifs located in repeat regions, isoform expression quantification, metagenomics analysis, etc.
However, this task is very time-consuming and majority of mapping tools only focus on one or a few
best mapping locations.
Results: We propose AMAS, an alignment tool specialized in identifying all possible mapping
locations of NGS reads in a reference sequence. AMAS features an effective use of adaptive seeds to
speed up read mapping while preserving sensitivity. Specifically, an index is designed to pre-store the
locations of adaptive seeds in the reference sequence, efficiently reducing the time for seed matching
and partitioning. An accurate filtration of adaptive seeds is further applied to substantially tighten the
candidate alignment space. As a result, AMAS runs several times faster than other state-of-the-art
read mappers while achieving similar accuracy.
Conclusions: AMAS provides a valuable resource to speed up the important yet time-consuming
task of identifying all mapping locations of NGS reads. AMAS is implemented in C++ based on the
SeqAn library and is freely available at https://sourceforge.net/projects/ngsamas/.
Keywords: next-generation sequencing, read mapping, sequence alignment, adaptive seeds, seed
partition, filtration
2
Background
Recent advances in next-generation sequencing (NGS) technologies have produced massive
amounts of short reads data, bringing up promising opportunities in several biomedical research
areas such as RNA-seq, ChIP-seq, de novo genome sequencing, resequencing, metagenome
sequencing, etc [1]. In many applications, the first key step is to map NGS reads to a reference
sequence of interest. Thus, dozens of rapid alignment algorithms have been developed to improve
the read mapping [2, 3], especially to address the problem of errors tolerance (mismatches, indels)
and the increasing read length. To achieve an optimal combination of speed, accuracy, and memoryefficiency, many popular mapping tools such as Bowtie 1, 2 [4, 5], BWA [6-8], etc, apply heuristic
approaches to prune the search space, prioritize candidate locations, and finally return one or a few
best mapping locations for each read. They can be referred to as best-mappers. Another class of
mapping tools, which can be referred to as all-mappers, are specialized in identifying as many as
possible, if not all, matches within a reasonable time. This all-mapping task is highly essential in
several applications such as prediction of genomic variants or protein binding motifs located in repeat
regions, isoform expression quantification, metagenomics analysis [9-12]. Some prominent allmappers include SOAP 2 [13], SHRiMP 2 [14], mrsFAST [10, 15], mrFAST [9, 16], RazerS 3 [17],
GEM [18], Masai [19], Hobbes 1, 2 [20, 21].
Exhaustive search for all mapping locations of NGS reads in a reference sequence is a
computationally intensive task. The problem is even more complicated for large genomes with highly
repetitive regions, e.g. the human genome, and when sequencing errors as well as genomic variants
are taken into account. In order to narrow down the search space, most all-mappers are designed
with the seed-and-extend strategy. In particular, a read is first partitioned into a few non-overlapping
seeds. If the read can be mapped to the reference sequence with some allowed errors, its seeds must
also have exact/approximate matches in the reference sequence, and moreover, the read’s mapping
locations can be found in the neighbourhood regions of its seeds’ locations. Hence, the seeds are
quickly mapped to the reference sequence and their identified locations are then used as candidates
for further extending the alignment to the rest of the read by using standard dynamic programming
algorithms such as Smith-Waterman [22] or Needleman-Wunsch [23]. The mapping sensitivity is
guaranteed by the pigeonhole principle. For example, to map a read to the reference sequence with
up to e errors, one can partition it into e+1 non-overlapping seeds. By the pigeonhole principle, at
least one of those e+1 seeds must have an exact match in the reference sequence. Thus, all possible
mapping locations with up to e errors of the read can be found by extending all exact matches of
those seeds.
Most all-mappers partition a read into seeds of equal lengths, where the seed length is specified
by users or may also be determined from the number of errors allowed and the pigeonhole principle.
In any cases, the seed length is several times shorter than the read length and the seeds are usually
mapped exactly (i.e. without errors) to the reference sequence. To further speed up the seed mapping
process, most all-mappers (except for RazerS 3) index the reference sequence using some special
data structures. In particular, SHRiMP 2, mrsFAST, mrFAST, and Hobbes use hash tables to index
3
the reference sequence. For a fixed length k (which is less than or equal to the seed length), the hash
tables contain all possible k-mers as the keys and each key is associated with a list of locations where
the corresponding k-mer is observed in the reference sequence. Masai, on the other hand, constructs
a suffix tree of the reference sequence to perform the seed matching. Both suffix array and the much
more memory-efficient Ferragina-Manzini (FM) index [24] with Burrows-Wheeler Transform (BWT)
can be used in Masai to mimic the suffix tree top-down traverse. Hash tables can also be combined to
accelerate the searching in the BWT-FM index, as demonstrated in SOAP 2. Among those commonly
used data structures, the FM index is well-known for its small memory footprint, which is only ~3-4 GB
for the human genome. Interestingly, in the latest version of mrsFAST [15], the authors proposed a
new compact structure for hash tables significantly reducing the index size to ~2GB for the human
genome, which is even smaller than the FM index.
In addition to indexing the reference sequence, some all-mappers also index the input reads so
that multiple reads can be handled simultaneously rather than in a one-by-one fashion. For instance,
in the read index of mrsFAST, each k-mer is associated with a list of read IDs, locations of the k-mer
in the reads, etc. In the extension step, for each k-mer, the two lists (from the reference index and
from the read index) are compared in a divide-and-conquer fashion to achieve cache efficiency.
Similarly, in Masai, all seeds of the input reads are organized in a radix tree. Then, by walking through
the reference suffix tree along with the read radix tree, all seeds can be mapped to the reference
sequence simultaneously.
After the seeds of a read have been mapped to the reference sequence, their identified locations
are then used as candidates for further extending the alignment to the rest of the read. This step is
usually called the extension or the verification step, and is performed by using standard dynamic
programming algorithms such as Smith-Waterman [22] or Needleman-Wunsch [23]. In fact, this step
is the bottleneck and consumes the most computations of the whole mapping task. As the seed length
is several orders of magnitudes shorter than the reference length and the reference sequence often
contains highly repetitive regions, the candidate space generated by the seeds is huge. Moreover,
majority of the locations actually are false positives which will not lead to acceptable alignment results
yet waste computing resources. Hence, filtration strategies are needed to reduce the number of
locations
The first filtration strategy widely used by the all-mappers is based on the pigeonhole principle. In
particular, if a read is aligned with up to e errors and exact seed matching is employed, only e+1 nonoverlapping seeds are required to guarantee the full mapping sensitivity. More advanced strategies
are further implemented in different all-mappers. For instance, the FastHASH algorithm in the latest
version of mrFAST [16] applies two procedures called Cheap K-mer Selection and Adjacency Filtering
to reduce the number of locations while preserving sensitivity. In the first procedure, the seeds of a
read are sorted according to their frequencies in the reference sequence and e+1 seeds with the
lowest frequencies are selected. The second procedure filters out the obviously false locations based
on the idea that the potentially true locations (i.e. those that may return correct alignments) of
adjacent seeds must be close to each other in the reference sequence.
4
In Hobbes [20] the authors proposed a more complicated procedure of seed selection. Instead of
partitioning the read into contiguous seeds, Hobbes considers all possible partitions and applies a
dynamic programming to select the one that minimizes the sum of frequencies of the seeds. In the
latest version, Hobbes 2 [21], the authors further suggested to use extra seeds to improve filtering
specificity: instead of e+1, e+2 (or more) non-overlapping seeds can be employed. Then, by the
pigeonhole principle, at least two of those seeds must have exact matches in the reference sequence
and hence only those locations reported by at least two seeds will be selected as candidates for the
extension step. This technique has also been applied previously in GSNAP [25].
The filtration in Masai [19] is based on the use of long approximate seeds rather than short exact
seeds to achieve better specificity. For example, if a read of length 100bp is aligned to the reference
sequence with up to e=5 errors, by the pigeonhole principle, it can be partitioned into 6 nonoverlapping seeds of length 16bp and the seeds are mapped exactly to the reference genome. To
increase the seed length, Masai partitions the read into 3 seeds of 33bp and each seed is mapped to
the reference genome with up to 1 error. The approximate matching of all seeds is performed
simultaneously by applying a multiple backtracking algorithm on the reference index and the read
index.
It is worth to note that most all-mappers partition a read into equal-length seeds and prefer to use
short k-mers as seeds. However, the occurrences of equal-length seeds in a reference sequence may
not be uniformly distributed and the seed frequencies may differ by orders of magnitudes (see
Supplementary Figure S1 for the frequency distribution of 10-mers in the human genome). Highly
repetitive seeds may substantially enlarge the candidate space with false positives and hence waste
computing resources. This problem was addressed by introducing seed selection mechanisms in
mrFAST, Hobbes, or by using long approximate seeds in Masai. However, the seed frequencies are
still not fully controllable. A more efficient strategy of seed partition was proposed in GEM [18] using
adaptive seeds. Specifically, GEM allows seeds to have variable lengths while restricting the number
of candidate locations generated by each seed to be less than a predefined threshold. Figure 1A
shows an example of such efficient partition where the number of candidate locations of the read was
reduced by 44.66 times by using adaptive seeds instead of equal-length seeds. In general, adaptive
seeds provide better control on the candidate space while consuming similar computing resources as
equal-length seeds. Similar ideas have also been used in some best-mappers [7, 8, 26, 27] to avoid
unnecessary extension for highly repetitive seeds.
As we have briefly reviewed above, intensive efforts have been put into optimizing the use of
equal-length seeds in the all-mapping task, including sequence indexes for fast exact/approximate
seed matching and filtration strategies to reduce candidate locations. However, little attention has
been paid into adaptive seeds and their advantages have not been fully explored to speed up the
read mapping. Hence, in this work we carefully study the strengths and weaknesses of adaptive
seeds and attempt to find an optimal strategy for their mapping, partition and filtration. The main
contributions of our all-mapping tool with adaptive seeds, AMAS, are summarized below.
5
Firstly, to speed up the mapping of adaptive seeds, we pre-compute all possible adaptive seeds
and their locations in the reference sequence for a given frequency threshold. Then, our index of the
reference sequence consists of all possible adaptive seeds as the keys and each key is associated
with a list of locations where the corresponding seed is observed. The index is stored in a local file
and can be reused for every mapping task. The idea is similar to hash tables, but instead of fix-length
k-mers, the keys in our index are variable-length substrings with frequencies less than a predefined
threshold.
Secondly, in the adaptive seed partition, the number of seeds is not controllable and varies across
different reads. For some reads, there may not be sufficient seeds for the pigeonhole principle to
guarantee the mapping sensitivity. Hence, we refine the partition of adaptive seeds by adding one
more constraint on the seed lengths in order to guarantee the minimum number of seeds in the
partition. On the other hand, there may also be more than enough seeds available from the partition.
In such cases, we make effective use of the extra seeds to filter out false positives from the candidate
space.
Thirdly, due to the shortage of nucleotides assigned to the last seed in the adaptive partition of a
read, that seed may be too short and the number of candidate locations it reported may far exceed
the desired threshold. Majority of such locations are false positives which increase the candidate
space dramatically. However, blindly ignoring all of the last seeds will lead to a considerable loss of
mapping sensitivity. Hence, we also pay special attention to an accurate filtration of the last seeds.
Overall, by optimizing the partition and filtration of adaptive seeds, our tool AMAS runs several
times faster than other state-of-the-art all-mappers while achieving comparable sensitivity and
accuracy. Detailed methods and performance results are presented in the next sections.
AMAS was implemented in C++ based on the source code of Masai and the SeqAn library. Our
main contributions include the index, the partition, and the filtration of adaptive seeds. For the
extension step with edit distance, we borrowed Masai’s implementation [17, 19] of the Myers’ bitvector dynamic programming algorithm [28]. We also borrowed I/O components of Masai for handling
the reference, the read sequences, and the alignment results in SAM format. AMAS is freely available
at https://sourceforge.net/projects/ngsamas/. A user guide and sample data sets are also provided.
Methods
To find an effective strategy for the partition and filtration of adaptive seeds, we first performed
experiments on a data set of 100k reads of length 100bp, which were simulated from the human
genome (UCSC hg19) using Mason [29] with the Illumina model. The reads were mapped to the
human genome with up to e=5 errors. In the following, we shall describe our strategy and use the
simulated data set for illustration.
Partition of adaptive seeds
An example of adaptive seeds versus equal-length seeds is illustrated in Figure 1A. To partition a
read into adaptive seeds, we scan the read against the reference sequence in the forward (left-to-right)
6
direction, base by base. When the number of matches of the current seed drops below a predefined
frequency threshold F, its locations are added to the candidate space and a new seed is started. That
process is continued until the desired number of seeds is obtained or the read’s end is reached. In the
latter case, the number of matches of the last seed might be still higher than the threshold F. In the
example in Figure 1A, the read was mapped to the human genome and F was set at 300. The
number of candidate locations of the read was reduced by 44.66 times by using 6 adaptive seeds
instead of 6 seeds of equal lengths 16bp. Similarly, for the whole simulated data set of 100k reads,
the total number of candidate locations was reduced by 6.61 times (Supplementary Table S1).
Index of adaptive seeds
To search for the locations of adaptive seeds in the reference sequence, GEM uses the FM index to
achieve both speed and low memory footprint [18]. As all-mapping is a very time-consuming task, it
may be desirable to further boost up the mapping speed at the expense of a reasonable amount of
memory, like using hash tables in Hobbes, mrsFAST, mrFAST, or suffix arrays, enhanced suffix
arrays in Masai. Here we pre-compute all possible adaptive seeds and their locations in the reference
sequence for a given frequency threshold F. Then, our index of the reference sequence consists of all
possible adaptive seeds as the keys and each key is associated with a list of locations where the
corresponding seed is observed. The idea is similar to hash tables, but instead of fix-length k-mers,
the keys in our index are variable-length substrings with frequencies less than a predefined threshold
F.
To represent all possible adaptive seeds in the reference sequence, we implement a lookup table
and extend it with a radix tree (Figure 1B). In particular, we first pick a length k, organize all k-mers in
the lookup table and search for their locations in the reference sequence. Then, for each k-mer, we
further extend the search to its 4 child nodes which correspond to adding the 4 bases “A”, “C”, “G”,
and “T”. The search and extension are continued until the numbers of matches of the nodes drop
below the threshold F (shaded leaf nodes in Figure 1B). Thus, all leaf nodes in the radix tree
correspond to all possible adaptive seeds and each of them is linked to an array of its locations in the
reference sequence. A similar idea has been used in SOAP 2 [13] where a hash table was combined
to accelerate the searching in the FM index. Note that the leaf nodes in our index represent adaptive
seeds with desired frequencies, not suffixes like in common suffix-array based data structures.
By default, we consider adaptive seeds with a minimum length of k=10 bases. In general, using
lower values of F helps to tighten the candidate space reported by the seeds but also enlarges the
index. We choose F to be about 10 times less than the average frequency of k-mers in the reference
sequence. For instance, we set F=300 for the human genome (Figure 1B), F=10 for the worm
genome, and F=17 for the fruit-fly genome (Supplementary Table S2). The index only needs to be
built once for each genome and it can be stored on a local disk for future mapping tasks.
7
Constraint on the maximum seed length
As we use exact seed matching, by the pigeonhole principle, at least e+1 seeds are needed to
achieve full sensitivity for mapping a read with up to e errors. The number of adaptive seeds, however,
is not controllable and varies across different reads (see Supplementary Figure S2 for the seed
count’s distribution of the simulated data set). Some reads may not have sufficient seeds to guarantee
the mapping sensitivity. Hence, in addition to the frequency constraint, we also impose a constraint on
the maximum length of the seeds. The maximum length threshold l allows to control the minimum
number of seeds in the partition and hence to improve the mapping sensitivity. For example, for a
read of length 100bp, setting l=33 guarantees that there will be at least 3 seeds in the partition and all
matching locations with up to 2 errors will be found (Supplementary Figure S2). This feature greatly
improves the sensitivity of our tool over GEM, as we will show later in the section Results.
Filtration using the last seeds in the adaptive partition
We also pay special attention to the last seeds in the adaptive partition. Due to the lack of nucleotides
remaining, the last seed in the adaptive partition of a read may be too short and its number of
matches may far exceed those of the other seeds as well as the threshold F. For instance, in the
simulated data set, the number of candidate locations reported by the last seeds contributed up to
64% of the total candidate space. Apparently, majority of those locations were false positives, but
removing all of them may lead to a considerable loss of mapping sensitivity. Our tool chooses to filter
out only those last seeds whose numbers of matches are higher than the expected frequency of kmers and contribute to more than 95% of the candidate locations of their respective reads (i.e. the last
seed reports too many locations compared to other seeds in the same read). Nevertheless, we avoid
removing the last seeds from those reads that have too few seeds required by the pigeonhole
principle. For the simulated data set, this filtration step only affected a small amount of reads (1.6%,
Supplementary Figure S3), but significantly reduced the total candidate space by more than 50%
(Supplementary Table S1).
Filtration using the extra seeds in the adaptive partition
Last but not least, when there are more than e+1 seeds available from the adaptive partition, we
make effective use of the extra seeds to filter out false positives. For instance, the simulated reads
were mapped with up to e=5 errors and hence e+1=6 seeds were required. However, the reads could
be partitioned up to 9 seeds, where majority of them were partitioned into 8 seeds (Supplementary
Figure S2). If a read was partitioned into 7, 8, or 9 seeds, only those locations reported by at least 2, 3,
or 4 seeds, respectively, were selected as candidates. This filtration step further reduced the total
candidate space by more than 70% (Supplementary Table S1). Our tool stores candidate locations in
a binary search tree that allows quickly sorting and identifying those reported by multiple seeds. Using
more extra seeds increases the filtering specificity but also requires longer filtration time. Our
experiment with the simulated data set showed that using only one extra seed, i.e. total e+2=7 seeds,
8
achieved the best overall mapping time (Supplementary Table S1). This is similar to the observation
in Hobbes 2 [21], GSNAP [25].
Overall, the combination of two filtration steps using the last seeds and the extra seeds
substantially reduced the candidate space of the simulated data set by more than 85%
(Supplementary Table S1). Obviously, such effective filtration will save a lot of computing resources in
the extension step.
Seed extension
To perform seed extension with edit distance (i.e. including both mismatches and indels), we reused
Masai’s implementation [17, 19] of the Myers’ bit-vector dynamic programming algorithm [28].
Results and discussion
In this section, we compare the performance of AMAS and the latest state-of-the-art all-mappers GEM
[18], Masai [19], Hobbes 2 [21], mrFAST (with FastHASH) [16], and mrsFAST-ultra [15]. We also
included two popular best-mappers Bowtie 2 and BWA in the comparison. The mappers were
configured to search for all possible mapping locations with up to e=5 errors and then output the
alignment results in the SAM format. Details of parameters configuration can be found in the
Supplementary Table S3. The experiments were performed on a Linux server with 12 Intel Xeon
processors (E5-2640, 2.50 GHz), 64 GB of RAM, CentOS 6.3, GCC 4.4.7. All mappers were tested
using one single thread and eight threads, except for Masai and mrFAST which do not support multithreading.
Rabema benchmark
Following previous studies of Masai and Hobbes 2 [19, 21], we used the Rabema benchmark [30] to
measure the sensitivity of the mappers. First, RazerS 3 [17] was run in its full-sensitive mode to build
the gold-standard set of all possible mapping locations with up to 5 errors. Any other mappers that
can guarantee full mapping sensitivity can also be used to build the gold-standard set [30]. The goldstandard set was then used by Rabema to assess the sensitivity of each mapper in three categories
“All”, “All-best”, and “Any-best”. For the “All” category, the mappers need to find all mapping locations
in the gold-standard set. Similarly, for the “All-best” and “Any-best” categories, the mappers need to
find all of the best mapping locations and any of the best mapping locations of the reads, respectively.
Note that the term “best” here is in terms of the edit distance between the read and the reference
sequence. Some mappers such as Bowtie 2 or BWA have their own scoring schemes to evaluate the
mapping quality of the alignments. As original locations were available for the simulated reads, we
also assessed the recall and the precision of the mappers on the simulated data set. Recall is
defined in Rabema as the fraction of the input reads that were correctly mapped and precision is
defined as the fraction of the uniquely mapped reads that were correctly mapped. A read is said to be
mapped correctly if its original location was reported by the mapper. A read is said to be mapped
uniquely if only one location was reported by the mapper.
9
Performance on the simulated data set
Table 1 shows the Rabema benchmark for mapping the simulated data set of 100k reads to the
human genome (UCSC hg19). The column “All” shows that AMAS was able to identify 98.11% of all
mapping locations and achieved full sensitivity (100%) for those locations with up to 2 errors. Hobbes
2 achieved the highest sensitivity 99.85%, i.e. 1.74% more sensitive than AMAS, and was followed by
Masai (99.83%), mrFAST (99.33%), AMAS (98.11%), GEM (97.65%), and mrsFAST (78.52%). AMAS
and GEM had lower sensitivity than Masai, Hobbes 2, and mrFAST, especially when searching for
mapping locations with 4 or 5 errors. This is because the adaptive seed partition does not guarantee
the number of seeds and hence there may not be sufficient seeds required by the pigeonhole
principle. The additional constraint on the maximum seed length introduced in AMAS guaranteed the
full sensitivity (100%) for all mapping locations with up to 2 errors and also improved the overall
sensitivity for locations with 3, 4, 5 errors. Hence, AMAS was 0.46% more sensitive than GEM.
mrsFAST had much lower mapping rate (79.35%) and sensitivity (78.52%) than the others because it
only allows mismatches and cannot detect indels.
In the “All-best” and “Any-best” categories, AMAS achieved 99.99% and 100% sensitivity,
respectively. That was similar to Hobbes 2 and better than the rest. AMAS also achieved the best
recall rate 99.09%, while its precision was 99.99%, the second best among the tools.
The best-mappers Bowtie 2, BWA, and GEM-best only searched for one or a few best mapping
locations. Hence, they ran faster than the all-mappers while having lower sensitivity. We noticed that
GEM-best outperformed Bowtie 2 and BWA in terms of both running time and sensitivity,
demonstrating the advantages of adaptive seeds. We tried to configure Bowtie 2 and BWA as allmappers (Supplementary Table S3) but their running times were too long and the results were not
reported here. We also configured Bowtie 2 in its -k mode to report up to -k=100 alignments for each
read so that it could finish within a reasonable time. Its sensitivity was 96.04%, i.e. 2.07% lower than
AMAS.
Performance on real data sets
Next, we run the mappers on a real NGS data set SRR063408 from the 1000 Genomes Project
(individual HG01495). The data set includes 25.6 million reads of length 100bp which were generated
from the Illumina Genome Analyzer II. Table 2 shows the running time, memory footprint, and
Rabema benchmark of mapping the first one million reads to the human genome. AMAS took about
30 minutes to finish the job using one single thread and 5 minutes using eight threads. AMAS was
able to map 93.75% of the reads and identified 98.14% of all mapping locations, including nearly all of
the best mapping locations (99.98%). AMAS only lose behind Masai and Hobbes 2, which achieved
highest sensitivity, 99.93% and 99.90% of all mapping locations, 100% of all best mapping locations.
In both single-thread and eight-thread tests, AMAS was more than 3 times faster than Hobbes 2.
AMAS was also more than 3 times faster than Masai in the single-thread test (Masai does not support
multi-threading). While using the same idea of adaptive seeds, AMAS outperformed GEM in terms of
mapping rate (0.06% higher), sensitivity (0.25% higher in the “All” category), and running time (2-7
10
times faster). This clearly shows the benefits of the optimized partition and filtration implemented in
AMAS. AMAS was more than 6 times faster than mrFAST in the single-thread test (mrFAST does not
support multi-threading). In this experiment, mrFAST produced invalid SAM output with many
inconsistent CIGAR strings, which could not be converted to BAM for further analysis with Rabema.
mrsFAST had similar running time as AMAS in the single-thread test but was more than 2 times
slower than AMAS in the eight-thread test. AMAS also had better mapping rate (1.37% higher) and
sensitivity (1.02% higher in the “All” category) than mrsFAST.
To map the full data set SRR063408 of 25.6 million reads to the human genome, AMAS took
about 12 hours using one single thread and 2 hours using eight threads (Table 3). Masai required 31
hours and Hobbes 2 required nearly 50 hours, that is, 2.6 times and 4.2 times slower than AMAS
when using one single thread. When eight threads were deployed, Hobbes 2 took about 8 hours, 4
times slower than AMAS. mrsFAST was the fastest in the single-thread test (9 hours), but was 2 times
slower than AMAS in the eight-thread test (4 hours). mrFAST could not finish the mapping within 3
days, thus we did not record its results. For this data set, GEM was not able to output its alignment
results in the SAM format. Thus we were only able to record its mapping time, which was already 1.55 times slower than the total running time of AMAS.
We also performed similar experiments on Caenorhabditis elegans (data set SRR065388 mapped
to the worm genome UCSC ce10) and Drosophila melanogaster (data set SRR497711 mapped to the
fruit-fly genome UCSC dm3). The results are presented in Supplementary Tables S4-S7. AMAS took
9 minutes to map 36 million reads to the worm genome. AMAS outperformed GEM and mrsFAST in
terms of running time, mapping rate, and sensitivity. It was nearly 2 times faster than Hobbes 2, 2.5
times faster than Masai and 4.6 times faster than mrFAST. AMAS fell behind Masai and Hobbes 2 by
no more than 0.04% of reads and 1.35% of all mapping locations. Similar results were also obtained
for the fruit-fly genome.
Most all-mappers use the seed-and-extend strategy in which locations reported by the seeds of a
read are used as candidates for extending the alignment to the rest of the read. Many locations
reported by different seeds of a read may actually correspond to one single location of the read in the
reference sequence. Thus it is important to mark duplicate candidates to reduce the time for seed
extension, and more importantly, to avoid duplicate alignments in the output. We measured the
percentage of the true alignments (according to Rabema benchmark) found by the mappers among
the alignments they reported. Table 4 shows that AMAS and mrsFAST were the most accurate while
Masai reported quite a large number of duplicate alignments.
Finally, we tested the mappers on a longer read length and more errors. A data set of one million
reads of length 200bp were simulated from the human genome and then were mapped with up to
e=10 errors (i.e. 5% error rate). The results are shown in Table 5. AMAS was able to map 99.90% of
the reads and identified 99.02% of all mapping locations, including nearly all (99.99%) of the best
mapping locations. Masai and Hobbes 2 achieved full sensitivity, but were 4-5 times slower than
AMAS. GEM did not scale well with this experiment. In the single-thread test its memory footprint
increased dramatically and in the eight-thread test it crashed due to memory errors. mrFAST was 3
11
times slower than AMAS and produced invalid SAM output. mrsFAST had similar running time as
AMAS, but much lower mapping rate (62.56%) and sensitivity (61.42% of all mapping locations)
because mrsFAST cannot handle indels.
Index and memory footprint
As AMAS processes reads in blocks of one million, the memory foot-print is kept stable regardless of
the size of the input NGS data (Tables 2 and 3). To map the full data set SRR063408 of 25.6M 100bp
reads to the human genome, AMAS requires 19.5 GB. The memory consumption includes 15.9 GB
for the index and 3 GB for the reference sequence. The memory footprint is not well optimized yet and
shall be the focus of our future development. Hobbes 2 uses hash tables and requires 16.7 GB. Masai
uses suffix arrays and requires 25 GB. GEM uses FM index with much less memory footprint 5.7 GB
for mapping. However, the memory footprint of GEM increases significantly or even crashes when
outputting the alignments to SAM format (using “gem-to-sam” tool) or when handling longer reads
with more errors (Tables 3, 5). mrsFAST uses hash tables but only needs 6.6 GB. Note that for
smaller data sets (with 1M reads), mrsFAST and mrFAST have very low memory footprint, 2 GB,
which is even less than the FM index (Table 2).
Our index of the human genome takes about 3 hours to build, and it can be stored on a local disk
with 13.8 GB for future mapping tasks (Supplementary Table S2). As our index needs to identify all
possible adaptive seeds with desired frequencies and their locations in the reference sequence, it
may take more time to build than other indexes. However, this indexing task only needs to be done
once for each genome and does not affect the mapping time.
Conclusions
In this study, we proposed an effective strategy for the partition and filtration of adaptive seeds to
speed up the exhaustive search for all possible mapping locations of NGS reads in a reference
sequence. Our tool, AMAS, features a new index designed specifically to accelerate the alignment of
adaptive seeds to the reference sequence. Frequency and length constraints on adaptive seeds allow
better control on the candidate alignment space while preserving enough seeds to guarantee the
mapping sensitivity. Finally, an accurate filtration strategy based on the last seeds and the extra
seeds is further applied to substantially tighten the candidate alignment space, efficiently reducing the
time for seed extension. As a result, AMAS runs several times faster than other competitors while
achieving comparable sensitivity and accuracy.
Multi-mapping reads are highly essential in several applications such as prediction of genomic
variants or protein binding motifs located in repeat regions, isoform expression quantification, metagenomics analysis, etc. However, searching for them is a very time-consuming task. Current stateof-the-art all-mappers such as GEM, Masai, Hobbes 2, mrsFAST, mrFAST, and best-mappers such
as Bowtie 2, BWA, etc, may take up to 1-2 days to find all possible mapping locations of reads from a
single NGS run for the human genome. Our tool offers a more efficient way to significantly speed up
that process. We have shown that AMAS run 2-7 times faster and was more sensitive than GEM.
12
AMAS was also up to 4 times faster than Masai, Hobbes 2, and mrFAST. Although AMAS did not
achieve nearly full sensitivity like Masai, Hobbes 2, and mrFAST, it only missed out less than 1.76%
of all mapping locations and 0.02% of all best mapping locations, while guaranteeing full sensitivity for
matches with small numbers of errors. Most of missing locations by AMAS were those with high
numbers of errors and may not be of interest in practice.
AMAS scales well in multi-threading environment and keeps the memory footprint stable
regardless of the size of input data. AMAS also supports pair-end read mapping, best-mapping mode,
and –k mapping mode (reporting up to –k alignments for each read). Hence, we believe that AMAS
will become a useful resource for read mapping in NGS data analysis.
Competing interests
The authors declare that they have no competing interests.
Authors’ contributions
XC and NHT designed the project. NHT developed the software and performed the analysis. NHT and
XC wrote the manuscript. Both authors read and approved the manuscript.
Acknowledgements
We thank the SeqAn team, especially the authors of Masai package for making their source codes
available. Our tool uses the SeqAn library and some well-developed components of Masai.
This work was supported by the Singapore National Medical Research Council (CBRG11nov091)
and the Singapore Ministry of Education Academic Research Fund (MOE2012-T2-1-055)
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
Metzker ML: Sequencing technologies - the next generation. Nat Rev Genet 2010, 11(1):3146.
Fonseca NA, Rung J, Brazma A, Marioni JC: Tools for mapping high-throughput sequencing
data. Bioinformatics 2012, 28(24):3169-3177.
Li H, Homer N: A survey of sequence alignment algorithms for next-generation sequencing.
Brief Bioinform 2010, 11(5):473-483.
Langmead B, Salzberg SL: Fast gapped-read alignment with Bowtie 2. Nat Methods 2012,
9(4):357-359.
Langmead B, Trapnell C, Pop M, Salzberg SL: Ultrafast and memory-efficient alignment of
short DNA sequences to the human genome. Genome Biol 2009, 10(3):R25.
Li H, Durbin R: Fast and accurate short read alignment with Burrows-Wheeler transform.
Bioinformatics 2009, 25(14):1754-1760.
Li H, Durbin R: Fast and accurate long-read alignment with Burrows-Wheeler transform.
Bioinformatics 2010, 26(5):589-595.
Li H: Aligning sequence reads, clone sequences and assembly contigs with BWA-MEM.
arXiv: 13033997 [q-bioGN] 2013.
Alkan C, Kidd JM, Marques-Bonet T, Aksay G, Antonacci F, Hormozdiari F, Kitzman JO, Baker
C, Malig M, Mutlu O et al: Personalized copy number and segmental duplication maps
using next-generation sequencing. Nat Genet 2009, 41(10):1061-1067.
13
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
Hach F, Hormozdiari F, Alkan C, Birol I, Eichler EE, Sahinalp SC: mrsFAST: a cache-oblivious
algorithm for short-read mapping. Nat Methods 2010, 7(8):576-577.
Newkirk D, Biesinger J, Chon A, Yokomori K, Xie X: AREM: aligning short reads from ChIPsequencing by expectation maximization. J Comput Biol 2011, 18(11):1495-1505.
Roberts A, Pachter L: Streaming fragment assignment for real-time analysis of sequencing
experiments. Nat Methods 2013, 10(1):71-73.
Li R, Yu C, Li Y, Lam TW, Yiu SM, Kristiansen K, Wang J: SOAP2: an improved ultrafast tool
for short read alignment. Bioinformatics 2009, 25(15):1966-1967.
David M, Dzamba M, Lister D, Ilie L, Brudno M: SHRiMP2: sensitive yet practical SHort Read
Mapping. Bioinformatics 2011, 27(7):1011-1012.
Hach F, Sarrafi I, Hormozdiari F, Alkan C, Eichler EE, Sahinalp SC: mrsFAST-Ultra: a compact,
SNP-aware mapper for high performance sequencing applications. Nucleic Acids Res 2014,
42(Web Server issue):W494-500.
Xin H, Lee D, Hormozdiari F, Yedkar S, Mutlu O, Alkan C: Accelerating read mapping with
FastHASH. BMC Genomics 2013, 14 Suppl 1:S13.
Weese D, Holtgrewe M, Reinert K: RazerS 3: faster, fully sensitive read mapping.
Bioinformatics 2012, 28(20):2592-2599.
Marco-Sola S, Sammeth M, Guigo R, Ribeca P: The GEM mapper: fast, accurate and versatile
alignment by filtration. Nat Methods 2012, 9(12):1185-1188.
Siragusa E, Weese D, Reinert K: Fast and accurate read mapping with approximate seeds
and multiple backtracking. Nucleic Acids Res 2013, 41(7):e78.
Ahmadi A, Behm A, Honnalli N, Li C, Weng L, Xie X: Hobbes: optimized gram-based methods
for efficient read alignment. Nucleic Acids Res 2012, 40(6):e41.
Kim J, Li C, Xie X: Improving read mapping using additional prefix grams. BMC
Bioinformatics 2014, 15:42.
Smith TF, Waterman MS: Identification of common molecular subsequences. J Mol Biol
1981, 147(1):195-197.
Needleman SB, Wunsch CD: A general method applicable to the search for similarities in
the amino acid sequence of two proteins. J Mol Biol 1970, 48(3):443-453.
Ferragina P, Manzini G: Opportunistic data structures with applications. In: Proceedings of
the 41st Annual Symposium on Foundations of Computer Science. IEEE Computer Society;
2000: 390.
Wu TD, Nacu S: Fast and SNP-tolerant detection of complex variants and splicing in short
reads. Bioinformatics 2010, 26(7):873-881.
Kielbasa SM, Wan R, Sato K, Horton P, Frith MC: Adaptive seeds tame genomic sequence
comparison. Genome Res 2011, 21(3):487-493.
Liu Y, Popp B, Schmidt B: CUSHAW3: sensitive and accurate base-space and color-space
short-read alignment with hybrid seeding. PLoS One 2014, 9(1):e86869.
Myers G: A fast bit-vector algorithm for approximate string matching based on dynamic
programming. J ACM 1999, 46:395-415.
Holtgrewe M: Mason - a read simulator for second generation sequencing data. Technical
report TR-B-10-06, Institut fur Mathematik und Informatik, Freie Universitat Berlin 2010.
Holtgrewe M, Emde AK, Weese D, Reinert K: A novel and well-defined benchmarking
method for second generation read mapping. BMC Bioinformatics 2011, 12:210.
14
Figure Legends
Figure 1. Partition of adaptive seeds. (A) Partition of the read
“AGGTCAAGAAATTGAGACCATCCCGGCCAACTTGGTGAAACCCCGTCTCGTCTCTACTAAAAGT
AAAAAAAATTAGCTGGGCGTGGTGGCGGGTGCATAT” against the human genome using 6 equallength16bp seeds (upper) and 6 adaptive seeds with frequencies less than F=300 (lower). Using
adaptive seeds significantly reduced the total number of candidate locations by ~44.66 times. (B) A
partial sub-tree of our index with k=10, F=300 for the human genome. Nodes were extended until their
numbers of matches dropped below 300 (shaded leaf nodes). The path corresponding to the first
adaptive seed of the read in (A) with length 13bp and frequency 157 is illustrated with bold lines.
15
Tables
Table 1. Rabema benchmark for mapping the simulated data set of 100k reads of length 100bp
to the human genome with up to e=5 errors. The first seven tools are all-mappers and the last
three are best-mappers. The column “All” shows the percentage of all mapping locations that the
mappers were able to find. Numbers in bold show the overall percentage, numbers in the smaller font
size show detailed percentages for mapping locations with 0, 1, 2 (upper) and 3, 4, 5 (lower) errors.
Similarly, the two columns “All-best” and “Any-best” respectively show the sensitivity of the mappers
for identifying all of the best mapping locations and any of the best mapping locations of the reads.
The last two columns, “Rec” and “Prec”, show the recall and the precision of the mappers,
respectively (see the main text for the definitions of recall and precision).
Mappers
Reads
mapped
(%)
AMAS
99.11
All (%)
100
Bowtie2
(k=100)
99.06
GEM
(all)
99.06
Masai
99.06
Hobbes2
mrFAST
mrsFAST
98.55
79.35
Bowtie2
(best)
98.58
GEM
(best)
99.06
BWA
98.04
100
98.11
100
100
Any-best (%)
100
99.99
98.71
90.76
72.53
99.97
99.82
98.73
96.04
93.02
76.36
52.47
100
99.99
99.82
97.65
99.94
99.77
99.94
99.71
99.69
99.34
67.40
100
100
100
99.74
99.38
97.46
100
100
100
99.83
99.20
98.92
97.26
100
99.87
99.78
99.64
99.24
96.52
100
100
100
99.70
99.05
98.35
99.94
97.28
100
100
100
99.33
100
100
100
99.99
87.95
100
74.50
53.65
78.52
100
99.97
99.92
100
100
100
37.93
48.97
97.91
96.59
92.00
90.12
100
100
55.16
100
74.09
52.27
51.96
20.70
100
99.29
97.25
94.19
31.88
11.55
02.46
96.58
96.27
94.61
67.59
32.80
97.91
96.68
92.71
75.48
42.92
14.71
89.43
99.92
99.70
99.65
99.27
97.50
100
99.98
99.87
99.82
99.44
96.86
100
100
100
99.70
99.05
98.47
100
100
100
100
100
99.92
100
100
100
100
100
55.31
100
74.16
52.33
31.93
11.60
02.50
100
99.47
97.53
97.25
96.13
95.49
100
99.96
99.87
99.77
99.50
96.94
100.00
99.68
99.20
93.00
80.16
68.20
99.27
94.15
93.14
92.20
100
99.86
99.76
99.85
90.26
100
79.76
96.01
79.43
100
99.44
79.72
39.40
99.89
100
99.44
100
99.97
99.95
100
100
100
99.92
99.95
99.85
100
99.88
99.85
88.26
100
100
99.59
97.27
99.11
100
All-best (%)
99.91
99.54
99.21
96.50
96.58
96.54
96.21
90.13
77.24
65.54
95.53
98.76
16
Rec
(%)
Prec
(%)
99.09
99.99
98.40
99.76
98.72
99.73
99.05
100
98.99
99.89
98.00
99.43
78.14
98.75
94.88
96.25
98.61
99.70
93.92
95.79
Table 2. Rabema benchmark, running time, and memory footprint for mapping the first one
million reads of the real Illumina data set SRR063408 to the human genome with up to e=5
errors. The read mapping was performed using 1 thread and 8 threads. Masai and mrFAST do not
support multi-threading. The column “All” shows the percentage of all mapping locations that the
mappers were able to find. Similarly, the two columns “All-best” and “Any-best” respectively show the
sensitivity of the mappers for identifying all of the best mapping locations and any of the best mapping
locations of the reads. In this experiment, mrFAST produced invalid SAM output with many
inconsistent CIGAR strings, which could not be converted to BAM for further analysis. NA: not
available.
Mappers
1-thread
Time
(mm:ss)
8-thread
Time
(mm:ss)
Memory
(GB)
Reads
mapped
(%)
All
(%)
All-best
(%)
Any-best
(%)
AMAS
29:43
04:59
19.4
93.75
98.14
99.98
99.99
Bowtie2
(k=100)
55:30
07:31
3.6
93.70
95.89
99.60
99.91
GEM
(all)
71:41
36:45
5.3
93.69
97.89
99.91
99.92
Masai
91:12
NA
16.7
93.75
99.93
100
100
Hobbes2
110:24
15:16
14.9
93.76
99.90
100
100
mrFAST
189:47
NA
2.0
NA
NA
NA
NA
mrsFAST
29:41
11:28
2.1
92.38
97.12
98.48
98.50
Table 3. Details of mapping the full data set SRR063408 of 25.6 million reads to the human
genome with up to e=5 errors. The read mapping was performed using 1 thread and 8 threads.
Masai and mrFAST do not support multi-threading. For this full data set, GEM was not able to output
the alignment results in the SAM format. Thus we only recorded its running time and memory
consumption for the mapping step, but not the writing step. mrFAST could not finish the mapping
within 3 days, thus we did not record its results. NA: not available.
Mappers
1-thread Time
(hh:mm)
8-thread Time
(hh:mm)
Memory (GB)
AMAS
Bowtie2
(k=100)
GEM*
(all)
Masai
Hobbes2
mrFAST
mrsFAST
12:09
24:23
18:07
31:02
49:56
NA
08:48
01:59
03:19
10:41
NA
08:13
NA
04:06
19.5
3.8
5.7
25.0
16.7
NA
6.6
17
Table 4. Percentage of the true alignments found by the mappers among the alignments they
reported. For the real data set of one millions reads, mrFAST produced invalid SAM output with
many inconsistent CIGAR strings, which could not be converted to BAM for further analysis. NA: not
available.
AMAS
GEM
(all)
Masai
Hobbes 2
mrFAST
mrsFAST
Number of true alignments found
8,886,145
8,624,695
13,813,089
13,735,743
13,806,005
10,785,780
Number of alignments reported
8,886,270
8,628,751
21,954,696
13,762,313
13,918,070
10,785,975
100
99.95
62.92
99.81
99.20
100
Number of true alignments found
99,339,852
105,459,737
148,827,680
148,526,618
NA
134,412,384
Number of alignments reported
99,447,106
105,602,112
243,162,835
148,743,923
149,368,650
134,506,255
99.89
99.87
61.21
99.85
NA
99.93
Mappers
Simulated data set of 100k reads
Percentage
Real data set of 1M reads
Percentage
Table 5. Rabema benchmark, running time, and memory footprint for mapping the simulated
data set of one million reads of length 200bp to the human genome with up to e=10 errors. The
read mapping was performed using 1 thread and 8 threads. Masai and mrFAST do not support multithreading. The multi-threading mode of GEM also crashed for this data set due to memory problem.
The column “All” shows the percentage of all mapping locations that the mappers were able to find.
Similarly, the two columns “All-best” and “Any-best” respectively show the sensitivity of the mappers
for identifying all of the best mapping locations and any of the best mapping locations of the reads. In
this experiment, mrFAST produced invalid SAM output with many inconsistent CIGAR strings, which
could not be converted to BAM for further analysis. NA: not available.
Mappers
1-thread
Time
(mm:ss)
8-thread
Time
(mm:ss)
Memory
(GB)
Reads
mapped
(%)
All
(%)
All-best
(%)
Any-best
(%)
Recall
(%)
Precision
(%)
AMAS
38:58
05:55
19.6
99.90
99.02
99.99
100
99.89
100
Bowtie2
(k=100)
185:30
24:41
3.6
99.90
98.20
99.76
99.94
99.64
99.90
GEM
(all)
332:47
NA
19.7
99.90
98.71
99.95
99.99
99.42
99.55
Masai
217:06
NA
17.0
99.90
100
100
100
99.90
100
Hobbes2
180:35
24:21
14.2
99.90
99.91
100
100
99.81
99.91
mrFAST
122:26
NA
2.3
NA
NA
NA
NA
NA
NA
mrsFAST
33:53
07:08
2.9
62.56
61.42
62.28
62.31
60.92
97.71
18
Additional files
Additional file 1 – Supplementary figures
Additional file 2 – Supplementary tables
19
(A)
16
16
16
16
16
16
55
3
35,778
1,585
6,534
3,246
13
15
17
13
15
24
157
134
184
293
282
7
∑=47,201
∑=1,057
(B)
AAAAAAAAAA: 3,000,786
A: 612
A: 2,272
A: 99
A: 208
C: 386
C: 700
C: 35
C: 323
AGGTCAAGAA: 5,466
G: 438
G: 1,136
G: 165
G: 148
T: 836
T: 1,358
TTTTTTTTTT: 3,015,555
T: 24
T: 157
| 5cs.CE
|
A LINEAR TIME ALGORITHM FOR THE 3-NEIGHBOUR TRAVELLING
SALESMAN PROBLEM ON A HALIN GRAPH AND EXTENSIONS
arXiv:1504.02151v5 [cs.DM] 4 Sep 2017
BRAD WOODS, ABRAHAM PUNNEN, AND TAMON STEPHEN
Abstract. The Quadratic Travelling Salesman Problem (QTSP) is to find a least cost Hamiltonian cycle
in an edge-weighted graph, where costs are defined for all pairs of edges contained in the Hamiltonian cycle.
The problem is shown to be strongly NP-hard on a Halin graph. We also consider a variation of the QTSP,
called the k-neighbour TSP (TSP(k)). Two edges e and f , e 6= f , are k-neighbours on a tour τ if and only
if a shortest path (with respect to the number of edges) between e and f along τ and containing both e
and f , has exactly k edges, for k ≥ 2. In (TSP(k)), a fixed nonzero cost is considered for a pair of distinct
edges in the cost of a tour τ only when the edges are p-neighbours on τ for 2 ≤ p ≤ k. We give a linear time
algorithm to solve TSP(k) on a Halin graph for k = 3, extending existing algorithms for the cases k = 1, 2.
Our algorithm can be extended further to solve TSP(k) in polynomial time on a Halin graph with n nodes
when k = O(log n). The possibility of extending our results to some fully reducible class of graphs is also
discussed. TSP(k) can be used to model the Permuted Variable Length Markov Model in bioinformatics as
well as an optimal routing problem for unmanned aerial vehicles (UAVs).
1. Introduction
The Travelling Salesman Problem (TSP) is to find a least cost Hamiltonian cycle in an edge weighted
graph. It is one of the most widely studied combinatorial optimization problems and is well-known to be
NP-hard. The TSP model has been used in a wide variety of applications. For details we refer the reader to
the well-known books [2, 8, 18, 23, 27] as well as the papers [4, 13, 21, 22].
For some applications, more than linear combinations of distances between consecutive nodes are desirable in formulating an objective function. Consider the problem of determining an optimal routing of an
unmanned aerial vehicle (UAV) which has a list of targets at specific locations. This can be modelled as a
TSP which requires a tour that minimizes the distance travelled. However, such a model neglects to take
into account the physical limitations of the vehicle, such as turn radius or momentum. To illustrate this
idea, in Figure 1 we give a Hamiltonian path, in Figure 2 we give the corresponding flight path, and Figure 3
shows a route which is longer but can be travelled at a greater speed and hence reducing the overall travel
time. To model the traversal time, we can introduce penalties for pairs of (not necessarily adjacent) edges
to force a smooth curve for its traversal. In this paper we consider a generalization of the TSP which can
be used to model similar situations and contains many variations of the TSP, such as the angular-metric
TSP [1] and the TSP [5] as special cases.
Let G = (V, E) be an undirected graph on the node set V = {0, 1, . . . , n − 1} with the convention that
all indices used hereafter are taken modulo n. For each edge (i, j) ∈ E a nonnegative cost cij is given. Let
F be the set of all tours (Hamiltonian cycles) in G and let τ = (v0 , v1 , . . . , vn−1 , v0 ) ∈ F. Note that a tour
τ can be represented either by its sequence (permutation) of the vertices, or by the sequence, or simply the
set, of edges it traverses. In this paper, it is usually more convenient to work with the edge representation.
The edges e = (vi , vi+1 ) and f = (vj , vj+1 ), e 6= f , are k-neighbours on τ , if and only if a shortest path
between e and f on τ containing these edges has exactly k edges, for k ≥ 2. Here the shortest path refers to
the path with the least number of edges, rather than the minimum cost path. Thus e and f are 2-neighbours
in τ if and only if they share a common node in τ .
Let q(e, f ) be the cost of the pair (e, f ) of edges and δ(k, τ ) = {(e, f ) : e, f ∈ τ and e and f are pneighbours on τ for some 2 ≤ p ≤ k}. Assume that q(e, f ) = q(f, e) for every pair of edges e, f ∈ E. Then
the k-neighbour TSP (TSP(k)) is defined as in [31]
1
Figure 2. Smoothing of the optimal TSP tour.
Figure 1. Optimal TSP tour.
Figure
Figure
Figure
3. A
Figure 3. A route which
cantour
be
1.
Optimal
Figure
which
can
1. Optimal TSP tour.
TSP
tour
2. Smoothbe
travFigure
2. Smoothing
of the optimal TSP
tour.
with respect
ing of the
elled more
to length.
tour.
quickly.
T SP (k) :
X
Minimize
q(e, f ) +
(e,f )∈δ(k,τ )
Subject to
X
travelled more quickly
c(e)
e∈τ
τ ∈ F.
A closely related problem, the Quadratic TSP (QTSP), is defined as follows:
QT SP :
X
Minimize
(e,f )∈τ ⊗τ
Subject to
q(e, f ) +
X
c(e)
e∈τ
τ ∈ F.
where
τ ⊗ τ = τ × τ \ of
{(e,the
e) : e ∈
τ }. Note: TSP tour.
Figure 2.
Smoothing
optimal
(
Figure 3. A route which
can be iftravelled
more
1 quickly.
δ(n/2, τ )
n is even
gure 3.
τ ⊗τ =
δ((n + 1)/2, τ )
if n is odd.
Thus when k ≥ n/2 (for n even) or k ≥ (n + 1)/2 (for n odd), the k-neighbour TSP reduces to the
Quadratic TSP [33]. Define TSP(1) to be the original TSP. Elsewhere in the literature (e.g. [17], [14]), the
term Quadratic TSP is sometimes used for what we refer to as TSP(2). That is, quadratic terms are allowed,
but only for pairs of edges that share a node.
The bottleneck version of TSP(k) was introduced by Arkin et al. in [3], denoted as the k-neighbour
maximum scatter TSP. Jäger and Molitor [19] encountered TSP(2) while studying the Permuted Variable
Length Markov Model. Several heuristics are proposed and compared in [16, 19] as well as a branch and
bound algorithm for TSP(2) in [16]. A column generation approach to solve TSP(2) is given in [28], lower
bounding procedures discussed in [29], and polyhedral results were reported by Fischer and Helmberg [17],
Fischer [14], and Fischer and Fischer [15]. The k-neighbour TSP is also related to the k-peripatetic salesman
problem [12, 20] and the watchman problem [7]. Algorithms for maximization and minimization versions of
TSP(2) were studied by Staněk [30] and Oswin et al. [26]. To the best of our knowledge, no other works in
the literature address TSP(k).
Referringwhich
to the UAV
discussed earlier,
it isquickly.
clear that the flight subpaths depend on both the
A route
canexample
be travelled
more
angle and distances between successive nodes. By precalculating these and assigning costs to q(e, f ), for
e, f ∈ E, we see that QTSP is a natural model for this problem. In fact, the flight paths may be affected by
edges further downstream. Thus we can get successively better models by considering TSP(1), TSP(2),. . .,
12
TSP(k) in turn. In practice we expect diminishing returns to take hold quickly and hence TSP(k) with small
values of k are of particular interest.
In this paper we show that QTSP is NP-hard even if the costs are restricted to 0-1 values and the
underlying graph is Halin. In contrast, TSP and TSP(2) on a Halin graph can be solved in O(n) time [9, 33].
Interestingly, we show that TSP(3) can also be solved on a Halin graph in O(n) time, although as we move
from TSP(2) to TSP(3), the problem gets much more complicated. In fact, our approach can be extended to
obtain polynomial time algorithms for TSP(k) whenever k = O(log n). We note that while Halin graphs have
treewidth 3, the results on graphs with bounded treewidth (e.g. [6, 11]) usually cannot easily be extended
to optimization problems with quadratic objective functions.
The paper is organized as follows. In Section 2 we introduce some preliminary results and notations for the
problem. The complexity result for QTSP on Halin graphs is given in Section 3. An O(n) algorithm to solve
TSP(3) on Halin graphs is given in Section 4.1, which can be extended to obtain an O(n2(k−1)/2 ) algorithm
for TSP(k). Further extensions of this result to fully reducible classes of graphs are briefly discussed in
Section 5.
An earlier version of the NP-completeness results presented here were included as part of the M.Sc. thesis
of the first author [31].
2. Notations and definitions
A Halin graph H = T ∪ C is obtained by embedding a tree with no nodes of degree two in the plane and
connecting the leaf nodes of T in a cycle C so that the resulting graph remains planar. Unless otherwise
stated, we always assume that a Halin graph or its subgraphs are given in the planar embedded form. The
non-leaf nodes belonging to T are referred to as tree or internal nodes and the nodes in C are referred to
as cycle or outer nodes of H. A Halin graph with exactly one internal node is called a wheel. If H has at
least two internal nodes and w is an internal node of T which is adjacent to exactly one other internal node,
then w is adjacent to a set of consecutive nodes of C, which we denote by C(w). Note that |C(w)| ≥ 2.
The subgraph of H induced by {w} ∪ C(w) is referred to as a fan, and we call w the centre of the fan. See
Figure 4.
F
w
edge in C
edge in T
fan in H
Figure
1. A Halin graph with 3 fans. w is the centre of fan F .
Figure 4. A Halin graph H with 3 fans. w is the centre of fan F .
Lemma 2.1 (Cornuejols et al. [9]). Every Halin graph which is not a wheel has at least two fans.
Let G = (V, E) be a graph and let S ⊆ V be a connected subgraph of G. Let ϕ(S) be the cutset of S,
that is, the smallest set of edges whose removal disconnects S from the vertices in V \ S. Let G/S be the
graph obtained by contracting S into a single node, called a ‘pseudonode’ denoted by vS [9]. The edges in
G/S are obtained as follows:
3
(1) An edge with both ends in S is deleted;
AinHalin
with
3 fans. w is the centre
(2) An edge Figure
with both 1.
ends
G − Sgraph
remains
unchanged;
(3) An edge (v1 , v2 ) with v1 ∈ G − S, v2 ∈ S is replaced by the edge (v1 , vs ).
of fan F .
Lemma 2.2 (Cornuejols et al. [9]). If F is a fan in a Halin graph H, then H/F is a Halin graph.
Note that each time a fan F is contracted using the graph operation H/F , the number of non-leaf nodes
of the underlying tree is reduced by one. That is, after at most d(n − 1)/2e fan contractions, a Halin graph
will be reduced to a wheel.
Let w be the centre of a fan F , and label the outer nodes in F in the order they appear in C as,
u1 , u2 , . . . , ur (r ≥ 2). Let (j, k, l) be the 3-edge cutset ϕ(F ) which disconnect F from G such that j is
adjacent to u1 , k is adjacent to w but not adjacent to ui for any i, 1 ≤ i ≤ r, and l is adjacent to ur (See
Figure 5, r = 4).
Note that every Hamiltonian cycle τ in H contains exactly two edges of {j, k, l}. The pair of edges chosen
gives us a small number of possibilities for traversing F in a tour τ . For example, if τ uses k and l, it contains
the subsequence w, u1 , u2 , . . . , ur (call this a left-traversal of F ), if τ uses j and k it contains the subsequence
u1 , u2 , . . . ur , w (call this a right-traversal of F ) and if τ uses j and l, it contains a subsequence of the form
u1 , u2 , . . . , ui , w, ui+1 , . . . , ur , for some i ∈ {1, 2, . . . , r − 1} as it must detour through the centre of F (call
this a centre-traversal of F ).
j
F
u1
u2
u3
v
k
edge in C
edge in T
fan in H
u4
l
Figure
A Halin
H containing
fan
F a. 3-edge
{j, k,cutset
l} is which
a 3-edge
cutset
Figure
5. 2.
A Halin
graphgraph
H containing
fan F . {j, k,
l} is
disconnects
disconnects F from H.
Fwhich
from H.
1
3. Complexity of QTSP on Halin graphs
Many optimization problems that are NP-hard on a general graph are solvable in polynomial time on a
Halin graph [9, 24, 25]. In particular, TSP on a Halin graph is solvable in linear time. Unlike this special
case, we show that QTSP is strongly NP-hard on Halin graphs. The decision version of QTSP on a Halin
graph, denoted by RQTSP, can be stated as follows:
P
e∈τ c(e) +
P “Given a Halin graph H and a constant θ, does there exist a tour τ in H such that
q(e,
f
)
≤
θ?”
e,f ∈τ
Theorem 3.1 (Woods [31]). RQTSP is NP-complete even if the values c(e) ∈ {0, 1} and q(e, f ) ∈ {0, 1}
for e, f ∈ H.
Proof. RQTSP is clearly in NP. We now show that the 3-SAT problem can be reduced to RQTSP. The
3-SAT problem can be stated as follows: “Given a Boolean formula R in Conjunctive Normal Form (CNF)
containing a finite number of clauses C1 , C2 , . . . , Ch on variables x1 , x2 , . . . , xt such that each clause contains
4
exactly three literals (L1 , . . . , L3h where for each i, Li = xj or Li = ¬xj for some 1 ≤ j ≤ t), does there
exists a truth assignment such that R yields a value ‘true’ ?”
From a given instance of 3-SAT, we will construct an instance of RQTSP. The basic building block of our
construction is a 4-fan gadget obtained as follows. Embed a star on 5 nodes with center v and two specified
nodes ` and r on the plane and add a path P from ` to r covering each of the pendant nodes so that the
resulting graph is planar (see Figure 6). Call this special graph a 4-fan gadget.
µ1
µ2
µ3
r
`
v
Figure
4-fan
gadget
constructed
by embedding
starinon
nodes
the
Figure 6.3.4-fan
gadget
constructed
by embedding
a star on 5anodes
the4plane
andinadding
a path.and adding a path connecting the pendant nodes so that the resulting
plane
graph is planar.
The nodes on path P of this gadget are called outer nodes and edges on P are called outer edges. Let
µ1 , µ2 , µ3 be edges with distinct end points in P . Note
C1 that any `-r Hamiltonian path of the gadget must
contain all the outer edges except one which
is
skipped
to detour through v. We will refer to an `-r
µ
2
µ1
µ3
Hamiltonian path in a 4-fan gadget as a center-traversal
as
r1 before.
l1
We will construct a Halin graph H using one copy of the gadget for each clause and let µ1 , µ2 , µ3 correspond
to literals contained in that clause. We will assign costs to pairs of edges such that every Hamiltonian cycle
with cost 0 must contain a centre-traversal for each clause. To relate a Hamiltonian cycle to a truth
vy which does not contain edge µi corresponds
assignment, a centre-traversal
to an assignment of a true value
l2
µ4
to literal Li .
v1
y clause C1 , . . . , Ch , create a copy of µthe 4-fan gadget. The r, `, and v
Now construct H as follows. For each
5
nodes of the 4-fan gadget corresponding to the clause Ci are denoted by ri , `i andCv2i respectively. Connect the
6
node ri to the node `i+1 , i = 1, 2, . . . , h. Introduce nodes vxv2and vy and theµedges
(`1 , vx ), (vx , vy ), (vy , rh ).
vx w and connect it to vw
Also introduce a new node
x , vy and vi for i = 1, 2, . r.2. , h − 1. The resulting graph is
the required Halin graph H. See Figure
x 7.
Assign the cost c(e) = 0 for every edge in H. Let x = (vx , w) and y = (vy , w). Note that every tour
which contains edges x and y traverses every gadget using a centre-traversal. For each gadget: assign costs of
v4
v3
q(e, f ) = 1 for pairs of edges which are neither outer edges nor both adjacent to the same literal edge µ1 , µ2
or µ3 , and for all other pairs of edges within the gadget assign cost 0. For each variable xj , j = 1, . . . , n,
and all literals Lm , Lq (m 6=r4q) if xj = Lm = ¬Lq , assign cost q(µ0ml,3µ0q ) = 1 where µ0m and µ0q are edges
connecting µm (and µq ) to the
paired costs are assumed to be 0.
µ7
µ12respective 4-fan gadget centre v. All other
Suppose B is a valid truth assignment.
Then
in
each
clause
there
exists
at least one true literal. Consider
µ
8
µ11
C3gadget such that τ detours around
C4 the
a tour τ in H which contains
edges
r3 µ9 every
µ10 l4x and y and traverses
exactly one literal edge which corresponds to a literal which is true in B. Since the truth assignment is
valid, such a τ exists. Clearly τ has cost 0, since no costs are incurred by pairs of edges contained in a single
Figure 4. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 .
gadget, nor are costs incurred of the form q(µ0a , µ0b ) where La = ¬Lb . The latter
must be true because in
any truth assignment, the variable corresponding to La , say xa , must be either assigned a value of true or
false. Suppose a cost of 1 is incurred by q(µ0a , µ0b ) and hence La = ¬Lb . If xa is true, and xa = La , then
Lb clearly must be false, so τ cannot detour to miss both µ0a and µ0b . The same contradiction arises, if xa is
false. Hence a yes instance of 3-SAT can be used to construct a yes instance for RQTSP with θ = 0.
Now suppose there is a tour which solves RQTSP with θ = 0. Suppose τ 0 is such a tour. Clearly it
must use edges x and y, and hence must traverse every gadget via a centre-traversal. Such a detour must
5
v
Figure 3. 4-fan gadget constructed by embedding a star on 4 nodes in the
plane and adding a path connecting the pendant nodes so that the resulting
graph is planar.
C1
µ1
µ2
µ3
r1
l1
vy
l2
v1
y
µ5
µ6
v2
vx
C2
r2
w
x
v4
v3
r4
l3
µ12
µ7
C4
µ4
µ8
µ11
r3 µ 9
µ10 l4
C3
Figure 4. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 .
Figure 7. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 .
skip a literal edge in every gadget, otherwise a cost of 1 is incurred. Suppose D = {L1 , . . . , Ls } is the set
of literals which are skipped. Li 6= ¬Lj for any i, j, otherwise a cost of 1 is incurred. This implies that a
truth assignment which results in every literal in D being true is a valid truth assignment to the variables
x1 , . . . , xt . That is, for each literal edge which is skipped in τ 0 , assign true or false to the corresponding
variable such that the literal evaluates to true (if Li = xj , set xj = true and if Li = ¬xj , set xj = f alse).
The truth values for any remaining variables can be assigned arbitrarily. This truth assignment returns true
for each clause since exactly one literal in each clause is detoured, and evaluates to true. Hence this truth
assignment is a valid assignment for 3-SAT.
4. Complexity of k-neighbour TSP on Halin graphs
Let G be a planar embedding of a planar graph and e and f are two distinct edges of G. Then e and f
2 contains both e and f . This may include the outer
are said to be cofacial if there exists a face of G which
face.
Theorem 4.1. Let τ be a tour in the planar embedding H = T ∪ C of a Halin graph. Then, any two edges
adjacent in τ must be cofacial.
Proof. Suppose the result is not true. Then, there exists a tour τ in H containing two adjacent edges
e = (u, x), f = (x, v) such that e and f are not cofacial. From our previous discussion on fan traversals, we
can assume that x 6∈ C. Since e and f are not cofacial at x, there exists edges g = (y, x) and h = (x, z) in
H such that the clockwise ordering of edges incident on x is of the form f, . . . , g, . . . , e, . . . , h (See Figure 8).
Without loss of generality, assume T is rooted at x. Then T has at least four subtrees Tu , Tv , Ty , Tz rooted
respectively at u, v, y and z. Since τ is a tour containing the edge e, it must contain a path, say P1 , through
the subtree Tu from u to uc ∈ C. Note that uc could be the same as u and in this case the subtree Tu is
the isolated node u. Similarly, τ must contain a path P2 in Tv from v to vc ∈ C (See Figure 8). Note that
P = P1 ∪ P2 ∪ {e, f } is a path in τ . Deleting the vertex set V (P ) of P and its incident edges from H yields
a disconnected graph. Thus, τ − V (P ) must be disconnected, a contradiction.
A preliminary version of this result is given in [31].
6
yc
y
g
uc
P1
u
e
x
v
f
vc
P2
h
z
zc
Figure8.5.A A
Halin
graph
H non-consecutive
with non-consecutive
edges
andx.f Hat− node
x.
Figure
Halin
graph
H with
edges e and
f at enode
P where
P
P2 ∪ {e,Pf }=has
hence
no components,
τ contains bothhence
edges enoand
f.
H =−PP1 ∪where
P1 two
∪ Pcomponents,
two
τ contains
2 ∪ {e, f } has
both edges e and f .
x
A path in the planar embedding H = T ∪ C of a Halin
graph is called a candidate paths if its consecutive
α
α
5
edges are cofacial. A candidate path with k-edges is called 6a candidate k-path. Note that only candidate
paths can be subpaths of a tour but it is possible that kthere are candidate paths that are not part of a tour.
Corollary 4.2. Let H = T ∪ C be a planar embedding of a Halin graph
a specified edge of H.
α4 and eαbe
α2
3
w
Then, H has at most k α
· 21k−1 candidate
k-paths containing
e.
Proof. Consider extending e, if necessary in either directions in H, to a candidate k-path P . For a given
u
u0
end point of a sub path of P , say
vertex u, tby
are onlyr+1
two possible edges incident on
1 Theorem 4.1,tthere
r
u, which may belong to P . Thus, there are at most 2k−1 candidate k-paths when the position of e is fixed.
Since e can take any of the k positions
in a candidate k-path, there arel at most k · 2k−1 candidate k-paths
j
u1
ur
containing e.
yr−1
y1
As an immediate consequence of Corollary 4.2, we have an upper bound of 2n−2 on the number of
Hamiltonian cycles in a Halin graph. To see this, let r be the number of Hamiltonian cycles in H. From
Figure 6. A fan F with centre w. Every τ containing j and k contains
each such cycle, we can generate n distinct Hamiltonian paths (candidate (n − 1)-paths) by ejecting an edge.
edges
. . ,Hamiltonian
yr−1 , tr . Every
l contains
y1and
, . . . all
, yr−1
, t1paths
.
1 , .all
Repeating
this yfor
cyclesτ incontaining
H, we get k
rnand
candidate
(n − edges
1)-paths
these
are
Every
τ
containing
j
and
l
must
contain
one
of
the
subpaths
from
the
set
distinct. Hence rn is a lower bound on the number of candidate (n − 1)-paths in H. By Corollary 4.2,
(n − 1)2n−2
upper
Thus,
{α1is−anj −
l − bound
α3 , α1on
− the
j −number
l − α4 ,ofαcandidate
− −α1)-paths
l−
α4 }.rn ≤ (n − 1)2n−2 and
2 − j − l (n
3 , α2 − jin−H.
n−1 n−2
n−2
hence r ≤ n 2
≤2
.
Noting that there are at most 2(n − 1) edges in H and that the number of quadratic costs which are
relevant is the number of candidate k-paths, it follows from Corollary 4.2, that the number of quadratic
costs which are relevant is bounded above by k · 2k · (n − 1) = O(n) for any fixed k and O(nt+2 ) if k ≤ t log n.
Note that any face of H must contain an outer edge. Moreover, the following Corollary will prove useful.
Corollary 4.3. If H is embedded in the plane such that it is planar and C defines the outer face, for any
outer edge e which is contained in the outer face and face Fe , every tour which does not contain e must
contain all other edges of Fe .
7
3
4.1. TSP(3) on Halin graphs. As indicated earlier, TSP(1) is the same as TSP, which is solvable in linear
time on Halin graphs [9]. TSP(2) can also be solved in linear time by appropriate modifications of the
algorithm of [25] as indicated in [33]. However, for k ≥ 3, such modifications do not seem a viable option.
We now develop a linear time algorithm to solve TSP(3).
Let us start with an alternative formulation of TSP(3). For any subgraph G of H, let P3 (G) be the
collection of all distinct candidate 3-paths in G. For each candidate 3-path (e, f, g) ∈ P3 (H), define
q(e, f, g) = q(e, g) +
q(e, f ) + q(f, g) c(e) + c(f ) + c(g)
+
.
2
3
(4.1)
Now consider the simplified problem:
ST SP (3) :
Minimize
X
q(e, f, g)
(e,f,g)∈P3 (τ )
Subject to
τ ∈ F.
Theorem 4.4. Any optimal solution to the STSP(3) is also optimal solution to TSP(3).
Proof. For any τ ∈ F,
X
q(e, f, g)
(e,f,g)∈P3 (τ )
q(e, f ) + q(f, g) c(e) + c(f ) + c(g)
+
=
q(e, g) +
2
3
(e,f,g)∈P3 (τ )
X
X
=
q(e, f ) +
c(e).
X
(e,f )∈δ(3,τ )
e∈δ(τ )
Thus, the objective function values of STSP(3) and TSP(3) are identical for identical solutions. Since the
family of feasible solutions of both these problems are the same, the result follows.
In view of Theorem 4.4, we restrict our attention to STSP(3).
For TSP(1), Cornuejols et al. [9] identified costs of new edges generated by a fan contraction operation
by solving a linear system of equations. This approach cannot be extended for any k-neighbour TSP for
k ≥ 3 as it leads to an over-determined system of equations which may be infeasible. Instead, we extend the
penalty approach used in Phillips et al. [25]. The idea here is to introduce a node-weighted version of the
problem STSP(3) where we use a penalty function for the nodes of C, the value of which depends on the
edges chosen to enter and exit the node, along with some other ‘candidate’ edges. We iteratively contract
the fans in H, storing the appropriate values of suitable subpaths as we traverse the fans in a recursive
way. Once we reach a wheel, we can compute an optimal tour for the resulting problem. Backtracking by
recovering appropriate subpaths from contracted fans in sequence, an optimal solution can be identified.
To formalize the general idea discussed above, let us first discuss the case where H is a Halin graph which
is not a wheel. In this case, H will have at least two fans.
Let F be an arbitrary fan in H with w as the centre. Label the outer nodes of F in the order they
appear in C, say, u1 , u2 , . . . , ur (r ≥ 2). Let {j, k, l} be the 3-edge cutset ϕ(F ) which disconnects F from H
such that j is adjacent to u1 , k is adjacent to w and l is adjacent to ur . Let j = (u1 , u0 ), k = (w, x) and
l = (ur , ur+1 ). There are exactly two edges not connected to F which are cofacial with k and incident on
x. The first edge which follows k in the clockwise orientation of edges incident on x is denoted α5 , and the
other edge incident on x and cofacial with k is denoted by α6 . (See Figure 9.) There are exactly two edges
not connected to F and incident on u0 . These edges are labelled α1 , α2 . Likewise, there are exactly two
edges not connected to F and incident on ur+1 . These edges are labelled α3 , α4 . (See Figure 9.) Without
loss of generality α1 , α3 are in C and α2 , α4 are in T . It is possible that α2 could be the same as α5 and also
possible that α4 could be the same as α6 .
To complete a fan contraction operation, we consider the 3 types of traversals of F . We define a penalty
function stored at nodes (pseudonodes) of C which contains attributes of a minimum traversal of F of each
type. For any left- or right-traversal of F , there is a single path through F using all cycle edges. Any tour
which includes j and k must pass through one edge of the pair incident on u0 lying outside F together with
edges y1 , . . . , yr−1 , tr , k, α6 . Similarly, any tour which includes k and l must pass through one edge of the
pair incident on ur+1 lying outside F together with edges yr−1 , . . . , y1 , t1 , k, α5 . Any tour which includes j
and l must also pass through one edge in each of the pairs of edges incident on u0 (or ur+1 ) lying outside
8
z
zc
F . That is, every tour τ containing j and l must contain a path containing one collection of edges from the
set {(α1 ,Figure
j, l, α3 ), (α5.
l, α
, j, l, α3 ),
α4 )}. We refer to aedges
centre-traversal
of Fnode
whichx.bypasses
1 , j,A
4 ), (α2graph
2 , j, l, non-consecutive
Halin
H(αwith
e and f at
y1 ∈ F ∩ C as a left path, one which bypasses ys ∈ F ∩ C for some s ∈ [2, r − 2] as a middle path, and one
H − P where P = P ∪ P ∪ {e, f } has two components, hence no τ contains
which bypasses yr−1 ∈ F ∩ C as 1a right2 path.
both edges e and f .
α5
x
α6
k
α2
α1
α4
w
u0
t1
ur+1
tr
j
u1
α3
ur
l
yr−1
y1
Figure9. 6.
A Ffan
F centre
withw.centre
Every jτand
containing
j and
Figure
A fan
with
Every τw.
containing
k contains edges
y1 ,k. . .contains
, yr−1 , tr .
Every
τ
containing
k
and
l
contains
edges
y
,
.
.
.
,
y
,
t
.
Every
τ
containing
j
and
l must
edges y1 , . . . , yr−1 , tr . Every τ containing
k and
, t1 .
1
r−1 l 1contains edges y1 , . . . , yr−1
contain
one
of
the
subpaths
from
the
set
{α
−
j
−
l
−
α
,
α
−
j
−
l
−
α
,
α
−
j
−
l
−
α
1
4
2 from the
3 , αset
2−
Every τ containing j and l must contain
one3 of1 the subpaths
j − l − α4 }.
{α1 − j − l − α3 , α1 − j − l − α4 , α2 − j − l − α3 , α2 − j − l − α4 }.
Let S be the set of nodes (pseudonodes) in C at some iteration in the contraction process. In TSP(3),
quadratic costs are ‘absorbed’ during each fan contraction operation, depending both on the edges in F and
within a distance 2 from F , so care must be taken to retain the proper information. That is, in order to
develop an extension of the penalty approach used in Phillips et al. [25] for TSP(3), we extend the penalty
function stored at the nodes (pseudonodes) in C that depends on an additional parameter ρ, which specifies
the structure of edges around each pseudonode. Note that due to the recursive property of pseudonodes where
a fan contraction operation may ‘absorb’ pseudonodes, the parameter ρ specifies a shape of the structure
rather than explicitly stating the edges surrounding a pseudonode. Further, we define a function β which
stores the penalty values associated with ρ.
3 0), L = (1, 0), R = (0, 1), B = (1, 1)} and A2 be the
Let A1 be the collection of ordered pairs {M = (0,
collection of ordered pairs {(1, 3), (1, 4), (1, 6), (2, 3), (2, 4), (2, 6), (5, 3), (5, 4)}. At each node i ∈ S we define
12
1
2
21 22
2
ρi = (ρ1i , ρ2i ) where ρ1i = (ρ11
i , ρi ) ∈ A and ρi = (ρi , ρi ) ∈ A . ρi indicates which penalty value (to be
defined shortly) stored at pseudonode i is to contribute to the objective function value. The first component
of ρi is a binary vector of length 2 which specifies the inner structure of i (edges y1 , t1 , yr−1 and tr prior
to any fan contractions such that the first component is 0 if y1 is selected, and 1 if t1 is instead, and the
second component is 0 if yr−1 is selected, and 1 if tr is instead), and the second component of ρi , the outer
structure (α1 to α6 prior to any contraction of adjacent pseudonodes). Let ρ be the vector containing ρi for
every i ∈ S. Let ρH/F be the restriction of ρ to the vertices in H/F and augmented by ρvF ∈ {(a, b)}. Let
βi (ρi ) be the penalty that is incurred if ρi occurs at i.
For i ∈ C define:
(
βi (ρi ) if ρi is defined,
Pi (τ, ρi ) =
0
otherwise.
Since the penalties stored at i ∈ S depend on edges which are not incident with i, and the dependent
edges may be ‘absorbed’ into adjacent pseudonodes so that not every ρ is feasible for a given τ . That is, the
inner and outer structures of adjacent pseudonodes in C must agree. Formally, we say that ρ is feasible for
τ if the following conditions are satisfied for every pseudonode i
(1) j, k ∈ τ ⇐⇒ ρ22
i = 6 and
(2) k, l ∈ τ ⇐⇒ ρ21
i = 5,
9
Figure 7. A tour τ in a wheel, which skips edge ci .
ci−1
ci+1
ti+1
ti
w
ui+1
i
and for every pair of consecutive upseudonodes
i, i + 1 ∈ C
(1)
(2)
(3)
(4)
ρ12
i
ρ12
i
ρ22
i
ρ22
i
=1
=0
=3
=4
⇐⇒
⇐⇒
⇐⇒
⇐⇒
ρ21
i+1
ρ21
i+1
ρ11
i+1
ρ11
i+1
= 2,
ci
= 1,
= 0 and
= 1.
ti+1
ti
ci
ui+1
ui
c
ci+1 For an example i−1
Let F 0 be the set of all feasible (τ, ρ) pairs.
of a feasible (τ, ρ) pair, see Figure 10.
Figure 8. Wheel H with center w considered as a fan.
F1
F2
F3
Figure
of Hofwhich
becomes
a fan after
contracting
F1 , F2 and F3F. ,The
Figure10.9. AAsubgraph
subgraph
H which
becomes
a fan
after contracting
1 F2
bold edges depict a centre-traversal of F contained in Hamiltonian cycle τ . Since τ contains
and F3 . The
bold edges depict a centre-traversal of F contained in Hamilton
the edges
t1 and yr−1 (relative to F1 ), the inner structure of vF1 must be (1, 0), and since
cycle
τ
.
A
(τ,
ρ F11 ),=the
((1,
0), (2,
3)), ρvofF2 v=
((0, 1), (1, 3))
τ contains edges ρ)
α2 pair
and αcontaining
outer
structure
3 (relative to vF
F1 must be (2, 3).
and ρis,vF3a =
((0, 0),
6)) is
feasible.
which
correspond
That
feasible
(τ, (2,
ρ) pair
must
contain The
ρvF1 edges
= ((1, 0),
(2, 3)).
Consideringtoallthe
of Finner
1 , F2
and
F
,
every
feasible
(τ,
ρ)
pair
contains
ρ
=
((1,
0),
(2,
3)),
ρ
=
((0,
1),
(1,
3))
and
3
vF2 correspond to the
structure
of ρvF2 are coloured in blue vand
the edges which
F1
ρ
=
((0,
0),
(2,
6)).
The
edges
which
correspond
to
the
inner
structure
of
ρ
are
coloured
vF3
vF2
outer
structure of ρvF2 are coloured in red.
in blue and the edges which
correspond to the outer structure of ρvF2 are coloured in red.
The problem now contains a cost for every triplet of consecutive edges in tour τ and additionally, a penalty
4
at each outer node i. Consider the modified 3-Neighbour
TSP on a Halin graph defined as follows:
M T SP (3) :
Minimize
X
z(τ, ρ) =
(e,f,g)∈P3 (τ )
Subject to
q(e, f, g) +
X
i∈C
Pi (τ, ρi )
(τ, ρ) ∈ F 0 .
The necessary costs to construct MTSP(3) can be obtained as required by applying (4.1) or by first
embedding H in the plane, and evaluating the candidate k-paths from Corollary 4.2. Note that Pv (τ, ρv )
can be computed in O(1) time by storing penalty 24-tuples containing the βv -values described in Table 1, at
each cycle node v. Also note that there may be O(2n ) feasible ρ vectors for a given τ , however, we show that
the optimal (τ, ρ) pair can be found in O(n)-time. It is also important to note that the set of pseudonodes
is retained for reasons which will become apparent.
In the initial graph, and for all ρi , i ∈ C, set βi (ρi ) = 0. For fan F in H, the penalties must be updated
to store the costs of traversing F when F is contracted to pseudonode vF . Let K represent
P the traversal of
F which contains only edges in C. That is, K = j − y1 − · · · − yr−1 − l. Then q(K) = e−f −g∈K q(e, f, g)
represents the cost incurred by selecting the edges in K. Let τ (F ) and ρ(F ) be the restrictions of τ and ρ
to F , respectively.
Assign the minimum cost of the right-traversal (which contains αs , s ∈ {1, 2} and α6 ), with inner structure
of the first pseudonode a ∈ {L = (1, 0), M = (0, 0)} to βvF (a, (s, 6)). That is, assign to βvF (a, (s, 6)) the
sum of the costs along the traversal, q(αs − j − y1 − · · · − yr−1 − tr − k − α6 ), together with the minimum
feasible set of penalties on the outer nodes contained in F , u1 , u2 . . . , ur . Note that for the case that u1 6∈ S,
10
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Penalty
Description
βvF ((0, ∗), (1, 6)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((1, ∗), (1, 6)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((0, ∗), (2, 6)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((1, ∗), (2, 6)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((∗, 0), (5, 3)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((∗, 1), (5, 3)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((∗, 0), (5, 4)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((∗, 1), (5, 4)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((0, 0), (1, 3)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (1, 3)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (1, 3)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (1, 3)) traversal of F with inner structure (1, 1) and outer structure
βvF ((0, 0), (1, 4)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (1, 4)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (1, 4)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (1, 4)) traversal of F with inner structure (1, 1) and outer structure
βvF ((0, 0), (2, 3)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (2, 3)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (2, 3)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (2, 3)) traversal of F with inner structure (1, 1) and outer structure
βvF ((0, 0), (2, 4)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (2, 4)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (2, 4)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (2, 4)) traversal of F with inner structure (1, 1) and outer structure
Table 1. Description of penalty 24-tuple stored at pseudonodes in C.
(1, 6)
(1, 6)
(2, 6)
(2, 6)
(5, 3)
(5, 3)
(5, 4)
(5, 4)
(1, 3)
(1, 3)
(1, 3)
(1, 3)
(1, 4)
(1, 4)
(1, 4)
(1, 4)
(2, 3)
(2, 3)
(2, 3)
(2, 3)
(2, 4)
(2, 4)
(2, 4)
(2, 4)
it is not possible to have an inner structure L or B, and βvF (L, (s, 6)) = βvF (B, (s, 6)) = ∞. Otherwise
( r
)
X
βvF (a, (s, 6)) = q(αs − j − y1 − · · · − yr−1 − tr − k − α6 ) +
min 0
βui (ρui )
(τ (F ),ρ(F ))∈F (F ):
ρ1u =a or B,ρ22
ur =6
i=1
1
= q(αs , j, y1 ) + q(K) − q(yr−2 , yr−1 , l) + q(yr−2 , yr−1 , tr ) + q(yr−1 , tr , k) + q(tr , k, α6 ) (4.2)
( r
)
X
+
min 0
βui (ρui ) .
(τ (F ),ρ(F ))∈F (F ):
ρ1u =a or B,ρ22
ur =6
i=1
1
We will explain how the minimum in (4.2) can be calculated efficiently later in this paper.
Similarly, assign the minimum cost of the left-traversal (which contains αt , t ∈ {3, 4}, and α5 ) with inner
structure a ∈ {M = (0, 0), R = (0, 1)} to βvF (a, (5, t)). In the case that ur 6∈ S, it is not possible to have an
inner structure R or B, and βvF (R, (5, t)) = βvF (B, (5, t)) = ∞. Otherwise
βvF (a, (5, t)) = q(α5 , k, t1 ) + q(k, t1 , y1 ) + q(t1 , y1 , y2 ) + q(K) − q(j, y1 , y2 ) + q(yr−1 , l, αt )
( r
)
X
+
min 0
βui (ρui ) .
(τ (F ),ρ(F ))∈F (F ):
ρ1ur =a or B,ρ21
u =5
(4.3)
i=1
1
Let K(yi ), i ∈ {1, . . . , r − 1}, be the centre-traversal of F which does not contain yi . Then q(K(yi ))
represents the cost incurred by the edges in K(yi ). That is,
q(K(y1 )) = q(K) + q(j, t1 , t2 ) + q(t1 , t2 , y2 ) + q(t2 , y2 , y3 ) − q(j, y1 , y2 ) − q(y1 , y2 , y3 ),
11
q(K(yp )) = q(K) + q(yp−2 , yp−1 , tp ) + q(yp−1 , tp , tp+1 ) + q(tp , tp+1 , yp+1 ) + q(tp+1 , yp+1 , yp+2 )
− q(yp−2 , yp−1 , yp ) − q(yp−1 , yp , yp+1 ) − q(yp , yp+1 , yp+2 ),
for p ∈ {2, . . . , r − 2}, and
q(K(yr−1 )) = q(K) + q(yr−3 , yr−2 , tr−1 ) + q(yr−2 , tr−1 , tr ) + q(tr−1 , tr , l)
− q(yr−3 , yr−2 , yr−1 ) − q(yr−2 , yr−1 , l).
Assign the minimum cost of the centre-traversal which contains αs , s ∈ {1, 2}, and αt , t ∈ {3, 4}, which has
inner structure a ∈ {L = (1, 0), M = (0, 0), R = (0, 1), B = (1, 1)} to βvF (a, (s, t)). In the case that u1 6∈ S
and a = L, there is a single path traversing F with inner structure L, namely, j − t1 − t2 − y2 − · · · − yr−1 − l,
so
( r
)
X
βvF (L, (s, t)) = q(αs , j, t1 ) + q(K(y1 )) + q(yr , l, αt ) +
min 0
βui (ρui ) ,
(4.4)
(τ (F ),ρ(F ))∈F (F ):
22
ρ12
ur =0,ρu2 =6
i=2
and when u1 ∈ S, we assign the cost of the minimum centre-traversal with inner structure L. Note that this
path detours some yg , g ∈ {2, . . . , r − 1}.
( r
)
X
q(αs , j, t1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
.
βui (ρui )
βvF (L, (s, t)) =
min
g∈{2,...,r−1}
(τ (F ),ρ(F ))∈F (F ):
i=1
12
ρ11
u1 =1,ρr =0,
21
22
ρug =5,ρu
g+1
=6
(4.5)
Similarly, when a = R and ur 6∈ S, there is a single path traversing F with inner structure R, namely,
j − y1 − · · · − yr−2 − rr−1 − tr − l so
(r−1
)
X
βvF (R, (s, t)) = q(αs , j, y1 ) + q(K(y1 )) + q(tr , l, αt ) +
min 0
βui (ρui ) ,
(4.6)
(τ (F ),ρ(F ))∈F (F ):
22
ρ11
=6
u =0,ρu
1
i=1
r−1
and when ur 6∈ S, we assign the cost of the minimum centre-traversal with structure R. Note that this path
detours some yg , g ∈ {1, . . . , r − 2}.
( r
)
X
βvF (R, (s, t)) =
q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
βui (ρui )
.
min
g∈{1,...,r−2}
(τ (F ),ρ(F ))∈F (F ):
i=1
11
12
ρu1 =0,ρr =1,
21
22
ρug =5,ρu
g+1
=6
(4.7)
Now consider a = M . If u1 ∈ S, ur ∈ S then βvF (M, (s, t)) is assigned the cost of the minimum path
detouring yg for g ∈ {1, . . . , r − 1}. If u1 (ur ) is not a pseudonode then the centre-traversal must contain y1
(yr−1 ) and 1 (r − 1) is removed from g from the following equation.
(r−1
)
X
βvF (M, (s, t)) =
min
q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
βui (ρui )
.
g∈{1,...,r−1}
(τ (F ),ρ(F ))∈F (F ):
i=1
12
ρ11
u1 =0,ρur =0,
21
22
ρug =5,ρu
g+1
=6
(4.8)
12
Now consider a = B. This is the same as the case where a = M except for the inner structure.
(r−1
)
X
βvF (B, (s, t)) =
min
q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
βui (ρui )
.
g∈{1,...,r−1}
(τ (F ),ρ(F ))∈F (F ):
i=1
11
12
ρu1 =1,ρur =1,
21
22
ρug =5,ρu
g+1
=6
(4.9)
All βvF which have not been assigned are not associated with a feasible ρvF and are assigned a value ∞.
Theorem 4.5. Suppose H = T ∪ C is a Halin graph which is not a wheel and F is a fan in H. If (τ ∗ , ρ∗ )
is an optimal tour pair in H then there exists a feasible ρ∗H/F in H/F such that (τ ∗ /F, ρ∗H/F ) is optimal in
H/F and z(τ ∗ , ρ∗ ) = z(τ ∗ /F, ρ∗H/F ).
Proof. Let S be the set of pseudonodes in H. Let vF be the pseudonode which results from the contraction
of F , and label the vertices and edges of F as in Figure 9. Given (τ ∗ , ρ∗ ), we construct (τ ∗ /F, ρ∗H/F ) as
follows. Let ρ∗H/F,i = ρ∗i ∀i 6∈ F and ρ∗H/F,vF corresponding to the structure of (τ ∗ , ρ∗ ) around F in H. That
is, τ contains an αi , αj path through F in H, so let
ρ∗H/F,vF = ((a, b), (c, d))
where
(
0
a=
1
if (u1 6∈ S and y1 ∈ τ ∗ ) or (u1 ∈ S and ρ∗11
u1 = 0)
∗
if (u1 ∈
6 S and y1 6∈ τ ) or (u1 ∈ S and ρ∗11
u1 = 1),
(
if (ur 6∈ S and yr−1 ∈ τ ∗ ) or (ur ∈ S and ρ∗12
u1 = 0)
∗
∗12
if (ur ∈
6 S and yr−1 6∈ τ ) or (ur ∈ S and ρu1 = 1),
b=
0
1
1
c= 2
5
if (u1 6∈ S and α1 ∈ τ ∗ ) or (u1 ∈ S and ρ∗21
u0 = 1)
∗
if (u1 ∈
6 S and α2 ∈ τ ) or (u1 ∈ S and ρ∗21
u0 = 2)
if (u1 ∈
6 S and α5 ∈ τ ∗ ) or (u1 ∈ S and ρ∗21
u0 = 5),
3
d= 4
6
if (ur 6∈ S and tr 6∈ τ ∗ ) or (ur ∈ S and ρ∗22
ur = 3)
∗
if (ur ∈
6 S and tr ∈ τ ) or (ur ∈ S and ρ∗22
ur = 4)
∗
∗22
if (ur ∈
6 S and tr ∈ τ ) or (ur ∈ S and ρur = 6).
and
Then (τ ∗ /F, ρ∗H/F,vF ) is feasible in H/F .
Using equations (4.2)-(4.9) and noting that all new triples which contain vF have q(e, f, g) = 0, we get
X
X
z(τ ∗ , ρ∗ ) =
q(e, f, g) +
Pi (τ ∗ , ρ∗i )
(e,f,g)∈P3 (τ ∗ )
=
X
=
X
X
q(e, f, g) +
(e,f,g)∈
P3 (τ ∗ −F )
=
i∈C
(e,f,g)∈
P3 (τ ∗ )\P3 (τ ∗ −F )
q(e, f, g) +
(e,f,g)∈
P3 (τ ∗ /F −vF )
z(τ ∗ /F, ρ∗H/F ).
X
X
q(e, f, g) +
i∈C\F
βi (ρ∗i ) +
X
βi (ρ∗i )
i∈F
βi (ρ∗i ) + βvF (ρvF )
i∈C\F
It remains to show that (τ ∗ /F, ρ∗H/F ) is optimal in H/F . Towards a contradiction, suppose there exists
a tour pair (τ 0 /F, ρ0H/F ) 6= (τ ∗ /F, ρ∗H/F ) such that z(τ 0 /F, ρ0H/F ) < z(τ ∗ /F, ρ∗H/F ). The calculations of the
minimums in equations (4.2)-(4.9) imply that τ 0 /F 6= τ ∗ /F . Using equations (4.2)-(4.9), we can expand F ,
extending (τ 0 /F, ρ0H/F ) to (τ 00 , ρ00 ) in H with z(τ 0 /F, ρ0H/F ) = z(τ 00 , ρ00 ). Then z(τ 00 , ρ00 ) = z(τ 0 /F, ρ0H/F ) <
13
z(τ ∗ /F, ρ∗H/F ) = z(τ ∗ , ρ∗ ), contradicting the optimality of (τ ∗ , ρ∗ ). Hence (τ ∗ /F, ρ∗H/F ) is optimal in H/F .
We now show that βvF can be updated in O(|F |)-time, by introducing a structure which allows to optimally
chain together the β-values for consecutive nodes in F ∩ C. Refer to the subgraph induced by the nodes
{w} ∪ {ua , ua+1 , . . . , ub } as pseudo-fan P Fa,b for (1 ≤ a ≤ b ≤ r). Define the minimum penalty associated
with pseudo-fan P Fa,b to be P Fa,b (c, d) for a, b ∈ {1, . . . , r} with inner structure c ∈ {0, 1}2 and outer
structure d = (d1 , d2 ) ∈ {(1, 3), (1, 4), (2, 3), (2, 4)}. Note that the inner structure of pseudo-fan P Fa,b refers
to the edges y1 , t1 and yr−1 , tr within fans Fa and Fb (which are contracted to pseudonodes ua and ub ),
respectively. The outer structure refers to the edges α1 , α2 and α3 , α4 with respect to fans Fa and Fb , if ua
and ub are considered as pseudonodes.
To compute P Fa,b (c, d) we use the following recursion which chains together the minimum β-values
through consecutive nodes in C while maintaining feasibility of ρ.
For c1 , c2 ∈ {0, 1}, d1 ∈ {1, 2} and d2 ∈ {3, 4}, and 1 ≤ i ≤ r − 1
P F1,1 ((c1 , c2 ), (d1 , d2 )) = βu1 ((c1 , c2 ), (d1 , d2 ))
(4.10)
P Fr,r ((c1 , c2 ), (d1 , d2 )) = βur ((c1 , c2 ), (d1 , d2 ))
(4.11)
P F1,i+1 ((c1 , c2 ), (d1 , d2 )) =
min
{P F1,i ((c1 , s), (d1 , t)) + βui+1 ((t − 3, c2 ), (s + 1, d2 ))}
(4.12)
min
{βui−1 ((c1 , t − 1), (d1 , s + 3)) + P Fi,r ((s, c2 ), (t, d2 ))}
(4.13)
s∈{0,1},t∈{3,4}
and
P Fi−1,r ((c1 , c2 ), (d1 , d2 )) =
s∈{0,1},t∈{1,2}
To prove that the recursions defined by (4.10)-(4.13) are correct, first consider the optimal
P F1,i+1 ((c1 , c2 ), (d1 , d2 )). The minimum feasible assignment of penalties for the nodes within pseudo-fan
P F1,i+1 is simply the minimum among optimal assignments of penalties for the nodes within pseudo-fan
P F1,i and the penalty at pseudonode ui+1 , such that these penalties are feasible. That is, the outer
structure of P F1,i must match the inner structure of ui+1 and vice-versa. By definition, this is precisely
min
P F1,i ((c1 , s), (d1 , t)) + βui+1 ((t − 3, c2 ), (s + 1, d2 )). An analogous argument holds for
s∈{0,1},t∈{3,4}
P Fi−1,r ((c1 , c2 ), (d1 , d2 )).
It is now possible to compute the minimum traversals of F used in equations (4.2)-(4.9). For example,
middle paths through F have a cost which minimizes the sum of the penalties on P F1,i−1 + βi and βi+1 +
P Fi+2,r , such that both pairs are feasible. Note that the minimum ρ(F ) has been found while performing
the recursion defined by equations (4.10)-(4.13). In the worst case, when all outer nodes in F belong to
S, we must compute P F1,1 , . . . , P F1,r−1 and P Fr,r , . . . , P F2,r , which can be done in O(|F |)-time. By precomputing these, one can evaluate the minimum traversals of F used in equations (4.2)-(4.9), in O(|F |)-time
and hence one can update βvF in O(|F |)-time.
We iteratively perform the fan contraction operation, updating costs and penalties until we are left with
a wheel. The optimal tour in H skirts the cycle C and detours exactly once through centre w, skipping
exactly one edge of C. Orient the cycle C in the clockwise direction. τ contains all edges in C except for the
skipped edge, say ci = (ui , ui+1 ), together with the two edges which detour around ci . Define function φ(ci )
for each edge ci = (ui , ui+1 ) ∈ E(C). Let ti and ti+1 be the tree edges adjacent to ui and ui+1 , respectively.
We will define
φ(ci )
=
q(ci−2 , ci−1 , ti ) + q(ci−1 , ti , ti+1 ) + q(ti , ti+1 , ci+1 )
+q(ti+1 , ci+1 , ci+2 ) − q(ci−2 , ci−1 , ci ) − q(ci−1 , ci , ci+1 )
−q(ci , ci+1 , ci+2 ).
Then, the optimal tour pair has
X
z(τ ∗ , ρ∗ ) = q(C) + min φ(ci ) + min
βuj (ρuj ) .
i:ci ∈C
feasible ρ
uj ∈C
Suppose that we fix an edge ci in τ . Then H can be considered to be a fan as shown in Figure 12.
14
ci
ui
ci−1
ti
ci−2
ui
ci−1
ci+1
ti+1
ci
w
ti
ci−2
ui+1
ui+1
ci+2
ci+1
ti+1
ci+2
w
Figure
wheel,which
which
skips
Figure7.
11.AAtour
tour ττ in
in aa wheel,
skips
edgeedge
ci . ci .
ci−1
ci+1
ti+1
ti
w
Figure
ui
7.
ci−1
ui+1 edge c .
A tour τ in a wheel, which skips
i
ti+1
ti
ci
ci
ci+1
ti+1
ti u
u
i+1
ui
w
i
ci−1
ci+1
ui+1
t
Figure 8. Wheel i+1
H with center twi considered as a fan.
ci
ci
ui+1
ui
ci−1
ci+1
Figure 8. Wheel H with center w considered as a fan.
Figure 12. Wheel H with centre w considered as a fan. Note that edge ci is fixed and the
fan ‘wraps’ around the wheel, reusing edges ci−1 , ci , ci+1 , ti−1 , ti and ti+1 .
F1
F2
F3
Figure 9. A subgraph of H which becomes a fan after contracting F1 , F2
and F3 . The bold edges depict a centre-traversal of F contained in Hamilton
cycle τ . A (τ, ρ) pair containing ρvF1 = ((1, 0), (2, 3)), ρvF2 = ((0, 1), (1, 3))
and ρvF3 = ((0, 0), (2, 6)) is feasible. The edges which correspond to the inner
F1
F2
F3
structure of ρvF2 are coloured
in blue
and the edges
which correspond to the
outer structure
of ρvF2 are
red.
Figure
9. A subgraph
of coloured
H whichinbecomes
a fan after contracting F , F
Fix edge cr in τ and consider H to be a fan Fcr . Then the minimum tour in H can be determined
by
1
2
calculating
theFminimum
of theedges
minimum
centre-traversal
of Fcr and
which bypasses
cr (using, say,
and
depict
a centre-traversal
ofthe
F tour
contained
in Hamilton
3 . The bold
fan Fc1 ). cycle
This can
in O(r)-time
using
technique
above.
τ . be
A computed
(τ, ρ) pair
containing
ρvFthe
=pseudofan
((1, 0), (2,
3)), ρvdescribed
= ((0,
1), (1, 3))
F2
1
The preceeding discussion yields the following algorithm.
and ρvF3 = ((0, 0), (2, 6)) is feasible. The edges which correspond to the inner
15
4
structure of ρvF2 are coloured in blue and
the edges which correspond to the
outer structure of ρvF2 are coloured in red.
Algorithm 1 HalinTSP(3)(H, q, β)
Input: Halin graph H, quadratic cost function q, and penalty function β
if H is a wheel then
Use the wheel procedure to find an optimal tour τ in H
else
Let F be a fan in H
Contract F to a single node vF , using the Case 1 procedure. That is, assign penalties β to vF , assign
costs of 0 to all triples in H/F and assign costs of q to all remaining triples which are 3-neighbours in
H.
HalinTSP(3)(H/F , q, β)
end if
Expand all pseudonodes in reverse order and update τ
return τ
Each time that a fan is contracted, the number of tree nodes is reduced by 1, and hence the fan contraction
operation is performed one less than the number of non-leaf nodes in H. The fan contraction operation can
be performed in O(|F |)-time, and each time it is performed, the number of nodes in H is reduced by |F | − 1.
Since the wheel procedure takes O(n)-time, the total time for the algorithm is O(n).
4.2. TSP(k). We now show that the previous ideas can be extended to solve TSP(k). For any subgraph
G of H, let Pk (G) be the collection of all distinct candidate k-paths in G. For each candidate k-path
(e1 , e2 , . . . ek ) ∈ Pk (H), define
q(e1 , ek−1 ) + q(e2 , ek ) q(e1 , ek−2 ) + q(e2 , ek−1 ) + q(e3 , ek )
+
2
3
c(e1 ) + c(e2 ) + . . . + c(ek )
+ ... +
.
k
Now consider the simplified problem:
X
ST SP (k) : Minimize
q(e1 , e2 , . . . , ek )
q(e1 , e2 , . . . , ek ) =q(e1 , ek ) +
(4.14)
(e1 ,e2 ,...,ek )∈Pk (τ )
Subject to
τ ∈ F.
Theorem 4.6. Any optimal solution to the STSP(k) is also optimal for TSP(k).
Proof. Using equation (4.14), the proof of this follows along the same way as that of Theorem 4.4 and hence
is omitted.
As a result of Corollary 4.2, the preceding algorithm can be extended to solve TSP(k) by extending the
penalty functions at outer nodes to accommodate subpaths of length 2d(k+1)/2e .
A complete description of these varies as the information that needs to be stored is more involved and
is hence omitted. Some details however will be available in [32]. The complexity increases by a factor of
(2d(k+1)/2e ), which is constant for fixed k and polynomially bounded when k = t log n.
5. TSP(k) on fully reducible graph classes
We say that a class C of 3-connected graphs is fully reducible if it satisfies the following:
(1) If G ∈ C has a 3-edge cutset which partitions G into components S and S̄, then both G/S and G/S̄
are in C and we call G a reducible graph in C; and
(2) TSP can be solved in polynomial time for the graphs in C that do not have non-trivial 3-edge cutsets,
i.e. 3-edge cutsets that leave both components Hamiltonian. We call such graphs irreducible.
For instance, Halin graphs can be understood as graphs built up from irreducible fans connected to the
remainder of the graph via 3-edge cutsets. Cornuejols et al. [10] show that the ability to solve TSP in
polynomial time on irreducible graphs in C allows to solve TSP in polynomial time on all of C using facts
about the TSP polyhedron.
16
We remark that the algorithm of Section 4 can be used to show a somewhat similar statement for TSP(k).
Here we consider a graph class C that is fully k-reducible in the sense that either it can be subdivided
into irreducible graphs via 3-edge cutsets, or it is irreducible and it is possible to solve the k-neighbour
Hamiltonian path problem in polynomial time.
This requires solving the following problem:
X
X
M T SP (k) : Minimize
q(e1 , . . . , ek ) +
Pi (τ )
(e1 ,...,ek )∈Pk (τ )
Subject to
i∈V
τ ∈F
where Pi (τ ) is a penalty function for the pseudonode which depends on how tour τ traverses i, analogous to
the construction for the 3-neighbour TSP of section 4.
We recursively perform the contraction operation on the irreducible subgraphs of G, storing the necessary
tour information in the penalty at the resulting pseudonode. A similar result to Corollary 4.2 may be derived
to show that for any fixed k, this requires a polynomial number of penalties. The least cost traversals of S
can be computed in polynomial time using a generalization of the pseudo-fan strategy above.
Suppose the contraction operation is performed on a subgraph of size r in time O(P (r)), where P (r) is
a polynomial in r. Each time this operation is performed, the number of nodes in the graph is reduced by
r. This operation is performed at most n times and it follows that the entire algorithm can be performed in
polynomial time.
6. Conclusions
In this paper, we have shown that QTSP is NP-hard even when the costs are restricted to taking 0-1 values
on Halin graphs. We have presented a polynomial time algorithm to solve a restriction of QTSP, denoted
TSP(k) on any fully k-reducible graph for any fixed k. To illustrate this, we have given an algorithm which
solves TSP(3) on a Halin graph in O(n) time.
The k-neighbour bottleneck TSP on a Halin graph can be solved by solving O(log(n)) problems of the
type TSP(k). However, it is possible to solve the problem faster. Details will be reported elsewhere.
We would also like to thank Ante Ćustić for his useful comments.
References
[1] A. Aggarwal, D. Coppersmith, S. Khanna, R. Motwani, and B. Schieber. The angular-metric traveling salesman problem.
SIAM Journal on Computing, 29:697–711, 2000.
[2] D. Applegate, R. Bixby, V. Chvatal, and W. Cook. The traveling salesman problem: a computational study. Princeton
University Press, 2011.
[3] E. Arkin, Y. Chiang, J. Mitchell, S. Skiena, and T. Yang. On the maximum scatter traveling salesperson problem. SIAM
Journal on Computing, 29:515–544, 1999.
[4] E. Balas, R. Carr, M. Fischetti, and N. Simonetti. New facets of the STS polytope generated from known facets of the
ATS polytope. Discrete Optimization, 3:3–19, 2006.
[5] E. Balas, M. Fischetti, and W. Pulleyblank. The precedence-constrained asymmetric traveling salesman polytope. Mathematical Programming, 68:241–265, 1995.
[6] H. Bodlaender. Dynamic programming on graphs with bounded treewidth. In Automata, languages and programming
(Tampere, 1988),Lecture Notes in Comput. Sci., 317:105–118. Springer, Berlin, 1988.
[7] W. Chin and S. Ntafos. Optimum watchman routes. In Proceedings of the Second Annual Symposium on Computational
Geometry, 24–33. ACM, 1986.
[8] W. Cook. In pursuit of the traveling salesman: mathematics at the limits of computation. Princeton University Press,
2012.
[9] G. Cornuéjols, D. Naddef, and W. Pulleyblank. Halin graphs and the travelling salesman problem. Mathematical Programming, 26:287–294, 1983.
[10] G. Cornuéjols, D. Naddef, and W. Pulleyblank. The traveling salesman problem in graphs with 3-edge cutsets. Journal of
ACM, 32:383–410, April 1985.
[11] B. Courcelle. The monadic second-order logic of graphs. I. Recognizable sets of finite graphs. Inform. and Comput., 85:12–
75, 1990.
[12] F. Della Croce, V. Paschos, and R. Calvo. Approximating the 2-peripatetic salesman problem. In Proc. Workshop on
Modelling and Algorithms for Planning and Scheduling Problems, MAPSP, 114–116, 2005.
[13] O. Ergun and J. Orlin. A dynamic programming methodology in very large scale neighborhood search applied to the
traveling salesman problem. Discrete Optimization, 3:78–85, 2006. The Traveling Salesman Problem.
17
[14] A. Fischer. An analysis of the asymmetric quadratic traveling salesman polytope. SIAM Journal on Discrete Mathematics,
28:240–276, 2014.
[15] A. Fischer and F. Fischer. An extended approach for lifting clique tree inequalities. Journal of Combinatorial Optimization,
30:489–519, 2015.
[16] A. Fischer, F. Fischer, G. Jäger, J. Keilwagen, P. Molitor, and I. Grosse. Exact algorithms and heuristics for the quadratic
traveling salesman problem with an application in bioinformatics. Discrete Applied Mathematics, 166:97–114, 2014.
[17] A. Fischer and C. Helmberg. The symmetric quadratic traveling salesman problem. Mathematical Programming, 142:205–
254, 2013.
[18] G. Gutin and A. Punnen, editors. The traveling salesman problem and its variations, volume 12 of Combinatorial Optimization. Springer New York, 2002.
[19] G. Jäger and P. Molitor. Algorithms and experimental study for the traveling salesman problem of second order. In B.
Yang, D. Du, and C. Wang, editors, Combinatorial Optimization and Applications, Lecture Notes in Computer Science,
5165:211–224. Springer Berlin, 2008.
[20] J. Krarup and I. Spadille. The peripatetic salesman and some related unsolved problems. Combinatorial programming:
methods and applications: proceedings of the NATO Advanced Study Institute held at the Palais des Congrès, Versailles,
France, 2-13 September 1974, 173, 1975.
[21] J. LaRusic and A. Punnen. The asymmetric bottleneck traveling salesman problem: algorithms, complexity and empirical
analysis. Computers & Operations Research, 43:20–35, 2014.
[22] J. LaRusic, A. Punnen, and E. Aubanel. Experimental analysis of heuristics for the bottleneck traveling salesman problem.
Journal of heuristics, 18:473–503, 2012.
[23] E. Lawler, J. Lenstra, A. Kan, and D. Shmoys. The Traveling Salesman Problem: a guided tour of combinatorial optimization, volume 3. Wiley New York, 1985.
[24] D. Lou. An algorithm to find the optimal matching in Halin graphs. IAENG International Journal of Computer Science,
34:220–226, 2007.
[25] J. Phillips, A. Punnen, and S. Kabadi. A linear algorithm for the bottleneck traveling salesman problem on a Halin graph.
Information Processing Letters, 67:105–110, 1998.
[26] A. Oswin, A. Fischer, F. Fischer, F. Meier, U. Pferschy, A. Pilz, and R. Staněk Minimization and maximization versions
of the quadratic travelling salesman problem. Optimization, 66:521–546, 2017.
[27] G. Reinelt. The traveling salesman: computational solutions for TSP applications. Springer-Verlag, 1994.
[28] B. Rostami, F. Malucelli, P. Belotti and S. Gualandi. Quadratic TSP: A lower bounding procedure and a column generation
approach Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on, 377-384, September 2013.
[29] B. Rostami, F. Malucelli, P. Belotti, and S. Gualandi. Lower bounding procedure for the asymmetric quadratic traveling
salesman problem. European Journal of Operational Research, 253:584–592, 2016.
[30] R. Staněk, Problems on tours and trees in combinatorial optimization, PhD Thesis, Graz University of Technology, 2016.
[31] B. Woods. Generalized travelling salesman problems on Halin graphs. Master’s thesis, Simon Fraser University, Canada,
2010.
[32] B. Woods. The quadratic travelling salesman problem: complexity, approximations, and exponential neighbourhoods. PhD.
thesis In preparation, Simon Fraser University, Canada.
[33] B. Woods and A. Punnen. The quadratic travelling salesman problem on Halin graphs. Working paper, Simon Fraser
University, Canada, 2016.
(SFU) Department of Mathematics, Simon Fraser University, 250-13450 102 Avenue, Surrey, British Columbia,
V3T 0A3, Canada
18
| 8cs.DS
|
arXiv:1708.03981v1 [cs.SY] 14 Aug 2017
PSSE Redux: Convex Relaxation, Decentralized,
Robust, and Dynamic Approaches
Vassilis Kekatos, Gang Wang, Hao Zhu, and Georgios B. Giannakis
∗
August 15, 2017
1
Introduction
With the advent of digital computers, power system engineers in the 1960s
tried computing the voltages at critical buses based on readings from current and potential transformers. Local personnel manually collected these
readings and forwarded them by phone to a control center. Nevertheless,
due to timing, modeling, and instrumentation inaccuracies, the power flow
equations were always infeasible. In a seminal contribution [61], the statistical foundations were laid for a multitude of grid monitoring tasks, including
topology detection, static state estimation, exact and linearized models, bad
data analysis, centralized and decentralized implementations, as well as dynamic state tracking. Since then, different chapters, books, and review articles have nicely outlined the progress in the area; see for example [74, 55, 1].
The revolutionary monitoring capabilities enabled by synchrophasor units
have been put forth in [58].
This chapter aspires to glean some of the recent advances in power system state estimation (PSSE), though our collection is not exhaustive by
any means. The Cramér-Rao bound, a lower bound on the (co)variance
∗
V. Kekatos is with the Bradley Department of Electrical and Computer Engineering,
Virginia Tech, Blacksburg, VA 24061, USA. G. Wang is with the Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455, USA,
and also with the State Key Lab of Intelligent Control and Decision of Complex Systems, Beijing Institute of Technology, Beijing 100081, P. R. China. H. Zhu is with the
Department of Electrical and Computer Engineering, University of Illinois, Urbana, IL
61801. G. B. Giannakis is with the Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455, USA. E-mails: kekatos@vt.edu;
{gangwang, georgios}@umn.edu; haozhu@illinois.edu.
1
of any unbiased estimator, is first derived for the PSSE setup. After reviewing the classical Gauss-Newton iterations, contemporary PSSE solvers
leveraging relaxations to convex programs and successive convex approximations are explored. A disciplined paradigm for distributed and decentralized
schemes is subsequently exemplified under linear(ized) and exact grid models. Novel bad data processing models and fresh perspectives linking critical
measurements to cyber-attacks on the state estimator are presented. Finally, spurred by advances in online convex optimization, model-free and
model-based state trackers are reviewed.
Notation: Lower- (upper-) case boldface letters denote column vectors (matrices), and calligraphic letters stand for sets. Vectors 0, 1, and
en denote respectively the all-zero, all-one, and the n-th canonical vectors
of suitable dimensions. The conjugate of a complex-valued object (scalar,
vector or matrix) x is √
denoted by x∗ ; <{x} and ={x} are its real and imaginary parts, and j := −1. Superscripts T and H stand for transpose and
conjugate-transpose, respectively, while Tr(X) is the trace of matrix X. A
diagonal matrix having vector x on its main diagonal is denoted by dg(x);
whereas, the vector of diagonal entries of X is dg(X). The range space of X
is denoted by range(X); and its null space (kernel) by null(X). The notation
N (µ, Σ) represents the Gaussian distribution with mean µ and covariance
matrix Σ.
2
Power Grid Modeling
This section introduces notation and briefly reviews the power flow equations; for detailed exposition see e.g., [1], [19] and references therein. A
power system can be represented by the graph G = (B, L), where the node
set B comprises its Nb buses, and the edge set L its Nl transmission lines.
Given the focus on alternating current (AC) power systems, steady-state
voltages and currents are represented by their single-phase equivalent phasors per unit.
A transmission line (n, k) ∈ L running across buses n, k ∈ B is modeled
by its total series admittance ynk = gnk + jbnk , and total shunt susceptance
jbsnk . If Vn is the complex voltage at bus n, the current Ink flowing from
bus m to bus n over line (m, n) is
Ink = (ynk + jbsnk /2)Vn − ynk Vn .
(1)
The current Inm coming from the other end of the line can be expressed
symmetrically. That is not the case if the two buses are connected via a
2
transformer with complex ratio ρnk followed by a line, where
ynk + jbsnk /2
ynk
Vn − ∗ Vn
2
|ρnk |
ρnk
ynk
= (ynk + jbsnk /2)Vn −
Vn .
ρnk
Ink =
(2a)
Inm
(2b)
Kirchhoff’s
current law dictates that the current injected into bus n is
P
In = n∈Bn Ink , where Bn denotes the set of buses directly connected to
bus n. If vector i ∈ CNb collects all nodal currents, and v ∈ CNb all nodal
voltages, the two vectors are linearly related through the bus admittance
matrix Y = G + jB as
i = Yv.
(3)
Similar to (3), line currents can be stacked in the 2Nl -dimensional vector if ,
and expressed as a linear function of nodal voltages
if = Yf v
(4)
for some properly defined 2Nl × Nb complex matrix Yf [cf. (1)–(2)].
The complex power injected into bus n will be denoted by Sn := Pn +
jQn . Since by definition Sn = Vn In∗ , the vector of complex power injections
s = p + jq can be expressed as
s = dg(v)i∗ = dg(v)Y∗ v∗ .
(5)
∗ .
The power flowing from bus n to bus n over line (m, n) is Snk = Vn Ink
jθ
If voltages are expressed in polar form Vn = Vn e n , the power flow
equations in (5) per real and imaginary entry can be written as
Nb
X
Pn =
n=1
Nb
X
Qn =
Vn Vn [Gnk cos(θn − θn ) + Bnk sin(θn − θn )]
(6a)
Vn Vn [Gnk sin(θn − θn ) − Bnk cos(θn − θn )] .
(6b)
n=1
Since power injections are invariant if voltages are shifted by a common
angle, the voltage phase is arbitrarily set to zero at a particular bus called
the reference bus.
Alternatively to (6), if voltages are expressed in rectangular coordinates
Vn = Vr,m + jVi,m , power injections are quadratically related to voltages
Pn = Vr,m
Nb
X
(Vr,n Gnk − Vi,n Bnk ) + Vi,m
n=1
Nb
X
(Vi,n Gnk + Vr,n Bnk )
n=1
3
(7a)
Qn = Vi,m
Nb
X
(Vr,n Gnk − Vi,n Bnk ) − Vr,m
Nb
X
(Vi,n Gnk + Vr,n Bnk ).
(7b)
n=1
n=1
To compactly express (7), observe that Sn∗ = Vn∗ In = (vH en )(eTn i) =
vH en eTn Yv from which it readily follows that
Pn = vH HPn v
(8a)
Qn = vH HQn v
(8b)
where the involved matrices are defined as
1
en eTn Y + YH en eTn
2
1
en eTn Y − YH en eTn .
:=
2j
HPn :=
(9a)
HQn
(9b)
Similar expressions hold for the squared voltage magnitude at bus n:
Vn2 = vH HVn v, where HVn := en eTn .
(10)
Realizing that a line current can also be provided as Ink = eTnk if , the
∗ = V ∗I
power flow on line (n, k) as seen from bus n is expressed as Snk
n nk =
H
T
H
T
(v en )(enk if ) = v en enk Yf v, from which it follows that
Pnk = vH HPnk v
H
Qnk = v HQnk v
(11a)
(11b)
where HPnk and HQnk are defined by substituting eTn Y and YH en by eTnk Yf
and YfH enk in (9), accordingly.
Equations (8), (10) and (11) explain how power injections, flows, and
squared voltage magnitudes are quadratic functions of voltage phasors as
described by vH Hm v for certain complex Nb × Nb matrices Hm . Regardless
if Y and/or Yf are symmetric or Hermitian, Hm are Hermitian by definition.
T = <{H }, and
This means that Hm = HH
m
m , or equivalently, <{Hm }
={Hm }T = −={Hm }. It can be easily verified that the quadratic functions
can be expressed in terms of real-valued quantities as
vH Hm v = v̄T H̄m v̄
(12)
for the expanded real-valued voltage vector v̄ := [<{v}T ={v}T ]T , and the
real-valued counterpart of Hm , namely
<{Hm } −={Hm }
H̄m :=
.
(13)
={Hm } <{Hm }
4
3
Problem Statement
It was seen in Section 2 that given grid parameters collected in Y and Yf , all
power system quantities can be expressed in terms of the voltage vector v,
which justifies its term as the system state. Meters installed across the grid
measure electric quantities, and forward their readings via remote terminal
units to a control center for grid monitoring. Due to lack of synchronization,
conventional meters cannot utilize the angle information of phasorial quantities. For this reason, legacy measurements involve phaseless power injections and flows along with voltage and current magnitudes at specific buses.
The advent of the global positioning system (GPS) facilitated a precise timing signal across large geographical areas, thus enabling the revolutionary
technology of synchrophasors or phasor measurement units (PMUs) [58].
Recovering bus voltages given network parameters and the available measurements constitutes the critical task of power system state estimation.
This section formally states the problem, provides the Cramér-Rao bound
on the variance of any unbiased estimator, and reviews the Gauss-Newton
iterations. Solvers based on semidefinite relaxation and successive convex
approximations are subsequently explicated, and the section is wrapped up
with issues germane to PMUs.
3.1
Weighted Least-Squares Formulation
Consider M real-valued measurements {zm }M
m=1 related to the complex
power system state v through the model
zm = hm (v) + m
(14)
where hm (v) : CNb → R is a (non)-linear function of v, and m captures
the measurement noise and modeling inaccuracies. Collecting measurements
and noise terms in vectors z and accordingly, the vector form of (14) reads
z = h(v) +
(15)
for the mapping h : CNb → RM . Model (15) is instantiated for different
types of measurements next.
Traditionally, the system state v is expressed in polar coordinates, namely
nodal voltage magnitudes and angles. Then h(v) maps the 2Nb -dimensional
state vector to SCADA measurements through the nonlinear equations (6).
Expressing the states in polar form has been employed primarily due to two
reasons. First, the Jacobian matrix of h(v) is amenable to approximations.
5
Secondly, voltage magnitude measurements are directly related to states.
Nevertheless, due to recent computational reformulations, most of our exposition models voltages in the rectangular form. Then, as detailed in (12),
the m-th SCADA measurement zm involves the quadratic function of the
state hm (v) = vH Hm v for a Hermitian matrix Hm .
Expressing voltages in rectangular coordinates is computationally advantageous when it comes to synchrophasors too. As evidenced by (3)–(4),
PMU measurements feature linear mappings hm (v). If PMU measurements
are expressed in rectangular coordinates, the model in (14) simplifies to
z = Hv +
(16)
for an M × Nb complex matrix H, and complex-valued noise . Following
the notation of (12)–(13), the linear measurement model of (16) can be
expressed in terms of real-valued quantities as
z̄ = (H∗ )v̄ + ¯.
(17)
The random noise vector in (15) is usually assumed independent of
h(v), zero-mean and circularly symmetric, that is E[H ] = Σ and E[T ] =
0. The last assumption holds if for example the real and imaginary components of are independent and have identical covariance matrices. This is
true for a PMU measurement, where the actual state lies at the center of a
spherically-shaped noise cloud on the complex plane.
Moreover, the entries of are oftentimes assumed uncorrelated yielding
2 }) with σ 2 being the variance of the
a diagonal covariance Σ = dg({σm
m
m-th entry m . However, that may not always be the case. For example,
active and reactive powers at the same grid location are derived as products
between the readings of a current transformer and a potential transformer.
Further, noise terms may be correlated between the real and imaginary parts
of the same phasor in a PMU.
Adopting the weighted least-squares (WLS) criterion, power system state
estimation can be formulated as
minimize kΣ−1/2
(z − h(v))k22
v∈CNb
(18)
−1/2
where Σ
is the matrix square root of the inverse noise covariance matrix.
If the noise is independent across measurements, then (18) simplifies to
M
X
(zm − hm (v))2
minimize
.
2
v
σm
m=1
6
(19)
Either way, the PSSE task boils down to a (non)-linear least-squares (LS) fit.
When the mapping h(v) is linear or when the entries of are uncorrelated,
the measurement model in (15) can be prewhitened. For example, the linear
measurement model z = Hv + can be equivalently transformed to
Σ−1/2
z = (Σ−1/2 H)v + Σ−1/2
(20)
−1/2
so that the associated noise Σ
is now uncorrelated. To ease the presentation, the noise covariance will be henceforth assumed Σ = IM , yielding
v̂ := arg min
v
M
X
(zm − hm (v))2 .
(21)
m=1
For Gaussian measurement noise ∼ N (0, IM ), the minimizer of (21) coincides with the maximum likelihood estimate (MLE) of v [29].
3.2
Cramér-Rao Lower Bound Analysis
According to standard results in estimation theory [29], the variance of
any unbiased estimator is lower bounded by the Cramér-Rao lower bound
(CRLB). Appreciating its importance as a performance benchmark across
different estimators, the ensuing result shown in the Appendix derives the
CRLB for any unbiased power system state estimator based on the so-termed
Wirtinger’s calculus for complex analysis [41].
Proposition 1. Consider estimating the unknown state vector v ∈ CNb
from the noisy SCADA data {zm }M
m=1 of (15), where the Gaussian measurement error m is independent across meters with mean zero and variance
2 . The covariance matrix of any unbiased estimator v̂ satisfies
σm
Cov(v̂) [F† (v, v∗ )]1:Nb ,1:Nb
(22)
where the Fisher information matrix (FIM) is given as
" PM
#
PM
1
1
H
∗ ∗ H
2 (Hm v)(Hm v)
2 (Hm v)(Hm v )
m=1 σm
m=1 σm
∗
PM
F(v, v )= PM
.
1
1
∗ ∗
H
∗ ∗
∗ ∗ H
2 (Hm v )(Hm v)
2 (Hm v )(Hm v )
m=1 σm
m=1 σm
(23)
∗
In addition, matrix F(v, v ) has at least rank-one deficiency even when all
possible SCADA measurements are available.
Although rank-deficient, the pseudo-inverse of F(v, v∗ ) qualifies as a
valid lower bound on the mean-square error (MSE) of any unbiased estimator [63]. Rank deficiency of the FIM originates from the inherent voltage
7
angle ambiguity: SCADA measurements remain invariant if nodal voltages
are shifted globally by a unimodular phase constant. Fixing the angle of
the reference bus waives this issue. It is also worth stressing that the CRLB
in Prop. 1 is oftentimes attainable and benchmarks the optimal estimator
performance [63]. Having derived the CRLB for the PSSE task, our next
subsection deals with PSSE solvers.
3.3
Gauss-Newton Iterations
Consider for specificity model (16), though the real-valued model in (17)
or the model involving polar coordinates could be employed as well. When
the noise covariance matrix Σ = IM , the PSSE task in (18) reduces to the
nonlinear LS problem
minimize kz − h(v)k22
(24)
v∈CNb
for which the Gauss-Newton iterations are known to offer the “workhorse”
solution [3, Ch. 1], [1, Ch. 2]. According to the Gauss-Newton method,
the function h(v) is linearized at a given point vi ∈ CNb using Taylor’s
expansion as
h̃(v, vi ) := h(vi ) + Ji (v − vi )
where Ji := ∇h(vi ) is the M × Nb Jacobian matrix of h evaluated at vi ,
whose (m, n)-th entry is given by the Wirtinger derivative ∂hm /∂Vn ; see
e.g., [41] for Wirtinger’s calculus. The Gauss-Newton method subsequently
approximates the nonlinear LS fit in (24) with a linear one of h̃, and relies
on its minimizer to obtain the next iterate as
vi+1 ∈ arg min
v
= arg min
v
z − h̃(v, vi )
z − h(vi )
2
2
− 2(v − vi )H (Ji )H (z − h(vi ))
+ (v − vi )H (Ji )H Ji (v − vi ).
(25)
When matrix (Ji )H Ji is invertible, vi+1 can be found in closed form as
−1
vi+1 = vi + (Ji )H Ji (Ji )H (z − h(vi )).
(26)
The state estimate is iteratively updated using (26) until some stopping
criterion is satisfied.
If, on the other hand, the WLS cost (18) is minimized, the Gauss-Newton
−1/2
−1/2
iterations can be similarly obtained by treating Σ z as z and Σ h(v)
as h(v) in (24), yielding
i −1 i H −1
(J ) Σ (z − h(vi )).
(27)
vi+1 = vi + (Ji )H Σ−1
J
8
It is well known that the pure Gauss-Newton iterations in (26) or (27)
may not guarantee convergence, which in fact largely depends on the starting
point v0 [3, Ch. 1.5]. A common way to improve convergence and ensure
descent of the cost in (18) consists of including a backtracking line search in
(27) to end up with
i −1 i H −1
vi+1 = vi + µi (Ji )H Σ−1
(J ) Σ (z − h(vi ))
J
(28)
where the step size µi > 0 is found through the backtracking line search
rule [3, Ch. 1.2]. Due to its intimate relationship with ordinary gradient descent alternatives for nonconvex optimization however, this Gauss-Newton
iterative procedure can be trapped by local solutions [3, Ch. 1.5]. In a
nutshell, the grand challenge remains to develop PSSE solvers capable of attaining or approximating the global optimum at manageable computational
complexity. A few recent proposals in this direction are presented next.
3.4
Semidefinite Relaxation
A method to tackle the nonlinear measurement model that can convert the
PSSE problem of (21) to a convex semidefinite program (SDP) has been
introduced in [83], [84]. Consider first expressing each measurement in z
linearly in terms of the outer-product matrix V := vvH . In this way, the
quadratic models in (8), (10), and (11) can be transformed to linear ones in
terms of the matrix variable V. Thus, each noisy measurement in (14) can
be written as zm = vH Hm v + m = Tr(Hm V) + m . Rewriting the PSSE
task in (21) accordingly in terms of V reduces to
V̂1 := arg
min
V∈CNb ×Nb
M
X
2
zm − Tr(Hm V)
(29a)
m=1
s. to V 0, and rank(V) = 1
(29b)
where the positive semi-definite (PSD) and the rank-1 constraints jointly
ensure that for any V obeying (29b), there always exists a vector v such
that V = vvH .
Although zm and V are linearly related as in (29), nonconvexity is still
present in two aspects: (i) the cost function in (29a) has degree 4 in the
entries of V; and (ii) the rank constraint in (29b) is nonconvex. Aiming
for an SDP reformulation of (29), Schur’s complement lemma, see e.g., [5,
Appx. 5.5], can be leveraged to tightly bound each summand in (29a) using
9
an auxiliary variable χm > 0. Collecting all χm ’s in χ ∈ Rm , the problem
in (29) can be expressed as
{V̂2 , χ̂2 } := arg min 1T χ
(30a)
V, χ
s. to V 0, and rank(V) = 1
(30b)
χm
zm − Tr(Hm V)
0, ∀m. (30c)
zm − Tr(Hm V)
1
The equivalence among all three SE problems (21), (29), and (30) has been
shown in [83], where their optimal solutions satisfy:
2
V̂1 = V̂2 = v̂v̂H , and χ̂2,m = zm − Tr(Hm V̂2 ) , ∀m.
(31)
The only source of nonconvexity in the equivalent SE problem of (30)
comes from the rank-1 constraint. Motivated by the technique of semidefinite relaxation (SDR); see e.g., the seminal work of [21], one can obtain the
following convex SDP upon dropping the rank constraint
{V̂, χ̂} := arg min 1T χ
V, χ
s. to V 0, and (30c).
(32a)
(32b)
For the SDR-PSSE formulation in (32), a few assumptions have been
made in [84] to establish its global optimality in a specific setup.
(as1) The graph G = (B, L) has a tree topology;
(as2) Every bus is equipped with a voltage magnitude meter; and
(as3) All measurements in z are noise-free, that is = 0.
Proposition 2. Under (as1)-(as3), solving the relaxed problem (32) attains the global optimum of the original PSSE problem (30) or (21); that is,
rank(V̂) = 1.
Assumptions (as1)-(as3) may offer a close approximation of the realistic
PSSE scenario, thanks to characteristics of transmission systems such as
sparse connectivity, almost flat voltage profile, and high metering accuracy.
Although they do not hold precisely in realistic transmission systems, nearoptimality of the relaxed problem (32) has been numerically supported by
extensive tests [84]. A more crucial issue is to recover a feasible SE solution
from the relaxed problem (32), as V̂ is very likely to have rank greater than
1. This is possible either by finding the best rank-1 approximation to V̂ via
eigenvalue decomposition, or via randomization [46].
10
SDR endows SE with a convex SDP formulation for which efficient
schemes are available to obtain the global optimum using for example the
interior-point solver. The computational complexity for eigen-decomposition
is in the order of matrix multiplication, and thus negligible compared to
solving the SDP; see [46] and references therein. However, the polynomial
complexity of solving the SDP could be a burden for real-time power system monitoring, which motivates well the distributed implementation of
Section 4.2.
3.5
Penalized Semidefinite Relaxation
Building on an alternative formulation of the power flow problem, a penalized
version of the aforementioned SDP-based state estimator has been devised
in [48, 47, 78]. Commencing with the power flow task, it can be interpreted
as a particular instance of PSSE, where:
• Measurements (henceforth termed specifications) are noiseless;
• Excluding the reference bus, buses are partitioned into the subset BPV
for which active injections and voltage magnitudes are specified, and
the subset BPQ , for which active and reactive injections are specified.
The power flow task can be posed as the feasibility problem; that is,
find v ∈ CNb
s. to Pn = vH HPn v,
H
Qn = v HQn v,
Vn2 = vH HVn v,
(33)
∀n ∈ BPV ∪ BPQ
∀n ∈ BPQ
2
= V0 .
∀n ∈ BPV , and Vref
Using the SDP reformulation presented earlier, the power flow task can be
equivalently expressed as
find V ∈ CNb ×Nb
(34)
s. to zm = Tr(Hm V),
m = 1, . . . , 2Nb − 1
V 0, and rank(V) = 1
where the specifications (constraints) of (33) have been generically captured
b −1
by the pairs {(zm ; Hm )}2N
m=1 .
Although the optimization in (34) is non-convex, a convex relaxation
can be obtained by dropping the rank constraint. To promote rank-one
solutions, the feasibility problem is further reduced to [48]
V̂ := arg min Tr(H0 V)
(35)
V0
11
s. to zm = Tr(Hm V), m = 1, . . . , 2Nb − 1.
(36)
If the Hermitian matrix H0 is selected such that H0 0, rank(H0 ) = Nb −1,
and H0 1 = 0; then any state v close to the flat voltage profile 1 + j0 can
be recovered from the rank-one minimizer V̂ of (35); see [48, Thm. 2]. The
stated conditions exclude the case H0 = INb that would have led to the
nuclear-norm heuristic commonly used in low-rank matrix completion.
Spurred by this observation, the PSSE task can be posed as [47]
V̂µ := arg min Tr(H0 V) + µ
V0
M
X
fm zm − Tr(Hm V)
(37)
m=1
for some regularization parameter µ ≥ 0, where M now can be larger than
2Nb − 1. The second term in the cost of (37) is a data-fitting term ensuring
that the recovered state is consistent with the collected measurements based
on selected criteria. Two cases for fm of special interest are the LS fit
LS () := 2 , and the least-absolute value (LAV) one f LAV () := ||, ∀m =
fm
m
1, . . . , M . On the other hand, the first term in (37) can be understood as a
regularizer to promote rank-one solutions V̂µ ; see more details in [47].
In the noiseless setup, where all measurements comply with the model
zm = v0H Hm v0 , the minimization in (37) has been shown to possess a rankLS and f LAV ; see
one minimizer V̂µ = v̂µ v̂µH for all µ ≥ 0 under both fm
m
details in [47]. Interestingly, the solution v̂µ obtained under the LS fit does
not coincide with v0 for any µ ≥ 0, whereas the LAV solution v̂µ provides
the actual state v0 for a sufficiently large µ. Error bounds between V̂µ
and v0 v0H under the regularized LAV solution for noisy measurements are
established in [78].
3.6
Feasible Point Pursuit
The feasible point pursuit (FPP) method studied in [51] offers another
computationally manageable solver for approximating the globally optimal
PSSE. As a special case of the convex-concave procedure [44], FPP is an iterative algorithm for handling general nonconvex quadratically constrained
quadratic programs (QCQPs) [77]. It approximates the feasible solutions of
a nonconvex QCQP by means of a sequence of convexified QCQPs obtained
with successive convex inner-restrictions of the original nonconvex feasibility
set [77].
The first step in applying FPP to PSSE is a reformulation of (18) into
12
a standard QCQP [71, 70]
minimize
v∈CNb ,
χ∈RM
χT Σ−1 χ
(38a)
s. to vH Hm v ≤ zm + χm ,
H
v (−Hm ) v ≤ −zm + χm ,
1≤m≤M
(38b)
1≤m≤M
(38c)
where vector χ ∈ RM collects the auxiliary variables {χm ≥ 0}M
m=1 . For
power flow and power injection measurements, the corresponding Hermitian
measurement matrices {Hm } are indefinite in general; thus, both constraints
(38b) and (38c) are nonconvex. On the contrary, squared voltage magnitude
measurements relate to positive semidefinite matrices {Hm }, so that only
the related constraint (38c) is nonconvex. Either way, problem (38) is NPhard, and hence computationally intractable [57].
Using eigen-decomposition, every measurement matrix Hm can be expressed as the sum of a positive and a negative semidefinite matrix as
−
Hm = H+
m + Hm , so that the constraints in (38) are rewritten as
H −
vH H+
m v + v Hm v ≤ zm + χm
v
H
H+
mv
+v
H
H−
mv
≥ z m − χm
(39a)
(39b)
for m = 1, . . . , M . Observe now that since vH H−
m v is a concave function of
v, it is upper bounded by its first-order (linear) approximation at any point
vi ; that is,
i H −
i H − i
vH H−
m v ≤ 2<{(v ) Hm v} − (v ) Hm v .
The concave function vH (−H+
m )v can be upper bounded similarly.
Based on this observation, the FPP technique replaces the concave functions in the constraints of (39) with their linear upper bounds. The point of
linearization at every iteration is chosen to be the previous state estimate.
Specifically, initializing with v0 , the FPP produces the iterates
{vi+1 , χi+1 } := arg min χT Σ−1
χ
v, χ≥0
(40)
i H −
i H − i
s. to vH H+
m v + 2<{(v ) Hm v} ≤ zm + (v ) Hm v + χm , ∀m
i H +
i H + i
vH H−
m v + 2<{(v ) Hm v} ≥ zm + (v ) Hm v − χm , ∀m.
At every iteration, the FPP technique solves the now convex QCQP in
(40). The procedure has been shown to globally converge to a stationary
point of the WLS formulation (18) of the PSSE task [71]. Extensions of the
developed FPP solver to cope with linear(ized) measurements and bad data
are straightforward; see [71] for details.
13
100
Mean-square error (p.u.)
Angle error (degrees)
102
102
10-2
Magnitude error (p.u.)
10-4
100
10-5
GN-based SE
SDR-based SE
FPP-based SE
5
10
15
20
25
10
100
10-1
10-2
10
30
GN-based SE
SDR-based SE
FPP-based SE
Cramer-Rao bound
1
-3
1
2
3
4
5
Types of measurements
bus index
Figure 1: Left: Voltage magnitude and angle estimation errors per bus for
the IEEE 30-bus system. Right: MSEs and CRLB versus types of measurements used for the IEEE 14-bus system using: (i) Gauss-Newton iterations;
ii) the SDR-based PSSE; and iii) the FPP-based PSSE.
Figure 1 compares Gauss-Newton iterations, the SDR-based solver, and
the FPP-based solver on the IEEE 14- and 30-bus systems [64]. The actual nodal voltage magnitudes and angles were generated uniformly at random over [0.9, 1.1] and [−0.4π, 0.4π], respectively. Independent zero-mean
Gaussian noise with standard deviation 0.05 for power and 0.02 for voltage
measurements was assumed, and all reported results were averaged over 100
independent Monte Carlo realizations. The measurements for the IEEE 30bus system include all nodal voltage magnitudes and the active power flows
at both sending and receiving ends. The left panel of Fig. 1 depicts that
the magnitude and angle estimation errors attained by the FPP solver are
consistently below its competing alternatives [71].
The second experiment examines the MSE performance of the three approaches relative to the CRLB of (22) for the IEEE 14-bus test system.
Initially, all voltage magnitudes as well as all sending- and receiving-end active power flows were measured, which corresponds to the base case 1 in the
x-axis of the right panel of Fig. 1. To show the MSE performance relative for
an increasing number of measurements, additional types of measurements
were included in a deterministic manner. All types of SCADA measurements
were ordered as {Vn2 , Pkn , Pnk , Qkn , Qnk , Pn , Qn }. Each x-axis value in the
right panel of Fig. 1 implies that the number of ordered types of measurements was used in the experiment to obtain the corresponding MSEs.
14
3.7
Synchrophasors
To incorporate synchrophasors into the PSSE formulation, let ζn = Φn v+εn
collect the noisy PMU data at bus n [cf. (16)]. The related measurement
matrix is Φn , and the measurement noise εn is assumed to be complex zeromean Gaussian, independent from the noise in legacy meters and across
buses. Following the normalization convention in (21), the noise vector εn
is assumed prewhitened, such that all PMU measurements exhibit the same
accuracy. The PSSE task now amounts to estimating v given both z and
{ζn }n∈P , where P ⊆ B denotes the subset of the PMU-instrumented buses.
Hence, the MLE cost in (21) needs to be augmented by the log-likelihood
induced by PMU data as
v̂ := arg min
v
M
X
(zm − hm (v))2 +
m=1
X
kζn − Φn vk22 .
(41)
n∈P
The SDR methodology is again well motivated to convexify the augmented
PSSE problem (41) into
X
H
minimize 1T χ +
Tr(ΦH
(42a)
n Φn V) − 2<{ζn Φn v}
V, v, χ
n∈P
s. to
V v
vH 1
0, and (30c).
(42b)
By Schur’s complement, the left SDP constraint in (42b) can be expressed
equivalently as V vvH . If the latter constraint is enforced with equality,
the matrix V becomes rank-one. Imposing a rank-one constraint in (42)
renders it equivalent to the augmented PSSE task of (41). The SDP here
also offers the advantages of (32), in terms of the near-optimality and the
distributed implementation deferred to Section 4.2. To recover a feasible
solution, one can again use the best rank-1 approximation or adopt the
randomization technique as elucidated in [84].
Alternatively, the two types of measurements can be jointly utilized upon
interpreting the SCADA-based estimate as a prior for PMU-based estimation [58, 32]. Specifically, if v̂s is the SCADA-based estimate, the prior
probability density function of the actual state can be postulated to be a
circularly symmetric complex Gaussian with mean v̂s and covariance Σ̂s .
Given PMU data and the SCADA-based prior, the state can be estimated
following a maximum a-posteriori probability (MAP) approach as
X
v̂ := arg min (v − v̂s )H Σ̂−1
kζn − Φn vk22
(43)
s (v − v̂s ) +
v
n∈P
15
where the first summand is the negative logarithm of the prior distribution,
and the second one is the negative log-likelihood from the PMU data. In
essence, the approach in (43) treats the SCADA-based estimate as pseudomeasurements relying on the model v̂s = v + with circularly symmetric
zero-mean noise having E[H ] = Σ̂s .
4
Distributed Solvers
Upcoming power system requirements call for decentralized solvers. Measurements are now collected at much finer spatio-temporal scales and the
number of states increases exponentially as monitoring schemes extend to
low-voltage distribution grids [13]. Tightly interconnected power systems
call for the close coordination of regional control centers [22], while operators and utilities perform their computational operations on the cloud.
This section reviews advances in distributed PSSE solvers. As the name
suggests, distributed PSSE solutions spread the computational load across
different processors or control centers to speed up time, implement memoryintensive tasks, and/or guarantee privacy. A network of processors may be
coordinated by one or more supervising control centers in a hierarchical
fashion, or completely autonomously, by exchanging information between
processors. To clarify terminology, the latter architecture will be henceforth
identified as decentralized.
Distributed solvers with a hierarchical structure have been proposed
since the statistical formulation of PSSE [61, Part III]. Different versions
of this original scheme were later developed in [10], [27], [80], [22], [38].
Decentralized schemes include block Jacobi iterations [43], [9]; an approximate algorithm building on the related optimality conditions [18]; or matrixsplitting techniques for facilitating matrix inversion across areas running
Gauss-Newton iterations [53]. Most of the aforementioned approaches presume local identifiability (i.e., each area is identifiable even when shared
measurements are excluded) or their convergence is not guaranteed. Assuming a ring topology, every second agent updates its state iteratively through
the auxiliary problem principle in [16]. Local observability is waived in the
consensus-type solver of [75], where each control center maintains a copy of
the entire high-dimensional state vector resulting in slow convergence. For
a relatively recent review on distributed PSSE solves, see also [23].
16
Figure 2: Left: The IEEE 14-bus system partitioned into four areas [64, 38].
Dotted lassos show the buses belonging to area state vectors vk ’s. PMU bus
voltage (line current) measurements depicted by green circles (blue squares).
Right: The matrix structure for the left system with the distributed SDR
solver: green square denotes the overall V, while dark and light blue ones
correspond to the four area submatrices {Vk } and their overlaps.
4.1
Distributed Linear Estimators
Consider an interconnected system partitioned in K areas supervised by
separate control centers. Without loss of generality, an area may be thought
of as an independent system operator region, a balancing authority, a power
distribution center, or a substation [58]. Area k collects Mk measurements
obeying the linear model
zk = Hk vk + k
(44)
where vector vk ∈ CNk collects the system states related to zk through
the complex matrix Hk . The random noise vector k is zero-mean with
identity covariance upon prewhitening, if measurements are uncorrelated
across areas. The model in (44) is exact for PMU measurements, but it
may also correspond to a single Gauss-Newton iteration as explained in
Section 3.3.
Performing PSSE locally at area k amounts to solving
minimize fk (vk )
vk ∈Xk
(45)
where the convex set Xk captures possible prior information, such as zero17
injection buses or short circuits [55], [1]. If fk (vk ) = kzk − Hk vk k22 /2, the
minimizer of (45) is the least-squares estimate (LSE) of vk , which is also
the MLE of vk for Gaussian k .
As illustrated in Fig. 2, the per-area state vectors {vk }K
k=1 overlap partially. Although area 4 supervises buses {9, 10, 14}, it also collects the current reading on lines (10, 11). Thus, its state vector v4 extends to bus
{11} that is nominally supervised by area 3. To setup notation, define Skl
as the shared states for a pair of neighboring areas (k, l). Let also vk [l]
(vl [k]) denote the sub-vector of vk (vl ) consisting of their overlapping variables ordered as they appear in v. For example, v3 [4] = v4 [3] contain the
bus voltages of {11}. Solving the K problems in (45) separately is apparently suboptimal since the estimates of shared states will disagree, tie-line
measurements have to be ignored, and boundary states may thus become
unobservable.
Coupling the per-area PSSE tasks can be posed as
minimize
{vk ∈Xk }
K
X
fk (vk )
(46)
k=1
s. to vk [l] = vl [k],
∀l ∈ Bk , ∀k
where Nk is the set of areas sharing states with area k. The equality constraints of (46) guarantee consensus over the shared variables. Although
(46) is amenable to decentralized implementations (cf. [16]), areas need a
coordination protocol for their updates. To enable a truly decentralized solution, we follow the seminal approach of [60, 82]. An auxiliary variable vkl
is introduced per pair of connected areas (k, l); the symbols vkl and vlk are
used interchangeably. The optimization in (46) can then be written as
minimize
{vk ∈Xk }, {vkl }
K
X
fk (vk )
(47)
k=1
s. to vk [l] = vkl ,
∀l ∈ Bk , k = 1, . . . , K.
Problem (47) can be solved using the alternating direction method of
multipliers (ADMM) [4], [20]. In its general form, ADMM tackles convex
optimization problems of the form
minimize f (x) + g(z)
x∈X , z∈Z
s. to Ax + Bz = c
18
(48a)
(48b)
for given matrices and vectors (A, B, c) of proper dimensions. Upon assigning a Lagrange multiplier λ for the coupling constraint in (48a), the (x, z)
minimizing (48a) are found through the next iterations for some µ > 0
µ
kAx + Bzi − c + λi k22
2
µ
:= arg min g(z) + kAxi+1 + Bz − c + λi k22
z∈Z
2
:= λi + Axi+1 + Bzi+1 − c.
xi+1 := arg min f (x) +
(49a)
zi+1
(49b)
x∈X
λi+1
(49c)
Towards applying the ADMM iterations to (46), identify variables {vk }
as x in (48a) and {vkl } as z with g(z) = 0. Moreover, introduce Lagrange
multipliers λk,l for each constraint in (47). Observe that λk,l and λl,k correspond to the distinct constraints vk [l] = vkl and vl [k] = vkl , respectively.
According to (49a), the per-area state vectors {vk } can be updated separately as
µX
i
vki+1 := arg min fk (vk ) +
kvk [l] − vkl
+ λik,l k22 .
(50)
vk ∈Xk
2
l∈Bk
From (49b) and assuming every state is shared by at most two areas, the
auxiliary variables vkl can be readily found in closed form given by
i+1
vkl
=
1 i+1
vk [l] + vli+1 [k] + λik,l + λil,k
2
(51)
while the two related multipliers are updated as
i+1
i+1
i
λi+1
k,l := λk,l + (vk [l] − vkl )
λi+1
l,k
:=
λil,k
+
(vli+1 [k]
−
i+1
).
vkl
(52a)
(52b)
i+1
Adding (52) by parts and combining it with (51) yields λi+1
k,l = −λl,k at
all iterations i if the multipliers are initialized at zero. Hence, the auxiliary
variable vkl ends up being the average of the shared states; that is,
i+1
vkl
=
1 i+1
vk [l] + vli+1 [k] .
2
(53)
To summarize, at every iteration i:
(i) Each control area solves (50). If fk (vk ) is the LS fit and for unconstrained problems, the per-area states are updated as the LSEs using
legacy software. The second summand in (50) can be interpreted as
pseudo-measurements on the shared states forcing them to consent
across areas.
19
−2
10
Error curves averaged over areas
LSE
D−RPSSE
−3
10
−4
10
−5
10
−6
10
0
10
20
30
40
50
60
70
80
Iteration
P300 t
P
t
Figure 3: Average error curves 300
k=1 ek,o /300
k=1 ek,c /300 (bottom) and
(top) for the LSE, and its robust counterpart D-RPSSE (see Section 5.1) on
a 4,200-bus grid.
(ii) Neighboring areas exchange their updated shared states. This step involves minimal communication, and no grid models need to be shared.
Every area updates its copies of the auxiliary variables vkl using (53).
(iii) Every area updates the Lagrange multipliers λkl based on the deviation of the local from the auxiliary variable as in (52).
For convex pairs {fk (vk ), Xk }K
k=1 , the aforementioned iterates reach the
optimal cost in (46), under mild conditions. If the overall power system is
observable, the ADMM iterates converge to the unique LSE. The approach
has been extended in [33] for joint PSSE and breaker status verification.
The decentralized algorithms were tested on a 4,200-bus power grid synthetically built from the IEEE 14- and 300-bus systems. Each of the 300
buses of the latter was assumed to be a different area, and was replaced by
a copy of the IEEE 14-bus grid. Additionally, every branch of the IEEE
300-bus grid was an inter-area line whose terminal buses are randomly selected from the two incident to this line areas. Two performance metrics
were adopted: the per area error to the centralized solution of (46), denoted
(c)
by etk,c :=kvk − vkt k2 /Nk , and the per-area error to the true underlying
state defined as etk,o :=kvk − vkt k2 /Nk . Figure 3 shows the corresponding
error curves averaged over 300 areas. The decentralized LSE approached
the underlying state at an accuracy of 10−3 in approximately 10 iterations
20
or 6.2 msec on an Intel Duo Core @ 2.2 GHz (4GB RAM) computer using
MATLAB; while the centralized LSE finished in 93.4 msec.
4.2
Distributed SDR-based Estimators
Although the SDR-PSSE approach incurs polynomial complexity √
when im4
plemented as a convex SDP, its worst-case complexity is still O(M Nb log(1/))
for a given solution accuracy > 0 [46]. For typical power networks, the
number of measurements M is on the order of the number of buses Nb , and
thus the worst-case complexity becomes O(Nb4.5 log(1/)). This complexity
could be prohibitive for large-scale power systems, which motivates accelerating the SDR-PSSE method using distributed parallel implementations.
Following the area partition in Fig. 2, the m-th measurement per area k
can be written as
zk,m = hk,m (vk ) + k,m = Tr(Hk,m Vk ) + k,m , ∀k, m
where Vk denotes a submatrix of V formed by extracting the rows and
columns corresponding to buses in area k; and likewise for each Hk,m . Due
to the overlap among the subsets of buses, the outer-product Vk of area k
overlaps also with Vl for each neighboring area l ∈ Nk , as shown in Fig. 2.
By reducing the measurements atP
area k to submatrix Vk , one can de2
k
fine the PSSE error cost fk (Vk ) := M
m=1 [zk,m − Tr(Hk,m Vk )] per area
k, which only involves the local matrix Vk . Hence, the centralized PSSE
problem in (32) becomes equivalent to
V̂ = arg min
K
X
V0
fk (Vk ).
(54)
k=1
This equivalent formulation effectively expresses the overall PSSE cost as the
superposition of each local cost fk . Nonetheless, even with such a decomposable cost, the main challenge to implement (54) in a distributed manner
lies in the PSD constraint that couples the overlapping local matrices {Vk }
(cf. Fig. 2). If all submatrices {Vk } were non-overlapping, the cost would
be decomposable as in (54), and the PSD of V would boil down to a PSD
constraint per area k, as in
V̂ = arg min
{Vk 0}
K
X
fk (Vk ).
(55)
k=1
Similar to PSSE for linearized measurements in (46), the formulation in
(55) can be decomposed into sub-problems, thanks to the separable PSD
21
constraints. It is not always equivalent to the centralized (54) though, because the PSD property of all submatrices does not necessarily lead to a
PSD overall matrix. Nonetheless, the decomposable problem (55) is still
a valid SDR-PSSE reformulation, since with the additional per-area constraints rank(Vk ) = 1, it is actually equivalent to (30). While it is totally
legitimate to use (55) as the relaxed SDP formulation for (30), the two
relaxed problems are actually equivalent under mild conditions.
The fresh idea here is to explore valid network topologies to facilitate
such PSD constraint decomposition. To this end, it will be instrumental to leverage results on completing partial Hermitian matrices to obtain
PSD ones [24]. Upon obtaining the underlying graph formed by the specified entries in the partial Hermitian matrices, these results rely on the
so-termed graph chordal property to establish the equivalence between the
positive semidefiniteness of the overall matrix and that of all submatrices
corresponding to the graph’s maximal cliques. Interestingly, this technique
was recently used for developing distributed SDP-based optimal power flow
(OPF) solvers in [28, 12, 42].
Construct first a new graph B 0 over B, with all its edges corresponding
to the entries in {Vk }. The graph G 0 amounts to having all buses within
each subset Nk to form a clique. Furthermore, the following are assumed:
(as4) The graph with all the control areas as nodes, and their edges defined
by the neighborhood subset {Nk }K
k=1 forms a tree.
(as5) Each control area has at least one bus that does not overlap with any
neighboring area.
Proposition 3. Under (as4)-(as5), the two relaxed problems (54) and (55)
are equivalent.
Proposition 3 can be proved by following the arguments in [84] to show
that the entire PSD matrix V can be “completed” using only the PSD
submatrices Vk . The key point is that in most power networks even those
not obeying (as4) and (as5), (55) can achieve the same accuracy as the
centralized one. At the same time, decomposing the PSD constraint in (55)
is of paramount importance for developing distributed solvers. One can
adopt the consensus reformulation to design the distributed solver for (55) as
in (46) of Section 4.1. Accordingly, the ADMM iterations can be employed
to solve (55) through iterative information exchanges among neighboring
areas, and this is the basis of the distributed SDR-PSSE method.
This distributed SDR-PSSE method was tested on the IEEE 118-bus
system using the three-area partition in [31]. All three areas measure their
22
1
10
Area 1
Area 2
Area 3
Local matrix error
10
0
Area 1
Area 2
Area 3
10
Local estimation error
0
−1
10
−2
−1
10
10
−3
10
0
20
40
60
0
80
20
40
60
80
Iteration index
Iteration index
Figure 4: (Left) Per area state matrix error and (Right) state vector estimation error, versus the number of ADMM iterations for the distributed
SDR-PSSE solver using the IEEE 118-bus system.
local bus voltage magnitudes, as well as real and reactive power flow levels
at all lines. The overlaps among the three areas form a tree communication
graph used to construct the area-coupling constraints. To demonstrate convergence of the ADMM iterations to the centralized SE solution V̂ of (55),
i − V̂ k is plotted versus the
the local matrix Frobenius error norm kV̂(k)
(k) F
iteration index i in the left panel of Fig. 4 for every control area k. Clearly,
all local iterates converge to (approximately with a linear rate) their counterparts in the centralized solution. As the task of interest is to estimate the
i − v k is also
voltages, the local estimation error for the state vector kv̂(k)
(k) 2
depicted in the right panel of Fig. 4, where v̂(k) is the estimate of bus volti using the eigen-decomposition
ages at area k obtained from the iterate V̂(k)
method. Interestingly, the estimation error costs converge within the estimation accuracy of around 10−2 after about 20 iterations (less than 10
iterations for area 1), even though the local matrix has not yet converged.
In addition, these error costs decrease much faster in the first couple of iterations. This demonstrates that even with only a limited number of iterations,
the PSSE accuracy can be greatly boosted in practice, which in turn makes
inter-area communication overhead more affordable.
5
Robust Estimators and Cyber Attacks
Bad data, also known as outliers in the statistics parlance, can challenge
PSSE due to communication delays, instrument mis-calibration, and/or line
23
parameter uncertainty. In today’s cyber-enabled power systems, smart meter and synchrophasor data could be also purposefully manipulated to mislead system operators. This section reviews conventional and contemporary
approaches to coping with outliers.
5.1
Bad Data Detection and Identification
Bad data processing in PSSE relies mainly on the linear measurement model
z = Hv + , where H ∈ RM ×N . Recall that this model is exact for PMU
measurements [cf. (16)–(17)], but approximate per Gauss-Newton iteration
or under the linearized grid model. In addition, the aforementioned model
assumes real-valued states and measurements, slightly abusing the symbols
introduced in (17). This is to keep the notation uncluttered and cover both
cases of exact and inexact grid models. Albeit the nominal measurement
noise vector is henceforth assumed zero-mean with identity covariance, results extend to colored noise as per (20).
To capture bad data, the measurement model is now augmented as
z = Hv + o +
(56)
where o ∈ RM is an unknown vector whose m-th entry om is deterministically non-zero only if zm is a bad datum [30, 39, 15]. Therefore, vector o is
sparse, i.e., many of its entries are zero. Under this outlier-cognizant model
in (56), the unconstrained LSE given as v̂LSE = (HT H)−1 HT z, yields the
residual error
r := z − Hv̂LSE = Pz = P(o + )
(57)
with P := IM − H(HT H)−1 HT being the so-called projection matrix onto
the orthogonal subspace of range(H). The last equality in (57) stems from
the fact that PH = 0. As a projection matrix, P is idempotent, that is,
P = P2 ; Hermitian PSD with (M − N ) eigenvalues equal to one and N
zero eigenvalues; while its diagonal entries satisfy Pm,m ∈ [0, 1] for m =
1, . . . , M ; see e.g., [6].
For ∼ N (0, IM ), it apparently holds that P ∼ N (0, P). The meansquared residual error is (see also [39] for its Bayesian counterpart)
E[krk22 ] = E[kPk22 ] + kPok22 = (M − N ) + kPok22 .
(58)
In the absence of bad data, or if o ∈ range(H), the squared residual error
follows a χ2 distribution with mean (M − N ). The χ2 -test compares krk22
against a threshold to detect the presence of bad data [1, 55].
24
Finding both v and o from measurements in (56) may seem impossible, given that the number of unknowns exceeds the number of equations.
Leveraging the sparsity of o though, interesting results can be obtained [30].
If τ0 bad data are expected, one would ideally wish to solve
o
n1
{v̂, ô} ∈ arg min
(59)
kz − Hv − ok22 : kok0 ≤ τ0 .
v, o
2
But the `0 -(pseudo) norm kok0 counting the number of non-zero entries of
o, renders (59) NP-hard in general; see also Definition 2 later in Section 5.2.
For the special case of τ0 = 1, problem (59) can be efficiently handled.
Consider the scenario where the only non-zero entry of ô is the m-th one,
and denote the related v̂ minimizer by v̂(m) . Apparently, the m-th entry of
the ô minimizer is ôm := zm − hTm v̂(m) . This choice nulls the m-th residual
(zm − hTm v̂(m) − ôm = 0). With the m-th residual zeroed, the cost in (59)
becomes kr(m) k22 := kz(m) − H(m) v̂(m) k22 , where z(m) is obtained from z
upon dropping its m-th entry and H(m) by removing the m-th row of H.
The problem in (59) is then equivalent to
minimize
m
1
kr k2 .
2 (m) 2
(60)
Problem (60) can be solved by exhaustively finding all M LSEs excluding
one measurement at a time. Fortunately, a classical result from the adaptive
filtering literature relates the error kr(m) k22 to the error attained using all
outlier-free measurements krk22 := kPzk22 ; see e.g., [25, Ch. 9]
krk22 = kr(m) k22 + rm ôm .
(61)
The same result links the a-posteriori error rm to the a-priori error ôm as
rm = Pm,m ôm . Through these links, solving (60) is equivalent to:
|rm |
rmax := maximize p
.
m
Pm,m
(62)
In words, a single bad datum can be identified by properly normalizing the
entries of the original residual vector r = Pz.
Interestingly, the task in (62) coincides with the largest normalized residual (LNR) test that compares rmax to a prescribed threshold to identify a
single bad datum [1, Sec. 5.7]. The p
threshold is derived after recognizing
that in the absence of bad data, rm / Pm,m is standard normal for all m.
The LNR test does not generalize for multiple bad data and problem
(59) becomes computationally intractable for larger τ0 ’s. Heuristically, if
25
a measurement is deemed as outlying, PSSE is repeated after discarding
this bad datum, the LNR test is re-applied, and the process iterates till no
corrupted data are identified. Alternatively, the least-median squares and
the least-trimmed squares estimators have provable breakdown points and
superior efficiency under Gaussian data; see e.g., [52] and references therein.
Nevertheless, their complexity scales unfavorably with the network size.
Leveraging compressed sensing [7], a practical robust estimator can be
found if the `0 -pseudonorm is surrogated by the convex `1 -norm as [30, 31]
n1
o
minimize
kz − Hv − ok22 : kok1 ≤ τ1
(63)
v, o
2
for a preselected constant τ1 > 0, or in its Lagrangian form
{v̂, ô} ∈ arg min
v, o
1
kz − Hv − ok22 + λkok1
2
(64)
for some tradeoff parameter λ > 0. The estimates of (64) offer joint state
estimation and bad data identification. Even when some measurements are
deemed as corrupted, their effect has been already suppressed. The optimization task in (64) can be handled by off-the-shelf software or solvers
customized to the compressed sensing setup. When λ → ∞, the minimizer
ô becomes zero, and thus v̂ reduces to the LSE. On the contrary, by letting λ → 0+ , the solution v̂ coincides with the least-absolute value (LAV)
estimator [40, 6, 17, 68]; presented earlier in (37), namely
v̂LAV := arg min kz − Hvk1 .
v
(65)
For finite λ > 0, the v̂ minimizer of (64) is equivalent to Huber’s Mestimator; see [30] and references therein. Based on this connection and
for Gaussian , parameter λ can be set to 1.34, which makes the estimator 95% asymptotically efficient for outlier-free measurements [50, p. 26].
Huber’s estimate can be alternatively expressed as the v-minimizer of [49],
minimizev, ω 21 kωk22 + λkv − Hv − ωk1 . The bad data identification performance of this minimization has been analyzed in [76].
Table 1 compares several bad data analysis methods on the IEEE 14bus grid of Fig. 2 under the next four scenarios: (S0) no bad data; (S1)
bad data on line (4, 7); (S2) bad data on line current (4, 7) and bus voltage 5; and (S3) bad data on bus voltage 5 and line currents (4, 7) and
(10, 11). In all scenarios, bad data are simulated by multiplying the real
and imaginary parts of the actual measurement by 1.2. The performance
metric here is the `2 -norm between the true state and the PSSE, which is
26
Table 1: Mean-Square Estimation Error in the Presence of Bad Data
Method
GA-LSE
LSE
LNRT
Huber’s
0.0278
0.0313
0.0336
0.0367
0.0278
0.0318
0.1431
0.1434
0.0286
0.0331
0.0404
0.0407
0.0281
0.0322
0.0390
0.0390
(S0)
(S1)
(S2)
(S3)
averaged over 1,000 Monte Carlo runs. Four algorithms were tested: (a)
an ideal but practically infeasible genie-aided LSE (GA-LSE), which ignores
the corrupted measurements; (b) the regular LSE; (c) the LNR test-based
(LNRT) estimator with the test threshold set to 3.0 [1]; and (d) Huber’s
estimator of (64) with λ = 1.34. For (S0)-(S1), the estimators perform
comparably. The few corrupted measurements in (S2)-(S3) can deteriorate
LSE’s performance, while Huber’s estimator performs slightly better than
LNRT. Computationally, Huber’s estimator was run within 1.3 msec, while
the LNRT required 1.5 msec. The computing times were also measured for
the IEEE 118-bus grid without corrupted data. Interestingly, the average
time on the IEEE 118-bus grid without corrupted data are 3.2 msec and
81 msec, respectively.
Towards a robust decentralized state estimator, the ADMM-based framework of Section 4.1 can be engaged here too. If the measurement model for
the k-th area is zk = Hk vk + ok + k , the centralized problem boils down to
minimize
{vk ∈Xk , ok }
K
X
1
k=1
2
kzk − Hk vk − ok k22 + λkok k1 .
(66)
To allow for decentralized implementation, the optimization in (66) can be
reformulated as
minimize
K
X
1
k=1
2
kzk − Hk vk − ok k22 + λkωk k1
(67a)
over {vk ∈ Xk , ok , ωk }, {vkl }
(67b)
s. to vk [l] = vkl , for all l ∈ Bk , k = 1, . . . , K.
(67c)
ok = ωk , for all k = 1, . . . , K.
(67d)
As in Section 4.1, the constraints in (67c) and the auxiliary variables {vkl }
enforce consensus of shared states. On the other hand, the variables {ok }
27
are duplicated as {ωk } in (67d). Then, variables {vk , ok } are put together
in the x-update of ADMM in (49a), whereas {vkl , ωk } fall into the z-update
in (49b). In this fashion, costs are separable over variable groups, and the
minimization involving the `1 -norm enjoys a closed-form solution expressed
in terms of the soft thresholding operator [31].
5.2
Observability and Cyber Attacks
In the cyber-physical smart grid context, bad data are not simply unintentional errors, but can also take the form of malicious data injections [54].
Amid these challenges, the intertwined issues of critical measurements and
stealth cyber-attacks on PSSE are discussed next.
It has been tacitly assumed so far that the power system is observable. A
power system is observable if distinct states v 6= v0 are mapped to distinct
measurements h(v) 6= h(v0 ) under a noiseless setup. Equivalently, if the
so-called measurement distance function is defined as [81]
D(h) := minimize
kh(v) − h(v0 )k0
0
v6=v
(68)
the power system is observable if and only if D(h) ≥ 1. Given the network
topology and the mapping h(v), the well-studied topic of observability analysis aims at determining whether the system state is uniquely identifiable,
at least locally in a neighborhood of the current estimate [1, Ch. 4]. If not,
mapping observable islands, meaning maximally connected sub-grids with
observable internal flows, is important as well.
Observability analysis relies on the decoupled linearized grid model, and
is accomplished through topological or numerical tests [8, 56]. Apparently,
under the linear or linearized model h(v) = Hv, the state v is uniquely
identifiable if and only if H is full column-rank. Phase shift ambiguities can
be waived by fixing the angle at a reference bus.
In the presence of bad data and/or cyber attacks, observability analysis
may not suffice. Consider the noiseless measurement model z = h(v) + o,
where the non-zero entries of vector o correspond to bad data or compromised meters; and let us proceed with the following definitions.
Definition 1 (Observable attack [81]). The attack vector o is deemed as
observable if for every state v there is no v0 6= v, such that h(v)+o = h(v0 ).
Definition 2 (Identifiable attack [81]). The attack vector o is identifiable
if for every v there is no (v0 , o0 ) with v0 6= v and ko0 k0 ≤ kok0 , such that
h(v) + o = h(v0 ) + o0 .
28
If the outlier vector o is observable, the operator can tell that the collected measurements do not correspond to a system state, and can hence
decide that an attack has been launched. Nevertheless, the attacked meters
can be pinpointed only under the stronger conditions of Definition 2.
The resilience of the measurement mapping h(v) against attacks can be
characterized through D(h) in (68): The maximum number of counterfeited
meters for an attack to be observable is Ko = D(h)−1 and to be identifiable,
it is Ki = b D(h)−1
c; see [81, 76]. Here, the floor function bxc returns the
2
greatest integer less than or equal to x.
Consider the linear mapping h(v) = Hv. Measurement m is termed
critical if once removed from the measurement set, it renders the power
system non-identifiable. In other words, although H is full column-rank, its
submatrix H(m) is not. It trivially follows that D(h) = 1, and the system
operator can be arbitrarily misled even if only measurement m is attacked.
Due to the typically sparse structure of H, critical measurements or multiple
simultaneously corrupted data do exist [1]. It was pointed out in [45] that if
an attack o can be constructed to lie in the range(H), it comprises a ‘stealth
attack.’ Although finding D(h) is not trivial in general, a polynomial-time
algorithm leveraging a graph-theoretic approach is devised in [39].
6
Power System State Tracking
The PSSE methods reviewed so far ignore system dynamics and do not
exploit historical information. Dynamic PSSE is well motivated thanks to its
improved robustness, observability, and predictive ability when additional
temporal information is available [26]. Recently proposed model-free and
model-based state tracking schemes are outlined next.
6.1
Model-free State Tracking via Online Learning
In complex future power systems, one may not choose to explicitly commit
to a model for the underlying system dynamics. The framework of online
convex optimization (OCO), particularly popular in machine learning, can
account for unmodeled dynamics and is thus briefly presented next [62].
The OCO model considers a multi-stage game between a player and an
adversary. In the PSSE context, the utility or the system operator assumes
the role of the player, while the loads and renewable generations can be
viewed as the adversary. At time t, the player first selects an action Vt from
a given action set V, and the adversary subsequently reveals a convex loss
29
function ft : V → R. In this round, the player suffers a loss ft (Vt ). The
ultimate goal for the player is to minimize the regret Rf (T ) over T rounds:
Rf (T ) :=
T
X
ft (Vt ) − minimize
V∈V
t=1
T
X
ft (V).
(69)
t=1
The regret is basically the accumulated cost incurred
the player relative
Pby
T
0
to that by a single fixed action V := arg minV∈V t=1 ft (V). This fixed
action is selected with the advantage of knowing the loss functions {ft }Tt=1
in hindsight. Under appropriate conditions, judiciously designed online optimization algorithms can achieve sublinear regret; that is, Rf (T )/T → 0 as
T → +∞.
Building on the SDR-PSSE formulation of Section 3.4, the ensuing method
considers streaming data for real-time PSSE. The data referring to and colt
lected over the control period t are {(zmt ; Hmt )}M
mt =1 with t = 1, . . . , T .
The number and type of measurements can change over time, while the matrix corresponding to measurement m may change over time as indicated by
t
{Hmt }M
mt =1 due to topology reconfigurations. The online PSSE task can be
now formulated as
T
X
minimize
ft (V)
(70)
V0
t=1
PMt
where ft (V) := mt =1 [zmt − Tr(Hmt V)]2 . Online PSSE aims at improving
the static estimates by capitalizing on previous measurements as well as
tracking slow time-varying variations in generation and demand.
Minimizing the cost in (70) may be computationally cumbersome for
real-time implementation. An efficient alternative based on online gradient
descent amounts to iteratively minimizing a regularized first-order approximation of the instantaneous cost instead [37]
Vt+1 := arg min Tr(VH ∇ft (Vt )) +
V0
1
kV − Vt k2F
2µt
(71)
for t = 1, . . ., and suitably selected step sizes µt > 0. Interestingly, the
optimization in (71) admits a closed-form solution given by
Vt+1 = ProjS+ [Vt − µt ∇ft (Vt )]
(72)
with ProjS+ denoting the projection onto the positive semidefinite cone,
which can be performed using eigen-decomposition followed by setting negative eigenvalues to zero. It is worth mentioning that the online PSSE in
30
(72) enjoys sublinear regret [37]. Upon finding Vt , a state estimate vt can be
obtained by eigen-decomposition or randomization as in Section 3.4. With
an additional nuclear-norm regularization term promoting low-rank solutions in (71), online ADMM alternatives were devised in [36]. Interestingly,
online learning tools has recently been advocated for numerous real-time
energy management tasks in [35], [34], [69].
6.2
Model-based State Tracking
Although the previous model-free solver can recover slow time-varying states,
model-based approaches facilitate tracking of fast time-varying system states.
A typical state-space model for power system dynamics is [65]
vt+1 = Ft vt + gt + ωt
(73a)
zt = h(vt ) + t
(73b)
where Ft denotes the state-transition matrix, gt captures the process mismatch, and wt is the additive noise. The nonlinear mapping h(·) comes from
conventional SCADA measurements. Values {(Ft , gt )} can be obtained in
real-time using for example Holt’s system identification method [11]. Two
common dynamic tracking approaches to cope with the nonlinearity in the
measurement model of (73b) include the (extended or unscented) Kalman
filters and moving horizon estimators [65, 14, 26, 73, 72], and they are outlined in order next.
The extended Kalman filter (EKF) handles the nonlinearity by linearizing h(v) around the state predictor. To start, let v̂t+1|t stand for the predicted estimate at time t + 1 given measurements {zτ }tτ =1 up to time t.
Let also v̂t+1|t+1 be the filtered estimate given measurements {zτ }t+1
τ =1 . If
the noise terms ωt and t in (73) are assumed zero-mean Gaussian with
known covariance matrices Qt 0 and Rt 0, respectively, the EKF can
be implemented with the following recursions
v̂t+1|t+1 = v̂t+1|t + Kt+1 zt+1 − h(v̂t+1|t )
(74)
where the state predictor v̂t+1|t and the Kalman gain Kt+1 are given by
v̂t+1|t = Ft v̂t|t + gt
(75a)
H
Kt+1 = Pt+1|t JH
t+1 Jt+1 Pt+1|t Jt+1 + Rt+1
Pt+1|t+1 = Pt+1|t − Kt+1 Jt+1 Pt+1|t
Pt+1|t = Ft Pt|t FH
t + Qt
31
−1
(75b)
(75c)
(75d)
with Jt+1 being the measurement Jacobian matrix of h evaluated at v̂t+1|t ,
and Pt+1|t+1 0 (Pt+1|t 0) denoting the corrected (predicted) state
estimation error covariance matrix at time t + 1. To improve on the approximation accuracy of the EKF, extended Kalman filters (UKF) have been
reported in [65]; see also [79] for their robust versions. Particle filtering
may also be useful if its computational complexity can be supported during
real-time power systems operations.
Because the EKF and UKF are known to diverge for highly nonlinear
dynamics, moving horizon estimation (MHE) has been suggested as an accurate yet tractable alternative with proven robustness to bounded model
errors [59]. Different from Kalman filtering, the initial state v0 , and noises
ωt and t in MHE are viewed as deterministic unknowns taking values from
given bounded sets S, W, and E, respectively. The sets W and E model
disturbances with truncated densities [59].
The idea behind MHE is to perform PSSE by exploiting useful information present in a sliding window of the most recent observations. Consider
here a sliding window of length L + 1. Let v̂t−L|t denote the smoothed
estimate at time t − L given L past measurements, as well as the current one, namely {zτ }tτ =t−L . MHE aims at obtaining the most recent L
t
state estimates {v̂t−L+s|t }L
s=0 based on {zτ }t−L and the available estimate
v̌t−L := v̂t−L|t−1 from time t − 1 and for t ≥ L. A key simplification is that
once v̂t−L|t becomes available, the other L recent estimates at time t can be
recursively obtained through ‘noise-free’ propagation based on the dynamic
model (73a); that is,
v̂t−L+s|t = Ft−L+s−1 v̂t−L+s−1|t
(76)
for s = 1, . . . , L. By relating all recent estimates to v̂t−L|t via successive
multiplications of transition matrices, the update in (76) simplifies to
v̂t−L+s|t = Tt−L+s v̂t−L|t
(77)
where Tt−L+s := Ft−L+s−1 Tt−L+s−1 for s = 1, . . . , L, with Tt−L = I. The
MHE-based state estimate v̂t−L|t is then given by
v̂t−L|t := arg min
v
L
X
zt−L+s − h(Tt−L+s v)
2
2
+ λkv − v̌t−L k22
(78)
s=0
where λ > 0 can be tuned relying on our confidence in the state predictor
v̌t−L , and the measurements {zτ }tt−L . Given the quadratic dependence of
32
the SCADA measurements {h(vt )} and the state v, the optimization problem in (78) is non-convex.
Finding the MHE-based state estimates in real time entails online solutions of dynamic optimization problems. The MHE formulation can be
convexified by exploiting the semidefinite relaxation: vector v is lifted to the
matrix V := vvH 0, and the m-th entry of h(vt−L+s ) for s = 0, . . . , L, is
expressed as
H
hm (Tt−L+s v) = vH TH
t−L+s Hm Tt−L+s v = Tr(Tt−L+s Hm Tt−L+s V).
Upon dropping the nonconvex rank constraint rank(V) = 1, the SDP-based
MHE yields
V̂t−L|t := arg min
V0
L
X
zt−L+s −Tr TH
t−L+s Hm Tt−L+s V
2
+λkv− v̌t−L k22
2
s=0
which can be solved in polynomial time using off-the-shelf toolboxes. Rankone state estimates can be obtained again through eigen-decomposition or
randomization. The complexity of solving the last problem is rather high
in its present form on the order of Nb4.5 [46]. Therefore, developing faster
solvers for the SDP-based MHE by exploiting the rich sparsity structure in
{Hm } matrices is worth investigating. Decentralized and localized MHE
implementations are also timely and pertinent. Devising FPP-based solvers
for the MHE in (78) constitutes another research direction.
7
Discussion
This chapter has reviewed some of the recent advances in PSSE. After developing the CRLB, an SDP-based solver, and its regularized counterpart
were discussed. To overcome the high complexity involved, a scheme named
feasible point pursuit relying on successive convex approximations was also
advocated. A decentralized PSSE paradigm put forth provides the means
for coping with the computationally-intensive SDP formulations, it is tailored for the interconnected nature of modern grids, while it can also afford
processing PMU data in a timely fashion. A better understanding of cyber
attacks and disciplined ways for decentralized bad data processing were also
provided. Finally, this chapter gave a fresh perspective to state tracking
under model-free and model-based scenarios.
Nonetheless, there are still many technically challenging and practically
pertinent grid monitoring issues to be addressed. Solving power grid data
33
processing tasks on the cloud has been a major trend to alleviate data storage, communication, and interoperability costs for system operators and
utilities. Moreover, with the current focus on low- and medium-voltage distribution grids, solvers for unbalanced and multi-phase operating conditions
[2] are desirable. Smart meters and synchrophasor data from distribution
grids (also known as micro-PMUs [67]) call for new data processing solutions. Advances in machine learning and statistical signal processing, such
as sparse and low-rank models, missing and incomplete data, tensor decompositions, deep learning, nonconvex and stochastic optimization tools, and
(multi)kernel-based learning to name a few, are currently providing novel
paths to grid monitoring tasks while realizing the vision of smarter energy
systems.
Acknowledgements
G. Wang and G. B. Giannakis were supported in part by NSF grants 1423316,
1442686, 1508993, and 1509040; and by the Laboratory Directed Research
and Development Program at the NREL. H. Zhu was supported in part by
NSF grants 1610732 and 1653706.
Appendix
2 })).
Proof of Prop. 1. Consider the AGWN model (15) with ∼ N (0, dg({σm
The data likelihood function is
M
Y
1
(zm − vH Hm v)2
p
p(z; v) =
(79)
exp −
2
2
2σm
2πσm
m=1
and the negative log-likelihood function denoted by f (v) = − ln p(z; x) is
f (v) =
M
X
2 1
1
H
2
z
−
v
H
v
+
ln
2πσ
.
m
m
m
2
2σm
2
(80)
m=1
The Fisher information matrix (FIM) is defined as the Hessian of the
real-valued function f (v) with respect to the complex vector v ∈ CNb . Deriving the CRLB amounts to finding the Hessian of a real-valued function
with respect to a complex-valued vector. Wirtinger’s calculus confirms that
f (v) can be equivalently rewritten as f (v, v∗ ); see e.g., [41]. Upon introducing the conjugate coordinates [vT (v∗ )T ]T ∈ C2Nb , the Wirtinger derivatives, namely the first-order partial differential operators of functions over
34
complex domains, are given by [41]
∂f
∂f (v, v∗ )
:=
∂v
∂vT
∂f
∂f (v, v∗ )
:=
∂v∗
∂(v∗ )T
∂f
∂f
···
=
∂V1
∂VN constant v∗
v∗
∂f
∂f
.
=
···
∗
∂V1∗
∂VN
v
constant v
constant
constant
These definitions follow the convention in multivariate calculus that derivatives are denoted by row vectors, and gradients by column vectors. Define
for notational brevity φm (v, v∗ ) := zm − (v∗ )T Hm v for m = 1, . . . , M .
Accordingly, the Wirtinger derivatives of f (v, v∗ ) in (80) are obtained as
M
L
X
X
∂f
1
∂φm
∂f
1
∂φm
=
φ
and
=
φ
2 m ∂vT
2 m ∂(v∗ )T
∂v
σm
∂v∗
σm
m=1
(82)
m=1
and the Wirtinger derivatives of φm (v, v∗ ) can be found likewise
∂φm
∂φm
= −(Hm v)H and
= −(H∗m v∗ )H .
∂vT
∂(v∗ )T
(83)
In the conjugate coordinate system, the complex Hessian of f (v, v∗ ) with
respect to the conjugate coordinates [vT (v∗ )T ]T is defined as
Hvv Hv∗ v
∗
2
∗
H(v, v ) := ∇ f (v, v ) =
(84)
Hvv∗ Hv∗ v∗
whose blocks are given as
Hvv
∂
:=
∂vT
Hvv∗
∂
:=
∂vT
∂f
∂v
H
∂f
∂v∗
,
Hv∗ v
∂f
∂v
Hv ∗ v ∗
∂
:=
∂(v∗ )T
∂f
∂v∗
H
,
H
∂
:=
∂(v∗ )T
H
.
Substituting (82) and (83) into the last equations and after algebraic manipulations yields
Hvv =
Hv ∗ v =
M
X
m=1
M
X
−2
σm
Hm v(Hm v)H − φm Hm
(85a)
−2
σm
Hm v(H∗m v∗ )H
(85b)
m=1
35
Hvv∗ =
Hv ∗ v ∗ =
M
X
m=1
M
X
−2 ∗ ∗
σm
Hm v (Hm v)H
(85c)
−2
σm
H∗m v∗ (H∗m v∗ )H − φm H∗m .
(85d)
m=1
Evaluating the Hessian blocks of (85) at the true value of v, and taking
the expectation with respect to , yields E[φm ] = 0. Hence, the φm -related
terms in (85) disappear, and the FIM F(v, v∗ ) := E[H(v, v∗ )] simplifies to
the expression in (23); see also [66].
To show that the FIM is rank-deficient,
define gm := [(Hm v)H (H∗m v∗ )H ]H ,
PM
−2 g gH . Observe now that the nonso that the FIM becomes F = m=1 σm
m m
T
∗
T
T
zero vector d(v) := [v − (v ) ] is orthogonal to gm for m = 1, . . . , M ;
that is,
H
gm
d = vH Hm v − (vH Hm v)∗ = 0.
Based on the latter, it is not hard to verify that Fd = 0, which proves that
the null space of F is non-empty.
References
[1] A. Abur and A. Gómez-Expósito, Power System State Estimation: Theory and Implementation. New York, NY: Marcel Dekker, 2004.
[2] M. Bazrafshan and N. Gatsis, “Comprehensive modeling of three-phase
distribution systems via the bus admittance matrix,” arXiv:1705.06782,
2017.
[3] D. P. Bertsekas, Nonlinear Programming, 2nd ed.
Athena Scientific, 1999.
Belmont, MA:
[4] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” Found. Trends Mach. Learn., vol. 3,
pp. 1–122, 2010.
[5] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY:
Cambridge University Press, 2004.
[6] M. K. Celik and A. Abur, “A robust WLAV state estimator using transformations,” IEEE Trans. Power Syst., vol. 7, no. 1, pp. 106–113, Feb.
1992.
36
[7] S. S. Chen, D. L. Donoho, Michael, and A. Saunders, “Atomic decomposition by basis pursuit,” SIAM J. Sci. Comput., vol. 20, pp. 33–61,
Jul. 1998.
[8] K. A. Clements, G. R. Krumpholz, and P. W. Davis, “Power system state estimation with measurement deficiency: An observability/measurement placement algorithm,” IEEE Trans. Power App.
Syst., vol. 102, no. 7, pp. 2012–2020, Jul. 1983.
[9] A. J. Conejo, S. de la Torre, and M. Canas, “An optimization approach
to multiarea state estimation,” IEEE Trans. Power Syst., vol. 22, no. 1,
pp. 213–221, Feb. 2007.
[10] T. V. Cutsem and M. Ribbens-Pavella, “Critical survey of hierarchical
methods for state estimation of electric power systems,” IEEE Trans.
Power App. Syst., vol. 102, no. 10, pp. 3415–3424, Oct. 1983.
[11] A. L. Da Silva, M. Do Coutto Filho, and J. De Queiroz, “State forecasting in electric power systems,” IEE Proc. Generat. Transm. Distrib.,
vol. 130, no. 5, pp. 237–244, Sep. 1983.
[12] E. Dall’Anese, H. Zhu, and G. B. Giannakis, “Distributed optimal
power flow for smart microgrids,” IEEE Trans. Smart Grid, vol. 4,
no. 3, pp. 1464–1475, Sep. 2013.
[13] J. De La Ree, V. A. Centeno, J. Thorp, and A. Phadke, “Synchronized phasor measurement applications in power systems,” IEEE Trans.
Smart Grid, vol. 1, no. 1, pp. 20–27, Jun. 2010.
[14] A. S. Debs and R. E. Larson, “A dynamic estimator for tracking the
state of a power system,” IEEE Trans. Power App. Syst., no. 7, pp.
1670–1678, Sep. 1970.
[15] D. Duan, L. Yang, and L. L. Scharf, “Phasor state estimation from
PMU measurements with bad data,” in Proc. IEEE Workshop on
Comp. Adv. in Multi-Sensor Adaptive Proc., San Juan, Puerto Rico,
Dec. 2011.
[16] R. Ebrahimian and R. Baldick, “State estimation distributed processing,” IEEE Trans. Power Syst., vol. 15, no. 4, pp. 1240–1246, Nov.
2000.
37
[17] A. A. El-Keib, J. Nieplocha, H. Singh, and D. Maratukulam, “A decomposed state estimation technique suitable for parallel processor implementation,” IEEE Trans. Power Syst., vol. 7, no. 3, pp. 1088–1097,
Aug. 1992.
[18] D. M. Falcao, F. F. Wu, and L. Murphy, “Parallel and distributed state
estimation,” IEEE Trans. Power Syst., vol. 10, no. 2, pp. 724–730, May
1995.
[19] G. B. Giannakis, V. Kekatos, N. Gatsis, S.-J. Kim, H. Zhu, and B. Wollenberg, “Monitoring and optimization for power grids: A signal processing perspective,” IEEE Signal Process. Mag., vol. 30, no. 5, pp.
107–128, Sept. 2013.
[20] G. B. Giannakis, Q. Ling, G. Mateos, I. D. Schizas, and H. Zhu, “Decentralized learning for wireless communications and networking,” Splitting Methods in Communication, Imaging, Science, and Engineering,
pp. 461–497, Springer, 2016.
[21] M. X. Goemans and D. P. Williamson, “Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite
programming,” J. ACM, vol. 42, no. 6, pp. 1115–1145, Nov. 1995.
[22] A. Gómez-Expósito, A. Abur, A. de la Villa Jaén, and C. Gómez-Quiles,
“A multilevel state estimation paradigm for smart grids,” Proc. IEEE,
vol. 99, no. 6, pp. 952–976, Jun. 2011.
[23] A. Gómez-Expósito, A. de la Villa Jaén, C. Gómez-Quiles,
P. Rousseaux, and T. V. Cutsem, “A taxonomy of multi-area state
estimation methods,” Electr. Pow. Syst. Res., vol. 81, pp. 1060–1069,
Apr. 2011.
[24] R. Grone, C. R. Johnson, E. M. Sá, and H. Wolkowicz, “Positive definite
completions of partial hermitian matrices,” Linear Algebra & its Appl.,
vol. 58, pp. 109–124, Apr. 1984.
[25] S. Haykin, Adaptive Filter Theory. New York, NY: Prentice Hall, 2002.
[26] S.-J. Huang and K.-R. Shih, “Dynamic-state-estimation scheme including nonlinear measurement function considerations,” IEE Proc. Generat. Transm. Distrib., vol. 149, no. 6, pp. 673–678, Nov. 2002.
38
[27] S. Iwamoto, M. Kusano, and V. H. Quintana, “Hierarchical state estimation using a fast rectangular-coordinate method,” IEEE Trans.
Power Syst., vol. 4, no. 3, pp. 870–880, Aug. 1989.
[28] R. A. Jabr, “Exploiting sparsity in SDP relaxations of the OPF problem,” IEEE Trans. Power Syst., vol. 27, no. 2, pp. 1138–1139, May
2012.
[29] S. M. Kay, Fundamentals of Statistical Signal Processing, Vol. I: Estimation Theory. Prentice Hall, 1993.
[30] V. Kekatos and G. B. Giannakis, “From sparse signals to sparse residuals for robust sensing,” IEEE Trans. Signal Process., vol. 59, no. 7,
pp. 3355–3368, Jul. 2011.
[31] ——, “Distributed robust power system state estimation,” IEEE Trans.
Power Syst., vol. 28, no. 2, pp. 1617–1626, May 2013.
[32] V. Kekatos, G. B. Giannakis, and B. F. Wollenberg, “Optimal placement of phasor measurement units via convex relaxation,” IEEE Trans.
Power Syst., vol. 27, no. 3, pp. 1521–1530, Aug. 2012.
[33] V. Kekatos, E. Vlachos, D. Ampeliotis, G. B. Giannakis, and
K. Berberidis, “A decentralized approach to generalized power system state estimation,” in Proc. IEEE Wkshp. on Comp. Adv. in MultiSensor Adaptive Proc., Saint Martin, Dec. 2013.
[34] V. Kekatos, G. Wang, A. J. Conejo, and G. B. Giannakis, “Stochastic reactive power management in microgrids with renewables,” IEEE
Trans. Power Syst., vol. 30, no. 6, pp. 3386–3395, Nov. 2015.
[35] S. J. Kim, G. B. Giannakis, and K. Y. Lee, “Online optimal power flow
with renewables,” in Asilomar Conf. on Signals, Syst. and Comput.,
Pacific Grove, CA, Nov 2014, pp. 355–360.
[36] S.-J. Kim, “Online power system state estimation using alternating
direction method of multipliers,” in Proc. IEEE PES Summer Meeting,
Denver, CO, 2015.
[37] S.-J. Kim, G. Wang, and G. B. Giannakis, “Online semidefinite programming for power system state estimation,” in Proc. IEEE Intl. Conf.
on Acoustics, Speech, and Signal Process., Florence, Italy, May 2014,
pp. 6024–6027.
39
[38] G. N. Korres, “A distributed multiarea state estimation,” IEEE Trans.
Power Syst., vol. 26, no. 1, pp. 73–84, Feb. 2011.
[39] O. Kosut, L. Jia, J. Thomas, and L. Tong, “Malicious data attacks on
the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658,
Dec. 2011.
[40] W. W. Kotiuga and M. Vidyasagar, “Bad data rejection properties of
weighted least-absolute-value techniques applied to static state estimation,” IEEE Trans. Power App. Syst., no. 4, pp. 844–853, Apr. 1982.
[41] K. Kreutz-Delgado, “The complex gradient operator and the CRcalculus,” arXiv:0906.4835, 2009.
[42] A. Y. Lam, B. Zhang, and T. David, “Distributed algorithms for optimal power flow problem,” in Proc. IEEE Conf. on Decision and Control,
Maui, HI, Dec. 2012, pp. 430–437.
[43] S.-Y. Lin and C.-H. Lin, “An implementable distributed state estimator and distributed bad data processing schemes for electric power systems,” IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1277–1284, Aug.
1994.
[44] T. Lipp and S. Boyd, “Variations and extension of the convex–concave
procedure,” Optim. Eng., vol. 17, no. 2, pp. 263–287, Jun. 2016.
[45] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
state estimation in electric power grids,” ACM Trans. Info. and System
Security, vol. 14, no. 1, pp. 13:1–13:33, May 2011.
[46] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, “Semidefinite
relaxation of quadratic optimization problems,” IEEE Signal Process.
Mag., vol. 27, no. 3, pp. 20–34, May 2010.
[47] R. Madani, A. Ashraphijuo, J. Lavaei, and R. Baldick, “Power system
state estimation with a limited number of measurements,” in Proc.
IEEE Conf. on Decision and Control, Las Vegas, NV, Dec. 2016.
[48] R. Madani, J. Lavaei, and R. Baldick, “Convexification of power flow
problem over arbitrary networks,” in Proc. IEEE Conf. on Decision
and Control, Osaka, Japan, Dec. 2015.
[49] O. L. Mangasarian and D. R. Musicant, “Robust linear and support
vector regression,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 22,
no. 9, pp. 950–955, Sep. 2000.
40
[50] R. A. Maronna, R. D. Martin, and V. J. Yohai, Robust Statistics: Theory and Methods. Wiley, 2006.
[51] O. Mehanna, K. Huang, B. Gopalakrishnan, A. Konar, and
N. Sidiropoulos, “Feasible point pursuit and successive approximation
of non-convex QCQPs,” vol. 22, no. 7, pp. 804–808, Nov. 2015.
[52] L. Mili, M. G. Cheniae, and P. J. Rousseeuw, “Robust state estimation
of electric power systems,” IEEE Trans. Circuits Syst. I, vol. 41, no. 5,
pp. 349–358, May 1994.
[53] A. Minot, Y. M. Lu, and N. Li, “A distributed Gauss-Newton method
for power system state estimation,” IEEE Trans. Power Syst., vol. 31,
no. 5, pp. 3804–3815, Sep. 2016.
[54] B. Y. Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig,
and B. Sinopoli, “Cyber-physical security of a smart grid infrastructure,” Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.
[55] A. Monticelli, “Electric power system state estimation,” Proc. IEEE,
vol. 88, no. 2, pp. 262–282, Feb. 2000.
[56] A. Monticelli and F. F. Wu, “Network observability: Theory,” IEEE
Trans. Power App. Syst., vol. 104, no. 5, pp. 1042–1048, May 1985.
[57] P. M. Pardalos and S. A. Vavasis, “Quadratic programming with one
negative eigenvalue is NP-hard,” J. Global Optim., vol. 1, no. 1, pp.
15–22, Mar. 1991.
[58] A. G. Phadke and J. S. Thorp, Synchronized Phasor Measurements and
Their Applications. New York, NY: Springer, 2008.
[59] C. V. Rao, J. B. Rawlings, and D. Q. Mayne, “Constrained state estimation for nonlinear discrete-time systems: Stability and moving horizon approximations,” IEEE Trans. Autom. Contr., vol. 48, no. 2, pp.
246–258, Feb. 2003.
[60] I. D. Schizas, A. Ribeiro, and G. B. Giannakis, “Consensus in ad hoc
WSNs with noisy links: Part I: Distributed estimation of deterministic
signals,” IEEE Trans. Signal Process., vol. 56, no. 1, pp. 350–364, Jan.
2008.
[61] F. C. Schweppe, J. Wildes, and D. Rom, “Power system static state
estimation: Parts I, II, and III,” IEEE Trans. Power App. Syst., vol. 89,
pp. 120–135, Jan. 1970.
41
[62] S. Shalev-Shwartz, “Online learning and online convex optimization,”
Found. and Trends Mach. Learning, vol. 4, no. 2, pp. 107–194, Mar.
2011.
[63] P. Stoica and T. L. Marzetta, “Parameter estimation problems with
singular information matrices,” IEEE Trans. Signal Process., vol. 49,
no. 1, pp. 87–90, Jan. 2001.
[64] Power systems test case archive. Univ. of Washington. [Online].
Available: http://www.ee.washington.edu/research/pstca/
[65] G. Valverde and V. Terzija, “Unscented Kalman filter for power system
dynamic state estimation,” IEE Proc. Generat. Transm. Distrib., vol. 5,
no. 1, pp. 29–37, Jan. 2011.
[66] A. Van den Bos, “A Cramér-Rao lower bound for complex parameters,”
IEEE Trans. Signal Process., vol. 40, no. 10, Oct. 1994.
[67] A. Von Meier, D. Culler, A. McEachern, and R. Arghandeh, “Microsynchrophasors for distribution systems,” in Proc. IEEE Conf. on Innovative Smart Grid Technologies, 2014, pp. 1–5.
[68] G. Wang, G. B. Giannakis, and J. Chen, “Robust and scalable power
system state estimation via composite optimization,” preprint, 2017.
[69] G. Wang, V. Kekatos, A. J. Conejo, and G. B. Giannakis, “Ergodic energy management leveraging resource variability in distribution grids,”
IEEE Trans. Power Syst., vol. 31, no. 6, pp. 4765–4775, Nov. 2016.
[70] G. Wang, A. S. Zamzam, G. B. Giannakis, and N. D. Sidiropoulos,
“Power system state estimation via feasible point pursuit,” in Proc.
IEEE Global Conf. on Signal and Inf. Process., Washington, D.C., Nov.
2016.
[71] ——, “Power system state estimation via feasible point pursuit: Algorithms and Crmér-Rao bound,” arXiv:1203.0853, 2017.
[72] G. Wang, S.-J. Kim, and G. B. Giannakis, “Moving-horizon dynamic
power system state estimation using semidefinite relaxation,” in Proc.
IEEE PES General Meeting, Washington, DC, Jul. 2014, pp. 1–5.
[73] S. Wang, W. Gao, and A. S. Meliopoulos, “An alternative method for
power system dynamic state estimation based on unscented transform,”
IEEE Trans. Power Syst., vol. 27, no. 2, pp. 942–950, May 2012.
42
[74] A. J. Wood and B. F. Wollenberg, Power Generation, Operation, and
Control, 2nd ed. New York, NY: Wiley & Sons, 1996.
[75] L. Xie, D.-H. Choi, and S. Kar, “Cooperative distributed state estimation: Local observability relaxed,” in Proc. IEEE Power & Energy
Society General Meeting, Detroit, MI, Jul. 2011.
[76] W. Xu, M. Wang, J. F. Cai, and A. Tang, “Sparse error correction
from nonlinear measurements with applications in bad data detection
for power networks,” IEEE Trans. Signal Process., vol. 61, no. 24, pp.
6175–6187, Dec. 2013.
[77] A. S. Zamzam, N. D. Sidiropoulos, and E. Dall’Anese, “Beyond relaxation and Newton-Raphson: Solving AC OPF for multi-phase systems
with renewables,” IEEE Trans. Smart Grid, 2017.
[78] Y. Zhang, R. Madani, and J. Lavaei, “Conic relaxations for power system state estimation with line measurements,” IEEE Trans. Control
Netw. Syst., 2017 (to appear).
[79] J. Zhao, M. Netto, and L. Mili, “A robust iterated extended Kalman
filter for power system dynamic state estimation,” IEEE Trans. Power
Syst., 2016 (to appear).
[80] L. Zhao and A. Abur, “Multiarea state estimation using synchronized
phasor measurements,” IEEE Trans. Power Syst., vol. 20, no. 2, pp.
611–617, May 2005.
[81] H. Zhu and G. B. Giannakis, “Robust power system state estimation
for the nonlinear AC flow model,” in Proc. North American Power
Symposium, Urbana-Champaign, IL, Sep. 2012.
[82] H. Zhu, G. B. Giannakis, and A. Cano, “Distributed in-network decoding,” IEEE Trans. Signal Process., vol. 57, no. 10, pp. 3970–3983, Oct.
2009.
[83] H. Zhu and G. B. Giannakis, “Estimating the state of AC power systems using semidefinite programming,” in Proc. North American Power
Symposium, Boston, MA, Aug. 2011.
[84] ——, “Power system nonlinear state estimation using distributed
semidefinite programming,” IEEE J. Sel. Topics Signal Process., vol. 8,
no. 6, pp. 1039–1050, Dec. 2014.
43
| 3cs.SY
|
arXiv:1604.06525v3 [cs.GR] 9 Sep 2017
Opt: A Domain Specific Language for Non-linear Least Squares
Optimization in Graphics and Imaging
ZACHARY DEVITO, Facebook Research
MICHAEL MARA, Stanford University
MICHAEL ZOLLHÖFER, Max-Planck-Institute for Informatics
GILBERT BERNSTEIN, Stanford University
JONATHAN RAGAN-KELLEY, UC Berkeley
CHRISTIAN THEOBALT, Max-Planck-Institute for Informatics
PAT HANRAHAN, Stanford University
MATTHEW FISHER, Adobe Research
MATTHIAS NIESSNER, Technical University of Munich
Many graphics and vision problems can be expressed as non-linear least
squares optimizations of objective functions over visual data, such as images
and meshes. The mathematical descriptions of these functions are extremely
concise, but their implementation in real code is tedious, especially when
optimized for real-time performance on modern GPUs in interactive applications. In this work, we propose a new language, Opt1 , for writing these
objective functions over image- or graph-structured unknowns concisely and
at a high level. Our compiler automatically transforms these specifications
into state-of-the-art GPU solvers based on Gauss-Newton or LevenbergMarquardt methods. Opt can generate different variations of the solver,
so users can easily explore tradeoffs in numerical precision, matrix-free
methods, and solver approaches.
In our results, we implement a variety of real-world graphics and vision applications. Their energy functions are expressible in tens of lines of
code, and produce highly-optimized GPU solver implementations. These
solvers are competitive in performance with the best published hand-tuned,
application-specific GPU solvers, and orders of magnitude beyond a generalpurpose auto-generated solver.
CCS Concepts: • Software and its engineering → Domain specific languages; • Computing methodologies → Image processing; Graphics systems and interfaces; Graphics processors; Procedural animation;
General Terms: Domain-specific Languages, Non-linear least squares,
Levenberg-Marquardt, Gauss-Newton
1 INTRODUCTION
Many problems in graphics and vision can be concisely formulated
as least squares optimizations on images, meshes, or graphs. For
example, Poisson image editing, shape-from-shading, and as-rigidas-possible warping have all been formulated as non-linear least
1Opt
is open sourced and publicly available under http://optlang.org.
This is the author’s version of the work. It is posted here for your personal use. Not for
redistribution.
squares optimizations, allowing them to be described tersely as
energy functions over pixels or vertices [47, 50, 68].
In many of these applications, high performance is critical for interactive feedback, requiring efficient parallel or GPU-based solvers
[11, 30, 54, 68, 73]. These solvers require optimizations that are
not expressible in generic sparse linear algebra software. For example, these solvers are matrix-free; that is, they compute matrix
values on-the-fly rather than loading data from matrices materialized (i.e., stored) in memory. They also implicitly represent the
sparse connectivity of the matrices based on the structure of images
or graphs, rather than store it explicitly in memory. This approach
can also be applied to solvers that use the Levenberg-Marquardt
algorithm [36, 39].
However, the efficiency of these solvers comes at enormous implementation cost: the simple energy function must be manually
transformed into a complex product of partial derivative matrices
(e.g., JT F and JT Jp). Furthermore, the code tightly intertwines the
calculation of partial derivatives with operations performed by the
solver. Finally, this code has to be written by hand in GPU kernels;
the result is hundreds of lines of highly-tuned CUDA code which is
hard to maintain and modify.
This paper presents a new language, Opt, which makes this type
of high performance-optimization accessible to a wider community
of graphics and vision practitioners. Programmers write high-level
sum-of-squares energy functions over pixels or graphs, such as
the example shown in Fig. 1 (left) for as-rigid-as-possible image
warping. Our compiler can transform these energies into efficient
GPU routines which compute products of the derivatives (e.g., JT J or
JT Jp). We provide a suite of solvers that use these routines to apply
either Gauss-Newton (GN) or Levenberg-Marquardt (LM) methods.
The solvers use a parallel preconditioned conjugate gradient inner
loop based on either matrix-free or materialized approaches. The
resulting code can be used within both matrix-free and materialized
solvers.
Our system is able to achieve this due to four key ideas. First, we
provide an optimization framework that separates the details of a
particular energy from the details of the GN or LM solver approach.
The framework is general enough to allow both matrix-free and
materialized implementations. Second, our language provides key
2 •
DeVito, Z. et al
Image Warping
Energy in Opt
!""#$%&'()*+$','-+./$01&2&34&'-+./$01&3&34
"56'.&7'.)'-%$)/.+'8'89&2:&'8;9&2:&'82&9:&'82&;9:':'<5
''''6','0!""#$%02&24';'!""#$%0.&744';'
'''''''''=5%>%$0()*+$024&'!6.*?5#02&24';'!6.*?5#0.&744
''''@>+.<','()<0A)B5C)<#0.&74&D>#E02&24&D>#E0.&744'''''
''''F)$6*G0-$+$/%0@>+.<&HI6J6&244
$)<
/','HI"J0!""#$%#02&24';'K5)#%6>.)%#02&244
F)$6*G0-$+$/%0L>+.<0K5)#%6>.)%#02&244&/&244
Opt Compiler
Mesh Deformation
Shape From Shading
Intrinsic Images
Poisson Image Editing
Optical Flow
Volumetric Deformation
Fast GPU Solver
Fig. 1. From a high-level description of an energy, Opt produces high-performance GPU-based optimizers for many graphics problems.
abstractions for representing energies at a high-level. Unknowns and
other data are arranged on 2D or 3D grids, meshes, or general graphs.
Energies are defined over these domains and access data through
stencil patterns (fixed-size and shift-invariant local windows). Third,
our compiler exploits the regularity of stencils and graphs to automatically generate efficient GPU routines that can compute products
of derivatives such as JT J. Derivative terms required by these routines are created using hybrid symbolic-automatic differentiation
based on a simplified version of the D algorithm [26]. Finally, we
use a specialized code generator to emit efficient GPU code for the
derivative terms and use metaprogramming to weave the solver
code with the generated routines to avoid runtime overhead.
Our method provides significantly better performance than traditional general-purpose solver libraries and matches state-of-the-art
custom applications. It is easy to change details in the solver (GN
vs. LM), the numeric precision (float vs. double), and matrix storage (matrix-free vs. materialized) without rewriting the energies or
solvers. Programmers can quickly figure out the best settings for a
particular problem depending on the need for numerical stability
and available computational resources.
In particular, we present the following contributions:
• We propose a high-level programming model for defining
energies over image and graph domains.
• We introduce a generic framework for Gauss-Newton and
Levenberg-Marquardt optimization on GPUs that is capable
of abstracting the efficient matrix-free methods used in
state-of-the-art application-specific solvers.
• We provide algorithms based on symbolic differentiation
that exploit the regularity of energies defined on images
and graphs to produce efficient GPU routines that plug into
our optimization framework. Our optimizations produce
code competitive with hand-written routines.
• We implement a variety of state-of-the-art graphics problems, including mesh/image deformations, smoothing, and
shape-from-shading refinement using Opt. We provide an
evaluation that shows that our implementations outperform state-of-the-art application-specific solvers and are
up to two orders of magnitude faster than the CPU-based
Ceres solver [1].
• We show how Opt’s abstraction allows the flexible generation of many solver variants for these applications that
explore tradeoffs in GN vs. LM, single vs. double precision,
matrix-free vs. materialized, and even hybrid solvers.
2
BACKGROUND
Non-linear Least Squares Optimization. Optimization methods
are used in the graphics and vision community to solve a wide
range of problems. We specifically focus on unconstrained non-linear
least squares optimizations [6], where a solver minimizes an energy
function that is expressed as a sum of squared residual terms: E(x) =
2
R
r =1 fr (x) . The residuals fr (x) are generic functions, making
the problems potentially non-linear and non-convex [9]. There has
been an extensive effort in the literature to solve these problems
with a large variety of numerical optimization approaches [13, 14, 21,
33, 43, 44, 66]. Gauss-Newton and Levenberg-Marquardt [36, 39] are
two common methods for solving problems in computer graphics
and vision.
GN and LM are specifically tailored towards these kind of problems. Their second-order optimization approach has been shown to
be well-suited for the solution of a large variety of problems [38, 67],
and has also been successfully applied in the context of real-time
optimization [68, 73]. If the non-linear energy is convex, then GN
and LM will converge to the global minimum; otherwise they will
converge to some local minimum. Furthermore, GN and LM internally solve a linear system. While these systems can generally be
solved with direct methods, our solvers need to scale to large problem sizes and run on massively parallel GPUs; hence, we implement
GN/LM with a preconditioned conjugate gradient (PCG) [45] in the
inner loop.
In our current implementation, we focus on GN and LM rather
than other variants such as L-BFGS [45], since they reflect the approaches used in state-of-the-art hand-written GPU implementations, allowing us to compare our performance to existing solvers
directly. However, we believe our approach can be generalized in
future work to support such backends.
Application-specific GPU Solvers. Application-specific Gauss-Newton solvers written for GPUs have been frequently used in the last
two years. Wu et al. [68] use a blocked version of GN to refine depth
from RGB-D data using shape-from-shading. Zollhöfer et al. [73]
minimize an as-rigid-as-possible energy [50] on a mesh as part of
a framework for real-time non-rigid reconstruction. Zollhöfer et
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
al. [72] use a similar solver to enforce shading constraints on a volumetric signed-distance field in order to refine over-smoothed geometry with RGB data. Thies et al. [54–56] transfer local facial expressions between people in a video by optimizing photo-consistency
between the video and synthesized output. Dai et al. [11] solve a
global bundle adjustment problem to achieve real-time rates for
globally-consistent 3D reconstruction, and Innmann et al. [30] optimize the a warp field for of non-rigid surface reconstruction.
These solvers achieve high-performance by working matrix-free
on the problem domain. That is, during the PCG step, they never
form, or materialize the entire Jacobian J of the energy. Instead, they
compute it on demand, for instance by reading neighboring pixels to
compute the derivative of a regularization energy. Performance improves in two ways: first, they do not explicitly store and load sparse
matrix connectivity; rather, this is implied by pixel relationships or
meshes. Second, reconstructing terms is often faster than storing
them, since the size of the problem data is smaller than the full matrix implied by the energy. Unfortunately, these application-specific
solvers are tedious to write because they mix code that calculates
complicated matrix products with partial derivatives based on the
energy.
High-level Solvers. Higher-level solvers such as CVX [19, 20],
OpenOF [64], or ProxImaL [28] work directly from an energy specified in a domain-specific language. CVX uses disciplined programming to ensure that modeled energy functions are convex, then
constructs a specialized solver for the given type of convex problem.
Ceres [1] uses template meta-programming and operator overloading to solve non-linear least squares problems on the CPU using
backwards auto-differentiation. Unlike Opt, these solvers do not
generate efficient GPU implementations and only work with materialized matrices. OpenOF does run on GPUs, but uses materialized sparse matrices [64]. In contrast, Opt’s abstraction allows
solvers to use either matrix-free or materialized approaches; we can
even provide hybrids where only part of the energy is materialized.
Matrix-free approaches can be significantly faster than explicit matrices due to less memory transfer (Sec. 8.3). CPU libraries such as
Alglib [7], GTSAM [12], and g2o [34] abstract the solver, requiring
users to provide numeric routines for energy evaluation and, optionally, gradient calculation. All of these solvers create materialized
Jacobians, and then use standard numerical linear algebra methods on these matrices to compute the Newton step. They cannot
optimize the compilation of energy terms and solver code, unlike
application-specific solvers, and require hand-written gradients to
run fast. Similar to high-level solvers, Opt only requires a description of the energy, but it uses code transformations to generate
application-specific matrix-free (or hybrid) GPU solvers automatically.
Simulation DSLs. Ebb [5] and Simit [32] are domain-specific languages that allow the user to express and abstract linear algebra
compute operations over graphs (and in Ebb’s case, arbitrary relations such as regular grids) on heterogeneous architectures. Ebb &
Simit both focus on simulation, but could be used to write non-linear
least squares solvers like those produced by Opt.
§3
Cost Expression
§4
Generic GN/LM
Optimization
Framework
evalF()
evalJTF()
applyJTJ()
§5
•
3
Opt
Frontend
Energy (F) IR
Solver Routine IR Gen
F, JTJ, JTF, J IR
§6
IR
Optimizer &
Scheduler
evalJ()
Fig. 2. An overview of the architecture of Opt, labeled with the sections
where each part is described.
The user interface to Opt (specifying concise energy functions) is
fundamentally a higher-level abstraction than the direct specification of arithmetic to execute in Simit and Ebb. To write an equivalent
optimization in Simit or Ebb, a user must (1) write the solver algorithm from scratch; (2) manually derive efficient arithmetic code
from the energy function (particularly tricky for fused Jacobian kernels); and (3) decide up front which parts of matrix multiplication
are precomputed and cached vs. recomputed on the fly. Because Opt
automates (1 & 2) and allows (3) to be specified post-hoc, users can
iterate far more rapidly on their energy functions.
We prototyped a Gauss-Newton solver using Ebb for the Image
Warping example, but found the solver generated by Opt was over
5x faster then the counterpart in Ebb. The implementation effort
of the problem-specific solver in Ebb is similar to a hand-written
CUDA implementation, thus significantly higher than specifying
the energy in Opt. A future version of Opt could emit Simit or Ebb
code, and that may be a practical solution to avoid maintaining
multiple back-ends, but does not change the basic system design or
address issues (1,2,3) laid out above.
Differentiation Methods. Matrix-free approaches require efficient
derivative computation since the derivatives are evaluated in the
inner iteration of the PCG loop. Numeric differentiation, which uses
finite differences to estimate derivatives, is numerically unreliable
and inefficient [26]. Instead, packages like Mathematica [65] allow
users to compute symbolic derivatives using rewrite rules. Because
they frequently represent math as trees, they do not handle common
sub-expressions well, making them impractical for large expressions [26]. Automatic-differentiation is transformation on programs
rather than symbols [22, 24]. They replace numbers in a program
with “dual”-numbers that track a specific partial derivative using
the chain rule. However, because the transform does not work on
symbols, simplifications that result from the chain rule are not always applied. We use a hybrid symbolic-automatic approach similar
to D?, which represents math symbolically but stores it as a directed
acyclic graph (DAG) of operators to ensure scalability to large problems [26]. A symbolic representation of derivatives is important for
Opt since solver routines use many derivative terms that share common expressions. This can not be addressed by auto-differentiation
methods.
4
•
DeVito, Z. et al
W,H = Dim("W",0), Dim("H",1)
X = Unknown("X",float,{W,H},0)
A = Array("A",float,{W,H},1)
w_fit,w_reg = .1,.9
Energy(w_fit*(X(0,0) - A(0,0)), --fitting
w_reg*(X(0,0) - X(1,0)), --regularization
w_reg*(X(0,0) - X(0,1)))
Fig. 3. Laplacian smoothing energy for a one-component image, implemented in Opt. Note that weights are the square root values, since the
Energy function squares its inputs.
void SolveLaplacian(int width, int height,
float* unknown, float* target) {
OptState* state = Opt_NewState();
// load the Opt DSL file containing the cost description
OptProblem* problem = Opt_ProblemDefine(state,"laplacian.opt");
// describe the dimensions of the instance of the problem
uint32_t dims[] = { width, height };
OptPlan* plan = Opt_ProblemPlan(state, problem, dims);
// run the solver
void* problem_data[] = { unknown_pixel_data, target_pixel_data };
Opt_ProblemSolve(state, plan, problem_data, NULL);
}
Fig. 4. Opt API calls that use the Laplacian smoothing program.
3
PROGRAMMING MODEL
An overview of Opt’s architecture is given in Fig. 2. In this section, we describe our programming model to construct the problem
specific energy functions. Sec. 4 describes our generic solver framework on GPUs, and describes the Gauss-Newton and LevenbergMarquardt solvers we implemented using this framework. To operate matrix-free, this framework requires application-specific solver
routines (evalF(),evalJ(),evalJTF(), applyJTJ()). Sec. 5 describes
how our compiler generates these routines from the energy.
We introduce our programming model using the example of Laplacian smoothing of an image. A fitting term encourages a pixel X to
be close to its original value A:
E fit (i, j) = [X (i, j) − A(i, j)]2
A regularization term encourages neighboring pixels to be similar:
Õ
E reg (i, j) =
[X (i, j) − X (l, m)]2
(l,m)∈N(i, j)
where N (i, j) = {(i + 1, j), (i, j + 1)}
The energy is a weighted sum of both terms:
Õ
E∆ =
w fit E fit (i, j) + w reg E reg (i, j)
(i, j)∈I
While this example is linear, Opt supports arbitrary non-linear energy expressions.
Language. Similar to shading languages such as OpenGL, Opt
programs are composed of a “shader” file that describes the energy
and a set of C APIs for running the problem. Fig. 3 expresses the
Laplacian energy in Opt. Opt is embedded in the Lua programming
language and operator overloading is used to create a symbolic
representation of the energy. The first line specifies problem dimensions. Line 2 uses the function Unknown to declare the pixel array that
represents the unknown X . Array is used to declare constant values
such as the image A that will be fixed during optimization. The last
argument of these declarations is a numeric index that associates
the array with actual data provided by the C API.
Energy adds residual expressions to the problem’s energy. A key
part of Opt’s abstraction is that residuals are described at elements of
images or graphs and are implicitly mapped over the entire domain.
The term w_fit*(X(0,0) - A(0,0)) defines an energy at each pixel
that is the difference between the images. We support arrays and
energies that include both vector and scalar terms. The Energy function implicitly squares the terms and sums them over the domain
to enforce the linear least-squares model. Terms can also include a
N
X
A
G
=
=
=
=
Dim("N",0)
Unknown("X", float3,{N},0)
Array("A", float3,{N},1)
Graph("Edges", 2,
"vertex0", {N}, 3,
"vertex1", {N}, 4)
w_fit,w_reg = .1,.9
Energy(w_fit*(X(0) - A(0)), w_reg*(X(G.vertex0) - X(G.vertex1)))
Fig. 5. The Laplacian cost defined on the edges of a mesh instead of an
image. The graph represents explicit connectivity.
statically-defined stencil of neighboring pixels. The regularization
term w_reg*(X(0,0) - X(1,0)) defines an energy that is the difference between a pixel and the pixel to its right. Our solver framework
exploits this regularity to produce efficient code.
API. Applications interact with Opt programs using a C API.
Fig. 4 shows an example using this API. To amortize the cost of
preparing a problem used multiple times, we separate the compilation (Opt_ProblemDefine), memory allocation (Opt_ProblemPlan),
and execution (Opt_ProblemSolver) of a problem into different API
calls.
Mesh-based problems. Opt also includes primitives for defining
energies on graphs to support meshes or other irregular structures.
Fig. 5 shows an example that smooths a mesh rather than an image.
The Graph function defines a set of hyper-edges that connect entries
in the unknown together. In this example, each edge connects two
entries vertex0 and vertex1, but in general our edges allow an arbitrary number of entries to represent elements, such as three-element
hyper edges to define triangles. Energies can be defined on these
elements, as seen in the regularization term (line 10), which defines
an energy on the edge between two vertices.
Boundaries. Defining energies on arrays of pixels requires handling boundaries. By default an entire energy term is considered to
have zero energy if any of its accesses would be out of bounds, but
we also provide the ability to have custom behavior by querying
whether a pixel is valid (InBounds) and selecting a different expression if it is not (Select):
term = w_reg*(X(0,0) - X(1,0))
Energy(Select(InBounds(1,0),term,0))
Boundary handling is optimized later in the compilation process to
ensure that it does not cause excessive overhead.
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
Pre-computing shared expressions. Energy functions for neighboring pixels can share expensive-to-compute expressions. For instance,
our shape-from-shading example (Sec. 8) uses an expensive lighting calculation that is shared by neighboring pixels. We allow the
user to turn these calculations into computed arrays, which behave
like arrays when used in energy functions, but are defined as an
expression of other arrays:
computed_lighting = ComputedArray(W,H,lighting_calculation(0,0))
Computed arrays can include computations using unknowns, and
are recalculated as necessary during the optimization. Similar to
scheduling annotations in Halide [48], they allow the user to balance
recompute with locality at a high-level.
4
NON-LINEAR LEAST SQUARES OPTIMIZATION
FRAMEWORK
Our optimization framework is a generalization of the design of
application-specific GPU solvers based on the Gauss-Newton approach [30, 54, 55, 68, 72, 73]. However, our solver API abstracts
away the specific algorithm details, allowing us to provide options
for both Gauss-Newton and Levenberg-Marquardt approaches [6, 36,
39]. We first describe the approach our specific solvers use, and then
show how we separate out the details of the application-specific
energy from the solver being used.
In the context of non-linear least square problems, we consider
the optimization objective E : RN → R, which is a sum of squares
in the following canonical form:
E(x) =
R
Õ
fr (x)
•
5
over-constrained and quadratic, the least squares minimizer is the
solution of a linear system of equations. This system is obtained
by setting the partial derivatives to zero, which results in the well
known normal equations:
2 · J(xk )T J(xk )δk∗ = −2 · J(xk )T F(xk )
This process is iterated for K steps to obtain an approximation to
the optimal solution x∗ ≈ xK .
The GN approach can be interpreted as a variant of Newton’s
method that only requires first-order derivatives and requires less
computation. To this end, it uses a first-order Taylor approximation
2(JT J) instead of the real second-order Hessian H.
LM additionally introduces a steering parameter λ to switch between GN and Steepest Descent (SD). To this end, the normal equations are augmented with an additional diagonal term. This is similar
to Tikhonov regularization and leads to:
2(J(xk )T J(xk ) + λ diag (J(xk )T J(xk )))δk∗ = −2J(xk )T F(xk )
The inverse of λ defines the radius of the trust region. LM guarantees convergence by shrinking the trust region radius and resolving
the linear system when a proposed step fails to decrease cost. In the
current LM solvers generated by Opt, we allow users to specify an
initial trust region radius, minimum and maximum radii, and minimum and maximum values to clamp entries of the diagonal damping
matrix. Our specific LM strategy is adapted from the Ceres solver
[1]. In our comparisons, we use the same parameter configuration
for both solvers.
4.1 Parallelizing the Optimization with PCG
2
r =1
The R scalar residuals fr can be general linear or non-linear functions of the N unknowns x. The objective takes the traditional form
used in the Gauss-Newton method:
E(x) = F(x) 2 , F(x) = [f 1 (x), . . . , f R (x)]T
2
The R-dimensional vector field F : RN → RR stacks all scalar
residuals fr . The minimizer x∗ of E is given as the solution of the
following optimization problem:
2
x∗ = argmin E(x) = argmin F(x) 2
x
x
It is solved based on a fixed-point iteration that incrementally computes a sequence of better solutions {xk }kK=1 given an initial estimate x0 . Here, K is the number of iterations; i.e., x∗ ≈ x K . In every
iteration step, a linear least squares problem is solved to find the
best linear parameter update. The vector field F is first linearized
using a first-order Taylor expansion around the last solution xk :
F(xk + δk ) ≈ F(xk ) + J(xk )δk
Here, J is the Jacobian matrix and contains the first-order partial
derivatives of F. By applying this approximation, the original nonlinear least squares problem is reduced to a quadratic problem:
2
δk∗ = argmin F(xk ) + J(xk )δk 2
δk
After the optimal update δk∗ has been computed, a new solution
xk +1 = xk + δk can be easily obtained. Since this problem is highly
The core of the GN/LM methods is the iterative solution of linear
least squares problems for the computation of the optimal linear
updates δk∗ . This boils down to the solution of a system of linear
equations in each step, i.e., the normal equations. While it is possible to use direct solution strategies for linear systems, they are
inherently sequential, while our goal is a fast parallel solution on a
many-core GPU architecture with conceptually several thousand
independent threads of execution. Consequently, we use a parallel
preconditioned conjugate gradient (PCG) solver [63, 73], which is
fully parallelizable on modern graphics cards.
The PCG algorithm and our strategy to distribute the computations across GPU kernels is visualized in Fig. 6. We run a PCGInit
kernel (one time initialization) and three PCGStep kernels (inner PCG
loop). Before the PCG solve commences, we initialize the unknowns
δ 0 to zero. For preconditioning, we employ the Jacobi preconditioner, which scales the residuals with the inverse diagonal of JT J.
Jacobi preconditioning is especially efficient if the system matrix is
diagonally dominant, which is true for many problems; for instance,
the Laplacian operator and most of its variations are diagonally
dominant. When the matrix is not diagonally dominant, we fall back
to a standard conjugate gradient descent by user selection. More
general preconditioners could be provided as a parameter at code
generation time but are not a focus of this paper. A detailed overview
of different preconditioning approaches in parallel solvers is given
in [23], and matrix-free preconditioners are proposed by [4, 69].
We also default to single-precision floating point numbers throughout, which matches the approach of the recent application-specific
6
•
DeVito, Z. et al
PCGInit Kernel
2JT F
r0 =
M
1
F
J
evalJTF()
= 1/Diag(2JT J)
1
p0 = M
r0
↵n0 = reduce(rT0 p0 )
0
rk
M
Residual in the k-th iteration
Pre-conditioner (remains constant)
pk
Decent step in the k-the iteration
↵k = ↵nk /↵dk
=0
k
Load(X,0,0)
Load(A,0,0)
Load(X,1,0)
Load(X,0,1)
w_fit
Apply(-)
Apply(-)
Apply(-)
Apply(*)
Apply(*)
Apply(*)
Vector of original energy terms
Jacobian matrix of F
Step size in k-th iteration
Vector of PCG unknowns in iteration k
for i = 0 to num_linear_iterations:
residuals = { fit , h_reg , v_reg }
PCGStep1 Kernel
gk = 2JT Jpk
applyJTJ()
↵dk = reduce(pTk (gk ))
PCGStep2 Kernel
↵k = ↵nk /↵dk
k+1
=
↵k (gk )
zk+1 = M
nk
1
rk+1
= reduce(zTk+1 rk+1 )
PCGStep3 Kernel
k
=
nk /↵nk
pk+1 = zk+1 +
↵nk+1 =
Fig. 7. The Laplacian example represented in our IR.
Application-specific
solver routines
+ ↵k p k
k
rk+1 = rk
w_reg
k pk
k
Fig. 6. Generic GPU architecture for Gauss-Newton and LevenbergMarquardt solvers whose linearized iteration steps are solved in parallel
using the preconditioned conjugate gradient (PCG) method.
solvers. We believe this strategy is a good compromise between
computational effort and efficiency.
Stencil-based Array Access. Our techniques for parallelizing work
are different for array and graph residuals. For arrays, we group
the computation required for each element in the unknown domain
onto one GPU thread. For a matrix product such as −2JT F, each
row of the output is generated by the thread associated with the
unknown. If the unknown is a vector (e.g., RGB pixel), all channels
are handled by one thread since these values will frequently share
sub-expressions.
The computations in a GPU thread can work matrix-free. For
instance, if they conceptually require a particular partial derivative from matrix J, they can compute it from the original problem
state, which includes the unknowns and any supplementary arrays.
Matrices such as J, which are conceptually larger than the problem state, do not need to be written to memory, which minimizes
memory accesses. Section 5 describes how we automatically generate these computations from our stencil- and graph-based energy
specification.
Graph-based Array Access. For graph-based domains, such as 3D
meshes, the connectivity is explicitly encoded in a user-provided
data structure. Users specify the mapping from graph edges to vertices. Residuals are defined on graph (hyper-) edges and access unknowns on vertices. To make it easy for the user to change the graph
over time, we do not require a reverse mapping from unknowns
to residuals for graphs. Kernels that use the residuals (PCGInit and
PCGStep1) assign one edge in the graph to one GPU thread. Since the
output vectors have the same dimension as the unknowns, we have
to scatter the terms in the residual evaluations into these values. All
threads involving partial sums for a given variable then scatter into
the corresponding parts of variables using a floating-point atomic
addition.
4.2
Modularizing the Solver
A key contribution of our approach is the modularization of the
application-specific components of GPU Gauss-Newton or Levenberg-Marquardt solvers into compartmentalized solver routines. The
first routine, evalF(), simply generates the application specific energy for each residual. It only runs outside of the main loop to report
progress.
evalJTF. The second routine appears in the PCGInit kernel and
is shown in red in Fig. 6. Here, the initial descent direction p0 is
computed using the application-specific evalJTF() routine, which
is generated by our compiler. It computes a matrix-free version of
−2JT F. evalJTF() is also responsible for computing the preconditioner M, which is simply the dot product of a row of JT with itself.
For arrays, a thread computes the rows of an output associated with
one element of the unknown. For graphs, each thread only computes
the parts of the dot product between JT and F which belong to the
handled residual.
applyJTJ. The third routine, applyJTJ(), is part of the inner PCG
iteration. It computes the multiplication of 2JT J with the current
descent direction pk , and incorporates the steering factor λ when
using Levenberg-Marquardt. Handling arrays and graphs is similar
to evalJTF(). It tends to use more values since it needs to compute
entries from both J and JT . For many problems this routine is the
most expensive step, so it has to be optimized well.
evalJ. While evalJTF and applyJTJ are used in matrix-free code,
in some cases materialized matrices are faster. In these cases, our
solvers can use the evalJ routine which calculates individual entries
in J that the solver can materialize in memory.
5 GENERATING SOLVER ROUTINES
A key idea of Opt is that we can exploit the regularity of stenciland graph-based energies to automatically generate applicationspecific solver routines. We represent the mathematical form of the
energy as a DAG of operators which we refer to as our intermediate
representation (IR). We transform the IR to create new IR expressions needed for evalJTF(), applyJTJ(), and evalJ(). This process
requires partial derivatives of the energy. We then optimize this IR
and generate code that calculates it.
5.1
Intermediate Representation
Since the Opt language is embedded in Lua, we generate the IR
by running the Lua program which uses overloaded operators to
build the graph. Fig. 7 shows the IR that results from the Laplacian
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
-- generates the derivative of expression with respect to variable
function derivative(expression, variable)
if a cached ver sion of this par t ial der ivat ive ex ist s then
return the cached ver sion
elseif expression == variable then
return 1
end
result = 0
for i = 0, the number of ar дument s used by expr ession do
result += derivative(argument[i],variable)*partial[i]
end
cache and r etur n result
end
Fig. 8. Pseudocode of the OnePass algorithm for generating derivatives.
partial[i] is the partial derivative of the particular operator (e.g., *) with
respect to the argument i, which is defined for each operator.
example. Roots of the IR are residuals that we want to compute.
Leaves are constants (e.g., w_fit), input data (e.g the known image
A(0,0)), and the the unknown image (e.g., X(0,0)). We de-duplicate
the graph as it is built, ensuring common-subexpressions are eliminated. We scalarize vectors from our frontend in the IR to improve
the simplification of expressions that become zeros during differentiation.
5.2
Differentiating IR
Since we do not always store the Jacobian J in memory, we need
to generate residuals on-the-fly. The approach we use for differentiation is similar to Guenter’s D? [26]. It symbolically generates
new IR that represents a partial derivative of an existing IR node.
Unlike traditional symbolic differentiation (e.g., Mathematica), differentiation is done on a graph where terms can share common
sub-expressions. In our implementation we use OnePass, a simplification of D? that can achieve good results by doing the symbolic
equivalent of forward auto-differentiation [27]. Pseudocode for the
algorithm is given in Fig. 8. It works by memoizing a result for each
partial derivative and generates a new derivative of an expression
by propagating derivatives from its arguments via the chain rule.
5.3
Generating IR for Matrix Products
The IR for evalF() is simply the input energy IR. We generate IR for
evalJTF(), applyJTJ(), and evalJ() as transformations of this input
IR. The first two terms are conceptually derived from matrix-matrix
or matrix-vector multiplications of the Jacobian. Since we compute
these values matrix-free, we must generate the IR that will calculate
the output given our specific problem. Each term has two versions:
one for handling stencil-based and one for graph-based residuals.
5.3.1 Stencil Residuals. Our solver calls applyJTJ() to calculate a
single entry of g, where g = 2JT Jp per thread. We need to determine
which values from J are required and create IR that calculates them.
The non-zero entries in J are determined by the stencil of a particular
problem. Fig. 9 illustrates the process of discovering the non-zeros. In
the Laplacian case, the partials used in these expressions are actually
constants because it is a linear system. However, Opt supports the
generic non-linear case, where the partials will be functions of the
unknown.
•
7
The pseudocode to generate JT J for stencils is shown in Fig. 10.
It first finds the residuals that use unknown x0,0 because they correspond to the non-zeros of JT . Some of these residuals are not
actually defined at pixel (0, 0), but use x0,0 from neighboring pixels.
To find them, we exploit the fact that stencils are invertible. For each
residual template in the energy, we examine each place it uses an
unknown xi, j . We then shift that residual on the pixel grid, taking
each place it loads a stencil value and changing its offset by (−i, −j),
which generates a residual in the grid that uses x0,0 . We find all
the residuals using x0,0 by repeating the process for each use of
an unknown in the template. While we only allow constant stencil
offsets, in principle this approach will work for any neighborhood
function which is invertible.
For each discovered residual, we need the other unknowns it
uses which are found by examining the IR symbolically. We then
generate the expressions for the part of the matrix-vector products
that calculate g0,0 . In this code, we symbolically compute the partial
derivatives that are the entries of J.
5.3.2 Graph Residuals. For graphs, residuals are defined on hyperedges rather than on the domain of the unknown and our solver
routines are mapped over residuals directly so we do not need an
inverse mapping from unknown to residual. Instead one thread
computes the part of an output that relates to the residual. Pseudocode to generate applyJTJ() for graphs is given in Fig. 11. At each
residual, it generates one row of Jp, and then performs the part of
the multiplication for the rows of g that include partials for that
residual. The output of this routine is a list of IR nodes that are
atomically added into entries of g.
5.3.3 Variants. The approach to generate evalJTF() and evalJ()
is similar to that of applyJTJ(). The routine create_jtf() is used to
generate the expression r = −2JT F. Each row of JT can be obtained
using the same approach previously described. The partials in this
row are then multiplied directly with their corresponding residual
term in F. Similarly, the routine create_j() simply produces all the
non-zero derivatives for a particular residual that can be stored by
the solver for use in materialized approaches.
In LM we additionally need the term λ diag(JT J), which is inserted
into the applyJTJ() routine when needed.
6 OPTIMIZING GENERATED SOLVER ROUTINES
We need to translate the IR for evalF(), evalJTF(), applyJTJ(), evalJ()
into efficient GPU functions. We simplify the IR based on polynomial
simplification rules, optimize the handling of boundary condition
statements, and schedule the IR which generates GPU code.
Polynomial Simplification. Taking the derivative of the IR tends
to introduce more complicated IR. In particular, the application of
the multi-variable chain rules introduces statements of the form
d 1 ∗ p1 + d 2 ∗ p2 + ... for each argument of an operator. Often some
partials are zero, and terms in the sum can be grouped together. We
take the approach of other libraries like SymPy [52] and represent
primitive math operations as polynomials. In particular, additions
and multiplications are represented as n-ary operators rather than
binary, and we include a pow operator that raises an expression to
a constant ac . Where possible, primitives are represented in terms
8
•
DeVito, Z. et al
(b) Actual residuals mapped over
the entire image.
(a) Example residual terms
fit: w_fit*(X(0,0) - A(0,0))
h_reg: w_reg*(X(0,0) - X(1,0))
v_reg: w_reg*(X(0,0) - X(0,1))
(c) Residuals using a specific unknown x0,0
x0,1
v reg0,0
x0,0
x-1,0
v reg0,0
Residual template
fit0,0
h reg-1,0
h reg0,0
v reg0,-1
h reg0,0
fit0,0
h reg0,0 h reg-1,0
dfit0,0
dx0,0
dh reg0,0 dh reg-1,0
dx0,0
dx0,0
fit0,0
dv reg0,0 dv reg0,-1
dx0,0
dx0,0
h reg0,0
J
dh reg0,0
dx0,0
dh reg-1,0
dx0,0
v reg0,0
dv reg0,0
dx0,0
v reg0,-1
dv reg0,-1
dx0,0
residuals →
Rows are required for each
non-zero column required in
T
residuals →
x1,0
x-1,0
p
x0,1
x0,-1
dfit0,0
dx0,0
h reg-1,0
2
unknowns →
unknowns →
x0,0
v reg0,0 v reg0,-1
Row corresponding to g0,0 has non-zeros
for each residual containing x0,0
=
fit0,0
dh reg0,0
dx1,0
p0,0
x0,0
p1,0
x1,0
p-1,0 x-1,0
dh reg-1,0
dx-1,0
dv reg0,0
dx0,1
p0,1
dv reg0,-1
dx0,-1
x0,1
p0,-1 x0,-1
unknowns →
←required row→
x1,0
x0,-1
(d) Representation of non-zero entries in the expression g = 2JT Jp that are required to calculate g0,0
g
J
JT
g0,0
relative index
to center pixel
non-zero columns where each
individual residual has support
unknowns →
(e) Matrix free expression for g0,0
g0,0 = 2
dh reg0,0
dh reg0,0 dh reg0,0
dfit0,0 dfit0,0
p0,0 + 2
(
p0,0 +
p1,0 ) + ... = 2w fit2 p0,0 + 2w reg(w regp0,0 +
dx0,0 dx0,0
dx0,0
dx0,0
dx1,0
from J
T
w regp1,0 ) + ...
from J
Fig. 9. The process our compiler uses for generating applyJTJ() at a high-level. (a) The input to this transformation is a list of individual residuals defined in
the IR (fit, h_reg, v_reg) that form a template. (b) The residual template is repeated over the image to generate the actual energy function. (c) The compiler
considers a specific unknown x0, 0 , here shown with the residuals that refer to it, which are computed by the compiler. Unknowns and residuals are named
relative to this pixel (e.g., h_reg-1, 0 is the horizontal residual from the pixel to the left). (d) The compiler then symbolically forms the result of g = 2JT Jp, here
shown with the components needed to generate g0, 0 . The row of JT corresponding to unknown x0, 0 is needed. It has one non-zero for each residual in (c). This
row will be multiplied against Jp. The only rows of Jp needed correspond to the residuals appearing in JT since other rows will be multiplied by 0. A row of Jp is
calculated by multiplying non-zero entries in a row of J, which occur each time a residual uses an unknown, against the corresponding row of p. (e) Finally, the
compiler forms a matrix-free version of the expression for g0, 0 implied by the matrix multiplications, calculating each partial using one-pass differentiation.
of these operators. For instance a/b is represented as ab −1 and
a − b as a + −1 ∗ b. Polynomial representation makes it easier to
find opportunities for optimization such as constant propagation
when the optimization first requires re-associating, commuting, or
factoring expressions.
Importantly, the polynomial representation also gives our scheduler freedom to reorder long sums and products to achieve other
goals, such as grouping terms with the same boundary statement
into a single if-statement or minimizing register pressure.
During construction we optimize non-polynomial terms using
constant propagation and applying algebraic identities. Before lowering into code, we also apply a factoring pass that applies a greedy
multi-variate version of Horner’s scheme [10] to pull common factors out of large sums.
.
Bounds Optimization. Boundary conditions introduce another
source of inefficiency. Opt uses InBounds and Select to create boundary conditions and masks. Translating these expressions to code
can introduce inefficiency in two ways. First, it is possible for the
same bound to be checked multiple times. This frequently occurs
in applyJTJ() when two partials are multiplied together since both
partials often contain the same bound. Redundant checks also occur when reading from arrays since Opt must always check array
bounds to avoid crashes. This check is often redundant with a Select
already in the energy. Secondly, without optimization, Select statements need to execute both the true and false expressions. For many
cases, this means that large parts of the IR, including expensive
reads from global memory, do not actually need to be calculated but
are performed anyway.
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
function create_jtj(residual_templates,X,P)
P_hat = 0
residuals = residuals_including_x00(residual_templates)
foreach residual do
dr_dx00 = differentiate(residual,X(0,0))
foreach unknown u used by residual do
dr_du = differentiate(residual,u)
P_hat += dr_dx00*dr_dx*P(u.offset_i,u.offset_j)
end
end
return 2*P_hat
end
function residuals_including_x00(residual_templates)
residuals = {}
foreach residual_template do
foreach unknown x appear inд in residual_template do
-- shift the template such that x is centered (i.e. it is x00)
R = shift_exp(residual_template,-x.offset_i,-x.offset_j)
table.insert(residuals,R)
end
end
return residuals
end
function shift_exp(exp, shift_i, shift_j)
r epl ace each access of any imaдe at (x,y) in exp
wit h an access at (x + shift_i,j + shift_j)
end
Fig. 10. Pseudocode of the compiler transformation that Opt uses to generate JT J from residual templates.
function create_jtj_graph(graph_residuals)
foreach graph_residual do
Jp = 0
-- handle Jp multiply against this residual
foreach unknown u appear inд in graph_residual do
dr_du = differentiate(graph_residual,u)
Jp += dr_du*P(u.index)
end
-- handle partial sums for Jt*Jp
foreach unknown u appear inд in graph_residual do
dr_du = differentiate(graph_residual,u)
inser t at omic scat t er :
P_hat(u.index) += 2*dr_du*Jp
end
end
return set of atomic scatters
end
Fig. 11. Pseudocode of the compiler transformation that Opt uses to generate JT J for graph residual terms.
The common approach of generating two versions of code, one
for the boundary region and a bounds-free one for the interior, is
less effective on GPUs because they group threads into wide vector
lanes of 32 elements, which increases the size of the boundary by
the vector width. For smaller sized problems, large portions of the
image fall in the boundary region.
Instead, we address these two sources of inefficiency directly. We
address the redundant bounds checks by augmenting our polynomial simplification routines to handle bounds as well. We represent bounds internally as polynomials containing boolean values
b that are either 0 or 1. A Select(b,e_0,e_1) is then represented
as b*e_0 + ~b*e_1. We simplify booleans raised to a power b e to
b. This representation allows polynomial simplification rules to remove redundant bounds through factoring. We favor booleans over
other values during factoring to ensure this simplification occurs.
•
9
We address excessive computation and memory use due to bounds
by determining when values in the IR need to be calculated. We
associate a boolean condition with each IR node that conservatively
bounds when it is used. These conditions are generated at Select
statements and propagated to their arguments. To improve the
effectiveness of this approach, we split large sums into individual
reductions that update a summation variable. Each reduction can
then be assigned a different condition. When we actually schedule
code, we will only execute the code if its condition is true.
Scheduling and Code Generation. We translate optimized IR into
actual GPU code by scheduling the order in which the code executes
the IR. Our scheduler uses a greedy approach that is aware of our
boundary optimizations. It starts with the instructions that generate
the output values and schedules backwards, maintaining a list of
nodes that are ready to be scheduled according to their dependencies.
It iteratively chooses an instruction from the ready list that has the
lowest cost, schedules it, and updates the list. Our cost function
first prioritizes scheduling an instruction with the same condition as
the previous instruction, grouping expressions that have the same
bounds together into a single if-statement. It then prioritizes choices
that greedily minimize the set of live variables at that point in the
program, which can provide a small benefit for large expressions.
We also prioritize the instruction that has been ready the longest,
which also helps reduce the required registers [57].
We translate the scheduled instructions into GPU code using
Terra [16]. Terra is a multi-stage programming language with metaprogramming features that allow it to generate high-performance
code dynamically. We use its GPU backend to produce CUDA code
for the solver routines. To improve the performance, we automatically generate code to bind and load input data from GPU textures.
In addition to having better caching behavior, textures also can perform the bounds check for loads automatically. Finally, the solver
routines are inlined into the generic solver framework presented
earlier. Because this code is compiled together, there is no overhead
when invoking solver routines.
7 METAPROGRAMMING FLEXIBILITY
Our architecture separates the specification of the energy using the
Opt language from the specification of the LM/GN solvers, which
interact with the energy only through the abstract solver routines
generated by the compiler. This design facilitates various forms of
experimentation to produce fast and effective solvers. These choices
can be made quickly by changing flags in Opt.
LM vs. GN. For matrix-free code, it can take significant effort
to add LM extensions to a custom GN solver just to check if they
are needed. The application of JT J specifically requires additional
energy-specific code that can involve potentially complicated derivatives. In Opt, a single flag enables LM while leveraging the GN
solver routine generators that are combined with the LM-specific
extensions. This allows for the speed of GN when possible, but the
convergence guarantees of LM when necessary.
Matrix-free vs. Materialized. A key insight of previous hand-written
GPU methods [73] adapted by our framework is that it is sometimes
more efficient to compute J in-place rather than store J or JT J as a
10
•
DeVito, Z. et al
sparse matrix. This approach can be faster for two reasons. First,
the locations of the non-zero entries in the matrix are implicitly
represented by the problem domain (either an image or a graph),
and are not loaded explicitly. Second, entries in the matrix can often
be recomputed using less total memory bandwidth than loading the
full J matrix. In the extreme case, such as Poisson Image Editing described in the next section, the matrix is constant and the non-zeros
can be folded directly into the code. However, this does not apply for
compute-intense problems such as fully-differentiated Cotangentweighted Laplacian Smoothing, described in the appendix, where
the compute cost dominates bandwidth.
Opt addresses this trade off by allowing the (gradual) choice
between matrix-free and fully-materialized operations. Opt can
use either a matrix-free or materialized approach. The matrix-free
approach uses applyJTJ(), while the materialized approach uses
evalJ() to materialize J to GPU memory.
In our current implementation, we then use cuSPARSE, a highperformance GPU sparse matrix library, inside our materialized
PCG solver [46]. This pathway can be extended to work with any
GPU sparse solver.
We can also represent hybrid approaches where expensive intermediates are materialized using ComputedArray annotations in the
energy. The remaining parts of the computation are still computed
on demand. This middle ground is sometimes more efficient and is
easy to investigate using annotations; see our Shape from Shading
example in Fig. 17.
Numerical Precision. Opt also allows users to switch between float
and double precision depending on the needs of the application and
the capability of the GPU compute platform. Although most our
graphics example problems are well-conditioned enough for floating
point precision, one might want to trade speed for more stability
for ill-conditioned problems; for a detailed numeric evaluation on a
standard optimization benchmark, we refer to the appendix.
Variants of Standard LM/GN. Many other kinds of solvers are also
just variants of LM/GN that can fit into the Opt model. For instance,
`p problems of the form
E(x) =
R
Õ
fr (x)
p
r =1
which solve for norms other than L 2 can be computed using Iteratively re-weighted least squares (IRLS), which iteratively solves
the least squares problem
E(x) =
R
Õ
2
w i fr (x)
r =1
p−2
where fr (x) is a normal least squares function and w i = fr (x)
is fixed for the current iteration. Opt realizes these iterative solves
by specifying the w i computation as fixed rather than part of the
unknown; thus, no derivatives are computed. The example of Intrinsic Images, described in detail in the appendix, uses this type of
solver to enforce sparsity on the solution.
Robust kernels are another common approach for non-linear least
squares optimization problems in computer vision. Here, auxiliary
variables are introduced in order to determine the relevance of a
2
data term in part of the optimization formulation. The Robust Mesh
Deformation example in the appendix shows how this approach can
be naturally expressed in Opt.
For some problems, such as Dense Optical Flow, described in
the appendix, unknowns are used to sample values from constant
images. We support this pattern using a sampled image operator,
which can be accessed with arbitrary (u, v) coordinates. When these
coordinates are dependent on the unknown image, the user provides
the directional derivatives of the sampled image as other input
images, which will be used to lookup the partials for the operator
in the symbolic differentiation.
Domains. Opt is able to exploit the implicit structure and connectivity of general n-dimensional arrays. In addition to images,
optimizations are often performed on volumetric grids (e.g., [30, 72]
or time-space (e.g., [62]) domains, all of which are subsets of n-D
arrays and fall within the scope of Opt. Volumetric Mesh Deformation, as described in the appendix, is an example of solving for
unknowns on a 3-D array.
Opt efficiently handles large numbers of unknowns at each location in a regular array. For example, the Embedded Deformation
example, described in the appendix, uses 12 unknowns per vertex.
Opt also efficiently handles explicit structure, provided in the
form of general graphs. These domains include manifold meshes
and general non-manifolds. For instance, non-rigid mesh deformation approaches (e.g., [50, 51]) fall into this category, as well as
widely-used global bundle adjustment methods [2, 49, 58]. Cotangent Laplacian Smoothing, described in the appendix, provides a
graph connecting the wedge of triangles at each edge together using
graph hyper-edges.
Our abstraction also allows the energies on mixed domains. For
example, an objective may contain dense regularization terms affecting every pixel of an image and a sparse set of correspondences
from a fitting term. Here, the regularization energy is implicitly
encoded in a 2D image domain, and the data term may be provided
by a sparse graph structure.
On all of these domains, Opt provides automatic derivation of
objective terms, and generates GPU solvers specifically optimized
for a given energy function at compile time.
Multi-pass Optimization. In many scenarios, solving a single optimization is not enough, but instead requires multiple passes of different non-linear solves. Often, hierarchal, coarse-to-fine solves are
used to achieve better convergence, or sometimes problem-specific
flip-flop iteration can be applied (e.g., ARAP flip-flop by Sorkine
and Alexa [50]). Another common case are dynamic changes in the
structure of the optimization problem. For instance, fitting a mesh
to point-cloud data in a non-rigid fashion is typically achieved by
searching for correspondences between optimization passes (e.g.,
non-rigid iterative closest point) [38, 73]. Changes to the correspondences also change the structure of the sparse fitting terms.
In all of these examples, custom code is required at specific stages
during optimization. To support this code in Opt, we take an approach similar to multi-pass rendering in OpenGL. Between iterations of the Opt solver or between entire solves, users can perform arbitrary modifications to the underlying problem state in
C/C++. Optimization weights can be changed (e.g., for parameter
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
Energy Length in Opt
ARAP Image Warping Interactively edit 2D images by
warping them using an as-rigid-as-possible warping energy.
ARAP Mesh Deformation Deform a mesh using an asrigid-as-possible warping energy.
Shape From Shading Refine depth data from RGB-D
scanners using a detailed color image and an estimate of
lighting based on spherical harmonics.
Poisson Image Editing Splice a source image into a
target image without introducing seams.
3D LARAP Mesh Deformation Warp a mesh using an
underlying 3D volumetric grid.
Embedded Deformation Perform mesh deformation by
solving a full affine transformation per vertex.
Cotangent Mesh Smoothing Smooth a mesh while
preserving the areas of triangles adjacent to each edge.
Optical Flow Compute the apparent motion of objects
between frames of video at the pixel level.
Robust Mesh Deformation A version of ARAP Mesh
Deformation that adds a robust kernel.
Intrinsic Image Decomposition Separate an image into
its reflectance and shading components.
21 lines
vs. 280 custom
18 lines
vs. 200 custom
96 lines
vs. 445 custom
13 lines
vs. 67 custom
21 lines
34 lines
32 lines
20 lines
27 lines
32 lines
Fig. 12. Example applications written in Opt used in our evaluation. As a
proxy for simplicity of implementation, lines of code for the energy in Opt
are listed on the right, along with lines of code for the energy-specific code
required by handwritten custom solvers when available. Both numbers do
not include CPU code for data marshaling and setup.
relaxation), underlying data structures may be dynamically updated
(e.g., correspondence search or feature match pruning in bundle
adjustment problems), or hierarchical and flip-flop strategies can be
applied using multiple-passes. This approach allows Opt to support
a wide range of solver approaches, while still providing an efficient
optimization backend for their inner kernels.
8
EVALUATION
To evaluate Opt, we implemented several optimization problems
in the language which are summarized in Fig. 12, and described
in more detail in the appendix. These include variants of image,
volume, and mesh-based problems from the graphics and vision
literature. We evaluate overall performance by comparing Opt to
four state-of-the-art application-specific matrix-free solvers optimized for GPUs and to five solvers using the high-level Ceres library [1]. We further evaluate the benefits and tradeoffs of Opt’s
ability to generate matrix-free, fully-materialized, or intermediate
solver variants. We also show the efficiency of our automaticallygenerated solver routines (e.g., applyJTJ) by comparing them to
hand-optimized equivalents. Finally, we implement five other problems which demonstrate the generality and expressiveness of Opt,
referenced in Sec. 7, and described in detail in the appendix. The
Opt code used for the energies of each example is also provided in
the appendix.
Results are reported as throughput on entire solve steps using
a GeForce 1080 GTX, and for CPU results, an Intel Core i7-6700K
CPU 4.00 GHz.
8.1
•
11
Comparison with Custom Solvers
We compare solvers generated by Opt to existing state-of-the-art
CUDA-based application-specific matrix-free solvers optimized for
GPUs for ARAP Image Warping, Shape From Shading, ARAP Mesh
Deformation, and Poisson Image Editing. Each of the original solvers
took months to write, debug, and optimize in CUDA. As a concrete
example, debugging the hand-written matrix-free application routine in the custom ARAP image warping originally took weeks due
to the complicated cross terms that create dependencies between
offsets of one pixel and the angles at a neighbor. In these comparisons, we select the Gauss-Newton backend of Opt to match the
algorithmic design in the hand-written reference implementations.
The Opt solvers are both significantly easier to write and faster
than the handwritten application-specific solvers. In Opt, the energies for each problem could be written in tens of lines of code
(Fig 12). Furthermore, Opt outperforms the handwritten solvers for
all these example problems by 10-75%, see Fig. 13.
Opt can outperform custom solvers because all Opt solvers benefit
from optimizations made to the system. The Opt solver for ARAP
Mesh Deformation runs 55% faster than custom code due to our
reduction-based approach for calculating residuals. In the original
solver, the authors only tried the simpler approach of using one pass
to compute t = (Jp) and a second for JT t. Opt’s high-level model
allowed us to experiment with different approaches more easily
during development. In Shape From Shading, the Opt solver runs
more than 30% faster than the handwritten CUDA solver. Some of
this improvement is due to using texture objects to represent the
images, which is an optimization that the original authors did not
have time to implement. The ARAP Image Warping solver generated
by Opt runs about 75% faster (likely due to better bounds handling)
than the handwritten CUDA solver we compare against.
Since Poisson Image Editing is a linear problem, we also compare against a custom Cholesky solver with pre-ordering using
Eigen [25], a high-performance linear-algebra library for CPUs. The
Gauss-Newton method handles linear least-squares problems in a
unified way that does not require algorithmic changes. When all
residuals are linear functions of the unknowns, J just becomes a constant matrix independent of x. All second order derivatives are zero,
which implies that the Gauss-Newton approximation is exact and
the optimum can be reached after a single non-linear iteration. The
entire Opt solve was 50 times faster than Eigen’s matrix solve (not
including its matrix setup time), due to Opt’s ability to implicitly
represent the connectivity of the matrix.
8.2 Comparison with General Purpose Solver
We also compare Opt against the high-level Ceres library, which
is also able to generate a solver using only an energy specification
but does not support GPU or matrix-free execution. The solvers
generated by Opt are 1–3 orders of magnitude faster than Ceres on
our example problems (Fig 13). For accurate comparison, we setup
both Opt and Ceres to use the same LM configuration, and plot their
convergence over time in Fig 14. To get the fastest results for the
internal linear system, we configure Ceres to use its parallel PCG
solver for Image Warping and Shape From Shading, and Cholesky
factorization for Mesh Deformation.
12
• DeVito, Z. et al
Image Warping
Ceres (CPU)
.00236MP/s
Hand-written
CUDA
Opt
0!
0.05!
0.1!
Ceres (CPU)
0.15!
0.2!
0.25!
0.3!
Throughput (mega-pixels/s)
ARAP Mesh Deformation
.528 KV/s
of each non-linear iteration, using the ComputedArray construct
described in Sec. 7.
We show the performance of the linear iterations for different materialization strategies on Shape From Shading in Fig. 17. The linear
iterations are most efficient when we materialize the (computeintensive) lighting term and its gradient, but recompute the rest of
the Jacobian every linear iteration in a matrix-free approach.
Hand-written
CUDA
8.4
Opt
0!
5!
Shape From Shading
Ceres (CPU)
10!
Throughput (kilo-vertices/s)
15!
20!
.00356 MP/s
Hand-written
CUDA
Opt
0!
0.5!
1!
1.5!
2!
2.5!
3!
25!
30!
Throughput (mega-pixels/s)
Poisson Image Editing
.501 MP/s
Eigen (CPU)
Hand-written
CUDA
Opt
0!
5!
10!
15!
20!
Throughput (mega-pixels/s)
Fig. 13. The solvers generated by Opt perform better than applicationspecific GPU solvers, despite requiring significantly less effort to implement.
Additionally, they outperform Ceres implementations by up to three orders
of magnitude, despite requiring similar implementation effort.
One reason Opt is faster than Ceres is because Opt can represent the connectivity of problems on image and n-D array domains
implicitly through stencil relations, while Ceres requires the user
to specify energies using a graph formulation. The performance
difference for Mesh Deformation is less dramatic than image-based
examples because in this case Opt needs to load the connectivity
of the problem from the graph data structure. However, Opt still
benefits from repetitive stencil terms that are embedded in the generated code, as well as the massive parallelization of the GPU-based
solver and on-the-fly computations. The Opt generated solver runs
over 720 times faster on Shape From Shading, a relatively complex
problem, due in part to a smart materialization strategy enabled by
Opt, see Sec. 8.3. The performance benefits of Opt become more
pronounced as problem size increases (Fig 15).
8.3 Matrix-free vs. Materialized Solvers
As mentioned in Sec. 7, a powerful property of Opt is the ability to
use matrix-free representations or hybrid representations while still
supporting fully materialized solvers. We show the difference between matrix-free and materialized approaches in Fig 16. Here, Opt
uses cuSPARSE for the inner multiply of the PCG solver [46]. Note
that cuSPARSE only provides the functionality for linear algebra
and by itself it cannot tackle non-linear least squares problems due
to a lack of auto- or symbolic differentiation.
Except for the highly non-linear Cotangent-weighted Laplacian
Smoothing problem, all examples perform between 1.16 and 3 times
faster using matrix-free approaches.
Opt also allows for intermediate materialization strategies, which
allows users to choose which terms to precompute at the beginning
Implicit vs. Explicit Connectivity
The examples throughout the paper demonstrate that Opt can handle both implicit connectivity on regular grids and explicit connectivity as specified by hypergraphs. It is difficult to quantify the
performance improvement due to using an implicit representation
of connectivity in general, but we provide a comparison between
the two approaches on the Image Warping example in Fig. 18. We
compare the performance of Opt using a Gauss-Newton solver over
the standard regular grid representation of an image, and Opt using
a Gauss-Newton solver over an explicit graph representation of
the image. For very small image sizes the performance difference
is minimal, but as image size increases the explicit approach takes
about twice the amount of time to complete. The implicit approach
saves both memory and bandwidth.
8.5
Evaluation of Generated Solver Routines
Our approach relies on the symbolic translations of energy functions
into efficient solver routines using the optimizations described in
Sec. 6. Compared to hand-written code, this code is much easier to
write and maintain, but inefficient translations could make it too
slow. To show the effectiveness of our symbolic translations and
optimization, we compare our generated solver routines to handwritten versions that were taken from the pre-existing CUDA code
and slotted into our solver.
Fig. 19 shows the results of our optimizations compared to the
hand-written versions of solver routines ported from the CUDA
examples and modified to use texture loads. The baseline (labeled
"none" in the figure) roughly simulates how an auto-differentiation
approach based on dual numbers would perform.
Our optimizations increase performance up to 8x in the case of
Shape From Shading, and are necessary for Opt to perform at or
above the speed of hand-written code. Performing polynomial simplifications improves the results of all examples. The improvement is
more pronounced for the image-based examples, probably because
graph-based examples are bottle-necked by fetching sparse data
from memory rather than by the expressions themselves.
Our optimizations remove redundant bounds checks and unnecessary reads that can occur when compiling expressions that test
boundary conditions. They include representing bounds as booleans,
factoring the bounds out of polynomial terms, and scheduling expressions to run conditionally. They provide a significant improvement for both Shape From Shading and Image Warping. Mesh Deformation does not improve because it does not use Select.
Shape From Shading shows a significant benefit from texture use,
and our register minimization heuristic provides a small benefit to
Shape From Shading’s JTJ function.
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging •
13
}
756x
}
33.5x
}
101x
}
722x
Fig. 14. Convergence of both Opt and Ceres over time, including both double/single precision and GN/LM solvers for Opt. Per non-linear iteration (left), Opt
LM and Ceres converge at the similar rates, but Opt converges faster over time (right) by completing each iteration up to several orders of magnitude quicker.
Cost and time are both presented using log scale, while iteration count is linear. Vertical lines are drawn for each solver type at the iteration and time when
their cost dips below the final Ceres iteration. The performance gap for the fastest Opt solver variant (single-precision GN) versus Ceres is highlighted on each
of the graphs on the right. Even the full double-precision Opt LM implementation (often the slowest variant) outperforms Ceres by over an order of magnitude
on all problems.
14
•
DeVito, Z. et al
}
}
34x
215x
Fig. 15. Performance of Opt compared to Ceres (using a direct Cholesky solver or an iterative PCG for the linear solve) as problem size increases on two
example problems. Both unknown count and time to convergence are presented in log scale. Image Warping (left), which uses implicit connectivity in Opt, has
more drastic performance differences than ARAP Mesh Deformation (right). For small problems (<5k unknowns in these examples), GPU solvers are inefficient,
but the Opt generated solvers rapidly become significantly faster than their Ceres equivalent as problem size increases.
Performance of Materialization Strategies
Shape From Shading Materialization
Fig. 17. Opt lets programmers specify hybrid materialization approaches,
which are sometimes more efficient than either full matrix-free, or fully
materialized approaches. Here, we show different strategies for the Shape
From Shading example. Materializing just the lighting term (Lighting) outperforms fully matrix free, and fully materialized by 2-7x.
Fig. 16. Comparison of the performance between the fully materialized
and the best matrix-free variant available in Opt, measuring the speed of
a linear iteration in PCG. The matrix-free approach is more efficient in all
cases besides Cotangent-weighted Laplacian Smoothing. The materialized
version creates the JT J matrix outside of the PCG loop. This incurs a onceper-PCG-solve cost not captured by these graphs, so materialized versions
will perform even worse than reported here when there are a small number
of inner PCG iterations.
our specific optimizations are tailored to GPUs, the overall approach
of symbolically calculating and simplifying functions needed by the
solver is applicable to other platforms such as multi-core CPUs, or
even networked clusters of machines for large problems.
Finally, there are a lot of optimization problems in graphics that
are not suited to the Gauss-Newton or Levenberg-Marquardt approach. Many optimization problems in the graphics literature are
more efficiently solved using other techniques such as shape deformation with an interior-point optimizer [37] or mesh parametrization using quadratic programming [31]. Although these problems
are not the focus of this paper, their solvers would also benefit from
the architecture proposed in Opt, where a general solver library is
augmented with automatically derived application-specific routines.
8.6 Limitations and Future Work
9 CONCLUSION
Currently the Opt language limits what energies can be expressed
efficiently. On images, our implementation limits energies to a
constant-sized neighboring stencil. However, we can extend Opt to
support other neighborhood functions such as affine transformations of indices as long as the neighborhood function is invertible.
We also plan to extend our graph language to support the ability to
reference a variable number of neighbors (such as the edges around
a vertex) to make certain energies easier to express. While some of
We have introduced Opt, a domain specific language that generates high-performance, application-specific GPU solvers from a
high-level energy description based on stencils and graphs. Solvers
generated with Opt are not only orders of magnitude faster than
Ceres, but also outperform state-of-the-art hand-coded applicationspecific solvers which have been tuned with many month of tedious
implementation effort. Opt is also highly flexible: it can generate
solvers with either floating or double point precision, solvers that
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging •
} 2.05x
[6]
[7]
[8]
[9]
[10]
[11]
1.26x
}
[12]
[13]
[14]
Fig. 18. Performance comparison between using the implicit connectivity of
a regular grid for the Image Warping problem versus using an explicit graph
representation. Both unknown count and time to convergence are presented
in log scale. For medium to large size images, the explicit approach takes
twice as long. Here, we configured Opt to produce Gauss-Newton solvers
that run for 8 nonlinear iterations of 100 linear iterations each.
[15]
[16]
[17]
[18]
are matrix-free, materialized, and even intermediate hybrids, and
variations of GN and LM such as IRLS or robust solvers. Further,
Opt provides its own parallel PCG routines to solve for the linear intermediate systems; however, it can also hand off the linear solve to
other GPU solvers such as cuSPARSE. Overall, we believe that Opt’s
approach of using abstracted solvers with automatically-generated
application-specific routines can be extended to work with more expressive energy functions, more platforms beyond GPUs, and more
kinds of solvers. Eventually, we hope that computer graphics and vision practitioners can put most energy functions from the literature
into a system like Opt and automatically get a high-performance
solver. We believe that Opt is a significant first step in this direction.
ACKNOWLEDGMENTS
This work was supported by the DOE Office of Science ASCR in the
ExMatEx and ExaCT Exascale Co-Design Centers, program manager
Karen Pao; DARPA Contract No. HR0011-11-C-0007; fellowships
and grants from NVIDIA, Intel, and Google; the Max Planck Center
for Visual Computing and Communications, and the ERC Starting
Grant 335545 CapReal; and the Stanford Pervasive Parallelism Lab
(supported by Oracle, AMD, Intel, and NVIDIA). We also gratefully
acknowledge hardware donations from NVIDIA Corporation.
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
REFERENCES
[1] Sameer Agarwal, Keir Mierle, and Others. 2010. Ceres Solver. http://ceres-solver.
org. (2010).
[2] Sameer Agarwal, Noah Snavely, Ian Simon, Steven M Seitz, and Richard Szeliski.
2009. Building rome in a day. In Computer Vision, 2009 IEEE 12th International
Conference on. IEEE, 72–79.
[3] Marc Alexa, Daniel Cohen-Or, and David Levin. As-rigid-as-possible Shape
Interpolation (SIGGRAPH ’00). New York.
[4] Stefania Bellavia, Jacek Gondzio, and Benedetta Morini. 2013. A matrix-free
preconditioner for sparse symmetric positive definite systems and least-squares
problems. SIAM Journal on Scientific Computing 35, 1 (2013), A192–A211.
[5] Gilbert Louis Bernstein, Chinmayee Shah, Crystal Lemire, Zachary Devito,
Matthew Fisher, Philip Levis, and Pat Hanrahan. 2016. Ebb: A DSL for Physical
[31]
[32]
[33]
[34]
15
Simulation on CPUs and GPUs. ACM Transactions on Graphics (TOG) 35, 2 (2016),
21.
Ake Björck. 1996. Numerical methods for least squares problems. Siam.
Sergey Bochkanov. 1999. ALGLIB. http://www.alglib.net. (1999).
Nicolas Bonneel, Kalyan Sunkavalli, James Tompkin, Deqing Sun, Sylvain Paris,
and Hanspeter Pfister. 2014. Interactive Intrinsic Video Editing. 33, 6 (Nov. 2014),
197:1–10. DOI:https://doi.org/10.1145/2661229.2661253
Stephen Boyd and Lieven Vandenberghe. 2004. Convex Optimization. Cambridge
University Press, New York, NY, USA.
Martine Ceberio and Vladik Kreinovich. 2004. Greedy Algorithms for Optimizing
Multivariate Horner Schemes. SIGSAM Bull. 38, 1 (March 2004), 8–15. DOI:
https://doi.org/10.1145/980175.980179
Angela Dai, Matthias Nießner, Michael Zollhöfer, Shahram Izadi, and Christian
Theobalt. 2017. BundleFusion: Real-time Globally Consistent 3D Reconstruction
using On-the-fly Surface Reintegration. ACM Transactions on Graphics (TOG) 36,
3 (2017), 24.
Frank Dellaert. 2012. GTSAM. https://collab.cc.gatech.edu/borg/gtsam. (2012).
Ron S Dembo, Stanley C Eisenstat, and Trond Steihaug. 1982. Inexact newton
methods. SIAM Journal on Numerical analysis 19, 2 (1982), 400–408.
Ron S Dembo and Trond Steihaug. 1983. Truncated-newtono algorithms for
large-scale unconstrained optimization. Mathematical Programming 26, 2 (1983),
190–212.
Mathieu Desbrun, Mark Meyer, Peter Schröder, and Alan H. Barr. 1999. Implicit
Fairing of Irregular Meshes Using Diffusion and Curvature Flow (SIGGRAPH ’99).
New York.
Zachary DeVito, James Hegarty, Alex Aiken, Pat Hanrahan, and Jan Vitek. 2013.
Terra: A Multi-stage Language for High-performance Computing (PLDI ’13). New
York, 105–116.
Marek Dvoroznak. 2014. Interactive As-Rigid-As-Possible Image Deformation
and Registration. In The 18th Central European Seminar on Computer Graphics.
R. Fourer, D. M. Gay, and B. Kernighan. 1989. Algorithms and Model Formulations in Mathematical Programming. Springer-Verlag New York, Inc.,
New York, Chapter AMPL: A Mathematical Programming Language, 150–151.
http://dl.acm.org/citation.cfm?id=107479.107491
Michael Grant and Stephen Boyd. 2008. Graph implementations for nonsmooth
convex programs. In Recent Advances in Learning and Control. Springer-Verlag
Limited, 95–110.
Michael Grant and Stephen Boyd. 2014. CVX: Matlab Software for Disciplined
Convex Programming, version 2.1. http://cvxr.com/cvx. (March 2014).
Serge Gratton, Amos S Lawless, and Nancy K Nichols. 2007. Approximate GaussNewton methods for nonlinear least squares problems. SIAM Journal on Optimization 18, 1 (2007), 106–132.
Andreas Griewank and Andrea Walther. 2008. Evaluating Derivatives: Principles
and Techniques of Algorithmic Differentiation (second ed.). SIAM, Philadelphia,
PA, USA.
Marcus J Grote and Thomas Huckle. 1997. Parallel preconditioning with sparse
approximate inverses. SIAM Journal on Scientific Computing 18, 3 (1997), 838–853.
F. Grund. 1982. Automatic Differentiation: Techniques and Applications. Lecture
Notes in Computer Science 120. ZAMM 62, 7 (1982), 355–355. DOI:https://doi.
org/10.1002/zamm.19820620735
Gaël Guennebaud, Benoît Jacob, and others. 2010.
Eigen v3.
http://eigen.tuxfamily.org. (2010).
Brian Guenter. 2007. Efficient Symbolic Differentiation for Graphics Applications
(SIGGRAPH ’07). Article 108.
Brian Guenter, John Rapp, and Mark Finch. 2011. Symbolic Differentiation in GPU
Shaders. Technical Report MSR-TR-2011-31. http://research.microsoft.com/apps/
pubs/default.aspx?id=146019
Felix Heide, Steven Diamond, Matthias Nießner, Jonathan Ragan-Kelley, Wolfgang
Heidrich, and Gordon Wetzstein. 2016. ProxImaL: Efficient image optimization
using proximal algorithms. ACM Transactions on Graphics (TOG) 35, 4 (2016), 84.
Berthold K. P. Horn and Brian G. Schunck. 1981. Determining Optical Flow.
ARTIFICAL INTELLIGENCE 17 (1981), 185–203.
Matthias Innmann, Michael Zollhöfer, Matthias Nießner, Christian Theobalt,
and Marc Stamminger. 2016. VolumeDeform: Real-time volumetric non-rigid
reconstruction. In European Conference on Computer Vision. Springer, 362–379.
Liliya Kharevych, Boris Springborn, and Peter Schröder. 2006. Discrete conformal
mappings via circle patterns. ACM Transactions on Graphics (TOG) 25, 2 (2006),
412–438.
Fredrik Kjolstad, Shoaib Kamil, Jonathan Ragan-Kelley, David IW Levin, Shinjiro
Sueda, Desai Chen, Etienne Vouga, Danny M Kaufman, Gurtej Kanwar, Wojciech
Matusik, and others. 2016. Simit: A language for physical simulation. ACM
Transactions on Graphics (TOG) 35, 2 (2016), 20.
Dana A Knoll and David E Keyes. 2004. Jacobian-free Newton–Krylov methods:
a survey of approaches and applications. J. Comput. Phys. 193, 2 (2004), 357–397.
Rainer Kummerle, Giorgio Grisetti, Hauke Strasdat, Kurt Konolige, and Wolfram
Burgard. 2011. g2o: A general framework for graph optimization. In Robotics and
16
• DeVito, Z. et al
Shape From Shading
speedup over none
8!
8!
JTF
2.5!
JTF
2!
2!
1.5!
Mesh Deformation
JTJ
handwritten
2.5!
2.5!
2.5
JTF
+ register
+ texture
+ bounds
0!
handwritten
none
0!
JTJ
+ poly
0!
+ register
0!
+ texture
0.5!
0.5
+ bounds
0.5!
none
0.5!
+ poly
0.5!
+ register
1!
+ texture
1!
+ bounds
1!
none
1!
+ poly
1.5!
1.5
+ register
1.5!
+ texture
1.5!
+ bounds
2!
none
2!
+ poly
+ register
+ texture
+ bounds
0!
handwritten
none
0!
JTJ
+ poly
2!
2
+ register
2!
+ texture
4!
4
+ bounds
4!
none
6!
+ poly
6!
Image Warping
2.5!
Fig. 19. The effect of our optimizations on generated code for solver routines including polynomial simplification (poly), bounds optimization (bounds), texture
loads (texture), and register minimization (register), compared to a baseline with no optimization (none). The optimizations are necessary to match the
performance of handwritten equivalents, and in many cases the functions run significantly faster.
Automation (ICRA), IEEE Int. Conf. on. IEEE, 3607–3613.
[35] Edwin H. Land and John J. McCann. 1971. Lightness and Retinex Theory. Journal
of the Optical Society of America 61, 1 (Jan. 1971), 1–11. DOI:https://doi.org/10.
1364/JOSA.61.000001
[36] Kenneth Levenberg. 1944. A method for the solution of certain non-linear problems in least squares. Quarterly of applied mathematics 2, 2 (1944), 164–168.
[37] Zohar Levi and Denis Zorin. 2014. Strict minimizers for geometric optimization.
ACM Transactions on Graphics (TOG) 33, 6 (2014), 185.
[38] Hao Li, Bart Adams, Leonidas J Guibas, and Mark Pauly. 2009. Robust single-view
geometry and motion reconstruction. In ACM Transactions on Graphics (TOG),
Vol. 28. ACM, 175.
[39] Donald W Marquardt. 1963. An algorithm for least-squares estimation of nonlinear parameters. Journal of the society for Industrial and Applied Mathematics 11, 2
(1963), 431–441.
[40] Hermann Matthies and Gilbert Strang. 1979. The solution of nonlinear finite
element equations. International journal for numerical methods in engineering 14,
11 (1979), 1613–1626.
[41] Abhimitra Meka, Michael Zollhöfer, Christian Richardt, and Christian Theobalt.
2016. Live Intrinsic Video. ACM Transactions on Graphics (Proceedings SIGGRAPH)
35, 4 (2016). DOI:https://doi.org/10.1145/2897824.2925907
[42] Mark Meyer, Mathieu Desbrun, Peter SchrÃűder, and AlanH. Barr. 2003. Discrete
Differential-Geometry Operators for Triangulated 2-Manifolds. In Visualization
and Mathematics III, Hans-Christian Hege and Konrad Polthier (Eds.). Springer
Berlin Heidelberg, 35–57. DOI:https://doi.org/10.1007/978-3-662-05105-4_2
[43] Stephen G Nash. 2000. A survey of truncated-Newton methods. J. Comput. Appl.
Math. 124, 1 (2000), 45–59.
[44] Jorge Nocedal and Stephen Wright. 2006. Numerical optimization. Springer
Science & Business Media.
[45] J. Nocedal and S. J. Wright. 2006. Numerical Optimization (2nd ed.). Springer,
New York.
[46] NVIDIA 2012. CUDA CUSPARSE Library. NVIDIA.
[47] Patrick Pérez, Michel Gangnet, and Andrew Blake. 2003. Poisson Image Editing. In
ACM SIGGRAPH 2003 Papers (SIGGRAPH ’03). ACM, New York, NY, USA, 313–318.
DOI:https://doi.org/10.1145/1201775.882269
[48] Jonathan Ragan-Kelley, Andrew Adams, Sylvain Paris, Marc Levoy, Saman Amarasinghe, and Frédo Durand. 2012. Decoupling Algorithms from Schedules for
Easy Optimization of Image Processing Pipelines. ACM Trans. Graph. 31, 4, Article
32 (July 2012), 12 pages. DOI:https://doi.org/10.1145/2185520.2185528
[49] Noah Snavely, Steven M Seitz, and Richard Szeliski. 2006. Photo tourism: exploring
photo collections in 3D. In ACM transactions on graphics (TOG), Vol. 25. ACM,
835–846.
[50] Olga Sorkine and Marc Alexa. 2007. As-rigid-as-possible surface modeling. In
Symposium on Geometry processing, Vol. 4.
[51] Robert W. Sumner, Johannes Schmid, and Mark Pauly. 2007. Embedded Deformation for Shape Manipulation (SIGGRAPH ’07). New York, Article 80.
[52] SymPy Development Team. 2014. SymPy: Python library for symbolic mathematics.
http://www.sympy.org
[53] The MathWorks Inc. 2015. MATLAB. (2015).
[54] J. Thies, M. Zollhöfer, M. Nießner, L. Valgaerts, M. Stamminger, and C. Theobalt.
2015. Real-time Expression Transfer for Facial Reenactment. ACM Transactions
on Graphics (TOG) 34, 6 (2015).
[55] J. Thies, M. Zollhöfer, M. Stamminger, C. Theobalt, and M. Nießner. 2016.
Face2Face: Real-time Face Capture and Reenactment of RGB Videos. In Proc.
Computer Vision and Pattern Recognition (CVPR), IEEE.
[56] Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, and
Matthias Nießner. 2016. FaceVR: Real-Time Facial Reenactment and Eye Gaze
Control in Virtual Reality. arXiv preprint arXiv:1610.03151 (2016).
[57] Michael D. Tiemann. 1989. The GNU instruction scheduler. Technical Report.
Cambridge, MA.
[58] Bill Triggs, Philip F McLauchlan, Richard I Hartley, and Andrew W Fitzgibbon.
1999. Bundle adjustmentâĂŤa modern synthesis. In Vision algorithms: theory and
practice. Springer, 298–372.
[59] Daniel Vlasic, Ilya Baran, Wojciech Matusik, and Jovan Popović. 2008. Articulated
mesh animation from multi-view silhouettes. In ACM Transactions on Graphics
(TOG), Vol. 27. ACM, 97.
[60] Daniel Vlasic, Pieter Peers, Ilya Baran, Paul Debevec, Jovan Popović, Szymon
Rusinkiewicz, and Wojciech Matusik. 2009. Dynamic shape capture using multiview photometric stereo. ACM Transactions on Graphics (TOG) 28, 5 (2009),
174.
[61] A. Walther and A. Griewank. 2012. Getting started with ADOL-C. In Combinatorial Scientific Computing, U. Naumann and O. Schenk (Eds.). Chapman-Hall CRC
Computational Science, Chapter 7, 181–202.
[62] Michael Wand, Philipp Jenke, Qixing Huang, Martin Bokeloh, Leonidas Guibas,
and Andreas Schilling. 2007. Reconstruction of deforming geometry from timevarying point clouds. In Symposium on Geometry processing. Citeseer, 49–58.
[63] Daniel Weber, Jan Bender, Markus Schnoes, André Stork, and Dieter Fellner.
2013. Efficient GPU data structures and methods to solve sparse linear systems
in dynamics applications. In Computer Graphics Forum, Vol. 32. Wiley Online
Library, 16–26.
[64] Cornelius Wefelscheid and Olaf Hellwich. 2013. OpenOF: Framework for sparse
non-linear least squares optimization on a GPU. (In VISAPP).
[65] Wolfram Research. 2000. Mathematica. (2000).
[66] SJ Wright and John Norman Holt. 1985. An inexact levenberg-marquardt method
for large sparse nonlinear least squres. The Journal of the Australian Mathematical
Society. Series B. Applied Mathematics 26, 04 (1985), 387–403.
[67] Changchang Wu, Sameer Agarwal, Brian Curless, and Steven M Seitz. 2011.
Multicore bundle adjustment. In Computer Vision and Pattern Recognition (CVPR),
2011 IEEE Conference on. IEEE, 3057–3064.
[68] Chenglei Wu, Michael Zollhöfer, Matthias Nießner, Marc Stamminger, Shahram
Izadi, and Christian Theobalt. 2014. Real-time Shading-based Refinement for
Consumer Depth Cameras. ACM Transactions on Graphics (TOG) 33, 6 (2014).
[69] Wei Xu, Ning Zheng, and Ken Hayami. 2016. Jacobian-Free Implicit Inner-Iteration
Preconditioner for Nonlinear Least Squares Problems. Journal of Scientific Computing (2016), 1–27.
[70] Yuting Yang, Sam Prestwood, and Connelly Barnes. 2016. VizGen: accelerating
visual computing prototypes in dynamic languages. ACM Transactions on Graphics
(TOG) 35, 6 (2016), 206.
[71] Christopher Zach. 2014. Robust bundle adjustment revisited. In Computer Vision–
ECCV 2014. Springer, 772–787.
[72] Michael Zollhöfer, Angela Dai, Matthias Innmann, Chenglei Wu, Marc Stamminger, Christian Theobalt, and Matthias Nießner. 2015. Shading-based Refinement on Volumetric Signed Distance Functions. ACM Trans. Graph. 34, 4, Article
96 (July 2015), 14 pages. DOI:https://doi.org/10.1145/2766887
[73] Michael Zollhöfer, Matthias Nießner, Shahram Izadi, Christoph Rhemann, Christopher Zach, Matthew Fisher, Chenglei Wu, Andrew Fitzgibbon, Charles Loop,
Christian Theobalt, and Marc Stamminger. 2014. Real-time Non-rigid Reconstruction using an RGB-D Camera. ACM Transactions on Graphics (TOG) 33, 4
(2014).
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
APPENDIX
In this Appendix, we provide additional details and evaluations for
Opt. In Sec. A, we detail the descriptions of our test example problems that we have implemented and evaluated in Opt. The problems
are split into two categories; first, those where we compare the performance against other solvers, and second, those that demonstrate
the flexibility of Opt. In Sec. B, we evaluate Opt’s numerical behavior on a standard optimization benchmark. We provide numbers
for different solver variations generated with Opt: float vs. double
and Gauss-Newton vs Levenberg-Marquardt. In Sec. C, we show
how our example problems are written in Opt. We provide the Opt
energies, which are similar to graphics shaders.
A
DETAILED DESCRIPTION OF EXAMPLE PROBLEMS
Along with the main contribution of Opt, we provide 10 different
example optimization problems in Opt. We chose the first four
example applications (see Sec. A.1) since they are commonly used
in graphics research and optimized GPU code previously existed
or could be easily adapted for the problem. For these problems, we
implemented their energies in Opt and compare against previously
written custom CUDA implementations. The hand-written CUDA
baselines are (improved) versions of the authors’ state-of-the-art
implementations. We also implemented these applications in the
Ceres solver for direct comparison to another high-level solver [1].
The remaining applications detailed in Sec. A.2 show how a variety
of different applications can be solved using the Opt programming
model.
A.1 Performance Examples
•
17
Opt performs around 25 times faster than a Ceres example which is
implemented in around 100 lines of code.
A.1.3 Shape From Shading. In the Shape From Shading example, we use an optimizer to refine depth data captured by RGB-D
scanners [68]. It uses a detailed color image and an estimate of the
lighting based on spherical harmonics to refine the lower resolution
depth information.
Shape from Shading, which is adapted from Wu et al.’s work [68],
is our most complex problem. The original implementation was a
patch solver variation of a Gauss Newton solver that used shared
memory at the expense of per-iteration convergence. For a more direct comparison, we ported the original code into a non-patch solver,
which actually improved the convergence time over the author’s
implementation. The CUDA code includes 445 lines to express the
energy, applyJTJ, and evalJTF calculations. It took several months
for a group of researchers to implement and optimize. In comparison, the Opt solver code is around 100 lines and runs more than
30% faster. Some of this improvement is due to using texture objects
to represent the images, which is an optimization that the original
authors did not have time to do.
Shape from Shading also benefits from using pre-computed arrays.
We instruct Opt to pre-compute a lighting term and a boundary
term that are expensive to calculate and used by the energy of
multiple pixels. Without this annotation, Opt runs over 7 times
slower. We expect that other complicated problems will have similar
behavior and pre-computed arrays will give the user an easy way
to experiment with how the computation is scheduled.
A.1.1 Image Warping. As-rigid-as-possible Image Warping is
used to interactively edit 2D shapes in a way that minimizes a
warping energy. It penalizes deviations from local rigidity, while
warping to a set of user-specified constraints [17]. It co-optimizes
the new pixel coordinates along with the per-pixel rotation.
The CUDA implementation was adapted from the hand-written
solver created by Zollhöfer et al. [73] for real-time non-rigid reconstruction. It requires around 480 lines of code to implement.
Of that, 200 were devoted to the Gauss-Newton solver, and 280 to
expressions for the solver routines. In this comparison, we jointly
solve for rotations and translations, following the hand-written
reference implementation. Note that alternating between rotation
and translation in a global-local flip-flop solve is also feasible in
Opt; however, overall convergence is typically worse than the joint
solve [73]. In comparison, the solver generated by Opt runs about
75% faster (likely due to better bounds handling), and only requires
about 20 lines of code to describe. Ceres code is more comparable
in size to Opt, at around 100 lines, but it runs 100 times slower.
A.1.4 Poisson Image Editing. Poisson Image Editing is used to
splice a source image into a target image without introducing seams
[47]. Its energy function preserves the gradients of the source image while matching the boundary to gradients in the target image.
The energy formulation in this function makes J constant, and our
matrix-free solver is able to inline those constants into the solver
routines rather than load them from memory.
To compare against a CUDA version, we adapted the Image Warping CUDA example to use the Poisson Image Editing objective
function, which uses about 67 lines for the energy, evalJTF, and
applyJTJ. Opt performs about 10% faster and uses only about 15
lines of code. Since this problem boils down to solving a linear
system of equations, we also compare against Eigen [25], a highperformance linear-algebra library for CPUs using Cholesky with
pre-ordering since it was fastest. The entire Opt solve was 50 times
faster than Eigen’s matrix solve (not including its matrix setup time),
due to Opt’s ability to implicitly represent the connectivity of the
matrix.
A.1.2 Mesh Deformation. As-rigid-as possible mesh deformation [50] is a variant of the previous example that shows Opt’s
ability to run on mesh-based problems using its graph abstraction.
It defines a warping energy on the edges of the mesh rather than
neighboring pixels and uses 3D coordinate frames.
The CUDA solver was also adapted from Zollhöfer et al. [73]. It
is similar in size to the previous example, with around 200 lines
devoted to expressing the energy, applyJTJ, and evalJTF calculations.
A.2 Expressiveness Examples
Our performance evaluations (see Sec. A.1) focus on examples from
the literature where state-of-the-art hand-written code previously
existed and can be compared. Opt’s programming model is also
able to handle a wider variety of general non-linear least squares
problems, which is at the core of many computer graphics and vision
problems.
18
• DeVito, Z. et al
A.2.1 Embedded Deformation. Embedded Deformation is a popular alternative method to as-rigid-as-possible deformation [51].
Rather than solving for a per-vertex rotation parameterized by Euler angles, Embedded Deformation solves for a full transformation
matrix and enforces the rotations via additional soft-constraints.
Compared to writing a solver by hand, writing Embedded Deformation in Opt was an easy process, since it only required increasing
the number of unknowns and changing the energy terms of our
as-rigid-as-possible energy, which amounted to tens of lines of code
and under an hour of work. Gauss-Newton solvers are fragile on
this energy function, so we configured Opt to generate an LM solver
instead. The solver it produces can deform a 12k vertex mesh at an
interactive rate of 5 frames per second and only requires an energy
function of around 40 lines.
A.2.2 Cotangent-weighted Laplacian Smoothing. Cotangentweighted Laplacian Smoothing is a method for smoothing meshes
that tries to preserves the area of triangles adjacent to each edge [15].
It adapts well to meshes with non-uniform tessellations. This example highlights Opt’s ability to define residuals on larger components
of a mesh by defining a hyper-edge in our graph representation
that contains all the vertices in a wedge at each edge. We show
the power of Opt by implementing a small variant that allows the
cotangent weights to be recomputed during deformation instead of
using the values from the original mesh. This variant is normally
hard to write since it introduces complicated derivative terms. Opt
generates them automatically, making it easier to experiment with
small variants on existing energy functions. Opt generates a solver
from around 45 lines of code that can smooth a 44k vertex mesh at
3.3 fps.
A.2.3 Dense Optical Flow. Dense Optical Flow computes the
apparent motion of objects between frames in a video at the pixel
level. We implement a hierarchical version of Horn and Schunck’s
algorithm [29] using an iterative relaxation scheme. Because optical
flow is searching for correspondences in images, its unknowns
are used to sample values from the input frames. We support this
pattern using a sampled image operator, which can be accessed with
arbitrary (u, v) coordinates. When these coordinates are dependent
on the unknown image, the user provides the directional derivatives
of the sampled image as other input images, which will be used to
lookup the partials for the operator in the symbolic differentiation.
The solver Opt generates from around 20 lines of code solves optical
flow at 5.38MP/s.
A.2.4 Intrinsic Image Decomposition. Intrinsic Image Decomposition separates an input image into its reflectance and shading
components. This problem dates back to the seminal Retinex [35]
work, which assumes that large gradients are more likely to correspond to reflectance than shading variation. Current approaches
[8, 41] implement this assumption based on energy minimization
by enforcing reflectance sparseness and shading smoothness. We
reimplemented a basic version of Meka et al. [41] in Opt to show its
ability to solve optimization problems that involve sparsity inducing
norms; see Fig. 20. Specifying the three objectives (reproduction
of input image, p reflectance sparsity and 2 shading smoothness)
only requires 37 lines of code in the Opt language. Opt solves the
intrinsic image decomposition problem for 461k unknowns (pixel
resolution of 640 × 360, 2 unknowns per pixel), in less than 25.1
ms, fast enough to operate in real time on 30Hz video. Internally,
Opt minimizes the energy based on Iteratively Reweighted Least
Squares (IRLS).
Fig. 20. Opt easily allows exploration of different p -norms by generating IRLS solvers. In Meka et al. [41], smaller values of p better separate
reflectance and shading.
A.2.5 Volumetric Mesh Deformation. Volumetric Mesh Deformation is an alternative approach to mesh deformation that warps
an underlying 3-dimensional grid that the mesh is embedded in;
e.g., see Innmann et al. [30]. The structure of the problem is implicit
in the grid representation, so we stand to gain more than standard
graph problems by using Opt over a solver that materializes the
intermediate matrices. To demonstrate this performance benefit, we
implemented this problem in both Ceres and Opt. The solver Opt
generates from 27 lines of code solves for the deformation of a 4961
voxel grid at 21.4ms, sufficient for real-time applications. This is
more than 760x faster than the Ceres solver.
A.2.6 Robust Non-Rigid Alignment. Robust optimization is an
alternative to robust norms that is often used for computer vision
problems. The idea is to introduce auxiliary variables that weight
data points as part of the optimization process. For instance, this
strategy is often used in bundle adjustment or non-rigid deformation
frameworks to determine the reliability of correspondences [38,
58, 71, 73]. In Opt, it is easy to add these terms using additional
unknowns for energy functions on single and mixed domains. We
implemented a robust term along with a fitting term for our Mesh
Deformation example in only 3 extra lines of solver code; the solver
it produces can deform a 10k vertex mesh at an interactive rate of
3.7 frames per second. In this example, we include a data fitting
term that constrains the deformation based on a target point cloud
using a point-to-plane term; i.e., a non-rigid ICP. As ground truth
3D captures, we use the data from Vlasic et al. [59, 60]. In order to
make the problem harder, we introduce artificial noise by adding
spurious correspondences that are far off from the surface. During
the optimization, the robust optimization minimizes the weight of
these outliers, and is able to achieve a robust non-rigid alignment of
the mesh with respect to the target point cloud. A visual comparison
with and without robust optimization is shown in Fig. 21, bottom
right.
B
NUMERIC EVALUATION
In this section, we provide a numeric evaluation of Opt. Our aim is
not to evaluate performance, but rather to exercise numerics. To this
end, we implemented all univariate energies from the National Institute of Standards and Technology (NIST) benchmark for non-linear
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
least squares problems2 , a standardized benchmark for optimization.
These objectives are non-linear regression problems that contain
few unknowns (2-9) each with up to a few hundred data points; they
are classified by three levels of difficulty (lower, average, higher). On
all of these problems, we run four Opt solvers, float vs. double and
GN vs. LM, as well as the Ceres solver which uses LM with double
precision. The results are visualized in Fig. 22 and Fig. 23. As we
can see there is virtually no difference between the solver types on
easier problems, on some of the harder problems combinations of
the numerically more stable double precision and LM are necessary
– our reference is to match Ceres.
C EXAMPLE ENERGY SPECIFICATIONS
Fig. 24 through Fig. 33 list the Opt code for each of the ten energy
functions described in Section A. Opt code is based on the Lua
programming language, but uses specialized operations to specify
the dimensions and types of unknowns and other variables. All
energy functions are centered at a local origin, with all access being
relative to this origin, which is replicated over the domain of each
energy function.
2 http://www.itl.nist.gov/div898/strd/nls/nls_main.shtml
•
19
20
• DeVito, Z. et al
Image Warping
Shape From Shading
539k unknowns, 3 unknowns per pixel, 5-point stencil
0.250 MP/s, 1.8x faster than CUDA, 101x Ceres
192k unknowns, 1 per pixel, 9-point stencil
2.99 MP/s, 1.3x faster than CUDA, 722x Ceres
Cotangent Mesh Smoothing
Optical Flow
Robust Non-Rigid Alignment
132k unknowns, 3 per vertex,
triangle and vertex energies, 147 kverts/s
614k unknowns, 2 per pixel, 5-point stencil
5.38 MP/s
70k unknowns, 7 per vertex,vertex and edge energies
37.1 kverts/s
ARAP Mesh Deformation
360k unknowns, 6 per vertex,vertex and edge energies
18.1 kverts/s, 1.6x faster than CUDA, 33.6x Ceres
Poisson Image Editing
1.3M unknowns, 4 unknowns per pixel, 5-point stencil
26.3 MP/s 1.1x faster than CUDA, 50.0x Eigen
Embedded Mesh Deformation
154k unknowns, 12 per vertex, vertex and edge energies
66.4 kverts/s
Intrinsic Image Decomposition
Volumetric Mesh Deformation
Fig. 21. Visualization of our example problems implemented in Opt.
461k unknowns, 2 per pixel, 5-point stencil
9.19 MP/s
30k unknowns, 7-point stencil (3D)
232 kvoxels/s, 769x faster than Ceres
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging •
21
Fig. 22. Cost vs. iterations on the first 15 univariate problems from the NIST non-linear least squares optimization benchmark: http://www.itl.nist.gov/div898/
strd/nls/nls_main.shtml.
22
• DeVito, Z. et al
Fig. 23. Cost vs. iterations on the last 11 univariate problems from the NIST non-linear least squares optimization benchmark: http://www.itl.nist.gov/div898/
strd/nls/nls_main.shtml.
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
local W,H = Dim("W",0), Dim("H",1)
local Offset = Unknown("Offset",float2,{W,H},0)
local Angle = Unknown("Angle",float,{W,H},1)
local UrShape = Array("UrShape", float2,{W,H},2) --original mesh position
local Constraints = Array("Constraints", float2,{W,H},3) -- user constraints
local Mask = Array("Mask", float, {W,H},4) -- validity mask for mesh
local w_fitSqrt = Param("w_fitSqrt", float, 5)
local w_regSqrt = Param("w_regSqrt", float, 6)
Exclude(Not(eq(Mask(0,0),0)))
--regularization
for x,y in Stencil { {1,0}, {-1,0}, {0,1}, {0, -1} } do
local e_reg = w_regSqrt*((Offset(0,0) - Offset(x,y))
- Rotate2D(Angle(0,0),(UrShape(0,0) - UrShape(x,y))))
local valid = InBounds(x,y) * eq(Mask(x,y),0) * eq(Mask(0,0),0)
Energy(Select(valid,e_reg,0))
end
--fitting
local e_fit = (Offset(0,0)- Constraints(0,0))
local valid = All(greatereq(Constraints(0,0),0))
Energy(w_fitSqrt*Select(valid, e_fit , 0.0))
Fig. 24. Image Warping energy function in Opt.
local N = opt.Dim("N",0)
local w_fitSqrt = Param("w_fitSqrt", float, 0)
local w_regSqrt = Param("w_regSqrt", float, 1)
local Offset =
Unknown("Offset", float3,{N},2)
local Angle =
Unknown("Angle",float3,{N},3)
local UrShape =
Array("UrShape",float3,{N},4)
local Constraints = Array("Constraints",float3,{N},5)
local G = Graph("G", 6, "v0", {N}, 7, "v1", {N}, 9)
UsePreconditioner(true)
--vertex.xyz, rotation.xyz <- unknown
--original position: vertex.xyz
--user constraints
--fitting
local e_fit = Offset(0) - Constraints(0)
local valid = greatereq(Constraints(0,0), -999999.9)
Energy(Select(valid,w_fitSqrt*e_fit,0))
--regularization
local ARAPCost = (Offset(G.v0) - Offset(G.v1)) - Rotate3D(Angle(G.v0),UrShape(G.v0) - UrShape(G.v1))
Energy(w_regSqrt*ARAPCost)
Fig. 25. ARAP Mesh Deformation energy function in Opt.
•
23
24
•
DeVito, Z. et al
local DEPTH_DISCONTINUITY_THRE = 0.01
local W,H
= Dim("W",0), Dim("H",1)
local w_p
= sqrt(Param("w_p",float,0))-- Fitting weight
local w_s
= sqrt(Param("w_s",float,1))-- Regularization weight
local w_g
= sqrt(Param("w_g",float,2))-- Shading weight
local f_x
= Param("f_x",float,3)
local f_y
= Param("f_y",float,4)
local u_x
= Param("u_x",float,5)
local u_y
= Param("u_y",float,6)
local L = {}
for i=1,9 do L[i] = Param("L_" .. i .. "",float,6+i) end -- lighting model parameters
local X
= Unknown("X",opt_float, {W,H},16) -- Refined Depth
local D_i
= Array("D_i",opt_float, {W,H},17) -- Depth input
local Im
= Array("Im",opt_float, {W,H},18) -- Target Intensity
local edgeMaskR = Array("edgeMaskR",uint8, {W,H},19) -- Edge mask.
local edgeMaskC = Array("edgeMaskC",uint8, {W,H},20) -- Edge mask.
local posX,posY = Index(0),Index(1)
-- equation 8
function p(offX,offY)
local d = X(offX,offY)
local i = offX + posX
local j = offY + posY
return Vector(((i-u_x)/f_x)*d, ((j-u_y)/f_y)*d, d)
end
-- equation 10
function normalAt(offX, offY)
local i = offX + posX
local j = offY + posY
local n_x = X(offX, offY - 1) * (X(offX, offY) - X(offX - 1, offY)) / f_y
local n_y = X(offX - 1, offY) * (X(offX, offY) - X(offX, offY - 1)) / f_x
local n_z = (n_x * (u_x - i) / f_x) + (n_y * (u_y - j) / f_y) - (X(offX-1, offY)*X(offX, offY-1) / (f_x*f_y))
local sqLength = n_x*n_x + n_y*n_y + n_z*n_z
local inverseMagnitude = Select(greater(sqLength, 0.0), 1.0/sqrt(sqLength), 1.0)
return inverseMagnitude * Vector(n_x, n_y, n_z)
end
function B(offX, offY)
local normal = normalAt(offX, offY)
local n_x = normal[0]
local n_y = normal[1]
local n_z = normal[2]
return L[1] +
L[2]*n_y + L[3]*n_z + L[4]*n_x +
L[5]*n_x*n_y + L[6]*n_y*n_z + L[7]*(-n_x*n_x - n_y*n_y + 2*n_z*n_z) + L[8]*n_z*n_x + L[9]*(n_x*n_x-n_y*n_y)
end
function I(offX, offY)
return Im(offX,offY)*0.5 + 0.25*(Im(offX-1,offY)+Im(offX,offY-1))
end
local function DepthValid(x,y) return greater(D_i(x,y),0) end
local function B_I(x,y)
local bi = B(x,y) - I(x,y)
local valid = DepthValid(x-1,y)*DepthValid(x,y)*DepthValid(x,y-1)
return Select(InBoundsExpanded(0,0,1)*valid,bi,0)
end
B_I = ComputedArray("B_I", {W,H}, B_I(0,0))
-- do not include unknowns for where the depth is invalid
Exclude(Not(DepthValid(0,0)))
-- fitting term
local E_p = X(0,0) - D_i(0,0)
Energy(Select(DepthValid(0,0),w_p*E_p,0))
-- shading term
local E_g_h = (B_I(0,0) - B_I(1,0))*edgeMaskR(0,0)
local E_g_v = (B_I(0,0) - B_I(0,1))*edgeMaskC(0,0)
Energy(Select(InBoundsExpanded(0,0,1),w_g*E_g_h,0))
Energy(Select(InBoundsExpanded(0,0,1),w_g*E_g_v,0))
-- regularization term
local function Continuous(x,y) return less(abs(X(0,0) - X(x,y)),DEPTH_DISCONTINUITY_THRE) end
local valid = DepthValid(0,0)*DepthValid(0,-1)*DepthValid(0,1)*DepthValid(-1,0)*DepthValid(1,0)*
Continuous(0,-1)*Continuous(0,1)*Continuous(-1,0)*Continuous(1,0)*InBoundsExpanded(0,0,1)
local validArray = ComputedArray("valid", {W,H},valid)
valid = eq(validArray(0,0),1)
local E_s = 4.0*p(0,0) - (p(-1,0) + p(0,-1) + p(1,0) + p(0,1))
Energy(Select(valid,w_s*E_s,0))
Fig. 26. Shape from Shading energy function in Opt.
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
local W,H = Dim("W",0), Dim("H",1)
local X = Unknown("X", float4,{W,H},0) -- unknown, initialized to base image
local T = Array("T", float4,{W,H},1) -- inserted image
local M = Array("M", float, {W,H},2) -- mask, excludes parts of base image
UsePreconditioner(false)
-- do not include unmasked pixels in the solve
Exclude(Not(eq(M(0,0),0)))
for x,y in Stencil { {1,0},{-1,0},{0,1},{0,-1} } do
local e = (X(0,0) - X(x,y)) - (T(0,0) - T(x,y))
Energy(Select(InBounds(x,y),e,0))
end
Fig. 27. Poisson Image Editing energy function in Opt.
local N = Dim("N",0)
local w_fitSqrt = Param("w_fitSqrt", float, 0)
local w_regSqrt = Param("w_regSqrt", float, 1)
local w_rotSqrt = Param("w_rotSqrt", float, 2)
local X =
Unknown("X", float12,{N},3)
--vertex.xyz, rotation_matrix <- unknown
local UrShape =
Image("UrShape", float3,{N},4)
--urshape: vertex.xyz
local Constraints = Image("Constraints", float3,{N},5) --constraints
local G = Graph("G", 6, "v0", {N}, 7, "v1", {N}, 9)
UsePreconditioner(true) --really needed here
local Offset = Slice(X,0,3) -- select part of unknown for position
--fitting
local e_fit = Offset(0) - Constraints(0)
local valid = greatereq(Constraints(0)(0), -999999.9)
Energy(Select(valid, w_fitSqrt*e_fit, 0))
--rot
local RotMatrix = Slice(X,3,12) -- extract rotation matrix
local R = RotMatrix(0)
local c0 = Vector(R(0), R(3), R(6))
local c1 = Vector(R(1), R(4), R(7))
local c2 = Vector(R(2), R(5), R(8))
Energy(w_rotSqrt*Dot(c0,c1))
Energy(w_rotSqrt*Dot(c0,c2))
Energy(w_rotSqrt*Dot(c1,c2))
Energy(w_rotSqrt*(Dot(c0,c0)-1))
Energy(w_rotSqrt*(Dot(c1,c1)-1))
Energy(w_rotSqrt*(Dot(c2,c2)-1))
local regCost = (Offset(G.v1) - Offset(G.v0)) Matrix3x3Mul(RotMatrix(G.v0), (UrShape(G.v1) - UrShape(G.v0)))
Energy(w_regSqrt*regCost)
Fig. 28. Embedded Mesh Deformation energy function in Opt.
•
25
26
•
DeVito, Z. et al
local N = Dim("N",0)
local
local
local
local
local
w_fitSqrt = Param("w_fit", float, 0)
w_regSqrt = Param("w_reg", float, 1)
X = Unknown("X", float3,{N},2)
A = Array("A", float3,{N},3)
G = Graph("G", 4, "v0", {N}, 5, --current vertex
"v1", {N}, 7, --neighboring vertex
"v2", {N}, 9, --prev neighboring vertex
"v3", {N}, 11) --next neighboring vertex
UsePreconditioner(true)
function cot(v0, v1)
local adotb = Dot3(v0, v1)
local disc = Dot3(v0, v0)*Dot3(v1, v1) - adotb*adotb
disc = Select(greater(disc, 0.0), disc, 0.0001)
return Dot3(v0, v1) / Sqrt(disc)
end
-- fit energy
Energy(w_fitSqrt*(X(0) - A(0)))
local
local
local
local
a
b
c
d
=
=
=
=
normalize(X(G.v0)
normalize(X(G.v1)
normalize(X(G.v0)
normalize(X(G.v1)
-
X(G.v2)) --float3
X(G.v2)) --float3
X(G.v3)) --float3
X(G.v3)) --float3
--cotangent laplacian; Meyer et al. 03
local w = 0.5*(cot(a,b) + cot(c,d))
w = Sqrt(Select(greater(w, 0.0), w, 0.0001))
Energy(w_regSqrt*w*(X(G.v1) - X(G.v0)))
Fig. 29. Cotangent Mesh Smoothing energy function in Opt.
local
local
local
local
local
local
local
local
local
W,H = Dim("W",0), Dim("H",1)
w_fitSqrt = Param("w_fit", float, 0)
w_regSqrt = Param("w_reg", float, 1)
X = Unknown("X", float2,{W,H},2)
I = Array("I",float,{W,H},3)
I_hat_im = Array("I_hat",float,{W,H},4)
I_hat_dx = Array("I_hat_dx",float,{W,H},5)
I_hat_dy = Array("I_hat_dy",float,{W,H},6)
I_hat = SampledImage(I_hat_im,I_hat_dx,I_hat_dy)
local i,j = Index(0), Index(1)
UsePreconditioner(false)
-- fitting
local e_fit = w_fitSqrt*(I(0,0) - I_hat(i + X(0,0,0),j + X(0,0,1)))
Energy(e_fit)
-- regularization
for nx,ny in Stencil { {1,0}, {-1,0}, {0,1}, {0,-1} } do
local e_reg = w_regSqrt*(X(0,0) - X(nx,ny))
Energy(Select(InBounds(nx,ny),e_reg,0))
end
Fig. 30. Optical Flow energy function in Opt.
Opt: A Domain Specific Language for Non-linear Least Squares Optimization in Graphics and Imaging
local W,H,D = Dim("W",0), Dim("H",1), Dim("D",2)
local Offset =
Unknown("Offset", float3,{W,H,D},0)
local Angle =
Unknown("Angle",float3,{W,H,D},1)
local UrShape =
Array("UrShape",float3,{W,H,D},2)
local Constraints = Array("Constraints",float3,{W,H,D},3)
local w_fitSqrt = Param("w_fitSqrt", float, 4)
local w_regSqrt = Param("w_regSqrt", float, 5)
UsePreconditioner(true)
--vertex.xyz, rotation.xyz <- unknown
--original position: vertex.xyz
--user constraints
--fitting
local e_fit = Offset(0,0,0) - Constraints(0,0,0)
local valid = greatereq(Constraints(0,0,0)(0), -999999.9)
Energy(Select(valid,w_fitSqrt*e_fit,0))
for i,j,k in Stencil { {1,0,0}, {-1,0,0}, {0,1,0}, {0,-1,0}, {0,0,1}, {0,0,-1}} do
local ARAPCost = (Offset(0,0,0) - Offset(i,j,k)) - Rotate3D(Angle(0,0,0),UrShape(0,0,0) - UrShape(i,j,k))
local ARAPCostF = Select(InBounds(0,0,0),
Select(InBounds(i,j,k), ARAPCost, 0.0), 0.0)
Energy(w_regSqrt*ARAPCostF)
end
Fig. 31. Volumetric Mesh Deformation energy function in Opt.
local N = Dim("N",0)
local w_fitSqrt
local w_regSqrt
local w_confSqrt
local Offset
local Angle
local RobustWeights
local UrShape
local Constraints
local ConstraintNormals
local G
UsePreconditioner(true)
=
=
=
=
=
=
=
=
=
=
Param("w_fitSqrt", float, 0)
Param("w_regSqrt", float, 1)
0.1
Unknown("Offset", float3,{N},2)
--vertex.xyz, rotation.xyz <- unknown
Unknown("Angle", float3,{N},3)
--vertex.xyz, rotation.xyz <- unknown
Unknown("RobustWeights", float,{N},4)
Array("UrShape", float3, {N},5)
--urshape: vertex.xyz
Array("Constraints", float3,{N},6)
--constraints
Array("ConstraintNormals", float3,{N},7)
Graph("G", 8, "v0", {N}, 9, "v1", {N}, 10)
local robustWeight = RobustWeights(0)
--fitting
local e_fit = robustWeight*ConstraintNormals(0):dot(Offset(0) - Constraints(0))
local validConstraint = greatereq(Constraints(0), -999999.9)
Energy(w_fitSqrt*Select(validConstraint, e_fit, 0.0))
--RobustWeight Penalty
local e_conf = 1-(robustWeight*robustWeight)
e_conf = Select(validConstraint, e_conf, 0.0)
Energy(w_confSqrt*e_conf)
--regularization
local ARAPCost = (Offset(G.v0) - Offset(G.v1)) - Rotate3D(Angle(G.v0),UrShape(G.v0) - UrShape(G.v1))
Energy(w_regSqrt*ARAPCost)
Fig. 32. Robust Mesh Deformation energy function in Opt.
•
27
28
•
W,H =
local
local
local
local
local
local
local
local
DeVito, Z. et al
opt.Dim("W",0), opt.Dim("H",1)
w_fitSqrt
= Param("w_fitSqrt", float, 0)
w_regSqrtAlbedo = Param("w_regSqrtAlbedo", float, 1)
w_regSqrtShading = Param("w_regSqrtShading", float, 2)
pNorm
= Param("pNorm", float, 4)
r
= Unknown("r", float3,{W,H},5)
r_const
= Array("r_const", float3,{W,H},5) -- A constant view of the unknown
i
= Array("i", float3,{W,H},6)
s
= Unknown("s", float,{W,H},8)
-- reg Albedo
for x,y in Stencil { {1,0}, {-1,0}, {0,1}, {0,-1} } do
local diff = (r(0,0) - r(x,y))
local diff_const = (r_const(0,0) - r_const(x,y))
-- The helper L_p function takes diff_const, raises it's length to the (p-2) power,
-- and stores it in a computed array, so its value remains constant during the nonlinear iteration,
-- then multiplies it with diff and returns
local laplacianCost = L_p(diff, diff_const, pNorm, {W,H})
local laplacianCostF = Select(InBounds(0,0),Select(InBounds(x,y), laplacianCost,0),0)
Energy(w_regSqrtAlbedo*laplacianCostF)
end
-- reg Shading
for x,y in Stencil { {1,0}, {-1,0}, {0,1}, {0,-1} } do
local diff = (s(0,0) - s(x,y))
local laplacianCostF = Select(InBounds(0,0),Select(InBounds(x,y), diff,0),0)
Energy(w_regSqrtShading*laplacianCostF)
end
-- fit
local fittingCost = r(0,0)+s(0,0)-i(0,0)
Energy(w_fitSqrt*fittingCost)
Fig. 33. Intrinsic Image Decomposition energy function in Opt.
| 6cs.PL
|
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE
CANONICAL SHEAVES
arXiv:1207.1910v3 [math.AG] 4 Feb 2013
ZSOLT PATAKFALVI AND KARL SCHWEDE
Abstract. For a characteristic p > 0 variety X with controlled F -singularities, we state
conditions which imply that a divisorial sheaf is Cohen-Macaulay or at least has depth
≥ 3 at certain points. This mirrors results of Kollár for varieties in characteristic zero. As
an application, we show that relative canonical sheaves are compatible with arbitrary base
change for certain families with sharply F -pure fibers.
1. Introduction
In the paper [Kol11b], Kollár proved that sheaves OX (−D) satisfy strong depth conditions
if D is locally Q-linearly equivalent to a divisor ∆ such that (X, ∆) is SLC or KLT. These
results generalized [Ale08, Lemma 3.2], [Fuj09] and [KM98, Corollary 5.25]. Because depth
conditions can be interpreted as vanishing of local cohomology, these results were described
as a local version of the Kawamata-Viehweg vanishing theorem.
In this paper, we obtain characteristic p > 0 analogs of the main results of [Kol11b]. This
is particularly interesting because the (global) Kawamata-Viehweg vanishing theorem is false
in positive characteristic [Ray78]. We replace the KLT and SLC conditions by strongly F regular and sharply F -pure singularities respectively (such characteristic p > 0 singularity
classes are known as F -singularities). For the convenience of the reader, we recall that by
[HW02, MS12]
◦ KLT pairs correspond philosophically to strongly F -regular pairs, and
◦ SLC pairs correspond philosophically to sharply F -pure pairs.
Similar to [Kol11b], we can apply our results on depth to prove base change for relative
canonical sheaves.
(A special case of ) Corollary 4.13. (cf. [Kol11b, 4.3]) Let f : X −→ Y be a flat morphism
of finite type with S2 , G1 equidimensional fibers to a smooth variety and let ∆ ≥ 0 be a Qdivisor on X avoiding all the codimension zero and the singular codimension one points of
the fibers. Further suppose that KX + ∆ is Q-Cartier, p 6 | ind(KX + ∆) and (Xy , ∆y ) is
sharply F -pure for every y ∈ Y . Then ωX/Y is flat over Y and compatible with arbitrary base
change.
Corollary 4.13 is hoped to be useful in constructing a moduli space for varieties of general
type in positive characteristics. See [Pat10] for further explanation, and also for examples for
which the above compatibility does not hold. We also remark here that ωX/Y behaves surprisingly well with respect to base-change. It obeys base-change for example when the fibers are
Cohen-Macaualay [Con00, Theorem 3.6.1]. In particular, this pertains to families of normal
[m]
surfaces. In contrast, the higher reflexive powers, ωX/Y for m > 1, are not compatible with
base change in the surface case [HK10, Section 14.A]. Similar differences between canonical
and pluricanonical sheaves have been observed earlier [Kol87, page 2], [Kol90, Remark 4.4].
2010 Mathematics Subject Classification. 13A35, 14J10, 14J17, 14F18, 13C14, 13C15.
Key words and phrases. depth, Cohen-Macaulay, F -singularities, base change, relative canonical sheaf.
The second author was partially supported by the NSF grant DMS #1064485.
1
2
ZSOLT PATAKFALVI AND KARL SCHWEDE
The technical result on depth used to prove Corollary 4.13 is as follows. It is a characteristic
p > 0 version of [Kol11b, Theorem 3(1)], also compare with [Ale08, Lemma 3.2], [Fuj09,
Theorem 4.21], [AH11, Theorem 1.5] and [Kov11, Theorem 1.2, 1.5].
Theorem 3.8. (cf. [Kol11b, Theorem 3(1)]) Suppose that R is local, S2 and G1 and that
0 ≤ ∆ is an R-divisor on X = Spec R with no common components with the singular locus of
X and such that (X, ∆) is sharply F -pure. Set x ∈ X to be the closed point and assume that
x is not an F -pure center of (X, ∆). Suppose that 0 ≤ ∆′ ≤ ∆ is another R-divisor and that
r∆′ is integral for some r > 0 relatively prime to p. Further assume that M is any rank-1
reflexive subsheaf of K(X) such that M (−r) ∼
= OX (r∆′ ) (here (·) denotes reflexive power).
Then
depthx M ≥ min{3, codimX x}.
Another interesting depth statement, again completely analogous to a theorem of Kollár
is below. In the introduction we phrase it in the language of Frobenius splittings [BK05], but
in the text it is phrased slightly more generally.
Theorem 3.6, Remark 3.7. (cf. [Kol11b, Theorem 3(2)]) Suppose that (R, m) is an S2 local
ring with Frobenius splitting ϕ : F∗e R −→ R which is not compatibly split with m. Additionally
suppose that Z is any union of compatibly ϕ-split subvarieties of X = Spec R such that
no irreducible component of Z coincides with an irreducible component of X. Suppose that
IZ ⊆ R is the ideal defining Z, then
depthm IZ ≥ min{3, 1 + codimZ x}.
The other main statement on depth we obtain, Theorem 3.1, asserts that if (X, ∆) is
strongly F -regular and (pe − 1)D is an integral divisor linearly equivalent to (pe − 1)∆, then
OX (−D) is Cohen-Macaulay. Compare with [Kol11b, Theorem 2].
Remark 1.1. One should also compare the above results on depth, as well as the related
characteristic zero results, to [AE05, Theorem 4.8(vi)] where Aberbach and Enescu showed
that the depth of an F -pure ring R is always ≥ than the dimension of the minimal F -pure
center (ie, of the dimension of R modulo the splitting prime, which we know is equal to the
s-dimension of [AE05] by [BST11]).
Acknowledgements:
The authors began working on this project at the workshop ACC for minimal log discrepancies and termination of flips held at the American Institute of Mathematics and organized
by Tommaso de Fernex and Christopher Hacon. The authors would also like to thank Florian
Enescu for valuable discussions as well as thank the referee, János Kollár and Sándor Kovács
for many useful comments on a previous draft.
2. Preliminaries on F -singularities
Notation 2.1. Throughout this paper, all schemes are Noetherian, separated, of equal characteristic p > 0 and F -finite.1 Note that any such scheme X is automatically locally excellent
by [Kun76] and also has a dualizing complex by [Gab04]. In particular, we are implicitly
assuming all schemes are locally excellent and possess dualizing complexes. Little will be lost
to the reader if he or she considers only schemes that are essentially of finite type over a
perfect field.
1Meaning the Frobenius morphism is a finite morphism.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
3
We remind the reader of some special divisors on non-normal schemes.
Definition 2.2 (Divisors on non-normal schemes). We follow the notation of [K+92, Section
16]. For an S2 reduced local ring R, set X = Spec R. We define a W-divisor (or Weil divisor )
to be a formal sum of codimension one subsets of X whose generic points are not singular
points of X. This has the same data as divisors on the regular locus of X or as rank-1 S2
submodules M of K(R) (the total ring of fractions of R) such that Mη = Rη as a subset
of K(R), for every codimension 1 singular point η of X. Later in the paper, we will need
to instead work with the more general notion of Weil divisorial sheaves WSh(X), rank one
reflexive subsheaves of K(X) that are invertible in codimension 1.
In the non-local setting, such divisors are simply formal sums of irreducible subschemes that
satisfy this definition locally. We now set WDivQ (X) := WDiv(X)⊗Z Q and WDivR (X) :=
WDiv(X) ⊗Z R. Note we have containments:
WDiv(X) ⊆ WDivQ (X) ⊆ WDivR (X).
One can also form WShQ (X) := WSh(X) ⊗Z Q and WShZ(p) (X) := WShZ(p) (X) ⊗Z Z(p)
similarly, but the natural maps WSh(X) −
→ WShZ(p) (X) −
→ WShQ (X) are not necessarily
P
injective [K+92, Section 16]. Given
i ai Di = ∆ ∈ WDivR (X), we use ⌈∆⌉ to denote
P
⌈a
⌉D
(such
roundings
are
not
necessarily
well defined for WShZ(p) (X) or WShQ (x)).
i
i i
Finally, given D ∈ WDiv(X), we use OX (D) (or R(D)) to denote the corresponding subsheaf
of K (X) (or of K(R)) in the usual way. Note that D is effective if and only if OX (D) ⊇ OX .
Now we move away from divisors. Suppose that R is a ring of characteristic p > 0. Following
[Sch11, Bli09], we say a Cartier subalgebra C is a graded subring of the graded ring
M
HomR (F∗e R, R) =: C R
e≥0
where multiplication is done by Frobenius twisted composition2 such that the zeroth graded
piece [C ]0 = HomR (R, R) ∼
= R. We note that even though we call C a Cartier subalgebra, it
is not an R-algebra because R ∼
= [C ]0 is not necessarily central.
Example 2.3 (Cartier subalgebra associated to a divisor). Given an S2 and G1 ring R, set
X = Spec R and assume that 0 ≤ ∆ ∈ WDivR (X) on X (for example, if R is normal, ∆ is
simply an R-divisor). We can form the Cartier subalgebra C ∆ where
[C ∆ ]e := HomR (F∗e R(⌈(pe − 1)∆⌉), R) ⊆ HomR (F∗e R, R).
Example 2.4 (Cartier subalgebra generated by a map). Suppose that C R is as above and
ϕ ∈ [C R ]e for some e > 0. Then we can form the Cartier subalgebra Rhϕi generated by
R = [C ]0 and ϕ. Explicitly, this is the direct sum R ⊕ (ϕ · (F∗e R)) ⊕ (ϕ2 · (F∗2e R)) ⊕ · · · .
Now we define sharply F -pure pairs and F -pure centers.
Definition 2.5 (Sharply F -pure pairs). If C is a Cartier subalgebra on R, then we say that
the pair (R, C ) is sharply F -pure if there exists some ϕ ∈ [C ]e for some e ≥ 1 such that
ϕ(F∗e R) = R.
In particular, if (R, ∆) is a pair as in Example 2.3, then we say that (R, ∆) is sharply
F -pure if the associated (R, C ∆ ) is sharply F -pure.
If (R, C R ) is sharply F -pure, then we simply say that R is F -pure.
Definition 2.6 (Compatible ideals and F -pure centers). If (R, C ) is a pair as above, then
an ideal I ⊆ R is called C -compatible if ϕ(F∗e I) ⊆ I for all ϕ ∈ [C ]e and all e ≥ 0. In the
case that C = Rhϕi, we will sometimes simply say that I is ϕ-compatible.
2If ϕ ∈ [C R ] and ψ ∈ [C R ] , then ϕ · ψ = ϕ ◦ (F e ψ). See the aforementioned sources for more details.
e
d
∗
4
ZSOLT PATAKFALVI AND KARL SCHWEDE
An irreducible closed set W = V (Q) ⊆ Spec R = X, for some Q ∈ Spec R, is called an
F -pure center if the following two conditions hold:
(a) The localization (RQ , CQ ) is sharply F -pure, and
(b) For every for e ≥ 0 and ϕ ∈ [C ]e , we have ϕ(F∗e Q) ⊆ Q (in other words, if Q is
C -compatible).
Likewise we say that W is an F -pure center of (R, ∆) if it is an F -pure center of (R, C ∆ )
where C ∆ is associated to ∆ as in Example 2.3.
We also define strongly F -regular pairs.
Definition 2.7 (Strongly F -regular pairs). If R is a local ring, a pair (R, C ) is called strongly
F -regular if the only proper C -compatible ideals of R are 0 and R itself. If R is not local,
then we say (R, C ) is strongly F -regular if every localization is.
A pair (R, ∆) is strongly F -regular if (R, C ∆ ) is strongly F -regular.
Remark 2.8. Given a pair (X, ∆), all of the above definitions generalize to the non-affine
setting by requiring them to hold at each stalk. The notion of Cartier subalgebras is somewhat
more subtle in the non-affine setting however (but we will not need such generalities).
We recall some facts about compatible ideals and F -pure centers.
Lemma 2.9. Suppose that (R, C ) is a pair and I ⊆ J ⊆ R are ideals.
(i) The set of C -compatible ideals are closed under sum and intersection.
(ii) A prime ideal Q is C -compatible if and only if QRQ is CQ -compatible.
(iii) If C ′ ⊆ C are Cartier subalgebras and I is C -compatible, then I is C ′ -compatible.
(iv) Given ϕ ∈ HomR (F∗e R, R), we have ϕ(F∗e J) ⊆ J if and only if J is Rhϕi-compatible.
(v) Suppose that ϕ : F∗e R −→ R is surjective. Some Q ∈ Spec R is ϕ-compatible if and
only if it is ϕn -compatible where
(n−1)e
ϕn := ϕ ◦ (F∗e ϕ) ◦ · · · ◦ (F∗
{z
|
n-times
ϕ)
}
(vi) If I is ϕ-compatible, then there exists a map ϕ/I : F∗e (R/I) −→ (R/I) such that the
following diagram commutes:
F∗e R
ϕ
F∗e (R/I)
ϕ/I
// R
// (R/I).
Furthermore, J ⊇ I is ϕ-compatible if and only if J/I is ϕ/I-compatible. (This statement can also be done with Cartier subalgebras, but we will not need it).
(vii) (R, C ) is strongly F -regular if and only if for every c ∈ R \ {minimal primes}, there
exists a ϕ ∈ [C ]e for e > 0, in fact one may take e to be any larger multiple, such that
ϕ(F∗e c) = 1.
Proof. (v) follows from the argument of [Sch10, Proposition 4.1]. (vii) can be found in this
generality in [Sch11, Proposition 3.23]. The rest are obvious.
Our next goal is to give an example of a ϕ-compatible ideal that will be crucial in later
sections. The main idea is that Frobenius maps and Frobenius splittings induce maps on local
cohomology. Those induced maps can then be thought of as acting directly and explicitly on
Čech classes. For the convenience of the reader not already familiar with this construction,
recall that if X = Spec R and U = Spec R \ {m}, then for any coherent OX -module M , we
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
5
have Hmi (M ) = H i−1 (U, M ) for i > 1 and also that Hm1 (M ) = H 0 (U, M )/ image(H 0 (X, M )).
We can then use the Čech cohomology description of sheaf cohomology to define Hmi (M ).
For a more thorough description of local cohomology by the Čech complex, see for example
[BH93, Section 3.5].
We now consider Frobenius action on local cohomology. The Frobenius map R −
→ F∗ R
→ Hmi (F∗ R) ∼
yields Ψ : Hmi (R) −
= Hmi (R). Given a Čech class [z] = [. . . , zj , . . . ] ∈ Hmi (R), we
e
e
have Ψ([z]) ∈ Hmi (F∗ R). But certainly Ψ([z]) = F∗e [z]p = F∗e [. . . , zjp , . . . ] is identified with
raising the entries of [z] to the pe th power.
Now we do the same computation with a Frobenius splitting. Suppose that ϕ : F∗e R −
→R
ϕ
i
e
i
→ Hm (R) induced by ϕ.
is an R-linear Frobenius splitting, and so we have a map Hm (F∗ R) −
Certainly ϕ(F∗e [. . . , yj , . . . ]) = [. . . , ϕ(F∗e yj ), . . . ]. But now observe that for any [z] ∈ Hmi (R)
and r ∈ R we have that
e
e
ϕ(F∗e (r · [z]p )) = ϕ(F∗e [. . . , rzjp , . . . ]) = [. . . , ϕ(F∗e r)zj , . . . ] = ϕ(F∗e r)[z].
Lemma 2.10. (cf. [EH08, Theorem 4.1]) Suppose that (R, m) is a local ring. Then AnnR Hmi (R)
is compatible with every splitting3 ϕ : F∗e R −→ R of Frobenius R −→ F∗e R.
Proof. We have the following composition
1
ϕ
// F e R
∗
R
✤
// F e 1
∗
// R
// 1.
✤
Now suppose that r ∈ AnnR Hmi (R). Then choose [z] ∈ Hmi (R). We want to show that
ϕ(F∗e r).[z] = 0. Now, it follows from the Čech cohomology description of local cohomology,
and ϕ’s action on it, that
e
0 = ϕ(F∗e 0) = ϕ(F∗e (r.[z]p )) = ϕ(F∗e r).[z]
which completes the proof.
We also recall the following fact. We include the proof because the method will be generalized later.
Lemma 2.11. If (R, C ) is strongly F -regular, then R is normal and Cohen-Macaulay.
Proof. We first note that by Lemma 2.9(vii), the strong F -regularity hypothesis implies that
ψ
→ R is an isomorphism for some
there exists a Frobenius splitting ψ such that R −
→ F∗e R −
e > 0. It then easily follows that R must be reduced since if not, the map R −
→ F∗e R is not
injective. Normality follows since the conductor ideal is compatible with every ϕ ∈ C R by the
argument of [BK05, Proposition 1.2.5]. For the Cohen-Macaulay condition, by working locally
we assume that (R, m) is a local domain. By local duality [Har66, Chapter V, Theorem 6.2],
q
q
each Hmi (R) is Matlis dual to hi−dim R ωR for some normalized dualizing complex ωR . Since
an element c ∈ R annihilates a finitely generated R-module if and only if c annihilates the
Matlis dual of a module, it follows that there exists 0 6= c ∈ R such that c · Hmi (R) = 0 for all
i < dim R. Lemma 2.9(vii) then implies that there exists ϕ ∈ [C ]e such that the composition
F e (·c)
R−
→ F∗e R −−∗−−→ F∗e R −
→R
is an isomorphism. Taking local cohomology for i < dim R gives us an isomorphism:
F e (·c)
Hmi (R) −
→ Hmi (F∗e R) −−∗−−→ Hmi (F∗e R) −
→ Hmi (R)
where the middle map is the zero map. Thus Hmi (R) = 0 which completes the proof.
3A splitting is simply a map ϕ : F e R −
→ R that sends F∗e 1 to 1. Splittings are necessarily surjective.
∗
6
ZSOLT PATAKFALVI AND KARL SCHWEDE
We also state a generalization of [SS10, Theorem 4.3], similar computations were done in
[MS12].
Lemma 2.12. Suppose that X = Spec R is S2 and G1 and sharply F -pure. Then there exists
an element 0 ≤ ∆ ∈ WDivQ (X) such that (pe − 1)(KX + ∆) is Q-Cartier and (X, ∆) is
sharply F -pure.
Proof. A surjective map ϕ ∈ HomR (F∗e R, R) ∼
= H 0 (X, F∗e OX ((1 − pe )KX )) induces an effec4
tive Weil divisorial sheaf Γϕ by [Har94, Proposition 2.9] such that (pe − 1)KX + Γϕ ∼ 0. We
would like to show that Γϕ can be identified with an element of WDiv(X). At the singular
height one points η of X, OX,η is already Gorenstein. Thus we can consider the map Φη
which generates HomOX,η (F∗e OX,η , OX,η ) as an F∗e OX,η -module. Set m to be the maximal
ideal of OX,η and notice that m is the conductor ideal since F -pure rings are seminormal
[HR76] and in particular the conductor is radical. But then Φ(F∗e m) ⊆ m by the proof of
→ OX,η is equal to Φ(F∗e (r · )) for
[BK05, Proposition 1.2.5]. Now, we know ϕη : F∗e OX,η −
some r ∈ OX,η . We want to show that r is a unit, which would prove that Γϕ is trivial at
η. Since ϕη is surjective, we see that r ∈
/ m and thus r is a unit. This implies that the Weil
divisorial sheaf (Γϕ )η coincides with OX,η and thus Γϕ ∈ WDiv(X) as desired. Finally, set
∆ = pe1−1 Γϕ .
We conclude by recalling a well known lemma on the height of annihilators of local cohomology modules. However, because we lack a reference, we provide a proof.
Lemma 2.13. Suppose that (R, m) is a local ring and suppose that M is a finitely generated
R-module which is Sn in the sense5 of [BH93]. Set Yi = V AnnR (Hmi (M )) ⊆ Spec R = X.
Suppose that d is the minimum over the dimensions of the components of Supp M . Then
dim Yi ≤ i − n for i < d.
Remark 2.14. Note Yi may not be the same as Supp Hmi (M ) since Hmi (M ) is not finitely
generated.
Proof. Set ωX to be a normalized dualizing complex on X (recall that all our rings are
excellent and possess dualizing complexes). By local duality in the form of [Har66, Chapter
q
V, Theorem 6.2], it is equivalent to prove that dim Supp h−i R HomR (M, ωR ) ≤ i−n. Suppose
q
this is false, and thus that W ⊆ Supp h−i R HomR (M, ωR ) is an irreducible component of
dimension t > i − n for some i < d. Set γ to be the generic point of W (which we also view
as a prime ideal). By localizing at γ, we see that
q
(h−i R HomR (M, ωR ))γ = h−i R HomRγ (Mγ , ωRγ [t])) = h−i+t R HomRγ (Mγ , ωRγ ))
q
q
q
is supported at a point. The shift by [t] is necessary to keep the dualizing complexes normalized. Thus Hγi−t (Mγ ) 6= 0 by local duality again. Now, i − t < n. Also observe that
dim Mγ ≥ d − t (this is why the d is necessary since we do not know what component
of Supp M we will be restricting to). Since Mγ is still Sn , we see that Hγj (Mγ ) = 0 for
j < min(n, dim Mγ ). But then
min(n, dim Mγ ) ≥ min(n, d − t) > i − t
since n > i − t and d > i. Setting j = i − t we obtain a contradiction.
4in the terminology of [K+92, Section 16]
5In other words, depth M ≥ min(n, dim M ) for all z ∈ Spec R. Note that here we use dim M not dim R .
z
z
z
z
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
7
3. Depth and F -singularities
Our goal in this section is to prove several results on the depths of sheaves on schemes
with controlled F -singularities. First we prove our result for pairs (R, ∆) which are strongly
F -regular, this is the simplest case.
Theorem 3.1. (cf. [Kol11b, Theorem 2]) Suppose that (R, m) is local and that (X = Spec R, ∆)
is strongly F -regular. Further suppose that 0 ≤ ∆′ ≤ ∆ is such that rD ∼ r∆′ for some
integral divisor D and some integer r > 0 realtively prime to p. Then OX (−D) is CohenMacaulay.
Proof. By possibly multiplying r with an integer, we may assume that r = pe − 1. Choose,
using Lemma 2.13, 0 6= c ∈ R \ {minimal primes} such that c · Hmi (OX (−D)) = 0 for all
′
i < dim R. Note that since ∆′ ≤ ∆, C ∆ ⊆ C ∆ and then (X, ∆′ ) is strongly F -regular as well
by Lemma 2.9(iii). Therefore, by Lemma 2.9(vii) there exists an e > 0 and a splitting ϕ such
that the composition
F e (·c)
ϕ
OX −
→ F∗e OX −
→ F∗e OX ((pe − 1)∆′ ) −−∗−−→ F∗e OX ((pe − 1)∆′ ) −
→ OX
is an isomorphism. By replacing e by a multiple if necessary, we may assume that this e > 0
also satisfies the condition from the hypothesis.
Twisting by OX (−D), reflexifying, and applying Hmi ( ) we obtain the following composition which is also an isomorphism.
Hmi (OX (−D))
−
→ Hmi (F∗e OX ((pe − 1)(∆′ − D) − D))
F e (·c)
−−∗−−→ Hmi (F∗e OX ((pe − 1)(∆′ − D) − D))
ϕ
−
→ Hmi (OX (−D))
However, the map labeled F∗e (·c) is the zero map for i < dim X since
Hmi (F∗e OX ((pe − 1)(∆′ − D) − D)) = Hmi (F∗e OX (−D)).
Thus Hmi (OX (−D)) = 0 as desired.
Remark 3.2. If one assumes that (X, ∆) is purely F -regular (an analog of purely log terminal
[Tak08]), the same result holds by the same proof. The point is that we may take c annihilating
Hmi (R) and which simultaneously doesn’t vanish along the support of any component of ∆′ .
Corollary 3.3. (cf. [KM98, Corollary 5.25]) If (R, m) is local and (X = Spec R, ∆) is strongly
F -regular, then for every Q-Cartier integral divisor D, OX (−D) is Cohen-Macaulay.
Proof. If the index of D is not divisible by p then the statement is a special case of Theorem 3.1
by setting ∆′ := 0. Hence assume that the index m of D is divisible by p. Choose then an
effective divisor E linearly equivalent to D and set r := ms + 1, ∆′ := 1r E for some integer
s ≫ 0. In this situation r is relatively prime to p and
1
E = r∆′ .
rD = (ms + 1)D ∼ D ∼ E = r
r
Furthermore, for s ≫ 0, X, ∆ + 1r E is strongly F -regular. Hence, we may apply Theorem 3.1
for ∆ replaced by ∆+ 1r E and the above choices of r, D and ∆′ . This concludes our proof.
Before moving on to the sharply F -pure pairs, we need a Lemma on the existence of certain
Frobenius splittings.
Lemma 3.4. Suppose that (R, C ) is any pair where C is a Cartier subalgebra on a local ring (R, m). Suppose m is not C -compatible. Then there exists some Frobenius splitting
ϕ : F∗e R −→ R such that ϕ(F∗e m) = R ) m.
8
ZSOLT PATAKFALVI AND KARL SCHWEDE
Proof. There obviously exists a map in [C ]e , ψ : F∗e R −
→ R, such that ψ(F∗e m) 6⊆ m. It follows
e
that ψ(F∗ m) = R. We have two cases:
Case 1: Suppose that there is a unit d ∈ R \ m such that ψ(F∗e d) = u ∈
/ m. Thus
e
e
ψ(F∗e (u−p d)) = 1. Consider the map ϕ(F∗e ) = ψ(F∗e ((u−p d)· )) and notice that ϕ(F∗e 1) =
1 which shows that ϕ is a splitting. Also notice that m is not ϕ-compatible since ϕ is a unit
multiple of ψ. Thus we have found our ϕ.
Case 2: Since we have already handled Case 1, we may assume that ψ(F∗e d) ∈ m for all
units d ∈ R. Choose c ∈ m such that ψ(F∗e c) = 1. Now then ψ(F∗e 1) ∈ m since 1 is a unit.
Thus
ψ(F∗e (c + 1)) = ψ(F∗e c) + ψ(F∗e 1) ∈ 1 + m 6⊆ m
is a unit. But this is a contradiction since c is assumed not be a unit and so c+ 1 is a unit.
Remark 3.5. If, in addition to the hypotheses of Lemma 3.4, R is S2 and G1 , then by applying
the argument of Lemma 2.12 to the splitting ϕ constructed in the proof of Lemma 3.4, we
obtain a Q-divisor ∆ on X = Spec R such that
◦ (pe − 1)(KX + ∆) is Cartier.
◦ (X, ∆) is sharply F -pure.
◦ x = V (m) is not an F -pure center of (X, ∆).
The second two statements follow since ϕ ∈ [C ∆ ]e .
Theorem 3.6. (cf. [Kol11b, Theorem 3(2)]) Suppose that (R, m) is a local S2 -ring, and C
is a Cartier-subalgebra on R such that (R, C ) is sharply F -pure and V (m) is not an F -pure
center. Additionally suppose that Z ( X = Spec R is any union of F -pure centers of (R, C ).
We also assume that Z and X have no common irreducible components. If IZ is the (radical)
ideal defining Z, then
depthm IZ ≥ min{3, 1 + codimZ x}.
→ R
Proof. Since shrinking C is harmless, we set C = Rhϕi for some splitting ϕ : F∗e R −
which by Lemma 3.4 is not compatible with the origin V (m). Indeed, by Lemma 2.9(iii) we
can only increase the number of centers when restricting a Cartier subalgebra.
We have the long exact sequence:
· · · Hm1 (IZ ) −
→ Hm1 (R) −
→ Hm1 (R/IZ ) −
→ Hm2 (IZ ) −
→ Hm2 (R) −
→ Hm2 (R/IZ ) −
→ Hm3 (IZ ) −
→ ···
and recall we are trying to show that Hmi (IZ ) = 0 for i < min{3, 1 + codimZ x}. Since R is S2 ,
Hm1 (R) = Hm0 (R) = 0. Since Z 6= V (m) and Z is reduced, Hm0 (OZ ) = 0 and so Hm1 (IZ ) = 0.
Thus depthm IZ ≥ 2. It is now sufficient to prove the case when codimZ x ≥ 2. This implies
that dim X ≥ 3 (since Z and X have no common components).
Furthermore, we can assume that every component of Z has dimension at least 2. Indeed,
suppose that Z1 is an irreducible component of Z such that dim Z1 = 1. If Z2 is the union of
the other components of Z and Z2 6= ∅, then Z1 ∩ Z2 = x (for dimension reasons and since
we working in a local ring). But this implies that x is an F -pure center since intersections
of F -pure centers are unions of F -pure centers by Lemma 2.9(i). Thus we can assume that
Z1 = Z is 1-dimensional. But then codimZ x = 1, which contradictions our assumption.
By Lemma 2.10, we know that AnnR (Hm2 (R)) is compatible with
p (R, C ) = (R, Rhϕi).
2
However, if Hm (R) 6= 0, then since R is S2 and of dimension ≥ 3, AnnR (Hm2 (R)) = m by
Lemma 2.13. But AnnR (Hm2 (R)) is radical (since C is sharply F -pure) so AnnR (Hm2 (R)) = m.
But V (m) is not an F -pure center, this is a contradiction. We conclude that Hm2 (R) = 0.
Now we come to Hm1 (R/IZ ). Again, since R/IZ is reduced, R/IZ is S1. Furthermore, since Z
has no 1-dimensional components we can apply Lemma 2.13 to conclude that AnnR Hm1 (R/IZ )
can either be m-primary or R. Suppose it is m-primary. Since ϕ|Z is still a splitting, it follows
that AnnR/IZ Hm1 (R/IZ ) is ϕ|Z -compatible and also radical and so equal to m/IZ . But then
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
9
m is ϕ-compatible by basic facts about Frobenius splitting or by Lemma 2.9(vi). We conclude
that Hm1 (R/IZ ) = 0. This forces Hm2 (IZ ) to be zero and completes the proof.
Remark 3.7. Another way to state a special case of Theorem 3.6 using the language of Frobenius splittings is as follows:
Suppose that (R, m) is an S2 local ring with Frobenius splitting ϕ : F∗e R −→ R which is not
compatibly split with m. Additionally suppose that Z is any union of compatibly split subvarieties of X = Spec R such that no irreducible component of Z coincides with an irreducible
component of X. Suppose that IZ ⊆ R is the ideal defining Z, then
depthm IZ ≥ min{3, 1 + codimZ x}.
Now we come to our main technical result on depth. It is a characteristic p > 0 version of
[Kol11b, Theorem 3(1)] but also compare with [Ale08, Lemma 3.2], [Fuj09, Theorem 4.21],
[AH11, Theorem 1.5] and [Kov11, Theorem 1.2, 1.5].
Theorem 3.8. (cf. [Kol11b, Theorem 3(1)]) Suppose that R is local, S2 and G1 , X = Spec R
and that 0 ≤ ∆ ∈ WDivR (X) is such that (R, ∆) is sharply F -pure. Set x ∈ X to be the
closed point and assume that x is not an F -pure center of (R, ∆). Suppose that 0 ≤ ∆′ ≤ ∆
is another element of WDivR (X) and that r∆′ is integral for some r > 0 relatively prime
to p. Further assume that M is any rank-1 (along each component of X) reflexive coherent
subsheaf of K(X) such that M (−r) ∼
= OX (r∆′ ) (here (·) denotes reflexive power).6 Then
depthx M ≥ min{3, codimX x} = min{3, dim R}.
Proof. First observe that it is harmless to assume that dim R ≥ 3 since otherwise the statement is trivial since M is reflexive and thus S2 by [Har94, Theorem 1.9]. We may also assume
that M ⊆ OX is an ideal sheaf since we are working locally. We thus identify M with an
ideal of R also denoted by M . Finally, by replacing r by a power if necessary, we may assume
that r = pe − 1 for some e > 0.
Using Lemma 3.4, we can find ϕ a splitting, not compatible with m, making the following
composition an isomorphism:
ϕ
OX −
→ F∗e OX ֒→ F∗e OX ((pe − 1)∆′ ) ֒→ F∗e OX (⌈(pe − 1)∆⌉) −
→ OX .
Twisting by M and reflexifying (which we denote by
∗∗ ),
we obtain
M
e
−
→ F∗e (M (p −1) ⊗ M )∗∗
e
֒→ F∗e (OX ((pe − 1)∆′ ) ⊗ M (p −1) ⊗ M )∗∗
e
֒→ F∗e (OX (⌈(pe − 1)∆⌉) ⊗ M (p −1) ⊗ M )∗∗
ϕ
−−M
→ M.
Using the fact that (OX ((pe − 1)∆′ ) ⊗ M (p
e −1)
)∗∗ ∼
= OX , we have a composition
M−
→ F∗e M −
→M
that is an isomorphism (note the first map is not the usual inclusion of ideal sheaves via
Frobenius).
Certainly Hm1 (M ) = 0 since M is reflexive and thus S2 by [Har94, Theorem 1.9]. We now
study Hm2 (M ). Since M is S2 , it follows that either AnnR Hm2 (M ) is equal to R or it is mprimary by Lemma 2.13. Since we have an injection Hm2 (M ) −
→ Hm2 (F∗e M ), it follows that
e
2
2
p
AnnR Hm (M ) is at the very least radical (since if r kills Hm (M ), so does r). In particular,
if AnnR Hm2 (M ) 6= R, then it must be m.
6Note that it is also common to use the notation
confused with Frobenius power.
[·]
. We do not use that notation since it might be
10
ZSOLT PATAKFALVI AND KARL SCHWEDE
Fix [z] ∈ Hm2 (M ), and recall that we are considering M as an ideal. If zj ∈ Γ(U, M )7, then
since ∆′ ≥ 0 we have
e
e
zjp ∈ Γ(U, M (p ) ) ⊆ Γ U, (OX ((pe − 1)∆′ ) ⊗ M (p
e −1)
⊗ M )∗∗ .
Thus we have a class
e
[F∗e z p ] ∈ Hm2 F∗e (OX ((pe − 1)∆′ ) ⊗ M (p
e −1)
⊗ M )∗∗ .
e
Now, when we apply ϕM to this class, it is just applied component-wise. Thus ϕM ([F∗e z p ]) =
e
[z]. For any r ∈ m, it follows that ϕM ((F∗e r).[F∗e z p ]) = ϕ(F∗e r).[z]. In particular, if an
e
arbitrary F∗e r ∈ F∗e m annihilates all classes [y] ∈ Hm2 (F∗e (OX ((pe − 1)∆′ ) ⊗ M (p −1) ⊗ M )∗∗ ) ∼
=
Hm2 (F∗e M ), then ϕ(F∗e r) also annihilates all such [z] ∈ Hm2 (M ).
This proves that m is ϕ-compatible, a contradiction.
4. Applications
Here we list the most important corollaries of the results of Section 3. The characteristic
zero analog of many of them are already mentioned in [Kol11b]. We still state them here for
the sake of completeness and we give a full proof of our main motivation, the compatibility
of the relative canonical sheaf with base change. In Section 4.A some lemmas are gathered
while in Section 4.B the promised corollaries are presented.
4.A. Auxilliary results. In this section, we prove a series of lemmas culminating with a
base change statement for relative canonical sheaves for families with sharply F -pure fibers
Lemma 4.7.
4.A.1. Basic lemmas on depth and relative canonical sheaves. We begin with a short section
where we make note of some simple results on depth and relative canonical sheaves that we
will use.
Fact 4.1. [BH93, Theorem 1.2.5] Let F be a coherent sheaf on a Noetherian scheme X, H
a Cartier divisor on X containing a point P , such that the local equation of H at P is not a
zero divisor of FP (in other words, it is a regular element for Fp ). Then
(a) depth FP ≥ d ⇔ depth(F |H )P ≥ d − 1,
(b) depth FP ≥ min{d, dim FP } ⇔ depth(F |H )P ≥ min{d − 1, dim(F |H )P }.
Lemma 4.2. If f : X −→ Y is a morphism of Noetherian schemes, F 6= 0 is a coherent
sheaf on X flat over Y , such that F |Xy is Sd for every y ∈ Y (i.e., F is relatively Sd over
Y ) and G 6= 0 is an Sd coherent sheaf on Y , then F ⊗ f ∗ G is Sd as well.
7Here U = X \ {x}, and local cohomology classes are treated as Čech classes on U as explained earlier.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
11
Proof. Fix an arbitrary P ∈ X and set Q := f (P ) and F := XQ . Then
depthOX,P (F ⊗ f ∗ G )P
= depthOF,P (F |F )P + depthOY,Q GQ
|
{z
}
F is flat over Y & [Gro65, Proposition 6.3.1]
≥ min d, dimOF,P (F |F )P
{z
|
F |F is Sd
+ depthOY,Q GQ
}
= min d + depthOY,Q GQ , dimOF,P (F |F )P + depthOY,Q GQ
≥ min d + depthOY,Q GQ , dimOF,P (F |F )P + min{d, dimOY,Q GQ }
|
{z
}
G is Sd
= min d + depthOY,Q GQ , min{dimOF,P (F |F )P + d, dimOF,P (F |F )P + dimOY,Q GQ }
= min d + depthOY,Q GQ , min{dimOF,P (F |F )P + d, dimOX,P (F ⊗ f ∗ G )P }
|
{z
}
F is flat over Y and [Gro65, Corollaire 6.1.2]
≥ min d + depthOY,Q GQ , min{d, dimOX,P (F ⊗ f ∗ G )P }
≥ min d, dimOX,P (F ⊗ f ∗ G )P .
Lemma 4.3. If f : X −→ Y is a flat morphism of finite type to a Gorenstein scheme, then
q
q
ωX/Y and ωX [− dim Y ] are locally isomorphic. In particular if X is relatively Gorenstein over
Y , then it is Gorenstein, and ωX/Y and ωX are locally isomorphic over Y .
Proof. Locally on Y the following isomorphisms hold.
q
q
q
ωX/Y = f ! OY ∼
= ωX [− dim Y ]
= f ! ωY ∼
= f ! ωY [− dim Y ] ∼
Before continuing, let us remind ourselves of how F -adjunction works and how it can allow
us to restrict divisors.
4.A.2. Restricting divisors by F -adjunction: the F -different. Suppose that ∆ ≥ 0 is a Qdivisor on an S2 and G1 variety X and that (pe − 1)(KX + ∆) is Cartier. In fact, everything
we say even holds more generally if ∆ ≥ 0 is a Z(p) -Weil divisorial sheaf, which is intuitively
something like a Weil divisor having components also in the singular locus8. Further suppose
that D is a reduced Cartier divisor on X that is itself S2 and G1 and which has no common
components with ∆. We now explain how we can construct a canonical Z(p) -Weil divisorial
sheaf (not necessarily a Z(p) -Weil divisor) which we call Diff F,D ∆ on D. Here the subindex
F means that this is the F -singularity counterpart of the usual different known from minimal model program theory. However, contrary to the usual different, the construction of
Dif fF,D ∆ goes through without any further assumption requiring that ∆ is Q-Cartier at
certain points.
Without loss of generality we can assume that X = Spec R and that R is a local ring
and that D = V (f ). The fact that the divisor (pe − 1)(KX + ∆) is Cartier implies that
HomR (F∗e R((pe − 1)∆), R) is a free F∗e R-module. Choose a generator of this module ϕ, which
8See [K+92] and [MS12] for definitions, in the latter source these are called Z -AC-divisors.
(p)
12
ZSOLT PATAKFALVI AND KARL SCHWEDE
we can also view as an element of HomR (F∗e R, R) since ∆ is effective. Now define a new map
e
e
ψ : F∗e R −
→ R by the rule ψ(F∗e ) = ϕ(F∗e (f p −1 · )). Certainly ψ(F∗e hf i) = ϕ(F∗e hf p i) ⊆
hf i and thus ψ induces a map ψ ∈ HomR/hf i (F∗e R/hf i, R/hf i).
Note that for every height one prime η containing f ∈ R, i.e., a minimal associated prime
of D, we have that ∆η = 0 (since ∆ and D have no common components). Furthermore, Rη
is regular (since Rη /hf i is reduced and zero dimensional and hence regular). It follows from
inspection that ψ is non-zero at every such η. By [MS12, Theorem 2.4], it follows that ψ
induces an effective Z(p) -Weil divisorial sheaf on D. It is straightforward to verify that ∆|D
is independent of the choice of e and ϕ and so:
Definition 4.4. We use Diff F,D ∆ to denote the effective Z(p) -Weil divisorial sheaf described
above which coincides with ψ.
We also observe:
Observation 4.5 (F -adjunction [Sch09]). Notice now additionally that ψ (corresponding to
Diff F,D ∆) is surjective if and only if ψ (corresponding to ∆+D) is surjective. In other words,
(X, ∆ + D) is sharply F -pure near D if and only if (D, Diff F,D ∆) is sharply F -pure.
It will be useful for us to note that if (D, Diff F,D ∆) is sharply F -pure, then Diff F,D ∆
is in fact an honest Z(p) -Weil divisor and not just a Z(p) -divisorial sheaf. Suppose not, then
the Weil divisorial sheaf (pe − 1)(Diff F,D ∆) must properly contain OD , even at some generic
point of the non-normal locus. A contradiction can then be obtained from the fact that the
conductor is already compatible with every ϕ ∈ C R (this last fact follows from the argument
of [BK05, Proposition 1.2.5]).
The above introduced F -different Diff F,D ∆ is equal to ∆|D in most cases when the latter
is defined.
Lemma 4.6. With the notation above, suppose additionally that ∆ is Z(p) -Cartier at all of
the height-two primes primes of R containing f (the codimension 2 points of X that are
contained inside D). Then Diff F,D ∆ coincides with the restriction ∆|D of ∆ to D.
Proof. At each of those codimension 2 points q ∈ Spec R, Rq is already Gorenstein (since
R/hf i is G1 and so Rq /hf i is Gorenstein). It is enough to prove the result at each such q,
so fix one such q. Further choose e > 0 as above and also sufficiently divisible such that
(pe − 1)D is Cartier at q. We can thus write (pe − 1)∆ = divSpec Rq (g) for some g ∈ Rq .
Since Rq is Gorenstein, we can choose Φ ∈ HomRq (F∗e Rq , Rq ) generating the set as an F∗e Rq e
→ Rq defined by the rule Ψ(F∗e ) = Φ(F∗e (f p −1 · )).
module. Consider the map Ψ : F∗e Rq −
Certainly Ψ restricts to a map Ψ ∈ HomRq /hf i (F∗e (Rq /hf i), Rq /hf i) as above. Furthermore, Ψ
generates the F∗e (Rq /hf i)-module HomRq /hf i (F∗e (Rq /hf i), Rq /hf i) by the diagrams in [Sch09,
Proof of Proposition 7.2]. It follows that ψ = (F∗e g) · Ψ restricts to ϕ = (F∗e g) · Ψ and hence
corresponds to the naive restriction ∆|W . This proves the lemma.
4.A.3. The relative canonical sheaf. We apply the above ideas on F -different to the following.
It is the inductional step in the proof of Corollary 4.13.
Lemma 4.7. Let f : X −→ Y be a flat morphism of finite type with S2 , G1 equidimensional
fibers to a smooth variety9 Y and ∆ ∈ WDivQ (X), such that KX + ∆ is Q-Cartier and
p 6 | ind(KX + ∆). Assume also that Z ⊆ Y is a smooth Cartier divisor such that for
W := X ×Y Z, ∆ does not contain any component of W and (W, Diff F,W ∆) is sharply
F -pure.10 Then ωX/Y |W ∼
= ωW/Z .
9Variety here means a separated, integral scheme of finite type over an algebraically closed base-field.
10The fact that (W, Diff
F,W ∆) is sharply F -pure implies that Diff F,W ∆ is a Z(p) -divisor and not simply a
Z(p) -Weil divisorial sheaf.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
13
Proof. By Lemma 4.2, both X and W are S2 . Similarly, both are G1 by Lemma 4.3. By F adjunction Observation 4.5, cf. [Sch09, Main Theorem, Proposition 7.2, Remark 7.3], (X, ∆+
W ) is sharply F -pure in a neighborhood of W . Hence, so is (X, ∆). We now claim:
Claim 4.8. No F -pure center of (X, ∆) is contained in W .
Proof of claim. Suppose that Z ⊆ X was an F -pure center of (X, ∆) contained in W . Let
η denote the generic point of Z and now we work in R = OX,η with maximal ideal m
→ OX,η of [C ∆ ]e , we
corresponding to η. For any element ϕ : F∗e OX,η ⊆ F∗e OX,η (⌈(pe −1)∆⌉) −
e
notice that ϕ(F∗ m) ⊆ m since Z is an F -pure center. Choose f ∈ m to be the defining equation
e
of the Cartier divisor W in OX,η . It follows from construction that (F∗e f p −1 ) · [C ∆ ]e =
e
[C ∆+W ]e . In other words, for any ψ ∈ [C ∆+W ]e , we can write ψ(F∗e ) = ϕ(F∗e (f p −1 · ))
e
for some ϕ ∈ [C ∆ ]e . With this notation, for any r ∈ R we have ψ(F∗e r) = ϕ(F∗e (f p −1 r)) ∈
ϕ(F∗e m) ⊆ m. This proves that (X, ∆ + W ) is not sharply F -pure at η, the generic point of
Z. But we assumed that (X, ∆ + W ) was sharply F -pure, a contradiction which proves the
claim.
We return to the proof of Lemma 4.7. By Theorem 3.8 then, for every x ∈ W ,
depthx ωX ≥ min{3, codimX x} = min{3, dim ωX,x }.
However, by Lemma 4.3, ωX and ωX/Y are isomorphic locally, and then in the above inequality ωX can be replaced by ωX/Y . Then by Fact 4.1, ωX/Y |W is S2 . To be precise, to apply
Fact 4.1, one needs to prove a priori that the local equation of W is not a zero-divisor of ωX/Y .
For this it is enough to show that ωX/Y is S1 , which follows using again that locally ωX/Y
and ωX are isomorphic and that ωX is S2 by [KM98, Corollary 5.69]. Therefore ωX/Y |W is S2
indeed. However, so is ωW/Z by using [KM98, Corollary 5.69] again. Furthermore, ωX/Y |W
and ωW/Z are isomorphic on the relative Gorenstein locus, since the relative canonical sheaf
is compatible with base-change for Gorenstein morphisms [Con00, Theorem 3.6.1]. Therefore
[Har94, Theorems 1.9 and 1.12] yields the statement of the lemma.
The next lemma is used in Corollary 4.15. It allows us to cite [Kol11a].
Lemma 4.9. Suppose that Y is a scheme of finite type over an algebraically closed field. If
f : X −→ Y is a projective, flat, relatively S2 and G1 , equidimensional morphism, then ωX/Y
is reflexive.
Proof. According to [HK04, Corollary 3.7], it is enough to exhibit an open set U contained
in the relative Gorenstein locus, such that
(a) for Z := X \ U , codimXy Zy ≥ 2 for every y ∈ Y and
(b) for the inclusion of open set j : U ֒→ X, the natural homomorphism ωX/Y −
→
j∗ (ωX/Y |U ) is an isomorphism.
Let W be the non-relatively Gorenstein locus. Fix a finite surjective morphism π : X −
→ PnY
over Y , after possibly shrinking Y (cf. [Kol11b, proof of Corollary 24]). Set then Z :=
π −1 (π(W )), V := PnY \ π(W ). Let q : V −
→ PnY be the natural inclusion. With the above
choices, codimXy Zy ≥ 2 is satisfied for all y ∈ Y . For the other condition, notice that it
is enough to prove that the natural homomorphism π∗ ωX/Y −
→ π∗ j∗ (ωX/Y |U ) is an isomorphism. However
π∗ j∗ (ωX/Y |U ) ∼
= q∗ ((π∗ ωX/Y )|V ) ∼
= q∗ Hom V ((π∗ OX )|V , ωV /Y )
{z
}
|
Grothendieck duality
∼
= Hom X (π∗ OX , q∗ ωV /Y ) ∼
=
|
{z
}
adjoint functors
Hom X (π∗ OX , ωPn /Y )
|
{z
Y
}
[HK04, Proposition 3.5] using that
ωPn /Y is flat and relatively S2
Y
∼
= π∗ ωX/Y ,
14
ZSOLT PATAKFALVI AND KARL SCHWEDE
and the composition of the above isomorphisms is the natural homomorphism π∗ ωX/Y −
→
π∗ j∗ (ωX/Y |U ).
4.B. Consequences.
We begin with a simple consequence on the depth of OX and ωX .
Corollary 4.10. (cf. [Ale08, Lemma 3.2], [Fuj09, Theorem 4.21], [Kol11b, 4.1, 4.2, 4.3],
[AH11, Theorem 1.5], [Kov11, Theorem 1.2, 1.5]) Suppose that X = Spec R is S2 and G1 . If
X is F -pure and x ∈ X is not an F -pure center of X, then
depthx OX ≥ {3, codimX x} and depthx ωX ≥ min{3, codimX x}.
Proof. We may assume that X = Spec R for a local ring (R, m) with x = V (m). Since X
is S2 and G1 , by using Remark 3.5, we can assume that there exists some ∆ ≥ 0 such that
(pe − 1)(KX + ∆) is Cartier, such that (X, ∆) is sharply F -pure and such that x is not
an F -pure center of (X, ∆). Now the second statement follows from Theorem 3.8 by setting
M = OX (KX ) and setting ∆′ = ∆. The first statement also follows from Theorem 3.8 by
setting M = OX and ∆′ = 0.
Question 4.11. Suppose that (R, m) is F -injective. If m is not an annihilator of any F -stable
submodule of Hmi (R), does that imply any depth conditions on R or ωR ?
To prove our main corollary, we need to introduce a generalization of Diff F,D ∆ to the case
when D has higher codimension. We focus only on our case of interest, that is, when D is
the fiber over a smooth base.
Definition 4.12. Let f : X −
→ Y be a flat morphism of finite type with S2 , G1 equidimensional fibers. Further suppose that Y is a smooth variety, and ∆ ∈ WDivQ (X) is such that
∆ does not contain any component of any fiber. Fix a point y ∈ Y . Working locally, we may
assume that Y = Spec A and X = Spec R for local rings (A, n) and (R, m). Further assume
that n = hf1 , . . . , fn i is regular system of generators with Yi = V (f1 , . . . , fi ) regular. Then,
let ∆i := Diff F,Yi ∆i−1 and define then Diff F,Xy ∆ := ∆n .
The only question is whether this construction of Diff F,Xy ∆ is independent of the choice of
fi . Following the method of F -adjunction, multiplying by each fi successively, we take a map
corresponding to ∆ and ϕ : F∗e R −
→ R and obtain another map ψf : F∗e R −
→ R defined by
e
e
e
the rule ψf (F∗ ) = ϕ(F∗ ((f1 · · · fn )p −1 · )). We then restrict this map to Xy by modding
out by n and so obtain ψ f .
Choosing different Yi ’s is simply choosing a different set of generators {g1 , . . . , gn } for n
which yields ψ g . To complete the proof of the claim, it is sufficient to show that these maps
e
differ only by multiplication by a unit. We use n[p ] to denote the ideal generated by the pe th
e
e
e
e
e
powers of the generators of n. Since n[p ] : n = h(f1 · · · fn )p −1 i+n[p ] = h(g1 · · · gn )p −1 i+n[p ] ,
e
e
see for example [Fed83, Proposition 2.1], it follows that (f1 · · · fn )p −1 = u(g1 · · · gn )p −1 +
P
e
vi hpi for some unit u ∈ A, elements vi ∈ A and hi ∈ n. But now we see that ψ f = (F∗e u)·ψ g
e
since any multiple of hpi will be sent into nR. This completes the proof.
Corollary 4.13. (cf. [Kol11b, 4.3]) Let f : X −→ Y be a flat morphism of finite type with
S2 , G1 , equidimensional fibers to a smooth variety and let ∆ ∈ WDivQ (X) be such that it
does not contain any component of any fiber. Additionally assume that KX + ∆ is Q-Cartier,
p 6 | ind(KX + ∆) and (Xy , Diff F,Xy ∆) is sharply F -pure for every y ∈ Y . Then ωX/Y is flat
over Y and compatible with arbitrary base change.
Proof. We claim that ωX/Y is flat over Y and relatively S2 . By [BHPS12, Lemma 2.13],
flatness follows as soon as we prove that the restriction of ωX/Y to every fiber is S1 . On
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
15
the other hand relatively S2 means the stronger condition that the above restrictions are S2 .
Therefore to show the claim, it is enough to prove that ωX/Y |Xy is S2 for every y ∈ Y . By
[KM98, Corollary 5.69], ωXy is S2 and hence, it is enough to show that ωX/Y |Xy ∼
= ωXy locally
around every point x ∈ Xy . We thus replace both X and Y by Spec OX,x and Spec OY,y ,
respectively. Therefore, we may assume that there is a sequence of smooth subvarieties:
Y = Y0 ⊇ Y1 ⊇ · · · ⊇ Ym−1 ⊇ Ym = {y}, such that Yi−1 is a Cartier divisor in Yi . Set
Xi := XYi and ∆i := Diff F,Xi ∆i−1 with ∆0 = ∆. Note that then Deltam = Diff F,Xy ∆.
By applying Observation 4.5 (backwards) inductively and possibly further restricting X
around x, one obtains that (Xi , ∆i + Xi−1 ) and hence (Xi , ∆i ) is sharply F -pure for all i
(in fact, this also implies all the Z(p) -Weil divisorial sheaves ∆i are honest divisors). Finally,
applying Lemma 4.7 inductively again yields that ωXi /Yi |Xi−1 ∼
= ωXi−1 /Yi−1 for all i, and
consequently ωX/Y |Xy ∼
= ωXy . This finishes the proof of our claim.
By our claim and [HK04, Corollary 3.8] ωX/Y and all its pullbacks are reflexive. Hence, by
restricting to the relatively Cohen-Macaulay locus (whose complement has codimension ≥ 2)
and using [HK04, Proposition 3.6], for any morphism Z −
→ Y , ωXZ /Z ∼
= (ωX/Y )Z .
Remark 4.14. By Lemma 4.6, the appearance of Diff F,Xy ∆ can be replaced by an actual
“geometric” restriction, if we assume the following:
(1)
for each y ∈ Y , there is some r > 0 relatively prime to p such that r∆ is
Cartier at the codimension 1 points of the fiber Xy ⊆ X.
In particular, this is satisfied if Supp ∆ does not contain the singular codimension one points
of the fibers. Indeed, let ξ be a codimesnion 1 point of a fiber Xy . If ξ is in the singular locus
of Xy , then ξ 6∈ Supp ∆ and hence ∆ is Cartier at ξ. Otherwise, X is smooth around ξ, and
hence KX is Cartier at ξ. In particular then by p 6 | ind(KX + ∆), we obtain that ∆ is Z(p)
Cartier at ξ. In either cases ∆ satisfies (1), and therefore in the special case of Corollary 4.13
stated in Section 1, the use of ordinary restriction of ∆ was legitimate.
When f is projective, the compatibility of Corollary 4.13 follows for arbitrary reduced base
by an important result of Kollár [Kol11a].
Corollary 4.15. Let f : X −→ Y be a flat projective morphism with S2 , G1 equidimensional
fibers. Further suppose that Y is a reduced, separated scheme of finite type over an algebraically
closed field, and ∆ a Q-Weil-divisor that avoids all the codimension zero and the singular
codimension one points of the fibers. Additionally assume that there is a p 6 | N > 0, such
[N ]
that N ∆ is Cartier in relative codimension one and ωX/Y (N ∆) 11 is a line bundle and that
(Xy , ∆y ) is sharply F -pure for every y ∈ Y . Then ωX/Y is flat and compatible with arbitrary
base change.
Proof. First, we need some preparation about pulling back ∆. Suppose τ : Y ′ −
→ Y is a
′
′
′
′
′
′
morphism and set X := X ×Y Y , π : X −
→ X, and f : X −
→ Y the induced morphisms.
Then a natural pullback ∆′ of ∆ can be defined as follows. Let U ⊆ X be the open set
where f is Gorenstein and ∆ is Q-Cartier. Then, pull ∆|U back to π −1 U , and finally extend
it uniquely over X ′ . This extension is unique, since codimX ′ X ′ \ π −1 U ≥ 2. We claim that
(2)
[N ]
[N ]
π ∗ ωX/Y (N ∆) ∼
= ωX ′ /Y ′ (N ∆′ ).
11 Let U be the intersection of the relative Gorenstein locus and the locus where N ∆ is Cartier. Set
[N]
N
ι : U −→ X for the natural inclusion. The sheaf ωX/Y (N ∆) is the reflexive hull of ωU/Y
(N ∆|U ), i.e. the
N
unique reflexive sheaf that restricts on U to the above sheaf. It can be obtained as ι∗ (ωU/Y (N ∆|U )). Indeed,
N
ι∗ (ωU/Y
(N ∆|U )) is reflexive by [HK04, Corollary 3.7] and it is unique by [HK04, Proposition 3.6].
16
ZSOLT PATAKFALVI AND KARL SCHWEDE
[N ]
[N ]
Indeed, notice that by construction π ∗ ωX/Y (N ∆) and ωX ′ /Y ′ (N ∆′ ) agree over π −1 U , that
[N ]
is, in relative codimension one. Notice also that since ωX/Y (N ∆) is assumed to be a line
[N ]
[N ]
bundle, so is π ∗ ωX/Y (N ∆), and therefore π ∗ ωX/Y (N ∆) is reflexive. On the other hand, since
[N ]
ωX ′ /Y ′ (N ∆′ ) is defined as a pushforward of a line bundle from relative codimension one,
it is reflexive by [HK04, Corollary 3.7]. Therefore by [HK04, Proposition 3.6], (2) holds. In
[N ]
particular, ωX ′ /Y ′ (N ∆′ ) is a line bundle.
The main consequence of the previous paragraph, is that the conditions of the corollary
are invariant under pullback to another reduced, separated scheme Y ′ of finite type over k.
That is, X ′ , f ′ and ∆′ defined above satisfy all the assumptions of the corollary. Let us turn
now to the actual proof of the corollary. First, we may assume that Y is connected. Second,
according to [Kol11a, Corollary 24] and Lemma 4.9, there is a locally closed decomposition
∐Yi −
→ Y , such that if T −
→ Y , then ωXT /T is flat and commutes with base-change if and
only if T −
→ Y factors through some Yi −
→ Y . Now, for every irreducible component Y ′ of Y ,
→S
there is a regular alteration S −
→ Y ′ [dJ96, Thorem 4.1]. By the above discussion XS −
satisfies the assumptions of the corollary, and hence also of Corollary 4.13. Therefore, ωXS /S
is flat and compatible with arbitrary base-change. Hence S −
→ Y factors through one of the
Yi . In particular, since the image of S −
→ Y is the component Y ′ , Y ′ ⊆ Yi . That is, every
irreducible component of Y is contained in one Yi . However, Y is connected, therefore all
irreducible components of Y are contained in the same Yi , and hence by the reducedness of
Y , Yi = Y .
Remark 4.16. In the case of dim Y = 1, if instead of assuming that Xy is sharply F -pure,
one assumes that (X, Xy ) is F -pure for all y ∈ Y , the p 6 | ind(KX + ∆) assumption can be
dropped from the above corollaries using the trick of Lemma 2.12.
Question 4.17. Does the compatibility of the relative canonical sheaf with base change stated
in Corollary 4.13 hold for singular Y (with the adequate modification in the setup as in
Corollary 4.15)? From the modular point of view, especially interesting would be the case of
non-reduced Y . This case is open even in the projective case.
Remark 4.18. It should be noted that the characteristic zero analogue of Corollary 4.13 is
known if f is projective and Y is arbitrary [KK10, Theorem 7.9]. That is, the answer to the
characteristic zero analogue of Question 4.17 is positive when f is projective.
Question 4.19. Can one replace sharply F -pure by log-canonical (still assuming positive
characteristic) in the statement of Corollary 4.13? This would also be important from the
modular point of view, since sharply F -pure varieties can be deformed to log-canonical but
not sharply F -pure varieties.
Question 4.20. Can one remove the divisibility by p condition from the statement of Corollary 4.13?
Remark 4.21. [Kol11b, 4.10] The sheaf OX (−D) in Theorem 3.1 and Theorem 3.8 cannot be
replaced by OX (D) as shown in [Kol11b]. We refer to [Kol11b] for the actual example.
References
[AE05]
I. M. Aberbach and F. Enescu: The structure of F -pure rings, Math. Z. 250 (2005), no. 4,
791–806. MR2180375
[Ale08]
V. Alexeev: Limits of stable pairs, Pure Appl. Math. Q. 4 (2008), no. 3, Special Issue: In honor
of Fedor Bogomolov. Part 2, 767–783. 2435844 (2009j:14020)
[AH11]
V. Alexeev and C. Hacon: Non-rational centers of log canonical singularities, arXiv:1109.4164.
[BHPS12] B. Bhatt, W. Ho, Zs. Patakfalvi, and C. Schnell: Moduli of products of stable varieties,
arXiv:1206.0438.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
[Bli09]
[BST11]
[BK05]
17
M. Blickle: Test ideals via algebras of p−e -liner maps, arXiv:0912.2255, to appear in J. Algebraic
Geom.
M. Blickle, K. Schwede, and K. Tucker: F -signature of pairs and the asymptotic behavior of
Frobenius splittings, arXiv:1107.1082.
M. Brion and S. Kumar: Frobenius splitting methods in geometry and representation theory, Progress in Mathematics, vol. 231, Birkhäuser Boston Inc., Boston, MA, 2005. MR2107324
(2005k:14104)
[BH93]
[Con00]
[dJ96]
[EH08]
[Fed83]
W. Bruns and J. Herzog: Cohen-Macaulay rings, Cambridge Studies in Advanced Mathematics,
vol. 39, Cambridge University Press, Cambridge, 1993. MR1251956 (95h:13020)
B. Conrad: Grothendieck duality and base change, Lecture Notes in Mathematics, vol. 1750,
Springer-Verlag, Berlin, 2000. MR1804902 (2002d:14025)
A. J. de Jong: Smoothness, semi-stability and alterations, Inst. Hautes Études Sci. Publ. Math.
(1996), no. 83, 51–93. 1423020 (98e:14011)
F. Enescu and M. Hochster: The Frobenius structure of local cohomology, Algebra Number
Theory 2 (2008), no. 7, 721–754. MR2460693 (2009i:13009)
R. Fedder: F -purity and rational singularity, Trans. Amer. Math. Soc. 278 (1983), no. 2, 461–480.
MR701505 (84h:13031)
[Fuj09]
[Gab04]
[Gro65]
O. Fujino: Introduction to the log minimal model program for log canonical pairs, arXiv:0907.1506.
O. Gabber: Notes on some t-structures, Geometric aspects of Dwork theory. Vol. I, II, Walter de
Gruyter GmbH & Co. KG, Berlin, 2004, pp. 711–734.
A. Grothendieck: Éléments de géométrie algébrique. IV. Étude locale des schémas et des morphismes de schémas. II, Inst. Hautes Études Sci. Publ. Math. (1965), no. 24, 231. 0199181 (33
#7330)
[HK10]
[HW02]
[Har66]
[Har94]
[HK04]
[HR76]
[Kol87]
C. D. Hacon and S. J. Kovács: Classification of higher dimensional algebraic varieties, Oberwolfach Seminars, vol. 41, Birkhäuser Verlag, Basel, 2010. 2675555 (2011f:14025)
N. Hara and K.-I. Watanabe: F-regular and F-pure rings vs. log terminal and log canonical
singularities, J. Algebraic Geom. 11 (2002), no. 2, 363–392. MR1874118 (2002k:13009)
R. Hartshorne: Residues and duality, Lecture notes of a seminar on the work of A. Grothendieck,
given at Harvard 1963/64. With an appendix by P. Deligne. Lecture Notes in Mathematics, No.
20, Springer-Verlag, Berlin, 1966. MR0222093 (36 #5145)
R. Hartshorne: Generalized divisors on Gorenstein schemes, Proceedings of Conference on Algebraic Geometry and Ring Theory in honor of Michael Artin, Part III (Antwerp, 1992), vol. 8, 1994,
pp. 287–339. MR1291023 (95k:14008)
B. Hassett and S. J. Kovács: Reflexive pull-backs and base extension, J. Algebraic Geom. 13
(2004), no. 2, 233–247. MR2047697 (2005b:14028)
M. Hochster and J. L. Roberts: The purity of the Frobenius and local cohomology, Advances
in Math. 21 (1976), no. 2, 117–172. MR0417172 (54 #5230)
J. Kollár: Subadditivity of the Kodaira dimension: fibers of general type, Algebraic geometry,
Sendai, 1985, Adv. Stud. Pure Math., vol. 10, North-Holland, Amsterdam, 1987, pp. 361–398.
MR946244 (89i:14029)
[Kol90]
J. Kollár: Projectivity of complete moduli, J. Differential Geom. 32 (1990), no. 1, 235–268. 1064874
(92e:14008)
[Kol11a]
[Kol11b]
[K+92]
J. Kollár: Hulls and husks, arXiv:0805.0576.
J. Kollár: A local version of the Kawamata-Viehweg vanishing theorem, Pure Appl. Math. Q. 7
(2011), no. 4, Special Issue: In memory of Eckart Viehweg, 1477–1494. 2918170
J. Kollár and 14 coauthors: Flips and abundance for algebraic threefolds, Société Mathématique
de France, Paris, 1992, Papers from the Second Summer Seminar on Algebraic Geometry held at
the University of Utah, Salt Lake City, Utah, August 1991, Astérisque No. 211 (1992). MR1225842
(94f:14013)
[KK10]
[KM98]
[Kov11]
[Kun76]
J. Kollár and S. J. Kovács: Log canonical singularities are Du Bois, J. Amer. Math. Soc. 23
(2010), no. 3, 791–813. 2629988
J. Kollár and S. Mori: Birational geometry of algebraic varieties, Cambridge Tracts in Mathematics, vol. 134, Cambridge University Press, Cambridge, 1998, With the collaboration of C. H.
Clemens and A. Corti, Translated from the 1998 Japanese original. MR1658959 (2000b:14018)
S. Kovács: Irrational centers, Pure Appl. Math. Q. 7 (2011), no. 4, Special Issue: In memory of
Eckart Viehweg, 1495–1515. 2918171
E. Kunz: On Noetherian rings of characteristic p, Amer. J. Math. 98 (1976), no. 4, 999–1013.
MR0432625 (55 #5612)
18
ZSOLT PATAKFALVI AND KARL SCHWEDE
[MS12]
[Pat10]
[Ray78]
[Sch09]
[Sch10]
[Sch11]
[SS10]
[Tak08]
L. E. Miller and K. Schwede: Semi-log canonical vs F -pure singularities, J. Algebra 349 (2012),
150–164. 2853631
Zs. Patakfalvi: Base change behavior of the relative canonical sheaf related to higher dimensional
moduli, arXiv:1005.5207, to appear in Algebra Number Theory.
M. Raynaud: Contre-exemple au “vanishing theorem” en caractéristique p > 0, C. P.
Ramanujam—a tribute, Tata Inst. Fund. Res. Studies in Math., vol. 8, Springer, Berlin, 1978,
pp. 273–278. 541027 (81b:14011)
K. Schwede: F -adjunction, Algebra Number Theory 3 (2009), no. 8, 907–950. 2587408 (2011b:14006)
K. Schwede: Centers of F -purity, Math. Z. 265 (2010), no. 3, 687–714. 2644316 (2011e:13011)
K. Schwede: Test ideals in non-Q-Gorenstein rings, Trans. Amer. Math. Soc. 363 (2011), no. 11,
5925–5941.
K. Schwede and K. E. Smith: Globally F -regular and log Fano varieties, Adv. Math. 224 (2010),
no. 3, 863–894. 2628797 (2011e:14076)
S. Takagi: A characteristic p analogue of plt singularities and adjoint ideals, Math. Z. 259 (2008),
no. 2, 321–341. MR2390084 (2009b:13004)
Department of Mathematics, Princeton University, Princeton, NJ, 08542, USA
E-mail address: pzs@princeton.edu
Department of Mathematics, The Pennsylvania State University, University Park, PA, 16802,
USA
E-mail address: schwede@math.psu.edu
| 0math.AC
|
A Unified View of Entropy-Regularized
Markov Decision Processes
Gergely Neu
gergely.neu@gmail.com
arXiv:1705.07798v1 [cs.LG] 22 May 2017
Universitat Pompeu Fabra, Barcelona, Spain
Vicenç Gómez
vicen.gomez@upf.edu
Universitat Pompeu Fabra, Barcelona, Spain
Anders Jonsson
anders.jonsson@upf.edu
Universitat Pompeu Fabra, Barcelona, Spain
Abstract
We propose a general framework for entropy-regularized average-reward reinforcement learning in Markov decision processes (MDPs). Our approach is based on
extending the linear-programming formulation of policy optimization in MDPs to
accommodate convex regularization functions. Our key result is showing that using
the conditional entropy of the joint state-action distributions as regularization yields
a dual optimization problem closely resembling the Bellman optimality equations.
This result enables us to formalize a number of state-of-the-art entropy-regularized
reinforcement learning algorithms as approximate variants of Mirror Descent or Dual
Averaging, and thus to argue about the convergence properties of these methods. In
particular, we show that the exact version of the TRPO algorithm of Schulman et al.
(2015) actually converges to the optimal policy, while the entropy-regularized policy
gradient methods of Mnih et al. (2016) may fail to converge to a fixed point. Finally,
we illustrate empirically the effects of using various regularization techniques on
learning performance in a simple reinforcement learning setup.
1. Introduction
Reinforcement learning is the discipline of model-based optimal sequential decisionmaking in unknown stochastic environments. In average-reward reinforcement learning,
the goal is to find a behavior policy that maximizes the long-term average reward,
taking into account the effect of each decision on the future evolution of the decisionmaking process. In known environments, this optimization problem has been studied
(at least) since the influential work of Bellman (1957) and Howard (1960): the optimal
behavior policy can be formulated as the solution of the Bellman optimality equations.
In unknown environments with partially known or misspecified models, greedily
solving these equations often results in policies that are far from optimal in the true
environment. Rooted in statistical learning theory (Vapnik, 2013), the notion of
Neu Gómez Jonsson
regularization offers a principled way of dealing with this issue, among many others.
In particular, entropy regularization has proven to be one of the most successful tools
of machine learning and related fields (Littlestone and Warmuth, 1994; Vovk, 1990;
Freund and Schapire, 1997; Kivinen and Warmuth, 2001; Arora et al., 2012).
The idea of entropy regularization has also been used extensively in the reinforcement learning literature (Sutton and Barto, 1998; Szepesvári, 2010). Entropyregularized variants of the classic Bellman equations and the entailing reinforcementlearning algorithms have been proposed to induce safe exploration (Fox et al., 2016) and
risk-sensitive policies (Howard and Matheson, 1972; Marcus et al., 1997; Ruszczyński,
2010), or to model observed behavior of imperfect decision-makers (Ziebart et al., 2010;
Ziebart, 2010; Braun et al., 2011), among others. Complementary to these approaches
rooted in dynamic programming, another line of work proposes direct policy search
methods attempting to optimize various entropy-regularized objectives (Williams and
Peng, 1991; Peters et al., 2010; Schulman et al., 2015; Mnih et al., 2016; O’Donoghue
et al., 2017), with the main goal of driving a safe online exploration procedure in an
unknown Markov decision process. Notably, the state-of-the-art methods of Mnih
et al. (2016) and Schulman et al. (2015) are both based on entropy-regularized policy
search.
In this work, we connect these two seemingly disparate lines of work by showing a
strong Lagrangian duality between the entropy-regularized Bellman equations and
a certain regularized average-reward objective. Specifically, we extend the linearprogramming formulation of the problem of optimization in MDPs to accommodate
convex regularization functions, resulting in a convex program. We show that using the
conditional entropy of the joint state-action distribution gives rise to a set of nonlinear
equations resembling the Bellman optimality equations. Observing this duality enables
us to establish a connection between regularized versions of value and policy iteration
methods (Puterman and Shin, 1978) and incremental convex optimization methods
like Mirror Descent (Nemirovski and Yudin, 1983; Beck and Teboulle, 2003) or Dual
Averaging (Xiao, 2010; McMahan, 2014; Hazan et al., 2016; Shalev-Shwartz, 2012). For
instance, the convex-optimization view we propose reveals that the TRPO algorithm
of Schulman et al. (2015) and the regularized policy-gradient method of Mnih et al.
(2016) are approximate versions of Mirror Descent and Dual Averaging, respectively,
and that both can be interpreted as regularized policy iteration methods.
Our work provides a theoretical justification for various algorithms that were first
derived heuristically. In particular, our framework reveals that the exact version of
TRPO is identical to the MDP-E algorithm of Even-Dar et al. (2009). This establishes
the fact that the policy updates of TRPO converge to the optimal policy, improving
on the theoretical results claimed by Schulman et al. (2015). We also argue that our
formulation is useful for pointing out possible inconsistencies of heuristic learning
algorithms. In particular, we show that the approximation steps employed by Mnih
et al. (2016) may break the convexity of the objective, thus possibly leading to
convergence to bad local optima or even divergence. This observation is in accordance
2
A unified view of entropy-regularized MDPs
with the very recent findings of Asadi and Littman (2016), who show that value iteration
with poorly chosen approximate updates may lead to divergence. To complement
these results, we suggest an alternative objective that can be optimized consistently,
avoiding the possibility of diverging.
A similar Lagrangian duality between the Bellman equations and entropy maximization has been previously noted by Ziebart (2010, Sec. 5.2) and Rawlik et al. (2012)
for a special class of episodic Markov decision processes where the time index within
the episode is part of the state representation. In this particular setting, the convexity
of the conditional entropy is more obvious. One of our key observations is pointing
out the convexity of the conditional entropy of distribution functions defined over
general state spaces, which enables us to develop a much broader theory of regularized
Markov decision processes. We note that our theory also readily extends to discounted
MDPs by replacing the stationary state-action distributions we consider by discounted
state-action occupancy measures. For consistency, we will discuss each particular
algorithm in their most natural average-reward version, noting that all conclusions
remain valid in the simpler discounted and episodic settings.
The rest of the paper is organized as follows. In Section 2, we provide background on
average-reward Markov decision processes, briefly discussing both linear-programming
and dynamic-programming derivations of the optimal control. In Section 3, we provide
a convex-programming formulation of regularized average-reward Markov decision
processes, and show the connection to the regularized Bellman equations. Section 4
provides a brief summary of the complementary dynamic-programming formulation
and discusses regularized equivalents of related concepts, such as expressions of the
regularized policy gradient. In Section 5, we describe several existing learning algorithms in our framework. We provide an empirical evaluation of various regularization
schemes in a simple reinforcement learning problem in Section 6.
P
P
set S, we will often use s as shorthand for s∈S , and we
Notation. Given a finite
P
use ∆(S) = {µ ∈ RS : s µ(s) = 1, µ(s) ≥ 0 (∀s)} to denote the set of all probability
distributions on S.
2. Preliminaries on Markov decision processes
We consider a finite Markov decision process (MDP) M = (X , A, P, r), where X is the
finite state space, A is the finite action space, P : X × A × X → [0, 1] is the transition
function, with P (y|x, a) denoting the probability of moving to state y from state x
when taking action a, and r : X × A → R is the reward function mapping state-action
pairs to rewards.
In each round t, the learner observes state Xt ∈ X , selects action At ∈ A, moves to
the next state Xt+1 ∼ P (·|Xt , At ), and obtains reward r(Xt , At ). The goal is to select
actions as to maximize some notion of cumulative
reward.iIn this paper we consider the
h P
T
1
average-reward criterion lim inf T →∞ E T t=1 rt (Xt , At ) . A stationary state-feedback
3
Neu Gómez Jonsson
policy (or policy for short) defines a probability distribution π(·|x) over the learner’s
actions in state x. MDP theory (see, e.g., Puterman (1994)) stipulates that under
mild conditions, the average-reward criterion can be maximized by stationary policies.
Throughout the paper, we make the following mild assumption about the MDP:
Assumption 1 The MDP M is unichain: All stationary policies
P π induce a unique
stationary distribution νπ over the state space satisfying νπ (y) = x,a P (y|x, a)π(a|x)νπ (x)
for all y ∈ X .
In particular, this assumption is satisfied if all policies induce an irreducible and
aperiodic Markov chain (Puterman, 1994). For ease of exposition in this section, we
also make the following simplifying assumption:
Assumption 2 The MDP M admits a single recurrent class: All stationary policies
π induce stationary distributions strictly supported on the same set X 0 ⊆ X .
In general, this assumption is very restrictive in that it does not allow policies to cover
different parts of the state space. We stress that our results in the later sections do
not require this assumption to hold. With the above assumptions in mind, we can
define the average reward of any policy π as
"
#
T
X
1
ρ(π) = lim E
rt (Xt , At ) ,
T →∞
T t=1
where At ∼ π(·|Xt ) in each round t and the existence of the limit is ensured by
Assumption 1. Furthermore,
the average reward of any policy π can be simply
P
written as ρ(π) = x,a νπ (x)π(a|x)r(x, a), which is a linear function of the stationary
state-action distribution µπ = νπ π. This suggests that finding the optimal policy
can be equivalently written as a linear program (LP) where the decision variable is
the stationary state-action distribution. Defining the set of all feasible stationary
distributions as
(
)
X
X
∆ = µ ∈ ∆(X × A) :
µ(y, b) =
P (y|x, a)µ(x, a) (∀y) ,
(1)
x,a
b
the problem of maximizing the average reward can be written as
µ∗ = arg max ρ(µ).
(2)
µ∈∆
Just as a policy π induces stationary distributions νπPand µπ , a stationary distribution
µ induces a state distribution νµ defined as νµ (x) = a µ(x, a) and a policy πµ defined
as πµ (a|x) = µ(x, a)/νµ (x), where the denominator is strictly positive for recurrent
states by Assumption 2. Since ∆ is a compact polytope (non-empty by Assumption 1)
4
A unified view of entropy-regularized MDPs
the maximum in (2) is well-defined and induces an optimal policy πµ∗ in recurrent
states. Due to Assumption 2, πµ∗ can be arbitrarily defined in transient states.
The linear program specified in Equation (2) is well studied in the MDP literature
(see, e.g., Puterman, 1994, Section 8.8), although most commonly as the dual of the
linear program
minρ∈R
ρ
subject to ρ + V (x) −
(3)
X
P (y|x, a)V (y) ≥ r(x, a),
∀(x, a).
(4)
y
Here, the dual variables V are commonly referred to as the value functions. By
strong LP duality and our Assumption 1, the solution to this LP equals the optimal
average reward ρ∗ and the dual variables V ∗ at the optimum are the solution to the
average-reward Bellman optimality equations
!
X
V ∗ (x) = max r(x, a) − ρ∗ +
P (y|x, a)V ∗ (x) ,
(∀x) .
(5)
a
y
Note that V ∗ is not unique as for any solution V , a constant shift V − c for any c ∈ R
is also a solution. However,
we can obtain a unique solution V ∗ by imposing the
P
additional constraint x,a µ∗ (x, a)V ∗ (x) = 0, which states that the expected value
should equal 0.
3. Regularized MDPs: A convex-optimization view
Inspired by the LP formulation of the average-reward optimization problem (2), we
now define a regularized optimization objective—a framework that will lead us to our
main results. Our results in this section only require the mild Assumption 1. Our
regularized optimization problem takes the form
(
)
X
1
max ρeη (µ) = max
µ(x, a)r(x, a) − R(µ) ,
(6)
µ∈∆
µ∈∆
η
x,a
where R(µ) : RX ×A → R is a convex regularization function and η > 0 is a learning
rate that trades off the original objective and regularization. Note that η = ∞ recovers
the unregularized objective. Unlike previous work on LP formulations for MDPs, we
find it useful to regard (6) as the primal.
We focus on two families of regularization functions: the negative Shannon entropy
of (X, A) ∼ µ,
X
RS (µ) =
µ(x, a) log µ(x, a),
(7)
x,a
5
Neu Gómez Jonsson
and the negative conditional entropy of (X, A) ∼ µ,
X
X
µ(x, a)
=
νµ (x)πµ (a|x) log πµ (a|x).
RC (µ) =
µ(x, a) log P
b µ(x, b)
x,a
x,a
(8)
In what follows, we refer to these functions as the relative entropy and the conditional
entropy. We also make use of the Bregman divergences induced by RS and RC which
take the respective forms
X
X
µ(x, a)
πµ (a|x)
DS (µkµ0 ) =
µ(x, a) log 0
and
DC (µkµ0 ) =
µ(x, a) log
.
0 (a|x)
µ
(x,
a)
π
µ
x,a
x,a
While the form of DS is standard (it is the relative entropy between two state-action
distributions), the fact that DC is the Bregman divergence of RC (or even that RC is
convex) is not immediately obvious1 . The following proposition asserts this statement,
which we prove in Appendix A.1. The only work we are aware of that establishes a
comparable result is the recent paper of Neu and Gómez (2017).
Proposition 1 The Bregman divergence corresponding to the conditional entropy
RC is DC . Furthermore, DC is nonnegative on ∆, implying that RC is convex and
DC is convex in its first argument.
We proceed to derive the dual functions and optimal solutions to (6) for our two
choices of regularization functions. Without loss of generality, we assume that the
reference policy πµ0 has full support, which implies that the corresponding stationary
distribution µ0 is strictly positive on the recurrent set X 0 . We only provide the
derivations for the Bregman divergences; the calculations are analogous for RS and
RC . Both of these solutions will be expressed with the help of dual variables V :
RX → R which are useful to think about as value functions, as in the case of the
LP formulation
(2). We also define the corresponding advantage functions A(x, a) =
P
r(x, a) + y P (y|x, a)V (y) − V (x).
3.1. Relative entropy
The choice R = DS (·kµ0 ) has been studied before by Peters et al. (2010) and Zimin
and Neu (2013); we defer the proofs to Appendix A.3. The optimal state-action
distribution for a given value of η is
∗
µ∗η (x, a) ∝ µ0 (x, a)eηAη (x,a) ,
(9)
where A∗η is the advantage function for the optimal dual variables Vη∗ . The dual
function is
X
1
g(V ) = log
µ0 (x, a)eηA(x,a) ,
(10)
η
x,a
1. In the special case of loop-free episodic environments, showing the convexity of RC is straightforward (Lafferty et al., 2001; Ziebart, 2010; Rawlik et al., 2012).
6
A unified view of entropy-regularized MDPs
that now needs to be minimized on RX with no constraints in order to obtain Vη∗ .
By strong duality, g is convex in V and takes the value ρe∗η = maxµ∈∆ ρeη (µ) at its
optimum.
3.2. Conditional entropy
The choice R = DC (·kµ0 ) leads to our main contributions. Similar to above, the
optimal policy is
∗
πη∗ (a|x) ∝ πµ0 (a|x)eηAη (x,a) .
(11)
In this case, the dual problem closely resembles the average-reward Bellman optimality
equations (5):
Proposition 2 The dual of the optimization problem (6) when R = DC (·kµ0 ) is
given by
minλ∈R
λ
!!
X
X
1
P (y|x, a)V (y)
, (∀x) .
πµ0 (a|x) exp η r(x, a) − λ +
subject to V (x) = log
η
y
a
We defer the proofs to Appendix A.4. Using strong duality, the optimum of the above
problem is ρe∗η , which implies that the optimal dual variables Vη∗ are given as a solution
to the system of equations
!!
X
X
1
P (y|x, a)Vη∗ (y)
, (∀x) .
πµ0 (a|x) exp η r(x, a) − ρe∗η +
Vη∗ (x) = log
η
y
a
(12)
By analogy with the Bellman optimality equations (5), we call this the regularized
average-reward Bellman optimality equations. Since ρe∗η is guaranteed to be finite
(because it is the maximum of a bounded function on a compact domain), the solution
to the above optimization problem is well-defined, bounded, and unique up to a
constant shift (as in the case of the LP dual variables). Again, we can make the
solution unique by imposing the constraint that the expected value should equal 0.
4. Dynamic programming in regularized MDPs
We now present a dynamic-programming view of the regularized optimization problem
(Bertsekas, 2007) for the choice R = DC (·kµ0 ). Similar derivations have been done
several times for discounted and episodic MDPs (Littman and Szepesvári, 1996;
Ruszczyński, 2010; Azar et al., 2011; Rawlik et al., 2012; Asadi and Littman, 2016;
Fox et al., 2016), but we are not aware of any work that considers the average-reward
case. That said, the generalization is straightforward, and the existence and unicity of
7
Neu Gómez Jonsson
the optimal solution to the Bellman optimality equation (12) follows from our results
in the previous section.
We first define the regularized Bellman equations for an arbitrary policy π and a
reference policy π 0 :
!
X
X
π(a|x)
1
− ρeη (π) +
P (y|x, a)Vηπ (y)
(∀x) ,
Vηπ (x) =
π(a|x) r(x, a) − log 0
η
π
(a|x)
y
a
(13)
where ρeη (π) is the regularized average reward of policy π defined as in Equation (6).
By our Assumption 1 and Proposition 4.2.4 of Bertsekas (2007), it is easy to show
that this system of equations has a unique solution satisfying the additional constraint
P
∗|π 0
π
and
x,a µπ (x, a)Vη (x) = 0. We also define the Bellman optimality operator Tη
π|π 0
the Bellman operator Tη that correspond to the Bellman equations (12) and (13),
0
respectively, as well as the greedy policy operator Gπη that corresponds to Equation (11)
(for completeness, the formal definitions appear in Appendix B).
We include two results that are useful for deriving approximate dynamic programming algorithms. We first provide a counterpart to the performance-difference lemma
(Burnetas and Katehakis, 1997, Prop. 1, Kakade and Langford, 2002, Lemma 6.1, Cao,
2007). This statement will rely on the regularized advantage function Aπη defined for
each policy π as
Aπη (x, a) = r(x, a) −
X
1 log π(a|x)
P (y|x, a)Vηπ (y) − Vηπ (x),
−
ρ
e
(π)
+
η
η log π 0 (a|x)
y
where Vηπ is the regularized value function corresponding to π with baseline π 0 .
Lemma 3 For any pair of policies π, π 0 , we have
X
µπ0 (x, a)Aπη (x, a).
ρe(π 0 ) − ρe(π) =
x,a
For completeness, we provide the simple proof in Appendix B.1.
Second, we provide an expression for the gradient of ρeη , thus providing a regularized
counterpart of the policy gradient theorem of Sutton et al. (1999). To formalize this
statement, let us consider a policy πθ parametrized by a vector θ ∈ Rd and assume
that the gradient ∇πθ (a|x) exists for all x, a and all θ. The form of the policy gradient
is given by the following lemma, which we prove in Appendix B.2:
Lemma 4 Assume that ∂πθ∂θ(a|x)
/πθ (a|x) > 0 for all θi , x, a. The gradient of ρeη exists
i
and satisfies
X
∇e
ρη (θ) =
µπθ (x, a)∇ log πθ (a|x)Aπη θ (x, a).
x,a
8
A unified view of entropy-regularized MDPs
5. Algorithms
In this section we derive several reinforcement learning algorithms based on our
results. For clarity of presentation, we assume that the MDP M is fully known, an
assumption that we later relax in the experimental evaluation. We will study a generic
sequential optimization framework where a sequence of policies πk are computed
iteratively. Inspired by the online convex optimization literature (see, e.g., ShalevShwartz, 2012; Hazan et al., 2016) and by our convex-optimization formulation, we
study two families of algorithms: Mirror Descent and Dual Averaging (also known as
Follow-the-Regularized-Leader).
5.1. Iterative policy optimization by Mirror Descent
A direct application of the Mirror Descent algorithm (Nemirovski and Yudin, 1983;
Beck and Teboulle, 2003; Martinet, 1978; Rockafellar, 1976) to our case is defined as
1
µk+1 = arg max ρ(µ) − DR (µkµk ) ,
(14)
η
µ∈∆
where DR is the Bregman divergence associated with the convex regularization function
R. We now proceed to show how various learning algorithms can be recovered from
this formulation.
5.1.1. Mirror Descent with the relative entropy
We first remark that the Relative Entropy Policy Search (REPS) algorithm of Peters
et al. (2010) can be formulated as an instance of Mirror Descent with the Bregman
divergence DS . This is easily seen by comparing the form of the update rule (14) with
the problem formulation of Peters et al. (2010, pp. 2), with the slight difference that
our regularization is additive and theirs is enforced as a constraint. It is easy to see
that this only amounts to a change in learning rate. This connection is not new: it
has been first shown by Zimin and Neu (2013)2 , and has been recently rediscovered by
Montgomery and Levine (2016). Independently of each other, Zimin and Neu (2013)
and Dick et al. (2014) both show that Mirror Descent achieves near-optimal regret
guarantees in an online learning setup where the transition function is known, but the
reward function is allowed to change arbitrarily between decision rounds. This implies
that REPS duly converges to the optimal policy in our setup.
5.1.2. Mirror Descent with the conditional entropy
We next show that the Dynamic Policy Programming (DPP) algorithm of Azar et al.
(2012) and the Trust-Region Policy Optimization (TRPO) algorithm of Schulman
et al. (2015) are both approximate variants of Mirror Descent with the Bregman
2. Although they primarily referred to Mirror Descent as the “Proximal Point Algorithm” following
(Rockafellar, 1976; Martinet, 1978).
9
Neu Gómez Jonsson
divergence DC . To see this, note that a full Mirror Descent update requires computing
the optimal value function Vη∗ for the baseline µk , e.g. by regularized value iteration or
regularized policy iteration (see Appendix B). Since a full update for Vη∗ is expensive,
DPP and TRPO provide two ways to approximate it. We remark that the algorithm
of Rawlik et al. (2012) can also be viewed as an instance of Mirror Descent for the
finite-horizon episodic setting, in which the exact update can be computed efficiently
by dynamic programming.
Dynamic Policy Programming. We first claim that each iteration of DPP is
a single regularized value iteration step: Starting from the previous value function
Vk , it extracts the greedy policy πk+1 = Gπη k [Vk ] and applies the Bellman optimality
∗|π
∗|π
operator Tη k to obtain Vk+1 = Tη k [Vk ]. This follows from comparing the form of
DPP presented in Appendix A of Azar et al. (2012): their update rules (19) and (20)
precisely match the discounted analogue of our expressions (26) in Appendix B with
π 0 = πk . The convergence guarantees proved by Azar et al. (2012) demonstrate the
soundness of this approximate update.
Trust-Region Policy Optimization. Second, we claim that each iteration of
TRPO is a single policy iteration step: TRPO first fully evaluates the policy πk to
compute its unregularized value function Vk = V∞πk and then extracts the regularized
greedy policy πk+1 = Gπη k [Vk ] with πk as a baseline. This can be seen by inspecting
the TRPO update3 that takes the form
(
)
X
X
π(a|x)
1
πk
πk+1 = arg max
νπk (x)
π(a|x) A∞
(x, a) − log
.
η
πk (a|x)
π
x
a
This objective approximates Mirror Descent by ignoring the effect of changing the
policy on the state distribution. Surprisingly, using our formalism, this update can be
expressed in closed form as
πk
πk+1 (a|x) ∝ πk (a|x)eηA∞ (x,a) .
We present the detailed derivations in Appendix B.3. A particularly interesting
consequence of this result is that TRPO is completely equivalent to the MDP-E
algorithm of Even-Dar et al. (2009) (see also (Neu et al., 2010, 2014)), which is known
to minimize regret in an online setting, thus implying that TRPO also converges to
the optimal policy in the stationary setting. This guarantee is much stronger than
the ones provided by Schulman et al. (2015), who only claim that TRPO produces a
monotonically improving sequence of policies (which may still converge to a suboptimal
policy).
3. As in the case of REPS, we discuss here the additive-regularization version of the algorithm. The
entropy-constrained update actually implemented by Schulman et al. (2015) only differs in the
learning rate.
10
A unified view of entropy-regularized MDPs
5.2. Iterative policy optimization by Dual Averaging
We next study algorithms arising from the Dual Averaging scheme (Xiao, 2010;
McMahan, 2014), commonly known as Follow-the-Regularized-Leader in online learning (Shalev-Shwartz, 2012; Hazan et al., 2016). This algorithm is defined by the
iteration
1
(15)
µk+1 = arg max ρ(µ) − R(µ) ,
ηk
µ∈∆
where ηk is usually an increasing sequence to ensure convergence in the limit. We
are unaware of any pure instance of dual averaging using relative entropy, and only
discuss conditional entropy below.
5.2.1. Dual Averaging with the conditional entropy
Just as for Mirror Descent, a full update (15) requires computing the optimal value
function Vη∗ . Various approximations of this update have been long studied in the RL
literature—see, e.g., (Littman and Szepesvári, 1996) (with additional discussion by
(Asadi and Littman, 2016)), (Perkins and Precup, 2002; Ruszczyński, 2010; Petrik
and Subramanian, 2012; Fox et al., 2016). In this section, we focus on the stateof-the-art algorithms of Mnih et al. (2016) and O’Donoghue et al. (2017) that were
originally derived from an optimization formulation resembling our Equation (6). Our
main insight is that this algorithm can be adjusted to have a dynamic-programming
interpretation and a convergence guarantee.
Entropy-regularized policy gradients. The A3C algorithm of Mnih et al. (2016)
aims to maximize
X
1 X
ρ(π) −
νπk (x)
π(a|x) log π(a|x)
ηk x
a
by taking policy gradient steps. Interestingly, our formalism implies a connection
between TRPO and A3C. Due to P
Lemma 4,Pthe gradient of ρ(πθ ) with respect
to θ coincides with the gradient of x νπk (x) a πθ (a|x)Aπ∞k (x, a), so A3C actually
attempts to optimize the objective
X
X
1
πk
log πθ (a|x) .
(16)
νπk (x)
πθ (a|x) A∞ (x, a) −
η
k
x
a
This objective can be seen as the dual-averaging counterpart of the TRPO objective.
As in the case of TRPO, the maximizer of this objective can be computed in closed
form as
πk
πk+1 (a|x) ∝ eηk A∞ .
Unlike for TRPO, we are not aware of any convergence results for A3C, and we believe
the algorithm does not converge. Indeed, the objective (16) is non-convex in either
11
Neu Gómez Jonsson
of the natural parameters µ or π, which can cause premature convergence to a bad
local optimum. An even more serious concern is that the objective function changes
between iterations, so gradient descent may fail to converge to any stationary point.
This problem is avoided by TRPO since the sum of the TRPO objectives is a sensible
optimization objective (Even-Dar et al., 2009, Theorem 4.1). However, there is no
such clear interpretation for the objective (16).
O’Donoghue et al. (2017, Section 3.1) study the stationary points of the objective (16) and, similarly to us, show a connection between a certain type of value
function and a policy achieving the stationary point. However, they do not show that
this stationary point is unique nor that gradient descent converges to a stationary
point4 . As we argue above, this may very well not be the case. These observations
are consistent with those of Asadi and Littman (2016), who show that softmax policy
updates may lead to inconsistent behavior when used in tandem with unregularized
advantage functions.
To overcome these issues, we advocate for directly optimizing the objective (15)
instead of (16) via gradient descent. Due to the fact that (15) is convex in µ and to
standard results regarding dual averaging (McMahan, 2014), this scheme is guaranteed
to converge to the optimal policy. Estimating the gradients can be done analogously
as for the unregularized objective, by our Lemma 4.
6. Experiments
In this section we analyze empirically several of the algorithms described in the
previous section, with the objective of illustrating the interplay of regularization and
model-estimation error in a simple reinforcement learning setting. We consider an
iterative setup where in each episode k = 1, 2, . . . , N , we execute a policy πk , observe
the sample transitions and update the estimated model via maximum likelihood.
We focus on the regularization aspect, with no other approximation error than that
introduced by model estimation. It is important to emphasize that the comparison
may not extend to other variants of the algorithms or in the presence of other sources
of approximation.
We consider a simple MDP, defined on a grid (Fig. 1, left), where an agent has
four possible actions (up, down, left and right) that succeed with probability 0.9 but
fail with probability 0.1. In case of failure, the agent does not move or goes to any
random adjacent location. Negative (or positive) rewards are given after hitting a
wall (or reaching one of the white diamond locations, respectively). In both cases, the
agent is sent back to one of the starting locations (marked with ’X’ in the figure).
The reward of the diamonds is proportional to the distance from the starting
locations. Therefore, the challenge of this experiment is to discover the path towards
the top-right reward while learning the dynamics incrementally, and then exploit it.
4. Strictly speaking, O’Donoghue et al. (2017) do not even show that a stationary point (16) exists.
12
A unified view of entropy-regularized MDPs
8
0.05
8
0.04
0.03
0.02
6
6
DA-RV
DA
TRPO
DPP
RegVI
Opt
4
0.01
2
0
-0.01
0
10 -4 10 -3 10 -2 10 -1 10 0 10 1
2
avg reward
10
avg reward
0.06
4
DPP
ModRegPI-2
ModRegPI-20
TRPO
2
0
10 0
10 1
10 2
iteration k
Figure 1: Left: the MDP used for evaluation. Reward is −0.1 at the walls and
5, 50, 200 at the diamonds. The optimal policy is indicated by red arrows.
The cell colors correspond to the stationary state distribution for open
locations. Middle: Average reward as a function of the learning rate η for
all algorithms (see text for details). Number of iterations N and samples
per iteration S are N = S = 500. Results are taken over 20 random runs
per value of η. Right: Performance of DPP, TRPO and two version of
modified regularized Policy Iteration for a fixed η ≈ 0.1.
Note that the optimal agent ignores the intermediate reward at the center and even
prefers to hit a wall in locations too far away from the largest reward (bottom-left).
We fix the number of iterations N and samples per iteration S and analyze the
average reward of the final policy as a function of η. We compare the following
algorithms: regularized Value Iteration with a fixed reference uniform policy and fixed
η (RegVI); several variants of approximate Mirror Descent, including DPP and TRPO
(Section 5.1); and two Dual Averaging methods (DA and DA-RV). DA corresponds to
optimizing the objective (16), which is not guaranteed to lead to an optimal policy,
and DA-RV corresponds to the iteration (15), which has convergence guarantees
(Section 5.2). For both variants, we use a linear annealing schedule ηk = η · k.
Fig. 1 (middle) shows results as a function of η. The maximum reward is depicted
in blue at the top. For very small η (strong regularization), all algorithms perform
poorly and do not even reach the intermediate reward. In contrast, for very large η,
they converge prematurely to the greedy policy that exploits the intermediate reward.
Typically, for an intermediate value of η, the algorithms occasionally discover the
optimal path and exploit it. Note that this is not the case for RegVI, which never
obtains the optimal policy. This shows that using both a fixed value of η and a fixed
reference policy is a bad choice. In this MDP, we observe that the performance of
both Dual Averaging methods (DA and DA-RV) is very similar, and in general slightly
better than the approximate Mirror Descent variants.
13
Neu Gómez Jonsson
We also show an interesting relationship between the Mirror Descent approximations. Our analysis in Section 5.1.2 suggests an entire array of algorithms lying
between DPP and TRPO, just as Modified Policy Iteration lies between Value Iteration
and Policy Iteration (Puterman and Shin, 1978; Scherrer et al., 2012). Fig. 1 (right)
illustrates this idea, showing the convergence of DPP and TRPO for a fixed value of
η. TRPO tends to converge faster than DPP to a locally optimal policy, since DPP
uses a single value update per iteration. Using more value updates leads to a modified
regularized Policy Iteration algorithm (we call it ModRegPI-2 and ModRegPI-20, for
2 and 20 updates, respectively) that interpolates between DPP and TRPO.
7. Conclusion
We have presented a unifying view of entropy-regularized MDPs from a convexoptimization perspective. We believe that such unifying theories can be very useful
in moving a field forward: We recall that in the field of online learning theory, the
convex-optimization view has enabled a unified treatment of many existing algorithms
and acts today as the primary framework for deriving new algorithms (see the progress
from Cesa-Bianchi and Lugosi (2006) through Shalev-Shwartz (2012) to Hazan et al.
(2016)). In this paper, we argued that the convex-optimization view may also be
very useful in analyzing algorithms for reinforcement learning: In particular, we
demonstrated how this framework can be used to provide theoretical justification for
state-of-the-art reinforcement learning algorithms, and how it can highlight potential
problems with them. We expect that this newly-found connection will also open the
door for constructing more advanced reinforcement learning algorithms by borrowing
further ideas from the convex optimization literature, such as Composite Objective
Mirror Descent Duchi et al. (2010) and Regularized Dual Averaging (Xiao, 2010).
Finally, we point out that our work does not provide a statistical justification
for using entropy regularization in reinforcement learning. In the case of online
learning in known Markov decision processes with changing reward functions, entropyregularization has been known to yield near-optimal learning algorithms (Even-Dar
et al., 2009; Neu et al., 2010, 2014; Zimin and Neu, 2013; Dick et al., 2014). It remains
to be seen if this technique also provably helps in driving the exploration process in
unknown Markov decision processes.
References
S. Arora, E. Hazan, and S. Kale. The multiplicative weights update method: A
meta-algorithm and applications. Theory of Computing, 8:121–164, 2012.
Kavosh Asadi and Michael L. Littman. A new softmax operator for reinforcement
learning. CoRR, abs/1612.05628, 2016.
14
A unified view of entropy-regularized MDPs
Mohammad Gheshlaghi Azar, Vicenç Gómez, and Hilbert J Kappen. Dynamic policy
programming with function approximation. In International Conference on Artificial
Intelligence and Statistics, pages 119–127, 2011.
Mohammad Gheshlaghi Azar, Vicenç Gómez, and Hilbert J Kappen. Dynamic policy
programming. Journal of Machine Learning Research, 13(Nov):3207–3245, 2012.
A. Beck and M. Teboulle. Mirror descent and nonlinear projected subgradient methods
for convex optimization. Operations Research Letters, 31(3):167–175, 2003.
R. Bellman. Dynamic Programming. Princeton University Press, Princeton, New
Jersey, 1957.
D. P. Bertsekas. Dynamic Programming and Optimal Control, volume 2. Athena
Scientific, Belmont, MA, 3 edition, 2007.
Daniel A Braun, Pedro A Ortega, Evangelos Theodorou, and Stefan Schaal. Path
integral control and bounded rationality. In Adaptive Dynamic Programming And
Reinforcement Learning (ADPRL), 2011 IEEE Symposium on, pages 202–209. IEEE,
2011.
A. N. Burnetas and M. N. Katehakis. Optimal adaptive policies for Markov Decision
Processes. 22(1):222–255, 1997.
Xi-Ren Cao. Stochastic Learning and Optimization: A Sensitivity-Based Approach.
Springer, New York, 2007.
N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge
University Press, New York, NY, USA, 2006.
T. Dick, A. György, and Cs. Szepesvári. Online learning in markov decision processes
with changing cost sequences. In ICML 2014, 2014.
John C Duchi, Shai Shalev-Shwartz, Yoram Singer, and Ambuj Tewari. Composite
objective mirror descent. In COLT, pages 14–26, 2010.
E. Even-Dar, S. M. Kakade, and Y. Mansour. Online Markov decision processes.
Mathematics of Operations Research, 34(3):726–736, 2009.
Roy Fox, Ari Pakman, and Naftali Tishby. Taming the noise in reinforcement learning
via soft updates. In Proceedings of the Thirty-Second Conference on Uncertainty in
Artificial Intelligence, 2016.
Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning
and an application to boosting. Journal of Computer and System Sciences, 55:
119–139, 1997.
15
Neu Gómez Jonsson
Elad Hazan et al. Introduction to online convex optimization. Foundations and
Trends R in Optimization, 2(3-4):157–325, 2016.
R. A. Howard. Dynamic Programming and Markov Processes. The MIT Press,
Cambridge, MA, 1960.
Ronald A Howard and James E Matheson. Risk-sensitive markov decision processes.
Management science, 18(7):356–369, 1972.
Sham M. Kakade and John Langford. Approximately optimal approximate reinforcement learning. In Proceedings of the Nineteenth International Conference on
Machine Learning (ICML 2002), pages 267–274, 2002.
J. Kivinen and M. Warmuth. Relative loss bounds for multidimensional regression
problems. Machine Learning, 45:301–329, 2001.
John Lafferty, Andrew McCallum, and Fernando Pereira. Conditional random fields:
Probabilistic models for segmenting and labeling sequence data. In ICML 2001, pages
282–289, 2001. URL citeseer.ist.psu.edu/lafferty01conditional.html.
N. Littlestone and M. Warmuth. The weighted majority algorithm. Information and
Computation, 108:212–261, 1994.
M.L. Littman and Cs. Szepesvári. A Generalized Reinforcement Learning Model:
Convergence and applications. In Int. Conf. on Machine Learning, pages 310–318,
1996.
Steven I Marcus, Emmanual Fernández-Gaucherand, Daniel Hernández-Hernandez,
Stefano Coraluppi, and Pedram Fard. Risk sensitive markov decision processes. In
Systems and control in the twenty-first century, pages 263–279. Springer, 1997.
B. Martinet. Perturbation des méthodes d’optimisation. applications. ESAIM: Mathematical Modelling and Numerical Analysis - Modélisation Mathématique et Analyse
Numérique, 12(2):153–171, 1978. URL http://eudml.org/doc/193317.
H Brendan McMahan. A survey of algorithms and analysis for adaptive online learning.
arXiv preprint arXiv:1403.3465, 2014.
Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy
Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous methods
for deep reinforcement learning. In International Conference on Machine Learning,
pages 1928–1937, 2016.
William H Montgomery and Sergey Levine. Guided policy search via approximate
mirror descent. In NIPS-29, pages 4008–4016, 2016.
16
A unified view of entropy-regularized MDPs
A. Nemirovski and D. Yudin. Problem Complexity and Method Efficiency in Optimization. Wiley Interscience, 1983.
G. Neu, A. György, and Cs. Szepesvári. The online loop-free stochastic shortest-path
problem. In Proceedings of the 23rd Annual Conference on Learning Theory (COLT),
pages 231–243, 2010.
Gergely Neu and Vicenç Gómez. Fast rates for online learning in Linearly Solvable
Markov Decision Processes. 2017.
Gergely Neu, András György, Csaba Szepesvári, and András Antos. Online Markov
decision processes under bandit feedback. IEEE Transactions on Automatic Control,
59:676–691, 2014.
Brendan O’Donoghue, Remi Munos, Koray Kavukcuoglu, and Volodymyr Mnih. PGQ:
Combining policy gradient and Q-learning. In 5th International Conference on
Learning Representations, 2017.
Theodore J. Perkins and Doina Precup. A convergent form of approximate policy
iteration. In Advances in Neural Information Processing Systems, pages 1595–1602,
2002.
Jan Peters, Katharina Mülling, and Yasemin Altun. Relative entropy policy search.
In Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence,
pages 1607–1612, 2010.
Marek Petrik and Dharmashankar Subramanian. An approximate solution method
for large risk-averse markov decision processes. In Proceedings of the Twenty-Eighth
Conference on Uncertainty in Artificial Intelligence, pages 805–814, 2012.
Martin L. Puterman. Markov Decision Processes. Wiley, 1994. ISBN 9780471727828. URL http://books.google.com/books/about/Markov_decision_
processes.html?id=Y-gmAQAAIAAJ.
Martin L. Puterman and Moon Chirl Shin. Modified policy iteration algorithms for
discounted Markov decision processes. Management Science, 24:1127–1137, 1978.
Konrad Rawlik, Marc Toussaint, and Sethu Vijayakumar. On stochastic optimal
control and reinforcement learning by approximate inference. In Proceedings of
Robotics: Science and Systems VIII, 2012.
R. Tyrrell Rockafellar. Monotone Operators and the Proximal Point Algorithm. SIAM
Journal on Control and Optimization, 14(5):877–898, 1976.
Andrzej Ruszczyński. Risk-averse dynamic programming for Markov decision processes.
Mathematical programming, 125(2):235–261, 2010.
17
Neu Gómez Jonsson
B. Scherrer, V. Gabillon, M. Ghavamzadeh, and M. Geist. Approximate modified
policy iteration. In ICML 2012, pages 1207–1214, 2012.
John Schulman, Sergey Levine, Pieter Abbeel, Michael Jordan, and Philipp Moritz.
Trust region policy optimization. In Proceedings of the 32nd International Conference
on Machine Learning (ICML-15), pages 1889–1897, 2015.
Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations
and Trends in Machine Learning, 4(2):107–194, 2012.
R. S. Sutton, D. A. McAllester, S. P. Singh, and Y. Mansour. Policy gradient
methods for reinforcement learning with function approximation. In NIPS-12, pages
1057–1063, 1999.
R.S. Sutton and A.G. Barto. Reinforcement Learning: An Introduction. MIT Press,
1998.
Cs. Szepesvári. Algorithms for Reinforcement Learning. Synthesis Lectures on Artificial
Intelligence and Machine Learning. Morgan & Claypool Publishers, 2010.
Vladimir Vapnik. The nature of statistical learning theory. Springer science & business
media, 2013.
V. Vovk. Aggregating strategies. In Proceedings of the third annual workshop on
Computational learning theory (COLT), pages 371–386, 1990.
Ronald J Williams and Jing Peng. Function optimization using connectionist reinforcement learning algorithms. Connection Science, 3(3):241–268, 1991.
Lin Xiao. Dual averaging methods for regularized stochastic learning and online
optimization. Journal of Machine Learning Research, 11(Oct):2543–2596, 2010.
Brian D Ziebart. Modeling Purposeful Adaptive Behavior with the Principle of Maximum Causal Entropy. PhD thesis, Carnegie Mellon University, 2010.
Brian D Ziebart, J Andrew Bagnell, and Anind K Dey. Modeling interaction via
the principle of maximum causal entropy. In International Conference on Machine
Learning (ICML), pages 1247–1254, 2010.
A. Zimin and G. Neu. Online learning in episodic Markovian decision processes by
relative entropy policy search. In NIPS-26, pages 1583–1591, 2013.
18
A unified view of entropy-regularized MDPs
Appendix A. Complementary Technical Results
A.1. Convexity of the negative conditional entropy
Let us consider
the joint state-action distribution µ on the finite set X × A. We denote
P
νµ (x) = a µ(x, a) and πµ (a|x) = µ(x, a)/νµ (x) for all x, a. We study the negative
conditional entropy of (X, A) ∼ µ as a function of µ:
RC (µ) =
X
x,a
X
µ(x, a)
µ(x, a)
=
µ(x, a) log
.
µ(x, a) log P
ν
(x)
µ
b µ(x, b)
x,a
We will study the Bregman divergence DRC corresponding to RC :
DRC (µkµ0 ) = RC (µ) − RC (µ0 ) − ∇RC (µ0 )> (µ − µ0 ),
P
where the inner product between two vectors v, w ∈ RX ×A is w> v = x,a v(x, a)w(x, a).
Our aim is to show that DRC is nonnegative, which will imply the convexity of RC .
We begin by computing the partial derivative of RC (µ) with respect to µ(x, a):
X µ(x, b)
µ(x, a)
µ(x, a)
∂RC (µ)
= log
+1−
= log
,
∂µ(x, a)
νµ (x)
ν
ν
µ (x)
µ (x)
b
where we used the fact that ∂νµ (x)/∂µ(x, a) = 1 for all a. With this expression, we
have
RC (µ0 ) + ∇RC (µ0 )> (µ − µ0 ) =
X
=
X
µ0 (x, a) log
µ0 (x, a)
µ0 (x, a) X
+
(µ(x, a) − µ0 (x, a)) log
νµ0 (x)
νµ0 (x)
x,a
µ(x, a) log
µ0 (x, a)
.
νµ0 (x)
x,a
x,a
Thus, the Bregman divergence takes the form
X
µ0 (x, a)
µ(x, a)
0
DRC (µkµ ) =
µ(x, a) log
− log
νµ (x)
νµ0 (x)
x,a
=
X
x,a
µ(x, a) log
X
X
πµ (a|x)
πµ (a|x)
=
ν(x)
πµ (a|x) log
.
πµ0 (a|x)
πµ0 (a|x)
x
a
This proves that the Bregman divergence corresponding to RC coincides with DC , as
claimed. To conclude the proof, note that DC is the average relative entropy between
the distributions πµ and πµ0 —that is, a sum a positive terms. Indeed, this shows that
DC is nonnegative on the set of state-action distributions ∆(X × A), proving that
RC (µ) is convex.
19
Neu Gómez Jonsson
A.2. Derivation of optimal policies
Here we prove the results stated in Equations (9)-(11) and Proposition 2, which give the
expressions for the dual optimization problems and the optimal solutions corresponding
to the primal optimization problem (6), for the two choices of regularization function
DS (·kµ0 ) and DC (·kµ0 ). We start with generic derivations that will be helpful for
analyzing both cases and then turn to studying the individual regularizers.
Recall that the primal optimization objective in (6) is given by
(
)
X
1
max ρeη (µ) = max
µ(x, a)r(x, a) − R(µ) ,
µ∈∆
µ∈∆
η
x,a
where ∆, the feasible set of stationary distributions, is defined by the following
constraints:
X
X
µ(y, b) =
µ(x, a)P (y|x, a), ∀y ∈ X ,
(17)
x,a
b
X
µ(x, a) = 1,
(18)
µ(x, a) ≥ 0, ∀(x, a) ∈ X × A.
(19)
x,a
We begin by noting that for all state-action pairs where µ0 (x, a) = 0, the optimal
solution µ∗η (x, a) will also be zero, thanks to the form of our regularized objective.
Thus, without loss of generality, we will assume that all states are recurrent under µ0 :
µ0 (x, a) > 0 holds for all state-action pairs.
For any choice of regularizer R, the Lagrangian of the primal (6) is given by
X
X
X
1
µ(y, b)
V (y)
µ(x, a)P (y|x, a) −
L(µ; V,λ, ϕ) =
µ(x, a)r(x, a) − R(µ) +
η
x,a
y
x,a
b
!
X
X
+λ 1−
µ(x, a) +
ϕ(x, a)µ(x, a)
X
x,a
x,a
!
=
X
=
X
x,a
x,a
µ(x, a) r(x, a) +
X
P (y|x, a)V (y) − V (x) − λ + ϕ(x, a)
y
1
− R(µ) + λ
η
1
µ(x, a) (A(x, a) − λ + ϕ(x, a)) − R(µ) + λ,
η
where V , λ and ϕ are the Lagrange multipliers5 , and A is the advantage function for
V . Setting the gradient of the Lagrangian with respect to µ to 0 yields the system of
5. Technically, these are KKT multipliers as we also have inequality constraints. However, these will
be eliminated by means of complementary slackness in the next sections.
20
!
A unified view of entropy-regularized MDPs
equations
∂L
1 ∂R(µ)
= (A(x, a) − λ + ϕ(x, a)) −
,
∂µ(x, a)
η ∂µ(x, a)
∂R(µ)
= η (A(x, a) − λ + ϕ(x, a)) ,
(20)
⇔
∂µ(x, a)
for all x, a. By the first-order stationary condition, the unique optimal solution µ∗η
satisfies this system of equations. To obtain the final solution we have to compute
the optimal values Vη∗ , λ∗η and ϕ∗η of the Lagrange multipliers by optimizing the dual
optimization objective g(V, λ, ϕ) = L(µ∗η ; V, λ, ϕ), and insert into the expression for
µ∗η . V and λ are unconstrained in the dual, while ϕ satisfies ϕ(x, a) ≥ 0 for each
(x, a) ∈ X × A. We give the derivations for each regularizer below.
0=
A.3. The relative entropy
P
Here we prove the results for R(µ) = DS (µkµ0 ) = x,a µ(x, a) log µµ(x,a)
0 (x,a) . The gradient
of R is
∂R(µ)
µ(x, a)
= log 0
+ 1.
∂µ(x, a)
µ (x, a)
The optimal state-action distribution µ∗η is now directly given by Equation (20):
µ∗η (x, a) = µ0 (x, a) exp (η (A(x, a) − λ + ϕ(x, a)) − 1) .
(21)
For µ∗η to belong to ∆, it has to satisfy Constraints (18) and (19). Because of
the exponent in (21), µ∗η (x, a) ≥ 0 trivially holds for any choice of ϕ(x, a), and
complementary slackness implies ϕ∗η (x, a) = 0 for each (x, a). Eliminating ϕ and
inserting µ∗η into Constraint (18) gives us
X
1=
µ0 (x, a) exp (ηA(x, a)) e−ηλ−1 ,
x,a
1
⇔ λ=
η
!
log
X
µ0 (x, a) exp (ηA(x, a)) − 1 .
(22)
x,a
Since the value of λ is uniquely determined by (22), we can optimize the dual over V
only. The dual function is given by
X
µ∗η (x, a)
1
1
∗
∗
g(V ) = L(µη ; V, λ) =
µη (x, a) A(x, a) − λ − log 0
+λ= +λ
η
µ (x, a)
η
x,a
X
1
= log
µ0 (x, a) exp (ηA(x, a)) .
η
x,a
This is precisely the dual given in Equation (10). Note that this dual function has
no associated constraints. The expression for the optimal state-action distribution in
Equation (9) is obtained by inserting the advantage function A∗η corresponding to the
optimal value function Vη∗ into (21).
21
Neu Gómez Jonsson
A.4. The conditional entropy
We next prove the results for R(µ) = DC (µkµ0 ) =
gradient of R is
P
x,a
µ(x, a) log ππµ0(a|x)
. The
(a|x)
µ
∂R(µ)
πµ (a|x) X µ(x, b) ∂πµ (b|x)
= log
+
·
.
∂µ(x, a)
πµ0 (a|x)
πµ (b|x) ∂µ(x, a)
b
Since the policy is defined as πµ (a|x) =
µ(x,a)
,
νµ (x)
its gradient with respect to µ is
I{a=b} µ(x, b)
∂πµ (b|x)
1
=
−
I
−
π
(b|x)
, ∀x ∈ X , a, b ∈ A.
=
µ
{a=b}
∂µ(x, a)
νµ (x)
νµ (x)2
νµ (x)
Inserting into the expression for the gradient of R yields
πµ (a|x) X πµ (b|x)
∂R(µ)
= log
+
I{a=b} − πµ (b|x)
∂µ(x, a)
πµ0 (a|x)
πµ (b|x)
b
X
πµ (a|x)
πµ (a|x)
πµ (b|x) = log
= log
+1−
.
πµ0 (a|x)
πµ0 (a|x)
b
The optimal policy πµ∗ is now directly given by Equation (20):
πη∗ (a|x) = πµ0 (a|x) exp (η (A(x, a) − λ + ϕ(x, a))) .
(23)
For µ∗η to belong to ∆, it has to satisfy Constraint (19). Because of the exponent
in (23) and the fact that µ∗η (x, a) ∝ πη∗ (a|x), µ∗η (x, a) ≥ 0 trivially holds for any choice
of ϕ(x, a), implying that ϕ∗η (x, a) = 0 for each (x, a) by complementary slackness.
Since πη∗ (a|x) =
µ∗η (x,a)
,
νη∗ (x)
X
we also obtain the following set of constraints:
πη∗ (a|x) =
a
X µ∗η (x, a)
a
νη∗ (x)
=
νη∗ (x)
= 1, ∀x ∈ X .
νη∗ (x)
Inserting the expression for πη∗ yields
1=
X
πµ0 (a|x) exp (ηA(x, a)) e−ηλ , ∀x ∈ X .
a
If we expand the expression for A(x, a) and rearrange the terms we obtain
!!
X
X
1
P (y|x, a)V (y)
πµ0 (a|x) exp η r(x, a) − λ +
, ∀x ∈ X .
V (x) = log
η
a
y
(24)
22
A unified view of entropy-regularized MDPs
The dual function is obtained by inserting the expression for µ∗ into the Lagrangian:
X
πη∗ (a|x)
1
∗
∗
g(V, λ) = L(µη ; V, λ) =
µη (a|x) A(x, a) − λ − log
+ λ = λ. (25)
0 (a|x)
η
π
µ
x,a
Together, Equations (24) and (25) define the dual optimization problem in Proposition 2. The expression for the optimal policy in Equation (11) is obtained by inserting
the optimal advantage function A∗η into (23).
We remark that to recover the optimal stationary state-action distribution µ∗η , we
would have to insert the expression for the optimal policy πη∗ into Constraints (17)
and (18), and solve for the stationary state distribution νη∗ . However, this is not
necessary since µ∗η and νη∗ are not required to solve the dual function or to compute
the optimal policy.
Appendix B. The regularized Bellman operators
In this section, we define the regularized Bellman operator Tπ|π0 corresponding to the
policy π and regularized with respect to baseline π 0 as
!
X
π(a|x) X
0
0
π|π 0
P (x |x, a)V (x )
(∀x) .
+
Tη [V ](x) =
π(a|x) r(x, a) − log 0
π (a|x)
a
x0
Similarly, we define the regularized Bellman optimality operator T∗|π0 with respect to
baseline π 0 as
!!
X
X
1
0
Tη∗|π [V ](x) = log
π 0 (a|x) exp η r(x, a) +
P (y|x, a)V (y)
(∀x) ,
η
a
y
and the regularized greedy policy with respect to the baseline π 0 as
!!
0
Gπη [V ](a|x) ∝ π 0 (a|x) exp η r(x, a) +
X
P (y|x, a)V (y) − V (x)
.
y
With these notations, we can define the regularized relative value iteration algorithm
with respect to π 0 by the iteration
0
πk+1 = Gπη [Vk ]
0
Vk+1 (x) = Tη∗|π [Vk ](x) − δk+1
(26)
∗|π 0
for some δk+1 lying between the minimal and maximal values of Tη [Vk ]. A common
∗|π 0
technique is to fix a reference state x0 and choose δk+1 = Tη [Vk ](x0 ).
Similarly, we can define the regularized policy iteration algorithm by the iteration
∞
π0
πk+1 |π 0
πk+1 = Gη [Vk ]
Vk+1 (x) = Tη
[Vk ](x) − δk+1 ,
(27)
23
Neu Gómez Jonsson
with δk+1 defined analogously.
For establishing the convergence of the above procedures, it is crucial to ensure
∗|π 0
that the operator Tη is a non-expansion: For any value functions V1 and V2 , we
need to ensure
0
0
Tη∗|π [V1 ] − Tη∗|π [V2 ] ≤ kV1 − V2 k
for some norm. We state the following result claiming that the above requirement
indeed holds and present the simple proof below. We note that analogous results
have been proven several times in the literature, see, e.g., (Fox et al., 2016; Asadi and
Littman, 2016).
∗|π 0
is a non-expansion for the supremum norm kf k∞ = maxx |f (x)|.
P
Proof For simplicity, let us introduce the notation Q1 (x, a) = r(x, a)+ y P (y|x, a)V1 (y),
with Q2 defined analogously, and ∆ = Q1 − Q2 . We have
Proposition 5 Tη
∗|π 0
Tη
∗|π 0
[V1 ](x) − Tη
!
1
[V2 ](x) =
η
log
X
π 0 (a|x) exp (ηQ1 (x, y)) − log
X
π 0 (a|x) exp (ηQ2 (x, y))
a
a
P
0
π
(a|x)
exp
(ηQ
(x,
y))
1
1
=
log Pa 0
π
(a|x)
exp
(ηQ
η
2 (x, y))
Pa 0
exp (η (Q2 (x, y) + ∆(x, y)))
1
a π (a|x)
P 0
=
log
η
a π (a|x) exp (ηQ2 (x, y))
X
1
p(x, a) exp (η∆(x, a))
(with an appropriately defined p)
= log
η
a
1
log max exp (η∆(x, a))
a
η
X
= max ∆(x, a) = max
P (y|x, a) (V1 (y) − V2 (y))
≤
a
a
y
≤ max |V1 (y) − V2 (y)| .
y
With an analogous technique, we can also show the complementary inequality
0
0
Tη∗|π [V2 ](x) − Tη∗|π [V1 ](x) ≤ max |V2 (y) − V1 (y)| ,
y
which concludes the proof.
∗|π 0
Together with the easily-seen fact that Tη is continuous, this result immediately
∗|π 0
implies that Tη has a fixed point by Brouwer’s fixed-point theorem. Furthermore,
this insight allows us to treat the value iteration method (26) as an instance of
generalized value iteration, as defined by Littman and Szepesvári (1996).
∗|π 0
We now argue that regularized value iteration converges to the fixed point of Tη .
If the initial value function V0 is bounded, then so is Vk for each k since the operator
24
A unified view of entropy-regularized MDPs
∗|π 0
Tη is a non-expansion. Similar to Section 3, we assume without loss of generality
that the initial reference policy π0 has full support, i.e. π0 (a|x) > 0 for each recurrent
0
state x and each action a. Inspecting the greedy policy operator Gπη , it is easy to
show by induction that πk has full support for each k. In particular, πk+1 (a|x) only
equals 0 if either πk (a|x) equals 0 or if the exponent Ak (x, a) equals −∞, which is
only possible if Vk is unbounded.
Now, since πk has full support for each k, any trajectory always has a small
probability of reaching a given recurrent state. We can now use a similar argument as
Bertsekas (2007, Prop. 4.3.2) to show that regularized value iteration converges to the
∗|π 0
fixed point for Tη .
B.1. The proof of Lemma 3
Let µ and µ0 be the respective stationary distributions of π and π 0 . The statement
follows easily from using the definition of Aπη :
X
x,a
µ
0
(x, a)Aπη (x, a)
X
1 log π(a|x)
=
µ (x, a) r(x, a) −
−
ρ
e
(µ)
+
P (y|x, a)Vηπ (y) − Vηπ (x)
0
η log π (a|x)
x,a
y
!
X
X
µ0 (x, a)
P (y|x, a)Vηπ (y) − Vηπ (x)
= ρe(µ0 ) − ρe(µ) +
X
0
x,a
y
0
= ρe(µ ) − ρe(µ),
where the last step follows from the stationarity of µ0 .
B.2. Regularized policy gradient
Here we prove Lemma 4 which gives the gradient of the regularized average reward
ρeη (θ) when the policy πθ is parameterized on θ. Following Sutton et al. (1999), we
first compute the gradient of Vηπθ :
!
X
1
πθ (a|x)
r(x, a) − log 0
− ρeη (θ) +
P (y|x, a)Vηπθ (y)
η
π (a|x)
y
!
X
∂Vηπθ (y)
1
∂πθ (a|x) ∂ ρeη X
+
πθ (a|x) −
−
+
P (y|x, a)
.
ηπθ (a|x) ∂θi
∂θi
∂θi
a
y
∂Vηπθ (x) X ∂πθ (a|x)
=
∂θi
∂θi
a
25
!
Neu Gómez Jonsson
Rearranging the terms gives us
X
1
1
πθ (a|x)
r(x, a) − log 0
− ρeη (θ) +
P (y|x, a)Vηπθ (y) −
η
π (a|x)
η
y
∂ ρeη X ∂πθ (a|x)
=
∂θi
∂θi
a
+
X
πθ (a|x)
X
a
=
P (y|x, a)
y
X ∂πθ (a|x)
∂θi
a
Aπη θ (x, a)
+
!
∂Vηπθ (y) ∂Vηπθ (x)
−
∂θi
∂θi
X
πθ (a|x)
a
X
y
∂Vηπθ (y) ∂Vηπθ (x)
P (y|x, a)
−
.
∂θi
∂θi
P
The last equality follows from the fact that since a ∂πθ (a|x)/∂θi = 0 for each x,
we can add any state-dependent constant to the multiplier of ∂πθ (a|x)/∂θi ; adding
the term η1 − Vηπθ (x) results in the given expression. Summing both sides over the
stationary state distribution νπθ yields
∂ ρeη X
∂πθ (a|x) πθ
∂ ρeη X
=
νπθ (x)
=
νπθ (x)
Aη (x, a)
∂θi
∂θ
∂θ
i
i
x
x,a
+
XX
y
=
X
=
X
x,a
x,a
νπθ (x)πθ (a|x)P (y|x, a)
x,a
∂Vηπθ (y) X
∂Vηπθ (x)
−
νπθ (x)
∂θi
∂θi
x
X
∂Vηπθ (y) X
∂Vηπθ (x)
∂πθ (a|x) πθ
Aη (x, a) +
νπθ (y)
−
νπθ (x)
νπθ (x)
∂θi
∂θi
∂θi
y
x
νπθ (x)
∂πθ (a|x) πθ
Aη (x, a).
∂θi
To conclude the proof it is sufficient to note that
µπθ (x, a)
∂ log πθ (a|x)
µπ (x, a) ∂πθ (a|x)
∂πθ (a|x)
= θ
= νπθ (x)
.
∂θi
πθ (a|x)
∂θi
∂θi
B.3. The closed form of the TRPO update
Here we derive the closed-form solution of the TRPO update. To do so, we first briefly
summarize the mechanism of the algorithm. The main idea of Schulman et al. (2015)
is replacing ρ(µ0 ) by the surrogate
X
X
Lπ (π 0 ) = ρ(π) +
νπ (x)
π 0 (a|x)Aπ∞ (x, a),
x
a
26
A unified view of entropy-regularized MDPs
where Aπ∞ is the unregularized advantage function corresponding to policy π.
Furthermore, TRPO uses the regularization term
DTRPO (µkµ0 ) =
X
νµ0 (x)
X
x
πµ (a|x) log
a
6
πµ (a|x)
.
πµ0 (a|x)
The difference between L + DTRPO and ρ + DC is that the approximate version ignores
the impact of changing the policy π on the stationary distribution. Given this surrogate
objective, TRPO approximately computes the distribution
1
(28)
µk+1 = arg max Lµk (µ) − DTRPO (µkµk ) .
η
µ∈∆
Observing that the TRPO policy update can be expressed equivalently as
(
)
X
X
1
π(a|x)
π(a|x) Aπ∞k (x, a) − log
πk+1 = arg max
νµk (x)
,
η
πk (a|x)
π
a
x
we can see that the policy update can be expressed in closed form as
πk
πk+1 (a|x) ∝ πk (a|x)eηA∞ (x,a) .
This update then can be seen as a regularized greedy step with respect to the value
function of the previous policy πk .
6. This form is inspired by the well-known identity we state as Lemma 3.
27
| 2cs.AI
|
Learning Policies for Adaptive Tracking with Deep Feature Cascades
Chen Huang
Simon Lucey
Deva Ramanan
Robotics Institute, Carnegie Mellon University
arXiv:1708.02973v2 [cs.CV] 13 Sep 2017
chenh2@andrew.cmu.edu
{slucey,deva}@cs.cmu.edu
Pixel layer +
correlation
filters
Abstract
Visual object tracking is a fundamental and time-critical
vision task. Recent years have seen many shallow tracking methods based on real-time pixel-based correlation filters, as well as deep methods that have top performance but
need a high-end GPU. In this paper, we learn to improve the
speed of deep trackers without losing accuracy. Our fundamental insight is to take an adaptive approach, where easy
frames are processed with cheap features (such as pixel values), while challenging frames are processed with invariant but expensive deep features. We formulate the adaptive
tracking problem as a decision-making process, and learn
an agent to decide whether to locate objects with high confidence on an early layer, or continue processing subsequent
layers of a network. This significantly reduces the feedforward cost for easy frames with distinct or slow-moving
objects. We train the agent offline in a reinforcement learning fashion, and further demonstrate that learning all deep
layers (so as to provide good features for adaptive tracking) can lead to near real-time average tracking speed of
23 fps on a single CPU while achieving state-of-the-art performance. Perhaps most tellingly, our approach provides a
100X speedup for almost 50% of the time, indicating the
power of an adaptive approach.
Deep convolutional layers
Template frame
Current frame
Easy frame
Agent Output at this layer
or forward to the next layer
Hard frame
Figure 1. Learning policies for adaptive tracking with deep feature
cascades. The agent decides whether we can accurately locate objects on an early layer of the cascade. This avoids the need to always wait for the last layer to make decisions, saving a substantial
amount of feed-forwarding time.
designing a tracker that has both high accuracy and high
speed. Real-time tracking methods like TLD [21] and correlation filters [19] usually rely on low-level features that
are not descriptive enough to disambiguate target and background. Several recent works [15, 27, 11, 31, 10] overcome
this limitation by learning correlation filters on hierarchical
deep features, but the real-time capacity largely fades away.
Other deep trackers [41, 30, 40] take full advantage of the
end-to-end learning, and fine-tune the deep network online
to achieve top performance. However, even on a high-end
GPU, the speed of such trackers is usually around 1 fps
which is too slow for practical use.
1. Introduction
Visual Object Tracking (VOT) is a fundamental problem
in vision. We consider the single object tracking task, where
an object is identified in the first video frame and should
be tracked in subsequent frames, despite large appearance
changes due to object scaling, occlusion, and so on. VOT is
the basic building block of many time-critical systems such
as video surveillance and autonomous driving. Thus it is
important for a visual tracker to meet the strict constraints
of time and computational budget, especially on mobile or
embedded computing architectures where real-time analysis perception is often required.
Although much progress has been made in the tracking literature, there still exist tremendous challenges in
Two recent deep trackers [3, 18] significantly boost their
speed by deploying fixed convolutional networks without
any online learning. During tracking, the pre-trained network is simply traversed in a feed-forward pass for similarity evaluation or location regression, allowing to track objects at real-time speeds on GPU. Nevertheless, on a modern CPU, smartphone or tablet with much less computing
power, such deep trackers can only process a couple of
frames per second, far below the normal video frame-rate
30 fps. Obviously, the major computational burden comes
from the forward pass through the entire network, and can
1
be larger with deeper architectures.
We aim to improve both the accuracy and speed of deep
tracking, instead of trading off the quality for speed by e.g.
using compressed models [1]. We propose to learn to speed
up deep trackers in an adaptive manner. Our adaptive approach builds on the observation that the tracking complexity varies across frames. For example, it is usually effective
to use features from the last layer of a deep network to track
objects undergoing large appearance change (e.g. abrupt
motion) - as these higher-level features are more tolerant
to dramatic appearance variation [27]. However, when the
object is visually distinct or barely moves, early layers are
in most scenarios sufficient for precise localization - offering the potential for substantial computational savings. In
the extreme case, the “zeroth” pixel-level layer may suffice
for such easy frames, as evidenced by the success of pixelbased correlation filters.
Such an adaptive strategy crucially depends on making
the right decision - should the tracker stop at the current
feature layer or keep computing features on the next layer?
To this end, we learn an agent to automatically achieve this
goal as illustrated in Fig. 1. The agent learns to find the target at each layer, and decides if it is confident enough to output and stop there. If not, it moves forward to the next layer
to continue. This is equivalent to learning a “timely” decision policy to choose the optimal layer for tracking. We will
show such policy learning is much more robust than heuristically thresholding the response map of the current active
layer. It is also in sharp contrast to the layer selection mechanism in [40], which only selects from two fixed levels of
convolutional layers after the entire forward pass is finished.
Instead, we formulate this problem as a decision-making
process, making sequential decisions with early stopping
ability. Specifically, we learn the policy in a reinforcement
learning [29] fashion during the training phase, and simply
apply the policy for adaptive tracking at test time.
In doing so, we are able to provide a speedup of around
10× (on average) over the baseline deep tracker [3] and
achieve even higher accuracies on existing OTB [43] and
VOT [22] tracking benchmarks. Perhaps most tellingly, our
approach provides a 100× speedup almost 50% of the time,
indicating the power of an adaptive approach - it turns out
that most frames are quite easy to track! Accuracy is improved because each layer of the network is directly trained
to be informative for adaptive tracking, similar to the past
approaches for “deep supervision” [25]. Concretely, our
adaptive tracker works by defining object templates across
multiple layers of a network, including the “zeroth” pixel
layer. Templates are evaluated across Region of Interest
(ROI) with a convolutional filter. We use fast correlation
filters [19] to compute response maps for lower layers of
our network, where Fourier processing significantly speeds
up the convolutional procedure (Fig. 1). We refer to our
approach as EArly-Stopping Tracker (EAST). On a single
CPU, it has a near real-time average speed of 23.2 fps, and
is about 190 fps almost 50% of the time. This makes it
the first CPU-friendly deep tracker among the top benchmark performers. It is worth noting that our policy learning method is quite generic. Further, it is readily applied
to train end-to-end with an existing deep network for other
time-critical vision tasks besides visual tracking.
2. Related Work
Real-time tracking and correlation filters: Visual tracking methods can rely on either generative (e.g. [32]) or
discriminative (e.g. [16]) models. Discriminative models
are often found to outperform in accuracy by discriminating the target from background. Such trackers can usually run fast using hand-crafted features (e.g. HOG [9]) and
various learning methods of P-N learning [21], structured
SVM [16], multi-expert entropy minimization [45], and correlation filter [4].
Among them, Discriminative Correlation Filter (DCF)based methods [4, 19] are the family of tracking methods
with high efficiency and high accuracy as well. The fast
speed of DCF is due to its efficient use of all spatial shifts
of a training sample by exploiting the discrete Fourier transform. The pioneering MOSSE [4] and improved Kernelized
Correlation Filter (KCF) [19] trackers can operate at 669 fps
and 292 fps respectively on a single CPU, which far exceeds
the real-time requirement. Recent advances of DCF have
achieved great success by the use of multi-feature channels [14, 15, 27, 11, 31, 10], scale estimation [13, 26], longterm memory [28], and boundary effect alleviation [11, 12].
However, with increasing accuracy comes a dramatic decrease in speed (0.3–11 fps on a high-end GPU).
Tracking by deep learning: Directly applying correlation
filters on the multi-dimensional feature maps of deep Convolutional Neural Networks (CNNs) is one straight-forward
way of integrating deep learning for tracking. Usually the
deep CNN is fixed, and the DCF trackers trained on every convolutional layer are combined by a hierarchical ensemble method [27] or an adaptive Hedge algorithm [31].
Danelljan et al. [15] recently introduced a continuous spatial domain formulation C-COT, to enable efficient integration of multi-resolution deep features. C-COT and its improved ECO [10] can achieve top performance in the VOT
challenge [22], but the tracking speed is still slow due to the
high dimension of the entire deep feature space.
Another category of deep trackers [41, 30, 40] update
a pre-trained CNN online to account for the target-specific
appearance at test time. Such trackers usually take a classification approach to classify many patches and choose the
highest scoring one as the target object. Unfortunately, online training and exhaustive search severely hamper their
speed. The top performing tracker MDNet [30] has the
GPU speed of only 1 fps or so. Recent advances include
using Recurrent Neural Networks (RNNs) [20, 7] to model
temporal information using an attention mechanism, but the
speed remains slow.
One common reason for the slow speed of the abovementioned deep trackers is they always conduct a complete
feed-forward pass to the last CNN layer. This ignores the
fact that the tracking complexity differs across varying conditions. One of our conclusions is that most frames in current video benchmarks are rather easy. For those frames,
forwarding to only early layers may suffice. In principle,
such an insight can be used to speed up many recent realtime deep trackers, such as GOTURN [18] (165 fps on
GPU) and SiamFC [3] (86 fps on GPU), to make them more
CPU-friendly with near frame-rate speed.
Feature selection in tracking: Good features are important
to tracking. The initial DCF trackers were limited to a single feature channel, e.g. a grayscale image in MOSSE [4].
The DCF framework was later extended to multi-channel
features such as HOG [13, 19], Haar-like features [16], binary patterns [21] and Color Attributes [14]. Generally, the
hand-crafted features are cheap to compute, but they are not
discriminative enough to handle complex tracking scenarios. Many recent deep trackers (e.g. [41, 30]) exploit the
semantically robust features from the last CNN layer (fullyconnected). However, spatial details of the tracked object
are lost in the last layer which is not optimal for visual tracking. Danelljan et al. [11] found the first convolutional layer
is very suitable for tracking. Other works [15, 27, 31, 10]
choose to utilize all the hierarchical convolutional features,
where early layers can preserve high spatial resolution and
deep layers are more discriminative.
In this paper, we make the best of hand-crafted and deep
convolutional features in a cascaded structure, and learn an
agent to select a minimum sequence of feature layers for
fast tracking purposes. Unlike FCNT [40] that selects features from two pre-defined layers only after a complete forward pass, our selection is sequential and can stop early at
any layer with enough confidence.
Feature cascades: CNNs are a natural cascaded architecture with increasingly abstract feature representations. Contemporary works either improve the cascade’s optimality by
deep layer supervision [25], or stack multiple CNNs into a
deeper cascade for coarse-to-fine [35] or multi-task [8] predictions. Our work differs in learning a decision policy of
using only early feature layers in a cascade, and in combining feature cascades and reinforcement learning [36] to
achieve this goal. Our approach bears some similarity to the
“attentional cascade” structure [39] which uses a cascade of
gradually more complex classifiers. The difference is that
attentional cascade aims to use early classifiers to eliminate
easy negatives and reduce the burden of complex classifier
evaluation, whereas we aim to use these early layers to make
a strong decision as early as possible.
Reinforcement learning for tracking: Reinforcement
learning (RL) [29, 36] is capable of learning good policies
to take a sequence of actions based on trail and error. It
has been successfully applied to vision tasks (e.g. object detection [5]) by treating them as a decision-making process.
For visual tracking, there are two recent works that use RL
to temporally attend target regions [44] and select suitable
template [6]. Our work is the first one to use RL to learn an
early decision policy for speeding up deep tracking.
3. Method
We use the deep Convolutional Neural Network (CNN)
as a rich feature cascade for robust visual tracking. Given
an input video frame at time t, the process of tracking an
object with bounding box can be seen as the problem of
maximizing a confidence function fl : Ht → R over the set
of hypothesized object regions Rt :
rt∗ = arg max fl (r),
r∈Ht
(1)
where Ht usually consists of regions around the object location in the previous frame, and l denotes the feature layer at
which the object confidence is obtained. Many deep trackers [41, 30] exploit l = L as the last fully-connected layer
or last convolutional layer of AlexNet [24] or deeper VGGNet [34]. Other trackers [15, 27, 31, 10] exploit a full layer
set {l}L
l=1 of all the convolutional layers to take the best advantage of feature hierarchies. While these methods have
been successful and effective, they are still slow and may
not be needed when tracking during easy frames.
In this paper, we propose a principled sequential method
that accumulates confidence fl=1,...,Lt (r) from an adapt
tively small set of feature layers {l}L
l=1 in order to track
efficiently without losing accuracy. For example, Lt = 2
convolutional layers C1–C2 can suffice to track a distinct
face in Fig. 3; but for a blurry face in cluttered backgrounds,
we may want to gather more evidence from a deeper layer
C5. During such sequential search, our method needs to
adjust the bounding box to progressively localize the object
using more and more robust features. Ideally, we would
like to minimize the number of forwarded layers necessary
to locate objects. A naive approach might use a heuristic for
determining when to advance to the next layer: for example, one might advance if the maximum value of the current
response map is below a threshold. However, defining such
heuristics can be difficult when the response map is ambiguous or has multiple peaks (e.g. Fig. 3). Instead, we propose
to train a functioning agent end to end by deep reinforcement learning [29]. The agent learns the action and search
policy (including the early stopping criteria) so that it can
make decisions under uncertainty to reach the target. Fig. 2
shows the framework of our policy learning.
Pixel
layer
Template frame
Cropped image
127*127*3
HOG
layer
Deep convolutional layers
C2
C3
C4
C1
6*6*128
Q-Net
C5
Global
scaling
Action history
32-d
17*17
Averaged
128-d 128-d
score map
8 actions
Q-Net
Q-Net
Q-Net
Q-Net
Q-Net
Q-Net
Local
scaling
Reshaped Fully-connected
layers
score
289-d
Current frame
Search image
255*255*3
No
scaling
22*22*128
Stop
Figure 2. System framework of our EArly-Stopping Tracker (EAST) by policy learning.
C1
C2
C1
C2
C3
C4
C5
1
1,2
0
0
4,5
2,3
1
0
3
2
0,1
More examples of used
layers and box actions
Figure 3. Example sequences of actions taken to adjust the bounding box scale over deep convolutional layers. Box translation is determined
by the relative position of maximum score on the score map. Note each score map is averaged with all the maps from preceding layers. Our
agent learns to wisely act upon the score maps. It terminates the search early if the confidence score is highly peaked. When the score map
is ambiguous (e.g. has two peaks for a blurry face in cluttered backgrounds), the agent postpones decision and enlarges the box according
to the more unambiguous score map at the next layer. Further actions of box scaling are performed with stronger confidence.
3.1. Fully-Convolutional Siamese Network
In this section, we review the fully-convolutional
Siamese tracker [3], which we make use of for its good
trade-off between speed (86 fps on GPU) and accuracy in
exploiting deep convolutional layers. Other trackers are either too slow [15, 27, 31, 10] as a baseline (<11 fps on
GPU), or do not provide explicit response maps (direct regression instead in [18]) for our policy learning purposes.
The Siamese network [3] is trained offline to locate a
127 × 127 template image z within a larger 255 × 255
search image x. A similarity function is learned to compare the template image z to a candidate region of the same
size in the search image x, so as to return a high score for the
truth region and low score otherwise. Such similarity evaluation is fully-convolutional with respect to x in the network,
much more efficient than exhaustive search. Specifically, a
cross-correlation layer is proposed to compute similarity for
all translated sub-regions in x in one pass:
Fl (z, x) = ϕl (z) ∗ ϕl (x) + vI,
(2)
where ϕl is the convolutional feature embedding at layer
l = 5 (i.e. C5 layer), and v ∈ R is an offset value. Here
Fl (·, ·) is a confidence score map of size 17×17, as opposed
to the single confidence score fl (·) in Eq. 1.
During tracking, this Siamese network simply evaluates
the similarity online between the template image in previous frame and the search region in current frame, leading to
fast speed. The relative position of the maximum score multiplied by the stride of the network, gives the object translation from frame to frame.
Our goal is to learn an early decision policy from these
confidence score maps Fl , to adaptively 1) predict the object bounding box across layers, and 2) stop early at a layer
l < 5 when sufficiently confident about the prediction. Note
the score map dimension depends on the size of input feature maps. The score map Fl on an early layer l will have
a larger resolution than 17 × 17, and so we downsample to
this size to facilitate learning. Also, SiamFC [3] searches
over multiple scales of the search image to handle scale
variations. We only work on the original scale for high
efficiency, and learn to gradually infer the box scale from
heatmaps computed during the single forward-pass.
3.2. Learning Policies with Reinforcement Learning
We treat the tracking problem as a Markov Decision Process (MDP) where an agent can make a sequence of actions
across feature layers, see Fig. 2. This agent learns when to
stop advancing to the next layer, as well as how to to gradually deform a bounding box once per layer, which is initialized to the estimated box from the previous frame. The
ultimate goal is to output a tight box around the object with
as few as layers as possible. The challenge is to be able to
operate with rewards that rule out supervision at each step,
and at the same time, to minimize the number of steps to
locate the target given its changing complexity.
We train the agent in a reinforcement learning (RL) setting to learn decision policies. In the RL setting there are a
set of states S and actions A, and a reward function R. At
each step on layer l, the agent examines the current state Sl ,
and decides on the action Al to either transform the box or
stop with a box output. The action Al is expected to reduce
the uncertainty in localizing the object, and receives positive or negative reward Rl reflecting how well the current
box covers the object and how few steps are used before action stop. By maximizing the expected rewards, the agent
learns the best policy to take actions and can explicitly balance accuracy (search for more layers) and efficiency (stop
early if highly confident).
Actions: Our action set A includes seven anisotropic scaling transformations to a box and one stop action to terminate search. We do not use the agent to predict the centroid
of the box, and instead compute it directly from the relative
position of the maximum score on score map as in Eq. 1.
We also experimented with requiring the agent to report
box translations, but found directly inferring them from the
score maps simplified training and increased convergence
(due to the smaller space of actions A).
For scaling actions, there are two global and four local
(modify aspect ratio) transformations as shown in Fig. 2.
Similar to [5], any of these actions makes a combined horizontal and vertical change to the box by a factor of 0.2
relative to its current size. We also introduce a no scaling
action that does not scale the box at all. This action allows
the agent to postpone decision when the current score map
is ambiguous or a decision simply cannot be made. Fig. 3
exemplifies this case where two peaks exist on the first-layer
score map for a cluttered scene. The agent decides not to act
on this map but waits for a more unambiguous map at the
next layer to act (enlarge the box).
States: The state Sl is represented as a tuple (Fl0 , hl ), where
Fl0 is the score map and hl is a vector of the history of taken
Pl
actions. We define Fl0 = k=1 Fk /l as the average of the
score map at current layer l and all its preceding maps from
earlier layers. Thus Fl0 not only encodes the currently observed confidence but also the confidence history that has
been collected. This is found to work better empirically than
using Fl only, and is similar to the hypercolumn representation [17] with the benefits of simultaneously leveraging
information from early layers that capture fine-grained spatial details and deeper layers that capture semantics. Also,
the resulting robustness comes at a negligible cost in averaging the score maps already obtained. The history vector hl
keeps track of the past 4 actions. Each action in the vector is
represented by an 8-dimensional one-hot vector or zero vector (when processing the first layer). We find that including
hl ∈ R32 helps stabilize action trajectories.
Rewards: The reward function R(Sl−1 , Sl ) reflects the localization accuracy improvement from state Sl−1 to Sl after taking a particular action Al . The accuracy is measured
by the Intersection-over-Union (IoU) between the predicted
box b and ground-truth box g. We can formally define IoU
as IoU (b, g) = area(b ∩ g)/area(b ∪ g). Since each state
Sl is associated with a box bl , the reward function is then
defined following [5]:
sign(IoU (bl , g) − IoU (bl−1 , g)), Al 6= stop
R(Sl−1 , Sl ) = +3,
IoU (bl , g) ≥ 0.6, Al = stop
−3,
IoU (bl , g) < 0.6, Al = stop,
(3)
where the accuracy improvement is quantized to ±1 if the
current action is not stop. This reward scheme encourages
positive transformations even with small accuracy improvement. If there is no transformation for further improvement,
or if the agent already arrives at the last layer l = L, the action should be stop. In this case, the reward function will
penalize the predicted box bl with IoU less than 0.6. Note
such a reward scheme implicitly penalizes a large number
of layers l since Q-learning (detailed next) models the expected future rewards when deciding on an action (positive
or negative).
Deep Q-learning: The optimal policy of selecting actions
should maximize the sum of expected rewards on a given
frame. Since we do not have a priori knowledge about
the correct layer or action to choose, we address the learning problem through deep Q-learning [29]. This approach
learns an action-value function Q(Sl , Al ) to select the action Al+1 that gives the highest reward at each layer. The
learning process iteratively updates the action-selection policy by:
Q(Sl , Al ) = R + γ max
Q(S 0 , A0 ),
0
A
(4)
where Q(S 0 , A0 ) is the future reward and γ the discount factor. The function Q(S, A) is learned by a deep Q-Network
as illustrated in Fig. 2. It takes as input the state representation S, i.e. the reshaped score vector and action history
vector. The network consists of two 128-dimensional fullyconnected layers, finally mapping to 8 actions. Each fully-
connected layer is randomly initialized, and is followed by
ReLU and dropout regularization [24].
Note during training, we not only update the weights of
the Q-Network, but also the pre-trained convolutional layer
when the agent receives rewards on that layer. Similar to the
deeply-supervised net [25], our approach provides a direct
target signal for learning the feature representation at each
layer, so as to improve performance of our adaptive tracker.
Testing with learned policies: During testing, the agent
does not receive rewards or update the Q-function. It just
follows the decision policy to deform the box and output it
when a stop action is performed. Our agent takes only 2.1
steps on average to locate the target between frames on the
OTB-50 dataset [42]. This means we can correctly track
most objects by using 2 deep layers. Only for those hard
frames, the search degenerates to a full forward pass. The
overall tracking algorithm follows SiamFC [3] to search
over candidate regions around the estimated location from
previous frame. As a result, one order of magnitude speedups are achieved over traditional non-adaptive deep trackers. Set aside efficiency, the policies are still appealing in
that they mimic the dynamic attention mechanism by progressively attending to the target region in feature cascades.
Implementation details: We use the AlexNet [24]-like
convolutional architecture as in SiamFC [3]. The whole network including Q-Net is trained on the ImageNet Video [33]
trainval set (4417 videos) for 50 epochs, each completed
after the agent has interacted with all training images.
We make use of an -greedy [36] optimization during Qlearning, taking a random action with probability to encourage exploration of diverse action policies. We anneal
linearly from 1 to 0.1 over the first 30 epochs, and fix to
0.1 in the remaining 20 epochs. We use a learning rate 1e-3,
discount factor γ = 0.9 and batch size 64. The network parameters are updated with direct stochastic gradient descent
using MatConvNet [38] on a single NVIDIA GeForce Titan
X GPU and an Intel Core i7 CPU at 4.0GHz.
3.3. Learning with cheap features
Our policy learning can be applied to a feature cascade
with any type of feature layers. We explore the use of additional cheap feature layers after the pixel-layer and before
the more expensive deep layers. Inspired by the success of
correlation filters defined on multi-channel HOG layers [9],
we explore an optional HOG layer. In theory, other cheap
features such as Color Attributes [14] might apply. When
processing our pixel and HOG layers, we make use of fast
correlation filters. We specifically make use of the Dual
Correlation Filter (DCF) [19], which exhibits a good tradeoff in CPU speed (270+ fps on CPU) and accuracy compared to alternatives such as the Kernelized Correlation Filter (2× slower), STC [46] (350 fps but lower accuracy) and
SRDCF [12] (5 fps).
4. Results
Before comparing our EArly-Stopping Tracker (EAST)
with prior works, we first conduct an ablation study of some
of its important variants. We compare EAST to variants using different feature cascades—EAST-Pixel-HOG, EASTHOG, EAST-Pixel, as well as the baseline SiamFC [3].
Fig. 4 shows the probability of stopping at different feature
layers and the associated speed on OTB-50 [42]. EAST indeed learns to use only early layers over 70% of the time,
as they suffice when tracking easy frames. Hard frames
are processed with additional layers, degenerating to a full
forward-pass (as in SiamFC) only when needed. Fig. 5 illustrates some examples of easy and hard frames (and their
stopped layers) on particular video sequences.
Obviously, the earlier layer we stop at, the greater the
speedup. EAST-Pixel-HOG (which lacks a pixel or HOG
layer) is about 4.5× faster than SiamFC on average, running at 10.7 fps on a CPU and 467.3 fps on a GPU. Recall that Pixel and HOG layers can be processed by fast
correlation filters [19] that run at 278 fps and 292 fps, respectively. By adding such layers, EAST achieves a CPU
speedup of 10× on average and 100× for those easy frames.
Even though HOG may incur an additional feature computation cost compared to the Pixel layer, it produces a greater
speedup because it enables more accurate pruning, and so
is selected more often by EAST. Note that the average GPU
speed is sacrificed to some extent due to larger reliance on
CPU computations. Nonetheless, EAST still produces a
near-real-time CPU rate of 23.2 fps, making it quite practical for CPU-bound tracking (required on many embedded
devices).
Table 1 (top) summarizes the speed and accuracy of these
EAST variants. We use the Overlap Success (OS) rate as a
strict evaluation metric for accuracy. One-Pass Evaluation
(OPE) is employed to compare accuracies in terms of Area
Under the Curve (AUC) of OS rates for different threshold
values. Table 1 shows that the use of more and stronger
feature layers systematically improves the accuracy of the
tracker, reaching to the AUC score of 0.638 for our full
EAST model. Speed is also improved due to the larger computational savings on cheap layers.
Table 1 (middle) further compares other EAST variants:
• EASTlast : tracking by always forwarding to the last
feature layer.
• EASTth : feed-forwarding if the maximum value of the
current response map is lower than 0.9. Scale is determined by the size of thresholded region.
• EAST−ch : policy learning without confidence hisPl
tory, i.e. we use Fl instead of Fl0 = k=1 Fk /l.
• EAST−ah : policy learning without action history hl .
EASTlast is similar to the baseline SiamFC [3] in that all
layers are always processed, but differs in that it is trained
Avg.
speed
SiamFC [3] with 3 scale-search
CPU: 1.9 fps
GPU: 86 fps
Stopping probability
1
EAST-Pixel-HOG
CPU: 10.7 fps GPU: 467.3 fps
EAST-HOG
CPU: 14.5 fps GPU: 197.6 fps
EAST-Pixel
CPU: 19.9 fps GPU: 223.6 fps
EAST
CPU: 23.2 fps GPU: 158.9 fps
0.6
0.6
0.6
0.6
0.8
0.5
0.5
0.5
0.5
0.6
0.4
0.4
0.4
0.4
0.3
0.3
0.3
0.3
0.2
0.2
0.2
0.2
0.1
0.1
0.1
0.1
0
0
0
0.4
0.2
0
C1
C2
C3
C4
C5
C1 C2 C3 C4 C5
CPU
10.7x 5.2x 3.3x 2.4x 2.0x
speedup
Pixel C1 C2 C3 C4 C5
CPU
98.7x 7.9x 4.5x 3.2x 2.2x 1.9x
speedup
HOG C1 C2 C3 C4 C5
CPU
101.3x 8.0x 4.5x 3.2x 2.2x 2.0x
speedup
0
CPU
speedup
Pixel HOG C1 C2 C3 C4 C5
98.7x 62.4x 6.2x 3.9x 2.9x 2.0x 1.8x
Figure 4. Stopping probability at different feature layers and the resulting speed on OTB-50 dataset [42]. For each of the 5 models with
different feature cascades, we show the average speed on both CPU and GPU (top), and the CPU speedup ratio over the baseline SiamFC [3]
(1.9 fps) at each layer (bottom). SiamFC searches over multi-scaled images to handle scale variations, while we predict the scale in a single
forward-pass, leading to a constant tracking speedup. Our early stopping policy further accelerates tracking (4.5×) by adaptively using
early layers as compared to SiamFC that always uses the last layer C5. When the early layer is the cheap HOG or pixel layer with fast CPU
speed (270+ fps), we are able to increase the average CPU speed by one order of magnitude and operate at around 100× faster speed for
almost 50% of the time. Our full model EAST operates at near real-time speed 23.2 fps on CPU. On the other hand, it is found the more
reliance on CPU computations will generally increase the CPU speed, but also lose the benefits of GPU speed to some acceptable extent.
C5
C4
C3
C2
C1
HOG
Pixel
C5
C4
C3
C2
C1
HOG
Pixel
Table 1. One-Pass Evaluation (OPE) results of Area Under the
Curve (AUC) score and speed (CPU/GPU fps) on OTB-50 dataset.
frame 50
frame
100
50
150
100
200
150
250
200
300
350
250
400
300
450
Method
EAST-Pixel-HOG
EAST-HOG
EAST-Pixel
EASTlast
EASTth
EAST−ch
EAST−ah
SiamFC [3]
EAST
AUC
0.619
0.628
0.631
0.645
0.597
0.621
0.610
0.612
0.638
Speed
10.7 / 467.3
14.5 / 197.6
19.9 / 223.6
3.4 / 76.3
45.7 / 172.0
21.1 / 137.2
17.4 / 127.6
1.9 / 86
23.2 / 158.9
350
Figure 5. Stopped feature layers for the frames in videos David
(frames 300-770 of the original video) and Tiger2. Easy and hard
frames are marked in green and red.
with deep supervision and does not require an image pyramid to model scale. As a result, it both works better and
faster (in CPU terms) than SiamFC. Interestingly, EASTlast
outperforms EAST but is much slower. This suggests that
our adaptive strategy is slightly hurting accuracy. EASTth
makes use of manually-designed heursitics for stopping,
avoiding the need to predict actions with a Q-Net, making it
2× faster on CPU. However, heuristic policies fail to work
as well as the one learned by Q-learning. Finally, eliminating scoremap and action histories also hurts performance,
likely because such histories stabilize the search process.
OTB-50 results: The OTB-50 [42] benchmark contains
50 video sequences for evaluation. Table 2 compares the
AUC scores of our EAST and the state-of-the-art trackers: TLD [21], GOTURN [18], Struck [16], KCF [19],
DSST [13], MEEM [45], RTT [7], FCNT [40], Staple [2],
HDT [31], HCF [27], LCT [28], SiamFC [3] and SINT [37].
CPU/GPU speeds (fps) are also reported.
EAST achieves the highest AUC of any method. It
does so while being significantly faster. For example, the
runner-up SINT is 4 fps on GPU, while other GPU-based
real-time deep trackers (GOTURN and SiamFC) are significantly slower on a CPU (2-3 fps). When compared to
fast correlation trackers e.g. KCF defined on cheap features,
EAST is significantly more accurate while still maintaining
near-real-time speeds. This is in contrast to correlation filters defined on deep features (HCF and HDF), who are not
real-time even with a GPU. The Staple tracker combines
HOG and color features by a ridge regression, while FCNT
tracks by selecting features from deep layers. EAST outperforms both in terms of accuracy. The Recurrently Targetattending Tracker (RTT) trains Recurrent Neural Networks
(RNNs) to capture attentions as a regularization on correlation filter maps. However, it is noticeably slower and less
accurate than EAST (3 fps on CPU, and an AUC of 0.588).
OTB-100 results: The OTB-100 [43] dataset is the extension of OTB-50 and is more challenging. We test on
the full 100 videos to compare with recent related trackers: RDT [6], SRDCF [12], MDNet [30], C-COT [15],
ECO [10]. Table 3 summarizes their AUC scores and
Table 2. The Area Under the Curve (AUC) score for One-Pass Evaluation (OPE), and speed (fps, * indicates GPU speed, otherwise CPU
speed) on the OTB-50 dataset. The best results are shown in bold.
Method
AUC
Speed
TLD
[21]
0.438
22
GOTURN
[18]
0.450
165*
Struct
[16]
0.474
10
KCF
[19]
0.516
172
DSST
[13]
0.554
24
MEEM
[45]
0.572
10
RTT
[7]
0.588
3
Table 3. The Area Under the Curve (AUC) score for One-Pass
Evaluation (OPE), and speed (fps, * indicates GPU speed, otherwise CPU speed) on the OTB-100 dataset. The best results are
shown in bold.
Method
AUC
Speed
RDT
[6]
0.603
43*
SRDCF
[12]
0.605
5
MDNet
[30]
0.685
1*
C-COT
[15]
0.686
0.3
ECO
[10]
0.694
6
EAST
0.629
23/159*
FCNT
[40]
0.599
3*
Staple
[2]
0.600
80
HDT
[31]
0.603
10*
HCF
[27]
0.605
11*
LCT
[28]
0.612
27
SiamFC
[3]
0.612
86*
SINT
[37]
0.625
4*
EAST
0.638
23/159*
Table 4. Raw scores and speed for our method and the top 4 trackers of the VOT-15 Challenge. The * indicates the speed in EFO
units. The CPU/GPU speeds for our EAST are given.
Tracker
MDNet [30]
EAST
DeepSRDCF [11]
EBT [47]
SRDCF [12]
Accuracy
0.60
0.57
0.56
0.47
0.56
Robustness
0.69
1.03
1.05
1.02
1.24
Overlap
0.38
0.34
0.32
0.31
0.29
Speed (fps)
1
21/148
<1*
5
5
35
30
Overall Rank
DCF
25
20
15
10
EAST
5
0
0
EASTlast
0.2
0.4
0.6
0.8
1
Runtime (EFO/frame)
Figure 6. Overall rank and runtime of our tracker (red) in comparison to the 38 trackers from VOT-14 Challenge. We show the
results of EAST and its two variants that always forward to the first
(i.e. DCF on pixel layer) and last (i.e. EASTlast ) feature layer.
CPU/GPU speeds. EAST is close to state-of-the-art in terms
of accuracy and is the fastest among the top performers
on OTB-100. The MDNet and correlation-filter-based advances SRDCF, C-COT and ECO all suffer from low speed,
while EAST does not sacrifice the run-time performance for
accuracy. RDT is a related Reinforcement Learning (RL)based method that selects the best template to track a given
frame. EAST (which also makes use of RL) proves more
accurate while being 4× faster on a GPU.
VOT-14 results: We test EAST on the 25 videos from
the VOT-14 [23] Tracking Challenge. Fig. 6 compares the
speed and overall rank of EAST to that of the 38 tracker submissions. For the rank computation, the challenge first evaluates the average accuracy and robustness ranking (refer to
the supplementary material for details) for each tracker, and
then averages the two rank values to get the overall rank. As
can be seen from Fig. 6, EAST achieves the best accuracyspeed trade-off, outperforming all competitors in the overall
rank. We also show two EAST variants at the opposite extreme: always forwarding to the first (i.e. DCF [19] on pixel
layer) and last (i.e. EASTlast ) feature layer. Our EAST is
able to adaptively take advantage of the speed and accuracy
benefits of two variants by policy learning.
VOT-15 results: The VOT-15 [22] Tracking Challenge has
60 testing videos chosen from a pool of 356. Trackers are
automatically re-initialized five frames after failure (zero
overlap). Table 4 compares our EAST with the top 4 trackers in terms of accuracy and speed (using the vot2015challenge toolkit). Our testing speed on this benchmark
are 21 fps on CPU and 148 fps on GPU, making EAST the
fastest and most CPU-friendly tracker among the top performers. We achieve comparable accuracy scores to MDNet, while providing a 148× speedup on GPU, indicating
the power of our adaptive policy learning approach.
5. Conclusion
This paper proposes an adaptive approach to tracking
with deep feature cascades. Our fundamental insight is that
most frames in typical tracking scenarios turn out to be easy,
in that simple features (such as pixels or HOG) suffice. That
said, some challenging frames do require “heavy-duty” invariant feature processing. The challenge is in determining which is which! By formulating the tracking problem
as a decision making process, we learn a reinforcementlearning agent that can make such distinctions. Importantly,
the agent learns to do so in an iterative manner, making efficient use of a feature cascade that proceeds to deeper layers only when the current one does not suffice. This dramatically reduces the feed-forwarding cost for those easy
frames (by 100X), leading to an overall significant speedup
for tracking. Such a policy learning method is appealing in
that it is trained end-to-end and can be applied to any deep
network designed for time-critical tasks.
Acknowledgment: This research was supported in part by
NSF grants CNS-1518865, IIS-1618903 and IIS-1526033
and the DARPA grant HR001117C0051. Additional support was provided by the Intel Science and Technology Center for Visual Cloud Systems (ISTC-VCS), Google, and Autel. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and
do not necessarily reflect the view(s) of their employers or
the above-mentioned funding sources.
References
[1] A. Alfvén. Object tracking with compressed networks. Master’s Theses in Mathematical Sciences, Mathematics (Faculty of Technology) and Numerical Analysis, Lund University, 2016.
[2] L. Bertinetto, J. Valmadre, S. Golodetz, O. Miksik, and
P. H. S. Torr. Staple: Complementary learners for real-time
tracking. In CVPR, 2016.
[3] L. Bertinetto, J. Valmadre, J. F. Henriques, A. Vedaldi, and
P. H. S. Torr. Fully-convolutional siamese networks for object tracking. In ECCV, 2016.
[4] D. S. Bolme, J. R. Beveridge, B. A. Draper, and Y. M. Lui.
Visual object tracking using adaptive correlation filters. In
CVPR, 2010.
[5] J. C. Caicedo and S. Lazebnik. Active object localization
with deep reinforcement learning. In ICCV, 2015.
[6] J. Choi, J. Kwon, and K. M. Lee. Visual tracking by reinforced decision making. arXiv preprint, 1702.06291, 2017.
[7] Z. Cui, S. Xiao, J. Feng, and S. Yan. Recurrently targetattending tracking. In CVPR, 2016.
[8] J. Dai, K. He, and J. Sun. Instance-aware semantic segmentation via multi-task network cascades. In CVPR, 2016.
[9] N. Dalal and B. Triggs. Histograms of oriented gradients for
human detection. In CVPR, 2005.
[10] M. Danelljan, G. Bhat, F. S. Khan, and M. Felsberg. ECO:
efficient convolution operators for tracking. In CVPR, 2017.
[11] M. Danelljan, G. Häger, F. S. Khan, and M. Felsberg. Convolutional features for correlation filter based visual tracking.
In ICCV Workshop, 2015.
[12] M. Danelljan, G. Häger, F. S. Khan, and M. Felsberg. Learning spatially regularized correlation filters for visual tracking. In ICCV, 2015.
[13] M. Danelljan, G. Hger, F. Shahbaz Khan, and M. Felsberg.
Accurate scale estimation for robust visual tracking. In
BMVC, 2014.
[14] M. Danelljan, F. S. Khan, M. Felsberg, and J. v. d. Weijer.
Adaptive color attributes for real-time visual tracking. In
CVPR, 2014.
[15] M. Danelljan, A. Robinson, F. Shahbaz Khan, and M. Felsberg. Beyond correlation filters: Learning continuous convolution operators for visual tracking. In ECCV, 2016.
[16] S. Hare, A. Saffari, and P. H. S. Torr. Struck: Structured
output tracking with kernels. In ICCV, 2011.
[17] B. Hariharan, P. Arbelez, R. Girshick, and J. Malik. Hypercolumns for object segmentation and fine-grained localization. In CVPR, 2015.
[18] D. Held, S. Thrun, and S. Savarese. Learning to track at 100
fps with deep regression networks. In ECCV, 2016.
[19] J. F. Henriques, R. Caseiro, P. Martins, and J. Batista. Highspeed tracking with kernelized correlation filters. TPAMI,
37(3):583–596, 2015.
[20] S. E. Kahou, V. Michalski, and R. Memisevic. RATM: recurrent attentive tracking model. In CVPRW, 2017.
[21] Z. Kalal, K. Mikolajczyk, and J. Matas. Tracking-learningdetection. TPAMI, 34(7):1409–1422, 2012.
[22] M. Kristan, J. Matas, A. Leonardis, M. Felsberg, L. Čehovin,
G. Fernandez, T. Vojir, G. Häger, G. Nebehay, and
R. Pflugfelder. The visual object tracking VOT2015 challenge results. In ICCV 2015 Workshop, 2015.
[23] M. Kristan, R. Pflugfelder, A. Leonardis, J. Matas, L. Cehovin, G. Nebehay, T. Vojir, G. Fernandez, A. Lukezic, and
A. Dimitriev. The visual object tracking VOT2014 challenge
results. In ECCV 2014 Workshop, 2014.
[24] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
NIPS, 2012.
[25] C.-Y. Lee, S. Xie, P. W. Gallagher, Z. Zhang, and Z. Tu.
Deeply-supervised nets. In AISTATS, 2015.
[26] Y. Li and J. Zhu. A scale adaptive kernel correlation filter
tracker with feature integration. In ECCV Workshop, 2014.
[27] C. Ma, J.-B. Huang, X. Yang, and M.-H. Yang. Hierarchical
convolutional features for visual tracking. In ICCV, 2015.
[28] C. Ma, X. Yang, C. Zhang, and M.-H. Yang. Long-term
correlation tracking. In CVPR, 2015.
[29] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness,
M. G. Bellemare, A. Graves, M. Riedmiller, and A. K. Fidjeland et al. Human-level control through deep reinforcement
learning. Nature, 518(7540):529–533, 2015.
[30] H. Nam and B. Han. Learning multi-domain convolutional
neural networks for visual tracking. In CVPR, 2016.
[31] Y. Qi, S. Zhang, L. Qin, H. Yao, Q. Huang, J. Lim, and M.-H.
Yang. Hedged deep tracking. In CVPR, 2016.
[32] D. A. Ross, J. Lim, R.-S. Lin, and M.-H. Yang. Incremental
learning for robust visual tracking. IJCV, 77(1-3):125–141,
2008.
[33] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh,
S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein,
A. C. Berg, and L. Fei-Fei. ImageNet Large Scale Visual
Recognition Challenge. IJCV, 115(3):211–252, 2015.
[34] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. In ICLR, 2015.
[35] Y. Sun, X. Wang, and X. Tang. Deep convolutional network
cascade for facial point detection. In CVPR, 2013.
[36] R. Sutton and A. Barto. Reinforcement Learning: An introduction. MIT Press, 1998.
[37] R. Tao, E. Gavves, and A. W. M. Smeulders. Siamese instance search for tracking. In CVPR, 2016.
[38] A. Vedaldi and K. Lenc. Matconvnet: Convolutional neural
networks for matlab. In ACM MM, 2015.
[39] P. Viola and M. Jones. Rapid object detection using a boosted
cascade of simple features. In CVPR, 2001.
[40] L. Wang, W. Ouyang, X. Wang, and H. Lu. Visual tracking
with fully convolutional networks. In ICCV, 2015.
[41] N. Wang, S. Li, A. Gupta, and D. Yeung. Transferring rich
feature hierarchies for robust visual tracking. arXiv preprint,
1501.04587, 2015.
[42] Y. Wu, J. Lim, and M.-H. Yang. Online object tracking: A
benchmark. In CVPR, 2013.
[43] Y. Wu, J. Lim, and M. H. Yang. Object tracking benchmark.
TPAMI, 37(9):1834–1848, 2015.
[44] D. Zhang, H. Maei, X. Wang, and Y.-F. Wang. Deep reinforcement learning for visual object tracking in videos. arXiv
preprint, 1701.08936, 2017.
[45] J. Zhang, S. Ma, and S. Sclaroff. MEEM: robust tracking
via multiple experts using entropy minimization. In ECCV,
2014.
[46] K. Zhang, L. Zhang, Q. Liu, D. Zhang, and M.-H. Yang. Fast
visual tracking via dense spatio-temporal context learning. In
ECCV, 2014.
[47] G. Zhu, F. Porikli, and H. Li. Tracking randomly moving
objects on edge box proposals. arXiv preprint, 1507.08085,
2015.
Table 5. Network architecture and convolutional layer specifics.
Supplementary Material
Layer
A. Algorithmic Details
Network architecture: We use the exact convolutional architecture of SiamFC [3]. The convolutional layers C1−C5
and their parameter details are given in Table 5. Note maxpooling is employed for the convolutional layers C1 and
C2. We use the nonlinear ReLU function [24] after every
convolutional layer except for C5. Batch normalization is
inserted after every linear layer.
Deep Q-learning: During deep Q-learning [29], the optimal action-value function Q(Sl , Al ) obeys the Bellman
equation: it is optimal to select the action A0 that maximizes
the expected reward
Q(Sl , Al ) = R + γ max
Q(S 0 , A0 ),
0
A
0
C1
C2
C3
C4
C5
Input
conv1
pool1
conv2
pool2
conv3
conv4
conv5
Support
Stride
11×11
3×3
5×5
3×3
3×3
3×3
3×3
2
2
1
2
1
1
1
Method
LCT
[28]
0.612
0.594
0.518
27
AUC-OPE
AUC-TRE
AUC-SRE
Speed
0
A
(6)
The gradient of this loss function with respect to the network weights θl is as follows:
h
0
0
Q(S
,
A
;
θ
)
−
Q(S
,
A
;
θ
)
∇θl V (θl ) = E R + γ max
l−1
l
l
l
A0
i
·∇θl Q(Sl , Al ; θl ) .
(7)
B. Discussions and Results
The main idea of our EArly-Stopping Tracker (EAST) is
to track easy frames using only early layers of a deep feature
cascade, e.g. pixel values, while hard frames are processed
with invariant but expensive deep layers when needed.
An attached video demo.mp4 exemplifies such tracking
policies in video sequences. To further validate the advantages of EAST in both accuracy and speed, we compare
with the top 3 trackers on OTB-50 [42] in terms of speed,
and AUC score for One-Pass Evaluation (OPE), Temporal
Robustness Evaluation (TRE) and Spatial Robustness Evaluation (SRE). Table 6 shows that EAST achieves the highest
scores under all evaluation metrics, while maintaining fast
tracking speed.
Table 7 shows the detailed ranks of accuracy RA and robustness RR under baseline and region noise experiments
in VOT-14 challenge. The two experiments evaluate trackers with the initial target location from ground truth and that
perturbed with random noises. The table also lists the overall rank Ro and running speed to compare EAST with the
best 3 trackers out of 38 submitted ones. It is evident that
Search
activation
255×255
123×123
61×61
57×57
28×28
26×26
24×24
22×22
Chans.
3
96
96
256
256
192
192
128
Table 6. The Area Under the Curve (AUC) score for One-Pass
Evaluation (OPE), Temporal Robustness Evaluation (TRE) and
Spatial Robustness Evaluation (SRE), and speed (fps, * indicates
GPU speed, otherwise CPU speed) on the OTB-50 dataset. The
best results are shown in bold.
(5)
where Q(S , A ) is the future reward and γ the discount factor. Since the action-value function is approximated by a QNet with weights θ, the Q-Net can be trained by minimizing
the loss function V (θl ) at each iteration l,
2
0
0
V (θl ) = E R + γ max
Q(S
,
A
;
θ
)
−
Q(S
,
A
;
θ
)
.
l−1
l
l l
0
Template
activation
127×127
59×59
29×29
25×25
12×12
10×10
8×8
6×6
SiamFC
[3]
0.612
0.621
0.554
86*
SINT
[37]
0.625
0.643
0.579
4*
EAST
0.638
0.662
0.591
23/159*
Table 7. The accuracy RA , robustness RR and average R ranks
under baseline and region noise experiments in VOT-14. Ro is the
overall (averaged) ranking for both experiments, which is used to
rank the 38 trackers in the main paper. Our CPU/GPU speeds are
reported in fps, while the speeds for the top 3 trackers are in EFO
units, which roughly correspond to fps (e.g. the speed of the NCC
baseline is 140 fps and 160 EFO).
Tracker
EAST
DSST
SAMF
KCF
RA
4.95
5.41
5.30
5.05
baseline
RR
5.42
11.93
13.55
14.60
R
5.19
8.67
9.43
9.82
region noise
RA
RR
R
5.11 4.73 4.92
5.40 12.33 8.86
5.24 12.30 8.77
5.17 12.49 8.83
Ro
5.06
8.77
9.10
9.33
Speed
22/155
7.66
1.69
24.23
EAST is one of the fastest trackers, while outperforming
other top performers in the overall rank.
Template Update
It is worth noting that, in our feature cascade we explore the pixel and HOG layers before expensive deep layers. When processing the cheap pixel and HOG layers, we
make use of fast correlation filters [19]. A correlation filter
w with the same size of image patch x is learned by solving
the Ridge Regression loss function
X
2
min
wT xi − yi + λkwk2 ,
(8)
w
i
where yi is the target response value, and λ is the regularization parameter.
Solving this loss function is fast due to the efficient use
of all shifted patches xi by exploiting the discrete Fourier
transform. Besides fast speed, the correlation filter has another benefit of updating the template w over time. However, this adaptive merit is not preserved for deep layers.
Recall that for the deep convolutional layers C1 − C5, we
AUC
0.641
EAST
0.638
0.635
C1
C2
C3
C4
C5
Layer
Figure 7. The Area Under the Curve (AUC) score for One-Pass
Evaluation (OPE) of template update for deep layers C1 − C5.
follow SiamFC [3] to compute the similarity of a template
image z to all translated regions in search image x by
Fl (z, x) = ϕl (z) ∗ ϕl (x) + vI,
(9)
where ϕl is the convolutional feature embedding at layer l,
and v ∈ R is an offset value.
Here ϕl (z) can be treated as the convolutional template
to compute the target responses, but is fixed to ϕl (zt=1 )
from the first frame and is never updated during tracking.
Then a question naturally arises: can we improve the performance by updating the template for deep layers?
To this end, we conduct the following experiment on
OTB-50: we simply update ϕl (zt ) as ϕl (zt−1 ) from the
previous frame, and record the accuracy if we separately
update the convolutional layer l from C1−C5. Fig.7 shows
the AUC score when we update the template for each deep
layer. Marginal gains are obtained on lower layers C1−C2,
suggesting that they are less invariant and so would need to
be updated more often. On the other hand, updating the top
layer C5 leads to no difference, which is actually in line
with the observations by SiamFC [3] that always uses this
invariant top layer for tracking. In the future, we can consider how to learn to update template online rather than just
use the previous frame. Another promising direction is to
further speedup the deep convolutional process by adopting
the Fourier transform techniques.
| 1cs.CV
|
arXiv:1608.04809v1 [math.GR] 16 Aug 2016
GENERALIZING THE FUTURAMA THEOREM
J. ELDER AND O. VEGA
Abstract. The 2010 episode of Futurama titled The Prisoner of Benda centers around a machine that swaps the brains of any two people who use it.
The problem is, once two people use the machine to swap brains with each
other, they cannot swap back.
In this article, we present a new proof of this theorem and also a generalization of it to what would happen if, instead, the machine swapped cyclically
the brains of p characters, where p is prime.
1. Introduction
In the 2010 Writers Guild Award-winning episode of Futurama, The Prisoner of
Benda [5], Professor Farnsworth and Amy build a machine that can swap the brains
of any two people. The two use the machine to swap brains with each other, but
then discover that once two people have swapped with each other, the machine does
not swap them back. More characters get involved until the group is thoroughly
mixed up, and they start looking for ways to return to their own heads.
Clearly, the problem of undoing what the machine has done may be studied using
permutations; each brain swap can be described by a transposition in Sn , where
n is the number of characters involved in the brain-swapping. Hence, the problem
consists in writing the inverse of a permutation as a product of transpositions that
(1) are all distinct, and (2) were not already used in constructing the original
permutation.
The solution given in the episode relies on involving two additional people; these
two characters were not involved in any of the original swaps, and so have no
restrictions on who they can swap with now. For example, using the additional
people x and y, we have
(1 2)−1 = (x y)(2 x)(1 y)(2 y)(1 x)
Note that the transpositions used in the product above are all distinct, and that
none of them is an element of S2 , which is where the original element (1 2) was
taken from. This can be done in general for any permutation, and leads to the
following theorem.
Theorem 1 (Keeler, 2010). Let n ∈ N, n ≥ 2. The inverse of any permutation in
Sn can be written as a product of distinct transpositions in Sn+2 \ Sn .
2010 Mathematics Subject Classification. Primary 20B30; Secondary 20F05.
Key words and phrases. Permutations, products of cycles, Futurama.
The first author thanks the support of the Division of Graduate Studies at California State
University, Fresno in the form of the Robert & Norma Craig Graduate Scholarship and also for
travel support. She would also like to thank the College of Science and Mathematics at California
State University, Fresno for travel support.
1
Although Ken Keeler (writer and executive producer for Futurama at the time)
never published the proof of his theorem, the proof given in the episode as well as a
write up of the idea may be found in [3]. This was, most probably, the first time in
which a theorem was proved for the purpose to advance the narrative of a TV show,
and thus it was all over the internet [1, 4, 7] and was also mentioned in books, such
as Simon Singh’s The Simpsons and Their Mathematical Secrets [6]. Of course,
this aroused the interest of mathematicians (the authors of this article included),
and so in 2014, Evans, Huang, and Nguyen [2] proved that Keeler’s solution to the
problem is optimal in the sense that it uses the minimal number of cycles and the
minimal number of additional elements. In that article, they also gave necessary
and sufficient conditions on m and n for the identity permutation to be expressible
as a product of m distinct transpositions in Sn .
Although in the title of this article we used The Futurama Theorem, for the
remainder of this work we will refer to Theorem 1 as Keller’s Theorem.
2. Reproving Keeler’s Theorem
We want to reprove Keeler’s Theorem using a different, and possibly less optimal,
method. The goal is to present a method that can be generalized to larger cycles
in Sn . As in Keeler’s proof, we will need additional elements that could not have
been used in the permutation we wish to work with.
As expected, we will first study how to write the inverse of a cycle using ‘new’
transpositions to later putting all this together using that every permutation can
be written as the product of disjoint cycles.
Definition 2. Fix n ∈ N and let x, y ∈ N be such that x, y ≫ n. We consider the
set that we will use to define the elements of Sn+2 to be {1, 2, . . . , n, x, y}.
Throughout this paper, we will consider, without loss of generality, the k-cycle
(1 2 · · · k) instead of a generic k-cycle. We start by setting some notation.
Definition 3. Let m ∈ N such that m is odd and m ≤ n − 2. And let δm ∈ Sn+2
be defined as
m
Y
(i + 1 y)(i + 2 y)(i x)(i + 1 x).
δm =
i=1
i odd
Notice that δm , for any 1 ≤ m, will not contain any repeated transpositions. In
fact, every number 1 ≤ j ≤ m will appear at most twice in the product: once in
(j x) and once in (j y). Also, we can see that (x y) is not in the product.
Lemma 4. Let k ≥ 7 be odd and such that k ≡ 1 (mod 3). If σ is a k-cycle then
σ −1 = δk−2 .
Proof. We write k = 1 + 6t, for t ∈ N. We will prove the result by induction on t.
For t = 1, we get:
(1 2 3 4 5 6 7)−1 = (6 9)(7 9)(5 8)(6 8)(4 9)(5 9)(3 8)(4 8)(2 9)(3 9)(1 8)(2 8) = δ5
We now assume the result for all k-cycles, where k = 1 + 6s and s < t. Now let
σ be a j-cycle, where j = 1 + 6t. We let k = j − 6 and write
(2.1)
(1 2 · · · j)−1 = (j − 6 j − 5 j − 4 j − 3 j − 2 j − 1 j)−1 (1 2 · · · k)−1
From the induction hypothesis, we get
(1 2 · · · k)−1 = δj−8 ,
2
and from the base case we get
(j − 6 j − 5 j − 4 j − 3 j − 2 j − 1 j)−1 =
j−2
Y
(i + 1 y)(i + 2 y)(i x)(i + 1 x).
i=j−6
i odd
Putting all this together in Equation (2.1) yields:
j−2
Y
(1 2 · · · j)−1 =
(i + 1 y)(i + 2 y)(i x)(i + 1 x) δj−8 = δj−2 ,
i=j−6
i odd
which is what we wanted to obtain.
We will use this lemma to prove all remaining cases. First for k odd.
Lemma 5. Let k be an odd number and σ be a k-cycle.
1. If k ≥ 5 and k ≡ 2 (mod 3), then σ −1 = (x y)(k − 2 x)(k − 1 x)(k x)δk−4 .
2. If k ≥ 3 and k ≡ 0 (mod 3), then σ −1 = (x y)(k x)δk−2 .
Proof. Let k be an odd number and σ be a k-cycle.
1. For k = 5, we see that
(1 2 3 4 5)−1 = (6 7)(3 6)(4 6)(5 6)(2 7)(3 7)(1 6)(2 6)
For k > 5 and k ≡ 2 (mod 3), we write
(1 2 . . . k) = (1 2 . . . k − 4)(k − 4 k − 3 k − 2 k − 1 k)
Since k − 4 is odd and k − 4 ≡ 1 (mod 3) we use Lemma 4 to get the
desired result.
2. For k = 3, we have
(1 2 3)−1 = (4 5)(3 4)(2 5)(3 5)(1 4)(2 4),
and when k > 3 and k ≡ 0 (mod 3), we know that k − 2 ≡ 1 (mod 3), with
k − 2 odd. Hence
(1 2 . . . k) = (1 2 . . . k − 2)(k − 2 k − 1 k).
At this point we use Lemma 4 to get the desired result.
Now we will proceed in a similar manner for the cases where k is even.
Lemma
1. If
2. If
3. If
6. Let k be a positive even number, and σ be a k-cycle.
k ≥ 6 and k ≡ 0 (mod 3), then σ −1 = (k y)(k − 1 x)(k x)δk−3 .
k ≥ 4 and k ≡ 1 (mod 3), then σ −1 = (x y)(k − 1 x)(k x)δk−3 .
k ≥ 8 and k ≡ 2 (mod 3), then
σ −1 = (k − 2 y)(k − 1 y)(k y)(k − 3 x)(k − 2 x)δk−5 .
Proof. Let k be even, and σ be a k-cycle.
1. For k = 6, we see that
(1 2 3 4 5 6)−1 = (6 8)(5 7)(6 7)(4 8)(5 8)(3 7)(4 7)(2 8)(3 8)(1 7)(2 7)
For k > 6, and k ≡ 0 (mod 3), we write
(1 2 . . . k) = (1 2 . . . k − 5)(k − 5 k − 4 k − 3 k − 2 k − 1 k)
Since k − 5 is odd and k − 5 ≡ 1 (mod 3) we can use Lemma 4 to get the
desired result
3
2. For k = 4, we have
(1 2 3 4)−1 = (5 6)(3 5)(4 5)(2 6)(3 6)(1 5)(2 5)
and when k > 4 and k ≡ 1 (mod 3), we know that k − 3 ≡ 1 (mod 3),
k − 4 is odd. Hence
(1 2 . . . k) = (1 2 . . . k − 3)(k − 3 k − 2 k − 1 k)
At this point we use Lemma 4 to get the desired result.
3. For k = 8,
σ −1 = (6 y)(7 y)(k y)(5 x)(6 x)δ3
When k > 8 and k ≡ 2 (mod 3), we write
(1 2 . . . k) = (1 2 . . . k − 7)(k − 7 . . . k − 1 k)
Since k − 7 ≡ 1 (mod 3), we use Lemma 4 to get the desired result.
Remark 7. Lemmas 4, 5, and 6 allow us to write any given k-cycle as a product
of transpositions. Moreover, such products consist of transpositions that are all
distinct from each other, and each one of these 2-cycles is an element in Sn+2 \ Sn .
Finally, given a permutation σ ∈ Sn , we write its inverse as a product of disjoint
cycles, σ −1 = σ1 σ2 · · · σr , and then we write each σi as a product of transpositions
in Sn+2 \ Sn using Lemmas 4, 5, and 6. It is easy to see that the only transposition
that could appear more than once in this product is (x y). In this case, each (x y)
would appear at the beginning of a product representing a σi (see Lemmas 5 and
6), but this situation is easy to fix as if τ is a permutation in Sn+2 \ Sn then the
conjugation (x y)τ (x y) yields a permutation that is equal to τ where all the xs
and the ys have been exchanged. Keeler’s Theorem follows.
3. Products of larger cycles
Now we are interested in learning what would happen if Professor Farnsworth
and Amy had created a machine that swapped several brains in a cyclical way. For
example, the machine would do
Professor −→ Amy −→ Bender −→ Leela −→ Fry −→ Professor
The problem of undoing what the machine does in the example above would be
easy if the machine did not have any ‘issues’ and worked even when a set of five
people sat in the machine for a second time; we could use that (1 2 3 4 5)−1 =
(5 4 3 2 1) or that (1 2 3 4 5)−1 = (1 2 3 4 5)4 to solve the problem. That
would be too easy, there would be no TV network that would broadcast an episode
featuring such a simple problem/solution (the existence of the show Scooby-Doo
may go against this premise). Hence, to make this interesting, we will assume that
the machine does not always work when a set of people who have already sat in the
machine sits in it again. Our restriction will be technical, and so we will phrase it
explicitly in the statement of our results.
So, for the rest of this article, we will assume that we are working with a machine
that swaps cyclically the brains of p people at a time, where p is an odd prime.
Note that now, in terms of permutations, our problem will reside in An , as the
brain-swapping machine yields an odd cycle every time it functions.
We will start our study with what will end up being a special case: p = 3.
4
Products of 3-cycles. It turns out that, in this case, we only need one extra
character to undo the mess created by the machine.
Lemma 8. Let n ∈ N, n > 2, and let σ ∈ An be an odd cycle. Then, σ −1 can be
written as a product of 3-cycles
σ −1 = τ1 τ2 · · · τt
where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. For k = 3 we get (1 2 3) = (x 3 1)(x 1 2), and for every 3 > k ≤ n, k odd,
and x ≫ n, consider the product
(1 2 · · · k − 1 k) = (x k 1)(x k − 2 k − 1) · · · (x 3 4)(x 1 2).
The result is now immediate, as the inverse of any odd cycle is also an odd cycle,
and the 3-cycles used in the products considered all fix different sets of elements.
Lemma 9. Let α, β ∈ Sn , n > 2, be two disjoint even cycles. Then, (αβ)−1 can
be written as a product of 3-cycles
(αβ)−1 = τ1 τ2 · · · τt ,
where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. Let β −1 = (a1 a2 · · · ar ) and α−1 = (b1 b2 · · · bs ) be two disjoint cycles,
where r and s are even. Note that (αβ)−1 = β −1 α−1 ∈ An can be written as
β −1 α−1 = (a1 a2 )(b1 b2 ) (a2 a3 · · · ar )(b2 b3 · · · bs )
= (b2 b1 x)(b1 a2 x)(a2 a1 x)(a1 b1 x) (a2 a3 · · · ar )(b2 b3 · · · bs ).
Note that the last two cycles in the product are odd, and thus we can write them
as a product of 3-cycles, as indicated in Lemma 8. It is easy to see now that (αβ)−1
can be written as claimed.
The previous two lemmas indicate that we should only need one extra person to
undo whatever chaos the 3-brain-swapping machine might have created. We make
this result explicit in the following theorem.
Theorem 10. Let σ ∈ An , n > 2. Then, σ −1 can be written as a product of 3-cycles
σ −1 = τ1 τ2 · · · τt ,
where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. Given σ ∈ An , we know we can write σ −1 as a product of disjoint cycles.
Moreover, after rearrangement (if needed) we can put all the appearing even cycles
(if any) in pairs. Hence, Lemmas 8 and 9 guarantee the desired factorization of
σ −1 .
Products of p-cycles, p > 5. In order to give an answer to what would happen if
the machine now swapped p brains cyclically, where p is a prime larger than three,
we need to set some notation first.
Fix n, p ∈ N, where p > 3 is prime and n > 2. Then, we define the following
ordered lists of numbers
[x]n,p = x1 x2 . . . xp−3
[x]−1
n,p = xp−3 . . . x2 x1
5
where xi ≫ n, for all i = 1, 2, . . . , p − 3. We will use these lists to write cycles. For
example (1 2 [x]3,7 ) = (1 2 x1 x2 x3 x4 ), where x1 , x2 , x3 , x4 ≫ 3.
Theorem 11. Let n ∈ N and p be a prime such that p > 3 and n > 2. If σ ∈ An ,
then, σ −1 can be written as a product of p-cycles
σ −1 = τ1 τ2 · · · τt ,
where τi ∈ An+(p−3) \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. We will first prove that every element σ ∈ An can be written as a product
of p-cycles, then we will prove that the factors used satisfy the conditions claimed
in the theorem.
We know that every element in An can be written as a product of odd cycles
and an even number of even cycles. We will first deal with odd cycles. For k = 3
we can write
(1 2 3) = (1 3 2 [x]−1
n,p )(2 1 3 [x]n,p ),
and so we need p − 3 new elements to write a 3-cycle as a product of p-cycles. For
k > 3 we know that every k-cycle in An can be written as a product of k−1
2 distinct
3-cycles as follows:
(3.1)
(a1 a2 · · · ak ) = (a1 a2 a3 )(a3 a4 a5 ) · · · (ak−2 ak−1 ak ).
So, if σ ∈ An is a k-cycle with k > 3, then we write it as in Equation (3.1). After
that we write each of the 3-cycles in that product as a product of two p-cycles, as
discussed in the case k = 3 above. Hence, we can write σ as a product of p-cycles
by incorporating p − 3 new elements.
For products of two even cycles we let σ = (a1 a2 · · · ar ) and τ = (b1 b2 · · · bs ),
where r and s are even. Note that στ ∈ An can be written as
στ = (a1 a2 )(b1 b2 ) (a2 a3 · · · ar )(b2 b3 · · · bs )
−1
= (b2 b1 a2 [x]n,p
)(a2 a1 b1 [x]n,p ) (a2 a3 · · · ar )(b2 b3 · · · bs )
where the first two cycles need p − 3 new elements to have length p, and all the
other cycles involved are odd, and thus can be written as products of p-cycles.
In order to see that all the p-cycles obtained in the final product describing σ −1
generate distinct subgroups of An+(p−3) we notice that, in the majority of the cases,
a pair of these p-cycles will not ‘move’ the same p elements, and thus the groups
they generate would intersect trivially. Thus, the only case that should be analyzed
is when we get two cycles of the form τ1 = (1 3 2 [x]−1
n,p ) and τ2 = (2 1 3 [x]n,p ).
In this case, if we assumed that these elements generate the same subgroups then
τ2i = τ1 , for some i. However, if we look at τ2i (2) we can see that the only possibility
for τ2i = τ1 to happen would be when i = p − 1, but it is easy to see that τ2p−1 =
τ2−1 6= τ1 . This finishes the proof.
We conclude that as long as the brain-swapping machine Professor Farnsworth
and Amy build swaps a prime number of brains cyclically, they can always fix the
chaos created by incorporating enough extra characters to the mix.
References
[1] Casey Chan, Futurama writer invented a new math theorem just to use in the show (2010)
http://gizmodo.com/5618502/futurama-writer-invented-a-new-math-theorem-just-to-use-in-the-show.
[2] Ron Evans, Lihua Huang, Tuan Nguyen, Keeler’s theorem and products of distinct transpositions, Amer. Math. Monthly 121 (2014) 136–144.
6
[3] Hristo Georgiev, The Futurama theorem explained. The Commutator 2 (2010) 18–20.
[4] Tony Phillips, Math in the Media, Amer. Math. Soc., Original math on Futurama (2010),
http://www.ams.org/news/math-in-the-media/10-2010-media.
[5] Previous Nominees & Winners of the Writers Guild Awards (last accessed on 08/15/16).
http://awards.wga.org/wga-awards/previous-nominees-winners.
[6] Simon Singh, The Simpsons and Their Mathematical Secrets. Bloomsbury, NY, 2013.
[7] The prisoner of Benda. The Infosphere, the Futurama Wiki (last accessed on 08/15/16).
http://theinfosphere.org/The_Prisoner_of_Benda.
Department of Mathematics. Arizona State University. Tempe, AZ 85287.
E-mail address: Jennifer.E.Elder@asu.edu
Department of Mathematics. California State University, Fresno.
93740.
E-mail address: ovega@csufresno.edu
7
Fresno, CA
| 4math.GR
|
Strong converse for the feedback-assisted classical capacity of
entanglement-breaking channels
arXiv:1506.02228v4 [quant-ph] 3 Nov 2017
Dawei Ding∗
Mark M. Wilde†
November 7, 2017
Abstract
Quantum entanglement can be used in a communication scheme to establish a correlation
between successive channel inputs that is impossible by classical means. It is known that the
classical capacity of quantum channels can be enhanced by such entangled encoding schemes,
but this is not always the case. In this paper, we prove that a strong converse theorem holds
for the classical capacity of an entanglement-breaking channel even when it is assisted by a
classical feedback link from the receiver to the transmitter. In doing so, we identify a bound on
the strong converse exponent, which determines the exponentially decaying rate at which the
success probability tends to zero, for a sequence of codes with communication rate exceeding
capacity. Proving a strong converse, along with an achievability theorem, shows that the classical
capacity is a sharp boundary between reliable and unreliable communication regimes. One of
the main tools in our proof is the sandwiched Rényi relative entropy. The same method of proof
is used to derive an exponential bound on the success probability when communicating over an
arbitrary quantum channel assisted by classical feedback, provided that the transmitter does
not use entangled encoding schemes.
1
Introduction
The classical theory of communication is one of the modern successes of applied mathematics [CT91,
GK12]. It is arguably one of the foundations of our current information age and provides new ways
of thinking about problems in many other fields of study, such as physics and in particular quantum
mechanics. The interaction between these two fields is mutual; while some problems in quantum
mechanics can be turned into communication problems, the existence of quantum phenomena
strongly suggests that we should rethink many aspects of communication theory. Not only does
the notion of a quantum state challenge what we mean by “information,” but the possibilities due
to quantum mechanics give rise to new classes of communication protocols. With respect to this
latter consideration, some fundamental motivating questions for quantum information theory have
traditionally been and still are the following:
1. Is the theory of classical communication affected at a fundamental level by the consideration
of quantum mechanical phenomena?
∗
Department of Applied Physics, Stanford University, Stanford, California 94305-4090, USA
Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Center for Computation and
Technology, Louisiana State University, Baton Rouge, Louisiana 70803, USA
†
1
2. Does using quantum states and measurement for classical communication have practical advantages over using classical techniques?
In an attempt to answer these questions, one of the primary goals is to study the ability of a
quantum channel to communicate classical information, that is, bits. Like many communication
problems, this ability is quantified by the notion of channel capacity. The classical capacity C
of a quantum channel N is defined to be the maximum rate of communication such that the
decoding error probability can tend to zero in the limit of many channel uses. With this definition,
one natural question is to determine how to compute the classical capacity. We know that the
Holevo-Schumacher-Westmoreland (HSW) theorem [Hol98, SW97] provides a lower bound:
CpN q ě χpN q ”
sup
IpX; Bqρ ,
(1.1)
tpX pxq,ρx u
where tpX pxq, ρx u is an ensemble of quantum states such that each ρx can be input to the channel,
and IpX; Bqρ ” HpXqρ ` HpBqρ ´ HpXBqρ is the quantum mutual information of the following
classical-quantum state:
ÿ
ρXB ”
pX pxq|xyxx|X b N pρx q,
(1.2)
x
where t|xyu is an orthonormal basis for the classical reference system and HpGqσ is the von Neumann
entropy of a quantum state σG on system G. The quantity χpN q is called the Holevo information
of the channel.
The classical capacity CpN q can actually be formally rewritten in terms of the Holevo information as well, via a procedure known as regularization. Before doing so, note that we obtain the
HSW theorem by considering only encoding procedures that do not use entangled inputs1 . That
is, each quantum system sent through the channel is not entangled with any other system that is
sent. To get the classical capacity, it is generally necessary to incorporate entangled inputs into
the calculation. The approach given by [Hol98, SW97] is to multiplex the channel such that one
use of this multiplexed channel corresponds to multiple uses of the original channel. A multipartite
entangled state describing several inputs across different uses of the original channel can now be
simulated by the corresponding single input state to the multiplexed channel. We can therefore
express the maximum rate for blocks of size n in terms of a Holevo information:
1
χpN bn q.
n
(1.3)
To obtain the classical capacity, we simply allow for inputs entangled across arbitrarily many
channel uses:
1
CpN q “ lim χpN bn q.
(1.4)
nÑ8 n
This idea put together with a converse theorem establishes the regularized expression in (1.4) as
being equal to the classical capacity.
Unfortunately, computing the classical capacity this way is clearly intractable. This prompts
us to look for special cases. We observe that the limit in (1.4) is equal to χpN q iff the Holevo
information satisfies a tensor-power additivity property (see Appendix A for a brief derivation):
@n
χpN bn q “ nχpN q.
1
(1.5)
The highest possible rate with this restriction, proven by the HSW theorem to be χpN q, is then a lower bound
on the classical capacity.
2
Another way to restate the above is that entangled inputs do not increase capacity iff (1.5) is
satisfied. However, this is not true for some channels, as was shown in [Has09]. The next question
then appears: What characterizes channels that satisfy (1.5)?
A sufficient condition for a quantum channel to satisfy tensor-power additivity is for it to be
entanglement-breaking (EB) [HSR03]. Let NAÑB denote a quantum channel, where the arrow
notation indicates that the channel maps a state of the input system A to a state in an output
system B. An EB channel is defined such that for any bipartite state ρAA1 , the output state
pNAÑB b idA1 q pρAA1 q
(1.6)
is separable. That is, the output of an EB channel can be written as a convex sum of product
states. Effectively, the channel “breaks” the entanglement between A and A1 . Previous results have
established that the Holevo information of EB channels is additive2 [Sho02]. This is intuitive since
any entanglement of the inputs is broken by the channel. Following this line of thinking, one could
consider making a stronger statement by allowing additional resources to assist the communication
but not to the point that entanglement can be established. Indeed, [BN05] proves a generalization
of tensor-power additivity for EB channels with noiseless classical feedback. Furthermore, their
results show that classical feedback does not increase the capacity of EB channels.
There are also possible stronger statements in another direction. The direct part of the original
HSW theorem states that if the rate R of communication is less than the Holevo information χ,
then there exists a sequence of protocols P n such that the probability of error for such a sequence
satisfies
lim pe pnq “ 0,
(1.7)
nÑ8
where n is the number of channel uses. A result from [Hay07] sharpens this claim by showing that
there exists a sequence P n such that
pe pnq ď 2´kn ,
(1.8)
for some k ą 0 determined by the channel. The converse part of the original HSW theorem can be
strengthened in a similar manner. It states that if R ą CpN q, for any sequence of protocols P n ,
then
lim pe pnq ą 0.
(1.9)
nÑ8
This is known as the weak converse. In contrast, a strong converse is symmetric to the achievability
result above and states that regardless of the protocols used, the success probability decreases to
zero in the asymptotic limit whenever R ą CpN q. The strong converse can be sharpened as well
whenever there is a constant separation between R and CpN q, such that the convergence of the
success probability to zero is exponential in n.
There are many reasons why we would want to prove a strong converse. First, a strong converse
enriches our understanding of the capacity. A strong converse along with an achievability theorem shows that the capacity is a sharp boundary between reliable and unreliable communication
regimes. This, amongst other results, indicates that the classical capacity of a quantum channel
is a fundamental quantity of interest. Second, a strong converse is more relevant in practice than
is the weak converse. A realistic quantum communication scheme has a finite blocklength; that is,
2
Shor proved that the Holevo information of a tensor product of an EB channel with any other channel is equal to
the sum of their respective Holevo informations. This form of additivity is stronger than (1.5) and is the one usually
found in the literature.
3
the encoding is across a finite number of channel uses. Although the weak converse does provide a
lower bound on the probability of error in the non-asymptotic regime, the strong converse improves
the bound considerably. It expresses a trade-off between rate, error probability, and blocklength
restrictive enough to be easily checked numerically or experimentally.
While a classical version of the strong converse is known for arbitrary discrete memoryless
classical channels [Wol78, Ari73], it is still open whether or not strong converses hold for memoryless
quantum channels. After some early work [ON99, Win99], the strong converse has been proved for
special cases, in particular for channels with certain symmetry [KW09], for EB channels [WWY14],
and for a wide class of quantum Gaussian channels [BGPWW15]. Given the strong converse
results for EB channels [WWY14] and the weak converse for EB channels with feedback [BN05],
it is natural to ask if these two statements are true at the same time. We can also ask directly for
the strong converse for unentangled inputs when a feedback link is available. These are the main
questions that we address in this paper.
2
Summary of Results
In this paper, we derive an explicit exponential bound on the success probability of a classical
communication scheme that uses an entanglement-breaking channel along with classical feedback.
The same method of proof can be used to establish a bound for arbitrary quantum channels with
classical feedback, provided that the inputs are not entangled across multiple uses of the channel.
When the communication rate exceeds the classical capacity, these exponential bounds immediately
imply strong converse theorems for these settings.
We now provide an outline of the proof:
1. First, taking as a starting point the general approach of [Nag01], relating hypothesis testing
to unassisted communication, we bound the success probability of an arbitrary feedbackassisted classical communication protocol by a sandwiched Rényi relative entropy [MLDS` 13,
WWY14].
2. Next, one of the main observations from [BN05] is that the sender and receiver’s systems
are separable at all times throughout such a protocol, whenever the communication channel
is entanglement-breaking. We use this fact and an entropy inequality from [Kin03] to split
the relative entropy into two terms. The first term is bounded by an α-information radius,
which is a measure of the range of states a channel can output. We then equate this to the
sandwiched α-Holevo information [WWY14], which is a Rényi generalization of the Holevo
information. The second term is bounded via monotonicity by another sandwiched Rényi
relative entropy, to which we recursively apply the same argument.
3. This gives the following bound on the probability of success for any finite blocklength n:
psucc ď 2´n supαą1
α´1
pR´χ
rα pN qq
α
,
(2.1)
where R is the rate of communication and N is the EB channel. It follows from previous
arguments [WWY14] that when R ą χpN q, the right hand side of (2.1) is a decaying exponential, thereby establishing the strong converse. We provide an alternate (arguably simpler)
proof of this fact (similar to those in [MH11, CMW16]) by establishing that the α-Holevo
information converges continuously to the Holevo information as α approaches 1.
Appendix B includes a brief review of the argument for the weak converse from [BN05].
4
3
Preliminaries
In this section we provide some necessary definitions, concepts, and previous results used in the
derivation of (2.1).
3.1
Quantum states, measurements, operator norms, and quantum channels
We start with definitions of relevant mathematical notions from quantum mechanics. Given a finitedimensional Hilbert space H, let BpHq denote the algebra consisting of linear operators acting on
H. A relevant measure of a operator X is its Schatten α-norm, which is defined as
}X}α ” tTr r|X|α su1{α ,
(3.1)
?
where α ě 1 and |X| ” X : X.
The set of quantum states is a convex subset of BpHq given by
SpHq “ tρ P BpHq : ρ ě 0, Tr ρ “ 1u ,
(3.2)
where the notation ρ ě 0 means that ρ is positive semidefinite. For composite states, we consider
the tensor product of two Hilbert spaces HA and HB , denoted by HA b HB . We can obtain from
the overall density operator ρAB P SpHA b HB q the reduced density operator ρA corresponding to
the quantum state on only the A system by performing a partial trace:
ρA ” TrB pρAB q.
(3.3)
TrB p|x1 yxx2 |A b |y1 yxy2 |B q ” |x1 yxx2 |A xy2 |y1 y
(3.4)
The partial trace can be defined as
for vectors |x1 y, |x2 y, |y1 y, and |y2 y, and then extended by linearity. A state ρAB is separable if it
can be written as
ÿ
ρAB “
ppxqρxA b ρxB ,
(3.5)
x
where ppxq is a probability distribution and tρxA u and tρxB u are sets of states.
A positive operator-valued measure (POVM) consists of a set tΛm u of positive semidefinite
operators
indexed by m and corresponding to different measurement results. The set satisfies
ř
m Λm “ I, which allows us to interpret the quantity
pm ” TrpρΛm q
(3.6)
as the probability of measuring m given a quantum state ρ.
We next consider maps on operators and in particular quantum states. A linear map Ψ :
BpHA q Ñ BpHB q is called positive if @τ P BpHA q, τ ě 0 implies Ψpτ q ě 0. It is called completely
positive if idR b Ψ is positive for an arbitrary auxiliary system R, where idR is the identity map on
R. A map Ψ is a quantum channel if it is linear, completely positive, and also trace-preserving.
5
M
A’0
X0
B’0
A’2
A’1
E1
A1
N
B1
E2
X1
D1
A2
B2
N
D2
B’1
E3
X2
A3
B3
N
D3
B’2
M̂
Figure 1: A general protocol for feedback-assisted classical communication. The sender manipulates
the systems labeled by A and the receiver those labeled by B. Every X system is classical and
represents noiseless classical feedback from the receiver to the sender.
3.2
Classical feedback-assisted classical communication protocols
Figure 1 depicts the most general three-round protocol for classical feedback-assisted classical communication. The generalization to n rounds is clear. The protocol begins with Alice preparing a
classical register M with the message to be sent. This is correlated with some system A10 . Bob uses
the classical feedback channel to send a classical system X0 correlated with some quantum system
B01 to Alice. The global state is then
ÿ
ÿ
ρM A10 X0 B01 ”
pM pmq |my xm|M b ρm
b
pX0 pxq |xy xx|X0 b ρxB 1 .
(3.7)
1
A
0
m
0
x
We will track the state conditioned on a particular value m of the message register M , given by
ÿ
m
ρm
pX0 pxq |xy xx|X0 b ρxB 1 .
(3.8)
A1 X0 B 1 ” ρA1 b
0
0
0
0
x
Alice performs an encoding EA1 1 X0 ÑA1 A1 . The state at this point is
0
ρm
A11 A1 B01
”
1
EA1 1 X0 ÑA1 A1
0
1
ÿ
“
´
ρm
A10 X0 B01
¯
(3.9)
´
¯
x
pX0 pxqEA1 1 X0 ÑA1 A1 ρm
A1 b |xy xx|X0 b ρB 1 ,
0
x
1
0
0
(3.10)
1
1
We note that the state ρm
A11 A1 B01 is separable with respect to the cut A1 A1 : B0 .
Next, Alice uses the EB channel NA1 ÑB1 for the first time by sending system A1 , leading to
the state
´
¯
m
.
(3.11)
ρm
”
N
ρ
1
1
1
1
A1 ÑB1
A B1 B
A A1 B
1
0
1
0
Since the channel is entanglement-breaking and the state before the channel was already separable
with respect to the A11 A1 : B01 cut, the state after the channel is fully separable, that is, it is
separable across all possible partitions. Now, consider instead that Alice uses an arbitrary channel
6
NA1 ÑB1 but with an input separable across the A11 : A1 cut (such that ρm
A11 A1 B01 is fully separable).
m
Then, the state ρA1 B1 B 1 is again fully separable. We write it in the form
1
0
ρm
A1 B1 B 1 “
1
ÿ
0
y,m
pY pyqρy,m
b ρy,m
B1 b ρB 1 .
A1
1
y
(3.12)
0
1
Bob now applies the decoding map DB
1
1 , where X1 is the classical system that is sent
1 B0 ÑX1 B1
back to Alice. The state at this point is
´
¯
1
m
ρm
(3.13)
A11 X1 B11 ” DB1 B01 ÑX1 B11 ρA11 B1 B01
ÿ
ÿ
“
pX1 px1 q |x1 y xx1 |X1 b pZ1 |X1 pz1 |x1 qρxA11 ,z1 b ρxB11,z1 .
(3.14)
x1
z1
1
1
which is fully separable. Hence, after Alice applies the second encoder E 2 and then sends it through
the channel, the state will still be fully separable. The key observation here is that if we use an EB
channel or an arbitrary channel with separable inputs, the state is always separable across a cut
that divides Alice and Bob’s systems.
The only difference in subsequent rounds is the final measurement. Say there are n rounds in
1
using a POVM given by tDm u
the protocol. At the last round, Bob measures the state ρBn Bn´1
with elements corresponding to different possible messages that Alice sent.
3.3
Rényi relative entropies and bounds on success probability
An important classical information theoretic quantity is the Rényi relative entropy, which can be
generalized to the quantum case in a number of ways. In this paper, we use the sandwiched quantum
Rényi relative entropy [MLDS` 13, WWY14] which is given by
” ´`
#
˘ ¯ı
1
p1´αq{p2αq ρσ p1´αq{p2αq α
log
Tr
σ
: ρ M σ ^ psupppρq Ď supppσq _ α P p0, 1qq
α´1
r α pρ}σq ”
D
`8
: otherwise
(3.15)
where α P p0, 1q Y p1, 8q and ρ M σ means ρ, σ are non-orthogonal quantum states. Note that all
logarithms in this paper are taken base two.
We now recall some properties of the sandwiched Rényi relative entropy. For fixed ρ and σ, the
r α pρ}σq is monotone non-decreasing [MLDS` 13]. It also converges to the quantum
function α ÞÑ D
relative entropy Dpρ}σq [Ume62] in the limit as α Ñ 1 [MLDS` 13, WWY14]:
r α pρ}σq “ Dpρ}σq,
lim D
αÑ1
where
"
Dpρ}σq ”
Tr rρ plog ρ ´ log σqs : supppρq Ď supppσq
.
`8
: otherwise
(3.16)
(3.17)
Furthermore, it satisfies the data-processing inequality for α P r1{2, 1q Y p1, 8q [FL13, Bei13]; that
is, for all quantum channels N ,
r α pN pρq}N pσqq ď D
r α pρ}σq.
D
7
(3.18)
In particular, consider the following replacement channel which simply replaces the input with some
state ω:
Rω pρq ” Trpρqω.
(3.19)
r α pω}ωq “ 0, implying that
It is easy to see that for all ω, D
r α pρ}σq ě D
r α pRω pρq}Rω pσqq “ 0,
D
(3.20)
which shows that the sandwiched Rényi relative entropy is non-negative whenever its arguments
are quantum states ρ and σ.
Using the sandwiched Rényi relative entropy, we can define the sandwiched α-Holevo information [WWY14] of an ensemble, that is, a classical probability distribution of quantum states,
tpX pxq, ρx u as
r α pρXR }ρX b σR q
rα ptpX pxq, ρx uq ”
χ
inf
D
(3.21)
σR PSpHR q
where
ρXR ”
ÿ
pX pxq|xyxx|X b pρx qR
(3.22)
x
and ρx are states of a system R. With this, we define the α-Holevo information of a quantum
channel N as
χ
rα pN q ” sup χ
rα ptpX pxq, N pρx quq .
(3.23)
tpX pxq,ρx u
We also define the α-information radius of a channel N : SpHA q ÞÑ SpHB q as
r α pN q ”
K
inf
r α pN pρq}σq.
sup D
(3.24)
σPSpHB q ρPSpHA q
r α is monotonically non-decreasing in α, so are χ
rα.
We note that since D
rα and K
4
Strong converse
This section is dedicated to proving the main theorem of this paper. We will need the following
lemmas. The first is proven using an inequality from [Nag01] in Lemma 5 of [CMW16] via monor α . The second will be used to take advantage of the separability of the quantum state
tonicity of D
observed in Section 3.2. The third is an equality between α-Holevo information and α-information
radius. The fourth states that α-Holevo information and α-information radius respectively tend to
the conventional Holevo information and information radius in the limit α Ñ 1, which we prove in
Appendix C. Note that this establishes Lemma 3 as a generalization of the equality χpN q “ KpN q
[OPW97, SW01, SW02].
Lemma 1. Let α ą 1, ρ, σ P SpHq, and Λ be such that 0 ď Λ ď I. Let
p ” Tr rΛρs , q ” Tr rΛσs .
Then
r α pρ}σq ě
D
“
‰
1
log pα q 1´α .
α´1
8
(4.1)
(4.2)
Lemma 2 ([Kin03, Hol06]). Let PAB be a positive semidefinite separable operator. Such an
operator can be written in the following form:
ÿ j
j
CA b DB
,
(4.3)
PAB “
j
j
j
where CA
, DB
ě 0 for all j. Let PB “ TrA tPAB u and let MA be a completely positive linear map
acting on the A system. Then, for all α ě 1,
}pMA b idB q pPAB q}α ď να pMA q ¨ }PB }α ,
(4.4)
where να pMA q is the 1 Ñ α norm of MA , defined as
να pMA q ”
}MA pXq}α
.
}X}1
X‰0,XPBpHA q
sup
(4.5)
Lemma 3 ([WWY14]). For α ą 1, the α-Holevo information and the α-information radius are
the same:
r α pN q.
rα pN q “ K
χ
(4.6)
Proof. This statement was essentially proved as Lemma 14 of [WWY14], but only for the interval
α P p1, 2s. To get the statement for all α ą 1, we actually need to extend Lemma 14 in [WWY14]
slightly. This follows from the proof given there and the observations that for all α ą 1, xp1´αq{α
r α is jointly quasi-convex.
is operator convex, Trtxα u is convex, and D
For completeness and convenience, we also give a full proof here, following the steps in the
r α pN q ď χ
rα pN q for α ą 1.
proof of Lemma 14 in [WWY14] closely. We first prove the inequality K
p1´αq{2α
p1´αq{2α
α
r α pρ}σq ” Trppσ
Defining Q
ρσ
q q, consider that
r α pN q “ inf sup D
r α pN pρq}σq
K
σ
1
r α pN pρq}σq
log Q
α´1
(4.8)
1
r α pN pρq}σq
log inf sup Q
σ
α´1
ρ
(4.9)
“ inf sup
σ
“
(4.7)
ρ
ρ
r α quantity and find that
So now we focus on the Q
ż
r
r α pN pρq }σq
inf sup Qα pN pρq }σq ď inf sup dµpρq Q
σ
σ µ
ρ
ż
r α pN pρq}σq
“ sup inf dµpρq Q
µ σ
ÿ
r α pN pρx q }σq
“ sup inf
pX pxqQ
tpX pxq,ρx u σ
“
sup
(4.11)
(4.12)
x
r α pρXB }ρX b σB q
inf Q
tpX pxq,ρx u σB
(4.10)
(4.13)
The first inequality follows by taking a supremum over all probability measures µ on the set of all
states ρ. The first equality is a result of applying the Sion minimax theorem [Sio58]—we can do
9
ş
r α pN pρq }σq is linear in the probability measure µ and convex in
so because the function dµpρq Q
r
states σ. Convexity of Qα pN pρq}σq in σ follows because
!´
¯α )
r α pN pρq}σq “ Tr rN pρqs1{2 σ p1´αq{α rN pρqs1{2
Q
,
(4.14)
xp1´αq{α is operator convex for α ą 1 and Trpxα q is convex for α ą 1. The second equality follows
by an application of the Fenchel-Eggleston-Caratheodory theorem (see [EGK12], for example): the
r α pN pρq}σq is continuous in ρ, which is a density operator acting on a d-dimensional
function Q
Hilbert space, so that for each µ, there exists a probability distribution pX pxq on no more than d2
letters such that
ż
ÿ
r α pN pρq}σq “
r α pN pρx q }σq .
(4.15)
dµpρq Q
pX pxqQ
x
r α and by defining
The last equality in (4.13) follows from the properties of Q
ÿ
ρXB ”
pX pxq |xy xx|X b rN pρx qsB .
(4.16)
x
So we can then conclude that
r α pN q ď
K
“
1
r α pρXB }ρX b σB q
log sup inf Q
α´1
tpX pxq,ρx u σB
(4.17)
1
r α pρXB }ρX b σB q
log Q
α´1
(4.18)
sup
inf
tpX pxq,ρx u σB
“χ
rα pN q .
(4.19)
r α pN q ě χ
rα pN q is simpler. Consider that
The proof of the other inequality K
χ
rα pN q “
sup
r α pρXB }ρX b σB q
inf D
(4.20)
sup
r α pρXB }ρX b σq
D
(4.21)
r α p|xy xx| b N pρx q } |xy xx| b σq
sup D
(4.22)
r α pN pρx q }σq
sup D
(4.23)
tpX pxq,ρx u σB
ď
tpX pxq,ρx u
sup
ď
tpX pxq,ρx u x
sup
“
tpX pxq,ρx u x
r α pN pρq }σq .
ď sup D
(4.24)
ρ
r α for α ą 1 [FL13, Bei13], where a
The second inequality follows from joint quasi-convexity of D
function f is jointly quasi-convex if
f pλx1 ` p1 ´ λqx2 , λy1 ` p1 ´ λqy2 q ď max tf px1 , y1 q, f px2 , y2 qu .
(4.25)
r α pN q ě χ
rα pN q.
Since the above inequality holds for all states σ, we can conclude that K
Lemma 4. For a quantum channel N , the following limits hold:
rα pN q “ χpN q
lim χ
αÑ1
10
(4.26)
and
r α pN q “ KpN q,
lim K
(4.27)
αÑ1
where
KpN q ”
inf
sup DpN pρq}σq
(4.28)
σPSpHq ρPSpHq
is the information radius.
We now state the theorem.
Theorem 5. Given any n-round protocol for classical feedback-assisted classical communication
over an entanglement-breaking channel N with rate R, the average probability of success is bounded
from above by an exponential in n:
psucc ď 2´n supαą1
α´1
pR´χ
rα pN qq
α
,
(4.29)
rα is the α-Holevo information. The same bound holds for an arbitrary channel N given
where χ
that the encoder does not entangle inputs across different uses of the channel.
Proof. We take as a starting point the approach of Nagaoka [Nag01], connecting hypothesis testing
with data processing of a Rényi information quantity. Let Pn be such a protocol. We are bounding
the average probability of success, so we assume Alice chooses her messages uniformly at random.
Using the notation of Section 3.2, the state we have at the final round of the protocol Pn is
1
“
ρM Bn Bn´1
L
1 ÿ
|myxm|M b ρm
,
1
Bn Bn´1
L m“1
(4.30)
where L is the number of possible messages.
Following the argument in [CMW16], we can write the success probability as
psucc
ı
ı
”
1ÿ ” m
m
1
1
“
Tr DBn B 1 ρBn B 1
“ Tr TM Bn Bn´1 ρM Bn Bn´1 ,
n´1
n´1
L m
(4.31)
where
1
TM Bn Bn´1
”
ÿ
m
|myxm|M b DB
1
nB
n´1
m
.
(4.32)
Note that 0 ď T ď I, so that tT, I ´ T u is a POVM.
1
We now consider the state τM Bn Bn´1
defined to be the final state if we had implemented Pn
using a replacement channel Rσ instead of the original channel (see Figure 2). The overall state in
this alternate scenario has a simple expression since Bob’s states are now independent of m:
1
1
τM Bn Bn´1
“ τM b σBn b τBn´1
,
(4.33)
where τM “ IM {L. In the above, we remind that Bn is a label for the output system of the nth
replacement channel Rσ , and the state of this system is equal to σ. We can then compute the
following:
”
ı
ı
1ÿ ” m
1
1
1
1
Tr TM Bn Bn´1
τM Bn Bn´1
“
Tr DBn B 1 σBn b τBn´1
“ ,
(4.34)
n´1
L m
L
11
M
A’0
X0
B’0
A’2
A’1
E1
A1
σ
B1
X1
D1
E2
A2
σ
X2
B2
D2
B’1
E3
A3
σ
B3
B’2
D3
M̂
Figure 2: A protocol for feedback-assisted classical communication when using the replacement
channel. Notice that the communication line between A1 and M̂ is broken.
ř
1
where the last equality follows because m Dm “ I and TrrσBn b τBn´1
s “ 1. This equality is
intuitive, since for a replacement channel, the receiver Bob cannot do any better than to guess the
input message m at random. Letting T be the operator Λ in Lemma 1, we conclude that for α ą 1,
„
1
1
α
r
1
1
qě
}τM Bn Bn´1
Dα pρM Bn Bn´1
log psucc 1´α ,
(4.35)
α´1
L
which can be re-written as follows:
α
r α pρM B B 1 }τM B B 1 q.
logppsucc q ` log L ď D
n n´1
n n´1
α´1
(4.36)
We note that if the support of the state σ does not contain the support of the image of the channel
r α upper bound is trivially equal to `8. So, in what follows, we choose σ such
NAÑB , then the D
that its support contains the support of the image of the channel in order to guarantee that all
quantities involved in the forthcoming proof are finite.
r α pρM B B 1 }τM B B 1 q. To do so, consider that
We would therefore like to bound D
n n´1
n n´1
r α pNAn ÑBn pρM A B 1 q}τM B 1 b σBn q
r α pρM B B 1 }τM B B 1 q “ D
D
n n´1
n n´1
n n´1
n´1
›˜
›
¸
›
´
¯›
α
›
p1´αq{p2αq
p1´αq{p2αq ›
1
“
τM B 1
log › Θ 1´α
˝ NAn ÑBn
ρM An Bn´1
τM B 1
› , (4.37)
α
n´1
n´1
›
›
α´1
σBn
α
where ˝ denotes function composition and in the last equality, we define Θ by
Θσ pρq ” σ 1{2 ρσ 1{2 ,
(4.38)
and the identity operation on the other systems is implied. We now use the key observation from
Section 3.2 (and used in [BN05]) that if N is EB or if Alice uses separable inputs, throughout Pn ,
1
Alice and Bob’s systems are always separable. Furthermore, the M system is classical, so ρM An Bn´1
1
is separable with respect to the An : M Bn´1 cut. This implies that
p1´αq{p2αq
τM B 1
n´1
p1´αq{p2αq
1
ρM An Bn´1
τM B 1
n´1
12
(4.39)
is a positive semidefinite separable operator:
p1´αq{p2αq
p1´αq{p2αq
1
τM B 1
ρM An Bn´1
τM B 1
n´1
n´1
“
p1´αq{p2αq
τM B 1
n´1
ÿ
“
˜
ÿ
¸
ppjqρjAn b ρjM B 1
n´1
j
´
p1´αq{p2αq j
ppjqρjAn b τM B 1
ρM B 1
n´1
j
p1´αq{p2αq
n´1
τM B 1
(4.40)
n´1
p1´αq{p2αq
¯
τM B 1
.
(4.41)
n´1
Since conjugation by a positive semidefinite operator is clearly a completely positive map, we can
apply Lemma 2 to conclude that
›
›˜
¸
›
´
¯›
›
p1´αq{p2αq
p1´αq{p2αq ›
1
τM B 1
τM B 1
˝ NAn ÑBn
ρM An Bn´1
›
› Θ 1´α
α
n´1
n´1
›
›
σBn
˜
¸ α
›
›
› p1´αq{p2αq
p1´αq{p2αq ›
1
ď να Θ 1´α
˝
N
¨
τ
ρ
τ
›
› . (4.42)
1
1
A
ÑB
M
B
n
n
MB
n´1 M B
α
n´1
σBn
n´1
α
We then have the following chain of inequalities:
´
¯
r α pρM B 1 }τM B 1 q
r α pρM B B 1 }τM B B 1 q ď α log να Θ 1´α ˝ N ` D
D
n n´1
n n´1
n´1
n´1
σ α
α´1
¯
´
α
r α pρM B B 1 }τM B B 1 q
ď
log να Θ 1´α
˝N `D
n´1 n´2
n´1 n´2
σ α
α´1
´
¯
α
r α pρM B 1 }τM B 1 q
ďn
log να Θ 1´α
˝N `D
0
0
σ α
α´1
¯
´
α
“n
log να Θ 1´α
˝N
σ α
α´1
›ˆ
›
˙
›
›
α
›
“n
log sup › Θ 1´α
˝ NAÑB pρA q›› .
α
α´1
σB
ρA PSpHA q
α
(4.43)
(4.44)
(4.45)
(4.46)
(4.47)
The first inequality follows by combining (4.37) and (4.42). The second inequality follows from
monotonicity of the sandwiched Rényi relative entropy under the partial trace channel. The third
r α pρM B B 1 }τM B B 1 q is the relative entropy at round
inequality follows by recognizing that D
n´1 n´2
n´1 n´2
n ´ 1 of Pn , which allows us to apply the above argument inductively. This is a crucial step of the
argument and proves a form of additivity similar to that of (1.5). The first equality is a consequence
of the fact that ρM B01 “ τM B01 , since no channels have been applied at that point in the protocol.
The last equality follows from the main result of [Aud09] which allows us to take the supremum
over quantum states instead of all operators (furthermore from the fact that quantum states have
trace equal to one). Hence, we have that
›ˆ
›
˙
›
›
α
α
›
› .
pρ
q
(4.48)
log psucc pPn q ` log L ď n
log sup › Θ 1´α
˝
N
AÑB
A
›
α´1
α´1
σB α
ρA PSpHA q
α
Hence, we have proven that the upper bound holds for all states σB , so we can conclude that
›ˆ
›
˙
›
›
α
α
›
log psucc pPn q ` log L ď n inf
sup
log › Θ 1´α
˝ NAÑB pρA q››
(4.49)
α
α´1
σB PSpHB q ρA PSpHA q α ´ 1
σB
α
r α pN q
“ nK
(4.50)
“ nr
χα pN q.
(4.51)
13
The first equality comes from the definition of the α-information radius, and the second equality
is due to Lemma 3.
Now, the protocol uses the channel n times and the rate R of Pn is defined to be the number
of bits per channel use, so that R ď logn L . This allows us to introduce R into the inequality:
1
α´1
rα pN qq.
log psucc pPn q ď ´
pR ´ χ
n
α
(4.52)
Since this is true for all α ą 1, we can take a supremum over α ą 1 and arrive at the bound stated
in (4.29).
The strong converse itself now follows from Theorem 5 and Lemma 4.
Corollary 6 (Strong Converse). The probability of success of any sequence of protocols which
use an entanglement-breaking channel with classical feedback at a rate greater than the classical
capacity is bounded from above by a decaying exponential. The same is true for arbitrary channels
with separable inputs.
r α is monotonically increasing in α, so is χ
Proof. Recall that since D
rα . This along with Lemma 4
implies
rα pN q “ lim χ
rα pN q “ χpN q.
inf χ
αą1
αŒ1
(4.53)
rα pN q as α Œ 1, there exists a value of α ą 1 such
Hence, if R ą χpN q, by the continuity of χ
pR
´
χ
r
that α´1
pN
qq
ą
0.
Then
the
bound
in (4.29) implies an exponential decay of the success
α
α
probability.
5
Conclusion
By studying the classical capacity of a quantum channel, quantum information theorists found
that an implication of quantum mechanics for classical communication is the possibility of superior
encoding schemes that use entanglement, a uniquely quantum phenomenon [Has09]. However, entanglement does not give an advantage for every channel. The results in this and previous papers
show that for entanglement-breaking channels, no communication protocols, even with classical
feedback, can take advantage of this extra resource. They cannot use it to increase their capacity, nor, as proved in this paper, to even lift the exponentially decaying ceiling on their success
probabilities. We perhaps expect this since by definition EB channels destroy entanglement, and
classical feedback channels cannot create entanglement. This is the guiding principle behind our
proof, in particular the key fact that the transmitter and receiver states are separable throughout
the protocol.
More generally, it is known that classical feedback can give a large boost to the classical capacity
of channels which are not entanglement-breaking in at least two different ways: first, there exist
channels for which the Holevo information is small but the classical capacity with feedback included
can be quite large [BDSS06]. Similarly, there exist channels for which the classical capacity is small
but becomes large when classical feedback is available [SS09]. Thus, showing that the Holevo
information is a strong-converse bound suggests that for feedback not to help, we require special
channels, such as the entanglement-breaking ones.
14
Going in the opposite direction, it is known that EB channels form a proper superset of classical
channels [KHH12]. We thus obtain the result of [PV10] as a direct corollary. Furthermore, since the
original posting of our paper as arXiv:1506.02228, an open question that we posed has now been
answered — the strong converse exponent from Theorem 5 is tight, due to the results in [MO17].
Hence, we obtain as a special case from this and our result the classical results of [Aug78, DK79,
CK82] as well.
A possible direction for future research is to ask the same question for Hadamard channels,
which are defined to be complements of EB channels. To define the complementary channel, we
first explain the interpretation of channel as a model for open quantum dynamics. That is, a
channel from system A to system B can be interpreted as the restriction of a unitary interaction
with larger system BR, where R is referred to as the “environment.” The complementary channel
is the map from A to BR tracing out the B system instead and is itself a channel from A to R.
Hence, Hadamard channels break any entanglement with the environment system that is traced
out and is thus related to our guiding principle. The strong converse has already been proved for
Hadamard channels [WWY14], but with the addition of classical feedback, even a weak converse
has yet to be proved. Examples of Hadamard channels include generalized dephasing channels,
cloning channels, and the Unruh channel [BHTW10].
Finally, we remark here that it should be possible to use the methods given here and in [CMW16]
in order to characterize a particular adaptive hypothesis testing scenario. Suppose that the goal is
to distinguish an entanglement-breaking channel from a replacement channel by means of adaptive,
separability-preserving channels. Then the optimal strong converse exponent should be given in
terms of a quantity similar to that in (4.29). However, we leave the details for future work.
Acknowledgements. We are grateful to Patrick Hayden, Milan Mosonyi, and Graeme Smith
for insightful discussions about the topic of this paper. We also thank an anonymous referee for
many helpful suggestions for improving the paper. MMW acknowledges support from startup funds
from the Department of Physics and Astronomy at LSU, the NSF under Award No. CCF-1350397,
and the DARPA Quiness Program through US Army Research Office award W31P4Q-12-1-0019.
DD acknowledges support from a Stanford Graduate Fellowship.
A
Additivity
Here we justify the statement in (1.5). The backward implication is trivial. As for the forward
implication, we first note that given n, for all k P Z` ,
1
1
χpN bn q ď
χpN bkn q,
n
kn
(A.1)
because we can split the kn channels into k blocks of n channels and encode each block independently. In particular, n1 χpN bn q ě χpN q. To show the opposite inequality, we assume the
contrapositive: n1 χpN bn q ą χpN q for some n. However, this means
1
1
χpN bkn q ´ χpN q ě χpN bn q ´ χpN q ą 0,
kn
n
for all k P Z` and thus the limit in (1.4) does not converge to χpN q.
15
(A.2)
B
Weak converse and finite bounds
We recall for motivation and the reader’s convenience the argument for the weak converse from
[BN05].
Theorem 7. Let Pn be a protocol for classical feedback-assisted classical communication over an
entanglement-breaking channel N such that it uses the channel n times, has communication rate
R, and has average probability of decoding error ε. Then, it satisfies the following inequality:
R ď χpN q ` gpn, εq,
(B.1)
where χpN q is the Holevo information of the channel and gpn, εq is a real valued function such that
lim lim gpn, εq “ 0.
(B.2)
εŒ0 nÑ8
The same is true for a protocol for communication over an arbitrary channel given that the encoder
does not entangle inputs across different uses of the channel.
Proof. We use the notation in Section 3.2 and take a general approach that is, for instance, presented
in Section 21.5.1 of [Wil16]. Let Φ denote the following “shared randomness” state:
1 ÿ
|my xm|M b |my xm|M̂ ,
ΦM M̂ “
(B.3)
|M| m
where |M| is the size of the message set M. Now, suppose the information processing task is
common randomness generation instead of classical communication. If we require the state ρ at
the end of the protocol to be ε1 -close to Φ
kΦ ´ ρk1 ď ε1 ,
(B.4)
the Fannes-Audenaert inequality for mutual information [Fan73, Aud07] gives
(B.5)
nR “ IpM ; M̂ qΦ
1
ď IpM ; M̂ qρ ` f pn, ε q,
(B.6)
where f pn, ε1 q is some continuous function of n and ε1 with the property: limε1 Œ0 limnÑ8 n1 f pn, ε1 q “
0. Continuing, we have
1
IpM ; M̂ qρ ď IpM ; Bn Bn´1
qρ
“
1
IpM ; Bn´1
qρ
`
(B.7)
1
IpM ; Bn |Bn´1
qρ ,
(B.8)
where we applied the data processing inequality and the chain rule for conditional quantum mutual
information. We use the chain rule again to get
1
1
IpM ; Bn |Bn´1
qρ ď IpM Bn´1
; Bn qρ .
(B.9)
From Section 3.2, if N is entanglement-breaking or if Alice uses separable inputs, Alice and Bob’s
systems are always separable. Hence, the global state before the nth channel use can be written as
ÿ
1
ρM A1n An Bn´1
“
pM pmq|myxm|M b ρm
(B.10)
A1n An B 1
n´1
m
ÿ
“
pM pmq |my xm|M b
m
ÿ
y
16
m,y
pY |M py|mqρm,y
.
A1 An b ρB 1
n
n´1
(B.11)
Hence, the state after the channel is given by
¯
´
ÿ
ÿ
m,y
1
.
“
pM pmq |my xm|M b pY |M py|mqNAn ÑBn ρm,y
ρM A1n Bn Bn´1
1
A An b ρB 1
n
y
m
(B.12)
n´1
We introduce an auxiliary system Y that labels the separable sum over the index y. That is, Y is
chosen such that the global state is
´
¯
ÿ
m,y
1
”
pM pmq pY |M py|mq |my xm|M b |yy xy|Y b NAn ÑBn ρm,y
. (B.13)
ρM Y A1n Bn Bn´1
1
A An b ρB 1
n
m,y
n´1
We trace over A1n to get
1
ρM Y Bn Bn´1
“
ÿ
m,y
pM pmq pY |M py|mq |my xm|M b |yy xy|Y b ρm,y
,
Bn b ρB 1
where
(B.14)
n´1
m,y
´
´
¯¯
`
˘
m,y
1
ρm,y
”
Tr
N
ρ
“ NAn ÑBn ρm,y
An ÑBn
An
An .
Bn
A1 An
n
(B.15)
This allows us to argue
1
1
IpM Bn´1
; Bn qρ ď IpM Y Bn´1
; Bn qρ
“ IpM Y ; Bn qρ `
1
IpBn´1
; Bn |M Y qρ
(B.16)
(B.17)
“ IpM Y ; Bn qρ
(B.18)
ď χpN q,
(B.19)
where the first inequality is from data processing, the first equality from the chain rule, and the
1
second equality because the Bn´1
Bn system is in a product state when conditioning on M and Y .
Finally, given equation (B.15), the state ρM Y Bn is a classical-quantum state of the form:
´
¯
1
1
ρM Y Bn “ TrBn´1
ρM Y Bn Bn´1
(B.20)
ÿ
`
˘
“
pM pmq pY |M py|mq |my xm|M b |yy xy|Y b NAn ÑBn ρm,y
(B.21)
An .
m,y
Hence, the definition of the Holevo information of the channel N gives us final inequality. Putting
things together, we find that
1
IpM ; M̂ qρ ď χpN q ` IpM ; Bn´1
qρ
ď χpN q `
1
IpM ; Bn´1 Bn´2
qρ ,
(B.22)
(B.23)
where the last inequality follows from the data processing inequality. But now, we recognize the
1
1
quantity IpM ; Bn´1 Bn´2
qρ is of the same form as IpM ; Bn Bn´1
qρ in (B.7), so that we can iterate
through the same sequence of arguments to get
1
IpM ; M̂ qρ ď 2χpN q ` IpM ; Bn´2 Bn´3
qρ .
(B.24)
Continuing all the way back to the first channel use, we find
IpM ; M̂ qρ ď nχpN q
17
(B.25)
since IpM ; B01 q “ 0 (see (3.7)). Thus, we conclude
R ď χpN q `
1
f pn, ε1 q.
n
(B.26)
Now, the rate for classical communication with n channel uses and error ε is at most that of
randomness generation with n uses and error ε1 , where ε1 is some function of ε such that limεŒ0 ε1 “
0. Hence, gpn, εq ” n1 f pn, ε1 q is what we need.
Corollary 8 (Weak Converse). The classical capacity of entanglement-breaking channels with
classical feedback is given by the Holevo information. The same is true for arbitrary channels with
separable inputs.
Proof. This is immediate.
C
Limit value of the α-Holevo information
The arguments here are essentially the same as those in [MH11, CMW16], along with an additional
insight from [TWW17, Appendix A]. We first recall a minimax result due to [MH11, Corollary A2].
s where X is a compact topological space, Y is a
Lemma 9. Suppose a function f : X ˆ Y Ñ R,
s
subset of R, and R is the extended real numbers, satisfies
1. @y P Y , f p¨, yq is lower semicontinuous.
2. @x P X, f px, ¨q is monotonic.
Then,
inf sup f px, yq “ sup inf f px, yq.
xPX yPY
yPY xPX
(C.1)
If the first condition was instead
1. @y P Y , f p¨, yq is upper semicontinuous,
then
inf sup f px, yq “ sup inf f px, yq.
yPY xPX
xPX yPY
(C.2)
We now prove Lemma 4.
r α pρXR1 , ρX bσR1 q is lower semicontinuous (see, e.g., [CMW16,
Proof. For fixed ρXR1 and α, σR1 ÞÑ D
r α pρXR1 , ρX b σR1 q is monotone nonAppendix A]). Furthermore, for fixed ρXR1 and σR1 , α ÞÑ D
decreasing. We can therefore invoke Lemma 9 with X “ SpHR1 q and Y “ p0, 1q. We use this, the
definition of the Holevo information, and properties of the quantum relative entropy to find the
18
following one-sided limit of the α-Holevo information of a quantum channel N : BpHR q Ñ BpHR1 q:
rα pN q “ sup χ
rα pN q
lim χ
αÕ1
(C.3)
αPp0,1q
“ sup
sup
αPp0,1q tpX pxq,ρx u
“
“
“
“
sup
rα ptpX pxq, N pρx quq
χ
sup
inf
r α pρXR1 }ρX b σR1 q
D
(C.5)
r α pρXR1 }ρX b σR1 q
sup D
(C.6)
tpX pxq,ρx u αPp0,1q σR1 PSpHR1 q
sup
inf
(C.4)
tpX pxq,ρx u σR1 PSpHR1 q αPp0,1q
sup
inf
tpX pxq,ρx u σR1 PSpHR1 q
DpρXR1 }ρX b σR1 q
IpX : R1 qρ
sup
(C.7)
(C.8)
tpX pxq,ρx u
“ χpN q,
(C.9)
where
ρXR1 ”
ÿ
pX pxq|xyxx|X b rN pρx qsR1 .
(C.10)
x
The fourth equality follows from applying Lemma 9. The fifth follows from (3.16) and the fact that
the sandwiched Rényi relative entropy is monotone non-decreasing in α.
r α pN pρR q}σR1 q is monotone
To find the other limit, we note that for fixed ρR and σR1 , α ÞÑ D
non-decreasing. We then use an idea from [TWW17, Appendix A]. Note that for fixed α and
r α pN pρR q}σR1 q is continuous (and thus upper semicontinuous). Let
positive definite σR1 , ρR ÞÑ D
ε P p0, 1q and define σ pεq ” p1 ´ εq σ ` επ, where π is the maximally mixed state. Thus σpεq is
positive definite for σ positive semidefinite. Consider that
σpεq ě p1 ´ εq σ,
(C.11)
Dpρ}σpεqq ď Dpρ} p1 ´ εq σq “ Dpρ}σq ´ log p1 ´ εq .
(C.12)
which implies that
(This is because of the well known fact that σ ď σ 1 implies that Dpρ}σq ě Dpρ}σ 1 q.) Hence, using
Lemma 9, Lemma 3, and the identification of the Holevo information as an information radius
19
[OPW97, SW01], we can conclude the following chain of equalities:
rα pN q
rα pN q “ inf χ
lim χ
(C.13)
r α pN q
“ inf K
(C.14)
αą1
αŒ1
αą1
“ inf
inf
sup
r α pN pρR q}σR1 q
D
(C.15)
ď inf
inf
sup
r α pN pρR q}σpεqR1 q
D
(C.16)
sup
r α pN pρR q}σpεqR1 q
D
(C.17)
αą1 σR1 PSpHR1 q ρ PSpH q
R
R
αą1 σR1 PSpHR1 q ρ PSpH q
R
R
“
“
“
ď
inf
inf
σR1 PSpHR1 q αą1 ρR PSpHR q
inf
sup
r α pN pρR q}σpεqR1 q
inf D
(C.18)
inf
sup
DpN pρR q}σpεqR1 q
(C.19)
DpN pρR q}σR1 q ´ logp1 ´ εq
(C.20)
σR1 PSpHR1 q ρR PSpHR q αą1
σR1 PSpHR1 q ρR PSpHR q
inf
sup
σR1 PSpHR1 q ρR PSpHR q
“ χpN q ´ log p1 ´ εq .
(C.21)
The first inequality follows because there is an infimum with respect to σR1 , such that replacing σR1
with σpεqR1 can never decrease the quantity. The fifth equality follows from applying Lemma 9.
The sixth equality follows from (3.16) and the fact that the sandwiched Rényi relative entropy is
monotone non-decreasing in α. The last inequality follows from (C.12). The last equality uses
χpN q “ KpN q.
rα pN q ď χpN q. Combined with
Given that ε ą 0 was arbitrary, we can conclude that limαŒ1 χ
rα pN q ě χpN q for all α ě 1, we conclude that
the fact that χ
rα pN q “ χpN q.
lim χ
(C.22)
r α pN q “ KpN q.
lim K
(C.23)
αŒ1
This also implies that
αŒ1
r α pN q “ KpN q, which follows from a similar line of reasoning:
We now show that limαÕ1 K
r α pN q “ sup K
r α pN q
lim K
αÕ1
(C.24)
αPp0,1q
“ sup
inf
sup
r α pN pρR q}σR1 q
D
(C.25)
r α pN pρR q}σR1 q
D
(C.26)
r α pN pρR q}σR1 q
sup D
(C.27)
αPp0,1q σR1 PSpHR1 q ρR PSpHR q
“
“
“
inf
sup
sup
σR1 PSpHR1 q αPp0,1q ρR PSpHR q
inf
sup
σR1 PSpHR1 q ρR PSpHR q αPp0,1q
inf
sup
σR1 PSpHR1 q ρR PSpHR q
“ KpN q,
DpN pρR q}σR1 q
(C.28)
(C.29)
20
where the third equality follows from Lemma 9 and the fact that for fixed α and ρR , σR1 ÞÑ
r α pN pρR q}σR1 q is lower semicontinuous and that the pointwise supremum of lower semicontinuous
D
functions is lower semicontinuous.
References
[Ari73]
Suguru Arimoto. On the converse to the coding theorem for discrete memoryless
channels. IEEE Transactions on Information Theory, 19(3):357–359, May 1973.
[Aud07]
Koenraad M. R. Audenaert. A sharp continuity estimate for the von Neumann
entropy. Journal of Physics A: Mathematical and Theoretical, 40(28):8127, July
2007. arXiv:quant-ph/0610146.
[Aud09]
Koenraad M. R. Audenaert. A note on the p Ñ q norms of 2-positive maps. Linear Algebra and its Applications, 430(1):1436–1440, February 2009. arXiv:mathph/0505085.
[Aug78]
Udo Augustin. Noisy channels. Habilitation thesis, Universitat Erlangen-Nurnberg,
West Germany, September 1978.
[BDSS06]
Charles H. Bennett, Igor Devetak, Peter W. Shor, and John A. Smolin. Inequalities
and separations among assisted capacities of quantum channels. Physical Review
Letters, 96(15):150502, April 2006. arXiv:quant-ph/0406086.
[Bei13]
Salman Beigi. Sandwiched Rényi divergence satisfies data processing inequality.
Journal of Mathematical Physics, 54(12):122202, December 2013. arXiv:1306.5920.
[BGPWW15] Bhaskar Roy Bardhan, Raul Garcia-Patron, Mark M. Wilde, and Andreas Winter.
Strong converse for the classical capacity of all phase-insensitive bosonic Gaussian
channels. IEEE Transactions on Information Theory, 61(4):1842–1850, April 2015.
arXiv:1401.4161.
[BHTW10]
Kamil Brádler, Patrick Hayden, Dave Touchette, and Mark M. Wilde. Trade-off
capacities of the quantum Hadamard channels. Physical Review A, 81(6):062312,
June 2010. arXiv:1001.1732.
[BN05]
Garry Bowen and Rajagopal Nagarajan. On feedback and the classical capacity of a
noisy quantum channel. IEEE Transactions on Information Theory, 51(1):320–324,
2005. arXiv:quant-ph/0305176.
[CK82]
Imre Csiszar and Janos Korner. Feedback does not affect the reliability function of a
DMC at rates above capacity. IEEE Transactions on Information Theory, 28(1):92–
93, January 1982.
[CMW16]
Tom Cooney, Milan Mosonyi, and Mark M. Wilde. Strong converse exponents for a
quantum channel discrimination problem and quantum-feedback-assisted communication. Communications in Mathematical Physics, 344(3):797–829, June 2016.
arXiv:1408.3373.
21
[CT91]
Thomas M. Cover and Joy A. Thomas. Elements of Information Theory. WileyInterscience, August 1991.
[DK79]
Gunther Dueck and Janos Korner. Reliability function of a discrete memoryless channel at rates above capacity. IEEE Transactions on Information Theory, 25(1):82–85,
January 1979.
[EGK12]
Abbas El Gamal and Young-Han Kim. Network information theory. Cambridge
University Press, January 2012.
[Fan73]
Mark Fannes. A continuity property of the entropy density for spin lattice systems.
Communications in Mathematical Physics, 31(4):291–294, December 1973.
[FL13]
Rupert L. Frank and Elliott H. Lieb. Monotonicity of a relative Rényi entropy.
Journal of Mathematical Physics, 54(12):122201, December 2013. arXiv:1306.5358.
[GK12]
Abbas El Gamal and Young-Han Kim. Network information theory. Cambridge
University Press, January 2012. arXiv:1001.3404.
[Has09]
Matthew B. Hastings. Superadditivity of communication capacity using entangled
inputs. Nature Physics, 5:255–257, April 2009. arXiv:0809.3972.
[Hay07]
Masahito Hayashi. Error exponent in asymmetric quantum hypothesis testing and its
application to classical-quantum channel coding. Physical Review A, 76(6):062301,
December 2007. arXiv:quant-ph/0611013.
[Hol98]
Alexander S. Holevo. The capacity of the quantum channel with general signal
states. IEEE Transactions on Information Theory, 44(1):269–273, January 1998.
arXiv:quant-ph/9611023.
[Hol06]
Alexander S. Holevo. Multiplicativity of p-norms of completely positive maps and the
additivity problem in quantum information theory. Russian Mathematical Surveys,
61(2):301–339, 2006.
[HSR03]
Michal Horodecki, Peter W. Shor, and Mary Beth Ruskai. Entanglement breaking channels. Reviews in Mathematical Physics, 15(6):629–641, August 2003.
arXiv:quant-ph/0302031.
[KHH12]
J. K. Korbicz, P. Horodecki, and R. Horodecki. Quantum-correlation breaking
channels, broadcasting scenarios, and finite Markov chains. Physical Review A,
86(4):042319, October 2012. arXiv:1208.2162.
[Kin03]
Christopher King. Maximal p-norms of entanglement breaking channels. Quantum
Information and Computation, 3(2):186–190, 2003. arXiv:quant-ph/0212057.
[KW09]
Robert Koenig and Stephanie Wehner. A strong converse for classical channel coding using entangled inputs. Physical Review Letters, 103(7):070504, August 2009.
arXiv:0903.2838.
22
[MH11]
Milán Mosonyi and Fumio Hiai. On the quantum Rényi relative entropies and related
capacity formulas. IEEE Transactions on Information Theory, 57(4):2474–2487,
April 2011. arXiv:0912.1286.
[MLDS` 13]
Martin Müller-Lennert, Frédéric Dupuis, Oleg Szehr, Serge Fehr, and Marco
Tomamichel. On quantum Rényi entropies: A new generalization and some
properties. Journal of Mathematical Physics, 54(12):122203, December 2013.
arXiv:1306.3142.
[MO17]
Milán Mosonyi and Tomohiro Ogawa. Strong converse exponent for classicalquantum channel coding. Communications in Mathematical Physics, 355(1):373–426,
October 2017. arXiv:1409.3562v7.
[Nag01]
Hiroshi Nagaoka. Strong converse theorems in quantum information theory. Proceedings of ERATO Workshop on Quantum Information Science, page 33, 2001. Also
appeared in Asymptotic Theory of Quantum Statistical Inference, ed. M. Hayashi,
World Scientific, 2005.
[ON99]
Tomohiro Ogawa and Hiroshi Nagaoka. Strong converse to the quantum channel coding theorem. IEEE Transactions on Information Theory, 45(7):2486–2489, November
1999. arXiv:quant-ph/9808063.
[OPW97]
Masanori Ohya, Denes Petz, and Noburu Watanabe. On capacities of quantum
channels. Probability and Mathematical Statistics-Wroclaw University, 17:179–196,
1997.
[PV10]
Yury Polyanskiy and Sergio Verdú. Arimoto channel coding converse and Rényi
divergence. Proceedings of the 48th Annual Allerton Conference on Communication,
Control, and Computation, pages 1327–1333, September 2010.
[Sho02]
Peter W. Shor. Additivity of the classical capacity of entanglement-breaking quantum channels. Journal of Mathematical Physics, 43(9):4334–4340, October 2002.
arXiv:quant-ph/0201149.
[Sio58]
Maurice Sion. On general minimax theorems. Pacific Journal of Mathematics,
8(1):171–176, 1958.
[SS09]
Graeme Smith and John A. Smolin. Extensive nonadditivity of privacy. Physical
Review Letters, 103(12):120503, September 2009. arXiv:0904.4050.
[SW97]
Benjamin Schumacher and Michael Westmoreland. Sending classical information via
noisy quantum channels. Physical Review A, 56(1):131–138, July 1997.
[SW01]
Benjamin Schumacher and Michael D Westmoreland. Optimal signal ensembles.
Physical Review A, 63(2):022308, January 2001. arXiv:quant-ph/9912122.
[SW02]
Benjamin Schumacher and Michael D Westmoreland. Relative entropy in quantum
information theory. Contemporary Mathematics, 305:265–290, 2002. arXiv:quantph/0004045.
23
[TWW17]
Marco Tomamichel, Mark M. Wilde, and Andreas Winter. Strong converse rates for
quantum communication. IEEE Transactions on Information Theory, 63(1):715–727,
January 2017. arXiv:1406.2946.
[Ume62]
Hisaharu Umegaki. Conditional expectation in an operator algebra. Kodai Mathematical Seminar Reports, 14(2):59–85, 1962.
[Wil16]
Mark M. Wilde. From classical to quantum Shannon theory.
arXiv:1106.1445v7.
[Win99]
Andreas Winter. Coding theorem and strong converse for quantum channels. IEEE
Transactions on Information Theory, 45(7):2481–2485, 1999. arXiv:1409.2536.
[Wol78]
Jacob Wolfowitz. Coding Theorems of Information Theory. Springer-Verlag New
York, Inc., Secaucus, NJ, USA, 3rd edition, 1978.
[WWY14]
Mark M. Wilde, Andreas Winter, and Dong Yang. Strong converse for the classical
capacity of entanglement-breaking and Hadamard channels via a sandwiched Rényi
relative entropy. Communications in Mathematical Physics, 331(2):593–622, October
2014. arXiv:1306.1586.
24
March 2016.
| 7cs.IT
|
NORTH-SOUTH DYNAMICS OF HYPERBOLIC FREE GROUP
AUTOMORPHISMS ON THE SPACE OF CURRENTS
arXiv:1509.05443v3 [math.GR] 29 Jun 2017
MARTIN LUSTIG AND CAGLAR UYANIK
Abstract. Let ϕ be a hyperbolic outer automorphism of a non-abelian free group FN
such that ϕ and ϕ−1 admit absolute train track representatives. We prove that ϕ acts on
the space of projectivized geodesic currents on FN with generalized uniform North-South
dynamics.
1. Introduction
Thurston’s groundbreaking work on the classification of surface homeomorphisms (NielsenThurston classification) has triggered much of the progress on the mapping class group and on
the Teichmüller space in the past 30 years. This theory has inspired important developments
for several related groups; most notably for the group Out(FN ) of outer automorphisms of
a non-abelian free group FN of finite rank N ≥ 2.
Two rather different spaces on which Out(FN ) acts serve as analogues to Teichmüller
space: One is Culler-Vogtmann’s Outer space CVN [CV86], the other is the space of projectivized geodesic currents PCurr(FN ) [Bon91]. An intersection form, generalizing Thurston’s
celebrated intersection form for measured laminations [Thu88], intimately intertwines the
two spaces [KL09].
The space CVN is finite dimensional, and the action of Out(FN ) on CVN is properly
discontinuous. Moreover, CVN has a natural “Thurston boundary”, which gives rise to a
compactification CVN . The Out(FN )-action extends to this compactification, which mimics
closely Thurston’s compactification of the Teichmüller space via projective measured laminations [BF93], [CL95], [CV86], [Thu88].
On the other hand, the space of projectivized geodesic currents PCurr(FN ) is infinite
dimensional, but it is already compact, and has a projective structure. There is a natural
“interior” of PCurr(FN ) on which Out(FN ) acts properly discontinuously [KL10a].
The space CVN has received more attention in recent years than PCurr(FN ), due to the
connections with various curve complex analogues (see e.g. [BF14], [HM13]). Nevertheless,
for several purposes, including some rather fundamental ones, the space PCurr(FN ) seems to
have an advantage over CVN . In order get a deeper understanding one often needs to utilize
the action of Out(FN ) on both spaces simultaneously, see for instance [BR15], [Ham12].
February 12, 2018.
The authors gratefully acknowledge support from U.S. National Science Foundation grants DMS 1107452,
1107263, 1107367 “RNMS: GEometric structures And Representation varieties” (the GEAR Network).” The
first author was partially supported by the French research grant ANR-2010-BLAN-116-01 GGAA. The
second author was partially supported by the NSF grants of Ilya Kapovich (DMS 1405146 and DMS 1710868)
and Christopher J. Leininger (DMS 1510034).
1
2
MARTIN LUSTIG AND CAGLAR UYANIK
This paper concerns one of the fundamental features prominently present in NielsenThurston theory: the dynamics of the action of individual elements ϕ ∈ Out(FN ) on
PCurr(FN ), and the study of the relationship between aspects of this dynamics and the
algebraic structure of ϕ. More precisely, the paper aims to generalize Thurston’s result that
any pseudo-Anosov mapping class acts on compactified Teichmüller space with North-South
dynamics [Thu88, Iva92]
An important result in this direction is already known for both of the above mentioned
Out(FN )-analogues of Teichmüller space: If the automorphism ϕ ∈ Out(FN ) is fully irreducible, also known as iwip (“irreducible with irreducible powers”), then the ϕ-action
on both, CVN and PCurr(FN ), has uniform North-South dynamics, see [LL03], [Mar95],
[Uya14] and [Uya15]. The pairs of poles of these two actions are strongly related to each
other through the above mentioned intersection form, see [CHL08], [KL10b], [Uya15].
In this paper we concentrate on the following class of automorphisms: An element ϕ ∈
Out(FN ) is called hyperbolic if the length of any non-trivial conjugacy class grows exponentially under iteration of ϕ. This condition turns out to be equivalent to requiring that ϕ is
atoroidal, i.e. ϕ has no non-trivial periodic conjugacy class in FN .
Recall that both classes, fully irreducible and hyperbolic automorphisms, can be viewed as
natural analogues of pseudo-Anosov mapping classes. In a probabilistic sense, both of these
notions are “generic” in Out(FN )[Riv08], as is the case for pseudo-Anosov homeomorphisms
in mapping class groups [Riv08, Mah11]. Hyperbolic automorphisms have the advantage that
their mapping torus groups FN oϕ Z are Gromov hyperbolic, see [BF92], [Bri00]. However,
hyperbolic automorphisms can admit invariant free factors and hence these automorphisms
are harder to study than fully irreducible automorphisms. As a consequence of the more
complicated algebraic structure, one can not expect a classical North-South dynamics for
hyperbolic automorphisms. Counterexamples for both, CVN and PCurr(FN ) are easy to
construct.
Nevertheless, it turns out that there are still strong North-South dynamical features in the
action of any hyperbolic ϕ ∈ Out(FN ) on the space of currents. This paper aims to make
this statement precise: We define “generalized North and South poles” in PCurr(FN ), which
are finite dimensional simplexes ∆+ (ϕ) and ∆− (ϕ), and show:
Theorem 1.1. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism with the property that
both ϕ and ϕ−1 admit (absolute) train track representatives. Then ϕ acts on PCurr(FN ) with
“generalized uniform North-South dynamics from ∆− (ϕ) to ∆+ (ϕ)” in the following sense:
Given a neighborhood U of ∆+ (ϕ) and a compact set K ⊂ PCurr(FN ) r ∆− (ϕ), there
exists an integer M ≥ 1 such that ϕn (K) ⊂ U for all n ≥ M .
Similarly, given a neighborhood V of ∆− (ϕ) and a compact set K 0 ⊂ PCurr(FN ) r ∆+ (ϕ),
there exists an integer M 0 ≥ 1 such that ϕ−n (K 0 ) ⊂ V for all n ≥ M 0 .
Although there exist hyperbolic automorphisms that do not admit (absolute) train track
representatives (see Sections 2.3 and 2.4), the train track assumption in the above theorem
turns out to be not really restrictive (see Remark 2.6). Our train track technology (see
Section 4) has been purposefully set up in a way that it also applies to more general kind
of train track maps. Since the paper is already technically rather loaded, we have refrained
from adding such generalizations here.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
3
The second dynamics result obtained here concerns single orbits of rational currents, that
is, currents given by non-trivial conjugacy classes in FN , which form a dense subset of
PCurr(FN ), see Section 2.5:
Theorem 1.2. Let ϕ be as in Theorem 1.1, and let µ ∈ Curr(FN ) be a non-zero rational
current.
Then, after possibly replacing ϕ by a positive power, there are [µ∞ ] ∈ ∆+ (ϕ) and [µ−∞ ] ∈
∆− (ϕ) such that
lim ϕn [µ] = [µ∞ ]
n→∞
and
lim ϕ−n [µ] = [µ−∞ ].
n→∞
It is important to point out that this pointwise convergence is in general not uniform: On
the contrary, it is possible to construct examples of hyperbolic ϕ for which there exist rational
currents that linger for an arbitrary long iteration time in an arbitrary close neighborhood
of a (fixed) current that is different from the eventual limit current.
We now give a brief outline of the paper. We’d like to point out immediately that the
sections 3, 4 and 5 are written independently of each other and can be read in arbitrary
order.
• In Section 2 we recall some background information and set up notation that is
needed in the sections to follow.
• In Section 3 we define several versions of North-South dynamics (in a general context without reference to Out(FN ) or currents) and derive the main criterion (Propositions
3.3 and 3.4) used in the proof of Theorem 1.1.
• Section 4 is entirely devoted to train track technology, addressing issues such as indivisible Nielsen paths (INPs), exponential growth of the number of illegal turns under
backwards iteration, etc. Moreover, we recall and investigate the notion of “goodness” which plays a key role in our analysis. We conclude Section 4 with Proposition
4.20 (see also Remark 4.21). This proposition is a crucial tool in our approach,
since it permits the restriction of our attention in the convergence approximation to
conjugacy classes with large goodness.
• In Section 5 we present some standard notions from symbolic dynamics and use the
main result from our previous paper [LU17] on limit frequencies of substitutions in
order to define the limit simplexes ∆+ (ϕ) and ∆− (ϕ) and show their ϕ-invariance
(Corollary 5.12).
• In Section 6 the crucial convergence approximation is calculated for conjugacy classes
with large goodness (Lemma 6.1), done carefully over several pages. The main results
are derived from “putting together the pieces” derived previously. We finish this
section with a particular “free products” example of hyperbolic outer automorphisms
which are not fully irreducible.
Acknowledgements: We would heartfully like to thank Ilya Kapovich for his constant
encouragement and support, as well as for many helpful mathematical and organizational
suggestions. We would also like to thank Arnaud Hilion and Matt Clay for useful exchanges
and helpful comments. We thank the anonymous referee who provided detailed feedback,
4
MARTIN LUSTIG AND CAGLAR UYANIK
and prompted us to clarify several points and improve the exposition. The second author is
grateful to Chris Leininger for useful discussions, support, and helpful comments.
2. Preliminaries
We first recall facts about graphs, paths, and maps between graphs. For an even more
detailed discussion of these notions we refer reader to Section 2 of [DKL15]. For a streamlined
version which uses the standard conventions the reader is referred to [LU16].
2.1. Graphs. A topological graph Γ is a 1-dimensional finite cell complex. The 0-cells of
Γ are called vertices and the set of vertices is denoted by V Γ. The 1-cells of Γ are called
topological edges and the set of topological edges is denoted by Etop Γ. Each topological edge
admits exactly two orientations, and we call a topological edge with a choice of orientation
an oriented edge. The set of all oriented edges is denoted by EΓ. Given e ∈ EΓ, we denote
the edge with the opposite orientation by e. Given a finite set of points in a topological graph
Γ, one obtains a topological graph Γ0 as the subdivision, in which the vertex set contains the
original vertex set, together with the finite set of points.
Let Γ be a topological graph. We choose an orientation for each edge, and denote the
set of positively (resp. negatively) oriented edges by E + Γ ( resp. E − Γ). Given an edge
e ∈ E + Γ, the initial vertex of e is denoted by o(e) and the terminal vertex of e is denoted
by t(e).
The graph Γ is equipped with a natural metric called the simplicial metric which is
obtained by identifying each edge e of Γ with the interval [0, 1] via a characteristic map
αe : [0, 1] → e, meaning that α is continuous on [0, 1] and the restriction to (0, 1) is an
orientation preserving homeomorphism onto the interior of e.
2.2. Paths. A combinatorial edge path γ of simplicial length n ≥ 1 is a concatenation
e1 e2 . . . en of oriented edges of Γ where t(ei ) = o(ei+1 ). The simplicial length of an edge path
γ in Γ is denoted by |γ|Γ , and if it is clear from the context, we suppress Γ and write |γ|.
A topological edge path of simplicial length n ≥ 1 is a continuous map p : [a, b] → Γ such
that there exists a combinatorial edge path γp = e1 e2 . . . en and a subdivision a = c0 < c1 <
c2 < . . . < cn = b such that for each 1 ≤ i ≤ n we have p(ci−1 ) = o(ei ), and p(ci ) = t(ei ) and
the restriction of p to (ci−1 , ci ) is an orientation preserving homeomorphism onto the interior
of ei . We say that γp is the combinatorial edge path associated to p.
Let Γ be equipped with the simplicial metric as above. A topological edge path p : [a, b] →
Γ is a PL edge path if for every edge ei in the combinatorial edge path γp the composition
αe−1
◦ p : (ci−1 , ci ) → (0, 1) is the unique orientation preserving affine homeomorphism from
i
(ci−1 , ci ) to (0, 1). By not requiring that p(a) and p(b) are vertices in Γ, the concept of PL
edge paths easily extend to PL paths.
A combinatorial edge path of simplicial length 0 consists of a vertex in Γ. A (degenerate)
edge path γ that consists of a vertex is called trivial. A combinatorial edge path γ is called
reduced if ei 6= ei+1 for all i = 1, . . . , n − 1. A reduced edge path is called cyclically reduced
if t(en ) = o(e1 ) and en 6= e1 . A topological or PL edge path is called reduced (resp. trivial) if
the corresponding combinatorial edge path is reduced (resp. trivial). More generally, a PL
path is called reduced if p : [a, b] → Γ is locally injective.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
5
2.3. Graph maps. A topological graph map f : Γ → Γ is a continuous map that sends
vertices to vertices, and edges to topological edge paths. The latter means that for any edge
e and a characteristic map αe : [0, 1] → Γ, the composition f ◦ αe : [0, 1] → Γ is a topological
edge path as above.
A linear graph map is a topological graph map f : Γ → Γ as above which, in addition,
satisfies the following condition: For every e ∈ Γ, the restriction of f to e is a PL edge path
from f (o(e)) to f (t(e)).
Note that given a topological graph map f : Γ → Γ there is a linear graph map from Γ to
itself that is homotopic to f relative to vertices.
Definition 2.1. We say that a topological graph map f : Γ → Γ is regular if for all e ∈ EΓ
the (combinatorial) edge path (associated to) f (e) is non-trivial and reduced. The map f is
called expanding if for every edge e ∈ EΓ there is an exponent t ≥ 1 such that the edge path
f t (e) has simplicial length |f t (e)| ≥ 2.
A turn in Γ is a pair (e1 , e2 ) where o(e1 ) = o(e2 ). A turn is called non-degenerate if
e1 6= e2 , otherwise it is called degenerate. A regular graph map f : Γ → Γ induces a
derivative map Df : EΓ → EΓ where Df (e) is the first edge of the combinatorial edge
path associated to f (e). The derivative map induces a map T f on the set of turns defined
as T f ((e1 , e2 )) := (Df (e1 ), Df (e2 )). A turn (e1 , e2 ) is called legal if T f n ((e1 , e2 )) is nondegenerate for all n ≥ 0. An edge path γ = e1 e2 . . . en is called legal if every turn (ei , ei+1 )
in γ is legal.
Remark-Convention 2.2. (1) For the rest of this paper, a path means a PL path. Also note
that, given a combinatorial edge path γ in Γ there is always a PL edge path p : [a, b] → Γ such
that γp = γ. Hence, by an edge path we will either mean a PL edge path or a combinatorial
edge path and won’t make a distinction unless it is not clear from the context.
(2) Similarly, from now on, unless otherwise stated, a graph map means a linear graph map
as defined above.
Definition 2.3. A graph map f : Γ → Γ is called a train track map if for every edge e and
any t ≥ 1 the edge path f t (e) is legal.
2.4. Markings and topological representatives. Let FN denote a free group of finite
rank N ≥ 2 which we fix once and for all. A graph Γ is said to be marked, if it is equipped
∼
=
with a marking isomorphism θ : FN −→ π1 Γ. Markings are well defined only up to inner
automorphisms, which is why we suppress the choice of a base point in Γ.
A homotopy equivalence f : Γ → Γ is a topological representative of an automorphism
∼
=
ϕ ∈ Out(FN ) with respect to the marking θ : FN −→ π1 Γ if one has ϕ = θ−1 f∗ θ. A graph
map f : Γ → Γ is called a train track representative for ϕ if f is a topological representative
for ϕ and f is a train track map.
Remark 2.4. If a topological graph map f : Γ → Γ represents a hyperbolic outer automorphism ϕ of FN , then the hypothesis that f be expanding is easy to satisfy: It suffices to
contract all edges which are not expanded by any iterate f t to an edge path of length ≥ 2:
The contracted subgraph must be a forest, as otherwise some f t would fix a non-contractible
loop and hence ϕt would fix a non-trivial conjugacy class of π1 (Γ) ∼
= FN , contradicting the
6
MARTIN LUSTIG AND CAGLAR UYANIK
assumption that ϕ is hyperbolic. It is easy to see that, if f is a train track map, then this
property is inherited by the above “quotient map”.
Given an (not necessarily reduced) edge path γ ∈ Γ, let [γ] denote the reduced edge path
which is homotopic to γ relative to endpoints. The following is a classical fact for free group
automorphisms:
Lemma 2.5 (Bounded Cancellation Lemma). [Coo87] Let f : Γ → Γ be topological graph
map that is a homotopy equivalence. There exist a constant Cf , depending only on f , such
that for any reduced edge path ρ = ρ1 ρ2 in Γ one has
|[f (ρ)]| ≥ |[f (ρ1 )]| + |[f (ρ2 )]| − 2Cf .
That is, at most Cf terminal edges of [f (ρ1 )] are cancelled against Cf initial edges of [f (ρ2 )]
when we concatenate them to obtain [f (ρ)].
Remark 2.6. In Section 4 of this paper we will consider train track maps f : Γ → Γ that
are not assumed to be homotopy equivalences. We do, however, assume that f possesses
a cancellation bound: there is an integer C ≥ 0 such that for any two legal edge paths γ
and γ 0 with common initial vertex but distinct initial edges the backtracking path γ 00 at the
image of the concatenation point of the non-reduced path f (γ ◦ γ 0 ) has combinatorial length
|γ 00 | ≤ C. The smallest such integer C is denoted by C(f ).
The reason for not imposing the homotopy equivalence condition is to make the results and
techniques of this paper available for the study of free group endomorphisms, as well as for
the use of more general type of train track maps in the context of free group automorphisms.
Definition 2.7. A path η in Γ which crosses over precisely one illegal turn is called a periodic
indivisible Nielsen path (or INP, for short), if for some exponent t ≥ 1 one has [f t (η)] = η.
The smallest such t is called the period of η. A path γ is called pre-INP if its image under
f t0 is an INP for some t0 ≥ 1. The illegal turn on η = γ 0 ◦ γ is called the tip of η, while the
two maximal initial legal subpaths γ 0 and γ, of η and η respectively, are called the branches
of η. A multi-INP or a Nielsen path is a legal concatenation of finitely many INP’s.
If f is an expanding train track map, then any non-trivial reduced path η, such that f t (η)
is homotopic to η relative to endpoints for some t ≥ 1, can be written as a legal concatenation
of finitely many INP’s. This can be seen by a direct elementary argument; alternatively it
follows from Proposition 4.12.
The reader should be aware of the fact that a priori the endpoints of an INP may not be
vertices of Γ (compare with Convention 4.7 below).
2.5. Geodesic Currents on Free Groups. Let FN be the free group of finite rank N ≥ 2,
and denote by ∂FN the Gromov boundary of FN . The double boundary of FN is defined by
∂ 2 FN := (∂FN × ∂FN ) r ∆,
where ∆ denotes the diagonal. The flip map on ∂ 2 FN is defined by
(ξ, ζ) 7→ (ζ, ξ).
A geodesic current µ on FN is a locally finite, Borel measure on ∂ 2 FN which is flip and
FN -invariant. The set of all geodesic currents on FN is denoted by Curr(FN ). The space of
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
7
currents is naturally equipped with the weak*-topology. In particular, a sequence of currents
µn ∈ Curr(FN ) satisfies
lim µn = µ iff
n→∞
lim µn (S1 × S2 ) = µ(S1 × S2 )
n→∞
for any two disjoint Borel subsets S1 , S2 ⊂ ∂FN .
An immediate example of a geodesic current is given by any non-trivial conjugacy class
in FN : For an element g ∈ FN which is not a proper power (i.e. g 6= hk for any h ∈ FN
and any k ≥ 2) define the counting current ηg as follows: for any Borel set S ⊂ ∂ 2 FN the
value ηg (S) is the number of FN -translates of (g −∞ , g ∞ ) or of (g ∞ , g −∞ ) that are contained
in S. For an arbitrary element h ∈ FN r {1} write h = g k , where g is not a proper power,
and define ηh := kηg . It is easy to see that this definition is independent of the particular
representative of the conjugacy class of h, so that ηh depends only on [h] ⊂ FN . The set of
all non-negative real multiples of a counting current is called rational currents, and it is an
important fact that rational currents are dense in Curr(FN ), see [Kap05], [Kap06].
Let Φ ∈ Aut(FN ) be an automorphism of FN . Since Φ induces homeomorphisms on
∂FN and on ∂ 2 FN , there is a natural action of Aut(FN ) on the space of currents: For any
Φ ∈ Aut(FN ), µ ∈ Curr(FN ) and any Borel subset S ⊂ ∂ 2 FN one has
Φµ(S) := µ(Φ−1 (S)).
Note that any inner automorphism of FN acts trivially, so that the above action factors
through the quotient of Aut(FN ) by all inner automorphisms to give a well defined action of
Out(FN ) on Curr(FN ).
The space of projectivized geodesic currents is defined as the quotient
PCurr(FN ) =: Curr(FN ) ∼
where µ1 ∼ µ2 in Curr(FN ) if and only µ1 = λµ2 for some λ > 0. We denote the projective
class of the current µ by [µ].
We derive from the above stated facts:
Proposition 2.8. (1) The space PCurr(FN ) is a compact metric space, and the above actions
of Aut(FN ) and Out(FN ) on Curr(FN ) descend to well defined actions on PCurr(FN ) by
setting
ϕ[µ] := [ϕµ].
(2) The subset of PCurr(FN ) defined by all rational currents is dense in PCurr(FN ).
For any marked graph Γ the marking isomorphism θ : FN → π1 Γ gives rise to canonical
FN -equivariant homeomorphisms between the Gromov boundaries and double boundaries of
e which for simplicity we also denote by θ.
the group FN and of the universal cover Γ,
e We define the cylinder set associated to γ
Let γ
e be a reduced edge path in Γ.
e as follows:
Cyl(e
γ ) := {(ξ, ζ) ∈ ∂FN | γ
e is a subpath of [∂θ(ξ), ∂θ(ζ)]}
where [∂θ(ξ), ∂θ(ζ)] denotes the biinfinite reduced edge path that joins the end ∂θ(ξ) to the
e
end ∂θ(ζ) of Γ.
8
MARTIN LUSTIG AND CAGLAR UYANIK
e We
Let γ be a reduced edge path in Γ and let µ ∈ Curr(FN ). Let γ
e be a lift of γ to Γ.
define
hγ, µi := µ(Cyl(e
γ ))
and note that the FN -equivariance for geodesic currents implies that the value µ(Cylα (e
γ ))
does not depend on the particular lift γ
e we chose, so we have a well defined quantity hγ, µi.
Note also that in case of a rational current µ = ηg the quantity hγ, µi is given by the
number of occurrences of γ or of γ in the reduced loop [γ] which represents the conjugacy
class [g]. Moreover, the action of Out(FN ) on rational currents is given explicitly by the
formula
(2.1)
ϕηg = ηϕ(g) .
An important fact about cylinder sets is that they form a basis for the topology on ∂ 2 FN , so
that a geodesic current µ is uniquely determined by the set of values hγ, µi for all non-trivial
reduced edge paths γ in Γ, see [Kap06].
In particular, we have lim µn = µ if and only if lim hγ, µn i = hγ, µi for all reduced edge
n→∞
n→∞
paths γ in Γ.
Moreover, if we denote by P(Γ) the set of reduced edge paths in Γ, then the function
µΓ : P(Γ) → R≥0 , γ 7→ hγ, µi
satisfies for all γ ∈ P(Γ):
P
(1) µΓ (γ) =
µΓ (γ 0 ) =
γ 0 ∈E+ (γ)
P
µΓ (γ 00 ), and
γ 0 ∈E− (γ)
(2) µΓ (γ) = µΓ (γ),
where E+ (γ) ⊂ P(Γ) and E− (γ) ⊂ P(Γ) denote the set of reduced edge paths obtained from
γ by adding a further edge at the beginning or at the end respectively.
Any function µ0Γ : P(Γ) → R≥0 which satisfies (1) and (2) above is called a Kolmogorov
function, and it is well known (see [Kap05, Kap06]) that any such µ0Γ defines uniquely a
geodesic current µ on FN which satisfies µΓ = µ0Γ .
Let Γ be a marked graph as above. Given a geodesic current µ ∈ Curr(FN ), define the
weight of µ with respect to Γ as
X
(2.2)
kµkΓ :=
he, µi.
e∈E + Γ
The following criterion given in [Kap06] plays a key role in our convergence estimates in
Section 6.
Lemma 2.9. Let ([µn ])n∈N be a sequence of currents in PCurr(FN ). Then one has lim [µn ] =
n→∞
[µ] in PCurr(FN ) if and only if
hγ, µn i
hγ, µi
=
n→∞ kµn kΓ
kµkΓ
lim
holds for all reduced edge paths γ in Γ.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
9
3. North-South dynamics
In this section we describe some general considerations for maps with North-South dynamics. We will keep the notation simple and general; at no point we will refer to the specifics of
currents on free groups. However, in this section we will prove the main criteria used in the
remainder of the paper to establish the North-South dynamics result in our main theorem.
Definition 3.1. Let f : X → X be homeomorphism of a topological space X.
(a) The map f is said to have (pointwise) North-South dynamics if f has two distinct fixed
points P+ and P− , called attractor and repeller, such that for every x ∈ X r {P+ , P− } one
has:
lim f t (x) = P+
and
lim f t (x) = P− .
t→∞
t→−∞
(b) The map f is said to have uniform North-South dynamics if the following holds: There
exist two distinct fixed points P− and P+ of f , such that for every compact set K ⊂ X r{P− }
and every neighborhood U+ of P+ there exists an integer t+ ≥ 0 such that for every t ≥ t+
one has:
f t (K) ⊂ U+ .
Similarly, for every compact set K ⊂ X r {P+ } and every neighborhood U− of P− there
exists an integer t− ≤ 0 such that for every t ≤ t− one has:
f t (K) ⊂ U− .
It is easy to see that uniform North-South dynamics implies pointwise North-South dynamics.
Definition 3.2. A homeomorphism f : X → X of a topological space X has generalized
uniform North-South dynamics if there exist two disjoint compact f -invariant sets ∆+ and
∆− in X, such that the following hold:
(i) For every compact set K ⊂ X r ∆− and every neighborhood U+ of ∆+ there exists
an integer t+ ≥ 0 such that for every t ≥ t+ one has:
f t (K) ⊂ U+
(ii) For every compact set K ⊂ X r ∆+ and every neighborhood U− of ∆− there exists
an integer t− ≤ 0 such that for every t ≤ t− one has:
f t (K) ⊂ U−
More precisely, we say that the map f has generalized uniform North-South dynamics
from ∆− to ∆+ . Note that we interpret the phrase “f -invariant” in its strong meaning, i.e.
f (∆+ ) = ∆+ and f (∆− ) = ∆− .
Proposition 3.3. Let f : X → X be a homeomorphism of a compact metrizable space X.
Let Y ⊂ X be dense subset of X, and let ∆+ and ∆− be two f -invariant sets in X that are
disjoint. Assume that the following criterion holds:
For every neighborhood U of ∆+ and every neighborhood V of ∆− there exists an integer
m0 ≥ 1 such that for any m ≥ m0 and any y ∈ Y one has either f m (y) ∈ U or f −m (y) ∈ V .
Then f 2 has generalized uniform North-South dynamics from ∆− to ∆+ .
10
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. Let K ⊂ X r ∆− be compact, and let U and V be neighborhoods of ∆+ and ∆−
respectively. See Figure 1.
X
V
U
U0
∆−
∆+
W
K
Figure 1.
Let W be an open neighborhood of K such that W ∩ V = ∅. Since X is compact, the
closure W is compact. Then V1 := V r W is again an open neighborhood of ∆− , moreover it
is disjoint from W . Let U1 be a neighborhood of ∆+ which has the property that its closure
is contained in the interior of U . Such a neighborhood exists because X is a metrizable
space.
Let m0 be as postulated in the criterion, applied to the neighborhoods U1 and V1 , and
pick any m ≥ m0 . Consider any y ∈ Y ∩ f m (W ). Notice that f −m (y) is contained in W ,
which is disjoint from V1 . Thus, by the assumed criterion, f m (y) must be contained in U1 .
Since W is open and f is a homeomorphism, any dense subset of X must intersect f m (W )
in a subset that is dense in f m (W ). This implies that f m (f m (W )) ⊆ U1 ⊂ U . Since K ⊂ W ,
this shows that f 2m (K) ⊂ U .
Using the analogous argument for the inverse iteration we see that f 2 has generalized
uniform North-South dynamics from ∆− to ∆+ .
u
t
Proposition 3.4. Let f : X → X be a homeomorphism of a compact space X, and let ∆+
and ∆− be disjoint f -invariant sets. Assume that some power f s with s ≥ 1 has generalized
uniform North-South dynamics from ∆− to ∆+ .
Then the map f , too, has generalized uniform North-South dynamics from ∆− to ∆+ .
Proof. Let K ⊂ X r ∆− be compact, and let U be an open neighborhood of ∆+ .
Set K 0 := K ∪ f (K) ∪ . . . ∪ f s−1 (K), which is again compact. Note that the fact that
K ⊂ X r ∆− and f −1 (∆− ) = ∆− implies that K 0 ⊂ X r ∆− . Indeed, x ∈ K 0 implies that
x = f t (y) for some y ∈ K and for some 0 ≤ t ≤ s − 1.
Thus x ∈ ∆− would imply that y = f −t (x) ∈ f −1 (∆− ) = ∆− , contradicting the assumption K ∩ ∆− = ∅.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
11
From the hypothesis that f s has generalized uniform North-South dynamics from ∆− to
0
∆+ it follows that there is a bound t0 such that for all t0 ≥ t0 one has f t s (K 0 ) ⊂ U .
Hence, for any point x ∈ K and any integer t ≥ st0 , we can write t = k + st0 with t0 ≥ t0
and 0 ≤ k ≤ s − 1 to obtain the desired fact
0
0
f t (x) = f k+st (x) = f st f k (x) ∈ f st (K 0 ) ⊂ U.
The analogous argument for f −1 finishes the proof of the Lemma.
u
t
4. Train-Tracks
In this section we will consider train track maps which satisfy the following properties:
Convention 4.1. Let Γ be a finite connected graph, and let f : Γ → Γ be an expanding train
track map which possesses a cancellation bound Cf ≥ 0 as defined in Remark 2.6. We also
assume that f has been replaced by a positive power so that for some integers λ00 ≥ λ0 > 1
we have, for any edge e of Γ:
λ00 ≥ |f (e)| ≥ λ0
(4.1)
and λ0 , λ00 is attained for some edges.
4.1. Goodness.
The following terminology was introduced by R. Martin in his thesis [Mar95].
Definition 4.2. Let f : Γ → Γ, Cf and λ0 be as in Convention 4.1. Define the critical
Cf
constant C for f as C := 0
. Let γ be a reduced edge path in Γ. Any edge e in γ that is
λ −1
at least C edges away from an illegal turn on γ is called good, where the distance (= number
of edges traversed) is measured on γ. An edge is called bad if it is not good. Edge paths or
loops, in particular subpaths of a given edge path, which consist entirely of good (or entirely
of bad) edges are themselves called good (or bad).
For any edge path or a loop γ in Γ we define the goodness of γ as the following quotient:
#{good edges of γ}
g(γ) :=
∈ [0, 1]
|γ|
We will now discuss some basic properties of the goodness of paths and loops. We first
consider any legal edge path γ in Γ of length |γ| = C and compute:
(4.2)
|f (γ)| ≥ λ0 |γ| = λ0 C = Cf + C
Lemma 4.3. Let f : Γ → Γ and λ0 be as in Convention 4.1. Let γ be a reduced edge path or
a cyclically reduced loop in Γ. Then any good subpath γ 0 of γ has the property that no edge
of f (γ 0 ) = [f (γ 0 )] is cancelled when f (γ) is reduced, and that it consists entirely of edges that
are good in [f (γ)]. Hence, for any reduced loop γ in Γ we have:
#{good edges in [f (γ)]} ≥ λ0 · #{good edges in γ}
Proof. If γ is legal, then every edge is good, and the lemma follows directly from the definition
of λ0 in Convention 4.1. Now assume that the path γ has at least one illegal turn. Let
γ = γ1 B1 γ2 B2 . . . γn Bn
12
MARTIN LUSTIG AND CAGLAR UYANIK
b2
a1
γ1
a2
Figure 2. ai ’s are legal ends of maximal bad segments, γ is a good (legal) segment
be a decomposition of γ into maximal good edge paths γi and maximal bad edge paths Bi .
Note that each maximal bad segment Bi can be written as an illegal concatenation Bi =
ai bi ai+1 where ai is a legal segment of length C and bi is an edge path that (possibly) contains
some illegal turns.
Note that since |f (ai )| ≥ λ0 |ai | ≥ λ0 C = Cf +C, Lemma 2.5 implies that [f (Bi )] is an edge
path of the from [f (Bi )] = a0i b0i c0i where a0i , c0i are legal edge paths such that |a0i |, |c0i | ≥ C.
Moreover, the turn at f (γi )a0i is legal. Since by Convention 4.1 every edge grows at least by
a factor of λ0 , this implies the required result.
u
t
On the other hand, for any cyclically reduced loop γ the number of bad edges is related
to the number of illegal turns on γ, which we denote by ILT (γ), via:
(4.3)
ILT (γ) ≤ #{bad edges in γ} ≤ 2C · ILT (γ)
Since the number of illegal turns on γ can only stay constant or decrease under iteration of
the train track map, we obtain directly
(4.4)
#{bad edges in [f t (γ)]} ≤ 2C · ILT (γ) ≤ 2C · #{bad edges in γ}
for all positive iterates f t of f .
Notice however that the number of bad edges may actually grow (slightly) faster than the
number of good edges under iteration of f , so that the goodness of γ does not necessarily
grow monotonically under iteration of f . Nevertheless up to passing to powers one can
overcome this issue:
Proposition 4.4. Let f : Γ → Γ be as in Convention 4.1.
(a) There exists an integer s ≥ 1 such that for every reduced loop γ in Γ one has:
g([f s (γ)]) ≥ g(γ)
In particular, for any integer t ≥ 0 one has
g([(f s )t (γ)]) ≥ g(γ)
(b) If 0 < g(γ) < 1, then for any integer s0 > s we have
0
g([f s (γ)]) > g(γ)
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
13
and thus, for any t ≥ 0:
0
g([(f s )t (γ)]) > g(γ)
Proof. (a) We set s ≥ 1 so that λ0 s ≥ 2C and obtain from Lemma 4.3 for the number g 0 of
good edges in [f s (γ)] and the number g of good edges in γ that:
s
g 0 ≥ λ0 g
For the number b0 of bad edges in [f s (γ)] and the number b of bad edges in γ we have from
equation (4.4) that:
b0 ≤ 2Cb
Thus we get
g0
g
g0
λ0s g
g
≥
and
hence
≥
≥
0
0
0
b
2C b
b
g +b
g+b
s
which proves g([f (γ)]) ≥ g(γ). The second inequality in the statement of the lemma follows
directly from an iterative application of the first.
(b) The proof of part (b) follows from the above given proof of part (a), since λ0 s > 2C
unless there is no good edge at all in γ, which is excluded by our hypothesis 0 < g(γ). Since
the hypothesis g(γ) < 1 implies that there is at least one illegal turn in γ, in the above proof
we get b ≥ 1, which suffices to show
g0
g
> ,
0
b
b
s
and thus g([f (γ)]) > g(γ).
u
t
From the inequalities at the end of part (a) of the above proof one derives directly, for
g > 0, the inequality
1
g([f s (γ)]) ≥
.
2C
1
1 + λ0s ( g(γ)
− 1)
Hence we obtain:
Corollary 4.5. Let f : Γ → Γ be as in Convention 4.1, and let δ > 0 and ε > 0 be given.
Then there exist an integer M 0 = M 0 (δ, ε) ≥ 0 such that for any loop γ in Γ with g(γ) ≥ δ
we have g([f m (γ)]) ≥ 1 − ε for all m ≥ M 0 .
u
t
4.2. Illegal turns and iteration of the train track map.
The following lemma (and also other statements of this subsection) are already known in
differing train track dialects (compare for example Lemma 4.2.5 in [BFH00]); for convenience
of the reader we include here a short proof. Recall the definition of an INP and a pre-INP
from Definition 2.7.
Lemma 4.6. Let f : Γ → Γ be as in Convention 4.1. Then there are only finitely many
INP’s and pre-INP’s in Γ for f . Furthermore, there is an efficient method to determine
them.
14
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. We consider the set V of all pairs (γ1 , γ2 ) of legal edge paths γ1 , γ2 with common
initial vertex but distinct first edges, which have combinatorial length |γ1 | = |γ2 | = C. Note
that V is finite.
From the definition of the cancellation bound and the inequalities (4.1) it follows directly
that every INP or every pre-INP η must be a subpath of some path γ 1 ◦ γ2 with (γ1 , γ2 ) ∈ V.
Furthermore, we define for i = 1 and i = 2 the initial subpath γi∗ of γi to consist of all points
x of γi that are mapped by some positive iterate f t into the backtracking subpath at the
tip of the unreduced path f t (γ 1 ◦ γ2 ). We observe that the interior of any INP-subpath or
pre-INP-subpath η of γ 1 ◦ γ2 must agree with the subpath γ ∗1 ◦ γ2∗ . Thus any pair (γ1 , γ2 ) ∈ V
can define at most one INP-subpath of γ 1 ◦ γ2 . Since V is finite and easily computable, we
obtain directly the claim of the lemma.
u
t
In light of Lemma 4.6, we obtain a subdivision Γ0 of Γ by adding the endpoints of all the
finitely many INP’s or pre-INP’s, while keeping the property that f maps vertices to vertices.
This gives a train track map f 0 : Γ0 → Γ0 which represents the same outer automorphism
as f : Γ → Γ, thus justifying that from now on we concentrate on train track maps which
satisfy the following:
Convention 4.7. Let f : Γ → Γ be a train track map as in Convention 4.1. We assume in
addition that every endpoint of an INP or a pre-INP is a vertex.
Lemma 4.8. Let f : Γ → Γ be as in Convention 4.7. Then, there exists an exponent M1 ≥ 1
with the following property: Let γ be a path in Γ, and assume that it contains precisely two
illegal turns, which are the tips of INP-subpaths or pre-INP-subpaths η1 and η2 of γ. If η1
and η2 overlap in a non-trivial subpath γ 0 , then f M1 (γ) reduces to a path [f M1 (γ)] which has
at most one illegal turn.
Proof. For any point x1 in the interior of one of the two legal branches of an INP or a pre-INP
η there exists a point x2 on the other legal branch such that for a suitable positive power
of f one has f t (x1 ) = f t (x2 ). Hence, if we pick a point x in the interior of γ 0 , there are
points x0 on the other legal branch of η1 and x00 on the other legal branch of η2 such that for
some positive iterate of f one has f t (x0 ) = f t (x) = f t (x00 ). It follows that the decomposition
γ = γ1 ◦ γ2 ◦ γ3 , which uses x0 and x00 as concatenation points, defines legal subpaths γ1 and
γ3 which yield [f t (γ)] = [f t (γ1 ) ◦ f t (γ3 )], which has at most one illegal turn.
Since by Convention 4.7 the overlap γ 0 is an edge path, it follows from the finiteness result
proved in Lemma 4.6 that there are only finitely many constellations for η1 and η2 . This
shows that there must be a bound M1 as claimed.
u
t
Lemma 4.9. For every train track map f : Γ → Γ as in Convention 4.7 there exists a
constant M2 = M2 (Γ) ≥ 0 such that every path γ with precisely 1 illegal turn satisfies the
following:
Either γ contains an INP or pre-INP as a subpath, or else [f M2 (γ)] is legal.
Proof. Similar to the set V in the proof of Lemma 4.6 we define the set V+ be the set of all
pairs (γ1 , γ2 ) of legal edge paths γ1 , γ2 in Γ which have combinatorial length 0 ≤ |γ1 | ≤ C
and 0 ≤ |γ2 | ≤ C, and which satisfy:
The paths γ1 and γ2 have common initial point, and, unless one of them (or both) are
trivial, they have distinct first edges. Note that V+ is finite and contains V as subset.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
15
Following ideas from [CL15] we define a map
f# : V+ → V+
induced by f through declaring the f# -image of a pair (γ1 , γ2 ) ∈ V+ to be the pair f# (γ1 , γ2 ) :=
(γ100 , γ200 ) ∈ V+ which is defined by setting for i ∈ {1, 2}
f (γi ) =: γi0 ◦ γi00 ◦ γi000 ,
where γi0 is the maximal common initial subpath of f (γ1 ) and f (γ2 ), where |γi00 | ≤ C, and
where γi000 is non-trivial only if |γi00 | = C.
Then for any (γ1 , γ2 ) ∈ V+ we see as in the proof of Lemma 4.6 that there exists an
exponent t ≥ 0 such that the iterate f#t (γ1 , γ2 ) =: (γ3 , γ4 ) ∈ V+ satisfies one of the following:
(1) One of γ3 or γ4 (or both) are trivial.
(2) The turn defined by the two initial edges of γ3 and γ4 is legal.
(3) The path γ 3 ◦ γ4 contains an INP as subpath.
From the finiteness of V+ it follows directly that there is an upper bound M2 ≥ 0 such that
for t ≥ M2 one of the above three alternatives must be true for f#t (γ1 , γ2 ) =: (γ3 , γ4 ).
Consider now the given path γ, and write it as illegal concatenation of two legal paths
γ = γ10 ◦ γ20 . Then the maximal initial subpaths γ1 of γ 01 and γ2 of γ20 of γ2 of length |γi | ≤ C
form a pair (γ1 , γ2 ) in V+ . In the above cases (1) or (2) it follows directly that f t (γ) is a
(possibly trivial) legal path. In alternative (3) the path f t (γ) contains an INP.
u
t
Proposition 4.10. For any train track map as in Convention 4.7 there exists an exponent
r = r(f ) ≥ 0 such that every finite path γ in Γ with ILT(γ) ≥ 1 satisfies
ILT([f r (γ)]) < ILT(γ) ,
unless every illegal turn on γ is the tip of an INP or pre-INP subpath ηi of γ, where any two
ηi are either disjoint subpaths on γ, or they overlap precisely in a common endpoint.
Proof. Through considering maximal subpaths with precisely one illegal turn we obtain the
claim as direct consequence of Lemma 4.9 and Lemma 4.8.
u
t
Definition 4.11. A path γ in Γ is called pseudo-legal if it is a legal concatenation of legal
paths and INP’s.
From the same arguments as in the last proof we also deduce the following:
Proposition 4.12. Let f : Γ → Γ be as in Convention 4.7. Then for any finite edge path γ
in Γ there is a positive iterate f t (γ) which reduces to a path γ 0 := [f t (γ)] that is pseudo-legal.
The analogous statement also holds for loops instead of paths. The exponent t needed in
either case depends only on the number of illegal turns in γ.
Proof. Since the number of illegal turns in [f t (γ)] non-strictly decreases for increasing t, we
can assume that for sufficiently large t it stays constant. It follows from Lemma 4.9 (after
possibly passing to a further power of f ) that every illegal turn of [f t (γ)] is the tip of some
INP-subpath ηi of [f t (γ)]. From Lemma 4.8 we obtain furthermore that any two such ηi and
ηj that are adjacent on [f t (γ)] can not overlap non-trivially.
u
t
16
MARTIN LUSTIG AND CAGLAR UYANIK
In the next subsection we also need the following lemma, where illegal (cyclic) concatenation means that the path (loop) is a concatenation of subpaths where all concatenation
points are illegal turns.
Lemma 4.13. Let f : Γ → Γ be an expanding train track map. Let γ be a reduced loop in Γ
and let γ 0 = [f (γ)] be its reduced image loop. Assume that for some t ≥ 1 a decomposition
γ 0 = γ10 ◦γ20 ◦. . .◦γt0 as illegal cyclic concatenation is given. Then there exists a decomposition
as illegal cyclic concatenation γ = γ1 ◦ γ2 ◦ . . . ◦ γt with the property that the reduced image
paths [f (γi )] contain the paths γi0 as subpaths, for i = 1, 2, . . . , t.
Proof. We cut the loop γ at some illegal turn to get a (closed) path γ = e1 e2 . . . eq . We
consider the initial subpaths γ(k) = e1 e2 . . . ek of γ for k = 1, 2, . . .. Let k 0 be the smallest
positive integer such that the reduced image path [f (γ(k 0 ))] contains the path γ10 as a subpath.
Since k 0 is the smallest such integer, it follows that the path f (ek0 ) passes through the last
edge of γ10 . Note that f (ek0 ) is a legal path and that γi0 terminates at an illegal turn, so
that the endpoint of f (ek0 ) must lie somewhere in the backtracking subpath of the possibly
unreduced path [f (e1 e2 . . . ek0 ) ] ◦ [f (ek0 +1 ek0 +2 . . . eq )]. It follows that the reduced image path
[f (ek0 +1 ek0 +2 . . . eq )] contains the path γ20 ◦ . . . ◦ γt0 as subpath.
Thus we define γ1 := γ(k 0 ), and proceed iteratively in precisely the same fashion, thus
finding iteratively γ2 , γ3 , . . . γt−1 . As above, it follows that the “left-over” terminal subpath
of γ has the property that its reduced image contains γt0 as subpath, so that we can define
this left-over subpath to be the final factor path γt .
u
t
4.3. Goodness versus illegal turns. We recall from Definition 2.7 that a multi-INP is a
legal concatenation of finitely many INPs along their endpoints. For the remainder of this
section we will concentrate on graph maps f : Γ → Γ which satisfy the following:
Convention 4.14. Let f : Γ → Γ be an expanding train track map as in Convention 4.7.
We assume furthermore that there is an upper bound A(f ) to the number of INP factor
paths in any multi-INP path γ ∈ Γ. Note that this condition implies in particular that in Γ
there can not be a non-trivial loop which is a cyclic legal concatenation of INPs.
The next lemma shows in particular that an expanding train track map which represents
a hyperbolic outer automorphism naturally satisfies the conditions given in Convention 4.14.
Lemma 4.15. For any expanding train track map f : Γ → Γ, which has the property that no
positive power of f fixes the homotopy class of any non-trivial loop in Γ, there is an upper
bound to the number of INP factors on any multi-INP path.
Proof. There is an upper bound A ≥ 0 for number of INPs in Γ, see Lemma 4.6. Hence, any
multi-INP with more than A(f ) := 2A factors would have to run over the same INP twice
in the same direction. Thus we obtain as subpath a non-trivial loop which is fixed by some
positive power of f , violating the given assumption.
u
t
Lemma 4.16. For any train track map f : Γ → Γ as in Convention 4.14 there exists an
exponent s ≥ 1 such that for any reduced path γ ∈ Γ with reduced image path γ 0 = [f s (γ)]
the following holds: If g(γ 0 ) = 0 and satisfies ILT (γ 0 ) ≥ A(f ) + 1, then
ILT (γ) > ILT (γ 0 ).
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
17
Proof. Since the map f is expanding, for the critical constant C ≥ 0 given in Definition 4.2
there exists an integer s ≥ 1 such that |f s (e)| ≥ 2C + 1 for every edge e ∈ Γ. We can
furthermore assume s ≥ r, where r = r(f ) is given by Lemma 4.10. Thus, by Lemma 4.10
we have
ILT (γ) > ILT (γ 0 ) ,
unless every illegal turn on γ is the tip of an INP or pre-INP ηi , and any two such subpaths
ηi are disjoint or they overlap precisely at a common endpoint.
The case where two such paths are disjoint can be excluded as follows: If there is an edge
e in γ which doesn’t belong to any of the ηi , then f s (e) is a legal subpath of [f s (γ)] = γ 0 of
length greater than 2C + 1, contradicting the assumption that g(γ 0 ) = 0.
Thus we can assume that any two of the subpaths ηi overlap precisely in a common
endpoint, and that there is no non-trivial initial of final subpath of γ outside of the con0
catenation of all the ηi . Therefore, for some s0 ≥ 0, the iterate f s (γ 0 ) is a multi-INP with
ILT (γ 0 ) ≥ A(f ) + 1 factors, which contradicts Convention 4.14. Hence the conclusion of the
Lemma follows.
u
t
Lemma 4.17. Let f : Γ → Γ and A(f ) be as in Convention 4.14. Then there exists a
constant δ with 0 < δ ≤ 1 so that the following holds: Every reduced loop γ in Γ with
ILT (γ) ≥ A(f ) + 1 can be written as cyclic illegal concatenation
γ = γ1 ◦ γ2 . . . ◦ γ2m
such that for every odd index j, the subpath γj is either trivial or satisfies
g(γj ) ≥ δ .
For every even index k the subpath γk is non-trivial and satisfies g(γk ) = 0; moreover, we
have:
A(f ) + 1 ≤ ILT (γk ) ≤ 2A(f ) + 1
Proof. Let Lγ be the collection of maximal legal subpaths γi0 of γ of length |γi0 | ≥ 2C + 1, for
C ≥ 0 as given in Definition 4.2. Note that any two distinct elements γi0 , γj0 in this collection
are either disjoint or overlap at at single point. In the latter case the turn at the overlap
point is illegal, as otherwise they would merge into a longer legal subpath, which violates
0
the maximality of the γi0 . For any two (on γ) consecutive paths γi0 and γi+1
in Lγ , if the path
0
0
βi between them is trivial or satisfies ILT (βi ) ≤ A(f ), then we erase γi and γi+1
from the
0
0
collection Lγ and add in the new path γi βi γi+1 . We continue this process iteratively until
all the complementary subpaths βi between any two consecutive elements in our collection
satisfies ILT (βi ) ≥ A(f ) + 1. We call the obtained collection of subpaths Cγ .
We now pick a path γj in the collection Cγ and consider its “history” as being obtained
iteratively through joining what amounts to ` paths γi0 from Lγ . Thus γj can be written as
illegal concatenation
0
γj = γ10 ◦ β1 ◦ γ20 ◦ . . . ◦ γ`−1
◦ β`−1 ◦ γ`0 ,
where each γi0 is legal and of length |γi0 | ≥ 2C + 1. Each βi has at most A(f ) illegal turns,
and the legal subpaths of βi between these illegal turns have length ≤ 2C, so that we get
|βi | ≤ (A(f ) + 1)2C. Thus the set of good edges on γj is given precisely as disjoint union
18
MARTIN LUSTIG AND CAGLAR UYANIK
over all the γi0 of the sets of the |γi0 | − 2C edges of γi0 that are not on the two boundary
subpaths of length C of γi0 . Hence we compute for the goodness:
P`
P`
0
(|γ 0 | − 2C)
i=1 (|γi | − 2C)
g(γj ) =
= P` i=1 0 i P`−1
|γj |
i=1 |γi | +
i=1 |βi |
`
1
=
(2C + 1) · ` + (A(f ) + 1)2C · `
2C(A(f ) + 2) + 1
We finally add to the collection Cγ a suitable set of trivial subpaths at illegal turns to get
a collection Cγ0 , where these trivial paths are chosen as to get as complementary subpaths of
Cγ0 only subpaths γk which satisfy:
≥
A(f ) + 1 ≤ ILT (γk ) ≤ 2A(f ) + 1
Thus setting
δ=
1
2C(A(f ) + 2) + 1
u
t
finishes the proof.
Proposition 4.18. Let f : Γ → Γ be a train track map as in Convention 4.14, and let s ≥ 1
be the integer given by Lemma 4.16 and δ > 0 be the constant given by Lemma 4.17. Then
there exists a constant R > 1 such that for any reduced loop γ in Γ one has either
(1) g([f s (γ)]) ≥
δ
2
or
(2) ILT (γ) ≥ R · ILT ([f s (γ)]).
Proof. By 4.12 there is an exponent t ≥ 0 such that for any loop γ with less than A(f ) + 1
illegal turns the loop γ 0 = [f t (γ)] is pseudo-legal. From the assumption that f satisfies
Convention 4.14 it follows that γ 0 is not a legal concatenation of INPs, so that it must have
at least one good edge. Since iteration of f only decreases the number of illegal turns, we
obtain from equality (4.3) that
g(γ) ≥
1
.
2C(A(f ) + 1) + 1
Thus the first inequality from our assertion follows for a suitable choice of s from Proposition
4.4.
0
Thus we can now assume that ILT (γ) ≥ A(f ) + 1, and thus that [f s (γ)] = γ10 ◦ . . . ◦ γ2m
is a decomposition as given by Lemma 4.17. There are two cases to consider: Assume that
X
X
|γj0 | ≥
|γk0 |.
j odd
k even
For any odd index j the non-trivial path γj0 has g(γj0 ) ≥ δ, which together with the last
inequality implies:
δ
g([f s (γ)]) ≥
2
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
19
Now, assume that:
X
X
|γj0 | ≤
j odd
|γk0 |
k even
Let γ = γ1 ◦ . . . ◦ γ2m be an illegal cyclic concatenation given by Lemma 4.13 so that, for
each i = 1, . . . , 2m, the reduced image [f s (γi )] contains γi0 as a subpath. Hence, for every
even index, we apply Lemma 4.16 to see that
ILT (γk ) > ILT ([f s (γk )]) ≥ ILT (γk0 ).
Since the number if illegal turns never increases when applying a train track map, for each
odd index j, we have
ILT (γj ) ≥ ILT ([f s (γj )]) ≥ ILT (γj0 ).
Combining last two inequalities we obtain:
ILT (γ) > ILT ([f s (γ)]) + m.
(4.5)
We also observe that the number of illegal turns in [f s (γ)] is equal to the sum of the
number of illegal turns in the odd indexed subpaths, the number of illegal turns in the even
indexed subpaths, and the number of illegal turns at concatenation points:
X
X
ILT (γk0 ) + 2m
ILT (γj0 ) +
(4.6)
ILT ([f s (γ)]) ≤
k even
j odd
Now, note that
(4.7)
X
ILT (γj0 ) ≤
X
j odd
j odd
|γj0 | ≤
X
|γk0 |,
k even
by assumption.
For each γk0 (with even index k), since Lemma 4.17 assures g(γk0 ) = 0 and ILT (γk0 ) ≤
2(A(f ) + 1), we have
|γk0 | ≤ 2C(2(A(f ) + 1) + 1),
which together with (4.7) implies that:
X
(4.8)
ILT (γj0 ) ≤ 2mC(2(A(f ) + 1) + 1)
j odd
Furthermore, from ILT (γk0 ) ≤ 2(A(f ) + 1) for even index k we deduce
X
(4.9)
ILT (γk0 ) ≤ 2m(A(f ) + 1)
k even
Using (4.6), (4.8) and (4.9) we obtain:
(4.10)
ILT ([f s (γ)]) ≤ 2mC(2(A(f ) + 1) + 1) + 2m(A(f ) + 1) + 2m
20
MARTIN LUSTIG AND CAGLAR UYANIK
Using (4.5) and (4.10), we have:
ILT (γ)
m
≥
1
+
ILT ([f s (γ)])
ILT ([f s (γ)])
m
2mC(2(A(f ) + 1) + 1) + 2m(A(f ) + 1) + 2m
1
≥1+
2C(2(A(f ) + 1) + 1) + 2(A(f ) + 1) + 2
≥1+
Therefore, the conclusion of the lemma holds for:
R=1+
1
2C(2(A(f ) + 1) + 1) + 2(A(f ) + 1) + 2
u
t
4.4. Uniform goodness in the future or the past. For the convenience of the reader
we first prove a mild generalization of Proposition 4.18, which will be a crucial ingredient in
the proof of the next proposition.
Proposition 4.19. Let f : Γ → Γ be as in Convention 4.14. Given any constants 0 < δ1 < 1
and R1 > 1, there exist an integer s1 > 0 so that for any reduced loops γ and γ 0 in Γ with
[f s1 (γ 0 )] = γ one has either
(i) g([f s1 (γ)]) ≥ δ1
or
(ii) ILT (γ 0 ) ≥ R1 · |γ|Γ .
Proof. We first replace f by a positive power (say f r , cited at the end of the proof) as given
by Proposition 4.4 so that for the rest of the proof we can assume that goodness is monotone.
Let s, δ and R be as in Lemma 4.18 and let γ be any reduced loop in Γ. Assume that for γ
that alternative (1) of Lemma 4.18 holds, i.e. g([f s (γ)]) ≥ 2δ . Then by Corollary 4.5 there is
an exponent M ≥ 1 such that
g([(f s )m (γ)]) ≥ δ1
for all m ≥ M . On the other hand, if g([f s (γ)]) < 2δ , then Lemma 4.18 assures that
ILT (γ) ≥ R · ILT ([f s (γ)]).
We now claim that
ILT (γ1 ) ≥ R · ILT (γ)
s
for any reduced loop γ1 with [f (γ1 )] = γ. To see this, apply Lemma 4.18 to the loop γ1 . If
one had
δ
g([f s (γ1 )]) = g(γ) ≥ ,
2
then by monotonicity of goodness this would also imply g([f s (γ)]) ≥ 2δ , which contradicts
with our assumption. Hence for γ1 alternative (2) of Lemma 4.18 holds, giving indeed
ILT (γ1 ) ≥ R · ILT (γ).
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
21
Repeating the same argument iteratively shows that for any sequence of reduced loops γM 0 ,
defined iteratively through [f s (γM 0 )] = γM 0 −1 for any M 0 ≥ 2, the inequality
0
γM 0 ≥ RM · ILT (γ).
holds. Also, notice that since g(γ) <
δ
2
we have
#{bad edges in γ}
δ
≥1− ,
|γ|Γ
2
and by the inequalities (4.3) we have furthermore
#{bad edges in γ} ≤ 2C · ILT (γ).
Hence we obtain
0
ILT (γM 0 ) ≥ RM · ILT (γ)
0
#{bad edges in γ}
2C
δ 1
· (1 − ) |γ|Γ
2 2C
≥ RM ·
≥ RM
0
0
1
≥ R1 . Then s1 = max{M, M 0 } satisfies the
Let M 0 ≥ 1 be such that RM · (1 − 2δ ) 2C
requirements of the statement of Proposition 4.19 up to replacing f by the power f r as done
at the beginning of the proof.
u
t
In addition to the train track map f we now consider a second train track map f 0 : Γ0 → Γ0 ,
which also satisfies the requirements of Convention 4.14 and which is related to f via maps
h : Γ → Γ0 and h0 : Γ0 → Γ such that f and h0 f 0 h are homotopy inverses. We also assume
that the lifts of h and h0 to the universal coverings are quasi-isometries (with respect to the
simplicial metrics), so that there exists a bi-Lipschitz constant B > 0 which satisfies for any
two “corresponding” reduced loops γ in Γ and γ 0 := [h(γ)] the inequalities
(4.11)
1 0
|γ |Γ0 ≤ |γ|Γ ≤ B |γ 0 |Γ0
B
We denote the goodness for the map f 0 by g0 , and the critical constant for f 0 from Definition
4.2 by C 0 .
Proposition 4.20. Let f : Γ → Γ and f 0 : Γ0 → Γ0 be as specified in the last paragraph.
Given a real number δ so that 0 < δ < 1, there exist a bound M > 0 such that (up to
replacing f and f 0 by a common power) for any pair of corresponding reduced loops γ in Γ
and γ 0 in Γ0 , either
(a) g([f n (γ)]) ≥ δ
or
(b) g0 ([(f 0 )n (γ 0 )]) ≥ δ
holds for all n ≥ M .
22
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. Let B be a bi-Lipschitz constant for the transition from Γ to Γ0 as in (4.11) above.
Set R1 = 4C 0 B 2 , and apply Proposition 4.19 to the loop γ. Assume first that alternative (i)
of this proposition holds. Then Corollary 4.5, applied to f s1 , gives a bound L ≥ 0 so that
inequality (a) holds for all n ≥ L (after having replaced f by f s1 ).
Now assume that for γ alternative (ii) of Proposition 4.19 holds. Then we have the
following inequalities, where γ 00 denotes the reduced loop in Γ corresponding to f 0s1 (γ 0 )
(which implies [f s1 (γ 00 )] = γ):
1 00
1
|γ |Γ ≥ ILT (γ 00 )
B
B
1
≥ R1 · |γ|Γ = 4C 0 B · |γ|Γ
B
= 4C 0 · |γ 0 |Γ0
|f 0s1 (γ 0 )|Γ0 ≥
This however implies that g0 (f 0s1 (γ 0 )) ≥ 1/2, since for any t ≥ 0 the number of bad edges in
f 0t (γ 0 ) is bounded above by
2C 0 · ILT (f 0t (γ 0 )) ≤ 2C 0 · ILT (γ 0 ) ≤ 2C 0 · |γ 0 |Γ0 .
Thus, by invoking Corollary 4.5 again, there exist L0 such that
0
g0 (f 0s1 L (γ 0 )) ≥ δ.
Hence for M 0 = max{L, L0 } the conclusion of the Lemma follows.
u
t
Remark 4.21. From the next section on we will restrict our attention to expanding train
track maps which are homotopy equivalences. For any such train track representative f of
some ϕ ∈ Out(FN ) and f 0 of ϕ−1 , which both satisfy Convention 4.14, the conditions stated
before Proposition 4.20 are satisfied, so that this proposition is valid for them.
5. Perron Frobenius Theorem for reducible substitutions and
automorphisms
The purpose of this section is to define the simplex of attraction ∆+ and the simplex of
repulsion ∆− explicitly by exhibiting the coordinate values for the defining currents. For
this purpose we crucially need the main result from our earlier paper [LU17]; details of how
to use this quote are given below.
5.1. Symbolic dynamics, substitutions and quotes from [LU17]. In this subsection
we recall some terminology, well known definitions and basic facts from symbolic dynamics.
Given any finite set of symbols A = {a1 , . . . , am }, called an alphabet, one considers the
free monoid A∗ over A, which is given by all finite words in A (without inverses), including
the empty word 1. The length |w| of a word w ∈ A∗ denotes the number of letters in w.
Furthermore one considers the full shift AZ , the set of all biinfinite words in A, which is
canonically equipped with the product topology and with the shift-operator. The latter
maps x = . . . xi−1 xi xi+1 . . . ∈ AZ to y = . . . yi−1 yi yi+1 . . . ∈ AZ , with yi = xi+1 ∈ A for any
i ∈ Z. A subset Σ ⊂ AZ is called a subshift if it is non-empty, closed and shift-invariant.
The language of Σ is the collection of all finite words occurring in elements of Σ. For any
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
23
w = x1 . . . xn ∈ A∗ we denote by Cylw the set of all y = . . . yi−1 yi yi+1 . . . ∈ AZ which satisfy
y1 = x1 , y2 = x2 , . . . , yn = xn .
An invariant measure µ on a subshift Σ is a finite Borel measure on Σ which is invariant
under the shift map. It extends canonically to an invariant measure on all of AZ by setting
µ(B) := µ(B ∩ Σ) for any measurable set B ⊂ AZ . For any invariant measure µ on AZ
obtained this way we say that µ has support in Σ.
Remark 5.1. (1) Any invariant measure µ defines a function
µA : A∗ → R≥0 , w 7→ µ(Cylw )
which satisfies for any w ∈ A∗ the following Kirchhoff conditions:
X
X
µA (w) =
µA (xw) =
µA (wx)
x∈A
x∈A
∗
∗
Conversely, for every such weight function µ : A → R≥0 (i.e. µ∗ satisfies the Kirchhoff
conditions) there exists a well defined invariant measure µ on AZ with µA = µ∗ , see [FM10].
(2) The measure µ has support in a subshift Σ ⊂ AZ if and only if µA (w) = 0 for any w ∈ A∗
with Cylw ∩ Σ = ∅.
A substitution ζ on the finite alphabet A = {a1 , . . . am } is a monoid morphism ζ : A∗ → A∗ .
It is well defined by knowing all ζ(ai ), and conversely, any map A → A∗ defines a substitution.
A substitution ζ : A → A∗ is called expanding if for each ai ∈ A, |ζ k (ai )| ≥ 2 for some k ≥ 1.
For any two words w1 , w2 ∈ A∗ , let us denote the number of occurrences of the word w1 in
w2 by |w2 |w1 . By proving a generalized version of the classical Perron–Frobenius Theorem
for reducible matrices, in [LU17] we obtain the following result.
Proposition 5.2 (Corollary 1.3 and Remark 3.14 of [LU17]). For any expanding substitution
ζ : A∗ → A∗ and any letter ai ∈ A there is a well defined invariant measure µai on AZ . For
any non-empty w ∈ A∗ and the associated cylinder Cylw the value of µai is given, after
possibly raising ζ to a suitable power (which does not depend on w), by the limit frequency
|ζ t (ai )|w
.
t→∞ |ζ t (ai )|
µai (Cylw ) = lim
Remark 5.3. (1) We note that in [LU17] the measure µai is defined on the substitution
subshift Σζ , while in the above quote we denote by µai the canonical extension to all of AZ .
Accordingly, in [LU17] the set Cylw denotes set Cylw ∩ Σζ . However, as explained in Remark
3.13 of [LU17], these differences are only superficial: the statement quoted above and the
one in [LU17] are indeed equivalent.
(2) It can be derived from [LU17] that the positive power to which ζ has to be raised in order
to get the frequency equality in Proposition 5.2 is not just independent of w but actually
independent of ζ. It only depends on the size of the alphabet A.
In the next subsection we also need the following:
Lemma 5.4 (Remark 3.3 of [LU17]). Let ζ : A∗ → A∗ be an expanding substitution. Then
(up to replacing ζ by a positive power) there exists a constant λai > 1 for each ai ∈ A such
24
MARTIN LUSTIG AND CAGLAR UYANIK
that:
|ζ t+1 (ai )|
= λai
t→∞ |ζ t (ai )|
lim
u
t
5.2. Train track maps reinterpreted as substitutions. We now apply the material
from the previous subsection to a particular substitution ζf which we construct from an
expanding train track map f : Γ → Γ as in the section 4. We first set up the following
general definitions:
For any graph Γ we recall (see section 2.1) that the set EΓ of oriented edges of Γ is
equipped with a fixed point free involution
ι : EΓ → EΓ, e 7→ e
where e denotes as before the edge e with reversed orientation.
We now use EΓ as alphabet, and consider the free monoid EΓ∗ and the both-sided full
shift EΓZ . The latter contains the subshift (of “finite type”) ΣΓ ⊂ EΓZ , which consists of
all biinfinite reduced edge paths in Γ. We denote the language of ΣΓ by P(Γ), it is the set
of all finite reduced edge paths in Γ. We observe that the involution ι induces an involution
on EΓ∗ which for convenience will be denoted also by ι. On EΓZ this involution induces the
flip involution which is given by
ι(. . . xi xi+1 xi+2 . . .) = . . . yi yi+1 yi+2 . . .
with yn = x−n+1 for all n ∈ Z. The subshift ΣΓ is clearly flip-invariant.
A shift-invariant measure µ∗ on ΣΓ is called flip-invariant if for any measurable subset
Σ0 ⊂ ΣΓ one has µ∗ (ι(Σ0 )) = µ∗ (Σ0 ). From Remark 5.1 we see that this is equivalent to
requiring that the weight function µ∗EΓ associated to µ∗ satisfies
µ∗EΓ (γ) = µ∗EΓ (γ)
for any γ ∈ P(Γ). We now observe:
Lemma 5.5. Let Γ be a graph provided with a marking θ : FN → π1 Γ. Then any shiftinvariant and flip-invariant measure µ∗ on ΣΓ defines a current µ on FN and conversely.
This canonical 1-1 correspondence is given by the fact that the Kolmogorov function µEΓ
associated to µ (see section 2.5) and the weight function µ∗EΓ associated to µ∗ satisfy
µEΓ (γ) = µ∗EΓ (γ)
for any finite reduced path γ in Γ.
Proof. It is well known that a current and the associated Kolmogorov function determine each
other vice versa (see section 2.5), and similarly for a shift-invariant measure and its weight
function (see Remark 5.1). Hence the statement of the lemma is a direct consequence of the
observation that any flip-invariant weight function on EΓ∗ , which is zero on EΓ∗ r P(Γ),
restricts on P(Γ) to a Kolmogorov function, and conversely, any Kolmogorov function on
P(Γ) gives canonically rise to a flip-invariant weight function on EΓ by setting it equal to 0
for any element of on EΓ∗ r P(Γ).
u
t
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
25
We now consider the occurrences of a path γ as subpath in a path γ 0 . As before, the
number of such occurrences is denoted by |γ 0 |γ . We denote the number of occurrences of γ
or of γ as subpath in a path γ 0 by hγ, γ 0 i and obtain:
hγ, γ 0 i = |γ 0 |γ + |γ 0 |γ
(5.1)
Let now f : Γ → Γ be any graph self-map. Then f induces a substitution ζf : EΓ∗ → EΓ∗ ,
but in general ζf -iterates of reduced paths in Γ will be mapped to non-reduced paths. An
exception is given if f is a train track map and if the path γ 0 is legal: In this case all f t (γ 0 )
will be reduced as well:
[f t (γ 0 )] = f t (γ 0 )
where [ρ] denotes as in section 2.1 the path obtained from an edge path ρ via reduction
relative to its endpoints. Hence the occurrences of any path γ or of γ in [f t (γ 0 )] are given by
(5.2)
hγ, [f t (γ 0 )]i = |f t (γ 0 )|γ + |f t (γ 0 )|γ
for any integer t ≥ 0.
We are now ready to prove:
Proposition 5.6. Let f : Γ → Γ be an expanding train-track map, and let e ∈ EΓ. Then,
after possibly replacing f by a positive power, for any reduced edge path γ in Γ the limit
hγ, f t (e)i
= aγ
n→∞ |f t (e)|
lim
exists, and the set of these limit values defines a unique geodesic current µ+ (e) on FN through
setting hγ, µ+ (e)i = aγ for any γ ∈ P(Γ).
Proof. Since every edge e of Γ is legal, we obtain for any γ ∈ P(Γ) from equation (5.2) above
that hγ, f t (e)i = hγ, [f t (e)]i = |f t (e)|γ + |f t (e)|γ for all exponents t ≥ 0. On the other hand,
for any element ω ∈ EΓ∗ r P(Γ) one has |f t (e)|ω + |f t (e)|ω = 0.
Furthermore the assumption that f is expanding implies directly that the substitution ζf
associated to f is also expanding.
Hence we can apply Proposition 5.2 to the substitution ζf to obtain that, after possibly
t (e)i
replacing f and ζf by a suitable positive power, the limit of the hγ,f
exists indeed, and
|f t (e)|
∗
∗
∗
that it is equal to µe (Cylγ ) + µe (Cylγ ), where µe is a shift-invariant measure on EΓ∗ with
support in the subshift ΣΓ . Hence γ 7→ µ∗e (Cylγ ) defines a weight function on EΓ∗ which
is zero outside P(Γ), and thus similarly γ 7→ µ∗e (Cylγ ). Their sum is thus also a weight
function with support in P(Γ), and furthermore it is flip invariant, so that we obtain from
Lemma 5.5 a Kolmogorov function. This in turn defines the current µ+ (e), as stated in our
proposition.
u
t
We now want to show that the currents µ+ (e) are projectively ϕ-invariant. For this purpose
we start by stating two lemmas; the first one is an elementary exercise:
Lemma 5.7. For any graph Γ without valence 1 vertices there exists a constant K ≥ 0 such
that for any finite reduced edge path γ in Γ there exists an edge path γ 0 of length |γ 0 | ≤ K
such that the concatenation γ ◦ γ 0 exists and is a reduced loop.
u
t
26
MARTIN LUSTIG AND CAGLAR UYANIK
Lemma 5.8. Let f : Γ → Γ as in Proposition 5.6, and let K1 ≥ 0 be any constant. For all
integers t ≥ 0 let γt0 ∈ EΓ∗ be any element with |γt0 | ≤ K1 . Set γt := f t (e)∗ γt0 , where f t (e)∗ is
obtained from f t (e) by erasing an initial and a terminal subpath of length at most K1 . Then
for any reduced path γ in Γ one has
hγ, γt i
lim
= hγ, µ+ (e)i
t→∞ |γt |
Proof. From the hypotheses |γt0 | ≤ K1 and |f t (e)∗ | ≥ |f t (e)| − 2K1 , and from the fact that
hγ,γt i
f is expanding and hence |f t (e)| → ∞ for t → ∞, we obtain directly lim hγ,f
t (e)i = 1 and
t→∞
t|
lim |f|γt (e)|
= 1. Hence the claim follows directly from Proposition 5.6.
t→∞
u
t
Proposition 5.9. Let ϕ ∈ Out(FN ) be an automorphism which is represented by an expanding train-track map f : Γ → Γ. We assume that ϕ and f have been replaced by positive
powers according to Proposition 5.6.
Then there exist a constant λe > 1 such that ϕ(µ+ (e)) = λe µ+ (e).
Proof. For the given graph Γ let K ≥ 0 be the constant given by Lemma 5.7, and for
any integer t ≥ 0 let γt0 ∈ P(Γ) with |γt0 | ≤ K be the path given by Lemma 5.7 so that
γt =: f t (e)γt0 ∈ P(Γ) is a reduced loop. Let [wt ] ⊂ FN ∼
= π1 Γ be the conjugacy class
represented by γt , and note that the rational current η[wt ] satisfies kη[wt ] k = |γt |, by equality
(2.2) from section 2.5.
Similarly, consider f (γn ) = f t+1 (e)f (γt0 ), and notice that |f (γt0 )| is bounded above by the
constant K0 = K max{|f (e)| | e ∈ EΓ}. Since f is a train track map, the path f t+1 (e) is
reduced. Hence the reduced loop γt00 := [f (γn )] = [f t+1 (e)f (γt0 )] can be written as product
f t+1 (e)∗ γt00 with |γt00 | ≤ K1 and |f t+1 (e)∗ | ≥ |f t+1 (e)| − 2K1 , where f t+1 (e)∗ is a subpath of
f t+1 (e) and K1 is the maximum of K0 and the cancellation bound Cf of f (see Lemma 2.5).
Thus we can apply Lemma 5.8 twice to obtain for any reduced path γ in Γ that
hγ, γt i
lim
= hγ, µ+ (e)i
t→∞ |γt |
and
hγ, γt00 i
lim
= hγ, µ+ (e)i .
t→∞ |γt00 |
The first equality implies that the rational currents η[wt ] satisfy
η[wt ]
lim
= µ+ (e).
t→∞ kη[wt ] k
From the continuity of the Out(FN )-action on current space and from ϕη[wt ] = ηϕ[wt ] (see
equality (2.1) from section 2.5) we thus deduce
ηϕ[wt ]
= ϕµ+ (e).
lim
t→∞ kη[wt ] k
However, since the reduced loops γt00 represent the conjugacy classes ϕ[wt ], the second of
the above equalities implies that
ηϕ[wt ]
lim
= µ+ (e).
t→∞ kηϕ[wt ] k
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
27
|γ 00 |
t|
Since lim |f|γt (e)|
= 1 and lim |f t+1t (e)| = 1, with |γt | = kη[wt ] k and |γt00 | = kηϕ[wt ] k, the conclusion
t→∞
t→∞
follows from Lemma 5.10 below.
u
t
Lemma 5.10. For every edge e of Γ there exists a real number λe > 1 which satisfies:
|f t+1 (e)|
= λe
t→∞ |f t (e)|
lim
Proof. This is a direct consequence of Lemma 5.4 and of the definition of ζf .
u
t
We now define ∆− (ϕ) and ∆+ (ϕ) that are used in the next section:
Definition 5.11. Let ϕ ∈ Out(FN ) be an outer automorphism. Assume that ϕ is replaced
by a positive power such that both, ϕ and ϕ−1 are represented by expanding train-track
maps as in Proposition 5.6. Let f : Γ → Γ be the representative of ϕ. Then the simplex of
attraction is defined as follows:
X
X
∆+ (ϕ) = {[
ai µ+ (ei )] | ai ≥ 0,
ai > 0}.
ei ∈E + Γ
Analogously, we define the simplex of repulsion as ∆− (ϕ) = ∆+ (ϕ−1 ).
It should be pointed out here that distinct edges ei of Γ may well give the same limit
current µ+ (ei ). Furthermore, even if a subset of currents µ+ (ei ) which define pairwise different vertices of the “simplex” ∆+ (ϕ), this subset may a priori not be linearly independent.
However, it follows from general results in dynamics (see for instance [FM10]) that the
extremal points of ∆+ (ϕ) correspond to ergodic currents, and that pairwise projectively distinct ergodic currents are linearly independent, so that ∆+ (ϕ) is indeed a finite dimensional
simplex.
From Proposition 5.9 we obtain directly:
Corollary 5.12. Let ϕ ∈ Out(FN ) be as in Definition 5.11. Then the simplexes ∆+ (ϕ) and
∆− (ϕ) are ϕ-invariant:
ϕ(∆+ (ϕ)) = ∆+ (ϕ)
and
ϕ(∆− (ϕ)) = ∆− (ϕ)
u
t
Remark 5.13. There seems to be an interesting question as to what the maximal possible
dimension of the limit simplexes ∆+ (ϕ) (or ∆− (ϕ) = δ+ (ϕ−1 )) can be. It has been shown
by G. Levitt [Lev09] that for any ϕ ∈ Out(FN ) the number of exponentially growing strata
in any train track representative of ϕ is bounded above by 3N4−2 (and that this bound is
attained, by certain geometric automorphisms). This gives:
3N − 6
4
We do not know whether there are hyperbolic automorphisms which realize this bound.
Preliminary considerations have lead us to construct for any integer k ≥ 1 a family of
k+1
hyperbolic automorphisms ϕk with rank(ϕk ) = 2 · 3k + 3 and dim(∆+ (ϕk )) = 3 2 −1 .
dim(∆+ (ϕ)) ≤
28
MARTIN LUSTIG AND CAGLAR UYANIK
In the next section we will specify the automorphism in question to be hyperbolic. Recall
that ϕ ∈ Out(FN ) is hyperbolic if there is no non-trivial ϕ-periodic conjugacy class in FN .
Let f : Γ → Γ be an absolute train track representative of ϕ. By Remark 2.4 we can assume
that f is expanding. We then replace ϕ and f by a positive power so that Convention 4.1
is satisfied, and furthermore subdivide edges in accordance to Convention 4.7. Furthermore
we have:
Lemma 5.14. Any expanding train track representative f : Γ → Γ of a hyperbolic automorphism ϕ ∈ Out(FN ) which satisfies Convention 4.7 also satisfies the hypotheses of
Convention 4.14.
Proof. This is a direct consequence of Lemma 4.15.
u
t
Convention 5.15. A hyperbolic automorphism ϕ ∈ Out(FN ) is said to have a properly
expanding train track representative f : Γ → Γ if f satisfies Conventions 4.1, 4.7 and 4.14,
and if both have been raised to a suitable positive power according to Propositions 5.6 and
5.9.
Remark 5.16. From Lemma 5.14 one obtains directly that every hyperbolic automorphism
ϕ which possesses an absolute train track representative has a positive power ϕt which
possesses a properly expanding train track representative.
6. Hyperbolic automorphisms
Let ϕ ∈ Out(FN ) be a hyperbolic automorphism which possesses a properly expanding
train track representative f : Γ → Γ as in Convention 5.15. Let [w] be a conjugacy class in
FN . Represent [w] by a reduced loop γ in Γ. Then the goodness of w, denoted by g([w]), is
defined by:
g([w]) := g(γ)
Lemma 6.1. Given a neighborhood U of the simplex of attraction ∆+ (ϕ) ∈ PCurr(FN ),
there exist a bound δ > 0 and an integer M = M (U ) ≥ 1 such that, for any [w] ∈ FN with
g([w]) ≥ δ, we have
(ϕM )n [ηw ] ∈ U
for all n ≥ 1.
Proof. We first replace ϕ by a positive power as in Proposition 4.4 so that the goodness
function for the train-track map f : Γ → Γ becomes monotone.
Recall from Section 2.5 that [ν] ∈ PCurr(FN ) is close to [ν 0 ] ∈ PCurr(FN ) if there exists
ε > 0 and R >> 0 such that for all reduced edge paths γ with |γ| ≤ R we have
hγ, νi hγ, ν 0 i
−
< ε.
kνkΓ
kν 0 kΓ
Thus, since ∆+ (ϕ) is compact, there exist ε > 0 and R ∈ R such that the above inequalities
imply for ν 0 ∈ ∆+ (ϕ) that ν ∈ U .
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
29
We proved the pointwise convergence for edges in Proposition 5.6. Since there are only
finitely many edges and finitely many edge paths γ in Γ with |γ| ≤ R, we can pick an integer
M0 ≥ 0 such that
(6.1)
hγ, f n (e)i
− hγ, µ+ (e)i < ε/4
|f n (e)|
for all n ≥ M0 , for all γ with |γ| ≤ R and for all edges e of Γ.
Let λ0 , λ00 > 1 be the minimal and the maximal expansion factors respectively as given in
1
Convention 4.1. For any reduced loop c in Γ with g(c) ≥ 1+ε/4
iterative application of the
fact, that f maps any good edge in c to to a path in [f (c)] which consists entirely of good
edges and has length at least λ0 , implies:
|f n (c)| ≥
1
|c|(λ0 )n .
1 + ε/4
Thus for any integer M1 > logλ0 R(1 + 4ε ) and all n ≥ M1 we get the following inequalities:
(6.2)
R|c|
R|c|Γ (1 + ε/4)
R(1 + ε/4)
ε
R(1 + ε/4)
≤
≤
=
≤
|f n (c)|
|c|(λ0 )n
(λ0 )M1
R(1 + 4/ε)
4
We note that for any integer m ≥ 1 and for each edge the minimum expansion factor for
f m is at least (λ0 )m and the maximum expansion factor for f m is at most (λ00 )m .
For the rest of the proof set
M = max{M0 , M1 }
and
δ := max{
1
1
},
,
0
λ
1 + ε/4 1 + ( λ00 )M ε/4
and let c be a reduced loop in Γ which represents a conjugacy class w with g(w) ≥ δ.
The assertion of Lemma 6.1 now follows if we show that for all integers n ≥ 1 the current
(ϕM )n ([ηw ]) is (ε, R)-close (in the above sense) to some point in ∆+ (ϕ). Indeed, since by the
first paragraph of the proof the goodness function is monotone, it suffices to assume n = 1
and apply the resulting statement iteratively.
For simplicity we denote from now on f M by f . Another auxiliary computation gives:
(6.3)
(λ00 )M · #{bad edges in c}
(λ00 )M (1 − g(w))|c|
λ00 M
1
λ00 M 1
ε
=
=( 0)
−1 ≤( 0)
−1 ≤ .
0
M
0
M
(λ ) · #{good edges in c}
(λ ) g(w)|c|
λ
g(w)
λ
δ
4
We now write c = c1 c2 . . . b1 . . . cp cp+1 . . . cr b2 cr+1 . . . bk . . . cs−1 cs , where the ci denote good
edges and the bj denote maximal bad subpaths of c. Note for the second of the inequalities
below that the definition of “good” implies that there can be no cancellation in f (c) between
adjacent f (ci ) and f (ci+1 ) nor between adjacent f (ci ) and f (bj ), see Lemma 4.3.
30
MARTIN LUSTIG AND CAGLAR UYANIK
Then we calculate:
hγ, f (c)i hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
Ps
−
|f (c)|
i=1 |f (ci )|
s
hγ, f (c)i X hγ, f (ci )i
≤
−
|f (c)|
|f (c)|
i=1
P
s
s
X
hγ, f (ci )i
hγ, f (ci )i
P
− i=1
+
s
|f (c)|
i=1 |f (ci )|
i=1
P
s
hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
i=1 hγ, f (ci )i
Ps
+ P
−
s
i=1 |f (ci )|
i=1 |f (ci )|
k
2R|c| X hγ, [f (bj )]i
+
|f (c)| j=1 |f (c)|
Ps
Ps
hγ,
f
(c
)i
i
i=1 hγ, f (ci )i
i=1
− P
+ Ps
Pk
s
i=1 |f (ci )|
j=1 |[f (bj )]|
i=1 |f (ci )| +
Ps
hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
i=1 hγ, f (ci )i
Ps
+ P
−
s
i=1 |f (ci )|
i=1 |f (ci )|
< ε/4 + ε/4 + ε/4 + ε/4 = ε.
≤
Here the first inequality is just a triangle inequality. In the second inequality the last two
terms are unchanged, and first two terms come from the first term in the previous quantity
and follows from counting frequencies as follows: An occurrence of an edge path γ or its
inverse can occur either inside the image of a good edge f (ci ) or inside of the image of a bad
segment [f (bj )], or it might cross over the concatenation points. This observation gives the
claimed inequality. In the final inequality, the first ε/4 follows from the equation (6.2). The
second one follows from the equation (6.3) as follows:
k
X
hγ, [f (bj )]i
j=1
|f (c)|
≤
k
X
|[f (bj )]|
j=1
|f (c)|
≤
k
X
j=1
(λ0 )M
|bj |(λ00 )M
ε
≤ .
4
· #{good edges in c}
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
31
The third ε/4 comes from the following observation:
Ps
Ps
i=1 hγ, f (ci )i
i=1 hγ, f (ci )i
− P
Ps
Pk
s
i=1 |f (ci )|
i=1 |f (ci )| +
j=1 |[f (bj )]|
Pk
Ps
i=1 hγ, f (ci )i
j=1 |[f (bj )]|
= Ps
Ps
Pk
i=1 |f (ci )|
i=1 |f (ci )| +
j=1 |[f (bj )]|
Pk
Ps
hγ,
f
(c
)i
i
j=1 |[f (bj )]|
i=1
· Ps
≤ P
s
i=1 |f (ci )|
i=1 |f (ci )|
P
(λ00 )M kj=1 |bj |
P
≤
≤ ε/4
(λ0 )M si=1 |ci |
by (6.3).
Finally, the last ε/4 can be verified using (6.1) as follows:
Ps
hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
i=1 hγ, f (ci )i
P
Ps
−
s
i=1 |f (ci )|
i=1 |f (ci )|
Ps
hγ, f (ci )i
− hγ, µ+ (ci )i)
i=1 |f (ci )|(
|f (ci )|
Ps
=
i=1 |f (ci )|
Ps
i=1 |f (ci )|ε/4
≤ P
= ε/4
s
i=1 |f (ci )|
Since after applying ϕM to a conjugacy class with g(w) ≥ δ we still have g(ϕM (w)) ≥ δ
we get (ϕM )n ([ηw ]) ∈ U for all n ≥ 1.
u
t
Lemma 6.2. For any δ > 0 and any neighborhood U of ∆+ (ϕ) there exists an integer
M (δ, U ) > 0 such that (up to replacing ϕ by a positive power) for any conjugacy class w with
goodness g(w) > δ we have
ϕn [ηw ] ∈ U
for all n ≥ M .
Proof. This is a direct consequence of Corollary 4.5 and Lemma 6.1.
u
t
Proposition 6.3. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism such that ϕ and
ϕ−1 both admit properly expanding train-track representatives.
Given neighborhoods U of the simplex of attraction ∆+ (ϕ) and V of the simplex of repulsion
∆− (ϕ) in PCurr(FN ), then (up to replacing ϕ by a positive power) there exist an integer
M ≥ 0 such that for any conjugacy class w ∈ FN we have
ϕn [ηw ] ∈ U
for all n ≥ M .
or
ϕ−n [ηw ] ∈ V
32
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. This is a direct consequence of Proposition 4.20 (see Remark 4.21) and Lemma 6.2.
u
t
The following result also proves Theorem 1.1 from the Introduction:
Theorem 6.4. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism such that ϕ and ϕ−1
admit absolute train-track representatives. Then, ϕ acts on PCurr(FN ) with uniform NorthSouth dynamics from ∆− (ϕ) to ∆+ (ϕ):
Given an open neighborhood U of the simplex of attraction ∆+ (ϕ) and a compact set
K ⊂ PCurr(FN ) r ∆− (ϕ) there exists an integer M > 0 such that ϕn (K) ⊂ U for all
n ≥ M.
Proof. According to Remark 5.16 we can pass to common positive powers of ϕ and ϕ−1 that
have a properly expanding train track representatives as in Convention 5.15. We can then
combine Propositions 2.8, 3.3, 3.4 and 6.3 to obtain directly the required result. For the
application of Proposition 3.3 we need that ∆+ (ϕ) and ∆− (ϕ) are disjoint, which is shown
in Remark 6.5 below. We also need for Proposition 3.3 that both, ∆+ (ϕ) and ∆− (ϕ), are
ϕ-invariant, which is shown in Corollary 5.12.
u
t
Remark 6.5 (Dynamics within ∆+ (ϕ)). (1) It is proved in Proposition 5.6 that every
vertex of the simplex ∆+ = ∆+ (ϕ) is an expanding ϕ-invariant current, i.e. a projectivized
current [µ] for which there exist λ > 1 and t ≥ 1 such that ϕt (µ) = λµ.
For the rest of this remark we replace ϕ by a suitable positive power so that every vertex
current of ∆+ is projectively fixed by ϕ. Of course, this implies that ϕ fixes also every face
∆0 of ∆+ (but not necessarily pointwise).
(2) A uniform face ∆0 is a face of ∆+ which is spanned by vertices [µ1+ ], . . . , [µk+ ] that all
have the same stretch factor λ > 1, i.e. ϕ(µj+ ) = λµj+ for all 1 ≤ j ≤ k.
(3) Since the action of ϕ on Curr(FN ) is linear, all the uniform faces of ∆+ are pointwise
fixed. Any non-vertex current [µ] is always contained in the interior of some face ∆0 ⊂ ∆+ .
Then the sequence of ϕn ([µ]) converges towards a point in the uniform face ∆0+ of ∆0 which
is spanned by all vertices that have maximal stretch factor among all vertices of ∆0 .
(4) Similarly, under backwards iteration n → −∞ the sequence of ϕn ([µ]) converges towards
a point in the uniform face ∆0− of ∆0 ⊂ ∆+ which is spanned by all vertices that have minimal
stretch factor among all vertices of ∆0 .
(5) As a consequence, it follows that a current [µ] can not belong to both, ∆+ (ϕ) and
∆− (ϕ): By symmetry in the previous paragraph, any [µ] ∈ ∆− (ϕ) converges under backwards
iteration of ϕ−1 to an expanding ϕ−1 -invariant current. But backwards iteration of ϕ−1 is the
same as forward iteration of ϕ, and the limit current can not be simultaneously expanding
ϕ-invariant and expanding ϕ−1 -invariant.
Remark 6.6. As recalled in Remark 6.5, every vertex of the convex cell ∆+ = ∆+ (ϕ) is an
expanding ϕ-invariant current. Furthermore, any point in a uniform face of ∆+ is also an
expanding ϕ-invariant current, and these are the only such in ∆+ . It follows from Theorem
6.4 and from Remark 6.5 (applied to ϕ−1 ) that there are no other expanding ϕ-invariant
currents in PCurr(FN ) r ∆+ .
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
33
It has been shown in [BHL15] in a slightly more general context that expanding fixed
currents (i.e. currents µ with ϕµ = λϕ for some λ > 1) are in 1-1 relation with the nonnegative eigenvectors with eigenvalue > 1 for the transition matrix M (f ) of any expanding
train track representative f : Γ → Γ of ϕ. It seems likely that a similar result can be obtained
by extending the methods of Section 5.
Moreover, pointwise dynamics for a dense subset follows from our machinery:
Theorem 6.7. Let ηg be a rational current in Curr(FN ). Then, there exist [µ∞ ] ∈ ∆+ such
that
lim ϕt [ηg ] = [µ∞ ].
t→∞
Proof. Let γ be a reduced loop representing the conjugacy class g. Apply a sufficiently large
power ϕk to g, hence [f k (γ)], the reduced edge path representing ϕk (g) is a pseudo-legal loop,
see Proposition 4.12. Then the arguments in in the proof of Lemma 6.1 give the pointwise
convergence by looking at the set of non-INP edges in [f k (γ)].
u
t
Remark 6.8. From the proof of Theorem 6.7 and from the results of our previous paper
[LU17] one can also derive a precise description of the limit current µ∞ for any given rational
current ηg : Let [f k (γ)] be the pseudo-legal loop representing the conjugacy class ϕk (g), and
assume without loss of generality that the initial point doesn’t lie on any INP-subpath. Let
[f k (γ)] = c1 c1 . . . cp ρ1 cp+1 cp+1 . . . ρ2 cr cr+1 . . . cs−1 cs
be a legal concatenation of edges ci and of INP’s ρj . Then the limit current µ∞ is given by
X
µ+ (ci )] ,
[µ∞ ] = [
ci ∈EΓ0
where Γ0 is the (possibly non-connected) subgraph of Γ consisting precisely of those strata Hi
of Γ which satisfy one of the following two conditions, where denotes the natural partial
order on strata defined by the non-zero off-diagonal coefficients of the transition matrix M (f )
(see [LU17]):
(1) There exists a chain Hi = Hd Hd−1 . . . H1 of pairwise distinct strata,
all with maximal Perron-Frobenius eigenvalue among the diagonal blocks of M (f ).
Furthermore d is the maximal length of any such chain.
(2) Hi Hj for some Hj as in (1).
The analogue of Theorem 6.7 for non-rational currents is delicate, but the authors expect
that it is actually true. However, as already cautioned in the Introduction, in general the
pointwise convergence on PCurr(FN ) will not be uniform.
To finish the paper, we would like to illustrate our main result by considering the particular
case of a hyperbolic ϕ ∈ Out(FN ) which is given as a “free product” of fully irreducible hyperbolic outer automorphisms: Theorem 6.4 then shows that such a free product automorphism
acts on the space of projectivized geodesic currents with generalized uniform North-South
dynamics, and the simplex of attraction is spanned by the forward limit currents for each of
the fully irreducible factors. More precisely:
34
MARTIN LUSTIG AND CAGLAR UYANIK
Example 6.9. Let ϕi ∈ Out(FNi ) (with Ni ≥ 3) be a finite family of hyperbolic fully
irreducible outer automorphisms, where each ϕi : FNi → FNi is represented by an absolute
train-track map fi : Γi → Γi .
For simplicity we now assume (for example by passing to a positive power) that every fi has
a fixed vertex vi in Γi , and we consider the lift Φi ∈ Aut(FN ) represented by fi on π1 (Γi , vi ).
We then get a global absolute train-track map f by wedging together the Γi at the fixed
points vi , and f represents the outer automorphism ϕ given by Φ = Φ1 ∗ . . . ∗ Φk ∈ Aut(FN ),
for FN := FN1 ∗ . . . ∗ FNk .
Then the Bestvina-Feighn Combination Theorem implies that the “free product” ϕ is
hyperbolic. We consider for any i the embedding κi : Curr(FNi ) ,→ Curr(FN ) as described
in [KL10c].
In [Uya14] it was proven that for each factor graph Γi the current µ+ (e) defined in Proposition 5.6 is the same for every edge e of Γi . Hence the simplex of attraction for ϕ is spanned
by k currents µ+ (ei ), each of which is given by an edge ei from a different Γi . In fact, each
µ+ (ei ) is the κi -image of the well defined forward limit current for ϕi in Curr(FN ). Analogously, the simplex of repulsion is equal to the linear span of the images in Curr(FN ) of the
backwards limit currents for all ϕ.
References
[BF92]
[BF93]
[BF14]
[BFH00]
[BHL15]
[Bon91]
[BR15]
[Bri00]
[CHL08]
[CL95]
[CL15]
[Coo87]
[CV86]
[DKL15]
M. Bestvina and M. Feighn. A combination theorem for negatively curved groups. J. Differential
Geom., 35(1):85–101, 1992.
Mladen Bestvina and Mark Feighn. Outer limits. 1993. http://andromeda.rutgers.edu/ feighn/papers/outer.pdf.
Mladen Bestvina and Mark Feighn. Hyperbolicity of the complex of free factors. Adv. Math.,
256:104–155, 2014.
Mladen Bestvina, Mark Feighn, and Michael Handel. The Tits alternative for Out(Fn ). I. Dynamics
of exponentially-growing automorphisms. Ann. of Math. (2), 151(2):517–623, 2000.
Nicolas Bédaride, Arnaud Hilion, and Martin Lustig. Invariant measures for train track towers.
arXiv preprint arXiv:1503.08000, 2015.
Francis Bonahon. Geodesic currents on negatively curved groups. In Arboreal group theory, pages
143–168. Springer, 1991.
Mladen Bestvina and Patrick Reynolds. The boundary of the complex of free factors. Duke Math.
J., 164(11):2213–2251, 2015.
P. Brinkmann. Hyperbolic automorphisms of free groups. Geom. Funct. Anal., 10(5):1071–1089,
2000.
Thierry Coulbois, Arnaud Hilion, and Martin Lustig. R-trees and laminations for free groups. III.
Currents and dual R-tree metrics. J. Lond. Math. Soc. (2), 78(3):755–766, 2008.
Marshall M. Cohen and Martin Lustig. Very small group actions on R-trees and Dehn twist automorphisms. Topology, 34(3):575–617, 1995.
Thierry Coulbois and Martin Lustig. Long turns, INP’s and indices for free group automorphisms.
Illinois J. Math., 59(4):1087–1109, 2015.
Daryl Cooper. Automorphisms of free groups have finitely generated fixed point sets. J. Algebra,
111(2):453–456, 1987.
Marc Culler and Karen Vogtmann. Moduli of graphs and automorphisms of free groups. Invent.
Math., 84(1):91–119, 1986.
Spencer Dowdall, Ilya Kapovich, and Christopher J Leininger. Dynamics on free-by-cyclic groups.
Geom. Topol, 19(5):2801–2899, 2015.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
[FM10]
[Ham12]
[HM13]
[Iva92]
[Kap05]
[Kap06]
[KL09]
[KL10a]
[KL10b]
[KL10c]
[Lev09]
[LL03]
[LU16]
[LU17]
[Mah11]
[Mar95]
[Riv08]
[Thu88]
[Uya14]
[Uya15]
35
Sébastien Ferenczi and Thierry Monteil. Infinite words with uniform frequencies, and invariant
measures. In Combinatorics, automata and number theory, volume 135 of Encyclopedia Math.
Appl., pages 373–409. Cambridge Univ. Press, Cambridge, 2010.
Ursula Hamenstaedt. The boundary of the free splitting graph and the free factor graph. arXiv
preprint arXiv:1211.1630, 2012.
Michael Handel and Lee Mosher. The free splitting complex of a free group, I: hyperbolicity. Geom.
Topol., 17(3):1581–1672, 2013.
Nikolai V Ivanov. Subgroups of Teichmuller modular groups, volume 115. American Mathematical
Soc., 1992.
Ilya Kapovich. The frequency space of a free group. Internat. J. Algebra Comput., 15(5-6):939–969,
2005.
Ilya Kapovich. Currents on free groups. In Topological and asymptotic aspects of group theory,
volume 394 of Contemp. Math., pages 149–176. Amer. Math. Soc., Providence, RI, 2006.
Ilya Kapovich and Martin Lustig. Geometric intersection number and analogues of the curve complex for free groups. Geom. Topol., 13(3):1805–1833, 2009.
Ilya Kapovich and Martin Lustig. Domains of proper discontinuity on the boundary of outer space.
Illinois J. Math., 54(1):89–108, 2010.
Ilya Kapovich and Martin Lustig. Intersection form, laminations and currents on free groups. Geom.
Funct. Anal., 19(5):1426–1467, 2010.
Ilya Kapovich and Martin Lustig. Ping-pong and outer space. J. Topol. Anal., 2(2):173–201, 2010.
Gilbert Levitt. Counting growth types of automorphisms of free groups. Geometric and Functional
Analysis, 19(4):1119–1146, 2009.
Gilbert Levitt and Martin Lustig. Irreducible automorphisms of Fn have north-south dynamics on
compactified outer space. J. Inst. Math. Jussieu, 2(1):59–72, 2003.
Martin Lustig and Caglar Uyanik. North-south dynamics of hyperbolic free group automorphisms
on the space of currents. arXiv preprint arXiv:1509.05443v2, 2016.
Martin Lustig and Caglar Uyanik. Perron-Frobenius theory and frequency convergence for reducible
substitutions. Discrete and Continuous Dynamical Systems, 37(1):355–385, 2017.
Joseph Maher. Random walks on the mapping class group. Duke Mathematical Journal, 156(3):429–
468, 2011.
Reiner Martin. Non-uniquely ergodic foliations of thin-type, measured currents and automorphisms
of free groups. ProQuest LLC, Ann Arbor, MI, 1995. Thesis (Ph.D.)–University of California, Los
Angeles.
Igor Rivin. Walks on groups, counting reducible matrices, polynomials, and surface and free group
automorphisms. Duke Mathematical Journal, 142(2):353–379, 2008.
William P. Thurston. On the geometry and dynamics of diffeomorphisms of surfaces. Bull. Amer.
Math. Soc. (N.S.), 19(2):417–431, 1988.
Caglar Uyanik. Dynamics of hyperbolic iwips. Conformal Geometry and Dynamics of the American
Mathematical Society, 18(11):192–216, 2014.
Caglar Uyanik. Generalized north-south dynamics on the space of geodesic currents. Geometriae
Dedicata, 177(1):129–148, 2015.
Aix Marseille Université, CNRS, Centrale Marseille, I2M UMR 7373 13453, Marseille, France
E-mail address: Martin.Lustig@univ-amu.fr
Department of Mathematics, University of Illinois at Urbana-Champaign, 1409 West Green Street,
Urbana, IL 61801, USA, http://www.math.uiuc.edu/~cuyanik2
E-mail address: cuyanik2@illinois.edu
| 4math.GR
|
Further insights into the damping-induced self-recovery
phenomenon
Tejas Kotwal ∗, Roshail Gerard †and Ravi Banavar
‡
arXiv:1709.05596v4 [cs.SY] 11 Jan 2018
January 12, 2018
1
Abstract
In a series of papers [1, 2, 3, 4], D. E. Chang, et al., proved and experimentally demonstrated a phenomenon they termed “damping-induced self-recovery”. However, these papers left a few questions
concerning the observed phenomenon unanswered- in particular, the effect of the intervening lubricantfluid and its viscosity on the recovery, the abrupt change in behaviour with the introduction of damping,
a description of the energy dynamics, and the curious occurrence of overshoots and oscillations and
its dependence on the control law. In this paper we attempt to answer these questions through theory. In particular, we derive an expression for the infinite-dimensional fluid-stool-wheel system, that
approximates its dynamics to that of the better understood finite-dimensional case.
2
Introduction
The damping-induced self-recovery phenomenon refers to the fundamental property of underactuated
mechanical systems: if an unactuated cyclic variable is subject to a viscous damping-like force and the
system starts from rest, then the cyclic variable will always recover to its initial state as the actuated
variables are brought to rest. A popular illustration exhibiting self-recovery is when a person sits on
a rotating stool with damping, holding a wheel whose axis is parallel to the stool’s axis. The wheel
can be spun and stopped at will by the person (Refer to [5]). Initially, the system begins from rest;
when the person starts spinning the wheel (say anticlockwise), the stool begins moving in the expected
direction (i.e., clockwise). Then the wheel is brought to a halt; the stool then begins a recovery by
going back as many revolutions in the reverse direction (i.e., anticlockwise) as traversed before. This
phenomenon defies conventional intuition based on well-known conservation laws. Andy Ruina was the
first to report this phenomenon in a talk, where he demonstrated a couple of experiments on video
[6]. Independently, Chang et al., [1, 2] showed that in a mechanical system with an unactuated cyclic
variable and an associated viscous damping force, a new momentum-like quantity is conserved. When
∗ Department
of Mathematics
of Mechanical Engineering
‡ Systems and Control Engineering, Indian Institute of Technology Bombay, Mumbai, India
† Department
1
the other actuated variables are brought to rest, the conservation of this momentum leads to asymptotic
recovery of the cyclic variable to its initial position. Boundedness is another associated phenomenon, in
which the unactuated cyclic variable reaches a saturation eventually, when the velocity corresponding to
the actuated variable is kept constant; this occurs due to the presence of damping. In the experiment
explained above, this manifests as the angle of rotation of the stool reaching an upper limit, when the
wheel is spinning at a constant speed.
Chang et al. generalize this theory to an infinite-dimensional system in which the interaction of an
intermediate fluid is considered [3, 4]; they show that the fluid layers also display self-recovery, which
is confirmed via experiments as well [7]. Such a generalization of the model is considered because of
the interaction of the fluid in the bearing with the recovery phenomenon of the stool, in the experiment
explained above. In this work, we make the following points:
• We show that the dynamics of the stool and the wheel in the infinite-dimensional fluid system can
be approximated to that of the finite-dimensional case by finding an effective damping constant
that takes into account the effect of the viscous fluid on the system.
• We analyse the finite-dimensional system from a dynamical systems point of view, and show that
a bifurcation occurs when the damping constant switches from zero to a positive value. We also
derive an expression for the angle at which boundedness occurs.
• In addition to the recovery phenomenon described previously, further complex behaviour is observed
in the experiments reported in [5, 7]. In particular, the unactuated variable not only approaches
its initial state during recovery, but also overshoots and then oscillates about this initial position,
eventually reaching it asymptotically. This oscillation phenomenon has not been looked into in
previous works, and is one of the points that we address as well.
• In Chang et al. [5], in the experiment described, the oscillations are of significant amplitude, and
this would prompt one to assume that some sort of mechanical ‘spring-like’ energy is being stored,
as the stool appears to start moving after the entire system has come to a halt. The question of
energy has been touched upon in this work, and we present energy balance equations for the given
mechanical system.
The paper unfolds as follows. Initially we present mathematical models for the stool-wheel experiment
- the first is a finite-dimensional one, and the second one incorporates the intervening fluid (either in
the bearing or in a tank) using the Navier-Stokes equation for a Newtonian incompressible fluid. This
is followed by a section that presents an intuitive interpretation of recovery highlighting three distinct
types of behaviour. Then follows a theoretical section that presents a technique to reduce the infinitedimensional fluid effect to an effective damping constant and hence model the overall system in finite
dimensions. This part is followed up by a result on boundedness and the occurrence of a bifurcation
in the system dynamics. In the appendix, the derived results are used in conjunction with numerical
experiments to validate the expression for the effective damping constant. We then examine the case of
2
oscillations and overshoots, and present plausible explanations to why these occur, and possible sources
of future investigation.
3
Mathematical models
Finite-dimensional model: We first analyze a simplified, idealized version of the person with a wheel
in hand, sitting on a rotatable stool whose motion is opposed by damping, which for the purpose of
analysis is assumed to be linear viscous damping. This is a specific example of the model that Chang, et
al. studied [1, 2]. We assume two flat disks, one for the wheel and one for the stool-person mass as shown
in Fig. 1. The stool consists of an internal motor, that actuates the wheel, while the motor-rod-stool
setup rotates as one piece (henceforth just called the stool). There is linear viscous damping present in
the rotational motion of the stool, with damping coefficient k. The torque imparted on the wheel by the
motor is denoted by u(t).
Figure 1: A schematic diagram of the wheel-stool model.
The inertia matrix of the system is given by
(mij ) =
m11
m21
I
= w
m22
Iw
m12
Iw
Iw + Is
,
(1)
where Iw and Is are the moments of inertia of the wheel and stool respectively. The kinetic energy
of the described system is
K.E.(t) =
1
1
Iw (θ̇w + φ̇s )2 + Is φ̇2s ,
2
2
(2)
where θw denotes the angle rotated by the wheel relative to the stool, and φs denotes the angle
rotated by the stool relative to the ground frame. Since there is no external potential in our system, the
3
Lagrangian only comprises of the total kinetic energy. The Euler-Lagrange equations for the system are
given by
Iw φ̈s + Iw θ̈w = u(t)
(3a)
(Iw + Is )φ̈s + Iw θ̈w = −k φ̇s
(3b)
Although this model captures the damping-induced boundedness and recovery phenomena, further
behaviour that cannot be explained with this model are the overshoot and oscillations, which were
observed in experiments [5, 7]. It was suggested that the lubricating fluid inside the bearing of the
rotatable stool could be one of the reasons behind this additional behaviour. As a result, a generalized
model that involves the dynamics of the fluid interacting with the stool-wheel setup is analyzed [3, 4].
Infinite-dimensional fluid model: The model consists of two concentric infinitely long cylinders
with inner radius Ri and outer radius Ro . The outer radius is fixed, while the inner cylinder is free
to rotate (this is the stool in our case). A motor is installed in the inner cylinder (as described in the
previous case, i.e., φs ), to drive the wheel (i.e., θw ) attached to it. The annulus region between the two
cylinders is filled with an incompressible viscous fluid. Due to symmetry in the z direction, we may
regard this as a 2D system in a horizontal plane. The moments of inertia should be considered as per
unit depth, because of the infinite length in the z direction. Due to rotational symmetry, the fluid only
flows coaxially, i.e, there is no fluid flow in the radial direction. Let v(r, t) denote the tangential velocity
of the fluid at radius r and time t, where Ri ≤ r ≤ Ro . The subscripts t and
r
denote partial derivatives
with respect to time and radius respectively. As described before, u(t) is the driving torque on the wheel
imparted by the motor. The corresponding equations are
Iw φ̈s + Iw θ̈w = u(t)
(4a)
(Iw + Is )φ̈s + Iw θ̈w = 2πρνRi Ri vr (Ri , t) − v(Ri , t)
(4b)
vt = ν(vrr +
vr
v
− 2)
r
r
(4c)
where ν is the kinematic viscosity and ρ is the density of the fluid. The right hand side of Eq. (4b)
is the torque on the inner cylinder due to stress exerted by the surrounding fluid [8]. Equation (4c) is
the Navier-Stokes equation for an incompressible viscid fluid in radial coordiantes. The system (4) is
an infinite-dimensional fluid system, compared to the previous finite-dimensional system (3). The initial
and boundary conditions are given by
φs (0) = φ̇s (0) = θw (0) = θ̇w (0) = 0
(5a)
v(r, 0) = 0
(5b)
v(Ri , t) = Ri φ̇s (t)
(5c)
v(Ro , t) = 0
(5d)
4
where Eqs. (5c) and (5d) are the no-slip boundary conditions for the fluid. The given initial conditions
imply that the entire system begins from rest. In order to control the wheel independently of the effects of
inertia of the stool and damping of the fluid, we employ a method known as partial feedback linearization.
This is done by partially cancelling the nonlinearities in the dynamics, i.e. the wheel equations are
linearized by introducing a new input τ (t) and redefining the input u(t) as
u(t) =
Iw
Iw + Is
Is τ (t) + 2πρνRi Ri vr (Ri , t) − v(Ri , t)
(6)
where τ (t) is precisely equal to the acceleration of the wheel, i.e. θ̈w = τ (t). We assume a PD control
law for the new control variable given as
d
d
d
τ (t) = θ̈w
(t) + c1 θ̇w
(t) − θ̇w + c0 θw
(t) − θw
(7)
d
where θw
(t) is the desired trajectory of the wheel, and c0 and c1 are the proportional and differential
gains respectively. For the standard demonstration of recovery and/or boundedness, we require the wheel
to be driven from rest to constant velocity, and then abruptly braked to a stop. Such a desired trajectory
d
(t) = (1/2) θ̇steady |t| − |t − tstop | + tstop where θ̇steady is
of the wheel is given by a ramp function, θw
the desired constant velocity of the wheel, and tstop is the time at which the wheel is instantaneously
brought to rest (Refer to Fig. 2). By appropriately tuning the values of c0 and c1 , we can mimic the
desired trajectory. This tuning is important in accounting for the presence of oscillations, or lack thereof,
Desired trajectory of the wheel 3wd (rad)
as we shall see later.
slope = 3_steady
0
0
tstop
Time t (s)
d
Figure 2: An illustration of the desired trajectory θw
(t) in the control law of the wheel (7)
.
4
An intuitive interpretation of recovery
We present a qualitative interpretation of the boundedness and recovery phenomenon using the momentum equation of the finite dimensional stool-wheel case. A brief explanation of the recovery phenomenon
was also presented by Andy Ruina [6] which we summarize: Change in angular momentum is equal to
5
the net external torque, but since it is only due to linear viscous damping, we have L̇ = −cϕ̇ (where L is
the angular momentum, c is the damping constant and ϕ is the angle). If the system’s initial and final
state is the rest state, then ∆L = 0 =⇒ ∆ϕ = 0. Thus the net change in angle has to be zero, implying
that recovery must occur. We delve a little deeper into the phenomenon and attempt to provide an
intuitive interpretation for the reversal of direction of the stool.
Consider the case where the wheel follows the desired trajectory perfectly (i.e., the ramp function).
This means that at t = 0, an impulsive acceleration gets the wheel spinning instantaneously (to a constant
speed), and at t = tstop , an impulsive deceleration brings the wheel to a halt instantaneously (refer to
Fig. 3). Consider the damping-induced momentum equation, as derived by Chang, et al. [1, 2]
Acceleration of wheel 3Bw (rad=s2 )
Iw (θ̇w + φ̇s ) + Is (φ̇s ) + kφs = 0
(8)
2000
1000
0
-1000
-2000
0
2
4
6
8
10
Time t (s)
Figure 3: Acceleration vs time for the wheel. The first peak corresponds to the initial impulse to get the
wheel spinning to a constant velocity; the second negative impulse is to brake the wheel to a halt.
At t = 0, there is a jump in θ̇w , while φs remains constant (i.e., φs = 0) (refer to Figs. 8 and 9). The
momentum equation (8) then simplifies to
Iw (θ̇w (0) + φ̇s (0)) + Is (φ̇s (0)) = 0
(9)
which is the usual momentum conservation. Thus, at t = 0, the velocity of the stool is governed
by the conservation of standard angular momentum, and the velocity of the wheel. Let this velocity be
φ̇s (0) = φ̇fs .
At t = tstop , there is an instantaneous jump down to zero for θ̇w , while φs remains constant. This
time, the momentum equation (8) simplifies to
Iw (θ̇w (tstop ) + φ̇s (tstop )) + Is (φ̇s (tstop )) = C
(10)
where C is a constant (C = −kφs (tstop )). Once again, this equation may be interpreted as the
standard angular momentum conservation. We examine three distinct cases:
• Case 1: (No damping) The speed of the stool at t = tstop − ε is the same as what it was at t = 0,
6
(i.e. φ̇fs ), implying that at t = tstop , the stool comes to rest instantaneously (i.e., φ̇s (tstop ) = 0).
Recall, that this is the standard case, where the usual momentum conservation law holds. Refer
to Figs. 7 and 4.
Position of stool ?s (rad)
0
-0.2
-0.4
-0.6
-0.8
-1
0
2
4
6
8
10
Time t (s)
Figure 4: Case 1. k = 0, tstop = 5, vw = 2. This case corresponds to the usual momentum conservation.
• Case 2: (Damping present but damping induced boundedness not yet reached) During 0 < t <
tstop , the damping force keeps decreasing the speed of the stool. However, the momentum equation
(10) is still the same at t = tstop . Thus, the change in momentum of the stool would be the same (as
in Case 1). But since |φ̇s (tstop − ε)| < |φ̇fs |, the final momentum of the wheel ends up overshooting
zero at t = tstop , resulting in the change in direction of the stool. Refer to Figs. 7 and 5.
• Case 3: (Damping present and damping-induced boundedness has been attained) This case can
be viewed as a special instance of Case 2, where for 0 < t < tstop , the speed of the stool decreases
all the way to zero. The rest of the explanation follows as in Case 2. Refer to Figs. 7 and 6.
7
Position of stool ?s (rad)
0
-0.02
-0.04
-0.06
-0.08
-0.1
0
2
4
6
8
10
Time t (s)
Figure 5: Case 2. k = 1, tstop = 1, vw = 2. In this case, damping-induced boundedness is not yet
reached, but the recovery phenomenon can be seen.
Position of stool ?s (rad)
0
-0.05
-0.1
-0.15
0
2
4
6
8
10
Time t (s)
Figure 6: Case 3. k = 1, tstop = 5, vw = 2. In this case, both—damping-induced boundedness and
recovery phenomenon can be seen.
8
Change in velocity of the stool
before and after braking
0
Case 1
Case 2
Case 3
Figure 7: Comparison of the three cases before and after braking. Blue dots: velocity of stool just
before braking; red dots: velocity of stool immediately after braking. For cases 2, 3, the (magnitude of)
velocity of the stool before braking decreases due to damping; hence momentum transferred by the wheel
overshoots the stool velocity to something positive. This explains why the wheel changes direction.
9
5
Effective damping constant
In this section, we demonstrate that the dynamics of the infinite-dimensional fluid system can be approximated by that of a finite-dimensional one.
d
Claim 5.1. Let the desired trajectory of the wheel be the ramp function, given by θw
(t) = (1/2) θ̇steady |t|−
|t − tstop | + tstop . Then the solution of Eq. (4c) satisfies
lim v(r, t) = lim Ri φ̇s (t)
t→∞
t→∞
Ro − r
.
Ro − Ri
Proof: We consider an analytical solution to the PDE (4c), obtained by the method of separation
of variables. Since one of the boundary conditions is non-homogeneous (and in fact time dependent), we
perform a change of variables in order to make it homogeneous [9]. The change of variables is given as
v(r, t) = w(r, t) + Ri φ̇s (t)
Ro − r
Ro − Ri
(11)
where w(r, t) is transformed the variable. The correction term is taken as a linear interpolation
between the two boundary conditions for simplicity. The transformed PDE is given as
wt − ν(wrr +
w
wr
− 2 ) = F (r, t)
r
r
(12)
where F (r, t) is the driving force of the PDE resulting from the change of variables given by
F (r, t) = −Ri φ̈s (t)
Ro − r
Ro
− νRi φ̇s (t) 2
Ro − Ri
r (Ro − Ri )
(13)
The transformed initial and boundary conditions are given by
w(r, 0) = 0
(14a)
w(Ri , t) = 0
(14b)
w(Ro , t) = 0
(14c)
We assume the solution w(r, t) = W (r)T (t), and obtain the homogeneous solution of the spatial ODE
by analyzing the corresponding eigenvalue problem. The eigen solution obtained is given by
r
W (r) = aJ1
r
λ
λ
r + bY1
r
ν
ν
(15)
where J1 and Y1 are the Bessel’s functions of the first and second kind respectively, λ denotes the
eigen value, and a and b are arbitrary constants determined by the boundary conditions. Upon plugging
in the boundary conditions, and solving for λ, we find that the eigen values are positive due to the fact
that roots of Bessel’s functions are real [10]. Thus we have the following solution for v(r, t)
10
v(r, t) =
∞
X
r
J1
n=1
|
r
!
λn
λn
Ro − r
r + kn Y1
r
Tn (t) +Ri φ̇s (t)
ν
ν
Ro − Ri
{z
}
(16)
transient term
where kn and λn are constants obtained by solving the boundary conditions in the eigen value problem,
and Tn (t) is the time component of the solution, which is obtained by solving the corresponding initial
value problem. The series given in the right hand side of Eq. (16) is considered as a transient term
for the PDE (4c), and we show that it is insignificant as t → ∞. Consider the time component of the
solution (16)
Z
t
e
Tn (t) =
0
R Ro
−λn (t−τ ) Ri
F (r, τ )Wn (r)dr
R Ro
Ri
Wn (r)2 dr
dτ = e
−λn t
Z
t
eλn τ (mφ̈s (τ ) + lφ̇s (τ ))dτ
0
where Wn (r) is the nth term of the Fourier series, and m and l are constants obtained after evaluating
the integrals in the spatial variable. For our case, plug in θ̇w (t) equal to the desired ramp trajectory
d
(θw
(t) = (1/2) θ̇steady |t| − |t − tstop | + tstop ) in the momentum equation (8). Upon solving for φ̇s (t),
we see that it is exponentially decaying, and therefore Tn (t) → 0 as t → ∞ for all n.1 Thus, we have the
result.
.
In the limit where the transient term is insignificant, the solution (16) is plugged in Eq. (4b) and
simplified as follows
(Iw + Is )φ̈s + Iw θ̈w = −
2πρνRo Ri2
φ̇s
Ro − Ri
(17)
We would like to emphasize here that we have found an effective damping constant kef f for the
infinite-dimensional fluid system (4) that approximates its dynamics to that of a finite dimension case
(3). The effective damping constant is given by
kef f =
2πρνRo Ri2
Ro − Ri
(18)
We revisit this effective damping constant and its validity in the appendix, after we introduce a couple
of expressions from the boundedness and bifurcation section.
6
Boundedness and bifurcation
We now revisit the finite dimensional case (3), and rewrite the corresponding momentum equation as a
first order system. The damping-induced momentum equation (8) is given by
(Iw + Is )φ̇s + Iw θ̇w (t) + kφs = 0
(19)
1 In fact, the result holds for any wheel trajectory that grows polynomially for finite time before eventually coming to
rest.
11
where θ̇w (t) is written as a function of time, since it is an external driving force for the stool dynamics.
(Using partial feedback linearization, the wheel can be controlled independently of the stool).
Claim 6.1. Suppose k > 0. Then for a fixed speed of the wheel, say θ̇w (t) = vw = constant, we have the
following equality
lim φs (t) = φ∗s =
t→∞
−Iw vw
k
Proof: Rewritting Eq. (8) as a first order system in φs
φ̇s =
−k
−Iw
φs +
θ̇w (t) = −αφs − β θ̇w (t) = f (φs , t)
Iw + Is
Iw + Is
(20)
where α, β are constants. Since Eq. (20) is a nonautonomous system, we rewrite it in a higher
dimensional autonomous form as
φ̇s = −αφs − β θ̇w (t)
(21a)
ṫ = 1
(21b)
In the differential equation for the stool, for a fixed speed of the wheel, say θ̇w (t) = θ̇steady = vw =
constant, the solution is
Z
φs (t) = −β
t
[e−α(t−s) ]vw ds =
0
−βvw
[1 − e−αt ]
α
(22)
and as t → ∞, we have
φ∗s = lim φs (t) =
t→∞
−βvw
−Iw vw
=
α
k
.
The above equality corresponds to the damping-induced boundedness phenomenon, and is especially
relevant in Figs. 8 and 9. Now we get to the dynamical systems aspect of our discussion.
For the purpose of this discussion we present a few definitions from standard texts on dynamical
systems. A fixed point for a system of differential equations Ẋ = F (X) is defined as the set of points
that are solutions to the equation F (X) = 0. A fixed point for system (21) does not exist since ṫ 6= 0 for
any state (φs , t). We will consider (φ∗s , t∗ ) to be a fixed point if f (φ∗s , t∗ ) = 0. A bifurcation is defined as
a change in the qualitative structure of the flow as the parameters are varied. In particular, fixed points
can be created or destroyed, or their stability can change [11]. In this particular case, the drastic change
in behaviour occurs at k = 0.
d
Claim 6.2. Let the desired trajectory of the wheel be the ramp function, i.e., θw
(t) = (1/2) θ̇steady |t| −
|t − tstop | + tstop . Then
• If k = 0, the stool dynamics is neutrally stable
• If k > 0, the stool dynamics is asymptotically stable.
Thus, a bifurcation occurs when k is varied from 0 to a positive number.
12
Velocity of stool ?_ s (rad=s)
0.1
0
-0.1
-0.2
-0.8
-0.6
-0.4
-0.2
0
Position of stool ?s (rad)
Figure 8: Phase portrait of stool dynamics with varying values of damping coefficient k, and steady
state wheel velocity θ̇steady = 2. Green: k = 1; red: k = 0.1; blue: k = 0. Green: damping-induced
boundedness attained; red: damping induced boundedness is not yet reached; blue: neutral stability, no
recovery phenomenon. The final equilibrium point for the k = 0 case and k > 0 are drastically different.
Proof: k = 0: From eqn. (21),
k = 0 ⇒ φ̇s = −β θ̇w (t)
This implies that the stool dynamics has a fixed point only when the wheel is brought to a rest; the stool
is neutrally stable at any constant value φ∗s .
k > 0: The fixed point φ∗s for the stool dynamics is governed by
φ∗s =
−Iw
θ̇w (t∗ )
k
(23)
For a fixed point to occur, there are two possibilities:
The wheel is at a constant speed vw ⇒ φ∗s = −Iw vw /k
or
The wheel is at rest ⇒ φ∗s = 0
Clearly, if the wheel is braked (zero speed), the stool must go back to its initial state (φ∗s = 0) governed
by
φ̇s = −αφs
(24)
This is the damping-induced self recovery equilibrium state. As seen from the above analysis, the system
undergoes a change in its dynamical system behaviour, when k is switched from 0 to a positive number.
Eq. (23), rewritten as
φ∗s k = −Iw θ̇w (t∗ )
(25)
is the equation of a hyperbola in the variables φ∗s and k, and as k → 0, φ∗s → ∞. For k > 0 (no matter
how small it is), the recovery phenomenon occurs (implying that the stool must return to its initial
position regardless how many rotations it has completed). But for k = 0, the stool is neutrally stable,
implying a change in the stability behaviour. (Note that as φs is 2π−periodic, one should consider
13
Velocity of stool ?_ s (rad=s)
0.3
0.2
0.1
0
-0.1
-0.2
-0.15
-0.1
-0.05
0
Position of stool ?s (rad)
Figure 9: Phase portrait of stool dynamics with varying values of steady state wheel velocity θ̇steady .
Innermost to outermost loop: θ̇steady = 1, 2, 3 (k = 1 for all cases).
φs mod 2π to obtain the actual position of the stool. However, not doing so, gives us the number of
rotations the stool completes. For e.g., if φ∗s = 8π, then the damping-induced bound is attained after
four rotations)
.
7
Oscillations and energy description
Oscillations of the unactuated variable have been reported in a few experiments on the damping induced
self-recovery phenomenon [4, 5, 6, 7]. In our opinion, the cause of these oscillations has not been
adequately identified in previous works. We believe that a seemingly trivial, but important source of
these oscillations, is the nature of the control law used on the wheel. It is observed that if oscillations
are induced in the wheel via the control law, then the stool also mimics these oscillations, with a slight
time lag due to the damping. This type of oscillation can be produced in both, the finite-dimensional
as well as the infinite-dimensional system. Refer to Figs. 10 and 11 for an example via simulations. We
would like to emphasize that oscillations of this kind are a direct consequence of the actuation of the
wheel. It is likely that the oscillations in [4, 7] are of this kind.
However, the oscillations in Ref. [5] occur even though the wheel is stationary with respect to the
stool; in fact, at the extreme positions of the oscillation, it appears as though the entire system (stool
and wheel) begins moving again from a complete state of rest. That is, it appears that there is some
kind of mechanical ‘spring-like’ energy being stored at these extreme positions. These oscillations are
clearly not of the type mentioned above, as they are not a direct result of the actuation of the wheel.
Additionally, the observed oscillations in the stool are of high amplitude whereas those in the wheel, if
any, appear to be of small amplitude. This is contradictory to what is observed in the previous type of
oscillations (seen in Figs. 10 and 11) as the inertia of the stool-wheel system is greater than the inerita
of the wheel only. A simple order of magnitude analysis shows that a more complex model is probably
14
Position of wheel 3w (rad)
500
400
300
200
100
0
0
5
10
15
20
Time t (s)
Figure 10: Trajectory of the wheel (solid blue line) with control parameters c0 = 1 and c1 = 3. The red
dashed line denotes the desired trajectory, and the overshoot of the wheel may be seen at t = 2s.
Position of stool ?s (rad)
0.02
0
-0.02
-0.04
-0.06
-0.08
0
5
10
15
20
Time t (s)
Figure 11: Trajectory of the stool (solid blue line) under the influence of the wheel trajectory shown in
Fig. 10. The black dashed line denotes the zero position of the stool, and the overshoot of the stool may
be seen after it recovers (Note the slight delay when compared to the overshoot of the wheel; this is due
to the time constant of the system).
required to account for this phenomenon. In order to demonstrate this, we first consider the energy
dynamics of the system.
Energy description for the finite-dimensional system: In order to derive the energy equations
of the finite dimensional system, (3b) is multiplied by φ̇s , and (3a) with θ̇w , to yield
(Iw + Is )φ̈s φ̇s + Iw θ̈w φ̇s = −k φ̇s φ̇s
(26a)
Iw φ̈s θ̇w + Iw θ̈w θ̇w = uθ̇w
(26b)
Equations (26a) and (26b) are integrated, and then summed up, resulting in the following energy
balance (in the ground frame)
Z
t
Z
uθ̇w dt = K.E.(t) +
0
0
15
t
k φ̇2s dt
(27)
where K.E.(t) is the total kinetic energy of the system. The second term on the right hand side of
represents the cumulative energy lost due to damping losses up to time t. The energy lost in damping is
precisely equal to the work done by the damping force, that is
Z
φs (t)
L.E.(t) =
Z
k φ̇s dφs =
0
t
k φ̇2s dt.
(28)
0
The term on the left hand side of Eq. (27) represents the total energy pumped into the system by
the motor, up to time t. The power input into the system by the motor is the sum of power imparted to
the wheel by the actuation force u(t), and the power imparted to the stool by the reaction force. The
cumulative input energy (denoted by I.E.(t)) is given by
Z
t
Z
t
Z
(29)
0
0
0
t
uθ̇w dt
(−u)φ̇s dt =
u(θ̇w + φ̇s ) dt +
I.E.(t) =
We can simplify the energy balance (27) as
I.E.(t) = K.E.(t) + L.E.(t)
(30)
Energy description for the infinite-dimensional fluid system: The above energy equation can be
extended for the infinite dimensional case as follows.
1
I.E.(t) = K.E.(t) + ρ
2
Z
1
v dV + ρν
2
2
Z tZ
0
∂vi
∂vk
+
∂xk
∂xi
2
dV dt
(31)
where the second term on the right hand side is the kinetic energy of the fluid, while the third term
is the energy lost due to viscous damping [8]. The velocity of the fluid in cartesian coordinates is given
by v = −v sinθ î + v cosθ ĵ, where v is the tangential velocity of the fluid as discussed previously
(4). We consider the system at a state when the wheel is no longer being actuated and is in a state
of rest with respect to the stool. The system can be found in such a state at the extreme position of
an oscillation that occurs after the wheel has been brought to rest. This implies that I.E(t) in (31)
is zero and hence, the kinetic energy of the stool can only be exchanged with that of the fluid, or be
lost due to damping. We analyze this state with the parameters from table 1 for the fluid-stool-wheel
system. At the extremum of the oscillation, the stool-wheel system is momentarily at rest, and as is
clear from (31), must be imparted energy from the fluid to start rotating again. The maximum energy
that the stool-wheel system could possibly regain is therefore equal to the kinetic energy of the fluid at
this extreme position. This leads to an expression (32) for the minimum fluid velocity (averaged over
the thickness of the annulus) in terms of system constants and the velocity of the stool.
i 2
1h
1
(Iw + Is )φ̇2s = ρπ (Ri + t)2 − (Ri )2 h vavg
2
2
(32)
where t and h are the thickness and height of the bearing respectively, while vavg is the velocity of the
fluid averaged over the thickness of the annulus. Even for a stool velocity as low as 1 rpm, the required
average fluid velocity is around 11 rpm, which is quite high and unrealistic. Hence, it is likely that a
16
different model is required to address such behaviour.
Name
Moment of Inertia of Wheel-Stool System
Inner diameter of bearing
Thickness of bearing
Height of bearing
Density of Fluid
Value
1
0.1
0.01
0.01
1000
Units
kg/m2
m
m
m
kg/m3
Table 1: Parameter values of fluid-wheel-stool system that are representative of experiment in [5]
8
Conclusion
In this paper, we present certain aspects of the damping-induced self recovery phenomenon that have
not been investigated so far in the existing literature. We present a technique to reduce the infinitedimensional fluid model to the better understood finite dimensional case, by deriving a formula for an
effective damping constant. We show that a bifurcation takes place at k = 0, and upon varying the value
of k from zero to a positive number, the stability of the stool changes from neutral to asymptotically
stable. We also derive an expression for the angle at which boundedness occurs to validate the approximation of the fluid system (by comparing with numerical experiments). Finally, we present an energy
description of the system to give an intuitive understanding of the energy dynamics, and to point out
that further experimental and theoretical investigation is necessary to explain the peculiar oscillations
found in experiments [5, 6].
References
[1] Dong Eui Chang and Soo Jeon. Damping-induced self recovery phenomenon in mechanical systems with an unactuated cyclic variable. Journal of Dynamic Systems, Measurement, and Control,
135(2):021011, 2013.
[2] Dong Eui Chang and Soo Jeon. On the damping-induced self-recovery phenomenon in mechanical
systems with several unactuated cyclic variables. Journal of Nonlinear Science, 23(6):1023–1038,
2013.
[3] Dong Eui Chang and Soo Jeon. On the self-recovery phenomenon in the process of diffusion. arXiv
preprint arXiv:1305.6658, 2013.
[4] Dong Eui Chang and Soo Jeon. On the self-recovery phenomenon for a cylindrical rigid body
rotating in an incompressible viscous fluid. Journal of Dynamic Systems, Measurement, and Control,
137(2):021005, 2015.
[5] Dong Eui Chang and Soo Jeon. Video of an experiment that demonstrates the self-recovery phenomenon in the bicycle wheel and rotating stool system. https://youtu.be/og5h4QoqIFs.
17
[6] Andy
bikes,
Ruina.
arrows,
Dynamic
and
walking
muscle-smarts:
2010:
Cats,
astronauts,
Stability,
translation,
and
trucks,
rotation.
http://techtv.mit.edu/collections/locomotion:1216/videos/8007-dynamic-walking-2010-andyruina-cats-astronauts-trucks-bikes-arrows-and-muscle-smarts-stability-trans, 2010.
[7] Dong Eui Chang and Soo Jeon. Video of an experiment that demonstrates the self-recovery phenomenon in the vessel and fluid system. https://youtu.be/26qGQccK4Rc.
[8] L. D. Landau and E. M. Lifshitz. Fluid Mechanics, volume 6. 1959.
[9] Stanley J Farlow. Partial differential equations for scientists and engineers. Courier Corporation,
1993.
[10] Milton Abramowitz and Irene A Stegun. Handbook of mathematical functions: with formulas, graphs,
and mathematical tables, volume 55. Courier Corporation, 1964.
[11] S.H. Strogatz. Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry,
and Engineering. Advanced book program. Avalon Publishing, 1994.
Appendix A
Validation of effective damping constant
With the computed, effective damping constant kef f (18) of the infinite-dimensional fluid system (4),
we find the angle at which boundedness is attained, given by
φ∗s =
−Iw vw (Ro − Ri )
2πρνRo Ri2
(33)
We now present some numerical experiments by solving the PDE-system (4) using the method of
lines. Equation (18) is then verified by comparing the numerical values obtained using formula (33)
and the numerical solutions of the original PDE. It is observed that the error tends to zero as Ro /Ri
approaches 1, independent of the value of Ri . The material constants used for the simulation, and for
the theoretical calculation are tabulated below
18
Ri (cm)
Ro (cm)
13.5
13.5
13.5
13.5
13.5
13.5
13.5
13.5
13.5
13.51
13.68
13.75
14
14.5
15
15.5
20
27
27
27
27
27
27
27
27
27
27
27.02
27.36
27.5
28
29
30
31
40
54
0.07
1.33
1.85
3.70
7.41
11.11
14.81
48.15
100
With the PDE
Angle (rad)
6.16
108.7
149.8
291.7
553.8
790.3
1004
2265
3123
With kef f
Angle (rad)
6.16
109.5
151.3
297.1
573.7
831.9
1073
2704
4160
0.07
1.33
1.85
3.70
7.41
11.11
14.81
48.15
100
1.54
27.19
37.47
72.96
138.5
197.6
251.1
566.3
780.8
1.54
27.37
37.81
74.28
143.4
208
268.4
675.9
1039.9
(Ro −Ri )
Ri
× 100
% Error
0.00
0.74
1.00
1.85
3.59
5.26
6.87
19.38
33.21
0.00
0.66
0.91
1.81
3.54
5.26
6.89
19.35
33.18
Table 2: A comparison of the angles at which boundedness occurs, i.e., between the numerical simulations
and the theoretically derived formula (33), for different values of (Ro − Ri )/Ri .
Name
Moment of Inertia of Wheel
Moment of Inertia of Stool
Kinematic Viscosity of Fluid
Density of Fluid
Steady State Velocity of Wheel
Proportional Control Parameter
Derivative Control Parameter
Value
6 × 10−3
1.96
1.17 × 10−6
1.0147 × 103
60π
1
100
Units
kg/m2
kg/m2
m2 /s
kg/m3
rad/s
-
Table 3: Parameter constants used for the simulations.
19
| 3cs.SY
|
Rate-Splitting for Multi-Antenna Non-Orthogonal
Unicast and Multicast Transmission
Yijie Mao∗ , Bruno Clerckx† and Victor O.K. Li∗
∗
arXiv:1802.05567v2 [cs.IT] 16 Feb 2018
The University of Hong Kong, Hong Kong, China
†
Imperial College London, United Kingdom
∗
Email: {maoyijie, vli}@eee.hku.hk, † b.clerckx@imperial.ac.uk
Abstract—In a superimposed unicast and multicast transmission system, one layer of Successive Interference Cancellation
(SIC) is required at each receiver to remove the multicast stream
before decoding the unicast stream. In this paper, we show that a
linearly-precoded Rate-Splitting (RS) strategy at the transmitter
can efficiently exploit this existing SIC receiver architecture. By
splitting the unicast message into common and private parts and
encoding the common parts along with the multicast message into
a super-common stream decoded by all users, the SIC is used for
the dual purpose of separating the unicast and multicast streams
as well as better managing the multi-user interference between
the unicast streams. The precoders are designed with the objective
of maximizing the Weighted Sum Rate (WSR) of the unicast
messages subject to a Quality of Service (QoS) requirement of the
multicast message and a sum power constraint. Numerical results
show that RS outperforms existing Multi-User Linear-Precoding
(MU–LP) and power-domain Non-Orthogonal Multiple Access
(NOMA) in a wide range of user deployments (with a diversity
of channel directions and channel strengths). Moreover, since one
layer of SIC is required to separate the unicast and multicast
streams, the performance gain of RS comes without any increase
in the receiver complexity compared with MU–LP. Hence, in such
non-orthogonal unicast and multicast transmissions, RS provides
rate and QoS enhancements at no extra cost for the receivers.
Index Terms—non-orthogonal multicast and unicast transmission, rate-splitting, rate region, WMMSE algorithm
I. I NTRODUCTION
The scarcity of radio resources and the heterogeneity of wireless applications in 5G and beyond motivate recent research
on the non-orthogonal unicast and multicast transmission [1]–
[4], which is based on Layered Division Multiplexing (LDM)
in the literature of digital television systems [5]. The unicast
and multicast messages are precoded and superimposed at the
transmitter and then broadcast to the receivers in the same timefrequency resources. Each receiver decodes and removes the
multicast message using Successive Interference Cancellation
(SIC) before decoding its intended unicast message. Joint
unicast and multicast beamforming of multi-cell cooperative
transmission has been studied, e.g., for transmit power minimization [1], [2], Weighted Sum Rate (WSR) maximization
[3] and energy efficiency maximization [4]. However, all of the
above works consider the use of Multi-User Linear Precoding
(MU–LP) beamforming for the unicast messages. Once the
common message is successfully decoded and subtracted from
the received signal, each receiver fully decodes its intended
unicast message by treating the interference as noise. However,
MU–LP is sensitive to the user channel orthogonality and
strengths. Another method is to apply power-domain Nonorthogonal Multiple Access (NOMA) to decode the unicast
This work is partially supported by the U.K. Engineering and Physical
Sciences Research Council (EPSRC) under grant EP/N015312/1.
messages at the cost of more layers of SICs. Power-domain
NOMA relies on Superposition Coding (SC) at the transmitter
and SIC at the receivers [6]. It is denoted in short as SC–SIC
in this work. By using SC–SIC, some users are forced to fully
decode and cancel interference created by other users. Such
method is only suitable when the user channels are (semi-)
aligned and exhibit a large disparity of strengths.
In contrast to MU–LP and SC–SIC, linearly-precoded RateSplitting (RS) is an emerging multi-user multi-antenna transmission strategy where each unicast message is split into a
common part and a private part at the transmitter [7]. The
common part is required to be decoded by all the receivers
and removed from the received signal using SIC before each
receiver decodes its intended private part by treating the interference from other users as noise. RS can be viewed mathematically as a non-orthogonal unicast and multicast transmission
strategy given the superimposed transmission of common and
private messages. Hence, RS was termed joint multicasting
and broadcasting in [8]. However, common message in RS
has an objective different from that of a conventional multicast
message. The multicast message is intended and decoded by all
the users while the common message of RS is decoded by all
users but is intended to a subset of users. Its presence enables
the decoding of part of the multi-user interference and treating
the remaining part of the interference as noise.
In this work, motivated by the benefits of RS in multiantenna Broadcast Channels (BC) [7], [9], [10], we propose
the use of RS in non-orthogonal unicast and multicast transmissions. To the best of our knowledge, this is the first
work that applies RS to non-orthogonal unicast and multicast
transmissions. In such a setup, we split the unicast messages
into common and private parts and encode the common parts
along with the multicast message into a super-common stream
decoded by all users. A single layer of SIC in RS is then used
for the dual purpose of separating the unicast and multicast
streams as well as better managing the multi-user interference
of the unicast streams. We design the precoders by formulating
the WSR maximization problem of the unicast messages with a
Quality of Service (QoS) requirement of the multicast message
and a sum power constraint. The problem is transformed into an
equivalent Weighted Minimum Mean Square Error (WMMSE)
problem and solved using an Alternating Optimization (AO)
algorithm. We demonstrate in the numerical results that the
rate region of RS is always equal to or larger than that of MU–
LP and SC–SIC. Importantly, this performance gain comes at
no additional cost for the receivers since one layer of SIC
is required to separate unicast and multicast streams in the
conventional MU–LP strategy. In other words, RS makes a
better use of the existing SIC architecture.
The rest of the paper is organized as follows. In Section
II, the existing MU–LP beamforming is overviewed. The
proposed RS beamforming and the optimization framework are
respectively specified in Section III and Section IV. Section V
illustrates numerical results and Section VI concludes the paper.
Notations: C and E{·} respectively refer to the complex
space and the statistical expectation. The boldface uppercase
and lowercase letters represent matrices and vectors, respectively. k·k is the Euclidean norm. The superscripts (·)T and
(·)H correspond to transpose and conjugate-transpose operators. tr(·) and diag(·) are the trace and diagonal entries.
II. E XISTING MU–LP B EAMFORMING
In this work, we consider a BS equipped with Nt antennas
serving K single-antenna users. The users are indexed by
the set K = {1, . . . , K}. In each time frame, the BS wants
to transmit a multicast message W0 intended for all users
and K unicast messages W1 , . . . , WK intended for different users. The messages W0 , W1 , . . . , WK are independently
encoded into data streams s0 , s1 , . . . , sK . The stream vector
s = [s0 , s1 , . . . , sK ]T is precoded using the precoder P =
[p0 , p1 , . . . , pK ], where p0 ∈ CNt ×1 and pk ∈ CNt ×1 are the
respective precoders of the multicast stream s0 and the unicast
stream sk , ∀k ∈ K. Assuming that E{ssH } = I, the transmit
power is constrained by tr(PPH ) ≤ Pt . The resulting transmit
signal x ∈ CNt ×1 is given by
X
x = Ps = p0 s0 +
pk s k .
(1)
k∈K
The signal received at user-k is yk = hH
k x + nk , where
hk ∈ CNt ×1 is the channel between the BS and user-k. nk ∼
2
CN (0, σn,k
) is the Additive White Gaussian Noise (AWGN)
at user-k. Without loss of generality, we assume the noise
variances are equal to one. The transmit SNR is equal to the
total power consumption Pt . We assume perfect Channel State
Information at the Transmitter (CSIT) and perfect Channel
State Information at the Receivers (CSIR).
At user sides, each user first decodes the multicast stream by
treating the signal of all the unicast streams as interference. The
Signal-to-Interference-plus-Noise Ratio (SINR) of the multicast
2
2 P
H
+ 1).
stream at user-k is γk,0 = hH
k p0 /( j∈K hk pj
Once s0 is successfully decoded, its contribution to the original
received signal yk is subtracted. After that, user-k decodes
its unicast stream sk by treating the unicast streams of other
users as noise. The SINR of decoding the unicast stream sk
2
2 P
H
at user-k is γk = hH
+ 1). The
k pk /( j∈K,j6=k hk pj
corresponding achievable rates of s0 and sk at user-k are
Rk,0 = log2 (1 + γk,0 ) and Rk = log2 (1 + γk ) .
(2)
To ensure that s0 is successfully decoded by all users, the
achievable rate of s0 shall not exceed
R0 = min {R1,0 , . . . , RK,0 } .
(3)
In this work, we maximize the WSR of the unicast messages
while the rate constraint of the multicast message and the power
constraint of the BS should be met. For a given weight vector
u = [u1 , . . . , uK ], the WSR achieved by the unicast messages
Fig. 1: K-user RS assisted multi-antenna non-orthogonal unicast and multicast transmission model
in the K-user MU–LP assisted multi-antenna non-orthogonal
unicast and multicast is
X
uk Rk
(4a)
RMU−LP (u) = max
P
k∈K
s.t. Rk,0 ≥ R0th , ∀k ∈ K
(4b)
H
(4c)
tr(PP ) ≤ Pt
where R0th is the lower bound on the multicast rate.
III. P ROPOSED R ATE - SPLITTING B EAMFORMING
In this section, we introduce the use of RS to the system. We
highlight the difference between the proposed RS beamforming
and the existing MU–LP beamforming. The contents that are
not specified remain consistent with Section II.
The main difference between MU–LP and RS beamforming
lies in the generation of the data streams. Different from MU–
LP beamforming where the messages are directly encoded
into independent streams, the unicast message Wk intended
for user-k is split into a common part Wk,c and a private
part Wk,p , ∀k ∈ K. The common parts of the unicast messages W1,c , . . . , WK,c are encoded along with the multicast
message W0 into a super-common stream s0 . It is required
to be decoded by all users. Note that s0 includes not only
the whole multicast message, but parts of the unicast messages intended for different users. The private parts of the
unicast streams W1,p , . . . , WK,p are independently encoded
into the private streams s1 , . . . , sK . The stream vector s =
[s0 , s1 , . . . , sK ]T are linear precoded via the precoder matrix
P = [p0 , p1 , . . . , pK ] and broadcast to users. The system
model is illustrated in Fig. 1.
At user sides, the super-common stream and private streams
are decoded using SIC as in MU–LP. The achievable rate of the
super-common stream Rk,0 and the private stream Rk , ∀k ∈ K
are calculated based on equation (2). To ensure that the supercommon stream s0 is successfully decoded by all users, the
achievable super-common rate R0 is calculated by equation
(3). R0 is shared by the rate of transmitting the multicast
message W0 and the rates of transmitting the common parts of
the unicast messages of all users, W1,c , . . . , WK,c . Denote C0
as the portion of R0 transmitting W0 and Ck,0 as the user-k’s
portion of R0 transmitting Wk,c , the achievable super-common
rate is equal to
X
C0 +
Ck,0 = R0
(5)
k∈K
Following the RS structure described above, the total achievable rate of the unicast message of user-k is Rk,tot = Ck,0 +
Rk . For a given weight vector u, the WSR achieved by the
private messages in the K-user RS assisted multi-antenna nonorthogonal unicast and multicast is
RRS (u) = max
P,c
s.t.
C0 +
X
uk Rk,tot
(6a)
k∈K
X
Ck,0 ≤ Rk,0 , ∀k ∈ K
(6b)
k∈K
C0 ≥ R0th
(6c)
Ck,0 ≥ 0, ∀k ∈ K
(6d)
tr(PPH ) ≤ Pt
(6e)
where c = [C0 , C1,0 , . . . , CK,0 ] is the common rate vector.
We note that problem (6) boils down to problem (4) when no
power is allocated to the common messages W1,c , . . . , WK,c .
Hence, RS always achieves the same or superior performance
to MU–LP.
In the unicast-only transmission, RS requires one layer of
SIC to decode the common parts of the unicast messages
for the purpose of enabling the capability of decoding part
of the multi-user interference and treating part of the multiuser interference as noise [7], [9], [10]. In comparison, MU–
LP does not require any SIC at each receiver in the unicastonly transmission. However, one-layer of SIC is necessary at
each user to decode the multicast stream before decoding the
intended unicast stream in the MU–LP assisted joint unicast
and multicast transmission and RS still requires one layer of
SIC at no extra cost for the receivers. The SIC of RS in the
joint unicast and multicast transmission is used for separating
the unicast and multicast streams as well as better managing
the multi-user interference between the unicast streams.
to γk,0 = 1/εMMSE
− 1 and γk = 1/εMMSE
− 1 based on
k,0
k
(9). The rates become Rk,0 = − log2 (εMMSE
k,0 ) and Rk =
− log2 (εMMSE
).
The
WMSEs
are
given
by
k
ξk,0 = uk,0 εk,0 − log2 (uk,0 ), ξk = uk εk − log2 (uk ),
where uk,0 and uk are weights associated with the MSEs of
∗
MMSE
and gk∗ = gkMMSE
user-k. The optimum equalizers gk,0
= gk,0
∂ξk,0
∂ξk
are then derived by solving ∂gk,0 = 0 and ∂g
= 0.
k
MMSE
Substituting gk,0
and gkMMSE into (10), we have
MMSE
= uk,0 εMMSE
− log2 (uk,0 ),
ξk,0 gk,0
k,0
(11)
MMSE
MMSE
ξk gk
= u k εk
− log2 (uk ).
The optimum MMSE weights are obtained by solving
MMSE
MMSE
∂ξk (gk
∂ξk,0 (gk,0
)
)
= 0 and
= 0, which are given by
∂uk,0
∂uk
−1
u∗k,0 = uMMSE
, (εMMSE
, u∗k = uMMSE
, (εMMSE
)−1 (12)
k,0
k,0 )
k
k
The Rate-WMMSE relationships are finally established by
substituting (12) into (11). They are given by
MMSE
,
ξk,0
(7)
εk = |gk |2 Tk − 2ℜ{gk hH
k pk } + 1,
P
H
2
2
where Tk,0 , |hH
k p0 | +
j∈K |hk pj | + 1 and Tk , Tk,0 −
2
H
|hk p0 | . The optimum MMSE equalizers are then calculated
∂ε
∂εk
by solving ∂gk,0
= 0 and ∂g
= 0, which are given by
k,0
k
−1
−1
MMSE
MMSE
gk,0
= pH
= pH
0 hk Tk,0 , gk
k hk T k .
(8)
Substituting (8) into (7), the MMSEs are
−1
εMMSE
, min εk,0 = Tk,0
Ik,0 , εMMSE
, min εk = Tk−1 Ik ,
k,0
k
gk,0
gk
(9)
2
where Ik,0 = Tk and Ik = Tk − |hH
p
|
.
The
SINRs
of
k
k
decoding s0 and sk at user-k can be respectively transformed
(13)
uk ,gk
Based on the Rate-WMMSE relationships in (13), the optimization problem (6) is transformed equivalently into the
WMMSE problem given by
X
min
uk ξk,tot
(14a)
P,x,u,g
εk,0 = |gk,0 |2 Tk,0 − 2ℜ{gk,0 hH
k p0 } + 1,
min ξk,0 = 1 − Rk,0 ,
uk,0 ,gk,0
ξkMMSE , min ξk = 1 − Rk .
IV. O PTIMIZATION F RAMEWORK
The WMMSE algorithm to solve the sum rate maximization
problem in RS without a multicast message is proposed in
[9]. It is extended to solve the problem (4) and (6). We firstly
explain the procedure to solve the RS problem (6) and then
specify how (4) can be solved correspondingly.
User-k decodes s0 and sk sequentially using SICs. The
common stream s0 is decoded first. By using the equalizer
gk,0 , s0 is estimated as ŝ0 = gk,0 yk . sk is estimated using the
equalizer gk as ŝk = gk (yk − hH
k p0 s0 ) after s0 is successfully
decoded and removed from yk . The Mean Square Errors
(MSEs) of the common and private streams are defined as
εk,0 , E{|ŝk,0 − sk,0 |2 } and εk , E{|ŝk − sk |2 }, respectively.
They are given by
(10)
s.t.
X0 +
k∈K
X
Xk,0 + 1 ≥ ξk,0 , ∀k ∈ K
(14b)
k∈K
X0 ≤ −R0th
(14c)
Xk,0 ≤ 0, ∀k ∈ K
(14d)
H
tr(PP ) ≤ Pt
(14e)
where x = [X0 , X1,0 , . . . , XK,0 ] is the transformation of
the common rate c. u = [u1,0 , . . . , uK,0 , u1 , . . . , uK ] and
g = [g1,0 , . . . , gK,0 , g1 , . . . , gK ] are the weights and equalizers,
respectively. ξk,tot = Xk,0 + ξk , ∀k ∈ K.
Denote uMMSE and gMMSE as two vectors formed by the
corresponding MMSE equalizers and weights. According to
the KKT conditions of problem (14), it is easy to show that
(uMMSE , gMMSE ) are optimal and unique. We can obtain
(uMMSE , gMMSE ) by minimizing (14a) with respect to u and
g, respectively. Problem (14) can be transformed to problem
(6) based on the Rate-WMMSE relationship (13) and the
common rate transformation c = −x. The solution given by
(c∗ = −x∗ , P∗ ) meets the KKT optimality conditions of (6)
for any point (x∗ , P∗ , u∗ , g∗ ) satisfying the KKT optimality
conditions of (14). Therefore, problem (6) and problem (14)
are equivalent.
The joint optimization of (x, P, u, g) in problem (14) is nonconvex. With fixed (x, P, u), the MMSE equalizer gMMSE is
optimal. With fixed (x, P, g), the MMSE weight uMMSE is the
optimal weight. With fixed (u, g), the optimization problem
(14) is a convex Quadratically Constrained Quadratic Program
(QCQP) which can be solved using interior-point methods.
1
2
3
4
5
6
7
Initialize: n ← 0, P[n] , WSR[n] ;
repeat
n ← n + 1;
P[n−1] ← P;
u ← uMMSE (Pn−1 ); g ← gMMSE (Pn−1 );
update (x, P) by solving (14) using the updated u, g;
until |WSR[n] − WSR[n−1] | ≤ ǫ;
V. N UMERICAL R ESULTS
In this section, the performance of the proposed RS beamforming is illustrated by comparing with the existing MU–LP
and SC–SIC beamforming. We focus on the two-user case since
different two-user rate regions are easily compared in a twodimensional figure.
The SC–SIC assisted joint unicast and multicast transmission
is briefed before we illustrate the results. Different from RS
where the multicast message is encoded with the common parts
of the unicast messages, the multicast message in SC–SIC is
encoded along with the unicast message to be decoded first into
a super-common stream s0 . Hence, the super-common rate R0
of SC–SIC is shared by the rate of the multicast message as
well as the rate of the unicast message to be decoded first. Following the system model of RS in Section III and the difference
between SC–SIC and RS, we can formulate the problem of
SC–SIC and solve it by modifying the optimization framework.
Note that the receiver complexity of SC–SIC increases with the
number of users. More layers of SICs are required at each user
to decode the interference from more users. Moreover, SC–
SIC is a particular instance of the proposed RS strategy when
K = 2 [10]. RS should always achieve the same or superior
performance to MU–LP and SC–SIC.
We investigate the influence of the multicast rate constraint,
channel strength disparity and channel angle between the users
on the performance. The BS is equipped with four antennas
(Nt = 4) serving two single-antenna users (K = 2). The
simulation setting follows the underloaded two-user deployment in [10]. The channels of users are realized as h1 =
(b) θ=2π/9
10
10
8
8
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
(a) θ=π/9
6
4
2
6
4
2
0
0
0
5
10
0
R1,tot (bit/s/Hz)
10
(d) θ=4π/9
10
8
8
R2,tot (bit/s/Hz)
10
6
4
RS
SC-SIC
MU-LP
2
5
R1,tot (bit/s/Hz)
(c) θ=π/3
R2,tot (bit/s/Hz)
Hence, the AO algorithm is motivated to solve the problem.
In the nth iteration, the equalizers and weights are
calculated
by (u, g) = uMMSE (P[n−1] ), gMMSE (P[n−1] ) based on
the precoder P[n−1] in the (n − 1)th iteration. (x, P) are
then calculated by solving problem (14). (u, g) and (x, P)
are iteratively updated until the convergence of the WSR.
Algorithm 1 shows the steps of AO, where ǫ is the error
tolerance for convergence and WSR[n] is the WSR calculated
based on the updated (x, P) in nth iteration. Since WSR[n] is
increasing with n and it is bounded above for a given power
constraint, the AO algorithm is guaranteed to converge. Note
that the global optimality of the solution cannot be guaranteed
in general as the problem is non-convex. The initialization of
the precoder P will influence the final results.
The optimization framework described above are adopted
to solve the MU–LP problem (4) by reformulating it into its
equivalent WMMSE problem and using the AO algorithm to
solve it.
Algorithm 1: Alternating Optimization Algorithm
6
4
2
0
0
0
5
R1,tot (bit/s/Hz)
10
0
5
10
R1,tot (bit/s/Hz)
Fig. 2: Achievable rate region comparison of different strategies
in perfect CSIT, γ = 1, R0th = 0.5 bit/s/Hz
H
H
[1, 1, 1, 1] , h2 = γ × 1, ejθ , ej2θ , ej3θ . In the following
results, γ = 1 and γ = 0.3, which respectively represent equal
channel strength and 5 dB channel strength
difference.
For each
π 4π
γ, we consider four different θ, θ ∈ π9 , 2π
,
,
9 3 9 . When
θ is less than π9 , the user channels are sufficiently aligned.
When θ is larger than 4π
9 , the user channels are sufficiently
orthogonal. The rate region is the set of all achievable points.
Its boundary is calculated by varying the weights assigned
to users. We follow the weights in [11], where the weight
of user-1 is fixed to u1 = 1 for each weight of user-2 in
u2 ∈ 10[−3,−1,−0.95,··· ,0.95,1,3] . The precoders of RS, MU–
LP and SC–SIC are initialized using the same methods as
discussed in [10]. SNR is fixed to 20 dB.
Fig. 2 shows the results when user-1 and user-2 have equal
channel strengths (γ = 1) and the multicast rate constraint
is R0th = 0.5 bit/s/Hz. In each subfigure, the rate region
achieved by RS is confirmed to be equal to or larger than
that of SC–SIC and MU–LP. RS performs well for any angle
between the user channels. As the SC–SIC strategy is motivated
by leveraging the channel strength difference of users, it is
sensitive to the channel strength disparity. When users have
equal channel strengths, SC–SIC has poor performance. RS
exhibits a clear rate region improvement over SC–SIC and
MU–LP when θ = π9 . The performance of MU–LP is poor
when the user channels are closely aligned to each other. MU–
LP is sensitive to the channel angle. As θ increases, the gap
between the rate regions of RS and MU–LP decreases. When
θ = 4π
9 , RS reduces to MU–LP.
Fig. 3 shows the results when γ = 1, R0th = 1.5 bit/s/Hz.
Comparing the corresponding subfigures of Fig. 2 and Fig.
3, the rate regions of all the strategies increase as the rate
threshold of the multicast message decreases. Moreover, the
rate region gain of RS over MU–LP and SC–SIC increases as
the rate threshold of the multicast message decreases. This is
due to the fact the super-common stream can absorb a larger
portion of the unicast messages as the rate of the multicast
message decreases. RS is able to overcome the limitations of
MU–LP and SC–SIC by dynamically determining the level of
the multi-user interference to decode and treat as noise. When
(b) θ=2π/9
10
8
8
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
(a) θ=π/9
10
6
4
2
6
4
2
0
0
0
5
10
0
R1,tot (bit/s/Hz)
(c) θ=π/3
10
(d) θ=4π/9
10
10
RS
SC-SIC
MU-LP
8
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
5
R1,tot (bit/s/Hz)
6
4
2
8
6
4
2
0
0
0
5
10
0
R1,tot (bit/s/Hz)
5
10
R1,tot (bit/s/Hz)
Fig. 3: Achievable rate region comparison of different strategies
in perfect CSIT, γ = 1, R0th = 1.5 bit/s/Hz
(b) θ=2π/9
6
5
5
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
(a) θ=π/9
6
4
3
2
1
4
3
2
1
0
0
0
5
10
0
R1,tot (bit/s/Hz)
10
R1,tot (bit/s/Hz)
(c) θ=π/3
R EFERENCES
(d) θ=4π/9
6
6
5
R2,tot (bit/s/Hz)
5
R2,tot (bit/s/Hz)
5
4
3
2
RS
SC-SIC
MU-LP
1
4
3
2
1
0
0
0
5
R1,tot (bit/s/Hz)
VI. C ONCLUSIONS
To conclude, we exploit the benefit of the linearly-precoded
RS in the joint unicast and multicast transmission systems.
Comparing with the conventional MU–LP assisted unicast
and multicast transmission system where one layer of SIC is
required at each receiver to remove the multicast stream before
decoding the unicast stream, the proposed RS-assisted unicast
and multicast transmission system further exploits the merits
of the existing one layer of SIC. By utilizing a super-common
stream to encapsulate the multicast message and parts of the
unicast messages, RS uses one layer of SIC to not only separate
the unicast and multicast streams but also dynamically manage
the multi-user interference. We show in the numerical results
that the performance of MU–LP and SC–SIC is more sensitive
to the channel strength disparity and channel angles among
users. Thanks to its ability of partially decoding the interference
and partially treating the interference as noise, RS softly
bridges and outperforms MU–LP and SC–SIC in any user
deployments. Moreover, the performance gain of RS increases
as the rate threshold of the multicast message decreases. The
benefit of RS is obtained without any increase in the receiver
complexity compared with MU–LP. Therefore, RS is a more
powerful transmission scheme for downlink multi-antenna nonorthogonal unicast and multicast transmission systems.
10
0
5
10
R1,tot (bit/s/Hz)
Fig. 4: Achievable rate region comparison of different strategies
in perfect CSIT, γ = 0.3, R0th = 0.5 bit/s/Hz
the rate threshold of the multicast message decreases, more
power is allocated to the unicast stream. RS exhibits further
benefits of dynamic interference management.
Fig. 4 shows the results when γ = 0.3, R0th = 0.5 bit/s/Hz.
Comparing with the corresponding subfigures of Fig. 2, the
rate region of SC–SIC is closer to that of RS when there is
a 5 dB channel strength difference. However, the rate region
gap between RS and SC–SIC increases with θ despite the 5
dB channel strength difference. Comparing with RS, SC–SIC
is more sensitive to the angle between the user channels. In
Fig. 4(b), SC–SIC and MU–LP outperform each other at one
part of the rate region and the rate region of RS is larger than
the convex hull of the rate regions of SC–SIC and MU–LP. We
can easily draw the conclusion from Fig. 4(b) that RS softly
bridges and outperforms MU–LP and SC–SIC. Comparing with
MU–LP and SC–SIC, RS is more robust to a wide range of
channel gain difference and channel angles among users. RS
always outperforms MU–LP and SC–SIC. This performance
gain comes at no additional cost for the receivers since one
layer of SIC is required to separate unicast and multicast
streams in the conventional MU–LP strategy.
[1] J. Zhao, O. Simeone, D. Gunduz, and D. Gomez-Barquero, “Nonorthogonal unicast and broadcast transmission via joint beamforming
and LDM in cellular networks,” in 2016 IEEE Global Communications
Conference (GLOBECOM), Dec 2016, pp. 1–6.
[2] Y. F. Liu, C. Lu, M. Tao, and J. Wu, “Joint multicast and unicast
beamforming for the MISO downlink interference channel,” in 2017 IEEE
18th International Workshop on Signal Processing Advances in Wireless
Communications (SPAWC), July 2017, pp. 1–5.
[3] E. Chen, M. Tao, and Y.-F. Liu, “Joint base station clustering and
beamforming for non-orthogonal multicast and unicast transmission with
backhaul constraints,” arXiv preprint arXiv:1712.01508, 2017.
[4] O. Tervo, L.-N. Tran, S. Chatzinotas, M. Juntti, and B. Ottersten,
“Energy-efficient joint unicast and multicast beamforming with multiantenna user terminals,” arXiv preprint arXiv:1705.03723, 2017.
[5] L. Zhang, W. Li, Y. Wu, X. Wang, S. I. Park, H. M. Kim, J. Y. Lee,
P. Angueira, and J. Montalban, “Layered-division-multiplexing: Theory
and practice,” IEEE Transactions on Broadcasting, vol. 62, no. 1, pp.
216–232, March 2016.
[6] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and
K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future
radio access,” in 2013 IEEE 77th Vehicular Technology Conference (VTC
Spring), June 2013, pp. 1–5.
[7] B. Clerckx, H. Joudeh, C. Hao, M. Dai, and B. Rassouli, “Rate splitting
for MIMO wireless networks: A promising PHY-layer strategy for LTE
evolution,” IEEE Communications Magazine, vol. 54, no. 5, pp. 98–105,
May 2016.
[8] H. Joudeh and B. Clerckx, “Sum rate maximization for MU-MISO
with partial CSIT using joint multicasting and broadcasting,” in 2015
IEEE International Conference on Communications (ICC), June 2015,
pp. 4733–4738.
[9] ——, “Sum-rate maximization for linearly precoded downlink multiuser
MISO systems with partial CSIT: A rate-splitting approach,” IEEE
Transactions on Communications, vol. 64, no. 11, pp. 4847–4861, Nov
2016.
[10] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting multiple access
for downlink communication systems: Bridging, generalizing and outperforming SDMA and NOMA,” arXiv preprint arXiv:1710.11018v3, 2017.
[11] S. S. Christensen, R. Agarwal, E. D. Carvalho, and J. M. Cioffi,
“Weighted sum-rate maximization using weighted MMSE for MIMO-BC
beamforming design,” IEEE Transactions on Wireless Communications,
vol. 7, no. 12, pp. 4792–4799, Dec 2008.
| 7cs.IT
|
On a measurable analogue of small topological full
groups
François Le Maître
arXiv:1608.07399v1 [math.DS] 26 Aug 2016
August 29, 2016
Abstract
We initiate the study of a measurable analogue of small topological full
groups that we call L1 full groups. These groups are endowed with a Polish group topology which admits a natural complete right invariant metric.
We mostly focus on L1 full groups of measure-preserving Z-actions which are
actually a complete invariant of flip conjugacy.
We prove that for ergodic actions the closure of the derived group is topologically simple although it can fail to be simple. We also show that the closure
of the derived group is connected, and that for measure-preserving free actions
of non-amenable groups the closure of the derived group and the L1 full group
itself are never amenable.
In the case of a measure-preserving ergodic Z-action, the closure of the
derived group is shown to be the kernel of the index map. If such an action is moreover by homeomorphism on the Cantor space, we show that the
topological full group is dense in the L1 full group. Using Juschenko-Monod
and Matui’s results on topological full groups, we conclude that L1 full groups
of ergodic Z-actions are amenable as topological groups, and that they are
topologically finitely generated if and only if the Z-action has finite entropy.
Contents
1 Introduction
1.1 L1 full groups of measure-preserving transformations . . . . . . . . .
1.2 Some topological properties of L1 full groups . . . . . . . . . . . . . .
1.3 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
2
4
7
2 Preliminaries
8
2.1 Basic ergodic theory . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Graphings, equivalence relations and full groups . . . . . . . . . . . . 10
2.3 Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3 L1 full groups of graphings
14
3.1 Definition and first properties . . . . . . . . . . . . . . . . . . . . . . 14
3.2 The closure of the derived group is topologically generated by involutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1
3.3
3.4
3.5
Dye’s reconstruction theorem . . . . . . . . . . . . . . . . . . . . . . 22
Closed normal subgroups of the closure of the derived group . . . . . 23
Link with topological full groups . . . . . . . . . . . . . . . . . . . . . 27
4 L1 full groups of Z-actions
4.1 The index map . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 A characterization of supports of n-cycles . . . . . . . . . . . . . . .
4.3 The L1 full group is generated by induced transformations along with
periodic transformations . . . . . . . . . . . . . . . . . . . . . . . .
4.4 Escape time and non-simplicity results . . . . . . . . . . . . . . . .
4.5 Density of topological full groups, amenability and finiteness of the
topological rank . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5 Further remarks and questions
5.1 Non-amenability . . . . . . . . . . .
5.2 Absence of a natural closure property
5.3 Lp full groups . . . . . . . . . . . . .
5.4 Questions . . . . . . . . . . . . . . .
1
1.1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
. 30
. 32
. 33
. 36
. 39
.
.
.
.
41
41
41
43
44
Introduction
L1 full groups of measure-preserving transformations
The study of (invertible) measure preserving transformations on standard probability spaces has a long and rich history stemming from its connections with various
fields such as statistical mechanics, information theory, Riemannian geometry or
number theory. Over the years, various invariants have been introduced in order
to classify such transformations, although a result of Foreman, Rudolph and Weiss
shows that such a classification cannot “reasonably” be obtained for all measurepreserving transformations [FRW11].
The most well-behaved measure-preserving transformations are probably the
compact ones, i.e. those which arise as translation by a topological generator
in a compact abelian group (for instance, an irrational rotation is a compact transformation). Indeed, ergodic compact transformations are completely classified up to
conjugacy by the countable subgroup of the circle S1 consisting of all the eigenvalues
of the associated Koopman unitary (for an irrational rotation this is just the group
generated by its angle). To be more precise, a theorem of Halmos and von Neumann states that two such transformations T and T 0 of a standard probability space
(X, µ) are conjugate iff spec(T ) = spec(T 0 ) where spec(T ) is the group consisting of
all the λ ∈ S1 such that there is a non-null f ∈ L2 (X, µ) satisfying f ◦ T = λf . So
an ergodic compact transformation T is entirely described by the countable group
spec(T ).
The purpose of this paper is to initiate the study of a Polish group [T ]1 called
the L1 full group which one can associate to a measure-preserving transformation T .
Its main feature resembles that of the spectrum of compact transformations: two
2
ergodic measure-preserving transformations T and T 0 are flip-conjugate1 and if and
only if [T ]1 is abstractly (or topologically) isomorphic to [T 0 ]1 .
The idea for this group comes from full groups, which were defined by Dye as
subgroups of the group Aut(X, µ) of measure-preserving transformations of a standard probability space (X, µ) satisfying a strong closure property. The most basic
example of a full group is the full group of a measure-preserving invertible aperiodic
transformation T , which consists in all the measure-preserving transformations U
such that for almost all x ∈ X, there exists n ∈ Z such that U (x) = T n (x). This
full group is denoted by [T ] and every U ∈ [T ] is then completely described by the
cocycle map cU : X → Z defined by the equation
U (x) = T cU (x) (x).
Note that the full group [T ] only depends on the partition of the space into orbits
induced by T : it is an invariant of orbit equivalence. A theorem of Dye states
that all measure-preserving ergodic transformations are orbit equivalent [Dye59],
thus making the associated full group a trivial conjugacy invariant for such transformations. To obtain an interesting invariant, we will place an integrability restriction
on the cocycle maps.
Definition 1.1. The L1 full group of an aperiodic measure-preserving invertible
transformation T on a standard probability space (X, µ) is the group of all U ∈ [T ]
such that
Z
|cU (x)| dµ(x) < +∞.
X
The L1 full group is endowed with a natural metric given by the L1 metric
when viewing elements of [T ]1 as cocycle maps X → Z. Such a metric is actually
complete, separable and right-invariant (see Proposition 3.4) so that L1 full groups
are cli2 Polish groups.
Theorem 1.2 (see Thm. 4.2). Let T and T 0 be two measure-preserving ergodic
transformation of a standard probability space (X, µ). Then the following are equivalent:
(1) T and T 0 are flip-conjugate;
(2) the groups [T ]1 and [T 0 ]1 are abstractly isomorphic;
(3) the groups [T ]1 and [T 0 ]1 are topologically isomorphic.
There are two results behind this theorem: the first is a reconstruction result à la
Dye which says that any isomorphisms between L1 full groups must be a conjugacy
by a measure-preserving transformation. The second is Belinskaya’s theorem [Bel68,
Cor. 3.7], which states that if two ergodic transformations share the same L1 full
group, then they must be flip-conjugate.
Two measure-preserving transformation T and T 0 are flip-conjugate if there is a measurepreserving transformation S such that T 0 = ST S −1 or T 0 = ST −1 S −1 .
2
A Polish group is cli if it admits a compatible left- (or equivalently right-) invariant metric
1
3
There are natural and well-studied analogues of full groups and L1 full groups in
the context of Cantor dynamics. Given a homeomorphism T of the Cantor space C,
its (topological) full group [T ]t is the group of all homeomorphisms U of the Cantor
space such that for all x ∈ C there is n ∈ N such that U (x) = T n (x). This full group
turns out to completely determine the partition of the Cantor space into orbits up
to a homeomorphisms. Such partitions are entirely described up to homeomorphism
in terms of the set of invariant measure: by a theorem of Giordano, Putnam and
Skau [GPS95], two minimal homeomorphisms T and T 0 of the Cantor space are orbit
equivalent if and only if there is a homeomorphism S such that S(MT ) = MT 0 where
MT denotes the set of T -invariant Borel probability measures. As in the measurable
case, an element of the topological full group of an aperiodic homeomorphism T
is completely described by the associated cocycle map cU : C → Z defined by
U (x) = T cU (x) (x).
The analogue of L1 full groups is sometimes called the small topological full
group and is also defined by putting a restriction on cocycles. Namely, given a
homeomorphism T of the Cantor space C, its small (topological) full group [T ]c
is the group of homeomorphisms U of the Cantor space whose cocycle map cU
is actually continuous. A result of Giordano-Putnam-Skau in complete analogy
with Theorem 1.2 states that when T is minimal, the flip conjugacy class of T is
completely determined by its small topological full group [T ]c (see [GPS99]). In the
end, L1 full groups can be seen as the missing piece in the following picture.
Topological setup
Measurable setup
Orbit equivalence
[T ]t = {U ∈ Homeo(C) :
∀x, U (x) = T cU (x) }
[T ] = {U ∈ Aut(X, µ) :
∀x, U (x) = T cU (x) }
Flip conjugacy
[T ]c = {U ∈ [T ]t :
cU is continuous}
[T ]1 = {U ∈ [T ] :
cU is integrable}
1.2
Some topological properties of L1 full groups
Theorem 1.2 implies that every ergodic theoretic property of a measure-preserving
transformation T should be reflected algebraically in the group [T ]1 . However since
the latter is an uncountable group, it is quite hard to find a purely group-theoretic
property allowing us to distinguish two L1 full groups. But as we already pointed
out, we also have at our disposal a Polish group topology, which provides richer tools
to study [T ]1 . Before we present our results, let us mention a fundamental tool for
the study of L1 full groups and topological full groups.
Given an aperiodic measure-preserving transformation, one defines the index
4
map I : [T ]1 → R by putting
Z
cU (x)dµ(x).
I(U ) =
X
If T is a minimal homeomorphism, we define the index map the same way picking
an invariant measure µ so as to view T as a measure-preserving transformation. The
resulting index map can be shown not to depend on the chosen invariant measure
[GPS99].
We can now give various descriptions of the closure of the derived group of the
1
L full group of an ergodic measure-preserving transformation.
Theorem 1.3 (see Cor. 4.20). Let T ∈ Aut(X, µ) be ergodic. Then D([T ]1 ) is equal
to the following four groups:
• the kernel of the index map,
• the connected component of the identity,
• the group generated by periodic elements and
• the group topologically generated by involutions.
Since the index map actually takes values into Z we conclude from the first item
of the above theorem that the (topological) abelianization of the L1 full group of an
ergodic transformation is always equal to Z.
In the context of topological full groups of minimal homeomorphisms, it is also
true that the index map takes values into Z, but its kernel is often much larger than
the derived group. Nevertheless, Matui succesfully computed the abelianization of
[T ]c in K-theoretic terms and gave examples where this abelianisation is not even
finitely generated (see [Mat06]). So the situation for L1 full groups is much simpler
with respect to the (topological) abelianization.
An important feature of the derived group of the topological full group of a
minimal homeomorphism is that it is a simple group. The following result is a
natural analogue.
Theorem 1.4. Let T be a measure-preserving transformation. Then T is ergodic if
and only if D([T ]1 ) is topologically simple.
This result is actually true in a greater generality for L1 full groups of graphings
as defined by Levitt [Lev95], see section 3.4. We also prove that D([T ]1 ) is never
simple using the fact that there are many Borel sets whose escape time is not integrable (see section 4.4). Let us now seek finer invariants.
The topological rank of a separable topological group is the minimal number
of elements needed to generate a dense subgroup. The main result of this paper
is that the topological rank of the L1 full group of an ergodic measure-preserving
transformation T is related to the entropy of T .
Theorem 1.5. Let T ∈ Aut(X, µ) be ergodic. Then the following are equivalent
5
(1) the L1 full group [T ]1 is topologically finitely generated;
(2) the closed subgroup D([T ])1 is topologically finitely generated;
(3) the transformation T has finite entropy.
A crucial tool in the previous theorem is Matui’s characterization of finitegeneratedness of topological full groups [Mat06, Thm. 5.4]. He proved that the
derived group of the topological full group of a minimal homeomorphism T is finitely
generated if and only if T is a subshift. He also characterised finite-generatedness of
the whole topological full group of T in terms of a strictly more restrictive condition.
In our context the situation is again simpler: Theorem 1.5 shows that for an ergodic
measure-preserving transformation T , the L1 full group of T is topologically finitely
generated if and only if the closure of its derived group is.
In order to use Matui’s aforementioned results so as to prove Theorem 1.5, we
establish the following important connection between L1 full groups and topological
full groups.
Theorem 1.6 (see Thm. 4.28). Let T be a minimal homeomorphism of the Cantor
space and let µ be an invariant measure. Then D([T ]c ) is dense in D([T ]1 ) and [T ]c
is dense in [T ]1 .
Our proof of Theorem 1.5 also relies on a deep theorem of Krieger which characterizes finite entropy transformations as those which can be realised as uniquely
ergodic minimal subshifts [Kri72]. It would be nice to have a purely ergodic-theoretic
proof of Theorem 1.5.
Theorem 1.6 has another interesting consequence. Recall that a topological
group is amenable if whenever it acts continuously on a compact space, the action
admits an invariant Borel probability measure. Juschenko and Monod have proven
that the topological full group of any minimal homeomorphism of the Cantor space
is amenable [JM13]. Using the Jewett-Krieger theorem we obtained the following
result.
Theorem 1.7. Let T be an ergodic measure-preserving transformation. Then the
L1 full group of T is amenable.
Note that since [T ]1 surjects onto Z via the index map, it is not extremely
amenable. However it would be intersting to understand wether the kernel of the
index map is extremely amenable. Let us now end extend these kind of questions
to the setup of measure-preserving actions of finitely generated groups.
Definition 1.8. Let Γ be a finitely generated group acting in a measure-preserving
manner on a standard probability space (X, µ). The full group of this action is
denoted by [Γ] and defined by
[Γ] = {T ∈ Aut(X, µ) : ∀x ∈ X, T (x) ∈ Γ · x}.
Let S be a finite generating set for Γ. Then every Γ-orbit is naturally equipped with
a Schreier graph metric dS , and we let the L1 full group of the Γ-action be the group
[Γ]1 of all T ∈ [Γ] such that the map x 7→ dS (x, T (x)) is integrable.
6
The definition of this group does not depend on the choice of a finite generating
set, and the L1 full group [Γ]1 has a natural Polish group topology. The following
result is a counterpart to Theorem 1.7.
Theorem 1.9 (see Thm. 5.1). Let Γ be a finitely generated non amenable group
acting freely in a measure-preserving manner on (X, µ). Then neither [Γ]1 nor
D([Γ]1 ) are amenable.
It would be interesting to understand which amenable finitely generated groups
admit measure-preserving free actions with an amenable L1 full group. It is also
natural to seek for generalizations of our results relating topological rank and entropy
in this context.
Finally, we should stress out that L1 full groups are not invariants of L1 orbit
equivalence but only of L∞ orbit equivalence (see Corollary 5.3). I do not know
wether they are complete invariants of L∞ orbit equivalence: if [Γ]1 = [Λ]1 , does it
follow that Γ and Λ are L∞ orbit equivalent?
1.3
Outline
This paper is organised as follows. Section 2 begins with some general facts from
ergodic theory. We then recall the definition of graphings, which provide a natural
setup for L1 full groups. The section ends with a few basic facts from entropy theory.
In section 3 we give the definition of the L1 full group of a graphing and establish
some basic properties such as stability under taking induced transformations. We
show that the closure of their derived group is topologically generated by involutions
and hence connected. We then establish that L1 full groups of ergodic graphings
satisfy a reconstruction theorem: any isomorphism between them arises as the conjugacy by a measure preserving transformation. We also use involutions to prove
that the only closed normal subgroups of the closure of their derived group are the
obvious ones when the graphing is aperiodic (Theorem 3.23). From this we conclude
that the graphing is ergodic if and only if the closure of the derived group of its L1
full group is topologically simple. Finally, we relate topological full groups to L1 full
groups in terms of density.
Section 4 contains the main results on L1 full groups of Z-actions. We first
prove Theorem 1.2 and then continue by defining the index map and studying its
behaviour with respect to induced transformations. We then study involutions more
closely by characterizing the Borel sets which arise as supports of involutions (and
more generally those which arise as supports of n-cycles). After that, we show that
the L1 full group of T ∈ Aut(X, µ) is generated by transformation induced by T
along with periodic transformations, using the work of Belinskaya. We then show
that D([T ]1 ) is never simple. Finally, we prove Theorem 1.7 and Theorem 1.5, using
the fact that the topological full group is dense in the L1 full group.
In section 5 we first prove Theorem 1.9. We then show that L1 full groups are
not stable under “L1 cutting and pasting”. After that we make a few observations
about Lp full groups which are defined analogously and we conclude with some more
questions.
7
2
2.1
Preliminaries
Basic ergodic theory
Let (X, µ) be a standard probability space, i.e. a standard Borel space equipped
with a Borel non-atomic probability measure µ. All such spaces are isomorphic to
the interval [0, 1] equipped with the Lebesgue measure, in particular they admit a
Borel linear order.
We will always work up to measure zero, e.g. for two Borel sets A and B if we
write A ⊆ B we mean µ(B \ A) = 0. For us a partition of a Borel set A ⊆ X will
be a countable family of disjoint Borel subsets of A whose reunion is equal to A up
to measure zero. Note that some of these sets may have measure zero or even be
empty.
A Borel bijection T : X → X is called a measure-preserving transformation
of (X, µ) if for all Borel A ⊆ X, one has µ(A) = µ(T −1 (A)). We denote by Aut(X, µ)
the group of all measure-preserving transformations, two such transformations being
identified if they coincide up to measure zero. An important fact to keep in mind is
that every Borel bijection between full measure Borel subsets of X which is measurepreserving can be seen as an element of Aut(X, µ): there is a measure-preserving
transformation T 0 of (X, µ) such that T (x) = T 0 (x) for almost all x ∈ X.
Definition 2.1. A measure-preserving transformation T is ergodic if every Borel
set which is a reunion of T -orbits has measure 0 or 1. It is aperiodic if all its orbits
are infinite.
A fundamental construction for us will be that of the induced transformation:
given T ∈ Aut(X, µ) and A ⊆ X of positive measure, the Poincaré recurrence
theorem ensures us that for almost all x ∈ A there are infinitely many n ∈ N∗ such
that T n (x). We let nA,T (x) denote the smallest such n, also called the return time
to A. When the transformation T we consider is clear from the context, we will
denote the return time simply by nA .
The transformation TA ∈ Aut(X, µ) induced by T on A by for all x ∈ X,
n
T A,T (x) if x ∈ A
TA (x) =
x
else.
It can easily be checked that TA is indeed a measure-preserving transformation, and
that moreover for all x ∈ A the TA -orbit of x is the intersection of the T -orbit of x
with A. Also note that (TA )−1 = (T −1 )A
The following lemma is a direct consequence of the fact that the orbits of the
restriction of TA to A are precisely the intersections of the T -orbits with A.
Lemma 2.2. Let S ∈ Aut(X, µ) be a measure-preserving transformation and A ⊆ X
intersects every S-orbit, then S is aperiodic if and only if SA is aperiodic when
restricted to A, and S is ergodic if and only if SA is ergodic when restricted to A.
Definition 2.3. An element T ∈ Aut(X, µ) is periodic if all its orbits are finite.
8
If T is periodic, the Borel set of minimums of T -orbits (for a fixed Borel total
order on X) intersects every T -orbit at exactly one point: it is a Borel fundamental
domain for T . Such fundamental domains actually exist if and only if T is periodic.
A nice way to build a new transformation from a periodic one is to compose it
with a transformation supported on a fundamental domain.
Lemma 2.4. Let T be a periodic measure-preserving transformation, and let A be a
fundamental domain of T . Let U be a measure-preserving transformation supported
on A. Then (U T )A = U = (T U )A .
Proof. Let x ∈ A, let n ∈ N∗ be the least positive integer such that T n (x) = x.
Since A is a fundamental domain for T , for all i ∈ {0, ..., n − 1} we have T i (x) 6∈ A.
Since U (y) = y for all y 6∈ A, we deduce by induction that (U T )i (x) = T i (x) 6∈ A for
all i ∈ {1, ..., n − 1}. In particular (U T )n−1 (x) = T n−1 (x) so (U T )n (x) = U T n (x) =
U (x) ∈ A, which proves that (U T )A = U as desired.
For the equality (T U )A = U , one can run a similar argument or apply the
previously obtained equality to T −1 and U −1 to get (U −1 T −1 )A = U −1 , which by
taking inverses yields (T U )A = U .
Proposition 2.5. Let T be a periodic measure-preserving transformation, and let
A be a fundamental domain of T . Let U be a measure-preserving transformation
supported on A. Then the following equivalences hold:
(1) The restriction of U to A is aperiodic ⇔ U T is aperiodic ⇔ T U is aperiodic.
(2) T restriction of U to A is ergodic ⇔ U T is ergodic ⇔ T U is ergodic.
Proof. It follows from the proof of Lemma 2.4 that A intersects every T U orbit and
every U T orbit. The conclusion then follows from Lemmas 2.4 and 2.2.
Let us observe that one can go the other way around in the above constructions:
starting from an aperiodic transformation T and a Borel set A which intersects
almost every T -orbit, the map TA−1 T is periodic with A as a Borel fundamental
domain and same return time to A as T . This fact is the key idea for the following
result of Belinskaya which we won’t use but which is an important step towards to
the proof of her Theorem 4.1.
Proposition 2.6 (Belinskaya, [Bel68, Thm. 3.6]). Let S and T be two measurepreserving transformations, let A be a Borel subset which intersects every S and
every T -orbit. Suppose that SA = TA and that the return times of S and T to A are
the same, i.e. nA,S = nA,T . Then S and T are conjugate.
We will use the following well-known proposition several times. A proof is provided for completeness.
Proposition 2.7. Let T ∈ Aut(X, µ). There is a partition (A1 , A2 , B1 , B2 , B3 ) of
supp T such that T (A1 ) = A2 , T (B1 ) = B2 and T (B2 ) = B3 .
9
Proof. Since X is a standard Borel space, there is a countable partition (Xi )i∈N of
supp T into Borel sets such that for all i ∈ N, T (Xi ) is disjoint from Xi (see for
instance [EG14, Lem. 5.1]).
We then define by recurrence an increasing family of sets (Yi )i∈N by letting Y0 =
X0 and then for all i ∈ N
Yi+1 = Yi t {x ∈ Xi+1 : T (x) 6∈ Yi and T −1 (x) 6∈ Yi }.
S
Let Y = n∈N Yn , then by construction Y and T (Y ) are disjoint. Moreover, we
have supp T = T −1 (Y ) ∪ Y ∪ T (Y ). Indeed, if x ∈ supp T \ Y there is i ∈ N such
that x ∈ Xi+1 , and since x 6∈ Yi+1 either T (x) ∈ Yi or T −1 (x) ∈ Yi so that in any
case x ∈ T −1 (Y ) ∪ T (Y ).
Since supp T is T -invariant, we conclude that supp T = Y ∪ T (Y ) ∪ T 2 (Y ). Now
let A1 = {x ∈ Y : T 2 (x) ∈ Y } and B1 = {Y \ A1 }. Then since Y and T (Y ) are
disjoint, the sets A1 , A2 := T (A1 ), B1 , B2 := T (B1 ) are disjoint. Let B3 := T 2 (B1 ).
By the definition of B1 the set B3 is disjoint from Y . Moreover since T (B1 ) is disjoint
from Y we also have T 2 (B1 ) disjoint from T (Y ) so that B3 is actually disjoint from
Y t T (Y ). We conclude that A1 , A2 , B1 , B2 , B3 are as desired.
Remark. Note that the proof does not use that T is measure-preserving and actually
works in the purely Borel context.
2.2
Graphings, equivalence relations and full groups
If (X, µ) is a standard probability space, and A, B are Borel subsets of X, a partial
isomorphism of (X, µ) of domain A and range B is a Borel bijection f : A → B
which is measure-preserving for the measures induced by µ on A and B respectively.
We denote by dom f = A its domain, and by rng f = B its range. Given two partial
isomorphisms ϕ1 : A → B and ϕ2 : C → D, we define their composition ϕ2 ◦ ϕ1 as
the map ϕ−1
1 (B ∩ C) → ϕ2 (B ∩ C) given by ϕ2 ◦ ϕ1 (x) = ϕ1 ϕ2 (x). We also define
the inverse ϕ−1 of a partial isomorphism ϕ : A → B by ϕ−1 : B → A and the
equation ϕ−1 ◦ ϕ = idA .
By definition a graphing is a countable set of partial isomorphisms. Every
graphing Φ generates a measure-preserving equivalence relation RΦ , defined
to be the smallest equivalence relation containing (x, ϕ(x)) for every ϕ ∈ Φ and
x ∈ dom ϕ. Given a graphing Φ, a Φ-word is a composition of finitely many
elements of Φ or their inverses. Obviously (x, y) ∈ RΦ iff and only if there exists a
Φ-word w such that y = w(x). Given a Borel set A, its Φ-closure is the reunion
of all w(A) where w is a Φ-word. Say that Φ is ergodic when the Φ-closure of any
non-null Borel set A has full measure.
The full group of a measure-preserving equivalence relation R is the group [R]
of automorphisms of (X, µ) which induce permutations in the R-classes, that is
[R] = {ϕ ∈ Aut(X, µ) : ∀x ∈ X, ϕ(x) R x}.
It is a separable group when equipped with the complete metric du defined by
du (T, U ) = µ({x ∈ X : T (x) 6= U (x)}.
10
The metric du is called the uniform metric and the topology it induces is called the
uniform topology. One also defines the pseudo full group of R, denoted by [[R]],
which consists of all partial isomorphisms ϕ such that ϕ(x) R x for all x ∈ dom ϕ.
Given a measure-preserving equivalence relation R, we denote by MR the σalgebra of all Borel sets A such that T (A) = A for all T ∈ [R]. Consider the Hilbert
space of R-invariant functions, i.e. the set of all f ∈ L2 (X, µ) such that for any
T ∈ [R], one has f ◦ T = f a.e. We denote this closed Hilbert space by L2R (X, µ)
and remark that it consists of all the MR -measurable elements of L2 (X, µ). By
definition R is ergodic if L2R (X, µ) only consists of constant functions. A graphing
Φ is ergodic if and only if RΦ is.
The orthogonal projection ER from the Hilbert space L2 (X) onto the closed
subspace L2R (X) satisfies the following equality, which defines it uniquely: for any
f ∈ L2 (X, µ) and g ∈ L2R (X, µ),
Z
Z
fg =
ER (f )g.
X
X
ER is called a conditional expectation. When A is a subset of X, its characteristic
function is an element of L2 (X, µ), and we call ER (χA ) the R-conditional measure
of A, denoted by µR (A) or µΦ (A) when R = RΦ . Often the equivalence relation R
will be clear from the context and we will simply call µR (A) the conditional measure
of A. Because ER is a contraction for the L∞ norm, µR (A) takes values in [0, 1]. For
those who are familiar with the ergodic decomposition, µR (A) is just the function
x 7→ µx (A) where (µx )x∈X is the ergodic decomposition of R. Given ϕ ∈ [[R]], we
have µR (dom ϕ) = µR (rng ϕ). The following well-known result is a kind of converse
(see [LM15, Sec. 2.1]).
Proposition 2.8 (Dye). Let R be a measure-preserving equivalence relation. Then
if two sets A and B have the same R-conditional measure, there exists ϕ ∈ [[R]]
whose domain is A and whose range is B.
Note that in the ergodic case, the previous proposition implies that any two sets
of the same measure can be mapped to each other by an element of the pseudo full
group of R. A measure-preserving equivalence relation is aperiodic if almost all its
equivalence classes are infinite. The following proposition is well-known, see [LM15,
Sec. 2.1] for a proof.
Proposition 2.9 ([Dye59], Maharam’s lemma). A measure-preserving equivalence
relation R is aperiodic iff for any A ⊆ X, and for any MR -measurable function f
such that 0 6 f 6 µR (A), there exists B ⊆ A such that the R-conditional measure
of B equals f .
Corollary 2.10. Let R be an aperiodic measure-preserving equivalence relation, and
let f : X → [0, 1] be an MR -measurable function. Let A be a subset of X such that
for almost all x ∈ A, one has f (x) > 0. Then there is a countable partition (An )n∈N
of A such that for all x ∈ X and all n ∈ N,
µR (An )(x) 6 f (x).
11
Proof. The proof relies the following basic fact: there is a countable family of MR measurable positive functions fP
n : X → [0, 1] such that for all x ∈ X, we have
fn (x) 6 f (x) for all n ∈ N and n∈N fn (x) = µR (x). Indeed, if for all x ∈ X we let
fn (x) = 0 if µR (A)(x) = 0 and else
f (x) j
k if n < bµR (A)(x)c
f (x)
f (x) − g(x) if n = bµR (A)(x)c
fn (x) =
0
else,
it is easily checked that such functions satisfy the desired properties. We can now use
the previous proposition to build by recurrence a sequence (An ) of disjoint
subsets
P
of A such that for every n ∈P
N, µR (An ) = fn F
6 f . Then µR (A) = n∈N µR (An )
hence by integrating µ(A) = n∈N µ(An ) = µ( n∈N An ) so that (An ) is a partition
of A meeting all our requirements.
Let us also record the following easy consequences of the previous results.
Lemma 2.11. Let R be a measure-preserving equivalence relation. Then if two
disjoint Borel sets A and B have the same R-conditional measure, there exists an
involution U ∈ [R] whose support is equal to A t B such that U (A) = B.
Proof. By Proposition 2.8 there exists ϕ ∈ [[R]] such that ϕ(A) = B. Then the
involution U ∈ [RΦ ] defined by
ϕ(x) if x ∈ A
ϕ−1 (x) if x ∈ B
U (x) =
x
else
clearly works.
Lemma 2.12. Let R be a measure-preserving aperiodic equivalence relation and
let C be a Borel subset of X. Then there exists an involution U ∈ [R] such that
supp U = C.
Proof. By Maharam’s Lemma (Lemma 2.9), one can write C = AtB where µR (A) =
µR (B) = µR (C)/2. The previous lemma can then readily be applied.
Remark. In Section 4.2, we will characterise which sets arise as supports of involutions belonging to the L1 full group of T , where T is an ergodic transformation.
2.3
Entropy
The entropy of a countable partition (Ai )I∈I of (X, µ) is the quantity
X
H((Ai )i∈I ) := −
µ(Ai ) ln µ(Ai )
i∈I
where we use the convention 0 ln 0 = 0. It represents the average amount of information we get when we choose an element x ∈ X at random and only learn in
which piece Ai of the partition x is. The following statement was extracted from the
more general Lemma 2.1 in [Aus16]. It shows that cocycle partitions coming from
elements of L1 full groups of Z-actions have finite entropy.
12
Lemma 2.13. Let (An )n∈Z be a partition of X such that
Then H((An )n∈Z ) < +∞.
P
n∈Z
|n| µ(An ) < +∞.
Proof. Some elementary calculus yields the inequality
−t ln t 6 mt + e−m−1
for all t, m > 0. In particular for all n ∈ Z∗ we have
−µ(An ) ln µ(An ) 6 |n| µ(An ) + e−|n|−1 .
P
Summing this P
over n ∈ Z∗ and applying our hypothesis n∈Z∗ |n| µ(An ) < +∞, we
obtain that − n∈Z∗ µ(An ) ln µ(An ) < +∞. So H((An )n∈N ) < +∞ as wanted.
Remark. Austin’s result (Lemma 2.1 in [Aus16]) actually yields that whenever Γ
is a finitely generated group, the cocycle partitions of elements of the L1 full group
of any free Γ-action have finite entropy.
Given two partitions (Ai ) and (Bj ) of X, we let (Ai ) ∨ (Bj ) be their join, i.e.
the partition (Ai ∩ Bj ). We have the following natural inequality (for a proof see
e.g. [Dow11, 1.6.10]).
Lemma 2.14. Let (Ai ) and (Bj ) be two partitions of X. Then
H((Ai ) ∨ (Bj )) 6 H((Ai )) + H((Bj )).
Note that in particular, the join of finitely many partitions with finite entropy
has finite entropy.
Lemma 2.14 enables one to give the classical definition of the entropy of T ∈
Aut(X, µ). First, given a partition Q, we let
!
n−1
_
1
h(T, P) := lim H
T i (P) ,
n→+∞ n
i=0
where the limit exists by subadditivity of the sequence H(
2.14). The entropy of T is
h(T ) =
sup
Wn−1
i=0
T i (P)) (cf. Lemma
h(T, P).
P partition
A partition P is called generating if up to measure zero, the σ-algebra generated
by the T -translates of P is equal to the Borel σ-algebra of X. A more convenient
way to see this for us is in terms of the measure algebra of (X, µ).
Recall that given a standard probability space (X, µ), its measure algebra is
denoted by MAlg(X, µ) and consists of all Borel subsets of X, two such sets being
identified if their symmetric difference has measure zero. It is naturally endowed
with a metric dµ defined by dµ (A, B) = µ(A 4 B) which is complete and separable
(see [Hal50, 40.A]). Then a partition P is generating if and only if the algebra
generated by the T -translates of P is dense in MAlg(X, µ).
13
Kolmogorov-Sinai’s theorem states that whenever P is a generating partition of
finite entropy, one has
h(T ) = h(T, P) < +∞
Conversely, Krieger’s finite generator theorem states that every transformation of finite entropy admits a finite generating partition [Kri70] (moreover, there is such
a partition whose cardinality k satisfies the inequality eh(T ) 6 k 6 eh(T ) + 1).
Krieger then proved that every such transformation is actually conjugate to a minimal uniquely ergodic subshift [Kri72], which will be relevant to us when we connect
topological full groups to L1 full groups (see Section 4.5).
3
3.1
L1 full groups of graphings
Definition and first properties
Let Φ be a graphing, and let RΦ be the measure-preserving equivalence relation it
generates. Such a graphing induces a metric dΦ on the orbits of RΦ by putting for
all (x, y) ∈ R
dΦ (x, y) = min{n ∈ N : ∃ϕ1 , ..., ϕn ∈ Φ±1 such that y = ϕn · · · ϕ1 (x)}.
The L1 full group of Φ, denoted by [Φ]1 , is then defined by
[Φ]1 := {T ∈ [RΦ ] : x 7→ dΦ (x, T (x)) is integrable}.
The triangle inequality implies that [Φ]1 is indeed a group, which we equip with a
right-invariant metric d˜Φ defined by
Z
dΦ (S(x), T (x)).
d˜Φ (S, T ) :=
X
Our first example is fundamental since the study of single measure-preserving transformations is a central subject in ergodic theory.
Example 3.1. Suppose we are given a measure-preserving aperiodic Z-action, that
is, an element T ∈ Aut(X, µ), all whose orbits are infinite. Then Φ = {T } is a
graphing, and we denote by [T ]1 the associated L1 full group. Given S ∈ [RT ],
for all x ∈ X there is a unique cS (x) ∈ Z such that S(x) = T cS (x) (x). The map
x 7→ cS (x) is called the cocycle associated to S and it completely determines S.
The partition ({x ∈ X : cS (x) = n})n∈Z is called the cocycle partition associated
to S. For all x ∈ X and all S, S 0 ∈ [RT ], we have the cocycle identity
cS 0 S (x) = cS 0 (S(x)) + cS (x).
The L1 full group [T ]1 := [RΦ ]1 consists of all the S ∈ [RT ] such that the corresponding cocycle cS is integrable. The metric d˜Φ is then given by
Z
0
˜
dΦ (S, S ) =
|cS (x) − cS 0 (x)| dµ(x)
X
This fundamental example will be explored in Section 4.
14
Example 3.2. Suppose Φ is a graphing, all whose connected components are complete graphs. Then dΦ is the discrete metric: for all (x, y) ∈ RΦ ,
0 if x = y,
dΦ (x, y) =
1 else.
Hence we have [Φ]1 = [RΦ ] and d˜Φ is equal to the uniform metric du .
Example 3.3. Let Γ be a finitely generated group and consider a measure-preserving
Γ-action on (X, µ). If S is a finite generating set of Γ, it defines a graphing which
generates RΓ , and we can consider the associated L1 full group [S]1 . Observe that
if S 0 is another finite generating set, then the metrics dS and dS 0 are bilipschitzequivalent on every orbit with a uniform constant. So the metrics d˜S and d˜S 0 are
bilipschitz-equivalent and we have [S]1 = [S 0 ]1 . We conclude that we can actually
define the L1 full group of the Γ-action by [Γ]1 = [S]1 since it does not depend on
the choice of a finite generating set.
Note that the L1 full group of the action of a finitely generated group comes
naturally equipped with a complete left invariant metric well-defined up to bilipschitz
equivalence. Of course Example 3.1 falls into this category with Γ = Z. Moreover, if
Γ acts freely, every T ∈ [Γ] is uniquely defined by the associated cocycle cT : X → Γ
defined by T (x) = cT (x) · x. Such a cocycle satisfies the cocycle identity cT 0 T (x) =
cT 0 (T (x))cT (x).
Proposition 3.4. Let Φ be a graphing. The metric d˜Φ is complete and separable.
Proof. Let (Tn ) be a Cauchy sequence for d˜Φ . Note that since a Cauchy sequence
converges iff it admits a converging subsequence we can freely replace (Tn ) by a
subsequence.
Clearly for all T, T 0 ∈ [Φ]1 we have du (T, T 0 ) 6 d˜Φ (T, T 0 ), so the sequence (Tn )
is du -Cauchy and admits a du -limit T ∈ [RΦ ]. Up to taking a subsequence, we may
assume that Tn → T pointwise and that for all n ∈ N we have d˜Φ (Tn , Tn+1 ) < 21n .
We deduce that
Z X
dΦ (Tn (x), Tn+1 (x))dµ(x) < 2.
X n∈N
Now for all n ∈ N and all x ∈ X we have
dΦ (Tn (x), T (x)) = lim dΦ (Tn (x), Tm (x))
m→+∞
6 lim
m→+∞
6
X
m−1
X
dΦ (Ti (x), Ti+1 (x))
i=n
dΦ (Ti (x), Ti+1 (x))
i∈N
By integrating this inequality for n = 0 we deduce that d˜Φ (T0 , T ) < +∞ so that
T ∈ [Φ]1 . Moreover this inequality allows us apply the Lebesgue dominated convergence theorem to the sequence of functions x 7→ dΦ (Tn (x), T (x)) to conclude that
dΦ̃ (Tn , T ) → 0. The metric d˜Φ is therefore complete.
15
The separability follows from the line of ideas present in [CLM16, Thm. 3.17].
Namely, let S be a family of involutions such that
[
{(x, s(x)) : x ∈ X} = GΦ ∪ {(x, x) : x ∈ X}
s∈S
and define Γ = hSi equipped with the word metric dS . We consider
the space
R
L1 (X, µ, Γ) of measurable functions taking values in Γ such that X dS (f (x), 1Γ ) <
+∞. Such a space is separable for the natural L1 metric, and [Φ]1 is a continuous
quotient of a subspace of the metric space L1 (X, µ, Γ) (namely, the subspace of
maps f ∈ L1 (X, µ, Γ) such that Tf : x 7→ f (x) · x belongs to Aut(X, µ)), hence
separable.
Remark. Because d˜Φ is right-invariant, the previous Proposition shows that [Φ]1
is a cli Polish group, which means it admits a complete left (or equivalently right)invariant metric compatible with its topology. Examples of cli Polish groups include
all the locally compact second-countable groups (see [Bec98, Prop. 3.C.2]), and nonexamples include the following Polish groups: Aut(X, µ), the group of unitaries of
an infinite dimensional Hilbert space and the group of permutation of the integers.
Using Rohlin’s lemma, it can be shown that whenever T ∈ Aut(X, µ) is aperiodic,
the L1 full group [T ]1 is never SIN (meaning that its topology does not admit a basis
at the identity made of conjugacy-invariant neighborhoods). To our knowledge, such
L1 full groups are the first examples of cli Polish groups which are non-SIN but at
the same time far from being locally compact groups.
A fundamental feature of L1 full groups is that they are stable under taking
induced maps.
Proposition 3.5. Let Φ be a graphing, let [Φ]1 be the associated L1 -full group. Then
for all T ∈ [Φ]1 , we have TA ∈ [Φ]1 , and
d˜Φ (TA , idX ) 6 d˜Φ (T, idX ).
Proof. For all n ∈ N, let An := {x ∈ X : TA (x) = T n (x)}. Then the An ’s form a
partition of A. For all n ∈ N and all 0 6 m < n, we let Bn,m := T m (An ). The
family (Bn,m )06m<n is a collection of disjoint sets.
We now fix n ∈ N. By the triangle inequality, we have that for all x ∈ An ,
n
dΦ (x, TA (x)) = dΦ (x, T (x)) 6
n
X
dΦ (T m (x), T m+1 (x)).
m=0
By integrating and summing this over all n ∈ N, we deduce that
Z
dΦ (x, TA (x)) =
A
n Z
XX
n∈N m=0
Z
dΦ (x, T (x)) 6
Bn,m
dΦ (x, T (x)).
X
To conclude, we note that the left term above is equal to d˜Φ (TA , idX ), while the
right term is equal to d˜Φ (T, idX ).
16
Remark. The above proof is basically the same as that of Kac’s formula [Kac47,
Thm.2’]. We will use this proof again to get later a similar statement in the case of
L1 full groups of Z-actions (see Prop. 4.4).
The following lemma will provide us many involutions in L1 full groups.
Lemma 3.6. Let Φ be a graphing. Then for every involution U ∈ [RΦ ], there
S exists
an increasing sequence of U -invariant sets An ⊆ supp U such that supp U = n∈N An
and for all n ∈ N, UAn ∈ [Φ]1 .
Proof. Let U ∈ [RΦ ] be an involution and for all n ∈ N, let An = {x ∈ supp U :
dΦ (x, U (x)) < S
n}. Since U is an involution and dΦ is symmetric each An is U invariant, and n∈N An = supp U , so µ(supp U \ An ) → 0. By the definition of An ,
each UAn belongs to [Φ]1 .
Theorem 3.7. Let Φ be a graphing. Then [Φ]1 is dense in [RΦ ] for the uniform
topology.
Proof. Because full groups are generated by involutions (see [Kec10, Lem. 4.5]), we
only need to show that every involution in [RΦ ] can be approximated by elements
of [Φ]1 . Let U ∈ [RΦ ] be such an involution.
By the previous lemmaSwe have an increasing sequence (An ) of U -invariant subsets of supp U such that n∈N An = supp U and for all n ∈ N the involution UAn
belongs to [Φ]1 . So µ(supp U \ An ) → 0 and we conclude that du (UAn , U ) → 0 as
desired.
3.2
The closure of the derived group is topologically generated by involutions
As we will see later, given a graphing Φ and T ∈ [Φ]1 , the map A ∈ MAlg(X, µ) 7→
TA ∈ [Φ]1 is not continuous in general. We however have the following very useful
statement.
Proposition 3.8. Let A ⊆ X, let Φ be a graphingSand take T ∈ [Φ]1 . If (An ) is an
increasing sequence of subsets of A such that A = n∈N An then
TA = lim TAn .
n→+∞
Proof. Let k : X → N be defined by TA (x) = T k(x) (x) and similarly for all n ∈ N
define kn : X → N by TAn (x) = T kn (x) (x). Since µ(An 4 A) → 0, we have that
kn → k pointwise. So if we let Bn = {x ∈ X : k(x) 6= kn (x)}, we have µ(Bn ) → 0.
By the definition of Bn we get
Z
d˜Φ (TAn , TA ) =
dΦ (TAn (x), TA (x))
Bn
The triangle inequality now yields
Z
Z
˜
dΦ (TAn , TA ) 6
dΦ (TAn (x), x) +
Bn
Bn
17
dΦ (TA (x), x).
(1)
Since An ⊆ A we have (TA )An = TAn , so Proposition 3.5 yields
d˜Φ (TAn , idX ) 6 d˜Φ (TA , idX ).
By developing the left-hand term we get
Z
Z
Z
dΦ (TAn (x), x) +
dΦ (TAn (x), x) 6
d˜Φ (TA (x), x)).
Bn
X\Bn
X
Since for all x ∈ X \ Bn we have TA (x) = TAn (x), we may rewrite this as
Z
Z
Z
dΦ (TAn (x), x) 6
dΦ (TA (x), x) −
dΦ (TA (x), x)
Bn
X
X\Bn
Z
Z
dΦ (TAn (x), x) 6
dΦ (TA (x), x).
Bn
Bn
We now reinject this inequality into inequality (1) and obtain
Z
dΦ (TA (x), x).
d˜Φ (TAn , TA ) 6 2
Bn
By the dominated convergence theorem we now have
conclude that dΦ (TAn , TA ) → 0 as desired.
R
Bn
dΦ (TA (x), x) → 0 so we
The above proposition is a direct consequence of the dominated convergence
theorem when the sets An are already TA -invariant. We will often use it in this
easier case, but the general statement will appear at a crucial point towards proving
that the closure of the derived group of [Φ]1 is topologically generated by involutions.
Let us for the moment make sure that every involution belongs to the closure of the
derived group.
Lemma 3.9. Suppose Φ is aperiodic. Then every involution in [Φ]1 belongs to the
closure of derived group of [Φ]1 .
Proof. Let T ∈ [Φ]1 be an involution. We can find B ⊆ X such that supp T =
B t T (B). By aperiodicity, there is an involution Ũ ∈ [RΦ ] such that supp Ũ = B
(see Lemma 2.12). We then find C ⊆ B such that B = C t Ũ (C). Lemma
3.6 then
S
yields an increasing sequence of Ũ -invariant sets Bn such that B = n∈N Bn , and
for all n ∈ N, ŨBn ∈ [Φ]1 . We let Cn = C ∩ Bn , and Tn := TCn tT (Cn ) .
Now we define an involution Un in the L1 full group of Φ by
if x ∈ Bn t U (Bn ),
Ũ (x)
Un (x) :=
T Ũ T (x) if x ∈ T (Bn t U (Bn )),
x
else.
By construction, the commutator [Tn , Un ] is theS
tranformation induced by T on the
T -invariant set An := Bn t T (Bn ), and we have n∈N An = supp T . We conclude by
the previous proposition that [Tn , Un ] → T as desired.
18
Remark. I do not know wether involutions actually belong to the derived group
itself. As a more general question, when does it happen that D([Φ]1 ) is closed? Note
that full groups of measure-preserving equivalence relations (which are a special case
of L1 full groups by 3.2) are perfect if and only if the equivalence relation is aperiodic
(see [LM14b, Prop. 3.6]).
We will now gradually establish that conversely, the closure of D([Φ]1 ) is topologically generated by involutions.
Lemma 3.10. Let Φ be an aperiodic graphing. Then every periodic element of
[Φ]1 belongs to the closed subgroup of [Φ]1 generated by involutions and hence to the
closure of the derived group of [Φ]1 .
Proof. Let U ∈ [Φ]1 be periodic, and for all n ∈ N∗ let An denote the U -invariant
set of all x ∈ X whose U -orbit has cardinality n. By Proposition 3.8, we have
U = lim U
n→+∞
Sn
i=1
Ai
= lim
n→+∞
n
Y
UAi .
i=2
so it suffices to prove the statement for cycles, i.e. elements U of [Φ]1 for which
there is n ∈ N such that every non-trivial U -orbit has cardinality n. If U ∈ [Φ]1 is
such an element, we may find A ⊆ X such that
supp U =
n
G
U i (A).
i=1
For i ∈ {1, ..., n − 1} we let Ui ∈ [Φ]1 be the involution defined by
U (x) if x ∈ U i (A)
U −1 (x) if x ∈ U i+1 (A)
Ui (x) =
x
else.
It now follows from the well-known identity in symmetric groups
(1 2 · · · n) = (1 2)(2 3) · · · (n − 1 n)
that U = U1 U2 · · · Un−1 , which proves the first part of the lemma. The “as well as”
part follows from Lemma 3.9.
Lemma 3.11. Let Φ be an aperiodic graphing. The L1 full group [Φ]1 is generated
by elements whose support has Φ-conditional measure everywhere less than 1/4.
Remark. As the proof shows, 1/4 can be replaced by any > 0, but we won’t need
that.
Proof. First note that by breaking a fundamental domain into pieces of small conditional measure (using Maharam’s lemma 2.9), one can show every periodic element
is the product of elements whose support has Φ-conditional measure everywhere less
than 1/4.
19
Now if T ∈ [Φ]1 , one may write T = Tp T 0 where Tp is periodic and all the nontrivial T 0 -orbits are infinite. By Maharam’s lemma we then find A ⊆ supp T 0 such
that for all x ∈ supp T 0 , we have
0 < µT 0 (A)(x) < 1/4.
Then A intersects almost every non-trivial T 0 -orbit so that T 0 T 0 −1
A is periodic. Since
0
A has T -conditional measure everywhere less than 1/4, the same is true of its Φconditional measure. So the support of T 0 A has Φ-conditional measure everywhere
0
less than 1/4 as wanted, and T = Tp (T 0 T 0 −1
A )T A can be written as a product of
elements whose support has Φ-conditional measure everywhere less than 1/4.
Theorem 3.12. Let Φ be an aperiodic graphing. Then the closure of the derived
group of [Φ]1 is topologically generated by involutions.
Proof. Denote by S the set of T ∈ [Φ]1 whose support has Φ-conditional measure
everywhere less than 1/4. By the previous lemma S generates [Φ]1 . Since S is
moreover invariant under conjugacy, it suffices to show that the commutator of any
two elements of S belongs to the closed subgroup generated by involutions.
So let T, U ∈ S and let B = supp g ∪supp h. There exists an involution V ∈ [RΦ ]
such that B and V (B) are disjoint and supp V = B t V (B) =: A. By Lemma
3.6 there exists S
an increasing sequence (An ) of V -invariant subsets of A such that
VAn ∈ [Φ]1 and An = A.
By Proposition 3.8 we have TAn → T and UAn → U , so it suffices to show that
for every n ∈ N, the commutator [TAn , UAn ] belongs to the closed group generated
by involutions.
To this end, we fix n ∈ N and observe that the set supp TAn ∪ supp UAn is disjoint
from VAn (supp TAn ∪ supp UAn ). It follows that if we let Tn0 = VAn TA−1
V , then Tn0
n An
commutes with both TAn and UAn . So we have
[TAn , UAn ] = [TAn Tn0 , UAn ]
= [(TAn VAn TA−1
)VAn , UAn ]
n
and since taking a commutator means multiplying by a conjugate of the inverse, this
equality implies [TAn , UAn ] is a product of involutions in [Φ]1 . As explained before
[TAn , UAn ] → [T, U ] so this ends the proof.
As a consequence, we can easily derive that the closure of the derived group is
connected.
Corollary 3.13. Let Φ be an aperiodic graphing. Then D([Φ]1 ) is connected.
Proof. By the previous theorem it suffices to show that the group generated by
involutions in [Φ]1 is connected, and we will actually prove that it is path connected.
Let U ∈ [Φ]1 be an involution and let A be a fundamental domain for U . There is
an increasing family of Borel subsets (At )t∈[0,1] such that A0 = ∅ and A1 = A and
for all t ∈ [0, 1], µ(At ) = tµ(A).
Then by the dominated convergence theorem the family of involutions Ut :=
UAt ∪U (At ) is a continuous path from U0 = idX to U1 = U . So every involution in [Φ]1
is connected by a path to the identity, and we conclude that the group generated
by involutions is path connected as desired.
20
For ergodic Z-actions, D([T ]1 ) is actually the connected component of the identity (this follows from Corollary 4.20 along with the above result).
We end this section by refining the fact that the closure of the derived group
is topologically generated by involutions so as to obtain the same statements that
Kittrell and Tsankov had obtained for full groups in [KT10, Sec. 4.2]. The proof
is actually the same as Kittrell and Tsankov’s modulo the use of the dominated
convergence theorem and we reproduce it here for the reader’s convenience.
Let Φ be a graphing and ϕ ∈ Φ. If A is a Borel subset of dom ϕ such that
A ∩ ϕ(A) = ∅, we denote by Iϕ,A the involution in Aut(X, µ) defined by: for all
x ∈ X,
ϕ(x) if x ∈ A
ϕ−1 (x) if x ∈ ϕ(A)
Iϕ,A (x) =
x
else.
Note that Iϕ,A ∈ [Φ]1 since dΦ (x, Iϕ,A (x)) 6 1 for all x ∈ X.
Theorem 3.14. Let Φ be a graphing. Then the group D([Φ]1 ) is topologically generated by the set
{Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} .
Proof. By Theorem 3.12, we only need to show that involutions belong to the group
topologically generated by the set
{Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} .
So let U ∈ [Φ]1 be an involution, and let A be a fundamental domain for the
restriction of U to its support. Let (wn ) enumerate the Φ-words, and for each n ∈ N
let
An ={x ∈ A : U (x) = wn (x) and for all m ∈ N if U (x) = wm (x)
then either |wm | > |wn | or m > n}
Then (An ) forms a partition of A and for all n ∈ N, if wn = ϕ1 · · · ϕk , then for all
x ∈ An we have that for all i 6= j ∈ {1, ..., k}
ϕi · · · ϕk (x) 6= ϕj · · · ϕk (x)
by minimality of the length of wn . By the dominated convergence theorem,
U = lim
N
Y
N →+∞
Iwn ,An ,
n=0
so we may actually assume that U = Iϕ1 ···ϕk ,B for some B ⊆ X and ϕ1 , ..., ϕk ∈ Φ±1
such that for all i 6= j ∈ {1, ..., k} and all x ∈ B, ϕi · · · ϕk (x) 6= ϕj · · · ϕk (x).
Since X is a standard Borel space, a well-known argument yields that we may
actually find a partition (Bm )m∈N of B such that for all m ∈ N and all i 6= j ∈
{1, ..., k},
ϕi · · · ϕk (Bm ) ∩ ϕj · · · ϕk (Bm ) = ∅
21
(see for instance [EG14, Lem. 5.2]). Again by the dominated convergence theorem
U = lim
N →+∞
N
Y
Iϕ1 ···ϕk ,Bm ,
n=0
so we may actually assume that U = Iϕ1 ···ϕk ,C for some C ⊆ X such that for all
i 6= j ∈ {1, ..., k},
ϕi · · · ϕk (C) ∩ ϕj · · · ϕk (C) = ∅
Then note that for all m ∈ N and i ∈ {1, ..., k − 1}, the identity
(i − 1 k) = (i − 1 i)(i k)(i − 1 i)
in the symmetric group over {0, ..., k} yields
Iϕi ···ϕk ,C = Iϕi ,ϕi+1 ···ϕk (C) Iϕi+1 ···ϕk ,C Iϕi ,ϕi+1 ···ϕk (C)
so that by a downward recurrence on i ∈ {1, ..., k} we have that Iϕi ···ϕk ,C belongs to
the group generated by
{Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} .
In particular, U = Iϕ1 ···ϕk ,C belongs to such a group, as wanted.
3.3
Dye’s reconstruction theorem
We now show that L1 full groups as abstract groups can only be isomorphic through
a measure-preserving transformation, which is a key step in order to see than L1 full
groups of ergodic Z-actions are a complete invariant of flip conjugacy. Fortunately,
the main result that we need for this has already been proven by Fremlin in a much
more general context.
Definition 3.15 (Fremlin). A subgroup G 6 Aut(X, µ) has many involutions if
for every Borel A ⊆ X non-null, there exists a non-trivial involution U ∈ G such
that supp U ⊆ A.
Proposition 3.16. Let Φ be a graphing. The following are equivalent
(1) Φ is aperiodic;
(2) [Φ]1 has many involutions;
(3) D([Φ]1 ) has many involutions;
(4) D([Φ]1 ) has many involutions.
Proof. Note that (2) and (3) are equivalent since every involution in [Φ]1 belongs to
D([Φ]1 ) by Lemma 3.10.
Let us show by contrapositive that (2)⇒(1): if Φ is not aperiodic, then we may
find a non-null set A which intersects every Φ-orbit in at most one point. Clearly
22
every element of [Φ]1 (actually of [RΦ ]) supported in A is trivial, in particular [Φ]1
does not have many involutions.
For the converse (1)⇒(2), suppose that Φ is aperiodic and let A ⊆ X be nonnull. Then by Lemma 2.12, there exists an involution U ∈ [RΦ ] whose support is
equal to A. Now Lemma 3.6 ensures us that there is a non-null U -invariant set A0
such that UA0 ∈ [Φ]1 , witnessing that [Φ]1 has many involutions. So the implication
(1)⇒(2) also holds and we conclude that (1), (2) and (3) are equivalent.
Clearly (4) ⇒ (2), so we now only need to show that (2)⇒(4). Suppose that
[Φ]1 has many involutions and let A be a non-null Borel subset of X. Let U ∈ [Φ]1
be an involution supported in A, let B be a fundamental domain of the restriction
of U to its support. Finally, let V ∈ [Φ]1 be an involution supported in B. Since
B and U (B) are disjoint, U V U V is an involution supported in A and belonging to
D([Φ]1 ) as wanted: D([Φ]1 ) has many involutions.
We denote by Aut∗ (X, µ) the group of non-singular transformations of (X, µ),
i.e. Borel bijections T : X → X such that for all Borel A ⊆ X, one has µ(A) = 0 if
and only if µ(T (A)) = 0.
We can now state and use Fremlin’s theorem, which is a generalization of Dye’s
reconstruction theorem for full groups.
Theorem 3.17 (Fremlin [Fre04, 384D]). Let G, H 6 Aut(X, µ) be two groups with
many involutions. Then any isomorphism between G and H is the conjugacy by
some non-singular transformation: for all ψ : G → H group isomorphism, there is
S ∈ Aut∗ (X, µ) such that for all T ∈ G,
ψ(T ) = ST S −1 .
Corollary 3.18. Let Φ and Ψ be two ergodic graphings. Then every isomorphism
between [Φ]1 and [Ψ]1 is the conjugacy by some measure-preserving transformation.
Proof. By Proposition 3.16 and the previous theorem, if ψ : [Φ]1 → [Ψ]1 is a group
isomorphism then there is S ∈ Aut∗ (X, µ) such that for all T ∈ [Φ]1 one has
ψ(T ) = ST S −1 .
Let f be the Radon-Nikodym derivative of the probability measure S∗ µ with respect
to µ. Since µ is preserved by every T ∈ [Φ]1 , the measure S∗ µ is preserved by every
T 0 ∈ [Ψ]1 . So f ◦ T 0 = f a.e. for every T 0 ∈ [Ψ]1 . But Ψ is ergodic so this implies f
is constant: the measure µ is preserved by S as wanted.
3.4
Closed normal subgroups of the closure of the derived
group
Given a group G ⊆ Aut(X, µ), we denote by GA the subgroup of all T ∈ G such
that supp T ⊆ A. Note that if Φ is a graphing and A is Φ-invariant then D([Φ]1 )A
is a closed normal subgroup of D([Φ]1 ).
We will see that conversely if Φ is aperiodic then all the closed normal subgroups
of D([Φ]1 ) arise in this manner. Our approach is based on the study of closed normal
subgroups generated by involutions.
23
Lemma 3.19. Let Φ be a graphing. If A is a Φ-invariant set then
D([Φ]1 A ) = D([Φ]1 )A = D([Φ]1 )A .
Proof. To simplify notation we let G = [Φ1 ]A , so that we aim to prove that
D(GA ) = D(G)A = D(G)A .
To this end we show that the chain of inclusions D(GA ) ⊆ D(G)A ⊆ D(G)A ⊆
D(GA ) holds.
• We clearly have the inclusion D(GA ) ⊆ D(G)A so that D(GA ) ⊆ D(G)A .
• Next, note that D(G)A is a closed subgroup of G which contains every element
of D(G)A . It follows that D(G)A ⊆ D(G)A .
• For the last remaining inclusion D(G)A ⊆ D(GA ), let T ∈ D(G)A . Then T
is supported on A and is a limit of elements Tn belonging to D(G). Now
note that by definition of the topology T is also the limit of the sequence of
transformations (TnA )n∈N . Moreover each TnA can be rewritten as a product
of commutators of elements supported in A by taking the induced transformations instead, which is harmless since A is invariant by every element appearing
in such a product. We conclude that T ∈ D(GA ) as desired.
We now establish a crucial lemma allowing a better understanding closures of
conjugacy classes of involutions.
Lemma 3.20. Let Φ be a graphing. Let U and V be two involutions such that their
supports are disjoint and have the same Φ-conditional measure. Then V belongs to
the closure of the conjugacy class of U .
Proof. Let A and B be fundamental domains of the respective restrictions of U and
V to their support. Then µΦ (A) = µΦ (B) so there exists an involution T ∈ [RΦ ]
such that T (A) = B and we can moreover assume that T (x) = x for all x ∈ A ∩ B.
For all n ∈ N we let An = {x ∈ A : dΦ (x, T (x)) < n} and Bn = {x ∈ B :
dΦ (x, T (x)) < n}. Since T is an involution and T (A) = B, we also have B
Sn = T (An ).
Note
that
(A
)
and
(B
)
are
increasing
sequences
of
sets
and
that
n
n
n An = A,
S
0
n Bn = B. We now define a new involution Tn
T (x)
if x ∈ An t Bn
V
T
U
(x)
if x ∈ U (An )
Tn0 (x) =
U T V (x) if x ∈ V (Bn )
x
else.
The definition of An and the fact that V, U ∈ [Φ]1 yield that Tn0 ∈ [Φ]1 as well. For
all n ∈ N and all x ∈ X, an easy calculation yields that:
• if x ∈ (A ∪ U (A)) \ (An ∪ U (An )), then Tn0 U Tn0 (x) = U (x),
• else if x ∈ (Bn ∪ V (Bn ), then Tn0 U Tn0 (x) = V (x) and
24
• else Tn0 U Tn0 (x) = x.
So Tn0 U Tn0 → V pointwise. Moreover the trichotomy above also shows that for all
x ∈ X we have dΦ (x, Tn0 U Tn0 (x)) 6 dΦ (x, U (x)) + dΦ (x, V (x)), so by the dominated
convergence theorem d˜Φ (Tn0 U Tn0 , V ) → 0. We have therefore established that V
belongs to the closure of the conjugacy class of U .
Lemma 3.21. Let Φ be an aperiodic graphing, let U ∈ [Φ]1 be an involution such
that µΦ (supp U ) 6 1/2. Let A be the Φ-closure of the support of U . Then the closed
subgroup generated by conjugates of U by elements of D([Φ]1 ) contains D([Φ]1 )A .
Proof. By Lemma 3.19 we may as well assume that A = X so that our aim becomes
to show that whenever U has support whose Φ-closure is equal to X and which
satisfies µΦ (supp U ) 6 1/2, the closed subgroup generated by conjugates of U by
involutions contains D([Φ]1 ).
So let U be as such, let B = supp U and denote by G the closed subgroup
generated by conjugates of U by elements of D([Φ]1 ). Since µΦ (supp U ) 6 1/2 by
Maharam’s lemma we may find a set C disjoint from B such that µΦ (C) = µΦ (B).
There is an involution V ∈ [RΦ ] supported on B t C such that V (B) = C. For all
n ∈ N we let
Bn = {x ∈ B : dΦ (x, V (x)) < n and dΦ (U (x), V U (x)) < n}
Then
(Bn ) is an increasing sequence of U -invariant Borel subsets
of B such that
S
S
n∈N Bn = B. Let An be the Φ-closure of Bn . Observe that
n∈N An = X, so the
proof will be finished once the following claim is proven.
Claim. For all n ∈ N, the group G contains D([Φ])An .
We now prove the claim. Let n ∈ N; the sets and functions that are to be
defined depend on n but we will omit the subscript n for readability. Let F be a
fundamental domain of the restriction of U to its support, let Fn be its intersection
with Bn , which is a fundamental domain for the restriction of U to Bn .
Let f = µΦ (Fn ) = µΦ (Bn )/2. We know that D([Φ])An is topologically generated
by involutions, so it suffices to show that any involution in [Φ]1 supported in An
belongs to G.
So let W be an involution supported in An . Let D be a Borel fundamental domain
for the restriction of W to its support: then supp W = D t W (D). By Corollary
2.10 we have a partition (Dm )m∈N of D such that for all m ∈ N, µΦ (Dm ) 6 f6 . For
all m ∈ N we let Wm = WDm tW (Dm ) . By the dominated convergence theorem,
W = lim
k→+∞
k
Y
Wm
m=0
so we only need to show that every Wm belongs to G.
25
B
C
Bn
U
V
Fn
Let us fix m ∈ N, and for notational simplicity let Γ = hU, V i ' (Z/2Z × Z/2Z) o
(Fn )
Z/2Z. Since µΦ (Dm ) 6 µΦ10
we can find a subset E ⊆ Fn such that µΦ (E) =
µΦ (Dm )/2 and E is disjoint from Γ(Dm t W (Dm )). Then Γ(E) is disjoint from
Dm t W (Dm ) = supp Wm .
Consider the Γ-invariant set Ẽ = (E t U (E)) t V (E t U (E)) and the involution
Ṽ = VẼ . An easy calculation yields U Ṽ U Ṽ = UẼ so that UẼ ∈ G. Now the support
of UẼ has Φ-conditional measure
µΦ (Ẽ) = 4µΦ (E) = 2µΦ (Dm ) = µΦ (supp Wm ).
Since moreover Ẽ and supp Wm are disjoint, we infer by Lemma 3.20 that Wm belongs to the closure of the conjugacy class of of UẼ . Since we have already established
that UẼ ∈ G, we can conclude that Wm ∈ G. As already observed, this ends the
proof of the claim and therefore of the theorem.
Proposition 3.22. Let Φ be an aperiodic graphing, let T ∈ [Φ]1 and let A be the
Φ-closure of the support of T . Then the closed subgroup generated by conjugates of
T by elements of D([Φ]1 ) contains
D([Φ]1 )A .
Proof. Again by Lemma 3.19 we only need to show that whenever T has a support
whose Φ-closure is equal to X, the closed subgroup generated by conjugates of T by
involutions contains D([Φ]1 ).
Let G be the closed subgroup generated by conjugates of T by elements of
D([Φ]1 ). We start by applying Proposition 2.7 and find a partition (A1 , A2 , B1 , B2 , B3 )
of supp T such that A2 = T (A1 ), B2 = T (B1 ) and B3 = T 2 (B1 ). Let C = A1 t b1 ,
then by construction C ∩ T (C) = ∅ and C intersects every non-trivial T -orbit. Since
the Φ-closure of supp T is equal to X this implies C intersects every Φ-orbit.
Let G be the closed subgroup generated by conjugates of T by elements of
D([Φ]1 ). Let U be an involution in [Φ]1 whose support
is equal to C. For all
S
n ∈ N, let Cn = {x ∈ X, dΦ (x, U (x)) < n}. Then n∈N Cn = C and for all n ∈ N
we have UCn ∈ [Φ]1 . Now since U (C) is disjoint from C we also have that U (Cn )
26
and Cn are disjoint so that [T, UCn ] is an involution belonging to G whose support
is Cn t T (Cn ).
Applying Lemma 3.21
S we deduce that G contains D([Φ]1 )An where An is the
Φ-closure
of Cn . Since n∈N Cn = C and C intersects every Φ-orbit, we have that
S
A
=
X. Moreover the sequence (An ) is increasing, so a direct application of
n∈N n
S
Proposition refprop: weak order continuity yields that n∈N D([Φ]1 )An is dense in
D([Φ]1 ) so that G contains D([Φ]1 ) as wanted.
We can now easily prove our main results for this section.
Theorem 3.23. Let Φ be an aperiodic graphing. Then for every closed normal
subgroup N of D([Φ]1 ) there is a (unique up to measure zero) Φ-invariant Borel set
A such that
N = D([Φ]1 )A .
Proof. Let t = sup{µ(A) : A is Φ-invariant and D([Φ]1 )A ⊆ N }, and let An be a
sequence of subsets of X such that µ(An ) → t and D([Φ]1 )An ⊆ N . Note that
whenever A0 , A00 are two Φ-invariant subsets of X then the group generated by
D([Φ]1 )A0 ∪ D([Φ]1 )A00 is equal to D([Φ]1 )A0 ∪A00 . So we may assume the sequence
(An ) is increasing.
S
Let A = n∈N An , then µ(A) = t. By proposition 3.8 since N is closed we
actually have that N contains D([Φ]1 )A . Conversely, let T ∈ N and let B be the
Φ-closure of the support of T . By Proposition 3.22 the group N contains D([Φ]1 )B .
So N contains D([Φ]1 )A∪B hence µ(A ∪ B) 6 t. But µ(A) = t so B ⊆ A up to
measure zero, hence T ∈ D([Φ]1 A . So D([Φ]1 )A contains N and we conclude that
N = D([Φ]1 )A .
Finally, the uniqueness of A up to measure zero follows from the fact that given
any B ⊆ X of positive measure, there is a non trivial T ∈ D([Φ]1 ) supported in B
(see Proposition 3.16).
Corollary 3.24. Let Φ be an aperiodic graphing. Then Φ is ergodic if and only if
D([Φ]1 ) is topologically simple.
We will see that D([Φ]1 ) and D([Φ]1 ) are never simple when Φ = {T } and
T ∈ Aut(X, µ) is aperiodic (see Theorem 4.26).
3.5
Link with topological full groups
In this section we connect L1 full groups to the well-studied topological full groups.
Since we are dealing with L1 full groups associated to graphings, we need to introduce
their natural topological counterparts.
Let 2N be the Cantor space and let ν be a Borel probability measure on it. A
continuous graphing on the measured Cantor space (2N , ν) is a graphing Φ such
that for all ϕ ∈ Φ, the sets dom ϕ, rng ϕ are clopen and ϕ : dom ϕ → rng ϕ is a
homeomorphism.
27
Definition 3.25. Let Φ be a continuous graphing on (2N , ν). The topological full
group of Φ, denoted by [Φ]c , is the group of all homeomorphisms T of 2N such that
for all x ∈ 2N there is a neighborhood U of x and a Φ-word w such that for all y ∈ U ,
T (x) = w(x).
It follows from compactness that one can think equivalently of the topological
full group of a continuous graphing Φ as the group of all maps obtained by cutting
and pasting finitely many Φ-words along a partition into clopen sets. In particular,
[Φ]c is always a countable group. The most interesting case is when Φ is actually a
countable group acting by homeomorphisms on a compact set (or a generating set
for such a countable group): we then recover the usual definition of the topological
full group.
We denote by [Φ]c−inv denote the group generated by involutions in a topological full group [Φ]c . The following result is an L1 full group version of a result of
Miller [Mil05] for full groups, also proved by Kittrell-Tsankov [KT10, Prop. 4.1] and
Medynets [Med07] in the case of a single homeomorphism.
Theorem 3.26. Let ν be a Borel probability measure on 2N , and let Φ be a continuous graphing on (2N , µ). Then the group [Φ]c−inv is dense in D([Φ]1 ).
Proof. Let us recall that if ϕ ∈ Φ and A is a Borel subset of dom ϕ such that
A ∩ ϕ(A) = ∅, we denote by Iϕ,A the involution in [Φ]1 defined by: for all x ∈ X,
ϕ(x) if x ∈ A
ϕ−1 (x) if x ∈ ϕ(A)
Iϕ,A (x) =
x
else.
By Theorem 3.14, the group D([Φ]1 ) is topologically generated by such involutions,
so we only need to check that, given ϕ ∈ Φ and a Borel subset A of dom ϕ such that
A ∩ ϕ(A) = ∅, the involution Iϕ,A can be approximated by elements of [Φ]c−inv .
So let ϕ ∈ Φ and let A be a Borel subset of dom ϕ such that A∩ϕ(A) = ∅. Since ν
is regular, there is a sequence (An ) of clopen subsets of 2N such that ν(An 4 A) → 0.
Consider the set A0n := An \ϕ(An ). Note that since ϕ is a partial homeomorphism,
A0n is still clopen, and by definition A0n is disjoint from ϕ(A0n ) so the involution Iϕ,A0n
belongs to [Φ]c−inv . We now have
Z
Z
d˜Φ (Iϕ,A , Iϕ,A0n ) ) =
dΦ (ϕ(x), x) +
dΦ (x, ϕ(x))
A\A0n
A0n \A
Z
Z
−1
+
dΦ (ϕ (x), x) +
dΦ (x, ϕ−1 (x))
ϕ(A\A0n )
=2µ(A0n 4 A).
ϕ(A0n \A)
Moreover since ν(An 4 A) → 0, since ϕ preserves the measure and since A is disjoint
from ϕ(A), a straightforward computation yields µ(A0n 4 A) → 0. We conclude that
d˜Φ (Iϕ,A , Iϕ,A0n ) ) → 0 as desired.
Let us now show that the similar statement that [Φ]c is dense in [Φ]1 is not true
in general.
28
Example 3.27. Consider the odometer T0 on 2N . For every word s with letters
in {0, 1}, we let Ns ⊆ 2N be the set of infinite words which start by s. For every
n ∈ N, let ϕn be the restriction of T0 to N1n 0 , and then let Φ = {ϕn : n ∈ N}.
It is easily checked that the topological full group [Φ]c is the group S2∞ of dyadic
permutations. In particular [Φ]c is locally finite, hence contained in D([Φ]1 ). We
conclude from Theorem 3.26 that [Φ]c = D([Φ]1 ).
However the L1 full group of Φ is equal to the L1 full group of T0 since up to
measure zero they induce the same graph. But T0 has index 1 (see Definition 4.3)
hence cannot belong to D([T0 ]1 ) = D([Φ]1 ), and we conclude that [Φ]c is not dense
in [Φ]1 .
It is well-known that every countable group Γ of measure-preserving transformation of (X, µ) is up to measure zero conjugate by a measure-preserving isomorphism
to a group of homeomorphism of the Cantor space preserving a Borel probability
measure ν (see for instance [Gla03, Thm. 2.15]). Here we check that the same can
be done for graphings so as to be able to apply our density result above in the right
level of generality.
Recall that the group of homeomorphisms of the Cantor space is canonically
isomorphic to the group of automorphisms of the Boolean algebra of clopen subsets
of the Cantor space. Furthermore, the Boolean algebra of clopen subsets of the
Cantor space is the unique countable atomless Boolean algebra (see for instance
[GH09, Chap. 16]). We can now state and prove that any graphing is conjugate to
a continuous one up to measure zero.
Proposition 3.28. Let (X, µ) be a standard Borel space, and let Φ be a graphing
on X. Then there exists a Borel probability measure ν on 2N , a continuous graphing
Ψ on (2N , ν), a Φ-invariant full measure Borel subset X0 of X and Borel measurepreserving injection T : (X0 , µ) → (2N , ν) and a continuous graphing Ψ on 2N such
that
ΨT (X0 ) = T ΦX0 T −1 .
Proof. Let C be a countable separating family of Borel sets containing X. Let D
be set of finite Boolean combinations of sets of the form w(C) or w−1 (C) for w a
Φ-word and C ∈ C. Then D is countable separating, contains the domain and range
of every ϕ ∈ Φ, and is Φ-invariant in the sense that for every ϕ ∈ Φ and D ∈ D,
ϕ±1 (D) ∈ D.
Each atom of D is a singleton since D contains a separating family. Let A be
the reunion of the atoms of D, then A is countable and hence has measure zero. Let
X0 := X \ A, and consider the Boolean algebra DX0 := {D ∩ X0 : D ∈ D}. induced
by D on X0 .
By Stone duality, DX0 is isomorphic to the algebra of clopen subsets of its Stone
space Y . Since DX0 is a countable atomless algebra its Stone space Y is homeomorphic to 2N so we may as well assume that Y = 2N .
By construction every ϕ ∈ Φ induces a Boolean algebra isomorphism between the
Boolean algebra induced by DX0 on dom ϕ and the Boolean algebra induced by DX0
on rng ϕ, so every ϕ ∈ Φ induces a homeomorphism ϕ̃ between the corresponding
clopen subsets of Y . Let Ψ = {ϕ̃ : ϕ ∈ Φ}, we will check that such a continuous
graphing works.
29
We define a map T : X0 → Y by associating to every x ∈ X0 the unique element
T (x) of the Stone space of DX0 defined by x. Since DX0 contains a separating family
of X0 , the map T is injective. Moreover it conjugates the restriction ΦX0 and ΨT (X0 )
by the definition of Ψ. Finally the map T is also Borel since the preimage of a clopen
set belongs to DX0 , so by putting ν = T∗ µ we get the desired statement.
4
L1 full groups of Z-actions
We now focus on L1 full groups of Z-actions, for which we can say a lot more. The
main feature is that for Z-actions, L1 full groups become invariants of flip-conjugacy.
To see this, we need the following fundamental result of Belinskaya.
Theorem 4.1 (Belinskaya, [Bel68]). Let T and T 0 be two ergodic transformations
with the same orbits, and suppose furthermore that T 0 ∈ [T ]1 . Then there exists
S ∈ [T ] such that either
T = ST 0 S −1 or T −1 = ST 0 S −1 .
With this in hand, we can now prove that L1 full groups of ergodic Z-actions are
complete invariants of flip conjugacy.
Theorem 4.2. Let T and T 0 be two measure-preserving ergodic transformation of
a standard probability space (X, µ). Then the following are equivalent:
(1) T and T 0 are flip-conjugate;
(2) the groups [T ]1 and [T 0 ]1 are abstractly isomorphic;
(3) the groups [T ]1 and [T 0 ]1 are topologically isomorphic.
Proof. Clearly (1) implies (3) and (3) implies (2). Suppose that (2) holds and let
ψ : [T ]1 → [T 0 ]1 be an abstract group isomorphism. By Corollary 3.18, there is
S ∈ Aut(X, µ) such that for all U ∈ [T ]1 , we have
ψ(U ) = SU S −1 .
In particular, we have that ST S −1 ∈ [T 0 ]1 . Since ψ is surjective, ST S −1 must
have the same orbits as T 0 . So by Belinkskaya’s Theorem 4.1, ST S −1 and T 0 are
flip-conjugate, so T and T 0 are flip-conjugate. So (2) implies (1), which ends the
proof.
4.1
The index map
One of the specific features of L1 full groups of aperiodic Z-actions is the existence
of a natural homomorphism into R, given by integrating the corresponding cocycles.
We will see later that in the ergodic case, it actually takes values into Z.
30
Definition 4.3. Let T ∈ Aut(X, µ) be ergodic. The index of S ∈ [T ]1 is defined
by
Z
cS (x)dµ(x),
IT (S) :=
X
where cS is the cocycle associated to S ∈ [T ]. When the transformation T we are
considering is clear from the context, we will also simply write the index map as I.
From the cocycle identity cSS 0 (x) = c0S (S(x)) + cS (x) and the fact that elements
of [T ]1 are measure preserving we deduce that the index map is a homomorphism.
We will denote its kernel by [T ]0 .
Our first observation is that taking induced transformations does not change
the index. The proof is very similar to that of Kac’s formula, which should be no
surprise since Kac’s formula corresponds to the case S = T .
Proposition 4.4. Let S ∈ [T ]1 , and let A ⊆ X intersect every non trivial S-orbit.
Then we have the equality
I(SA ) = I(S).
Proof. For all n ∈ N, let An := {x ∈ X : TA (x) = T n (x)}. Then the An ’s form a
partition of A. For all n ∈ N and all 0 6 m < n, we let Bn,m := T m (An ). The
family (Bn,m )06m<n is a partition of the support of S since A intersects every non
trivial S-orbit. We now compute
Z
I(SA ) = cSA (x)dµ(x)
A
XZ
cSA (x)dµ(x)
=
An
n∈N
=
n−1
X
XZ
cS (S m (x))dµ(x),
An m=0
n∈N
the last equality being a consequence of the cocycle identity. We deduce that
I(SA ) =
n−1 Z
XX
An
n∈N m=0
=
XZ
n∈N
Z
cS (S m (x))dµ(x)
cS (x)dµ(x)
Bn,m
=
cS (x)dµ(x)
supp S
I(SA ) = I(S)
The following corollary can also be obtained directly by noting that if S ∈ [T ]1 ,
then on every finite S-orbit the average of nS must be equal to zero.
Corollary 4.5. Let T ∈ Aut(X, µ) be aperiodic. Every periodic element of [T ]1 has
index zero.
31
Proof. Let S ∈ [T ]1 be a periodic element, let A ⊆ X be a fundamental domain
for S (see the paragraph following Definition 2.3). Then SA = idX by definition so
I(SA ) = 0. By the previous proposition we conclude that I(S) = I(SA ) = 0.
One can completely describe the ergodic elements of the L1 full group of T ∈
Aut(X, µ) which are conjugate to T in terms of their index. This will be very useful
to us in the next section.
Theorem 4.6 (Belinskaya, [Bel68, Thm. 3.8]). Let T ∈ Aut(X, µ) be an ergodic
transformation, and let T 0 ∈ [T ]1 . Then T and T 0 are flip-conjugate iff T 0 is ergodic
and I(T 0 ) = ±1.
4.2
A characterization of supports of n-cycles
In full groups of aperiodic equivalence relations, every Borel set is the support of an
involution. Here we will see that this is not true in general for L1 full groups and
give a complete characterization of sets which arise as supports of involutions, or
more generally of n-cycles.
Definition 4.7. A measure-preserving transformation T is an n-cycle if every T orbit has cardinality either 1 or n.
Note that if p is prime, a p-cycle is precisely an element of Aut(X, µ) of order p.
Our result is that n-cycles in L1 -full groups arise only in the most obvious manner:
for instance there is an involution whose support is equal to X if and only if there
exists a Borel set B such that X = B t T (B).
Theorem 4.8. Let T be a measure-preserving ergodic transformation, let A be a
Borel subset of X and let n ∈ N. Then A is equal to the support of an n-cycle if
and only if there is B ⊆ A such that
A = B t TA (B) · · · t TAn−1 (B)
Remark. We should point out however that every Borel set arises as the support
of a periodic transformation all whose orbits have cardinality at most 3 (see Lemma
4.24).
Proof of Theorem 4.8. The sufficiency of the condition is easy: since TA ∈ [T ]1 by
Kac’s formula (see Prop. 3.5), if A = B t TA (B) · · · t TAn−1 (B) we can define an
n-cycle T0 ∈ [T ]1 whose support equates A by putting
F
i
if x ∈ n−2
TA (x)
i=0 TA (B)
−n−1
n−1
T0 (x) =
T
(x)
if x ∈ TA (B) .
A
x
else.
For the converse, let us recall that if G 6 Aut(X, µ) and A is a Borel subset of
X, we let GA denote the group of elements of G supported in A. Observe that if T ∈
Aut(X, µ) then for all x, y ∈ A we have dT (x, y) > dTA (x, y) so that [T ]1 A 6 [TA ]1
(we will see in Theorem 5.2 that the inclusion is actually strict). This observation
will be used implicitly in what follows.
32
Suppose that A is the support of an n-cycle T0 , let C be a fundamental domain
for T0 , and consider the transformation S = TC T0 whose support also equates A and
satisfies
A = C t S(C) t · · · t S n−1 (C).
By Proposition 2.5 the restriction of S to A is ergodic. Moreover note that TC =
(TA )C so the the TA -index of TC is ITA (TC ) = 1 by Proposition 4.4. Since T0 is
periodic, its TA -index is equal to 0 by Corollary 4.5 and we conclude that
ITA (S) = 1.
By applying Belinskaya’s theorem 4.6 to the restriction of S to A which is ergodic,
we conclude that TA and S are conjugate by a measure-preserving transformation
U supported in A. But recall that A = C t S(C) t · · · t S n−1 (C) so we have
A = U (C) t TA (U (C)) · · · t TAn−1 (U (C)) hence TA satisfies the desired conclusion
with B := U (C).
Example 4.9. Let T ∈ Aut(X, µ) be a weakly mixing transformation. Then for all
n ∈ N, there is no n-cycle in [T ]1 whose support equates X.
Remark. The existence of B ⊆ A such that A = B t TA (B) · · · t TAn−1 (B) is a
spectral property of TA : it is equivalent to the associated unitary operator on L2 (A)
having e2iπ/n as an eigenvalue.
4.3
The L1 full group is generated by induced transformations
along with periodic transformations
We will now use the index map to find a nice generating set for [T ]1 . Our ideas are
in the direct continuation of Belinskaya’s paper [Bel68]. Let us start by analyzing
the action of elements of [T ]1 on the T -orbits.
A sequence (nk )k∈N of integers is called almost positive if for all but finitely
k ∈ N, we have nk > 0. It is called almost negative if (−nk )k∈N is almost positive,
and a sequence which is either almost negative or almost positive is called almost
sign invariant. It is an easy exercise to check that an injective sequence is almost
positive iff it tends to +∞, while it is almost negative iff it tends to −∞. The
following lemma thus implies that under the identification of a T -orbit with Z via
k 7→ T k (x), every forward S-orbit either tends to +∞ or −∞.
Lemma 4.10 ([Bel68, Thm. 3.2]). Let T ∈ Aut(X, µ) be aperiodic and S ∈
[T ]1 . For almost every x ∈ X such that the S-orbit of x is infinite, the sequence
sign(cS k (x)) is almost sign invariant.
Definition 4.11. An element S ∈ [T ]1 such that for all x ∈ supp S, the sequence
(cS k (x))k∈N is almost positive is called almost positive. If for every x ∈ supp S
the sequence (cS k (x))k∈N is almost negative, we say that S is almost negative.
Note that every almost positive or almost negative element has to be aperiodic
when restricted to its support. Also the inverse of an almost positive element is
almost negative and vice-versa. We have a natural order on every T -orbit which
allows for a more natural formulation of the previous definition.
33
Definition 4.12. Let T ∈ Aut(X, µ) be aperiodic. We define a partial order 6T on
X by x 6T y if y = T n (x) for some n > 0.
Note that 6T is total when restricted to a T -orbit, and that such a restriction
corresponds to the natural ordering 6 on Z via n 7→ T n (x).
We may now reformulate the previous definition as: S ∈ [T ]1 is almost positive
if for almost every x ∈ supp S, S k (x) >T x for all but finitely many k ∈ N.
Proposition 4.13. Let T ∈ Aut(X, µ) be aperiodic. Every element s ∈ [T ]1 can be
written as a product S = Sp S+ S− , where Sp is periodic, S+ is almost positive, S− is
almost negative and these three elements have disjoint supports.
Proof. Let S ∈ [T ]1 . The set of x ∈ X such that the sequence (cS k (x))k∈N is
almost positive (respectively almost negative) is S-invariant. Call this set A+ (respectively A− ). Finally let Ap denote the set of x ∈ X whose S-orbit is finite.
Then (A− , A+ , Ap ) is a partition of X by the previous lemma, and since they are
S-invariant we deduce that S = SA− SA+ SAp . Clearly Sp := SAp , S+ := SA+ and
S− := SA− are as wanted.
Definition 4.14. Let T ∈ Aut(X, µ) be aperiodic. If S ∈ [T ]1 , we say that S is
positive if S(x) >T x for all x ∈ X.
The proof of the following proposition uses the same ideas as in [Bel68, Lem.
3.5].
Proposition 4.15. Let T ∈ Aut(X, µ) be aperiodic, and let S ∈ [T ]1 be almost
positive. Then there exists a positive element S 0 ∈ [T ]1 whose support is a subset of
supp S such that SS 0 −1 and S 0 −1 S are periodic.
Proof. Consider the set A := {x ∈ X : S k (x) >T x for all k > 0}. Note that TA (x)
may be defined as the first element greater than x which belongs to A, so by the
definition of A we have TA (x) 6T SA (x) for all x ∈ A.
Let us show that A intersects every non trivial S-orbit. Let x ∈ supp S. Since
S is almost positive, the sequence (nS k (x))k∈N is almost positive. Let k be the last
natural integer such that nS k (x) 6 0, then by definition S k (x) ∈ A as wanted.
Now for all x ∈ A we have SA (x) >T TA (x) >T x, in particular SA is positive.
Since A intersects every S-orbit, we moreover have that SSA−1 and SA−1 S are periodic,
so S 0 := SA is as desired.
Lemma 4.16. Let T ∈ Aut(X, µ) be aperiodic, let S ∈ [T ]1 be positive and let
A = supp S. Then STA−1 is positive.
Proof. Since S is positive, we have A = {x ∈ X : S(x) >T x}. But then by the
definition of TA ,for all x ∈ A we have S(x) >T TA (x). Since A is TA -invariant, we
deduce that for all x ∈ A, STA−1 (x) >T x. But the support of STA−1 is contained
in A so the previous inequality actually holds for all x ∈ X, and we conclude that
STA−1 is positive.
34
Proposition 4.17. Let T ∈ Aut(X, µ) be ergodic. Then every positive element is
the product of finitely many transformations which are induced by T : for all S ∈ [T ]+
1
there exists k ∈ N and A1 , ..., Ak ⊆ X such that
S = TA1 · · · TAk .
In particular, the index of a positive element is a (positive) integer.
Proof. Note that the index of a positive element has to belong to [0, +∞[, and that
the index of a positive element S is null if and only if S = idX . We prove the result
by induction on bI(S)c.
First, if bI(S)c = 0, suppose towards a contradiction that S is non-trivial. let
A = supp S, by the previous lemma STA−1 is positive. Since T is ergodic, A intersects
almost every T -orbit. Proposition 4.4 thus yields that I(TA ) = I(T ) = 1. So
I(STA−1 ) = I(S) − 1 < 0, but STA−1 is positive, a contradiction.
The inductive step is basically the same: if bI(S)c = n + 1 for some n ∈ N, the
support A of S is nontrivial so that S = TA S 0 where bI(S 0 )c = n.
Theorem 4.18. Let T ∈ Aut(X, µ) be ergodic, then [T ]1 is generated by the set
P er([T ]1 ) ∪ Ind([T ]1 ), where P er([T ]1 ) is the set of periodic elements in [T ]1 and
Ind([T ]1 ) is its set of transformations induced by T .
Proof. By Proposition 4.13 the group [T ]1 is generated by almost positive elements
along with periodic elements. Now every almost positive element is the product of a
positive element by a periodic element (Proposition 4.15) and every positive element
is the product of finitely many induced transformations (Proposition 4.17).
Corollary 4.19. Let T ∈ Aut(X, µ) be ergodic, then [T ]1 is generated by the set
P er([T ]1 ) ∪ {T }, where P er([T ]1 ) is the set of periodic elements in [T ]1 .
Proof. If A is a non-null subset of X, then by ergodicity A intersects almost every T orbit so that TA−1 T is periodic. In other words every induced transformation belongs
to the group generated by periodic elements along with T , and since by the previous
theorem periodic elements along with induced transformations generate [T ]1 we are
done.
Corollary 4.20. Let T ∈ Aut(X, µ) be ergodic. Then D([T ]1 ) is equal to the following three groups:
• the group generated by periodic elements,
• the group topologically generated by involutions and
• the kernel of the index map.
Moreover we have the following short exact sequence
I
1 → D([T ]1 ) → [T ]1 →
− Z → 1.
35
Proof. Denote by Gper the group generated by periodic elements in [Φ]1 , and by
Ginv the group topologically generated by involutions. Note that both are normal
subgroups of [T ]1 . By Lemma 3.10, we have Gper 6 Ginv 6 D([T ]1 ). Since the index
map is continuous and takes values in an abelian group, we also have D([T ]1 ) 6
Ker (I).
Let S ∈ [T ]1 . We may write S as a product of periodic elements and powers
of T by the previous corollary. So modulo Gper , we have S = T n for some n ∈ Z.
So I(S) = n and we conclude that the index map takes values into Z. Moreover if
S ∈ Ker (I) we infer that n = 0 so that S ∈ Gper . So Gper = Ker (I) and since we
have already established that Gper 6 Ginv 6 D([T ]1 ) 6 Ker (I), we conclude that
all these four normal subgroups are equal.
Remark. Note that for topological full groups, the kernel of the index map can be
larger than the derived group due to the fact that some involutions may not belong
to the derived group. Matui has obtained a complete description of the quotient of
the kernel of the index map by the derived group, see [Mat06, Thm. 4.8].
4.4
Escape time and non-simplicity results
In this section, we show that the closure of the derived group of [T ]1 is never simple.
To this end, we will use the non-integrability of certain escape times.
Let us first recall that given a standard probability space (X, µ), its measure
algebra is denoted by MAlg(X, µ) and consists of all Borel subsets of X, two such
sets being identified if their symmetric difference has measure zero.
It is naturally endowed with a metric dµ defined by dµ (A, B) = µ(A 4 B) which
is complete and separable (see [Hal50, 40.A]).
Definition 4.21. Let T ∈ Aut(X, µ) and A ∈ MAlg(X, µ). The T -escape time of
A is the map τA : A → N defined by
• τA (x) = +∞ if there is no n ∈ N such that T n (x) 6∈ A,
• else τA (x) is the the first integer n ∈ N such that T n (x) 6∈ A or T −n (x) 6∈ A.
By Kac’s theorem, for any Borel set A ⊆ X the T -return time to A is integrable
and its integral is equal to 1. The situation for escape times is however very different.
Indeed, any non-null T -invariant set fails to have an integrable escape time so a
non ergodic transformation admits non-trivial sets with non-integrable escape time.
This is actually true of any measure-preserving transformation in a strong sense as
the following result shows.
Theorem 4.22. Let T be a measure-preserving transformation. Then there is a
dense Gδ of A ∈ MAlg(X, µ) whose T -escape time is not integrable.
Proof. For n ∈ N, let Fn be the set of A ∈ MAlg(X, µ) whose escape time is either
non integrable or has L1 norm stricly bigger than n. We have to show that each Fn
is open dense. To see that Fn is open, first note that for a fixed k ∈ N, if we let
Ak := {x ∈ A : nA (x) = k} then
!
k
[
Ak+1 = A \
Al ∩ T −(k+1) (A) ∪ T k+1 (A)
l=1
36
so that Ak depends continuously
P on A. Now take A ∈ Fn , by definition we may find
N ∈ N big enough so that N
k=1 kµ(Ak ) > n. Such an inequality will remain true
0
for A sufficiently close to A by continuity, so that Fn is indeed open.
Next, to check the density, we will be done if we can build a sequence (Am ) such
that kτAm k1 → +∞ but µ(Am ) → 0. Indeed, then A ∪ Am converges to A and for
any n ∈ N, it belongs to Fn for m large enough.
If the ergodic decomposition of T has a diffuse part, there is a sequence of T invariant sets (Am ) such that µ(Am ) → 0 and kτAm k1 = +∞ by T -invariance.
If the ergodic decomposition of T does not have a diffuse part, then T has to be
aperiodic. So we apply Rohlin’s lemma to T for N = 6m , = 21 to get Bm ⊆ X all
whose first 6m translates are disjoint such that 2·61m 6 µ(Bn ) 6 61n . Let
An :=
4m
−1
G
T i (Bm )
i=0
be the reunion of the first 4m translates of the base Bm of the Rohlin tower. We
now compute the integral of the escape time:
4m /2−1
Z
τAm = 2µ(Bm )
Am
= 2µ(Bm ) ·
1 16m
> m·
6
8
X
(i + 1)
i=0
m
4m 42
2
+1
2
which tends to +∞ while µ(Am ) 6 ( 46 )m tends to zero as m tends to +∞.
Remark. For any T ∈ Aut(X, µ) of rank one, it is easily checked that the set of
A ∈ MAlg(X, µ) whose T -escape time is bounded is also dense, but I do not know
wether this is true for any T ∈ Aut(X, µ).
The following corollary of Theorem 4.22 is in sharp contrast with the situation
for full groups of ergodic measure-preserving equivalence relations, which act transitively on elements of MAlg(X, µ) of the same measure.
Corollary 4.23. Let T ∈ Aut(X, µ) be ergodic. There is a dense Gδ of A ∈
MAlg(X, µ) such that for every B ∈ MAlg(X, µ) disjoint of A of the same measure, no element of [T ]1 maps A to B.
Proof. If T maps A to a set disjoint from A, then by definition the L1 -norm of T is
an upper bound of the integral of the escape time of A. By the previous theorem,
this cannot happen for a dense Gδ of A ∈ MAlg(X, µ).
We will now refine the preceding result to establish that for all T ∈ [R] aperiodic,
neither the derived group of [T ]1 nor its closure are simple. We will need the following
lemma, which is essentially contained in [Fat78].
Lemma 4.24. Let T ∈ Aut(X, µ) be aperiodic. For every A ∈ MAlg(X, µ), there
exists a periodic U ∈ [T ]1 whose support is equal to A and all whose orbits have
cardinality at most 3.
37
Proof. Consider the induced transformation TA , which belongs to [T ]1 by Proposition 3.5. Since T is aperiodic, supp TA = A. By a maximality argument, there
is a partition (A1 , A2 , B1 , B2 , B3 ) of A such that TA (A1 ) = A2 , TA (B1 ) = B2 and
TA (B2 = B3 ) (see [Fri70, Lem. 7.2]). We then have a naturally defined periodic
element U ∈ [T ]1 given by
TA (x) if x ∈ A1 t B1 t B2
−1
TA (x) if x ∈ A2
U (x) =
T −2 (x) if x ∈ B3
A
x
else.
It is easily checked that U is as desired.
Lemma 4.25. Let T ∈ Aut(X, µ) be aperiodic. For every Borel A ⊆ X, there exists
U ∈ D([T ]1 ) whose support is equal to A and all whose orbits have cardinality at
most 3.
Proof. Consider the transformation U ∈ [T ]1 provided by the previous lemma. Observe that U = U2 U3 where U2 is the transformation induced by U on the set of
points whose U -orbit has cardinality 2, and U3 is the transformation induced by U
on the set of points whose U -orbit has cardinality 3.
U3 is a commutator by the equality (1 2 3) = (1 2)(1 3)(1 2)(1 3) in the
symmetric group over {1, 2, 3}.
Let C be a fundamental domain of the restriction of U2 to its support. Applying
the above lemma again, we find V ∈ [T ]1 all whose orbits have cardinality at most 3
such that supp V = C. We then let Ũ2 = U2 V U2 V −1 ∈ D([T ]1 ) which has the same
support as U2 . Now U 0 = Ũ2 U3 is as desired.
If every A ∈ MAlg(X, µ) were the support of an involution belonging to [T ]1 , one
could take U from the previous lemma to be an involution. However X itself may
fail to be the support of an involution (see Theorem 4.8 and the example thereafter).
Theorem 4.26. Let T ∈ Aut(X, µ) be ergodic. Then neither D([T ]1 ) nor D([T ]1 )
are simple.
The previous theorem follows trivially from the following statement which we
will prove using Theorem 4.22.
Lemma 4.27. Let T ∈ Aut(X, µ) be ergodic. Then there exists S1 , S2 ∈ D([T ]1 )
such that S1 cannot be written as a product of conjugates of S2±1 by elements of [T ]1 .
Proof. Take A ∈ MAlg(X, µ) whose escape time is not integrable, which exists by
Theorem 4.22.
By Lemma 4.25, we may fix S1 ∈ D([T1 ]) whose support is equal to A and
S2 ∈ D([T ]1 ) whose support B is disjoint from A. Now assume
S1 is a product of
S
conjugates of S2±1 by T1 , ..., Tn ∈ [T ]1 . We must have A ⊆ ni=1 Ti (B), but then the
integral of the escape time of A must be less than
n
X
dT (Ti−1 , idX ) < +∞,
i=1
a contradiction.
38
Remark. The two above results result are also true in the more general aperiodic
case, but the non-trivial case is the ergodic one. Indeed, in the non-ergodic case we
can directly use Lemma 4.25 to build two non-trivial elements in D([Φ]1 ) whose supports are T -invariant and disjoint, so the normal subgroups they generate actually
intersect trivially.
4.5
Density of topological full groups, amenability and finiteness of the topological rank
Theorem 4.28. Let T be a homeomorphism of the Cantor space, and let ν be a
non-atomic ergodic probability measure preserved by T . Then the topological full
group [T ]c is dense in the L1 full group [T ]1 .
Proof. By Theorem 3.26, the group [T ]c contains D([Φ]1 ), in particular it contains
every periodic element of [Φ]1 by Lemma 3.10. By Corollary 4.19 the group [T ]1 is
generated by periodic elements along with T , and since T ∈ [T ]c we conclude that
[T ]c = [T ]1 .
So given a measure-preserving ergodic homeomorphism T of (2N , λ), we have the
following chain of Polish groups where each is dense in its successor:
[T ]c 6 [T ]1 6 [T ] 6 Aut(2N , ν).
I don’t know whether the above theorem can be generalised to other finitely generated groups acting by measure-preserving homeomorphisms. Recall however that
this result is wrong for graphings in general (see Example 3.27).
Recall that a topological group is amenable if all its continuous actions on compact spaces admit invariant probability measures. Note that if a topological group
contains a dense subgroup which is amenable as a discrete group, it has to be
amenable itself. We view countable groups as discrete groups. Juschenko and Monod
have shown that topological full groups of minimal Z-actions on the Cantor space are
amenable [JM13]. Since the Jewett-Krieger theorem ensures us that every ergodic
Z-actions can be modelled by a minimal uniquely ergodic homeomorphism (see e.g.
[Pet89]), the previous theorem has the following interesting application.
Theorem 4.29. Let T ∈ Aut(X, µ) be ergodic. Then its L1 full group [T ]1 is an
amenable topological group, and so is the closed subgroup D([T ]1 ).
It would be interesting to obtain a purely ergodic-theoretic proof of the previous
result. The same is true of our next result where we rely on Matui’s work on
finite generation of topological full groups (the commutator group of the topological
full group of a minimal homeomorphism is finitely generated if and only if the
homeomorphism is a subshift of finite type, see [Mat06, Thm. 5.4]). We should also
point out that our proof of (1)⇒(2) is a natural adaptation of his.
Theorem 4.30. Let T ∈ Aut(X, µ) be ergodic. Then the following are equivalent
1. the L1 full group [T ]1 is topologically finitely generated;
39
2. the closed subgroup D([T ])1 is topologically finitely generated;
3. the transformation T has finite entropy.
Proof. (1)⇒(3) Suppose that [T ]1 is topologically finitely generated, and let S1 , ..., Sk ∈
[T ]1 generate a dense subgroup of [T ]1 . For each i ∈ {1, ..., k} and each n ∈ Z let
Ai,n := {x ∈ X : cSi (x) = n}. Since S1 , ..., Sk ∈ [T ]1 , for every i ∈ {1, ..., k} we have
X
|n| µ(Ai,n ) < +∞
n∈Z
Lemma 2.13 thus yields that every partition (Ai,n )n∈N has finite entropy. The partiW
tion P := ki=1 (Ai,n )n∈Z thus has finite entropy. We will show that it is a generating
partition.
Let A be the algebra generated by the T -translates of P. Note that every element
of the group generated by S1 , ..., Sk must have a cocycle partition whose elements
belong to A.
Since P has finite entropy, in order to conclude that T has finite entropy we only
need to check that A is dense in MAlg(X, µ).
For every Borel set A the transformation induced by T on A has support equal to
A and can be approximated by elements of the group generated by S1 , ..., Sk in the
metric d˜T which refines the uniform metric du . So the supports of these transformations form a sequence (An ) whose elements belong to Q such that µ(An 4 A) → 0.
We can conclude that up to measure zero, Q generates the σ-algebra of X. As
explained before, this yields that T has finite entropy.
(3)⇒(2) : If T has finite entropy, Krieger’s finite generator theorem yields that
we can take T to be a minimal subshift of finite type [Kri72]. It then follows from
Matui’s result [Mat06, Thm. 5.4] that D([T ]c ) is finitely generated. So by Theorem
4.28 the Polish group D([T ]1 ) is topologically finitely generated.
(2)⇒(1): Suppose D([T ]1 ) is topologically finitely generated. It follows from
Corollary 4.20 that
[T ]1 = D([T ]1 ) o hT i ,
so [T ]1 is also topologically finitely generated.
We now give a concrete example where the topological rank is equal to 2.
Proposition 4.31. The topological rank of the L1 full group of an irrational rotation
is equal to 2.
Proof. The topological generators that Marks built in [Mar16] to show that the full
group of the ergodic hyperfinite equivalence relation is topologically 2-generated can
readily be used.
To be more precise, consider an irrational rotation Tα on [0, 1[ of irrational angle
α ∈ [0, 1[. Let β ∈ (0, α) be irrational and consider the involution ITα ,[0,β[ as defined
in the paragraph preceding Theorem 3.14.
The exact same proof as Marks’ shows that the group topologically generated by
Tα and ITα ,[0,β[ contains all the involutions ITα ,A where A is any Borel subset of [0, 1[
40
such that A ∩ Tα (A) = ∅ (indeed the uniform and the L1 topology coincide on the
set of involutions of the form ITα ,A so Marks’ proof readily applies). So the group
topologically generated by Tα and ITα ,[0,β[ contains D([Tα ]1 ) by Theorem 3.14. But
by Corollary 4.20 we have
[Tα ]1 = D([T ]1 ) o hT i ,
so the group topologically generated by Tα and ITα ,A is equal to [Tα ]1 which has
thus topological rank at most 2. Since [Tα ]1 is not abelian, we conclude that its
topological rank is equal to 2.
Remark. Matui’s work [Mat13, Prop. 3.2] can also be used to obtain the above
result for irrational rotations of angle α ∈ (0, 1/6).
5
5.1
Further remarks and questions
Non-amenability
Theorem 5.1. Let Γ be a finitely generated non amenable group acting freely in a
measure-preserving manner on (X, µ). Then neither [Γ]1 nor D([Γ]1 ) are amenable.
Proof. Let Γ be a finitely generated non amenable group acting freely in a measurepreserving manner on (X, µ). It follows from Theorem 3.7 that [Γ]1 is dense in
[RΓ ] for the uniform topology. Since Γ is infinite and acting freely, the equivalence
relation RΓ is aperiodic so the group [RΓ ] is perfect by [LM14b, Prop. 3.6]. So
D([Γ]1 ) is also dense in [RΓ ]. Furthermore, the group [RΓ ] is non-amenable for the
uniform topology by [GP07, Prop. 5.6]. So the dense subgroups [Γ]1 and D([Γ]1 )
are not amenable for the uniform topology, in particular they are not amenable for
the thinner L1 topology.
It would be very interesting to understand which amenable groups admit free
actions whose L1 full groups are amenable. Note that by Theorem 4.29, all the free
ergodic Z-actions induce an amenable L1 full group.
5.2
Absence of a natural closure property
Full groups as defined by Dye are stable under cutting and pasting a countable
family of elements along a countable partition of X. Here L1 full groups are only
stable under cutting and pasting a finite family of elements, and it seems natural
to wonder if they can be more abstractly characterised. Here we show that L1 full
groups are not “stable under L1 cutting and pasting”, showing that the most natural
closure property one could hope for does not hold.
Theorem 5.2. There exists an ergodic measure-preserving transformation T and a
non-null Borel set A ⊆ X such that [TA ]1 66 [T ]1 .
Remark. A reformulation of the theorem is that the inclusion [T ]1 A 6 [TA ]1 can be
strict. In particular, given S ∈ [T ]1 , it can happen that [S]1 66 [T ]1 .
41
Proof. We fix a Borel partition (Xn )n>1 of X such that for every n ∈ N, µ(Xn ) = 2−n .
4n −1
We then cut each Xn into 4n pieces (Bn,m )m=0
of equal measure (so µ(Bn,m ) = 8−n ).
Let T0 be a periodic transformation such that
• for all n ∈ N and m ∈ {0, ..., 4n − 2}, one has T0 (Bn,m ) = Bn,m+1 and
n
• for all n ∈ N and x ∈ Bn,0 one has T04 +1 (x) = x.
F
Then the set B0 := n∈N Bn,0 is a fundamental domain for T0 . Let U be a
measure-preserving transformation such that supp U = B0 and UB0 is ergodic, and
consider T := U T0 . By Proposition 2.5, T is ergodic. Moreover for all n ∈ N and
m ∈ {0, ..., 4n − 1} we have T (Bn,m ) = Bn,m+1 . Now for all n ∈ N we let
An :=
n −1
2G
Bn,2n m
m=0
and then A :=
G
An .
n∈N
Consider the transformation TA , and note that by construction for all n ∈ N,
n
all m ∈ {0, 2n − 2} and all x ∈ Bn,2n m we have TA (x) = T 2 (x). Now consider the
involution Un defined by
4n /2
F n /2−1
Bn,2n m
(x) if x ∈ 2m=0
T
F2n −1
n /2
−4
Un (x) =
T
(x) if x ∈ m=2n /2 Bn,2n m
x
else.
TA
T
B2,0
B2,3
B2,7
B2,11
U3
Figure 1: The construction of U3 . The set A3 is the gray part of the figure.
Note that for all x ∈ An we have dT (x, Un (x)) = 4n /2. We can then compute
dT (Un , idX ) =
n −1 Z
2X
m=0
n
Bn,2n m
n
4
2
×
n
8
2
1
=
2
=
42
dT (x, Un (x))
Also for all x ∈ An we have dTA (x, Un (x)) = 2n /2 so the same computation as before
yields
1
2n 2n
= n+1
dTA (Un , idX ) = n ×
8
2
2
Let U be the involution obtained by gluing together all the Un ’s, namely for all
x∈X
Un (x) if x ∈ An for some n ∈ N,
U (x) =
x
else.
We clearly have
X
X1
= +∞
2
n∈N
n∈N
X
X 1
1
and dTA (U, idX ) =
dTA (Un , idX ) =
= < +∞.
n+1
2
2
n∈N
n∈N
dT (U, idX ) =
dT (Un , idX ) =
We conclude that U witnesses the fact that [TA ]1 66 [T ]1 .
Recall that two actions of finitely generated groups Γ and Λ are L1 orbit equivalent if up to a measure-preserving transformation, they share the same orbits and
for every λ ∈ Λ and γ ∈ Γ, the maps
x 7→ dΓ (x, λ(x)) and x 7→ dΛ (x, γ(x))
are integrable, where dΓ and dΛ are respective Schreier graph distances (see e.g.
[Aus16] for more on this notion). Here we note that although sharing the same L1
full group implies L1 orbit equivalence, the converse does not hold a priori.
Corollary 5.3. There exists two measure-preserving actions of the free group on two
generators F2 such that the identity map is an L1 -orbit equivalence between them but
they do not share the same L1 full group.
Proof. Write F2 = ha, bi, fix T ∈ Aut(X, µ) and A ⊆ X as in the proof of the
previous theorem. Define a measure-preserving F2 -action α1 by α1 (a) = T and
α2 (b) = T . Then define a second action α2 by α2 (a) = TA and α2 (b) = T TA−1 . Since
TA ∈ [T ]1 these two actions are L1 orbit equivalent via the identity map. However
a map U as in the proof of the previous theorem belongs to the L1 full group of α2 ,
but not to the L1 full group of α2 .
Remark. Obviously L∞ orbit equivalence implies conjugacy of the L1 full groups.
It would be interesting to understand wether the converse holds.
5.3
Lp full groups
Let p ∈ [1, +∞]. One can then define Lp full group [Φ]p of a graphing Φ on a
standard probability space (X, µ) by letting
[Φ]p = {T ∈ [RΦ ] : the map x 7→ dΦ (T (x), x) belongs to Lp (X, µ)} .
43
The triangle inequality and Minkowski’s inequality yield that [Φ]p is indeed a group,
and the natural distance d˜pΦ given by
d˜pΦ (S, T ) = kx 7→ dΦ (S(x), T (x))kp
is right-invariant, complete and refines the uniform topology. Moreover Hölder’s
inequality implies that [Φ]q 6 [Φ]p whenever p < q. Note that the L∞ full group
is discrete since dΦ takes values in Z. It is also uncountable hence we view it as a
degenerate case. For p < +∞ however, one can show exactly like for p = 1 that [Φ]p
is separable, so that it is also a Polish group.
The proof that [Φ]1 is dense in [RΦ ] actually implies that [Φ]∞ is dense in [RΦ ]
so that all the [Φ]p are dense in [RΦ ]. Also D([Φ]∞ ) is dense in D([Φ]p ) for all
p ∈ [1, +∞[, but it is not clear wether [Φ]p is dense in [Φ]q for q < p.
The main difference with L1 full groups is that for p > 1 the Lp full groups are
not stable under taking induced transformations. Indeed, given a set A such that
0 < µ(A) < 1 and a map f : A → N of integral 1, one can use Lemma 2.4 to build a
measure-preserving ergodic transformation T whose return time to A equates f . So
if f was chosen not to be in Lp the transformation induced by T on A won’t belong
to the Lp full group of T .
If T is an ergodic measure-preserving transformation, the Lp full group of T is
a complete invariant of flip conjugacy since it also has many involutions and is a
subgroup of the L1 full group. The index map on [T ]1 restricts to its Lp full group
and yields a surjective homomorphism [T ]p → Z. The kernel of this homomorphism
clearly contains D([T ]p ) but it is unclear wether the converse holds, in which case we
would have that [T ]p is dense in [T ]q for q < p by arguments similar of those used for
Theorem 4.28. One way to establish the converse would be to obtain an analogue of
Theorem 4.18. To begin with, we can still write every element of [T ]p as a a product
of three elements of disjoint supports, the first being almost positive, the second
almost negative and the third periodic (the proof of 4.13 readily adapts). But the
problem is to understand wether almost positive elements admit a decomposition
as a product of periodic elements and induced transformations belonging to [T ]p (cf.
Prop. 4.14 and Prop. 4.16 for the case p = 1).
Since D([T ]1 ) = Ker I, a positive answer to the following general question would
also imply that D([T ]p ) = Ker I.
Question 5.4. Let Φ be an ergodic graphing. Is it true that for all p ∈]1, +∞[ we
have the equality
D([Φ]1 ) ∩ [Φ]p = D([Φ]p ),
where the closure in the left term is in the L1 topology while the closure in the right
term is in the Lp topology?
5.4
Questions
We close this paper by recalling some questions scattered through the text and
asking a few more. The first was contained in the previous section.
Question 5.5. Let 1 6 p < q 6 +∞. Is it true that [Φ]q is dense in [Φ]p ?
44
Note that a positive answer for q = +∞ yields a positive answer for every
1 6 p < q 6 +∞. When Φ is a continuous graphing, we obviously have [Φ]c 6 [Φ]∞ .
We thus also ask:
Question 5.6. Let Φ be a finite continuous graphing and 1 6 p < +∞. Is it true
that [Φ]c is dense in [Φ]p ?
Note that the answer is negative if we remove the condition that Φ is finite
(cf. Example 3.27). We have seen that the L1 full group of an ergodic measurepreserving transformation T is topologically finitely generated if and only if T has
finite entropy, and gave examples where the topological rank of [T ]1 is equal to 2.
One could hope that there is a formula linking the topological rank to entropy as is
true for cost and topological rank of full groups [LM14a], but for now we don’t even
know the answer to the following very basic and pessimistic question.
Question 5.7. Let T be an ergodic measure-preserving transformation of finite
entropy. Is the topological rank of [T ]1 necessarily equal to 2?
Using Lemma 2.1 from [Aus16], our proof that if [T ]1 is topologically finitely
generated then T has finite entropy can easily generalised to show that given a
measure-preserving ergodic free action of a finitely generated group Γ, if the L1 full
group of the action or the closure of its derived group are topologically finitely generated then the Γ-action has a generating partition of finite entropy (i.e. the action
has finite Rohlin entropy; see [Sew14] for more on Rohlin entropy). The following question is very general, but answering it for some non virtually cyclic infinite
amenable group would already be very nice (in the amenable case the Rohlin entropy
is equal to the usual entropy by a result of Seward and Tucker-Drob [STD14]).
Question 5.8. Let Γ be a finitely generated group acting freely and ergodically on
(X, µ). Suppose further that the action has finite Rohlin entropy. Is it true that
[Γ]1 has finite topological rank? That D([Γ]1 ) has finite topological rank?
It would also be interesting to try to generalise our structural results on L1 full
groups of ergodic Z-actions to Zn -actions. For instance, given a measure-preserving
ergodic Zn -action, one can still define an index map In : [Zn ]1 → Rn and ask for
analogues of Corollary 4.20.
Question 5.9. Does the index map In take values into Zn when the canonical
generators of Zn act ergodically? Is the kernel of In equal to the closure of the
derived group of [Zn ]?
Our positive answer to this question for n = 1 relied crucially on the decomposition of elements of [T ]1 as products of almost positive, almost negative and periodic
elements of disjoint supports, but it is not clear what an analogue of this in higher
dimension would be so that another approach is probably needed.
We should mention that in the case of a single ergodic measure-preserving transformation T , one can use the ideas from section 4.3 to show that the open unit ball
in [T ]1 only consists of periodic elements. Since those belong to D([T ]1 ) (cf. Lemma
3.10), this yields another way to prove that D([T ]1 ) is open. We thus ask:
45
Question 5.10. Let a finitely generated group Γ act freely on (X, µ) with all its
generators acting ergodically. When does the open unit ball in [Γ]1 only contain
periodic elements?
The fact that for an ergodic measure-preserving transformation T the open unit
ball of the L1 full group only contains periodic elements can be used to show that [T ]1
has Rosendal’s local property (OB) and is (OB) generated, so that by Rosendal’s
work it has a well defined quasi-isometry type as a topological group (see [Ros14]).
This will be the subject of a later work.
Finally, full groups of ergodic measure-preserving equivalence relations can be
seen as special cases of L1 full groups (see Example 3.2). They enjoy the automatic
continuity property as was shown by Kittrell and Tsankov [KT10, Thm. 1.5] and
hence admit a unique Polish group topology.
Question 5.11. Let Φ be an ergodic graphing. Does [Φ]1 satisfy the automatic
continuity property? Is its Polish group topology unique?
References
[Aus16]
Tim Austin. Behaviour of entropy under bounded and integrable orbit
equivalence. ArXiv e-prints, 2016.
[Bec98]
Howard Becker. Polish group actions: dichotomies and generalized elementary embeddings. J. Amer. Math. Soc., 11(2):397–449, 1998.
[Bel68]
R. M. Belinskaya. Partitions of lebesgue space in trajectories defined by ergodic automorphisms. Functional Analysis and Its Applications, 2(3):190–
199, 1968.
[CLM16] Alessandro Carderi and François Le Maître. Orbit full groups for locally
compact groups. accepted for publication in Transactions of the AMS,
2016.
[Dow11] Tomasz Downarowicz. Entropy in dynamical systems, volume 18 of New
Mathematical Monographs. Cambridge University Press, Cambridge, 2011.
[Dye59]
Henry A. Dye. On groups of measure preserving transformation. I. Amer.
J. Math., 81:119–159, 1959.
[EG14]
Amichai Eisenmann and Yair Glasner. Generic IRS in free groups, after
Bowen. to appear in Proc. Amer. Math. Soc., 2014.
[Fat78]
Albert Fathi. Le groupe des transformations de [0, 1] qui préservent la
mesure de Lebesgue est un groupe simple. Israel J. Math., 29(2-3):302–
308, 1978.
[Fre04]
D. H. Fremlin. Measure theory. Vol. 3. Torres Fremlin, Colchester, 2004.
Measure algebras, Corrected second printing of the 2002 original.
46
[Fri70]
Nathaniel A. Friedman. Introduction to ergodic theory. Van Nostrand
Reinhold Co., New York-Toronto, Ont.-London, 1970. Van Nostrand Reinhold Mathematical Studies, No. 29.
[FRW11] Matthew Foreman, Daniel J. Rudolph, and Benjamin Weiss. The conjugacy problem in ergodic theory. Ann. of Math. (2), 173(3):1529–1586,
2011.
[GH09]
Steven Givant and Paul Halmos. Introduction to Boolean algebras. Undergraduate Texts in Mathematics. Springer, New York, 2009.
[Gla03]
Eli Glasner. Ergodic theory via joinings, volume 101 of Mathematical
Surveys and Monographs. American Mathematical Society, Providence,
RI, 2003.
[GP07]
Thierry Giordano and Vladimir Pestov. Some extremely amenable groups
related to operator algebras and ergodic theory. J. Inst. Math. Jussieu,
6(2):279–315, 2007.
[GPS95] Thierry Giordano, Ian F. Putnam, and Christian F. Skau. Topological orbit equivalence and C ∗ -crossed products. J. Reine Angew. Math., 469:51–
111, 1995.
[GPS99] Thierry Giordano, Ian F. Putnam, and Christian F. Skau. Full groups of
Cantor minimal systems. Israel J. Math., 111:285–320, 1999.
[Hal50]
Paul R. Halmos. Measure Theory. D. Van Nostrand Company, Inc., New
York, N. Y., 1950.
[JM13]
Kate Juschenko and Nicolas Monod. Cantor systems, piecewise translations and simple amenable groups. Ann. Math. (2), 178(2):775–787, 2013.
[Kac47]
Mark Kac. On the notion of recurrence in discrete stochastic processes.
Bull. Amer. Math. Soc., 53:1002–1010, 1947.
[Kec10]
Alexander S. Kechris. Global aspects of ergodic group actions, volume
160 of Mathematical Surveys and Monographs. American Mathematical
Society, Providence, RI, 2010.
[Kri70]
Wolfgang Krieger. On entropy and generators of measure-preserving transformations. Trans. Amer. Math. Soc., 149:453–464, 1970.
[Kri72]
Wolfgang Krieger. On unique ergodicity. In Proceedings of the Sixth Berkeley Symposium on Mathematical Statistics and Probability (Univ. California, Berkeley, Calif., 1970/1971), Vol. II: Probability theory, pages 327–
346. Univ. California Press, Berkeley, Calif., 1972.
[KT10]
John Kittrell and Todor Tsankov. Topological properties of full groups.
Ergodic Theory Dynam. Systems, 30(2):525–545, 2010.
47
[Lev95]
Gilbert Levitt. On the cost of generating an equivalence relation. Ergodic
Theory Dynam. Systems, 15(6):1173–1181, 1995.
[LM14a] François Le Maître. The number of topological generators for full groups
of ergodic equivalence relations. Invent. Math., 198:261–268, 2014.
[LM14b] François Le Maître. Sur les groupes pleins préservant une mesure de probabilité. PhD thesis, ENS Lyon, 2014. 2014ENSL0892.
[LM15]
François Le Maître. On full groups of non-ergodic probability measure
preserving equivalence relations. to appear in Ergodic Theory Dyn. Syst.,
2015.
[Mar16] Andrew Marks. Topological generators for full groups of hyperfinite pmp
equivalence relations. preprint, 2016.
[Mat06] Hiroki Matui. Some remarks on topological full groups of Cantor minimal
systems. Internat. J. Math., 17(2):231–251, 2006.
[Mat13] Hiroki Matui. Some remarks on topological full groups of Cantor minimal
systems II. Ergodic Theory Dynam. Systems, 33(5):1542–1549, 2013.
[Med07] Konstantin Medynets. On approximation of homeomorphisms of a Cantor
set. Fund. Math., 194(1):1–13, 2007.
[Mil05]
Benjamin David Miller. Density of topological full groups. Unpublished note available at https: // dl. dropboxusercontent. com/ u/
47430894/ Web/ notes/ density. pdf , 2005.
[Pet89]
Karl Petersen. Ergodic theory, volume 2 of Cambridge Studies in Advanced
Mathematics. Cambridge University Press, Cambridge, 1989. Corrected
reprint of the 1983 original.
[Ros14]
Christian Rosendal. Coarse geometry of topological groups. preprint,
2014.
[Sew14]
Brandon Seward. Krieger’s finite generator theorem for ergodic actions of
countable groups i. ArXiv e-prints, 2014.
[STD14] Brandon Seward and Robin D. Tucker-Drob. Borel structurability on the
2-shift of a countable group. ArXiv e-prints, 2014.
48
| 4math.GR
|